code
stringlengths
49
1.37M
repo_name
stringclasses
117 values
path
stringlengths
17
73
from
stringclasses
1 value
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" #include "internal/safe_math.h" #if !defined(OPENSSL_NO_DGRAM) && !defined(OPENSSL_NO_SOCK) OSSL_SAFE_MATH_UNSIGNED(size_t, size_t) struct ring_buf { unsigned char *start; size_t len; size_t count; size_t idx[2]; }; static int ring_buf_init(struct ring_buf *r, size_t nbytes) { r->start = OPENSSL_malloc(nbytes); if (r->start == NULL) return 0; r->len = nbytes; r->idx[0] = r->idx[1] = r->count = 0; return 1; } static void ring_buf_destroy(struct ring_buf *r) { OPENSSL_free(r->start); r->start = NULL; r->len = 0; r->count = 0; } static void ring_buf_head_tail(struct ring_buf *r, int idx, uint8_t **buf, size_t *len) { size_t max_len = r->len - r->idx[idx]; if (idx == 0 && max_len > r->len - r->count) max_len = r->len - r->count; if (idx == 1 && max_len > r->count) max_len = r->count; *buf = (uint8_t *)r->start + r->idx[idx]; *len = max_len; } #define ring_buf_head(r, buf, len) ring_buf_head_tail((r), 0, (buf), (len)) #define ring_buf_tail(r, buf, len) ring_buf_head_tail((r), 1, (buf), (len)) static void ring_buf_push_pop(struct ring_buf *r, int idx, size_t num_bytes) { size_t new_idx; if (!ossl_assert(num_bytes <= r->len - r->idx[idx])) return; if (!ossl_assert(idx != 0 ? num_bytes <= r->count : num_bytes + r->count <= r->len)) return; new_idx = r->idx[idx] + num_bytes; if (new_idx == r->len) new_idx = 0; r->idx[idx] = new_idx; if (idx != 0) r->count -= num_bytes; else r->count += num_bytes; } #define ring_buf_push(r, num_bytes) ring_buf_push_pop((r), 0, (num_bytes)) #define ring_buf_pop(r, num_bytes) ring_buf_push_pop((r), 1, (num_bytes)) static void ring_buf_clear(struct ring_buf *r) { r->idx[0] = r->idx[1] = r->count = 0; } static int ring_buf_resize(struct ring_buf *r, size_t nbytes) { unsigned char *new_start; if (r->start == NULL) return ring_buf_init(r, nbytes); if (nbytes == r->len) return 1; if (r->count > 0 && nbytes < r->len) return 0; new_start = OPENSSL_realloc(r->start, nbytes); if (new_start == NULL) return 0; if (r->count > 0) { if (r->idx[0] <= r->idx[1]) { size_t offset = nbytes - r->len; memmove(new_start + r->idx[1] + offset, new_start + r->idx[1], r->len - r->idx[1]); r->idx[1] += offset; } } else { r->idx[0] = r->idx[1] = 0; } r->start = new_start; r->len = nbytes; return 1; } struct bio_dgram_pair_st; static int dgram_pair_write(BIO *bio, const char *buf, int sz_); static int dgram_pair_read(BIO *bio, char *buf, int sz_); static int dgram_mem_read(BIO *bio, char *buf, int sz_); static long dgram_pair_ctrl(BIO *bio, int cmd, long num, void *ptr); static long dgram_mem_ctrl(BIO *bio, int cmd, long num, void *ptr); static int dgram_pair_init(BIO *bio); static int dgram_mem_init(BIO *bio); static int dgram_pair_free(BIO *bio); static int dgram_pair_sendmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed); static int dgram_pair_recvmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed); static int dgram_pair_ctrl_destroy_bio_pair(BIO *bio1); static size_t dgram_pair_read_inner(struct bio_dgram_pair_st *b, uint8_t *buf, size_t sz); #define BIO_MSG_N(array, n) (*(BIO_MSG *)((char *)(array) + (n)*stride)) static const BIO_METHOD dgram_pair_method = { BIO_TYPE_DGRAM_PAIR, "BIO dgram pair", bwrite_conv, dgram_pair_write, bread_conv, dgram_pair_read, NULL, NULL, dgram_pair_ctrl, dgram_pair_init, dgram_pair_free, NULL, dgram_pair_sendmmsg, dgram_pair_recvmmsg, }; static const BIO_METHOD dgram_mem_method = { BIO_TYPE_DGRAM_MEM, "BIO dgram mem", bwrite_conv, dgram_pair_write, bread_conv, dgram_mem_read, NULL, NULL, dgram_mem_ctrl, dgram_mem_init, dgram_pair_free, NULL, dgram_pair_sendmmsg, dgram_pair_recvmmsg, }; const BIO_METHOD *BIO_s_dgram_pair(void) { return &dgram_pair_method; } const BIO_METHOD *BIO_s_dgram_mem(void) { return &dgram_mem_method; } struct dgram_hdr { size_t len; BIO_ADDR src_addr, dst_addr; }; struct bio_dgram_pair_st { BIO *peer; struct ring_buf rbuf; size_t req_buf_len; size_t mtu; uint32_t cap; CRYPTO_RWLOCK *lock; unsigned int no_trunc : 1; unsigned int local_addr_enable : 1; unsigned int role : 1; unsigned int grows_on_write : 1; }; #define MIN_BUF_LEN (1024) #define is_dgram_pair(b) (b->peer != NULL) static int dgram_pair_init(BIO *bio) { struct bio_dgram_pair_st *b = OPENSSL_zalloc(sizeof(*b)); if (b == NULL) return 0; b->mtu = 1472; b->req_buf_len = 9 * (sizeof(struct dgram_hdr) + b->mtu); b->lock = CRYPTO_THREAD_lock_new(); if (b->lock == NULL) { OPENSSL_free(b); return 0; } bio->ptr = b; return 1; } static int dgram_mem_init(BIO *bio) { struct bio_dgram_pair_st *b; if (!dgram_pair_init(bio)) return 0; b = bio->ptr; if (ring_buf_init(&b->rbuf, b->req_buf_len) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_BIO_LIB); return 0; } b->grows_on_write = 1; bio->init = 1; return 1; } static int dgram_pair_free(BIO *bio) { struct bio_dgram_pair_st *b; if (bio == NULL) return 0; b = bio->ptr; if (!ossl_assert(b != NULL)) return 0; dgram_pair_ctrl_destroy_bio_pair(bio); CRYPTO_THREAD_lock_free(b->lock); OPENSSL_free(b); return 1; } static int dgram_pair_ctrl_make_bio_pair(BIO *bio1, BIO *bio2) { struct bio_dgram_pair_st *b1, *b2; if (bio1 == NULL || bio2 == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT); return 0; } if (bio1->method != &dgram_pair_method || bio2->method != &dgram_pair_method) { ERR_raise_data(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT, "both BIOs must be BIO_dgram_pair"); return 0; } b1 = bio1->ptr; b2 = bio2->ptr; if (!ossl_assert(b1 != NULL && b2 != NULL)) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return 0; } if (b1->peer != NULL || b2->peer != NULL) { ERR_raise_data(ERR_LIB_BIO, BIO_R_IN_USE, "cannot associate a BIO_dgram_pair which is already in use"); return 0; } if (!ossl_assert(b1->req_buf_len >= MIN_BUF_LEN && b2->req_buf_len >= MIN_BUF_LEN)) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return 0; } if (b1->rbuf.len != b1->req_buf_len) if (ring_buf_init(&b1->rbuf, b1->req_buf_len) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_BIO_LIB); return 0; } if (b2->rbuf.len != b2->req_buf_len) if (ring_buf_init(&b2->rbuf, b2->req_buf_len) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_BIO_LIB); ring_buf_destroy(&b1->rbuf); return 0; } b1->peer = bio2; b2->peer = bio1; b1->role = 0; b2->role = 1; bio1->init = 1; bio2->init = 1; return 1; } static int dgram_pair_ctrl_destroy_bio_pair(BIO *bio1) { BIO *bio2; struct bio_dgram_pair_st *b1 = bio1->ptr, *b2; ring_buf_destroy(&b1->rbuf); bio1->init = 0; if (b1->peer == NULL) return 1; bio2 = b1->peer; b2 = bio2->ptr; if (!ossl_assert(b2->peer == bio1)) return 0; ring_buf_destroy(&b2->rbuf); bio2->init = 0; b1->peer = NULL; b2->peer = NULL; return 1; } static int dgram_pair_ctrl_eof(BIO *bio) { struct bio_dgram_pair_st *b = bio->ptr, *peerb; if (!ossl_assert(b != NULL)) return -1; if (!bio->init) return 1; if (!is_dgram_pair(b)) return 0; peerb = b->peer->ptr; if (!ossl_assert(peerb != NULL)) return -1; return 0; } static int dgram_pair_ctrl_set_write_buf_size(BIO *bio, size_t len) { struct bio_dgram_pair_st *b = bio->ptr; if (b->peer != NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_IN_USE); return 0; } if (len < MIN_BUF_LEN) len = MIN_BUF_LEN; if (b->rbuf.start != NULL) { if (!ring_buf_resize(&b->rbuf, len)) return 0; } b->req_buf_len = len; b->grows_on_write = 0; return 1; } static int dgram_pair_ctrl_reset(BIO *bio) { struct bio_dgram_pair_st *b = bio->ptr; ring_buf_clear(&b->rbuf); return 1; } static size_t dgram_pair_ctrl_pending(BIO *bio) { size_t saved_idx, saved_count; struct bio_dgram_pair_st *b = bio->ptr, *readb; struct dgram_hdr hdr; size_t l; if (!bio->init) return 0; if (is_dgram_pair(b)) readb = b->peer->ptr; else readb = b; if (CRYPTO_THREAD_write_lock(readb->lock) == 0) return 0; saved_idx = readb->rbuf.idx[1]; saved_count = readb->rbuf.count; l = dgram_pair_read_inner(readb, (uint8_t *)&hdr, sizeof(hdr)); readb->rbuf.idx[1] = saved_idx; readb->rbuf.count = saved_count; CRYPTO_THREAD_unlock(readb->lock); if (!ossl_assert(l == 0 || l == sizeof(hdr))) return 0; return l > 0 ? hdr.len : 0; } static size_t dgram_pair_ctrl_get_write_guarantee(BIO *bio) { size_t l; struct bio_dgram_pair_st *b = bio->ptr; if (CRYPTO_THREAD_read_lock(b->lock) == 0) return 0; l = b->rbuf.len - b->rbuf.count; if (l >= sizeof(struct dgram_hdr)) l -= sizeof(struct dgram_hdr); if (l < b->mtu) l = 0; CRYPTO_THREAD_unlock(b->lock); return l; } static int dgram_pair_ctrl_get_local_addr_cap(BIO *bio) { struct bio_dgram_pair_st *b = bio->ptr, *readb; if (!bio->init) return 0; if (is_dgram_pair(b)) readb = b->peer->ptr; else readb = b; return (~readb->cap & (BIO_DGRAM_CAP_HANDLES_SRC_ADDR | BIO_DGRAM_CAP_PROVIDES_DST_ADDR)) == 0; } static int dgram_pair_ctrl_get_effective_caps(BIO *bio) { struct bio_dgram_pair_st *b = bio->ptr, *peerb; if (b->peer == NULL) return 0; peerb = b->peer->ptr; return peerb->cap; } static uint32_t dgram_pair_ctrl_get_caps(BIO *bio) { struct bio_dgram_pair_st *b = bio->ptr; return b->cap; } static int dgram_pair_ctrl_set_caps(BIO *bio, uint32_t caps) { struct bio_dgram_pair_st *b = bio->ptr; b->cap = caps; return 1; } static int dgram_pair_ctrl_get_local_addr_enable(BIO *bio) { struct bio_dgram_pair_st *b = bio->ptr; return b->local_addr_enable; } static int dgram_pair_ctrl_set_local_addr_enable(BIO *bio, int enable) { struct bio_dgram_pair_st *b = bio->ptr; if (dgram_pair_ctrl_get_local_addr_cap(bio) == 0) return 0; b->local_addr_enable = (enable != 0 ? 1 : 0); return 1; } static int dgram_pair_ctrl_get_mtu(BIO *bio) { struct bio_dgram_pair_st *b = bio->ptr; return b->mtu; } static int dgram_pair_ctrl_set_mtu(BIO *bio, size_t mtu) { struct bio_dgram_pair_st *b = bio->ptr, *peerb; b->mtu = mtu; if (b->peer != NULL) { peerb = b->peer->ptr; peerb->mtu = mtu; } return 1; } static long dgram_mem_ctrl(BIO *bio, int cmd, long num, void *ptr) { long ret = 1; struct bio_dgram_pair_st *b = bio->ptr; if (!ossl_assert(b != NULL)) return 0; switch (cmd) { case BIO_C_SET_WRITE_BUF_SIZE: ret = (long)dgram_pair_ctrl_set_write_buf_size(bio, (size_t)num); break; case BIO_C_GET_WRITE_BUF_SIZE: ret = (long)b->req_buf_len; break; case BIO_CTRL_RESET: dgram_pair_ctrl_reset(bio); break; case BIO_C_GET_WRITE_GUARANTEE: ret = (long)dgram_pair_ctrl_get_write_guarantee(bio); break; case BIO_CTRL_PENDING: ret = (long)dgram_pair_ctrl_pending(bio); break; case BIO_CTRL_FLUSH: break; case BIO_CTRL_DGRAM_GET_NO_TRUNC: ret = (long)b->no_trunc; break; case BIO_CTRL_DGRAM_SET_NO_TRUNC: b->no_trunc = (num > 0); break; case BIO_CTRL_DGRAM_GET_LOCAL_ADDR_ENABLE: *(int *)ptr = (int)dgram_pair_ctrl_get_local_addr_enable(bio); break; case BIO_CTRL_DGRAM_SET_LOCAL_ADDR_ENABLE: ret = (long)dgram_pair_ctrl_set_local_addr_enable(bio, num); break; case BIO_CTRL_DGRAM_GET_LOCAL_ADDR_CAP: ret = (long)dgram_pair_ctrl_get_local_addr_cap(bio); break; case BIO_CTRL_DGRAM_GET_EFFECTIVE_CAPS: case BIO_CTRL_DGRAM_GET_CAPS: ret = (long)dgram_pair_ctrl_get_caps(bio); break; case BIO_CTRL_DGRAM_SET_CAPS: ret = (long)dgram_pair_ctrl_set_caps(bio, (uint32_t)num); break; case BIO_CTRL_DGRAM_GET_MTU: ret = (long)dgram_pair_ctrl_get_mtu(bio); break; case BIO_CTRL_DGRAM_SET_MTU: ret = (long)dgram_pair_ctrl_set_mtu(bio, (uint32_t)num); break; case BIO_CTRL_EOF: ret = (long)dgram_pair_ctrl_eof(bio); break; default: ret = 0; break; } return ret; } static long dgram_pair_ctrl(BIO *bio, int cmd, long num, void *ptr) { long ret = 1; switch (cmd) { case BIO_C_MAKE_BIO_PAIR: ret = (long)dgram_pair_ctrl_make_bio_pair(bio, (BIO *)ptr); break; case BIO_C_DESTROY_BIO_PAIR: dgram_pair_ctrl_destroy_bio_pair(bio); break; case BIO_CTRL_DGRAM_GET_EFFECTIVE_CAPS: ret = (long)dgram_pair_ctrl_get_effective_caps(bio); break; default: ret = dgram_mem_ctrl(bio, cmd, num, ptr); break; } return ret; } int BIO_new_bio_dgram_pair(BIO **pbio1, size_t writebuf1, BIO **pbio2, size_t writebuf2) { int ret = 0; long r; BIO *bio1 = NULL, *bio2 = NULL; bio1 = BIO_new(BIO_s_dgram_pair()); if (bio1 == NULL) goto err; bio2 = BIO_new(BIO_s_dgram_pair()); if (bio2 == NULL) goto err; if (writebuf1 > 0) { r = BIO_set_write_buf_size(bio1, writebuf1); if (r == 0) goto err; } if (writebuf2 > 0) { r = BIO_set_write_buf_size(bio2, writebuf2); if (r == 0) goto err; } r = BIO_make_bio_pair(bio1, bio2); if (r == 0) goto err; ret = 1; err: if (ret == 0) { BIO_free(bio1); bio1 = NULL; BIO_free(bio2); bio2 = NULL; } *pbio1 = bio1; *pbio2 = bio2; return ret; } static size_t dgram_pair_read_inner(struct bio_dgram_pair_st *b, uint8_t *buf, size_t sz) { size_t total_read = 0; while (sz > 0) { uint8_t *src_buf = NULL; size_t src_len = 0; ring_buf_tail(&b->rbuf, &src_buf, &src_len); if (src_len == 0) break; if (src_len > sz) src_len = sz; if (buf != NULL) memcpy(buf, src_buf, src_len); ring_buf_pop(&b->rbuf, src_len); if (buf != NULL) buf += src_len; total_read += src_len; sz -= src_len; } return total_read; } static ossl_ssize_t dgram_pair_read_actual(BIO *bio, char *buf, size_t sz, BIO_ADDR *local, BIO_ADDR *peer, int is_multi) { size_t l, trunc = 0, saved_idx, saved_count; struct bio_dgram_pair_st *b = bio->ptr, *readb; struct dgram_hdr hdr; if (!is_multi) BIO_clear_retry_flags(bio); if (!bio->init) return -BIO_R_UNINITIALIZED; if (!ossl_assert(b != NULL)) return -BIO_R_TRANSFER_ERROR; if (is_dgram_pair(b)) readb = b->peer->ptr; else readb = b; if (!ossl_assert(readb != NULL && readb->rbuf.start != NULL)) return -BIO_R_TRANSFER_ERROR; if (sz > 0 && buf == NULL) return -BIO_R_INVALID_ARGUMENT; if (local != NULL && b->local_addr_enable == 0) return -BIO_R_LOCAL_ADDR_NOT_AVAILABLE; saved_idx = readb->rbuf.idx[1]; saved_count = readb->rbuf.count; l = dgram_pair_read_inner(readb, (uint8_t *)&hdr, sizeof(hdr)); if (l == 0) { if (!is_multi) BIO_set_retry_read(bio); return -BIO_R_NON_FATAL; } if (!ossl_assert(l == sizeof(hdr))) return -BIO_R_BROKEN_PIPE; if (sz > hdr.len) { sz = hdr.len; } else if (sz < hdr.len) { trunc = hdr.len - sz; if (b->no_trunc) { readb->rbuf.idx[1] = saved_idx; readb->rbuf.count = saved_count; return -BIO_R_NON_FATAL; } } l = dgram_pair_read_inner(readb, (uint8_t *)buf, sz); if (!ossl_assert(l == sz)) return -BIO_R_TRANSFER_ERROR; if (trunc > 0 && !ossl_assert(dgram_pair_read_inner(readb, NULL, trunc) == trunc)) return -BIO_R_TRANSFER_ERROR; if (local != NULL) *local = hdr.dst_addr; if (peer != NULL) *peer = hdr.src_addr; return (ossl_ssize_t)l; } static int dgram_pair_lock_both_write(struct bio_dgram_pair_st *a, struct bio_dgram_pair_st *b) { struct bio_dgram_pair_st *x, *y; x = (a->role == 1) ? a : b; y = (a->role == 1) ? b : a; if (!ossl_assert(a->role != b->role)) return 0; if (!ossl_assert(a != b && x != y)) return 0; if (CRYPTO_THREAD_write_lock(x->lock) == 0) return 0; if (CRYPTO_THREAD_write_lock(y->lock) == 0) { CRYPTO_THREAD_unlock(x->lock); return 0; } return 1; } static void dgram_pair_unlock_both(struct bio_dgram_pair_st *a, struct bio_dgram_pair_st *b) { CRYPTO_THREAD_unlock(a->lock); CRYPTO_THREAD_unlock(b->lock); } static int dgram_pair_read(BIO *bio, char *buf, int sz_) { int ret; ossl_ssize_t l; struct bio_dgram_pair_st *b = bio->ptr, *peerb; if (sz_ < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT); return -1; } if (b->peer == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_BROKEN_PIPE); return -1; } peerb = b->peer->ptr; if (dgram_pair_lock_both_write(peerb, b) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_UNABLE_TO_GET_WRITE_LOCK); return -1; } l = dgram_pair_read_actual(bio, buf, (size_t)sz_, NULL, NULL, 0); if (l < 0) { if (l != -BIO_R_NON_FATAL) ERR_raise(ERR_LIB_BIO, -l); ret = -1; } else { ret = (int)l; } dgram_pair_unlock_both(peerb, b); return ret; } static int dgram_pair_recvmmsg(BIO *bio, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed) { int ret; ossl_ssize_t l; BIO_MSG *m; size_t i; struct bio_dgram_pair_st *b = bio->ptr, *readb; if (num_msg == 0) { *num_processed = 0; return 1; } if (!bio->init) { ERR_raise(ERR_LIB_BIO, BIO_R_BROKEN_PIPE); *num_processed = 0; return 0; } if (is_dgram_pair(b)) readb = b->peer->ptr; else readb = b; if (CRYPTO_THREAD_write_lock(readb->lock) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_UNABLE_TO_GET_WRITE_LOCK); *num_processed = 0; return 0; } for (i = 0; i < num_msg; ++i) { m = &BIO_MSG_N(msg, i); l = dgram_pair_read_actual(bio, m->data, m->data_len, m->local, m->peer, 1); if (l < 0) { *num_processed = i; if (i > 0) { ret = 1; } else { ERR_raise(ERR_LIB_BIO, -l); ret = 0; } goto out; } m->data_len = l; m->flags = 0; } *num_processed = i; ret = 1; out: CRYPTO_THREAD_unlock(readb->lock); return ret; } static int dgram_mem_read(BIO *bio, char *buf, int sz_) { int ret; ossl_ssize_t l; struct bio_dgram_pair_st *b = bio->ptr; if (sz_ < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT); return -1; } if (CRYPTO_THREAD_write_lock(b->lock) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_UNABLE_TO_GET_WRITE_LOCK); return -1; } l = dgram_pair_read_actual(bio, buf, (size_t)sz_, NULL, NULL, 0); if (l < 0) { if (l != -BIO_R_NON_FATAL) ERR_raise(ERR_LIB_BIO, -l); ret = -1; } else { ret = (int)l; } CRYPTO_THREAD_unlock(b->lock); return ret; } static const size_t max_rbuf_size = SIZE_MAX / 2; static ossl_inline size_t compute_rbuf_growth(size_t target, size_t current) { int err = 0; while (current < target) { if (current >= max_rbuf_size) return 0; current = safe_muldiv_size_t(current, 8, 5, &err); if (err) return 0; if (current >= max_rbuf_size) current = max_rbuf_size; } return current; } static size_t dgram_pair_write_inner(struct bio_dgram_pair_st *b, const uint8_t *buf, size_t sz) { size_t total_written = 0; while (sz > 0) { size_t dst_len; uint8_t *dst_buf; ring_buf_head(&b->rbuf, &dst_buf, &dst_len); if (dst_len == 0) { size_t new_len; if (!b->grows_on_write) break; new_len = compute_rbuf_growth(b->req_buf_len + sz, b->req_buf_len); if (new_len == 0 || !ring_buf_resize(&b->rbuf, new_len)) break; b->req_buf_len = new_len; } if (dst_len > sz) dst_len = sz; memcpy(dst_buf, buf, dst_len); ring_buf_push(&b->rbuf, dst_len); buf += dst_len; sz -= dst_len; total_written += dst_len; } return total_written; } static ossl_ssize_t dgram_pair_write_actual(BIO *bio, const char *buf, size_t sz, const BIO_ADDR *local, const BIO_ADDR *peer, int is_multi) { static const BIO_ADDR zero_addr; size_t saved_idx, saved_count; struct bio_dgram_pair_st *b = bio->ptr, *readb; struct dgram_hdr hdr = {0}; if (!is_multi) BIO_clear_retry_flags(bio); if (!bio->init) return -BIO_R_UNINITIALIZED; if (!ossl_assert(b != NULL && b->rbuf.start != NULL)) return -BIO_R_TRANSFER_ERROR; if (sz > 0 && buf == NULL) return -BIO_R_INVALID_ARGUMENT; if (local != NULL && b->local_addr_enable == 0) return -BIO_R_LOCAL_ADDR_NOT_AVAILABLE; if (is_dgram_pair(b)) readb = b->peer->ptr; else readb = b; if (peer != NULL && (readb->cap & BIO_DGRAM_CAP_HANDLES_DST_ADDR) == 0) return -BIO_R_PEER_ADDR_NOT_AVAILABLE; hdr.len = sz; hdr.dst_addr = (peer != NULL ? *peer : zero_addr); hdr.src_addr = (local != NULL ? *local : zero_addr); saved_idx = b->rbuf.idx[0]; saved_count = b->rbuf.count; if (dgram_pair_write_inner(b, (const uint8_t *)&hdr, sizeof(hdr)) != sizeof(hdr) || dgram_pair_write_inner(b, (const uint8_t *)buf, sz) != sz) { b->rbuf.idx[0] = saved_idx; b->rbuf.count = saved_count; if (!is_multi) BIO_set_retry_write(bio); return -BIO_R_NON_FATAL; } return sz; } static int dgram_pair_write(BIO *bio, const char *buf, int sz_) { int ret; ossl_ssize_t l; struct bio_dgram_pair_st *b = bio->ptr; if (sz_ < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT); return -1; } if (CRYPTO_THREAD_write_lock(b->lock) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_UNABLE_TO_GET_WRITE_LOCK); return -1; } l = dgram_pair_write_actual(bio, buf, (size_t)sz_, NULL, NULL, 0); if (l < 0) { ERR_raise(ERR_LIB_BIO, -l); ret = -1; } else { ret = (int)l; } CRYPTO_THREAD_unlock(b->lock); return ret; } static int dgram_pair_sendmmsg(BIO *bio, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed) { ossl_ssize_t ret, l; BIO_MSG *m; size_t i; struct bio_dgram_pair_st *b = bio->ptr; if (num_msg == 0) { *num_processed = 0; return 1; } if (CRYPTO_THREAD_write_lock(b->lock) == 0) { ERR_raise(ERR_LIB_BIO, ERR_R_UNABLE_TO_GET_WRITE_LOCK); *num_processed = 0; return 0; } for (i = 0; i < num_msg; ++i) { m = &BIO_MSG_N(msg, i); l = dgram_pair_write_actual(bio, m->data, m->data_len, m->local, m->peer, 1); if (l < 0) { *num_processed = i; if (i > 0) { ret = 1; } else { ERR_raise(ERR_LIB_BIO, -l); ret = 0; } goto out; } m->flags = 0; } *num_processed = i; ret = 1; out: CRYPTO_THREAD_unlock(b->lock); return ret; } #endif
bio
openssl/crypto/bio/bss_dgram_pair.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <stdio.h> #include <string.h> #include <stdlib.h> #include "bio_local.h" #include "internal/cryptlib.h" #include <openssl/err.h> long BIO_debug_callback_ex(BIO *bio, int cmd, const char *argp, size_t len, int argi, long argl, int ret, size_t *processed) { BIO *b; char buf[256]; char *p; int left; size_t l = 0; BIO_MMSG_CB_ARGS *args; long ret_ = ret; if (processed != NULL) l = *processed; left = BIO_snprintf(buf, sizeof(buf), "BIO[%p]: ", (void *)bio); if (left < 0) left = 0; p = buf + left; left = sizeof(buf) - left; switch (cmd) { case BIO_CB_FREE: BIO_snprintf(p, left, "Free - %s\n", bio->method->name); break; case BIO_CB_READ: if (bio->method->type & BIO_TYPE_DESCRIPTOR) BIO_snprintf(p, left, "read(%d,%zu) - %s fd=%d\n", bio->num, len, bio->method->name, bio->num); else BIO_snprintf(p, left, "read(%d,%zu) - %s\n", bio->num, len, bio->method->name); break; case BIO_CB_WRITE: if (bio->method->type & BIO_TYPE_DESCRIPTOR) BIO_snprintf(p, left, "write(%d,%zu) - %s fd=%d\n", bio->num, len, bio->method->name, bio->num); else BIO_snprintf(p, left, "write(%d,%zu) - %s\n", bio->num, len, bio->method->name); break; case BIO_CB_PUTS: BIO_snprintf(p, left, "puts() - %s\n", bio->method->name); break; case BIO_CB_GETS: BIO_snprintf(p, left, "gets(%zu) - %s\n", len, bio->method->name); break; case BIO_CB_CTRL: BIO_snprintf(p, left, "ctrl(%d) - %s\n", argi, bio->method->name); break; case BIO_CB_RECVMMSG: args = (BIO_MMSG_CB_ARGS *)argp; BIO_snprintf(p, left, "recvmmsg(%zu) - %s", args->num_msg, bio->method->name); break; case BIO_CB_SENDMMSG: args = (BIO_MMSG_CB_ARGS *)argp; BIO_snprintf(p, left, "sendmmsg(%zu) - %s", args->num_msg, bio->method->name); break; case BIO_CB_RETURN | BIO_CB_READ: BIO_snprintf(p, left, "read return %d processed: %zu\n", ret, l); break; case BIO_CB_RETURN | BIO_CB_WRITE: BIO_snprintf(p, left, "write return %d processed: %zu\n", ret, l); break; case BIO_CB_RETURN | BIO_CB_GETS: BIO_snprintf(p, left, "gets return %d processed: %zu\n", ret, l); break; case BIO_CB_RETURN | BIO_CB_PUTS: BIO_snprintf(p, left, "puts return %d processed: %zu\n", ret, l); break; case BIO_CB_RETURN | BIO_CB_CTRL: BIO_snprintf(p, left, "ctrl return %d\n", ret); break; case BIO_CB_RETURN | BIO_CB_RECVMMSG: BIO_snprintf(p, left, "recvmmsg processed: %zu\n", len); ret_ = (long)len; break; case BIO_CB_RETURN | BIO_CB_SENDMMSG: BIO_snprintf(p, left, "sendmmsg processed: %zu\n", len); ret_ = (long)len; break; default: BIO_snprintf(p, left, "bio callback - unknown type (%d)\n", cmd); break; } b = (BIO *)bio->cb_arg; if (b != NULL) BIO_write(b, buf, strlen(buf)); #if !defined(OPENSSL_NO_STDIO) else fputs(buf, stderr); #endif return ret_; } #ifndef OPENSSL_NO_DEPRECATED_3_0 long BIO_debug_callback(BIO *bio, int cmd, const char *argp, int argi, long argl, long ret) { size_t processed = 0; if (ret > 0) processed = (size_t)ret; BIO_debug_callback_ex(bio, cmd, argp, (size_t)argi, argi, argl, ret > 0 ? 1 : (int)ret, &processed); return ret; } #endif
bio
openssl/crypto/bio/bio_cb.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #if defined(OPENSSL_NO_POSIX_IO) BIO *BIO_new_fd(int fd, int close_flag) { return NULL; } int BIO_fd_non_fatal_error(int err) { return 0; } int BIO_fd_should_retry(int i) { return 0; } const BIO_METHOD *BIO_s_fd(void) { return NULL; } #else static int fd_write(BIO *h, const char *buf, int num); static int fd_read(BIO *h, char *buf, int size); static int fd_puts(BIO *h, const char *str); static int fd_gets(BIO *h, char *buf, int size); static long fd_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int fd_new(BIO *h); static int fd_free(BIO *data); int BIO_fd_should_retry(int s); static const BIO_METHOD methods_fdp = { BIO_TYPE_FD, "file descriptor", bwrite_conv, fd_write, bread_conv, fd_read, fd_puts, fd_gets, fd_ctrl, fd_new, fd_free, NULL, }; const BIO_METHOD *BIO_s_fd(void) { return &methods_fdp; } BIO *BIO_new_fd(int fd, int close_flag) { BIO *ret; ret = BIO_new(BIO_s_fd()); if (ret == NULL) return NULL; BIO_set_fd(ret, fd, close_flag); return ret; } static int fd_new(BIO *bi) { bi->init = 0; bi->num = -1; bi->ptr = NULL; bi->flags = BIO_FLAGS_UPLINK_INTERNAL; return 1; } static int fd_free(BIO *a) { if (a == NULL) return 0; if (a->shutdown) { if (a->init) { UP_close(a->num); } a->init = 0; a->flags = BIO_FLAGS_UPLINK_INTERNAL; } return 1; } static int fd_read(BIO *b, char *out, int outl) { int ret = 0; if (out != NULL) { clear_sys_error(); ret = UP_read(b->num, out, outl); BIO_clear_retry_flags(b); if (ret <= 0) { if (BIO_fd_should_retry(ret)) BIO_set_retry_read(b); else if (ret == 0) b->flags |= BIO_FLAGS_IN_EOF; } } return ret; } static int fd_write(BIO *b, const char *in, int inl) { int ret; clear_sys_error(); ret = UP_write(b->num, in, inl); BIO_clear_retry_flags(b); if (ret <= 0) { if (BIO_fd_should_retry(ret)) BIO_set_retry_write(b); } return ret; } static long fd_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 1; int *ip; switch (cmd) { case BIO_CTRL_RESET: num = 0; case BIO_C_FILE_SEEK: ret = (long)UP_lseek(b->num, num, 0); break; case BIO_C_FILE_TELL: case BIO_CTRL_INFO: ret = (long)UP_lseek(b->num, 0, 1); break; case BIO_C_SET_FD: fd_free(b); b->num = *((int *)ptr); b->shutdown = (int)num; b->init = 1; break; case BIO_C_GET_FD: if (b->init) { ip = (int *)ptr; if (ip != NULL) *ip = b->num; ret = b->num; } else ret = -1; break; case BIO_CTRL_GET_CLOSE: ret = b->shutdown; break; case BIO_CTRL_SET_CLOSE: b->shutdown = (int)num; break; case BIO_CTRL_PENDING: case BIO_CTRL_WPENDING: ret = 0; break; case BIO_CTRL_DUP: case BIO_CTRL_FLUSH: ret = 1; break; case BIO_CTRL_EOF: ret = (b->flags & BIO_FLAGS_IN_EOF) != 0; break; default: ret = 0; break; } return ret; } static int fd_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = fd_write(bp, str, n); return ret; } static int fd_gets(BIO *bp, char *buf, int size) { int ret = 0; char *ptr = buf; char *end = buf + size - 1; while (ptr < end && fd_read(bp, ptr, 1) > 0) { if (*ptr++ == '\n') break; } ptr[0] = '\0'; if (buf[0] != '\0') ret = strlen(buf); return ret; } int BIO_fd_should_retry(int i) { int err; if ((i == 0) || (i == -1)) { err = get_last_sys_error(); return BIO_fd_non_fatal_error(err); } return 0; } int BIO_fd_non_fatal_error(int err) { switch (err) { # ifdef EWOULDBLOCK # ifdef WSAEWOULDBLOCK # if WSAEWOULDBLOCK != EWOULDBLOCK case EWOULDBLOCK: # endif # else case EWOULDBLOCK: # endif # endif # if defined(ENOTCONN) case ENOTCONN: # endif # ifdef EINTR case EINTR: # endif # ifdef EAGAIN # if EWOULDBLOCK != EAGAIN case EAGAIN: # endif # endif # ifdef EPROTO case EPROTO: # endif # ifdef EINPROGRESS case EINPROGRESS: # endif # ifdef EALREADY case EALREADY: # endif return 1; default: break; } return 0; } #endif
bio
openssl/crypto/bio/bss_fd.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" #include <openssl/evp.h> static int linebuffer_write(BIO *h, const char *buf, int num); static int linebuffer_read(BIO *h, char *buf, int size); static int linebuffer_puts(BIO *h, const char *str); static int linebuffer_gets(BIO *h, char *str, int size); static long linebuffer_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int linebuffer_new(BIO *h); static int linebuffer_free(BIO *data); static long linebuffer_callback_ctrl(BIO *h, int cmd, BIO_info_cb *fp); #define DEFAULT_LINEBUFFER_SIZE 1024*10 static const BIO_METHOD methods_linebuffer = { BIO_TYPE_LINEBUFFER, "linebuffer", bwrite_conv, linebuffer_write, bread_conv, linebuffer_read, linebuffer_puts, linebuffer_gets, linebuffer_ctrl, linebuffer_new, linebuffer_free, linebuffer_callback_ctrl, }; const BIO_METHOD *BIO_f_linebuffer(void) { return &methods_linebuffer; } typedef struct bio_linebuffer_ctx_struct { char *obuf; int obuf_size; int obuf_len; } BIO_LINEBUFFER_CTX; static int linebuffer_new(BIO *bi) { BIO_LINEBUFFER_CTX *ctx; if ((ctx = OPENSSL_malloc(sizeof(*ctx))) == NULL) return 0; ctx->obuf = OPENSSL_malloc(DEFAULT_LINEBUFFER_SIZE); if (ctx->obuf == NULL) { OPENSSL_free(ctx); return 0; } ctx->obuf_size = DEFAULT_LINEBUFFER_SIZE; ctx->obuf_len = 0; bi->init = 1; bi->ptr = (char *)ctx; bi->flags = 0; return 1; } static int linebuffer_free(BIO *a) { BIO_LINEBUFFER_CTX *b; if (a == NULL) return 0; b = (BIO_LINEBUFFER_CTX *)a->ptr; OPENSSL_free(b->obuf); OPENSSL_free(a->ptr); a->ptr = NULL; a->init = 0; a->flags = 0; return 1; } static int linebuffer_read(BIO *b, char *out, int outl) { int ret = 0; if (out == NULL) return 0; if (b->next_bio == NULL) return 0; ret = BIO_read(b->next_bio, out, outl); BIO_clear_retry_flags(b); BIO_copy_next_retry(b); return ret; } static int linebuffer_write(BIO *b, const char *in, int inl) { int i, num = 0, foundnl; BIO_LINEBUFFER_CTX *ctx; if ((in == NULL) || (inl <= 0)) return 0; ctx = (BIO_LINEBUFFER_CTX *)b->ptr; if ((ctx == NULL) || (b->next_bio == NULL)) return 0; BIO_clear_retry_flags(b); do { const char *p; char c; for (p = in, c = '\0'; p < in + inl && (c = *p) != '\n'; p++) ; if (c == '\n') { p++; foundnl = 1; } else foundnl = 0; while ((foundnl || p - in > ctx->obuf_size - ctx->obuf_len) && ctx->obuf_len > 0) { int orig_olen = ctx->obuf_len; i = ctx->obuf_size - ctx->obuf_len; if (p - in > 0) { if (i >= p - in) { memcpy(&(ctx->obuf[ctx->obuf_len]), in, p - in); ctx->obuf_len += p - in; inl -= p - in; num += p - in; in = p; } else { memcpy(&(ctx->obuf[ctx->obuf_len]), in, i); ctx->obuf_len += i; inl -= i; in += i; num += i; } } i = BIO_write(b->next_bio, ctx->obuf, ctx->obuf_len); if (i <= 0) { ctx->obuf_len = orig_olen; BIO_copy_next_retry(b); if (i < 0) return ((num > 0) ? num : i); if (i == 0) return num; } if (i < ctx->obuf_len) memmove(ctx->obuf, ctx->obuf + i, ctx->obuf_len - i); ctx->obuf_len -= i; } if ((foundnl || p - in > ctx->obuf_size) && p - in > 0) { i = BIO_write(b->next_bio, in, p - in); if (i <= 0) { BIO_copy_next_retry(b); if (i < 0) return ((num > 0) ? num : i); if (i == 0) return num; } num += i; in += i; inl -= i; } } while (foundnl && inl > 0); if (inl > 0) { memcpy(&(ctx->obuf[ctx->obuf_len]), in, inl); ctx->obuf_len += inl; num += inl; } return num; } static long linebuffer_ctrl(BIO *b, int cmd, long num, void *ptr) { BIO *dbio; BIO_LINEBUFFER_CTX *ctx; long ret = 1; char *p; int r; int obs; ctx = (BIO_LINEBUFFER_CTX *)b->ptr; switch (cmd) { case BIO_CTRL_RESET: ctx->obuf_len = 0; if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); break; case BIO_CTRL_INFO: ret = (long)ctx->obuf_len; break; case BIO_CTRL_WPENDING: ret = (long)ctx->obuf_len; if (ret == 0) { if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); } break; case BIO_C_SET_BUFF_SIZE: if (num > INT_MAX) return 0; obs = (int)num; p = ctx->obuf; if ((obs > DEFAULT_LINEBUFFER_SIZE) && (obs != ctx->obuf_size)) { p = OPENSSL_malloc((size_t)obs); if (p == NULL) return 0; } if (ctx->obuf != p) { if (ctx->obuf_len > obs) { ctx->obuf_len = obs; } memcpy(p, ctx->obuf, ctx->obuf_len); OPENSSL_free(ctx->obuf); ctx->obuf = p; ctx->obuf_size = obs; } break; case BIO_C_DO_STATE_MACHINE: if (b->next_bio == NULL) return 0; BIO_clear_retry_flags(b); ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; case BIO_CTRL_FLUSH: if (b->next_bio == NULL) return 0; if (ctx->obuf_len <= 0) { ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; } for (;;) { BIO_clear_retry_flags(b); if (ctx->obuf_len > 0) { r = BIO_write(b->next_bio, ctx->obuf, ctx->obuf_len); BIO_copy_next_retry(b); if (r <= 0) return (long)r; if (r < ctx->obuf_len) memmove(ctx->obuf, ctx->obuf + r, ctx->obuf_len - r); ctx->obuf_len -= r; } else { ctx->obuf_len = 0; break; } } ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; case BIO_CTRL_DUP: dbio = (BIO *)ptr; if (BIO_set_write_buffer_size(dbio, ctx->obuf_size) <= 0) ret = 0; break; default: if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); break; } return ret; } static long linebuffer_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { if (b->next_bio == NULL) return 0; return BIO_callback_ctrl(b->next_bio, cmd, fp); } static int linebuffer_gets(BIO *b, char *buf, int size) { if (b->next_bio == NULL) return 0; return BIO_gets(b->next_bio, buf, size); } static int linebuffer_puts(BIO *b, const char *str) { return linebuffer_write(b, str, strlen(str)); }
bio
openssl/crypto/bio/bf_lbuf.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" #define DEFAULT_BUFFER_SIZE 4096 static int readbuffer_write(BIO *h, const char *buf, int num); static int readbuffer_read(BIO *h, char *buf, int size); static int readbuffer_puts(BIO *h, const char *str); static int readbuffer_gets(BIO *h, char *str, int size); static long readbuffer_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int readbuffer_new(BIO *h); static int readbuffer_free(BIO *data); static long readbuffer_callback_ctrl(BIO *h, int cmd, BIO_info_cb *fp); static const BIO_METHOD methods_readbuffer = { BIO_TYPE_BUFFER, "readbuffer", bwrite_conv, readbuffer_write, bread_conv, readbuffer_read, readbuffer_puts, readbuffer_gets, readbuffer_ctrl, readbuffer_new, readbuffer_free, readbuffer_callback_ctrl, }; const BIO_METHOD *BIO_f_readbuffer(void) { return &methods_readbuffer; } static int readbuffer_new(BIO *bi) { BIO_F_BUFFER_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return 0; ctx->ibuf_size = DEFAULT_BUFFER_SIZE; ctx->ibuf = OPENSSL_zalloc(DEFAULT_BUFFER_SIZE); if (ctx->ibuf == NULL) { OPENSSL_free(ctx); return 0; } bi->init = 1; bi->ptr = (char *)ctx; bi->flags = 0; return 1; } static int readbuffer_free(BIO *a) { BIO_F_BUFFER_CTX *b; if (a == NULL) return 0; b = (BIO_F_BUFFER_CTX *)a->ptr; OPENSSL_free(b->ibuf); OPENSSL_free(a->ptr); a->ptr = NULL; a->init = 0; a->flags = 0; return 1; } static int readbuffer_resize(BIO_F_BUFFER_CTX *ctx, int sz) { char *tmp; sz += (ctx->ibuf_off + DEFAULT_BUFFER_SIZE - 1); sz = DEFAULT_BUFFER_SIZE * (sz / DEFAULT_BUFFER_SIZE); if (sz > ctx->ibuf_size) { tmp = OPENSSL_realloc(ctx->ibuf, sz); if (tmp == NULL) return 0; ctx->ibuf = tmp; ctx->ibuf_size = sz; } return 1; } static int readbuffer_read(BIO *b, char *out, int outl) { int i, num = 0; BIO_F_BUFFER_CTX *ctx; if (out == NULL || outl == 0) return 0; ctx = (BIO_F_BUFFER_CTX *)b->ptr; if ((ctx == NULL) || (b->next_bio == NULL)) return 0; BIO_clear_retry_flags(b); for (;;) { i = ctx->ibuf_len; if (i != 0) { if (i > outl) i = outl; memcpy(out, &(ctx->ibuf[ctx->ibuf_off]), i); ctx->ibuf_off += i; ctx->ibuf_len -= i; num += i; if (outl == i) return num; outl -= i; out += i; } if (!readbuffer_resize(ctx, outl)) return 0; i = BIO_read(b->next_bio, ctx->ibuf + ctx->ibuf_off, outl); if (i <= 0) { BIO_copy_next_retry(b); if (i < 0) return ((num > 0) ? num : i); else return num; } ctx->ibuf_len = i; } } static int readbuffer_write(BIO *b, const char *in, int inl) { return 0; } static int readbuffer_puts(BIO *b, const char *str) { return 0; } static long readbuffer_ctrl(BIO *b, int cmd, long num, void *ptr) { BIO_F_BUFFER_CTX *ctx; long ret = 1, sz; ctx = (BIO_F_BUFFER_CTX *)b->ptr; switch (cmd) { case BIO_CTRL_EOF: if (ctx->ibuf_len > 0) return 0; if (b->next_bio == NULL) return 1; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); break; case BIO_C_FILE_SEEK: case BIO_CTRL_RESET: sz = ctx->ibuf_off + ctx->ibuf_len; if (num < 0 || num > sz) return 0; ctx->ibuf_off = num; ctx->ibuf_len = sz - num; break; case BIO_C_FILE_TELL: case BIO_CTRL_INFO: ret = (long)ctx->ibuf_off; break; case BIO_CTRL_PENDING: ret = (long)ctx->ibuf_len; if (ret == 0) { if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); } break; case BIO_CTRL_DUP: case BIO_CTRL_FLUSH: ret = 1; break; default: ret = 0; break; } return ret; } static long readbuffer_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { if (b->next_bio == NULL) return 0; return BIO_callback_ctrl(b->next_bio, cmd, fp); } static int readbuffer_gets(BIO *b, char *buf, int size) { BIO_F_BUFFER_CTX *ctx; int num = 0, num_chars, found_newline; char *p; int i, j; if (size == 0) return 0; --size; ctx = (BIO_F_BUFFER_CTX *)b->ptr; BIO_clear_retry_flags(b); if (ctx->ibuf_len > 0) { p = ctx->ibuf + ctx->ibuf_off; found_newline = 0; for (num_chars = 0; (num_chars < ctx->ibuf_len) && (num_chars < size); num_chars++) { *buf++ = p[num_chars]; if (p[num_chars] == '\n') { found_newline = 1; num_chars++; break; } } num += num_chars; size -= num_chars; ctx->ibuf_len -= num_chars; ctx->ibuf_off += num_chars; if (found_newline || size == 0) { *buf = '\0'; return num; } } if (!readbuffer_resize(ctx, 1 + size)) return 0; p = ctx->ibuf + ctx->ibuf_off; for (i = 0; i < size; ++i) { j = BIO_read(b->next_bio, p, 1); if (j <= 0) { BIO_copy_next_retry(b); *buf = '\0'; return num > 0 ? num : j; } *buf++ = *p; num++; ctx->ibuf_off++; if (*p == '\n') break; ++p; } *buf = '\0'; return num; }
bio
openssl/crypto/bio/bf_readbuff.c
openssl
#include <stdio.h> #include <string.h> #include <errno.h> #include "bio_local.h" static int prefix_write(BIO *b, const char *out, size_t outl, size_t *numwritten); static int prefix_read(BIO *b, char *buf, size_t size, size_t *numread); static int prefix_puts(BIO *b, const char *str); static int prefix_gets(BIO *b, char *str, int size); static long prefix_ctrl(BIO *b, int cmd, long arg1, void *arg2); static int prefix_create(BIO *b); static int prefix_destroy(BIO *b); static long prefix_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp); static const BIO_METHOD prefix_meth = { BIO_TYPE_BUFFER, "prefix", prefix_write, NULL, prefix_read, NULL, prefix_puts, prefix_gets, prefix_ctrl, prefix_create, prefix_destroy, prefix_callback_ctrl, }; const BIO_METHOD *BIO_f_prefix(void) { return &prefix_meth; } typedef struct prefix_ctx_st { char *prefix; unsigned int indent; int linestart; } PREFIX_CTX; static int prefix_create(BIO *b) { PREFIX_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return 0; ctx->prefix = NULL; ctx->indent = 0; ctx->linestart = 1; BIO_set_data(b, ctx); BIO_set_init(b, 1); return 1; } static int prefix_destroy(BIO *b) { PREFIX_CTX *ctx = BIO_get_data(b); OPENSSL_free(ctx->prefix); OPENSSL_free(ctx); return 1; } static int prefix_read(BIO *b, char *in, size_t size, size_t *numread) { return BIO_read_ex(BIO_next(b), in, size, numread); } static int prefix_write(BIO *b, const char *out, size_t outl, size_t *numwritten) { PREFIX_CTX *ctx = BIO_get_data(b); if (ctx == NULL) return 0; if ((ctx->prefix == NULL || *ctx->prefix == '\0') && ctx->indent == 0) { if (outl > 0) ctx->linestart = (out[outl-1] == '\n'); return BIO_write_ex(BIO_next(b), out, outl, numwritten); } *numwritten = 0; while (outl > 0) { size_t i; char c; if (ctx->linestart) { size_t dontcare; if (ctx->prefix != NULL && !BIO_write_ex(BIO_next(b), ctx->prefix, strlen(ctx->prefix), &dontcare)) return 0; BIO_printf(BIO_next(b), "%*s", ctx->indent, ""); ctx->linestart = 0; } for (i = 0, c = '\0'; i < outl && (c = out[i]) != '\n'; i++) continue; if (c == '\n') i++; while (i > 0) { size_t num = 0; if (!BIO_write_ex(BIO_next(b), out, i, &num)) return 0; out += num; outl -= num; *numwritten += num; i -= num; } if (c == '\n') ctx->linestart = 1; } return 1; } static long prefix_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 0; PREFIX_CTX *ctx; if (b == NULL || (ctx = BIO_get_data(b)) == NULL) return -1; switch (cmd) { case BIO_CTRL_SET_PREFIX: OPENSSL_free(ctx->prefix); if (ptr == NULL) { ctx->prefix = NULL; ret = 1; } else { ctx->prefix = OPENSSL_strdup((const char *)ptr); ret = ctx->prefix != NULL; } break; case BIO_CTRL_SET_INDENT: if (num >= 0) { ctx->indent = (unsigned int)num; ret = 1; } break; case BIO_CTRL_GET_INDENT: ret = (long)ctx->indent; break; default: switch (cmd) { case BIO_C_FILE_SEEK: case BIO_CTRL_RESET: ctx->linestart = 1; break; } if (BIO_next(b) != NULL) ret = BIO_ctrl(BIO_next(b), cmd, num, ptr); break; } return ret; } static long prefix_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { return BIO_callback_ctrl(BIO_next(b), cmd, fp); } static int prefix_gets(BIO *b, char *buf, int size) { return BIO_gets(BIO_next(b), buf, size); } static int prefix_puts(BIO *b, const char *str) { return BIO_write(b, str, strlen(str)); }
bio
openssl/crypto/bio/bf_prefix.c
openssl
#include <stdio.h> #include <stdlib.h> #include <errno.h> #include "bio_local.h" #include "internal/ktls.h" #include "internal/bio_tfo.h" #include <openssl/err.h> #ifndef OPENSSL_NO_SOCK # ifdef SO_MAXCONN # define MAX_LISTEN SO_MAXCONN # elif defined(SOMAXCONN) # define MAX_LISTEN SOMAXCONN # else # define MAX_LISTEN 32 # endif int BIO_socket(int domain, int socktype, int protocol, int options) { int sock = -1; if (BIO_sock_init() != 1) return INVALID_SOCKET; sock = socket(domain, socktype, protocol); if (sock == -1) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling socket()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_CREATE_SOCKET); return INVALID_SOCKET; } return sock; } int BIO_connect(int sock, const BIO_ADDR *addr, int options) { const int on = 1; if (sock == -1) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_SOCKET); return 0; } if (!BIO_socket_nbio(sock, (options & BIO_SOCK_NONBLOCK) != 0)) return 0; if (options & BIO_SOCK_KEEPALIVE) { if (setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE, (const void *)&on, sizeof(on)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_KEEPALIVE); return 0; } } if (options & BIO_SOCK_NODELAY) { if (setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (const void *)&on, sizeof(on)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_NODELAY); return 0; } } if (options & BIO_SOCK_TFO) { # if defined(OSSL_TFO_CLIENT_FLAG) # if defined(OSSL_TFO_SYSCTL_CLIENT) int enabled = 0; size_t enabledlen = sizeof(enabled); if (sysctlbyname(OSSL_TFO_SYSCTL_CLIENT, &enabled, &enabledlen, NULL, 0) < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_NO_KERNEL_SUPPORT); return 0; } if (!(enabled & OSSL_TFO_CLIENT_FLAG)) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_DISABLED); return 0; } # elif defined(OSSL_TFO_SYSCTL) int enabled = 0; size_t enabledlen = sizeof(enabled); if (sysctlbyname(OSSL_TFO_SYSCTL, &enabled, &enabledlen, NULL, 0) < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_NO_KERNEL_SUPPORT); return 0; } if (!(enabled & OSSL_TFO_CLIENT_FLAG)) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_DISABLED); return 0; } # endif # endif # if defined(OSSL_TFO_CONNECTX) sa_endpoints_t sae; memset(&sae, 0, sizeof(sae)); sae.sae_dstaddr = BIO_ADDR_sockaddr(addr); sae.sae_dstaddrlen = BIO_ADDR_sockaddr_size(addr); if (connectx(sock, &sae, SAE_ASSOCID_ANY, CONNECT_DATA_IDEMPOTENT | CONNECT_RESUME_ON_READ_WRITE, NULL, 0, NULL, NULL) == -1) { if (!BIO_sock_should_retry(-1)) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling connectx()"); ERR_raise(ERR_LIB_BIO, BIO_R_CONNECT_ERROR); } return 0; } # endif # if defined(OSSL_TFO_CLIENT_SOCKOPT) if (setsockopt(sock, IPPROTO_TCP, OSSL_TFO_CLIENT_SOCKOPT, (const void *)&on, sizeof(on)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_TFO); return 0; } # endif # if defined(OSSL_TFO_DO_NOT_CONNECT) return 1; # endif } if (connect(sock, BIO_ADDR_sockaddr(addr), BIO_ADDR_sockaddr_size(addr)) == -1) { if (!BIO_sock_should_retry(-1)) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling connect()"); ERR_raise(ERR_LIB_BIO, BIO_R_CONNECT_ERROR); } return 0; } # ifndef OPENSSL_NO_KTLS ktls_enable(sock); # endif return 1; } int BIO_bind(int sock, const BIO_ADDR *addr, int options) { # ifndef OPENSSL_SYS_WINDOWS int on = 1; # endif if (sock == -1) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_SOCKET); return 0; } # ifndef OPENSSL_SYS_WINDOWS if (options & BIO_SOCK_REUSEADDR) { if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (const void *)&on, sizeof(on)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_REUSEADDR); return 0; } } # endif if (bind(sock, BIO_ADDR_sockaddr(addr), BIO_ADDR_sockaddr_size(addr)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error() , "calling bind()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_BIND_SOCKET); return 0; } return 1; } int BIO_listen(int sock, const BIO_ADDR *addr, int options) { int on = 1; int socktype; socklen_t socktype_len = sizeof(socktype); if (sock == -1) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_SOCKET); return 0; } if (getsockopt(sock, SOL_SOCKET, SO_TYPE, (void *)&socktype, &socktype_len) != 0 || socktype_len != sizeof(socktype)) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_GETTING_SOCKTYPE); return 0; } if (!BIO_socket_nbio(sock, (options & BIO_SOCK_NONBLOCK) != 0)) return 0; if (options & BIO_SOCK_KEEPALIVE) { if (setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE, (const void *)&on, sizeof(on)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_KEEPALIVE); return 0; } } if (options & BIO_SOCK_NODELAY) { if (setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, (const void *)&on, sizeof(on)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_NODELAY); return 0; } } # if defined(IPV6_V6ONLY) && !defined(__OpenBSD__) if (BIO_ADDR_family(addr) == AF_INET6) { on = options & BIO_SOCK_V6_ONLY ? 1 : 0; if (setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, (const void *)&on, sizeof(on)) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_LISTEN_V6_ONLY); return 0; } } # endif if (!BIO_bind(sock, addr, options)) return 0; if (socktype != SOCK_DGRAM && listen(sock, MAX_LISTEN) == -1) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling listen()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_LISTEN_SOCKET); return 0; } # if defined(OSSL_TFO_SERVER_SOCKOPT) if ((options & BIO_SOCK_TFO) && socktype != SOCK_DGRAM) { int q = OSSL_TFO_SERVER_SOCKOPT_VALUE; # if defined(OSSL_TFO_CLIENT_FLAG) # if defined(OSSL_TFO_SYSCTL_SERVER) int enabled = 0; size_t enabledlen = sizeof(enabled); if (sysctlbyname(OSSL_TFO_SYSCTL_SERVER, &enabled, &enabledlen, NULL, 0) < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_NO_KERNEL_SUPPORT); return 0; } if (!(enabled & OSSL_TFO_SERVER_FLAG)) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_DISABLED); return 0; } # elif defined(OSSL_TFO_SYSCTL) int enabled = 0; size_t enabledlen = sizeof(enabled); if (sysctlbyname(OSSL_TFO_SYSCTL, &enabled, &enabledlen, NULL, 0) < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_NO_KERNEL_SUPPORT); return 0; } if (!(enabled & OSSL_TFO_SERVER_FLAG)) { ERR_raise(ERR_LIB_BIO, BIO_R_TFO_DISABLED); return 0; } # endif # endif if (setsockopt(sock, IPPROTO_TCP, OSSL_TFO_SERVER_SOCKOPT, (void *)&q, sizeof(q)) < 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); ERR_raise(ERR_LIB_BIO, BIO_R_UNABLE_TO_TFO); return 0; } } # endif return 1; } int BIO_accept_ex(int accept_sock, BIO_ADDR *addr_, int options) { socklen_t len; int accepted_sock; BIO_ADDR locaddr; BIO_ADDR *addr = addr_ == NULL ? &locaddr : addr_; len = sizeof(*addr); accepted_sock = accept(accept_sock, BIO_ADDR_sockaddr_noconst(addr), &len); if (accepted_sock == -1) { if (!BIO_sock_should_retry(accepted_sock)) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling accept()"); ERR_raise(ERR_LIB_BIO, BIO_R_ACCEPT_ERROR); } return INVALID_SOCKET; } if (!BIO_socket_nbio(accepted_sock, (options & BIO_SOCK_NONBLOCK) != 0)) { closesocket(accepted_sock); return INVALID_SOCKET; } return accepted_sock; } int BIO_closesocket(int sock) { if (sock < 0 || closesocket(sock) < 0) return 0; return 1; } #endif
bio
openssl/crypto/bio/bio_sock2.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" static int nullf_write(BIO *h, const char *buf, int num); static int nullf_read(BIO *h, char *buf, int size); static int nullf_puts(BIO *h, const char *str); static int nullf_gets(BIO *h, char *str, int size); static long nullf_ctrl(BIO *h, int cmd, long arg1, void *arg2); static long nullf_callback_ctrl(BIO *h, int cmd, BIO_info_cb *fp); static const BIO_METHOD methods_nullf = { BIO_TYPE_NULL_FILTER, "NULL filter", bwrite_conv, nullf_write, bread_conv, nullf_read, nullf_puts, nullf_gets, nullf_ctrl, NULL, NULL, nullf_callback_ctrl, }; const BIO_METHOD *BIO_f_null(void) { return &methods_nullf; } static int nullf_read(BIO *b, char *out, int outl) { int ret = 0; if (out == NULL) return 0; if (b->next_bio == NULL) return 0; ret = BIO_read(b->next_bio, out, outl); BIO_clear_retry_flags(b); BIO_copy_next_retry(b); return ret; } static int nullf_write(BIO *b, const char *in, int inl) { int ret = 0; if ((in == NULL) || (inl <= 0)) return 0; if (b->next_bio == NULL) return 0; ret = BIO_write(b->next_bio, in, inl); BIO_clear_retry_flags(b); BIO_copy_next_retry(b); return ret; } static long nullf_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret; if (b->next_bio == NULL) return 0; switch (cmd) { case BIO_C_DO_STATE_MACHINE: BIO_clear_retry_flags(b); ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; case BIO_CTRL_DUP: ret = 0L; break; default: ret = BIO_ctrl(b->next_bio, cmd, num, ptr); } return ret; } static long nullf_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { if (b->next_bio == NULL) return 0; return BIO_callback_ctrl(b->next_bio, cmd, fp); } static int nullf_gets(BIO *bp, char *buf, int size) { if (bp->next_bio == NULL) return 0; return BIO_gets(bp->next_bio, buf, size); } static int nullf_puts(BIO *bp, const char *str) { if (bp->next_bio == NULL) return 0; return BIO_puts(bp->next_bio, str); }
bio
openssl/crypto/bio/bf_null.c
openssl
#include <openssl/core.h> #include "bio_local.h" struct ossl_core_bio_st { CRYPTO_REF_COUNT ref_cnt; BIO *bio; }; static OSSL_CORE_BIO *core_bio_new(void) { OSSL_CORE_BIO *cb = OPENSSL_malloc(sizeof(*cb)); if (cb == NULL || !CRYPTO_NEW_REF(&cb->ref_cnt, 1)) { OPENSSL_free(cb); return NULL; } return cb; } int ossl_core_bio_up_ref(OSSL_CORE_BIO *cb) { int ref = 0; return CRYPTO_UP_REF(&cb->ref_cnt, &ref); } int ossl_core_bio_free(OSSL_CORE_BIO *cb) { int ref = 0, res = 1; if (cb != NULL) { CRYPTO_DOWN_REF(&cb->ref_cnt, &ref); if (ref <= 0) { res = BIO_free(cb->bio); CRYPTO_FREE_REF(&cb->ref_cnt); OPENSSL_free(cb); } } return res; } OSSL_CORE_BIO *ossl_core_bio_new_from_bio(BIO *bio) { OSSL_CORE_BIO *cb = core_bio_new(); if (cb == NULL || !BIO_up_ref(bio)) { ossl_core_bio_free(cb); return NULL; } cb->bio = bio; return cb; } static OSSL_CORE_BIO *core_bio_new_from_new_bio(BIO *bio) { OSSL_CORE_BIO *cb = NULL; if (bio == NULL) return NULL; if ((cb = core_bio_new()) == NULL) { BIO_free(bio); return NULL; } cb->bio = bio; return cb; } OSSL_CORE_BIO *ossl_core_bio_new_file(const char *filename, const char *mode) { return core_bio_new_from_new_bio(BIO_new_file(filename, mode)); } OSSL_CORE_BIO *ossl_core_bio_new_mem_buf(const void *buf, int len) { return core_bio_new_from_new_bio(BIO_new_mem_buf(buf, len)); } int ossl_core_bio_read_ex(OSSL_CORE_BIO *cb, void *data, size_t dlen, size_t *readbytes) { return BIO_read_ex(cb->bio, data, dlen, readbytes); } int ossl_core_bio_write_ex(OSSL_CORE_BIO *cb, const void *data, size_t dlen, size_t *written) { return BIO_write_ex(cb->bio, data, dlen, written); } int ossl_core_bio_gets(OSSL_CORE_BIO *cb, char *buf, int size) { return BIO_gets(cb->bio, buf, size); } int ossl_core_bio_puts(OSSL_CORE_BIO *cb, const char *buf) { return BIO_puts(cb->bio, buf); } long ossl_core_bio_ctrl(OSSL_CORE_BIO *cb, int cmd, long larg, void *parg) { return BIO_ctrl(cb->bio, cmd, larg, parg); } int ossl_core_bio_vprintf(OSSL_CORE_BIO *cb, const char *format, va_list args) { return BIO_vprintf(cb->bio, format, args); }
bio
openssl/crypto/bio/ossl_core_bio.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" static int null_write(BIO *h, const char *buf, int num); static int null_read(BIO *h, char *buf, int size); static int null_puts(BIO *h, const char *str); static int null_gets(BIO *h, char *str, int size); static long null_ctrl(BIO *h, int cmd, long arg1, void *arg2); static const BIO_METHOD null_method = { BIO_TYPE_NULL, "NULL", bwrite_conv, null_write, bread_conv, null_read, null_puts, null_gets, null_ctrl, NULL, NULL, NULL, }; const BIO_METHOD *BIO_s_null(void) { return &null_method; } static int null_read(BIO *b, char *out, int outl) { return 0; } static int null_write(BIO *b, const char *in, int inl) { return inl; } static long null_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 1; switch (cmd) { case BIO_CTRL_RESET: case BIO_CTRL_EOF: case BIO_CTRL_SET: case BIO_CTRL_SET_CLOSE: case BIO_CTRL_FLUSH: case BIO_CTRL_DUP: ret = 1; break; case BIO_CTRL_GET_CLOSE: case BIO_CTRL_INFO: case BIO_CTRL_GET: case BIO_CTRL_PENDING: case BIO_CTRL_WPENDING: default: ret = 0; break; } return ret; } static int null_gets(BIO *bp, char *buf, int size) { return 0; } static int null_puts(BIO *bp, const char *str) { if (str == NULL) return 0; return strlen(str); }
bio
openssl/crypto/bio/bss_null.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <stdio.h> #include <errno.h> #include <openssl/crypto.h> #include "internal/numbers.h" #include "bio_local.h" #define HAS_LEN_OPER(o) ((o) == BIO_CB_READ || (o) == BIO_CB_WRITE \ || (o) == BIO_CB_GETS) #ifndef OPENSSL_NO_DEPRECATED_3_0 # define HAS_CALLBACK(b) ((b)->callback != NULL || (b)->callback_ex != NULL) #else # define HAS_CALLBACK(b) ((b)->callback_ex != NULL) #endif static long bio_call_callback(BIO *b, int oper, const char *argp, size_t len, int argi, long argl, long inret, size_t *processed) { long ret = inret; #ifndef OPENSSL_NO_DEPRECATED_3_0 int bareoper; if (b->callback_ex != NULL) #endif return b->callback_ex(b, oper, argp, len, argi, argl, inret, processed); #ifndef OPENSSL_NO_DEPRECATED_3_0 bareoper = oper & ~BIO_CB_RETURN; if (HAS_LEN_OPER(bareoper)) { if (len > INT_MAX) return -1; argi = (int)len; } if (inret > 0 && (oper & BIO_CB_RETURN) && bareoper != BIO_CB_CTRL) { if (*processed > INT_MAX) return -1; inret = *processed; } ret = b->callback(b, oper, argp, argi, argl, inret); if (ret > 0 && (oper & BIO_CB_RETURN) && bareoper != BIO_CB_CTRL) { *processed = (size_t)ret; ret = 1; } #endif return ret; } BIO *BIO_new_ex(OSSL_LIB_CTX *libctx, const BIO_METHOD *method) { BIO *bio = OPENSSL_zalloc(sizeof(*bio)); if (bio == NULL) return NULL; bio->libctx = libctx; bio->method = method; bio->shutdown = 1; if (!CRYPTO_NEW_REF(&bio->references, 1)) goto err; if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_BIO, bio, &bio->ex_data)) goto err; if (method->create != NULL && !method->create(bio)) { ERR_raise(ERR_LIB_BIO, ERR_R_INIT_FAIL); CRYPTO_free_ex_data(CRYPTO_EX_INDEX_BIO, bio, &bio->ex_data); goto err; } if (method->create == NULL) bio->init = 1; return bio; err: CRYPTO_FREE_REF(&bio->references); OPENSSL_free(bio); return NULL; } BIO *BIO_new(const BIO_METHOD *method) { return BIO_new_ex(NULL, method); } int BIO_free(BIO *a) { int ret; if (a == NULL) return 0; if (CRYPTO_DOWN_REF(&a->references, &ret) <= 0) return 0; REF_PRINT_COUNT("BIO", a); if (ret > 0) return 1; REF_ASSERT_ISNT(ret < 0); if (HAS_CALLBACK(a)) { ret = (int)bio_call_callback(a, BIO_CB_FREE, NULL, 0, 0, 0L, 1L, NULL); if (ret <= 0) return 0; } if ((a->method != NULL) && (a->method->destroy != NULL)) a->method->destroy(a); CRYPTO_free_ex_data(CRYPTO_EX_INDEX_BIO, a, &a->ex_data); CRYPTO_FREE_REF(&a->references); OPENSSL_free(a); return 1; } void BIO_set_data(BIO *a, void *ptr) { a->ptr = ptr; } void *BIO_get_data(BIO *a) { return a->ptr; } void BIO_set_init(BIO *a, int init) { a->init = init; } int BIO_get_init(BIO *a) { return a->init; } void BIO_set_shutdown(BIO *a, int shut) { a->shutdown = shut; } int BIO_get_shutdown(BIO *a) { return a->shutdown; } void BIO_vfree(BIO *a) { BIO_free(a); } int BIO_up_ref(BIO *a) { int i; if (CRYPTO_UP_REF(&a->references, &i) <= 0) return 0; REF_PRINT_COUNT("BIO", a); REF_ASSERT_ISNT(i < 2); return i > 1; } void BIO_clear_flags(BIO *b, int flags) { b->flags &= ~flags; } int BIO_test_flags(const BIO *b, int flags) { return (b->flags & flags); } void BIO_set_flags(BIO *b, int flags) { b->flags |= flags; } #ifndef OPENSSL_NO_DEPRECATED_3_0 BIO_callback_fn BIO_get_callback(const BIO *b) { return b->callback; } void BIO_set_callback(BIO *b, BIO_callback_fn cb) { b->callback = cb; } #endif BIO_callback_fn_ex BIO_get_callback_ex(const BIO *b) { return b->callback_ex; } void BIO_set_callback_ex(BIO *b, BIO_callback_fn_ex cb) { b->callback_ex = cb; } void BIO_set_callback_arg(BIO *b, char *arg) { b->cb_arg = arg; } char *BIO_get_callback_arg(const BIO *b) { return b->cb_arg; } const char *BIO_method_name(const BIO *b) { return b->method->name; } int BIO_method_type(const BIO *b) { return b->method->type; } static int bio_read_intern(BIO *b, void *data, size_t dlen, size_t *readbytes) { int ret; if (b == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return -1; } if (b->method == NULL || b->method->bread == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return -2; } if (HAS_CALLBACK(b) && ((ret = (int)bio_call_callback(b, BIO_CB_READ, data, dlen, 0, 0L, 1L, NULL)) <= 0)) return ret; if (!b->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -1; } ret = b->method->bread(b, data, dlen, readbytes); if (ret > 0) b->num_read += (uint64_t)*readbytes; if (HAS_CALLBACK(b)) ret = (int)bio_call_callback(b, BIO_CB_READ | BIO_CB_RETURN, data, dlen, 0, 0L, ret, readbytes); if (ret > 0 && *readbytes > dlen) { ERR_raise(ERR_LIB_BIO, ERR_R_INTERNAL_ERROR); return -1; } return ret; } int BIO_read(BIO *b, void *data, int dlen) { size_t readbytes; int ret; if (dlen < 0) return 0; ret = bio_read_intern(b, data, (size_t)dlen, &readbytes); if (ret > 0) { ret = (int)readbytes; } return ret; } int BIO_read_ex(BIO *b, void *data, size_t dlen, size_t *readbytes) { return bio_read_intern(b, data, dlen, readbytes) > 0; } static int bio_write_intern(BIO *b, const void *data, size_t dlen, size_t *written) { size_t local_written; int ret; if (written != NULL) *written = 0; if (b == NULL) return 0; if (b->method == NULL || b->method->bwrite == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return -2; } if (HAS_CALLBACK(b) && ((ret = (int)bio_call_callback(b, BIO_CB_WRITE, data, dlen, 0, 0L, 1L, NULL)) <= 0)) return ret; if (!b->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -1; } ret = b->method->bwrite(b, data, dlen, &local_written); if (ret > 0) b->num_write += (uint64_t)local_written; if (HAS_CALLBACK(b)) ret = (int)bio_call_callback(b, BIO_CB_WRITE | BIO_CB_RETURN, data, dlen, 0, 0L, ret, &local_written); if (written != NULL) *written = local_written; return ret; } int BIO_write(BIO *b, const void *data, int dlen) { size_t written; int ret; if (dlen <= 0) return 0; ret = bio_write_intern(b, data, (size_t)dlen, &written); if (ret > 0) { ret = (int)written; } return ret; } int BIO_write_ex(BIO *b, const void *data, size_t dlen, size_t *written) { return bio_write_intern(b, data, dlen, written) > 0 || (b != NULL && dlen == 0); } int BIO_sendmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *msgs_processed) { size_t ret; BIO_MMSG_CB_ARGS args; if (b == NULL) { *msgs_processed = 0; ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return 0; } if (b->method == NULL || b->method->bsendmmsg == NULL) { *msgs_processed = 0; ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return 0; } if (HAS_CALLBACK(b)) { args.msg = msg; args.stride = stride; args.num_msg = num_msg; args.flags = flags; args.msgs_processed = msgs_processed; ret = (size_t)bio_call_callback(b, BIO_CB_SENDMMSG, (void *)&args, 0, 0, 0, 1, NULL); if (ret <= 0) return 0; } if (!b->init) { *msgs_processed = 0; ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return 0; } ret = b->method->bsendmmsg(b, msg, stride, num_msg, flags, msgs_processed); if (HAS_CALLBACK(b)) ret = (size_t)bio_call_callback(b, BIO_CB_SENDMMSG | BIO_CB_RETURN, (void *)&args, ret, 0, 0, ret, NULL); return ret; } int BIO_recvmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *msgs_processed) { size_t ret; BIO_MMSG_CB_ARGS args; if (b == NULL) { *msgs_processed = 0; ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return 0; } if (b->method == NULL || b->method->brecvmmsg == NULL) { *msgs_processed = 0; ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return 0; } if (HAS_CALLBACK(b)) { args.msg = msg; args.stride = stride; args.num_msg = num_msg; args.flags = flags; args.msgs_processed = msgs_processed; ret = bio_call_callback(b, BIO_CB_RECVMMSG, (void *)&args, 0, 0, 0, 1, NULL); if (ret <= 0) return 0; } if (!b->init) { *msgs_processed = 0; ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return 0; } ret = b->method->brecvmmsg(b, msg, stride, num_msg, flags, msgs_processed); if (HAS_CALLBACK(b)) ret = (size_t)bio_call_callback(b, BIO_CB_RECVMMSG | BIO_CB_RETURN, (void *)&args, ret, 0, 0, ret, NULL); return ret; } int BIO_get_rpoll_descriptor(BIO *b, BIO_POLL_DESCRIPTOR *desc) { return BIO_ctrl(b, BIO_CTRL_GET_RPOLL_DESCRIPTOR, 0, desc); } int BIO_get_wpoll_descriptor(BIO *b, BIO_POLL_DESCRIPTOR *desc) { return BIO_ctrl(b, BIO_CTRL_GET_WPOLL_DESCRIPTOR, 0, desc); } int BIO_puts(BIO *b, const char *buf) { int ret; size_t written = 0; if (b == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return -1; } if (b->method == NULL || b->method->bputs == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return -2; } if (HAS_CALLBACK(b)) { ret = (int)bio_call_callback(b, BIO_CB_PUTS, buf, 0, 0, 0L, 1L, NULL); if (ret <= 0) return ret; } if (!b->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -1; } ret = b->method->bputs(b, buf); if (ret > 0) { b->num_write += (uint64_t)ret; written = ret; ret = 1; } if (HAS_CALLBACK(b)) ret = (int)bio_call_callback(b, BIO_CB_PUTS | BIO_CB_RETURN, buf, 0, 0, 0L, ret, &written); if (ret > 0) { if (written > INT_MAX) { ERR_raise(ERR_LIB_BIO, BIO_R_LENGTH_TOO_LONG); ret = -1; } else { ret = (int)written; } } return ret; } int BIO_gets(BIO *b, char *buf, int size) { int ret; size_t readbytes = 0; if (b == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return -1; } if (b->method == NULL || b->method->bgets == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return -2; } if (size < 0) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT); return -1; } if (HAS_CALLBACK(b)) { ret = (int)bio_call_callback(b, BIO_CB_GETS, buf, size, 0, 0L, 1, NULL); if (ret <= 0) return ret; } if (!b->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -1; } ret = b->method->bgets(b, buf, size); if (ret > 0) { readbytes = ret; ret = 1; } if (HAS_CALLBACK(b)) ret = (int)bio_call_callback(b, BIO_CB_GETS | BIO_CB_RETURN, buf, size, 0, 0L, ret, &readbytes); if (ret > 0) { if (readbytes > (size_t)size) ret = -1; else ret = (int)readbytes; } return ret; } int BIO_get_line(BIO *bio, char *buf, int size) { int ret = 0; char *ptr = buf; if (buf == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return -1; } if (size <= 0) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT); return -1; } *buf = '\0'; if (bio == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return -1; } if (!bio->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -1; } while (size-- > 1 && (ret = BIO_read(bio, ptr, 1)) > 0) if (*ptr++ == '\n') break; *ptr = '\0'; return ret > 0 || BIO_eof(bio) ? ptr - buf : ret; } int BIO_indent(BIO *b, int indent, int max) { if (indent < 0) indent = 0; if (indent > max) indent = max; while (indent--) if (BIO_puts(b, " ") != 1) return 0; return 1; } long BIO_int_ctrl(BIO *b, int cmd, long larg, int iarg) { int i; i = iarg; return BIO_ctrl(b, cmd, larg, (char *)&i); } void *BIO_ptr_ctrl(BIO *b, int cmd, long larg) { void *p = NULL; if (BIO_ctrl(b, cmd, larg, (char *)&p) <= 0) return NULL; else return p; } long BIO_ctrl(BIO *b, int cmd, long larg, void *parg) { long ret; if (b == NULL) return -1; if (b->method == NULL || b->method->ctrl == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return -2; } if (HAS_CALLBACK(b)) { ret = bio_call_callback(b, BIO_CB_CTRL, parg, 0, cmd, larg, 1L, NULL); if (ret <= 0) return ret; } ret = b->method->ctrl(b, cmd, larg, parg); if (HAS_CALLBACK(b)) ret = bio_call_callback(b, BIO_CB_CTRL | BIO_CB_RETURN, parg, 0, cmd, larg, ret, NULL); return ret; } long BIO_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { long ret; if (b == NULL) return -2; if (b->method == NULL || b->method->callback_ctrl == NULL || cmd != BIO_CTRL_SET_CALLBACK) { ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); return -2; } if (HAS_CALLBACK(b)) { ret = bio_call_callback(b, BIO_CB_CTRL, (void *)&fp, 0, cmd, 0, 1L, NULL); if (ret <= 0) return ret; } ret = b->method->callback_ctrl(b, cmd, fp); if (HAS_CALLBACK(b)) ret = bio_call_callback(b, BIO_CB_CTRL | BIO_CB_RETURN, (void *)&fp, 0, cmd, 0, ret, NULL); return ret; } size_t BIO_ctrl_pending(BIO *bio) { long ret = BIO_ctrl(bio, BIO_CTRL_PENDING, 0, NULL); if (ret < 0) ret = 0; #if LONG_MAX > SIZE_MAX if (ret > SIZE_MAX) ret = SIZE_MAX; #endif return (size_t)ret; } size_t BIO_ctrl_wpending(BIO *bio) { long ret = BIO_ctrl(bio, BIO_CTRL_WPENDING, 0, NULL); if (ret < 0) ret = 0; #if LONG_MAX > SIZE_MAX if (ret > SIZE_MAX) ret = SIZE_MAX; #endif return (size_t)ret; } BIO *BIO_push(BIO *b, BIO *bio) { BIO *lb; if (b == NULL) return bio; lb = b; while (lb->next_bio != NULL) lb = lb->next_bio; lb->next_bio = bio; if (bio != NULL) bio->prev_bio = lb; BIO_ctrl(b, BIO_CTRL_PUSH, 0, lb); return b; } BIO *BIO_pop(BIO *b) { BIO *ret; if (b == NULL) return NULL; ret = b->next_bio; BIO_ctrl(b, BIO_CTRL_POP, 0, b); if (b->prev_bio != NULL) b->prev_bio->next_bio = b->next_bio; if (b->next_bio != NULL) b->next_bio->prev_bio = b->prev_bio; b->next_bio = NULL; b->prev_bio = NULL; return ret; } BIO *BIO_get_retry_BIO(BIO *bio, int *reason) { BIO *b, *last; b = last = bio; for (;;) { if (!BIO_should_retry(b)) break; last = b; b = b->next_bio; if (b == NULL) break; } if (reason != NULL) *reason = last->retry_reason; return last; } int BIO_get_retry_reason(BIO *bio) { return bio->retry_reason; } void BIO_set_retry_reason(BIO *bio, int reason) { bio->retry_reason = reason; } BIO *BIO_find_type(BIO *bio, int type) { int mt, mask; if (bio == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return NULL; } mask = type & BIO_TYPE_MASK; do { if (bio->method != NULL) { mt = bio->method->type; if (!mask) { if (mt & type) return bio; } else if (mt == type) { return bio; } } bio = bio->next_bio; } while (bio != NULL); return NULL; } BIO *BIO_next(BIO *b) { if (b == NULL) return NULL; return b->next_bio; } void BIO_set_next(BIO *b, BIO *next) { b->next_bio = next; } void BIO_free_all(BIO *bio) { BIO *b; int ref; while (bio != NULL) { b = bio; CRYPTO_GET_REF(&b->references, &ref); bio = bio->next_bio; BIO_free(b); if (ref > 1) break; } } BIO *BIO_dup_chain(BIO *in) { BIO *ret = NULL, *eoc = NULL, *bio, *new_bio; for (bio = in; bio != NULL; bio = bio->next_bio) { if ((new_bio = BIO_new(bio->method)) == NULL) goto err; #ifndef OPENSSL_NO_DEPRECATED_3_0 new_bio->callback = bio->callback; #endif new_bio->callback_ex = bio->callback_ex; new_bio->cb_arg = bio->cb_arg; new_bio->init = bio->init; new_bio->shutdown = bio->shutdown; new_bio->flags = bio->flags; new_bio->num = bio->num; if (BIO_dup_state(bio, (char *)new_bio) <= 0) { BIO_free(new_bio); goto err; } if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_BIO, &new_bio->ex_data, &bio->ex_data)) { BIO_free(new_bio); goto err; } if (ret == NULL) { eoc = new_bio; ret = eoc; } else { BIO_push(eoc, new_bio); eoc = new_bio; } } return ret; err: BIO_free_all(ret); return NULL; } void BIO_copy_next_retry(BIO *b) { BIO_set_flags(b, BIO_get_retry_flags(b->next_bio)); b->retry_reason = b->next_bio->retry_reason; } int BIO_set_ex_data(BIO *bio, int idx, void *data) { return CRYPTO_set_ex_data(&(bio->ex_data), idx, data); } void *BIO_get_ex_data(const BIO *bio, int idx) { return CRYPTO_get_ex_data(&(bio->ex_data), idx); } uint64_t BIO_number_read(BIO *bio) { if (bio) return bio->num_read; return 0; } uint64_t BIO_number_written(BIO *bio) { if (bio) return bio->num_write; return 0; } void bio_free_ex_data(BIO *bio) { CRYPTO_free_ex_data(CRYPTO_EX_INDEX_BIO, bio, &bio->ex_data); } void bio_cleanup(void) { #ifndef OPENSSL_NO_SOCK bio_sock_cleanup_int(); CRYPTO_THREAD_lock_free(bio_lookup_lock); bio_lookup_lock = NULL; #endif CRYPTO_FREE_REF(&bio_type_count); } static int bio_wait(BIO *bio, time_t max_time, unsigned int nap_milliseconds) { #ifndef OPENSSL_NO_SOCK int fd; #endif long sec_diff; if (max_time == 0) return 1; #ifndef OPENSSL_NO_SOCK if (BIO_get_fd(bio, &fd) > 0 && fd < FD_SETSIZE) return BIO_socket_wait(fd, BIO_should_read(bio), max_time); #endif sec_diff = (long)(max_time - time(NULL)); if (sec_diff < 0) return 0; if (sec_diff == 0) { if (nap_milliseconds > 1000) nap_milliseconds = 1000; } else { if ((unsigned long)sec_diff * 1000 < nap_milliseconds) nap_milliseconds = (unsigned int)sec_diff * 1000; } OSSL_sleep(nap_milliseconds); return 1; } int BIO_wait(BIO *bio, time_t max_time, unsigned int nap_milliseconds) { int rv = bio_wait(bio, max_time, nap_milliseconds); if (rv <= 0) ERR_raise(ERR_LIB_BIO, rv == 0 ? BIO_R_TRANSFER_TIMEOUT : BIO_R_TRANSFER_ERROR); return rv; } int BIO_do_connect_retry(BIO *bio, int timeout, int nap_milliseconds) { int blocking = timeout <= 0; time_t max_time = timeout > 0 ? time(NULL) + timeout : 0; int rv; if (bio == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return -1; } if (nap_milliseconds < 0) nap_milliseconds = 100; BIO_set_nbio(bio, !blocking); retry: ERR_set_mark(); rv = BIO_do_connect(bio); if (rv <= 0) { int err = ERR_peek_last_error(); int reason = ERR_GET_REASON(err); int do_retry = BIO_should_retry(bio); if (ERR_GET_LIB(err) == ERR_LIB_BIO) { switch (reason) { case ERR_R_SYS_LIB: case BIO_R_CONNECT_ERROR: case BIO_R_NBIO_CONNECT_ERROR: (void)BIO_reset(bio); do_retry = 1; break; default: break; } } if (timeout >= 0 && do_retry) { ERR_pop_to_mark(); rv = bio_wait(bio, max_time, nap_milliseconds); if (rv > 0) goto retry; ERR_raise(ERR_LIB_BIO, rv == 0 ? BIO_R_CONNECT_TIMEOUT : BIO_R_CONNECT_ERROR); } else { ERR_clear_last_mark(); rv = -1; if (err == 0) ERR_raise(ERR_LIB_BIO, BIO_R_CONNECT_ERROR); } } else { ERR_clear_last_mark(); } return rv; }
bio
openssl/crypto/bio/bio_lib.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" #include <openssl/rand.h> static int nbiof_write(BIO *h, const char *buf, int num); static int nbiof_read(BIO *h, char *buf, int size); static int nbiof_puts(BIO *h, const char *str); static int nbiof_gets(BIO *h, char *str, int size); static long nbiof_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int nbiof_new(BIO *h); static int nbiof_free(BIO *data); static long nbiof_callback_ctrl(BIO *h, int cmd, BIO_info_cb *fp); typedef struct nbio_test_st { int lrn; int lwn; } NBIO_TEST; static const BIO_METHOD methods_nbiof = { BIO_TYPE_NBIO_TEST, "non-blocking IO test filter", bwrite_conv, nbiof_write, bread_conv, nbiof_read, nbiof_puts, nbiof_gets, nbiof_ctrl, nbiof_new, nbiof_free, nbiof_callback_ctrl, }; const BIO_METHOD *BIO_f_nbio_test(void) { return &methods_nbiof; } static int nbiof_new(BIO *bi) { NBIO_TEST *nt; if ((nt = OPENSSL_zalloc(sizeof(*nt))) == NULL) return 0; nt->lrn = -1; nt->lwn = -1; bi->ptr = (char *)nt; bi->init = 1; return 1; } static int nbiof_free(BIO *a) { if (a == NULL) return 0; OPENSSL_free(a->ptr); a->ptr = NULL; a->init = 0; a->flags = 0; return 1; } static int nbiof_read(BIO *b, char *out, int outl) { int ret = 0; int num; unsigned char n; if (out == NULL) return 0; if (b->next_bio == NULL) return 0; BIO_clear_retry_flags(b); if (RAND_priv_bytes(&n, 1) <= 0) return -1; num = (n & 0x07); if (outl > num) outl = num; if (num == 0) { ret = -1; BIO_set_retry_read(b); } else { ret = BIO_read(b->next_bio, out, outl); if (ret < 0) BIO_copy_next_retry(b); } return ret; } static int nbiof_write(BIO *b, const char *in, int inl) { NBIO_TEST *nt; int ret = 0; int num; unsigned char n; if ((in == NULL) || (inl <= 0)) return 0; if (b->next_bio == NULL) return 0; nt = (NBIO_TEST *)b->ptr; BIO_clear_retry_flags(b); if (nt->lwn > 0) { num = nt->lwn; nt->lwn = 0; } else { if (RAND_priv_bytes(&n, 1) <= 0) return -1; num = (n & 7); } if (inl > num) inl = num; if (num == 0) { ret = -1; BIO_set_retry_write(b); } else { ret = BIO_write(b->next_bio, in, inl); if (ret < 0) { BIO_copy_next_retry(b); nt->lwn = inl; } } return ret; } static long nbiof_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret; if (b->next_bio == NULL) return 0; switch (cmd) { case BIO_C_DO_STATE_MACHINE: BIO_clear_retry_flags(b); ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; case BIO_CTRL_DUP: ret = 0L; break; default: ret = BIO_ctrl(b->next_bio, cmd, num, ptr); break; } return ret; } static long nbiof_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { if (b->next_bio == NULL) return 0; return BIO_callback_ctrl(b->next_bio, cmd, fp); } static int nbiof_gets(BIO *bp, char *buf, int size) { if (bp->next_bio == NULL) return 0; return BIO_gets(bp->next_bio, buf, size); } static int nbiof_puts(BIO *bp, const char *str) { if (bp->next_bio == NULL) return 0; return BIO_puts(bp->next_bio, str); }
bio
openssl/crypto/bio/bf_nbio.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" static int mem_write(BIO *h, const char *buf, int num); static int mem_read(BIO *h, char *buf, int size); static int mem_puts(BIO *h, const char *str); static int mem_gets(BIO *h, char *str, int size); static long mem_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int mem_new(BIO *h); static int secmem_new(BIO *h); static int mem_free(BIO *data); static int mem_buf_free(BIO *data); static int mem_buf_sync(BIO *h); static const BIO_METHOD mem_method = { BIO_TYPE_MEM, "memory buffer", bwrite_conv, mem_write, bread_conv, mem_read, mem_puts, mem_gets, mem_ctrl, mem_new, mem_free, NULL, }; static const BIO_METHOD secmem_method = { BIO_TYPE_MEM, "secure memory buffer", bwrite_conv, mem_write, bread_conv, mem_read, mem_puts, mem_gets, mem_ctrl, secmem_new, mem_free, NULL, }; typedef struct bio_buf_mem_st { struct buf_mem_st *buf; struct buf_mem_st *readp; } BIO_BUF_MEM; const BIO_METHOD *BIO_s_mem(void) { return &mem_method; } const BIO_METHOD *BIO_s_secmem(void) { return(&secmem_method); } BIO *BIO_new_mem_buf(const void *buf, int len) { BIO *ret; BUF_MEM *b; BIO_BUF_MEM *bb; size_t sz; if (buf == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); return NULL; } sz = (len < 0) ? strlen(buf) : (size_t)len; if ((ret = BIO_new(BIO_s_mem())) == NULL) return NULL; bb = (BIO_BUF_MEM *)ret->ptr; b = bb->buf; b->data = (void *)buf; b->length = sz; b->max = sz; *bb->readp = *bb->buf; ret->flags |= BIO_FLAGS_MEM_RDONLY; ret->num = 0; return ret; } static int mem_init(BIO *bi, unsigned long flags) { BIO_BUF_MEM *bb = OPENSSL_zalloc(sizeof(*bb)); if (bb == NULL) return 0; if ((bb->buf = BUF_MEM_new_ex(flags)) == NULL) { OPENSSL_free(bb); return 0; } if ((bb->readp = OPENSSL_zalloc(sizeof(*bb->readp))) == NULL) { BUF_MEM_free(bb->buf); OPENSSL_free(bb); return 0; } *bb->readp = *bb->buf; bi->shutdown = 1; bi->init = 1; bi->num = -1; bi->ptr = (char *)bb; return 1; } static int mem_new(BIO *bi) { return mem_init(bi, 0L); } static int secmem_new(BIO *bi) { return mem_init(bi, BUF_MEM_FLAG_SECURE); } static int mem_free(BIO *a) { BIO_BUF_MEM *bb; if (a == NULL) return 0; bb = (BIO_BUF_MEM *)a->ptr; if (!mem_buf_free(a)) return 0; OPENSSL_free(bb->readp); OPENSSL_free(bb); return 1; } static int mem_buf_free(BIO *a) { if (a == NULL) return 0; if (a->shutdown && a->init && a->ptr != NULL) { BIO_BUF_MEM *bb = (BIO_BUF_MEM *)a->ptr; BUF_MEM *b = bb->buf; if (a->flags & BIO_FLAGS_MEM_RDONLY) b->data = NULL; BUF_MEM_free(b); } return 1; } static int mem_buf_sync(BIO *b) { if (b != NULL && b->init != 0 && b->ptr != NULL) { BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)b->ptr; if (bbm->readp->data != bbm->buf->data) { memmove(bbm->buf->data, bbm->readp->data, bbm->readp->length); bbm->buf->length = bbm->readp->length; bbm->readp->data = bbm->buf->data; } } return 0; } static int mem_read(BIO *b, char *out, int outl) { int ret = -1; BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)b->ptr; BUF_MEM *bm = bbm->readp; if (b->flags & BIO_FLAGS_MEM_RDONLY) bm = bbm->buf; BIO_clear_retry_flags(b); ret = (outl >= 0 && (size_t)outl > bm->length) ? (int)bm->length : outl; if ((out != NULL) && (ret > 0)) { memcpy(out, bm->data, ret); bm->length -= ret; bm->max -= ret; bm->data += ret; } else if (bm->length == 0) { ret = b->num; if (ret != 0) BIO_set_retry_read(b); } return ret; } static int mem_write(BIO *b, const char *in, int inl) { int ret = -1; int blen; BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)b->ptr; if (b->flags & BIO_FLAGS_MEM_RDONLY) { ERR_raise(ERR_LIB_BIO, BIO_R_WRITE_TO_READ_ONLY_BIO); goto end; } BIO_clear_retry_flags(b); if (inl == 0) return 0; if (in == NULL) { ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_NULL_PARAMETER); goto end; } blen = bbm->readp->length; mem_buf_sync(b); if (BUF_MEM_grow_clean(bbm->buf, blen + inl) == 0) goto end; memcpy(bbm->buf->data + blen, in, inl); *bbm->readp = *bbm->buf; ret = inl; end: return ret; } static long mem_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 1; char **pptr; BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)b->ptr; BUF_MEM *bm, *bo; long off, remain; if (b->flags & BIO_FLAGS_MEM_RDONLY) { bm = bbm->buf; bo = bbm->readp; } else { bm = bbm->readp; bo = bbm->buf; } off = (bm->data == bo->data) ? 0 : bm->data - bo->data; remain = bm->length; switch (cmd) { case BIO_CTRL_RESET: bm = bbm->buf; if (bm->data != NULL) { if (!(b->flags & BIO_FLAGS_MEM_RDONLY)) { if (!(b->flags & BIO_FLAGS_NONCLEAR_RST)) { memset(bm->data, 0, bm->max); bm->length = 0; } *bbm->readp = *bbm->buf; } else { *bbm->buf = *bbm->readp; } } break; case BIO_C_FILE_SEEK: if (num < 0 || num > off + remain) return -1; bm->data = (num != 0) ? bo->data + num : bo->data; bm->length = bo->length - num; bm->max = bo->max - num; off = num; case BIO_C_FILE_TELL: ret = off; break; case BIO_CTRL_EOF: ret = (long)(bm->length == 0); break; case BIO_C_SET_BUF_MEM_EOF_RETURN: b->num = (int)num; break; case BIO_CTRL_INFO: ret = (long)bm->length; if (ptr != NULL) { pptr = (char **)ptr; *pptr = (char *)(bm->data); } break; case BIO_C_SET_BUF_MEM: mem_buf_free(b); b->shutdown = (int)num; bbm->buf = ptr; *bbm->readp = *bbm->buf; break; case BIO_C_GET_BUF_MEM_PTR: if (ptr != NULL) { if (!(b->flags & BIO_FLAGS_MEM_RDONLY)) mem_buf_sync(b); bm = bbm->buf; pptr = (char **)ptr; *pptr = (char *)bm; } break; case BIO_CTRL_GET_CLOSE: ret = (long)b->shutdown; break; case BIO_CTRL_SET_CLOSE: b->shutdown = (int)num; break; case BIO_CTRL_WPENDING: ret = 0L; break; case BIO_CTRL_PENDING: ret = (long)bm->length; break; case BIO_CTRL_DUP: case BIO_CTRL_FLUSH: ret = 1; break; case BIO_CTRL_PUSH: case BIO_CTRL_POP: default: ret = 0; break; } return ret; } static int mem_gets(BIO *bp, char *buf, int size) { int i, j; int ret = -1; char *p; BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)bp->ptr; BUF_MEM *bm = bbm->readp; if (bp->flags & BIO_FLAGS_MEM_RDONLY) bm = bbm->buf; BIO_clear_retry_flags(bp); j = bm->length; if ((size - 1) < j) j = size - 1; if (j <= 0) { *buf = '\0'; return 0; } p = bm->data; for (i = 0; i < j; i++) { if (p[i] == '\n') { i++; break; } } i = mem_read(bp, buf, i); if (i > 0) buf[i] = '\0'; ret = i; return ret; } static int mem_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = mem_write(bp, str, n); return ret; }
bio
openssl/crypto/bio/bss_mem.c
openssl
#include "bio_local.h" #include "internal/thread_once.h" CRYPTO_REF_COUNT bio_type_count; static CRYPTO_ONCE bio_type_init = CRYPTO_ONCE_STATIC_INIT; DEFINE_RUN_ONCE_STATIC(do_bio_type_init) { return CRYPTO_NEW_REF(&bio_type_count, BIO_TYPE_START); } int BIO_get_new_index(void) { int newval; if (!RUN_ONCE(&bio_type_init, do_bio_type_init)) { ERR_raise(ERR_LIB_BIO, ERR_R_CRYPTO_LIB); return -1; } if (!CRYPTO_UP_REF(&bio_type_count, &newval)) return -1; if (newval > BIO_TYPE_MASK) return -1; return newval; } BIO_METHOD *BIO_meth_new(int type, const char *name) { BIO_METHOD *biom = OPENSSL_zalloc(sizeof(BIO_METHOD)); if (biom == NULL || (biom->name = OPENSSL_strdup(name)) == NULL) { OPENSSL_free(biom); return NULL; } biom->type = type; return biom; } void BIO_meth_free(BIO_METHOD *biom) { if (biom != NULL) { OPENSSL_free(biom->name); OPENSSL_free(biom); } } int (*BIO_meth_get_write(const BIO_METHOD *biom)) (BIO *, const char *, int) { return biom->bwrite_old; } int (*BIO_meth_get_write_ex(const BIO_METHOD *biom)) (BIO *, const char *, size_t, size_t *) { return biom->bwrite; } int bwrite_conv(BIO *bio, const char *data, size_t datal, size_t *written) { int ret; if (datal > INT_MAX) datal = INT_MAX; ret = bio->method->bwrite_old(bio, data, (int)datal); if (ret <= 0) { *written = 0; return ret; } *written = (size_t)ret; return 1; } int BIO_meth_set_write(BIO_METHOD *biom, int (*bwrite) (BIO *, const char *, int)) { biom->bwrite_old = bwrite; biom->bwrite = bwrite_conv; return 1; } int BIO_meth_set_write_ex(BIO_METHOD *biom, int (*bwrite) (BIO *, const char *, size_t, size_t *)) { biom->bwrite_old = NULL; biom->bwrite = bwrite; return 1; } int (*BIO_meth_get_read(const BIO_METHOD *biom)) (BIO *, char *, int) { return biom->bread_old; } int (*BIO_meth_get_read_ex(const BIO_METHOD *biom)) (BIO *, char *, size_t, size_t *) { return biom->bread; } int bread_conv(BIO *bio, char *data, size_t datal, size_t *readbytes) { int ret; if (datal > INT_MAX) datal = INT_MAX; ret = bio->method->bread_old(bio, data, (int)datal); if (ret <= 0) { *readbytes = 0; return ret; } *readbytes = (size_t)ret; return 1; } int BIO_meth_set_read(BIO_METHOD *biom, int (*bread) (BIO *, char *, int)) { biom->bread_old = bread; biom->bread = bread_conv; return 1; } int BIO_meth_set_read_ex(BIO_METHOD *biom, int (*bread) (BIO *, char *, size_t, size_t *)) { biom->bread_old = NULL; biom->bread = bread; return 1; } int (*BIO_meth_get_puts(const BIO_METHOD *biom)) (BIO *, const char *) { return biom->bputs; } int BIO_meth_set_puts(BIO_METHOD *biom, int (*bputs) (BIO *, const char *)) { biom->bputs = bputs; return 1; } int (*BIO_meth_get_gets(const BIO_METHOD *biom)) (BIO *, char *, int) { return biom->bgets; } int BIO_meth_set_gets(BIO_METHOD *biom, int (*bgets) (BIO *, char *, int)) { biom->bgets = bgets; return 1; } long (*BIO_meth_get_ctrl(const BIO_METHOD *biom)) (BIO *, int, long, void *) { return biom->ctrl; } int BIO_meth_set_ctrl(BIO_METHOD *biom, long (*ctrl) (BIO *, int, long, void *)) { biom->ctrl = ctrl; return 1; } int (*BIO_meth_get_create(const BIO_METHOD *biom)) (BIO *) { return biom->create; } int BIO_meth_set_create(BIO_METHOD *biom, int (*create) (BIO *)) { biom->create = create; return 1; } int (*BIO_meth_get_destroy(const BIO_METHOD *biom)) (BIO *) { return biom->destroy; } int BIO_meth_set_destroy(BIO_METHOD *biom, int (*destroy) (BIO *)) { biom->destroy = destroy; return 1; } long (*BIO_meth_get_callback_ctrl(const BIO_METHOD *biom)) (BIO *, int, BIO_info_cb *) { return biom->callback_ctrl; } int BIO_meth_set_callback_ctrl(BIO_METHOD *biom, long (*callback_ctrl) (BIO *, int, BIO_info_cb *)) { biom->callback_ctrl = callback_ctrl; return 1; } int BIO_meth_set_sendmmsg(BIO_METHOD *biom, int (*bsendmmsg) (BIO *, BIO_MSG *, size_t, size_t, uint64_t, size_t *)) { biom->bsendmmsg = bsendmmsg; return 1; } int (*BIO_meth_get_sendmmsg(const BIO_METHOD *biom))(BIO *, BIO_MSG *, size_t, size_t, uint64_t, size_t *) { return biom->bsendmmsg; } int BIO_meth_set_recvmmsg(BIO_METHOD *biom, int (*brecvmmsg) (BIO *, BIO_MSG *, size_t, size_t, uint64_t, size_t *)) { biom->brecvmmsg = brecvmmsg; return 1; } int (*BIO_meth_get_recvmmsg(const BIO_METHOD *biom))(BIO *, BIO_MSG *, size_t, size_t, uint64_t, size_t *) { return biom->brecvmmsg; }
bio
openssl/crypto/bio/bio_meth.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" #if defined(OPENSSL_SYS_WINCE) #elif defined(OPENSSL_SYS_WIN32) #elif defined(__wasi__) # define NO_SYSLOG #elif defined(OPENSSL_SYS_VMS) # include <opcdef.h> # include <descrip.h> # include <lib$routines.h> # include <starlet.h> # if __INITIAL_POINTER_SIZE && defined _ANSI_C_SOURCE # if __INITIAL_POINTER_SIZE == 64 # pragma pointer_size save # pragma pointer_size 32 void *_malloc32(__size_t); # pragma pointer_size restore # endif # endif #elif defined(__DJGPP__) && defined(OPENSSL_NO_SOCK) # define NO_SYSLOG #elif (!defined(MSDOS) || defined(WATT32)) && !defined(OPENSSL_SYS_VXWORKS) && !defined(NO_SYSLOG) # include <syslog.h> #endif #include <openssl/buffer.h> #include <openssl/err.h> #ifndef NO_SYSLOG # if defined(OPENSSL_SYS_WIN32) # define LOG_EMERG 0 # define LOG_ALERT 1 # define LOG_CRIT 2 # define LOG_ERR 3 # define LOG_WARNING 4 # define LOG_NOTICE 5 # define LOG_INFO 6 # define LOG_DEBUG 7 # define LOG_DAEMON (3<<3) # elif defined(OPENSSL_SYS_VMS) # define LOG_EMERG 0 # define LOG_ALERT 1 # define LOG_CRIT 2 # define LOG_ERR 3 # define LOG_WARNING 4 # define LOG_NOTICE 5 # define LOG_INFO 6 # define LOG_DEBUG 7 # define LOG_DAEMON OPC$M_NM_NTWORK # endif static int slg_write(BIO *h, const char *buf, int num); static int slg_puts(BIO *h, const char *str); static long slg_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int slg_new(BIO *h); static int slg_free(BIO *data); static void xopenlog(BIO *bp, char *name, int level); static void xsyslog(BIO *bp, int priority, const char *string); static void xcloselog(BIO *bp); static const BIO_METHOD methods_slg = { BIO_TYPE_MEM, "syslog", bwrite_conv, slg_write, NULL, NULL, slg_puts, NULL, slg_ctrl, slg_new, slg_free, NULL, }; const BIO_METHOD *BIO_s_log(void) { return &methods_slg; } static int slg_new(BIO *bi) { bi->init = 1; bi->num = 0; bi->ptr = NULL; xopenlog(bi, "application", LOG_DAEMON); return 1; } static int slg_free(BIO *a) { if (a == NULL) return 0; xcloselog(a); return 1; } static int slg_write(BIO *b, const char *in, int inl) { int ret = inl; char *buf; char *pp; int priority, i; static const struct { int strl; char str[10]; int log_level; } mapping[] = { { 6, "PANIC ", LOG_EMERG }, { 6, "EMERG ", LOG_EMERG }, { 4, "EMR ", LOG_EMERG }, { 6, "ALERT ", LOG_ALERT }, { 4, "ALR ", LOG_ALERT }, { 5, "CRIT ", LOG_CRIT }, { 4, "CRI ", LOG_CRIT }, { 6, "ERROR ", LOG_ERR }, { 4, "ERR ", LOG_ERR }, { 8, "WARNING ", LOG_WARNING }, { 5, "WARN ", LOG_WARNING }, { 4, "WAR ", LOG_WARNING }, { 7, "NOTICE ", LOG_NOTICE }, { 5, "NOTE ", LOG_NOTICE }, { 4, "NOT ", LOG_NOTICE }, { 5, "INFO ", LOG_INFO }, { 4, "INF ", LOG_INFO }, { 6, "DEBUG ", LOG_DEBUG }, { 4, "DBG ", LOG_DEBUG }, { 0, "", LOG_ERR } }; if (inl < 0) return 0; if ((buf = OPENSSL_malloc(inl + 1)) == NULL) return 0; memcpy(buf, in, inl); buf[inl] = '\0'; i = 0; while (strncmp(buf, mapping[i].str, mapping[i].strl) != 0) i++; priority = mapping[i].log_level; pp = buf + mapping[i].strl; xsyslog(b, priority, pp); OPENSSL_free(buf); return ret; } static long slg_ctrl(BIO *b, int cmd, long num, void *ptr) { switch (cmd) { case BIO_CTRL_SET: xcloselog(b); xopenlog(b, ptr, num); break; default: break; } return 0; } static int slg_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = slg_write(bp, str, n); return ret; } # if defined(OPENSSL_SYS_WIN32) static void xopenlog(BIO *bp, char *name, int level) { if (check_winnt()) bp->ptr = RegisterEventSourceA(NULL, name); else bp->ptr = NULL; } static void xsyslog(BIO *bp, int priority, const char *string) { LPCSTR lpszStrings[2]; WORD evtype = EVENTLOG_ERROR_TYPE; char pidbuf[DECIMAL_SIZE(DWORD) + 4]; if (bp->ptr == NULL) return; switch (priority) { case LOG_EMERG: case LOG_ALERT: case LOG_CRIT: case LOG_ERR: evtype = EVENTLOG_ERROR_TYPE; break; case LOG_WARNING: evtype = EVENTLOG_WARNING_TYPE; break; case LOG_NOTICE: case LOG_INFO: case LOG_DEBUG: evtype = EVENTLOG_INFORMATION_TYPE; break; default: evtype = EVENTLOG_ERROR_TYPE; break; } sprintf(pidbuf, "[%lu] ", GetCurrentProcessId()); lpszStrings[0] = pidbuf; lpszStrings[1] = string; ReportEventA(bp->ptr, evtype, 0, 1024, NULL, 2, 0, lpszStrings, NULL); } static void xcloselog(BIO *bp) { if (bp->ptr) DeregisterEventSource((HANDLE) (bp->ptr)); bp->ptr = NULL; } # elif defined(OPENSSL_SYS_VMS) static int VMS_OPC_target = LOG_DAEMON; static void xopenlog(BIO *bp, char *name, int level) { VMS_OPC_target = level; } static void xsyslog(BIO *bp, int priority, const char *string) { struct dsc$descriptor_s opc_dsc; # if __INITIAL_POINTER_SIZE == 64 # pragma pointer_size save # pragma pointer_size 32 # define OPCDEF_TYPE __char_ptr32 # define OPCDEF_MALLOC _malloc32 # else # define OPCDEF_TYPE char * # define OPCDEF_MALLOC OPENSSL_malloc # endif struct opcdef *opcdef_p; # if __INITIAL_POINTER_SIZE == 64 # pragma pointer_size restore # endif char buf[10240]; unsigned int len; struct dsc$descriptor_s buf_dsc; $DESCRIPTOR(fao_cmd, "!AZ: !AZ"); char *priority_tag; switch (priority) { case LOG_EMERG: priority_tag = "Emergency"; break; case LOG_ALERT: priority_tag = "Alert"; break; case LOG_CRIT: priority_tag = "Critical"; break; case LOG_ERR: priority_tag = "Error"; break; case LOG_WARNING: priority_tag = "Warning"; break; case LOG_NOTICE: priority_tag = "Notice"; break; case LOG_INFO: priority_tag = "Info"; break; case LOG_DEBUG: priority_tag = "DEBUG"; break; } buf_dsc.dsc$b_dtype = DSC$K_DTYPE_T; buf_dsc.dsc$b_class = DSC$K_CLASS_S; buf_dsc.dsc$a_pointer = buf; buf_dsc.dsc$w_length = sizeof(buf) - 1; lib$sys_fao(&fao_cmd, &len, &buf_dsc, priority_tag, string); opcdef_p = OPCDEF_MALLOC(8 + len); opcdef_p->opc$b_ms_type = OPC$_RQ_RQST; memcpy(opcdef_p->opc$z_ms_target_classes, &VMS_OPC_target, 3); opcdef_p->opc$l_ms_rqstid = 0; memcpy(&opcdef_p->opc$l_ms_text, buf, len); opc_dsc.dsc$b_dtype = DSC$K_DTYPE_T; opc_dsc.dsc$b_class = DSC$K_CLASS_S; opc_dsc.dsc$a_pointer = (OPCDEF_TYPE) opcdef_p; opc_dsc.dsc$w_length = len + 8; sys$sndopr(opc_dsc, 0); OPENSSL_free(opcdef_p); } static void xcloselog(BIO *bp) { } # else static void xopenlog(BIO *bp, char *name, int level) { # ifdef WATT32 openlog(name, LOG_PID | LOG_CONS | LOG_NDELAY, level); # else openlog(name, LOG_PID | LOG_CONS, level); # endif } static void xsyslog(BIO *bp, int priority, const char *string) { syslog(priority, "%s", string); } static void xcloselog(BIO *bp) { closelog(); } # endif #else const BIO_METHOD *BIO_s_log(void) { return NULL; } #endif
bio
openssl/crypto/bio/bss_log.c
openssl
#if defined(__linux) || defined(__sun) || defined(__hpux) # ifndef _FILE_OFFSET_BITS # define _FILE_OFFSET_BITS 64 # endif #endif #include <stdio.h> #include <errno.h> #include "bio_local.h" #include <openssl/err.h> #if !defined(OPENSSL_NO_STDIO) static int file_write(BIO *h, const char *buf, int num); static int file_read(BIO *h, char *buf, int size); static int file_puts(BIO *h, const char *str); static int file_gets(BIO *h, char *str, int size); static long file_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int file_new(BIO *h); static int file_free(BIO *data); static const BIO_METHOD methods_filep = { BIO_TYPE_FILE, "FILE pointer", bwrite_conv, file_write, bread_conv, file_read, file_puts, file_gets, file_ctrl, file_new, file_free, NULL, }; BIO *BIO_new_file(const char *filename, const char *mode) { BIO *ret; FILE *file = openssl_fopen(filename, mode); int fp_flags = BIO_CLOSE; if (strchr(mode, 'b') == NULL) fp_flags |= BIO_FP_TEXT; if (file == NULL) { ERR_raise_data(ERR_LIB_SYS, get_last_sys_error(), "calling fopen(%s, %s)", filename, mode); if (errno == ENOENT #ifdef ENXIO || errno == ENXIO #endif ) ERR_raise(ERR_LIB_BIO, BIO_R_NO_SUCH_FILE); else ERR_raise(ERR_LIB_BIO, ERR_R_SYS_LIB); return NULL; } if ((ret = BIO_new(BIO_s_file())) == NULL) { fclose(file); return NULL; } BIO_clear_flags(ret, BIO_FLAGS_UPLINK_INTERNAL); BIO_set_fp(ret, file, fp_flags); return ret; } BIO *BIO_new_fp(FILE *stream, int close_flag) { BIO *ret; if ((ret = BIO_new(BIO_s_file())) == NULL) return NULL; BIO_set_flags(ret, BIO_FLAGS_UPLINK_INTERNAL); BIO_set_fp(ret, stream, close_flag); return ret; } const BIO_METHOD *BIO_s_file(void) { return &methods_filep; } static int file_new(BIO *bi) { bi->init = 0; bi->num = 0; bi->ptr = NULL; bi->flags = BIO_FLAGS_UPLINK_INTERNAL; return 1; } static int file_free(BIO *a) { if (a == NULL) return 0; if (a->shutdown) { if ((a->init) && (a->ptr != NULL)) { if (a->flags & BIO_FLAGS_UPLINK_INTERNAL) UP_fclose(a->ptr); else fclose(a->ptr); a->ptr = NULL; a->flags = BIO_FLAGS_UPLINK_INTERNAL; } a->init = 0; } return 1; } static int file_read(BIO *b, char *out, int outl) { int ret = 0; if (b->init && (out != NULL)) { if (b->flags & BIO_FLAGS_UPLINK_INTERNAL) ret = UP_fread(out, 1, (int)outl, b->ptr); else ret = fread(out, 1, (int)outl, (FILE *)b->ptr); if (ret == 0 && (b->flags & BIO_FLAGS_UPLINK_INTERNAL ? UP_ferror((FILE *)b->ptr) : ferror((FILE *)b->ptr))) { ERR_raise_data(ERR_LIB_SYS, get_last_sys_error(), "calling fread()"); ERR_raise(ERR_LIB_BIO, ERR_R_SYS_LIB); ret = -1; } } return ret; } static int file_write(BIO *b, const char *in, int inl) { int ret = 0; if (b->init && (in != NULL)) { if (b->flags & BIO_FLAGS_UPLINK_INTERNAL) ret = UP_fwrite(in, (int)inl, 1, b->ptr); else ret = fwrite(in, (int)inl, 1, (FILE *)b->ptr); if (ret) ret = inl; } return ret; } static long file_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 1; FILE *fp = (FILE *)b->ptr; FILE **fpp; char p[4]; int st; switch (cmd) { case BIO_C_FILE_SEEK: case BIO_CTRL_RESET: if (b->flags & BIO_FLAGS_UPLINK_INTERNAL) ret = (long)UP_fseek(b->ptr, num, 0); else ret = (long)fseek(fp, num, 0); break; case BIO_CTRL_EOF: if (b->flags & BIO_FLAGS_UPLINK_INTERNAL) ret = (long)UP_feof(fp); else ret = (long)feof(fp); break; case BIO_C_FILE_TELL: case BIO_CTRL_INFO: if (b->flags & BIO_FLAGS_UPLINK_INTERNAL) ret = UP_ftell(b->ptr); else ret = ftell(fp); break; case BIO_C_SET_FILE_PTR: file_free(b); b->shutdown = (int)num & BIO_CLOSE; b->ptr = ptr; b->init = 1; # if BIO_FLAGS_UPLINK_INTERNAL!=0 # if defined(__MINGW32__) && defined(__MSVCRT__) && !defined(_IOB_ENTRIES) # define _IOB_ENTRIES 20 # endif # if (defined(_MSC_VER) && _MSC_VER>=1900) || defined(__BORLANDC__) if (ptr == stdin || ptr == stdout || ptr == stderr) BIO_clear_flags(b, BIO_FLAGS_UPLINK_INTERNAL); # elif defined(_IOB_ENTRIES) if ((size_t)ptr >= (size_t)stdin && (size_t)ptr < (size_t)(stdin + _IOB_ENTRIES)) BIO_clear_flags(b, BIO_FLAGS_UPLINK_INTERNAL); # endif # endif # ifdef UP_fsetmod if (b->flags & BIO_FLAGS_UPLINK_INTERNAL) UP_fsetmod(b->ptr, (char)((num & BIO_FP_TEXT) ? 't' : 'b')); else # endif { # if defined(OPENSSL_SYS_WINDOWS) int fd = _fileno((FILE *)ptr); if (num & BIO_FP_TEXT) _setmode(fd, _O_TEXT); else _setmode(fd, _O_BINARY); if ((num & BIO_FP_TEXT) != 0) setvbuf((FILE *)ptr, NULL, _IONBF, 0); # elif defined(OPENSSL_SYS_MSDOS) int fd = fileno((FILE *)ptr); if (num & BIO_FP_TEXT) _setmode(fd, _O_TEXT); else { if (fd == STDIN_FILENO || fd == STDOUT_FILENO) { if (isatty(fd) <= 0) _setmode(fd, _O_BINARY); } else _setmode(fd, _O_BINARY); } # elif defined(OPENSSL_SYS_WIN32_CYGWIN) int fd = fileno((FILE *)ptr); if (!(num & BIO_FP_TEXT)) setmode(fd, O_BINARY); # endif } break; case BIO_C_SET_FILENAME: file_free(b); b->shutdown = (int)num & BIO_CLOSE; if (num & BIO_FP_APPEND) { if (num & BIO_FP_READ) OPENSSL_strlcpy(p, "a+", sizeof(p)); else OPENSSL_strlcpy(p, "a", sizeof(p)); } else if ((num & BIO_FP_READ) && (num & BIO_FP_WRITE)) OPENSSL_strlcpy(p, "r+", sizeof(p)); else if (num & BIO_FP_WRITE) OPENSSL_strlcpy(p, "w", sizeof(p)); else if (num & BIO_FP_READ) OPENSSL_strlcpy(p, "r", sizeof(p)); else { ERR_raise(ERR_LIB_BIO, BIO_R_BAD_FOPEN_MODE); ret = 0; break; } # if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WINDOWS) if (!(num & BIO_FP_TEXT)) OPENSSL_strlcat(p, "b", sizeof(p)); else OPENSSL_strlcat(p, "t", sizeof(p)); # elif defined(OPENSSL_SYS_WIN32_CYGWIN) if (!(num & BIO_FP_TEXT)) OPENSSL_strlcat(p, "b", sizeof(p)); # endif fp = openssl_fopen(ptr, p); if (fp == NULL) { ERR_raise_data(ERR_LIB_SYS, get_last_sys_error(), "calling fopen(%s, %s)", ptr, p); ERR_raise(ERR_LIB_BIO, ERR_R_SYS_LIB); ret = 0; break; } b->ptr = fp; b->init = 1; BIO_clear_flags(b, BIO_FLAGS_UPLINK_INTERNAL); break; case BIO_C_GET_FILE_PTR: if (ptr != NULL) { fpp = (FILE **)ptr; *fpp = (FILE *)b->ptr; } break; case BIO_CTRL_GET_CLOSE: ret = (long)b->shutdown; break; case BIO_CTRL_SET_CLOSE: b->shutdown = (int)num; break; case BIO_CTRL_FLUSH: st = b->flags & BIO_FLAGS_UPLINK_INTERNAL ? UP_fflush(b->ptr) : fflush((FILE *)b->ptr); if (st == EOF) { ERR_raise_data(ERR_LIB_SYS, get_last_sys_error(), "calling fflush()"); ERR_raise(ERR_LIB_BIO, ERR_R_SYS_LIB); ret = 0; } break; case BIO_CTRL_DUP: ret = 1; break; case BIO_CTRL_WPENDING: case BIO_CTRL_PENDING: case BIO_CTRL_PUSH: case BIO_CTRL_POP: default: ret = 0; break; } return ret; } static int file_gets(BIO *bp, char *buf, int size) { int ret = 0; buf[0] = '\0'; if (bp->flags & BIO_FLAGS_UPLINK_INTERNAL) { if (!UP_fgets(buf, size, bp->ptr)) goto err; } else { if (!fgets(buf, size, (FILE *)bp->ptr)) goto err; } if (buf[0] != '\0') ret = strlen(buf); err: return ret; } static int file_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = file_write(bp, str, n); return ret; } #else static int file_write(BIO *b, const char *in, int inl) { return -1; } static int file_read(BIO *b, char *out, int outl) { return -1; } static int file_puts(BIO *bp, const char *str) { return -1; } static int file_gets(BIO *bp, char *buf, int size) { return 0; } static long file_ctrl(BIO *b, int cmd, long num, void *ptr) { return 0; } static int file_new(BIO *bi) { return 0; } static int file_free(BIO *a) { return 0; } static const BIO_METHOD methods_filep = { BIO_TYPE_FILE, "FILE pointer", bwrite_conv, file_write, bread_conv, file_read, file_puts, file_gets, file_ctrl, file_new, file_free, NULL, }; const BIO_METHOD *BIO_s_file(void) { return &methods_filep; } BIO *BIO_new_file(const char *filename, const char *mode) { return NULL; } #endif
bio
openssl/crypto/bio/bss_file.c
openssl
#include <openssl/err.h> #include <openssl/bioerr.h> #include "crypto/bioerr.h" #ifndef OPENSSL_NO_ERR static const ERR_STRING_DATA BIO_str_reasons[] = { {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_ACCEPT_ERROR), "accept error"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_ADDRINFO_ADDR_IS_NOT_AF_INET), "addrinfo addr is not af inet"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_AMBIGUOUS_HOST_OR_SERVICE), "ambiguous host or service"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_BAD_FOPEN_MODE), "bad fopen mode"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_BROKEN_PIPE), "broken pipe"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_CONNECT_ERROR), "connect error"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_CONNECT_TIMEOUT), "connect timeout"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_GETHOSTBYNAME_ADDR_IS_NOT_AF_INET), "gethostbyname addr is not af inet"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_GETSOCKNAME_ERROR), "getsockname error"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_GETSOCKNAME_TRUNCATED_ADDRESS), "getsockname truncated address"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_GETTING_SOCKTYPE), "getting socktype"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_INVALID_ARGUMENT), "invalid argument"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_INVALID_SOCKET), "invalid socket"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_IN_USE), "in use"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_LENGTH_TOO_LONG), "length too long"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_LISTEN_V6_ONLY), "listen v6 only"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_LOOKUP_RETURNED_NOTHING), "lookup returned nothing"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_MALFORMED_HOST_OR_SERVICE), "malformed host or service"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_NBIO_CONNECT_ERROR), "nbio connect error"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_NO_ACCEPT_ADDR_OR_SERVICE_SPECIFIED), "no accept addr or service specified"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_NO_HOSTNAME_OR_SERVICE_SPECIFIED), "no hostname or service specified"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_NO_PORT_DEFINED), "no port defined"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_NO_SUCH_FILE), "no such file"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_PORT_MISMATCH), "port mismatch"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_TFO_DISABLED), "tfo disabled"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_TFO_NO_KERNEL_SUPPORT), "tfo no kernel support"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_TRANSFER_ERROR), "transfer error"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_TRANSFER_TIMEOUT), "transfer timeout"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNABLE_TO_BIND_SOCKET), "unable to bind socket"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNABLE_TO_CREATE_SOCKET), "unable to create socket"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNABLE_TO_KEEPALIVE), "unable to keepalive"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNABLE_TO_LISTEN_SOCKET), "unable to listen socket"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNABLE_TO_NODELAY), "unable to nodelay"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNABLE_TO_REUSEADDR), "unable to reuseaddr"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNABLE_TO_TFO), "unable to tfo"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNAVAILABLE_IP_FAMILY), "unavailable ip family"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNINITIALIZED), "uninitialized"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNKNOWN_INFO_TYPE), "unknown info type"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNSUPPORTED_IP_FAMILY), "unsupported ip family"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNSUPPORTED_METHOD), "unsupported method"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_UNSUPPORTED_PROTOCOL_FAMILY), "unsupported protocol family"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_WRITE_TO_READ_ONLY_BIO), "write to read only BIO"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_WSASTARTUP), "WSAStartup"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_LOCAL_ADDR_NOT_AVAILABLE), "local address not available"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_PEER_ADDR_NOT_AVAILABLE), "peer address not available"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_NON_FATAL), "non-fatal or transient error"}, {ERR_PACK(ERR_LIB_BIO, 0, BIO_R_PORT_MISMATCH), "port mismatch"}, {0, NULL} }; #endif int ossl_err_load_BIO_strings(void) { #ifndef OPENSSL_NO_ERR if (ERR_reason_error_string(BIO_str_reasons[0].error) == NULL) ERR_load_strings_const(BIO_str_reasons); #endif return 1; } #ifndef OPENSSL_NO_SOCK int BIO_err_is_non_fatal(unsigned int errcode) { if (ERR_SYSTEM_ERROR(errcode)) return BIO_sock_non_fatal_error(ERR_GET_REASON(errcode)); else if (ERR_GET_LIB(errcode) == ERR_LIB_BIO && ERR_GET_REASON(errcode) == BIO_R_NON_FATAL) return 1; else return 0; } #endif
bio
openssl/crypto/bio/bio_err.c
openssl
#include <openssl/core_dispatch.h> #include "bio_local.h" #include "internal/cryptlib.h" #include "crypto/context.h" typedef struct { OSSL_FUNC_BIO_read_ex_fn *c_bio_read_ex; OSSL_FUNC_BIO_write_ex_fn *c_bio_write_ex; OSSL_FUNC_BIO_gets_fn *c_bio_gets; OSSL_FUNC_BIO_puts_fn *c_bio_puts; OSSL_FUNC_BIO_ctrl_fn *c_bio_ctrl; OSSL_FUNC_BIO_up_ref_fn *c_bio_up_ref; OSSL_FUNC_BIO_free_fn *c_bio_free; } BIO_CORE_GLOBALS; void ossl_bio_core_globals_free(void *vbcg) { OPENSSL_free(vbcg); } void *ossl_bio_core_globals_new(OSSL_LIB_CTX *ctx) { return OPENSSL_zalloc(sizeof(BIO_CORE_GLOBALS)); } static ossl_inline BIO_CORE_GLOBALS *get_globals(OSSL_LIB_CTX *libctx) { return ossl_lib_ctx_get_data(libctx, OSSL_LIB_CTX_BIO_CORE_INDEX); } static int bio_core_read_ex(BIO *bio, char *data, size_t data_len, size_t *bytes_read) { BIO_CORE_GLOBALS *bcgbl = get_globals(bio->libctx); if (bcgbl == NULL || bcgbl->c_bio_read_ex == NULL) return 0; return bcgbl->c_bio_read_ex(BIO_get_data(bio), data, data_len, bytes_read); } static int bio_core_write_ex(BIO *bio, const char *data, size_t data_len, size_t *written) { BIO_CORE_GLOBALS *bcgbl = get_globals(bio->libctx); if (bcgbl == NULL || bcgbl->c_bio_write_ex == NULL) return 0; return bcgbl->c_bio_write_ex(BIO_get_data(bio), data, data_len, written); } static long bio_core_ctrl(BIO *bio, int cmd, long num, void *ptr) { BIO_CORE_GLOBALS *bcgbl = get_globals(bio->libctx); if (bcgbl == NULL || bcgbl->c_bio_ctrl == NULL) return -1; return bcgbl->c_bio_ctrl(BIO_get_data(bio), cmd, num, ptr); } static int bio_core_gets(BIO *bio, char *buf, int size) { BIO_CORE_GLOBALS *bcgbl = get_globals(bio->libctx); if (bcgbl == NULL || bcgbl->c_bio_gets == NULL) return -1; return bcgbl->c_bio_gets(BIO_get_data(bio), buf, size); } static int bio_core_puts(BIO *bio, const char *str) { BIO_CORE_GLOBALS *bcgbl = get_globals(bio->libctx); if (bcgbl == NULL || bcgbl->c_bio_puts == NULL) return -1; return bcgbl->c_bio_puts(BIO_get_data(bio), str); } static int bio_core_new(BIO *bio) { BIO_set_init(bio, 1); return 1; } static int bio_core_free(BIO *bio) { BIO_CORE_GLOBALS *bcgbl = get_globals(bio->libctx); if (bcgbl == NULL) return 0; BIO_set_init(bio, 0); bcgbl->c_bio_free(BIO_get_data(bio)); return 1; } static const BIO_METHOD corebiometh = { BIO_TYPE_CORE_TO_PROV, "BIO to Core filter", bio_core_write_ex, NULL, bio_core_read_ex, NULL, bio_core_puts, bio_core_gets, bio_core_ctrl, bio_core_new, bio_core_free, NULL, }; const BIO_METHOD *BIO_s_core(void) { return &corebiometh; } BIO *BIO_new_from_core_bio(OSSL_LIB_CTX *libctx, OSSL_CORE_BIO *corebio) { BIO *outbio; BIO_CORE_GLOBALS *bcgbl = get_globals(libctx); if (bcgbl == NULL || (bcgbl->c_bio_write_ex == NULL && bcgbl->c_bio_read_ex == NULL)) return NULL; if ((outbio = BIO_new_ex(libctx, BIO_s_core())) == NULL) return NULL; if (!bcgbl->c_bio_up_ref(corebio)) { BIO_free(outbio); return NULL; } BIO_set_data(outbio, corebio); return outbio; } int ossl_bio_init_core(OSSL_LIB_CTX *libctx, const OSSL_DISPATCH *fns) { BIO_CORE_GLOBALS *bcgbl = get_globals(libctx); if (bcgbl == NULL) return 0; for (; fns->function_id != 0; fns++) { switch (fns->function_id) { case OSSL_FUNC_BIO_READ_EX: if (bcgbl->c_bio_read_ex == NULL) bcgbl->c_bio_read_ex = OSSL_FUNC_BIO_read_ex(fns); break; case OSSL_FUNC_BIO_WRITE_EX: if (bcgbl->c_bio_write_ex == NULL) bcgbl->c_bio_write_ex = OSSL_FUNC_BIO_write_ex(fns); break; case OSSL_FUNC_BIO_GETS: if (bcgbl->c_bio_gets == NULL) bcgbl->c_bio_gets = OSSL_FUNC_BIO_gets(fns); break; case OSSL_FUNC_BIO_PUTS: if (bcgbl->c_bio_puts == NULL) bcgbl->c_bio_puts = OSSL_FUNC_BIO_puts(fns); break; case OSSL_FUNC_BIO_CTRL: if (bcgbl->c_bio_ctrl == NULL) bcgbl->c_bio_ctrl = OSSL_FUNC_BIO_ctrl(fns); break; case OSSL_FUNC_BIO_UP_REF: if (bcgbl->c_bio_up_ref == NULL) bcgbl->c_bio_up_ref = OSSL_FUNC_BIO_up_ref(fns); break; case OSSL_FUNC_BIO_FREE: if (bcgbl->c_bio_free == NULL) bcgbl->c_bio_free = OSSL_FUNC_BIO_free(fns); break; } } return 1; }
bio
openssl/crypto/bio/bss_core.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/bio_tfo.h" #include "internal/cryptlib.h" #include "internal/ktls.h" #ifndef OPENSSL_NO_SOCK # include <openssl/bio.h> # ifdef WATT32 # undef sock_write # undef sock_read # undef sock_puts # define sock_write SockWrite # define sock_read SockRead # define sock_puts SockPuts # endif struct bss_sock_st { BIO_ADDR tfo_peer; int tfo_first; #ifndef OPENSSL_NO_KTLS unsigned char ktls_record_type; #endif }; static int sock_write(BIO *h, const char *buf, int num); static int sock_read(BIO *h, char *buf, int size); static int sock_puts(BIO *h, const char *str); static long sock_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int sock_new(BIO *h); static int sock_free(BIO *data); int BIO_sock_should_retry(int s); static const BIO_METHOD methods_sockp = { BIO_TYPE_SOCKET, "socket", bwrite_conv, sock_write, bread_conv, sock_read, sock_puts, NULL, sock_ctrl, sock_new, sock_free, NULL, }; const BIO_METHOD *BIO_s_socket(void) { return &methods_sockp; } BIO *BIO_new_socket(int fd, int close_flag) { BIO *ret; ret = BIO_new(BIO_s_socket()); if (ret == NULL) return NULL; BIO_set_fd(ret, fd, close_flag); # ifndef OPENSSL_NO_KTLS { ktls_enable(fd); } # endif return ret; } static int sock_new(BIO *bi) { bi->init = 0; bi->num = 0; bi->flags = 0; bi->ptr = OPENSSL_zalloc(sizeof(struct bss_sock_st)); if (bi->ptr == NULL) return 0; return 1; } static int sock_free(BIO *a) { if (a == NULL) return 0; if (a->shutdown) { if (a->init) { BIO_closesocket(a->num); } a->init = 0; a->flags = 0; } OPENSSL_free(a->ptr); a->ptr = NULL; return 1; } static int sock_read(BIO *b, char *out, int outl) { int ret = 0; if (out != NULL) { clear_socket_error(); # ifndef OPENSSL_NO_KTLS if (BIO_get_ktls_recv(b)) ret = ktls_read_record(b->num, out, outl); else # endif ret = readsocket(b->num, out, outl); BIO_clear_retry_flags(b); if (ret <= 0) { if (BIO_sock_should_retry(ret)) BIO_set_retry_read(b); else if (ret == 0) b->flags |= BIO_FLAGS_IN_EOF; } } return ret; } static int sock_write(BIO *b, const char *in, int inl) { int ret = 0; # if !defined(OPENSSL_NO_KTLS) || defined(OSSL_TFO_SENDTO) struct bss_sock_st *data = (struct bss_sock_st *)b->ptr; # endif clear_socket_error(); # ifndef OPENSSL_NO_KTLS if (BIO_should_ktls_ctrl_msg_flag(b)) { unsigned char record_type = data->ktls_record_type; ret = ktls_send_ctrl_message(b->num, record_type, in, inl); if (ret >= 0) { ret = inl; BIO_clear_ktls_ctrl_msg_flag(b); } } else # endif # if defined(OSSL_TFO_SENDTO) if (data->tfo_first) { struct bss_sock_st *data = (struct bss_sock_st *)b->ptr; socklen_t peerlen = BIO_ADDR_sockaddr_size(&data->tfo_peer); ret = sendto(b->num, in, inl, OSSL_TFO_SENDTO, BIO_ADDR_sockaddr(&data->tfo_peer), peerlen); data->tfo_first = 0; } else # endif ret = writesocket(b->num, in, inl); BIO_clear_retry_flags(b); if (ret <= 0) { if (BIO_sock_should_retry(ret)) BIO_set_retry_write(b); } return ret; } static long sock_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 1; int *ip; struct bss_sock_st *data = (struct bss_sock_st *)b->ptr; # ifndef OPENSSL_NO_KTLS ktls_crypto_info_t *crypto_info; # endif switch (cmd) { case BIO_C_SET_FD: if (b->shutdown) { if (b->init) BIO_closesocket(b->num); b->flags = 0; } b->num = *((int *)ptr); b->shutdown = (int)num; b->init = 1; data->tfo_first = 0; memset(&data->tfo_peer, 0, sizeof(data->tfo_peer)); break; case BIO_C_GET_FD: if (b->init) { ip = (int *)ptr; if (ip != NULL) *ip = b->num; ret = b->num; } else ret = -1; break; case BIO_CTRL_GET_CLOSE: ret = b->shutdown; break; case BIO_CTRL_SET_CLOSE: b->shutdown = (int)num; break; case BIO_CTRL_DUP: case BIO_CTRL_FLUSH: ret = 1; break; case BIO_CTRL_GET_RPOLL_DESCRIPTOR: case BIO_CTRL_GET_WPOLL_DESCRIPTOR: { BIO_POLL_DESCRIPTOR *pd = ptr; if (!b->init) { ret = 0; break; } pd->type = BIO_POLL_DESCRIPTOR_TYPE_SOCK_FD; pd->value.fd = b->num; } break; # ifndef OPENSSL_NO_KTLS case BIO_CTRL_SET_KTLS: crypto_info = (ktls_crypto_info_t *)ptr; ret = ktls_start(b->num, crypto_info, num); if (ret) BIO_set_ktls_flag(b, num); break; case BIO_CTRL_GET_KTLS_SEND: return BIO_should_ktls_flag(b, 1) != 0; case BIO_CTRL_GET_KTLS_RECV: return BIO_should_ktls_flag(b, 0) != 0; case BIO_CTRL_SET_KTLS_TX_SEND_CTRL_MSG: BIO_set_ktls_ctrl_msg_flag(b); data->ktls_record_type = (unsigned char)num; ret = 0; break; case BIO_CTRL_CLEAR_KTLS_TX_CTRL_MSG: BIO_clear_ktls_ctrl_msg_flag(b); ret = 0; break; case BIO_CTRL_SET_KTLS_TX_ZEROCOPY_SENDFILE: ret = ktls_enable_tx_zerocopy_sendfile(b->num); if (ret) BIO_set_ktls_zerocopy_sendfile_flag(b); break; # endif case BIO_CTRL_EOF: ret = (b->flags & BIO_FLAGS_IN_EOF) != 0; break; case BIO_C_GET_CONNECT: if (ptr != NULL && num == 2) { const char **pptr = (const char **)ptr; *pptr = (const char *)&data->tfo_peer; } else { ret = 0; } break; case BIO_C_SET_CONNECT: if (ptr != NULL && num == 2) { ret = BIO_ADDR_make(&data->tfo_peer, BIO_ADDR_sockaddr((const BIO_ADDR *)ptr)); if (ret) data->tfo_first = 1; } else { ret = 0; } break; default: ret = 0; break; } return ret; } static int sock_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = sock_write(bp, str, n); return ret; } int BIO_sock_should_retry(int i) { int err; if ((i == 0) || (i == -1)) { err = get_last_socket_error(); return BIO_sock_non_fatal_error(err); } return 0; } int BIO_sock_non_fatal_error(int err) { switch (err) { # if defined(OPENSSL_SYS_WINDOWS) # if defined(WSAEWOULDBLOCK) case WSAEWOULDBLOCK: # endif # endif # ifdef EWOULDBLOCK # ifdef WSAEWOULDBLOCK # if WSAEWOULDBLOCK != EWOULDBLOCK case EWOULDBLOCK: # endif # else case EWOULDBLOCK: # endif # endif # if defined(ENOTCONN) case ENOTCONN: # endif # ifdef EINTR case EINTR: # endif # ifdef EAGAIN # if EWOULDBLOCK != EAGAIN case EAGAIN: # endif # endif # ifdef EPROTO case EPROTO: # endif # ifdef EINPROGRESS case EINPROGRESS: # endif # ifdef EALREADY case EALREADY: # endif return 1; default: break; } return 0; } #endif
bio
openssl/crypto/bio/bss_sock.c
openssl
#include "internal/e_os.h" #include <assert.h> #include <limits.h> #include <stdlib.h> #include <string.h> #include "bio_local.h" #include <openssl/err.h> #include <openssl/crypto.h> static int bio_new(BIO *bio); static int bio_free(BIO *bio); static int bio_read(BIO *bio, char *buf, int size); static int bio_write(BIO *bio, const char *buf, int num); static long bio_ctrl(BIO *bio, int cmd, long num, void *ptr); static int bio_puts(BIO *bio, const char *str); static int bio_make_pair(BIO *bio1, BIO *bio2); static void bio_destroy_pair(BIO *bio); static const BIO_METHOD methods_biop = { BIO_TYPE_BIO, "BIO pair", bwrite_conv, bio_write, bread_conv, bio_read, bio_puts, NULL , bio_ctrl, bio_new, bio_free, NULL }; const BIO_METHOD *BIO_s_bio(void) { return &methods_biop; } struct bio_bio_st { BIO *peer; int closed; size_t len; size_t offset; size_t size; char *buf; size_t request; }; static int bio_new(BIO *bio) { struct bio_bio_st *b = OPENSSL_zalloc(sizeof(*b)); if (b == NULL) return 0; b->size = 17 * 1024; bio->ptr = b; return 1; } static int bio_free(BIO *bio) { struct bio_bio_st *b; if (bio == NULL) return 0; b = bio->ptr; assert(b != NULL); if (b->peer) bio_destroy_pair(bio); OPENSSL_free(b->buf); OPENSSL_free(b); return 1; } static int bio_read(BIO *bio, char *buf, int size_) { size_t size = size_; size_t rest; struct bio_bio_st *b, *peer_b; BIO_clear_retry_flags(bio); if (!bio->init) return 0; b = bio->ptr; assert(b != NULL); assert(b->peer != NULL); peer_b = b->peer->ptr; assert(peer_b != NULL); assert(peer_b->buf != NULL); peer_b->request = 0; if (buf == NULL || size == 0) return 0; if (peer_b->len == 0) { if (peer_b->closed) return 0; else { BIO_set_retry_read(bio); if (size <= peer_b->size) peer_b->request = size; else peer_b->request = peer_b->size; return -1; } } if (peer_b->len < size) size = peer_b->len; rest = size; assert(rest > 0); do { size_t chunk; assert(rest <= peer_b->len); if (peer_b->offset + rest <= peer_b->size) chunk = rest; else chunk = peer_b->size - peer_b->offset; assert(peer_b->offset + chunk <= peer_b->size); memcpy(buf, peer_b->buf + peer_b->offset, chunk); peer_b->len -= chunk; if (peer_b->len) { peer_b->offset += chunk; assert(peer_b->offset <= peer_b->size); if (peer_b->offset == peer_b->size) peer_b->offset = 0; buf += chunk; } else { assert(chunk == rest); peer_b->offset = 0; } rest -= chunk; } while (rest); return size; } static ossl_ssize_t bio_nread0(BIO *bio, char **buf) { struct bio_bio_st *b, *peer_b; ossl_ssize_t num; BIO_clear_retry_flags(bio); if (!bio->init) return 0; b = bio->ptr; assert(b != NULL); assert(b->peer != NULL); peer_b = b->peer->ptr; assert(peer_b != NULL); assert(peer_b->buf != NULL); peer_b->request = 0; if (peer_b->len == 0) { char dummy; return bio_read(bio, &dummy, 1); } num = peer_b->len; if (peer_b->size < peer_b->offset + num) num = peer_b->size - peer_b->offset; assert(num > 0); if (buf != NULL) *buf = peer_b->buf + peer_b->offset; return num; } static ossl_ssize_t bio_nread(BIO *bio, char **buf, size_t num_) { struct bio_bio_st *b, *peer_b; ossl_ssize_t num, available; if (num_ > OSSL_SSIZE_MAX) num = OSSL_SSIZE_MAX; else num = (ossl_ssize_t) num_; available = bio_nread0(bio, buf); if (num > available) num = available; if (num <= 0) return num; b = bio->ptr; peer_b = b->peer->ptr; peer_b->len -= num; if (peer_b->len) { peer_b->offset += num; assert(peer_b->offset <= peer_b->size); if (peer_b->offset == peer_b->size) peer_b->offset = 0; } else peer_b->offset = 0; return num; } static int bio_write(BIO *bio, const char *buf, int num_) { size_t num = num_; size_t rest; struct bio_bio_st *b; BIO_clear_retry_flags(bio); if (!bio->init || buf == NULL || num_ <= 0) return 0; b = bio->ptr; assert(b != NULL); assert(b->peer != NULL); assert(b->buf != NULL); b->request = 0; if (b->closed) { ERR_raise(ERR_LIB_BIO, BIO_R_BROKEN_PIPE); return -1; } assert(b->len <= b->size); if (b->len == b->size) { BIO_set_retry_write(bio); return -1; } if (num > b->size - b->len) num = b->size - b->len; rest = num; assert(rest > 0); do { size_t write_offset; size_t chunk; assert(b->len + rest <= b->size); write_offset = b->offset + b->len; if (write_offset >= b->size) write_offset -= b->size; if (write_offset + rest <= b->size) chunk = rest; else chunk = b->size - write_offset; memcpy(b->buf + write_offset, buf, chunk); b->len += chunk; assert(b->len <= b->size); rest -= chunk; buf += chunk; } while (rest); return num; } static ossl_ssize_t bio_nwrite0(BIO *bio, char **buf) { struct bio_bio_st *b; size_t num; size_t write_offset; BIO_clear_retry_flags(bio); if (!bio->init) return 0; b = bio->ptr; assert(b != NULL); assert(b->peer != NULL); assert(b->buf != NULL); b->request = 0; if (b->closed) { ERR_raise(ERR_LIB_BIO, BIO_R_BROKEN_PIPE); return -1; } assert(b->len <= b->size); if (b->len == b->size) { BIO_set_retry_write(bio); return -1; } num = b->size - b->len; write_offset = b->offset + b->len; if (write_offset >= b->size) write_offset -= b->size; if (write_offset + num > b->size) num = b->size - write_offset; if (buf != NULL) *buf = b->buf + write_offset; assert(write_offset + num <= b->size); return num; } static ossl_ssize_t bio_nwrite(BIO *bio, char **buf, size_t num_) { struct bio_bio_st *b; ossl_ssize_t num, space; if (num_ > OSSL_SSIZE_MAX) num = OSSL_SSIZE_MAX; else num = (ossl_ssize_t) num_; space = bio_nwrite0(bio, buf); if (num > space) num = space; if (num <= 0) return num; b = bio->ptr; assert(b != NULL); b->len += num; assert(b->len <= b->size); return num; } static long bio_ctrl(BIO *bio, int cmd, long num, void *ptr) { long ret; struct bio_bio_st *b = bio->ptr; assert(b != NULL); switch (cmd) { case BIO_C_SET_WRITE_BUF_SIZE: if (b->peer) { ERR_raise(ERR_LIB_BIO, BIO_R_IN_USE); ret = 0; } else if (num == 0) { ERR_raise(ERR_LIB_BIO, BIO_R_INVALID_ARGUMENT); ret = 0; } else { size_t new_size = num; if (b->size != new_size) { OPENSSL_free(b->buf); b->buf = NULL; b->size = new_size; } ret = 1; } break; case BIO_C_GET_WRITE_BUF_SIZE: ret = (long)b->size; break; case BIO_C_MAKE_BIO_PAIR: { BIO *other_bio = ptr; if (bio_make_pair(bio, other_bio)) ret = 1; else ret = 0; } break; case BIO_C_DESTROY_BIO_PAIR: bio_destroy_pair(bio); ret = 1; break; case BIO_C_GET_WRITE_GUARANTEE: if (b->peer == NULL || b->closed) ret = 0; else ret = (long)b->size - b->len; break; case BIO_C_GET_READ_REQUEST: ret = (long)b->request; break; case BIO_C_RESET_READ_REQUEST: b->request = 0; ret = 1; break; case BIO_C_SHUTDOWN_WR: b->closed = 1; ret = 1; break; case BIO_C_NREAD0: ret = (long)bio_nread0(bio, ptr); break; case BIO_C_NREAD: ret = (long)bio_nread(bio, ptr, (size_t)num); break; case BIO_C_NWRITE0: ret = (long)bio_nwrite0(bio, ptr); break; case BIO_C_NWRITE: ret = (long)bio_nwrite(bio, ptr, (size_t)num); break; case BIO_CTRL_RESET: if (b->buf != NULL) { b->len = 0; b->offset = 0; } ret = 0; break; case BIO_CTRL_GET_CLOSE: ret = bio->shutdown; break; case BIO_CTRL_SET_CLOSE: bio->shutdown = (int)num; ret = 1; break; case BIO_CTRL_PENDING: if (b->peer != NULL) { struct bio_bio_st *peer_b = b->peer->ptr; ret = (long)peer_b->len; } else ret = 0; break; case BIO_CTRL_WPENDING: if (b->buf != NULL) ret = (long)b->len; else ret = 0; break; case BIO_CTRL_DUP: { BIO *other_bio = ptr; struct bio_bio_st *other_b; assert(other_bio != NULL); other_b = other_bio->ptr; assert(other_b != NULL); assert(other_b->buf == NULL); other_b->size = b->size; } ret = 1; break; case BIO_CTRL_FLUSH: ret = 1; break; case BIO_CTRL_EOF: if (b->peer != NULL) { struct bio_bio_st *peer_b = b->peer->ptr; if (peer_b->len == 0 && peer_b->closed) ret = 1; else ret = 0; } else { ret = 1; } break; default: ret = 0; } return ret; } static int bio_puts(BIO *bio, const char *str) { return bio_write(bio, str, strlen(str)); } static int bio_make_pair(BIO *bio1, BIO *bio2) { struct bio_bio_st *b1, *b2; assert(bio1 != NULL); assert(bio2 != NULL); b1 = bio1->ptr; b2 = bio2->ptr; if (b1->peer != NULL || b2->peer != NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_IN_USE); return 0; } if (b1->buf == NULL) { b1->buf = OPENSSL_malloc(b1->size); if (b1->buf == NULL) return 0; b1->len = 0; b1->offset = 0; } if (b2->buf == NULL) { b2->buf = OPENSSL_malloc(b2->size); if (b2->buf == NULL) return 0; b2->len = 0; b2->offset = 0; } b1->peer = bio2; b1->closed = 0; b1->request = 0; b2->peer = bio1; b2->closed = 0; b2->request = 0; bio1->init = 1; bio2->init = 1; return 1; } static void bio_destroy_pair(BIO *bio) { struct bio_bio_st *b = bio->ptr; if (b != NULL) { BIO *peer_bio = b->peer; if (peer_bio != NULL) { struct bio_bio_st *peer_b = peer_bio->ptr; assert(peer_b != NULL); assert(peer_b->peer == bio); peer_b->peer = NULL; peer_bio->init = 0; assert(peer_b->buf != NULL); peer_b->len = 0; peer_b->offset = 0; b->peer = NULL; bio->init = 0; assert(b->buf != NULL); b->len = 0; b->offset = 0; } } } int BIO_new_bio_pair(BIO **bio1_p, size_t writebuf1, BIO **bio2_p, size_t writebuf2) { BIO *bio1 = NULL, *bio2 = NULL; long r; int ret = 0; bio1 = BIO_new(BIO_s_bio()); if (bio1 == NULL) goto err; bio2 = BIO_new(BIO_s_bio()); if (bio2 == NULL) goto err; if (writebuf1) { r = BIO_set_write_buf_size(bio1, writebuf1); if (!r) goto err; } if (writebuf2) { r = BIO_set_write_buf_size(bio2, writebuf2); if (!r) goto err; } r = BIO_make_bio_pair(bio1, bio2); if (!r) goto err; ret = 1; err: if (ret == 0) { BIO_free(bio1); bio1 = NULL; BIO_free(bio2); bio2 = NULL; } *bio1_p = bio1; *bio2_p = bio2; return ret; } size_t BIO_ctrl_get_write_guarantee(BIO *bio) { return BIO_ctrl(bio, BIO_C_GET_WRITE_GUARANTEE, 0, NULL); } size_t BIO_ctrl_get_read_request(BIO *bio) { return BIO_ctrl(bio, BIO_C_GET_READ_REQUEST, 0, NULL); } int BIO_ctrl_reset_read_request(BIO *bio) { return (BIO_ctrl(bio, BIO_C_RESET_READ_REQUEST, 0, NULL) != 0); } int BIO_nread0(BIO *bio, char **buf) { long ret; if (!bio->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -2; } ret = BIO_ctrl(bio, BIO_C_NREAD0, 0, buf); if (ret > INT_MAX) return INT_MAX; else return (int)ret; } int BIO_nread(BIO *bio, char **buf, int num) { int ret; if (!bio->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -2; } ret = (int)BIO_ctrl(bio, BIO_C_NREAD, num, buf); if (ret > 0) bio->num_read += ret; return ret; } int BIO_nwrite0(BIO *bio, char **buf) { long ret; if (!bio->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -2; } ret = BIO_ctrl(bio, BIO_C_NWRITE0, 0, buf); if (ret > INT_MAX) return INT_MAX; else return (int)ret; } int BIO_nwrite(BIO *bio, char **buf, int num) { int ret; if (!bio->init) { ERR_raise(ERR_LIB_BIO, BIO_R_UNINITIALIZED); return -2; } ret = BIO_ctrl(bio, BIO_C_NWRITE, num, buf); if (ret > 0) bio->num_write += ret; return ret; }
bio
openssl/crypto/bio/bss_bio.c
openssl
#include <stdio.h> #include "bio_local.h" #define DUMP_WIDTH 16 #define DUMP_WIDTH_LESS_INDENT(i) (DUMP_WIDTH - ((i - (i > 6 ? 6 : i) + 3) / 4)) #define SPACE(buf, pos, n) (sizeof(buf) - (pos) > (n)) int BIO_dump_cb(int (*cb) (const void *data, size_t len, void *u), void *u, const void *s, int len) { return BIO_dump_indent_cb(cb, u, s, len, 0); } int BIO_dump_indent_cb(int (*cb) (const void *data, size_t len, void *u), void *u, const void *v, int len, int indent) { const unsigned char *s = v; int res, ret = 0; char buf[288 + 1]; int i, j, rows, n; unsigned char ch; int dump_width; if (indent < 0) indent = 0; else if (indent > 64) indent = 64; dump_width = DUMP_WIDTH_LESS_INDENT(indent); rows = len / dump_width; if ((rows * dump_width) < len) rows++; for (i = 0; i < rows; i++) { n = BIO_snprintf(buf, sizeof(buf), "%*s%04x - ", indent, "", i * dump_width); for (j = 0; j < dump_width; j++) { if (SPACE(buf, n, 3)) { if (((i * dump_width) + j) >= len) { strcpy(buf + n, " "); } else { ch = *(s + i * dump_width + j) & 0xff; BIO_snprintf(buf + n, 4, "%02x%c", ch, j == 7 ? '-' : ' '); } n += 3; } } if (SPACE(buf, n, 2)) { strcpy(buf + n, " "); n += 2; } for (j = 0; j < dump_width; j++) { if (((i * dump_width) + j) >= len) break; if (SPACE(buf, n, 1)) { ch = *(s + i * dump_width + j) & 0xff; #ifndef CHARSET_EBCDIC buf[n++] = ((ch >= ' ') && (ch <= '~')) ? ch : '.'; #else buf[n++] = ((ch >= os_toascii[' ']) && (ch <= os_toascii['~'])) ? os_toebcdic[ch] : '.'; #endif buf[n] = '\0'; } } if (SPACE(buf, n, 1)) { buf[n++] = '\n'; buf[n] = '\0'; } res = cb((void *)buf, n, u); if (res < 0) return res; ret += res; } return ret; } #ifndef OPENSSL_NO_STDIO static int write_fp(const void *data, size_t len, void *fp) { return UP_fwrite(data, len, 1, fp); } int BIO_dump_fp(FILE *fp, const void *s, int len) { return BIO_dump_cb(write_fp, fp, s, len); } int BIO_dump_indent_fp(FILE *fp, const void *s, int len, int indent) { return BIO_dump_indent_cb(write_fp, fp, s, len, indent); } #endif static int write_bio(const void *data, size_t len, void *bp) { return BIO_write((BIO *)bp, (const char *)data, len); } int BIO_dump(BIO *bp, const void *s, int len) { return BIO_dump_cb(write_bio, bp, s, len); } int BIO_dump_indent(BIO *bp, const void *s, int len, int indent) { return BIO_dump_indent_cb(write_bio, bp, s, len, indent); } int BIO_hex_string(BIO *out, int indent, int width, const void *data, int datalen) { const unsigned char *d = data; int i, j = 0; if (datalen < 1) return 1; for (i = 0; i < datalen - 1; i++) { if (i && !j) BIO_printf(out, "%*s", indent, ""); BIO_printf(out, "%02X:", d[i]); if (++j >= width) { j = 0; BIO_printf(out, "\n"); } } if (i && !j) BIO_printf(out, "%*s", indent, ""); BIO_printf(out, "%02X", d[datalen - 1]); return 1; }
bio
openssl/crypto/bio/bio_dump.c
openssl
#ifndef _GNU_SOURCE # define _GNU_SOURCE #endif #include <stdio.h> #include <errno.h> #include "internal/time.h" #include "bio_local.h" #ifndef OPENSSL_NO_DGRAM # ifndef OPENSSL_NO_SCTP # include <netinet/sctp.h> # include <fcntl.h> # define OPENSSL_SCTP_DATA_CHUNK_TYPE 0x00 # define OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE 0xc0 # endif # if defined(OPENSSL_SYS_LINUX) && !defined(IP_MTU) # define IP_MTU 14 # endif # if OPENSSL_USE_IPV6 && !defined(IPPROTO_IPV6) # define IPPROTO_IPV6 41 # endif # if defined(__FreeBSD__) && defined(IN6_IS_ADDR_V4MAPPED) # undef IN6_IS_ADDR_V4MAPPED # define s6_addr32 __u6_addr.__u6_addr32 # define IN6_IS_ADDR_V4MAPPED(a) \ (((a)->s6_addr32[0] == 0) && \ ((a)->s6_addr32[1] == 0) && \ ((a)->s6_addr32[2] == htonl(0x0000ffff))) # endif # define M_METHOD_NONE 0 # define M_METHOD_RECVMMSG 1 # define M_METHOD_RECVMSG 2 # define M_METHOD_RECVFROM 3 # define M_METHOD_WSARECVMSG 4 # if defined(__GLIBC__) && defined(__GLIBC_PREREQ) # if !(__GLIBC_PREREQ(2, 14)) # undef NO_RECVMMSG # define NO_RECVMMSG # endif # endif # if defined(__GNU__) #undef NO_RECVMSG #define NO_RECVMSG # endif # if defined(__ANDROID_API__) && __ANDROID_API__ < 21 # undef NO_RECVMMSG # define NO_RECVMMSG # endif # if !defined(M_METHOD) # if defined(OPENSSL_SYS_WINDOWS) && defined(BIO_HAVE_WSAMSG) && !defined(NO_WSARECVMSG) # define M_METHOD M_METHOD_WSARECVMSG # elif !defined(OPENSSL_SYS_WINDOWS) && defined(MSG_WAITFORONE) && !defined(NO_RECVMMSG) # define M_METHOD M_METHOD_RECVMMSG # elif !defined(OPENSSL_SYS_WINDOWS) && defined(CMSG_LEN) && !defined(NO_RECVMSG) # define M_METHOD M_METHOD_RECVMSG # elif !defined(NO_RECVFROM) # define M_METHOD M_METHOD_RECVFROM # else # define M_METHOD M_METHOD_NONE # endif # endif # if defined(OPENSSL_SYS_WINDOWS) # define BIO_CMSG_SPACE(x) WSA_CMSG_SPACE(x) # define BIO_CMSG_FIRSTHDR(x) WSA_CMSG_FIRSTHDR(x) # define BIO_CMSG_NXTHDR(x, y) WSA_CMSG_NXTHDR(x, y) # define BIO_CMSG_DATA(x) WSA_CMSG_DATA(x) # define BIO_CMSG_LEN(x) WSA_CMSG_LEN(x) # define MSGHDR_TYPE WSAMSG # define CMSGHDR_TYPE WSACMSGHDR # else # define MSGHDR_TYPE struct msghdr # define CMSGHDR_TYPE struct cmsghdr # define BIO_CMSG_SPACE(x) CMSG_SPACE(x) # define BIO_CMSG_FIRSTHDR(x) CMSG_FIRSTHDR(x) # define BIO_CMSG_NXTHDR(x, y) CMSG_NXTHDR(x, y) # define BIO_CMSG_DATA(x) CMSG_DATA(x) # define BIO_CMSG_LEN(x) CMSG_LEN(x) # endif # if M_METHOD == M_METHOD_RECVMMSG \ || M_METHOD == M_METHOD_RECVMSG \ || M_METHOD == M_METHOD_WSARECVMSG # if defined(__APPLE__) # define BIO_CMSG_ALLOC_LEN 64 # else # if defined(IPV6_PKTINFO) # define BIO_CMSG_ALLOC_LEN_1 BIO_CMSG_SPACE(sizeof(struct in6_pktinfo)) # else # define BIO_CMSG_ALLOC_LEN_1 0 # endif # if defined(IP_PKTINFO) # define BIO_CMSG_ALLOC_LEN_2 BIO_CMSG_SPACE(sizeof(struct in_pktinfo)) # else # define BIO_CMSG_ALLOC_LEN_2 0 # endif # if defined(IP_RECVDSTADDR) # define BIO_CMSG_ALLOC_LEN_3 BIO_CMSG_SPACE(sizeof(struct in_addr)) # else # define BIO_CMSG_ALLOC_LEN_3 0 # endif # define BIO_MAX(X,Y) ((X) > (Y) ? (X) : (Y)) # define BIO_CMSG_ALLOC_LEN \ BIO_MAX(BIO_CMSG_ALLOC_LEN_1, \ BIO_MAX(BIO_CMSG_ALLOC_LEN_2, BIO_CMSG_ALLOC_LEN_3)) # endif # if (defined(IP_PKTINFO) || defined(IP_RECVDSTADDR)) && defined(IPV6_RECVPKTINFO) # define SUPPORT_LOCAL_ADDR # endif # endif # define BIO_MSG_N(array, stride, n) (*(BIO_MSG *)((char *)(array) + (n)*(stride))) static int dgram_write(BIO *h, const char *buf, int num); static int dgram_read(BIO *h, char *buf, int size); static int dgram_puts(BIO *h, const char *str); static long dgram_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int dgram_new(BIO *h); static int dgram_free(BIO *data); static int dgram_clear(BIO *bio); static int dgram_sendmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed); static int dgram_recvmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed); # ifndef OPENSSL_NO_SCTP static int dgram_sctp_write(BIO *h, const char *buf, int num); static int dgram_sctp_read(BIO *h, char *buf, int size); static int dgram_sctp_puts(BIO *h, const char *str); static long dgram_sctp_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int dgram_sctp_new(BIO *h); static int dgram_sctp_free(BIO *data); static int dgram_sctp_wait_for_dry(BIO *b); static int dgram_sctp_msg_waiting(BIO *b); # ifdef SCTP_AUTHENTICATION_EVENT static void dgram_sctp_handle_auth_free_key_event(BIO *b, union sctp_notification *snp); # endif # endif static int BIO_dgram_should_retry(int s); static const BIO_METHOD methods_dgramp = { BIO_TYPE_DGRAM, "datagram socket", bwrite_conv, dgram_write, bread_conv, dgram_read, dgram_puts, NULL, dgram_ctrl, dgram_new, dgram_free, NULL, dgram_sendmmsg, dgram_recvmmsg, }; # ifndef OPENSSL_NO_SCTP static const BIO_METHOD methods_dgramp_sctp = { BIO_TYPE_DGRAM_SCTP, "datagram sctp socket", bwrite_conv, dgram_sctp_write, bread_conv, dgram_sctp_read, dgram_sctp_puts, NULL, dgram_sctp_ctrl, dgram_sctp_new, dgram_sctp_free, NULL, NULL, NULL, }; # endif typedef struct bio_dgram_data_st { BIO_ADDR peer; BIO_ADDR local_addr; unsigned int connected; unsigned int _errno; unsigned int mtu; OSSL_TIME next_timeout; OSSL_TIME socket_timeout; unsigned int peekmode; char local_addr_enabled; } bio_dgram_data; # ifndef OPENSSL_NO_SCTP typedef struct bio_dgram_sctp_save_message_st { BIO *bio; char *data; int length; } bio_dgram_sctp_save_message; typedef struct bio_dgram_sctp_data_st { bio_dgram_data dgram; struct bio_dgram_sctp_sndinfo sndinfo; struct bio_dgram_sctp_rcvinfo rcvinfo; struct bio_dgram_sctp_prinfo prinfo; BIO_dgram_sctp_notification_handler_fn handle_notifications; void *notification_context; int in_handshake; int ccs_rcvd; int ccs_sent; int save_shutdown; int peer_auth_tested; } bio_dgram_sctp_data; # endif const BIO_METHOD *BIO_s_datagram(void) { return &methods_dgramp; } BIO *BIO_new_dgram(int fd, int close_flag) { BIO *ret; ret = BIO_new(BIO_s_datagram()); if (ret == NULL) return NULL; BIO_set_fd(ret, fd, close_flag); return ret; } static int dgram_new(BIO *bi) { bio_dgram_data *data = OPENSSL_zalloc(sizeof(*data)); if (data == NULL) return 0; bi->ptr = data; return 1; } static int dgram_free(BIO *a) { bio_dgram_data *data; if (a == NULL) return 0; if (!dgram_clear(a)) return 0; data = (bio_dgram_data *)a->ptr; OPENSSL_free(data); return 1; } static int dgram_clear(BIO *a) { if (a == NULL) return 0; if (a->shutdown) { if (a->init) { BIO_closesocket(a->num); } a->init = 0; a->flags = 0; } return 1; } static void dgram_adjust_rcv_timeout(BIO *b) { # if defined(SO_RCVTIMEO) bio_dgram_data *data = (bio_dgram_data *)b->ptr; OSSL_TIME timeleft; if (!ossl_time_is_zero(data->next_timeout)) { # ifdef OPENSSL_SYS_WINDOWS int timeout; int sz = sizeof(timeout); if (getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, (void *)&timeout, &sz) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockopt()"); else data->socket_timeout = ossl_ms2time(timeout); # else struct timeval tv; socklen_t sz = sizeof(tv); if (getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, &tv, &sz) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockopt()"); else data->socket_timeout = ossl_time_from_timeval(tv); # endif timeleft = ossl_time_subtract(data->next_timeout, ossl_time_now()); if (ossl_time_compare(timeleft, ossl_ticks2time(OSSL_TIME_US)) < 0) timeleft = ossl_ticks2time(OSSL_TIME_US); if (ossl_time_is_zero(data->socket_timeout) || ossl_time_compare(data->socket_timeout, timeleft) >= 0) { # ifdef OPENSSL_SYS_WINDOWS timeout = (int)ossl_time2ms(timeleft); if (setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, (void *)&timeout, sizeof(timeout)) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # else tv = ossl_time_to_timeval(timeleft); if (setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv)) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # endif } } # endif } static void dgram_update_local_addr(BIO *b) { bio_dgram_data *data = (bio_dgram_data *)b->ptr; socklen_t addr_len = sizeof(data->local_addr); if (getsockname(b->num, &data->local_addr.sa, &addr_len) < 0) BIO_ADDR_clear(&data->local_addr); } # if M_METHOD == M_METHOD_RECVMMSG || M_METHOD == M_METHOD_RECVMSG || M_METHOD == M_METHOD_WSARECVMSG static int dgram_get_sock_family(BIO *b) { bio_dgram_data *data = (bio_dgram_data *)b->ptr; return data->local_addr.sa.sa_family; } # endif static void dgram_reset_rcv_timeout(BIO *b) { # if defined(SO_RCVTIMEO) bio_dgram_data *data = (bio_dgram_data *)b->ptr; if (!ossl_time_is_zero(data->next_timeout)) { # ifdef OPENSSL_SYS_WINDOWS int timeout = (int)ossl_time2ms(data->socket_timeout); if (setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, (void *)&timeout, sizeof(timeout)) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # else struct timeval tv = ossl_time_to_timeval(data->socket_timeout); if (setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv)) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # endif } # endif } static int dgram_read(BIO *b, char *out, int outl) { int ret = 0; bio_dgram_data *data = (bio_dgram_data *)b->ptr; int flags = 0; BIO_ADDR peer; socklen_t len = sizeof(peer); if (out != NULL) { clear_socket_error(); BIO_ADDR_clear(&peer); dgram_adjust_rcv_timeout(b); if (data->peekmode) flags = MSG_PEEK; ret = recvfrom(b->num, out, outl, flags, BIO_ADDR_sockaddr_noconst(&peer), &len); if (!data->connected && ret >= 0) BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &peer); BIO_clear_retry_flags(b); if (ret < 0) { if (BIO_dgram_should_retry(ret)) { BIO_set_retry_read(b); data->_errno = get_last_socket_error(); } } dgram_reset_rcv_timeout(b); } return ret; } static int dgram_write(BIO *b, const char *in, int inl) { int ret; bio_dgram_data *data = (bio_dgram_data *)b->ptr; clear_socket_error(); if (data->connected) ret = writesocket(b->num, in, inl); else { int peerlen = BIO_ADDR_sockaddr_size(&data->peer); ret = sendto(b->num, in, inl, 0, BIO_ADDR_sockaddr(&data->peer), peerlen); } BIO_clear_retry_flags(b); if (ret <= 0) { if (BIO_dgram_should_retry(ret)) { BIO_set_retry_write(b); data->_errno = get_last_socket_error(); } } return ret; } static long dgram_get_mtu_overhead(bio_dgram_data *data) { long ret; switch (BIO_ADDR_family(&data->peer)) { case AF_INET: ret = 28; break; # if OPENSSL_USE_IPV6 case AF_INET6: { # ifdef IN6_IS_ADDR_V4MAPPED struct in6_addr tmp_addr; if (BIO_ADDR_rawaddress(&data->peer, &tmp_addr, NULL) && IN6_IS_ADDR_V4MAPPED(&tmp_addr)) ret = 28; else # endif ret = 48; } break; # endif default: ret = 28; break; } return ret; } # if defined(SUPPORT_LOCAL_ADDR) static int enable_local_addr(BIO *b, int enable) { int af = dgram_get_sock_family(b); if (af == AF_INET) { # if defined(IP_PKTINFO) if (setsockopt(b->num, IPPROTO_IP, IP_PKTINFO, (void *)&enable, sizeof(enable)) < 0) return 0; return 1; # elif defined(IP_RECVDSTADDR) if (setsockopt(b->num, IPPROTO_IP, IP_RECVDSTADDR, &enable, sizeof(enable)) < 0) return 0; return 1; # endif } # if OPENSSL_USE_IPV6 if (af == AF_INET6) { # if defined(IPV6_RECVPKTINFO) if (setsockopt(b->num, IPPROTO_IPV6, IPV6_RECVPKTINFO, &enable, sizeof(enable)) < 0) return 0; return 1; # endif } # endif return 0; } # endif static long dgram_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 1; int *ip; bio_dgram_data *data = NULL; # ifndef __DJGPP__ int sockopt_val = 0; # endif int d_errno; # if defined(OPENSSL_SYS_LINUX) && (defined(IP_MTU_DISCOVER) || defined(IP_MTU)) socklen_t sockopt_len; socklen_t addr_len; BIO_ADDR addr; # endif data = (bio_dgram_data *)b->ptr; switch (cmd) { case BIO_CTRL_RESET: num = 0; ret = 0; break; case BIO_CTRL_INFO: ret = 0; break; case BIO_C_SET_FD: dgram_clear(b); b->num = *((int *)ptr); b->shutdown = (int)num; b->init = 1; dgram_update_local_addr(b); # if defined(SUPPORT_LOCAL_ADDR) if (data->local_addr_enabled) { if (enable_local_addr(b, 1) < 1) data->local_addr_enabled = 0; } # endif break; case BIO_C_GET_FD: if (b->init) { ip = (int *)ptr; if (ip != NULL) *ip = b->num; ret = b->num; } else ret = -1; break; case BIO_CTRL_GET_CLOSE: ret = b->shutdown; break; case BIO_CTRL_SET_CLOSE: b->shutdown = (int)num; break; case BIO_CTRL_PENDING: case BIO_CTRL_WPENDING: ret = 0; break; case BIO_CTRL_DUP: case BIO_CTRL_FLUSH: ret = 1; break; case BIO_CTRL_DGRAM_CONNECT: BIO_ADDR_make(&data->peer, BIO_ADDR_sockaddr((BIO_ADDR *)ptr)); break; case BIO_CTRL_DGRAM_MTU_DISCOVER: # if defined(OPENSSL_SYS_LINUX) && defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DO) addr_len = (socklen_t) sizeof(addr); BIO_ADDR_clear(&addr); if (getsockname(b->num, &addr.sa, &addr_len) < 0) { ret = 0; break; } switch (addr.sa.sa_family) { case AF_INET: sockopt_val = IP_PMTUDISC_DO; if ((ret = setsockopt(b->num, IPPROTO_IP, IP_MTU_DISCOVER, &sockopt_val, sizeof(sockopt_val))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); break; # if OPENSSL_USE_IPV6 && defined(IPV6_MTU_DISCOVER) && defined(IPV6_PMTUDISC_DO) case AF_INET6: sockopt_val = IPV6_PMTUDISC_DO; if ((ret = setsockopt(b->num, IPPROTO_IPV6, IPV6_MTU_DISCOVER, &sockopt_val, sizeof(sockopt_val))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); break; # endif default: ret = -1; break; } # else ret = -1; # endif break; case BIO_CTRL_DGRAM_QUERY_MTU: # if defined(OPENSSL_SYS_LINUX) && defined(IP_MTU) addr_len = (socklen_t) sizeof(addr); BIO_ADDR_clear(&addr); if (getsockname(b->num, &addr.sa, &addr_len) < 0) { ret = 0; break; } sockopt_len = sizeof(sockopt_val); switch (addr.sa.sa_family) { case AF_INET: if ((ret = getsockopt(b->num, IPPROTO_IP, IP_MTU, (void *)&sockopt_val, &sockopt_len)) < 0 || sockopt_val < 0) { ret = 0; } else { data->mtu = sockopt_val - 8 - 20; ret = data->mtu; } break; # if OPENSSL_USE_IPV6 && defined(IPV6_MTU) case AF_INET6: if ((ret = getsockopt(b->num, IPPROTO_IPV6, IPV6_MTU, (void *)&sockopt_val, &sockopt_len)) < 0 || sockopt_val < 0) { ret = 0; } else { data->mtu = sockopt_val - 8 - 40; ret = data->mtu; } break; # endif default: ret = 0; break; } # else ret = 0; # endif break; case BIO_CTRL_DGRAM_GET_FALLBACK_MTU: ret = -dgram_get_mtu_overhead(data); switch (BIO_ADDR_family(&data->peer)) { case AF_INET: ret += 576; break; # if OPENSSL_USE_IPV6 case AF_INET6: { # ifdef IN6_IS_ADDR_V4MAPPED struct in6_addr tmp_addr; if (BIO_ADDR_rawaddress(&data->peer, &tmp_addr, NULL) && IN6_IS_ADDR_V4MAPPED(&tmp_addr)) ret += 576; else # endif ret += 1280; } break; # endif default: ret += 576; break; } break; case BIO_CTRL_DGRAM_GET_MTU: return data->mtu; case BIO_CTRL_DGRAM_SET_MTU: data->mtu = num; ret = num; break; case BIO_CTRL_DGRAM_SET_CONNECTED: if (ptr != NULL) { data->connected = 1; BIO_ADDR_make(&data->peer, BIO_ADDR_sockaddr((BIO_ADDR *)ptr)); } else { data->connected = 0; BIO_ADDR_clear(&data->peer); } break; case BIO_CTRL_DGRAM_GET_PEER: ret = BIO_ADDR_sockaddr_size(&data->peer); if (num == 0 || num > ret) num = ret; memcpy(ptr, &data->peer, (ret = num)); break; case BIO_CTRL_DGRAM_SET_PEER: BIO_ADDR_make(&data->peer, BIO_ADDR_sockaddr((BIO_ADDR *)ptr)); break; case BIO_CTRL_DGRAM_DETECT_PEER_ADDR: { BIO_ADDR xaddr, *p = &data->peer; socklen_t xaddr_len = sizeof(xaddr.sa); if (BIO_ADDR_family(p) == AF_UNSPEC) { if (getpeername(b->num, (void *)&xaddr.sa, &xaddr_len) == 0 && BIO_ADDR_family(&xaddr) != AF_UNSPEC) { p = &xaddr; } else { ret = 0; break; } } ret = BIO_ADDR_sockaddr_size(p); if (num == 0 || num > ret) num = ret; memcpy(ptr, p, (ret = num)); } break; case BIO_C_SET_NBIO: if (!BIO_socket_nbio(b->num, num != 0)) ret = 0; break; case BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT: data->next_timeout = ossl_time_from_timeval(*(struct timeval *)ptr); break; # if defined(SO_RCVTIMEO) case BIO_CTRL_DGRAM_SET_RECV_TIMEOUT: # ifdef OPENSSL_SYS_WINDOWS { struct timeval *tv = (struct timeval *)ptr; int timeout = tv->tv_sec * 1000 + tv->tv_usec / 1000; if ((ret = setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, (void *)&timeout, sizeof(timeout))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); } # else if ((ret = setsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, ptr, sizeof(struct timeval))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # endif break; case BIO_CTRL_DGRAM_GET_RECV_TIMEOUT: { # ifdef OPENSSL_SYS_WINDOWS int sz = 0; int timeout; struct timeval *tv = (struct timeval *)ptr; sz = sizeof(timeout); if ((ret = getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, (void *)&timeout, &sz)) < 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockopt()"); } else { tv->tv_sec = timeout / 1000; tv->tv_usec = (timeout % 1000) * 1000; ret = sizeof(*tv); } # else socklen_t sz = sizeof(struct timeval); if ((ret = getsockopt(b->num, SOL_SOCKET, SO_RCVTIMEO, ptr, &sz)) < 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockopt()"); } else { OPENSSL_assert((size_t)sz <= sizeof(struct timeval)); ret = (int)sz; } # endif } break; # endif # if defined(SO_SNDTIMEO) case BIO_CTRL_DGRAM_SET_SEND_TIMEOUT: # ifdef OPENSSL_SYS_WINDOWS { struct timeval *tv = (struct timeval *)ptr; int timeout = tv->tv_sec * 1000 + tv->tv_usec / 1000; if ((ret = setsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, (void *)&timeout, sizeof(timeout))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); } # else if ((ret = setsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, ptr, sizeof(struct timeval))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # endif break; case BIO_CTRL_DGRAM_GET_SEND_TIMEOUT: { # ifdef OPENSSL_SYS_WINDOWS int sz = 0; int timeout; struct timeval *tv = (struct timeval *)ptr; sz = sizeof(timeout); if ((ret = getsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, (void *)&timeout, &sz)) < 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockopt()"); } else { tv->tv_sec = timeout / 1000; tv->tv_usec = (timeout % 1000) * 1000; ret = sizeof(*tv); } # else socklen_t sz = sizeof(struct timeval); if ((ret = getsockopt(b->num, SOL_SOCKET, SO_SNDTIMEO, ptr, &sz)) < 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockopt()"); } else { OPENSSL_assert((size_t)sz <= sizeof(struct timeval)); ret = (int)sz; } # endif } break; # endif case BIO_CTRL_DGRAM_GET_SEND_TIMER_EXP: case BIO_CTRL_DGRAM_GET_RECV_TIMER_EXP: # ifdef OPENSSL_SYS_WINDOWS d_errno = (data->_errno == WSAETIMEDOUT); # else d_errno = (data->_errno == EAGAIN); # endif if (d_errno) { ret = 1; data->_errno = 0; } else ret = 0; break; # ifdef EMSGSIZE case BIO_CTRL_DGRAM_MTU_EXCEEDED: if (data->_errno == EMSGSIZE) { ret = 1; data->_errno = 0; } else ret = 0; break; # endif case BIO_CTRL_DGRAM_SET_DONT_FRAG: switch (data->peer.sa.sa_family) { case AF_INET: # if defined(IP_DONTFRAG) sockopt_val = num ? 1 : 0; if ((ret = setsockopt(b->num, IPPROTO_IP, IP_DONTFRAG, &sockopt_val, sizeof(sockopt_val))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # elif defined(OPENSSL_SYS_LINUX) && defined(IP_MTU_DISCOVER) && defined (IP_PMTUDISC_PROBE) sockopt_val = num ? IP_PMTUDISC_PROBE : IP_PMTUDISC_DONT; if ((ret = setsockopt(b->num, IPPROTO_IP, IP_MTU_DISCOVER, &sockopt_val, sizeof(sockopt_val))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # elif defined(OPENSSL_SYS_WINDOWS) && defined(IP_DONTFRAGMENT) sockopt_val = num ? 1 : 0; if ((ret = setsockopt(b->num, IPPROTO_IP, IP_DONTFRAGMENT, (const char *)&sockopt_val, sizeof(sockopt_val))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # else ret = -1; # endif break; # if OPENSSL_USE_IPV6 case AF_INET6: # if defined(IPV6_DONTFRAG) sockopt_val = num ? 1 : 0; if ((ret = setsockopt(b->num, IPPROTO_IPV6, IPV6_DONTFRAG, (const void *)&sockopt_val, sizeof(sockopt_val))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # elif defined(OPENSSL_SYS_LINUX) && defined(IPV6_MTUDISCOVER) sockopt_val = num ? IP_PMTUDISC_PROBE : IP_PMTUDISC_DONT; if ((ret = setsockopt(b->num, IPPROTO_IPV6, IPV6_MTU_DISCOVER, &sockopt_val, sizeof(sockopt_val))) < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling setsockopt()"); # else ret = -1; # endif break; # endif default: ret = -1; break; } break; case BIO_CTRL_DGRAM_GET_MTU_OVERHEAD: ret = dgram_get_mtu_overhead(data); break; case BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE: case BIO_CTRL_DGRAM_SET_PEEK_MODE: data->peekmode = (unsigned int)num; break; case BIO_CTRL_DGRAM_GET_LOCAL_ADDR_CAP: # if defined(SUPPORT_LOCAL_ADDR) ret = 1; # else ret = 0; # endif break; case BIO_CTRL_DGRAM_SET_LOCAL_ADDR_ENABLE: # if defined(SUPPORT_LOCAL_ADDR) num = num > 0; if (num != data->local_addr_enabled) { if (enable_local_addr(b, num) < 1) { ret = 0; break; } data->local_addr_enabled = (char)num; } # else ret = 0; # endif break; case BIO_CTRL_DGRAM_GET_LOCAL_ADDR_ENABLE: *(int *)ptr = data->local_addr_enabled; break; case BIO_CTRL_DGRAM_GET_EFFECTIVE_CAPS: ret = (long)(BIO_DGRAM_CAP_HANDLES_DST_ADDR | BIO_DGRAM_CAP_HANDLES_SRC_ADDR | BIO_DGRAM_CAP_PROVIDES_DST_ADDR | BIO_DGRAM_CAP_PROVIDES_SRC_ADDR); break; case BIO_CTRL_GET_RPOLL_DESCRIPTOR: case BIO_CTRL_GET_WPOLL_DESCRIPTOR: { BIO_POLL_DESCRIPTOR *pd = ptr; pd->type = BIO_POLL_DESCRIPTOR_TYPE_SOCK_FD; pd->value.fd = b->num; } break; default: ret = 0; break; } if (ret < 0) ret = -1; return ret; } static int dgram_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = dgram_write(bp, str, n); return ret; } # if M_METHOD == M_METHOD_WSARECVMSG static void translate_msg_win(BIO *b, WSAMSG *mh, WSABUF *iov, unsigned char *control, BIO_MSG *msg) { iov->len = msg->data_len; iov->buf = msg->data; mh->name = msg->peer != NULL ? &msg->peer->sa : NULL; if (msg->peer != NULL && dgram_get_sock_family(b) == AF_INET) mh->namelen = sizeof(struct sockaddr_in); # if OPENSSL_USE_IPV6 else if (msg->peer != NULL && dgram_get_sock_family(b) == AF_INET6) mh->namelen = sizeof(struct sockaddr_in6); # endif else mh->namelen = 0; mh->lpBuffers = iov; mh->dwBufferCount = 1; mh->Control.len = BIO_CMSG_ALLOC_LEN; mh->Control.buf = control; mh->dwFlags = 0; } # endif # if M_METHOD == M_METHOD_RECVMMSG || M_METHOD == M_METHOD_RECVMSG static void translate_msg(BIO *b, struct msghdr *mh, struct iovec *iov, unsigned char *control, BIO_MSG *msg) { iov->iov_base = msg->data; iov->iov_len = msg->data_len; mh->msg_name = msg->peer != NULL ? &msg->peer->sa : NULL; if (msg->peer != NULL && dgram_get_sock_family(b) == AF_INET) mh->msg_namelen = sizeof(struct sockaddr_in); # if OPENSSL_USE_IPV6 else if (msg->peer != NULL && dgram_get_sock_family(b) == AF_INET6) mh->msg_namelen = sizeof(struct sockaddr_in6); # endif else mh->msg_namelen = 0; mh->msg_iov = iov; mh->msg_iovlen = 1; mh->msg_control = msg->local != NULL ? control : NULL; mh->msg_controllen = msg->local != NULL ? BIO_CMSG_ALLOC_LEN : 0; mh->msg_flags = 0; } # endif # if M_METHOD == M_METHOD_RECVMMSG || M_METHOD == M_METHOD_RECVMSG || M_METHOD == M_METHOD_WSARECVMSG static int extract_local(BIO *b, MSGHDR_TYPE *mh, BIO_ADDR *local) { # if defined(IP_PKTINFO) || defined(IP_RECVDSTADDR) || defined(IPV6_PKTINFO) CMSGHDR_TYPE *cmsg; int af = dgram_get_sock_family(b); for (cmsg = BIO_CMSG_FIRSTHDR(mh); cmsg != NULL; cmsg = BIO_CMSG_NXTHDR(mh, cmsg)) { if (af == AF_INET) { if (cmsg->cmsg_level != IPPROTO_IP) continue; # if defined(IP_PKTINFO) if (cmsg->cmsg_type != IP_PKTINFO) continue; local->s_in.sin_addr = ((struct in_pktinfo *)BIO_CMSG_DATA(cmsg))->ipi_addr; # elif defined(IP_RECVDSTADDR) if (cmsg->cmsg_type != IP_RECVDSTADDR) continue; local->s_in.sin_addr = *(struct in_addr *)BIO_CMSG_DATA(cmsg); # endif # if defined(IP_PKTINFO) || defined(IP_RECVDSTADDR) { bio_dgram_data *data = b->ptr; local->s_in.sin_family = AF_INET; local->s_in.sin_port = data->local_addr.s_in.sin_port; } return 1; # endif } # if OPENSSL_USE_IPV6 else if (af == AF_INET6) { if (cmsg->cmsg_level != IPPROTO_IPV6) continue; # if defined(IPV6_RECVPKTINFO) if (cmsg->cmsg_type != IPV6_PKTINFO) continue; { bio_dgram_data *data = b->ptr; local->s_in6.sin6_addr = ((struct in6_pktinfo *)BIO_CMSG_DATA(cmsg))->ipi6_addr; local->s_in6.sin6_family = AF_INET6; local->s_in6.sin6_port = data->local_addr.s_in6.sin6_port; local->s_in6.sin6_scope_id = data->local_addr.s_in6.sin6_scope_id; local->s_in6.sin6_flowinfo = 0; } return 1; # endif } # endif } # endif return 0; } static int pack_local(BIO *b, MSGHDR_TYPE *mh, const BIO_ADDR *local) { int af = dgram_get_sock_family(b); # if defined(IP_PKTINFO) || defined(IP_RECVDSTADDR) || defined(IPV6_PKTINFO) CMSGHDR_TYPE *cmsg; bio_dgram_data *data = b->ptr; # endif if (af == AF_INET) { # if defined(IP_PKTINFO) struct in_pktinfo *info; # if defined(OPENSSL_SYS_WINDOWS) cmsg = (CMSGHDR_TYPE *)mh->Control.buf; # else cmsg = (CMSGHDR_TYPE *)mh->msg_control; # endif cmsg->cmsg_len = BIO_CMSG_LEN(sizeof(struct in_pktinfo)); cmsg->cmsg_level = IPPROTO_IP; cmsg->cmsg_type = IP_PKTINFO; info = (struct in_pktinfo *)BIO_CMSG_DATA(cmsg); # if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_CYGWIN) && !defined(__FreeBSD__) info->ipi_spec_dst = local->s_in.sin_addr; # endif info->ipi_addr.s_addr = 0; info->ipi_ifindex = 0; if (local->s_in.sin_port != 0 && data->local_addr.s_in.sin_port != local->s_in.sin_port) { ERR_raise(ERR_LIB_BIO, BIO_R_PORT_MISMATCH); return 0; } # if defined(OPENSSL_SYS_WINDOWS) mh->Control.len = BIO_CMSG_SPACE(sizeof(struct in_pktinfo)); # else mh->msg_controllen = BIO_CMSG_SPACE(sizeof(struct in_pktinfo)); # endif return 1; # elif defined(IP_SENDSRCADDR) struct in_addr *info; if (local->s_in.sin_addr.s_addr == data->local_addr.s_in.sin_addr.s_addr) { mh->msg_control = NULL; mh->msg_controllen = 0; return 1; } cmsg = (struct cmsghdr *)mh->msg_control; cmsg->cmsg_len = BIO_CMSG_LEN(sizeof(struct in_addr)); cmsg->cmsg_level = IPPROTO_IP; cmsg->cmsg_type = IP_SENDSRCADDR; info = (struct in_addr *)BIO_CMSG_DATA(cmsg); *info = local->s_in.sin_addr; if (local->s_in.sin_port != 0 && data->local_addr.s_in.sin_port != local->s_in.sin_port) { ERR_raise(ERR_LIB_BIO, BIO_R_PORT_MISMATCH); return 0; } mh->msg_controllen = BIO_CMSG_SPACE(sizeof(struct in_addr)); return 1; # endif } # if OPENSSL_USE_IPV6 else if (af == AF_INET6) { # if defined(IPV6_PKTINFO) struct in6_pktinfo *info; # if defined(OPENSSL_SYS_WINDOWS) cmsg = (CMSGHDR_TYPE *)mh->Control.buf; # else cmsg = (CMSGHDR_TYPE *)mh->msg_control; # endif cmsg->cmsg_len = BIO_CMSG_LEN(sizeof(struct in6_pktinfo)); cmsg->cmsg_level = IPPROTO_IPV6; cmsg->cmsg_type = IPV6_PKTINFO; info = (struct in6_pktinfo *)BIO_CMSG_DATA(cmsg); info->ipi6_addr = local->s_in6.sin6_addr; info->ipi6_ifindex = 0; if (local->s_in6.sin6_port != 0 && data->local_addr.s_in6.sin6_port != local->s_in6.sin6_port) { ERR_raise(ERR_LIB_BIO, BIO_R_PORT_MISMATCH); return 0; } if (local->s_in6.sin6_scope_id != 0 && data->local_addr.s_in6.sin6_scope_id != local->s_in6.sin6_scope_id) { ERR_raise(ERR_LIB_BIO, BIO_R_PORT_MISMATCH); return 0; } # if defined(OPENSSL_SYS_WINDOWS) mh->Control.len = BIO_CMSG_SPACE(sizeof(struct in6_pktinfo)); # else mh->msg_controllen = BIO_CMSG_SPACE(sizeof(struct in6_pktinfo)); # endif return 1; # endif } # endif return 0; } # endif # if M_METHOD != M_METHOD_NONE static int translate_flags(uint64_t flags) { return 0; } # endif static int dgram_sendmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed) { # if M_METHOD != M_METHOD_NONE && M_METHOD != M_METHOD_RECVMSG int ret; # endif # if M_METHOD == M_METHOD_RECVMMSG # define BIO_MAX_MSGS_PER_CALL 64 int sysflags; bio_dgram_data *data = (bio_dgram_data *)b->ptr; size_t i; struct mmsghdr mh[BIO_MAX_MSGS_PER_CALL]; struct iovec iov[BIO_MAX_MSGS_PER_CALL]; unsigned char control[BIO_MAX_MSGS_PER_CALL][BIO_CMSG_ALLOC_LEN]; int have_local_enabled = data->local_addr_enabled; # elif M_METHOD == M_METHOD_RECVMSG int sysflags; bio_dgram_data *data = (bio_dgram_data *)b->ptr; ossl_ssize_t l; struct msghdr mh; struct iovec iov; unsigned char control[BIO_CMSG_ALLOC_LEN]; int have_local_enabled = data->local_addr_enabled; # elif M_METHOD == M_METHOD_WSARECVMSG bio_dgram_data *data = (bio_dgram_data *)b->ptr; int have_local_enabled = data->local_addr_enabled; WSAMSG wmsg; WSABUF wbuf; DWORD num_bytes_sent = 0; unsigned char control[BIO_CMSG_ALLOC_LEN]; # endif # if M_METHOD == M_METHOD_RECVFROM || M_METHOD == M_METHOD_WSARECVMSG int sysflags; # endif if (num_msg == 0) { *num_processed = 0; return 1; } if (num_msg > OSSL_SSIZE_MAX) num_msg = OSSL_SSIZE_MAX; # if M_METHOD != M_METHOD_NONE sysflags = translate_flags(flags); # endif # if M_METHOD == M_METHOD_RECVMMSG if (num_msg > BIO_MAX_MSGS_PER_CALL) num_msg = BIO_MAX_MSGS_PER_CALL; for (i = 0; i < num_msg; ++i) { translate_msg(b, &mh[i].msg_hdr, &iov[i], control[i], &BIO_MSG_N(msg, stride, i)); if (BIO_MSG_N(msg, stride, i).local != NULL) { if (!have_local_enabled) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } if (pack_local(b, &mh[i].msg_hdr, BIO_MSG_N(msg, stride, i).local) < 1) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } } } ret = sendmmsg(b->num, mh, num_msg, sysflags); if (ret < 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); *num_processed = 0; return 0; } for (i = 0; i < (size_t)ret; ++i) { BIO_MSG_N(msg, stride, i).data_len = mh[i].msg_len; BIO_MSG_N(msg, stride, i).flags = 0; } *num_processed = (size_t)ret; return 1; # elif M_METHOD == M_METHOD_RECVMSG translate_msg(b, &mh, &iov, control, msg); if (msg->local != NULL) { if (!have_local_enabled) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } if (pack_local(b, &mh, msg->local) < 1) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } } l = sendmsg(b->num, &mh, sysflags); if (l < 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); *num_processed = 0; return 0; } msg->data_len = (size_t)l; msg->flags = 0; *num_processed = 1; return 1; # elif M_METHOD == M_METHOD_WSARECVMSG || M_METHOD == M_METHOD_RECVFROM # if M_METHOD == M_METHOD_WSARECVMSG if (bio_WSASendMsg != NULL) { translate_msg_win(b, &wmsg, &wbuf, control, msg); if (msg[0].local != NULL) { if (!have_local_enabled) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } if (pack_local(b, &wmsg, msg[0].local) < 1) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } } ret = WSASendMsg((SOCKET)b->num, &wmsg, 0, &num_bytes_sent, NULL, NULL); if (ret < 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); *num_processed = 0; return 0; } msg[0].data_len = num_bytes_sent; msg[0].flags = 0; *num_processed = 1; return 1; } # endif if (msg[0].local != NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } ret = sendto(b->num, msg[0].data, # if defined(OPENSSL_SYS_WINDOWS) (int)msg[0].data_len, # else msg[0].data_len, # endif sysflags, msg[0].peer != NULL ? BIO_ADDR_sockaddr(msg[0].peer) : NULL, msg[0].peer != NULL ? BIO_ADDR_sockaddr_size(msg[0].peer) : 0); if (ret <= 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); *num_processed = 0; return 0; } msg[0].data_len = ret; msg[0].flags = 0; *num_processed = 1; return 1; # else ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); *num_processed = 0; return 0; # endif } static int dgram_recvmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *num_processed) { # if M_METHOD != M_METHOD_NONE && M_METHOD != M_METHOD_RECVMSG int ret; # endif # if M_METHOD == M_METHOD_RECVMMSG int sysflags; bio_dgram_data *data = (bio_dgram_data *)b->ptr; size_t i; struct mmsghdr mh[BIO_MAX_MSGS_PER_CALL]; struct iovec iov[BIO_MAX_MSGS_PER_CALL]; unsigned char control[BIO_MAX_MSGS_PER_CALL][BIO_CMSG_ALLOC_LEN]; int have_local_enabled = data->local_addr_enabled; # elif M_METHOD == M_METHOD_RECVMSG int sysflags; bio_dgram_data *data = (bio_dgram_data *)b->ptr; ossl_ssize_t l; struct msghdr mh; struct iovec iov; unsigned char control[BIO_CMSG_ALLOC_LEN]; int have_local_enabled = data->local_addr_enabled; # elif M_METHOD == M_METHOD_WSARECVMSG bio_dgram_data *data = (bio_dgram_data *)b->ptr; int have_local_enabled = data->local_addr_enabled; WSAMSG wmsg; WSABUF wbuf; DWORD num_bytes_received = 0; unsigned char control[BIO_CMSG_ALLOC_LEN]; # endif # if M_METHOD == M_METHOD_RECVFROM || M_METHOD == M_METHOD_WSARECVMSG int sysflags; socklen_t slen; # endif if (num_msg == 0) { *num_processed = 0; return 1; } if (num_msg > OSSL_SSIZE_MAX) num_msg = OSSL_SSIZE_MAX; # if M_METHOD != M_METHOD_NONE sysflags = translate_flags(flags); # endif # if M_METHOD == M_METHOD_RECVMMSG if (num_msg > BIO_MAX_MSGS_PER_CALL) num_msg = BIO_MAX_MSGS_PER_CALL; for (i = 0; i < num_msg; ++i) { translate_msg(b, &mh[i].msg_hdr, &iov[i], control[i], &BIO_MSG_N(msg, stride, i)); if (BIO_MSG_N(msg, stride, i).local != NULL && !have_local_enabled) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } } ret = recvmmsg(b->num, mh, num_msg, sysflags, NULL); if (ret < 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); *num_processed = 0; return 0; } for (i = 0; i < (size_t)ret; ++i) { BIO_MSG_N(msg, stride, i).data_len = mh[i].msg_len; BIO_MSG_N(msg, stride, i).flags = 0; if (BIO_MSG_N(msg, stride, i).local != NULL) if (extract_local(b, &mh[i].msg_hdr, BIO_MSG_N(msg, stride, i).local) < 1) BIO_ADDR_clear(msg->local); } *num_processed = (size_t)ret; return 1; # elif M_METHOD == M_METHOD_RECVMSG translate_msg(b, &mh, &iov, control, msg); if (msg->local != NULL && !have_local_enabled) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } l = recvmsg(b->num, &mh, sysflags); if (l < 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); *num_processed = 0; return 0; } msg->data_len = (size_t)l; msg->flags = 0; if (msg->local != NULL) if (extract_local(b, &mh, msg->local) < 1) BIO_ADDR_clear(msg->local); *num_processed = 1; return 1; # elif M_METHOD == M_METHOD_RECVFROM || M_METHOD == M_METHOD_WSARECVMSG # if M_METHOD == M_METHOD_WSARECVMSG if (bio_WSARecvMsg != NULL) { translate_msg_win(b, &wmsg, &wbuf, control, msg); if (msg[0].local != NULL && !have_local_enabled) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } ret = WSARecvMsg((SOCKET)b->num, &wmsg, &num_bytes_received, NULL, NULL); if (ret < 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); *num_processed = 0; return 0; } msg[0].data_len = num_bytes_received; msg[0].flags = 0; if (msg[0].local != NULL) if (extract_local(b, &wmsg, msg[0].local) < 1) BIO_ADDR_clear(msg[0].local); *num_processed = 1; return 1; } # endif if (msg[0].local != NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_LOCAL_ADDR_NOT_AVAILABLE); *num_processed = 0; return 0; } slen = sizeof(*msg[0].peer); ret = recvfrom(b->num, msg[0].data, # if defined(OPENSSL_SYS_WINDOWS) (int)msg[0].data_len, # else msg[0].data_len, # endif sysflags, msg[0].peer != NULL ? &msg[0].peer->sa : NULL, msg[0].peer != NULL ? &slen : NULL); if (ret <= 0) { ERR_raise(ERR_LIB_SYS, get_last_socket_error()); return 0; } msg[0].data_len = ret; msg[0].flags = 0; *num_processed = 1; return 1; # else ERR_raise(ERR_LIB_BIO, BIO_R_UNSUPPORTED_METHOD); *num_processed = 0; return 0; # endif } # ifndef OPENSSL_NO_SCTP const BIO_METHOD *BIO_s_datagram_sctp(void) { return &methods_dgramp_sctp; } BIO *BIO_new_dgram_sctp(int fd, int close_flag) { BIO *bio; int ret, optval = 20000; int auth_data = 0, auth_forward = 0; unsigned char *p; struct sctp_authchunk auth; struct sctp_authchunks *authchunks; socklen_t sockopt_len; # ifdef SCTP_AUTHENTICATION_EVENT # ifdef SCTP_EVENT struct sctp_event event; # else struct sctp_event_subscribe event; # endif # endif bio = BIO_new(BIO_s_datagram_sctp()); if (bio == NULL) return NULL; BIO_set_fd(bio, fd, close_flag); auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE; ret = setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, sizeof(struct sctp_authchunk)); if (ret < 0) { BIO_vfree(bio); ERR_raise_data(ERR_LIB_BIO, ERR_R_SYS_LIB, "Ensure SCTP AUTH chunks are enabled in kernel"); return NULL; } auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE; ret = setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, sizeof(struct sctp_authchunk)); if (ret < 0) { BIO_vfree(bio); ERR_raise_data(ERR_LIB_BIO, ERR_R_SYS_LIB, "Ensure SCTP AUTH chunks are enabled in kernel"); return NULL; } sockopt_len = (socklen_t) (sizeof(sctp_assoc_t) + 256 * sizeof(uint8_t)); authchunks = OPENSSL_zalloc(sockopt_len); if (authchunks == NULL) { BIO_vfree(bio); return NULL; } ret = getsockopt(fd, IPPROTO_SCTP, SCTP_LOCAL_AUTH_CHUNKS, authchunks, &sockopt_len); if (ret < 0) { OPENSSL_free(authchunks); BIO_vfree(bio); return NULL; } for (p = (unsigned char *)authchunks->gauth_chunks; p < (unsigned char *)authchunks + sockopt_len; p += sizeof(uint8_t)) { if (*p == OPENSSL_SCTP_DATA_CHUNK_TYPE) auth_data = 1; if (*p == OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE) auth_forward = 1; } OPENSSL_free(authchunks); if (!auth_data || !auth_forward) { BIO_vfree(bio); ERR_raise_data(ERR_LIB_BIO, ERR_R_SYS_LIB, "Ensure SCTP AUTH chunks are enabled on the " "underlying socket"); return NULL; } # ifdef SCTP_AUTHENTICATION_EVENT # ifdef SCTP_EVENT memset(&event, 0, sizeof(event)); event.se_assoc_id = 0; event.se_type = SCTP_AUTHENTICATION_EVENT; event.se_on = 1; ret = setsockopt(fd, IPPROTO_SCTP, SCTP_EVENT, &event, sizeof(struct sctp_event)); if (ret < 0) { BIO_vfree(bio); return NULL; } # else sockopt_len = (socklen_t) sizeof(struct sctp_event_subscribe); ret = getsockopt(fd, IPPROTO_SCTP, SCTP_EVENTS, &event, &sockopt_len); if (ret < 0) { BIO_vfree(bio); return NULL; } event.sctp_authentication_event = 1; ret = setsockopt(fd, IPPROTO_SCTP, SCTP_EVENTS, &event, sizeof(struct sctp_event_subscribe)); if (ret < 0) { BIO_vfree(bio); return NULL; } # endif # endif ret = setsockopt(fd, IPPROTO_SCTP, SCTP_PARTIAL_DELIVERY_POINT, &optval, sizeof(optval)); if (ret < 0) { BIO_vfree(bio); return NULL; } return bio; } int BIO_dgram_is_sctp(BIO *bio) { return (BIO_method_type(bio) == BIO_TYPE_DGRAM_SCTP); } static int dgram_sctp_new(BIO *bi) { bio_dgram_sctp_data *data = NULL; bi->init = 0; bi->num = 0; if ((data = OPENSSL_zalloc(sizeof(*data))) == NULL) return 0; # ifdef SCTP_PR_SCTP_NONE data->prinfo.pr_policy = SCTP_PR_SCTP_NONE; # endif bi->ptr = data; bi->flags = 0; return 1; } static int dgram_sctp_free(BIO *a) { bio_dgram_sctp_data *data; if (a == NULL) return 0; if (!dgram_clear(a)) return 0; data = (bio_dgram_sctp_data *) a->ptr; if (data != NULL) OPENSSL_free(data); return 1; } # ifdef SCTP_AUTHENTICATION_EVENT void dgram_sctp_handle_auth_free_key_event(BIO *b, union sctp_notification *snp) { int ret; struct sctp_authkey_event *authkeyevent = &snp->sn_auth_event; if (authkeyevent->auth_indication == SCTP_AUTH_FREE_KEY) { struct sctp_authkeyid authkeyid; authkeyid.scact_keynumber = authkeyevent->auth_keynumber; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_DELETE_KEY, &authkeyid, sizeof(struct sctp_authkeyid)); } } # endif static int dgram_sctp_read(BIO *b, char *out, int outl) { int ret = 0, n = 0, i, optval; socklen_t optlen; bio_dgram_sctp_data *data = (bio_dgram_sctp_data *) b->ptr; struct msghdr msg; struct iovec iov; struct cmsghdr *cmsg; char cmsgbuf[512]; if (out != NULL) { clear_socket_error(); do { memset(&data->rcvinfo, 0, sizeof(data->rcvinfo)); iov.iov_base = out; iov.iov_len = outl; msg.msg_name = NULL; msg.msg_namelen = 0; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_control = cmsgbuf; msg.msg_controllen = 512; msg.msg_flags = 0; n = recvmsg(b->num, &msg, 0); if (n <= 0) { if (n < 0) ret = n; break; } if (msg.msg_controllen > 0) { for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { if (cmsg->cmsg_level != IPPROTO_SCTP) continue; # ifdef SCTP_RCVINFO if (cmsg->cmsg_type == SCTP_RCVINFO) { struct sctp_rcvinfo *rcvinfo; rcvinfo = (struct sctp_rcvinfo *)CMSG_DATA(cmsg); data->rcvinfo.rcv_sid = rcvinfo->rcv_sid; data->rcvinfo.rcv_ssn = rcvinfo->rcv_ssn; data->rcvinfo.rcv_flags = rcvinfo->rcv_flags; data->rcvinfo.rcv_ppid = rcvinfo->rcv_ppid; data->rcvinfo.rcv_tsn = rcvinfo->rcv_tsn; data->rcvinfo.rcv_cumtsn = rcvinfo->rcv_cumtsn; data->rcvinfo.rcv_context = rcvinfo->rcv_context; } # endif # ifdef SCTP_SNDRCV if (cmsg->cmsg_type == SCTP_SNDRCV) { struct sctp_sndrcvinfo *sndrcvinfo; sndrcvinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); data->rcvinfo.rcv_sid = sndrcvinfo->sinfo_stream; data->rcvinfo.rcv_ssn = sndrcvinfo->sinfo_ssn; data->rcvinfo.rcv_flags = sndrcvinfo->sinfo_flags; data->rcvinfo.rcv_ppid = sndrcvinfo->sinfo_ppid; data->rcvinfo.rcv_tsn = sndrcvinfo->sinfo_tsn; data->rcvinfo.rcv_cumtsn = sndrcvinfo->sinfo_cumtsn; data->rcvinfo.rcv_context = sndrcvinfo->sinfo_context; } # endif } } if (msg.msg_flags & MSG_NOTIFICATION) { union sctp_notification snp; memcpy(&snp, out, sizeof(snp)); if (snp.sn_header.sn_type == SCTP_SENDER_DRY_EVENT) { # ifdef SCTP_EVENT struct sctp_event event; # else struct sctp_event_subscribe event; socklen_t eventsize; # endif # ifdef SCTP_EVENT memset(&event, 0, sizeof(event)); event.se_assoc_id = 0; event.se_type = SCTP_SENDER_DRY_EVENT; event.se_on = 0; i = setsockopt(b->num, IPPROTO_SCTP, SCTP_EVENT, &event, sizeof(struct sctp_event)); if (i < 0) { ret = i; break; } # else eventsize = sizeof(struct sctp_event_subscribe); i = getsockopt(b->num, IPPROTO_SCTP, SCTP_EVENTS, &event, &eventsize); if (i < 0) { ret = i; break; } event.sctp_sender_dry_event = 0; i = setsockopt(b->num, IPPROTO_SCTP, SCTP_EVENTS, &event, sizeof(struct sctp_event_subscribe)); if (i < 0) { ret = i; break; } # endif } # ifdef SCTP_AUTHENTICATION_EVENT if (snp.sn_header.sn_type == SCTP_AUTHENTICATION_EVENT) dgram_sctp_handle_auth_free_key_event(b, &snp); # endif if (data->handle_notifications != NULL) data->handle_notifications(b, data->notification_context, (void *)out); memset(&snp, 0, sizeof(snp)); memset(out, 0, outl); } else { ret += n; } } while ((msg.msg_flags & MSG_NOTIFICATION) && (msg.msg_flags & MSG_EOR) && (ret < outl)); if (ret > 0 && !(msg.msg_flags & MSG_EOR)) { if (ret == outl) return -1; optlen = (socklen_t) sizeof(int); ret = getsockopt(b->num, SOL_SOCKET, SO_RCVBUF, &optval, &optlen); if (ret >= 0) OPENSSL_assert(optval >= 18445); optlen = (socklen_t) sizeof(int); ret = getsockopt(b->num, IPPROTO_SCTP, SCTP_PARTIAL_DELIVERY_POINT, &optval, &optlen); if (ret >= 0) OPENSSL_assert(optval >= 18445); OPENSSL_assert(!(msg.msg_flags & MSG_NOTIFICATION)); memset(out, 0, outl); BIO_set_retry_read(b); return -1; } BIO_clear_retry_flags(b); if (ret < 0) { if (BIO_dgram_should_retry(ret)) { BIO_set_retry_read(b); data->dgram._errno = get_last_socket_error(); } } if (!data->peer_auth_tested) { int ii, auth_data = 0, auth_forward = 0; unsigned char *p; struct sctp_authchunks *authchunks; optlen = (socklen_t) (sizeof(sctp_assoc_t) + 256 * sizeof(uint8_t)); authchunks = OPENSSL_malloc(optlen); if (authchunks == NULL) return -1; memset(authchunks, 0, optlen); ii = getsockopt(b->num, IPPROTO_SCTP, SCTP_PEER_AUTH_CHUNKS, authchunks, &optlen); if (ii >= 0) for (p = (unsigned char *)authchunks->gauth_chunks; p < (unsigned char *)authchunks + optlen; p += sizeof(uint8_t)) { if (*p == OPENSSL_SCTP_DATA_CHUNK_TYPE) auth_data = 1; if (*p == OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE) auth_forward = 1; } OPENSSL_free(authchunks); if (!auth_data || !auth_forward) { ERR_raise(ERR_LIB_BIO, BIO_R_CONNECT_ERROR); return -1; } data->peer_auth_tested = 1; } } return ret; } static int dgram_sctp_write(BIO *b, const char *in, int inl) { int ret; bio_dgram_sctp_data *data = (bio_dgram_sctp_data *) b->ptr; struct bio_dgram_sctp_sndinfo *sinfo = &(data->sndinfo); struct bio_dgram_sctp_prinfo *pinfo = &(data->prinfo); struct bio_dgram_sctp_sndinfo handshake_sinfo; struct iovec iov[1]; struct msghdr msg; struct cmsghdr *cmsg; # if defined(SCTP_SNDINFO) && defined(SCTP_PRINFO) char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndinfo)) + CMSG_SPACE(sizeof(struct sctp_prinfo))]; struct sctp_sndinfo *sndinfo; struct sctp_prinfo *prinfo; # else char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))]; struct sctp_sndrcvinfo *sndrcvinfo; # endif clear_socket_error(); if (in[0] != 23) { memset(&handshake_sinfo, 0, sizeof(handshake_sinfo)); # ifdef SCTP_SACK_IMMEDIATELY handshake_sinfo.snd_flags = SCTP_SACK_IMMEDIATELY; # endif sinfo = &handshake_sinfo; } if (data->save_shutdown) { ret = BIO_dgram_sctp_wait_for_dry(b); if (ret < 0) return -1; if (ret == 0) { BIO_clear_retry_flags(b); BIO_set_retry_write(b); return -1; } } iov[0].iov_base = (char *)in; iov[0].iov_len = inl; msg.msg_name = NULL; msg.msg_namelen = 0; msg.msg_iov = iov; msg.msg_iovlen = 1; msg.msg_control = (caddr_t) cmsgbuf; msg.msg_controllen = 0; msg.msg_flags = 0; # if defined(SCTP_SNDINFO) && defined(SCTP_PRINFO) cmsg = (struct cmsghdr *)cmsgbuf; cmsg->cmsg_level = IPPROTO_SCTP; cmsg->cmsg_type = SCTP_SNDINFO; cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndinfo)); sndinfo = (struct sctp_sndinfo *)CMSG_DATA(cmsg); memset(sndinfo, 0, sizeof(*sndinfo)); sndinfo->snd_sid = sinfo->snd_sid; sndinfo->snd_flags = sinfo->snd_flags; sndinfo->snd_ppid = sinfo->snd_ppid; sndinfo->snd_context = sinfo->snd_context; msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndinfo)); cmsg = (struct cmsghdr *)&cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndinfo))]; cmsg->cmsg_level = IPPROTO_SCTP; cmsg->cmsg_type = SCTP_PRINFO; cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_prinfo)); prinfo = (struct sctp_prinfo *)CMSG_DATA(cmsg); memset(prinfo, 0, sizeof(*prinfo)); prinfo->pr_policy = pinfo->pr_policy; prinfo->pr_value = pinfo->pr_value; msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_prinfo)); # else cmsg = (struct cmsghdr *)cmsgbuf; cmsg->cmsg_level = IPPROTO_SCTP; cmsg->cmsg_type = SCTP_SNDRCV; cmsg->cmsg_len = CMSG_LEN(sizeof(struct sctp_sndrcvinfo)); sndrcvinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); memset(sndrcvinfo, 0, sizeof(*sndrcvinfo)); sndrcvinfo->sinfo_stream = sinfo->snd_sid; sndrcvinfo->sinfo_flags = sinfo->snd_flags; # ifdef __FreeBSD__ sndrcvinfo->sinfo_flags |= pinfo->pr_policy; # endif sndrcvinfo->sinfo_ppid = sinfo->snd_ppid; sndrcvinfo->sinfo_context = sinfo->snd_context; sndrcvinfo->sinfo_timetolive = pinfo->pr_value; msg.msg_controllen += CMSG_SPACE(sizeof(struct sctp_sndrcvinfo)); # endif ret = sendmsg(b->num, &msg, 0); BIO_clear_retry_flags(b); if (ret <= 0) { if (BIO_dgram_should_retry(ret)) { BIO_set_retry_write(b); data->dgram._errno = get_last_socket_error(); } } return ret; } static long dgram_sctp_ctrl(BIO *b, int cmd, long num, void *ptr) { long ret = 1; bio_dgram_sctp_data *data = NULL; socklen_t sockopt_len = 0; struct sctp_authkeyid authkeyid; struct sctp_authkey *authkey = NULL; data = (bio_dgram_sctp_data *) b->ptr; switch (cmd) { case BIO_CTRL_DGRAM_QUERY_MTU: data->dgram.mtu = 16384; ret = data->dgram.mtu; break; case BIO_CTRL_DGRAM_SET_MTU: data->dgram.mtu = 16384; ret = data->dgram.mtu; break; case BIO_CTRL_DGRAM_SET_CONNECTED: case BIO_CTRL_DGRAM_CONNECT: ret = -1; break; case BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT: break; case BIO_CTRL_DGRAM_GET_MTU_OVERHEAD: ret = 0; break; case BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE: if (num > 0) data->in_handshake = 1; else data->in_handshake = 0; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_NODELAY, &data->in_handshake, sizeof(int)); break; case BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY: sockopt_len = sizeof(struct sctp_authkeyid); ret = getsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_ACTIVE_KEY, &authkeyid, &sockopt_len); if (ret < 0) break; sockopt_len = sizeof(struct sctp_authkey) + 64 * sizeof(uint8_t); authkey = OPENSSL_malloc(sockopt_len); if (authkey == NULL) { ret = -1; break; } memset(authkey, 0, sockopt_len); authkey->sca_keynumber = authkeyid.scact_keynumber + 1; # ifndef __FreeBSD__ authkey->sca_keylength = 64; # endif memcpy(&authkey->sca_key[0], ptr, 64 * sizeof(uint8_t)); ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_KEY, authkey, sockopt_len); OPENSSL_free(authkey); authkey = NULL; if (ret < 0) break; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_ACTIVE_KEY, &authkeyid, sizeof(struct sctp_authkeyid)); if (ret < 0) break; break; case BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY: sockopt_len = sizeof(struct sctp_authkeyid); ret = getsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_ACTIVE_KEY, &authkeyid, &sockopt_len); if (ret < 0) break; authkeyid.scact_keynumber = authkeyid.scact_keynumber + 1; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_ACTIVE_KEY, &authkeyid, sizeof(struct sctp_authkeyid)); if (ret < 0) break; data->ccs_sent = 1; case BIO_CTRL_DGRAM_SCTP_AUTH_CCS_RCVD: if (cmd == BIO_CTRL_DGRAM_SCTP_AUTH_CCS_RCVD) data->ccs_rcvd = 1; if (data->ccs_rcvd == 1 && data->ccs_sent == 1) { sockopt_len = sizeof(struct sctp_authkeyid); ret = getsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_ACTIVE_KEY, &authkeyid, &sockopt_len); if (ret < 0) break; authkeyid.scact_keynumber = authkeyid.scact_keynumber - 1; # ifdef SCTP_AUTH_DEACTIVATE_KEY sockopt_len = sizeof(struct sctp_authkeyid); ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_DEACTIVATE_KEY, &authkeyid, sockopt_len); if (ret < 0) break; # endif # ifndef SCTP_AUTHENTICATION_EVENT if (authkeyid.scact_keynumber > 0) { authkeyid.scact_keynumber = authkeyid.scact_keynumber - 1; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_AUTH_DELETE_KEY, &authkeyid, sizeof(struct sctp_authkeyid)); if (ret < 0) break; } # endif data->ccs_rcvd = 0; data->ccs_sent = 0; } break; case BIO_CTRL_DGRAM_SCTP_GET_SNDINFO: if (num > (long)sizeof(struct bio_dgram_sctp_sndinfo)) num = sizeof(struct bio_dgram_sctp_sndinfo); memcpy(ptr, &(data->sndinfo), num); ret = num; break; case BIO_CTRL_DGRAM_SCTP_SET_SNDINFO: if (num > (long)sizeof(struct bio_dgram_sctp_sndinfo)) num = sizeof(struct bio_dgram_sctp_sndinfo); memcpy(&(data->sndinfo), ptr, num); break; case BIO_CTRL_DGRAM_SCTP_GET_RCVINFO: if (num > (long)sizeof(struct bio_dgram_sctp_rcvinfo)) num = sizeof(struct bio_dgram_sctp_rcvinfo); memcpy(ptr, &data->rcvinfo, num); ret = num; break; case BIO_CTRL_DGRAM_SCTP_SET_RCVINFO: if (num > (long)sizeof(struct bio_dgram_sctp_rcvinfo)) num = sizeof(struct bio_dgram_sctp_rcvinfo); memcpy(&(data->rcvinfo), ptr, num); break; case BIO_CTRL_DGRAM_SCTP_GET_PRINFO: if (num > (long)sizeof(struct bio_dgram_sctp_prinfo)) num = sizeof(struct bio_dgram_sctp_prinfo); memcpy(ptr, &(data->prinfo), num); ret = num; break; case BIO_CTRL_DGRAM_SCTP_SET_PRINFO: if (num > (long)sizeof(struct bio_dgram_sctp_prinfo)) num = sizeof(struct bio_dgram_sctp_prinfo); memcpy(&(data->prinfo), ptr, num); break; case BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN: if (num > 0) data->save_shutdown = 1; else data->save_shutdown = 0; break; case BIO_CTRL_DGRAM_SCTP_WAIT_FOR_DRY: return dgram_sctp_wait_for_dry(b); case BIO_CTRL_DGRAM_SCTP_MSG_WAITING: return dgram_sctp_msg_waiting(b); default: ret = dgram_ctrl(b, cmd, num, ptr); break; } return ret; } int BIO_dgram_sctp_notification_cb(BIO *b, BIO_dgram_sctp_notification_handler_fn handle_notifications, void *context) { bio_dgram_sctp_data *data = (bio_dgram_sctp_data *) b->ptr; if (handle_notifications != NULL) { data->handle_notifications = handle_notifications; data->notification_context = context; } else return -1; return 0; } int BIO_dgram_sctp_wait_for_dry(BIO *b) { return (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SCTP_WAIT_FOR_DRY, 0, NULL); } static int dgram_sctp_wait_for_dry(BIO *b) { int is_dry = 0; int sockflags = 0; int n, ret; union sctp_notification snp; struct msghdr msg; struct iovec iov; # ifdef SCTP_EVENT struct sctp_event event; # else struct sctp_event_subscribe event; socklen_t eventsize; # endif bio_dgram_sctp_data *data = (bio_dgram_sctp_data *) b->ptr; # ifdef SCTP_EVENT memset(&event, 0, sizeof(event)); event.se_assoc_id = 0; event.se_type = SCTP_SENDER_DRY_EVENT; event.se_on = 1; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_EVENT, &event, sizeof(struct sctp_event)); # else eventsize = sizeof(struct sctp_event_subscribe); ret = getsockopt(b->num, IPPROTO_SCTP, SCTP_EVENTS, &event, &eventsize); if (ret < 0) return -1; event.sctp_sender_dry_event = 1; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_EVENTS, &event, sizeof(struct sctp_event_subscribe)); # endif if (ret < 0) return -1; memset(&snp, 0, sizeof(snp)); iov.iov_base = (char *)&snp; iov.iov_len = sizeof(union sctp_notification); msg.msg_name = NULL; msg.msg_namelen = 0; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_control = NULL; msg.msg_controllen = 0; msg.msg_flags = 0; n = recvmsg(b->num, &msg, MSG_PEEK); if (n <= 0) { if ((n < 0) && (get_last_socket_error() != EAGAIN) && (get_last_socket_error() != EWOULDBLOCK)) return -1; else return 0; } while (msg.msg_flags & MSG_NOTIFICATION) { memset(&snp, 0, sizeof(snp)); iov.iov_base = (char *)&snp; iov.iov_len = sizeof(union sctp_notification); msg.msg_name = NULL; msg.msg_namelen = 0; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_control = NULL; msg.msg_controllen = 0; msg.msg_flags = 0; n = recvmsg(b->num, &msg, 0); if (n <= 0) { if ((n < 0) && (get_last_socket_error() != EAGAIN) && (get_last_socket_error() != EWOULDBLOCK)) return -1; else return is_dry; } if (snp.sn_header.sn_type == SCTP_SENDER_DRY_EVENT) { is_dry = 1; # ifdef SCTP_EVENT memset(&event, 0, sizeof(event)); event.se_assoc_id = 0; event.se_type = SCTP_SENDER_DRY_EVENT; event.se_on = 0; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_EVENT, &event, sizeof(struct sctp_event)); # else eventsize = (socklen_t) sizeof(struct sctp_event_subscribe); ret = getsockopt(b->num, IPPROTO_SCTP, SCTP_EVENTS, &event, &eventsize); if (ret < 0) return -1; event.sctp_sender_dry_event = 0; ret = setsockopt(b->num, IPPROTO_SCTP, SCTP_EVENTS, &event, sizeof(struct sctp_event_subscribe)); # endif if (ret < 0) return -1; } # ifdef SCTP_AUTHENTICATION_EVENT if (snp.sn_header.sn_type == SCTP_AUTHENTICATION_EVENT) dgram_sctp_handle_auth_free_key_event(b, &snp); # endif if (data->handle_notifications != NULL) data->handle_notifications(b, data->notification_context, (void *)&snp); memset(&snp, 0, sizeof(snp)); iov.iov_base = (char *)&snp; iov.iov_len = sizeof(union sctp_notification); msg.msg_name = NULL; msg.msg_namelen = 0; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_control = NULL; msg.msg_controllen = 0; msg.msg_flags = 0; if (is_dry) { sockflags = fcntl(b->num, F_GETFL, 0); fcntl(b->num, F_SETFL, O_NONBLOCK); } n = recvmsg(b->num, &msg, MSG_PEEK); if (is_dry) { fcntl(b->num, F_SETFL, sockflags); } if (n <= 0) { if ((n < 0) && (get_last_socket_error() != EAGAIN) && (get_last_socket_error() != EWOULDBLOCK)) return -1; else return is_dry; } } return is_dry; } int BIO_dgram_sctp_msg_waiting(BIO *b) { return (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SCTP_MSG_WAITING, 0, NULL); } static int dgram_sctp_msg_waiting(BIO *b) { int n, sockflags; union sctp_notification snp; struct msghdr msg; struct iovec iov; bio_dgram_sctp_data *data = (bio_dgram_sctp_data *) b->ptr; do { memset(&snp, 0, sizeof(snp)); iov.iov_base = (char *)&snp; iov.iov_len = sizeof(union sctp_notification); msg.msg_name = NULL; msg.msg_namelen = 0; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_control = NULL; msg.msg_controllen = 0; msg.msg_flags = 0; sockflags = fcntl(b->num, F_GETFL, 0); fcntl(b->num, F_SETFL, O_NONBLOCK); n = recvmsg(b->num, &msg, MSG_PEEK); fcntl(b->num, F_SETFL, sockflags); if (n > 0 && (msg.msg_flags & MSG_NOTIFICATION)) { # ifdef SCTP_AUTHENTICATION_EVENT if (snp.sn_header.sn_type == SCTP_AUTHENTICATION_EVENT) dgram_sctp_handle_auth_free_key_event(b, &snp); # endif memset(&snp, 0, sizeof(snp)); iov.iov_base = (char *)&snp; iov.iov_len = sizeof(union sctp_notification); msg.msg_name = NULL; msg.msg_namelen = 0; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_control = NULL; msg.msg_controllen = 0; msg.msg_flags = 0; n = recvmsg(b->num, &msg, 0); if (data->handle_notifications != NULL) data->handle_notifications(b, data->notification_context, (void *)&snp); } } while (n > 0 && (msg.msg_flags & MSG_NOTIFICATION)); if (n > 0) return 1; else return 0; } static int dgram_sctp_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = dgram_sctp_write(bp, str, n); return ret; } # endif static int BIO_dgram_should_retry(int i) { int err; if ((i == 0) || (i == -1)) { err = get_last_socket_error(); # if defined(OPENSSL_SYS_WINDOWS) # endif return BIO_dgram_non_fatal_error(err); } return 0; } int BIO_dgram_non_fatal_error(int err) { switch (err) { # if defined(OPENSSL_SYS_WINDOWS) # if defined(WSAEWOULDBLOCK) case WSAEWOULDBLOCK: # endif # endif # ifdef EWOULDBLOCK # ifdef WSAEWOULDBLOCK # if WSAEWOULDBLOCK != EWOULDBLOCK case EWOULDBLOCK: # endif # else case EWOULDBLOCK: # endif # endif # ifdef EINTR case EINTR: # endif # ifdef EAGAIN # if EWOULDBLOCK != EAGAIN case EAGAIN: # endif # endif # ifdef EPROTO case EPROTO: # endif # ifdef EINPROGRESS case EINPROGRESS: # endif # ifdef EALREADY case EALREADY: # endif return 1; default: break; } return 0; } #endif
bio
openssl/crypto/bio/bss_dgram.c
openssl
#include <stdio.h> #include <string.h> #include "internal/cryptlib.h" #include "crypto/ctype.h" #include "internal/numbers.h" #include <openssl/bio.h> #include <openssl/configuration.h> #ifdef HAVE_LONG_DOUBLE # define LDOUBLE long double #else # define LDOUBLE double #endif static int fmtstr(char **, char **, size_t *, size_t *, const char *, int, int, int); static int fmtint(char **, char **, size_t *, size_t *, int64_t, int, int, int, int); #ifndef OPENSSL_SYS_UEFI static int fmtfp(char **, char **, size_t *, size_t *, LDOUBLE, int, int, int, int); #endif static int doapr_outch(char **, char **, size_t *, size_t *, int); static int _dopr(char **sbuffer, char **buffer, size_t *maxlen, size_t *retlen, int *truncated, const char *format, va_list args); #define DP_S_DEFAULT 0 #define DP_S_FLAGS 1 #define DP_S_MIN 2 #define DP_S_DOT 3 #define DP_S_MAX 4 #define DP_S_MOD 5 #define DP_S_CONV 6 #define DP_S_DONE 7 #define DP_F_MINUS (1 << 0) #define DP_F_PLUS (1 << 1) #define DP_F_SPACE (1 << 2) #define DP_F_NUM (1 << 3) #define DP_F_ZERO (1 << 4) #define DP_F_UP (1 << 5) #define DP_F_UNSIGNED (1 << 6) #define DP_C_SHORT 1 #define DP_C_LONG 2 #define DP_C_LDOUBLE 3 #define DP_C_LLONG 4 #define DP_C_SIZE 5 #define F_FORMAT 0 #define E_FORMAT 1 #define G_FORMAT 2 #define char_to_int(p) (p - '0') #define OSSL_MAX(p,q) ((p >= q) ? p : q) static int _dopr(char **sbuffer, char **buffer, size_t *maxlen, size_t *retlen, int *truncated, const char *format, va_list args) { char ch; int64_t value; #ifndef OPENSSL_SYS_UEFI LDOUBLE fvalue; #endif char *strvalue; int min; int max; int state; int flags; int cflags; size_t currlen; state = DP_S_DEFAULT; flags = currlen = cflags = min = 0; max = -1; ch = *format++; while (state != DP_S_DONE) { if (ch == '\0' || (buffer == NULL && currlen >= *maxlen)) state = DP_S_DONE; switch (state) { case DP_S_DEFAULT: if (ch == '%') state = DP_S_FLAGS; else if (!doapr_outch(sbuffer, buffer, &currlen, maxlen, ch)) return 0; ch = *format++; break; case DP_S_FLAGS: switch (ch) { case '-': flags |= DP_F_MINUS; ch = *format++; break; case '+': flags |= DP_F_PLUS; ch = *format++; break; case ' ': flags |= DP_F_SPACE; ch = *format++; break; case '#': flags |= DP_F_NUM; ch = *format++; break; case '0': flags |= DP_F_ZERO; ch = *format++; break; default: state = DP_S_MIN; break; } break; case DP_S_MIN: if (ossl_isdigit(ch)) { min = 10 * min + char_to_int(ch); ch = *format++; } else if (ch == '*') { min = va_arg(args, int); ch = *format++; state = DP_S_DOT; } else state = DP_S_DOT; break; case DP_S_DOT: if (ch == '.') { state = DP_S_MAX; ch = *format++; } else state = DP_S_MOD; break; case DP_S_MAX: if (ossl_isdigit(ch)) { if (max < 0) max = 0; max = 10 * max + char_to_int(ch); ch = *format++; } else if (ch == '*') { max = va_arg(args, int); ch = *format++; state = DP_S_MOD; } else state = DP_S_MOD; break; case DP_S_MOD: switch (ch) { case 'h': cflags = DP_C_SHORT; ch = *format++; break; case 'l': if (*format == 'l') { cflags = DP_C_LLONG; format++; } else cflags = DP_C_LONG; ch = *format++; break; case 'q': case 'j': cflags = DP_C_LLONG; ch = *format++; break; case 'L': cflags = DP_C_LDOUBLE; ch = *format++; break; case 'z': cflags = DP_C_SIZE; ch = *format++; break; default: break; } state = DP_S_CONV; break; case DP_S_CONV: switch (ch) { case 'd': case 'i': switch (cflags) { case DP_C_SHORT: value = (short int)va_arg(args, int); break; case DP_C_LONG: value = va_arg(args, long int); break; case DP_C_LLONG: value = va_arg(args, int64_t); break; case DP_C_SIZE: value = va_arg(args, ossl_ssize_t); break; default: value = va_arg(args, int); break; } if (!fmtint(sbuffer, buffer, &currlen, maxlen, value, 10, min, max, flags)) return 0; break; case 'X': flags |= DP_F_UP; case 'x': case 'o': case 'u': flags |= DP_F_UNSIGNED; switch (cflags) { case DP_C_SHORT: value = (unsigned short int)va_arg(args, unsigned int); break; case DP_C_LONG: value = va_arg(args, unsigned long int); break; case DP_C_LLONG: value = va_arg(args, uint64_t); break; case DP_C_SIZE: value = va_arg(args, size_t); break; default: value = va_arg(args, unsigned int); break; } if (!fmtint(sbuffer, buffer, &currlen, maxlen, value, ch == 'o' ? 8 : (ch == 'u' ? 10 : 16), min, max, flags)) return 0; break; #ifndef OPENSSL_SYS_UEFI case 'f': if (cflags == DP_C_LDOUBLE) fvalue = va_arg(args, LDOUBLE); else fvalue = va_arg(args, double); if (!fmtfp(sbuffer, buffer, &currlen, maxlen, fvalue, min, max, flags, F_FORMAT)) return 0; break; case 'E': flags |= DP_F_UP; case 'e': if (cflags == DP_C_LDOUBLE) fvalue = va_arg(args, LDOUBLE); else fvalue = va_arg(args, double); if (!fmtfp(sbuffer, buffer, &currlen, maxlen, fvalue, min, max, flags, E_FORMAT)) return 0; break; case 'G': flags |= DP_F_UP; case 'g': if (cflags == DP_C_LDOUBLE) fvalue = va_arg(args, LDOUBLE); else fvalue = va_arg(args, double); if (!fmtfp(sbuffer, buffer, &currlen, maxlen, fvalue, min, max, flags, G_FORMAT)) return 0; break; #else case 'f': case 'E': case 'e': case 'G': case 'g': ERR_raise(ERR_LIB_BIO, ERR_R_UNSUPPORTED); return 0; #endif case 'c': if (!doapr_outch(sbuffer, buffer, &currlen, maxlen, va_arg(args, int))) return 0; break; case 's': strvalue = va_arg(args, char *); if (max < 0) { if (buffer) max = INT_MAX; else max = *maxlen; } if (!fmtstr(sbuffer, buffer, &currlen, maxlen, strvalue, flags, min, max)) return 0; break; case 'p': value = (size_t)va_arg(args, void *); if (!fmtint(sbuffer, buffer, &currlen, maxlen, value, 16, min, max, flags | DP_F_NUM)) return 0; break; case 'n': { int *num; num = va_arg(args, int *); *num = currlen; } break; case '%': if (!doapr_outch(sbuffer, buffer, &currlen, maxlen, ch)) return 0; break; case 'w': format++; break; default: break; } ch = *format++; state = DP_S_DEFAULT; flags = cflags = min = 0; max = -1; break; case DP_S_DONE: break; default: break; } } if (buffer == NULL) { *truncated = (currlen > *maxlen - 1); if (*truncated) currlen = *maxlen - 1; } if (!doapr_outch(sbuffer, buffer, &currlen, maxlen, '\0')) return 0; *retlen = currlen - 1; return 1; } static int fmtstr(char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, const char *value, int flags, int min, int max) { int padlen; size_t strln; int cnt = 0; if (value == 0) value = "<NULL>"; strln = OPENSSL_strnlen(value, max < 0 ? SIZE_MAX : (size_t)max); padlen = min - strln; if (min < 0 || padlen < 0) padlen = 0; if (max >= 0) { if (max < INT_MAX - padlen) max += padlen; else max = INT_MAX; } if (flags & DP_F_MINUS) padlen = -padlen; while ((padlen > 0) && (max < 0 || cnt < max)) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, ' ')) return 0; --padlen; ++cnt; } while (strln > 0 && (max < 0 || cnt < max)) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, *value++)) return 0; --strln; ++cnt; } while ((padlen < 0) && (max < 0 || cnt < max)) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, ' ')) return 0; ++padlen; ++cnt; } return 1; } static int fmtint(char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, int64_t value, int base, int min, int max, int flags) { int signvalue = 0; const char *prefix = ""; uint64_t uvalue; char convert[DECIMAL_SIZE(value) + 3]; int place = 0; int spadlen = 0; int zpadlen = 0; int caps = 0; if (max < 0) max = 0; uvalue = value; if (!(flags & DP_F_UNSIGNED)) { if (value < 0) { signvalue = '-'; uvalue = 0 - (uint64_t)value; } else if (flags & DP_F_PLUS) signvalue = '+'; else if (flags & DP_F_SPACE) signvalue = ' '; } if (flags & DP_F_NUM) { if (base == 8) prefix = "0"; if (base == 16) prefix = "0x"; } if (flags & DP_F_UP) caps = 1; do { convert[place++] = (caps ? "0123456789ABCDEF" : "0123456789abcdef") [uvalue % (unsigned)base]; uvalue = (uvalue / (unsigned)base); } while (uvalue && (place < (int)sizeof(convert))); if (place == sizeof(convert)) place--; convert[place] = 0; zpadlen = max - place; spadlen = min - OSSL_MAX(max, place) - (signvalue ? 1 : 0) - strlen(prefix); if (zpadlen < 0) zpadlen = 0; if (spadlen < 0) spadlen = 0; if (flags & DP_F_ZERO) { zpadlen = OSSL_MAX(zpadlen, spadlen); spadlen = 0; } if (flags & DP_F_MINUS) spadlen = -spadlen; while (spadlen > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, ' ')) return 0; --spadlen; } if (signvalue) if (!doapr_outch(sbuffer, buffer, currlen, maxlen, signvalue)) return 0; while (*prefix) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, *prefix)) return 0; prefix++; } if (zpadlen > 0) { while (zpadlen > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, '0')) return 0; --zpadlen; } } while (place > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, convert[--place])) return 0; } while (spadlen < 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, ' ')) return 0; ++spadlen; } return 1; } #ifndef OPENSSL_SYS_UEFI static LDOUBLE abs_val(LDOUBLE value) { LDOUBLE result = value; if (value < 0) result = -value; return result; } static LDOUBLE pow_10(int in_exp) { LDOUBLE result = 1; while (in_exp) { result *= 10; in_exp--; } return result; } static long roundv(LDOUBLE value) { long intpart; intpart = (long)value; value = value - intpart; if (value >= 0.5) intpart++; return intpart; } static int fmtfp(char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, LDOUBLE fvalue, int min, int max, int flags, int style) { int signvalue = 0; LDOUBLE ufvalue; LDOUBLE tmpvalue; char iconvert[20]; char fconvert[20]; char econvert[20]; int iplace = 0; int fplace = 0; int eplace = 0; int padlen = 0; int zpadlen = 0; long exp = 0; unsigned long intpart; unsigned long fracpart; unsigned long max10; int realstyle; if (max < 0) max = 6; if (fvalue < 0) signvalue = '-'; else if (flags & DP_F_PLUS) signvalue = '+'; else if (flags & DP_F_SPACE) signvalue = ' '; if (style == G_FORMAT) { if (fvalue == 0.0) { realstyle = F_FORMAT; } else if (fvalue < 0.0001) { realstyle = E_FORMAT; } else if ((max == 0 && fvalue >= 10) || (max > 0 && fvalue >= pow_10(max))) { realstyle = E_FORMAT; } else { realstyle = F_FORMAT; } } else { realstyle = style; } if (style != F_FORMAT) { tmpvalue = fvalue; if (fvalue != 0.0) { while (tmpvalue < 1) { tmpvalue *= 10; exp--; } while (tmpvalue > 10) { tmpvalue /= 10; exp++; } } if (style == G_FORMAT) { if (max == 0) max = 1; if (realstyle == F_FORMAT) { max -= (exp + 1); if (max < 0) { (void)doapr_outch(sbuffer, buffer, currlen, maxlen, '\0'); return 0; } } else { max--; } } if (realstyle == E_FORMAT) fvalue = tmpvalue; } ufvalue = abs_val(fvalue); if (ufvalue >= (double)(ULONG_MAX - 65535) + 65536.0) { (void)doapr_outch(sbuffer, buffer, currlen, maxlen, '\0'); return 0; } intpart = (unsigned long)ufvalue; if (max > 9) max = 9; max10 = roundv(pow_10(max)); fracpart = roundv(pow_10(max) * (ufvalue - intpart)); if (fracpart >= max10) { intpart++; fracpart -= max10; } do { iconvert[iplace++] = "0123456789"[intpart % 10]; intpart = (intpart / 10); } while (intpart && (iplace < (int)sizeof(iconvert))); if (iplace == sizeof(iconvert)) iplace--; iconvert[iplace] = 0; while (fplace < max) { if (style == G_FORMAT && fplace == 0 && (fracpart % 10) == 0) { max--; fracpart = fracpart / 10; if (fplace < max) continue; break; } fconvert[fplace++] = "0123456789"[fracpart % 10]; fracpart = (fracpart / 10); } fconvert[fplace] = 0; if (realstyle == E_FORMAT) { int tmpexp; if (exp < 0) tmpexp = -exp; else tmpexp = exp; do { econvert[eplace++] = "0123456789"[tmpexp % 10]; tmpexp = (tmpexp / 10); } while (tmpexp > 0 && eplace < (int)sizeof(econvert)); if (tmpexp > 0) { (void)doapr_outch(sbuffer, buffer, currlen, maxlen, '\0'); return 0; } if (eplace == 1) econvert[eplace++] = '0'; } padlen = min - iplace - max - (max > 0 ? 1 : 0) - ((signvalue) ? 1 : 0); if (realstyle == E_FORMAT) padlen -= 2 + eplace; zpadlen = max - fplace; if (zpadlen < 0) zpadlen = 0; if (padlen < 0) padlen = 0; if (flags & DP_F_MINUS) padlen = -padlen; if ((flags & DP_F_ZERO) && (padlen > 0)) { if (signvalue) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, signvalue)) return 0; --padlen; signvalue = 0; } while (padlen > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, '0')) return 0; --padlen; } } while (padlen > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, ' ')) return 0; --padlen; } if (signvalue && !doapr_outch(sbuffer, buffer, currlen, maxlen, signvalue)) return 0; while (iplace > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, iconvert[--iplace])) return 0; } if (max > 0 || (flags & DP_F_NUM)) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, '.')) return 0; while (fplace > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, fconvert[--fplace])) return 0; } } while (zpadlen > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, '0')) return 0; --zpadlen; } if (realstyle == E_FORMAT) { char ech; if ((flags & DP_F_UP) == 0) ech = 'e'; else ech = 'E'; if (!doapr_outch(sbuffer, buffer, currlen, maxlen, ech)) return 0; if (exp < 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, '-')) return 0; } else { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, '+')) return 0; } while (eplace > 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, econvert[--eplace])) return 0; } } while (padlen < 0) { if (!doapr_outch(sbuffer, buffer, currlen, maxlen, ' ')) return 0; ++padlen; } return 1; } #endif #define BUFFER_INC 1024 static int doapr_outch(char **sbuffer, char **buffer, size_t *currlen, size_t *maxlen, int c) { if (!ossl_assert(*sbuffer != NULL || buffer != NULL)) return 0; if (!ossl_assert(*currlen <= *maxlen)) return 0; if (buffer && *currlen == *maxlen) { if (*maxlen > INT_MAX - BUFFER_INC) return 0; *maxlen += BUFFER_INC; if (*buffer == NULL) { if ((*buffer = OPENSSL_malloc(*maxlen)) == NULL) return 0; if (*currlen > 0) { if (!ossl_assert(*sbuffer != NULL)) return 0; memcpy(*buffer, *sbuffer, *currlen); } *sbuffer = NULL; } else { char *tmpbuf; tmpbuf = OPENSSL_realloc(*buffer, *maxlen); if (tmpbuf == NULL) return 0; *buffer = tmpbuf; } } if (*currlen < *maxlen) { if (*sbuffer) (*sbuffer)[(*currlen)++] = (char)c; else (*buffer)[(*currlen)++] = (char)c; } return 1; } int BIO_printf(BIO *bio, const char *format, ...) { va_list args; int ret; va_start(args, format); ret = BIO_vprintf(bio, format, args); va_end(args); return ret; } int BIO_vprintf(BIO *bio, const char *format, va_list args) { int ret; size_t retlen; char hugebuf[1024 * 2]; char *hugebufp = hugebuf; size_t hugebufsize = sizeof(hugebuf); char *dynbuf = NULL; int ignored; dynbuf = NULL; if (!_dopr(&hugebufp, &dynbuf, &hugebufsize, &retlen, &ignored, format, args)) { OPENSSL_free(dynbuf); return -1; } if (dynbuf) { ret = BIO_write(bio, dynbuf, (int)retlen); OPENSSL_free(dynbuf); } else { ret = BIO_write(bio, hugebuf, (int)retlen); } return ret; } int BIO_snprintf(char *buf, size_t n, const char *format, ...) { va_list args; int ret; va_start(args, format); ret = BIO_vsnprintf(buf, n, format, args); va_end(args); return ret; } int BIO_vsnprintf(char *buf, size_t n, const char *format, va_list args) { size_t retlen; int truncated; if (!_dopr(&buf, NULL, &n, &retlen, &truncated, format, args)) return -1; if (truncated) return -1; return (retlen <= INT_MAX) ? (int)retlen : -1; }
bio
openssl/crypto/bio/bio_print.c
openssl
#include <stdio.h> #include <stdlib.h> #include "bio_local.h" #ifndef OPENSSL_NO_SOCK # define SOCKET_PROTOCOL IPPROTO_TCP # ifdef SO_MAXCONN # define MAX_LISTEN SO_MAXCONN # elif defined(SOMAXCONN) # define MAX_LISTEN SOMAXCONN # else # define MAX_LISTEN 32 # endif # if defined(OPENSSL_SYS_WINDOWS) static int wsa_init_done = 0; # endif # if defined __TANDEM # include <unistd.h> # include <sys/time.h> # if defined(OPENSSL_TANDEM_FLOSS) # include <floss.h(floss_select)> # endif # elif defined _WIN32 # include <winsock.h> # else # include <unistd.h> # if defined __VMS # include <sys/socket.h> # elif defined _HPUX_SOURCE # include <sys/time.h> # else # include <sys/select.h> # endif # endif # ifndef OPENSSL_NO_DEPRECATED_1_1_0 int BIO_get_host_ip(const char *str, unsigned char *ip) { BIO_ADDRINFO *res = NULL; int ret = 0; if (BIO_sock_init() != 1) return 0; if (BIO_lookup(str, NULL, BIO_LOOKUP_CLIENT, AF_INET, SOCK_STREAM, &res)) { size_t l; if (BIO_ADDRINFO_family(res) != AF_INET) { ERR_raise(ERR_LIB_BIO, BIO_R_GETHOSTBYNAME_ADDR_IS_NOT_AF_INET); } else if (BIO_ADDR_rawaddress(BIO_ADDRINFO_address(res), NULL, &l)) { if (ossl_assert(l == 4)) ret = BIO_ADDR_rawaddress(BIO_ADDRINFO_address(res), ip, &l); } BIO_ADDRINFO_free(res); } else { ERR_add_error_data(2, "host=", str); } return ret; } int BIO_get_port(const char *str, unsigned short *port_ptr) { BIO_ADDRINFO *res = NULL; int ret = 0; if (str == NULL) { ERR_raise(ERR_LIB_BIO, BIO_R_NO_PORT_DEFINED); return 0; } if (BIO_sock_init() != 1) return 0; if (BIO_lookup(NULL, str, BIO_LOOKUP_CLIENT, AF_INET, SOCK_STREAM, &res)) { if (BIO_ADDRINFO_family(res) != AF_INET) { ERR_raise(ERR_LIB_BIO, BIO_R_ADDRINFO_ADDR_IS_NOT_AF_INET); } else { *port_ptr = ntohs(BIO_ADDR_rawport(BIO_ADDRINFO_address(res))); ret = 1; } BIO_ADDRINFO_free(res); } else { ERR_add_error_data(2, "host=", str); } return ret; } # endif int BIO_sock_error(int sock) { int j = 0, i; socklen_t size = sizeof(j); i = getsockopt(sock, SOL_SOCKET, SO_ERROR, (void *)&j, &size); if (i < 0) return get_last_socket_error(); else return j; } # ifndef OPENSSL_NO_DEPRECATED_1_1_0 struct hostent *BIO_gethostbyname(const char *name) { return gethostbyname(name); } # endif # ifdef BIO_HAVE_WSAMSG LPFN_WSARECVMSG bio_WSARecvMsg; LPFN_WSASENDMSG bio_WSASendMsg; # endif int BIO_sock_init(void) { # ifdef OPENSSL_SYS_WINDOWS static struct WSAData wsa_state; if (!wsa_init_done) { wsa_init_done = 1; memset(&wsa_state, 0, sizeof(wsa_state)); if (WSAStartup(0x0202, &wsa_state) != 0) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling wsastartup()"); ERR_raise(ERR_LIB_BIO, BIO_R_WSASTARTUP); return -1; } # ifdef BIO_HAVE_WSAMSG { GUID id_WSARecvMsg = WSAID_WSARECVMSG; GUID id_WSASendMsg = WSAID_WSASENDMSG; DWORD len_out = 0; SOCKET s; s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); if (s != INVALID_SOCKET) { if (WSAIoctl(s, SIO_GET_EXTENSION_FUNCTION_POINTER, &id_WSARecvMsg, sizeof(id_WSARecvMsg), &bio_WSARecvMsg, sizeof(bio_WSARecvMsg), &len_out, NULL, NULL) != 0 || len_out != sizeof(bio_WSARecvMsg)) bio_WSARecvMsg = NULL; if (WSAIoctl(s, SIO_GET_EXTENSION_FUNCTION_POINTER, &id_WSASendMsg, sizeof(id_WSASendMsg), &bio_WSASendMsg, sizeof(bio_WSASendMsg), &len_out, NULL, NULL) != 0 || len_out != sizeof(bio_WSASendMsg)) bio_WSASendMsg = NULL; closesocket(s); } } # endif } # endif # ifdef WATT32 extern int _watt_do_exit; _watt_do_exit = 0; if (sock_init()) return -1; # endif return 1; } void bio_sock_cleanup_int(void) { # ifdef OPENSSL_SYS_WINDOWS if (wsa_init_done) { wsa_init_done = 0; WSACleanup(); } # endif } int BIO_socket_ioctl(int fd, long type, void *arg) { int i; # ifdef __DJGPP__ i = ioctlsocket(fd, type, (char *)arg); # else # if defined(OPENSSL_SYS_VMS) # if __INITIAL_POINTER_SIZE == 64 # define ARG arg_32p # pragma pointer_size save # pragma pointer_size 32 unsigned long arg_32; unsigned long *arg_32p; # pragma pointer_size restore arg_32p = &arg_32; arg_32 = *((unsigned long *)arg); # else # define ARG arg # endif # else # define ARG arg # endif i = ioctlsocket(fd, type, ARG); # endif if (i < 0) ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling ioctlsocket()"); return i; } # ifndef OPENSSL_NO_DEPRECATED_1_1_0 int BIO_get_accept_socket(char *host, int bind_mode) { int s = INVALID_SOCKET; char *h = NULL, *p = NULL; BIO_ADDRINFO *res = NULL; if (!BIO_parse_hostserv(host, &h, &p, BIO_PARSE_PRIO_SERV)) return INVALID_SOCKET; if (BIO_sock_init() != 1) return INVALID_SOCKET; if (BIO_lookup(h, p, BIO_LOOKUP_SERVER, AF_UNSPEC, SOCK_STREAM, &res) != 0) goto err; if ((s = BIO_socket(BIO_ADDRINFO_family(res), BIO_ADDRINFO_socktype(res), BIO_ADDRINFO_protocol(res), 0)) == INVALID_SOCKET) { s = INVALID_SOCKET; goto err; } if (!BIO_listen(s, BIO_ADDRINFO_address(res), bind_mode ? BIO_SOCK_REUSEADDR : 0)) { BIO_closesocket(s); s = INVALID_SOCKET; } err: BIO_ADDRINFO_free(res); OPENSSL_free(h); OPENSSL_free(p); return s; } int BIO_accept(int sock, char **ip_port) { BIO_ADDR res; int ret = -1; ret = BIO_accept_ex(sock, &res, 0); if (ret == (int)INVALID_SOCKET) { if (BIO_sock_should_retry(ret)) { ret = -2; goto end; } ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling accept()"); ERR_raise(ERR_LIB_BIO, BIO_R_ACCEPT_ERROR); goto end; } if (ip_port != NULL) { char *host = BIO_ADDR_hostname_string(&res, 1); char *port = BIO_ADDR_service_string(&res, 1); if (host != NULL && port != NULL) { *ip_port = OPENSSL_zalloc(strlen(host) + strlen(port) + 2); } else { *ip_port = NULL; ERR_raise(ERR_LIB_BIO, ERR_R_BIO_LIB); } if (*ip_port == NULL) { BIO_closesocket(ret); ret = (int)INVALID_SOCKET; } else { strcpy(*ip_port, host); strcat(*ip_port, ":"); strcat(*ip_port, port); } OPENSSL_free(host); OPENSSL_free(port); } end: return ret; } # endif int BIO_set_tcp_ndelay(int s, int on) { int ret = 0; # if defined(TCP_NODELAY) && (defined(IPPROTO_TCP) || defined(SOL_TCP)) int opt; # ifdef SOL_TCP opt = SOL_TCP; # else # ifdef IPPROTO_TCP opt = IPPROTO_TCP; # endif # endif ret = setsockopt(s, opt, TCP_NODELAY, (char *)&on, sizeof(on)); # endif return (ret == 0); } int BIO_socket_nbio(int s, int mode) { int ret = -1; int l; l = mode; # ifdef FIONBIO l = mode; ret = BIO_socket_ioctl(s, FIONBIO, &l); # elif defined(F_GETFL) && defined(F_SETFL) && (defined(O_NONBLOCK) || defined(FNDELAY)) l = fcntl(s, F_GETFL, 0); if (l == -1) { ERR_raise_data(ERR_LIB_SYS, get_last_sys_error(), "calling fcntl()"); ret = -1; } else { # if defined(O_NONBLOCK) l &= ~O_NONBLOCK; # else l &= ~FNDELAY; # endif if (mode) { # if defined(O_NONBLOCK) l |= O_NONBLOCK; # else l |= FNDELAY; # endif } ret = fcntl(s, F_SETFL, l); if (ret < 0) { ERR_raise_data(ERR_LIB_SYS, get_last_sys_error(), "calling fcntl()"); } } # else ERR_raise(ERR_LIB_BIO, ERR_R_PASSED_INVALID_ARGUMENT); # endif return (ret == 0); } int BIO_sock_info(int sock, enum BIO_sock_info_type type, union BIO_sock_info_u *info) { switch (type) { case BIO_SOCK_INFO_ADDRESS: { socklen_t addr_len; int ret = 0; addr_len = sizeof(*info->addr); ret = getsockname(sock, BIO_ADDR_sockaddr_noconst(info->addr), &addr_len); if (ret == -1) { ERR_raise_data(ERR_LIB_SYS, get_last_socket_error(), "calling getsockname()"); ERR_raise(ERR_LIB_BIO, BIO_R_GETSOCKNAME_ERROR); return 0; } if ((size_t)addr_len > sizeof(*info->addr)) { ERR_raise(ERR_LIB_BIO, BIO_R_GETSOCKNAME_TRUNCATED_ADDRESS); return 0; } } break; default: ERR_raise(ERR_LIB_BIO, BIO_R_UNKNOWN_INFO_TYPE); return 0; } return 1; } int BIO_socket_wait(int fd, int for_read, time_t max_time) { fd_set confds; struct timeval tv; time_t now; if (fd < 0 || fd >= FD_SETSIZE) return -1; if (max_time == 0) return 1; now = time(NULL); if (max_time < now) return 0; FD_ZERO(&confds); openssl_fdset(fd, &confds); tv.tv_usec = 0; tv.tv_sec = (long)(max_time - now); return select(fd + 1, for_read ? &confds : NULL, for_read ? NULL : &confds, NULL, &tv); } #endif
bio
openssl/crypto/bio/bio_sock.c
openssl
#include <stdio.h> #include <errno.h> #include "bio_local.h" #include "internal/cryptlib.h" static int buffer_write(BIO *h, const char *buf, int num); static int buffer_read(BIO *h, char *buf, int size); static int buffer_puts(BIO *h, const char *str); static int buffer_gets(BIO *h, char *str, int size); static long buffer_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int buffer_new(BIO *h); static int buffer_free(BIO *data); static long buffer_callback_ctrl(BIO *h, int cmd, BIO_info_cb *fp); #define DEFAULT_BUFFER_SIZE 4096 static const BIO_METHOD methods_buffer = { BIO_TYPE_BUFFER, "buffer", bwrite_conv, buffer_write, bread_conv, buffer_read, buffer_puts, buffer_gets, buffer_ctrl, buffer_new, buffer_free, buffer_callback_ctrl, }; const BIO_METHOD *BIO_f_buffer(void) { return &methods_buffer; } static int buffer_new(BIO *bi) { BIO_F_BUFFER_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return 0; ctx->ibuf_size = DEFAULT_BUFFER_SIZE; ctx->ibuf = OPENSSL_malloc(DEFAULT_BUFFER_SIZE); if (ctx->ibuf == NULL) { OPENSSL_free(ctx); return 0; } ctx->obuf_size = DEFAULT_BUFFER_SIZE; ctx->obuf = OPENSSL_malloc(DEFAULT_BUFFER_SIZE); if (ctx->obuf == NULL) { OPENSSL_free(ctx->ibuf); OPENSSL_free(ctx); return 0; } bi->init = 1; bi->ptr = (char *)ctx; bi->flags = 0; return 1; } static int buffer_free(BIO *a) { BIO_F_BUFFER_CTX *b; if (a == NULL) return 0; b = (BIO_F_BUFFER_CTX *)a->ptr; OPENSSL_free(b->ibuf); OPENSSL_free(b->obuf); OPENSSL_free(a->ptr); a->ptr = NULL; a->init = 0; a->flags = 0; return 1; } static int buffer_read(BIO *b, char *out, int outl) { int i, num = 0; BIO_F_BUFFER_CTX *ctx; if (out == NULL) return 0; ctx = (BIO_F_BUFFER_CTX *)b->ptr; if ((ctx == NULL) || (b->next_bio == NULL)) return 0; num = 0; BIO_clear_retry_flags(b); start: i = ctx->ibuf_len; if (i != 0) { if (i > outl) i = outl; memcpy(out, &(ctx->ibuf[ctx->ibuf_off]), i); ctx->ibuf_off += i; ctx->ibuf_len -= i; num += i; if (outl == i) return num; outl -= i; out += i; } if (outl > ctx->ibuf_size) { for (;;) { i = BIO_read(b->next_bio, out, outl); if (i <= 0) { BIO_copy_next_retry(b); if (i < 0) return ((num > 0) ? num : i); if (i == 0) return num; } num += i; if (outl == i) return num; out += i; outl -= i; } } i = BIO_read(b->next_bio, ctx->ibuf, ctx->ibuf_size); if (i <= 0) { BIO_copy_next_retry(b); if (i < 0) return ((num > 0) ? num : i); if (i == 0) return num; } ctx->ibuf_off = 0; ctx->ibuf_len = i; goto start; } static int buffer_write(BIO *b, const char *in, int inl) { int i, num = 0; BIO_F_BUFFER_CTX *ctx; if ((in == NULL) || (inl <= 0)) return 0; ctx = (BIO_F_BUFFER_CTX *)b->ptr; if ((ctx == NULL) || (b->next_bio == NULL)) return 0; BIO_clear_retry_flags(b); start: i = ctx->obuf_size - (ctx->obuf_len + ctx->obuf_off); if (i >= inl) { memcpy(&(ctx->obuf[ctx->obuf_off + ctx->obuf_len]), in, inl); ctx->obuf_len += inl; return (num + inl); } if (ctx->obuf_len != 0) { if (i > 0) { memcpy(&(ctx->obuf[ctx->obuf_off + ctx->obuf_len]), in, i); in += i; inl -= i; num += i; ctx->obuf_len += i; } for (;;) { i = BIO_write(b->next_bio, &(ctx->obuf[ctx->obuf_off]), ctx->obuf_len); if (i <= 0) { BIO_copy_next_retry(b); if (i < 0) return ((num > 0) ? num : i); if (i == 0) return num; } ctx->obuf_off += i; ctx->obuf_len -= i; if (ctx->obuf_len == 0) break; } } ctx->obuf_off = 0; while (inl >= ctx->obuf_size) { i = BIO_write(b->next_bio, in, inl); if (i <= 0) { BIO_copy_next_retry(b); if (i < 0) return ((num > 0) ? num : i); if (i == 0) return num; } num += i; in += i; inl -= i; if (inl == 0) return num; } goto start; } static long buffer_ctrl(BIO *b, int cmd, long num, void *ptr) { BIO *dbio; BIO_F_BUFFER_CTX *ctx; long ret = 1; char *p1, *p2; int r, i, *ip; int ibs, obs; ctx = (BIO_F_BUFFER_CTX *)b->ptr; switch (cmd) { case BIO_CTRL_RESET: ctx->ibuf_off = 0; ctx->ibuf_len = 0; ctx->obuf_off = 0; ctx->obuf_len = 0; if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); break; case BIO_CTRL_EOF: if (ctx->ibuf_len > 0) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); break; case BIO_CTRL_INFO: ret = (long)ctx->obuf_len; break; case BIO_C_GET_BUFF_NUM_LINES: ret = 0; p1 = ctx->ibuf; for (i = 0; i < ctx->ibuf_len; i++) { if (p1[ctx->ibuf_off + i] == '\n') ret++; } break; case BIO_CTRL_WPENDING: ret = (long)ctx->obuf_len; if (ret == 0) { if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); } break; case BIO_CTRL_PENDING: ret = (long)ctx->ibuf_len; if (ret == 0) { if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); } break; case BIO_C_SET_BUFF_READ_DATA: if (num > ctx->ibuf_size) { if (num <= 0) return 0; p1 = OPENSSL_malloc((size_t)num); if (p1 == NULL) return 0; OPENSSL_free(ctx->ibuf); ctx->ibuf = p1; } ctx->ibuf_off = 0; ctx->ibuf_len = (int)num; memcpy(ctx->ibuf, ptr, (int)num); ret = 1; break; case BIO_C_SET_BUFF_SIZE: if (ptr != NULL) { ip = (int *)ptr; if (*ip == 0) { ibs = (int)num; obs = ctx->obuf_size; } else { ibs = ctx->ibuf_size; obs = (int)num; } } else { ibs = (int)num; obs = (int)num; } p1 = ctx->ibuf; p2 = ctx->obuf; if ((ibs > DEFAULT_BUFFER_SIZE) && (ibs != ctx->ibuf_size)) { if (num <= 0) return 0; p1 = OPENSSL_malloc((size_t)num); if (p1 == NULL) return 0; } if ((obs > DEFAULT_BUFFER_SIZE) && (obs != ctx->obuf_size)) { p2 = OPENSSL_malloc((size_t)num); if (p2 == NULL) { if (p1 != ctx->ibuf) OPENSSL_free(p1); return 0; } } if (ctx->ibuf != p1) { OPENSSL_free(ctx->ibuf); ctx->ibuf = p1; ctx->ibuf_off = 0; ctx->ibuf_len = 0; ctx->ibuf_size = ibs; } if (ctx->obuf != p2) { OPENSSL_free(ctx->obuf); ctx->obuf = p2; ctx->obuf_off = 0; ctx->obuf_len = 0; ctx->obuf_size = obs; } break; case BIO_C_DO_STATE_MACHINE: if (b->next_bio == NULL) return 0; BIO_clear_retry_flags(b); ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; case BIO_CTRL_FLUSH: if (b->next_bio == NULL) return 0; if (ctx->obuf_len <= 0) { ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; } for (;;) { BIO_clear_retry_flags(b); if (ctx->obuf_len > 0) { r = BIO_write(b->next_bio, &(ctx->obuf[ctx->obuf_off]), ctx->obuf_len); BIO_copy_next_retry(b); if (r <= 0) return (long)r; ctx->obuf_off += r; ctx->obuf_len -= r; } else { ctx->obuf_len = 0; ctx->obuf_off = 0; break; } } ret = BIO_ctrl(b->next_bio, cmd, num, ptr); BIO_copy_next_retry(b); break; case BIO_CTRL_DUP: dbio = (BIO *)ptr; if (BIO_set_read_buffer_size(dbio, ctx->ibuf_size) <= 0 || BIO_set_write_buffer_size(dbio, ctx->obuf_size) <= 0) ret = 0; break; case BIO_CTRL_PEEK: { char fake_buf[1]; (void)buffer_read(b, fake_buf, 0); } if (num > ctx->ibuf_len) num = ctx->ibuf_len; memcpy(ptr, &(ctx->ibuf[ctx->ibuf_off]), num); ret = num; break; default: if (b->next_bio == NULL) return 0; ret = BIO_ctrl(b->next_bio, cmd, num, ptr); break; } return ret; } static long buffer_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { if (b->next_bio == NULL) return 0; return BIO_callback_ctrl(b->next_bio, cmd, fp); } static int buffer_gets(BIO *b, char *buf, int size) { BIO_F_BUFFER_CTX *ctx; int num = 0, i, flag; char *p; ctx = (BIO_F_BUFFER_CTX *)b->ptr; size--; BIO_clear_retry_flags(b); for (;;) { if (ctx->ibuf_len > 0) { p = &(ctx->ibuf[ctx->ibuf_off]); flag = 0; for (i = 0; (i < ctx->ibuf_len) && (i < size); i++) { *(buf++) = p[i]; if (p[i] == '\n') { flag = 1; i++; break; } } num += i; size -= i; ctx->ibuf_len -= i; ctx->ibuf_off += i; if (flag || size == 0) { *buf = '\0'; return num; } } else { i = BIO_read(b->next_bio, ctx->ibuf, ctx->ibuf_size); if (i <= 0) { BIO_copy_next_retry(b); *buf = '\0'; if (i < 0) return ((num > 0) ? num : i); if (i == 0) return num; } ctx->ibuf_len = i; ctx->ibuf_off = 0; } } } static int buffer_puts(BIO *b, const char *str) { return buffer_write(b, str, strlen(str)); }
bio
openssl/crypto/bio/bf_buff.c
openssl
#include "internal/deprecated.h" #include <stdio.h> #include <openssl/opensslv.h> #include "md4_local.h" #define INIT_DATA_A (unsigned long)0x67452301L #define INIT_DATA_B (unsigned long)0xefcdab89L #define INIT_DATA_C (unsigned long)0x98badcfeL #define INIT_DATA_D (unsigned long)0x10325476L int MD4_Init(MD4_CTX *c) { memset(c, 0, sizeof(*c)); c->A = INIT_DATA_A; c->B = INIT_DATA_B; c->C = INIT_DATA_C; c->D = INIT_DATA_D; return 1; } #ifndef md4_block_data_order # ifdef X # undef X # endif void md4_block_data_order(MD4_CTX *c, const void *data_, size_t num) { const unsigned char *data = data_; register unsigned MD32_REG_T A, B, C, D, l; # ifndef MD32_XARRAY unsigned MD32_REG_T XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7, XX8, XX9, XX10, XX11, XX12, XX13, XX14, XX15; # define X(i) XX##i # else MD4_LONG XX[MD4_LBLOCK]; # define X(i) XX[i] # endif A = c->A; B = c->B; C = c->C; D = c->D; for (; num--;) { (void)HOST_c2l(data, l); X(0) = l; (void)HOST_c2l(data, l); X(1) = l; R0(A, B, C, D, X(0), 3, 0); (void)HOST_c2l(data, l); X(2) = l; R0(D, A, B, C, X(1), 7, 0); (void)HOST_c2l(data, l); X(3) = l; R0(C, D, A, B, X(2), 11, 0); (void)HOST_c2l(data, l); X(4) = l; R0(B, C, D, A, X(3), 19, 0); (void)HOST_c2l(data, l); X(5) = l; R0(A, B, C, D, X(4), 3, 0); (void)HOST_c2l(data, l); X(6) = l; R0(D, A, B, C, X(5), 7, 0); (void)HOST_c2l(data, l); X(7) = l; R0(C, D, A, B, X(6), 11, 0); (void)HOST_c2l(data, l); X(8) = l; R0(B, C, D, A, X(7), 19, 0); (void)HOST_c2l(data, l); X(9) = l; R0(A, B, C, D, X(8), 3, 0); (void)HOST_c2l(data, l); X(10) = l; R0(D, A, B, C, X(9), 7, 0); (void)HOST_c2l(data, l); X(11) = l; R0(C, D, A, B, X(10), 11, 0); (void)HOST_c2l(data, l); X(12) = l; R0(B, C, D, A, X(11), 19, 0); (void)HOST_c2l(data, l); X(13) = l; R0(A, B, C, D, X(12), 3, 0); (void)HOST_c2l(data, l); X(14) = l; R0(D, A, B, C, X(13), 7, 0); (void)HOST_c2l(data, l); X(15) = l; R0(C, D, A, B, X(14), 11, 0); R0(B, C, D, A, X(15), 19, 0); R1(A, B, C, D, X(0), 3, 0x5A827999L); R1(D, A, B, C, X(4), 5, 0x5A827999L); R1(C, D, A, B, X(8), 9, 0x5A827999L); R1(B, C, D, A, X(12), 13, 0x5A827999L); R1(A, B, C, D, X(1), 3, 0x5A827999L); R1(D, A, B, C, X(5), 5, 0x5A827999L); R1(C, D, A, B, X(9), 9, 0x5A827999L); R1(B, C, D, A, X(13), 13, 0x5A827999L); R1(A, B, C, D, X(2), 3, 0x5A827999L); R1(D, A, B, C, X(6), 5, 0x5A827999L); R1(C, D, A, B, X(10), 9, 0x5A827999L); R1(B, C, D, A, X(14), 13, 0x5A827999L); R1(A, B, C, D, X(3), 3, 0x5A827999L); R1(D, A, B, C, X(7), 5, 0x5A827999L); R1(C, D, A, B, X(11), 9, 0x5A827999L); R1(B, C, D, A, X(15), 13, 0x5A827999L); R2(A, B, C, D, X(0), 3, 0x6ED9EBA1L); R2(D, A, B, C, X(8), 9, 0x6ED9EBA1L); R2(C, D, A, B, X(4), 11, 0x6ED9EBA1L); R2(B, C, D, A, X(12), 15, 0x6ED9EBA1L); R2(A, B, C, D, X(2), 3, 0x6ED9EBA1L); R2(D, A, B, C, X(10), 9, 0x6ED9EBA1L); R2(C, D, A, B, X(6), 11, 0x6ED9EBA1L); R2(B, C, D, A, X(14), 15, 0x6ED9EBA1L); R2(A, B, C, D, X(1), 3, 0x6ED9EBA1L); R2(D, A, B, C, X(9), 9, 0x6ED9EBA1L); R2(C, D, A, B, X(5), 11, 0x6ED9EBA1L); R2(B, C, D, A, X(13), 15, 0x6ED9EBA1L); R2(A, B, C, D, X(3), 3, 0x6ED9EBA1L); R2(D, A, B, C, X(11), 9, 0x6ED9EBA1L); R2(C, D, A, B, X(7), 11, 0x6ED9EBA1L); R2(B, C, D, A, X(15), 15, 0x6ED9EBA1L); A = c->A += A; B = c->B += B; C = c->C += C; D = c->D += D; } } #endif
md4
openssl/crypto/md4/md4_dgst.c
openssl
#include "internal/deprecated.h" #include <stdio.h> #include <string.h> #include <openssl/md4.h> #include <openssl/crypto.h> #ifdef CHARSET_EBCDIC # include <openssl/ebcdic.h> #endif unsigned char *MD4(const unsigned char *d, size_t n, unsigned char *md) { MD4_CTX c; static unsigned char m[MD4_DIGEST_LENGTH]; if (md == NULL) md = m; if (!MD4_Init(&c)) return NULL; #ifndef CHARSET_EBCDIC MD4_Update(&c, d, n); #else { char temp[1024]; unsigned long chunk; while (n > 0) { chunk = (n > sizeof(temp)) ? sizeof(temp) : n; ebcdic2ascii(temp, d, chunk); MD4_Update(&c, temp, chunk); n -= chunk; d += chunk; } } #endif MD4_Final(md, &c); OPENSSL_cleanse(&c, sizeof(c)); return md; }
md4
openssl/crypto/md4/md4_one.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <stdio.h> #include <string.h> #include <stdlib.h> #include "internal/cryptlib.h" #include <openssl/bio.h> #include <openssl/lhash.h> #include "lhash_local.h" # ifndef OPENSSL_NO_STDIO # ifndef OPENSSL_NO_DEPRECATED_3_1 void OPENSSL_LH_stats(const OPENSSL_LHASH *lh, FILE *fp) { BIO *bp; bp = BIO_new(BIO_s_file()); if (bp == NULL) return; BIO_set_fp(bp, fp, BIO_NOCLOSE); OPENSSL_LH_stats_bio(lh, bp); BIO_free(bp); } void OPENSSL_LH_node_stats(const OPENSSL_LHASH *lh, FILE *fp) { BIO *bp; bp = BIO_new(BIO_s_file()); if (bp == NULL) return; BIO_set_fp(bp, fp, BIO_NOCLOSE); OPENSSL_LH_node_stats_bio(lh, bp); BIO_free(bp); } void OPENSSL_LH_node_usage_stats(const OPENSSL_LHASH *lh, FILE *fp) { BIO *bp; bp = BIO_new(BIO_s_file()); if (bp == NULL) return; BIO_set_fp(bp, fp, BIO_NOCLOSE); OPENSSL_LH_node_usage_stats_bio(lh, bp); BIO_free(bp); } # endif # endif # ifndef OPENSSL_NO_DEPRECATED_3_1 void OPENSSL_LH_stats_bio(const OPENSSL_LHASH *lh, BIO *out) { BIO_printf(out, "num_items = %lu\n", lh->num_items); BIO_printf(out, "num_nodes = %u\n", lh->num_nodes); BIO_printf(out, "num_alloc_nodes = %u\n", lh->num_alloc_nodes); BIO_printf(out, "num_expands = 0\n"); BIO_printf(out, "num_expand_reallocs = 0\n"); BIO_printf(out, "num_contracts = 0\n"); BIO_printf(out, "num_contract_reallocs = 0\n"); BIO_printf(out, "num_hash_calls = 0\n"); BIO_printf(out, "num_comp_calls = 0\n"); BIO_printf(out, "num_insert = 0\n"); BIO_printf(out, "num_replace = 0\n"); BIO_printf(out, "num_delete = 0\n"); BIO_printf(out, "num_no_delete = 0\n"); BIO_printf(out, "num_retrieve = 0\n"); BIO_printf(out, "num_retrieve_miss = 0\n"); BIO_printf(out, "num_hash_comps = 0\n"); } void OPENSSL_LH_node_stats_bio(const OPENSSL_LHASH *lh, BIO *out) { OPENSSL_LH_NODE *n; unsigned int i, num; for (i = 0; i < lh->num_nodes; i++) { for (n = lh->b[i], num = 0; n != NULL; n = n->next) num++; BIO_printf(out, "node %6u -> %3u\n", i, num); } } void OPENSSL_LH_node_usage_stats_bio(const OPENSSL_LHASH *lh, BIO *out) { OPENSSL_LH_NODE *n; unsigned long num; unsigned int i; unsigned long total = 0, n_used = 0; for (i = 0; i < lh->num_nodes; i++) { for (n = lh->b[i], num = 0; n != NULL; n = n->next) num++; if (num != 0) { n_used++; total += num; } } BIO_printf(out, "%lu nodes used out of %u\n", n_used, lh->num_nodes); BIO_printf(out, "%lu items\n", total); if (n_used == 0) return; BIO_printf(out, "load %d.%02d actual load %d.%02d\n", (int)(total / lh->num_nodes), (int)((total % lh->num_nodes) * 100 / lh->num_nodes), (int)(total / n_used), (int)((total % n_used) * 100 / n_used)); } # endif
lhash
openssl/crypto/lhash/lh_stats.c
openssl
#include <stdio.h> #include <string.h> #include <stdlib.h> #include <openssl/crypto.h> #include <openssl/lhash.h> #include <openssl/err.h> #include "crypto/ctype.h" #include "crypto/lhash.h" #include "lhash_local.h" #undef MIN_NODES #define MIN_NODES 16 #define UP_LOAD (2*LH_LOAD_MULT) #define DOWN_LOAD (LH_LOAD_MULT) static int expand(OPENSSL_LHASH *lh); static void contract(OPENSSL_LHASH *lh); static OPENSSL_LH_NODE **getrn(OPENSSL_LHASH *lh, const void *data, unsigned long *rhash); OPENSSL_LHASH *OPENSSL_LH_set_thunks(OPENSSL_LHASH *lh, OPENSSL_LH_HASHFUNCTHUNK hw, OPENSSL_LH_COMPFUNCTHUNK cw, OPENSSL_LH_DOALL_FUNC_THUNK daw, OPENSSL_LH_DOALL_FUNCARG_THUNK daaw) { if (lh == NULL) return NULL; lh->compw = cw; lh->hashw = hw; lh->daw = daw; lh->daaw = daaw; return lh; } OPENSSL_LHASH *OPENSSL_LH_new(OPENSSL_LH_HASHFUNC h, OPENSSL_LH_COMPFUNC c) { OPENSSL_LHASH *ret; if ((ret = OPENSSL_zalloc(sizeof(*ret))) == NULL) return NULL; if ((ret->b = OPENSSL_zalloc(sizeof(*ret->b) * MIN_NODES)) == NULL) goto err; ret->comp = ((c == NULL) ? (OPENSSL_LH_COMPFUNC)strcmp : c); ret->hash = ((h == NULL) ? (OPENSSL_LH_HASHFUNC)OPENSSL_LH_strhash : h); ret->num_nodes = MIN_NODES / 2; ret->num_alloc_nodes = MIN_NODES; ret->pmax = MIN_NODES / 2; ret->up_load = UP_LOAD; ret->down_load = DOWN_LOAD; return ret; err: OPENSSL_free(ret->b); OPENSSL_free(ret); return NULL; } void OPENSSL_LH_free(OPENSSL_LHASH *lh) { if (lh == NULL) return; OPENSSL_LH_flush(lh); OPENSSL_free(lh->b); OPENSSL_free(lh); } void OPENSSL_LH_flush(OPENSSL_LHASH *lh) { unsigned int i; OPENSSL_LH_NODE *n, *nn; if (lh == NULL) return; for (i = 0; i < lh->num_nodes; i++) { n = lh->b[i]; while (n != NULL) { nn = n->next; OPENSSL_free(n); n = nn; } lh->b[i] = NULL; } lh->num_items = 0; } void *OPENSSL_LH_insert(OPENSSL_LHASH *lh, void *data) { unsigned long hash; OPENSSL_LH_NODE *nn, **rn; void *ret; lh->error = 0; if ((lh->up_load <= (lh->num_items * LH_LOAD_MULT / lh->num_nodes)) && !expand(lh)) return NULL; rn = getrn(lh, data, &hash); if (*rn == NULL) { if ((nn = OPENSSL_malloc(sizeof(*nn))) == NULL) { lh->error++; return NULL; } nn->data = data; nn->next = NULL; nn->hash = hash; *rn = nn; ret = NULL; lh->num_items++; } else { ret = (*rn)->data; (*rn)->data = data; } return ret; } void *OPENSSL_LH_delete(OPENSSL_LHASH *lh, const void *data) { unsigned long hash; OPENSSL_LH_NODE *nn, **rn; void *ret; lh->error = 0; rn = getrn(lh, data, &hash); if (*rn == NULL) { return NULL; } else { nn = *rn; *rn = nn->next; ret = nn->data; OPENSSL_free(nn); } lh->num_items--; if ((lh->num_nodes > MIN_NODES) && (lh->down_load >= (lh->num_items * LH_LOAD_MULT / lh->num_nodes))) contract(lh); return ret; } void *OPENSSL_LH_retrieve(OPENSSL_LHASH *lh, const void *data) { unsigned long hash; OPENSSL_LH_NODE **rn; if (lh->error != 0) lh->error = 0; rn = getrn(lh, data, &hash); return *rn == NULL ? NULL : (*rn)->data; } static void doall_util_fn(OPENSSL_LHASH *lh, int use_arg, OPENSSL_LH_DOALL_FUNC_THUNK wfunc, OPENSSL_LH_DOALL_FUNC func, OPENSSL_LH_DOALL_FUNCARG func_arg, OPENSSL_LH_DOALL_FUNCARG_THUNK wfunc_arg, void *arg) { int i; OPENSSL_LH_NODE *a, *n; if (lh == NULL) return; for (i = lh->num_nodes - 1; i >= 0; i--) { a = lh->b[i]; while (a != NULL) { n = a->next; if (use_arg) wfunc_arg(a->data, arg, func_arg); else wfunc(a->data, func); a = n; } } } void OPENSSL_LH_doall(OPENSSL_LHASH *lh, OPENSSL_LH_DOALL_FUNC func) { if (lh == NULL) return; doall_util_fn(lh, 0, lh->daw, func, (OPENSSL_LH_DOALL_FUNCARG)NULL, (OPENSSL_LH_DOALL_FUNCARG_THUNK)NULL, NULL); } void OPENSSL_LH_doall_arg(OPENSSL_LHASH *lh, OPENSSL_LH_DOALL_FUNCARG func, void *arg) { if (lh == NULL) return; doall_util_fn(lh, 1, (OPENSSL_LH_DOALL_FUNC_THUNK)NULL, (OPENSSL_LH_DOALL_FUNC)NULL, func, lh->daaw, arg); } void OPENSSL_LH_doall_arg_thunk(OPENSSL_LHASH *lh, OPENSSL_LH_DOALL_FUNCARG_THUNK daaw, OPENSSL_LH_DOALL_FUNCARG fn, void *arg) { doall_util_fn(lh, 1, (OPENSSL_LH_DOALL_FUNC_THUNK)NULL, (OPENSSL_LH_DOALL_FUNC)NULL, fn, daaw, arg); } static int expand(OPENSSL_LHASH *lh) { OPENSSL_LH_NODE **n, **n1, **n2, *np; unsigned int p, pmax, nni, j; unsigned long hash; nni = lh->num_alloc_nodes; p = lh->p; pmax = lh->pmax; if (p + 1 >= pmax) { j = nni * 2; n = OPENSSL_realloc(lh->b, sizeof(OPENSSL_LH_NODE *) * j); if (n == NULL) { lh->error++; return 0; } lh->b = n; memset(n + nni, 0, sizeof(*n) * (j - nni)); lh->pmax = nni; lh->num_alloc_nodes = j; lh->p = 0; } else { lh->p++; } lh->num_nodes++; n1 = &(lh->b[p]); n2 = &(lh->b[p + pmax]); *n2 = NULL; for (np = *n1; np != NULL;) { hash = np->hash; if ((hash % nni) != p) { *n1 = (*n1)->next; np->next = *n2; *n2 = np; } else n1 = &((*n1)->next); np = *n1; } return 1; } static void contract(OPENSSL_LHASH *lh) { OPENSSL_LH_NODE **n, *n1, *np; np = lh->b[lh->p + lh->pmax - 1]; lh->b[lh->p + lh->pmax - 1] = NULL; if (lh->p == 0) { n = OPENSSL_realloc(lh->b, (unsigned int)(sizeof(OPENSSL_LH_NODE *) * lh->pmax)); if (n == NULL) { lh->error++; } else { lh->b = n; } lh->num_alloc_nodes /= 2; lh->pmax /= 2; lh->p = lh->pmax - 1; } else lh->p--; lh->num_nodes--; n1 = lh->b[(int)lh->p]; if (n1 == NULL) lh->b[(int)lh->p] = np; else { while (n1->next != NULL) n1 = n1->next; n1->next = np; } } static OPENSSL_LH_NODE **getrn(OPENSSL_LHASH *lh, const void *data, unsigned long *rhash) { OPENSSL_LH_NODE **ret, *n1; unsigned long hash, nn; if (lh->hashw != NULL) hash = lh->hashw(data, lh->hash); else hash = lh->hash(data); *rhash = hash; nn = hash % lh->pmax; if (nn < lh->p) nn = hash % lh->num_alloc_nodes; ret = &(lh->b[(int)nn]); for (n1 = *ret; n1 != NULL; n1 = n1->next) { if (n1->hash != hash) { ret = &(n1->next); continue; } if (lh->compw != NULL) { if (lh->compw(n1->data, data, lh->comp) == 0) break; } else { if (lh->comp(n1->data, data) == 0) break; } ret = &(n1->next); } return ret; } unsigned long OPENSSL_LH_strhash(const char *c) { unsigned long ret = 0; long n; unsigned long v; int r; if ((c == NULL) || (*c == '\0')) return ret; n = 0x100; while (*c) { v = n | (*c); n += 0x100; r = (int)((v >> 2) ^ v) & 0x0f; ret = (ret << r) | (unsigned long)((uint64_t)ret >> (32 - r)); ret &= 0xFFFFFFFFL; ret ^= v * v; c++; } return (ret >> 16) ^ ret; } unsigned long ossl_lh_strcasehash(const char *c) { unsigned long ret = 0; long n; unsigned long v; int r; #if defined(CHARSET_EBCDIC) && !defined(CHARSET_EBCDIC_TEST) const long int case_adjust = ~0x40; #else const long int case_adjust = ~0x20; #endif if (c == NULL || *c == '\0') return ret; for (n = 0x100; *c != '\0'; n += 0x100) { v = n | (case_adjust & *c); r = (int)((v >> 2) ^ v) & 0x0f; ret = (ret << r) | (unsigned long)((uint64_t)ret >> (32 - r)); ret &= 0xFFFFFFFFL; ret ^= v * v; c++; } return (ret >> 16) ^ ret; } unsigned long OPENSSL_LH_num_items(const OPENSSL_LHASH *lh) { return lh ? lh->num_items : 0; } unsigned long OPENSSL_LH_get_down_load(const OPENSSL_LHASH *lh) { return lh->down_load; } void OPENSSL_LH_set_down_load(OPENSSL_LHASH *lh, unsigned long down_load) { lh->down_load = down_load; } int OPENSSL_LH_error(OPENSSL_LHASH *lh) { return lh->error; }
lhash
openssl/crypto/lhash/lhash.c
openssl
#if (defined(_WIN64) || defined(_WIN32_WCE)) && !defined(UNICODE) # define UNICODE #endif #if defined(UNICODE) && !defined(_UNICODE) # define _UNICODE #endif #if defined(_UNICODE) && !defined(UNICODE) # define UNICODE #endif #include <windows.h> #include <tchar.h> #include <stdio.h> #include "uplink.h" void OPENSSL_showfatal(const char *, ...); static TCHAR msg[128]; static void unimplemented(void) { OPENSSL_showfatal(sizeof(TCHAR) == sizeof(char) ? "%s\n" : "%S\n", msg); TerminateProcess(GetCurrentProcess(), 1); } void OPENSSL_Uplink(volatile void **table, int index) { static HMODULE volatile apphandle = NULL; static void **volatile applinktable = NULL; int len; void (*func) (void) = unimplemented; HANDLE h; void **p; do { len = _sntprintf(msg, sizeof(msg) / sizeof(TCHAR), _T("OPENSSL_Uplink(%p,%02X): "), table, index); _tcscpy(msg + len, _T("unimplemented function")); if ((h = apphandle) == NULL) { if ((h = GetModuleHandle(NULL)) == NULL) { apphandle = (HMODULE) - 1; _tcscpy(msg + len, _T("no host application")); break; } apphandle = h; } if ((h = apphandle) == (HMODULE) - 1) break; if (applinktable == NULL) { void **(*applink) (); applink = (void **(*)())GetProcAddress(h, "OPENSSL_Applink"); if (applink == NULL) { apphandle = (HMODULE) - 1; _tcscpy(msg + len, _T("no OPENSSL_Applink")); break; } p = (*applink) (); if (p == NULL) { apphandle = (HMODULE) - 1; _tcscpy(msg + len, _T("no ApplinkTable")); break; } applinktable = p; } else p = applinktable; if (index > (int)p[0]) break; if (p[index]) func = p[index]; } while (0); table[index] = func; } #if (defined(_MSC_VER) || defined(__BORLANDC__)) && defined(_M_IX86) # if defined(_MSC_VER) # define LAZY(i) \ __declspec(naked) static void lazy##i (void) { \ _asm push i \ _asm push OFFSET OPENSSL_UplinkTable \ _asm call OPENSSL_Uplink \ _asm add esp,8 \ _asm jmp OPENSSL_UplinkTable+4*i } # elif defined(__BORLANDC__) && defined(__clang__) void *OPENSSL_UplinkTable[26]; # define LAZY(i) \ __declspec(naked) static void lazy##i (void) { \ __asm__("pushl $" #i "; " \ "pushl %0; " \ "call %P1; " \ "addl $8, %%esp; " \ "jmp *%2 " \ : \ : "i" (OPENSSL_UplinkTable), \ "i" (OPENSSL_Uplink), \ "m" (OPENSSL_UplinkTable[i])); } # endif # if APPLINK_MAX>25 # error "Add more stubs..." # endif LAZY(1) LAZY(2) LAZY(3) LAZY(4) LAZY(5) LAZY(6) LAZY(7) LAZY(8) LAZY(9) LAZY(10) LAZY(11) LAZY(12) LAZY(13) LAZY(14) LAZY(15) LAZY(16) LAZY(17) LAZY(18) LAZY(19) LAZY(20) LAZY(21) LAZY(22) LAZY(23) LAZY(24) LAZY(25) void *OPENSSL_UplinkTable[] = { (void *)APPLINK_MAX, lazy1, lazy2, lazy3, lazy4, lazy5, lazy6, lazy7, lazy8, lazy9, lazy10, lazy11, lazy12, lazy13, lazy14, lazy15, lazy16, lazy17, lazy18, lazy19, lazy20, lazy21, lazy22, lazy23, lazy24, lazy25, }; #endif #ifdef SELFTEST main() { UP_fprintf(UP_stdout, "hello, world!\n"); } #endif
ms
openssl/ms/uplink.c
openssl
#define APPLINK_STDIN 1 #define APPLINK_STDOUT 2 #define APPLINK_STDERR 3 #define APPLINK_FPRINTF 4 #define APPLINK_FGETS 5 #define APPLINK_FREAD 6 #define APPLINK_FWRITE 7 #define APPLINK_FSETMOD 8 #define APPLINK_FEOF 9 #define APPLINK_FCLOSE 10 #define APPLINK_FOPEN 11 #define APPLINK_FSEEK 12 #define APPLINK_FTELL 13 #define APPLINK_FFLUSH 14 #define APPLINK_FERROR 15 #define APPLINK_CLEARERR 16 #define APPLINK_FILENO 17 #define APPLINK_OPEN 18 #define APPLINK_READ 19 #define APPLINK_WRITE 20 #define APPLINK_LSEEK 21 #define APPLINK_CLOSE 22 #define APPLINK_MAX 22 #ifndef APPMACROS_ONLY # ifndef APPLINK_NO_INCLUDES # include <stdio.h> # include <io.h> # include <fcntl.h> # endif # ifdef __BORLANDC__ # undef _lseek # define _lseek lseek # endif static void *app_stdin(void) { return stdin; } static void *app_stdout(void) { return stdout; } static void *app_stderr(void) { return stderr; } static int app_feof(FILE *fp) { return feof(fp); } static int app_ferror(FILE *fp) { return ferror(fp); } static void app_clearerr(FILE *fp) { clearerr(fp); } static int app_fileno(FILE *fp) { return _fileno(fp); } static int app_fsetmod(FILE *fp, char mod) { return _setmode(_fileno(fp), mod == 'b' ? _O_BINARY : _O_TEXT); } #ifdef __cplusplus extern "C" { #endif __declspec(dllexport) void ** # if defined(__BORLANDC__) __stdcall # else __cdecl # endif OPENSSL_Applink(void) { static int once = 1; static void *OPENSSL_ApplinkTable[APPLINK_MAX + 1] = { (void *)APPLINK_MAX }; if (once) { OPENSSL_ApplinkTable[APPLINK_STDIN] = app_stdin; OPENSSL_ApplinkTable[APPLINK_STDOUT] = app_stdout; OPENSSL_ApplinkTable[APPLINK_STDERR] = app_stderr; OPENSSL_ApplinkTable[APPLINK_FPRINTF] = fprintf; OPENSSL_ApplinkTable[APPLINK_FGETS] = fgets; OPENSSL_ApplinkTable[APPLINK_FREAD] = fread; OPENSSL_ApplinkTable[APPLINK_FWRITE] = fwrite; OPENSSL_ApplinkTable[APPLINK_FSETMOD] = app_fsetmod; OPENSSL_ApplinkTable[APPLINK_FEOF] = app_feof; OPENSSL_ApplinkTable[APPLINK_FCLOSE] = fclose; OPENSSL_ApplinkTable[APPLINK_FOPEN] = fopen; OPENSSL_ApplinkTable[APPLINK_FSEEK] = fseek; OPENSSL_ApplinkTable[APPLINK_FTELL] = ftell; OPENSSL_ApplinkTable[APPLINK_FFLUSH] = fflush; OPENSSL_ApplinkTable[APPLINK_FERROR] = app_ferror; OPENSSL_ApplinkTable[APPLINK_CLEARERR] = app_clearerr; OPENSSL_ApplinkTable[APPLINK_FILENO] = app_fileno; OPENSSL_ApplinkTable[APPLINK_OPEN] = _open; OPENSSL_ApplinkTable[APPLINK_READ] = _read; OPENSSL_ApplinkTable[APPLINK_WRITE] = _write; OPENSSL_ApplinkTable[APPLINK_LSEEK] = _lseek; OPENSSL_ApplinkTable[APPLINK_CLOSE] = _close; once = 0; } return OPENSSL_ApplinkTable; } #ifdef __cplusplus } #endif #endif
ms
openssl/ms/applink.c
openssl
#include <stdio.h> #include <ctype.h> #include <openssl/objects.h> #include <openssl/comp.h> #include <openssl/engine.h> #include <openssl/crypto.h> #include <openssl/conf.h> #include <openssl/trace.h> #include "internal/nelem.h" #include "ssl_local.h" #include "internal/thread_once.h" #include "internal/cryptlib.h" typedef struct { uint32_t mask; int nid; } ssl_cipher_table; static const ssl_cipher_table ssl_cipher_table_cipher[SSL_ENC_NUM_IDX] = { {SSL_DES, NID_des_cbc}, {SSL_3DES, NID_des_ede3_cbc}, {SSL_RC4, NID_rc4}, {SSL_RC2, NID_rc2_cbc}, {SSL_IDEA, NID_idea_cbc}, {SSL_eNULL, NID_undef}, {SSL_AES128, NID_aes_128_cbc}, {SSL_AES256, NID_aes_256_cbc}, {SSL_CAMELLIA128, NID_camellia_128_cbc}, {SSL_CAMELLIA256, NID_camellia_256_cbc}, {SSL_eGOST2814789CNT, NID_gost89_cnt}, {SSL_SEED, NID_seed_cbc}, {SSL_AES128GCM, NID_aes_128_gcm}, {SSL_AES256GCM, NID_aes_256_gcm}, {SSL_AES128CCM, NID_aes_128_ccm}, {SSL_AES256CCM, NID_aes_256_ccm}, {SSL_AES128CCM8, NID_aes_128_ccm}, {SSL_AES256CCM8, NID_aes_256_ccm}, {SSL_eGOST2814789CNT12, NID_gost89_cnt_12}, {SSL_CHACHA20POLY1305, NID_chacha20_poly1305}, {SSL_ARIA128GCM, NID_aria_128_gcm}, {SSL_ARIA256GCM, NID_aria_256_gcm}, {SSL_MAGMA, NID_magma_ctr_acpkm}, {SSL_KUZNYECHIK, NID_kuznyechik_ctr_acpkm}, }; #define SSL_COMP_NULL_IDX 0 #define SSL_COMP_ZLIB_IDX 1 #define SSL_COMP_NUM_IDX 2 static STACK_OF(SSL_COMP) *ssl_comp_methods = NULL; #ifndef OPENSSL_NO_COMP static CRYPTO_ONCE ssl_load_builtin_comp_once = CRYPTO_ONCE_STATIC_INIT; #endif static const ssl_cipher_table ssl_cipher_table_mac[SSL_MD_NUM_IDX] = { {SSL_MD5, NID_md5}, {SSL_SHA1, NID_sha1}, {SSL_GOST94, NID_id_GostR3411_94}, {SSL_GOST89MAC, NID_id_Gost28147_89_MAC}, {SSL_SHA256, NID_sha256}, {SSL_SHA384, NID_sha384}, {SSL_GOST12_256, NID_id_GostR3411_2012_256}, {SSL_GOST89MAC12, NID_gost_mac_12}, {SSL_GOST12_512, NID_id_GostR3411_2012_512}, {0, NID_md5_sha1}, {0, NID_sha224}, {0, NID_sha512}, {SSL_MAGMAOMAC, NID_magma_mac}, {SSL_KUZNYECHIKOMAC, NID_kuznyechik_mac} }; static const ssl_cipher_table ssl_cipher_table_kx[] = { {SSL_kRSA, NID_kx_rsa}, {SSL_kECDHE, NID_kx_ecdhe}, {SSL_kDHE, NID_kx_dhe}, {SSL_kECDHEPSK, NID_kx_ecdhe_psk}, {SSL_kDHEPSK, NID_kx_dhe_psk}, {SSL_kRSAPSK, NID_kx_rsa_psk}, {SSL_kPSK, NID_kx_psk}, {SSL_kSRP, NID_kx_srp}, {SSL_kGOST, NID_kx_gost}, {SSL_kGOST18, NID_kx_gost18}, {SSL_kANY, NID_kx_any} }; static const ssl_cipher_table ssl_cipher_table_auth[] = { {SSL_aRSA, NID_auth_rsa}, {SSL_aECDSA, NID_auth_ecdsa}, {SSL_aPSK, NID_auth_psk}, {SSL_aDSS, NID_auth_dss}, {SSL_aGOST01, NID_auth_gost01}, {SSL_aGOST12, NID_auth_gost12}, {SSL_aSRP, NID_auth_srp}, {SSL_aNULL, NID_auth_null}, {SSL_aANY, NID_auth_any} }; static int ssl_cipher_info_find(const ssl_cipher_table *table, size_t table_cnt, uint32_t mask) { size_t i; for (i = 0; i < table_cnt; i++, table++) { if (table->mask == mask) return (int)i; } return -1; } #define ssl_cipher_info_lookup(table, x) \ ssl_cipher_info_find(table, OSSL_NELEM(table), x) static const int default_mac_pkey_id[SSL_MD_NUM_IDX] = { EVP_PKEY_HMAC, EVP_PKEY_HMAC, EVP_PKEY_HMAC, NID_undef, EVP_PKEY_HMAC, EVP_PKEY_HMAC, EVP_PKEY_HMAC, NID_undef, EVP_PKEY_HMAC, NID_undef, NID_undef, NID_undef, NID_undef, NID_undef }; #define CIPHER_ADD 1 #define CIPHER_KILL 2 #define CIPHER_DEL 3 #define CIPHER_ORD 4 #define CIPHER_SPECIAL 5 #define CIPHER_BUMP 6 typedef struct cipher_order_st { const SSL_CIPHER *cipher; int active; int dead; struct cipher_order_st *next, *prev; } CIPHER_ORDER; static const SSL_CIPHER cipher_aliases[] = { {0, SSL_TXT_ALL, NULL, 0, 0, 0, ~SSL_eNULL}, {0, SSL_TXT_CMPALL, NULL, 0, 0, 0, SSL_eNULL}, {0, SSL_TXT_CMPDEF, NULL, 0, 0, 0, 0, 0, 0, 0, 0, 0, SSL_NOT_DEFAULT}, {0, SSL_TXT_kRSA, NULL, 0, SSL_kRSA}, {0, SSL_TXT_kEDH, NULL, 0, SSL_kDHE}, {0, SSL_TXT_kDHE, NULL, 0, SSL_kDHE}, {0, SSL_TXT_DH, NULL, 0, SSL_kDHE}, {0, SSL_TXT_kEECDH, NULL, 0, SSL_kECDHE}, {0, SSL_TXT_kECDHE, NULL, 0, SSL_kECDHE}, {0, SSL_TXT_ECDH, NULL, 0, SSL_kECDHE}, {0, SSL_TXT_kPSK, NULL, 0, SSL_kPSK}, {0, SSL_TXT_kRSAPSK, NULL, 0, SSL_kRSAPSK}, {0, SSL_TXT_kECDHEPSK, NULL, 0, SSL_kECDHEPSK}, {0, SSL_TXT_kDHEPSK, NULL, 0, SSL_kDHEPSK}, {0, SSL_TXT_kSRP, NULL, 0, SSL_kSRP}, {0, SSL_TXT_kGOST, NULL, 0, SSL_kGOST}, {0, SSL_TXT_kGOST18, NULL, 0, SSL_kGOST18}, {0, SSL_TXT_aRSA, NULL, 0, 0, SSL_aRSA}, {0, SSL_TXT_aDSS, NULL, 0, 0, SSL_aDSS}, {0, SSL_TXT_DSS, NULL, 0, 0, SSL_aDSS}, {0, SSL_TXT_aNULL, NULL, 0, 0, SSL_aNULL}, {0, SSL_TXT_aECDSA, NULL, 0, 0, SSL_aECDSA}, {0, SSL_TXT_ECDSA, NULL, 0, 0, SSL_aECDSA}, {0, SSL_TXT_aPSK, NULL, 0, 0, SSL_aPSK}, {0, SSL_TXT_aGOST01, NULL, 0, 0, SSL_aGOST01}, {0, SSL_TXT_aGOST12, NULL, 0, 0, SSL_aGOST12}, {0, SSL_TXT_aGOST, NULL, 0, 0, SSL_aGOST01 | SSL_aGOST12}, {0, SSL_TXT_aSRP, NULL, 0, 0, SSL_aSRP}, {0, SSL_TXT_EDH, NULL, 0, SSL_kDHE, ~SSL_aNULL}, {0, SSL_TXT_DHE, NULL, 0, SSL_kDHE, ~SSL_aNULL}, {0, SSL_TXT_EECDH, NULL, 0, SSL_kECDHE, ~SSL_aNULL}, {0, SSL_TXT_ECDHE, NULL, 0, SSL_kECDHE, ~SSL_aNULL}, {0, SSL_TXT_NULL, NULL, 0, 0, 0, SSL_eNULL}, {0, SSL_TXT_RSA, NULL, 0, SSL_kRSA, SSL_aRSA}, {0, SSL_TXT_ADH, NULL, 0, SSL_kDHE, SSL_aNULL}, {0, SSL_TXT_AECDH, NULL, 0, SSL_kECDHE, SSL_aNULL}, {0, SSL_TXT_PSK, NULL, 0, SSL_PSK}, {0, SSL_TXT_SRP, NULL, 0, SSL_kSRP}, {0, SSL_TXT_3DES, NULL, 0, 0, 0, SSL_3DES}, {0, SSL_TXT_RC4, NULL, 0, 0, 0, SSL_RC4}, {0, SSL_TXT_RC2, NULL, 0, 0, 0, SSL_RC2}, {0, SSL_TXT_IDEA, NULL, 0, 0, 0, SSL_IDEA}, {0, SSL_TXT_SEED, NULL, 0, 0, 0, SSL_SEED}, {0, SSL_TXT_eNULL, NULL, 0, 0, 0, SSL_eNULL}, {0, SSL_TXT_GOST, NULL, 0, 0, 0, SSL_eGOST2814789CNT | SSL_eGOST2814789CNT12 | SSL_MAGMA | SSL_KUZNYECHIK}, {0, SSL_TXT_AES128, NULL, 0, 0, 0, SSL_AES128 | SSL_AES128GCM | SSL_AES128CCM | SSL_AES128CCM8}, {0, SSL_TXT_AES256, NULL, 0, 0, 0, SSL_AES256 | SSL_AES256GCM | SSL_AES256CCM | SSL_AES256CCM8}, {0, SSL_TXT_AES, NULL, 0, 0, 0, SSL_AES}, {0, SSL_TXT_AES_GCM, NULL, 0, 0, 0, SSL_AES128GCM | SSL_AES256GCM}, {0, SSL_TXT_AES_CCM, NULL, 0, 0, 0, SSL_AES128CCM | SSL_AES256CCM | SSL_AES128CCM8 | SSL_AES256CCM8}, {0, SSL_TXT_AES_CCM_8, NULL, 0, 0, 0, SSL_AES128CCM8 | SSL_AES256CCM8}, {0, SSL_TXT_CAMELLIA128, NULL, 0, 0, 0, SSL_CAMELLIA128}, {0, SSL_TXT_CAMELLIA256, NULL, 0, 0, 0, SSL_CAMELLIA256}, {0, SSL_TXT_CAMELLIA, NULL, 0, 0, 0, SSL_CAMELLIA}, {0, SSL_TXT_CHACHA20, NULL, 0, 0, 0, SSL_CHACHA20}, {0, SSL_TXT_GOST2012_GOST8912_GOST8912, NULL, 0, 0, 0, SSL_eGOST2814789CNT12}, {0, SSL_TXT_ARIA, NULL, 0, 0, 0, SSL_ARIA}, {0, SSL_TXT_ARIA_GCM, NULL, 0, 0, 0, SSL_ARIA128GCM | SSL_ARIA256GCM}, {0, SSL_TXT_ARIA128, NULL, 0, 0, 0, SSL_ARIA128GCM}, {0, SSL_TXT_ARIA256, NULL, 0, 0, 0, SSL_ARIA256GCM}, {0, SSL_TXT_CBC, NULL, 0, 0, 0, SSL_CBC}, {0, SSL_TXT_MD5, NULL, 0, 0, 0, 0, SSL_MD5}, {0, SSL_TXT_SHA1, NULL, 0, 0, 0, 0, SSL_SHA1}, {0, SSL_TXT_SHA, NULL, 0, 0, 0, 0, SSL_SHA1}, {0, SSL_TXT_GOST94, NULL, 0, 0, 0, 0, SSL_GOST94}, {0, SSL_TXT_GOST89MAC, NULL, 0, 0, 0, 0, SSL_GOST89MAC | SSL_GOST89MAC12}, {0, SSL_TXT_SHA256, NULL, 0, 0, 0, 0, SSL_SHA256}, {0, SSL_TXT_SHA384, NULL, 0, 0, 0, 0, SSL_SHA384}, {0, SSL_TXT_GOST12, NULL, 0, 0, 0, 0, SSL_GOST12_256}, {0, SSL_TXT_SSLV3, NULL, 0, 0, 0, 0, 0, SSL3_VERSION}, {0, SSL_TXT_TLSV1, NULL, 0, 0, 0, 0, 0, TLS1_VERSION}, {0, "TLSv1.0", NULL, 0, 0, 0, 0, 0, TLS1_VERSION}, {0, SSL_TXT_TLSV1_2, NULL, 0, 0, 0, 0, 0, TLS1_2_VERSION}, {0, SSL_TXT_LOW, NULL, 0, 0, 0, 0, 0, 0, 0, 0, 0, SSL_LOW}, {0, SSL_TXT_MEDIUM, NULL, 0, 0, 0, 0, 0, 0, 0, 0, 0, SSL_MEDIUM}, {0, SSL_TXT_HIGH, NULL, 0, 0, 0, 0, 0, 0, 0, 0, 0, SSL_HIGH}, {0, SSL_TXT_FIPS, NULL, 0, 0, 0, ~SSL_eNULL, 0, 0, 0, 0, 0, SSL_FIPS}, {0, SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA, NULL, 0, SSL_kDHE, SSL_aDSS, SSL_3DES, SSL_SHA1, 0, 0, 0, 0, SSL_HIGH | SSL_FIPS}, {0, SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA, NULL, 0, SSL_kDHE, SSL_aRSA, SSL_3DES, SSL_SHA1, 0, 0, 0, 0, SSL_HIGH | SSL_FIPS}, }; #ifdef OPENSSL_NO_ENGINE static int get_optional_pkey_id(const char *pkey_name) { const EVP_PKEY_ASN1_METHOD *ameth; int pkey_id = 0; ameth = EVP_PKEY_asn1_find_str(NULL, pkey_name, -1); if (ameth && EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth) > 0) return pkey_id; return 0; } #else static int get_optional_pkey_id(const char *pkey_name) { const EVP_PKEY_ASN1_METHOD *ameth; ENGINE *tmpeng = NULL; int pkey_id = 0; ameth = EVP_PKEY_asn1_find_str(&tmpeng, pkey_name, -1); if (ameth) { if (EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth) <= 0) pkey_id = 0; } tls_engine_finish(tmpeng); return pkey_id; } #endif int ssl_load_ciphers(SSL_CTX *ctx) { size_t i; const ssl_cipher_table *t; EVP_KEYEXCH *kex = NULL; EVP_SIGNATURE *sig = NULL; ctx->disabled_enc_mask = 0; for (i = 0, t = ssl_cipher_table_cipher; i < SSL_ENC_NUM_IDX; i++, t++) { if (t->nid != NID_undef) { const EVP_CIPHER *cipher = ssl_evp_cipher_fetch(ctx->libctx, t->nid, ctx->propq); ctx->ssl_cipher_methods[i] = cipher; if (cipher == NULL) ctx->disabled_enc_mask |= t->mask; } } ctx->disabled_mac_mask = 0; for (i = 0, t = ssl_cipher_table_mac; i < SSL_MD_NUM_IDX; i++, t++) { const EVP_MD *md = ssl_evp_md_fetch(ctx->libctx, t->nid, ctx->propq); ctx->ssl_digest_methods[i] = md; if (md == NULL) { ctx->disabled_mac_mask |= t->mask; } else { int tmpsize = EVP_MD_get_size(md); if (!ossl_assert(tmpsize >= 0)) return 0; ctx->ssl_mac_secret_size[i] = tmpsize; } } ctx->disabled_mkey_mask = 0; ctx->disabled_auth_mask = 0; ERR_set_mark(); sig = EVP_SIGNATURE_fetch(ctx->libctx, "DSA", ctx->propq); if (sig == NULL) ctx->disabled_auth_mask |= SSL_aDSS; else EVP_SIGNATURE_free(sig); kex = EVP_KEYEXCH_fetch(ctx->libctx, "DH", ctx->propq); if (kex == NULL) ctx->disabled_mkey_mask |= SSL_kDHE | SSL_kDHEPSK; else EVP_KEYEXCH_free(kex); kex = EVP_KEYEXCH_fetch(ctx->libctx, "ECDH", ctx->propq); if (kex == NULL) ctx->disabled_mkey_mask |= SSL_kECDHE | SSL_kECDHEPSK; else EVP_KEYEXCH_free(kex); sig = EVP_SIGNATURE_fetch(ctx->libctx, "ECDSA", ctx->propq); if (sig == NULL) ctx->disabled_auth_mask |= SSL_aECDSA; else EVP_SIGNATURE_free(sig); ERR_pop_to_mark(); #ifdef OPENSSL_NO_PSK ctx->disabled_mkey_mask |= SSL_PSK; ctx->disabled_auth_mask |= SSL_aPSK; #endif #ifdef OPENSSL_NO_SRP ctx->disabled_mkey_mask |= SSL_kSRP; #endif memcpy(ctx->ssl_mac_pkey_id, default_mac_pkey_id, sizeof(ctx->ssl_mac_pkey_id)); ctx->ssl_mac_pkey_id[SSL_MD_GOST89MAC_IDX] = get_optional_pkey_id(SN_id_Gost28147_89_MAC); if (ctx->ssl_mac_pkey_id[SSL_MD_GOST89MAC_IDX]) ctx->ssl_mac_secret_size[SSL_MD_GOST89MAC_IDX] = 32; else ctx->disabled_mac_mask |= SSL_GOST89MAC; ctx->ssl_mac_pkey_id[SSL_MD_GOST89MAC12_IDX] = get_optional_pkey_id(SN_gost_mac_12); if (ctx->ssl_mac_pkey_id[SSL_MD_GOST89MAC12_IDX]) ctx->ssl_mac_secret_size[SSL_MD_GOST89MAC12_IDX] = 32; else ctx->disabled_mac_mask |= SSL_GOST89MAC12; ctx->ssl_mac_pkey_id[SSL_MD_MAGMAOMAC_IDX] = get_optional_pkey_id(SN_magma_mac); if (ctx->ssl_mac_pkey_id[SSL_MD_MAGMAOMAC_IDX]) ctx->ssl_mac_secret_size[SSL_MD_MAGMAOMAC_IDX] = 32; else ctx->disabled_mac_mask |= SSL_MAGMAOMAC; ctx->ssl_mac_pkey_id[SSL_MD_KUZNYECHIKOMAC_IDX] = get_optional_pkey_id(SN_kuznyechik_mac); if (ctx->ssl_mac_pkey_id[SSL_MD_KUZNYECHIKOMAC_IDX]) ctx->ssl_mac_secret_size[SSL_MD_KUZNYECHIKOMAC_IDX] = 32; else ctx->disabled_mac_mask |= SSL_KUZNYECHIKOMAC; if (!get_optional_pkey_id(SN_id_GostR3410_2001)) ctx->disabled_auth_mask |= SSL_aGOST01 | SSL_aGOST12; if (!get_optional_pkey_id(SN_id_GostR3410_2012_256)) ctx->disabled_auth_mask |= SSL_aGOST12; if (!get_optional_pkey_id(SN_id_GostR3410_2012_512)) ctx->disabled_auth_mask |= SSL_aGOST12; if ((ctx->disabled_auth_mask & (SSL_aGOST01 | SSL_aGOST12)) == (SSL_aGOST01 | SSL_aGOST12)) ctx->disabled_mkey_mask |= SSL_kGOST; if ((ctx->disabled_auth_mask & SSL_aGOST12) == SSL_aGOST12) ctx->disabled_mkey_mask |= SSL_kGOST18; return 1; } #ifndef OPENSSL_NO_COMP static int sk_comp_cmp(const SSL_COMP *const *a, const SSL_COMP *const *b) { return ((*a)->id - (*b)->id); } DEFINE_RUN_ONCE_STATIC(do_load_builtin_compressions) { SSL_COMP *comp = NULL; COMP_METHOD *method = COMP_zlib(); ssl_comp_methods = sk_SSL_COMP_new(sk_comp_cmp); if (COMP_get_type(method) != NID_undef && ssl_comp_methods != NULL) { comp = OPENSSL_malloc(sizeof(*comp)); if (comp != NULL) { comp->method = method; comp->id = SSL_COMP_ZLIB_IDX; comp->name = COMP_get_name(method); if (!sk_SSL_COMP_push(ssl_comp_methods, comp)) OPENSSL_free(comp); sk_SSL_COMP_sort(ssl_comp_methods); } } return 1; } static int load_builtin_compressions(void) { return RUN_ONCE(&ssl_load_builtin_comp_once, do_load_builtin_compressions); } #endif int ssl_cipher_get_evp_cipher(SSL_CTX *ctx, const SSL_CIPHER *sslc, const EVP_CIPHER **enc) { int i = ssl_cipher_info_lookup(ssl_cipher_table_cipher, sslc->algorithm_enc); if (i == -1) { *enc = NULL; } else { if (i == SSL_ENC_NULL_IDX) { *enc = EVP_CIPHER_fetch(ctx->libctx, "NULL", ctx->propq); if (*enc == NULL) return 0; } else { const EVP_CIPHER *cipher = ctx->ssl_cipher_methods[i]; if (cipher == NULL || !ssl_evp_cipher_up_ref(cipher)) return 0; *enc = ctx->ssl_cipher_methods[i]; } } return 1; } int ssl_cipher_get_evp(SSL_CTX *ctx, const SSL_SESSION *s, const EVP_CIPHER **enc, const EVP_MD **md, int *mac_pkey_type, size_t *mac_secret_size, SSL_COMP **comp, int use_etm) { int i; const SSL_CIPHER *c; c = s->cipher; if (c == NULL) return 0; if (comp != NULL) { SSL_COMP ctmp; #ifndef OPENSSL_NO_COMP if (!load_builtin_compressions()) { } #endif *comp = NULL; ctmp.id = s->compress_meth; if (ssl_comp_methods != NULL) { i = sk_SSL_COMP_find(ssl_comp_methods, &ctmp); if (i >= 0) *comp = sk_SSL_COMP_value(ssl_comp_methods, i); } if ((enc == NULL) && (md == NULL)) return 1; } if ((enc == NULL) || (md == NULL)) return 0; if (!ssl_cipher_get_evp_cipher(ctx, c, enc)) return 0; i = ssl_cipher_info_lookup(ssl_cipher_table_mac, c->algorithm_mac); if (i == -1) { *md = NULL; if (mac_pkey_type != NULL) *mac_pkey_type = NID_undef; if (mac_secret_size != NULL) *mac_secret_size = 0; if (c->algorithm_mac == SSL_AEAD) mac_pkey_type = NULL; } else { const EVP_MD *digest = ctx->ssl_digest_methods[i]; if (digest == NULL || !ssl_evp_md_up_ref(digest)) { ssl_evp_cipher_free(*enc); return 0; } *md = digest; if (mac_pkey_type != NULL) *mac_pkey_type = ctx->ssl_mac_pkey_id[i]; if (mac_secret_size != NULL) *mac_secret_size = ctx->ssl_mac_secret_size[i]; } if ((*enc != NULL) && (*md != NULL || (EVP_CIPHER_get_flags(*enc) & EVP_CIPH_FLAG_AEAD_CIPHER)) && (!mac_pkey_type || *mac_pkey_type != NID_undef)) { const EVP_CIPHER *evp = NULL; if (use_etm || s->ssl_version >> 8 != TLS1_VERSION_MAJOR || s->ssl_version < TLS1_VERSION) return 1; if (c->algorithm_enc == SSL_RC4 && c->algorithm_mac == SSL_MD5) evp = ssl_evp_cipher_fetch(ctx->libctx, NID_rc4_hmac_md5, ctx->propq); else if (c->algorithm_enc == SSL_AES128 && c->algorithm_mac == SSL_SHA1) evp = ssl_evp_cipher_fetch(ctx->libctx, NID_aes_128_cbc_hmac_sha1, ctx->propq); else if (c->algorithm_enc == SSL_AES256 && c->algorithm_mac == SSL_SHA1) evp = ssl_evp_cipher_fetch(ctx->libctx, NID_aes_256_cbc_hmac_sha1, ctx->propq); else if (c->algorithm_enc == SSL_AES128 && c->algorithm_mac == SSL_SHA256) evp = ssl_evp_cipher_fetch(ctx->libctx, NID_aes_128_cbc_hmac_sha256, ctx->propq); else if (c->algorithm_enc == SSL_AES256 && c->algorithm_mac == SSL_SHA256) evp = ssl_evp_cipher_fetch(ctx->libctx, NID_aes_256_cbc_hmac_sha256, ctx->propq); if (evp != NULL) { ssl_evp_cipher_free(*enc); ssl_evp_md_free(*md); *enc = evp; *md = NULL; } return 1; } return 0; } const EVP_MD *ssl_md(SSL_CTX *ctx, int idx) { idx &= SSL_HANDSHAKE_MAC_MASK; if (idx < 0 || idx >= SSL_MD_NUM_IDX) return NULL; return ctx->ssl_digest_methods[idx]; } const EVP_MD *ssl_handshake_md(SSL_CONNECTION *s) { return ssl_md(SSL_CONNECTION_GET_CTX(s), ssl_get_algorithm2(s)); } const EVP_MD *ssl_prf_md(SSL_CONNECTION *s) { return ssl_md(SSL_CONNECTION_GET_CTX(s), ssl_get_algorithm2(s) >> TLS1_PRF_DGST_SHIFT); } #define ITEM_SEP(a) \ (((a) == ':') || ((a) == ' ') || ((a) == ';') || ((a) == ',')) static void ll_append_tail(CIPHER_ORDER **head, CIPHER_ORDER *curr, CIPHER_ORDER **tail) { if (curr == *tail) return; if (curr == *head) *head = curr->next; if (curr->prev != NULL) curr->prev->next = curr->next; if (curr->next != NULL) curr->next->prev = curr->prev; (*tail)->next = curr; curr->prev = *tail; curr->next = NULL; *tail = curr; } static void ll_append_head(CIPHER_ORDER **head, CIPHER_ORDER *curr, CIPHER_ORDER **tail) { if (curr == *head) return; if (curr == *tail) *tail = curr->prev; if (curr->next != NULL) curr->next->prev = curr->prev; if (curr->prev != NULL) curr->prev->next = curr->next; (*head)->prev = curr; curr->next = *head; curr->prev = NULL; *head = curr; } static void ssl_cipher_collect_ciphers(const SSL_METHOD *ssl_method, int num_of_ciphers, uint32_t disabled_mkey, uint32_t disabled_auth, uint32_t disabled_enc, uint32_t disabled_mac, CIPHER_ORDER *co_list, CIPHER_ORDER **head_p, CIPHER_ORDER **tail_p) { int i, co_list_num; const SSL_CIPHER *c; co_list_num = 0; for (i = 0; i < num_of_ciphers; i++) { c = ssl_method->get_cipher(i); if (c == NULL || !c->valid) continue; if ((c->algorithm_mkey & disabled_mkey) || (c->algorithm_auth & disabled_auth) || (c->algorithm_enc & disabled_enc) || (c->algorithm_mac & disabled_mac)) continue; if (((ssl_method->ssl3_enc->enc_flags & SSL_ENC_FLAG_DTLS) == 0) && c->min_tls == 0) continue; if (((ssl_method->ssl3_enc->enc_flags & SSL_ENC_FLAG_DTLS) != 0) && c->min_dtls == 0) continue; co_list[co_list_num].cipher = c; co_list[co_list_num].next = NULL; co_list[co_list_num].prev = NULL; co_list[co_list_num].active = 0; co_list_num++; } if (co_list_num > 0) { co_list[0].prev = NULL; if (co_list_num > 1) { co_list[0].next = &co_list[1]; for (i = 1; i < co_list_num - 1; i++) { co_list[i].prev = &co_list[i - 1]; co_list[i].next = &co_list[i + 1]; } co_list[co_list_num - 1].prev = &co_list[co_list_num - 2]; } co_list[co_list_num - 1].next = NULL; *head_p = &co_list[0]; *tail_p = &co_list[co_list_num - 1]; } } static void ssl_cipher_collect_aliases(const SSL_CIPHER **ca_list, int num_of_group_aliases, uint32_t disabled_mkey, uint32_t disabled_auth, uint32_t disabled_enc, uint32_t disabled_mac, CIPHER_ORDER *head) { CIPHER_ORDER *ciph_curr; const SSL_CIPHER **ca_curr; int i; uint32_t mask_mkey = ~disabled_mkey; uint32_t mask_auth = ~disabled_auth; uint32_t mask_enc = ~disabled_enc; uint32_t mask_mac = ~disabled_mac; ciph_curr = head; ca_curr = ca_list; while (ciph_curr != NULL) { *ca_curr = ciph_curr->cipher; ca_curr++; ciph_curr = ciph_curr->next; } for (i = 0; i < num_of_group_aliases; i++) { uint32_t algorithm_mkey = cipher_aliases[i].algorithm_mkey; uint32_t algorithm_auth = cipher_aliases[i].algorithm_auth; uint32_t algorithm_enc = cipher_aliases[i].algorithm_enc; uint32_t algorithm_mac = cipher_aliases[i].algorithm_mac; if (algorithm_mkey) if ((algorithm_mkey & mask_mkey) == 0) continue; if (algorithm_auth) if ((algorithm_auth & mask_auth) == 0) continue; if (algorithm_enc) if ((algorithm_enc & mask_enc) == 0) continue; if (algorithm_mac) if ((algorithm_mac & mask_mac) == 0) continue; *ca_curr = (SSL_CIPHER *)(cipher_aliases + i); ca_curr++; } *ca_curr = NULL; } static void ssl_cipher_apply_rule(uint32_t cipher_id, uint32_t alg_mkey, uint32_t alg_auth, uint32_t alg_enc, uint32_t alg_mac, int min_tls, uint32_t algo_strength, int rule, int32_t strength_bits, CIPHER_ORDER **head_p, CIPHER_ORDER **tail_p) { CIPHER_ORDER *head, *tail, *curr, *next, *last; const SSL_CIPHER *cp; int reverse = 0; OSSL_TRACE_BEGIN(TLS_CIPHER) { BIO_printf(trc_out, "Applying rule %d with %08x/%08x/%08x/%08x/%08x %08x (%d)\n", rule, (unsigned int)alg_mkey, (unsigned int)alg_auth, (unsigned int)alg_enc, (unsigned int)alg_mac, min_tls, (unsigned int)algo_strength, (int)strength_bits); } if (rule == CIPHER_DEL || rule == CIPHER_BUMP) reverse = 1; head = *head_p; tail = *tail_p; if (reverse) { next = tail; last = head; } else { next = head; last = tail; } curr = NULL; for (;;) { if (curr == last) break; curr = next; if (curr == NULL) break; next = reverse ? curr->prev : curr->next; cp = curr->cipher; if (strength_bits >= 0) { if (strength_bits != cp->strength_bits) continue; } else { if (trc_out != NULL) { BIO_printf(trc_out, "\nName: %s:" "\nAlgo = %08x/%08x/%08x/%08x/%08x Algo_strength = %08x\n", cp->name, (unsigned int)cp->algorithm_mkey, (unsigned int)cp->algorithm_auth, (unsigned int)cp->algorithm_enc, (unsigned int)cp->algorithm_mac, cp->min_tls, (unsigned int)cp->algo_strength); } if (cipher_id != 0 && (cipher_id != cp->id)) continue; if (alg_mkey && !(alg_mkey & cp->algorithm_mkey)) continue; if (alg_auth && !(alg_auth & cp->algorithm_auth)) continue; if (alg_enc && !(alg_enc & cp->algorithm_enc)) continue; if (alg_mac && !(alg_mac & cp->algorithm_mac)) continue; if (min_tls && (min_tls != cp->min_tls)) continue; if ((algo_strength & SSL_STRONG_MASK) && !(algo_strength & SSL_STRONG_MASK & cp->algo_strength)) continue; if ((algo_strength & SSL_DEFAULT_MASK) && !(algo_strength & SSL_DEFAULT_MASK & cp->algo_strength)) continue; } if (trc_out != NULL) BIO_printf(trc_out, "Action = %d\n", rule); if (rule == CIPHER_ADD) { if (!curr->active) { ll_append_tail(&head, curr, &tail); curr->active = 1; } } else if (rule == CIPHER_ORD) { if (curr->active) { ll_append_tail(&head, curr, &tail); } } else if (rule == CIPHER_DEL) { if (curr->active) { ll_append_head(&head, curr, &tail); curr->active = 0; } } else if (rule == CIPHER_BUMP) { if (curr->active) ll_append_head(&head, curr, &tail); } else if (rule == CIPHER_KILL) { if (head == curr) head = curr->next; else curr->prev->next = curr->next; if (tail == curr) tail = curr->prev; curr->active = 0; if (curr->next != NULL) curr->next->prev = curr->prev; if (curr->prev != NULL) curr->prev->next = curr->next; curr->next = NULL; curr->prev = NULL; } } *head_p = head; *tail_p = tail; OSSL_TRACE_END(TLS_CIPHER); } static int ssl_cipher_strength_sort(CIPHER_ORDER **head_p, CIPHER_ORDER **tail_p) { int32_t max_strength_bits; int i, *number_uses; CIPHER_ORDER *curr; max_strength_bits = 0; curr = *head_p; while (curr != NULL) { if (curr->active && (curr->cipher->strength_bits > max_strength_bits)) max_strength_bits = curr->cipher->strength_bits; curr = curr->next; } number_uses = OPENSSL_zalloc(sizeof(int) * (max_strength_bits + 1)); if (number_uses == NULL) return 0; curr = *head_p; while (curr != NULL) { if (curr->active) number_uses[curr->cipher->strength_bits]++; curr = curr->next; } for (i = max_strength_bits; i >= 0; i--) if (number_uses[i] > 0) ssl_cipher_apply_rule(0, 0, 0, 0, 0, 0, 0, CIPHER_ORD, i, head_p, tail_p); OPENSSL_free(number_uses); return 1; } static int ssl_cipher_process_rulestr(const char *rule_str, CIPHER_ORDER **head_p, CIPHER_ORDER **tail_p, const SSL_CIPHER **ca_list, CERT *c) { uint32_t alg_mkey, alg_auth, alg_enc, alg_mac, algo_strength; int min_tls; const char *l, *buf; int j, multi, found, rule, retval, ok, buflen; uint32_t cipher_id = 0; char ch; retval = 1; l = rule_str; for (;;) { ch = *l; if (ch == '\0') break; if (ch == '-') { rule = CIPHER_DEL; l++; } else if (ch == '+') { rule = CIPHER_ORD; l++; } else if (ch == '!') { rule = CIPHER_KILL; l++; } else if (ch == '@') { rule = CIPHER_SPECIAL; l++; } else { rule = CIPHER_ADD; } if (ITEM_SEP(ch)) { l++; continue; } alg_mkey = 0; alg_auth = 0; alg_enc = 0; alg_mac = 0; min_tls = 0; algo_strength = 0; for (;;) { ch = *l; buf = l; buflen = 0; #ifndef CHARSET_EBCDIC while (((ch >= 'A') && (ch <= 'Z')) || ((ch >= '0') && (ch <= '9')) || ((ch >= 'a') && (ch <= 'z')) || (ch == '-') || (ch == '_') || (ch == '.') || (ch == '=')) #else while (isalnum((unsigned char)ch) || (ch == '-') || (ch == '_') || (ch == '.') || (ch == '=')) #endif { ch = *(++l); buflen++; } if (buflen == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_COMMAND); return 0; } if (rule == CIPHER_SPECIAL) { found = 0; break; } if (ch == '+') { multi = 1; l++; } else { multi = 0; } j = found = 0; cipher_id = 0; while (ca_list[j]) { if (strncmp(buf, ca_list[j]->name, buflen) == 0 && (ca_list[j]->name[buflen] == '\0')) { found = 1; break; } else if (ca_list[j]->stdname != NULL && strncmp(buf, ca_list[j]->stdname, buflen) == 0 && ca_list[j]->stdname[buflen] == '\0') { found = 1; break; } else j++; } if (!found) break; if (ca_list[j]->algorithm_mkey) { if (alg_mkey) { alg_mkey &= ca_list[j]->algorithm_mkey; if (!alg_mkey) { found = 0; break; } } else { alg_mkey = ca_list[j]->algorithm_mkey; } } if (ca_list[j]->algorithm_auth) { if (alg_auth) { alg_auth &= ca_list[j]->algorithm_auth; if (!alg_auth) { found = 0; break; } } else { alg_auth = ca_list[j]->algorithm_auth; } } if (ca_list[j]->algorithm_enc) { if (alg_enc) { alg_enc &= ca_list[j]->algorithm_enc; if (!alg_enc) { found = 0; break; } } else { alg_enc = ca_list[j]->algorithm_enc; } } if (ca_list[j]->algorithm_mac) { if (alg_mac) { alg_mac &= ca_list[j]->algorithm_mac; if (!alg_mac) { found = 0; break; } } else { alg_mac = ca_list[j]->algorithm_mac; } } if (ca_list[j]->algo_strength & SSL_STRONG_MASK) { if (algo_strength & SSL_STRONG_MASK) { algo_strength &= (ca_list[j]->algo_strength & SSL_STRONG_MASK) | ~SSL_STRONG_MASK; if (!(algo_strength & SSL_STRONG_MASK)) { found = 0; break; } } else { algo_strength = ca_list[j]->algo_strength & SSL_STRONG_MASK; } } if (ca_list[j]->algo_strength & SSL_DEFAULT_MASK) { if (algo_strength & SSL_DEFAULT_MASK) { algo_strength &= (ca_list[j]->algo_strength & SSL_DEFAULT_MASK) | ~SSL_DEFAULT_MASK; if (!(algo_strength & SSL_DEFAULT_MASK)) { found = 0; break; } } else { algo_strength |= ca_list[j]->algo_strength & SSL_DEFAULT_MASK; } } if (ca_list[j]->valid) { cipher_id = ca_list[j]->id; } else { if (ca_list[j]->min_tls) { if (min_tls != 0 && min_tls != ca_list[j]->min_tls) { found = 0; break; } else { min_tls = ca_list[j]->min_tls; } } } if (!multi) break; } if (rule == CIPHER_SPECIAL) { ok = 0; if ((buflen == 8) && HAS_PREFIX(buf, "STRENGTH")) { ok = ssl_cipher_strength_sort(head_p, tail_p); } else if (buflen == 10 && CHECK_AND_SKIP_PREFIX(buf, "SECLEVEL=")) { int level = *buf - '0'; if (level < 0 || level > 5) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_COMMAND); } else { c->sec_level = level; ok = 1; } } else { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_COMMAND); } if (ok == 0) retval = 0; while ((*l != '\0') && !ITEM_SEP(*l)) l++; } else if (found) { ssl_cipher_apply_rule(cipher_id, alg_mkey, alg_auth, alg_enc, alg_mac, min_tls, algo_strength, rule, -1, head_p, tail_p); } else { while ((*l != '\0') && !ITEM_SEP(*l)) l++; } if (*l == '\0') break; } return retval; } static int check_suiteb_cipher_list(const SSL_METHOD *meth, CERT *c, const char **prule_str) { unsigned int suiteb_flags = 0, suiteb_comb2 = 0; if (HAS_PREFIX(*prule_str, "SUITEB128ONLY")) { suiteb_flags = SSL_CERT_FLAG_SUITEB_128_LOS_ONLY; } else if (HAS_PREFIX(*prule_str, "SUITEB128C2")) { suiteb_comb2 = 1; suiteb_flags = SSL_CERT_FLAG_SUITEB_128_LOS; } else if (HAS_PREFIX(*prule_str, "SUITEB128")) { suiteb_flags = SSL_CERT_FLAG_SUITEB_128_LOS; } else if (HAS_PREFIX(*prule_str, "SUITEB192")) { suiteb_flags = SSL_CERT_FLAG_SUITEB_192_LOS; } if (suiteb_flags) { c->cert_flags &= ~SSL_CERT_FLAG_SUITEB_128_LOS; c->cert_flags |= suiteb_flags; } else { suiteb_flags = c->cert_flags & SSL_CERT_FLAG_SUITEB_128_LOS; } if (!suiteb_flags) return 1; if (!(meth->ssl3_enc->enc_flags & SSL_ENC_FLAG_TLS1_2_CIPHERS)) { ERR_raise(ERR_LIB_SSL, SSL_R_AT_LEAST_TLS_1_2_NEEDED_IN_SUITEB_MODE); return 0; } switch (suiteb_flags) { case SSL_CERT_FLAG_SUITEB_128_LOS: if (suiteb_comb2) *prule_str = "ECDHE-ECDSA-AES256-GCM-SHA384"; else *prule_str = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384"; break; case SSL_CERT_FLAG_SUITEB_128_LOS_ONLY: *prule_str = "ECDHE-ECDSA-AES128-GCM-SHA256"; break; case SSL_CERT_FLAG_SUITEB_192_LOS: *prule_str = "ECDHE-ECDSA-AES256-GCM-SHA384"; break; } return 1; } static int ciphersuite_cb(const char *elem, int len, void *arg) { STACK_OF(SSL_CIPHER) *ciphersuites = (STACK_OF(SSL_CIPHER) *)arg; const SSL_CIPHER *cipher; char name[80]; if (len > (int)(sizeof(name) - 1)) return 1; memcpy(name, elem, len); name[len] = '\0'; cipher = ssl3_get_cipher_by_std_name(name); if (cipher == NULL) return 1; if (!sk_SSL_CIPHER_push(ciphersuites, cipher)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } return 1; } static __owur int set_ciphersuites(STACK_OF(SSL_CIPHER) **currciphers, const char *str) { STACK_OF(SSL_CIPHER) *newciphers = sk_SSL_CIPHER_new_null(); if (newciphers == NULL) return 0; if (*str != '\0' && (CONF_parse_list(str, ':', 1, ciphersuite_cb, newciphers) <= 0 || sk_SSL_CIPHER_num(newciphers) == 0)) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_CIPHER_MATCH); sk_SSL_CIPHER_free(newciphers); return 0; } sk_SSL_CIPHER_free(*currciphers); *currciphers = newciphers; return 1; } static int update_cipher_list_by_id(STACK_OF(SSL_CIPHER) **cipher_list_by_id, STACK_OF(SSL_CIPHER) *cipherstack) { STACK_OF(SSL_CIPHER) *tmp_cipher_list = sk_SSL_CIPHER_dup(cipherstack); if (tmp_cipher_list == NULL) { return 0; } sk_SSL_CIPHER_free(*cipher_list_by_id); *cipher_list_by_id = tmp_cipher_list; (void)sk_SSL_CIPHER_set_cmp_func(*cipher_list_by_id, ssl_cipher_ptr_id_cmp); sk_SSL_CIPHER_sort(*cipher_list_by_id); return 1; } static int update_cipher_list(SSL_CTX *ctx, STACK_OF(SSL_CIPHER) **cipher_list, STACK_OF(SSL_CIPHER) **cipher_list_by_id, STACK_OF(SSL_CIPHER) *tls13_ciphersuites) { int i; STACK_OF(SSL_CIPHER) *tmp_cipher_list = sk_SSL_CIPHER_dup(*cipher_list); if (tmp_cipher_list == NULL) return 0; while (sk_SSL_CIPHER_num(tmp_cipher_list) > 0 && sk_SSL_CIPHER_value(tmp_cipher_list, 0)->min_tls == TLS1_3_VERSION) (void)sk_SSL_CIPHER_delete(tmp_cipher_list, 0); for (i = sk_SSL_CIPHER_num(tls13_ciphersuites) - 1; i >= 0; i--) { const SSL_CIPHER *sslc = sk_SSL_CIPHER_value(tls13_ciphersuites, i); if ((sslc->algorithm_enc & ctx->disabled_enc_mask) == 0 && (ssl_cipher_table_mac[sslc->algorithm2 & SSL_HANDSHAKE_MAC_MASK].mask & ctx->disabled_mac_mask) == 0) { sk_SSL_CIPHER_unshift(tmp_cipher_list, sslc); } } if (!update_cipher_list_by_id(cipher_list_by_id, tmp_cipher_list)) { sk_SSL_CIPHER_free(tmp_cipher_list); return 0; } sk_SSL_CIPHER_free(*cipher_list); *cipher_list = tmp_cipher_list; return 1; } int SSL_CTX_set_ciphersuites(SSL_CTX *ctx, const char *str) { int ret = set_ciphersuites(&(ctx->tls13_ciphersuites), str); if (ret && ctx->cipher_list != NULL) return update_cipher_list(ctx, &ctx->cipher_list, &ctx->cipher_list_by_id, ctx->tls13_ciphersuites); return ret; } int SSL_set_ciphersuites(SSL *s, const char *str) { STACK_OF(SSL_CIPHER) *cipher_list; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); int ret; if (sc == NULL) return 0; ret = set_ciphersuites(&(sc->tls13_ciphersuites), str); if (sc->cipher_list == NULL) { if ((cipher_list = SSL_get_ciphers(s)) != NULL) sc->cipher_list = sk_SSL_CIPHER_dup(cipher_list); } if (ret && sc->cipher_list != NULL) return update_cipher_list(s->ctx, &sc->cipher_list, &sc->cipher_list_by_id, sc->tls13_ciphersuites); return ret; } STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(SSL_CTX *ctx, STACK_OF(SSL_CIPHER) *tls13_ciphersuites, STACK_OF(SSL_CIPHER) **cipher_list, STACK_OF(SSL_CIPHER) **cipher_list_by_id, const char *rule_str, CERT *c) { int ok, num_of_ciphers, num_of_alias_max, num_of_group_aliases, i; uint32_t disabled_mkey, disabled_auth, disabled_enc, disabled_mac; STACK_OF(SSL_CIPHER) *cipherstack; const char *rule_p; CIPHER_ORDER *co_list = NULL, *head = NULL, *tail = NULL, *curr; const SSL_CIPHER **ca_list = NULL; const SSL_METHOD *ssl_method = ctx->method; if (rule_str == NULL || cipher_list == NULL || cipher_list_by_id == NULL) return NULL; if (!check_suiteb_cipher_list(ssl_method, c, &rule_str)) return NULL; disabled_mkey = ctx->disabled_mkey_mask; disabled_auth = ctx->disabled_auth_mask; disabled_enc = ctx->disabled_enc_mask; disabled_mac = ctx->disabled_mac_mask; num_of_ciphers = ssl_method->num_ciphers(); if (num_of_ciphers > 0) { co_list = OPENSSL_malloc(sizeof(*co_list) * num_of_ciphers); if (co_list == NULL) return NULL; } ssl_cipher_collect_ciphers(ssl_method, num_of_ciphers, disabled_mkey, disabled_auth, disabled_enc, disabled_mac, co_list, &head, &tail); ssl_cipher_apply_rule(0, SSL_kECDHE, SSL_aECDSA, 0, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); ssl_cipher_apply_rule(0, SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); ssl_cipher_apply_rule(0, SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_DEL, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, SSL_AESGCM, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, SSL_CHACHA20, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, SSL_AES ^ SSL_AESGCM, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, 0, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, 0, SSL_MD5, 0, 0, CIPHER_ORD, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, SSL_aNULL, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); ssl_cipher_apply_rule(0, SSL_kPSK, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, SSL_RC4, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); if (!ssl_cipher_strength_sort(&head, &tail)) { OPENSSL_free(co_list); return NULL; } ssl_cipher_apply_rule(0, 0, 0, 0, 0, TLS1_2_VERSION, 0, CIPHER_BUMP, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, 0, SSL_AEAD, 0, 0, CIPHER_BUMP, -1, &head, &tail); ssl_cipher_apply_rule(0, SSL_kDHE | SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_BUMP, -1, &head, &tail); ssl_cipher_apply_rule(0, SSL_kDHE | SSL_kECDHE, 0, 0, SSL_AEAD, 0, 0, CIPHER_BUMP, -1, &head, &tail); ssl_cipher_apply_rule(0, 0, 0, 0, 0, 0, 0, CIPHER_DEL, -1, &head, &tail); num_of_group_aliases = OSSL_NELEM(cipher_aliases); num_of_alias_max = num_of_ciphers + num_of_group_aliases + 1; ca_list = OPENSSL_malloc(sizeof(*ca_list) * num_of_alias_max); if (ca_list == NULL) { OPENSSL_free(co_list); return NULL; } ssl_cipher_collect_aliases(ca_list, num_of_group_aliases, disabled_mkey, disabled_auth, disabled_enc, disabled_mac, head); ok = 1; rule_p = rule_str; if (HAS_PREFIX(rule_str, "DEFAULT")) { ok = ssl_cipher_process_rulestr(OSSL_default_cipher_list(), &head, &tail, ca_list, c); rule_p += 7; if (*rule_p == ':') rule_p++; } if (ok && (rule_p[0] != '\0')) ok = ssl_cipher_process_rulestr(rule_p, &head, &tail, ca_list, c); OPENSSL_free(ca_list); if (!ok) { OPENSSL_free(co_list); return NULL; } if ((cipherstack = sk_SSL_CIPHER_new_null()) == NULL) { OPENSSL_free(co_list); return NULL; } for (i = 0; i < sk_SSL_CIPHER_num(tls13_ciphersuites); i++) { const SSL_CIPHER *sslc = sk_SSL_CIPHER_value(tls13_ciphersuites, i); if ((sslc->algorithm_enc & disabled_enc) != 0 || (ssl_cipher_table_mac[sslc->algorithm2 & SSL_HANDSHAKE_MAC_MASK].mask & ctx->disabled_mac_mask) != 0) { sk_SSL_CIPHER_delete(tls13_ciphersuites, i); i--; continue; } if (!sk_SSL_CIPHER_push(cipherstack, sslc)) { OPENSSL_free(co_list); sk_SSL_CIPHER_free(cipherstack); return NULL; } } OSSL_TRACE_BEGIN(TLS_CIPHER) { BIO_printf(trc_out, "cipher selection:\n"); } for (curr = head; curr != NULL; curr = curr->next) { if (curr->active) { if (!sk_SSL_CIPHER_push(cipherstack, curr->cipher)) { OPENSSL_free(co_list); sk_SSL_CIPHER_free(cipherstack); OSSL_TRACE_CANCEL(TLS_CIPHER); return NULL; } if (trc_out != NULL) BIO_printf(trc_out, "<%s>\n", curr->cipher->name); } } OPENSSL_free(co_list); OSSL_TRACE_END(TLS_CIPHER); if (!update_cipher_list_by_id(cipher_list_by_id, cipherstack)) { sk_SSL_CIPHER_free(cipherstack); return NULL; } sk_SSL_CIPHER_free(*cipher_list); *cipher_list = cipherstack; return cipherstack; } char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) { const char *ver; const char *kx, *au, *enc, *mac; uint32_t alg_mkey, alg_auth, alg_enc, alg_mac; static const char *const format = "%-30s %-7s Kx=%-8s Au=%-5s Enc=%-22s Mac=%-4s\n"; if (buf == NULL) { len = 128; if ((buf = OPENSSL_malloc(len)) == NULL) return NULL; } else if (len < 128) { return NULL; } alg_mkey = cipher->algorithm_mkey; alg_auth = cipher->algorithm_auth; alg_enc = cipher->algorithm_enc; alg_mac = cipher->algorithm_mac; ver = ssl_protocol_to_string(cipher->min_tls); switch (alg_mkey) { case SSL_kRSA: kx = "RSA"; break; case SSL_kDHE: kx = "DH"; break; case SSL_kECDHE: kx = "ECDH"; break; case SSL_kPSK: kx = "PSK"; break; case SSL_kRSAPSK: kx = "RSAPSK"; break; case SSL_kECDHEPSK: kx = "ECDHEPSK"; break; case SSL_kDHEPSK: kx = "DHEPSK"; break; case SSL_kSRP: kx = "SRP"; break; case SSL_kGOST: kx = "GOST"; break; case SSL_kGOST18: kx = "GOST18"; break; case SSL_kANY: kx = "any"; break; default: kx = "unknown"; } switch (alg_auth) { case SSL_aRSA: au = "RSA"; break; case SSL_aDSS: au = "DSS"; break; case SSL_aNULL: au = "None"; break; case SSL_aECDSA: au = "ECDSA"; break; case SSL_aPSK: au = "PSK"; break; case SSL_aSRP: au = "SRP"; break; case SSL_aGOST01: au = "GOST01"; break; case (SSL_aGOST12 | SSL_aGOST01): au = "GOST12"; break; case SSL_aANY: au = "any"; break; default: au = "unknown"; break; } switch (alg_enc) { case SSL_DES: enc = "DES(56)"; break; case SSL_3DES: enc = "3DES(168)"; break; case SSL_RC4: enc = "RC4(128)"; break; case SSL_RC2: enc = "RC2(128)"; break; case SSL_IDEA: enc = "IDEA(128)"; break; case SSL_eNULL: enc = "None"; break; case SSL_AES128: enc = "AES(128)"; break; case SSL_AES256: enc = "AES(256)"; break; case SSL_AES128GCM: enc = "AESGCM(128)"; break; case SSL_AES256GCM: enc = "AESGCM(256)"; break; case SSL_AES128CCM: enc = "AESCCM(128)"; break; case SSL_AES256CCM: enc = "AESCCM(256)"; break; case SSL_AES128CCM8: enc = "AESCCM8(128)"; break; case SSL_AES256CCM8: enc = "AESCCM8(256)"; break; case SSL_CAMELLIA128: enc = "Camellia(128)"; break; case SSL_CAMELLIA256: enc = "Camellia(256)"; break; case SSL_ARIA128GCM: enc = "ARIAGCM(128)"; break; case SSL_ARIA256GCM: enc = "ARIAGCM(256)"; break; case SSL_SEED: enc = "SEED(128)"; break; case SSL_eGOST2814789CNT: case SSL_eGOST2814789CNT12: enc = "GOST89(256)"; break; case SSL_MAGMA: enc = "MAGMA"; break; case SSL_KUZNYECHIK: enc = "KUZNYECHIK"; break; case SSL_CHACHA20POLY1305: enc = "CHACHA20/POLY1305(256)"; break; default: enc = "unknown"; break; } switch (alg_mac) { case SSL_MD5: mac = "MD5"; break; case SSL_SHA1: mac = "SHA1"; break; case SSL_SHA256: mac = "SHA256"; break; case SSL_SHA384: mac = "SHA384"; break; case SSL_AEAD: mac = "AEAD"; break; case SSL_GOST89MAC: case SSL_GOST89MAC12: mac = "GOST89"; break; case SSL_GOST94: mac = "GOST94"; break; case SSL_GOST12_256: case SSL_GOST12_512: mac = "GOST2012"; break; default: mac = "unknown"; break; } BIO_snprintf(buf, len, format, cipher->name, ver, kx, au, enc, mac); return buf; } const char *SSL_CIPHER_get_version(const SSL_CIPHER *c) { if (c == NULL) return "(NONE)"; if (c->min_tls == TLS1_VERSION) return "TLSv1.0"; return ssl_protocol_to_string(c->min_tls); } const char *SSL_CIPHER_get_name(const SSL_CIPHER *c) { if (c != NULL) return c->name; return "(NONE)"; } const char *SSL_CIPHER_standard_name(const SSL_CIPHER *c) { if (c != NULL) return c->stdname; return "(NONE)"; } const char *OPENSSL_cipher_name(const char *stdname) { const SSL_CIPHER *c; if (stdname == NULL) return "(NONE)"; c = ssl3_get_cipher_by_std_name(stdname); return SSL_CIPHER_get_name(c); } int SSL_CIPHER_get_bits(const SSL_CIPHER *c, int *alg_bits) { int ret = 0; if (c != NULL) { if (alg_bits != NULL) *alg_bits = (int)c->alg_bits; ret = (int)c->strength_bits; } return ret; } uint32_t SSL_CIPHER_get_id(const SSL_CIPHER *c) { return c->id; } uint16_t SSL_CIPHER_get_protocol_id(const SSL_CIPHER *c) { return c->id & 0xFFFF; } SSL_COMP *ssl3_comp_find(STACK_OF(SSL_COMP) *sk, int n) { SSL_COMP *ctmp; int i, nn; if ((n == 0) || (sk == NULL)) return NULL; nn = sk_SSL_COMP_num(sk); for (i = 0; i < nn; i++) { ctmp = sk_SSL_COMP_value(sk, i); if (ctmp->id == n) return ctmp; } return NULL; } #ifdef OPENSSL_NO_COMP STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void) { return NULL; } STACK_OF(SSL_COMP) *SSL_COMP_set0_compression_methods(STACK_OF(SSL_COMP) *meths) { return meths; } int SSL_COMP_add_compression_method(int id, COMP_METHOD *cm) { return 1; } #else STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void) { load_builtin_compressions(); return ssl_comp_methods; } STACK_OF(SSL_COMP) *SSL_COMP_set0_compression_methods(STACK_OF(SSL_COMP) *meths) { STACK_OF(SSL_COMP) *old_meths = ssl_comp_methods; ssl_comp_methods = meths; return old_meths; } static void cmeth_free(SSL_COMP *cm) { OPENSSL_free(cm); } void ssl_comp_free_compression_methods_int(void) { STACK_OF(SSL_COMP) *old_meths = ssl_comp_methods; ssl_comp_methods = NULL; sk_SSL_COMP_pop_free(old_meths, cmeth_free); } int SSL_COMP_add_compression_method(int id, COMP_METHOD *cm) { SSL_COMP *comp; if (cm == NULL || COMP_get_type(cm) == NID_undef) return 1; if (id < 193 || id > 255) { ERR_raise(ERR_LIB_SSL, SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE); return 1; } comp = OPENSSL_malloc(sizeof(*comp)); if (comp == NULL) return 1; comp->id = id; comp->method = cm; load_builtin_compressions(); if (ssl_comp_methods && sk_SSL_COMP_find(ssl_comp_methods, comp) >= 0) { OPENSSL_free(comp); ERR_raise(ERR_LIB_SSL, SSL_R_DUPLICATE_COMPRESSION_ID); return 1; } if (ssl_comp_methods == NULL || !sk_SSL_COMP_push(ssl_comp_methods, comp)) { OPENSSL_free(comp); ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); return 1; } return 0; } #endif const char *SSL_COMP_get_name(const COMP_METHOD *comp) { #ifndef OPENSSL_NO_COMP return comp ? COMP_get_name(comp) : NULL; #else return NULL; #endif } const char *SSL_COMP_get0_name(const SSL_COMP *comp) { #ifndef OPENSSL_NO_COMP return comp->name; #else return NULL; #endif } int SSL_COMP_get_id(const SSL_COMP *comp) { #ifndef OPENSSL_NO_COMP return comp->id; #else return -1; #endif } const SSL_CIPHER *ssl_get_cipher_by_char(SSL_CONNECTION *s, const unsigned char *ptr, int all) { const SSL_CIPHER *c = SSL_CONNECTION_GET_SSL(s)->method->get_cipher_by_char(ptr); if (c == NULL || (!all && c->valid == 0)) return NULL; return c; } const SSL_CIPHER *SSL_CIPHER_find(SSL *ssl, const unsigned char *ptr) { return ssl->method->get_cipher_by_char(ptr); } int SSL_CIPHER_get_cipher_nid(const SSL_CIPHER *c) { int i; if (c == NULL) return NID_undef; i = ssl_cipher_info_lookup(ssl_cipher_table_cipher, c->algorithm_enc); if (i == -1) return NID_undef; return ssl_cipher_table_cipher[i].nid; } int SSL_CIPHER_get_digest_nid(const SSL_CIPHER *c) { int i = ssl_cipher_info_lookup(ssl_cipher_table_mac, c->algorithm_mac); if (i == -1) return NID_undef; return ssl_cipher_table_mac[i].nid; } int SSL_CIPHER_get_kx_nid(const SSL_CIPHER *c) { int i = ssl_cipher_info_lookup(ssl_cipher_table_kx, c->algorithm_mkey); if (i == -1) return NID_undef; return ssl_cipher_table_kx[i].nid; } int SSL_CIPHER_get_auth_nid(const SSL_CIPHER *c) { int i = ssl_cipher_info_lookup(ssl_cipher_table_auth, c->algorithm_auth); if (i == -1) return NID_undef; return ssl_cipher_table_auth[i].nid; } int ssl_get_md_idx(int md_nid) { int i; for(i = 0; i < SSL_MD_NUM_IDX; i++) { if (md_nid == ssl_cipher_table_mac[i].nid) return i; } return -1; } const EVP_MD *SSL_CIPHER_get_handshake_digest(const SSL_CIPHER *c) { int idx = c->algorithm2 & SSL_HANDSHAKE_MAC_MASK; if (idx < 0 || idx >= SSL_MD_NUM_IDX) return NULL; return EVP_get_digestbynid(ssl_cipher_table_mac[idx].nid); } int SSL_CIPHER_is_aead(const SSL_CIPHER *c) { return (c->algorithm_mac & SSL_AEAD) ? 1 : 0; } int ssl_cipher_get_overhead(const SSL_CIPHER *c, size_t *mac_overhead, size_t *int_overhead, size_t *blocksize, size_t *ext_overhead) { size_t mac = 0, in = 0, blk = 0, out = 0; if (c->algorithm_enc & (SSL_AESGCM | SSL_ARIAGCM)) { out = EVP_GCM_TLS_EXPLICIT_IV_LEN + EVP_GCM_TLS_TAG_LEN; } else if (c->algorithm_enc & (SSL_AES128CCM | SSL_AES256CCM)) { out = EVP_CCM_TLS_EXPLICIT_IV_LEN + 16; } else if (c->algorithm_enc & (SSL_AES128CCM8 | SSL_AES256CCM8)) { out = EVP_CCM_TLS_EXPLICIT_IV_LEN + 8; } else if (c->algorithm_enc & SSL_CHACHA20POLY1305) { out = 16; } else if (c->algorithm_mac & SSL_AEAD) { return 0; } else { int digest_nid = SSL_CIPHER_get_digest_nid(c); const EVP_MD *e_md = EVP_get_digestbynid(digest_nid); if (e_md == NULL) return 0; mac = EVP_MD_get_size(e_md); if (c->algorithm_enc != SSL_eNULL) { int cipher_nid = SSL_CIPHER_get_cipher_nid(c); const EVP_CIPHER *e_ciph = EVP_get_cipherbynid(cipher_nid); if (e_ciph == NULL || EVP_CIPHER_get_mode(e_ciph) != EVP_CIPH_CBC_MODE) return 0; in = 1; out = EVP_CIPHER_get_iv_length(e_ciph); blk = EVP_CIPHER_get_block_size(e_ciph); if (blk == 0) return 0; } } *mac_overhead = mac; *int_overhead = in; *blocksize = blk; *ext_overhead = out; return 1; } int ssl_cert_is_disabled(SSL_CTX *ctx, size_t idx) { const SSL_CERT_LOOKUP *cl; if (idx >= SSL_PKEY_NUM) return 0; cl = ssl_cert_lookup_by_idx(idx, ctx); if (cl == NULL || (cl->amask & ctx->disabled_auth_mask) != 0) return 1; return 0; } const char *OSSL_default_cipher_list(void) { return "ALL:!COMPLEMENTOFDEFAULT:!eNULL"; } const char *OSSL_default_ciphersuites(void) { return "TLS_AES_256_GCM_SHA384:" "TLS_CHACHA20_POLY1305_SHA256:" "TLS_AES_128_GCM_SHA256"; }
ssl
openssl/ssl/ssl_ciph.c
openssl
#include <stdio.h> #include <openssl/objects.h> #include "ssl_local.h" #include "quic/quic_local.h" #ifndef OPENSSL_NO_SRTP static const SRTP_PROTECTION_PROFILE srtp_known_profiles[] = { { "SRTP_AES128_CM_SHA1_80", SRTP_AES128_CM_SHA1_80, }, { "SRTP_AES128_CM_SHA1_32", SRTP_AES128_CM_SHA1_32, }, { "SRTP_AEAD_AES_128_GCM", SRTP_AEAD_AES_128_GCM, }, { "SRTP_AEAD_AES_256_GCM", SRTP_AEAD_AES_256_GCM, }, { "SRTP_DOUBLE_AEAD_AES_128_GCM_AEAD_AES_128_GCM", SRTP_DOUBLE_AEAD_AES_128_GCM_AEAD_AES_128_GCM, }, { "SRTP_DOUBLE_AEAD_AES_256_GCM_AEAD_AES_256_GCM", SRTP_DOUBLE_AEAD_AES_256_GCM_AEAD_AES_256_GCM, }, { "SRTP_ARIA_128_CTR_HMAC_SHA1_80", SRTP_ARIA_128_CTR_HMAC_SHA1_80, }, { "SRTP_ARIA_128_CTR_HMAC_SHA1_32", SRTP_ARIA_128_CTR_HMAC_SHA1_32, }, { "SRTP_ARIA_256_CTR_HMAC_SHA1_80", SRTP_ARIA_256_CTR_HMAC_SHA1_80, }, { "SRTP_ARIA_256_CTR_HMAC_SHA1_32", SRTP_ARIA_256_CTR_HMAC_SHA1_32, }, { "SRTP_AEAD_ARIA_128_GCM", SRTP_AEAD_ARIA_128_GCM, }, { "SRTP_AEAD_ARIA_256_GCM", SRTP_AEAD_ARIA_256_GCM, }, {0} }; static int find_profile_by_name(char *profile_name, const SRTP_PROTECTION_PROFILE **pptr, size_t len) { const SRTP_PROTECTION_PROFILE *p; p = srtp_known_profiles; while (p->name) { if ((len == strlen(p->name)) && strncmp(p->name, profile_name, len) == 0) { *pptr = p; return 0; } p++; } return 1; } static int ssl_ctx_make_profiles(const char *profiles_string, STACK_OF(SRTP_PROTECTION_PROFILE) **out) { STACK_OF(SRTP_PROTECTION_PROFILE) *profiles; char *col; char *ptr = (char *)profiles_string; const SRTP_PROTECTION_PROFILE *p; if ((profiles = sk_SRTP_PROTECTION_PROFILE_new_null()) == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); return 1; } do { col = strchr(ptr, ':'); if (!find_profile_by_name(ptr, &p, col ? (size_t)(col - ptr) : strlen(ptr))) { if (sk_SRTP_PROTECTION_PROFILE_find(profiles, (SRTP_PROTECTION_PROFILE *)p) >= 0) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); goto err; } if (!sk_SRTP_PROTECTION_PROFILE_push(profiles, (SRTP_PROTECTION_PROFILE *)p)) { ERR_raise(ERR_LIB_SSL, SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); goto err; } } else { ERR_raise(ERR_LIB_SSL, SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE); goto err; } if (col) ptr = col + 1; } while (col); sk_SRTP_PROTECTION_PROFILE_free(*out); *out = profiles; return 0; err: sk_SRTP_PROTECTION_PROFILE_free(profiles); return 1; } int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles) { if (IS_QUIC_METHOD(ctx->method)) return 1; return ssl_ctx_make_profiles(profiles, &ctx->srtp_profiles); } int SSL_set_tlsext_use_srtp(SSL *s, const char *profiles) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 1; return ssl_ctx_make_profiles(profiles, &sc->srtp_profiles); } STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc != NULL) { if (sc->srtp_profiles != NULL) { return sc->srtp_profiles; } else if ((s->ctx != NULL) && (s->ctx->srtp_profiles != NULL)) { return s->ctx->srtp_profiles; } } return NULL; } SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; return sc->srtp_profile; } #endif
ssl
openssl/ssl/d1_srtp.c
openssl
#include <stdio.h> #include <openssl/objects.h> #include "internal/nelem.h" #include "ssl_local.h" #include <openssl/md5.h> #include <openssl/dh.h> #include <openssl/rand.h> #include <openssl/trace.h> #include <openssl/x509v3.h> #include <openssl/core_names.h> #include "internal/cryptlib.h" #define TLS13_NUM_CIPHERS OSSL_NELEM(tls13_ciphers) #define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers) #define SSL3_NUM_SCSVS OSSL_NELEM(ssl3_scsvs) const unsigned char tls11downgrade[] = { 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x00 }; const unsigned char tls12downgrade[] = { 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x01 }; static SSL_CIPHER tls13_ciphers[] = { { 1, TLS1_3_RFC_AES_128_GCM_SHA256, TLS1_3_RFC_AES_128_GCM_SHA256, TLS1_3_CK_AES_128_GCM_SHA256, SSL_kANY, SSL_aANY, SSL_AES128GCM, SSL_AEAD, TLS1_3_VERSION, TLS1_3_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | SSL_QUIC, 128, 128, }, { 1, TLS1_3_RFC_AES_256_GCM_SHA384, TLS1_3_RFC_AES_256_GCM_SHA384, TLS1_3_CK_AES_256_GCM_SHA384, SSL_kANY, SSL_aANY, SSL_AES256GCM, SSL_AEAD, TLS1_3_VERSION, TLS1_3_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | SSL_QUIC, 256, 256, }, { 1, TLS1_3_RFC_CHACHA20_POLY1305_SHA256, TLS1_3_RFC_CHACHA20_POLY1305_SHA256, TLS1_3_CK_CHACHA20_POLY1305_SHA256, SSL_kANY, SSL_aANY, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_3_VERSION, TLS1_3_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | SSL_QUIC, 256, 256, }, { 1, TLS1_3_RFC_AES_128_CCM_SHA256, TLS1_3_RFC_AES_128_CCM_SHA256, TLS1_3_CK_AES_128_CCM_SHA256, SSL_kANY, SSL_aANY, SSL_AES128CCM, SSL_AEAD, TLS1_3_VERSION, TLS1_3_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256, 128, 128, }, { 1, TLS1_3_RFC_AES_128_CCM_8_SHA256, TLS1_3_RFC_AES_128_CCM_8_SHA256, TLS1_3_CK_AES_128_CCM_8_SHA256, SSL_kANY, SSL_aANY, SSL_AES128CCM8, SSL_AEAD, TLS1_3_VERSION, TLS1_3_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256, 64, 128, } }; static SSL_CIPHER ssl3_ciphers[] = { { 1, SSL3_TXT_RSA_NULL_MD5, SSL3_RFC_RSA_NULL_MD5, SSL3_CK_RSA_NULL_MD5, SSL_kRSA, SSL_aRSA, SSL_eNULL, SSL_MD5, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, SSL3_TXT_RSA_NULL_SHA, SSL3_RFC_RSA_NULL_SHA, SSL3_CK_RSA_NULL_SHA, SSL_kRSA, SSL_aRSA, SSL_eNULL, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, SSL3_TXT_RSA_DES_192_CBC3_SHA, SSL3_RFC_RSA_DES_192_CBC3_SHA, SSL3_CK_RSA_DES_192_CBC3_SHA, SSL_kRSA, SSL_aRSA, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, { 1, SSL3_TXT_DHE_DSS_DES_192_CBC3_SHA, SSL3_RFC_DHE_DSS_DES_192_CBC3_SHA, SSL3_CK_DHE_DSS_DES_192_CBC3_SHA, SSL_kDHE, SSL_aDSS, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, { 1, SSL3_TXT_DHE_RSA_DES_192_CBC3_SHA, SSL3_RFC_DHE_RSA_DES_192_CBC3_SHA, SSL3_CK_DHE_RSA_DES_192_CBC3_SHA, SSL_kDHE, SSL_aRSA, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, { 1, SSL3_TXT_ADH_DES_192_CBC_SHA, SSL3_RFC_ADH_DES_192_CBC_SHA, SSL3_CK_ADH_DES_192_CBC_SHA, SSL_kDHE, SSL_aNULL, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, #endif { 1, TLS1_TXT_RSA_WITH_AES_128_SHA, TLS1_RFC_RSA_WITH_AES_128_SHA, TLS1_CK_RSA_WITH_AES_128_SHA, SSL_kRSA, SSL_aRSA, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_DSS_WITH_AES_128_SHA, TLS1_RFC_DHE_DSS_WITH_AES_128_SHA, TLS1_CK_DHE_DSS_WITH_AES_128_SHA, SSL_kDHE, SSL_aDSS, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_128_SHA, TLS1_RFC_DHE_RSA_WITH_AES_128_SHA, TLS1_CK_DHE_RSA_WITH_AES_128_SHA, SSL_kDHE, SSL_aRSA, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ADH_WITH_AES_128_SHA, TLS1_RFC_ADH_WITH_AES_128_SHA, TLS1_CK_ADH_WITH_AES_128_SHA, SSL_kDHE, SSL_aNULL, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_RSA_WITH_AES_256_SHA, TLS1_RFC_RSA_WITH_AES_256_SHA, TLS1_CK_RSA_WITH_AES_256_SHA, SSL_kRSA, SSL_aRSA, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_DHE_DSS_WITH_AES_256_SHA, TLS1_RFC_DHE_DSS_WITH_AES_256_SHA, TLS1_CK_DHE_DSS_WITH_AES_256_SHA, SSL_kDHE, SSL_aDSS, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_256_SHA, TLS1_RFC_DHE_RSA_WITH_AES_256_SHA, TLS1_CK_DHE_RSA_WITH_AES_256_SHA, SSL_kDHE, SSL_aRSA, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_ADH_WITH_AES_256_SHA, TLS1_RFC_ADH_WITH_AES_256_SHA, TLS1_CK_ADH_WITH_AES_256_SHA, SSL_kDHE, SSL_aNULL, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_RSA_WITH_NULL_SHA256, TLS1_RFC_RSA_WITH_NULL_SHA256, TLS1_CK_RSA_WITH_NULL_SHA256, SSL_kRSA, SSL_aRSA, SSL_eNULL, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_RSA_WITH_AES_128_SHA256, TLS1_RFC_RSA_WITH_AES_128_SHA256, TLS1_CK_RSA_WITH_AES_128_SHA256, SSL_kRSA, SSL_aRSA, SSL_AES128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_RSA_WITH_AES_256_SHA256, TLS1_RFC_RSA_WITH_AES_256_SHA256, TLS1_CK_RSA_WITH_AES_256_SHA256, SSL_kRSA, SSL_aRSA, SSL_AES256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256, TLS1_RFC_DHE_DSS_WITH_AES_128_SHA256, TLS1_CK_DHE_DSS_WITH_AES_128_SHA256, SSL_kDHE, SSL_aDSS, SSL_AES128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256, TLS1_RFC_DHE_RSA_WITH_AES_128_SHA256, TLS1_CK_DHE_RSA_WITH_AES_128_SHA256, SSL_kDHE, SSL_aRSA, SSL_AES128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256, TLS1_RFC_DHE_DSS_WITH_AES_256_SHA256, TLS1_CK_DHE_DSS_WITH_AES_256_SHA256, SSL_kDHE, SSL_aDSS, SSL_AES256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256, TLS1_RFC_DHE_RSA_WITH_AES_256_SHA256, TLS1_CK_DHE_RSA_WITH_AES_256_SHA256, SSL_kDHE, SSL_aRSA, SSL_AES256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_ADH_WITH_AES_128_SHA256, TLS1_RFC_ADH_WITH_AES_128_SHA256, TLS1_CK_ADH_WITH_AES_128_SHA256, SSL_kDHE, SSL_aNULL, SSL_AES128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ADH_WITH_AES_256_SHA256, TLS1_RFC_ADH_WITH_AES_256_SHA256, TLS1_CK_ADH_WITH_AES_256_SHA256, SSL_kDHE, SSL_aNULL, SSL_AES256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256, TLS1_RFC_RSA_WITH_AES_128_GCM_SHA256, TLS1_CK_RSA_WITH_AES_128_GCM_SHA256, SSL_kRSA, SSL_aRSA, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384, TLS1_RFC_RSA_WITH_AES_256_GCM_SHA384, TLS1_CK_RSA_WITH_AES_256_GCM_SHA384, SSL_kRSA, SSL_aRSA, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS1_RFC_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256, SSL_kDHE, SSL_aRSA, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS1_RFC_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384, SSL_kDHE, SSL_aRSA, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS1_RFC_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256, SSL_kDHE, SSL_aDSS, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS1_RFC_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384, SSL_kDHE, SSL_aDSS, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256, TLS1_RFC_ADH_WITH_AES_128_GCM_SHA256, TLS1_CK_ADH_WITH_AES_128_GCM_SHA256, SSL_kDHE, SSL_aNULL, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384, TLS1_RFC_ADH_WITH_AES_256_GCM_SHA384, TLS1_CK_ADH_WITH_AES_256_GCM_SHA384, SSL_kDHE, SSL_aNULL, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_RSA_WITH_AES_128_CCM, TLS1_RFC_RSA_WITH_AES_128_CCM, TLS1_CK_RSA_WITH_AES_128_CCM, SSL_kRSA, SSL_aRSA, SSL_AES128CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_RSA_WITH_AES_256_CCM, TLS1_RFC_RSA_WITH_AES_256_CCM, TLS1_CK_RSA_WITH_AES_256_CCM, SSL_kRSA, SSL_aRSA, SSL_AES256CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_128_CCM, TLS1_RFC_DHE_RSA_WITH_AES_128_CCM, TLS1_CK_DHE_RSA_WITH_AES_128_CCM, SSL_kDHE, SSL_aRSA, SSL_AES128CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_256_CCM, TLS1_RFC_DHE_RSA_WITH_AES_256_CCM, TLS1_CK_DHE_RSA_WITH_AES_256_CCM, SSL_kDHE, SSL_aRSA, SSL_AES256CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_RSA_WITH_AES_128_CCM_8, TLS1_RFC_RSA_WITH_AES_128_CCM_8, TLS1_CK_RSA_WITH_AES_128_CCM_8, SSL_kRSA, SSL_aRSA, SSL_AES128CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 128, }, { 1, TLS1_TXT_RSA_WITH_AES_256_CCM_8, TLS1_RFC_RSA_WITH_AES_256_CCM_8, TLS1_CK_RSA_WITH_AES_256_CCM_8, SSL_kRSA, SSL_aRSA, SSL_AES256CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_128_CCM_8, TLS1_RFC_DHE_RSA_WITH_AES_128_CCM_8, TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8, SSL_kDHE, SSL_aRSA, SSL_AES128CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_AES_256_CCM_8, TLS1_RFC_DHE_RSA_WITH_AES_256_CCM_8, TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8, SSL_kDHE, SSL_aRSA, SSL_AES256CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 256, }, { 1, TLS1_TXT_PSK_WITH_AES_128_CCM, TLS1_RFC_PSK_WITH_AES_128_CCM, TLS1_CK_PSK_WITH_AES_128_CCM, SSL_kPSK, SSL_aPSK, SSL_AES128CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_PSK_WITH_AES_256_CCM, TLS1_RFC_PSK_WITH_AES_256_CCM, TLS1_CK_PSK_WITH_AES_256_CCM, SSL_kPSK, SSL_aPSK, SSL_AES256CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_128_CCM, TLS1_RFC_DHE_PSK_WITH_AES_128_CCM, TLS1_CK_DHE_PSK_WITH_AES_128_CCM, SSL_kDHEPSK, SSL_aPSK, SSL_AES128CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_256_CCM, TLS1_RFC_DHE_PSK_WITH_AES_256_CCM, TLS1_CK_DHE_PSK_WITH_AES_256_CCM, SSL_kDHEPSK, SSL_aPSK, SSL_AES256CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_AES_128_CCM_8, TLS1_RFC_PSK_WITH_AES_128_CCM_8, TLS1_CK_PSK_WITH_AES_128_CCM_8, SSL_kPSK, SSL_aPSK, SSL_AES128CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 128, }, { 1, TLS1_TXT_PSK_WITH_AES_256_CCM_8, TLS1_RFC_PSK_WITH_AES_256_CCM_8, TLS1_CK_PSK_WITH_AES_256_CCM_8, SSL_kPSK, SSL_aPSK, SSL_AES256CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 256, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_128_CCM_8, TLS1_RFC_DHE_PSK_WITH_AES_128_CCM_8, TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8, SSL_kDHEPSK, SSL_aPSK, SSL_AES128CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_256_CCM_8, TLS1_RFC_DHE_PSK_WITH_AES_256_CCM_8, TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8, SSL_kDHEPSK, SSL_aPSK, SSL_AES256CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 256, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM, TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM, TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM, SSL_kECDHE, SSL_aECDSA, SSL_AES128CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM, TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM, TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM, SSL_kECDHE, SSL_aECDSA, SSL_AES256CCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM_8, TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM_8, TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8, SSL_kECDHE, SSL_aECDSA, SSL_AES128CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM_8, TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM_8, TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8, SSL_kECDHE, SSL_aECDSA, SSL_AES256CCM8, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 64, 256, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA, TLS1_RFC_ECDHE_ECDSA_WITH_NULL_SHA, TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA, SSL_kECDHE, SSL_aECDSA, SSL_eNULL, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, TLS1_RFC_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, SSL_kECDHE, SSL_aECDSA, SSL_3DES, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, SSL_kECDHE, SSL_aECDSA, SSL_AES128, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, SSL_kECDHE, SSL_aECDSA, SSL_AES256, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA, TLS1_RFC_ECDHE_RSA_WITH_NULL_SHA, TLS1_CK_ECDHE_RSA_WITH_NULL_SHA, SSL_kECDHE, SSL_aRSA, SSL_eNULL, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA, TLS1_RFC_ECDHE_RSA_WITH_DES_192_CBC3_SHA, TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA, SSL_kECDHE, SSL_aRSA, SSL_3DES, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS1_RFC_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA, SSL_kECDHE, SSL_aRSA, SSL_AES128, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS1_RFC_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA, SSL_kECDHE, SSL_aRSA, SSL_AES256, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_ECDH_anon_WITH_NULL_SHA, TLS1_RFC_ECDH_anon_WITH_NULL_SHA, TLS1_CK_ECDH_anon_WITH_NULL_SHA, SSL_kECDHE, SSL_aNULL, SSL_eNULL, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA, TLS1_RFC_ECDH_anon_WITH_DES_192_CBC3_SHA, TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA, SSL_kECDHE, SSL_aNULL, SSL_3DES, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA, TLS1_RFC_ECDH_anon_WITH_AES_128_CBC_SHA, TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA, SSL_kECDHE, SSL_aNULL, SSL_AES128, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA, TLS1_RFC_ECDH_anon_WITH_AES_256_CBC_SHA, TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA, SSL_kECDHE, SSL_aNULL, SSL_AES256, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256, TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_SHA256, TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256, SSL_kECDHE, SSL_aECDSA, SSL_AES128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384, TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_SHA384, TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384, SSL_kECDHE, SSL_aECDSA, SSL_AES256, SSL_SHA384, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256, TLS1_RFC_ECDHE_RSA_WITH_AES_128_SHA256, TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256, SSL_kECDHE, SSL_aRSA, SSL_AES128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384, TLS1_RFC_ECDHE_RSA_WITH_AES_256_SHA384, TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384, SSL_kECDHE, SSL_aRSA, SSL_AES256, SSL_SHA384, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, SSL_kECDHE, SSL_aECDSA, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, SSL_kECDHE, SSL_aECDSA, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS1_RFC_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256, SSL_kECDHE, SSL_aRSA, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS1_RFC_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384, SSL_kECDHE, SSL_aRSA, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_NULL_SHA, TLS1_RFC_PSK_WITH_NULL_SHA, TLS1_CK_PSK_WITH_NULL_SHA, SSL_kPSK, SSL_aPSK, SSL_eNULL, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_DHE_PSK_WITH_NULL_SHA, TLS1_RFC_DHE_PSK_WITH_NULL_SHA, TLS1_CK_DHE_PSK_WITH_NULL_SHA, SSL_kDHEPSK, SSL_aPSK, SSL_eNULL, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_RSA_PSK_WITH_NULL_SHA, TLS1_RFC_RSA_PSK_WITH_NULL_SHA, TLS1_CK_RSA_PSK_WITH_NULL_SHA, SSL_kRSAPSK, SSL_aRSA, SSL_eNULL, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_RFC_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA, SSL_kPSK, SSL_aPSK, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_PSK_WITH_AES_128_CBC_SHA, TLS1_RFC_PSK_WITH_AES_128_CBC_SHA, TLS1_CK_PSK_WITH_AES_128_CBC_SHA, SSL_kPSK, SSL_aPSK, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_PSK_WITH_AES_256_CBC_SHA, TLS1_RFC_PSK_WITH_AES_256_CBC_SHA, TLS1_CK_PSK_WITH_AES_256_CBC_SHA, SSL_kPSK, SSL_aPSK, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_DHE_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_RFC_DHE_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA, SSL_kDHEPSK, SSL_aPSK, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA, TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA, TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA, SSL_kDHEPSK, SSL_aPSK, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA, TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA, TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA, SSL_kDHEPSK, SSL_aPSK, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_RSA_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_RFC_RSA_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA, SSL_kRSAPSK, SSL_aRSA, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA, TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA, TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA, SSL_kRSAPSK, SSL_aRSA, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA, TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA, TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA, SSL_kRSAPSK, SSL_aRSA, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_AES_128_GCM_SHA256, TLS1_RFC_PSK_WITH_AES_128_GCM_SHA256, TLS1_CK_PSK_WITH_AES_128_GCM_SHA256, SSL_kPSK, SSL_aPSK, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384, TLS1_RFC_PSK_WITH_AES_256_GCM_SHA384, TLS1_CK_PSK_WITH_AES_256_GCM_SHA384, SSL_kPSK, SSL_aPSK, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_128_GCM_SHA256, TLS1_RFC_DHE_PSK_WITH_AES_128_GCM_SHA256, TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256, SSL_kDHEPSK, SSL_aPSK, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384, TLS1_RFC_DHE_PSK_WITH_AES_256_GCM_SHA384, TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384, SSL_kDHEPSK, SSL_aPSK, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_RSA_PSK_WITH_AES_128_GCM_SHA256, TLS1_RFC_RSA_PSK_WITH_AES_128_GCM_SHA256, TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256, SSL_kRSAPSK, SSL_aRSA, SSL_AES128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384, TLS1_RFC_RSA_PSK_WITH_AES_256_GCM_SHA384, TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384, SSL_kRSAPSK, SSL_aRSA, SSL_AES256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_AES_128_CBC_SHA256, TLS1_RFC_PSK_WITH_AES_128_CBC_SHA256, TLS1_CK_PSK_WITH_AES_128_CBC_SHA256, SSL_kPSK, SSL_aPSK, SSL_AES128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384, TLS1_RFC_PSK_WITH_AES_256_CBC_SHA384, TLS1_CK_PSK_WITH_AES_256_CBC_SHA384, SSL_kPSK, SSL_aPSK, SSL_AES256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_NULL_SHA256, TLS1_RFC_PSK_WITH_NULL_SHA256, TLS1_CK_PSK_WITH_NULL_SHA256, SSL_kPSK, SSL_aPSK, SSL_eNULL, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_PSK_WITH_NULL_SHA384, TLS1_RFC_PSK_WITH_NULL_SHA384, TLS1_CK_PSK_WITH_NULL_SHA384, SSL_kPSK, SSL_aPSK, SSL_eNULL, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 0, 0, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA256, TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA256, TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256, SSL_kDHEPSK, SSL_aPSK, SSL_AES128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384, TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA384, TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384, SSL_kDHEPSK, SSL_aPSK, SSL_AES256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_PSK_WITH_NULL_SHA256, TLS1_RFC_DHE_PSK_WITH_NULL_SHA256, TLS1_CK_DHE_PSK_WITH_NULL_SHA256, SSL_kDHEPSK, SSL_aPSK, SSL_eNULL, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_DHE_PSK_WITH_NULL_SHA384, TLS1_RFC_DHE_PSK_WITH_NULL_SHA384, TLS1_CK_DHE_PSK_WITH_NULL_SHA384, SSL_kDHEPSK, SSL_aPSK, SSL_eNULL, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 0, 0, }, { 1, TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA256, TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA256, TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256, SSL_kRSAPSK, SSL_aRSA, SSL_AES128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384, TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA384, TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384, SSL_kRSAPSK, SSL_aRSA, SSL_AES256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_RSA_PSK_WITH_NULL_SHA256, TLS1_RFC_RSA_PSK_WITH_NULL_SHA256, TLS1_CK_RSA_PSK_WITH_NULL_SHA256, SSL_kRSAPSK, SSL_aRSA, SSL_eNULL, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_RSA_PSK_WITH_NULL_SHA384, TLS1_RFC_RSA_PSK_WITH_NULL_SHA384, TLS1_CK_RSA_PSK_WITH_NULL_SHA384, SSL_kRSAPSK, SSL_aRSA, SSL_eNULL, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 0, 0, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_RFC_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA, TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA, SSL_kECDHEPSK, SSL_aPSK, SSL_3DES, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA, TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA, TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA, SSL_kECDHEPSK, SSL_aPSK, SSL_AES128, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA, TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA, TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA, SSL_kECDHEPSK, SSL_aPSK, SSL_AES256, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256, TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA256, TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256, SSL_kECDHEPSK, SSL_aPSK, SSL_AES128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384, TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA384, TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384, SSL_kECDHEPSK, SSL_aPSK, SSL_AES256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA, TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA, TLS1_CK_ECDHE_PSK_WITH_NULL_SHA, SSL_kECDHEPSK, SSL_aPSK, SSL_eNULL, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA256, TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA256, TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256, SSL_kECDHEPSK, SSL_aPSK, SSL_eNULL, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 0, 0, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA384, TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA384, TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384, SSL_kECDHEPSK, SSL_aPSK, SSL_eNULL, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_STRONG_NONE | SSL_FIPS, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 0, 0, }, # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA, TLS1_RFC_SRP_SHA_WITH_3DES_EDE_CBC_SHA, TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA, SSL_kSRP, SSL_aSRP, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, { 1, TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA, TLS1_RFC_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA, TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA, SSL_kSRP, SSL_aRSA, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, { 1, TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA, TLS1_RFC_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA, TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA, SSL_kSRP, SSL_aDSS, SSL_3DES, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 112, 168, }, # endif { 1, TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA, TLS1_RFC_SRP_SHA_WITH_AES_128_CBC_SHA, TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA, SSL_kSRP, SSL_aSRP, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS1_RFC_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, SSL_kSRP, SSL_aRSA, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS1_RFC_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, SSL_kSRP, SSL_aDSS, SSL_AES128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA, TLS1_RFC_SRP_SHA_WITH_AES_256_CBC_SHA, TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA, SSL_kSRP, SSL_aSRP, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS1_RFC_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, SSL_kSRP, SSL_aRSA, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS1_RFC_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, SSL_kSRP, SSL_aDSS, SSL_AES256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305, TLS1_RFC_DHE_RSA_WITH_CHACHA20_POLY1305, TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305, SSL_kDHE, SSL_aRSA, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305, TLS1_RFC_ECDHE_RSA_WITH_CHACHA20_POLY1305, TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305, SSL_kECDHE, SSL_aRSA, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, TLS1_RFC_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, SSL_kECDHE, SSL_aECDSA, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_CHACHA20_POLY1305, TLS1_RFC_PSK_WITH_CHACHA20_POLY1305, TLS1_CK_PSK_WITH_CHACHA20_POLY1305, SSL_kPSK, SSL_aPSK, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305, TLS1_RFC_ECDHE_PSK_WITH_CHACHA20_POLY1305, TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305, SSL_kECDHEPSK, SSL_aPSK, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_DHE_PSK_WITH_CHACHA20_POLY1305, TLS1_RFC_DHE_PSK_WITH_CHACHA20_POLY1305, TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305, SSL_kDHEPSK, SSL_aPSK, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_RSA_PSK_WITH_CHACHA20_POLY1305, TLS1_RFC_RSA_PSK_WITH_CHACHA20_POLY1305, TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305, SSL_kRSAPSK, SSL_aRSA, SSL_CHACHA20POLY1305, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256, SSL_kRSA, SSL_aRSA, SSL_CAMELLIA128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256, SSL_kDHE, SSL_aDSS, SSL_CAMELLIA128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, SSL_kDHE, SSL_aRSA, SSL_CAMELLIA128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256, SSL_kDHE, SSL_aNULL, SSL_CAMELLIA128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256, SSL_kRSA, SSL_aRSA, SSL_CAMELLIA256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256, SSL_kDHE, SSL_aDSS, SSL_CAMELLIA256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, SSL_kDHE, SSL_aRSA, SSL_CAMELLIA256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA256, TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA256, TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256, SSL_kDHE, SSL_aNULL, SSL_CAMELLIA256, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 256, 256, }, { 1, TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA, SSL_kRSA, SSL_aRSA, SSL_CAMELLIA256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, SSL_kDHE, SSL_aDSS, SSL_CAMELLIA256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, SSL_kDHE, SSL_aRSA, SSL_CAMELLIA256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA, TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA, TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA, SSL_kDHE, SSL_aNULL, SSL_CAMELLIA256, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 256, 256, }, { 1, TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_kRSA, SSL_aRSA, SSL_CAMELLIA128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, SSL_kDHE, SSL_aDSS, SSL_CAMELLIA128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_kDHE, SSL_aRSA, SSL_CAMELLIA128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA, TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA, TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA, SSL_kDHE, SSL_aNULL, SSL_CAMELLIA128, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, SSL_kECDHE, SSL_aECDSA, SSL_CAMELLIA128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, SSL_kECDHE, SSL_aECDSA, SSL_CAMELLIA256, SSL_SHA384, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, SSL_kECDHE, SSL_aRSA, SSL_CAMELLIA128, SSL_SHA256, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, SSL_kECDHE, SSL_aRSA, SSL_CAMELLIA256, SSL_SHA384, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256, SSL_kPSK, SSL_aPSK, SSL_CAMELLIA128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_RFC_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384, SSL_kPSK, SSL_aPSK, SSL_CAMELLIA256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, SSL_kDHEPSK, SSL_aPSK, SSL_CAMELLIA128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_RFC_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, SSL_kDHEPSK, SSL_aPSK, SSL_CAMELLIA256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256, SSL_kRSAPSK, SSL_aRSA, SSL_CAMELLIA128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_RFC_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384, SSL_kRSAPSK, SSL_aRSA, SSL_CAMELLIA256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, SSL_kECDHEPSK, SSL_aPSK, SSL_CAMELLIA128, SSL_SHA256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, SSL_kECDHEPSK, SSL_aPSK, SSL_CAMELLIA256, SSL_SHA384, TLS1_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, #ifndef OPENSSL_NO_GOST { 1, "GOST2001-GOST89-GOST89", "TLS_GOSTR341001_WITH_28147_CNT_IMIT", 0x3000081, SSL_kGOST, SSL_aGOST01, SSL_eGOST2814789CNT, SSL_GOST89MAC, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC, 256, 256, }, { 1, "GOST2001-NULL-GOST94", "TLS_GOSTR341001_WITH_NULL_GOSTR3411", 0x3000083, SSL_kGOST, SSL_aGOST01, SSL_eNULL, SSL_GOST94, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_STRONG_NONE, SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94, 0, 0, }, { 1, "IANA-GOST2012-GOST8912-GOST8912", NULL, 0x0300c102, SSL_kGOST, SSL_aGOST12 | SSL_aGOST01, SSL_eGOST2814789CNT12, SSL_GOST89MAC12, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC, 256, 256, }, { 1, "LEGACY-GOST2012-GOST8912-GOST8912", NULL, 0x0300ff85, SSL_kGOST, SSL_aGOST12 | SSL_aGOST01, SSL_eGOST2814789CNT12, SSL_GOST89MAC12, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC, 256, 256, }, { 1, "GOST2012-NULL-GOST12", NULL, 0x0300ff87, SSL_kGOST, SSL_aGOST12 | SSL_aGOST01, SSL_eNULL, SSL_GOST12_256, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_STRONG_NONE, SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC, 0, 0, }, { 1, "GOST2012-KUZNYECHIK-KUZNYECHIKOMAC", NULL, 0x0300C100, SSL_kGOST18, SSL_aGOST12, SSL_KUZNYECHIK, SSL_KUZNYECHIKOMAC, TLS1_2_VERSION, TLS1_2_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE, 256, 256, }, { 1, "GOST2012-MAGMA-MAGMAOMAC", NULL, 0x0300C101, SSL_kGOST18, SSL_aGOST12, SSL_MAGMA, SSL_MAGMAOMAC, TLS1_2_VERSION, TLS1_2_VERSION, 0, 0, SSL_HIGH, SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE, 256, 256, }, #endif { 1, SSL3_TXT_RSA_IDEA_128_SHA, SSL3_RFC_RSA_IDEA_128_SHA, SSL3_CK_RSA_IDEA_128_SHA, SSL_kRSA, SSL_aRSA, SSL_IDEA, SSL_SHA1, SSL3_VERSION, TLS1_1_VERSION, DTLS1_BAD_VER, DTLS1_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_RSA_WITH_SEED_SHA, TLS1_RFC_RSA_WITH_SEED_SHA, TLS1_CK_RSA_WITH_SEED_SHA, SSL_kRSA, SSL_aRSA, SSL_SEED, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_DSS_WITH_SEED_SHA, TLS1_RFC_DHE_DSS_WITH_SEED_SHA, TLS1_CK_DHE_DSS_WITH_SEED_SHA, SSL_kDHE, SSL_aDSS, SSL_SEED, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_SEED_SHA, TLS1_RFC_DHE_RSA_WITH_SEED_SHA, TLS1_CK_DHE_RSA_WITH_SEED_SHA, SSL_kDHE, SSL_aRSA, SSL_SEED, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, { 1, TLS1_TXT_ADH_WITH_SEED_SHA, TLS1_RFC_ADH_WITH_SEED_SHA, TLS1_CK_ADH_WITH_SEED_SHA, SSL_kDHE, SSL_aNULL, SSL_SEED, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, DTLS1_BAD_VER, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 128, 128, }, #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS { 1, SSL3_TXT_RSA_RC4_128_MD5, SSL3_RFC_RSA_RC4_128_MD5, SSL3_CK_RSA_RC4_128_MD5, SSL_kRSA, SSL_aRSA, SSL_RC4, SSL_MD5, SSL3_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, SSL3_TXT_RSA_RC4_128_SHA, SSL3_RFC_RSA_RC4_128_SHA, SSL3_CK_RSA_RC4_128_SHA, SSL_kRSA, SSL_aRSA, SSL_RC4, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, SSL3_TXT_ADH_RC4_128_MD5, SSL3_RFC_ADH_RC4_128_MD5, SSL3_CK_ADH_RC4_128_MD5, SSL_kDHE, SSL_aNULL, SSL_RC4, SSL_MD5, SSL3_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA, TLS1_RFC_ECDHE_PSK_WITH_RC4_128_SHA, TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA, SSL_kECDHEPSK, SSL_aPSK, SSL_RC4, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA, TLS1_RFC_ECDH_anon_WITH_RC4_128_SHA, TLS1_CK_ECDH_anon_WITH_RC4_128_SHA, SSL_kECDHE, SSL_aNULL, SSL_RC4, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS1_RFC_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA, SSL_kECDHE, SSL_aECDSA, SSL_RC4, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA, TLS1_RFC_ECDHE_RSA_WITH_RC4_128_SHA, TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA, SSL_kECDHE, SSL_aRSA, SSL_RC4, SSL_SHA1, TLS1_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, TLS1_TXT_PSK_WITH_RC4_128_SHA, TLS1_RFC_PSK_WITH_RC4_128_SHA, TLS1_CK_PSK_WITH_RC4_128_SHA, SSL_kPSK, SSL_aPSK, SSL_RC4, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, TLS1_TXT_RSA_PSK_WITH_RC4_128_SHA, TLS1_RFC_RSA_PSK_WITH_RC4_128_SHA, TLS1_CK_RSA_PSK_WITH_RC4_128_SHA, SSL_kRSAPSK, SSL_aRSA, SSL_RC4, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_RC4_128_SHA, TLS1_RFC_DHE_PSK_WITH_RC4_128_SHA, TLS1_CK_DHE_PSK_WITH_RC4_128_SHA, SSL_kDHEPSK, SSL_aPSK, SSL_RC4, SSL_SHA1, SSL3_VERSION, TLS1_2_VERSION, 0, 0, SSL_NOT_DEFAULT | SSL_MEDIUM, SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF, 80, 128, }, #endif { 1, TLS1_TXT_RSA_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_RSA_WITH_ARIA_128_GCM_SHA256, TLS1_CK_RSA_WITH_ARIA_128_GCM_SHA256, SSL_kRSA, SSL_aRSA, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_RSA_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_RSA_WITH_ARIA_256_GCM_SHA384, TLS1_CK_RSA_WITH_ARIA_256_GCM_SHA384, SSL_kRSA, SSL_aRSA, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_DHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS1_CK_DHE_RSA_WITH_ARIA_128_GCM_SHA256, SSL_kDHE, SSL_aRSA, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_DHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS1_CK_DHE_RSA_WITH_ARIA_256_GCM_SHA384, SSL_kDHE, SSL_aRSA, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_DSS_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_DHE_DSS_WITH_ARIA_128_GCM_SHA256, TLS1_CK_DHE_DSS_WITH_ARIA_128_GCM_SHA256, SSL_kDHE, SSL_aDSS, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_DSS_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_DHE_DSS_WITH_ARIA_256_GCM_SHA384, TLS1_CK_DHE_DSS_WITH_ARIA_256_GCM_SHA384, SSL_kDHE, SSL_aDSS, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256, TLS1_CK_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256, SSL_kECDHE, SSL_aECDSA, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384, TLS1_CK_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384, SSL_kECDHE, SSL_aECDSA, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS1_CK_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, SSL_kECDHE, SSL_aRSA, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS1_CK_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, SSL_kECDHE, SSL_aRSA, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_PSK_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_PSK_WITH_ARIA_128_GCM_SHA256, TLS1_CK_PSK_WITH_ARIA_128_GCM_SHA256, SSL_kPSK, SSL_aPSK, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_PSK_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_PSK_WITH_ARIA_256_GCM_SHA384, TLS1_CK_PSK_WITH_ARIA_256_GCM_SHA384, SSL_kPSK, SSL_aPSK, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_DHE_PSK_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_DHE_PSK_WITH_ARIA_128_GCM_SHA256, TLS1_CK_DHE_PSK_WITH_ARIA_128_GCM_SHA256, SSL_kDHEPSK, SSL_aPSK, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_DHE_PSK_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_DHE_PSK_WITH_ARIA_256_GCM_SHA384, TLS1_CK_DHE_PSK_WITH_ARIA_256_GCM_SHA384, SSL_kDHEPSK, SSL_aPSK, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, { 1, TLS1_TXT_RSA_PSK_WITH_ARIA_128_GCM_SHA256, TLS1_RFC_RSA_PSK_WITH_ARIA_128_GCM_SHA256, TLS1_CK_RSA_PSK_WITH_ARIA_128_GCM_SHA256, SSL_kRSAPSK, SSL_aRSA, SSL_ARIA128GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256, 128, 128, }, { 1, TLS1_TXT_RSA_PSK_WITH_ARIA_256_GCM_SHA384, TLS1_RFC_RSA_PSK_WITH_ARIA_256_GCM_SHA384, TLS1_CK_RSA_PSK_WITH_ARIA_256_GCM_SHA384, SSL_kRSAPSK, SSL_aRSA, SSL_ARIA256GCM, SSL_AEAD, TLS1_2_VERSION, TLS1_2_VERSION, DTLS1_2_VERSION, DTLS1_2_VERSION, SSL_NOT_DEFAULT | SSL_HIGH, SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384, 256, 256, }, }; static SSL_CIPHER ssl3_scsvs[] = { { 0, "TLS_EMPTY_RENEGOTIATION_INFO_SCSV", "TLS_EMPTY_RENEGOTIATION_INFO_SCSV", SSL3_CK_SCSV, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, }, { 0, "TLS_FALLBACK_SCSV", "TLS_FALLBACK_SCSV", SSL3_CK_FALLBACK_SCSV, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, }, }; static int cipher_compare(const void *a, const void *b) { const SSL_CIPHER *ap = (const SSL_CIPHER *)a; const SSL_CIPHER *bp = (const SSL_CIPHER *)b; if (ap->id == bp->id) return 0; return ap->id < bp->id ? -1 : 1; } void ssl_sort_cipher_list(void) { qsort(tls13_ciphers, TLS13_NUM_CIPHERS, sizeof(tls13_ciphers[0]), cipher_compare); qsort(ssl3_ciphers, SSL3_NUM_CIPHERS, sizeof(ssl3_ciphers[0]), cipher_compare); qsort(ssl3_scsvs, SSL3_NUM_SCSVS, sizeof(ssl3_scsvs[0]), cipher_compare); } static int sslcon_undefined_function_1(SSL_CONNECTION *sc, unsigned char *r, size_t s, const char *t, size_t u, const unsigned char *v, size_t w, int x) { (void)r; (void)s; (void)t; (void)u; (void)v; (void)w; (void)x; return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc)); } const SSL3_ENC_METHOD SSLv3_enc_data = { ssl3_setup_key_block, ssl3_generate_master_secret, ssl3_change_cipher_state, ssl3_final_finish_mac, SSL3_MD_CLIENT_FINISHED_CONST, 4, SSL3_MD_SERVER_FINISHED_CONST, 4, ssl3_alert_code, sslcon_undefined_function_1, 0, ssl3_set_handshake_header, tls_close_construct_packet, ssl3_handshake_write }; OSSL_TIME ssl3_default_timeout(void) { return ossl_seconds2time(60 * 60 * 2); } int ssl3_num_ciphers(void) { return SSL3_NUM_CIPHERS; } const SSL_CIPHER *ssl3_get_cipher(unsigned int u) { if (u < SSL3_NUM_CIPHERS) return &(ssl3_ciphers[SSL3_NUM_CIPHERS - 1 - u]); else return NULL; } int ssl3_set_handshake_header(SSL_CONNECTION *s, WPACKET *pkt, int htype) { if (htype == SSL3_MT_CHANGE_CIPHER_SPEC) return 1; if (!WPACKET_put_bytes_u8(pkt, htype) || !WPACKET_start_sub_packet_u24(pkt)) return 0; return 1; } int ssl3_handshake_write(SSL_CONNECTION *s) { return ssl3_do_write(s, SSL3_RT_HANDSHAKE); } int ssl3_new(SSL *s) { #ifndef OPENSSL_NO_SRP SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (!ssl_srp_ctx_init_intern(sc)) return 0; #endif if (!s->method->ssl_clear(s)) return 0; return 1; } void ssl3_free(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; ssl3_cleanup_key_block(sc); EVP_PKEY_free(sc->s3.peer_tmp); sc->s3.peer_tmp = NULL; EVP_PKEY_free(sc->s3.tmp.pkey); sc->s3.tmp.pkey = NULL; ssl_evp_cipher_free(sc->s3.tmp.new_sym_enc); ssl_evp_md_free(sc->s3.tmp.new_hash); OPENSSL_free(sc->s3.tmp.ctype); sk_X509_NAME_pop_free(sc->s3.tmp.peer_ca_names, X509_NAME_free); OPENSSL_free(sc->s3.tmp.ciphers_raw); OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen); OPENSSL_free(sc->s3.tmp.peer_sigalgs); OPENSSL_free(sc->s3.tmp.peer_cert_sigalgs); OPENSSL_free(sc->s3.tmp.valid_flags); ssl3_free_digest_list(sc); OPENSSL_free(sc->s3.alpn_selected); OPENSSL_free(sc->s3.alpn_proposed); #ifndef OPENSSL_NO_PSK OPENSSL_free(sc->s3.tmp.psk); #endif #ifndef OPENSSL_NO_SRP ssl_srp_ctx_free_intern(sc); #endif memset(&sc->s3, 0, sizeof(sc->s3)); } int ssl3_clear(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); int flags; if (sc == NULL) return 0; ssl3_cleanup_key_block(sc); OPENSSL_free(sc->s3.tmp.ctype); sk_X509_NAME_pop_free(sc->s3.tmp.peer_ca_names, X509_NAME_free); OPENSSL_free(sc->s3.tmp.ciphers_raw); OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen); OPENSSL_free(sc->s3.tmp.peer_sigalgs); OPENSSL_free(sc->s3.tmp.peer_cert_sigalgs); OPENSSL_free(sc->s3.tmp.valid_flags); EVP_PKEY_free(sc->s3.tmp.pkey); EVP_PKEY_free(sc->s3.peer_tmp); ssl3_free_digest_list(sc); OPENSSL_free(sc->s3.alpn_selected); OPENSSL_free(sc->s3.alpn_proposed); flags = sc->s3.flags & TLS1_FLAGS_QUIC; memset(&sc->s3, 0, sizeof(sc->s3)); sc->s3.flags |= flags; if (!ssl_free_wbio_buffer(sc)) return 0; sc->version = SSL3_VERSION; #if !defined(OPENSSL_NO_NEXTPROTONEG) OPENSSL_free(sc->ext.npn); sc->ext.npn = NULL; sc->ext.npn_len = 0; #endif return 1; } #ifndef OPENSSL_NO_SRP static char *srp_password_from_info_cb(SSL *s, void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; return OPENSSL_strdup(sc->srp_ctx.info); } #endif static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len); long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) { int ret = 0; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return ret; switch (cmd) { case SSL_CTRL_GET_CLIENT_CERT_REQUEST: break; case SSL_CTRL_GET_NUM_RENEGOTIATIONS: ret = sc->s3.num_renegotiations; break; case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS: ret = sc->s3.num_renegotiations; sc->s3.num_renegotiations = 0; break; case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS: ret = sc->s3.total_renegotiations; break; case SSL_CTRL_GET_FLAGS: ret = (int)(sc->s3.flags); break; #if !defined(OPENSSL_NO_DEPRECATED_3_0) case SSL_CTRL_SET_TMP_DH: { EVP_PKEY *pkdh = NULL; if (parg == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } pkdh = ssl_dh_to_pkey(parg); if (pkdh == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_DH_LIB); return 0; } if (!SSL_set0_tmp_dh_pkey(s, pkdh)) { EVP_PKEY_free(pkdh); return 0; } return 1; } break; case SSL_CTRL_SET_TMP_DH_CB: { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return ret; } #endif case SSL_CTRL_SET_DH_AUTO: sc->cert->dh_tmp_auto = larg; return 1; #if !defined(OPENSSL_NO_DEPRECATED_3_0) case SSL_CTRL_SET_TMP_ECDH: { if (parg == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } return ssl_set_tmp_ecdh_groups(&sc->ext.supportedgroups, &sc->ext.supportedgroups_len, parg); } #endif case SSL_CTRL_SET_TLSEXT_HOSTNAME: if (larg == TLSEXT_NAMETYPE_host_name) { size_t len; OPENSSL_free(sc->ext.hostname); sc->ext.hostname = NULL; ret = 1; if (parg == NULL) break; len = strlen((char *)parg); if (len == 0 || len > TLSEXT_MAXLEN_host_name) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME); return 0; } if ((sc->ext.hostname = OPENSSL_strdup((char *)parg)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } } else { ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE); return 0; } break; case SSL_CTRL_SET_TLSEXT_DEBUG_ARG: sc->ext.debug_arg = parg; ret = 1; break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE: ret = sc->ext.status_type; break; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE: sc->ext.status_type = larg; ret = 1; break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS: *(STACK_OF(X509_EXTENSION) **)parg = sc->ext.ocsp.exts; ret = 1; break; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS: sc->ext.ocsp.exts = parg; ret = 1; break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS: *(STACK_OF(OCSP_RESPID) **)parg = sc->ext.ocsp.ids; ret = 1; break; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS: sc->ext.ocsp.ids = parg; ret = 1; break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP: *(unsigned char **)parg = sc->ext.ocsp.resp; if (sc->ext.ocsp.resp_len == 0 || sc->ext.ocsp.resp_len > LONG_MAX) return -1; return (long)sc->ext.ocsp.resp_len; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP: OPENSSL_free(sc->ext.ocsp.resp); sc->ext.ocsp.resp = parg; sc->ext.ocsp.resp_len = larg; ret = 1; break; case SSL_CTRL_CHAIN: if (larg) return ssl_cert_set1_chain(sc, NULL, (STACK_OF(X509) *)parg); else return ssl_cert_set0_chain(sc, NULL, (STACK_OF(X509) *)parg); case SSL_CTRL_CHAIN_CERT: if (larg) return ssl_cert_add1_chain_cert(sc, NULL, (X509 *)parg); else return ssl_cert_add0_chain_cert(sc, NULL, (X509 *)parg); case SSL_CTRL_GET_CHAIN_CERTS: *(STACK_OF(X509) **)parg = sc->cert->key->chain; ret = 1; break; case SSL_CTRL_SELECT_CURRENT_CERT: return ssl_cert_select_current(sc->cert, (X509 *)parg); case SSL_CTRL_SET_CURRENT_CERT: if (larg == SSL_CERT_SET_SERVER) { const SSL_CIPHER *cipher; if (!sc->server) return 0; cipher = sc->s3.tmp.new_cipher; if (cipher == NULL) return 0; if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP)) return 2; if (sc->s3.tmp.cert == NULL) return 0; sc->cert->key = sc->s3.tmp.cert; return 1; } return ssl_cert_set_current(sc->cert, larg); case SSL_CTRL_GET_GROUPS: { uint16_t *clist; size_t clistlen; if (!sc->session) return 0; clist = sc->ext.peer_supportedgroups; clistlen = sc->ext.peer_supportedgroups_len; if (parg) { size_t i; int *cptr = parg; for (i = 0; i < clistlen; i++) { const TLS_GROUP_INFO *cinf = tls1_group_id_lookup(s->ctx, clist[i]); if (cinf != NULL) cptr[i] = tls1_group_id2nid(cinf->group_id, 1); else cptr[i] = TLSEXT_nid_unknown | clist[i]; } } return (int)clistlen; } case SSL_CTRL_SET_GROUPS: return tls1_set_groups(&sc->ext.supportedgroups, &sc->ext.supportedgroups_len, parg, larg); case SSL_CTRL_SET_GROUPS_LIST: return tls1_set_groups_list(s->ctx, &sc->ext.supportedgroups, &sc->ext.supportedgroups_len, parg); case SSL_CTRL_GET_SHARED_GROUP: { uint16_t id = tls1_shared_group(sc, larg); if (larg != -1) return tls1_group_id2nid(id, 1); return id; } case SSL_CTRL_GET_NEGOTIATED_GROUP: { unsigned int id; if (SSL_CONNECTION_IS_TLS13(sc) && sc->s3.did_kex) id = sc->s3.group_id; else id = sc->session->kex_group; ret = tls1_group_id2nid(id, 1); break; } case SSL_CTRL_SET_SIGALGS: return tls1_set_sigalgs(sc->cert, parg, larg, 0); case SSL_CTRL_SET_SIGALGS_LIST: return tls1_set_sigalgs_list(s->ctx, sc->cert, parg, 0); case SSL_CTRL_SET_CLIENT_SIGALGS: return tls1_set_sigalgs(sc->cert, parg, larg, 1); case SSL_CTRL_SET_CLIENT_SIGALGS_LIST: return tls1_set_sigalgs_list(s->ctx, sc->cert, parg, 1); case SSL_CTRL_GET_CLIENT_CERT_TYPES: { const unsigned char **pctype = parg; if (sc->server || !sc->s3.tmp.cert_req) return 0; if (pctype) *pctype = sc->s3.tmp.ctype; return sc->s3.tmp.ctype_len; } case SSL_CTRL_SET_CLIENT_CERT_TYPES: if (!sc->server) return 0; return ssl3_set_req_cert_type(sc->cert, parg, larg); case SSL_CTRL_BUILD_CERT_CHAIN: return ssl_build_cert_chain(sc, NULL, larg); case SSL_CTRL_SET_VERIFY_CERT_STORE: return ssl_cert_set_cert_store(sc->cert, parg, 0, larg); case SSL_CTRL_SET_CHAIN_CERT_STORE: return ssl_cert_set_cert_store(sc->cert, parg, 1, larg); case SSL_CTRL_GET_VERIFY_CERT_STORE: return ssl_cert_get_cert_store(sc->cert, parg, 0); case SSL_CTRL_GET_CHAIN_CERT_STORE: return ssl_cert_get_cert_store(sc->cert, parg, 1); case SSL_CTRL_GET_PEER_SIGNATURE_NID: if (sc->s3.tmp.peer_sigalg == NULL) return 0; *(int *)parg = sc->s3.tmp.peer_sigalg->hash; return 1; case SSL_CTRL_GET_SIGNATURE_NID: if (sc->s3.tmp.sigalg == NULL) return 0; *(int *)parg = sc->s3.tmp.sigalg->hash; return 1; case SSL_CTRL_GET_PEER_TMP_KEY: if (sc->session == NULL || sc->s3.peer_tmp == NULL) { return 0; } else { EVP_PKEY_up_ref(sc->s3.peer_tmp); *(EVP_PKEY **)parg = sc->s3.peer_tmp; return 1; } case SSL_CTRL_GET_TMP_KEY: if (sc->session == NULL || sc->s3.tmp.pkey == NULL) { return 0; } else { EVP_PKEY_up_ref(sc->s3.tmp.pkey); *(EVP_PKEY **)parg = sc->s3.tmp.pkey; return 1; } case SSL_CTRL_GET_EC_POINT_FORMATS: { const unsigned char **pformat = parg; if (sc->ext.peer_ecpointformats == NULL) return 0; *pformat = sc->ext.peer_ecpointformats; return (int)sc->ext.peer_ecpointformats_len; } case SSL_CTRL_GET_IANA_GROUPS: { if (parg != NULL) { *(uint16_t **)parg = (uint16_t *)sc->ext.peer_supportedgroups; } return (int)sc->ext.peer_supportedgroups_len; } case SSL_CTRL_SET_MSG_CALLBACK_ARG: sc->msg_callback_arg = parg; return 1; default: break; } return ret; } long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp) (void)) { int ret = 0; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return ret; switch (cmd) { #if !defined(OPENSSL_NO_DEPRECATED_3_0) case SSL_CTRL_SET_TMP_DH_CB: sc->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp; ret = 1; break; #endif case SSL_CTRL_SET_TLSEXT_DEBUG_CB: sc->ext.debug_cb = (void (*)(SSL *, int, int, const unsigned char *, int, void *))fp; ret = 1; break; case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB: sc->not_resumable_session_cb = (int (*)(SSL *, int))fp; ret = 1; break; case SSL_CTRL_SET_MSG_CALLBACK: sc->msg_callback = (ossl_msg_cb)fp; return 1; default: break; } return ret; } long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) { switch (cmd) { #if !defined(OPENSSL_NO_DEPRECATED_3_0) case SSL_CTRL_SET_TMP_DH: { EVP_PKEY *pkdh = NULL; if (parg == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } pkdh = ssl_dh_to_pkey(parg); if (pkdh == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_DH_LIB); return 0; } if (!SSL_CTX_set0_tmp_dh_pkey(ctx, pkdh)) { EVP_PKEY_free(pkdh); return 0; } return 1; } case SSL_CTRL_SET_TMP_DH_CB: { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } #endif case SSL_CTRL_SET_DH_AUTO: ctx->cert->dh_tmp_auto = larg; return 1; #if !defined(OPENSSL_NO_DEPRECATED_3_0) case SSL_CTRL_SET_TMP_ECDH: { if (parg == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } return ssl_set_tmp_ecdh_groups(&ctx->ext.supportedgroups, &ctx->ext.supportedgroups_len, parg); } #endif case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG: ctx->ext.servername_arg = parg; break; case SSL_CTRL_SET_TLSEXT_TICKET_KEYS: case SSL_CTRL_GET_TLSEXT_TICKET_KEYS: { unsigned char *keys = parg; long tick_keylen = (sizeof(ctx->ext.tick_key_name) + sizeof(ctx->ext.secure->tick_hmac_key) + sizeof(ctx->ext.secure->tick_aes_key)); if (keys == NULL) return tick_keylen; if (larg != tick_keylen) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_TICKET_KEYS_LENGTH); return 0; } if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS) { memcpy(ctx->ext.tick_key_name, keys, sizeof(ctx->ext.tick_key_name)); memcpy(ctx->ext.secure->tick_hmac_key, keys + sizeof(ctx->ext.tick_key_name), sizeof(ctx->ext.secure->tick_hmac_key)); memcpy(ctx->ext.secure->tick_aes_key, keys + sizeof(ctx->ext.tick_key_name) + sizeof(ctx->ext.secure->tick_hmac_key), sizeof(ctx->ext.secure->tick_aes_key)); } else { memcpy(keys, ctx->ext.tick_key_name, sizeof(ctx->ext.tick_key_name)); memcpy(keys + sizeof(ctx->ext.tick_key_name), ctx->ext.secure->tick_hmac_key, sizeof(ctx->ext.secure->tick_hmac_key)); memcpy(keys + sizeof(ctx->ext.tick_key_name) + sizeof(ctx->ext.secure->tick_hmac_key), ctx->ext.secure->tick_aes_key, sizeof(ctx->ext.secure->tick_aes_key)); } return 1; } case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE: return ctx->ext.status_type; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE: ctx->ext.status_type = larg; break; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG: ctx->ext.status_arg = parg; return 1; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG: *(void**)parg = ctx->ext.status_arg; break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB: *(int (**)(SSL*, void*))parg = ctx->ext.status_cb; break; #ifndef OPENSSL_NO_SRP case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME: ctx->srp_ctx.srp_Mask |= SSL_kSRP; OPENSSL_free(ctx->srp_ctx.login); ctx->srp_ctx.login = NULL; if (parg == NULL) break; if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SRP_USERNAME); return 0; } if ((ctx->srp_ctx.login = OPENSSL_strdup((char *)parg)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } break; case SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD: ctx->srp_ctx.SRP_give_srp_client_pwd_callback = srp_password_from_info_cb; if (ctx->srp_ctx.info != NULL) OPENSSL_free(ctx->srp_ctx.info); if ((ctx->srp_ctx.info = OPENSSL_strdup((char *)parg)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } break; case SSL_CTRL_SET_SRP_ARG: ctx->srp_ctx.srp_Mask |= SSL_kSRP; ctx->srp_ctx.SRP_cb_arg = parg; break; case SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH: ctx->srp_ctx.strength = larg; break; #endif case SSL_CTRL_SET_GROUPS: return tls1_set_groups(&ctx->ext.supportedgroups, &ctx->ext.supportedgroups_len, parg, larg); case SSL_CTRL_SET_GROUPS_LIST: return tls1_set_groups_list(ctx, &ctx->ext.supportedgroups, &ctx->ext.supportedgroups_len, parg); case SSL_CTRL_SET_SIGALGS: return tls1_set_sigalgs(ctx->cert, parg, larg, 0); case SSL_CTRL_SET_SIGALGS_LIST: return tls1_set_sigalgs_list(ctx, ctx->cert, parg, 0); case SSL_CTRL_SET_CLIENT_SIGALGS: return tls1_set_sigalgs(ctx->cert, parg, larg, 1); case SSL_CTRL_SET_CLIENT_SIGALGS_LIST: return tls1_set_sigalgs_list(ctx, ctx->cert, parg, 1); case SSL_CTRL_SET_CLIENT_CERT_TYPES: return ssl3_set_req_cert_type(ctx->cert, parg, larg); case SSL_CTRL_BUILD_CERT_CHAIN: return ssl_build_cert_chain(NULL, ctx, larg); case SSL_CTRL_SET_VERIFY_CERT_STORE: return ssl_cert_set_cert_store(ctx->cert, parg, 0, larg); case SSL_CTRL_SET_CHAIN_CERT_STORE: return ssl_cert_set_cert_store(ctx->cert, parg, 1, larg); case SSL_CTRL_GET_VERIFY_CERT_STORE: return ssl_cert_get_cert_store(ctx->cert, parg, 0); case SSL_CTRL_GET_CHAIN_CERT_STORE: return ssl_cert_get_cert_store(ctx->cert, parg, 1); case SSL_CTRL_EXTRA_CHAIN_CERT: if (ctx->extra_certs == NULL) { if ((ctx->extra_certs = sk_X509_new_null()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); return 0; } } if (!sk_X509_push(ctx->extra_certs, (X509 *)parg)) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); return 0; } break; case SSL_CTRL_GET_EXTRA_CHAIN_CERTS: if (ctx->extra_certs == NULL && larg == 0) *(STACK_OF(X509) **)parg = ctx->cert->key->chain; else *(STACK_OF(X509) **)parg = ctx->extra_certs; break; case SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS: OSSL_STACK_OF_X509_free(ctx->extra_certs); ctx->extra_certs = NULL; break; case SSL_CTRL_CHAIN: if (larg) return ssl_cert_set1_chain(NULL, ctx, (STACK_OF(X509) *)parg); else return ssl_cert_set0_chain(NULL, ctx, (STACK_OF(X509) *)parg); case SSL_CTRL_CHAIN_CERT: if (larg) return ssl_cert_add1_chain_cert(NULL, ctx, (X509 *)parg); else return ssl_cert_add0_chain_cert(NULL, ctx, (X509 *)parg); case SSL_CTRL_GET_CHAIN_CERTS: *(STACK_OF(X509) **)parg = ctx->cert->key->chain; break; case SSL_CTRL_SELECT_CURRENT_CERT: return ssl_cert_select_current(ctx->cert, (X509 *)parg); case SSL_CTRL_SET_CURRENT_CERT: return ssl_cert_set_current(ctx->cert, larg); default: return 0; } return 1; } long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void)) { switch (cmd) { #if !defined(OPENSSL_NO_DEPRECATED_3_0) case SSL_CTRL_SET_TMP_DH_CB: { ctx->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp; } break; #endif case SSL_CTRL_SET_TLSEXT_SERVERNAME_CB: ctx->ext.servername_cb = (int (*)(SSL *, int *, void *))fp; break; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB: ctx->ext.status_cb = (int (*)(SSL *, void *))fp; break; # ifndef OPENSSL_NO_DEPRECATED_3_0 case SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB: ctx->ext.ticket_key_cb = (int (*)(SSL *, unsigned char *, unsigned char *, EVP_CIPHER_CTX *, HMAC_CTX *, int))fp; break; #endif #ifndef OPENSSL_NO_SRP case SSL_CTRL_SET_SRP_VERIFY_PARAM_CB: ctx->srp_ctx.srp_Mask |= SSL_kSRP; ctx->srp_ctx.SRP_verify_param_callback = (int (*)(SSL *, void *))fp; break; case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB: ctx->srp_ctx.srp_Mask |= SSL_kSRP; ctx->srp_ctx.TLS_ext_srp_username_callback = (int (*)(SSL *, int *, void *))fp; break; case SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB: ctx->srp_ctx.srp_Mask |= SSL_kSRP; ctx->srp_ctx.SRP_give_srp_client_pwd_callback = (char *(*)(SSL *, void *))fp; break; #endif case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB: { ctx->not_resumable_session_cb = (int (*)(SSL *, int))fp; } break; default: return 0; } return 1; } int SSL_CTX_set_tlsext_ticket_key_evp_cb (SSL_CTX *ctx, int (*fp)(SSL *, unsigned char *, unsigned char *, EVP_CIPHER_CTX *, EVP_MAC_CTX *, int)) { ctx->ext.ticket_key_evp_cb = fp; return 1; } const SSL_CIPHER *ssl3_get_cipher_by_id(uint32_t id) { SSL_CIPHER c; const SSL_CIPHER *cp; c.id = id; cp = OBJ_bsearch_ssl_cipher_id(&c, tls13_ciphers, TLS13_NUM_CIPHERS); if (cp != NULL) return cp; cp = OBJ_bsearch_ssl_cipher_id(&c, ssl3_ciphers, SSL3_NUM_CIPHERS); if (cp != NULL) return cp; return OBJ_bsearch_ssl_cipher_id(&c, ssl3_scsvs, SSL3_NUM_SCSVS); } const SSL_CIPHER *ssl3_get_cipher_by_std_name(const char *stdname) { SSL_CIPHER *tbl; SSL_CIPHER *alltabs[] = {tls13_ciphers, ssl3_ciphers, ssl3_scsvs}; size_t i, j, tblsize[] = {TLS13_NUM_CIPHERS, SSL3_NUM_CIPHERS, SSL3_NUM_SCSVS}; for (j = 0; j < OSSL_NELEM(alltabs); j++) { for (i = 0, tbl = alltabs[j]; i < tblsize[j]; i++, tbl++) { if (tbl->stdname == NULL) continue; if (strcmp(stdname, tbl->stdname) == 0) { return tbl; } } } return NULL; } const SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p) { return ssl3_get_cipher_by_id(SSL3_CK_CIPHERSUITE_FLAG | ((uint32_t)p[0] << 8L) | (uint32_t)p[1]); } int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len) { if ((c->id & 0xff000000) != SSL3_CK_CIPHERSUITE_FLAG) { *len = 0; return 1; } if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff)) return 0; *len = 2; return 1; } const SSL_CIPHER *ssl3_choose_cipher(SSL_CONNECTION *s, STACK_OF(SSL_CIPHER) *clnt, STACK_OF(SSL_CIPHER) *srvr) { const SSL_CIPHER *c, *ret = NULL; STACK_OF(SSL_CIPHER) *prio, *allow; int i, ii, ok, prefer_sha256 = 0; unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0; STACK_OF(SSL_CIPHER) *prio_chacha = NULL; OSSL_TRACE_BEGIN(TLS_CIPHER) { BIO_printf(trc_out, "Server has %d from %p:\n", sk_SSL_CIPHER_num(srvr), (void *)srvr); for (i = 0; i < sk_SSL_CIPHER_num(srvr); ++i) { c = sk_SSL_CIPHER_value(srvr, i); BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name); } BIO_printf(trc_out, "Client sent %d from %p:\n", sk_SSL_CIPHER_num(clnt), (void *)clnt); for (i = 0; i < sk_SSL_CIPHER_num(clnt); ++i) { c = sk_SSL_CIPHER_value(clnt, i); BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name); } } OSSL_TRACE_END(TLS_CIPHER); if (tls1_suiteb(s)) { prio = srvr; allow = clnt; } else if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { prio = srvr; allow = clnt; if (s->options & SSL_OP_PRIORITIZE_CHACHA && sk_SSL_CIPHER_num(clnt) > 0) { c = sk_SSL_CIPHER_value(clnt, 0); if (c->algorithm_enc == SSL_CHACHA20POLY1305) { int num = sk_SSL_CIPHER_num(srvr); int found = 0; for (i = 0; i < num; i++) { c = sk_SSL_CIPHER_value(srvr, i); if (c->algorithm_enc == SSL_CHACHA20POLY1305) { found = 1; break; } } if (found) { prio_chacha = sk_SSL_CIPHER_new_reserve(NULL, num); if (prio_chacha != NULL) { sk_SSL_CIPHER_push(prio_chacha, c); for (i++; i < num; i++) { c = sk_SSL_CIPHER_value(srvr, i); if (c->algorithm_enc == SSL_CHACHA20POLY1305) sk_SSL_CIPHER_push(prio_chacha, c); } for (i = 0; i < num; i++) { c = sk_SSL_CIPHER_value(srvr, i); if (c->algorithm_enc != SSL_CHACHA20POLY1305) sk_SSL_CIPHER_push(prio_chacha, c); } prio = prio_chacha; } } } } } else { prio = clnt; allow = srvr; } if (SSL_CONNECTION_IS_TLS13(s)) { #ifndef OPENSSL_NO_PSK size_t j; if (s->psk_server_callback != NULL) { for (j = 0; j < s->ssl_pkey_num && !ssl_has_cert(s, j); j++); if (j == s->ssl_pkey_num) { prefer_sha256 = 1; } } #endif } else { tls1_set_cert_validity(s); ssl_set_masks(s); } for (i = 0; i < sk_SSL_CIPHER_num(prio); i++) { int minversion, maxversion; c = sk_SSL_CIPHER_value(prio, i); minversion = SSL_CONNECTION_IS_DTLS(s) ? c->min_dtls : c->min_tls; maxversion = SSL_CONNECTION_IS_DTLS(s) ? c->max_dtls : c->max_tls; if (ssl_version_cmp(s, s->version, minversion) < 0 || ssl_version_cmp(s, s->version, maxversion) > 0) continue; if (!SSL_CONNECTION_IS_TLS13(s)) { mask_k = s->s3.tmp.mask_k; mask_a = s->s3.tmp.mask_a; #ifndef OPENSSL_NO_SRP if (s->srp_ctx.srp_Mask & SSL_kSRP) { mask_k |= SSL_kSRP; mask_a |= SSL_aSRP; } #endif alg_k = c->algorithm_mkey; alg_a = c->algorithm_auth; #ifndef OPENSSL_NO_PSK if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL) continue; #endif ok = (alg_k & mask_k) && (alg_a & mask_a); OSSL_TRACE7(TLS_CIPHER, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name); if (alg_k & SSL_kECDHE) ok = ok && tls1_check_ec_tmp_key(s, c->id); if (!ok) continue; } ii = sk_SSL_CIPHER_find(allow, c); if (ii >= 0) { if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED, c->strength_bits, 0, (void *)c)) continue; if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) && s->s3.is_probably_safari) { if (!ret) ret = sk_SSL_CIPHER_value(allow, ii); continue; } if (prefer_sha256) { const SSL_CIPHER *tmp = sk_SSL_CIPHER_value(allow, ii); const EVP_MD *md = ssl_md(SSL_CONNECTION_GET_CTX(s), tmp->algorithm2); if (md != NULL && EVP_MD_is_a(md, OSSL_DIGEST_NAME_SHA2_256)) { ret = tmp; break; } if (ret == NULL) ret = tmp; continue; } ret = sk_SSL_CIPHER_value(allow, ii); break; } } sk_SSL_CIPHER_free(prio_chacha); return ret; } int ssl3_get_req_cert_type(SSL_CONNECTION *s, WPACKET *pkt) { uint32_t alg_k, alg_a = 0; if (s->cert->ctype) return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len); ssl_set_sig_mask(&alg_a, s, SSL_SECOP_SIGALG_MASK); alg_k = s->s3.tmp.new_cipher->algorithm_mkey; #ifndef OPENSSL_NO_GOST if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST)) if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN) || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN) || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN) || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_SIGN) || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_512_SIGN)) return 0; if (s->version >= TLS1_2_VERSION && (alg_k & SSL_kGOST18)) if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN) || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN)) return 0; #endif if ((s->version == SSL3_VERSION) && (alg_k & SSL_kDHE)) { if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_EPHEMERAL_DH)) return 0; if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_EPHEMERAL_DH)) return 0; } if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN)) return 0; if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_SIGN)) return 0; if (s->version >= TLS1_VERSION && !(alg_a & SSL_aECDSA) && !WPACKET_put_bytes_u8(pkt, TLS_CT_ECDSA_SIGN)) return 0; return 1; } static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len) { OPENSSL_free(c->ctype); c->ctype = NULL; c->ctype_len = 0; if (p == NULL || len == 0) return 1; if (len > 0xff) return 0; c->ctype = OPENSSL_memdup(p, len); if (c->ctype == NULL) return 0; c->ctype_len = len; return 1; } int ssl3_shutdown(SSL *s) { int ret; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; if (sc->quiet_shutdown || SSL_in_before(s)) { sc->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN); return 1; } if (!(sc->shutdown & SSL_SENT_SHUTDOWN)) { sc->shutdown |= SSL_SENT_SHUTDOWN; ssl3_send_alert(sc, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); if (sc->s3.alert_dispatch > 0) return -1; } else if (sc->s3.alert_dispatch > 0) { ret = s->method->ssl_dispatch_alert(s); if (ret == -1) { return ret; } } else if (!(sc->shutdown & SSL_RECEIVED_SHUTDOWN)) { size_t readbytes; s->method->ssl_read_bytes(s, 0, NULL, NULL, 0, 0, &readbytes); if (!(sc->shutdown & SSL_RECEIVED_SHUTDOWN)) { return -1; } } if ((sc->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN)) && sc->s3.alert_dispatch == SSL_ALERT_DISPATCH_NONE) return 1; else return 0; } int ssl3_write(SSL *s, const void *buf, size_t len, size_t *written) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; clear_sys_error(); if (sc->s3.renegotiate) ssl3_renegotiate_check(s, 0); return s->method->ssl_write_bytes(s, SSL3_RT_APPLICATION_DATA, buf, len, written); } static int ssl3_read_internal(SSL *s, void *buf, size_t len, int peek, size_t *readbytes) { int ret; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; clear_sys_error(); if (sc->s3.renegotiate) ssl3_renegotiate_check(s, 0); sc->s3.in_read_app_data = 1; ret = s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len, peek, readbytes); if ((ret == -1) && (sc->s3.in_read_app_data == 2)) { ossl_statem_set_in_handshake(sc, 1); ret = s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len, peek, readbytes); ossl_statem_set_in_handshake(sc, 0); } else sc->s3.in_read_app_data = 0; return ret; } int ssl3_read(SSL *s, void *buf, size_t len, size_t *readbytes) { return ssl3_read_internal(s, buf, len, 0, readbytes); } int ssl3_peek(SSL *s, void *buf, size_t len, size_t *readbytes) { return ssl3_read_internal(s, buf, len, 1, readbytes); } int ssl3_renegotiate(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; if (sc->handshake_func == NULL) return 1; sc->s3.renegotiate = 1; return 1; } int ssl3_renegotiate_check(SSL *s, int initok) { int ret = 0; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; if (sc->s3.renegotiate) { if (!RECORD_LAYER_read_pending(&sc->rlayer) && !RECORD_LAYER_write_pending(&sc->rlayer) && (initok || !SSL_in_init(s))) { ossl_statem_set_renegotiate(sc); sc->s3.renegotiate = 0; sc->s3.num_renegotiations++; sc->s3.total_renegotiations++; ret = 1; } } return ret; } long ssl_get_algorithm2(SSL_CONNECTION *s) { long alg2; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->s3.tmp.new_cipher == NULL) return -1; alg2 = s->s3.tmp.new_cipher->algorithm2; if (ssl->method->ssl3_enc->enc_flags & SSL_ENC_FLAG_SHA256_PRF) { if (alg2 == (SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF)) return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256; } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) { if (alg2 == (SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384)) return SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF; } return alg2; } int ssl_fill_hello_random(SSL_CONNECTION *s, int server, unsigned char *result, size_t len, DOWNGRADE dgrd) { int send_time = 0, ret; if (len < 4) return 0; if (server) send_time = (s->mode & SSL_MODE_SEND_SERVERHELLO_TIME) != 0; else send_time = (s->mode & SSL_MODE_SEND_CLIENTHELLO_TIME) != 0; if (send_time) { unsigned long Time = (unsigned long)time(NULL); unsigned char *p = result; l2n(Time, p); ret = RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, p, len - 4, 0); } else { ret = RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, result, len, 0); } if (ret > 0) { if (!ossl_assert(sizeof(tls11downgrade) < len) || !ossl_assert(sizeof(tls12downgrade) < len)) return 0; if (dgrd == DOWNGRADE_TO_1_2) memcpy(result + len - sizeof(tls12downgrade), tls12downgrade, sizeof(tls12downgrade)); else if (dgrd == DOWNGRADE_TO_1_1) memcpy(result + len - sizeof(tls11downgrade), tls11downgrade, sizeof(tls11downgrade)); } return ret; } int ssl_generate_master_secret(SSL_CONNECTION *s, unsigned char *pms, size_t pmslen, int free_pms) { unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; int ret = 0; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (alg_k & SSL_PSK) { #ifndef OPENSSL_NO_PSK unsigned char *pskpms, *t; size_t psklen = s->s3.tmp.psklen; size_t pskpmslen; if (alg_k & SSL_kPSK) pmslen = psklen; pskpmslen = 4 + pmslen + psklen; pskpms = OPENSSL_malloc(pskpmslen); if (pskpms == NULL) goto err; t = pskpms; s2n(pmslen, t); if (alg_k & SSL_kPSK) memset(t, 0, pmslen); else memcpy(t, pms, pmslen); t += pmslen; s2n(psklen, t); memcpy(t, s->s3.tmp.psk, psklen); OPENSSL_clear_free(s->s3.tmp.psk, psklen); s->s3.tmp.psk = NULL; s->s3.tmp.psklen = 0; if (!ssl->method->ssl3_enc->generate_master_secret(s, s->session->master_key, pskpms, pskpmslen, &s->session->master_key_length)) { OPENSSL_clear_free(pskpms, pskpmslen); goto err; } OPENSSL_clear_free(pskpms, pskpmslen); #else goto err; #endif } else { if (!ssl->method->ssl3_enc->generate_master_secret(s, s->session->master_key, pms, pmslen, &s->session->master_key_length)) { goto err; } } ret = 1; err: if (pms) { if (free_pms) OPENSSL_clear_free(pms, pmslen); else OPENSSL_cleanse(pms, pmslen); } if (s->server == 0) { s->s3.tmp.pms = NULL; s->s3.tmp.pmslen = 0; } return ret; } EVP_PKEY *ssl_generate_pkey(SSL_CONNECTION *s, EVP_PKEY *pm) { EVP_PKEY_CTX *pctx = NULL; EVP_PKEY *pkey = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (pm == NULL) return NULL; pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pm, sctx->propq); if (pctx == NULL) goto err; if (EVP_PKEY_keygen_init(pctx) <= 0) goto err; if (EVP_PKEY_keygen(pctx, &pkey) <= 0) { EVP_PKEY_free(pkey); pkey = NULL; } err: EVP_PKEY_CTX_free(pctx); return pkey; } EVP_PKEY *ssl_generate_pkey_group(SSL_CONNECTION *s, uint16_t id) { SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(sctx, id); EVP_PKEY_CTX *pctx = NULL; EVP_PKEY *pkey = NULL; if (ginf == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, ginf->algorithm, sctx->propq); if (pctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_PKEY_keygen_init(pctx) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_PKEY_CTX_set_group_name(pctx, ginf->realname) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_PKEY_keygen(pctx, &pkey) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); EVP_PKEY_free(pkey); pkey = NULL; } err: EVP_PKEY_CTX_free(pctx); return pkey; } EVP_PKEY *ssl_generate_param_group(SSL_CONNECTION *s, uint16_t id) { SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); EVP_PKEY_CTX *pctx = NULL; EVP_PKEY *pkey = NULL; const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(sctx, id); if (ginf == NULL) goto err; pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, ginf->algorithm, sctx->propq); if (pctx == NULL) goto err; if (EVP_PKEY_paramgen_init(pctx) <= 0) goto err; if (EVP_PKEY_CTX_set_group_name(pctx, ginf->realname) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_PKEY_paramgen(pctx, &pkey) <= 0) { EVP_PKEY_free(pkey); pkey = NULL; } err: EVP_PKEY_CTX_free(pctx); return pkey; } int ssl_gensecret(SSL_CONNECTION *s, unsigned char *pms, size_t pmslen) { int rv = 0; if (SSL_CONNECTION_IS_TLS13(s)) { if (!s->hit) rv = tls13_generate_secret(s, ssl_handshake_md(s), NULL, NULL, 0, (unsigned char *)&s->early_secret); else rv = 1; rv = rv && tls13_generate_handshake_secret(s, pms, pmslen); } else { rv = ssl_generate_master_secret(s, pms, pmslen, 0); } return rv; } int ssl_derive(SSL_CONNECTION *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret) { int rv = 0; unsigned char *pms = NULL; size_t pmslen = 0; EVP_PKEY_CTX *pctx; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (privkey == NULL || pubkey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, privkey, sctx->propq); if (EVP_PKEY_derive_init(pctx) <= 0 || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_CONNECTION_IS_TLS13(s) && EVP_PKEY_is_a(privkey, "DH")) EVP_PKEY_CTX_set_dh_pad(pctx, 1); pms = OPENSSL_malloc(pmslen); if (pms == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (gensecret) { rv = ssl_gensecret(s, pms, pmslen); } else { s->s3.tmp.pms = pms; s->s3.tmp.pmslen = pmslen; pms = NULL; rv = 1; } err: OPENSSL_clear_free(pms, pmslen); EVP_PKEY_CTX_free(pctx); return rv; } int ssl_decapsulate(SSL_CONNECTION *s, EVP_PKEY *privkey, const unsigned char *ct, size_t ctlen, int gensecret) { int rv = 0; unsigned char *pms = NULL; size_t pmslen = 0; EVP_PKEY_CTX *pctx; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (privkey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, privkey, sctx->propq); if (EVP_PKEY_decapsulate_init(pctx, NULL) <= 0 || EVP_PKEY_decapsulate(pctx, NULL, &pmslen, ct, ctlen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pms = OPENSSL_malloc(pmslen); if (pms == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (EVP_PKEY_decapsulate(pctx, pms, &pmslen, ct, ctlen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (gensecret) { rv = ssl_gensecret(s, pms, pmslen); } else { s->s3.tmp.pms = pms; s->s3.tmp.pmslen = pmslen; pms = NULL; rv = 1; } err: OPENSSL_clear_free(pms, pmslen); EVP_PKEY_CTX_free(pctx); return rv; } int ssl_encapsulate(SSL_CONNECTION *s, EVP_PKEY *pubkey, unsigned char **ctp, size_t *ctlenp, int gensecret) { int rv = 0; unsigned char *pms = NULL, *ct = NULL; size_t pmslen = 0, ctlen = 0; EVP_PKEY_CTX *pctx; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (pubkey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pubkey, sctx->propq); if (EVP_PKEY_encapsulate_init(pctx, NULL) <= 0 || EVP_PKEY_encapsulate(pctx, NULL, &ctlen, NULL, &pmslen) <= 0 || pmslen == 0 || ctlen == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pms = OPENSSL_malloc(pmslen); ct = OPENSSL_malloc(ctlen); if (pms == NULL || ct == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (EVP_PKEY_encapsulate(pctx, ct, &ctlen, pms, &pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (gensecret) { rv = ssl_gensecret(s, pms, pmslen); } else { s->s3.tmp.pms = pms; s->s3.tmp.pmslen = pmslen; pms = NULL; rv = 1; } if (rv > 0) { *ctp = ct; *ctlenp = ctlen; ct = NULL; } err: OPENSSL_clear_free(pms, pmslen); OPENSSL_free(ct); EVP_PKEY_CTX_free(pctx); return rv; } const char *SSL_get0_group_name(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); unsigned int id; if (sc == NULL) return NULL; if (SSL_CONNECTION_IS_TLS13(sc) && sc->s3.did_kex) id = sc->s3.group_id; else id = sc->session->kex_group; return tls1_group_id2name(s->ctx, id); } const char *SSL_group_to_name(SSL *s, int nid) { int group_id = 0; const TLS_GROUP_INFO *cinf = NULL; if (nid & TLSEXT_nid_unknown) group_id = nid & 0xFFFF; else group_id = tls1_nid2group_id(nid); cinf = tls1_group_id_lookup(s->ctx, group_id); if (cinf != NULL) return cinf->tlsname; return NULL; }
ssl
openssl/ssl/s3_lib.c
openssl
#include <stdio.h> #include "ssl_local.h" #include <openssl/evp.h> #include <openssl/md5.h> #include <openssl/core_names.h> #include "internal/cryptlib.h" static int ssl3_generate_key_block(SSL_CONNECTION *s, unsigned char *km, int num) { const EVP_MD *md5 = NULL, *sha1 = NULL; EVP_MD_CTX *m5; EVP_MD_CTX *s1; unsigned char buf[16], smd[SHA_DIGEST_LENGTH]; unsigned char c = 'A'; unsigned int i, k; int ret = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); #ifdef CHARSET_EBCDIC c = os_toascii[c]; #endif k = 0; md5 = ssl_evp_md_fetch(sctx->libctx, NID_md5, sctx->propq); sha1 = ssl_evp_md_fetch(sctx->libctx, NID_sha1, sctx->propq); m5 = EVP_MD_CTX_new(); s1 = EVP_MD_CTX_new(); if (md5 == NULL || sha1 == NULL || m5 == NULL || s1 == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } for (i = 0; (int)i < num; i += MD5_DIGEST_LENGTH) { k++; if (k > sizeof(buf)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } memset(buf, c, k); c++; if (!EVP_DigestInit_ex(s1, sha1, NULL) || !EVP_DigestUpdate(s1, buf, k) || !EVP_DigestUpdate(s1, s->session->master_key, s->session->master_key_length) || !EVP_DigestUpdate(s1, s->s3.server_random, SSL3_RANDOM_SIZE) || !EVP_DigestUpdate(s1, s->s3.client_random, SSL3_RANDOM_SIZE) || !EVP_DigestFinal_ex(s1, smd, NULL) || !EVP_DigestInit_ex(m5, md5, NULL) || !EVP_DigestUpdate(m5, s->session->master_key, s->session->master_key_length) || !EVP_DigestUpdate(m5, smd, SHA_DIGEST_LENGTH)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if ((int)(i + MD5_DIGEST_LENGTH) > num) { if (!EVP_DigestFinal_ex(m5, smd, NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } memcpy(km, smd, (num - i)); } else { if (!EVP_DigestFinal_ex(m5, km, NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } km += MD5_DIGEST_LENGTH; } OPENSSL_cleanse(smd, sizeof(smd)); ret = 1; err: EVP_MD_CTX_free(m5); EVP_MD_CTX_free(s1); ssl_evp_md_free(md5); ssl_evp_md_free(sha1); return ret; } int ssl3_change_cipher_state(SSL_CONNECTION *s, int which) { unsigned char *p, *mac_secret; size_t md_len; unsigned char *key, *iv; const EVP_CIPHER *ciph; const SSL_COMP *comp = NULL; const EVP_MD *md; int mdi; size_t n, iv_len, key_len; int direction = (which & SSL3_CC_READ) != 0 ? OSSL_RECORD_DIRECTION_READ : OSSL_RECORD_DIRECTION_WRITE; ciph = s->s3.tmp.new_sym_enc; md = s->s3.tmp.new_hash; if (!ossl_assert(md != NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } #ifndef OPENSSL_NO_COMP comp = s->s3.tmp.new_compression; #endif p = s->s3.tmp.key_block; mdi = EVP_MD_get_size(md); if (mdi < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } md_len = (size_t)mdi; key_len = EVP_CIPHER_get_key_length(ciph); iv_len = EVP_CIPHER_get_iv_length(ciph); if ((which == SSL3_CHANGE_CIPHER_CLIENT_WRITE) || (which == SSL3_CHANGE_CIPHER_SERVER_READ)) { mac_secret = &(p[0]); n = md_len + md_len; key = &(p[n]); n += key_len + key_len; iv = &(p[n]); n += iv_len + iv_len; } else { n = md_len; mac_secret = &(p[n]); n += md_len + key_len; key = &(p[n]); n += key_len + iv_len; iv = &(p[n]); n += iv_len; } if (n > s->s3.tmp.key_block_length) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!ssl_set_new_record_layer(s, SSL3_VERSION, direction, OSSL_RECORD_PROTECTION_LEVEL_APPLICATION, NULL, 0, key, key_len, iv, iv_len, mac_secret, md_len, ciph, 0, NID_undef, md, comp, NULL)) { goto err; } return 1; err: return 0; } int ssl3_setup_key_block(SSL_CONNECTION *s) { unsigned char *p; const EVP_CIPHER *c; const EVP_MD *hash; int num; int ret = 0; SSL_COMP *comp; if (s->s3.tmp.key_block_length != 0) return 1; if (!ssl_cipher_get_evp(SSL_CONNECTION_GET_CTX(s), s->session, &c, &hash, NULL, NULL, &comp, 0)) { SSLfatal_alert(s, SSL_AD_INTERNAL_ERROR); return 0; } ssl_evp_cipher_free(s->s3.tmp.new_sym_enc); s->s3.tmp.new_sym_enc = c; ssl_evp_md_free(s->s3.tmp.new_hash); s->s3.tmp.new_hash = hash; #ifdef OPENSSL_NO_COMP s->s3.tmp.new_compression = NULL; #else s->s3.tmp.new_compression = comp; #endif num = EVP_MD_get_size(hash); if (num < 0) return 0; num = EVP_CIPHER_get_key_length(c) + num + EVP_CIPHER_get_iv_length(c); num *= 2; ssl3_cleanup_key_block(s); if ((p = OPENSSL_malloc(num)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } s->s3.tmp.key_block_length = num; s->s3.tmp.key_block = p; ret = ssl3_generate_key_block(s, p, num); return ret; } void ssl3_cleanup_key_block(SSL_CONNECTION *s) { OPENSSL_clear_free(s->s3.tmp.key_block, s->s3.tmp.key_block_length); s->s3.tmp.key_block = NULL; s->s3.tmp.key_block_length = 0; } int ssl3_init_finished_mac(SSL_CONNECTION *s) { BIO *buf = BIO_new(BIO_s_mem()); if (buf == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BIO_LIB); return 0; } ssl3_free_digest_list(s); s->s3.handshake_buffer = buf; (void)BIO_set_close(s->s3.handshake_buffer, BIO_CLOSE); return 1; } void ssl3_free_digest_list(SSL_CONNECTION *s) { BIO_free(s->s3.handshake_buffer); s->s3.handshake_buffer = NULL; EVP_MD_CTX_free(s->s3.handshake_dgst); s->s3.handshake_dgst = NULL; } int ssl3_finish_mac(SSL_CONNECTION *s, const unsigned char *buf, size_t len) { int ret; if (s->s3.handshake_dgst == NULL) { if (len > INT_MAX) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_OVERFLOW_ERROR); return 0; } ret = BIO_write(s->s3.handshake_buffer, (void *)buf, (int)len); if (ret <= 0 || ret != (int)len) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } else { ret = EVP_DigestUpdate(s->s3.handshake_dgst, buf, len); if (!ret) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } return 1; } int ssl3_digest_cached_records(SSL_CONNECTION *s, int keep) { const EVP_MD *md; long hdatalen; void *hdata; if (s->s3.handshake_dgst == NULL) { hdatalen = BIO_get_mem_data(s->s3.handshake_buffer, &hdata); if (hdatalen <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_HANDSHAKE_LENGTH); return 0; } s->s3.handshake_dgst = EVP_MD_CTX_new(); if (s->s3.handshake_dgst == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } md = ssl_handshake_md(s); if (md == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_SUITABLE_DIGEST_ALGORITHM); return 0; } if (!EVP_DigestInit_ex(s->s3.handshake_dgst, md, NULL) || !EVP_DigestUpdate(s->s3.handshake_dgst, hdata, hdatalen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } if (keep == 0) { BIO_free(s->s3.handshake_buffer); s->s3.handshake_buffer = NULL; } return 1; } void ssl3_digest_master_key_set_params(const SSL_SESSION *session, OSSL_PARAM params[]) { int n = 0; params[n++] = OSSL_PARAM_construct_octet_string(OSSL_DIGEST_PARAM_SSL3_MS, (void *)session->master_key, session->master_key_length); params[n++] = OSSL_PARAM_construct_end(); } size_t ssl3_final_finish_mac(SSL_CONNECTION *s, const char *sender, size_t len, unsigned char *p) { int ret; EVP_MD_CTX *ctx = NULL; if (!ssl3_digest_cached_records(s, 0)) { return 0; } if (EVP_MD_CTX_get_type(s->s3.handshake_dgst) != NID_md5_sha1) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_REQUIRED_DIGEST); return 0; } ctx = EVP_MD_CTX_new(); if (ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } if (!EVP_MD_CTX_copy_ex(ctx, s->s3.handshake_dgst)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); ret = 0; goto err; } ret = EVP_MD_CTX_get_size(ctx); if (ret < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); ret = 0; goto err; } if (sender != NULL) { OSSL_PARAM digest_cmd_params[3]; ssl3_digest_master_key_set_params(s->session, digest_cmd_params); if (EVP_DigestUpdate(ctx, sender, len) <= 0 || EVP_MD_CTX_set_params(ctx, digest_cmd_params) <= 0 || EVP_DigestFinal_ex(ctx, p, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); ret = 0; } } err: EVP_MD_CTX_free(ctx); return ret; } int ssl3_generate_master_secret(SSL_CONNECTION *s, unsigned char *out, unsigned char *p, size_t len, size_t *secret_size) { static const unsigned char *const salt[3] = { #ifndef CHARSET_EBCDIC (const unsigned char *)"A", (const unsigned char *)"BB", (const unsigned char *)"CCC", #else (const unsigned char *)"\x41", (const unsigned char *)"\x42\x42", (const unsigned char *)"\x43\x43\x43", #endif }; unsigned char buf[EVP_MAX_MD_SIZE]; EVP_MD_CTX *ctx = EVP_MD_CTX_new(); int i, ret = 1; unsigned int n; size_t ret_secret_size = 0; if (ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } for (i = 0; i < 3; i++) { if (EVP_DigestInit_ex(ctx, SSL_CONNECTION_GET_CTX(s)->sha1, NULL) <= 0 || EVP_DigestUpdate(ctx, salt[i], strlen((const char *)salt[i])) <= 0 || EVP_DigestUpdate(ctx, p, len) <= 0 || EVP_DigestUpdate(ctx, &(s->s3.client_random[0]), SSL3_RANDOM_SIZE) <= 0 || EVP_DigestUpdate(ctx, &(s->s3.server_random[0]), SSL3_RANDOM_SIZE) <= 0 || EVP_DigestFinal_ex(ctx, buf, &n) <= 0 || EVP_DigestInit_ex(ctx, SSL_CONNECTION_GET_CTX(s)->md5, NULL) <= 0 || EVP_DigestUpdate(ctx, p, len) <= 0 || EVP_DigestUpdate(ctx, buf, n) <= 0 || EVP_DigestFinal_ex(ctx, out, &n) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); ret = 0; break; } out += n; ret_secret_size += n; } EVP_MD_CTX_free(ctx); OPENSSL_cleanse(buf, sizeof(buf)); if (ret) *secret_size = ret_secret_size; return ret; } int ssl3_alert_code(int code) { switch (code) { case SSL_AD_CLOSE_NOTIFY: return SSL3_AD_CLOSE_NOTIFY; case SSL_AD_UNEXPECTED_MESSAGE: return SSL3_AD_UNEXPECTED_MESSAGE; case SSL_AD_BAD_RECORD_MAC: return SSL3_AD_BAD_RECORD_MAC; case SSL_AD_DECRYPTION_FAILED: return SSL3_AD_BAD_RECORD_MAC; case SSL_AD_RECORD_OVERFLOW: return SSL3_AD_BAD_RECORD_MAC; case SSL_AD_DECOMPRESSION_FAILURE: return SSL3_AD_DECOMPRESSION_FAILURE; case SSL_AD_HANDSHAKE_FAILURE: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_NO_CERTIFICATE: return SSL3_AD_NO_CERTIFICATE; case SSL_AD_BAD_CERTIFICATE: return SSL3_AD_BAD_CERTIFICATE; case SSL_AD_UNSUPPORTED_CERTIFICATE: return SSL3_AD_UNSUPPORTED_CERTIFICATE; case SSL_AD_CERTIFICATE_REVOKED: return SSL3_AD_CERTIFICATE_REVOKED; case SSL_AD_CERTIFICATE_EXPIRED: return SSL3_AD_CERTIFICATE_EXPIRED; case SSL_AD_CERTIFICATE_UNKNOWN: return SSL3_AD_CERTIFICATE_UNKNOWN; case SSL_AD_ILLEGAL_PARAMETER: return SSL3_AD_ILLEGAL_PARAMETER; case SSL_AD_UNKNOWN_CA: return SSL3_AD_BAD_CERTIFICATE; case SSL_AD_ACCESS_DENIED: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_DECODE_ERROR: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_DECRYPT_ERROR: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_EXPORT_RESTRICTION: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_PROTOCOL_VERSION: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_INSUFFICIENT_SECURITY: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_INTERNAL_ERROR: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_USER_CANCELLED: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_NO_RENEGOTIATION: return -1; case SSL_AD_UNSUPPORTED_EXTENSION: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_CERTIFICATE_UNOBTAINABLE: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_UNRECOGNIZED_NAME: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_BAD_CERTIFICATE_HASH_VALUE: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_UNKNOWN_PSK_IDENTITY: return TLS1_AD_UNKNOWN_PSK_IDENTITY; case SSL_AD_INAPPROPRIATE_FALLBACK: return TLS1_AD_INAPPROPRIATE_FALLBACK; case SSL_AD_NO_APPLICATION_PROTOCOL: return TLS1_AD_NO_APPLICATION_PROTOCOL; case SSL_AD_CERTIFICATE_REQUIRED: return SSL_AD_HANDSHAKE_FAILURE; case TLS13_AD_MISSING_EXTENSION: return SSL_AD_HANDSHAKE_FAILURE; default: return -1; } }
ssl
openssl/ssl/s3_enc.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <openssl/engine.h> #include "ssl_local.h" #ifndef OPENSSL_NO_ENGINE void tls_engine_finish(ENGINE *e) { ENGINE_finish(e); } #endif const EVP_CIPHER *tls_get_cipher_from_engine(int nid) { const EVP_CIPHER *ret = NULL; #ifndef OPENSSL_NO_ENGINE ENGINE *eng; eng = ENGINE_get_cipher_engine(nid); if (eng != NULL) { ret = ENGINE_get_cipher(eng, nid); ENGINE_finish(eng); } #endif return ret; } const EVP_MD *tls_get_digest_from_engine(int nid) { const EVP_MD *ret = NULL; #ifndef OPENSSL_NO_ENGINE ENGINE *eng; eng = ENGINE_get_digest_engine(nid); if (eng != NULL) { ret = ENGINE_get_digest(eng, nid); ENGINE_finish(eng); } #endif return ret; } #ifndef OPENSSL_NO_ENGINE int tls_engine_load_ssl_client_cert(SSL_CONNECTION *s, X509 **px509, EVP_PKEY **ppkey) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); return ENGINE_load_ssl_client_cert(SSL_CONNECTION_GET_CTX(s)->client_cert_engine, ssl, SSL_get_client_CA_list(ssl), px509, ppkey, NULL, NULL, NULL); } #endif #ifndef OPENSSL_NO_ENGINE int SSL_CTX_set_client_cert_engine(SSL_CTX *ctx, ENGINE *e) { if (!ENGINE_init(e)) { ERR_raise(ERR_LIB_SSL, ERR_R_ENGINE_LIB); return 0; } if (!ENGINE_get_ssl_client_cert_function(e)) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_CLIENT_CERT_METHOD); ENGINE_finish(e); return 0; } ctx->client_cert_engine = e; return 1; } #endif #ifndef OPENSSL_NO_DEPRECATED_3_0 int ssl_hmac_old_new(SSL_HMAC *ret) { ret->old_ctx = HMAC_CTX_new(); if (ret->old_ctx == NULL) return 0; return 1; } void ssl_hmac_old_free(SSL_HMAC *ctx) { HMAC_CTX_free(ctx->old_ctx); } int ssl_hmac_old_init(SSL_HMAC *ctx, void *key, size_t len, char *md) { return HMAC_Init_ex(ctx->old_ctx, key, len, EVP_get_digestbyname(md), NULL); } int ssl_hmac_old_update(SSL_HMAC *ctx, const unsigned char *data, size_t len) { return HMAC_Update(ctx->old_ctx, data, len); } int ssl_hmac_old_final(SSL_HMAC *ctx, unsigned char *md, size_t *len) { unsigned int l; if (HMAC_Final(ctx->old_ctx, md, &l) > 0) { if (len != NULL) *len = l; return 1; } return 0; } size_t ssl_hmac_old_size(const SSL_HMAC *ctx) { return HMAC_size(ctx->old_ctx); } HMAC_CTX *ssl_hmac_get0_HMAC_CTX(SSL_HMAC *ctx) { return ctx->old_ctx; } EVP_PKEY *ssl_dh_to_pkey(DH *dh) { # ifndef OPENSSL_NO_DH EVP_PKEY *ret; if (dh == NULL) return NULL; ret = EVP_PKEY_new(); if (EVP_PKEY_set1_DH(ret, dh) <= 0) { EVP_PKEY_free(ret); return NULL; } return ret; # else return NULL; # endif } int ssl_set_tmp_ecdh_groups(uint16_t **pext, size_t *pextlen, void *key) { # ifndef OPENSSL_NO_EC const EC_GROUP *group = EC_KEY_get0_group((const EC_KEY *)key); int nid; if (group == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_MISSING_PARAMETERS); return 0; } nid = EC_GROUP_get_curve_name(group); if (nid == NID_undef) return 0; return tls1_set_groups(pext, pextlen, &nid, 1); # else return 0; # endif } # if !defined(OPENSSL_NO_DH) void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx, DH *(*dh) (SSL *ssl, int is_export, int keylength)) { SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh); } void SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh) (SSL *ssl, int is_export, int keylength)) { SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh); } # endif #endif
ssl
openssl/ssl/tls_depr.c
openssl
#include <openssl/sslerr_legacy.h> #include "sslerr.h" #ifndef OPENSSL_NO_DEPRECATED_3_0 int ERR_load_SSL_strings(void) { return ossl_err_load_SSL_strings(); } #else NON_EMPTY_TRANSLATION_UNIT #endif
ssl
openssl/ssl/ssl_err_legacy.c
openssl
#include <stdio.h> #include "ssl_local.h" const char *SSL_state_string_long(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL || ossl_statem_in_error(sc)) return "error"; switch (SSL_get_state(s)) { case TLS_ST_CR_CERT_STATUS: return "SSLv3/TLS read certificate status"; case TLS_ST_CW_NEXT_PROTO: return "SSLv3/TLS write next proto"; case TLS_ST_SR_NEXT_PROTO: return "SSLv3/TLS read next proto"; case TLS_ST_SW_CERT_STATUS: return "SSLv3/TLS write certificate status"; case TLS_ST_BEFORE: return "before SSL initialization"; case TLS_ST_OK: return "SSL negotiation finished successfully"; case TLS_ST_CW_CLNT_HELLO: return "SSLv3/TLS write client hello"; case TLS_ST_CR_SRVR_HELLO: return "SSLv3/TLS read server hello"; case TLS_ST_CR_CERT: return "SSLv3/TLS read server certificate"; case TLS_ST_CR_COMP_CERT: return "TLSv1.3 read server compressed certificate"; case TLS_ST_CR_KEY_EXCH: return "SSLv3/TLS read server key exchange"; case TLS_ST_CR_CERT_REQ: return "SSLv3/TLS read server certificate request"; case TLS_ST_CR_SESSION_TICKET: return "SSLv3/TLS read server session ticket"; case TLS_ST_CR_SRVR_DONE: return "SSLv3/TLS read server done"; case TLS_ST_CW_CERT: return "SSLv3/TLS write client certificate"; case TLS_ST_CW_COMP_CERT: return "TLSv1.3 write client compressed certificate"; case TLS_ST_CW_KEY_EXCH: return "SSLv3/TLS write client key exchange"; case TLS_ST_CW_CERT_VRFY: return "SSLv3/TLS write certificate verify"; case TLS_ST_CW_CHANGE: case TLS_ST_SW_CHANGE: return "SSLv3/TLS write change cipher spec"; case TLS_ST_CW_FINISHED: case TLS_ST_SW_FINISHED: return "SSLv3/TLS write finished"; case TLS_ST_CR_CHANGE: case TLS_ST_SR_CHANGE: return "SSLv3/TLS read change cipher spec"; case TLS_ST_CR_FINISHED: case TLS_ST_SR_FINISHED: return "SSLv3/TLS read finished"; case TLS_ST_SR_CLNT_HELLO: return "SSLv3/TLS read client hello"; case TLS_ST_SW_HELLO_REQ: return "SSLv3/TLS write hello request"; case TLS_ST_SW_SRVR_HELLO: return "SSLv3/TLS write server hello"; case TLS_ST_SW_CERT: return "SSLv3/TLS write certificate"; case TLS_ST_SW_COMP_CERT: return "TLSv1.3 write server compressed certificate"; case TLS_ST_SW_KEY_EXCH: return "SSLv3/TLS write key exchange"; case TLS_ST_SW_CERT_REQ: return "SSLv3/TLS write certificate request"; case TLS_ST_SW_SESSION_TICKET: return "SSLv3/TLS write session ticket"; case TLS_ST_SW_SRVR_DONE: return "SSLv3/TLS write server done"; case TLS_ST_SR_CERT: return "SSLv3/TLS read client certificate"; case TLS_ST_SR_COMP_CERT: return "TLSv1.3 read client compressed certificate"; case TLS_ST_SR_KEY_EXCH: return "SSLv3/TLS read client key exchange"; case TLS_ST_SR_CERT_VRFY: return "SSLv3/TLS read certificate verify"; case DTLS_ST_CR_HELLO_VERIFY_REQUEST: return "DTLS1 read hello verify request"; case DTLS_ST_SW_HELLO_VERIFY_REQUEST: return "DTLS1 write hello verify request"; case TLS_ST_SW_ENCRYPTED_EXTENSIONS: return "TLSv1.3 write encrypted extensions"; case TLS_ST_CR_ENCRYPTED_EXTENSIONS: return "TLSv1.3 read encrypted extensions"; case TLS_ST_CR_CERT_VRFY: return "TLSv1.3 read server certificate verify"; case TLS_ST_SW_CERT_VRFY: return "TLSv1.3 write server certificate verify"; case TLS_ST_CR_HELLO_REQ: return "SSLv3/TLS read hello request"; case TLS_ST_SW_KEY_UPDATE: return "TLSv1.3 write server key update"; case TLS_ST_CW_KEY_UPDATE: return "TLSv1.3 write client key update"; case TLS_ST_SR_KEY_UPDATE: return "TLSv1.3 read client key update"; case TLS_ST_CR_KEY_UPDATE: return "TLSv1.3 read server key update"; case TLS_ST_EARLY_DATA: return "TLSv1.3 early data"; case TLS_ST_PENDING_EARLY_DATA_END: return "TLSv1.3 pending early data end"; case TLS_ST_CW_END_OF_EARLY_DATA: return "TLSv1.3 write end of early data"; case TLS_ST_SR_END_OF_EARLY_DATA: return "TLSv1.3 read end of early data"; default: return "unknown state"; } } const char *SSL_state_string(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL || ossl_statem_in_error(sc)) return "SSLERR"; switch (SSL_get_state(s)) { case TLS_ST_SR_NEXT_PROTO: return "TRNP"; case TLS_ST_SW_SESSION_TICKET: return "TWST"; case TLS_ST_SW_CERT_STATUS: return "TWCS"; case TLS_ST_CR_CERT_STATUS: return "TRCS"; case TLS_ST_CR_SESSION_TICKET: return "TRST"; case TLS_ST_CW_NEXT_PROTO: return "TWNP"; case TLS_ST_BEFORE: return "PINIT"; case TLS_ST_OK: return "SSLOK"; case TLS_ST_CW_CLNT_HELLO: return "TWCH"; case TLS_ST_CR_SRVR_HELLO: return "TRSH"; case TLS_ST_CR_CERT: return "TRSC"; case TLS_ST_CR_COMP_CERT: return "TRSCC"; case TLS_ST_CR_KEY_EXCH: return "TRSKE"; case TLS_ST_CR_CERT_REQ: return "TRCR"; case TLS_ST_CR_SRVR_DONE: return "TRSD"; case TLS_ST_CW_CERT: return "TWCC"; case TLS_ST_CW_COMP_CERT: return "TWCCC"; case TLS_ST_CW_KEY_EXCH: return "TWCKE"; case TLS_ST_CW_CERT_VRFY: return "TWCV"; case TLS_ST_SW_CHANGE: case TLS_ST_CW_CHANGE: return "TWCCS"; case TLS_ST_SW_FINISHED: case TLS_ST_CW_FINISHED: return "TWFIN"; case TLS_ST_SR_CHANGE: case TLS_ST_CR_CHANGE: return "TRCCS"; case TLS_ST_SR_FINISHED: case TLS_ST_CR_FINISHED: return "TRFIN"; case TLS_ST_SW_HELLO_REQ: return "TWHR"; case TLS_ST_SR_CLNT_HELLO: return "TRCH"; case TLS_ST_SW_SRVR_HELLO: return "TWSH"; case TLS_ST_SW_CERT: return "TWSC"; case TLS_ST_SW_COMP_CERT: return "TWSCC"; case TLS_ST_SW_KEY_EXCH: return "TWSKE"; case TLS_ST_SW_CERT_REQ: return "TWCR"; case TLS_ST_SW_SRVR_DONE: return "TWSD"; case TLS_ST_SR_CERT: return "TRCC"; case TLS_ST_SR_COMP_CERT: return "TRCCC"; case TLS_ST_SR_KEY_EXCH: return "TRCKE"; case TLS_ST_SR_CERT_VRFY: return "TRCV"; case DTLS_ST_CR_HELLO_VERIFY_REQUEST: return "DRCHV"; case DTLS_ST_SW_HELLO_VERIFY_REQUEST: return "DWCHV"; case TLS_ST_SW_ENCRYPTED_EXTENSIONS: return "TWEE"; case TLS_ST_CR_ENCRYPTED_EXTENSIONS: return "TREE"; case TLS_ST_CR_CERT_VRFY: return "TRSCV"; case TLS_ST_SW_CERT_VRFY: return "TWSCV"; case TLS_ST_CR_HELLO_REQ: return "TRHR"; case TLS_ST_SW_KEY_UPDATE: return "TWSKU"; case TLS_ST_CW_KEY_UPDATE: return "TWCKU"; case TLS_ST_SR_KEY_UPDATE: return "TRCKU"; case TLS_ST_CR_KEY_UPDATE: return "TRSKU"; case TLS_ST_EARLY_DATA: return "TED"; case TLS_ST_PENDING_EARLY_DATA_END: return "TPEDE"; case TLS_ST_CW_END_OF_EARLY_DATA: return "TWEOED"; case TLS_ST_SR_END_OF_EARLY_DATA: return "TWEOED"; default: return "UNKWN"; } } const char *SSL_alert_type_string_long(int value) { switch (value >> 8) { case SSL3_AL_WARNING: return "warning"; case SSL3_AL_FATAL: return "fatal"; default: return "unknown"; } } const char *SSL_alert_type_string(int value) { switch (value >> 8) { case SSL3_AL_WARNING: return "W"; case SSL3_AL_FATAL: return "F"; default: return "U"; } } const char *SSL_alert_desc_string(int value) { switch (value & 0xff) { case SSL3_AD_CLOSE_NOTIFY: return "CN"; case SSL3_AD_UNEXPECTED_MESSAGE: return "UM"; case SSL3_AD_BAD_RECORD_MAC: return "BM"; case SSL3_AD_DECOMPRESSION_FAILURE: return "DF"; case SSL3_AD_HANDSHAKE_FAILURE: return "HF"; case SSL3_AD_NO_CERTIFICATE: return "NC"; case SSL3_AD_BAD_CERTIFICATE: return "BC"; case SSL3_AD_UNSUPPORTED_CERTIFICATE: return "UC"; case SSL3_AD_CERTIFICATE_REVOKED: return "CR"; case SSL3_AD_CERTIFICATE_EXPIRED: return "CE"; case SSL3_AD_CERTIFICATE_UNKNOWN: return "CU"; case SSL3_AD_ILLEGAL_PARAMETER: return "IP"; case TLS1_AD_DECRYPTION_FAILED: return "DC"; case TLS1_AD_RECORD_OVERFLOW: return "RO"; case TLS1_AD_UNKNOWN_CA: return "CA"; case TLS1_AD_ACCESS_DENIED: return "AD"; case TLS1_AD_DECODE_ERROR: return "DE"; case TLS1_AD_DECRYPT_ERROR: return "CY"; case TLS1_AD_EXPORT_RESTRICTION: return "ER"; case TLS1_AD_PROTOCOL_VERSION: return "PV"; case TLS1_AD_INSUFFICIENT_SECURITY: return "IS"; case TLS1_AD_INTERNAL_ERROR: return "IE"; case TLS1_AD_USER_CANCELLED: return "US"; case TLS1_AD_NO_RENEGOTIATION: return "NR"; case TLS1_AD_UNSUPPORTED_EXTENSION: return "UE"; case TLS1_AD_CERTIFICATE_UNOBTAINABLE: return "CO"; case TLS1_AD_UNRECOGNIZED_NAME: return "UN"; case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE: return "BR"; case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE: return "BH"; case TLS1_AD_UNKNOWN_PSK_IDENTITY: return "UP"; default: return "UK"; } } const char *SSL_alert_desc_string_long(int value) { switch (value & 0xff) { case SSL3_AD_CLOSE_NOTIFY: return "close notify"; case SSL3_AD_UNEXPECTED_MESSAGE: return "unexpected_message"; case SSL3_AD_BAD_RECORD_MAC: return "bad record mac"; case SSL3_AD_DECOMPRESSION_FAILURE: return "decompression failure"; case SSL3_AD_HANDSHAKE_FAILURE: return "handshake failure"; case SSL3_AD_NO_CERTIFICATE: return "no certificate"; case SSL3_AD_BAD_CERTIFICATE: return "bad certificate"; case SSL3_AD_UNSUPPORTED_CERTIFICATE: return "unsupported certificate"; case SSL3_AD_CERTIFICATE_REVOKED: return "certificate revoked"; case SSL3_AD_CERTIFICATE_EXPIRED: return "certificate expired"; case SSL3_AD_CERTIFICATE_UNKNOWN: return "certificate unknown"; case SSL3_AD_ILLEGAL_PARAMETER: return "illegal parameter"; case TLS1_AD_DECRYPTION_FAILED: return "decryption failed"; case TLS1_AD_RECORD_OVERFLOW: return "record overflow"; case TLS1_AD_UNKNOWN_CA: return "unknown CA"; case TLS1_AD_ACCESS_DENIED: return "access denied"; case TLS1_AD_DECODE_ERROR: return "decode error"; case TLS1_AD_DECRYPT_ERROR: return "decrypt error"; case TLS1_AD_EXPORT_RESTRICTION: return "export restriction"; case TLS1_AD_PROTOCOL_VERSION: return "protocol version"; case TLS1_AD_INSUFFICIENT_SECURITY: return "insufficient security"; case TLS1_AD_INTERNAL_ERROR: return "internal error"; case TLS1_AD_USER_CANCELLED: return "user canceled"; case TLS1_AD_NO_RENEGOTIATION: return "no renegotiation"; case TLS1_AD_UNSUPPORTED_EXTENSION: return "unsupported extension"; case TLS1_AD_CERTIFICATE_UNOBTAINABLE: return "certificate unobtainable"; case TLS1_AD_UNRECOGNIZED_NAME: return "unrecognized name"; case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE: return "bad certificate status response"; case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE: return "bad certificate hash value"; case TLS1_AD_UNKNOWN_PSK_IDENTITY: return "unknown PSK identity"; case TLS1_AD_NO_APPLICATION_PROTOCOL: return "no application protocol"; default: return "unknown"; } }
ssl
openssl/ssl/ssl_stat.c
openssl
#include <stdlib.h> #include "ssl_local.h" #include "internal/ktls.h" #include "record/record_local.h" #include "internal/cryptlib.h" #include <openssl/evp.h> #include <openssl/kdf.h> #include <openssl/core_names.h> #define TLS13_MAX_LABEL_LEN 249 static const unsigned char label_prefix[] = "\x74\x6C\x73\x31\x33\x20"; int tls13_hkdf_expand_ex(OSSL_LIB_CTX *libctx, const char *propq, const EVP_MD *md, const unsigned char *secret, const unsigned char *label, size_t labellen, const unsigned char *data, size_t datalen, unsigned char *out, size_t outlen, int raise_error) { EVP_KDF *kdf = EVP_KDF_fetch(libctx, OSSL_KDF_NAME_TLS1_3_KDF, propq); EVP_KDF_CTX *kctx; OSSL_PARAM params[7], *p = params; int mode = EVP_PKEY_HKDEF_MODE_EXPAND_ONLY; const char *mdname = EVP_MD_get0_name(md); int ret; size_t hashlen; kctx = EVP_KDF_CTX_new(kdf); EVP_KDF_free(kdf); if (kctx == NULL) return 0; if (labellen > TLS13_MAX_LABEL_LEN) { if (raise_error) ERR_raise(ERR_LIB_SSL, SSL_R_TLS_ILLEGAL_EXPORTER_LABEL); EVP_KDF_CTX_free(kctx); return 0; } if ((ret = EVP_MD_get_size(md)) <= 0) { EVP_KDF_CTX_free(kctx); if (raise_error) ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } hashlen = (size_t)ret; *p++ = OSSL_PARAM_construct_int(OSSL_KDF_PARAM_MODE, &mode); *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST, (char *)mdname, 0); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (unsigned char *)secret, hashlen); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PREFIX, (unsigned char *)label_prefix, sizeof(label_prefix) - 1); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_LABEL, (unsigned char *)label, labellen); if (data != NULL) *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_DATA, (unsigned char *)data, datalen); *p++ = OSSL_PARAM_construct_end(); ret = EVP_KDF_derive(kctx, out, outlen, params) <= 0; EVP_KDF_CTX_free(kctx); if (ret != 0) { if (raise_error) ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); } return ret == 0; } int tls13_hkdf_expand(SSL_CONNECTION *s, const EVP_MD *md, const unsigned char *secret, const unsigned char *label, size_t labellen, const unsigned char *data, size_t datalen, unsigned char *out, size_t outlen, int fatal) { int ret; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); ret = tls13_hkdf_expand_ex(sctx->libctx, sctx->propq, md, secret, label, labellen, data, datalen, out, outlen, !fatal); if (ret == 0 && fatal) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return ret; } int tls13_derive_key(SSL_CONNECTION *s, const EVP_MD *md, const unsigned char *secret, unsigned char *key, size_t keylen) { static const unsigned char keylabel[] = "\x6B\x65\x79"; return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1, NULL, 0, key, keylen, 1); } int tls13_derive_iv(SSL_CONNECTION *s, const EVP_MD *md, const unsigned char *secret, unsigned char *iv, size_t ivlen) { static const unsigned char ivlabel[] = "\x69\x76"; return tls13_hkdf_expand(s, md, secret, ivlabel, sizeof(ivlabel) - 1, NULL, 0, iv, ivlen, 1); } int tls13_derive_finishedkey(SSL_CONNECTION *s, const EVP_MD *md, const unsigned char *secret, unsigned char *fin, size_t finlen) { static const unsigned char finishedlabel[] = "\x66\x69\x6E\x69\x73\x68\x65\x64"; return tls13_hkdf_expand(s, md, secret, finishedlabel, sizeof(finishedlabel) - 1, NULL, 0, fin, finlen, 1); } int tls13_generate_secret(SSL_CONNECTION *s, const EVP_MD *md, const unsigned char *prevsecret, const unsigned char *insecret, size_t insecretlen, unsigned char *outsecret) { size_t mdlen; int mdleni; int ret; EVP_KDF *kdf; EVP_KDF_CTX *kctx; OSSL_PARAM params[7], *p = params; int mode = EVP_PKEY_HKDEF_MODE_EXTRACT_ONLY; const char *mdname = EVP_MD_get0_name(md); static const char derived_secret_label[] = "\x64\x65\x72\x69\x76\x65\x64"; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); kdf = EVP_KDF_fetch(sctx->libctx, OSSL_KDF_NAME_TLS1_3_KDF, sctx->propq); kctx = EVP_KDF_CTX_new(kdf); EVP_KDF_free(kdf); if (kctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } mdleni = EVP_MD_get_size(md); if (!ossl_assert(mdleni >= 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); EVP_KDF_CTX_free(kctx); return 0; } mdlen = (size_t)mdleni; *p++ = OSSL_PARAM_construct_int(OSSL_KDF_PARAM_MODE, &mode); *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST, (char *)mdname, 0); if (insecret != NULL) *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, (unsigned char *)insecret, insecretlen); if (prevsecret != NULL) *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT, (unsigned char *)prevsecret, mdlen); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PREFIX, (unsigned char *)label_prefix, sizeof(label_prefix) - 1); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_LABEL, (unsigned char *)derived_secret_label, sizeof(derived_secret_label) - 1); *p++ = OSSL_PARAM_construct_end(); ret = EVP_KDF_derive(kctx, outsecret, mdlen, params) <= 0; if (ret != 0) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); EVP_KDF_CTX_free(kctx); return ret == 0; } int tls13_generate_handshake_secret(SSL_CONNECTION *s, const unsigned char *insecret, size_t insecretlen) { return tls13_generate_secret(s, ssl_handshake_md(s), s->early_secret, insecret, insecretlen, (unsigned char *)&s->handshake_secret); } int tls13_generate_master_secret(SSL_CONNECTION *s, unsigned char *out, unsigned char *prev, size_t prevlen, size_t *secret_size) { const EVP_MD *md = ssl_handshake_md(s); *secret_size = EVP_MD_get_size(md); return tls13_generate_secret(s, md, prev, NULL, 0, out); } size_t tls13_final_finish_mac(SSL_CONNECTION *s, const char *str, size_t slen, unsigned char *out) { const EVP_MD *md = ssl_handshake_md(s); const char *mdname = EVP_MD_get0_name(md); unsigned char hash[EVP_MAX_MD_SIZE]; unsigned char finsecret[EVP_MAX_MD_SIZE]; unsigned char *key = NULL; size_t len = 0, hashlen; OSSL_PARAM params[2], *p = params; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (md == NULL) return 0; if (sctx->propq != NULL) *p++ = OSSL_PARAM_construct_utf8_string(OSSL_ALG_PARAM_PROPERTIES, (char *)sctx->propq, 0); *p = OSSL_PARAM_construct_end(); if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { goto err; } if (str == SSL_CONNECTION_GET_SSL(s)->method->ssl3_enc->server_finished_label) { key = s->server_finished_secret; } else if (SSL_IS_FIRST_HANDSHAKE(s)) { key = s->client_finished_secret; } else { if (!tls13_derive_finishedkey(s, md, s->client_app_traffic_secret, finsecret, hashlen)) goto err; key = finsecret; } if (!EVP_Q_mac(sctx->libctx, "HMAC", sctx->propq, mdname, params, key, hashlen, hash, hashlen, out, EVP_MAX_MD_SIZE * 2, &len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } err: OPENSSL_cleanse(finsecret, sizeof(finsecret)); return len; } int tls13_setup_key_block(SSL_CONNECTION *s) { const EVP_CIPHER *c; const EVP_MD *hash; s->session->cipher = s->s3.tmp.new_cipher; if (!ssl_cipher_get_evp(SSL_CONNECTION_GET_CTX(s), s->session, &c, &hash, NULL, NULL, NULL, 0)) { SSLfatal_alert(s, SSL_AD_INTERNAL_ERROR); return 0; } ssl_evp_cipher_free(s->s3.tmp.new_sym_enc); s->s3.tmp.new_sym_enc = c; ssl_evp_md_free(s->s3.tmp.new_hash); s->s3.tmp.new_hash = hash; return 1; } static int derive_secret_key_and_iv(SSL_CONNECTION *s, const EVP_MD *md, const EVP_CIPHER *ciph, const unsigned char *insecret, const unsigned char *hash, const unsigned char *label, size_t labellen, unsigned char *secret, unsigned char *key, size_t *keylen, unsigned char *iv, size_t *ivlen, size_t *taglen) { int hashleni = EVP_MD_get_size(md); size_t hashlen; int mode; if (!ossl_assert(hashleni >= 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } hashlen = (size_t)hashleni; if (!tls13_hkdf_expand(s, md, insecret, label, labellen, hash, hashlen, secret, hashlen, 1)) { return 0; } *keylen = EVP_CIPHER_get_key_length(ciph); mode = EVP_CIPHER_get_mode(ciph); if (mode == EVP_CIPH_CCM_MODE) { uint32_t algenc; *ivlen = EVP_CCM_TLS_IV_LEN; if (s->s3.tmp.new_cipher != NULL) { algenc = s->s3.tmp.new_cipher->algorithm_enc; } else if (s->session->cipher != NULL) { algenc = s->session->cipher->algorithm_enc; } else if (s->psksession != NULL && s->psksession->cipher != NULL) { algenc = s->psksession->cipher->algorithm_enc; } else { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } if (algenc & (SSL_AES128CCM8 | SSL_AES256CCM8)) *taglen = EVP_CCM8_TLS_TAG_LEN; else *taglen = EVP_CCM_TLS_TAG_LEN; } else { int iivlen; if (mode == EVP_CIPH_GCM_MODE) { *taglen = EVP_GCM_TLS_TAG_LEN; } else { *taglen = EVP_CHACHAPOLY_TLS_TAG_LEN; } iivlen = EVP_CIPHER_get_iv_length(ciph); if (iivlen < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } *ivlen = iivlen; } if (!tls13_derive_key(s, md, secret, key, *keylen) || !tls13_derive_iv(s, md, secret, iv, *ivlen)) { return 0; } return 1; } int tls13_change_cipher_state(SSL_CONNECTION *s, int which) { static const unsigned char client_early_traffic[] = "\x63\x20\x65\x20\x74\x72\x61\x66\x66\x69\x63"; static const unsigned char client_handshake_traffic[] = "\x63\x20\x68\x73\x20\x74\x72\x61\x66\x66\x69\x63"; static const unsigned char client_application_traffic[] = "\x63\x20\x61\x70\x20\x74\x72\x61\x66\x66\x69\x63"; static const unsigned char server_handshake_traffic[] = "\x73\x20\x68\x73\x20\x74\x72\x61\x66\x66\x69\x63"; static const unsigned char server_application_traffic[] = "\x73\x20\x61\x70\x20\x74\x72\x61\x66\x66\x69\x63"; static const unsigned char exporter_master_secret[] = "\x65\x78\x70\x20\x6D\x61\x73\x74\x65\x72"; static const unsigned char resumption_master_secret[] = "\x72\x65\x73\x20\x6D\x61\x73\x74\x65\x72"; static const unsigned char early_exporter_master_secret[] = "\x65\x20\x65\x78\x70\x20\x6D\x61\x73\x74\x65\x72"; unsigned char iv[EVP_MAX_IV_LENGTH]; unsigned char key[EVP_MAX_KEY_LENGTH]; unsigned char secret[EVP_MAX_MD_SIZE]; unsigned char hashval[EVP_MAX_MD_SIZE]; unsigned char *hash = hashval; unsigned char *insecret; unsigned char *finsecret = NULL; const char *log_label = NULL; size_t finsecretlen = 0; const unsigned char *label; size_t labellen, hashlen = 0; int ret = 0; const EVP_MD *md = NULL; const EVP_CIPHER *cipher = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); size_t keylen, ivlen, taglen; int level; int direction = (which & SSL3_CC_READ) != 0 ? OSSL_RECORD_DIRECTION_READ : OSSL_RECORD_DIRECTION_WRITE; if (((which & SSL3_CC_CLIENT) && (which & SSL3_CC_WRITE)) || ((which & SSL3_CC_SERVER) && (which & SSL3_CC_READ))) { if (which & SSL3_CC_EARLY) { EVP_MD_CTX *mdctx = NULL; long handlen; void *hdata; unsigned int hashlenui; const SSL_CIPHER *sslcipher = SSL_SESSION_get0_cipher(s->session); insecret = s->early_secret; label = client_early_traffic; labellen = sizeof(client_early_traffic) - 1; log_label = CLIENT_EARLY_LABEL; handlen = BIO_get_mem_data(s->s3.handshake_buffer, &hdata); if (handlen <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_HANDSHAKE_LENGTH); goto err; } if (s->early_data_state == SSL_EARLY_DATA_CONNECTING && s->max_early_data > 0 && s->session->ext.max_early_data == 0) { if (!ossl_assert(s->psksession != NULL && s->max_early_data == s->psksession->ext.max_early_data)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } sslcipher = SSL_SESSION_get0_cipher(s->psksession); } if (sslcipher == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_PSK); goto err; } mdctx = EVP_MD_CTX_new(); if (mdctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (!ssl_cipher_get_evp_cipher(sctx, sslcipher, &cipher)) { SSLfatal_alert(s, SSL_AD_INTERNAL_ERROR); EVP_MD_CTX_free(mdctx); goto err; } md = ssl_md(sctx, sslcipher->algorithm2); if (md == NULL || !EVP_DigestInit_ex(mdctx, md, NULL) || !EVP_DigestUpdate(mdctx, hdata, handlen) || !EVP_DigestFinal_ex(mdctx, hashval, &hashlenui)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); EVP_MD_CTX_free(mdctx); goto err; } hashlen = hashlenui; EVP_MD_CTX_free(mdctx); if (!tls13_hkdf_expand(s, md, insecret, early_exporter_master_secret, sizeof(early_exporter_master_secret) - 1, hashval, hashlen, s->early_exporter_master_secret, hashlen, 1)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!ssl_log_secret(s, EARLY_EXPORTER_SECRET_LABEL, s->early_exporter_master_secret, hashlen)) { goto err; } } else if (which & SSL3_CC_HANDSHAKE) { insecret = s->handshake_secret; finsecret = s->client_finished_secret; finsecretlen = EVP_MD_get_size(ssl_handshake_md(s)); label = client_handshake_traffic; labellen = sizeof(client_handshake_traffic) - 1; log_label = CLIENT_HANDSHAKE_LABEL; hash = s->handshake_traffic_hash; } else { insecret = s->master_secret; label = client_application_traffic; labellen = sizeof(client_application_traffic) - 1; log_label = CLIENT_APPLICATION_LABEL; hash = s->server_finished_hash; } } else { if (which & SSL3_CC_HANDSHAKE) { insecret = s->handshake_secret; finsecret = s->server_finished_secret; finsecretlen = EVP_MD_get_size(ssl_handshake_md(s)); label = server_handshake_traffic; labellen = sizeof(server_handshake_traffic) - 1; log_label = SERVER_HANDSHAKE_LABEL; } else { insecret = s->master_secret; label = server_application_traffic; labellen = sizeof(server_application_traffic) - 1; log_label = SERVER_APPLICATION_LABEL; } } if (!(which & SSL3_CC_EARLY)) { md = ssl_handshake_md(s); cipher = s->s3.tmp.new_sym_enc; if (!ssl3_digest_cached_records(s, 1) || !ssl_handshake_hash(s, hashval, sizeof(hashval), &hashlen)) { ; goto err; } } if (label == server_application_traffic) memcpy(s->server_finished_hash, hashval, hashlen); if (label == server_handshake_traffic) memcpy(s->handshake_traffic_hash, hashval, hashlen); if (label == client_application_traffic) { if (!tls13_hkdf_expand(s, ssl_handshake_md(s), insecret, resumption_master_secret, sizeof(resumption_master_secret) - 1, hashval, hashlen, s->resumption_master_secret, hashlen, 1)) { goto err; } } if (!ossl_assert(cipher != NULL)) goto err; if (!derive_secret_key_and_iv(s, md, cipher, insecret, hash, label, labellen, secret, key, &keylen, iv, &ivlen, &taglen)) { goto err; } if (label == server_application_traffic) { memcpy(s->server_app_traffic_secret, secret, hashlen); if (!tls13_hkdf_expand(s, ssl_handshake_md(s), insecret, exporter_master_secret, sizeof(exporter_master_secret) - 1, hash, hashlen, s->exporter_master_secret, hashlen, 1)) { goto err; } if (!ssl_log_secret(s, EXPORTER_SECRET_LABEL, s->exporter_master_secret, hashlen)) { goto err; } } else if (label == client_application_traffic) memcpy(s->client_app_traffic_secret, secret, hashlen); if (!ssl_log_secret(s, log_label, secret, hashlen)) { goto err; } if (finsecret != NULL && !tls13_derive_finishedkey(s, ssl_handshake_md(s), secret, finsecret, finsecretlen)) { goto err; } if ((which & SSL3_CC_WRITE) != 0) { if (!s->server && label == client_early_traffic) s->rlayer.wrlmethod->set_plain_alerts(s->rlayer.wrl, 1); else s->rlayer.wrlmethod->set_plain_alerts(s->rlayer.wrl, 0); } level = (which & SSL3_CC_EARLY) != 0 ? OSSL_RECORD_PROTECTION_LEVEL_EARLY : ((which &SSL3_CC_HANDSHAKE) != 0 ? OSSL_RECORD_PROTECTION_LEVEL_HANDSHAKE : OSSL_RECORD_PROTECTION_LEVEL_APPLICATION); if (!ssl_set_new_record_layer(s, s->version, direction, level, secret, hashlen, key, keylen, iv, ivlen, NULL, 0, cipher, taglen, NID_undef, NULL, NULL, md)) { goto err; } ret = 1; err: if ((which & SSL3_CC_EARLY) != 0) { ssl_evp_cipher_free(cipher); } OPENSSL_cleanse(key, sizeof(key)); OPENSSL_cleanse(secret, sizeof(secret)); return ret; } int tls13_update_key(SSL_CONNECTION *s, int sending) { static const unsigned char application_traffic[] = "\x74\x72\x61\x66\x66\x69\x63\x20\x75\x70\x64"; const EVP_MD *md = ssl_handshake_md(s); size_t hashlen; unsigned char key[EVP_MAX_KEY_LENGTH]; unsigned char *insecret; unsigned char secret[EVP_MAX_MD_SIZE]; char *log_label; size_t keylen, ivlen, taglen; int ret = 0, l; int direction = sending ? OSSL_RECORD_DIRECTION_WRITE : OSSL_RECORD_DIRECTION_READ; unsigned char iv[EVP_MAX_IV_LENGTH]; if ((l = EVP_MD_get_size(md)) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } hashlen = (size_t)l; if (s->server == sending) insecret = s->server_app_traffic_secret; else insecret = s->client_app_traffic_secret; if (!derive_secret_key_and_iv(s, md, s->s3.tmp.new_sym_enc, insecret, NULL, application_traffic, sizeof(application_traffic) - 1, secret, key, &keylen, iv, &ivlen, &taglen)) { goto err; } memcpy(insecret, secret, hashlen); if (!ssl_set_new_record_layer(s, s->version, direction, OSSL_RECORD_PROTECTION_LEVEL_APPLICATION, insecret, hashlen, key, keylen, iv, ivlen, NULL, 0, s->s3.tmp.new_sym_enc, taglen, NID_undef, NULL, NULL, md)) { goto err; } log_label = s->server == sending ? SERVER_APPLICATION_N_LABEL : CLIENT_APPLICATION_N_LABEL; if (!ssl_log_secret(s, log_label, secret, hashlen)) { goto err; } ret = 1; err: OPENSSL_cleanse(key, sizeof(key)); OPENSSL_cleanse(secret, sizeof(secret)); return ret; } int tls13_alert_code(int code) { if (code == SSL_AD_MISSING_EXTENSION || code == SSL_AD_CERTIFICATE_REQUIRED) return code; return tls1_alert_code(code); } int tls13_export_keying_material(SSL_CONNECTION *s, unsigned char *out, size_t olen, const char *label, size_t llen, const unsigned char *context, size_t contextlen, int use_context) { unsigned char exportsecret[EVP_MAX_MD_SIZE]; static const unsigned char exporterlabel[] = "\x65\x78\x70\x6F\x72\x74\x65\x72"; unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE]; const EVP_MD *md = ssl_handshake_md(s); EVP_MD_CTX *ctx = EVP_MD_CTX_new(); unsigned int hashsize, datalen; int ret = 0; if (ctx == NULL || md == NULL || !ossl_statem_export_allowed(s)) goto err; if (!use_context) contextlen = 0; if (EVP_DigestInit_ex(ctx, md, NULL) <= 0 || EVP_DigestUpdate(ctx, context, contextlen) <= 0 || EVP_DigestFinal_ex(ctx, hash, &hashsize) <= 0 || EVP_DigestInit_ex(ctx, md, NULL) <= 0 || EVP_DigestFinal_ex(ctx, data, &datalen) <= 0 || !tls13_hkdf_expand(s, md, s->exporter_master_secret, (const unsigned char *)label, llen, data, datalen, exportsecret, hashsize, 0) || !tls13_hkdf_expand(s, md, exportsecret, exporterlabel, sizeof(exporterlabel) - 1, hash, hashsize, out, olen, 0)) goto err; ret = 1; err: EVP_MD_CTX_free(ctx); return ret; } int tls13_export_keying_material_early(SSL_CONNECTION *s, unsigned char *out, size_t olen, const char *label, size_t llen, const unsigned char *context, size_t contextlen) { static const unsigned char exporterlabel[] = "\x65\x78\x70\x6F\x72\x74\x65\x72"; unsigned char exportsecret[EVP_MAX_MD_SIZE]; unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE]; const EVP_MD *md; EVP_MD_CTX *ctx = EVP_MD_CTX_new(); unsigned int hashsize, datalen; int ret = 0; const SSL_CIPHER *sslcipher; if (ctx == NULL || !ossl_statem_export_early_allowed(s)) goto err; if (!s->server && s->max_early_data > 0 && s->session->ext.max_early_data == 0) sslcipher = SSL_SESSION_get0_cipher(s->psksession); else sslcipher = SSL_SESSION_get0_cipher(s->session); md = ssl_md(SSL_CONNECTION_GET_CTX(s), sslcipher->algorithm2); if (md == NULL || EVP_DigestInit_ex(ctx, md, NULL) <= 0 || EVP_DigestUpdate(ctx, context, contextlen) <= 0 || EVP_DigestFinal_ex(ctx, hash, &hashsize) <= 0 || EVP_DigestInit_ex(ctx, md, NULL) <= 0 || EVP_DigestFinal_ex(ctx, data, &datalen) <= 0 || !tls13_hkdf_expand(s, md, s->early_exporter_master_secret, (const unsigned char *)label, llen, data, datalen, exportsecret, hashsize, 0) || !tls13_hkdf_expand(s, md, exportsecret, exporterlabel, sizeof(exporterlabel) - 1, hash, hashsize, out, olen, 0)) goto err; ret = 1; err: EVP_MD_CTX_free(ctx); return ret; }
ssl
openssl/ssl/tls13_enc.c
openssl
#include <stdio.h> #include "ssl_local.h" #include "internal/e_os.h" #include <openssl/objects.h> #include <openssl/x509v3.h> #include <openssl/rand.h> #include <openssl/ocsp.h> #include <openssl/dh.h> #include <openssl/engine.h> #include <openssl/async.h> #include <openssl/ct.h> #include <openssl/trace.h> #include <openssl/core_names.h> #include "internal/cryptlib.h" #include "internal/nelem.h" #include "internal/refcount.h" #include "internal/ktls.h" #include "quic/quic_local.h" static int ssl_undefined_function_3(SSL_CONNECTION *sc, unsigned char *r, unsigned char *s, size_t t, size_t *u) { return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc)); } static int ssl_undefined_function_4(SSL_CONNECTION *sc, int r) { return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc)); } static size_t ssl_undefined_function_5(SSL_CONNECTION *sc, const char *r, size_t s, unsigned char *t) { return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc)); } static int ssl_undefined_function_6(int r) { return ssl_undefined_function(NULL); } static int ssl_undefined_function_7(SSL_CONNECTION *sc, unsigned char *r, size_t s, const char *t, size_t u, const unsigned char *v, size_t w, int x) { return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc)); } static int ssl_undefined_function_8(SSL_CONNECTION *sc) { return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc)); } const SSL3_ENC_METHOD ssl3_undef_enc_method = { ssl_undefined_function_8, ssl_undefined_function_3, ssl_undefined_function_4, ssl_undefined_function_5, NULL, 0, NULL, 0, ssl_undefined_function_6, ssl_undefined_function_7, }; struct ssl_async_args { SSL *s; void *buf; size_t num; enum { READFUNC, WRITEFUNC, OTHERFUNC } type; union { int (*func_read) (SSL *, void *, size_t, size_t *); int (*func_write) (SSL *, const void *, size_t, size_t *); int (*func_other) (SSL *); } f; }; static const struct { uint8_t mtype; uint8_t ord; int nid; } dane_mds[] = { { DANETLS_MATCHING_FULL, 0, NID_undef }, { DANETLS_MATCHING_2256, 1, NID_sha256 }, { DANETLS_MATCHING_2512, 2, NID_sha512 }, }; static int dane_ctx_enable(struct dane_ctx_st *dctx) { const EVP_MD **mdevp; uint8_t *mdord; uint8_t mdmax = DANETLS_MATCHING_LAST; int n = ((int)mdmax) + 1; size_t i; if (dctx->mdevp != NULL) return 1; mdevp = OPENSSL_zalloc(n * sizeof(*mdevp)); mdord = OPENSSL_zalloc(n * sizeof(*mdord)); if (mdord == NULL || mdevp == NULL) { OPENSSL_free(mdord); OPENSSL_free(mdevp); return 0; } for (i = 0; i < OSSL_NELEM(dane_mds); ++i) { const EVP_MD *md; if (dane_mds[i].nid == NID_undef || (md = EVP_get_digestbynid(dane_mds[i].nid)) == NULL) continue; mdevp[dane_mds[i].mtype] = md; mdord[dane_mds[i].mtype] = dane_mds[i].ord; } dctx->mdevp = mdevp; dctx->mdord = mdord; dctx->mdmax = mdmax; return 1; } static void dane_ctx_final(struct dane_ctx_st *dctx) { OPENSSL_free(dctx->mdevp); dctx->mdevp = NULL; OPENSSL_free(dctx->mdord); dctx->mdord = NULL; dctx->mdmax = 0; } static void tlsa_free(danetls_record *t) { if (t == NULL) return; OPENSSL_free(t->data); EVP_PKEY_free(t->spki); OPENSSL_free(t); } static void dane_final(SSL_DANE *dane) { sk_danetls_record_pop_free(dane->trecs, tlsa_free); dane->trecs = NULL; OSSL_STACK_OF_X509_free(dane->certs); dane->certs = NULL; X509_free(dane->mcert); dane->mcert = NULL; dane->mtlsa = NULL; dane->mdpth = -1; dane->pdpth = -1; } static int ssl_dane_dup(SSL_CONNECTION *to, SSL_CONNECTION *from) { int num; int i; if (!DANETLS_ENABLED(&from->dane)) return 1; num = sk_danetls_record_num(from->dane.trecs); dane_final(&to->dane); to->dane.flags = from->dane.flags; to->dane.dctx = &SSL_CONNECTION_GET_CTX(to)->dane; to->dane.trecs = sk_danetls_record_new_reserve(NULL, num); if (to->dane.trecs == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); return 0; } for (i = 0; i < num; ++i) { danetls_record *t = sk_danetls_record_value(from->dane.trecs, i); if (SSL_dane_tlsa_add(SSL_CONNECTION_GET_SSL(to), t->usage, t->selector, t->mtype, t->data, t->dlen) <= 0) return 0; } return 1; } static int dane_mtype_set(struct dane_ctx_st *dctx, const EVP_MD *md, uint8_t mtype, uint8_t ord) { int i; if (mtype == DANETLS_MATCHING_FULL && md != NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_CANNOT_OVERRIDE_MTYPE_FULL); return 0; } if (mtype > dctx->mdmax) { const EVP_MD **mdevp; uint8_t *mdord; int n = ((int)mtype) + 1; mdevp = OPENSSL_realloc(dctx->mdevp, n * sizeof(*mdevp)); if (mdevp == NULL) return -1; dctx->mdevp = mdevp; mdord = OPENSSL_realloc(dctx->mdord, n * sizeof(*mdord)); if (mdord == NULL) return -1; dctx->mdord = mdord; for (i = dctx->mdmax + 1; i < mtype; ++i) { mdevp[i] = NULL; mdord[i] = 0; } dctx->mdmax = mtype; } dctx->mdevp[mtype] = md; dctx->mdord[mtype] = (md == NULL) ? 0 : ord; return 1; } static const EVP_MD *tlsa_md_get(SSL_DANE *dane, uint8_t mtype) { if (mtype > dane->dctx->mdmax) return NULL; return dane->dctx->mdevp[mtype]; } static int dane_tlsa_add(SSL_DANE *dane, uint8_t usage, uint8_t selector, uint8_t mtype, const unsigned char *data, size_t dlen) { danetls_record *t; const EVP_MD *md = NULL; int ilen = (int)dlen; int i; int num; if (dane->trecs == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_NOT_ENABLED); return -1; } if (ilen < 0 || dlen != (size_t)ilen) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_DATA_LENGTH); return 0; } if (usage > DANETLS_USAGE_LAST) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_CERTIFICATE_USAGE); return 0; } if (selector > DANETLS_SELECTOR_LAST) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_SELECTOR); return 0; } if (mtype != DANETLS_MATCHING_FULL) { md = tlsa_md_get(dane, mtype); if (md == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_MATCHING_TYPE); return 0; } } if (md != NULL && dlen != (size_t)EVP_MD_get_size(md)) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_DIGEST_LENGTH); return 0; } if (!data) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_NULL_DATA); return 0; } if ((t = OPENSSL_zalloc(sizeof(*t))) == NULL) return -1; t->usage = usage; t->selector = selector; t->mtype = mtype; t->data = OPENSSL_malloc(dlen); if (t->data == NULL) { tlsa_free(t); return -1; } memcpy(t->data, data, dlen); t->dlen = dlen; if (mtype == DANETLS_MATCHING_FULL) { const unsigned char *p = data; X509 *cert = NULL; EVP_PKEY *pkey = NULL; switch (selector) { case DANETLS_SELECTOR_CERT: if (!d2i_X509(&cert, &p, ilen) || p < data || dlen != (size_t)(p - data)) { X509_free(cert); tlsa_free(t); ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_CERTIFICATE); return 0; } if (X509_get0_pubkey(cert) == NULL) { X509_free(cert); tlsa_free(t); ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_CERTIFICATE); return 0; } if ((DANETLS_USAGE_BIT(usage) & DANETLS_TA_MASK) == 0) { X509_free(cert); break; } if ((dane->certs == NULL && (dane->certs = sk_X509_new_null()) == NULL) || !sk_X509_push(dane->certs, cert)) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); X509_free(cert); tlsa_free(t); return -1; } break; case DANETLS_SELECTOR_SPKI: if (!d2i_PUBKEY(&pkey, &p, ilen) || p < data || dlen != (size_t)(p - data)) { EVP_PKEY_free(pkey); tlsa_free(t); ERR_raise(ERR_LIB_SSL, SSL_R_DANE_TLSA_BAD_PUBLIC_KEY); return 0; } if (usage == DANETLS_USAGE_DANE_TA) t->spki = pkey; else EVP_PKEY_free(pkey); break; } } num = sk_danetls_record_num(dane->trecs); for (i = 0; i < num; ++i) { danetls_record *rec = sk_danetls_record_value(dane->trecs, i); if (rec->usage > usage) continue; if (rec->usage < usage) break; if (rec->selector > selector) continue; if (rec->selector < selector) break; if (dane->dctx->mdord[rec->mtype] > dane->dctx->mdord[mtype]) continue; break; } if (!sk_danetls_record_insert(dane->trecs, t, i)) { tlsa_free(t); ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); return -1; } dane->umask |= DANETLS_USAGE_BIT(usage); return 1; } static int ssl_check_allowed_versions(int min_version, int max_version) { int minisdtls = 0, maxisdtls = 0; if (min_version == DTLS1_BAD_VER || min_version >> 8 == DTLS1_VERSION_MAJOR) minisdtls = 1; if (max_version == DTLS1_BAD_VER || max_version >> 8 == DTLS1_VERSION_MAJOR) maxisdtls = 1; if ((minisdtls && !maxisdtls && max_version != 0) || (maxisdtls && !minisdtls && min_version != 0)) { return 0; } if (minisdtls || maxisdtls) { if (min_version == 0) min_version = DTLS1_VERSION; if (max_version == 0) max_version = DTLS1_2_VERSION; #ifdef OPENSSL_NO_DTLS1_2 if (max_version == DTLS1_2_VERSION) max_version = DTLS1_VERSION; #endif #ifdef OPENSSL_NO_DTLS1 if (min_version == DTLS1_VERSION) min_version = DTLS1_2_VERSION; #endif if (0 #ifdef OPENSSL_NO_DTLS1 || (DTLS_VERSION_GE(min_version, DTLS1_VERSION) && DTLS_VERSION_GE(DTLS1_VERSION, max_version)) #endif #ifdef OPENSSL_NO_DTLS1_2 || (DTLS_VERSION_GE(min_version, DTLS1_2_VERSION) && DTLS_VERSION_GE(DTLS1_2_VERSION, max_version)) #endif ) return 0; } else { if (min_version == 0) min_version = SSL3_VERSION; if (max_version == 0) max_version = TLS1_3_VERSION; #ifdef OPENSSL_NO_TLS1_3 if (max_version == TLS1_3_VERSION) max_version = TLS1_2_VERSION; #endif #ifdef OPENSSL_NO_TLS1_2 if (max_version == TLS1_2_VERSION) max_version = TLS1_1_VERSION; #endif #ifdef OPENSSL_NO_TLS1_1 if (max_version == TLS1_1_VERSION) max_version = TLS1_VERSION; #endif #ifdef OPENSSL_NO_TLS1 if (max_version == TLS1_VERSION) max_version = SSL3_VERSION; #endif #ifdef OPENSSL_NO_SSL3 if (min_version == SSL3_VERSION) min_version = TLS1_VERSION; #endif #ifdef OPENSSL_NO_TLS1 if (min_version == TLS1_VERSION) min_version = TLS1_1_VERSION; #endif #ifdef OPENSSL_NO_TLS1_1 if (min_version == TLS1_1_VERSION) min_version = TLS1_2_VERSION; #endif #ifdef OPENSSL_NO_TLS1_2 if (min_version == TLS1_2_VERSION) min_version = TLS1_3_VERSION; #endif if (0 #ifdef OPENSSL_NO_SSL3 || (min_version <= SSL3_VERSION && SSL3_VERSION <= max_version) #endif #ifdef OPENSSL_NO_TLS1 || (min_version <= TLS1_VERSION && TLS1_VERSION <= max_version) #endif #ifdef OPENSSL_NO_TLS1_1 || (min_version <= TLS1_1_VERSION && TLS1_1_VERSION <= max_version) #endif #ifdef OPENSSL_NO_TLS1_2 || (min_version <= TLS1_2_VERSION && TLS1_2_VERSION <= max_version) #endif #ifdef OPENSSL_NO_TLS1_3 || (min_version <= TLS1_3_VERSION && TLS1_3_VERSION <= max_version) #endif ) return 0; } return 1; } #if defined(__TANDEM) && defined(OPENSSL_VPROC) # define OPENSSL_VPROC_STRING_(x) x##_SSL # define OPENSSL_VPROC_STRING(x) OPENSSL_VPROC_STRING_(x) # define OPENSSL_VPROC_FUNC OPENSSL_VPROC_STRING(OPENSSL_VPROC) void OPENSSL_VPROC_FUNC(void) {} #endif int SSL_clear(SSL *s) { if (s->method == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_METHOD_SPECIFIED); return 0; } return s->method->ssl_reset(s); } int ossl_ssl_connection_reset(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (ssl_clear_bad_session(sc)) { SSL_SESSION_free(sc->session); sc->session = NULL; } SSL_SESSION_free(sc->psksession); sc->psksession = NULL; OPENSSL_free(sc->psksession_id); sc->psksession_id = NULL; sc->psksession_id_len = 0; sc->hello_retry_request = SSL_HRR_NONE; sc->sent_tickets = 0; sc->error = 0; sc->hit = 0; sc->shutdown = 0; if (sc->renegotiate) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } ossl_statem_clear(sc); sc->version = s->method->version; sc->client_version = sc->version; sc->rwstate = SSL_NOTHING; BUF_MEM_free(sc->init_buf); sc->init_buf = NULL; sc->first_packet = 0; sc->key_update = SSL_KEY_UPDATE_NONE; memset(sc->ext.compress_certificate_from_peer, 0, sizeof(sc->ext.compress_certificate_from_peer)); sc->ext.compress_certificate_sent = 0; EVP_MD_CTX_free(sc->pha_dgst); sc->pha_dgst = NULL; sc->dane.mdpth = -1; sc->dane.pdpth = -1; X509_free(sc->dane.mcert); sc->dane.mcert = NULL; sc->dane.mtlsa = NULL; X509_VERIFY_PARAM_move_peername(sc->param, NULL); OPENSSL_free(sc->shared_sigalgs); sc->shared_sigalgs = NULL; sc->shared_sigalgslen = 0; if (s->method != s->defltmeth) { s->method->ssl_deinit(s); s->method = s->defltmeth; if (!s->method->ssl_init(s)) return 0; } else { if (!s->method->ssl_clear(s)) return 0; } if (!RECORD_LAYER_reset(&sc->rlayer)) return 0; return 1; } #ifndef OPENSSL_NO_DEPRECATED_3_0 int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth) { STACK_OF(SSL_CIPHER) *sk; if (IS_QUIC_CTX(ctx)) { ERR_raise(ERR_LIB_SSL, SSL_R_WRONG_SSL_VERSION); return 0; } ctx->method = meth; if (!SSL_CTX_set_ciphersuites(ctx, OSSL_default_ciphersuites())) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS); return 0; } sk = ssl_create_cipher_list(ctx, ctx->tls13_ciphersuites, &(ctx->cipher_list), &(ctx->cipher_list_by_id), OSSL_default_cipher_list(), ctx->cert); if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS); return 0; } return 1; } #endif SSL *SSL_new(SSL_CTX *ctx) { if (ctx == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NULL_SSL_CTX); return NULL; } if (ctx->method == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION); return NULL; } return ctx->method->ssl_new(ctx); } int ossl_ssl_init(SSL *ssl, SSL_CTX *ctx, const SSL_METHOD *method, int type) { ssl->type = type; ssl->lock = CRYPTO_THREAD_lock_new(); if (ssl->lock == NULL) return 0; if (!CRYPTO_NEW_REF(&ssl->references, 1)) { CRYPTO_THREAD_lock_free(ssl->lock); return 0; } if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL, ssl, &ssl->ex_data)) { CRYPTO_THREAD_lock_free(ssl->lock); CRYPTO_FREE_REF(&ssl->references); ssl->lock = NULL; return 0; } SSL_CTX_up_ref(ctx); ssl->ctx = ctx; ssl->defltmeth = ssl->method = method; return 1; } SSL *ossl_ssl_connection_new_int(SSL_CTX *ctx, const SSL_METHOD *method) { SSL_CONNECTION *s; SSL *ssl; s = OPENSSL_zalloc(sizeof(*s)); if (s == NULL) return NULL; ssl = &s->ssl; if (!ossl_ssl_init(ssl, ctx, method, SSL_TYPE_SSL_CONNECTION)) { OPENSSL_free(s); s = NULL; ssl = NULL; goto sslerr; } RECORD_LAYER_init(&s->rlayer, s); s->options = ctx->options; s->dane.flags = ctx->dane.flags; if (method->version == ctx->method->version) { s->min_proto_version = ctx->min_proto_version; s->max_proto_version = ctx->max_proto_version; } s->mode = ctx->mode; s->max_cert_list = ctx->max_cert_list; s->max_early_data = ctx->max_early_data; s->recv_max_early_data = ctx->recv_max_early_data; s->num_tickets = ctx->num_tickets; s->pha_enabled = ctx->pha_enabled; s->tls13_ciphersuites = sk_SSL_CIPHER_dup(ctx->tls13_ciphersuites); if (s->tls13_ciphersuites == NULL) goto cerr; s->cert = ssl_cert_dup(ctx->cert); if (s->cert == NULL) goto sslerr; RECORD_LAYER_set_read_ahead(&s->rlayer, ctx->read_ahead); s->msg_callback = ctx->msg_callback; s->msg_callback_arg = ctx->msg_callback_arg; s->verify_mode = ctx->verify_mode; s->not_resumable_session_cb = ctx->not_resumable_session_cb; s->rlayer.record_padding_cb = ctx->record_padding_cb; s->rlayer.record_padding_arg = ctx->record_padding_arg; s->rlayer.block_padding = ctx->block_padding; s->sid_ctx_length = ctx->sid_ctx_length; if (!ossl_assert(s->sid_ctx_length <= sizeof(s->sid_ctx))) goto err; memcpy(&s->sid_ctx, &ctx->sid_ctx, sizeof(s->sid_ctx)); s->verify_callback = ctx->default_verify_callback; s->generate_session_id = ctx->generate_session_id; s->param = X509_VERIFY_PARAM_new(); if (s->param == NULL) goto asn1err; X509_VERIFY_PARAM_inherit(s->param, ctx->param); s->quiet_shutdown = IS_QUIC_CTX(ctx) ? 0 : ctx->quiet_shutdown; if (!IS_QUIC_CTX(ctx)) s->ext.max_fragment_len_mode = ctx->ext.max_fragment_len_mode; s->max_send_fragment = ctx->max_send_fragment; s->split_send_fragment = ctx->split_send_fragment; s->max_pipelines = ctx->max_pipelines; s->rlayer.default_read_buf_len = ctx->default_read_buf_len; s->ext.debug_cb = 0; s->ext.debug_arg = NULL; s->ext.ticket_expected = 0; s->ext.status_type = ctx->ext.status_type; s->ext.status_expected = 0; s->ext.ocsp.ids = NULL; s->ext.ocsp.exts = NULL; s->ext.ocsp.resp = NULL; s->ext.ocsp.resp_len = 0; SSL_CTX_up_ref(ctx); s->session_ctx = ctx; if (ctx->ext.ecpointformats) { s->ext.ecpointformats = OPENSSL_memdup(ctx->ext.ecpointformats, ctx->ext.ecpointformats_len); if (!s->ext.ecpointformats) { s->ext.ecpointformats_len = 0; goto err; } s->ext.ecpointformats_len = ctx->ext.ecpointformats_len; } if (ctx->ext.supportedgroups) { s->ext.supportedgroups = OPENSSL_memdup(ctx->ext.supportedgroups, ctx->ext.supportedgroups_len * sizeof(*ctx->ext.supportedgroups)); if (!s->ext.supportedgroups) { s->ext.supportedgroups_len = 0; goto err; } s->ext.supportedgroups_len = ctx->ext.supportedgroups_len; } #ifndef OPENSSL_NO_NEXTPROTONEG s->ext.npn = NULL; #endif if (ctx->ext.alpn != NULL) { s->ext.alpn = OPENSSL_malloc(ctx->ext.alpn_len); if (s->ext.alpn == NULL) { s->ext.alpn_len = 0; goto err; } memcpy(s->ext.alpn, ctx->ext.alpn, ctx->ext.alpn_len); s->ext.alpn_len = ctx->ext.alpn_len; } s->verified_chain = NULL; s->verify_result = X509_V_OK; s->default_passwd_callback = ctx->default_passwd_callback; s->default_passwd_callback_userdata = ctx->default_passwd_callback_userdata; s->key_update = SSL_KEY_UPDATE_NONE; if (!IS_QUIC_CTX(ctx)) { s->allow_early_data_cb = ctx->allow_early_data_cb; s->allow_early_data_cb_data = ctx->allow_early_data_cb_data; } if (!method->ssl_init(ssl)) goto sslerr; s->server = (method->ssl_accept == ssl_undefined_function) ? 0 : 1; if (!method->ssl_reset(ssl)) goto sslerr; #ifndef OPENSSL_NO_PSK s->psk_client_callback = ctx->psk_client_callback; s->psk_server_callback = ctx->psk_server_callback; #endif s->psk_find_session_cb = ctx->psk_find_session_cb; s->psk_use_session_cb = ctx->psk_use_session_cb; s->async_cb = ctx->async_cb; s->async_cb_arg = ctx->async_cb_arg; s->job = NULL; #ifndef OPENSSL_NO_COMP_ALG memcpy(s->cert_comp_prefs, ctx->cert_comp_prefs, sizeof(s->cert_comp_prefs)); #endif if (ctx->client_cert_type != NULL) { s->client_cert_type = OPENSSL_memdup(ctx->client_cert_type, ctx->client_cert_type_len); if (s->client_cert_type == NULL) goto sslerr; s->client_cert_type_len = ctx->client_cert_type_len; } if (ctx->server_cert_type != NULL) { s->server_cert_type = OPENSSL_memdup(ctx->server_cert_type, ctx->server_cert_type_len); if (s->server_cert_type == NULL) goto sslerr; s->server_cert_type_len = ctx->server_cert_type_len; } #ifndef OPENSSL_NO_CT if (!SSL_set_ct_validation_callback(ssl, ctx->ct_validation_callback, ctx->ct_validation_callback_arg)) goto sslerr; #endif s->ssl_pkey_num = SSL_PKEY_NUM + ctx->sigalg_list_len; return ssl; cerr: ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; asn1err: ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); goto err; sslerr: ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); err: SSL_free(ssl); return NULL; } SSL *ossl_ssl_connection_new(SSL_CTX *ctx) { return ossl_ssl_connection_new_int(ctx, ctx->method); } int SSL_is_dtls(const SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (s->type == SSL_TYPE_QUIC_CONNECTION || s->type == SSL_TYPE_QUIC_XSO) return 0; #endif if (sc == NULL) return 0; return SSL_CONNECTION_IS_DTLS(sc) ? 1 : 0; } int SSL_is_tls(const SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (s->type == SSL_TYPE_QUIC_CONNECTION || s->type == SSL_TYPE_QUIC_XSO) return 0; #endif if (sc == NULL) return 0; return SSL_CONNECTION_IS_DTLS(sc) ? 0 : 1; } int SSL_is_quic(const SSL *s) { #ifndef OPENSSL_NO_QUIC if (s->type == SSL_TYPE_QUIC_CONNECTION || s->type == SSL_TYPE_QUIC_XSO) return 1; #endif return 0; } int SSL_up_ref(SSL *s) { int i; if (CRYPTO_UP_REF(&s->references, &i) <= 0) return 0; REF_PRINT_COUNT("SSL", s); REF_ASSERT_ISNT(i < 2); return ((i > 1) ? 1 : 0); } int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, unsigned int sid_ctx_len) { if (sid_ctx_len > SSL_MAX_SID_CTX_LENGTH) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG); return 0; } ctx->sid_ctx_length = sid_ctx_len; memcpy(ctx->sid_ctx, sid_ctx, sid_ctx_len); return 1; } int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, unsigned int sid_ctx_len) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; if (sid_ctx_len > SSL_MAX_SID_CTX_LENGTH) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG); return 0; } sc->sid_ctx_length = sid_ctx_len; memcpy(sc->sid_ctx, sid_ctx, sid_ctx_len); return 1; } int SSL_CTX_set_generate_session_id(SSL_CTX *ctx, GEN_SESSION_CB cb) { if (!CRYPTO_THREAD_write_lock(ctx->lock)) return 0; ctx->generate_session_id = cb; CRYPTO_THREAD_unlock(ctx->lock); return 1; } int SSL_set_generate_session_id(SSL *ssl, GEN_SESSION_CB cb) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL || !CRYPTO_THREAD_write_lock(ssl->lock)) return 0; sc->generate_session_id = cb; CRYPTO_THREAD_unlock(ssl->lock); return 1; } int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, unsigned int id_len) { SSL_SESSION r, *p; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL || id_len > sizeof(r.session_id)) return 0; r.ssl_version = sc->version; r.session_id_length = id_len; memcpy(r.session_id, id, id_len); if (!CRYPTO_THREAD_read_lock(sc->session_ctx->lock)) return 0; p = lh_SSL_SESSION_retrieve(sc->session_ctx->sessions, &r); CRYPTO_THREAD_unlock(sc->session_ctx->lock); return (p != NULL); } int SSL_CTX_set_purpose(SSL_CTX *s, int purpose) { return X509_VERIFY_PARAM_set_purpose(s->param, purpose); } int SSL_set_purpose(SSL *s, int purpose) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return X509_VERIFY_PARAM_set_purpose(sc->param, purpose); } int SSL_CTX_set_trust(SSL_CTX *s, int trust) { return X509_VERIFY_PARAM_set_trust(s->param, trust); } int SSL_set_trust(SSL *s, int trust) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return X509_VERIFY_PARAM_set_trust(sc->param, trust); } int SSL_set1_host(SSL *s, const char *hostname) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (hostname != NULL && X509_VERIFY_PARAM_set1_ip_asc(sc->param, hostname) == 1) return 1; return X509_VERIFY_PARAM_set1_host(sc->param, hostname, 0); } int SSL_add1_host(SSL *s, const char *hostname) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (hostname) { ASN1_OCTET_STRING *ip; char *old_ip; ip = a2i_IPADDRESS(hostname); if (ip) { ASN1_OCTET_STRING_free(ip); old_ip = X509_VERIFY_PARAM_get1_ip_asc(sc->param); if (old_ip) { OPENSSL_free(old_ip); return 0; } return X509_VERIFY_PARAM_set1_ip_asc(sc->param, hostname); } } return X509_VERIFY_PARAM_add1_host(sc->param, hostname, 0); } void SSL_set_hostflags(SSL *s, unsigned int flags) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; X509_VERIFY_PARAM_set_hostflags(sc->param, flags); } const char *SSL_get0_peername(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; return X509_VERIFY_PARAM_get0_peername(sc->param); } int SSL_CTX_dane_enable(SSL_CTX *ctx) { return dane_ctx_enable(&ctx->dane); } unsigned long SSL_CTX_dane_set_flags(SSL_CTX *ctx, unsigned long flags) { unsigned long orig = ctx->dane.flags; ctx->dane.flags |= flags; return orig; } unsigned long SSL_CTX_dane_clear_flags(SSL_CTX *ctx, unsigned long flags) { unsigned long orig = ctx->dane.flags; ctx->dane.flags &= ~flags; return orig; } int SSL_dane_enable(SSL *s, const char *basedomain) { SSL_DANE *dane; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; dane = &sc->dane; if (s->ctx->dane.mdmax == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_CONTEXT_NOT_DANE_ENABLED); return 0; } if (dane->trecs != NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_DANE_ALREADY_ENABLED); return 0; } if (sc->ext.hostname == NULL) { if (!SSL_set_tlsext_host_name(s, basedomain)) { ERR_raise(ERR_LIB_SSL, SSL_R_ERROR_SETTING_TLSA_BASE_DOMAIN); return -1; } } if (!X509_VERIFY_PARAM_set1_host(sc->param, basedomain, 0)) { ERR_raise(ERR_LIB_SSL, SSL_R_ERROR_SETTING_TLSA_BASE_DOMAIN); return -1; } dane->mdpth = -1; dane->pdpth = -1; dane->dctx = &s->ctx->dane; dane->trecs = sk_danetls_record_new_null(); if (dane->trecs == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); return -1; } return 1; } unsigned long SSL_dane_set_flags(SSL *ssl, unsigned long flags) { unsigned long orig; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; orig = sc->dane.flags; sc->dane.flags |= flags; return orig; } unsigned long SSL_dane_clear_flags(SSL *ssl, unsigned long flags) { unsigned long orig; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; orig = sc->dane.flags; sc->dane.flags &= ~flags; return orig; } int SSL_get0_dane_authority(SSL *s, X509 **mcert, EVP_PKEY **mspki) { SSL_DANE *dane; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; dane = &sc->dane; if (!DANETLS_ENABLED(dane) || sc->verify_result != X509_V_OK) return -1; if (dane->mtlsa) { if (mcert) *mcert = dane->mcert; if (mspki) *mspki = (dane->mcert == NULL) ? dane->mtlsa->spki : NULL; } return dane->mdpth; } int SSL_get0_dane_tlsa(SSL *s, uint8_t *usage, uint8_t *selector, uint8_t *mtype, const unsigned char **data, size_t *dlen) { SSL_DANE *dane; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; dane = &sc->dane; if (!DANETLS_ENABLED(dane) || sc->verify_result != X509_V_OK) return -1; if (dane->mtlsa) { if (usage) *usage = dane->mtlsa->usage; if (selector) *selector = dane->mtlsa->selector; if (mtype) *mtype = dane->mtlsa->mtype; if (data) *data = dane->mtlsa->data; if (dlen) *dlen = dane->mtlsa->dlen; } return dane->mdpth; } SSL_DANE *SSL_get0_dane(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; return &sc->dane; } int SSL_dane_tlsa_add(SSL *s, uint8_t usage, uint8_t selector, uint8_t mtype, const unsigned char *data, size_t dlen) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return dane_tlsa_add(&sc->dane, usage, selector, mtype, data, dlen); } int SSL_CTX_dane_mtype_set(SSL_CTX *ctx, const EVP_MD *md, uint8_t mtype, uint8_t ord) { return dane_mtype_set(&ctx->dane, md, mtype, ord); } int SSL_CTX_set1_param(SSL_CTX *ctx, X509_VERIFY_PARAM *vpm) { return X509_VERIFY_PARAM_set1(ctx->param, vpm); } int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; return X509_VERIFY_PARAM_set1(sc->param, vpm); } X509_VERIFY_PARAM *SSL_CTX_get0_param(SSL_CTX *ctx) { return ctx->param; } X509_VERIFY_PARAM *SSL_get0_param(SSL *ssl) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return NULL; return sc->param; } void SSL_certs_clear(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; ssl_cert_clear_certs(sc->cert); } void SSL_free(SSL *s) { int i; if (s == NULL) return; CRYPTO_DOWN_REF(&s->references, &i); REF_PRINT_COUNT("SSL", s); if (i > 0) return; REF_ASSERT_ISNT(i < 0); CRYPTO_free_ex_data(CRYPTO_EX_INDEX_SSL, s, &s->ex_data); if (s->method != NULL) s->method->ssl_free(s); SSL_CTX_free(s->ctx); CRYPTO_THREAD_lock_free(s->lock); CRYPTO_FREE_REF(&s->references); OPENSSL_free(s); } void ossl_ssl_connection_free(SSL *ssl) { SSL_CONNECTION *s; s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return; X509_VERIFY_PARAM_free(s->param); dane_final(&s->dane); ssl_free_wbio_buffer(s); RECORD_LAYER_clear(&s->rlayer); BUF_MEM_free(s->init_buf); sk_SSL_CIPHER_free(s->cipher_list); sk_SSL_CIPHER_free(s->cipher_list_by_id); sk_SSL_CIPHER_free(s->tls13_ciphersuites); sk_SSL_CIPHER_free(s->peer_ciphers); if (s->session != NULL) { ssl_clear_bad_session(s); SSL_SESSION_free(s->session); } SSL_SESSION_free(s->psksession); OPENSSL_free(s->psksession_id); ssl_cert_free(s->cert); OPENSSL_free(s->shared_sigalgs); OPENSSL_free(s->ext.hostname); SSL_CTX_free(s->session_ctx); OPENSSL_free(s->ext.ecpointformats); OPENSSL_free(s->ext.peer_ecpointformats); OPENSSL_free(s->ext.supportedgroups); OPENSSL_free(s->ext.peer_supportedgroups); sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, X509_EXTENSION_free); #ifndef OPENSSL_NO_OCSP sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); #endif #ifndef OPENSSL_NO_CT SCT_LIST_free(s->scts); OPENSSL_free(s->ext.scts); #endif OPENSSL_free(s->ext.ocsp.resp); OPENSSL_free(s->ext.alpn); OPENSSL_free(s->ext.tls13_cookie); if (s->clienthello != NULL) OPENSSL_free(s->clienthello->pre_proc_exts); OPENSSL_free(s->clienthello); OPENSSL_free(s->pha_context); EVP_MD_CTX_free(s->pha_dgst); sk_X509_NAME_pop_free(s->ca_names, X509_NAME_free); sk_X509_NAME_pop_free(s->client_ca_names, X509_NAME_free); OPENSSL_free(s->client_cert_type); OPENSSL_free(s->server_cert_type); OSSL_STACK_OF_X509_free(s->verified_chain); if (ssl->method != NULL) ssl->method->ssl_deinit(ssl); ASYNC_WAIT_CTX_free(s->waitctx); #if !defined(OPENSSL_NO_NEXTPROTONEG) OPENSSL_free(s->ext.npn); #endif #ifndef OPENSSL_NO_SRTP sk_SRTP_PROTECTION_PROFILE_free(s->srtp_profiles); #endif BIO_free_all(s->wbio); s->wbio = NULL; BIO_free_all(s->rbio); s->rbio = NULL; OPENSSL_free(s->s3.tmp.valid_flags); } void SSL_set0_rbio(SSL *s, BIO *rbio) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) { ossl_quic_conn_set0_net_rbio(s, rbio); return; } #endif if (sc == NULL) return; BIO_free_all(sc->rbio); sc->rbio = rbio; sc->rlayer.rrlmethod->set1_bio(sc->rlayer.rrl, sc->rbio); } void SSL_set0_wbio(SSL *s, BIO *wbio) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) { ossl_quic_conn_set0_net_wbio(s, wbio); return; } #endif if (sc == NULL) return; if (sc->bbio != NULL) sc->wbio = BIO_pop(sc->wbio); BIO_free_all(sc->wbio); sc->wbio = wbio; if (sc->bbio != NULL) sc->wbio = BIO_push(sc->bbio, sc->wbio); sc->rlayer.wrlmethod->set1_bio(sc->rlayer.wrl, sc->wbio); } void SSL_set_bio(SSL *s, BIO *rbio, BIO *wbio) { if (rbio == SSL_get_rbio(s) && wbio == SSL_get_wbio(s)) return; if (rbio != NULL && rbio == wbio) BIO_up_ref(rbio); if (rbio == SSL_get_rbio(s)) { SSL_set0_wbio(s, wbio); return; } if (wbio == SSL_get_wbio(s) && SSL_get_rbio(s) != SSL_get_wbio(s)) { SSL_set0_rbio(s, rbio); return; } SSL_set0_rbio(s, rbio); SSL_set0_wbio(s, wbio); } BIO *SSL_get_rbio(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_conn_get_net_rbio(s); #endif if (sc == NULL) return NULL; return sc->rbio; } BIO *SSL_get_wbio(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_conn_get_net_wbio(s); #endif if (sc == NULL) return NULL; if (sc->bbio != NULL) { return BIO_next(sc->bbio); } return sc->wbio; } int SSL_get_fd(const SSL *s) { return SSL_get_rfd(s); } int SSL_get_rfd(const SSL *s) { int ret = -1; BIO *b, *r; b = SSL_get_rbio(s); r = BIO_find_type(b, BIO_TYPE_DESCRIPTOR); if (r != NULL) BIO_get_fd(r, &ret); return ret; } int SSL_get_wfd(const SSL *s) { int ret = -1; BIO *b, *r; b = SSL_get_wbio(s); r = BIO_find_type(b, BIO_TYPE_DESCRIPTOR); if (r != NULL) BIO_get_fd(r, &ret); return ret; } #ifndef OPENSSL_NO_SOCK static const BIO_METHOD *fd_method(SSL *s) { #ifndef OPENSSL_NO_DGRAM if (IS_QUIC(s)) return BIO_s_datagram(); #endif return BIO_s_socket(); } int SSL_set_fd(SSL *s, int fd) { int ret = 0; BIO *bio = NULL; if (s->type == SSL_TYPE_QUIC_XSO) { ERR_raise(ERR_LIB_SSL, SSL_R_CONN_USE_ONLY); goto err; } bio = BIO_new(fd_method(s)); if (bio == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto err; } BIO_set_fd(bio, fd, BIO_NOCLOSE); SSL_set_bio(s, bio, bio); #ifndef OPENSSL_NO_KTLS ktls_enable(fd); #endif ret = 1; err: return ret; } int SSL_set_wfd(SSL *s, int fd) { BIO *rbio = SSL_get_rbio(s); int desired_type = IS_QUIC(s) ? BIO_TYPE_DGRAM : BIO_TYPE_SOCKET; if (s->type == SSL_TYPE_QUIC_XSO) { ERR_raise(ERR_LIB_SSL, SSL_R_CONN_USE_ONLY); return 0; } if (rbio == NULL || BIO_method_type(rbio) != desired_type || (int)BIO_get_fd(rbio, NULL) != fd) { BIO *bio = BIO_new(fd_method(s)); if (bio == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); return 0; } BIO_set_fd(bio, fd, BIO_NOCLOSE); SSL_set0_wbio(s, bio); #ifndef OPENSSL_NO_KTLS ktls_enable(fd); #endif } else { BIO_up_ref(rbio); SSL_set0_wbio(s, rbio); } return 1; } int SSL_set_rfd(SSL *s, int fd) { BIO *wbio = SSL_get_wbio(s); int desired_type = IS_QUIC(s) ? BIO_TYPE_DGRAM : BIO_TYPE_SOCKET; if (s->type == SSL_TYPE_QUIC_XSO) { ERR_raise(ERR_LIB_SSL, SSL_R_CONN_USE_ONLY); return 0; } if (wbio == NULL || BIO_method_type(wbio) != desired_type || ((int)BIO_get_fd(wbio, NULL) != fd)) { BIO *bio = BIO_new(fd_method(s)); if (bio == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); return 0; } BIO_set_fd(bio, fd, BIO_NOCLOSE); SSL_set0_rbio(s, bio); } else { BIO_up_ref(wbio); SSL_set0_rbio(s, wbio); } return 1; } #endif size_t SSL_get_finished(const SSL *s, void *buf, size_t count) { size_t ret = 0; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; ret = sc->s3.tmp.finish_md_len; if (count > ret) count = ret; memcpy(buf, sc->s3.tmp.finish_md, count); return ret; } size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count) { size_t ret = 0; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; ret = sc->s3.tmp.peer_finish_md_len; if (count > ret) count = ret; memcpy(buf, sc->s3.tmp.peer_finish_md, count); return ret; } int SSL_get_verify_mode(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->verify_mode; } int SSL_get_verify_depth(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return X509_VERIFY_PARAM_get_depth(sc->param); } int (*SSL_get_verify_callback(const SSL *s)) (int, X509_STORE_CTX *) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; return sc->verify_callback; } int SSL_CTX_get_verify_mode(const SSL_CTX *ctx) { return ctx->verify_mode; } int SSL_CTX_get_verify_depth(const SSL_CTX *ctx) { return X509_VERIFY_PARAM_get_depth(ctx->param); } int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx)) (int, X509_STORE_CTX *) { return ctx->default_verify_callback; } void SSL_set_verify(SSL *s, int mode, int (*callback) (int ok, X509_STORE_CTX *ctx)) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->verify_mode = mode; if (callback != NULL) sc->verify_callback = callback; } void SSL_set_verify_depth(SSL *s, int depth) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; X509_VERIFY_PARAM_set_depth(sc->param, depth); } void SSL_set_read_ahead(SSL *s, int yes) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); OSSL_PARAM options[2], *opts = options; if (sc == NULL) return; RECORD_LAYER_set_read_ahead(&sc->rlayer, yes); *opts++ = OSSL_PARAM_construct_int(OSSL_LIBSSL_RECORD_LAYER_PARAM_READ_AHEAD, &sc->rlayer.read_ahead); *opts = OSSL_PARAM_construct_end(); sc->rlayer.rrlmethod->set_options(sc->rlayer.rrl, options); } int SSL_get_read_ahead(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL_ONLY(s); if (sc == NULL) return 0; return RECORD_LAYER_get_read_ahead(&sc->rlayer); } int SSL_pending(const SSL *s) { size_t pending = s->method->ssl_pending(s); return pending < INT_MAX ? (int)pending : INT_MAX; } int SSL_has_pending(const SSL *s) { const SSL_CONNECTION *sc; #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_has_pending(s); #endif sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (SSL_CONNECTION_IS_DTLS(sc)) { TLS_RECORD *rdata; pitem *item, *iter; iter = pqueue_iterator(sc->rlayer.d->buffered_app_data); while ((item = pqueue_next(&iter)) != NULL) { rdata = item->data; if (rdata->length > 0) return 1; } } if (RECORD_LAYER_processed_read_pending(&sc->rlayer)) return 1; return RECORD_LAYER_read_pending(&sc->rlayer); } X509 *SSL_get1_peer_certificate(const SSL *s) { X509 *r = SSL_get0_peer_certificate(s); if (r != NULL) X509_up_ref(r); return r; } X509 *SSL_get0_peer_certificate(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; if (sc->session == NULL) return NULL; else return sc->session->peer; } STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s) { STACK_OF(X509) *r; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; if (sc->session == NULL) r = NULL; else r = sc->session->peer_chain; return r; } int SSL_copy_session_id(SSL *t, const SSL *f) { int i; SSL_CONNECTION *tsc = SSL_CONNECTION_FROM_SSL_ONLY(t); const SSL_CONNECTION *fsc = SSL_CONNECTION_FROM_CONST_SSL_ONLY(f); if (tsc == NULL || fsc == NULL) return 0; if (!SSL_set_session(t, SSL_get_session(f))) { return 0; } if (t->method != f->method) { t->method->ssl_deinit(t); t->method = f->method; if (t->method->ssl_init(t) == 0) return 0; } CRYPTO_UP_REF(&fsc->cert->references, &i); ssl_cert_free(tsc->cert); tsc->cert = fsc->cert; if (!SSL_set_session_id_context(t, fsc->sid_ctx, (int)fsc->sid_ctx_length)) { return 0; } return 1; } int SSL_CTX_check_private_key(const SSL_CTX *ctx) { if ((ctx == NULL) || (ctx->cert->key->x509 == NULL)) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_CERTIFICATE_ASSIGNED); return 0; } if (ctx->cert->key->privatekey == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_PRIVATE_KEY_ASSIGNED); return 0; } return X509_check_private_key (ctx->cert->key->x509, ctx->cert->key->privatekey); } int SSL_check_private_key(const SSL *ssl) { const SSL_CONNECTION *sc; if ((sc = SSL_CONNECTION_FROM_CONST_SSL(ssl)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } if (sc->cert->key->x509 == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_CERTIFICATE_ASSIGNED); return 0; } if (sc->cert->key->privatekey == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_PRIVATE_KEY_ASSIGNED); return 0; } return X509_check_private_key(sc->cert->key->x509, sc->cert->key->privatekey); } int SSL_waiting_for_async(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->job) return 1; return 0; } int SSL_get_all_async_fds(SSL *s, OSSL_ASYNC_FD *fds, size_t *numfds) { ASYNC_WAIT_CTX *ctx; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if ((ctx = sc->waitctx) == NULL) return 0; return ASYNC_WAIT_CTX_get_all_fds(ctx, fds, numfds); } int SSL_get_changed_async_fds(SSL *s, OSSL_ASYNC_FD *addfd, size_t *numaddfds, OSSL_ASYNC_FD *delfd, size_t *numdelfds) { ASYNC_WAIT_CTX *ctx; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if ((ctx = sc->waitctx) == NULL) return 0; return ASYNC_WAIT_CTX_get_changed_fds(ctx, addfd, numaddfds, delfd, numdelfds); } int SSL_CTX_set_async_callback(SSL_CTX *ctx, SSL_async_callback_fn callback) { ctx->async_cb = callback; return 1; } int SSL_CTX_set_async_callback_arg(SSL_CTX *ctx, void *arg) { ctx->async_cb_arg = arg; return 1; } int SSL_set_async_callback(SSL *s, SSL_async_callback_fn callback) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sc->async_cb = callback; return 1; } int SSL_set_async_callback_arg(SSL *s, void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sc->async_cb_arg = arg; return 1; } int SSL_get_async_status(SSL *s, int *status) { ASYNC_WAIT_CTX *ctx; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if ((ctx = sc->waitctx) == NULL) return 0; *status = ASYNC_WAIT_CTX_get_status(ctx); return 1; } int SSL_accept(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return s->method->ssl_accept(s); #endif if (sc == NULL) return 0; if (sc->handshake_func == NULL) { SSL_set_accept_state(s); } return SSL_do_handshake(s); } int SSL_connect(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return s->method->ssl_connect(s); #endif if (sc == NULL) return 0; if (sc->handshake_func == NULL) { SSL_set_connect_state(s); } return SSL_do_handshake(s); } long SSL_get_default_timeout(const SSL *s) { return (long int)ossl_time2seconds(s->method->get_timeout()); } static int ssl_async_wait_ctx_cb(void *arg) { SSL *s = (SSL *)arg; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return sc->async_cb(s, sc->async_cb_arg); } static int ssl_start_async_job(SSL *s, struct ssl_async_args *args, int (*func) (void *)) { int ret; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->waitctx == NULL) { sc->waitctx = ASYNC_WAIT_CTX_new(); if (sc->waitctx == NULL) return -1; if (sc->async_cb != NULL && !ASYNC_WAIT_CTX_set_callback (sc->waitctx, ssl_async_wait_ctx_cb, s)) return -1; } sc->rwstate = SSL_NOTHING; switch (ASYNC_start_job(&sc->job, sc->waitctx, &ret, func, args, sizeof(struct ssl_async_args))) { case ASYNC_ERR: sc->rwstate = SSL_NOTHING; ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_INIT_ASYNC); return -1; case ASYNC_PAUSE: sc->rwstate = SSL_ASYNC_PAUSED; return -1; case ASYNC_NO_JOBS: sc->rwstate = SSL_ASYNC_NO_JOBS; return -1; case ASYNC_FINISH: sc->job = NULL; return ret; default: sc->rwstate = SSL_NOTHING; ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return -1; } } static int ssl_io_intern(void *vargs) { struct ssl_async_args *args; SSL *s; void *buf; size_t num; SSL_CONNECTION *sc; args = (struct ssl_async_args *)vargs; s = args->s; buf = args->buf; num = args->num; if ((sc = SSL_CONNECTION_FROM_SSL(s)) == NULL) return -1; switch (args->type) { case READFUNC: return args->f.func_read(s, buf, num, &sc->asyncrw); case WRITEFUNC: return args->f.func_write(s, buf, num, &sc->asyncrw); case OTHERFUNC: return args->f.func_other(s); } return -1; } int ssl_read_internal(SSL *s, void *buf, size_t num, size_t *readbytes) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return s->method->ssl_read(s, buf, num, readbytes); #endif if (sc == NULL) return -1; if (sc->handshake_func == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNINITIALIZED); return -1; } if (sc->shutdown & SSL_RECEIVED_SHUTDOWN) { sc->rwstate = SSL_NOTHING; return 0; } if (sc->early_data_state == SSL_EARLY_DATA_CONNECT_RETRY || sc->early_data_state == SSL_EARLY_DATA_ACCEPT_RETRY) { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } ossl_statem_check_finish_init(sc, 0); if ((sc->mode & SSL_MODE_ASYNC) && ASYNC_get_current_job() == NULL) { struct ssl_async_args args; int ret; args.s = s; args.buf = buf; args.num = num; args.type = READFUNC; args.f.func_read = s->method->ssl_read; ret = ssl_start_async_job(s, &args, ssl_io_intern); *readbytes = sc->asyncrw; return ret; } else { return s->method->ssl_read(s, buf, num, readbytes); } } int SSL_read(SSL *s, void *buf, int num) { int ret; size_t readbytes; if (num < 0) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_LENGTH); return -1; } ret = ssl_read_internal(s, buf, (size_t)num, &readbytes); if (ret > 0) ret = (int)readbytes; return ret; } int SSL_read_ex(SSL *s, void *buf, size_t num, size_t *readbytes) { int ret = ssl_read_internal(s, buf, num, readbytes); if (ret < 0) ret = 0; return ret; } int SSL_read_early_data(SSL *s, void *buf, size_t num, size_t *readbytes) { int ret; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL || !sc->server) { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return SSL_READ_EARLY_DATA_ERROR; } switch (sc->early_data_state) { case SSL_EARLY_DATA_NONE: if (!SSL_in_before(s)) { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return SSL_READ_EARLY_DATA_ERROR; } case SSL_EARLY_DATA_ACCEPT_RETRY: sc->early_data_state = SSL_EARLY_DATA_ACCEPTING; ret = SSL_accept(s); if (ret <= 0) { sc->early_data_state = SSL_EARLY_DATA_ACCEPT_RETRY; return SSL_READ_EARLY_DATA_ERROR; } case SSL_EARLY_DATA_READ_RETRY: if (sc->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { sc->early_data_state = SSL_EARLY_DATA_READING; ret = SSL_read_ex(s, buf, num, readbytes); if (ret > 0 || (ret <= 0 && sc->early_data_state != SSL_EARLY_DATA_FINISHED_READING)) { sc->early_data_state = SSL_EARLY_DATA_READ_RETRY; return ret > 0 ? SSL_READ_EARLY_DATA_SUCCESS : SSL_READ_EARLY_DATA_ERROR; } } else { sc->early_data_state = SSL_EARLY_DATA_FINISHED_READING; } *readbytes = 0; return SSL_READ_EARLY_DATA_FINISH; default: ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return SSL_READ_EARLY_DATA_ERROR; } } int SSL_get_early_data_status(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL_ONLY(s); if (sc == NULL) return 0; return sc->ext.early_data; } static int ssl_peek_internal(SSL *s, void *buf, size_t num, size_t *readbytes) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return s->method->ssl_peek(s, buf, num, readbytes); #endif if (sc == NULL) return 0; if (sc->handshake_func == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNINITIALIZED); return -1; } if (sc->shutdown & SSL_RECEIVED_SHUTDOWN) { return 0; } if ((sc->mode & SSL_MODE_ASYNC) && ASYNC_get_current_job() == NULL) { struct ssl_async_args args; int ret; args.s = s; args.buf = buf; args.num = num; args.type = READFUNC; args.f.func_read = s->method->ssl_peek; ret = ssl_start_async_job(s, &args, ssl_io_intern); *readbytes = sc->asyncrw; return ret; } else { return s->method->ssl_peek(s, buf, num, readbytes); } } int SSL_peek(SSL *s, void *buf, int num) { int ret; size_t readbytes; if (num < 0) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_LENGTH); return -1; } ret = ssl_peek_internal(s, buf, (size_t)num, &readbytes); if (ret > 0) ret = (int)readbytes; return ret; } int SSL_peek_ex(SSL *s, void *buf, size_t num, size_t *readbytes) { int ret = ssl_peek_internal(s, buf, num, readbytes); if (ret < 0) ret = 0; return ret; } int ssl_write_internal(SSL *s, const void *buf, size_t num, uint64_t flags, size_t *written) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_write_flags(s, buf, num, flags, written); #endif if (sc == NULL) return 0; if (sc->handshake_func == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNINITIALIZED); return -1; } if (sc->shutdown & SSL_SENT_SHUTDOWN) { sc->rwstate = SSL_NOTHING; ERR_raise(ERR_LIB_SSL, SSL_R_PROTOCOL_IS_SHUTDOWN); return -1; } if (flags != 0) { ERR_raise(ERR_LIB_SSL, SSL_R_UNSUPPORTED_WRITE_FLAG); return -1; } if (sc->early_data_state == SSL_EARLY_DATA_CONNECT_RETRY || sc->early_data_state == SSL_EARLY_DATA_ACCEPT_RETRY || sc->early_data_state == SSL_EARLY_DATA_READ_RETRY) { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } ossl_statem_check_finish_init(sc, 1); if ((sc->mode & SSL_MODE_ASYNC) && ASYNC_get_current_job() == NULL) { int ret; struct ssl_async_args args; args.s = s; args.buf = (void *)buf; args.num = num; args.type = WRITEFUNC; args.f.func_write = s->method->ssl_write; ret = ssl_start_async_job(s, &args, ssl_io_intern); *written = sc->asyncrw; return ret; } else { return s->method->ssl_write(s, buf, num, written); } } ossl_ssize_t SSL_sendfile(SSL *s, int fd, off_t offset, size_t size, int flags) { ossl_ssize_t ret; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; if (sc->handshake_func == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNINITIALIZED); return -1; } if (sc->shutdown & SSL_SENT_SHUTDOWN) { sc->rwstate = SSL_NOTHING; ERR_raise(ERR_LIB_SSL, SSL_R_PROTOCOL_IS_SHUTDOWN); return -1; } if (!BIO_get_ktls_send(sc->wbio)) { ERR_raise(ERR_LIB_SSL, SSL_R_UNINITIALIZED); return -1; } if (sc->s3.alert_dispatch > 0) { ret = (ossl_ssize_t)s->method->ssl_dispatch_alert(s); if (ret <= 0) { return ret; } } sc->rwstate = SSL_WRITING; if (BIO_flush(sc->wbio) <= 0) { if (!BIO_should_retry(sc->wbio)) { sc->rwstate = SSL_NOTHING; } else { #ifdef EAGAIN set_sys_error(EAGAIN); #endif } return -1; } #ifdef OPENSSL_NO_KTLS ERR_raise_data(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR, "can't call ktls_sendfile(), ktls disabled"); return -1; #else ret = ktls_sendfile(SSL_get_wfd(s), fd, offset, size, flags); if (ret < 0) { #if defined(EAGAIN) && defined(EINTR) && defined(EBUSY) if ((get_last_sys_error() == EAGAIN) || (get_last_sys_error() == EINTR) || (get_last_sys_error() == EBUSY)) BIO_set_retry_write(sc->wbio); else #endif ERR_raise(ERR_LIB_SSL, SSL_R_UNINITIALIZED); return ret; } sc->rwstate = SSL_NOTHING; return ret; #endif } int SSL_write(SSL *s, const void *buf, int num) { int ret; size_t written; if (num < 0) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_LENGTH); return -1; } ret = ssl_write_internal(s, buf, (size_t)num, 0, &written); if (ret > 0) ret = (int)written; return ret; } int SSL_write_ex(SSL *s, const void *buf, size_t num, size_t *written) { return SSL_write_ex2(s, buf, num, 0, written); } int SSL_write_ex2(SSL *s, const void *buf, size_t num, uint64_t flags, size_t *written) { int ret = ssl_write_internal(s, buf, num, flags, written); if (ret < 0) ret = 0; return ret; } int SSL_write_early_data(SSL *s, const void *buf, size_t num, size_t *written) { int ret, early_data_state; size_t writtmp; uint32_t partialwrite; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; switch (sc->early_data_state) { case SSL_EARLY_DATA_NONE: if (sc->server || !SSL_in_before(s) || ((sc->session == NULL || sc->session->ext.max_early_data == 0) && (sc->psk_use_session_cb == NULL))) { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } case SSL_EARLY_DATA_CONNECT_RETRY: sc->early_data_state = SSL_EARLY_DATA_CONNECTING; ret = SSL_connect(s); if (ret <= 0) { sc->early_data_state = SSL_EARLY_DATA_CONNECT_RETRY; return 0; } case SSL_EARLY_DATA_WRITE_RETRY: sc->early_data_state = SSL_EARLY_DATA_WRITING; partialwrite = sc->mode & SSL_MODE_ENABLE_PARTIAL_WRITE; sc->mode &= ~SSL_MODE_ENABLE_PARTIAL_WRITE; ret = SSL_write_ex(s, buf, num, &writtmp); sc->mode |= partialwrite; if (!ret) { sc->early_data_state = SSL_EARLY_DATA_WRITE_RETRY; return ret; } sc->early_data_state = SSL_EARLY_DATA_WRITE_FLUSH; case SSL_EARLY_DATA_WRITE_FLUSH: if (statem_flush(sc) != 1) return 0; *written = num; sc->early_data_state = SSL_EARLY_DATA_WRITE_RETRY; return 1; case SSL_EARLY_DATA_FINISHED_READING: case SSL_EARLY_DATA_READ_RETRY: early_data_state = sc->early_data_state; sc->early_data_state = SSL_EARLY_DATA_UNAUTH_WRITING; ret = SSL_write_ex(s, buf, num, written); if (ret) (void)BIO_flush(sc->wbio); sc->early_data_state = early_data_state; return ret; default: ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } } int SSL_shutdown(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_conn_shutdown(s, 0, NULL, 0); #endif if (sc == NULL) return -1; if (sc->handshake_func == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNINITIALIZED); return -1; } if (!SSL_in_init(s)) { if ((sc->mode & SSL_MODE_ASYNC) && ASYNC_get_current_job() == NULL) { struct ssl_async_args args; memset(&args, 0, sizeof(args)); args.s = s; args.type = OTHERFUNC; args.f.func_other = s->method->ssl_shutdown; return ssl_start_async_job(s, &args, ssl_io_intern); } else { return s->method->ssl_shutdown(s); } } else { ERR_raise(ERR_LIB_SSL, SSL_R_SHUTDOWN_WHILE_IN_INIT); return -1; } } int SSL_key_update(SSL *s, int updatetype) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_key_update(s, updatetype); #endif if (sc == NULL) return 0; if (!SSL_CONNECTION_IS_TLS13(sc)) { ERR_raise(ERR_LIB_SSL, SSL_R_WRONG_SSL_VERSION); return 0; } if (updatetype != SSL_KEY_UPDATE_NOT_REQUESTED && updatetype != SSL_KEY_UPDATE_REQUESTED) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_KEY_UPDATE_TYPE); return 0; } if (!SSL_is_init_finished(s)) { ERR_raise(ERR_LIB_SSL, SSL_R_STILL_IN_INIT); return 0; } if (RECORD_LAYER_write_pending(&sc->rlayer)) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_WRITE_RETRY); return 0; } ossl_statem_set_in_init(sc, 1); sc->key_update = updatetype; return 1; } int SSL_get_key_update_type(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_get_key_update_type(s); #endif if (sc == NULL) return 0; return sc->key_update; } static int can_renegotiate(const SSL_CONNECTION *sc) { if (SSL_CONNECTION_IS_TLS13(sc)) { ERR_raise(ERR_LIB_SSL, SSL_R_WRONG_SSL_VERSION); return 0; } if ((sc->options & SSL_OP_NO_RENEGOTIATION) != 0) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_RENEGOTIATION); return 0; } return 1; } int SSL_renegotiate(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; if (!can_renegotiate(sc)) return 0; sc->renegotiate = 1; sc->new_session = 1; return s->method->ssl_renegotiate(s); } int SSL_renegotiate_abbreviated(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; if (!can_renegotiate(sc)) return 0; sc->renegotiate = 1; sc->new_session = 0; return s->method->ssl_renegotiate(s); } int SSL_renegotiate_pending(const SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; return (sc->renegotiate != 0); } int SSL_new_session_ticket(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if ((SSL_in_init(s) && sc->ext.extra_tickets_expected == 0) || SSL_IS_FIRST_HANDSHAKE(sc) || !sc->server || !SSL_CONNECTION_IS_TLS13(sc)) return 0; sc->ext.extra_tickets_expected++; if (!RECORD_LAYER_write_pending(&sc->rlayer) && !SSL_in_init(s)) ossl_statem_set_in_init(sc, 1); return 1; } long SSL_ctrl(SSL *s, int cmd, long larg, void *parg) { return ossl_ctrl_internal(s, cmd, larg, parg, 0); } long ossl_ctrl_internal(SSL *s, int cmd, long larg, void *parg, int no_quic) { long l; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (!no_quic && IS_QUIC(s)) return s->method->ssl_ctrl(s, cmd, larg, parg); if (sc == NULL) return 0; switch (cmd) { case SSL_CTRL_GET_READ_AHEAD: return RECORD_LAYER_get_read_ahead(&sc->rlayer); case SSL_CTRL_SET_READ_AHEAD: l = RECORD_LAYER_get_read_ahead(&sc->rlayer); RECORD_LAYER_set_read_ahead(&sc->rlayer, larg); return l; case SSL_CTRL_MODE: { OSSL_PARAM options[2], *opts = options; sc->mode |= larg; *opts++ = OSSL_PARAM_construct_uint32(OSSL_LIBSSL_RECORD_LAYER_PARAM_MODE, &sc->mode); *opts = OSSL_PARAM_construct_end(); sc->rlayer.rrlmethod->set_options(sc->rlayer.rrl, options); return sc->mode; } case SSL_CTRL_CLEAR_MODE: return (sc->mode &= ~larg); case SSL_CTRL_GET_MAX_CERT_LIST: return (long)sc->max_cert_list; case SSL_CTRL_SET_MAX_CERT_LIST: if (larg < 0) return 0; l = (long)sc->max_cert_list; sc->max_cert_list = (size_t)larg; return l; case SSL_CTRL_SET_MAX_SEND_FRAGMENT: if (larg < 512 || larg > SSL3_RT_MAX_PLAIN_LENGTH) return 0; #ifndef OPENSSL_NO_KTLS if (sc->wbio != NULL && BIO_get_ktls_send(sc->wbio)) return 0; #endif sc->max_send_fragment = larg; if (sc->max_send_fragment < sc->split_send_fragment) sc->split_send_fragment = sc->max_send_fragment; sc->rlayer.wrlmethod->set_max_frag_len(sc->rlayer.wrl, larg); return 1; case SSL_CTRL_SET_SPLIT_SEND_FRAGMENT: if ((size_t)larg > sc->max_send_fragment || larg == 0) return 0; sc->split_send_fragment = larg; return 1; case SSL_CTRL_SET_MAX_PIPELINES: if (larg < 1 || larg > SSL_MAX_PIPELINES) return 0; sc->max_pipelines = larg; if (sc->rlayer.rrlmethod->set_max_pipelines != NULL) sc->rlayer.rrlmethod->set_max_pipelines(sc->rlayer.rrl, (size_t)larg); return 1; case SSL_CTRL_GET_RI_SUPPORT: return sc->s3.send_connection_binding; case SSL_CTRL_SET_RETRY_VERIFY: sc->rwstate = SSL_RETRY_VERIFY; return 1; case SSL_CTRL_CERT_FLAGS: return (sc->cert->cert_flags |= larg); case SSL_CTRL_CLEAR_CERT_FLAGS: return (sc->cert->cert_flags &= ~larg); case SSL_CTRL_GET_RAW_CIPHERLIST: if (parg) { if (sc->s3.tmp.ciphers_raw == NULL) return 0; *(unsigned char **)parg = sc->s3.tmp.ciphers_raw; return (int)sc->s3.tmp.ciphers_rawlen; } else { return TLS_CIPHER_LEN; } case SSL_CTRL_GET_EXTMS_SUPPORT: if (!sc->session || SSL_in_init(s) || ossl_statem_get_in_handshake(sc)) return -1; if (sc->session->flags & SSL_SESS_FLAG_EXTMS) return 1; else return 0; case SSL_CTRL_SET_MIN_PROTO_VERSION: return ssl_check_allowed_versions(larg, sc->max_proto_version) && ssl_set_version_bound(s->defltmeth->version, (int)larg, &sc->min_proto_version); case SSL_CTRL_GET_MIN_PROTO_VERSION: return sc->min_proto_version; case SSL_CTRL_SET_MAX_PROTO_VERSION: return ssl_check_allowed_versions(sc->min_proto_version, larg) && ssl_set_version_bound(s->defltmeth->version, (int)larg, &sc->max_proto_version); case SSL_CTRL_GET_MAX_PROTO_VERSION: return sc->max_proto_version; default: if (IS_QUIC(s)) return SSL_ctrl((SSL *)sc, cmd, larg, parg); else return s->method->ssl_ctrl(s, cmd, larg, parg); } } long SSL_callback_ctrl(SSL *s, int cmd, void (*fp) (void)) { return s->method->ssl_callback_ctrl(s, cmd, fp); } LHASH_OF(SSL_SESSION) *SSL_CTX_sessions(SSL_CTX *ctx) { return ctx->sessions; } static int ssl_tsan_load(SSL_CTX *ctx, TSAN_QUALIFIER int *stat) { int res = 0; if (ssl_tsan_lock(ctx)) { res = tsan_load(stat); ssl_tsan_unlock(ctx); } return res; } long SSL_CTX_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) { long l; if (ctx == NULL) { switch (cmd) { case SSL_CTRL_SET_GROUPS_LIST: return tls1_set_groups_list(ctx, NULL, NULL, parg); case SSL_CTRL_SET_SIGALGS_LIST: case SSL_CTRL_SET_CLIENT_SIGALGS_LIST: return tls1_set_sigalgs_list(ctx, NULL, parg, 0); default: return 0; } } switch (cmd) { case SSL_CTRL_GET_READ_AHEAD: return ctx->read_ahead; case SSL_CTRL_SET_READ_AHEAD: l = ctx->read_ahead; ctx->read_ahead = larg; return l; case SSL_CTRL_SET_MSG_CALLBACK_ARG: ctx->msg_callback_arg = parg; return 1; case SSL_CTRL_GET_MAX_CERT_LIST: return (long)ctx->max_cert_list; case SSL_CTRL_SET_MAX_CERT_LIST: if (larg < 0) return 0; l = (long)ctx->max_cert_list; ctx->max_cert_list = (size_t)larg; return l; case SSL_CTRL_SET_SESS_CACHE_SIZE: if (larg < 0) return 0; l = (long)ctx->session_cache_size; ctx->session_cache_size = (size_t)larg; return l; case SSL_CTRL_GET_SESS_CACHE_SIZE: return (long)ctx->session_cache_size; case SSL_CTRL_SET_SESS_CACHE_MODE: l = ctx->session_cache_mode; ctx->session_cache_mode = larg; return l; case SSL_CTRL_GET_SESS_CACHE_MODE: return ctx->session_cache_mode; case SSL_CTRL_SESS_NUMBER: return lh_SSL_SESSION_num_items(ctx->sessions); case SSL_CTRL_SESS_CONNECT: return ssl_tsan_load(ctx, &ctx->stats.sess_connect); case SSL_CTRL_SESS_CONNECT_GOOD: return ssl_tsan_load(ctx, &ctx->stats.sess_connect_good); case SSL_CTRL_SESS_CONNECT_RENEGOTIATE: return ssl_tsan_load(ctx, &ctx->stats.sess_connect_renegotiate); case SSL_CTRL_SESS_ACCEPT: return ssl_tsan_load(ctx, &ctx->stats.sess_accept); case SSL_CTRL_SESS_ACCEPT_GOOD: return ssl_tsan_load(ctx, &ctx->stats.sess_accept_good); case SSL_CTRL_SESS_ACCEPT_RENEGOTIATE: return ssl_tsan_load(ctx, &ctx->stats.sess_accept_renegotiate); case SSL_CTRL_SESS_HIT: return ssl_tsan_load(ctx, &ctx->stats.sess_hit); case SSL_CTRL_SESS_CB_HIT: return ssl_tsan_load(ctx, &ctx->stats.sess_cb_hit); case SSL_CTRL_SESS_MISSES: return ssl_tsan_load(ctx, &ctx->stats.sess_miss); case SSL_CTRL_SESS_TIMEOUTS: return ssl_tsan_load(ctx, &ctx->stats.sess_timeout); case SSL_CTRL_SESS_CACHE_FULL: return ssl_tsan_load(ctx, &ctx->stats.sess_cache_full); case SSL_CTRL_MODE: return (ctx->mode |= larg); case SSL_CTRL_CLEAR_MODE: return (ctx->mode &= ~larg); case SSL_CTRL_SET_MAX_SEND_FRAGMENT: if (larg < 512 || larg > SSL3_RT_MAX_PLAIN_LENGTH) return 0; ctx->max_send_fragment = larg; if (ctx->max_send_fragment < ctx->split_send_fragment) ctx->split_send_fragment = ctx->max_send_fragment; return 1; case SSL_CTRL_SET_SPLIT_SEND_FRAGMENT: if ((size_t)larg > ctx->max_send_fragment || larg == 0) return 0; ctx->split_send_fragment = larg; return 1; case SSL_CTRL_SET_MAX_PIPELINES: if (larg < 1 || larg > SSL_MAX_PIPELINES) return 0; ctx->max_pipelines = larg; return 1; case SSL_CTRL_CERT_FLAGS: return (ctx->cert->cert_flags |= larg); case SSL_CTRL_CLEAR_CERT_FLAGS: return (ctx->cert->cert_flags &= ~larg); case SSL_CTRL_SET_MIN_PROTO_VERSION: return ssl_check_allowed_versions(larg, ctx->max_proto_version) && ssl_set_version_bound(ctx->method->version, (int)larg, &ctx->min_proto_version); case SSL_CTRL_GET_MIN_PROTO_VERSION: return ctx->min_proto_version; case SSL_CTRL_SET_MAX_PROTO_VERSION: return ssl_check_allowed_versions(ctx->min_proto_version, larg) && ssl_set_version_bound(ctx->method->version, (int)larg, &ctx->max_proto_version); case SSL_CTRL_GET_MAX_PROTO_VERSION: return ctx->max_proto_version; default: return ctx->method->ssl_ctx_ctrl(ctx, cmd, larg, parg); } } long SSL_CTX_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void)) { switch (cmd) { case SSL_CTRL_SET_MSG_CALLBACK: ctx->msg_callback = (void (*) (int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp); return 1; default: return ctx->method->ssl_ctx_callback_ctrl(ctx, cmd, fp); } } int ssl_cipher_id_cmp(const SSL_CIPHER *a, const SSL_CIPHER *b) { if (a->id > b->id) return 1; if (a->id < b->id) return -1; return 0; } int ssl_cipher_ptr_id_cmp(const SSL_CIPHER *const *ap, const SSL_CIPHER *const *bp) { if ((*ap)->id > (*bp)->id) return 1; if ((*ap)->id < (*bp)->id) return -1; return 0; } STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc != NULL) { if (sc->cipher_list != NULL) { return sc->cipher_list; } else if ((s->ctx != NULL) && (s->ctx->cipher_list != NULL)) { return s->ctx->cipher_list; } } return NULL; } STACK_OF(SSL_CIPHER) *SSL_get_client_ciphers(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL || !sc->server) return NULL; return sc->peer_ciphers; } STACK_OF(SSL_CIPHER) *SSL_get1_supported_ciphers(SSL *s) { STACK_OF(SSL_CIPHER) *sk = NULL, *ciphers; int i; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; ciphers = SSL_get_ciphers(s); if (!ciphers) return NULL; if (!ssl_set_client_disabled(sc)) return NULL; for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { const SSL_CIPHER *c = sk_SSL_CIPHER_value(ciphers, i); if (!ssl_cipher_disabled(sc, c, SSL_SECOP_CIPHER_SUPPORTED, 0)) { if (!sk) sk = sk_SSL_CIPHER_new_null(); if (!sk) return NULL; if (!sk_SSL_CIPHER_push(sk, c)) { sk_SSL_CIPHER_free(sk); return NULL; } } } return sk; } STACK_OF(SSL_CIPHER) *ssl_get_ciphers_by_id(SSL_CONNECTION *s) { if (s != NULL) { if (s->cipher_list_by_id != NULL) return s->cipher_list_by_id; else if (s->ssl.ctx != NULL && s->ssl.ctx->cipher_list_by_id != NULL) return s->ssl.ctx->cipher_list_by_id; } return NULL; } const char *SSL_get_cipher_list(const SSL *s, int n) { const SSL_CIPHER *c; STACK_OF(SSL_CIPHER) *sk; if (s == NULL) return NULL; sk = SSL_get_ciphers(s); if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= n)) return NULL; c = sk_SSL_CIPHER_value(sk, n); if (c == NULL) return NULL; return c->name; } STACK_OF(SSL_CIPHER) *SSL_CTX_get_ciphers(const SSL_CTX *ctx) { if (ctx != NULL) return ctx->cipher_list; return NULL; } static int cipher_list_tls12_num(STACK_OF(SSL_CIPHER) *sk) { int i, num = 0; const SSL_CIPHER *c; if (sk == NULL) return 0; for (i = 0; i < sk_SSL_CIPHER_num(sk); ++i) { c = sk_SSL_CIPHER_value(sk, i); if (c->min_tls >= TLS1_3_VERSION) continue; num++; } return num; } int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str) { STACK_OF(SSL_CIPHER) *sk; sk = ssl_create_cipher_list(ctx, ctx->tls13_ciphersuites, &ctx->cipher_list, &ctx->cipher_list_by_id, str, ctx->cert); if (sk == NULL) return 0; else if (cipher_list_tls12_num(sk) == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_CIPHER_MATCH); return 0; } return 1; } int SSL_set_cipher_list(SSL *s, const char *str) { STACK_OF(SSL_CIPHER) *sk; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sk = ssl_create_cipher_list(s->ctx, sc->tls13_ciphersuites, &sc->cipher_list, &sc->cipher_list_by_id, str, sc->cert); if (sk == NULL) return 0; else if (cipher_list_tls12_num(sk) == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_CIPHER_MATCH); return 0; } return 1; } char *SSL_get_shared_ciphers(const SSL *s, char *buf, int size) { char *p; STACK_OF(SSL_CIPHER) *clntsk, *srvrsk; const SSL_CIPHER *c; int i; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; if (!sc->server || sc->peer_ciphers == NULL || size < 2) return NULL; p = buf; clntsk = sc->peer_ciphers; srvrsk = SSL_get_ciphers(s); if (clntsk == NULL || srvrsk == NULL) return NULL; if (sk_SSL_CIPHER_num(clntsk) == 0 || sk_SSL_CIPHER_num(srvrsk) == 0) return NULL; for (i = 0; i < sk_SSL_CIPHER_num(clntsk); i++) { int n; c = sk_SSL_CIPHER_value(clntsk, i); if (sk_SSL_CIPHER_find(srvrsk, c) < 0) continue; n = OPENSSL_strnlen(c->name, size); if (n >= size) { if (p != buf) --p; *p = '\0'; return buf; } memcpy(p, c->name, n); p += n; *(p++) = ':'; size -= n + 1; } p[-1] = '\0'; return buf; } const char *SSL_get_servername(const SSL *s, const int type) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); int server; if (sc == NULL) return NULL; server = sc->handshake_func == NULL ? 0 : sc->server; if (type != TLSEXT_NAMETYPE_host_name) return NULL; if (server) { if (sc->hit && !SSL_CONNECTION_IS_TLS13(sc)) return sc->session->ext.hostname; } else { if (SSL_in_before(s)) { if (sc->ext.hostname == NULL && sc->session != NULL && sc->session->ssl_version != TLS1_3_VERSION) return sc->session->ext.hostname; } else { if (!SSL_CONNECTION_IS_TLS13(sc) && sc->hit && sc->session->ext.hostname != NULL) return sc->session->ext.hostname; } } return sc->ext.hostname; } int SSL_get_servername_type(const SSL *s) { if (SSL_get_servername(s, TLSEXT_NAMETYPE_host_name) != NULL) return TLSEXT_NAMETYPE_host_name; return -1; } int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, const unsigned char *server, unsigned int server_len, const unsigned char *client, unsigned int client_len) { unsigned int i, j; const unsigned char *result; int status = OPENSSL_NPN_UNSUPPORTED; for (i = 0; i < server_len;) { for (j = 0; j < client_len;) { if (server[i] == client[j] && memcmp(&server[i + 1], &client[j + 1], server[i]) == 0) { result = &server[i]; status = OPENSSL_NPN_NEGOTIATED; goto found; } j += client[j]; j++; } i += server[i]; i++; } result = client; status = OPENSSL_NPN_NO_OVERLAP; found: *out = (unsigned char *)result + 1; *outlen = result[0]; return status; } #ifndef OPENSSL_NO_NEXTPROTONEG void SSL_get0_next_proto_negotiated(const SSL *s, const unsigned char **data, unsigned *len) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) { *data = NULL; *len = 0; return; } *data = sc->ext.npn; if (*data == NULL) { *len = 0; } else { *len = (unsigned int)sc->ext.npn_len; } } void SSL_CTX_set_npn_advertised_cb(SSL_CTX *ctx, SSL_CTX_npn_advertised_cb_func cb, void *arg) { if (IS_QUIC_CTX(ctx)) return; ctx->ext.npn_advertised_cb = cb; ctx->ext.npn_advertised_cb_arg = arg; } void SSL_CTX_set_npn_select_cb(SSL_CTX *ctx, SSL_CTX_npn_select_cb_func cb, void *arg) { if (IS_QUIC_CTX(ctx)) return; ctx->ext.npn_select_cb = cb; ctx->ext.npn_select_cb_arg = arg; } #endif static int alpn_value_ok(const unsigned char *protos, unsigned int protos_len) { unsigned int idx; if (protos_len < 2 || protos == NULL) return 0; for (idx = 0; idx < protos_len; idx += protos[idx] + 1) { if (protos[idx] == 0) return 0; } return idx == protos_len; } int SSL_CTX_set_alpn_protos(SSL_CTX *ctx, const unsigned char *protos, unsigned int protos_len) { unsigned char *alpn; if (protos_len == 0 || protos == NULL) { OPENSSL_free(ctx->ext.alpn); ctx->ext.alpn = NULL; ctx->ext.alpn_len = 0; return 0; } if (!alpn_value_ok(protos, protos_len)) return 1; alpn = OPENSSL_memdup(protos, protos_len); if (alpn == NULL) return 1; OPENSSL_free(ctx->ext.alpn); ctx->ext.alpn = alpn; ctx->ext.alpn_len = protos_len; return 0; } int SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos, unsigned int protos_len) { unsigned char *alpn; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 1; if (protos_len == 0 || protos == NULL) { OPENSSL_free(sc->ext.alpn); sc->ext.alpn = NULL; sc->ext.alpn_len = 0; return 0; } if (!alpn_value_ok(protos, protos_len)) return 1; alpn = OPENSSL_memdup(protos, protos_len); if (alpn == NULL) return 1; OPENSSL_free(sc->ext.alpn); sc->ext.alpn = alpn; sc->ext.alpn_len = protos_len; return 0; } void SSL_CTX_set_alpn_select_cb(SSL_CTX *ctx, SSL_CTX_alpn_select_cb_func cb, void *arg) { ctx->ext.alpn_select_cb = cb; ctx->ext.alpn_select_cb_arg = arg; } void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data, unsigned int *len) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL) { *data = NULL; *len = 0; return; } *data = sc->s3.alpn_selected; if (*data == NULL) *len = 0; else *len = (unsigned int)sc->s3.alpn_selected_len; } int SSL_export_keying_material(SSL *s, unsigned char *out, size_t olen, const char *label, size_t llen, const unsigned char *context, size_t contextlen, int use_context) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; if (sc->session == NULL || (sc->version < TLS1_VERSION && sc->version != DTLS1_BAD_VER)) return -1; return sc->ssl.method->ssl3_enc->export_keying_material(sc, out, olen, label, llen, context, contextlen, use_context); } int SSL_export_keying_material_early(SSL *s, unsigned char *out, size_t olen, const char *label, size_t llen, const unsigned char *context, size_t contextlen) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; if (sc->version != TLS1_3_VERSION) return 0; return tls13_export_keying_material_early(sc, out, olen, label, llen, context, contextlen); } static unsigned long ssl_session_hash(const SSL_SESSION *a) { const unsigned char *session_id = a->session_id; unsigned long l; unsigned char tmp_storage[4]; if (a->session_id_length < sizeof(tmp_storage)) { memset(tmp_storage, 0, sizeof(tmp_storage)); memcpy(tmp_storage, a->session_id, a->session_id_length); session_id = tmp_storage; } l = (unsigned long) ((unsigned long)session_id[0]) | ((unsigned long)session_id[1] << 8L) | ((unsigned long)session_id[2] << 16L) | ((unsigned long)session_id[3] << 24L); return l; } static int ssl_session_cmp(const SSL_SESSION *a, const SSL_SESSION *b) { if (a->ssl_version != b->ssl_version) return 1; if (a->session_id_length != b->session_id_length) return 1; return memcmp(a->session_id, b->session_id, a->session_id_length); } SSL_CTX *SSL_CTX_new_ex(OSSL_LIB_CTX *libctx, const char *propq, const SSL_METHOD *meth) { SSL_CTX *ret = NULL; #ifndef OPENSSL_NO_COMP_ALG int i; #endif if (meth == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NULL_SSL_METHOD_PASSED); return NULL; } if (!OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL)) return NULL; if (SSL_get_ex_data_X509_STORE_CTX_idx() < 0) { ERR_raise(ERR_LIB_SSL, SSL_R_X509_VERIFICATION_SETUP_PROBLEMS); goto err; } ret = OPENSSL_zalloc(sizeof(*ret)); if (ret == NULL) return NULL; if (!CRYPTO_NEW_REF(&ret->references, 1)) { OPENSSL_free(ret); return NULL; } ret->lock = CRYPTO_THREAD_lock_new(); if (ret->lock == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } #ifdef TSAN_REQUIRES_LOCKING ret->tsan_lock = CRYPTO_THREAD_lock_new(); if (ret->tsan_lock == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } #endif ret->libctx = libctx; if (propq != NULL) { ret->propq = OPENSSL_strdup(propq); if (ret->propq == NULL) goto err; } ret->method = meth; ret->min_proto_version = 0; ret->max_proto_version = 0; ret->mode = SSL_MODE_AUTO_RETRY; ret->session_cache_mode = SSL_SESS_CACHE_SERVER; ret->session_cache_size = SSL_SESSION_CACHE_MAX_SIZE_DEFAULT; ret->session_timeout = meth->get_timeout(); ret->max_cert_list = SSL_MAX_CERT_LIST_DEFAULT; ret->verify_mode = SSL_VERIFY_NONE; ret->sessions = lh_SSL_SESSION_new(ssl_session_hash, ssl_session_cmp); if (ret->sessions == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } ret->cert_store = X509_STORE_new(); if (ret->cert_store == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } #ifndef OPENSSL_NO_CT ret->ctlog_store = CTLOG_STORE_new_ex(libctx, propq); if (ret->ctlog_store == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CT_LIB); goto err; } #endif if (!ssl_load_ciphers(ret)) { ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); goto err; } if (!ssl_load_groups(ret)) { ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); goto err; } if (!ssl_load_sigalgs(ret)) { ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); goto err; } if (!ssl_setup_sigalgs(ret)) { ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); goto err; } if (!SSL_CTX_set_ciphersuites(ret, OSSL_default_ciphersuites())) { ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); goto err; } if ((ret->cert = ssl_cert_new(SSL_PKEY_NUM + ret->sigalg_list_len)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); goto err; } if (!ssl_create_cipher_list(ret, ret->tls13_ciphersuites, &ret->cipher_list, &ret->cipher_list_by_id, OSSL_default_cipher_list(), ret->cert) || sk_SSL_CIPHER_num(ret->cipher_list) <= 0) { ERR_raise(ERR_LIB_SSL, SSL_R_LIBRARY_HAS_NO_CIPHERS); goto err; } ret->param = X509_VERIFY_PARAM_new(); if (ret->param == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } ret->md5 = ssl_evp_md_fetch(libctx, NID_md5, propq); ret->sha1 = ssl_evp_md_fetch(libctx, NID_sha1, propq); if ((ret->ca_names = sk_X509_NAME_new_null()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } if ((ret->client_ca_names = sk_X509_NAME_new_null()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_CTX, ret, &ret->ex_data)) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } if ((ret->ext.secure = OPENSSL_secure_zalloc(sizeof(*ret->ext.secure))) == NULL) goto err; if (!(meth->ssl3_enc->enc_flags & SSL_ENC_FLAG_DTLS)) ret->comp_methods = SSL_COMP_get_compression_methods(); ret->max_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH; ret->split_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH; if ((RAND_bytes_ex(libctx, ret->ext.tick_key_name, sizeof(ret->ext.tick_key_name), 0) <= 0) || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_hmac_key, sizeof(ret->ext.secure->tick_hmac_key), 0) <= 0) || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_aes_key, sizeof(ret->ext.secure->tick_aes_key), 0) <= 0)) ret->options |= SSL_OP_NO_TICKET; if (RAND_priv_bytes_ex(libctx, ret->ext.cookie_hmac_key, sizeof(ret->ext.cookie_hmac_key), 0) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_RAND_LIB); goto err; } #ifndef OPENSSL_NO_SRP if (!ssl_ctx_srp_ctx_init_intern(ret)) { ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); goto err; } #endif #ifndef OPENSSL_NO_ENGINE # ifdef OPENSSL_SSL_CLIENT_ENGINE_AUTO # define eng_strx(x) #x # define eng_str(x) eng_strx(x) { ENGINE *eng; eng = ENGINE_by_id(eng_str(OPENSSL_SSL_CLIENT_ENGINE_AUTO)); if (!eng) { ERR_clear_error(); ENGINE_load_builtin_engines(); eng = ENGINE_by_id(eng_str(OPENSSL_SSL_CLIENT_ENGINE_AUTO)); } if (!eng || !SSL_CTX_set_client_cert_engine(ret, eng)) ERR_clear_error(); } # endif #endif #ifndef OPENSSL_NO_COMP_ALG memset(ret->cert_comp_prefs, 0, sizeof(ret->cert_comp_prefs)); i = 0; if (ossl_comp_has_alg(TLSEXT_comp_cert_brotli)) ret->cert_comp_prefs[i++] = TLSEXT_comp_cert_brotli; if (ossl_comp_has_alg(TLSEXT_comp_cert_zlib)) ret->cert_comp_prefs[i++] = TLSEXT_comp_cert_zlib; if (ossl_comp_has_alg(TLSEXT_comp_cert_zstd)) ret->cert_comp_prefs[i++] = TLSEXT_comp_cert_zstd; #endif ret->options |= SSL_OP_NO_COMPRESSION | SSL_OP_ENABLE_MIDDLEBOX_COMPAT; ret->ext.status_type = TLSEXT_STATUSTYPE_nothing; ret->max_early_data = 0; ret->recv_max_early_data = SSL3_RT_MAX_PLAIN_LENGTH; ret->num_tickets = 2; ssl_ctx_system_config(ret); return ret; err: SSL_CTX_free(ret); return NULL; } SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth) { return SSL_CTX_new_ex(NULL, NULL, meth); } int SSL_CTX_up_ref(SSL_CTX *ctx) { int i; if (CRYPTO_UP_REF(&ctx->references, &i) <= 0) return 0; REF_PRINT_COUNT("SSL_CTX", ctx); REF_ASSERT_ISNT(i < 2); return ((i > 1) ? 1 : 0); } void SSL_CTX_free(SSL_CTX *a) { int i; size_t j; if (a == NULL) return; CRYPTO_DOWN_REF(&a->references, &i); REF_PRINT_COUNT("SSL_CTX", a); if (i > 0) return; REF_ASSERT_ISNT(i < 0); X509_VERIFY_PARAM_free(a->param); dane_ctx_final(&a->dane); if (a->sessions != NULL) SSL_CTX_flush_sessions(a, 0); CRYPTO_free_ex_data(CRYPTO_EX_INDEX_SSL_CTX, a, &a->ex_data); lh_SSL_SESSION_free(a->sessions); X509_STORE_free(a->cert_store); #ifndef OPENSSL_NO_CT CTLOG_STORE_free(a->ctlog_store); #endif sk_SSL_CIPHER_free(a->cipher_list); sk_SSL_CIPHER_free(a->cipher_list_by_id); sk_SSL_CIPHER_free(a->tls13_ciphersuites); ssl_cert_free(a->cert); sk_X509_NAME_pop_free(a->ca_names, X509_NAME_free); sk_X509_NAME_pop_free(a->client_ca_names, X509_NAME_free); OSSL_STACK_OF_X509_free(a->extra_certs); a->comp_methods = NULL; #ifndef OPENSSL_NO_SRTP sk_SRTP_PROTECTION_PROFILE_free(a->srtp_profiles); #endif #ifndef OPENSSL_NO_SRP ssl_ctx_srp_ctx_free_intern(a); #endif #ifndef OPENSSL_NO_ENGINE tls_engine_finish(a->client_cert_engine); #endif OPENSSL_free(a->ext.ecpointformats); OPENSSL_free(a->ext.supportedgroups); OPENSSL_free(a->ext.supported_groups_default); OPENSSL_free(a->ext.alpn); OPENSSL_secure_free(a->ext.secure); ssl_evp_md_free(a->md5); ssl_evp_md_free(a->sha1); for (j = 0; j < SSL_ENC_NUM_IDX; j++) ssl_evp_cipher_free(a->ssl_cipher_methods[j]); for (j = 0; j < SSL_MD_NUM_IDX; j++) ssl_evp_md_free(a->ssl_digest_methods[j]); for (j = 0; j < a->group_list_len; j++) { OPENSSL_free(a->group_list[j].tlsname); OPENSSL_free(a->group_list[j].realname); OPENSSL_free(a->group_list[j].algorithm); } OPENSSL_free(a->group_list); for (j = 0; j < a->sigalg_list_len; j++) { OPENSSL_free(a->sigalg_list[j].name); OPENSSL_free(a->sigalg_list[j].sigalg_name); OPENSSL_free(a->sigalg_list[j].sigalg_oid); OPENSSL_free(a->sigalg_list[j].sig_name); OPENSSL_free(a->sigalg_list[j].sig_oid); OPENSSL_free(a->sigalg_list[j].hash_name); OPENSSL_free(a->sigalg_list[j].hash_oid); OPENSSL_free(a->sigalg_list[j].keytype); OPENSSL_free(a->sigalg_list[j].keytype_oid); } OPENSSL_free(a->sigalg_list); OPENSSL_free(a->ssl_cert_info); OPENSSL_free(a->sigalg_lookup_cache); OPENSSL_free(a->tls12_sigalgs); OPENSSL_free(a->client_cert_type); OPENSSL_free(a->server_cert_type); CRYPTO_THREAD_lock_free(a->lock); CRYPTO_FREE_REF(&a->references); #ifdef TSAN_REQUIRES_LOCKING CRYPTO_THREAD_lock_free(a->tsan_lock); #endif OPENSSL_free(a->propq); #ifndef OPENSSL_NO_QLOG OPENSSL_free(a->qlog_title); #endif OPENSSL_free(a); } void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx, pem_password_cb *cb) { ctx->default_passwd_callback = cb; } void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx, void *u) { ctx->default_passwd_callback_userdata = u; } pem_password_cb *SSL_CTX_get_default_passwd_cb(SSL_CTX *ctx) { return ctx->default_passwd_callback; } void *SSL_CTX_get_default_passwd_cb_userdata(SSL_CTX *ctx) { return ctx->default_passwd_callback_userdata; } void SSL_set_default_passwd_cb(SSL *s, pem_password_cb *cb) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->default_passwd_callback = cb; } void SSL_set_default_passwd_cb_userdata(SSL *s, void *u) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->default_passwd_callback_userdata = u; } pem_password_cb *SSL_get_default_passwd_cb(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; return sc->default_passwd_callback; } void *SSL_get_default_passwd_cb_userdata(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; return sc->default_passwd_callback_userdata; } void SSL_CTX_set_cert_verify_callback(SSL_CTX *ctx, int (*cb) (X509_STORE_CTX *, void *), void *arg) { ctx->app_verify_callback = cb; ctx->app_verify_arg = arg; } void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, int (*cb) (int, X509_STORE_CTX *)) { ctx->verify_mode = mode; ctx->default_verify_callback = cb; } void SSL_CTX_set_verify_depth(SSL_CTX *ctx, int depth) { X509_VERIFY_PARAM_set_depth(ctx->param, depth); } void SSL_CTX_set_cert_cb(SSL_CTX *c, int (*cb) (SSL *ssl, void *arg), void *arg) { ssl_cert_set_cert_cb(c->cert, cb, arg); } void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; ssl_cert_set_cert_cb(sc->cert, cb, arg); } void ssl_set_masks(SSL_CONNECTION *s) { CERT *c = s->cert; uint32_t *pvalid = s->s3.tmp.valid_flags; int rsa_enc, rsa_sign, dh_tmp, dsa_sign; unsigned long mask_k, mask_a; int have_ecc_cert, ecdsa_ok; if (c == NULL) return; dh_tmp = (c->dh_tmp != NULL || c->dh_tmp_cb != NULL || c->dh_tmp_auto); rsa_enc = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID; rsa_sign = pvalid[SSL_PKEY_RSA] & CERT_PKEY_VALID; dsa_sign = pvalid[SSL_PKEY_DSA_SIGN] & CERT_PKEY_VALID; have_ecc_cert = pvalid[SSL_PKEY_ECC] & CERT_PKEY_VALID; mask_k = 0; mask_a = 0; OSSL_TRACE4(TLS_CIPHER, "dh_tmp=%d rsa_enc=%d rsa_sign=%d dsa_sign=%d\n", dh_tmp, rsa_enc, rsa_sign, dsa_sign); #ifndef OPENSSL_NO_GOST if (ssl_has_cert(s, SSL_PKEY_GOST12_512)) { mask_k |= SSL_kGOST | SSL_kGOST18; mask_a |= SSL_aGOST12; } if (ssl_has_cert(s, SSL_PKEY_GOST12_256)) { mask_k |= SSL_kGOST | SSL_kGOST18; mask_a |= SSL_aGOST12; } if (ssl_has_cert(s, SSL_PKEY_GOST01)) { mask_k |= SSL_kGOST; mask_a |= SSL_aGOST01; } #endif if (rsa_enc) mask_k |= SSL_kRSA; if (dh_tmp) mask_k |= SSL_kDHE; if (rsa_enc || rsa_sign || (ssl_has_cert(s, SSL_PKEY_RSA_PSS_SIGN) && pvalid[SSL_PKEY_RSA_PSS_SIGN] & CERT_PKEY_EXPLICIT_SIGN && TLS1_get_version(&s->ssl) == TLS1_2_VERSION)) mask_a |= SSL_aRSA; if (dsa_sign) { mask_a |= SSL_aDSS; } mask_a |= SSL_aNULL; if (pvalid[SSL_PKEY_RSA] & CERT_PKEY_RPK) { mask_a |= SSL_aRSA; mask_k |= SSL_kRSA; } if (pvalid[SSL_PKEY_ECC] & CERT_PKEY_RPK) mask_a |= SSL_aECDSA; if (TLS1_get_version(&s->ssl) == TLS1_2_VERSION) { if (pvalid[SSL_PKEY_RSA_PSS_SIGN] & CERT_PKEY_RPK) mask_a |= SSL_aRSA; if (pvalid[SSL_PKEY_ED25519] & CERT_PKEY_RPK || pvalid[SSL_PKEY_ED448] & CERT_PKEY_RPK) mask_a |= SSL_aECDSA; } if (have_ecc_cert) { uint32_t ex_kusage; ex_kusage = X509_get_key_usage(c->pkeys[SSL_PKEY_ECC].x509); ecdsa_ok = ex_kusage & X509v3_KU_DIGITAL_SIGNATURE; if (!(pvalid[SSL_PKEY_ECC] & CERT_PKEY_SIGN)) ecdsa_ok = 0; if (ecdsa_ok) mask_a |= SSL_aECDSA; } if (!(mask_a & SSL_aECDSA) && ssl_has_cert(s, SSL_PKEY_ED25519) && pvalid[SSL_PKEY_ED25519] & CERT_PKEY_EXPLICIT_SIGN && TLS1_get_version(&s->ssl) == TLS1_2_VERSION) mask_a |= SSL_aECDSA; if (!(mask_a & SSL_aECDSA) && ssl_has_cert(s, SSL_PKEY_ED448) && pvalid[SSL_PKEY_ED448] & CERT_PKEY_EXPLICIT_SIGN && TLS1_get_version(&s->ssl) == TLS1_2_VERSION) mask_a |= SSL_aECDSA; mask_k |= SSL_kECDHE; #ifndef OPENSSL_NO_PSK mask_k |= SSL_kPSK; mask_a |= SSL_aPSK; if (mask_k & SSL_kRSA) mask_k |= SSL_kRSAPSK; if (mask_k & SSL_kDHE) mask_k |= SSL_kDHEPSK; if (mask_k & SSL_kECDHE) mask_k |= SSL_kECDHEPSK; #endif s->s3.tmp.mask_k = mask_k; s->s3.tmp.mask_a = mask_a; } int ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL_CONNECTION *s) { if (s->s3.tmp.new_cipher->algorithm_auth & SSL_aECDSA) { if (!(X509_get_key_usage(x) & X509v3_KU_DIGITAL_SIGNATURE)) { ERR_raise(ERR_LIB_SSL, SSL_R_ECC_CERT_NOT_FOR_SIGNING); return 0; } } return 1; } int ssl_get_server_cert_serverinfo(SSL_CONNECTION *s, const unsigned char **serverinfo, size_t *serverinfo_length) { CERT_PKEY *cpk = s->s3.tmp.cert; *serverinfo_length = 0; if (cpk == NULL || cpk->serverinfo == NULL) return 0; *serverinfo = cpk->serverinfo; *serverinfo_length = cpk->serverinfo_length; return 1; } void ssl_update_cache(SSL_CONNECTION *s, int mode) { int i; if (s->session->session_id_length == 0) return; if (s->server && s->session->sid_ctx_length == 0 && (s->verify_mode & SSL_VERIFY_PEER) != 0) return; i = s->session_ctx->session_cache_mode; if ((i & mode) != 0 && (!s->hit || SSL_CONNECTION_IS_TLS13(s))) { if ((i & SSL_SESS_CACHE_NO_INTERNAL_STORE) == 0 && (!SSL_CONNECTION_IS_TLS13(s) || !s->server || (s->max_early_data > 0 && (s->options & SSL_OP_NO_ANTI_REPLAY) == 0) || s->session_ctx->remove_session_cb != NULL || (s->options & SSL_OP_NO_TICKET) != 0)) SSL_CTX_add_session(s->session_ctx, s->session); if (s->session_ctx->new_session_cb != NULL) { SSL_SESSION_up_ref(s->session); if (!s->session_ctx->new_session_cb(SSL_CONNECTION_GET_SSL(s), s->session)) SSL_SESSION_free(s->session); } } if ((!(i & SSL_SESS_CACHE_NO_AUTO_CLEAR)) && ((i & mode) == mode)) { TSAN_QUALIFIER int *stat; if (mode & SSL_SESS_CACHE_CLIENT) stat = &s->session_ctx->stats.sess_connect_good; else stat = &s->session_ctx->stats.sess_accept_good; if ((ssl_tsan_load(s->session_ctx, stat) & 0xff) == 0xff) SSL_CTX_flush_sessions(s->session_ctx, (unsigned long)time(NULL)); } } const SSL_METHOD *SSL_CTX_get_ssl_method(const SSL_CTX *ctx) { return ctx->method; } const SSL_METHOD *SSL_get_ssl_method(const SSL *s) { return s->method; } int SSL_set_ssl_method(SSL *s, const SSL_METHOD *meth) { int ret = 1; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL || (s->type != SSL_TYPE_SSL_CONNECTION && s->method != meth) || (s->type == SSL_TYPE_SSL_CONNECTION && IS_QUIC_METHOD(meth))) return 0; if (s->method != meth) { const SSL_METHOD *sm = s->method; int (*hf) (SSL *) = sc->handshake_func; if (sm->version == meth->version) s->method = meth; else { sm->ssl_deinit(s); s->method = meth; ret = s->method->ssl_init(s); } if (hf == sm->ssl_connect) sc->handshake_func = meth->ssl_connect; else if (hf == sm->ssl_accept) sc->handshake_func = meth->ssl_accept; } return ret; } int SSL_get_error(const SSL *s, int i) { return ossl_ssl_get_error(s, i, 1); } int ossl_ssl_get_error(const SSL *s, int i, int check_err) { int reason; unsigned long l; BIO *bio; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (i > 0) return SSL_ERROR_NONE; #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) { reason = ossl_quic_get_error(s, i); if (reason != SSL_ERROR_NONE) return reason; } #endif if (sc == NULL) return SSL_ERROR_SSL; if (check_err && (l = ERR_peek_error()) != 0) { if (ERR_GET_LIB(l) == ERR_LIB_SYS) return SSL_ERROR_SYSCALL; else return SSL_ERROR_SSL; } #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) #endif { if (SSL_want_read(s)) { bio = SSL_get_rbio(s); if (BIO_should_read(bio)) return SSL_ERROR_WANT_READ; else if (BIO_should_write(bio)) return SSL_ERROR_WANT_WRITE; else if (BIO_should_io_special(bio)) { reason = BIO_get_retry_reason(bio); if (reason == BIO_RR_CONNECT) return SSL_ERROR_WANT_CONNECT; else if (reason == BIO_RR_ACCEPT) return SSL_ERROR_WANT_ACCEPT; else return SSL_ERROR_SYSCALL; } } if (SSL_want_write(s)) { bio = sc->wbio; if (BIO_should_write(bio)) return SSL_ERROR_WANT_WRITE; else if (BIO_should_read(bio)) return SSL_ERROR_WANT_READ; else if (BIO_should_io_special(bio)) { reason = BIO_get_retry_reason(bio); if (reason == BIO_RR_CONNECT) return SSL_ERROR_WANT_CONNECT; else if (reason == BIO_RR_ACCEPT) return SSL_ERROR_WANT_ACCEPT; else return SSL_ERROR_SYSCALL; } } } if (SSL_want_x509_lookup(s)) return SSL_ERROR_WANT_X509_LOOKUP; if (SSL_want_retry_verify(s)) return SSL_ERROR_WANT_RETRY_VERIFY; if (SSL_want_async(s)) return SSL_ERROR_WANT_ASYNC; if (SSL_want_async_job(s)) return SSL_ERROR_WANT_ASYNC_JOB; if (SSL_want_client_hello_cb(s)) return SSL_ERROR_WANT_CLIENT_HELLO_CB; if ((sc->shutdown & SSL_RECEIVED_SHUTDOWN) && (sc->s3.warn_alert == SSL_AD_CLOSE_NOTIFY)) return SSL_ERROR_ZERO_RETURN; return SSL_ERROR_SYSCALL; } static int ssl_do_handshake_intern(void *vargs) { struct ssl_async_args *args = (struct ssl_async_args *)vargs; SSL *s = args->s; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; return sc->handshake_func(s); } int SSL_do_handshake(SSL *s) { int ret = 1; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_do_handshake(s); #endif if (sc->handshake_func == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_CONNECTION_TYPE_NOT_SET); return -1; } ossl_statem_check_finish_init(sc, -1); s->method->ssl_renegotiate_check(s, 0); if (SSL_in_init(s) || SSL_in_before(s)) { if ((sc->mode & SSL_MODE_ASYNC) && ASYNC_get_current_job() == NULL) { struct ssl_async_args args; memset(&args, 0, sizeof(args)); args.s = s; ret = ssl_start_async_job(s, &args, ssl_do_handshake_intern); } else { ret = sc->handshake_func(s); } } return ret; } void SSL_set_accept_state(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) { ossl_quic_set_accept_state(s); return; } #endif sc->server = 1; sc->shutdown = 0; ossl_statem_clear(sc); sc->handshake_func = s->method->ssl_accept; RECORD_LAYER_reset(&sc->rlayer); } void SSL_set_connect_state(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) { ossl_quic_set_connect_state(s); return; } #endif sc->server = 0; sc->shutdown = 0; ossl_statem_clear(sc); sc->handshake_func = s->method->ssl_connect; RECORD_LAYER_reset(&sc->rlayer); } int ssl_undefined_function(SSL *s) { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } int ssl_undefined_void_function(void) { ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return 0; } int ssl_undefined_const_function(const SSL *s) { return 0; } const char *ssl_protocol_to_string(int version) { switch (version) { case TLS1_3_VERSION: return "TLSv1.3"; case TLS1_2_VERSION: return "TLSv1.2"; case TLS1_1_VERSION: return "TLSv1.1"; case TLS1_VERSION: return "TLSv1"; case SSL3_VERSION: return "SSLv3"; case DTLS1_BAD_VER: return "DTLSv0.9"; case DTLS1_VERSION: return "DTLSv1"; case DTLS1_2_VERSION: return "DTLSv1.2"; default: return "unknown"; } } const char *SSL_get_version(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (s->type == SSL_TYPE_QUIC_CONNECTION || s->type == SSL_TYPE_QUIC_XSO) return "QUICv1"; #endif if (sc == NULL) return NULL; return ssl_protocol_to_string(sc->version); } __owur int SSL_get_handshake_rtt(const SSL *s, uint64_t *rtt) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return -1; if (sc->ts_msg_write.t <= 0 || sc->ts_msg_read.t <= 0) return 0; if (sc->ts_msg_read.t < sc->ts_msg_write.t) return -1; *rtt = ossl_time2us(ossl_time_subtract(sc->ts_msg_read, sc->ts_msg_write)); return 1; } static int dup_ca_names(STACK_OF(X509_NAME) **dst, STACK_OF(X509_NAME) *src) { STACK_OF(X509_NAME) *sk; X509_NAME *xn; int i; if (src == NULL) { *dst = NULL; return 1; } if ((sk = sk_X509_NAME_new_null()) == NULL) return 0; for (i = 0; i < sk_X509_NAME_num(src); i++) { xn = X509_NAME_dup(sk_X509_NAME_value(src, i)); if (xn == NULL) { sk_X509_NAME_pop_free(sk, X509_NAME_free); return 0; } if (sk_X509_NAME_insert(sk, xn, i) == 0) { X509_NAME_free(xn); sk_X509_NAME_pop_free(sk, X509_NAME_free); return 0; } } *dst = sk; return 1; } SSL *SSL_dup(SSL *s) { SSL *ret; int i; SSL_CONNECTION *retsc; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return NULL; if (!SSL_in_init(s) || !SSL_in_before(s)) { CRYPTO_UP_REF(&s->references, &i); return s; } if ((ret = SSL_new(SSL_get_SSL_CTX(s))) == NULL) return NULL; if ((retsc = SSL_CONNECTION_FROM_SSL_ONLY(ret)) == NULL) goto err; if (sc->session != NULL) { if (!SSL_copy_session_id(ret, s)) goto err; } else { if (!SSL_set_ssl_method(ret, s->method)) goto err; if (sc->cert != NULL) { ssl_cert_free(retsc->cert); retsc->cert = ssl_cert_dup(sc->cert); if (retsc->cert == NULL) goto err; } if (!SSL_set_session_id_context(ret, sc->sid_ctx, (int)sc->sid_ctx_length)) goto err; } if (!ssl_dane_dup(retsc, sc)) goto err; retsc->version = sc->version; retsc->options = sc->options; retsc->min_proto_version = sc->min_proto_version; retsc->max_proto_version = sc->max_proto_version; retsc->mode = sc->mode; SSL_set_max_cert_list(ret, SSL_get_max_cert_list(s)); SSL_set_read_ahead(ret, SSL_get_read_ahead(s)); retsc->msg_callback = sc->msg_callback; retsc->msg_callback_arg = sc->msg_callback_arg; SSL_set_verify(ret, SSL_get_verify_mode(s), SSL_get_verify_callback(s)); SSL_set_verify_depth(ret, SSL_get_verify_depth(s)); retsc->generate_session_id = sc->generate_session_id; SSL_set_info_callback(ret, SSL_get_info_callback(s)); if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_SSL, &ret->ex_data, &s->ex_data)) goto err; retsc->server = sc->server; if (sc->handshake_func) { if (sc->server) SSL_set_accept_state(ret); else SSL_set_connect_state(ret); } retsc->shutdown = sc->shutdown; retsc->hit = sc->hit; retsc->default_passwd_callback = sc->default_passwd_callback; retsc->default_passwd_callback_userdata = sc->default_passwd_callback_userdata; X509_VERIFY_PARAM_inherit(retsc->param, sc->param); if (sc->cipher_list != NULL) { if ((retsc->cipher_list = sk_SSL_CIPHER_dup(sc->cipher_list)) == NULL) goto err; } if (sc->cipher_list_by_id != NULL) if ((retsc->cipher_list_by_id = sk_SSL_CIPHER_dup(sc->cipher_list_by_id)) == NULL) goto err; if (!dup_ca_names(&retsc->ca_names, sc->ca_names) || !dup_ca_names(&retsc->client_ca_names, sc->client_ca_names)) goto err; return ret; err: SSL_free(ret); return NULL; } X509 *SSL_get_certificate(const SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; if (sc->cert != NULL) return sc->cert->key->x509; else return NULL; } EVP_PKEY *SSL_get_privatekey(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; if (sc->cert != NULL) return sc->cert->key->privatekey; else return NULL; } X509 *SSL_CTX_get0_certificate(const SSL_CTX *ctx) { if (ctx->cert != NULL) return ctx->cert->key->x509; else return NULL; } EVP_PKEY *SSL_CTX_get0_privatekey(const SSL_CTX *ctx) { if (ctx->cert != NULL) return ctx->cert->key->privatekey; else return NULL; } const SSL_CIPHER *SSL_get_current_cipher(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; if ((sc->session != NULL) && (sc->session->cipher != NULL)) return sc->session->cipher; return NULL; } const SSL_CIPHER *SSL_get_pending_cipher(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; return sc->s3.tmp.new_cipher; } const COMP_METHOD *SSL_get_current_compression(const SSL *s) { #ifndef OPENSSL_NO_COMP const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL_ONLY(s); if (sc == NULL) return NULL; return sc->rlayer.wrlmethod->get_compression(sc->rlayer.wrl); #else return NULL; #endif } const COMP_METHOD *SSL_get_current_expansion(const SSL *s) { #ifndef OPENSSL_NO_COMP const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL_ONLY(s); if (sc == NULL) return NULL; return sc->rlayer.rrlmethod->get_compression(sc->rlayer.rrl); #else return NULL; #endif } int ssl_init_wbio_buffer(SSL_CONNECTION *s) { BIO *bbio; if (s->bbio != NULL) { return 1; } bbio = BIO_new(BIO_f_buffer()); if (bbio == NULL || BIO_set_read_buffer_size(bbio, 1) <= 0) { BIO_free(bbio); ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); return 0; } s->bbio = bbio; s->wbio = BIO_push(bbio, s->wbio); s->rlayer.wrlmethod->set1_bio(s->rlayer.wrl, s->wbio); return 1; } int ssl_free_wbio_buffer(SSL_CONNECTION *s) { if (s->bbio == NULL) return 1; s->wbio = BIO_pop(s->wbio); s->rlayer.wrlmethod->set1_bio(s->rlayer.wrl, s->wbio); BIO_free(s->bbio); s->bbio = NULL; return 1; } void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx, int mode) { ctx->quiet_shutdown = mode; } int SSL_CTX_get_quiet_shutdown(const SSL_CTX *ctx) { return ctx->quiet_shutdown; } void SSL_set_quiet_shutdown(SSL *s, int mode) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return; sc->quiet_shutdown = mode; } int SSL_get_quiet_shutdown(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL_ONLY(s); if (sc == NULL) return 0; return sc->quiet_shutdown; } void SSL_set_shutdown(SSL *s, int mode) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return; sc->shutdown = mode; } int SSL_get_shutdown(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL_ONLY(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_get_shutdown(s); #endif if (sc == NULL) return 0; return sc->shutdown; } int SSL_version(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (s->type == SSL_TYPE_QUIC_CONNECTION || s->type == SSL_TYPE_QUIC_XSO) return OSSL_QUIC1_VERSION; #endif if (sc == NULL) return 0; return sc->version; } int SSL_client_version(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (s->type == SSL_TYPE_QUIC_CONNECTION || s->type == SSL_TYPE_QUIC_XSO) return OSSL_QUIC1_VERSION; #endif if (sc == NULL) return 0; return sc->client_version; } SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl) { return ssl->ctx; } SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX *ctx) { CERT *new_cert; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (sc == NULL) return NULL; if (ssl->ctx == ctx) return ssl->ctx; if (ctx == NULL) ctx = sc->session_ctx; new_cert = ssl_cert_dup(ctx->cert); if (new_cert == NULL) { return NULL; } if (!custom_exts_copy_flags(&new_cert->custext, &sc->cert->custext)) { ssl_cert_free(new_cert); return NULL; } ssl_cert_free(sc->cert); sc->cert = new_cert; if (!ossl_assert(sc->sid_ctx_length <= sizeof(sc->sid_ctx))) return NULL; if ((ssl->ctx != NULL) && (sc->sid_ctx_length == ssl->ctx->sid_ctx_length) && (memcmp(sc->sid_ctx, ssl->ctx->sid_ctx, sc->sid_ctx_length) == 0)) { sc->sid_ctx_length = ctx->sid_ctx_length; memcpy(&sc->sid_ctx, &ctx->sid_ctx, sizeof(sc->sid_ctx)); } SSL_CTX_up_ref(ctx); SSL_CTX_free(ssl->ctx); ssl->ctx = ctx; return ssl->ctx; } int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx) { return X509_STORE_set_default_paths_ex(ctx->cert_store, ctx->libctx, ctx->propq); } int SSL_CTX_set_default_verify_dir(SSL_CTX *ctx) { X509_LOOKUP *lookup; lookup = X509_STORE_add_lookup(ctx->cert_store, X509_LOOKUP_hash_dir()); if (lookup == NULL) return 0; ERR_set_mark(); X509_LOOKUP_add_dir(lookup, NULL, X509_FILETYPE_DEFAULT); ERR_pop_to_mark(); return 1; } int SSL_CTX_set_default_verify_file(SSL_CTX *ctx) { X509_LOOKUP *lookup; lookup = X509_STORE_add_lookup(ctx->cert_store, X509_LOOKUP_file()); if (lookup == NULL) return 0; ERR_set_mark(); X509_LOOKUP_load_file_ex(lookup, NULL, X509_FILETYPE_DEFAULT, ctx->libctx, ctx->propq); ERR_pop_to_mark(); return 1; } int SSL_CTX_set_default_verify_store(SSL_CTX *ctx) { X509_LOOKUP *lookup; lookup = X509_STORE_add_lookup(ctx->cert_store, X509_LOOKUP_store()); if (lookup == NULL) return 0; ERR_set_mark(); X509_LOOKUP_add_store_ex(lookup, NULL, ctx->libctx, ctx->propq); ERR_pop_to_mark(); return 1; } int SSL_CTX_load_verify_file(SSL_CTX *ctx, const char *CAfile) { return X509_STORE_load_file_ex(ctx->cert_store, CAfile, ctx->libctx, ctx->propq); } int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath) { return X509_STORE_load_path(ctx->cert_store, CApath); } int SSL_CTX_load_verify_store(SSL_CTX *ctx, const char *CAstore) { return X509_STORE_load_store_ex(ctx->cert_store, CAstore, ctx->libctx, ctx->propq); } int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, const char *CApath) { if (CAfile == NULL && CApath == NULL) return 0; if (CAfile != NULL && !SSL_CTX_load_verify_file(ctx, CAfile)) return 0; if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) return 0; return 1; } void SSL_set_info_callback(SSL *ssl, void (*cb) (const SSL *ssl, int type, int val)) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return; sc->info_callback = cb; } void (*SSL_get_info_callback(const SSL *ssl)) (const SSL * , int , int ) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL) return NULL; return sc->info_callback; } void SSL_set_verify_result(SSL *ssl, long arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return; sc->verify_result = arg; } long SSL_get_verify_result(const SSL *ssl) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL) return 0; return sc->verify_result; } size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, size_t outlen) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL) return 0; if (outlen == 0) return sizeof(sc->s3.client_random); if (outlen > sizeof(sc->s3.client_random)) outlen = sizeof(sc->s3.client_random); memcpy(out, sc->s3.client_random, outlen); return outlen; } size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, size_t outlen) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL) return 0; if (outlen == 0) return sizeof(sc->s3.server_random); if (outlen > sizeof(sc->s3.server_random)) outlen = sizeof(sc->s3.server_random); memcpy(out, sc->s3.server_random, outlen); return outlen; } size_t SSL_SESSION_get_master_key(const SSL_SESSION *session, unsigned char *out, size_t outlen) { if (outlen == 0) return session->master_key_length; if (outlen > session->master_key_length) outlen = session->master_key_length; memcpy(out, session->master_key, outlen); return outlen; } int SSL_SESSION_set1_master_key(SSL_SESSION *sess, const unsigned char *in, size_t len) { if (len > sizeof(sess->master_key)) return 0; memcpy(sess->master_key, in, len); sess->master_key_length = len; return 1; } int SSL_set_ex_data(SSL *s, int idx, void *arg) { return CRYPTO_set_ex_data(&s->ex_data, idx, arg); } void *SSL_get_ex_data(const SSL *s, int idx) { return CRYPTO_get_ex_data(&s->ex_data, idx); } int SSL_CTX_set_ex_data(SSL_CTX *s, int idx, void *arg) { return CRYPTO_set_ex_data(&s->ex_data, idx, arg); } void *SSL_CTX_get_ex_data(const SSL_CTX *s, int idx) { return CRYPTO_get_ex_data(&s->ex_data, idx); } X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *ctx) { return ctx->cert_store; } void SSL_CTX_set_cert_store(SSL_CTX *ctx, X509_STORE *store) { X509_STORE_free(ctx->cert_store); ctx->cert_store = store; } void SSL_CTX_set1_cert_store(SSL_CTX *ctx, X509_STORE *store) { if (store != NULL) X509_STORE_up_ref(store); SSL_CTX_set_cert_store(ctx, store); } int SSL_want(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_want(s); #endif if (sc == NULL) return SSL_NOTHING; return sc->rwstate; } #ifndef OPENSSL_NO_PSK int SSL_CTX_use_psk_identity_hint(SSL_CTX *ctx, const char *identity_hint) { if (identity_hint != NULL && strlen(identity_hint) > PSK_MAX_IDENTITY_LEN) { ERR_raise(ERR_LIB_SSL, SSL_R_DATA_LENGTH_TOO_LONG); return 0; } OPENSSL_free(ctx->cert->psk_identity_hint); if (identity_hint != NULL) { ctx->cert->psk_identity_hint = OPENSSL_strdup(identity_hint); if (ctx->cert->psk_identity_hint == NULL) return 0; } else ctx->cert->psk_identity_hint = NULL; return 1; } int SSL_use_psk_identity_hint(SSL *s, const char *identity_hint) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (identity_hint != NULL && strlen(identity_hint) > PSK_MAX_IDENTITY_LEN) { ERR_raise(ERR_LIB_SSL, SSL_R_DATA_LENGTH_TOO_LONG); return 0; } OPENSSL_free(sc->cert->psk_identity_hint); if (identity_hint != NULL) { sc->cert->psk_identity_hint = OPENSSL_strdup(identity_hint); if (sc->cert->psk_identity_hint == NULL) return 0; } else sc->cert->psk_identity_hint = NULL; return 1; } const char *SSL_get_psk_identity_hint(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL || sc->session == NULL) return NULL; return sc->session->psk_identity_hint; } const char *SSL_get_psk_identity(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL || sc->session == NULL) return NULL; return sc->session->psk_identity; } void SSL_set_psk_client_callback(SSL *s, SSL_psk_client_cb_func cb) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->psk_client_callback = cb; } void SSL_CTX_set_psk_client_callback(SSL_CTX *ctx, SSL_psk_client_cb_func cb) { ctx->psk_client_callback = cb; } void SSL_set_psk_server_callback(SSL *s, SSL_psk_server_cb_func cb) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->psk_server_callback = cb; } void SSL_CTX_set_psk_server_callback(SSL_CTX *ctx, SSL_psk_server_cb_func cb) { ctx->psk_server_callback = cb; } #endif void SSL_set_psk_find_session_callback(SSL *s, SSL_psk_find_session_cb_func cb) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->psk_find_session_cb = cb; } void SSL_CTX_set_psk_find_session_callback(SSL_CTX *ctx, SSL_psk_find_session_cb_func cb) { ctx->psk_find_session_cb = cb; } void SSL_set_psk_use_session_callback(SSL *s, SSL_psk_use_session_cb_func cb) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->psk_use_session_cb = cb; } void SSL_CTX_set_psk_use_session_callback(SSL_CTX *ctx, SSL_psk_use_session_cb_func cb) { ctx->psk_use_session_cb = cb; } void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb) (int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) { SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_MSG_CALLBACK, (void (*)(void))cb); } void SSL_set_msg_callback(SSL *ssl, void (*cb) (int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) { SSL_callback_ctrl(ssl, SSL_CTRL_SET_MSG_CALLBACK, (void (*)(void))cb); } void SSL_CTX_set_not_resumable_session_callback(SSL_CTX *ctx, int (*cb) (SSL *ssl, int is_forward_secure)) { SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB, (void (*)(void))cb); } void SSL_set_not_resumable_session_callback(SSL *ssl, int (*cb) (SSL *ssl, int is_forward_secure)) { SSL_callback_ctrl(ssl, SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB, (void (*)(void))cb); } void SSL_CTX_set_record_padding_callback(SSL_CTX *ctx, size_t (*cb) (SSL *ssl, int type, size_t len, void *arg)) { ctx->record_padding_cb = cb; } void SSL_CTX_set_record_padding_callback_arg(SSL_CTX *ctx, void *arg) { ctx->record_padding_arg = arg; } void *SSL_CTX_get_record_padding_callback_arg(const SSL_CTX *ctx) { return ctx->record_padding_arg; } int SSL_CTX_set_block_padding(SSL_CTX *ctx, size_t block_size) { if (IS_QUIC_CTX(ctx) && block_size > 1) return 0; if (block_size == 1) ctx->block_padding = 0; else if (block_size <= SSL3_RT_MAX_PLAIN_LENGTH) ctx->block_padding = block_size; else return 0; return 1; } int SSL_set_record_padding_callback(SSL *ssl, size_t (*cb) (SSL *ssl, int type, size_t len, void *arg)) { BIO *b; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (sc == NULL) return 0; b = SSL_get_wbio(ssl); if (b == NULL || !BIO_get_ktls_send(b)) { sc->rlayer.record_padding_cb = cb; return 1; } return 0; } void SSL_set_record_padding_callback_arg(SSL *ssl, void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return; sc->rlayer.record_padding_arg = arg; } void *SSL_get_record_padding_callback_arg(const SSL *ssl) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL) return NULL; return sc->rlayer.record_padding_arg; } int SSL_set_block_padding(SSL *ssl, size_t block_size) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL || (IS_QUIC(ssl) && block_size > 1)) return 0; if (block_size == 1) sc->rlayer.block_padding = 0; else if (block_size <= SSL3_RT_MAX_PLAIN_LENGTH) sc->rlayer.block_padding = block_size; else return 0; return 1; } int SSL_set_num_tickets(SSL *s, size_t num_tickets) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sc->num_tickets = num_tickets; return 1; } size_t SSL_get_num_tickets(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->num_tickets; } int SSL_CTX_set_num_tickets(SSL_CTX *ctx, size_t num_tickets) { ctx->num_tickets = num_tickets; return 1; } size_t SSL_CTX_get_num_tickets(const SSL_CTX *ctx) { return ctx->num_tickets; } int ssl_handshake_hash(SSL_CONNECTION *s, unsigned char *out, size_t outlen, size_t *hashlen) { EVP_MD_CTX *ctx = NULL; EVP_MD_CTX *hdgst = s->s3.handshake_dgst; int hashleni = EVP_MD_CTX_get_size(hdgst); int ret = 0; if (hashleni < 0 || (size_t)hashleni > outlen) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ctx = EVP_MD_CTX_new(); if (ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!EVP_MD_CTX_copy_ex(ctx, hdgst) || EVP_DigestFinal_ex(ctx, out, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } *hashlen = hashleni; ret = 1; err: EVP_MD_CTX_free(ctx); return ret; } int SSL_session_reused(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->hit; } int SSL_is_server(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->server; } #ifndef OPENSSL_NO_DEPRECATED_1_1_0 void SSL_set_debug(SSL *s, int debug) { (void)s; (void)debug; } #endif void SSL_set_security_level(SSL *s, int level) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->cert->sec_level = level; } int SSL_get_security_level(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->cert->sec_level; } void SSL_set_security_callback(SSL *s, int (*cb) (const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid, void *other, void *ex)) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->cert->sec_cb = cb; } int (*SSL_get_security_callback(const SSL *s)) (const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid, void *other, void *ex) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; return sc->cert->sec_cb; } void SSL_set0_security_ex_data(SSL *s, void *ex) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; sc->cert->sec_ex = ex; } void *SSL_get0_security_ex_data(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; return sc->cert->sec_ex; } void SSL_CTX_set_security_level(SSL_CTX *ctx, int level) { ctx->cert->sec_level = level; } int SSL_CTX_get_security_level(const SSL_CTX *ctx) { return ctx->cert->sec_level; } void SSL_CTX_set_security_callback(SSL_CTX *ctx, int (*cb) (const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid, void *other, void *ex)) { ctx->cert->sec_cb = cb; } int (*SSL_CTX_get_security_callback(const SSL_CTX *ctx)) (const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid, void *other, void *ex) { return ctx->cert->sec_cb; } void SSL_CTX_set0_security_ex_data(SSL_CTX *ctx, void *ex) { ctx->cert->sec_ex = ex; } void *SSL_CTX_get0_security_ex_data(const SSL_CTX *ctx) { return ctx->cert->sec_ex; } uint64_t SSL_CTX_get_options(const SSL_CTX *ctx) { return ctx->options; } uint64_t SSL_get_options(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_get_options(s); #endif if (sc == NULL) return 0; return sc->options; } uint64_t SSL_CTX_set_options(SSL_CTX *ctx, uint64_t op) { return ctx->options |= op; } uint64_t SSL_set_options(SSL *s, uint64_t op) { SSL_CONNECTION *sc; OSSL_PARAM options[2], *opts = options; #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_set_options(s, op); #endif sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sc->options |= op; *opts++ = OSSL_PARAM_construct_uint64(OSSL_LIBSSL_RECORD_LAYER_PARAM_OPTIONS, &sc->options); *opts = OSSL_PARAM_construct_end(); sc->rlayer.rrlmethod->set_options(sc->rlayer.rrl, options); sc->rlayer.wrlmethod->set_options(sc->rlayer.wrl, options); return sc->options; } uint64_t SSL_CTX_clear_options(SSL_CTX *ctx, uint64_t op) { return ctx->options &= ~op; } uint64_t SSL_clear_options(SSL *s, uint64_t op) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); OSSL_PARAM options[2], *opts = options; #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_clear_options(s, op); #endif if (sc == NULL) return 0; sc->options &= ~op; *opts++ = OSSL_PARAM_construct_uint64(OSSL_LIBSSL_RECORD_LAYER_PARAM_OPTIONS, &sc->options); *opts = OSSL_PARAM_construct_end(); sc->rlayer.rrlmethod->set_options(sc->rlayer.rrl, options); sc->rlayer.wrlmethod->set_options(sc->rlayer.wrl, options); return sc->options; } STACK_OF(X509) *SSL_get0_verified_chain(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; return sc->verified_chain; } IMPLEMENT_OBJ_BSEARCH_GLOBAL_CMP_FN(SSL_CIPHER, SSL_CIPHER, ssl_cipher_id); #ifndef OPENSSL_NO_CT static int ct_move_scts(STACK_OF(SCT) **dst, STACK_OF(SCT) *src, sct_source_t origin) { int scts_moved = 0; SCT *sct = NULL; if (*dst == NULL) { *dst = sk_SCT_new_null(); if (*dst == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } } while ((sct = sk_SCT_pop(src)) != NULL) { if (SCT_set_source(sct, origin) != 1) goto err; if (!sk_SCT_push(*dst, sct)) goto err; scts_moved += 1; } return scts_moved; err: SCT_free(sct); return -1; } static int ct_extract_tls_extension_scts(SSL_CONNECTION *s) { int scts_extracted = 0; if (s->ext.scts != NULL) { const unsigned char *p = s->ext.scts; STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION); SCT_LIST_free(scts); } return scts_extracted; } static int ct_extract_ocsp_response_scts(SSL_CONNECTION *s) { # ifndef OPENSSL_NO_OCSP int scts_extracted = 0; const unsigned char *p; OCSP_BASICRESP *br = NULL; OCSP_RESPONSE *rsp = NULL; STACK_OF(SCT) *scts = NULL; int i; if (s->ext.ocsp.resp == NULL || s->ext.ocsp.resp_len == 0) goto err; p = s->ext.ocsp.resp; rsp = d2i_OCSP_RESPONSE(NULL, &p, (int)s->ext.ocsp.resp_len); if (rsp == NULL) goto err; br = OCSP_response_get1_basic(rsp); if (br == NULL) goto err; for (i = 0; i < OCSP_resp_count(br); ++i) { OCSP_SINGLERESP *single = OCSP_resp_get0(br, i); if (single == NULL) continue; scts = OCSP_SINGLERESP_get1_ext_d2i(single, NID_ct_cert_scts, NULL, NULL); scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_OCSP_STAPLED_RESPONSE); if (scts_extracted < 0) goto err; } err: SCT_LIST_free(scts); OCSP_BASICRESP_free(br); OCSP_RESPONSE_free(rsp); return scts_extracted; # else return 0; # endif } static int ct_extract_x509v3_extension_scts(SSL_CONNECTION *s) { int scts_extracted = 0; X509 *cert = s->session != NULL ? s->session->peer : NULL; if (cert != NULL) { STACK_OF(SCT) *scts = X509_get_ext_d2i(cert, NID_ct_precert_scts, NULL, NULL); scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_X509V3_EXTENSION); SCT_LIST_free(scts); } return scts_extracted; } const STACK_OF(SCT) *SSL_get0_peer_scts(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; if (!sc->scts_parsed) { if (ct_extract_tls_extension_scts(sc) < 0 || ct_extract_ocsp_response_scts(sc) < 0 || ct_extract_x509v3_extension_scts(sc) < 0) goto err; sc->scts_parsed = 1; } return sc->scts; err: return NULL; } static int ct_permissive(const CT_POLICY_EVAL_CTX *ctx, const STACK_OF(SCT) *scts, void *unused_arg) { return 1; } static int ct_strict(const CT_POLICY_EVAL_CTX *ctx, const STACK_OF(SCT) *scts, void *unused_arg) { int count = scts != NULL ? sk_SCT_num(scts) : 0; int i; for (i = 0; i < count; ++i) { SCT *sct = sk_SCT_value(scts, i); int status = SCT_get_validation_status(sct); if (status == SCT_VALIDATION_STATUS_VALID) return 1; } ERR_raise(ERR_LIB_SSL, SSL_R_NO_VALID_SCTS); return 0; } int SSL_set_ct_validation_callback(SSL *s, ssl_ct_validation_cb callback, void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (callback != NULL && SSL_CTX_has_client_custom_ext(s->ctx, TLSEXT_TYPE_signed_certificate_timestamp)) { ERR_raise(ERR_LIB_SSL, SSL_R_CUSTOM_EXT_HANDLER_ALREADY_INSTALLED); return 0; } if (callback != NULL) { if (!SSL_set_tlsext_status_type(s, TLSEXT_STATUSTYPE_ocsp)) return 0; } sc->ct_validation_callback = callback; sc->ct_validation_callback_arg = arg; return 1; } int SSL_CTX_set_ct_validation_callback(SSL_CTX *ctx, ssl_ct_validation_cb callback, void *arg) { if (callback != NULL && SSL_CTX_has_client_custom_ext(ctx, TLSEXT_TYPE_signed_certificate_timestamp)) { ERR_raise(ERR_LIB_SSL, SSL_R_CUSTOM_EXT_HANDLER_ALREADY_INSTALLED); return 0; } ctx->ct_validation_callback = callback; ctx->ct_validation_callback_arg = arg; return 1; } int SSL_ct_is_enabled(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->ct_validation_callback != NULL; } int SSL_CTX_ct_is_enabled(const SSL_CTX *ctx) { return ctx->ct_validation_callback != NULL; } int ssl_validate_ct(SSL_CONNECTION *s) { int ret = 0; X509 *cert = s->session != NULL ? s->session->peer : NULL; X509 *issuer; SSL_DANE *dane = &s->dane; CT_POLICY_EVAL_CTX *ctx = NULL; const STACK_OF(SCT) *scts; if (s->ct_validation_callback == NULL || cert == NULL || s->verify_result != X509_V_OK || s->verified_chain == NULL || sk_X509_num(s->verified_chain) <= 1) return 1; if (DANETLS_ENABLED(dane) && dane->mtlsa != NULL) { switch (dane->mtlsa->usage) { case DANETLS_USAGE_DANE_TA: case DANETLS_USAGE_DANE_EE: return 1; } } ctx = CT_POLICY_EVAL_CTX_new_ex(SSL_CONNECTION_GET_CTX(s)->libctx, SSL_CONNECTION_GET_CTX(s)->propq); if (ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CT_LIB); goto end; } issuer = sk_X509_value(s->verified_chain, 1); CT_POLICY_EVAL_CTX_set1_cert(ctx, cert); CT_POLICY_EVAL_CTX_set1_issuer(ctx, issuer); CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(ctx, SSL_CONNECTION_GET_CTX(s)->ctlog_store); CT_POLICY_EVAL_CTX_set_time( ctx, (uint64_t)SSL_SESSION_get_time(s->session) * 1000); scts = SSL_get0_peer_scts(SSL_CONNECTION_GET_SSL(s)); if (SCT_LIST_validate(scts, ctx) < 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_SCT_VERIFICATION_FAILED); goto end; } ret = s->ct_validation_callback(ctx, scts, s->ct_validation_callback_arg); if (ret < 0) ret = 0; if (!ret) SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_CALLBACK_FAILED); end: CT_POLICY_EVAL_CTX_free(ctx); if (ret <= 0) s->verify_result = X509_V_ERR_NO_VALID_SCTS; return ret; } int SSL_CTX_enable_ct(SSL_CTX *ctx, int validation_mode) { switch (validation_mode) { default: ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_CT_VALIDATION_TYPE); return 0; case SSL_CT_VALIDATION_PERMISSIVE: return SSL_CTX_set_ct_validation_callback(ctx, ct_permissive, NULL); case SSL_CT_VALIDATION_STRICT: return SSL_CTX_set_ct_validation_callback(ctx, ct_strict, NULL); } } int SSL_enable_ct(SSL *s, int validation_mode) { switch (validation_mode) { default: ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_CT_VALIDATION_TYPE); return 0; case SSL_CT_VALIDATION_PERMISSIVE: return SSL_set_ct_validation_callback(s, ct_permissive, NULL); case SSL_CT_VALIDATION_STRICT: return SSL_set_ct_validation_callback(s, ct_strict, NULL); } } int SSL_CTX_set_default_ctlog_list_file(SSL_CTX *ctx) { return CTLOG_STORE_load_default_file(ctx->ctlog_store); } int SSL_CTX_set_ctlog_list_file(SSL_CTX *ctx, const char *path) { return CTLOG_STORE_load_file(ctx->ctlog_store, path); } void SSL_CTX_set0_ctlog_store(SSL_CTX *ctx, CTLOG_STORE *logs) { CTLOG_STORE_free(ctx->ctlog_store); ctx->ctlog_store = logs; } const CTLOG_STORE *SSL_CTX_get0_ctlog_store(const SSL_CTX *ctx) { return ctx->ctlog_store; } #endif void SSL_CTX_set_client_hello_cb(SSL_CTX *c, SSL_client_hello_cb_fn cb, void *arg) { c->client_hello_cb = cb; c->client_hello_cb_arg = arg; } int SSL_client_hello_isv2(SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL) return 0; return sc->clienthello->isv2; } unsigned int SSL_client_hello_get0_legacy_version(SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL) return 0; return sc->clienthello->legacy_version; } size_t SSL_client_hello_get0_random(SSL *s, const unsigned char **out) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL) return 0; if (out != NULL) *out = sc->clienthello->random; return SSL3_RANDOM_SIZE; } size_t SSL_client_hello_get0_session_id(SSL *s, const unsigned char **out) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL) return 0; if (out != NULL) *out = sc->clienthello->session_id; return sc->clienthello->session_id_len; } size_t SSL_client_hello_get0_ciphers(SSL *s, const unsigned char **out) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL) return 0; if (out != NULL) *out = PACKET_data(&sc->clienthello->ciphersuites); return PACKET_remaining(&sc->clienthello->ciphersuites); } size_t SSL_client_hello_get0_compression_methods(SSL *s, const unsigned char **out) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL) return 0; if (out != NULL) *out = sc->clienthello->compressions; return sc->clienthello->compressions_len; } int SSL_client_hello_get1_extensions_present(SSL *s, int **out, size_t *outlen) { RAW_EXTENSION *ext; int *present; size_t num = 0, i; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL || out == NULL || outlen == NULL) return 0; for (i = 0; i < sc->clienthello->pre_proc_exts_len; i++) { ext = sc->clienthello->pre_proc_exts + i; if (ext->present) num++; } if (num == 0) { *out = NULL; *outlen = 0; return 1; } if ((present = OPENSSL_malloc(sizeof(*present) * num)) == NULL) return 0; for (i = 0; i < sc->clienthello->pre_proc_exts_len; i++) { ext = sc->clienthello->pre_proc_exts + i; if (ext->present) { if (ext->received_order >= num) goto err; present[ext->received_order] = ext->type; } } *out = present; *outlen = num; return 1; err: OPENSSL_free(present); return 0; } int SSL_client_hello_get_extension_order(SSL *s, uint16_t *exts, size_t *num_exts) { RAW_EXTENSION *ext; size_t num = 0, i; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL || num_exts == NULL) return 0; for (i = 0; i < sc->clienthello->pre_proc_exts_len; i++) { ext = sc->clienthello->pre_proc_exts + i; if (ext->present) num++; } if (num == 0) { *num_exts = 0; return 1; } if (exts == NULL) { *num_exts = num; return 1; } if (*num_exts < num) return 0; for (i = 0; i < sc->clienthello->pre_proc_exts_len; i++) { ext = sc->clienthello->pre_proc_exts + i; if (ext->present) { if (ext->received_order >= num) return 0; exts[ext->received_order] = ext->type; } } *num_exts = num; return 1; } int SSL_client_hello_get0_ext(SSL *s, unsigned int type, const unsigned char **out, size_t *outlen) { size_t i; RAW_EXTENSION *r; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->clienthello == NULL) return 0; for (i = 0; i < sc->clienthello->pre_proc_exts_len; ++i) { r = sc->clienthello->pre_proc_exts + i; if (r->present && r->type == type) { if (out != NULL) *out = PACKET_data(&r->data); if (outlen != NULL) *outlen = PACKET_remaining(&r->data); return 1; } } return 0; } int SSL_free_buffers(SSL *ssl) { RECORD_LAYER *rl; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (sc == NULL) return 0; rl = &sc->rlayer; return rl->rrlmethod->free_buffers(rl->rrl) && rl->wrlmethod->free_buffers(rl->wrl); } int SSL_alloc_buffers(SSL *ssl) { RECORD_LAYER *rl; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; if (IS_QUIC(ssl)) return 1; rl = &sc->rlayer; return rl->rrlmethod->alloc_buffers(rl->rrl) && rl->wrlmethod->alloc_buffers(rl->wrl); } void SSL_CTX_set_keylog_callback(SSL_CTX *ctx, SSL_CTX_keylog_cb_func cb) { ctx->keylog_callback = cb; } SSL_CTX_keylog_cb_func SSL_CTX_get_keylog_callback(const SSL_CTX *ctx) { return ctx->keylog_callback; } static int nss_keylog_int(const char *prefix, SSL_CONNECTION *sc, const uint8_t *parameter_1, size_t parameter_1_len, const uint8_t *parameter_2, size_t parameter_2_len) { char *out = NULL; char *cursor = NULL; size_t out_len = 0; size_t i; size_t prefix_len; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(sc); if (sctx->keylog_callback == NULL) return 1; prefix_len = strlen(prefix); out_len = prefix_len + (2 * parameter_1_len) + (2 * parameter_2_len) + 3; if ((out = cursor = OPENSSL_malloc(out_len)) == NULL) return 0; strcpy(cursor, prefix); cursor += prefix_len; *cursor++ = ' '; for (i = 0; i < parameter_1_len; i++) { sprintf(cursor, "%02x", parameter_1[i]); cursor += 2; } *cursor++ = ' '; for (i = 0; i < parameter_2_len; i++) { sprintf(cursor, "%02x", parameter_2[i]); cursor += 2; } *cursor = '\0'; sctx->keylog_callback(SSL_CONNECTION_GET_SSL(sc), (const char *)out); OPENSSL_clear_free(out, out_len); return 1; } int ssl_log_rsa_client_key_exchange(SSL_CONNECTION *sc, const uint8_t *encrypted_premaster, size_t encrypted_premaster_len, const uint8_t *premaster, size_t premaster_len) { if (encrypted_premaster_len < 8) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return nss_keylog_int("RSA", sc, encrypted_premaster, 8, premaster, premaster_len); } int ssl_log_secret(SSL_CONNECTION *sc, const char *label, const uint8_t *secret, size_t secret_len) { return nss_keylog_int(label, sc, sc->s3.client_random, SSL3_RANDOM_SIZE, secret, secret_len); } #define SSLV2_CIPHER_LEN 3 int ssl_cache_cipherlist(SSL_CONNECTION *s, PACKET *cipher_suites, int sslv2format) { int n; n = sslv2format ? SSLV2_CIPHER_LEN : TLS_CIPHER_LEN; if (PACKET_remaining(cipher_suites) == 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_NO_CIPHERS_SPECIFIED); return 0; } if (PACKET_remaining(cipher_suites) % n != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST); return 0; } OPENSSL_free(s->s3.tmp.ciphers_raw); s->s3.tmp.ciphers_raw = NULL; s->s3.tmp.ciphers_rawlen = 0; if (sslv2format) { size_t numciphers = PACKET_remaining(cipher_suites) / n; PACKET sslv2ciphers = *cipher_suites; unsigned int leadbyte; unsigned char *raw; raw = OPENSSL_malloc(numciphers * TLS_CIPHER_LEN); s->s3.tmp.ciphers_raw = raw; if (raw == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } for (s->s3.tmp.ciphers_rawlen = 0; PACKET_remaining(&sslv2ciphers) > 0; raw += TLS_CIPHER_LEN) { if (!PACKET_get_1(&sslv2ciphers, &leadbyte) || (leadbyte == 0 && !PACKET_copy_bytes(&sslv2ciphers, raw, TLS_CIPHER_LEN)) || (leadbyte != 0 && !PACKET_forward(&sslv2ciphers, TLS_CIPHER_LEN))) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_PACKET); OPENSSL_free(s->s3.tmp.ciphers_raw); s->s3.tmp.ciphers_raw = NULL; s->s3.tmp.ciphers_rawlen = 0; return 0; } if (leadbyte == 0) s->s3.tmp.ciphers_rawlen += TLS_CIPHER_LEN; } } else if (!PACKET_memdup(cipher_suites, &s->s3.tmp.ciphers_raw, &s->s3.tmp.ciphers_rawlen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } int SSL_bytes_to_cipher_list(SSL *s, const unsigned char *bytes, size_t len, int isv2format, STACK_OF(SSL_CIPHER) **sk, STACK_OF(SSL_CIPHER) **scsvs) { PACKET pkt; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (!PACKET_buf_init(&pkt, bytes, len)) return 0; return ossl_bytes_to_cipher_list(sc, &pkt, sk, scsvs, isv2format, 0); } int ossl_bytes_to_cipher_list(SSL_CONNECTION *s, PACKET *cipher_suites, STACK_OF(SSL_CIPHER) **skp, STACK_OF(SSL_CIPHER) **scsvs_out, int sslv2format, int fatal) { const SSL_CIPHER *c; STACK_OF(SSL_CIPHER) *sk = NULL; STACK_OF(SSL_CIPHER) *scsvs = NULL; int n; unsigned char cipher[SSLV2_CIPHER_LEN]; n = sslv2format ? SSLV2_CIPHER_LEN : TLS_CIPHER_LEN; if (PACKET_remaining(cipher_suites) == 0) { if (fatal) SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_NO_CIPHERS_SPECIFIED); else ERR_raise(ERR_LIB_SSL, SSL_R_NO_CIPHERS_SPECIFIED); return 0; } if (PACKET_remaining(cipher_suites) % n != 0) { if (fatal) SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST); else ERR_raise(ERR_LIB_SSL, SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST); return 0; } sk = sk_SSL_CIPHER_new_null(); scsvs = sk_SSL_CIPHER_new_null(); if (sk == NULL || scsvs == NULL) { if (fatal) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); else ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } while (PACKET_copy_bytes(cipher_suites, cipher, n)) { if (sslv2format && cipher[0] != '\0') continue; c = ssl_get_cipher_by_char(s, sslv2format ? &cipher[1] : cipher, 1); if (c != NULL) { if ((c->valid && !sk_SSL_CIPHER_push(sk, c)) || (!c->valid && !sk_SSL_CIPHER_push(scsvs, c))) { if (fatal) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); else ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } } } if (PACKET_remaining(cipher_suites) > 0) { if (fatal) SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH); else ERR_raise(ERR_LIB_SSL, SSL_R_BAD_LENGTH); goto err; } if (skp != NULL) *skp = sk; else sk_SSL_CIPHER_free(sk); if (scsvs_out != NULL) *scsvs_out = scsvs; else sk_SSL_CIPHER_free(scsvs); return 1; err: sk_SSL_CIPHER_free(sk); sk_SSL_CIPHER_free(scsvs); return 0; } int SSL_CTX_set_max_early_data(SSL_CTX *ctx, uint32_t max_early_data) { ctx->max_early_data = max_early_data; return 1; } uint32_t SSL_CTX_get_max_early_data(const SSL_CTX *ctx) { return ctx->max_early_data; } int SSL_set_max_early_data(SSL *s, uint32_t max_early_data) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; sc->max_early_data = max_early_data; return 1; } uint32_t SSL_get_max_early_data(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->max_early_data; } int SSL_CTX_set_recv_max_early_data(SSL_CTX *ctx, uint32_t recv_max_early_data) { ctx->recv_max_early_data = recv_max_early_data; return 1; } uint32_t SSL_CTX_get_recv_max_early_data(const SSL_CTX *ctx) { return ctx->recv_max_early_data; } int SSL_set_recv_max_early_data(SSL *s, uint32_t recv_max_early_data) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; sc->recv_max_early_data = recv_max_early_data; return 1; } uint32_t SSL_get_recv_max_early_data(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->recv_max_early_data; } __owur unsigned int ssl_get_max_send_fragment(const SSL_CONNECTION *sc) { if (sc->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(sc->session)) return GET_MAX_FRAGMENT_LENGTH(sc->session); return sc->max_send_fragment; } __owur unsigned int ssl_get_split_send_fragment(const SSL_CONNECTION *sc) { if (sc->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(sc->session) && sc->split_send_fragment > GET_MAX_FRAGMENT_LENGTH(sc->session)) return GET_MAX_FRAGMENT_LENGTH(sc->session); if (sc->split_send_fragment > sc->max_send_fragment) return sc->max_send_fragment; return sc->split_send_fragment; } int SSL_stateless(SSL *s) { int ret; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return 0; if (!SSL_clear(s)) return 0; ERR_clear_error(); sc->s3.flags |= TLS1_FLAGS_STATELESS; ret = SSL_accept(s); sc->s3.flags &= ~TLS1_FLAGS_STATELESS; if (ret > 0 && sc->ext.cookieok) return 1; if (sc->hello_retry_request == SSL_HRR_PENDING && !ossl_statem_in_error(sc)) return 0; return -1; } void SSL_CTX_set_post_handshake_auth(SSL_CTX *ctx, int val) { ctx->pha_enabled = val; } void SSL_set_post_handshake_auth(SSL *ssl, int val) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (sc == NULL) return; sc->pha_enabled = val; } int SSL_verify_client_post_handshake(SSL *ssl) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(ssl)) { ERR_raise(ERR_LIB_SSL, SSL_R_WRONG_SSL_VERSION); return 0; } #endif if (sc == NULL) return 0; if (!SSL_CONNECTION_IS_TLS13(sc)) { ERR_raise(ERR_LIB_SSL, SSL_R_WRONG_SSL_VERSION); return 0; } if (!sc->server) { ERR_raise(ERR_LIB_SSL, SSL_R_NOT_SERVER); return 0; } if (!SSL_is_init_finished(ssl)) { ERR_raise(ERR_LIB_SSL, SSL_R_STILL_IN_INIT); return 0; } switch (sc->post_handshake_auth) { case SSL_PHA_NONE: ERR_raise(ERR_LIB_SSL, SSL_R_EXTENSION_NOT_RECEIVED); return 0; default: case SSL_PHA_EXT_SENT: ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; case SSL_PHA_EXT_RECEIVED: break; case SSL_PHA_REQUEST_PENDING: ERR_raise(ERR_LIB_SSL, SSL_R_REQUEST_PENDING); return 0; case SSL_PHA_REQUESTED: ERR_raise(ERR_LIB_SSL, SSL_R_REQUEST_SENT); return 0; } sc->post_handshake_auth = SSL_PHA_REQUEST_PENDING; if (!send_certificate_request(sc)) { sc->post_handshake_auth = SSL_PHA_EXT_RECEIVED; ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_CONFIG); return 0; } ossl_statem_set_in_init(sc, 1); return 1; } int SSL_CTX_set_session_ticket_cb(SSL_CTX *ctx, SSL_CTX_generate_session_ticket_fn gen_cb, SSL_CTX_decrypt_session_ticket_fn dec_cb, void *arg) { ctx->generate_ticket_cb = gen_cb; ctx->decrypt_ticket_cb = dec_cb; ctx->ticket_cb_data = arg; return 1; } void SSL_CTX_set_allow_early_data_cb(SSL_CTX *ctx, SSL_allow_early_data_cb_fn cb, void *arg) { ctx->allow_early_data_cb = cb; ctx->allow_early_data_cb_data = arg; } void SSL_set_allow_early_data_cb(SSL *s, SSL_allow_early_data_cb_fn cb, void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return; sc->allow_early_data_cb = cb; sc->allow_early_data_cb_data = arg; } const EVP_CIPHER *ssl_evp_cipher_fetch(OSSL_LIB_CTX *libctx, int nid, const char *properties) { const EVP_CIPHER *ciph; ciph = tls_get_cipher_from_engine(nid); if (ciph != NULL) return ciph; ERR_set_mark(); ciph = EVP_CIPHER_fetch(libctx, OBJ_nid2sn(nid), properties); ERR_pop_to_mark(); return ciph; } int ssl_evp_cipher_up_ref(const EVP_CIPHER *cipher) { if (EVP_CIPHER_get0_provider(cipher) == NULL) return 1; return EVP_CIPHER_up_ref((EVP_CIPHER *)cipher); } void ssl_evp_cipher_free(const EVP_CIPHER *cipher) { if (cipher == NULL) return; if (EVP_CIPHER_get0_provider(cipher) != NULL) { EVP_CIPHER_free((EVP_CIPHER *)cipher); } } const EVP_MD *ssl_evp_md_fetch(OSSL_LIB_CTX *libctx, int nid, const char *properties) { const EVP_MD *md; md = tls_get_digest_from_engine(nid); if (md != NULL) return md; ERR_set_mark(); md = EVP_MD_fetch(libctx, OBJ_nid2sn(nid), properties); ERR_pop_to_mark(); return md; } int ssl_evp_md_up_ref(const EVP_MD *md) { if (EVP_MD_get0_provider(md) == NULL) return 1; return EVP_MD_up_ref((EVP_MD *)md); } void ssl_evp_md_free(const EVP_MD *md) { if (md == NULL) return; if (EVP_MD_get0_provider(md) != NULL) { EVP_MD_free((EVP_MD *)md); } } int SSL_set0_tmp_dh_pkey(SSL *s, EVP_PKEY *dhpkey) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (!ssl_security(sc, SSL_SECOP_TMP_DH, EVP_PKEY_get_security_bits(dhpkey), 0, dhpkey)) { ERR_raise(ERR_LIB_SSL, SSL_R_DH_KEY_TOO_SMALL); return 0; } EVP_PKEY_free(sc->cert->dh_tmp); sc->cert->dh_tmp = dhpkey; return 1; } int SSL_CTX_set0_tmp_dh_pkey(SSL_CTX *ctx, EVP_PKEY *dhpkey) { if (!ssl_ctx_security(ctx, SSL_SECOP_TMP_DH, EVP_PKEY_get_security_bits(dhpkey), 0, dhpkey)) { ERR_raise(ERR_LIB_SSL, SSL_R_DH_KEY_TOO_SMALL); return 0; } EVP_PKEY_free(ctx->cert->dh_tmp); ctx->cert->dh_tmp = dhpkey; return 1; } int SSL_handle_events(SSL *s) { SSL_CONNECTION *sc; #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_handle_events(s); #endif sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc != NULL && SSL_CONNECTION_IS_DTLS(sc)) return DTLSv1_handle_timeout(s) >= 0; return 1; } int SSL_get_event_timeout(SSL *s, struct timeval *tv, int *is_infinite) { SSL_CONNECTION *sc; #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_get_event_timeout(s, tv, is_infinite); #endif sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc != NULL && SSL_CONNECTION_IS_DTLS(sc) && DTLSv1_get_timeout(s, tv)) { *is_infinite = 0; return 1; } tv->tv_sec = 1000000; tv->tv_usec = 0; *is_infinite = 1; return 1; } int SSL_get_rpoll_descriptor(SSL *s, BIO_POLL_DESCRIPTOR *desc) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_get_rpoll_descriptor(s, desc); #endif if (sc == NULL || sc->rbio == NULL) return 0; return BIO_get_rpoll_descriptor(sc->rbio, desc); } int SSL_get_wpoll_descriptor(SSL *s, BIO_POLL_DESCRIPTOR *desc) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_get_wpoll_descriptor(s, desc); #endif if (sc == NULL || sc->wbio == NULL) return 0; return BIO_get_wpoll_descriptor(sc->wbio, desc); } int SSL_net_read_desired(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return SSL_want_read(s); return ossl_quic_get_net_read_desired(s); #else return SSL_want_read(s); #endif } int SSL_net_write_desired(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return SSL_want_write(s); return ossl_quic_get_net_write_desired(s); #else return SSL_want_write(s); #endif } int SSL_set_blocking_mode(SSL *s, int blocking) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return 0; return ossl_quic_conn_set_blocking_mode(s, blocking); #else return 0; #endif } int SSL_get_blocking_mode(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return -1; return ossl_quic_conn_get_blocking_mode(s); #else return -1; #endif } int SSL_set1_initial_peer_addr(SSL *s, const BIO_ADDR *peer_addr) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return 0; return ossl_quic_conn_set_initial_peer_addr(s, peer_addr); #else return 0; #endif } int SSL_shutdown_ex(SSL *ssl, uint64_t flags, const SSL_SHUTDOWN_EX_ARGS *args, size_t args_len) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(ssl)) return SSL_shutdown(ssl); return ossl_quic_conn_shutdown(ssl, flags, args, args_len); #else return SSL_shutdown(ssl); #endif } int SSL_stream_conclude(SSL *ssl, uint64_t flags) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(ssl)) return 0; return ossl_quic_conn_stream_conclude(ssl); #else return 0; #endif } SSL *SSL_new_stream(SSL *s, uint64_t flags) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return NULL; return ossl_quic_conn_stream_new(s, flags); #else return NULL; #endif } SSL *SSL_get0_connection(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return s; return ossl_quic_get0_connection(s); #else return s; #endif } int SSL_is_connection(SSL *s) { return SSL_get0_connection(s) == s; } int SSL_get_stream_type(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return SSL_STREAM_TYPE_BIDI; return ossl_quic_get_stream_type(s); #else return SSL_STREAM_TYPE_BIDI; #endif } uint64_t SSL_get_stream_id(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return UINT64_MAX; return ossl_quic_get_stream_id(s); #else return UINT64_MAX; #endif } int SSL_is_stream_local(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return -1; return ossl_quic_is_stream_local(s); #else return -1; #endif } int SSL_set_default_stream_mode(SSL *s, uint32_t mode) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return 0; return ossl_quic_set_default_stream_mode(s, mode); #else return 0; #endif } int SSL_set_incoming_stream_policy(SSL *s, int policy, uint64_t aec) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return 0; return ossl_quic_set_incoming_stream_policy(s, policy, aec); #else return 0; #endif } SSL *SSL_accept_stream(SSL *s, uint64_t flags) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return NULL; return ossl_quic_accept_stream(s, flags); #else return NULL; #endif } size_t SSL_get_accept_stream_queue_len(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return 0; return ossl_quic_get_accept_stream_queue_len(s); #else return 0; #endif } int SSL_stream_reset(SSL *s, const SSL_STREAM_RESET_ARGS *args, size_t args_len) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return 0; return ossl_quic_stream_reset(s, args, args_len); #else return 0; #endif } int SSL_get_stream_read_state(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return SSL_STREAM_STATE_NONE; return ossl_quic_get_stream_read_state(s); #else return SSL_STREAM_STATE_NONE; #endif } int SSL_get_stream_write_state(SSL *s) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return SSL_STREAM_STATE_NONE; return ossl_quic_get_stream_write_state(s); #else return SSL_STREAM_STATE_NONE; #endif } int SSL_get_stream_read_error_code(SSL *s, uint64_t *app_error_code) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return -1; return ossl_quic_get_stream_read_error_code(s, app_error_code); #else return -1; #endif } int SSL_get_stream_write_error_code(SSL *s, uint64_t *app_error_code) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return -1; return ossl_quic_get_stream_write_error_code(s, app_error_code); #else return -1; #endif } int SSL_get_conn_close_info(SSL *s, SSL_CONN_CLOSE_INFO *info, size_t info_len) { #ifndef OPENSSL_NO_QUIC if (!IS_QUIC(s)) return -1; return ossl_quic_get_conn_close_info(s, info, info_len); #else return -1; #endif } int SSL_get_value_uint(SSL *s, uint32_t class_, uint32_t id, uint64_t *value) { #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_get_value_uint(s, class_, id, value); #endif ERR_raise(ERR_LIB_SSL, SSL_R_UNSUPPORTED_PROTOCOL); return 0; } int SSL_set_value_uint(SSL *s, uint32_t class_, uint32_t id, uint64_t value) { #ifndef OPENSSL_NO_QUIC if (IS_QUIC(s)) return ossl_quic_set_value_uint(s, class_, id, value); #endif ERR_raise(ERR_LIB_SSL, SSL_R_UNSUPPORTED_PROTOCOL); return 0; } int SSL_add_expected_rpk(SSL *s, EVP_PKEY *rpk) { unsigned char *data = NULL; SSL_DANE *dane = SSL_get0_dane(s); int ret; if (dane == NULL || dane->dctx == NULL) return 0; if ((ret = i2d_PUBKEY(rpk, &data)) <= 0) return 0; ret = SSL_dane_tlsa_add(s, DANETLS_USAGE_DANE_EE, DANETLS_SELECTOR_SPKI, DANETLS_MATCHING_FULL, data, (size_t)ret) > 0; OPENSSL_free(data); return ret; } EVP_PKEY *SSL_get0_peer_rpk(const SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL || sc->session == NULL) return NULL; return sc->session->peer_rpk; } int SSL_get_negotiated_client_cert_type(const SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return sc->ext.client_cert_type; } int SSL_get_negotiated_server_cert_type(const SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return sc->ext.server_cert_type; } static int validate_cert_type(const unsigned char *val, size_t len) { size_t i; int saw_rpk = 0; int saw_x509 = 0; if (val == NULL && len == 0) return 1; if (val == NULL || len == 0) return 0; for (i = 0; i < len; i++) { switch (val[i]) { case TLSEXT_cert_type_rpk: if (saw_rpk) return 0; saw_rpk = 1; break; case TLSEXT_cert_type_x509: if (saw_x509) return 0; saw_x509 = 1; break; case TLSEXT_cert_type_pgp: case TLSEXT_cert_type_1609dot2: default: return 0; } } return 1; } static int set_cert_type(unsigned char **cert_type, size_t *cert_type_len, const unsigned char *val, size_t len) { unsigned char *tmp = NULL; if (!validate_cert_type(val, len)) return 0; if (val != NULL && (tmp = OPENSSL_memdup(val, len)) == NULL) return 0; OPENSSL_free(*cert_type); *cert_type = tmp; *cert_type_len = len; return 1; } int SSL_set1_client_cert_type(SSL *s, const unsigned char *val, size_t len) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); return set_cert_type(&sc->client_cert_type, &sc->client_cert_type_len, val, len); } int SSL_set1_server_cert_type(SSL *s, const unsigned char *val, size_t len) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); return set_cert_type(&sc->server_cert_type, &sc->server_cert_type_len, val, len); } int SSL_CTX_set1_client_cert_type(SSL_CTX *ctx, const unsigned char *val, size_t len) { return set_cert_type(&ctx->client_cert_type, &ctx->client_cert_type_len, val, len); } int SSL_CTX_set1_server_cert_type(SSL_CTX *ctx, const unsigned char *val, size_t len) { return set_cert_type(&ctx->server_cert_type, &ctx->server_cert_type_len, val, len); } int SSL_get0_client_cert_type(const SSL *s, unsigned char **t, size_t *len) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (t == NULL || len == NULL) return 0; *t = sc->client_cert_type; *len = sc->client_cert_type_len; return 1; } int SSL_get0_server_cert_type(const SSL *s, unsigned char **t, size_t *len) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (t == NULL || len == NULL) return 0; *t = sc->server_cert_type; *len = sc->server_cert_type_len; return 1; } int SSL_CTX_get0_client_cert_type(const SSL_CTX *ctx, unsigned char **t, size_t *len) { if (t == NULL || len == NULL) return 0; *t = ctx->client_cert_type; *len = ctx->client_cert_type_len; return 1; } int SSL_CTX_get0_server_cert_type(const SSL_CTX *ctx, unsigned char **t, size_t *len) { if (t == NULL || len == NULL) return 0; *t = ctx->server_cert_type; *len = ctx->server_cert_type_len; return 1; }
ssl
openssl/ssl/ssl_lib.c
openssl
#include <stdio.h> #include "ssl_local.h" #include <openssl/conf.h> #include <openssl/objects.h> #include <openssl/decoder.h> #include <openssl/core_dispatch.h> #include "internal/nelem.h" typedef struct { const char *name; int namelen; unsigned int name_flags; uint64_t option_value; } ssl_flag_tbl; typedef struct { uint64_t option_value; unsigned int name_flags; } ssl_switch_tbl; #define SSL_TFLAG_INV 0x1 #define SSL_TFLAG_TYPE_MASK 0xf00 #define SSL_TFLAG_OPTION 0x000 #define SSL_TFLAG_CERT 0x100 #define SSL_TFLAG_VFY 0x200 #define SSL_TFLAG_CLIENT SSL_CONF_FLAG_CLIENT #define SSL_TFLAG_SERVER SSL_CONF_FLAG_SERVER #define SSL_TFLAG_BOTH (SSL_TFLAG_CLIENT|SSL_TFLAG_SERVER) #define SSL_FLAG_TBL(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_BOTH, flag} #define SSL_FLAG_TBL_SRV(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_SERVER, flag} #define SSL_FLAG_TBL_CLI(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_CLIENT, flag} #define SSL_FLAG_TBL_INV(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_INV|SSL_TFLAG_BOTH, flag} #define SSL_FLAG_TBL_SRV_INV(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_INV|SSL_TFLAG_SERVER, flag} #define SSL_FLAG_TBL_CERT(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_CERT|SSL_TFLAG_BOTH, flag} #define SSL_FLAG_VFY_CLI(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_VFY | SSL_TFLAG_CLIENT, flag} #define SSL_FLAG_VFY_SRV(str, flag) \ {str, (int)(sizeof(str) - 1), SSL_TFLAG_VFY | SSL_TFLAG_SERVER, flag} struct ssl_conf_ctx_st { unsigned int flags; char *prefix; size_t prefixlen; SSL_CTX *ctx; SSL *ssl; uint64_t *poptions; char *cert_filename[SSL_PKEY_NUM]; uint32_t *pcert_flags; uint32_t *pvfy_flags; int *min_version; int *max_version; const ssl_flag_tbl *tbl; size_t ntbl; STACK_OF(X509_NAME) *canames; }; static void ssl_set_option(SSL_CONF_CTX *cctx, unsigned int name_flags, uint64_t option_value, int onoff) { uint32_t *pflags; if (cctx->poptions == NULL) return; if (name_flags & SSL_TFLAG_INV) onoff ^= 1; switch (name_flags & SSL_TFLAG_TYPE_MASK) { case SSL_TFLAG_CERT: pflags = cctx->pcert_flags; break; case SSL_TFLAG_VFY: pflags = cctx->pvfy_flags; break; case SSL_TFLAG_OPTION: if (onoff) *cctx->poptions |= option_value; else *cctx->poptions &= ~option_value; return; default: return; } if (onoff) *pflags |= option_value; else *pflags &= ~option_value; } static int ssl_match_option(SSL_CONF_CTX *cctx, const ssl_flag_tbl *tbl, const char *name, int namelen, int onoff) { if (!(cctx->flags & tbl->name_flags & SSL_TFLAG_BOTH)) return 0; if (namelen == -1) { if (strcmp(tbl->name, name)) return 0; } else if (tbl->namelen != namelen || OPENSSL_strncasecmp(tbl->name, name, namelen)) return 0; ssl_set_option(cctx, tbl->name_flags, tbl->option_value, onoff); return 1; } static int ssl_set_option_list(const char *elem, int len, void *usr) { SSL_CONF_CTX *cctx = usr; size_t i; const ssl_flag_tbl *tbl; int onoff = 1; if (elem == NULL) return 0; if (len != -1) { if (*elem == '+') { elem++; len--; onoff = 1; } else if (*elem == '-') { elem++; len--; onoff = 0; } } for (i = 0, tbl = cctx->tbl; i < cctx->ntbl; i++, tbl++) { if (ssl_match_option(cctx, tbl, elem, len, onoff)) return 1; } return 0; } static int cmd_SignatureAlgorithms(SSL_CONF_CTX *cctx, const char *value) { int rv; if (cctx->ssl) rv = SSL_set1_sigalgs_list(cctx->ssl, value); else rv = SSL_CTX_set1_sigalgs_list(cctx->ctx, value); return rv > 0; } static int cmd_ClientSignatureAlgorithms(SSL_CONF_CTX *cctx, const char *value) { int rv; if (cctx->ssl) rv = SSL_set1_client_sigalgs_list(cctx->ssl, value); else rv = SSL_CTX_set1_client_sigalgs_list(cctx->ctx, value); return rv > 0; } static int cmd_Groups(SSL_CONF_CTX *cctx, const char *value) { int rv; if (cctx->ssl) rv = SSL_set1_groups_list(cctx->ssl, value); else rv = SSL_CTX_set1_groups_list(cctx->ctx, value); return rv > 0; } static int cmd_Curves(SSL_CONF_CTX *cctx, const char *value) { return cmd_Groups(cctx, value); } static int cmd_ECDHParameters(SSL_CONF_CTX *cctx, const char *value) { int rv = 1; if ((cctx->flags & SSL_CONF_FLAG_FILE) && (OPENSSL_strcasecmp(value, "+automatic") == 0 || OPENSSL_strcasecmp(value, "automatic") == 0)) return 1; if ((cctx->flags & SSL_CONF_FLAG_CMDLINE) && strcmp(value, "auto") == 0) return 1; if (strchr(value, ':') != NULL) return 0; if (cctx->ctx) rv = SSL_CTX_set1_groups_list(cctx->ctx, value); else if (cctx->ssl) rv = SSL_set1_groups_list(cctx->ssl, value); return rv > 0; } static int cmd_CipherString(SSL_CONF_CTX *cctx, const char *value) { int rv = 1; if (cctx->ctx) rv = SSL_CTX_set_cipher_list(cctx->ctx, value); if (cctx->ssl) rv = SSL_set_cipher_list(cctx->ssl, value); return rv > 0; } static int cmd_Ciphersuites(SSL_CONF_CTX *cctx, const char *value) { int rv = 1; if (cctx->ctx) rv = SSL_CTX_set_ciphersuites(cctx->ctx, value); if (cctx->ssl) rv = SSL_set_ciphersuites(cctx->ssl, value); return rv > 0; } static int cmd_Protocol(SSL_CONF_CTX *cctx, const char *value) { static const ssl_flag_tbl ssl_protocol_list[] = { SSL_FLAG_TBL_INV("ALL", SSL_OP_NO_SSL_MASK), SSL_FLAG_TBL_INV("SSLv2", SSL_OP_NO_SSLv2), SSL_FLAG_TBL_INV("SSLv3", SSL_OP_NO_SSLv3), SSL_FLAG_TBL_INV("TLSv1", SSL_OP_NO_TLSv1), SSL_FLAG_TBL_INV("TLSv1.1", SSL_OP_NO_TLSv1_1), SSL_FLAG_TBL_INV("TLSv1.2", SSL_OP_NO_TLSv1_2), SSL_FLAG_TBL_INV("TLSv1.3", SSL_OP_NO_TLSv1_3), SSL_FLAG_TBL_INV("DTLSv1", SSL_OP_NO_DTLSv1), SSL_FLAG_TBL_INV("DTLSv1.2", SSL_OP_NO_DTLSv1_2) }; cctx->tbl = ssl_protocol_list; cctx->ntbl = OSSL_NELEM(ssl_protocol_list); return CONF_parse_list(value, ',', 1, ssl_set_option_list, cctx); } static int protocol_from_string(const char *value) { struct protocol_versions { const char *name; int version; }; static const struct protocol_versions versions[] = { {"None", 0}, {"SSLv3", SSL3_VERSION}, {"TLSv1", TLS1_VERSION}, {"TLSv1.1", TLS1_1_VERSION}, {"TLSv1.2", TLS1_2_VERSION}, {"TLSv1.3", TLS1_3_VERSION}, {"DTLSv1", DTLS1_VERSION}, {"DTLSv1.2", DTLS1_2_VERSION} }; size_t i; size_t n = OSSL_NELEM(versions); for (i = 0; i < n; i++) if (strcmp(versions[i].name, value) == 0) return versions[i].version; return -1; } static int min_max_proto(SSL_CONF_CTX *cctx, const char *value, int *bound) { int method_version; int new_version; if (cctx->ctx != NULL) method_version = cctx->ctx->method->version; else if (cctx->ssl != NULL) method_version = cctx->ssl->defltmeth->version; else return 0; if ((new_version = protocol_from_string(value)) < 0) return 0; return ssl_set_version_bound(method_version, new_version, bound); } static int cmd_MinProtocol(SSL_CONF_CTX *cctx, const char *value) { return min_max_proto(cctx, value, cctx->min_version); } static int cmd_MaxProtocol(SSL_CONF_CTX *cctx, const char *value) { return min_max_proto(cctx, value, cctx->max_version); } static int cmd_Options(SSL_CONF_CTX *cctx, const char *value) { static const ssl_flag_tbl ssl_option_list[] = { SSL_FLAG_TBL_INV("SessionTicket", SSL_OP_NO_TICKET), SSL_FLAG_TBL_INV("EmptyFragments", SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS), SSL_FLAG_TBL("Bugs", SSL_OP_ALL), SSL_FLAG_TBL_INV("Compression", SSL_OP_NO_COMPRESSION), SSL_FLAG_TBL_SRV("ServerPreference", SSL_OP_CIPHER_SERVER_PREFERENCE), SSL_FLAG_TBL_SRV("NoResumptionOnRenegotiation", SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION), SSL_FLAG_TBL_SRV("DHSingle", SSL_OP_SINGLE_DH_USE), SSL_FLAG_TBL_SRV("ECDHSingle", SSL_OP_SINGLE_ECDH_USE), SSL_FLAG_TBL("UnsafeLegacyRenegotiation", SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION), SSL_FLAG_TBL("UnsafeLegacyServerConnect", SSL_OP_LEGACY_SERVER_CONNECT), SSL_FLAG_TBL("ClientRenegotiation", SSL_OP_ALLOW_CLIENT_RENEGOTIATION), SSL_FLAG_TBL_INV("EncryptThenMac", SSL_OP_NO_ENCRYPT_THEN_MAC), SSL_FLAG_TBL("NoRenegotiation", SSL_OP_NO_RENEGOTIATION), SSL_FLAG_TBL("AllowNoDHEKEX", SSL_OP_ALLOW_NO_DHE_KEX), SSL_FLAG_TBL("PreferNoDHEKEX", SSL_OP_PREFER_NO_DHE_KEX), SSL_FLAG_TBL("PrioritizeChaCha", SSL_OP_PRIORITIZE_CHACHA), SSL_FLAG_TBL("MiddleboxCompat", SSL_OP_ENABLE_MIDDLEBOX_COMPAT), SSL_FLAG_TBL_INV("AntiReplay", SSL_OP_NO_ANTI_REPLAY), SSL_FLAG_TBL_INV("ExtendedMasterSecret", SSL_OP_NO_EXTENDED_MASTER_SECRET), SSL_FLAG_TBL_INV("CANames", SSL_OP_DISABLE_TLSEXT_CA_NAMES), SSL_FLAG_TBL("KTLS", SSL_OP_ENABLE_KTLS), SSL_FLAG_TBL_CERT("StrictCertCheck", SSL_CERT_FLAG_TLS_STRICT), SSL_FLAG_TBL_INV("TxCertificateCompression", SSL_OP_NO_TX_CERTIFICATE_COMPRESSION), SSL_FLAG_TBL_INV("RxCertificateCompression", SSL_OP_NO_RX_CERTIFICATE_COMPRESSION), SSL_FLAG_TBL("KTLSTxZerocopySendfile", SSL_OP_ENABLE_KTLS_TX_ZEROCOPY_SENDFILE), SSL_FLAG_TBL("IgnoreUnexpectedEOF", SSL_OP_IGNORE_UNEXPECTED_EOF), }; if (value == NULL) return -3; cctx->tbl = ssl_option_list; cctx->ntbl = OSSL_NELEM(ssl_option_list); return CONF_parse_list(value, ',', 1, ssl_set_option_list, cctx); } static int cmd_VerifyMode(SSL_CONF_CTX *cctx, const char *value) { static const ssl_flag_tbl ssl_vfy_list[] = { SSL_FLAG_VFY_CLI("Peer", SSL_VERIFY_PEER), SSL_FLAG_VFY_SRV("Request", SSL_VERIFY_PEER), SSL_FLAG_VFY_SRV("Require", SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT), SSL_FLAG_VFY_SRV("Once", SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE), SSL_FLAG_VFY_SRV("RequestPostHandshake", SSL_VERIFY_PEER | SSL_VERIFY_POST_HANDSHAKE), SSL_FLAG_VFY_SRV("RequirePostHandshake", SSL_VERIFY_PEER | SSL_VERIFY_POST_HANDSHAKE | SSL_VERIFY_FAIL_IF_NO_PEER_CERT), }; if (value == NULL) return -3; cctx->tbl = ssl_vfy_list; cctx->ntbl = OSSL_NELEM(ssl_vfy_list); return CONF_parse_list(value, ',', 1, ssl_set_option_list, cctx); } static int cmd_Certificate(SSL_CONF_CTX *cctx, const char *value) { int rv = 1; CERT *c = NULL; if (cctx->ctx != NULL) { rv = SSL_CTX_use_certificate_chain_file(cctx->ctx, value); c = cctx->ctx->cert; } if (cctx->ssl != NULL) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(cctx->ssl); if (sc != NULL) { rv = SSL_use_certificate_chain_file(cctx->ssl, value); c = sc->cert; } else { rv = 0; } } if (rv > 0 && c != NULL && cctx->flags & SSL_CONF_FLAG_REQUIRE_PRIVATE) { char **pfilename = &cctx->cert_filename[c->key - c->pkeys]; OPENSSL_free(*pfilename); *pfilename = OPENSSL_strdup(value); if (*pfilename == NULL) rv = 0; } return rv > 0; } static int cmd_PrivateKey(SSL_CONF_CTX *cctx, const char *value) { int rv = 1; if (!(cctx->flags & SSL_CONF_FLAG_CERTIFICATE)) return -2; if (cctx->ctx) rv = SSL_CTX_use_PrivateKey_file(cctx->ctx, value, SSL_FILETYPE_PEM); if (cctx->ssl) rv = SSL_use_PrivateKey_file(cctx->ssl, value, SSL_FILETYPE_PEM); return rv > 0; } static int cmd_ServerInfoFile(SSL_CONF_CTX *cctx, const char *value) { int rv = 1; if (cctx->ctx) rv = SSL_CTX_use_serverinfo_file(cctx->ctx, value); return rv > 0; } static int do_store(SSL_CONF_CTX *cctx, const char *CAfile, const char *CApath, const char *CAstore, int verify_store) { CERT *cert; X509_STORE **st; SSL_CTX *ctx; OSSL_LIB_CTX *libctx = NULL; const char *propq = NULL; if (cctx->ctx != NULL) { cert = cctx->ctx->cert; ctx = cctx->ctx; } else if (cctx->ssl != NULL) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(cctx->ssl); if (sc == NULL) return 0; cert = sc->cert; ctx = cctx->ssl->ctx; } else { return 1; } if (ctx != NULL) { libctx = ctx->libctx; propq = ctx->propq; } st = verify_store ? &cert->verify_store : &cert->chain_store; if (*st == NULL) { *st = X509_STORE_new(); if (*st == NULL) return 0; } if (CAfile != NULL && !X509_STORE_load_file_ex(*st, CAfile, libctx, propq)) return 0; if (CApath != NULL && !X509_STORE_load_path(*st, CApath)) return 0; if (CAstore != NULL && !X509_STORE_load_store_ex(*st, CAstore, libctx, propq)) return 0; return 1; } static int cmd_ChainCAPath(SSL_CONF_CTX *cctx, const char *value) { return do_store(cctx, NULL, value, NULL, 0); } static int cmd_ChainCAFile(SSL_CONF_CTX *cctx, const char *value) { return do_store(cctx, value, NULL, NULL, 0); } static int cmd_ChainCAStore(SSL_CONF_CTX *cctx, const char *value) { return do_store(cctx, NULL, NULL, value, 0); } static int cmd_VerifyCAPath(SSL_CONF_CTX *cctx, const char *value) { return do_store(cctx, NULL, value, NULL, 1); } static int cmd_VerifyCAFile(SSL_CONF_CTX *cctx, const char *value) { return do_store(cctx, value, NULL, NULL, 1); } static int cmd_VerifyCAStore(SSL_CONF_CTX *cctx, const char *value) { return do_store(cctx, NULL, NULL, value, 1); } static int cmd_RequestCAFile(SSL_CONF_CTX *cctx, const char *value) { if (cctx->canames == NULL) cctx->canames = sk_X509_NAME_new_null(); if (cctx->canames == NULL) return 0; return SSL_add_file_cert_subjects_to_stack(cctx->canames, value); } static int cmd_ClientCAFile(SSL_CONF_CTX *cctx, const char *value) { return cmd_RequestCAFile(cctx, value); } static int cmd_RequestCAPath(SSL_CONF_CTX *cctx, const char *value) { if (cctx->canames == NULL) cctx->canames = sk_X509_NAME_new_null(); if (cctx->canames == NULL) return 0; return SSL_add_dir_cert_subjects_to_stack(cctx->canames, value); } static int cmd_ClientCAPath(SSL_CONF_CTX *cctx, const char *value) { return cmd_RequestCAPath(cctx, value); } static int cmd_RequestCAStore(SSL_CONF_CTX *cctx, const char *value) { if (cctx->canames == NULL) cctx->canames = sk_X509_NAME_new_null(); if (cctx->canames == NULL) return 0; return SSL_add_store_cert_subjects_to_stack(cctx->canames, value); } static int cmd_ClientCAStore(SSL_CONF_CTX *cctx, const char *value) { return cmd_RequestCAStore(cctx, value); } static int cmd_DHParameters(SSL_CONF_CTX *cctx, const char *value) { int rv = 0; EVP_PKEY *dhpkey = NULL; BIO *in = NULL; SSL_CTX *sslctx = (cctx->ssl != NULL) ? cctx->ssl->ctx : cctx->ctx; OSSL_DECODER_CTX *decoderctx = NULL; if (cctx->ctx != NULL || cctx->ssl != NULL) { in = BIO_new(BIO_s_file()); if (in == NULL) goto end; if (BIO_read_filename(in, value) <= 0) goto end; decoderctx = OSSL_DECODER_CTX_new_for_pkey(&dhpkey, "PEM", NULL, "DH", OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, sslctx->libctx, sslctx->propq); if (decoderctx == NULL) goto end; ERR_set_mark(); while (!OSSL_DECODER_from_bio(decoderctx, in) && dhpkey == NULL && !BIO_eof(in)); OSSL_DECODER_CTX_free(decoderctx); if (dhpkey == NULL) { ERR_clear_last_mark(); goto end; } ERR_pop_to_mark(); } else { return 1; } if (cctx->ctx != NULL) { if ((rv = SSL_CTX_set0_tmp_dh_pkey(cctx->ctx, dhpkey)) > 0) dhpkey = NULL; } if (cctx->ssl != NULL) { if ((rv = SSL_set0_tmp_dh_pkey(cctx->ssl, dhpkey)) > 0) dhpkey = NULL; } end: EVP_PKEY_free(dhpkey); BIO_free(in); return rv > 0; } static int cmd_RecordPadding(SSL_CONF_CTX *cctx, const char *value) { int rv = 0; int block_size = atoi(value); if (block_size >= 0) { if (cctx->ctx) rv = SSL_CTX_set_block_padding(cctx->ctx, block_size); if (cctx->ssl) rv = SSL_set_block_padding(cctx->ssl, block_size); } return rv; } static int cmd_NumTickets(SSL_CONF_CTX *cctx, const char *value) { int rv = 0; int num_tickets = atoi(value); if (num_tickets >= 0) { if (cctx->ctx) rv = SSL_CTX_set_num_tickets(cctx->ctx, num_tickets); if (cctx->ssl) rv = SSL_set_num_tickets(cctx->ssl, num_tickets); } return rv; } typedef struct { int (*cmd) (SSL_CONF_CTX *cctx, const char *value); const char *str_file; const char *str_cmdline; unsigned short flags; unsigned short value_type; } ssl_conf_cmd_tbl; #define SSL_CONF_CMD(name, cmdopt, flags, type) \ {cmd_##name, #name, cmdopt, flags, type} #define SSL_CONF_CMD_STRING(name, cmdopt, flags) \ SSL_CONF_CMD(name, cmdopt, flags, SSL_CONF_TYPE_STRING) #define SSL_CONF_CMD_SWITCH(name, flags) \ {0, NULL, name, flags, SSL_CONF_TYPE_NONE} static const ssl_conf_cmd_tbl ssl_conf_cmds[] = { SSL_CONF_CMD_SWITCH("no_ssl3", 0), SSL_CONF_CMD_SWITCH("no_tls1", 0), SSL_CONF_CMD_SWITCH("no_tls1_1", 0), SSL_CONF_CMD_SWITCH("no_tls1_2", 0), SSL_CONF_CMD_SWITCH("no_tls1_3", 0), SSL_CONF_CMD_SWITCH("bugs", 0), SSL_CONF_CMD_SWITCH("no_comp", 0), SSL_CONF_CMD_SWITCH("comp", 0), SSL_CONF_CMD_SWITCH("no_tx_cert_comp", 0), SSL_CONF_CMD_SWITCH("tx_cert_comp", 0), SSL_CONF_CMD_SWITCH("no_rx_cert_comp", 0), SSL_CONF_CMD_SWITCH("rx_cert_comp", 0), SSL_CONF_CMD_SWITCH("ecdh_single", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_SWITCH("no_ticket", 0), SSL_CONF_CMD_SWITCH("serverpref", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_SWITCH("legacy_renegotiation", 0), SSL_CONF_CMD_SWITCH("client_renegotiation", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_SWITCH("legacy_server_connect", SSL_CONF_FLAG_CLIENT), SSL_CONF_CMD_SWITCH("no_renegotiation", 0), SSL_CONF_CMD_SWITCH("no_resumption_on_reneg", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_SWITCH("no_legacy_server_connect", SSL_CONF_FLAG_CLIENT), SSL_CONF_CMD_SWITCH("allow_no_dhe_kex", 0), SSL_CONF_CMD_SWITCH("prefer_no_dhe_kex", 0), SSL_CONF_CMD_SWITCH("prioritize_chacha", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_SWITCH("strict", 0), SSL_CONF_CMD_SWITCH("no_middlebox", 0), SSL_CONF_CMD_SWITCH("anti_replay", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_SWITCH("no_anti_replay", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_SWITCH("no_etm", 0), SSL_CONF_CMD_SWITCH("no_ems", 0), SSL_CONF_CMD_STRING(SignatureAlgorithms, "sigalgs", 0), SSL_CONF_CMD_STRING(ClientSignatureAlgorithms, "client_sigalgs", 0), SSL_CONF_CMD_STRING(Curves, "curves", 0), SSL_CONF_CMD_STRING(Groups, "groups", 0), SSL_CONF_CMD_STRING(ECDHParameters, "named_curve", SSL_CONF_FLAG_SERVER), SSL_CONF_CMD_STRING(CipherString, "cipher", 0), SSL_CONF_CMD_STRING(Ciphersuites, "ciphersuites", 0), SSL_CONF_CMD_STRING(Protocol, NULL, 0), SSL_CONF_CMD_STRING(MinProtocol, "min_protocol", 0), SSL_CONF_CMD_STRING(MaxProtocol, "max_protocol", 0), SSL_CONF_CMD_STRING(Options, NULL, 0), SSL_CONF_CMD_STRING(VerifyMode, NULL, 0), SSL_CONF_CMD(Certificate, "cert", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD(PrivateKey, "key", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD(ServerInfoFile, NULL, SSL_CONF_FLAG_SERVER | SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD(ChainCAPath, "chainCApath", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_DIR), SSL_CONF_CMD(ChainCAFile, "chainCAfile", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD(ChainCAStore, "chainCAstore", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_STORE), SSL_CONF_CMD(VerifyCAPath, "verifyCApath", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_DIR), SSL_CONF_CMD(VerifyCAFile, "verifyCAfile", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD(VerifyCAStore, "verifyCAstore", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_STORE), SSL_CONF_CMD(RequestCAFile, "requestCAFile", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD(ClientCAFile, NULL, SSL_CONF_FLAG_SERVER | SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD(RequestCAPath, NULL, SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_DIR), SSL_CONF_CMD(ClientCAPath, NULL, SSL_CONF_FLAG_SERVER | SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_DIR), SSL_CONF_CMD(RequestCAStore, "requestCAStore", SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_STORE), SSL_CONF_CMD(ClientCAStore, NULL, SSL_CONF_FLAG_SERVER | SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_STORE), SSL_CONF_CMD(DHParameters, "dhparam", SSL_CONF_FLAG_SERVER | SSL_CONF_FLAG_CERTIFICATE, SSL_CONF_TYPE_FILE), SSL_CONF_CMD_STRING(RecordPadding, "record_padding", 0), SSL_CONF_CMD_STRING(NumTickets, "num_tickets", SSL_CONF_FLAG_SERVER), }; static const ssl_switch_tbl ssl_cmd_switches[] = { {SSL_OP_NO_SSLv3, 0}, {SSL_OP_NO_TLSv1, 0}, {SSL_OP_NO_TLSv1_1, 0}, {SSL_OP_NO_TLSv1_2, 0}, {SSL_OP_NO_TLSv1_3, 0}, {SSL_OP_ALL, 0}, {SSL_OP_NO_COMPRESSION, 0}, {SSL_OP_NO_COMPRESSION, SSL_TFLAG_INV}, {SSL_OP_NO_TX_CERTIFICATE_COMPRESSION, 0}, {SSL_OP_NO_TX_CERTIFICATE_COMPRESSION, SSL_TFLAG_INV}, {SSL_OP_NO_RX_CERTIFICATE_COMPRESSION, 0}, {SSL_OP_NO_RX_CERTIFICATE_COMPRESSION, SSL_TFLAG_INV}, {SSL_OP_SINGLE_ECDH_USE, 0}, {SSL_OP_NO_TICKET, 0}, {SSL_OP_CIPHER_SERVER_PREFERENCE, 0}, {SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION, 0}, {SSL_OP_ALLOW_CLIENT_RENEGOTIATION, 0}, {SSL_OP_LEGACY_SERVER_CONNECT, 0}, {SSL_OP_NO_RENEGOTIATION, 0}, {SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION, 0}, {SSL_OP_LEGACY_SERVER_CONNECT, SSL_TFLAG_INV}, {SSL_OP_ALLOW_NO_DHE_KEX, 0}, {SSL_OP_PREFER_NO_DHE_KEX, 0}, {SSL_OP_PRIORITIZE_CHACHA, 0}, {SSL_CERT_FLAG_TLS_STRICT, SSL_TFLAG_CERT}, {SSL_OP_ENABLE_MIDDLEBOX_COMPAT, SSL_TFLAG_INV}, {SSL_OP_NO_ANTI_REPLAY, SSL_TFLAG_INV}, {SSL_OP_NO_ANTI_REPLAY, 0}, {SSL_OP_NO_ENCRYPT_THEN_MAC, 0}, {SSL_OP_NO_EXTENDED_MASTER_SECRET, 0}, }; static int ssl_conf_cmd_skip_prefix(SSL_CONF_CTX *cctx, const char **pcmd) { if (pcmd == NULL || *pcmd == NULL) return 0; if (cctx->prefix) { if (strlen(*pcmd) <= cctx->prefixlen) return 0; if (cctx->flags & SSL_CONF_FLAG_CMDLINE && strncmp(*pcmd, cctx->prefix, cctx->prefixlen)) return 0; if (cctx->flags & SSL_CONF_FLAG_FILE && OPENSSL_strncasecmp(*pcmd, cctx->prefix, cctx->prefixlen)) return 0; *pcmd += cctx->prefixlen; } else if (cctx->flags & SSL_CONF_FLAG_CMDLINE) { if (**pcmd != '-' || !(*pcmd)[1]) return 0; *pcmd += 1; } return 1; } static int ssl_conf_cmd_allowed(SSL_CONF_CTX *cctx, const ssl_conf_cmd_tbl *t) { unsigned int tfl = t->flags; unsigned int cfl = cctx->flags; if ((tfl & SSL_CONF_FLAG_SERVER) && !(cfl & SSL_CONF_FLAG_SERVER)) return 0; if ((tfl & SSL_CONF_FLAG_CLIENT) && !(cfl & SSL_CONF_FLAG_CLIENT)) return 0; if ((tfl & SSL_CONF_FLAG_CERTIFICATE) && !(cfl & SSL_CONF_FLAG_CERTIFICATE)) return 0; return 1; } static const ssl_conf_cmd_tbl *ssl_conf_cmd_lookup(SSL_CONF_CTX *cctx, const char *cmd) { const ssl_conf_cmd_tbl *t; size_t i; if (cmd == NULL) return NULL; for (i = 0, t = ssl_conf_cmds; i < OSSL_NELEM(ssl_conf_cmds); i++, t++) { if (ssl_conf_cmd_allowed(cctx, t)) { if (cctx->flags & SSL_CONF_FLAG_CMDLINE) { if (t->str_cmdline && strcmp(t->str_cmdline, cmd) == 0) return t; } if (cctx->flags & SSL_CONF_FLAG_FILE) { if (t->str_file && OPENSSL_strcasecmp(t->str_file, cmd) == 0) return t; } } } return NULL; } static int ctrl_switch_option(SSL_CONF_CTX *cctx, const ssl_conf_cmd_tbl *cmd) { size_t idx = cmd - ssl_conf_cmds; const ssl_switch_tbl *scmd; if (idx >= OSSL_NELEM(ssl_cmd_switches)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } scmd = ssl_cmd_switches + idx; ssl_set_option(cctx, scmd->name_flags, scmd->option_value, 1); return 1; } int SSL_CONF_cmd(SSL_CONF_CTX *cctx, const char *cmd, const char *value) { const ssl_conf_cmd_tbl *runcmd; if (cmd == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_NULL_CMD_NAME); return 0; } if (!ssl_conf_cmd_skip_prefix(cctx, &cmd)) goto unknown_cmd; runcmd = ssl_conf_cmd_lookup(cctx, cmd); if (runcmd) { int rv = -3; if (runcmd->value_type == SSL_CONF_TYPE_NONE) { return ctrl_switch_option(cctx, runcmd); } if (value == NULL) goto bad_value; rv = runcmd->cmd(cctx, value); if (rv > 0) return 2; if (rv != -2) rv = 0; bad_value: if (cctx->flags & SSL_CONF_FLAG_SHOW_ERRORS) ERR_raise_data(ERR_LIB_SSL, SSL_R_BAD_VALUE, "cmd=%s, value=%s", cmd, value != NULL ? value : "<EMPTY>"); return rv; } unknown_cmd: if (cctx->flags & SSL_CONF_FLAG_SHOW_ERRORS) ERR_raise_data(ERR_LIB_SSL, SSL_R_UNKNOWN_CMD_NAME, "cmd=%s", cmd); return -2; } int SSL_CONF_cmd_argv(SSL_CONF_CTX *cctx, int *pargc, char ***pargv) { int rv; const char *arg = NULL, *argn; if (pargc != NULL && *pargc == 0) return 0; if (pargc == NULL || *pargc > 0) arg = **pargv; if (arg == NULL) return 0; if (pargc == NULL || *pargc > 1) argn = (*pargv)[1]; else argn = NULL; cctx->flags &= ~SSL_CONF_FLAG_FILE; cctx->flags |= SSL_CONF_FLAG_CMDLINE; rv = SSL_CONF_cmd(cctx, arg, argn); if (rv > 0) { (*pargv) += rv; if (pargc) (*pargc) -= rv; return rv; } if (rv == -2) return 0; if (rv == 0) return -1; return rv; } int SSL_CONF_cmd_value_type(SSL_CONF_CTX *cctx, const char *cmd) { if (ssl_conf_cmd_skip_prefix(cctx, &cmd)) { const ssl_conf_cmd_tbl *runcmd; runcmd = ssl_conf_cmd_lookup(cctx, cmd); if (runcmd) return runcmd->value_type; } return SSL_CONF_TYPE_UNKNOWN; } SSL_CONF_CTX *SSL_CONF_CTX_new(void) { SSL_CONF_CTX *ret = OPENSSL_zalloc(sizeof(*ret)); return ret; } int SSL_CONF_CTX_finish(SSL_CONF_CTX *cctx) { size_t i; CERT *c = NULL; if (cctx->ctx != NULL) { c = cctx->ctx->cert; } else if (cctx->ssl != NULL) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(cctx->ssl); if (sc != NULL) c = sc->cert; } if (c != NULL && cctx->flags & SSL_CONF_FLAG_REQUIRE_PRIVATE) { for (i = 0; i < SSL_PKEY_NUM; i++) { const char *p = cctx->cert_filename[i]; if (p && !c->pkeys[i].privatekey) { if (!cmd_PrivateKey(cctx, p)) return 0; } } } if (cctx->canames) { if (cctx->ssl) SSL_set0_CA_list(cctx->ssl, cctx->canames); else if (cctx->ctx) SSL_CTX_set0_CA_list(cctx->ctx, cctx->canames); else sk_X509_NAME_pop_free(cctx->canames, X509_NAME_free); cctx->canames = NULL; } return 1; } void SSL_CONF_CTX_free(SSL_CONF_CTX *cctx) { if (cctx) { size_t i; for (i = 0; i < SSL_PKEY_NUM; i++) OPENSSL_free(cctx->cert_filename[i]); OPENSSL_free(cctx->prefix); sk_X509_NAME_pop_free(cctx->canames, X509_NAME_free); OPENSSL_free(cctx); } } unsigned int SSL_CONF_CTX_set_flags(SSL_CONF_CTX *cctx, unsigned int flags) { cctx->flags |= flags; return cctx->flags; } unsigned int SSL_CONF_CTX_clear_flags(SSL_CONF_CTX *cctx, unsigned int flags) { cctx->flags &= ~flags; return cctx->flags; } int SSL_CONF_CTX_set1_prefix(SSL_CONF_CTX *cctx, const char *pre) { char *tmp = NULL; if (pre) { tmp = OPENSSL_strdup(pre); if (tmp == NULL) return 0; } OPENSSL_free(cctx->prefix); cctx->prefix = tmp; if (tmp) cctx->prefixlen = strlen(tmp); else cctx->prefixlen = 0; return 1; } void SSL_CONF_CTX_set_ssl(SSL_CONF_CTX *cctx, SSL *ssl) { cctx->ssl = ssl; cctx->ctx = NULL; if (ssl != NULL) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return; cctx->poptions = &sc->options; cctx->min_version = &sc->min_proto_version; cctx->max_version = &sc->max_proto_version; cctx->pcert_flags = &sc->cert->cert_flags; cctx->pvfy_flags = &sc->verify_mode; } else { cctx->poptions = NULL; cctx->min_version = NULL; cctx->max_version = NULL; cctx->pcert_flags = NULL; cctx->pvfy_flags = NULL; } } void SSL_CONF_CTX_set_ssl_ctx(SSL_CONF_CTX *cctx, SSL_CTX *ctx) { cctx->ctx = ctx; cctx->ssl = NULL; if (ctx) { cctx->poptions = &ctx->options; cctx->min_version = &ctx->min_proto_version; cctx->max_version = &ctx->max_proto_version; cctx->pcert_flags = &ctx->cert->cert_flags; cctx->pvfy_flags = &ctx->verify_mode; } else { cctx->poptions = NULL; cctx->min_version = NULL; cctx->max_version = NULL; cctx->pcert_flags = NULL; cctx->pvfy_flags = NULL; } }
ssl
openssl/ssl/ssl_conf.c
openssl
#include <stdio.h> #include <stdlib.h> #include <openssl/objects.h> #include <openssl/evp.h> #include <openssl/hmac.h> #include <openssl/core_names.h> #include <openssl/ocsp.h> #include <openssl/conf.h> #include <openssl/x509v3.h> #include <openssl/dh.h> #include <openssl/bn.h> #include <openssl/provider.h> #include <openssl/param_build.h> #include "internal/nelem.h" #include "internal/sizes.h" #include "internal/tlsgroups.h" #include "ssl_local.h" #include "quic/quic_local.h" #include <openssl/ct.h> static const SIGALG_LOOKUP *find_sig_alg(SSL_CONNECTION *s, X509 *x, EVP_PKEY *pkey); static int tls12_sigalg_allowed(const SSL_CONNECTION *s, int op, const SIGALG_LOOKUP *lu); SSL3_ENC_METHOD const TLSv1_enc_data = { tls1_setup_key_block, tls1_generate_master_secret, tls1_change_cipher_state, tls1_final_finish_mac, TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE, TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE, tls1_alert_code, tls1_export_keying_material, 0, ssl3_set_handshake_header, tls_close_construct_packet, ssl3_handshake_write }; SSL3_ENC_METHOD const TLSv1_1_enc_data = { tls1_setup_key_block, tls1_generate_master_secret, tls1_change_cipher_state, tls1_final_finish_mac, TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE, TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE, tls1_alert_code, tls1_export_keying_material, SSL_ENC_FLAG_EXPLICIT_IV, ssl3_set_handshake_header, tls_close_construct_packet, ssl3_handshake_write }; SSL3_ENC_METHOD const TLSv1_2_enc_data = { tls1_setup_key_block, tls1_generate_master_secret, tls1_change_cipher_state, tls1_final_finish_mac, TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE, TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE, tls1_alert_code, tls1_export_keying_material, SSL_ENC_FLAG_EXPLICIT_IV | SSL_ENC_FLAG_SIGALGS | SSL_ENC_FLAG_SHA256_PRF | SSL_ENC_FLAG_TLS1_2_CIPHERS, ssl3_set_handshake_header, tls_close_construct_packet, ssl3_handshake_write }; SSL3_ENC_METHOD const TLSv1_3_enc_data = { tls13_setup_key_block, tls13_generate_master_secret, tls13_change_cipher_state, tls13_final_finish_mac, TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE, TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE, tls13_alert_code, tls13_export_keying_material, SSL_ENC_FLAG_SIGALGS | SSL_ENC_FLAG_SHA256_PRF, ssl3_set_handshake_header, tls_close_construct_packet, ssl3_handshake_write }; OSSL_TIME tls1_default_timeout(void) { return ossl_seconds2time(60 * 60 * 2); } int tls1_new(SSL *s) { if (!ssl3_new(s)) return 0; if (!s->method->ssl_clear(s)) return 0; return 1; } void tls1_free(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; OPENSSL_free(sc->ext.session_ticket); ssl3_free(s); } int tls1_clear(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (!ssl3_clear(s)) return 0; if (s->method->version == TLS_ANY_VERSION) sc->version = TLS_MAX_VERSION_INTERNAL; else sc->version = s->method->version; return 1; } static const struct { int nid; uint16_t group_id; } nid_to_group[] = { {NID_sect163k1, OSSL_TLS_GROUP_ID_sect163k1}, {NID_sect163r1, OSSL_TLS_GROUP_ID_sect163r1}, {NID_sect163r2, OSSL_TLS_GROUP_ID_sect163r2}, {NID_sect193r1, OSSL_TLS_GROUP_ID_sect193r1}, {NID_sect193r2, OSSL_TLS_GROUP_ID_sect193r2}, {NID_sect233k1, OSSL_TLS_GROUP_ID_sect233k1}, {NID_sect233r1, OSSL_TLS_GROUP_ID_sect233r1}, {NID_sect239k1, OSSL_TLS_GROUP_ID_sect239k1}, {NID_sect283k1, OSSL_TLS_GROUP_ID_sect283k1}, {NID_sect283r1, OSSL_TLS_GROUP_ID_sect283r1}, {NID_sect409k1, OSSL_TLS_GROUP_ID_sect409k1}, {NID_sect409r1, OSSL_TLS_GROUP_ID_sect409r1}, {NID_sect571k1, OSSL_TLS_GROUP_ID_sect571k1}, {NID_sect571r1, OSSL_TLS_GROUP_ID_sect571r1}, {NID_secp160k1, OSSL_TLS_GROUP_ID_secp160k1}, {NID_secp160r1, OSSL_TLS_GROUP_ID_secp160r1}, {NID_secp160r2, OSSL_TLS_GROUP_ID_secp160r2}, {NID_secp192k1, OSSL_TLS_GROUP_ID_secp192k1}, {NID_X9_62_prime192v1, OSSL_TLS_GROUP_ID_secp192r1}, {NID_secp224k1, OSSL_TLS_GROUP_ID_secp224k1}, {NID_secp224r1, OSSL_TLS_GROUP_ID_secp224r1}, {NID_secp256k1, OSSL_TLS_GROUP_ID_secp256k1}, {NID_X9_62_prime256v1, OSSL_TLS_GROUP_ID_secp256r1}, {NID_secp384r1, OSSL_TLS_GROUP_ID_secp384r1}, {NID_secp521r1, OSSL_TLS_GROUP_ID_secp521r1}, {NID_brainpoolP256r1, OSSL_TLS_GROUP_ID_brainpoolP256r1}, {NID_brainpoolP384r1, OSSL_TLS_GROUP_ID_brainpoolP384r1}, {NID_brainpoolP512r1, OSSL_TLS_GROUP_ID_brainpoolP512r1}, {EVP_PKEY_X25519, OSSL_TLS_GROUP_ID_x25519}, {EVP_PKEY_X448, OSSL_TLS_GROUP_ID_x448}, {NID_brainpoolP256r1tls13, OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13}, {NID_brainpoolP384r1tls13, OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13}, {NID_brainpoolP512r1tls13, OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13}, {NID_id_tc26_gost_3410_2012_256_paramSetA, OSSL_TLS_GROUP_ID_gc256A}, {NID_id_tc26_gost_3410_2012_256_paramSetB, OSSL_TLS_GROUP_ID_gc256B}, {NID_id_tc26_gost_3410_2012_256_paramSetC, OSSL_TLS_GROUP_ID_gc256C}, {NID_id_tc26_gost_3410_2012_256_paramSetD, OSSL_TLS_GROUP_ID_gc256D}, {NID_id_tc26_gost_3410_2012_512_paramSetA, OSSL_TLS_GROUP_ID_gc512A}, {NID_id_tc26_gost_3410_2012_512_paramSetB, OSSL_TLS_GROUP_ID_gc512B}, {NID_id_tc26_gost_3410_2012_512_paramSetC, OSSL_TLS_GROUP_ID_gc512C}, {NID_ffdhe2048, OSSL_TLS_GROUP_ID_ffdhe2048}, {NID_ffdhe3072, OSSL_TLS_GROUP_ID_ffdhe3072}, {NID_ffdhe4096, OSSL_TLS_GROUP_ID_ffdhe4096}, {NID_ffdhe6144, OSSL_TLS_GROUP_ID_ffdhe6144}, {NID_ffdhe8192, OSSL_TLS_GROUP_ID_ffdhe8192} }; static const unsigned char ecformats_default[] = { TLSEXT_ECPOINTFORMAT_uncompressed, TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime, TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2 }; static const uint16_t supported_groups_default[] = { OSSL_TLS_GROUP_ID_x25519, OSSL_TLS_GROUP_ID_secp256r1, OSSL_TLS_GROUP_ID_x448, OSSL_TLS_GROUP_ID_secp521r1, OSSL_TLS_GROUP_ID_secp384r1, OSSL_TLS_GROUP_ID_gc256A, OSSL_TLS_GROUP_ID_gc256B, OSSL_TLS_GROUP_ID_gc256C, OSSL_TLS_GROUP_ID_gc256D, OSSL_TLS_GROUP_ID_gc512A, OSSL_TLS_GROUP_ID_gc512B, OSSL_TLS_GROUP_ID_gc512C, OSSL_TLS_GROUP_ID_ffdhe2048, OSSL_TLS_GROUP_ID_ffdhe3072, OSSL_TLS_GROUP_ID_ffdhe4096, OSSL_TLS_GROUP_ID_ffdhe6144, OSSL_TLS_GROUP_ID_ffdhe8192, }; static const uint16_t suiteb_curves[] = { OSSL_TLS_GROUP_ID_secp256r1, OSSL_TLS_GROUP_ID_secp384r1, }; struct provider_ctx_data_st { SSL_CTX *ctx; OSSL_PROVIDER *provider; }; #define TLS_GROUP_LIST_MALLOC_BLOCK_SIZE 10 static OSSL_CALLBACK add_provider_groups; static int add_provider_groups(const OSSL_PARAM params[], void *data) { struct provider_ctx_data_st *pgd = data; SSL_CTX *ctx = pgd->ctx; OSSL_PROVIDER *provider = pgd->provider; const OSSL_PARAM *p; TLS_GROUP_INFO *ginf = NULL; EVP_KEYMGMT *keymgmt; unsigned int gid; unsigned int is_kem = 0; int ret = 0; if (ctx->group_list_max_len == ctx->group_list_len) { TLS_GROUP_INFO *tmp = NULL; if (ctx->group_list_max_len == 0) tmp = OPENSSL_malloc(sizeof(TLS_GROUP_INFO) * TLS_GROUP_LIST_MALLOC_BLOCK_SIZE); else tmp = OPENSSL_realloc(ctx->group_list, (ctx->group_list_max_len + TLS_GROUP_LIST_MALLOC_BLOCK_SIZE) * sizeof(TLS_GROUP_INFO)); if (tmp == NULL) return 0; ctx->group_list = tmp; memset(tmp + ctx->group_list_max_len, 0, sizeof(TLS_GROUP_INFO) * TLS_GROUP_LIST_MALLOC_BLOCK_SIZE); ctx->group_list_max_len += TLS_GROUP_LIST_MALLOC_BLOCK_SIZE; } ginf = &ctx->group_list[ctx->group_list_len]; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_NAME); if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } ginf->tlsname = OPENSSL_strdup(p->data); if (ginf->tlsname == NULL) goto err; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL); if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } ginf->realname = OPENSSL_strdup(p->data); if (ginf->realname == NULL) goto err; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_ID); if (p == NULL || !OSSL_PARAM_get_uint(p, &gid) || gid > UINT16_MAX) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } ginf->group_id = (uint16_t)gid; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_ALG); if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } ginf->algorithm = OPENSSL_strdup(p->data); if (ginf->algorithm == NULL) goto err; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS); if (p == NULL || !OSSL_PARAM_get_uint(p, &ginf->secbits)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_IS_KEM); if (p != NULL && (!OSSL_PARAM_get_uint(p, &is_kem) || is_kem > 1)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } ginf->is_kem = 1 & is_kem; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_MIN_TLS); if (p == NULL || !OSSL_PARAM_get_int(p, &ginf->mintls)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_MAX_TLS); if (p == NULL || !OSSL_PARAM_get_int(p, &ginf->maxtls)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS); if (p == NULL || !OSSL_PARAM_get_int(p, &ginf->mindtls)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS); if (p == NULL || !OSSL_PARAM_get_int(p, &ginf->maxdtls)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } ret = 1; ERR_set_mark(); keymgmt = EVP_KEYMGMT_fetch(ctx->libctx, ginf->algorithm, ctx->propq); if (keymgmt != NULL) { if (EVP_KEYMGMT_get0_provider(keymgmt) == provider) { ctx->group_list_len++; ginf = NULL; } EVP_KEYMGMT_free(keymgmt); } ERR_pop_to_mark(); err: if (ginf != NULL) { OPENSSL_free(ginf->tlsname); OPENSSL_free(ginf->realname); OPENSSL_free(ginf->algorithm); ginf->algorithm = ginf->tlsname = ginf->realname = NULL; } return ret; } static int discover_provider_groups(OSSL_PROVIDER *provider, void *vctx) { struct provider_ctx_data_st pgd; pgd.ctx = vctx; pgd.provider = provider; return OSSL_PROVIDER_get_capabilities(provider, "TLS-GROUP", add_provider_groups, &pgd); } int ssl_load_groups(SSL_CTX *ctx) { size_t i, j, num_deflt_grps = 0; uint16_t tmp_supp_groups[OSSL_NELEM(supported_groups_default)]; if (!OSSL_PROVIDER_do_all(ctx->libctx, discover_provider_groups, ctx)) return 0; for (i = 0; i < OSSL_NELEM(supported_groups_default); i++) { for (j = 0; j < ctx->group_list_len; j++) { if (ctx->group_list[j].group_id == supported_groups_default[i]) { tmp_supp_groups[num_deflt_grps++] = ctx->group_list[j].group_id; break; } } } if (num_deflt_grps == 0) return 1; ctx->ext.supported_groups_default = OPENSSL_malloc(sizeof(uint16_t) * num_deflt_grps); if (ctx->ext.supported_groups_default == NULL) return 0; memcpy(ctx->ext.supported_groups_default, tmp_supp_groups, num_deflt_grps * sizeof(tmp_supp_groups[0])); ctx->ext.supported_groups_default_len = num_deflt_grps; return 1; } #define TLS_SIGALG_LIST_MALLOC_BLOCK_SIZE 10 static OSSL_CALLBACK add_provider_sigalgs; static int add_provider_sigalgs(const OSSL_PARAM params[], void *data) { struct provider_ctx_data_st *pgd = data; SSL_CTX *ctx = pgd->ctx; OSSL_PROVIDER *provider = pgd->provider; const OSSL_PARAM *p; TLS_SIGALG_INFO *sinf = NULL; EVP_KEYMGMT *keymgmt; const char *keytype; unsigned int code_point = 0; int ret = 0; if (ctx->sigalg_list_max_len == ctx->sigalg_list_len) { TLS_SIGALG_INFO *tmp = NULL; if (ctx->sigalg_list_max_len == 0) tmp = OPENSSL_malloc(sizeof(TLS_SIGALG_INFO) * TLS_SIGALG_LIST_MALLOC_BLOCK_SIZE); else tmp = OPENSSL_realloc(ctx->sigalg_list, (ctx->sigalg_list_max_len + TLS_SIGALG_LIST_MALLOC_BLOCK_SIZE) * sizeof(TLS_SIGALG_INFO)); if (tmp == NULL) return 0; ctx->sigalg_list = tmp; memset(tmp + ctx->sigalg_list_max_len, 0, sizeof(TLS_SIGALG_INFO) * TLS_SIGALG_LIST_MALLOC_BLOCK_SIZE); ctx->sigalg_list_max_len += TLS_SIGALG_LIST_MALLOC_BLOCK_SIZE; } sinf = &ctx->sigalg_list[ctx->sigalg_list_len]; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_NAME); if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } OPENSSL_free(sinf->sigalg_name); sinf->sigalg_name = OPENSSL_strdup(p->data); if (sinf->sigalg_name == NULL) goto err; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_IANA_NAME); if (p == NULL || p->data_type != OSSL_PARAM_UTF8_STRING) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } OPENSSL_free(sinf->name); sinf->name = OPENSSL_strdup(p->data); if (sinf->name == NULL) goto err; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_CODE_POINT); if (p == NULL || !OSSL_PARAM_get_uint(p, &code_point) || code_point > UINT16_MAX) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } sinf->code_point = (uint16_t)code_point; p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_SECURITY_BITS); if (p == NULL || !OSSL_PARAM_get_uint(p, &sinf->secbits)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_OID); if (p == NULL) { sinf->sigalg_oid = NULL; } else if (p->data_type != OSSL_PARAM_UTF8_STRING) { goto err; } else { OPENSSL_free(sinf->sigalg_oid); sinf->sigalg_oid = OPENSSL_strdup(p->data); if (sinf->sigalg_oid == NULL) goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_SIG_NAME); if (p == NULL) { sinf->sig_name = NULL; } else if (p->data_type != OSSL_PARAM_UTF8_STRING) { goto err; } else { OPENSSL_free(sinf->sig_name); sinf->sig_name = OPENSSL_strdup(p->data); if (sinf->sig_name == NULL) goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_SIG_OID); if (p == NULL) { sinf->sig_oid = NULL; } else if (p->data_type != OSSL_PARAM_UTF8_STRING) { goto err; } else { OPENSSL_free(sinf->sig_oid); sinf->sig_oid = OPENSSL_strdup(p->data); if (sinf->sig_oid == NULL) goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_HASH_NAME); if (p == NULL) { sinf->hash_name = NULL; } else if (p->data_type != OSSL_PARAM_UTF8_STRING) { goto err; } else { OPENSSL_free(sinf->hash_name); sinf->hash_name = OPENSSL_strdup(p->data); if (sinf->hash_name == NULL) goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_HASH_OID); if (p == NULL) { sinf->hash_oid = NULL; } else if (p->data_type != OSSL_PARAM_UTF8_STRING) { goto err; } else { OPENSSL_free(sinf->hash_oid); sinf->hash_oid = OPENSSL_strdup(p->data); if (sinf->hash_oid == NULL) goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_KEYTYPE); if (p == NULL) { sinf->keytype = NULL; } else if (p->data_type != OSSL_PARAM_UTF8_STRING) { goto err; } else { OPENSSL_free(sinf->keytype); sinf->keytype = OPENSSL_strdup(p->data); if (sinf->keytype == NULL) goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_KEYTYPE_OID); if (p == NULL) { sinf->keytype_oid = NULL; } else if (p->data_type != OSSL_PARAM_UTF8_STRING) { goto err; } else { OPENSSL_free(sinf->keytype_oid); sinf->keytype_oid = OPENSSL_strdup(p->data); if (sinf->keytype_oid == NULL) goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_MIN_TLS); if (p == NULL || !OSSL_PARAM_get_int(p, &sinf->mintls)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } if ((sinf->mintls != 0) && (sinf->mintls != -1) && ((sinf->mintls < TLS1_3_VERSION))) { ret = 1; goto err; } p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_SIGALG_MAX_TLS); if (p == NULL || !OSSL_PARAM_get_int(p, &sinf->maxtls)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } if ((sinf->maxtls != 0) && (sinf->maxtls != -1) && ((sinf->maxtls < sinf->mintls))) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } if ((sinf->maxtls != 0) && (sinf->maxtls != -1) && ((sinf->maxtls < TLS1_3_VERSION))) { ret = 1; goto err; } ret = 1; ERR_set_mark(); keytype = (sinf->keytype != NULL ? sinf->keytype : (sinf->sig_name != NULL ? sinf->sig_name : sinf->sigalg_name)); keymgmt = EVP_KEYMGMT_fetch(ctx->libctx, keytype, ctx->propq); if (keymgmt != NULL) { if (EVP_KEYMGMT_get0_provider(keymgmt) == provider) { OBJ_create(sinf->sigalg_oid, sinf->sigalg_name, NULL); if ((OBJ_txt2nid(sinf->sigalg_name) == NID_undef) || (OBJ_nid2obj(OBJ_txt2nid(sinf->sigalg_name)) == NULL)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } if (sinf->sig_name != NULL) OBJ_create(sinf->sig_oid, sinf->sig_name, NULL); if (sinf->keytype != NULL) OBJ_create(sinf->keytype_oid, sinf->keytype, NULL); if (sinf->hash_name != NULL) OBJ_create(sinf->hash_oid, sinf->hash_name, NULL); OBJ_add_sigid(OBJ_txt2nid(sinf->sigalg_name), (sinf->hash_name != NULL ? OBJ_txt2nid(sinf->hash_name) : NID_undef), OBJ_txt2nid(keytype)); ctx->sigalg_list_len++; sinf = NULL; } EVP_KEYMGMT_free(keymgmt); } ERR_pop_to_mark(); err: if (sinf != NULL) { OPENSSL_free(sinf->name); sinf->name = NULL; OPENSSL_free(sinf->sigalg_name); sinf->sigalg_name = NULL; OPENSSL_free(sinf->sigalg_oid); sinf->sigalg_oid = NULL; OPENSSL_free(sinf->sig_name); sinf->sig_name = NULL; OPENSSL_free(sinf->sig_oid); sinf->sig_oid = NULL; OPENSSL_free(sinf->hash_name); sinf->hash_name = NULL; OPENSSL_free(sinf->hash_oid); sinf->hash_oid = NULL; OPENSSL_free(sinf->keytype); sinf->keytype = NULL; OPENSSL_free(sinf->keytype_oid); sinf->keytype_oid = NULL; } return ret; } static int discover_provider_sigalgs(OSSL_PROVIDER *provider, void *vctx) { struct provider_ctx_data_st pgd; pgd.ctx = vctx; pgd.provider = provider; OSSL_PROVIDER_get_capabilities(provider, "TLS-SIGALG", add_provider_sigalgs, &pgd); return 1; } int ssl_load_sigalgs(SSL_CTX *ctx) { size_t i; SSL_CERT_LOOKUP lu; if (!OSSL_PROVIDER_do_all(ctx->libctx, discover_provider_sigalgs, ctx)) return 0; if (ctx->sigalg_list_len > 0) { OPENSSL_free(ctx->ssl_cert_info); ctx->ssl_cert_info = OPENSSL_zalloc(sizeof(lu) * ctx->sigalg_list_len); if (ctx->ssl_cert_info == NULL) return 0; for(i = 0; i < ctx->sigalg_list_len; i++) { ctx->ssl_cert_info[i].nid = OBJ_txt2nid(ctx->sigalg_list[i].sigalg_name); ctx->ssl_cert_info[i].amask = SSL_aANY; } } return 1; } static uint16_t tls1_group_name2id(SSL_CTX *ctx, const char *name) { size_t i; for (i = 0; i < ctx->group_list_len; i++) { if (strcmp(ctx->group_list[i].tlsname, name) == 0 || strcmp(ctx->group_list[i].realname, name) == 0) return ctx->group_list[i].group_id; } return 0; } const TLS_GROUP_INFO *tls1_group_id_lookup(SSL_CTX *ctx, uint16_t group_id) { size_t i; for (i = 0; i < ctx->group_list_len; i++) { if (ctx->group_list[i].group_id == group_id) return &ctx->group_list[i]; } return NULL; } const char *tls1_group_id2name(SSL_CTX *ctx, uint16_t group_id) { const TLS_GROUP_INFO *tls_group_info = tls1_group_id_lookup(ctx, group_id); if (tls_group_info == NULL) return NULL; return tls_group_info->tlsname; } int tls1_group_id2nid(uint16_t group_id, int include_unknown) { size_t i; if (group_id == 0) return NID_undef; for (i = 0; i < OSSL_NELEM(nid_to_group); i++) { if (nid_to_group[i].group_id == group_id) return nid_to_group[i].nid; } if (!include_unknown) return NID_undef; return TLSEXT_nid_unknown | (int)group_id; } uint16_t tls1_nid2group_id(int nid) { size_t i; for (i = 0; i < OSSL_NELEM(nid_to_group); i++) { if (nid_to_group[i].nid == nid) return nid_to_group[i].group_id; } return 0; } void tls1_get_supported_groups(SSL_CONNECTION *s, const uint16_t **pgroups, size_t *pgroupslen) { SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); switch (tls1_suiteb(s)) { case SSL_CERT_FLAG_SUITEB_128_LOS: *pgroups = suiteb_curves; *pgroupslen = OSSL_NELEM(suiteb_curves); break; case SSL_CERT_FLAG_SUITEB_128_LOS_ONLY: *pgroups = suiteb_curves; *pgroupslen = 1; break; case SSL_CERT_FLAG_SUITEB_192_LOS: *pgroups = suiteb_curves + 1; *pgroupslen = 1; break; default: if (s->ext.supportedgroups == NULL) { *pgroups = sctx->ext.supported_groups_default; *pgroupslen = sctx->ext.supported_groups_default_len; } else { *pgroups = s->ext.supportedgroups; *pgroupslen = s->ext.supportedgroups_len; } break; } } int tls_valid_group(SSL_CONNECTION *s, uint16_t group_id, int minversion, int maxversion, int isec, int *okfortls13) { const TLS_GROUP_INFO *ginfo = tls1_group_id_lookup(SSL_CONNECTION_GET_CTX(s), group_id); int ret; int group_minversion, group_maxversion; if (okfortls13 != NULL) *okfortls13 = 0; if (ginfo == NULL) return 0; group_minversion = SSL_CONNECTION_IS_DTLS(s) ? ginfo->mindtls : ginfo->mintls; group_maxversion = SSL_CONNECTION_IS_DTLS(s) ? ginfo->maxdtls : ginfo->maxtls; if (group_minversion < 0 || group_maxversion < 0) return 0; if (group_maxversion == 0) ret = 1; else ret = (ssl_version_cmp(s, minversion, group_maxversion) <= 0); if (group_minversion > 0) ret &= (ssl_version_cmp(s, maxversion, group_minversion) >= 0); if (!SSL_CONNECTION_IS_DTLS(s)) { if (ret && okfortls13 != NULL && maxversion == TLS1_3_VERSION) *okfortls13 = (group_maxversion == 0) || (group_maxversion >= TLS1_3_VERSION); } ret &= !isec || strcmp(ginfo->algorithm, "EC") == 0 || strcmp(ginfo->algorithm, "X25519") == 0 || strcmp(ginfo->algorithm, "X448") == 0; return ret; } int tls_group_allowed(SSL_CONNECTION *s, uint16_t group, int op) { const TLS_GROUP_INFO *ginfo = tls1_group_id_lookup(SSL_CONNECTION_GET_CTX(s), group); unsigned char gtmp[2]; if (ginfo == NULL) return 0; gtmp[0] = group >> 8; gtmp[1] = group & 0xff; return ssl_security(s, op, ginfo->secbits, tls1_group_id2nid(ginfo->group_id, 0), (void *)gtmp); } static int tls1_in_list(uint16_t id, const uint16_t *list, size_t listlen) { size_t i; for (i = 0; i < listlen; i++) if (list[i] == id) return 1; return 0; } uint16_t tls1_shared_group(SSL_CONNECTION *s, int nmatch) { const uint16_t *pref, *supp; size_t num_pref, num_supp, i; int k; SSL_CTX *ctx = SSL_CONNECTION_GET_CTX(s); if (s->server == 0) return 0; if (nmatch == -2) { if (tls1_suiteb(s)) { unsigned long cid = s->s3.tmp.new_cipher->id; if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) return OSSL_TLS_GROUP_ID_secp256r1; if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384) return OSSL_TLS_GROUP_ID_secp384r1; return 0; } nmatch = 0; } if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { tls1_get_supported_groups(s, &pref, &num_pref); tls1_get_peer_groups(s, &supp, &num_supp); } else { tls1_get_peer_groups(s, &pref, &num_pref); tls1_get_supported_groups(s, &supp, &num_supp); } for (k = 0, i = 0; i < num_pref; i++) { uint16_t id = pref[i]; const TLS_GROUP_INFO *inf; int minversion, maxversion; if (!tls1_in_list(id, supp, num_supp) || !tls_group_allowed(s, id, SSL_SECOP_CURVE_SHARED)) continue; inf = tls1_group_id_lookup(ctx, id); if (!ossl_assert(inf != NULL)) return 0; minversion = SSL_CONNECTION_IS_DTLS(s) ? inf->mindtls : inf->mintls; maxversion = SSL_CONNECTION_IS_DTLS(s) ? inf->maxdtls : inf->maxtls; if (maxversion == -1) continue; if ((minversion != 0 && ssl_version_cmp(s, s->version, minversion) < 0) || (maxversion != 0 && ssl_version_cmp(s, s->version, maxversion) > 0)) continue; if (nmatch == k) return id; k++; } if (nmatch == -1) return k; return 0; } int tls1_set_groups(uint16_t **pext, size_t *pextlen, int *groups, size_t ngroups) { uint16_t *glist; size_t i; unsigned long *dup_list = NULL; unsigned long dup_list_egrp = 0; unsigned long dup_list_dhgrp = 0; if (ngroups == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_LENGTH); return 0; } if ((glist = OPENSSL_malloc(ngroups * sizeof(*glist))) == NULL) return 0; for (i = 0; i < ngroups; i++) { unsigned long idmask; uint16_t id; id = tls1_nid2group_id(groups[i]); if ((id & 0x00FF) >= (sizeof(unsigned long) * 8)) goto err; idmask = 1L << (id & 0x00FF); dup_list = (id < 0x100) ? &dup_list_egrp : &dup_list_dhgrp; if (!id || ((*dup_list) & idmask)) goto err; *dup_list |= idmask; glist[i] = id; } OPENSSL_free(*pext); *pext = glist; *pextlen = ngroups; return 1; err: OPENSSL_free(glist); return 0; } # define GROUPLIST_INCREMENT 40 # define GROUP_NAME_BUFFER_LENGTH 64 typedef struct { SSL_CTX *ctx; size_t gidcnt; size_t gidmax; uint16_t *gid_arr; } gid_cb_st; static int gid_cb(const char *elem, int len, void *arg) { gid_cb_st *garg = arg; size_t i; uint16_t gid = 0; char etmp[GROUP_NAME_BUFFER_LENGTH]; int ignore_unknown = 0; if (elem == NULL) return 0; if (elem[0] == '?') { ignore_unknown = 1; ++elem; --len; } if (garg->gidcnt == garg->gidmax) { uint16_t *tmp = OPENSSL_realloc(garg->gid_arr, (garg->gidmax + GROUPLIST_INCREMENT) * sizeof(*garg->gid_arr)); if (tmp == NULL) return 0; garg->gidmax += GROUPLIST_INCREMENT; garg->gid_arr = tmp; } if (len > (int)(sizeof(etmp) - 1)) return 0; memcpy(etmp, elem, len); etmp[len] = 0; gid = tls1_group_name2id(garg->ctx, etmp); if (gid == 0) { return ignore_unknown; } for (i = 0; i < garg->gidcnt; i++) if (garg->gid_arr[i] == gid) { return 1; } garg->gid_arr[garg->gidcnt++] = gid; return 1; } int tls1_set_groups_list(SSL_CTX *ctx, uint16_t **pext, size_t *pextlen, const char *str) { gid_cb_st gcb; uint16_t *tmparr; int ret = 0; gcb.gidcnt = 0; gcb.gidmax = GROUPLIST_INCREMENT; gcb.gid_arr = OPENSSL_malloc(gcb.gidmax * sizeof(*gcb.gid_arr)); if (gcb.gid_arr == NULL) return 0; gcb.ctx = ctx; if (!CONF_parse_list(str, ':', 1, gid_cb, &gcb)) goto end; if (gcb.gidcnt == 0) { ERR_raise_data(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT, "No valid groups in '%s'", str); goto end; } if (pext == NULL) { ret = 1; goto end; } tmparr = OPENSSL_memdup(gcb.gid_arr, gcb.gidcnt * sizeof(*tmparr)); if (tmparr == NULL) goto end; OPENSSL_free(*pext); *pext = tmparr; *pextlen = gcb.gidcnt; ret = 1; end: OPENSSL_free(gcb.gid_arr); return ret; } int tls1_check_group_id(SSL_CONNECTION *s, uint16_t group_id, int check_own_groups) { const uint16_t *groups; size_t groups_len; if (group_id == 0) return 0; if (tls1_suiteb(s) && s->s3.tmp.new_cipher != NULL) { unsigned long cid = s->s3.tmp.new_cipher->id; if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) { if (group_id != OSSL_TLS_GROUP_ID_secp256r1) return 0; } else if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384) { if (group_id != OSSL_TLS_GROUP_ID_secp384r1) return 0; } else { return 0; } } if (check_own_groups) { tls1_get_supported_groups(s, &groups, &groups_len); if (!tls1_in_list(group_id, groups, groups_len)) return 0; } if (!tls_group_allowed(s, group_id, SSL_SECOP_CURVE_CHECK)) return 0; if (!s->server) return 1; tls1_get_peer_groups(s, &groups, &groups_len); if (groups_len == 0) return 1; return tls1_in_list(group_id, groups, groups_len); } void tls1_get_formatlist(SSL_CONNECTION *s, const unsigned char **pformats, size_t *num_formats) { if (s->ext.ecpointformats) { *pformats = s->ext.ecpointformats; *num_formats = s->ext.ecpointformats_len; } else { *pformats = ecformats_default; if (tls1_suiteb(s)) *num_formats = sizeof(ecformats_default) - 1; else *num_formats = sizeof(ecformats_default); } } static int tls1_check_pkey_comp(SSL_CONNECTION *s, EVP_PKEY *pkey) { unsigned char comp_id; size_t i; int point_conv; if (!EVP_PKEY_is_a(pkey, "EC")) return 1; point_conv = EVP_PKEY_get_ec_point_conv_form(pkey); if (point_conv == 0) return 0; if (point_conv == POINT_CONVERSION_UNCOMPRESSED) { comp_id = TLSEXT_ECPOINTFORMAT_uncompressed; } else if (SSL_CONNECTION_IS_TLS13(s)) { return 1; } else { int field_type = EVP_PKEY_get_field_type(pkey); if (field_type == NID_X9_62_prime_field) comp_id = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime; else if (field_type == NID_X9_62_characteristic_two_field) comp_id = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2; else return 0; } if (s->ext.peer_ecpointformats == NULL) return 1; for (i = 0; i < s->ext.peer_ecpointformats_len; i++) { if (s->ext.peer_ecpointformats[i] == comp_id) return 1; } return 0; } static uint16_t tls1_get_group_id(EVP_PKEY *pkey) { int curve_nid = ssl_get_EC_curve_nid(pkey); if (curve_nid == NID_undef) return 0; return tls1_nid2group_id(curve_nid); } static int tls1_check_cert_param(SSL_CONNECTION *s, X509 *x, int check_ee_md) { uint16_t group_id; EVP_PKEY *pkey; pkey = X509_get0_pubkey(x); if (pkey == NULL) return 0; if (!EVP_PKEY_is_a(pkey, "EC")) return 1; if (!tls1_check_pkey_comp(s, pkey)) return 0; group_id = tls1_get_group_id(pkey); if (!tls1_check_group_id(s, group_id, !s->server)) return 0; if (check_ee_md && tls1_suiteb(s)) { int check_md; size_t i; if (group_id == OSSL_TLS_GROUP_ID_secp256r1) check_md = NID_ecdsa_with_SHA256; else if (group_id == OSSL_TLS_GROUP_ID_secp384r1) check_md = NID_ecdsa_with_SHA384; else return 0; for (i = 0; i < s->shared_sigalgslen; i++) { if (check_md == s->shared_sigalgs[i]->sigandhash) return 1; } return 0; } return 1; } int tls1_check_ec_tmp_key(SSL_CONNECTION *s, unsigned long cid) { if (!tls1_suiteb(s)) return tls1_shared_group(s, 0) != 0; if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) return tls1_check_group_id(s, OSSL_TLS_GROUP_ID_secp256r1, 1); if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384) return tls1_check_group_id(s, OSSL_TLS_GROUP_ID_secp384r1, 1); return 0; } static const uint16_t tls12_sigalgs[] = { TLSEXT_SIGALG_ecdsa_secp256r1_sha256, TLSEXT_SIGALG_ecdsa_secp384r1_sha384, TLSEXT_SIGALG_ecdsa_secp521r1_sha512, TLSEXT_SIGALG_ed25519, TLSEXT_SIGALG_ed448, TLSEXT_SIGALG_ecdsa_brainpoolP256r1_sha256, TLSEXT_SIGALG_ecdsa_brainpoolP384r1_sha384, TLSEXT_SIGALG_ecdsa_brainpoolP512r1_sha512, TLSEXT_SIGALG_rsa_pss_pss_sha256, TLSEXT_SIGALG_rsa_pss_pss_sha384, TLSEXT_SIGALG_rsa_pss_pss_sha512, TLSEXT_SIGALG_rsa_pss_rsae_sha256, TLSEXT_SIGALG_rsa_pss_rsae_sha384, TLSEXT_SIGALG_rsa_pss_rsae_sha512, TLSEXT_SIGALG_rsa_pkcs1_sha256, TLSEXT_SIGALG_rsa_pkcs1_sha384, TLSEXT_SIGALG_rsa_pkcs1_sha512, TLSEXT_SIGALG_ecdsa_sha224, TLSEXT_SIGALG_ecdsa_sha1, TLSEXT_SIGALG_rsa_pkcs1_sha224, TLSEXT_SIGALG_rsa_pkcs1_sha1, TLSEXT_SIGALG_dsa_sha224, TLSEXT_SIGALG_dsa_sha1, TLSEXT_SIGALG_dsa_sha256, TLSEXT_SIGALG_dsa_sha384, TLSEXT_SIGALG_dsa_sha512, #ifndef OPENSSL_NO_GOST TLSEXT_SIGALG_gostr34102012_256_intrinsic, TLSEXT_SIGALG_gostr34102012_512_intrinsic, TLSEXT_SIGALG_gostr34102012_256_gostr34112012_256, TLSEXT_SIGALG_gostr34102012_512_gostr34112012_512, TLSEXT_SIGALG_gostr34102001_gostr3411, #endif }; static const uint16_t suiteb_sigalgs[] = { TLSEXT_SIGALG_ecdsa_secp256r1_sha256, TLSEXT_SIGALG_ecdsa_secp384r1_sha384 }; static const SIGALG_LOOKUP sigalg_lookup_tbl[] = { {"ecdsa_secp256r1_sha256", TLSEXT_SIGALG_ecdsa_secp256r1_sha256, NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA256, NID_X9_62_prime256v1, 1}, {"ecdsa_secp384r1_sha384", TLSEXT_SIGALG_ecdsa_secp384r1_sha384, NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA384, NID_secp384r1, 1}, {"ecdsa_secp521r1_sha512", TLSEXT_SIGALG_ecdsa_secp521r1_sha512, NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA512, NID_secp521r1, 1}, {"ed25519", TLSEXT_SIGALG_ed25519, NID_undef, -1, EVP_PKEY_ED25519, SSL_PKEY_ED25519, NID_undef, NID_undef, 1}, {"ed448", TLSEXT_SIGALG_ed448, NID_undef, -1, EVP_PKEY_ED448, SSL_PKEY_ED448, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_ecdsa_sha224, NID_sha224, SSL_MD_SHA224_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA224, NID_undef, 1}, {NULL, TLSEXT_SIGALG_ecdsa_sha1, NID_sha1, SSL_MD_SHA1_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA1, NID_undef, 1}, {"ecdsa_brainpoolP256r1_sha256", TLSEXT_SIGALG_ecdsa_brainpoolP256r1_sha256, NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA256, NID_brainpoolP256r1, 1}, {"ecdsa_brainpoolP384r1_sha384", TLSEXT_SIGALG_ecdsa_brainpoolP384r1_sha384, NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA384, NID_brainpoolP384r1, 1}, {"ecdsa_brainpoolP512r1_sha512", TLSEXT_SIGALG_ecdsa_brainpoolP512r1_sha512, NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_EC, SSL_PKEY_ECC, NID_ecdsa_with_SHA512, NID_brainpoolP512r1, 1}, {"rsa_pss_rsae_sha256", TLSEXT_SIGALG_rsa_pss_rsae_sha256, NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA, NID_undef, NID_undef, 1}, {"rsa_pss_rsae_sha384", TLSEXT_SIGALG_rsa_pss_rsae_sha384, NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA, NID_undef, NID_undef, 1}, {"rsa_pss_rsae_sha512", TLSEXT_SIGALG_rsa_pss_rsae_sha512, NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA, NID_undef, NID_undef, 1}, {"rsa_pss_pss_sha256", TLSEXT_SIGALG_rsa_pss_pss_sha256, NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN, NID_undef, NID_undef, 1}, {"rsa_pss_pss_sha384", TLSEXT_SIGALG_rsa_pss_pss_sha384, NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN, NID_undef, NID_undef, 1}, {"rsa_pss_pss_sha512", TLSEXT_SIGALG_rsa_pss_pss_sha512, NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN, NID_undef, NID_undef, 1}, {"rsa_pkcs1_sha256", TLSEXT_SIGALG_rsa_pkcs1_sha256, NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA, NID_sha256WithRSAEncryption, NID_undef, 1}, {"rsa_pkcs1_sha384", TLSEXT_SIGALG_rsa_pkcs1_sha384, NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA, NID_sha384WithRSAEncryption, NID_undef, 1}, {"rsa_pkcs1_sha512", TLSEXT_SIGALG_rsa_pkcs1_sha512, NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA, NID_sha512WithRSAEncryption, NID_undef, 1}, {"rsa_pkcs1_sha224", TLSEXT_SIGALG_rsa_pkcs1_sha224, NID_sha224, SSL_MD_SHA224_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA, NID_sha224WithRSAEncryption, NID_undef, 1}, {"rsa_pkcs1_sha1", TLSEXT_SIGALG_rsa_pkcs1_sha1, NID_sha1, SSL_MD_SHA1_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA, NID_sha1WithRSAEncryption, NID_undef, 1}, {NULL, TLSEXT_SIGALG_dsa_sha256, NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN, NID_dsa_with_SHA256, NID_undef, 1}, {NULL, TLSEXT_SIGALG_dsa_sha384, NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_dsa_sha512, NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_dsa_sha224, NID_sha224, SSL_MD_SHA224_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_dsa_sha1, NID_sha1, SSL_MD_SHA1_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN, NID_dsaWithSHA1, NID_undef, 1}, #ifndef OPENSSL_NO_GOST {NULL, TLSEXT_SIGALG_gostr34102012_256_intrinsic, NID_id_GostR3411_2012_256, SSL_MD_GOST12_256_IDX, NID_id_GostR3410_2012_256, SSL_PKEY_GOST12_256, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_gostr34102012_512_intrinsic, NID_id_GostR3411_2012_512, SSL_MD_GOST12_512_IDX, NID_id_GostR3410_2012_512, SSL_PKEY_GOST12_512, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_gostr34102012_256_gostr34112012_256, NID_id_GostR3411_2012_256, SSL_MD_GOST12_256_IDX, NID_id_GostR3410_2012_256, SSL_PKEY_GOST12_256, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_gostr34102012_512_gostr34112012_512, NID_id_GostR3411_2012_512, SSL_MD_GOST12_512_IDX, NID_id_GostR3410_2012_512, SSL_PKEY_GOST12_512, NID_undef, NID_undef, 1}, {NULL, TLSEXT_SIGALG_gostr34102001_gostr3411, NID_id_GostR3411_94, SSL_MD_GOST94_IDX, NID_id_GostR3410_2001, SSL_PKEY_GOST01, NID_undef, NID_undef, 1} #endif }; static const SIGALG_LOOKUP legacy_rsa_sigalg = { "rsa_pkcs1_md5_sha1", 0, NID_md5_sha1, SSL_MD_MD5_SHA1_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA, NID_undef, NID_undef, 1 }; static const uint16_t tls_default_sigalg[] = { TLSEXT_SIGALG_rsa_pkcs1_sha1, 0, TLSEXT_SIGALG_dsa_sha1, TLSEXT_SIGALG_ecdsa_sha1, TLSEXT_SIGALG_gostr34102001_gostr3411, TLSEXT_SIGALG_gostr34102012_256_intrinsic, TLSEXT_SIGALG_gostr34102012_512_intrinsic, 0, 0, }; int ssl_setup_sigalgs(SSL_CTX *ctx) { size_t i, cache_idx, sigalgs_len; const SIGALG_LOOKUP *lu; SIGALG_LOOKUP *cache = NULL; uint16_t *tls12_sigalgs_list = NULL; EVP_PKEY *tmpkey = EVP_PKEY_new(); int ret = 0; if (ctx == NULL) goto err; sigalgs_len = OSSL_NELEM(sigalg_lookup_tbl) + ctx->sigalg_list_len; cache = OPENSSL_malloc(sizeof(const SIGALG_LOOKUP) * sigalgs_len); if (cache == NULL || tmpkey == NULL) goto err; tls12_sigalgs_list = OPENSSL_malloc(sizeof(uint16_t) * sigalgs_len); if (tls12_sigalgs_list == NULL) goto err; ERR_set_mark(); for (i = 0, lu = sigalg_lookup_tbl; i < OSSL_NELEM(sigalg_lookup_tbl); lu++, i++) { EVP_PKEY_CTX *pctx; cache[i] = *lu; tls12_sigalgs_list[i] = tls12_sigalgs[i]; if (lu->hash != NID_undef && ctx->ssl_digest_methods[lu->hash_idx] == NULL) { cache[i].enabled = 0; continue; } if (!EVP_PKEY_set_type(tmpkey, lu->sig)) { cache[i].enabled = 0; continue; } pctx = EVP_PKEY_CTX_new_from_pkey(ctx->libctx, tmpkey, ctx->propq); if (pctx == NULL) cache[i].enabled = 0; EVP_PKEY_CTX_free(pctx); } cache_idx = OSSL_NELEM(sigalg_lookup_tbl); for (i = 0; i < ctx->sigalg_list_len; i++) { TLS_SIGALG_INFO si = ctx->sigalg_list[i]; cache[cache_idx].name = si.name; cache[cache_idx].sigalg = si.code_point; tls12_sigalgs_list[cache_idx] = si.code_point; cache[cache_idx].hash = si.hash_name?OBJ_txt2nid(si.hash_name):NID_undef; cache[cache_idx].hash_idx = ssl_get_md_idx(cache[cache_idx].hash); cache[cache_idx].sig = OBJ_txt2nid(si.sigalg_name); cache[cache_idx].sig_idx = i + SSL_PKEY_NUM; cache[cache_idx].sigandhash = OBJ_txt2nid(si.sigalg_name); cache[cache_idx].curve = NID_undef; cache[cache_idx].enabled = 1; cache_idx++; } ERR_pop_to_mark(); ctx->sigalg_lookup_cache = cache; ctx->tls12_sigalgs = tls12_sigalgs_list; ctx->tls12_sigalgs_len = sigalgs_len; cache = NULL; tls12_sigalgs_list = NULL; ret = 1; err: OPENSSL_free(cache); OPENSSL_free(tls12_sigalgs_list); EVP_PKEY_free(tmpkey); return ret; } static const SIGALG_LOOKUP *tls1_lookup_sigalg(const SSL_CONNECTION *s, uint16_t sigalg) { size_t i; const SIGALG_LOOKUP *lu; for (i = 0, lu = SSL_CONNECTION_GET_CTX(s)->sigalg_lookup_cache; i < SSL_CONNECTION_GET_CTX(s)->tls12_sigalgs_len; lu++, i++) { if (lu->sigalg == sigalg) { if (!lu->enabled) return NULL; return lu; } } return NULL; } int tls1_lookup_md(SSL_CTX *ctx, const SIGALG_LOOKUP *lu, const EVP_MD **pmd) { const EVP_MD *md; if (lu == NULL) return 0; if (lu->hash == NID_undef) { md = NULL; } else { md = ssl_md(ctx, lu->hash_idx); if (md == NULL) return 0; } if (pmd) *pmd = md; return 1; } #define RSA_PSS_MINIMUM_KEY_SIZE(md) (2 * EVP_MD_get_size(md) + 2) static int rsa_pss_check_min_key_size(SSL_CTX *ctx, const EVP_PKEY *pkey, const SIGALG_LOOKUP *lu) { const EVP_MD *md; if (pkey == NULL) return 0; if (!tls1_lookup_md(ctx, lu, &md) || md == NULL) return 0; if (EVP_PKEY_get_size(pkey) < RSA_PSS_MINIMUM_KEY_SIZE(md)) return 0; return 1; } static const SIGALG_LOOKUP *tls1_get_legacy_sigalg(const SSL_CONNECTION *s, int idx) { if (idx == -1) { if (s->server) { size_t i; for (i = 0; i < s->ssl_pkey_num; i++) { const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(i, SSL_CONNECTION_GET_CTX(s)); if (clu == NULL) continue; if (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) { idx = i; break; } } if (idx == SSL_PKEY_GOST01 && s->s3.tmp.new_cipher->algorithm_auth != SSL_aGOST01) { int real_idx; for (real_idx = SSL_PKEY_GOST12_512; real_idx >= SSL_PKEY_GOST01; real_idx--) { if (s->cert->pkeys[real_idx].privatekey != NULL) { idx = real_idx; break; } } } else if (idx == SSL_PKEY_GOST12_256) { int real_idx; for (real_idx = SSL_PKEY_GOST12_512; real_idx >= SSL_PKEY_GOST12_256; real_idx--) { if (s->cert->pkeys[real_idx].privatekey != NULL) { idx = real_idx; break; } } } } else { idx = s->cert->key - s->cert->pkeys; } } if (idx < 0 || idx >= (int)OSSL_NELEM(tls_default_sigalg)) return NULL; if (SSL_USE_SIGALGS(s) || idx != SSL_PKEY_RSA) { const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, tls_default_sigalg[idx]); if (lu == NULL) return NULL; if (!tls1_lookup_md(SSL_CONNECTION_GET_CTX(s), lu, NULL)) return NULL; if (!tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SUPPORTED, lu)) return NULL; return lu; } if (!tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SUPPORTED, &legacy_rsa_sigalg)) return NULL; return &legacy_rsa_sigalg; } int tls1_set_peer_legacy_sigalg(SSL_CONNECTION *s, const EVP_PKEY *pkey) { size_t idx; const SIGALG_LOOKUP *lu; if (ssl_cert_lookup_by_pkey(pkey, &idx, SSL_CONNECTION_GET_CTX(s)) == NULL) return 0; lu = tls1_get_legacy_sigalg(s, idx); if (lu == NULL) return 0; s->s3.tmp.peer_sigalg = lu; return 1; } size_t tls12_get_psigalgs(SSL_CONNECTION *s, int sent, const uint16_t **psigs) { switch (tls1_suiteb(s)) { case SSL_CERT_FLAG_SUITEB_128_LOS: *psigs = suiteb_sigalgs; return OSSL_NELEM(suiteb_sigalgs); case SSL_CERT_FLAG_SUITEB_128_LOS_ONLY: *psigs = suiteb_sigalgs; return 1; case SSL_CERT_FLAG_SUITEB_192_LOS: *psigs = suiteb_sigalgs + 1; return 1; } if ((s->server == sent) && s->cert->client_sigalgs != NULL) { *psigs = s->cert->client_sigalgs; return s->cert->client_sigalgslen; } else if (s->cert->conf_sigalgs) { *psigs = s->cert->conf_sigalgs; return s->cert->conf_sigalgslen; } else { *psigs = SSL_CONNECTION_GET_CTX(s)->tls12_sigalgs; return SSL_CONNECTION_GET_CTX(s)->tls12_sigalgs_len; } } int tls_check_sigalg_curve(const SSL_CONNECTION *s, int curve) { const uint16_t *sigs; size_t siglen, i; if (s->cert->conf_sigalgs) { sigs = s->cert->conf_sigalgs; siglen = s->cert->conf_sigalgslen; } else { sigs = SSL_CONNECTION_GET_CTX(s)->tls12_sigalgs; siglen = SSL_CONNECTION_GET_CTX(s)->tls12_sigalgs_len; } for (i = 0; i < siglen; i++) { const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, sigs[i]); if (lu == NULL) continue; if (lu->sig == EVP_PKEY_EC && lu->curve != NID_undef && curve == lu->curve) return 1; } return 0; } static int sigalg_security_bits(SSL_CTX *ctx, const SIGALG_LOOKUP *lu) { const EVP_MD *md = NULL; int secbits = 0; if (!tls1_lookup_md(ctx, lu, &md)) return 0; if (md != NULL) { int md_type = EVP_MD_get_type(md); secbits = EVP_MD_get_size(md) * 4; if (md_type == NID_sha1) secbits = 64; else if (md_type == NID_md5_sha1) secbits = 67; else if (md_type == NID_md5) secbits = 39; } else { if (lu->sigalg == TLSEXT_SIGALG_ed25519) secbits = 128; else if (lu->sigalg == TLSEXT_SIGALG_ed448) secbits = 224; } if ((secbits == 0) && (lu->sig_idx >= SSL_PKEY_NUM) && ((lu->sig_idx - SSL_PKEY_NUM) < (int)ctx->sigalg_list_len)) { secbits = ctx->sigalg_list[lu->sig_idx - SSL_PKEY_NUM].secbits; } return secbits; } int tls12_check_peer_sigalg(SSL_CONNECTION *s, uint16_t sig, EVP_PKEY *pkey) { const uint16_t *sent_sigs; const EVP_MD *md = NULL; char sigalgstr[2]; size_t sent_sigslen, i, cidx; int pkeyid = -1; const SIGALG_LOOKUP *lu; int secbits = 0; pkeyid = EVP_PKEY_get_id(pkey); if (SSL_CONNECTION_IS_TLS13(s)) { if (pkeyid == EVP_PKEY_DSA) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } if (pkeyid == EVP_PKEY_RSA) pkeyid = EVP_PKEY_RSA_PSS; } lu = tls1_lookup_sigalg(s, sig); if ((pkeyid == EVP_PKEY_KEYMGMT) && (lu != NULL)) pkeyid = lu->sig; if (pkeyid == -1) return -1; if (lu == NULL || (SSL_CONNECTION_IS_TLS13(s) && (lu->hash == NID_sha1 || lu->hash == NID_sha224)) || (pkeyid != lu->sig && (lu->sig != EVP_PKEY_RSA_PSS || pkeyid != EVP_PKEY_RSA))) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } if (!ssl_cert_lookup_by_nid( (pkeyid == EVP_PKEY_RSA_PSS) ? EVP_PKEY_get_id(pkey) : pkeyid, &cidx, SSL_CONNECTION_GET_CTX(s)) || lu->sig_idx != (int)cidx) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } if (pkeyid == EVP_PKEY_EC) { if (!tls1_check_pkey_comp(s, pkey)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_ILLEGAL_POINT_COMPRESSION); return 0; } if (SSL_CONNECTION_IS_TLS13(s) || tls1_suiteb(s)) { int curve = ssl_get_EC_curve_nid(pkey); if (lu->curve != NID_undef && curve != lu->curve) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_CURVE); return 0; } } if (!SSL_CONNECTION_IS_TLS13(s)) { if (!tls1_check_group_id(s, tls1_get_group_id(pkey), 1)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_CURVE); return 0; } if (tls1_suiteb(s)) { if (sig != TLSEXT_SIGALG_ecdsa_secp256r1_sha256 && sig != TLSEXT_SIGALG_ecdsa_secp384r1_sha384) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } } } } else if (tls1_suiteb(s)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } sent_sigslen = tls12_get_psigalgs(s, 1, &sent_sigs); for (i = 0; i < sent_sigslen; i++, sent_sigs++) { if (sig == *sent_sigs) break; } if (i == sent_sigslen && (lu->hash != NID_sha1 || s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } if (!tls1_lookup_md(SSL_CONNECTION_GET_CTX(s), lu, &md)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_UNKNOWN_DIGEST); return 0; } sigalgstr[0] = (sig >> 8) & 0xff; sigalgstr[1] = sig & 0xff; secbits = sigalg_security_bits(SSL_CONNECTION_GET_CTX(s), lu); if (secbits == 0 || !ssl_security(s, SSL_SECOP_SIGALG_CHECK, secbits, md != NULL ? EVP_MD_get_type(md) : NID_undef, (void *)sigalgstr)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } s->s3.tmp.peer_sigalg = lu; return 1; } int SSL_get_peer_signature_type_nid(const SSL *s, int *pnid) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; if (sc->s3.tmp.peer_sigalg == NULL) return 0; *pnid = sc->s3.tmp.peer_sigalg->sig; return 1; } int SSL_get_signature_type_nid(const SSL *s, int *pnid) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; if (sc->s3.tmp.sigalg == NULL) return 0; *pnid = sc->s3.tmp.sigalg->sig; return 1; } int ssl_set_client_disabled(SSL_CONNECTION *s) { s->s3.tmp.mask_a = 0; s->s3.tmp.mask_k = 0; ssl_set_sig_mask(&s->s3.tmp.mask_a, s, SSL_SECOP_SIGALG_MASK); if (ssl_get_min_max_version(s, &s->s3.tmp.min_ver, &s->s3.tmp.max_ver, NULL) != 0) return 0; #ifndef OPENSSL_NO_PSK if (!s->psk_client_callback) { s->s3.tmp.mask_a |= SSL_aPSK; s->s3.tmp.mask_k |= SSL_PSK; } #endif #ifndef OPENSSL_NO_SRP if (!(s->srp_ctx.srp_Mask & SSL_kSRP)) { s->s3.tmp.mask_a |= SSL_aSRP; s->s3.tmp.mask_k |= SSL_kSRP; } #endif return 1; } int ssl_cipher_disabled(const SSL_CONNECTION *s, const SSL_CIPHER *c, int op, int ecdhe) { int minversion = SSL_CONNECTION_IS_DTLS(s) ? c->min_dtls : c->min_tls; int maxversion = SSL_CONNECTION_IS_DTLS(s) ? c->max_dtls : c->max_tls; if (c->algorithm_mkey & s->s3.tmp.mask_k || c->algorithm_auth & s->s3.tmp.mask_a) return 1; if (s->s3.tmp.max_ver == 0) return 1; if (SSL_IS_QUIC_HANDSHAKE(s)) switch (SSL_CIPHER_get_id(c)) { case TLS1_3_CK_AES_128_GCM_SHA256: case TLS1_3_CK_AES_256_GCM_SHA384: case TLS1_3_CK_CHACHA20_POLY1305_SHA256: break; default: return 1; } if (minversion == TLS1_VERSION && ecdhe && (c->algorithm_mkey & (SSL_kECDHE | SSL_kECDHEPSK)) != 0) minversion = SSL3_VERSION; if (ssl_version_cmp(s, minversion, s->s3.tmp.max_ver) > 0 || ssl_version_cmp(s, maxversion, s->s3.tmp.min_ver) < 0) return 1; return !ssl_security(s, op, c->strength_bits, 0, (void *)c); } int tls_use_ticket(SSL_CONNECTION *s) { if ((s->options & SSL_OP_NO_TICKET)) return 0; return ssl_security(s, SSL_SECOP_TICKET, 0, 0, NULL); } int tls1_set_server_sigalgs(SSL_CONNECTION *s) { size_t i; OPENSSL_free(s->shared_sigalgs); s->shared_sigalgs = NULL; s->shared_sigalgslen = 0; if (s->s3.tmp.valid_flags) memset(s->s3.tmp.valid_flags, 0, s->ssl_pkey_num * sizeof(uint32_t)); else s->s3.tmp.valid_flags = OPENSSL_zalloc(s->ssl_pkey_num * sizeof(uint32_t)); if (s->s3.tmp.valid_flags == NULL) return 0; if (s->s3.tmp.peer_cert_sigalgs == NULL && s->s3.tmp.peer_sigalgs == NULL) { const uint16_t *sent_sigs; size_t sent_sigslen = tls12_get_psigalgs(s, 1, &sent_sigs); for (i = 0; i < s->ssl_pkey_num; i++) { const SIGALG_LOOKUP *lu = tls1_get_legacy_sigalg(s, i); size_t j; if (lu == NULL) continue; for (j = 0; j < sent_sigslen; j++) { if (lu->sigalg == sent_sigs[j]) { s->s3.tmp.valid_flags[i] = CERT_PKEY_SIGN; break; } } } return 1; } if (!tls1_process_sigalgs(s)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (s->shared_sigalgs != NULL) return 1; SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SHARED_SIGNATURE_ALGORITHMS); return 0; } SSL_TICKET_STATUS tls_get_ticket_from_client(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello, SSL_SESSION **ret) { size_t size; RAW_EXTENSION *ticketext; *ret = NULL; s->ext.ticket_expected = 0; if (s->version <= SSL3_VERSION || !tls_use_ticket(s)) return SSL_TICKET_NONE; ticketext = &hello->pre_proc_exts[TLSEXT_IDX_session_ticket]; if (!ticketext->present) return SSL_TICKET_NONE; size = PACKET_remaining(&ticketext->data); return tls_decrypt_ticket(s, PACKET_data(&ticketext->data), size, hello->session_id, hello->session_id_len, ret); } SSL_TICKET_STATUS tls_decrypt_ticket(SSL_CONNECTION *s, const unsigned char *etick, size_t eticklen, const unsigned char *sess_id, size_t sesslen, SSL_SESSION **psess) { SSL_SESSION *sess = NULL; unsigned char *sdec; const unsigned char *p; int slen, ivlen, renew_ticket = 0, declen; SSL_TICKET_STATUS ret = SSL_TICKET_FATAL_ERR_OTHER; size_t mlen; unsigned char tick_hmac[EVP_MAX_MD_SIZE]; SSL_HMAC *hctx = NULL; EVP_CIPHER_CTX *ctx = NULL; SSL_CTX *tctx = s->session_ctx; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (eticklen == 0) { ret = SSL_TICKET_EMPTY; goto end; } if (!SSL_CONNECTION_IS_TLS13(s) && s->ext.session_secret_cb) { ret = SSL_TICKET_NO_DECRYPT; goto end; } if (eticklen < TLSEXT_KEYNAME_LENGTH + EVP_MAX_IV_LENGTH) { ret = SSL_TICKET_NO_DECRYPT; goto end; } hctx = ssl_hmac_new(tctx); if (hctx == NULL) { ret = SSL_TICKET_FATAL_ERR_MALLOC; goto end; } ctx = EVP_CIPHER_CTX_new(); if (ctx == NULL) { ret = SSL_TICKET_FATAL_ERR_MALLOC; goto end; } #ifndef OPENSSL_NO_DEPRECATED_3_0 if (tctx->ext.ticket_key_evp_cb != NULL || tctx->ext.ticket_key_cb != NULL) #else if (tctx->ext.ticket_key_evp_cb != NULL) #endif { unsigned char *nctick = (unsigned char *)etick; int rv = 0; if (tctx->ext.ticket_key_evp_cb != NULL) rv = tctx->ext.ticket_key_evp_cb(SSL_CONNECTION_GET_SSL(s), nctick, nctick + TLSEXT_KEYNAME_LENGTH, ctx, ssl_hmac_get0_EVP_MAC_CTX(hctx), 0); #ifndef OPENSSL_NO_DEPRECATED_3_0 else if (tctx->ext.ticket_key_cb != NULL) rv = tctx->ext.ticket_key_cb(SSL_CONNECTION_GET_SSL(s), nctick, nctick + TLSEXT_KEYNAME_LENGTH, ctx, ssl_hmac_get0_HMAC_CTX(hctx), 0); #endif if (rv < 0) { ret = SSL_TICKET_FATAL_ERR_OTHER; goto end; } if (rv == 0) { ret = SSL_TICKET_NO_DECRYPT; goto end; } if (rv == 2) renew_ticket = 1; } else { EVP_CIPHER *aes256cbc = NULL; if (memcmp(etick, tctx->ext.tick_key_name, TLSEXT_KEYNAME_LENGTH) != 0) { ret = SSL_TICKET_NO_DECRYPT; goto end; } aes256cbc = EVP_CIPHER_fetch(sctx->libctx, "AES-256-CBC", sctx->propq); if (aes256cbc == NULL || ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, sizeof(tctx->ext.secure->tick_hmac_key), "SHA256") <= 0 || EVP_DecryptInit_ex(ctx, aes256cbc, NULL, tctx->ext.secure->tick_aes_key, etick + TLSEXT_KEYNAME_LENGTH) <= 0) { EVP_CIPHER_free(aes256cbc); ret = SSL_TICKET_FATAL_ERR_OTHER; goto end; } EVP_CIPHER_free(aes256cbc); if (SSL_CONNECTION_IS_TLS13(s)) renew_ticket = 1; } mlen = ssl_hmac_size(hctx); if (mlen == 0) { ret = SSL_TICKET_FATAL_ERR_OTHER; goto end; } ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); if (ivlen < 0) { ret = SSL_TICKET_FATAL_ERR_OTHER; goto end; } if (eticklen <= TLSEXT_KEYNAME_LENGTH + ivlen + mlen) { ret = SSL_TICKET_NO_DECRYPT; goto end; } eticklen -= mlen; if (ssl_hmac_update(hctx, etick, eticklen) <= 0 || ssl_hmac_final(hctx, tick_hmac, NULL, sizeof(tick_hmac)) <= 0) { ret = SSL_TICKET_FATAL_ERR_OTHER; goto end; } if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) { ret = SSL_TICKET_NO_DECRYPT; goto end; } p = etick + TLSEXT_KEYNAME_LENGTH + ivlen; eticklen -= TLSEXT_KEYNAME_LENGTH + ivlen; sdec = OPENSSL_malloc(eticklen); if (sdec == NULL || EVP_DecryptUpdate(ctx, sdec, &slen, p, (int)eticklen) <= 0) { OPENSSL_free(sdec); ret = SSL_TICKET_FATAL_ERR_OTHER; goto end; } if (EVP_DecryptFinal(ctx, sdec + slen, &declen) <= 0) { OPENSSL_free(sdec); ret = SSL_TICKET_NO_DECRYPT; goto end; } slen += declen; p = sdec; sess = d2i_SSL_SESSION_ex(NULL, &p, slen, sctx->libctx, sctx->propq); slen -= p - sdec; OPENSSL_free(sdec); if (sess) { if (slen != 0) { SSL_SESSION_free(sess); sess = NULL; ret = SSL_TICKET_NO_DECRYPT; goto end; } if (sesslen) { memcpy(sess->session_id, sess_id, sesslen); sess->session_id_length = sesslen; } if (renew_ticket) ret = SSL_TICKET_SUCCESS_RENEW; else ret = SSL_TICKET_SUCCESS; goto end; } ERR_clear_error(); ret = SSL_TICKET_NO_DECRYPT; end: EVP_CIPHER_CTX_free(ctx); ssl_hmac_free(hctx); if (s->session_ctx->decrypt_ticket_cb != NULL && (ret == SSL_TICKET_EMPTY || ret == SSL_TICKET_NO_DECRYPT || ret == SSL_TICKET_SUCCESS || ret == SSL_TICKET_SUCCESS_RENEW)) { size_t keyname_len = eticklen; int retcb; if (keyname_len > TLSEXT_KEYNAME_LENGTH) keyname_len = TLSEXT_KEYNAME_LENGTH; retcb = s->session_ctx->decrypt_ticket_cb(SSL_CONNECTION_GET_SSL(s), sess, etick, keyname_len, ret, s->session_ctx->ticket_cb_data); switch (retcb) { case SSL_TICKET_RETURN_ABORT: ret = SSL_TICKET_FATAL_ERR_OTHER; break; case SSL_TICKET_RETURN_IGNORE: ret = SSL_TICKET_NONE; SSL_SESSION_free(sess); sess = NULL; break; case SSL_TICKET_RETURN_IGNORE_RENEW: if (ret != SSL_TICKET_EMPTY && ret != SSL_TICKET_NO_DECRYPT) ret = SSL_TICKET_NO_DECRYPT; SSL_SESSION_free(sess); sess = NULL; break; case SSL_TICKET_RETURN_USE: case SSL_TICKET_RETURN_USE_RENEW: if (ret != SSL_TICKET_SUCCESS && ret != SSL_TICKET_SUCCESS_RENEW) ret = SSL_TICKET_FATAL_ERR_OTHER; else if (retcb == SSL_TICKET_RETURN_USE) ret = SSL_TICKET_SUCCESS; else ret = SSL_TICKET_SUCCESS_RENEW; break; default: ret = SSL_TICKET_FATAL_ERR_OTHER; } } if (s->ext.session_secret_cb == NULL || SSL_CONNECTION_IS_TLS13(s)) { switch (ret) { case SSL_TICKET_NO_DECRYPT: case SSL_TICKET_SUCCESS_RENEW: case SSL_TICKET_EMPTY: s->ext.ticket_expected = 1; } } *psess = sess; return ret; } static int tls12_sigalg_allowed(const SSL_CONNECTION *s, int op, const SIGALG_LOOKUP *lu) { unsigned char sigalgstr[2]; int secbits; if (lu == NULL || !lu->enabled) return 0; if (SSL_CONNECTION_IS_TLS13(s) && lu->sig == EVP_PKEY_DSA) return 0; if (!s->server && !SSL_CONNECTION_IS_DTLS(s) && s->s3.tmp.min_ver >= TLS1_3_VERSION && (lu->sig == EVP_PKEY_DSA || lu->hash_idx == SSL_MD_SHA1_IDX || lu->hash_idx == SSL_MD_MD5_IDX || lu->hash_idx == SSL_MD_SHA224_IDX)) return 0; if (ssl_cert_is_disabled(SSL_CONNECTION_GET_CTX(s), lu->sig_idx)) return 0; if (lu->sig == NID_id_GostR3410_2012_256 || lu->sig == NID_id_GostR3410_2012_512 || lu->sig == NID_id_GostR3410_2001) { if (s->server && SSL_CONNECTION_IS_TLS13(s)) return 0; if (!s->server && SSL_CONNECTION_GET_SSL(s)->method->version == TLS_ANY_VERSION && s->s3.tmp.max_ver >= TLS1_3_VERSION) { int i, num; STACK_OF(SSL_CIPHER) *sk; if (s->s3.tmp.min_ver >= TLS1_3_VERSION) return 0; sk = SSL_get_ciphers(SSL_CONNECTION_GET_SSL(s)); num = sk != NULL ? sk_SSL_CIPHER_num(sk) : 0; for (i = 0; i < num; i++) { const SSL_CIPHER *c; c = sk_SSL_CIPHER_value(sk, i); if (ssl_cipher_disabled(s, c, SSL_SECOP_CIPHER_SUPPORTED, 0)) continue; if ((c->algorithm_mkey & (SSL_kGOST | SSL_kGOST18)) != 0) break; } if (i == num) return 0; } } secbits = sigalg_security_bits(SSL_CONNECTION_GET_CTX(s), lu); sigalgstr[0] = (lu->sigalg >> 8) & 0xff; sigalgstr[1] = lu->sigalg & 0xff; return ssl_security(s, op, secbits, lu->hash, (void *)sigalgstr); } void ssl_set_sig_mask(uint32_t *pmask_a, SSL_CONNECTION *s, int op) { const uint16_t *sigalgs; size_t i, sigalgslen; uint32_t disabled_mask = SSL_aRSA | SSL_aDSS | SSL_aECDSA; sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs); for (i = 0; i < sigalgslen; i++, sigalgs++) { const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *sigalgs); const SSL_CERT_LOOKUP *clu; if (lu == NULL) continue; clu = ssl_cert_lookup_by_idx(lu->sig_idx, SSL_CONNECTION_GET_CTX(s)); if (clu == NULL) continue; if ((clu->amask & disabled_mask) != 0 && tls12_sigalg_allowed(s, op, lu)) disabled_mask &= ~clu->amask; } *pmask_a |= disabled_mask; } int tls12_copy_sigalgs(SSL_CONNECTION *s, WPACKET *pkt, const uint16_t *psig, size_t psiglen) { size_t i; int rv = 0; for (i = 0; i < psiglen; i++, psig++) { const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *psig); if (lu == NULL || !tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SUPPORTED, lu)) continue; if (!WPACKET_put_bytes_u16(pkt, *psig)) return 0; if (rv == 0 && (!SSL_CONNECTION_IS_TLS13(s) || (lu->sig != EVP_PKEY_RSA && lu->hash != NID_sha1 && lu->hash != NID_sha224))) rv = 1; } if (rv == 0) ERR_raise(ERR_LIB_SSL, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM); return rv; } static size_t tls12_shared_sigalgs(SSL_CONNECTION *s, const SIGALG_LOOKUP **shsig, const uint16_t *pref, size_t preflen, const uint16_t *allow, size_t allowlen) { const uint16_t *ptmp, *atmp; size_t i, j, nmatch = 0; for (i = 0, ptmp = pref; i < preflen; i++, ptmp++) { const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *ptmp); if (lu == NULL || !tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SHARED, lu)) continue; for (j = 0, atmp = allow; j < allowlen; j++, atmp++) { if (*ptmp == *atmp) { nmatch++; if (shsig) *shsig++ = lu; break; } } } return nmatch; } static int tls1_set_shared_sigalgs(SSL_CONNECTION *s) { const uint16_t *pref, *allow, *conf; size_t preflen, allowlen, conflen; size_t nmatch; const SIGALG_LOOKUP **salgs = NULL; CERT *c = s->cert; unsigned int is_suiteb = tls1_suiteb(s); OPENSSL_free(s->shared_sigalgs); s->shared_sigalgs = NULL; s->shared_sigalgslen = 0; if (!s->server && c->client_sigalgs && !is_suiteb) { conf = c->client_sigalgs; conflen = c->client_sigalgslen; } else if (c->conf_sigalgs && !is_suiteb) { conf = c->conf_sigalgs; conflen = c->conf_sigalgslen; } else conflen = tls12_get_psigalgs(s, 0, &conf); if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE || is_suiteb) { pref = conf; preflen = conflen; allow = s->s3.tmp.peer_sigalgs; allowlen = s->s3.tmp.peer_sigalgslen; } else { allow = conf; allowlen = conflen; pref = s->s3.tmp.peer_sigalgs; preflen = s->s3.tmp.peer_sigalgslen; } nmatch = tls12_shared_sigalgs(s, NULL, pref, preflen, allow, allowlen); if (nmatch) { if ((salgs = OPENSSL_malloc(nmatch * sizeof(*salgs))) == NULL) return 0; nmatch = tls12_shared_sigalgs(s, salgs, pref, preflen, allow, allowlen); } else { salgs = NULL; } s->shared_sigalgs = salgs; s->shared_sigalgslen = nmatch; return 1; } int tls1_save_u16(PACKET *pkt, uint16_t **pdest, size_t *pdestlen) { unsigned int stmp; size_t size, i; uint16_t *buf; size = PACKET_remaining(pkt); if (size == 0 || (size & 1) != 0) return 0; size >>= 1; if ((buf = OPENSSL_malloc(size * sizeof(*buf))) == NULL) return 0; for (i = 0; i < size && PACKET_get_net_2(pkt, &stmp); i++) buf[i] = stmp; if (i != size) { OPENSSL_free(buf); return 0; } OPENSSL_free(*pdest); *pdest = buf; *pdestlen = size; return 1; } int tls1_save_sigalgs(SSL_CONNECTION *s, PACKET *pkt, int cert) { if (!SSL_USE_SIGALGS(s)) return 1; if (s->cert == NULL) return 0; if (cert) return tls1_save_u16(pkt, &s->s3.tmp.peer_cert_sigalgs, &s->s3.tmp.peer_cert_sigalgslen); else return tls1_save_u16(pkt, &s->s3.tmp.peer_sigalgs, &s->s3.tmp.peer_sigalgslen); } int tls1_process_sigalgs(SSL_CONNECTION *s) { size_t i; uint32_t *pvalid = s->s3.tmp.valid_flags; if (!tls1_set_shared_sigalgs(s)) return 0; for (i = 0; i < s->ssl_pkey_num; i++) pvalid[i] = 0; for (i = 0; i < s->shared_sigalgslen; i++) { const SIGALG_LOOKUP *sigptr = s->shared_sigalgs[i]; int idx = sigptr->sig_idx; if (SSL_CONNECTION_IS_TLS13(s) && sigptr->sig == EVP_PKEY_RSA) continue; if (pvalid[idx] == 0 && !ssl_cert_is_disabled(SSL_CONNECTION_GET_CTX(s), idx)) pvalid[idx] = CERT_PKEY_EXPLICIT_SIGN | CERT_PKEY_SIGN; } return 1; } int SSL_get_sigalgs(SSL *s, int idx, int *psign, int *phash, int *psignhash, unsigned char *rsig, unsigned char *rhash) { uint16_t *psig; size_t numsigalgs; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; psig = sc->s3.tmp.peer_sigalgs; numsigalgs = sc->s3.tmp.peer_sigalgslen; if (psig == NULL || numsigalgs > INT_MAX) return 0; if (idx >= 0) { const SIGALG_LOOKUP *lu; if (idx >= (int)numsigalgs) return 0; psig += idx; if (rhash != NULL) *rhash = (unsigned char)((*psig >> 8) & 0xff); if (rsig != NULL) *rsig = (unsigned char)(*psig & 0xff); lu = tls1_lookup_sigalg(sc, *psig); if (psign != NULL) *psign = lu != NULL ? lu->sig : NID_undef; if (phash != NULL) *phash = lu != NULL ? lu->hash : NID_undef; if (psignhash != NULL) *psignhash = lu != NULL ? lu->sigandhash : NID_undef; } return (int)numsigalgs; } int SSL_get_shared_sigalgs(SSL *s, int idx, int *psign, int *phash, int *psignhash, unsigned char *rsig, unsigned char *rhash) { const SIGALG_LOOKUP *shsigalgs; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->shared_sigalgs == NULL || idx < 0 || idx >= (int)sc->shared_sigalgslen || sc->shared_sigalgslen > INT_MAX) return 0; shsigalgs = sc->shared_sigalgs[idx]; if (phash != NULL) *phash = shsigalgs->hash; if (psign != NULL) *psign = shsigalgs->sig; if (psignhash != NULL) *psignhash = shsigalgs->sigandhash; if (rsig != NULL) *rsig = (unsigned char)(shsigalgs->sigalg & 0xff); if (rhash != NULL) *rhash = (unsigned char)((shsigalgs->sigalg >> 8) & 0xff); return (int)sc->shared_sigalgslen; } #define TLS_MAX_SIGALGCNT (OSSL_NELEM(sigalg_lookup_tbl) * 2) typedef struct { size_t sigalgcnt; uint16_t sigalgs[TLS_MAX_SIGALGCNT]; SSL_CTX *ctx; } sig_cb_st; static void get_sigorhash(int *psig, int *phash, const char *str) { if (strcmp(str, "RSA") == 0) { *psig = EVP_PKEY_RSA; } else if (strcmp(str, "RSA-PSS") == 0 || strcmp(str, "PSS") == 0) { *psig = EVP_PKEY_RSA_PSS; } else if (strcmp(str, "DSA") == 0) { *psig = EVP_PKEY_DSA; } else if (strcmp(str, "ECDSA") == 0) { *psig = EVP_PKEY_EC; } else { *phash = OBJ_sn2nid(str); if (*phash == NID_undef) *phash = OBJ_ln2nid(str); } } #define TLS_MAX_SIGSTRING_LEN 40 static int sig_cb(const char *elem, int len, void *arg) { sig_cb_st *sarg = arg; size_t i = 0; const SIGALG_LOOKUP *s; char etmp[TLS_MAX_SIGSTRING_LEN], *p; int sig_alg = NID_undef, hash_alg = NID_undef; int ignore_unknown = 0; if (elem == NULL) return 0; if (elem[0] == '?') { ignore_unknown = 1; ++elem; --len; } if (sarg->sigalgcnt == TLS_MAX_SIGALGCNT) return 0; if (len > (int)(sizeof(etmp) - 1)) return 0; memcpy(etmp, elem, len); etmp[len] = 0; p = strchr(etmp, '+'); if (p == NULL) { if (sarg->ctx != NULL) { for (i = 0; i < sarg->ctx->sigalg_list_len; i++) { if (sarg->ctx->sigalg_list[i].sigalg_name != NULL && strcmp(etmp, sarg->ctx->sigalg_list[i].sigalg_name) == 0) { sarg->sigalgs[sarg->sigalgcnt++] = sarg->ctx->sigalg_list[i].code_point; break; } } } if (sarg->ctx == NULL || i == sarg->ctx->sigalg_list_len) { for (i = 0, s = sigalg_lookup_tbl; i < OSSL_NELEM(sigalg_lookup_tbl); i++, s++) { if (s->name != NULL && strcmp(etmp, s->name) == 0) { sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; break; } } if (i == OSSL_NELEM(sigalg_lookup_tbl)) { return ignore_unknown; } } } else { *p = 0; p++; if (*p == 0) return 0; get_sigorhash(&sig_alg, &hash_alg, etmp); get_sigorhash(&sig_alg, &hash_alg, p); if (sig_alg == NID_undef || hash_alg == NID_undef) { return ignore_unknown; } for (i = 0, s = sigalg_lookup_tbl; i < OSSL_NELEM(sigalg_lookup_tbl); i++, s++) { if (s->hash == hash_alg && s->sig == sig_alg) { sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg; break; } } if (i == OSSL_NELEM(sigalg_lookup_tbl)) { return ignore_unknown; } } for (i = 0; i < sarg->sigalgcnt - 1; i++) { if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) { sarg->sigalgcnt--; return 1; } } return 1; } int tls1_set_sigalgs_list(SSL_CTX *ctx, CERT *c, const char *str, int client) { sig_cb_st sig; sig.sigalgcnt = 0; if (ctx != NULL && ssl_load_sigalgs(ctx)) { sig.ctx = ctx; } if (!CONF_parse_list(str, ':', 1, sig_cb, &sig)) return 0; if (sig.sigalgcnt == 0) { ERR_raise_data(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT, "No valid signature algorithms in '%s'", str); return 0; } if (c == NULL) return 1; return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client); } int tls1_set_raw_sigalgs(CERT *c, const uint16_t *psigs, size_t salglen, int client) { uint16_t *sigalgs; if ((sigalgs = OPENSSL_malloc(salglen * sizeof(*sigalgs))) == NULL) return 0; memcpy(sigalgs, psigs, salglen * sizeof(*sigalgs)); if (client) { OPENSSL_free(c->client_sigalgs); c->client_sigalgs = sigalgs; c->client_sigalgslen = salglen; } else { OPENSSL_free(c->conf_sigalgs); c->conf_sigalgs = sigalgs; c->conf_sigalgslen = salglen; } return 1; } int tls1_set_sigalgs(CERT *c, const int *psig_nids, size_t salglen, int client) { uint16_t *sigalgs, *sptr; size_t i; if (salglen & 1) return 0; if ((sigalgs = OPENSSL_malloc((salglen / 2) * sizeof(*sigalgs))) == NULL) return 0; for (i = 0, sptr = sigalgs; i < salglen; i += 2) { size_t j; const SIGALG_LOOKUP *curr; int md_id = *psig_nids++; int sig_id = *psig_nids++; for (j = 0, curr = sigalg_lookup_tbl; j < OSSL_NELEM(sigalg_lookup_tbl); j++, curr++) { if (curr->hash == md_id && curr->sig == sig_id) { *sptr++ = curr->sigalg; break; } } if (j == OSSL_NELEM(sigalg_lookup_tbl)) goto err; } if (client) { OPENSSL_free(c->client_sigalgs); c->client_sigalgs = sigalgs; c->client_sigalgslen = salglen / 2; } else { OPENSSL_free(c->conf_sigalgs); c->conf_sigalgs = sigalgs; c->conf_sigalgslen = salglen / 2; } return 1; err: OPENSSL_free(sigalgs); return 0; } static int tls1_check_sig_alg(SSL_CONNECTION *s, X509 *x, int default_nid) { int sig_nid, use_pc_sigalgs = 0; size_t i; const SIGALG_LOOKUP *sigalg; size_t sigalgslen; if (default_nid == -1) return 1; sig_nid = X509_get_signature_nid(x); if (default_nid) return sig_nid == default_nid ? 1 : 0; if (SSL_CONNECTION_IS_TLS13(s) && s->s3.tmp.peer_cert_sigalgs != NULL) { sigalgslen = s->s3.tmp.peer_cert_sigalgslen; use_pc_sigalgs = 1; } else { sigalgslen = s->shared_sigalgslen; } for (i = 0; i < sigalgslen; i++) { sigalg = use_pc_sigalgs ? tls1_lookup_sigalg(s, s->s3.tmp.peer_cert_sigalgs[i]) : s->shared_sigalgs[i]; if (sigalg != NULL && sig_nid == sigalg->sigandhash) return 1; } return 0; } static int ssl_check_ca_name(STACK_OF(X509_NAME) *names, X509 *x) { const X509_NAME *nm; int i; nm = X509_get_issuer_name(x); for (i = 0; i < sk_X509_NAME_num(names); i++) { if (!X509_NAME_cmp(nm, sk_X509_NAME_value(names, i))) return 1; } return 0; } #define CERT_PKEY_VALID_FLAGS \ (CERT_PKEY_EE_SIGNATURE|CERT_PKEY_EE_PARAM) #define CERT_PKEY_STRICT_FLAGS \ (CERT_PKEY_VALID_FLAGS|CERT_PKEY_CA_SIGNATURE|CERT_PKEY_CA_PARAM \ | CERT_PKEY_ISSUER_NAME|CERT_PKEY_CERT_TYPE) int tls1_check_chain(SSL_CONNECTION *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain, int idx) { int i; int rv = 0; int check_flags = 0, strict_mode; CERT_PKEY *cpk = NULL; CERT *c = s->cert; uint32_t *pvalid; unsigned int suiteb_flags = tls1_suiteb(s); if (idx != -1) { if (idx == -2) { cpk = c->key; idx = (int)(cpk - c->pkeys); } else cpk = c->pkeys + idx; pvalid = s->s3.tmp.valid_flags + idx; x = cpk->x509; pk = cpk->privatekey; chain = cpk->chain; strict_mode = c->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT; if (tls12_rpk_and_privkey(s, idx)) { if (EVP_PKEY_is_a(pk, "EC") && !tls1_check_pkey_comp(s, pk)) return 0; *pvalid = rv = CERT_PKEY_RPK; return rv; } if (x == NULL || pk == NULL) goto end; } else { size_t certidx; if (x == NULL || pk == NULL) return 0; if (ssl_cert_lookup_by_pkey(pk, &certidx, SSL_CONNECTION_GET_CTX(s)) == NULL) return 0; idx = certidx; pvalid = s->s3.tmp.valid_flags + idx; if (c->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT) check_flags = CERT_PKEY_STRICT_FLAGS; else check_flags = CERT_PKEY_VALID_FLAGS; strict_mode = 1; } if (suiteb_flags) { int ok; if (check_flags) check_flags |= CERT_PKEY_SUITEB; ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags); if (ok == X509_V_OK) rv |= CERT_PKEY_SUITEB; else if (!check_flags) goto end; } if (TLS1_get_version(SSL_CONNECTION_GET_SSL(s)) >= TLS1_2_VERSION && strict_mode) { int default_nid; int rsign = 0; if (s->s3.tmp.peer_cert_sigalgs != NULL || s->s3.tmp.peer_sigalgs != NULL) { default_nid = 0; } else { switch (idx) { case SSL_PKEY_RSA: rsign = EVP_PKEY_RSA; default_nid = NID_sha1WithRSAEncryption; break; case SSL_PKEY_DSA_SIGN: rsign = EVP_PKEY_DSA; default_nid = NID_dsaWithSHA1; break; case SSL_PKEY_ECC: rsign = EVP_PKEY_EC; default_nid = NID_ecdsa_with_SHA1; break; case SSL_PKEY_GOST01: rsign = NID_id_GostR3410_2001; default_nid = NID_id_GostR3411_94_with_GostR3410_2001; break; case SSL_PKEY_GOST12_256: rsign = NID_id_GostR3410_2012_256; default_nid = NID_id_tc26_signwithdigest_gost3410_2012_256; break; case SSL_PKEY_GOST12_512: rsign = NID_id_GostR3410_2012_512; default_nid = NID_id_tc26_signwithdigest_gost3410_2012_512; break; default: default_nid = -1; break; } } if (default_nid > 0 && c->conf_sigalgs) { size_t j; const uint16_t *p = c->conf_sigalgs; for (j = 0; j < c->conf_sigalgslen; j++, p++) { const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(s, *p); if (lu != NULL && lu->hash == NID_sha1 && lu->sig == rsign) break; } if (j == c->conf_sigalgslen) { if (check_flags) goto skip_sigs; else goto end; } } if (SSL_CONNECTION_IS_TLS13(s)) { if (find_sig_alg(s, x, pk) != NULL) rv |= CERT_PKEY_EE_SIGNATURE; } else if (!tls1_check_sig_alg(s, x, default_nid)) { if (!check_flags) goto end; } else rv |= CERT_PKEY_EE_SIGNATURE; rv |= CERT_PKEY_CA_SIGNATURE; for (i = 0; i < sk_X509_num(chain); i++) { if (!tls1_check_sig_alg(s, sk_X509_value(chain, i), default_nid)) { if (check_flags) { rv &= ~CERT_PKEY_CA_SIGNATURE; break; } else goto end; } } } else if (check_flags) rv |= CERT_PKEY_EE_SIGNATURE | CERT_PKEY_CA_SIGNATURE; skip_sigs: if (tls1_check_cert_param(s, x, 1)) rv |= CERT_PKEY_EE_PARAM; else if (!check_flags) goto end; if (!s->server) rv |= CERT_PKEY_CA_PARAM; else if (strict_mode) { rv |= CERT_PKEY_CA_PARAM; for (i = 0; i < sk_X509_num(chain); i++) { X509 *ca = sk_X509_value(chain, i); if (!tls1_check_cert_param(s, ca, 0)) { if (check_flags) { rv &= ~CERT_PKEY_CA_PARAM; break; } else goto end; } } } if (!s->server && strict_mode) { STACK_OF(X509_NAME) *ca_dn; int check_type = 0; if (EVP_PKEY_is_a(pk, "RSA")) check_type = TLS_CT_RSA_SIGN; else if (EVP_PKEY_is_a(pk, "DSA")) check_type = TLS_CT_DSS_SIGN; else if (EVP_PKEY_is_a(pk, "EC")) check_type = TLS_CT_ECDSA_SIGN; if (check_type) { const uint8_t *ctypes = s->s3.tmp.ctype; size_t j; for (j = 0; j < s->s3.tmp.ctype_len; j++, ctypes++) { if (*ctypes == check_type) { rv |= CERT_PKEY_CERT_TYPE; break; } } if (!(rv & CERT_PKEY_CERT_TYPE) && !check_flags) goto end; } else { rv |= CERT_PKEY_CERT_TYPE; } ca_dn = s->s3.tmp.peer_ca_names; if (ca_dn == NULL || sk_X509_NAME_num(ca_dn) == 0 || ssl_check_ca_name(ca_dn, x)) rv |= CERT_PKEY_ISSUER_NAME; else for (i = 0; i < sk_X509_num(chain); i++) { X509 *xtmp = sk_X509_value(chain, i); if (ssl_check_ca_name(ca_dn, xtmp)) { rv |= CERT_PKEY_ISSUER_NAME; break; } } if (!check_flags && !(rv & CERT_PKEY_ISSUER_NAME)) goto end; } else rv |= CERT_PKEY_ISSUER_NAME | CERT_PKEY_CERT_TYPE; if (!check_flags || (rv & check_flags) == check_flags) rv |= CERT_PKEY_VALID; end: if (TLS1_get_version(SSL_CONNECTION_GET_SSL(s)) >= TLS1_2_VERSION) rv |= *pvalid & (CERT_PKEY_EXPLICIT_SIGN | CERT_PKEY_SIGN); else rv |= CERT_PKEY_SIGN | CERT_PKEY_EXPLICIT_SIGN; if (!check_flags) { if (rv & CERT_PKEY_VALID) { *pvalid = rv; } else { *pvalid &= CERT_PKEY_EXPLICIT_SIGN | CERT_PKEY_SIGN; return 0; } } return rv; } void tls1_set_cert_validity(SSL_CONNECTION *s) { tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA_PSS_SIGN); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_DSA_SIGN); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_ECC); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_GOST01); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_GOST12_256); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_GOST12_512); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_ED25519); tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_ED448); } int SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return tls1_check_chain(sc, x, pk, chain, -1); } EVP_PKEY *ssl_get_auto_dh(SSL_CONNECTION *s) { EVP_PKEY *dhp = NULL; BIGNUM *p; int dh_secbits = 80, sec_level_bits; EVP_PKEY_CTX *pctx = NULL; OSSL_PARAM_BLD *tmpl = NULL; OSSL_PARAM *params = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (s->cert->dh_tmp_auto != 2) { if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aPSK)) { if (s->s3.tmp.new_cipher->strength_bits == 256) dh_secbits = 128; else dh_secbits = 80; } else { if (s->s3.tmp.cert == NULL) return NULL; dh_secbits = EVP_PKEY_get_security_bits(s->s3.tmp.cert->privatekey); } } sec_level_bits = ssl_get_security_level_bits(SSL_CONNECTION_GET_SSL(s), NULL, NULL); if (dh_secbits < sec_level_bits) dh_secbits = sec_level_bits; if (dh_secbits >= 192) p = BN_get_rfc3526_prime_8192(NULL); else if (dh_secbits >= 152) p = BN_get_rfc3526_prime_4096(NULL); else if (dh_secbits >= 128) p = BN_get_rfc3526_prime_3072(NULL); else if (dh_secbits >= 112) p = BN_get_rfc3526_prime_2048(NULL); else p = BN_get_rfc2409_prime_1024(NULL); if (p == NULL) goto err; pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, "DH", sctx->propq); if (pctx == NULL || EVP_PKEY_fromdata_init(pctx) != 1) goto err; tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL || !OSSL_PARAM_BLD_push_BN(tmpl, OSSL_PKEY_PARAM_FFC_P, p) || !OSSL_PARAM_BLD_push_uint(tmpl, OSSL_PKEY_PARAM_FFC_G, 2)) goto err; params = OSSL_PARAM_BLD_to_param(tmpl); if (params == NULL || EVP_PKEY_fromdata(pctx, &dhp, EVP_PKEY_KEY_PARAMETERS, params) != 1) goto err; err: OSSL_PARAM_free(params); OSSL_PARAM_BLD_free(tmpl); EVP_PKEY_CTX_free(pctx); BN_free(p); return dhp; } static int ssl_security_cert_key(SSL_CONNECTION *s, SSL_CTX *ctx, X509 *x, int op) { int secbits = -1; EVP_PKEY *pkey = X509_get0_pubkey(x); if (pkey) { secbits = EVP_PKEY_get_security_bits(pkey); } if (s != NULL) return ssl_security(s, op, secbits, 0, x); else return ssl_ctx_security(ctx, op, secbits, 0, x); } static int ssl_security_cert_sig(SSL_CONNECTION *s, SSL_CTX *ctx, X509 *x, int op) { int secbits, nid, pknid; if ((X509_get_extension_flags(x) & EXFLAG_SS) != 0) return 1; if (!X509_get_signature_info(x, &nid, &pknid, &secbits, NULL)) secbits = -1; if (nid == NID_undef) nid = pknid; if (s != NULL) return ssl_security(s, op, secbits, nid, x); else return ssl_ctx_security(ctx, op, secbits, nid, x); } int ssl_security_cert(SSL_CONNECTION *s, SSL_CTX *ctx, X509 *x, int vfy, int is_ee) { if (vfy) vfy = SSL_SECOP_PEER; if (is_ee) { if (!ssl_security_cert_key(s, ctx, x, SSL_SECOP_EE_KEY | vfy)) return SSL_R_EE_KEY_TOO_SMALL; } else { if (!ssl_security_cert_key(s, ctx, x, SSL_SECOP_CA_KEY | vfy)) return SSL_R_CA_KEY_TOO_SMALL; } if (!ssl_security_cert_sig(s, ctx, x, SSL_SECOP_CA_MD | vfy)) return SSL_R_CA_MD_TOO_WEAK; return 1; } int ssl_security_cert_chain(SSL_CONNECTION *s, STACK_OF(X509) *sk, X509 *x, int vfy) { int rv, start_idx, i; if (x == NULL) { x = sk_X509_value(sk, 0); if (x == NULL) return ERR_R_INTERNAL_ERROR; start_idx = 1; } else start_idx = 0; rv = ssl_security_cert(s, NULL, x, vfy, 1); if (rv != 1) return rv; for (i = start_idx; i < sk_X509_num(sk); i++) { x = sk_X509_value(sk, i); rv = ssl_security_cert(s, NULL, x, vfy, 0); if (rv != 1) return rv; } return 1; } static int tls12_get_cert_sigalg_idx(const SSL_CONNECTION *s, const SIGALG_LOOKUP *lu) { int sig_idx = lu->sig_idx; const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(sig_idx, SSL_CONNECTION_GET_CTX(s)); if (clu == NULL || (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0 || (clu->nid == EVP_PKEY_RSA_PSS && (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0)) return -1; if (tls12_rpk_and_privkey(s, sig_idx)) return s->s3.tmp.valid_flags[sig_idx] & CERT_PKEY_RPK ? sig_idx : -1; return s->s3.tmp.valid_flags[sig_idx] & CERT_PKEY_VALID ? sig_idx : -1; } static int check_cert_usable(SSL_CONNECTION *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) { const SIGALG_LOOKUP *lu; int mdnid, pknid, supported; size_t i; const char *mdname = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (sig->hash != NID_undef) mdname = OBJ_nid2sn(sig->hash); supported = EVP_PKEY_digestsign_supports_digest(pkey, sctx->libctx, mdname, sctx->propq); if (supported <= 0) return 0; if (s->s3.tmp.peer_cert_sigalgs != NULL) { if (!X509_get_signature_info(x, &mdnid, &pknid, NULL, NULL)) return 0; for (i = 0; i < s->s3.tmp.peer_cert_sigalgslen; i++) { lu = tls1_lookup_sigalg(s, s->s3.tmp.peer_cert_sigalgs[i]); if (lu == NULL) continue; if (mdnid == lu->hash && pknid == lu->sig) return 1; } return 0; } return 1; } static int has_usable_cert(SSL_CONNECTION *s, const SIGALG_LOOKUP *sig, int idx) { if (idx == -1) idx = sig->sig_idx; if (!ssl_has_cert(s, idx)) return 0; return check_cert_usable(s, sig, s->cert->pkeys[idx].x509, s->cert->pkeys[idx].privatekey); } static int is_cert_usable(SSL_CONNECTION *s, const SIGALG_LOOKUP *sig, X509 *x, EVP_PKEY *pkey) { size_t idx; if (ssl_cert_lookup_by_pkey(pkey, &idx, SSL_CONNECTION_GET_CTX(s)) == NULL) return 0; if ((int)idx != sig->sig_idx) return 0; return check_cert_usable(s, sig, x, pkey); } static const SIGALG_LOOKUP *find_sig_alg(SSL_CONNECTION *s, X509 *x, EVP_PKEY *pkey) { const SIGALG_LOOKUP *lu = NULL; size_t i; int curve = -1; EVP_PKEY *tmppkey; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); for (i = 0; i < s->shared_sigalgslen; i++) { lu = s->shared_sigalgs[i]; if (lu->hash == NID_sha1 || lu->hash == NID_sha224 || lu->sig == EVP_PKEY_DSA || lu->sig == EVP_PKEY_RSA) continue; if (!tls1_lookup_md(sctx, lu, NULL)) continue; if ((pkey == NULL && !has_usable_cert(s, lu, -1)) || (pkey != NULL && !is_cert_usable(s, lu, x, pkey))) continue; tmppkey = (pkey != NULL) ? pkey : s->cert->pkeys[lu->sig_idx].privatekey; if (lu->sig == EVP_PKEY_EC) { if (curve == -1) curve = ssl_get_EC_curve_nid(tmppkey); if (lu->curve != NID_undef && curve != lu->curve) continue; } else if (lu->sig == EVP_PKEY_RSA_PSS) { if (!rsa_pss_check_min_key_size(sctx, tmppkey, lu)) continue; } break; } if (i == s->shared_sigalgslen) return NULL; return lu; } int tls_choose_sigalg(SSL_CONNECTION *s, int fatalerrs) { const SIGALG_LOOKUP *lu = NULL; int sig_idx = -1; s->s3.tmp.cert = NULL; s->s3.tmp.sigalg = NULL; if (SSL_CONNECTION_IS_TLS13(s)) { lu = find_sig_alg(s, NULL, NULL); if (lu == NULL) { if (!fatalerrs) return 1; SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM); return 0; } } else { if (!(s->s3.tmp.new_cipher->algorithm_auth & SSL_aCERT)) return 1; if (!s->server && !ssl_has_cert(s, s->cert->key - s->cert->pkeys)) return 1; if (SSL_USE_SIGALGS(s)) { size_t i; if (s->s3.tmp.peer_sigalgs != NULL) { int curve = -1; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (tls1_suiteb(s)) curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC] .privatekey); for (i = 0; i < s->shared_sigalgslen; i++) { lu = s->shared_sigalgs[i]; if (s->server) { if ((sig_idx = tls12_get_cert_sigalg_idx(s, lu)) == -1) continue; } else { int cc_idx = s->cert->key - s->cert->pkeys; sig_idx = lu->sig_idx; if (cc_idx != sig_idx) continue; } if (!has_usable_cert(s, lu, sig_idx)) continue; if (lu->sig == EVP_PKEY_RSA_PSS) { EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; if (!rsa_pss_check_min_key_size(sctx, pkey, lu)) continue; } if (curve == -1 || lu->curve == curve) break; } #ifndef OPENSSL_NO_GOST if (i == s->shared_sigalgslen && (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aGOST01 | SSL_aGOST12)) != 0) { if ((lu = tls1_get_legacy_sigalg(s, -1)) == NULL) { if (!fatalerrs) return 1; SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM); return 0; } else { i = 0; sig_idx = lu->sig_idx; } } #endif if (i == s->shared_sigalgslen) { if (!fatalerrs) return 1; SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM); return 0; } } else { const uint16_t *sent_sigs; size_t sent_sigslen; if ((lu = tls1_get_legacy_sigalg(s, -1)) == NULL) { if (!fatalerrs) return 1; SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM); return 0; } sent_sigslen = tls12_get_psigalgs(s, 1, &sent_sigs); for (i = 0; i < sent_sigslen; i++, sent_sigs++) { if (lu->sigalg == *sent_sigs && has_usable_cert(s, lu, lu->sig_idx)) break; } if (i == sent_sigslen) { if (!fatalerrs) return 1; SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_WRONG_SIGNATURE_TYPE); return 0; } } } else { if ((lu = tls1_get_legacy_sigalg(s, -1)) == NULL) { if (!fatalerrs) return 1; SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM); return 0; } } } if (sig_idx == -1) sig_idx = lu->sig_idx; s->s3.tmp.cert = &s->cert->pkeys[sig_idx]; s->cert->key = s->s3.tmp.cert; s->s3.tmp.sigalg = lu; return 1; } int SSL_CTX_set_tlsext_max_fragment_length(SSL_CTX *ctx, uint8_t mode) { if (mode != TLSEXT_max_fragment_length_DISABLED && !IS_MAX_FRAGMENT_LENGTH_EXT_VALID(mode)) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH); return 0; } ctx->ext.max_fragment_len_mode = mode; return 1; } int SSL_set_tlsext_max_fragment_length(SSL *ssl, uint8_t mode) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL || (IS_QUIC(ssl) && mode != TLSEXT_max_fragment_length_DISABLED)) return 0; if (mode != TLSEXT_max_fragment_length_DISABLED && !IS_MAX_FRAGMENT_LENGTH_EXT_VALID(mode)) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH); return 0; } sc->ext.max_fragment_len_mode = mode; return 1; } uint8_t SSL_SESSION_get_max_fragment_length(const SSL_SESSION *session) { return session->ext.max_fragment_len_mode; } SSL_HMAC *ssl_hmac_new(const SSL_CTX *ctx) { SSL_HMAC *ret = OPENSSL_zalloc(sizeof(*ret)); EVP_MAC *mac = NULL; if (ret == NULL) return NULL; #ifndef OPENSSL_NO_DEPRECATED_3_0 if (ctx->ext.ticket_key_evp_cb == NULL && ctx->ext.ticket_key_cb != NULL) { if (!ssl_hmac_old_new(ret)) goto err; return ret; } #endif mac = EVP_MAC_fetch(ctx->libctx, "HMAC", ctx->propq); if (mac == NULL || (ret->ctx = EVP_MAC_CTX_new(mac)) == NULL) goto err; EVP_MAC_free(mac); return ret; err: EVP_MAC_CTX_free(ret->ctx); EVP_MAC_free(mac); OPENSSL_free(ret); return NULL; } void ssl_hmac_free(SSL_HMAC *ctx) { if (ctx != NULL) { EVP_MAC_CTX_free(ctx->ctx); #ifndef OPENSSL_NO_DEPRECATED_3_0 ssl_hmac_old_free(ctx); #endif OPENSSL_free(ctx); } } EVP_MAC_CTX *ssl_hmac_get0_EVP_MAC_CTX(SSL_HMAC *ctx) { return ctx->ctx; } int ssl_hmac_init(SSL_HMAC *ctx, void *key, size_t len, char *md) { OSSL_PARAM params[2], *p = params; if (ctx->ctx != NULL) { *p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, md, 0); *p = OSSL_PARAM_construct_end(); if (EVP_MAC_init(ctx->ctx, key, len, params)) return 1; } #ifndef OPENSSL_NO_DEPRECATED_3_0 if (ctx->old_ctx != NULL) return ssl_hmac_old_init(ctx, key, len, md); #endif return 0; } int ssl_hmac_update(SSL_HMAC *ctx, const unsigned char *data, size_t len) { if (ctx->ctx != NULL) return EVP_MAC_update(ctx->ctx, data, len); #ifndef OPENSSL_NO_DEPRECATED_3_0 if (ctx->old_ctx != NULL) return ssl_hmac_old_update(ctx, data, len); #endif return 0; } int ssl_hmac_final(SSL_HMAC *ctx, unsigned char *md, size_t *len, size_t max_size) { if (ctx->ctx != NULL) return EVP_MAC_final(ctx->ctx, md, len, max_size); #ifndef OPENSSL_NO_DEPRECATED_3_0 if (ctx->old_ctx != NULL) return ssl_hmac_old_final(ctx, md, len); #endif return 0; } size_t ssl_hmac_size(const SSL_HMAC *ctx) { if (ctx->ctx != NULL) return EVP_MAC_CTX_get_mac_size(ctx->ctx); #ifndef OPENSSL_NO_DEPRECATED_3_0 if (ctx->old_ctx != NULL) return ssl_hmac_old_size(ctx); #endif return 0; } int ssl_get_EC_curve_nid(const EVP_PKEY *pkey) { char gname[OSSL_MAX_NAME_SIZE]; if (EVP_PKEY_get_group_name(pkey, gname, sizeof(gname), NULL) > 0) return OBJ_txt2nid(gname); return NID_undef; } __owur int tls13_set_encoded_pub_key(EVP_PKEY *pkey, const unsigned char *enckey, size_t enckeylen) { if (EVP_PKEY_is_a(pkey, "DH")) { int bits = EVP_PKEY_get_bits(pkey); if (bits <= 0 || enckeylen != (size_t)bits / 8) return 0; } else if (EVP_PKEY_is_a(pkey, "EC")) { if (enckeylen < 3 || enckey[0] != 0x04) return 0; } return EVP_PKEY_set1_encoded_public_key(pkey, enckey, enckeylen); }
ssl
openssl/ssl/t1_lib.c
openssl
#include "internal/e_os.h" #include <stdio.h> #include <openssl/objects.h> #include <openssl/rand.h> #include "ssl_local.h" #include "internal/time.h" static int dtls1_handshake_write(SSL_CONNECTION *s); static size_t dtls1_link_min_mtu(void); static const size_t g_probable_mtu[] = { 1500, 512, 256 }; const SSL3_ENC_METHOD DTLSv1_enc_data = { tls1_setup_key_block, tls1_generate_master_secret, tls1_change_cipher_state, tls1_final_finish_mac, TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE, TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE, tls1_alert_code, tls1_export_keying_material, SSL_ENC_FLAG_DTLS | SSL_ENC_FLAG_EXPLICIT_IV, dtls1_set_handshake_header, dtls1_close_construct_packet, dtls1_handshake_write }; const SSL3_ENC_METHOD DTLSv1_2_enc_data = { tls1_setup_key_block, tls1_generate_master_secret, tls1_change_cipher_state, tls1_final_finish_mac, TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE, TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE, tls1_alert_code, tls1_export_keying_material, SSL_ENC_FLAG_DTLS | SSL_ENC_FLAG_EXPLICIT_IV | SSL_ENC_FLAG_SIGALGS | SSL_ENC_FLAG_SHA256_PRF | SSL_ENC_FLAG_TLS1_2_CIPHERS, dtls1_set_handshake_header, dtls1_close_construct_packet, dtls1_handshake_write }; OSSL_TIME dtls1_default_timeout(void) { return ossl_seconds2time(60 * 60 * 2); } int dtls1_new(SSL *ssl) { DTLS1_STATE *d1; SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return 0; if (!DTLS_RECORD_LAYER_new(&s->rlayer)) { return 0; } if (!ssl3_new(ssl)) return 0; if ((d1 = OPENSSL_zalloc(sizeof(*d1))) == NULL) { ssl3_free(ssl); return 0; } d1->buffered_messages = pqueue_new(); d1->sent_messages = pqueue_new(); if (s->server) { d1->cookie_len = sizeof(s->d1->cookie); } d1->link_mtu = 0; d1->mtu = 0; if (d1->buffered_messages == NULL || d1->sent_messages == NULL) { pqueue_free(d1->buffered_messages); pqueue_free(d1->sent_messages); OPENSSL_free(d1); ssl3_free(ssl); return 0; } s->d1 = d1; if (!ssl->method->ssl_clear(ssl)) return 0; return 1; } static void dtls1_clear_queues(SSL_CONNECTION *s) { dtls1_clear_received_buffer(s); dtls1_clear_sent_buffer(s); } void dtls1_clear_received_buffer(SSL_CONNECTION *s) { pitem *item = NULL; hm_fragment *frag = NULL; while ((item = pqueue_pop(s->d1->buffered_messages)) != NULL) { frag = (hm_fragment *)item->data; dtls1_hm_fragment_free(frag); pitem_free(item); } } void dtls1_clear_sent_buffer(SSL_CONNECTION *s) { pitem *item = NULL; hm_fragment *frag = NULL; while ((item = pqueue_pop(s->d1->sent_messages)) != NULL) { frag = (hm_fragment *)item->data; if (frag->msg_header.is_ccs && frag->msg_header.saved_retransmit_state.wrlmethod != NULL && s->rlayer.wrl != frag->msg_header.saved_retransmit_state.wrl) { frag->msg_header.saved_retransmit_state.wrlmethod->free(frag->msg_header.saved_retransmit_state.wrl); } dtls1_hm_fragment_free(frag); pitem_free(item); } } void dtls1_free(SSL *ssl) { SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return; if (s->d1 != NULL) { dtls1_clear_queues(s); pqueue_free(s->d1->buffered_messages); pqueue_free(s->d1->sent_messages); } DTLS_RECORD_LAYER_free(&s->rlayer); ssl3_free(ssl); OPENSSL_free(s->d1); s->d1 = NULL; } int dtls1_clear(SSL *ssl) { pqueue *buffered_messages; pqueue *sent_messages; size_t mtu; size_t link_mtu; SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return 0; DTLS_RECORD_LAYER_clear(&s->rlayer); if (s->d1) { DTLS_timer_cb timer_cb = s->d1->timer_cb; buffered_messages = s->d1->buffered_messages; sent_messages = s->d1->sent_messages; mtu = s->d1->mtu; link_mtu = s->d1->link_mtu; dtls1_clear_queues(s); memset(s->d1, 0, sizeof(*s->d1)); s->d1->timer_cb = timer_cb; if (s->server) { s->d1->cookie_len = sizeof(s->d1->cookie); } if (SSL_get_options(ssl) & SSL_OP_NO_QUERY_MTU) { s->d1->mtu = mtu; s->d1->link_mtu = link_mtu; } s->d1->buffered_messages = buffered_messages; s->d1->sent_messages = sent_messages; } if (!ssl3_clear(ssl)) return 0; if (ssl->method->version == DTLS_ANY_VERSION) s->version = DTLS_MAX_VERSION_INTERNAL; #ifndef OPENSSL_NO_DTLS1_METHOD else if (s->options & SSL_OP_CISCO_ANYCONNECT) s->client_version = s->version = DTLS1_BAD_VER; #endif else s->version = ssl->method->version; return 1; } long dtls1_ctrl(SSL *ssl, int cmd, long larg, void *parg) { int ret = 0; OSSL_TIME t; SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return 0; switch (cmd) { case DTLS_CTRL_GET_TIMEOUT: if (dtls1_get_timeout(s, &t)) { *(struct timeval *)parg = ossl_time_to_timeval(t); ret = 1; } break; case DTLS_CTRL_HANDLE_TIMEOUT: ret = dtls1_handle_timeout(s); break; case DTLS_CTRL_SET_LINK_MTU: if (larg < (long)dtls1_link_min_mtu()) return 0; s->d1->link_mtu = larg; return 1; case DTLS_CTRL_GET_LINK_MIN_MTU: return (long)dtls1_link_min_mtu(); case SSL_CTRL_SET_MTU: if (larg < (long)dtls1_link_min_mtu() - DTLS1_MAX_MTU_OVERHEAD) return 0; s->d1->mtu = larg; return larg; default: ret = ssl3_ctrl(ssl, cmd, larg, parg); break; } return ret; } static void dtls1_bio_set_next_timeout(BIO *bio, const DTLS1_STATE *d1) { struct timeval tv = ossl_time_to_timeval(d1->next_timeout); BIO_ctrl(bio, BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT, 0, &tv); } void dtls1_start_timer(SSL_CONNECTION *s) { OSSL_TIME duration; SSL *ssl = SSL_CONNECTION_GET_SSL(s); #ifndef OPENSSL_NO_SCTP if (BIO_dgram_is_sctp(SSL_get_wbio(ssl))) { s->d1->next_timeout = ossl_time_zero(); return; } #endif if (ossl_time_is_zero(s->d1->next_timeout)) { if (s->d1->timer_cb != NULL) s->d1->timeout_duration_us = s->d1->timer_cb(ssl, 0); else s->d1->timeout_duration_us = 1000000; } duration = ossl_us2time(s->d1->timeout_duration_us); s->d1->next_timeout = ossl_time_add(ossl_time_now(), duration); dtls1_bio_set_next_timeout(SSL_get_rbio(ssl), s->d1); } int dtls1_get_timeout(const SSL_CONNECTION *s, OSSL_TIME *timeleft) { OSSL_TIME timenow; if (ossl_time_is_zero(s->d1->next_timeout)) return 0; timenow = ossl_time_now(); *timeleft = ossl_time_subtract(s->d1->next_timeout, timenow); if (ossl_time_compare(*timeleft, ossl_ms2time(15)) <= 0) *timeleft = ossl_time_zero(); return 1; } int dtls1_is_timer_expired(SSL_CONNECTION *s) { OSSL_TIME timeleft; if (!dtls1_get_timeout(s, &timeleft)) return 0; if (!ossl_time_is_zero(timeleft)) return 0; return 1; } static void dtls1_double_timeout(SSL_CONNECTION *s) { s->d1->timeout_duration_us *= 2; if (s->d1->timeout_duration_us > 60000000) s->d1->timeout_duration_us = 60000000; } void dtls1_stop_timer(SSL_CONNECTION *s) { s->d1->timeout_num_alerts = 0; s->d1->next_timeout = ossl_time_zero(); s->d1->timeout_duration_us = 1000000; dtls1_bio_set_next_timeout(s->rbio, s->d1); dtls1_clear_sent_buffer(s); } int dtls1_check_timeout_num(SSL_CONNECTION *s) { size_t mtu; SSL *ssl = SSL_CONNECTION_GET_SSL(s); s->d1->timeout_num_alerts++; if (s->d1->timeout_num_alerts > 2 && !(SSL_get_options(ssl) & SSL_OP_NO_QUERY_MTU)) { mtu = BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_GET_FALLBACK_MTU, 0, NULL); if (mtu < s->d1->mtu) s->d1->mtu = mtu; } if (s->d1->timeout_num_alerts > DTLS1_TMO_ALERT_COUNT) { SSLfatal(s, SSL_AD_NO_ALERT, SSL_R_READ_TIMEOUT_EXPIRED); return -1; } return 0; } int dtls1_handle_timeout(SSL_CONNECTION *s) { if (!dtls1_is_timer_expired(s)) { return 0; } if (s->d1->timer_cb != NULL) s->d1->timeout_duration_us = s->d1->timer_cb(SSL_CONNECTION_GET_SSL(s), s->d1->timeout_duration_us); else dtls1_double_timeout(s); if (dtls1_check_timeout_num(s) < 0) { return -1; } dtls1_start_timer(s); return dtls1_retransmit_buffered_messages(s); } #define LISTEN_SUCCESS 2 #define LISTEN_SEND_VERIFY_REQUEST 1 #ifndef OPENSSL_NO_SOCK int DTLSv1_listen(SSL *ssl, BIO_ADDR *client) { int next, n, ret = 0; unsigned char cookie[DTLS1_COOKIE_LENGTH]; unsigned char seq[SEQ_NUM_SIZE]; const unsigned char *data; unsigned char *buf = NULL, *wbuf; size_t fragoff, fraglen, msglen; unsigned int rectype, versmajor, versminor, msgseq, msgtype, clientvers, cookielen; BIO *rbio, *wbio; BIO_ADDR *tmpclient = NULL; PACKET pkt, msgpkt, msgpayload, session, cookiepkt; SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return -1; if (s->handshake_func == NULL) { SSL_set_accept_state(ssl); } if (!SSL_clear(ssl)) return -1; ERR_clear_error(); rbio = SSL_get_rbio(ssl); wbio = SSL_get_wbio(ssl); if (!rbio || !wbio) { ERR_raise(ERR_LIB_SSL, SSL_R_BIO_NOT_SET); return -1; } if ((s->version & 0xff00) != (DTLS1_VERSION & 0xff00)) { ERR_raise(ERR_LIB_SSL, SSL_R_UNSUPPORTED_SSL_VERSION); return -1; } buf = OPENSSL_malloc(DTLS1_RT_HEADER_LENGTH + SSL3_RT_MAX_PLAIN_LENGTH); if (buf == NULL) return -1; wbuf = OPENSSL_malloc(DTLS1_RT_HEADER_LENGTH + SSL3_RT_MAX_PLAIN_LENGTH); if (wbuf == NULL) { OPENSSL_free(buf); return -1; } do { clear_sys_error(); n = BIO_read(rbio, buf, SSL3_RT_MAX_PLAIN_LENGTH + DTLS1_RT_HEADER_LENGTH); if (n <= 0) { if (BIO_should_retry(rbio)) { goto end; } ret = -1; goto end; } if (!PACKET_buf_init(&pkt, buf, n)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); ret = -1; goto end; } if (n < DTLS1_RT_HEADER_LENGTH) { ERR_raise(ERR_LIB_SSL, SSL_R_RECORD_TOO_SMALL); goto end; } if (!PACKET_get_1(&pkt, &rectype) || !PACKET_get_1(&pkt, &versmajor) || !PACKET_get_1(&pkt, &versminor)) { ERR_raise(ERR_LIB_SSL, SSL_R_LENGTH_MISMATCH); goto end; } if (s->msg_callback) s->msg_callback(0, (versmajor << 8) | versminor, SSL3_RT_HEADER, buf, DTLS1_RT_HEADER_LENGTH, ssl, s->msg_callback_arg); if (rectype != SSL3_RT_HANDSHAKE) { ERR_raise(ERR_LIB_SSL, SSL_R_UNEXPECTED_MESSAGE); goto end; } if (versmajor != DTLS1_VERSION_MAJOR) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_PROTOCOL_VERSION_NUMBER); goto end; } if (!PACKET_copy_bytes(&pkt, seq, SEQ_NUM_SIZE) || !PACKET_get_length_prefixed_2(&pkt, &msgpkt)) { ERR_raise(ERR_LIB_SSL, SSL_R_LENGTH_MISMATCH); goto end; } if (seq[0] != 0 || seq[1] != 0) { ERR_raise(ERR_LIB_SSL, SSL_R_UNEXPECTED_MESSAGE); goto end; } data = PACKET_data(&msgpkt); if (!PACKET_get_1(&msgpkt, &msgtype) || !PACKET_get_net_3_len(&msgpkt, &msglen) || !PACKET_get_net_2(&msgpkt, &msgseq) || !PACKET_get_net_3_len(&msgpkt, &fragoff) || !PACKET_get_net_3_len(&msgpkt, &fraglen) || !PACKET_get_sub_packet(&msgpkt, &msgpayload, fraglen) || PACKET_remaining(&msgpkt) != 0) { ERR_raise(ERR_LIB_SSL, SSL_R_LENGTH_MISMATCH); goto end; } if (msgtype != SSL3_MT_CLIENT_HELLO) { ERR_raise(ERR_LIB_SSL, SSL_R_UNEXPECTED_MESSAGE); goto end; } if (msgseq > 2) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SEQUENCE_NUMBER); goto end; } if (fragoff != 0 || fraglen > msglen) { ERR_raise(ERR_LIB_SSL, SSL_R_FRAGMENTED_CLIENT_HELLO); goto end; } if (s->msg_callback) s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, data, fraglen + DTLS1_HM_HEADER_LENGTH, ssl, s->msg_callback_arg); if (!PACKET_get_net_2(&msgpayload, &clientvers)) { ERR_raise(ERR_LIB_SSL, SSL_R_LENGTH_MISMATCH); goto end; } if (DTLS_VERSION_LT(clientvers, (unsigned int)ssl->method->version) && ssl->method->version != DTLS_ANY_VERSION) { ERR_raise(ERR_LIB_SSL, SSL_R_WRONG_VERSION_NUMBER); goto end; } if (!PACKET_forward(&msgpayload, SSL3_RANDOM_SIZE) || !PACKET_get_length_prefixed_1(&msgpayload, &session) || !PACKET_get_length_prefixed_1(&msgpayload, &cookiepkt)) { ERR_raise(ERR_LIB_SSL, SSL_R_LENGTH_MISMATCH); goto end; } if (PACKET_remaining(&cookiepkt) == 0) { next = LISTEN_SEND_VERIFY_REQUEST; } else { if (ssl->ctx->app_verify_cookie_cb == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_VERIFY_COOKIE_CALLBACK); ret = -1; goto end; } if (ssl->ctx->app_verify_cookie_cb(ssl, PACKET_data(&cookiepkt), (unsigned int)PACKET_remaining(&cookiepkt)) == 0) { next = LISTEN_SEND_VERIFY_REQUEST; } else { next = LISTEN_SUCCESS; } } if (next == LISTEN_SEND_VERIFY_REQUEST) { WPACKET wpkt; unsigned int version; size_t wreclen; if (ssl->ctx->app_gen_cookie_cb == NULL || ssl->ctx->app_gen_cookie_cb(ssl, cookie, &cookielen) == 0 || cookielen > 255) { ERR_raise(ERR_LIB_SSL, SSL_R_COOKIE_GEN_CALLBACK_FAILURE); ret = -1; goto end; } version = (ssl->method->version == DTLS_ANY_VERSION) ? DTLS1_VERSION : s->version; if (!WPACKET_init_static_len(&wpkt, wbuf, ssl_get_max_send_fragment(s) + DTLS1_RT_HEADER_LENGTH, 0) || !WPACKET_put_bytes_u8(&wpkt, SSL3_RT_HANDSHAKE) || !WPACKET_put_bytes_u16(&wpkt, version) || !WPACKET_memcpy(&wpkt, seq, SEQ_NUM_SIZE) || !WPACKET_start_sub_packet_u16(&wpkt) || !WPACKET_put_bytes_u8(&wpkt, DTLS1_MT_HELLO_VERIFY_REQUEST) || !WPACKET_put_bytes_u24(&wpkt, 0) || !WPACKET_put_bytes_u16(&wpkt, 0) || !WPACKET_put_bytes_u24(&wpkt, 0) || !WPACKET_start_sub_packet_u24(&wpkt) || !dtls_raw_hello_verify_request(&wpkt, cookie, cookielen) || !WPACKET_close(&wpkt) || !WPACKET_close(&wpkt) || !WPACKET_get_total_written(&wpkt, &wreclen) || !WPACKET_finish(&wpkt)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); WPACKET_cleanup(&wpkt); ret = -1; goto end; } memcpy(&wbuf[DTLS1_RT_HEADER_LENGTH + 1], &wbuf[DTLS1_RT_HEADER_LENGTH + DTLS1_HM_HEADER_LENGTH - 3], 3); if (s->msg_callback) s->msg_callback(1, 0, SSL3_RT_HEADER, buf, DTLS1_RT_HEADER_LENGTH, ssl, s->msg_callback_arg); if ((tmpclient = BIO_ADDR_new()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BIO_LIB); goto end; } if (BIO_dgram_get_peer(rbio, tmpclient) > 0) { (void)BIO_dgram_set_peer(wbio, tmpclient); } BIO_ADDR_free(tmpclient); tmpclient = NULL; if (BIO_write(wbio, wbuf, wreclen) < (int)wreclen) { if (BIO_should_retry(wbio)) { goto end; } ret = -1; goto end; } if (BIO_flush(wbio) <= 0) { if (BIO_should_retry(wbio)) { goto end; } ret = -1; goto end; } } } while (next != LISTEN_SUCCESS); s->d1->handshake_read_seq = 1; s->d1->handshake_write_seq = 1; s->d1->next_handshake_write_seq = 1; s->rlayer.wrlmethod->increment_sequence_ctr(s->rlayer.wrl); SSL_set_options(ssl, SSL_OP_COOKIE_EXCHANGE); ossl_statem_set_hello_verify_done(s); if (BIO_dgram_get_peer(rbio, client) <= 0) BIO_ADDR_clear(client); if (BIO_write(s->rlayer.rrlnext, buf, n) != n) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); ret = -1; goto end; } if (!ssl_set_new_record_layer(s, DTLS_ANY_VERSION, OSSL_RECORD_DIRECTION_READ, OSSL_RECORD_PROTECTION_LEVEL_NONE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NID_undef, NULL, NULL, NULL)) { ret = -1; goto end; } ret = 1; end: BIO_ADDR_free(tmpclient); OPENSSL_free(buf); OPENSSL_free(wbuf); return ret; } #endif static int dtls1_handshake_write(SSL_CONNECTION *s) { return dtls1_do_write(s, SSL3_RT_HANDSHAKE); } int dtls1_shutdown(SSL *s) { int ret; #ifndef OPENSSL_NO_SCTP BIO *wbio; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (s == NULL) return -1; wbio = SSL_get_wbio(s); if (wbio != NULL && BIO_dgram_is_sctp(wbio) && !(sc->shutdown & SSL_SENT_SHUTDOWN)) { ret = BIO_dgram_sctp_wait_for_dry(wbio); if (ret < 0) return -1; if (ret == 0) BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN, 1, NULL); } #endif ret = ssl3_shutdown(s); #ifndef OPENSSL_NO_SCTP BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN, 0, NULL); #endif return ret; } int dtls1_query_mtu(SSL_CONNECTION *s) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->d1->link_mtu) { s->d1->mtu = s->d1->link_mtu - BIO_dgram_get_mtu_overhead(SSL_get_wbio(ssl)); s->d1->link_mtu = 0; } if (s->d1->mtu < dtls1_min_mtu(s)) { if (!(SSL_get_options(ssl) & SSL_OP_NO_QUERY_MTU)) { s->d1->mtu = BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL); if (s->d1->mtu < dtls1_min_mtu(s)) { s->d1->mtu = dtls1_min_mtu(s); BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SET_MTU, (long)s->d1->mtu, NULL); } } else return 0; } return 1; } static size_t dtls1_link_min_mtu(void) { return (g_probable_mtu[(sizeof(g_probable_mtu) / sizeof(g_probable_mtu[0])) - 1]); } size_t dtls1_min_mtu(SSL_CONNECTION *s) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); return dtls1_link_min_mtu() - BIO_dgram_get_mtu_overhead(SSL_get_wbio(ssl)); } size_t DTLS_get_data_mtu(const SSL *ssl) { size_t mac_overhead, int_overhead, blocksize, ext_overhead; const SSL_CIPHER *ciph = SSL_get_current_cipher(ssl); size_t mtu; const SSL_CONNECTION *s = SSL_CONNECTION_FROM_CONST_SSL_ONLY(ssl); if (s == NULL) return 0; mtu = s->d1->mtu; if (ciph == NULL) return 0; if (!ssl_cipher_get_overhead(ciph, &mac_overhead, &int_overhead, &blocksize, &ext_overhead)) return 0; if (SSL_READ_ETM(s)) ext_overhead += mac_overhead; else int_overhead += mac_overhead; if (ext_overhead + DTLS1_RT_HEADER_LENGTH >= mtu) return 0; mtu -= ext_overhead + DTLS1_RT_HEADER_LENGTH; if (blocksize) mtu -= (mtu % blocksize); if (int_overhead >= mtu) return 0; mtu -= int_overhead; return mtu; } void DTLS_set_timer_cb(SSL *ssl, DTLS_timer_cb cb) { SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return; s->d1->timer_cb = cb; }
ssl
openssl/ssl/d1_lib.c
openssl
#include "ssl_local.h" #ifndef OPENSSL_NO_SSL_TRACE #include "internal/nelem.h" typedef struct { int num; const char *name; } ssl_trace_tbl; # define ssl_trace_str(val, tbl) \ do_ssl_trace_str(val, tbl, OSSL_NELEM(tbl)) # define ssl_trace_list(bio, indent, msg, msglen, value, table) \ do_ssl_trace_list(bio, indent, msg, msglen, value, \ table, OSSL_NELEM(table)) static const char *do_ssl_trace_str(int val, const ssl_trace_tbl *tbl, size_t ntbl) { size_t i; for (i = 0; i < ntbl; i++, tbl++) { if (tbl->num == val) return tbl->name; } return "UNKNOWN"; } static int do_ssl_trace_list(BIO *bio, int indent, const unsigned char *msg, size_t msglen, size_t vlen, const ssl_trace_tbl *tbl, size_t ntbl) { int val; if (msglen % vlen) return 0; while (msglen) { val = msg[0]; if (vlen == 2) val = (val << 8) | msg[1]; BIO_indent(bio, indent, 80); BIO_printf(bio, "%s (%d)\n", do_ssl_trace_str(val, tbl, ntbl), val); msg += vlen; msglen -= vlen; } return 1; } static const ssl_trace_tbl ssl_version_tbl[] = { {SSL3_VERSION, "SSL 3.0"}, {TLS1_VERSION, "TLS 1.0"}, {TLS1_1_VERSION, "TLS 1.1"}, {TLS1_2_VERSION, "TLS 1.2"}, {TLS1_3_VERSION, "TLS 1.3"}, {DTLS1_VERSION, "DTLS 1.0"}, {DTLS1_2_VERSION, "DTLS 1.2"}, {DTLS1_BAD_VER, "DTLS 1.0 (bad)"} }; static const ssl_trace_tbl ssl_content_tbl[] = { {SSL3_RT_CHANGE_CIPHER_SPEC, "ChangeCipherSpec"}, {SSL3_RT_ALERT, "Alert"}, {SSL3_RT_HANDSHAKE, "Handshake"}, {SSL3_RT_APPLICATION_DATA, "ApplicationData"}, }; static const ssl_trace_tbl ssl_handshake_tbl[] = { {SSL3_MT_HELLO_REQUEST, "HelloRequest"}, {SSL3_MT_CLIENT_HELLO, "ClientHello"}, {SSL3_MT_SERVER_HELLO, "ServerHello"}, {DTLS1_MT_HELLO_VERIFY_REQUEST, "HelloVerifyRequest"}, {SSL3_MT_NEWSESSION_TICKET, "NewSessionTicket"}, {SSL3_MT_END_OF_EARLY_DATA, "EndOfEarlyData"}, {SSL3_MT_ENCRYPTED_EXTENSIONS, "EncryptedExtensions"}, {SSL3_MT_CERTIFICATE, "Certificate"}, {SSL3_MT_SERVER_KEY_EXCHANGE, "ServerKeyExchange"}, {SSL3_MT_CERTIFICATE_REQUEST, "CertificateRequest"}, {SSL3_MT_SERVER_DONE, "ServerHelloDone"}, {SSL3_MT_CERTIFICATE_VERIFY, "CertificateVerify"}, {SSL3_MT_CLIENT_KEY_EXCHANGE, "ClientKeyExchange"}, {SSL3_MT_FINISHED, "Finished"}, {SSL3_MT_CERTIFICATE_URL, "CertificateUrl"}, {SSL3_MT_CERTIFICATE_STATUS, "CertificateStatus"}, {SSL3_MT_SUPPLEMENTAL_DATA, "SupplementalData"}, {SSL3_MT_KEY_UPDATE, "KeyUpdate"}, {SSL3_MT_COMPRESSED_CERTIFICATE, "CompressedCertificate"}, # ifndef OPENSSL_NO_NEXTPROTONEG {SSL3_MT_NEXT_PROTO, "NextProto"}, # endif {SSL3_MT_MESSAGE_HASH, "MessageHash"} }; static const ssl_trace_tbl ssl_ciphers_tbl[] = { {0x0000, "TLS_NULL_WITH_NULL_NULL"}, {0x0001, "TLS_RSA_WITH_NULL_MD5"}, {0x0002, "TLS_RSA_WITH_NULL_SHA"}, {0x0003, "TLS_RSA_EXPORT_WITH_RC4_40_MD5"}, {0x0004, "TLS_RSA_WITH_RC4_128_MD5"}, {0x0005, "TLS_RSA_WITH_RC4_128_SHA"}, {0x0006, "TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5"}, {0x0007, "TLS_RSA_WITH_IDEA_CBC_SHA"}, {0x0008, "TLS_RSA_EXPORT_WITH_DES40_CBC_SHA"}, {0x0009, "TLS_RSA_WITH_DES_CBC_SHA"}, {0x000A, "TLS_RSA_WITH_3DES_EDE_CBC_SHA"}, {0x000B, "TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA"}, {0x000C, "TLS_DH_DSS_WITH_DES_CBC_SHA"}, {0x000D, "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"}, {0x000E, "TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA"}, {0x000F, "TLS_DH_RSA_WITH_DES_CBC_SHA"}, {0x0010, "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"}, {0x0011, "TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA"}, {0x0012, "TLS_DHE_DSS_WITH_DES_CBC_SHA"}, {0x0013, "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"}, {0x0014, "TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA"}, {0x0015, "TLS_DHE_RSA_WITH_DES_CBC_SHA"}, {0x0016, "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"}, {0x0017, "TLS_DH_anon_EXPORT_WITH_RC4_40_MD5"}, {0x0018, "TLS_DH_anon_WITH_RC4_128_MD5"}, {0x0019, "TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA"}, {0x001A, "TLS_DH_anon_WITH_DES_CBC_SHA"}, {0x001B, "TLS_DH_anon_WITH_3DES_EDE_CBC_SHA"}, {0x001D, "SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA"}, {0x001E, "SSL_FORTEZZA_KEA_WITH_RC4_128_SHA"}, {0x001F, "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"}, {0x0020, "TLS_KRB5_WITH_RC4_128_SHA"}, {0x0021, "TLS_KRB5_WITH_IDEA_CBC_SHA"}, {0x0022, "TLS_KRB5_WITH_DES_CBC_MD5"}, {0x0023, "TLS_KRB5_WITH_3DES_EDE_CBC_MD5"}, {0x0024, "TLS_KRB5_WITH_RC4_128_MD5"}, {0x0025, "TLS_KRB5_WITH_IDEA_CBC_MD5"}, {0x0026, "TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA"}, {0x0027, "TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA"}, {0x0028, "TLS_KRB5_EXPORT_WITH_RC4_40_SHA"}, {0x0029, "TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5"}, {0x002A, "TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5"}, {0x002B, "TLS_KRB5_EXPORT_WITH_RC4_40_MD5"}, {0x002C, "TLS_PSK_WITH_NULL_SHA"}, {0x002D, "TLS_DHE_PSK_WITH_NULL_SHA"}, {0x002E, "TLS_RSA_PSK_WITH_NULL_SHA"}, {0x002F, "TLS_RSA_WITH_AES_128_CBC_SHA"}, {0x0030, "TLS_DH_DSS_WITH_AES_128_CBC_SHA"}, {0x0031, "TLS_DH_RSA_WITH_AES_128_CBC_SHA"}, {0x0032, "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"}, {0x0033, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"}, {0x0034, "TLS_DH_anon_WITH_AES_128_CBC_SHA"}, {0x0035, "TLS_RSA_WITH_AES_256_CBC_SHA"}, {0x0036, "TLS_DH_DSS_WITH_AES_256_CBC_SHA"}, {0x0037, "TLS_DH_RSA_WITH_AES_256_CBC_SHA"}, {0x0038, "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"}, {0x0039, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"}, {0x003A, "TLS_DH_anon_WITH_AES_256_CBC_SHA"}, {0x003B, "TLS_RSA_WITH_NULL_SHA256"}, {0x003C, "TLS_RSA_WITH_AES_128_CBC_SHA256"}, {0x003D, "TLS_RSA_WITH_AES_256_CBC_SHA256"}, {0x003E, "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"}, {0x003F, "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"}, {0x0040, "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"}, {0x0041, "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"}, {0x0042, "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"}, {0x0043, "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"}, {0x0044, "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"}, {0x0045, "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"}, {0x0046, "TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA"}, {0x0067, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"}, {0x0068, "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"}, {0x0069, "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"}, {0x006A, "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"}, {0x006B, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"}, {0x006C, "TLS_DH_anon_WITH_AES_128_CBC_SHA256"}, {0x006D, "TLS_DH_anon_WITH_AES_256_CBC_SHA256"}, {0x0081, "TLS_GOSTR341001_WITH_28147_CNT_IMIT"}, {0x0083, "TLS_GOSTR341001_WITH_NULL_GOSTR3411"}, {0x0084, "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"}, {0x0085, "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"}, {0x0086, "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"}, {0x0087, "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"}, {0x0088, "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"}, {0x0089, "TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA"}, {0x008A, "TLS_PSK_WITH_RC4_128_SHA"}, {0x008B, "TLS_PSK_WITH_3DES_EDE_CBC_SHA"}, {0x008C, "TLS_PSK_WITH_AES_128_CBC_SHA"}, {0x008D, "TLS_PSK_WITH_AES_256_CBC_SHA"}, {0x008E, "TLS_DHE_PSK_WITH_RC4_128_SHA"}, {0x008F, "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"}, {0x0090, "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"}, {0x0091, "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"}, {0x0092, "TLS_RSA_PSK_WITH_RC4_128_SHA"}, {0x0093, "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"}, {0x0094, "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"}, {0x0095, "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"}, {0x0096, "TLS_RSA_WITH_SEED_CBC_SHA"}, {0x0097, "TLS_DH_DSS_WITH_SEED_CBC_SHA"}, {0x0098, "TLS_DH_RSA_WITH_SEED_CBC_SHA"}, {0x0099, "TLS_DHE_DSS_WITH_SEED_CBC_SHA"}, {0x009A, "TLS_DHE_RSA_WITH_SEED_CBC_SHA"}, {0x009B, "TLS_DH_anon_WITH_SEED_CBC_SHA"}, {0x009C, "TLS_RSA_WITH_AES_128_GCM_SHA256"}, {0x009D, "TLS_RSA_WITH_AES_256_GCM_SHA384"}, {0x009E, "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"}, {0x009F, "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384"}, {0x00A0, "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"}, {0x00A1, "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"}, {0x00A2, "TLS_DHE_DSS_WITH_AES_128_GCM_SHA256"}, {0x00A3, "TLS_DHE_DSS_WITH_AES_256_GCM_SHA384"}, {0x00A4, "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"}, {0x00A5, "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"}, {0x00A6, "TLS_DH_anon_WITH_AES_128_GCM_SHA256"}, {0x00A7, "TLS_DH_anon_WITH_AES_256_GCM_SHA384"}, {0x00A8, "TLS_PSK_WITH_AES_128_GCM_SHA256"}, {0x00A9, "TLS_PSK_WITH_AES_256_GCM_SHA384"}, {0x00AA, "TLS_DHE_PSK_WITH_AES_128_GCM_SHA256"}, {0x00AB, "TLS_DHE_PSK_WITH_AES_256_GCM_SHA384"}, {0x00AC, "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"}, {0x00AD, "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"}, {0x00AE, "TLS_PSK_WITH_AES_128_CBC_SHA256"}, {0x00AF, "TLS_PSK_WITH_AES_256_CBC_SHA384"}, {0x00B0, "TLS_PSK_WITH_NULL_SHA256"}, {0x00B1, "TLS_PSK_WITH_NULL_SHA384"}, {0x00B2, "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"}, {0x00B3, "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"}, {0x00B4, "TLS_DHE_PSK_WITH_NULL_SHA256"}, {0x00B5, "TLS_DHE_PSK_WITH_NULL_SHA384"}, {0x00B6, "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"}, {0x00B7, "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"}, {0x00B8, "TLS_RSA_PSK_WITH_NULL_SHA256"}, {0x00B9, "TLS_RSA_PSK_WITH_NULL_SHA384"}, {0x00BA, "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BB, "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BC, "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BD, "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BE, "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BF, "TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00C0, "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C1, "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C2, "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C3, "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C4, "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C5, "TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00FF, "TLS_EMPTY_RENEGOTIATION_INFO_SCSV"}, {0x5600, "TLS_FALLBACK_SCSV"}, {0xC001, "TLS_ECDH_ECDSA_WITH_NULL_SHA"}, {0xC002, "TLS_ECDH_ECDSA_WITH_RC4_128_SHA"}, {0xC003, "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"}, {0xC004, "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"}, {0xC005, "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"}, {0xC006, "TLS_ECDHE_ECDSA_WITH_NULL_SHA"}, {0xC007, "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA"}, {0xC008, "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"}, {0xC009, "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"}, {0xC00A, "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"}, {0xC00B, "TLS_ECDH_RSA_WITH_NULL_SHA"}, {0xC00C, "TLS_ECDH_RSA_WITH_RC4_128_SHA"}, {0xC00D, "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"}, {0xC00E, "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"}, {0xC00F, "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"}, {0xC010, "TLS_ECDHE_RSA_WITH_NULL_SHA"}, {0xC011, "TLS_ECDHE_RSA_WITH_RC4_128_SHA"}, {0xC012, "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"}, {0xC013, "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"}, {0xC014, "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"}, {0xC015, "TLS_ECDH_anon_WITH_NULL_SHA"}, {0xC016, "TLS_ECDH_anon_WITH_RC4_128_SHA"}, {0xC017, "TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA"}, {0xC018, "TLS_ECDH_anon_WITH_AES_128_CBC_SHA"}, {0xC019, "TLS_ECDH_anon_WITH_AES_256_CBC_SHA"}, {0xC01A, "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"}, {0xC01B, "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"}, {0xC01C, "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"}, {0xC01D, "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"}, {0xC01E, "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"}, {0xC01F, "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"}, {0xC020, "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"}, {0xC021, "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"}, {0xC022, "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"}, {0xC023, "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"}, {0xC024, "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"}, {0xC025, "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"}, {0xC026, "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"}, {0xC027, "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"}, {0xC028, "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"}, {0xC029, "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"}, {0xC02A, "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"}, {0xC02B, "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"}, {0xC02C, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"}, {0xC02D, "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"}, {0xC02E, "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"}, {0xC02F, "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"}, {0xC030, "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"}, {0xC031, "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"}, {0xC032, "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"}, {0xC033, "TLS_ECDHE_PSK_WITH_RC4_128_SHA"}, {0xC034, "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"}, {0xC035, "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"}, {0xC036, "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"}, {0xC037, "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"}, {0xC038, "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"}, {0xC039, "TLS_ECDHE_PSK_WITH_NULL_SHA"}, {0xC03A, "TLS_ECDHE_PSK_WITH_NULL_SHA256"}, {0xC03B, "TLS_ECDHE_PSK_WITH_NULL_SHA384"}, {0xC03C, "TLS_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC03D, "TLS_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC03E, "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"}, {0xC03F, "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"}, {0xC040, "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC041, "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC042, "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"}, {0xC043, "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"}, {0xC044, "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC045, "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC046, "TLS_DH_anon_WITH_ARIA_128_CBC_SHA256"}, {0xC047, "TLS_DH_anon_WITH_ARIA_256_CBC_SHA384"}, {0xC048, "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"}, {0xC049, "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"}, {0xC04A, "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"}, {0xC04B, "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"}, {0xC04C, "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC04D, "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC04E, "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC04F, "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC050, "TLS_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC051, "TLS_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC052, "TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC053, "TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC054, "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC055, "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC056, "TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256"}, {0xC057, "TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384"}, {0xC058, "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"}, {0xC059, "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"}, {0xC05A, "TLS_DH_anon_WITH_ARIA_128_GCM_SHA256"}, {0xC05B, "TLS_DH_anon_WITH_ARIA_256_GCM_SHA384"}, {0xC05C, "TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256"}, {0xC05D, "TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384"}, {0xC05E, "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"}, {0xC05F, "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"}, {0xC060, "TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC061, "TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC062, "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC063, "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC064, "TLS_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC065, "TLS_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC066, "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC067, "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC068, "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC069, "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC06A, "TLS_PSK_WITH_ARIA_128_GCM_SHA256"}, {0xC06B, "TLS_PSK_WITH_ARIA_256_GCM_SHA384"}, {0xC06C, "TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256"}, {0xC06D, "TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384"}, {0xC06E, "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"}, {0xC06F, "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"}, {0xC070, "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC071, "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC072, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC073, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC074, "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC075, "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC076, "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC077, "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC078, "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC079, "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC07A, "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC07B, "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC07C, "TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC07D, "TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC07E, "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC07F, "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC080, "TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC081, "TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC082, "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC083, "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC084, "TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC085, "TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC086, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC087, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC088, "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC089, "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC08A, "TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC08B, "TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC08C, "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC08D, "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC08E, "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC08F, "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC090, "TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC091, "TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC092, "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC093, "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC094, "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC095, "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC096, "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC097, "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC098, "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC099, "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC09A, "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC09B, "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC09C, "TLS_RSA_WITH_AES_128_CCM"}, {0xC09D, "TLS_RSA_WITH_AES_256_CCM"}, {0xC09E, "TLS_DHE_RSA_WITH_AES_128_CCM"}, {0xC09F, "TLS_DHE_RSA_WITH_AES_256_CCM"}, {0xC0A0, "TLS_RSA_WITH_AES_128_CCM_8"}, {0xC0A1, "TLS_RSA_WITH_AES_256_CCM_8"}, {0xC0A2, "TLS_DHE_RSA_WITH_AES_128_CCM_8"}, {0xC0A3, "TLS_DHE_RSA_WITH_AES_256_CCM_8"}, {0xC0A4, "TLS_PSK_WITH_AES_128_CCM"}, {0xC0A5, "TLS_PSK_WITH_AES_256_CCM"}, {0xC0A6, "TLS_DHE_PSK_WITH_AES_128_CCM"}, {0xC0A7, "TLS_DHE_PSK_WITH_AES_256_CCM"}, {0xC0A8, "TLS_PSK_WITH_AES_128_CCM_8"}, {0xC0A9, "TLS_PSK_WITH_AES_256_CCM_8"}, {0xC0AA, "TLS_PSK_DHE_WITH_AES_128_CCM_8"}, {0xC0AB, "TLS_PSK_DHE_WITH_AES_256_CCM_8"}, {0xC0AC, "TLS_ECDHE_ECDSA_WITH_AES_128_CCM"}, {0xC0AD, "TLS_ECDHE_ECDSA_WITH_AES_256_CCM"}, {0xC0AE, "TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8"}, {0xC0AF, "TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8"}, {0xC102, "IANA-GOST2012-GOST8912-GOST8912"}, {0xCCA8, "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCA9, "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAA, "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAB, "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAC, "TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAD, "TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAE, "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0x1301, "TLS_AES_128_GCM_SHA256"}, {0x1302, "TLS_AES_256_GCM_SHA384"}, {0x1303, "TLS_CHACHA20_POLY1305_SHA256"}, {0x1304, "TLS_AES_128_CCM_SHA256"}, {0x1305, "TLS_AES_128_CCM_8_SHA256"}, {0xFEFE, "SSL_RSA_FIPS_WITH_DES_CBC_SHA"}, {0xFEFF, "SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA"}, {0xFF85, "LEGACY-GOST2012-GOST8912-GOST8912"}, {0xFF87, "GOST2012-NULL-GOST12"}, {0xC100, "GOST2012-KUZNYECHIK-KUZNYECHIKOMAC"}, {0xC101, "GOST2012-MAGMA-MAGMAOMAC"}, {0xC102, "GOST2012-GOST8912-IANA"}, }; static const ssl_trace_tbl ssl_comp_tbl[] = { {0x0000, "No Compression"}, {0x0001, "Zlib Compression"} }; static const ssl_trace_tbl ssl_exts_tbl[] = { {TLSEXT_TYPE_server_name, "server_name"}, {TLSEXT_TYPE_max_fragment_length, "max_fragment_length"}, {TLSEXT_TYPE_client_certificate_url, "client_certificate_url"}, {TLSEXT_TYPE_trusted_ca_keys, "trusted_ca_keys"}, {TLSEXT_TYPE_truncated_hmac, "truncated_hmac"}, {TLSEXT_TYPE_status_request, "status_request"}, {TLSEXT_TYPE_user_mapping, "user_mapping"}, {TLSEXT_TYPE_client_authz, "client_authz"}, {TLSEXT_TYPE_server_authz, "server_authz"}, {TLSEXT_TYPE_cert_type, "cert_type"}, {TLSEXT_TYPE_supported_groups, "supported_groups"}, {TLSEXT_TYPE_ec_point_formats, "ec_point_formats"}, {TLSEXT_TYPE_srp, "srp"}, {TLSEXT_TYPE_signature_algorithms, "signature_algorithms"}, {TLSEXT_TYPE_use_srtp, "use_srtp"}, {TLSEXT_TYPE_application_layer_protocol_negotiation, "application_layer_protocol_negotiation"}, {TLSEXT_TYPE_signed_certificate_timestamp, "signed_certificate_timestamps"}, {TLSEXT_TYPE_client_cert_type, "client_cert_type"}, {TLSEXT_TYPE_server_cert_type, "server_cert_type"}, {TLSEXT_TYPE_padding, "padding"}, {TLSEXT_TYPE_encrypt_then_mac, "encrypt_then_mac"}, {TLSEXT_TYPE_extended_master_secret, "extended_master_secret"}, {TLSEXT_TYPE_compress_certificate, "compress_certificate"}, {TLSEXT_TYPE_session_ticket, "session_ticket"}, {TLSEXT_TYPE_psk, "psk"}, {TLSEXT_TYPE_early_data, "early_data"}, {TLSEXT_TYPE_supported_versions, "supported_versions"}, {TLSEXT_TYPE_cookie, "cookie_ext"}, {TLSEXT_TYPE_psk_kex_modes, "psk_key_exchange_modes"}, {TLSEXT_TYPE_certificate_authorities, "certificate_authorities"}, {TLSEXT_TYPE_post_handshake_auth, "post_handshake_auth"}, {TLSEXT_TYPE_signature_algorithms_cert, "signature_algorithms_cert"}, {TLSEXT_TYPE_key_share, "key_share"}, {TLSEXT_TYPE_renegotiate, "renegotiate"}, # ifndef OPENSSL_NO_NEXTPROTONEG {TLSEXT_TYPE_next_proto_neg, "next_proto_neg"}, # endif }; static const ssl_trace_tbl ssl_groups_tbl[] = { {1, "sect163k1 (K-163)"}, {2, "sect163r1"}, {3, "sect163r2 (B-163)"}, {4, "sect193r1"}, {5, "sect193r2"}, {6, "sect233k1 (K-233)"}, {7, "sect233r1 (B-233)"}, {8, "sect239k1"}, {9, "sect283k1 (K-283)"}, {10, "sect283r1 (B-283)"}, {11, "sect409k1 (K-409)"}, {12, "sect409r1 (B-409)"}, {13, "sect571k1 (K-571)"}, {14, "sect571r1 (B-571)"}, {15, "secp160k1"}, {16, "secp160r1"}, {17, "secp160r2"}, {18, "secp192k1"}, {19, "secp192r1 (P-192)"}, {20, "secp224k1"}, {21, "secp224r1 (P-224)"}, {22, "secp256k1"}, {23, "secp256r1 (P-256)"}, {24, "secp384r1 (P-384)"}, {25, "secp521r1 (P-521)"}, {26, "brainpoolP256r1"}, {27, "brainpoolP384r1"}, {28, "brainpoolP512r1"}, {29, "ecdh_x25519"}, {30, "ecdh_x448"}, {31, "brainpoolP256r1tls13"}, {32, "brainpoolP384r1tls13"}, {33, "brainpoolP512r1tls13"}, {34, "GC256A"}, {35, "GC256B"}, {36, "GC256C"}, {37, "GC256D"}, {38, "GC512A"}, {39, "GC512B"}, {40, "GC512C"}, {256, "ffdhe2048"}, {257, "ffdhe3072"}, {258, "ffdhe4096"}, {259, "ffdhe6144"}, {260, "ffdhe8192"}, {25497, "X25519Kyber768Draft00"}, {25498, "SecP256r1Kyber768Draft00"}, {0xFF01, "arbitrary_explicit_prime_curves"}, {0xFF02, "arbitrary_explicit_char2_curves"} }; static const ssl_trace_tbl ssl_point_tbl[] = { {0, "uncompressed"}, {1, "ansiX962_compressed_prime"}, {2, "ansiX962_compressed_char2"} }; static const ssl_trace_tbl ssl_mfl_tbl[] = { {0, "disabled"}, {1, "max_fragment_length := 2^9 (512 bytes)"}, {2, "max_fragment_length := 2^10 (1024 bytes)"}, {3, "max_fragment_length := 2^11 (2048 bytes)"}, {4, "max_fragment_length := 2^12 (4096 bytes)"} }; static const ssl_trace_tbl ssl_sigalg_tbl[] = { {TLSEXT_SIGALG_ecdsa_secp256r1_sha256, "ecdsa_secp256r1_sha256"}, {TLSEXT_SIGALG_ecdsa_secp384r1_sha384, "ecdsa_secp384r1_sha384"}, {TLSEXT_SIGALG_ecdsa_secp521r1_sha512, "ecdsa_secp521r1_sha512"}, {TLSEXT_SIGALG_ecdsa_sha224, "ecdsa_sha224"}, {TLSEXT_SIGALG_ed25519, "ed25519"}, {TLSEXT_SIGALG_ed448, "ed448"}, {TLSEXT_SIGALG_ecdsa_sha1, "ecdsa_sha1"}, {TLSEXT_SIGALG_rsa_pss_rsae_sha256, "rsa_pss_rsae_sha256"}, {TLSEXT_SIGALG_rsa_pss_rsae_sha384, "rsa_pss_rsae_sha384"}, {TLSEXT_SIGALG_rsa_pss_rsae_sha512, "rsa_pss_rsae_sha512"}, {TLSEXT_SIGALG_rsa_pss_pss_sha256, "rsa_pss_pss_sha256"}, {TLSEXT_SIGALG_rsa_pss_pss_sha384, "rsa_pss_pss_sha384"}, {TLSEXT_SIGALG_rsa_pss_pss_sha512, "rsa_pss_pss_sha512"}, {TLSEXT_SIGALG_rsa_pkcs1_sha256, "rsa_pkcs1_sha256"}, {TLSEXT_SIGALG_rsa_pkcs1_sha384, "rsa_pkcs1_sha384"}, {TLSEXT_SIGALG_rsa_pkcs1_sha512, "rsa_pkcs1_sha512"}, {TLSEXT_SIGALG_rsa_pkcs1_sha224, "rsa_pkcs1_sha224"}, {TLSEXT_SIGALG_rsa_pkcs1_sha1, "rsa_pkcs1_sha1"}, {TLSEXT_SIGALG_dsa_sha256, "dsa_sha256"}, {TLSEXT_SIGALG_dsa_sha384, "dsa_sha384"}, {TLSEXT_SIGALG_dsa_sha512, "dsa_sha512"}, {TLSEXT_SIGALG_dsa_sha224, "dsa_sha224"}, {TLSEXT_SIGALG_dsa_sha1, "dsa_sha1"}, {TLSEXT_SIGALG_gostr34102012_256_intrinsic, "gost2012_256"}, {TLSEXT_SIGALG_gostr34102012_512_intrinsic, "gost2012_512"}, {TLSEXT_SIGALG_gostr34102012_256_gostr34112012_256, "gost2012_256"}, {TLSEXT_SIGALG_gostr34102012_512_gostr34112012_512, "gost2012_512"}, {TLSEXT_SIGALG_gostr34102001_gostr3411, "gost2001_gost94"}, {TLSEXT_SIGALG_ecdsa_brainpoolP256r1_sha256, "ecdsa_brainpoolP256r1_sha256"}, {TLSEXT_SIGALG_ecdsa_brainpoolP384r1_sha384, "ecdsa_brainpoolP384r1_sha384"}, {TLSEXT_SIGALG_ecdsa_brainpoolP512r1_sha512, "ecdsa_brainpoolP512r1_sha512"}, }; static const ssl_trace_tbl ssl_ctype_tbl[] = { {1, "rsa_sign"}, {2, "dss_sign"}, {3, "rsa_fixed_dh"}, {4, "dss_fixed_dh"}, {5, "rsa_ephemeral_dh"}, {6, "dss_ephemeral_dh"}, {20, "fortezza_dms"}, {64, "ecdsa_sign"}, {65, "rsa_fixed_ecdh"}, {66, "ecdsa_fixed_ecdh"}, {67, "gost_sign256"}, {68, "gost_sign512"}, }; static const ssl_trace_tbl ssl_psk_kex_modes_tbl[] = { {TLSEXT_KEX_MODE_KE, "psk_ke"}, {TLSEXT_KEX_MODE_KE_DHE, "psk_dhe_ke"} }; static const ssl_trace_tbl ssl_key_update_tbl[] = { {SSL_KEY_UPDATE_NOT_REQUESTED, "update_not_requested"}, {SSL_KEY_UPDATE_REQUESTED, "update_requested"} }; static const ssl_trace_tbl ssl_comp_cert_tbl[] = { {TLSEXT_comp_cert_none, "none"}, {TLSEXT_comp_cert_zlib, "zlib"}, {TLSEXT_comp_cert_brotli, "brotli"}, {TLSEXT_comp_cert_zstd, "zstd"} }; static const ssl_trace_tbl ssl_cert_type_tbl[] = { {TLSEXT_cert_type_x509, "x509"}, {TLSEXT_cert_type_pgp, "pgp"}, {TLSEXT_cert_type_rpk, "rpk"}, {TLSEXT_cert_type_1609dot2, "1609dot2"} }; static void ssl_print_hex(BIO *bio, int indent, const char *name, const unsigned char *msg, size_t msglen) { size_t i; BIO_indent(bio, indent, 80); BIO_printf(bio, "%s (len=%d): ", name, (int)msglen); for (i = 0; i < msglen; i++) BIO_printf(bio, "%02X", msg[i]); BIO_puts(bio, "\n"); } static int ssl_print_hexbuf(BIO *bio, int indent, const char *name, size_t nlen, const unsigned char **pmsg, size_t *pmsglen) { size_t blen; const unsigned char *p = *pmsg; if (*pmsglen < nlen) return 0; blen = p[0]; if (nlen > 1) blen = (blen << 8) | p[1]; if (*pmsglen < nlen + blen) return 0; p += nlen; ssl_print_hex(bio, indent, name, p, blen); *pmsg += blen + nlen; *pmsglen -= blen + nlen; return 1; } static int ssl_print_version(BIO *bio, int indent, const char *name, const unsigned char **pmsg, size_t *pmsglen, unsigned int *version) { int vers; if (*pmsglen < 2) return 0; vers = ((*pmsg)[0] << 8) | (*pmsg)[1]; if (version != NULL) *version = vers; BIO_indent(bio, indent, 80); BIO_printf(bio, "%s=0x%x (%s)\n", name, vers, ssl_trace_str(vers, ssl_version_tbl)); *pmsg += 2; *pmsglen -= 2; return 1; } static int ssl_print_random(BIO *bio, int indent, const unsigned char **pmsg, size_t *pmsglen) { unsigned int tm; const unsigned char *p = *pmsg; if (*pmsglen < 32) return 0; tm = ((unsigned int)p[0] << 24) | ((unsigned int)p[1] << 16) | ((unsigned int)p[2] << 8) | (unsigned int)p[3]; p += 4; BIO_indent(bio, indent, 80); BIO_puts(bio, "Random:\n"); BIO_indent(bio, indent + 2, 80); BIO_printf(bio, "gmt_unix_time=0x%08X\n", tm); ssl_print_hex(bio, indent + 2, "random_bytes", p, 28); *pmsg += 32; *pmsglen -= 32; return 1; } static int ssl_print_signature(BIO *bio, int indent, const SSL_CONNECTION *sc, const unsigned char **pmsg, size_t *pmsglen) { if (*pmsglen < 2) return 0; if (SSL_USE_SIGALGS(sc)) { const unsigned char *p = *pmsg; unsigned int sigalg = (p[0] << 8) | p[1]; BIO_indent(bio, indent, 80); BIO_printf(bio, "Signature Algorithm: %s (0x%04x)\n", ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); *pmsg += 2; *pmsglen -= 2; } return ssl_print_hexbuf(bio, indent, "Signature", 2, pmsg, pmsglen); } static int ssl_print_extension(BIO *bio, int indent, int server, unsigned char mt, int extype, const unsigned char *ext, size_t extlen) { size_t xlen, share_len; unsigned int sigalg; uint32_t max_early_data; BIO_indent(bio, indent, 80); BIO_printf(bio, "extension_type=%s(%d), length=%d\n", ssl_trace_str(extype, ssl_exts_tbl), extype, (int)extlen); switch (extype) { case TLSEXT_TYPE_compress_certificate: if (extlen < 1) return 0; xlen = ext[0]; if (extlen != xlen + 1) return 0; return ssl_trace_list(bio, indent + 2, ext + 1, xlen, 2, ssl_comp_cert_tbl); case TLSEXT_TYPE_max_fragment_length: if (extlen < 1) return 0; xlen = extlen; return ssl_trace_list(bio, indent + 2, ext, xlen, 1, ssl_mfl_tbl); case TLSEXT_TYPE_ec_point_formats: if (extlen < 1) return 0; xlen = ext[0]; if (extlen != xlen + 1) return 0; return ssl_trace_list(bio, indent + 2, ext + 1, xlen, 1, ssl_point_tbl); case TLSEXT_TYPE_supported_groups: if (extlen < 2) return 0; xlen = (ext[0] << 8) | ext[1]; if (extlen != xlen + 2) return 0; return ssl_trace_list(bio, indent + 2, ext + 2, xlen, 2, ssl_groups_tbl); case TLSEXT_TYPE_application_layer_protocol_negotiation: if (extlen < 2) return 0; xlen = (ext[0] << 8) | ext[1]; if (extlen != xlen + 2) return 0; ext += 2; while (xlen > 0) { size_t plen = *ext++; if (plen + 1 > xlen) return 0; BIO_indent(bio, indent + 2, 80); BIO_write(bio, ext, plen); BIO_puts(bio, "\n"); ext += plen; xlen -= plen + 1; } return 1; case TLSEXT_TYPE_signature_algorithms: if (extlen < 2) return 0; xlen = (ext[0] << 8) | ext[1]; if (extlen != xlen + 2) return 0; if (xlen & 1) return 0; ext += 2; while (xlen > 0) { BIO_indent(bio, indent + 2, 80); sigalg = (ext[0] << 8) | ext[1]; BIO_printf(bio, "%s (0x%04x)\n", ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); xlen -= 2; ext += 2; } break; case TLSEXT_TYPE_renegotiate: if (extlen < 1) return 0; xlen = ext[0]; if (xlen + 1 != extlen) return 0; ext++; if (xlen) { if (server) { if (xlen & 1) return 0; xlen >>= 1; } ssl_print_hex(bio, indent + 4, "client_verify_data", ext, xlen); if (server) { ext += xlen; ssl_print_hex(bio, indent + 4, "server_verify_data", ext, xlen); } } else { BIO_indent(bio, indent + 4, 80); BIO_puts(bio, "<EMPTY>\n"); } break; case TLSEXT_TYPE_session_ticket: if (extlen != 0) ssl_print_hex(bio, indent + 4, "ticket", ext, extlen); break; case TLSEXT_TYPE_key_share: if (server && extlen == 2) { int group_id; group_id = (ext[0] << 8) | ext[1]; BIO_indent(bio, indent + 4, 80); BIO_printf(bio, "NamedGroup: %s (%d)\n", ssl_trace_str(group_id, ssl_groups_tbl), group_id); break; } if (extlen < 2) return 0; if (server) { xlen = extlen; } else { xlen = (ext[0] << 8) | ext[1]; if (extlen != xlen + 2) return 0; ext += 2; } for (; xlen > 0; ext += share_len, xlen -= share_len) { int group_id; if (xlen < 4) return 0; group_id = (ext[0] << 8) | ext[1]; share_len = (ext[2] << 8) | ext[3]; ext += 4; xlen -= 4; if (xlen < share_len) return 0; BIO_indent(bio, indent + 4, 80); BIO_printf(bio, "NamedGroup: %s (%d)\n", ssl_trace_str(group_id, ssl_groups_tbl), group_id); ssl_print_hex(bio, indent + 4, "key_exchange: ", ext, share_len); } break; case TLSEXT_TYPE_supported_versions: if (server) { int version; if (extlen != 2) return 0; version = (ext[0] << 8) | ext[1]; BIO_indent(bio, indent + 4, 80); BIO_printf(bio, "%s (%d)\n", ssl_trace_str(version, ssl_version_tbl), version); break; } if (extlen < 1) return 0; xlen = ext[0]; if (extlen != xlen + 1) return 0; return ssl_trace_list(bio, indent + 2, ext + 1, xlen, 2, ssl_version_tbl); case TLSEXT_TYPE_psk_kex_modes: if (extlen < 1) return 0; xlen = ext[0]; if (extlen != xlen + 1) return 0; return ssl_trace_list(bio, indent + 2, ext + 1, xlen, 1, ssl_psk_kex_modes_tbl); case TLSEXT_TYPE_early_data: if (mt != SSL3_MT_NEWSESSION_TICKET) break; if (extlen != 4) return 0; max_early_data = ((unsigned int)ext[0] << 24) | ((unsigned int)ext[1] << 16) | ((unsigned int)ext[2] << 8) | (unsigned int)ext[3]; BIO_indent(bio, indent + 2, 80); BIO_printf(bio, "max_early_data=%u\n", (unsigned int)max_early_data); break; case TLSEXT_TYPE_server_cert_type: case TLSEXT_TYPE_client_cert_type: if (server) { if (extlen != 1) return 0; return ssl_trace_list(bio, indent + 2, ext, 1, 1, ssl_cert_type_tbl); } if (extlen < 1) return 0; xlen = ext[0]; if (extlen != xlen + 1) return 0; return ssl_trace_list(bio, indent + 2, ext + 1, xlen, 1, ssl_cert_type_tbl); default: BIO_dump_indent(bio, (const char *)ext, extlen, indent + 2); } return 1; } static int ssl_print_extensions(BIO *bio, int indent, int server, unsigned char mt, const unsigned char **msgin, size_t *msginlen) { size_t extslen, msglen = *msginlen; const unsigned char *msg = *msgin; BIO_indent(bio, indent, 80); if (msglen == 0) { BIO_puts(bio, "No extensions\n"); return 1; } if (msglen < 2) return 0; extslen = (msg[0] << 8) | msg[1]; msglen -= 2; msg += 2; if (extslen == 0) { BIO_puts(bio, "No extensions\n"); *msgin = msg; *msginlen = msglen; return 1; } if (extslen > msglen) return 0; BIO_printf(bio, "extensions, length = %d\n", (int)extslen); msglen -= extslen; while (extslen > 0) { int extype; size_t extlen; if (extslen < 4) return 0; extype = (msg[0] << 8) | msg[1]; extlen = (msg[2] << 8) | msg[3]; if (extslen < extlen + 4) { BIO_printf(bio, "extensions, extype = %d, extlen = %d\n", extype, (int)extlen); BIO_dump_indent(bio, (const char *)msg, extslen, indent + 2); return 0; } msg += 4; if (!ssl_print_extension(bio, indent + 2, server, mt, extype, msg, extlen)) return 0; msg += extlen; extslen -= extlen + 4; } *msgin = msg; *msginlen = msglen; return 1; } static int ssl_print_client_hello(BIO *bio, const SSL_CONNECTION *sc, int indent, const unsigned char *msg, size_t msglen) { size_t len; unsigned int cs; if (!ssl_print_version(bio, indent, "client_version", &msg, &msglen, NULL)) return 0; if (!ssl_print_random(bio, indent, &msg, &msglen)) return 0; if (!ssl_print_hexbuf(bio, indent, "session_id", 1, &msg, &msglen)) return 0; if (SSL_CONNECTION_IS_DTLS(sc)) { if (!ssl_print_hexbuf(bio, indent, "cookie", 1, &msg, &msglen)) return 0; } if (msglen < 2) return 0; len = (msg[0] << 8) | msg[1]; msg += 2; msglen -= 2; BIO_indent(bio, indent, 80); BIO_printf(bio, "cipher_suites (len=%d)\n", (int)len); if (msglen < len || len & 1) return 0; while (len > 0) { cs = (msg[0] << 8) | msg[1]; BIO_indent(bio, indent + 2, 80); BIO_printf(bio, "{0x%02X, 0x%02X} %s\n", msg[0], msg[1], ssl_trace_str(cs, ssl_ciphers_tbl)); msg += 2; msglen -= 2; len -= 2; } if (msglen < 1) return 0; len = msg[0]; msg++; msglen--; if (msglen < len) return 0; BIO_indent(bio, indent, 80); BIO_printf(bio, "compression_methods (len=%d)\n", (int)len); while (len > 0) { BIO_indent(bio, indent + 2, 80); BIO_printf(bio, "%s (0x%02X)\n", ssl_trace_str(msg[0], ssl_comp_tbl), msg[0]); msg++; msglen--; len--; } if (!ssl_print_extensions(bio, indent, 0, SSL3_MT_CLIENT_HELLO, &msg, &msglen)) return 0; return 1; } static int dtls_print_hello_vfyrequest(BIO *bio, int indent, const unsigned char *msg, size_t msglen) { if (!ssl_print_version(bio, indent, "server_version", &msg, &msglen, NULL)) return 0; if (!ssl_print_hexbuf(bio, indent, "cookie", 1, &msg, &msglen)) return 0; return 1; } static int ssl_print_server_hello(BIO *bio, int indent, const unsigned char *msg, size_t msglen) { unsigned int cs; unsigned int vers; if (!ssl_print_version(bio, indent, "server_version", &msg, &msglen, &vers)) return 0; if (!ssl_print_random(bio, indent, &msg, &msglen)) return 0; if (vers != TLS1_3_VERSION && !ssl_print_hexbuf(bio, indent, "session_id", 1, &msg, &msglen)) return 0; if (msglen < 2) return 0; cs = (msg[0] << 8) | msg[1]; BIO_indent(bio, indent, 80); BIO_printf(bio, "cipher_suite {0x%02X, 0x%02X} %s\n", msg[0], msg[1], ssl_trace_str(cs, ssl_ciphers_tbl)); msg += 2; msglen -= 2; if (vers != TLS1_3_VERSION) { if (msglen < 1) return 0; BIO_indent(bio, indent, 80); BIO_printf(bio, "compression_method: %s (0x%02X)\n", ssl_trace_str(msg[0], ssl_comp_tbl), msg[0]); msg++; msglen--; } if (!ssl_print_extensions(bio, indent, 1, SSL3_MT_SERVER_HELLO, &msg, &msglen)) return 0; return 1; } static int ssl_get_keyex(const char **pname, const SSL_CONNECTION *sc) { unsigned long alg_k = sc->s3.tmp.new_cipher->algorithm_mkey; if (alg_k & SSL_kRSA) { *pname = "rsa"; return SSL_kRSA; } if (alg_k & SSL_kDHE) { *pname = "DHE"; return SSL_kDHE; } if (alg_k & SSL_kECDHE) { *pname = "ECDHE"; return SSL_kECDHE; } if (alg_k & SSL_kPSK) { *pname = "PSK"; return SSL_kPSK; } if (alg_k & SSL_kRSAPSK) { *pname = "RSAPSK"; return SSL_kRSAPSK; } if (alg_k & SSL_kDHEPSK) { *pname = "DHEPSK"; return SSL_kDHEPSK; } if (alg_k & SSL_kECDHEPSK) { *pname = "ECDHEPSK"; return SSL_kECDHEPSK; } if (alg_k & SSL_kSRP) { *pname = "SRP"; return SSL_kSRP; } if (alg_k & SSL_kGOST) { *pname = "GOST"; return SSL_kGOST; } if (alg_k & SSL_kGOST18) { *pname = "GOST18"; return SSL_kGOST18; } *pname = "UNKNOWN"; return 0; } static int ssl_print_client_keyex(BIO *bio, int indent, const SSL_CONNECTION *sc, const unsigned char *msg, size_t msglen) { const char *algname; int id = ssl_get_keyex(&algname, sc); BIO_indent(bio, indent, 80); BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname); if (id & SSL_PSK) { if (!ssl_print_hexbuf(bio, indent + 2, "psk_identity", 2, &msg, &msglen)) return 0; } switch (id) { case SSL_kRSA: case SSL_kRSAPSK: if (TLS1_get_version(SSL_CONNECTION_GET_SSL(sc)) == SSL3_VERSION) { ssl_print_hex(bio, indent + 2, "EncryptedPreMasterSecret", msg, msglen); } else { if (!ssl_print_hexbuf(bio, indent + 2, "EncryptedPreMasterSecret", 2, &msg, &msglen)) return 0; } break; case SSL_kDHE: case SSL_kDHEPSK: if (!ssl_print_hexbuf(bio, indent + 2, "dh_Yc", 2, &msg, &msglen)) return 0; break; case SSL_kECDHE: case SSL_kECDHEPSK: if (!ssl_print_hexbuf(bio, indent + 2, "ecdh_Yc", 1, &msg, &msglen)) return 0; break; case SSL_kGOST: ssl_print_hex(bio, indent + 2, "GostKeyTransportBlob", msg, msglen); msglen = 0; break; case SSL_kGOST18: ssl_print_hex(bio, indent + 2, "GOST-wrapped PreMasterSecret", msg, msglen); msglen = 0; break; } return !msglen; } static int ssl_print_server_keyex(BIO *bio, int indent, const SSL_CONNECTION *sc, const unsigned char *msg, size_t msglen) { const char *algname; int id = ssl_get_keyex(&algname, sc); BIO_indent(bio, indent, 80); BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname); if (id & SSL_PSK) { if (!ssl_print_hexbuf(bio, indent + 2, "psk_identity_hint", 2, &msg, &msglen)) return 0; } switch (id) { case SSL_kRSA: if (!ssl_print_hexbuf(bio, indent + 2, "rsa_modulus", 2, &msg, &msglen)) return 0; if (!ssl_print_hexbuf(bio, indent + 2, "rsa_exponent", 2, &msg, &msglen)) return 0; break; case SSL_kDHE: case SSL_kDHEPSK: if (!ssl_print_hexbuf(bio, indent + 2, "dh_p", 2, &msg, &msglen)) return 0; if (!ssl_print_hexbuf(bio, indent + 2, "dh_g", 2, &msg, &msglen)) return 0; if (!ssl_print_hexbuf(bio, indent + 2, "dh_Ys", 2, &msg, &msglen)) return 0; break; case SSL_kECDHE: case SSL_kECDHEPSK: if (msglen < 1) return 0; BIO_indent(bio, indent + 2, 80); if (msg[0] == EXPLICIT_PRIME_CURVE_TYPE) BIO_puts(bio, "explicit_prime\n"); else if (msg[0] == EXPLICIT_CHAR2_CURVE_TYPE) BIO_puts(bio, "explicit_char2\n"); else if (msg[0] == NAMED_CURVE_TYPE) { int curve; if (msglen < 3) return 0; curve = (msg[1] << 8) | msg[2]; BIO_printf(bio, "named_curve: %s (%d)\n", ssl_trace_str(curve, ssl_groups_tbl), curve); msg += 3; msglen -= 3; if (!ssl_print_hexbuf(bio, indent + 2, "point", 1, &msg, &msglen)) return 0; } else { BIO_printf(bio, "UNKNOWN CURVE PARAMETER TYPE %d\n", msg[0]); return 0; } break; case SSL_kPSK: case SSL_kRSAPSK: break; } if (!(id & SSL_PSK)) ssl_print_signature(bio, indent, sc, &msg, &msglen); return !msglen; } static int ssl_print_certificate(BIO *bio, const SSL_CONNECTION *sc, int indent, const unsigned char **pmsg, size_t *pmsglen) { size_t msglen = *pmsglen; size_t clen; X509 *x; const unsigned char *p = *pmsg, *q; SSL_CTX *ctx = SSL_CONNECTION_GET_CTX(sc); if (msglen < 3) return 0; clen = (p[0] << 16) | (p[1] << 8) | p[2]; if (msglen < clen + 3) return 0; q = p + 3; BIO_indent(bio, indent, 80); BIO_printf(bio, "ASN.1Cert, length=%d", (int)clen); x = X509_new_ex(ctx->libctx, ctx->propq); if (x != NULL && d2i_X509(&x, &q, clen) == NULL) { X509_free(x); x = NULL; } if (x == NULL) BIO_puts(bio, "<UNPARSEABLE CERTIFICATE>\n"); else { BIO_puts(bio, "\n------details-----\n"); X509_print_ex(bio, x, XN_FLAG_ONELINE, 0); PEM_write_bio_X509(bio, x); BIO_puts(bio, "------------------\n"); X509_free(x); } if (q != p + 3 + clen) { BIO_puts(bio, "<TRAILING GARBAGE AFTER CERTIFICATE>\n"); } *pmsg += clen + 3; *pmsglen -= clen + 3; return 1; } static int ssl_print_raw_public_key(BIO *bio, const SSL *ssl, int server, int indent, const unsigned char **pmsg, size_t *pmsglen) { EVP_PKEY *pkey; size_t clen; const unsigned char *msg = *pmsg; size_t msglen = *pmsglen; if (msglen < 3) return 0; clen = (msg[0] << 16) | (msg[1] << 8) | msg[2]; if (msglen < clen + 3) return 0; msg += 3; BIO_indent(bio, indent, 80); BIO_printf(bio, "raw_public_key, length=%d\n", (int)clen); pkey = d2i_PUBKEY_ex(NULL, &msg, clen, ssl->ctx->libctx, ssl->ctx->propq); if (pkey == NULL) return 0; EVP_PKEY_print_public(bio, pkey, indent + 2, NULL); EVP_PKEY_free(pkey); *pmsg += clen + 3; *pmsglen -= clen + 3; return 1; } static int ssl_print_certificates(BIO *bio, const SSL_CONNECTION *sc, int server, int indent, const unsigned char *msg, size_t msglen) { size_t clen; if (SSL_CONNECTION_IS_TLS13(sc) && !ssl_print_hexbuf(bio, indent, "context", 1, &msg, &msglen)) return 0; if (msglen < 3) return 0; clen = (msg[0] << 16) | (msg[1] << 8) | msg[2]; if (msglen != clen + 3) return 0; msg += 3; if ((server && sc->ext.server_cert_type == TLSEXT_cert_type_rpk) || (!server && sc->ext.client_cert_type == TLSEXT_cert_type_rpk)) { if (!ssl_print_raw_public_key(bio, &sc->ssl, server, indent, &msg, &clen)) return 0; if (SSL_CONNECTION_IS_TLS13(sc) && !ssl_print_extensions(bio, indent + 2, server, SSL3_MT_CERTIFICATE, &msg, &clen)) return 0; return 1; } BIO_indent(bio, indent, 80); BIO_printf(bio, "certificate_list, length=%d\n", (int)clen); while (clen > 0) { if (!ssl_print_certificate(bio, sc, indent + 2, &msg, &clen)) return 0; if (SSL_CONNECTION_IS_TLS13(sc) && !ssl_print_extensions(bio, indent + 2, server, SSL3_MT_CERTIFICATE, &msg, &clen)) return 0; } return 1; } static int ssl_print_compressed_certificates(BIO *bio, const SSL_CONNECTION *sc, int server, int indent, const unsigned char *msg, size_t msglen) { size_t uclen; size_t clen; unsigned int alg; int ret = 1; #ifndef OPENSSL_NO_COMP_ALG COMP_METHOD *method; COMP_CTX *comp = NULL; unsigned char* ucdata = NULL; #endif if (msglen < 8) return 0; alg = (msg[0] << 8) | msg[1]; uclen = (msg[2] << 16) | (msg[3] << 8) | msg[4]; clen = (msg[5] << 16) | (msg[6] << 8) | msg[7]; if (msglen != clen + 8) return 0; msg += 8; BIO_indent(bio, indent, 80); BIO_printf(bio, "Compression type=%s (0x%04x)\n", ssl_trace_str(alg, ssl_comp_cert_tbl), alg); BIO_indent(bio, indent, 80); BIO_printf(bio, "Uncompressed length=%d\n", (int)uclen); BIO_indent(bio, indent, 80); if (clen > 0) BIO_printf(bio, "Compressed length=%d, Ratio=%f:1\n", (int)clen, (float)uclen / (float)clen); else BIO_printf(bio, "Compressed length=%d, Ratio=unknown\n", (int)clen); BIO_dump_indent(bio, (const char *)msg, clen, indent); #ifndef OPENSSL_NO_COMP_ALG if (!ossl_comp_has_alg(alg)) return 0; if (uclen == 0 || uclen > 0xFFFFFF || (ucdata = OPENSSL_malloc(uclen)) == NULL) return 0; switch (alg) { case TLSEXT_comp_cert_zlib: method = COMP_zlib(); break; case TLSEXT_comp_cert_brotli: method = COMP_brotli_oneshot(); break; case TLSEXT_comp_cert_zstd: method = COMP_zstd_oneshot(); break; default: goto err; } if ((comp = COMP_CTX_new(method)) == NULL || COMP_expand_block(comp, ucdata, uclen, (unsigned char*)msg, clen) != (int)uclen) goto err; ret = ssl_print_certificates(bio, sc, server, indent, ucdata, uclen); err: COMP_CTX_free(comp); OPENSSL_free(ucdata); #endif return ret; } static int ssl_print_cert_request(BIO *bio, int indent, const SSL_CONNECTION *sc, const unsigned char *msg, size_t msglen) { size_t xlen; unsigned int sigalg; if (SSL_CONNECTION_IS_TLS13(sc)) { if (!ssl_print_hexbuf(bio, indent, "request_context", 1, &msg, &msglen)) return 0; if (!ssl_print_extensions(bio, indent, 1, SSL3_MT_CERTIFICATE_REQUEST, &msg, &msglen)) return 0; return 1; } else { if (msglen < 1) return 0; xlen = msg[0]; if (msglen < xlen + 1) return 0; msg++; BIO_indent(bio, indent, 80); BIO_printf(bio, "certificate_types (len=%d)\n", (int)xlen); if (!ssl_trace_list(bio, indent + 2, msg, xlen, 1, ssl_ctype_tbl)) return 0; msg += xlen; msglen -= xlen + 1; } if (SSL_USE_SIGALGS(sc)) { if (msglen < 2) return 0; xlen = (msg[0] << 8) | msg[1]; if (msglen < xlen + 2 || (xlen & 1)) return 0; msg += 2; msglen -= xlen + 2; BIO_indent(bio, indent, 80); BIO_printf(bio, "signature_algorithms (len=%d)\n", (int)xlen); while (xlen > 0) { BIO_indent(bio, indent + 2, 80); sigalg = (msg[0] << 8) | msg[1]; BIO_printf(bio, "%s (0x%04x)\n", ssl_trace_str(sigalg, ssl_sigalg_tbl), sigalg); xlen -= 2; msg += 2; } msg += xlen; } if (msglen < 2) return 0; xlen = (msg[0] << 8) | msg[1]; BIO_indent(bio, indent, 80); if (msglen < xlen + 2) return 0; msg += 2; msglen -= 2 + xlen; BIO_printf(bio, "certificate_authorities (len=%d)\n", (int)xlen); while (xlen > 0) { size_t dlen; X509_NAME *nm; const unsigned char *p; if (xlen < 2) return 0; dlen = (msg[0] << 8) | msg[1]; if (xlen < dlen + 2) return 0; msg += 2; BIO_indent(bio, indent + 2, 80); BIO_printf(bio, "DistinguishedName (len=%d): ", (int)dlen); p = msg; nm = d2i_X509_NAME(NULL, &p, dlen); if (!nm) { BIO_puts(bio, "<UNPARSEABLE DN>\n"); } else { X509_NAME_print_ex(bio, nm, 0, XN_FLAG_ONELINE); BIO_puts(bio, "\n"); X509_NAME_free(nm); } xlen -= dlen + 2; msg += dlen; } if (SSL_CONNECTION_IS_TLS13(sc)) { if (!ssl_print_hexbuf(bio, indent, "request_extensions", 2, &msg, &msglen)) return 0; } return msglen == 0; } static int ssl_print_ticket(BIO *bio, int indent, const SSL_CONNECTION *sc, const unsigned char *msg, size_t msglen) { unsigned int tick_life; if (msglen == 0) { BIO_indent(bio, indent + 2, 80); BIO_puts(bio, "No Ticket\n"); return 1; } if (msglen < 4) return 0; tick_life = ((unsigned int)msg[0] << 24) | ((unsigned int)msg[1] << 16) | ((unsigned int)msg[2] << 8) | (unsigned int)msg[3]; msglen -= 4; msg += 4; BIO_indent(bio, indent + 2, 80); BIO_printf(bio, "ticket_lifetime_hint=%u\n", tick_life); if (SSL_CONNECTION_IS_TLS13(sc)) { unsigned int ticket_age_add; if (msglen < 4) return 0; ticket_age_add = ((unsigned int)msg[0] << 24) | ((unsigned int)msg[1] << 16) | ((unsigned int)msg[2] << 8) | (unsigned int)msg[3]; msglen -= 4; msg += 4; BIO_indent(bio, indent + 2, 80); BIO_printf(bio, "ticket_age_add=%u\n", ticket_age_add); if (!ssl_print_hexbuf(bio, indent + 2, "ticket_nonce", 1, &msg, &msglen)) return 0; } if (!ssl_print_hexbuf(bio, indent + 2, "ticket", 2, &msg, &msglen)) return 0; if (SSL_CONNECTION_IS_TLS13(sc) && !ssl_print_extensions(bio, indent + 2, 0, SSL3_MT_NEWSESSION_TICKET, &msg, &msglen)) return 0; if (msglen) return 0; return 1; } static int ssl_print_handshake(BIO *bio, const SSL_CONNECTION *sc, int server, const unsigned char *msg, size_t msglen, int indent) { size_t hlen; unsigned char htype; if (msglen < 4) return 0; htype = msg[0]; hlen = (msg[1] << 16) | (msg[2] << 8) | msg[3]; BIO_indent(bio, indent, 80); BIO_printf(bio, "%s, Length=%d\n", ssl_trace_str(htype, ssl_handshake_tbl), (int)hlen); msg += 4; msglen -= 4; if (SSL_CONNECTION_IS_DTLS(sc)) { if (msglen < 8) return 0; BIO_indent(bio, indent, 80); BIO_printf(bio, "message_seq=%d, fragment_offset=%d, " "fragment_length=%d\n", (msg[0] << 8) | msg[1], (msg[2] << 16) | (msg[3] << 8) | msg[4], (msg[5] << 16) | (msg[6] << 8) | msg[7]); msg += 8; msglen -= 8; } if (msglen < hlen) return 0; switch (htype) { case SSL3_MT_CLIENT_HELLO: if (!ssl_print_client_hello(bio, sc, indent + 2, msg, msglen)) return 0; break; case DTLS1_MT_HELLO_VERIFY_REQUEST: if (!dtls_print_hello_vfyrequest(bio, indent + 2, msg, msglen)) return 0; break; case SSL3_MT_SERVER_HELLO: if (!ssl_print_server_hello(bio, indent + 2, msg, msglen)) return 0; break; case SSL3_MT_SERVER_KEY_EXCHANGE: if (!ssl_print_server_keyex(bio, indent + 2, sc, msg, msglen)) return 0; break; case SSL3_MT_CLIENT_KEY_EXCHANGE: if (!ssl_print_client_keyex(bio, indent + 2, sc, msg, msglen)) return 0; break; case SSL3_MT_CERTIFICATE: if (!ssl_print_certificates(bio, sc, server, indent + 2, msg, msglen)) return 0; break; case SSL3_MT_COMPRESSED_CERTIFICATE: if (!ssl_print_compressed_certificates(bio, sc, server, indent + 2, msg, msglen)) return 0; break; case SSL3_MT_CERTIFICATE_VERIFY: if (!ssl_print_signature(bio, indent + 2, sc, &msg, &msglen)) return 0; break; case SSL3_MT_CERTIFICATE_REQUEST: if (!ssl_print_cert_request(bio, indent + 2, sc, msg, msglen)) return 0; break; case SSL3_MT_FINISHED: ssl_print_hex(bio, indent + 2, "verify_data", msg, msglen); break; case SSL3_MT_SERVER_DONE: if (msglen != 0) ssl_print_hex(bio, indent + 2, "unexpected value", msg, msglen); break; case SSL3_MT_NEWSESSION_TICKET: if (!ssl_print_ticket(bio, indent + 2, sc, msg, msglen)) return 0; break; case SSL3_MT_ENCRYPTED_EXTENSIONS: if (!ssl_print_extensions(bio, indent + 2, 1, SSL3_MT_ENCRYPTED_EXTENSIONS, &msg, &msglen)) return 0; break; case SSL3_MT_KEY_UPDATE: if (msglen != 1) { ssl_print_hex(bio, indent + 2, "unexpected value", msg, msglen); return 0; } if (!ssl_trace_list(bio, indent + 2, msg, msglen, 1, ssl_key_update_tbl)) return 0; break; default: BIO_indent(bio, indent + 2, 80); BIO_puts(bio, "Unsupported, hex dump follows:\n"); BIO_dump_indent(bio, (const char *)msg, msglen, indent + 4); } return 1; } void SSL_trace(int write_p, int version, int content_type, const void *buf, size_t msglen, SSL *ssl, void *arg) { const unsigned char *msg = buf; BIO *bio = arg; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); #ifndef OPENSSL_NO_QUIC QUIC_CONNECTION *qc = QUIC_CONNECTION_FROM_SSL(ssl); if (qc != NULL) { if (ossl_quic_trace(write_p, version, content_type, buf, msglen, ssl, arg)) return; } #endif if (sc == NULL) return; switch (content_type) { case SSL3_RT_HEADER: { int hvers; if (msglen < (size_t)(SSL_CONNECTION_IS_DTLS(sc) ? DTLS1_RT_HEADER_LENGTH : SSL3_RT_HEADER_LENGTH)) { BIO_puts(bio, write_p ? "Sent" : "Received"); ssl_print_hex(bio, 0, " too short message", msg, msglen); break; } hvers = msg[1] << 8 | msg[2]; BIO_puts(bio, write_p ? "Sent" : "Received"); BIO_printf(bio, " TLS Record\nHeader:\n Version = %s (0x%x)\n", ssl_trace_str(hvers, ssl_version_tbl), hvers); if (SSL_CONNECTION_IS_DTLS(sc)) { BIO_printf(bio, " epoch=%d, sequence_number=%04x%04x%04x\n", (msg[3] << 8 | msg[4]), (msg[5] << 8 | msg[6]), (msg[7] << 8 | msg[8]), (msg[9] << 8 | msg[10])); } BIO_printf(bio, " Content Type = %s (%d)\n Length = %d", ssl_trace_str(msg[0], ssl_content_tbl), msg[0], msg[msglen - 2] << 8 | msg[msglen - 1]); } break; case SSL3_RT_INNER_CONTENT_TYPE: BIO_printf(bio, " Inner Content Type = %s (%d)", ssl_trace_str(msg[0], ssl_content_tbl), msg[0]); break; case SSL3_RT_HANDSHAKE: if (!ssl_print_handshake(bio, sc, sc->server ? write_p : !write_p, msg, msglen, 4)) BIO_printf(bio, "Message length parse error!\n"); break; case SSL3_RT_CHANGE_CIPHER_SPEC: if (msglen == 1 && msg[0] == 1) BIO_puts(bio, " change_cipher_spec (1)\n"); else ssl_print_hex(bio, 4, "unknown value", msg, msglen); break; case SSL3_RT_ALERT: if (msglen != 2) BIO_puts(bio, " Illegal Alert Length\n"); else { BIO_printf(bio, " Level=%s(%d), description=%s(%d)\n", SSL_alert_type_string_long(msg[0] << 8), msg[0], SSL_alert_desc_string_long(msg[1]), msg[1]); } } BIO_puts(bio, "\n"); } #endif
ssl
openssl/ssl/t1_trce.c
openssl
#include <stdio.h> #include <openssl/conf.h> #include <openssl/ssl.h> #include "ssl_local.h" #include "internal/sslconf.h" void SSL_add_ssl_module(void) { } static int ssl_do_config(SSL *s, SSL_CTX *ctx, const char *name, int system) { SSL_CONF_CTX *cctx = NULL; size_t i, idx, cmd_count; int err = 1; unsigned int flags; const SSL_METHOD *meth; const SSL_CONF_CMD *cmds; OSSL_LIB_CTX *prev_libctx = NULL; OSSL_LIB_CTX *libctx = NULL; if (s == NULL && ctx == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); goto err; } if (name == NULL && system) name = "system_default"; if (!conf_ssl_name_find(name, &idx)) { if (!system) ERR_raise_data(ERR_LIB_SSL, SSL_R_INVALID_CONFIGURATION_NAME, "name=%s", name); goto err; } cmds = conf_ssl_get(idx, &name, &cmd_count); cctx = SSL_CONF_CTX_new(); if (cctx == NULL) goto err; flags = SSL_CONF_FLAG_FILE; if (!system) flags |= SSL_CONF_FLAG_CERTIFICATE | SSL_CONF_FLAG_REQUIRE_PRIVATE; if (s != NULL) { meth = s->method; SSL_CONF_CTX_set_ssl(cctx, s); libctx = s->ctx->libctx; } else { meth = ctx->method; SSL_CONF_CTX_set_ssl_ctx(cctx, ctx); libctx = ctx->libctx; } if (meth->ssl_accept != ssl_undefined_function) flags |= SSL_CONF_FLAG_SERVER; if (meth->ssl_connect != ssl_undefined_function) flags |= SSL_CONF_FLAG_CLIENT; SSL_CONF_CTX_set_flags(cctx, flags); prev_libctx = OSSL_LIB_CTX_set0_default(libctx); err = 0; for (i = 0; i < cmd_count; i++) { char *cmdstr, *arg; int rv; conf_ssl_get_cmd(cmds, i, &cmdstr, &arg); rv = SSL_CONF_cmd(cctx, cmdstr, arg); if (rv <= 0) ++err; } if (!SSL_CONF_CTX_finish(cctx)) ++err; err: OSSL_LIB_CTX_set0_default(prev_libctx); SSL_CONF_CTX_free(cctx); return err == 0; } int SSL_config(SSL *s, const char *name) { return ssl_do_config(s, NULL, name, 0); } int SSL_CTX_config(SSL_CTX *ctx, const char *name) { return ssl_do_config(NULL, ctx, name, 0); } void ssl_ctx_system_config(SSL_CTX *ctx) { ssl_do_config(NULL, ctx, NULL, 1); }
ssl
openssl/ssl/ssl_mcnf.c
openssl
#include <stdio.h> #include <stdlib.h> #include <string.h> #include <errno.h> #include <openssl/crypto.h> #include "internal/bio.h" #include <openssl/err.h> #include "ssl_local.h" static int ssl_write(BIO *h, const char *buf, size_t size, size_t *written); static int ssl_read(BIO *b, char *buf, size_t size, size_t *readbytes); static int ssl_puts(BIO *h, const char *str); static long ssl_ctrl(BIO *h, int cmd, long arg1, void *arg2); static int ssl_new(BIO *h); static int ssl_free(BIO *data); static long ssl_callback_ctrl(BIO *h, int cmd, BIO_info_cb *fp); typedef struct bio_ssl_st { SSL *ssl; int num_renegotiates; unsigned long renegotiate_count; size_t byte_count; unsigned long renegotiate_timeout; unsigned long last_time; } BIO_SSL; static const BIO_METHOD methods_sslp = { BIO_TYPE_SSL, "ssl", ssl_write, NULL, ssl_read, NULL, ssl_puts, NULL, ssl_ctrl, ssl_new, ssl_free, ssl_callback_ctrl, }; const BIO_METHOD *BIO_f_ssl(void) { return &methods_sslp; } static int ssl_new(BIO *bi) { BIO_SSL *bs = OPENSSL_zalloc(sizeof(*bs)); if (bs == NULL) return 0; BIO_set_init(bi, 0); BIO_set_data(bi, bs); BIO_clear_flags(bi, ~0); return 1; } static int ssl_free(BIO *a) { BIO_SSL *bs; if (a == NULL) return 0; bs = BIO_get_data(a); if (BIO_get_shutdown(a)) { if (bs->ssl != NULL) SSL_shutdown(bs->ssl); if (BIO_get_init(a)) SSL_free(bs->ssl); BIO_clear_flags(a, ~0); BIO_set_init(a, 0); } OPENSSL_free(bs); return 1; } static int ssl_read(BIO *b, char *buf, size_t size, size_t *readbytes) { int ret = 1; BIO_SSL *sb; SSL *ssl; int retry_reason = 0; int r = 0; if (buf == NULL) return 0; sb = BIO_get_data(b); ssl = sb->ssl; BIO_clear_retry_flags(b); ret = ssl_read_internal(ssl, buf, size, readbytes); switch (SSL_get_error(ssl, ret)) { case SSL_ERROR_NONE: if (sb->renegotiate_count > 0) { sb->byte_count += *readbytes; if (sb->byte_count > sb->renegotiate_count) { sb->byte_count = 0; sb->num_renegotiates++; SSL_renegotiate(ssl); r = 1; } } if ((sb->renegotiate_timeout > 0) && (!r)) { unsigned long tm; tm = (unsigned long)time(NULL); if (tm > sb->last_time + sb->renegotiate_timeout) { sb->last_time = tm; sb->num_renegotiates++; SSL_renegotiate(ssl); } } break; case SSL_ERROR_WANT_READ: BIO_set_retry_read(b); break; case SSL_ERROR_WANT_WRITE: BIO_set_retry_write(b); break; case SSL_ERROR_WANT_X509_LOOKUP: BIO_set_retry_special(b); retry_reason = BIO_RR_SSL_X509_LOOKUP; break; case SSL_ERROR_WANT_ACCEPT: BIO_set_retry_special(b); retry_reason = BIO_RR_ACCEPT; break; case SSL_ERROR_WANT_CONNECT: BIO_set_retry_special(b); retry_reason = BIO_RR_CONNECT; break; case SSL_ERROR_SYSCALL: case SSL_ERROR_SSL: case SSL_ERROR_ZERO_RETURN: default: break; } BIO_set_retry_reason(b, retry_reason); return ret; } static int ssl_write(BIO *b, const char *buf, size_t size, size_t *written) { int ret, r = 0; int retry_reason = 0; SSL *ssl; BIO_SSL *bs; if (buf == NULL) return 0; bs = BIO_get_data(b); ssl = bs->ssl; BIO_clear_retry_flags(b); ret = ssl_write_internal(ssl, buf, size, 0, written); switch (SSL_get_error(ssl, ret)) { case SSL_ERROR_NONE: if (bs->renegotiate_count > 0) { bs->byte_count += *written; if (bs->byte_count > bs->renegotiate_count) { bs->byte_count = 0; bs->num_renegotiates++; SSL_renegotiate(ssl); r = 1; } } if ((bs->renegotiate_timeout > 0) && (!r)) { unsigned long tm; tm = (unsigned long)time(NULL); if (tm > bs->last_time + bs->renegotiate_timeout) { bs->last_time = tm; bs->num_renegotiates++; SSL_renegotiate(ssl); } } break; case SSL_ERROR_WANT_WRITE: BIO_set_retry_write(b); break; case SSL_ERROR_WANT_READ: BIO_set_retry_read(b); break; case SSL_ERROR_WANT_X509_LOOKUP: BIO_set_retry_special(b); retry_reason = BIO_RR_SSL_X509_LOOKUP; break; case SSL_ERROR_WANT_CONNECT: BIO_set_retry_special(b); retry_reason = BIO_RR_CONNECT; case SSL_ERROR_SYSCALL: case SSL_ERROR_SSL: default: break; } BIO_set_retry_reason(b, retry_reason); return ret; } static long ssl_ctrl(BIO *b, int cmd, long num, void *ptr) { SSL **sslp, *ssl; BIO_SSL *bs, *dbs; BIO *dbio, *bio; long ret = 1; BIO *next; SSL_CONNECTION *sc = NULL; bs = BIO_get_data(b); next = BIO_next(b); ssl = bs->ssl; if (ssl == NULL && cmd != BIO_C_SET_SSL) return 0; switch (cmd) { case BIO_CTRL_RESET: if ((sc = SSL_CONNECTION_FROM_SSL_ONLY(ssl)) == NULL) return 0; SSL_shutdown(ssl); if (sc->handshake_func == ssl->method->ssl_connect) SSL_set_connect_state(ssl); else if (sc->handshake_func == ssl->method->ssl_accept) SSL_set_accept_state(ssl); if (!SSL_clear(ssl)) { ret = 0; break; } if (next != NULL) ret = BIO_ctrl(next, cmd, num, ptr); else if (sc->rbio != NULL) ret = BIO_ctrl(sc->rbio, cmd, num, ptr); else ret = 1; break; case BIO_CTRL_INFO: ret = 0; break; case BIO_C_SSL_MODE: if (num) SSL_set_connect_state(ssl); else SSL_set_accept_state(ssl); break; case BIO_C_SET_SSL_RENEGOTIATE_TIMEOUT: ret = bs->renegotiate_timeout; if (num < 60) num = 5; bs->renegotiate_timeout = (unsigned long)num; bs->last_time = (unsigned long)time(NULL); break; case BIO_C_SET_SSL_RENEGOTIATE_BYTES: ret = bs->renegotiate_count; if ((long)num >= 512) bs->renegotiate_count = (unsigned long)num; break; case BIO_C_GET_SSL_NUM_RENEGOTIATES: ret = bs->num_renegotiates; break; case BIO_C_SET_SSL: if (ssl != NULL) { ssl_free(b); if (!ssl_new(b)) return 0; bs = BIO_get_data(b); } BIO_set_shutdown(b, num); ssl = (SSL *)ptr; bs->ssl = ssl; bio = SSL_get_rbio(ssl); if (bio != NULL) { if (next != NULL) BIO_push(bio, next); BIO_set_next(b, bio); BIO_up_ref(bio); } BIO_set_init(b, 1); break; case BIO_C_GET_SSL: if (ptr != NULL) { sslp = (SSL **)ptr; *sslp = ssl; } else ret = 0; break; case BIO_CTRL_GET_CLOSE: ret = BIO_get_shutdown(b); break; case BIO_CTRL_SET_CLOSE: BIO_set_shutdown(b, (int)num); break; case BIO_CTRL_WPENDING: ret = BIO_ctrl(SSL_get_wbio(ssl), cmd, num, ptr); break; case BIO_CTRL_PENDING: ret = SSL_pending(ssl); if (ret == 0) ret = BIO_pending(SSL_get_rbio(ssl)); break; case BIO_CTRL_FLUSH: BIO_clear_retry_flags(b); ret = BIO_ctrl(SSL_get_wbio(ssl), cmd, num, ptr); BIO_copy_next_retry(b); break; case BIO_CTRL_PUSH: if ((next != NULL) && (next != SSL_get_rbio(ssl))) { BIO_up_ref(next); SSL_set_bio(ssl, next, next); } break; case BIO_CTRL_POP: if (b == ptr) { SSL_set_bio(ssl, NULL, NULL); } break; case BIO_C_DO_STATE_MACHINE: BIO_clear_retry_flags(b); BIO_set_retry_reason(b, 0); ret = (int)SSL_do_handshake(ssl); switch (SSL_get_error(ssl, (int)ret)) { case SSL_ERROR_WANT_READ: BIO_set_flags(b, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY); break; case SSL_ERROR_WANT_WRITE: BIO_set_flags(b, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY); break; case SSL_ERROR_WANT_CONNECT: BIO_set_flags(b, BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY); BIO_set_retry_reason(b, BIO_get_retry_reason(next)); break; case SSL_ERROR_WANT_X509_LOOKUP: BIO_set_retry_special(b); BIO_set_retry_reason(b, BIO_RR_SSL_X509_LOOKUP); break; default: break; } break; case BIO_CTRL_DUP: dbio = (BIO *)ptr; dbs = BIO_get_data(dbio); SSL_free(dbs->ssl); dbs->ssl = SSL_dup(ssl); dbs->num_renegotiates = bs->num_renegotiates; dbs->renegotiate_count = bs->renegotiate_count; dbs->byte_count = bs->byte_count; dbs->renegotiate_timeout = bs->renegotiate_timeout; dbs->last_time = bs->last_time; ret = (dbs->ssl != NULL); break; case BIO_C_GET_FD: ret = BIO_ctrl(SSL_get_rbio(ssl), cmd, num, ptr); break; case BIO_CTRL_SET_CALLBACK: ret = 0; break; case BIO_CTRL_GET_RPOLL_DESCRIPTOR: if (!SSL_get_rpoll_descriptor(ssl, (BIO_POLL_DESCRIPTOR *)ptr)) ret = 0; break; case BIO_CTRL_GET_WPOLL_DESCRIPTOR: if (!SSL_get_wpoll_descriptor(ssl, (BIO_POLL_DESCRIPTOR *)ptr)) ret = 0; break; default: ret = BIO_ctrl(SSL_get_rbio(ssl), cmd, num, ptr); break; } return ret; } static long ssl_callback_ctrl(BIO *b, int cmd, BIO_info_cb *fp) { SSL *ssl; BIO_SSL *bs; long ret = 1; bs = BIO_get_data(b); ssl = bs->ssl; switch (cmd) { case BIO_CTRL_SET_CALLBACK: ret = BIO_callback_ctrl(SSL_get_rbio(ssl), cmd, fp); break; default: ret = 0; break; } return ret; } static int ssl_puts(BIO *bp, const char *str) { int n, ret; n = strlen(str); ret = BIO_write(bp, str, n); return ret; } BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx) { #ifndef OPENSSL_NO_SOCK BIO *ret = NULL, *buf = NULL, *ssl = NULL; # ifndef OPENSSL_NO_QUIC if (ctx != NULL && IS_QUIC_CTX(ctx)) return BIO_new_ssl_connect(ctx); # endif if ((buf = BIO_new(BIO_f_buffer())) == NULL) return NULL; if ((ssl = BIO_new_ssl_connect(ctx)) == NULL) goto err; if ((ret = BIO_push(buf, ssl)) == NULL) goto err; return ret; err: BIO_free(buf); BIO_free(ssl); #endif return NULL; } BIO *BIO_new_ssl_connect(SSL_CTX *ctx) { #ifndef OPENSSL_NO_SOCK BIO *ret = NULL, *con = NULL, *ssl = NULL; if ((con = BIO_new(BIO_s_connect())) == NULL) return NULL; # ifndef OPENSSL_NO_QUIC if (ctx != NULL && IS_QUIC_CTX(ctx)) if (!BIO_set_sock_type(con, SOCK_DGRAM)) goto err; #endif if ((ssl = BIO_new_ssl(ctx, 1)) == NULL) goto err; if ((ret = BIO_push(ssl, con)) == NULL) goto err; return ret; err: BIO_free(ssl); BIO_free(con); #endif return NULL; } BIO *BIO_new_ssl(SSL_CTX *ctx, int client) { BIO *ret; SSL *ssl; if ((ret = BIO_new(BIO_f_ssl())) == NULL) return NULL; if ((ssl = SSL_new(ctx)) == NULL) { BIO_free(ret); return NULL; } if (client) SSL_set_connect_state(ssl); else SSL_set_accept_state(ssl); BIO_set_ssl(ret, ssl, BIO_CLOSE); return ret; } int BIO_ssl_copy_session_id(BIO *t, BIO *f) { BIO_SSL *tdata, *fdata; t = BIO_find_type(t, BIO_TYPE_SSL); f = BIO_find_type(f, BIO_TYPE_SSL); if ((t == NULL) || (f == NULL)) return 0; tdata = BIO_get_data(t); fdata = BIO_get_data(f); if ((tdata->ssl == NULL) || (fdata->ssl == NULL)) return 0; if (!SSL_copy_session_id(tdata->ssl, (fdata->ssl))) return 0; return 1; } void BIO_ssl_shutdown(BIO *b) { BIO_SSL *bdata; for (; b != NULL; b = BIO_next(b)) { if (BIO_method_type(b) != BIO_TYPE_SSL) continue; bdata = BIO_get_data(b); if (bdata != NULL && bdata->ssl != NULL) SSL_shutdown(bdata->ssl); } }
ssl
openssl/ssl/bio_ssl.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <openssl/crypto.h> #include <openssl/rand.h> #include <openssl/err.h> #include "ssl_local.h" #ifndef OPENSSL_NO_SRP # include <openssl/srp.h> int ssl_ctx_srp_ctx_free_intern(SSL_CTX *ctx) { if (ctx == NULL) return 0; OPENSSL_free(ctx->srp_ctx.login); OPENSSL_free(ctx->srp_ctx.info); BN_free(ctx->srp_ctx.N); BN_free(ctx->srp_ctx.g); BN_free(ctx->srp_ctx.s); BN_free(ctx->srp_ctx.B); BN_free(ctx->srp_ctx.A); BN_free(ctx->srp_ctx.a); BN_free(ctx->srp_ctx.b); BN_free(ctx->srp_ctx.v); memset(&ctx->srp_ctx, 0, sizeof(ctx->srp_ctx)); ctx->srp_ctx.strength = SRP_MINIMAL_N; return 1; } int SSL_CTX_SRP_CTX_free(SSL_CTX *ctx) { return ssl_ctx_srp_ctx_free_intern(ctx); } int ssl_srp_ctx_free_intern(SSL_CONNECTION *s) { if (s == NULL) return 0; OPENSSL_free(s->srp_ctx.login); OPENSSL_free(s->srp_ctx.info); BN_free(s->srp_ctx.N); BN_free(s->srp_ctx.g); BN_free(s->srp_ctx.s); BN_free(s->srp_ctx.B); BN_free(s->srp_ctx.A); BN_free(s->srp_ctx.a); BN_free(s->srp_ctx.b); BN_free(s->srp_ctx.v); memset(&s->srp_ctx, 0, sizeof(s->srp_ctx)); s->srp_ctx.strength = SRP_MINIMAL_N; return 1; } int SSL_SRP_CTX_free(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); return ssl_srp_ctx_free_intern(sc); } int ssl_srp_ctx_init_intern(SSL_CONNECTION *s) { SSL_CTX *ctx; if (s == NULL || (ctx = SSL_CONNECTION_GET_CTX(s)) == NULL) return 0; memset(&s->srp_ctx, 0, sizeof(s->srp_ctx)); s->srp_ctx.SRP_cb_arg = ctx->srp_ctx.SRP_cb_arg; s->srp_ctx.TLS_ext_srp_username_callback = ctx->srp_ctx.TLS_ext_srp_username_callback; s->srp_ctx.SRP_verify_param_callback = ctx->srp_ctx.SRP_verify_param_callback; s->srp_ctx.SRP_give_srp_client_pwd_callback = ctx->srp_ctx.SRP_give_srp_client_pwd_callback; s->srp_ctx.strength = ctx->srp_ctx.strength; if (((ctx->srp_ctx.N != NULL) && ((s->srp_ctx.N = BN_dup(ctx->srp_ctx.N)) == NULL)) || ((ctx->srp_ctx.g != NULL) && ((s->srp_ctx.g = BN_dup(ctx->srp_ctx.g)) == NULL)) || ((ctx->srp_ctx.s != NULL) && ((s->srp_ctx.s = BN_dup(ctx->srp_ctx.s)) == NULL)) || ((ctx->srp_ctx.B != NULL) && ((s->srp_ctx.B = BN_dup(ctx->srp_ctx.B)) == NULL)) || ((ctx->srp_ctx.A != NULL) && ((s->srp_ctx.A = BN_dup(ctx->srp_ctx.A)) == NULL)) || ((ctx->srp_ctx.a != NULL) && ((s->srp_ctx.a = BN_dup(ctx->srp_ctx.a)) == NULL)) || ((ctx->srp_ctx.v != NULL) && ((s->srp_ctx.v = BN_dup(ctx->srp_ctx.v)) == NULL)) || ((ctx->srp_ctx.b != NULL) && ((s->srp_ctx.b = BN_dup(ctx->srp_ctx.b)) == NULL))) { ERR_raise(ERR_LIB_SSL, ERR_R_BN_LIB); goto err; } if ((ctx->srp_ctx.login != NULL) && ((s->srp_ctx.login = OPENSSL_strdup(ctx->srp_ctx.login)) == NULL)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); goto err; } if ((ctx->srp_ctx.info != NULL) && ((s->srp_ctx.info = OPENSSL_strdup(ctx->srp_ctx.info)) == NULL)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); goto err; } s->srp_ctx.srp_Mask = ctx->srp_ctx.srp_Mask; return 1; err: OPENSSL_free(s->srp_ctx.login); OPENSSL_free(s->srp_ctx.info); BN_free(s->srp_ctx.N); BN_free(s->srp_ctx.g); BN_free(s->srp_ctx.s); BN_free(s->srp_ctx.B); BN_free(s->srp_ctx.A); BN_free(s->srp_ctx.a); BN_free(s->srp_ctx.b); BN_free(s->srp_ctx.v); memset(&s->srp_ctx, 0, sizeof(s->srp_ctx)); return 0; } int SSL_SRP_CTX_init(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); return ssl_srp_ctx_init_intern(sc); } int ssl_ctx_srp_ctx_init_intern(SSL_CTX *ctx) { if (ctx == NULL) return 0; memset(&ctx->srp_ctx, 0, sizeof(ctx->srp_ctx)); ctx->srp_ctx.strength = SRP_MINIMAL_N; return 1; } int SSL_CTX_SRP_CTX_init(SSL_CTX *ctx) { return ssl_ctx_srp_ctx_init_intern(ctx); } int ssl_srp_server_param_with_username_intern(SSL_CONNECTION *s, int *ad) { unsigned char b[SSL_MAX_MASTER_KEY_LENGTH]; int al; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); *ad = SSL_AD_UNKNOWN_PSK_IDENTITY; if ((s->srp_ctx.TLS_ext_srp_username_callback != NULL) && ((al = s->srp_ctx.TLS_ext_srp_username_callback(SSL_CONNECTION_GET_SSL(s), ad, s->srp_ctx.SRP_cb_arg)) != SSL_ERROR_NONE)) return al; *ad = SSL_AD_INTERNAL_ERROR; if ((s->srp_ctx.N == NULL) || (s->srp_ctx.g == NULL) || (s->srp_ctx.s == NULL) || (s->srp_ctx.v == NULL)) return SSL3_AL_FATAL; if (RAND_priv_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, b, sizeof(b), 0) <= 0) return SSL3_AL_FATAL; s->srp_ctx.b = BN_bin2bn(b, sizeof(b), NULL); OPENSSL_cleanse(b, sizeof(b)); return ((s->srp_ctx.B = SRP_Calc_B_ex(s->srp_ctx.b, s->srp_ctx.N, s->srp_ctx.g, s->srp_ctx.v, sctx->libctx, sctx->propq)) != NULL) ? SSL_ERROR_NONE : SSL3_AL_FATAL; } int SSL_srp_server_param_with_username(SSL *s, int *ad) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return SSL3_AL_FATAL; return ssl_srp_server_param_with_username_intern(sc, ad); } int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass, const char *grp) { SRP_gN *GN; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; GN = SRP_get_default_gN(grp); if (GN == NULL) return -1; sc->srp_ctx.N = BN_dup(GN->N); sc->srp_ctx.g = BN_dup(GN->g); BN_clear_free(sc->srp_ctx.v); sc->srp_ctx.v = NULL; BN_clear_free(sc->srp_ctx.s); sc->srp_ctx.s = NULL; if (!SRP_create_verifier_BN_ex(user, pass, &sc->srp_ctx.s, &sc->srp_ctx.v, sc->srp_ctx.N, sc->srp_ctx.g, s->ctx->libctx, s->ctx->propq)) return -1; return 1; } int SSL_set_srp_server_param(SSL *s, const BIGNUM *N, const BIGNUM *g, BIGNUM *sa, BIGNUM *v, char *info) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; if (N != NULL) { if (sc->srp_ctx.N != NULL) { if (!BN_copy(sc->srp_ctx.N, N)) { BN_free(sc->srp_ctx.N); sc->srp_ctx.N = NULL; } } else sc->srp_ctx.N = BN_dup(N); } if (g != NULL) { if (sc->srp_ctx.g != NULL) { if (!BN_copy(sc->srp_ctx.g, g)) { BN_free(sc->srp_ctx.g); sc->srp_ctx.g = NULL; } } else sc->srp_ctx.g = BN_dup(g); } if (sa != NULL) { if (sc->srp_ctx.s != NULL) { if (!BN_copy(sc->srp_ctx.s, sa)) { BN_free(sc->srp_ctx.s); sc->srp_ctx.s = NULL; } } else sc->srp_ctx.s = BN_dup(sa); } if (v != NULL) { if (sc->srp_ctx.v != NULL) { if (!BN_copy(sc->srp_ctx.v, v)) { BN_free(sc->srp_ctx.v); sc->srp_ctx.v = NULL; } } else sc->srp_ctx.v = BN_dup(v); } if (info != NULL) { if (sc->srp_ctx.info) OPENSSL_free(sc->srp_ctx.info); if ((sc->srp_ctx.info = OPENSSL_strdup(info)) == NULL) return -1; } if (!(sc->srp_ctx.N) || !(sc->srp_ctx.g) || !(sc->srp_ctx.s) || !(sc->srp_ctx.v)) return -1; return 1; } int srp_generate_server_master_secret(SSL_CONNECTION *s) { BIGNUM *K = NULL, *u = NULL; int ret = 0, tmp_len = 0; unsigned char *tmp = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!SRP_Verify_A_mod_N(s->srp_ctx.A, s->srp_ctx.N)) goto err; if ((u = SRP_Calc_u_ex(s->srp_ctx.A, s->srp_ctx.B, s->srp_ctx.N, sctx->libctx, sctx->propq)) == NULL) goto err; if ((K = SRP_Calc_server_key(s->srp_ctx.A, s->srp_ctx.v, u, s->srp_ctx.b, s->srp_ctx.N)) == NULL) goto err; tmp_len = BN_num_bytes(K); if ((tmp = OPENSSL_malloc(tmp_len)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } BN_bn2bin(K, tmp); ret = ssl_generate_master_secret(s, tmp, tmp_len, 1); err: BN_clear_free(K); BN_clear_free(u); return ret; } int srp_generate_client_master_secret(SSL_CONNECTION *s) { BIGNUM *x = NULL, *u = NULL, *K = NULL; int ret = 0, tmp_len = 0; char *passwd = NULL; unsigned char *tmp = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (SRP_Verify_B_mod_N(s->srp_ctx.B, s->srp_ctx.N) == 0 || (u = SRP_Calc_u_ex(s->srp_ctx.A, s->srp_ctx.B, s->srp_ctx.N, sctx->libctx, sctx->propq)) == NULL || s->srp_ctx.SRP_give_srp_client_pwd_callback == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if ((passwd = s->srp_ctx.SRP_give_srp_client_pwd_callback(SSL_CONNECTION_GET_SSL(s), s->srp_ctx.SRP_cb_arg)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_CALLBACK_FAILED); goto err; } if ((x = SRP_Calc_x_ex(s->srp_ctx.s, s->srp_ctx.login, passwd, sctx->libctx, sctx->propq)) == NULL || (K = SRP_Calc_client_key_ex(s->srp_ctx.N, s->srp_ctx.B, s->srp_ctx.g, x, s->srp_ctx.a, u, sctx->libctx, sctx->propq)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } tmp_len = BN_num_bytes(K); if ((tmp = OPENSSL_malloc(tmp_len)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } BN_bn2bin(K, tmp); ret = ssl_generate_master_secret(s, tmp, tmp_len, 1); err: BN_clear_free(K); BN_clear_free(x); if (passwd != NULL) OPENSSL_clear_free(passwd, strlen(passwd)); BN_clear_free(u); return ret; } int srp_verify_server_param(SSL_CONNECTION *s) { SRP_CTX *srp = &s->srp_ctx; if (BN_ucmp(srp->g, srp->N) >= 0 || BN_ucmp(srp->B, srp->N) >= 0 || BN_is_zero(srp->B)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_DATA); return 0; } if (BN_num_bits(srp->N) < srp->strength) { SSLfatal(s, SSL_AD_INSUFFICIENT_SECURITY, SSL_R_INSUFFICIENT_SECURITY); return 0; } if (srp->SRP_verify_param_callback) { if (srp->SRP_verify_param_callback(SSL_CONNECTION_GET_SSL(s), srp->SRP_cb_arg) <= 0) { SSLfatal(s, SSL_AD_INSUFFICIENT_SECURITY, SSL_R_CALLBACK_FAILED); return 0; } } else if (!SRP_check_known_gN_param(srp->g, srp->N)) { SSLfatal(s, SSL_AD_INSUFFICIENT_SECURITY, SSL_R_INSUFFICIENT_SECURITY); return 0; } return 1; } int ssl_srp_calc_a_param_intern(SSL_CONNECTION *s) { unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH]; if (RAND_priv_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, rnd, sizeof(rnd), 0) <= 0) return 0; s->srp_ctx.a = BN_bin2bn(rnd, sizeof(rnd), s->srp_ctx.a); OPENSSL_cleanse(rnd, sizeof(rnd)); if (!(s->srp_ctx.A = SRP_Calc_A(s->srp_ctx.a, s->srp_ctx.N, s->srp_ctx.g))) return 0; return 1; } int SRP_Calc_A_param(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; return ssl_srp_calc_a_param_intern(sc); } BIGNUM *SSL_get_srp_g(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; if (sc->srp_ctx.g != NULL) return sc->srp_ctx.g; return s->ctx->srp_ctx.g; } BIGNUM *SSL_get_srp_N(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; if (sc->srp_ctx.N != NULL) return sc->srp_ctx.N; return s->ctx->srp_ctx.N; } char *SSL_get_srp_username(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; if (sc->srp_ctx.login != NULL) return sc->srp_ctx.login; return s->ctx->srp_ctx.login; } char *SSL_get_srp_userinfo(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return NULL; if (sc->srp_ctx.info != NULL) return sc->srp_ctx.info; return s->ctx->srp_ctx.info; } # define tls1_ctx_ctrl ssl3_ctx_ctrl # define tls1_ctx_callback_ctrl ssl3_ctx_callback_ctrl int SSL_CTX_set_srp_username(SSL_CTX *ctx, char *name) { return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_USERNAME, 0, name); } int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password) { return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD, 0, password); } int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength) { return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH, strength, NULL); } int SSL_CTX_set_srp_verify_param_callback(SSL_CTX *ctx, int (*cb) (SSL *, void *)) { return tls1_ctx_callback_ctrl(ctx, SSL_CTRL_SET_SRP_VERIFY_PARAM_CB, (void (*)(void))cb); } int SSL_CTX_set_srp_cb_arg(SSL_CTX *ctx, void *arg) { return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_SRP_ARG, 0, arg); } int SSL_CTX_set_srp_username_callback(SSL_CTX *ctx, int (*cb) (SSL *, int *, void *)) { return tls1_ctx_callback_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB, (void (*)(void))cb); } int SSL_CTX_set_srp_client_pwd_callback(SSL_CTX *ctx, char *(*cb) (SSL *, void *)) { return tls1_ctx_callback_ctrl(ctx, SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB, (void (*)(void))cb); } #endif
ssl
openssl/ssl/tls_srp.c
openssl
#include "ssl_local.h" #include <openssl/bn.h> struct pqueue_st { pitem *items; int count; }; pitem *pitem_new(unsigned char *prio64be, void *data) { pitem *item = OPENSSL_malloc(sizeof(*item)); if (item == NULL) return NULL; memcpy(item->priority, prio64be, sizeof(item->priority)); item->data = data; item->next = NULL; return item; } void pitem_free(pitem *item) { OPENSSL_free(item); } pqueue *pqueue_new(void) { pqueue *pq = OPENSSL_zalloc(sizeof(*pq)); return pq; } void pqueue_free(pqueue *pq) { OPENSSL_free(pq); } pitem *pqueue_insert(pqueue *pq, pitem *item) { pitem *curr, *next; if (pq->items == NULL) { pq->items = item; return item; } for (curr = NULL, next = pq->items; next != NULL; curr = next, next = next->next) { int cmp = memcmp(next->priority, item->priority, 8); if (cmp > 0) { item->next = next; if (curr == NULL) pq->items = item; else curr->next = item; return item; } else if (cmp == 0) return NULL; } item->next = NULL; curr->next = item; return item; } pitem *pqueue_peek(pqueue *pq) { return pq->items; } pitem *pqueue_pop(pqueue *pq) { pitem *item = pq->items; if (pq->items != NULL) pq->items = pq->items->next; return item; } pitem *pqueue_find(pqueue *pq, unsigned char *prio64be) { pitem *next; pitem *found = NULL; if (pq->items == NULL) return NULL; for (next = pq->items; next->next != NULL; next = next->next) { if (memcmp(next->priority, prio64be, 8) == 0) { found = next; break; } } if (memcmp(next->priority, prio64be, 8) == 0) found = next; if (!found) return NULL; return found; } pitem *pqueue_iterator(pqueue *pq) { return pqueue_peek(pq); } pitem *pqueue_next(piterator *item) { pitem *ret; if (item == NULL || *item == NULL) return NULL; ret = *item; *item = (*item)->next; return ret; } size_t pqueue_size(pqueue *pq) { pitem *item = pq->items; size_t count = 0; while (item != NULL) { count++; item = item->next; } return count; }
ssl
openssl/ssl/pqueue.c
openssl
#include <stdio.h> #include <openssl/macros.h> #include <openssl/objects.h> #include "ssl_local.h" IMPLEMENT_tls_meth_func(TLS_ANY_VERSION, 0, 0, TLS_method, ossl_statem_accept, ossl_statem_connect, TLSv1_2_enc_data) IMPLEMENT_tls_meth_func(TLS1_3_VERSION, 0, SSL_OP_NO_TLSv1_3, tlsv1_3_method, ossl_statem_accept, ossl_statem_connect, TLSv1_3_enc_data) #ifndef OPENSSL_NO_TLS1_2_METHOD IMPLEMENT_tls_meth_func(TLS1_2_VERSION, 0, SSL_OP_NO_TLSv1_2, tlsv1_2_method, ossl_statem_accept, ossl_statem_connect, TLSv1_2_enc_data) #endif #ifndef OPENSSL_NO_TLS1_1_METHOD IMPLEMENT_tls_meth_func(TLS1_1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_TLSv1_1, tlsv1_1_method, ossl_statem_accept, ossl_statem_connect, TLSv1_1_enc_data) #endif #ifndef OPENSSL_NO_TLS1_METHOD IMPLEMENT_tls_meth_func(TLS1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_TLSv1, tlsv1_method, ossl_statem_accept, ossl_statem_connect, TLSv1_enc_data) #endif #ifndef OPENSSL_NO_SSL3_METHOD IMPLEMENT_ssl3_meth_func(sslv3_method, ossl_statem_accept, ossl_statem_connect) #endif IMPLEMENT_tls_meth_func(TLS_ANY_VERSION, 0, 0, TLS_server_method, ossl_statem_accept, ssl_undefined_function, TLSv1_2_enc_data) IMPLEMENT_tls_meth_func(TLS1_3_VERSION, 0, SSL_OP_NO_TLSv1_3, tlsv1_3_server_method, ossl_statem_accept, ssl_undefined_function, TLSv1_3_enc_data) #ifndef OPENSSL_NO_TLS1_2_METHOD IMPLEMENT_tls_meth_func(TLS1_2_VERSION, 0, SSL_OP_NO_TLSv1_2, tlsv1_2_server_method, ossl_statem_accept, ssl_undefined_function, TLSv1_2_enc_data) #endif #ifndef OPENSSL_NO_TLS1_1_METHOD IMPLEMENT_tls_meth_func(TLS1_1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_TLSv1_1, tlsv1_1_server_method, ossl_statem_accept, ssl_undefined_function, TLSv1_1_enc_data) #endif #ifndef OPENSSL_NO_TLS1_METHOD IMPLEMENT_tls_meth_func(TLS1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_TLSv1, tlsv1_server_method, ossl_statem_accept, ssl_undefined_function, TLSv1_enc_data) #endif #ifndef OPENSSL_NO_SSL3_METHOD IMPLEMENT_ssl3_meth_func(sslv3_server_method, ossl_statem_accept, ssl_undefined_function) #endif IMPLEMENT_tls_meth_func(TLS_ANY_VERSION, 0, 0, TLS_client_method, ssl_undefined_function, ossl_statem_connect, TLSv1_2_enc_data) IMPLEMENT_tls_meth_func(TLS1_3_VERSION, 0, SSL_OP_NO_TLSv1_3, tlsv1_3_client_method, ssl_undefined_function, ossl_statem_connect, TLSv1_3_enc_data) #ifndef OPENSSL_NO_TLS1_2_METHOD IMPLEMENT_tls_meth_func(TLS1_2_VERSION, 0, SSL_OP_NO_TLSv1_2, tlsv1_2_client_method, ssl_undefined_function, ossl_statem_connect, TLSv1_2_enc_data) #endif #ifndef OPENSSL_NO_TLS1_1_METHOD IMPLEMENT_tls_meth_func(TLS1_1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_TLSv1_1, tlsv1_1_client_method, ssl_undefined_function, ossl_statem_connect, TLSv1_1_enc_data) #endif #ifndef OPENSSL_NO_TLS1_METHOD IMPLEMENT_tls_meth_func(TLS1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_TLSv1, tlsv1_client_method, ssl_undefined_function, ossl_statem_connect, TLSv1_enc_data) #endif #ifndef OPENSSL_NO_SSL3_METHOD IMPLEMENT_ssl3_meth_func(sslv3_client_method, ssl_undefined_function, ossl_statem_connect) #endif #ifndef OPENSSL_NO_DTLS1_METHOD IMPLEMENT_dtls1_meth_func(DTLS1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1, dtlsv1_method, ossl_statem_accept, ossl_statem_connect, DTLSv1_enc_data) #endif #ifndef OPENSSL_NO_DTLS1_2_METHOD IMPLEMENT_dtls1_meth_func(DTLS1_2_VERSION, 0, SSL_OP_NO_DTLSv1_2, dtlsv1_2_method, ossl_statem_accept, ossl_statem_connect, DTLSv1_2_enc_data) #endif IMPLEMENT_dtls1_meth_func(DTLS_ANY_VERSION, 0, 0, DTLS_method, ossl_statem_accept, ossl_statem_connect, DTLSv1_2_enc_data) #ifndef OPENSSL_NO_DTLS1_METHOD IMPLEMENT_dtls1_meth_func(DTLS1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1, dtlsv1_server_method, ossl_statem_accept, ssl_undefined_function, DTLSv1_enc_data) #endif #ifndef OPENSSL_NO_DTLS1_2_METHOD IMPLEMENT_dtls1_meth_func(DTLS1_2_VERSION, 0, SSL_OP_NO_DTLSv1_2, dtlsv1_2_server_method, ossl_statem_accept, ssl_undefined_function, DTLSv1_2_enc_data) #endif IMPLEMENT_dtls1_meth_func(DTLS_ANY_VERSION, 0, 0, DTLS_server_method, ossl_statem_accept, ssl_undefined_function, DTLSv1_2_enc_data) #ifndef OPENSSL_NO_DTLS1_METHOD IMPLEMENT_dtls1_meth_func(DTLS1_VERSION, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1, dtlsv1_client_method, ssl_undefined_function, ossl_statem_connect, DTLSv1_enc_data) IMPLEMENT_dtls1_meth_func(DTLS1_BAD_VER, SSL_METHOD_NO_SUITEB, SSL_OP_NO_DTLSv1, dtls_bad_ver_client_method, ssl_undefined_function, ossl_statem_connect, DTLSv1_enc_data) #endif #ifndef OPENSSL_NO_DTLS1_2_METHOD IMPLEMENT_dtls1_meth_func(DTLS1_2_VERSION, 0, SSL_OP_NO_DTLSv1_2, dtlsv1_2_client_method, ssl_undefined_function, ossl_statem_connect, DTLSv1_2_enc_data) #endif IMPLEMENT_dtls1_meth_func(DTLS_ANY_VERSION, 0, 0, DTLS_client_method, ssl_undefined_function, ossl_statem_connect, DTLSv1_2_enc_data) #ifndef OPENSSL_NO_DEPRECATED_1_1_0 # ifndef OPENSSL_NO_TLS1_2_METHOD const SSL_METHOD *TLSv1_2_method(void) { return tlsv1_2_method(); } const SSL_METHOD *TLSv1_2_server_method(void) { return tlsv1_2_server_method(); } const SSL_METHOD *TLSv1_2_client_method(void) { return tlsv1_2_client_method(); } # endif # ifndef OPENSSL_NO_TLS1_1_METHOD const SSL_METHOD *TLSv1_1_method(void) { return tlsv1_1_method(); } const SSL_METHOD *TLSv1_1_server_method(void) { return tlsv1_1_server_method(); } const SSL_METHOD *TLSv1_1_client_method(void) { return tlsv1_1_client_method(); } # endif # ifndef OPENSSL_NO_TLS1_METHOD const SSL_METHOD *TLSv1_method(void) { return tlsv1_method(); } const SSL_METHOD *TLSv1_server_method(void) { return tlsv1_server_method(); } const SSL_METHOD *TLSv1_client_method(void) { return tlsv1_client_method(); } # endif # ifndef OPENSSL_NO_SSL3_METHOD const SSL_METHOD *SSLv3_method(void) { return sslv3_method(); } const SSL_METHOD *SSLv3_server_method(void) { return sslv3_server_method(); } const SSL_METHOD *SSLv3_client_method(void) { return sslv3_client_method(); } # endif # ifndef OPENSSL_NO_DTLS1_2_METHOD const SSL_METHOD *DTLSv1_2_method(void) { return dtlsv1_2_method(); } const SSL_METHOD *DTLSv1_2_server_method(void) { return dtlsv1_2_server_method(); } const SSL_METHOD *DTLSv1_2_client_method(void) { return dtlsv1_2_client_method(); } # endif # ifndef OPENSSL_NO_DTLS1_METHOD const SSL_METHOD *DTLSv1_method(void) { return dtlsv1_method(); } const SSL_METHOD *DTLSv1_server_method(void) { return dtlsv1_server_method(); } const SSL_METHOD *DTLSv1_client_method(void) { return dtlsv1_client_method(); } # endif #endif
ssl
openssl/ssl/methods.c
openssl
#include "ssl_local.h" #ifndef OPENSSL_NO_UNIT_TEST static const struct openssl_ssl_test_functions ssl_test_functions = { ssl_init_wbio_buffer, }; const struct openssl_ssl_test_functions *SSL_test_functions(void) { return &ssl_test_functions; } #endif
ssl
openssl/ssl/ssl_utst.c
openssl
#include "ssl_local.h" int ssl3_do_change_cipher_spec(SSL_CONNECTION *s) { int i; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->server) i = SSL3_CHANGE_CIPHER_SERVER_READ; else i = SSL3_CHANGE_CIPHER_CLIENT_READ; if (s->s3.tmp.key_block == NULL) { if (s->session == NULL || s->session->master_key_length == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_CCS_RECEIVED_EARLY); return 0; } s->session->cipher = s->s3.tmp.new_cipher; if (!ssl->method->ssl3_enc->setup_key_block(s)) { return 0; } } if (!ssl->method->ssl3_enc->change_cipher_state(s, i)) { return 0; } return 1; } int ssl3_send_alert(SSL_CONNECTION *s, int level, int desc) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (SSL_CONNECTION_TREAT_AS_TLS13(s)) desc = tls13_alert_code(desc); else desc = ssl->method->ssl3_enc->alert_value(desc); if (s->version == SSL3_VERSION && desc == SSL_AD_PROTOCOL_VERSION) desc = SSL_AD_HANDSHAKE_FAILURE; if (desc < 0) return -1; if (s->shutdown & SSL_SENT_SHUTDOWN && desc != SSL_AD_CLOSE_NOTIFY) return -1; if ((level == SSL3_AL_FATAL) && (s->session != NULL)) SSL_CTX_remove_session(s->session_ctx, s->session); s->s3.alert_dispatch = SSL_ALERT_DISPATCH_PENDING; s->s3.send_alert[0] = level; s->s3.send_alert[1] = desc; if (!RECORD_LAYER_write_pending(&s->rlayer)) { return ssl->method->ssl_dispatch_alert(ssl); } return -1; } int ssl3_dispatch_alert(SSL *s) { int i, j; void (*cb) (const SSL *ssl, int type, int val) = NULL; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); OSSL_RECORD_TEMPLATE templ; if (sc == NULL) return -1; if (sc->rlayer.wrlmethod == NULL) { sc->s3.alert_dispatch = SSL_ALERT_DISPATCH_NONE; return 1; } templ.type = SSL3_RT_ALERT; templ.version = (sc->version == TLS1_3_VERSION) ? TLS1_2_VERSION : sc->version; if (SSL_get_state(s) == TLS_ST_CW_CLNT_HELLO && !sc->renegotiate && TLS1_get_version(s) > TLS1_VERSION && sc->hello_retry_request == SSL_HRR_NONE) { templ.version = TLS1_VERSION; } templ.buf = &sc->s3.send_alert[0]; templ.buflen = 2; if (RECORD_LAYER_write_pending(&sc->rlayer)) { if (sc->s3.alert_dispatch != SSL_ALERT_DISPATCH_RETRY) { sc->s3.alert_dispatch = SSL_ALERT_DISPATCH_NONE; return -1; } i = HANDLE_RLAYER_WRITE_RETURN(sc, sc->rlayer.wrlmethod->retry_write_records(sc->rlayer.wrl)); if (i <= 0) { return -1; } sc->rlayer.wpend_tot = 0; sc->s3.alert_dispatch = SSL_ALERT_DISPATCH_NONE; return 1; } i = HANDLE_RLAYER_WRITE_RETURN(sc, sc->rlayer.wrlmethod->write_records(sc->rlayer.wrl, &templ, 1)); if (i <= 0) { sc->s3.alert_dispatch = SSL_ALERT_DISPATCH_RETRY; sc->rlayer.wpend_tot = templ.buflen; sc->rlayer.wpend_type = templ.type; sc->rlayer.wpend_buf = templ.buf; } else { (void)BIO_flush(sc->wbio); sc->s3.alert_dispatch = SSL_ALERT_DISPATCH_NONE; if (sc->msg_callback) sc->msg_callback(1, sc->version, SSL3_RT_ALERT, sc->s3.send_alert, 2, s, sc->msg_callback_arg); if (sc->info_callback != NULL) cb = sc->info_callback; else if (s->ctx->info_callback != NULL) cb = s->ctx->info_callback; if (cb != NULL) { j = (sc->s3.send_alert[0] << 8) | sc->s3.send_alert[1]; cb(s, SSL_CB_WRITE_ALERT, j); } } return i; }
ssl
openssl/ssl/s3_msg.c
openssl
#include <stdio.h> #include <stdlib.h> #include "ssl_local.h" #include <openssl/asn1t.h> #include <openssl/encoder.h> #include <openssl/x509.h> typedef struct { uint32_t version; int32_t ssl_version; ASN1_OCTET_STRING *cipher; ASN1_OCTET_STRING *comp_id; ASN1_OCTET_STRING *master_key; ASN1_OCTET_STRING *session_id; ASN1_OCTET_STRING *key_arg; int64_t time; int64_t timeout; X509 *peer; ASN1_OCTET_STRING *session_id_context; int32_t verify_result; ASN1_OCTET_STRING *tlsext_hostname; uint64_t tlsext_tick_lifetime_hint; uint32_t tlsext_tick_age_add; ASN1_OCTET_STRING *tlsext_tick; #ifndef OPENSSL_NO_PSK ASN1_OCTET_STRING *psk_identity_hint; ASN1_OCTET_STRING *psk_identity; #endif #ifndef OPENSSL_NO_SRP ASN1_OCTET_STRING *srp_username; #endif uint64_t flags; uint32_t max_early_data; ASN1_OCTET_STRING *alpn_selected; uint32_t tlsext_max_fragment_len_mode; ASN1_OCTET_STRING *ticket_appdata; uint32_t kex_group; ASN1_OCTET_STRING *peer_rpk; } SSL_SESSION_ASN1; ASN1_SEQUENCE(SSL_SESSION_ASN1) = { ASN1_EMBED(SSL_SESSION_ASN1, version, UINT32), ASN1_EMBED(SSL_SESSION_ASN1, ssl_version, INT32), ASN1_SIMPLE(SSL_SESSION_ASN1, cipher, ASN1_OCTET_STRING), ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), ASN1_SIMPLE(SSL_SESSION_ASN1, master_key, ASN1_OCTET_STRING), ASN1_IMP_OPT(SSL_SESSION_ASN1, key_arg, ASN1_OCTET_STRING, 0), ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, time, ZINT64, 1), ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, timeout, ZINT64, 2), ASN1_EXP_OPT(SSL_SESSION_ASN1, peer, X509, 3), ASN1_EXP_OPT(SSL_SESSION_ASN1, session_id_context, ASN1_OCTET_STRING, 4), ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, verify_result, ZINT32, 5), ASN1_EXP_OPT(SSL_SESSION_ASN1, tlsext_hostname, ASN1_OCTET_STRING, 6), #ifndef OPENSSL_NO_PSK ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity_hint, ASN1_OCTET_STRING, 7), ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8), #endif ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, tlsext_tick_lifetime_hint, ZUINT64, 9), ASN1_EXP_OPT(SSL_SESSION_ASN1, tlsext_tick, ASN1_OCTET_STRING, 10), ASN1_EXP_OPT(SSL_SESSION_ASN1, comp_id, ASN1_OCTET_STRING, 11), #ifndef OPENSSL_NO_SRP ASN1_EXP_OPT(SSL_SESSION_ASN1, srp_username, ASN1_OCTET_STRING, 12), #endif ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, flags, ZUINT64, 13), ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, tlsext_tick_age_add, ZUINT32, 14), ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, max_early_data, ZUINT32, 15), ASN1_EXP_OPT(SSL_SESSION_ASN1, alpn_selected, ASN1_OCTET_STRING, 16), ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, tlsext_max_fragment_len_mode, ZUINT32, 17), ASN1_EXP_OPT(SSL_SESSION_ASN1, ticket_appdata, ASN1_OCTET_STRING, 18), ASN1_EXP_OPT_EMBED(SSL_SESSION_ASN1, kex_group, UINT32, 19), ASN1_EXP_OPT(SSL_SESSION_ASN1, peer_rpk, ASN1_OCTET_STRING, 20) } static_ASN1_SEQUENCE_END(SSL_SESSION_ASN1) IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(SSL_SESSION_ASN1) static void ssl_session_oinit(ASN1_OCTET_STRING **dest, ASN1_OCTET_STRING *os, const unsigned char *data, size_t len) { os->data = (unsigned char *)data; os->length = (int)len; os->flags = 0; *dest = os; } static void ssl_session_sinit(ASN1_OCTET_STRING **dest, ASN1_OCTET_STRING *os, const char *data) { if (data != NULL) ssl_session_oinit(dest, os, (const unsigned char *)data, strlen(data)); else *dest = NULL; } int i2d_SSL_SESSION(const SSL_SESSION *in, unsigned char **pp) { SSL_SESSION_ASN1 as; ASN1_OCTET_STRING cipher; unsigned char cipher_data[2]; ASN1_OCTET_STRING master_key, session_id, sid_ctx; #ifndef OPENSSL_NO_COMP ASN1_OCTET_STRING comp_id; unsigned char comp_id_data; #endif ASN1_OCTET_STRING tlsext_hostname, tlsext_tick; #ifndef OPENSSL_NO_SRP ASN1_OCTET_STRING srp_username; #endif #ifndef OPENSSL_NO_PSK ASN1_OCTET_STRING psk_identity, psk_identity_hint; #endif ASN1_OCTET_STRING alpn_selected; ASN1_OCTET_STRING ticket_appdata; ASN1_OCTET_STRING peer_rpk; long l; int ret; if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) return 0; memset(&as, 0, sizeof(as)); as.version = SSL_SESSION_ASN1_VERSION; as.ssl_version = in->ssl_version; as.kex_group = in->kex_group; if (in->cipher == NULL) l = in->cipher_id; else l = in->cipher->id; cipher_data[0] = ((unsigned char)(l >> 8L)) & 0xff; cipher_data[1] = ((unsigned char)(l)) & 0xff; ssl_session_oinit(&as.cipher, &cipher, cipher_data, 2); #ifndef OPENSSL_NO_COMP if (in->compress_meth) { comp_id_data = (unsigned char)in->compress_meth; ssl_session_oinit(&as.comp_id, &comp_id, &comp_id_data, 1); } #endif ssl_session_oinit(&as.master_key, &master_key, in->master_key, in->master_key_length); ssl_session_oinit(&as.session_id, &session_id, in->session_id, in->session_id_length); ssl_session_oinit(&as.session_id_context, &sid_ctx, in->sid_ctx, in->sid_ctx_length); as.time = (int64_t)ossl_time_to_time_t(in->time); as.timeout = (int64_t)ossl_time2seconds(in->timeout); as.verify_result = in->verify_result; as.peer = in->peer; as.peer_rpk = NULL; peer_rpk.data = NULL; if (in->peer_rpk != NULL) { peer_rpk.length = i2d_PUBKEY(in->peer_rpk, &peer_rpk.data); if (peer_rpk.length > 0 && peer_rpk.data != NULL) as.peer_rpk = &peer_rpk; } ssl_session_sinit(&as.tlsext_hostname, &tlsext_hostname, in->ext.hostname); if (in->ext.tick) { ssl_session_oinit(&as.tlsext_tick, &tlsext_tick, in->ext.tick, in->ext.ticklen); } if (in->ext.tick_lifetime_hint > 0) as.tlsext_tick_lifetime_hint = in->ext.tick_lifetime_hint; as.tlsext_tick_age_add = in->ext.tick_age_add; #ifndef OPENSSL_NO_PSK ssl_session_sinit(&as.psk_identity_hint, &psk_identity_hint, in->psk_identity_hint); ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity); #endif #ifndef OPENSSL_NO_SRP ssl_session_sinit(&as.srp_username, &srp_username, in->srp_username); #endif as.flags = in->flags; as.max_early_data = in->ext.max_early_data; if (in->ext.alpn_selected == NULL) as.alpn_selected = NULL; else ssl_session_oinit(&as.alpn_selected, &alpn_selected, in->ext.alpn_selected, in->ext.alpn_selected_len); as.tlsext_max_fragment_len_mode = in->ext.max_fragment_len_mode; if (in->ticket_appdata == NULL) as.ticket_appdata = NULL; else ssl_session_oinit(&as.ticket_appdata, &ticket_appdata, in->ticket_appdata, in->ticket_appdata_len); ret = i2d_SSL_SESSION_ASN1(&as, pp); OPENSSL_free(peer_rpk.data); return ret; } static int ssl_session_strndup(char **pdst, ASN1_OCTET_STRING *src) { OPENSSL_free(*pdst); *pdst = NULL; if (src == NULL) return 1; *pdst = OPENSSL_strndup((char *)src->data, src->length); if (*pdst == NULL) return 0; return 1; } static int ssl_session_memcpy(unsigned char *dst, size_t *pdstlen, ASN1_OCTET_STRING *src, size_t maxlen) { if (src == NULL || src->length == 0) { *pdstlen = 0; return 1; } if (src->length < 0 || src->length > (int)maxlen) return 0; memcpy(dst, src->data, src->length); *pdstlen = src->length; return 1; } SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, long length) { return d2i_SSL_SESSION_ex(a, pp, length, NULL, NULL); } SSL_SESSION *d2i_SSL_SESSION_ex(SSL_SESSION **a, const unsigned char **pp, long length, OSSL_LIB_CTX *libctx, const char *propq) { long id; size_t tmpl; const unsigned char *p = *pp; SSL_SESSION_ASN1 *as = NULL; SSL_SESSION *ret = NULL; as = d2i_SSL_SESSION_ASN1(NULL, &p, length); if (as == NULL) goto err; if (a == NULL || *a == NULL) { ret = SSL_SESSION_new(); if (ret == NULL) goto err; } else { ret = *a; } if (as->version != SSL_SESSION_ASN1_VERSION) { ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_SSL_VERSION); goto err; } if ((as->ssl_version >> 8) != SSL3_VERSION_MAJOR && (as->ssl_version >> 8) != DTLS1_VERSION_MAJOR && as->ssl_version != DTLS1_BAD_VER) { ERR_raise(ERR_LIB_SSL, SSL_R_UNSUPPORTED_SSL_VERSION); goto err; } ret->ssl_version = (int)as->ssl_version; ret->kex_group = as->kex_group; if (as->cipher->length != 2) { ERR_raise(ERR_LIB_SSL, SSL_R_CIPHER_CODE_WRONG_LENGTH); goto err; } id = 0x03000000L | ((unsigned long)as->cipher->data[0] << 8L) | (unsigned long)as->cipher->data[1]; ret->cipher_id = id; ret->cipher = ssl3_get_cipher_by_id(id); if (ret->cipher == NULL) goto err; if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) goto err; if (!ssl_session_memcpy(ret->master_key, &tmpl, as->master_key, TLS13_MAX_RESUMPTION_PSK_LENGTH)) goto err; ret->master_key_length = tmpl; if (as->time != 0) ret->time = ossl_time_from_time_t(as->time); else ret->time = ossl_time_now(); if (as->timeout != 0) ret->timeout = ossl_seconds2time(as->timeout); else ret->timeout = ossl_seconds2time(3); ssl_session_calculate_timeout(ret); X509_free(ret->peer); ret->peer = as->peer; as->peer = NULL; EVP_PKEY_free(ret->peer_rpk); ret->peer_rpk = NULL; if (as->peer_rpk != NULL) { const unsigned char *data = as->peer_rpk->data; ret->peer_rpk = d2i_PUBKEY_ex(NULL, &data, as->peer_rpk->length, libctx, propq); if (ret->peer_rpk == NULL) goto err; } if (!ssl_session_memcpy(ret->sid_ctx, &ret->sid_ctx_length, as->session_id_context, SSL_MAX_SID_CTX_LENGTH)) goto err; ret->verify_result = as->verify_result; if (!ssl_session_strndup(&ret->ext.hostname, as->tlsext_hostname)) goto err; #ifndef OPENSSL_NO_PSK if (!ssl_session_strndup(&ret->psk_identity_hint, as->psk_identity_hint)) goto err; if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity)) goto err; #endif ret->ext.tick_lifetime_hint = (unsigned long)as->tlsext_tick_lifetime_hint; ret->ext.tick_age_add = as->tlsext_tick_age_add; OPENSSL_free(ret->ext.tick); if (as->tlsext_tick != NULL) { ret->ext.tick = as->tlsext_tick->data; ret->ext.ticklen = as->tlsext_tick->length; as->tlsext_tick->data = NULL; } else { ret->ext.tick = NULL; } #ifndef OPENSSL_NO_COMP if (as->comp_id) { if (as->comp_id->length != 1) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_LENGTH); goto err; } ret->compress_meth = as->comp_id->data[0]; } else { ret->compress_meth = 0; } #endif #ifndef OPENSSL_NO_SRP if (!ssl_session_strndup(&ret->srp_username, as->srp_username)) goto err; #endif ret->flags = (int32_t)as->flags; ret->ext.max_early_data = as->max_early_data; OPENSSL_free(ret->ext.alpn_selected); if (as->alpn_selected != NULL) { ret->ext.alpn_selected = as->alpn_selected->data; ret->ext.alpn_selected_len = as->alpn_selected->length; as->alpn_selected->data = NULL; } else { ret->ext.alpn_selected = NULL; ret->ext.alpn_selected_len = 0; } ret->ext.max_fragment_len_mode = as->tlsext_max_fragment_len_mode; OPENSSL_free(ret->ticket_appdata); if (as->ticket_appdata != NULL) { ret->ticket_appdata = as->ticket_appdata->data; ret->ticket_appdata_len = as->ticket_appdata->length; as->ticket_appdata->data = NULL; } else { ret->ticket_appdata = NULL; ret->ticket_appdata_len = 0; } M_ASN1_free_of(as, SSL_SESSION_ASN1); if ((a != NULL) && (*a == NULL)) *a = ret; *pp = p; return ret; err: M_ASN1_free_of(as, SSL_SESSION_ASN1); if ((a == NULL) || (*a != ret)) SSL_SESSION_free(ret); return NULL; }
ssl
openssl/ssl/ssl_asn1.c
openssl
#include <openssl/err.h> #include <openssl/sslerr.h> #include "sslerr.h" #ifndef OPENSSL_NO_ERR static const ERR_STRING_DATA SSL_str_reasons[] = { {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_APPLICATION_DATA_AFTER_CLOSE_NOTIFY), "application data after close notify"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_APP_DATA_IN_HANDSHAKE), "app data in handshake"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT), "attempt to reuse session in different context"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_AT_LEAST_TLS_1_2_NEEDED_IN_SUITEB_MODE), "at least (D)TLS 1.2 needed in Suite B mode"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_CERTIFICATE), "bad certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_CHANGE_CIPHER_SPEC), "bad change cipher spec"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_CIPHER), "bad cipher"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_COMPRESSION_ALGORITHM), "bad compression algorithm"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_DATA), "bad data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_DATA_RETURNED_BY_CALLBACK), "bad data returned by callback"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_DECOMPRESSION), "bad decompression"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_DH_VALUE), "bad dh value"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_DIGEST_LENGTH), "bad digest length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_EARLY_DATA), "bad early data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_ECC_CERT), "bad ecc cert"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_ECPOINT), "bad ecpoint"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_EXTENSION), "bad extension"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_HANDSHAKE_LENGTH), "bad handshake length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_HANDSHAKE_STATE), "bad handshake state"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_HELLO_REQUEST), "bad hello request"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_HRR_VERSION), "bad hrr version"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_KEY_SHARE), "bad key share"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_KEY_UPDATE), "bad key update"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_LEGACY_VERSION), "bad legacy version"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_LENGTH), "bad length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_PACKET), "bad packet"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_PACKET_LENGTH), "bad packet length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_PROTOCOL_VERSION_NUMBER), "bad protocol version number"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_PSK), "bad psk"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_PSK_IDENTITY), "bad psk identity"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_RECORD_TYPE), "bad record type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_RSA_ENCRYPT), "bad rsa encrypt"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_SIGNATURE), "bad signature"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_SRP_A_LENGTH), "bad srp a length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_SRP_PARAMETERS), "bad srp parameters"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_SRTP_MKI_VALUE), "bad srtp mki value"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST), "bad srtp protection profile list"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_SSL_FILETYPE), "bad ssl filetype"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_VALUE), "bad value"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BAD_WRITE_RETRY), "bad write retry"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BINDER_DOES_NOT_VERIFY), "binder does not verify"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BIO_NOT_SET), "bio not set"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BLOCK_CIPHER_PAD_IS_WRONG), "block cipher pad is wrong"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_BN_LIB), "bn lib"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CALLBACK_FAILED), "callback failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CANNOT_CHANGE_CIPHER), "cannot change cipher"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CANNOT_GET_GROUP_NAME), "cannot get group name"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CA_DN_LENGTH_MISMATCH), "ca dn length mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CA_KEY_TOO_SMALL), "ca key too small"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CA_MD_TOO_WEAK), "ca md too weak"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CCS_RECEIVED_EARLY), "ccs received early"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CERTIFICATE_VERIFY_FAILED), "certificate verify failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CERT_CB_ERROR), "cert cb error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CERT_LENGTH_MISMATCH), "cert length mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CIPHERSUITE_DIGEST_HAS_CHANGED), "ciphersuite digest has changed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CIPHER_CODE_WRONG_LENGTH), "cipher code wrong length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CLIENTHELLO_TLSEXT), "clienthello tlsext"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COMPRESSED_LENGTH_TOO_LONG), "compressed length too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COMPRESSION_DISABLED), "compression disabled"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COMPRESSION_FAILURE), "compression failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE), "compression id not within private range"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COMPRESSION_LIBRARY_ERROR), "compression library error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CONNECTION_TYPE_NOT_SET), "connection type not set"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CONN_USE_ONLY), "conn use only"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CONTEXT_NOT_DANE_ENABLED), "context not dane enabled"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COOKIE_GEN_CALLBACK_FAILURE), "cookie gen callback failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COOKIE_MISMATCH), "cookie mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_COPY_PARAMETERS_FAILED), "copy parameters failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_CUSTOM_EXT_HANDLER_ALREADY_INSTALLED), "custom ext handler already installed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_ALREADY_ENABLED), "dane already enabled"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_CANNOT_OVERRIDE_MTYPE_FULL), "dane cannot override mtype full"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_NOT_ENABLED), "dane not enabled"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_BAD_CERTIFICATE), "dane tlsa bad certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_BAD_CERTIFICATE_USAGE), "dane tlsa bad certificate usage"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_BAD_DATA_LENGTH), "dane tlsa bad data length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_BAD_DIGEST_LENGTH), "dane tlsa bad digest length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_BAD_MATCHING_TYPE), "dane tlsa bad matching type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_BAD_PUBLIC_KEY), "dane tlsa bad public key"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_BAD_SELECTOR), "dane tlsa bad selector"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DANE_TLSA_NULL_DATA), "dane tlsa null data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DATA_BETWEEN_CCS_AND_FINISHED), "data between ccs and finished"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DATA_LENGTH_TOO_LONG), "data length too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DECRYPTION_FAILED), "decryption failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC), "decryption failed or bad record mac"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DH_KEY_TOO_SMALL), "dh key too small"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG), "dh public value length is wrong"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DIGEST_CHECK_FAILED), "digest check failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DTLS_MESSAGE_TOO_BIG), "dtls message too big"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_DUPLICATE_COMPRESSION_ID), "duplicate compression id"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ECC_CERT_NOT_FOR_SIGNING), "ecc cert not for signing"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ECDH_REQUIRED_FOR_SUITEB_MODE), "ecdh required for suiteb mode"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EE_KEY_TOO_SMALL), "ee key too small"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EMPTY_RAW_PUBLIC_KEY), "empty raw public key"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST), "empty srtp protection profile list"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ENCRYPTED_LENGTH_TOO_LONG), "encrypted length too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST), "error in received cipher list"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ERROR_SETTING_TLSA_BASE_DOMAIN), "error setting tlsa base domain"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EXCEEDS_MAX_FRAGMENT_SIZE), "exceeds max fragment size"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EXCESSIVE_MESSAGE_SIZE), "excessive message size"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EXTENSION_NOT_RECEIVED), "extension not received"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EXTRA_DATA_IN_MESSAGE), "extra data in message"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_EXT_LENGTH_MISMATCH), "ext length mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_FAILED_TO_GET_PARAMETER), "failed to get parameter"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_FAILED_TO_INIT_ASYNC), "failed to init async"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_FEATURE_NEGOTIATION_NOT_COMPLETE), "feature negotiation not complete"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_FEATURE_NOT_RENEGOTIABLE), "feature not renegotiable"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_FRAGMENTED_CLIENT_HELLO), "fragmented client hello"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_GOT_A_FIN_BEFORE_A_CCS), "got a fin before a ccs"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_HTTPS_PROXY_REQUEST), "https proxy request"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_HTTP_REQUEST), "http request"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ILLEGAL_POINT_COMPRESSION), "illegal point compression"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_ILLEGAL_SUITEB_DIGEST), "illegal Suite B digest"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INAPPROPRIATE_FALLBACK), "inappropriate fallback"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INCONSISTENT_COMPRESSION), "inconsistent compression"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INCONSISTENT_EARLY_DATA_ALPN), "inconsistent early data alpn"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INCONSISTENT_EARLY_DATA_SNI), "inconsistent early data sni"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INCONSISTENT_EXTMS), "inconsistent extms"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INSUFFICIENT_SECURITY), "insufficient security"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_ALERT), "invalid alert"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_CCS_MESSAGE), "invalid ccs message"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_CERTIFICATE_OR_ALG), "invalid certificate or alg"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_COMMAND), "invalid command"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_COMPRESSION_ALGORITHM), "invalid compression algorithm"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_CONFIG), "invalid config"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_CONFIGURATION_NAME), "invalid configuration name"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_CONTEXT), "invalid context"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_CT_VALIDATION_TYPE), "invalid ct validation type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_KEY_UPDATE_TYPE), "invalid key update type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_MAX_EARLY_DATA), "invalid max early data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_NULL_CMD_NAME), "invalid null cmd name"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_RAW_PUBLIC_KEY), "invalid raw public key"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_RECORD), "invalid record"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_SEQUENCE_NUMBER), "invalid sequence number"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_SERVERINFO_DATA), "invalid serverinfo data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_SESSION_ID), "invalid session id"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_SRP_USERNAME), "invalid srp username"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_STATUS_RESPONSE), "invalid status response"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_INVALID_TICKET_KEYS_LENGTH), "invalid ticket keys length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_LEGACY_SIGALG_DISALLOWED_OR_UNSUPPORTED), "legacy sigalg disallowed or unsupported"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_LENGTH_MISMATCH), "length mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_LENGTH_TOO_LONG), "length too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_LENGTH_TOO_SHORT), "length too short"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_LIBRARY_BUG), "library bug"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_LIBRARY_HAS_NO_CIPHERS), "library has no ciphers"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MAXIMUM_ENCRYPTED_PKTS_REACHED), "maximum encrypted pkts reached"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_DSA_SIGNING_CERT), "missing dsa signing cert"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_ECDSA_SIGNING_CERT), "missing ecdsa signing cert"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_FATAL), "missing fatal"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_PARAMETERS), "missing parameters"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_PSK_KEX_MODES_EXTENSION), "missing psk kex modes extension"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_RSA_CERTIFICATE), "missing rsa certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_RSA_ENCRYPTING_CERT), "missing rsa encrypting cert"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_RSA_SIGNING_CERT), "missing rsa signing cert"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_SIGALGS_EXTENSION), "missing sigalgs extension"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_SIGNING_CERT), "missing signing cert"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_SRP_PARAM), "can't find SRP server param"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_SUPPORTED_GROUPS_EXTENSION), "missing supported groups extension"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_TMP_DH_KEY), "missing tmp dh key"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MISSING_TMP_ECDH_KEY), "missing tmp ecdh key"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_MIXED_HANDSHAKE_AND_NON_HANDSHAKE_DATA), "mixed handshake and non handshake data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NOT_ON_RECORD_BOUNDARY), "not on record boundary"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NOT_REPLACING_CERTIFICATE), "not replacing certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NOT_SERVER), "not server"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_APPLICATION_PROTOCOL), "no application protocol"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CERTIFICATES_RETURNED), "no certificates returned"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CERTIFICATE_ASSIGNED), "no certificate assigned"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CERTIFICATE_SET), "no certificate set"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CHANGE_FOLLOWING_HRR), "no change following hrr"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CIPHERS_AVAILABLE), "no ciphers available"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CIPHERS_SPECIFIED), "no ciphers specified"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CIPHER_MATCH), "no cipher match"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_CLIENT_CERT_METHOD), "no client cert method"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_COMPRESSION_SPECIFIED), "no compression specified"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_COOKIE_CALLBACK_SET), "no cookie callback set"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER), "Peer haven't sent GOST certificate, required for selected ciphersuite"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_METHOD_SPECIFIED), "no method specified"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_PEM_EXTENSIONS), "no pem extensions"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_PRIVATE_KEY_ASSIGNED), "no private key assigned"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_PROTOCOLS_AVAILABLE), "no protocols available"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_RENEGOTIATION), "no renegotiation"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_REQUIRED_DIGEST), "no required digest"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SHARED_CIPHER), "no shared cipher"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SHARED_GROUPS), "no shared groups"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SHARED_SIGNATURE_ALGORITHMS), "no shared signature algorithms"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SRTP_PROFILES), "no srtp profiles"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_STREAM), "no stream"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SUITABLE_DIGEST_ALGORITHM), "no suitable digest algorithm"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SUITABLE_GROUPS), "no suitable groups"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SUITABLE_KEY_SHARE), "no suitable key share"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SUITABLE_RECORD_LAYER), "no suitable record layer"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM), "no suitable signature algorithm"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_VALID_SCTS), "no valid scts"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NO_VERIFY_COOKIE_CALLBACK), "no verify cookie callback"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NULL_SSL_CTX), "null ssl ctx"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_NULL_SSL_METHOD_PASSED), "null ssl method passed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_OCSP_CALLBACK_FAILURE), "ocsp callback failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED), "old session cipher not returned"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED), "old session compression algorithm not returned"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_OVERFLOW_ERROR), "overflow error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PACKET_LENGTH_TOO_LONG), "packet length too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PARSE_TLSEXT), "parse tlsext"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PATH_TOO_LONG), "path too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE), "peer did not return a certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PEM_NAME_BAD_PREFIX), "pem name bad prefix"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PEM_NAME_TOO_SHORT), "pem name too short"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PIPELINE_FAILURE), "pipeline failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_POLL_REQUEST_NOT_SUPPORTED), "poll request not supported"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_POST_HANDSHAKE_AUTH_ENCODING_ERR), "post handshake auth encoding err"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PRIVATE_KEY_MISMATCH), "private key mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PROTOCOL_IS_SHUTDOWN), "protocol is shutdown"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PSK_IDENTITY_NOT_FOUND), "psk identity not found"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PSK_NO_CLIENT_CB), "psk no client cb"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_PSK_NO_SERVER_CB), "psk no server cb"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_QUIC_HANDSHAKE_LAYER_ERROR), "quic handshake layer error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_QUIC_NETWORK_ERROR), "quic network error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_QUIC_PROTOCOL_ERROR), "quic protocol error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_READ_BIO_NOT_SET), "read bio not set"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_READ_TIMEOUT_EXPIRED), "read timeout expired"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_RECORDS_NOT_RELEASED), "records not released"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_RECORD_LAYER_FAILURE), "record layer failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_RECORD_LENGTH_MISMATCH), "record length mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_RECORD_TOO_SMALL), "record too small"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_REMOTE_PEER_ADDRESS_NOT_SET), "remote peer address not set"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_RENEGOTIATE_EXT_TOO_LONG), "renegotiate ext too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_RENEGOTIATION_ENCODING_ERR), "renegotiation encoding err"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_RENEGOTIATION_MISMATCH), "renegotiation mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_REQUEST_PENDING), "request pending"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_REQUEST_SENT), "request sent"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_REQUIRED_CIPHER_MISSING), "required cipher missing"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_REQUIRED_COMPRESSION_ALGORITHM_MISSING), "required compression algorithm missing"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING), "scsv received when renegotiating"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SCT_VERIFICATION_FAILED), "sct verification failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SEQUENCE_CTR_WRAPPED), "sequence ctr wrapped"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SERVERHELLO_TLSEXT), "serverhello tlsext"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED), "session id context uninitialized"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SHUTDOWN_WHILE_IN_INIT), "shutdown while in init"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SIGNATURE_ALGORITHMS_ERROR), "signature algorithms error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE), "signature for non signing certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SRP_A_CALC), "error with the srp params"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES), "srtp could not allocate profiles"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG), "srtp protection profile list too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE), "srtp unknown protection profile"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH), "ssl3 ext invalid max fragment length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL3_EXT_INVALID_SERVERNAME), "ssl3 ext invalid servername"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE), "ssl3 ext invalid servername type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL3_SESSION_ID_TOO_LONG), "ssl3 session id too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_BAD_CERTIFICATE), "ssl/tls alert bad certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_BAD_RECORD_MAC), "ssl/tls alert bad record mac"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED), "ssl/tls alert certificate expired"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED), "ssl/tls alert certificate revoked"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN), "ssl/tls alert certificate unknown"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE), "ssl/tls alert decompression failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE), "ssl/tls alert handshake failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER), "ssl/tls alert illegal parameter"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_NO_CERTIFICATE), "ssl/tls alert no certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE), "ssl/tls alert unexpected message"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE), "ssl/tls alert unsupported certificate"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_COMMAND_SECTION_EMPTY), "ssl command section empty"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_COMMAND_SECTION_NOT_FOUND), "ssl command section not found"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION), "ssl ctx has no default ssl version"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_HANDSHAKE_FAILURE), "ssl handshake failure"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS), "ssl library has no ciphers"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_NEGATIVE_LENGTH), "ssl negative length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SECTION_EMPTY), "ssl section empty"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SECTION_NOT_FOUND), "ssl section not found"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SESSION_ID_CALLBACK_FAILED), "ssl session id callback failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SESSION_ID_CONFLICT), "ssl session id conflict"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG), "ssl session id context too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH), "ssl session id has bad length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SESSION_ID_TOO_LONG), "ssl session id too long"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_SSL_SESSION_VERSION_MISMATCH), "ssl session version mismatch"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_STILL_IN_INIT), "still in init"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_STREAM_COUNT_LIMITED), "stream count limited"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_STREAM_FINISHED), "stream finished"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_STREAM_RECV_ONLY), "stream recv only"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_STREAM_RESET), "stream reset"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_STREAM_SEND_ONLY), "stream send only"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV13_ALERT_CERTIFICATE_REQUIRED), "tlsv13 alert certificate required"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV13_ALERT_MISSING_EXTENSION), "tlsv13 alert missing extension"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_ACCESS_DENIED), "tlsv1 alert access denied"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_DECODE_ERROR), "tlsv1 alert decode error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_DECRYPTION_FAILED), "tlsv1 alert decryption failed"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_DECRYPT_ERROR), "tlsv1 alert decrypt error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION), "tlsv1 alert export restriction"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK), "tlsv1 alert inappropriate fallback"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY), "tlsv1 alert insufficient security"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_INTERNAL_ERROR), "tlsv1 alert internal error"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_NO_RENEGOTIATION), "tlsv1 alert no renegotiation"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_PROTOCOL_VERSION), "tlsv1 alert protocol version"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_RECORD_OVERFLOW), "tlsv1 alert record overflow"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_UNKNOWN_CA), "tlsv1 alert unknown ca"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_USER_CANCELLED), "tlsv1 alert user cancelled"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE), "tlsv1 bad certificate hash value"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_BAD_CERTIFICATE_STATUS_RESPONSE), "tlsv1 bad certificate status response"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_CERTIFICATE_UNOBTAINABLE), "tlsv1 certificate unobtainable"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_UNRECOGNIZED_NAME), "tlsv1 unrecognized name"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_UNSUPPORTED_EXTENSION), "tlsv1 unsupported extension"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLS_ILLEGAL_EXPORTER_LABEL), "tls illegal exporter label"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST), "tls invalid ecpointformat list"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TOO_MANY_KEY_UPDATES), "too many key updates"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TOO_MANY_WARN_ALERTS), "too many warn alerts"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TOO_MUCH_EARLY_DATA), "too much early data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS), "unable to find ecdh parameters"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS), "unable to find public key parameters"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES), "unable to load ssl3 md5 routines"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES), "unable to load ssl3 sha1 routines"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNEXPECTED_CCS_MESSAGE), "unexpected ccs message"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNEXPECTED_END_OF_EARLY_DATA), "unexpected end of early data"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNEXPECTED_EOF_WHILE_READING), "unexpected eof while reading"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNEXPECTED_MESSAGE), "unexpected message"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNEXPECTED_RECORD), "unexpected record"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNINITIALIZED), "uninitialized"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_ALERT_TYPE), "unknown alert type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_CERTIFICATE_TYPE), "unknown certificate type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_CIPHER_RETURNED), "unknown cipher returned"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_CIPHER_TYPE), "unknown cipher type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_CMD_NAME), "unknown cmd name"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_COMMAND), "unknown command"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_DIGEST), "unknown digest"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE), "unknown key exchange type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_MANDATORY_PARAMETER), "unknown mandatory parameter"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_PKEY_TYPE), "unknown pkey type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_PROTOCOL), "unknown protocol"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_SSL_VERSION), "unknown ssl version"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNKNOWN_STATE), "unknown state"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED), "unsafe legacy renegotiation disabled"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSOLICITED_EXTENSION), "unsolicited extension"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM), "unsupported compression algorithm"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_CONFIG_VALUE), "unsupported config value"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_CONFIG_VALUE_CLASS), "unsupported config value class"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_CONFIG_VALUE_OP), "unsupported config value op"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_ELLIPTIC_CURVE), "unsupported elliptic curve"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_PROTOCOL), "unsupported protocol"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_SSL_VERSION), "unsupported ssl version"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_STATUS_TYPE), "unsupported status type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_UNSUPPORTED_WRITE_FLAG), "unsupported write flag"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_USE_SRTP_NOT_NEGOTIATED), "use srtp not negotiated"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_VERSION_TOO_HIGH), "version too high"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_VERSION_TOO_LOW), "version too low"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_CERTIFICATE_TYPE), "wrong certificate type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_CIPHER_RETURNED), "wrong cipher returned"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_CURVE), "wrong curve"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_RPK_TYPE), "wrong rpk type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_SIGNATURE_LENGTH), "wrong signature length"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_SIGNATURE_SIZE), "wrong signature size"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_SIGNATURE_TYPE), "wrong signature type"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_SSL_VERSION), "wrong ssl version"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_WRONG_VERSION_NUMBER), "wrong version number"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_X509_LIB), "x509 lib"}, {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_X509_VERIFICATION_SETUP_PROBLEMS), "x509 verification setup problems"}, {0, NULL} }; #endif int ossl_err_load_SSL_strings(void) { #ifndef OPENSSL_NO_ERR if (ERR_reason_error_string(SSL_str_reasons[0].error) == NULL) ERR_load_strings_const(SSL_str_reasons); #endif return 1; }
ssl
openssl/ssl/ssl_err.c
openssl
#include <stdio.h> #include "ssl_local.h" #include "internal/e_os.h" #include "internal/refcount.h" size_t ossl_calculate_comp_expansion(int alg, size_t length) { size_t ret; switch (alg) { case TLSEXT_comp_cert_zlib: ret = length + 11 + 5 * (length >> 14); break; case TLSEXT_comp_cert_brotli: ret = length + 5 + 3 * (length >> 16); break; case TLSEXT_comp_cert_zstd: ret = length + 22 + 3 * (length >> 17); break; default: return 0; } if (ret < length) return 0; return ret; } int ossl_comp_has_alg(int a) { #ifndef OPENSSL_NO_COMP_ALG if ((a == 0 || a == TLSEXT_comp_cert_brotli) && BIO_f_brotli() != NULL) return 1; if ((a == 0 || a == TLSEXT_comp_cert_zstd) && BIO_f_zstd() != NULL) return 1; if ((a == 0 || a == TLSEXT_comp_cert_zlib) && BIO_f_zlib() != NULL) return 1; #endif return 0; } #ifndef OPENSSL_NO_COMP_ALG static OSSL_COMP_CERT *OSSL_COMP_CERT_new(unsigned char *data, size_t len, size_t orig_len, int alg) { OSSL_COMP_CERT *ret = NULL; if (!ossl_comp_has_alg(alg) || data == NULL || (ret = OPENSSL_zalloc(sizeof(*ret))) == NULL || !CRYPTO_NEW_REF(&ret->references, 1)) goto err; ret->data = data; ret->len = len; ret->orig_len = orig_len; ret->alg = alg; return ret; err: ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE); OPENSSL_free(data); OPENSSL_free(ret); return NULL; } __owur static OSSL_COMP_CERT *OSSL_COMP_CERT_from_compressed_data(unsigned char *data, size_t len, size_t orig_len, int alg) { return OSSL_COMP_CERT_new(OPENSSL_memdup(data, len), len, orig_len, alg); } __owur static OSSL_COMP_CERT *OSSL_COMP_CERT_from_uncompressed_data(unsigned char *data, size_t len, int alg) { OSSL_COMP_CERT *ret = NULL; size_t max_length; int comp_length; COMP_METHOD *method; unsigned char *comp_data = NULL; COMP_CTX *comp_ctx = NULL; switch (alg) { case TLSEXT_comp_cert_brotli: method = COMP_brotli_oneshot(); break; case TLSEXT_comp_cert_zlib: method = COMP_zlib_oneshot(); break; case TLSEXT_comp_cert_zstd: method = COMP_zstd_oneshot(); break; default: goto err; } if ((max_length = ossl_calculate_comp_expansion(alg, len)) == 0 || method == NULL || (comp_ctx = COMP_CTX_new(method)) == NULL || (comp_data = OPENSSL_zalloc(max_length)) == NULL) goto err; comp_length = COMP_compress_block(comp_ctx, comp_data, max_length, data, len); if (comp_length <= 0) goto err; ret = OSSL_COMP_CERT_new(comp_data, comp_length, len, alg); comp_data = NULL; err: OPENSSL_free(comp_data); COMP_CTX_free(comp_ctx); return ret; } void OSSL_COMP_CERT_free(OSSL_COMP_CERT *cc) { int i; if (cc == NULL) return; CRYPTO_DOWN_REF(&cc->references, &i); REF_PRINT_COUNT("OSSL_COMP_CERT", cc); if (i > 0) return; REF_ASSERT_ISNT(i < 0); OPENSSL_free(cc->data); CRYPTO_FREE_REF(&cc->references); OPENSSL_free(cc); } int OSSL_COMP_CERT_up_ref(OSSL_COMP_CERT *cc) { int i; if (CRYPTO_UP_REF(&cc->references, &i) <= 0) return 0; REF_PRINT_COUNT("OSSL_COMP_CERT", cc); REF_ASSERT_ISNT(i < 2); return ((i > 1) ? 1 : 0); } static int ssl_set_cert_comp_pref(int *prefs, int *algs, size_t len) { size_t j = 0; size_t i; int found = 0; int already_set[TLSEXT_comp_cert_limit]; int tmp_prefs[TLSEXT_comp_cert_limit]; if (len == 0 || algs == NULL) { memset(prefs, 0, sizeof(tmp_prefs)); return 1; } memset(tmp_prefs, 0, sizeof(tmp_prefs)); memset(already_set, 0, sizeof(already_set)); for (i = 0; i < len; i++) { if (algs[i] != 0 && ossl_comp_has_alg(algs[i])) { if (already_set[algs[i]]) return 0; tmp_prefs[j++] = algs[i]; already_set[algs[i]] = 1; found = 1; } } if (found) memcpy(prefs, tmp_prefs, sizeof(tmp_prefs)); return found; } static size_t ssl_get_cert_to_compress(SSL *ssl, CERT_PKEY *cpk, unsigned char **data) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); WPACKET tmppkt; BUF_MEM buf = { 0 }; size_t ret = 0; if (sc == NULL || cpk == NULL || !sc->server || !SSL_in_before(ssl)) return 0; if (!WPACKET_init(&tmppkt, &buf)) goto out; if (!WPACKET_put_bytes_u8(&tmppkt, 0)) goto out; if (!ssl3_output_cert_chain(sc, &tmppkt, cpk, 1)) goto out; WPACKET_get_total_written(&tmppkt, &ret); out: WPACKET_cleanup(&tmppkt); if (ret != 0 && data != NULL) *data = (unsigned char *)buf.data; else OPENSSL_free(buf.data); return ret; } static int ssl_compress_one_cert(SSL *ssl, CERT_PKEY *cpk, int alg) { unsigned char *cert_data = NULL; OSSL_COMP_CERT *comp_cert = NULL; size_t length; if (cpk == NULL || alg == TLSEXT_comp_cert_none || !ossl_comp_has_alg(alg)) return 0; if ((length = ssl_get_cert_to_compress(ssl, cpk, &cert_data)) == 0) return 0; comp_cert = OSSL_COMP_CERT_from_uncompressed_data(cert_data, length, alg); OPENSSL_free(cert_data); if (comp_cert == NULL) return 0; OSSL_COMP_CERT_free(cpk->comp_cert[alg]); cpk->comp_cert[alg] = comp_cert; return 1; } static int ssl_compress_certs(SSL *ssl, CERT_PKEY *cpks, int alg_in) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); int i; int j; int alg; int count = 0; if (sc == NULL || cpks == NULL || !ossl_comp_has_alg(alg_in)) return 0; for (i = 0; i < TLSEXT_comp_cert_limit; i++) { alg = sc->cert_comp_prefs[i]; if ((alg_in == 0 && alg != TLSEXT_comp_cert_none) || (alg_in != 0 && alg == alg_in)) { for (j = 0; j < SSL_PKEY_NUM; j++) { if (cpks[j].x509 == NULL) continue; if (!ssl_compress_one_cert(ssl, &cpks[j], alg)) return 0; if (cpks[j].comp_cert[alg]->len >= cpks[j].comp_cert[alg]->orig_len) { OSSL_COMP_CERT_free(cpks[j].comp_cert[alg]); cpks[j].comp_cert[alg] = NULL; } else { count++; } } } } return (count > 0); } static size_t ssl_get_compressed_cert(SSL *ssl, CERT_PKEY *cpk, int alg, unsigned char **data, size_t *orig_len) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); size_t cert_len = 0; size_t comp_len = 0; unsigned char *cert_data = NULL; OSSL_COMP_CERT *comp_cert = NULL; if (sc == NULL || cpk == NULL || data == NULL || orig_len == NULL || !sc->server || !SSL_in_before(ssl) || !ossl_comp_has_alg(alg)) return 0; if ((cert_len = ssl_get_cert_to_compress(ssl, cpk, &cert_data)) == 0) goto err; comp_cert = OSSL_COMP_CERT_from_uncompressed_data(cert_data, cert_len, alg); OPENSSL_free(cert_data); if (comp_cert == NULL) goto err; comp_len = comp_cert->len; *orig_len = comp_cert->orig_len; *data = comp_cert->data; comp_cert->data = NULL; err: OSSL_COMP_CERT_free(comp_cert); return comp_len; } static int ossl_set1_compressed_cert(CERT *cert, int algorithm, unsigned char *comp_data, size_t comp_length, size_t orig_length) { OSSL_COMP_CERT *comp_cert; if (cert == NULL || cert->key == NULL) return 0; comp_cert = OSSL_COMP_CERT_from_compressed_data(comp_data, comp_length, orig_length, algorithm); if (comp_cert == NULL) return 0; OSSL_COMP_CERT_free(cert->key->comp_cert[algorithm]); cert->key->comp_cert[algorithm] = comp_cert; return 1; } #endif int SSL_CTX_set1_cert_comp_preference(SSL_CTX *ctx, int *algs, size_t len) { #ifndef OPENSSL_NO_COMP_ALG return ssl_set_cert_comp_pref(ctx->cert_comp_prefs, algs, len); #else return 0; #endif } int SSL_set1_cert_comp_preference(SSL *ssl, int *algs, size_t len) { #ifndef OPENSSL_NO_COMP_ALG SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; return ssl_set_cert_comp_pref(sc->cert_comp_prefs, algs, len); #else return 0; #endif } int SSL_compress_certs(SSL *ssl, int alg) { #ifndef OPENSSL_NO_COMP_ALG SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL || sc->cert == NULL) return 0; return ssl_compress_certs(ssl, sc->cert->pkeys, alg); #endif return 0; } int SSL_CTX_compress_certs(SSL_CTX *ctx, int alg) { int ret = 0; #ifndef OPENSSL_NO_COMP_ALG SSL *new = SSL_new(ctx); if (new == NULL) return 0; ret = ssl_compress_certs(new, ctx->cert->pkeys, alg); SSL_free(new); #endif return ret; } size_t SSL_get1_compressed_cert(SSL *ssl, int alg, unsigned char **data, size_t *orig_len) { #ifndef OPENSSL_NO_COMP_ALG SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); CERT_PKEY *cpk = NULL; if (sc->cert != NULL) cpk = sc->cert->key; else cpk = ssl->ctx->cert->key; return ssl_get_compressed_cert(ssl, cpk, alg, data, orig_len); #else return 0; #endif } size_t SSL_CTX_get1_compressed_cert(SSL_CTX *ctx, int alg, unsigned char **data, size_t *orig_len) { #ifndef OPENSSL_NO_COMP_ALG size_t ret; SSL *new = SSL_new(ctx); ret = ssl_get_compressed_cert(new, ctx->cert->key, alg, data, orig_len); SSL_free(new); return ret; #else return 0; #endif } int SSL_CTX_set1_compressed_cert(SSL_CTX *ctx, int algorithm, unsigned char *comp_data, size_t comp_length, size_t orig_length) { #ifndef OPENSSL_NO_COMP_ALG return ossl_set1_compressed_cert(ctx->cert, algorithm, comp_data, comp_length, orig_length); #else return 0; #endif } int SSL_set1_compressed_cert(SSL *ssl, int algorithm, unsigned char *comp_data, size_t comp_length, size_t orig_length) { #ifndef OPENSSL_NO_COMP_ALG SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL || !sc->server) return 0; return ossl_set1_compressed_cert(sc->cert, algorithm, comp_data, comp_length, orig_length); #else return 0; #endif }
ssl
openssl/ssl/ssl_cert_comp.c
openssl
#include <stdio.h> #include "ssl_local.h" #include "record/record_local.h" #include "internal/ktls.h" #include "internal/cryptlib.h" #include <openssl/comp.h> #include <openssl/evp.h> #include <openssl/kdf.h> #include <openssl/rand.h> #include <openssl/obj_mac.h> #include <openssl/core_names.h> #include <openssl/trace.h> static int tls1_PRF(SSL_CONNECTION *s, const void *seed1, size_t seed1_len, const void *seed2, size_t seed2_len, const void *seed3, size_t seed3_len, const void *seed4, size_t seed4_len, const void *seed5, size_t seed5_len, const unsigned char *sec, size_t slen, unsigned char *out, size_t olen, int fatal) { const EVP_MD *md = ssl_prf_md(s); EVP_KDF *kdf; EVP_KDF_CTX *kctx = NULL; OSSL_PARAM params[8], *p = params; const char *mdname; if (md == NULL) { if (fatal) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); else ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } kdf = EVP_KDF_fetch(SSL_CONNECTION_GET_CTX(s)->libctx, OSSL_KDF_NAME_TLS1_PRF, SSL_CONNECTION_GET_CTX(s)->propq); if (kdf == NULL) goto err; kctx = EVP_KDF_CTX_new(kdf); EVP_KDF_free(kdf); if (kctx == NULL) goto err; mdname = EVP_MD_get0_name(md); *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST, (char *)mdname, 0); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SECRET, (unsigned char *)sec, (size_t)slen); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED, (void *)seed1, (size_t)seed1_len); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED, (void *)seed2, (size_t)seed2_len); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED, (void *)seed3, (size_t)seed3_len); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED, (void *)seed4, (size_t)seed4_len); *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED, (void *)seed5, (size_t)seed5_len); *p = OSSL_PARAM_construct_end(); if (EVP_KDF_derive(kctx, out, olen, params)) { EVP_KDF_CTX_free(kctx); return 1; } err: if (fatal) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); else ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); EVP_KDF_CTX_free(kctx); return 0; } static int tls1_generate_key_block(SSL_CONNECTION *s, unsigned char *km, size_t num) { int ret; ret = tls1_PRF(s, TLS_MD_KEY_EXPANSION_CONST, TLS_MD_KEY_EXPANSION_CONST_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, NULL, 0, NULL, 0, s->session->master_key, s->session->master_key_length, km, num, 1); return ret; } static int tls_iv_length_within_key_block(const EVP_CIPHER *c) { if (EVP_CIPHER_get_mode(c) == EVP_CIPH_GCM_MODE) return EVP_GCM_TLS_FIXED_IV_LEN; else if (EVP_CIPHER_get_mode(c) == EVP_CIPH_CCM_MODE) return EVP_CCM_TLS_FIXED_IV_LEN; else return EVP_CIPHER_get_iv_length(c); } int tls1_change_cipher_state(SSL_CONNECTION *s, int which) { unsigned char *p, *mac_secret; unsigned char *key, *iv; const EVP_CIPHER *c; const SSL_COMP *comp = NULL; const EVP_MD *m; int mac_type; size_t mac_secret_size; size_t n, i, j, k, cl; int iivlen; size_t taglen = 0; int direction; c = s->s3.tmp.new_sym_enc; m = s->s3.tmp.new_hash; mac_type = s->s3.tmp.new_mac_pkey_type; #ifndef OPENSSL_NO_COMP comp = s->s3.tmp.new_compression; #endif p = s->s3.tmp.key_block; i = mac_secret_size = s->s3.tmp.new_mac_secret_size; cl = EVP_CIPHER_get_key_length(c); j = cl; iivlen = tls_iv_length_within_key_block(c); if (iivlen < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } k = iivlen; if ((which == SSL3_CHANGE_CIPHER_CLIENT_WRITE) || (which == SSL3_CHANGE_CIPHER_SERVER_READ)) { mac_secret = &(p[0]); n = i + i; key = &(p[n]); n += j + j; iv = &(p[n]); n += k + k; } else { n = i; mac_secret = &(p[n]); n += i + j; key = &(p[n]); n += j + k; iv = &(p[n]); n += k; } if (n > s->s3.tmp.key_block_length) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } switch (EVP_CIPHER_get_mode(c)) { case EVP_CIPH_GCM_MODE: taglen = EVP_GCM_TLS_TAG_LEN; break; case EVP_CIPH_CCM_MODE: if ((s->s3.tmp.new_cipher->algorithm_enc & (SSL_AES128CCM8 | SSL_AES256CCM8)) != 0) taglen = EVP_CCM8_TLS_TAG_LEN; else taglen = EVP_CCM_TLS_TAG_LEN; break; default: if (EVP_CIPHER_is_a(c, "CHACHA20-POLY1305")) { taglen = EVP_CHACHAPOLY_TLS_TAG_LEN; } else { taglen = s->s3.tmp.new_mac_secret_size; } break; } if (which & SSL3_CC_READ) { if (s->ext.use_etm) s->s3.flags |= TLS1_FLAGS_ENCRYPT_THEN_MAC_READ; else s->s3.flags &= ~TLS1_FLAGS_ENCRYPT_THEN_MAC_READ; if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) s->mac_flags |= SSL_MAC_FLAG_READ_MAC_STREAM; else s->mac_flags &= ~SSL_MAC_FLAG_READ_MAC_STREAM; if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE) s->mac_flags |= SSL_MAC_FLAG_READ_MAC_TLSTREE; else s->mac_flags &= ~SSL_MAC_FLAG_READ_MAC_TLSTREE; direction = OSSL_RECORD_DIRECTION_READ; } else { if (s->ext.use_etm) s->s3.flags |= TLS1_FLAGS_ENCRYPT_THEN_MAC_WRITE; else s->s3.flags &= ~TLS1_FLAGS_ENCRYPT_THEN_MAC_WRITE; if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC) s->mac_flags |= SSL_MAC_FLAG_WRITE_MAC_STREAM; else s->mac_flags &= ~SSL_MAC_FLAG_WRITE_MAC_STREAM; if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE) s->mac_flags |= SSL_MAC_FLAG_WRITE_MAC_TLSTREE; else s->mac_flags &= ~SSL_MAC_FLAG_WRITE_MAC_TLSTREE; direction = OSSL_RECORD_DIRECTION_WRITE; } if (SSL_CONNECTION_IS_DTLS(s)) dtls1_increment_epoch(s, which); if (!ssl_set_new_record_layer(s, s->version, direction, OSSL_RECORD_PROTECTION_LEVEL_APPLICATION, NULL, 0, key, cl, iv, (size_t)k, mac_secret, mac_secret_size, c, taglen, mac_type, m, comp, NULL)) { goto err; } OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "which = %04X, key:\n", which); BIO_dump_indent(trc_out, key, EVP_CIPHER_get_key_length(c), 4); BIO_printf(trc_out, "iv:\n"); BIO_dump_indent(trc_out, iv, k, 4); } OSSL_TRACE_END(TLS); return 1; err: return 0; } int tls1_setup_key_block(SSL_CONNECTION *s) { unsigned char *p; const EVP_CIPHER *c; const EVP_MD *hash; SSL_COMP *comp; int mac_type = NID_undef; size_t num, mac_secret_size = 0; int ret = 0; int ivlen; if (s->s3.tmp.key_block_length != 0) return 1; if (!ssl_cipher_get_evp(SSL_CONNECTION_GET_CTX(s), s->session, &c, &hash, &mac_type, &mac_secret_size, &comp, s->ext.use_etm)) { SSLfatal_alert(s, SSL_AD_INTERNAL_ERROR); return 0; } ssl_evp_cipher_free(s->s3.tmp.new_sym_enc); s->s3.tmp.new_sym_enc = c; ssl_evp_md_free(s->s3.tmp.new_hash); s->s3.tmp.new_hash = hash; s->s3.tmp.new_mac_pkey_type = mac_type; s->s3.tmp.new_mac_secret_size = mac_secret_size; ivlen = tls_iv_length_within_key_block(c); if (ivlen < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } num = mac_secret_size + EVP_CIPHER_get_key_length(c) + ivlen; num *= 2; ssl3_cleanup_key_block(s); if ((p = OPENSSL_malloc(num)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } s->s3.tmp.key_block_length = num; s->s3.tmp.key_block = p; OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "key block length: %zu\n", num); BIO_printf(trc_out, "client random\n"); BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); BIO_printf(trc_out, "server random\n"); BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); BIO_printf(trc_out, "master key\n"); BIO_dump_indent(trc_out, s->session->master_key, s->session->master_key_length, 4); } OSSL_TRACE_END(TLS); if (!tls1_generate_key_block(s, p, num)) { goto err; } OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "key block\n"); BIO_dump_indent(trc_out, p, num, 4); } OSSL_TRACE_END(TLS); ret = 1; err: return ret; } size_t tls1_final_finish_mac(SSL_CONNECTION *s, const char *str, size_t slen, unsigned char *out) { size_t hashlen; unsigned char hash[EVP_MAX_MD_SIZE]; size_t finished_size = TLS1_FINISH_MAC_LENGTH; if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kGOST18) finished_size = 32; if (!ssl3_digest_cached_records(s, 0)) { return 0; } if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { return 0; } if (!tls1_PRF(s, str, slen, hash, hashlen, NULL, 0, NULL, 0, NULL, 0, s->session->master_key, s->session->master_key_length, out, finished_size, 1)) { return 0; } OPENSSL_cleanse(hash, hashlen); return finished_size; } int tls1_generate_master_secret(SSL_CONNECTION *s, unsigned char *out, unsigned char *p, size_t len, size_t *secret_size) { if (s->session->flags & SSL_SESS_FLAG_EXTMS) { unsigned char hash[EVP_MAX_MD_SIZE * 2]; size_t hashlen; if (!ssl3_digest_cached_records(s, 1) || !ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { return 0; } OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "Handshake hashes:\n"); BIO_dump(trc_out, (char *)hash, hashlen); } OSSL_TRACE_END(TLS); if (!tls1_PRF(s, TLS_MD_EXTENDED_MASTER_SECRET_CONST, TLS_MD_EXTENDED_MASTER_SECRET_CONST_SIZE, hash, hashlen, NULL, 0, NULL, 0, NULL, 0, p, len, out, SSL3_MASTER_SECRET_SIZE, 1)) { return 0; } OPENSSL_cleanse(hash, hashlen); } else { if (!tls1_PRF(s, TLS_MD_MASTER_SECRET_CONST, TLS_MD_MASTER_SECRET_CONST_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE, NULL, 0, s->s3.server_random, SSL3_RANDOM_SIZE, NULL, 0, p, len, out, SSL3_MASTER_SECRET_SIZE, 1)) { return 0; } } OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "Premaster Secret:\n"); BIO_dump_indent(trc_out, p, len, 4); BIO_printf(trc_out, "Client Random:\n"); BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4); BIO_printf(trc_out, "Server Random:\n"); BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4); BIO_printf(trc_out, "Master Secret:\n"); BIO_dump_indent(trc_out, s->session->master_key, SSL3_MASTER_SECRET_SIZE, 4); } OSSL_TRACE_END(TLS); *secret_size = SSL3_MASTER_SECRET_SIZE; return 1; } int tls1_export_keying_material(SSL_CONNECTION *s, unsigned char *out, size_t olen, const char *label, size_t llen, const unsigned char *context, size_t contextlen, int use_context) { unsigned char *val = NULL; size_t vallen = 0, currentvalpos; int rv = 0; if (contextlen > 0xffff) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } vallen = llen + SSL3_RANDOM_SIZE * 2; if (use_context) { vallen += 2 + contextlen; } val = OPENSSL_malloc(vallen); if (val == NULL) goto ret; currentvalpos = 0; memcpy(val + currentvalpos, (unsigned char *)label, llen); currentvalpos += llen; memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE); currentvalpos += SSL3_RANDOM_SIZE; memcpy(val + currentvalpos, s->s3.server_random, SSL3_RANDOM_SIZE); currentvalpos += SSL3_RANDOM_SIZE; if (use_context) { val[currentvalpos] = (contextlen >> 8) & 0xff; currentvalpos++; val[currentvalpos] = contextlen & 0xff; currentvalpos++; if ((contextlen > 0) || (context != NULL)) { memcpy(val + currentvalpos, context, contextlen); } } if (memcmp(val, TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE) == 0) goto err1; if (memcmp(val, TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE) == 0) goto err1; if (memcmp(val, TLS_MD_MASTER_SECRET_CONST, TLS_MD_MASTER_SECRET_CONST_SIZE) == 0) goto err1; if (memcmp(val, TLS_MD_EXTENDED_MASTER_SECRET_CONST, TLS_MD_EXTENDED_MASTER_SECRET_CONST_SIZE) == 0) goto err1; if (memcmp(val, TLS_MD_KEY_EXPANSION_CONST, TLS_MD_KEY_EXPANSION_CONST_SIZE) == 0) goto err1; rv = tls1_PRF(s, val, vallen, NULL, 0, NULL, 0, NULL, 0, NULL, 0, s->session->master_key, s->session->master_key_length, out, olen, 0); goto ret; err1: ERR_raise(ERR_LIB_SSL, SSL_R_TLS_ILLEGAL_EXPORTER_LABEL); ret: OPENSSL_clear_free(val, vallen); return rv; } int tls1_alert_code(int code) { switch (code) { case SSL_AD_CLOSE_NOTIFY: return SSL3_AD_CLOSE_NOTIFY; case SSL_AD_UNEXPECTED_MESSAGE: return SSL3_AD_UNEXPECTED_MESSAGE; case SSL_AD_BAD_RECORD_MAC: return SSL3_AD_BAD_RECORD_MAC; case SSL_AD_DECRYPTION_FAILED: return TLS1_AD_DECRYPTION_FAILED; case SSL_AD_RECORD_OVERFLOW: return TLS1_AD_RECORD_OVERFLOW; case SSL_AD_DECOMPRESSION_FAILURE: return SSL3_AD_DECOMPRESSION_FAILURE; case SSL_AD_HANDSHAKE_FAILURE: return SSL3_AD_HANDSHAKE_FAILURE; case SSL_AD_NO_CERTIFICATE: return -1; case SSL_AD_BAD_CERTIFICATE: return SSL3_AD_BAD_CERTIFICATE; case SSL_AD_UNSUPPORTED_CERTIFICATE: return SSL3_AD_UNSUPPORTED_CERTIFICATE; case SSL_AD_CERTIFICATE_REVOKED: return SSL3_AD_CERTIFICATE_REVOKED; case SSL_AD_CERTIFICATE_EXPIRED: return SSL3_AD_CERTIFICATE_EXPIRED; case SSL_AD_CERTIFICATE_UNKNOWN: return SSL3_AD_CERTIFICATE_UNKNOWN; case SSL_AD_ILLEGAL_PARAMETER: return SSL3_AD_ILLEGAL_PARAMETER; case SSL_AD_UNKNOWN_CA: return TLS1_AD_UNKNOWN_CA; case SSL_AD_ACCESS_DENIED: return TLS1_AD_ACCESS_DENIED; case SSL_AD_DECODE_ERROR: return TLS1_AD_DECODE_ERROR; case SSL_AD_DECRYPT_ERROR: return TLS1_AD_DECRYPT_ERROR; case SSL_AD_EXPORT_RESTRICTION: return TLS1_AD_EXPORT_RESTRICTION; case SSL_AD_PROTOCOL_VERSION: return TLS1_AD_PROTOCOL_VERSION; case SSL_AD_INSUFFICIENT_SECURITY: return TLS1_AD_INSUFFICIENT_SECURITY; case SSL_AD_INTERNAL_ERROR: return TLS1_AD_INTERNAL_ERROR; case SSL_AD_USER_CANCELLED: return TLS1_AD_USER_CANCELLED; case SSL_AD_NO_RENEGOTIATION: return TLS1_AD_NO_RENEGOTIATION; case SSL_AD_UNSUPPORTED_EXTENSION: return TLS1_AD_UNSUPPORTED_EXTENSION; case SSL_AD_CERTIFICATE_UNOBTAINABLE: return TLS1_AD_CERTIFICATE_UNOBTAINABLE; case SSL_AD_UNRECOGNIZED_NAME: return TLS1_AD_UNRECOGNIZED_NAME; case SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE: return TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE; case SSL_AD_BAD_CERTIFICATE_HASH_VALUE: return TLS1_AD_BAD_CERTIFICATE_HASH_VALUE; case SSL_AD_UNKNOWN_PSK_IDENTITY: return TLS1_AD_UNKNOWN_PSK_IDENTITY; case SSL_AD_INAPPROPRIATE_FALLBACK: return TLS1_AD_INAPPROPRIATE_FALLBACK; case SSL_AD_NO_APPLICATION_PROTOCOL: return TLS1_AD_NO_APPLICATION_PROTOCOL; case SSL_AD_CERTIFICATE_REQUIRED: return SSL_AD_HANDSHAKE_FAILURE; case TLS13_AD_MISSING_EXTENSION: return SSL_AD_HANDSHAKE_FAILURE; default: return -1; } }
ssl
openssl/ssl/t1_enc.c
openssl
#include <openssl/crypto.h> #include <openssl/err.h> #include <assert.h> #include "internal/priority_queue.h" #include "internal/safe_math.h" #include "internal/numbers.h" OSSL_SAFE_MATH_UNSIGNED(size_t, size_t) struct pq_heap_st { void *data; size_t index; }; struct pq_elem_st { size_t posn; #ifndef NDEBUG int used; #endif }; struct ossl_pqueue_st { struct pq_heap_st *heap; struct pq_elem_st *elements; int (*compare)(const void *, const void *); size_t htop; size_t hmax; size_t freelist; }; static const size_t min_nodes = 8; static const size_t max_nodes = SIZE_MAX / (sizeof(struct pq_heap_st) > sizeof(struct pq_elem_st) ? sizeof(struct pq_heap_st) : sizeof(struct pq_elem_st)); #ifndef NDEBUG # define ASSERT_USED(pq, idx) \ assert(pq->elements[pq->heap[idx].index].used); \ assert(pq->elements[pq->heap[idx].index].posn == idx) # define ASSERT_ELEM_USED(pq, elem) \ assert(pq->elements[elem].used) #else # define ASSERT_USED(pq, idx) # define ASSERT_ELEM_USED(pq, elem) #endif static ossl_inline size_t compute_pqueue_growth(size_t target, size_t current) { int err = 0; while (current < target) { if (current >= max_nodes) return 0; current = safe_muldiv_size_t(current, 8, 5, &err); if (err) return 0; if (current >= max_nodes) current = max_nodes; } return current; } static ossl_inline void pqueue_swap_elem(OSSL_PQUEUE *pq, size_t i, size_t j) { struct pq_heap_st *h = pq->heap, t_h; struct pq_elem_st *e = pq->elements; ASSERT_USED(pq, i); ASSERT_USED(pq, j); t_h = h[i]; h[i] = h[j]; h[j] = t_h; e[h[i].index].posn = i; e[h[j].index].posn = j; } static ossl_inline void pqueue_move_elem(OSSL_PQUEUE *pq, size_t from, size_t to) { struct pq_heap_st *h = pq->heap; struct pq_elem_st *e = pq->elements; ASSERT_USED(pq, from); h[to] = h[from]; e[h[to].index].posn = to; } static ossl_inline void pqueue_force_bottom(OSSL_PQUEUE *pq, size_t n) { ASSERT_USED(pq, n); while (n > 0) { const size_t p = (n - 1) / 2; ASSERT_USED(pq, p); pqueue_swap_elem(pq, n, p); n = p; } } static ossl_inline void pqueue_move_down(OSSL_PQUEUE *pq, size_t n) { struct pq_heap_st *h = pq->heap; ASSERT_USED(pq, n); while (n > 0) { const size_t p = (n - 1) / 2; ASSERT_USED(pq, p); if (pq->compare(h[n].data, h[p].data) >= 0) break; pqueue_swap_elem(pq, n, p); n = p; } } static ossl_inline void pqueue_move_up(OSSL_PQUEUE *pq, size_t n) { struct pq_heap_st *h = pq->heap; size_t p = n * 2 + 1; ASSERT_USED(pq, n); if (pq->htop > p + 1) { ASSERT_USED(pq, p); ASSERT_USED(pq, p + 1); if (pq->compare(h[p].data, h[p + 1].data) > 0) p++; } while (pq->htop > p && pq->compare(h[p].data, h[n].data) < 0) { ASSERT_USED(pq, p); pqueue_swap_elem(pq, n, p); n = p; p = n * 2 + 1; if (pq->htop > p + 1) { ASSERT_USED(pq, p + 1); if (pq->compare(h[p].data, h[p + 1].data) > 0) p++; } } } int ossl_pqueue_push(OSSL_PQUEUE *pq, void *data, size_t *elem) { size_t n, m; if (!ossl_pqueue_reserve(pq, 1)) return 0; n = pq->htop++; m = pq->freelist; pq->freelist = pq->elements[m].posn; pq->heap[n].data = data; pq->heap[n].index = m; pq->elements[m].posn = n; #ifndef NDEBUG pq->elements[m].used = 1; #endif pqueue_move_down(pq, n); if (elem != NULL) *elem = m; return 1; } void *ossl_pqueue_peek(const OSSL_PQUEUE *pq) { if (pq->htop > 0) { ASSERT_USED(pq, 0); return pq->heap->data; } return NULL; } void *ossl_pqueue_pop(OSSL_PQUEUE *pq) { void *res; size_t elem; if (pq == NULL || pq->htop == 0) return NULL; ASSERT_USED(pq, 0); res = pq->heap->data; elem = pq->heap->index; if (--pq->htop != 0) { pqueue_move_elem(pq, pq->htop, 0); pqueue_move_up(pq, 0); } pq->elements[elem].posn = pq->freelist; pq->freelist = elem; #ifndef NDEBUG pq->elements[elem].used = 0; #endif return res; } void *ossl_pqueue_remove(OSSL_PQUEUE *pq, size_t elem) { size_t n; if (pq == NULL || elem >= pq->hmax || pq->htop == 0) return 0; ASSERT_ELEM_USED(pq, elem); n = pq->elements[elem].posn; ASSERT_USED(pq, n); if (n == pq->htop - 1) { pq->elements[elem].posn = pq->freelist; pq->freelist = elem; #ifndef NDEBUG pq->elements[elem].used = 0; #endif return pq->heap[--pq->htop].data; } if (n > 0) pqueue_force_bottom(pq, n); return ossl_pqueue_pop(pq); } static void pqueue_add_freelist(OSSL_PQUEUE *pq, size_t from) { struct pq_elem_st *e = pq->elements; size_t i; #ifndef NDEBUG for (i = from; i < pq->hmax; i++) e[i].used = 0; #endif e[from].posn = pq->freelist; for (i = from + 1; i < pq->hmax; i++) e[i].posn = i - 1; pq->freelist = pq->hmax - 1; } int ossl_pqueue_reserve(OSSL_PQUEUE *pq, size_t n) { size_t new_max, cur_max; struct pq_heap_st *h; struct pq_elem_st *e; if (pq == NULL) return 0; cur_max = pq->hmax; if (pq->htop + n < cur_max) return 1; new_max = compute_pqueue_growth(n + cur_max, cur_max); if (new_max == 0) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } h = OPENSSL_realloc(pq->heap, new_max * sizeof(*pq->heap)); if (h == NULL) return 0; pq->heap = h; e = OPENSSL_realloc(pq->elements, new_max * sizeof(*pq->elements)); if (e == NULL) return 0; pq->elements = e; pq->hmax = new_max; pqueue_add_freelist(pq, cur_max); return 1; } OSSL_PQUEUE *ossl_pqueue_new(int (*compare)(const void *, const void *)) { OSSL_PQUEUE *pq; if (compare == NULL) return NULL; pq = OPENSSL_malloc(sizeof(*pq)); if (pq == NULL) return NULL; pq->compare = compare; pq->hmax = min_nodes; pq->htop = 0; pq->freelist = 0; pq->heap = OPENSSL_malloc(sizeof(*pq->heap) * min_nodes); pq->elements = OPENSSL_malloc(sizeof(*pq->elements) * min_nodes); if (pq->heap == NULL || pq->elements == NULL) { ossl_pqueue_free(pq); return NULL; } pqueue_add_freelist(pq, 0); return pq; } void ossl_pqueue_free(OSSL_PQUEUE *pq) { if (pq != NULL) { OPENSSL_free(pq->heap); OPENSSL_free(pq->elements); OPENSSL_free(pq); } } void ossl_pqueue_pop_free(OSSL_PQUEUE *pq, void (*freefunc)(void *)) { size_t i; if (pq != NULL) { for (i = 0; i < pq->htop; i++) (*freefunc)(pq->heap[i].data); ossl_pqueue_free(pq); } } size_t ossl_pqueue_num(const OSSL_PQUEUE *pq) { return pq != NULL ? pq->htop : 0; }
ssl
openssl/ssl/priority_queue.c
openssl
#include "ssl_local.h" int dtls1_write_app_data_bytes(SSL *s, uint8_t type, const void *buf_, size_t len, size_t *written) { int i; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s); if (sc == NULL) return -1; if (SSL_in_init(s) && !ossl_statem_get_in_handshake(sc)) { i = sc->handshake_func(s); if (i < 0) return i; if (i == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_HANDSHAKE_FAILURE); return -1; } } if (len > SSL3_RT_MAX_PLAIN_LENGTH) { ERR_raise(ERR_LIB_SSL, SSL_R_DTLS_MESSAGE_TOO_BIG); return -1; } return dtls1_write_bytes(sc, type, buf_, len, written); } int dtls1_dispatch_alert(SSL *ssl) { int i, j; void (*cb) (const SSL *ssl, int type, int val) = NULL; unsigned char buf[DTLS1_AL_HEADER_LENGTH]; unsigned char *ptr = &buf[0]; size_t written; SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); if (s == NULL) return 0; s->s3.alert_dispatch = SSL_ALERT_DISPATCH_NONE; memset(buf, 0, sizeof(buf)); *ptr++ = s->s3.send_alert[0]; *ptr++ = s->s3.send_alert[1]; i = do_dtls1_write(s, SSL3_RT_ALERT, &buf[0], sizeof(buf), &written); if (i <= 0) { s->s3.alert_dispatch = 1; } else { (void)BIO_flush(s->wbio); if (s->msg_callback) s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3.send_alert, 2, ssl, s->msg_callback_arg); if (s->info_callback != NULL) cb = s->info_callback; else if (ssl->ctx->info_callback != NULL) cb = ssl->ctx->info_callback; if (cb != NULL) { j = (s->s3.send_alert[0] << 8) | s->s3.send_alert[1]; cb(ssl, SSL_CB_WRITE_ALERT, j); } } return i; }
ssl
openssl/ssl/d1_msg.c
openssl
#include <stdlib.h> #include "internal/event_queue.h" #include "ssl_local.h" struct ossl_event_queue_st { PRIORITY_QUEUE_OF(OSSL_EVENT) *timed_events; PRIORITY_QUEUE_OF(OSSL_EVENT) *now_events; }; static int event_compare_times(const OSSL_EVENT *a, const OSSL_EVENT *b) { return ossl_time_compare(a->when, b->when); } static int event_compare_priority(const OSSL_EVENT *a, const OSSL_EVENT *b) { if (a->priority > b->priority) return -1; if (a->priority < b->priority) return 1; return 0; } OSSL_EVENT_QUEUE *ossl_event_queue_new(void) { OSSL_EVENT_QUEUE *r = OPENSSL_malloc(sizeof(*r)); if (r != NULL) { r->timed_events = ossl_pqueue_OSSL_EVENT_new(&event_compare_times); r->now_events = ossl_pqueue_OSSL_EVENT_new(&event_compare_priority); if (r->timed_events == NULL || r->now_events == NULL) { ossl_event_queue_free(r); return NULL; } } return r; } void ossl_event_free(OSSL_EVENT *event) { if (event != NULL) { if (event->flag_dynamic) OPENSSL_free(event); else event->queue = NULL; } } static void event_queue_free(PRIORITY_QUEUE_OF(OSSL_EVENT) *queue) { OSSL_EVENT *e; if (queue != NULL) { while ((e = ossl_pqueue_OSSL_EVENT_pop(queue)) != NULL) ossl_event_free(e); ossl_pqueue_OSSL_EVENT_free(queue); } } void ossl_event_queue_free(OSSL_EVENT_QUEUE *queue) { if (queue != NULL) { event_queue_free(queue->now_events); event_queue_free(queue->timed_events); OPENSSL_free(queue); } } static ossl_inline int event_queue_add(OSSL_EVENT_QUEUE *queue, OSSL_EVENT *event) { PRIORITY_QUEUE_OF(OSSL_EVENT) *pq = ossl_time_compare(event->when, ossl_time_now()) <= 0 ? queue->now_events : queue->timed_events; if (ossl_pqueue_OSSL_EVENT_push(pq, event, &event->ref)) { event->queue = pq; return 1; } return 0; } static ossl_inline void ossl_event_set(OSSL_EVENT *event, uint32_t type, uint32_t priority, OSSL_TIME when, void *ctx, void *payload, size_t payload_size) { event->type = type; event->priority = priority; event->when = when; event->ctx = ctx; event->payload = payload; event->payload_size = payload_size; } OSSL_EVENT *ossl_event_queue_add_new(OSSL_EVENT_QUEUE *queue, uint32_t type, uint32_t priority, OSSL_TIME when, void *ctx, void *payload, size_t payload_size) { OSSL_EVENT *e = OPENSSL_malloc(sizeof(*e)); if (e == NULL || queue == NULL) { OPENSSL_free(e); return NULL; } ossl_event_set(e, type, priority, when, ctx, payload, payload_size); e->flag_dynamic = 1; if (event_queue_add(queue, e)) return e; OPENSSL_free(e); return NULL; } int ossl_event_queue_add(OSSL_EVENT_QUEUE *queue, OSSL_EVENT *event, uint32_t type, uint32_t priority, OSSL_TIME when, void *ctx, void *payload, size_t payload_size) { if (event == NULL || queue == NULL) return 0; ossl_event_set(event, type, priority, when, ctx, payload, payload_size); event->flag_dynamic = 0; return event_queue_add(queue, event); } int ossl_event_queue_remove(OSSL_EVENT_QUEUE *queue, OSSL_EVENT *event) { if (event != NULL && event->queue != NULL) { ossl_pqueue_OSSL_EVENT_remove(event->queue, event->ref); event->queue = NULL; } return 1; } OSSL_TIME ossl_event_time_until(const OSSL_EVENT *event) { if (event == NULL) return ossl_time_infinite(); return ossl_time_subtract(event->when, ossl_time_now()); } OSSL_TIME ossl_event_queue_time_until_next(const OSSL_EVENT_QUEUE *queue) { if (queue == NULL) return ossl_time_infinite(); if (ossl_pqueue_OSSL_EVENT_num(queue->now_events) > 0) return ossl_time_zero(); return ossl_event_time_until(ossl_pqueue_OSSL_EVENT_peek(queue->timed_events)); } int ossl_event_queue_postpone_until(OSSL_EVENT_QUEUE *queue, OSSL_EVENT *event, OSSL_TIME when) { if (ossl_event_queue_remove(queue, event)) { event->when = when; return event_queue_add(queue, event); } return 0; } int ossl_event_queue_get1_next_event(OSSL_EVENT_QUEUE *queue, OSSL_EVENT **event) { OSSL_TIME now = ossl_time_now(); OSSL_EVENT *e; while ((e = ossl_pqueue_OSSL_EVENT_peek(queue->timed_events)) != NULL && ossl_time_compare(e->when, now) <= 0) { e = ossl_pqueue_OSSL_EVENT_pop(queue->timed_events); if (!ossl_pqueue_OSSL_EVENT_push(queue->now_events, e, &e->ref)) { e->queue = NULL; return 0; } } *event = ossl_pqueue_OSSL_EVENT_pop(queue->now_events); return 1; }
ssl
openssl/ssl/event_queue.c
openssl
#include <stdio.h> #include <openssl/buffer.h> #include "ssl_local.h" #ifndef OPENSSL_NO_STDIO int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *x) { BIO *b; int ret; if ((b = BIO_new(BIO_s_file())) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); return 0; } BIO_set_fp(b, fp, BIO_NOCLOSE); ret = SSL_SESSION_print(b, x); BIO_free(b); return ret; } #endif int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x) { size_t i; const char *s; int istls13; if (x == NULL) goto err; istls13 = (x->ssl_version == TLS1_3_VERSION); if (BIO_puts(bp, "SSL-Session:\n") <= 0) goto err; s = ssl_protocol_to_string(x->ssl_version); if (BIO_printf(bp, " Protocol : %s\n", s) <= 0) goto err; if (x->cipher == NULL) { if (((x->cipher_id) & 0xff000000) == 0x02000000) { if (BIO_printf(bp, " Cipher : %06lX\n", x->cipher_id & 0xffffff) <= 0) goto err; } else { if (BIO_printf(bp, " Cipher : %04lX\n", x->cipher_id & 0xffff) <= 0) goto err; } } else { if (BIO_printf(bp, " Cipher : %s\n", ((x->cipher->name == NULL) ? "unknown" : x->cipher->name)) <= 0) goto err; } if (BIO_puts(bp, " Session-ID: ") <= 0) goto err; for (i = 0; i < x->session_id_length; i++) { if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) goto err; } if (BIO_puts(bp, "\n Session-ID-ctx: ") <= 0) goto err; for (i = 0; i < x->sid_ctx_length; i++) { if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0) goto err; } if (istls13) { if (BIO_puts(bp, "\n Resumption PSK: ") <= 0) goto err; } else if (BIO_puts(bp, "\n Master-Key: ") <= 0) goto err; for (i = 0; i < x->master_key_length; i++) { if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) goto err; } #ifndef OPENSSL_NO_PSK if (BIO_puts(bp, "\n PSK identity: ") <= 0) goto err; if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0) goto err; if (BIO_puts(bp, "\n PSK identity hint: ") <= 0) goto err; if (BIO_printf (bp, "%s", x->psk_identity_hint ? x->psk_identity_hint : "None") <= 0) goto err; #endif #ifndef OPENSSL_NO_SRP if (BIO_puts(bp, "\n SRP username: ") <= 0) goto err; if (BIO_printf(bp, "%s", x->srp_username ? x->srp_username : "None") <= 0) goto err; #endif if (x->ext.tick_lifetime_hint) { if (BIO_printf(bp, "\n TLS session ticket lifetime hint: %ld (seconds)", x->ext.tick_lifetime_hint) <= 0) goto err; } if (x->ext.tick) { if (BIO_puts(bp, "\n TLS session ticket:\n") <= 0) goto err; if (BIO_dump_indent (bp, (const char *)x->ext.tick, (int)x->ext.ticklen, 4) <= 0) goto err; } #ifndef OPENSSL_NO_COMP if (x->compress_meth != 0) { SSL_COMP *comp = NULL; if (!ssl_cipher_get_evp(NULL, x, NULL, NULL, NULL, NULL, &comp, 0)) goto err; if (comp == NULL) { if (BIO_printf(bp, "\n Compression: %d", x->compress_meth) <= 0) goto err; } else { if (BIO_printf(bp, "\n Compression: %d (%s)", comp->id, comp->name) <= 0) goto err; } } #endif if (!ossl_time_is_zero(x->time)) { if (BIO_printf(bp, "\n Start Time: %lld", (long long)ossl_time_to_time_t(x->time)) <= 0) goto err; } if (!ossl_time_is_zero(x->timeout)) { if (BIO_printf(bp, "\n Timeout : %lld (sec)", (long long)ossl_time2seconds(x->timeout)) <= 0) goto err; } if (BIO_puts(bp, "\n") <= 0) goto err; if (BIO_puts(bp, " Verify return code: ") <= 0) goto err; if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, X509_verify_cert_error_string(x->verify_result)) <= 0) goto err; if (BIO_printf(bp, " Extended master secret: %s\n", x->flags & SSL_SESS_FLAG_EXTMS ? "yes" : "no") <= 0) goto err; if (istls13) { if (BIO_printf(bp, " Max Early Data: %u\n", (unsigned int)x->ext.max_early_data) <= 0) goto err; } return 1; err: return 0; } int SSL_SESSION_print_keylog(BIO *bp, const SSL_SESSION *x) { size_t i; if (x == NULL) goto err; if (x->session_id_length == 0 || x->master_key_length == 0) goto err; if (BIO_puts(bp, "RSA ") <= 0) goto err; if (BIO_puts(bp, "Session-ID:") <= 0) goto err; for (i = 0; i < x->session_id_length; i++) { if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) goto err; } if (BIO_puts(bp, " Master-Key:") <= 0) goto err; for (i = 0; i < x->master_key_length; i++) { if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) goto err; } if (BIO_puts(bp, "\n") <= 0) goto err; return 1; err: return 0; }
ssl
openssl/ssl/ssl_txt.c
openssl
#include "internal/e_os.h" #include "internal/err.h" #include <openssl/crypto.h> #include <openssl/evp.h> #include <openssl/trace.h> #include "ssl_local.h" #include "sslerr.h" #include "internal/thread_once.h" static int stopped; static void ssl_library_stop(void); static CRYPTO_ONCE ssl_base = CRYPTO_ONCE_STATIC_INIT; static int ssl_base_inited = 0; DEFINE_RUN_ONCE_STATIC(ossl_init_ssl_base) { #ifndef OPENSSL_NO_COMP OSSL_TRACE(INIT, "ossl_init_ssl_base: " "SSL_COMP_get_compression_methods()\n"); SSL_COMP_get_compression_methods(); #endif ssl_sort_cipher_list(); OSSL_TRACE(INIT, "ossl_init_ssl_base: SSL_add_ssl_module()\n"); OPENSSL_atexit(ssl_library_stop); ssl_base_inited = 1; return 1; } static CRYPTO_ONCE ssl_strings = CRYPTO_ONCE_STATIC_INIT; DEFINE_RUN_ONCE_STATIC(ossl_init_load_ssl_strings) { #if !defined(OPENSSL_NO_ERR) && !defined(OPENSSL_NO_AUTOERRINIT) OSSL_TRACE(INIT, "ossl_init_load_ssl_strings: ossl_err_load_SSL_strings()\n"); ossl_err_load_SSL_strings(); #endif return 1; } DEFINE_RUN_ONCE_STATIC_ALT(ossl_init_no_load_ssl_strings, ossl_init_load_ssl_strings) { return 1; } static void ssl_library_stop(void) { if (stopped) return; stopped = 1; if (ssl_base_inited) { #ifndef OPENSSL_NO_COMP OSSL_TRACE(INIT, "ssl_library_stop: " "ssl_comp_free_compression_methods_int()\n"); ssl_comp_free_compression_methods_int(); #endif } } int OPENSSL_init_ssl(uint64_t opts, const OPENSSL_INIT_SETTINGS *settings) { static int stoperrset = 0; if (stopped) { if (!stoperrset) { stoperrset = 1; ERR_raise(ERR_LIB_SSL, ERR_R_INIT_FAIL); } return 0; } opts |= OPENSSL_INIT_ADD_ALL_CIPHERS | OPENSSL_INIT_ADD_ALL_DIGESTS; #ifndef OPENSSL_NO_AUTOLOAD_CONFIG if ((opts & OPENSSL_INIT_NO_LOAD_CONFIG) == 0) opts |= OPENSSL_INIT_LOAD_CONFIG; #endif if (!OPENSSL_init_crypto(opts, settings)) return 0; if (!RUN_ONCE(&ssl_base, ossl_init_ssl_base)) return 0; if ((opts & OPENSSL_INIT_NO_LOAD_SSL_STRINGS) && !RUN_ONCE_ALT(&ssl_strings, ossl_init_no_load_ssl_strings, ossl_init_load_ssl_strings)) return 0; if ((opts & OPENSSL_INIT_LOAD_SSL_STRINGS) && !RUN_ONCE(&ssl_strings, ossl_init_load_ssl_strings)) return 0; return 1; }
ssl
openssl/ssl/ssl_init.c
openssl
#include <stdio.h> #include <sys/types.h> #include "internal/nelem.h" #include "internal/o_dir.h" #include <openssl/bio.h> #include <openssl/pem.h> #include <openssl/store.h> #include <openssl/x509v3.h> #include <openssl/dh.h> #include <openssl/bn.h> #include <openssl/crypto.h> #include "internal/refcount.h" #include "ssl_local.h" #include "ssl_cert_table.h" #include "internal/thread_once.h" #ifndef OPENSSL_NO_POSIX_IO # include <sys/stat.h> # ifdef _WIN32 # define stat _stat # endif # ifndef S_ISDIR # define S_ISDIR(a) (((a) & S_IFMT) == S_IFDIR) # endif #endif static int ssl_security_default_callback(const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid, void *other, void *ex); static CRYPTO_ONCE ssl_x509_store_ctx_once = CRYPTO_ONCE_STATIC_INIT; static volatile int ssl_x509_store_ctx_idx = -1; DEFINE_RUN_ONCE_STATIC(ssl_x509_store_ctx_init) { ssl_x509_store_ctx_idx = X509_STORE_CTX_get_ex_new_index(0, "SSL for verify callback", NULL, NULL, NULL); return ssl_x509_store_ctx_idx >= 0; } int SSL_get_ex_data_X509_STORE_CTX_idx(void) { if (!RUN_ONCE(&ssl_x509_store_ctx_once, ssl_x509_store_ctx_init)) return -1; return ssl_x509_store_ctx_idx; } CERT *ssl_cert_new(size_t ssl_pkey_num) { CERT *ret = NULL; if (!ossl_assert(ssl_pkey_num >= SSL_PKEY_NUM)) return NULL; ret = OPENSSL_zalloc(sizeof(*ret)); if (ret == NULL) return NULL; ret->ssl_pkey_num = ssl_pkey_num; ret->pkeys = OPENSSL_zalloc(ret->ssl_pkey_num * sizeof(CERT_PKEY)); if (ret->pkeys == NULL) { OPENSSL_free(ret); return NULL; } ret->key = &(ret->pkeys[SSL_PKEY_RSA]); ret->sec_cb = ssl_security_default_callback; ret->sec_level = OPENSSL_TLS_SECURITY_LEVEL; ret->sec_ex = NULL; if (!CRYPTO_NEW_REF(&ret->references, 1)) { OPENSSL_free(ret->pkeys); OPENSSL_free(ret); return NULL; } return ret; } CERT *ssl_cert_dup(CERT *cert) { CERT *ret = OPENSSL_zalloc(sizeof(*ret)); size_t i; #ifndef OPENSSL_NO_COMP_ALG int j; #endif if (ret == NULL) return NULL; ret->ssl_pkey_num = cert->ssl_pkey_num; ret->pkeys = OPENSSL_zalloc(ret->ssl_pkey_num * sizeof(CERT_PKEY)); if (ret->pkeys == NULL) { OPENSSL_free(ret); return NULL; } ret->key = &ret->pkeys[cert->key - cert->pkeys]; if (!CRYPTO_NEW_REF(&ret->references, 1)) { OPENSSL_free(ret->pkeys); OPENSSL_free(ret); return NULL; } if (cert->dh_tmp != NULL) { ret->dh_tmp = cert->dh_tmp; EVP_PKEY_up_ref(ret->dh_tmp); } ret->dh_tmp_cb = cert->dh_tmp_cb; ret->dh_tmp_auto = cert->dh_tmp_auto; for (i = 0; i < ret->ssl_pkey_num; i++) { CERT_PKEY *cpk = cert->pkeys + i; CERT_PKEY *rpk = ret->pkeys + i; if (cpk->x509 != NULL) { rpk->x509 = cpk->x509; X509_up_ref(rpk->x509); } if (cpk->privatekey != NULL) { rpk->privatekey = cpk->privatekey; EVP_PKEY_up_ref(cpk->privatekey); } if (cpk->chain) { rpk->chain = X509_chain_up_ref(cpk->chain); if (!rpk->chain) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } } if (cpk->serverinfo != NULL) { rpk->serverinfo = OPENSSL_memdup(cpk->serverinfo, cpk->serverinfo_length); if (rpk->serverinfo == NULL) goto err; rpk->serverinfo_length = cpk->serverinfo_length; } #ifndef OPENSSL_NO_COMP_ALG for (j = TLSEXT_comp_cert_none; j < TLSEXT_comp_cert_limit; j++) { if (cpk->comp_cert[j] != NULL) { if (!OSSL_COMP_CERT_up_ref(cpk->comp_cert[j])) goto err; rpk->comp_cert[j] = cpk->comp_cert[j]; } } #endif } if (cert->conf_sigalgs) { ret->conf_sigalgs = OPENSSL_malloc(cert->conf_sigalgslen * sizeof(*cert->conf_sigalgs)); if (ret->conf_sigalgs == NULL) goto err; memcpy(ret->conf_sigalgs, cert->conf_sigalgs, cert->conf_sigalgslen * sizeof(*cert->conf_sigalgs)); ret->conf_sigalgslen = cert->conf_sigalgslen; } else ret->conf_sigalgs = NULL; if (cert->client_sigalgs) { ret->client_sigalgs = OPENSSL_malloc(cert->client_sigalgslen * sizeof(*cert->client_sigalgs)); if (ret->client_sigalgs == NULL) goto err; memcpy(ret->client_sigalgs, cert->client_sigalgs, cert->client_sigalgslen * sizeof(*cert->client_sigalgs)); ret->client_sigalgslen = cert->client_sigalgslen; } else ret->client_sigalgs = NULL; if (cert->ctype) { ret->ctype = OPENSSL_memdup(cert->ctype, cert->ctype_len); if (ret->ctype == NULL) goto err; ret->ctype_len = cert->ctype_len; } ret->cert_flags = cert->cert_flags; ret->cert_cb = cert->cert_cb; ret->cert_cb_arg = cert->cert_cb_arg; if (cert->verify_store) { X509_STORE_up_ref(cert->verify_store); ret->verify_store = cert->verify_store; } if (cert->chain_store) { X509_STORE_up_ref(cert->chain_store); ret->chain_store = cert->chain_store; } ret->sec_cb = cert->sec_cb; ret->sec_level = cert->sec_level; ret->sec_ex = cert->sec_ex; if (!custom_exts_copy(&ret->custext, &cert->custext)) goto err; #ifndef OPENSSL_NO_PSK if (cert->psk_identity_hint) { ret->psk_identity_hint = OPENSSL_strdup(cert->psk_identity_hint); if (ret->psk_identity_hint == NULL) goto err; } #endif return ret; err: ssl_cert_free(ret); return NULL; } void ssl_cert_clear_certs(CERT *c) { size_t i; #ifndef OPENSSL_NO_COMP_ALG int j; #endif if (c == NULL) return; for (i = 0; i < c->ssl_pkey_num; i++) { CERT_PKEY *cpk = c->pkeys + i; X509_free(cpk->x509); cpk->x509 = NULL; EVP_PKEY_free(cpk->privatekey); cpk->privatekey = NULL; OSSL_STACK_OF_X509_free(cpk->chain); cpk->chain = NULL; OPENSSL_free(cpk->serverinfo); cpk->serverinfo = NULL; cpk->serverinfo_length = 0; #ifndef OPENSSL_NO_COMP_ALG for (j = 0; j < TLSEXT_comp_cert_limit; j++) { OSSL_COMP_CERT_free(cpk->comp_cert[j]); cpk->comp_cert[j] = NULL; cpk->cert_comp_used = 0; } #endif } } void ssl_cert_free(CERT *c) { int i; if (c == NULL) return; CRYPTO_DOWN_REF(&c->references, &i); REF_PRINT_COUNT("CERT", c); if (i > 0) return; REF_ASSERT_ISNT(i < 0); EVP_PKEY_free(c->dh_tmp); ssl_cert_clear_certs(c); OPENSSL_free(c->conf_sigalgs); OPENSSL_free(c->client_sigalgs); OPENSSL_free(c->ctype); X509_STORE_free(c->verify_store); X509_STORE_free(c->chain_store); custom_exts_free(&c->custext); #ifndef OPENSSL_NO_PSK OPENSSL_free(c->psk_identity_hint); #endif OPENSSL_free(c->pkeys); CRYPTO_FREE_REF(&c->references); OPENSSL_free(c); } int ssl_cert_set0_chain(SSL_CONNECTION *s, SSL_CTX *ctx, STACK_OF(X509) *chain) { int i, r; CERT_PKEY *cpk = s != NULL ? s->cert->key : ctx->cert->key; if (!cpk) return 0; for (i = 0; i < sk_X509_num(chain); i++) { X509 *x = sk_X509_value(chain, i); r = ssl_security_cert(s, ctx, x, 0, 0); if (r != 1) { ERR_raise(ERR_LIB_SSL, r); return 0; } } OSSL_STACK_OF_X509_free(cpk->chain); cpk->chain = chain; return 1; } int ssl_cert_set1_chain(SSL_CONNECTION *s, SSL_CTX *ctx, STACK_OF(X509) *chain) { STACK_OF(X509) *dchain; if (!chain) return ssl_cert_set0_chain(s, ctx, NULL); dchain = X509_chain_up_ref(chain); if (!dchain) return 0; if (!ssl_cert_set0_chain(s, ctx, dchain)) { OSSL_STACK_OF_X509_free(dchain); return 0; } return 1; } int ssl_cert_add0_chain_cert(SSL_CONNECTION *s, SSL_CTX *ctx, X509 *x) { int r; CERT_PKEY *cpk = s ? s->cert->key : ctx->cert->key; if (!cpk) return 0; r = ssl_security_cert(s, ctx, x, 0, 0); if (r != 1) { ERR_raise(ERR_LIB_SSL, r); return 0; } if (!cpk->chain) cpk->chain = sk_X509_new_null(); if (!cpk->chain || !sk_X509_push(cpk->chain, x)) return 0; return 1; } int ssl_cert_add1_chain_cert(SSL_CONNECTION *s, SSL_CTX *ctx, X509 *x) { if (!ssl_cert_add0_chain_cert(s, ctx, x)) return 0; X509_up_ref(x); return 1; } int ssl_cert_select_current(CERT *c, X509 *x) { size_t i; if (x == NULL) return 0; for (i = 0; i < c->ssl_pkey_num; i++) { CERT_PKEY *cpk = c->pkeys + i; if (cpk->x509 == x && cpk->privatekey) { c->key = cpk; return 1; } } for (i = 0; i < c->ssl_pkey_num; i++) { CERT_PKEY *cpk = c->pkeys + i; if (cpk->privatekey && cpk->x509 && !X509_cmp(cpk->x509, x)) { c->key = cpk; return 1; } } return 0; } int ssl_cert_set_current(CERT *c, long op) { size_t i, idx; if (!c) return 0; if (op == SSL_CERT_SET_FIRST) idx = 0; else if (op == SSL_CERT_SET_NEXT) { idx = (size_t)(c->key - c->pkeys + 1); if (idx >= c->ssl_pkey_num) return 0; } else return 0; for (i = idx; i < c->ssl_pkey_num; i++) { CERT_PKEY *cpk = c->pkeys + i; if (cpk->x509 && cpk->privatekey) { c->key = cpk; return 1; } } return 0; } void ssl_cert_set_cert_cb(CERT *c, int (*cb) (SSL *ssl, void *arg), void *arg) { c->cert_cb = cb; c->cert_cb_arg = arg; } static int ssl_verify_internal(SSL_CONNECTION *s, STACK_OF(X509) *sk, EVP_PKEY *rpk) { X509 *x; int i = 0; X509_STORE *verify_store; X509_STORE_CTX *ctx = NULL; X509_VERIFY_PARAM *param; SSL_CTX *sctx; if ((sk == NULL || sk_X509_num(sk) == 0) && rpk == NULL) return 0; if (sk != NULL && rpk != NULL) return 0; sctx = SSL_CONNECTION_GET_CTX(s); if (s->cert->verify_store) verify_store = s->cert->verify_store; else verify_store = sctx->cert_store; ctx = X509_STORE_CTX_new_ex(sctx->libctx, sctx->propq); if (ctx == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); return 0; } if (sk != NULL) { x = sk_X509_value(sk, 0); if (!X509_STORE_CTX_init(ctx, verify_store, x, sk)) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto end; } } else { if (!X509_STORE_CTX_init_rpk(ctx, verify_store, rpk)) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto end; } } param = X509_STORE_CTX_get0_param(ctx); X509_VERIFY_PARAM_set_auth_level(param, SSL_get_security_level(SSL_CONNECTION_GET_SSL(s))); X509_STORE_CTX_set_flags(ctx, tls1_suiteb(s)); if (!X509_STORE_CTX_set_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx(), s)) { goto end; } if (DANETLS_ENABLED(&s->dane)) X509_STORE_CTX_set0_dane(ctx, &s->dane); X509_STORE_CTX_set_default(ctx, s->server ? "ssl_client" : "ssl_server"); X509_VERIFY_PARAM_set1(param, s->param); if (s->verify_callback) X509_STORE_CTX_set_verify_cb(ctx, s->verify_callback); if (sctx->app_verify_callback != NULL) { i = sctx->app_verify_callback(ctx, sctx->app_verify_arg); } else { i = X509_verify_cert(ctx); if (i < 0) i = 0; } s->verify_result = X509_STORE_CTX_get_error(ctx); OSSL_STACK_OF_X509_free(s->verified_chain); s->verified_chain = NULL; if (sk != NULL && X509_STORE_CTX_get0_chain(ctx) != NULL) { s->verified_chain = X509_STORE_CTX_get1_chain(ctx); if (s->verified_chain == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); i = 0; } } X509_VERIFY_PARAM_move_peername(s->param, param); end: X509_STORE_CTX_free(ctx); return i; } int ssl_verify_rpk(SSL_CONNECTION *s, EVP_PKEY *rpk) { return ssl_verify_internal(s, NULL, rpk); } int ssl_verify_cert_chain(SSL_CONNECTION *s, STACK_OF(X509) *sk) { return ssl_verify_internal(s, sk, NULL); } static void set0_CA_list(STACK_OF(X509_NAME) **ca_list, STACK_OF(X509_NAME) *name_list) { sk_X509_NAME_pop_free(*ca_list, X509_NAME_free); *ca_list = name_list; } STACK_OF(X509_NAME) *SSL_dup_CA_list(const STACK_OF(X509_NAME) *sk) { int i; const int num = sk_X509_NAME_num(sk); STACK_OF(X509_NAME) *ret; X509_NAME *name; ret = sk_X509_NAME_new_reserve(NULL, num); if (ret == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); return NULL; } for (i = 0; i < num; i++) { name = X509_NAME_dup(sk_X509_NAME_value(sk, i)); if (name == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); sk_X509_NAME_pop_free(ret, X509_NAME_free); return NULL; } sk_X509_NAME_push(ret, name); } return ret; } void SSL_set0_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; set0_CA_list(&sc->ca_names, name_list); } void SSL_CTX_set0_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) { set0_CA_list(&ctx->ca_names, name_list); } const STACK_OF(X509_NAME) *SSL_CTX_get0_CA_list(const SSL_CTX *ctx) { return ctx->ca_names; } const STACK_OF(X509_NAME) *SSL_get0_CA_list(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; return sc->ca_names != NULL ? sc->ca_names : s->ctx->ca_names; } void SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) { set0_CA_list(&ctx->client_ca_names, name_list); } STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(const SSL_CTX *ctx) { return ctx->client_ca_names; } void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return; set0_CA_list(&sc->client_ca_names, name_list); } const STACK_OF(X509_NAME) *SSL_get0_peer_CA_list(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; return sc->s3.tmp.peer_ca_names; } STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return NULL; if (!sc->server) return sc->s3.tmp.peer_ca_names; return sc->client_ca_names != NULL ? sc->client_ca_names : s->ctx->client_ca_names; } static int add_ca_name(STACK_OF(X509_NAME) **sk, const X509 *x) { X509_NAME *name; if (x == NULL) return 0; if (*sk == NULL && ((*sk = sk_X509_NAME_new_null()) == NULL)) return 0; if ((name = X509_NAME_dup(X509_get_subject_name(x))) == NULL) return 0; if (!sk_X509_NAME_push(*sk, name)) { X509_NAME_free(name); return 0; } return 1; } int SSL_add1_to_CA_list(SSL *ssl, const X509 *x) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; return add_ca_name(&sc->ca_names, x); } int SSL_CTX_add1_to_CA_list(SSL_CTX *ctx, const X509 *x) { return add_ca_name(&ctx->ca_names, x); } int SSL_add_client_CA(SSL *ssl, X509 *x) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; return add_ca_name(&sc->client_ca_names, x); } int SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x) { return add_ca_name(&ctx->client_ca_names, x); } static int xname_cmp(const X509_NAME *a, const X509_NAME *b) { unsigned char *abuf = NULL, *bbuf = NULL; int alen, blen, ret; alen = i2d_X509_NAME((X509_NAME *)a, &abuf); blen = i2d_X509_NAME((X509_NAME *)b, &bbuf); if (alen < 0 || blen < 0) ret = -2; else if (alen != blen) ret = alen - blen; else ret = memcmp(abuf, bbuf, alen); OPENSSL_free(abuf); OPENSSL_free(bbuf); return ret; } static int xname_sk_cmp(const X509_NAME *const *a, const X509_NAME *const *b) { return xname_cmp(*a, *b); } static unsigned long xname_hash(const X509_NAME *a) { return X509_NAME_hash_ex((X509_NAME *)a, NULL, NULL, NULL); } STACK_OF(X509_NAME) *SSL_load_client_CA_file_ex(const char *file, OSSL_LIB_CTX *libctx, const char *propq) { BIO *in = BIO_new(BIO_s_file()); X509 *x = NULL; X509_NAME *xn = NULL; STACK_OF(X509_NAME) *ret = NULL; LHASH_OF(X509_NAME) *name_hash = lh_X509_NAME_new(xname_hash, xname_cmp); OSSL_LIB_CTX *prev_libctx = NULL; if (name_hash == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BIO_LIB); goto err; } x = X509_new_ex(libctx, propq); if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } if (BIO_read_filename(in, file) <= 0) goto err; prev_libctx = OSSL_LIB_CTX_set0_default(libctx); for (;;) { if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) break; if (ret == NULL) { ret = sk_X509_NAME_new_null(); if (ret == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } } if ((xn = X509_get_subject_name(x)) == NULL) goto err; xn = X509_NAME_dup(xn); if (xn == NULL) goto err; if (lh_X509_NAME_retrieve(name_hash, xn) != NULL) { X509_NAME_free(xn); xn = NULL; } else { lh_X509_NAME_insert(name_hash, xn); if (!sk_X509_NAME_push(ret, xn)) goto err; } } goto done; err: X509_NAME_free(xn); sk_X509_NAME_pop_free(ret, X509_NAME_free); ret = NULL; done: OSSL_LIB_CTX_set0_default(prev_libctx); BIO_free(in); X509_free(x); lh_X509_NAME_free(name_hash); if (ret != NULL) ERR_clear_error(); return ret; } STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file) { return SSL_load_client_CA_file_ex(file, NULL, NULL); } int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, const char *file) { BIO *in; X509 *x = NULL; X509_NAME *xn = NULL; int ret = 1; int (*oldcmp) (const X509_NAME *const *a, const X509_NAME *const *b); oldcmp = sk_X509_NAME_set_cmp_func(stack, xname_sk_cmp); in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BIO_LIB); goto err; } if (BIO_read_filename(in, file) <= 0) goto err; for (;;) { if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) break; if ((xn = X509_get_subject_name(x)) == NULL) goto err; xn = X509_NAME_dup(xn); if (xn == NULL) goto err; if (sk_X509_NAME_find(stack, xn) >= 0) { X509_NAME_free(xn); } else if (!sk_X509_NAME_push(stack, xn)) { X509_NAME_free(xn); goto err; } } ERR_clear_error(); goto done; err: ret = 0; done: BIO_free(in); X509_free(x); (void)sk_X509_NAME_set_cmp_func(stack, oldcmp); return ret; } int SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, const char *dir) { OPENSSL_DIR_CTX *d = NULL; const char *filename; int ret = 0; while ((filename = OPENSSL_DIR_read(&d, dir))) { char buf[1024]; int r; #ifndef OPENSSL_NO_POSIX_IO struct stat st; #else if (strcmp(filename, ".") == 0 || strcmp(filename, "..") == 0) continue; #endif if (strlen(dir) + strlen(filename) + 2 > sizeof(buf)) { ERR_raise(ERR_LIB_SSL, SSL_R_PATH_TOO_LONG); goto err; } #ifdef OPENSSL_SYS_VMS r = BIO_snprintf(buf, sizeof(buf), "%s%s", dir, filename); #else r = BIO_snprintf(buf, sizeof(buf), "%s/%s", dir, filename); #endif #ifndef OPENSSL_NO_POSIX_IO if (!stat(buf, &st) && S_ISDIR(st.st_mode)) continue; #endif if (r <= 0 || r >= (int)sizeof(buf)) goto err; if (!SSL_add_file_cert_subjects_to_stack(stack, buf)) goto err; } if (errno) { ERR_raise_data(ERR_LIB_SYS, get_last_sys_error(), "calling OPENSSL_dir_read(%s)", dir); ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto err; } ret = 1; err: if (d) OPENSSL_DIR_end(&d); return ret; } static int add_uris_recursive(STACK_OF(X509_NAME) *stack, const char *uri, int depth) { int ok = 1; OSSL_STORE_CTX *ctx = NULL; X509 *x = NULL; X509_NAME *xn = NULL; if ((ctx = OSSL_STORE_open(uri, NULL, NULL, NULL, NULL)) == NULL) goto err; while (!OSSL_STORE_eof(ctx) && !OSSL_STORE_error(ctx)) { OSSL_STORE_INFO *info = OSSL_STORE_load(ctx); int infotype = info == 0 ? 0 : OSSL_STORE_INFO_get_type(info); if (info == NULL) continue; if (infotype == OSSL_STORE_INFO_NAME) { if (depth > 0) ok = add_uris_recursive(stack, OSSL_STORE_INFO_get0_NAME(info), depth - 1); } else if (infotype == OSSL_STORE_INFO_CERT) { if ((x = OSSL_STORE_INFO_get0_CERT(info)) == NULL || (xn = X509_get_subject_name(x)) == NULL || (xn = X509_NAME_dup(xn)) == NULL) goto err; if (sk_X509_NAME_find(stack, xn) >= 0) { X509_NAME_free(xn); } else if (!sk_X509_NAME_push(stack, xn)) { X509_NAME_free(xn); goto err; } } OSSL_STORE_INFO_free(info); } ERR_clear_error(); goto done; err: ok = 0; done: OSSL_STORE_close(ctx); return ok; } int SSL_add_store_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, const char *store) { int (*oldcmp) (const X509_NAME *const *a, const X509_NAME *const *b) = sk_X509_NAME_set_cmp_func(stack, xname_sk_cmp); int ret = add_uris_recursive(stack, store, 1); (void)sk_X509_NAME_set_cmp_func(stack, oldcmp); return ret; } int ssl_build_cert_chain(SSL_CONNECTION *s, SSL_CTX *ctx, int flags) { CERT *c = s != NULL ? s->cert : ctx->cert; CERT_PKEY *cpk = c->key; X509_STORE *chain_store = NULL; X509_STORE_CTX *xs_ctx = NULL; STACK_OF(X509) *chain = NULL, *untrusted = NULL; X509 *x; SSL_CTX *real_ctx = (s == NULL) ? ctx : SSL_CONNECTION_GET_CTX(s); int i, rv = 0; if (cpk->x509 == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_CERTIFICATE_SET); goto err; } if (flags & SSL_BUILD_CHAIN_FLAG_CHECK) { chain_store = X509_STORE_new(); if (chain_store == NULL) goto err; for (i = 0; i < sk_X509_num(cpk->chain); i++) { x = sk_X509_value(cpk->chain, i); if (!X509_STORE_add_cert(chain_store, x)) goto err; } if (!X509_STORE_add_cert(chain_store, cpk->x509)) goto err; } else { if (c->chain_store != NULL) chain_store = c->chain_store; else chain_store = real_ctx->cert_store; if (flags & SSL_BUILD_CHAIN_FLAG_UNTRUSTED) untrusted = cpk->chain; } xs_ctx = X509_STORE_CTX_new_ex(real_ctx->libctx, real_ctx->propq); if (xs_ctx == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } if (!X509_STORE_CTX_init(xs_ctx, chain_store, cpk->x509, untrusted)) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } X509_STORE_CTX_set_flags(xs_ctx, c->cert_flags & SSL_CERT_FLAG_SUITEB_128_LOS); i = X509_verify_cert(xs_ctx); if (i <= 0 && flags & SSL_BUILD_CHAIN_FLAG_IGNORE_ERROR) { if (flags & SSL_BUILD_CHAIN_FLAG_CLEAR_ERROR) ERR_clear_error(); i = 1; rv = 2; } if (i > 0) chain = X509_STORE_CTX_get1_chain(xs_ctx); if (i <= 0) { i = X509_STORE_CTX_get_error(xs_ctx); ERR_raise_data(ERR_LIB_SSL, SSL_R_CERTIFICATE_VERIFY_FAILED, "Verify error:%s", X509_verify_cert_error_string(i)); goto err; } x = sk_X509_shift(chain); X509_free(x); if (flags & SSL_BUILD_CHAIN_FLAG_NO_ROOT) { if (sk_X509_num(chain) > 0) { x = sk_X509_value(chain, sk_X509_num(chain) - 1); if (X509_get_extension_flags(x) & EXFLAG_SS) { x = sk_X509_pop(chain); X509_free(x); } } } for (i = 0; i < sk_X509_num(chain); i++) { x = sk_X509_value(chain, i); rv = ssl_security_cert(s, ctx, x, 0, 0); if (rv != 1) { ERR_raise(ERR_LIB_SSL, rv); OSSL_STACK_OF_X509_free(chain); rv = 0; goto err; } } OSSL_STACK_OF_X509_free(cpk->chain); cpk->chain = chain; if (rv == 0) rv = 1; err: if (flags & SSL_BUILD_CHAIN_FLAG_CHECK) X509_STORE_free(chain_store); X509_STORE_CTX_free(xs_ctx); return rv; } int ssl_cert_set_cert_store(CERT *c, X509_STORE *store, int chain, int ref) { X509_STORE **pstore; if (chain) pstore = &c->chain_store; else pstore = &c->verify_store; X509_STORE_free(*pstore); *pstore = store; if (ref && store) X509_STORE_up_ref(store); return 1; } int ssl_cert_get_cert_store(CERT *c, X509_STORE **pstore, int chain) { *pstore = (chain ? c->chain_store : c->verify_store); return 1; } int ssl_get_security_level_bits(const SSL *s, const SSL_CTX *ctx, int *levelp) { int level; static const int minbits_table[5 + 1] = { 0, 80, 112, 128, 192, 256 }; if (ctx != NULL) level = SSL_CTX_get_security_level(ctx); else level = SSL_get_security_level(s); if (level > 5) level = 5; else if (level < 0) level = 0; if (levelp != NULL) *levelp = level; return minbits_table[level]; } static int ssl_security_default_callback(const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid, void *other, void *ex) { int level, minbits, pfs_mask; const SSL_CONNECTION *sc; minbits = ssl_get_security_level_bits(s, ctx, &level); if (level == 0) { if (op == SSL_SECOP_TMP_DH && bits < 80) return 0; return 1; } switch (op) { case SSL_SECOP_CIPHER_SUPPORTED: case SSL_SECOP_CIPHER_SHARED: case SSL_SECOP_CIPHER_CHECK: { const SSL_CIPHER *c = other; if (bits < minbits) return 0; if (c->algorithm_auth & SSL_aNULL) return 0; if (c->algorithm_mac & SSL_MD5) return 0; if (minbits > 160 && c->algorithm_mac & SSL_SHA1) return 0; pfs_mask = SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK; if (level >= 3 && c->min_tls != TLS1_3_VERSION && !(c->algorithm_mkey & pfs_mask)) return 0; break; } case SSL_SECOP_VERSION: if ((sc = SSL_CONNECTION_FROM_CONST_SSL(s)) == NULL) return 0; if (!SSL_CONNECTION_IS_DTLS(sc)) { if (nid <= TLS1_1_VERSION && level > 0) return 0; } else { if (DTLS_VERSION_LT(nid, DTLS1_2_VERSION) && level > 0) return 0; } break; case SSL_SECOP_COMPRESSION: if (level >= 2) return 0; break; case SSL_SECOP_TICKET: if (level >= 3) return 0; break; default: if (bits < minbits) return 0; } return 1; } int ssl_security(const SSL_CONNECTION *s, int op, int bits, int nid, void *other) { return s->cert->sec_cb(SSL_CONNECTION_GET_SSL(s), NULL, op, bits, nid, other, s->cert->sec_ex); } int ssl_ctx_security(const SSL_CTX *ctx, int op, int bits, int nid, void *other) { return ctx->cert->sec_cb(NULL, ctx, op, bits, nid, other, ctx->cert->sec_ex); } int ssl_cert_lookup_by_nid(int nid, size_t *pidx, SSL_CTX *ctx) { size_t i; for (i = 0; i < OSSL_NELEM(ssl_cert_info); i++) { if (ssl_cert_info[i].nid == nid) { *pidx = i; return 1; } } for (i = 0; i < ctx->sigalg_list_len; i++) { if (ctx->ssl_cert_info[i].nid == nid) { *pidx = SSL_PKEY_NUM + i; return 1; } } return 0; } const SSL_CERT_LOOKUP *ssl_cert_lookup_by_pkey(const EVP_PKEY *pk, size_t *pidx, SSL_CTX *ctx) { size_t i; for (i = 0; i < OSSL_NELEM(ssl_cert_info); i++) { const SSL_CERT_LOOKUP *tmp_lu = &ssl_cert_info[i]; if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->nid)) || EVP_PKEY_is_a(pk, OBJ_nid2ln(tmp_lu->nid))) { if (pidx != NULL) *pidx = i; return tmp_lu; } } for (i = 0; ctx->sigalg_list_len; i++) { SSL_CERT_LOOKUP *tmp_lu = &(ctx->ssl_cert_info[i]); if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->nid)) || EVP_PKEY_is_a(pk, OBJ_nid2ln(tmp_lu->nid))) { if (pidx != NULL) *pidx = SSL_PKEY_NUM + i; return &ctx->ssl_cert_info[i]; } } return NULL; } const SSL_CERT_LOOKUP *ssl_cert_lookup_by_idx(size_t idx, SSL_CTX *ctx) { if (idx >= (OSSL_NELEM(ssl_cert_info) + ctx->sigalg_list_len)) return NULL; else if (idx >= (OSSL_NELEM(ssl_cert_info))) return &(ctx->ssl_cert_info[idx - SSL_PKEY_NUM]); return &ssl_cert_info[idx]; }
ssl
openssl/ssl/ssl_cert.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <openssl/err.h> #include <openssl/rsa.h> #include <openssl/ssl.h> int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) { EVP_PKEY *pkey; int ret; if (rsa == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } if ((pkey = EVP_PKEY_new()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } RSA_up_ref(rsa); if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { RSA_free(rsa); EVP_PKEY_free(pkey); return 0; } ret = SSL_use_PrivateKey(ssl, pkey); EVP_PKEY_free(pkey); return ret; } int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) { int j, ret = 0; BIO *in; RSA *rsa = NULL; in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(in, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } if (type == SSL_FILETYPE_ASN1) { j = ERR_R_ASN1_LIB; rsa = d2i_RSAPrivateKey_bio(in, NULL); } else if (type == SSL_FILETYPE_PEM) { j = ERR_R_PEM_LIB; rsa = PEM_read_bio_RSAPrivateKey(in, NULL, SSL_get_default_passwd_cb(ssl), SSL_get_default_passwd_cb_userdata(ssl)); } else { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE); goto end; } if (rsa == NULL) { ERR_raise(ERR_LIB_SSL, j); goto end; } ret = SSL_use_RSAPrivateKey(ssl, rsa); RSA_free(rsa); end: BIO_free(in); return ret; } int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const unsigned char *d, long len) { int ret; const unsigned char *p; RSA *rsa; p = d; if ((rsa = d2i_RSAPrivateKey(NULL, &p, (long)len)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } ret = SSL_use_RSAPrivateKey(ssl, rsa); RSA_free(rsa); return ret; } int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) { int ret; EVP_PKEY *pkey; if (rsa == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } if ((pkey = EVP_PKEY_new()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } RSA_up_ref(rsa); if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { RSA_free(rsa); EVP_PKEY_free(pkey); return 0; } ret = SSL_CTX_use_PrivateKey(ctx, pkey); EVP_PKEY_free(pkey); return ret; } int SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type) { int j, ret = 0; BIO *in; RSA *rsa = NULL; in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(in, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } if (type == SSL_FILETYPE_ASN1) { j = ERR_R_ASN1_LIB; rsa = d2i_RSAPrivateKey_bio(in, NULL); } else if (type == SSL_FILETYPE_PEM) { j = ERR_R_PEM_LIB; rsa = PEM_read_bio_RSAPrivateKey(in, NULL, SSL_CTX_get_default_passwd_cb(ctx), SSL_CTX_get_default_passwd_cb_userdata(ctx)); } else { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE); goto end; } if (rsa == NULL) { ERR_raise(ERR_LIB_SSL, j); goto end; } ret = SSL_CTX_use_RSAPrivateKey(ctx, rsa); RSA_free(rsa); end: BIO_free(in); return ret; } int SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx, const unsigned char *d, long len) { int ret; const unsigned char *p; RSA *rsa; p = d; if ((rsa = d2i_RSAPrivateKey(NULL, &p, (long)len)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } ret = SSL_CTX_use_RSAPrivateKey(ctx, rsa); RSA_free(rsa); return ret; }
ssl
openssl/ssl/ssl_rsa_legacy.c
openssl
#include <stdio.h> #include "ssl_local.h" #include "internal/packet.h" #include <openssl/bio.h> #include <openssl/objects.h> #include <openssl/evp.h> #include <openssl/x509.h> #include <openssl/x509v3.h> #include <openssl/pem.h> static int ssl_set_cert(CERT *c, X509 *x509, SSL_CTX *ctx); static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx); #define SYNTHV1CONTEXT (SSL_EXT_TLS1_2_AND_BELOW_ONLY \ | SSL_EXT_CLIENT_HELLO \ | SSL_EXT_TLS1_2_SERVER_HELLO \ | SSL_EXT_IGNORE_ON_RESUMPTION) #define NAME_PREFIX1 "SERVERINFO FOR " #define NAME_PREFIX2 "SERVERINFOV2 FOR " int SSL_use_certificate(SSL *ssl, X509 *x) { int rv; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } rv = ssl_security_cert(sc, NULL, x, 0, 1); if (rv != 1) { ERR_raise(ERR_LIB_SSL, rv); return 0; } return ssl_set_cert(sc->cert, x, SSL_CONNECTION_GET_CTX(sc)); } int SSL_use_certificate_file(SSL *ssl, const char *file, int type) { int j; BIO *in; int ret = 0; X509 *cert = NULL, *x = NULL; in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(in, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } x = X509_new_ex(ssl->ctx->libctx, ssl->ctx->propq); if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); goto end; } if (type == SSL_FILETYPE_ASN1) { j = ERR_R_ASN1_LIB; cert = d2i_X509_bio(in, &x); } else if (type == SSL_FILETYPE_PEM) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) goto end; j = ERR_R_PEM_LIB; cert = PEM_read_bio_X509(in, &x, sc->default_passwd_callback, sc->default_passwd_callback_userdata); } else { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE); goto end; } if (cert == NULL) { ERR_raise(ERR_LIB_SSL, j); goto end; } ret = SSL_use_certificate(ssl, x); end: X509_free(x); BIO_free(in); return ret; } int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len) { X509 *x; int ret; x = X509_new_ex(ssl->ctx->libctx, ssl->ctx->propq); if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } if (d2i_X509(&x, &d, (long)len)== NULL) { X509_free(x); ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } ret = SSL_use_certificate(ssl, x); X509_free(x); return ret; } static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey, SSL_CTX *ctx) { size_t i; if (ssl_cert_lookup_by_pkey(pkey, &i, ctx) == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE); return 0; } if (c->pkeys[i].x509 != NULL && !X509_check_private_key(c->pkeys[i].x509, pkey)) return 0; EVP_PKEY_free(c->pkeys[i].privatekey); EVP_PKEY_up_ref(pkey); c->pkeys[i].privatekey = pkey; c->key = &c->pkeys[i]; return 1; } int SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey) { int ret; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; if (pkey == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } ret = ssl_set_pkey(sc->cert, pkey, SSL_CONNECTION_GET_CTX(sc)); return ret; } int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type) { int j, ret = 0; BIO *in; EVP_PKEY *pkey = NULL; in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(in, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } if (type == SSL_FILETYPE_PEM) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) goto end; j = ERR_R_PEM_LIB; pkey = PEM_read_bio_PrivateKey_ex(in, NULL, sc->default_passwd_callback, sc->default_passwd_callback_userdata, ssl->ctx->libctx, ssl->ctx->propq); } else if (type == SSL_FILETYPE_ASN1) { j = ERR_R_ASN1_LIB; pkey = d2i_PrivateKey_ex_bio(in, NULL, ssl->ctx->libctx, ssl->ctx->propq); } else { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE); goto end; } if (pkey == NULL) { ERR_raise(ERR_LIB_SSL, j); goto end; } ret = SSL_use_PrivateKey(ssl, pkey); EVP_PKEY_free(pkey); end: BIO_free(in); return ret; } int SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len) { int ret; const unsigned char *p; EVP_PKEY *pkey; p = d; if ((pkey = d2i_PrivateKey_ex(type, NULL, &p, (long)len, ssl->ctx->libctx, ssl->ctx->propq)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } ret = SSL_use_PrivateKey(ssl, pkey); EVP_PKEY_free(pkey); return ret; } int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x) { int rv; if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } rv = ssl_security_cert(NULL, ctx, x, 0, 1); if (rv != 1) { ERR_raise(ERR_LIB_SSL, rv); return 0; } return ssl_set_cert(ctx->cert, x, ctx); } static int ssl_set_cert(CERT *c, X509 *x, SSL_CTX *ctx) { EVP_PKEY *pkey; size_t i; pkey = X509_get0_pubkey(x); if (pkey == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_X509_LIB); return 0; } if (ssl_cert_lookup_by_pkey(pkey, &i, ctx) == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE); return 0; } if (i == SSL_PKEY_ECC && !EVP_PKEY_can_sign(pkey)) { ERR_raise(ERR_LIB_SSL, SSL_R_ECC_CERT_NOT_FOR_SIGNING); return 0; } if (c->pkeys[i].privatekey != NULL) { EVP_PKEY_copy_parameters(pkey, c->pkeys[i].privatekey); ERR_clear_error(); if (!X509_check_private_key(x, c->pkeys[i].privatekey)) { EVP_PKEY_free(c->pkeys[i].privatekey); c->pkeys[i].privatekey = NULL; ERR_clear_error(); } } X509_free(c->pkeys[i].x509); X509_up_ref(x); c->pkeys[i].x509 = x; c->key = &(c->pkeys[i]); return 1; } int SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type) { int j = SSL_R_BAD_VALUE; BIO *in; int ret = 0; X509 *x = NULL, *cert = NULL; in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(in, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } x = X509_new_ex(ctx->libctx, ctx->propq); if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); goto end; } if (type == SSL_FILETYPE_ASN1) { j = ERR_R_ASN1_LIB; cert = d2i_X509_bio(in, &x); } else if (type == SSL_FILETYPE_PEM) { j = ERR_R_PEM_LIB; cert = PEM_read_bio_X509(in, &x, ctx->default_passwd_callback, ctx->default_passwd_callback_userdata); } else { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE); goto end; } if (cert == NULL) { ERR_raise(ERR_LIB_SSL, j); goto end; } ret = SSL_CTX_use_certificate(ctx, x); end: X509_free(x); BIO_free(in); return ret; } int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const unsigned char *d) { X509 *x; int ret; x = X509_new_ex(ctx->libctx, ctx->propq); if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } if (d2i_X509(&x, &d, (long)len) == NULL) { X509_free(x); ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } ret = SSL_CTX_use_certificate(ctx, x); X509_free(x); return ret; } int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey) { if (pkey == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } return ssl_set_pkey(ctx->cert, pkey, ctx); } int SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type) { int j, ret = 0; BIO *in; EVP_PKEY *pkey = NULL; in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(in, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } if (type == SSL_FILETYPE_PEM) { j = ERR_R_PEM_LIB; pkey = PEM_read_bio_PrivateKey_ex(in, NULL, ctx->default_passwd_callback, ctx->default_passwd_callback_userdata, ctx->libctx, ctx->propq); } else if (type == SSL_FILETYPE_ASN1) { j = ERR_R_ASN1_LIB; pkey = d2i_PrivateKey_ex_bio(in, NULL, ctx->libctx, ctx->propq); } else { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE); goto end; } if (pkey == NULL) { ERR_raise(ERR_LIB_SSL, j); goto end; } ret = SSL_CTX_use_PrivateKey(ctx, pkey); EVP_PKEY_free(pkey); end: BIO_free(in); return ret; } int SSL_CTX_use_PrivateKey_ASN1(int type, SSL_CTX *ctx, const unsigned char *d, long len) { int ret; const unsigned char *p; EVP_PKEY *pkey; p = d; if ((pkey = d2i_PrivateKey_ex(type, NULL, &p, (long)len, ctx->libctx, ctx->propq)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); return 0; } ret = SSL_CTX_use_PrivateKey(ctx, pkey); EVP_PKEY_free(pkey); return ret; } static int use_certificate_chain_file(SSL_CTX *ctx, SSL *ssl, const char *file) { BIO *in; int ret = 0; X509 *x = NULL; pem_password_cb *passwd_callback; void *passwd_callback_userdata; SSL_CTX *real_ctx = (ssl == NULL) ? ctx : ssl->ctx; if (ctx == NULL && ssl == NULL) return 0; ERR_clear_error(); if (ctx != NULL) { passwd_callback = ctx->default_passwd_callback; passwd_callback_userdata = ctx->default_passwd_callback_userdata; } else { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return 0; passwd_callback = sc->default_passwd_callback; passwd_callback_userdata = sc->default_passwd_callback_userdata; } in = BIO_new(BIO_s_file()); if (in == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(in, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } x = X509_new_ex(real_ctx->libctx, real_ctx->propq); if (x == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); goto end; } if (PEM_read_bio_X509_AUX(in, &x, passwd_callback, passwd_callback_userdata) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PEM_LIB); goto end; } if (ctx) ret = SSL_CTX_use_certificate(ctx, x); else ret = SSL_use_certificate(ssl, x); if (ERR_peek_error() != 0) ret = 0; if (ret) { X509 *ca; int r; unsigned long err; if (ctx) r = SSL_CTX_clear_chain_certs(ctx); else r = SSL_clear_chain_certs(ssl); if (r == 0) { ret = 0; goto end; } while (1) { ca = X509_new_ex(real_ctx->libctx, real_ctx->propq); if (ca == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB); goto end; } if (PEM_read_bio_X509(in, &ca, passwd_callback, passwd_callback_userdata) != NULL) { if (ctx) r = SSL_CTX_add0_chain_cert(ctx, ca); else r = SSL_add0_chain_cert(ssl, ca); if (!r) { X509_free(ca); ret = 0; goto end; } } else { X509_free(ca); break; } } err = ERR_peek_last_error(); if (ERR_GET_LIB(err) == ERR_LIB_PEM && ERR_GET_REASON(err) == PEM_R_NO_START_LINE) ERR_clear_error(); else ret = 0; } end: X509_free(x); BIO_free(in); return ret; } int SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file) { return use_certificate_chain_file(ctx, NULL, file); } int SSL_use_certificate_chain_file(SSL *ssl, const char *file) { return use_certificate_chain_file(NULL, ssl, file); } static int serverinfo_find_extension(const unsigned char *serverinfo, size_t serverinfo_length, unsigned int extension_type, const unsigned char **extension_data, size_t *extension_length) { PACKET pkt, data; *extension_data = NULL; *extension_length = 0; if (serverinfo == NULL || serverinfo_length == 0) return -1; if (!PACKET_buf_init(&pkt, serverinfo, serverinfo_length)) return -1; for (;;) { unsigned int type = 0; unsigned long context = 0; if (PACKET_remaining(&pkt) == 0) return 0; if (!PACKET_get_net_4(&pkt, &context) || !PACKET_get_net_2(&pkt, &type) || !PACKET_get_length_prefixed_2(&pkt, &data)) return -1; if (type == extension_type) { *extension_data = PACKET_data(&data); *extension_length = PACKET_remaining(&data); return 1; } } } static int serverinfoex_srv_parse_cb(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char *in, size_t inlen, X509 *x, size_t chainidx, int *al, void *arg) { if (inlen != 0) { *al = SSL_AD_DECODE_ERROR; return 0; } return 1; } static int serverinfo_srv_parse_cb(SSL *s, unsigned int ext_type, const unsigned char *in, size_t inlen, int *al, void *arg) { return serverinfoex_srv_parse_cb(s, ext_type, 0, in, inlen, NULL, 0, al, arg); } static int serverinfoex_srv_add_cb(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char **out, size_t *outlen, X509 *x, size_t chainidx, int *al, void *arg) { const unsigned char *serverinfo = NULL; size_t serverinfo_length = 0; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) { *al = SSL_AD_INTERNAL_ERROR; return -1; } if ((context & SSL_EXT_TLS1_3_CERTIFICATE) != 0 && chainidx > 0) return 0; if ((ssl_get_server_cert_serverinfo(sc, &serverinfo, &serverinfo_length)) != 0) { int retval = serverinfo_find_extension(serverinfo, serverinfo_length, ext_type, out, outlen); if (retval == -1) { *al = SSL_AD_INTERNAL_ERROR; return -1; } if (retval == 0) return 0; return 1; } return 0; } static int serverinfo_srv_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) { return serverinfoex_srv_add_cb(s, ext_type, 0, out, outlen, NULL, 0, al, arg); } static int serverinfo_process_buffer(unsigned int version, const unsigned char *serverinfo, size_t serverinfo_length, SSL_CTX *ctx) { PACKET pkt; if (serverinfo == NULL || serverinfo_length == 0) return 0; if (version != SSL_SERVERINFOV1 && version != SSL_SERVERINFOV2) return 0; if (!PACKET_buf_init(&pkt, serverinfo, serverinfo_length)) return 0; while (PACKET_remaining(&pkt)) { unsigned long context = 0; unsigned int ext_type = 0; PACKET data; if ((version == SSL_SERVERINFOV2 && !PACKET_get_net_4(&pkt, &context)) || !PACKET_get_net_2(&pkt, &ext_type) || !PACKET_get_length_prefixed_2(&pkt, &data)) return 0; if (ctx == NULL) continue; if (version == SSL_SERVERINFOV1 || context == SYNTHV1CONTEXT) { if (!SSL_CTX_add_server_custom_ext(ctx, ext_type, serverinfo_srv_add_cb, NULL, NULL, serverinfo_srv_parse_cb, NULL)) return 0; } else { if (!SSL_CTX_add_custom_ext(ctx, ext_type, context, serverinfoex_srv_add_cb, NULL, NULL, serverinfoex_srv_parse_cb, NULL)) return 0; } } return 1; } static size_t extension_contextoff(unsigned int version) { return version == SSL_SERVERINFOV1 ? 4 : 0; } static size_t extension_append_length(unsigned int version, size_t extension_length) { return extension_length + extension_contextoff(version); } static void extension_append(unsigned int version, const unsigned char *extension, const size_t extension_length, unsigned char *serverinfo) { const size_t contextoff = extension_contextoff(version); if (contextoff > 0) { serverinfo[0] = 0; serverinfo[1] = 0; serverinfo[2] = (SYNTHV1CONTEXT >> 8) & 0xff; serverinfo[3] = SYNTHV1CONTEXT & 0xff; } memcpy(serverinfo + contextoff, extension, extension_length); } int SSL_CTX_use_serverinfo_ex(SSL_CTX *ctx, unsigned int version, const unsigned char *serverinfo, size_t serverinfo_length) { unsigned char *new_serverinfo = NULL; if (ctx == NULL || serverinfo == NULL || serverinfo_length == 0) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return 0; } if (version == SSL_SERVERINFOV1) { const size_t sinfo_length = extension_append_length(SSL_SERVERINFOV1, serverinfo_length); unsigned char *sinfo; int ret; sinfo = OPENSSL_malloc(sinfo_length); if (sinfo == NULL) return 0; extension_append(SSL_SERVERINFOV1, serverinfo, serverinfo_length, sinfo); ret = SSL_CTX_use_serverinfo_ex(ctx, SSL_SERVERINFOV2, sinfo, sinfo_length); OPENSSL_free(sinfo); return ret; } if (!serverinfo_process_buffer(version, serverinfo, serverinfo_length, NULL)) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SERVERINFO_DATA); return 0; } if (ctx->cert->key == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } new_serverinfo = OPENSSL_realloc(ctx->cert->key->serverinfo, serverinfo_length); if (new_serverinfo == NULL) return 0; ctx->cert->key->serverinfo = new_serverinfo; memcpy(ctx->cert->key->serverinfo, serverinfo, serverinfo_length); ctx->cert->key->serverinfo_length = serverinfo_length; if (!serverinfo_process_buffer(version, serverinfo, serverinfo_length, ctx)) { ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SERVERINFO_DATA); return 0; } return 1; } int SSL_CTX_use_serverinfo(SSL_CTX *ctx, const unsigned char *serverinfo, size_t serverinfo_length) { return SSL_CTX_use_serverinfo_ex(ctx, SSL_SERVERINFOV1, serverinfo, serverinfo_length); } int SSL_CTX_use_serverinfo_file(SSL_CTX *ctx, const char *file) { unsigned char *serverinfo = NULL; unsigned char *tmp; size_t serverinfo_length = 0; unsigned char *extension = 0; long extension_length = 0; char *name = NULL; char *header = NULL; unsigned int name_len; int ret = 0; BIO *bin = NULL; size_t num_extensions = 0; if (ctx == NULL || file == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); goto end; } bin = BIO_new(BIO_s_file()); if (bin == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB); goto end; } if (BIO_read_filename(bin, file) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB); goto end; } for (num_extensions = 0;; num_extensions++) { unsigned int version; size_t append_length; if (PEM_read_bio(bin, &name, &header, &extension, &extension_length) == 0) { if (num_extensions == 0) { ERR_raise(ERR_LIB_SSL, SSL_R_NO_PEM_EXTENSIONS); goto end; } else break; } name_len = strlen(name); if (name_len < sizeof(NAME_PREFIX1) - 1) { ERR_raise(ERR_LIB_SSL, SSL_R_PEM_NAME_TOO_SHORT); goto end; } if (HAS_PREFIX(name, NAME_PREFIX1)) { version = SSL_SERVERINFOV1; } else { if (name_len < sizeof(NAME_PREFIX2) - 1) { ERR_raise(ERR_LIB_SSL, SSL_R_PEM_NAME_TOO_SHORT); goto end; } if (!HAS_PREFIX(name, NAME_PREFIX2)) { ERR_raise(ERR_LIB_SSL, SSL_R_PEM_NAME_BAD_PREFIX); goto end; } version = SSL_SERVERINFOV2; } if (version == SSL_SERVERINFOV1) { if (extension_length < 4 || (extension[2] << 8) + extension[3] != extension_length - 4) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_DATA); goto end; } } else { if (extension_length < 8 || (extension[6] << 8) + extension[7] != extension_length - 8) { ERR_raise(ERR_LIB_SSL, SSL_R_BAD_DATA); goto end; } } append_length = extension_append_length(version, extension_length); tmp = OPENSSL_realloc(serverinfo, serverinfo_length + append_length); if (tmp == NULL) goto end; serverinfo = tmp; extension_append(version, extension, extension_length, serverinfo + serverinfo_length); serverinfo_length += append_length; OPENSSL_free(name); name = NULL; OPENSSL_free(header); header = NULL; OPENSSL_free(extension); extension = NULL; } ret = SSL_CTX_use_serverinfo_ex(ctx, SSL_SERVERINFOV2, serverinfo, serverinfo_length); end: OPENSSL_free(name); OPENSSL_free(header); OPENSSL_free(extension); OPENSSL_free(serverinfo); BIO_free(bin); return ret; } static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) { int ret = 0; size_t i; int j; int rv; CERT *c; STACK_OF(X509) *dup_chain = NULL; EVP_PKEY *pubkey = NULL; SSL_CONNECTION *sc = NULL; if (ctx == NULL && (sc = SSL_CONNECTION_FROM_SSL(ssl)) == NULL) return 0; c = sc != NULL ? sc->cert : ctx->cert; rv = ssl_security_cert(sc, ctx, x509, 0, 1); if (rv != 1) { ERR_raise(ERR_LIB_SSL, rv); goto out; } for (j = 0; j < sk_X509_num(chain); j++) { rv = ssl_security_cert(sc, ctx, sk_X509_value(chain, j), 0, 0); if (rv != 1) { ERR_raise(ERR_LIB_SSL, rv); goto out; } } pubkey = X509_get_pubkey(x509); if (pubkey == NULL) goto out; if (privatekey == NULL) { privatekey = pubkey; } else { if (EVP_PKEY_missing_parameters(privatekey)) { if (EVP_PKEY_missing_parameters(pubkey)) { ERR_raise(ERR_LIB_SSL, SSL_R_MISSING_PARAMETERS); goto out; } else { if (!EVP_PKEY_copy_parameters(privatekey, pubkey)) { ERR_raise(ERR_LIB_SSL, SSL_R_COPY_PARAMETERS_FAILED); goto out; } } } else if (EVP_PKEY_missing_parameters(pubkey)) { if (!EVP_PKEY_copy_parameters(pubkey, privatekey)) { ERR_raise(ERR_LIB_SSL, SSL_R_COPY_PARAMETERS_FAILED); goto out; } } if (EVP_PKEY_eq(pubkey, privatekey) != 1) { ERR_raise(ERR_LIB_SSL, SSL_R_PRIVATE_KEY_MISMATCH); goto out; } } if (ssl_cert_lookup_by_pkey(pubkey, &i, ctx) == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE); goto out; } if (!override && (c->pkeys[i].x509 != NULL || c->pkeys[i].privatekey != NULL || c->pkeys[i].chain != NULL)) { ERR_raise(ERR_LIB_SSL, SSL_R_NOT_REPLACING_CERTIFICATE); goto out; } if (chain != NULL) { dup_chain = X509_chain_up_ref(chain); if (dup_chain == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto out; } } OSSL_STACK_OF_X509_free(c->pkeys[i].chain); c->pkeys[i].chain = dup_chain; X509_free(c->pkeys[i].x509); X509_up_ref(x509); c->pkeys[i].x509 = x509; EVP_PKEY_free(c->pkeys[i].privatekey); EVP_PKEY_up_ref(privatekey); c->pkeys[i].privatekey = privatekey; c->key = &(c->pkeys[i]); ret = 1; out: EVP_PKEY_free(pubkey); return ret; } int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) { return ssl_set_cert_and_key(ssl, NULL, x509, privatekey, chain, override); } int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) { return ssl_set_cert_and_key(NULL, ctx, x509, privatekey, chain, override); }
ssl
openssl/ssl/ssl_rsa.c
openssl
#if defined(__TANDEM) && defined(_SPT_MODEL_) # include <spthread.h> # include <spt_extensions.h> #endif #include <stdio.h> #include <openssl/rand.h> #include <openssl/engine.h> #include "internal/refcount.h" #include "internal/cryptlib.h" #include "ssl_local.h" #include "statem/statem_local.h" static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *s); static void SSL_SESSION_list_add(SSL_CTX *ctx, SSL_SESSION *s); static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *c, int lck); DEFINE_STACK_OF(SSL_SESSION) __owur static ossl_inline int sess_timedout(OSSL_TIME t, SSL_SESSION *ss) { return ossl_time_compare(t, ss->calc_timeout) > 0; } __owur static ossl_inline int timeoutcmp(SSL_SESSION *a, SSL_SESSION *b) { return ossl_time_compare(a->calc_timeout, b->calc_timeout); } void ssl_session_calculate_timeout(SSL_SESSION *ss) { ss->calc_timeout = ossl_time_add(ss->time, ss->timeout); } SSL_SESSION *SSL_get_session(const SSL *ssl) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(ssl); if (sc == NULL) return NULL; return sc->session; } SSL_SESSION *SSL_get1_session(SSL *ssl) { SSL_SESSION *sess; if (!CRYPTO_THREAD_read_lock(ssl->lock)) return NULL; sess = SSL_get_session(ssl); if (sess != NULL) SSL_SESSION_up_ref(sess); CRYPTO_THREAD_unlock(ssl->lock); return sess; } int SSL_SESSION_set_ex_data(SSL_SESSION *s, int idx, void *arg) { return CRYPTO_set_ex_data(&s->ex_data, idx, arg); } void *SSL_SESSION_get_ex_data(const SSL_SESSION *s, int idx) { return CRYPTO_get_ex_data(&s->ex_data, idx); } SSL_SESSION *SSL_SESSION_new(void) { SSL_SESSION *ss; if (!OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL)) return NULL; ss = OPENSSL_zalloc(sizeof(*ss)); if (ss == NULL) return NULL; ss->verify_result = 1; ss->timeout = ossl_seconds2time(60 * 5 + 4); ss->time = ossl_time_now(); ssl_session_calculate_timeout(ss); if (!CRYPTO_NEW_REF(&ss->references, 1)) { OPENSSL_free(ss); return NULL; } if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_SESSION, ss, &ss->ex_data)) { CRYPTO_FREE_REF(&ss->references); OPENSSL_free(ss); return NULL; } return ss; } SSL_SESSION *SSL_SESSION_dup(const SSL_SESSION *src) { return ssl_session_dup(src, 1); } SSL_SESSION *ssl_session_dup(const SSL_SESSION *src, int ticket) { SSL_SESSION *dest; dest = OPENSSL_malloc(sizeof(*dest)); if (dest == NULL) return NULL; memcpy(dest, src, sizeof(*dest)); #ifndef OPENSSL_NO_PSK dest->psk_identity_hint = NULL; dest->psk_identity = NULL; #endif dest->ext.hostname = NULL; dest->ext.tick = NULL; dest->ext.alpn_selected = NULL; #ifndef OPENSSL_NO_SRP dest->srp_username = NULL; #endif dest->peer_chain = NULL; dest->peer = NULL; dest->peer_rpk = NULL; dest->ticket_appdata = NULL; memset(&dest->ex_data, 0, sizeof(dest->ex_data)); dest->prev = NULL; dest->next = NULL; dest->owner = NULL; if (!CRYPTO_NEW_REF(&dest->references, 1)) { OPENSSL_free(dest); return NULL; } if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_SESSION, dest, &dest->ex_data)) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } if (src->peer != NULL) { if (!X509_up_ref(src->peer)) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } dest->peer = src->peer; } if (src->peer_chain != NULL) { dest->peer_chain = X509_chain_up_ref(src->peer_chain); if (dest->peer_chain == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_X509_LIB); goto err; } } if (src->peer_rpk != NULL) { if (!EVP_PKEY_up_ref(src->peer_rpk)) goto err; dest->peer_rpk = src->peer_rpk; } #ifndef OPENSSL_NO_PSK if (src->psk_identity_hint) { dest->psk_identity_hint = OPENSSL_strdup(src->psk_identity_hint); if (dest->psk_identity_hint == NULL) goto err; } if (src->psk_identity) { dest->psk_identity = OPENSSL_strdup(src->psk_identity); if (dest->psk_identity == NULL) goto err; } #endif if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_SSL_SESSION, &dest->ex_data, &src->ex_data)) { ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB); goto err; } if (src->ext.hostname) { dest->ext.hostname = OPENSSL_strdup(src->ext.hostname); if (dest->ext.hostname == NULL) goto err; } if (ticket != 0 && src->ext.tick != NULL) { dest->ext.tick = OPENSSL_memdup(src->ext.tick, src->ext.ticklen); if (dest->ext.tick == NULL) goto err; } else { dest->ext.tick_lifetime_hint = 0; dest->ext.ticklen = 0; } if (src->ext.alpn_selected != NULL) { dest->ext.alpn_selected = OPENSSL_memdup(src->ext.alpn_selected, src->ext.alpn_selected_len); if (dest->ext.alpn_selected == NULL) goto err; } #ifndef OPENSSL_NO_SRP if (src->srp_username) { dest->srp_username = OPENSSL_strdup(src->srp_username); if (dest->srp_username == NULL) goto err; } #endif if (src->ticket_appdata != NULL) { dest->ticket_appdata = OPENSSL_memdup(src->ticket_appdata, src->ticket_appdata_len); if (dest->ticket_appdata == NULL) goto err; } return dest; err: SSL_SESSION_free(dest); return NULL; } const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int *len) { if (len) *len = (unsigned int)s->session_id_length; return s->session_id; } const unsigned char *SSL_SESSION_get0_id_context(const SSL_SESSION *s, unsigned int *len) { if (len != NULL) *len = (unsigned int)s->sid_ctx_length; return s->sid_ctx; } unsigned int SSL_SESSION_get_compress_id(const SSL_SESSION *s) { return s->compress_meth; } #define MAX_SESS_ID_ATTEMPTS 10 static int def_generate_session_id(SSL *ssl, unsigned char *id, unsigned int *id_len) { unsigned int retry = 0; do { if (RAND_bytes_ex(ssl->ctx->libctx, id, *id_len, 0) <= 0) return 0; #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION if (retry > 0) { id[0]++; } #endif } while (SSL_has_matching_session_id(ssl, id, *id_len) && (++retry < MAX_SESS_ID_ATTEMPTS)) ; if (retry < MAX_SESS_ID_ATTEMPTS) return 1; return 0; } int ssl_generate_session_id(SSL_CONNECTION *s, SSL_SESSION *ss) { unsigned int tmp; GEN_SESSION_CB cb = def_generate_session_id; SSL *ssl = SSL_CONNECTION_GET_SSL(s); switch (s->version) { case SSL3_VERSION: case TLS1_VERSION: case TLS1_1_VERSION: case TLS1_2_VERSION: case TLS1_3_VERSION: case DTLS1_BAD_VER: case DTLS1_VERSION: case DTLS1_2_VERSION: ss->session_id_length = SSL3_SSL_SESSION_ID_LENGTH; break; default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_UNSUPPORTED_SSL_VERSION); return 0; } if (s->ext.ticket_expected) { ss->session_id_length = 0; return 1; } if (!CRYPTO_THREAD_read_lock(SSL_CONNECTION_GET_SSL(s)->lock)) return 0; if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) { CRYPTO_THREAD_unlock(ssl->lock); SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED); return 0; } if (s->generate_session_id) cb = s->generate_session_id; else if (s->session_ctx->generate_session_id) cb = s->session_ctx->generate_session_id; CRYPTO_THREAD_unlock(s->session_ctx->lock); CRYPTO_THREAD_unlock(ssl->lock); memset(ss->session_id, 0, ss->session_id_length); tmp = (int)ss->session_id_length; if (!cb(ssl, ss->session_id, &tmp)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_SSL_SESSION_ID_CALLBACK_FAILED); return 0; } if (tmp == 0 || tmp > ss->session_id_length) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH); return 0; } ss->session_id_length = tmp; if (SSL_has_matching_session_id(ssl, ss->session_id, (unsigned int)ss->session_id_length)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_SSL_SESSION_ID_CONFLICT); return 0; } return 1; } int ssl_get_new_session(SSL_CONNECTION *s, int session) { SSL_SESSION *ss = NULL; if ((ss = SSL_SESSION_new()) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); return 0; } if (ossl_time_is_zero(s->session_ctx->session_timeout)) ss->timeout = SSL_CONNECTION_GET_SSL(s)->method->get_timeout(); else ss->timeout = s->session_ctx->session_timeout; ssl_session_calculate_timeout(ss); SSL_SESSION_free(s->session); s->session = NULL; if (session) { if (SSL_CONNECTION_IS_TLS13(s)) { ss->session_id_length = 0; } else if (!ssl_generate_session_id(s, ss)) { SSL_SESSION_free(ss); return 0; } } else { ss->session_id_length = 0; } if (s->sid_ctx_length > sizeof(ss->sid_ctx)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); SSL_SESSION_free(ss); return 0; } memcpy(ss->sid_ctx, s->sid_ctx, s->sid_ctx_length); ss->sid_ctx_length = s->sid_ctx_length; s->session = ss; ss->ssl_version = s->version; ss->verify_result = X509_V_OK; if (s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) ss->flags |= SSL_SESS_FLAG_EXTMS; return 1; } SSL_SESSION *lookup_sess_in_cache(SSL_CONNECTION *s, const unsigned char *sess_id, size_t sess_id_len) { SSL_SESSION *ret = NULL; if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_NO_INTERNAL_LOOKUP) == 0) { SSL_SESSION data; data.ssl_version = s->version; if (!ossl_assert(sess_id_len <= SSL_MAX_SSL_SESSION_ID_LENGTH)) return NULL; memcpy(data.session_id, sess_id, sess_id_len); data.session_id_length = sess_id_len; if (!CRYPTO_THREAD_read_lock(s->session_ctx->lock)) return NULL; ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); if (ret != NULL) { SSL_SESSION_up_ref(ret); } CRYPTO_THREAD_unlock(s->session_ctx->lock); if (ret == NULL) ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_miss); } if (ret == NULL && s->session_ctx->get_session_cb != NULL) { int copy = 1; ret = s->session_ctx->get_session_cb(SSL_CONNECTION_GET_SSL(s), sess_id, sess_id_len, &copy); if (ret != NULL) { ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_cb_hit); if (copy) SSL_SESSION_up_ref(ret); if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_NO_INTERNAL_STORE) == 0) { (void)SSL_CTX_add_session(s->session_ctx, ret); } } } return ret; } int ssl_get_prev_session(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello) { SSL_SESSION *ret = NULL; int fatal = 0; int try_session_cache = 0; SSL_TICKET_STATUS r; if (SSL_CONNECTION_IS_TLS13(s)) { s->ext.ticket_expected = 1; if (!tls_parse_extension(s, TLSEXT_IDX_psk_kex_modes, SSL_EXT_CLIENT_HELLO, hello->pre_proc_exts, NULL, 0) || !tls_parse_extension(s, TLSEXT_IDX_psk, SSL_EXT_CLIENT_HELLO, hello->pre_proc_exts, NULL, 0)) return -1; ret = s->session; } else { r = tls_get_ticket_from_client(s, hello, &ret); switch (r) { case SSL_TICKET_FATAL_ERR_MALLOC: case SSL_TICKET_FATAL_ERR_OTHER: fatal = 1; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; case SSL_TICKET_NONE: case SSL_TICKET_EMPTY: if (hello->session_id_len > 0) { try_session_cache = 1; ret = lookup_sess_in_cache(s, hello->session_id, hello->session_id_len); } break; case SSL_TICKET_NO_DECRYPT: case SSL_TICKET_SUCCESS: case SSL_TICKET_SUCCESS_RENEW: break; } } if (ret == NULL) goto err; if (ret->ssl_version != s->version) goto err; if (ret->sid_ctx_length != s->sid_ctx_length || memcmp(ret->sid_ctx, s->sid_ctx, ret->sid_ctx_length)) { goto err; } if ((s->verify_mode & SSL_VERIFY_PEER) && s->sid_ctx_length == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED); fatal = 1; goto err; } if (sess_timedout(ossl_time_now(), ret)) { ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_timeout); if (try_session_cache) { SSL_CTX_remove_session(s->session_ctx, ret); } goto err; } if (ret->flags & SSL_SESS_FLAG_EXTMS) { if (!(s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INCONSISTENT_EXTMS); fatal = 1; goto err; } } else if (s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) { goto err; } if (!SSL_CONNECTION_IS_TLS13(s)) { SSL_SESSION_free(s->session); s->session = ret; } ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_hit); s->verify_result = s->session->verify_result; return 1; err: if (ret != NULL) { SSL_SESSION_free(ret); if (SSL_CONNECTION_IS_TLS13(s)) s->session = NULL; if (!try_session_cache) { s->ext.ticket_expected = 1; } } if (fatal) return -1; return 0; } int SSL_CTX_add_session(SSL_CTX *ctx, SSL_SESSION *c) { int ret = 0; SSL_SESSION *s; SSL_SESSION_up_ref(c); if (!CRYPTO_THREAD_write_lock(ctx->lock)) { SSL_SESSION_free(c); return 0; } s = lh_SSL_SESSION_insert(ctx->sessions, c); if (s != NULL && s != c) { SSL_SESSION_list_remove(ctx, s); SSL_SESSION_free(s); s = NULL; } else if (s == NULL && lh_SSL_SESSION_retrieve(ctx->sessions, c) == NULL) { s = c; } if (ctx->session_cache_mode & SSL_SESS_CACHE_UPDATE_TIME) { c->time = ossl_time_now(); ssl_session_calculate_timeout(c); } if (s == NULL) { ret = 1; if (SSL_CTX_sess_get_cache_size(ctx) > 0) { while (SSL_CTX_sess_number(ctx) >= SSL_CTX_sess_get_cache_size(ctx)) { if (!remove_session_lock(ctx, ctx->session_cache_tail, 0)) break; else ssl_tsan_counter(ctx, &ctx->stats.sess_cache_full); } } } SSL_SESSION_list_add(ctx, c); if (s != NULL) { SSL_SESSION_free(s); ret = 0; } CRYPTO_THREAD_unlock(ctx->lock); return ret; } int SSL_CTX_remove_session(SSL_CTX *ctx, SSL_SESSION *c) { return remove_session_lock(ctx, c, 1); } static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *c, int lck) { SSL_SESSION *r; int ret = 0; if ((c != NULL) && (c->session_id_length != 0)) { if (lck) { if (!CRYPTO_THREAD_write_lock(ctx->lock)) return 0; } if ((r = lh_SSL_SESSION_retrieve(ctx->sessions, c)) != NULL) { ret = 1; r = lh_SSL_SESSION_delete(ctx->sessions, r); SSL_SESSION_list_remove(ctx, r); } c->not_resumable = 1; if (lck) CRYPTO_THREAD_unlock(ctx->lock); if (ctx->remove_session_cb != NULL) ctx->remove_session_cb(ctx, c); if (ret) SSL_SESSION_free(r); } return ret; } void SSL_SESSION_free(SSL_SESSION *ss) { int i; if (ss == NULL) return; CRYPTO_DOWN_REF(&ss->references, &i); REF_PRINT_COUNT("SSL_SESSION", ss); if (i > 0) return; REF_ASSERT_ISNT(i < 0); CRYPTO_free_ex_data(CRYPTO_EX_INDEX_SSL_SESSION, ss, &ss->ex_data); OPENSSL_cleanse(ss->master_key, sizeof(ss->master_key)); OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); X509_free(ss->peer); EVP_PKEY_free(ss->peer_rpk); OSSL_STACK_OF_X509_free(ss->peer_chain); OPENSSL_free(ss->ext.hostname); OPENSSL_free(ss->ext.tick); #ifndef OPENSSL_NO_PSK OPENSSL_free(ss->psk_identity_hint); OPENSSL_free(ss->psk_identity); #endif #ifndef OPENSSL_NO_SRP OPENSSL_free(ss->srp_username); #endif OPENSSL_free(ss->ext.alpn_selected); OPENSSL_free(ss->ticket_appdata); CRYPTO_FREE_REF(&ss->references); OPENSSL_clear_free(ss, sizeof(*ss)); } int SSL_SESSION_up_ref(SSL_SESSION *ss) { int i; if (CRYPTO_UP_REF(&ss->references, &i) <= 0) return 0; REF_PRINT_COUNT("SSL_SESSION", ss); REF_ASSERT_ISNT(i < 2); return ((i > 1) ? 1 : 0); } int SSL_set_session(SSL *s, SSL_SESSION *session) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; ssl_clear_bad_session(sc); if (s->defltmeth != s->method) { if (!SSL_set_ssl_method(s, s->defltmeth)) return 0; } if (session != NULL) { SSL_SESSION_up_ref(session); sc->verify_result = session->verify_result; } SSL_SESSION_free(sc->session); sc->session = session; return 1; } int SSL_SESSION_set1_id(SSL_SESSION *s, const unsigned char *sid, unsigned int sid_len) { if (sid_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_SESSION_ID_TOO_LONG); return 0; } s->session_id_length = sid_len; if (sid != s->session_id) memcpy(s->session_id, sid, sid_len); return 1; } long SSL_SESSION_set_timeout(SSL_SESSION *s, long t) { OSSL_TIME new_timeout = ossl_seconds2time(t); if (s == NULL || t < 0) return 0; if (s->owner != NULL) { if (!CRYPTO_THREAD_write_lock(s->owner->lock)) return 0; s->timeout = new_timeout; ssl_session_calculate_timeout(s); SSL_SESSION_list_add(s->owner, s); CRYPTO_THREAD_unlock(s->owner->lock); } else { s->timeout = new_timeout; ssl_session_calculate_timeout(s); } return 1; } long SSL_SESSION_get_timeout(const SSL_SESSION *s) { if (s == NULL) return 0; return (long)ossl_time_to_time_t(s->timeout); } long SSL_SESSION_get_time(const SSL_SESSION *s) { return (long) SSL_SESSION_get_time_ex(s); } time_t SSL_SESSION_get_time_ex(const SSL_SESSION *s) { if (s == NULL) return 0; return ossl_time_to_time_t(s->time); } time_t SSL_SESSION_set_time_ex(SSL_SESSION *s, time_t t) { OSSL_TIME new_time = ossl_time_from_time_t(t); if (s == NULL) return 0; if (s->owner != NULL) { if (!CRYPTO_THREAD_write_lock(s->owner->lock)) return 0; s->time = new_time; ssl_session_calculate_timeout(s); SSL_SESSION_list_add(s->owner, s); CRYPTO_THREAD_unlock(s->owner->lock); } else { s->time = new_time; ssl_session_calculate_timeout(s); } return t; } long SSL_SESSION_set_time(SSL_SESSION *s, long t) { return (long) SSL_SESSION_set_time_ex(s, (time_t) t); } int SSL_SESSION_get_protocol_version(const SSL_SESSION *s) { return s->ssl_version; } int SSL_SESSION_set_protocol_version(SSL_SESSION *s, int version) { s->ssl_version = version; return 1; } const SSL_CIPHER *SSL_SESSION_get0_cipher(const SSL_SESSION *s) { return s->cipher; } int SSL_SESSION_set_cipher(SSL_SESSION *s, const SSL_CIPHER *cipher) { s->cipher = cipher; return 1; } const char *SSL_SESSION_get0_hostname(const SSL_SESSION *s) { return s->ext.hostname; } int SSL_SESSION_set1_hostname(SSL_SESSION *s, const char *hostname) { OPENSSL_free(s->ext.hostname); if (hostname == NULL) { s->ext.hostname = NULL; return 1; } s->ext.hostname = OPENSSL_strdup(hostname); return s->ext.hostname != NULL; } int SSL_SESSION_has_ticket(const SSL_SESSION *s) { return (s->ext.ticklen > 0) ? 1 : 0; } unsigned long SSL_SESSION_get_ticket_lifetime_hint(const SSL_SESSION *s) { return s->ext.tick_lifetime_hint; } void SSL_SESSION_get0_ticket(const SSL_SESSION *s, const unsigned char **tick, size_t *len) { *len = s->ext.ticklen; if (tick != NULL) *tick = s->ext.tick; } uint32_t SSL_SESSION_get_max_early_data(const SSL_SESSION *s) { return s->ext.max_early_data; } int SSL_SESSION_set_max_early_data(SSL_SESSION *s, uint32_t max_early_data) { s->ext.max_early_data = max_early_data; return 1; } void SSL_SESSION_get0_alpn_selected(const SSL_SESSION *s, const unsigned char **alpn, size_t *len) { *alpn = s->ext.alpn_selected; *len = s->ext.alpn_selected_len; } int SSL_SESSION_set1_alpn_selected(SSL_SESSION *s, const unsigned char *alpn, size_t len) { OPENSSL_free(s->ext.alpn_selected); if (alpn == NULL || len == 0) { s->ext.alpn_selected = NULL; s->ext.alpn_selected_len = 0; return 1; } s->ext.alpn_selected = OPENSSL_memdup(alpn, len); if (s->ext.alpn_selected == NULL) { s->ext.alpn_selected_len = 0; return 0; } s->ext.alpn_selected_len = len; return 1; } X509 *SSL_SESSION_get0_peer(SSL_SESSION *s) { return s->peer; } EVP_PKEY *SSL_SESSION_get0_peer_rpk(SSL_SESSION *s) { return s->peer_rpk; } int SSL_SESSION_set1_id_context(SSL_SESSION *s, const unsigned char *sid_ctx, unsigned int sid_ctx_len) { if (sid_ctx_len > SSL_MAX_SID_CTX_LENGTH) { ERR_raise(ERR_LIB_SSL, SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG); return 0; } s->sid_ctx_length = sid_ctx_len; if (sid_ctx != s->sid_ctx) memcpy(s->sid_ctx, sid_ctx, sid_ctx_len); return 1; } int SSL_SESSION_is_resumable(const SSL_SESSION *s) { return !s->not_resumable && (s->session_id_length > 0 || s->ext.ticklen > 0); } long SSL_CTX_set_timeout(SSL_CTX *s, long t) { long l; if (s == NULL) return 0; l = (long)ossl_time2seconds(s->session_timeout); s->session_timeout = ossl_seconds2time(t); return l; } long SSL_CTX_get_timeout(const SSL_CTX *s) { if (s == NULL) return 0; return (long)ossl_time2seconds(s->session_timeout); } int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sc->ext.session_secret_cb = tls_session_secret_cb; sc->ext.session_secret_cb_arg = arg; return 1; } int SSL_set_session_ticket_ext_cb(SSL *s, tls_session_ticket_ext_cb_fn cb, void *arg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sc->ext.session_ticket_cb = cb; sc->ext.session_ticket_cb_arg = arg; return 1; } int SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; if (sc->version >= TLS1_VERSION) { OPENSSL_free(sc->ext.session_ticket); sc->ext.session_ticket = NULL; sc->ext.session_ticket = OPENSSL_malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); if (sc->ext.session_ticket == NULL) return 0; if (ext_data != NULL) { sc->ext.session_ticket->length = ext_len; sc->ext.session_ticket->data = sc->ext.session_ticket + 1; memcpy(sc->ext.session_ticket->data, ext_data, ext_len); } else { sc->ext.session_ticket->length = 0; sc->ext.session_ticket->data = NULL; } return 1; } return 0; } void SSL_CTX_flush_sessions(SSL_CTX *s, long t) { STACK_OF(SSL_SESSION) *sk; SSL_SESSION *current; unsigned long i; const OSSL_TIME timeout = ossl_time_from_time_t(t); if (!CRYPTO_THREAD_write_lock(s->lock)) return; sk = sk_SSL_SESSION_new_null(); i = lh_SSL_SESSION_get_down_load(s->sessions); lh_SSL_SESSION_set_down_load(s->sessions, 0); while (s->session_cache_tail != NULL) { current = s->session_cache_tail; if (t == 0 || sess_timedout(timeout, current)) { lh_SSL_SESSION_delete(s->sessions, current); SSL_SESSION_list_remove(s, current); current->not_resumable = 1; if (s->remove_session_cb != NULL) s->remove_session_cb(s, current); if (sk == NULL || !sk_SSL_SESSION_push(sk, current)) SSL_SESSION_free(current); } else { break; } } lh_SSL_SESSION_set_down_load(s->sessions, i); CRYPTO_THREAD_unlock(s->lock); sk_SSL_SESSION_pop_free(sk, SSL_SESSION_free); } int ssl_clear_bad_session(SSL_CONNECTION *s) { if ((s->session != NULL) && !(s->shutdown & SSL_SENT_SHUTDOWN) && !(SSL_in_init(SSL_CONNECTION_GET_SSL(s)) || SSL_in_before(SSL_CONNECTION_GET_SSL(s)))) { SSL_CTX_remove_session(s->session_ctx, s->session); return 1; } else return 0; } static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *s) { if ((s->next == NULL) || (s->prev == NULL)) return; if (s->next == (SSL_SESSION *)&(ctx->session_cache_tail)) { if (s->prev == (SSL_SESSION *)&(ctx->session_cache_head)) { ctx->session_cache_head = NULL; ctx->session_cache_tail = NULL; } else { ctx->session_cache_tail = s->prev; s->prev->next = (SSL_SESSION *)&(ctx->session_cache_tail); } } else { if (s->prev == (SSL_SESSION *)&(ctx->session_cache_head)) { ctx->session_cache_head = s->next; s->next->prev = (SSL_SESSION *)&(ctx->session_cache_head); } else { s->next->prev = s->prev; s->prev->next = s->next; } } s->prev = s->next = NULL; s->owner = NULL; } static void SSL_SESSION_list_add(SSL_CTX *ctx, SSL_SESSION *s) { SSL_SESSION *next; if ((s->next != NULL) && (s->prev != NULL)) SSL_SESSION_list_remove(ctx, s); if (ctx->session_cache_head == NULL) { ctx->session_cache_head = s; ctx->session_cache_tail = s; s->prev = (SSL_SESSION *)&(ctx->session_cache_head); s->next = (SSL_SESSION *)&(ctx->session_cache_tail); } else { if (timeoutcmp(s, ctx->session_cache_head) >= 0) { s->next = ctx->session_cache_head; s->next->prev = s; s->prev = (SSL_SESSION *)&(ctx->session_cache_head); ctx->session_cache_head = s; } else if (timeoutcmp(s, ctx->session_cache_tail) < 0) { s->prev = ctx->session_cache_tail; s->prev->next = s; s->next = (SSL_SESSION *)&(ctx->session_cache_tail); ctx->session_cache_tail = s; } else { next = ctx->session_cache_head->next; while (next != (SSL_SESSION*)&(ctx->session_cache_tail)) { if (timeoutcmp(s, next) >= 0) { s->next = next; s->prev = next->prev; next->prev->next = s; next->prev = s; break; } next = next->next; } } } s->owner = ctx; } void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb) (struct ssl_st *ssl, SSL_SESSION *sess)) { ctx->new_session_cb = cb; } int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx)) (SSL *ssl, SSL_SESSION *sess) { return ctx->new_session_cb; } void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*cb) (SSL_CTX *ctx, SSL_SESSION *sess)) { ctx->remove_session_cb = cb; } void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx)) (SSL_CTX *ctx, SSL_SESSION *sess) { return ctx->remove_session_cb; } void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*cb) (SSL *ssl, const unsigned char *data, int len, int *copy)) { ctx->get_session_cb = cb; } SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx)) (SSL *ssl, const unsigned char *data, int len, int *copy) { return ctx->get_session_cb; } void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb) (const SSL *ssl, int type, int val)) { ctx->info_callback = cb; } void (*SSL_CTX_get_info_callback(SSL_CTX *ctx)) (const SSL *ssl, int type, int val) { return ctx->info_callback; } void SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, X509 **x509, EVP_PKEY **pkey)) { ctx->client_cert_cb = cb; } int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx)) (SSL *ssl, X509 **x509, EVP_PKEY **pkey) { return ctx->client_cert_cb; } void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) { ctx->app_gen_cookie_cb = cb; } void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, unsigned int cookie_len)) { ctx->app_verify_cookie_cb = cb; } int SSL_SESSION_set1_ticket_appdata(SSL_SESSION *ss, const void *data, size_t len) { OPENSSL_free(ss->ticket_appdata); ss->ticket_appdata_len = 0; if (data == NULL || len == 0) { ss->ticket_appdata = NULL; return 1; } ss->ticket_appdata = OPENSSL_memdup(data, len); if (ss->ticket_appdata != NULL) { ss->ticket_appdata_len = len; return 1; } return 0; } int SSL_SESSION_get0_ticket_appdata(SSL_SESSION *ss, void **data, size_t *len) { *data = ss->ticket_appdata; *len = ss->ticket_appdata_len; return 1; } void SSL_CTX_set_stateless_cookie_generate_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, size_t *cookie_len)) { ctx->gen_stateless_cookie_cb = cb; } void SSL_CTX_set_stateless_cookie_verify_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, size_t cookie_len)) { ctx->verify_stateless_cookie_cb = cb; } IMPLEMENT_PEM_rw(SSL_SESSION, SSL_SESSION, PEM_STRING_SSL_SESSION, SSL_SESSION)
ssl
openssl/ssl/ssl_sess.c
openssl
#include <limits.h> #include <string.h> #include <stdio.h> #include "../ssl_local.h" #include "statem_local.h" #include "internal/cryptlib.h" #include <openssl/buffer.h> #include <openssl/objects.h> #include <openssl/evp.h> #include <openssl/rsa.h> #include <openssl/x509.h> #include <openssl/trace.h> #include <openssl/encoder.h> typedef struct x509err2alert_st { int x509err; int alert; } X509ERR2ALERT; const unsigned char hrrrandom[] = { 0xcf, 0x21, 0xad, 0x74, 0xe5, 0x9a, 0x61, 0x11, 0xbe, 0x1d, 0x8c, 0x02, 0x1e, 0x65, 0xb8, 0x91, 0xc2, 0xa2, 0x11, 0x16, 0x7a, 0xbb, 0x8c, 0x5e, 0x07, 0x9e, 0x09, 0xe2, 0xc8, 0xa8, 0x33, 0x9c }; int ossl_statem_set_mutator(SSL *s, ossl_statem_mutate_handshake_cb mutate_handshake_cb, ossl_statem_finish_mutate_handshake_cb finish_mutate_handshake_cb, void *mutatearg) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return 0; sc->statem.mutate_handshake_cb = mutate_handshake_cb; sc->statem.mutatearg = mutatearg; sc->statem.finish_mutate_handshake_cb = finish_mutate_handshake_cb; return 1; } int ssl3_do_write(SSL_CONNECTION *s, uint8_t type) { int ret; size_t written = 0; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->statem.mutate_handshake_cb != NULL && !s->statem.write_in_progress && type == SSL3_RT_HANDSHAKE && s->init_num >= SSL3_HM_HEADER_LENGTH) { unsigned char *msg; size_t msglen; if (!s->statem.mutate_handshake_cb((unsigned char *)s->init_buf->data, s->init_num, &msg, &msglen, s->statem.mutatearg)) return -1; if (msglen < SSL3_HM_HEADER_LENGTH || !BUF_MEM_grow(s->init_buf, msglen)) return -1; memcpy(s->init_buf->data, msg, msglen); s->init_num = msglen; s->init_msg = s->init_buf->data + SSL3_HM_HEADER_LENGTH; s->statem.finish_mutate_handshake_cb(s->statem.mutatearg); s->statem.write_in_progress = 1; } ret = ssl3_write_bytes(ssl, type, &s->init_buf->data[s->init_off], s->init_num, &written); if (ret <= 0) return -1; if (type == SSL3_RT_HANDSHAKE) if (!SSL_CONNECTION_IS_TLS13(s) || (s->statem.hand_state != TLS_ST_SW_SESSION_TICKET && s->statem.hand_state != TLS_ST_CW_KEY_UPDATE && s->statem.hand_state != TLS_ST_SW_KEY_UPDATE)) if (!ssl3_finish_mac(s, (unsigned char *)&s->init_buf->data[s->init_off], written)) return -1; if (written == s->init_num) { s->statem.write_in_progress = 0; if (s->msg_callback) s->msg_callback(1, s->version, type, s->init_buf->data, (size_t)(s->init_off + s->init_num), ssl, s->msg_callback_arg); return 1; } s->init_off += written; s->init_num -= written; return 0; } int tls_close_construct_packet(SSL_CONNECTION *s, WPACKET *pkt, int htype) { size_t msglen; if ((htype != SSL3_MT_CHANGE_CIPHER_SPEC && !WPACKET_close(pkt)) || !WPACKET_get_length(pkt, &msglen) || msglen > INT_MAX) return 0; s->init_num = (int)msglen; s->init_off = 0; return 1; } int tls_setup_handshake(SSL_CONNECTION *s) { int ver_min, ver_max, ok; SSL *ssl = SSL_CONNECTION_GET_SSL(s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!ssl3_init_finished_mac(s)) { return 0; } memset(s->ext.extflags, 0, sizeof(s->ext.extflags)); if (ssl_get_min_max_version(s, &ver_min, &ver_max, NULL) != 0) { SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_NO_PROTOCOLS_AVAILABLE); return 0; } if (sctx->ssl_digest_methods[SSL_MD_MD5_SHA1_IDX] == NULL) { int negotiated_minversion; int md5sha1_needed_maxversion = SSL_CONNECTION_IS_DTLS(s) ? DTLS1_VERSION : TLS1_1_VERSION; if (ssl_version_cmp(s, ver_max, md5sha1_needed_maxversion) <= 0) { SSLfatal_data(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SUITABLE_DIGEST_ALGORITHM, "The max supported SSL/TLS version needs the" " MD5-SHA1 digest but it is not available" " in the loaded providers. Use (D)TLSv1.2 or" " above, or load different providers"); return 0; } ok = 1; negotiated_minversion = SSL_CONNECTION_IS_DTLS(s) ? DTLS1_2_VERSION : TLS1_2_VERSION; if (ssl_version_cmp(s, ver_min, negotiated_minversion) < 0) ok = SSL_set_min_proto_version(ssl, negotiated_minversion); if (!ok) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, ERR_R_INTERNAL_ERROR); return 0; } } ok = 0; if (s->server) { STACK_OF(SSL_CIPHER) *ciphers = SSL_get_ciphers(ssl); int i; for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { const SSL_CIPHER *c = sk_SSL_CIPHER_value(ciphers, i); int cipher_minprotover = SSL_CONNECTION_IS_DTLS(s) ? c->min_dtls : c->min_tls; int cipher_maxprotover = SSL_CONNECTION_IS_DTLS(s) ? c->max_dtls : c->max_tls; if (ssl_version_cmp(s, ver_max, cipher_minprotover) >= 0 && ssl_version_cmp(s, ver_max, cipher_maxprotover) <= 0) { ok = 1; break; } } if (!ok) { SSLfatal_data(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_CIPHERS_AVAILABLE, "No ciphers enabled for max supported " "SSL/TLS version"); return 0; } if (SSL_IS_FIRST_HANDSHAKE(s)) { ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_accept); } else { ssl_tsan_counter(sctx, &sctx->stats.sess_accept_renegotiate); s->s3.tmp.cert_request = 0; } } else { if (SSL_IS_FIRST_HANDSHAKE(s)) ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect); else ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect_renegotiate); memset(s->s3.client_random, 0, sizeof(s->s3.client_random)); s->hit = 0; s->s3.tmp.cert_req = 0; if (SSL_CONNECTION_IS_DTLS(s)) s->statem.use_timer = 1; } return 1; } #define TLS13_TBS_START_SIZE 64 #define TLS13_TBS_PREAMBLE_SIZE (TLS13_TBS_START_SIZE + 33 + 1) static int get_cert_verify_tbs_data(SSL_CONNECTION *s, unsigned char *tls13tbs, void **hdata, size_t *hdatalen) { static const char servercontext[] = "\x54\x4c\x53\x20\x31\x2e\x33\x2c\x20\x73\x65\x72" "\x76\x65\x72\x20\x43\x65\x72\x74\x69\x66\x69\x63\x61\x74\x65\x56\x65\x72\x69\x66\x79"; static const char clientcontext[] = "\x54\x4c\x53\x20\x31\x2e\x33\x2c\x20\x63\x6c\x69" "\x65\x6e\x74\x20\x43\x65\x72\x74\x69\x66\x69\x63\x61\x74\x65\x56\x65\x72\x69\x66\x79"; if (SSL_CONNECTION_IS_TLS13(s)) { size_t hashlen; memset(tls13tbs, 32, TLS13_TBS_START_SIZE); if (s->statem.hand_state == TLS_ST_CR_CERT_VRFY || s->statem.hand_state == TLS_ST_SW_CERT_VRFY) strcpy((char *)tls13tbs + TLS13_TBS_START_SIZE, servercontext); else strcpy((char *)tls13tbs + TLS13_TBS_START_SIZE, clientcontext); if (s->statem.hand_state == TLS_ST_CR_CERT_VRFY || s->statem.hand_state == TLS_ST_SR_CERT_VRFY) { memcpy(tls13tbs + TLS13_TBS_PREAMBLE_SIZE, s->cert_verify_hash, s->cert_verify_hash_len); hashlen = s->cert_verify_hash_len; } else if (!ssl_handshake_hash(s, tls13tbs + TLS13_TBS_PREAMBLE_SIZE, EVP_MAX_MD_SIZE, &hashlen)) { return 0; } *hdata = tls13tbs; *hdatalen = TLS13_TBS_PREAMBLE_SIZE + hashlen; } else { size_t retlen; long retlen_l; retlen = retlen_l = BIO_get_mem_data(s->s3.handshake_buffer, hdata); if (retlen_l <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } *hdatalen = retlen; } return 1; } CON_FUNC_RETURN tls_construct_cert_verify(SSL_CONNECTION *s, WPACKET *pkt) { EVP_PKEY *pkey = NULL; const EVP_MD *md = NULL; EVP_MD_CTX *mctx = NULL; EVP_PKEY_CTX *pctx = NULL; size_t hdatalen = 0, siglen = 0; void *hdata; unsigned char *sig = NULL; unsigned char tls13tbs[TLS13_TBS_PREAMBLE_SIZE + EVP_MAX_MD_SIZE]; const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (lu == NULL || s->s3.tmp.cert == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pkey = s->s3.tmp.cert->privatekey; if (pkey == NULL || !tls1_lookup_md(sctx, lu, &md)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } mctx = EVP_MD_CTX_new(); if (mctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (!get_cert_verify_tbs_data(s, tls13tbs, &hdata, &hdatalen)) { goto err; } if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (EVP_DigestSignInit_ex(mctx, &pctx, md == NULL ? NULL : EVP_MD_get0_name(md), sctx->libctx, sctx->propq, pkey, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (lu->sig == EVP_PKEY_RSA_PSS) { if (EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) <= 0 || EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, RSA_PSS_SALTLEN_DIGEST) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } } if (s->version == SSL3_VERSION) { if (EVP_DigestSignUpdate(mctx, hdata, hdatalen) <= 0 || EVP_MD_CTX_ctrl(mctx, EVP_CTRL_SSL3_MASTER_SECRET, (int)s->session->master_key_length, s->session->master_key) <= 0 || EVP_DigestSignFinal(mctx, NULL, &siglen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } sig = OPENSSL_malloc(siglen); if (sig == NULL || EVP_DigestSignFinal(mctx, sig, &siglen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } } else { if (EVP_DigestSign(mctx, NULL, &siglen, hdata, hdatalen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } sig = OPENSSL_malloc(siglen); if (sig == NULL || EVP_DigestSign(mctx, sig, &siglen, hdata, hdatalen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } } #ifndef OPENSSL_NO_GOST { int pktype = lu->sig; if (pktype == NID_id_GostR3410_2001 || pktype == NID_id_GostR3410_2012_256 || pktype == NID_id_GostR3410_2012_512) BUF_reverse(sig, NULL, siglen); } #endif if (!WPACKET_sub_memcpy_u16(pkt, sig, siglen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!ssl3_digest_cached_records(s, 0)) { goto err; } OPENSSL_free(sig); EVP_MD_CTX_free(mctx); return CON_FUNC_SUCCESS; err: OPENSSL_free(sig); EVP_MD_CTX_free(mctx); return CON_FUNC_ERROR; } MSG_PROCESS_RETURN tls_process_cert_verify(SSL_CONNECTION *s, PACKET *pkt) { EVP_PKEY *pkey = NULL; const unsigned char *data; #ifndef OPENSSL_NO_GOST unsigned char *gost_data = NULL; #endif MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR; int j; unsigned int len; const EVP_MD *md = NULL; size_t hdatalen = 0; void *hdata; unsigned char tls13tbs[TLS13_TBS_PREAMBLE_SIZE + EVP_MAX_MD_SIZE]; EVP_MD_CTX *mctx = EVP_MD_CTX_new(); EVP_PKEY_CTX *pctx = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (mctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } pkey = tls_get_peer_pkey(s); if (pkey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (ssl_cert_lookup_by_pkey(pkey, NULL, sctx) == NULL) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE); goto err; } if (SSL_USE_SIGALGS(s)) { unsigned int sigalg; if (!PACKET_get_net_2(pkt, &sigalg)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_PACKET); goto err; } if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) { goto err; } } else if (!tls1_set_peer_legacy_sigalg(s, pkey)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LEGACY_SIGALG_DISALLOWED_OR_UNSUPPORTED); goto err; } if (!tls1_lookup_md(sctx, s->s3.tmp.peer_sigalg, &md)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_USE_SIGALGS(s)) OSSL_TRACE1(TLS, "USING TLSv1.2 HASH %s\n", md == NULL ? "n/a" : EVP_MD_get0_name(md)); #ifndef OPENSSL_NO_GOST if (!SSL_USE_SIGALGS(s) && ((PACKET_remaining(pkt) == 64 && (EVP_PKEY_get_id(pkey) == NID_id_GostR3410_2001 || EVP_PKEY_get_id(pkey) == NID_id_GostR3410_2012_256)) || (PACKET_remaining(pkt) == 128 && EVP_PKEY_get_id(pkey) == NID_id_GostR3410_2012_512))) { len = PACKET_remaining(pkt); } else #endif if (!PACKET_get_net_2(pkt, &len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!PACKET_get_bytes(pkt, &data, len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!get_cert_verify_tbs_data(s, tls13tbs, &hdata, &hdatalen)) { goto err; } OSSL_TRACE1(TLS, "Using client verify alg %s\n", md == NULL ? "n/a" : EVP_MD_get0_name(md)); if (EVP_DigestVerifyInit_ex(mctx, &pctx, md == NULL ? NULL : EVP_MD_get0_name(md), sctx->libctx, sctx->propq, pkey, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } #ifndef OPENSSL_NO_GOST { int pktype = EVP_PKEY_get_id(pkey); if (pktype == NID_id_GostR3410_2001 || pktype == NID_id_GostR3410_2012_256 || pktype == NID_id_GostR3410_2012_512) { if ((gost_data = OPENSSL_malloc(len)) == NULL) goto err; BUF_reverse(gost_data, data, len); data = gost_data; } } #endif if (SSL_USE_PSS(s)) { if (EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) <= 0 || EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, RSA_PSS_SALTLEN_DIGEST) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } } if (s->version == SSL3_VERSION) { if (EVP_DigestVerifyUpdate(mctx, hdata, hdatalen) <= 0 || EVP_MD_CTX_ctrl(mctx, EVP_CTRL_SSL3_MASTER_SECRET, (int)s->session->master_key_length, s->session->master_key) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_DigestVerifyFinal(mctx, data, len) <= 0) { SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_BAD_SIGNATURE); goto err; } } else { j = EVP_DigestVerify(mctx, data, len, hdata, hdatalen); #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION if (SSL_IS_QUIC_HANDSHAKE(s)) j = 1; #endif if (j <= 0) { SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_BAD_SIGNATURE); goto err; } } if (!s->server && SSL_CONNECTION_IS_TLS13(s) && s->s3.tmp.cert_req == 1) ret = MSG_PROCESS_CONTINUE_PROCESSING; else ret = MSG_PROCESS_CONTINUE_READING; err: BIO_free(s->s3.handshake_buffer); s->s3.handshake_buffer = NULL; EVP_MD_CTX_free(mctx); #ifndef OPENSSL_NO_GOST OPENSSL_free(gost_data); #endif return ret; } CON_FUNC_RETURN tls_construct_finished(SSL_CONNECTION *s, WPACKET *pkt) { size_t finish_md_len; const char *sender; size_t slen; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (!s->server && s->post_handshake_auth != SSL_PHA_REQUESTED) s->statem.cleanuphand = 1; if (SSL_CONNECTION_IS_TLS13(s) && !s->server && (s->early_data_state != SSL_EARLY_DATA_NONE || (s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0) && s->s3.tmp.cert_req == 0 && (!ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_CLIENT_WRITE))) {; return CON_FUNC_ERROR; } if (s->server) { sender = ssl->method->ssl3_enc->server_finished_label; slen = ssl->method->ssl3_enc->server_finished_label_len; } else { sender = ssl->method->ssl3_enc->client_finished_label; slen = ssl->method->ssl3_enc->client_finished_label_len; } finish_md_len = ssl->method->ssl3_enc->final_finish_mac(s, sender, slen, s->s3.tmp.finish_md); if (finish_md_len == 0) { return CON_FUNC_ERROR; } s->s3.tmp.finish_md_len = finish_md_len; if (!WPACKET_memcpy(pkt, s->s3.tmp.finish_md, finish_md_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!SSL_CONNECTION_IS_TLS13(s) && !ssl_log_secret(s, MASTER_SECRET_LABEL, s->session->master_key, s->session->master_key_length)) { return CON_FUNC_ERROR; } if (!ossl_assert(finish_md_len <= EVP_MAX_MD_SIZE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!s->server) { memcpy(s->s3.previous_client_finished, s->s3.tmp.finish_md, finish_md_len); s->s3.previous_client_finished_len = finish_md_len; } else { memcpy(s->s3.previous_server_finished, s->s3.tmp.finish_md, finish_md_len); s->s3.previous_server_finished_len = finish_md_len; } return CON_FUNC_SUCCESS; } CON_FUNC_RETURN tls_construct_key_update(SSL_CONNECTION *s, WPACKET *pkt) { if (!WPACKET_put_bytes_u8(pkt, s->key_update)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } s->key_update = SSL_KEY_UPDATE_NONE; return CON_FUNC_SUCCESS; } MSG_PROCESS_RETURN tls_process_key_update(SSL_CONNECTION *s, PACKET *pkt) { unsigned int updatetype; if (RECORD_LAYER_processed_read_pending(&s->rlayer)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_NOT_ON_RECORD_BOUNDARY); return MSG_PROCESS_ERROR; } if (!PACKET_get_1(pkt, &updatetype) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_KEY_UPDATE); return MSG_PROCESS_ERROR; } if (updatetype != SSL_KEY_UPDATE_NOT_REQUESTED && updatetype != SSL_KEY_UPDATE_REQUESTED) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_UPDATE); return MSG_PROCESS_ERROR; } if (updatetype == SSL_KEY_UPDATE_REQUESTED) s->key_update = SSL_KEY_UPDATE_NOT_REQUESTED; if (!tls13_update_key(s, 0)) { return MSG_PROCESS_ERROR; } return MSG_PROCESS_FINISHED_READING; } int ssl3_take_mac(SSL_CONNECTION *s) { const char *sender; size_t slen; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (!s->server) { sender = ssl->method->ssl3_enc->server_finished_label; slen = ssl->method->ssl3_enc->server_finished_label_len; } else { sender = ssl->method->ssl3_enc->client_finished_label; slen = ssl->method->ssl3_enc->client_finished_label_len; } s->s3.tmp.peer_finish_md_len = ssl->method->ssl3_enc->final_finish_mac(s, sender, slen, s->s3.tmp.peer_finish_md); if (s->s3.tmp.peer_finish_md_len == 0) { return 0; } return 1; } MSG_PROCESS_RETURN tls_process_change_cipher_spec(SSL_CONNECTION *s, PACKET *pkt) { size_t remain; remain = PACKET_remaining(pkt); if (SSL_CONNECTION_IS_DTLS(s)) { if ((s->version == DTLS1_BAD_VER && remain != DTLS1_CCS_HEADER_LENGTH + 1) || (s->version != DTLS1_BAD_VER && remain != DTLS1_CCS_HEADER_LENGTH - 1)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_CHANGE_CIPHER_SPEC); return MSG_PROCESS_ERROR; } } else { if (remain != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_CHANGE_CIPHER_SPEC); return MSG_PROCESS_ERROR; } } if (s->s3.tmp.new_cipher == NULL) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_CCS_RECEIVED_EARLY); return MSG_PROCESS_ERROR; } s->s3.change_cipher_spec = 1; if (!ssl3_do_change_cipher_spec(s)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return MSG_PROCESS_ERROR; } if (SSL_CONNECTION_IS_DTLS(s)) { if (s->version == DTLS1_BAD_VER) s->d1->handshake_read_seq++; #ifndef OPENSSL_NO_SCTP BIO_ctrl(SSL_get_wbio(SSL_CONNECTION_GET_SSL(s)), BIO_CTRL_DGRAM_SCTP_AUTH_CCS_RCVD, 1, NULL); #endif } return MSG_PROCESS_CONTINUE_READING; } MSG_PROCESS_RETURN tls_process_finished(SSL_CONNECTION *s, PACKET *pkt) { size_t md_len; SSL *ssl = SSL_CONNECTION_GET_SSL(s); int was_first = SSL_IS_FIRST_HANDSHAKE(s); int ok; if (s->server) { if (s->rlayer.rrlmethod->set_plain_alerts != NULL) s->rlayer.rrlmethod->set_plain_alerts(s->rlayer.rrl, 0); if (s->post_handshake_auth != SSL_PHA_REQUESTED) s->statem.cleanuphand = 1; if (SSL_CONNECTION_IS_TLS13(s) && !tls13_save_handshake_digest_for_pha(s)) { return MSG_PROCESS_ERROR; } } if (SSL_CONNECTION_IS_TLS13(s) && RECORD_LAYER_processed_read_pending(&s->rlayer)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_NOT_ON_RECORD_BOUNDARY); return MSG_PROCESS_ERROR; } if (!SSL_CONNECTION_IS_TLS13(s) && !s->s3.change_cipher_spec) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_GOT_A_FIN_BEFORE_A_CCS); return MSG_PROCESS_ERROR; } s->s3.change_cipher_spec = 0; md_len = s->s3.tmp.peer_finish_md_len; if (md_len != PACKET_remaining(pkt)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_DIGEST_LENGTH); return MSG_PROCESS_ERROR; } ok = CRYPTO_memcmp(PACKET_data(pkt), s->s3.tmp.peer_finish_md, md_len); #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION if (ok != 0) { if ((PACKET_data(pkt)[0] ^ s->s3.tmp.peer_finish_md[0]) != 0xFF) { ok = 0; } } #endif if (ok != 0) { SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_DIGEST_CHECK_FAILED); return MSG_PROCESS_ERROR; } if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return MSG_PROCESS_ERROR; } if (s->server) { memcpy(s->s3.previous_client_finished, s->s3.tmp.peer_finish_md, md_len); s->s3.previous_client_finished_len = md_len; } else { memcpy(s->s3.previous_server_finished, s->s3.tmp.peer_finish_md, md_len); s->s3.previous_server_finished_len = md_len; } if (SSL_CONNECTION_IS_TLS13(s)) { if (s->server) { if (s->post_handshake_auth != SSL_PHA_REQUESTED && !ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_APPLICATION | SSL3_CHANGE_CIPHER_SERVER_READ)) { return MSG_PROCESS_ERROR; } } else { size_t dummy; if (!ssl->method->ssl3_enc->generate_master_secret(s, s->master_secret, s->handshake_secret, 0, &dummy)) { return MSG_PROCESS_ERROR; } if (!ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_APPLICATION | SSL3_CHANGE_CIPHER_CLIENT_READ)) { return MSG_PROCESS_ERROR; } if (!tls_process_initial_server_flight(s)) { return MSG_PROCESS_ERROR; } } } if (was_first && !SSL_IS_FIRST_HANDSHAKE(s) && s->rlayer.rrlmethod->set_first_handshake != NULL) s->rlayer.rrlmethod->set_first_handshake(s->rlayer.rrl, 0); return MSG_PROCESS_FINISHED_READING; } CON_FUNC_RETURN tls_construct_change_cipher_spec(SSL_CONNECTION *s, WPACKET *pkt) { if (!WPACKET_put_bytes_u8(pkt, SSL3_MT_CCS)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } return CON_FUNC_SUCCESS; } static int ssl_add_cert_to_wpacket(SSL_CONNECTION *s, WPACKET *pkt, X509 *x, int chain, int for_comp) { int len; unsigned char *outbytes; int context = SSL_EXT_TLS1_3_CERTIFICATE; if (for_comp) context |= SSL_EXT_TLS1_3_CERTIFICATE_COMPRESSION; len = i2d_X509(x, NULL); if (len < 0) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BUF_LIB); return 0; } if (!WPACKET_sub_allocate_bytes_u24(pkt, len, &outbytes) || i2d_X509(x, &outbytes) != len) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if ((SSL_CONNECTION_IS_TLS13(s) || for_comp) && !tls_construct_extensions(s, pkt, context, x, chain)) { return 0; } return 1; } static int ssl_add_cert_chain(SSL_CONNECTION *s, WPACKET *pkt, CERT_PKEY *cpk, int for_comp) { int i, chain_count; X509 *x; STACK_OF(X509) *extra_certs; STACK_OF(X509) *chain = NULL; X509_STORE *chain_store; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (cpk == NULL || cpk->x509 == NULL) return 1; x = cpk->x509; if (cpk->chain != NULL) extra_certs = cpk->chain; else extra_certs = sctx->extra_certs; if ((s->mode & SSL_MODE_NO_AUTO_CHAIN) || extra_certs) chain_store = NULL; else if (s->cert->chain_store) chain_store = s->cert->chain_store; else chain_store = sctx->cert_store; if (chain_store != NULL) { X509_STORE_CTX *xs_ctx = X509_STORE_CTX_new_ex(sctx->libctx, sctx->propq); if (xs_ctx == NULL) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_X509_LIB); return 0; } if (!X509_STORE_CTX_init(xs_ctx, chain_store, x, NULL)) { X509_STORE_CTX_free(xs_ctx); if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_X509_LIB); return 0; } (void)X509_verify_cert(xs_ctx); ERR_clear_error(); chain = X509_STORE_CTX_get0_chain(xs_ctx); i = ssl_security_cert_chain(s, chain, NULL, 0); if (i != 1) { #if 0 ERR_raise(ERR_LIB_SSL, SSL_R_EE_KEY_TOO_SMALL); ERR_raise(ERR_LIB_SSL, SSL_R_CA_KEY_TOO_SMALL); ERR_raise(ERR_LIB_SSL, SSL_R_CA_MD_TOO_WEAK); #endif X509_STORE_CTX_free(xs_ctx); if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, i); return 0; } chain_count = sk_X509_num(chain); for (i = 0; i < chain_count; i++) { x = sk_X509_value(chain, i); if (!ssl_add_cert_to_wpacket(s, pkt, x, i, for_comp)) { X509_STORE_CTX_free(xs_ctx); return 0; } } X509_STORE_CTX_free(xs_ctx); } else { i = ssl_security_cert_chain(s, extra_certs, x, 0); if (i != 1) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, i); return 0; } if (!ssl_add_cert_to_wpacket(s, pkt, x, 0, for_comp)) { return 0; } for (i = 0; i < sk_X509_num(extra_certs); i++) { x = sk_X509_value(extra_certs, i); if (!ssl_add_cert_to_wpacket(s, pkt, x, i + 1, for_comp)) { return 0; } } } return 1; } EVP_PKEY* tls_get_peer_pkey(const SSL_CONNECTION *sc) { if (sc->session->peer_rpk != NULL) return sc->session->peer_rpk; if (sc->session->peer != NULL) return X509_get0_pubkey(sc->session->peer); return NULL; } int tls_process_rpk(SSL_CONNECTION *sc, PACKET *pkt, EVP_PKEY **peer_rpk) { EVP_PKEY *pkey = NULL; int ret = 0; RAW_EXTENSION *rawexts = NULL; PACKET extensions; PACKET context; unsigned long cert_len = 0, spki_len = 0; const unsigned char *spki, *spkistart; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(sc); if (SSL_CONNECTION_IS_TLS13(sc)) { if (!PACKET_get_length_prefixed_1(pkt, &context)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT); goto err; } if (sc->server) { if (sc->pha_context == NULL) { if (PACKET_remaining(&context) != 0) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT); goto err; } } else { if (!PACKET_equal(&context, sc->pha_context, sc->pha_context_len)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT); goto err; } } } else { if (PACKET_remaining(&context) != 0) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT); goto err; } } } if (!PACKET_get_net_3(pkt, &cert_len) || PACKET_remaining(pkt) != cert_len) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (cert_len == 0) return 1; if (SSL_CONNECTION_IS_TLS13(sc)) { if (!PACKET_get_net_3(pkt, &spki_len)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (spki_len == 0) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_EMPTY_RAW_PUBLIC_KEY); goto err; } } else { spki_len = cert_len; } if (!PACKET_get_bytes(pkt, &spki, spki_len)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } spkistart = spki; if ((pkey = d2i_PUBKEY_ex(NULL, &spki, spki_len, sctx->libctx, sctx->propq)) == NULL || spki != (spkistart + spki_len)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (EVP_PKEY_missing_parameters(pkey)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS); goto err; } if (SSL_CONNECTION_IS_TLS13(sc)) { if (PACKET_remaining(pkt) != (cert_len - 3 - spki_len)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH); goto err; } if (!PACKET_as_length_prefixed_2(pkt, &extensions) || PACKET_remaining(pkt) != 0) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!tls_collect_extensions(sc, &extensions, SSL_EXT_TLS1_3_RAW_PUBLIC_KEY, &rawexts, NULL, 1)) { goto err; } if (!tls_parse_all_extensions(sc, SSL_EXT_TLS1_3_RAW_PUBLIC_KEY, rawexts, NULL, 0, 1)) { goto err; } } ret = 1; if (peer_rpk != NULL) { *peer_rpk = pkey; pkey = NULL; } err: OPENSSL_free(rawexts); EVP_PKEY_free(pkey); return ret; } unsigned long tls_output_rpk(SSL_CONNECTION *sc, WPACKET *pkt, CERT_PKEY *cpk) { int pdata_len = 0; unsigned char *pdata = NULL; X509_PUBKEY *xpk = NULL; unsigned long ret = 0; X509 *x509 = NULL; if (cpk != NULL && cpk->x509 != NULL) { x509 = cpk->x509; xpk = X509_get_X509_PUBKEY(cpk->x509); if (xpk == NULL) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pdata_len = i2d_X509_PUBKEY(xpk, &pdata); } else if (cpk != NULL && cpk->privatekey != NULL) { pdata_len = i2d_PUBKEY(cpk->privatekey, &pdata); } else { if (sc->server) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!WPACKET_sub_memcpy_u24(pkt, pdata, pdata_len)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } return 1; } if (pdata_len <= 0) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_CONNECTION_IS_TLS13(sc)) { if (!WPACKET_start_sub_packet_u24(pkt)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } if (!WPACKET_sub_memcpy_u24(pkt, pdata, pdata_len)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_CONNECTION_IS_TLS13(sc)) { if (!tls_construct_extensions(sc, pkt, SSL_EXT_TLS1_3_RAW_PUBLIC_KEY, x509, 0)) { goto err; } if (!WPACKET_close(pkt)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } ret = 1; err: OPENSSL_free(pdata); return ret; } unsigned long ssl3_output_cert_chain(SSL_CONNECTION *s, WPACKET *pkt, CERT_PKEY *cpk, int for_comp) { if (!WPACKET_start_sub_packet_u24(pkt)) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!ssl_add_cert_chain(s, pkt, cpk, for_comp)) return 0; if (!WPACKET_close(pkt)) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } WORK_STATE tls_finish_handshake(SSL_CONNECTION *s, ossl_unused WORK_STATE wst, int clearbufs, int stop) { void (*cb) (const SSL *ssl, int type, int val) = NULL; int cleanuphand = s->statem.cleanuphand; SSL *ssl = SSL_CONNECTION_GET_SSL(s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (clearbufs) { if (!SSL_CONNECTION_IS_DTLS(s) #ifndef OPENSSL_NO_SCTP || BIO_dgram_is_sctp(SSL_get_wbio(ssl)) #endif ) { BUF_MEM_free(s->init_buf); s->init_buf = NULL; } if (!ssl_free_wbio_buffer(s)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; } s->init_num = 0; } if (SSL_CONNECTION_IS_TLS13(s) && !s->server && s->post_handshake_auth == SSL_PHA_REQUESTED) s->post_handshake_auth = SSL_PHA_EXT_SENT; if (cleanuphand) { s->renegotiate = 0; s->new_session = 0; s->statem.cleanuphand = 0; s->ext.ticket_expected = 0; ssl3_cleanup_key_block(s); if (s->server) { if (!SSL_CONNECTION_IS_TLS13(s)) ssl_update_cache(s, SSL_SESS_CACHE_SERVER); ssl_tsan_counter(sctx, &sctx->stats.sess_accept_good); s->handshake_func = ossl_statem_accept; } else { if (SSL_CONNECTION_IS_TLS13(s)) { if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) != 0) SSL_CTX_remove_session(s->session_ctx, s->session); } else { ssl_update_cache(s, SSL_SESS_CACHE_CLIENT); } if (s->hit) ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_hit); s->handshake_func = ossl_statem_connect; ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect_good); } if (SSL_CONNECTION_IS_DTLS(s)) { s->d1->handshake_read_seq = 0; s->d1->handshake_write_seq = 0; s->d1->next_handshake_write_seq = 0; dtls1_clear_received_buffer(s); } } if (s->info_callback != NULL) cb = s->info_callback; else if (sctx->info_callback != NULL) cb = sctx->info_callback; ossl_statem_set_in_init(s, 0); if (cb != NULL) { if (cleanuphand || !SSL_CONNECTION_IS_TLS13(s) || SSL_IS_FIRST_HANDSHAKE(s)) cb(ssl, SSL_CB_HANDSHAKE_DONE, 1); } if (!stop) { ossl_statem_set_in_init(s, 1); return WORK_FINISHED_CONTINUE; } return WORK_FINISHED_STOP; } int tls_get_message_header(SSL_CONNECTION *s, int *mt) { int skip_message, i; uint8_t recvd_type; unsigned char *p; size_t l, readbytes; SSL *ssl = SSL_CONNECTION_GET_SSL(s); p = (unsigned char *)s->init_buf->data; do { while (s->init_num < SSL3_HM_HEADER_LENGTH) { i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, &recvd_type, &p[s->init_num], SSL3_HM_HEADER_LENGTH - s->init_num, 0, &readbytes); if (i <= 0) { s->rwstate = SSL_READING; return 0; } if (recvd_type == SSL3_RT_CHANGE_CIPHER_SPEC) { if (s->init_num != 0 || readbytes != 1 || p[0] != SSL3_MT_CCS) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_BAD_CHANGE_CIPHER_SPEC); return 0; } if (s->statem.hand_state == TLS_ST_BEFORE && (s->s3.flags & TLS1_FLAGS_STATELESS) != 0) { return 0; } s->s3.tmp.message_type = *mt = SSL3_MT_CHANGE_CIPHER_SPEC; s->init_num = readbytes - 1; s->init_msg = s->init_buf->data; s->s3.tmp.message_size = readbytes; return 1; } else if (recvd_type != SSL3_RT_HANDSHAKE) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_CCS_RECEIVED_EARLY); return 0; } s->init_num += readbytes; } skip_message = 0; if (!s->server) if (s->statem.hand_state != TLS_ST_OK && p[0] == SSL3_MT_HELLO_REQUEST) if (p[1] == 0 && p[2] == 0 && p[3] == 0) { s->init_num = 0; skip_message = 1; if (s->msg_callback) s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, p, SSL3_HM_HEADER_LENGTH, ssl, s->msg_callback_arg); } } while (skip_message); *mt = *p; s->s3.tmp.message_type = *(p++); if (RECORD_LAYER_is_sslv2_record(&s->rlayer)) { l = s->rlayer.tlsrecs[0].length + SSL3_HM_HEADER_LENGTH; s->s3.tmp.message_size = l; s->init_msg = s->init_buf->data; s->init_num = SSL3_HM_HEADER_LENGTH; } else { n2l3(p, l); if (l > (INT_MAX - SSL3_HM_HEADER_LENGTH)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_EXCESSIVE_MESSAGE_SIZE); return 0; } s->s3.tmp.message_size = l; s->init_msg = s->init_buf->data + SSL3_HM_HEADER_LENGTH; s->init_num = 0; } return 1; } int tls_get_message_body(SSL_CONNECTION *s, size_t *len) { size_t n, readbytes; unsigned char *p; int i; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->s3.tmp.message_type == SSL3_MT_CHANGE_CIPHER_SPEC) { *len = (unsigned long)s->init_num; return 1; } p = s->init_msg; n = s->s3.tmp.message_size - s->init_num; while (n > 0) { i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, NULL, &p[s->init_num], n, 0, &readbytes); if (i <= 0) { s->rwstate = SSL_READING; *len = 0; return 0; } s->init_num += readbytes; n -= readbytes; } if (*(s->init_buf->data) == SSL3_MT_FINISHED && !ssl3_take_mac(s)) { *len = 0; return 0; } if (RECORD_LAYER_is_sslv2_record(&s->rlayer)) { if (!ssl3_finish_mac(s, (unsigned char *)s->init_buf->data, s->init_num)) { *len = 0; return 0; } if (s->msg_callback) s->msg_callback(0, SSL2_VERSION, 0, s->init_buf->data, (size_t)s->init_num, ssl, s->msg_callback_arg); } else { #define SERVER_HELLO_RANDOM_OFFSET (SSL3_HM_HEADER_LENGTH + 2) if (!SSL_CONNECTION_IS_TLS13(s) || (s->s3.tmp.message_type != SSL3_MT_NEWSESSION_TICKET && s->s3.tmp.message_type != SSL3_MT_KEY_UPDATE)) { if (s->s3.tmp.message_type != SSL3_MT_SERVER_HELLO || s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE || memcmp(hrrrandom, s->init_buf->data + SERVER_HELLO_RANDOM_OFFSET, SSL3_RANDOM_SIZE) != 0) { if (!ssl3_finish_mac(s, (unsigned char *)s->init_buf->data, s->init_num + SSL3_HM_HEADER_LENGTH)) { *len = 0; return 0; } } } if (s->msg_callback) s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data, (size_t)s->init_num + SSL3_HM_HEADER_LENGTH, ssl, s->msg_callback_arg); } *len = s->init_num; return 1; } static const X509ERR2ALERT x509table[] = { {X509_V_ERR_APPLICATION_VERIFICATION, SSL_AD_HANDSHAKE_FAILURE}, {X509_V_ERR_CA_KEY_TOO_SMALL, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_EC_KEY_EXPLICIT_PARAMS, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_CA_MD_TOO_WEAK, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_CERT_CHAIN_TOO_LONG, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_CERT_HAS_EXPIRED, SSL_AD_CERTIFICATE_EXPIRED}, {X509_V_ERR_CERT_NOT_YET_VALID, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_CERT_REJECTED, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_CERT_REVOKED, SSL_AD_CERTIFICATE_REVOKED}, {X509_V_ERR_CERT_SIGNATURE_FAILURE, SSL_AD_DECRYPT_ERROR}, {X509_V_ERR_CERT_UNTRUSTED, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_CRL_HAS_EXPIRED, SSL_AD_CERTIFICATE_EXPIRED}, {X509_V_ERR_CRL_NOT_YET_VALID, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_CRL_SIGNATURE_FAILURE, SSL_AD_DECRYPT_ERROR}, {X509_V_ERR_DANE_NO_MATCH, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_EE_KEY_TOO_SMALL, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_EMAIL_MISMATCH, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_HOSTNAME_MISMATCH, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_INVALID_CA, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_INVALID_CALL, SSL_AD_INTERNAL_ERROR}, {X509_V_ERR_INVALID_PURPOSE, SSL_AD_UNSUPPORTED_CERTIFICATE}, {X509_V_ERR_IP_ADDRESS_MISMATCH, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_OUT_OF_MEM, SSL_AD_INTERNAL_ERROR}, {X509_V_ERR_PATH_LENGTH_EXCEEDED, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_STORE_LOOKUP, SSL_AD_INTERNAL_ERROR}, {X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE, SSL_AD_BAD_CERTIFICATE}, {X509_V_ERR_UNABLE_TO_GET_CRL, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE, SSL_AD_UNKNOWN_CA}, {X509_V_ERR_UNSPECIFIED, SSL_AD_INTERNAL_ERROR}, {X509_V_OK, SSL_AD_CERTIFICATE_UNKNOWN} }; int ssl_x509err2alert(int x509err) { const X509ERR2ALERT *tp; for (tp = x509table; tp->x509err != X509_V_OK; ++tp) if (tp->x509err == x509err) break; return tp->alert; } int ssl_allow_compression(SSL_CONNECTION *s) { if (s->options & SSL_OP_NO_COMPRESSION) return 0; return ssl_security(s, SSL_SECOP_COMPRESSION, 0, 0, NULL); } int ssl_version_cmp(const SSL_CONNECTION *s, int versiona, int versionb) { int dtls = SSL_CONNECTION_IS_DTLS(s); if (versiona == versionb) return 0; if (!dtls) return versiona < versionb ? -1 : 1; return DTLS_VERSION_LT(versiona, versionb) ? -1 : 1; } typedef struct { int version; const SSL_METHOD *(*cmeth) (void); const SSL_METHOD *(*smeth) (void); } version_info; #if TLS_MAX_VERSION_INTERNAL != TLS1_3_VERSION # error Code needs update for TLS_method() support beyond TLS1_3_VERSION. #endif static const version_info tls_version_table[] = { #ifndef OPENSSL_NO_TLS1_3 {TLS1_3_VERSION, tlsv1_3_client_method, tlsv1_3_server_method}, #else {TLS1_3_VERSION, NULL, NULL}, #endif #ifndef OPENSSL_NO_TLS1_2 {TLS1_2_VERSION, tlsv1_2_client_method, tlsv1_2_server_method}, #else {TLS1_2_VERSION, NULL, NULL}, #endif #ifndef OPENSSL_NO_TLS1_1 {TLS1_1_VERSION, tlsv1_1_client_method, tlsv1_1_server_method}, #else {TLS1_1_VERSION, NULL, NULL}, #endif #ifndef OPENSSL_NO_TLS1 {TLS1_VERSION, tlsv1_client_method, tlsv1_server_method}, #else {TLS1_VERSION, NULL, NULL}, #endif #ifndef OPENSSL_NO_SSL3 {SSL3_VERSION, sslv3_client_method, sslv3_server_method}, #else {SSL3_VERSION, NULL, NULL}, #endif {0, NULL, NULL}, }; #if DTLS_MAX_VERSION_INTERNAL != DTLS1_2_VERSION # error Code needs update for DTLS_method() support beyond DTLS1_2_VERSION. #endif static const version_info dtls_version_table[] = { #ifndef OPENSSL_NO_DTLS1_2 {DTLS1_2_VERSION, dtlsv1_2_client_method, dtlsv1_2_server_method}, #else {DTLS1_2_VERSION, NULL, NULL}, #endif #ifndef OPENSSL_NO_DTLS1 {DTLS1_VERSION, dtlsv1_client_method, dtlsv1_server_method}, {DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL}, #else {DTLS1_VERSION, NULL, NULL}, {DTLS1_BAD_VER, NULL, NULL}, #endif {0, NULL, NULL}, }; static int ssl_method_error(const SSL_CONNECTION *s, const SSL_METHOD *method) { int version = method->version; if ((s->min_proto_version != 0 && ssl_version_cmp(s, version, s->min_proto_version) < 0) || ssl_security(s, SSL_SECOP_VERSION, 0, version, NULL) == 0) return SSL_R_VERSION_TOO_LOW; if (s->max_proto_version != 0 && ssl_version_cmp(s, version, s->max_proto_version) > 0) return SSL_R_VERSION_TOO_HIGH; if ((s->options & method->mask) != 0) return SSL_R_UNSUPPORTED_PROTOCOL; if ((method->flags & SSL_METHOD_NO_SUITEB) != 0 && tls1_suiteb(s)) return SSL_R_AT_LEAST_TLS_1_2_NEEDED_IN_SUITEB_MODE; return 0; } static int is_tls13_capable(const SSL_CONNECTION *s) { size_t i; int curve; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!ossl_assert(sctx != NULL) || !ossl_assert(s->session_ctx != NULL)) return 0; if (sctx->ext.servername_cb != NULL || s->session_ctx->ext.servername_cb != NULL) return 1; #ifndef OPENSSL_NO_PSK if (s->psk_server_callback != NULL) return 1; #endif if (s->psk_find_session_cb != NULL || s->cert->cert_cb != NULL) return 1; for (i = 0; i < s->ssl_pkey_num; i++) { switch (i) { case SSL_PKEY_DSA_SIGN: case SSL_PKEY_GOST01: case SSL_PKEY_GOST12_256: case SSL_PKEY_GOST12_512: continue; default: break; } if (!ssl_has_cert(s, i)) continue; if (i != SSL_PKEY_ECC) return 1; curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); if (tls_check_sigalg_curve(s, curve)) return 1; } return 0; } int ssl_version_supported(const SSL_CONNECTION *s, int version, const SSL_METHOD **meth) { const version_info *vent; const version_info *table; switch (SSL_CONNECTION_GET_SSL(s)->method->version) { default: return ssl_version_cmp(s, version, s->version) == 0; case TLS_ANY_VERSION: table = tls_version_table; break; case DTLS_ANY_VERSION: table = dtls_version_table; break; } for (vent = table; vent->version != 0 && ssl_version_cmp(s, version, vent->version) <= 0; ++vent) { const SSL_METHOD *(*thismeth)(void) = s->server ? vent->smeth : vent->cmeth; if (thismeth != NULL && ssl_version_cmp(s, version, vent->version) == 0 && ssl_method_error(s, thismeth()) == 0 && (!s->server || version != TLS1_3_VERSION || is_tls13_capable(s))) { if (meth != NULL) *meth = thismeth(); return 1; } } return 0; } int ssl_check_version_downgrade(SSL_CONNECTION *s) { const version_info *vent; const version_info *table; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->version == ssl->defltmeth->version) return 1; if (ssl->defltmeth->version == TLS_method()->version) table = tls_version_table; else if (ssl->defltmeth->version == DTLS_method()->version) table = dtls_version_table; else { return 0; } for (vent = table; vent->version != 0; ++vent) { if (vent->smeth != NULL && ssl_method_error(s, vent->smeth()) == 0) return s->version == vent->version; } return 0; } int ssl_set_version_bound(int method_version, int version, int *bound) { int valid_tls; int valid_dtls; if (version == 0) { *bound = version; return 1; } valid_tls = version >= SSL3_VERSION && version <= TLS_MAX_VERSION_INTERNAL; valid_dtls = (version == DTLS1_BAD_VER) || (DTLS_VERSION_LE(version, DTLS_MAX_VERSION_INTERNAL) && DTLS_VERSION_GE(version, DTLS1_VERSION)); if (!valid_tls && !valid_dtls) return 0; switch (method_version) { default: break; case TLS_ANY_VERSION: if (valid_tls) *bound = version; break; case DTLS_ANY_VERSION: if (valid_dtls) *bound = version; break; } return 1; } static void check_for_downgrade(SSL_CONNECTION *s, int vers, DOWNGRADE *dgrd) { if (vers == TLS1_2_VERSION && ssl_version_supported(s, TLS1_3_VERSION, NULL)) { *dgrd = DOWNGRADE_TO_1_2; } else if (!SSL_CONNECTION_IS_DTLS(s) && vers < TLS1_2_VERSION && ssl_version_supported(s, TLS1_2_VERSION, NULL)) { *dgrd = DOWNGRADE_TO_1_1; } else { *dgrd = DOWNGRADE_NONE; } } int ssl_choose_server_version(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello, DOWNGRADE *dgrd) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); int server_version = ssl->method->version; int client_version = hello->legacy_version; const version_info *vent; const version_info *table; int disabled = 0; RAW_EXTENSION *suppversions; s->client_version = client_version; switch (server_version) { default: if (!SSL_CONNECTION_IS_TLS13(s)) { if (ssl_version_cmp(s, client_version, s->version) < 0) return SSL_R_WRONG_SSL_VERSION; *dgrd = DOWNGRADE_NONE; return 0; } case TLS_ANY_VERSION: table = tls_version_table; break; case DTLS_ANY_VERSION: table = dtls_version_table; break; } suppversions = &hello->pre_proc_exts[TLSEXT_IDX_supported_versions]; if (!suppversions->present && s->hello_retry_request != SSL_HRR_NONE) return SSL_R_UNSUPPORTED_PROTOCOL; if (suppversions->present && !SSL_CONNECTION_IS_DTLS(s)) { unsigned int candidate_vers = 0; unsigned int best_vers = 0; const SSL_METHOD *best_method = NULL; PACKET versionslist; suppversions->parsed = 1; if (!PACKET_as_length_prefixed_1(&suppversions->data, &versionslist)) { return SSL_R_LENGTH_MISMATCH; } if (client_version <= SSL3_VERSION) return SSL_R_BAD_LEGACY_VERSION; while (PACKET_get_net_2(&versionslist, &candidate_vers)) { if (ssl_version_cmp(s, candidate_vers, best_vers) <= 0) continue; if (ssl_version_supported(s, candidate_vers, &best_method)) best_vers = candidate_vers; } if (PACKET_remaining(&versionslist) != 0) { return SSL_R_LENGTH_MISMATCH; } if (best_vers > 0) { if (s->hello_retry_request != SSL_HRR_NONE) { if (best_vers != TLS1_3_VERSION) return SSL_R_UNSUPPORTED_PROTOCOL; return 0; } check_for_downgrade(s, best_vers, dgrd); s->version = best_vers; ssl->method = best_method; if (!ssl_set_record_protocol_version(s, best_vers)) return ERR_R_INTERNAL_ERROR; return 0; } return SSL_R_UNSUPPORTED_PROTOCOL; } if (ssl_version_cmp(s, client_version, TLS1_3_VERSION) >= 0) client_version = TLS1_2_VERSION; for (vent = table; vent->version != 0; ++vent) { const SSL_METHOD *method; if (vent->smeth == NULL || ssl_version_cmp(s, client_version, vent->version) < 0) continue; method = vent->smeth(); if (ssl_method_error(s, method) == 0) { check_for_downgrade(s, vent->version, dgrd); s->version = vent->version; ssl->method = method; if (!ssl_set_record_protocol_version(s, s->version)) return ERR_R_INTERNAL_ERROR; return 0; } disabled = 1; } return disabled ? SSL_R_UNSUPPORTED_PROTOCOL : SSL_R_VERSION_TOO_LOW; } int ssl_choose_client_version(SSL_CONNECTION *s, int version, RAW_EXTENSION *extensions) { const version_info *vent; const version_info *table; int ret, ver_min, ver_max, real_max, origv; SSL *ssl = SSL_CONNECTION_GET_SSL(s); origv = s->version; s->version = version; if (!tls_parse_extension(s, TLSEXT_IDX_supported_versions, SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_SERVER_HELLO, extensions, NULL, 0)) { s->version = origv; return 0; } if (s->hello_retry_request != SSL_HRR_NONE && s->version != TLS1_3_VERSION) { s->version = origv; SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_SSL_VERSION); return 0; } switch (ssl->method->version) { default: if (s->version != ssl->method->version) { s->version = origv; SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_SSL_VERSION); return 0; } if (!ssl_set_record_protocol_version(s, s->version)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; case TLS_ANY_VERSION: table = tls_version_table; break; case DTLS_ANY_VERSION: table = dtls_version_table; break; } ret = ssl_get_min_max_version(s, &ver_min, &ver_max, &real_max); if (ret != 0) { s->version = origv; SSLfatal(s, SSL_AD_PROTOCOL_VERSION, ret); return 0; } if (ssl_version_cmp(s, s->version, ver_min) < 0 || ssl_version_cmp(s, s->version, ver_max) > 0) { s->version = origv; SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_UNSUPPORTED_PROTOCOL); return 0; } if ((s->mode & SSL_MODE_SEND_FALLBACK_SCSV) == 0) real_max = ver_max; if (s->version == TLS1_2_VERSION && real_max > s->version) { if (memcmp(tls12downgrade, s->s3.server_random + SSL3_RANDOM_SIZE - sizeof(tls12downgrade), sizeof(tls12downgrade)) == 0) { s->version = origv; SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INAPPROPRIATE_FALLBACK); return 0; } } else if (!SSL_CONNECTION_IS_DTLS(s) && s->version < TLS1_2_VERSION && real_max > s->version) { if (memcmp(tls11downgrade, s->s3.server_random + SSL3_RANDOM_SIZE - sizeof(tls11downgrade), sizeof(tls11downgrade)) == 0) { s->version = origv; SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INAPPROPRIATE_FALLBACK); return 0; } } for (vent = table; vent->version != 0; ++vent) { if (vent->cmeth == NULL || s->version != vent->version) continue; ssl->method = vent->cmeth(); if (!ssl_set_record_protocol_version(s, s->version)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } s->version = origv; SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_UNSUPPORTED_PROTOCOL); return 0; } int ssl_get_min_max_version(const SSL_CONNECTION *s, int *min_version, int *max_version, int *real_max) { int version, tmp_real_max; int hole; const SSL_METHOD *method; const version_info *table; const version_info *vent; const SSL *ssl = SSL_CONNECTION_GET_SSL(s); switch (ssl->method->version) { default: *min_version = *max_version = s->version; if (!ossl_assert(real_max == NULL)) return ERR_R_INTERNAL_ERROR; return 0; case TLS_ANY_VERSION: table = tls_version_table; break; case DTLS_ANY_VERSION: table = dtls_version_table; break; } *min_version = version = 0; hole = 1; if (real_max != NULL) *real_max = 0; tmp_real_max = 0; for (vent = table; vent->version != 0; ++vent) { if (vent->cmeth == NULL) { hole = 1; tmp_real_max = 0; continue; } method = vent->cmeth(); if (hole == 1 && tmp_real_max == 0) tmp_real_max = vent->version; if (ssl_method_error(s, method) != 0) { hole = 1; } else if (!hole) { *min_version = method->version; } else { if (real_max != NULL && tmp_real_max != 0) *real_max = tmp_real_max; version = method->version; *min_version = version; hole = 0; } } *max_version = version; if (version == 0) return SSL_R_NO_PROTOCOLS_AVAILABLE; return 0; } int ssl_set_client_hello_version(SSL_CONNECTION *s) { int ver_min, ver_max, ret; if (!SSL_IS_FIRST_HANDSHAKE(s)) return 0; ret = ssl_get_min_max_version(s, &ver_min, &ver_max, NULL); if (ret != 0) return ret; s->version = ver_max; if (SSL_CONNECTION_IS_DTLS(s)) { if (ver_max == DTLS1_BAD_VER) { if (!ssl_set_record_protocol_version(s, ver_max)) return 0; } } else if (ver_max > TLS1_2_VERSION) { ver_max = TLS1_2_VERSION; } s->client_version = ver_max; return 0; } int check_in_list(SSL_CONNECTION *s, uint16_t group_id, const uint16_t *groups, size_t num_groups, int checkallow) { size_t i; if (groups == NULL || num_groups == 0) return 0; for (i = 0; i < num_groups; i++) { uint16_t group = groups[i]; if (group_id == group && (!checkallow || tls_group_allowed(s, group, SSL_SECOP_CURVE_CHECK))) { return 1; } } return 0; } int create_synthetic_message_hash(SSL_CONNECTION *s, const unsigned char *hashval, size_t hashlen, const unsigned char *hrr, size_t hrrlen) { unsigned char hashvaltmp[EVP_MAX_MD_SIZE]; unsigned char msghdr[SSL3_HM_HEADER_LENGTH]; memset(msghdr, 0, sizeof(msghdr)); if (hashval == NULL) { hashval = hashvaltmp; hashlen = 0; if (!ssl3_digest_cached_records(s, 0) || !ssl_handshake_hash(s, hashvaltmp, sizeof(hashvaltmp), &hashlen)) { return 0; } } if (!ssl3_init_finished_mac(s)) { return 0; } msghdr[0] = SSL3_MT_MESSAGE_HASH; msghdr[SSL3_HM_HEADER_LENGTH - 1] = (unsigned char)hashlen; if (!ssl3_finish_mac(s, msghdr, SSL3_HM_HEADER_LENGTH) || !ssl3_finish_mac(s, hashval, hashlen)) { return 0; } if (hrr != NULL && (!ssl3_finish_mac(s, hrr, hrrlen) || !ssl3_finish_mac(s, (unsigned char *)s->init_buf->data, s->s3.tmp.message_size + SSL3_HM_HEADER_LENGTH))) { return 0; } return 1; } static int ca_dn_cmp(const X509_NAME *const *a, const X509_NAME *const *b) { return X509_NAME_cmp(*a, *b); } int parse_ca_names(SSL_CONNECTION *s, PACKET *pkt) { STACK_OF(X509_NAME) *ca_sk = sk_X509_NAME_new(ca_dn_cmp); X509_NAME *xn = NULL; PACKET cadns; if (ca_sk == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (!PACKET_get_length_prefixed_2(pkt, &cadns)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } while (PACKET_remaining(&cadns)) { const unsigned char *namestart, *namebytes; unsigned int name_len; if (!PACKET_get_net_2(&cadns, &name_len) || !PACKET_get_bytes(&cadns, &namebytes, name_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } namestart = namebytes; if ((xn = d2i_X509_NAME(NULL, &namebytes, name_len)) == NULL) { SSLfatal(s, SSL_AD_DECODE_ERROR, ERR_R_ASN1_LIB); goto err; } if (namebytes != (namestart + name_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_CA_DN_LENGTH_MISMATCH); goto err; } if (!sk_X509_NAME_push(ca_sk, xn)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } xn = NULL; } sk_X509_NAME_pop_free(s->s3.tmp.peer_ca_names, X509_NAME_free); s->s3.tmp.peer_ca_names = ca_sk; return 1; err: sk_X509_NAME_pop_free(ca_sk, X509_NAME_free); X509_NAME_free(xn); return 0; } const STACK_OF(X509_NAME) *get_ca_names(SSL_CONNECTION *s) { const STACK_OF(X509_NAME) *ca_sk = NULL; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->server) { ca_sk = SSL_get_client_CA_list(ssl); if (ca_sk != NULL && sk_X509_NAME_num(ca_sk) == 0) ca_sk = NULL; } if (ca_sk == NULL) ca_sk = SSL_get0_CA_list(ssl); return ca_sk; } int construct_ca_names(SSL_CONNECTION *s, const STACK_OF(X509_NAME) *ca_sk, WPACKET *pkt) { if (!WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if ((ca_sk != NULL) && !(s->options & SSL_OP_DISABLE_TLSEXT_CA_NAMES)) { int i; for (i = 0; i < sk_X509_NAME_num(ca_sk); i++) { unsigned char *namebytes; X509_NAME *name = sk_X509_NAME_value(ca_sk, i); int namelen; if (name == NULL || (namelen = i2d_X509_NAME(name, NULL)) < 0 || !WPACKET_sub_allocate_bytes_u16(pkt, namelen, &namebytes) || i2d_X509_NAME(name, &namebytes) != namelen) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } } if (!WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } size_t construct_key_exchange_tbs(SSL_CONNECTION *s, unsigned char **ptbs, const void *param, size_t paramlen) { size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen; unsigned char *tbs = OPENSSL_malloc(tbslen); if (tbs == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE); memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE); memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen); *ptbs = tbs; return tbslen; } int tls13_save_handshake_digest_for_pha(SSL_CONNECTION *s) { if (s->pha_dgst == NULL) { if (!ssl3_digest_cached_records(s, 1)) return 0; s->pha_dgst = EVP_MD_CTX_new(); if (s->pha_dgst == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!EVP_MD_CTX_copy_ex(s->pha_dgst, s->s3.handshake_dgst)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); EVP_MD_CTX_free(s->pha_dgst); s->pha_dgst = NULL; return 0; } } return 1; } int tls13_restore_handshake_digest_for_pha(SSL_CONNECTION *s) { if (s->pha_dgst == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!EVP_MD_CTX_copy_ex(s->s3.handshake_dgst, s->pha_dgst)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } #ifndef OPENSSL_NO_COMP_ALG MSG_PROCESS_RETURN tls13_process_compressed_certificate(SSL_CONNECTION *sc, PACKET *pkt, PACKET *tmppkt, BUF_MEM *buf) { MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR; int comp_alg; COMP_METHOD *method = NULL; COMP_CTX *comp = NULL; size_t expected_length; size_t comp_length; int i; int found = 0; if (buf == NULL) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!PACKET_get_net_2(pkt, (unsigned int*)&comp_alg)) { SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, ERR_R_INTERNAL_ERROR); goto err; } if (sc->cert_comp_prefs[0] != TLSEXT_comp_cert_none) { for (i = 0; sc->cert_comp_prefs[i] != TLSEXT_comp_cert_none; i++) { if (sc->cert_comp_prefs[i] == comp_alg) { found = 1; break; } } if (!found) { SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_COMPRESSION_ALGORITHM); goto err; } } if (!ossl_comp_has_alg(comp_alg)) { SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_COMPRESSION_ALGORITHM); goto err; } switch (comp_alg) { case TLSEXT_comp_cert_zlib: method = COMP_zlib_oneshot(); break; case TLSEXT_comp_cert_brotli: method = COMP_brotli_oneshot(); break; case TLSEXT_comp_cert_zstd: method = COMP_zstd_oneshot(); break; default: SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_COMPRESSION_ALGORITHM); goto err; } if ((comp = COMP_CTX_new(method)) == NULL || !PACKET_get_net_3_len(pkt, &expected_length) || !PACKET_get_net_3_len(pkt, &comp_length) || PACKET_remaining(pkt) != comp_length || !BUF_MEM_grow(buf, expected_length) || !PACKET_buf_init(tmppkt, (unsigned char *)buf->data, expected_length) || COMP_expand_block(comp, (unsigned char *)buf->data, expected_length, (unsigned char*)PACKET_data(pkt), comp_length) != (int)expected_length) { SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_DECOMPRESSION); goto err; } ret = MSG_PROCESS_CONTINUE_PROCESSING; err: COMP_CTX_free(comp); return ret; } #endif
statem
openssl/ssl/statem/statem_lib.c
openssl
#include <openssl/ct.h> #include "../ssl_local.h" #include "internal/cryptlib.h" #include "statem_local.h" typedef struct { void *add_arg; custom_ext_add_cb add_cb; custom_ext_free_cb free_cb; } custom_ext_add_cb_wrap; typedef struct { void *parse_arg; custom_ext_parse_cb parse_cb; } custom_ext_parse_cb_wrap; static int custom_ext_add_old_cb_wrap(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char **out, size_t *outlen, X509 *x, size_t chainidx, int *al, void *add_arg) { custom_ext_add_cb_wrap *add_cb_wrap = (custom_ext_add_cb_wrap *)add_arg; if (add_cb_wrap->add_cb == NULL) return 1; return add_cb_wrap->add_cb(s, ext_type, out, outlen, al, add_cb_wrap->add_arg); } static void custom_ext_free_old_cb_wrap(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char *out, void *add_arg) { custom_ext_add_cb_wrap *add_cb_wrap = (custom_ext_add_cb_wrap *)add_arg; if (add_cb_wrap->free_cb == NULL) return; add_cb_wrap->free_cb(s, ext_type, out, add_cb_wrap->add_arg); } static int custom_ext_parse_old_cb_wrap(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char *in, size_t inlen, X509 *x, size_t chainidx, int *al, void *parse_arg) { custom_ext_parse_cb_wrap *parse_cb_wrap = (custom_ext_parse_cb_wrap *)parse_arg; if (parse_cb_wrap->parse_cb == NULL) return 1; return parse_cb_wrap->parse_cb(s, ext_type, in, inlen, al, parse_cb_wrap->parse_arg); } custom_ext_method *custom_ext_find(const custom_ext_methods *exts, ENDPOINT role, unsigned int ext_type, size_t *idx) { size_t i; custom_ext_method *meth = exts->meths; for (i = 0; i < exts->meths_count; i++, meth++) { if (ext_type == meth->ext_type && (role == ENDPOINT_BOTH || role == meth->role || meth->role == ENDPOINT_BOTH)) { if (idx != NULL) *idx = i; return meth; } } return NULL; } void custom_ext_init(custom_ext_methods *exts) { size_t i; custom_ext_method *meth = exts->meths; for (i = 0; i < exts->meths_count; i++, meth++) meth->ext_flags = 0; } int custom_ext_parse(SSL_CONNECTION *s, unsigned int context, unsigned int ext_type, const unsigned char *ext_data, size_t ext_size, X509 *x, size_t chainidx) { int al = 0; custom_ext_methods *exts = &s->cert->custext; custom_ext_method *meth; ENDPOINT role = ENDPOINT_BOTH; if ((context & (SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO)) != 0) role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; meth = custom_ext_find(exts, role, ext_type, NULL); if (!meth) return 1; if (!extension_is_relevant(s, meth->context, context)) return 1; if ((context & (SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_SERVER_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS)) != 0) { if ((meth->ext_flags & SSL_EXT_FLAG_SENT) == 0) { SSLfatal(s, TLS1_AD_UNSUPPORTED_EXTENSION, SSL_R_BAD_EXTENSION); return 0; } } if ((context & (SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST)) != 0) meth->ext_flags |= SSL_EXT_FLAG_RECEIVED; if (meth->parse_cb == NULL) return 1; if (meth->parse_cb(SSL_CONNECTION_GET_SSL(s), ext_type, context, ext_data, ext_size, x, chainidx, &al, meth->parse_arg) <= 0) { SSLfatal(s, al, SSL_R_BAD_EXTENSION); return 0; } return 1; } int custom_ext_add(SSL_CONNECTION *s, int context, WPACKET *pkt, X509 *x, size_t chainidx, int maxversion) { custom_ext_methods *exts = &s->cert->custext; custom_ext_method *meth; size_t i; int al; int for_comp = (context & SSL_EXT_TLS1_3_CERTIFICATE_COMPRESSION) != 0; for (i = 0; i < exts->meths_count; i++) { const unsigned char *out = NULL; size_t outlen = 0; meth = exts->meths + i; if (!should_add_extension(s, meth->context, context, maxversion)) continue; if ((context & (SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_SERVER_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS | SSL_EXT_TLS1_3_CERTIFICATE | SSL_EXT_TLS1_3_RAW_PUBLIC_KEY | SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST)) != 0) { if (!(meth->ext_flags & SSL_EXT_FLAG_RECEIVED)) continue; } if ((context & SSL_EXT_CLIENT_HELLO) == 0 && meth->add_cb == NULL) continue; if (meth->add_cb != NULL) { int cb_retval = meth->add_cb(SSL_CONNECTION_GET_SSL(s), meth->ext_type, context, &out, &outlen, x, chainidx, &al, meth->add_arg); if (cb_retval < 0) { if (!for_comp) SSLfatal(s, al, SSL_R_CALLBACK_FAILED); return 0; } if (cb_retval == 0) continue; } if (!WPACKET_put_bytes_u16(pkt, meth->ext_type) || !WPACKET_start_sub_packet_u16(pkt) || (outlen > 0 && !WPACKET_memcpy(pkt, out, outlen)) || !WPACKET_close(pkt)) { if (meth->free_cb != NULL) meth->free_cb(SSL_CONNECTION_GET_SSL(s), meth->ext_type, context, out, meth->add_arg); if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if ((context & SSL_EXT_CLIENT_HELLO) != 0) { if (!ossl_assert((meth->ext_flags & SSL_EXT_FLAG_SENT) == 0)) { if (meth->free_cb != NULL) meth->free_cb(SSL_CONNECTION_GET_SSL(s), meth->ext_type, context, out, meth->add_arg); if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } meth->ext_flags |= SSL_EXT_FLAG_SENT; } if (meth->free_cb != NULL) meth->free_cb(SSL_CONNECTION_GET_SSL(s), meth->ext_type, context, out, meth->add_arg); } return 1; } int custom_exts_copy_flags(custom_ext_methods *dst, const custom_ext_methods *src) { size_t i; custom_ext_method *methsrc = src->meths; for (i = 0; i < src->meths_count; i++, methsrc++) { custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, methsrc->ext_type, NULL); if (methdst == NULL) continue; methdst->ext_flags = methsrc->ext_flags; } return 1; } int custom_exts_copy(custom_ext_methods *dst, const custom_ext_methods *src) { size_t i; int err = 0; if (src->meths_count > 0) { dst->meths = OPENSSL_memdup(src->meths, sizeof(*src->meths) * src->meths_count); if (dst->meths == NULL) return 0; dst->meths_count = src->meths_count; for (i = 0; i < src->meths_count; i++) { custom_ext_method *methsrc = src->meths + i; custom_ext_method *methdst = dst->meths + i; if (methsrc->add_cb != custom_ext_add_old_cb_wrap) continue; if (err) { methdst->add_arg = NULL; methdst->parse_arg = NULL; continue; } methdst->add_arg = OPENSSL_memdup(methsrc->add_arg, sizeof(custom_ext_add_cb_wrap)); methdst->parse_arg = OPENSSL_memdup(methsrc->parse_arg, sizeof(custom_ext_parse_cb_wrap)); if (methdst->add_arg == NULL || methdst->parse_arg == NULL) err = 1; } } if (err) { custom_exts_free(dst); return 0; } return 1; } void custom_exts_free(custom_ext_methods *exts) { size_t i; custom_ext_method *meth; for (i = 0, meth = exts->meths; i < exts->meths_count; i++, meth++) { if (meth->add_cb != custom_ext_add_old_cb_wrap) continue; OPENSSL_free(meth->add_arg); OPENSSL_free(meth->parse_arg); } OPENSSL_free(exts->meths); exts->meths = NULL; exts->meths_count = 0; } int SSL_CTX_has_client_custom_ext(const SSL_CTX *ctx, unsigned int ext_type) { return custom_ext_find(&ctx->cert->custext, ENDPOINT_CLIENT, ext_type, NULL) != NULL; } int ossl_tls_add_custom_ext_intern(SSL_CTX *ctx, custom_ext_methods *exts, ENDPOINT role, unsigned int ext_type, unsigned int context, SSL_custom_ext_add_cb_ex add_cb, SSL_custom_ext_free_cb_ex free_cb, void *add_arg, SSL_custom_ext_parse_cb_ex parse_cb, void *parse_arg) { custom_ext_method *meth, *tmp; if (add_cb == NULL && free_cb != NULL) return 0; if (exts == NULL) exts = &ctx->cert->custext; #ifndef OPENSSL_NO_CT if (ext_type == TLSEXT_TYPE_signed_certificate_timestamp && (context & SSL_EXT_CLIENT_HELLO) != 0 && ctx != NULL && SSL_CTX_ct_is_enabled(ctx)) return 0; #endif if (SSL_extension_supported(ext_type) && ext_type != TLSEXT_TYPE_signed_certificate_timestamp) return 0; if (ext_type > 0xffff) return 0; if (custom_ext_find(exts, role, ext_type, NULL)) return 0; tmp = OPENSSL_realloc(exts->meths, (exts->meths_count + 1) * sizeof(custom_ext_method)); if (tmp == NULL) return 0; exts->meths = tmp; meth = exts->meths + exts->meths_count; memset(meth, 0, sizeof(*meth)); meth->role = role; meth->context = context; meth->parse_cb = parse_cb; meth->add_cb = add_cb; meth->free_cb = free_cb; meth->ext_type = ext_type; meth->add_arg = add_arg; meth->parse_arg = parse_arg; exts->meths_count++; return 1; } static int add_old_custom_ext(SSL_CTX *ctx, ENDPOINT role, unsigned int ext_type, unsigned int context, custom_ext_add_cb add_cb, custom_ext_free_cb free_cb, void *add_arg, custom_ext_parse_cb parse_cb, void *parse_arg) { custom_ext_add_cb_wrap *add_cb_wrap = OPENSSL_malloc(sizeof(*add_cb_wrap)); custom_ext_parse_cb_wrap *parse_cb_wrap = OPENSSL_malloc(sizeof(*parse_cb_wrap)); int ret; if (add_cb_wrap == NULL || parse_cb_wrap == NULL) { OPENSSL_free(add_cb_wrap); OPENSSL_free(parse_cb_wrap); return 0; } add_cb_wrap->add_arg = add_arg; add_cb_wrap->add_cb = add_cb; add_cb_wrap->free_cb = free_cb; parse_cb_wrap->parse_arg = parse_arg; parse_cb_wrap->parse_cb = parse_cb; ret = ossl_tls_add_custom_ext_intern(ctx, NULL, role, ext_type, context, custom_ext_add_old_cb_wrap, custom_ext_free_old_cb_wrap, add_cb_wrap, custom_ext_parse_old_cb_wrap, parse_cb_wrap); if (!ret) { OPENSSL_free(add_cb_wrap); OPENSSL_free(parse_cb_wrap); } return ret; } int SSL_CTX_add_client_custom_ext(SSL_CTX *ctx, unsigned int ext_type, custom_ext_add_cb add_cb, custom_ext_free_cb free_cb, void *add_arg, custom_ext_parse_cb parse_cb, void *parse_arg) { return add_old_custom_ext(ctx, ENDPOINT_CLIENT, ext_type, SSL_EXT_TLS1_2_AND_BELOW_ONLY | SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_IGNORE_ON_RESUMPTION, add_cb, free_cb, add_arg, parse_cb, parse_arg); } int SSL_CTX_add_server_custom_ext(SSL_CTX *ctx, unsigned int ext_type, custom_ext_add_cb add_cb, custom_ext_free_cb free_cb, void *add_arg, custom_ext_parse_cb parse_cb, void *parse_arg) { return add_old_custom_ext(ctx, ENDPOINT_SERVER, ext_type, SSL_EXT_TLS1_2_AND_BELOW_ONLY | SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_IGNORE_ON_RESUMPTION, add_cb, free_cb, add_arg, parse_cb, parse_arg); } int SSL_CTX_add_custom_ext(SSL_CTX *ctx, unsigned int ext_type, unsigned int context, SSL_custom_ext_add_cb_ex add_cb, SSL_custom_ext_free_cb_ex free_cb, void *add_arg, SSL_custom_ext_parse_cb_ex parse_cb, void *parse_arg) { return ossl_tls_add_custom_ext_intern(ctx, NULL, ENDPOINT_BOTH, ext_type, context, add_cb, free_cb, add_arg, parse_cb, parse_arg); } int SSL_extension_supported(unsigned int ext_type) { switch (ext_type) { case TLSEXT_TYPE_application_layer_protocol_negotiation: case TLSEXT_TYPE_ec_point_formats: case TLSEXT_TYPE_supported_groups: case TLSEXT_TYPE_key_share: #ifndef OPENSSL_NO_NEXTPROTONEG case TLSEXT_TYPE_next_proto_neg: #endif case TLSEXT_TYPE_padding: case TLSEXT_TYPE_renegotiate: case TLSEXT_TYPE_max_fragment_length: case TLSEXT_TYPE_server_name: case TLSEXT_TYPE_session_ticket: case TLSEXT_TYPE_signature_algorithms: #ifndef OPENSSL_NO_SRP case TLSEXT_TYPE_srp: #endif #ifndef OPENSSL_NO_OCSP case TLSEXT_TYPE_status_request: #endif #ifndef OPENSSL_NO_CT case TLSEXT_TYPE_signed_certificate_timestamp: #endif #ifndef OPENSSL_NO_SRTP case TLSEXT_TYPE_use_srtp: #endif case TLSEXT_TYPE_encrypt_then_mac: case TLSEXT_TYPE_supported_versions: case TLSEXT_TYPE_extended_master_secret: case TLSEXT_TYPE_psk_kex_modes: case TLSEXT_TYPE_cookie: case TLSEXT_TYPE_early_data: case TLSEXT_TYPE_certificate_authorities: case TLSEXT_TYPE_psk: case TLSEXT_TYPE_post_handshake_auth: case TLSEXT_TYPE_compress_certificate: case TLSEXT_TYPE_client_cert_type: case TLSEXT_TYPE_server_cert_type: return 1; default: return 0; } }
statem
openssl/ssl/statem/extensions_cust.c
openssl
#if defined(__TANDEM) && defined(_SPT_MODEL_) # include <spthread.h> # include <spt_extensions.h> #endif #include <string.h> #include "internal/nelem.h" #include "internal/cryptlib.h" #include "../ssl_local.h" #include "statem_local.h" static int final_renegotiate(SSL_CONNECTION *s, unsigned int context, int sent); static int init_server_name(SSL_CONNECTION *s, unsigned int context); static int final_server_name(SSL_CONNECTION *s, unsigned int context, int sent); static int final_ec_pt_formats(SSL_CONNECTION *s, unsigned int context, int sent); static int init_session_ticket(SSL_CONNECTION *s, unsigned int context); #ifndef OPENSSL_NO_OCSP static int init_status_request(SSL_CONNECTION *s, unsigned int context); #endif #ifndef OPENSSL_NO_NEXTPROTONEG static int init_npn(SSL_CONNECTION *s, unsigned int context); #endif static int init_alpn(SSL_CONNECTION *s, unsigned int context); static int final_alpn(SSL_CONNECTION *s, unsigned int context, int sent); static int init_sig_algs_cert(SSL_CONNECTION *s, unsigned int context); static int init_sig_algs(SSL_CONNECTION *s, unsigned int context); static int init_server_cert_type(SSL_CONNECTION *sc, unsigned int context); static int init_client_cert_type(SSL_CONNECTION *sc, unsigned int context); static int init_certificate_authorities(SSL_CONNECTION *s, unsigned int context); static EXT_RETURN tls_construct_certificate_authorities(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx); static int tls_parse_certificate_authorities(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx); #ifndef OPENSSL_NO_SRP static int init_srp(SSL_CONNECTION *s, unsigned int context); #endif static int init_ec_point_formats(SSL_CONNECTION *s, unsigned int context); static int init_etm(SSL_CONNECTION *s, unsigned int context); static int init_ems(SSL_CONNECTION *s, unsigned int context); static int final_ems(SSL_CONNECTION *s, unsigned int context, int sent); static int init_psk_kex_modes(SSL_CONNECTION *s, unsigned int context); static int final_key_share(SSL_CONNECTION *s, unsigned int context, int sent); #ifndef OPENSSL_NO_SRTP static int init_srtp(SSL_CONNECTION *s, unsigned int context); #endif static int final_sig_algs(SSL_CONNECTION *s, unsigned int context, int sent); static int final_early_data(SSL_CONNECTION *s, unsigned int context, int sent); static int final_maxfragmentlen(SSL_CONNECTION *s, unsigned int context, int sent); static int init_post_handshake_auth(SSL_CONNECTION *s, unsigned int context); static int final_psk(SSL_CONNECTION *s, unsigned int context, int sent); static int tls_init_compress_certificate(SSL_CONNECTION *sc, unsigned int context); static EXT_RETURN tls_construct_compress_certificate(SSL_CONNECTION *sc, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx); static int tls_parse_compress_certificate(SSL_CONNECTION *sc, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx); typedef struct extensions_definition_st { unsigned int type; unsigned int context; int (*init)(SSL_CONNECTION *s, unsigned int context); int (*parse_ctos)(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx); int (*parse_stoc)(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx); EXT_RETURN (*construct_stoc)(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx); EXT_RETURN (*construct_ctos)(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx); int (*final)(SSL_CONNECTION *s, unsigned int context, int sent); } EXTENSION_DEFINITION; #define INVALID_EXTENSION { TLSEXT_TYPE_invalid, 0, NULL, NULL, NULL, NULL, NULL, NULL } static const EXTENSION_DEFINITION ext_defs[] = { { TLSEXT_TYPE_renegotiate, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_SSL3_ALLOWED | SSL_EXT_TLS1_2_AND_BELOW_ONLY, NULL, tls_parse_ctos_renegotiate, tls_parse_stoc_renegotiate, tls_construct_stoc_renegotiate, tls_construct_ctos_renegotiate, final_renegotiate }, { TLSEXT_TYPE_server_name, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, init_server_name, tls_parse_ctos_server_name, tls_parse_stoc_server_name, tls_construct_stoc_server_name, tls_construct_ctos_server_name, final_server_name }, { TLSEXT_TYPE_max_fragment_length, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, NULL, tls_parse_ctos_maxfragmentlen, tls_parse_stoc_maxfragmentlen, tls_construct_stoc_maxfragmentlen, tls_construct_ctos_maxfragmentlen, final_maxfragmentlen }, #ifndef OPENSSL_NO_SRP { TLSEXT_TYPE_srp, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_AND_BELOW_ONLY, init_srp, tls_parse_ctos_srp, NULL, NULL, tls_construct_ctos_srp, NULL }, #else INVALID_EXTENSION, #endif { TLSEXT_TYPE_ec_point_formats, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_2_AND_BELOW_ONLY, init_ec_point_formats, tls_parse_ctos_ec_pt_formats, tls_parse_stoc_ec_pt_formats, tls_construct_stoc_ec_pt_formats, tls_construct_ctos_ec_pt_formats, final_ec_pt_formats }, { TLSEXT_TYPE_supported_groups, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS | SSL_EXT_TLS1_2_SERVER_HELLO, NULL, tls_parse_ctos_supported_groups, NULL, tls_construct_stoc_supported_groups, tls_construct_ctos_supported_groups, NULL }, { TLSEXT_TYPE_session_ticket, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_2_AND_BELOW_ONLY, init_session_ticket, tls_parse_ctos_session_ticket, tls_parse_stoc_session_ticket, tls_construct_stoc_session_ticket, tls_construct_ctos_session_ticket, NULL }, #ifndef OPENSSL_NO_OCSP { TLSEXT_TYPE_status_request, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_CERTIFICATE | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST, init_status_request, tls_parse_ctos_status_request, tls_parse_stoc_status_request, tls_construct_stoc_status_request, tls_construct_ctos_status_request, NULL }, #else INVALID_EXTENSION, #endif #ifndef OPENSSL_NO_NEXTPROTONEG { TLSEXT_TYPE_next_proto_neg, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_2_AND_BELOW_ONLY, init_npn, tls_parse_ctos_npn, tls_parse_stoc_npn, tls_construct_stoc_next_proto_neg, tls_construct_ctos_npn, NULL }, #else INVALID_EXTENSION, #endif { TLSEXT_TYPE_application_layer_protocol_negotiation, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, init_alpn, tls_parse_ctos_alpn, tls_parse_stoc_alpn, tls_construct_stoc_alpn, tls_construct_ctos_alpn, final_alpn }, #ifndef OPENSSL_NO_SRTP { TLSEXT_TYPE_use_srtp, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS | SSL_EXT_DTLS_ONLY, init_srtp, tls_parse_ctos_use_srtp, tls_parse_stoc_use_srtp, tls_construct_stoc_use_srtp, tls_construct_ctos_use_srtp, NULL }, #else INVALID_EXTENSION, #endif { TLSEXT_TYPE_encrypt_then_mac, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_2_AND_BELOW_ONLY, init_etm, tls_parse_ctos_etm, tls_parse_stoc_etm, tls_construct_stoc_etm, tls_construct_ctos_etm, NULL }, #ifndef OPENSSL_NO_CT { TLSEXT_TYPE_signed_certificate_timestamp, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_CERTIFICATE | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST, NULL, NULL, tls_parse_stoc_sct, NULL, tls_construct_ctos_sct, NULL }, #else INVALID_EXTENSION, #endif { TLSEXT_TYPE_extended_master_secret, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_2_AND_BELOW_ONLY, init_ems, tls_parse_ctos_ems, tls_parse_stoc_ems, tls_construct_stoc_ems, tls_construct_ctos_ems, final_ems }, { TLSEXT_TYPE_signature_algorithms_cert, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST, init_sig_algs_cert, tls_parse_ctos_sig_algs_cert, tls_parse_ctos_sig_algs_cert, NULL, NULL, NULL }, { TLSEXT_TYPE_post_handshake_auth, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ONLY, init_post_handshake_auth, tls_parse_ctos_post_handshake_auth, NULL, NULL, tls_construct_ctos_post_handshake_auth, NULL, }, { TLSEXT_TYPE_client_cert_type, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS | SSL_EXT_TLS1_2_SERVER_HELLO, init_client_cert_type, tls_parse_ctos_client_cert_type, tls_parse_stoc_client_cert_type, tls_construct_stoc_client_cert_type, tls_construct_ctos_client_cert_type, NULL }, { TLSEXT_TYPE_server_cert_type, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS | SSL_EXT_TLS1_2_SERVER_HELLO, init_server_cert_type, tls_parse_ctos_server_cert_type, tls_parse_stoc_server_cert_type, tls_construct_stoc_server_cert_type, tls_construct_ctos_server_cert_type, NULL }, { TLSEXT_TYPE_signature_algorithms, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST, init_sig_algs, tls_parse_ctos_sig_algs, tls_parse_ctos_sig_algs, tls_construct_ctos_sig_algs, tls_construct_ctos_sig_algs, final_sig_algs }, { TLSEXT_TYPE_supported_versions, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_SERVER_HELLO | SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST | SSL_EXT_TLS_IMPLEMENTATION_ONLY, NULL, NULL, tls_parse_stoc_supported_versions, tls_construct_stoc_supported_versions, tls_construct_ctos_supported_versions, NULL }, { TLSEXT_TYPE_psk_kex_modes, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS_IMPLEMENTATION_ONLY | SSL_EXT_TLS1_3_ONLY, init_psk_kex_modes, tls_parse_ctos_psk_kex_modes, NULL, NULL, tls_construct_ctos_psk_kex_modes, NULL }, { TLSEXT_TYPE_key_share, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_SERVER_HELLO | SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST | SSL_EXT_TLS_IMPLEMENTATION_ONLY | SSL_EXT_TLS1_3_ONLY, NULL, tls_parse_ctos_key_share, tls_parse_stoc_key_share, tls_construct_stoc_key_share, tls_construct_ctos_key_share, final_key_share }, { TLSEXT_TYPE_cookie, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST | SSL_EXT_TLS_IMPLEMENTATION_ONLY | SSL_EXT_TLS1_3_ONLY, NULL, tls_parse_ctos_cookie, tls_parse_stoc_cookie, tls_construct_stoc_cookie, tls_construct_ctos_cookie, NULL }, { TLSEXT_TYPE_cryptopro_bug, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_2_AND_BELOW_ONLY, NULL, NULL, NULL, tls_construct_stoc_cryptopro_bug, NULL, NULL }, { TLSEXT_TYPE_compress_certificate, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST | SSL_EXT_TLS_IMPLEMENTATION_ONLY | SSL_EXT_TLS1_3_ONLY, tls_init_compress_certificate, tls_parse_compress_certificate, tls_parse_compress_certificate, tls_construct_compress_certificate, tls_construct_compress_certificate, NULL }, { TLSEXT_TYPE_early_data, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS | SSL_EXT_TLS1_3_NEW_SESSION_TICKET | SSL_EXT_TLS1_3_ONLY, NULL, tls_parse_ctos_early_data, tls_parse_stoc_early_data, tls_construct_stoc_early_data, tls_construct_ctos_early_data, final_early_data }, { TLSEXT_TYPE_certificate_authorities, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST | SSL_EXT_TLS1_3_ONLY, init_certificate_authorities, tls_parse_certificate_authorities, tls_parse_certificate_authorities, tls_construct_certificate_authorities, tls_construct_certificate_authorities, NULL, }, { TLSEXT_TYPE_padding, SSL_EXT_CLIENT_HELLO, NULL, NULL, NULL, NULL, tls_construct_ctos_padding, NULL }, { TLSEXT_TYPE_psk, SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_SERVER_HELLO | SSL_EXT_TLS_IMPLEMENTATION_ONLY | SSL_EXT_TLS1_3_ONLY, NULL, tls_parse_ctos_psk, tls_parse_stoc_psk, tls_construct_stoc_psk, tls_construct_ctos_psk, final_psk } }; unsigned int ossl_get_extension_type(size_t idx) { size_t num_exts = OSSL_NELEM(ext_defs); if (idx >= num_exts) return TLSEXT_TYPE_out_of_range; return ext_defs[idx].type; } static int validate_context(SSL_CONNECTION *s, unsigned int extctx, unsigned int thisctx) { if ((thisctx & extctx) == 0) return 0; if (SSL_CONNECTION_IS_DTLS(s)) { if ((extctx & SSL_EXT_TLS_ONLY) != 0) return 0; } else if ((extctx & SSL_EXT_DTLS_ONLY) != 0) { return 0; } return 1; } int tls_validate_all_contexts(SSL_CONNECTION *s, unsigned int thisctx, RAW_EXTENSION *exts) { size_t i, num_exts, builtin_num = OSSL_NELEM(ext_defs), offset; RAW_EXTENSION *thisext; unsigned int context; ENDPOINT role = ENDPOINT_BOTH; if ((thisctx & SSL_EXT_CLIENT_HELLO) != 0) role = ENDPOINT_SERVER; else if ((thisctx & SSL_EXT_TLS1_2_SERVER_HELLO) != 0) role = ENDPOINT_CLIENT; num_exts = builtin_num + s->cert->custext.meths_count; for (thisext = exts, i = 0; i < num_exts; i++, thisext++) { if (!thisext->present) continue; if (i < builtin_num) { context = ext_defs[i].context; } else { custom_ext_method *meth = NULL; meth = custom_ext_find(&s->cert->custext, role, thisext->type, &offset); if (!ossl_assert(meth != NULL)) return 0; context = meth->context; } if (!validate_context(s, context, thisctx)) return 0; } return 1; } static int verify_extension(SSL_CONNECTION *s, unsigned int context, unsigned int type, custom_ext_methods *meths, RAW_EXTENSION *rawexlist, RAW_EXTENSION **found) { size_t i; size_t builtin_num = OSSL_NELEM(ext_defs); const EXTENSION_DEFINITION *thisext; for (i = 0, thisext = ext_defs; i < builtin_num; i++, thisext++) { if (type == thisext->type) { if (!validate_context(s, thisext->context, context)) return 0; *found = &rawexlist[i]; return 1; } } if (meths != NULL) { size_t offset = 0; ENDPOINT role = ENDPOINT_BOTH; custom_ext_method *meth = NULL; if ((context & SSL_EXT_CLIENT_HELLO) != 0) role = ENDPOINT_SERVER; else if ((context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0) role = ENDPOINT_CLIENT; meth = custom_ext_find(meths, role, type, &offset); if (meth != NULL) { if (!validate_context(s, meth->context, context)) return 0; *found = &rawexlist[offset + builtin_num]; return 1; } } *found = NULL; return 1; } int extension_is_relevant(SSL_CONNECTION *s, unsigned int extctx, unsigned int thisctx) { int is_tls13; if ((thisctx & SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) != 0) is_tls13 = 1; else is_tls13 = SSL_CONNECTION_IS_TLS13(s); if ((SSL_CONNECTION_IS_DTLS(s) && (extctx & SSL_EXT_TLS_IMPLEMENTATION_ONLY) != 0) || (s->version == SSL3_VERSION && (extctx & SSL_EXT_SSL3_ALLOWED) == 0) || (is_tls13 && (extctx & SSL_EXT_TLS1_2_AND_BELOW_ONLY) != 0) || (!is_tls13 && (extctx & SSL_EXT_TLS1_3_ONLY) != 0 && (thisctx & SSL_EXT_CLIENT_HELLO) == 0) || (s->server && !is_tls13 && (extctx & SSL_EXT_TLS1_3_ONLY) != 0) || (s->hit && (extctx & SSL_EXT_IGNORE_ON_RESUMPTION) != 0)) return 0; return 1; } int tls_collect_extensions(SSL_CONNECTION *s, PACKET *packet, unsigned int context, RAW_EXTENSION **res, size_t *len, int init) { PACKET extensions = *packet; size_t i = 0; size_t num_exts; custom_ext_methods *exts = &s->cert->custext; RAW_EXTENSION *raw_extensions = NULL; const EXTENSION_DEFINITION *thisexd; *res = NULL; if ((context & SSL_EXT_CLIENT_HELLO) != 0) custom_ext_init(&s->cert->custext); num_exts = OSSL_NELEM(ext_defs) + (exts != NULL ? exts->meths_count : 0); raw_extensions = OPENSSL_zalloc(num_exts * sizeof(*raw_extensions)); if (raw_extensions == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } i = 0; while (PACKET_remaining(&extensions) > 0) { unsigned int type, idx; PACKET extension; RAW_EXTENSION *thisex; if (!PACKET_get_net_2(&extensions, &type) || !PACKET_get_length_prefixed_2(&extensions, &extension)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); goto err; } if (!verify_extension(s, context, type, exts, raw_extensions, &thisex) || (thisex != NULL && thisex->present == 1) || (type == TLSEXT_TYPE_psk && (context & SSL_EXT_CLIENT_HELLO) != 0 && PACKET_remaining(&extensions) != 0)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_EXTENSION); goto err; } idx = thisex - raw_extensions; if (idx < OSSL_NELEM(ext_defs) && (context & (SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST | SSL_EXT_TLS1_3_NEW_SESSION_TICKET)) == 0 && type != TLSEXT_TYPE_cookie && type != TLSEXT_TYPE_renegotiate && type != TLSEXT_TYPE_signed_certificate_timestamp && (s->ext.extflags[idx] & SSL_EXT_FLAG_SENT) == 0 #ifndef OPENSSL_NO_GOST && !((context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0 && type == TLSEXT_TYPE_cryptopro_bug) #endif ) { SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION, SSL_R_UNSOLICITED_EXTENSION); goto err; } if (thisex != NULL) { thisex->data = extension; thisex->present = 1; thisex->type = type; thisex->received_order = i++; if (s->ext.debug_cb) s->ext.debug_cb(SSL_CONNECTION_GET_SSL(s), !s->server, thisex->type, PACKET_data(&thisex->data), PACKET_remaining(&thisex->data), s->ext.debug_arg); } } if (init) { for (thisexd = ext_defs, i = 0; i < OSSL_NELEM(ext_defs); i++, thisexd++) { if (thisexd->init != NULL && (thisexd->context & context) != 0 && extension_is_relevant(s, thisexd->context, context) && !thisexd->init(s, context)) { goto err; } } } *res = raw_extensions; if (len != NULL) *len = num_exts; return 1; err: OPENSSL_free(raw_extensions); return 0; } int tls_parse_extension(SSL_CONNECTION *s, TLSEXT_INDEX idx, int context, RAW_EXTENSION *exts, X509 *x, size_t chainidx) { RAW_EXTENSION *currext = &exts[idx]; int (*parser)(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) = NULL; if (!currext->present) return 1; if (currext->parsed) return 1; currext->parsed = 1; if (idx < OSSL_NELEM(ext_defs)) { const EXTENSION_DEFINITION *extdef = &ext_defs[idx]; if (!extension_is_relevant(s, extdef->context, context)) return 1; parser = s->server ? extdef->parse_ctos : extdef->parse_stoc; if (parser != NULL) return parser(s, &currext->data, context, x, chainidx); } return custom_ext_parse(s, context, currext->type, PACKET_data(&currext->data), PACKET_remaining(&currext->data), x, chainidx); } int tls_parse_all_extensions(SSL_CONNECTION *s, int context, RAW_EXTENSION *exts, X509 *x, size_t chainidx, int fin) { size_t i, numexts = OSSL_NELEM(ext_defs); const EXTENSION_DEFINITION *thisexd; numexts += s->cert->custext.meths_count; for (i = 0; i < numexts; i++) { if (!tls_parse_extension(s, i, context, exts, x, chainidx)) { return 0; } } if (fin) { for (i = 0, thisexd = ext_defs; i < OSSL_NELEM(ext_defs); i++, thisexd++) { if (thisexd->final != NULL && (thisexd->context & context) != 0 && !thisexd->final(s, context, exts[i].present)) { return 0; } } } return 1; } int should_add_extension(SSL_CONNECTION *s, unsigned int extctx, unsigned int thisctx, int max_version) { if ((extctx & thisctx) == 0) return 0; if (!extension_is_relevant(s, extctx, thisctx) || ((extctx & SSL_EXT_TLS1_3_ONLY) != 0 && (thisctx & SSL_EXT_CLIENT_HELLO) != 0 && (SSL_CONNECTION_IS_DTLS(s) || max_version < TLS1_3_VERSION))) return 0; return 1; } int tls_construct_extensions(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { size_t i; int min_version, max_version = 0, reason; const EXTENSION_DEFINITION *thisexd; int for_comp = (context & SSL_EXT_TLS1_3_CERTIFICATE_COMPRESSION) != 0; if (!WPACKET_start_sub_packet_u16(pkt) || ((context & (SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_2_SERVER_HELLO)) != 0 && !WPACKET_set_flags(pkt, WPACKET_FLAGS_ABANDON_ON_ZERO_LENGTH))) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if ((context & SSL_EXT_CLIENT_HELLO) != 0) { reason = ssl_get_min_max_version(s, &min_version, &max_version, NULL); if (reason != 0) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, reason); return 0; } } if ((context & SSL_EXT_CLIENT_HELLO) != 0) { custom_ext_init(&s->cert->custext); } if (!custom_ext_add(s, context, pkt, x, chainidx, max_version)) { return 0; } for (i = 0, thisexd = ext_defs; i < OSSL_NELEM(ext_defs); i++, thisexd++) { EXT_RETURN (*construct)(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx); EXT_RETURN ret; if (!should_add_extension(s, thisexd->context, context, max_version)) continue; construct = s->server ? thisexd->construct_stoc : thisexd->construct_ctos; if (construct == NULL) continue; ret = construct(s, pkt, context, x, chainidx); if (ret == EXT_RETURN_FAIL) { return 0; } if (ret == EXT_RETURN_SENT && (context & (SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_CERTIFICATE_REQUEST | SSL_EXT_TLS1_3_NEW_SESSION_TICKET)) != 0) s->ext.extflags[i] |= SSL_EXT_FLAG_SENT; } if (!WPACKET_close(pkt)) { if (!for_comp) SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } static int final_renegotiate(SSL_CONNECTION *s, unsigned int context, int sent) { if (!s->server) { if (!(s->options & SSL_OP_LEGACY_SERVER_CONNECT) && !(s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION) && !sent) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED); return 0; } return 1; } if (s->renegotiate && !(s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION) && !sent) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED); return 0; } return 1; } static ossl_inline void ssl_tsan_decr(const SSL_CTX *ctx, TSAN_QUALIFIER int *stat) { if (ssl_tsan_lock(ctx)) { tsan_decr(stat); ssl_tsan_unlock(ctx); } } static int init_server_name(SSL_CONNECTION *s, unsigned int context) { if (s->server) { s->servername_done = 0; OPENSSL_free(s->ext.hostname); s->ext.hostname = NULL; } return 1; } static int final_server_name(SSL_CONNECTION *s, unsigned int context, int sent) { int ret = SSL_TLSEXT_ERR_NOACK; int altmp = SSL_AD_UNRECOGNIZED_NAME; SSL *ssl = SSL_CONNECTION_GET_SSL(s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); int was_ticket = (SSL_get_options(ssl) & SSL_OP_NO_TICKET) == 0; if (!ossl_assert(sctx != NULL) || !ossl_assert(s->session_ctx != NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (sctx->ext.servername_cb != NULL) ret = sctx->ext.servername_cb(ssl, &altmp, sctx->ext.servername_arg); else if (s->session_ctx->ext.servername_cb != NULL) ret = s->session_ctx->ext.servername_cb(ssl, &altmp, s->session_ctx->ext.servername_arg); if (s->server) { if (sent && ret == SSL_TLSEXT_ERR_OK && !s->hit) { OPENSSL_free(s->session->ext.hostname); s->session->ext.hostname = OPENSSL_strdup(s->ext.hostname); if (s->session->ext.hostname == NULL && s->ext.hostname != NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); } } } if (SSL_IS_FIRST_HANDSHAKE(s) && sctx != s->session_ctx && s->hello_retry_request == SSL_HRR_NONE) { ssl_tsan_counter(sctx, &sctx->stats.sess_accept); ssl_tsan_decr(s->session_ctx, &s->session_ctx->stats.sess_accept); } if (ret == SSL_TLSEXT_ERR_OK && s->ext.ticket_expected && was_ticket && (SSL_get_options(ssl) & SSL_OP_NO_TICKET) != 0) { s->ext.ticket_expected = 0; if (!s->hit) { SSL_SESSION* ss = SSL_get_session(ssl); if (ss != NULL) { OPENSSL_free(ss->ext.tick); ss->ext.tick = NULL; ss->ext.ticklen = 0; ss->ext.tick_lifetime_hint = 0; ss->ext.tick_age_add = 0; if (!ssl_generate_session_id(s, ss)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } else { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } } switch (ret) { case SSL_TLSEXT_ERR_ALERT_FATAL: SSLfatal(s, altmp, SSL_R_CALLBACK_FAILED); return 0; case SSL_TLSEXT_ERR_ALERT_WARNING: if (!SSL_CONNECTION_IS_TLS13(s)) ssl3_send_alert(s, SSL3_AL_WARNING, altmp); s->servername_done = 0; return 1; case SSL_TLSEXT_ERR_NOACK: s->servername_done = 0; return 1; default: return 1; } } static int final_ec_pt_formats(SSL_CONNECTION *s, unsigned int context, int sent) { unsigned long alg_k, alg_a; if (s->server) return 1; alg_k = s->s3.tmp.new_cipher->algorithm_mkey; alg_a = s->s3.tmp.new_cipher->algorithm_auth; if (s->ext.ecpointformats != NULL && s->ext.ecpointformats_len > 0 && s->ext.peer_ecpointformats != NULL && s->ext.peer_ecpointformats_len > 0 && ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))) { size_t i; unsigned char *list = s->ext.peer_ecpointformats; for (i = 0; i < s->ext.peer_ecpointformats_len; i++) { if (*list++ == TLSEXT_ECPOINTFORMAT_uncompressed) break; } if (i == s->ext.peer_ecpointformats_len) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST); return 0; } } return 1; } static int init_session_ticket(SSL_CONNECTION *s, unsigned int context) { if (!s->server) s->ext.ticket_expected = 0; return 1; } #ifndef OPENSSL_NO_OCSP static int init_status_request(SSL_CONNECTION *s, unsigned int context) { if (s->server) { s->ext.status_type = TLSEXT_STATUSTYPE_nothing; } else { OPENSSL_free(s->ext.ocsp.resp); s->ext.ocsp.resp = NULL; s->ext.ocsp.resp_len = 0; } return 1; } #endif #ifndef OPENSSL_NO_NEXTPROTONEG static int init_npn(SSL_CONNECTION *s, unsigned int context) { s->s3.npn_seen = 0; return 1; } #endif static int init_alpn(SSL_CONNECTION *s, unsigned int context) { OPENSSL_free(s->s3.alpn_selected); s->s3.alpn_selected = NULL; s->s3.alpn_selected_len = 0; if (s->server) { OPENSSL_free(s->s3.alpn_proposed); s->s3.alpn_proposed = NULL; s->s3.alpn_proposed_len = 0; } return 1; } static int final_alpn(SSL_CONNECTION *s, unsigned int context, int sent) { if (!s->server && !sent && s->session->ext.alpn_selected != NULL) s->ext.early_data_ok = 0; if (!s->server || !SSL_CONNECTION_IS_TLS13(s)) return 1; return tls_handle_alpn(s); } static int init_sig_algs(SSL_CONNECTION *s, unsigned int context) { OPENSSL_free(s->s3.tmp.peer_sigalgs); s->s3.tmp.peer_sigalgs = NULL; s->s3.tmp.peer_sigalgslen = 0; return 1; } static int init_sig_algs_cert(SSL_CONNECTION *s, ossl_unused unsigned int context) { OPENSSL_free(s->s3.tmp.peer_cert_sigalgs); s->s3.tmp.peer_cert_sigalgs = NULL; s->s3.tmp.peer_cert_sigalgslen = 0; return 1; } #ifndef OPENSSL_NO_SRP static int init_srp(SSL_CONNECTION *s, unsigned int context) { OPENSSL_free(s->srp_ctx.login); s->srp_ctx.login = NULL; return 1; } #endif static int init_ec_point_formats(SSL_CONNECTION *s, unsigned int context) { OPENSSL_free(s->ext.peer_ecpointformats); s->ext.peer_ecpointformats = NULL; s->ext.peer_ecpointformats_len = 0; return 1; } static int init_etm(SSL_CONNECTION *s, unsigned int context) { s->ext.use_etm = 0; return 1; } static int init_ems(SSL_CONNECTION *s, unsigned int context) { if (s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) { s->s3.flags &= ~TLS1_FLAGS_RECEIVED_EXTMS; s->s3.flags |= TLS1_FLAGS_REQUIRED_EXTMS; } return 1; } static int final_ems(SSL_CONNECTION *s, unsigned int context, int sent) { if (!(s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) && (s->s3.flags & TLS1_FLAGS_REQUIRED_EXTMS)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_INCONSISTENT_EXTMS); return 0; } if (!s->server && s->hit) { if (!(s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) != !(s->session->flags & SSL_SESS_FLAG_EXTMS)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_INCONSISTENT_EXTMS); return 0; } } return 1; } static int init_certificate_authorities(SSL_CONNECTION *s, unsigned int context) { sk_X509_NAME_pop_free(s->s3.tmp.peer_ca_names, X509_NAME_free); s->s3.tmp.peer_ca_names = NULL; return 1; } static EXT_RETURN tls_construct_certificate_authorities(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { const STACK_OF(X509_NAME) *ca_sk = get_ca_names(s); if (ca_sk == NULL || sk_X509_NAME_num(ca_sk) == 0) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_certificate_authorities) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (!construct_ca_names(s, ca_sk, pkt)) { return EXT_RETURN_FAIL; } if (!WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } static int tls_parse_certificate_authorities(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!parse_ca_names(s, pkt)) return 0; if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } return 1; } #ifndef OPENSSL_NO_SRTP static int init_srtp(SSL_CONNECTION *s, unsigned int context) { if (s->server) s->srtp_profile = NULL; return 1; } #endif static int final_sig_algs(SSL_CONNECTION *s, unsigned int context, int sent) { if (!sent && SSL_CONNECTION_IS_TLS13(s) && !s->hit) { SSLfatal(s, TLS13_AD_MISSING_EXTENSION, SSL_R_MISSING_SIGALGS_EXTENSION); return 0; } return 1; } static int final_key_share(SSL_CONNECTION *s, unsigned int context, int sent) { #if !defined(OPENSSL_NO_TLS1_3) if (!SSL_CONNECTION_IS_TLS13(s)) return 1; if ((context & SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) != 0) return 1; if (!s->server && !sent && (!s->hit || (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE) == 0)) { SSLfatal(s, SSL_AD_MISSING_EXTENSION, SSL_R_NO_SUITABLE_KEY_SHARE); return 0; } if (s->server) { if (s->s3.peer_tmp != NULL) { if ((s->s3.flags & TLS1_FLAGS_STATELESS) != 0 && !s->ext.cookieok) { if (!ossl_assert(s->hello_retry_request == SSL_HRR_NONE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->hello_retry_request = SSL_HRR_PENDING; return 1; } } else { if (s->hello_retry_request == SSL_HRR_NONE && sent && (!s->hit || (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) != 0)) { const uint16_t *pgroups, *clntgroups; size_t num_groups, clnt_num_groups, i; unsigned int group_id = 0; tls1_get_peer_groups(s, &clntgroups, &clnt_num_groups); tls1_get_supported_groups(s, &pgroups, &num_groups); for (i = 0; i < num_groups; i++) { group_id = pgroups[i]; if (check_in_list(s, group_id, clntgroups, clnt_num_groups, 1) && tls_group_allowed(s, group_id, SSL_SECOP_CURVE_SUPPORTED) && tls_valid_group(s, group_id, TLS1_3_VERSION, TLS1_3_VERSION, 0, NULL)) break; } if (i < num_groups) { s->s3.group_id = group_id; s->hello_retry_request = SSL_HRR_PENDING; return 1; } } if (!s->hit || (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE) == 0) { SSLfatal(s, sent ? SSL_AD_HANDSHAKE_FAILURE : SSL_AD_MISSING_EXTENSION, SSL_R_NO_SUITABLE_KEY_SHARE); return 0; } if ((s->s3.flags & TLS1_FLAGS_STATELESS) != 0 && !s->ext.cookieok) { if (!ossl_assert(s->hello_retry_request == SSL_HRR_NONE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->hello_retry_request = SSL_HRR_PENDING; return 1; } } if (s->hello_retry_request == SSL_HRR_PENDING) s->hello_retry_request = SSL_HRR_COMPLETE; } else { if (!sent && !tls13_generate_handshake_secret(s, NULL, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } #endif return 1; } static int init_psk_kex_modes(SSL_CONNECTION *s, unsigned int context) { s->ext.psk_kex_mode = TLSEXT_KEX_MODE_FLAG_NONE; return 1; } int tls_psk_do_binder(SSL_CONNECTION *s, const EVP_MD *md, const unsigned char *msgstart, size_t binderoffset, const unsigned char *binderin, unsigned char *binderout, SSL_SESSION *sess, int sign, int external) { EVP_PKEY *mackey = NULL; EVP_MD_CTX *mctx = NULL; unsigned char hash[EVP_MAX_MD_SIZE], binderkey[EVP_MAX_MD_SIZE]; unsigned char finishedkey[EVP_MAX_MD_SIZE], tmpbinder[EVP_MAX_MD_SIZE]; unsigned char *early_secret; static const unsigned char resumption_label[] = "\x72\x65\x73\x20\x62\x69\x6E\x64\x65\x72"; static const unsigned char external_label[] = "\x65\x78\x74\x20\x62\x69\x6E\x64\x65\x72"; const unsigned char *label; size_t bindersize, labelsize, hashsize; int hashsizei = EVP_MD_get_size(md); int ret = -1; int usepskfored = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!ossl_assert(hashsizei >= 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } hashsize = (size_t)hashsizei; if (external && s->early_data_state == SSL_EARLY_DATA_CONNECTING && s->session->ext.max_early_data == 0 && sess->ext.max_early_data > 0) usepskfored = 1; if (external) { label = external_label; labelsize = sizeof(external_label) - 1; } else { label = resumption_label; labelsize = sizeof(resumption_label) - 1; } if (s->server || !external || usepskfored) early_secret = (unsigned char *)s->early_secret; else early_secret = (unsigned char *)sess->early_secret; if (!tls13_generate_secret(s, md, NULL, sess->master_key, sess->master_key_length, early_secret)) { goto err; } mctx = EVP_MD_CTX_new(); if (mctx == NULL || EVP_DigestInit_ex(mctx, md, NULL) <= 0 || EVP_DigestFinal_ex(mctx, hash, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!tls13_hkdf_expand(s, md, early_secret, label, labelsize, hash, hashsize, binderkey, hashsize, 1)) { goto err; } if (!tls13_derive_finishedkey(s, md, binderkey, finishedkey, hashsize)) { goto err; } if (EVP_DigestInit_ex(mctx, md, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (s->hello_retry_request == SSL_HRR_PENDING) { size_t hdatalen; long hdatalen_l; void *hdata; hdatalen = hdatalen_l = BIO_get_mem_data(s->s3.handshake_buffer, &hdata); if (hdatalen_l <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_HANDSHAKE_LENGTH); goto err; } if (s->server) { PACKET hashprefix, msg; if (!PACKET_buf_init(&hashprefix, hdata, hdatalen) || !PACKET_forward(&hashprefix, 1) || !PACKET_get_length_prefixed_3(&hashprefix, &msg) || !PACKET_forward(&hashprefix, 1) || !PACKET_get_length_prefixed_3(&hashprefix, &msg)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } hdatalen -= PACKET_remaining(&hashprefix); } if (EVP_DigestUpdate(mctx, hdata, hdatalen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } if (EVP_DigestUpdate(mctx, msgstart, binderoffset) <= 0 || EVP_DigestFinal_ex(mctx, hash, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } mackey = EVP_PKEY_new_raw_private_key_ex(sctx->libctx, "HMAC", sctx->propq, finishedkey, hashsize); if (mackey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!sign) binderout = tmpbinder; bindersize = hashsize; if (EVP_DigestSignInit_ex(mctx, NULL, EVP_MD_get0_name(md), sctx->libctx, sctx->propq, mackey, NULL) <= 0 || EVP_DigestSignUpdate(mctx, hash, hashsize) <= 0 || EVP_DigestSignFinal(mctx, binderout, &bindersize) <= 0 || bindersize != hashsize) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (sign) { ret = 1; } else { ret = (CRYPTO_memcmp(binderin, binderout, hashsize) == 0); if (!ret) SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BINDER_DOES_NOT_VERIFY); } err: OPENSSL_cleanse(binderkey, sizeof(binderkey)); OPENSSL_cleanse(finishedkey, sizeof(finishedkey)); EVP_PKEY_free(mackey); EVP_MD_CTX_free(mctx); return ret; } static int final_early_data(SSL_CONNECTION *s, unsigned int context, int sent) { if (!sent) return 1; if (!s->server) { if (context == SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS && sent && !s->ext.early_data_ok) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_EARLY_DATA); return 0; } return 1; } if (s->max_early_data == 0 || !s->hit || s->early_data_state != SSL_EARLY_DATA_ACCEPTING || !s->ext.early_data_ok || s->hello_retry_request != SSL_HRR_NONE || (s->allow_early_data_cb != NULL && !s->allow_early_data_cb(SSL_CONNECTION_GET_SSL(s), s->allow_early_data_cb_data))) { s->ext.early_data = SSL_EARLY_DATA_REJECTED; } else { s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; if (!tls13_change_cipher_state(s, SSL3_CC_EARLY | SSL3_CHANGE_CIPHER_SERVER_READ)) { return 0; } } return 1; } static int final_maxfragmentlen(SSL_CONNECTION *s, unsigned int context, int sent) { if (s->server && s->hit && USE_MAX_FRAGMENT_LENGTH_EXT(s->session) && !sent ) { SSLfatal(s, SSL_AD_MISSING_EXTENSION, SSL_R_BAD_EXTENSION); return 0; } if (s->session && USE_MAX_FRAGMENT_LENGTH_EXT(s->session)) { s->rlayer.rrlmethod->set_max_frag_len(s->rlayer.rrl, GET_MAX_FRAGMENT_LENGTH(s->session)); s->rlayer.wrlmethod->set_max_frag_len(s->rlayer.wrl, ssl_get_max_send_fragment(s)); } return 1; } static int init_post_handshake_auth(SSL_CONNECTION *s, ossl_unused unsigned int context) { s->post_handshake_auth = SSL_PHA_NONE; return 1; } static int final_psk(SSL_CONNECTION *s, unsigned int context, int sent) { if (s->server && sent && s->clienthello != NULL && !s->clienthello->pre_proc_exts[TLSEXT_IDX_psk_kex_modes].present) { SSLfatal(s, TLS13_AD_MISSING_EXTENSION, SSL_R_MISSING_PSK_KEX_MODES_EXTENSION); return 0; } return 1; } static int tls_init_compress_certificate(SSL_CONNECTION *sc, unsigned int context) { memset(sc->ext.compress_certificate_from_peer, 0, sizeof(sc->ext.compress_certificate_from_peer)); return 1; } static EXT_RETURN tls_construct_compress_certificate(SSL_CONNECTION *sc, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_COMP_ALG int i; if (!ossl_comp_has_alg(0)) return EXT_RETURN_NOT_SENT; if (sc->server && sc->ext.server_cert_type != TLSEXT_cert_type_x509) { sc->cert_comp_prefs[0] = TLSEXT_comp_cert_none; return EXT_RETURN_NOT_SENT; } if (!sc->server && sc->ext.client_cert_type_ctos) { sc->cert_comp_prefs[0] = TLSEXT_comp_cert_none; return EXT_RETURN_NOT_SENT; } if ((sc->options & SSL_OP_NO_RX_CERTIFICATE_COMPRESSION) != 0) return EXT_RETURN_NOT_SENT; if (sc->cert_comp_prefs[0] == TLSEXT_comp_cert_none) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_compress_certificate) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u8(pkt)) goto err; for (i = 0; sc->cert_comp_prefs[i] != TLSEXT_comp_cert_none; i++) { if (!WPACKET_put_bytes_u16(pkt, sc->cert_comp_prefs[i])) goto err; } if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) goto err; sc->ext.compress_certificate_sent = 1; return EXT_RETURN_SENT; err: SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; #else return EXT_RETURN_NOT_SENT; #endif } #ifndef OPENSSL_NO_COMP_ALG static int tls_comp_in_pref(SSL_CONNECTION *sc, int alg) { int i; if (alg == 0) return 0; if (!ossl_comp_has_alg(alg)) return 0; if (sc->cert_comp_prefs[0] == TLSEXT_comp_cert_none) return 1; for (i = 0; i < TLSEXT_comp_cert_limit; i++) if (sc->cert_comp_prefs[i] == alg) return 1; return 0; } #endif int tls_parse_compress_certificate(SSL_CONNECTION *sc, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_COMP_ALG PACKET supported_comp_algs; unsigned int comp; int already_set[TLSEXT_comp_cert_limit]; int j = 0; if (!ossl_comp_has_alg(0)) return 1; if (sc->server && sc->ext.server_cert_type != TLSEXT_cert_type_x509) return 1; if (!sc->server && sc->ext.client_cert_type != TLSEXT_cert_type_x509) return 1; if ((sc->options & SSL_OP_NO_TX_CERTIFICATE_COMPRESSION) != 0) return 1; if (!PACKET_as_length_prefixed_1(pkt, &supported_comp_algs) || PACKET_remaining(&supported_comp_algs) == 0) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } memset(already_set, 0, sizeof(already_set)); while (PACKET_get_net_2(&supported_comp_algs, &comp)) { if (tls_comp_in_pref(sc, comp) && !already_set[comp]) { sc->ext.compress_certificate_from_peer[j++] = comp; already_set[comp] = 1; } } #endif return 1; } static int init_server_cert_type(SSL_CONNECTION *sc, unsigned int context) { if (sc->server) { sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; sc->ext.server_cert_type = TLSEXT_cert_type_x509; } return 1; } static int init_client_cert_type(SSL_CONNECTION *sc, unsigned int context) { if (sc->server) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; sc->ext.client_cert_type = TLSEXT_cert_type_x509; } return 1; }
statem
openssl/ssl/statem/extensions.c
openssl
#include <stdio.h> #include "../ssl_local.h" #include "statem_local.h" #include "internal/constant_time.h" #include "internal/cryptlib.h" #include <openssl/buffer.h> #include <openssl/rand.h> #include <openssl/objects.h> #include <openssl/evp.h> #include <openssl/x509.h> #include <openssl/dh.h> #include <openssl/rsa.h> #include <openssl/bn.h> #include <openssl/md5.h> #include <openssl/trace.h> #include <openssl/core_names.h> #include <openssl/asn1t.h> #include <openssl/comp.h> #define TICKET_NONCE_SIZE 8 typedef struct { ASN1_TYPE *kxBlob; ASN1_TYPE *opaqueBlob; } GOST_KX_MESSAGE; DECLARE_ASN1_FUNCTIONS(GOST_KX_MESSAGE) ASN1_SEQUENCE(GOST_KX_MESSAGE) = { ASN1_SIMPLE(GOST_KX_MESSAGE, kxBlob, ASN1_ANY), ASN1_OPT(GOST_KX_MESSAGE, opaqueBlob, ASN1_ANY), } ASN1_SEQUENCE_END(GOST_KX_MESSAGE) IMPLEMENT_ASN1_FUNCTIONS(GOST_KX_MESSAGE) static CON_FUNC_RETURN tls_construct_encrypted_extensions(SSL_CONNECTION *s, WPACKET *pkt); static ossl_inline int received_client_cert(const SSL_CONNECTION *sc) { return sc->session->peer_rpk != NULL || sc->session->peer != NULL; } static int ossl_statem_server13_read_transition(SSL_CONNECTION *s, int mt) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: break; case TLS_ST_EARLY_DATA: if (s->hello_retry_request == SSL_HRR_PENDING) { if (mt == SSL3_MT_CLIENT_HELLO) { st->hand_state = TLS_ST_SR_CLNT_HELLO; return 1; } break; } else if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { if (mt == SSL3_MT_END_OF_EARLY_DATA) { st->hand_state = TLS_ST_SR_END_OF_EARLY_DATA; return 1; } break; } case TLS_ST_SR_END_OF_EARLY_DATA: case TLS_ST_SW_FINISHED: if (s->s3.tmp.cert_request) { if (mt == SSL3_MT_CERTIFICATE) { st->hand_state = TLS_ST_SR_CERT; return 1; } #ifndef OPENSSL_NO_COMP_ALG if (mt == SSL3_MT_COMPRESSED_CERTIFICATE && s->ext.compress_certificate_sent) { st->hand_state = TLS_ST_SR_COMP_CERT; return 1; } #endif } else { if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_SR_FINISHED; return 1; } } break; case TLS_ST_SR_COMP_CERT: case TLS_ST_SR_CERT: if (!received_client_cert(s)) { if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_SR_FINISHED; return 1; } } else { if (mt == SSL3_MT_CERTIFICATE_VERIFY) { st->hand_state = TLS_ST_SR_CERT_VRFY; return 1; } } break; case TLS_ST_SR_CERT_VRFY: if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_SR_FINISHED; return 1; } break; case TLS_ST_OK: if (s->early_data_state == SSL_EARLY_DATA_READING) break; if (s->post_handshake_auth == SSL_PHA_REQUESTED) { if (mt == SSL3_MT_CERTIFICATE) { st->hand_state = TLS_ST_SR_CERT; return 1; } #ifndef OPENSSL_NO_COMP_ALG if (mt == SSL3_MT_COMPRESSED_CERTIFICATE && s->ext.compress_certificate_sent) { st->hand_state = TLS_ST_SR_COMP_CERT; return 1; } #endif } if (mt == SSL3_MT_KEY_UPDATE && !SSL_IS_QUIC_HANDSHAKE(s)) { st->hand_state = TLS_ST_SR_KEY_UPDATE; return 1; } break; } return 0; } int ossl_statem_server_read_transition(SSL_CONNECTION *s, int mt) { OSSL_STATEM *st = &s->statem; if (SSL_CONNECTION_IS_TLS13(s)) { if (!ossl_statem_server13_read_transition(s, mt)) goto err; return 1; } switch (st->hand_state) { default: break; case TLS_ST_BEFORE: case TLS_ST_OK: case DTLS_ST_SW_HELLO_VERIFY_REQUEST: if (mt == SSL3_MT_CLIENT_HELLO) { st->hand_state = TLS_ST_SR_CLNT_HELLO; return 1; } break; case TLS_ST_SW_SRVR_DONE: if (mt == SSL3_MT_CLIENT_KEY_EXCHANGE) { if (s->s3.tmp.cert_request) { if (s->version == SSL3_VERSION) { if ((s->verify_mode & SSL_VERIFY_PEER) && (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE); return 0; } st->hand_state = TLS_ST_SR_KEY_EXCH; return 1; } } else { st->hand_state = TLS_ST_SR_KEY_EXCH; return 1; } } else if (s->s3.tmp.cert_request) { if (mt == SSL3_MT_CERTIFICATE) { st->hand_state = TLS_ST_SR_CERT; return 1; } } break; case TLS_ST_SR_CERT: if (mt == SSL3_MT_CLIENT_KEY_EXCHANGE) { st->hand_state = TLS_ST_SR_KEY_EXCH; return 1; } break; case TLS_ST_SR_KEY_EXCH: if (!received_client_cert(s) || st->no_cert_verify) { if (mt == SSL3_MT_CHANGE_CIPHER_SPEC) { st->hand_state = TLS_ST_SR_CHANGE; return 1; } } else { if (mt == SSL3_MT_CERTIFICATE_VERIFY) { st->hand_state = TLS_ST_SR_CERT_VRFY; return 1; } } break; case TLS_ST_SR_CERT_VRFY: if (mt == SSL3_MT_CHANGE_CIPHER_SPEC) { st->hand_state = TLS_ST_SR_CHANGE; return 1; } break; case TLS_ST_SR_CHANGE: #ifndef OPENSSL_NO_NEXTPROTONEG if (s->s3.npn_seen) { if (mt == SSL3_MT_NEXT_PROTO) { st->hand_state = TLS_ST_SR_NEXT_PROTO; return 1; } } else { #endif if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_SR_FINISHED; return 1; } #ifndef OPENSSL_NO_NEXTPROTONEG } #endif break; #ifndef OPENSSL_NO_NEXTPROTONEG case TLS_ST_SR_NEXT_PROTO: if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_SR_FINISHED; return 1; } break; #endif case TLS_ST_SW_FINISHED: if (mt == SSL3_MT_CHANGE_CIPHER_SPEC) { st->hand_state = TLS_ST_SR_CHANGE; return 1; } break; } err: if (SSL_CONNECTION_IS_DTLS(s) && mt == SSL3_MT_CHANGE_CIPHER_SPEC) { BIO *rbio; s->init_num = 0; s->rwstate = SSL_READING; rbio = SSL_get_rbio(SSL_CONNECTION_GET_SSL(s)); BIO_clear_retry_flags(rbio); BIO_set_retry_read(rbio); return 0; } SSLfatal(s, SSL3_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); return 0; } static int send_server_key_exchange(SSL_CONNECTION *s) { unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; if (alg_k & (SSL_kDHE | SSL_kECDHE) #ifndef OPENSSL_NO_PSK || ((alg_k & (SSL_kPSK | SSL_kRSAPSK)) && s->cert->psk_identity_hint) || (alg_k & (SSL_PSK & (SSL_kDHEPSK | SSL_kECDHEPSK))) #endif #ifndef OPENSSL_NO_SRP || (alg_k & SSL_kSRP) #endif ) { return 1; } return 0; } static int get_compressed_certificate_alg(SSL_CONNECTION *sc) { #ifndef OPENSSL_NO_COMP_ALG int *alg = sc->ext.compress_certificate_from_peer; if (sc->s3.tmp.cert == NULL) return TLSEXT_comp_cert_none; for (; *alg != TLSEXT_comp_cert_none; alg++) { if (sc->s3.tmp.cert->comp_cert[*alg] != NULL) return *alg; } #endif return TLSEXT_comp_cert_none; } int send_certificate_request(SSL_CONNECTION *s) { if ( s->verify_mode & SSL_VERIFY_PEER && (!SSL_CONNECTION_IS_TLS13(s) || !(s->verify_mode & SSL_VERIFY_POST_HANDSHAKE) || s->post_handshake_auth == SSL_PHA_REQUEST_PENDING) && (s->certreqs_sent < 1 || !(s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) && (!(s->s3.tmp.new_cipher->algorithm_auth & SSL_aNULL) || (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) && !(s->s3.tmp.new_cipher->algorithm_auth & SSL_aSRP) && !(s->s3.tmp.new_cipher->algorithm_auth & SSL_aPSK)) { return 1; } return 0; } static int do_compressed_cert(SSL_CONNECTION *sc) { return sc->ext.server_cert_type == TLSEXT_cert_type_x509 && get_compressed_certificate_alg(sc) != TLSEXT_comp_cert_none; } static WRITE_TRAN ossl_statem_server13_write_transition(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WRITE_TRAN_ERROR; case TLS_ST_OK: if (s->key_update != SSL_KEY_UPDATE_NONE) { st->hand_state = TLS_ST_SW_KEY_UPDATE; return WRITE_TRAN_CONTINUE; } if (s->post_handshake_auth == SSL_PHA_REQUEST_PENDING) { st->hand_state = TLS_ST_SW_CERT_REQ; return WRITE_TRAN_CONTINUE; } if (s->ext.extra_tickets_expected > 0) { st->hand_state = TLS_ST_SW_SESSION_TICKET; return WRITE_TRAN_CONTINUE; } return WRITE_TRAN_FINISHED; case TLS_ST_SR_CLNT_HELLO: st->hand_state = TLS_ST_SW_SRVR_HELLO; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_SRVR_HELLO: if ((s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0 && s->hello_retry_request != SSL_HRR_COMPLETE) st->hand_state = TLS_ST_SW_CHANGE; else if (s->hello_retry_request == SSL_HRR_PENDING) st->hand_state = TLS_ST_EARLY_DATA; else st->hand_state = TLS_ST_SW_ENCRYPTED_EXTENSIONS; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_CHANGE: if (s->hello_retry_request == SSL_HRR_PENDING) st->hand_state = TLS_ST_EARLY_DATA; else st->hand_state = TLS_ST_SW_ENCRYPTED_EXTENSIONS; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_ENCRYPTED_EXTENSIONS: if (s->hit) st->hand_state = TLS_ST_SW_FINISHED; else if (send_certificate_request(s)) st->hand_state = TLS_ST_SW_CERT_REQ; else if (do_compressed_cert(s)) st->hand_state = TLS_ST_SW_COMP_CERT; else st->hand_state = TLS_ST_SW_CERT; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_CERT_REQ: if (s->post_handshake_auth == SSL_PHA_REQUEST_PENDING) { s->post_handshake_auth = SSL_PHA_REQUESTED; st->hand_state = TLS_ST_OK; } else if (do_compressed_cert(s)) { st->hand_state = TLS_ST_SW_COMP_CERT; } else { st->hand_state = TLS_ST_SW_CERT; } return WRITE_TRAN_CONTINUE; case TLS_ST_SW_COMP_CERT: case TLS_ST_SW_CERT: st->hand_state = TLS_ST_SW_CERT_VRFY; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_CERT_VRFY: st->hand_state = TLS_ST_SW_FINISHED; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_FINISHED: st->hand_state = TLS_ST_EARLY_DATA; s->ts_msg_write = ossl_time_now(); return WRITE_TRAN_CONTINUE; case TLS_ST_EARLY_DATA: return WRITE_TRAN_FINISHED; case TLS_ST_SR_FINISHED: s->ts_msg_read = ossl_time_now(); if (s->post_handshake_auth == SSL_PHA_REQUESTED) { s->post_handshake_auth = SSL_PHA_EXT_RECEIVED; } else if (!s->ext.ticket_expected) { st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; } if (s->num_tickets > s->sent_tickets) st->hand_state = TLS_ST_SW_SESSION_TICKET; else st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; case TLS_ST_SR_KEY_UPDATE: case TLS_ST_SW_KEY_UPDATE: st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_SESSION_TICKET: if (!SSL_IS_FIRST_HANDSHAKE(s) && s->ext.extra_tickets_expected > 0) { return WRITE_TRAN_CONTINUE; } else if (s->hit || s->num_tickets <= s->sent_tickets) { st->hand_state = TLS_ST_OK; } return WRITE_TRAN_CONTINUE; } } WRITE_TRAN ossl_statem_server_write_transition(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; if (SSL_CONNECTION_IS_TLS13(s)) return ossl_statem_server13_write_transition(s); switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WRITE_TRAN_ERROR; case TLS_ST_OK: if (st->request_state == TLS_ST_SW_HELLO_REQ) { st->hand_state = TLS_ST_SW_HELLO_REQ; st->request_state = TLS_ST_BEFORE; return WRITE_TRAN_CONTINUE; } if (!tls_setup_handshake(s)) { return WRITE_TRAN_ERROR; } case TLS_ST_BEFORE: return WRITE_TRAN_FINISHED; case TLS_ST_SW_HELLO_REQ: st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; case TLS_ST_SR_CLNT_HELLO: if (SSL_CONNECTION_IS_DTLS(s) && !s->d1->cookie_verified && (SSL_get_options(SSL_CONNECTION_GET_SSL(s)) & SSL_OP_COOKIE_EXCHANGE)) { st->hand_state = DTLS_ST_SW_HELLO_VERIFY_REQUEST; } else if (s->renegotiate == 0 && !SSL_IS_FIRST_HANDSHAKE(s)) { st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; } else { st->hand_state = TLS_ST_SW_SRVR_HELLO; } return WRITE_TRAN_CONTINUE; case DTLS_ST_SW_HELLO_VERIFY_REQUEST: return WRITE_TRAN_FINISHED; case TLS_ST_SW_SRVR_HELLO: if (s->hit) { if (s->ext.ticket_expected) st->hand_state = TLS_ST_SW_SESSION_TICKET; else st->hand_state = TLS_ST_SW_CHANGE; } else { if (!(s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP | SSL_aPSK))) { st->hand_state = TLS_ST_SW_CERT; } else if (send_server_key_exchange(s)) { st->hand_state = TLS_ST_SW_KEY_EXCH; } else if (send_certificate_request(s)) { st->hand_state = TLS_ST_SW_CERT_REQ; } else { st->hand_state = TLS_ST_SW_SRVR_DONE; } } return WRITE_TRAN_CONTINUE; case TLS_ST_SW_CERT: if (s->ext.status_expected) { st->hand_state = TLS_ST_SW_CERT_STATUS; return WRITE_TRAN_CONTINUE; } case TLS_ST_SW_CERT_STATUS: if (send_server_key_exchange(s)) { st->hand_state = TLS_ST_SW_KEY_EXCH; return WRITE_TRAN_CONTINUE; } case TLS_ST_SW_KEY_EXCH: if (send_certificate_request(s)) { st->hand_state = TLS_ST_SW_CERT_REQ; return WRITE_TRAN_CONTINUE; } case TLS_ST_SW_CERT_REQ: st->hand_state = TLS_ST_SW_SRVR_DONE; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_SRVR_DONE: s->ts_msg_write = ossl_time_now(); return WRITE_TRAN_FINISHED; case TLS_ST_SR_FINISHED: s->ts_msg_read = ossl_time_now(); if (s->hit) { st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; } else if (s->ext.ticket_expected) { st->hand_state = TLS_ST_SW_SESSION_TICKET; } else { st->hand_state = TLS_ST_SW_CHANGE; } return WRITE_TRAN_CONTINUE; case TLS_ST_SW_SESSION_TICKET: st->hand_state = TLS_ST_SW_CHANGE; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_CHANGE: st->hand_state = TLS_ST_SW_FINISHED; return WRITE_TRAN_CONTINUE; case TLS_ST_SW_FINISHED: if (s->hit) { return WRITE_TRAN_FINISHED; } st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; } } WORK_STATE ossl_statem_server_pre_work(SSL_CONNECTION *s, WORK_STATE wst) { OSSL_STATEM *st = &s->statem; SSL *ssl = SSL_CONNECTION_GET_SSL(s); switch (st->hand_state) { default: break; case TLS_ST_SW_HELLO_REQ: s->shutdown = 0; if (SSL_CONNECTION_IS_DTLS(s)) dtls1_clear_sent_buffer(s); break; case DTLS_ST_SW_HELLO_VERIFY_REQUEST: s->shutdown = 0; if (SSL_CONNECTION_IS_DTLS(s)) { dtls1_clear_sent_buffer(s); st->use_timer = 0; } break; case TLS_ST_SW_SRVR_HELLO: if (SSL_CONNECTION_IS_DTLS(s)) { st->use_timer = 1; } break; case TLS_ST_SW_SRVR_DONE: #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && BIO_dgram_is_sctp(SSL_get_wbio(ssl))) { return dtls_wait_for_dry(s); } #endif return WORK_FINISHED_CONTINUE; case TLS_ST_SW_SESSION_TICKET: if (SSL_CONNECTION_IS_TLS13(s) && s->sent_tickets == 0 && s->ext.extra_tickets_expected == 0) { return tls_finish_handshake(s, wst, 0, 0); } if (SSL_CONNECTION_IS_DTLS(s)) { st->use_timer = 0; } break; case TLS_ST_SW_CHANGE: if (SSL_CONNECTION_IS_TLS13(s)) break; if (s->session->cipher == NULL) { s->session->cipher = s->s3.tmp.new_cipher; } else if (s->session->cipher != s->s3.tmp.new_cipher) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; } if (!ssl->method->ssl3_enc->setup_key_block(s)) { return WORK_ERROR; } if (SSL_CONNECTION_IS_DTLS(s)) { st->use_timer = 0; } return WORK_FINISHED_CONTINUE; case TLS_ST_EARLY_DATA: if (s->early_data_state != SSL_EARLY_DATA_ACCEPTING && (s->s3.flags & TLS1_FLAGS_STATELESS) == 0) return WORK_FINISHED_CONTINUE; case TLS_ST_OK: return tls_finish_handshake(s, wst, 1, 1); } return WORK_FINISHED_CONTINUE; } static ossl_inline int conn_is_closed(void) { switch (get_last_sys_error()) { #if defined(EPIPE) case EPIPE: return 1; #endif #if defined(ECONNRESET) case ECONNRESET: return 1; #endif #if defined(WSAECONNRESET) case WSAECONNRESET: return 1; #endif default: return 0; } } WORK_STATE ossl_statem_server_post_work(SSL_CONNECTION *s, WORK_STATE wst) { OSSL_STATEM *st = &s->statem; SSL *ssl = SSL_CONNECTION_GET_SSL(s); s->init_num = 0; switch (st->hand_state) { default: break; case TLS_ST_SW_HELLO_REQ: if (statem_flush(s) != 1) return WORK_MORE_A; if (!ssl3_init_finished_mac(s)) { return WORK_ERROR; } break; case DTLS_ST_SW_HELLO_VERIFY_REQUEST: if (statem_flush(s) != 1) return WORK_MORE_A; if (s->version != DTLS1_BAD_VER && !ssl3_init_finished_mac(s)) { return WORK_ERROR; } s->first_packet = 1; break; case TLS_ST_SW_SRVR_HELLO: if (SSL_CONNECTION_IS_TLS13(s) && s->hello_retry_request == SSL_HRR_PENDING) { if ((s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) == 0 && statem_flush(s) != 1) return WORK_MORE_A; break; } #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { unsigned char sctpauthkey[64]; char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)]; size_t labellen; memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL, sizeof(DTLS1_SCTP_AUTH_LABEL)); labellen = sizeof(labelbuffer) - 1; if (s->mode & SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG) labellen += 1; if (SSL_export_keying_material(ssl, sctpauthkey, sizeof(sctpauthkey), labelbuffer, labellen, NULL, 0, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; } BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY, sizeof(sctpauthkey), sctpauthkey); } #endif if (!SSL_CONNECTION_IS_TLS13(s) || ((s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0 && s->hello_retry_request != SSL_HRR_COMPLETE)) break; case TLS_ST_SW_CHANGE: if (s->hello_retry_request == SSL_HRR_PENDING) { if (!statem_flush(s)) return WORK_MORE_A; break; } if (SSL_CONNECTION_IS_TLS13(s)) { if (!ssl->method->ssl3_enc->setup_key_block(s) || !ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_SERVER_WRITE)) { return WORK_ERROR; } if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED && !ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_HANDSHAKE |SSL3_CHANGE_CIPHER_SERVER_READ)) { return WORK_ERROR; } if (s->rlayer.rrlmethod->set_plain_alerts != NULL) s->rlayer.rrlmethod->set_plain_alerts(s->rlayer.rrl, 1); break; } #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && !s->hit) { BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); } #endif if (!ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CHANGE_CIPHER_SERVER_WRITE)) { return WORK_ERROR; } break; case TLS_ST_SW_SRVR_DONE: if (statem_flush(s) != 1) return WORK_MORE_A; break; case TLS_ST_SW_FINISHED: if (statem_flush(s) != 1) return WORK_MORE_A; #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); } #endif if (SSL_CONNECTION_IS_TLS13(s)) { size_t dummy; if (!ssl->method->ssl3_enc->generate_master_secret(s, s->master_secret, s->handshake_secret, 0, &dummy) || !ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_APPLICATION | SSL3_CHANGE_CIPHER_SERVER_WRITE)) return WORK_ERROR; } break; case TLS_ST_SW_CERT_REQ: if (s->post_handshake_auth == SSL_PHA_REQUEST_PENDING) { if (statem_flush(s) != 1) return WORK_MORE_A; } else { if (!SSL_CONNECTION_IS_TLS13(s) || (s->options & SSL_OP_NO_TX_CERTIFICATE_COMPRESSION) != 0) s->ext.compress_certificate_from_peer[0] = TLSEXT_comp_cert_none; } break; case TLS_ST_SW_ENCRYPTED_EXTENSIONS: if (!s->hit && !send_certificate_request(s)) { if (!SSL_CONNECTION_IS_TLS13(s) || (s->options & SSL_OP_NO_TX_CERTIFICATE_COMPRESSION) != 0) s->ext.compress_certificate_from_peer[0] = TLSEXT_comp_cert_none; } break; case TLS_ST_SW_KEY_UPDATE: if (statem_flush(s) != 1) return WORK_MORE_A; if (!tls13_update_key(s, 1)) { return WORK_ERROR; } break; case TLS_ST_SW_SESSION_TICKET: clear_sys_error(); if (SSL_CONNECTION_IS_TLS13(s) && statem_flush(s) != 1) { if (SSL_get_error(ssl, 0) == SSL_ERROR_SYSCALL && conn_is_closed()) { s->rwstate = SSL_NOTHING; break; } return WORK_MORE_A; } break; } return WORK_FINISHED_CONTINUE; } int ossl_statem_server_construct_message(SSL_CONNECTION *s, confunc_f *confunc, int *mt) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_HANDSHAKE_STATE); return 0; case TLS_ST_SW_CHANGE: if (SSL_CONNECTION_IS_DTLS(s)) *confunc = dtls_construct_change_cipher_spec; else *confunc = tls_construct_change_cipher_spec; *mt = SSL3_MT_CHANGE_CIPHER_SPEC; break; case DTLS_ST_SW_HELLO_VERIFY_REQUEST: *confunc = dtls_construct_hello_verify_request; *mt = DTLS1_MT_HELLO_VERIFY_REQUEST; break; case TLS_ST_SW_HELLO_REQ: *confunc = NULL; *mt = SSL3_MT_HELLO_REQUEST; break; case TLS_ST_SW_SRVR_HELLO: *confunc = tls_construct_server_hello; *mt = SSL3_MT_SERVER_HELLO; break; case TLS_ST_SW_CERT: *confunc = tls_construct_server_certificate; *mt = SSL3_MT_CERTIFICATE; break; #ifndef OPENSSL_NO_COMP_ALG case TLS_ST_SW_COMP_CERT: *confunc = tls_construct_server_compressed_certificate; *mt = SSL3_MT_COMPRESSED_CERTIFICATE; break; #endif case TLS_ST_SW_CERT_VRFY: *confunc = tls_construct_cert_verify; *mt = SSL3_MT_CERTIFICATE_VERIFY; break; case TLS_ST_SW_KEY_EXCH: *confunc = tls_construct_server_key_exchange; *mt = SSL3_MT_SERVER_KEY_EXCHANGE; break; case TLS_ST_SW_CERT_REQ: *confunc = tls_construct_certificate_request; *mt = SSL3_MT_CERTIFICATE_REQUEST; break; case TLS_ST_SW_SRVR_DONE: *confunc = tls_construct_server_done; *mt = SSL3_MT_SERVER_DONE; break; case TLS_ST_SW_SESSION_TICKET: *confunc = tls_construct_new_session_ticket; *mt = SSL3_MT_NEWSESSION_TICKET; break; case TLS_ST_SW_CERT_STATUS: *confunc = tls_construct_cert_status; *mt = SSL3_MT_CERTIFICATE_STATUS; break; case TLS_ST_SW_FINISHED: *confunc = tls_construct_finished; *mt = SSL3_MT_FINISHED; break; case TLS_ST_EARLY_DATA: *confunc = NULL; *mt = SSL3_MT_DUMMY; break; case TLS_ST_SW_ENCRYPTED_EXTENSIONS: *confunc = tls_construct_encrypted_extensions; *mt = SSL3_MT_ENCRYPTED_EXTENSIONS; break; case TLS_ST_SW_KEY_UPDATE: *confunc = tls_construct_key_update; *mt = SSL3_MT_KEY_UPDATE; break; } return 1; } #define CLIENT_HELLO_MAX_LENGTH 131396 #define CLIENT_KEY_EXCH_MAX_LENGTH 2048 #define NEXT_PROTO_MAX_LENGTH 514 size_t ossl_statem_server_max_message_size(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: return 0; case TLS_ST_SR_CLNT_HELLO: return CLIENT_HELLO_MAX_LENGTH; case TLS_ST_SR_END_OF_EARLY_DATA: return END_OF_EARLY_DATA_MAX_LENGTH; case TLS_ST_SR_COMP_CERT: case TLS_ST_SR_CERT: return s->max_cert_list; case TLS_ST_SR_KEY_EXCH: return CLIENT_KEY_EXCH_MAX_LENGTH; case TLS_ST_SR_CERT_VRFY: return CERTIFICATE_VERIFY_MAX_LENGTH; #ifndef OPENSSL_NO_NEXTPROTONEG case TLS_ST_SR_NEXT_PROTO: return NEXT_PROTO_MAX_LENGTH; #endif case TLS_ST_SR_CHANGE: return CCS_MAX_LENGTH; case TLS_ST_SR_FINISHED: return FINISHED_MAX_LENGTH; case TLS_ST_SR_KEY_UPDATE: return KEY_UPDATE_MAX_LENGTH; } } MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL_CONNECTION *s, PACKET *pkt) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return MSG_PROCESS_ERROR; case TLS_ST_SR_CLNT_HELLO: return tls_process_client_hello(s, pkt); case TLS_ST_SR_END_OF_EARLY_DATA: return tls_process_end_of_early_data(s, pkt); case TLS_ST_SR_CERT: return tls_process_client_certificate(s, pkt); #ifndef OPENSSL_NO_COMP_ALG case TLS_ST_SR_COMP_CERT: return tls_process_client_compressed_certificate(s, pkt); #endif case TLS_ST_SR_KEY_EXCH: return tls_process_client_key_exchange(s, pkt); case TLS_ST_SR_CERT_VRFY: return tls_process_cert_verify(s, pkt); #ifndef OPENSSL_NO_NEXTPROTONEG case TLS_ST_SR_NEXT_PROTO: return tls_process_next_proto(s, pkt); #endif case TLS_ST_SR_CHANGE: return tls_process_change_cipher_spec(s, pkt); case TLS_ST_SR_FINISHED: return tls_process_finished(s, pkt); case TLS_ST_SR_KEY_UPDATE: return tls_process_key_update(s, pkt); } } WORK_STATE ossl_statem_server_post_process_message(SSL_CONNECTION *s, WORK_STATE wst) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; case TLS_ST_SR_CLNT_HELLO: return tls_post_process_client_hello(s, wst); case TLS_ST_SR_KEY_EXCH: return tls_post_process_client_key_exchange(s, wst); } } #ifndef OPENSSL_NO_SRP static int ssl_check_srp_ext_ClientHello(SSL_CONNECTION *s) { int ret; int al = SSL_AD_UNRECOGNIZED_NAME; if ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) && (s->srp_ctx.TLS_ext_srp_username_callback != NULL)) { if (s->srp_ctx.login == NULL) { SSLfatal(s, SSL_AD_UNKNOWN_PSK_IDENTITY, SSL_R_PSK_IDENTITY_NOT_FOUND); return -1; } else { ret = ssl_srp_server_param_with_username_intern(s, &al); if (ret < 0) return 0; if (ret == SSL3_AL_FATAL) { SSLfatal(s, al, al == SSL_AD_UNKNOWN_PSK_IDENTITY ? SSL_R_PSK_IDENTITY_NOT_FOUND : SSL_R_CLIENTHELLO_TLSEXT); return -1; } } } return 1; } #endif int dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, size_t cookie_len) { if (!WPACKET_put_bytes_u16(pkt, DTLS1_VERSION) || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) return 0; return 1; } CON_FUNC_RETURN dtls_construct_hello_verify_request(SSL_CONNECTION *s, WPACKET *pkt) { unsigned int cookie_leni; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (sctx->app_gen_cookie_cb == NULL || sctx->app_gen_cookie_cb(SSL_CONNECTION_GET_SSL(s), s->d1->cookie, &cookie_leni) == 0 || cookie_leni > DTLS1_COOKIE_LENGTH) { SSLfatal(s, SSL_AD_NO_ALERT, SSL_R_COOKIE_GEN_CALLBACK_FAILURE); return CON_FUNC_ERROR; } s->d1->cookie_len = cookie_leni; if (!dtls_raw_hello_verify_request(pkt, s->d1->cookie, s->d1->cookie_len)) { SSLfatal(s, SSL_AD_NO_ALERT, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } return CON_FUNC_SUCCESS; } static void ssl_check_for_safari(SSL_CONNECTION *s, const CLIENTHELLO_MSG *hello) { static const unsigned char kSafariExtensionsBlock[] = { 0x00, 0x0a, 0x00, 0x08, 0x00, 0x06, 0x00, 0x17, 0x00, 0x18, 0x00, 0x19, 0x00, 0x0b, 0x00, 0x02, 0x01, 0x00, 0x00, 0x0d, 0x00, 0x0c, 0x00, 0x0a, 0x05, 0x01, 0x04, 0x01, 0x02, 0x01, 0x04, 0x03, 0x02, 0x03, }; static const size_t kSafariCommonExtensionsLength = 18; unsigned int type; PACKET sni, tmppkt; size_t ext_len; tmppkt = hello->extensions; if (!PACKET_forward(&tmppkt, 2) || !PACKET_get_net_2(&tmppkt, &type) || !PACKET_get_length_prefixed_2(&tmppkt, &sni)) { return; } if (type != TLSEXT_TYPE_server_name) return; ext_len = TLS1_get_client_version( SSL_CONNECTION_GET_SSL(s)) >= TLS1_2_VERSION ? sizeof(kSafariExtensionsBlock) : kSafariCommonExtensionsLength; s->s3.is_probably_safari = PACKET_equal(&tmppkt, kSafariExtensionsBlock, ext_len); } #define RENEG_OPTIONS_OK(options) \ ((options & SSL_OP_NO_RENEGOTIATION) == 0 \ && (options & SSL_OP_ALLOW_CLIENT_RENEGOTIATION) != 0) MSG_PROCESS_RETURN tls_process_client_hello(SSL_CONNECTION *s, PACKET *pkt) { PACKET session_id, compression, extensions, cookie; static const unsigned char null_compression = 0; CLIENTHELLO_MSG *clienthello = NULL; if (s->renegotiate == 0 && !SSL_IS_FIRST_HANDSHAKE(s)) { if (!ossl_assert(!SSL_CONNECTION_IS_TLS13(s))) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!RENEG_OPTIONS_OK(s->options) || (!s->s3.send_connection_binding && (s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION) == 0)) { ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_NO_RENEGOTIATION); return MSG_PROCESS_FINISHED_READING; } s->renegotiate = 1; s->new_session = 1; } clienthello = OPENSSL_zalloc(sizeof(*clienthello)); if (clienthello == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } clienthello->isv2 = RECORD_LAYER_is_sslv2_record(&s->rlayer); PACKET_null_init(&cookie); if (clienthello->isv2) { unsigned int mt; if (!SSL_IS_FIRST_HANDSHAKE(s) || s->hello_retry_request != SSL_HRR_NONE) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); goto err; } if (!PACKET_get_1(pkt, &mt) || mt != SSL2_MT_CLIENT_HELLO) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } if (!PACKET_get_net_2(pkt, &clienthello->legacy_version)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_TOO_SHORT); goto err; } if (clienthello->isv2) { unsigned int ciphersuite_len, session_id_len, challenge_len; PACKET challenge; if (!PACKET_get_net_2(pkt, &ciphersuite_len) || !PACKET_get_net_2(pkt, &session_id_len) || !PACKET_get_net_2(pkt, &challenge_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_RECORD_LENGTH_MISMATCH); goto err; } if (session_id_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_LENGTH_MISMATCH); goto err; } if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, ciphersuite_len) || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) || !PACKET_get_sub_packet(pkt, &challenge, challenge_len) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_RECORD_LENGTH_MISMATCH); goto err; } clienthello->session_id_len = session_id_len; challenge_len = challenge_len > SSL3_RANDOM_SIZE ? SSL3_RANDOM_SIZE : challenge_len; memset(clienthello->random, 0, SSL3_RANDOM_SIZE); if (!PACKET_copy_bytes(&challenge, clienthello->random + SSL3_RANDOM_SIZE - challenge_len, challenge_len) || !PACKET_buf_init(&compression, &null_compression, 1)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } PACKET_null_init(&clienthello->extensions); } else { if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE) || !PACKET_get_length_prefixed_1(pkt, &session_id) || !PACKET_copy_all(&session_id, clienthello->session_id, SSL_MAX_SSL_SESSION_ID_LENGTH, &clienthello->session_id_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (SSL_CONNECTION_IS_DTLS(s)) { if (!PACKET_get_length_prefixed_1(pkt, &cookie)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!PACKET_copy_all(&cookie, clienthello->dtls_cookie, DTLS1_COOKIE_LENGTH, &clienthello->dtls_cookie_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_get_options(SSL_CONNECTION_GET_SSL(s)) & SSL_OP_COOKIE_EXCHANGE) { if (clienthello->dtls_cookie_len == 0) { OPENSSL_free(clienthello); return MSG_PROCESS_FINISHED_READING; } } } if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!PACKET_get_length_prefixed_1(pkt, &compression)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (PACKET_remaining(pkt) == 0) { PACKET_null_init(&clienthello->extensions); } else { if (!PACKET_get_length_prefixed_2(pkt, &clienthello->extensions) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } } } if (!PACKET_copy_all(&compression, clienthello->compressions, MAX_COMPRESSIONS_SIZE, &clienthello->compressions_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } extensions = clienthello->extensions; if (!tls_collect_extensions(s, &extensions, SSL_EXT_CLIENT_HELLO, &clienthello->pre_proc_exts, &clienthello->pre_proc_exts_len, 1)) { goto err; } s->clienthello = clienthello; return MSG_PROCESS_CONTINUE_PROCESSING; err: if (clienthello != NULL) OPENSSL_free(clienthello->pre_proc_exts); OPENSSL_free(clienthello); return MSG_PROCESS_ERROR; } static int tls_early_post_process_client_hello(SSL_CONNECTION *s) { unsigned int j; int i, al = SSL_AD_INTERNAL_ERROR; int protverr; size_t loop; unsigned long id; #ifndef OPENSSL_NO_COMP SSL_COMP *comp = NULL; #endif const SSL_CIPHER *c; STACK_OF(SSL_CIPHER) *ciphers = NULL; STACK_OF(SSL_CIPHER) *scsvs = NULL; CLIENTHELLO_MSG *clienthello = s->clienthello; DOWNGRADE dgrd = DOWNGRADE_NONE; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (sctx->client_hello_cb != NULL) { switch (sctx->client_hello_cb(ssl, &al, sctx->client_hello_cb_arg)) { case SSL_CLIENT_HELLO_SUCCESS: break; case SSL_CLIENT_HELLO_RETRY: s->rwstate = SSL_CLIENT_HELLO_CB; return -1; case SSL_CLIENT_HELLO_ERROR: default: SSLfatal(s, al, SSL_R_CALLBACK_FAILED); goto err; } } memcpy(s->s3.client_random, clienthello->random, SSL3_RANDOM_SIZE); if (clienthello->isv2) { if (clienthello->legacy_version == SSL2_VERSION || (clienthello->legacy_version & 0xff00) != (SSL3_VERSION_MAJOR << 8)) { SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_UNKNOWN_PROTOCOL); goto err; } s->client_version = clienthello->legacy_version; } protverr = ssl_choose_server_version(s, clienthello, &dgrd); if (protverr) { if (SSL_IS_FIRST_HANDSHAKE(s)) { s->version = s->client_version = clienthello->legacy_version; } SSLfatal(s, SSL_AD_PROTOCOL_VERSION, protverr); goto err; } if (SSL_CONNECTION_IS_TLS13(s) && RECORD_LAYER_processed_read_pending(&s->rlayer)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_NOT_ON_RECORD_BOUNDARY); goto err; } if (SSL_CONNECTION_IS_DTLS(s)) { if (SSL_get_options(ssl) & SSL_OP_COOKIE_EXCHANGE) { if (sctx->app_verify_cookie_cb != NULL) { if (sctx->app_verify_cookie_cb(ssl, clienthello->dtls_cookie, clienthello->dtls_cookie_len) == 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_COOKIE_MISMATCH); goto err; } } else if (s->d1->cookie_len != clienthello->dtls_cookie_len || memcmp(clienthello->dtls_cookie, s->d1->cookie, s->d1->cookie_len) != 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_COOKIE_MISMATCH); goto err; } s->d1->cookie_verified = 1; } } s->hit = 0; if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites, clienthello->isv2) || !ossl_bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, &scsvs, clienthello->isv2, 1)) { goto err; } s->s3.send_connection_binding = 0; if (scsvs != NULL) { for (i = 0; i < sk_SSL_CIPHER_num(scsvs); i++) { c = sk_SSL_CIPHER_value(scsvs, i); if (SSL_CIPHER_get_id(c) == SSL3_CK_SCSV) { if (s->renegotiate) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING); goto err; } s->s3.send_connection_binding = 1; } else if (SSL_CIPHER_get_id(c) == SSL3_CK_FALLBACK_SCSV && !ssl_check_version_downgrade(s)) { SSLfatal(s, SSL_AD_INAPPROPRIATE_FALLBACK, SSL_R_INAPPROPRIATE_FALLBACK); goto err; } } } if (SSL_CONNECTION_IS_TLS13(s)) { const SSL_CIPHER *cipher = ssl3_choose_cipher(s, ciphers, SSL_get_ciphers(ssl)); if (cipher == NULL) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SHARED_CIPHER); goto err; } if (s->hello_retry_request == SSL_HRR_PENDING && (s->s3.tmp.new_cipher == NULL || s->s3.tmp.new_cipher->id != cipher->id)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_CIPHER); goto err; } s->s3.tmp.new_cipher = cipher; } if (!tls_parse_extension(s, TLSEXT_IDX_extended_master_secret, SSL_EXT_CLIENT_HELLO, clienthello->pre_proc_exts, NULL, 0)) { goto err; } if (clienthello->isv2 || (s->new_session && (s->options & SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION))) { if (!ssl_get_new_session(s, 1)) { goto err; } } else { i = ssl_get_prev_session(s, clienthello); if (i == 1) { s->hit = 1; } else if (i == -1) { goto err; } else { if (!ssl_get_new_session(s, 1)) { goto err; } } } if (SSL_CONNECTION_IS_TLS13(s)) { memcpy(s->tmp_session_id, s->clienthello->session_id, s->clienthello->session_id_len); s->tmp_session_id_len = s->clienthello->session_id_len; } if (!SSL_CONNECTION_IS_TLS13(s) && s->hit) { j = 0; id = s->session->cipher->id; OSSL_TRACE_BEGIN(TLS_CIPHER) { BIO_printf(trc_out, "client sent %d ciphers\n", sk_SSL_CIPHER_num(ciphers)); } for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { c = sk_SSL_CIPHER_value(ciphers, i); if (trc_out != NULL) BIO_printf(trc_out, "client [%2d of %2d]:%s\n", i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c)); if (c->id == id) { j = 1; break; } } if (j == 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_REQUIRED_CIPHER_MISSING); OSSL_TRACE_CANCEL(TLS_CIPHER); goto err; } OSSL_TRACE_END(TLS_CIPHER); } for (loop = 0; loop < clienthello->compressions_len; loop++) { if (clienthello->compressions[loop] == 0) break; } if (loop >= clienthello->compressions_len) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_NO_COMPRESSION_SPECIFIED); goto err; } if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG) ssl_check_for_safari(s, clienthello); if (!tls_parse_all_extensions(s, SSL_EXT_CLIENT_HELLO, clienthello->pre_proc_exts, NULL, 0, 1)) { goto err; } { unsigned char *pos; pos = s->s3.server_random; if (ssl_fill_hello_random(s, 1, pos, SSL3_RANDOM_SIZE, dgrd) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } if (!s->hit && s->version >= TLS1_VERSION && !SSL_CONNECTION_IS_TLS13(s) && !SSL_CONNECTION_IS_DTLS(s) && s->ext.session_secret_cb != NULL) { const SSL_CIPHER *pref_cipher = NULL; int master_key_length; master_key_length = sizeof(s->session->master_key); if (s->ext.session_secret_cb(ssl, s->session->master_key, &master_key_length, ciphers, &pref_cipher, s->ext.session_secret_cb_arg) && master_key_length > 0) { s->session->master_key_length = master_key_length; s->hit = 1; s->peer_ciphers = ciphers; s->session->verify_result = X509_V_OK; ciphers = NULL; if (pref_cipher == NULL) pref_cipher = ssl3_choose_cipher(s, s->peer_ciphers, SSL_get_ciphers(ssl)); if (pref_cipher == NULL) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SHARED_CIPHER); goto err; } s->session->cipher = pref_cipher; sk_SSL_CIPHER_free(s->cipher_list); s->cipher_list = sk_SSL_CIPHER_dup(s->peer_ciphers); sk_SSL_CIPHER_free(s->cipher_list_by_id); s->cipher_list_by_id = sk_SSL_CIPHER_dup(s->peer_ciphers); } } s->s3.tmp.new_compression = NULL; if (SSL_CONNECTION_IS_TLS13(s)) { if (clienthello->compressions_len != 1) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INVALID_COMPRESSION_ALGORITHM); goto err; } } #ifndef OPENSSL_NO_COMP else if (s->session->compress_meth != 0) { int m, comp_id = s->session->compress_meth; unsigned int k; if (!ssl_allow_compression(s)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_INCONSISTENT_COMPRESSION); goto err; } for (m = 0; m < sk_SSL_COMP_num(sctx->comp_methods); m++) { comp = sk_SSL_COMP_value(sctx->comp_methods, m); if (comp_id == comp->id) { s->s3.tmp.new_compression = comp; break; } } if (s->s3.tmp.new_compression == NULL) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_INVALID_COMPRESSION_ALGORITHM); goto err; } for (k = 0; k < clienthello->compressions_len; k++) { if (clienthello->compressions[k] == comp_id) break; } if (k >= clienthello->compressions_len) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_REQUIRED_COMPRESSION_ALGORITHM_MISSING); goto err; } } else if (s->hit) { comp = NULL; } else if (ssl_allow_compression(s) && sctx->comp_methods) { int m, nn, v, done = 0; unsigned int o; nn = sk_SSL_COMP_num(sctx->comp_methods); for (m = 0; m < nn; m++) { comp = sk_SSL_COMP_value(sctx->comp_methods, m); v = comp->id; for (o = 0; o < clienthello->compressions_len; o++) { if (v == clienthello->compressions[o]) { done = 1; break; } } if (done) break; } if (done) s->s3.tmp.new_compression = comp; else comp = NULL; } #else if (s->session->compress_meth != 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_INCONSISTENT_COMPRESSION); goto err; } #endif if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { sk_SSL_CIPHER_free(s->peer_ciphers); s->peer_ciphers = ciphers; if (ciphers == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ciphers = NULL; } if (!s->hit) { #ifdef OPENSSL_NO_COMP s->session->compress_meth = 0; #else s->session->compress_meth = (comp == NULL) ? 0 : comp->id; #endif if (!tls1_set_server_sigalgs(s)) { goto err; } } sk_SSL_CIPHER_free(ciphers); sk_SSL_CIPHER_free(scsvs); OPENSSL_free(clienthello->pre_proc_exts); OPENSSL_free(s->clienthello); s->clienthello = NULL; return 1; err: sk_SSL_CIPHER_free(ciphers); sk_SSL_CIPHER_free(scsvs); OPENSSL_free(clienthello->pre_proc_exts); OPENSSL_free(s->clienthello); s->clienthello = NULL; return 0; } static int tls_handle_status_request(SSL_CONNECTION *s) { SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); s->ext.status_expected = 0; if (s->ext.status_type != TLSEXT_STATUSTYPE_nothing && sctx != NULL && sctx->ext.status_cb != NULL) { int ret; if (s->s3.tmp.cert != NULL) { s->cert->key = s->s3.tmp.cert; ret = sctx->ext.status_cb(SSL_CONNECTION_GET_SSL(s), sctx->ext.status_arg); switch (ret) { case SSL_TLSEXT_ERR_NOACK: s->ext.status_expected = 0; break; case SSL_TLSEXT_ERR_OK: if (s->ext.ocsp.resp) s->ext.status_expected = 1; break; case SSL_TLSEXT_ERR_ALERT_FATAL: default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_CLIENTHELLO_TLSEXT); return 0; } } } return 1; } int tls_handle_alpn(SSL_CONNECTION *s) { const unsigned char *selected = NULL; unsigned char selected_len = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (sctx->ext.alpn_select_cb != NULL && s->s3.alpn_proposed != NULL) { int r = sctx->ext.alpn_select_cb(SSL_CONNECTION_GET_SSL(s), &selected, &selected_len, s->s3.alpn_proposed, (unsigned int)s->s3.alpn_proposed_len, sctx->ext.alpn_select_cb_arg); if (r == SSL_TLSEXT_ERR_OK) { OPENSSL_free(s->s3.alpn_selected); s->s3.alpn_selected = OPENSSL_memdup(selected, selected_len); if (s->s3.alpn_selected == NULL) { s->s3.alpn_selected_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->s3.alpn_selected_len = selected_len; #ifndef OPENSSL_NO_NEXTPROTONEG s->s3.npn_seen = 0; #endif if (s->session->ext.alpn_selected == NULL || selected_len != s->session->ext.alpn_selected_len || memcmp(selected, s->session->ext.alpn_selected, selected_len) != 0) { s->ext.early_data_ok = 0; if (!s->hit) { if (!ossl_assert(s->session->ext.alpn_selected == NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->session->ext.alpn_selected = OPENSSL_memdup(selected, selected_len); if (s->session->ext.alpn_selected == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->session->ext.alpn_selected_len = selected_len; } } return 1; } else if (r != SSL_TLSEXT_ERR_NOACK) { SSLfatal(s, SSL_AD_NO_APPLICATION_PROTOCOL, SSL_R_NO_APPLICATION_PROTOCOL); return 0; } } if (s->session->ext.alpn_selected != NULL) { s->ext.early_data_ok = 0; } return 1; } WORK_STATE tls_post_process_client_hello(SSL_CONNECTION *s, WORK_STATE wst) { const SSL_CIPHER *cipher; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (wst == WORK_MORE_A) { int rv = tls_early_post_process_client_hello(s); if (rv == 0) { goto err; } if (rv < 0) return WORK_MORE_A; wst = WORK_MORE_B; } if (wst == WORK_MORE_B) { if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { if (!s->hit && s->cert->cert_cb != NULL) { int rv = s->cert->cert_cb(ssl, s->cert->cert_cb_arg); if (rv == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_CERT_CB_ERROR); goto err; } if (rv < 0) { s->rwstate = SSL_X509_LOOKUP; return WORK_MORE_B; } s->rwstate = SSL_NOTHING; } if (!SSL_CONNECTION_IS_TLS13(s)) { cipher = ssl3_choose_cipher(s, s->peer_ciphers, SSL_get_ciphers(ssl)); if (cipher == NULL) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_SHARED_CIPHER); goto err; } s->s3.tmp.new_cipher = cipher; } if (!s->hit) { if (!tls_choose_sigalg(s, 1)) { goto err; } if (s->not_resumable_session_cb != NULL) s->session->not_resumable = s->not_resumable_session_cb(ssl, ((s->s3.tmp.new_cipher->algorithm_mkey & (SSL_kDHE | SSL_kECDHE)) != 0)); if (s->session->not_resumable) s->ext.ticket_expected = 0; } } else { s->s3.tmp.new_cipher = s->session->cipher; } if (!tls_handle_status_request(s)) { goto err; } if (!SSL_CONNECTION_IS_TLS13(s) && !tls_handle_alpn(s)) { goto err; } wst = WORK_MORE_C; } #ifndef OPENSSL_NO_SRP if (wst == WORK_MORE_C) { int ret; if ((ret = ssl_check_srp_ext_ClientHello(s)) == 0) { s->rwstate = SSL_X509_LOOKUP; return WORK_MORE_C; } if (ret < 0) { goto err; } } #endif return WORK_FINISHED_STOP; err: return WORK_ERROR; } CON_FUNC_RETURN tls_construct_server_hello(SSL_CONNECTION *s, WPACKET *pkt) { int compm; size_t sl, len; int version; unsigned char *session_id; int usetls13 = SSL_CONNECTION_IS_TLS13(s) || s->hello_retry_request == SSL_HRR_PENDING; version = usetls13 ? TLS1_2_VERSION : s->version; if (!WPACKET_put_bytes_u16(pkt, version) || !WPACKET_memcpy(pkt, s->hello_retry_request == SSL_HRR_PENDING ? hrrrandom : s->s3.server_random, SSL3_RANDOM_SIZE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (s->session->not_resumable || (!(SSL_CONNECTION_GET_CTX(s)->session_cache_mode & SSL_SESS_CACHE_SERVER) && !s->hit)) s->session->session_id_length = 0; if (usetls13) { sl = s->tmp_session_id_len; session_id = s->tmp_session_id; } else { sl = s->session->session_id_length; session_id = s->session->session_id; } if (sl > sizeof(s->session->session_id)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } #ifdef OPENSSL_NO_COMP compm = 0; #else if (usetls13 || s->s3.tmp.new_compression == NULL) compm = 0; else compm = s->s3.tmp.new_compression->id; #endif if (!WPACKET_sub_memcpy_u8(pkt, session_id, sl) || !SSL_CONNECTION_GET_SSL(s)->method->put_cipher_by_char(s->s3.tmp.new_cipher, pkt, &len) || !WPACKET_put_bytes_u8(pkt, compm)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!tls_construct_extensions(s, pkt, s->hello_retry_request == SSL_HRR_PENDING ? SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST : (SSL_CONNECTION_IS_TLS13(s) ? SSL_EXT_TLS1_3_SERVER_HELLO : SSL_EXT_TLS1_2_SERVER_HELLO), NULL, 0)) { return CON_FUNC_ERROR; } if (s->hello_retry_request == SSL_HRR_PENDING) { SSL_SESSION_free(s->session); s->session = NULL; s->hit = 0; if (!create_synthetic_message_hash(s, NULL, 0, NULL, 0)) { return CON_FUNC_ERROR; } } else if (!(s->verify_mode & SSL_VERIFY_PEER) && !ssl3_digest_cached_records(s, 0)) { ; return CON_FUNC_ERROR; } return CON_FUNC_SUCCESS; } CON_FUNC_RETURN tls_construct_server_done(SSL_CONNECTION *s, WPACKET *pkt) { if (!s->s3.tmp.cert_request) { if (!ssl3_digest_cached_records(s, 0)) { return CON_FUNC_ERROR; } } return CON_FUNC_SUCCESS; } CON_FUNC_RETURN tls_construct_server_key_exchange(SSL_CONNECTION *s, WPACKET *pkt) { EVP_PKEY *pkdh = NULL; unsigned char *encodedPoint = NULL; size_t encodedlen = 0; int curve_id = 0; const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg; int i; unsigned long type; BIGNUM *r[4]; EVP_MD_CTX *md_ctx = EVP_MD_CTX_new(); EVP_PKEY_CTX *pctx = NULL; size_t paramlen, paramoffset; int freer = 0; CON_FUNC_RETURN ret = CON_FUNC_ERROR; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!WPACKET_get_total_written(pkt, &paramoffset)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (md_ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } type = s->s3.tmp.new_cipher->algorithm_mkey; r[0] = r[1] = r[2] = r[3] = NULL; #ifndef OPENSSL_NO_PSK if (type & (SSL_kPSK | SSL_kRSAPSK)) { } else #endif if (type & (SSL_kDHE | SSL_kDHEPSK)) { CERT *cert = s->cert; EVP_PKEY *pkdhp = NULL; if (s->cert->dh_tmp_auto) { pkdh = ssl_get_auto_dh(s); if (pkdh == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pkdhp = pkdh; } else { pkdhp = cert->dh_tmp; } #if !defined(OPENSSL_NO_DEPRECATED_3_0) if ((pkdhp == NULL) && (s->cert->dh_tmp_cb != NULL)) { pkdh = ssl_dh_to_pkey(s->cert->dh_tmp_cb(SSL_CONNECTION_GET_SSL(s), 0, 1024)); if (pkdh == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pkdhp = pkdh; } #endif if (pkdhp == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_MISSING_TMP_DH_KEY); goto err; } if (!ssl_security(s, SSL_SECOP_TMP_DH, EVP_PKEY_get_security_bits(pkdhp), 0, pkdhp)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_DH_KEY_TOO_SMALL); goto err; } if (s->s3.tmp.pkey != NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } s->s3.tmp.pkey = ssl_generate_pkey(s, pkdhp); if (s->s3.tmp.pkey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } EVP_PKEY_free(pkdh); pkdh = NULL; freer = 1; if (!EVP_PKEY_get_bn_param(s->s3.tmp.pkey, OSSL_PKEY_PARAM_FFC_P, &r[0]) || !EVP_PKEY_get_bn_param(s->s3.tmp.pkey, OSSL_PKEY_PARAM_FFC_G, &r[1]) || !EVP_PKEY_get_bn_param(s->s3.tmp.pkey, OSSL_PKEY_PARAM_PUB_KEY, &r[2])) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } else if (type & (SSL_kECDHE | SSL_kECDHEPSK)) { if (s->s3.tmp.pkey != NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } curve_id = tls1_shared_group(s, -2); if (curve_id == 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_UNSUPPORTED_ELLIPTIC_CURVE); goto err; } s->session->kex_group = curve_id; s->s3.tmp.pkey = ssl_generate_pkey_group(s, curve_id); if (s->s3.tmp.pkey == NULL) { goto err; } encodedlen = EVP_PKEY_get1_encoded_public_key(s->s3.tmp.pkey, &encodedPoint); if (encodedlen == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EC_LIB); goto err; } r[0] = NULL; r[1] = NULL; r[2] = NULL; r[3] = NULL; } else #ifndef OPENSSL_NO_SRP if (type & SSL_kSRP) { if ((s->srp_ctx.N == NULL) || (s->srp_ctx.g == NULL) || (s->srp_ctx.s == NULL) || (s->srp_ctx.B == NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_MISSING_SRP_PARAM); goto err; } r[0] = s->srp_ctx.N; r[1] = s->srp_ctx.g; r[2] = s->srp_ctx.s; r[3] = s->srp_ctx.B; } else #endif { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE); goto err; } if (((s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP)) != 0) || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK)) != 0) { lu = NULL; } else if (lu == NULL) { SSLfatal(s, SSL_AD_DECODE_ERROR, ERR_R_INTERNAL_ERROR); goto err; } #ifndef OPENSSL_NO_PSK if (type & SSL_PSK) { size_t len = (s->cert->psk_identity_hint == NULL) ? 0 : strlen(s->cert->psk_identity_hint); if (len > PSK_MAX_IDENTITY_LEN || !WPACKET_sub_memcpy_u16(pkt, s->cert->psk_identity_hint, len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } #endif for (i = 0; i < 4 && r[i] != NULL; i++) { unsigned char *binval; int res; #ifndef OPENSSL_NO_SRP if ((i == 2) && (type & SSL_kSRP)) { res = WPACKET_start_sub_packet_u8(pkt); } else #endif res = WPACKET_start_sub_packet_u16(pkt); if (!res) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if ((i == 2) && (type & (SSL_kDHE | SSL_kDHEPSK))) { size_t len = BN_num_bytes(r[0]) - BN_num_bytes(r[2]); if (len > 0) { if (!WPACKET_allocate_bytes(pkt, len, &binval)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } memset(binval, 0, len); } } if (!WPACKET_allocate_bytes(pkt, BN_num_bytes(r[i]), &binval) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } BN_bn2bin(r[i], binval); } if (type & (SSL_kECDHE | SSL_kECDHEPSK)) { if (!WPACKET_put_bytes_u8(pkt, NAMED_CURVE_TYPE) || !WPACKET_put_bytes_u8(pkt, 0) || !WPACKET_put_bytes_u8(pkt, curve_id) || !WPACKET_sub_memcpy_u8(pkt, encodedPoint, encodedlen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } OPENSSL_free(encodedPoint); encodedPoint = NULL; } if (lu != NULL) { EVP_PKEY *pkey = s->s3.tmp.cert->privatekey; const EVP_MD *md; unsigned char *sigbytes1, *sigbytes2, *tbs; size_t siglen = 0, tbslen; if (pkey == NULL || !tls1_lookup_md(sctx, lu, &md)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!WPACKET_get_length(pkt, &paramlen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (EVP_DigestSignInit_ex(md_ctx, &pctx, md == NULL ? NULL : EVP_MD_get0_name(md), sctx->libctx, sctx->propq, pkey, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (lu->sig == EVP_PKEY_RSA_PSS) { if (EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) <= 0 || EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, RSA_PSS_SALTLEN_DIGEST) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } } tbslen = construct_key_exchange_tbs(s, &tbs, s->init_buf->data + paramoffset, paramlen); if (tbslen == 0) { goto err; } if (EVP_DigestSign(md_ctx, NULL, &siglen, tbs, tbslen) <=0 || !WPACKET_sub_reserve_bytes_u16(pkt, siglen, &sigbytes1) || EVP_DigestSign(md_ctx, sigbytes1, &siglen, tbs, tbslen) <= 0 || !WPACKET_sub_allocate_bytes_u16(pkt, siglen, &sigbytes2) || sigbytes1 != sigbytes2) { OPENSSL_free(tbs); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } OPENSSL_free(tbs); } ret = CON_FUNC_SUCCESS; err: EVP_PKEY_free(pkdh); OPENSSL_free(encodedPoint); EVP_MD_CTX_free(md_ctx); if (freer) { BN_free(r[0]); BN_free(r[1]); BN_free(r[2]); BN_free(r[3]); } return ret; } CON_FUNC_RETURN tls_construct_certificate_request(SSL_CONNECTION *s, WPACKET *pkt) { if (SSL_CONNECTION_IS_TLS13(s)) { if (s->post_handshake_auth == SSL_PHA_REQUEST_PENDING) { OPENSSL_free(s->pha_context); s->pha_context_len = 32; if ((s->pha_context = OPENSSL_malloc(s->pha_context_len)) == NULL) { s->pha_context_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, s->pha_context, s->pha_context_len, 0) <= 0 || !WPACKET_sub_memcpy_u8(pkt, s->pha_context, s->pha_context_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!tls13_restore_handshake_digest_for_pha(s)) { return CON_FUNC_ERROR; } } else { if (!WPACKET_put_bytes_u8(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } if (!tls_construct_extensions(s, pkt, SSL_EXT_TLS1_3_CERTIFICATE_REQUEST, NULL, 0)) { return CON_FUNC_ERROR; } goto done; } if (!WPACKET_start_sub_packet_u8(pkt) || !ssl3_get_req_cert_type(s, pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (SSL_USE_SIGALGS(s)) { const uint16_t *psigs; size_t nl = tls12_get_psigalgs(s, 1, &psigs); if (!WPACKET_start_sub_packet_u16(pkt) || !WPACKET_set_flags(pkt, WPACKET_FLAGS_NON_ZERO_LENGTH) || !tls12_copy_sigalgs(s, pkt, psigs, nl) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } if (!construct_ca_names(s, get_ca_names(s), pkt)) { return CON_FUNC_ERROR; } done: s->certreqs_sent++; s->s3.tmp.cert_request = 1; return CON_FUNC_SUCCESS; } static int tls_process_cke_psk_preamble(SSL_CONNECTION *s, PACKET *pkt) { #ifndef OPENSSL_NO_PSK unsigned char psk[PSK_MAX_PSK_LEN]; size_t psklen; PACKET psk_identity; if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_DATA_LENGTH_TOO_LONG); return 0; } if (s->psk_server_callback == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_PSK_NO_SERVER_CB); return 0; } if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } psklen = s->psk_server_callback(SSL_CONNECTION_GET_SSL(s), s->session->psk_identity, psk, sizeof(psk)); if (psklen > PSK_MAX_PSK_LEN) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } else if (psklen == 0) { SSLfatal(s, SSL_AD_UNKNOWN_PSK_IDENTITY, SSL_R_PSK_IDENTITY_NOT_FOUND); return 0; } OPENSSL_free(s->s3.tmp.psk); s->s3.tmp.psk = OPENSSL_memdup(psk, psklen); OPENSSL_cleanse(psk, psklen); if (s->s3.tmp.psk == NULL) { s->s3.tmp.psklen = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } s->s3.tmp.psklen = psklen; return 1; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } static int tls_process_cke_rsa(SSL_CONNECTION *s, PACKET *pkt) { size_t outlen; PACKET enc_premaster; EVP_PKEY *rsa = NULL; unsigned char *rsa_decrypt = NULL; int ret = 0; EVP_PKEY_CTX *ctx = NULL; OSSL_PARAM params[3], *p = params; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); rsa = s->cert->pkeys[SSL_PKEY_RSA].privatekey; if (rsa == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_MISSING_RSA_CERTIFICATE); return 0; } if (s->version == SSL3_VERSION || s->version == DTLS1_BAD_VER) { enc_premaster = *pkt; } else { if (!PACKET_get_length_prefixed_2(pkt, &enc_premaster) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } } outlen = SSL_MAX_MASTER_KEY_LENGTH; rsa_decrypt = OPENSSL_malloc(outlen); if (rsa_decrypt == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } ctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, rsa, sctx->propq); if (ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_PKEY_decrypt_init(ctx) <= 0 || EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_WITH_TLS_PADDING) <= 0) { SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } *p++ = OSSL_PARAM_construct_uint(OSSL_ASYM_CIPHER_PARAM_TLS_CLIENT_VERSION, (unsigned int *)&s->client_version); if ((s->options & SSL_OP_TLS_ROLLBACK_BUG) != 0) *p++ = OSSL_PARAM_construct_uint( OSSL_ASYM_CIPHER_PARAM_TLS_NEGOTIATED_VERSION, (unsigned int *)&s->version); *p++ = OSSL_PARAM_construct_end(); if (!EVP_PKEY_CTX_set_params(ctx, params) || EVP_PKEY_decrypt(ctx, rsa_decrypt, &outlen, PACKET_data(&enc_premaster), PACKET_remaining(&enc_premaster)) <= 0) { SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } if (outlen != SSL_MAX_MASTER_KEY_LENGTH) { OPENSSL_cleanse(rsa_decrypt, SSL_MAX_MASTER_KEY_LENGTH); SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } if (!ssl_generate_master_secret(s, rsa_decrypt, outlen, 0)) { goto err; } ret = 1; err: OPENSSL_free(rsa_decrypt); EVP_PKEY_CTX_free(ctx); return ret; } static int tls_process_cke_dhe(SSL_CONNECTION *s, PACKET *pkt) { EVP_PKEY *skey = NULL; unsigned int i; const unsigned char *data; EVP_PKEY *ckey = NULL; int ret = 0; if (!PACKET_get_net_2(pkt, &i) || PACKET_remaining(pkt) != i) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG); goto err; } skey = s->s3.tmp.pkey; if (skey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_MISSING_TMP_DH_KEY); goto err; } if (PACKET_remaining(pkt) == 0L) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_MISSING_TMP_DH_KEY); goto err; } if (!PACKET_get_bytes(pkt, &data, i)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ckey = EVP_PKEY_new(); if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_COPY_PARAMETERS_FAILED); goto err; } if (!EVP_PKEY_set1_encoded_public_key(ckey, data, i)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (ssl_derive(s, skey, ckey, 1) == 0) { goto err; } ret = 1; EVP_PKEY_free(s->s3.tmp.pkey); s->s3.tmp.pkey = NULL; err: EVP_PKEY_free(ckey); return ret; } static int tls_process_cke_ecdhe(SSL_CONNECTION *s, PACKET *pkt) { EVP_PKEY *skey = s->s3.tmp.pkey; EVP_PKEY *ckey = NULL; int ret = 0; if (PACKET_remaining(pkt) == 0L) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_MISSING_TMP_ECDH_KEY); goto err; } else { unsigned int i; const unsigned char *data; if (!PACKET_get_1(pkt, &i) || !PACKET_get_bytes(pkt, &data, i) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (skey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_MISSING_TMP_ECDH_KEY); goto err; } ckey = EVP_PKEY_new(); if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_COPY_PARAMETERS_FAILED); goto err; } if (EVP_PKEY_set1_encoded_public_key(ckey, data, i) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EC_LIB); goto err; } } if (ssl_derive(s, skey, ckey, 1) == 0) { goto err; } ret = 1; EVP_PKEY_free(s->s3.tmp.pkey); s->s3.tmp.pkey = NULL; err: EVP_PKEY_free(ckey); return ret; } static int tls_process_cke_srp(SSL_CONNECTION *s, PACKET *pkt) { #ifndef OPENSSL_NO_SRP unsigned int i; const unsigned char *data; if (!PACKET_get_net_2(pkt, &i) || !PACKET_get_bytes(pkt, &data, i)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRP_A_LENGTH); return 0; } if ((s->srp_ctx.A = BN_bin2bn(data, i, NULL)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BN_LIB); return 0; } if (BN_ucmp(s->srp_ctx.A, s->srp_ctx.N) >= 0 || BN_is_zero(s->srp_ctx.A)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_SRP_PARAMETERS); return 0; } OPENSSL_free(s->session->srp_username); s->session->srp_username = OPENSSL_strdup(s->srp_ctx.login); if (s->session->srp_username == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } if (!srp_generate_server_master_secret(s)) { return 0; } return 1; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } static int tls_process_cke_gost(SSL_CONNECTION *s, PACKET *pkt) { #ifndef OPENSSL_NO_GOST EVP_PKEY_CTX *pkey_ctx; EVP_PKEY *client_pub_pkey = NULL, *pk = NULL; unsigned char premaster_secret[32]; const unsigned char *start; size_t outlen = sizeof(premaster_secret), inlen; unsigned long alg_a; GOST_KX_MESSAGE *pKX = NULL; const unsigned char *ptr; int ret = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); alg_a = s->s3.tmp.new_cipher->algorithm_auth; if (alg_a & SSL_aGOST12) { pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey; if (pk == NULL) { pk = s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; } if (pk == NULL) { pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; } } else if (alg_a & SSL_aGOST01) { pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; } pkey_ctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pk, sctx->propq); if (pkey_ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } if (EVP_PKEY_decrypt_init(pkey_ctx) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } client_pub_pkey = tls_get_peer_pkey(s); if (client_pub_pkey) { if (EVP_PKEY_derive_set_peer(pkey_ctx, client_pub_pkey) <= 0) ERR_clear_error(); } ptr = PACKET_data(pkt); pKX = d2i_GOST_KX_MESSAGE(NULL, &ptr, PACKET_remaining(pkt)); if (pKX == NULL || pKX->kxBlob == NULL || ASN1_TYPE_get(pKX->kxBlob) != V_ASN1_SEQUENCE) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } if (!PACKET_forward(pkt, ptr - PACKET_data(pkt))) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } inlen = pKX->kxBlob->value.sequence->length; start = pKX->kxBlob->value.sequence->data; if (EVP_PKEY_decrypt(pkey_ctx, premaster_secret, &outlen, start, inlen) <= 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } if (!ssl_generate_master_secret(s, premaster_secret, outlen, 0)) { goto err; } if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, -1, EVP_PKEY_CTRL_PEER_KEY, 2, NULL) > 0) s->statem.no_cert_verify = 1; ret = 1; err: EVP_PKEY_CTX_free(pkey_ctx); GOST_KX_MESSAGE_free(pKX); return ret; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } static int tls_process_cke_gost18(SSL_CONNECTION *s, PACKET *pkt) { #ifndef OPENSSL_NO_GOST unsigned char rnd_dgst[32]; EVP_PKEY_CTX *pkey_ctx = NULL; EVP_PKEY *pk = NULL; unsigned char premaster_secret[32]; const unsigned char *start = NULL; size_t outlen = sizeof(premaster_secret), inlen = 0; int ret = 0; int cipher_nid = ossl_gost18_cke_cipher_nid(s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (cipher_nid == NID_undef) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (ossl_gost_ukm(s, rnd_dgst) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey != NULL ? s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey : s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; if (pk == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_HANDSHAKE_STATE); goto err; } pkey_ctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pk, sctx->propq); if (pkey_ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_PKEY_decrypt_init(pkey_ctx) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, EVP_PKEY_OP_DECRYPT, EVP_PKEY_CTRL_SET_IV, 32, rnd_dgst) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LIBRARY_BUG); goto err; } if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, EVP_PKEY_OP_DECRYPT, EVP_PKEY_CTRL_CIPHER, cipher_nid, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LIBRARY_BUG); goto err; } inlen = PACKET_remaining(pkt); start = PACKET_data(pkt); if (EVP_PKEY_decrypt(pkey_ctx, premaster_secret, &outlen, start, inlen) <= 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_DECRYPTION_FAILED); goto err; } if (!ssl_generate_master_secret(s, premaster_secret, outlen, 0)) { goto err; } ret = 1; err: EVP_PKEY_CTX_free(pkey_ctx); return ret; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL_CONNECTION *s, PACKET *pkt) { unsigned long alg_k; alg_k = s->s3.tmp.new_cipher->algorithm_mkey; if ((alg_k & SSL_PSK) && !tls_process_cke_psk_preamble(s, pkt)) { goto err; } if (alg_k & SSL_kPSK) { if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!ssl_generate_master_secret(s, NULL, 0, 0)) { goto err; } } else if (alg_k & (SSL_kRSA | SSL_kRSAPSK)) { if (!tls_process_cke_rsa(s, pkt)) { goto err; } } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { if (!tls_process_cke_dhe(s, pkt)) { goto err; } } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { if (!tls_process_cke_ecdhe(s, pkt)) { goto err; } } else if (alg_k & SSL_kSRP) { if (!tls_process_cke_srp(s, pkt)) { goto err; } } else if (alg_k & SSL_kGOST) { if (!tls_process_cke_gost(s, pkt)) { goto err; } } else if (alg_k & SSL_kGOST18) { if (!tls_process_cke_gost18(s, pkt)) { goto err; } } else { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_UNKNOWN_CIPHER_TYPE); goto err; } return MSG_PROCESS_CONTINUE_PROCESSING; err: #ifndef OPENSSL_NO_PSK OPENSSL_clear_free(s->s3.tmp.psk, s->s3.tmp.psklen); s->s3.tmp.psk = NULL; s->s3.tmp.psklen = 0; #endif return MSG_PROCESS_ERROR; } WORK_STATE tls_post_process_client_key_exchange(SSL_CONNECTION *s, WORK_STATE wst) { #ifndef OPENSSL_NO_SCTP if (wst == WORK_MORE_A) { if (SSL_CONNECTION_IS_DTLS(s)) { unsigned char sctpauthkey[64]; char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)]; size_t labellen; memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL, sizeof(DTLS1_SCTP_AUTH_LABEL)); labellen = sizeof(labelbuffer) - 1; if (s->mode & SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG) labellen += 1; if (SSL_export_keying_material(SSL_CONNECTION_GET_SSL(s), sctpauthkey, sizeof(sctpauthkey), labelbuffer, labellen, NULL, 0, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; } BIO_ctrl(s->wbio, BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY, sizeof(sctpauthkey), sctpauthkey); } } #endif if (s->statem.no_cert_verify || !received_client_cert(s)) { if (!ssl3_digest_cached_records(s, 0)) { return WORK_ERROR; } return WORK_FINISHED_CONTINUE; } else { if (!s->s3.handshake_buffer) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; } if (!ssl3_digest_cached_records(s, 1)) { return WORK_ERROR; } } return WORK_FINISHED_CONTINUE; } MSG_PROCESS_RETURN tls_process_client_rpk(SSL_CONNECTION *sc, PACKET *pkt) { MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR; SSL_SESSION *new_sess = NULL; EVP_PKEY *peer_rpk = NULL; if (!tls_process_rpk(sc, pkt, &peer_rpk)) { goto err; } if (peer_rpk == NULL) { if ((sc->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT) && (sc->verify_mode & SSL_VERIFY_PEER)) { SSLfatal(sc, SSL_AD_CERTIFICATE_REQUIRED, SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE); goto err; } } else { if (ssl_verify_rpk(sc, peer_rpk) <= 0) { SSLfatal(sc, ssl_x509err2alert(sc->verify_result), SSL_R_CERTIFICATE_VERIFY_FAILED); goto err; } } if (sc->post_handshake_auth == SSL_PHA_REQUESTED) { if ((new_sess = ssl_session_dup(sc->session, 0)) == NULL) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_MALLOC_FAILURE); goto err; } SSL_SESSION_free(sc->session); sc->session = new_sess; } X509_free(sc->session->peer); sc->session->peer = NULL; sk_X509_pop_free(sc->session->peer_chain, X509_free); sc->session->peer_chain = NULL; EVP_PKEY_free(sc->session->peer_rpk); sc->session->peer_rpk = peer_rpk; peer_rpk = NULL; sc->session->verify_result = sc->verify_result; if (SSL_CONNECTION_IS_TLS13(sc)) { if (!ssl3_digest_cached_records(sc, 1)) { goto err; } if (!ssl_handshake_hash(sc, sc->cert_verify_hash, sizeof(sc->cert_verify_hash), &sc->cert_verify_hash_len)) { ; goto err; } sc->sent_tickets = 0; } ret = MSG_PROCESS_CONTINUE_READING; err: EVP_PKEY_free(peer_rpk); return ret; } MSG_PROCESS_RETURN tls_process_client_certificate(SSL_CONNECTION *s, PACKET *pkt) { int i; MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR; X509 *x = NULL; unsigned long l; const unsigned char *certstart, *certbytes; STACK_OF(X509) *sk = NULL; PACKET spkt, context; size_t chainidx; SSL_SESSION *new_sess = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (s->rlayer.rrlmethod->set_plain_alerts != NULL) s->rlayer.rrlmethod->set_plain_alerts(s->rlayer.rrl, 0); if (s->ext.client_cert_type == TLSEXT_cert_type_rpk) return tls_process_client_rpk(s, pkt); if (s->ext.client_cert_type != TLSEXT_cert_type_x509) { SSLfatal(s, SSL_AD_UNSUPPORTED_CERTIFICATE, SSL_R_UNKNOWN_CERTIFICATE_TYPE); goto err; } if ((sk = sk_X509_new_null()) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (SSL_CONNECTION_IS_TLS13(s) && (!PACKET_get_length_prefixed_1(pkt, &context) || (s->pha_context == NULL && PACKET_remaining(&context) != 0) || (s->pha_context != NULL && !PACKET_equal(&context, s->pha_context, s->pha_context_len)))) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT); goto err; } if (!PACKET_get_length_prefixed_3(pkt, &spkt) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } for (chainidx = 0; PACKET_remaining(&spkt) > 0; chainidx++) { if (!PACKET_get_net_3(&spkt, &l) || !PACKET_get_bytes(&spkt, &certbytes, l)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_CERT_LENGTH_MISMATCH); goto err; } certstart = certbytes; x = X509_new_ex(sctx->libctx, sctx->propq); if (x == NULL) { SSLfatal(s, SSL_AD_DECODE_ERROR, ERR_R_X509_LIB); goto err; } if (d2i_X509(&x, (const unsigned char **)&certbytes, l) == NULL) { SSLfatal(s, SSL_AD_DECODE_ERROR, ERR_R_ASN1_LIB); goto err; } if (certbytes != (certstart + l)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_CERT_LENGTH_MISMATCH); goto err; } if (SSL_CONNECTION_IS_TLS13(s)) { RAW_EXTENSION *rawexts = NULL; PACKET extensions; if (!PACKET_get_length_prefixed_2(&spkt, &extensions)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH); goto err; } if (!tls_collect_extensions(s, &extensions, SSL_EXT_TLS1_3_CERTIFICATE, &rawexts, NULL, chainidx == 0) || !tls_parse_all_extensions(s, SSL_EXT_TLS1_3_CERTIFICATE, rawexts, x, chainidx, PACKET_remaining(&spkt) == 0)) { OPENSSL_free(rawexts); goto err; } OPENSSL_free(rawexts); } if (!sk_X509_push(sk, x)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } x = NULL; } if (sk_X509_num(sk) <= 0) { if (s->version == SSL3_VERSION) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_CERTIFICATES_RETURNED); goto err; } else if ((s->verify_mode & SSL_VERIFY_PEER) && (s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) { SSLfatal(s, SSL_AD_CERTIFICATE_REQUIRED, SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE); goto err; } if (s->s3.handshake_buffer && !ssl3_digest_cached_records(s, 0)) { goto err; } } else { EVP_PKEY *pkey; i = ssl_verify_cert_chain(s, sk); if (i <= 0) { SSLfatal(s, ssl_x509err2alert(s->verify_result), SSL_R_CERTIFICATE_VERIFY_FAILED); goto err; } pkey = X509_get0_pubkey(sk_X509_value(sk, 0)); if (pkey == NULL) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_UNKNOWN_CERTIFICATE_TYPE); goto err; } } if (s->post_handshake_auth == SSL_PHA_REQUESTED) { if ((new_sess = ssl_session_dup(s->session, 0)) == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); goto err; } SSL_SESSION_free(s->session); s->session = new_sess; } X509_free(s->session->peer); s->session->peer = sk_X509_shift(sk); s->session->verify_result = s->verify_result; OSSL_STACK_OF_X509_free(s->session->peer_chain); s->session->peer_chain = sk; sk = NULL; EVP_PKEY_free(s->session->peer_rpk); s->session->peer_rpk = NULL; if (SSL_CONNECTION_IS_TLS13(s) && !ssl3_digest_cached_records(s, 1)) { goto err; } if (SSL_CONNECTION_IS_TLS13(s)) { if (!ssl_handshake_hash(s, s->cert_verify_hash, sizeof(s->cert_verify_hash), &s->cert_verify_hash_len)) { goto err; } s->sent_tickets = 0; } ret = MSG_PROCESS_CONTINUE_READING; err: X509_free(x); OSSL_STACK_OF_X509_free(sk); return ret; } #ifndef OPENSSL_NO_COMP_ALG MSG_PROCESS_RETURN tls_process_client_compressed_certificate(SSL_CONNECTION *sc, PACKET *pkt) { MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR; PACKET tmppkt; BUF_MEM *buf = BUF_MEM_new(); if (tls13_process_compressed_certificate(sc, pkt, &tmppkt, buf) != MSG_PROCESS_ERROR) ret = tls_process_client_certificate(sc, &tmppkt); BUF_MEM_free(buf); return ret; } #endif CON_FUNC_RETURN tls_construct_server_certificate(SSL_CONNECTION *s, WPACKET *pkt) { CERT_PKEY *cpk = s->s3.tmp.cert; if (cpk == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (SSL_CONNECTION_IS_TLS13(s) && !WPACKET_put_bytes_u8(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } switch (s->ext.server_cert_type) { case TLSEXT_cert_type_rpk: if (!tls_output_rpk(s, pkt, cpk)) { return 0; } break; case TLSEXT_cert_type_x509: if (!ssl3_output_cert_chain(s, pkt, cpk, 0)) { return 0; } break; default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return CON_FUNC_SUCCESS; } #ifndef OPENSSL_NO_COMP_ALG CON_FUNC_RETURN tls_construct_server_compressed_certificate(SSL_CONNECTION *sc, WPACKET *pkt) { int alg = get_compressed_certificate_alg(sc); OSSL_COMP_CERT *cc = sc->s3.tmp.cert->comp_cert[alg]; if (!ossl_assert(cc != NULL)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!WPACKET_put_bytes_u16(pkt, alg) || !WPACKET_put_bytes_u24(pkt, cc->orig_len) || !WPACKET_start_sub_packet_u24(pkt) || !WPACKET_memcpy(pkt, cc->data, cc->len) || !WPACKET_close(pkt)) return 0; sc->s3.tmp.cert->cert_comp_used++; return 1; } #endif static int create_ticket_prequel(SSL_CONNECTION *s, WPACKET *pkt, uint32_t age_add, unsigned char *tick_nonce) { uint32_t timeout = (uint32_t)ossl_time2seconds(s->session->timeout); #define ONE_WEEK_SEC (7 * 24 * 60 * 60) if (SSL_CONNECTION_IS_TLS13(s)) { if (ossl_time_compare(s->session->timeout, ossl_seconds2time(ONE_WEEK_SEC)) > 0) timeout = ONE_WEEK_SEC; } else if (s->hit) timeout = 0; if (!WPACKET_put_bytes_u32(pkt, timeout)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (SSL_CONNECTION_IS_TLS13(s)) { if (!WPACKET_put_bytes_u32(pkt, age_add) || !WPACKET_sub_memcpy_u8(pkt, tick_nonce, TICKET_NONCE_SIZE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } if (!WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } static CON_FUNC_RETURN construct_stateless_ticket(SSL_CONNECTION *s, WPACKET *pkt, uint32_t age_add, unsigned char *tick_nonce) { unsigned char *senc = NULL; EVP_CIPHER_CTX *ctx = NULL; SSL_HMAC *hctx = NULL; unsigned char *p, *encdata1, *encdata2, *macdata1, *macdata2; const unsigned char *const_p; int len, slen_full, slen, lenfinal; SSL_SESSION *sess; size_t hlen; SSL_CTX *tctx = s->session_ctx; unsigned char iv[EVP_MAX_IV_LENGTH]; unsigned char key_name[TLSEXT_KEYNAME_LENGTH]; int iv_len; CON_FUNC_RETURN ok = CON_FUNC_ERROR; size_t macoffset, macendoffset; SSL *ssl = SSL_CONNECTION_GET_SSL(s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); slen_full = i2d_SSL_SESSION(s->session, NULL); if (slen_full == 0 || slen_full > 0xFF00) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } senc = OPENSSL_malloc(slen_full); if (senc == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } ctx = EVP_CIPHER_CTX_new(); if (ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } hctx = ssl_hmac_new(tctx); if (hctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); goto err; } p = senc; if (!i2d_SSL_SESSION(s->session, &p)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } const_p = senc; sess = d2i_SSL_SESSION_ex(NULL, &const_p, slen_full, sctx->libctx, sctx->propq); if (sess == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } slen = i2d_SSL_SESSION(sess, NULL); if (slen == 0 || slen > slen_full) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); SSL_SESSION_free(sess); goto err; } p = senc; if (!i2d_SSL_SESSION(sess, &p)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); SSL_SESSION_free(sess); goto err; } SSL_SESSION_free(sess); #ifndef OPENSSL_NO_DEPRECATED_3_0 if (tctx->ext.ticket_key_evp_cb != NULL || tctx->ext.ticket_key_cb != NULL) #else if (tctx->ext.ticket_key_evp_cb != NULL) #endif { int ret = 0; if (tctx->ext.ticket_key_evp_cb != NULL) ret = tctx->ext.ticket_key_evp_cb(ssl, key_name, iv, ctx, ssl_hmac_get0_EVP_MAC_CTX(hctx), 1); #ifndef OPENSSL_NO_DEPRECATED_3_0 else if (tctx->ext.ticket_key_cb != NULL) ret = tctx->ext.ticket_key_cb(ssl, key_name, iv, ctx, ssl_hmac_get0_HMAC_CTX(hctx), 1); #endif if (ret == 0) { if (SSL_CONNECTION_IS_TLS13(s)) { ok = CON_FUNC_DONT_SEND; goto err; } if (!WPACKET_put_bytes_u32(pkt, 0) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } OPENSSL_free(senc); EVP_CIPHER_CTX_free(ctx); ssl_hmac_free(hctx); return CON_FUNC_SUCCESS; } if (ret < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_CALLBACK_FAILED); goto err; } iv_len = EVP_CIPHER_CTX_get_iv_length(ctx); if (iv_len < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } else { EVP_CIPHER *cipher = EVP_CIPHER_fetch(sctx->libctx, "AES-256-CBC", sctx->propq); if (cipher == NULL) { SSLfatal_alert(s, SSL_AD_INTERNAL_ERROR); goto err; } iv_len = EVP_CIPHER_get_iv_length(cipher); if (iv_len < 0 || RAND_bytes_ex(sctx->libctx, iv, iv_len, 0) <= 0 || !EVP_EncryptInit_ex(ctx, cipher, NULL, tctx->ext.secure->tick_aes_key, iv) || !ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, sizeof(tctx->ext.secure->tick_hmac_key), "SHA256")) { EVP_CIPHER_free(cipher); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } EVP_CIPHER_free(cipher); memcpy(key_name, tctx->ext.tick_key_name, sizeof(tctx->ext.tick_key_name)); } if (!create_ticket_prequel(s, pkt, age_add, tick_nonce)) { goto err; } if (!WPACKET_get_total_written(pkt, &macoffset) || !WPACKET_memcpy(pkt, key_name, sizeof(key_name)) || !WPACKET_memcpy(pkt, iv, iv_len) || !WPACKET_reserve_bytes(pkt, slen + EVP_MAX_BLOCK_LENGTH, &encdata1) || !EVP_EncryptUpdate(ctx, encdata1, &len, senc, slen) || !WPACKET_allocate_bytes(pkt, len, &encdata2) || encdata1 != encdata2 || !EVP_EncryptFinal(ctx, encdata1 + len, &lenfinal) || !WPACKET_allocate_bytes(pkt, lenfinal, &encdata2) || encdata1 + len != encdata2 || len + lenfinal > slen + EVP_MAX_BLOCK_LENGTH || !WPACKET_get_total_written(pkt, &macendoffset) || !ssl_hmac_update(hctx, (unsigned char *)s->init_buf->data + macoffset, macendoffset - macoffset) || !WPACKET_reserve_bytes(pkt, EVP_MAX_MD_SIZE, &macdata1) || !ssl_hmac_final(hctx, macdata1, &hlen, EVP_MAX_MD_SIZE) || hlen > EVP_MAX_MD_SIZE || !WPACKET_allocate_bytes(pkt, hlen, &macdata2) || macdata1 != macdata2) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ok = CON_FUNC_SUCCESS; err: OPENSSL_free(senc); EVP_CIPHER_CTX_free(ctx); ssl_hmac_free(hctx); return ok; } static int construct_stateful_ticket(SSL_CONNECTION *s, WPACKET *pkt, uint32_t age_add, unsigned char *tick_nonce) { if (!create_ticket_prequel(s, pkt, age_add, tick_nonce)) { return 0; } if (!WPACKET_memcpy(pkt, s->session->session_id, s->session->session_id_length) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } static void tls_update_ticket_counts(SSL_CONNECTION *s) { s->sent_tickets++; s->next_ticket_nonce++; if (s->ext.extra_tickets_expected > 0) s->ext.extra_tickets_expected--; } CON_FUNC_RETURN tls_construct_new_session_ticket(SSL_CONNECTION *s, WPACKET *pkt) { SSL_CTX *tctx = s->session_ctx; unsigned char tick_nonce[TICKET_NONCE_SIZE]; union { unsigned char age_add_c[sizeof(uint32_t)]; uint32_t age_add; } age_add_u; CON_FUNC_RETURN ret = CON_FUNC_ERROR; age_add_u.age_add = 0; if (SSL_CONNECTION_IS_TLS13(s)) { size_t i, hashlen; uint64_t nonce; static const unsigned char nonce_label[] = "resumption"; const EVP_MD *md = ssl_handshake_md(s); int hashleni = EVP_MD_get_size(md); if (!ossl_assert(hashleni >= 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } hashlen = (size_t)hashleni; if (s->sent_tickets != 0 || s->hit) { SSL_SESSION *new_sess = ssl_session_dup(s->session, 0); if (new_sess == NULL) { goto err; } SSL_SESSION_free(s->session); s->session = new_sess; } if (!ssl_generate_session_id(s, s->session)) { goto err; } if (RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, age_add_u.age_add_c, sizeof(age_add_u), 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } s->session->ext.tick_age_add = age_add_u.age_add; nonce = s->next_ticket_nonce; for (i = TICKET_NONCE_SIZE; i > 0; i--) { tick_nonce[i - 1] = (unsigned char)(nonce & 0xff); nonce >>= 8; } if (!tls13_hkdf_expand(s, md, s->resumption_master_secret, nonce_label, sizeof(nonce_label) - 1, tick_nonce, TICKET_NONCE_SIZE, s->session->master_key, hashlen, 1)) { goto err; } s->session->master_key_length = hashlen; s->session->time = ossl_time_now(); ssl_session_calculate_timeout(s->session); if (s->s3.alpn_selected != NULL) { OPENSSL_free(s->session->ext.alpn_selected); s->session->ext.alpn_selected = OPENSSL_memdup(s->s3.alpn_selected, s->s3.alpn_selected_len); if (s->session->ext.alpn_selected == NULL) { s->session->ext.alpn_selected_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } s->session->ext.alpn_selected_len = s->s3.alpn_selected_len; } s->session->ext.max_early_data = s->max_early_data; } if (tctx->generate_ticket_cb != NULL && tctx->generate_ticket_cb(SSL_CONNECTION_GET_SSL(s), tctx->ticket_cb_data) == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_CONNECTION_IS_TLS13(s) && ((s->options & SSL_OP_NO_TICKET) != 0 || (s->max_early_data > 0 && (s->options & SSL_OP_NO_ANTI_REPLAY) == 0))) { if (!construct_stateful_ticket(s, pkt, age_add_u.age_add, tick_nonce)) { goto err; } } else { CON_FUNC_RETURN tmpret; tmpret = construct_stateless_ticket(s, pkt, age_add_u.age_add, tick_nonce); if (tmpret != CON_FUNC_SUCCESS) { if (tmpret == CON_FUNC_DONT_SEND) { ret = CON_FUNC_DONT_SEND; tls_update_ticket_counts(s); } goto err; } } if (SSL_CONNECTION_IS_TLS13(s)) { if (!tls_construct_extensions(s, pkt, SSL_EXT_TLS1_3_NEW_SESSION_TICKET, NULL, 0)) { goto err; } tls_update_ticket_counts(s); ssl_update_cache(s, SSL_SESS_CACHE_SERVER); } ret = CON_FUNC_SUCCESS; err: return ret; } int tls_construct_cert_status_body(SSL_CONNECTION *s, WPACKET *pkt) { if (!WPACKET_put_bytes_u8(pkt, s->ext.status_type) || !WPACKET_sub_memcpy_u24(pkt, s->ext.ocsp.resp, s->ext.ocsp.resp_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } CON_FUNC_RETURN tls_construct_cert_status(SSL_CONNECTION *s, WPACKET *pkt) { if (!tls_construct_cert_status_body(s, pkt)) { return CON_FUNC_ERROR; } return CON_FUNC_SUCCESS; } #ifndef OPENSSL_NO_NEXTPROTONEG MSG_PROCESS_RETURN tls_process_next_proto(SSL_CONNECTION *s, PACKET *pkt) { PACKET next_proto, padding; size_t next_proto_len; if (!PACKET_get_length_prefixed_1(pkt, &next_proto) || !PACKET_get_length_prefixed_1(pkt, &padding) || PACKET_remaining(pkt) > 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } if (!PACKET_memdup(&next_proto, &s->ext.npn, &next_proto_len)) { s->ext.npn_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return MSG_PROCESS_ERROR; } s->ext.npn_len = (unsigned char)next_proto_len; return MSG_PROCESS_CONTINUE_READING; } #endif static CON_FUNC_RETURN tls_construct_encrypted_extensions(SSL_CONNECTION *s, WPACKET *pkt) { if (!tls_construct_extensions(s, pkt, SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, NULL, 0)) { return CON_FUNC_ERROR; } return CON_FUNC_SUCCESS; } MSG_PROCESS_RETURN tls_process_end_of_early_data(SSL_CONNECTION *s, PACKET *pkt) { if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } if (s->early_data_state != SSL_EARLY_DATA_READING && s->early_data_state != SSL_EARLY_DATA_READ_RETRY) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return MSG_PROCESS_ERROR; } if (RECORD_LAYER_processed_read_pending(&s->rlayer)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_NOT_ON_RECORD_BOUNDARY); return MSG_PROCESS_ERROR; } s->early_data_state = SSL_EARLY_DATA_FINISHED_READING; if (!SSL_CONNECTION_GET_SSL(s)->method->ssl3_enc->change_cipher_state(s, SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_SERVER_READ)) { return MSG_PROCESS_ERROR; } return MSG_PROCESS_CONTINUE_READING; }
statem
openssl/ssl/statem/statem_srvr.c
openssl
#include <openssl/ocsp.h> #include "../ssl_local.h" #include "internal/cryptlib.h" #include "statem_local.h" EXT_RETURN tls_construct_ctos_renegotiate(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!s->renegotiate) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_renegotiate) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u8(pkt, s->s3.previous_client_finished, s->s3.previous_client_finished_len) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_server_name(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->ext.hostname == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_name) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u8(pkt, TLSEXT_NAMETYPE_host_name) || !WPACKET_sub_memcpy_u16(pkt, s->ext.hostname, strlen(s->ext.hostname)) || !WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_maxfragmentlen(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->ext.max_fragment_len_mode == TLSEXT_max_fragment_length_DISABLED) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_max_fragment_length) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u8(pkt, s->ext.max_fragment_len_mode) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #ifndef OPENSSL_NO_SRP EXT_RETURN tls_construct_ctos_srp(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->srp_ctx.login == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_srp) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u8(pkt) || !WPACKET_set_flags(pkt, WPACKET_FLAGS_NON_ZERO_LENGTH) || !WPACKET_memcpy(pkt, s->srp_ctx.login, strlen(s->srp_ctx.login)) || !WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #endif static int use_ecc(SSL_CONNECTION *s, int min_version, int max_version) { int i, end, ret = 0; unsigned long alg_k, alg_a; STACK_OF(SSL_CIPHER) *cipher_stack = NULL; const uint16_t *pgroups = NULL; size_t num_groups, j; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->version == SSL3_VERSION) return 0; cipher_stack = SSL_get1_supported_ciphers(ssl); end = sk_SSL_CIPHER_num(cipher_stack); for (i = 0; i < end; i++) { const SSL_CIPHER *c = sk_SSL_CIPHER_value(cipher_stack, i); alg_k = c->algorithm_mkey; alg_a = c->algorithm_auth; if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) || (alg_a & SSL_aECDSA) || c->min_tls >= TLS1_3_VERSION) { ret = 1; break; } } sk_SSL_CIPHER_free(cipher_stack); if (!ret) return 0; tls1_get_supported_groups(s, &pgroups, &num_groups); for (j = 0; j < num_groups; j++) { uint16_t ctmp = pgroups[j]; if (tls_valid_group(s, ctmp, min_version, max_version, 1, NULL) && tls_group_allowed(s, ctmp, SSL_SECOP_CURVE_SUPPORTED)) return 1; } return 0; } EXT_RETURN tls_construct_ctos_ec_pt_formats(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { const unsigned char *pformats; size_t num_formats; int reason, min_version, max_version; reason = ssl_get_min_max_version(s, &min_version, &max_version, NULL); if (reason != 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, reason); return EXT_RETURN_FAIL; } if (!use_ecc(s, min_version, max_version)) return EXT_RETURN_NOT_SENT; tls1_get_formatlist(s, &pformats, &num_formats); if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_ec_point_formats) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u8(pkt, pformats, num_formats) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_supported_groups(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { const uint16_t *pgroups = NULL; size_t num_groups = 0, i, tls13added = 0, added = 0; int min_version, max_version, reason; reason = ssl_get_min_max_version(s, &min_version, &max_version, NULL); if (reason != 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, reason); return EXT_RETURN_FAIL; } if (!use_ecc(s, min_version, max_version) && (SSL_CONNECTION_IS_DTLS(s) || max_version < TLS1_3_VERSION)) return EXT_RETURN_NOT_SENT; tls1_get_supported_groups(s, &pgroups, &num_groups); if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_groups) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_set_flags(pkt, WPACKET_FLAGS_NON_ZERO_LENGTH)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } for (i = 0; i < num_groups; i++) { uint16_t ctmp = pgroups[i]; int okfortls13; if (tls_valid_group(s, ctmp, min_version, max_version, 0, &okfortls13) && tls_group_allowed(s, ctmp, SSL_SECOP_CURVE_SUPPORTED)) { if (!WPACKET_put_bytes_u16(pkt, ctmp)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (okfortls13 && max_version == TLS1_3_VERSION) tls13added++; added++; } } if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) { if (added == 0) SSLfatal_data(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_SUITABLE_GROUPS, "No groups enabled for max supported SSL/TLS version"); else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (tls13added == 0 && max_version == TLS1_3_VERSION) { SSLfatal_data(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_SUITABLE_GROUPS, "No groups enabled for max supported SSL/TLS version"); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_session_ticket(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { size_t ticklen; if (!tls_use_ticket(s)) return EXT_RETURN_NOT_SENT; if (!s->new_session && s->session != NULL && s->session->ext.tick != NULL && s->session->ssl_version != TLS1_3_VERSION) { ticklen = s->session->ext.ticklen; } else if (s->session && s->ext.session_ticket != NULL && s->ext.session_ticket->data != NULL) { ticklen = s->ext.session_ticket->length; s->session->ext.tick = OPENSSL_malloc(ticklen); if (s->session->ext.tick == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } memcpy(s->session->ext.tick, s->ext.session_ticket->data, ticklen); s->session->ext.ticklen = ticklen; } else { ticklen = 0; } if (ticklen == 0 && s->ext.session_ticket != NULL && s->ext.session_ticket->data == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_session_ticket) || !WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick, ticklen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_sig_algs(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { size_t salglen; const uint16_t *salg; if (!SSL_CLIENT_USE_SIGALGS(s)) return EXT_RETURN_NOT_SENT; salglen = tls12_get_psigalgs(s, 1, &salg); if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_signature_algorithms) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt) || !tls12_copy_sigalgs(s, pkt, salg, salglen) || !WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #ifndef OPENSSL_NO_OCSP EXT_RETURN tls_construct_ctos_status_request(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { int i; if (x != NULL) return EXT_RETURN_NOT_SENT; if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_status_request) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u8(pkt, TLSEXT_STATUSTYPE_ocsp) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } for (i = 0; i < sk_OCSP_RESPID_num(s->ext.ocsp.ids); i++) { unsigned char *idbytes; OCSP_RESPID *id = sk_OCSP_RESPID_value(s->ext.ocsp.ids, i); int idlen = i2d_OCSP_RESPID(id, NULL); if (idlen <= 0 || !WPACKET_sub_allocate_bytes_u16(pkt, idlen, &idbytes) || i2d_OCSP_RESPID(id, &idbytes) != idlen) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } } if (!WPACKET_close(pkt) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (s->ext.ocsp.exts) { unsigned char *extbytes; int extlen = i2d_X509_EXTENSIONS(s->ext.ocsp.exts, NULL); if (extlen < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (!WPACKET_allocate_bytes(pkt, extlen, &extbytes) || i2d_X509_EXTENSIONS(s->ext.ocsp.exts, &extbytes) != extlen) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } } if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #endif #ifndef OPENSSL_NO_NEXTPROTONEG EXT_RETURN tls_construct_ctos_npn(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (SSL_CONNECTION_GET_CTX(s)->ext.npn_select_cb == NULL || !SSL_IS_FIRST_HANDSHAKE(s)) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_next_proto_neg) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #endif EXT_RETURN tls_construct_ctos_alpn(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { s->s3.alpn_sent = 0; if (s->ext.alpn == NULL || !SSL_IS_FIRST_HANDSHAKE(s)) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_application_layer_protocol_negotiation) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u16(pkt, s->ext.alpn, s->ext.alpn_len) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } s->s3.alpn_sent = 1; return EXT_RETURN_SENT; } #ifndef OPENSSL_NO_SRTP EXT_RETURN tls_construct_ctos_use_srtp(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); STACK_OF(SRTP_PROTECTION_PROFILE) *clnt = SSL_get_srtp_profiles(ssl); int i, end; if (clnt == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_use_srtp) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } end = sk_SRTP_PROTECTION_PROFILE_num(clnt); for (i = 0; i < end; i++) { const SRTP_PROTECTION_PROFILE *prof = sk_SRTP_PROTECTION_PROFILE_value(clnt, i); if (prof == NULL || !WPACKET_put_bytes_u16(pkt, prof->id)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } } if (!WPACKET_close(pkt) || !WPACKET_put_bytes_u8(pkt, 0) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #endif EXT_RETURN tls_construct_ctos_etm(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->options & SSL_OP_NO_ENCRYPT_THEN_MAC) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_encrypt_then_mac) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #ifndef OPENSSL_NO_CT EXT_RETURN tls_construct_ctos_sct(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->ct_validation_callback == NULL) return EXT_RETURN_NOT_SENT; if (x != NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_signed_certificate_timestamp) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #endif EXT_RETURN tls_construct_ctos_ems(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->options & SSL_OP_NO_EXTENDED_MASTER_SECRET) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_extended_master_secret) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_supported_versions(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { int currv, min_version, max_version, reason; reason = ssl_get_min_max_version(s, &min_version, &max_version, NULL); if (reason != 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, reason); return EXT_RETURN_FAIL; } if (max_version < TLS1_3_VERSION) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_versions) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u8(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } for (currv = max_version; currv >= min_version; currv--) { if (!WPACKET_put_bytes_u16(pkt, currv)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } } if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_psk_kex_modes(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 int nodhe = s->options & SSL_OP_ALLOW_NO_DHE_KEX; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk_kex_modes) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u8(pkt) || !WPACKET_put_bytes_u8(pkt, TLSEXT_KEX_MODE_KE_DHE) || (nodhe && !WPACKET_put_bytes_u8(pkt, TLSEXT_KEX_MODE_KE)) || !WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } s->ext.psk_kex_mode = TLSEXT_KEX_MODE_FLAG_KE_DHE; if (nodhe) s->ext.psk_kex_mode |= TLSEXT_KEX_MODE_FLAG_KE; #endif return EXT_RETURN_SENT; } #ifndef OPENSSL_NO_TLS1_3 static int add_key_share(SSL_CONNECTION *s, WPACKET *pkt, unsigned int curve_id) { unsigned char *encoded_point = NULL; EVP_PKEY *key_share_key = NULL; size_t encodedlen; if (s->s3.tmp.pkey != NULL) { if (!ossl_assert(s->hello_retry_request == SSL_HRR_PENDING)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } key_share_key = s->s3.tmp.pkey; } else { key_share_key = ssl_generate_pkey_group(s, curve_id); if (key_share_key == NULL) { return 0; } } encodedlen = EVP_PKEY_get1_encoded_public_key(key_share_key, &encoded_point); if (encodedlen == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EC_LIB); goto err; } if (!WPACKET_put_bytes_u16(pkt, curve_id) || !WPACKET_sub_memcpy_u16(pkt, encoded_point, encodedlen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } s->s3.tmp.pkey = key_share_key; s->s3.group_id = curve_id; OPENSSL_free(encoded_point); return 1; err: if (s->s3.tmp.pkey == NULL) EVP_PKEY_free(key_share_key); OPENSSL_free(encoded_point); return 0; } #endif EXT_RETURN tls_construct_ctos_key_share(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 size_t i, num_groups = 0; const uint16_t *pgroups = NULL; uint16_t curve_id = 0; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_key_share) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } tls1_get_supported_groups(s, &pgroups, &num_groups); if (s->s3.group_id != 0) { curve_id = s->s3.group_id; } else { for (i = 0; i < num_groups; i++) { if (!tls_group_allowed(s, pgroups[i], SSL_SECOP_CURVE_SUPPORTED)) continue; if (!tls_valid_group(s, pgroups[i], TLS1_3_VERSION, TLS1_3_VERSION, 0, NULL)) continue; curve_id = pgroups[i]; break; } } if (curve_id == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_SUITABLE_KEY_SHARE); return EXT_RETURN_FAIL; } if (!add_key_share(s, pkt, curve_id)) { return EXT_RETURN_FAIL; } if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; #else return EXT_RETURN_NOT_SENT; #endif } EXT_RETURN tls_construct_ctos_cookie(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { EXT_RETURN ret = EXT_RETURN_FAIL; if (s->ext.tls13_cookie_len == 0) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_cookie) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u16(pkt, s->ext.tls13_cookie, s->ext.tls13_cookie_len) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto end; } ret = EXT_RETURN_SENT; end: OPENSSL_free(s->ext.tls13_cookie); s->ext.tls13_cookie = NULL; s->ext.tls13_cookie_len = 0; return ret; } EXT_RETURN tls_construct_ctos_early_data(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_PSK char identity[PSK_MAX_IDENTITY_LEN + 1]; #endif const unsigned char *id = NULL; size_t idlen = 0; SSL_SESSION *psksess = NULL; SSL_SESSION *edsess = NULL; const EVP_MD *handmd = NULL; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->hello_retry_request == SSL_HRR_PENDING) handmd = ssl_handshake_md(s); if (s->psk_use_session_cb != NULL && (!s->psk_use_session_cb(ssl, handmd, &id, &idlen, &psksess) || (psksess != NULL && psksess->ssl_version != TLS1_3_VERSION))) { SSL_SESSION_free(psksess); SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_PSK); return EXT_RETURN_FAIL; } #ifndef OPENSSL_NO_PSK if (psksess == NULL && s->psk_client_callback != NULL) { unsigned char psk[PSK_MAX_PSK_LEN]; size_t psklen = 0; memset(identity, 0, sizeof(identity)); psklen = s->psk_client_callback(ssl, NULL, identity, sizeof(identity) - 1, psk, sizeof(psk)); if (psklen > PSK_MAX_PSK_LEN) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } else if (psklen > 0) { const unsigned char tls13_aes128gcmsha256_id[] = { 0x13, 0x01 }; const SSL_CIPHER *cipher; idlen = strlen(identity); if (idlen > PSK_MAX_IDENTITY_LEN) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } id = (unsigned char *)identity; cipher = SSL_CIPHER_find(ssl, tls13_aes128gcmsha256_id); if (cipher == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } psksess = SSL_SESSION_new(); if (psksess == NULL || !SSL_SESSION_set1_master_key(psksess, psk, psklen) || !SSL_SESSION_set_cipher(psksess, cipher) || !SSL_SESSION_set_protocol_version(psksess, TLS1_3_VERSION)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); OPENSSL_cleanse(psk, psklen); return EXT_RETURN_FAIL; } OPENSSL_cleanse(psk, psklen); } } #endif SSL_SESSION_free(s->psksession); s->psksession = psksess; if (psksess != NULL) { OPENSSL_free(s->psksession_id); s->psksession_id = OPENSSL_memdup(id, idlen); if (s->psksession_id == NULL) { s->psksession_id_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } s->psksession_id_len = idlen; } if (s->early_data_state != SSL_EARLY_DATA_CONNECTING || (s->session->ext.max_early_data == 0 && (psksess == NULL || psksess->ext.max_early_data == 0))) { s->max_early_data = 0; return EXT_RETURN_NOT_SENT; } edsess = s->session->ext.max_early_data != 0 ? s->session : psksess; s->max_early_data = edsess->ext.max_early_data; if (edsess->ext.hostname != NULL) { if (s->ext.hostname == NULL || (s->ext.hostname != NULL && strcmp(s->ext.hostname, edsess->ext.hostname) != 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_INCONSISTENT_EARLY_DATA_SNI); return EXT_RETURN_FAIL; } } if ((s->ext.alpn == NULL && edsess->ext.alpn_selected != NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_INCONSISTENT_EARLY_DATA_ALPN); return EXT_RETURN_FAIL; } if (edsess->ext.alpn_selected != NULL) { PACKET prots, alpnpkt; int found = 0; if (!PACKET_buf_init(&prots, s->ext.alpn, s->ext.alpn_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } while (PACKET_get_length_prefixed_1(&prots, &alpnpkt)) { if (PACKET_equal(&alpnpkt, edsess->ext.alpn_selected, edsess->ext.alpn_selected_len)) { found = 1; break; } } if (!found) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_INCONSISTENT_EARLY_DATA_ALPN); return EXT_RETURN_FAIL; } } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_early_data) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } s->ext.early_data = SSL_EARLY_DATA_REJECTED; s->ext.early_data_ok = 1; return EXT_RETURN_SENT; } #define F5_WORKAROUND_MIN_MSG_LEN 0xff #define F5_WORKAROUND_MAX_MSG_LEN 0x200 #define PSK_PRE_BINDER_OVERHEAD (2 + 2 + 2 + 2 + 4 + 2 + 1) EXT_RETURN tls_construct_ctos_padding(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned char *padbytes; size_t hlen; if ((s->options & SSL_OP_TLSEXT_PADDING) == 0) return EXT_RETURN_NOT_SENT; if (!WPACKET_get_total_written(pkt, &hlen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (s->session->ssl_version == TLS1_3_VERSION && s->session->ext.ticklen != 0 && s->session->cipher != NULL) { const EVP_MD *md = ssl_md(SSL_CONNECTION_GET_CTX(s), s->session->cipher->algorithm2); if (md != NULL) { hlen += PSK_PRE_BINDER_OVERHEAD + s->session->ext.ticklen + EVP_MD_get_size(md); } } if (hlen > F5_WORKAROUND_MIN_MSG_LEN && hlen < F5_WORKAROUND_MAX_MSG_LEN) { hlen = F5_WORKAROUND_MAX_MSG_LEN - hlen; if (hlen > 4) hlen -= 4; else hlen = 1; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_padding) || !WPACKET_sub_allocate_bytes_u16(pkt, hlen, &padbytes)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } memset(padbytes, 0, hlen); } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_ctos_psk(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 uint32_t agesec, agems = 0; size_t reshashsize = 0, pskhashsize = 0, binderoffset, msglen; unsigned char *resbinder = NULL, *pskbinder = NULL, *msgstart = NULL; const EVP_MD *handmd = NULL, *mdres = NULL, *mdpsk = NULL; int dores = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); OSSL_TIME t; s->ext.tick_identity = 0; if (s->session->ssl_version != TLS1_3_VERSION || (s->session->ext.ticklen == 0 && s->psksession == NULL)) return EXT_RETURN_NOT_SENT; if (s->hello_retry_request == SSL_HRR_PENDING) handmd = ssl_handshake_md(s); if (s->session->ext.ticklen != 0) { if (s->session->cipher == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } mdres = ssl_md(sctx, s->session->cipher->algorithm2); if (mdres == NULL) { goto dopsksess; } if (s->hello_retry_request == SSL_HRR_PENDING && mdres != handmd) { goto dopsksess; } t = ossl_time_subtract(ossl_time_now(), s->session->time); agesec = (uint32_t)ossl_time2seconds(t); if (agesec > 0) agesec--; if (s->session->ext.tick_lifetime_hint < agesec) { goto dopsksess; } agems = agesec * (uint32_t)1000; if (agesec != 0 && agems / (uint32_t)1000 != agesec) { goto dopsksess; } agems += s->session->ext.tick_age_add; reshashsize = EVP_MD_get_size(mdres); s->ext.tick_identity++; dores = 1; } dopsksess: if (!dores && s->psksession == NULL) return EXT_RETURN_NOT_SENT; if (s->psksession != NULL) { mdpsk = ssl_md(sctx, s->psksession->cipher->algorithm2); if (mdpsk == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_PSK); return EXT_RETURN_FAIL; } if (s->hello_retry_request == SSL_HRR_PENDING && mdpsk != handmd) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_PSK); return EXT_RETURN_FAIL; } pskhashsize = EVP_MD_get_size(mdpsk); } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (dores) { if (!WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick, s->session->ext.ticklen) || !WPACKET_put_bytes_u32(pkt, agems)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } } if (s->psksession != NULL) { if (!WPACKET_sub_memcpy_u16(pkt, s->psksession_id, s->psksession_id_len) || !WPACKET_put_bytes_u32(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } s->ext.tick_identity++; } if (!WPACKET_close(pkt) || !WPACKET_get_total_written(pkt, &binderoffset) || !WPACKET_start_sub_packet_u16(pkt) || (dores && !WPACKET_sub_allocate_bytes_u8(pkt, reshashsize, &resbinder)) || (s->psksession != NULL && !WPACKET_sub_allocate_bytes_u8(pkt, pskhashsize, &pskbinder)) || !WPACKET_close(pkt) || !WPACKET_close(pkt) || !WPACKET_get_total_written(pkt, &msglen) || !WPACKET_fill_lengths(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } msgstart = WPACKET_get_curr(pkt) - msglen; if (dores && tls_psk_do_binder(s, mdres, msgstart, binderoffset, NULL, resbinder, s->session, 1, 0) != 1) { return EXT_RETURN_FAIL; } if (s->psksession != NULL && tls_psk_do_binder(s, mdpsk, msgstart, binderoffset, NULL, pskbinder, s->psksession, 1, 1) != 1) { return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; #else return EXT_RETURN_NOT_SENT; #endif } EXT_RETURN tls_construct_ctos_post_handshake_auth(SSL_CONNECTION *s, WPACKET *pkt, ossl_unused unsigned int context, ossl_unused X509 *x, ossl_unused size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 if (!s->pha_enabled) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_post_handshake_auth) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } s->post_handshake_auth = SSL_PHA_EXT_SENT; return EXT_RETURN_SENT; #else return EXT_RETURN_NOT_SENT; #endif } int tls_parse_stoc_renegotiate(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { size_t expected_len = s->s3.previous_client_finished_len + s->s3.previous_server_finished_len; size_t ilen; const unsigned char *data; if (!ossl_assert(expected_len == 0 || s->s3.previous_client_finished_len != 0) || !ossl_assert(expected_len == 0 || s->s3.previous_server_finished_len != 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!PACKET_get_1_len(pkt, &ilen)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_RENEGOTIATION_ENCODING_ERR); return 0; } if (PACKET_remaining(pkt) != ilen) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_RENEGOTIATION_ENCODING_ERR); return 0; } if (ilen != expected_len) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_RENEGOTIATION_MISMATCH); return 0; } if (!PACKET_get_bytes(pkt, &data, s->s3.previous_client_finished_len) || memcmp(data, s->s3.previous_client_finished, s->s3.previous_client_finished_len) != 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_RENEGOTIATION_MISMATCH); return 0; } if (!PACKET_get_bytes(pkt, &data, s->s3.previous_server_finished_len) || memcmp(data, s->s3.previous_server_finished, s->s3.previous_server_finished_len) != 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_RENEGOTIATION_MISMATCH); return 0; } s->s3.send_connection_binding = 1; return 1; } int tls_parse_stoc_maxfragmentlen(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int value; if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!IS_MAX_FRAGMENT_LENGTH_EXT_VALID(value)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH); return 0; } if (value != s->ext.max_fragment_len_mode) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH); return 0; } s->session->ext.max_fragment_len_mode = value; return 1; } int tls_parse_stoc_server_name(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->ext.hostname == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (PACKET_remaining(pkt) > 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->hit) { if (s->session->ext.hostname != NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->session->ext.hostname = OPENSSL_strdup(s->ext.hostname); if (s->session->ext.hostname == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } return 1; } int tls_parse_stoc_ec_pt_formats(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { size_t ecpointformats_len; PACKET ecptformatlist; if (!PACKET_as_length_prefixed_1(pkt, &ecptformatlist)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->hit) { ecpointformats_len = PACKET_remaining(&ecptformatlist); if (ecpointformats_len == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH); return 0; } s->ext.peer_ecpointformats_len = 0; OPENSSL_free(s->ext.peer_ecpointformats); s->ext.peer_ecpointformats = OPENSSL_malloc(ecpointformats_len); if (s->ext.peer_ecpointformats == NULL) { s->ext.peer_ecpointformats_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->ext.peer_ecpointformats_len = ecpointformats_len; if (!PACKET_copy_bytes(&ecptformatlist, s->ext.peer_ecpointformats, ecpointformats_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } return 1; } int tls_parse_stoc_session_ticket(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->ext.session_ticket_cb != NULL && !s->ext.session_ticket_cb(ssl, PACKET_data(pkt), PACKET_remaining(pkt), s->ext.session_ticket_cb_arg)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_BAD_EXTENSION); return 0; } if (!tls_use_ticket(s)) { SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION, SSL_R_BAD_EXTENSION); return 0; } if (PACKET_remaining(pkt) > 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } s->ext.ticket_expected = 1; return 1; } #ifndef OPENSSL_NO_OCSP int tls_parse_stoc_status_request(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) { return 1; } if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp) { SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION, SSL_R_BAD_EXTENSION); return 0; } if (!SSL_CONNECTION_IS_TLS13(s) && PACKET_remaining(pkt) > 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (SSL_CONNECTION_IS_TLS13(s)) { if (chainidx != 0) return 1; return tls_process_cert_status_body(s, pkt); } s->ext.status_expected = 1; return 1; } #endif #ifndef OPENSSL_NO_CT int tls_parse_stoc_sct(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) { return 1; } if (s->ct_validation_callback != NULL) { size_t size = PACKET_remaining(pkt); OPENSSL_free(s->ext.scts); s->ext.scts = NULL; s->ext.scts_len = (uint16_t)size; if (size > 0) { s->ext.scts = OPENSSL_malloc(size); if (s->ext.scts == NULL) { s->ext.scts_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } } else { ENDPOINT role = (context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0 ? ENDPOINT_CLIENT : ENDPOINT_BOTH; if (custom_ext_find(&s->cert->custext, role, TLSEXT_TYPE_signed_certificate_timestamp, NULL) == NULL) { SSLfatal(s, TLS1_AD_UNSUPPORTED_EXTENSION, SSL_R_BAD_EXTENSION); return 0; } if (!custom_ext_parse(s, context, TLSEXT_TYPE_signed_certificate_timestamp, PACKET_data(pkt), PACKET_remaining(pkt), x, chainidx)) { return 0; } } return 1; } #endif #ifndef OPENSSL_NO_NEXTPROTONEG static int ssl_next_proto_validate(SSL_CONNECTION *s, PACKET *pkt) { PACKET tmp_protocol; while (PACKET_remaining(pkt)) { if (!PACKET_get_length_prefixed_1(pkt, &tmp_protocol) || PACKET_remaining(&tmp_protocol) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } } return 1; } int tls_parse_stoc_npn(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned char *selected; unsigned char selected_len; PACKET tmppkt; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!SSL_IS_FIRST_HANDSHAKE(s)) return 1; if (sctx->ext.npn_select_cb == NULL) { SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION, SSL_R_BAD_EXTENSION); return 0; } tmppkt = *pkt; if (!ssl_next_proto_validate(s, &tmppkt)) { return 0; } if (sctx->ext.npn_select_cb(SSL_CONNECTION_GET_SSL(s), &selected, &selected_len, PACKET_data(pkt), PACKET_remaining(pkt), sctx->ext.npn_select_cb_arg) != SSL_TLSEXT_ERR_OK) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_BAD_EXTENSION); return 0; } OPENSSL_free(s->ext.npn); s->ext.npn = OPENSSL_malloc(selected_len); if (s->ext.npn == NULL) { s->ext.npn_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } memcpy(s->ext.npn, selected, selected_len); s->ext.npn_len = selected_len; s->s3.npn_seen = 1; return 1; } #endif int tls_parse_stoc_alpn(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { size_t len; if (!s->s3.alpn_sent) { SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION, SSL_R_BAD_EXTENSION); return 0; } if (!PACKET_get_net_2_len(pkt, &len) || PACKET_remaining(pkt) != len || !PACKET_get_1_len(pkt, &len) || PACKET_remaining(pkt) != len) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } OPENSSL_free(s->s3.alpn_selected); s->s3.alpn_selected = OPENSSL_malloc(len); if (s->s3.alpn_selected == NULL) { s->s3.alpn_selected_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!PACKET_copy_bytes(pkt, s->s3.alpn_selected, len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } s->s3.alpn_selected_len = len; if (s->session->ext.alpn_selected == NULL || s->session->ext.alpn_selected_len != len || memcmp(s->session->ext.alpn_selected, s->s3.alpn_selected, len) != 0) { s->ext.early_data_ok = 0; } if (!s->hit) { if (!ossl_assert(s->session->ext.alpn_selected == NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->session->ext.alpn_selected = OPENSSL_memdup(s->s3.alpn_selected, s->s3.alpn_selected_len); if (s->session->ext.alpn_selected == NULL) { s->session->ext.alpn_selected_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->session->ext.alpn_selected_len = s->s3.alpn_selected_len; } return 1; } #ifndef OPENSSL_NO_SRTP int tls_parse_stoc_use_srtp(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int id, ct, mki; int i; STACK_OF(SRTP_PROTECTION_PROFILE) *clnt; SRTP_PROTECTION_PROFILE *prof; if (!PACKET_get_net_2(pkt, &ct) || ct != 2 || !PACKET_get_net_2(pkt, &id) || !PACKET_get_1(pkt, &mki) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); return 0; } if (mki != 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_SRTP_MKI_VALUE); return 0; } clnt = SSL_get_srtp_profiles(SSL_CONNECTION_GET_SSL(s)); if (clnt == NULL) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_NO_SRTP_PROFILES); return 0; } for (i = 0; i < sk_SRTP_PROTECTION_PROFILE_num(clnt); i++) { prof = sk_SRTP_PROTECTION_PROFILE_value(clnt, i); if (prof->id == id) { s->srtp_profile = prof; return 1; } } SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); return 0; } #endif int tls_parse_stoc_etm(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!(s->options & SSL_OP_NO_ENCRYPT_THEN_MAC) && s->s3.tmp.new_cipher->algorithm_mac != SSL_AEAD && s->s3.tmp.new_cipher->algorithm_enc != SSL_RC4 && s->s3.tmp.new_cipher->algorithm_enc != SSL_eGOST2814789CNT && s->s3.tmp.new_cipher->algorithm_enc != SSL_eGOST2814789CNT12 && s->s3.tmp.new_cipher->algorithm_enc != SSL_MAGMA && s->s3.tmp.new_cipher->algorithm_enc != SSL_KUZNYECHIK) s->ext.use_etm = 1; return 1; } int tls_parse_stoc_ems(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->options & SSL_OP_NO_EXTENDED_MASTER_SECRET) return 1; s->s3.flags |= TLS1_FLAGS_RECEIVED_EXTMS; if (!s->hit) s->session->flags |= SSL_SESS_FLAG_EXTMS; return 1; } int tls_parse_stoc_supported_versions(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int version; if (!PACKET_get_net_2(pkt, &version) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (version != TLS1_3_VERSION) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_PROTOCOL_VERSION_NUMBER); return 0; } if (context == SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) return 1; s->version = version; if (!ssl_set_record_protocol_version(s, version)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } int tls_parse_stoc_key_share(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 unsigned int group_id; PACKET encoded_pt; EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; const TLS_GROUP_INFO *ginf = NULL; if (ckey == NULL || s->s3.peer_tmp != NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!PACKET_get_net_2(pkt, &group_id)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if ((context & SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) != 0) { const uint16_t *pgroups = NULL; size_t i, num_groups; if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (group_id == s->s3.group_id) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE); return 0; } tls1_get_supported_groups(s, &pgroups, &num_groups); for (i = 0; i < num_groups; i++) { if (group_id == pgroups[i]) break; } if (i >= num_groups || !tls_group_allowed(s, group_id, SSL_SECOP_CURVE_SUPPORTED) || !tls_valid_group(s, group_id, TLS1_3_VERSION, TLS1_3_VERSION, 0, NULL)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE); return 0; } s->s3.group_id = group_id; EVP_PKEY_free(s->s3.tmp.pkey); s->s3.tmp.pkey = NULL; return 1; } if (group_id != s->s3.group_id) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE); return 0; } if (!s->hit) { s->session->kex_group = group_id; } else if (group_id != s->session->kex_group) { SSL_SESSION *new_sess; if ((new_sess = ssl_session_dup(s->session, 0)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); return 0; } SSL_SESSION_free(s->session); s->session = new_sess; s->session->kex_group = group_id; } if ((ginf = tls1_group_id_lookup(SSL_CONNECTION_GET_CTX(s), group_id)) == NULL) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE); return 0; } if (!PACKET_as_length_prefixed_2(pkt, &encoded_pt) || PACKET_remaining(&encoded_pt) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (!ginf->is_kem) { skey = EVP_PKEY_new(); if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_COPY_PARAMETERS_FAILED); EVP_PKEY_free(skey); return 0; } if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), PACKET_remaining(&encoded_pt)) <= 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_ECPOINT); EVP_PKEY_free(skey); return 0; } if (ssl_derive(s, ckey, skey, 1) == 0) { EVP_PKEY_free(skey); return 0; } s->s3.peer_tmp = skey; } else { const unsigned char *ct = PACKET_data(&encoded_pt); size_t ctlen = PACKET_remaining(&encoded_pt); if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) { return 0; } } s->s3.did_kex = 1; #endif return 1; } int tls_parse_stoc_cookie(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET cookie; if (!PACKET_as_length_prefixed_2(pkt, &cookie) || !PACKET_memdup(&cookie, &s->ext.tls13_cookie, &s->ext.tls13_cookie_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } return 1; } int tls_parse_stoc_early_data(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (context == SSL_EXT_TLS1_3_NEW_SESSION_TICKET) { unsigned long max_early_data; if (!PACKET_get_net_4(pkt, &max_early_data) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_INVALID_MAX_EARLY_DATA); return 0; } s->session->ext.max_early_data = max_early_data; if (SSL_IS_QUIC_HANDSHAKE(s) && max_early_data != 0xffffffff) { s->session->ext.max_early_data = 1; SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INVALID_MAX_EARLY_DATA); return 0; } return 1; } if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->ext.early_data_ok || !s->hit) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_EXTENSION); return 0; } s->ext.early_data = SSL_EARLY_DATA_ACCEPTED; return 1; } int tls_parse_stoc_psk(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 unsigned int identity; if (!PACKET_get_net_2(pkt, &identity) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (identity >= (unsigned int)s->ext.tick_identity) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_PSK_IDENTITY); return 0; } if (identity == 0 && (s->psksession == NULL || s->ext.tick_identity == 2)) { s->hit = 1; SSL_SESSION_free(s->psksession); s->psksession = NULL; return 1; } if (s->psksession == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if ((s->early_data_state != SSL_EARLY_DATA_WRITE_RETRY && s->early_data_state != SSL_EARLY_DATA_FINISHED_WRITING) || s->session->ext.max_early_data > 0 || s->psksession->ext.max_early_data == 0) memcpy(s->early_secret, s->psksession->early_secret, EVP_MAX_MD_SIZE); SSL_SESSION_free(s->session); s->session = s->psksession; s->psksession = NULL; s->hit = 1; if (identity != 0) s->ext.early_data_ok = 0; #endif return 1; } EXT_RETURN tls_construct_ctos_client_cert_type(SSL_CONNECTION *sc, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; if (sc->client_cert_type == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_client_cert_type) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u8(pkt, sc->client_cert_type, sc->client_cert_type_len) || !WPACKET_close(pkt)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_GOOD; return EXT_RETURN_SENT; } int tls_parse_stoc_client_cert_type(SSL_CONNECTION *sc, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int type; if (PACKET_remaining(pkt) != 1) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!PACKET_get_1(pkt, &type)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!ossl_assert(sc->ext.client_cert_type_ctos == OSSL_CERT_TYPE_CTOS_GOOD)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (sc->client_cert_type == NULL) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (memchr(sc->client_cert_type, type, sc->client_cert_type_len) == NULL) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_VALUE); return 0; } sc->ext.client_cert_type = type; return 1; } EXT_RETURN tls_construct_ctos_server_cert_type(SSL_CONNECTION *sc, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; if (sc->server_cert_type == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_cert_type) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u8(pkt, sc->server_cert_type, sc->server_cert_type_len) || !WPACKET_close(pkt)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_GOOD; return EXT_RETURN_SENT; } int tls_parse_stoc_server_cert_type(SSL_CONNECTION *sc, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int type; if (PACKET_remaining(pkt) != 1) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!PACKET_get_1(pkt, &type)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!ossl_assert(sc->ext.server_cert_type_ctos == OSSL_CERT_TYPE_CTOS_GOOD)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (sc->server_cert_type == NULL) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (memchr(sc->server_cert_type, type, sc->server_cert_type_len) == NULL) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_VALUE); return 0; } sc->ext.server_cert_type = type; return 1; }
statem
openssl/ssl/statem/extensions_clnt.c
openssl
#include <stdio.h> #include <time.h> #include <assert.h> #include "../ssl_local.h" #include "statem_local.h" #include <openssl/buffer.h> #include <openssl/rand.h> #include <openssl/objects.h> #include <openssl/evp.h> #include <openssl/md5.h> #include <openssl/dh.h> #include <openssl/rsa.h> #include <openssl/bn.h> #include <openssl/engine.h> #include <openssl/trace.h> #include <openssl/core_names.h> #include <openssl/param_build.h> #include "internal/cryptlib.h" static MSG_PROCESS_RETURN tls_process_as_hello_retry_request(SSL_CONNECTION *s, PACKET *pkt); static MSG_PROCESS_RETURN tls_process_encrypted_extensions(SSL_CONNECTION *s, PACKET *pkt); static ossl_inline int cert_req_allowed(SSL_CONNECTION *s); static int key_exchange_expected(SSL_CONNECTION *s); static int ssl_cipher_list_to_bytes(SSL_CONNECTION *s, STACK_OF(SSL_CIPHER) *sk, WPACKET *pkt); static ossl_inline int received_server_cert(SSL_CONNECTION *sc) { return sc->session->peer_rpk != NULL || sc->session->peer != NULL; } static ossl_inline int cert_req_allowed(SSL_CONNECTION *s) { if ((s->version > SSL3_VERSION && (s->s3.tmp.new_cipher->algorithm_auth & SSL_aNULL)) || (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aSRP | SSL_aPSK))) return 0; return 1; } static int key_exchange_expected(SSL_CONNECTION *s) { long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; if (alg_k & (SSL_kDHE | SSL_kECDHE | SSL_kDHEPSK | SSL_kECDHEPSK | SSL_kSRP)) { return 1; } return 0; } static int ossl_statem_client13_read_transition(SSL_CONNECTION *s, int mt) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: break; case TLS_ST_CW_CLNT_HELLO: if (mt == SSL3_MT_SERVER_HELLO) { st->hand_state = TLS_ST_CR_SRVR_HELLO; return 1; } break; case TLS_ST_CR_SRVR_HELLO: if (mt == SSL3_MT_ENCRYPTED_EXTENSIONS) { st->hand_state = TLS_ST_CR_ENCRYPTED_EXTENSIONS; return 1; } break; case TLS_ST_CR_ENCRYPTED_EXTENSIONS: if (s->hit) { if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_CR_FINISHED; return 1; } } else { if (mt == SSL3_MT_CERTIFICATE_REQUEST) { st->hand_state = TLS_ST_CR_CERT_REQ; return 1; } if (mt == SSL3_MT_CERTIFICATE) { st->hand_state = TLS_ST_CR_CERT; return 1; } #ifndef OPENSSL_NO_COMP_ALG if (mt == SSL3_MT_COMPRESSED_CERTIFICATE && s->ext.compress_certificate_sent) { st->hand_state = TLS_ST_CR_COMP_CERT; return 1; } #endif } break; case TLS_ST_CR_CERT_REQ: if (mt == SSL3_MT_CERTIFICATE) { st->hand_state = TLS_ST_CR_CERT; return 1; } #ifndef OPENSSL_NO_COMP_ALG if (mt == SSL3_MT_COMPRESSED_CERTIFICATE && s->ext.compress_certificate_sent) { st->hand_state = TLS_ST_CR_COMP_CERT; return 1; } #endif break; case TLS_ST_CR_CERT: case TLS_ST_CR_COMP_CERT: if (mt == SSL3_MT_CERTIFICATE_VERIFY) { st->hand_state = TLS_ST_CR_CERT_VRFY; return 1; } break; case TLS_ST_CR_CERT_VRFY: if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_CR_FINISHED; return 1; } break; case TLS_ST_OK: if (mt == SSL3_MT_NEWSESSION_TICKET) { st->hand_state = TLS_ST_CR_SESSION_TICKET; return 1; } if (mt == SSL3_MT_KEY_UPDATE && !SSL_IS_QUIC_HANDSHAKE(s)) { st->hand_state = TLS_ST_CR_KEY_UPDATE; return 1; } if (mt == SSL3_MT_CERTIFICATE_REQUEST) { #if DTLS_MAX_VERSION_INTERNAL != DTLS1_2_VERSION # error Internal DTLS version error #endif if (!SSL_CONNECTION_IS_DTLS(s) && s->post_handshake_auth == SSL_PHA_EXT_SENT) { s->post_handshake_auth = SSL_PHA_REQUESTED; if (!tls13_restore_handshake_digest_for_pha(s)) { return 0; } st->hand_state = TLS_ST_CR_CERT_REQ; return 1; } } break; } return 0; } int ossl_statem_client_read_transition(SSL_CONNECTION *s, int mt) { OSSL_STATEM *st = &s->statem; int ske_expected; if (SSL_CONNECTION_IS_TLS13(s)) { if (!ossl_statem_client13_read_transition(s, mt)) goto err; return 1; } switch (st->hand_state) { default: break; case TLS_ST_CW_CLNT_HELLO: if (mt == SSL3_MT_SERVER_HELLO) { st->hand_state = TLS_ST_CR_SRVR_HELLO; return 1; } if (SSL_CONNECTION_IS_DTLS(s)) { if (mt == DTLS1_MT_HELLO_VERIFY_REQUEST) { st->hand_state = DTLS_ST_CR_HELLO_VERIFY_REQUEST; return 1; } } break; case TLS_ST_EARLY_DATA: if (mt == SSL3_MT_SERVER_HELLO) { st->hand_state = TLS_ST_CR_SRVR_HELLO; return 1; } break; case TLS_ST_CR_SRVR_HELLO: if (s->hit) { if (s->ext.ticket_expected) { if (mt == SSL3_MT_NEWSESSION_TICKET) { st->hand_state = TLS_ST_CR_SESSION_TICKET; return 1; } } else if (mt == SSL3_MT_CHANGE_CIPHER_SPEC) { st->hand_state = TLS_ST_CR_CHANGE; return 1; } } else { if (SSL_CONNECTION_IS_DTLS(s) && mt == DTLS1_MT_HELLO_VERIFY_REQUEST) { st->hand_state = DTLS_ST_CR_HELLO_VERIFY_REQUEST; return 1; } else if (s->version >= TLS1_VERSION && s->ext.session_secret_cb != NULL && s->session->ext.tick != NULL && mt == SSL3_MT_CHANGE_CIPHER_SPEC) { s->hit = 1; st->hand_state = TLS_ST_CR_CHANGE; return 1; } else if (!(s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP | SSL_aPSK))) { if (mt == SSL3_MT_CERTIFICATE) { st->hand_state = TLS_ST_CR_CERT; return 1; } } else { ske_expected = key_exchange_expected(s); if (ske_expected || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) && mt == SSL3_MT_SERVER_KEY_EXCHANGE)) { if (mt == SSL3_MT_SERVER_KEY_EXCHANGE) { st->hand_state = TLS_ST_CR_KEY_EXCH; return 1; } } else if (mt == SSL3_MT_CERTIFICATE_REQUEST && cert_req_allowed(s)) { st->hand_state = TLS_ST_CR_CERT_REQ; return 1; } else if (mt == SSL3_MT_SERVER_DONE) { st->hand_state = TLS_ST_CR_SRVR_DONE; return 1; } } } break; case TLS_ST_CR_CERT: case TLS_ST_CR_COMP_CERT: if (s->ext.status_expected && mt == SSL3_MT_CERTIFICATE_STATUS) { st->hand_state = TLS_ST_CR_CERT_STATUS; return 1; } case TLS_ST_CR_CERT_STATUS: ske_expected = key_exchange_expected(s); if (ske_expected || ((s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) && mt == SSL3_MT_SERVER_KEY_EXCHANGE)) { if (mt == SSL3_MT_SERVER_KEY_EXCHANGE) { st->hand_state = TLS_ST_CR_KEY_EXCH; return 1; } goto err; } case TLS_ST_CR_KEY_EXCH: if (mt == SSL3_MT_CERTIFICATE_REQUEST) { if (cert_req_allowed(s)) { st->hand_state = TLS_ST_CR_CERT_REQ; return 1; } goto err; } case TLS_ST_CR_CERT_REQ: if (mt == SSL3_MT_SERVER_DONE) { st->hand_state = TLS_ST_CR_SRVR_DONE; return 1; } break; case TLS_ST_CW_FINISHED: if (s->ext.ticket_expected) { if (mt == SSL3_MT_NEWSESSION_TICKET) { st->hand_state = TLS_ST_CR_SESSION_TICKET; return 1; } } else if (mt == SSL3_MT_CHANGE_CIPHER_SPEC) { st->hand_state = TLS_ST_CR_CHANGE; return 1; } break; case TLS_ST_CR_SESSION_TICKET: if (mt == SSL3_MT_CHANGE_CIPHER_SPEC) { st->hand_state = TLS_ST_CR_CHANGE; return 1; } break; case TLS_ST_CR_CHANGE: if (mt == SSL3_MT_FINISHED) { st->hand_state = TLS_ST_CR_FINISHED; return 1; } break; case TLS_ST_OK: if (mt == SSL3_MT_HELLO_REQUEST) { st->hand_state = TLS_ST_CR_HELLO_REQ; return 1; } break; } err: if (SSL_CONNECTION_IS_DTLS(s) && mt == SSL3_MT_CHANGE_CIPHER_SPEC) { BIO *rbio; s->init_num = 0; s->rwstate = SSL_READING; rbio = SSL_get_rbio(SSL_CONNECTION_GET_SSL(s)); BIO_clear_retry_flags(rbio); BIO_set_retry_read(rbio); return 0; } SSLfatal(s, SSL3_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); return 0; } static int do_compressed_cert(SSL_CONNECTION *sc) { return sc->ext.client_cert_type == TLSEXT_cert_type_x509 && sc->ext.compress_certificate_from_peer[0] != TLSEXT_comp_cert_none; } static WRITE_TRAN ossl_statem_client13_write_transition(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WRITE_TRAN_ERROR; case TLS_ST_CR_CERT_REQ: if (s->post_handshake_auth == SSL_PHA_REQUESTED) { if (do_compressed_cert(s)) st->hand_state = TLS_ST_CW_COMP_CERT; else st->hand_state = TLS_ST_CW_CERT; return WRITE_TRAN_CONTINUE; } if (!ossl_assert((s->shutdown & SSL_SENT_SHUTDOWN) != 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WRITE_TRAN_ERROR; } st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; case TLS_ST_CR_FINISHED: if (s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY || s->early_data_state == SSL_EARLY_DATA_FINISHED_WRITING) st->hand_state = TLS_ST_PENDING_EARLY_DATA_END; else if ((s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0 && s->hello_retry_request == SSL_HRR_NONE) st->hand_state = TLS_ST_CW_CHANGE; else if (s->s3.tmp.cert_req == 0) st->hand_state = TLS_ST_CW_FINISHED; else if (do_compressed_cert(s)) st->hand_state = TLS_ST_CW_COMP_CERT; else st->hand_state = TLS_ST_CW_CERT; s->ts_msg_read = ossl_time_now(); return WRITE_TRAN_CONTINUE; case TLS_ST_PENDING_EARLY_DATA_END: if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) { st->hand_state = TLS_ST_CW_END_OF_EARLY_DATA; return WRITE_TRAN_CONTINUE; } case TLS_ST_CW_END_OF_EARLY_DATA: case TLS_ST_CW_CHANGE: if (s->s3.tmp.cert_req == 0) st->hand_state = TLS_ST_CW_FINISHED; else if (do_compressed_cert(s)) st->hand_state = TLS_ST_CW_COMP_CERT; else st->hand_state = TLS_ST_CW_CERT; return WRITE_TRAN_CONTINUE; case TLS_ST_CW_COMP_CERT: case TLS_ST_CW_CERT: st->hand_state = (s->s3.tmp.cert_req == 1) ? TLS_ST_CW_CERT_VRFY : TLS_ST_CW_FINISHED; return WRITE_TRAN_CONTINUE; case TLS_ST_CW_CERT_VRFY: st->hand_state = TLS_ST_CW_FINISHED; return WRITE_TRAN_CONTINUE; case TLS_ST_CR_KEY_UPDATE: case TLS_ST_CW_KEY_UPDATE: case TLS_ST_CR_SESSION_TICKET: case TLS_ST_CW_FINISHED: st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; case TLS_ST_OK: if (s->key_update != SSL_KEY_UPDATE_NONE) { st->hand_state = TLS_ST_CW_KEY_UPDATE; return WRITE_TRAN_CONTINUE; } return WRITE_TRAN_FINISHED; } } WRITE_TRAN ossl_statem_client_write_transition(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; if (SSL_CONNECTION_IS_TLS13(s)) return ossl_statem_client13_write_transition(s); switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WRITE_TRAN_ERROR; case TLS_ST_OK: if (!s->renegotiate) { return WRITE_TRAN_FINISHED; } case TLS_ST_BEFORE: st->hand_state = TLS_ST_CW_CLNT_HELLO; return WRITE_TRAN_CONTINUE; case TLS_ST_CW_CLNT_HELLO: if (s->early_data_state == SSL_EARLY_DATA_CONNECTING) { if ((s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0) st->hand_state = TLS_ST_CW_CHANGE; else st->hand_state = TLS_ST_EARLY_DATA; return WRITE_TRAN_CONTINUE; } s->ts_msg_write = ossl_time_now(); return WRITE_TRAN_FINISHED; case TLS_ST_CR_SRVR_HELLO: if ((s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0 && s->early_data_state != SSL_EARLY_DATA_FINISHED_WRITING) st->hand_state = TLS_ST_CW_CHANGE; else st->hand_state = TLS_ST_CW_CLNT_HELLO; return WRITE_TRAN_CONTINUE; case TLS_ST_EARLY_DATA: s->ts_msg_write = ossl_time_now(); return WRITE_TRAN_FINISHED; case DTLS_ST_CR_HELLO_VERIFY_REQUEST: st->hand_state = TLS_ST_CW_CLNT_HELLO; return WRITE_TRAN_CONTINUE; case TLS_ST_CR_SRVR_DONE: s->ts_msg_read = ossl_time_now(); if (s->s3.tmp.cert_req) st->hand_state = TLS_ST_CW_CERT; else st->hand_state = TLS_ST_CW_KEY_EXCH; return WRITE_TRAN_CONTINUE; case TLS_ST_CW_CERT: st->hand_state = TLS_ST_CW_KEY_EXCH; return WRITE_TRAN_CONTINUE; case TLS_ST_CW_KEY_EXCH: if (s->s3.tmp.cert_req == 1) { st->hand_state = TLS_ST_CW_CERT_VRFY; } else { st->hand_state = TLS_ST_CW_CHANGE; } if (s->s3.flags & TLS1_FLAGS_SKIP_CERT_VERIFY) { st->hand_state = TLS_ST_CW_CHANGE; } return WRITE_TRAN_CONTINUE; case TLS_ST_CW_CERT_VRFY: st->hand_state = TLS_ST_CW_CHANGE; return WRITE_TRAN_CONTINUE; case TLS_ST_CW_CHANGE: if (s->hello_retry_request == SSL_HRR_PENDING) { st->hand_state = TLS_ST_CW_CLNT_HELLO; } else if (s->early_data_state == SSL_EARLY_DATA_CONNECTING) { st->hand_state = TLS_ST_EARLY_DATA; } else { #if defined(OPENSSL_NO_NEXTPROTONEG) st->hand_state = TLS_ST_CW_FINISHED; #else if (!SSL_CONNECTION_IS_DTLS(s) && s->s3.npn_seen) st->hand_state = TLS_ST_CW_NEXT_PROTO; else st->hand_state = TLS_ST_CW_FINISHED; #endif } return WRITE_TRAN_CONTINUE; #if !defined(OPENSSL_NO_NEXTPROTONEG) case TLS_ST_CW_NEXT_PROTO: st->hand_state = TLS_ST_CW_FINISHED; return WRITE_TRAN_CONTINUE; #endif case TLS_ST_CW_FINISHED: if (s->hit) { st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; } else { return WRITE_TRAN_FINISHED; } case TLS_ST_CR_FINISHED: if (s->hit) { st->hand_state = TLS_ST_CW_CHANGE; return WRITE_TRAN_CONTINUE; } else { st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; } case TLS_ST_CR_HELLO_REQ: if (ssl3_renegotiate_check(SSL_CONNECTION_GET_SSL(s), 1)) { if (!tls_setup_handshake(s)) { return WRITE_TRAN_ERROR; } st->hand_state = TLS_ST_CW_CLNT_HELLO; return WRITE_TRAN_CONTINUE; } st->hand_state = TLS_ST_OK; return WRITE_TRAN_CONTINUE; } } WORK_STATE ossl_statem_client_pre_work(SSL_CONNECTION *s, WORK_STATE wst) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: break; case TLS_ST_CW_CLNT_HELLO: s->shutdown = 0; if (SSL_CONNECTION_IS_DTLS(s)) { if (!ssl3_init_finished_mac(s)) { return WORK_ERROR; } } else if (s->ext.early_data == SSL_EARLY_DATA_REJECTED) { if (!ssl_set_new_record_layer(s, TLS_ANY_VERSION, OSSL_RECORD_DIRECTION_WRITE, OSSL_RECORD_PROTECTION_LEVEL_NONE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NID_undef, NULL, NULL, NULL)) { return WORK_ERROR; } } break; case TLS_ST_CW_CHANGE: if (SSL_CONNECTION_IS_DTLS(s)) { if (s->hit) { st->use_timer = 0; } #ifndef OPENSSL_NO_SCTP if (BIO_dgram_is_sctp(SSL_get_wbio(SSL_CONNECTION_GET_SSL(s)))) { return dtls_wait_for_dry(s); } #endif } break; case TLS_ST_PENDING_EARLY_DATA_END: if (s->early_data_state == SSL_EARLY_DATA_FINISHED_WRITING || s->early_data_state == SSL_EARLY_DATA_NONE) return WORK_FINISHED_CONTINUE; case TLS_ST_EARLY_DATA: return tls_finish_handshake(s, wst, 0, 1); case TLS_ST_OK: return tls_finish_handshake(s, wst, 1, 1); } return WORK_FINISHED_CONTINUE; } WORK_STATE ossl_statem_client_post_work(SSL_CONNECTION *s, WORK_STATE wst) { OSSL_STATEM *st = &s->statem; SSL *ssl = SSL_CONNECTION_GET_SSL(s); s->init_num = 0; switch (st->hand_state) { default: break; case TLS_ST_CW_CLNT_HELLO: if (s->early_data_state == SSL_EARLY_DATA_CONNECTING && s->max_early_data > 0) { if ((s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) == 0) { if (!tls13_change_cipher_state(s, SSL3_CC_EARLY | SSL3_CHANGE_CIPHER_CLIENT_WRITE)) { return WORK_ERROR; } } } else if (!statem_flush(s)) { return WORK_MORE_A; } if (SSL_CONNECTION_IS_DTLS(s)) { s->first_packet = 1; } break; case TLS_ST_CW_KEY_EXCH: if (tls_client_key_exchange_post_work(s) == 0) { return WORK_ERROR; } break; case TLS_ST_CW_CHANGE: if (SSL_CONNECTION_IS_TLS13(s) || s->hello_retry_request == SSL_HRR_PENDING) break; if (s->early_data_state == SSL_EARLY_DATA_CONNECTING && s->max_early_data > 0) { if (!tls13_change_cipher_state(s, SSL3_CC_EARLY | SSL3_CHANGE_CIPHER_CLIENT_WRITE)) return WORK_ERROR; break; } s->session->cipher = s->s3.tmp.new_cipher; #ifdef OPENSSL_NO_COMP s->session->compress_meth = 0; #else if (s->s3.tmp.new_compression == NULL) s->session->compress_meth = 0; else s->session->compress_meth = s->s3.tmp.new_compression->id; #endif if (!ssl->method->ssl3_enc->setup_key_block(s)) { return WORK_ERROR; } if (!ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CHANGE_CIPHER_CLIENT_WRITE)) { return WORK_ERROR; } #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); } #endif break; case TLS_ST_CW_FINISHED: #ifndef OPENSSL_NO_SCTP if (wst == WORK_MORE_A && SSL_CONNECTION_IS_DTLS(s) && s->hit == 0) { BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); } #endif if (statem_flush(s) != 1) return WORK_MORE_B; if (SSL_CONNECTION_IS_TLS13(s)) { if (!tls13_save_handshake_digest_for_pha(s)) { return WORK_ERROR; } if (s->post_handshake_auth != SSL_PHA_REQUESTED) { if (!ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_APPLICATION | SSL3_CHANGE_CIPHER_CLIENT_WRITE)) { return WORK_ERROR; } } } break; case TLS_ST_CW_KEY_UPDATE: if (statem_flush(s) != 1) return WORK_MORE_A; if (!tls13_update_key(s, 1)) { return WORK_ERROR; } break; } return WORK_FINISHED_CONTINUE; } int ossl_statem_client_construct_message(SSL_CONNECTION *s, confunc_f *confunc, int *mt) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_HANDSHAKE_STATE); return 0; case TLS_ST_CW_CHANGE: if (SSL_CONNECTION_IS_DTLS(s)) *confunc = dtls_construct_change_cipher_spec; else *confunc = tls_construct_change_cipher_spec; *mt = SSL3_MT_CHANGE_CIPHER_SPEC; break; case TLS_ST_CW_CLNT_HELLO: *confunc = tls_construct_client_hello; *mt = SSL3_MT_CLIENT_HELLO; break; case TLS_ST_CW_END_OF_EARLY_DATA: *confunc = tls_construct_end_of_early_data; *mt = SSL3_MT_END_OF_EARLY_DATA; break; case TLS_ST_PENDING_EARLY_DATA_END: *confunc = NULL; *mt = SSL3_MT_DUMMY; break; case TLS_ST_CW_CERT: *confunc = tls_construct_client_certificate; *mt = SSL3_MT_CERTIFICATE; break; #ifndef OPENSSL_NO_COMP_ALG case TLS_ST_CW_COMP_CERT: *confunc = tls_construct_client_compressed_certificate; *mt = SSL3_MT_COMPRESSED_CERTIFICATE; break; #endif case TLS_ST_CW_KEY_EXCH: *confunc = tls_construct_client_key_exchange; *mt = SSL3_MT_CLIENT_KEY_EXCHANGE; break; case TLS_ST_CW_CERT_VRFY: *confunc = tls_construct_cert_verify; *mt = SSL3_MT_CERTIFICATE_VERIFY; break; #if !defined(OPENSSL_NO_NEXTPROTONEG) case TLS_ST_CW_NEXT_PROTO: *confunc = tls_construct_next_proto; *mt = SSL3_MT_NEXT_PROTO; break; #endif case TLS_ST_CW_FINISHED: *confunc = tls_construct_finished; *mt = SSL3_MT_FINISHED; break; case TLS_ST_CW_KEY_UPDATE: *confunc = tls_construct_key_update; *mt = SSL3_MT_KEY_UPDATE; break; } return 1; } size_t ossl_statem_client_max_message_size(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: return 0; case TLS_ST_CR_SRVR_HELLO: return SERVER_HELLO_MAX_LENGTH; case DTLS_ST_CR_HELLO_VERIFY_REQUEST: return HELLO_VERIFY_REQUEST_MAX_LENGTH; case TLS_ST_CR_COMP_CERT: case TLS_ST_CR_CERT: return s->max_cert_list; case TLS_ST_CR_CERT_VRFY: return CERTIFICATE_VERIFY_MAX_LENGTH; case TLS_ST_CR_CERT_STATUS: return SSL3_RT_MAX_PLAIN_LENGTH; case TLS_ST_CR_KEY_EXCH: return SERVER_KEY_EXCH_MAX_LENGTH; case TLS_ST_CR_CERT_REQ: return s->max_cert_list; case TLS_ST_CR_SRVR_DONE: return SERVER_HELLO_DONE_MAX_LENGTH; case TLS_ST_CR_CHANGE: if (s->version == DTLS1_BAD_VER) return 3; return CCS_MAX_LENGTH; case TLS_ST_CR_SESSION_TICKET: return (SSL_CONNECTION_IS_TLS13(s)) ? SESSION_TICKET_MAX_LENGTH_TLS13 : SESSION_TICKET_MAX_LENGTH_TLS12; case TLS_ST_CR_FINISHED: return FINISHED_MAX_LENGTH; case TLS_ST_CR_ENCRYPTED_EXTENSIONS: return ENCRYPTED_EXTENSIONS_MAX_LENGTH; case TLS_ST_CR_KEY_UPDATE: return KEY_UPDATE_MAX_LENGTH; } } MSG_PROCESS_RETURN ossl_statem_client_process_message(SSL_CONNECTION *s, PACKET *pkt) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return MSG_PROCESS_ERROR; case TLS_ST_CR_SRVR_HELLO: return tls_process_server_hello(s, pkt); case DTLS_ST_CR_HELLO_VERIFY_REQUEST: return dtls_process_hello_verify(s, pkt); case TLS_ST_CR_CERT: return tls_process_server_certificate(s, pkt); #ifndef OPENSSL_NO_COMP_ALG case TLS_ST_CR_COMP_CERT: return tls_process_server_compressed_certificate(s, pkt); #endif case TLS_ST_CR_CERT_VRFY: return tls_process_cert_verify(s, pkt); case TLS_ST_CR_CERT_STATUS: return tls_process_cert_status(s, pkt); case TLS_ST_CR_KEY_EXCH: return tls_process_key_exchange(s, pkt); case TLS_ST_CR_CERT_REQ: return tls_process_certificate_request(s, pkt); case TLS_ST_CR_SRVR_DONE: return tls_process_server_done(s, pkt); case TLS_ST_CR_CHANGE: return tls_process_change_cipher_spec(s, pkt); case TLS_ST_CR_SESSION_TICKET: return tls_process_new_session_ticket(s, pkt); case TLS_ST_CR_FINISHED: return tls_process_finished(s, pkt); case TLS_ST_CR_HELLO_REQ: return tls_process_hello_req(s, pkt); case TLS_ST_CR_ENCRYPTED_EXTENSIONS: return tls_process_encrypted_extensions(s, pkt); case TLS_ST_CR_KEY_UPDATE: return tls_process_key_update(s, pkt); } } WORK_STATE ossl_statem_client_post_process_message(SSL_CONNECTION *s, WORK_STATE wst) { OSSL_STATEM *st = &s->statem; switch (st->hand_state) { default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; case TLS_ST_CR_CERT: case TLS_ST_CR_COMP_CERT: return tls_post_process_server_certificate(s, wst); case TLS_ST_CR_CERT_VRFY: case TLS_ST_CR_CERT_REQ: return tls_prepare_client_certificate(s, wst); } } CON_FUNC_RETURN tls_construct_client_hello(SSL_CONNECTION *s, WPACKET *pkt) { unsigned char *p; size_t sess_id_len; int i, protverr; #ifndef OPENSSL_NO_COMP SSL_COMP *comp; #endif SSL_SESSION *sess = s->session; unsigned char *session_id; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); protverr = ssl_set_client_hello_version(s); if (protverr != 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, protverr); return CON_FUNC_ERROR; } if (sess == NULL || !ssl_version_supported(s, sess->ssl_version, NULL) || !SSL_SESSION_is_resumable(sess)) { if (s->hello_retry_request == SSL_HRR_NONE && !ssl_get_new_session(s, 0)) { return CON_FUNC_ERROR; } } p = s->s3.client_random; if (SSL_CONNECTION_IS_DTLS(s)) { size_t idx; i = 1; for (idx = 0; idx < sizeof(s->s3.client_random); idx++) { if (p[idx]) { i = 0; break; } } } else { i = (s->hello_retry_request == SSL_HRR_NONE); } if (i && ssl_fill_hello_random(s, 0, p, sizeof(s->s3.client_random), DOWNGRADE_NONE) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!WPACKET_put_bytes_u16(pkt, s->client_version) || !WPACKET_memcpy(pkt, s->s3.client_random, SSL3_RANDOM_SIZE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } session_id = s->session->session_id; if (s->new_session || s->session->ssl_version == TLS1_3_VERSION) { if (s->version == TLS1_3_VERSION && (s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0) { sess_id_len = sizeof(s->tmp_session_id); s->tmp_session_id_len = sess_id_len; session_id = s->tmp_session_id; if (s->hello_retry_request == SSL_HRR_NONE && RAND_bytes_ex(sctx->libctx, s->tmp_session_id, sess_id_len, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } else { sess_id_len = 0; } } else { assert(s->session->session_id_length <= sizeof(s->session->session_id)); sess_id_len = s->session->session_id_length; if (s->version == TLS1_3_VERSION) { s->tmp_session_id_len = sess_id_len; memcpy(s->tmp_session_id, s->session->session_id, sess_id_len); } } if (!WPACKET_start_sub_packet_u8(pkt) || (sess_id_len != 0 && !WPACKET_memcpy(pkt, session_id, sess_id_len)) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (SSL_CONNECTION_IS_DTLS(s)) { if (s->d1->cookie_len > sizeof(s->d1->cookie) || !WPACKET_sub_memcpy_u8(pkt, s->d1->cookie, s->d1->cookie_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } if (!WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!ssl_cipher_list_to_bytes(s, SSL_get_ciphers(SSL_CONNECTION_GET_SSL(s)), pkt)) { return CON_FUNC_ERROR; } if (!WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!WPACKET_start_sub_packet_u8(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } #ifndef OPENSSL_NO_COMP if (ssl_allow_compression(s) && sctx->comp_methods && (SSL_CONNECTION_IS_DTLS(s) || s->s3.tmp.max_ver < TLS1_3_VERSION)) { int compnum = sk_SSL_COMP_num(sctx->comp_methods); for (i = 0; i < compnum; i++) { comp = sk_SSL_COMP_value(sctx->comp_methods, i); if (!WPACKET_put_bytes_u8(pkt, comp->id)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } } #endif if (!WPACKET_put_bytes_u8(pkt, 0) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (!tls_construct_extensions(s, pkt, SSL_EXT_CLIENT_HELLO, NULL, 0)) { return CON_FUNC_ERROR; } return CON_FUNC_SUCCESS; } MSG_PROCESS_RETURN dtls_process_hello_verify(SSL_CONNECTION *s, PACKET *pkt) { size_t cookie_len; PACKET cookiepkt; if (!PACKET_forward(pkt, 2) || !PACKET_get_length_prefixed_1(pkt, &cookiepkt)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } cookie_len = PACKET_remaining(&cookiepkt); if (cookie_len > sizeof(s->d1->cookie)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_LENGTH_TOO_LONG); return MSG_PROCESS_ERROR; } if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } s->d1->cookie_len = cookie_len; return MSG_PROCESS_FINISHED_READING; } static int set_client_ciphersuite(SSL_CONNECTION *s, const unsigned char *cipherchars) { STACK_OF(SSL_CIPHER) *sk; const SSL_CIPHER *c; int i; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); c = ssl_get_cipher_by_char(s, cipherchars, 0); if (c == NULL) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_UNKNOWN_CIPHER_RETURNED); return 0; } if (ssl_cipher_disabled(s, c, SSL_SECOP_CIPHER_CHECK, 1)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_CIPHER_RETURNED); return 0; } sk = ssl_get_ciphers_by_id(s); i = sk_SSL_CIPHER_find(sk, c); if (i < 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_CIPHER_RETURNED); return 0; } if (SSL_CONNECTION_IS_TLS13(s) && s->s3.tmp.new_cipher != NULL && s->s3.tmp.new_cipher->id != c->id) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_CIPHER_RETURNED); return 0; } if (s->session->cipher != NULL) s->session->cipher_id = s->session->cipher->id; if (s->hit && (s->session->cipher_id != c->id)) { if (SSL_CONNECTION_IS_TLS13(s)) { const EVP_MD *md = ssl_md(sctx, c->algorithm2); if (!ossl_assert(s->session->cipher != NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (md == NULL || md != ssl_md(sctx, s->session->cipher->algorithm2)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_CIPHERSUITE_DIGEST_HAS_CHANGED); return 0; } } else { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED); return 0; } } s->s3.tmp.new_cipher = c; return 1; } MSG_PROCESS_RETURN tls_process_server_hello(SSL_CONNECTION *s, PACKET *pkt) { PACKET session_id, extpkt; size_t session_id_len; const unsigned char *cipherchars; int hrr = 0; unsigned int compression; unsigned int sversion; unsigned int context; RAW_EXTENSION *extensions = NULL; SSL *ssl = SSL_CONNECTION_GET_SSL(s); #ifndef OPENSSL_NO_COMP SSL_COMP *comp; #endif if (!PACKET_get_net_2(pkt, &sversion)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (s->version == TLS1_3_VERSION && sversion == TLS1_2_VERSION && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { if (s->hello_retry_request != SSL_HRR_NONE) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); goto err; } s->hello_retry_request = SSL_HRR_PENDING; if (!ssl_set_record_protocol_version(s, s->version)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } hrr = 1; if (!PACKET_forward(pkt, SSL3_RANDOM_SIZE)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } } else { if (!PACKET_copy_bytes(pkt, s->s3.server_random, SSL3_RANDOM_SIZE)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } } if (!PACKET_get_length_prefixed_1(pkt, &session_id)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } session_id_len = PACKET_remaining(&session_id); if (session_id_len > sizeof(s->session->session_id) || session_id_len > SSL3_SESSION_ID_SIZE) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_SSL3_SESSION_ID_TOO_LONG); goto err; } if (!PACKET_get_bytes(pkt, &cipherchars, TLS_CIPHER_LEN)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!PACKET_get_1(pkt, &compression)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (PACKET_remaining(pkt) == 0 && !hrr) { PACKET_null_init(&extpkt); } else if (!PACKET_as_length_prefixed_2(pkt, &extpkt) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH); goto err; } if (!hrr) { if (!tls_collect_extensions(s, &extpkt, SSL_EXT_TLS1_2_SERVER_HELLO | SSL_EXT_TLS1_3_SERVER_HELLO, &extensions, NULL, 1)) { goto err; } if (!ssl_choose_client_version(s, sversion, extensions)) { goto err; } } if (SSL_CONNECTION_IS_TLS13(s) || hrr) { if (compression != 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INVALID_COMPRESSION_ALGORITHM); goto err; } if (session_id_len != s->tmp_session_id_len || memcmp(PACKET_data(&session_id), s->tmp_session_id, session_id_len) != 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INVALID_SESSION_ID); goto err; } } if (hrr) { if (!set_client_ciphersuite(s, cipherchars)) { goto err; } return tls_process_as_hello_retry_request(s, &extpkt); } context = SSL_CONNECTION_IS_TLS13(s) ? SSL_EXT_TLS1_3_SERVER_HELLO : SSL_EXT_TLS1_2_SERVER_HELLO; if (!tls_validate_all_contexts(s, context, extensions)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_EXTENSION); goto err; } s->hit = 0; if (SSL_CONNECTION_IS_TLS13(s)) { if (RECORD_LAYER_processed_read_pending(&s->rlayer)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_NOT_ON_RECORD_BOUNDARY); goto err; } if (!tls_parse_extension(s, TLSEXT_IDX_psk, SSL_EXT_TLS1_3_SERVER_HELLO, extensions, NULL, 0)) { goto err; } } else { if (s->version >= TLS1_VERSION && s->ext.session_secret_cb != NULL && s->session->ext.tick) { const SSL_CIPHER *pref_cipher = NULL; int master_key_length; master_key_length = sizeof(s->session->master_key); if (s->ext.session_secret_cb(ssl, s->session->master_key, &master_key_length, NULL, &pref_cipher, s->ext.session_secret_cb_arg) && master_key_length > 0) { s->session->master_key_length = master_key_length; s->session->cipher = pref_cipher ? pref_cipher : ssl_get_cipher_by_char(s, cipherchars, 0); } else { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } if (session_id_len != 0 && session_id_len == s->session->session_id_length && memcmp(PACKET_data(&session_id), s->session->session_id, session_id_len) == 0) s->hit = 1; } if (s->hit) { if (s->sid_ctx_length != s->session->sid_ctx_length || memcmp(s->session->sid_ctx, s->sid_ctx, s->sid_ctx_length)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT); goto err; } } else { if (s->session->session_id_length > 0) { ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_miss); if (!ssl_get_new_session(s, 0)) { goto err; } } s->session->ssl_version = s->version; if (!SSL_CONNECTION_IS_TLS13(s)) { s->session->session_id_length = session_id_len; if (session_id_len > 0) memcpy(s->session->session_id, PACKET_data(&session_id), session_id_len); } } if (s->version != s->session->ssl_version) { SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_SSL_SESSION_VERSION_MISMATCH); goto err; } s->s3.tmp.min_ver = s->version; s->s3.tmp.max_ver = s->version; if (!set_client_ciphersuite(s, cipherchars)) { goto err; } #ifdef OPENSSL_NO_COMP if (compression != 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM); goto err; } if (s->session->compress_meth != 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_INCONSISTENT_COMPRESSION); goto err; } #else if (s->hit && compression != s->session->compress_meth) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED); goto err; } if (compression == 0) comp = NULL; else if (!ssl_allow_compression(s)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_COMPRESSION_DISABLED); goto err; } else { comp = ssl3_comp_find(SSL_CONNECTION_GET_CTX(s)->comp_methods, compression); } if (compression != 0 && comp == NULL) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM); goto err; } else { s->s3.tmp.new_compression = comp; } #endif if (!tls_parse_all_extensions(s, context, extensions, NULL, 0, 1)) { goto err; } #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { unsigned char sctpauthkey[64]; char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)]; size_t labellen; memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL, sizeof(DTLS1_SCTP_AUTH_LABEL)); labellen = sizeof(labelbuffer) - 1; if (s->mode & SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG) labellen += 1; if (SSL_export_keying_material(ssl, sctpauthkey, sizeof(sctpauthkey), labelbuffer, labellen, NULL, 0, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY, sizeof(sctpauthkey), sctpauthkey); } #endif if (SSL_CONNECTION_IS_TLS13(s)) { if (!ssl->method->ssl3_enc->setup_key_block(s) || !ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_CLIENT_READ)) { goto err; } if (s->early_data_state == SSL_EARLY_DATA_NONE && (s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) == 0 && !ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_CLIENT_WRITE)) { goto err; } } OPENSSL_free(extensions); return MSG_PROCESS_CONTINUE_READING; err: OPENSSL_free(extensions); return MSG_PROCESS_ERROR; } static MSG_PROCESS_RETURN tls_process_as_hello_retry_request(SSL_CONNECTION *s, PACKET *extpkt) { RAW_EXTENSION *extensions = NULL; if (s->early_data_state == SSL_EARLY_DATA_FINISHED_WRITING && !ssl_set_new_record_layer(s, TLS_ANY_VERSION, OSSL_RECORD_DIRECTION_WRITE, OSSL_RECORD_PROTECTION_LEVEL_NONE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NID_undef, NULL, NULL, NULL)) { goto err; } s->rlayer.wrlmethod->set_protocol_version(s->rlayer.wrl, TLS1_3_VERSION); if (!tls_collect_extensions(s, extpkt, SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST, &extensions, NULL, 1) || !tls_parse_all_extensions(s, SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST, extensions, NULL, 0, 1)) { goto err; } OPENSSL_free(extensions); extensions = NULL; if (s->ext.tls13_cookie_len == 0 && s->s3.tmp.pkey != NULL) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_NO_CHANGE_FOLLOWING_HRR); goto err; } if (!create_synthetic_message_hash(s, NULL, 0, NULL, 0)) { goto err; } if (!ssl3_finish_mac(s, (unsigned char *)s->init_buf->data, s->init_num + SSL3_HM_HEADER_LENGTH)) { goto err; } return MSG_PROCESS_FINISHED_READING; err: OPENSSL_free(extensions); return MSG_PROCESS_ERROR; } MSG_PROCESS_RETURN tls_process_server_rpk(SSL_CONNECTION *sc, PACKET *pkt) { EVP_PKEY *peer_rpk; if (!tls_process_rpk(sc, pkt, &peer_rpk)) { return MSG_PROCESS_ERROR; } if (peer_rpk == NULL) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_CERTIFICATE); return MSG_PROCESS_ERROR; } EVP_PKEY_free(sc->session->peer_rpk); sc->session->peer_rpk = peer_rpk; return MSG_PROCESS_CONTINUE_PROCESSING; } static WORK_STATE tls_post_process_server_rpk(SSL_CONNECTION *sc, WORK_STATE wst) { size_t certidx; const SSL_CERT_LOOKUP *clu; if (sc->session->peer_rpk == NULL) { SSLfatal(sc, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INVALID_RAW_PUBLIC_KEY); return WORK_ERROR; } if (sc->rwstate == SSL_RETRY_VERIFY) sc->rwstate = SSL_NOTHING; if (ssl_verify_rpk(sc, sc->session->peer_rpk) > 0 && sc->rwstate == SSL_RETRY_VERIFY) return WORK_MORE_A; if ((clu = ssl_cert_lookup_by_pkey(sc->session->peer_rpk, &certidx, SSL_CONNECTION_GET_CTX(sc))) == NULL) { SSLfatal(sc, SSL_AD_ILLEGAL_PARAMETER, SSL_R_UNKNOWN_CERTIFICATE_TYPE); return WORK_ERROR; } if (!SSL_CONNECTION_IS_TLS13(sc)) { if ((clu->amask & sc->s3.tmp.new_cipher->algorithm_auth) == 0) { SSLfatal(sc, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_RPK_TYPE); return WORK_ERROR; } } X509_free(sc->session->peer); sc->session->peer = NULL; sk_X509_pop_free(sc->session->peer_chain, X509_free); sc->session->peer_chain = NULL; sc->session->verify_result = sc->verify_result; if (SSL_CONNECTION_IS_TLS13(sc) && !ssl_handshake_hash(sc, sc->cert_verify_hash, sizeof(sc->cert_verify_hash), &sc->cert_verify_hash_len)) { return WORK_ERROR; } return WORK_FINISHED_CONTINUE; } MSG_PROCESS_RETURN tls_process_server_certificate(SSL_CONNECTION *s, PACKET *pkt) { unsigned long cert_list_len, cert_len; X509 *x = NULL; const unsigned char *certstart, *certbytes; size_t chainidx; unsigned int context = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (s->ext.server_cert_type == TLSEXT_cert_type_rpk) return tls_process_server_rpk(s, pkt); if (s->ext.server_cert_type != TLSEXT_cert_type_x509) { SSLfatal(s, SSL_AD_UNSUPPORTED_CERTIFICATE, SSL_R_UNKNOWN_CERTIFICATE_TYPE); goto err; } if ((s->session->peer_chain = sk_X509_new_null()) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if ((SSL_CONNECTION_IS_TLS13(s) && !PACKET_get_1(pkt, &context)) || context != 0 || !PACKET_get_net_3(pkt, &cert_list_len) || PACKET_remaining(pkt) != cert_list_len || PACKET_remaining(pkt) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } for (chainidx = 0; PACKET_remaining(pkt); chainidx++) { if (!PACKET_get_net_3(pkt, &cert_len) || !PACKET_get_bytes(pkt, &certbytes, cert_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_CERT_LENGTH_MISMATCH); goto err; } certstart = certbytes; x = X509_new_ex(sctx->libctx, sctx->propq); if (x == NULL) { SSLfatal(s, SSL_AD_DECODE_ERROR, ERR_R_ASN1_LIB); goto err; } if (d2i_X509(&x, (const unsigned char **)&certbytes, cert_len) == NULL) { SSLfatal(s, SSL_AD_BAD_CERTIFICATE, ERR_R_ASN1_LIB); goto err; } if (certbytes != (certstart + cert_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_CERT_LENGTH_MISMATCH); goto err; } if (SSL_CONNECTION_IS_TLS13(s)) { RAW_EXTENSION *rawexts = NULL; PACKET extensions; if (!PACKET_get_length_prefixed_2(pkt, &extensions)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH); goto err; } if (!tls_collect_extensions(s, &extensions, SSL_EXT_TLS1_3_CERTIFICATE, &rawexts, NULL, chainidx == 0) || !tls_parse_all_extensions(s, SSL_EXT_TLS1_3_CERTIFICATE, rawexts, x, chainidx, PACKET_remaining(pkt) == 0)) { OPENSSL_free(rawexts); goto err; } OPENSSL_free(rawexts); } if (!sk_X509_push(s->session->peer_chain, x)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } x = NULL; } return MSG_PROCESS_CONTINUE_PROCESSING; err: X509_free(x); OSSL_STACK_OF_X509_free(s->session->peer_chain); s->session->peer_chain = NULL; return MSG_PROCESS_ERROR; } WORK_STATE tls_post_process_server_certificate(SSL_CONNECTION *s, WORK_STATE wst) { X509 *x; EVP_PKEY *pkey = NULL; const SSL_CERT_LOOKUP *clu; size_t certidx; int i; if (s->ext.server_cert_type == TLSEXT_cert_type_rpk) return tls_post_process_server_rpk(s, wst); if (s->rwstate == SSL_RETRY_VERIFY) s->rwstate = SSL_NOTHING; i = ssl_verify_cert_chain(s, s->session->peer_chain); if (i > 0 && s->rwstate == SSL_RETRY_VERIFY) { return WORK_MORE_A; } if (s->verify_mode != SSL_VERIFY_NONE && i <= 0) { SSLfatal(s, ssl_x509err2alert(s->verify_result), SSL_R_CERTIFICATE_VERIFY_FAILED); return WORK_ERROR; } ERR_clear_error(); x = sk_X509_value(s->session->peer_chain, 0); pkey = X509_get0_pubkey(x); if (pkey == NULL || EVP_PKEY_missing_parameters(pkey)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS); return WORK_ERROR; } if ((clu = ssl_cert_lookup_by_pkey(pkey, &certidx, SSL_CONNECTION_GET_CTX(s))) == NULL) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_UNKNOWN_CERTIFICATE_TYPE); return WORK_ERROR; } if (!SSL_CONNECTION_IS_TLS13(s)) { if ((clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_CERTIFICATE_TYPE); return WORK_ERROR; } } X509_free(s->session->peer); X509_up_ref(x); s->session->peer = x; s->session->verify_result = s->verify_result; EVP_PKEY_free(s->session->peer_rpk); s->session->peer_rpk = NULL; if (SSL_CONNECTION_IS_TLS13(s) && !ssl_handshake_hash(s, s->cert_verify_hash, sizeof(s->cert_verify_hash), &s->cert_verify_hash_len)) { ; return WORK_ERROR; } return WORK_FINISHED_CONTINUE; } #ifndef OPENSSL_NO_COMP_ALG MSG_PROCESS_RETURN tls_process_server_compressed_certificate(SSL_CONNECTION *sc, PACKET *pkt) { MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR; PACKET tmppkt; BUF_MEM *buf = BUF_MEM_new(); if (tls13_process_compressed_certificate(sc, pkt, &tmppkt, buf) != MSG_PROCESS_ERROR) ret = tls_process_server_certificate(sc, &tmppkt); BUF_MEM_free(buf); return ret; } #endif static int tls_process_ske_psk_preamble(SSL_CONNECTION *s, PACKET *pkt) { #ifndef OPENSSL_NO_PSK PACKET psk_identity_hint; if (!PACKET_get_length_prefixed_2(pkt, &psk_identity_hint)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (PACKET_remaining(&psk_identity_hint) > PSK_MAX_IDENTITY_LEN) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_DATA_LENGTH_TOO_LONG); return 0; } if (PACKET_remaining(&psk_identity_hint) == 0) { OPENSSL_free(s->session->psk_identity_hint); s->session->psk_identity_hint = NULL; } else if (!PACKET_strndup(&psk_identity_hint, &s->session->psk_identity_hint)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } static int tls_process_ske_srp(SSL_CONNECTION *s, PACKET *pkt, EVP_PKEY **pkey) { #ifndef OPENSSL_NO_SRP PACKET prime, generator, salt, server_pub; if (!PACKET_get_length_prefixed_2(pkt, &prime) || !PACKET_get_length_prefixed_2(pkt, &generator) || !PACKET_get_length_prefixed_1(pkt, &salt) || !PACKET_get_length_prefixed_2(pkt, &server_pub)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if ((s->srp_ctx.N = BN_bin2bn(PACKET_data(&prime), (int)PACKET_remaining(&prime), NULL)) == NULL || (s->srp_ctx.g = BN_bin2bn(PACKET_data(&generator), (int)PACKET_remaining(&generator), NULL)) == NULL || (s->srp_ctx.s = BN_bin2bn(PACKET_data(&salt), (int)PACKET_remaining(&salt), NULL)) == NULL || (s->srp_ctx.B = BN_bin2bn(PACKET_data(&server_pub), (int)PACKET_remaining(&server_pub), NULL)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BN_LIB); return 0; } if (!srp_verify_server_param(s)) { return 0; } if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aRSA | SSL_aDSS)) *pkey = tls_get_peer_pkey(s); return 1; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } static int tls_process_ske_dhe(SSL_CONNECTION *s, PACKET *pkt, EVP_PKEY **pkey) { PACKET prime, generator, pub_key; EVP_PKEY *peer_tmp = NULL; BIGNUM *p = NULL, *g = NULL, *bnpub_key = NULL; EVP_PKEY_CTX *pctx = NULL; OSSL_PARAM *params = NULL; OSSL_PARAM_BLD *tmpl = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); int ret = 0; if (!PACKET_get_length_prefixed_2(pkt, &prime) || !PACKET_get_length_prefixed_2(pkt, &generator) || !PACKET_get_length_prefixed_2(pkt, &pub_key)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } p = BN_bin2bn(PACKET_data(&prime), (int)PACKET_remaining(&prime), NULL); g = BN_bin2bn(PACKET_data(&generator), (int)PACKET_remaining(&generator), NULL); bnpub_key = BN_bin2bn(PACKET_data(&pub_key), (int)PACKET_remaining(&pub_key), NULL); if (p == NULL || g == NULL || bnpub_key == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BN_LIB); goto err; } tmpl = OSSL_PARAM_BLD_new(); if (tmpl == NULL || !OSSL_PARAM_BLD_push_BN(tmpl, OSSL_PKEY_PARAM_FFC_P, p) || !OSSL_PARAM_BLD_push_BN(tmpl, OSSL_PKEY_PARAM_FFC_G, g) || !OSSL_PARAM_BLD_push_BN(tmpl, OSSL_PKEY_PARAM_PUB_KEY, bnpub_key) || (params = OSSL_PARAM_BLD_to_param(tmpl)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, "DH", sctx->propq); if (pctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (EVP_PKEY_fromdata_init(pctx) <= 0 || EVP_PKEY_fromdata(pctx, &peer_tmp, EVP_PKEY_KEYPAIR, params) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_DH_VALUE); goto err; } EVP_PKEY_CTX_free(pctx); pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, peer_tmp, sctx->propq); if (pctx == NULL || EVP_PKEY_param_check_quick(pctx) != 1 || EVP_PKEY_public_check(pctx) != 1) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_DH_VALUE); goto err; } if (!ssl_security(s, SSL_SECOP_TMP_DH, EVP_PKEY_get_security_bits(peer_tmp), 0, peer_tmp)) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_DH_KEY_TOO_SMALL); goto err; } s->s3.peer_tmp = peer_tmp; peer_tmp = NULL; if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aRSA | SSL_aDSS)) *pkey = tls_get_peer_pkey(s); ret = 1; err: OSSL_PARAM_BLD_free(tmpl); OSSL_PARAM_free(params); EVP_PKEY_free(peer_tmp); EVP_PKEY_CTX_free(pctx); BN_free(p); BN_free(g); BN_free(bnpub_key); return ret; } static int tls_process_ske_ecdhe(SSL_CONNECTION *s, PACKET *pkt, EVP_PKEY **pkey) { PACKET encoded_pt; unsigned int curve_type, curve_id; if (!PACKET_get_1(pkt, &curve_type) || !PACKET_get_net_2(pkt, &curve_id)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_TOO_SHORT); return 0; } if (curve_type != NAMED_CURVE_TYPE || !tls1_check_group_id(s, curve_id, 1)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_WRONG_CURVE); return 0; } if ((s->s3.peer_tmp = ssl_generate_param_group(s, curve_id)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS); return 0; } if (!PACKET_get_length_prefixed_1(pkt, &encoded_pt)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (EVP_PKEY_set1_encoded_public_key(s->s3.peer_tmp, PACKET_data(&encoded_pt), PACKET_remaining(&encoded_pt)) <= 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_ECPOINT); return 0; } if (s->s3.tmp.new_cipher->algorithm_auth & SSL_aECDSA) *pkey = tls_get_peer_pkey(s); else if (s->s3.tmp.new_cipher->algorithm_auth & SSL_aRSA) *pkey = tls_get_peer_pkey(s); s->session->kex_group = curve_id; return 1; } MSG_PROCESS_RETURN tls_process_key_exchange(SSL_CONNECTION *s, PACKET *pkt) { long alg_k; EVP_PKEY *pkey = NULL; EVP_MD_CTX *md_ctx = NULL; EVP_PKEY_CTX *pctx = NULL; PACKET save_param_start, signature; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); alg_k = s->s3.tmp.new_cipher->algorithm_mkey; save_param_start = *pkt; EVP_PKEY_free(s->s3.peer_tmp); s->s3.peer_tmp = NULL; if (alg_k & SSL_PSK) { if (!tls_process_ske_psk_preamble(s, pkt)) { goto err; } } if (alg_k & (SSL_kPSK | SSL_kRSAPSK)) { } else if (alg_k & SSL_kSRP) { if (!tls_process_ske_srp(s, pkt, &pkey)) { goto err; } } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { if (!tls_process_ske_dhe(s, pkt, &pkey)) { goto err; } } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { if (!tls_process_ske_ecdhe(s, pkt, &pkey)) { goto err; } } else if (alg_k) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); goto err; } if (pkey != NULL) { PACKET params; const EVP_MD *md = NULL; unsigned char *tbs; size_t tbslen; int rv; if (!PACKET_get_sub_packet(&save_param_start, &params, PACKET_remaining(&save_param_start) - PACKET_remaining(pkt))) { SSLfatal(s, SSL_AD_DECODE_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (SSL_USE_SIGALGS(s)) { unsigned int sigalg; if (!PACKET_get_net_2(pkt, &sigalg)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_TOO_SHORT); goto err; } if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) { goto err; } } else if (!tls1_set_peer_legacy_sigalg(s, pkey)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LEGACY_SIGALG_DISALLOWED_OR_UNSUPPORTED); goto err; } if (!tls1_lookup_md(sctx, s->s3.tmp.peer_sigalg, &md)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_SUITABLE_DIGEST_ALGORITHM); goto err; } if (SSL_USE_SIGALGS(s)) OSSL_TRACE1(TLS, "USING TLSv1.2 HASH %s\n", md == NULL ? "n/a" : EVP_MD_get0_name(md)); if (!PACKET_get_length_prefixed_2(pkt, &signature) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } md_ctx = EVP_MD_CTX_new(); if (md_ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_DigestVerifyInit_ex(md_ctx, &pctx, md == NULL ? NULL : EVP_MD_get0_name(md), sctx->libctx, sctx->propq, pkey, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (SSL_USE_PSS(s)) { if (EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) <= 0 || EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, RSA_PSS_SALTLEN_DIGEST) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } } tbslen = construct_key_exchange_tbs(s, &tbs, PACKET_data(&params), PACKET_remaining(&params)); if (tbslen == 0) { goto err; } rv = EVP_DigestVerify(md_ctx, PACKET_data(&signature), PACKET_remaining(&signature), tbs, tbslen); OPENSSL_free(tbs); if (rv <= 0) { SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_BAD_SIGNATURE); goto err; } EVP_MD_CTX_free(md_ctx); md_ctx = NULL; } else { if (!(s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP)) && !(alg_k & SSL_PSK)) { if (ssl3_check_cert_and_algorithm(s)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_DATA); } goto err; } if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_EXTRA_DATA_IN_MESSAGE); goto err; } } return MSG_PROCESS_CONTINUE_READING; err: EVP_MD_CTX_free(md_ctx); return MSG_PROCESS_ERROR; } MSG_PROCESS_RETURN tls_process_certificate_request(SSL_CONNECTION *s, PACKET *pkt) { if (s->s3.tmp.valid_flags != NULL) memset(s->s3.tmp.valid_flags, 0, s->ssl_pkey_num * sizeof(uint32_t)); else s->s3.tmp.valid_flags = OPENSSL_zalloc(s->ssl_pkey_num * sizeof(uint32_t)); if (s->s3.tmp.valid_flags == NULL) return 0; if (SSL_CONNECTION_IS_TLS13(s)) { PACKET reqctx, extensions; RAW_EXTENSION *rawexts = NULL; if ((s->shutdown & SSL_SENT_SHUTDOWN) != 0) { return MSG_PROCESS_FINISHED_READING; } OPENSSL_free(s->s3.tmp.ctype); s->s3.tmp.ctype = NULL; s->s3.tmp.ctype_len = 0; OPENSSL_free(s->pha_context); s->pha_context = NULL; s->pha_context_len = 0; if (!PACKET_get_length_prefixed_1(pkt, &reqctx) || !PACKET_memdup(&reqctx, &s->pha_context, &s->pha_context_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } if (!PACKET_get_length_prefixed_2(pkt, &extensions)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH); return MSG_PROCESS_ERROR; } if (!tls_collect_extensions(s, &extensions, SSL_EXT_TLS1_3_CERTIFICATE_REQUEST, &rawexts, NULL, 1) || !tls_parse_all_extensions(s, SSL_EXT_TLS1_3_CERTIFICATE_REQUEST, rawexts, NULL, 0, 1)) { OPENSSL_free(rawexts); return MSG_PROCESS_ERROR; } OPENSSL_free(rawexts); if (!tls1_process_sigalgs(s)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_LENGTH); return MSG_PROCESS_ERROR; } } else { PACKET ctypes; if (!PACKET_get_length_prefixed_1(pkt, &ctypes)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } if (!PACKET_memdup(&ctypes, &s->s3.tmp.ctype, &s->s3.tmp.ctype_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return MSG_PROCESS_ERROR; } if (SSL_USE_SIGALGS(s)) { PACKET sigalgs; if (!PACKET_get_length_prefixed_2(pkt, &sigalgs)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } if (!tls1_save_sigalgs(s, &sigalgs, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_SIGNATURE_ALGORITHMS_ERROR); return MSG_PROCESS_ERROR; } if (!tls1_process_sigalgs(s)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); return MSG_PROCESS_ERROR; } } if (!parse_ca_names(s, pkt)) { return MSG_PROCESS_ERROR; } } if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } s->s3.tmp.cert_req = 1; if (SSL_CONNECTION_IS_TLS13(s) && s->post_handshake_auth != SSL_PHA_REQUESTED) return MSG_PROCESS_CONTINUE_READING; return MSG_PROCESS_CONTINUE_PROCESSING; } MSG_PROCESS_RETURN tls_process_new_session_ticket(SSL_CONNECTION *s, PACKET *pkt) { unsigned int ticklen; unsigned long ticket_lifetime_hint, age_add = 0; unsigned int sess_len; RAW_EXTENSION *exts = NULL; PACKET nonce; EVP_MD *sha256 = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); PACKET_null_init(&nonce); if (!PACKET_get_net_4(pkt, &ticket_lifetime_hint) || (SSL_CONNECTION_IS_TLS13(s) && (!PACKET_get_net_4(pkt, &age_add) || !PACKET_get_length_prefixed_1(pkt, &nonce))) || !PACKET_get_net_2(pkt, &ticklen) || (SSL_CONNECTION_IS_TLS13(s) ? (ticklen == 0 || PACKET_remaining(pkt) < ticklen) : PACKET_remaining(pkt) != ticklen)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (ticklen == 0) return MSG_PROCESS_CONTINUE_READING; if (SSL_CONNECTION_IS_TLS13(s) || s->session->session_id_length > 0) { SSL_SESSION *new_sess; if ((new_sess = ssl_session_dup(s->session, 0)) == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); goto err; } if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) != 0 && !SSL_CONNECTION_IS_TLS13(s)) { SSL_CTX_remove_session(s->session_ctx, s->session); } SSL_SESSION_free(s->session); s->session = new_sess; } s->session->time = ossl_time_now(); ssl_session_calculate_timeout(s->session); OPENSSL_free(s->session->ext.tick); s->session->ext.tick = NULL; s->session->ext.ticklen = 0; s->session->ext.tick = OPENSSL_malloc(ticklen); if (s->session->ext.tick == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (!PACKET_copy_bytes(pkt, s->session->ext.tick, ticklen)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } s->session->ext.tick_lifetime_hint = ticket_lifetime_hint; s->session->ext.tick_age_add = age_add; s->session->ext.ticklen = ticklen; if (SSL_CONNECTION_IS_TLS13(s)) { PACKET extpkt; if (!PACKET_as_length_prefixed_2(pkt, &extpkt) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!tls_collect_extensions(s, &extpkt, SSL_EXT_TLS1_3_NEW_SESSION_TICKET, &exts, NULL, 1) || !tls_parse_all_extensions(s, SSL_EXT_TLS1_3_NEW_SESSION_TICKET, exts, NULL, 0, 1)) { goto err; } } sha256 = EVP_MD_fetch(sctx->libctx, "SHA2-256", sctx->propq); if (sha256 == NULL) { SSLfatal_alert(s, SSL_AD_INTERNAL_ERROR); goto err; } if (!EVP_Digest(s->session->ext.tick, ticklen, s->session->session_id, &sess_len, sha256, NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } EVP_MD_free(sha256); sha256 = NULL; s->session->session_id_length = sess_len; s->session->not_resumable = 0; if (SSL_CONNECTION_IS_TLS13(s)) { const EVP_MD *md = ssl_handshake_md(s); int hashleni = EVP_MD_get_size(md); size_t hashlen; static const unsigned char nonce_label[] = "resumption"; if (!ossl_assert(hashleni >= 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } hashlen = (size_t)hashleni; if (!tls13_hkdf_expand(s, md, s->resumption_master_secret, nonce_label, sizeof(nonce_label) - 1, PACKET_data(&nonce), PACKET_remaining(&nonce), s->session->master_key, hashlen, 1)) { goto err; } s->session->master_key_length = hashlen; OPENSSL_free(exts); ssl_update_cache(s, SSL_SESS_CACHE_CLIENT); return MSG_PROCESS_FINISHED_READING; } return MSG_PROCESS_CONTINUE_READING; err: EVP_MD_free(sha256); OPENSSL_free(exts); return MSG_PROCESS_ERROR; } int tls_process_cert_status_body(SSL_CONNECTION *s, PACKET *pkt) { size_t resplen; unsigned int type; if (!PACKET_get_1(pkt, &type) || type != TLSEXT_STATUSTYPE_ocsp) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_UNSUPPORTED_STATUS_TYPE); return 0; } if (!PACKET_get_net_3_len(pkt, &resplen) || PACKET_remaining(pkt) != resplen) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } s->ext.ocsp.resp = OPENSSL_malloc(resplen); if (s->ext.ocsp.resp == NULL) { s->ext.ocsp.resp_len = 0; SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } s->ext.ocsp.resp_len = resplen; if (!PACKET_copy_bytes(pkt, s->ext.ocsp.resp, resplen)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } return 1; } MSG_PROCESS_RETURN tls_process_cert_status(SSL_CONNECTION *s, PACKET *pkt) { if (!tls_process_cert_status_body(s, pkt)) { return MSG_PROCESS_ERROR; } return MSG_PROCESS_CONTINUE_READING; } int tls_process_initial_server_flight(SSL_CONNECTION *s) { SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!ssl3_check_cert_and_algorithm(s)) { return 0; } if (s->ext.status_type != TLSEXT_STATUSTYPE_nothing && sctx->ext.status_cb != NULL) { int ret = sctx->ext.status_cb(SSL_CONNECTION_GET_SSL(s), sctx->ext.status_arg); if (ret == 0) { SSLfatal(s, SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE, SSL_R_INVALID_STATUS_RESPONSE); return 0; } if (ret < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_OCSP_CALLBACK_FAILURE); return 0; } } #ifndef OPENSSL_NO_CT if (s->ct_validation_callback != NULL) { if (!ssl_validate_ct(s) && (s->verify_mode & SSL_VERIFY_PEER)) { return 0; } } #endif return 1; } MSG_PROCESS_RETURN tls_process_server_done(SSL_CONNECTION *s, PACKET *pkt) { if (PACKET_remaining(pkt) > 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } #ifndef OPENSSL_NO_SRP if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { if (ssl_srp_calc_a_param_intern(s) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_SRP_A_CALC); return MSG_PROCESS_ERROR; } } #endif if (!tls_process_initial_server_flight(s)) { return MSG_PROCESS_ERROR; } return MSG_PROCESS_FINISHED_READING; } static int tls_construct_cke_psk_preamble(SSL_CONNECTION *s, WPACKET *pkt) { #ifndef OPENSSL_NO_PSK int ret = 0; char identity[PSK_MAX_IDENTITY_LEN + 1]; size_t identitylen = 0; unsigned char psk[PSK_MAX_PSK_LEN]; unsigned char *tmppsk = NULL; char *tmpidentity = NULL; size_t psklen = 0; if (s->psk_client_callback == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_PSK_NO_CLIENT_CB); goto err; } memset(identity, 0, sizeof(identity)); psklen = s->psk_client_callback(SSL_CONNECTION_GET_SSL(s), s->session->psk_identity_hint, identity, sizeof(identity) - 1, psk, sizeof(psk)); if (psklen > PSK_MAX_PSK_LEN) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, ERR_R_INTERNAL_ERROR); psklen = PSK_MAX_PSK_LEN; goto err; } else if (psklen == 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_PSK_IDENTITY_NOT_FOUND); goto err; } identitylen = strlen(identity); if (identitylen > PSK_MAX_IDENTITY_LEN) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } tmppsk = OPENSSL_memdup(psk, psklen); tmpidentity = OPENSSL_strdup(identity); if (tmppsk == NULL || tmpidentity == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } OPENSSL_free(s->s3.tmp.psk); s->s3.tmp.psk = tmppsk; s->s3.tmp.psklen = psklen; tmppsk = NULL; OPENSSL_free(s->session->psk_identity); s->session->psk_identity = tmpidentity; tmpidentity = NULL; if (!WPACKET_sub_memcpy_u16(pkt, identity, identitylen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ret = 1; err: OPENSSL_cleanse(psk, psklen); OPENSSL_cleanse(identity, sizeof(identity)); OPENSSL_clear_free(tmppsk, psklen); OPENSSL_clear_free(tmpidentity, identitylen); return ret; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } static int tls_construct_cke_rsa(SSL_CONNECTION *s, WPACKET *pkt) { unsigned char *encdata = NULL; EVP_PKEY *pkey = NULL; EVP_PKEY_CTX *pctx = NULL; size_t enclen; unsigned char *pms = NULL; size_t pmslen = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (!received_server_cert(s)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if ((pkey = tls_get_peer_pkey(s)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!EVP_PKEY_is_a(pkey, "RSA")) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } pmslen = SSL_MAX_MASTER_KEY_LENGTH; pms = OPENSSL_malloc(pmslen); if (pms == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } pms[0] = s->client_version >> 8; pms[1] = s->client_version & 0xff; if (RAND_bytes_ex(sctx->libctx, pms + 2, pmslen - 2, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_RAND_LIB); goto err; } if (s->version > SSL3_VERSION && !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pkey, sctx->propq); if (pctx == NULL || EVP_PKEY_encrypt_init(pctx) <= 0 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (!WPACKET_allocate_bytes(pkt, enclen, &encdata) || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_RSA_ENCRYPT); goto err; } EVP_PKEY_CTX_free(pctx); pctx = NULL; if (s->version > SSL3_VERSION && !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { goto err; } s->s3.tmp.pms = pms; s->s3.tmp.pmslen = pmslen; return 1; err: OPENSSL_clear_free(pms, pmslen); EVP_PKEY_CTX_free(pctx); return 0; } static int tls_construct_cke_dhe(SSL_CONNECTION *s, WPACKET *pkt) { EVP_PKEY *ckey = NULL, *skey = NULL; unsigned char *keybytes = NULL; int prime_len; unsigned char *encoded_pub = NULL; size_t encoded_pub_len, pad_len; int ret = 0; skey = s->s3.peer_tmp; if (skey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ckey = ssl_generate_pkey(s, skey); if (ckey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (ssl_derive(s, ckey, skey, 0) == 0) { goto err; } encoded_pub_len = EVP_PKEY_get1_encoded_public_key(ckey, &encoded_pub); if (encoded_pub_len == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); EVP_PKEY_free(ckey); return EXT_RETURN_FAIL; } prime_len = EVP_PKEY_get_size(ckey); pad_len = prime_len - encoded_pub_len; if (pad_len > 0) { if (!WPACKET_sub_allocate_bytes_u16(pkt, pad_len, &keybytes)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } memset(keybytes, 0, pad_len); } if (!WPACKET_sub_memcpy_u16(pkt, encoded_pub, encoded_pub_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ret = 1; err: OPENSSL_free(encoded_pub); EVP_PKEY_free(ckey); return ret; } static int tls_construct_cke_ecdhe(SSL_CONNECTION *s, WPACKET *pkt) { unsigned char *encodedPoint = NULL; size_t encoded_pt_len = 0; EVP_PKEY *ckey = NULL, *skey = NULL; int ret = 0; skey = s->s3.peer_tmp; if (skey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } ckey = ssl_generate_pkey(s, skey); if (ckey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); goto err; } if (ssl_derive(s, ckey, skey, 0) == 0) { goto err; } encoded_pt_len = EVP_PKEY_get1_encoded_public_key(ckey, &encodedPoint); if (encoded_pt_len == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EC_LIB); goto err; } if (!WPACKET_sub_memcpy_u8(pkt, encodedPoint, encoded_pt_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ret = 1; err: OPENSSL_free(encodedPoint); EVP_PKEY_free(ckey); return ret; } static int tls_construct_cke_gost(SSL_CONNECTION *s, WPACKET *pkt) { #ifndef OPENSSL_NO_GOST EVP_PKEY_CTX *pkey_ctx = NULL; EVP_PKEY *pkey = NULL; size_t msglen; unsigned int md_len; unsigned char shared_ukm[32], tmp[256]; EVP_MD_CTX *ukm_hash = NULL; int dgst_nid = NID_id_GostR3411_94; unsigned char *pms = NULL; size_t pmslen = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if ((s->s3.tmp.new_cipher->algorithm_auth & SSL_aGOST12) != 0) dgst_nid = NID_id_GostR3411_2012_256; if ((pkey = tls_get_peer_pkey(s)) == NULL) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); return 0; } pkey_ctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pkey, sctx->propq); if (pkey_ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } pmslen = 32; pms = OPENSSL_malloc(pmslen); if (pms == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (EVP_PKEY_encrypt_init(pkey_ctx) <= 0 || RAND_bytes_ex(sctx->libctx, pms, pmslen, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; }; ukm_hash = EVP_MD_CTX_new(); if (ukm_hash == NULL || EVP_DigestInit(ukm_hash, EVP_get_digestbynid(dgst_nid)) <= 0 || EVP_DigestUpdate(ukm_hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 || EVP_DigestUpdate(ukm_hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } EVP_MD_CTX_free(ukm_hash); ukm_hash = NULL; if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, EVP_PKEY_OP_ENCRYPT, EVP_PKEY_CTRL_SET_IV, 8, shared_ukm) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LIBRARY_BUG); goto err; } msglen = 255; if (EVP_PKEY_encrypt(pkey_ctx, tmp, &msglen, pms, pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LIBRARY_BUG); goto err; } if (!WPACKET_put_bytes_u8(pkt, V_ASN1_SEQUENCE | V_ASN1_CONSTRUCTED) || (msglen >= 0x80 && !WPACKET_put_bytes_u8(pkt, 0x81)) || !WPACKET_sub_memcpy_u8(pkt, tmp, msglen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } EVP_PKEY_CTX_free(pkey_ctx); s->s3.tmp.pms = pms; s->s3.tmp.pmslen = pmslen; return 1; err: EVP_PKEY_CTX_free(pkey_ctx); OPENSSL_clear_free(pms, pmslen); EVP_MD_CTX_free(ukm_hash); return 0; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } #ifndef OPENSSL_NO_GOST int ossl_gost18_cke_cipher_nid(const SSL_CONNECTION *s) { if ((s->s3.tmp.new_cipher->algorithm_enc & SSL_MAGMA) != 0) return NID_magma_ctr; else if ((s->s3.tmp.new_cipher->algorithm_enc & SSL_KUZNYECHIK) != 0) return NID_kuznyechik_ctr; return NID_undef; } int ossl_gost_ukm(const SSL_CONNECTION *s, unsigned char *dgst_buf) { EVP_MD_CTX *hash = NULL; unsigned int md_len; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); const EVP_MD *md = ssl_evp_md_fetch(sctx->libctx, NID_id_GostR3411_2012_256, sctx->propq); if (md == NULL) return 0; if ((hash = EVP_MD_CTX_new()) == NULL || EVP_DigestInit(hash, md) <= 0 || EVP_DigestUpdate(hash, s->s3.client_random, SSL3_RANDOM_SIZE) <= 0 || EVP_DigestUpdate(hash, s->s3.server_random, SSL3_RANDOM_SIZE) <= 0 || EVP_DigestFinal_ex(hash, dgst_buf, &md_len) <= 0) { EVP_MD_CTX_free(hash); ssl_evp_md_free(md); return 0; } EVP_MD_CTX_free(hash); ssl_evp_md_free(md); return 1; } #endif static int tls_construct_cke_gost18(SSL_CONNECTION *s, WPACKET *pkt) { #ifndef OPENSSL_NO_GOST unsigned char rnd_dgst[32]; unsigned char *encdata = NULL; EVP_PKEY_CTX *pkey_ctx = NULL; EVP_PKEY *pkey; unsigned char *pms = NULL; size_t pmslen = 0; size_t msglen; int cipher_nid = ossl_gost18_cke_cipher_nid(s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (cipher_nid == NID_undef) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (ossl_gost_ukm(s, rnd_dgst) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } pmslen = 32; pms = OPENSSL_malloc(pmslen); if (pms == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); goto err; } if (RAND_bytes_ex(sctx->libctx, pms, pmslen, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if ((pkey = tls_get_peer_pkey(s)) == NULL) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); goto err; } pkey_ctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pkey, sctx->propq); if (pkey_ctx == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_PKEY_encrypt_init(pkey_ctx) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; }; if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, EVP_PKEY_OP_ENCRYPT, EVP_PKEY_CTRL_SET_IV, 32, rnd_dgst) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LIBRARY_BUG); goto err; } if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, EVP_PKEY_OP_ENCRYPT, EVP_PKEY_CTRL_CIPHER, cipher_nid, NULL) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_LIBRARY_BUG); goto err; } if (EVP_PKEY_encrypt(pkey_ctx, NULL, &msglen, pms, pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (!WPACKET_allocate_bytes(pkt, msglen, &encdata) || EVP_PKEY_encrypt(pkey_ctx, encdata, &msglen, pms, pmslen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } EVP_PKEY_CTX_free(pkey_ctx); pkey_ctx = NULL; s->s3.tmp.pms = pms; s->s3.tmp.pmslen = pmslen; return 1; err: EVP_PKEY_CTX_free(pkey_ctx); OPENSSL_clear_free(pms, pmslen); return 0; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } static int tls_construct_cke_srp(SSL_CONNECTION *s, WPACKET *pkt) { #ifndef OPENSSL_NO_SRP unsigned char *abytes = NULL; if (s->srp_ctx.A == NULL || !WPACKET_sub_allocate_bytes_u16(pkt, BN_num_bytes(s->srp_ctx.A), &abytes)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } BN_bn2bin(s->srp_ctx.A, abytes); OPENSSL_free(s->session->srp_username); s->session->srp_username = OPENSSL_strdup(s->srp_ctx.login); if (s->session->srp_username == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } return 1; #else SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; #endif } CON_FUNC_RETURN tls_construct_client_key_exchange(SSL_CONNECTION *s, WPACKET *pkt) { unsigned long alg_k; alg_k = s->s3.tmp.new_cipher->algorithm_mkey; if ((alg_k & SSL_PSK) && !tls_construct_cke_psk_preamble(s, pkt)) goto err; if (alg_k & (SSL_kRSA | SSL_kRSAPSK)) { if (!tls_construct_cke_rsa(s, pkt)) goto err; } else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) { if (!tls_construct_cke_dhe(s, pkt)) goto err; } else if (alg_k & (SSL_kECDHE | SSL_kECDHEPSK)) { if (!tls_construct_cke_ecdhe(s, pkt)) goto err; } else if (alg_k & SSL_kGOST) { if (!tls_construct_cke_gost(s, pkt)) goto err; } else if (alg_k & SSL_kGOST18) { if (!tls_construct_cke_gost18(s, pkt)) goto err; } else if (alg_k & SSL_kSRP) { if (!tls_construct_cke_srp(s, pkt)) goto err; } else if (!(alg_k & SSL_kPSK)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } return CON_FUNC_SUCCESS; err: OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); s->s3.tmp.pms = NULL; s->s3.tmp.pmslen = 0; #ifndef OPENSSL_NO_PSK OPENSSL_clear_free(s->s3.tmp.psk, s->s3.tmp.psklen); s->s3.tmp.psk = NULL; s->s3.tmp.psklen = 0; #endif return CON_FUNC_ERROR; } int tls_client_key_exchange_post_work(SSL_CONNECTION *s) { unsigned char *pms = NULL; size_t pmslen = 0; pms = s->s3.tmp.pms; pmslen = s->s3.tmp.pmslen; #ifndef OPENSSL_NO_SRP if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kSRP) { if (!srp_generate_client_master_secret(s)) { goto err; } return 1; } #endif if (pms == NULL && !(s->s3.tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_PASSED_INVALID_ARGUMENT); goto err; } if (!ssl_generate_master_secret(s, pms, pmslen, 1)) { pms = NULL; pmslen = 0; goto err; } pms = NULL; pmslen = 0; #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s)) { unsigned char sctpauthkey[64]; char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)]; size_t labellen; SSL *ssl = SSL_CONNECTION_GET_SSL(s); memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL, sizeof(DTLS1_SCTP_AUTH_LABEL)); labellen = sizeof(labelbuffer) - 1; if (s->mode & SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG) labellen += 1; if (SSL_export_keying_material(ssl, sctpauthkey, sizeof(sctpauthkey), labelbuffer, labellen, NULL, 0, 0) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY, sizeof(sctpauthkey), sctpauthkey); } #endif return 1; err: OPENSSL_clear_free(pms, pmslen); s->s3.tmp.pms = NULL; s->s3.tmp.pmslen = 0; return 0; } static int ssl3_check_client_certificate(SSL_CONNECTION *s) { if (!tls_choose_sigalg(s, 0) || s->s3.tmp.sigalg == NULL) return 0; if (s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT && !tls1_check_chain(s, NULL, NULL, NULL, -2)) return 0; return 1; } WORK_STATE tls_prepare_client_certificate(SSL_CONNECTION *s, WORK_STATE wst) { X509 *x509 = NULL; EVP_PKEY *pkey = NULL; int i; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (wst == WORK_MORE_A) { if (s->cert->cert_cb) { i = s->cert->cert_cb(ssl, s->cert->cert_cb_arg); if (i < 0) { s->rwstate = SSL_X509_LOOKUP; return WORK_MORE_A; } if (i == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_CALLBACK_FAILED); return WORK_ERROR; } s->rwstate = SSL_NOTHING; } if (ssl3_check_client_certificate(s)) { if (s->post_handshake_auth == SSL_PHA_REQUESTED) { return WORK_FINISHED_STOP; } return WORK_FINISHED_CONTINUE; } wst = WORK_MORE_B; } if (wst == WORK_MORE_B) { i = ssl_do_client_cert_cb(s, &x509, &pkey); if (i < 0) { s->rwstate = SSL_X509_LOOKUP; return WORK_MORE_B; } s->rwstate = SSL_NOTHING; if ((i == 1) && (pkey != NULL) && (x509 != NULL)) { if (!SSL_use_certificate(ssl, x509) || !SSL_use_PrivateKey(ssl, pkey)) i = 0; } else if (i == 1) { i = 0; ERR_raise(ERR_LIB_SSL, SSL_R_BAD_DATA_RETURNED_BY_CALLBACK); } X509_free(x509); EVP_PKEY_free(pkey); if (i && !ssl3_check_client_certificate(s)) i = 0; if (i == 0) { if (s->version == SSL3_VERSION) { s->s3.tmp.cert_req = 0; ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_NO_CERTIFICATE); return WORK_FINISHED_CONTINUE; } else { s->s3.tmp.cert_req = 2; s->ext.compress_certificate_from_peer[0] = TLSEXT_comp_cert_none; if (!ssl3_digest_cached_records(s, 0)) { return WORK_ERROR; } } } if (!SSL_CONNECTION_IS_TLS13(s) || (s->options & SSL_OP_NO_TX_CERTIFICATE_COMPRESSION) != 0) s->ext.compress_certificate_from_peer[0] = TLSEXT_comp_cert_none; if (s->post_handshake_auth == SSL_PHA_REQUESTED) return WORK_FINISHED_STOP; return WORK_FINISHED_CONTINUE; } SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; } CON_FUNC_RETURN tls_construct_client_certificate(SSL_CONNECTION *s, WPACKET *pkt) { CERT_PKEY *cpk = NULL; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (SSL_CONNECTION_IS_TLS13(s)) { if (s->pha_context == NULL) { if (!WPACKET_put_bytes_u8(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } else if (!WPACKET_sub_memcpy_u8(pkt, s->pha_context, s->pha_context_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } if (s->s3.tmp.cert_req != 2) cpk = s->cert->key; switch (s->ext.client_cert_type) { case TLSEXT_cert_type_rpk: if (!tls_output_rpk(s, pkt, cpk)) { return CON_FUNC_ERROR; } break; case TLSEXT_cert_type_x509: if (!ssl3_output_cert_chain(s, pkt, cpk, 0)) { return CON_FUNC_ERROR; } break; default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } if (SSL_CONNECTION_IS_TLS13(s) && SSL_IS_FIRST_HANDSHAKE(s) && (s->early_data_state != SSL_EARLY_DATA_NONE || (s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0) && (!ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_CLIENT_WRITE))) { SSLfatal(s, SSL_AD_NO_ALERT, SSL_R_CANNOT_CHANGE_CIPHER); return CON_FUNC_ERROR; } return CON_FUNC_SUCCESS; } #ifndef OPENSSL_NO_COMP_ALG CON_FUNC_RETURN tls_construct_client_compressed_certificate(SSL_CONNECTION *sc, WPACKET *pkt) { SSL *ssl = SSL_CONNECTION_GET_SSL(sc); WPACKET tmppkt; BUF_MEM *buf = NULL; size_t length; size_t max_length; COMP_METHOD *method; COMP_CTX *comp = NULL; int comp_len; int ret = 0; int alg = sc->ext.compress_certificate_from_peer[0]; if ((buf = BUF_MEM_new()) == NULL || !WPACKET_init(&tmppkt, buf)) goto err; if (sc->pha_context == NULL) { if (!WPACKET_put_bytes_u8(&tmppkt, 0)) goto err; } else if (!WPACKET_sub_memcpy_u8(&tmppkt, sc->pha_context, sc->pha_context_len)) goto err; if (!ssl3_output_cert_chain(sc, &tmppkt, sc->cert->key, 0)) { goto out; } if (!WPACKET_put_bytes_u16(pkt, alg) || !WPACKET_get_total_written(&tmppkt, &length) || !WPACKET_put_bytes_u24(pkt, length)) goto err; switch (alg) { case TLSEXT_comp_cert_zlib: method = COMP_zlib_oneshot(); break; case TLSEXT_comp_cert_brotli: method = COMP_brotli_oneshot(); break; case TLSEXT_comp_cert_zstd: method = COMP_zstd_oneshot(); break; default: goto err; } max_length = ossl_calculate_comp_expansion(alg, length); if ((comp = COMP_CTX_new(method)) == NULL || !WPACKET_start_sub_packet_u24(pkt) || !WPACKET_reserve_bytes(pkt, max_length, NULL)) goto err; comp_len = COMP_compress_block(comp, WPACKET_get_curr(pkt), max_length, (unsigned char *)buf->data, length); if (comp_len <= 0) goto err; if (!WPACKET_allocate_bytes(pkt, comp_len, NULL) || !WPACKET_close(pkt)) goto err; if (SSL_IS_FIRST_HANDSHAKE(sc) && (sc->early_data_state != SSL_EARLY_DATA_NONE || (sc->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0) && (!ssl->method->ssl3_enc->change_cipher_state(sc, SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_CLIENT_WRITE))) { SSLfatal(sc, SSL_AD_NO_ALERT, SSL_R_CANNOT_CHANGE_CIPHER); goto out; } ret = 1; goto out; err: SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); out: if (buf != NULL) { WPACKET_cleanup(&tmppkt); } BUF_MEM_free(buf); COMP_CTX_free(comp); return ret; } #endif int ssl3_check_cert_and_algorithm(SSL_CONNECTION *s) { const SSL_CERT_LOOKUP *clu; size_t idx; long alg_k, alg_a; EVP_PKEY *pkey; alg_k = s->s3.tmp.new_cipher->algorithm_mkey; alg_a = s->s3.tmp.new_cipher->algorithm_auth; if (!(alg_a & SSL_aCERT)) return 1; pkey = tls_get_peer_pkey(s); clu = ssl_cert_lookup_by_pkey(pkey, &idx, SSL_CONNECTION_GET_CTX(s)); if (clu == NULL || (alg_a & clu->amask) == 0) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_MISSING_SIGNING_CERT); return 0; } if (alg_k & (SSL_kRSA | SSL_kRSAPSK) && idx != SSL_PKEY_RSA) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_MISSING_RSA_ENCRYPTING_CERT); return 0; } if ((alg_k & SSL_kDHE) && (s->s3.peer_tmp == NULL)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (s->session->peer_rpk != NULL) return 1; if (clu->amask & SSL_aECDSA) { if (ssl_check_srvr_ecc_cert_and_alg(s->session->peer, s)) return 1; SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_BAD_ECC_CERT); return 0; } return 1; } #ifndef OPENSSL_NO_NEXTPROTONEG CON_FUNC_RETURN tls_construct_next_proto(SSL_CONNECTION *s, WPACKET *pkt) { size_t len, padding_len; unsigned char *padding = NULL; len = s->ext.npn_len; padding_len = 32 - ((len + 2) % 32); if (!WPACKET_sub_memcpy_u8(pkt, s->ext.npn, len) || !WPACKET_sub_allocate_bytes_u8(pkt, padding_len, &padding)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } memset(padding, 0, padding_len); return CON_FUNC_SUCCESS; } #endif MSG_PROCESS_RETURN tls_process_hello_req(SSL_CONNECTION *s, PACKET *pkt) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (PACKET_remaining(pkt) > 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return MSG_PROCESS_ERROR; } if ((s->options & SSL_OP_NO_RENEGOTIATION)) { ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_NO_RENEGOTIATION); return MSG_PROCESS_FINISHED_READING; } if (SSL_CONNECTION_IS_DTLS(s)) SSL_renegotiate(ssl); else SSL_renegotiate_abbreviated(ssl); return MSG_PROCESS_FINISHED_READING; } static MSG_PROCESS_RETURN tls_process_encrypted_extensions(SSL_CONNECTION *s, PACKET *pkt) { PACKET extensions; RAW_EXTENSION *rawexts = NULL; if (!PACKET_as_length_prefixed_2(pkt, &extensions) || PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); goto err; } if (!tls_collect_extensions(s, &extensions, SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, &rawexts, NULL, 1) || !tls_parse_all_extensions(s, SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, rawexts, NULL, 0, 1)) { goto err; } OPENSSL_free(rawexts); return MSG_PROCESS_CONTINUE_READING; err: OPENSSL_free(rawexts); return MSG_PROCESS_ERROR; } int ssl_do_client_cert_cb(SSL_CONNECTION *s, X509 **px509, EVP_PKEY **ppkey) { int i = 0; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); #ifndef OPENSSL_NO_ENGINE if (sctx->client_cert_engine) { i = tls_engine_load_ssl_client_cert(s, px509, ppkey); if (i != 0) return i; } #endif if (sctx->client_cert_cb) i = sctx->client_cert_cb(SSL_CONNECTION_GET_SSL(s), px509, ppkey); return i; } int ssl_cipher_list_to_bytes(SSL_CONNECTION *s, STACK_OF(SSL_CIPHER) *sk, WPACKET *pkt) { int i; size_t totlen = 0, len, maxlen, maxverok = 0; int empty_reneg_info_scsv = !s->renegotiate && (SSL_CONNECTION_IS_DTLS(s) || s->min_proto_version < TLS1_3_VERSION); SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (!ssl_set_client_disabled(s)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_PROTOCOLS_AVAILABLE); return 0; } if (sk == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } #ifdef OPENSSL_MAX_TLS1_2_CIPHER_LENGTH # if OPENSSL_MAX_TLS1_2_CIPHER_LENGTH < 6 # error Max cipher length too short # endif if (TLS1_get_version(ssl) >= TLS1_2_VERSION) maxlen = OPENSSL_MAX_TLS1_2_CIPHER_LENGTH & ~1; else #endif maxlen = 0xfffe; if (empty_reneg_info_scsv) maxlen -= 2; if (s->mode & SSL_MODE_SEND_FALLBACK_SCSV) maxlen -= 2; for (i = 0; i < sk_SSL_CIPHER_num(sk) && totlen < maxlen; i++) { const SSL_CIPHER *c; c = sk_SSL_CIPHER_value(sk, i); if (ssl_cipher_disabled(s, c, SSL_SECOP_CIPHER_SUPPORTED, 0)) continue; if (!ssl->method->put_cipher_by_char(c, pkt, &len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!maxverok) { int minproto = SSL_CONNECTION_IS_DTLS(s) ? c->min_dtls : c->min_tls; int maxproto = SSL_CONNECTION_IS_DTLS(s) ? c->max_dtls : c->max_tls; if (ssl_version_cmp(s, maxproto, s->s3.tmp.max_ver) >= 0 && ssl_version_cmp(s, minproto, s->s3.tmp.max_ver) <= 0) maxverok = 1; } totlen += len; } if (totlen == 0 || !maxverok) { const char *maxvertext = !maxverok ? "No ciphers enabled for max supported SSL/TLS version" : NULL; SSLfatal_data(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_CIPHERS_AVAILABLE, maxvertext); return 0; } if (totlen != 0) { if (empty_reneg_info_scsv) { static const SSL_CIPHER scsv = { 0, NULL, NULL, SSL3_CK_SCSV, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; if (!ssl->method->put_cipher_by_char(&scsv, pkt, &len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } if (s->mode & SSL_MODE_SEND_FALLBACK_SCSV) { static const SSL_CIPHER scsv = { 0, NULL, NULL, SSL3_CK_FALLBACK_SCSV, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; if (!ssl->method->put_cipher_by_char(&scsv, pkt, &len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } } return 1; } CON_FUNC_RETURN tls_construct_end_of_early_data(SSL_CONNECTION *s, WPACKET *pkt) { if (s->early_data_state != SSL_EARLY_DATA_WRITE_RETRY && s->early_data_state != SSL_EARLY_DATA_FINISHED_WRITING) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return CON_FUNC_ERROR; } s->early_data_state = SSL_EARLY_DATA_FINISHED_WRITING; return CON_FUNC_SUCCESS; }
statem
openssl/ssl/statem/statem_clnt.c
openssl
#include <openssl/ocsp.h> #include "../ssl_local.h" #include "statem_local.h" #include "internal/cryptlib.h" #define COOKIE_STATE_FORMAT_VERSION 1 #define MAX_COOKIE_SIZE (2 + 2 + 2 + 2 + 2 + 1 + 8 + 2 + EVP_MAX_MD_SIZE + 1 \ + SSL_COOKIE_LENGTH + SHA256_DIGEST_LENGTH) #define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \ + SSL_MAX_SSL_SESSION_ID_LENGTH + 2 + 1 + 2 + 6 + 4 \ + MAX_COOKIE_SIZE) int tls_parse_ctos_renegotiate(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int ilen; const unsigned char *data; int ok; if (!PACKET_get_1(pkt, &ilen) || !PACKET_get_bytes(pkt, &data, ilen)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_RENEGOTIATION_ENCODING_ERR); return 0; } if (ilen != s->s3.previous_client_finished_len) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_RENEGOTIATION_MISMATCH); return 0; } ok = memcmp(data, s->s3.previous_client_finished, s->s3.previous_client_finished_len); #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION if (ok) { if ((data[0] ^ s->s3.previous_client_finished[0]) != 0xFF) { ok = 0; } } #endif if (ok) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_RENEGOTIATION_MISMATCH); return 0; } s->s3.send_connection_binding = 1; return 1; } int tls_parse_ctos_server_name(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int servname_type; PACKET sni, hostname; if (!PACKET_as_length_prefixed_2(pkt, &sni) || PACKET_remaining(&sni) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!PACKET_get_1(&sni, &servname_type) || servname_type != TLSEXT_NAMETYPE_host_name || !PACKET_as_length_prefixed_2(&sni, &hostname)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { if (PACKET_remaining(&hostname) > TLSEXT_MAXLEN_host_name) { SSLfatal(s, SSL_AD_UNRECOGNIZED_NAME, SSL_R_BAD_EXTENSION); return 0; } if (PACKET_contains_zero_byte(&hostname)) { SSLfatal(s, SSL_AD_UNRECOGNIZED_NAME, SSL_R_BAD_EXTENSION); return 0; } OPENSSL_free(s->ext.hostname); s->ext.hostname = NULL; if (!PACKET_strndup(&hostname, &s->ext.hostname)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->servername_done = 1; } else { s->servername_done = (s->session->ext.hostname != NULL) && PACKET_equal(&hostname, s->session->ext.hostname, strlen(s->session->ext.hostname)); } return 1; } int tls_parse_ctos_maxfragmentlen(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned int value; if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!IS_MAX_FRAGMENT_LENGTH_EXT_VALID(value)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH); return 0; } if (s->hit && s->session->ext.max_fragment_len_mode != value) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH); return 0; } s->session->ext.max_fragment_len_mode = value; return 1; } #ifndef OPENSSL_NO_SRP int tls_parse_ctos_srp(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET srp_I; if (!PACKET_as_length_prefixed_1(pkt, &srp_I) || PACKET_contains_zero_byte(&srp_I)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!PACKET_strndup(&srp_I, &s->srp_ctx.login)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } #endif int tls_parse_ctos_ec_pt_formats(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET ec_point_format_list; if (!PACKET_as_length_prefixed_1(pkt, &ec_point_format_list) || PACKET_remaining(&ec_point_format_list) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->hit) { if (!PACKET_memdup(&ec_point_format_list, &s->ext.peer_ecpointformats, &s->ext.peer_ecpointformats_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } return 1; } int tls_parse_ctos_session_ticket(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->ext.session_ticket_cb && !s->ext.session_ticket_cb(SSL_CONNECTION_GET_SSL(s), PACKET_data(pkt), PACKET_remaining(pkt), s->ext.session_ticket_cb_arg)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } int tls_parse_ctos_sig_algs_cert(SSL_CONNECTION *s, PACKET *pkt, ossl_unused unsigned int context, ossl_unused X509 *x, ossl_unused size_t chainidx) { PACKET supported_sig_algs; if (!PACKET_as_length_prefixed_2(pkt, &supported_sig_algs) || PACKET_remaining(&supported_sig_algs) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 1)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } return 1; } int tls_parse_ctos_sig_algs(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET supported_sig_algs; if (!PACKET_as_length_prefixed_2(pkt, &supported_sig_algs) || PACKET_remaining(&supported_sig_algs) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->hit && !tls1_save_sigalgs(s, &supported_sig_algs, 0)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } return 1; } #ifndef OPENSSL_NO_OCSP int tls_parse_ctos_status_request(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET responder_id_list, exts; if (s->hit) return 1; if (x != NULL) return 1; if (!PACKET_get_1(pkt, (unsigned int *)&s->ext.status_type)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp) { s->ext.status_type = TLSEXT_STATUSTYPE_nothing; return 1; } if (!PACKET_get_length_prefixed_2 (pkt, &responder_id_list)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); if (PACKET_remaining(&responder_id_list) > 0) { s->ext.ocsp.ids = sk_OCSP_RESPID_new_null(); if (s->ext.ocsp.ids == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return 0; } } else { s->ext.ocsp.ids = NULL; } while (PACKET_remaining(&responder_id_list) > 0) { OCSP_RESPID *id; PACKET responder_id; const unsigned char *id_data; if (!PACKET_get_length_prefixed_2(&responder_id_list, &responder_id) || PACKET_remaining(&responder_id) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } id_data = PACKET_data(&responder_id); id = d2i_OCSP_RESPID(NULL, &id_data, (int)PACKET_remaining(&responder_id)); if (id == NULL) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (id_data != PACKET_end(&responder_id)) { OCSP_RESPID_free(id); SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) { OCSP_RESPID_free(id); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } if (!PACKET_as_length_prefixed_2(pkt, &exts)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (PACKET_remaining(&exts) > 0) { const unsigned char *ext_data = PACKET_data(&exts); sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, X509_EXTENSION_free); s->ext.ocsp.exts = d2i_X509_EXTENSIONS(NULL, &ext_data, (int)PACKET_remaining(&exts)); if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } } return 1; } #endif #ifndef OPENSSL_NO_NEXTPROTONEG int tls_parse_ctos_npn(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (SSL_IS_FIRST_HANDSHAKE(s)) s->s3.npn_seen = 1; return 1; } #endif int tls_parse_ctos_alpn(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET protocol_list, save_protocol_list, protocol; if (!SSL_IS_FIRST_HANDSHAKE(s)) return 1; if (!PACKET_as_length_prefixed_2(pkt, &protocol_list) || PACKET_remaining(&protocol_list) < 2) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } save_protocol_list = protocol_list; do { if (!PACKET_get_length_prefixed_1(&protocol_list, &protocol) || PACKET_remaining(&protocol) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } } while (PACKET_remaining(&protocol_list) != 0); OPENSSL_free(s->s3.alpn_proposed); s->s3.alpn_proposed = NULL; s->s3.alpn_proposed_len = 0; if (!PACKET_memdup(&save_protocol_list, &s->s3.alpn_proposed, &s->s3.alpn_proposed_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } #ifndef OPENSSL_NO_SRTP int tls_parse_ctos_use_srtp(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { STACK_OF(SRTP_PROTECTION_PROFILE) *srvr; unsigned int ct, mki_len, id; int i, srtp_pref; PACKET subpkt; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (SSL_get_srtp_profiles(ssl) == NULL) return 1; if (!PACKET_get_net_2(pkt, &ct) || (ct & 1) != 0 || !PACKET_get_sub_packet(pkt, &subpkt, ct)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); return 0; } srvr = SSL_get_srtp_profiles(ssl); s->srtp_profile = NULL; srtp_pref = sk_SRTP_PROTECTION_PROFILE_num(srvr); while (PACKET_remaining(&subpkt)) { if (!PACKET_get_net_2(&subpkt, &id)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); return 0; } for (i = 0; i < srtp_pref; i++) { SRTP_PROTECTION_PROFILE *sprof = sk_SRTP_PROTECTION_PROFILE_value(srvr, i); if (sprof->id == id) { s->srtp_profile = sprof; srtp_pref = i; break; } } } if (!PACKET_get_1(pkt, &mki_len)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); return 0; } if (!PACKET_forward(pkt, mki_len) || PACKET_remaining(pkt)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRTP_MKI_VALUE); return 0; } return 1; } #endif int tls_parse_ctos_etm(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!(s->options & SSL_OP_NO_ENCRYPT_THEN_MAC)) s->ext.use_etm = 1; return 1; } int tls_parse_ctos_psk_kex_modes(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 PACKET psk_kex_modes; unsigned int mode; if (!PACKET_as_length_prefixed_1(pkt, &psk_kex_modes) || PACKET_remaining(&psk_kex_modes) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } while (PACKET_get_1(&psk_kex_modes, &mode)) { if (mode == TLSEXT_KEX_MODE_KE_DHE) s->ext.psk_kex_mode |= TLSEXT_KEX_MODE_FLAG_KE_DHE; else if (mode == TLSEXT_KEX_MODE_KE && (s->options & SSL_OP_ALLOW_NO_DHE_KEX) != 0) s->ext.psk_kex_mode |= TLSEXT_KEX_MODE_FLAG_KE; } if (((s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE) != 0) && (s->options & SSL_OP_PREFER_NO_DHE_KEX) != 0) { s->ext.psk_kex_mode = TLSEXT_KEX_MODE_FLAG_KE; } #endif return 1; } int tls_parse_ctos_key_share(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 unsigned int group_id; PACKET key_share_list, encoded_pt; const uint16_t *clntgroups, *srvrgroups; size_t clnt_num_groups, srvr_num_groups; int found = 0; if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) return 1; if (s->s3.peer_tmp != NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!PACKET_as_length_prefixed_2(pkt, &key_share_list)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } tls1_get_supported_groups(s, &srvrgroups, &srvr_num_groups); tls1_get_peer_groups(s, &clntgroups, &clnt_num_groups); if (clnt_num_groups == 0) { SSLfatal(s, SSL_AD_MISSING_EXTENSION, SSL_R_MISSING_SUPPORTED_GROUPS_EXTENSION); return 0; } if (s->s3.group_id != 0 && PACKET_remaining(&key_share_list) == 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE); return 0; } while (PACKET_remaining(&key_share_list) > 0) { if (!PACKET_get_net_2(&key_share_list, &group_id) || !PACKET_get_length_prefixed_2(&key_share_list, &encoded_pt) || PACKET_remaining(&encoded_pt) == 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (found) continue; if (s->s3.group_id != 0 && (group_id != s->s3.group_id || PACKET_remaining(&key_share_list) != 0)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE); return 0; } if (!check_in_list(s, group_id, clntgroups, clnt_num_groups, 0)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE); return 0; } if (!check_in_list(s, group_id, srvrgroups, srvr_num_groups, 1) || !tls_group_allowed(s, group_id, SSL_SECOP_CURVE_SUPPORTED) || !tls_valid_group(s, group_id, TLS1_3_VERSION, TLS1_3_VERSION, 0, NULL)) { continue; } s->s3.group_id = group_id; s->session->kex_group = group_id; if ((s->s3.peer_tmp = ssl_generate_param_group(s, group_id)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS); return 0; } if (tls13_set_encoded_pub_key(s->s3.peer_tmp, PACKET_data(&encoded_pt), PACKET_remaining(&encoded_pt)) <= 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_ECPOINT); return 0; } found = 1; } #endif return 1; } int tls_parse_ctos_cookie(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 unsigned int format, version, key_share, group_id; EVP_MD_CTX *hctx; EVP_PKEY *pkey; PACKET cookie, raw, chhash, appcookie; WPACKET hrrpkt; const unsigned char *data, *mdin, *ciphdata; unsigned char hmac[SHA256_DIGEST_LENGTH]; unsigned char hrr[MAX_HRR_SIZE]; size_t rawlen, hmaclen, hrrlen, ciphlen; uint64_t tm, now; SSL *ssl = SSL_CONNECTION_GET_SSL(s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (sctx->verify_stateless_cookie_cb == NULL || (s->s3.flags & TLS1_FLAGS_STATELESS) == 0) return 1; if (!PACKET_as_length_prefixed_2(pkt, &cookie)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } raw = cookie; data = PACKET_data(&raw); rawlen = PACKET_remaining(&raw); if (rawlen < SHA256_DIGEST_LENGTH || !PACKET_forward(&raw, rawlen - SHA256_DIGEST_LENGTH)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } mdin = PACKET_data(&raw); hctx = EVP_MD_CTX_create(); pkey = EVP_PKEY_new_raw_private_key_ex(sctx->libctx, "HMAC", sctx->propq, s->session_ctx->ext.cookie_hmac_key, sizeof(s->session_ctx->ext.cookie_hmac_key)); if (hctx == NULL || pkey == NULL) { EVP_MD_CTX_free(hctx); EVP_PKEY_free(pkey); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } hmaclen = SHA256_DIGEST_LENGTH; if (EVP_DigestSignInit_ex(hctx, NULL, "SHA2-256", sctx->libctx, sctx->propq, pkey, NULL) <= 0 || EVP_DigestSign(hctx, hmac, &hmaclen, data, rawlen - SHA256_DIGEST_LENGTH) <= 0 || hmaclen != SHA256_DIGEST_LENGTH) { EVP_MD_CTX_free(hctx); EVP_PKEY_free(pkey); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } EVP_MD_CTX_free(hctx); EVP_PKEY_free(pkey); if (CRYPTO_memcmp(hmac, mdin, SHA256_DIGEST_LENGTH) != 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_COOKIE_MISMATCH); return 0; } if (!PACKET_get_net_2(&cookie, &format)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (format != COOKIE_STATE_FORMAT_VERSION) return 1; if (!PACKET_get_net_2(&cookie, &version)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (version != TLS1_3_VERSION) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_PROTOCOL_VERSION_NUMBER); return 0; } if (!PACKET_get_net_2(&cookie, &group_id)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } ciphdata = PACKET_data(&cookie); if (!PACKET_forward(&cookie, 2)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } if (group_id != s->s3.group_id || s->s3.tmp.new_cipher != ssl_get_cipher_by_char(s, ciphdata, 0)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_CIPHER); return 0; } if (!PACKET_get_1(&cookie, &key_share) || !PACKET_get_net_8(&cookie, &tm) || !PACKET_get_length_prefixed_2(&cookie, &chhash) || !PACKET_get_length_prefixed_1(&cookie, &appcookie) || PACKET_remaining(&cookie) != SHA256_DIGEST_LENGTH) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH); return 0; } now = time(NULL); if (tm > now || (now - tm) > 600) { return 1; } if (sctx->verify_stateless_cookie_cb(ssl, PACKET_data(&appcookie), PACKET_remaining(&appcookie)) == 0) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_COOKIE_MISMATCH); return 0; } if (!WPACKET_init_static_len(&hrrpkt, hrr, sizeof(hrr), 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!WPACKET_put_bytes_u8(&hrrpkt, SSL3_MT_SERVER_HELLO) || !WPACKET_start_sub_packet_u24(&hrrpkt) || !WPACKET_put_bytes_u16(&hrrpkt, TLS1_2_VERSION) || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE) || !WPACKET_sub_memcpy_u8(&hrrpkt, s->tmp_session_id, s->tmp_session_id_len) || !ssl->method->put_cipher_by_char(s->s3.tmp.new_cipher, &hrrpkt, &ciphlen) || !WPACKET_put_bytes_u8(&hrrpkt, 0) || !WPACKET_start_sub_packet_u16(&hrrpkt)) { WPACKET_cleanup(&hrrpkt); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!WPACKET_put_bytes_u16(&hrrpkt, TLSEXT_TYPE_supported_versions) || !WPACKET_start_sub_packet_u16(&hrrpkt) || !WPACKET_put_bytes_u16(&hrrpkt, s->version) || !WPACKET_close(&hrrpkt)) { WPACKET_cleanup(&hrrpkt); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (key_share) { if (!WPACKET_put_bytes_u16(&hrrpkt, TLSEXT_TYPE_key_share) || !WPACKET_start_sub_packet_u16(&hrrpkt) || !WPACKET_put_bytes_u16(&hrrpkt, s->s3.group_id) || !WPACKET_close(&hrrpkt)) { WPACKET_cleanup(&hrrpkt); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } if (!WPACKET_put_bytes_u16(&hrrpkt, TLSEXT_TYPE_cookie) || !WPACKET_start_sub_packet_u16(&hrrpkt) || !WPACKET_sub_memcpy_u16(&hrrpkt, data, rawlen) || !WPACKET_close(&hrrpkt) || !WPACKET_close(&hrrpkt) || !WPACKET_close(&hrrpkt) || !WPACKET_get_total_written(&hrrpkt, &hrrlen) || !WPACKET_finish(&hrrpkt)) { WPACKET_cleanup(&hrrpkt); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!create_synthetic_message_hash(s, PACKET_data(&chhash), PACKET_remaining(&chhash), hrr, hrrlen)) { return 0; } s->hello_retry_request = SSL_HRR_PENDING; s->ext.cookieok = 1; #endif return 1; } int tls_parse_ctos_supported_groups(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET supported_groups_list; if (!PACKET_as_length_prefixed_2(pkt, &supported_groups_list) || PACKET_remaining(&supported_groups_list) == 0 || (PACKET_remaining(&supported_groups_list) % 2) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { OPENSSL_free(s->ext.peer_supportedgroups); s->ext.peer_supportedgroups = NULL; s->ext.peer_supportedgroups_len = 0; if (!tls1_save_u16(&supported_groups_list, &s->ext.peer_supportedgroups, &s->ext.peer_supportedgroups_len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } return 1; } int tls_parse_ctos_ems(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (s->options & SSL_OP_NO_EXTENDED_MASTER_SECRET) return 1; s->s3.flags |= TLS1_FLAGS_RECEIVED_EXTMS; return 1; } int tls_parse_ctos_early_data(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (s->hello_retry_request != SSL_HRR_NONE) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_EXTENSION); return 0; } return 1; } static SSL_TICKET_STATUS tls_get_stateful_ticket(SSL_CONNECTION *s, PACKET *tick, SSL_SESSION **sess) { SSL_SESSION *tmpsess = NULL; s->ext.ticket_expected = 1; switch (PACKET_remaining(tick)) { case 0: return SSL_TICKET_EMPTY; case SSL_MAX_SSL_SESSION_ID_LENGTH: break; default: return SSL_TICKET_NO_DECRYPT; } tmpsess = lookup_sess_in_cache(s, PACKET_data(tick), SSL_MAX_SSL_SESSION_ID_LENGTH); if (tmpsess == NULL) return SSL_TICKET_NO_DECRYPT; *sess = tmpsess; return SSL_TICKET_SUCCESS; } int tls_parse_ctos_psk(SSL_CONNECTION *s, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET identities, binders, binder; size_t binderoffset, hashsize; SSL_SESSION *sess = NULL; unsigned int id, i, ext = 0; const EVP_MD *md = NULL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); SSL *ssl = SSL_CONNECTION_GET_SSL(s); if ((s->ext.psk_kex_mode & (TLSEXT_KEX_MODE_FLAG_KE | TLSEXT_KEX_MODE_FLAG_KE_DHE)) == 0) return 1; if (!PACKET_get_length_prefixed_2(pkt, &identities)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } s->ext.ticket_expected = 0; for (id = 0; PACKET_remaining(&identities) != 0; id++) { PACKET identity; unsigned long ticket_agel; size_t idlen; if (!PACKET_get_length_prefixed_2(&identities, &identity) || !PACKET_get_net_4(&identities, &ticket_agel)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } idlen = PACKET_remaining(&identity); if (s->psk_find_session_cb != NULL && !s->psk_find_session_cb(ssl, PACKET_data(&identity), idlen, &sess)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_EXTENSION); return 0; } #ifndef OPENSSL_NO_PSK if (sess == NULL && s->psk_server_callback != NULL && idlen <= PSK_MAX_IDENTITY_LEN) { char *pskid = NULL; unsigned char pskdata[PSK_MAX_PSK_LEN]; unsigned int pskdatalen; if (!PACKET_strndup(&identity, &pskid)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } pskdatalen = s->psk_server_callback(ssl, pskid, pskdata, sizeof(pskdata)); OPENSSL_free(pskid); if (pskdatalen > PSK_MAX_PSK_LEN) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } else if (pskdatalen > 0) { const SSL_CIPHER *cipher; const unsigned char tls13_aes128gcmsha256_id[] = { 0x13, 0x01 }; cipher = SSL_CIPHER_find(ssl, tls13_aes128gcmsha256_id); if (cipher == NULL) { OPENSSL_cleanse(pskdata, pskdatalen); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } sess = SSL_SESSION_new(); if (sess == NULL || !SSL_SESSION_set1_master_key(sess, pskdata, pskdatalen) || !SSL_SESSION_set_cipher(sess, cipher) || !SSL_SESSION_set_protocol_version(sess, TLS1_3_VERSION)) { OPENSSL_cleanse(pskdata, pskdatalen); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } OPENSSL_cleanse(pskdata, pskdatalen); } } #endif if (sess != NULL) { SSL_SESSION *sesstmp = ssl_session_dup(sess, 0); if (sesstmp == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } SSL_SESSION_free(sess); sess = sesstmp; memcpy(sess->sid_ctx, s->sid_ctx, s->sid_ctx_length); sess->sid_ctx_length = s->sid_ctx_length; ext = 1; if (id == 0) s->ext.early_data_ok = 1; s->ext.ticket_expected = 1; } else { OSSL_TIME t, age, expire; int ret; if ((s->options & SSL_OP_NO_TICKET) != 0 || (s->max_early_data > 0 && (s->options & SSL_OP_NO_ANTI_REPLAY) == 0)) ret = tls_get_stateful_ticket(s, &identity, &sess); else ret = tls_decrypt_ticket(s, PACKET_data(&identity), PACKET_remaining(&identity), NULL, 0, &sess); if (ret == SSL_TICKET_EMPTY) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (ret == SSL_TICKET_FATAL_ERR_MALLOC || ret == SSL_TICKET_FATAL_ERR_OTHER) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (ret == SSL_TICKET_NONE || ret == SSL_TICKET_NO_DECRYPT) continue; if (s->max_early_data > 0 && (s->options & SSL_OP_NO_ANTI_REPLAY) == 0 && !SSL_CTX_remove_session(s->session_ctx, sess)) { SSL_SESSION_free(sess); sess = NULL; continue; } age = ossl_time_subtract(ossl_ms2time(ticket_agel), ossl_ms2time(sess->ext.tick_age_add)); t = ossl_time_subtract(ossl_time_now(), sess->time); expire = ossl_time_add(t, ossl_ms2time(1000)); if (id == 0 && ossl_time_compare(sess->timeout, t) >= 0 && ossl_time_compare(age, expire) <= 0 && ossl_time_compare(ossl_time_add(age, TICKET_AGE_ALLOWANCE), expire) >= 0) { s->ext.early_data_ok = 1; } } md = ssl_md(sctx, sess->cipher->algorithm2); if (md == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!EVP_MD_is_a(md, EVP_MD_get0_name(ssl_md(sctx, s->s3.tmp.new_cipher->algorithm2)))) { SSL_SESSION_free(sess); sess = NULL; s->ext.early_data_ok = 0; s->ext.ticket_expected = 0; continue; } break; } if (sess == NULL) return 1; binderoffset = PACKET_data(pkt) - (const unsigned char *)s->init_buf->data; hashsize = EVP_MD_get_size(md); if (!PACKET_get_length_prefixed_2(pkt, &binders)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); goto err; } for (i = 0; i <= id; i++) { if (!PACKET_get_length_prefixed_1(&binders, &binder)) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); goto err; } } if (PACKET_remaining(&binder) != hashsize) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); goto err; } if (tls_psk_do_binder(s, md, (const unsigned char *)s->init_buf->data, binderoffset, PACKET_data(&binder), NULL, sess, 0, ext) != 1) { goto err; } s->ext.tick_identity = id; SSL_SESSION_free(s->session); s->session = sess; return 1; err: SSL_SESSION_free(sess); return 0; } int tls_parse_ctos_post_handshake_auth(SSL_CONNECTION *s, PACKET *pkt, ossl_unused unsigned int context, ossl_unused X509 *x, ossl_unused size_t chainidx) { if (PACKET_remaining(pkt) != 0) { SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_POST_HANDSHAKE_AUTH_ENCODING_ERR); return 0; } s->post_handshake_auth = SSL_PHA_EXT_RECEIVED; return 1; } EXT_RETURN tls_construct_stoc_renegotiate(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!s->s3.send_connection_binding) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_renegotiate) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u8(pkt) || !WPACKET_memcpy(pkt, s->s3.previous_client_finished, s->s3.previous_client_finished_len) || !WPACKET_memcpy(pkt, s->s3.previous_server_finished, s->s3.previous_server_finished_len) || !WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_server_name(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->servername_done != 1) return EXT_RETURN_NOT_SENT; if (s->hit && !SSL_CONNECTION_IS_TLS13(s)) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_name) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_maxfragmentlen(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!USE_MAX_FRAGMENT_LENGTH_EXT(s->session)) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_max_fragment_length) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u8(pkt, s->session->ext.max_fragment_len_mode) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_ec_pt_formats(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey; unsigned long alg_a = s->s3.tmp.new_cipher->algorithm_auth; int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA)) && (s->ext.peer_ecpointformats != NULL); const unsigned char *plist; size_t plistlen; if (!using_ecc) return EXT_RETURN_NOT_SENT; tls1_get_formatlist(s, &plist, &plistlen); if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_ec_point_formats) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u8(pkt, plist, plistlen) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_supported_groups(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { const uint16_t *groups; size_t numgroups, i, first = 1; int version; if (s->s3.group_id == 0) return EXT_RETURN_NOT_SENT; tls1_get_supported_groups(s, &groups, &numgroups); if (numgroups == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } version = SSL_version(SSL_CONNECTION_GET_SSL(s)); for (i = 0; i < numgroups; i++) { uint16_t group = groups[i]; if (tls_valid_group(s, group, version, version, 0, NULL) && tls_group_allowed(s, group, SSL_SECOP_CURVE_SUPPORTED)) { if (first) { if (s->s3.group_id == group) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_groups) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } first = 0; } if (!WPACKET_put_bytes_u16(pkt, group)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } } } if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_session_ticket(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!s->ext.ticket_expected || !tls_use_ticket(s)) { s->ext.ticket_expected = 0; return EXT_RETURN_NOT_SENT; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_session_ticket) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #ifndef OPENSSL_NO_OCSP EXT_RETURN tls_construct_stoc_status_request(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) return EXT_RETURN_NOT_SENT; if (!s->ext.status_expected) return EXT_RETURN_NOT_SENT; if (SSL_CONNECTION_IS_TLS13(s) && chainidx != 0) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_status_request) || !WPACKET_start_sub_packet_u16(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (SSL_CONNECTION_IS_TLS13(s) && !tls_construct_cert_status_body(s, pkt)) { return EXT_RETURN_FAIL; } if (!WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #endif #ifndef OPENSSL_NO_NEXTPROTONEG EXT_RETURN tls_construct_stoc_next_proto_neg(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { const unsigned char *npa; unsigned int npalen; int ret; int npn_seen = s->s3.npn_seen; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); s->s3.npn_seen = 0; if (!npn_seen || sctx->ext.npn_advertised_cb == NULL) return EXT_RETURN_NOT_SENT; ret = sctx->ext.npn_advertised_cb(SSL_CONNECTION_GET_SSL(s), &npa, &npalen, sctx->ext.npn_advertised_cb_arg); if (ret == SSL_TLSEXT_ERR_OK) { if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_next_proto_neg) || !WPACKET_sub_memcpy_u16(pkt, npa, npalen)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } s->s3.npn_seen = 1; } return EXT_RETURN_SENT; } #endif EXT_RETURN tls_construct_stoc_alpn(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->s3.alpn_selected == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_application_layer_protocol_negotiation) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_sub_memcpy_u8(pkt, s->s3.alpn_selected, s->s3.alpn_selected_len) || !WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #ifndef OPENSSL_NO_SRTP EXT_RETURN tls_construct_stoc_use_srtp(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (s->srtp_profile == NULL) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_use_srtp) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u16(pkt, 2) || !WPACKET_put_bytes_u16(pkt, s->srtp_profile->id) || !WPACKET_put_bytes_u8(pkt, 0) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } #endif EXT_RETURN tls_construct_stoc_etm(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!s->ext.use_etm) return EXT_RETURN_NOT_SENT; if (s->s3.tmp.new_cipher->algorithm_mac == SSL_AEAD || s->s3.tmp.new_cipher->algorithm_enc == SSL_RC4 || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT12 || s->s3.tmp.new_cipher->algorithm_enc == SSL_MAGMA || s->s3.tmp.new_cipher->algorithm_enc == SSL_KUZNYECHIK) { s->ext.use_etm = 0; return EXT_RETURN_NOT_SENT; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_encrypt_then_mac) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_ems(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if ((s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) == 0) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_extended_master_secret) || !WPACKET_put_bytes_u16(pkt, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_supported_versions(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!ossl_assert(SSL_CONNECTION_IS_TLS13(s))) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_versions) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u16(pkt, s->version) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_key_share(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 unsigned char *encodedPoint; size_t encoded_pt_len = 0; EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; const TLS_GROUP_INFO *ginf = NULL; if (s->hello_retry_request == SSL_HRR_PENDING) { if (ckey != NULL) { return EXT_RETURN_NOT_SENT; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_key_share) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u16(pkt, s->s3.group_id) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } if (ckey == NULL) { if (!s->hit || !tls13_generate_handshake_secret(s, NULL, 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_NOT_SENT; } if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) { return EXT_RETURN_NOT_SENT; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_key_share) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if ((ginf = tls1_group_id_lookup(SSL_CONNECTION_GET_CTX(s), s->s3.group_id)) == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (!ginf->is_kem) { skey = ssl_generate_pkey(s, ckey); if (skey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB); return EXT_RETURN_FAIL; } encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint); if (encoded_pt_len == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EC_LIB); EVP_PKEY_free(skey); return EXT_RETURN_FAIL; } if (!WPACKET_sub_memcpy_u16(pkt, encodedPoint, encoded_pt_len) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); EVP_PKEY_free(skey); OPENSSL_free(encodedPoint); return EXT_RETURN_FAIL; } OPENSSL_free(encodedPoint); s->s3.tmp.pkey = skey; if (ssl_derive(s, skey, ckey, 1) == 0) { return EXT_RETURN_FAIL; } } else { unsigned char *ct = NULL; size_t ctlen = 0; if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) { return EXT_RETURN_FAIL; } if (ctlen == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); OPENSSL_free(ct); return EXT_RETURN_FAIL; } if (!WPACKET_sub_memcpy_u16(pkt, ct, ctlen) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); OPENSSL_free(ct); return EXT_RETURN_FAIL; } OPENSSL_free(ct); if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) { return EXT_RETURN_FAIL; } } s->s3.did_kex = 1; return EXT_RETURN_SENT; #else return EXT_RETURN_FAIL; #endif } EXT_RETURN tls_construct_stoc_cookie(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { #ifndef OPENSSL_NO_TLS1_3 unsigned char *hashval1, *hashval2, *appcookie1, *appcookie2, *cookie; unsigned char *hmac, *hmac2; size_t startlen, ciphlen, totcookielen, hashlen, hmaclen, appcookielen; EVP_MD_CTX *hctx; EVP_PKEY *pkey; int ret = EXT_RETURN_FAIL; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); SSL *ssl = SSL_CONNECTION_GET_SSL(s); if ((s->s3.flags & TLS1_FLAGS_STATELESS) == 0) return EXT_RETURN_NOT_SENT; if (sctx->gen_stateless_cookie_cb == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_COOKIE_CALLBACK_SET); return EXT_RETURN_FAIL; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_cookie) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_get_total_written(pkt, &startlen) || !WPACKET_reserve_bytes(pkt, MAX_COOKIE_SIZE, &cookie) || !WPACKET_put_bytes_u16(pkt, COOKIE_STATE_FORMAT_VERSION) || !WPACKET_put_bytes_u16(pkt, TLS1_3_VERSION) || !WPACKET_put_bytes_u16(pkt, s->s3.group_id) || !ssl->method->put_cipher_by_char(s->s3.tmp.new_cipher, pkt, &ciphlen) || !WPACKET_put_bytes_u8(pkt, s->s3.peer_tmp == NULL) || !WPACKET_put_bytes_u64(pkt, time(NULL)) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_reserve_bytes(pkt, EVP_MAX_MD_SIZE, &hashval1)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (!ssl3_digest_cached_records(s, 0) || !ssl_handshake_hash(s, hashval1, EVP_MAX_MD_SIZE, &hashlen)) { return EXT_RETURN_FAIL; } if (!WPACKET_allocate_bytes(pkt, hashlen, &hashval2) || !ossl_assert(hashval1 == hashval2) || !WPACKET_close(pkt) || !WPACKET_start_sub_packet_u8(pkt) || !WPACKET_reserve_bytes(pkt, SSL_COOKIE_LENGTH, &appcookie1)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } if (sctx->gen_stateless_cookie_cb(ssl, appcookie1, &appcookielen) == 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_COOKIE_GEN_CALLBACK_FAILURE); return EXT_RETURN_FAIL; } if (!WPACKET_allocate_bytes(pkt, appcookielen, &appcookie2) || !ossl_assert(appcookie1 == appcookie2) || !WPACKET_close(pkt) || !WPACKET_get_total_written(pkt, &totcookielen) || !WPACKET_reserve_bytes(pkt, SHA256_DIGEST_LENGTH, &hmac)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } hmaclen = SHA256_DIGEST_LENGTH; totcookielen -= startlen; if (!ossl_assert(totcookielen <= MAX_COOKIE_SIZE - SHA256_DIGEST_LENGTH)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } hctx = EVP_MD_CTX_create(); pkey = EVP_PKEY_new_raw_private_key_ex(sctx->libctx, "HMAC", sctx->propq, s->session_ctx->ext.cookie_hmac_key, sizeof(s->session_ctx->ext.cookie_hmac_key)); if (hctx == NULL || pkey == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); goto err; } if (EVP_DigestSignInit_ex(hctx, NULL, "SHA2-256", sctx->libctx, sctx->propq, pkey, NULL) <= 0 || EVP_DigestSign(hctx, hmac, &hmaclen, cookie, totcookielen) <= 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!ossl_assert(totcookielen + hmaclen <= MAX_COOKIE_SIZE)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!WPACKET_allocate_bytes(pkt, hmaclen, &hmac2) || !ossl_assert(hmac == hmac2) || !ossl_assert(cookie == hmac - totcookielen) || !WPACKET_close(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } ret = EXT_RETURN_SENT; err: EVP_MD_CTX_free(hctx); EVP_PKEY_free(pkey); return ret; #else return EXT_RETURN_FAIL; #endif } EXT_RETURN tls_construct_stoc_cryptopro_bug(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { const unsigned char cryptopro_ext[36] = { 0xfd, 0xe8, 0x00, 0x20, 0x30, 0x1e, 0x30, 0x08, 0x06, 0x06, 0x2a, 0x85, 0x03, 0x02, 0x02, 0x09, 0x30, 0x08, 0x06, 0x06, 0x2a, 0x85, 0x03, 0x02, 0x02, 0x16, 0x30, 0x08, 0x06, 0x06, 0x2a, 0x85, 0x03, 0x02, 0x02, 0x17 }; if (((s->s3.tmp.new_cipher->id & 0xFFFF) != 0x80 && (s->s3.tmp.new_cipher->id & 0xFFFF) != 0x81) || (SSL_get_options(SSL_CONNECTION_GET_SSL(s)) & SSL_OP_CRYPTOPRO_TLSEXT_BUG) == 0) return EXT_RETURN_NOT_SENT; if (!WPACKET_memcpy(pkt, cryptopro_ext, sizeof(cryptopro_ext))) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_early_data(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (context == SSL_EXT_TLS1_3_NEW_SESSION_TICKET) { if (s->max_early_data == 0) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_early_data) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u32(pkt, s->max_early_data) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_early_data) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_psk(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (!s->hit) return EXT_RETURN_NOT_SENT; if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u16(pkt, s->ext.tick_identity) || !WPACKET_close(pkt)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } EXT_RETURN tls_construct_stoc_client_cert_type(SSL_CONNECTION *sc, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (sc->ext.client_cert_type_ctos == OSSL_CERT_TYPE_CTOS_ERROR && (send_certificate_request(sc) || sc->post_handshake_auth == SSL_PHA_EXT_RECEIVED)) { SSLfatal(sc, SSL_AD_UNSUPPORTED_CERTIFICATE, SSL_R_BAD_EXTENSION); return EXT_RETURN_FAIL; } if (sc->ext.client_cert_type == TLSEXT_cert_type_x509) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; return EXT_RETURN_NOT_SENT; } if ((!send_certificate_request(sc) && sc->post_handshake_auth != SSL_PHA_EXT_RECEIVED) || sc->ext.client_cert_type_ctos != OSSL_CERT_TYPE_CTOS_GOOD || sc->client_cert_type == NULL) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; sc->ext.client_cert_type = TLSEXT_cert_type_x509; return EXT_RETURN_NOT_SENT; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_client_cert_type) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u8(pkt, sc->ext.client_cert_type) || !WPACKET_close(pkt)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } static int reconcile_cert_type(const unsigned char *pref, size_t pref_len, const unsigned char *other, size_t other_len, uint8_t *chosen_cert_type) { size_t i; for (i = 0; i < pref_len; i++) { if (memchr(other, pref[i], other_len) != NULL) { *chosen_cert_type = pref[i]; return OSSL_CERT_TYPE_CTOS_GOOD; } } return OSSL_CERT_TYPE_CTOS_ERROR; } int tls_parse_ctos_client_cert_type(SSL_CONNECTION *sc, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET supported_cert_types; const unsigned char *data; size_t len; if (sc->client_cert_type == NULL) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; sc->ext.client_cert_type = TLSEXT_cert_type_x509; return 1; } if (!PACKET_as_length_prefixed_1(pkt, &supported_cert_types)) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_ERROR; SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if ((len = PACKET_remaining(&supported_cert_types)) == 0) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_ERROR; SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!PACKET_get_bytes(&supported_cert_types, &data, len)) { sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_ERROR; SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } sc->ext.client_cert_type_ctos = reconcile_cert_type(data, len, sc->client_cert_type, sc->client_cert_type_len, &sc->ext.client_cert_type); return 1; } EXT_RETURN tls_construct_stoc_server_cert_type(SSL_CONNECTION *sc, WPACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { if (sc->ext.server_cert_type == TLSEXT_cert_type_x509) { sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; return EXT_RETURN_NOT_SENT; } if (sc->ext.server_cert_type_ctos != OSSL_CERT_TYPE_CTOS_GOOD || sc->server_cert_type == NULL) { sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; sc->ext.server_cert_type = TLSEXT_cert_type_x509; return EXT_RETURN_NOT_SENT; } if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_cert_type) || !WPACKET_start_sub_packet_u16(pkt) || !WPACKET_put_bytes_u8(pkt, sc->ext.server_cert_type) || !WPACKET_close(pkt)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return EXT_RETURN_FAIL; } return EXT_RETURN_SENT; } int tls_parse_ctos_server_cert_type(SSL_CONNECTION *sc, PACKET *pkt, unsigned int context, X509 *x, size_t chainidx) { PACKET supported_cert_types; const unsigned char *data; size_t len; if (sc->server_cert_type == NULL) { sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE; sc->ext.server_cert_type = TLSEXT_cert_type_x509; return 1; } if (!PACKET_as_length_prefixed_1(pkt, &supported_cert_types)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if ((len = PACKET_remaining(&supported_cert_types)) == 0) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } if (!PACKET_get_bytes(&supported_cert_types, &data, len)) { SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION); return 0; } sc->ext.server_cert_type_ctos = reconcile_cert_type(sc->server_cert_type, sc->server_cert_type_len, data, len, &sc->ext.server_cert_type); if (sc->ext.server_cert_type_ctos == OSSL_CERT_TYPE_CTOS_GOOD) return 1; SSLfatal(sc, SSL_AD_UNSUPPORTED_CERTIFICATE, SSL_R_BAD_EXTENSION); return 0; }
statem
openssl/ssl/statem/extensions_srvr.c
openssl
#include <assert.h> #include <limits.h> #include <string.h> #include <stdio.h> #include "../ssl_local.h" #include "statem_local.h" #include "internal/cryptlib.h" #include <openssl/buffer.h> #include <openssl/objects.h> #include <openssl/evp.h> #include <openssl/x509.h> #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) #define RSMBLY_BITMASK_MARK(bitmask, start, end) { \ if ((end) - (start) <= 8) { \ long ii; \ for (ii = (start); ii < (end); ii++) bitmask[((ii) >> 3)] |= (1 << ((ii) & 7)); \ } else { \ long ii; \ bitmask[((start) >> 3)] |= bitmask_start_values[((start) & 7)]; \ for (ii = (((start) >> 3) + 1); ii < ((((end) - 1)) >> 3); ii++) bitmask[ii] = 0xff; \ bitmask[(((end) - 1) >> 3)] |= bitmask_end_values[((end) & 7)]; \ } } #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ long ii; \ is_complete = 1; \ if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ if (bitmask[ii] != 0xff) { is_complete = 0; break; } } static const unsigned char bitmask_start_values[] = { 0xff, 0xfe, 0xfc, 0xf8, 0xf0, 0xe0, 0xc0, 0x80 }; static const unsigned char bitmask_end_values[] = { 0xff, 0x01, 0x03, 0x07, 0x0f, 0x1f, 0x3f, 0x7f }; static void dtls1_fix_message_header(SSL_CONNECTION *s, size_t frag_off, size_t frag_len); static unsigned char *dtls1_write_message_header(SSL_CONNECTION *s, unsigned char *p); static void dtls1_set_message_header_int(SSL_CONNECTION *s, unsigned char mt, size_t len, unsigned short seq_num, size_t frag_off, size_t frag_len); static int dtls_get_reassembled_message(SSL_CONNECTION *s, int *errtype, size_t *len); static hm_fragment *dtls1_hm_fragment_new(size_t frag_len, int reassembly) { hm_fragment *frag = NULL; unsigned char *buf = NULL; unsigned char *bitmask = NULL; if ((frag = OPENSSL_zalloc(sizeof(*frag))) == NULL) return NULL; if (frag_len) { if ((buf = OPENSSL_malloc(frag_len)) == NULL) { OPENSSL_free(frag); return NULL; } } frag->fragment = buf; if (reassembly) { bitmask = OPENSSL_zalloc(RSMBLY_BITMASK_SIZE(frag_len)); if (bitmask == NULL) { OPENSSL_free(buf); OPENSSL_free(frag); return NULL; } } frag->reassembly = bitmask; return frag; } void dtls1_hm_fragment_free(hm_fragment *frag) { if (!frag) return; OPENSSL_free(frag->fragment); OPENSSL_free(frag->reassembly); OPENSSL_free(frag); } int dtls1_do_write(SSL_CONNECTION *s, uint8_t type) { int ret; size_t written; size_t curr_mtu; int retry = 1; size_t len, frag_off, overhead, used_len; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (!dtls1_query_mtu(s)) return -1; if (s->d1->mtu < dtls1_min_mtu(s)) return -1; if (s->init_off == 0 && type == SSL3_RT_HANDSHAKE) { if (!ossl_assert(s->init_num == s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) return -1; } overhead = s->rlayer.wrlmethod->get_max_record_overhead(s->rlayer.wrl); frag_off = 0; s->rwstate = SSL_NOTHING; while (s->init_num > 0) { if (type == SSL3_RT_HANDSHAKE && s->init_off != 0) { if (frag_off > 0) { if (s->init_off <= DTLS1_HM_HEADER_LENGTH) { return -1; } s->init_off -= DTLS1_HM_HEADER_LENGTH; s->init_num += DTLS1_HM_HEADER_LENGTH; } else { frag_off = s->d1->w_msg_hdr.frag_off; } } used_len = BIO_wpending(s->wbio) + overhead; if (s->d1->mtu > used_len) curr_mtu = s->d1->mtu - used_len; else curr_mtu = 0; if (curr_mtu <= DTLS1_HM_HEADER_LENGTH) { ret = BIO_flush(s->wbio); if (ret <= 0) { s->rwstate = SSL_WRITING; return ret; } if (s->d1->mtu > overhead + DTLS1_HM_HEADER_LENGTH) { curr_mtu = s->d1->mtu - overhead; } else { return -1; } } if (((unsigned int)s->init_num) > curr_mtu) len = curr_mtu; else len = s->init_num; if (len > ssl_get_max_send_fragment(s)) len = ssl_get_max_send_fragment(s); if (type == SSL3_RT_HANDSHAKE) { if (len < DTLS1_HM_HEADER_LENGTH) { return -1; } dtls1_fix_message_header(s, frag_off, len - DTLS1_HM_HEADER_LENGTH); dtls1_write_message_header(s, (unsigned char *)&s->init_buf-> data[s->init_off]); } ret = dtls1_write_bytes(s, type, &s->init_buf->data[s->init_off], len, &written); if (ret <= 0) { if (retry && BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_MTU_EXCEEDED, 0, NULL) > 0) { if (!(SSL_get_options(ssl) & SSL_OP_NO_QUERY_MTU)) { if (!dtls1_query_mtu(s)) return -1; retry = 0; } else return -1; } else { return -1; } } else { if (!ossl_assert(len == written)) return -1; assert(s->s3.tmp.new_compression != NULL || BIO_wpending(s->wbio) <= (int)s->d1->mtu); if (type == SSL3_RT_HANDSHAKE && !s->d1->retransmitting) { unsigned char *p = (unsigned char *)&s->init_buf->data[s->init_off]; const struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; size_t xlen; if (frag_off == 0 && s->version != DTLS1_BAD_VER) { *p++ = msg_hdr->type; l2n3(msg_hdr->msg_len, p); s2n(msg_hdr->seq, p); l2n3(0, p); l2n3(msg_hdr->msg_len, p); p -= DTLS1_HM_HEADER_LENGTH; xlen = written; } else { p += DTLS1_HM_HEADER_LENGTH; xlen = written - DTLS1_HM_HEADER_LENGTH; } if (!ssl3_finish_mac(s, p, xlen)) return -1; } if (written == s->init_num) { if (s->msg_callback) s->msg_callback(1, s->version, type, s->init_buf->data, (size_t)(s->init_off + s->init_num), ssl, s->msg_callback_arg); s->init_off = 0; s->init_num = 0; return 1; } s->init_off += written; s->init_num -= written; written -= DTLS1_HM_HEADER_LENGTH; frag_off += written; dtls1_fix_message_header(s, frag_off, 0); } } return 0; } int dtls_get_message(SSL_CONNECTION *s, int *mt) { struct hm_header_st *msg_hdr; unsigned char *p; size_t msg_len; size_t tmplen; int errtype; msg_hdr = &s->d1->r_msg_hdr; memset(msg_hdr, 0, sizeof(*msg_hdr)); again: if (!dtls_get_reassembled_message(s, &errtype, &tmplen)) { if (errtype == DTLS1_HM_BAD_FRAGMENT || errtype == DTLS1_HM_FRAGMENT_RETRY) { goto again; } return 0; } *mt = s->s3.tmp.message_type; p = (unsigned char *)s->init_buf->data; if (*mt == SSL3_MT_CHANGE_CIPHER_SPEC) { if (s->msg_callback) { s->msg_callback(0, s->version, SSL3_RT_CHANGE_CIPHER_SPEC, p, 1, SSL_CONNECTION_GET_SSL(s), s->msg_callback_arg); } return 1; } msg_len = msg_hdr->msg_len; *(p++) = msg_hdr->type; l2n3(msg_len, p); s2n(msg_hdr->seq, p); l2n3(0, p); l2n3(msg_len, p); memset(msg_hdr, 0, sizeof(*msg_hdr)); s->d1->handshake_read_seq++; s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; return 1; } int dtls_get_message_body(SSL_CONNECTION *s, size_t *len) { unsigned char *msg = (unsigned char *)s->init_buf->data; size_t msg_len = s->init_num + DTLS1_HM_HEADER_LENGTH; if (s->s3.tmp.message_type == SSL3_MT_CHANGE_CIPHER_SPEC) { goto end; } if (*(s->init_buf->data) == SSL3_MT_FINISHED && !ssl3_take_mac(s)) { return 0; } if (s->version == DTLS1_BAD_VER) { msg += DTLS1_HM_HEADER_LENGTH; msg_len -= DTLS1_HM_HEADER_LENGTH; } if (!ssl3_finish_mac(s, msg, msg_len)) return 0; if (s->msg_callback) s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data, s->init_num + DTLS1_HM_HEADER_LENGTH, SSL_CONNECTION_GET_SSL(s), s->msg_callback_arg); end: *len = s->init_num; return 1; } static size_t dtls1_max_handshake_message_len(const SSL_CONNECTION *s) { size_t max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH; if (max_len < s->max_cert_list) return s->max_cert_list; return max_len; } static int dtls1_preprocess_fragment(SSL_CONNECTION *s, struct hm_header_st *msg_hdr) { size_t frag_off, frag_len, msg_len; msg_len = msg_hdr->msg_len; frag_off = msg_hdr->frag_off; frag_len = msg_hdr->frag_len; if ((frag_off + frag_len) > msg_len || msg_len > dtls1_max_handshake_message_len(s)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_EXCESSIVE_MESSAGE_SIZE); return 0; } if (s->d1->r_msg_hdr.frag_off == 0) { if (!BUF_MEM_grow_clean(s->init_buf, msg_len + DTLS1_HM_HEADER_LENGTH)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BUF_LIB); return 0; } s->s3.tmp.message_size = msg_len; s->d1->r_msg_hdr.msg_len = msg_len; s->s3.tmp.message_type = msg_hdr->type; s->d1->r_msg_hdr.type = msg_hdr->type; s->d1->r_msg_hdr.seq = msg_hdr->seq; } else if (msg_len != s->d1->r_msg_hdr.msg_len) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_EXCESSIVE_MESSAGE_SIZE); return 0; } return 1; } static int dtls1_retrieve_buffered_fragment(SSL_CONNECTION *s, size_t *len) { pitem *item; piterator iter; hm_fragment *frag; int ret; int chretran = 0; iter = pqueue_iterator(s->d1->buffered_messages); do { item = pqueue_next(&iter); if (item == NULL) return 0; frag = (hm_fragment *)item->data; if (frag->msg_header.seq < s->d1->handshake_read_seq) { pitem *next; hm_fragment *nextfrag; if (!s->server || frag->msg_header.seq != 0 || s->d1->handshake_read_seq != 1 || s->statem.hand_state != DTLS_ST_SW_HELLO_VERIFY_REQUEST) { pqueue_pop(s->d1->buffered_messages); dtls1_hm_fragment_free(frag); pitem_free(item); item = NULL; frag = NULL; } else { next = pqueue_next(&iter); if (next != NULL) { nextfrag = (hm_fragment *)next->data; if (nextfrag->msg_header.seq == s->d1->handshake_read_seq) { pqueue_pop(s->d1->buffered_messages); dtls1_hm_fragment_free(frag); pitem_free(item); item = next; frag = nextfrag; } else { chretran = 1; } } else { chretran = 1; } } } } while (item == NULL); if (frag->reassembly != NULL) return 0; if (s->d1->handshake_read_seq == frag->msg_header.seq || chretran) { size_t frag_len = frag->msg_header.frag_len; pqueue_pop(s->d1->buffered_messages); ret = dtls1_preprocess_fragment(s, &frag->msg_header); if (ret && frag->msg_header.frag_len > 0) { unsigned char *p = (unsigned char *)s->init_buf->data + DTLS1_HM_HEADER_LENGTH; memcpy(&p[frag->msg_header.frag_off], frag->fragment, frag->msg_header.frag_len); } dtls1_hm_fragment_free(frag); pitem_free(item); if (ret) { if (chretran) { s->d1->handshake_read_seq = 0; s->d1->next_handshake_write_seq = 0; } *len = frag_len; return 1; } s->init_num = 0; return -1; } else { return 0; } } static int dtls1_reassemble_fragment(SSL_CONNECTION *s, const struct hm_header_st *msg_hdr) { hm_fragment *frag = NULL; pitem *item = NULL; int i = -1, is_complete; unsigned char seq64be[8]; size_t frag_len = msg_hdr->frag_len; size_t readbytes; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if ((msg_hdr->frag_off + frag_len) > msg_hdr->msg_len || msg_hdr->msg_len > dtls1_max_handshake_message_len(s)) goto err; if (frag_len == 0) { return DTLS1_HM_FRAGMENT_RETRY; } memset(seq64be, 0, sizeof(seq64be)); seq64be[6] = (unsigned char)(msg_hdr->seq >> 8); seq64be[7] = (unsigned char)msg_hdr->seq; item = pqueue_find(s->d1->buffered_messages, seq64be); if (item == NULL) { frag = dtls1_hm_fragment_new(msg_hdr->msg_len, 1); if (frag == NULL) goto err; memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr)); frag->msg_header.frag_len = frag->msg_header.msg_len; frag->msg_header.frag_off = 0; } else { frag = (hm_fragment *)item->data; if (frag->msg_header.msg_len != msg_hdr->msg_len) { item = NULL; frag = NULL; goto err; } } if (frag->reassembly == NULL) { unsigned char devnull[256]; while (frag_len) { i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, NULL, devnull, frag_len > sizeof(devnull) ? sizeof(devnull) : frag_len, 0, &readbytes); if (i <= 0) goto err; frag_len -= readbytes; } return DTLS1_HM_FRAGMENT_RETRY; } i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, NULL, frag->fragment + msg_hdr->frag_off, frag_len, 0, &readbytes); if (i <= 0 || readbytes != frag_len) i = -1; if (i <= 0) goto err; RSMBLY_BITMASK_MARK(frag->reassembly, (long)msg_hdr->frag_off, (long)(msg_hdr->frag_off + frag_len)); if (!ossl_assert(msg_hdr->msg_len > 0)) goto err; RSMBLY_BITMASK_IS_COMPLETE(frag->reassembly, (long)msg_hdr->msg_len, is_complete); if (is_complete) { OPENSSL_free(frag->reassembly); frag->reassembly = NULL; } if (item == NULL) { item = pitem_new(seq64be, frag); if (item == NULL) { i = -1; goto err; } item = pqueue_insert(s->d1->buffered_messages, item); if (!ossl_assert(item != NULL)) goto err; } return DTLS1_HM_FRAGMENT_RETRY; err: if (item == NULL) dtls1_hm_fragment_free(frag); return -1; } static int dtls1_process_out_of_seq_message(SSL_CONNECTION *s, const struct hm_header_st *msg_hdr) { int i = -1; hm_fragment *frag = NULL; pitem *item = NULL; unsigned char seq64be[8]; size_t frag_len = msg_hdr->frag_len; size_t readbytes; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if ((msg_hdr->frag_off + frag_len) > msg_hdr->msg_len) goto err; memset(seq64be, 0, sizeof(seq64be)); seq64be[6] = (unsigned char)(msg_hdr->seq >> 8); seq64be[7] = (unsigned char)msg_hdr->seq; item = pqueue_find(s->d1->buffered_messages, seq64be); if (item != NULL && frag_len != msg_hdr->msg_len) item = NULL; if (msg_hdr->seq <= s->d1->handshake_read_seq || msg_hdr->seq > s->d1->handshake_read_seq + 10 || item != NULL || (s->d1->handshake_read_seq == 0 && msg_hdr->type == SSL3_MT_FINISHED)) { unsigned char devnull[256]; while (frag_len) { i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, NULL, devnull, frag_len > sizeof(devnull) ? sizeof(devnull) : frag_len, 0, &readbytes); if (i <= 0) goto err; frag_len -= readbytes; } } else { if (frag_len != msg_hdr->msg_len) { return dtls1_reassemble_fragment(s, msg_hdr); } if (frag_len > dtls1_max_handshake_message_len(s)) goto err; frag = dtls1_hm_fragment_new(frag_len, 0); if (frag == NULL) goto err; memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr)); if (frag_len) { i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, NULL, frag->fragment, frag_len, 0, &readbytes); if (i<=0 || readbytes != frag_len) i = -1; if (i <= 0) goto err; } item = pitem_new(seq64be, frag); if (item == NULL) goto err; item = pqueue_insert(s->d1->buffered_messages, item); if (!ossl_assert(item != NULL)) goto err; } return DTLS1_HM_FRAGMENT_RETRY; err: if (item == NULL) dtls1_hm_fragment_free(frag); return 0; } static int dtls_get_reassembled_message(SSL_CONNECTION *s, int *errtype, size_t *len) { size_t mlen, frag_off, frag_len; int i, ret; uint8_t recvd_type; struct hm_header_st msg_hdr; size_t readbytes; SSL *ssl = SSL_CONNECTION_GET_SSL(s); int chretran = 0; unsigned char *p; *errtype = 0; p = (unsigned char *)s->init_buf->data; redo: ret = dtls1_retrieve_buffered_fragment(s, &frag_len); if (ret < 0) { return 0; } if (ret > 0) { s->init_num = frag_len; *len = frag_len; return 1; } i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, &recvd_type, p, DTLS1_HM_HEADER_LENGTH, 0, &readbytes); if (i <= 0) { s->rwstate = SSL_READING; *len = 0; return 0; } if (recvd_type == SSL3_RT_CHANGE_CIPHER_SPEC) { if (p[0] != SSL3_MT_CCS) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_BAD_CHANGE_CIPHER_SPEC); goto f_err; } s->init_num = readbytes - 1; s->init_msg = s->init_buf->data + 1; s->s3.tmp.message_type = SSL3_MT_CHANGE_CIPHER_SPEC; s->s3.tmp.message_size = readbytes - 1; *len = readbytes - 1; return 1; } if (readbytes != DTLS1_HM_HEADER_LENGTH) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); goto f_err; } dtls1_get_message_header(p, &msg_hdr); mlen = msg_hdr.msg_len; frag_off = msg_hdr.frag_off; frag_len = msg_hdr.frag_len; if (frag_len > s->rlayer.tlsrecs[s->rlayer.curr_rec].length) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_LENGTH); goto f_err; } if (msg_hdr.seq != s->d1->handshake_read_seq) { if (!s->server || msg_hdr.seq != 0 || s->d1->handshake_read_seq != 1 || p[0] != SSL3_MT_CLIENT_HELLO || s->statem.hand_state != DTLS_ST_SW_HELLO_VERIFY_REQUEST) { *errtype = dtls1_process_out_of_seq_message(s, &msg_hdr); return 0; } chretran = 1; } if (frag_len && frag_len < mlen) { *errtype = dtls1_reassemble_fragment(s, &msg_hdr); return 0; } if (!s->server && s->d1->r_msg_hdr.frag_off == 0 && s->statem.hand_state != TLS_ST_OK && p[0] == SSL3_MT_HELLO_REQUEST) { if (p[1] == 0 && p[2] == 0 && p[3] == 0) { if (s->msg_callback) s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, p, DTLS1_HM_HEADER_LENGTH, ssl, s->msg_callback_arg); s->init_num = 0; goto redo; } else { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); goto f_err; } } if (!dtls1_preprocess_fragment(s, &msg_hdr)) { goto f_err; } if (frag_len > 0) { p += DTLS1_HM_HEADER_LENGTH; i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, NULL, &p[frag_off], frag_len, 0, &readbytes); if (i <= 0) { s->rwstate = SSL_READING; *len = 0; return 0; } } else { readbytes = 0; } if (readbytes != frag_len) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_LENGTH); goto f_err; } if (chretran) { s->d1->handshake_read_seq = 0; s->d1->next_handshake_write_seq = 0; } *len = s->init_num = frag_len; return 1; f_err: s->init_num = 0; *len = 0; return 0; } CON_FUNC_RETURN dtls_construct_change_cipher_spec(SSL_CONNECTION *s, WPACKET *pkt) { if (s->version == DTLS1_BAD_VER) { s->d1->next_handshake_write_seq++; if (!WPACKET_put_bytes_u16(pkt, s->d1->handshake_write_seq)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return CON_FUNC_ERROR; } } return CON_FUNC_SUCCESS; } #ifndef OPENSSL_NO_SCTP WORK_STATE dtls_wait_for_dry(SSL_CONNECTION *s) { int ret, errtype; size_t len; SSL *ssl = SSL_CONNECTION_GET_SSL(s); ret = BIO_dgram_sctp_wait_for_dry(SSL_get_wbio(ssl)); if (ret < 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return WORK_ERROR; } if (ret == 0) { if (dtls_get_reassembled_message(s, &errtype, &len)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); return WORK_ERROR; } s->s3.in_read_app_data = 2; s->rwstate = SSL_READING; BIO_clear_retry_flags(SSL_get_rbio(ssl)); BIO_set_retry_read(SSL_get_rbio(ssl)); return WORK_MORE_A; } return WORK_FINISHED_CONTINUE; } #endif int dtls1_read_failed(SSL_CONNECTION *s, int code) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (code > 0) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!dtls1_is_timer_expired(s) || ossl_statem_in_error(s)) { return code; } if (!SSL_in_init(ssl)) { BIO_set_flags(SSL_get_rbio(ssl), BIO_FLAGS_READ); return code; } return dtls1_handle_timeout(s); } int dtls1_get_queue_priority(unsigned short seq, int is_ccs) { return seq * 2 - is_ccs; } int dtls1_retransmit_buffered_messages(SSL_CONNECTION *s) { pqueue *sent = s->d1->sent_messages; piterator iter; pitem *item; hm_fragment *frag; int found = 0; iter = pqueue_iterator(sent); for (item = pqueue_next(&iter); item != NULL; item = pqueue_next(&iter)) { frag = (hm_fragment *)item->data; if (dtls1_retransmit_message(s, (unsigned short) dtls1_get_queue_priority (frag->msg_header.seq, frag->msg_header.is_ccs), &found) <= 0) return -1; } return 1; } int dtls1_buffer_message(SSL_CONNECTION *s, int is_ccs) { pitem *item; hm_fragment *frag; unsigned char seq64be[8]; if (!ossl_assert(s->init_off == 0)) return 0; frag = dtls1_hm_fragment_new(s->init_num, 0); if (frag == NULL) return 0; memcpy(frag->fragment, s->init_buf->data, s->init_num); if (is_ccs) { if (!ossl_assert(s->d1->w_msg_hdr.msg_len + ((s->version == DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH) == (unsigned int)s->init_num)) { dtls1_hm_fragment_free(frag); return 0; } } else { if (!ossl_assert(s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH == (unsigned int)s->init_num)) { dtls1_hm_fragment_free(frag); return 0; } } frag->msg_header.msg_len = s->d1->w_msg_hdr.msg_len; frag->msg_header.seq = s->d1->w_msg_hdr.seq; frag->msg_header.type = s->d1->w_msg_hdr.type; frag->msg_header.frag_off = 0; frag->msg_header.frag_len = s->d1->w_msg_hdr.msg_len; frag->msg_header.is_ccs = is_ccs; frag->msg_header.saved_retransmit_state.wrlmethod = s->rlayer.wrlmethod; frag->msg_header.saved_retransmit_state.wrl = s->rlayer.wrl; memset(seq64be, 0, sizeof(seq64be)); seq64be[6] = (unsigned char)(dtls1_get_queue_priority(frag->msg_header.seq, frag->msg_header.is_ccs) >> 8); seq64be[7] = (unsigned char)(dtls1_get_queue_priority(frag->msg_header.seq, frag->msg_header.is_ccs)); item = pitem_new(seq64be, frag); if (item == NULL) { dtls1_hm_fragment_free(frag); return 0; } pqueue_insert(s->d1->sent_messages, item); return 1; } int dtls1_retransmit_message(SSL_CONNECTION *s, unsigned short seq, int *found) { int ret; pitem *item; hm_fragment *frag; unsigned long header_length; unsigned char seq64be[8]; struct dtls1_retransmit_state saved_state; memset(seq64be, 0, sizeof(seq64be)); seq64be[6] = (unsigned char)(seq >> 8); seq64be[7] = (unsigned char)seq; item = pqueue_find(s->d1->sent_messages, seq64be); if (item == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); *found = 0; return 0; } *found = 1; frag = (hm_fragment *)item->data; if (frag->msg_header.is_ccs) header_length = DTLS1_CCS_HEADER_LENGTH; else header_length = DTLS1_HM_HEADER_LENGTH; memcpy(s->init_buf->data, frag->fragment, frag->msg_header.msg_len + header_length); s->init_num = frag->msg_header.msg_len + header_length; dtls1_set_message_header_int(s, frag->msg_header.type, frag->msg_header.msg_len, frag->msg_header.seq, 0, frag->msg_header.frag_len); saved_state.wrlmethod = s->rlayer.wrlmethod; saved_state.wrl = s->rlayer.wrl; s->d1->retransmitting = 1; s->rlayer.wrlmethod = frag->msg_header.saved_retransmit_state.wrlmethod; s->rlayer.wrl = frag->msg_header.saved_retransmit_state.wrl; s->rlayer.wrlmethod->set1_bio(s->rlayer.wrl, s->wbio); ret = dtls1_do_write(s, frag->msg_header.is_ccs ? SSL3_RT_CHANGE_CIPHER_SPEC : SSL3_RT_HANDSHAKE); s->rlayer.wrlmethod = saved_state.wrlmethod; s->rlayer.wrl = saved_state.wrl; s->d1->retransmitting = 0; (void)BIO_flush(s->wbio); return ret; } void dtls1_set_message_header(SSL_CONNECTION *s, unsigned char mt, size_t len, size_t frag_off, size_t frag_len) { if (frag_off == 0) { s->d1->handshake_write_seq = s->d1->next_handshake_write_seq; s->d1->next_handshake_write_seq++; } dtls1_set_message_header_int(s, mt, len, s->d1->handshake_write_seq, frag_off, frag_len); } static void dtls1_set_message_header_int(SSL_CONNECTION *s, unsigned char mt, size_t len, unsigned short seq_num, size_t frag_off, size_t frag_len) { struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; msg_hdr->type = mt; msg_hdr->msg_len = len; msg_hdr->seq = seq_num; msg_hdr->frag_off = frag_off; msg_hdr->frag_len = frag_len; } static void dtls1_fix_message_header(SSL_CONNECTION *s, size_t frag_off, size_t frag_len) { struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; msg_hdr->frag_off = frag_off; msg_hdr->frag_len = frag_len; } static unsigned char *dtls1_write_message_header(SSL_CONNECTION *s, unsigned char *p) { struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; *p++ = msg_hdr->type; l2n3(msg_hdr->msg_len, p); s2n(msg_hdr->seq, p); l2n3(msg_hdr->frag_off, p); l2n3(msg_hdr->frag_len, p); return p; } void dtls1_get_message_header(const unsigned char *data, struct hm_header_st *msg_hdr) { memset(msg_hdr, 0, sizeof(*msg_hdr)); msg_hdr->type = *(data++); n2l3(data, msg_hdr->msg_len); n2s(data, msg_hdr->seq); n2l3(data, msg_hdr->frag_off); n2l3(data, msg_hdr->frag_len); } int dtls1_set_handshake_header(SSL_CONNECTION *s, WPACKET *pkt, int htype) { unsigned char *header; if (htype == SSL3_MT_CHANGE_CIPHER_SPEC) { s->d1->handshake_write_seq = s->d1->next_handshake_write_seq; dtls1_set_message_header_int(s, SSL3_MT_CCS, 0, s->d1->handshake_write_seq, 0, 0); if (!WPACKET_put_bytes_u8(pkt, SSL3_MT_CCS)) return 0; } else { dtls1_set_message_header(s, htype, 0, 0, 0); if (!WPACKET_allocate_bytes(pkt, DTLS1_HM_HEADER_LENGTH, &header) || !WPACKET_start_sub_packet(pkt)) return 0; } return 1; } int dtls1_close_construct_packet(SSL_CONNECTION *s, WPACKET *pkt, int htype) { size_t msglen; if ((htype != SSL3_MT_CHANGE_CIPHER_SPEC && !WPACKET_close(pkt)) || !WPACKET_get_length(pkt, &msglen) || msglen > INT_MAX) return 0; if (htype != SSL3_MT_CHANGE_CIPHER_SPEC) { s->d1->w_msg_hdr.msg_len = msglen - DTLS1_HM_HEADER_LENGTH; s->d1->w_msg_hdr.frag_len = msglen - DTLS1_HM_HEADER_LENGTH; } s->init_num = (int)msglen; s->init_off = 0; if (htype != DTLS1_MT_HELLO_VERIFY_REQUEST) { if (!dtls1_buffer_message(s, htype == SSL3_MT_CHANGE_CIPHER_SPEC ? 1 : 0)) return 0; } return 1; }
statem
openssl/ssl/statem/statem_dtls.c
openssl
#if defined(__TANDEM) && defined(_SPT_MODEL_) # include <spthread.h> # include <spt_extensions.h> #endif #include "internal/cryptlib.h" #include <openssl/rand.h> #include "../ssl_local.h" #include "statem_local.h" #include <assert.h> typedef enum { SUB_STATE_ERROR, SUB_STATE_FINISHED, SUB_STATE_END_HANDSHAKE } SUB_STATE_RETURN; static int state_machine(SSL_CONNECTION *s, int server); static void init_read_state_machine(SSL_CONNECTION *s); static SUB_STATE_RETURN read_state_machine(SSL_CONNECTION *s); static void init_write_state_machine(SSL_CONNECTION *s); static SUB_STATE_RETURN write_state_machine(SSL_CONNECTION *s); OSSL_HANDSHAKE_STATE SSL_get_state(const SSL *ssl) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(ssl); if (sc == NULL) return TLS_ST_BEFORE; return sc->statem.hand_state; } int SSL_in_init(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return sc->statem.in_init; } int SSL_is_init_finished(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return !(sc->statem.in_init) && (sc->statem.hand_state == TLS_ST_OK); } int SSL_in_before(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; return (sc->statem.hand_state == TLS_ST_BEFORE) && (sc->statem.state == MSG_FLOW_UNINITED); } OSSL_HANDSHAKE_STATE ossl_statem_get_state(SSL_CONNECTION *s) { return s != NULL ? s->statem.hand_state : TLS_ST_BEFORE; } void ossl_statem_clear(SSL_CONNECTION *s) { s->statem.state = MSG_FLOW_UNINITED; s->statem.hand_state = TLS_ST_BEFORE; ossl_statem_set_in_init(s, 1); s->statem.no_cert_verify = 0; } void ossl_statem_set_renegotiate(SSL_CONNECTION *s) { ossl_statem_set_in_init(s, 1); s->statem.request_state = TLS_ST_SW_HELLO_REQ; } void ossl_statem_send_fatal(SSL_CONNECTION *s, int al) { if (s->statem.in_init && s->statem.state == MSG_FLOW_ERROR) return; ossl_statem_set_in_init(s, 1); s->statem.state = MSG_FLOW_ERROR; if (al != SSL_AD_NO_ALERT) ssl3_send_alert(s, SSL3_AL_FATAL, al); } void ossl_statem_fatal(SSL_CONNECTION *s, int al, int reason, const char *fmt, ...) { va_list args; va_start(args, fmt); ERR_vset_error(ERR_LIB_SSL, reason, fmt, args); va_end(args); ossl_statem_send_fatal(s, al); } #define check_fatal(s) \ do { \ if (!ossl_assert((s)->statem.in_init \ && (s)->statem.state == MSG_FLOW_ERROR)) \ SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_MISSING_FATAL); \ } while (0) int ossl_statem_in_error(const SSL_CONNECTION *s) { if (s->statem.state == MSG_FLOW_ERROR) return 1; return 0; } void ossl_statem_set_in_init(SSL_CONNECTION *s, int init) { s->statem.in_init = init; if (s->rlayer.rrlmethod != NULL && s->rlayer.rrlmethod->set_in_init != NULL) s->rlayer.rrlmethod->set_in_init(s->rlayer.rrl, init); } int ossl_statem_get_in_handshake(SSL_CONNECTION *s) { return s->statem.in_handshake; } void ossl_statem_set_in_handshake(SSL_CONNECTION *s, int inhand) { if (inhand) s->statem.in_handshake++; else s->statem.in_handshake--; } int ossl_statem_skip_early_data(SSL_CONNECTION *s) { if (s->ext.early_data != SSL_EARLY_DATA_REJECTED) return 0; if (!s->server || s->statem.hand_state != TLS_ST_EARLY_DATA || s->hello_retry_request == SSL_HRR_COMPLETE) return 0; return 1; } void ossl_statem_check_finish_init(SSL_CONNECTION *s, int sending) { if (sending == -1) { if (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END || s->statem.hand_state == TLS_ST_EARLY_DATA) { ossl_statem_set_in_init(s, 1); if (s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) { s->early_data_state = SSL_EARLY_DATA_FINISHED_WRITING; } } } else if (!s->server) { if ((sending && (s->statem.hand_state == TLS_ST_PENDING_EARLY_DATA_END || s->statem.hand_state == TLS_ST_EARLY_DATA) && s->early_data_state != SSL_EARLY_DATA_WRITING) || (!sending && s->statem.hand_state == TLS_ST_EARLY_DATA)) { ossl_statem_set_in_init(s, 1); if (sending && s->early_data_state == SSL_EARLY_DATA_WRITE_RETRY) s->early_data_state = SSL_EARLY_DATA_FINISHED_WRITING; } } else { if (s->early_data_state == SSL_EARLY_DATA_FINISHED_READING && s->statem.hand_state == TLS_ST_EARLY_DATA) ossl_statem_set_in_init(s, 1); } } void ossl_statem_set_hello_verify_done(SSL_CONNECTION *s) { s->statem.state = MSG_FLOW_UNINITED; ossl_statem_set_in_init(s, 1); s->statem.hand_state = TLS_ST_SR_CLNT_HELLO; } int ossl_statem_connect(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; return state_machine(sc, 0); } int ossl_statem_accept(SSL *s) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; return state_machine(sc, 1); } typedef void (*info_cb) (const SSL *, int, int); static info_cb get_callback(SSL_CONNECTION *s) { SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); if (s->info_callback != NULL) return s->info_callback; else if (sctx->info_callback != NULL) return sctx->info_callback; return NULL; } static int state_machine(SSL_CONNECTION *s, int server) { BUF_MEM *buf = NULL; void (*cb) (const SSL *ssl, int type, int val) = NULL; OSSL_STATEM *st = &s->statem; int ret = -1; int ssret; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (st->state == MSG_FLOW_ERROR) { return -1; } ERR_clear_error(); clear_sys_error(); cb = get_callback(s); st->in_handshake++; if (!SSL_in_init(ssl) || SSL_in_before(ssl)) { if ((s->s3.flags & TLS1_FLAGS_STATELESS) == 0 && !SSL_clear(ssl)) return -1; } #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && BIO_dgram_is_sctp(SSL_get_wbio(ssl))) { BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE, st->in_handshake, NULL); } #endif if (st->state == MSG_FLOW_UNINITED || st->state == MSG_FLOW_FINISHED) { if (st->state == MSG_FLOW_UNINITED) { st->hand_state = TLS_ST_BEFORE; st->request_state = TLS_ST_BEFORE; } s->server = server; if (cb != NULL) { if (SSL_IS_FIRST_HANDSHAKE(s) || !SSL_CONNECTION_IS_TLS13(s)) cb(ssl, SSL_CB_HANDSHAKE_START, 1); } if (SSL_CONNECTION_IS_DTLS(s)) { if ((s->version & 0xff00) != (DTLS1_VERSION & 0xff00) && (server || (s->version & 0xff00) != (DTLS1_BAD_VER & 0xff00))) { SSLfatal(s, SSL_AD_NO_ALERT, ERR_R_INTERNAL_ERROR); goto end; } } else { if ((s->version >> 8) != SSL3_VERSION_MAJOR) { SSLfatal(s, SSL_AD_NO_ALERT, ERR_R_INTERNAL_ERROR); goto end; } } if (!ssl_security(s, SSL_SECOP_VERSION, 0, s->version, NULL)) { SSLfatal(s, SSL_AD_NO_ALERT, ERR_R_INTERNAL_ERROR); goto end; } if (s->init_buf == NULL) { if ((buf = BUF_MEM_new()) == NULL) { SSLfatal(s, SSL_AD_NO_ALERT, ERR_R_INTERNAL_ERROR); goto end; } if (!BUF_MEM_grow(buf, SSL3_RT_MAX_PLAIN_LENGTH)) { SSLfatal(s, SSL_AD_NO_ALERT, ERR_R_INTERNAL_ERROR); goto end; } s->init_buf = buf; buf = NULL; } s->init_num = 0; s->s3.change_cipher_spec = 0; #ifndef OPENSSL_NO_SCTP if (!SSL_CONNECTION_IS_DTLS(s) || !BIO_dgram_is_sctp(SSL_get_wbio(ssl))) #endif if (!ssl_init_wbio_buffer(s)) { SSLfatal(s, SSL_AD_NO_ALERT, ERR_R_INTERNAL_ERROR); goto end; } if ((SSL_in_before(ssl)) || s->renegotiate) { if (!tls_setup_handshake(s)) { goto end; } if (SSL_IS_FIRST_HANDSHAKE(s)) st->read_state_first_init = 1; } st->state = MSG_FLOW_WRITING; init_write_state_machine(s); } while (st->state != MSG_FLOW_FINISHED) { if (st->state == MSG_FLOW_READING) { ssret = read_state_machine(s); if (ssret == SUB_STATE_FINISHED) { st->state = MSG_FLOW_WRITING; init_write_state_machine(s); } else { goto end; } } else if (st->state == MSG_FLOW_WRITING) { ssret = write_state_machine(s); if (ssret == SUB_STATE_FINISHED) { st->state = MSG_FLOW_READING; init_read_state_machine(s); } else if (ssret == SUB_STATE_END_HANDSHAKE) { st->state = MSG_FLOW_FINISHED; } else { goto end; } } else { check_fatal(s); ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); goto end; } } ret = 1; end: st->in_handshake--; #ifndef OPENSSL_NO_SCTP if (SSL_CONNECTION_IS_DTLS(s) && BIO_dgram_is_sctp(SSL_get_wbio(ssl))) { BIO_ctrl(SSL_get_wbio(ssl), BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE, st->in_handshake, NULL); } #endif BUF_MEM_free(buf); if (cb != NULL) { if (server) cb(ssl, SSL_CB_ACCEPT_EXIT, ret); else cb(ssl, SSL_CB_CONNECT_EXIT, ret); } return ret; } static void init_read_state_machine(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; st->read_state = READ_STATE_HEADER; } static int grow_init_buf(SSL_CONNECTION *s, size_t size) { size_t msg_offset = (char *)s->init_msg - s->init_buf->data; if (!BUF_MEM_grow_clean(s->init_buf, (int)size)) return 0; if (size < msg_offset) return 0; s->init_msg = s->init_buf->data + msg_offset; return 1; } static SUB_STATE_RETURN read_state_machine(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; int ret, mt; size_t len = 0; int (*transition) (SSL_CONNECTION *s, int mt); PACKET pkt; MSG_PROCESS_RETURN(*process_message) (SSL_CONNECTION *s, PACKET *pkt); WORK_STATE(*post_process_message) (SSL_CONNECTION *s, WORK_STATE wst); size_t (*max_message_size) (SSL_CONNECTION *s); void (*cb) (const SSL *ssl, int type, int val) = NULL; SSL *ssl = SSL_CONNECTION_GET_SSL(s); cb = get_callback(s); if (s->server) { transition = ossl_statem_server_read_transition; process_message = ossl_statem_server_process_message; max_message_size = ossl_statem_server_max_message_size; post_process_message = ossl_statem_server_post_process_message; } else { transition = ossl_statem_client_read_transition; process_message = ossl_statem_client_process_message; max_message_size = ossl_statem_client_max_message_size; post_process_message = ossl_statem_client_post_process_message; } if (st->read_state_first_init) { s->first_packet = 1; st->read_state_first_init = 0; } while (1) { switch (st->read_state) { case READ_STATE_HEADER: if (SSL_CONNECTION_IS_DTLS(s)) { ret = dtls_get_message(s, &mt); } else { ret = tls_get_message_header(s, &mt); } if (ret == 0) { return SUB_STATE_ERROR; } if (cb != NULL) { if (s->server) cb(ssl, SSL_CB_ACCEPT_LOOP, 1); else cb(ssl, SSL_CB_CONNECT_LOOP, 1); } if (!transition(s, mt)) return SUB_STATE_ERROR; if (s->s3.tmp.message_size > max_message_size(s)) { SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_EXCESSIVE_MESSAGE_SIZE); return SUB_STATE_ERROR; } if (!SSL_CONNECTION_IS_DTLS(s) && s->s3.tmp.message_size > 0 && !grow_init_buf(s, s->s3.tmp.message_size + SSL3_HM_HEADER_LENGTH)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BUF_LIB); return SUB_STATE_ERROR; } st->read_state = READ_STATE_BODY; case READ_STATE_BODY: if (SSL_CONNECTION_IS_DTLS(s)) { ret = dtls_get_message_body(s, &len); } else { ret = tls_get_message_body(s, &len); } if (ret == 0) { return SUB_STATE_ERROR; } s->first_packet = 0; if (!PACKET_buf_init(&pkt, s->init_msg, len)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return SUB_STATE_ERROR; } ret = process_message(s, &pkt); s->init_num = 0; switch (ret) { case MSG_PROCESS_ERROR: check_fatal(s); return SUB_STATE_ERROR; case MSG_PROCESS_FINISHED_READING: if (SSL_CONNECTION_IS_DTLS(s)) { dtls1_stop_timer(s); } return SUB_STATE_FINISHED; case MSG_PROCESS_CONTINUE_PROCESSING: st->read_state = READ_STATE_POST_PROCESS; st->read_state_work = WORK_MORE_A; break; default: st->read_state = READ_STATE_HEADER; break; } break; case READ_STATE_POST_PROCESS: st->read_state_work = post_process_message(s, st->read_state_work); switch (st->read_state_work) { case WORK_ERROR: check_fatal(s); case WORK_MORE_A: case WORK_MORE_B: case WORK_MORE_C: return SUB_STATE_ERROR; case WORK_FINISHED_CONTINUE: st->read_state = READ_STATE_HEADER; break; case WORK_FINISHED_STOP: if (SSL_CONNECTION_IS_DTLS(s)) { dtls1_stop_timer(s); } return SUB_STATE_FINISHED; } break; default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return SUB_STATE_ERROR; } } } static int statem_do_write(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; if (st->hand_state == TLS_ST_CW_CHANGE || st->hand_state == TLS_ST_SW_CHANGE) { if (SSL_CONNECTION_IS_DTLS(s)) return dtls1_do_write(s, SSL3_RT_CHANGE_CIPHER_SPEC); else return ssl3_do_write(s, SSL3_RT_CHANGE_CIPHER_SPEC); } else { return ssl_do_write(s); } } static void init_write_state_machine(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; st->write_state = WRITE_STATE_TRANSITION; } static SUB_STATE_RETURN write_state_machine(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; int ret; WRITE_TRAN(*transition) (SSL_CONNECTION *s); WORK_STATE(*pre_work) (SSL_CONNECTION *s, WORK_STATE wst); WORK_STATE(*post_work) (SSL_CONNECTION *s, WORK_STATE wst); int (*get_construct_message_f) (SSL_CONNECTION *s, CON_FUNC_RETURN (**confunc) (SSL_CONNECTION *s, WPACKET *pkt), int *mt); void (*cb) (const SSL *ssl, int type, int val) = NULL; CON_FUNC_RETURN (*confunc) (SSL_CONNECTION *s, WPACKET *pkt); int mt; WPACKET pkt; SSL *ssl = SSL_CONNECTION_GET_SSL(s); cb = get_callback(s); if (s->server) { transition = ossl_statem_server_write_transition; pre_work = ossl_statem_server_pre_work; post_work = ossl_statem_server_post_work; get_construct_message_f = ossl_statem_server_construct_message; } else { transition = ossl_statem_client_write_transition; pre_work = ossl_statem_client_pre_work; post_work = ossl_statem_client_post_work; get_construct_message_f = ossl_statem_client_construct_message; } while (1) { switch (st->write_state) { case WRITE_STATE_TRANSITION: if (cb != NULL) { if (s->server) cb(ssl, SSL_CB_ACCEPT_LOOP, 1); else cb(ssl, SSL_CB_CONNECT_LOOP, 1); } switch (transition(s)) { case WRITE_TRAN_CONTINUE: st->write_state = WRITE_STATE_PRE_WORK; st->write_state_work = WORK_MORE_A; break; case WRITE_TRAN_FINISHED: return SUB_STATE_FINISHED; break; case WRITE_TRAN_ERROR: check_fatal(s); return SUB_STATE_ERROR; } break; case WRITE_STATE_PRE_WORK: switch (st->write_state_work = pre_work(s, st->write_state_work)) { case WORK_ERROR: check_fatal(s); case WORK_MORE_A: case WORK_MORE_B: case WORK_MORE_C: return SUB_STATE_ERROR; case WORK_FINISHED_CONTINUE: st->write_state = WRITE_STATE_SEND; break; case WORK_FINISHED_STOP: return SUB_STATE_END_HANDSHAKE; } if (!get_construct_message_f(s, &confunc, &mt)) { return SUB_STATE_ERROR; } if (mt == SSL3_MT_DUMMY) { st->write_state = WRITE_STATE_POST_WORK; st->write_state_work = WORK_MORE_A; break; } if (!WPACKET_init(&pkt, s->init_buf) || !ssl_set_handshake_header(s, &pkt, mt)) { WPACKET_cleanup(&pkt); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return SUB_STATE_ERROR; } if (confunc != NULL) { CON_FUNC_RETURN tmpret; tmpret = confunc(s, &pkt); if (tmpret == CON_FUNC_ERROR) { WPACKET_cleanup(&pkt); check_fatal(s); return SUB_STATE_ERROR; } else if (tmpret == CON_FUNC_DONT_SEND) { WPACKET_cleanup(&pkt); st->write_state = WRITE_STATE_POST_WORK; st->write_state_work = WORK_MORE_A; break; } } if (!ssl_close_construct_packet(s, &pkt, mt) || !WPACKET_finish(&pkt)) { WPACKET_cleanup(&pkt); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return SUB_STATE_ERROR; } case WRITE_STATE_SEND: if (SSL_CONNECTION_IS_DTLS(s) && st->use_timer) { dtls1_start_timer(s); } ret = statem_do_write(s); if (ret <= 0) { return SUB_STATE_ERROR; } st->write_state = WRITE_STATE_POST_WORK; st->write_state_work = WORK_MORE_A; case WRITE_STATE_POST_WORK: switch (st->write_state_work = post_work(s, st->write_state_work)) { case WORK_ERROR: check_fatal(s); case WORK_MORE_A: case WORK_MORE_B: case WORK_MORE_C: return SUB_STATE_ERROR; case WORK_FINISHED_CONTINUE: st->write_state = WRITE_STATE_TRANSITION; break; case WORK_FINISHED_STOP: return SUB_STATE_END_HANDSHAKE; } break; default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return SUB_STATE_ERROR; } } } int statem_flush(SSL_CONNECTION *s) { s->rwstate = SSL_WRITING; if (BIO_flush(s->wbio) <= 0) { return 0; } s->rwstate = SSL_NOTHING; return 1; } int ossl_statem_app_data_allowed(SSL_CONNECTION *s) { OSSL_STATEM *st = &s->statem; if (st->state == MSG_FLOW_UNINITED) return 0; if (!s->s3.in_read_app_data || (s->s3.total_renegotiations == 0)) return 0; if (s->server) { if (st->hand_state == TLS_ST_BEFORE || st->hand_state == TLS_ST_SR_CLNT_HELLO) return 1; } else { if (st->hand_state == TLS_ST_CW_CLNT_HELLO) return 1; } return 0; } int ossl_statem_export_allowed(SSL_CONNECTION *s) { return s->s3.previous_server_finished_len != 0 && s->statem.hand_state != TLS_ST_SW_FINISHED; } int ossl_statem_export_early_allowed(SSL_CONNECTION *s) { return s->ext.early_data == SSL_EARLY_DATA_ACCEPTED || (!s->server && s->ext.early_data != SSL_EARLY_DATA_NOT_SENT); }
statem
openssl/ssl/statem/statem.c
openssl
#include <stdio.h> #include <limits.h> #include <errno.h> #include <assert.h> #include "../ssl_local.h" #include "../quic/quic_local.h" #include <openssl/evp.h> #include <openssl/buffer.h> #include <openssl/rand.h> #include <openssl/core_names.h> #include "record_local.h" #include "internal/packet.h" void RECORD_LAYER_init(RECORD_LAYER *rl, SSL_CONNECTION *s) { rl->s = s; } int RECORD_LAYER_clear(RECORD_LAYER *rl) { int ret = 1; while (rl->curr_rec < rl->num_recs) ret &= ssl_release_record(rl->s, &(rl->tlsrecs[rl->curr_rec++]), 0); rl->wnum = 0; memset(rl->handshake_fragment, 0, sizeof(rl->handshake_fragment)); rl->handshake_fragment_len = 0; rl->wpend_tot = 0; rl->wpend_type = 0; rl->wpend_buf = NULL; rl->alert_count = 0; rl->num_recs = 0; rl->curr_rec = 0; BIO_free(rl->rrlnext); rl->rrlnext = NULL; if (rl->rrlmethod != NULL) rl->rrlmethod->free(rl->rrl); if (rl->wrlmethod != NULL) rl->wrlmethod->free(rl->wrl); BIO_free(rl->rrlnext); rl->rrlmethod = NULL; rl->wrlmethod = NULL; rl->rrlnext = NULL; rl->rrl = NULL; rl->wrl = NULL; if (rl->d) DTLS_RECORD_LAYER_clear(rl); return ret; } int RECORD_LAYER_reset(RECORD_LAYER *rl) { int ret; ret = RECORD_LAYER_clear(rl); ret &= ssl_set_new_record_layer(rl->s, SSL_CONNECTION_IS_DTLS(rl->s) ? DTLS_ANY_VERSION : TLS_ANY_VERSION, OSSL_RECORD_DIRECTION_READ, OSSL_RECORD_PROTECTION_LEVEL_NONE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NID_undef, NULL, NULL, NULL); ret &= ssl_set_new_record_layer(rl->s, SSL_CONNECTION_IS_DTLS(rl->s) ? DTLS_ANY_VERSION : TLS_ANY_VERSION, OSSL_RECORD_DIRECTION_WRITE, OSSL_RECORD_PROTECTION_LEVEL_NONE, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NID_undef, NULL, NULL, NULL); return ret; } int RECORD_LAYER_read_pending(const RECORD_LAYER *rl) { return rl->rrlmethod->unprocessed_read_pending(rl->rrl); } int RECORD_LAYER_processed_read_pending(const RECORD_LAYER *rl) { return (rl->curr_rec < rl->num_recs) || rl->rrlmethod->processed_read_pending(rl->rrl); } int RECORD_LAYER_write_pending(const RECORD_LAYER *rl) { return rl->wpend_tot > 0; } static uint32_t ossl_get_max_early_data(SSL_CONNECTION *s) { uint32_t max_early_data; SSL_SESSION *sess = s->session; if (!s->server && sess->ext.max_early_data == 0) { if (!ossl_assert(s->psksession != NULL && s->psksession->ext.max_early_data > 0)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } sess = s->psksession; } if (!s->server) max_early_data = sess->ext.max_early_data; else if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED) max_early_data = s->recv_max_early_data; else max_early_data = s->recv_max_early_data < sess->ext.max_early_data ? s->recv_max_early_data : sess->ext.max_early_data; return max_early_data; } static int ossl_early_data_count_ok(SSL_CONNECTION *s, size_t length, size_t overhead, int send) { uint32_t max_early_data; max_early_data = ossl_get_max_early_data(s); if (max_early_data == 0) { SSLfatal(s, send ? SSL_AD_INTERNAL_ERROR : SSL_AD_UNEXPECTED_MESSAGE, SSL_R_TOO_MUCH_EARLY_DATA); return 0; } max_early_data += overhead; if (s->early_data_count + length > max_early_data) { SSLfatal(s, send ? SSL_AD_INTERNAL_ERROR : SSL_AD_UNEXPECTED_MESSAGE, SSL_R_TOO_MUCH_EARLY_DATA); return 0; } s->early_data_count += length; return 1; } size_t ssl3_pending(const SSL *s) { size_t i, num = 0; const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); if (sc == NULL) return 0; if (SSL_CONNECTION_IS_DTLS(sc)) { TLS_RECORD *rdata; pitem *item, *iter; iter = pqueue_iterator(sc->rlayer.d->buffered_app_data); while ((item = pqueue_next(&iter)) != NULL) { rdata = item->data; num += rdata->length; } } for (i = 0; i < sc->rlayer.num_recs; i++) { if (sc->rlayer.tlsrecs[i].type != SSL3_RT_APPLICATION_DATA) return num; num += sc->rlayer.tlsrecs[i].length; } num += sc->rlayer.rrlmethod->app_data_pending(sc->rlayer.rrl); return num; } void SSL_CTX_set_default_read_buffer_len(SSL_CTX *ctx, size_t len) { ctx->default_read_buf_len = len; } void SSL_set_default_read_buffer_len(SSL *s, size_t len) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL || IS_QUIC(s)) return; sc->rlayer.default_read_buf_len = len; } const char *SSL_rstate_string_long(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); const char *lng; if (sc == NULL) return NULL; if (sc->rlayer.rrlmethod == NULL || sc->rlayer.rrl == NULL) return "unknown"; sc->rlayer.rrlmethod->get_state(sc->rlayer.rrl, NULL, &lng); return lng; } const char *SSL_rstate_string(const SSL *s) { const SSL_CONNECTION *sc = SSL_CONNECTION_FROM_CONST_SSL(s); const char *shrt; if (sc == NULL) return NULL; if (sc->rlayer.rrlmethod == NULL || sc->rlayer.rrl == NULL) return "unknown"; sc->rlayer.rrlmethod->get_state(sc->rlayer.rrl, &shrt, NULL); return shrt; } static int tls_write_check_pending(SSL_CONNECTION *s, uint8_t type, const unsigned char *buf, size_t len) { if (s->rlayer.wpend_tot == 0) return 0; if ((s->rlayer.wpend_tot > len) || (!(s->mode & SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER) && (s->rlayer.wpend_buf != buf)) || (s->rlayer.wpend_type != type)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_WRITE_RETRY); return -1; } return 1; } int ssl3_write_bytes(SSL *ssl, uint8_t type, const void *buf_, size_t len, size_t *written) { const unsigned char *buf = buf_; size_t tot; size_t n, max_send_fragment, split_send_fragment, maxpipes; int i; SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); OSSL_RECORD_TEMPLATE tmpls[SSL_MAX_PIPELINES]; unsigned int recversion; if (s == NULL) return -1; s->rwstate = SSL_NOTHING; tot = s->rlayer.wnum; if ((len < s->rlayer.wnum) || ((s->rlayer.wpend_tot != 0) && (len < (s->rlayer.wnum + s->rlayer.wpend_tot)))) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_LENGTH); return -1; } if (s->early_data_state == SSL_EARLY_DATA_WRITING && !ossl_early_data_count_ok(s, len, 0, 1)) { return -1; } s->rlayer.wnum = 0; if (s->rlayer.wpend_tot == 0 && (s->key_update != SSL_KEY_UPDATE_NONE || s->ext.extra_tickets_expected > 0)) ossl_statem_set_in_init(s, 1); if (SSL_in_init(ssl) && !ossl_statem_get_in_handshake(s) && s->early_data_state != SSL_EARLY_DATA_UNAUTH_WRITING) { i = s->handshake_func(ssl); if (i < 0) return i; if (i == 0) { return -1; } } i = tls_write_check_pending(s, type, buf, len); if (i < 0) { return i; } else if (i > 0) { i = HANDLE_RLAYER_WRITE_RETURN(s, s->rlayer.wrlmethod->retry_write_records(s->rlayer.wrl)); if (i <= 0) { s->rlayer.wnum = tot; return i; } tot += s->rlayer.wpend_tot; s->rlayer.wpend_tot = 0; } if (tot == 0) { s->rlayer.wpend_tot = 0; s->rlayer.wpend_type = type; s->rlayer.wpend_buf = buf; } if (tot == len) { *written = tot; return 1; } if (s->s3.alert_dispatch > 0) { i = ssl->method->ssl_dispatch_alert(ssl); if (i <= 0) { s->rlayer.wnum = tot; return i; } } n = (len - tot); max_send_fragment = ssl_get_max_send_fragment(s); split_send_fragment = ssl_get_split_send_fragment(s); if (max_send_fragment == 0 || split_send_fragment == 0 || split_send_fragment > max_send_fragment) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } recversion = (s->version == TLS1_3_VERSION) ? TLS1_2_VERSION : s->version; if (SSL_get_state(ssl) == TLS_ST_CW_CLNT_HELLO && !s->renegotiate && TLS1_get_version(ssl) > TLS1_VERSION && s->hello_retry_request == SSL_HRR_NONE) recversion = TLS1_VERSION; for (;;) { size_t tmppipelen, remain; size_t j, lensofar = 0; maxpipes = s->rlayer.wrlmethod->get_max_records(s->rlayer.wrl, type, n, max_send_fragment, &split_send_fragment); if (s->max_pipelines > 0 && maxpipes > s->max_pipelines) maxpipes = s->max_pipelines; if (maxpipes > SSL_MAX_PIPELINES) maxpipes = SSL_MAX_PIPELINES; if (split_send_fragment > max_send_fragment) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } if (n / maxpipes >= split_send_fragment) { for (j = 0; j < maxpipes; j++) { tmpls[j].type = type; tmpls[j].version = recversion; tmpls[j].buf = &(buf[tot]) + (j * split_send_fragment); tmpls[j].buflen = split_send_fragment; } s->rlayer.wpend_tot = maxpipes * split_send_fragment; } else { tmppipelen = n / maxpipes; remain = n % maxpipes; if (remain > 0) tmppipelen++; for (j = 0; j < maxpipes; j++) { tmpls[j].type = type; tmpls[j].version = recversion; tmpls[j].buf = &(buf[tot]) + lensofar; tmpls[j].buflen = tmppipelen; lensofar += tmppipelen; if (j + 1 == remain) tmppipelen--; } s->rlayer.wpend_tot = n; } i = HANDLE_RLAYER_WRITE_RETURN(s, s->rlayer.wrlmethod->write_records(s->rlayer.wrl, tmpls, maxpipes)); if (i <= 0) { s->rlayer.wnum = tot; return i; } if (s->rlayer.wpend_tot == n || (type == SSL3_RT_APPLICATION_DATA && (s->mode & SSL_MODE_ENABLE_PARTIAL_WRITE) != 0)) { *written = tot + s->rlayer.wpend_tot; s->rlayer.wpend_tot = 0; return 1; } n -= s->rlayer.wpend_tot; tot += s->rlayer.wpend_tot; } } int ossl_tls_handle_rlayer_return(SSL_CONNECTION *s, int writing, int ret, char *file, int line) { SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (ret == OSSL_RECORD_RETURN_RETRY) { s->rwstate = writing ? SSL_WRITING : SSL_READING; ret = -1; } else { s->rwstate = SSL_NOTHING; if (ret == OSSL_RECORD_RETURN_EOF) { if (writing) { ERR_new(); ERR_set_debug(file, line, 0); ossl_statem_fatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR, NULL); ret = OSSL_RECORD_RETURN_FATAL; } else if ((s->options & SSL_OP_IGNORE_UNEXPECTED_EOF) != 0) { SSL_set_shutdown(ssl, SSL_RECEIVED_SHUTDOWN); s->s3.warn_alert = SSL_AD_CLOSE_NOTIFY; } else { ERR_new(); ERR_set_debug(file, line, 0); ossl_statem_fatal(s, SSL_AD_DECODE_ERROR, SSL_R_UNEXPECTED_EOF_WHILE_READING, NULL); } } else if (ret == OSSL_RECORD_RETURN_FATAL) { int al = s->rlayer.rrlmethod->get_alert_code(s->rlayer.rrl); if (al != SSL_AD_NO_ALERT) { ERR_new(); ERR_set_debug(file, line, 0); ossl_statem_fatal(s, al, SSL_R_RECORD_LAYER_FAILURE, NULL); } } if (ret == OSSL_RECORD_RETURN_NON_FATAL_ERR || ret == OSSL_RECORD_RETURN_EOF) ret = 0; else if (ret < OSSL_RECORD_RETURN_NON_FATAL_ERR) ret = -1; } return ret; } int ssl_release_record(SSL_CONNECTION *s, TLS_RECORD *rr, size_t length) { assert(rr->length >= length); if (rr->rechandle != NULL) { if (length == 0) length = rr->length; if (HANDLE_RLAYER_READ_RETURN(s, s->rlayer.rrlmethod->release_record(s->rlayer.rrl, rr->rechandle, length)) <= 0) { return 0; } if (length == rr->length) s->rlayer.curr_rec++; } else if (length == 0 || length == rr->length) { OPENSSL_free(rr->allocdata); rr->allocdata = NULL; } rr->length -= length; if (rr->length > 0) rr->off += length; else rr->off = 0; return 1; } int ssl3_read_bytes(SSL *ssl, uint8_t type, uint8_t *recvd_type, unsigned char *buf, size_t len, int peek, size_t *readbytes) { int i, j, ret; size_t n, curr_rec, totalbytes; TLS_RECORD *rr; void (*cb) (const SSL *ssl, int type2, int val) = NULL; int is_tls13; SSL_CONNECTION *s = SSL_CONNECTION_FROM_SSL_ONLY(ssl); is_tls13 = SSL_CONNECTION_IS_TLS13(s); if ((type != 0 && (type != SSL3_RT_APPLICATION_DATA) && (type != SSL3_RT_HANDSHAKE)) || (peek && (type != SSL3_RT_APPLICATION_DATA))) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } if ((type == SSL3_RT_HANDSHAKE) && (s->rlayer.handshake_fragment_len > 0)) { unsigned char *src = s->rlayer.handshake_fragment; unsigned char *dst = buf; unsigned int k; n = 0; while ((len > 0) && (s->rlayer.handshake_fragment_len > 0)) { *dst++ = *src++; len--; s->rlayer.handshake_fragment_len--; n++; } for (k = 0; k < s->rlayer.handshake_fragment_len; k++) s->rlayer.handshake_fragment[k] = *src++; if (recvd_type != NULL) *recvd_type = SSL3_RT_HANDSHAKE; *readbytes = n; return 1; } if (!ossl_statem_get_in_handshake(s) && SSL_in_init(ssl)) { i = s->handshake_func(ssl); if (i < 0) return i; if (i == 0) return -1; } start: s->rwstate = SSL_NOTHING; if (s->rlayer.curr_rec >= s->rlayer.num_recs) { s->rlayer.curr_rec = s->rlayer.num_recs = 0; do { rr = &s->rlayer.tlsrecs[s->rlayer.num_recs]; ret = HANDLE_RLAYER_READ_RETURN(s, s->rlayer.rrlmethod->read_record(s->rlayer.rrl, &rr->rechandle, &rr->version, &rr->type, &rr->data, &rr->length, NULL, NULL)); if (ret <= 0) { return ret; } rr->off = 0; s->rlayer.num_recs++; } while (s->rlayer.rrlmethod->processed_read_pending(s->rlayer.rrl) && s->rlayer.num_recs < SSL_MAX_PIPELINES); } rr = &s->rlayer.tlsrecs[s->rlayer.curr_rec]; if (s->rlayer.handshake_fragment_len > 0 && rr->type != SSL3_RT_HANDSHAKE && SSL_CONNECTION_IS_TLS13(s)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_MIXED_HANDSHAKE_AND_NON_HANDSHAKE_DATA); return -1; } if (rr->type != SSL3_RT_ALERT && rr->length != 0) s->rlayer.alert_count = 0; if (s->s3.change_cipher_spec && (rr->type != SSL3_RT_HANDSHAKE)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_DATA_BETWEEN_CCS_AND_FINISHED); return -1; } if (s->shutdown & SSL_RECEIVED_SHUTDOWN) { s->rlayer.curr_rec++; s->rwstate = SSL_NOTHING; return 0; } if (type == rr->type || (rr->type == SSL3_RT_CHANGE_CIPHER_SPEC && type == SSL3_RT_HANDSHAKE && recvd_type != NULL && !is_tls13)) { if (SSL_in_init(ssl) && type == SSL3_RT_APPLICATION_DATA && SSL_IS_FIRST_HANDSHAKE(s)) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_APP_DATA_IN_HANDSHAKE); return -1; } if (type == SSL3_RT_HANDSHAKE && rr->type == SSL3_RT_CHANGE_CIPHER_SPEC && s->rlayer.handshake_fragment_len > 0) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_CCS_RECEIVED_EARLY); return -1; } if (recvd_type != NULL) *recvd_type = rr->type; if (len == 0) { if (rr->length == 0 && !ssl_release_record(s, rr, 0)) return -1; return 0; } totalbytes = 0; curr_rec = s->rlayer.curr_rec; do { if (len - totalbytes > rr->length) n = rr->length; else n = len - totalbytes; memcpy(buf, &(rr->data[rr->off]), n); buf += n; if (peek) { if (rr->length == 0 && !ssl_release_record(s, rr, 0)) return -1; } else { if (!ssl_release_record(s, rr, n)) return -1; } if (rr->length == 0 || (peek && n == rr->length)) { rr++; curr_rec++; } totalbytes += n; } while (type == SSL3_RT_APPLICATION_DATA && curr_rec < s->rlayer.num_recs && totalbytes < len); if (totalbytes == 0) { goto start; } *readbytes = totalbytes; return 1; } if (rr->version == SSL2_VERSION) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } if (ssl->method->version == TLS_ANY_VERSION && (s->server || rr->type != SSL3_RT_ALERT)) { s->version = rr->version; SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); return -1; } if (rr->type == SSL3_RT_ALERT) { unsigned int alert_level, alert_descr; const unsigned char *alert_bytes = rr->data + rr->off; PACKET alert; if (!PACKET_buf_init(&alert, alert_bytes, rr->length) || !PACKET_get_1(&alert, &alert_level) || !PACKET_get_1(&alert, &alert_descr) || PACKET_remaining(&alert) != 0) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_INVALID_ALERT); return -1; } if (s->msg_callback) s->msg_callback(0, s->version, SSL3_RT_ALERT, alert_bytes, 2, ssl, s->msg_callback_arg); if (s->info_callback != NULL) cb = s->info_callback; else if (ssl->ctx->info_callback != NULL) cb = ssl->ctx->info_callback; if (cb != NULL) { j = (alert_level << 8) | alert_descr; cb(ssl, SSL_CB_READ_ALERT, j); } if ((!is_tls13 && alert_level == SSL3_AL_WARNING) || (is_tls13 && alert_descr == SSL_AD_USER_CANCELLED)) { s->s3.warn_alert = alert_descr; if (!ssl_release_record(s, rr, 0)) return -1; s->rlayer.alert_count++; if (s->rlayer.alert_count == MAX_WARN_ALERT_COUNT) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_TOO_MANY_WARN_ALERTS); return -1; } } if (is_tls13 && alert_descr == SSL_AD_USER_CANCELLED) { goto start; } else if (alert_descr == SSL_AD_CLOSE_NOTIFY && (is_tls13 || alert_level == SSL3_AL_WARNING)) { s->shutdown |= SSL_RECEIVED_SHUTDOWN; return 0; } else if (alert_level == SSL3_AL_FATAL || is_tls13) { s->rwstate = SSL_NOTHING; s->s3.fatal_alert = alert_descr; SSLfatal_data(s, SSL_AD_NO_ALERT, SSL_AD_REASON_OFFSET + alert_descr, "SSL alert number %d", alert_descr); s->shutdown |= SSL_RECEIVED_SHUTDOWN; if (!ssl_release_record(s, rr, 0)) return -1; SSL_CTX_remove_session(s->session_ctx, s->session); return 0; } else if (alert_descr == SSL_AD_NO_RENEGOTIATION) { SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_NO_RENEGOTIATION); return -1; } else if (alert_level == SSL3_AL_WARNING) { goto start; } SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_UNKNOWN_ALERT_TYPE); return -1; } if ((s->shutdown & SSL_SENT_SHUTDOWN) != 0) { if (rr->type == SSL3_RT_HANDSHAKE) { BIO *rbio; if (!SSL_CONNECTION_IS_TLS13(s)) { if (!ssl_release_record(s, rr, 0)) return -1; if ((s->mode & SSL_MODE_AUTO_RETRY) != 0) goto start; s->rwstate = SSL_READING; rbio = SSL_get_rbio(ssl); BIO_clear_retry_flags(rbio); BIO_set_retry_read(rbio); return -1; } } else { if (!ssl_release_record(s, rr, 0)) return -1; SSLfatal(s, SSL_AD_NO_ALERT, SSL_R_APPLICATION_DATA_AFTER_CLOSE_NOTIFY); return -1; } } if (rr->type == SSL3_RT_HANDSHAKE) { size_t dest_maxlen = sizeof(s->rlayer.handshake_fragment); unsigned char *dest = s->rlayer.handshake_fragment; size_t *dest_len = &s->rlayer.handshake_fragment_len; n = dest_maxlen - *dest_len; if (rr->length < n) n = rr->length; if (n > 0) { memcpy(dest + *dest_len, rr->data + rr->off, n); *dest_len += n; } if ((n > 0 || rr->length == 0) && !ssl_release_record(s, rr, n)) return -1; if (*dest_len < dest_maxlen) goto start; } if (rr->type == SSL3_RT_CHANGE_CIPHER_SPEC) { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_CCS_RECEIVED_EARLY); return -1; } if ((s->rlayer.handshake_fragment_len >= 4) && !ossl_statem_get_in_handshake(s)) { int ined = (s->early_data_state == SSL_EARLY_DATA_READING); ossl_statem_set_in_init(s, 1); i = s->handshake_func(ssl); if (i < 0) return i; if (i == 0) { return -1; } if (ined) return -1; if (!(s->mode & SSL_MODE_AUTO_RETRY)) { if (!RECORD_LAYER_read_pending(&s->rlayer)) { BIO *bio; s->rwstate = SSL_READING; bio = SSL_get_rbio(ssl); BIO_clear_retry_flags(bio); BIO_set_retry_read(bio); return -1; } } goto start; } switch (rr->type) { default: SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_RECORD); return -1; case SSL3_RT_CHANGE_CIPHER_SPEC: case SSL3_RT_ALERT: case SSL3_RT_HANDSHAKE: SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, ERR_R_INTERNAL_ERROR); return -1; case SSL3_RT_APPLICATION_DATA: if (ossl_statem_app_data_allowed(s)) { s->s3.in_read_app_data = 2; return -1; } else if (ossl_statem_skip_early_data(s)) { if (!ossl_early_data_count_ok(s, rr->length, EARLY_DATA_CIPHERTEXT_OVERHEAD, 0)) { return -1; } if (!ssl_release_record(s, rr, 0)) return -1; goto start; } else { SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_RECORD); return -1; } } } int RECORD_LAYER_is_sslv2_record(RECORD_LAYER *rl) { if (SSL_CONNECTION_IS_DTLS(rl->s)) return 0; return rl->tlsrecs[0].version == SSL2_VERSION; } static OSSL_FUNC_rlayer_msg_callback_fn rlayer_msg_callback_wrapper; static void rlayer_msg_callback_wrapper(int write_p, int version, int content_type, const void *buf, size_t len, void *cbarg) { SSL_CONNECTION *s = cbarg; SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->msg_callback != NULL) s->msg_callback(write_p, version, content_type, buf, len, ssl, s->msg_callback_arg); } static OSSL_FUNC_rlayer_security_fn rlayer_security_wrapper; static int rlayer_security_wrapper(void *cbarg, int op, int bits, int nid, void *other) { SSL_CONNECTION *s = cbarg; return ssl_security(s, op, bits, nid, other); } static OSSL_FUNC_rlayer_padding_fn rlayer_padding_wrapper; static size_t rlayer_padding_wrapper(void *cbarg, int type, size_t len) { SSL_CONNECTION *s = cbarg; SSL *ssl = SSL_CONNECTION_GET_SSL(s); return s->rlayer.record_padding_cb(ssl, type, len, s->rlayer.record_padding_arg); } static const OSSL_DISPATCH rlayer_dispatch[] = { { OSSL_FUNC_RLAYER_SKIP_EARLY_DATA, (void (*)(void))ossl_statem_skip_early_data }, { OSSL_FUNC_RLAYER_MSG_CALLBACK, (void (*)(void))rlayer_msg_callback_wrapper }, { OSSL_FUNC_RLAYER_SECURITY, (void (*)(void))rlayer_security_wrapper }, { OSSL_FUNC_RLAYER_PADDING, (void (*)(void))rlayer_padding_wrapper }, OSSL_DISPATCH_END }; void ossl_ssl_set_custom_record_layer(SSL_CONNECTION *s, const OSSL_RECORD_METHOD *meth, void *rlarg) { s->rlayer.custom_rlmethod = meth; s->rlayer.rlarg = rlarg; } static const OSSL_RECORD_METHOD *ssl_select_next_record_layer(SSL_CONNECTION *s, int direction, int level) { if (s->rlayer.custom_rlmethod != NULL) return s->rlayer.custom_rlmethod; if (level == OSSL_RECORD_PROTECTION_LEVEL_NONE) { if (SSL_CONNECTION_IS_DTLS(s)) return &ossl_dtls_record_method; return &ossl_tls_record_method; } #ifndef OPENSSL_NO_KTLS if (level == OSSL_RECORD_PROTECTION_LEVEL_APPLICATION && (s->options & SSL_OP_ENABLE_KTLS) != 0 && (SSL_CONNECTION_IS_TLS13(s) || SSL_IS_FIRST_HANDSHAKE(s))) return &ossl_ktls_record_method; #endif return direction == OSSL_RECORD_DIRECTION_READ ? s->rlayer.rrlmethod : s->rlayer.wrlmethod; } static int ssl_post_record_layer_select(SSL_CONNECTION *s, int direction) { const OSSL_RECORD_METHOD *thismethod; OSSL_RECORD_LAYER *thisrl; if (direction == OSSL_RECORD_DIRECTION_READ) { thismethod = s->rlayer.rrlmethod; thisrl = s->rlayer.rrl; } else { thismethod = s->rlayer.wrlmethod; thisrl = s->rlayer.wrl; } #ifndef OPENSSL_NO_KTLS { SSL *ssl = SSL_CONNECTION_GET_SSL(s); if (s->rlayer.rrlmethod == &ossl_ktls_record_method) { SSL_set_options(ssl, SSL_OP_NO_RENEGOTIATION); } } #endif if (SSL_IS_FIRST_HANDSHAKE(s) && thismethod->set_first_handshake != NULL) thismethod->set_first_handshake(thisrl, 1); if (s->max_pipelines != 0 && thismethod->set_max_pipelines != NULL) thismethod->set_max_pipelines(thisrl, s->max_pipelines); return 1; } int ssl_set_new_record_layer(SSL_CONNECTION *s, int version, int direction, int level, unsigned char *secret, size_t secretlen, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, const SSL_COMP *comp, const EVP_MD *kdfdigest) { OSSL_PARAM options[5], *opts = options; OSSL_PARAM settings[6], *set = settings; const OSSL_RECORD_METHOD **thismethod; OSSL_RECORD_LAYER **thisrl, *newrl = NULL; BIO *thisbio; SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s); const OSSL_RECORD_METHOD *meth; int use_etm, stream_mac = 0, tlstree = 0; unsigned int maxfrag = (direction == OSSL_RECORD_DIRECTION_WRITE) ? ssl_get_max_send_fragment(s) : SSL3_RT_MAX_PLAIN_LENGTH; int use_early_data = 0; uint32_t max_early_data; COMP_METHOD *compm = (comp == NULL) ? NULL : comp->method; meth = ssl_select_next_record_layer(s, direction, level); if (direction == OSSL_RECORD_DIRECTION_READ) { thismethod = &s->rlayer.rrlmethod; thisrl = &s->rlayer.rrl; thisbio = s->rbio; } else { thismethod = &s->rlayer.wrlmethod; thisrl = &s->rlayer.wrl; thisbio = s->wbio; } if (meth == NULL) meth = *thismethod; if (!ossl_assert(meth != NULL)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } *opts++ = OSSL_PARAM_construct_uint64(OSSL_LIBSSL_RECORD_LAYER_PARAM_OPTIONS, &s->options); *opts++ = OSSL_PARAM_construct_uint32(OSSL_LIBSSL_RECORD_LAYER_PARAM_MODE, &s->mode); if (direction == OSSL_RECORD_DIRECTION_READ) { *opts++ = OSSL_PARAM_construct_size_t(OSSL_LIBSSL_RECORD_LAYER_READ_BUFFER_LEN, &s->rlayer.default_read_buf_len); *opts++ = OSSL_PARAM_construct_int(OSSL_LIBSSL_RECORD_LAYER_PARAM_READ_AHEAD, &s->rlayer.read_ahead); } else { *opts++ = OSSL_PARAM_construct_size_t(OSSL_LIBSSL_RECORD_LAYER_PARAM_BLOCK_PADDING, &s->rlayer.block_padding); } *opts = OSSL_PARAM_construct_end(); if (direction == OSSL_RECORD_DIRECTION_READ) { use_etm = SSL_READ_ETM(s) ? 1 : 0; if ((s->mac_flags & SSL_MAC_FLAG_READ_MAC_STREAM) != 0) stream_mac = 1; if ((s->mac_flags & SSL_MAC_FLAG_READ_MAC_TLSTREE) != 0) tlstree = 1; } else { use_etm = SSL_WRITE_ETM(s) ? 1 : 0; if ((s->mac_flags & SSL_MAC_FLAG_WRITE_MAC_STREAM) != 0) stream_mac = 1; if ((s->mac_flags & SSL_MAC_FLAG_WRITE_MAC_TLSTREE) != 0) tlstree = 1; } if (use_etm) *set++ = OSSL_PARAM_construct_int(OSSL_LIBSSL_RECORD_LAYER_PARAM_USE_ETM, &use_etm); if (stream_mac) *set++ = OSSL_PARAM_construct_int(OSSL_LIBSSL_RECORD_LAYER_PARAM_STREAM_MAC, &stream_mac); if (tlstree) *set++ = OSSL_PARAM_construct_int(OSSL_LIBSSL_RECORD_LAYER_PARAM_TLSTREE, &tlstree); if (direction == OSSL_RECORD_DIRECTION_READ && s->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(s->session)) maxfrag = GET_MAX_FRAGMENT_LENGTH(s->session); if (maxfrag != SSL3_RT_MAX_PLAIN_LENGTH) *set++ = OSSL_PARAM_construct_uint(OSSL_LIBSSL_RECORD_LAYER_PARAM_MAX_FRAG_LEN, &maxfrag); if (s->server && direction == OSSL_RECORD_DIRECTION_READ) { use_early_data = (level == OSSL_RECORD_PROTECTION_LEVEL_EARLY || level == OSSL_RECORD_PROTECTION_LEVEL_HANDSHAKE); } else if (!s->server && direction == OSSL_RECORD_DIRECTION_WRITE) { use_early_data = (level == OSSL_RECORD_PROTECTION_LEVEL_EARLY); } if (use_early_data) { max_early_data = ossl_get_max_early_data(s); if (max_early_data != 0) *set++ = OSSL_PARAM_construct_uint32(OSSL_LIBSSL_RECORD_LAYER_PARAM_MAX_EARLY_DATA, &max_early_data); } *set = OSSL_PARAM_construct_end(); for (;;) { int rlret; BIO *prev = NULL; BIO *next = NULL; unsigned int epoch = 0; OSSL_DISPATCH rlayer_dispatch_tmp[OSSL_NELEM(rlayer_dispatch)]; size_t i, j; if (direction == OSSL_RECORD_DIRECTION_READ) { prev = s->rlayer.rrlnext; if (SSL_CONNECTION_IS_DTLS(s) && level != OSSL_RECORD_PROTECTION_LEVEL_NONE) epoch = dtls1_get_epoch(s, SSL3_CC_READ); #ifndef OPENSSL_NO_DGRAM if (SSL_CONNECTION_IS_DTLS(s)) next = BIO_new(BIO_s_dgram_mem()); else #endif next = BIO_new(BIO_s_mem()); if (next == NULL) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } s->rlayer.rrlnext = next; } else { if (SSL_CONNECTION_IS_DTLS(s) && level != OSSL_RECORD_PROTECTION_LEVEL_NONE) epoch = dtls1_get_epoch(s, SSL3_CC_WRITE); } for (i = 0, j = 0; i < OSSL_NELEM(rlayer_dispatch); i++) { switch (rlayer_dispatch[i].function_id) { case OSSL_FUNC_RLAYER_MSG_CALLBACK: if (s->msg_callback == NULL) continue; break; case OSSL_FUNC_RLAYER_PADDING: if (s->rlayer.record_padding_cb == NULL) continue; break; default: break; } rlayer_dispatch_tmp[j++] = rlayer_dispatch[i]; } rlret = meth->new_record_layer(sctx->libctx, sctx->propq, version, s->server, direction, level, epoch, secret, secretlen, key, keylen, iv, ivlen, mackey, mackeylen, ciph, taglen, mactype, md, compm, kdfdigest, prev, thisbio, next, NULL, NULL, settings, options, rlayer_dispatch_tmp, s, s->rlayer.rlarg, &newrl); BIO_free(prev); switch (rlret) { case OSSL_RECORD_RETURN_FATAL: SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_RECORD_LAYER_FAILURE); return 0; case OSSL_RECORD_RETURN_NON_FATAL_ERR: if (*thismethod != meth && *thismethod != NULL) { meth = *thismethod; continue; } SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_SUITABLE_RECORD_LAYER); return 0; case OSSL_RECORD_RETURN_SUCCESS: break; default: SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } break; } if (!SSL_CONNECTION_IS_DTLS(s) || direction == OSSL_RECORD_DIRECTION_READ || pqueue_peek(s->d1->sent_messages) == NULL) { if (*thismethod != NULL && !(*thismethod)->free(*thisrl)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } *thisrl = newrl; *thismethod = meth; return ssl_post_record_layer_select(s, direction); } int ssl_set_record_protocol_version(SSL_CONNECTION *s, int vers) { if (!ossl_assert(s->rlayer.rrlmethod != NULL) || !ossl_assert(s->rlayer.wrlmethod != NULL)) return 0; s->rlayer.rrlmethod->set_protocol_version(s->rlayer.rrl, s->version); s->rlayer.wrlmethod->set_protocol_version(s->rlayer.wrl, s->version); return 1; }
record
openssl/ssl/record/rec_layer_s3.c
openssl
#include <stdio.h> #include <errno.h> #include "../ssl_local.h" #include <openssl/evp.h> #include <openssl/buffer.h> #include "record_local.h" #include "internal/packet.h" #include "internal/cryptlib.h" int DTLS_RECORD_LAYER_new(RECORD_LAYER *rl) { DTLS_RECORD_LAYER *d; if ((d = OPENSSL_malloc(sizeof(*d))) == NULL) return 0; rl->d = d; d->buffered_app_data = pqueue_new(); if (d->buffered_app_data == NULL) { OPENSSL_free(d); rl->d = NULL; return 0; } return 1; } void DTLS_RECORD_LAYER_free(RECORD_LAYER *rl) { if (rl->d == NULL) return; DTLS_RECORD_LAYER_clear(rl); pqueue_free(rl->d->buffered_app_data); OPENSSL_free(rl->d); rl->d = NULL; } void DTLS_RECORD_LAYER_clear(RECORD_LAYER *rl) { DTLS_RECORD_LAYER *d; pitem *item = NULL; TLS_RECORD *rec; pqueue *buffered_app_data; d = rl->d; while ((item = pqueue_pop(d->buffered_app_data)) != NULL) { rec = (TLS_RECORD *)item->data; if (rl->s->options & SSL_OP_CLEANSE_PLAINTEXT) OPENSSL_cleanse(rec->allocdata, rec->length); OPENSSL_free(rec->allocdata); OPENSSL_free(item->data); pitem_free(item); } buffered_app_data = d->buffered_app_data; memset(d, 0, sizeof(*d)); d->buffered_app_data = buffered_app_data; } static int dtls_buffer_record(SSL_CONNECTION *s, TLS_RECORD *rec) { TLS_RECORD *rdata; pitem *item; struct pqueue_st *queue = s->rlayer.d->buffered_app_data; if (pqueue_size(queue) >= 100) return 0; if (!ossl_assert(rec->off == 0)) return -1; rdata = OPENSSL_malloc(sizeof(*rdata)); item = pitem_new(rec->seq_num, rdata); if (rdata == NULL || item == NULL) { OPENSSL_free(rdata); pitem_free(item); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } *rdata = *rec; rdata->data = rdata->allocdata = OPENSSL_memdup(rec->data, rec->length); if (rdata->data == NULL) { OPENSSL_free(rdata); pitem_free(item); SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return -1; } rdata->rechandle = NULL; item->data = rdata; #ifndef OPENSSL_NO_SCTP if (BIO_dgram_is_sctp(s->rbio) && (ossl_statem_get_state(s) == TLS_ST_SR_FINISHED || ossl_statem_get_state(s) == TLS_ST_CR_FINISHED)) { BIO_ctrl(s->rbio, BIO_CTRL_DGRAM_SCTP_GET_RCVINFO, sizeof(rdata->recordinfo), &rdata->recordinfo); } #endif if (pqueue_insert(queue, item) == NULL) { OPENSSL_free(rdata->allocdata); OPENSSL_free(rdata); pitem_free(item); } return 1; } static void dtls_unbuffer_record(SSL_CONNECTION *s) { TLS_RECORD *rdata; pitem *item; if (s->rlayer.curr_rec < s->rlayer.num_recs) return; item = pqueue_pop(s->rlayer.d->buffered_app_data); if (item != NULL) { rdata = (TLS_RECORD *)item->data; s->rlayer.tlsrecs[0] = *rdata; s->rlayer.num_recs = 1; s->rlayer.curr_rec = 0; #ifndef OPENSSL_NO_SCTP if (BIO_dgram_is_sctp(s->rbio)) { BIO_ctrl(s->rbio, BIO_CTRL_DGRAM_SCTP_SET_RCVINFO, sizeof(rdata->recordinfo), &rdata->recordinfo); } #endif OPENSSL_free(item->data); pitem_free(item); } } int dtls1_read_bytes(SSL *s, uint8_t type, uint8_t *recvd_type, unsigned char *buf, size_t len, int peek, size_t *readbytes) { int i, j, ret; size_t n; TLS_RECORD *rr; void (*cb) (const SSL *ssl, int type2, int val) = NULL; SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s); if (sc == NULL) return -1; if ((type && (type != SSL3_RT_APPLICATION_DATA) && (type != SSL3_RT_HANDSHAKE)) || (peek && (type != SSL3_RT_APPLICATION_DATA))) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } if (!ossl_statem_get_in_handshake(sc) && SSL_in_init(s)) { i = sc->handshake_func(s); if (i < 0) return i; if (i == 0) return -1; } start: sc->rwstate = SSL_NOTHING; if (SSL_is_init_finished(s)) dtls_unbuffer_record(sc); if (dtls1_handle_timeout(sc) > 0) { goto start; } else if (ossl_statem_in_error(sc)) { return -1; } if (sc->rlayer.curr_rec >= sc->rlayer.num_recs) { sc->rlayer.curr_rec = sc->rlayer.num_recs = 0; do { rr = &sc->rlayer.tlsrecs[sc->rlayer.num_recs]; ret = HANDLE_RLAYER_READ_RETURN(sc, sc->rlayer.rrlmethod->read_record(sc->rlayer.rrl, &rr->rechandle, &rr->version, &rr->type, &rr->data, &rr->length, &rr->epoch, rr->seq_num)); if (ret <= 0) { ret = dtls1_read_failed(sc, ret); if (ret <= 0) return ret; else goto start; } rr->off = 0; sc->rlayer.num_recs++; } while (sc->rlayer.rrlmethod->processed_read_pending(sc->rlayer.rrl) && sc->rlayer.num_recs < SSL_MAX_PIPELINES); } rr = &sc->rlayer.tlsrecs[sc->rlayer.curr_rec]; if (rr->type != SSL3_RT_ALERT && rr->length != 0) sc->rlayer.alert_count = 0; if (sc->s3.change_cipher_spec && (rr->type != SSL3_RT_HANDSHAKE)) { if (dtls_buffer_record(sc, rr) < 0) { return -1; } if (!ssl_release_record(sc, rr, 0)) return -1; goto start; } if (sc->shutdown & SSL_RECEIVED_SHUTDOWN) { if (!ssl_release_record(sc, rr, 0)) return -1; sc->rwstate = SSL_NOTHING; return 0; } if (type == rr->type || (rr->type == SSL3_RT_CHANGE_CIPHER_SPEC && type == SSL3_RT_HANDSHAKE && recvd_type != NULL)) { if (SSL_in_init(s) && (type == SSL3_RT_APPLICATION_DATA) && (SSL_IS_FIRST_HANDSHAKE(sc))) { SSLfatal(sc, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_APP_DATA_IN_HANDSHAKE); return -1; } if (recvd_type != NULL) *recvd_type = rr->type; if (len == 0) { if (rr->length == 0 && !ssl_release_record(sc, rr, 0)) return -1; return 0; } if (len > rr->length) n = rr->length; else n = len; memcpy(buf, &(rr->data[rr->off]), n); if (peek) { if (rr->length == 0 && !ssl_release_record(sc, rr, 0)) return -1; } else { if (!ssl_release_record(sc, rr, n)) return -1; } #ifndef OPENSSL_NO_SCTP if (BIO_dgram_is_sctp(SSL_get_rbio(s)) && sc->d1->shutdown_received && BIO_dgram_sctp_msg_waiting(SSL_get_rbio(s)) <= 0) { sc->shutdown |= SSL_RECEIVED_SHUTDOWN; return 0; } #endif *readbytes = n; return 1; } if (rr->type == SSL3_RT_ALERT) { unsigned int alert_level, alert_descr; const unsigned char *alert_bytes = rr->data + rr->off; PACKET alert; if (!PACKET_buf_init(&alert, alert_bytes, rr->length) || !PACKET_get_1(&alert, &alert_level) || !PACKET_get_1(&alert, &alert_descr) || PACKET_remaining(&alert) != 0) { SSLfatal(sc, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_INVALID_ALERT); return -1; } if (sc->msg_callback) sc->msg_callback(0, sc->version, SSL3_RT_ALERT, alert_bytes, 2, s, sc->msg_callback_arg); if (sc->info_callback != NULL) cb = sc->info_callback; else if (s->ctx->info_callback != NULL) cb = s->ctx->info_callback; if (cb != NULL) { j = (alert_level << 8) | alert_descr; cb(s, SSL_CB_READ_ALERT, j); } if (alert_level == SSL3_AL_WARNING) { sc->s3.warn_alert = alert_descr; if (!ssl_release_record(sc, rr, 0)) return -1; sc->rlayer.alert_count++; if (sc->rlayer.alert_count == MAX_WARN_ALERT_COUNT) { SSLfatal(sc, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_TOO_MANY_WARN_ALERTS); return -1; } if (alert_descr == SSL_AD_CLOSE_NOTIFY) { #ifndef OPENSSL_NO_SCTP if (BIO_dgram_is_sctp(SSL_get_rbio(s)) && BIO_dgram_sctp_msg_waiting(SSL_get_rbio(s)) > 0) { sc->d1->shutdown_received = 1; sc->rwstate = SSL_READING; BIO_clear_retry_flags(SSL_get_rbio(s)); BIO_set_retry_read(SSL_get_rbio(s)); return -1; } #endif sc->shutdown |= SSL_RECEIVED_SHUTDOWN; return 0; } } else if (alert_level == SSL3_AL_FATAL) { sc->rwstate = SSL_NOTHING; sc->s3.fatal_alert = alert_descr; SSLfatal_data(sc, SSL_AD_NO_ALERT, SSL_AD_REASON_OFFSET + alert_descr, "SSL alert number %d", alert_descr); sc->shutdown |= SSL_RECEIVED_SHUTDOWN; if (!ssl_release_record(sc, rr, 0)) return -1; SSL_CTX_remove_session(sc->session_ctx, sc->session); return 0; } else { SSLfatal(sc, SSL_AD_ILLEGAL_PARAMETER, SSL_R_UNKNOWN_ALERT_TYPE); return -1; } goto start; } if (sc->shutdown & SSL_SENT_SHUTDOWN) { sc->rwstate = SSL_NOTHING; if (!ssl_release_record(sc, rr, 0)) return -1; return 0; } if (rr->type == SSL3_RT_CHANGE_CIPHER_SPEC) { if (!ssl_release_record(sc, rr, 0)) return -1; goto start; } if (rr->type == SSL3_RT_HANDSHAKE && !ossl_statem_get_in_handshake(sc)) { struct hm_header_st msg_hdr; if (rr->epoch != sc->rlayer.d->r_epoch || rr->length < DTLS1_HM_HEADER_LENGTH) { if (!ssl_release_record(sc, rr, 0)) return -1; goto start; } dtls1_get_message_header(rr->data, &msg_hdr); if (msg_hdr.type == SSL3_MT_FINISHED) { if (dtls1_check_timeout_num(sc) < 0) { return -1; } if (dtls1_retransmit_buffered_messages(sc) <= 0) { if (ossl_statem_in_error(sc)) return -1; } if (!ssl_release_record(sc, rr, 0)) return -1; if (!(sc->mode & SSL_MODE_AUTO_RETRY)) { if (!sc->rlayer.rrlmethod->unprocessed_read_pending(sc->rlayer.rrl)) { BIO *bio; sc->rwstate = SSL_READING; bio = SSL_get_rbio(s); BIO_clear_retry_flags(bio); BIO_set_retry_read(bio); return -1; } } goto start; } if (!ossl_assert(SSL_is_init_finished(s))) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } ossl_statem_set_in_init(sc, 1); i = sc->handshake_func(s); if (i < 0) return i; if (i == 0) return -1; if (!(sc->mode & SSL_MODE_AUTO_RETRY)) { if (!sc->rlayer.rrlmethod->unprocessed_read_pending(sc->rlayer.rrl)) { BIO *bio; sc->rwstate = SSL_READING; bio = SSL_get_rbio(s); BIO_clear_retry_flags(bio); BIO_set_retry_read(bio); return -1; } } goto start; } switch (rr->type) { default: SSLfatal(sc, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_RECORD); return -1; case SSL3_RT_CHANGE_CIPHER_SPEC: case SSL3_RT_ALERT: case SSL3_RT_HANDSHAKE: SSLfatal(sc, SSL_AD_UNEXPECTED_MESSAGE, ERR_R_INTERNAL_ERROR); return -1; case SSL3_RT_APPLICATION_DATA: if (sc->s3.in_read_app_data && (sc->s3.total_renegotiations != 0) && ossl_statem_app_data_allowed(sc)) { sc->s3.in_read_app_data = 2; return -1; } else { SSLfatal(sc, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_RECORD); return -1; } } } int dtls1_write_bytes(SSL_CONNECTION *s, uint8_t type, const void *buf, size_t len, size_t *written) { int i; if (!ossl_assert(len <= SSL3_RT_MAX_PLAIN_LENGTH)) { SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } s->rwstate = SSL_NOTHING; i = do_dtls1_write(s, type, buf, len, written); return i; } int do_dtls1_write(SSL_CONNECTION *sc, uint8_t type, const unsigned char *buf, size_t len, size_t *written) { int i; OSSL_RECORD_TEMPLATE tmpl; SSL *s = SSL_CONNECTION_GET_SSL(sc); int ret; if (sc->s3.alert_dispatch > 0) { i = s->method->ssl_dispatch_alert(s); if (i <= 0) return i; } if (len == 0) return 0; if (len > ssl_get_max_send_fragment(sc)) { SSLfatal(sc, SSL_AD_INTERNAL_ERROR, SSL_R_EXCEEDS_MAX_FRAGMENT_SIZE); return 0; } tmpl.type = type; if (s->method->version == DTLS_ANY_VERSION && sc->max_proto_version != DTLS1_BAD_VER) tmpl.version = DTLS1_VERSION; else tmpl.version = sc->version; tmpl.buf = buf; tmpl.buflen = len; ret = HANDLE_RLAYER_WRITE_RETURN(sc, sc->rlayer.wrlmethod->write_records(sc->rlayer.wrl, &tmpl, 1)); if (ret > 0) *written = (int)len; return ret; } void dtls1_increment_epoch(SSL_CONNECTION *s, int rw) { if (rw & SSL3_CC_READ) { s->rlayer.d->r_epoch++; dtls1_clear_received_buffer(s); } else { s->rlayer.d->w_epoch++; } } uint16_t dtls1_get_epoch(SSL_CONNECTION *s, int rw) { uint16_t epoch; if (rw & SSL3_CC_READ) epoch = s->rlayer.d->r_epoch; else epoch = s->rlayer.d->w_epoch; return epoch; }
record
openssl/ssl/record/rec_layer_d1.c
openssl
#include <assert.h> #include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" static int satsub64be(const unsigned char *v1, const unsigned char *v2) { int64_t ret; uint64_t l1, l2; n2l8(v1, l1); n2l8(v2, l2); ret = l1 - l2; if (l1 > l2 && ret < 0) return 128; else if (l2 > l1 && ret > 0) return -128; if (ret > 128) return 128; else if (ret < -128) return -128; else return (int)ret; } static int dtls_record_replay_check(OSSL_RECORD_LAYER *rl, DTLS_BITMAP *bitmap) { int cmp; unsigned int shift; const unsigned char *seq = rl->sequence; cmp = satsub64be(seq, bitmap->max_seq_num); if (cmp > 0) { ossl_tls_rl_record_set_seq_num(&rl->rrec[0], seq); return 1; } shift = -cmp; if (shift >= sizeof(bitmap->map) * 8) return 0; else if (bitmap->map & ((uint64_t)1 << shift)) return 0; ossl_tls_rl_record_set_seq_num(&rl->rrec[0], seq); return 1; } static void dtls_record_bitmap_update(OSSL_RECORD_LAYER *rl, DTLS_BITMAP *bitmap) { int cmp; unsigned int shift; const unsigned char *seq = rl->sequence; cmp = satsub64be(seq, bitmap->max_seq_num); if (cmp > 0) { shift = cmp; if (shift < sizeof(bitmap->map) * 8) bitmap->map <<= shift, bitmap->map |= 1UL; else bitmap->map = 1UL; memcpy(bitmap->max_seq_num, seq, SEQ_NUM_SIZE); } else { shift = -cmp; if (shift < sizeof(bitmap->map) * 8) bitmap->map |= (uint64_t)1 << shift; } } static DTLS_BITMAP *dtls_get_bitmap(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rr, unsigned int *is_next_epoch) { *is_next_epoch = 0; if (rr->epoch == rl->epoch) return &rl->bitmap; else if (rr->epoch == rl->epoch + 1) { *is_next_epoch = 1; return &rl->next_bitmap; } return NULL; } static void dtls_set_in_init(OSSL_RECORD_LAYER *rl, int in_init) { rl->in_init = in_init; } static int dtls_process_record(OSSL_RECORD_LAYER *rl, DTLS_BITMAP *bitmap) { int i; int enc_err; TLS_RL_RECORD *rr; int imac_size; size_t mac_size = 0; unsigned char md[EVP_MAX_MD_SIZE]; SSL_MAC_BUF macbuf = { NULL, 0 }; int ret = 0; rr = &rl->rrec[0]; rr->input = &(rl->packet[DTLS1_RT_HEADER_LENGTH]); if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_ENCRYPTED_LENGTH_TOO_LONG); return 0; } rr->data = rr->input; rr->orig_len = rr->length; if (rl->md_ctx != NULL) { const EVP_MD *tmpmd = EVP_MD_CTX_get0_md(rl->md_ctx); if (tmpmd != NULL) { imac_size = EVP_MD_get_size(tmpmd); if (!ossl_assert(imac_size >= 0 && imac_size <= EVP_MAX_MD_SIZE)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return 0; } mac_size = (size_t)imac_size; } } if (rl->use_etm && rl->md_ctx != NULL) { unsigned char *mac; if (rr->orig_len < mac_size) { RLAYERfatal(rl, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_TOO_SHORT); return 0; } rr->length -= mac_size; mac = rr->data + rr->length; i = rl->funcs->mac(rl, rr, md, 0 ); if (i == 0 || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0) { RLAYERfatal(rl, SSL_AD_BAD_RECORD_MAC, SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); return 0; } mac_size = 0; } ERR_set_mark(); enc_err = rl->funcs->cipher(rl, rr, 1, 0, &macbuf, mac_size); if (enc_err == 0) { ERR_pop_to_mark(); if (rl->alert != SSL_AD_NO_ALERT) { goto end; } rr->length = 0; rl->packet_length = 0; goto end; } ERR_clear_last_mark(); OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "dec %zd\n", rr->length); BIO_dump_indent(trc_out, rr->data, rr->length, 4); } OSSL_TRACE_END(TLS); if (!rl->use_etm && (rl->enc_ctx != NULL) && (EVP_MD_CTX_get0_md(rl->md_ctx) != NULL)) { i = rl->funcs->mac(rl, rr, md, 0 ); if (i == 0 || macbuf.mac == NULL || CRYPTO_memcmp(md, macbuf.mac, mac_size) != 0) enc_err = 0; if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH + mac_size) enc_err = 0; } if (enc_err == 0) { rr->length = 0; rl->packet_length = 0; goto end; } if (rl->compctx != NULL) { if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_COMPRESSED_LENGTH_TOO_LONG); goto end; } if (!tls_do_uncompress(rl, rr)) { RLAYERfatal(rl, SSL_AD_DECOMPRESSION_FAILURE, SSL_R_BAD_DECOMPRESSION); goto end; } } if (rr->length > rl->max_frag_len) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_DATA_LENGTH_TOO_LONG); goto end; } rr->off = 0; rl->packet_length = 0; dtls_record_bitmap_update(rl, bitmap); ret = 1; end: if (macbuf.alloced) OPENSSL_free(macbuf.mac); return ret; } static int dtls_rlayer_buffer_record(OSSL_RECORD_LAYER *rl, struct pqueue_st *queue, unsigned char *priority) { DTLS_RLAYER_RECORD_DATA *rdata; pitem *item; if (pqueue_size(queue) >= 100) return 0; rdata = OPENSSL_malloc(sizeof(*rdata)); item = pitem_new(priority, rdata); if (rdata == NULL || item == NULL) { OPENSSL_free(rdata); pitem_free(item); RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } rdata->packet = rl->packet; rdata->packet_length = rl->packet_length; memcpy(&(rdata->rbuf), &rl->rbuf, sizeof(TLS_BUFFER)); memcpy(&(rdata->rrec), &rl->rrec[0], sizeof(TLS_RL_RECORD)); item->data = rdata; rl->packet = NULL; rl->packet_length = 0; memset(&rl->rbuf, 0, sizeof(TLS_BUFFER)); memset(&rl->rrec[0], 0, sizeof(rl->rrec[0])); if (!tls_setup_read_buffer(rl)) { OPENSSL_free(rdata->rbuf.buf); OPENSSL_free(rdata); pitem_free(item); return -1; } if (pqueue_insert(queue, item) == NULL) { OPENSSL_free(rdata->rbuf.buf); OPENSSL_free(rdata); pitem_free(item); } return 1; } static int dtls_copy_rlayer_record(OSSL_RECORD_LAYER *rl, pitem *item) { DTLS_RLAYER_RECORD_DATA *rdata; rdata = (DTLS_RLAYER_RECORD_DATA *)item->data; ossl_tls_buffer_release(&rl->rbuf); rl->packet = rdata->packet; rl->packet_length = rdata->packet_length; memcpy(&rl->rbuf, &(rdata->rbuf), sizeof(TLS_BUFFER)); memcpy(&rl->rrec[0], &(rdata->rrec), sizeof(TLS_RL_RECORD)); memcpy(&(rl->sequence[2]), &(rdata->packet[5]), 6); return 1; } static int dtls_retrieve_rlayer_buffered_record(OSSL_RECORD_LAYER *rl, struct pqueue_st *queue) { pitem *item; item = pqueue_pop(queue); if (item) { dtls_copy_rlayer_record(rl, item); OPENSSL_free(item->data); pitem_free(item); return 1; } return 0; } int dtls_get_more_records(OSSL_RECORD_LAYER *rl) { int ssl_major, ssl_minor; int rret; size_t more, n; TLS_RL_RECORD *rr; unsigned char *p = NULL; DTLS_BITMAP *bitmap; unsigned int is_next_epoch; rl->num_recs = 0; rl->curr_rec = 0; rl->num_released = 0; rr = rl->rrec; if (rl->rbuf.buf == NULL) { if (!tls_setup_read_buffer(rl)) { return OSSL_RECORD_RETURN_FATAL; } } again: if (dtls_retrieve_rlayer_buffered_record(rl, rl->processed_rcds)) { rl->num_recs = 1; return OSSL_RECORD_RETURN_SUCCESS; } if ((rl->rstate != SSL_ST_READ_BODY) || (rl->packet_length < DTLS1_RT_HEADER_LENGTH)) { rret = rl->funcs->read_n(rl, DTLS1_RT_HEADER_LENGTH, TLS_BUFFER_get_len(&rl->rbuf), 0, 1, &n); if (rret < OSSL_RECORD_RETURN_SUCCESS) { return rret; } if (rl->packet_length != DTLS1_RT_HEADER_LENGTH) { rl->packet_length = 0; goto again; } rl->rstate = SSL_ST_READ_BODY; p = rl->packet; rr->type = *(p++); ssl_major = *(p++); ssl_minor = *(p++); rr->rec_version = (ssl_major << 8) | ssl_minor; n2s(p, rr->epoch); memcpy(&(rl->sequence[2]), p, 6); p += 6; n2s(p, rr->length); if (rl->msg_callback != NULL) rl->msg_callback(0, rr->rec_version, SSL3_RT_HEADER, rl->packet, DTLS1_RT_HEADER_LENGTH, rl->cbarg); if (!rl->is_first_record && rr->type != SSL3_RT_ALERT) { if (rr->rec_version != rl->version) { rr->length = 0; rl->packet_length = 0; goto again; } } if (ssl_major != (rl->version == DTLS_ANY_VERSION ? DTLS1_VERSION_MAJOR : rl->version >> 8)) { rr->length = 0; rl->packet_length = 0; goto again; } if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH) { rr->length = 0; rl->packet_length = 0; goto again; } if (rr->length > rl->max_frag_len + SSL3_RT_MAX_ENCRYPTED_OVERHEAD) { rr->length = 0; rl->packet_length = 0; goto again; } } if (rr->length > rl->packet_length - DTLS1_RT_HEADER_LENGTH) { more = rr->length; rret = rl->funcs->read_n(rl, more, more, 1, 1, &n); if (rret < OSSL_RECORD_RETURN_SUCCESS || n != more) { if (rl->alert != SSL_AD_NO_ALERT) { return OSSL_RECORD_RETURN_FATAL; } rr->length = 0; rl->packet_length = 0; goto again; } } rl->rstate = SSL_ST_READ_HEADER; bitmap = dtls_get_bitmap(rl, rr, &is_next_epoch); if (bitmap == NULL) { rr->length = 0; rl->packet_length = 0; goto again; } #ifndef OPENSSL_NO_SCTP if (!BIO_dgram_is_sctp(rl->bio)) { #endif if (!dtls_record_replay_check(rl, bitmap)) { rr->length = 0; rl->packet_length = 0; goto again; } #ifndef OPENSSL_NO_SCTP } #endif if (rr->length == 0) goto again; if (is_next_epoch) { if (rl->in_init) { if (dtls_rlayer_buffer_record(rl, rl->unprocessed_rcds, rr->seq_num) < 0) { return OSSL_RECORD_RETURN_FATAL; } } rr->length = 0; rl->packet_length = 0; goto again; } if (!dtls_process_record(rl, bitmap)) { if (rl->alert != SSL_AD_NO_ALERT) { return OSSL_RECORD_RETURN_FATAL; } rr->length = 0; rl->packet_length = 0; goto again; } if (rl->funcs->post_process_record && !rl->funcs->post_process_record(rl, rr)) { return OSSL_RECORD_RETURN_FATAL; } rl->num_recs = 1; return OSSL_RECORD_RETURN_SUCCESS; } static int dtls_free(OSSL_RECORD_LAYER *rl) { TLS_BUFFER *rbuf; size_t left, written; pitem *item; DTLS_RLAYER_RECORD_DATA *rdata; int ret = 1; rbuf = &rl->rbuf; left = rbuf->left; if (left > 0) { ret = BIO_write_ex(rl->next, rbuf->buf + rbuf->offset, left, &written); rbuf->left = 0; } if (rl->unprocessed_rcds != NULL) { while ((item = pqueue_pop(rl->unprocessed_rcds)) != NULL) { rdata = (DTLS_RLAYER_RECORD_DATA *)item->data; ret &= BIO_write_ex(rl->next, rdata->packet, rdata->packet_length, &written); OPENSSL_free(rdata->rbuf.buf); OPENSSL_free(item->data); pitem_free(item); } pqueue_free(rl->unprocessed_rcds); } if (rl->processed_rcds!= NULL) { while ((item = pqueue_pop(rl->processed_rcds)) != NULL) { rdata = (DTLS_RLAYER_RECORD_DATA *)item->data; OPENSSL_free(rdata->rbuf.buf); OPENSSL_free(item->data); pitem_free(item); } pqueue_free(rl->processed_rcds); } return tls_free(rl) && ret; } static int dtls_new_record_layer(OSSL_LIB_CTX *libctx, const char *propq, int vers, int role, int direction, int level, uint16_t epoch, unsigned char *secret, size_t secretlen, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp, const EVP_MD *kdfdigest, BIO *prev, BIO *transport, BIO *next, BIO_ADDR *local, BIO_ADDR *peer, const OSSL_PARAM *settings, const OSSL_PARAM *options, const OSSL_DISPATCH *fns, void *cbarg, void *rlarg, OSSL_RECORD_LAYER **retrl) { int ret; ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, ciph, taglen, md, comp, prev, transport, next, settings, options, fns, cbarg, retrl); if (ret != OSSL_RECORD_RETURN_SUCCESS) return ret; (*retrl)->unprocessed_rcds = pqueue_new(); (*retrl)->processed_rcds = pqueue_new(); if ((*retrl)->unprocessed_rcds == NULL || (*retrl)->processed_rcds == NULL) { dtls_free(*retrl); *retrl = NULL; ERR_raise(ERR_LIB_SSL, ERR_R_SSL_LIB); return OSSL_RECORD_RETURN_FATAL; } (*retrl)->isdtls = 1; (*retrl)->epoch = epoch; (*retrl)->in_init = 1; switch (vers) { case DTLS_ANY_VERSION: (*retrl)->funcs = &dtls_any_funcs; break; case DTLS1_2_VERSION: case DTLS1_VERSION: case DTLS1_BAD_VER: (*retrl)->funcs = &dtls_1_funcs; break; default: ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); ret = OSSL_RECORD_RETURN_FATAL; goto err; } ret = (*retrl)->funcs->set_crypto_state(*retrl, level, key, keylen, iv, ivlen, mackey, mackeylen, ciph, taglen, mactype, md, comp); err: if (ret != OSSL_RECORD_RETURN_SUCCESS) { dtls_free(*retrl); *retrl = NULL; } return ret; } int dtls_prepare_record_header(OSSL_RECORD_LAYER *rl, WPACKET *thispkt, OSSL_RECORD_TEMPLATE *templ, uint8_t rectype, unsigned char **recdata) { size_t maxcomplen; *recdata = NULL; maxcomplen = templ->buflen; if (rl->compctx != NULL) maxcomplen += SSL3_RT_MAX_COMPRESSED_OVERHEAD; if (!WPACKET_put_bytes_u8(thispkt, rectype) || !WPACKET_put_bytes_u16(thispkt, templ->version) || !WPACKET_put_bytes_u16(thispkt, rl->epoch) || !WPACKET_memcpy(thispkt, &(rl->sequence[2]), 6) || !WPACKET_start_sub_packet_u16(thispkt) || (rl->eivlen > 0 && !WPACKET_allocate_bytes(thispkt, rl->eivlen, NULL)) || (maxcomplen > 0 && !WPACKET_reserve_bytes(thispkt, maxcomplen, recdata))) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } int dtls_post_encryption_processing(OSSL_RECORD_LAYER *rl, size_t mac_size, OSSL_RECORD_TEMPLATE *thistempl, WPACKET *thispkt, TLS_RL_RECORD *thiswr) { if (!tls_post_encryption_processing_default(rl, mac_size, thistempl, thispkt, thiswr)) { return 0; } return tls_increment_sequence_ctr(rl); } static size_t dtls_get_max_record_overhead(OSSL_RECORD_LAYER *rl) { size_t blocksize = 0; if (rl->enc_ctx != NULL && (EVP_CIPHER_CTX_get_mode(rl->enc_ctx) == EVP_CIPH_CBC_MODE)) blocksize = EVP_CIPHER_CTX_get_block_size(rl->enc_ctx); assert(rl->enc_ctx == NULL || ((blocksize == 0 || rl->eivlen > 0) && rl->taglen > 0)); assert(rl->md == NULL || (int)rl->taglen == EVP_MD_size(rl->md)); return DTLS1_RT_HEADER_LENGTH + rl->eivlen + blocksize + rl->taglen; } const OSSL_RECORD_METHOD ossl_dtls_record_method = { dtls_new_record_layer, dtls_free, tls_unprocessed_read_pending, tls_processed_read_pending, tls_app_data_pending, tls_get_max_records, tls_write_records, tls_retry_write_records, tls_read_record, tls_release_record, tls_get_alert_code, tls_set1_bio, tls_set_protocol_version, NULL, tls_set_first_handshake, tls_set_max_pipelines, dtls_set_in_init, tls_get_state, tls_set_options, tls_get_compression, tls_set_max_frag_len, dtls_get_max_record_overhead, tls_increment_sequence_ctr, tls_alloc_buffers, tls_free_buffers };
methods
openssl/ssl/record/methods/dtls_meth.c
openssl
#include <openssl/evp.h> #include <openssl/core_names.h> #include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" static int tls13_set_crypto_state(OSSL_RECORD_LAYER *rl, int level, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp) { EVP_CIPHER_CTX *ciph_ctx; int mode; int enc = (rl->direction == OSSL_RECORD_DIRECTION_WRITE) ? 1 : 0; if (ivlen > sizeof(rl->iv)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } memcpy(rl->iv, iv, ivlen); ciph_ctx = rl->enc_ctx = EVP_CIPHER_CTX_new(); if (ciph_ctx == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } mode = EVP_CIPHER_get_mode(ciph); if (EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, enc) <= 0 || EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_IVLEN, ivlen, NULL) <= 0 || (mode == EVP_CIPH_CCM_MODE && EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_TAG, taglen, NULL) <= 0) || EVP_CipherInit_ex(ciph_ctx, NULL, NULL, key, NULL, enc) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } return OSSL_RECORD_RETURN_SUCCESS; } static int tls13_cipher(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *recs, size_t n_recs, int sending, SSL_MAC_BUF *mac, size_t macsize) { EVP_CIPHER_CTX *ctx; unsigned char iv[EVP_MAX_IV_LENGTH], recheader[SSL3_RT_HEADER_LENGTH]; size_t ivlen, offset, loop, hdrlen; unsigned char *staticiv; unsigned char *seq = rl->sequence; int lenu, lenf; TLS_RL_RECORD *rec = &recs[0]; WPACKET wpkt; const EVP_CIPHER *cipher; int mode; if (n_recs != 1) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } ctx = rl->enc_ctx; staticiv = rl->iv; cipher = EVP_CIPHER_CTX_get0_cipher(ctx); if (cipher == NULL) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } mode = EVP_CIPHER_get_mode(cipher); if (ctx == NULL || rec->type == SSL3_RT_ALERT) { memmove(rec->data, rec->input, rec->length); rec->input = rec->data; return 1; } ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); if (!sending) { if (rec->length < rl->taglen + 1) return 0; rec->length -= rl->taglen; } if (ivlen < SEQ_NUM_SIZE) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } offset = ivlen - SEQ_NUM_SIZE; memcpy(iv, staticiv, offset); for (loop = 0; loop < SEQ_NUM_SIZE; loop++) iv[offset + loop] = staticiv[offset + loop] ^ seq[loop]; if (!tls_increment_sequence_ctr(rl)) { return 0; } if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, iv, sending) <= 0 || (!sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, rl->taglen, rec->data + rec->length) <= 0)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!WPACKET_init_static_len(&wpkt, recheader, sizeof(recheader), 0) || !WPACKET_put_bytes_u8(&wpkt, rec->type) || !WPACKET_put_bytes_u16(&wpkt, rec->rec_version) || !WPACKET_put_bytes_u16(&wpkt, rec->length + rl->taglen) || !WPACKET_get_total_written(&wpkt, &hdrlen) || hdrlen != SSL3_RT_HEADER_LENGTH || !WPACKET_finish(&wpkt)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); WPACKET_cleanup(&wpkt); return 0; } if ((mode == EVP_CIPH_CCM_MODE && EVP_CipherUpdate(ctx, NULL, &lenu, NULL, (unsigned int)rec->length) <= 0) || EVP_CipherUpdate(ctx, NULL, &lenu, recheader, sizeof(recheader)) <= 0 || EVP_CipherUpdate(ctx, rec->data, &lenu, rec->input, (unsigned int)rec->length) <= 0 || EVP_CipherFinal_ex(ctx, rec->data + lenu, &lenf) <= 0 || (size_t)(lenu + lenf) != rec->length) { return 0; } if (sending) { if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, rl->taglen, rec->data + rec->length) <= 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } rec->length += rl->taglen; } return 1; } static int tls13_validate_record_header(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { if (rec->type != SSL3_RT_APPLICATION_DATA && (rec->type != SSL3_RT_CHANGE_CIPHER_SPEC || !rl->is_first_handshake) && (rec->type != SSL3_RT_ALERT || !rl->allow_plain_alerts)) { RLAYERfatal(rl, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_BAD_RECORD_TYPE); return 0; } if (rec->rec_version != TLS1_2_VERSION) { RLAYERfatal(rl, SSL_AD_DECODE_ERROR, SSL_R_WRONG_VERSION_NUMBER); return 0; } if (rec->length > SSL3_RT_MAX_TLS13_ENCRYPTED_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_ENCRYPTED_LENGTH_TOO_LONG); return 0; } return 1; } static int tls13_post_process_record(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { if (rec->type != SSL3_RT_ALERT) { size_t end; if (rec->length == 0 || rec->type != SSL3_RT_APPLICATION_DATA) { RLAYERfatal(rl, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_BAD_RECORD_TYPE); return 0; } for (end = rec->length - 1; end > 0 && rec->data[end] == 0; end--) continue; rec->length = end; rec->type = rec->data[end]; } if (rec->length > SSL3_RT_MAX_PLAIN_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_DATA_LENGTH_TOO_LONG); return 0; } if (!tls13_common_post_process_record(rl, rec)) { return 0; } return 1; } static uint8_t tls13_get_record_type(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *template) { if (rl->allow_plain_alerts && template->type == SSL3_RT_ALERT) return SSL3_RT_ALERT; return SSL3_RT_APPLICATION_DATA; } static int tls13_add_record_padding(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *thistempl, WPACKET *thispkt, TLS_RL_RECORD *thiswr) { size_t rlen; if (rl->allow_plain_alerts && thistempl->type != SSL3_RT_ALERT) return 1; if (!WPACKET_put_bytes_u8(thispkt, thistempl->type)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } TLS_RL_RECORD_add_length(thiswr, 1); rlen = TLS_RL_RECORD_get_length(thiswr); if (rlen < rl->max_frag_len) { size_t padding = 0; size_t max_padding = rl->max_frag_len - rlen; if (rl->padding != NULL) { padding = rl->padding(rl->cbarg, thistempl->type, rlen); } else if (rl->block_padding > 0) { size_t mask = rl->block_padding - 1; size_t remainder; if ((rl->block_padding & mask) == 0) remainder = rlen & mask; else remainder = rlen % rl->block_padding; if (remainder == 0) padding = 0; else padding = rl->block_padding - remainder; } if (padding > 0) { if (padding > max_padding) padding = max_padding; if (!WPACKET_memset(thispkt, 0, padding)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } TLS_RL_RECORD_add_length(thiswr, padding); } } return 1; } const struct record_functions_st tls_1_3_funcs = { tls13_set_crypto_state, tls13_cipher, NULL, tls_default_set_protocol_version, tls_default_read_n, tls_get_more_records, tls13_validate_record_header, tls13_post_process_record, tls_get_max_records_default, tls_write_records_default, tls_allocate_write_buffers_default, tls_initialise_write_packets_default, tls13_get_record_type, tls_prepare_record_header_default, tls13_add_record_padding, tls_prepare_for_encryption_default, tls_post_encryption_processing_default, NULL };
methods
openssl/ssl/record/methods/tls13_meth.c
openssl
#include <openssl/evp.h> #include <openssl/core_names.h> #include "internal/ssl3_cbc.h" #include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" static int ssl3_set_crypto_state(OSSL_RECORD_LAYER *rl, int level, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp) { EVP_CIPHER_CTX *ciph_ctx; int enc = (rl->direction == OSSL_RECORD_DIRECTION_WRITE) ? 1 : 0; if (md == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if ((rl->enc_ctx = EVP_CIPHER_CTX_new()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } ciph_ctx = rl->enc_ctx; rl->md_ctx = EVP_MD_CTX_new(); if (rl->md_ctx == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if ((md != NULL && EVP_DigestInit_ex(rl->md_ctx, md, NULL) <= 0)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } #ifndef OPENSSL_NO_COMP if (comp != NULL) { rl->compctx = COMP_CTX_new(comp); if (rl->compctx == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_COMPRESSION_LIBRARY_ERROR); return OSSL_RECORD_RETURN_FATAL; } } #endif if (!EVP_CipherInit_ex(ciph_ctx, ciph, NULL, key, iv, enc)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if (EVP_CIPHER_get0_provider(EVP_CIPHER_CTX_get0_cipher(ciph_ctx)) != NULL && !ossl_set_tls_provider_parameters(rl, ciph_ctx, ciph, md)) { return OSSL_RECORD_RETURN_FATAL; } if (mackeylen > sizeof(rl->mac_secret)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } memcpy(rl->mac_secret, mackey, mackeylen); return OSSL_RECORD_RETURN_SUCCESS; } static int ssl3_cipher(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *inrecs, size_t n_recs, int sending, SSL_MAC_BUF *mac, size_t macsize) { TLS_RL_RECORD *rec; EVP_CIPHER_CTX *ds; size_t l, i; size_t bs; const EVP_CIPHER *enc; int provided; rec = inrecs; if (n_recs != 1) return 0; ds = rl->enc_ctx; if (ds == NULL || (enc = EVP_CIPHER_CTX_get0_cipher(ds)) == NULL) return 0; provided = (EVP_CIPHER_get0_provider(enc) != NULL); l = rec->length; bs = EVP_CIPHER_CTX_get_block_size(ds); if (bs == 0) return 0; if ((bs != 1) && sending && !provided) { i = bs - (l % bs); l += i; memset(&rec->input[rec->length], 0, i); rec->length += i; rec->input[l - 1] = (unsigned char)(i - 1); } if (!sending) { if (l == 0 || l % bs != 0) { return 0; } } if (provided) { int outlen; if (!EVP_CipherUpdate(ds, rec->data, &outlen, rec->input, (unsigned int)l)) return 0; rec->length = outlen; if (!sending && mac != NULL) { OSSL_PARAM params[2], *p = params; mac->alloced = 0; *p++ = OSSL_PARAM_construct_octet_ptr(OSSL_CIPHER_PARAM_TLS_MAC, (void **)&mac->mac, macsize); *p = OSSL_PARAM_construct_end(); if (!EVP_CIPHER_CTX_get_params(ds, params)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } } else { if (EVP_Cipher(ds, rec->data, rec->input, (unsigned int)l) < 1) { RLAYERfatal(rl, SSL_AD_BAD_RECORD_MAC, ERR_R_INTERNAL_ERROR); return 0; } if (!sending) return ssl3_cbc_remove_padding_and_mac(&rec->length, rec->orig_len, rec->data, (mac != NULL) ? &mac->mac : NULL, (mac != NULL) ? &mac->alloced : NULL, bs, macsize, rl->libctx); } return 1; } static const unsigned char ssl3_pad_1[48] = { 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36 }; static const unsigned char ssl3_pad_2[48] = { 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c }; static int ssl3_mac(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec, unsigned char *md, int sending) { unsigned char *mac_sec, *seq = rl->sequence; const EVP_MD_CTX *hash; unsigned char *p, rec_char; size_t md_size; size_t npad; int t; mac_sec = &(rl->mac_secret[0]); hash = rl->md_ctx; t = EVP_MD_CTX_get_size(hash); if (t <= 0) return 0; md_size = t; npad = (48 / md_size) * md_size; if (!sending && EVP_CIPHER_CTX_get_mode(rl->enc_ctx) == EVP_CIPH_CBC_MODE && ssl3_cbc_record_digest_supported(hash)) { #ifdef OPENSSL_NO_DEPRECATED_3_0 return 0; #else unsigned char header[75]; size_t j = 0; memcpy(header + j, mac_sec, md_size); j += md_size; memcpy(header + j, ssl3_pad_1, npad); j += npad; memcpy(header + j, seq, 8); j += 8; header[j++] = rec->type; header[j++] = (unsigned char)(rec->length >> 8); header[j++] = (unsigned char)(rec->length & 0xff); if (ssl3_cbc_digest_record(EVP_MD_CTX_get0_md(hash), md, &md_size, header, rec->input, rec->length, rec->orig_len, mac_sec, md_size, 1) <= 0) return 0; #endif } else { unsigned int md_size_u; EVP_MD_CTX *md_ctx = EVP_MD_CTX_new(); if (md_ctx == NULL) return 0; rec_char = rec->type; p = md; s2n(rec->length, p); if (EVP_MD_CTX_copy_ex(md_ctx, hash) <= 0 || EVP_DigestUpdate(md_ctx, mac_sec, md_size) <= 0 || EVP_DigestUpdate(md_ctx, ssl3_pad_1, npad) <= 0 || EVP_DigestUpdate(md_ctx, seq, 8) <= 0 || EVP_DigestUpdate(md_ctx, &rec_char, 1) <= 0 || EVP_DigestUpdate(md_ctx, md, 2) <= 0 || EVP_DigestUpdate(md_ctx, rec->input, rec->length) <= 0 || EVP_DigestFinal_ex(md_ctx, md, NULL) <= 0 || EVP_MD_CTX_copy_ex(md_ctx, hash) <= 0 || EVP_DigestUpdate(md_ctx, mac_sec, md_size) <= 0 || EVP_DigestUpdate(md_ctx, ssl3_pad_2, npad) <= 0 || EVP_DigestUpdate(md_ctx, md, md_size) <= 0 || EVP_DigestFinal_ex(md_ctx, md, &md_size_u) <= 0) { EVP_MD_CTX_free(md_ctx); return 0; } EVP_MD_CTX_free(md_ctx); } if (!tls_increment_sequence_ctr(rl)) return 0; return 1; } const struct record_functions_st ssl_3_0_funcs = { ssl3_set_crypto_state, ssl3_cipher, ssl3_mac, tls_default_set_protocol_version, tls_default_read_n, tls_get_more_records, tls_default_validate_record_header, tls_default_post_process_record, tls_get_max_records_default, tls_write_records_default, tls1_allocate_write_buffers, tls1_initialise_write_packets, NULL, tls_prepare_record_header_default, NULL, tls_prepare_for_encryption_default, tls_post_encryption_processing_default, NULL };
methods
openssl/ssl/record/methods/ssl3_meth.c
openssl
#include <openssl/evp.h> #include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" #define MIN_SSL2_RECORD_LEN 9 static int tls_any_set_crypto_state(OSSL_RECORD_LAYER *rl, int level, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp) { if (level != OSSL_RECORD_PROTECTION_LEVEL_NONE) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } return OSSL_RECORD_RETURN_SUCCESS; } static int tls_any_cipher(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *recs, size_t n_recs, int sending, SSL_MAC_BUF *macs, size_t macsize) { return 1; } static int tls_validate_record_header(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { if (rec->rec_version == SSL2_VERSION) { if (!ossl_assert(rl->version == TLS_ANY_VERSION)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (rec->length < MIN_SSL2_RECORD_LEN) { RLAYERfatal(rl, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_TOO_SHORT); return 0; } } else { if (rl->version == TLS_ANY_VERSION) { if ((rec->rec_version >> 8) != SSL3_VERSION_MAJOR) { if (rl->is_first_record) { unsigned char *p; p = rl->packet; if (HAS_PREFIX((char *)p, "GET ") || HAS_PREFIX((char *)p, "POST ") || HAS_PREFIX((char *)p, "HEAD ") || HAS_PREFIX((char *)p, "PUT ")) { RLAYERfatal(rl, SSL_AD_NO_ALERT, SSL_R_HTTP_REQUEST); return 0; } else if (HAS_PREFIX((char *)p, "CONNE")) { RLAYERfatal(rl, SSL_AD_NO_ALERT, SSL_R_HTTPS_PROXY_REQUEST); return 0; } RLAYERfatal(rl, SSL_AD_NO_ALERT, SSL_R_WRONG_VERSION_NUMBER); return 0; } else { RLAYERfatal(rl, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_VERSION_NUMBER); return 0; } } } else if (rl->version == TLS1_3_VERSION) { } else if (rec->rec_version != rl->version) { if ((rl->version & 0xFF00) == (rec->rec_version & 0xFF00)) { if (rec->type == SSL3_RT_ALERT) { RLAYERfatal(rl, SSL_AD_NO_ALERT, SSL_R_WRONG_VERSION_NUMBER); return 0; } rl->version = (unsigned short)rec->rec_version; } RLAYERfatal(rl, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_VERSION_NUMBER); return 0; } } if (rec->length > SSL3_RT_MAX_PLAIN_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_DATA_LENGTH_TOO_LONG); return 0; } return 1; } static int tls_any_set_protocol_version(OSSL_RECORD_LAYER *rl, int vers) { if (rl->version != TLS_ANY_VERSION && rl->version != vers) return 0; rl->version = vers; return 1; } static int tls_any_prepare_for_encryption(OSSL_RECORD_LAYER *rl, size_t mac_size, WPACKET *thispkt, TLS_RL_RECORD *thiswr) { return 1; } const struct record_functions_st tls_any_funcs = { tls_any_set_crypto_state, tls_any_cipher, NULL, tls_any_set_protocol_version, tls_default_read_n, tls_get_more_records, tls_validate_record_header, tls_default_post_process_record, tls_get_max_records_default, tls_write_records_default, tls_allocate_write_buffers_default, tls_initialise_write_packets_default, NULL, tls_prepare_record_header_default, NULL, tls_any_prepare_for_encryption, tls_post_encryption_processing_default, NULL }; static int dtls_any_set_protocol_version(OSSL_RECORD_LAYER *rl, int vers) { if (rl->version != DTLS_ANY_VERSION && rl->version != vers) return 0; rl->version = vers; return 1; } const struct record_functions_st dtls_any_funcs = { tls_any_set_crypto_state, tls_any_cipher, NULL, dtls_any_set_protocol_version, tls_default_read_n, dtls_get_more_records, NULL, NULL, NULL, tls_write_records_default, tls_allocate_write_buffers_default, tls_initialise_write_packets_default, NULL, dtls_prepare_record_header, NULL, tls_prepare_for_encryption_default, dtls_post_encryption_processing, NULL };
methods
openssl/ssl/record/methods/tlsany_meth.c
openssl
#include <assert.h> #include <openssl/bio.h> #include <openssl/ssl.h> #include <openssl/err.h> #include <openssl/core_names.h> #include <openssl/comp.h> #include <openssl/ssl.h> #include "internal/e_os.h" #include "internal/packet.h" #include "internal/ssl3_cbc.h" #include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" static void tls_int_free(OSSL_RECORD_LAYER *rl); void ossl_tls_buffer_release(TLS_BUFFER *b) { OPENSSL_free(b->buf); b->buf = NULL; } static void TLS_RL_RECORD_release(TLS_RL_RECORD *r, size_t num_recs) { size_t i; for (i = 0; i < num_recs; i++) { OPENSSL_free(r[i].comp); r[i].comp = NULL; } } void ossl_tls_rl_record_set_seq_num(TLS_RL_RECORD *r, const unsigned char *seq_num) { memcpy(r->seq_num, seq_num, SEQ_NUM_SIZE); } void ossl_rlayer_fatal(OSSL_RECORD_LAYER *rl, int al, int reason, const char *fmt, ...) { va_list args; va_start(args, fmt); ERR_vset_error(ERR_LIB_SSL, reason, fmt, args); va_end(args); rl->alert = al; } int ossl_set_tls_provider_parameters(OSSL_RECORD_LAYER *rl, EVP_CIPHER_CTX *ctx, const EVP_CIPHER *ciph, const EVP_MD *md) { OSSL_PARAM params[3], *pprm = params; size_t macsize = 0; int imacsize = -1; if ((EVP_CIPHER_get_flags(ciph) & EVP_CIPH_FLAG_AEAD_CIPHER) == 0 && !rl->use_etm) imacsize = EVP_MD_get_size(md); if (imacsize >= 0) macsize = (size_t)imacsize; *pprm++ = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_TLS_VERSION, &rl->version); *pprm++ = OSSL_PARAM_construct_size_t(OSSL_CIPHER_PARAM_TLS_MAC_SIZE, &macsize); *pprm = OSSL_PARAM_construct_end(); if (!EVP_CIPHER_CTX_set_params(ctx, params)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } return 1; } char ssl3_cbc_record_digest_supported(const EVP_MD_CTX *ctx) { switch (EVP_MD_CTX_get_type(ctx)) { case NID_md5: case NID_sha1: case NID_sha224: case NID_sha256: case NID_sha384: case NID_sha512: return 1; default: return 0; } } #ifndef OPENSSL_NO_COMP static int tls_allow_compression(OSSL_RECORD_LAYER *rl) { if (rl->options & SSL_OP_NO_COMPRESSION) return 0; return rl->security == NULL || rl->security(rl->cbarg, SSL_SECOP_COMPRESSION, 0, 0, NULL); } #endif static void tls_release_write_buffer_int(OSSL_RECORD_LAYER *rl, size_t start) { TLS_BUFFER *wb; size_t pipes; pipes = rl->numwpipes; while (pipes > start) { wb = &rl->wbuf[pipes - 1]; if (TLS_BUFFER_is_app_buffer(wb)) TLS_BUFFER_set_app_buffer(wb, 0); else OPENSSL_free(wb->buf); wb->buf = NULL; pipes--; } } int tls_setup_write_buffer(OSSL_RECORD_LAYER *rl, size_t numwpipes, size_t firstlen, size_t nextlen) { unsigned char *p; size_t align = 0, headerlen; TLS_BUFFER *wb; size_t currpipe; size_t defltlen = 0; size_t contenttypelen = 0; if (firstlen == 0 || (numwpipes > 1 && nextlen == 0)) { if (rl->isdtls) headerlen = DTLS1_RT_HEADER_LENGTH + 1; else headerlen = SSL3_RT_HEADER_LENGTH; if (rl->version == TLS1_3_VERSION) contenttypelen = 1; #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD != 0 align = SSL3_ALIGN_PAYLOAD - 1; #endif defltlen = align + headerlen + rl->eivlen + rl->max_frag_len + contenttypelen + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD; #ifndef OPENSSL_NO_COMP if (tls_allow_compression(rl)) defltlen += SSL3_RT_MAX_COMPRESSED_OVERHEAD; #endif if ((rl->options & SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS) == 0) defltlen += headerlen + align + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD; } wb = rl->wbuf; for (currpipe = 0; currpipe < numwpipes; currpipe++) { TLS_BUFFER *thiswb = &wb[currpipe]; size_t len = (currpipe == 0) ? firstlen : nextlen; if (len == 0) len = defltlen; if (thiswb->len != len) { OPENSSL_free(thiswb->buf); thiswb->buf = NULL; } p = thiswb->buf; if (p == NULL) { p = OPENSSL_malloc(len); if (p == NULL) { if (rl->numwpipes < currpipe) rl->numwpipes = currpipe; RLAYERfatal(rl, SSL_AD_NO_ALERT, ERR_R_CRYPTO_LIB); return 0; } } memset(thiswb, 0, sizeof(TLS_BUFFER)); thiswb->buf = p; thiswb->len = len; } tls_release_write_buffer_int(rl, currpipe); rl->numwpipes = numwpipes; return 1; } static void tls_release_write_buffer(OSSL_RECORD_LAYER *rl) { tls_release_write_buffer_int(rl, 0); rl->numwpipes = 0; } int tls_setup_read_buffer(OSSL_RECORD_LAYER *rl) { unsigned char *p; size_t len, align = 0, headerlen; TLS_BUFFER *b; b = &rl->rbuf; if (rl->isdtls) headerlen = DTLS1_RT_HEADER_LENGTH; else headerlen = SSL3_RT_HEADER_LENGTH; #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD != 0 align = (-SSL3_RT_HEADER_LENGTH) & (SSL3_ALIGN_PAYLOAD - 1); #endif if (b->buf == NULL) { len = rl->max_frag_len + SSL3_RT_MAX_ENCRYPTED_OVERHEAD + headerlen + align; #ifndef OPENSSL_NO_COMP if (tls_allow_compression(rl)) len += SSL3_RT_MAX_COMPRESSED_OVERHEAD; #endif if (rl->max_pipelines > 1) len *= rl->max_pipelines; if (b->default_len > len) len = b->default_len; if ((p = OPENSSL_malloc(len)) == NULL) { RLAYERfatal(rl, SSL_AD_NO_ALERT, ERR_R_CRYPTO_LIB); return 0; } b->buf = p; b->len = len; } return 1; } static int tls_release_read_buffer(OSSL_RECORD_LAYER *rl) { TLS_BUFFER *b; b = &rl->rbuf; if ((rl->options & SSL_OP_CLEANSE_PLAINTEXT) != 0) OPENSSL_cleanse(b->buf, b->len); OPENSSL_free(b->buf); b->buf = NULL; return 1; } int tls_default_read_n(OSSL_RECORD_LAYER *rl, size_t n, size_t max, int extend, int clearold, size_t *readbytes) { size_t len, left, align = 0; unsigned char *pkt; TLS_BUFFER *rb; if (n == 0) return OSSL_RECORD_RETURN_NON_FATAL_ERR; rb = &rl->rbuf; left = rb->left; #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD != 0 align = (size_t)rb->buf + SSL3_RT_HEADER_LENGTH; align = SSL3_ALIGN_PAYLOAD - 1 - ((align - 1) % SSL3_ALIGN_PAYLOAD); #endif if (!extend) { if (left == 0) rb->offset = align; rl->packet = rb->buf + rb->offset; rl->packet_length = 0; } len = rl->packet_length; pkt = rb->buf + align; if (rl->packet != pkt && clearold == 1) { memmove(pkt, rl->packet, len + left); rl->packet = pkt; rb->offset = len + align; } if (rl->isdtls) { if (left == 0 && extend) { return OSSL_RECORD_RETURN_NON_FATAL_ERR; } if (left > 0 && n > left) n = left; } if (left >= n) { rl->packet_length += n; rb->left = left - n; rb->offset += n; *readbytes = n; return OSSL_RECORD_RETURN_SUCCESS; } if (n > rb->len - rb->offset) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if (!rl->read_ahead && !rl->isdtls) { max = n; } else { if (max < n) max = n; if (max > rb->len - rb->offset) max = rb->len - rb->offset; } while (left < n) { size_t bioread = 0; int ret; BIO *bio = rl->prev != NULL ? rl->prev : rl->bio; clear_sys_error(); if (bio != NULL) { ret = BIO_read(bio, pkt + len + left, max - left); if (ret > 0) { bioread = ret; ret = OSSL_RECORD_RETURN_SUCCESS; } else if (BIO_should_retry(bio)) { if (rl->prev != NULL) { BIO_free(rl->prev); rl->prev = NULL; continue; } ret = OSSL_RECORD_RETURN_RETRY; } else if (BIO_eof(bio)) { ret = OSSL_RECORD_RETURN_EOF; } else { ret = OSSL_RECORD_RETURN_FATAL; } } else { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_READ_BIO_NOT_SET); ret = OSSL_RECORD_RETURN_FATAL; } if (ret <= OSSL_RECORD_RETURN_RETRY) { rb->left = left; if ((rl->mode & SSL_MODE_RELEASE_BUFFERS) != 0 && !rl->isdtls) if (len + left == 0) tls_release_read_buffer(rl); return ret; } left += bioread; if (rl->isdtls) { if (n > left) n = left; } } rb->offset += n; rb->left = left - n; rl->packet_length += n; *readbytes = n; return OSSL_RECORD_RETURN_SUCCESS; } static int tls_record_app_data_waiting(OSSL_RECORD_LAYER *rl) { TLS_BUFFER *rbuf; size_t left, len; unsigned char *p; rbuf = &rl->rbuf; p = TLS_BUFFER_get_buf(rbuf); if (p == NULL) return 0; left = TLS_BUFFER_get_left(rbuf); if (left < SSL3_RT_HEADER_LENGTH) return 0; p += TLS_BUFFER_get_offset(rbuf); if (*p != SSL3_RT_APPLICATION_DATA) return 0; p += 3; n2s(p, len); if (left < SSL3_RT_HEADER_LENGTH + len) return 0; return 1; } static int rlayer_early_data_count_ok(OSSL_RECORD_LAYER *rl, size_t length, size_t overhead, int send) { uint32_t max_early_data = rl->max_early_data; if (max_early_data == 0) { RLAYERfatal(rl, send ? SSL_AD_INTERNAL_ERROR : SSL_AD_UNEXPECTED_MESSAGE, SSL_R_TOO_MUCH_EARLY_DATA); return 0; } max_early_data += overhead; if (rl->early_data_count + length > max_early_data) { RLAYERfatal(rl, send ? SSL_AD_INTERNAL_ERROR : SSL_AD_UNEXPECTED_MESSAGE, SSL_R_TOO_MUCH_EARLY_DATA); return 0; } rl->early_data_count += length; return 1; } #define MAX_EMPTY_RECORDS 32 #define SSL2_RT_HEADER_LENGTH 2 int tls_get_more_records(OSSL_RECORD_LAYER *rl) { int enc_err, rret; int i; size_t more, n; TLS_RL_RECORD *rr, *thisrr; TLS_BUFFER *rbuf; unsigned char *p; unsigned char md[EVP_MAX_MD_SIZE]; unsigned int version; size_t mac_size = 0; int imac_size; size_t num_recs = 0, max_recs, j; PACKET pkt, sslv2pkt; SSL_MAC_BUF *macbufs = NULL; int ret = OSSL_RECORD_RETURN_FATAL; rr = rl->rrec; rbuf = &rl->rbuf; if (rbuf->buf == NULL) { if (!tls_setup_read_buffer(rl)) { return OSSL_RECORD_RETURN_FATAL; } } max_recs = rl->max_pipelines; if (max_recs == 0) max_recs = 1; do { thisrr = &rr[num_recs]; if ((rl->rstate != SSL_ST_READ_BODY) || (rl->packet_length < SSL3_RT_HEADER_LENGTH)) { size_t sslv2len; unsigned int type; rret = rl->funcs->read_n(rl, SSL3_RT_HEADER_LENGTH, TLS_BUFFER_get_len(rbuf), 0, num_recs == 0 ? 1 : 0, &n); if (rret < OSSL_RECORD_RETURN_SUCCESS) return rret; rl->rstate = SSL_ST_READ_BODY; p = rl->packet; if (!PACKET_buf_init(&pkt, p, rl->packet_length)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } sslv2pkt = pkt; if (!PACKET_get_net_2_len(&sslv2pkt, &sslv2len) || !PACKET_get_1(&sslv2pkt, &type)) { RLAYERfatal(rl, SSL_AD_DECODE_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if (rl->role == OSSL_RECORD_ROLE_SERVER && rl->is_first_record && (sslv2len & 0x8000) != 0 && (type == SSL2_MT_CLIENT_HELLO)) { thisrr->type = SSL3_RT_HANDSHAKE; thisrr->rec_version = SSL2_VERSION; thisrr->length = sslv2len & 0x7fff; if (thisrr->length > TLS_BUFFER_get_len(rbuf) - SSL2_RT_HEADER_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_PACKET_LENGTH_TOO_LONG); return OSSL_RECORD_RETURN_FATAL; } } else { if (!PACKET_get_1(&pkt, &type) || !PACKET_get_net_2(&pkt, &version) || !PACKET_get_net_2_len(&pkt, &thisrr->length)) { if (rl->msg_callback != NULL) rl->msg_callback(0, 0, SSL3_RT_HEADER, p, 5, rl->cbarg); RLAYERfatal(rl, SSL_AD_DECODE_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } thisrr->type = type; thisrr->rec_version = version; if (thisrr->rec_version == SSL2_VERSION) { RLAYERfatal(rl, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_VERSION_NUMBER); return OSSL_RECORD_RETURN_FATAL; } if (rl->msg_callback != NULL) rl->msg_callback(0, version, SSL3_RT_HEADER, p, 5, rl->cbarg); if (thisrr->length > TLS_BUFFER_get_len(rbuf) - SSL3_RT_HEADER_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_PACKET_LENGTH_TOO_LONG); return OSSL_RECORD_RETURN_FATAL; } } if (!rl->funcs->validate_record_header(rl, thisrr)) { return OSSL_RECORD_RETURN_FATAL; } } if (thisrr->rec_version == SSL2_VERSION) { more = thisrr->length + SSL2_RT_HEADER_LENGTH - SSL3_RT_HEADER_LENGTH; } else { more = thisrr->length; } if (more > 0) { rret = rl->funcs->read_n(rl, more, more, 1, 0, &n); if (rret < OSSL_RECORD_RETURN_SUCCESS) return rret; } rl->rstate = SSL_ST_READ_HEADER; if (thisrr->rec_version == SSL2_VERSION) thisrr->input = &(rl->packet[SSL2_RT_HEADER_LENGTH]); else thisrr->input = &(rl->packet[SSL3_RT_HEADER_LENGTH]); thisrr->data = thisrr->input; thisrr->orig_len = thisrr->length; num_recs++; rl->packet_length = 0; rl->is_first_record = 0; } while (num_recs < max_recs && thisrr->type == SSL3_RT_APPLICATION_DATA && RLAYER_USE_EXPLICIT_IV(rl) && rl->enc_ctx != NULL && (EVP_CIPHER_get_flags(EVP_CIPHER_CTX_get0_cipher(rl->enc_ctx)) & EVP_CIPH_FLAG_PIPELINE) != 0 && tls_record_app_data_waiting(rl)); if (num_recs == 1 && thisrr->type == SSL3_RT_CHANGE_CIPHER_SPEC && rl->version == TLS1_3_VERSION && rl->is_first_handshake) { if (thisrr->length != 1 || thisrr->data[0] != 0x01) { RLAYERfatal(rl, SSL_AD_ILLEGAL_PARAMETER, SSL_R_INVALID_CCS_MESSAGE); return OSSL_RECORD_RETURN_FATAL; } thisrr->type = SSL3_RT_HANDSHAKE; if (++(rl->empty_record_count) > MAX_EMPTY_RECORDS) { RLAYERfatal(rl, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_UNEXPECTED_CCS_MESSAGE); return OSSL_RECORD_RETURN_FATAL; } rl->num_recs = 0; rl->curr_rec = 0; rl->num_released = 0; return OSSL_RECORD_RETURN_SUCCESS; } if (rl->md_ctx != NULL) { const EVP_MD *tmpmd = EVP_MD_CTX_get0_md(rl->md_ctx); if (tmpmd != NULL) { imac_size = EVP_MD_get_size(tmpmd); if (!ossl_assert(imac_size >= 0 && imac_size <= EVP_MAX_MD_SIZE)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return OSSL_RECORD_RETURN_FATAL; } mac_size = (size_t)imac_size; } } if (rl->use_etm && rl->md_ctx != NULL) { unsigned char *mac; for (j = 0; j < num_recs; j++) { thisrr = &rr[j]; if (thisrr->length < mac_size) { RLAYERfatal(rl, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_TOO_SHORT); return OSSL_RECORD_RETURN_FATAL; } thisrr->length -= mac_size; mac = thisrr->data + thisrr->length; i = rl->funcs->mac(rl, thisrr, md, 0 ); if (i == 0 || CRYPTO_memcmp(md, mac, mac_size) != 0) { RLAYERfatal(rl, SSL_AD_BAD_RECORD_MAC, SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); return OSSL_RECORD_RETURN_FATAL; } } mac_size = 0; } if (mac_size > 0) { macbufs = OPENSSL_zalloc(sizeof(*macbufs) * num_recs); if (macbufs == NULL) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB); return OSSL_RECORD_RETURN_FATAL; } } ERR_set_mark(); enc_err = rl->funcs->cipher(rl, rr, num_recs, 0, macbufs, mac_size); if (enc_err == 0) { if (rl->alert != SSL_AD_NO_ALERT) { ERR_clear_last_mark(); goto end; } if (num_recs == 1 && rl->skip_early_data != NULL && rl->skip_early_data(rl->cbarg)) { ERR_pop_to_mark(); thisrr = &rr[0]; if (!rlayer_early_data_count_ok(rl, thisrr->length, EARLY_DATA_CIPHERTEXT_OVERHEAD, 0)) { goto end; } thisrr->length = 0; rl->num_recs = 0; rl->curr_rec = 0; rl->num_released = 0; memset(rl->sequence, 0, sizeof(rl->sequence)); ret = 1; goto end; } ERR_clear_last_mark(); RLAYERfatal(rl, SSL_AD_BAD_RECORD_MAC, SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); goto end; } else { ERR_clear_last_mark(); } OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "dec %lu\n", (unsigned long)rr[0].length); BIO_dump_indent(trc_out, rr[0].data, rr[0].length, 4); } OSSL_TRACE_END(TLS); if (rl->enc_ctx != NULL && !rl->use_etm && EVP_MD_CTX_get0_md(rl->md_ctx) != NULL) { for (j = 0; j < num_recs; j++) { SSL_MAC_BUF *thismb = &macbufs[j]; thisrr = &rr[j]; i = rl->funcs->mac(rl, thisrr, md, 0 ); if (i == 0 || thismb == NULL || thismb->mac == NULL || CRYPTO_memcmp(md, thismb->mac, (size_t)mac_size) != 0) enc_err = 0; if (thisrr->length > SSL3_RT_MAX_COMPRESSED_LENGTH + mac_size) enc_err = 0; #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION if (enc_err == 0 && mac_size > 0 && thismb != NULL && thismb->mac != NULL && (md[0] ^ thismb->mac[0]) != 0xFF) { enc_err = 1; } #endif } } if (enc_err == 0) { if (rl->alert != SSL_AD_NO_ALERT) { goto end; } RLAYERfatal(rl, SSL_AD_BAD_RECORD_MAC, SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); goto end; } for (j = 0; j < num_recs; j++) { thisrr = &rr[j]; if (!rl->funcs->post_process_record(rl, thisrr)) { goto end; } if (rl->max_frag_len != SSL3_RT_MAX_PLAIN_LENGTH && thisrr->length > rl->max_frag_len) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_DATA_LENGTH_TOO_LONG); goto end; } thisrr->off = 0; if (thisrr->length == 0) { if (++(rl->empty_record_count) > MAX_EMPTY_RECORDS) { RLAYERfatal(rl, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_RECORD_TOO_SMALL); goto end; } } else { rl->empty_record_count = 0; } } if (rl->level == OSSL_RECORD_PROTECTION_LEVEL_EARLY) { thisrr = &rr[0]; if (thisrr->type == SSL3_RT_APPLICATION_DATA && !rlayer_early_data_count_ok(rl, thisrr->length, 0, 0)) { goto end; } } rl->num_recs = num_recs; rl->curr_rec = 0; rl->num_released = 0; ret = OSSL_RECORD_RETURN_SUCCESS; end: if (macbufs != NULL) { for (j = 0; j < num_recs; j++) { if (macbufs[j].alloced) OPENSSL_free(macbufs[j].mac); } OPENSSL_free(macbufs); } return ret; } int tls_default_validate_record_header(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { size_t len = SSL3_RT_MAX_ENCRYPTED_LENGTH; if (rec->rec_version != rl->version) { RLAYERfatal(rl, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_VERSION_NUMBER); return 0; } #ifndef OPENSSL_NO_COMP if (rl->compctx == NULL) len -= SSL3_RT_MAX_COMPRESSED_OVERHEAD; #endif if (rec->length > len) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_ENCRYPTED_LENGTH_TOO_LONG); return 0; } return 1; } int tls_do_compress(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *wr) { #ifndef OPENSSL_NO_COMP int i; i = COMP_compress_block(rl->compctx, wr->data, (int)(wr->length + SSL3_RT_MAX_COMPRESSED_OVERHEAD), wr->input, (int)wr->length); if (i < 0) return 0; wr->length = i; wr->input = wr->data; return 1; #else return 0; #endif } int tls_do_uncompress(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { #ifndef OPENSSL_NO_COMP int i; if (rec->comp == NULL) { rec->comp = (unsigned char *) OPENSSL_malloc(SSL3_RT_MAX_ENCRYPTED_LENGTH); } if (rec->comp == NULL) return 0; i = COMP_expand_block(rl->compctx, rec->comp, SSL3_RT_MAX_PLAIN_LENGTH, rec->data, (int)rec->length); if (i < 0) return 0; else rec->length = i; rec->data = rec->comp; return 1; #else return 0; #endif } int tls_default_post_process_record(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { if (rl->compctx != NULL) { if (rec->length > SSL3_RT_MAX_COMPRESSED_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_COMPRESSED_LENGTH_TOO_LONG); return 0; } if (!tls_do_uncompress(rl, rec)) { RLAYERfatal(rl, SSL_AD_DECOMPRESSION_FAILURE, SSL_R_BAD_DECOMPRESSION); return 0; } } if (rec->length > SSL3_RT_MAX_PLAIN_LENGTH) { RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_DATA_LENGTH_TOO_LONG); return 0; } return 1; } int tls13_common_post_process_record(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { if (rec->type != SSL3_RT_APPLICATION_DATA && rec->type != SSL3_RT_ALERT && rec->type != SSL3_RT_HANDSHAKE) { RLAYERfatal(rl, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_BAD_RECORD_TYPE); return 0; } if (rl->msg_callback != NULL) rl->msg_callback(0, rl->version, SSL3_RT_INNER_CONTENT_TYPE, &rec->type, 1, rl->cbarg); if ((rec->type == SSL3_RT_HANDSHAKE || rec->type == SSL3_RT_ALERT) && rec->length == 0) { RLAYERfatal(rl, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_BAD_LENGTH); return 0; } return 1; } int tls_read_record(OSSL_RECORD_LAYER *rl, void **rechandle, int *rversion, uint8_t *type, const unsigned char **data, size_t *datalen, uint16_t *epoch, unsigned char *seq_num) { TLS_RL_RECORD *rec; while (rl->curr_rec >= rl->num_recs) { int ret; if (rl->num_released != rl->num_recs) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_RECORDS_NOT_RELEASED); return OSSL_RECORD_RETURN_FATAL; } ret = rl->funcs->get_more_records(rl); if (ret != OSSL_RECORD_RETURN_SUCCESS) return ret; } rec = &rl->rrec[rl->curr_rec++]; *rechandle = rec; *rversion = rec->rec_version; *type = rec->type; *data = rec->data + rec->off; *datalen = rec->length; if (rl->isdtls) { *epoch = rec->epoch; memcpy(seq_num, rec->seq_num, sizeof(rec->seq_num)); } return OSSL_RECORD_RETURN_SUCCESS; } int tls_release_record(OSSL_RECORD_LAYER *rl, void *rechandle, size_t length) { TLS_RL_RECORD *rec = &rl->rrec[rl->num_released]; if (!ossl_assert(rl->num_released < rl->curr_rec) || !ossl_assert(rechandle == rec)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_INVALID_RECORD); return OSSL_RECORD_RETURN_FATAL; } if (rec->length < length) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if ((rl->options & SSL_OP_CLEANSE_PLAINTEXT) != 0) OPENSSL_cleanse(rec->data + rec->off, length); rec->off += length; rec->length -= length; if (rec->length > 0) return OSSL_RECORD_RETURN_SUCCESS; rl->num_released++; if (rl->curr_rec == rl->num_released && (rl->mode & SSL_MODE_RELEASE_BUFFERS) != 0 && TLS_BUFFER_get_left(&rl->rbuf) == 0) tls_release_read_buffer(rl); return OSSL_RECORD_RETURN_SUCCESS; } int tls_set_options(OSSL_RECORD_LAYER *rl, const OSSL_PARAM *options) { const OSSL_PARAM *p; p = OSSL_PARAM_locate_const(options, OSSL_LIBSSL_RECORD_LAYER_PARAM_OPTIONS); if (p != NULL && !OSSL_PARAM_get_uint64(p, &rl->options)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); return 0; } p = OSSL_PARAM_locate_const(options, OSSL_LIBSSL_RECORD_LAYER_PARAM_MODE); if (p != NULL && !OSSL_PARAM_get_uint32(p, &rl->mode)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); return 0; } if (rl->direction == OSSL_RECORD_DIRECTION_READ) { p = OSSL_PARAM_locate_const(options, OSSL_LIBSSL_RECORD_LAYER_READ_BUFFER_LEN); if (p != NULL && !OSSL_PARAM_get_size_t(p, &rl->rbuf.default_len)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); return 0; } } else { p = OSSL_PARAM_locate_const(options, OSSL_LIBSSL_RECORD_LAYER_PARAM_BLOCK_PADDING); if (p != NULL && !OSSL_PARAM_get_size_t(p, &rl->block_padding)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); return 0; } } if (rl->level == OSSL_RECORD_PROTECTION_LEVEL_APPLICATION) { p = OSSL_PARAM_locate_const(options, OSSL_LIBSSL_RECORD_LAYER_PARAM_READ_AHEAD); if (p != NULL && !OSSL_PARAM_get_int(p, &rl->read_ahead)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); return 0; } } return 1; } int tls_int_new_record_layer(OSSL_LIB_CTX *libctx, const char *propq, int vers, int role, int direction, int level, const EVP_CIPHER *ciph, size_t taglen, const EVP_MD *md, COMP_METHOD *comp, BIO *prev, BIO *transport, BIO *next, const OSSL_PARAM *settings, const OSSL_PARAM *options, const OSSL_DISPATCH *fns, void *cbarg, OSSL_RECORD_LAYER **retrl) { OSSL_RECORD_LAYER *rl = OPENSSL_zalloc(sizeof(*rl)); const OSSL_PARAM *p; *retrl = NULL; if (rl == NULL) return OSSL_RECORD_RETURN_FATAL; rl->max_frag_len = SSL3_RT_MAX_PLAIN_LENGTH; if (settings != NULL) { for (p = settings; p->key != NULL; p++) { if (strcmp(p->key, OSSL_LIBSSL_RECORD_LAYER_PARAM_USE_ETM) == 0) { if (!OSSL_PARAM_get_int(p, &rl->use_etm)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); goto err; } } else if (strcmp(p->key, OSSL_LIBSSL_RECORD_LAYER_PARAM_MAX_FRAG_LEN) == 0) { if (!OSSL_PARAM_get_uint(p, &rl->max_frag_len)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); goto err; } } else if (strcmp(p->key, OSSL_LIBSSL_RECORD_LAYER_PARAM_MAX_EARLY_DATA) == 0) { if (!OSSL_PARAM_get_uint32(p, &rl->max_early_data)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); goto err; } } else if (strcmp(p->key, OSSL_LIBSSL_RECORD_LAYER_PARAM_STREAM_MAC) == 0) { if (!OSSL_PARAM_get_int(p, &rl->stream_mac)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); goto err; } } else if (strcmp(p->key, OSSL_LIBSSL_RECORD_LAYER_PARAM_TLSTREE) == 0) { if (!OSSL_PARAM_get_int(p, &rl->tlstree)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); goto err; } } else { ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_MANDATORY_PARAMETER); goto err; } } } rl->libctx = libctx; rl->propq = propq; rl->version = vers; rl->role = role; rl->direction = direction; rl->level = level; rl->taglen = taglen; rl->md = md; rl->alert = SSL_AD_NO_ALERT; rl->rstate = SSL_ST_READ_HEADER; if (level == OSSL_RECORD_PROTECTION_LEVEL_NONE) rl->is_first_record = 1; if (!tls_set1_bio(rl, transport)) goto err; if (prev != NULL && !BIO_up_ref(prev)) goto err; rl->prev = prev; if (next != NULL && !BIO_up_ref(next)) goto err; rl->next = next; rl->cbarg = cbarg; if (fns != NULL) { for (; fns->function_id != 0; fns++) { switch (fns->function_id) { case OSSL_FUNC_RLAYER_SKIP_EARLY_DATA: rl->skip_early_data = OSSL_FUNC_rlayer_skip_early_data(fns); break; case OSSL_FUNC_RLAYER_MSG_CALLBACK: rl->msg_callback = OSSL_FUNC_rlayer_msg_callback(fns); break; case OSSL_FUNC_RLAYER_SECURITY: rl->security = OSSL_FUNC_rlayer_security(fns); break; case OSSL_FUNC_RLAYER_PADDING: rl->padding = OSSL_FUNC_rlayer_padding(fns); default: break; } } } if (!tls_set_options(rl, options)) { ERR_raise(ERR_LIB_SSL, SSL_R_FAILED_TO_GET_PARAMETER); goto err; } if ((rl->options & SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS) == 0 && rl->version <= TLS1_VERSION && !EVP_CIPHER_is_a(ciph, "NULL") && !EVP_CIPHER_is_a(ciph, "RC4")) { rl->need_empty_fragments = 1; } *retrl = rl; return OSSL_RECORD_RETURN_SUCCESS; err: tls_int_free(rl); return OSSL_RECORD_RETURN_FATAL; } static int tls_new_record_layer(OSSL_LIB_CTX *libctx, const char *propq, int vers, int role, int direction, int level, uint16_t epoch, unsigned char *secret, size_t secretlen, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp, const EVP_MD *kdfdigest, BIO *prev, BIO *transport, BIO *next, BIO_ADDR *local, BIO_ADDR *peer, const OSSL_PARAM *settings, const OSSL_PARAM *options, const OSSL_DISPATCH *fns, void *cbarg, void *rlarg, OSSL_RECORD_LAYER **retrl) { int ret; ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, ciph, taglen, md, comp, prev, transport, next, settings, options, fns, cbarg, retrl); if (ret != OSSL_RECORD_RETURN_SUCCESS) return ret; switch (vers) { case TLS_ANY_VERSION: (*retrl)->funcs = &tls_any_funcs; break; case TLS1_3_VERSION: (*retrl)->funcs = &tls_1_3_funcs; break; case TLS1_2_VERSION: case TLS1_1_VERSION: case TLS1_VERSION: (*retrl)->funcs = &tls_1_funcs; break; case SSL3_VERSION: (*retrl)->funcs = &ssl_3_0_funcs; break; default: ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); ret = OSSL_RECORD_RETURN_FATAL; goto err; } ret = (*retrl)->funcs->set_crypto_state(*retrl, level, key, keylen, iv, ivlen, mackey, mackeylen, ciph, taglen, mactype, md, comp); err: if (ret != OSSL_RECORD_RETURN_SUCCESS) { tls_int_free(*retrl); *retrl = NULL; } return ret; } static void tls_int_free(OSSL_RECORD_LAYER *rl) { BIO_free(rl->prev); BIO_free(rl->bio); BIO_free(rl->next); ossl_tls_buffer_release(&rl->rbuf); tls_release_write_buffer(rl); EVP_CIPHER_CTX_free(rl->enc_ctx); EVP_MD_CTX_free(rl->md_ctx); #ifndef OPENSSL_NO_COMP COMP_CTX_free(rl->compctx); #endif if (rl->version == SSL3_VERSION) OPENSSL_cleanse(rl->mac_secret, sizeof(rl->mac_secret)); TLS_RL_RECORD_release(rl->rrec, SSL_MAX_PIPELINES); OPENSSL_free(rl); } int tls_free(OSSL_RECORD_LAYER *rl) { TLS_BUFFER *rbuf; size_t left, written; int ret = 1; if (rl == NULL) return 1; rbuf = &rl->rbuf; left = TLS_BUFFER_get_left(rbuf); if (left > 0) { ret = BIO_write_ex(rl->next, rbuf->buf + rbuf->offset, left, &written); } tls_int_free(rl); return ret; } int tls_unprocessed_read_pending(OSSL_RECORD_LAYER *rl) { return TLS_BUFFER_get_left(&rl->rbuf) != 0; } int tls_processed_read_pending(OSSL_RECORD_LAYER *rl) { return rl->curr_rec < rl->num_recs; } size_t tls_app_data_pending(OSSL_RECORD_LAYER *rl) { size_t i; size_t num = 0; for (i = rl->curr_rec; i < rl->num_recs; i++) { if (rl->rrec[i].type != SSL3_RT_APPLICATION_DATA) return num; num += rl->rrec[i].length; } return num; } size_t tls_get_max_records_default(OSSL_RECORD_LAYER *rl, uint8_t type, size_t len, size_t maxfrag, size_t *preffrag) { if (rl->max_pipelines > 0 && rl->enc_ctx != NULL && (EVP_CIPHER_get_flags(EVP_CIPHER_CTX_get0_cipher(rl->enc_ctx)) & EVP_CIPH_FLAG_PIPELINE) != 0 && RLAYER_USE_EXPLICIT_IV(rl)) { size_t pipes; if (len == 0) return 1; pipes = ((len - 1) / *preffrag) + 1; return (pipes < rl->max_pipelines) ? pipes : rl->max_pipelines; } return 1; } size_t tls_get_max_records(OSSL_RECORD_LAYER *rl, uint8_t type, size_t len, size_t maxfrag, size_t *preffrag) { return rl->funcs->get_max_records(rl, type, len, maxfrag, preffrag); } int tls_allocate_write_buffers_default(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl, size_t *prefix) { if (!tls_setup_write_buffer(rl, numtempl, 0, 0)) { return 0; } return 1; } int tls_initialise_write_packets_default(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl, OSSL_RECORD_TEMPLATE *prefixtempl, WPACKET *pkt, TLS_BUFFER *bufs, size_t *wpinited) { WPACKET *thispkt; size_t j, align; TLS_BUFFER *wb; for (j = 0; j < numtempl; j++) { thispkt = &pkt[j]; wb = &bufs[j]; wb->type = templates[j].type; #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD != 0 align = (size_t)TLS_BUFFER_get_buf(wb); align += rl->isdtls ? DTLS1_RT_HEADER_LENGTH : SSL3_RT_HEADER_LENGTH; align = SSL3_ALIGN_PAYLOAD - 1 - ((align - 1) % SSL3_ALIGN_PAYLOAD); #endif TLS_BUFFER_set_offset(wb, align); if (!WPACKET_init_static_len(thispkt, TLS_BUFFER_get_buf(wb), TLS_BUFFER_get_len(wb), 0)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } (*wpinited)++; if (!WPACKET_allocate_bytes(thispkt, align, NULL)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } return 1; } int tls_prepare_record_header_default(OSSL_RECORD_LAYER *rl, WPACKET *thispkt, OSSL_RECORD_TEMPLATE *templ, uint8_t rectype, unsigned char **recdata) { size_t maxcomplen; *recdata = NULL; maxcomplen = templ->buflen; if (rl->compctx != NULL) maxcomplen += SSL3_RT_MAX_COMPRESSED_OVERHEAD; if (!WPACKET_put_bytes_u8(thispkt, rectype) || !WPACKET_put_bytes_u16(thispkt, templ->version) || !WPACKET_start_sub_packet_u16(thispkt) || (rl->eivlen > 0 && !WPACKET_allocate_bytes(thispkt, rl->eivlen, NULL)) || (maxcomplen > 0 && !WPACKET_reserve_bytes(thispkt, maxcomplen, recdata))) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } int tls_prepare_for_encryption_default(OSSL_RECORD_LAYER *rl, size_t mac_size, WPACKET *thispkt, TLS_RL_RECORD *thiswr) { size_t len; unsigned char *recordstart; if (!rl->use_etm && mac_size != 0) { unsigned char *mac; if (!WPACKET_allocate_bytes(thispkt, mac_size, &mac) || !rl->funcs->mac(rl, thiswr, mac, 1)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } if (!WPACKET_reserve_bytes(thispkt, SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD - mac_size, NULL) || !WPACKET_get_length(thispkt, &len)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } recordstart = WPACKET_get_curr(thispkt) - len; TLS_RL_RECORD_set_data(thiswr, recordstart); TLS_RL_RECORD_reset_input(thiswr); TLS_RL_RECORD_set_length(thiswr, len); return 1; } int tls_post_encryption_processing_default(OSSL_RECORD_LAYER *rl, size_t mac_size, OSSL_RECORD_TEMPLATE *thistempl, WPACKET *thispkt, TLS_RL_RECORD *thiswr) { size_t origlen, len; size_t headerlen = rl->isdtls ? DTLS1_RT_HEADER_LENGTH : SSL3_RT_HEADER_LENGTH; if (!WPACKET_get_length(thispkt, &origlen) || !ossl_assert(origlen + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD - mac_size >= thiswr->length) || origlen > thiswr->length || (thiswr->length > origlen && !WPACKET_allocate_bytes(thispkt, thiswr->length - origlen, NULL))) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (rl->use_etm && mac_size != 0) { unsigned char *mac; if (!WPACKET_allocate_bytes(thispkt, mac_size, &mac) || !rl->funcs->mac(rl, thiswr, mac, 1)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } TLS_RL_RECORD_add_length(thiswr, mac_size); } if (!WPACKET_get_length(thispkt, &len) || !WPACKET_close(thispkt)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (rl->msg_callback != NULL) { unsigned char *recordstart; recordstart = WPACKET_get_curr(thispkt) - len - headerlen; rl->msg_callback(1, thiswr->rec_version, SSL3_RT_HEADER, recordstart, headerlen, rl->cbarg); if (rl->version == TLS1_3_VERSION && rl->enc_ctx != NULL) { unsigned char ctype = thistempl->type; rl->msg_callback(1, thiswr->rec_version, SSL3_RT_INNER_CONTENT_TYPE, &ctype, 1, rl->cbarg); } } if (!WPACKET_finish(thispkt)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } TLS_RL_RECORD_add_length(thiswr, headerlen); return 1; } int tls_write_records_default(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl) { WPACKET pkt[SSL_MAX_PIPELINES + 1]; TLS_RL_RECORD wr[SSL_MAX_PIPELINES + 1]; WPACKET *thispkt; TLS_RL_RECORD *thiswr; int mac_size = 0, ret = 0; size_t wpinited = 0; size_t j, prefix = 0; OSSL_RECORD_TEMPLATE prefixtempl; OSSL_RECORD_TEMPLATE *thistempl; if (rl->md_ctx != NULL && EVP_MD_CTX_get0_md(rl->md_ctx) != NULL) { mac_size = EVP_MD_CTX_get_size(rl->md_ctx); if (mac_size < 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } } if (!rl->funcs->allocate_write_buffers(rl, templates, numtempl, &prefix)) { goto err; } if (!rl->funcs->initialise_write_packets(rl, templates, numtempl, &prefixtempl, pkt, rl->wbuf, &wpinited)) { goto err; } memset(wr, 0, sizeof(wr)); for (j = 0; j < numtempl + prefix; j++) { unsigned char *compressdata = NULL; uint8_t rectype; thispkt = &pkt[j]; thiswr = &wr[j]; thistempl = (j < prefix) ? &prefixtempl : &templates[j - prefix]; if (rl->funcs->get_record_type != NULL) rectype = rl->funcs->get_record_type(rl, thistempl); else rectype = thistempl->type; TLS_RL_RECORD_set_type(thiswr, rectype); TLS_RL_RECORD_set_rec_version(thiswr, thistempl->version); if (!rl->funcs->prepare_record_header(rl, thispkt, thistempl, rectype, &compressdata)) { goto err; } TLS_RL_RECORD_set_data(thiswr, compressdata); TLS_RL_RECORD_set_length(thiswr, thistempl->buflen); TLS_RL_RECORD_set_input(thiswr, (unsigned char *)thistempl->buf); if (rl->compctx != NULL) { if (!tls_do_compress(rl, thiswr) || !WPACKET_allocate_bytes(thispkt, thiswr->length, NULL)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_COMPRESSION_FAILURE); goto err; } } else if (compressdata != NULL) { if (!WPACKET_memcpy(thispkt, thiswr->input, thiswr->length)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } TLS_RL_RECORD_reset_input(&wr[j]); } if (rl->funcs->add_record_padding != NULL && !rl->funcs->add_record_padding(rl, thistempl, thispkt, thiswr)) { goto err; } if (!rl->funcs->prepare_for_encryption(rl, mac_size, thispkt, thiswr)) { goto err; } } if (prefix) { if (rl->funcs->cipher(rl, wr, 1, 1, NULL, mac_size) < 1) { if (rl->alert == SSL_AD_NO_ALERT) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); } goto err; } } if (rl->funcs->cipher(rl, wr + prefix, numtempl, 1, NULL, mac_size) < 1) { if (rl->alert == SSL_AD_NO_ALERT) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); } goto err; } for (j = 0; j < numtempl + prefix; j++) { thispkt = &pkt[j]; thiswr = &wr[j]; thistempl = (j < prefix) ? &prefixtempl : &templates[j - prefix]; if (!rl->funcs->post_encryption_processing(rl, mac_size, thistempl, thispkt, thiswr)) { goto err; } TLS_BUFFER_set_left(&rl->wbuf[j], TLS_RL_RECORD_get_length(thiswr)); } ret = 1; err: for (j = 0; j < wpinited; j++) WPACKET_cleanup(&pkt[j]); return ret; } int tls_write_records(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl) { if (!ossl_assert(rl->nextwbuf >= rl->numwpipes || TLS_BUFFER_get_left(&rl->wbuf[rl->nextwbuf]) == 0)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return OSSL_RECORD_RETURN_FATAL; } if (!rl->funcs->write_records(rl, templates, numtempl)) { return OSSL_RECORD_RETURN_FATAL; } rl->nextwbuf = 0; return tls_retry_write_records(rl); } int tls_retry_write_records(OSSL_RECORD_LAYER *rl) { int i, ret; TLS_BUFFER *thiswb; size_t tmpwrit = 0; if (rl->nextwbuf >= rl->numwpipes) return OSSL_RECORD_RETURN_SUCCESS; for (;;) { thiswb = &rl->wbuf[rl->nextwbuf]; clear_sys_error(); if (rl->bio != NULL) { if (rl->funcs->prepare_write_bio != NULL) { ret = rl->funcs->prepare_write_bio(rl, thiswb->type); if (ret != OSSL_RECORD_RETURN_SUCCESS) return ret; } i = BIO_write(rl->bio, (char *) &(TLS_BUFFER_get_buf(thiswb) [TLS_BUFFER_get_offset(thiswb)]), (unsigned int)TLS_BUFFER_get_left(thiswb)); if (i >= 0) { tmpwrit = i; if (i == 0 && BIO_should_retry(rl->bio)) ret = OSSL_RECORD_RETURN_RETRY; else ret = OSSL_RECORD_RETURN_SUCCESS; } else { if (BIO_should_retry(rl->bio)) ret = OSSL_RECORD_RETURN_RETRY; else ret = OSSL_RECORD_RETURN_FATAL; } } else { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_BIO_NOT_SET); ret = OSSL_RECORD_RETURN_FATAL; i = -1; } if (i >= 0 && tmpwrit == TLS_BUFFER_get_left(thiswb)) { TLS_BUFFER_set_left(thiswb, 0); TLS_BUFFER_add_offset(thiswb, tmpwrit); if (++(rl->nextwbuf) < rl->numwpipes) continue; if (rl->nextwbuf == rl->numwpipes && (rl->mode & SSL_MODE_RELEASE_BUFFERS) != 0) tls_release_write_buffer(rl); return OSSL_RECORD_RETURN_SUCCESS; } else if (i <= 0) { if (rl->isdtls) { TLS_BUFFER_set_left(thiswb, 0); if (++(rl->nextwbuf) == rl->numwpipes && (rl->mode & SSL_MODE_RELEASE_BUFFERS) != 0) tls_release_write_buffer(rl); } return ret; } TLS_BUFFER_add_offset(thiswb, tmpwrit); TLS_BUFFER_sub_left(thiswb, tmpwrit); } } int tls_get_alert_code(OSSL_RECORD_LAYER *rl) { return rl->alert; } int tls_set1_bio(OSSL_RECORD_LAYER *rl, BIO *bio) { if (bio != NULL && !BIO_up_ref(bio)) return 0; BIO_free(rl->bio); rl->bio = bio; return 1; } int tls_default_set_protocol_version(OSSL_RECORD_LAYER *rl, int version) { if (rl->version != version) return 0; return 1; } int tls_set_protocol_version(OSSL_RECORD_LAYER *rl, int version) { return rl->funcs->set_protocol_version(rl, version); } void tls_set_plain_alerts(OSSL_RECORD_LAYER *rl, int allow) { rl->allow_plain_alerts = allow; } void tls_set_first_handshake(OSSL_RECORD_LAYER *rl, int first) { rl->is_first_handshake = first; } void tls_set_max_pipelines(OSSL_RECORD_LAYER *rl, size_t max_pipelines) { rl->max_pipelines = max_pipelines; if (max_pipelines > 1) rl->read_ahead = 1; } void tls_get_state(OSSL_RECORD_LAYER *rl, const char **shortstr, const char **longstr) { const char *shrt, *lng; switch (rl->rstate) { case SSL_ST_READ_HEADER: shrt = "RH"; lng = "read header"; break; case SSL_ST_READ_BODY: shrt = "RB"; lng = "read body"; break; default: shrt = lng = "unknown"; break; } if (shortstr != NULL) *shortstr = shrt; if (longstr != NULL) *longstr = lng; } const COMP_METHOD *tls_get_compression(OSSL_RECORD_LAYER *rl) { #ifndef OPENSSL_NO_COMP return (rl->compctx == NULL) ? NULL : COMP_CTX_get_method(rl->compctx); #else return NULL; #endif } void tls_set_max_frag_len(OSSL_RECORD_LAYER *rl, size_t max_frag_len) { rl->max_frag_len = max_frag_len; } int tls_increment_sequence_ctr(OSSL_RECORD_LAYER *rl) { int i; for (i = SEQ_NUM_SIZE; i > 0; i--) { ++(rl->sequence[i - 1]); if (rl->sequence[i - 1] != 0) break; } if (i == 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_SEQUENCE_CTR_WRAPPED); return 0; } return 1; } int tls_alloc_buffers(OSSL_RECORD_LAYER *rl) { if (rl->direction == OSSL_RECORD_DIRECTION_WRITE) { if (rl->nextwbuf < rl->numwpipes) return 1; if (!tls_setup_write_buffer(rl, 1, 0, 0)) return 0; TLS_BUFFER_set_left(&rl->wbuf[0], 0); return 1; } if (rl->curr_rec < rl->num_recs || TLS_BUFFER_get_left(&rl->rbuf) != 0) return 1; return tls_setup_read_buffer(rl); } int tls_free_buffers(OSSL_RECORD_LAYER *rl) { if (rl->direction == OSSL_RECORD_DIRECTION_WRITE) { if (rl->nextwbuf < rl->numwpipes) { if (rl->nextwbuf != 0 || rl->numwpipes != 1 || TLS_BUFFER_get_left(&rl->wbuf[0]) != 0) return 0; } tls_release_write_buffer(rl); return 1; } if (rl->curr_rec < rl->num_recs || TLS_BUFFER_get_left(&rl->rbuf) != 0) return 0; return tls_release_read_buffer(rl); } const OSSL_RECORD_METHOD ossl_tls_record_method = { tls_new_record_layer, tls_free, tls_unprocessed_read_pending, tls_processed_read_pending, tls_app_data_pending, tls_get_max_records, tls_write_records, tls_retry_write_records, tls_read_record, tls_release_record, tls_get_alert_code, tls_set1_bio, tls_set_protocol_version, tls_set_plain_alerts, tls_set_first_handshake, tls_set_max_pipelines, NULL, tls_get_state, tls_set_options, tls_get_compression, tls_set_max_frag_len, NULL, tls_increment_sequence_ctr, tls_alloc_buffers, tls_free_buffers };
methods
openssl/ssl/record/methods/tls_common.c
openssl
#include "internal/deprecated.h" #include <openssl/evp.h> #ifndef FIPS_MODULE # include <openssl/md5.h> #endif #include <openssl/sha.h> #include "internal/ssl3_cbc.h" #include "internal/constant_time.h" #include "internal/cryptlib.h" #define MAX_HASH_BIT_COUNT_BYTES 16 #define MAX_HASH_BLOCK_SIZE 128 #ifndef FIPS_MODULE # define u32toLE(n, p) \ (*((p)++) = (unsigned char)(n ), \ *((p)++) = (unsigned char)(n >> 8), \ *((p)++) = (unsigned char)(n >> 16), \ *((p)++) = (unsigned char)(n >> 24)) static void tls1_md5_final_raw(void *ctx, unsigned char *md_out) { MD5_CTX *md5 = ctx; u32toLE(md5->A, md_out); u32toLE(md5->B, md_out); u32toLE(md5->C, md_out); u32toLE(md5->D, md_out); } #endif static void tls1_sha1_final_raw(void *ctx, unsigned char *md_out) { SHA_CTX *sha1 = ctx; l2n(sha1->h0, md_out); l2n(sha1->h1, md_out); l2n(sha1->h2, md_out); l2n(sha1->h3, md_out); l2n(sha1->h4, md_out); } static void tls1_sha256_final_raw(void *ctx, unsigned char *md_out) { SHA256_CTX *sha256 = ctx; unsigned i; for (i = 0; i < 8; i++) l2n(sha256->h[i], md_out); } static void tls1_sha512_final_raw(void *ctx, unsigned char *md_out) { SHA512_CTX *sha512 = ctx; unsigned i; for (i = 0; i < 8; i++) l2n8(sha512->h[i], md_out); } #undef LARGEST_DIGEST_CTX #define LARGEST_DIGEST_CTX SHA512_CTX int ssl3_cbc_digest_record(const EVP_MD *md, unsigned char *md_out, size_t *md_out_size, const unsigned char *header, const unsigned char *data, size_t data_size, size_t data_plus_mac_plus_padding_size, const unsigned char *mac_secret, size_t mac_secret_length, char is_sslv3) { union { OSSL_UNION_ALIGN; unsigned char c[sizeof(LARGEST_DIGEST_CTX)]; } md_state; void (*md_final_raw) (void *ctx, unsigned char *md_out); void (*md_transform) (void *ctx, const unsigned char *block); size_t md_size, md_block_size = 64; size_t sslv3_pad_length = 40, header_length, variance_blocks, len, max_mac_bytes, num_blocks, num_starting_blocks, k, mac_end_offset, c, index_a, index_b; size_t bits; unsigned char length_bytes[MAX_HASH_BIT_COUNT_BYTES]; unsigned char hmac_pad[MAX_HASH_BLOCK_SIZE]; unsigned char first_block[MAX_HASH_BLOCK_SIZE]; unsigned char mac_out[EVP_MAX_MD_SIZE]; size_t i, j; unsigned md_out_size_u; EVP_MD_CTX *md_ctx = NULL; size_t md_length_size = 8; char length_is_big_endian = 1; int ret = 0; if (!ossl_assert(data_plus_mac_plus_padding_size < 1024 * 1024)) return 0; if (EVP_MD_is_a(md, "MD5")) { #ifdef FIPS_MODULE return 0; #else if (MD5_Init((MD5_CTX *)md_state.c) <= 0) return 0; md_final_raw = tls1_md5_final_raw; md_transform = (void (*)(void *ctx, const unsigned char *block))MD5_Transform; md_size = 16; sslv3_pad_length = 48; length_is_big_endian = 0; #endif } else if (EVP_MD_is_a(md, "SHA1")) { if (SHA1_Init((SHA_CTX *)md_state.c) <= 0) return 0; md_final_raw = tls1_sha1_final_raw; md_transform = (void (*)(void *ctx, const unsigned char *block))SHA1_Transform; md_size = 20; } else if (EVP_MD_is_a(md, "SHA2-224")) { if (SHA224_Init((SHA256_CTX *)md_state.c) <= 0) return 0; md_final_raw = tls1_sha256_final_raw; md_transform = (void (*)(void *ctx, const unsigned char *block))SHA256_Transform; md_size = 224 / 8; } else if (EVP_MD_is_a(md, "SHA2-256")) { if (SHA256_Init((SHA256_CTX *)md_state.c) <= 0) return 0; md_final_raw = tls1_sha256_final_raw; md_transform = (void (*)(void *ctx, const unsigned char *block))SHA256_Transform; md_size = 32; } else if (EVP_MD_is_a(md, "SHA2-384")) { if (SHA384_Init((SHA512_CTX *)md_state.c) <= 0) return 0; md_final_raw = tls1_sha512_final_raw; md_transform = (void (*)(void *ctx, const unsigned char *block))SHA512_Transform; md_size = 384 / 8; md_block_size = 128; md_length_size = 16; } else if (EVP_MD_is_a(md, "SHA2-512")) { if (SHA512_Init((SHA512_CTX *)md_state.c) <= 0) return 0; md_final_raw = tls1_sha512_final_raw; md_transform = (void (*)(void *ctx, const unsigned char *block))SHA512_Transform; md_size = 64; md_block_size = 128; md_length_size = 16; } else { if (md_out_size != NULL) *md_out_size = 0; return ossl_assert(0); } if (!ossl_assert(md_length_size <= MAX_HASH_BIT_COUNT_BYTES) || !ossl_assert(md_block_size <= MAX_HASH_BLOCK_SIZE) || !ossl_assert(md_size <= EVP_MAX_MD_SIZE)) return 0; header_length = 13; if (is_sslv3) { header_length = mac_secret_length + sslv3_pad_length + 8 + 1 + 2; } variance_blocks = is_sslv3 ? 2 : (((255 + 1 + md_size + md_block_size - 1) / md_block_size) + 1); len = data_plus_mac_plus_padding_size + header_length; max_mac_bytes = len - md_size - 1; num_blocks = (max_mac_bytes + 1 + md_length_size + md_block_size - 1) / md_block_size; num_starting_blocks = 0; k = 0; mac_end_offset = data_size + header_length; c = mac_end_offset % md_block_size; index_a = mac_end_offset / md_block_size; index_b = (mac_end_offset + md_length_size) / md_block_size; if (num_blocks > variance_blocks + (is_sslv3 ? 1 : 0)) { num_starting_blocks = num_blocks - variance_blocks; k = md_block_size * num_starting_blocks; } bits = 8 * mac_end_offset; if (!is_sslv3) { bits += 8 * md_block_size; memset(hmac_pad, 0, md_block_size); if (!ossl_assert(mac_secret_length <= sizeof(hmac_pad))) return 0; memcpy(hmac_pad, mac_secret, mac_secret_length); for (i = 0; i < md_block_size; i++) hmac_pad[i] ^= 0x36; md_transform(md_state.c, hmac_pad); } if (length_is_big_endian) { memset(length_bytes, 0, md_length_size - 4); length_bytes[md_length_size - 4] = (unsigned char)(bits >> 24); length_bytes[md_length_size - 3] = (unsigned char)(bits >> 16); length_bytes[md_length_size - 2] = (unsigned char)(bits >> 8); length_bytes[md_length_size - 1] = (unsigned char)bits; } else { memset(length_bytes, 0, md_length_size); length_bytes[md_length_size - 5] = (unsigned char)(bits >> 24); length_bytes[md_length_size - 6] = (unsigned char)(bits >> 16); length_bytes[md_length_size - 7] = (unsigned char)(bits >> 8); length_bytes[md_length_size - 8] = (unsigned char)bits; } if (k > 0) { if (is_sslv3) { size_t overhang; if (header_length <= md_block_size) { return 0; } overhang = header_length - md_block_size; md_transform(md_state.c, header); memcpy(first_block, header + md_block_size, overhang); memcpy(first_block + overhang, data, md_block_size - overhang); md_transform(md_state.c, first_block); for (i = 1; i < k / md_block_size - 1; i++) md_transform(md_state.c, data + md_block_size * i - overhang); } else { memcpy(first_block, header, 13); memcpy(first_block + 13, data, md_block_size - 13); md_transform(md_state.c, first_block); for (i = 1; i < k / md_block_size; i++) md_transform(md_state.c, data + md_block_size * i - 13); } } memset(mac_out, 0, sizeof(mac_out)); for (i = num_starting_blocks; i <= num_starting_blocks + variance_blocks; i++) { unsigned char block[MAX_HASH_BLOCK_SIZE]; unsigned char is_block_a = constant_time_eq_8_s(i, index_a); unsigned char is_block_b = constant_time_eq_8_s(i, index_b); for (j = 0; j < md_block_size; j++) { unsigned char b = 0, is_past_c, is_past_cp1; if (k < header_length) b = header[k]; else if (k < data_plus_mac_plus_padding_size + header_length) b = data[k - header_length]; k++; is_past_c = is_block_a & constant_time_ge_8_s(j, c); is_past_cp1 = is_block_a & constant_time_ge_8_s(j, c + 1); b = constant_time_select_8(is_past_c, 0x80, b); b = b & ~is_past_cp1; b &= ~is_block_b | is_block_a; if (j >= md_block_size - md_length_size) { b = constant_time_select_8(is_block_b, length_bytes[j - (md_block_size - md_length_size)], b); } block[j] = b; } md_transform(md_state.c, block); md_final_raw(md_state.c, block); for (j = 0; j < md_size; j++) mac_out[j] |= block[j] & is_block_b; } md_ctx = EVP_MD_CTX_new(); if (md_ctx == NULL) goto err; if (EVP_DigestInit_ex(md_ctx, md, NULL ) <= 0) goto err; if (is_sslv3) { memset(hmac_pad, 0x5c, sslv3_pad_length); if (EVP_DigestUpdate(md_ctx, mac_secret, mac_secret_length) <= 0 || EVP_DigestUpdate(md_ctx, hmac_pad, sslv3_pad_length) <= 0 || EVP_DigestUpdate(md_ctx, mac_out, md_size) <= 0) goto err; } else { for (i = 0; i < md_block_size; i++) hmac_pad[i] ^= 0x6a; if (EVP_DigestUpdate(md_ctx, hmac_pad, md_block_size) <= 0 || EVP_DigestUpdate(md_ctx, mac_out, md_size) <= 0) goto err; } ret = EVP_DigestFinal(md_ctx, md_out, &md_out_size_u); if (ret && md_out_size) *md_out_size = md_out_size_u; ret = 1; err: EVP_MD_CTX_free(md_ctx); return ret; }
methods
openssl/ssl/record/methods/ssl3_cbc.c
openssl
#include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" #if defined(OPENSSL_SMALL_FOOTPRINT) \ || !(defined(AES_ASM) && (defined(__x86_64) \ || defined(__x86_64__) \ || defined(_M_AMD64) \ || defined(_M_X64))) # undef EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK # define EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK 0 #endif static int tls_is_multiblock_capable(OSSL_RECORD_LAYER *rl, uint8_t type, size_t len, size_t fraglen) { #if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK if (type == SSL3_RT_APPLICATION_DATA && len >= 4 * fraglen && rl->compctx == NULL && rl->msg_callback == NULL && !rl->use_etm && RLAYER_USE_EXPLICIT_IV(rl) && !BIO_get_ktls_send(rl->bio) && (EVP_CIPHER_get_flags(EVP_CIPHER_CTX_get0_cipher(rl->enc_ctx)) & EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK) != 0) return 1; #endif return 0; } size_t tls_get_max_records_multiblock(OSSL_RECORD_LAYER *rl, uint8_t type, size_t len, size_t maxfrag, size_t *preffrag) { if (tls_is_multiblock_capable(rl, type, len, *preffrag)) { if ((*preffrag & 0xfff) == 0) *preffrag -= 512; if (len >= 8 * (*preffrag)) return 8; return 4; } return tls_get_max_records_default(rl, type, len, maxfrag, preffrag); } static int tls_write_records_multiblock_int(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl) { #if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK size_t i; size_t totlen; TLS_BUFFER *wb; unsigned char aad[13]; EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM mb_param; size_t packlen; int packleni; if (numtempl != 4 && numtempl != 8) return 0; for (i = 1; i < numtempl; i++) { if (templates[i - 1].type != templates[i].type || templates[i - 1].buflen != templates[i].buflen || templates[i - 1].buf + templates[i - 1].buflen != templates[i].buf) return 0; } totlen = templates[0].buflen * numtempl; if (!tls_is_multiblock_capable(rl, templates[0].type, totlen, templates[0].buflen)) return 0; packlen = EVP_CIPHER_CTX_ctrl(rl->enc_ctx, EVP_CTRL_TLS1_1_MULTIBLOCK_MAX_BUFSIZE, (int)templates[0].buflen, NULL); packlen *= numtempl; if (!tls_setup_write_buffer(rl, 1, packlen, packlen)) { return -1; } wb = &rl->wbuf[0]; mb_param.interleave = numtempl; memcpy(aad, rl->sequence, 8); aad[8] = templates[0].type; aad[9] = (unsigned char)(templates[0].version >> 8); aad[10] = (unsigned char)(templates[0].version); aad[11] = 0; aad[12] = 0; mb_param.out = NULL; mb_param.inp = aad; mb_param.len = totlen; packleni = EVP_CIPHER_CTX_ctrl(rl->enc_ctx, EVP_CTRL_TLS1_1_MULTIBLOCK_AAD, sizeof(mb_param), &mb_param); packlen = (size_t)packleni; if (packleni <= 0 || packlen > wb->len) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } mb_param.out = wb->buf; mb_param.inp = templates[0].buf; mb_param.len = totlen; if (EVP_CIPHER_CTX_ctrl(rl->enc_ctx, EVP_CTRL_TLS1_1_MULTIBLOCK_ENCRYPT, sizeof(mb_param), &mb_param) <= 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return -1; } rl->sequence[7] += mb_param.interleave; if (rl->sequence[7] < mb_param.interleave) { int j = 6; while (j >= 0 && (++rl->sequence[j--]) == 0) ; } wb->offset = 0; wb->left = packlen; return 1; #else return 0; #endif } int tls_write_records_multiblock(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl) { int ret; ret = tls_write_records_multiblock_int(rl, templates, numtempl); if (ret < 0) { return 0; } if (ret == 0) { if (!tls_write_records_default(rl, templates, numtempl)) { return 0; } } return 1; }
methods
openssl/ssl/record/methods/tls_multib.c
openssl
#include <openssl/evp.h> #include <openssl/core_names.h> #include <openssl/rand.h> #include <openssl/ssl.h> #include "internal/ssl3_cbc.h" #include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" static int tls1_set_crypto_state(OSSL_RECORD_LAYER *rl, int level, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp) { EVP_CIPHER_CTX *ciph_ctx; EVP_PKEY *mac_key; int enc = (rl->direction == OSSL_RECORD_DIRECTION_WRITE) ? 1 : 0; if (level != OSSL_RECORD_PROTECTION_LEVEL_APPLICATION) return OSSL_RECORD_RETURN_FATAL; if ((rl->enc_ctx = EVP_CIPHER_CTX_new()) == NULL) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB); return OSSL_RECORD_RETURN_FATAL; } ciph_ctx = rl->enc_ctx; rl->md_ctx = EVP_MD_CTX_new(); if (rl->md_ctx == NULL) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } #ifndef OPENSSL_NO_COMP if (comp != NULL) { rl->compctx = COMP_CTX_new(comp); if (rl->compctx == NULL) { ERR_raise(ERR_LIB_SSL, SSL_R_COMPRESSION_LIBRARY_ERROR); return OSSL_RECORD_RETURN_FATAL; } } #endif if ((EVP_CIPHER_get_flags(ciph) & EVP_CIPH_FLAG_AEAD_CIPHER) == 0) { if (mactype == EVP_PKEY_HMAC) { mac_key = EVP_PKEY_new_raw_private_key_ex(rl->libctx, "HMAC", rl->propq, mackey, mackeylen); } else { mac_key = EVP_PKEY_new_mac_key(mactype, NULL, mackey, (int)mackeylen); } if (mac_key == NULL || EVP_DigestSignInit_ex(rl->md_ctx, NULL, EVP_MD_get0_name(md), rl->libctx, rl->propq, mac_key, NULL) <= 0) { EVP_PKEY_free(mac_key); ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } EVP_PKEY_free(mac_key); } if (EVP_CIPHER_get_mode(ciph) == EVP_CIPH_GCM_MODE) { if (!EVP_CipherInit_ex(ciph_ctx, ciph, NULL, key, NULL, enc) || EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_GCM_SET_IV_FIXED, (int)ivlen, iv) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } } else if (EVP_CIPHER_get_mode(ciph) == EVP_CIPH_CCM_MODE) { if (!EVP_CipherInit_ex(ciph_ctx, ciph, NULL, NULL, NULL, enc) || EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_IVLEN, 12, NULL) <= 0 || EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_TAG, (int)taglen, NULL) <= 0 || EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_CCM_SET_IV_FIXED, (int)ivlen, iv) <= 0 || !EVP_CipherInit_ex(ciph_ctx, NULL, NULL, key, NULL, enc)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } } else { if (!EVP_CipherInit_ex(ciph_ctx, ciph, NULL, key, iv, enc)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } } if ((EVP_CIPHER_get_flags(ciph) & EVP_CIPH_FLAG_AEAD_CIPHER) != 0 && mackeylen != 0 && EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_MAC_KEY, (int)mackeylen, mackey) <= 0) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if (EVP_CIPHER_get0_provider(EVP_CIPHER_CTX_get0_cipher(ciph_ctx)) != NULL && !ossl_set_tls_provider_parameters(rl, ciph_ctx, ciph, md)) { return OSSL_RECORD_RETURN_FATAL; } if (RLAYER_USE_EXPLICIT_IV(rl)) { int mode = EVP_CIPHER_CTX_get_mode(ciph_ctx); int eivlen = 0; if (mode == EVP_CIPH_CBC_MODE) { eivlen = EVP_CIPHER_CTX_get_iv_length(ciph_ctx); if (eivlen < 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_LIBRARY_BUG); return OSSL_RECORD_RETURN_FATAL; } if (eivlen <= 1) eivlen = 0; } else if (mode == EVP_CIPH_GCM_MODE) { eivlen = EVP_GCM_TLS_EXPLICIT_IV_LEN; } else if (mode == EVP_CIPH_CCM_MODE) { eivlen = EVP_CCM_TLS_EXPLICIT_IV_LEN; } rl->eivlen = (size_t)eivlen; } return OSSL_RECORD_RETURN_SUCCESS; } #define MAX_PADDING 256 static int tls1_cipher(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *recs, size_t n_recs, int sending, SSL_MAC_BUF *macs, size_t macsize) { EVP_CIPHER_CTX *ds; size_t reclen[SSL_MAX_PIPELINES]; unsigned char buf[SSL_MAX_PIPELINES][EVP_AEAD_TLS1_AAD_LEN]; unsigned char *data[SSL_MAX_PIPELINES]; int pad = 0, tmpr, provided; size_t bs, ctr, padnum, loop; unsigned char padval; const EVP_CIPHER *enc; if (n_recs == 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (EVP_MD_CTX_get0_md(rl->md_ctx)) { int n = EVP_MD_CTX_get_size(rl->md_ctx); if (!ossl_assert(n >= 0)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } ds = rl->enc_ctx; if (!ossl_assert(rl->enc_ctx != NULL)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } enc = EVP_CIPHER_CTX_get0_cipher(rl->enc_ctx); if (sending) { int ivlen; if (RLAYER_USE_EXPLICIT_IV(rl) && EVP_CIPHER_get_mode(enc) == EVP_CIPH_CBC_MODE) ivlen = EVP_CIPHER_get_iv_length(enc); else ivlen = 0; if (ivlen > 1) { for (ctr = 0; ctr < n_recs; ctr++) { if (recs[ctr].data != recs[ctr].input) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } else if (RAND_bytes_ex(rl->libctx, recs[ctr].input, ivlen, 0) <= 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } } } if (!ossl_assert(enc != NULL)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } provided = (EVP_CIPHER_get0_provider(enc) != NULL); bs = EVP_CIPHER_get_block_size(EVP_CIPHER_CTX_get0_cipher(ds)); if (bs == 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_CIPHER); return 0; } if (n_recs > 1) { if ((EVP_CIPHER_get_flags(EVP_CIPHER_CTX_get0_cipher(ds)) & EVP_CIPH_FLAG_PIPELINE) == 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_PIPELINE_FAILURE); return 0; } } for (ctr = 0; ctr < n_recs; ctr++) { reclen[ctr] = recs[ctr].length; if ((EVP_CIPHER_get_flags(EVP_CIPHER_CTX_get0_cipher(ds)) & EVP_CIPH_FLAG_AEAD_CIPHER) != 0) { unsigned char *seq; seq = rl->sequence; if (rl->isdtls) { unsigned char dtlsseq[8], *p = dtlsseq; s2n(rl->epoch, p); memcpy(p, &seq[2], 6); memcpy(buf[ctr], dtlsseq, 8); } else { memcpy(buf[ctr], seq, 8); if (!tls_increment_sequence_ctr(rl)) { return 0; } } buf[ctr][8] = recs[ctr].type; buf[ctr][9] = (unsigned char)(rl->version >> 8); buf[ctr][10] = (unsigned char)(rl->version); buf[ctr][11] = (unsigned char)(recs[ctr].length >> 8); buf[ctr][12] = (unsigned char)(recs[ctr].length & 0xff); pad = EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_AEAD_TLS1_AAD, EVP_AEAD_TLS1_AAD_LEN, buf[ctr]); if (pad <= 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (sending) { reclen[ctr] += pad; recs[ctr].length += pad; } } else if ((bs != 1) && sending && !provided) { padnum = bs - (reclen[ctr] % bs); if (padnum > MAX_PADDING) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } padval = (unsigned char)(padnum - 1); for (loop = reclen[ctr]; loop < reclen[ctr] + padnum; loop++) recs[ctr].input[loop] = padval; reclen[ctr] += padnum; recs[ctr].length += padnum; } if (!sending) { if (reclen[ctr] == 0 || reclen[ctr] % bs != 0) { return 0; } } } if (n_recs > 1) { for (ctr = 0; ctr < n_recs; ctr++) data[ctr] = recs[ctr].data; if (EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_SET_PIPELINE_OUTPUT_BUFS, (int)n_recs, data) <= 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_PIPELINE_FAILURE); return 0; } for (ctr = 0; ctr < n_recs; ctr++) data[ctr] = recs[ctr].input; if (EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_SET_PIPELINE_INPUT_BUFS, (int)n_recs, data) <= 0 || EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_SET_PIPELINE_INPUT_LENS, (int)n_recs, reclen) <= 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, SSL_R_PIPELINE_FAILURE); return 0; } } if (!rl->isdtls && rl->tlstree) { int decrement_seq = 0; if (sending && !rl->use_etm) decrement_seq = 1; if (EVP_CIPHER_CTX_ctrl(ds, EVP_CTRL_TLSTREE, decrement_seq, rl->sequence) <= 0) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } if (provided) { int outlen; if (n_recs > 1) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } if (!EVP_CipherUpdate(ds, recs[0].data, &outlen, recs[0].input, (unsigned int)reclen[0])) return 0; recs[0].length = outlen; if (!sending) { if (EVP_CIPHER_get_mode(enc) == EVP_CIPH_GCM_MODE) { recs[0].data += EVP_GCM_TLS_EXPLICIT_IV_LEN; recs[0].input += EVP_GCM_TLS_EXPLICIT_IV_LEN; } else if (EVP_CIPHER_get_mode(enc) == EVP_CIPH_CCM_MODE) { recs[0].data += EVP_CCM_TLS_EXPLICIT_IV_LEN; recs[0].input += EVP_CCM_TLS_EXPLICIT_IV_LEN; } else if (bs != 1 && RLAYER_USE_EXPLICIT_IV(rl)) { recs[0].data += bs; recs[0].input += bs; recs[0].orig_len -= bs; } if (macs != NULL) { OSSL_PARAM params[2], *p = params; macs[0].alloced = 0; *p++ = OSSL_PARAM_construct_octet_ptr(OSSL_CIPHER_PARAM_TLS_MAC, (void **)&macs[0].mac, macsize); *p = OSSL_PARAM_construct_end(); if (!EVP_CIPHER_CTX_get_params(ds, params)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } } } else { tmpr = EVP_Cipher(ds, recs[0].data, recs[0].input, (unsigned int)reclen[0]); if ((EVP_CIPHER_get_flags(EVP_CIPHER_CTX_get0_cipher(ds)) & EVP_CIPH_FLAG_CUSTOM_CIPHER) != 0 ? (tmpr < 0) : (tmpr == 0)) { return 0; } if (!sending) { for (ctr = 0; ctr < n_recs; ctr++) { if (EVP_CIPHER_get_mode(enc) == EVP_CIPH_GCM_MODE) { recs[ctr].data += EVP_GCM_TLS_EXPLICIT_IV_LEN; recs[ctr].input += EVP_GCM_TLS_EXPLICIT_IV_LEN; recs[ctr].length -= EVP_GCM_TLS_EXPLICIT_IV_LEN; } else if (EVP_CIPHER_get_mode(enc) == EVP_CIPH_CCM_MODE) { recs[ctr].data += EVP_CCM_TLS_EXPLICIT_IV_LEN; recs[ctr].input += EVP_CCM_TLS_EXPLICIT_IV_LEN; recs[ctr].length -= EVP_CCM_TLS_EXPLICIT_IV_LEN; } else if (bs != 1 && RLAYER_USE_EXPLICIT_IV(rl)) { if (recs[ctr].length < bs) return 0; recs[ctr].data += bs; recs[ctr].input += bs; recs[ctr].length -= bs; recs[ctr].orig_len -= bs; } if (!tls1_cbc_remove_padding_and_mac(&recs[ctr].length, recs[ctr].orig_len, recs[ctr].data, (macs != NULL) ? &macs[ctr].mac : NULL, (macs != NULL) ? &macs[ctr].alloced : NULL, bs, pad ? (size_t)pad : macsize, (EVP_CIPHER_get_flags(enc) & EVP_CIPH_FLAG_AEAD_CIPHER) != 0, rl->libctx)) return 0; } } } return 1; } static int tls1_mac(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec, unsigned char *md, int sending) { unsigned char *seq = rl->sequence; EVP_MD_CTX *hash; size_t md_size; EVP_MD_CTX *hmac = NULL, *mac_ctx; unsigned char header[13]; int t; int ret = 0; hash = rl->md_ctx; t = EVP_MD_CTX_get_size(hash); if (!ossl_assert(t >= 0)) return 0; md_size = t; if (rl->stream_mac) { mac_ctx = hash; } else { hmac = EVP_MD_CTX_new(); if (hmac == NULL || !EVP_MD_CTX_copy(hmac, hash)) { goto end; } mac_ctx = hmac; } if (!rl->isdtls && rl->tlstree && EVP_MD_CTX_ctrl(mac_ctx, EVP_MD_CTRL_TLSTREE, 0, seq) <= 0) goto end; if (rl->isdtls) { unsigned char dtlsseq[8], *p = dtlsseq; s2n(rl->epoch, p); memcpy(p, &seq[2], 6); memcpy(header, dtlsseq, 8); } else { memcpy(header, seq, 8); } header[8] = rec->type; header[9] = (unsigned char)(rl->version >> 8); header[10] = (unsigned char)(rl->version); header[11] = (unsigned char)(rec->length >> 8); header[12] = (unsigned char)(rec->length & 0xff); if (!sending && !rl->use_etm && EVP_CIPHER_CTX_get_mode(rl->enc_ctx) == EVP_CIPH_CBC_MODE && ssl3_cbc_record_digest_supported(mac_ctx)) { OSSL_PARAM tls_hmac_params[2], *p = tls_hmac_params; *p++ = OSSL_PARAM_construct_size_t(OSSL_MAC_PARAM_TLS_DATA_SIZE, &rec->orig_len); *p++ = OSSL_PARAM_construct_end(); if (!EVP_PKEY_CTX_set_params(EVP_MD_CTX_get_pkey_ctx(mac_ctx), tls_hmac_params)) goto end; } if (EVP_DigestSignUpdate(mac_ctx, header, sizeof(header)) <= 0 || EVP_DigestSignUpdate(mac_ctx, rec->input, rec->length) <= 0 || EVP_DigestSignFinal(mac_ctx, md, &md_size) <= 0) goto end; OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "seq:\n"); BIO_dump_indent(trc_out, seq, 8, 4); BIO_printf(trc_out, "rec:\n"); BIO_dump_indent(trc_out, rec->data, rec->length, 4); } OSSL_TRACE_END(TLS); if (!rl->isdtls && !tls_increment_sequence_ctr(rl)) { goto end; } OSSL_TRACE_BEGIN(TLS) { BIO_printf(trc_out, "md:\n"); BIO_dump_indent(trc_out, md, md_size, 4); } OSSL_TRACE_END(TLS); ret = 1; end: EVP_MD_CTX_free(hmac); return ret; } #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD != 0 # ifndef OPENSSL_NO_COMP # define MAX_PREFIX_LEN ((SSL3_ALIGN_PAYLOAD - 1) \ + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD \ + SSL3_RT_HEADER_LENGTH \ + SSL3_RT_MAX_COMPRESSED_OVERHEAD) # else # define MAX_PREFIX_LEN ((SSL3_ALIGN_PAYLOAD - 1) \ + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD \ + SSL3_RT_HEADER_LENGTH) # endif #else # ifndef OPENSSL_NO_COMP # define MAX_PREFIX_LEN (SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD \ + SSL3_RT_HEADER_LENGTH \ + SSL3_RT_MAX_COMPRESSED_OVERHEAD) # else # define MAX_PREFIX_LEN (SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD \ + SSL3_RT_HEADER_LENGTH) # endif #endif int tls1_allocate_write_buffers(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl, size_t *prefix) { *prefix = rl->need_empty_fragments && templates[0].type == SSL3_RT_APPLICATION_DATA; if (!tls_setup_write_buffer(rl, numtempl + *prefix, *prefix ? MAX_PREFIX_LEN : 0, 0)) { return 0; } return 1; } int tls1_initialise_write_packets(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl, OSSL_RECORD_TEMPLATE *prefixtempl, WPACKET *pkt, TLS_BUFFER *bufs, size_t *wpinited) { size_t align = 0; TLS_BUFFER *wb; size_t prefix; prefix = rl->need_empty_fragments && templates[0].type == SSL3_RT_APPLICATION_DATA; if (prefix) { prefixtempl->buf = NULL; prefixtempl->version = templates[0].version; prefixtempl->buflen = 0; prefixtempl->type = SSL3_RT_APPLICATION_DATA; wb = &bufs[0]; #if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD != 0 align = (size_t)TLS_BUFFER_get_buf(wb) + SSL3_RT_HEADER_LENGTH; align = SSL3_ALIGN_PAYLOAD - 1 - ((align - 1) % SSL3_ALIGN_PAYLOAD); #endif TLS_BUFFER_set_offset(wb, align); if (!WPACKET_init_static_len(&pkt[0], TLS_BUFFER_get_buf(wb), TLS_BUFFER_get_len(wb), 0)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } *wpinited = 1; if (!WPACKET_allocate_bytes(&pkt[0], align, NULL)) { RLAYERfatal(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } } return tls_initialise_write_packets_default(rl, templates, numtempl, NULL, pkt + prefix, bufs + prefix, wpinited); } const struct record_functions_st tls_1_funcs = { tls1_set_crypto_state, tls1_cipher, tls1_mac, tls_default_set_protocol_version, tls_default_read_n, tls_get_more_records, tls_default_validate_record_header, tls_default_post_process_record, tls_get_max_records_multiblock, tls_write_records_multiblock, tls1_allocate_write_buffers, tls1_initialise_write_packets, NULL, tls_prepare_record_header_default, NULL, tls_prepare_for_encryption_default, tls_post_encryption_processing_default, NULL }; const struct record_functions_st dtls_1_funcs = { tls1_set_crypto_state, tls1_cipher, tls1_mac, tls_default_set_protocol_version, tls_default_read_n, dtls_get_more_records, NULL, NULL, NULL, tls_write_records_default, tls_allocate_write_buffers_default, tls_initialise_write_packets_default, NULL, dtls_prepare_record_header, NULL, tls_prepare_for_encryption_default, dtls_post_encryption_processing, NULL };
methods
openssl/ssl/record/methods/tls1_meth.c
openssl
#include <openssl/evp.h> #include <openssl/core_names.h> #include <openssl/rand.h> #include "../../ssl_local.h" #include "../record_local.h" #include "recmethod_local.h" #include "internal/ktls.h" static struct record_functions_st ossl_ktls_funcs; #if defined(__FreeBSD__) # include "crypto/cryptodev.h" static int ktls_int_check_supported_cipher(OSSL_RECORD_LAYER *rl, const EVP_CIPHER *c, const EVP_MD *md, size_t taglen) { switch (rl->version) { case TLS1_VERSION: case TLS1_1_VERSION: case TLS1_2_VERSION: #ifdef OPENSSL_KTLS_TLS13 case TLS1_3_VERSION: #endif break; default: return 0; } if (EVP_CIPHER_is_a(c, "AES-128-GCM") || EVP_CIPHER_is_a(c, "AES-256-GCM") # ifdef OPENSSL_KTLS_CHACHA20_POLY1305 || EVP_CIPHER_is_a(c, "CHACHA20-POLY1305") # endif ) return 1; if (!EVP_CIPHER_is_a(c, "AES-128-CBC") && !EVP_CIPHER_is_a(c, "AES-256-CBC")) return 0; if (rl->use_etm) return 0; if (md == NULL) return 0; if (EVP_MD_is_a(md, "SHA1") || EVP_MD_is_a(md, "SHA2-256") || EVP_MD_is_a(md, "SHA2-384")) return 1; return 0; } static int ktls_configure_crypto(OSSL_LIB_CTX *libctx, int version, const EVP_CIPHER *c, EVP_MD *md, void *rl_sequence, ktls_crypto_info_t *crypto_info, int is_tx, unsigned char *iv, size_t ivlen, unsigned char *key, size_t keylen, unsigned char *mac_key, size_t mac_secret_size) { memset(crypto_info, 0, sizeof(*crypto_info)); if (EVP_CIPHER_is_a(c, "AES-128-GCM") || EVP_CIPHER_is_a(c, "AES-256-GCM")) { crypto_info->cipher_algorithm = CRYPTO_AES_NIST_GCM_16; crypto_info->iv_len = ivlen; } else # ifdef OPENSSL_KTLS_CHACHA20_POLY1305 if (EVP_CIPHER_is_a(c, "CHACHA20-POLY1305")) { crypto_info->cipher_algorithm = CRYPTO_CHACHA20_POLY1305; crypto_info->iv_len = ivlen; } else # endif if (EVP_CIPHER_is_a(c, "AES-128-CBC") || EVP_CIPHER_is_a(c, "AES-256-CBC")) { if (md == NULL) return 0; if (EVP_MD_is_a(md, "SHA1")) crypto_info->auth_algorithm = CRYPTO_SHA1_HMAC; else if (EVP_MD_is_a(md, "SHA2-256")) crypto_info->auth_algorithm = CRYPTO_SHA2_256_HMAC; else if (EVP_MD_is_a(md, "SHA2-384")) crypto_info->auth_algorithm = CRYPTO_SHA2_384_HMAC; else return 0; crypto_info->cipher_algorithm = CRYPTO_AES_CBC; crypto_info->iv_len = ivlen; crypto_info->auth_key = mac_key; crypto_info->auth_key_len = mac_secret_size; } else { return 0; } crypto_info->cipher_key = key; crypto_info->cipher_key_len = keylen; crypto_info->iv = iv; crypto_info->tls_vmajor = (version >> 8) & 0x000000ff; crypto_info->tls_vminor = (version & 0x000000ff); # ifdef TCP_RXTLS_ENABLE memcpy(crypto_info->rec_seq, rl_sequence, sizeof(crypto_info->rec_seq)); # else if (!is_tx) return 0; # endif return 1; }; #endif #if defined(OPENSSL_SYS_LINUX) static int ktls_int_check_supported_cipher(OSSL_RECORD_LAYER *rl, const EVP_CIPHER *c, const EVP_MD *md, size_t taglen) { switch (rl->version) { case TLS1_2_VERSION: #ifdef OPENSSL_KTLS_TLS13 case TLS1_3_VERSION: #endif break; default: return 0; } # ifdef OPENSSL_KTLS_AES_CCM_128 if (EVP_CIPHER_is_a(c, "AES-128-CCM")) { if (taglen != EVP_CCM_TLS_TAG_LEN) return 0; return 1; } else # endif if (0 # ifdef OPENSSL_KTLS_AES_GCM_128 || EVP_CIPHER_is_a(c, "AES-128-GCM") # endif # ifdef OPENSSL_KTLS_AES_GCM_256 || EVP_CIPHER_is_a(c, "AES-256-GCM") # endif # ifdef OPENSSL_KTLS_CHACHA20_POLY1305 || EVP_CIPHER_is_a(c, "ChaCha20-Poly1305") # endif ) { return 1; } return 0; } static int ktls_configure_crypto(OSSL_LIB_CTX *libctx, int version, const EVP_CIPHER *c, const EVP_MD *md, void *rl_sequence, ktls_crypto_info_t *crypto_info, int is_tx, unsigned char *iv, size_t ivlen, unsigned char *key, size_t keylen, unsigned char *mac_key, size_t mac_secret_size) { unsigned char geniv[EVP_GCM_TLS_EXPLICIT_IV_LEN]; unsigned char *eiv = NULL; # ifdef OPENSSL_NO_KTLS_RX if (!is_tx) return 0; # endif if (EVP_CIPHER_get_mode(c) == EVP_CIPH_GCM_MODE || EVP_CIPHER_get_mode(c) == EVP_CIPH_CCM_MODE) { if (!ossl_assert(EVP_GCM_TLS_FIXED_IV_LEN == EVP_CCM_TLS_FIXED_IV_LEN) || !ossl_assert(EVP_GCM_TLS_EXPLICIT_IV_LEN == EVP_CCM_TLS_EXPLICIT_IV_LEN)) return 0; if (version == TLS1_2_VERSION) { if (!ossl_assert(ivlen == EVP_GCM_TLS_FIXED_IV_LEN)) return 0; if (is_tx) { if (RAND_bytes_ex(libctx, geniv, EVP_GCM_TLS_EXPLICIT_IV_LEN, 0) <= 0) return 0; } else { memset(geniv, 0, EVP_GCM_TLS_EXPLICIT_IV_LEN); } eiv = geniv; } else { if (!ossl_assert(ivlen == EVP_GCM_TLS_FIXED_IV_LEN + EVP_GCM_TLS_EXPLICIT_IV_LEN)) return 0; eiv = iv + TLS_CIPHER_AES_GCM_128_SALT_SIZE; } } memset(crypto_info, 0, sizeof(*crypto_info)); switch (EVP_CIPHER_get_nid(c)) { # ifdef OPENSSL_KTLS_AES_GCM_128 case NID_aes_128_gcm: if (!ossl_assert(TLS_CIPHER_AES_GCM_128_SALT_SIZE == EVP_GCM_TLS_FIXED_IV_LEN) || !ossl_assert(TLS_CIPHER_AES_GCM_128_IV_SIZE == EVP_GCM_TLS_EXPLICIT_IV_LEN)) return 0; crypto_info->gcm128.info.cipher_type = TLS_CIPHER_AES_GCM_128; crypto_info->gcm128.info.version = version; crypto_info->tls_crypto_info_len = sizeof(crypto_info->gcm128); memcpy(crypto_info->gcm128.iv, eiv, TLS_CIPHER_AES_GCM_128_IV_SIZE); memcpy(crypto_info->gcm128.salt, iv, TLS_CIPHER_AES_GCM_128_SALT_SIZE); memcpy(crypto_info->gcm128.key, key, keylen); memcpy(crypto_info->gcm128.rec_seq, rl_sequence, TLS_CIPHER_AES_GCM_128_REC_SEQ_SIZE); return 1; # endif # ifdef OPENSSL_KTLS_AES_GCM_256 case NID_aes_256_gcm: if (!ossl_assert(TLS_CIPHER_AES_GCM_256_SALT_SIZE == EVP_GCM_TLS_FIXED_IV_LEN) || !ossl_assert(TLS_CIPHER_AES_GCM_256_IV_SIZE == EVP_GCM_TLS_EXPLICIT_IV_LEN)) return 0; crypto_info->gcm256.info.cipher_type = TLS_CIPHER_AES_GCM_256; crypto_info->gcm256.info.version = version; crypto_info->tls_crypto_info_len = sizeof(crypto_info->gcm256); memcpy(crypto_info->gcm256.iv, eiv, TLS_CIPHER_AES_GCM_256_IV_SIZE); memcpy(crypto_info->gcm256.salt, iv, TLS_CIPHER_AES_GCM_256_SALT_SIZE); memcpy(crypto_info->gcm256.key, key, keylen); memcpy(crypto_info->gcm256.rec_seq, rl_sequence, TLS_CIPHER_AES_GCM_256_REC_SEQ_SIZE); return 1; # endif # ifdef OPENSSL_KTLS_AES_CCM_128 case NID_aes_128_ccm: if (!ossl_assert(TLS_CIPHER_AES_CCM_128_SALT_SIZE == EVP_CCM_TLS_FIXED_IV_LEN) || !ossl_assert(TLS_CIPHER_AES_CCM_128_IV_SIZE == EVP_CCM_TLS_EXPLICIT_IV_LEN)) return 0; crypto_info->ccm128.info.cipher_type = TLS_CIPHER_AES_CCM_128; crypto_info->ccm128.info.version = version; crypto_info->tls_crypto_info_len = sizeof(crypto_info->ccm128); memcpy(crypto_info->ccm128.iv, eiv, TLS_CIPHER_AES_CCM_128_IV_SIZE); memcpy(crypto_info->ccm128.salt, iv, TLS_CIPHER_AES_CCM_128_SALT_SIZE); memcpy(crypto_info->ccm128.key, key, keylen); memcpy(crypto_info->ccm128.rec_seq, rl_sequence, TLS_CIPHER_AES_CCM_128_REC_SEQ_SIZE); return 1; # endif # ifdef OPENSSL_KTLS_CHACHA20_POLY1305 case NID_chacha20_poly1305: if (!ossl_assert(ivlen == TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE)) return 0; crypto_info->chacha20poly1305.info.cipher_type = TLS_CIPHER_CHACHA20_POLY1305; crypto_info->chacha20poly1305.info.version = version; crypto_info->tls_crypto_info_len = sizeof(crypto_info->chacha20poly1305); memcpy(crypto_info->chacha20poly1305.iv, iv, ivlen); memcpy(crypto_info->chacha20poly1305.key, key, keylen); memcpy(crypto_info->chacha20poly1305.rec_seq, rl_sequence, TLS_CIPHER_CHACHA20_POLY1305_REC_SEQ_SIZE); return 1; # endif default: return 0; } } #endif static int ktls_set_crypto_state(OSSL_RECORD_LAYER *rl, int level, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp) { ktls_crypto_info_t crypto_info; if (comp != NULL) return OSSL_RECORD_RETURN_NON_FATAL_ERR; if (rl->max_frag_len != SSL3_RT_MAX_PLAIN_LENGTH) return OSSL_RECORD_RETURN_NON_FATAL_ERR; if (!ktls_int_check_supported_cipher(rl, ciph, md, taglen)) return OSSL_RECORD_RETURN_NON_FATAL_ERR; if (rl->direction == OSSL_RECORD_DIRECTION_WRITE) { if (BIO_flush(rl->bio) <= 0) return OSSL_RECORD_RETURN_NON_FATAL_ERR; if (rl->padding != NULL || rl->block_padding > 0) return OSSL_RECORD_RETURN_NON_FATAL_ERR; } if (!ktls_configure_crypto(rl->libctx, rl->version, ciph, md, rl->sequence, &crypto_info, rl->direction == OSSL_RECORD_DIRECTION_WRITE, iv, ivlen, key, keylen, mackey, mackeylen)) return OSSL_RECORD_RETURN_NON_FATAL_ERR; if (!BIO_set_ktls(rl->bio, &crypto_info, rl->direction)) return OSSL_RECORD_RETURN_NON_FATAL_ERR; if (rl->direction == OSSL_RECORD_DIRECTION_WRITE && (rl->options & SSL_OP_ENABLE_KTLS_TX_ZEROCOPY_SENDFILE) != 0) BIO_set_ktls_tx_zerocopy_sendfile(rl->bio); return OSSL_RECORD_RETURN_SUCCESS; } static int ktls_read_n(OSSL_RECORD_LAYER *rl, size_t n, size_t max, int extend, int clearold, size_t *readbytes) { int ret; ret = tls_default_read_n(rl, n, max, extend, clearold, readbytes); if (ret < OSSL_RECORD_RETURN_RETRY) { switch (errno) { case EBADMSG: RLAYERfatal(rl, SSL_AD_BAD_RECORD_MAC, SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); break; case EMSGSIZE: RLAYERfatal(rl, SSL_AD_RECORD_OVERFLOW, SSL_R_PACKET_LENGTH_TOO_LONG); break; case EINVAL: RLAYERfatal(rl, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_VERSION_NUMBER); break; default: break; } } return ret; } static int ktls_cipher(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *inrecs, size_t n_recs, int sending, SSL_MAC_BUF *mac, size_t macsize) { return 1; } static int ktls_validate_record_header(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { if (rec->rec_version != TLS1_2_VERSION) { RLAYERfatal(rl, SSL_AD_DECODE_ERROR, SSL_R_WRONG_VERSION_NUMBER); return 0; } return 1; } static int ktls_post_process_record(OSSL_RECORD_LAYER *rl, TLS_RL_RECORD *rec) { if (rl->version == TLS1_3_VERSION) return tls13_common_post_process_record(rl, rec); return 1; } static int ktls_new_record_layer(OSSL_LIB_CTX *libctx, const char *propq, int vers, int role, int direction, int level, uint16_t epoch, unsigned char *secret, size_t secretlen, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp, const EVP_MD *kdfdigest, BIO *prev, BIO *transport, BIO *next, BIO_ADDR *local, BIO_ADDR *peer, const OSSL_PARAM *settings, const OSSL_PARAM *options, const OSSL_DISPATCH *fns, void *cbarg, void *rlarg, OSSL_RECORD_LAYER **retrl) { int ret; ret = tls_int_new_record_layer(libctx, propq, vers, role, direction, level, ciph, taglen, md, comp, prev, transport, next, settings, options, fns, cbarg, retrl); if (ret != OSSL_RECORD_RETURN_SUCCESS) return ret; (*retrl)->funcs = &ossl_ktls_funcs; ret = (*retrl)->funcs->set_crypto_state(*retrl, level, key, keylen, iv, ivlen, mackey, mackeylen, ciph, taglen, mactype, md, comp); if (ret != OSSL_RECORD_RETURN_SUCCESS) { OPENSSL_free(*retrl); *retrl = NULL; } else { (*retrl)->read_ahead = 1; } return ret; } static int ktls_allocate_write_buffers(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl, size_t *prefix) { if (!ossl_assert(numtempl == 1)) return 0; rl->numwpipes = 1; return 1; } static int ktls_initialise_write_packets(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *templates, size_t numtempl, OSSL_RECORD_TEMPLATE *prefixtempl, WPACKET *pkt, TLS_BUFFER *bufs, size_t *wpinited) { TLS_BUFFER *wb; wb = &bufs[0]; wb->type = templates[0].type; TLS_BUFFER_set_buf(wb, (unsigned char *)templates[0].buf); TLS_BUFFER_set_offset(wb, 0); TLS_BUFFER_set_app_buffer(wb, 1); return 1; } static int ktls_prepare_record_header(OSSL_RECORD_LAYER *rl, WPACKET *thispkt, OSSL_RECORD_TEMPLATE *templ, uint8_t rectype, unsigned char **recdata) { *recdata = NULL; return 1; } static int ktls_prepare_for_encryption(OSSL_RECORD_LAYER *rl, size_t mac_size, WPACKET *thispkt, TLS_RL_RECORD *thiswr) { return 1; } static int ktls_post_encryption_processing(OSSL_RECORD_LAYER *rl, size_t mac_size, OSSL_RECORD_TEMPLATE *templ, WPACKET *thispkt, TLS_RL_RECORD *thiswr) { return 1; } static int ktls_prepare_write_bio(OSSL_RECORD_LAYER *rl, int type) { if (type != SSL3_RT_APPLICATION_DATA) { int ret, i = BIO_flush(rl->bio); if (i <= 0) { if (BIO_should_retry(rl->bio)) ret = OSSL_RECORD_RETURN_RETRY; else ret = OSSL_RECORD_RETURN_FATAL; return ret; } BIO_set_ktls_ctrl_msg(rl->bio, type); } return OSSL_RECORD_RETURN_SUCCESS; } static int ktls_alloc_buffers(OSSL_RECORD_LAYER *rl) { if (rl->direction == OSSL_RECORD_DIRECTION_WRITE) return 1; return tls_alloc_buffers(rl); } static int ktls_free_buffers(OSSL_RECORD_LAYER *rl) { if (rl->direction == OSSL_RECORD_DIRECTION_WRITE) return 1; return tls_free_buffers(rl); } static struct record_functions_st ossl_ktls_funcs = { ktls_set_crypto_state, ktls_cipher, NULL, tls_default_set_protocol_version, ktls_read_n, tls_get_more_records, ktls_validate_record_header, ktls_post_process_record, tls_get_max_records_default, tls_write_records_default, ktls_allocate_write_buffers, ktls_initialise_write_packets, NULL, ktls_prepare_record_header, NULL, ktls_prepare_for_encryption, ktls_post_encryption_processing, ktls_prepare_write_bio }; const OSSL_RECORD_METHOD ossl_ktls_record_method = { ktls_new_record_layer, tls_free, tls_unprocessed_read_pending, tls_processed_read_pending, tls_app_data_pending, tls_get_max_records, tls_write_records, tls_retry_write_records, tls_read_record, tls_release_record, tls_get_alert_code, tls_set1_bio, tls_set_protocol_version, tls_set_plain_alerts, tls_set_first_handshake, tls_set_max_pipelines, NULL, tls_get_state, tls_set_options, tls_get_compression, tls_set_max_frag_len, NULL, tls_increment_sequence_ctr, ktls_alloc_buffers, ktls_free_buffers };
methods
openssl/ssl/record/methods/ktls_meth.c
openssl
#include <openssl/rand.h> #include <openssl/evp.h> #include "internal/constant_time.h" #include "internal/cryptlib.h" #include "internal/ssl3_cbc.h" static int ssl3_cbc_copy_mac(size_t *reclen, size_t origreclen, unsigned char *recdata, unsigned char **mac, int *alloced, size_t block_size, size_t mac_size, size_t good, OSSL_LIB_CTX *libctx); int ssl3_cbc_remove_padding_and_mac(size_t *reclen, size_t origreclen, unsigned char *recdata, unsigned char **mac, int *alloced, size_t block_size, size_t mac_size, OSSL_LIB_CTX *libctx) { size_t padding_length; size_t good; const size_t overhead = 1 + mac_size; if (overhead > *reclen) return 0; padding_length = recdata[*reclen - 1]; good = constant_time_ge_s(*reclen, padding_length + overhead); good &= constant_time_ge_s(block_size, padding_length + 1); *reclen -= good & (padding_length + 1); return ssl3_cbc_copy_mac(reclen, origreclen, recdata, mac, alloced, block_size, mac_size, good, libctx); } int tls1_cbc_remove_padding_and_mac(size_t *reclen, size_t origreclen, unsigned char *recdata, unsigned char **mac, int *alloced, size_t block_size, size_t mac_size, int aead, OSSL_LIB_CTX *libctx) { size_t good = -1; size_t padding_length, to_check, i; size_t overhead = ((block_size == 1) ? 0 : 1) + mac_size; if (overhead > *reclen) return 0; if (block_size != 1) { padding_length = recdata[*reclen - 1]; if (aead) { *reclen -= padding_length + 1 + mac_size; return 1; } good = constant_time_ge_s(*reclen, overhead + padding_length); to_check = 256; if (to_check > *reclen) to_check = *reclen; for (i = 0; i < to_check; i++) { unsigned char mask = constant_time_ge_8_s(padding_length, i); unsigned char b = recdata[*reclen - 1 - i]; good &= ~(mask & (padding_length ^ b)); } good = constant_time_eq_s(0xff, good & 0xff); *reclen -= good & (padding_length + 1); } return ssl3_cbc_copy_mac(reclen, origreclen, recdata, mac, alloced, block_size, mac_size, good, libctx); } #define CBC_MAC_ROTATE_IN_PLACE static int ssl3_cbc_copy_mac(size_t *reclen, size_t origreclen, unsigned char *recdata, unsigned char **mac, int *alloced, size_t block_size, size_t mac_size, size_t good, OSSL_LIB_CTX *libctx) { #if defined(CBC_MAC_ROTATE_IN_PLACE) unsigned char rotated_mac_buf[64 + EVP_MAX_MD_SIZE]; unsigned char *rotated_mac; char aux1, aux2, aux3, mask; #else unsigned char rotated_mac[EVP_MAX_MD_SIZE]; #endif unsigned char randmac[EVP_MAX_MD_SIZE]; unsigned char *out; size_t mac_end = *reclen; size_t mac_start = mac_end - mac_size; size_t in_mac; size_t scan_start = 0; size_t i, j; size_t rotate_offset; if (!ossl_assert(origreclen >= mac_size && mac_size <= EVP_MAX_MD_SIZE)) return 0; if (mac_size == 0) { if (good == 0) return 0; return 1; } *reclen -= mac_size; if (block_size == 1) { if (mac != NULL) *mac = &recdata[*reclen]; if (alloced != NULL) *alloced = 0; return 1; } if (RAND_bytes_ex(libctx, randmac, mac_size, 0) <= 0) return 0; if (!ossl_assert(mac != NULL && alloced != NULL)) return 0; *mac = out = OPENSSL_malloc(mac_size); if (*mac == NULL) return 0; *alloced = 1; #if defined(CBC_MAC_ROTATE_IN_PLACE) rotated_mac = rotated_mac_buf + ((0 - (size_t)rotated_mac_buf) & 63); #endif if (origreclen > mac_size + 255 + 1) scan_start = origreclen - (mac_size + 255 + 1); in_mac = 0; rotate_offset = 0; memset(rotated_mac, 0, mac_size); for (i = scan_start, j = 0; i < origreclen; i++) { size_t mac_started = constant_time_eq_s(i, mac_start); size_t mac_ended = constant_time_lt_s(i, mac_end); unsigned char b = recdata[i]; in_mac |= mac_started; in_mac &= mac_ended; rotate_offset |= j & mac_started; rotated_mac[j++] |= b & in_mac; j &= constant_time_lt_s(j, mac_size); } #if defined(CBC_MAC_ROTATE_IN_PLACE) j = 0; for (i = 0; i < mac_size; i++) { aux1 = rotated_mac[rotate_offset & ~32]; aux2 = rotated_mac[rotate_offset | 32]; mask = constant_time_eq_8(rotate_offset & ~32, rotate_offset); aux3 = constant_time_select_8(mask, aux1, aux2); rotate_offset++; out[j++] = constant_time_select_8((unsigned char)(good & 0xff), aux3, randmac[i]); rotate_offset &= constant_time_lt_s(rotate_offset, mac_size); } #else memset(out, 0, mac_size); rotate_offset = mac_size - rotate_offset; rotate_offset &= constant_time_lt_s(rotate_offset, mac_size); for (i = 0; i < mac_size; i++) { for (j = 0; j < mac_size; j++) out[j] |= rotated_mac[i] & constant_time_eq_8_s(j, rotate_offset); rotate_offset++; rotate_offset &= constant_time_lt_s(rotate_offset, mac_size); out[i] = constant_time_select_8((unsigned char)(good & 0xff), out[i], randmac[i]); } #endif return 1; }
methods
openssl/ssl/record/methods/tls_pad.c
openssl
#include "internal/common.h" #include <openssl/ssl.h> #include <openssl/err.h> #include "../ssl_local.h" #define ITEM_N(items, stride, n) \ (*(SSL_POLL_ITEM *)((char *)(items) + (n)*(stride))) #define FAIL_FROM(n) \ do { \ size_t j; \ \ for (j = (n); j < num_items; ++j) \ ITEM_N(items, stride, j).revents = 0; \ \ ok = 0; \ goto out; \ } while (0) #define FAIL_ITEM(i) \ do { \ ITEM_N(items, stride, i).revents = SSL_POLL_EVENT_F; \ ++result_count; \ FAIL_FROM(i + 1); \ } while (0) int SSL_poll(SSL_POLL_ITEM *items, size_t num_items, size_t stride, const struct timeval *timeout, uint64_t flags, size_t *p_result_count) { int ok = 1; size_t i, result_count = 0; SSL_POLL_ITEM *item; SSL *ssl; uint64_t revents; ossl_unused uint64_t events; ossl_unused int do_tick = ((flags & SSL_POLL_FLAG_NO_HANDLE_EVENTS) == 0); int is_immediate = (timeout != NULL && timeout->tv_sec == 0 && timeout->tv_usec == 0); if (!is_immediate) { ERR_raise_data(ERR_LIB_SSL, SSL_R_POLL_REQUEST_NOT_SUPPORTED, "SSL_poll does not currently support blocking " "operation"); FAIL_FROM(0); } if (num_items == 0) goto out; for (i = 0; i < num_items; ++i) { item = &ITEM_N(items, stride, i); events = item->events; revents = 0; switch (item->desc.type) { case BIO_POLL_DESCRIPTOR_TYPE_SSL: ssl = item->desc.value.ssl; if (ssl == NULL) break; switch (ssl->type) { #ifndef OPENSSL_NO_QUIC case SSL_TYPE_QUIC_CONNECTION: case SSL_TYPE_QUIC_XSO: if (!ossl_quic_conn_poll_events(ssl, events, do_tick, &revents)) FAIL_ITEM(i); if (revents != 0) ++result_count; break; #endif default: ERR_raise_data(ERR_LIB_SSL, SSL_R_POLL_REQUEST_NOT_SUPPORTED, "SSL_poll currently only supports QUIC SSL " "objects"); FAIL_ITEM(i); } break; case BIO_POLL_DESCRIPTOR_TYPE_SOCK_FD: ERR_raise_data(ERR_LIB_SSL, SSL_R_POLL_REQUEST_NOT_SUPPORTED, "SSL_poll currently does not support polling " "sockets"); FAIL_ITEM(i); default: ERR_raise_data(ERR_LIB_SSL, SSL_R_POLL_REQUEST_NOT_SUPPORTED, "SSL_poll does not support unknown poll descriptor " "type %d", item->desc.type); FAIL_ITEM(i); } item->revents = revents; } out: if (p_result_count != NULL) *p_result_count = result_count; return ok; }
rio
openssl/ssl/rio/poll_immediate.c
openssl
#include "internal/quic_lcidm.h" #include "internal/quic_types.h" #include "internal/quic_vlint.h" #include "internal/common.h" #include <openssl/lhash.h> #include <openssl/rand.h> #include <openssl/err.h> typedef struct quic_lcidm_conn_st QUIC_LCIDM_CONN; enum { LCID_TYPE_ODCID, LCID_TYPE_INITIAL, LCID_TYPE_NCID }; typedef struct quic_lcid_st { QUIC_CONN_ID cid; uint64_t seq_num; QUIC_LCIDM_CONN *conn; unsigned int type : 2; } QUIC_LCID; DEFINE_LHASH_OF_EX(QUIC_LCID); DEFINE_LHASH_OF_EX(QUIC_LCIDM_CONN); struct quic_lcidm_conn_st { size_t num_active_lcid; LHASH_OF(QUIC_LCID) *lcids; void *opaque; QUIC_LCID *odcid_lcid_obj; uint64_t next_seq_num; unsigned int done_odcid : 1; }; struct quic_lcidm_st { OSSL_LIB_CTX *libctx; LHASH_OF(QUIC_LCID) *lcids; LHASH_OF(QUIC_LCIDM_CONN) *conns; size_t lcid_len; #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION QUIC_CONN_ID next_lcid; #endif }; static unsigned long bin_hash(const unsigned char *buf, size_t buf_len) { unsigned long hash = 0; size_t i; for (i = 0; i < buf_len; ++i) hash ^= ((unsigned long)buf[i]) << (8 * (i % sizeof(unsigned long))); return hash; } static unsigned long lcid_hash(const QUIC_LCID *lcid_obj) { return bin_hash(lcid_obj->cid.id, lcid_obj->cid.id_len); } static int lcid_comp(const QUIC_LCID *a, const QUIC_LCID *b) { return !ossl_quic_conn_id_eq(&a->cid, &b->cid); } static unsigned long lcidm_conn_hash(const QUIC_LCIDM_CONN *conn) { return (unsigned long)(uintptr_t)conn->opaque; } static int lcidm_conn_comp(const QUIC_LCIDM_CONN *a, const QUIC_LCIDM_CONN *b) { return a->opaque != b->opaque; } QUIC_LCIDM *ossl_quic_lcidm_new(OSSL_LIB_CTX *libctx, size_t lcid_len) { QUIC_LCIDM *lcidm = NULL; if (lcid_len > QUIC_MAX_CONN_ID_LEN) goto err; if ((lcidm = OPENSSL_zalloc(sizeof(*lcidm))) == NULL) goto err; if ((lcidm->lcids = lh_QUIC_LCID_new(lcid_hash, lcid_comp)) == NULL) goto err; if ((lcidm->conns = lh_QUIC_LCIDM_CONN_new(lcidm_conn_hash, lcidm_conn_comp)) == NULL) goto err; lcidm->libctx = libctx; lcidm->lcid_len = lcid_len; return lcidm; err: if (lcidm != NULL) { lh_QUIC_LCID_free(lcidm->lcids); lh_QUIC_LCIDM_CONN_free(lcidm->conns); OPENSSL_free(lcidm); } return NULL; } static void lcidm_delete_conn(QUIC_LCIDM *lcidm, QUIC_LCIDM_CONN *conn); static void lcidm_delete_conn_(QUIC_LCIDM_CONN *conn, void *arg) { lcidm_delete_conn((QUIC_LCIDM *)arg, conn); } void ossl_quic_lcidm_free(QUIC_LCIDM *lcidm) { if (lcidm == NULL) return; lh_QUIC_LCIDM_CONN_set_down_load(lcidm->conns, 0); lh_QUIC_LCIDM_CONN_doall_arg(lcidm->conns, lcidm_delete_conn_, lcidm); lh_QUIC_LCID_free(lcidm->lcids); lh_QUIC_LCIDM_CONN_free(lcidm->conns); OPENSSL_free(lcidm); } static QUIC_LCID *lcidm_get0_lcid(const QUIC_LCIDM *lcidm, const QUIC_CONN_ID *lcid) { QUIC_LCID key; key.cid = *lcid; if (key.cid.id_len > QUIC_MAX_CONN_ID_LEN) return NULL; return lh_QUIC_LCID_retrieve(lcidm->lcids, &key); } static QUIC_LCIDM_CONN *lcidm_get0_conn(const QUIC_LCIDM *lcidm, void *opaque) { QUIC_LCIDM_CONN key; key.opaque = opaque; return lh_QUIC_LCIDM_CONN_retrieve(lcidm->conns, &key); } static QUIC_LCIDM_CONN *lcidm_upsert_conn(const QUIC_LCIDM *lcidm, void *opaque) { QUIC_LCIDM_CONN *conn = lcidm_get0_conn(lcidm, opaque); if (conn != NULL) return conn; if ((conn = OPENSSL_zalloc(sizeof(*conn))) == NULL) goto err; if ((conn->lcids = lh_QUIC_LCID_new(lcid_hash, lcid_comp)) == NULL) goto err; conn->opaque = opaque; lh_QUIC_LCIDM_CONN_insert(lcidm->conns, conn); if (lh_QUIC_LCIDM_CONN_error(lcidm->conns)) goto err; return conn; err: if (conn != NULL) { lh_QUIC_LCID_free(conn->lcids); OPENSSL_free(conn); } return NULL; } static void lcidm_delete_conn_lcid(QUIC_LCIDM *lcidm, QUIC_LCID *lcid_obj) { lh_QUIC_LCID_delete(lcidm->lcids, lcid_obj); lh_QUIC_LCID_delete(lcid_obj->conn->lcids, lcid_obj); assert(lcid_obj->conn->num_active_lcid > 0); --lcid_obj->conn->num_active_lcid; OPENSSL_free(lcid_obj); } static void lcidm_delete_conn_lcid_(QUIC_LCID *lcid_obj, void *arg) { lcidm_delete_conn_lcid((QUIC_LCIDM *)arg, lcid_obj); } static void lcidm_delete_conn(QUIC_LCIDM *lcidm, QUIC_LCIDM_CONN *conn) { lh_QUIC_LCID_set_down_load(conn->lcids, 0); lh_QUIC_LCID_doall_arg(conn->lcids, lcidm_delete_conn_lcid_, lcidm); lh_QUIC_LCIDM_CONN_delete(lcidm->conns, conn); lh_QUIC_LCID_free(conn->lcids); OPENSSL_free(conn); } static QUIC_LCID *lcidm_conn_new_lcid(QUIC_LCIDM *lcidm, QUIC_LCIDM_CONN *conn, const QUIC_CONN_ID *lcid) { QUIC_LCID *lcid_obj = NULL; if (lcid->id_len > QUIC_MAX_CONN_ID_LEN) return NULL; if ((lcid_obj = OPENSSL_zalloc(sizeof(*lcid_obj))) == NULL) goto err; lcid_obj->cid = *lcid; lcid_obj->conn = conn; lh_QUIC_LCID_insert(conn->lcids, lcid_obj); if (lh_QUIC_LCID_error(conn->lcids)) goto err; lh_QUIC_LCID_insert(lcidm->lcids, lcid_obj); if (lh_QUIC_LCID_error(lcidm->lcids)) { lh_QUIC_LCID_delete(conn->lcids, lcid_obj); goto err; } ++conn->num_active_lcid; return lcid_obj; err: OPENSSL_free(lcid_obj); return NULL; } size_t ossl_quic_lcidm_get_lcid_len(const QUIC_LCIDM *lcidm) { return lcidm->lcid_len; } size_t ossl_quic_lcidm_get_num_active_lcid(const QUIC_LCIDM *lcidm, void *opaque) { QUIC_LCIDM_CONN *conn; conn = lcidm_get0_conn(lcidm, opaque); if (conn == NULL) return 0; return conn->num_active_lcid; } static int lcidm_generate_cid(QUIC_LCIDM *lcidm, QUIC_CONN_ID *cid) { #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION int i; lcidm->next_lcid.id_len = (unsigned char)lcidm->lcid_len; *cid = lcidm->next_lcid; for (i = lcidm->lcid_len - 1; i >= 0; --i) if (++lcidm->next_lcid.id[i] != 0) break; return 1; #else return ossl_quic_gen_rand_conn_id(lcidm->libctx, lcidm->lcid_len, cid); #endif } static int lcidm_generate(QUIC_LCIDM *lcidm, void *opaque, unsigned int type, QUIC_CONN_ID *lcid_out, uint64_t *seq_num) { QUIC_LCIDM_CONN *conn; QUIC_LCID key, *lcid_obj; size_t i; #define MAX_RETRIES 8 if ((conn = lcidm_upsert_conn(lcidm, opaque)) == NULL) return 0; if ((type == LCID_TYPE_INITIAL && conn->next_seq_num > 0) || conn->next_seq_num > OSSL_QUIC_VLINT_MAX) return 0; i = 0; do { if (i++ >= MAX_RETRIES) return 0; if (!lcidm_generate_cid(lcidm, lcid_out)) return 0; key.cid = *lcid_out; } while (lh_QUIC_LCID_retrieve(lcidm->lcids, &key) != NULL); if ((lcid_obj = lcidm_conn_new_lcid(lcidm, conn, lcid_out)) == NULL) return 0; lcid_obj->seq_num = conn->next_seq_num; lcid_obj->type = type; if (seq_num != NULL) *seq_num = lcid_obj->seq_num; ++conn->next_seq_num; return 1; } int ossl_quic_lcidm_enrol_odcid(QUIC_LCIDM *lcidm, void *opaque, const QUIC_CONN_ID *initial_odcid) { QUIC_LCIDM_CONN *conn; QUIC_LCID key, *lcid_obj; if (initial_odcid == NULL || initial_odcid->id_len < QUIC_MIN_ODCID_LEN || initial_odcid->id_len > QUIC_MAX_CONN_ID_LEN) return 0; if ((conn = lcidm_upsert_conn(lcidm, opaque)) == NULL) return 0; if (conn->done_odcid) return 0; key.cid = *initial_odcid; if (lh_QUIC_LCID_retrieve(lcidm->lcids, &key) != NULL) return 0; if ((lcid_obj = lcidm_conn_new_lcid(lcidm, conn, initial_odcid)) == NULL) return 0; lcid_obj->seq_num = LCIDM_ODCID_SEQ_NUM; lcid_obj->type = LCID_TYPE_ODCID; conn->odcid_lcid_obj = lcid_obj; conn->done_odcid = 1; return 1; } int ossl_quic_lcidm_generate_initial(QUIC_LCIDM *lcidm, void *opaque, QUIC_CONN_ID *initial_lcid) { return lcidm_generate(lcidm, opaque, LCID_TYPE_INITIAL, initial_lcid, NULL); } int ossl_quic_lcidm_generate(QUIC_LCIDM *lcidm, void *opaque, OSSL_QUIC_FRAME_NEW_CONN_ID *ncid_frame) { ncid_frame->seq_num = 0; ncid_frame->retire_prior_to = 0; return lcidm_generate(lcidm, opaque, LCID_TYPE_NCID, &ncid_frame->conn_id, &ncid_frame->seq_num); } int ossl_quic_lcidm_retire_odcid(QUIC_LCIDM *lcidm, void *opaque) { QUIC_LCIDM_CONN *conn; if ((conn = lcidm_upsert_conn(lcidm, opaque)) == NULL) return 0; if (conn->odcid_lcid_obj == NULL) return 0; lcidm_delete_conn_lcid(lcidm, conn->odcid_lcid_obj); conn->odcid_lcid_obj = NULL; return 1; } struct retire_args { QUIC_LCID *earliest_seq_num_lcid_obj; uint64_t earliest_seq_num, retire_prior_to; }; static void retire_for_conn(QUIC_LCID *lcid_obj, void *arg) { struct retire_args *args = arg; if (lcid_obj->type == LCID_TYPE_ODCID || lcid_obj->seq_num >= args->retire_prior_to) return; if (lcid_obj->seq_num < args->earliest_seq_num) { args->earliest_seq_num = lcid_obj->seq_num; args->earliest_seq_num_lcid_obj = lcid_obj; } } int ossl_quic_lcidm_retire(QUIC_LCIDM *lcidm, void *opaque, uint64_t retire_prior_to, const QUIC_CONN_ID *containing_pkt_dcid, QUIC_CONN_ID *retired_lcid, uint64_t *retired_seq_num, int *did_retire) { QUIC_LCIDM_CONN key, *conn; struct retire_args args = {0}; key.opaque = opaque; if (did_retire == NULL) return 0; *did_retire = 0; if ((conn = lh_QUIC_LCIDM_CONN_retrieve(lcidm->conns, &key)) == NULL) return 1; args.retire_prior_to = retire_prior_to; args.earliest_seq_num = UINT64_MAX; lh_QUIC_LCID_doall_arg(conn->lcids, retire_for_conn, &args); if (args.earliest_seq_num_lcid_obj == NULL) return 1; if (containing_pkt_dcid != NULL && ossl_quic_conn_id_eq(&args.earliest_seq_num_lcid_obj->cid, containing_pkt_dcid)) return 0; *did_retire = 1; if (retired_lcid != NULL) *retired_lcid = args.earliest_seq_num_lcid_obj->cid; if (retired_seq_num != NULL) *retired_seq_num = args.earliest_seq_num_lcid_obj->seq_num; lcidm_delete_conn_lcid(lcidm, args.earliest_seq_num_lcid_obj); return 1; } int ossl_quic_lcidm_cull(QUIC_LCIDM *lcidm, void *opaque) { QUIC_LCIDM_CONN key, *conn; key.opaque = opaque; if ((conn = lh_QUIC_LCIDM_CONN_retrieve(lcidm->conns, &key)) == NULL) return 0; lcidm_delete_conn(lcidm, conn); return 1; } int ossl_quic_lcidm_lookup(QUIC_LCIDM *lcidm, const QUIC_CONN_ID *lcid, uint64_t *seq_num, void **opaque) { QUIC_LCID *lcid_obj; if (lcid == NULL) return 0; if ((lcid_obj = lcidm_get0_lcid(lcidm, lcid)) == NULL) return 0; if (seq_num != NULL) *seq_num = lcid_obj->seq_num; if (opaque != NULL) *opaque = lcid_obj->conn->opaque; return 1; } int ossl_quic_lcidm_debug_remove(QUIC_LCIDM *lcidm, const QUIC_CONN_ID *lcid) { QUIC_LCID key, *lcid_obj; key.cid = *lcid; if ((lcid_obj = lh_QUIC_LCID_retrieve(lcidm->lcids, &key)) == NULL) return 0; lcidm_delete_conn_lcid(lcidm, lcid_obj); return 1; } int ossl_quic_lcidm_debug_add(QUIC_LCIDM *lcidm, void *opaque, const QUIC_CONN_ID *lcid, uint64_t seq_num) { QUIC_LCIDM_CONN *conn; QUIC_LCID key, *lcid_obj; if (lcid == NULL || lcid->id_len > QUIC_MAX_CONN_ID_LEN) return 0; if ((conn = lcidm_upsert_conn(lcidm, opaque)) == NULL) return 0; key.cid = *lcid; if (lh_QUIC_LCID_retrieve(lcidm->lcids, &key) != NULL) return 0; if ((lcid_obj = lcidm_conn_new_lcid(lcidm, conn, lcid)) == NULL) return 0; lcid_obj->seq_num = seq_num; lcid_obj->type = LCID_TYPE_NCID; return 1; }
quic
openssl/ssl/quic/quic_lcidm.c
openssl
#include "internal/quic_record_tx.h" #include "internal/qlog_event_helpers.h" #include "internal/bio_addr.h" #include "internal/common.h" #include "quic_record_shared.h" #include "internal/list.h" #include "../ssl_local.h" typedef struct txe_st TXE; struct txe_st { OSSL_LIST_MEMBER(txe, TXE); size_t data_len, alloc_len; BIO_ADDR peer, local; }; DEFINE_LIST_OF(txe, TXE); typedef OSSL_LIST(txe) TXE_LIST; static ossl_inline unsigned char *txe_data(const TXE *e) { return (unsigned char *)(e + 1); } struct ossl_qtx_st { OSSL_LIB_CTX *libctx; const char *propq; OSSL_QRL_ENC_LEVEL_SET el_set; BIO *bio; QLOG *(*get_qlog_cb)(void *arg); void *get_qlog_cb_arg; size_t mdpl; TXE_LIST free; TXE_LIST pending; size_t pending_count; size_t pending_bytes; TXE *cons; size_t cons_count; uint64_t epoch_pkt_count; uint64_t datagram_count; ossl_mutate_packet_cb mutatecb; ossl_finish_mutate_cb finishmutatecb; void *mutatearg; ossl_msg_cb msg_callback; void *msg_callback_arg; SSL *msg_callback_ssl; }; OSSL_QTX *ossl_qtx_new(const OSSL_QTX_ARGS *args) { OSSL_QTX *qtx; if (args->mdpl < QUIC_MIN_INITIAL_DGRAM_LEN) return 0; qtx = OPENSSL_zalloc(sizeof(OSSL_QTX)); if (qtx == NULL) return 0; qtx->libctx = args->libctx; qtx->propq = args->propq; qtx->bio = args->bio; qtx->mdpl = args->mdpl; qtx->get_qlog_cb = args->get_qlog_cb; qtx->get_qlog_cb_arg = args->get_qlog_cb_arg; return qtx; } static void qtx_cleanup_txl(TXE_LIST *l) { TXE *e, *enext; for (e = ossl_list_txe_head(l); e != NULL; e = enext) { enext = ossl_list_txe_next(e); OPENSSL_free(e); } } void ossl_qtx_free(OSSL_QTX *qtx) { uint32_t i; if (qtx == NULL) return; qtx_cleanup_txl(&qtx->pending); qtx_cleanup_txl(&qtx->free); OPENSSL_free(qtx->cons); for (i = 0; i < QUIC_ENC_LEVEL_NUM; ++i) ossl_qrl_enc_level_set_discard(&qtx->el_set, i); OPENSSL_free(qtx); } void ossl_qtx_set_mutator(OSSL_QTX *qtx, ossl_mutate_packet_cb mutatecb, ossl_finish_mutate_cb finishmutatecb, void *mutatearg) { qtx->mutatecb = mutatecb; qtx->finishmutatecb = finishmutatecb; qtx->mutatearg = mutatearg; } void ossl_qtx_set_qlog_cb(OSSL_QTX *qtx, QLOG *(*get_qlog_cb)(void *arg), void *get_qlog_cb_arg) { qtx->get_qlog_cb = get_qlog_cb; qtx->get_qlog_cb_arg = get_qlog_cb_arg; } int ossl_qtx_provide_secret(OSSL_QTX *qtx, uint32_t enc_level, uint32_t suite_id, EVP_MD *md, const unsigned char *secret, size_t secret_len) { if (enc_level >= QUIC_ENC_LEVEL_NUM) return 0; return ossl_qrl_enc_level_set_provide_secret(&qtx->el_set, qtx->libctx, qtx->propq, enc_level, suite_id, md, secret, secret_len, 0, 1); } int ossl_qtx_discard_enc_level(OSSL_QTX *qtx, uint32_t enc_level) { if (enc_level >= QUIC_ENC_LEVEL_NUM) return 0; ossl_qrl_enc_level_set_discard(&qtx->el_set, enc_level); return 1; } int ossl_qtx_is_enc_level_provisioned(OSSL_QTX *qtx, uint32_t enc_level) { return ossl_qrl_enc_level_set_get(&qtx->el_set, enc_level, 1) != NULL; } static TXE *qtx_alloc_txe(size_t alloc_len) { TXE *txe; if (alloc_len >= SIZE_MAX - sizeof(TXE)) return NULL; txe = OPENSSL_malloc(sizeof(TXE) + alloc_len); if (txe == NULL) return NULL; ossl_list_txe_init_elem(txe); txe->alloc_len = alloc_len; txe->data_len = 0; return txe; } static TXE *qtx_ensure_free_txe(OSSL_QTX *qtx, size_t alloc_len) { TXE *txe; txe = ossl_list_txe_head(&qtx->free); if (txe != NULL) return txe; txe = qtx_alloc_txe(alloc_len); if (txe == NULL) return NULL; ossl_list_txe_insert_tail(&qtx->free, txe); return txe; } static TXE *qtx_resize_txe(OSSL_QTX *qtx, TXE_LIST *txl, TXE *txe, size_t n) { TXE *txe2, *p; if (txe == NULL) return NULL; if (n >= SIZE_MAX - sizeof(TXE)) return NULL; p = ossl_list_txe_prev(txe); ossl_list_txe_remove(txl, txe); txe2 = OPENSSL_realloc(txe, sizeof(TXE) + n); if (txe2 == NULL || txe == txe2) { if (p == NULL) ossl_list_txe_insert_head(txl, txe); else ossl_list_txe_insert_after(txl, p, txe); return txe2; } if (p == NULL) ossl_list_txe_insert_head(txl, txe2); else ossl_list_txe_insert_after(txl, p, txe2); if (qtx->cons == txe) qtx->cons = txe2; txe2->alloc_len = n; return txe2; } static TXE *qtx_reserve_txe(OSSL_QTX *qtx, TXE_LIST *txl, TXE *txe, size_t n) { if (txe->alloc_len >= n) return txe; return qtx_resize_txe(qtx, txl, txe, n); } static void qtx_pending_to_free(OSSL_QTX *qtx) { TXE *txe = ossl_list_txe_head(&qtx->pending); assert(txe != NULL); ossl_list_txe_remove(&qtx->pending, txe); --qtx->pending_count; qtx->pending_bytes -= txe->data_len; ossl_list_txe_insert_tail(&qtx->free, txe); } static void qtx_add_to_pending(OSSL_QTX *qtx, TXE *txe) { ossl_list_txe_insert_tail(&qtx->pending, txe); ++qtx->pending_count; qtx->pending_bytes += txe->data_len; } struct iovec_cur { const OSSL_QTX_IOVEC *iovec; size_t num_iovec, idx, byte_off, bytes_remaining; }; static size_t iovec_total_bytes(const OSSL_QTX_IOVEC *iovec, size_t num_iovec) { size_t i, l = 0; for (i = 0; i < num_iovec; ++i) l += iovec[i].buf_len; return l; } static void iovec_cur_init(struct iovec_cur *cur, const OSSL_QTX_IOVEC *iovec, size_t num_iovec) { cur->iovec = iovec; cur->num_iovec = num_iovec; cur->idx = 0; cur->byte_off = 0; cur->bytes_remaining = iovec_total_bytes(iovec, num_iovec); } static size_t iovec_cur_get_buffer(struct iovec_cur *cur, const unsigned char **buf, size_t max_buf_len) { size_t l; if (max_buf_len == 0) { *buf = NULL; return 0; } for (;;) { if (cur->idx >= cur->num_iovec) return 0; l = cur->iovec[cur->idx].buf_len - cur->byte_off; if (l > max_buf_len) l = max_buf_len; if (l > 0) { *buf = cur->iovec[cur->idx].buf + cur->byte_off; cur->byte_off += l; cur->bytes_remaining -= l; return l; } ++cur->idx; cur->byte_off = 0; } } int ossl_qtx_calculate_ciphertext_payload_len(OSSL_QTX *qtx, uint32_t enc_level, size_t plaintext_len, size_t *ciphertext_len) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(&qtx->el_set, enc_level, 1); size_t tag_len; if (el == NULL) { *ciphertext_len = 0; return 0; } tag_len = ossl_qrl_get_suite_cipher_tag_len(el->suite_id); *ciphertext_len = plaintext_len + tag_len; return 1; } int ossl_qtx_calculate_plaintext_payload_len(OSSL_QTX *qtx, uint32_t enc_level, size_t ciphertext_len, size_t *plaintext_len) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(&qtx->el_set, enc_level, 1); size_t tag_len; if (el == NULL) { *plaintext_len = 0; return 0; } tag_len = ossl_qrl_get_suite_cipher_tag_len(el->suite_id); if (ciphertext_len <= tag_len) { *plaintext_len = 0; return 0; } *plaintext_len = ciphertext_len - tag_len; return 1; } #define QTX_FAIL_GENERIC (-1) #define QTX_FAIL_INSUFFICIENT_LEN (-2) static int qtx_write_hdr(OSSL_QTX *qtx, const QUIC_PKT_HDR *hdr, TXE *txe, QUIC_PKT_HDR_PTRS *ptrs) { WPACKET wpkt; size_t l = 0; unsigned char *data = txe_data(txe) + txe->data_len; if (!WPACKET_init_static_len(&wpkt, data, txe->alloc_len - txe->data_len, 0)) return 0; if (!ossl_quic_wire_encode_pkt_hdr(&wpkt, hdr->dst_conn_id.id_len, hdr, ptrs) || !WPACKET_get_total_written(&wpkt, &l)) { WPACKET_finish(&wpkt); return 0; } WPACKET_finish(&wpkt); if (qtx->msg_callback != NULL) qtx->msg_callback(1, OSSL_QUIC1_VERSION, SSL3_RT_QUIC_PACKET, data, l, qtx->msg_callback_ssl, qtx->msg_callback_arg); txe->data_len += l; return 1; } static int qtx_encrypt_into_txe(OSSL_QTX *qtx, struct iovec_cur *cur, TXE *txe, uint32_t enc_level, QUIC_PN pn, const unsigned char *hdr, size_t hdr_len, QUIC_PKT_HDR_PTRS *ptrs) { int l = 0, l2 = 0, nonce_len; OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(&qtx->el_set, enc_level, 1); unsigned char nonce[EVP_MAX_IV_LENGTH]; size_t i; EVP_CIPHER_CTX *cctx = NULL; if (!ossl_assert(el != NULL)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } if (el->op_count >= ossl_qrl_get_suite_max_pkt(el->suite_id)) { ERR_raise(ERR_LIB_SSL, SSL_R_MAXIMUM_ENCRYPTED_PKTS_REACHED); return 0; } cctx = el->cctx[0]; if (!ossl_assert(cctx != NULL)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } nonce_len = EVP_CIPHER_CTX_get_iv_length(cctx); if (!ossl_assert(nonce_len >= (int)sizeof(QUIC_PN))) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } memcpy(nonce, el->iv[0], (size_t)nonce_len); for (i = 0; i < sizeof(QUIC_PN); ++i) nonce[nonce_len - i - 1] ^= (unsigned char)(pn >> (i * 8)); if (EVP_CipherInit_ex(cctx, NULL, NULL, NULL, nonce, 1) != 1) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } if (EVP_CipherUpdate(cctx, NULL, &l, hdr, hdr_len) != 1) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } for (;;) { const unsigned char *src; size_t src_len; src_len = iovec_cur_get_buffer(cur, &src, SIZE_MAX); if (src_len == 0) break; if (EVP_CipherUpdate(cctx, txe_data(txe) + txe->data_len, &l, src, src_len) != 1) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION memcpy(txe_data(txe) + txe->data_len, src, l); #endif assert(l > 0 && src_len == (size_t)l); txe->data_len += src_len; } if (EVP_CipherFinal_ex(cctx, NULL, &l2) != 1) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } if (EVP_CIPHER_CTX_ctrl(cctx, EVP_CTRL_AEAD_GET_TAG, el->tag_len, txe_data(txe) + txe->data_len) != 1) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } txe->data_len += el->tag_len; if (!ossl_quic_hdr_protector_encrypt(&el->hpr, ptrs)) return 0; ++el->op_count; return 1; } static int qtx_write(OSSL_QTX *qtx, const OSSL_QTX_PKT *pkt, TXE *txe, uint32_t enc_level, QUIC_PKT_HDR *hdr, const OSSL_QTX_IOVEC *iovec, size_t num_iovec) { int ret, needs_encrypt; size_t hdr_len, pred_hdr_len, payload_len, pkt_len, space_left; size_t min_len, orig_data_len; struct iovec_cur cur; QUIC_PKT_HDR_PTRS ptrs; unsigned char *hdr_start; OSSL_QRL_ENC_LEVEL *el = NULL; if (!ossl_quic_pkt_type_is_encrypted(hdr->type)) { needs_encrypt = 0; min_len = QUIC_MIN_VALID_PKT_LEN; } else { needs_encrypt = 1; min_len = QUIC_MIN_VALID_PKT_LEN_CRYPTO; el = ossl_qrl_enc_level_set_get(&qtx->el_set, enc_level, 1); if (!ossl_assert(el != NULL)) return 0; } orig_data_len = txe->data_len; space_left = txe->alloc_len - txe->data_len; if (space_left < min_len) { ret = QTX_FAIL_INSUFFICIENT_LEN; goto err; } if (hdr->type == QUIC_PKT_TYPE_1RTT) hdr->key_phase = (unsigned char)(el->key_epoch & 1); iovec_cur_init(&cur, iovec, num_iovec); if (cur.bytes_remaining == 0) { ret = QTX_FAIL_GENERIC; goto err; } if (needs_encrypt) ossl_qtx_calculate_ciphertext_payload_len(qtx, enc_level, cur.bytes_remaining, &payload_len); else payload_len = cur.bytes_remaining; hdr->data = NULL; hdr->len = payload_len; pred_hdr_len = ossl_quic_wire_get_encoded_pkt_hdr_len(hdr->dst_conn_id.id_len, hdr); if (pred_hdr_len == 0) { ret = QTX_FAIL_GENERIC; goto err; } pkt_len = pred_hdr_len + payload_len; if (pkt_len > space_left) { ret = QTX_FAIL_INSUFFICIENT_LEN; goto err; } if (ossl_quic_pkt_type_has_pn(hdr->type)) { if (!ossl_quic_wire_encode_pkt_hdr_pn(pkt->pn, hdr->pn, hdr->pn_len)) { ret = QTX_FAIL_GENERIC; goto err; } } hdr_start = txe_data(txe) + txe->data_len; if (!qtx_write_hdr(qtx, hdr, txe, &ptrs)) { ret = QTX_FAIL_GENERIC; goto err; } hdr_len = (txe_data(txe) + txe->data_len) - hdr_start; assert(hdr_len == pred_hdr_len); if (!needs_encrypt) { const unsigned char *src; size_t src_len; for (;;) { src_len = iovec_cur_get_buffer(&cur, &src, SIZE_MAX); if (src_len == 0) break; memcpy(txe_data(txe) + txe->data_len, src, src_len); txe->data_len += src_len; } } else { if (!qtx_encrypt_into_txe(qtx, &cur, txe, enc_level, pkt->pn, hdr_start, hdr_len, &ptrs)) { ret = QTX_FAIL_GENERIC; goto err; } assert(txe->data_len - orig_data_len == pkt_len); } return 1; err: txe->data_len = orig_data_len; return ret; } static TXE *qtx_ensure_cons(OSSL_QTX *qtx) { TXE *txe = qtx->cons; if (txe != NULL) return txe; txe = qtx_ensure_free_txe(qtx, qtx->mdpl); if (txe == NULL) return NULL; ossl_list_txe_remove(&qtx->free, txe); qtx->cons = txe; qtx->cons_count = 0; txe->data_len = 0; return txe; } static QLOG *qtx_get_qlog(OSSL_QTX *qtx) { if (qtx->get_qlog_cb == NULL) return NULL; return qtx->get_qlog_cb(qtx->get_qlog_cb_arg); } static int qtx_mutate_write(OSSL_QTX *qtx, const OSSL_QTX_PKT *pkt, TXE *txe, uint32_t enc_level) { int ret; QUIC_PKT_HDR *hdr; const OSSL_QTX_IOVEC *iovec; size_t num_iovec; if (qtx->mutatecb != NULL) { if (!qtx->mutatecb(pkt->hdr, pkt->iovec, pkt->num_iovec, &hdr, &iovec, &num_iovec, qtx->mutatearg)) return QTX_FAIL_GENERIC; } else { hdr = pkt->hdr; iovec = pkt->iovec; num_iovec = pkt->num_iovec; } ret = qtx_write(qtx, pkt, txe, enc_level, hdr, iovec, num_iovec); if (ret == 1) ossl_qlog_event_transport_packet_sent(qtx_get_qlog(qtx), hdr, pkt->pn, iovec, num_iovec, qtx->datagram_count); if (qtx->finishmutatecb != NULL) qtx->finishmutatecb(qtx->mutatearg); return ret; } static int addr_eq(const BIO_ADDR *a, const BIO_ADDR *b) { return ((a == NULL || BIO_ADDR_family(a) == AF_UNSPEC) && (b == NULL || BIO_ADDR_family(b) == AF_UNSPEC)) || (a != NULL && b != NULL && memcmp(a, b, sizeof(*a)) == 0); } int ossl_qtx_write_pkt(OSSL_QTX *qtx, const OSSL_QTX_PKT *pkt) { int ret; int coalescing = (pkt->flags & OSSL_QTX_PKT_FLAG_COALESCE) != 0; int was_coalescing; TXE *txe; uint32_t enc_level; if (pkt->hdr == NULL) return 0; enc_level = ossl_quic_pkt_type_to_enc_level(pkt->hdr->type); if (!ossl_quic_pkt_type_can_share_dgram(pkt->hdr->type)) ossl_qtx_finish_dgram(qtx); else if (enc_level >= QUIC_ENC_LEVEL_NUM || ossl_qrl_enc_level_set_have_el(&qtx->el_set, enc_level) != 1) { return 0; } was_coalescing = (qtx->cons != NULL && qtx->cons->data_len > 0); if (was_coalescing) if (!addr_eq(&qtx->cons->peer, pkt->peer) || !addr_eq(&qtx->cons->local, pkt->local)) { ossl_qtx_finish_dgram(qtx); was_coalescing = 0; } for (;;) { txe = qtx_ensure_cons(qtx); if (txe == NULL) return 0; if (!qtx_reserve_txe(qtx, NULL, txe, qtx->mdpl)) return 0; if (!was_coalescing) { if (pkt->peer != NULL) txe->peer = *pkt->peer; else BIO_ADDR_clear(&txe->peer); if (pkt->local != NULL) txe->local = *pkt->local; else BIO_ADDR_clear(&txe->local); } ret = qtx_mutate_write(qtx, pkt, txe, enc_level); if (ret == 1) { break; } else if (ret == QTX_FAIL_INSUFFICIENT_LEN) { if (was_coalescing) { ossl_qtx_finish_dgram(qtx); was_coalescing = 0; } else { return 0; } } else { return 0; } } ++qtx->cons_count; if (ossl_quic_pkt_type_must_be_last(pkt->hdr->type)) coalescing = 0; if (!coalescing) ossl_qtx_finish_dgram(qtx); return 1; } void ossl_qtx_finish_dgram(OSSL_QTX *qtx) { TXE *txe = qtx->cons; if (txe == NULL) return; if (txe->data_len == 0) ossl_list_txe_insert_tail(&qtx->free, txe); else qtx_add_to_pending(qtx, txe); qtx->cons = NULL; qtx->cons_count = 0; ++qtx->datagram_count; } static void txe_to_msg(TXE *txe, BIO_MSG *msg) { msg->data = txe_data(txe); msg->data_len = txe->data_len; msg->flags = 0; msg->peer = BIO_ADDR_family(&txe->peer) != AF_UNSPEC ? &txe->peer : NULL; msg->local = BIO_ADDR_family(&txe->local) != AF_UNSPEC ? &txe->local : NULL; } #define MAX_MSGS_PER_SEND 32 int ossl_qtx_flush_net(OSSL_QTX *qtx) { BIO_MSG msg[MAX_MSGS_PER_SEND]; size_t wr, i, total_written = 0; TXE *txe; int res; if (ossl_list_txe_head(&qtx->pending) == NULL) return QTX_FLUSH_NET_RES_OK; if (qtx->bio == NULL) return QTX_FLUSH_NET_RES_PERMANENT_FAIL; for (;;) { for (txe = ossl_list_txe_head(&qtx->pending), i = 0; txe != NULL && i < OSSL_NELEM(msg); txe = ossl_list_txe_next(txe), ++i) txe_to_msg(txe, &msg[i]); if (!i) break; ERR_set_mark(); res = BIO_sendmmsg(qtx->bio, msg, sizeof(BIO_MSG), i, 0, &wr); if (res && wr == 0) { ERR_clear_last_mark(); break; } else if (!res) { if (BIO_err_is_non_fatal(ERR_peek_last_error())) { ERR_pop_to_mark(); break; } else { ERR_clear_last_mark(); return QTX_FLUSH_NET_RES_PERMANENT_FAIL; } } ERR_clear_last_mark(); for (i = 0; i < wr; ++i) { if (qtx->msg_callback != NULL) qtx->msg_callback(1, OSSL_QUIC1_VERSION, SSL3_RT_QUIC_DATAGRAM, msg[i].data, msg[i].data_len, qtx->msg_callback_ssl, qtx->msg_callback_arg); qtx_pending_to_free(qtx); } total_written += wr; } return total_written > 0 ? QTX_FLUSH_NET_RES_OK : QTX_FLUSH_NET_RES_TRANSIENT_FAIL; } int ossl_qtx_pop_net(OSSL_QTX *qtx, BIO_MSG *msg) { TXE *txe = ossl_list_txe_head(&qtx->pending); if (txe == NULL) return 0; txe_to_msg(txe, msg); qtx_pending_to_free(qtx); return 1; } void ossl_qtx_set_bio(OSSL_QTX *qtx, BIO *bio) { qtx->bio = bio; } int ossl_qtx_set_mdpl(OSSL_QTX *qtx, size_t mdpl) { if (mdpl < QUIC_MIN_INITIAL_DGRAM_LEN) return 0; qtx->mdpl = mdpl; return 1; } size_t ossl_qtx_get_mdpl(OSSL_QTX *qtx) { return qtx->mdpl; } size_t ossl_qtx_get_queue_len_datagrams(OSSL_QTX *qtx) { return qtx->pending_count; } size_t ossl_qtx_get_queue_len_bytes(OSSL_QTX *qtx) { return qtx->pending_bytes; } size_t ossl_qtx_get_cur_dgram_len_bytes(OSSL_QTX *qtx) { return qtx->cons != NULL ? qtx->cons->data_len : 0; } size_t ossl_qtx_get_unflushed_pkt_count(OSSL_QTX *qtx) { return qtx->cons_count; } int ossl_qtx_trigger_key_update(OSSL_QTX *qtx) { return ossl_qrl_enc_level_set_key_update(&qtx->el_set, QUIC_ENC_LEVEL_1RTT); } uint64_t ossl_qtx_get_cur_epoch_pkt_count(OSSL_QTX *qtx, uint32_t enc_level) { OSSL_QRL_ENC_LEVEL *el; el = ossl_qrl_enc_level_set_get(&qtx->el_set, enc_level, 1); if (el == NULL) return UINT64_MAX; return el->op_count; } uint64_t ossl_qtx_get_max_epoch_pkt_count(OSSL_QTX *qtx, uint32_t enc_level) { OSSL_QRL_ENC_LEVEL *el; el = ossl_qrl_enc_level_set_get(&qtx->el_set, enc_level, 1); if (el == NULL) return UINT64_MAX; return ossl_qrl_get_suite_max_pkt(el->suite_id); } void ossl_qtx_set_msg_callback(OSSL_QTX *qtx, ossl_msg_cb msg_callback, SSL *msg_callback_ssl) { qtx->msg_callback = msg_callback; qtx->msg_callback_ssl = msg_callback_ssl; } void ossl_qtx_set_msg_callback_arg(OSSL_QTX *qtx, void *msg_callback_arg) { qtx->msg_callback_arg = msg_callback_arg; } uint64_t ossl_qtx_get_key_epoch(OSSL_QTX *qtx) { OSSL_QRL_ENC_LEVEL *el; el = ossl_qrl_enc_level_set_get(&qtx->el_set, QUIC_ENC_LEVEL_1RTT, 1); if (el == NULL) return 0; return el->key_epoch; }
quic
openssl/ssl/quic/quic_record_tx.c
openssl
#include "internal/uint_set.h" #include "internal/common.h" #include "internal/quic_sf_list.h" struct stream_frame_st { struct stream_frame_st *prev, *next; UINT_RANGE range; OSSL_QRX_PKT *pkt; const unsigned char *data; }; static void stream_frame_free(SFRAME_LIST *fl, STREAM_FRAME *sf) { if (fl->cleanse && sf->data != NULL) OPENSSL_cleanse((unsigned char *)sf->data, (size_t)(sf->range.end - sf->range.start)); ossl_qrx_pkt_release(sf->pkt); OPENSSL_free(sf); } static STREAM_FRAME *stream_frame_new(UINT_RANGE *range, OSSL_QRX_PKT *pkt, const unsigned char *data) { STREAM_FRAME *sf = OPENSSL_zalloc(sizeof(*sf)); if (sf == NULL) return NULL; if (pkt != NULL) ossl_qrx_pkt_up_ref(pkt); sf->range = *range; sf->pkt = pkt; sf->data = data; return sf; } void ossl_sframe_list_init(SFRAME_LIST *fl) { memset(fl, 0, sizeof(*fl)); } void ossl_sframe_list_destroy(SFRAME_LIST *fl) { STREAM_FRAME *sf, *next_frame; for (sf = fl->head; sf != NULL; sf = next_frame) { next_frame = sf->next; stream_frame_free(fl, sf); } } static int append_frame(SFRAME_LIST *fl, UINT_RANGE *range, OSSL_QRX_PKT *pkt, const unsigned char *data) { STREAM_FRAME *new_frame; if ((new_frame = stream_frame_new(range, pkt, data)) == NULL) return 0; new_frame->prev = fl->tail; if (fl->tail != NULL) fl->tail->next = new_frame; fl->tail = new_frame; ++fl->num_frames; return 1; } int ossl_sframe_list_insert(SFRAME_LIST *fl, UINT_RANGE *range, OSSL_QRX_PKT *pkt, const unsigned char *data, int fin) { STREAM_FRAME *sf, *new_frame, *prev_frame, *next_frame; #ifndef NDEBUG uint64_t curr_end = fl->tail != NULL ? fl->tail->range.end : fl->offset; assert((!fin || curr_end <= range->end) && (!fl->fin || curr_end >= range->end)); #endif if (fl->offset >= range->end) goto end; if (fl->tail == NULL) { fl->tail = fl->head = stream_frame_new(range, pkt, data); if (fl->tail == NULL) return 0; ++fl->num_frames; goto end; } if (fl->tail->range.start < range->start) { if (fl->tail->range.end >= range->end) goto end; if (!append_frame(fl, range, pkt, data)) return 0; goto end; } prev_frame = NULL; for (sf = fl->head; sf != NULL && sf->range.start < range->start; sf = sf->next) prev_frame = sf; if (!ossl_assert(sf != NULL)) return 0; if (prev_frame != NULL && prev_frame->range.end >= range->end) goto end; new_frame = stream_frame_new(range, pkt, data); if (new_frame == NULL) return 0; for (next_frame = sf; next_frame != NULL && next_frame->range.end <= range->end;) { STREAM_FRAME *drop_frame = next_frame; next_frame = next_frame->next; if (next_frame != NULL) next_frame->prev = drop_frame->prev; if (prev_frame != NULL) prev_frame->next = drop_frame->next; if (fl->head == drop_frame) fl->head = next_frame; if (fl->tail == drop_frame) fl->tail = prev_frame; --fl->num_frames; stream_frame_free(fl, drop_frame); } if (next_frame != NULL) { if (prev_frame != NULL && next_frame->range.start <= prev_frame->range.end) { stream_frame_free(fl, new_frame); goto end; } next_frame->prev = new_frame; } else { fl->tail = new_frame; } new_frame->next = next_frame; new_frame->prev = prev_frame; if (prev_frame != NULL) prev_frame->next = new_frame; else fl->head = new_frame; ++fl->num_frames; end: fl->fin = fin || fl->fin; return 1; } int ossl_sframe_list_peek(const SFRAME_LIST *fl, void **iter, UINT_RANGE *range, const unsigned char **data, int *fin) { STREAM_FRAME *sf = *iter; uint64_t start; if (sf == NULL) { start = fl->offset; sf = fl->head; } else { start = sf->range.end; sf = sf->next; } range->start = start; if (sf == NULL || sf->range.start > start || !ossl_assert(start < sf->range.end)) { range->end = start; *data = NULL; *iter = NULL; *fin = sf == NULL ? fl->fin : 0; return 0; } range->end = sf->range.end; if (sf->data != NULL) *data = sf->data + (start - sf->range.start); else *data = NULL; *fin = sf->next == NULL ? fl->fin : 0; *iter = sf; return 1; } int ossl_sframe_list_drop_frames(SFRAME_LIST *fl, uint64_t limit) { STREAM_FRAME *sf; if (!ossl_assert(limit >= fl->offset) || !ossl_assert(fl->tail == NULL || limit <= fl->tail->range.end) || !ossl_assert(fl->tail != NULL || limit == fl->offset)) return 0; fl->offset = limit; for (sf = fl->head; sf != NULL && sf->range.end <= limit;) { STREAM_FRAME *drop_frame = sf; sf = sf->next; --fl->num_frames; stream_frame_free(fl, drop_frame); } fl->head = sf; if (sf != NULL) sf->prev = NULL; else fl->tail = NULL; fl->head_locked = 0; return 1; } int ossl_sframe_list_lock_head(SFRAME_LIST *fl, UINT_RANGE *range, const unsigned char **data, int *fin) { int ret; void *iter = NULL; if (fl->head_locked) return 0; ret = ossl_sframe_list_peek(fl, &iter, range, data, fin); if (ret) fl->head_locked = 1; return ret; } int ossl_sframe_list_is_head_locked(SFRAME_LIST *fl) { return fl->head_locked; } int ossl_sframe_list_move_data(SFRAME_LIST *fl, sframe_list_write_at_cb *write_at_cb, void *cb_arg) { STREAM_FRAME *sf = fl->head, *prev_frame = NULL; uint64_t limit = fl->offset; if (sf == NULL) return 1; if (fl->head_locked) sf = sf->next; for (; sf != NULL; sf = sf->next) { size_t len; const unsigned char *data = sf->data; if (limit < sf->range.start) limit = sf->range.start; if (data != NULL) { if (limit > sf->range.start) data += (size_t)(limit - sf->range.start); len = (size_t)(sf->range.end - limit); if (!write_at_cb(limit, data, len, cb_arg)) return 0; if (fl->cleanse) OPENSSL_cleanse((unsigned char *)sf->data, (size_t)(sf->range.end - sf->range.start)); sf->data = NULL; ossl_qrx_pkt_release(sf->pkt); sf->pkt = NULL; } limit = sf->range.end; if (prev_frame != NULL && prev_frame->range.end >= sf->range.start) { prev_frame->range.end = sf->range.end; prev_frame->next = sf->next; if (sf->next != NULL) sf->next->prev = prev_frame; else fl->tail = prev_frame; --fl->num_frames; stream_frame_free(fl, sf); sf = prev_frame; continue; } prev_frame = sf; } return 1; }
quic
openssl/ssl/quic/quic_sf_list.c
openssl
#include <openssl/rand.h> #include <openssl/err.h> #include "internal/quic_channel.h" #include "internal/quic_error.h" #include "internal/quic_rx_depack.h" #include "internal/quic_lcidm.h" #include "internal/quic_srtm.h" #include "internal/qlog_event_helpers.h" #include "../ssl_local.h" #include "quic_channel_local.h" #include "quic_port_local.h" #include "quic_engine_local.h" #define INIT_CRYPTO_RECV_BUF_LEN 16384 #define INIT_CRYPTO_SEND_BUF_LEN 16384 #define INIT_APP_BUF_LEN 8192 #define MAX_NAT_INTERVAL (ossl_ms2time(25000)) #define DEFAULT_MAX_ACK_DELAY QUIC_DEFAULT_MAX_ACK_DELAY DEFINE_LIST_OF_IMPL(ch, QUIC_CHANNEL); static void ch_save_err_state(QUIC_CHANNEL *ch); static int ch_rx(QUIC_CHANNEL *ch, int channel_only); static int ch_tx(QUIC_CHANNEL *ch); static int ch_tick_tls(QUIC_CHANNEL *ch, int channel_only); static void ch_rx_handle_packet(QUIC_CHANNEL *ch, int channel_only); static OSSL_TIME ch_determine_next_tick_deadline(QUIC_CHANNEL *ch); static int ch_retry(QUIC_CHANNEL *ch, const unsigned char *retry_token, size_t retry_token_len, const QUIC_CONN_ID *retry_scid); static void ch_cleanup(QUIC_CHANNEL *ch); static int ch_generate_transport_params(QUIC_CHANNEL *ch); static int ch_on_transport_params(const unsigned char *params, size_t params_len, void *arg); static int ch_on_handshake_alert(void *arg, unsigned char alert_code); static int ch_on_handshake_complete(void *arg); static int ch_on_handshake_yield_secret(uint32_t enc_level, int direction, uint32_t suite_id, EVP_MD *md, const unsigned char *secret, size_t secret_len, void *arg); static int ch_on_crypto_recv_record(const unsigned char **buf, size_t *bytes_read, void *arg); static int ch_on_crypto_release_record(size_t bytes_read, void *arg); static int crypto_ensure_empty(QUIC_RSTREAM *rstream); static int ch_on_crypto_send(const unsigned char *buf, size_t buf_len, size_t *consumed, void *arg); static OSSL_TIME get_time(void *arg); static uint64_t get_stream_limit(int uni, void *arg); static int rx_late_validate(QUIC_PN pn, int pn_space, void *arg); static void rxku_detected(QUIC_PN pn, void *arg); static int ch_retry(QUIC_CHANNEL *ch, const unsigned char *retry_token, size_t retry_token_len, const QUIC_CONN_ID *retry_scid); static void ch_update_idle(QUIC_CHANNEL *ch); static int ch_discard_el(QUIC_CHANNEL *ch, uint32_t enc_level); static void ch_on_idle_timeout(QUIC_CHANNEL *ch); static void ch_update_idle(QUIC_CHANNEL *ch); static void ch_update_ping_deadline(QUIC_CHANNEL *ch); static void ch_on_terminating_timeout(QUIC_CHANNEL *ch); static void ch_start_terminating(QUIC_CHANNEL *ch, const QUIC_TERMINATE_CAUSE *tcause, int force_immediate); static void ch_on_txp_ack_tx(const OSSL_QUIC_FRAME_ACK *ack, uint32_t pn_space, void *arg); static void ch_rx_handle_version_neg(QUIC_CHANNEL *ch, OSSL_QRX_PKT *pkt); static void ch_raise_version_neg_failure(QUIC_CHANNEL *ch); static void ch_record_state_transition(QUIC_CHANNEL *ch, uint32_t new_state); DEFINE_LHASH_OF_EX(QUIC_SRT_ELEM); QUIC_NEEDS_LOCK static QLOG *ch_get_qlog(QUIC_CHANNEL *ch) { #ifndef OPENSSL_NO_QLOG QLOG_TRACE_INFO qti = {0}; if (ch->qlog != NULL) return ch->qlog; if (!ch->use_qlog) return NULL; if (ch->is_server && ch->init_dcid.id_len == 0) return NULL; qti.odcid = ch->init_dcid; qti.title = ch->qlog_title; qti.description = NULL; qti.group_id = NULL; qti.is_server = ch->is_server; qti.now_cb = get_time; qti.now_cb_arg = ch; if ((ch->qlog = ossl_qlog_new_from_env(&qti)) == NULL) { ch->use_qlog = 0; return NULL; } return ch->qlog; #else return NULL; #endif } QUIC_NEEDS_LOCK static QLOG *ch_get_qlog_cb(void *arg) { QUIC_CHANNEL *ch = arg; return ch_get_qlog(ch); } #define DEFAULT_INIT_CONN_RXFC_WND (768 * 1024) #define DEFAULT_CONN_RXFC_MAX_WND_MUL 20 #define DEFAULT_INIT_STREAM_RXFC_WND (512 * 1024) #define DEFAULT_STREAM_RXFC_MAX_WND_MUL 12 #define DEFAULT_INIT_CONN_MAX_STREAMS 100 static int ch_init(QUIC_CHANNEL *ch) { OSSL_QUIC_TX_PACKETISER_ARGS txp_args = {0}; OSSL_QTX_ARGS qtx_args = {0}; OSSL_QRX_ARGS qrx_args = {0}; QUIC_TLS_ARGS tls_args = {0}; uint32_t pn_space; size_t rx_short_dcid_len; size_t tx_init_dcid_len; if (ch->port == NULL || ch->lcidm == NULL || ch->srtm == NULL) goto err; rx_short_dcid_len = ossl_quic_port_get_rx_short_dcid_len(ch->port); tx_init_dcid_len = ossl_quic_port_get_tx_init_dcid_len(ch->port); if (!ch->is_server && !ossl_quic_gen_rand_conn_id(ch->port->engine->libctx, tx_init_dcid_len, &ch->init_dcid)) goto err; qtx_args.libctx = ch->port->engine->libctx; qtx_args.get_qlog_cb = ch_get_qlog_cb; qtx_args.get_qlog_cb_arg = ch; qtx_args.mdpl = QUIC_MIN_INITIAL_DGRAM_LEN; ch->rx_max_udp_payload_size = qtx_args.mdpl; ch->ping_deadline = ossl_time_infinite(); ch->qtx = ossl_qtx_new(&qtx_args); if (ch->qtx == NULL) goto err; ch->txpim = ossl_quic_txpim_new(); if (ch->txpim == NULL) goto err; ch->cfq = ossl_quic_cfq_new(); if (ch->cfq == NULL) goto err; if (!ossl_quic_txfc_init(&ch->conn_txfc, NULL)) goto err; ch->tx_init_max_stream_data_bidi_local = DEFAULT_INIT_STREAM_RXFC_WND; ch->tx_init_max_stream_data_bidi_remote = DEFAULT_INIT_STREAM_RXFC_WND; ch->tx_init_max_stream_data_uni = DEFAULT_INIT_STREAM_RXFC_WND; if (!ossl_quic_rxfc_init(&ch->conn_rxfc, NULL, DEFAULT_INIT_CONN_RXFC_WND, DEFAULT_CONN_RXFC_MAX_WND_MUL * DEFAULT_INIT_CONN_RXFC_WND, get_time, ch)) goto err; for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) if (!ossl_quic_rxfc_init_standalone(&ch->crypto_rxfc[pn_space], INIT_CRYPTO_RECV_BUF_LEN, get_time, ch)) goto err; if (!ossl_quic_rxfc_init_standalone(&ch->max_streams_bidi_rxfc, DEFAULT_INIT_CONN_MAX_STREAMS, get_time, ch)) goto err; if (!ossl_quic_rxfc_init_standalone(&ch->max_streams_uni_rxfc, DEFAULT_INIT_CONN_MAX_STREAMS, get_time, ch)) goto err; if (!ossl_statm_init(&ch->statm)) goto err; ch->have_statm = 1; ch->cc_method = &ossl_cc_newreno_method; if ((ch->cc_data = ch->cc_method->new(get_time, ch)) == NULL) goto err; if ((ch->ackm = ossl_ackm_new(get_time, ch, &ch->statm, ch->cc_method, ch->cc_data)) == NULL) goto err; if (!ossl_quic_stream_map_init(&ch->qsm, get_stream_limit, ch, &ch->max_streams_bidi_rxfc, &ch->max_streams_uni_rxfc, ch->is_server)) goto err; ch->have_qsm = 1; if (!ch->is_server && !ossl_quic_lcidm_generate_initial(ch->lcidm, ch, &txp_args.cur_scid)) goto err; txp_args.cur_dcid = ch->init_dcid; txp_args.ack_delay_exponent = 3; txp_args.qtx = ch->qtx; txp_args.txpim = ch->txpim; txp_args.cfq = ch->cfq; txp_args.ackm = ch->ackm; txp_args.qsm = &ch->qsm; txp_args.conn_txfc = &ch->conn_txfc; txp_args.conn_rxfc = &ch->conn_rxfc; txp_args.max_streams_bidi_rxfc = &ch->max_streams_bidi_rxfc; txp_args.max_streams_uni_rxfc = &ch->max_streams_uni_rxfc; txp_args.cc_method = ch->cc_method; txp_args.cc_data = ch->cc_data; txp_args.now = get_time; txp_args.now_arg = ch; txp_args.get_qlog_cb = ch_get_qlog_cb; txp_args.get_qlog_cb_arg = ch; for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) { ch->crypto_send[pn_space] = ossl_quic_sstream_new(INIT_CRYPTO_SEND_BUF_LEN); if (ch->crypto_send[pn_space] == NULL) goto err; txp_args.crypto[pn_space] = ch->crypto_send[pn_space]; } ch->txp = ossl_quic_tx_packetiser_new(&txp_args); if (ch->txp == NULL) goto err; ossl_quic_tx_packetiser_set_ack_tx_cb(ch->txp, ch_on_txp_ack_tx, ch); qrx_args.libctx = ch->port->engine->libctx; qrx_args.demux = ch->port->demux; qrx_args.short_conn_id_len = rx_short_dcid_len; qrx_args.max_deferred = 32; if ((ch->qrx = ossl_qrx_new(&qrx_args)) == NULL) goto err; if (!ossl_qrx_set_late_validation_cb(ch->qrx, rx_late_validate, ch)) goto err; if (!ossl_qrx_set_key_update_cb(ch->qrx, rxku_detected, ch)) goto err; for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) { ch->crypto_recv[pn_space] = ossl_quic_rstream_new(NULL, NULL, 0); if (ch->crypto_recv[pn_space] == NULL) goto err; } tls_args.s = ch->tls; tls_args.crypto_send_cb = ch_on_crypto_send; tls_args.crypto_send_cb_arg = ch; tls_args.crypto_recv_rcd_cb = ch_on_crypto_recv_record; tls_args.crypto_recv_rcd_cb_arg = ch; tls_args.crypto_release_rcd_cb = ch_on_crypto_release_record; tls_args.crypto_release_rcd_cb_arg = ch; tls_args.yield_secret_cb = ch_on_handshake_yield_secret; tls_args.yield_secret_cb_arg = ch; tls_args.got_transport_params_cb = ch_on_transport_params; tls_args.got_transport_params_cb_arg= ch; tls_args.handshake_complete_cb = ch_on_handshake_complete; tls_args.handshake_complete_cb_arg = ch; tls_args.alert_cb = ch_on_handshake_alert; tls_args.alert_cb_arg = ch; tls_args.is_server = ch->is_server; if ((ch->qtls = ossl_quic_tls_new(&tls_args)) == NULL) goto err; ch->tx_max_ack_delay = DEFAULT_MAX_ACK_DELAY; ch->rx_max_ack_delay = QUIC_DEFAULT_MAX_ACK_DELAY; ch->rx_ack_delay_exp = QUIC_DEFAULT_ACK_DELAY_EXP; ch->rx_active_conn_id_limit = QUIC_MIN_ACTIVE_CONN_ID_LIMIT; ch->tx_enc_level = QUIC_ENC_LEVEL_INITIAL; ch->rx_enc_level = QUIC_ENC_LEVEL_INITIAL; ch->txku_threshold_override = UINT64_MAX; ch->max_idle_timeout_local_req = QUIC_DEFAULT_IDLE_TIMEOUT; ch->max_idle_timeout_remote_req = 0; ch->max_idle_timeout = ch->max_idle_timeout_local_req; ossl_ackm_set_tx_max_ack_delay(ch->ackm, ossl_ms2time(ch->tx_max_ack_delay)); ossl_ackm_set_rx_max_ack_delay(ch->ackm, ossl_ms2time(ch->rx_max_ack_delay)); ch_update_idle(ch); ossl_list_ch_insert_tail(&ch->port->channel_list, ch); ch->on_port_list = 1; return 1; err: ch_cleanup(ch); return 0; } static void ch_cleanup(QUIC_CHANNEL *ch) { uint32_t pn_space; if (ch->ackm != NULL) for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) ossl_ackm_on_pkt_space_discarded(ch->ackm, pn_space); ossl_quic_lcidm_cull(ch->lcidm, ch); ossl_quic_srtm_cull(ch->srtm, ch); ossl_quic_tx_packetiser_free(ch->txp); ossl_quic_txpim_free(ch->txpim); ossl_quic_cfq_free(ch->cfq); ossl_qtx_free(ch->qtx); if (ch->cc_data != NULL) ch->cc_method->free(ch->cc_data); if (ch->have_statm) ossl_statm_destroy(&ch->statm); ossl_ackm_free(ch->ackm); if (ch->have_qsm) ossl_quic_stream_map_cleanup(&ch->qsm); for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) { ossl_quic_sstream_free(ch->crypto_send[pn_space]); ossl_quic_rstream_free(ch->crypto_recv[pn_space]); } ossl_qrx_pkt_release(ch->qrx_pkt); ch->qrx_pkt = NULL; ossl_quic_tls_free(ch->qtls); ossl_qrx_free(ch->qrx); OPENSSL_free(ch->local_transport_params); OPENSSL_free((char *)ch->terminate_cause.reason); OSSL_ERR_STATE_free(ch->err_state); OPENSSL_free(ch->ack_range_scratch); if (ch->on_port_list) { ossl_list_ch_remove(&ch->port->channel_list, ch); ch->on_port_list = 0; } #ifndef OPENSSL_NO_QLOG if (ch->qlog != NULL) ossl_qlog_flush(ch->qlog); OPENSSL_free(ch->qlog_title); ossl_qlog_free(ch->qlog); #endif } QUIC_CHANNEL *ossl_quic_channel_new(const QUIC_CHANNEL_ARGS *args) { QUIC_CHANNEL *ch = NULL; if ((ch = OPENSSL_zalloc(sizeof(*ch))) == NULL) return NULL; ch->port = args->port; ch->is_server = args->is_server; ch->tls = args->tls; ch->lcidm = args->lcidm; ch->srtm = args->srtm; #ifndef OPENSSL_NO_QLOG ch->use_qlog = args->use_qlog; if (ch->use_qlog && args->qlog_title != NULL) { if ((ch->qlog_title = OPENSSL_strdup(args->qlog_title)) == NULL) { OPENSSL_free(ch); return NULL; } } #endif if (!ch_init(ch)) { OPENSSL_free(ch); return NULL; } return ch; } void ossl_quic_channel_free(QUIC_CHANNEL *ch) { if (ch == NULL) return; ch_cleanup(ch); OPENSSL_free(ch); } int ossl_quic_channel_set_mutator(QUIC_CHANNEL *ch, ossl_mutate_packet_cb mutatecb, ossl_finish_mutate_cb finishmutatecb, void *mutatearg) { if (ch->qtx == NULL) return 0; ossl_qtx_set_mutator(ch->qtx, mutatecb, finishmutatecb, mutatearg); return 1; } int ossl_quic_channel_get_peer_addr(QUIC_CHANNEL *ch, BIO_ADDR *peer_addr) { if (!ch->addressed_mode) return 0; *peer_addr = ch->cur_peer_addr; return 1; } int ossl_quic_channel_set_peer_addr(QUIC_CHANNEL *ch, const BIO_ADDR *peer_addr) { if (ch->state != QUIC_CHANNEL_STATE_IDLE) return 0; if (peer_addr == NULL || BIO_ADDR_family(peer_addr) == AF_UNSPEC) { BIO_ADDR_clear(&ch->cur_peer_addr); ch->addressed_mode = 0; return 1; } ch->cur_peer_addr = *peer_addr; ch->addressed_mode = 1; return 1; } QUIC_REACTOR *ossl_quic_channel_get_reactor(QUIC_CHANNEL *ch) { return ossl_quic_port_get0_reactor(ch->port); } QUIC_STREAM_MAP *ossl_quic_channel_get_qsm(QUIC_CHANNEL *ch) { return &ch->qsm; } OSSL_STATM *ossl_quic_channel_get_statm(QUIC_CHANNEL *ch) { return &ch->statm; } QUIC_STREAM *ossl_quic_channel_get_stream_by_id(QUIC_CHANNEL *ch, uint64_t stream_id) { return ossl_quic_stream_map_get_by_id(&ch->qsm, stream_id); } int ossl_quic_channel_is_active(const QUIC_CHANNEL *ch) { return ch != NULL && ch->state == QUIC_CHANNEL_STATE_ACTIVE; } int ossl_quic_channel_is_closing(const QUIC_CHANNEL *ch) { return ch->state == QUIC_CHANNEL_STATE_TERMINATING_CLOSING; } static int ossl_quic_channel_is_draining(const QUIC_CHANNEL *ch) { return ch->state == QUIC_CHANNEL_STATE_TERMINATING_DRAINING; } static int ossl_quic_channel_is_terminating(const QUIC_CHANNEL *ch) { return ossl_quic_channel_is_closing(ch) || ossl_quic_channel_is_draining(ch); } int ossl_quic_channel_is_terminated(const QUIC_CHANNEL *ch) { return ch->state == QUIC_CHANNEL_STATE_TERMINATED; } int ossl_quic_channel_is_term_any(const QUIC_CHANNEL *ch) { return ossl_quic_channel_is_terminating(ch) || ossl_quic_channel_is_terminated(ch); } const QUIC_TERMINATE_CAUSE * ossl_quic_channel_get_terminate_cause(const QUIC_CHANNEL *ch) { return ossl_quic_channel_is_term_any(ch) ? &ch->terminate_cause : NULL; } int ossl_quic_channel_is_handshake_complete(const QUIC_CHANNEL *ch) { return ch->handshake_complete; } int ossl_quic_channel_is_handshake_confirmed(const QUIC_CHANNEL *ch) { return ch->handshake_confirmed; } QUIC_DEMUX *ossl_quic_channel_get0_demux(QUIC_CHANNEL *ch) { return ch->port->demux; } QUIC_PORT *ossl_quic_channel_get0_port(QUIC_CHANNEL *ch) { return ch->port; } QUIC_ENGINE *ossl_quic_channel_get0_engine(QUIC_CHANNEL *ch) { return ossl_quic_port_get0_engine(ch->port); } CRYPTO_MUTEX *ossl_quic_channel_get_mutex(QUIC_CHANNEL *ch) { return ossl_quic_port_get0_mutex(ch->port); } int ossl_quic_channel_has_pending(const QUIC_CHANNEL *ch) { return ossl_quic_demux_has_pending(ch->port->demux) || ossl_qrx_processed_read_pending(ch->qrx); } static OSSL_TIME get_time(void *arg) { QUIC_CHANNEL *ch = arg; return ossl_quic_port_get_time(ch->port); } static uint64_t get_stream_limit(int uni, void *arg) { QUIC_CHANNEL *ch = arg; return uni ? ch->max_local_streams_uni : ch->max_local_streams_bidi; } static int rx_late_validate(QUIC_PN pn, int pn_space, void *arg) { QUIC_CHANNEL *ch = arg; if (!ossl_ackm_is_rx_pn_processable(ch->ackm, pn, pn_space)) return 0; return 1; } QUIC_NEEDS_LOCK static void ch_trigger_txku(QUIC_CHANNEL *ch) { uint64_t next_pn = ossl_quic_tx_packetiser_get_next_pn(ch->txp, QUIC_PN_SPACE_APP); if (!ossl_quic_pn_valid(next_pn) || !ossl_qtx_trigger_key_update(ch->qtx)) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR, 0, "key update"); return; } ch->txku_in_progress = 1; ch->txku_pn = next_pn; ch->rxku_expected = ch->ku_locally_initiated; } QUIC_NEEDS_LOCK static int txku_in_progress(QUIC_CHANNEL *ch) { if (ch->txku_in_progress && ossl_ackm_get_largest_acked(ch->ackm, QUIC_PN_SPACE_APP) >= ch->txku_pn) { OSSL_TIME pto = ossl_ackm_get_pto_duration(ch->ackm); ch->txku_in_progress = 0; ch->txku_cooldown_deadline = ossl_time_add(get_time(ch), ossl_time_multiply(pto, 3)); } return ch->txku_in_progress; } QUIC_NEEDS_LOCK static int txku_allowed(QUIC_CHANNEL *ch) { return ch->tx_enc_level == QUIC_ENC_LEVEL_1RTT && ch->handshake_confirmed && !txku_in_progress(ch); } QUIC_NEEDS_LOCK static int txku_recommendable(QUIC_CHANNEL *ch) { if (!txku_allowed(ch)) return 0; return ossl_time_compare(get_time(ch), ch->txku_cooldown_deadline) >= 0 && !ch->rxku_in_progress && !ch->rxku_pending_confirm; } QUIC_NEEDS_LOCK static int txku_desirable(QUIC_CHANNEL *ch) { uint64_t cur_pkt_count, max_pkt_count, thresh_pkt_count; const uint32_t enc_level = QUIC_ENC_LEVEL_1RTT; cur_pkt_count = ossl_qtx_get_cur_epoch_pkt_count(ch->qtx, enc_level); max_pkt_count = ossl_qtx_get_max_epoch_pkt_count(ch->qtx, enc_level); thresh_pkt_count = max_pkt_count / 2; if (ch->txku_threshold_override != UINT64_MAX) thresh_pkt_count = ch->txku_threshold_override; return cur_pkt_count >= thresh_pkt_count; } QUIC_NEEDS_LOCK static void ch_maybe_trigger_spontaneous_txku(QUIC_CHANNEL *ch) { if (!txku_recommendable(ch) || !txku_desirable(ch)) return; ch->ku_locally_initiated = 1; ch_trigger_txku(ch); } QUIC_NEEDS_LOCK static int rxku_allowed(QUIC_CHANNEL *ch) { return ch->handshake_confirmed && !ch->rxku_pending_confirm; } enum rxku_decision { DECISION_RXKU_ONLY, DECISION_PROTOCOL_VIOLATION, DECISION_SOLICITED_TXKU }; QUIC_NEEDS_LOCK static void rxku_detected(QUIC_PN pn, void *arg) { QUIC_CHANNEL *ch = arg; enum rxku_decision decision; OSSL_TIME pto; assert(!ch->rxku_in_progress); if (!rxku_allowed(ch)) decision = DECISION_PROTOCOL_VIOLATION; else if (ch->ku_locally_initiated) decision = DECISION_RXKU_ONLY; else decision = DECISION_SOLICITED_TXKU; if (decision == DECISION_PROTOCOL_VIOLATION) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_KEY_UPDATE_ERROR, 0, "RX key update again too soon"); return; } pto = ossl_ackm_get_pto_duration(ch->ackm); ch->ku_locally_initiated = 0; ch->rxku_in_progress = 1; ch->rxku_pending_confirm = 1; ch->rxku_trigger_pn = pn; ch->rxku_update_end_deadline = ossl_time_add(get_time(ch), pto); ch->rxku_expected = 0; if (decision == DECISION_SOLICITED_TXKU) ch_trigger_txku(ch); ossl_quic_tx_packetiser_schedule_ack(ch->txp, QUIC_PN_SPACE_APP); } QUIC_NEEDS_LOCK static void ch_rxku_tick(QUIC_CHANNEL *ch) { if (!ch->rxku_in_progress || ossl_time_compare(get_time(ch), ch->rxku_update_end_deadline) < 0) return; ch->rxku_update_end_deadline = ossl_time_infinite(); ch->rxku_in_progress = 0; if (!ossl_qrx_key_update_timeout(ch->qrx, 1)) ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR, 0, "RXKU cooldown internal error"); } QUIC_NEEDS_LOCK static void ch_on_txp_ack_tx(const OSSL_QUIC_FRAME_ACK *ack, uint32_t pn_space, void *arg) { QUIC_CHANNEL *ch = arg; if (pn_space != QUIC_PN_SPACE_APP || !ch->rxku_pending_confirm || !ossl_quic_frame_ack_contains_pn(ack, ch->rxku_trigger_pn)) return; ch->rxku_pending_confirm_done = 1; } static int ch_on_crypto_send(const unsigned char *buf, size_t buf_len, size_t *consumed, void *arg) { int ret; QUIC_CHANNEL *ch = arg; uint32_t enc_level = ch->tx_enc_level; uint32_t pn_space = ossl_quic_enc_level_to_pn_space(enc_level); QUIC_SSTREAM *sstream = ch->crypto_send[pn_space]; if (!ossl_assert(sstream != NULL)) return 0; ret = ossl_quic_sstream_append(sstream, buf, buf_len, consumed); return ret; } static int crypto_ensure_empty(QUIC_RSTREAM *rstream) { size_t avail = 0; int is_fin = 0; if (rstream == NULL) return 1; if (!ossl_quic_rstream_available(rstream, &avail, &is_fin)) return 0; return avail == 0; } static int ch_on_crypto_recv_record(const unsigned char **buf, size_t *bytes_read, void *arg) { QUIC_CHANNEL *ch = arg; QUIC_RSTREAM *rstream; int is_fin = 0; uint32_t i; for (i = QUIC_ENC_LEVEL_INITIAL; i < ch->rx_enc_level; ++i) if (i != QUIC_ENC_LEVEL_0RTT && !crypto_ensure_empty(ch->crypto_recv[ossl_quic_enc_level_to_pn_space(i)])) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, OSSL_QUIC_FRAME_TYPE_CRYPTO, "crypto stream data in wrong EL"); return 0; } rstream = ch->crypto_recv[ossl_quic_enc_level_to_pn_space(ch->rx_enc_level)]; if (rstream == NULL) return 0; return ossl_quic_rstream_get_record(rstream, buf, bytes_read, &is_fin); } static int ch_on_crypto_release_record(size_t bytes_read, void *arg) { QUIC_CHANNEL *ch = arg; QUIC_RSTREAM *rstream; OSSL_RTT_INFO rtt_info; uint32_t rx_pn_space = ossl_quic_enc_level_to_pn_space(ch->rx_enc_level); rstream = ch->crypto_recv[rx_pn_space]; if (rstream == NULL) return 0; ossl_statm_get_rtt_info(ossl_quic_channel_get_statm(ch), &rtt_info); if (!ossl_quic_rxfc_on_retire(&ch->crypto_rxfc[rx_pn_space], bytes_read, rtt_info.smoothed_rtt)) return 0; return ossl_quic_rstream_release_record(rstream, bytes_read); } static int ch_on_handshake_yield_secret(uint32_t enc_level, int direction, uint32_t suite_id, EVP_MD *md, const unsigned char *secret, size_t secret_len, void *arg) { QUIC_CHANNEL *ch = arg; uint32_t i; if (enc_level < QUIC_ENC_LEVEL_HANDSHAKE || enc_level >= QUIC_ENC_LEVEL_NUM) return 0; if (direction) { if (enc_level <= ch->tx_enc_level) return 0; if (!ossl_qtx_provide_secret(ch->qtx, enc_level, suite_id, md, secret, secret_len)) return 0; ch->tx_enc_level = enc_level; } else { if (enc_level <= ch->rx_enc_level) return 0; for (i = QUIC_ENC_LEVEL_INITIAL; i < enc_level; ++i) if (!crypto_ensure_empty(ch->crypto_recv[ossl_quic_enc_level_to_pn_space(i)])) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, OSSL_QUIC_FRAME_TYPE_CRYPTO, "crypto stream data in wrong EL"); return 0; } if (!ossl_qrx_provide_secret(ch->qrx, enc_level, suite_id, md, secret, secret_len)) return 0; ch->have_new_rx_secret = 1; ch->rx_enc_level = enc_level; } return 1; } static int ch_on_handshake_complete(void *arg) { QUIC_CHANNEL *ch = arg; if (!ossl_assert(!ch->handshake_complete)) return 0; if (!ossl_assert(ch->tx_enc_level == QUIC_ENC_LEVEL_1RTT)) return 0; if (!ch->got_remote_transport_params) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_CRYPTO_MISSING_EXT, OSSL_QUIC_FRAME_TYPE_CRYPTO, "no transport parameters received"); return 0; } OPENSSL_free(ch->local_transport_params); ch->local_transport_params = NULL; ossl_qrx_allow_1rtt_processing(ch->qrx); ossl_quic_tx_packetiser_notify_handshake_complete(ch->txp); ch->handshake_complete = 1; if (ch->is_server) { ossl_quic_channel_on_handshake_confirmed(ch); ossl_quic_tx_packetiser_schedule_handshake_done(ch->txp); } ch_record_state_transition(ch, ch->state); return 1; } static int ch_on_handshake_alert(void *arg, unsigned char alert_code) { QUIC_CHANNEL *ch = arg; if (alert_code == SSL_AD_UNEXPECTED_MESSAGE && ch->handshake_complete && ossl_quic_tls_is_cert_request(ch->qtls)) ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, 0, "Post-handshake TLS " "CertificateRequest received"); else if (alert_code == SSL_AD_ILLEGAL_PARAMETER && ch->handshake_complete && ossl_quic_tls_has_bad_max_early_data(ch->qtls)) ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, 0, "Bad max_early_data received"); else ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_CRYPTO_ERR_BEGIN + alert_code, 0, "handshake alert"); return 1; } #define TP_REASON_SERVER_ONLY(x) \ x " may not be sent by a client" #define TP_REASON_DUP(x) \ x " appears multiple times" #define TP_REASON_MALFORMED(x) \ x " is malformed" #define TP_REASON_EXPECTED_VALUE(x) \ x " does not match expected value" #define TP_REASON_NOT_RETRY(x) \ x " sent when not performing a retry" #define TP_REASON_REQUIRED(x) \ x " was not sent but is required" #define TP_REASON_INTERNAL_ERROR(x) \ x " encountered internal error" static void txfc_bump_cwm_bidi(QUIC_STREAM *s, void *arg) { if (!ossl_quic_stream_is_bidi(s) || ossl_quic_stream_is_server_init(s)) return; ossl_quic_txfc_bump_cwm(&s->txfc, *(uint64_t *)arg); } static void txfc_bump_cwm_uni(QUIC_STREAM *s, void *arg) { if (ossl_quic_stream_is_bidi(s) || ossl_quic_stream_is_server_init(s)) return; ossl_quic_txfc_bump_cwm(&s->txfc, *(uint64_t *)arg); } static void do_update(QUIC_STREAM *s, void *arg) { QUIC_CHANNEL *ch = arg; ossl_quic_stream_map_update_state(&ch->qsm, s); } static uint64_t min_u64_ignore_0(uint64_t a, uint64_t b) { if (a == 0) return b; if (b == 0) return a; return a < b ? a : b; } static int ch_on_transport_params(const unsigned char *params, size_t params_len, void *arg) { QUIC_CHANNEL *ch = arg; PACKET pkt; uint64_t id, v; size_t len; const unsigned char *body; int got_orig_dcid = 0; int got_initial_scid = 0; int got_retry_scid = 0; int got_initial_max_data = 0; int got_initial_max_stream_data_bidi_local = 0; int got_initial_max_stream_data_bidi_remote = 0; int got_initial_max_stream_data_uni = 0; int got_initial_max_streams_bidi = 0; int got_initial_max_streams_uni = 0; int got_stateless_reset_token = 0; int got_preferred_addr = 0; int got_ack_delay_exp = 0; int got_max_ack_delay = 0; int got_max_udp_payload_size = 0; int got_max_idle_timeout = 0; int got_active_conn_id_limit = 0; int got_disable_active_migration = 0; QUIC_CONN_ID cid; const char *reason = "bad transport parameter"; ossl_unused uint64_t rx_max_idle_timeout = 0; ossl_unused const void *stateless_reset_token_p = NULL; QUIC_PREFERRED_ADDR pfa; if (ch->got_remote_transport_params) { reason = "multiple transport parameter extensions"; goto malformed; } if (!PACKET_buf_init(&pkt, params, params_len)) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR, 0, "internal error (packet buf init)"); return 0; } while (PACKET_remaining(&pkt) > 0) { if (!ossl_quic_wire_peek_transport_param(&pkt, &id)) goto malformed; switch (id) { case QUIC_TPARAM_ORIG_DCID: if (got_orig_dcid) { reason = TP_REASON_DUP("ORIG_DCID"); goto malformed; } if (ch->is_server) { reason = TP_REASON_SERVER_ONLY("ORIG_DCID"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_cid(&pkt, NULL, &cid)) { reason = TP_REASON_MALFORMED("ORIG_DCID"); goto malformed; } #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION if (!ossl_quic_conn_id_eq(&ch->init_dcid, &cid)) { reason = TP_REASON_EXPECTED_VALUE("ORIG_DCID"); goto malformed; } #endif got_orig_dcid = 1; break; case QUIC_TPARAM_RETRY_SCID: if (ch->is_server) { reason = TP_REASON_SERVER_ONLY("RETRY_SCID"); goto malformed; } if (got_retry_scid) { reason = TP_REASON_DUP("RETRY_SCID"); goto malformed; } if (!ch->doing_retry) { reason = TP_REASON_NOT_RETRY("RETRY_SCID"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_cid(&pkt, NULL, &cid)) { reason = TP_REASON_MALFORMED("RETRY_SCID"); goto malformed; } if (!ossl_quic_conn_id_eq(&ch->retry_scid, &cid)) { reason = TP_REASON_EXPECTED_VALUE("RETRY_SCID"); goto malformed; } got_retry_scid = 1; break; case QUIC_TPARAM_INITIAL_SCID: if (got_initial_scid) { reason = TP_REASON_DUP("INITIAL_SCID"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_cid(&pkt, NULL, &cid)) { reason = TP_REASON_MALFORMED("INITIAL_SCID"); goto malformed; } if (!ossl_quic_conn_id_eq(&ch->init_scid, &cid)) { reason = TP_REASON_EXPECTED_VALUE("INITIAL_SCID"); goto malformed; } got_initial_scid = 1; break; case QUIC_TPARAM_INITIAL_MAX_DATA: if (got_initial_max_data) { reason = TP_REASON_DUP("INITIAL_MAX_DATA"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v)) { reason = TP_REASON_MALFORMED("INITIAL_MAX_DATA"); goto malformed; } ossl_quic_txfc_bump_cwm(&ch->conn_txfc, v); got_initial_max_data = 1; break; case QUIC_TPARAM_INITIAL_MAX_STREAM_DATA_BIDI_LOCAL: if (got_initial_max_stream_data_bidi_local) { reason = TP_REASON_DUP("INITIAL_MAX_STREAM_DATA_BIDI_LOCAL"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v)) { reason = TP_REASON_MALFORMED("INITIAL_MAX_STREAM_DATA_BIDI_LOCAL"); goto malformed; } ch->rx_init_max_stream_data_bidi_remote = v; got_initial_max_stream_data_bidi_local = 1; break; case QUIC_TPARAM_INITIAL_MAX_STREAM_DATA_BIDI_REMOTE: if (got_initial_max_stream_data_bidi_remote) { reason = TP_REASON_DUP("INITIAL_MAX_STREAM_DATA_BIDI_REMOTE"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v)) { reason = TP_REASON_MALFORMED("INITIAL_MAX_STREAM_DATA_BIDI_REMOTE"); goto malformed; } ch->rx_init_max_stream_data_bidi_local = v; ossl_quic_stream_map_visit(&ch->qsm, txfc_bump_cwm_bidi, &v); got_initial_max_stream_data_bidi_remote = 1; break; case QUIC_TPARAM_INITIAL_MAX_STREAM_DATA_UNI: if (got_initial_max_stream_data_uni) { reason = TP_REASON_DUP("INITIAL_MAX_STREAM_DATA_UNI"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v)) { reason = TP_REASON_MALFORMED("INITIAL_MAX_STREAM_DATA_UNI"); goto malformed; } ch->rx_init_max_stream_data_uni = v; ossl_quic_stream_map_visit(&ch->qsm, txfc_bump_cwm_uni, &v); got_initial_max_stream_data_uni = 1; break; case QUIC_TPARAM_ACK_DELAY_EXP: if (got_ack_delay_exp) { reason = TP_REASON_DUP("ACK_DELAY_EXP"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v) || v > QUIC_MAX_ACK_DELAY_EXP) { reason = TP_REASON_MALFORMED("ACK_DELAY_EXP"); goto malformed; } ch->rx_ack_delay_exp = (unsigned char)v; got_ack_delay_exp = 1; break; case QUIC_TPARAM_MAX_ACK_DELAY: if (got_max_ack_delay) { reason = TP_REASON_DUP("MAX_ACK_DELAY"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v) || v >= (((uint64_t)1) << 14)) { reason = TP_REASON_MALFORMED("MAX_ACK_DELAY"); goto malformed; } ch->rx_max_ack_delay = v; ossl_ackm_set_rx_max_ack_delay(ch->ackm, ossl_ms2time(ch->rx_max_ack_delay)); got_max_ack_delay = 1; break; case QUIC_TPARAM_INITIAL_MAX_STREAMS_BIDI: if (got_initial_max_streams_bidi) { reason = TP_REASON_DUP("INITIAL_MAX_STREAMS_BIDI"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v) || v > (((uint64_t)1) << 60)) { reason = TP_REASON_MALFORMED("INITIAL_MAX_STREAMS_BIDI"); goto malformed; } assert(ch->max_local_streams_bidi == 0); ch->max_local_streams_bidi = v; got_initial_max_streams_bidi = 1; break; case QUIC_TPARAM_INITIAL_MAX_STREAMS_UNI: if (got_initial_max_streams_uni) { reason = TP_REASON_DUP("INITIAL_MAX_STREAMS_UNI"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v) || v > (((uint64_t)1) << 60)) { reason = TP_REASON_MALFORMED("INITIAL_MAX_STREAMS_UNI"); goto malformed; } assert(ch->max_local_streams_uni == 0); ch->max_local_streams_uni = v; got_initial_max_streams_uni = 1; break; case QUIC_TPARAM_MAX_IDLE_TIMEOUT: if (got_max_idle_timeout) { reason = TP_REASON_DUP("MAX_IDLE_TIMEOUT"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v)) { reason = TP_REASON_MALFORMED("MAX_IDLE_TIMEOUT"); goto malformed; } ch->max_idle_timeout_remote_req = v; ch->max_idle_timeout = min_u64_ignore_0(ch->max_idle_timeout_local_req, ch->max_idle_timeout_remote_req); ch_update_idle(ch); got_max_idle_timeout = 1; rx_max_idle_timeout = v; break; case QUIC_TPARAM_MAX_UDP_PAYLOAD_SIZE: if (got_max_udp_payload_size) { reason = TP_REASON_DUP("MAX_UDP_PAYLOAD_SIZE"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v) || v < QUIC_MIN_INITIAL_DGRAM_LEN) { reason = TP_REASON_MALFORMED("MAX_UDP_PAYLOAD_SIZE"); goto malformed; } ch->rx_max_udp_payload_size = v; got_max_udp_payload_size = 1; break; case QUIC_TPARAM_ACTIVE_CONN_ID_LIMIT: if (got_active_conn_id_limit) { reason = TP_REASON_DUP("ACTIVE_CONN_ID_LIMIT"); goto malformed; } if (!ossl_quic_wire_decode_transport_param_int(&pkt, &id, &v) || v < QUIC_MIN_ACTIVE_CONN_ID_LIMIT) { reason = TP_REASON_MALFORMED("ACTIVE_CONN_ID_LIMIT"); goto malformed; } ch->rx_active_conn_id_limit = v; got_active_conn_id_limit = 1; break; case QUIC_TPARAM_STATELESS_RESET_TOKEN: if (got_stateless_reset_token) { reason = TP_REASON_DUP("STATELESS_RESET_TOKEN"); goto malformed; } if (ch->is_server) { reason = TP_REASON_SERVER_ONLY("STATELESS_RESET_TOKEN"); goto malformed; } body = ossl_quic_wire_decode_transport_param_bytes(&pkt, &id, &len); if (body == NULL || len != QUIC_STATELESS_RESET_TOKEN_LEN) { reason = TP_REASON_MALFORMED("STATELESS_RESET_TOKEN"); goto malformed; } if (!ossl_quic_srtm_add(ch->srtm, ch, ch->cur_remote_seq_num, (const QUIC_STATELESS_RESET_TOKEN *)body)) { reason = TP_REASON_INTERNAL_ERROR("STATELESS_RESET_TOKEN"); goto malformed; } stateless_reset_token_p = body; got_stateless_reset_token = 1; break; case QUIC_TPARAM_PREFERRED_ADDR: if (got_preferred_addr) { reason = TP_REASON_DUP("PREFERRED_ADDR"); goto malformed; } if (ch->is_server) { reason = TP_REASON_SERVER_ONLY("PREFERRED_ADDR"); goto malformed; } if (ch->cur_remote_dcid.id_len == 0) { reason = "PREFERRED_ADDR provided for zero-length CID"; goto malformed; } if (!ossl_quic_wire_decode_transport_param_preferred_addr(&pkt, &pfa)) { reason = TP_REASON_MALFORMED("PREFERRED_ADDR"); goto malformed; } if (pfa.cid.id_len == 0) { reason = "zero-length CID in PREFERRED_ADDR"; goto malformed; } got_preferred_addr = 1; break; case QUIC_TPARAM_DISABLE_ACTIVE_MIGRATION: if (got_disable_active_migration) { reason = TP_REASON_DUP("DISABLE_ACTIVE_MIGRATION"); goto malformed; } body = ossl_quic_wire_decode_transport_param_bytes(&pkt, &id, &len); if (body == NULL || len > 0) { reason = TP_REASON_MALFORMED("DISABLE_ACTIVE_MIGRATION"); goto malformed; } got_disable_active_migration = 1; break; default: body = ossl_quic_wire_decode_transport_param_bytes(&pkt, &id, &len); if (body == NULL) goto malformed; break; } } if (!got_initial_scid) { reason = TP_REASON_REQUIRED("INITIAL_SCID"); goto malformed; } if (!ch->is_server) { if (!got_orig_dcid) { reason = TP_REASON_REQUIRED("ORIG_DCID"); goto malformed; } if (ch->doing_retry && !got_retry_scid) { reason = TP_REASON_REQUIRED("RETRY_SCID"); goto malformed; } } ch->got_remote_transport_params = 1; #ifndef OPENSSL_NO_QLOG QLOG_EVENT_BEGIN(ch_get_qlog(ch), transport, parameters_set) QLOG_STR("owner", "remote"); if (got_orig_dcid) QLOG_CID("original_destination_connection_id", &ch->init_dcid); if (got_initial_scid) QLOG_CID("original_source_connection_id", &ch->init_dcid); if (got_retry_scid) QLOG_CID("retry_source_connection_id", &ch->retry_scid); if (got_initial_max_data) QLOG_U64("initial_max_data", ossl_quic_txfc_get_cwm(&ch->conn_txfc)); if (got_initial_max_stream_data_bidi_local) QLOG_U64("initial_max_stream_data_bidi_local", ch->rx_init_max_stream_data_bidi_local); if (got_initial_max_stream_data_bidi_remote) QLOG_U64("initial_max_stream_data_bidi_remote", ch->rx_init_max_stream_data_bidi_remote); if (got_initial_max_stream_data_uni) QLOG_U64("initial_max_stream_data_uni", ch->rx_init_max_stream_data_uni); if (got_initial_max_streams_bidi) QLOG_U64("initial_max_streams_bidi", ch->max_local_streams_bidi); if (got_initial_max_streams_uni) QLOG_U64("initial_max_streams_uni", ch->max_local_streams_uni); if (got_ack_delay_exp) QLOG_U64("ack_delay_exponent", ch->rx_ack_delay_exp); if (got_max_ack_delay) QLOG_U64("max_ack_delay", ch->rx_max_ack_delay); if (got_max_udp_payload_size) QLOG_U64("max_udp_payload_size", ch->rx_max_udp_payload_size); if (got_max_idle_timeout) QLOG_U64("max_idle_timeout", rx_max_idle_timeout); if (got_active_conn_id_limit) QLOG_U64("active_connection_id_limit", ch->rx_active_conn_id_limit); if (got_stateless_reset_token) QLOG_BIN("stateless_reset_token", stateless_reset_token_p, QUIC_STATELESS_RESET_TOKEN_LEN); if (got_preferred_addr) { QLOG_BEGIN("preferred_addr") QLOG_U64("port_v4", pfa.ipv4_port); QLOG_U64("port_v6", pfa.ipv6_port); QLOG_BIN("ip_v4", pfa.ipv4, sizeof(pfa.ipv4)); QLOG_BIN("ip_v6", pfa.ipv6, sizeof(pfa.ipv6)); QLOG_BIN("stateless_reset_token", pfa.stateless_reset.token, sizeof(pfa.stateless_reset.token)); QLOG_CID("connection_id", &pfa.cid); QLOG_END() } QLOG_BOOL("disable_active_migration", got_disable_active_migration); QLOG_EVENT_END() #endif if (got_initial_max_data || got_initial_max_stream_data_bidi_remote || got_initial_max_streams_bidi || got_initial_max_streams_uni) ossl_quic_stream_map_visit(&ch->qsm, do_update, ch); if (ch->is_server && !ch_generate_transport_params(ch)) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR, 0, "internal error"); return 0; } return 1; malformed: ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_TRANSPORT_PARAMETER_ERROR, 0, reason); return 0; } static int ch_generate_transport_params(QUIC_CHANNEL *ch) { int ok = 0; BUF_MEM *buf_mem = NULL; WPACKET wpkt; int wpkt_valid = 0; size_t buf_len = 0; if (ch->local_transport_params != NULL || ch->got_local_transport_params) goto err; if ((buf_mem = BUF_MEM_new()) == NULL) goto err; if (!WPACKET_init(&wpkt, buf_mem)) goto err; wpkt_valid = 1; if (ossl_quic_wire_encode_transport_param_bytes(&wpkt, QUIC_TPARAM_DISABLE_ACTIVE_MIGRATION, NULL, 0) == NULL) goto err; if (ch->is_server) { if (!ossl_quic_wire_encode_transport_param_cid(&wpkt, QUIC_TPARAM_ORIG_DCID, &ch->init_dcid)) goto err; if (!ossl_quic_wire_encode_transport_param_cid(&wpkt, QUIC_TPARAM_INITIAL_SCID, &ch->cur_local_cid)) goto err; } else { if (ossl_quic_wire_encode_transport_param_bytes(&wpkt, QUIC_TPARAM_INITIAL_SCID, NULL, 0) == NULL) goto err; } if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_MAX_IDLE_TIMEOUT, ch->max_idle_timeout_local_req)) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_MAX_UDP_PAYLOAD_SIZE, QUIC_MIN_INITIAL_DGRAM_LEN)) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_ACTIVE_CONN_ID_LIMIT, QUIC_MIN_ACTIVE_CONN_ID_LIMIT)) goto err; if (ch->tx_max_ack_delay != QUIC_DEFAULT_MAX_ACK_DELAY && !ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_MAX_ACK_DELAY, ch->tx_max_ack_delay)) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_INITIAL_MAX_DATA, ossl_quic_rxfc_get_cwm(&ch->conn_rxfc))) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_INITIAL_MAX_STREAM_DATA_BIDI_LOCAL, ch->tx_init_max_stream_data_bidi_local)) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_INITIAL_MAX_STREAM_DATA_BIDI_REMOTE, ch->tx_init_max_stream_data_bidi_remote)) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_INITIAL_MAX_STREAM_DATA_UNI, ch->tx_init_max_stream_data_uni)) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_INITIAL_MAX_STREAMS_BIDI, ossl_quic_rxfc_get_cwm(&ch->max_streams_bidi_rxfc))) goto err; if (!ossl_quic_wire_encode_transport_param_int(&wpkt, QUIC_TPARAM_INITIAL_MAX_STREAMS_UNI, ossl_quic_rxfc_get_cwm(&ch->max_streams_uni_rxfc))) goto err; if (!WPACKET_finish(&wpkt)) goto err; wpkt_valid = 0; if (!WPACKET_get_total_written(&wpkt, &buf_len)) goto err; ch->local_transport_params = (unsigned char *)buf_mem->data; buf_mem->data = NULL; if (!ossl_quic_tls_set_transport_params(ch->qtls, ch->local_transport_params, buf_len)) goto err; #ifndef OPENSSL_NO_QLOG QLOG_EVENT_BEGIN(ch_get_qlog(ch), transport, parameters_set) QLOG_STR("owner", "local"); QLOG_BOOL("disable_active_migration", 1); if (ch->is_server) { QLOG_CID("original_destination_connection_id", &ch->init_dcid); QLOG_CID("initial_source_connection_id", &ch->cur_local_cid); } else { QLOG_STR("initial_source_connection_id", ""); } QLOG_U64("max_idle_timeout", ch->max_idle_timeout); QLOG_U64("max_udp_payload_size", QUIC_MIN_INITIAL_DGRAM_LEN); QLOG_U64("active_connection_id_limit", QUIC_MIN_ACTIVE_CONN_ID_LIMIT); QLOG_U64("max_ack_delay", ch->tx_max_ack_delay); QLOG_U64("initial_max_data", ossl_quic_rxfc_get_cwm(&ch->conn_rxfc)); QLOG_U64("initial_max_stream_data_bidi_local", ch->tx_init_max_stream_data_bidi_local); QLOG_U64("initial_max_stream_data_bidi_remote", ch->tx_init_max_stream_data_bidi_remote); QLOG_U64("initial_max_stream_data_uni", ch->tx_init_max_stream_data_uni); QLOG_U64("initial_max_streams_bidi", ossl_quic_rxfc_get_cwm(&ch->max_streams_bidi_rxfc)); QLOG_U64("initial_max_streams_uni", ossl_quic_rxfc_get_cwm(&ch->max_streams_uni_rxfc)); QLOG_EVENT_END() #endif ch->got_local_transport_params = 1; ok = 1; err: if (wpkt_valid) WPACKET_cleanup(&wpkt); BUF_MEM_free(buf_mem); return ok; } void ossl_quic_channel_subtick(QUIC_CHANNEL *ch, QUIC_TICK_RESULT *res, uint32_t flags) { OSSL_TIME now, deadline; int channel_only = (flags & QUIC_REACTOR_TICK_FLAG_CHANNEL_ONLY) != 0; if (ossl_quic_channel_is_terminated(ch)) { res->net_read_desired = 0; res->net_write_desired = 0; res->tick_deadline = ossl_time_infinite(); return; } if (ossl_quic_channel_is_terminating(ch)) { now = get_time(ch); if (ossl_time_compare(now, ch->terminate_deadline) >= 0) { ch_on_terminating_timeout(ch); res->net_read_desired = 0; res->net_write_desired = 0; res->tick_deadline = ossl_time_infinite(); return; } } if (!ch->port->engine->inhibit_tick) { ch_rxku_tick(ch); do { ch->did_tls_tick = 0; ch->have_new_rx_secret = 0; ch_rx(ch, channel_only); if (!ch->did_tls_tick) ch_tick_tls(ch, channel_only); } while (ch->have_new_rx_secret); } now = get_time(ch); if (ossl_time_compare(now, ch->idle_deadline) >= 0) { if (!ch->port->engine->inhibit_tick) ch_on_idle_timeout(ch); res->net_read_desired = 0; res->net_write_desired = 0; res->tick_deadline = ossl_time_infinite(); return; } if (!ch->port->engine->inhibit_tick) { deadline = ossl_ackm_get_loss_detection_deadline(ch->ackm); if (!ossl_time_is_zero(deadline) && ossl_time_compare(now, deadline) >= 0) ossl_ackm_on_timeout(ch->ackm); if (ossl_time_compare(now, ch->ping_deadline) >= 0) { int pn_space = ossl_quic_enc_level_to_pn_space(ch->tx_enc_level); ossl_quic_tx_packetiser_schedule_ack_eliciting(ch->txp, pn_space); ch_update_ping_deadline(ch); } ch_tx(ch); ossl_quic_stream_map_gc(&ch->qsm); } res->tick_deadline = ch_determine_next_tick_deadline(ch); res->net_read_desired = !ossl_quic_channel_is_terminated(ch); res->net_write_desired = (!ossl_quic_channel_is_terminated(ch) && ossl_qtx_get_queue_len_datagrams(ch->qtx) > 0); } static int ch_tick_tls(QUIC_CHANNEL *ch, int channel_only) { uint64_t error_code; const char *error_msg; ERR_STATE *error_state = NULL; if (channel_only) return 1; ch->did_tls_tick = 1; ossl_quic_tls_tick(ch->qtls); if (ossl_quic_tls_get_error(ch->qtls, &error_code, &error_msg, &error_state)) { ossl_quic_channel_raise_protocol_error_state(ch, error_code, 0, error_msg, error_state); return 0; } return 1; } static void ch_rx_check_forged_pkt_limit(QUIC_CHANNEL *ch) { uint32_t enc_level; uint64_t limit = UINT64_MAX, l; for (enc_level = QUIC_ENC_LEVEL_INITIAL; enc_level < QUIC_ENC_LEVEL_NUM; ++enc_level) { if ((ch->el_discarded & (1U << enc_level)) != 0) continue; if (enc_level > ch->rx_enc_level) break; l = ossl_qrx_get_max_forged_pkt_count(ch->qrx, enc_level); if (l < limit) limit = l; } if (ossl_qrx_get_cur_forged_pkt_count(ch->qrx) < limit) return; ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_AEAD_LIMIT_REACHED, 0, "forgery limit"); } static int ch_rx(QUIC_CHANNEL *ch, int channel_only) { int handled_any = 0; const int closing = ossl_quic_channel_is_closing(ch); if (!ch->is_server && !ch->have_sent_any_pkt) return 1; for (;;) { assert(ch->qrx_pkt == NULL); if (!ossl_qrx_read_pkt(ch->qrx, &ch->qrx_pkt)) break; if (closing) ossl_quic_tx_packetiser_record_received_closing_bytes( ch->txp, ch->qrx_pkt->hdr->len); if (!handled_any) { ch_update_idle(ch); ch_update_ping_deadline(ch); } ch_rx_handle_packet(ch, channel_only); ossl_qrx_pkt_release(ch->qrx_pkt); ch->qrx_pkt = NULL; ch->have_sent_ack_eliciting_since_rx = 0; handled_any = 1; } ch_rx_check_forged_pkt_limit(ch); if (handled_any && closing) ch->conn_close_queued = 1; return 1; } static int bio_addr_eq(const BIO_ADDR *a, const BIO_ADDR *b) { if (BIO_ADDR_family(a) != BIO_ADDR_family(b)) return 0; switch (BIO_ADDR_family(a)) { case AF_INET: return !memcmp(&a->s_in.sin_addr, &b->s_in.sin_addr, sizeof(a->s_in.sin_addr)) && a->s_in.sin_port == b->s_in.sin_port; #if OPENSSL_USE_IPV6 case AF_INET6: return !memcmp(&a->s_in6.sin6_addr, &b->s_in6.sin6_addr, sizeof(a->s_in6.sin6_addr)) && a->s_in6.sin6_port == b->s_in6.sin6_port; #endif default: return 0; } return 1; } static void ch_rx_handle_packet(QUIC_CHANNEL *ch, int channel_only) { uint32_t enc_level; int old_have_processed_any_pkt = ch->have_processed_any_pkt; OSSL_QTX_IOVEC iovec; assert(ch->qrx_pkt != NULL); if (!ossl_quic_channel_is_active(ch)) return; if (ossl_quic_pkt_type_is_encrypted(ch->qrx_pkt->hdr->type)) { if (!ch->have_received_enc_pkt) { ch->cur_remote_dcid = ch->init_scid = ch->qrx_pkt->hdr->src_conn_id; ch->have_received_enc_pkt = 1; ossl_quic_tx_packetiser_set_cur_dcid(ch->txp, &ch->init_scid); } enc_level = ossl_quic_pkt_type_to_enc_level(ch->qrx_pkt->hdr->type); if ((ch->el_discarded & (1U << enc_level)) != 0) return; } if (!ch->is_server && ch->qrx_pkt->peer != NULL && ( BIO_ADDR_family(&ch->cur_peer_addr) == AF_INET #if OPENSSL_USE_IPV6 || BIO_ADDR_family(&ch->cur_peer_addr) == AF_INET6 #endif ) && !bio_addr_eq(ch->qrx_pkt->peer, &ch->cur_peer_addr)) return; if (!ch->is_server && ch->have_received_enc_pkt && ossl_quic_pkt_type_has_scid(ch->qrx_pkt->hdr->type)) { if (!ossl_quic_conn_id_eq(&ch->qrx_pkt->hdr->src_conn_id, &ch->init_scid)) return; } if (ossl_quic_pkt_type_has_version(ch->qrx_pkt->hdr->type) && ch->qrx_pkt->hdr->version != QUIC_VERSION_1) return; ch->have_processed_any_pkt = 1; if (ossl_quic_pkt_type_is_encrypted(ch->qrx_pkt->hdr->type) && ch->qrx_pkt->hdr->reserved != 0) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, 0, "packet header reserved bits"); return; } iovec.buf = ch->qrx_pkt->hdr->data; iovec.buf_len = ch->qrx_pkt->hdr->len; ossl_qlog_event_transport_packet_received(ch_get_qlog(ch), ch->qrx_pkt->hdr, ch->qrx_pkt->pn, &iovec, 1, ch->qrx_pkt->datagram_id); switch (ch->qrx_pkt->hdr->type) { case QUIC_PKT_TYPE_RETRY: if (ch->doing_retry || ch->is_server) return; if (ch->have_received_enc_pkt) return; if (ch->qrx_pkt->hdr->len <= QUIC_RETRY_INTEGRITY_TAG_LEN) return; if (!ossl_quic_validate_retry_integrity_tag(ch->port->engine->libctx, ch->port->engine->propq, ch->qrx_pkt->hdr, &ch->init_dcid)) return; if (!ch_retry(ch, ch->qrx_pkt->hdr->data, ch->qrx_pkt->hdr->len - QUIC_RETRY_INTEGRITY_TAG_LEN, &ch->qrx_pkt->hdr->src_conn_id)) ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR, 0, "handling retry packet"); break; case QUIC_PKT_TYPE_0RTT: if (!ch->is_server) return; break; case QUIC_PKT_TYPE_INITIAL: case QUIC_PKT_TYPE_HANDSHAKE: case QUIC_PKT_TYPE_1RTT: if (ch->is_server && ch->qrx_pkt->hdr->type == QUIC_PKT_TYPE_HANDSHAKE) ch_discard_el(ch, QUIC_ENC_LEVEL_INITIAL); if (ch->rxku_in_progress && ch->qrx_pkt->hdr->type == QUIC_PKT_TYPE_1RTT && ch->qrx_pkt->pn >= ch->rxku_trigger_pn && ch->qrx_pkt->key_epoch < ossl_qrx_get_key_epoch(ch->qrx)) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_KEY_UPDATE_ERROR, 0, "new packet with old keys"); break; } if (!ch->is_server && ch->qrx_pkt->hdr->type == QUIC_PKT_TYPE_INITIAL && ch->qrx_pkt->hdr->token_len > 0) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, 0, "client received initial token"); break; } ossl_quic_handle_frames(ch, ch->qrx_pkt); if (ch->did_crypto_frame) ch_tick_tls(ch, channel_only); break; case QUIC_PKT_TYPE_VERSION_NEG: if (!old_have_processed_any_pkt) ch_rx_handle_version_neg(ch, ch->qrx_pkt); break; default: assert(0); break; } } static void ch_rx_handle_version_neg(QUIC_CHANNEL *ch, OSSL_QRX_PKT *pkt) { PACKET vpkt; unsigned long v; if (!PACKET_buf_init(&vpkt, pkt->hdr->data, pkt->hdr->len)) return; while (PACKET_remaining(&vpkt) > 0) { if (!PACKET_get_net_4(&vpkt, &v)) break; if ((uint32_t)v == QUIC_VERSION_1) return; } ch_raise_version_neg_failure(ch); } static void ch_raise_version_neg_failure(QUIC_CHANNEL *ch) { QUIC_TERMINATE_CAUSE tcause = {0}; tcause.error_code = OSSL_QUIC_ERR_CONNECTION_REFUSED; tcause.reason = "version negotiation failure"; tcause.reason_len = strlen(tcause.reason); ch_start_terminating(ch, &tcause, 1); } static int ch_tx(QUIC_CHANNEL *ch) { QUIC_TXP_STATUS status; int res; if (ossl_quic_channel_is_draining(ch)) return 0; if (ossl_quic_channel_is_closing(ch)) { if (!ch->conn_close_queued) return 0; ch->conn_close_queued = 0; } ch_maybe_trigger_spontaneous_txku(ch); ch->rxku_pending_confirm_done = 0; do { res = ossl_quic_tx_packetiser_generate(ch->txp, &status); if (status.sent_pkt > 0) { ch->have_sent_any_pkt = 1; ch->port->have_sent_any_pkt = 1; if (status.sent_ack_eliciting && !ch->have_sent_ack_eliciting_since_rx) { ch_update_idle(ch); ch->have_sent_ack_eliciting_since_rx = 1; } if (!ch->is_server && status.sent_handshake) ch_discard_el(ch, QUIC_ENC_LEVEL_INITIAL); if (ch->rxku_pending_confirm_done) ch->rxku_pending_confirm = 0; ch_update_ping_deadline(ch); } if (!res) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR, 0, "internal error (txp generate)"); break; } } while (status.sent_pkt > 0); switch (ossl_qtx_flush_net(ch->qtx)) { case QTX_FLUSH_NET_RES_OK: case QTX_FLUSH_NET_RES_TRANSIENT_FAIL: break; case QTX_FLUSH_NET_RES_PERMANENT_FAIL: default: ossl_quic_port_raise_net_error(ch->port, ch); break; } return 1; } static OSSL_TIME ch_determine_next_tick_deadline(QUIC_CHANNEL *ch) { OSSL_TIME deadline; int i; if (ossl_quic_channel_is_terminated(ch)) return ossl_time_infinite(); deadline = ossl_ackm_get_loss_detection_deadline(ch->ackm); if (ossl_time_is_zero(deadline)) deadline = ossl_time_infinite(); for (i = 0; i < QUIC_ENC_LEVEL_NUM; i++) { if (ossl_qtx_is_enc_level_provisioned(ch->qtx, i)) { deadline = ossl_time_min(deadline, ossl_ackm_get_ack_deadline(ch->ackm, ossl_quic_enc_level_to_pn_space(i))); } } if (!ossl_time_is_infinite(ch->ping_deadline)) deadline = ossl_time_min(deadline, ch->ping_deadline); deadline = ossl_time_min(deadline, ossl_quic_tx_packetiser_get_deadline(ch->txp)); if (ossl_quic_channel_is_terminating(ch)) deadline = ossl_time_min(deadline, ch->terminate_deadline); else if (!ossl_time_is_infinite(ch->idle_deadline)) deadline = ossl_time_min(deadline, ch->idle_deadline); if (ch->rxku_in_progress) deadline = ossl_time_min(deadline, ch->rxku_update_end_deadline); return deadline; } static void ch_record_state_transition(QUIC_CHANNEL *ch, uint32_t new_state) { uint32_t old_state = ch->state; ch->state = new_state; ossl_qlog_event_connectivity_connection_state_updated(ch_get_qlog(ch), old_state, new_state, ch->handshake_complete, ch->handshake_confirmed); } int ossl_quic_channel_start(QUIC_CHANNEL *ch) { if (ch->is_server) return 0; if (ch->state != QUIC_CHANNEL_STATE_IDLE) return 1; if (!ossl_quic_tx_packetiser_set_peer(ch->txp, &ch->cur_peer_addr)) return 0; if (!ossl_quic_provide_initial_secret(ch->port->engine->libctx, ch->port->engine->propq, &ch->init_dcid, ch->is_server, ch->qrx, ch->qtx)) return 0; if (!ch->is_server && !ch->got_local_transport_params && !ch_generate_transport_params(ch)) return 0; ch_record_state_transition(ch, QUIC_CHANNEL_STATE_ACTIVE); ch->doing_proactive_ver_neg = 0; ossl_qlog_event_connectivity_connection_started(ch_get_qlog(ch), &ch->init_dcid); if (!ch_tick_tls(ch, 0)) return 0; ossl_quic_reactor_tick(ossl_quic_port_get0_reactor(ch->port), 0); return 1; } void ossl_quic_channel_local_close(QUIC_CHANNEL *ch, uint64_t app_error_code, const char *app_reason) { QUIC_TERMINATE_CAUSE tcause = {0}; if (ossl_quic_channel_is_term_any(ch)) return; tcause.app = 1; tcause.error_code = app_error_code; tcause.reason = app_reason; tcause.reason_len = app_reason != NULL ? strlen(app_reason) : 0; ch_start_terminating(ch, &tcause, 0); } static void free_token(const unsigned char *buf, size_t buf_len, void *arg) { OPENSSL_free((unsigned char *)buf); } static int ch_retry(QUIC_CHANNEL *ch, const unsigned char *retry_token, size_t retry_token_len, const QUIC_CONN_ID *retry_scid) { void *buf; if (ossl_quic_conn_id_eq(&ch->init_dcid, retry_scid)) return 1; if (!ossl_quic_tx_packetiser_set_cur_dcid(ch->txp, retry_scid)) return 0; if ((buf = OPENSSL_memdup(retry_token, retry_token_len)) == NULL) return 0; if (!ossl_quic_tx_packetiser_set_initial_token(ch->txp, buf, retry_token_len, free_token, NULL)) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INVALID_TOKEN, 0, "received oversize token"); OPENSSL_free(buf); return 0; } ch->retry_scid = *retry_scid; ch->doing_retry = 1; if (!ossl_ackm_mark_packet_pseudo_lost(ch->ackm, QUIC_PN_SPACE_INITIAL, 0)) return 0; if (!ossl_quic_provide_initial_secret(ch->port->engine->libctx, ch->port->engine->propq, &ch->retry_scid, 0, ch->qrx, ch->qtx)) return 0; return 1; } static int ch_discard_el(QUIC_CHANNEL *ch, uint32_t enc_level) { if (!ossl_assert(enc_level < QUIC_ENC_LEVEL_1RTT)) return 0; if ((ch->el_discarded & (1U << enc_level)) != 0) return 1; ossl_quic_tx_packetiser_discard_enc_level(ch->txp, enc_level); ossl_qrx_discard_enc_level(ch->qrx, enc_level); ossl_qtx_discard_enc_level(ch->qtx, enc_level); if (enc_level != QUIC_ENC_LEVEL_0RTT) { uint32_t pn_space = ossl_quic_enc_level_to_pn_space(enc_level); ossl_ackm_on_pkt_space_discarded(ch->ackm, pn_space); if (!ossl_assert(ch->crypto_send[pn_space] != NULL) || !ossl_assert(ch->crypto_recv[pn_space] != NULL)) return 0; ossl_quic_sstream_free(ch->crypto_send[pn_space]); ch->crypto_send[pn_space] = NULL; ossl_quic_rstream_free(ch->crypto_recv[pn_space]); ch->crypto_recv[pn_space] = NULL; } ch->el_discarded |= (1U << enc_level); return 1; } int ossl_quic_channel_on_handshake_confirmed(QUIC_CHANNEL *ch) { if (ch->handshake_confirmed) return 1; if (!ch->handshake_complete) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE, "handshake cannot be confirmed " "before it is completed"); return 0; } ch_discard_el(ch, QUIC_ENC_LEVEL_HANDSHAKE); ch->handshake_confirmed = 1; ch_record_state_transition(ch, ch->state); ossl_ackm_on_handshake_confirmed(ch->ackm); return 1; } static void copy_tcause(QUIC_TERMINATE_CAUSE *dst, const QUIC_TERMINATE_CAUSE *src) { dst->error_code = src->error_code; dst->frame_type = src->frame_type; dst->app = src->app; dst->remote = src->remote; dst->reason = NULL; dst->reason_len = 0; if (src->reason != NULL && src->reason_len > 0) { size_t l = src->reason_len; char *r; if (l >= SIZE_MAX) --l; dst->reason = r = OPENSSL_memdup(src->reason, l + 1); if (r == NULL) return; r[l] = '\0'; dst->reason_len = l; } } static void ch_start_terminating(QUIC_CHANNEL *ch, const QUIC_TERMINATE_CAUSE *tcause, int force_immediate) { if (!ch->have_sent_any_pkt) force_immediate = 1; switch (ch->state) { default: case QUIC_CHANNEL_STATE_IDLE: copy_tcause(&ch->terminate_cause, tcause); ch_on_terminating_timeout(ch); break; case QUIC_CHANNEL_STATE_ACTIVE: copy_tcause(&ch->terminate_cause, tcause); ossl_qlog_event_connectivity_connection_closed(ch_get_qlog(ch), tcause); if (!force_immediate) { ch_record_state_transition(ch, tcause->remote ? QUIC_CHANNEL_STATE_TERMINATING_DRAINING : QUIC_CHANNEL_STATE_TERMINATING_CLOSING); ch->terminate_deadline = ossl_time_add(get_time(ch), ossl_time_multiply(ossl_ackm_get_pto_duration(ch->ackm), 3)); if (!tcause->remote) { OSSL_QUIC_FRAME_CONN_CLOSE f = {0}; f.error_code = ch->terminate_cause.error_code; f.frame_type = ch->terminate_cause.frame_type; f.is_app = ch->terminate_cause.app; f.reason = (char *)ch->terminate_cause.reason; f.reason_len = ch->terminate_cause.reason_len; ossl_quic_tx_packetiser_schedule_conn_close(ch->txp, &f); ch->conn_close_queued = 1; } } else { ch_on_terminating_timeout(ch); } break; case QUIC_CHANNEL_STATE_TERMINATING_CLOSING: if (force_immediate) ch_on_terminating_timeout(ch); else if (tcause->remote) ch_record_state_transition(ch, QUIC_CHANNEL_STATE_TERMINATING_DRAINING); break; case QUIC_CHANNEL_STATE_TERMINATING_DRAINING: if (force_immediate) ch_on_terminating_timeout(ch); break; case QUIC_CHANNEL_STATE_TERMINATED: break; } } void ossl_quic_channel_on_remote_conn_close(QUIC_CHANNEL *ch, OSSL_QUIC_FRAME_CONN_CLOSE *f) { QUIC_TERMINATE_CAUSE tcause = {0}; if (!ossl_quic_channel_is_active(ch)) return; tcause.remote = 1; tcause.app = f->is_app; tcause.error_code = f->error_code; tcause.frame_type = f->frame_type; tcause.reason = f->reason; tcause.reason_len = f->reason_len; ch_start_terminating(ch, &tcause, 0); } static void free_frame_data(unsigned char *buf, size_t buf_len, void *arg) { OPENSSL_free(buf); } static int ch_enqueue_retire_conn_id(QUIC_CHANNEL *ch, uint64_t seq_num) { BUF_MEM *buf_mem = NULL; WPACKET wpkt; size_t l; ossl_quic_srtm_remove(ch->srtm, ch, seq_num); if ((buf_mem = BUF_MEM_new()) == NULL) goto err; if (!WPACKET_init(&wpkt, buf_mem)) goto err; if (!ossl_quic_wire_encode_frame_retire_conn_id(&wpkt, seq_num)) { WPACKET_cleanup(&wpkt); goto err; } WPACKET_finish(&wpkt); if (!WPACKET_get_total_written(&wpkt, &l)) goto err; if (ossl_quic_cfq_add_frame(ch->cfq, 1, QUIC_PN_SPACE_APP, OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID, 0, (unsigned char *)buf_mem->data, l, free_frame_data, NULL) == NULL) goto err; buf_mem->data = NULL; BUF_MEM_free(buf_mem); return 1; err: ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, "internal error enqueueing retire conn id"); BUF_MEM_free(buf_mem); return 0; } void ossl_quic_channel_on_new_conn_id(QUIC_CHANNEL *ch, OSSL_QUIC_FRAME_NEW_CONN_ID *f) { uint64_t new_remote_seq_num = ch->cur_remote_seq_num; uint64_t new_retire_prior_to = ch->cur_retire_prior_to; if (!ossl_quic_channel_is_active(ch)) return; if (ch->cur_remote_dcid.id_len == 0) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_PROTOCOL_VIOLATION, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, "zero length connection id in use"); return; } if (f->seq_num > new_remote_seq_num) new_remote_seq_num = f->seq_num; if (f->retire_prior_to > new_retire_prior_to) new_retire_prior_to = f->retire_prior_to; if (new_remote_seq_num - new_retire_prior_to > 1) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_CONNECTION_ID_LIMIT_ERROR, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, "active_connection_id limit violated"); return; } if (new_retire_prior_to - ch->cur_retire_prior_to > 10) { ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_CONNECTION_ID_LIMIT_ERROR, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, "retiring connection id limit violated"); return; } if (new_remote_seq_num > ch->cur_remote_seq_num) { if (!ossl_quic_srtm_add(ch->srtm, ch, new_remote_seq_num, &f->stateless_reset)) { ossl_quic_channel_raise_protocol_error( ch, OSSL_QUIC_ERR_CONNECTION_ID_LIMIT_ERROR, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, "unable to store stateless reset token"); return; } ch->cur_remote_seq_num = new_remote_seq_num; ch->cur_remote_dcid = f->conn_id; ossl_quic_tx_packetiser_set_cur_dcid(ch->txp, &ch->cur_remote_dcid); } while (new_retire_prior_to > ch->cur_retire_prior_to) { if (!ch_enqueue_retire_conn_id(ch, ch->cur_retire_prior_to)) break; ++ch->cur_retire_prior_to; } } static void ch_save_err_state(QUIC_CHANNEL *ch) { if (ch->err_state == NULL) ch->err_state = OSSL_ERR_STATE_new(); if (ch->err_state == NULL) return; OSSL_ERR_STATE_save(ch->err_state); } void ossl_quic_channel_inject(QUIC_CHANNEL *ch, QUIC_URXE *e) { ossl_qrx_inject_urxe(ch->qrx, e); } void ossl_quic_channel_on_stateless_reset(QUIC_CHANNEL *ch) { QUIC_TERMINATE_CAUSE tcause = {0}; tcause.error_code = OSSL_QUIC_ERR_NO_ERROR; tcause.remote = 1; ch_start_terminating(ch, &tcause, 0); } void ossl_quic_channel_raise_net_error(QUIC_CHANNEL *ch) { QUIC_TERMINATE_CAUSE tcause = {0}; if (ch->net_error) return; ch->net_error = 1; tcause.error_code = OSSL_QUIC_ERR_INTERNAL_ERROR; tcause.reason = "network BIO I/O error"; tcause.reason_len = strlen(tcause.reason); ch_start_terminating(ch, &tcause, 1); } int ossl_quic_channel_net_error(QUIC_CHANNEL *ch) { return ch->net_error; } void ossl_quic_channel_restore_err_state(QUIC_CHANNEL *ch) { if (ch == NULL) return; if (!ossl_quic_port_is_running(ch->port)) ossl_quic_port_restore_err_state(ch->port); else OSSL_ERR_STATE_restore(ch->err_state); } void ossl_quic_channel_raise_protocol_error_loc(QUIC_CHANNEL *ch, uint64_t error_code, uint64_t frame_type, const char *reason, ERR_STATE *err_state, const char *src_file, int src_line, const char *src_func) { QUIC_TERMINATE_CAUSE tcause = {0}; int err_reason = error_code == OSSL_QUIC_ERR_INTERNAL_ERROR ? ERR_R_INTERNAL_ERROR : SSL_R_QUIC_PROTOCOL_ERROR; const char *err_str = ossl_quic_err_to_string(error_code); const char *err_str_pfx = " (", *err_str_sfx = ")"; const char *ft_str = NULL; const char *ft_str_pfx = " (", *ft_str_sfx = ")"; if (ch->protocol_error) return; if (err_str == NULL) { err_str = ""; err_str_pfx = ""; err_str_sfx = ""; } if (err_state != NULL) OSSL_ERR_STATE_restore(err_state); if (frame_type != 0) { ft_str = ossl_quic_frame_type_to_string(frame_type); if (ft_str == NULL) { ft_str = ""; ft_str_pfx = ""; ft_str_sfx = ""; } ERR_raise_data(ERR_LIB_SSL, err_reason, "QUIC error code: 0x%llx%s%s%s " "(triggered by frame type: 0x%llx%s%s%s), reason: \"%s\"", (unsigned long long) error_code, err_str_pfx, err_str, err_str_sfx, (unsigned long long) frame_type, ft_str_pfx, ft_str, ft_str_sfx, reason); } else { ERR_raise_data(ERR_LIB_SSL, err_reason, "QUIC error code: 0x%llx%s%s%s, reason: \"%s\"", (unsigned long long) error_code, err_str_pfx, err_str, err_str_sfx, reason); } if (src_file != NULL) ERR_set_debug(src_file, src_line, src_func); ch_save_err_state(ch); tcause.error_code = error_code; tcause.frame_type = frame_type; tcause.reason = reason; tcause.reason_len = strlen(reason); ch->protocol_error = 1; ch_start_terminating(ch, &tcause, 0); } static void ch_on_terminating_timeout(QUIC_CHANNEL *ch) { ch_record_state_transition(ch, QUIC_CHANNEL_STATE_TERMINATED); } static OSSL_TIME ch_get_effective_idle_timeout_duration(QUIC_CHANNEL *ch) { OSSL_TIME pto; if (ch->max_idle_timeout == 0) return ossl_time_infinite(); pto = ossl_ackm_get_pto_duration(ch->ackm); return ossl_time_max(ossl_ms2time(ch->max_idle_timeout), ossl_time_multiply(pto, 3)); } static void ch_update_idle(QUIC_CHANNEL *ch) { ch->idle_deadline = ossl_time_add(get_time(ch), ch_get_effective_idle_timeout_duration(ch)); } static void ch_update_ping_deadline(QUIC_CHANNEL *ch) { OSSL_TIME max_span, idle_duration; idle_duration = ch_get_effective_idle_timeout_duration(ch); if (ossl_time_is_infinite(idle_duration)) { ch->ping_deadline = ossl_time_infinite(); return; } max_span = ossl_time_divide(idle_duration, 2); max_span = ossl_time_min(max_span, MAX_NAT_INTERVAL); ch->ping_deadline = ossl_time_add(get_time(ch), max_span); } static void ch_on_idle_timeout(QUIC_CHANNEL *ch) { ch->terminate_cause.app = 0; ch->terminate_cause.error_code = OSSL_QUIC_LOCAL_ERR_IDLE_TIMEOUT; ch->terminate_cause.frame_type = 0; ch_record_state_transition(ch, QUIC_CHANNEL_STATE_TERMINATED); } int ossl_quic_channel_on_new_conn(QUIC_CHANNEL *ch, const BIO_ADDR *peer, const QUIC_CONN_ID *peer_scid, const QUIC_CONN_ID *peer_dcid) { if (!ossl_assert(ch->state == QUIC_CHANNEL_STATE_IDLE && ch->is_server)) return 0; if (!ossl_quic_lcidm_generate_initial(ch->lcidm, ch, &ch->cur_local_cid)) return 0; ch->cur_peer_addr = *peer; ch->init_dcid = *peer_dcid; ch->cur_remote_dcid = *peer_scid; if (!ossl_quic_tx_packetiser_set_peer(ch->txp, &ch->cur_peer_addr)) return 0; if (!ossl_quic_tx_packetiser_set_cur_dcid(ch->txp, &ch->cur_remote_dcid)) return 0; if (!ossl_quic_tx_packetiser_set_cur_scid(ch->txp, &ch->cur_local_cid)) return 0; ossl_qtx_set_qlog_cb(ch->qtx, ch_get_qlog_cb, ch); ossl_quic_tx_packetiser_set_qlog_cb(ch->txp, ch_get_qlog_cb, ch); if (!ossl_quic_provide_initial_secret(ch->port->engine->libctx, ch->port->engine->propq, &ch->init_dcid, 1, ch->qrx, ch->qtx)) return 0; if (!ossl_quic_lcidm_enrol_odcid(ch->lcidm, ch, &ch->init_dcid)) return 0; ch_record_state_transition(ch, QUIC_CHANNEL_STATE_ACTIVE); ch->doing_proactive_ver_neg = 0; return 1; } SSL *ossl_quic_channel_get0_ssl(QUIC_CHANNEL *ch) { return ch->tls; } static int ch_init_new_stream(QUIC_CHANNEL *ch, QUIC_STREAM *qs, int can_send, int can_recv) { uint64_t rxfc_wnd; int server_init = ossl_quic_stream_is_server_init(qs); int local_init = (ch->is_server == server_init); int is_uni = !ossl_quic_stream_is_bidi(qs); if (can_send) if ((qs->sstream = ossl_quic_sstream_new(INIT_APP_BUF_LEN)) == NULL) goto err; if (can_recv) if ((qs->rstream = ossl_quic_rstream_new(NULL, NULL, 0)) == NULL) goto err; if (!ossl_quic_txfc_init(&qs->txfc, &ch->conn_txfc)) goto err; if (ch->got_remote_transport_params) { if (can_send) { uint64_t cwm; if (is_uni) cwm = ch->rx_init_max_stream_data_uni; else if (local_init) cwm = ch->rx_init_max_stream_data_bidi_local; else cwm = ch->rx_init_max_stream_data_bidi_remote; ossl_quic_txfc_bump_cwm(&qs->txfc, cwm); } } if (!can_recv) rxfc_wnd = 0; else if (is_uni) rxfc_wnd = ch->tx_init_max_stream_data_uni; else if (local_init) rxfc_wnd = ch->tx_init_max_stream_data_bidi_local; else rxfc_wnd = ch->tx_init_max_stream_data_bidi_remote; if (!ossl_quic_rxfc_init(&qs->rxfc, &ch->conn_rxfc, rxfc_wnd, DEFAULT_STREAM_RXFC_MAX_WND_MUL * rxfc_wnd, get_time, ch)) goto err; return 1; err: ossl_quic_sstream_free(qs->sstream); qs->sstream = NULL; ossl_quic_rstream_free(qs->rstream); qs->rstream = NULL; return 0; } static uint64_t *ch_get_local_stream_next_ordinal_ptr(QUIC_CHANNEL *ch, int is_uni) { return is_uni ? &ch->next_local_stream_ordinal_uni : &ch->next_local_stream_ordinal_bidi; } static const uint64_t *ch_get_local_stream_max_ptr(const QUIC_CHANNEL *ch, int is_uni) { return is_uni ? &ch->max_local_streams_uni : &ch->max_local_streams_bidi; } static const QUIC_RXFC *ch_get_remote_stream_count_rxfc(const QUIC_CHANNEL *ch, int is_uni) { return is_uni ? &ch->max_streams_uni_rxfc : &ch->max_streams_bidi_rxfc; } int ossl_quic_channel_is_new_local_stream_admissible(QUIC_CHANNEL *ch, int is_uni) { const uint64_t *p_next_ordinal = ch_get_local_stream_next_ordinal_ptr(ch, is_uni); return ossl_quic_stream_map_is_local_allowed_by_stream_limit(&ch->qsm, *p_next_ordinal, is_uni); } uint64_t ossl_quic_channel_get_local_stream_count_avail(const QUIC_CHANNEL *ch, int is_uni) { const uint64_t *p_next_ordinal, *p_max; p_next_ordinal = ch_get_local_stream_next_ordinal_ptr((QUIC_CHANNEL *)ch, is_uni); p_max = ch_get_local_stream_max_ptr(ch, is_uni); return *p_max - *p_next_ordinal; } uint64_t ossl_quic_channel_get_remote_stream_count_avail(const QUIC_CHANNEL *ch, int is_uni) { return ossl_quic_rxfc_get_credit(ch_get_remote_stream_count_rxfc(ch, is_uni)); } QUIC_STREAM *ossl_quic_channel_new_stream_local(QUIC_CHANNEL *ch, int is_uni) { QUIC_STREAM *qs; int type; uint64_t stream_id; uint64_t *p_next_ordinal; type = ch->is_server ? QUIC_STREAM_INITIATOR_SERVER : QUIC_STREAM_INITIATOR_CLIENT; p_next_ordinal = ch_get_local_stream_next_ordinal_ptr(ch, is_uni); if (is_uni) type |= QUIC_STREAM_DIR_UNI; else type |= QUIC_STREAM_DIR_BIDI; if (*p_next_ordinal >= ((uint64_t)1) << 62) return NULL; stream_id = ((*p_next_ordinal) << 2) | type; if ((qs = ossl_quic_stream_map_alloc(&ch->qsm, stream_id, type)) == NULL) return NULL; if (!ch_init_new_stream(ch, qs, 1, !is_uni)) goto err; ++*p_next_ordinal; return qs; err: ossl_quic_stream_map_release(&ch->qsm, qs); return NULL; } QUIC_STREAM *ossl_quic_channel_new_stream_remote(QUIC_CHANNEL *ch, uint64_t stream_id) { uint64_t peer_role; int is_uni; QUIC_STREAM *qs; peer_role = ch->is_server ? QUIC_STREAM_INITIATOR_CLIENT : QUIC_STREAM_INITIATOR_SERVER; if ((stream_id & QUIC_STREAM_INITIATOR_MASK) != peer_role) return NULL; is_uni = ((stream_id & QUIC_STREAM_DIR_MASK) == QUIC_STREAM_DIR_UNI); qs = ossl_quic_stream_map_alloc(&ch->qsm, stream_id, stream_id & (QUIC_STREAM_INITIATOR_MASK | QUIC_STREAM_DIR_MASK)); if (qs == NULL) return NULL; if (!ch_init_new_stream(ch, qs, !is_uni, 1)) goto err; if (ch->incoming_stream_auto_reject) ossl_quic_channel_reject_stream(ch, qs); else ossl_quic_stream_map_push_accept_queue(&ch->qsm, qs); return qs; err: ossl_quic_stream_map_release(&ch->qsm, qs); return NULL; } void ossl_quic_channel_set_incoming_stream_auto_reject(QUIC_CHANNEL *ch, int enable, uint64_t aec) { ch->incoming_stream_auto_reject = (enable != 0); ch->incoming_stream_auto_reject_aec = aec; } void ossl_quic_channel_reject_stream(QUIC_CHANNEL *ch, QUIC_STREAM *qs) { ossl_quic_stream_map_stop_sending_recv_part(&ch->qsm, qs, ch->incoming_stream_auto_reject_aec); ossl_quic_stream_map_reset_stream_send_part(&ch->qsm, qs, ch->incoming_stream_auto_reject_aec); qs->deleted = 1; ossl_quic_stream_map_update_state(&ch->qsm, qs); } int ossl_quic_channel_replace_local_cid(QUIC_CHANNEL *ch, const QUIC_CONN_ID *conn_id) { if (!ossl_quic_lcidm_debug_remove(ch->lcidm, &ch->cur_local_cid)) return 0; ch->cur_local_cid = *conn_id; if (!ossl_quic_tx_packetiser_set_cur_scid(ch->txp, &ch->cur_local_cid)) return 0; if (!ossl_quic_lcidm_debug_add(ch->lcidm, ch, &ch->cur_local_cid, 100)) return 0; return 1; } void ossl_quic_channel_set_msg_callback(QUIC_CHANNEL *ch, ossl_msg_cb msg_callback, SSL *msg_callback_ssl) { ch->msg_callback = msg_callback; ch->msg_callback_ssl = msg_callback_ssl; ossl_qtx_set_msg_callback(ch->qtx, msg_callback, msg_callback_ssl); ossl_quic_tx_packetiser_set_msg_callback(ch->txp, msg_callback, msg_callback_ssl); ossl_qrx_set_msg_callback(ch->qrx, msg_callback, msg_callback_ssl); } void ossl_quic_channel_set_msg_callback_arg(QUIC_CHANNEL *ch, void *msg_callback_arg) { ch->msg_callback_arg = msg_callback_arg; ossl_qtx_set_msg_callback_arg(ch->qtx, msg_callback_arg); ossl_quic_tx_packetiser_set_msg_callback_arg(ch->txp, msg_callback_arg); ossl_qrx_set_msg_callback_arg(ch->qrx, msg_callback_arg); } void ossl_quic_channel_set_txku_threshold_override(QUIC_CHANNEL *ch, uint64_t tx_pkt_threshold) { ch->txku_threshold_override = tx_pkt_threshold; } uint64_t ossl_quic_channel_get_tx_key_epoch(QUIC_CHANNEL *ch) { return ossl_qtx_get_key_epoch(ch->qtx); } uint64_t ossl_quic_channel_get_rx_key_epoch(QUIC_CHANNEL *ch) { return ossl_qrx_get_key_epoch(ch->qrx); } int ossl_quic_channel_trigger_txku(QUIC_CHANNEL *ch) { if (!txku_allowed(ch)) return 0; ch->ku_locally_initiated = 1; ch_trigger_txku(ch); return 1; } int ossl_quic_channel_ping(QUIC_CHANNEL *ch) { int pn_space = ossl_quic_enc_level_to_pn_space(ch->tx_enc_level); ossl_quic_tx_packetiser_schedule_ack_eliciting(ch->txp, pn_space); return 1; } uint16_t ossl_quic_channel_get_diag_num_rx_ack(QUIC_CHANNEL *ch) { return ch->diag_num_rx_ack; } void ossl_quic_channel_get_diag_local_cid(QUIC_CHANNEL *ch, QUIC_CONN_ID *cid) { *cid = ch->cur_local_cid; } int ossl_quic_channel_have_generated_transport_params(const QUIC_CHANNEL *ch) { return ch->got_local_transport_params; } void ossl_quic_channel_set_max_idle_timeout_request(QUIC_CHANNEL *ch, uint64_t ms) { ch->max_idle_timeout_local_req = ms; } uint64_t ossl_quic_channel_get_max_idle_timeout_request(const QUIC_CHANNEL *ch) { return ch->max_idle_timeout_local_req; } uint64_t ossl_quic_channel_get_max_idle_timeout_peer_request(const QUIC_CHANNEL *ch) { return ch->max_idle_timeout_remote_req; } uint64_t ossl_quic_channel_get_max_idle_timeout_actual(const QUIC_CHANNEL *ch) { return ch->max_idle_timeout; }
quic
openssl/ssl/quic/quic_channel.c
openssl
#include "internal/quic_srtm.h" #include "internal/common.h" #include <openssl/lhash.h> #include <openssl/core_names.h> #include <openssl/rand.h> typedef struct srtm_item_st SRTM_ITEM; #define BLINDED_SRT_LEN 16 DEFINE_LHASH_OF_EX(SRTM_ITEM); struct srtm_item_st { SRTM_ITEM *next_by_srt_blinded; SRTM_ITEM *next_by_seq_num; void *opaque; uint64_t seq_num; QUIC_STATELESS_RESET_TOKEN srt; unsigned char srt_blinded[BLINDED_SRT_LEN]; #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION uint32_t debug_token; #endif }; struct quic_srtm_st { EVP_CIPHER_CTX *blind_ctx; LHASH_OF(SRTM_ITEM) *items_fwd; LHASH_OF(SRTM_ITEM) *items_rev; unsigned int alloc_failed : 1; }; static unsigned long items_fwd_hash(const SRTM_ITEM *item) { return (unsigned long)(uintptr_t)item->opaque; } static int items_fwd_cmp(const SRTM_ITEM *a, const SRTM_ITEM *b) { return a->opaque != b->opaque; } static unsigned long items_rev_hash(const SRTM_ITEM *item) { unsigned long l; memcpy(&l, item->srt_blinded, sizeof(l)); return l; } static int items_rev_cmp(const SRTM_ITEM *a, const SRTM_ITEM *b) { return memcmp(a->srt_blinded, b->srt_blinded, sizeof(a->srt_blinded)); } static int srtm_check_lh(QUIC_SRTM *srtm, LHASH_OF(SRTM_ITEM) *lh) { if (lh_SRTM_ITEM_error(lh)) { srtm->alloc_failed = 1; return 0; } return 1; } QUIC_SRTM *ossl_quic_srtm_new(OSSL_LIB_CTX *libctx, const char *propq) { QUIC_SRTM *srtm = NULL; unsigned char key[16]; EVP_CIPHER *ecb = NULL; if (RAND_priv_bytes_ex(libctx, key, sizeof(key), sizeof(key) * 8) != 1) goto err; if ((srtm = OPENSSL_zalloc(sizeof(*srtm))) == NULL) return NULL; if ((ecb = EVP_CIPHER_fetch(libctx, "AES-128-ECB", propq)) == NULL) goto err; if ((srtm->blind_ctx = EVP_CIPHER_CTX_new()) == NULL) goto err; if (!EVP_EncryptInit_ex2(srtm->blind_ctx, ecb, key, NULL, NULL)) goto err; EVP_CIPHER_free(ecb); ecb = NULL; if ((srtm->items_fwd = lh_SRTM_ITEM_new(items_fwd_hash, items_fwd_cmp)) == NULL || (srtm->items_rev = lh_SRTM_ITEM_new(items_rev_hash, items_rev_cmp)) == NULL) goto err; return srtm; err: ossl_quic_srtm_free(srtm); EVP_CIPHER_free(ecb); return NULL; } static void srtm_free_each(SRTM_ITEM *ihead) { SRTM_ITEM *inext, *item = ihead; for (item = item->next_by_seq_num; item != NULL; item = inext) { inext = item->next_by_seq_num; OPENSSL_free(item); } OPENSSL_free(ihead); } void ossl_quic_srtm_free(QUIC_SRTM *srtm) { if (srtm == NULL) return; lh_SRTM_ITEM_free(srtm->items_rev); if (srtm->items_fwd != NULL) { lh_SRTM_ITEM_doall(srtm->items_fwd, srtm_free_each); lh_SRTM_ITEM_free(srtm->items_fwd); } EVP_CIPHER_CTX_free(srtm->blind_ctx); OPENSSL_free(srtm); } static SRTM_ITEM *srtm_find(QUIC_SRTM *srtm, void *opaque, uint64_t seq_num, SRTM_ITEM **head_p, SRTM_ITEM **prev_p) { SRTM_ITEM key, *item = NULL, *prev = NULL; key.opaque = opaque; item = lh_SRTM_ITEM_retrieve(srtm->items_fwd, &key); if (head_p != NULL) *head_p = item; for (; item != NULL; prev = item, item = item->next_by_seq_num) if (item->seq_num == seq_num) { break; } else if (item->seq_num < seq_num) { item = NULL; break; } if (prev_p != NULL) *prev_p = prev; return item; } static void sorted_insert_seq_num(SRTM_ITEM *head, SRTM_ITEM *item, SRTM_ITEM **new_head) { uint64_t seq_num = item->seq_num; SRTM_ITEM *cur = head, **fixup = new_head; *new_head = head; while (cur != NULL && cur->seq_num > seq_num) { fixup = &cur->next_by_seq_num; cur = cur->next_by_seq_num; } item->next_by_seq_num = *fixup; *fixup = item; } static void sorted_insert_srt(SRTM_ITEM *head, SRTM_ITEM *item, SRTM_ITEM **new_head) { uintptr_t opaque = (uintptr_t)item->opaque; SRTM_ITEM *cur = head, **fixup = new_head; *new_head = head; while (cur != NULL && (uintptr_t)cur->opaque > opaque) { fixup = &cur->next_by_srt_blinded; cur = cur->next_by_srt_blinded; } item->next_by_srt_blinded = *fixup; *fixup = item; } static int srtm_compute_blinded(QUIC_SRTM *srtm, SRTM_ITEM *item, const QUIC_STATELESS_RESET_TOKEN *token) { int outl = 0; if (!EVP_EncryptUpdate(srtm->blind_ctx, item->srt_blinded, &outl, (const unsigned char *)token, sizeof(*token))) return 0; if (!ossl_assert(outl == sizeof(*token))) return 0; return 1; } int ossl_quic_srtm_add(QUIC_SRTM *srtm, void *opaque, uint64_t seq_num, const QUIC_STATELESS_RESET_TOKEN *token) { SRTM_ITEM *item = NULL, *head = NULL, *new_head, *r_item; if (srtm->alloc_failed) return 0; if ((item = srtm_find(srtm, opaque, seq_num, &head, NULL)) != NULL) return 0; if ((item = OPENSSL_zalloc(sizeof(*item))) == NULL) return 0; item->opaque = opaque; item->seq_num = seq_num; item->srt = *token; if (!srtm_compute_blinded(srtm, item, &item->srt)) { OPENSSL_free(item); return 0; } if (head == NULL) { lh_SRTM_ITEM_insert(srtm->items_fwd, item); if (!srtm_check_lh(srtm, srtm->items_fwd)) { OPENSSL_free(item); return 0; } } else { sorted_insert_seq_num(head, item, &new_head); if (new_head != head) { lh_SRTM_ITEM_insert(srtm->items_fwd, new_head); if (!srtm_check_lh(srtm, srtm->items_fwd)) { OPENSSL_free(item); return 0; } } } r_item = lh_SRTM_ITEM_retrieve(srtm->items_rev, item); if (r_item == NULL) { lh_SRTM_ITEM_insert(srtm->items_rev, item); if (!srtm_check_lh(srtm, srtm->items_rev)) return 0; } else { sorted_insert_srt(r_item, item, &new_head); if (new_head != r_item) { lh_SRTM_ITEM_insert(srtm->items_rev, new_head); if (!srtm_check_lh(srtm, srtm->items_rev)) return 0; } } return 1; } static int srtm_remove_from_rev(QUIC_SRTM *srtm, SRTM_ITEM *item) { SRTM_ITEM *rh_item; rh_item = lh_SRTM_ITEM_retrieve(srtm->items_rev, item); assert(rh_item != NULL); if (rh_item == item) { if (item->next_by_srt_blinded != NULL) { lh_SRTM_ITEM_insert(srtm->items_rev, item->next_by_srt_blinded); if (!srtm_check_lh(srtm, srtm->items_rev)) return 0; } else { lh_SRTM_ITEM_delete(srtm->items_rev, item); } } else { for (; rh_item->next_by_srt_blinded != item; rh_item = rh_item->next_by_srt_blinded); rh_item->next_by_srt_blinded = item->next_by_srt_blinded; } return 1; } int ossl_quic_srtm_remove(QUIC_SRTM *srtm, void *opaque, uint64_t seq_num) { SRTM_ITEM *item, *prev = NULL; if (srtm->alloc_failed) return 0; if ((item = srtm_find(srtm, opaque, seq_num, NULL, &prev)) == NULL) return 0; if (prev == NULL) { if (item->next_by_seq_num != NULL) { lh_SRTM_ITEM_insert(srtm->items_fwd, item->next_by_seq_num); if (!srtm_check_lh(srtm, srtm->items_fwd)) return 0; } else { lh_SRTM_ITEM_delete(srtm->items_fwd, item); } } else { prev->next_by_seq_num = item->next_by_seq_num; } if (!srtm_remove_from_rev(srtm, item)) return 0; OPENSSL_free(item); return 1; } int ossl_quic_srtm_cull(QUIC_SRTM *srtm, void *opaque) { SRTM_ITEM key, *item = NULL, *inext, *ihead; key.opaque = opaque; if (srtm->alloc_failed) return 0; if ((ihead = lh_SRTM_ITEM_retrieve(srtm->items_fwd, &key)) == NULL) return 1; for (item = ihead; item != NULL; item = inext) { inext = item->next_by_seq_num; if (item != ihead) { srtm_remove_from_rev(srtm, item); OPENSSL_free(item); } } lh_SRTM_ITEM_delete(srtm->items_fwd, ihead); srtm_remove_from_rev(srtm, ihead); OPENSSL_free(ihead); return 1; } int ossl_quic_srtm_lookup(QUIC_SRTM *srtm, const QUIC_STATELESS_RESET_TOKEN *token, size_t idx, void **opaque, uint64_t *seq_num) { SRTM_ITEM key, *item; if (srtm->alloc_failed) return 0; if (!srtm_compute_blinded(srtm, &key, token)) return 0; item = lh_SRTM_ITEM_retrieve(srtm->items_rev, &key); for (; idx > 0 && item != NULL; --idx, item = item->next_by_srt_blinded); if (item == NULL) return 0; if (opaque != NULL) *opaque = item->opaque; if (seq_num != NULL) *seq_num = item->seq_num; return 1; } #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION static uint32_t token_next = 0x5eadbeef; static size_t tokens_seen; struct check_args { uint32_t token; int mode; }; static void check_mark(SRTM_ITEM *item, void *arg) { struct check_args *arg_ = arg; uint32_t token = arg_->token; uint64_t prev_seq_num = 0; void *prev_opaque = NULL; int have_prev = 0; assert(item != NULL); while (item != NULL) { if (have_prev) { assert(!(item->opaque == prev_opaque && item->seq_num == prev_seq_num)); if (!arg_->mode) assert(item->opaque != prev_opaque || item->seq_num < prev_seq_num); } ++tokens_seen; item->debug_token = token; prev_opaque = item->opaque; prev_seq_num = item->seq_num; have_prev = 1; if (arg_->mode) item = item->next_by_srt_blinded; else item = item->next_by_seq_num; } } static void check_count(SRTM_ITEM *item, void *arg) { struct check_args *arg_ = arg; uint32_t token = arg_->token; assert(item != NULL); while (item != NULL) { ++tokens_seen; assert(item->debug_token == token); if (arg_->mode) item = item->next_by_seq_num; else item = item->next_by_srt_blinded; } } #endif void ossl_quic_srtm_check(const QUIC_SRTM *srtm) { #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION struct check_args args = {0}; size_t tokens_expected, tokens_expected_old; args.token = token_next; ++token_next; assert(srtm != NULL); assert(srtm->blind_ctx != NULL); assert(srtm->items_fwd != NULL); assert(srtm->items_rev != NULL); tokens_seen = 0; lh_SRTM_ITEM_doall_arg(srtm->items_fwd, check_mark, &args); tokens_expected = tokens_seen; tokens_seen = 0; lh_SRTM_ITEM_doall_arg(srtm->items_rev, check_count, &args); assert(tokens_seen == tokens_expected); tokens_expected_old = tokens_expected; args.token = token_next; ++token_next; args.mode = 1; tokens_seen = 0; lh_SRTM_ITEM_doall_arg(srtm->items_rev, check_mark, &args); tokens_expected = tokens_seen; tokens_seen = 0; lh_SRTM_ITEM_doall_arg(srtm->items_fwd, check_count, &args); assert(tokens_seen == tokens_expected); assert(tokens_seen == tokens_expected_old); #endif }
quic
openssl/ssl/quic/quic_srtm.c
openssl
#include "internal/quic_tserver.h" #include "internal/quic_channel.h" #include "internal/quic_statm.h" #include "internal/quic_port.h" #include "internal/quic_engine.h" #include "internal/common.h" #include "internal/time.h" #include "quic_local.h" struct quic_tserver_st { QUIC_TSERVER_ARGS args; SSL *ssl; QUIC_ENGINE *engine; QUIC_PORT *port; QUIC_CHANNEL *ch; CRYPTO_MUTEX *mutex; SSL_CTX *ctx; SSL *tls; BIO_ADDR cur_peer_addr; unsigned int connected : 1; }; static int alpn_select_cb(SSL *ssl, const unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg) { QUIC_TSERVER *srv = arg; static const unsigned char alpndeflt[] = { 8, 'o', 's', 's', 'l', 't', 'e', 's', 't' }; const unsigned char *alpn; size_t alpnlen; if (srv->args.alpn == NULL) { alpn = alpndeflt; alpnlen = sizeof(alpn); } else { alpn = srv->args.alpn; alpnlen = srv->args.alpnlen; } if (SSL_select_next_proto((unsigned char **)out, outlen, alpn, alpnlen, in, inlen) != OPENSSL_NPN_NEGOTIATED) return SSL_TLSEXT_ERR_ALERT_FATAL; return SSL_TLSEXT_ERR_OK; } QUIC_TSERVER *ossl_quic_tserver_new(const QUIC_TSERVER_ARGS *args, const char *certfile, const char *keyfile) { QUIC_TSERVER *srv = NULL; QUIC_ENGINE_ARGS engine_args = {0}; QUIC_PORT_ARGS port_args = {0}; QUIC_CONNECTION *qc = NULL; if (args->net_rbio == NULL || args->net_wbio == NULL) goto err; if ((srv = OPENSSL_zalloc(sizeof(*srv))) == NULL) goto err; srv->args = *args; #if defined(OPENSSL_THREADS) if ((srv->mutex = ossl_crypto_mutex_new()) == NULL) goto err; #endif if (args->ctx != NULL) srv->ctx = args->ctx; else srv->ctx = SSL_CTX_new_ex(srv->args.libctx, srv->args.propq, TLS_method()); if (srv->ctx == NULL) goto err; if (certfile != NULL && SSL_CTX_use_certificate_file(srv->ctx, certfile, SSL_FILETYPE_PEM) <= 0) goto err; if (keyfile != NULL && SSL_CTX_use_PrivateKey_file(srv->ctx, keyfile, SSL_FILETYPE_PEM) <= 0) goto err; SSL_CTX_set_alpn_select_cb(srv->ctx, alpn_select_cb, srv); srv->tls = SSL_new(srv->ctx); if (srv->tls == NULL) goto err; engine_args.libctx = srv->args.libctx; engine_args.propq = srv->args.propq; engine_args.mutex = srv->mutex; engine_args.now_cb = srv->args.now_cb; engine_args.now_cb_arg = srv->args.now_cb_arg; if ((srv->engine = ossl_quic_engine_new(&engine_args)) == NULL) goto err; port_args.channel_ctx = srv->ctx; port_args.is_multi_conn = 1; if ((srv->port = ossl_quic_engine_create_port(srv->engine, &port_args)) == NULL) goto err; if ((srv->ch = ossl_quic_port_create_incoming(srv->port, srv->tls)) == NULL) goto err; if (!ossl_quic_port_set_net_rbio(srv->port, srv->args.net_rbio) || !ossl_quic_port_set_net_wbio(srv->port, srv->args.net_wbio)) goto err; qc = OPENSSL_zalloc(sizeof(*qc)); if (qc == NULL) goto err; srv->ssl = (SSL *)qc; qc->ch = srv->ch; srv->ssl->type = SSL_TYPE_QUIC_CONNECTION; return srv; err: if (srv != NULL) { if (args->ctx == NULL) SSL_CTX_free(srv->ctx); SSL_free(srv->tls); ossl_quic_channel_free(srv->ch); ossl_quic_port_free(srv->port); ossl_quic_engine_free(srv->engine); #if defined(OPENSSL_THREADS) ossl_crypto_mutex_free(&srv->mutex); #endif OPENSSL_free(qc); } OPENSSL_free(srv); return NULL; } void ossl_quic_tserver_free(QUIC_TSERVER *srv) { if (srv == NULL) return; SSL_free(srv->tls); ossl_quic_channel_free(srv->ch); ossl_quic_port_free(srv->port); ossl_quic_engine_free(srv->engine); BIO_free_all(srv->args.net_rbio); BIO_free_all(srv->args.net_wbio); OPENSSL_free(srv->ssl); SSL_CTX_free(srv->ctx); #if defined(OPENSSL_THREADS) ossl_crypto_mutex_free(&srv->mutex); #endif OPENSSL_free(srv); } int ossl_quic_tserver_set_plain_packet_mutator(QUIC_TSERVER *srv, ossl_mutate_packet_cb mutatecb, ossl_finish_mutate_cb finishmutatecb, void *mutatearg) { return ossl_quic_channel_set_mutator(srv->ch, mutatecb, finishmutatecb, mutatearg); } int ossl_quic_tserver_set_handshake_mutator(QUIC_TSERVER *srv, ossl_statem_mutate_handshake_cb mutate_handshake_cb, ossl_statem_finish_mutate_handshake_cb finish_mutate_handshake_cb, void *mutatearg) { return ossl_statem_set_mutator(ossl_quic_channel_get0_ssl(srv->ch), mutate_handshake_cb, finish_mutate_handshake_cb, mutatearg); } int ossl_quic_tserver_tick(QUIC_TSERVER *srv) { ossl_quic_reactor_tick(ossl_quic_channel_get_reactor(srv->ch), 0); if (ossl_quic_channel_is_active(srv->ch)) srv->connected = 1; return 1; } int ossl_quic_tserver_is_connected(QUIC_TSERVER *srv) { return ossl_quic_channel_is_active(srv->ch); } int ossl_quic_tserver_is_term_any(const QUIC_TSERVER *srv) { return ossl_quic_channel_is_term_any(srv->ch); } const QUIC_TERMINATE_CAUSE * ossl_quic_tserver_get_terminate_cause(const QUIC_TSERVER *srv) { return ossl_quic_channel_get_terminate_cause(srv->ch); } int ossl_quic_tserver_is_terminated(const QUIC_TSERVER *srv) { return ossl_quic_channel_is_terminated(srv->ch); } int ossl_quic_tserver_is_handshake_confirmed(const QUIC_TSERVER *srv) { return ossl_quic_channel_is_handshake_confirmed(srv->ch); } int ossl_quic_tserver_read(QUIC_TSERVER *srv, uint64_t stream_id, unsigned char *buf, size_t buf_len, size_t *bytes_read) { int is_fin = 0; QUIC_STREAM *qs; qs = ossl_quic_stream_map_get_by_id(ossl_quic_channel_get_qsm(srv->ch), stream_id); if (qs == NULL) { int is_client_init = ((stream_id & QUIC_STREAM_INITIATOR_MASK) == QUIC_STREAM_INITIATOR_CLIENT); if (!is_client_init || !ossl_quic_channel_is_active(srv->ch)) return 0; *bytes_read = 0; return 1; } if (qs->recv_state == QUIC_RSTREAM_STATE_DATA_READ || !ossl_quic_stream_has_recv_buffer(qs)) return 0; if (!ossl_quic_rstream_read(qs->rstream, buf, buf_len, bytes_read, &is_fin)) return 0; if (*bytes_read > 0) { OSSL_RTT_INFO rtt_info; ossl_statm_get_rtt_info(ossl_quic_channel_get_statm(srv->ch), &rtt_info); if (!ossl_quic_rxfc_on_retire(&qs->rxfc, *bytes_read, rtt_info.smoothed_rtt)) return 0; } if (is_fin) ossl_quic_stream_map_notify_totally_read(ossl_quic_channel_get_qsm(srv->ch), qs); if (*bytes_read > 0) ossl_quic_stream_map_update_state(ossl_quic_channel_get_qsm(srv->ch), qs); return 1; } int ossl_quic_tserver_has_read_ended(QUIC_TSERVER *srv, uint64_t stream_id) { QUIC_STREAM *qs; unsigned char buf[1]; size_t bytes_read = 0; int is_fin = 0; qs = ossl_quic_stream_map_get_by_id(ossl_quic_channel_get_qsm(srv->ch), stream_id); if (qs == NULL) return 0; if (qs->recv_state == QUIC_RSTREAM_STATE_DATA_READ) return 1; if (!ossl_quic_stream_has_recv_buffer(qs)) return 0; if (!ossl_quic_rstream_peek(qs->rstream, buf, sizeof(buf), &bytes_read, &is_fin)) return 0; if (is_fin && bytes_read == 0) { if (!ossl_quic_rstream_read(qs->rstream, buf, sizeof(buf), &bytes_read, &is_fin)) return 0; assert(is_fin && bytes_read == 0); assert(qs->recv_state == QUIC_RSTREAM_STATE_DATA_RECVD); ossl_quic_stream_map_notify_totally_read(ossl_quic_channel_get_qsm(srv->ch), qs); ossl_quic_stream_map_update_state(ossl_quic_channel_get_qsm(srv->ch), qs); return 1; } return 0; } int ossl_quic_tserver_write(QUIC_TSERVER *srv, uint64_t stream_id, const unsigned char *buf, size_t buf_len, size_t *bytes_written) { QUIC_STREAM *qs; if (!ossl_quic_channel_is_active(srv->ch)) return 0; qs = ossl_quic_stream_map_get_by_id(ossl_quic_channel_get_qsm(srv->ch), stream_id); if (qs == NULL || !ossl_quic_stream_has_send_buffer(qs)) return 0; if (!ossl_quic_sstream_append(qs->sstream, buf, buf_len, bytes_written)) return 0; if (*bytes_written > 0) ossl_quic_stream_map_update_state(ossl_quic_channel_get_qsm(srv->ch), qs); ossl_quic_tserver_tick(srv); return 1; } int ossl_quic_tserver_conclude(QUIC_TSERVER *srv, uint64_t stream_id) { QUIC_STREAM *qs; if (!ossl_quic_channel_is_active(srv->ch)) return 0; qs = ossl_quic_stream_map_get_by_id(ossl_quic_channel_get_qsm(srv->ch), stream_id); if (qs == NULL || !ossl_quic_stream_has_send_buffer(qs)) return 0; if (!ossl_quic_sstream_get_final_size(qs->sstream, NULL)) { ossl_quic_sstream_fin(qs->sstream); ossl_quic_stream_map_update_state(ossl_quic_channel_get_qsm(srv->ch), qs); } ossl_quic_tserver_tick(srv); return 1; } int ossl_quic_tserver_stream_new(QUIC_TSERVER *srv, int is_uni, uint64_t *stream_id) { QUIC_STREAM *qs; if (!ossl_quic_channel_is_active(srv->ch)) return 0; if ((qs = ossl_quic_channel_new_stream_local(srv->ch, is_uni)) == NULL) return 0; *stream_id = qs->id; return 1; } BIO *ossl_quic_tserver_get0_rbio(QUIC_TSERVER *srv) { return srv->args.net_rbio; } SSL_CTX *ossl_quic_tserver_get0_ssl_ctx(QUIC_TSERVER *srv) { return srv->ctx; } int ossl_quic_tserver_stream_has_peer_stop_sending(QUIC_TSERVER *srv, uint64_t stream_id, uint64_t *app_error_code) { QUIC_STREAM *qs; qs = ossl_quic_stream_map_get_by_id(ossl_quic_channel_get_qsm(srv->ch), stream_id); if (qs == NULL) return 0; if (qs->peer_stop_sending && app_error_code != NULL) *app_error_code = qs->peer_stop_sending_aec; return qs->peer_stop_sending; } int ossl_quic_tserver_stream_has_peer_reset_stream(QUIC_TSERVER *srv, uint64_t stream_id, uint64_t *app_error_code) { QUIC_STREAM *qs; qs = ossl_quic_stream_map_get_by_id(ossl_quic_channel_get_qsm(srv->ch), stream_id); if (qs == NULL) return 0; if (ossl_quic_stream_recv_is_reset(qs) && app_error_code != NULL) *app_error_code = qs->peer_reset_stream_aec; return ossl_quic_stream_recv_is_reset(qs); } int ossl_quic_tserver_set_new_local_cid(QUIC_TSERVER *srv, const QUIC_CONN_ID *conn_id) { return ossl_quic_channel_replace_local_cid(srv->ch, conn_id); } uint64_t ossl_quic_tserver_pop_incoming_stream(QUIC_TSERVER *srv) { QUIC_STREAM_MAP *qsm = ossl_quic_channel_get_qsm(srv->ch); QUIC_STREAM *qs = ossl_quic_stream_map_peek_accept_queue(qsm); if (qs == NULL) return UINT64_MAX; ossl_quic_stream_map_remove_from_accept_queue(qsm, qs, ossl_time_zero()); return qs->id; } int ossl_quic_tserver_is_stream_totally_acked(QUIC_TSERVER *srv, uint64_t stream_id) { QUIC_STREAM *qs; qs = ossl_quic_stream_map_get_by_id(ossl_quic_channel_get_qsm(srv->ch), stream_id); if (qs == NULL) return 1; return ossl_quic_sstream_is_totally_acked(qs->sstream); } int ossl_quic_tserver_get_net_read_desired(QUIC_TSERVER *srv) { return ossl_quic_reactor_net_read_desired( ossl_quic_channel_get_reactor(srv->ch)); } int ossl_quic_tserver_get_net_write_desired(QUIC_TSERVER *srv) { return ossl_quic_reactor_net_write_desired( ossl_quic_channel_get_reactor(srv->ch)); } OSSL_TIME ossl_quic_tserver_get_deadline(QUIC_TSERVER *srv) { return ossl_quic_reactor_get_tick_deadline( ossl_quic_channel_get_reactor(srv->ch)); } int ossl_quic_tserver_shutdown(QUIC_TSERVER *srv, uint64_t app_error_code) { ossl_quic_channel_local_close(srv->ch, app_error_code, NULL); if (ossl_quic_channel_is_terminated(srv->ch)) return 1; ossl_quic_reactor_tick(ossl_quic_channel_get_reactor(srv->ch), 0); return ossl_quic_channel_is_terminated(srv->ch); } int ossl_quic_tserver_ping(QUIC_TSERVER *srv) { if (ossl_quic_channel_is_terminated(srv->ch)) return 0; if (!ossl_quic_channel_ping(srv->ch)) return 0; ossl_quic_reactor_tick(ossl_quic_channel_get_reactor(srv->ch), 0); return 1; } QUIC_CHANNEL *ossl_quic_tserver_get_channel(QUIC_TSERVER *srv) { return srv->ch; } void ossl_quic_tserver_set_msg_callback(QUIC_TSERVER *srv, void (*f)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg), void *arg) { ossl_quic_channel_set_msg_callback(srv->ch, f, srv->ssl); ossl_quic_channel_set_msg_callback_arg(srv->ch, arg); SSL_set_msg_callback(srv->tls, f); SSL_set_msg_callback_arg(srv->tls, arg); } int ossl_quic_tserver_new_ticket(QUIC_TSERVER *srv) { return SSL_new_session_ticket(srv->tls); } int ossl_quic_tserver_set_max_early_data(QUIC_TSERVER *srv, uint32_t max_early_data) { return SSL_set_max_early_data(srv->tls, max_early_data); } void ossl_quic_tserver_set_psk_find_session_cb(QUIC_TSERVER *srv, SSL_psk_find_session_cb_func cb) { SSL_set_psk_find_session_callback(srv->tls, cb); }
quic
openssl/ssl/quic/quic_tserver.c
openssl
#include "internal/quic_port.h" #include "internal/quic_channel.h" #include "internal/quic_lcidm.h" #include "internal/quic_srtm.h" #include "quic_port_local.h" #include "quic_channel_local.h" #include "quic_engine_local.h" #include "../ssl_local.h" #define INIT_DCID_LEN 8 static int port_init(QUIC_PORT *port); static void port_cleanup(QUIC_PORT *port); static OSSL_TIME get_time(void *arg); static void port_default_packet_handler(QUIC_URXE *e, void *arg, const QUIC_CONN_ID *dcid); static void port_rx_pre(QUIC_PORT *port); DEFINE_LIST_OF_IMPL(ch, QUIC_CHANNEL); DEFINE_LIST_OF_IMPL(port, QUIC_PORT); QUIC_PORT *ossl_quic_port_new(const QUIC_PORT_ARGS *args) { QUIC_PORT *port; if ((port = OPENSSL_zalloc(sizeof(QUIC_PORT))) == NULL) return NULL; port->engine = args->engine; port->channel_ctx = args->channel_ctx; port->is_multi_conn = args->is_multi_conn; if (!port_init(port)) { OPENSSL_free(port); return NULL; } return port; } void ossl_quic_port_free(QUIC_PORT *port) { if (port == NULL) return; port_cleanup(port); OPENSSL_free(port); } static int port_init(QUIC_PORT *port) { size_t rx_short_dcid_len = (port->is_multi_conn ? INIT_DCID_LEN : 0); if (port->engine == NULL || port->channel_ctx == NULL) goto err; if ((port->err_state = OSSL_ERR_STATE_new()) == NULL) goto err; if ((port->demux = ossl_quic_demux_new(NULL, rx_short_dcid_len, get_time, port)) == NULL) goto err; ossl_quic_demux_set_default_handler(port->demux, port_default_packet_handler, port); if ((port->srtm = ossl_quic_srtm_new(port->engine->libctx, port->engine->propq)) == NULL) goto err; if ((port->lcidm = ossl_quic_lcidm_new(port->engine->libctx, rx_short_dcid_len)) == NULL) goto err; port->rx_short_dcid_len = (unsigned char)rx_short_dcid_len; port->tx_init_dcid_len = INIT_DCID_LEN; port->state = QUIC_PORT_STATE_RUNNING; ossl_list_port_insert_tail(&port->engine->port_list, port); port->on_engine_list = 1; return 1; err: port_cleanup(port); return 0; } static void port_cleanup(QUIC_PORT *port) { assert(ossl_list_ch_num(&port->channel_list) == 0); ossl_quic_demux_free(port->demux); port->demux = NULL; ossl_quic_srtm_free(port->srtm); port->srtm = NULL; ossl_quic_lcidm_free(port->lcidm); port->lcidm = NULL; OSSL_ERR_STATE_free(port->err_state); port->err_state = NULL; if (port->on_engine_list) { ossl_list_port_remove(&port->engine->port_list, port); port->on_engine_list = 0; } } static void port_transition_failed(QUIC_PORT *port) { if (port->state == QUIC_PORT_STATE_FAILED) return; port->state = QUIC_PORT_STATE_FAILED; } int ossl_quic_port_is_running(const QUIC_PORT *port) { return port->state == QUIC_PORT_STATE_RUNNING; } QUIC_ENGINE *ossl_quic_port_get0_engine(QUIC_PORT *port) { return port->engine; } QUIC_REACTOR *ossl_quic_port_get0_reactor(QUIC_PORT *port) { return ossl_quic_engine_get0_reactor(port->engine); } QUIC_DEMUX *ossl_quic_port_get0_demux(QUIC_PORT *port) { return port->demux; } CRYPTO_MUTEX *ossl_quic_port_get0_mutex(QUIC_PORT *port) { return ossl_quic_engine_get0_mutex(port->engine); } OSSL_TIME ossl_quic_port_get_time(QUIC_PORT *port) { return ossl_quic_engine_get_time(port->engine); } static OSSL_TIME get_time(void *port) { return ossl_quic_port_get_time((QUIC_PORT *)port); } int ossl_quic_port_get_rx_short_dcid_len(const QUIC_PORT *port) { return port->rx_short_dcid_len; } int ossl_quic_port_get_tx_init_dcid_len(const QUIC_PORT *port) { return port->tx_init_dcid_len; } static int validate_poll_descriptor(const BIO_POLL_DESCRIPTOR *d) { if (d->type == BIO_POLL_DESCRIPTOR_TYPE_SOCK_FD && d->value.fd < 0) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } return 1; } BIO *ossl_quic_port_get_net_rbio(QUIC_PORT *port) { return port->net_rbio; } BIO *ossl_quic_port_get_net_wbio(QUIC_PORT *port) { return port->net_wbio; } static int port_update_poll_desc(QUIC_PORT *port, BIO *net_bio, int for_write) { BIO_POLL_DESCRIPTOR d = {0}; if (net_bio == NULL || (!for_write && !BIO_get_rpoll_descriptor(net_bio, &d)) || (for_write && !BIO_get_wpoll_descriptor(net_bio, &d))) d.type = BIO_POLL_DESCRIPTOR_TYPE_NONE; if (!validate_poll_descriptor(&d)) return 0; if (for_write) ossl_quic_reactor_set_poll_w(&port->engine->rtor, &d); else ossl_quic_reactor_set_poll_r(&port->engine->rtor, &d); return 1; } int ossl_quic_port_update_poll_descriptors(QUIC_PORT *port) { int ok = 1; if (!port_update_poll_desc(port, port->net_rbio, 0)) ok = 0; if (!port_update_poll_desc(port, port->net_wbio, 1)) ok = 0; return ok; } int ossl_quic_port_set_net_rbio(QUIC_PORT *port, BIO *net_rbio) { if (port->net_rbio == net_rbio) return 1; if (!port_update_poll_desc(port, net_rbio, 0)) return 0; ossl_quic_demux_set_bio(port->demux, net_rbio); port->net_rbio = net_rbio; return 1; } int ossl_quic_port_set_net_wbio(QUIC_PORT *port, BIO *net_wbio) { QUIC_CHANNEL *ch; if (port->net_wbio == net_wbio) return 1; if (!port_update_poll_desc(port, net_wbio, 1)) return 0; LIST_FOREACH(ch, ch, &port->channel_list) ossl_qtx_set_bio(ch->qtx, net_wbio); port->net_wbio = net_wbio; return 1; } static SSL *port_new_handshake_layer(QUIC_PORT *port) { SSL *tls = NULL; SSL_CONNECTION *tls_conn = NULL; tls = ossl_ssl_connection_new_int(port->channel_ctx, TLS_method()); if (tls == NULL || (tls_conn = SSL_CONNECTION_FROM_SSL(tls)) == NULL) return NULL; tls_conn->s3.flags |= TLS1_FLAGS_QUIC; tls_conn->options &= OSSL_QUIC_PERMITTED_OPTIONS_CONN; tls_conn->pha_enabled = 0; return tls; } static QUIC_CHANNEL *port_make_channel(QUIC_PORT *port, SSL *tls, int is_server) { QUIC_CHANNEL_ARGS args = {0}; QUIC_CHANNEL *ch; args.port = port; args.is_server = is_server; args.tls = (tls != NULL ? tls : port_new_handshake_layer(port)); args.lcidm = port->lcidm; args.srtm = port->srtm; if (args.tls == NULL) return NULL; #ifndef OPENSSL_NO_QLOG args.use_qlog = 1; args.qlog_title = args.tls->ctx->qlog_title; #endif ch = ossl_quic_channel_new(&args); if (ch == NULL) { if (tls == NULL) SSL_free(args.tls); return NULL; } return ch; } QUIC_CHANNEL *ossl_quic_port_create_outgoing(QUIC_PORT *port, SSL *tls) { return port_make_channel(port, tls, 0); } QUIC_CHANNEL *ossl_quic_port_create_incoming(QUIC_PORT *port, SSL *tls) { QUIC_CHANNEL *ch; assert(port->tserver_ch == NULL); ch = port_make_channel(port, tls, 1); port->tserver_ch = ch; port->is_server = 1; return ch; } void ossl_quic_port_subtick(QUIC_PORT *port, QUIC_TICK_RESULT *res, uint32_t flags) { QUIC_CHANNEL *ch; res->net_read_desired = 0; res->net_write_desired = 0; res->tick_deadline = ossl_time_infinite(); if (!port->engine->inhibit_tick) { if (ossl_quic_port_is_running(port)) port_rx_pre(port); LIST_FOREACH(ch, ch, &port->channel_list) { QUIC_TICK_RESULT subr = {0}; ossl_quic_channel_subtick(ch, &subr, flags); ossl_quic_tick_result_merge_into(res, &subr); } } } static void port_rx_pre(QUIC_PORT *port) { int ret; if (!port->is_server && !port->have_sent_any_pkt) return; ret = ossl_quic_demux_pump(port->demux); if (ret == QUIC_DEMUX_PUMP_RES_PERMANENT_FAIL) ossl_quic_port_raise_net_error(port, NULL); } static void port_on_new_conn(QUIC_PORT *port, const BIO_ADDR *peer, const QUIC_CONN_ID *scid, const QUIC_CONN_ID *dcid, QUIC_CHANNEL **new_ch) { if (port->tserver_ch != NULL) { if (!ossl_quic_channel_on_new_conn(port->tserver_ch, peer, scid, dcid)) return; *new_ch = port->tserver_ch; port->tserver_ch = NULL; return; } } static int port_try_handle_stateless_reset(QUIC_PORT *port, const QUIC_URXE *e) { size_t i; const unsigned char *data = ossl_quic_urxe_data(e); void *opaque = NULL; if (e->data_len < QUIC_STATELESS_RESET_TOKEN_LEN + 5 || (0100 & *data) != 0100) return 0; for (i = 0;; ++i) { if (!ossl_quic_srtm_lookup(port->srtm, (QUIC_STATELESS_RESET_TOKEN *)(data + e->data_len - sizeof(QUIC_STATELESS_RESET_TOKEN)), i, &opaque, NULL)) break; assert(opaque != NULL); ossl_quic_channel_on_stateless_reset((QUIC_CHANNEL *)opaque); } return i > 0; } static void port_default_packet_handler(QUIC_URXE *e, void *arg, const QUIC_CONN_ID *dcid) { QUIC_PORT *port = arg; PACKET pkt; QUIC_PKT_HDR hdr; QUIC_CHANNEL *ch = NULL, *new_ch = NULL; if (!ossl_quic_port_is_running(port)) goto undesirable; if (port_try_handle_stateless_reset(port, e)) goto undesirable; if (dcid != NULL && ossl_quic_lcidm_lookup(port->lcidm, dcid, NULL, (void **)&ch)) { assert(ch != NULL); ossl_quic_channel_inject(ch, e); return; } if (port->tserver_ch == NULL) goto undesirable; if (e->data_len < QUIC_MIN_INITIAL_DGRAM_LEN) goto undesirable; if (!PACKET_buf_init(&pkt, ossl_quic_urxe_data(e), e->data_len)) goto undesirable; if (!ossl_quic_wire_decode_pkt_hdr(&pkt, SIZE_MAX, 1, 0, &hdr, NULL)) goto undesirable; switch (hdr.version) { case QUIC_VERSION_1: break; case QUIC_VERSION_NONE: default: goto undesirable; } if (hdr.type != QUIC_PKT_TYPE_INITIAL) goto undesirable; port_on_new_conn(port, &e->peer, &hdr.src_conn_id, &hdr.dst_conn_id, &new_ch); if (new_ch != NULL) ossl_qrx_inject_urxe(new_ch->qrx, e); return; undesirable: ossl_quic_demux_release_urxe(port->demux, e); } void ossl_quic_port_raise_net_error(QUIC_PORT *port, QUIC_CHANNEL *triggering_ch) { QUIC_CHANNEL *ch; if (!ossl_quic_port_is_running(port)) return; ERR_raise_data(ERR_LIB_SSL, SSL_R_QUIC_NETWORK_ERROR, "port failed due to network BIO I/O error"); OSSL_ERR_STATE_save(port->err_state); port_transition_failed(port); if (triggering_ch != NULL) ossl_quic_channel_raise_net_error(triggering_ch); LIST_FOREACH(ch, ch, &port->channel_list) if (ch != triggering_ch) ossl_quic_channel_raise_net_error(ch); } void ossl_quic_port_restore_err_state(const QUIC_PORT *port) { ERR_clear_error(); OSSL_ERR_STATE_restore(port->err_state); }
quic
openssl/ssl/quic/quic_port.c
openssl
#include "internal/quic_srt_gen.h" #include <openssl/core_names.h> #include <openssl/evp.h> struct quic_srt_gen_st { EVP_MAC *mac; EVP_MAC_CTX *mac_ctx; }; QUIC_SRT_GEN *ossl_quic_srt_gen_new(OSSL_LIB_CTX *libctx, const char *propq, const unsigned char *key, size_t key_len) { QUIC_SRT_GEN *srt_gen; OSSL_PARAM params[3], *p = params; if ((srt_gen = OPENSSL_zalloc(sizeof(*srt_gen))) == NULL) return NULL; if ((srt_gen->mac = EVP_MAC_fetch(libctx, "HMAC", propq)) == NULL) goto err; if ((srt_gen->mac_ctx = EVP_MAC_CTX_new(srt_gen->mac)) == NULL) goto err; *p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, "SHA256", 7); if (propq != NULL) *p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_PROPERTIES, (char *)propq, 0); *p++ = OSSL_PARAM_construct_end(); if (!EVP_MAC_init(srt_gen->mac_ctx, key, key_len, params)) goto err; return srt_gen; err: ossl_quic_srt_gen_free(srt_gen); return NULL; } void ossl_quic_srt_gen_free(QUIC_SRT_GEN *srt_gen) { if (srt_gen == NULL) return; EVP_MAC_CTX_free(srt_gen->mac_ctx); EVP_MAC_free(srt_gen->mac); OPENSSL_free(srt_gen); } int ossl_quic_srt_gen_calculate_token(QUIC_SRT_GEN *srt_gen, const QUIC_CONN_ID *dcid, QUIC_STATELESS_RESET_TOKEN *token) { size_t outl = 0; unsigned char mac[SHA256_DIGEST_LENGTH]; if (!EVP_MAC_init(srt_gen->mac_ctx, NULL, 0, NULL)) return 0; if (!EVP_MAC_update(srt_gen->mac_ctx, (const unsigned char *)dcid->id, dcid->id_len)) return 0; if (!EVP_MAC_final(srt_gen->mac_ctx, mac, &outl, sizeof(mac)) || outl != sizeof(mac)) return 0; assert(sizeof(mac) >= sizeof(token->token)); memcpy(token->token, mac, sizeof(token->token)); return 1; }
quic
openssl/ssl/quic/quic_srt_gen.c
openssl
#include <openssl/ssl.h> #include "internal/recordmethod.h" #include "internal/quic_tls.h" #include "../ssl_local.h" #include "internal/quic_error.h" #define QUIC_TLS_FATAL(rl, ad, err) \ do { \ if ((rl) != NULL) (rl)->alert = (ad); \ ERR_raise(ERR_LIB_SSL, (err)); \ if ((rl) != NULL) (rl)->qtls->inerror = 1; \ } while(0) struct quic_tls_st { QUIC_TLS_ARGS args; const unsigned char *local_transport_params; size_t local_transport_params_len; ERR_STATE *error_state; uint64_t error_code; const char *error_msg; unsigned int configured : 1; unsigned int inerror : 1; unsigned int complete : 1; }; struct ossl_record_layer_st { QUIC_TLS *qtls; int level; BIO *dummybio; size_t written; OSSL_RECORD_TEMPLATE template; int alert; size_t recread; size_t recunreleased; OSSL_FUNC_rlayer_msg_callback_fn *msg_callback; void *cbarg; }; static int quic_set1_bio(OSSL_RECORD_LAYER *rl, BIO *bio); static int quic_free(OSSL_RECORD_LAYER *r); static int quic_new_record_layer(OSSL_LIB_CTX *libctx, const char *propq, int vers, int role, int direction, int level, uint16_t epoch, unsigned char *secret, size_t secretlen, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen, unsigned char *mackey, size_t mackeylen, const EVP_CIPHER *ciph, size_t taglen, int mactype, const EVP_MD *md, COMP_METHOD *comp, const EVP_MD *kdfdigest, BIO *prev, BIO *transport, BIO *next, BIO_ADDR *local, BIO_ADDR *peer, const OSSL_PARAM *settings, const OSSL_PARAM *options, const OSSL_DISPATCH *fns, void *cbarg, void *rlarg, OSSL_RECORD_LAYER **retrl) { OSSL_RECORD_LAYER *rl = OPENSSL_zalloc(sizeof(*rl)); uint32_t enc_level; int qdir; uint32_t suite_id = 0; if (rl == NULL) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } rl->qtls = (QUIC_TLS *)rlarg; rl->level = level; if (!quic_set1_bio(rl, transport)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } rl->cbarg = cbarg; *retrl = rl; if (fns != NULL) { for (; fns->function_id != 0; fns++) { switch (fns->function_id) { break; case OSSL_FUNC_RLAYER_MSG_CALLBACK: rl->msg_callback = OSSL_FUNC_rlayer_msg_callback(fns); break; default: break; } } } switch (level) { case OSSL_RECORD_PROTECTION_LEVEL_NONE: return 1; case OSSL_RECORD_PROTECTION_LEVEL_EARLY: enc_level = QUIC_ENC_LEVEL_0RTT; break; case OSSL_RECORD_PROTECTION_LEVEL_HANDSHAKE: enc_level = QUIC_ENC_LEVEL_HANDSHAKE; break; case OSSL_RECORD_PROTECTION_LEVEL_APPLICATION: enc_level = QUIC_ENC_LEVEL_1RTT; break; default: QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (direction == OSSL_RECORD_DIRECTION_READ) qdir = 0; else qdir = 1; if (EVP_CIPHER_is_a(ciph, "AES-128-GCM")) { suite_id = QRL_SUITE_AES128GCM; } else if (EVP_CIPHER_is_a(ciph, "AES-256-GCM")) { suite_id = QRL_SUITE_AES256GCM; } else if (EVP_CIPHER_is_a(ciph, "CHACHA20-POLY1305")) { suite_id = QRL_SUITE_CHACHA20POLY1305; } else { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, SSL_R_UNKNOWN_CIPHER_TYPE); goto err; } if (!EVP_MD_up_ref((EVP_MD *)kdfdigest)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); goto err; } if (!rl->qtls->args.yield_secret_cb(enc_level, qdir, suite_id, (EVP_MD *)kdfdigest, secret, secretlen, rl->qtls->args.yield_secret_cb_arg)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); EVP_MD_free((EVP_MD *)kdfdigest); goto err; } return 1; err: *retrl = NULL; quic_free(rl); return 0; } static int quic_free(OSSL_RECORD_LAYER *rl) { if (rl == NULL) return 1; BIO_free(rl->dummybio); OPENSSL_free(rl); return 1; } static int quic_unprocessed_read_pending(OSSL_RECORD_LAYER *rl) { return 0; } static int quic_processed_read_pending(OSSL_RECORD_LAYER *rl) { return 0; } static size_t quic_get_max_records(OSSL_RECORD_LAYER *rl, uint8_t type, size_t len, size_t maxfrag, size_t *preffrag) { return 1; } static int quic_write_records(OSSL_RECORD_LAYER *rl, OSSL_RECORD_TEMPLATE *template, size_t numtempl) { size_t consumed; unsigned char alert; if (!ossl_assert(numtempl == 1)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } BIO_clear_retry_flags(rl->dummybio); if (rl->msg_callback != NULL) { unsigned char dummyrec[SSL3_RT_HEADER_LENGTH]; dummyrec[0] = (rl->level == OSSL_RECORD_PROTECTION_LEVEL_NONE) ? template->type : SSL3_RT_APPLICATION_DATA; dummyrec[1] = (unsigned char)((template->version >> 8) & 0xff); dummyrec[2] = (unsigned char)(template->version & 0xff); dummyrec[3] = (unsigned char)((template->buflen >> 8) & 0xff); dummyrec[4] = (unsigned char)(template->buflen & 0xff); rl->msg_callback(1, TLS1_3_VERSION, SSL3_RT_HEADER, dummyrec, SSL3_RT_HEADER_LENGTH, rl->cbarg); if (rl->level != OSSL_RECORD_PROTECTION_LEVEL_NONE) { rl->msg_callback(1, TLS1_3_VERSION, SSL3_RT_INNER_CONTENT_TYPE, &template->type, 1, rl->cbarg); } } switch (template->type) { case SSL3_RT_ALERT: if (template->buflen != 2) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_VALUE); return OSSL_RECORD_RETURN_FATAL; } alert = template->buf[1]; if (!rl->qtls->args.alert_cb(rl->qtls->args.alert_cb_arg, alert)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } break; case SSL3_RT_HANDSHAKE: if (!rl->qtls->args.crypto_send_cb(template->buf + rl->written, template->buflen - rl->written, &consumed, rl->qtls->args.crypto_send_cb_arg)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if (consumed + rl->written != template->buflen) { if (!ossl_assert(consumed + rl->written < template->buflen)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } rl->written += consumed; rl->template = *template; BIO_set_retry_write(rl->dummybio); return OSSL_RECORD_RETURN_RETRY; } rl->written = 0; break; default: QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } return OSSL_RECORD_RETURN_SUCCESS; } static int quic_retry_write_records(OSSL_RECORD_LAYER *rl) { return quic_write_records(rl, &rl->template, 1); } static int quic_read_record(OSSL_RECORD_LAYER *rl, void **rechandle, int *rversion, uint8_t *type, const unsigned char **data, size_t *datalen, uint16_t *epoch, unsigned char *seq_num) { if (rl->recread != 0 || rl->recunreleased != 0) return OSSL_RECORD_RETURN_FATAL; BIO_clear_retry_flags(rl->dummybio); if (!rl->qtls->args.crypto_recv_rcd_cb(data, datalen, rl->qtls->args.crypto_recv_rcd_cb_arg)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } if (*datalen == 0) { BIO_set_retry_read(rl->dummybio); return OSSL_RECORD_RETURN_RETRY; } *rechandle = rl; *rversion = TLS1_3_VERSION; *type = SSL3_RT_HANDSHAKE; rl->recread = rl->recunreleased = *datalen; if (rl->msg_callback != NULL) { unsigned char dummyrec[SSL3_RT_HEADER_LENGTH]; dummyrec[0] = (rl->level == OSSL_RECORD_PROTECTION_LEVEL_NONE) ? SSL3_RT_HANDSHAKE : SSL3_RT_APPLICATION_DATA; dummyrec[1] = (unsigned char)((TLS1_2_VERSION >> 8) & 0xff); dummyrec[2] = (unsigned char)(TLS1_2_VERSION & 0xff); dummyrec[3] = (unsigned char)((*datalen >> 8) & 0xff); dummyrec[4] = (unsigned char)(*datalen & 0xff); rl->msg_callback(0, TLS1_3_VERSION, SSL3_RT_HEADER, dummyrec, SSL3_RT_HEADER_LENGTH, rl->cbarg); rl->msg_callback(0, TLS1_3_VERSION, SSL3_RT_INNER_CONTENT_TYPE, type, 1, rl->cbarg); } return OSSL_RECORD_RETURN_SUCCESS; } static int quic_release_record(OSSL_RECORD_LAYER *rl, void *rechandle, size_t length) { if (!ossl_assert(rl->recread > 0) || !ossl_assert(rl->recunreleased <= rl->recread) || !ossl_assert(rl == rechandle) || !ossl_assert(length <= rl->recunreleased)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } rl->recunreleased -= length; if (rl->recunreleased > 0) return OSSL_RECORD_RETURN_SUCCESS; if (!rl->qtls->args.crypto_release_rcd_cb(rl->recread, rl->qtls->args.crypto_release_rcd_cb_arg)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return OSSL_RECORD_RETURN_FATAL; } rl->recread = 0; return OSSL_RECORD_RETURN_SUCCESS; } static int quic_get_alert_code(OSSL_RECORD_LAYER *rl) { return rl->alert; } static int quic_set_protocol_version(OSSL_RECORD_LAYER *rl, int version) { if (!ossl_assert(version == TLS1_3_VERSION)) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR); return 0; } return 1; } static void quic_set_plain_alerts(OSSL_RECORD_LAYER *rl, int allow) { } static void quic_set_first_handshake(OSSL_RECORD_LAYER *rl, int first) { } static void quic_set_max_pipelines(OSSL_RECORD_LAYER *rl, size_t max_pipelines) { } static void quic_get_state(OSSL_RECORD_LAYER *rl, const char **shortstr, const char **longstr) { if (rl->qtls->inerror) { if (shortstr != NULL) *shortstr = "unknown"; if (longstr != NULL) *longstr = "unknown"; } else { if (shortstr != NULL) *shortstr = "RH"; if (longstr != NULL) *longstr = "read header"; } } static int quic_set_options(OSSL_RECORD_LAYER *rl, const OSSL_PARAM *options) { return 1; } static const COMP_METHOD *quic_get_compression(OSSL_RECORD_LAYER *rl) { return NULL; } static void quic_set_max_frag_len(OSSL_RECORD_LAYER *rl, size_t max_frag_len) { } static int quic_alloc_buffers(OSSL_RECORD_LAYER *rl) { return 1; } static int quic_free_buffers(OSSL_RECORD_LAYER *rl) { return 1; } static int quic_set1_bio(OSSL_RECORD_LAYER *rl, BIO *bio) { if (bio != NULL && !BIO_up_ref(bio)) return 0; BIO_free(rl->dummybio); rl->dummybio = bio; return 1; } static size_t quic_app_data_pending(OSSL_RECORD_LAYER *rl) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return (size_t)ossl_assert(0); } static size_t quic_get_max_record_overhead(OSSL_RECORD_LAYER *rl) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return (size_t)ossl_assert(0); } static int quic_increment_sequence_ctr(OSSL_RECORD_LAYER *rl) { QUIC_TLS_FATAL(rl, SSL_AD_INTERNAL_ERROR, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); return ossl_assert(0); } static const OSSL_RECORD_METHOD quic_tls_record_method = { quic_new_record_layer, quic_free, quic_unprocessed_read_pending, quic_processed_read_pending, quic_app_data_pending, quic_get_max_records, quic_write_records, quic_retry_write_records, quic_read_record, quic_release_record, quic_get_alert_code, quic_set1_bio, quic_set_protocol_version, quic_set_plain_alerts, quic_set_first_handshake, quic_set_max_pipelines, NULL, quic_get_state, quic_set_options, quic_get_compression, quic_set_max_frag_len, quic_get_max_record_overhead, quic_increment_sequence_ctr, quic_alloc_buffers, quic_free_buffers }; static int add_transport_params_cb(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char **out, size_t *outlen, X509 *x, size_t chainidx, int *al, void *add_arg) { QUIC_TLS *qtls = add_arg; *out = qtls->local_transport_params; *outlen = qtls->local_transport_params_len; return 1; } static void free_transport_params_cb(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char *out, void *add_arg) { } static int parse_transport_params_cb(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char *in, size_t inlen, X509 *x, size_t chainidx, int *al, void *parse_arg) { QUIC_TLS *qtls = parse_arg; return qtls->args.got_transport_params_cb(in, inlen, qtls->args.got_transport_params_cb_arg); } QUIC_TLS *ossl_quic_tls_new(const QUIC_TLS_ARGS *args) { QUIC_TLS *qtls; if (args->crypto_send_cb == NULL || args->crypto_recv_rcd_cb == NULL || args->crypto_release_rcd_cb == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER); return NULL; } qtls = OPENSSL_zalloc(sizeof(*qtls)); if (qtls == NULL) return NULL; if ((qtls->error_state = OSSL_ERR_STATE_new()) == NULL) { OPENSSL_free(qtls); return NULL; } qtls->args = *args; return qtls; } void ossl_quic_tls_free(QUIC_TLS *qtls) { if (qtls == NULL) return; OSSL_ERR_STATE_free(qtls->error_state); OPENSSL_free(qtls); } static int raise_error(QUIC_TLS *qtls, uint64_t error_code, const char *error_msg, const char *src_file, int src_line, const char *src_func) { ERR_new(); ERR_set_debug(src_file, src_line, src_func); ERR_set_error(ERR_LIB_SSL, SSL_R_QUIC_HANDSHAKE_LAYER_ERROR, "handshake layer error, error code %llu (0x%llx) (\"%s\")", error_code, error_code, error_msg); OSSL_ERR_STATE_save_to_mark(qtls->error_state); qtls->error_code = error_code; qtls->error_msg = error_msg; qtls->inerror = 1; ERR_pop_to_mark(); return 0; } #define RAISE_ERROR(qtls, error_code, error_msg) \ raise_error((qtls), (error_code), (error_msg), \ OPENSSL_FILE, OPENSSL_LINE, OPENSSL_FUNC) #define RAISE_INTERNAL_ERROR(qtls) \ RAISE_ERROR((qtls), OSSL_QUIC_ERR_INTERNAL_ERROR, "internal error") int ossl_quic_tls_tick(QUIC_TLS *qtls) { int ret, err; const unsigned char *alpn; unsigned int alpnlen; if (qtls->inerror) return 0; ERR_set_mark(); if (!qtls->configured) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(qtls->args.s); SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(sc); BIO *nullbio; if (qtls->args.is_server) { if (sctx->ext.alpn_select_cb == NULL) return RAISE_INTERNAL_ERROR(qtls); } else { if (sc->ext.alpn == NULL || sc->ext.alpn_len == 0) return RAISE_ERROR(qtls, OSSL_QUIC_ERR_CRYPTO_NO_APP_PROTO, "ALPN must be configured when using QUIC"); } if (!SSL_set_min_proto_version(qtls->args.s, TLS1_3_VERSION)) return RAISE_INTERNAL_ERROR(qtls); SSL_clear_options(qtls->args.s, SSL_OP_ENABLE_MIDDLEBOX_COMPAT); ossl_ssl_set_custom_record_layer(sc, &quic_tls_record_method, qtls); if (!ossl_tls_add_custom_ext_intern(NULL, &sc->cert->custext, qtls->args.is_server ? ENDPOINT_SERVER : ENDPOINT_CLIENT, TLSEXT_TYPE_quic_transport_parameters, SSL_EXT_TLS1_3_ONLY | SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS, add_transport_params_cb, free_transport_params_cb, qtls, parse_transport_params_cb, qtls)) return RAISE_INTERNAL_ERROR(qtls); nullbio = BIO_new(BIO_s_null()); if (nullbio == NULL) return RAISE_INTERNAL_ERROR(qtls); SSL_set_bio(qtls->args.s, nullbio, nullbio); if (qtls->args.is_server) SSL_set_accept_state(qtls->args.s); else SSL_set_connect_state(qtls->args.s); qtls->configured = 1; } if (qtls->complete) ret = SSL_read(qtls->args.s, NULL, 0); else ret = SSL_do_handshake(qtls->args.s); if (ret <= 0) { err = ossl_ssl_get_error(qtls->args.s, ret, ERR_count_to_mark() > 0); switch (err) { case SSL_ERROR_WANT_READ: case SSL_ERROR_WANT_WRITE: case SSL_ERROR_WANT_CLIENT_HELLO_CB: case SSL_ERROR_WANT_X509_LOOKUP: case SSL_ERROR_WANT_RETRY_VERIFY: ERR_pop_to_mark(); return 1; default: return RAISE_INTERNAL_ERROR(qtls); } } if (!qtls->complete) { SSL_get0_alpn_selected(qtls->args.s, &alpn, &alpnlen); if (alpn == NULL || alpnlen == 0) return RAISE_ERROR(qtls, OSSL_QUIC_ERR_CRYPTO_NO_APP_PROTO, "no application protocol negotiated"); qtls->complete = 1; ERR_pop_to_mark(); return qtls->args.handshake_complete_cb(qtls->args.handshake_complete_cb_arg); } ERR_pop_to_mark(); return 1; } int ossl_quic_tls_set_transport_params(QUIC_TLS *qtls, const unsigned char *transport_params, size_t transport_params_len) { qtls->local_transport_params = transport_params; qtls->local_transport_params_len = transport_params_len; return 1; } int ossl_quic_tls_get_error(QUIC_TLS *qtls, uint64_t *error_code, const char **error_msg, ERR_STATE **error_state) { if (qtls->inerror) { *error_code = qtls->error_code; *error_msg = qtls->error_msg; *error_state = qtls->error_state; } return qtls->inerror; } int ossl_quic_tls_is_cert_request(QUIC_TLS *qtls) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(qtls->args.s); return sc->s3.tmp.message_type == SSL3_MT_CERTIFICATE_REQUEST; } int ossl_quic_tls_has_bad_max_early_data(QUIC_TLS *qtls) { uint32_t max_early_data = SSL_get0_session(qtls->args.s)->ext.max_early_data; return max_early_data != 0xffffffff && max_early_data != 0; }
quic
openssl/ssl/quic/quic_tls.c
openssl
#include <openssl/err.h> #include "internal/common.h" #include "internal/time.h" #include "internal/quic_stream.h" #include "internal/quic_sf_list.h" #include "internal/ring_buf.h" struct quic_rstream_st { SFRAME_LIST fl; QUIC_RXFC *rxfc; OSSL_STATM *statm; UINT_RANGE head_range; struct ring_buf rbuf; }; QUIC_RSTREAM *ossl_quic_rstream_new(QUIC_RXFC *rxfc, OSSL_STATM *statm, size_t rbuf_size) { QUIC_RSTREAM *ret = OPENSSL_zalloc(sizeof(*ret)); if (ret == NULL) return NULL; ring_buf_init(&ret->rbuf); if (!ring_buf_resize(&ret->rbuf, rbuf_size, 0)) { OPENSSL_free(ret); return NULL; } ossl_sframe_list_init(&ret->fl); ret->rxfc = rxfc; ret->statm = statm; return ret; } void ossl_quic_rstream_free(QUIC_RSTREAM *qrs) { int cleanse; if (qrs == NULL) return; cleanse = qrs->fl.cleanse; ossl_sframe_list_destroy(&qrs->fl); ring_buf_destroy(&qrs->rbuf, cleanse); OPENSSL_free(qrs); } int ossl_quic_rstream_queue_data(QUIC_RSTREAM *qrs, OSSL_QRX_PKT *pkt, uint64_t offset, const unsigned char *data, uint64_t data_len, int fin) { UINT_RANGE range; if ((data == NULL && data_len != 0) || (data_len == 0 && fin == 0)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } range.start = offset; range.end = offset + data_len; return ossl_sframe_list_insert(&qrs->fl, &range, pkt, data, fin); } static int read_internal(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, size_t *readbytes, int *fin, int drop) { void *iter = NULL; UINT_RANGE range; const unsigned char *data; uint64_t offset = 0; size_t readbytes_ = 0; int fin_ = 0, ret = 1; while (ossl_sframe_list_peek(&qrs->fl, &iter, &range, &data, &fin_)) { size_t l = (size_t)(range.end - range.start); if (l > size) { l = size; fin_ = 0; } offset = range.start + l; if (l == 0) break; if (data == NULL) { size_t max_len; data = ring_buf_get_ptr(&qrs->rbuf, range.start, &max_len); if (!ossl_assert(data != NULL)) return 0; if (max_len < l) { memcpy(buf, data, max_len); size -= max_len; buf += max_len; readbytes_ += max_len; l -= max_len; data = ring_buf_get_ptr(&qrs->rbuf, range.start + max_len, &max_len); if (!ossl_assert(data != NULL) || !ossl_assert(max_len > l)) return 0; } } memcpy(buf, data, l); size -= l; buf += l; readbytes_ += l; if (size == 0) break; } if (drop && offset != 0) { ret = ossl_sframe_list_drop_frames(&qrs->fl, offset); ring_buf_cpop_range(&qrs->rbuf, 0, offset - 1, qrs->fl.cleanse); } if (ret) { *readbytes = readbytes_; *fin = fin_; } return ret; } static OSSL_TIME get_rtt(QUIC_RSTREAM *qrs) { OSSL_TIME rtt; if (qrs->statm != NULL) { OSSL_RTT_INFO rtt_info; ossl_statm_get_rtt_info(qrs->statm, &rtt_info); rtt = rtt_info.smoothed_rtt; } else { rtt = ossl_time_zero(); } return rtt; } int ossl_quic_rstream_read(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, size_t *readbytes, int *fin) { OSSL_TIME rtt = get_rtt(qrs); if (!read_internal(qrs, buf, size, readbytes, fin, 1)) return 0; if (qrs->rxfc != NULL && !ossl_quic_rxfc_on_retire(qrs->rxfc, *readbytes, rtt)) return 0; return 1; } int ossl_quic_rstream_peek(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, size_t *readbytes, int *fin) { return read_internal(qrs, buf, size, readbytes, fin, 0); } int ossl_quic_rstream_available(QUIC_RSTREAM *qrs, size_t *avail, int *fin) { void *iter = NULL; UINT_RANGE range; const unsigned char *data; uint64_t avail_ = 0; while (ossl_sframe_list_peek(&qrs->fl, &iter, &range, &data, fin)) avail_ += range.end - range.start; #if SIZE_MAX < UINT64_MAX *avail = avail_ > SIZE_MAX ? SIZE_MAX : (size_t)avail_; #else *avail = (size_t)avail_; #endif return 1; } int ossl_quic_rstream_get_record(QUIC_RSTREAM *qrs, const unsigned char **record, size_t *rec_len, int *fin) { const unsigned char *record_ = NULL; size_t rec_len_, max_len; if (!ossl_sframe_list_lock_head(&qrs->fl, &qrs->head_range, &record_, fin)) { *record = NULL; *rec_len = 0; return 1; } if (qrs->head_range.end == qrs->head_range.start) { if (!ossl_assert(*fin)) return 0; if (!ossl_sframe_list_drop_frames(&qrs->fl, qrs->head_range.end)) return 0; } rec_len_ = (size_t)(qrs->head_range.end - qrs->head_range.start); if (record_ == NULL && rec_len_ != 0) { record_ = ring_buf_get_ptr(&qrs->rbuf, qrs->head_range.start, &max_len); if (!ossl_assert(record_ != NULL)) return 0; if (max_len < rec_len_) { rec_len_ = max_len; qrs->head_range.end = qrs->head_range.start + max_len; } } *rec_len = rec_len_; *record = record_; return 1; } int ossl_quic_rstream_release_record(QUIC_RSTREAM *qrs, size_t read_len) { uint64_t offset; if (!ossl_sframe_list_is_head_locked(&qrs->fl)) return 0; if (read_len > qrs->head_range.end - qrs->head_range.start) { if (read_len != SIZE_MAX) return 0; offset = qrs->head_range.end; } else { offset = qrs->head_range.start + read_len; } if (!ossl_sframe_list_drop_frames(&qrs->fl, offset)) return 0; if (offset > 0) ring_buf_cpop_range(&qrs->rbuf, 0, offset - 1, qrs->fl.cleanse); if (qrs->rxfc != NULL) { OSSL_TIME rtt = get_rtt(qrs); if (!ossl_quic_rxfc_on_retire(qrs->rxfc, offset, rtt)) return 0; } return 1; } static int write_at_ring_buf_cb(uint64_t logical_offset, const unsigned char *buf, size_t buf_len, void *cb_arg) { struct ring_buf *rbuf = cb_arg; return ring_buf_write_at(rbuf, logical_offset, buf, buf_len); } int ossl_quic_rstream_move_to_rbuf(QUIC_RSTREAM *qrs) { if (ring_buf_avail(&qrs->rbuf) == 0) return 0; return ossl_sframe_list_move_data(&qrs->fl, write_at_ring_buf_cb, &qrs->rbuf); } int ossl_quic_rstream_resize_rbuf(QUIC_RSTREAM *qrs, size_t rbuf_size) { if (ossl_sframe_list_is_head_locked(&qrs->fl)) return 0; if (!ring_buf_resize(&qrs->rbuf, rbuf_size, qrs->fl.cleanse)) return 0; return 1; } void ossl_quic_rstream_set_cleanse(QUIC_RSTREAM *qrs, int cleanse) { qrs->fl.cleanse = cleanse; }
quic
openssl/ssl/quic/quic_rstream.c
openssl
#include "internal/quic_engine.h" #include "internal/quic_port.h" #include "quic_engine_local.h" #include "quic_port_local.h" #include "../ssl_local.h" static int qeng_init(QUIC_ENGINE *qeng); static void qeng_cleanup(QUIC_ENGINE *qeng); static void qeng_tick(QUIC_TICK_RESULT *res, void *arg, uint32_t flags); DEFINE_LIST_OF_IMPL(port, QUIC_PORT); QUIC_ENGINE *ossl_quic_engine_new(const QUIC_ENGINE_ARGS *args) { QUIC_ENGINE *qeng; if ((qeng = OPENSSL_zalloc(sizeof(QUIC_ENGINE))) == NULL) return NULL; qeng->libctx = args->libctx; qeng->propq = args->propq; qeng->mutex = args->mutex; qeng->now_cb = args->now_cb; qeng->now_cb_arg = args->now_cb_arg; if (!qeng_init(qeng)) { OPENSSL_free(qeng); return NULL; } return qeng; } void ossl_quic_engine_free(QUIC_ENGINE *qeng) { if (qeng == NULL) return; qeng_cleanup(qeng); OPENSSL_free(qeng); } static int qeng_init(QUIC_ENGINE *qeng) { ossl_quic_reactor_init(&qeng->rtor, qeng_tick, qeng, ossl_time_zero()); return 1; } static void qeng_cleanup(QUIC_ENGINE *qeng) { assert(ossl_list_port_num(&qeng->port_list) == 0); } QUIC_REACTOR *ossl_quic_engine_get0_reactor(QUIC_ENGINE *qeng) { return &qeng->rtor; } CRYPTO_MUTEX *ossl_quic_engine_get0_mutex(QUIC_ENGINE *qeng) { return qeng->mutex; } OSSL_TIME ossl_quic_engine_get_time(QUIC_ENGINE *qeng) { if (qeng->now_cb == NULL) return ossl_time_now(); return qeng->now_cb(qeng->now_cb_arg); } void ossl_quic_engine_set_inhibit_tick(QUIC_ENGINE *qeng, int inhibit) { qeng->inhibit_tick = (inhibit != 0); } QUIC_PORT *ossl_quic_engine_create_port(QUIC_ENGINE *qeng, const QUIC_PORT_ARGS *args) { QUIC_PORT_ARGS largs = *args; if (ossl_list_port_num(&qeng->port_list) > 0) return NULL; if (largs.engine != NULL) return NULL; largs.engine = qeng; return ossl_quic_port_new(&largs); } static void qeng_tick(QUIC_TICK_RESULT *res, void *arg, uint32_t flags) { QUIC_ENGINE *qeng = arg; QUIC_PORT *port; res->net_read_desired = 0; res->net_write_desired = 0; res->tick_deadline = ossl_time_infinite(); if (qeng->inhibit_tick) return; LIST_FOREACH(port, port, &qeng->port_list) { QUIC_TICK_RESULT subr = {0}; ossl_quic_port_subtick(port, &subr, flags); ossl_quic_tick_result_merge_into(res, &subr); } }
quic
openssl/ssl/quic/quic_engine.c
openssl
#include <openssl/bio.h> #include "../ssl_local.h" #include "internal/quic_wire_pkt.h" static const char *packet_type(int type) { switch (type) { case QUIC_PKT_TYPE_INITIAL: return "Initial"; case QUIC_PKT_TYPE_0RTT: return "0RTT"; case QUIC_PKT_TYPE_HANDSHAKE: return "Handshake"; case QUIC_PKT_TYPE_RETRY: return "Retry"; case QUIC_PKT_TYPE_1RTT: return "1RTT"; case QUIC_PKT_TYPE_VERSION_NEG: return "VersionNeg"; default: return "Unknown"; } } static void put_str(BIO *bio, char *str, size_t slen) { size_t i; for (i = 0; i < slen; i++) BIO_printf(bio, "%c", str[i]); } static void put_data(BIO *bio, const uint8_t *data, size_t datalen) { size_t i; for (i = 0; i < datalen; i++) BIO_printf(bio, "%02x", data[i]); } static void put_conn_id(BIO *bio, QUIC_CONN_ID *id) { if (id->id_len == 0) { BIO_puts(bio, "<zero length id>"); return; } BIO_puts(bio, "0x"); put_data(bio, id->id, id->id_len); } static void put_token(BIO *bio, const uint8_t *token, size_t token_len) { if (token_len == 0) BIO_puts(bio, "<zero length token>"); else put_data(bio, token, token_len); } static int frame_ack(BIO *bio, PACKET *pkt) { OSSL_QUIC_FRAME_ACK ack; OSSL_QUIC_ACK_RANGE *ack_ranges = NULL; uint64_t total_ranges = 0; uint64_t i; if (!ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &total_ranges) || total_ranges > SIZE_MAX / sizeof(ack_ranges[0]) || (ack_ranges = OPENSSL_zalloc(sizeof(ack_ranges[0]) * (size_t)total_ranges)) == NULL) return 0; ack.ack_ranges = ack_ranges; ack.num_ack_ranges = (size_t)total_ranges; if (!ossl_quic_wire_decode_frame_ack(pkt, 0, &ack, NULL)) return 0; BIO_printf(bio, " Largest acked: %llu\n", (unsigned long long)ack.ack_ranges[0].end); BIO_printf(bio, " Ack delay (raw) %llu\n", (unsigned long long)ossl_time2ticks(ack.delay_time)); BIO_printf(bio, " Ack range count: %llu\n", (unsigned long long)total_ranges - 1); BIO_printf(bio, " First ack range: %llu\n", (unsigned long long)(ack.ack_ranges[0].end - ack.ack_ranges[0].start)); for (i = 1; i < total_ranges; i++) { BIO_printf(bio, " Gap: %llu\n", (unsigned long long)(ack.ack_ranges[i - 1].start - ack.ack_ranges[i].end - 2)); BIO_printf(bio, " Ack range len: %llu\n", (unsigned long long)(ack.ack_ranges[i].end - ack.ack_ranges[i].start)); } OPENSSL_free(ack_ranges); return 1; } static int frame_reset_stream(BIO *bio, PACKET *pkt) { OSSL_QUIC_FRAME_RESET_STREAM frame_data; if (!ossl_quic_wire_decode_frame_reset_stream(pkt, &frame_data)) return 0; BIO_printf(bio, " Stream id: %llu\n", (unsigned long long)frame_data.stream_id); BIO_printf(bio, " App Protocol Error Code: %llu\n", (unsigned long long)frame_data.app_error_code); BIO_printf(bio, " Final size: %llu\n", (unsigned long long)frame_data.final_size); return 1; } static int frame_stop_sending(BIO *bio, PACKET *pkt) { OSSL_QUIC_FRAME_STOP_SENDING frame_data; if (!ossl_quic_wire_decode_frame_stop_sending(pkt, &frame_data)) return 0; BIO_printf(bio, " Stream id: %llu\n", (unsigned long long)frame_data.stream_id); BIO_printf(bio, " App Protocol Error Code: %llu\n", (unsigned long long)frame_data.app_error_code); return 1; } static int frame_crypto(BIO *bio, PACKET *pkt) { OSSL_QUIC_FRAME_CRYPTO frame_data; if (!ossl_quic_wire_decode_frame_crypto(pkt, 1, &frame_data)) return 0; BIO_printf(bio, " Offset: %llu\n", (unsigned long long)frame_data.offset); BIO_printf(bio, " Len: %llu\n", (unsigned long long)frame_data.len); return 1; } static int frame_new_token(BIO *bio, PACKET *pkt) { const uint8_t *token; size_t token_len; if (!ossl_quic_wire_decode_frame_new_token(pkt, &token, &token_len)) return 0; BIO_puts(bio, " Token: "); put_token(bio, token, token_len); BIO_puts(bio, "\n"); return 1; } static int frame_stream(BIO *bio, PACKET *pkt, uint64_t frame_type) { OSSL_QUIC_FRAME_STREAM frame_data; BIO_puts(bio, "Stream"); switch(frame_type) { case OSSL_QUIC_FRAME_TYPE_STREAM: BIO_puts(bio, "\n"); break; case OSSL_QUIC_FRAME_TYPE_STREAM_FIN: BIO_puts(bio, " (Fin)\n"); break; case OSSL_QUIC_FRAME_TYPE_STREAM_LEN: BIO_puts(bio, " (Len)\n"); break; case OSSL_QUIC_FRAME_TYPE_STREAM_LEN_FIN: BIO_puts(bio, " (Len, Fin)\n"); break; case OSSL_QUIC_FRAME_TYPE_STREAM_OFF: BIO_puts(bio, " (Off)\n"); break; case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_FIN: BIO_puts(bio, " (Off, Fin)\n"); break; case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN: BIO_puts(bio, " (Off, Len)\n"); break; case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN_FIN: BIO_puts(bio, " (Off, Len, Fin)\n"); break; default: return 0; } if (!ossl_quic_wire_decode_frame_stream(pkt, 1, &frame_data)) return 0; BIO_printf(bio, " Stream id: %llu\n", (unsigned long long)frame_data.stream_id); BIO_printf(bio, " Offset: %llu\n", (unsigned long long)frame_data.offset); if (frame_data.has_explicit_len) BIO_printf(bio, " Len: %llu\n", (unsigned long long)frame_data.len); else BIO_puts(bio, " Len: <implicit length>\n"); return 1; } static int frame_max_data(BIO *bio, PACKET *pkt) { uint64_t max_data = 0; if (!ossl_quic_wire_decode_frame_max_data(pkt, &max_data)) return 0; BIO_printf(bio, " Max Data: %llu\n", (unsigned long long)max_data); return 1; } static int frame_max_stream_data(BIO *bio, PACKET *pkt) { uint64_t stream_id = 0; uint64_t max_stream_data = 0; if (!ossl_quic_wire_decode_frame_max_stream_data(pkt, &stream_id, &max_stream_data)) return 0; BIO_printf(bio, " Max Stream Data: %llu\n", (unsigned long long)max_stream_data); return 1; } static int frame_max_streams(BIO *bio, PACKET *pkt) { uint64_t max_streams = 0; if (!ossl_quic_wire_decode_frame_max_streams(pkt, &max_streams)) return 0; BIO_printf(bio, " Max Streams: %llu\n", (unsigned long long)max_streams); return 1; } static int frame_data_blocked(BIO *bio, PACKET *pkt) { uint64_t max_data = 0; if (!ossl_quic_wire_decode_frame_data_blocked(pkt, &max_data)) return 0; BIO_printf(bio, " Max Data: %llu\n", (unsigned long long)max_data); return 1; } static int frame_stream_data_blocked(BIO *bio, PACKET *pkt) { uint64_t stream_id = 0; uint64_t max_data = 0; if (!ossl_quic_wire_decode_frame_stream_data_blocked(pkt, &stream_id, &max_data)) return 0; BIO_printf(bio, " Stream id: %llu\n", (unsigned long long)stream_id); BIO_printf(bio, " Max Data: %llu\n", (unsigned long long)max_data); return 1; } static int frame_streams_blocked(BIO *bio, PACKET *pkt) { uint64_t max_data = 0; if (!ossl_quic_wire_decode_frame_streams_blocked(pkt, &max_data)) return 0; BIO_printf(bio, " Max Data: %llu\n", (unsigned long long)max_data); return 1; } static int frame_new_conn_id(BIO *bio, PACKET *pkt) { OSSL_QUIC_FRAME_NEW_CONN_ID frame_data; if (!ossl_quic_wire_decode_frame_new_conn_id(pkt, &frame_data)) return 0; BIO_printf(bio, " Sequence Number: %llu\n", (unsigned long long)frame_data.seq_num); BIO_printf(bio, " Retire prior to: %llu\n", (unsigned long long)frame_data.retire_prior_to); BIO_puts(bio, " Connection id: "); put_conn_id(bio, &frame_data.conn_id); BIO_puts(bio, "\n Stateless Reset Token: "); put_data(bio, frame_data.stateless_reset.token, sizeof(frame_data.stateless_reset.token)); BIO_puts(bio, "\n"); return 1; } static int frame_retire_conn_id(BIO *bio, PACKET *pkt) { uint64_t seq_num; if (!ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num)) return 0; BIO_printf(bio, " Sequence Number: %llu\n", (unsigned long long)seq_num); return 1; } static int frame_path_challenge(BIO *bio, PACKET *pkt) { uint64_t data = 0; if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &data)) return 0; BIO_printf(bio, " Data: %016llx\n", (unsigned long long)data); return 1; } static int frame_path_response(BIO *bio, PACKET *pkt) { uint64_t data = 0; if (!ossl_quic_wire_decode_frame_path_response(pkt, &data)) return 0; BIO_printf(bio, " Data: %016llx\n", (unsigned long long)data); return 1; } static int frame_conn_closed(BIO *bio, PACKET *pkt) { OSSL_QUIC_FRAME_CONN_CLOSE frame_data; if (!ossl_quic_wire_decode_frame_conn_close(pkt, &frame_data)) return 0; BIO_printf(bio, " Error Code: %llu\n", (unsigned long long)frame_data.error_code); BIO_puts(bio, " Reason: "); put_str(bio, frame_data.reason, frame_data.reason_len); BIO_puts(bio, "\n"); return 1; } static int trace_frame_data(BIO *bio, PACKET *pkt) { uint64_t frame_type; if (!ossl_quic_wire_peek_frame_header(pkt, &frame_type, NULL)) return 0; switch (frame_type) { case OSSL_QUIC_FRAME_TYPE_PING: BIO_puts(bio, "Ping\n"); if (!ossl_quic_wire_decode_frame_ping(pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_PADDING: BIO_puts(bio, "Padding\n"); ossl_quic_wire_decode_padding(pkt); break; case OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN: case OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN: BIO_puts(bio, "Ack "); if (frame_type == OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN) BIO_puts(bio, " (with ECN)\n"); else BIO_puts(bio, " (without ECN)\n"); if (!frame_ack(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_RESET_STREAM: BIO_puts(bio, "Reset stream\n"); if (!frame_reset_stream(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STOP_SENDING: BIO_puts(bio, "Stop sending\n"); if (!frame_stop_sending(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_CRYPTO: BIO_puts(bio, "Crypto\n"); if (!frame_crypto(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_NEW_TOKEN: BIO_puts(bio, "New token\n"); if (!frame_new_token(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STREAM: case OSSL_QUIC_FRAME_TYPE_STREAM_FIN: case OSSL_QUIC_FRAME_TYPE_STREAM_LEN: case OSSL_QUIC_FRAME_TYPE_STREAM_LEN_FIN: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_FIN: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN: case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN_FIN: if (!frame_stream(bio, pkt, frame_type)) return 0; break; case OSSL_QUIC_FRAME_TYPE_MAX_DATA: BIO_puts(bio, "Max data\n"); if (!frame_max_data(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA: BIO_puts(bio, "Max stream data\n"); if (!frame_max_stream_data(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI: case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI: BIO_puts(bio, "Max streams "); if (frame_type == OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI) BIO_puts(bio, " (Bidi)\n"); else BIO_puts(bio, " (Uni)\n"); if (!frame_max_streams(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED: BIO_puts(bio, "Data blocked\n"); if (!frame_data_blocked(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED: BIO_puts(bio, "Stream data blocked\n"); if (!frame_stream_data_blocked(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI: case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI: BIO_puts(bio, "Streams blocked"); if (frame_type == OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI) BIO_puts(bio, " (Bidi)\n"); else BIO_puts(bio, " (Uni)\n"); if (!frame_streams_blocked(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID: BIO_puts(bio, "New conn id\n"); if (!frame_new_conn_id(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID: BIO_puts(bio, "Retire conn id\n"); if (!frame_retire_conn_id(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE: BIO_puts(bio, "Path challenge\n"); if (!frame_path_challenge(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE: BIO_puts(bio, "Path response\n"); if (!frame_path_response(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP: case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT: BIO_puts(bio, "Connection close"); if (frame_type == OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP) BIO_puts(bio, " (app)\n"); else BIO_puts(bio, " (transport)\n"); if (!frame_conn_closed(bio, pkt)) return 0; break; case OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE: BIO_puts(bio, "Handshake done\n"); if (!ossl_quic_wire_decode_frame_handshake_done(pkt)) return 0; break; default: return 0; } if (PACKET_remaining(pkt) != 0) BIO_puts(bio, " <unexpected trailing frame data skipped>\n"); return 1; } int ossl_quic_trace(int write_p, int version, int content_type, const void *buf, size_t msglen, SSL *ssl, void *arg) { BIO *bio = arg; PACKET pkt; switch (content_type) { case SSL3_RT_QUIC_DATAGRAM: BIO_puts(bio, write_p ? "Sent" : "Received"); BIO_printf(bio, " Datagram\n Length: %zu\n", msglen); break; case SSL3_RT_QUIC_PACKET: { QUIC_PKT_HDR hdr; size_t i; if (!PACKET_buf_init(&pkt, buf, msglen)) return 0; if (ossl_quic_wire_decode_pkt_hdr(&pkt, 0, 0, 1, &hdr, NULL) != 1) return 0; BIO_puts(bio, write_p ? "Sent" : "Received"); BIO_puts(bio, " Packet\n"); BIO_printf(bio, " Packet Type: %s\n", packet_type(hdr.type)); if (hdr.type != QUIC_PKT_TYPE_1RTT) BIO_printf(bio, " Version: 0x%08lx\n", (unsigned long)hdr.version); BIO_puts(bio, " Destination Conn Id: "); put_conn_id(bio, &hdr.dst_conn_id); BIO_puts(bio, "\n"); if (hdr.type != QUIC_PKT_TYPE_1RTT) { BIO_puts(bio, " Source Conn Id: "); put_conn_id(bio, &hdr.src_conn_id); BIO_puts(bio, "\n"); } BIO_printf(bio, " Payload length: %zu\n", hdr.len); if (hdr.type == QUIC_PKT_TYPE_INITIAL) { BIO_puts(bio, " Token: "); put_token(bio, hdr.token, hdr.token_len); BIO_puts(bio, "\n"); } if (hdr.type != QUIC_PKT_TYPE_VERSION_NEG && hdr.type != QUIC_PKT_TYPE_RETRY) { BIO_puts(bio, " Packet Number: 0x"); for (i = 0; i < hdr.pn_len; i++) BIO_printf(bio, "%02x", hdr.pn[i]); BIO_puts(bio, "\n"); } break; } case SSL3_RT_QUIC_FRAME_PADDING: case SSL3_RT_QUIC_FRAME_FULL: case SSL3_RT_QUIC_FRAME_HEADER: { BIO_puts(bio, write_p ? "Sent" : "Received"); BIO_puts(bio, " Frame: "); if (!PACKET_buf_init(&pkt, buf, msglen)) return 0; if (!trace_frame_data(bio, &pkt)) { BIO_puts(bio, " <error processing frame data>\n"); return 0; } } break; default: return 0; } return 1; }
quic
openssl/ssl/quic/quic_trace.c
openssl
#include "quic_record_shared.h" #include "internal/quic_record_util.h" #include "internal/common.h" #include "../ssl_local.h" static const unsigned char quic_v1_iv_label[] = { 0x71, 0x75, 0x69, 0x63, 0x20, 0x69, 0x76 }; static const unsigned char quic_v1_key_label[] = { 0x71, 0x75, 0x69, 0x63, 0x20, 0x6b, 0x65, 0x79 }; static const unsigned char quic_v1_hp_label[] = { 0x71, 0x75, 0x69, 0x63, 0x20, 0x68, 0x70 }; static const unsigned char quic_v1_ku_label[] = { 0x71, 0x75, 0x69, 0x63, 0x20, 0x6b, 0x75 }; OSSL_QRL_ENC_LEVEL *ossl_qrl_enc_level_set_get(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level, int require_prov) { OSSL_QRL_ENC_LEVEL *el; if (!ossl_assert(enc_level < QUIC_ENC_LEVEL_NUM)) return NULL; el = &els->el[enc_level]; if (require_prov) switch (el->state) { case QRL_EL_STATE_PROV_NORMAL: case QRL_EL_STATE_PROV_UPDATING: case QRL_EL_STATE_PROV_COOLDOWN: break; default: return NULL; } return el; } int ossl_qrl_enc_level_set_have_el(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); switch (el->state) { case QRL_EL_STATE_UNPROV: return 0; case QRL_EL_STATE_PROV_NORMAL: case QRL_EL_STATE_PROV_UPDATING: case QRL_EL_STATE_PROV_COOLDOWN: return 1; default: case QRL_EL_STATE_DISCARDED: return -1; } } int ossl_qrl_enc_level_set_has_keyslot(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level, unsigned char tgt_state, size_t keyslot) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); if (!ossl_assert(el != NULL && keyslot < 2)) return 0; switch (tgt_state) { case QRL_EL_STATE_PROV_NORMAL: case QRL_EL_STATE_PROV_UPDATING: return enc_level == QUIC_ENC_LEVEL_1RTT || keyslot == 0; case QRL_EL_STATE_PROV_COOLDOWN: assert(enc_level == QUIC_ENC_LEVEL_1RTT); return keyslot == (el->key_epoch & 1); default: return 0; } } static void el_teardown_keyslot(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level, size_t keyslot) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); if (!ossl_qrl_enc_level_set_has_keyslot(els, enc_level, el->state, keyslot)) return; if (el->cctx[keyslot] != NULL) { EVP_CIPHER_CTX_free(el->cctx[keyslot]); el->cctx[keyslot] = NULL; } OPENSSL_cleanse(el->iv[keyslot], sizeof(el->iv[keyslot])); } static int el_setup_keyslot(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level, unsigned char tgt_state, size_t keyslot, const unsigned char *secret, size_t secret_len) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); unsigned char key[EVP_MAX_KEY_LENGTH]; size_t key_len = 0, iv_len = 0; const char *cipher_name = NULL; EVP_CIPHER *cipher = NULL; EVP_CIPHER_CTX *cctx = NULL; if (!ossl_assert(el != NULL && ossl_qrl_enc_level_set_has_keyslot(els, enc_level, tgt_state, keyslot))) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } cipher_name = ossl_qrl_get_suite_cipher_name(el->suite_id); iv_len = ossl_qrl_get_suite_cipher_iv_len(el->suite_id); key_len = ossl_qrl_get_suite_cipher_key_len(el->suite_id); if (cipher_name == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } if (secret_len != ossl_qrl_get_suite_secret_len(el->suite_id) || secret_len > EVP_MAX_KEY_LENGTH) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } assert(el->cctx[keyslot] == NULL); if (!tls13_hkdf_expand_ex(el->libctx, el->propq, el->md, secret, quic_v1_iv_label, sizeof(quic_v1_iv_label), NULL, 0, el->iv[keyslot], iv_len, 1)) goto err; if (!tls13_hkdf_expand_ex(el->libctx, el->propq, el->md, secret, quic_v1_key_label, sizeof(quic_v1_key_label), NULL, 0, key, key_len, 1)) goto err; if ((cipher = EVP_CIPHER_fetch(el->libctx, cipher_name, el->propq)) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); goto err; } if ((cctx = EVP_CIPHER_CTX_new()) == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); goto err; } if (!ossl_assert(iv_len == (size_t)EVP_CIPHER_get_iv_length(cipher)) || !ossl_assert(key_len == (size_t)EVP_CIPHER_get_key_length(cipher))) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); goto err; } if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, el->iv[keyslot], 0)) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); goto err; } el->cctx[keyslot] = cctx; OPENSSL_cleanse(key, sizeof(key)); EVP_CIPHER_free(cipher); return 1; err: EVP_CIPHER_CTX_free(cctx); EVP_CIPHER_free(cipher); OPENSSL_cleanse(el->iv[keyslot], sizeof(el->iv[keyslot])); OPENSSL_cleanse(key, sizeof(key)); return 0; } int ossl_qrl_enc_level_set_provide_secret(OSSL_QRL_ENC_LEVEL_SET *els, OSSL_LIB_CTX *libctx, const char *propq, uint32_t enc_level, uint32_t suite_id, EVP_MD *md, const unsigned char *secret, size_t secret_len, unsigned char init_key_phase_bit, int is_tx) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); unsigned char ku_key[EVP_MAX_KEY_LENGTH], hpr_key[EVP_MAX_KEY_LENGTH]; int have_ks0 = 0, have_ks1 = 0, own_md = 0; const char *md_name = ossl_qrl_get_suite_md_name(suite_id); size_t hpr_key_len, init_keyslot; if (el == NULL || md_name == NULL || init_key_phase_bit > 1 || is_tx < 0 || is_tx > 1 || (init_key_phase_bit > 0 && enc_level != QUIC_ENC_LEVEL_1RTT)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } if (enc_level == QUIC_ENC_LEVEL_INITIAL && el->state == QRL_EL_STATE_PROV_NORMAL) { ossl_qrl_enc_level_set_discard(els, enc_level); el->state = QRL_EL_STATE_UNPROV; } if (el->state != QRL_EL_STATE_UNPROV) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } init_keyslot = is_tx ? 0 : init_key_phase_bit; hpr_key_len = ossl_qrl_get_suite_hdr_prot_key_len(suite_id); if (hpr_key_len == 0) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } if (md == NULL) { md = EVP_MD_fetch(libctx, md_name, propq); if (md == NULL) { ERR_raise(ERR_LIB_SSL, ERR_R_EVP_LIB); return 0; } own_md = 1; } el->libctx = libctx; el->propq = propq; el->md = md; el->suite_id = suite_id; el->tag_len = ossl_qrl_get_suite_cipher_tag_len(suite_id); el->op_count = 0; el->key_epoch = (uint64_t)init_key_phase_bit; el->is_tx = (unsigned char)is_tx; if (!tls13_hkdf_expand_ex(libctx, propq, md, secret, quic_v1_hp_label, sizeof(quic_v1_hp_label), NULL, 0, hpr_key, hpr_key_len, 1)) goto err; if (!el_setup_keyslot(els, enc_level, QRL_EL_STATE_PROV_NORMAL, init_keyslot, secret, secret_len)) goto err; have_ks0 = 1; if (enc_level == QUIC_ENC_LEVEL_1RTT) { if (!tls13_hkdf_expand_ex(libctx, propq, md, secret, quic_v1_ku_label, sizeof(quic_v1_ku_label), NULL, 0, is_tx ? el->ku : ku_key, secret_len, 1)) goto err; if (!is_tx) { if (!el_setup_keyslot(els, enc_level, QRL_EL_STATE_PROV_NORMAL, !init_keyslot, ku_key, secret_len)) goto err; have_ks1 = 1; if (!tls13_hkdf_expand_ex(libctx, propq, md, ku_key, quic_v1_ku_label, sizeof(quic_v1_ku_label), NULL, 0, el->ku, secret_len, 1)) goto err; } } if (!ossl_quic_hdr_protector_init(&el->hpr, libctx, propq, ossl_qrl_get_suite_hdr_prot_cipher_id(suite_id), hpr_key, hpr_key_len)) goto err; OPENSSL_cleanse(hpr_key, sizeof(hpr_key)); OPENSSL_cleanse(ku_key, sizeof(ku_key)); el->state = QRL_EL_STATE_PROV_NORMAL; return 1; err: el->suite_id = 0; el->md = NULL; OPENSSL_cleanse(hpr_key, sizeof(hpr_key)); OPENSSL_cleanse(ku_key, sizeof(ku_key)); OPENSSL_cleanse(el->ku, sizeof(el->ku)); if (have_ks0) el_teardown_keyslot(els, enc_level, init_keyslot); if (have_ks1) el_teardown_keyslot(els, enc_level, !init_keyslot); if (own_md) EVP_MD_free(md); return 0; } int ossl_qrl_enc_level_set_key_update(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); size_t secret_len; unsigned char new_ku[EVP_MAX_KEY_LENGTH]; if (el == NULL || !ossl_assert(enc_level == QUIC_ENC_LEVEL_1RTT)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } if (el->state != QRL_EL_STATE_PROV_NORMAL) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } if (!el->is_tx) { ++el->key_epoch; el->state = QRL_EL_STATE_PROV_UPDATING; return 1; } secret_len = ossl_qrl_get_suite_secret_len(el->suite_id); if (!tls13_hkdf_expand_ex(el->libctx, el->propq, el->md, el->ku, quic_v1_ku_label, sizeof(quic_v1_ku_label), NULL, 0, new_ku, secret_len, 1)) return 0; el_teardown_keyslot(els, enc_level, 0); if (!el_setup_keyslot(els, enc_level, QRL_EL_STATE_PROV_NORMAL, 0, el->ku, secret_len)) return 0; ++el->key_epoch; el->op_count = 0; memcpy(el->ku, new_ku, secret_len); return 1; } int ossl_qrl_enc_level_set_key_update_done(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); if (el == NULL || !ossl_assert(enc_level == QUIC_ENC_LEVEL_1RTT)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } el_teardown_keyslot(els, enc_level, ~el->key_epoch & 1); el->state = QRL_EL_STATE_PROV_COOLDOWN; return 1; } int ossl_qrl_enc_level_set_key_cooldown_done(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); size_t secret_len; unsigned char new_ku[EVP_MAX_KEY_LENGTH]; if (el == NULL || !ossl_assert(enc_level == QUIC_ENC_LEVEL_1RTT)) { ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT); return 0; } if (el->state == QRL_EL_STATE_PROV_UPDATING && !ossl_qrl_enc_level_set_key_update_done(els, enc_level)) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } if (el->state != QRL_EL_STATE_PROV_COOLDOWN) { ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR); return 0; } secret_len = ossl_qrl_get_suite_secret_len(el->suite_id); if (!el_setup_keyslot(els, enc_level, QRL_EL_STATE_PROV_NORMAL, ~el->key_epoch & 1, el->ku, secret_len)) return 0; if (!tls13_hkdf_expand_ex(el->libctx, el->propq, el->md, el->ku, quic_v1_ku_label, sizeof(quic_v1_ku_label), NULL, 0, new_ku, secret_len, 1)) { el_teardown_keyslot(els, enc_level, ~el->key_epoch & 1); return 0; } memcpy(el->ku, new_ku, secret_len); el->state = QRL_EL_STATE_PROV_NORMAL; return 1; } void ossl_qrl_enc_level_set_discard(OSSL_QRL_ENC_LEVEL_SET *els, uint32_t enc_level) { OSSL_QRL_ENC_LEVEL *el = ossl_qrl_enc_level_set_get(els, enc_level, 0); if (el == NULL || el->state == QRL_EL_STATE_DISCARDED) return; if (ossl_qrl_enc_level_set_have_el(els, enc_level) == 1) { ossl_quic_hdr_protector_cleanup(&el->hpr); el_teardown_keyslot(els, enc_level, 0); el_teardown_keyslot(els, enc_level, 1); } EVP_MD_free(el->md); el->md = NULL; el->state = QRL_EL_STATE_DISCARDED; }
quic
openssl/ssl/quic/quic_record_shared.c
openssl
#include "internal/quic_txpim.h" #include <stdlib.h> typedef struct quic_txpim_pkt_ex_st QUIC_TXPIM_PKT_EX; struct quic_txpim_pkt_ex_st { QUIC_TXPIM_PKT public; QUIC_TXPIM_PKT_EX *prev, *next; QUIC_TXPIM_CHUNK *chunks; size_t num_chunks, alloc_chunks; unsigned int chunks_need_sort : 1; }; typedef struct quic_txpim_pkt_ex_list { QUIC_TXPIM_PKT_EX *head, *tail; } QUIC_TXPIM_PKT_EX_LIST; struct quic_txpim_st { QUIC_TXPIM_PKT_EX_LIST free_list; size_t in_use; }; #define MAX_ALLOC_CHUNKS 512 QUIC_TXPIM *ossl_quic_txpim_new(void) { QUIC_TXPIM *txpim = OPENSSL_zalloc(sizeof(*txpim)); if (txpim == NULL) return NULL; return txpim; } static void free_list(QUIC_TXPIM_PKT_EX_LIST *l) { QUIC_TXPIM_PKT_EX *n, *nnext; for (n = l->head; n != NULL; n = nnext) { nnext = n->next; OPENSSL_free(n->chunks); OPENSSL_free(n); } l->head = l->tail = NULL; } void ossl_quic_txpim_free(QUIC_TXPIM *txpim) { if (txpim == NULL) return; assert(txpim->in_use == 0); free_list(&txpim->free_list); OPENSSL_free(txpim); } static void list_remove(QUIC_TXPIM_PKT_EX_LIST *l, QUIC_TXPIM_PKT_EX *n) { if (l->head == n) l->head = n->next; if (l->tail == n) l->tail = n->prev; if (n->prev != NULL) n->prev->next = n->next; if (n->next != NULL) n->next->prev = n->prev; n->prev = n->next = NULL; } static void list_insert_tail(QUIC_TXPIM_PKT_EX_LIST *l, QUIC_TXPIM_PKT_EX *n) { n->prev = l->tail; n->next = NULL; l->tail = n; if (n->prev != NULL) n->prev->next = n; if (l->head == NULL) l->head = n; } static QUIC_TXPIM_PKT_EX *txpim_get_free(QUIC_TXPIM *txpim) { QUIC_TXPIM_PKT_EX *ex = txpim->free_list.head; if (ex != NULL) return ex; ex = OPENSSL_zalloc(sizeof(*ex)); if (ex == NULL) return NULL; list_insert_tail(&txpim->free_list, ex); return ex; } static void txpim_clear(QUIC_TXPIM_PKT_EX *ex) { memset(&ex->public.ackm_pkt, 0, sizeof(ex->public.ackm_pkt)); ossl_quic_txpim_pkt_clear_chunks(&ex->public); ex->public.retx_head = NULL; ex->public.fifd = NULL; ex->public.had_handshake_done_frame = 0; ex->public.had_max_data_frame = 0; ex->public.had_max_streams_bidi_frame = 0; ex->public.had_max_streams_uni_frame = 0; ex->public.had_ack_frame = 0; ex->public.had_conn_close = 0; } QUIC_TXPIM_PKT *ossl_quic_txpim_pkt_alloc(QUIC_TXPIM *txpim) { QUIC_TXPIM_PKT_EX *ex = txpim_get_free(txpim); if (ex == NULL) return NULL; txpim_clear(ex); list_remove(&txpim->free_list, ex); ++txpim->in_use; return &ex->public; } void ossl_quic_txpim_pkt_release(QUIC_TXPIM *txpim, QUIC_TXPIM_PKT *fpkt) { QUIC_TXPIM_PKT_EX *ex = (QUIC_TXPIM_PKT_EX *)fpkt; assert(txpim->in_use > 0); --txpim->in_use; list_insert_tail(&txpim->free_list, ex); } void ossl_quic_txpim_pkt_add_cfq_item(QUIC_TXPIM_PKT *fpkt, QUIC_CFQ_ITEM *item) { item->pkt_next = fpkt->retx_head; item->pkt_prev = NULL; fpkt->retx_head = item; } void ossl_quic_txpim_pkt_clear_chunks(QUIC_TXPIM_PKT *fpkt) { QUIC_TXPIM_PKT_EX *ex = (QUIC_TXPIM_PKT_EX *)fpkt; ex->num_chunks = 0; } int ossl_quic_txpim_pkt_append_chunk(QUIC_TXPIM_PKT *fpkt, const QUIC_TXPIM_CHUNK *chunk) { QUIC_TXPIM_PKT_EX *ex = (QUIC_TXPIM_PKT_EX *)fpkt; QUIC_TXPIM_CHUNK *new_chunk; size_t new_alloc_chunks = ex->alloc_chunks; if (ex->num_chunks == ex->alloc_chunks) { new_alloc_chunks = (ex->alloc_chunks == 0) ? 4 : ex->alloc_chunks * 8 / 5; if (new_alloc_chunks > MAX_ALLOC_CHUNKS) new_alloc_chunks = MAX_ALLOC_CHUNKS; if (ex->num_chunks == new_alloc_chunks) return 0; new_chunk = OPENSSL_realloc(ex->chunks, new_alloc_chunks * sizeof(QUIC_TXPIM_CHUNK)); if (new_chunk == NULL) return 0; ex->chunks = new_chunk; ex->alloc_chunks = new_alloc_chunks; } ex->chunks[ex->num_chunks++] = *chunk; ex->chunks_need_sort = 1; return 1; } static int compare(const void *a, const void *b) { const QUIC_TXPIM_CHUNK *ac = a, *bc = b; if (ac->stream_id < bc->stream_id) return -1; else if (ac->stream_id > bc->stream_id) return 1; if (ac->start < bc->start) return -1; else if (ac->start > bc->start) return 1; return 0; } const QUIC_TXPIM_CHUNK *ossl_quic_txpim_pkt_get_chunks(const QUIC_TXPIM_PKT *fpkt) { QUIC_TXPIM_PKT_EX *ex = (QUIC_TXPIM_PKT_EX *)fpkt; if (ex->chunks_need_sort) { qsort(ex->chunks, ex->num_chunks, sizeof(QUIC_TXPIM_CHUNK), compare); ex->chunks_need_sort = 0; } return ex->chunks; } size_t ossl_quic_txpim_pkt_get_num_chunks(const QUIC_TXPIM_PKT *fpkt) { QUIC_TXPIM_PKT_EX *ex = (QUIC_TXPIM_PKT_EX *)fpkt; return ex->num_chunks; } size_t ossl_quic_txpim_get_in_use(const QUIC_TXPIM *txpim) { return txpim->in_use; }
quic
openssl/ssl/quic/quic_txpim.c
openssl