2016-11-25 12:34:29 +00:00
|
|
|
/*
|
2018-02-13 12:51:29 +00:00
|
|
|
* Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2016-11-25 12:34:29 +00:00
|
|
|
*
|
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
2016-11-25 16:28:02 +00:00
|
|
|
#include <openssl/ocsp.h>
|
2016-11-25 12:34:29 +00:00
|
|
|
#include "../ssl_locl.h"
|
2017-08-02 13:46:31 +00:00
|
|
|
#include "internal/cryptlib.h"
|
2016-11-25 12:34:29 +00:00
|
|
|
#include "statem_locl.h"
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_renegotiate(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
/* Add RI if renegotiating */
|
|
|
|
if (!s->renegotiate)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_renegotiate)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_sub_memcpy_u8(pkt, s->s3->previous_client_finished,
|
|
|
|
s->s3->previous_client_finished_len)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_RENEGOTIATE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_server_name(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->ext.hostname == NULL)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
/* Add TLS extension servername to the Client Hello message */
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_name)
|
|
|
|
/* Sub-packet for server_name extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
/* Sub-packet for servername list (always 1 hostname)*/
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_put_bytes_u8(pkt, TLSEXT_NAMETYPE_host_name)
|
2016-12-08 19:18:40 +00:00
|
|
|
|| !WPACKET_sub_memcpy_u16(pkt, s->ext.hostname,
|
|
|
|
strlen(s->ext.hostname))
|
2016-11-25 16:28:02 +00:00
|
|
|
|| !WPACKET_close(pkt)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_SERVER_NAME,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-11-05 16:46:48 +00:00
|
|
|
/* Push a Max Fragment Len extension into ClientHello */
|
|
|
|
EXT_RETURN tls_construct_ctos_maxfragmentlen(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2017-11-05 16:46:48 +00:00
|
|
|
{
|
|
|
|
if (s->ext.max_fragment_len_mode == TLSEXT_max_fragment_length_DISABLED)
|
|
|
|
return EXT_RETURN_NOT_SENT;
|
|
|
|
|
|
|
|
/* Add Max Fragment Length extension if client enabled it. */
|
|
|
|
/*-
|
|
|
|
* 4 bytes for this extension type and extension length
|
|
|
|
* 1 byte for the Max Fragment Length code value.
|
|
|
|
*/
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_max_fragment_length)
|
|
|
|
/* Sub-packet for Max Fragment Length extension (1 byte) */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_put_bytes_u8(pkt, s->ext.max_fragment_len_mode)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_MAXFRAGMENTLEN, ERR_R_INTERNAL_ERROR);
|
2017-11-05 16:46:48 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return EXT_RETURN_SENT;
|
|
|
|
}
|
|
|
|
|
2016-11-25 16:28:02 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_srp(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
/* Add SRP username if there is one */
|
|
|
|
if (s->srp_ctx.login == NULL)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_srp)
|
|
|
|
/* Sub-packet for SRP extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_start_sub_packet_u8(pkt)
|
|
|
|
/* login must not be zero...internal error if so */
|
|
|
|
|| !WPACKET_set_flags(pkt, WPACKET_FLAGS_NON_ZERO_LENGTH)
|
|
|
|
|| !WPACKET_memcpy(pkt, s->srp_ctx.login,
|
|
|
|
strlen(s->srp_ctx.login))
|
|
|
|
|| !WPACKET_close(pkt)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_SRP,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_EC
|
|
|
|
static int use_ecc(SSL *s)
|
|
|
|
{
|
2018-10-24 09:11:00 +00:00
|
|
|
int i, end, ret = 0;
|
2016-11-25 16:28:02 +00:00
|
|
|
unsigned long alg_k, alg_a;
|
|
|
|
STACK_OF(SSL_CIPHER) *cipher_stack = NULL;
|
|
|
|
|
|
|
|
/* See if we support any ECC ciphersuites */
|
|
|
|
if (s->version == SSL3_VERSION)
|
|
|
|
return 0;
|
|
|
|
|
2018-10-24 09:11:00 +00:00
|
|
|
cipher_stack = SSL_get1_supported_ciphers(s);
|
2016-12-07 17:04:46 +00:00
|
|
|
end = sk_SSL_CIPHER_num(cipher_stack);
|
|
|
|
for (i = 0; i < end; i++) {
|
2016-11-25 16:28:02 +00:00
|
|
|
const SSL_CIPHER *c = sk_SSL_CIPHER_value(cipher_stack, i);
|
|
|
|
|
|
|
|
alg_k = c->algorithm_mkey;
|
|
|
|
alg_a = c->algorithm_auth;
|
|
|
|
if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK))
|
2016-12-07 17:04:46 +00:00
|
|
|
|| (alg_a & SSL_aECDSA)
|
2018-10-24 09:11:00 +00:00
|
|
|
|| c->min_tls >= TLS1_3_VERSION) {
|
|
|
|
ret = 1;
|
|
|
|
break;
|
|
|
|
}
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2018-10-24 09:11:00 +00:00
|
|
|
sk_SSL_CIPHER_free(cipher_stack);
|
|
|
|
return ret;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_ec_pt_formats(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
const unsigned char *pformats;
|
|
|
|
size_t num_formats;
|
|
|
|
|
|
|
|
if (!use_ecc(s))
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
/* Add TLS extension ECPointFormats to the ClientHello message */
|
|
|
|
tls1_get_formatlist(s, &pformats, &num_formats);
|
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_ec_point_formats)
|
|
|
|
/* Sub-packet for formats extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_sub_memcpy_u8(pkt, pformats, num_formats)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EC_PT_FORMATS, ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_supported_groups(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
2017-09-26 14:41:34 +00:00
|
|
|
const uint16_t *pgroups = NULL;
|
|
|
|
size_t num_groups = 0, i;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!use_ecc(s))
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Add TLS extension supported_groups to the ClientHello message
|
|
|
|
*/
|
|
|
|
/* TODO(TLS1.3): Add support for DHE groups */
|
2017-09-26 14:41:34 +00:00
|
|
|
tls1_get_supported_groups(s, &pgroups, &num_groups);
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_groups)
|
|
|
|
/* Sub-packet for supported_groups extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_GROUPS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
/* Copy curve ID if supported */
|
2017-09-26 14:41:34 +00:00
|
|
|
for (i = 0; i < num_groups; i++) {
|
|
|
|
uint16_t ctmp = pgroups[i];
|
2017-09-22 15:06:52 +00:00
|
|
|
|
|
|
|
if (tls_curve_allowed(s, ctmp, SSL_SECOP_CURVE_SUPPORTED)) {
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, ctmp)) {
|
2017-11-23 11:41:40 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_GROUPS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
|
2017-11-23 11:41:40 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_GROUPS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_session_ticket(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
size_t ticklen;
|
|
|
|
|
|
|
|
if (!tls_use_ticket(s))
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!s->new_session && s->session != NULL
|
2017-01-19 11:23:06 +00:00
|
|
|
&& s->session->ext.tick != NULL
|
|
|
|
&& s->session->ssl_version != TLS1_3_VERSION) {
|
2016-12-08 19:18:40 +00:00
|
|
|
ticklen = s->session->ext.ticklen;
|
|
|
|
} else if (s->session && s->ext.session_ticket != NULL
|
|
|
|
&& s->ext.session_ticket->data != NULL) {
|
|
|
|
ticklen = s->ext.session_ticket->length;
|
|
|
|
s->session->ext.tick = OPENSSL_malloc(ticklen);
|
|
|
|
if (s->session->ext.tick == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SESSION_TICKET,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
2016-12-08 19:18:40 +00:00
|
|
|
memcpy(s->session->ext.tick,
|
|
|
|
s->ext.session_ticket->data, ticklen);
|
|
|
|
s->session->ext.ticklen = ticklen;
|
2016-11-25 16:28:02 +00:00
|
|
|
} else {
|
|
|
|
ticklen = 0;
|
|
|
|
}
|
|
|
|
|
2016-12-08 19:18:40 +00:00
|
|
|
if (ticklen == 0 && s->ext.session_ticket != NULL &&
|
|
|
|
s->ext.session_ticket->data == NULL)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_session_ticket)
|
2016-12-08 19:18:40 +00:00
|
|
|
|| !WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick, ticklen)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SESSION_TICKET, ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_sig_algs(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
size_t salglen;
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *salg;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!SSL_CLIENT_USE_SIGALGS(s))
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
2017-01-25 19:12:48 +00:00
|
|
|
salglen = tls12_get_psigalgs(s, 1, &salg);
|
2016-11-25 16:28:02 +00:00
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_signature_algorithms)
|
|
|
|
/* Sub-packet for sig-algs extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
/* Sub-packet for the actual list */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !tls12_copy_sigalgs(s, pkt, salg, salglen)
|
|
|
|
|| !WPACKET_close(pkt)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_SIG_ALGS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_OCSP
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_status_request(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2016-12-02 09:14:15 +00:00
|
|
|
/* This extension isn't defined for client Certificates */
|
|
|
|
if (x != NULL)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-12-02 09:14:15 +00:00
|
|
|
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_status_request)
|
|
|
|
/* Sub-packet for status request extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_put_bytes_u8(pkt, TLSEXT_STATUSTYPE_ocsp)
|
|
|
|
/* Sub-packet for the ids */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST, ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
2016-12-08 19:18:40 +00:00
|
|
|
for (i = 0; i < sk_OCSP_RESPID_num(s->ext.ocsp.ids); i++) {
|
2016-11-25 16:28:02 +00:00
|
|
|
unsigned char *idbytes;
|
2016-12-08 19:18:40 +00:00
|
|
|
OCSP_RESPID *id = sk_OCSP_RESPID_value(s->ext.ocsp.ids, i);
|
2016-12-07 17:04:46 +00:00
|
|
|
int idlen = i2d_OCSP_RESPID(id, NULL);
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (idlen <= 0
|
|
|
|
/* Sub-packet for an individual id */
|
|
|
|
|| !WPACKET_sub_allocate_bytes_u16(pkt, idlen, &idbytes)
|
|
|
|
|| i2d_OCSP_RESPID(id, &idbytes) != idlen) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!WPACKET_close(pkt)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST, ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->ext.ocsp.exts) {
|
2016-11-25 16:28:02 +00:00
|
|
|
unsigned char *extbytes;
|
2016-12-08 19:18:40 +00:00
|
|
|
int extlen = i2d_X509_EXTENSIONS(s->ext.ocsp.exts, NULL);
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (extlen < 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
if (!WPACKET_allocate_bytes(pkt, extlen, &extbytes)
|
2016-12-08 19:18:40 +00:00
|
|
|
|| i2d_X509_EXTENSIONS(s->ext.ocsp.exts, &extbytes)
|
2016-11-25 16:28:02 +00:00
|
|
|
!= extlen) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST, ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_npn(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
2017-01-10 23:02:28 +00:00
|
|
|
if (s->ctx->ext.npn_select_cb == NULL || !SSL_IS_FIRST_HANDSHAKE(s))
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The client advertises an empty extension to indicate its support
|
|
|
|
* for Next Protocol Negotiation
|
|
|
|
*/
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_next_proto_neg)
|
|
|
|
|| !WPACKET_put_bytes_u16(pkt, 0)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_NPN,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_alpn(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
s->s3->alpn_sent = 0;
|
|
|
|
|
2017-01-10 23:02:28 +00:00
|
|
|
if (s->ext.alpn == NULL || !SSL_IS_FIRST_HANDSHAKE(s))
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt,
|
|
|
|
TLSEXT_TYPE_application_layer_protocol_negotiation)
|
|
|
|
/* Sub-packet ALPN extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
2016-12-08 19:18:40 +00:00
|
|
|
|| !WPACKET_sub_memcpy_u16(pkt, s->ext.alpn, s->ext.alpn_len)
|
2016-11-25 16:28:02 +00:00
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_ALPN,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
s->s3->alpn_sent = 1;
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_SRTP
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_use_srtp(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
STACK_OF(SRTP_PROTECTION_PROFILE) *clnt = SSL_get_srtp_profiles(s);
|
2016-12-07 17:04:46 +00:00
|
|
|
int i, end;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (clnt == NULL)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_use_srtp)
|
|
|
|
/* Sub-packet for SRTP extension */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
/* Sub-packet for the protection profile list */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_USE_SRTP,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
2016-12-07 17:04:46 +00:00
|
|
|
|
|
|
|
end = sk_SRTP_PROTECTION_PROFILE_num(clnt);
|
|
|
|
for (i = 0; i < end; i++) {
|
|
|
|
const SRTP_PROTECTION_PROFILE *prof =
|
|
|
|
sk_SRTP_PROTECTION_PROFILE_value(clnt, i);
|
|
|
|
|
2016-11-25 16:28:02 +00:00
|
|
|
if (prof == NULL || !WPACKET_put_bytes_u16(pkt, prof->id)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_USE_SRTP, ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!WPACKET_close(pkt)
|
|
|
|
/* Add an empty use_mki value */
|
|
|
|
|| !WPACKET_put_bytes_u8(pkt, 0)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_USE_SRTP,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_etm(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
if (s->options & SSL_OP_NO_ENCRYPT_THEN_MAC)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_encrypt_then_mac)
|
|
|
|
|| !WPACKET_put_bytes_u16(pkt, 0)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_ETM,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_CT
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_sct(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
if (s->ct_validation_callback == NULL)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
2016-12-02 09:14:15 +00:00
|
|
|
/* Not defined for client Certificates */
|
|
|
|
if (x != NULL)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-12-02 09:14:15 +00:00
|
|
|
|
2016-11-25 16:28:02 +00:00
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_signed_certificate_timestamp)
|
|
|
|
|| !WPACKET_put_bytes_u16(pkt, 0)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_SCT,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_ems(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_extended_master_secret)
|
|
|
|
|| !WPACKET_put_bytes_u16(pkt, 0)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_EMS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_supported_versions(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
int currv, min_version, max_version, reason;
|
|
|
|
|
2018-08-20 14:12:39 +00:00
|
|
|
reason = ssl_get_min_max_version(s, &min_version, &max_version, NULL);
|
2017-11-03 16:38:48 +00:00
|
|
|
if (reason != 0) {
|
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS, reason);
|
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Don't include this if we can't negotiate TLSv1.3. We can do a straight
|
|
|
|
* comparison here because we will never be called in DTLS.
|
|
|
|
*/
|
|
|
|
if (max_version < TLS1_3_VERSION)
|
|
|
|
return EXT_RETURN_NOT_SENT;
|
|
|
|
|
2016-11-25 16:28:02 +00:00
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_versions)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_start_sub_packet_u8(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for (currv = max_version; currv >= min_version; currv--) {
|
2018-07-18 15:05:49 +00:00
|
|
|
if (!WPACKET_put_bytes_u16(pkt, currv)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-01-12 15:28:48 +00:00
|
|
|
/*
|
2017-06-30 08:41:03 +00:00
|
|
|
* Construct a psk_kex_modes extension.
|
2017-01-12 15:28:48 +00:00
|
|
|
*/
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_psk_kex_modes(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2017-01-12 15:28:48 +00:00
|
|
|
{
|
|
|
|
#ifndef OPENSSL_NO_TLS1_3
|
2017-06-30 08:41:03 +00:00
|
|
|
int nodhe = s->options & SSL_OP_ALLOW_NO_DHE_KEX;
|
|
|
|
|
2017-01-12 15:28:48 +00:00
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk_kex_modes)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_start_sub_packet_u8(pkt)
|
|
|
|
|| !WPACKET_put_bytes_u8(pkt, TLSEXT_KEX_MODE_KE_DHE)
|
2017-06-30 08:41:03 +00:00
|
|
|
|| (nodhe && !WPACKET_put_bytes_u8(pkt, TLSEXT_KEX_MODE_KE))
|
2017-01-12 15:28:48 +00:00
|
|
|
|| !WPACKET_close(pkt)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_PSK_KEX_MODES, ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-01-12 15:28:48 +00:00
|
|
|
}
|
2017-01-19 10:07:50 +00:00
|
|
|
|
2017-06-30 08:41:03 +00:00
|
|
|
s->ext.psk_kex_mode = TLSEXT_KEX_MODE_FLAG_KE_DHE;
|
|
|
|
if (nodhe)
|
|
|
|
s->ext.psk_kex_mode |= TLSEXT_KEX_MODE_FLAG_KE;
|
2017-01-12 15:28:48 +00:00
|
|
|
#endif
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2017-01-12 15:28:48 +00:00
|
|
|
}
|
|
|
|
|
2017-02-01 13:31:27 +00:00
|
|
|
#ifndef OPENSSL_NO_TLS1_3
|
|
|
|
static int add_key_share(SSL *s, WPACKET *pkt, unsigned int curve_id)
|
|
|
|
{
|
2017-05-09 07:52:04 +00:00
|
|
|
unsigned char *encoded_point = NULL;
|
|
|
|
EVP_PKEY *key_share_key = NULL;
|
2017-02-01 13:31:27 +00:00
|
|
|
size_t encodedlen;
|
|
|
|
|
2017-05-09 07:52:04 +00:00
|
|
|
if (s->s3->tmp.pkey != NULL) {
|
2017-11-13 11:24:51 +00:00
|
|
|
if (!ossl_assert(s->hello_retry_request == SSL_HRR_PENDING)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_ADD_KEY_SHARE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-18 09:05:02 +00:00
|
|
|
return 0;
|
2017-05-09 07:52:04 +00:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Could happen if we got an HRR that wasn't requesting a new key_share
|
|
|
|
*/
|
|
|
|
key_share_key = s->s3->tmp.pkey;
|
|
|
|
} else {
|
2017-11-21 17:18:43 +00:00
|
|
|
key_share_key = ssl_generate_pkey_group(s, curve_id);
|
2017-05-09 07:52:04 +00:00
|
|
|
if (key_share_key == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
/* SSLfatal() already called */
|
2017-05-18 09:05:02 +00:00
|
|
|
return 0;
|
2017-05-09 07:52:04 +00:00
|
|
|
}
|
2017-02-01 13:31:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Encode the public key. */
|
|
|
|
encodedlen = EVP_PKEY_get1_tls_encodedpoint(key_share_key,
|
2017-02-06 16:47:29 +00:00
|
|
|
&encoded_point);
|
2017-02-01 13:31:27 +00:00
|
|
|
if (encodedlen == 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_ADD_KEY_SHARE, ERR_R_EC_LIB);
|
2017-05-09 07:52:04 +00:00
|
|
|
goto err;
|
2017-02-01 13:31:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Create KeyShareEntry */
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, curve_id)
|
2017-02-06 16:47:29 +00:00
|
|
|
|| !WPACKET_sub_memcpy_u16(pkt, encoded_point, encodedlen)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_ADD_KEY_SHARE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 07:52:04 +00:00
|
|
|
goto err;
|
2017-02-01 13:31:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* TODO(TLS1.3): When changing to send more than one key_share we're
|
|
|
|
* going to need to be able to save more than one EVP_PKEY. For now
|
|
|
|
* we reuse the existing tmp.pkey
|
|
|
|
*/
|
|
|
|
s->s3->tmp.pkey = key_share_key;
|
|
|
|
s->s3->group_id = curve_id;
|
2017-02-06 16:47:29 +00:00
|
|
|
OPENSSL_free(encoded_point);
|
2017-02-01 13:31:27 +00:00
|
|
|
|
2017-05-18 09:05:02 +00:00
|
|
|
return 1;
|
2017-05-09 07:52:04 +00:00
|
|
|
err:
|
|
|
|
if (s->s3->tmp.pkey == NULL)
|
|
|
|
EVP_PKEY_free(key_share_key);
|
|
|
|
OPENSSL_free(encoded_point);
|
2017-05-18 09:05:02 +00:00
|
|
|
return 0;
|
2017-02-01 13:31:27 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_key_share(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
2016-12-28 15:32:39 +00:00
|
|
|
#ifndef OPENSSL_NO_TLS1_3
|
2017-09-26 14:41:34 +00:00
|
|
|
size_t i, num_groups = 0;
|
|
|
|
const uint16_t *pgroups = NULL;
|
2017-09-22 15:06:52 +00:00
|
|
|
uint16_t curve_id = 0;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
/* key_share extension */
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_key_share)
|
|
|
|
/* Extension data sub-packet */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
/* KeyShare list sub-packet */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_KEY_SHARE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-09-26 14:41:34 +00:00
|
|
|
tls1_get_supported_groups(s, &pgroups, &num_groups);
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* TODO(TLS1.3): Make the number of key_shares sent configurable. For
|
|
|
|
* now, just send one
|
|
|
|
*/
|
2017-02-01 13:31:27 +00:00
|
|
|
if (s->s3->group_id != 0) {
|
|
|
|
curve_id = s->s3->group_id;
|
|
|
|
} else {
|
2017-09-26 14:41:34 +00:00
|
|
|
for (i = 0; i < num_groups; i++) {
|
2016-11-25 16:28:02 +00:00
|
|
|
|
2017-09-26 14:41:34 +00:00
|
|
|
if (!tls_curve_allowed(s, pgroups[i], SSL_SECOP_CURVE_SUPPORTED))
|
2017-02-01 13:31:27 +00:00
|
|
|
continue;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
2017-09-26 14:41:34 +00:00
|
|
|
curve_id = pgroups[i];
|
2017-02-01 13:31:27 +00:00
|
|
|
break;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
2017-02-01 13:31:27 +00:00
|
|
|
}
|
2016-11-25 16:28:02 +00:00
|
|
|
|
2017-02-01 13:31:27 +00:00
|
|
|
if (curve_id == 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_KEY_SHARE,
|
|
|
|
SSL_R_NO_SUITABLE_KEY_SHARE);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!add_key_share(s, pkt, curve_id)) {
|
|
|
|
/* SSLfatal() already called */
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-11-21 17:18:43 +00:00
|
|
|
}
|
2017-02-01 13:31:27 +00:00
|
|
|
|
2016-11-25 16:28:02 +00:00
|
|
|
if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_KEY_SHARE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2018-03-02 14:36:28 +00:00
|
|
|
#else
|
|
|
|
return EXT_RETURN_NOT_SENT;
|
|
|
|
#endif
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_cookie(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2017-03-02 17:37:03 +00:00
|
|
|
{
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN ret = EXT_RETURN_FAIL;
|
2017-03-02 17:37:03 +00:00
|
|
|
|
|
|
|
/* Should only be set if we've had an HRR */
|
|
|
|
if (s->ext.tls13_cookie_len == 0)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2017-03-02 17:37:03 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_cookie)
|
|
|
|
/* Extension data sub-packet */
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_sub_memcpy_u16(pkt, s->ext.tls13_cookie,
|
|
|
|
s->ext.tls13_cookie_len)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_COOKIE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-03-02 17:37:03 +00:00
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
ret = EXT_RETURN_SENT;
|
2017-03-02 17:37:03 +00:00
|
|
|
end:
|
|
|
|
OPENSSL_free(s->ext.tls13_cookie);
|
2017-03-05 20:00:11 +00:00
|
|
|
s->ext.tls13_cookie = NULL;
|
2017-03-02 17:37:03 +00:00
|
|
|
s->ext.tls13_cookie_len = 0;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_early_data(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2017-02-24 11:13:25 +00:00
|
|
|
{
|
2018-03-20 22:47:06 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
|
|
|
char identity[PSK_MAX_IDENTITY_LEN + 1];
|
|
|
|
#endif /* OPENSSL_NO_PSK */
|
2017-08-31 22:27:06 +00:00
|
|
|
const unsigned char *id = NULL;
|
2017-08-03 15:30:31 +00:00
|
|
|
size_t idlen = 0;
|
2017-07-05 19:53:03 +00:00
|
|
|
SSL_SESSION *psksess = NULL;
|
2017-07-21 10:41:05 +00:00
|
|
|
SSL_SESSION *edsess = NULL;
|
2017-07-05 19:53:03 +00:00
|
|
|
const EVP_MD *handmd = NULL;
|
|
|
|
|
2017-11-13 11:24:51 +00:00
|
|
|
if (s->hello_retry_request == SSL_HRR_PENDING)
|
2017-07-05 19:53:03 +00:00
|
|
|
handmd = ssl_handshake_md(s);
|
|
|
|
|
|
|
|
if (s->psk_use_session_cb != NULL
|
2017-07-21 10:41:05 +00:00
|
|
|
&& (!s->psk_use_session_cb(s, handmd, &id, &idlen, &psksess)
|
|
|
|
|| (psksess != NULL
|
|
|
|
&& psksess->ssl_version != TLS1_3_VERSION))) {
|
|
|
|
SSL_SESSION_free(psksess);
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
SSL_R_BAD_PSK);
|
2017-07-05 19:53:03 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
|
2018-03-19 12:58:05 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
2018-03-06 16:41:51 +00:00
|
|
|
if (psksess == NULL && s->psk_client_callback != NULL) {
|
|
|
|
unsigned char psk[PSK_MAX_PSK_LEN];
|
|
|
|
size_t psklen = 0;
|
|
|
|
|
|
|
|
memset(identity, 0, sizeof(identity));
|
|
|
|
psklen = s->psk_client_callback(s, NULL, identity, sizeof(identity) - 1,
|
|
|
|
psk, sizeof(psk));
|
|
|
|
|
|
|
|
if (psklen > PSK_MAX_PSK_LEN) {
|
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, ERR_R_INTERNAL_ERROR);
|
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
} else if (psklen > 0) {
|
|
|
|
const unsigned char tls13_aes128gcmsha256_id[] = { 0x13, 0x01 };
|
|
|
|
const SSL_CIPHER *cipher;
|
|
|
|
|
|
|
|
idlen = strlen(identity);
|
|
|
|
if (idlen > PSK_MAX_IDENTITY_LEN) {
|
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
id = (unsigned char *)identity;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We found a PSK using an old style callback. We don't know
|
|
|
|
* the digest so we default to SHA256 as per the TLSv1.3 spec
|
|
|
|
*/
|
|
|
|
cipher = SSL_CIPHER_find(s, tls13_aes128gcmsha256_id);
|
|
|
|
if (cipher == NULL) {
|
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
psksess = SSL_SESSION_new();
|
|
|
|
if (psksess == NULL
|
|
|
|
|| !SSL_SESSION_set1_master_key(psksess, psk, psklen)
|
|
|
|
|| !SSL_SESSION_set_cipher(psksess, cipher)
|
|
|
|
|| !SSL_SESSION_set_protocol_version(psksess, TLS1_3_VERSION)) {
|
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
|
|
|
OPENSSL_cleanse(psk, psklen);
|
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
OPENSSL_cleanse(psk, psklen);
|
|
|
|
}
|
|
|
|
}
|
2018-03-19 12:58:05 +00:00
|
|
|
#endif /* OPENSSL_NO_PSK */
|
2018-03-06 16:41:51 +00:00
|
|
|
|
2017-07-05 19:53:03 +00:00
|
|
|
SSL_SESSION_free(s->psksession);
|
|
|
|
s->psksession = psksess;
|
|
|
|
if (psksess != NULL) {
|
|
|
|
OPENSSL_free(s->psksession_id);
|
|
|
|
s->psksession_id = OPENSSL_memdup(id, idlen);
|
|
|
|
if (s->psksession_id == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, ERR_R_INTERNAL_ERROR);
|
2017-07-05 19:53:03 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
s->psksession_id_len = idlen;
|
|
|
|
}
|
|
|
|
|
2017-02-24 11:13:25 +00:00
|
|
|
if (s->early_data_state != SSL_EARLY_DATA_CONNECTING
|
2017-07-05 19:53:03 +00:00
|
|
|
|| (s->session->ext.max_early_data == 0
|
|
|
|
&& (psksess == NULL || psksess->ext.max_early_data == 0))) {
|
2017-02-24 11:13:25 +00:00
|
|
|
s->max_early_data = 0;
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2017-02-24 11:13:25 +00:00
|
|
|
}
|
2017-07-21 10:41:05 +00:00
|
|
|
edsess = s->session->ext.max_early_data != 0 ? s->session : psksess;
|
|
|
|
s->max_early_data = edsess->ext.max_early_data;
|
|
|
|
|
2017-11-14 13:55:21 +00:00
|
|
|
if (edsess->ext.hostname != NULL) {
|
|
|
|
if (s->ext.hostname == NULL
|
|
|
|
|| (s->ext.hostname != NULL
|
|
|
|
&& strcmp(s->ext.hostname, edsess->ext.hostname) != 0)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
SSL_R_INCONSISTENT_EARLY_DATA_SNI);
|
2017-11-14 13:55:21 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
2017-07-21 10:41:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ((s->ext.alpn == NULL && edsess->ext.alpn_selected != NULL)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
SSL_R_INCONSISTENT_EARLY_DATA_ALPN);
|
2017-07-21 10:41:05 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Verify that we are offering an ALPN protocol consistent with the early
|
|
|
|
* data.
|
|
|
|
*/
|
|
|
|
if (edsess->ext.alpn_selected != NULL) {
|
|
|
|
PACKET prots, alpnpkt;
|
|
|
|
int found = 0;
|
|
|
|
|
|
|
|
if (!PACKET_buf_init(&prots, s->ext.alpn, s->ext.alpn_len)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, ERR_R_INTERNAL_ERROR);
|
2017-07-21 10:41:05 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
while (PACKET_get_length_prefixed_1(&prots, &alpnpkt)) {
|
|
|
|
if (PACKET_equal(&alpnpkt, edsess->ext.alpn_selected,
|
|
|
|
edsess->ext.alpn_selected_len)) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!found) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
SSL_R_INCONSISTENT_EARLY_DATA_ALPN);
|
2017-07-21 10:41:05 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
}
|
2017-02-24 11:13:25 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_early_data)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-02-24 11:13:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We set this to rejected here. Later, if the server acknowledges the
|
|
|
|
* extension, we set it to accepted.
|
|
|
|
*/
|
|
|
|
s->ext.early_data = SSL_EARLY_DATA_REJECTED;
|
2017-08-16 11:50:32 +00:00
|
|
|
s->ext.early_data_ok = 1;
|
2017-02-24 11:13:25 +00:00
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2017-02-24 11:13:25 +00:00
|
|
|
}
|
|
|
|
|
2016-12-07 17:04:46 +00:00
|
|
|
#define F5_WORKAROUND_MIN_MSG_LEN 0xff
|
|
|
|
#define F5_WORKAROUND_MAX_MSG_LEN 0x200
|
|
|
|
|
2017-03-16 10:18:39 +00:00
|
|
|
/*
|
|
|
|
* PSK pre binder overhead =
|
|
|
|
* 2 bytes for TLSEXT_TYPE_psk
|
|
|
|
* 2 bytes for extension length
|
|
|
|
* 2 bytes for identities list length
|
|
|
|
* 2 bytes for identity length
|
|
|
|
* 4 bytes for obfuscated_ticket_age
|
|
|
|
* 2 bytes for binder list length
|
|
|
|
* 1 byte for binder length
|
|
|
|
* The above excludes the number of bytes for the identity itself and the
|
|
|
|
* subsequent binder bytes
|
|
|
|
*/
|
|
|
|
#define PSK_PRE_BINDER_OVERHEAD (2 + 2 + 2 + 2 + 4 + 2 + 1)
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_padding(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 16:28:02 +00:00
|
|
|
{
|
|
|
|
unsigned char *padbytes;
|
|
|
|
size_t hlen;
|
|
|
|
|
|
|
|
if ((s->options & SSL_OP_TLSEXT_PADDING) == 0)
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
/*
|
2017-03-16 10:18:39 +00:00
|
|
|
* Add padding to workaround bugs in F5 terminators. See RFC7685.
|
|
|
|
* This code calculates the length of all extensions added so far but
|
|
|
|
* excludes the PSK extension (because that MUST be written last). Therefore
|
|
|
|
* this extension MUST always appear second to last.
|
2016-11-25 16:28:02 +00:00
|
|
|
*/
|
|
|
|
if (!WPACKET_get_total_written(pkt, &hlen)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PADDING,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-03-16 10:18:39 +00:00
|
|
|
/*
|
|
|
|
* If we're going to send a PSK then that will be written out after this
|
|
|
|
* extension, so we need to calculate how long it is going to be.
|
|
|
|
*/
|
|
|
|
if (s->session->ssl_version == TLS1_3_VERSION
|
|
|
|
&& s->session->ext.ticklen != 0
|
|
|
|
&& s->session->cipher != NULL) {
|
|
|
|
const EVP_MD *md = ssl_md(s->session->cipher->algorithm2);
|
|
|
|
|
|
|
|
if (md != NULL) {
|
|
|
|
/*
|
|
|
|
* Add the fixed PSK overhead, the identity length and the binder
|
|
|
|
* length.
|
|
|
|
*/
|
|
|
|
hlen += PSK_PRE_BINDER_OVERHEAD + s->session->ext.ticklen
|
|
|
|
+ EVP_MD_size(md);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-07 17:04:46 +00:00
|
|
|
if (hlen > F5_WORKAROUND_MIN_MSG_LEN && hlen < F5_WORKAROUND_MAX_MSG_LEN) {
|
2017-02-17 22:13:26 +00:00
|
|
|
/* Calculate the amount of padding we need to add */
|
2016-12-07 17:04:46 +00:00
|
|
|
hlen = F5_WORKAROUND_MAX_MSG_LEN - hlen;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Take off the size of extension header itself (2 bytes for type and
|
2017-08-18 13:32:29 +00:00
|
|
|
* 2 bytes for length bytes), but ensure that the extension is at least
|
|
|
|
* 1 byte long so as not to have an empty extension last (WebSphere 7.x,
|
|
|
|
* 8.x are intolerant of that condition)
|
2016-12-07 17:04:46 +00:00
|
|
|
*/
|
2017-09-04 07:44:02 +00:00
|
|
|
if (hlen > 4)
|
2016-11-25 16:28:02 +00:00
|
|
|
hlen -= 4;
|
|
|
|
else
|
2017-08-18 13:32:29 +00:00
|
|
|
hlen = 1;
|
2016-11-25 16:28:02 +00:00
|
|
|
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_padding)
|
|
|
|
|| !WPACKET_sub_allocate_bytes_u16(pkt, hlen, &padbytes)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PADDING,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-08-31 21:23:00 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
memset(padbytes, 0, hlen);
|
|
|
|
}
|
|
|
|
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2016-11-25 16:28:02 +00:00
|
|
|
}
|
|
|
|
|
2017-01-13 17:00:49 +00:00
|
|
|
/*
|
|
|
|
* Construct the pre_shared_key extension
|
|
|
|
*/
|
2017-05-09 12:44:25 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_psk(SSL *s, WPACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2017-01-13 17:00:49 +00:00
|
|
|
{
|
|
|
|
#ifndef OPENSSL_NO_TLS1_3
|
2017-06-21 16:31:26 +00:00
|
|
|
uint32_t now, agesec, agems = 0;
|
2017-07-05 19:53:03 +00:00
|
|
|
size_t reshashsize = 0, pskhashsize = 0, binderoffset, msglen;
|
2017-06-12 12:30:21 +00:00
|
|
|
unsigned char *resbinder = NULL, *pskbinder = NULL, *msgstart = NULL;
|
2017-06-21 16:31:26 +00:00
|
|
|
const EVP_MD *handmd = NULL, *mdres = NULL, *mdpsk = NULL;
|
2017-06-12 12:30:21 +00:00
|
|
|
int dores = 0;
|
2017-01-13 17:00:49 +00:00
|
|
|
|
|
|
|
s->session->ext.tick_identity = TLSEXT_PSK_BAD_IDENTITY;
|
|
|
|
|
2017-03-16 10:18:39 +00:00
|
|
|
/*
|
|
|
|
* Note: At this stage of the code we only support adding a single
|
|
|
|
* resumption PSK. If we add support for multiple PSKs then the length
|
|
|
|
* calculations in the padding extension will need to be adjusted.
|
|
|
|
*/
|
|
|
|
|
2017-01-13 17:00:49 +00:00
|
|
|
/*
|
2017-01-19 11:23:06 +00:00
|
|
|
* If this is an incompatible or new session then we have nothing to resume
|
|
|
|
* so don't add this extension.
|
2017-01-13 17:00:49 +00:00
|
|
|
*/
|
2017-01-19 11:23:06 +00:00
|
|
|
if (s->session->ssl_version != TLS1_3_VERSION
|
2017-07-05 19:53:03 +00:00
|
|
|
|| (s->session->ext.ticklen == 0 && s->psksession == NULL))
|
2017-05-09 12:44:25 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2017-01-13 17:00:49 +00:00
|
|
|
|
2017-11-13 11:24:51 +00:00
|
|
|
if (s->hello_retry_request == SSL_HRR_PENDING)
|
2017-06-12 12:30:21 +00:00
|
|
|
handmd = ssl_handshake_md(s);
|
|
|
|
|
|
|
|
if (s->session->ext.ticklen != 0) {
|
2017-06-21 11:17:30 +00:00
|
|
|
/* Get the digest associated with the ciphersuite in the session */
|
2017-06-12 12:30:21 +00:00
|
|
|
if (s->session->cipher == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PSK,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-06-12 12:30:21 +00:00
|
|
|
}
|
|
|
|
mdres = ssl_md(s->session->cipher->algorithm2);
|
|
|
|
if (mdres == NULL) {
|
2017-06-21 11:17:30 +00:00
|
|
|
/*
|
|
|
|
* Don't recognize this cipher so we can't use the session.
|
|
|
|
* Ignore it
|
|
|
|
*/
|
2017-06-12 12:30:21 +00:00
|
|
|
goto dopsksess;
|
|
|
|
}
|
|
|
|
|
2017-11-13 11:24:51 +00:00
|
|
|
if (s->hello_retry_request == SSL_HRR_PENDING && mdres != handmd) {
|
2017-06-12 12:30:21 +00:00
|
|
|
/*
|
2017-06-21 11:17:30 +00:00
|
|
|
* Selected ciphersuite hash does not match the hash for the session
|
|
|
|
* so we can't use it.
|
2017-06-12 12:30:21 +00:00
|
|
|
*/
|
|
|
|
goto dopsksess;
|
|
|
|
}
|
2017-01-20 16:02:07 +00:00
|
|
|
|
2017-03-13 16:09:47 +00:00
|
|
|
/*
|
2017-06-12 12:30:21 +00:00
|
|
|
* Technically the C standard just says time() returns a time_t and says
|
2017-06-21 11:17:30 +00:00
|
|
|
* nothing about the encoding of that type. In practice most
|
|
|
|
* implementations follow POSIX which holds it as an integral type in
|
|
|
|
* seconds since epoch. We've already made the assumption that we can do
|
|
|
|
* this in multiple places in the code, so portability shouldn't be an
|
|
|
|
* issue.
|
2017-03-13 16:09:47 +00:00
|
|
|
*/
|
2017-06-12 12:30:21 +00:00
|
|
|
now = (uint32_t)time(NULL);
|
|
|
|
agesec = now - (uint32_t)s->session->time;
|
2018-02-09 16:39:27 +00:00
|
|
|
/*
|
|
|
|
* We calculate the age in seconds but the server may work in ms. Due to
|
|
|
|
* rounding errors we could overestimate the age by up to 1s. It is
|
|
|
|
* better to underestimate it. Otherwise, if the RTT is very short, when
|
|
|
|
* the server calculates the age reported by the client it could be
|
|
|
|
* bigger than the age calculated on the server - which should never
|
|
|
|
* happen.
|
|
|
|
*/
|
|
|
|
if (agesec > 0)
|
|
|
|
agesec--;
|
2017-03-13 16:09:47 +00:00
|
|
|
|
2017-06-12 12:30:21 +00:00
|
|
|
if (s->session->ext.tick_lifetime_hint < agesec) {
|
|
|
|
/* Ticket is too old. Ignore it. */
|
|
|
|
goto dopsksess;
|
|
|
|
}
|
2017-01-13 17:00:49 +00:00
|
|
|
|
2017-06-12 12:30:21 +00:00
|
|
|
/*
|
|
|
|
* Calculate age in ms. We're just doing it to nearest second. Should be
|
|
|
|
* good enough.
|
|
|
|
*/
|
|
|
|
agems = agesec * (uint32_t)1000;
|
2017-01-17 10:43:37 +00:00
|
|
|
|
2017-06-12 12:30:21 +00:00
|
|
|
if (agesec != 0 && agems / (uint32_t)1000 != agesec) {
|
|
|
|
/*
|
2017-06-21 11:17:30 +00:00
|
|
|
* Overflow. Shouldn't happen unless this is a *really* old session.
|
|
|
|
* If so we just ignore it.
|
2017-06-12 12:30:21 +00:00
|
|
|
*/
|
|
|
|
goto dopsksess;
|
|
|
|
}
|
2017-01-13 17:00:49 +00:00
|
|
|
|
|
|
|
/*
|
2017-06-21 11:17:30 +00:00
|
|
|
* Obfuscate the age. Overflow here is fine, this addition is supposed
|
|
|
|
* to be mod 2^32.
|
2017-01-13 17:00:49 +00:00
|
|
|
*/
|
2017-06-12 12:30:21 +00:00
|
|
|
agems += s->session->ext.tick_age_add;
|
|
|
|
|
|
|
|
reshashsize = EVP_MD_size(mdres);
|
|
|
|
dores = 1;
|
2017-01-13 17:00:49 +00:00
|
|
|
}
|
|
|
|
|
2017-06-12 12:30:21 +00:00
|
|
|
dopsksess:
|
2017-07-05 19:53:03 +00:00
|
|
|
if (!dores && s->psksession == NULL)
|
2017-06-12 12:30:21 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2017-01-13 17:00:49 +00:00
|
|
|
|
2017-07-05 19:53:03 +00:00
|
|
|
if (s->psksession != NULL) {
|
|
|
|
mdpsk = ssl_md(s->psksession->cipher->algorithm2);
|
2017-06-12 12:30:21 +00:00
|
|
|
if (mdpsk == NULL) {
|
|
|
|
/*
|
|
|
|
* Don't recognize this cipher so we can't use the session.
|
|
|
|
* If this happens it's an application bug.
|
|
|
|
*/
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PSK,
|
|
|
|
SSL_R_BAD_PSK);
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-06-12 12:30:21 +00:00
|
|
|
}
|
|
|
|
|
2017-11-13 11:24:51 +00:00
|
|
|
if (s->hello_retry_request == SSL_HRR_PENDING && mdpsk != handmd) {
|
2017-06-12 12:30:21 +00:00
|
|
|
/*
|
|
|
|
* Selected ciphersuite hash does not match the hash for the PSK
|
|
|
|
* session. This is an application bug.
|
|
|
|
*/
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PSK,
|
|
|
|
SSL_R_BAD_PSK);
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-06-12 12:30:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pskhashsize = EVP_MD_size(mdpsk);
|
|
|
|
}
|
2017-01-13 17:00:49 +00:00
|
|
|
|
|
|
|
/* Create the extension, but skip over the binder for now */
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
2017-06-12 12:30:21 +00:00
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PSK,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-06-12 12:30:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (dores) {
|
|
|
|
if (!WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick,
|
|
|
|
s->session->ext.ticklen)
|
|
|
|
|| !WPACKET_put_bytes_u32(pkt, agems)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PSK,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-06-12 12:30:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-05 19:53:03 +00:00
|
|
|
if (s->psksession != NULL) {
|
|
|
|
if (!WPACKET_sub_memcpy_u16(pkt, s->psksession_id,
|
|
|
|
s->psksession_id_len)
|
2017-06-12 12:30:21 +00:00
|
|
|
|| !WPACKET_put_bytes_u32(pkt, 0)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PSK,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-06-12 12:30:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!WPACKET_close(pkt)
|
2017-01-13 17:00:49 +00:00
|
|
|
|| !WPACKET_get_total_written(pkt, &binderoffset)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
2017-06-12 12:30:21 +00:00
|
|
|
|| (dores
|
|
|
|
&& !WPACKET_sub_allocate_bytes_u8(pkt, reshashsize, &resbinder))
|
2017-07-05 19:53:03 +00:00
|
|
|
|| (s->psksession != NULL
|
2017-06-12 12:30:21 +00:00
|
|
|
&& !WPACKET_sub_allocate_bytes_u8(pkt, pskhashsize, &pskbinder))
|
2017-01-13 17:00:49 +00:00
|
|
|
|| !WPACKET_close(pkt)
|
|
|
|
|| !WPACKET_close(pkt)
|
|
|
|
|| !WPACKET_get_total_written(pkt, &msglen)
|
|
|
|
/*
|
|
|
|
* We need to fill in all the sub-packet lengths now so we can
|
|
|
|
* calculate the HMAC of the message up to the binders
|
|
|
|
*/
|
|
|
|
|| !WPACKET_fill_lengths(pkt)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CONSTRUCT_CTOS_PSK,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_FAIL;
|
2017-01-13 17:00:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
msgstart = WPACKET_get_curr(pkt) - msglen;
|
|
|
|
|
2017-06-21 11:17:30 +00:00
|
|
|
if (dores
|
|
|
|
&& tls_psk_do_binder(s, mdres, msgstart, binderoffset, NULL,
|
|
|
|
resbinder, s->session, 1, 0) != 1) {
|
2017-11-23 11:41:40 +00:00
|
|
|
/* SSLfatal() already called */
|
|
|
|
return EXT_RETURN_FAIL;
|
2017-01-13 17:00:49 +00:00
|
|
|
}
|
|
|
|
|
2017-07-05 19:53:03 +00:00
|
|
|
if (s->psksession != NULL
|
2017-06-21 11:17:30 +00:00
|
|
|
&& tls_psk_do_binder(s, mdpsk, msgstart, binderoffset, NULL,
|
2017-07-05 19:53:03 +00:00
|
|
|
pskbinder, s->psksession, 1, 1) != 1) {
|
2017-11-23 11:41:40 +00:00
|
|
|
/* SSLfatal() already called */
|
|
|
|
return EXT_RETURN_FAIL;
|
2017-06-12 12:30:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (dores)
|
|
|
|
s->session->ext.tick_identity = 0;
|
2017-07-05 19:53:03 +00:00
|
|
|
if (s->psksession != NULL)
|
2017-06-12 12:30:21 +00:00
|
|
|
s->psksession->ext.tick_identity = (dores ? 1 : 0);
|
2017-01-13 17:00:49 +00:00
|
|
|
|
2017-11-23 11:41:40 +00:00
|
|
|
return EXT_RETURN_SENT;
|
2017-01-13 17:00:49 +00:00
|
|
|
#else
|
2017-08-31 21:24:30 +00:00
|
|
|
return EXT_RETURN_NOT_SENT;
|
2017-01-13 17:00:49 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
Add TLSv1.3 post-handshake authentication (PHA)
Add SSL_verify_client_post_handshake() for servers to initiate PHA
Add SSL_force_post_handshake_auth() for clients that don't have certificates
initially configured, but use a certificate callback.
Update SSL_CTX_set_verify()/SSL_set_verify() mode:
* Add SSL_VERIFY_POST_HANDSHAKE to postpone client authentication until after
the initial handshake.
* Update SSL_VERIFY_CLIENT_ONCE now only sends out one CertRequest regardless
of when the certificate authentication takes place; either initial handshake,
re-negotiation, or post-handshake authentication.
Add 'RequestPostHandshake' and 'RequirePostHandshake' SSL_CONF options that
add the SSL_VERIFY_POST_HANDSHAKE to the 'Request' and 'Require' options
Add support to s_client:
* Enabled automatically when cert is configured
* Can be forced enabled via -force_pha
Add support to s_server:
* Use 'c' to invoke PHA in s_server
* Remove some dead code
Update documentation
Update unit tests:
* Illegal use of PHA extension
* TLSv1.3 certificate tests
DTLS and TLS behave ever-so-slightly differently. So, when DTLS1.3 is
implemented, it's PHA support state machine may need to be different.
Add a TODO and a #error
Update handshake context to deal with PHA.
The handshake context for TLSv1.3 post-handshake auth is up through the
ClientFinish message, plus the CertificateRequest message. Subsequent
Certificate, CertificateVerify, and Finish messages are based on this
handshake context (not the Certificate message per se, but it's included
after the hash). KeyUpdate, NewSessionTicket, and prior Certificate
Request messages are not included in post-handshake authentication.
After the ClientFinished message is processed, save off the digest state
for future post-handshake authentication. When post-handshake auth occurs,
copy over the saved handshake context into the "main" handshake digest.
This effectively discards the any KeyUpdate or NewSessionTicket messages
and any prior post-handshake authentication.
This, of course, assumes that the ID-22 did not mean to include any
previous post-handshake authentication into the new handshake transcript.
This is implied by section 4.4.1 that lists messages only up to the
first ClientFinished.
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4964)
2017-12-18 21:52:28 +00:00
|
|
|
EXT_RETURN tls_construct_ctos_post_handshake_auth(SSL *s, WPACKET *pkt,
|
|
|
|
unsigned int context,
|
|
|
|
X509 *x, size_t chainidx)
|
|
|
|
{
|
|
|
|
#ifndef OPENSSL_NO_TLS1_3
|
2018-08-13 14:23:27 +00:00
|
|
|
if (!s->pha_enabled)
|
|
|
|
return EXT_RETURN_NOT_SENT;
|
Add TLSv1.3 post-handshake authentication (PHA)
Add SSL_verify_client_post_handshake() for servers to initiate PHA
Add SSL_force_post_handshake_auth() for clients that don't have certificates
initially configured, but use a certificate callback.
Update SSL_CTX_set_verify()/SSL_set_verify() mode:
* Add SSL_VERIFY_POST_HANDSHAKE to postpone client authentication until after
the initial handshake.
* Update SSL_VERIFY_CLIENT_ONCE now only sends out one CertRequest regardless
of when the certificate authentication takes place; either initial handshake,
re-negotiation, or post-handshake authentication.
Add 'RequestPostHandshake' and 'RequirePostHandshake' SSL_CONF options that
add the SSL_VERIFY_POST_HANDSHAKE to the 'Request' and 'Require' options
Add support to s_client:
* Enabled automatically when cert is configured
* Can be forced enabled via -force_pha
Add support to s_server:
* Use 'c' to invoke PHA in s_server
* Remove some dead code
Update documentation
Update unit tests:
* Illegal use of PHA extension
* TLSv1.3 certificate tests
DTLS and TLS behave ever-so-slightly differently. So, when DTLS1.3 is
implemented, it's PHA support state machine may need to be different.
Add a TODO and a #error
Update handshake context to deal with PHA.
The handshake context for TLSv1.3 post-handshake auth is up through the
ClientFinish message, plus the CertificateRequest message. Subsequent
Certificate, CertificateVerify, and Finish messages are based on this
handshake context (not the Certificate message per se, but it's included
after the hash). KeyUpdate, NewSessionTicket, and prior Certificate
Request messages are not included in post-handshake authentication.
After the ClientFinished message is processed, save off the digest state
for future post-handshake authentication. When post-handshake auth occurs,
copy over the saved handshake context into the "main" handshake digest.
This effectively discards the any KeyUpdate or NewSessionTicket messages
and any prior post-handshake authentication.
This, of course, assumes that the ID-22 did not mean to include any
previous post-handshake authentication into the new handshake transcript.
This is implied by section 4.4.1 that lists messages only up to the
first ClientFinished.
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4964)
2017-12-18 21:52:28 +00:00
|
|
|
|
|
|
|
/* construct extension - 0 length, no contents */
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_post_handshake_auth)
|
|
|
|
|| !WPACKET_start_sub_packet_u16(pkt)
|
|
|
|
|| !WPACKET_close(pkt)) {
|
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_CONSTRUCT_CTOS_POST_HANDSHAKE_AUTH,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
|
|
|
return EXT_RETURN_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->post_handshake_auth = SSL_PHA_EXT_SENT;
|
|
|
|
|
|
|
|
return EXT_RETURN_SENT;
|
|
|
|
#else
|
|
|
|
return EXT_RETURN_NOT_SENT;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
/*
|
|
|
|
* Parse the server's renegotiation binding and abort if it's not right
|
|
|
|
*/
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_renegotiate(SSL *s, PACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
|
|
|
size_t expected_len = s->s3->previous_client_finished_len
|
|
|
|
+ s->s3->previous_server_finished_len;
|
|
|
|
size_t ilen;
|
|
|
|
const unsigned char *data;
|
|
|
|
|
|
|
|
/* Check for logic errors */
|
2017-05-22 11:33:42 +00:00
|
|
|
if (!ossl_assert(expected_len == 0
|
|
|
|
|| s->s3->previous_client_finished_len != 0)
|
|
|
|
|| !ossl_assert(expected_len == 0
|
|
|
|
|| s->s3->previous_server_finished_len != 0)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-22 11:33:42 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
/* Parse the length byte */
|
|
|
|
if (!PACKET_get_1_len(pkt, &ilen)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
|
|
|
|
SSL_R_RENEGOTIATION_ENCODING_ERR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Consistency check */
|
|
|
|
if (PACKET_remaining(pkt) != ilen) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
|
|
|
|
SSL_R_RENEGOTIATION_ENCODING_ERR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the extension matches */
|
|
|
|
if (ilen != expected_len) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
|
|
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!PACKET_get_bytes(pkt, &data, s->s3->previous_client_finished_len)
|
|
|
|
|| memcmp(data, s->s3->previous_client_finished,
|
|
|
|
s->s3->previous_client_finished_len) != 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
|
|
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!PACKET_get_bytes(pkt, &data, s->s3->previous_server_finished_len)
|
|
|
|
|| memcmp(data, s->s3->previous_server_finished,
|
|
|
|
s->s3->previous_server_finished_len) != 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
|
|
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
s->s3->send_connection_binding = 1;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-11-05 16:46:48 +00:00
|
|
|
/* Parse the server's max fragment len extension packet */
|
|
|
|
int tls_parse_stoc_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2017-11-05 16:46:48 +00:00
|
|
|
{
|
|
|
|
unsigned int value;
|
|
|
|
|
|
|
|
if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) {
|
2017-12-15 07:01:20 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_MAXFRAGMENTLEN,
|
2017-11-21 17:18:43 +00:00
|
|
|
SSL_R_BAD_EXTENSION);
|
2017-11-05 16:46:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* |value| should contains a valid max-fragment-length code. */
|
|
|
|
if (!IS_MAX_FRAGMENT_LENGTH_EXT_VALID(value)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS_PARSE_STOC_MAXFRAGMENTLEN,
|
|
|
|
SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH);
|
2017-11-05 16:46:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Must be the same value as client-configured one who was sent to server */
|
|
|
|
/*-
|
|
|
|
* RFC 6066: if a client receives a maximum fragment length negotiation
|
|
|
|
* response that differs from the length it requested, ...
|
|
|
|
* It must abort with SSL_AD_ILLEGAL_PARAMETER alert
|
|
|
|
*/
|
|
|
|
if (value != s->ext.max_fragment_len_mode) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS_PARSE_STOC_MAXFRAGMENTLEN,
|
|
|
|
SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH);
|
2017-11-05 16:46:48 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Maximum Fragment Length Negotiation succeeded.
|
|
|
|
* The negotiated Maximum Fragment Length is binding now.
|
|
|
|
*/
|
|
|
|
s->session->ext.max_fragment_len_mode = value;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_server_name(SSL *s, PACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
2017-05-16 16:28:23 +00:00
|
|
|
if (s->ext.hostname == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_SERVER_NAME,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-05-16 16:28:23 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (PACKET_remaining(pkt) > 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_SERVER_NAME,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!s->hit) {
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->session->ext.hostname != NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_SERVER_NAME,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-12-08 19:18:40 +00:00
|
|
|
s->session->ext.hostname = OPENSSL_strdup(s->ext.hostname);
|
|
|
|
if (s->session->ext.hostname == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_SERVER_NAME,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_EC
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
2018-01-31 09:53:51 +00:00
|
|
|
size_t ecpointformats_len;
|
2016-11-25 12:34:29 +00:00
|
|
|
PACKET ecptformatlist;
|
|
|
|
|
|
|
|
if (!PACKET_as_length_prefixed_1(pkt, &ecptformatlist)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_EC_PT_FORMATS,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!s->hit) {
|
2016-12-08 19:18:40 +00:00
|
|
|
ecpointformats_len = PACKET_remaining(&ecptformatlist);
|
2018-01-31 09:53:51 +00:00
|
|
|
if (ecpointformats_len == 0) {
|
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR,
|
|
|
|
SSL_F_TLS_PARSE_STOC_EC_PT_FORMATS, SSL_R_BAD_LENGTH);
|
|
|
|
return 0;
|
|
|
|
}
|
2016-11-25 12:34:29 +00:00
|
|
|
|
2018-01-31 09:53:51 +00:00
|
|
|
s->session->ext.ecpointformats_len = 0;
|
2016-12-08 19:18:40 +00:00
|
|
|
OPENSSL_free(s->session->ext.ecpointformats);
|
|
|
|
s->session->ext.ecpointformats = OPENSSL_malloc(ecpointformats_len);
|
|
|
|
if (s->session->ext.ecpointformats == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_PARSE_STOC_EC_PT_FORMATS, ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-12-08 19:18:40 +00:00
|
|
|
s->session->ext.ecpointformats_len = ecpointformats_len;
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
if (!PACKET_copy_bytes(&ecptformatlist,
|
2016-12-08 19:18:40 +00:00
|
|
|
s->session->ext.ecpointformats,
|
|
|
|
ecpointformats_len)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS_PARSE_STOC_EC_PT_FORMATS, ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_session_ticket(SSL *s, PACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->ext.session_ticket_cb != NULL &&
|
|
|
|
!s->ext.session_ticket_cb(s, PACKET_data(pkt),
|
|
|
|
PACKET_remaining(pkt),
|
|
|
|
s->ext.session_ticket_cb_arg)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE,
|
|
|
|
SSL_F_TLS_PARSE_STOC_SESSION_TICKET, SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-12-07 17:04:46 +00:00
|
|
|
|
2017-05-16 16:28:23 +00:00
|
|
|
if (!tls_use_ticket(s)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION,
|
|
|
|
SSL_F_TLS_PARSE_STOC_SESSION_TICKET, SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2017-05-16 16:28:23 +00:00
|
|
|
if (PACKET_remaining(pkt) > 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR,
|
|
|
|
SSL_F_TLS_PARSE_STOC_SESSION_TICKET, SSL_R_BAD_EXTENSION);
|
2017-05-16 16:28:23 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-12-07 17:04:46 +00:00
|
|
|
|
2016-12-08 19:18:40 +00:00
|
|
|
s->ext.ticket_expected = 1;
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-11-25 16:28:02 +00:00
|
|
|
#ifndef OPENSSL_NO_OCSP
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_status_request(SSL *s, PACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
2018-03-02 15:02:11 +00:00
|
|
|
if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) {
|
|
|
|
/* We ignore this if the server sends a CertificateRequest */
|
|
|
|
/* TODO(TLS1.3): Add support for this */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
/*
|
2016-12-02 14:46:54 +00:00
|
|
|
* MUST only be sent if we've requested a status
|
|
|
|
* request message. In TLS <= 1.2 it must also be empty.
|
2016-11-25 12:34:29 +00:00
|
|
|
*/
|
2017-05-16 16:28:23 +00:00
|
|
|
if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION,
|
|
|
|
SSL_F_TLS_PARSE_STOC_STATUS_REQUEST, SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2017-05-16 16:28:23 +00:00
|
|
|
if (!SSL_IS_TLS13(s) && PACKET_remaining(pkt) > 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR,
|
|
|
|
SSL_F_TLS_PARSE_STOC_STATUS_REQUEST, SSL_R_BAD_EXTENSION);
|
2017-05-16 16:28:23 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-12-02 14:46:54 +00:00
|
|
|
|
|
|
|
if (SSL_IS_TLS13(s)) {
|
|
|
|
/* We only know how to handle this if it's for the first Certificate in
|
2017-02-17 22:13:26 +00:00
|
|
|
* the chain. We ignore any other responses.
|
2016-12-02 14:46:54 +00:00
|
|
|
*/
|
2017-01-05 16:12:56 +00:00
|
|
|
if (chainidx != 0)
|
2016-12-02 14:46:54 +00:00
|
|
|
return 1;
|
2017-11-21 17:18:43 +00:00
|
|
|
|
|
|
|
/* SSLfatal() already called */
|
|
|
|
return tls_process_cert_status_body(s, pkt);
|
2016-12-02 14:46:54 +00:00
|
|
|
}
|
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
/* Set flag to expect CertificateStatus message */
|
2016-12-08 19:18:40 +00:00
|
|
|
s->ext.status_expected = 1;
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
2016-11-25 16:28:02 +00:00
|
|
|
#endif
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_CT
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_sct(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
2018-03-02 15:02:11 +00:00
|
|
|
if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST) {
|
|
|
|
/* We ignore this if the server sends it in a CertificateRequest */
|
|
|
|
/* TODO(TLS1.3): Add support for this */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
/*
|
|
|
|
* Only take it if we asked for it - i.e if there is no CT validation
|
|
|
|
* callback set, then a custom extension MAY be processing it, so we
|
|
|
|
* need to let control continue to flow to that.
|
|
|
|
*/
|
|
|
|
if (s->ct_validation_callback != NULL) {
|
|
|
|
size_t size = PACKET_remaining(pkt);
|
|
|
|
|
|
|
|
/* Simply copy it off for later processing */
|
2016-12-08 19:18:40 +00:00
|
|
|
OPENSSL_free(s->ext.scts);
|
|
|
|
s->ext.scts = NULL;
|
2016-12-07 17:04:46 +00:00
|
|
|
|
2017-11-11 21:23:12 +00:00
|
|
|
s->ext.scts_len = (uint16_t)size;
|
2016-11-25 12:34:29 +00:00
|
|
|
if (size > 0) {
|
2016-12-08 19:18:40 +00:00
|
|
|
s->ext.scts = OPENSSL_malloc(size);
|
|
|
|
if (s->ext.scts == NULL
|
|
|
|
|| !PACKET_copy_bytes(pkt, s->ext.scts, size)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_SCT,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2017-05-09 12:44:25 +00:00
|
|
|
ENDPOINT role = (context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0
|
|
|
|
? ENDPOINT_CLIENT : ENDPOINT_BOTH;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we didn't ask for it then there must be a custom extension,
|
|
|
|
* otherwise this is unsolicited.
|
|
|
|
*/
|
|
|
|
if (custom_ext_find(&s->cert->custext, role,
|
|
|
|
TLSEXT_TYPE_signed_certificate_timestamp,
|
|
|
|
NULL) == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, TLS1_AD_UNSUPPORTED_EXTENSION, SSL_F_TLS_PARSE_STOC_SCT,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2017-05-09 12:44:25 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!custom_ext_parse(s, context,
|
2017-04-05 10:59:23 +00:00
|
|
|
TLSEXT_TYPE_signed_certificate_timestamp,
|
|
|
|
PACKET_data(pkt), PACKET_remaining(pkt),
|
2017-11-21 17:18:43 +00:00
|
|
|
x, chainidx)) {
|
|
|
|
/* SSLfatal already called */
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
2017-11-21 17:18:43 +00:00
|
|
|
}
|
2016-11-25 12:34:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
|
|
/*
|
|
|
|
* ssl_next_proto_validate validates a Next Protocol Negotiation block. No
|
|
|
|
* elements of zero length are allowed and the set of elements must exactly
|
|
|
|
* fill the length of the block. Returns 1 on success or 0 on failure.
|
|
|
|
*/
|
2017-11-21 17:18:43 +00:00
|
|
|
static int ssl_next_proto_validate(SSL *s, PACKET *pkt)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
|
|
|
PACKET tmp_protocol;
|
|
|
|
|
|
|
|
while (PACKET_remaining(pkt)) {
|
|
|
|
if (!PACKET_get_length_prefixed_1(pkt, &tmp_protocol)
|
2017-11-21 17:18:43 +00:00
|
|
|
|| PACKET_remaining(&tmp_protocol) == 0) {
|
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_SSL_NEXT_PROTO_VALIDATE,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
2017-11-21 17:18:43 +00:00
|
|
|
}
|
2016-11-25 12:34:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
|
|
|
unsigned char *selected;
|
|
|
|
unsigned char selected_len;
|
|
|
|
PACKET tmppkt;
|
|
|
|
|
2016-12-07 17:04:46 +00:00
|
|
|
/* Check if we are in a renegotiation. If so ignore this extension */
|
2017-01-10 23:02:28 +00:00
|
|
|
if (!SSL_IS_FIRST_HANDSHAKE(s))
|
2016-11-25 12:34:29 +00:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* We must have requested it. */
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->ctx->ext.npn_select_cb == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION, SSL_F_TLS_PARSE_STOC_NPN,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-12-07 17:04:46 +00:00
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
/* The data must be valid */
|
|
|
|
tmppkt = *pkt;
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!ssl_next_proto_validate(s, &tmppkt)) {
|
|
|
|
/* SSLfatal() already called */
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->ctx->ext.npn_select_cb(s, &selected, &selected_len,
|
|
|
|
PACKET_data(pkt),
|
|
|
|
PACKET_remaining(pkt),
|
|
|
|
s->ctx->ext.npn_select_cb_arg) !=
|
2016-11-25 12:34:29 +00:00
|
|
|
SSL_TLSEXT_ERR_OK) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_F_TLS_PARSE_STOC_NPN,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2016-12-07 17:04:46 +00:00
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
/*
|
|
|
|
* Could be non-NULL if server has sent multiple NPN extensions in
|
|
|
|
* a single Serverhello
|
|
|
|
*/
|
2016-12-08 19:18:40 +00:00
|
|
|
OPENSSL_free(s->ext.npn);
|
|
|
|
s->ext.npn = OPENSSL_malloc(selected_len);
|
|
|
|
if (s->ext.npn == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_NPN,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-12-08 19:18:40 +00:00
|
|
|
memcpy(s->ext.npn, selected, selected_len);
|
|
|
|
s->ext.npn_len = selected_len;
|
|
|
|
s->s3->npn_seen = 1;
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
/* We must have requested it. */
|
|
|
|
if (!s->s3->alpn_sent) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_UNSUPPORTED_EXTENSION, SSL_F_TLS_PARSE_STOC_ALPN,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/*-
|
|
|
|
* The extension data consists of:
|
|
|
|
* uint16 list_length
|
|
|
|
* uint8 proto_length;
|
|
|
|
* uint8 proto[proto_length];
|
|
|
|
*/
|
|
|
|
if (!PACKET_get_net_2_len(pkt, &len)
|
|
|
|
|| PACKET_remaining(pkt) != len || !PACKET_get_1_len(pkt, &len)
|
|
|
|
|| PACKET_remaining(pkt) != len) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_ALPN,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
OPENSSL_free(s->s3->alpn_selected);
|
|
|
|
s->s3->alpn_selected = OPENSSL_malloc(len);
|
|
|
|
if (s->s3->alpn_selected == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_ALPN,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!PACKET_copy_bytes(pkt, s->s3->alpn_selected, len)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_ALPN,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
s->s3->alpn_selected_len = len;
|
|
|
|
|
2017-08-31 13:32:51 +00:00
|
|
|
if (s->session->ext.alpn_selected == NULL
|
|
|
|
|| s->session->ext.alpn_selected_len != len
|
|
|
|
|| memcmp(s->session->ext.alpn_selected, s->s3->alpn_selected, len)
|
|
|
|
!= 0) {
|
2017-08-16 11:50:32 +00:00
|
|
|
/* ALPN not consistent with the old session so cannot use early_data */
|
|
|
|
s->ext.early_data_ok = 0;
|
|
|
|
}
|
|
|
|
if (!s->hit) {
|
2018-03-21 20:19:37 +00:00
|
|
|
/*
|
|
|
|
* This is a new session and so alpn_selected should have been
|
|
|
|
* initialised to NULL. We should update it with the selected ALPN.
|
|
|
|
*/
|
|
|
|
if (!ossl_assert(s->session->ext.alpn_selected == NULL)) {
|
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_ALPN,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
|
|
|
return 0;
|
|
|
|
}
|
2017-08-16 11:50:32 +00:00
|
|
|
s->session->ext.alpn_selected =
|
|
|
|
OPENSSL_memdup(s->s3->alpn_selected, s->s3->alpn_selected_len);
|
|
|
|
if (s->session->ext.alpn_selected == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_ALPN,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-08-16 11:50:32 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
s->session->ext.alpn_selected_len = s->s3->alpn_selected_len;
|
2017-07-31 10:42:48 +00:00
|
|
|
}
|
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_SRTP
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
|
|
|
unsigned int id, ct, mki;
|
|
|
|
int i;
|
|
|
|
STACK_OF(SRTP_PROTECTION_PROFILE) *clnt;
|
|
|
|
SRTP_PROTECTION_PROFILE *prof;
|
|
|
|
|
2016-12-07 17:04:46 +00:00
|
|
|
if (!PACKET_get_net_2(pkt, &ct) || ct != 2
|
|
|
|
|| !PACKET_get_net_2(pkt, &id)
|
|
|
|
|| !PACKET_get_1(pkt, &mki)
|
|
|
|
|| PACKET_remaining(pkt) != 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_USE_SRTP,
|
|
|
|
SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mki != 0) {
|
|
|
|
/* Must be no MKI, since we never offer one */
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_USE_SRTP,
|
|
|
|
SSL_R_BAD_SRTP_MKI_VALUE);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Throw an error if the server gave us an unsolicited extension */
|
2016-12-07 17:04:46 +00:00
|
|
|
clnt = SSL_get_srtp_profiles(s);
|
2016-11-25 12:34:29 +00:00
|
|
|
if (clnt == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_USE_SRTP,
|
|
|
|
SSL_R_NO_SRTP_PROFILES);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check to see if the server gave us something we support (and
|
|
|
|
* presumably offered)
|
|
|
|
*/
|
|
|
|
for (i = 0; i < sk_SRTP_PROTECTION_PROFILE_num(clnt); i++) {
|
|
|
|
prof = sk_SRTP_PROTECTION_PROFILE_value(clnt, i);
|
|
|
|
|
|
|
|
if (prof->id == id) {
|
|
|
|
s->srtp_profile = prof;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_USE_SRTP,
|
|
|
|
SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
|
|
|
/* Ignore if inappropriate ciphersuite */
|
|
|
|
if (!(s->options & SSL_OP_NO_ENCRYPT_THEN_MAC)
|
|
|
|
&& s->s3->tmp.new_cipher->algorithm_mac != SSL_AEAD
|
|
|
|
&& s->s3->tmp.new_cipher->algorithm_enc != SSL_RC4)
|
2017-02-03 14:06:20 +00:00
|
|
|
s->ext.use_etm = 1;
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
|
|
|
s->s3->flags |= TLS1_FLAGS_RECEIVED_EXTMS;
|
|
|
|
if (!s->hit)
|
|
|
|
s->session->flags |= SSL_SESS_FLAG_EXTMS;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-11-03 16:38:48 +00:00
|
|
|
int tls_parse_stoc_supported_versions(SSL *s, PACKET *pkt, unsigned int context,
|
|
|
|
X509 *x, size_t chainidx)
|
|
|
|
{
|
|
|
|
unsigned int version;
|
|
|
|
|
|
|
|
if (!PACKET_get_net_2(pkt, &version)
|
|
|
|
|| PACKET_remaining(pkt) != 0) {
|
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR,
|
|
|
|
SSL_F_TLS_PARSE_STOC_SUPPORTED_VERSIONS,
|
|
|
|
SSL_R_LENGTH_MISMATCH);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-03-13 10:36:03 +00:00
|
|
|
/*
|
|
|
|
* The only protocol version we support which is valid in this extension in
|
|
|
|
* a ServerHello is TLSv1.3 therefore we shouldn't be getting anything else.
|
|
|
|
*/
|
|
|
|
if (version != TLS1_3_VERSION) {
|
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS_PARSE_STOC_SUPPORTED_VERSIONS,
|
|
|
|
SSL_R_BAD_PROTOCOL_VERSION_NUMBER);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-12-05 10:16:25 +00:00
|
|
|
/* We ignore this extension for HRRs except to sanity check it */
|
2018-03-13 10:36:03 +00:00
|
|
|
if (context == SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST)
|
2017-12-05 10:16:25 +00:00
|
|
|
return 1;
|
|
|
|
|
2017-11-03 16:38:48 +00:00
|
|
|
/* We just set it here. We validate it in ssl_choose_client_version */
|
|
|
|
s->version = version;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2016-11-25 12:34:29 +00:00
|
|
|
{
|
2016-12-28 15:32:39 +00:00
|
|
|
#ifndef OPENSSL_NO_TLS1_3
|
2016-11-25 12:34:29 +00:00
|
|
|
unsigned int group_id;
|
|
|
|
PACKET encoded_pt;
|
|
|
|
EVP_PKEY *ckey = s->s3->tmp.pkey, *skey = NULL;
|
|
|
|
|
|
|
|
/* Sanity check */
|
2017-04-03 14:24:06 +00:00
|
|
|
if (ckey == NULL || s->s3->peer_tmp != NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_KEY_SHARE,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!PACKET_get_net_2(pkt, &group_id)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_KEY_SHARE,
|
|
|
|
SSL_R_LENGTH_MISMATCH);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-04-04 10:40:02 +00:00
|
|
|
if ((context & SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) != 0) {
|
2017-09-26 14:41:34 +00:00
|
|
|
const uint16_t *pgroups = NULL;
|
|
|
|
size_t i, num_groups;
|
2017-02-01 13:31:27 +00:00
|
|
|
|
|
|
|
if (PACKET_remaining(pkt) != 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_KEY_SHARE,
|
|
|
|
SSL_R_LENGTH_MISMATCH);
|
2017-02-01 13:31:27 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* It is an error if the HelloRetryRequest wants a key_share that we
|
|
|
|
* already sent in the first ClientHello
|
|
|
|
*/
|
|
|
|
if (group_id == s->s3->group_id) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_BAD_KEY_SHARE);
|
2017-02-01 13:31:27 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Validate the selected group is one we support */
|
2017-09-26 14:41:34 +00:00
|
|
|
tls1_get_supported_groups(s, &pgroups, &num_groups);
|
|
|
|
for (i = 0; i < num_groups; i++) {
|
|
|
|
if (group_id == pgroups[i])
|
2017-02-01 13:31:27 +00:00
|
|
|
break;
|
|
|
|
}
|
2017-09-26 14:41:34 +00:00
|
|
|
if (i >= num_groups
|
2017-09-22 15:06:52 +00:00
|
|
|
|| !tls_curve_allowed(s, group_id, SSL_SECOP_CURVE_SUPPORTED)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_BAD_KEY_SHARE);
|
2017-02-01 13:31:27 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->s3->group_id = group_id;
|
|
|
|
EVP_PKEY_free(s->s3->tmp.pkey);
|
|
|
|
s->s3->tmp.pkey = NULL;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-11-25 12:34:29 +00:00
|
|
|
if (group_id != s->s3->group_id) {
|
|
|
|
/*
|
|
|
|
* This isn't for the group that we sent in the original
|
|
|
|
* key_share!
|
|
|
|
*/
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_KEY_SHARE,
|
|
|
|
SSL_R_BAD_KEY_SHARE);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!PACKET_as_length_prefixed_2(pkt, &encoded_pt)
|
|
|
|
|| PACKET_remaining(&encoded_pt) == 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_KEY_SHARE,
|
|
|
|
SSL_R_LENGTH_MISMATCH);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
skey = ssl_generate_pkey(ckey);
|
|
|
|
if (skey == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_KEY_SHARE,
|
|
|
|
ERR_R_MALLOC_FAILURE);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!EVP_PKEY_set1_tls_encodedpoint(skey, PACKET_data(&encoded_pt),
|
|
|
|
PACKET_remaining(&encoded_pt))) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_KEY_SHARE,
|
|
|
|
SSL_R_BAD_ECPOINT);
|
2016-12-18 11:48:49 +00:00
|
|
|
EVP_PKEY_free(skey);
|
2016-11-25 12:34:29 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ssl_derive(s, ckey, skey, 1) == 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
/* SSLfatal() already called */
|
2016-11-25 12:34:29 +00:00
|
|
|
EVP_PKEY_free(skey);
|
|
|
|
return 0;
|
|
|
|
}
|
2017-04-03 14:24:06 +00:00
|
|
|
s->s3->peer_tmp = skey;
|
2016-12-28 15:32:39 +00:00
|
|
|
#endif
|
2016-11-25 12:34:29 +00:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
2017-01-18 09:38:53 +00:00
|
|
|
|
2017-03-02 17:37:03 +00:00
|
|
|
int tls_parse_stoc_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2017-03-02 17:37:03 +00:00
|
|
|
{
|
|
|
|
PACKET cookie;
|
|
|
|
|
|
|
|
if (!PACKET_as_length_prefixed_2(pkt, &cookie)
|
|
|
|
|| !PACKET_memdup(&cookie, &s->ext.tls13_cookie,
|
|
|
|
&s->ext.tls13_cookie_len)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_COOKIE,
|
|
|
|
SSL_R_LENGTH_MISMATCH);
|
2017-03-02 17:37:03 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-02-24 11:13:25 +00:00
|
|
|
int tls_parse_stoc_early_data(SSL *s, PACKET *pkt, unsigned int context,
|
2017-11-21 17:18:43 +00:00
|
|
|
X509 *x, size_t chainidx)
|
2017-02-24 11:13:25 +00:00
|
|
|
{
|
2017-04-04 10:40:02 +00:00
|
|
|
if (context == SSL_EXT_TLS1_3_NEW_SESSION_TICKET) {
|
2017-03-09 15:31:55 +00:00
|
|
|
unsigned long max_early_data;
|
|
|
|
|
|
|
|
if (!PACKET_get_net_4(pkt, &max_early_data)
|
|
|
|
|| PACKET_remaining(pkt) != 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_EARLY_DATA,
|
|
|
|
SSL_R_INVALID_MAX_EARLY_DATA);
|
2017-03-09 15:31:55 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->session->ext.max_early_data = max_early_data;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-02-24 11:13:25 +00:00
|
|
|
if (PACKET_remaining(pkt) != 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_EARLY_DATA,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2017-02-24 11:13:25 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-08-16 11:50:32 +00:00
|
|
|
if (!s->ext.early_data_ok
|
2017-02-24 11:13:25 +00:00
|
|
|
|| !s->hit
|
|
|
|
|| s->session->ext.tick_identity != 0) {
|
|
|
|
/*
|
|
|
|
* If we get here then we didn't send early data, or we didn't resume
|
2017-08-16 11:50:32 +00:00
|
|
|
* using the first identity, or the SNI/ALPN is not consistent so the
|
|
|
|
* server should not be accepting it.
|
2017-02-24 11:13:25 +00:00
|
|
|
*/
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_EARLY_DATA,
|
|
|
|
SSL_R_BAD_EXTENSION);
|
2017-02-24 11:13:25 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->ext.early_data = SSL_EARLY_DATA_ACCEPTED;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-01-31 17:00:12 +00:00
|
|
|
int tls_parse_stoc_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
2017-11-21 17:18:43 +00:00
|
|
|
size_t chainidx)
|
2017-01-18 09:38:53 +00:00
|
|
|
{
|
|
|
|
#ifndef OPENSSL_NO_TLS1_3
|
|
|
|
unsigned int identity;
|
|
|
|
|
|
|
|
if (!PACKET_get_net_2(pkt, &identity) || PACKET_remaining(pkt) != 0) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PARSE_STOC_PSK,
|
|
|
|
SSL_R_LENGTH_MISMATCH);
|
2017-01-18 09:38:53 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-06-12 12:30:21 +00:00
|
|
|
if (s->session->ext.tick_identity == (int)identity) {
|
|
|
|
s->hit = 1;
|
|
|
|
SSL_SESSION_free(s->psksession);
|
|
|
|
s->psksession = NULL;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s->psksession == NULL
|
|
|
|
|| s->psksession->ext.tick_identity != (int)identity) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS_PARSE_STOC_PSK,
|
|
|
|
SSL_R_BAD_PSK_IDENTITY);
|
2017-01-18 09:38:53 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-07-05 19:53:03 +00:00
|
|
|
/*
|
|
|
|
* If we used the external PSK for sending early_data then s->early_secret
|
|
|
|
* is already set up, so don't overwrite it. Otherwise we copy the
|
|
|
|
* early_secret across that we generated earlier.
|
|
|
|
*/
|
|
|
|
if ((s->early_data_state != SSL_EARLY_DATA_WRITE_RETRY
|
|
|
|
&& s->early_data_state != SSL_EARLY_DATA_FINISHED_WRITING)
|
|
|
|
|| s->session->ext.max_early_data > 0
|
|
|
|
|| s->psksession->ext.max_early_data == 0)
|
|
|
|
memcpy(s->early_secret, s->psksession->early_secret, EVP_MAX_MD_SIZE);
|
|
|
|
|
2017-06-12 12:30:21 +00:00
|
|
|
SSL_SESSION_free(s->session);
|
|
|
|
s->session = s->psksession;
|
|
|
|
s->psksession = NULL;
|
2017-01-18 09:38:53 +00:00
|
|
|
s->hit = 1;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|