2016-05-17 18:18:30 +00:00
|
|
|
/*
|
2018-01-09 04:49:01 +00:00
|
|
|
* Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2006-01-03 03:27:19 +00:00
|
|
|
*
|
2018-12-06 12:08:51 +00:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-17 18:18:30 +00:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2006-01-03 03:27:19 +00:00
|
|
|
*/
|
1998-12-21 10:56:39 +00:00
|
|
|
|
|
|
|
#include <stdio.h>
|
2016-02-19 16:24:44 +00:00
|
|
|
#include <stdlib.h>
|
1999-04-23 22:13:45 +00:00
|
|
|
#include <openssl/objects.h>
|
2007-08-11 23:18:29 +00:00
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/hmac.h>
|
2007-09-26 21:56:59 +00:00
|
|
|
#include <openssl/ocsp.h>
|
2016-04-20 15:38:29 +00:00
|
|
|
#include <openssl/conf.h>
|
|
|
|
#include <openssl/x509v3.h>
|
2016-03-18 18:30:20 +00:00
|
|
|
#include <openssl/dh.h>
|
|
|
|
#include <openssl/bn.h>
|
2017-08-18 03:52:46 +00:00
|
|
|
#include "internal/nelem.h"
|
1998-12-21 10:56:39 +00:00
|
|
|
#include "ssl_locl.h"
|
2016-03-18 18:30:20 +00:00
|
|
|
#include <openssl/ct.h>
|
1998-12-21 10:56:39 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
SSL3_ENC_METHOD const TLSv1_enc_data = {
|
|
|
|
tls1_enc,
|
|
|
|
tls1_mac,
|
|
|
|
tls1_setup_key_block,
|
|
|
|
tls1_generate_master_secret,
|
|
|
|
tls1_change_cipher_state,
|
|
|
|
tls1_final_finish_mac,
|
|
|
|
TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE,
|
|
|
|
TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE,
|
|
|
|
tls1_alert_code,
|
|
|
|
tls1_export_keying_material,
|
|
|
|
0,
|
2016-09-29 21:40:15 +00:00
|
|
|
ssl3_set_handshake_header,
|
2016-08-03 19:57:52 +00:00
|
|
|
tls_close_construct_packet,
|
2015-01-22 03:40:55 +00:00
|
|
|
ssl3_handshake_write
|
|
|
|
};
|
|
|
|
|
|
|
|
SSL3_ENC_METHOD const TLSv1_1_enc_data = {
|
|
|
|
tls1_enc,
|
|
|
|
tls1_mac,
|
|
|
|
tls1_setup_key_block,
|
|
|
|
tls1_generate_master_secret,
|
|
|
|
tls1_change_cipher_state,
|
|
|
|
tls1_final_finish_mac,
|
|
|
|
TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE,
|
|
|
|
TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE,
|
|
|
|
tls1_alert_code,
|
|
|
|
tls1_export_keying_material,
|
|
|
|
SSL_ENC_FLAG_EXPLICIT_IV,
|
2016-09-29 21:40:15 +00:00
|
|
|
ssl3_set_handshake_header,
|
2016-08-03 19:57:52 +00:00
|
|
|
tls_close_construct_packet,
|
2015-01-22 03:40:55 +00:00
|
|
|
ssl3_handshake_write
|
|
|
|
};
|
|
|
|
|
|
|
|
SSL3_ENC_METHOD const TLSv1_2_enc_data = {
|
|
|
|
tls1_enc,
|
|
|
|
tls1_mac,
|
|
|
|
tls1_setup_key_block,
|
|
|
|
tls1_generate_master_secret,
|
|
|
|
tls1_change_cipher_state,
|
|
|
|
tls1_final_finish_mac,
|
|
|
|
TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE,
|
|
|
|
TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE,
|
|
|
|
tls1_alert_code,
|
|
|
|
tls1_export_keying_material,
|
|
|
|
SSL_ENC_FLAG_EXPLICIT_IV | SSL_ENC_FLAG_SIGALGS | SSL_ENC_FLAG_SHA256_PRF
|
|
|
|
| SSL_ENC_FLAG_TLS1_2_CIPHERS,
|
2016-09-29 21:40:15 +00:00
|
|
|
ssl3_set_handshake_header,
|
2016-08-03 19:57:52 +00:00
|
|
|
tls_close_construct_packet,
|
2015-01-22 03:40:55 +00:00
|
|
|
ssl3_handshake_write
|
|
|
|
};
|
1998-12-21 10:56:39 +00:00
|
|
|
|
2016-10-21 16:39:33 +00:00
|
|
|
SSL3_ENC_METHOD const TLSv1_3_enc_data = {
|
2016-11-17 18:00:17 +00:00
|
|
|
tls13_enc,
|
2016-10-21 16:39:33 +00:00
|
|
|
tls1_mac,
|
2016-11-09 14:06:12 +00:00
|
|
|
tls13_setup_key_block,
|
|
|
|
tls13_generate_master_secret,
|
|
|
|
tls13_change_cipher_state,
|
|
|
|
tls13_final_finish_mac,
|
2016-10-21 16:39:33 +00:00
|
|
|
TLS_MD_CLIENT_FINISH_CONST, TLS_MD_CLIENT_FINISH_CONST_SIZE,
|
|
|
|
TLS_MD_SERVER_FINISH_CONST, TLS_MD_SERVER_FINISH_CONST_SIZE,
|
2016-12-30 11:26:39 +00:00
|
|
|
tls13_alert_code,
|
2017-06-27 13:57:15 +00:00
|
|
|
tls13_export_keying_material,
|
2016-11-17 18:00:17 +00:00
|
|
|
SSL_ENC_FLAG_SIGALGS | SSL_ENC_FLAG_SHA256_PRF,
|
2016-10-21 16:39:33 +00:00
|
|
|
ssl3_set_handshake_header,
|
|
|
|
tls_close_construct_packet,
|
|
|
|
ssl3_handshake_write
|
|
|
|
};
|
|
|
|
|
2005-08-05 23:56:11 +00:00
|
|
|
long tls1_default_timeout(void)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* 2 hours, the 24 hours mentioned in the TLSv1 spec is way too long for
|
|
|
|
* http, the cache would over fill
|
|
|
|
*/
|
|
|
|
return (60 * 60 * 2);
|
|
|
|
}
|
1998-12-21 10:56:39 +00:00
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
int tls1_new(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
if (!ssl3_new(s))
|
2017-05-22 11:33:42 +00:00
|
|
|
return 0;
|
|
|
|
if (!s->method->ssl_clear(s))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
1998-12-21 10:56:39 +00:00
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
void tls1_free(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-12-08 19:18:40 +00:00
|
|
|
OPENSSL_free(s->ext.session_ticket);
|
2015-01-22 03:40:55 +00:00
|
|
|
ssl3_free(s);
|
|
|
|
}
|
1998-12-21 10:56:39 +00:00
|
|
|
|
2017-05-22 11:33:42 +00:00
|
|
|
int tls1_clear(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-05-22 11:33:42 +00:00
|
|
|
if (!ssl3_clear(s))
|
|
|
|
return 0;
|
|
|
|
|
2015-12-29 08:24:17 +00:00
|
|
|
if (s->method->version == TLS_ANY_VERSION)
|
2018-12-09 19:53:05 +00:00
|
|
|
s->version = TLS_MAX_VERSION_INTERNAL;
|
2015-12-29 08:24:17 +00:00
|
|
|
else
|
|
|
|
s->version = s->method->version;
|
2017-05-22 11:33:42 +00:00
|
|
|
|
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
1998-12-21 10:56:39 +00:00
|
|
|
|
2016-02-13 15:27:43 +00:00
|
|
|
/*
|
2019-06-13 10:06:12 +00:00
|
|
|
* Table of group information.
|
2016-02-13 15:27:43 +00:00
|
|
|
*/
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)
|
2017-09-22 22:47:54 +00:00
|
|
|
static const TLS_GROUP_INFO nid_list[] = {
|
2019-06-13 18:34:37 +00:00
|
|
|
# ifndef OPENSSL_NO_EC
|
2019-01-25 15:34:49 +00:00
|
|
|
{NID_sect163k1, 80, TLS_GROUP_CURVE_CHAR2, 0x0001}, /* sect163k1 (1) */
|
|
|
|
{NID_sect163r1, 80, TLS_GROUP_CURVE_CHAR2, 0x0002}, /* sect163r1 (2) */
|
|
|
|
{NID_sect163r2, 80, TLS_GROUP_CURVE_CHAR2, 0x0003}, /* sect163r2 (3) */
|
|
|
|
{NID_sect193r1, 80, TLS_GROUP_CURVE_CHAR2, 0x0004}, /* sect193r1 (4) */
|
|
|
|
{NID_sect193r2, 80, TLS_GROUP_CURVE_CHAR2, 0x0005}, /* sect193r2 (5) */
|
|
|
|
{NID_sect233k1, 112, TLS_GROUP_CURVE_CHAR2, 0x0006}, /* sect233k1 (6) */
|
|
|
|
{NID_sect233r1, 112, TLS_GROUP_CURVE_CHAR2, 0x0007}, /* sect233r1 (7) */
|
|
|
|
{NID_sect239k1, 112, TLS_GROUP_CURVE_CHAR2, 0x0008}, /* sect239k1 (8) */
|
|
|
|
{NID_sect283k1, 128, TLS_GROUP_CURVE_CHAR2, 0x0009}, /* sect283k1 (9) */
|
|
|
|
{NID_sect283r1, 128, TLS_GROUP_CURVE_CHAR2, 0x000A}, /* sect283r1 (10) */
|
|
|
|
{NID_sect409k1, 192, TLS_GROUP_CURVE_CHAR2, 0x000B}, /* sect409k1 (11) */
|
|
|
|
{NID_sect409r1, 192, TLS_GROUP_CURVE_CHAR2, 0x000C}, /* sect409r1 (12) */
|
|
|
|
{NID_sect571k1, 256, TLS_GROUP_CURVE_CHAR2, 0x000D}, /* sect571k1 (13) */
|
|
|
|
{NID_sect571r1, 256, TLS_GROUP_CURVE_CHAR2, 0x000E}, /* sect571r1 (14) */
|
|
|
|
{NID_secp160k1, 80, TLS_GROUP_CURVE_PRIME, 0x000F}, /* secp160k1 (15) */
|
|
|
|
{NID_secp160r1, 80, TLS_GROUP_CURVE_PRIME, 0x0010}, /* secp160r1 (16) */
|
|
|
|
{NID_secp160r2, 80, TLS_GROUP_CURVE_PRIME, 0x0011}, /* secp160r2 (17) */
|
|
|
|
{NID_secp192k1, 80, TLS_GROUP_CURVE_PRIME, 0x0012}, /* secp192k1 (18) */
|
|
|
|
{NID_X9_62_prime192v1, 80, TLS_GROUP_CURVE_PRIME, 0x0013}, /* secp192r1 (19) */
|
|
|
|
{NID_secp224k1, 112, TLS_GROUP_CURVE_PRIME, 0x0014}, /* secp224k1 (20) */
|
|
|
|
{NID_secp224r1, 112, TLS_GROUP_CURVE_PRIME, 0x0015}, /* secp224r1 (21) */
|
|
|
|
{NID_secp256k1, 128, TLS_GROUP_CURVE_PRIME, 0x0016}, /* secp256k1 (22) */
|
|
|
|
{NID_X9_62_prime256v1, 128, TLS_GROUP_CURVE_PRIME, 0x0017}, /* secp256r1 (23) */
|
|
|
|
{NID_secp384r1, 192, TLS_GROUP_CURVE_PRIME, 0x0018}, /* secp384r1 (24) */
|
|
|
|
{NID_secp521r1, 256, TLS_GROUP_CURVE_PRIME, 0x0019}, /* secp521r1 (25) */
|
|
|
|
{NID_brainpoolP256r1, 128, TLS_GROUP_CURVE_PRIME, 0x001A}, /* brainpoolP256r1 (26) */
|
|
|
|
{NID_brainpoolP384r1, 192, TLS_GROUP_CURVE_PRIME, 0x001B}, /* brainpoolP384r1 (27) */
|
|
|
|
{NID_brainpoolP512r1, 256, TLS_GROUP_CURVE_PRIME, 0x001C}, /* brainpool512r1 (28) */
|
|
|
|
{EVP_PKEY_X25519, 128, TLS_GROUP_CURVE_CUSTOM, 0x001D}, /* X25519 (29) */
|
|
|
|
{EVP_PKEY_X448, 224, TLS_GROUP_CURVE_CUSTOM, 0x001E}, /* X448 (30) */
|
2019-06-13 18:34:37 +00:00
|
|
|
# endif /* OPENSSL_NO_EC */
|
|
|
|
# ifndef OPENSSL_NO_DH
|
2019-01-25 15:34:49 +00:00
|
|
|
/* Security bit values for FFDHE groups are updated as per RFC 7919 */
|
|
|
|
{NID_ffdhe2048, 103, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0100}, /* ffdhe2048 (0x0100) */
|
|
|
|
{NID_ffdhe3072, 125, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0101}, /* ffdhe3072 (0x0101) */
|
|
|
|
{NID_ffdhe4096, 150, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0102}, /* ffdhe4096 (0x0102) */
|
|
|
|
{NID_ffdhe6144, 175, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0103}, /* ffdhe6144 (0x0103) */
|
|
|
|
{NID_ffdhe8192, 192, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0104}, /* ffdhe8192 (0x0104) */
|
2019-06-13 18:34:37 +00:00
|
|
|
# endif /* OPENSSL_NO_DH */
|
2015-01-22 03:40:55 +00:00
|
|
|
};
|
2019-06-13 18:34:37 +00:00
|
|
|
#endif
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2019-06-13 10:06:12 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2015-01-22 03:40:55 +00:00
|
|
|
static const unsigned char ecformats_default[] = {
|
|
|
|
TLSEXT_ECPOINTFORMAT_uncompressed,
|
|
|
|
TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime,
|
|
|
|
TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2
|
|
|
|
};
|
2019-06-13 18:34:37 +00:00
|
|
|
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) */
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2015-12-04 21:30:36 +00:00
|
|
|
/* The default curves */
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)
|
2019-01-25 15:34:49 +00:00
|
|
|
static const uint16_t supported_groups_default[] = {
|
2019-06-13 18:34:37 +00:00
|
|
|
# ifndef OPENSSL_NO_EC
|
2017-09-22 15:06:52 +00:00
|
|
|
29, /* X25519 (29) */
|
|
|
|
23, /* secp256r1 (23) */
|
2018-02-27 10:12:02 +00:00
|
|
|
30, /* X448 (30) */
|
2017-09-22 15:06:52 +00:00
|
|
|
25, /* secp521r1 (25) */
|
|
|
|
24, /* secp384r1 (24) */
|
2019-06-13 18:34:37 +00:00
|
|
|
# endif
|
|
|
|
# ifndef OPENSSL_NO_DH
|
2019-01-25 15:34:49 +00:00
|
|
|
0x100, /* ffdhe2048 (0x100) */
|
|
|
|
0x101, /* ffdhe3072 (0x101) */
|
|
|
|
0x102, /* ffdhe4096 (0x102) */
|
|
|
|
0x103, /* ffdhe6144 (0x103) */
|
|
|
|
0x104, /* ffdhe8192 (0x104) */
|
2019-06-13 18:34:37 +00:00
|
|
|
# endif
|
2015-05-20 13:47:51 +00:00
|
|
|
};
|
2019-06-13 18:34:37 +00:00
|
|
|
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) */
|
2015-05-20 13:47:51 +00:00
|
|
|
|
2019-06-13 10:06:12 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2017-09-22 15:06:52 +00:00
|
|
|
static const uint16_t suiteb_curves[] = {
|
|
|
|
TLSEXT_curve_P_256,
|
|
|
|
TLSEXT_curve_P_384
|
2015-01-22 03:40:55 +00:00
|
|
|
};
|
2019-06-13 10:06:12 +00:00
|
|
|
#endif
|
2012-08-15 15:15:05 +00:00
|
|
|
|
2017-09-26 14:41:34 +00:00
|
|
|
const TLS_GROUP_INFO *tls1_group_id_lookup(uint16_t group_id)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)
|
2019-01-25 15:34:49 +00:00
|
|
|
size_t i;
|
|
|
|
|
|
|
|
/* ECC curves from RFC 4492 and RFC 7027 FFDHE group from RFC 8446 */
|
|
|
|
for (i = 0; i < OSSL_NELEM(nid_list); i++) {
|
|
|
|
if (nid_list[i].group_id == group_id)
|
|
|
|
return &nid_list[i];
|
|
|
|
}
|
2019-06-13 18:34:37 +00:00
|
|
|
#endif /* !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC) */
|
2019-01-25 15:34:49 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2007-08-12 23:59:05 +00:00
|
|
|
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)
|
2019-07-08 09:20:59 +00:00
|
|
|
int tls1_group_id2nid(uint16_t group_id)
|
|
|
|
{
|
|
|
|
const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(group_id);
|
|
|
|
|
|
|
|
return ginf == NULL ? NID_undef : ginf->nid;
|
|
|
|
}
|
|
|
|
|
2017-09-24 00:45:27 +00:00
|
|
|
static uint16_t tls1_nid2group_id(int nid)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-02-13 15:28:25 +00:00
|
|
|
size_t i;
|
2019-01-25 15:34:49 +00:00
|
|
|
|
2016-02-13 15:28:25 +00:00
|
|
|
for (i = 0; i < OSSL_NELEM(nid_list); i++) {
|
|
|
|
if (nid_list[i].nid == nid)
|
2019-01-25 15:34:49 +00:00
|
|
|
return nid_list[i].group_id;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-02-13 15:28:25 +00:00
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2019-06-13 18:34:37 +00:00
|
|
|
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) */
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2014-12-01 15:55:55 +00:00
|
|
|
/*
|
2017-09-26 14:28:16 +00:00
|
|
|
* Set *pgroups to the supported groups list and *pgroupslen to
|
|
|
|
* the number of groups supported.
|
2012-04-04 14:41:01 +00:00
|
|
|
*/
|
2017-09-26 14:28:16 +00:00
|
|
|
void tls1_get_supported_groups(SSL *s, const uint16_t **pgroups,
|
|
|
|
size_t *pgroupslen)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
|
2017-09-24 02:26:26 +00:00
|
|
|
/* For Suite B mode only include P-256, P-384 */
|
|
|
|
switch (tls1_suiteb(s)) {
|
2019-06-13 18:34:37 +00:00
|
|
|
# ifndef OPENSSL_NO_EC
|
2017-09-24 02:26:26 +00:00
|
|
|
case SSL_CERT_FLAG_SUITEB_128_LOS:
|
2017-09-26 14:28:16 +00:00
|
|
|
*pgroups = suiteb_curves;
|
|
|
|
*pgroupslen = OSSL_NELEM(suiteb_curves);
|
2017-09-24 02:26:26 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_CERT_FLAG_SUITEB_128_LOS_ONLY:
|
2017-09-26 14:28:16 +00:00
|
|
|
*pgroups = suiteb_curves;
|
|
|
|
*pgroupslen = 1;
|
2017-09-24 02:26:26 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_CERT_FLAG_SUITEB_192_LOS:
|
2017-09-26 14:28:16 +00:00
|
|
|
*pgroups = suiteb_curves + 1;
|
|
|
|
*pgroupslen = 1;
|
2017-09-24 02:26:26 +00:00
|
|
|
break;
|
2019-06-13 18:34:37 +00:00
|
|
|
# endif
|
2017-09-24 02:26:26 +00:00
|
|
|
|
|
|
|
default:
|
|
|
|
if (s->ext.supportedgroups == NULL) {
|
2019-01-25 15:34:49 +00:00
|
|
|
*pgroups = supported_groups_default;
|
|
|
|
*pgroupslen = OSSL_NELEM(supported_groups_default);
|
2017-09-24 02:26:26 +00:00
|
|
|
} else {
|
2017-09-26 14:28:16 +00:00
|
|
|
*pgroups = s->ext.supportedgroups;
|
|
|
|
*pgroupslen = s->ext.supportedgroups_len;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2017-09-24 02:26:26 +00:00
|
|
|
break;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2019-06-13 18:34:37 +00:00
|
|
|
#else
|
|
|
|
*pgroups = NULL;
|
|
|
|
*pgroupslen = 0;
|
|
|
|
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) */
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2013-12-15 13:32:24 +00:00
|
|
|
|
2019-01-25 15:34:49 +00:00
|
|
|
int tls_valid_group(SSL *s, uint16_t group_id, int version)
|
|
|
|
{
|
|
|
|
const TLS_GROUP_INFO *ginfo = tls1_group_id_lookup(group_id);
|
|
|
|
|
|
|
|
if (version < TLS1_3_VERSION) {
|
|
|
|
if ((ginfo->flags & TLS_GROUP_ONLY_FOR_TLS1_3) != 0)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-06-13 10:06:12 +00:00
|
|
|
/* See if group is allowed by security callback */
|
|
|
|
int tls_group_allowed(SSL *s, uint16_t group, int op)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2019-06-13 10:06:12 +00:00
|
|
|
const TLS_GROUP_INFO *ginfo = tls1_group_id_lookup(group);
|
|
|
|
unsigned char gtmp[2];
|
2017-09-24 20:58:58 +00:00
|
|
|
|
2019-06-13 10:06:12 +00:00
|
|
|
if (ginfo == NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2019-06-13 10:06:12 +00:00
|
|
|
#ifdef OPENSSL_NO_EC2M
|
|
|
|
if (ginfo->flags & TLS_GROUP_CURVE_CHAR2)
|
2019-01-25 15:34:49 +00:00
|
|
|
return 0;
|
2019-06-13 10:06:12 +00:00
|
|
|
#endif
|
|
|
|
#ifdef OPENSSL_NO_DH
|
|
|
|
if (ginfo->flags & TLS_GROUP_FFDHE)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2019-06-13 10:06:12 +00:00
|
|
|
#endif
|
|
|
|
gtmp[0] = group >> 8;
|
|
|
|
gtmp[1] = group & 0xff;
|
|
|
|
return ssl_security(s, op, ginfo->secbits, ginfo->nid, (void *)gtmp);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2013-12-15 13:32:24 +00:00
|
|
|
|
2017-09-24 20:59:39 +00:00
|
|
|
/* Return 1 if "id" is in "list" */
|
|
|
|
static int tls1_in_list(uint16_t id, const uint16_t *list, size_t listlen)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < listlen; i++)
|
|
|
|
if (list[i] == id)
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-12-28 02:48:40 +00:00
|
|
|
/*-
|
2017-09-22 22:43:03 +00:00
|
|
|
* For nmatch >= 0, return the id of the |nmatch|th shared group or 0
|
2015-12-04 21:25:11 +00:00
|
|
|
* if there is no match.
|
|
|
|
* For nmatch == -1, return number of matches
|
2017-09-22 22:43:03 +00:00
|
|
|
* For nmatch == -2, return the id of the group to use for
|
2017-09-24 20:59:39 +00:00
|
|
|
* a tmp key, or 0 if there is no match.
|
2012-03-28 15:05:04 +00:00
|
|
|
*/
|
2017-09-22 22:43:03 +00:00
|
|
|
uint16_t tls1_shared_group(SSL *s, int nmatch)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-09-22 15:06:52 +00:00
|
|
|
const uint16_t *pref, *supp;
|
2017-09-24 20:59:39 +00:00
|
|
|
size_t num_pref, num_supp, i;
|
2015-01-22 03:40:55 +00:00
|
|
|
int k;
|
2016-09-19 17:09:58 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/* Can't do anything on client side */
|
|
|
|
if (s->server == 0)
|
2017-09-22 22:43:03 +00:00
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
if (nmatch == -2) {
|
|
|
|
if (tls1_suiteb(s)) {
|
|
|
|
/*
|
|
|
|
* For Suite B ciphersuite determines curve: we already know
|
|
|
|
* these are acceptable due to previous checks.
|
|
|
|
*/
|
2018-12-12 18:09:50 +00:00
|
|
|
unsigned long cid = s->s3.tmp.new_cipher->id;
|
2016-09-19 17:09:58 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256)
|
2017-09-22 22:43:03 +00:00
|
|
|
return TLSEXT_curve_P_256;
|
2015-01-22 03:40:55 +00:00
|
|
|
if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384)
|
2017-09-22 22:43:03 +00:00
|
|
|
return TLSEXT_curve_P_384;
|
2015-01-22 03:40:55 +00:00
|
|
|
/* Should never happen */
|
2017-09-22 22:43:03 +00:00
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
/* If not Suite B just return first preference shared curve */
|
|
|
|
nmatch = 0;
|
|
|
|
}
|
|
|
|
/*
|
2017-09-26 14:28:16 +00:00
|
|
|
* If server preference set, our groups are the preference order
|
|
|
|
* otherwise peer decides.
|
2015-01-22 03:40:55 +00:00
|
|
|
*/
|
2017-09-26 14:28:16 +00:00
|
|
|
if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) {
|
|
|
|
tls1_get_supported_groups(s, &pref, &num_pref);
|
|
|
|
tls1_get_peer_groups(s, &supp, &num_supp);
|
|
|
|
} else {
|
|
|
|
tls1_get_peer_groups(s, &pref, &num_pref);
|
|
|
|
tls1_get_supported_groups(s, &supp, &num_supp);
|
|
|
|
}
|
2015-05-30 17:20:12 +00:00
|
|
|
|
2017-09-22 15:06:52 +00:00
|
|
|
for (k = 0, i = 0; i < num_pref; i++) {
|
|
|
|
uint16_t id = pref[i];
|
2016-09-19 17:09:58 +00:00
|
|
|
|
2017-09-24 20:59:39 +00:00
|
|
|
if (!tls1_in_list(id, supp, num_supp)
|
2019-06-13 10:06:12 +00:00
|
|
|
|| !tls_group_allowed(s, id, SSL_SECOP_CURVE_SHARED))
|
2015-01-22 03:40:55 +00:00
|
|
|
continue;
|
2017-09-24 20:59:39 +00:00
|
|
|
if (nmatch == k)
|
|
|
|
return id;
|
|
|
|
k++;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
if (nmatch == -1)
|
|
|
|
return k;
|
|
|
|
/* Out of range (nmatch > k). */
|
2017-09-22 22:43:03 +00:00
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2012-03-28 15:05:04 +00:00
|
|
|
|
2017-09-22 15:06:52 +00:00
|
|
|
int tls1_set_groups(uint16_t **pext, size_t *pextlen,
|
2016-11-09 14:51:06 +00:00
|
|
|
int *groups, size_t ngroups)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
|
2017-09-22 15:06:52 +00:00
|
|
|
uint16_t *glist;
|
2015-01-22 03:40:55 +00:00
|
|
|
size_t i;
|
|
|
|
/*
|
2019-01-25 15:34:49 +00:00
|
|
|
* Bitmap of groups included to detect duplicates: two variables are added
|
|
|
|
* to detect duplicates as some values are more than 32.
|
2015-01-22 03:40:55 +00:00
|
|
|
*/
|
2019-01-25 15:34:49 +00:00
|
|
|
unsigned long *dup_list = NULL;
|
|
|
|
unsigned long dup_list_egrp = 0;
|
|
|
|
unsigned long dup_list_dhgrp = 0;
|
2018-04-03 15:31:16 +00:00
|
|
|
|
2018-10-26 14:29:15 +00:00
|
|
|
if (ngroups == 0) {
|
|
|
|
SSLerr(SSL_F_TLS1_SET_GROUPS, SSL_R_BAD_LENGTH);
|
|
|
|
return 0;
|
|
|
|
}
|
2018-04-03 15:31:16 +00:00
|
|
|
if ((glist = OPENSSL_malloc(ngroups * sizeof(*glist))) == NULL) {
|
|
|
|
SSLerr(SSL_F_TLS1_SET_GROUPS, ERR_R_MALLOC_FAILURE);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2018-04-03 15:31:16 +00:00
|
|
|
}
|
2017-09-22 15:06:52 +00:00
|
|
|
for (i = 0; i < ngroups; i++) {
|
2015-01-22 03:40:55 +00:00
|
|
|
unsigned long idmask;
|
2017-09-22 15:06:52 +00:00
|
|
|
uint16_t id;
|
2017-09-24 00:45:27 +00:00
|
|
|
id = tls1_nid2group_id(groups[i]);
|
2019-01-25 15:34:49 +00:00
|
|
|
if ((id & 0x00FF) >= (sizeof(unsigned long) * 8))
|
|
|
|
goto err;
|
|
|
|
idmask = 1L << (id & 0x00FF);
|
|
|
|
dup_list = (id < 0x100) ? &dup_list_egrp : &dup_list_dhgrp;
|
|
|
|
if (!id || ((*dup_list) & idmask))
|
|
|
|
goto err;
|
|
|
|
*dup_list |= idmask;
|
2017-09-22 15:06:52 +00:00
|
|
|
glist[i] = id;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2015-05-01 14:02:07 +00:00
|
|
|
OPENSSL_free(*pext);
|
2016-11-09 14:51:06 +00:00
|
|
|
*pext = glist;
|
2017-09-22 15:06:52 +00:00
|
|
|
*pextlen = ngroups;
|
2015-01-22 03:40:55 +00:00
|
|
|
return 1;
|
2019-01-25 15:34:49 +00:00
|
|
|
err:
|
|
|
|
OPENSSL_free(glist);
|
|
|
|
return 0;
|
2019-06-13 18:34:37 +00:00
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) */
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
|
|
|
|
# define MAX_GROUPLIST OSSL_NELEM(nid_list)
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
size_t nidcnt;
|
2019-06-13 10:06:12 +00:00
|
|
|
int nid_arr[MAX_GROUPLIST];
|
2015-01-22 03:40:55 +00:00
|
|
|
} nid_cb_st;
|
2012-03-28 15:05:04 +00:00
|
|
|
|
|
|
|
static int nid_cb(const char *elem, int len, void *arg)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
nid_cb_st *narg = arg;
|
|
|
|
size_t i;
|
2019-06-13 10:06:12 +00:00
|
|
|
int nid = NID_undef;
|
2015-01-22 03:40:55 +00:00
|
|
|
char etmp[20];
|
2015-01-24 13:46:50 +00:00
|
|
|
if (elem == NULL)
|
|
|
|
return 0;
|
2019-06-13 10:06:12 +00:00
|
|
|
if (narg->nidcnt == MAX_GROUPLIST)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
if (len > (int)(sizeof(etmp) - 1))
|
|
|
|
return 0;
|
|
|
|
memcpy(etmp, elem, len);
|
|
|
|
etmp[len] = 0;
|
2019-06-13 18:34:37 +00:00
|
|
|
# ifndef OPENSSL_NO_EC
|
2015-01-22 03:40:55 +00:00
|
|
|
nid = EC_curve_nist2nid(etmp);
|
2019-06-13 18:34:37 +00:00
|
|
|
# endif
|
2015-01-22 03:40:55 +00:00
|
|
|
if (nid == NID_undef)
|
|
|
|
nid = OBJ_sn2nid(etmp);
|
|
|
|
if (nid == NID_undef)
|
|
|
|
nid = OBJ_ln2nid(etmp);
|
|
|
|
if (nid == NID_undef)
|
|
|
|
return 0;
|
|
|
|
for (i = 0; i < narg->nidcnt; i++)
|
|
|
|
if (narg->nid_arr[i] == nid)
|
|
|
|
return 0;
|
|
|
|
narg->nid_arr[narg->nidcnt++] = nid;
|
|
|
|
return 1;
|
|
|
|
}
|
2019-06-13 18:34:37 +00:00
|
|
|
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) */
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2016-11-09 14:51:06 +00:00
|
|
|
/* Set groups based on a colon separate list */
|
2017-09-22 15:06:52 +00:00
|
|
|
int tls1_set_groups_list(uint16_t **pext, size_t *pextlen, const char *str)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2019-06-13 18:34:37 +00:00
|
|
|
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
|
2015-01-22 03:40:55 +00:00
|
|
|
nid_cb_st ncb;
|
|
|
|
ncb.nidcnt = 0;
|
|
|
|
if (!CONF_parse_list(str, ':', 1, nid_cb, &ncb))
|
|
|
|
return 0;
|
|
|
|
if (pext == NULL)
|
|
|
|
return 1;
|
2016-11-09 14:51:06 +00:00
|
|
|
return tls1_set_groups(pext, pextlen, ncb.nid_arr, ncb.nidcnt);
|
2019-06-13 18:34:37 +00:00
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2017-09-24 20:59:39 +00:00
|
|
|
|
2017-09-24 00:45:27 +00:00
|
|
|
/* Check a group id matches preferences */
|
2018-03-12 17:15:25 +00:00
|
|
|
int tls1_check_group_id(SSL *s, uint16_t group_id, int check_own_groups)
|
2017-09-24 00:45:27 +00:00
|
|
|
{
|
|
|
|
const uint16_t *groups;
|
2017-09-24 20:59:39 +00:00
|
|
|
size_t groups_len;
|
2017-09-24 00:45:27 +00:00
|
|
|
|
|
|
|
if (group_id == 0)
|
|
|
|
return 0;
|
|
|
|
|
2017-09-26 15:17:44 +00:00
|
|
|
/* Check for Suite B compliance */
|
2018-12-12 18:09:50 +00:00
|
|
|
if (tls1_suiteb(s) && s->s3.tmp.new_cipher != NULL) {
|
|
|
|
unsigned long cid = s->s3.tmp.new_cipher->id;
|
2017-09-26 15:17:44 +00:00
|
|
|
|
|
|
|
if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) {
|
|
|
|
if (group_id != TLSEXT_curve_P_256)
|
|
|
|
return 0;
|
|
|
|
} else if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384) {
|
|
|
|
if (group_id != TLSEXT_curve_P_384)
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
/* Should never happen */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2017-09-24 20:59:39 +00:00
|
|
|
|
2018-03-12 17:15:25 +00:00
|
|
|
if (check_own_groups) {
|
|
|
|
/* Check group is one of our preferences */
|
|
|
|
tls1_get_supported_groups(s, &groups, &groups_len);
|
|
|
|
if (!tls1_in_list(group_id, groups, groups_len))
|
|
|
|
return 0;
|
|
|
|
}
|
2017-09-24 00:45:27 +00:00
|
|
|
|
2019-06-13 10:06:12 +00:00
|
|
|
if (!tls_group_allowed(s, group_id, SSL_SECOP_CURVE_CHECK))
|
2017-09-26 15:17:44 +00:00
|
|
|
return 0;
|
|
|
|
|
2017-09-24 00:45:27 +00:00
|
|
|
/* For clients, nothing more to check */
|
|
|
|
if (!s->server)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* Check group is one of peers preferences */
|
2017-09-26 14:28:16 +00:00
|
|
|
tls1_get_peer_groups(s, &groups, &groups_len);
|
2017-09-24 00:45:27 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* RFC 4492 does not require the supported elliptic curves extension
|
|
|
|
* so if it is not sent we can just choose any curve.
|
|
|
|
* It is invalid to send an empty list in the supported groups
|
|
|
|
* extension, so groups_len == 0 always means no extension.
|
|
|
|
*/
|
|
|
|
if (groups_len == 0)
|
|
|
|
return 1;
|
2017-09-24 20:59:39 +00:00
|
|
|
return tls1_in_list(group_id, groups, groups_len);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2012-06-28 12:45:49 +00:00
|
|
|
|
2019-06-13 10:06:12 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2016-11-25 10:22:02 +00:00
|
|
|
void tls1_get_formatlist(SSL *s, const unsigned char **pformats,
|
|
|
|
size_t *num_formats)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If we have a custom point format list use it otherwise use default
|
|
|
|
*/
|
2016-12-08 19:18:40 +00:00
|
|
|
if (s->ext.ecpointformats) {
|
|
|
|
*pformats = s->ext.ecpointformats;
|
|
|
|
*num_formats = s->ext.ecpointformats_len;
|
2015-01-22 03:40:55 +00:00
|
|
|
} else {
|
|
|
|
*pformats = ecformats_default;
|
|
|
|
/* For Suite B we don't support char2 fields */
|
|
|
|
if (tls1_suiteb(s))
|
|
|
|
*num_formats = sizeof(ecformats_default) - 1;
|
|
|
|
else
|
|
|
|
*num_formats = sizeof(ecformats_default);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-13 10:06:12 +00:00
|
|
|
/* Check a key is compatible with compression extension */
|
|
|
|
static int tls1_check_pkey_comp(SSL *s, EVP_PKEY *pkey)
|
|
|
|
{
|
|
|
|
const EC_KEY *ec;
|
|
|
|
const EC_GROUP *grp;
|
|
|
|
unsigned char comp_id;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
/* If not an EC key nothing to check */
|
|
|
|
if (EVP_PKEY_id(pkey) != EVP_PKEY_EC)
|
|
|
|
return 1;
|
|
|
|
ec = EVP_PKEY_get0_EC_KEY(pkey);
|
|
|
|
grp = EC_KEY_get0_group(ec);
|
|
|
|
|
|
|
|
/* Get required compression id */
|
|
|
|
if (EC_KEY_get_conv_form(ec) == POINT_CONVERSION_UNCOMPRESSED) {
|
|
|
|
comp_id = TLSEXT_ECPOINTFORMAT_uncompressed;
|
|
|
|
} else if (SSL_IS_TLS13(s)) {
|
|
|
|
/*
|
|
|
|
* ec_point_formats extension is not used in TLSv1.3 so we ignore
|
|
|
|
* this check.
|
|
|
|
*/
|
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
int field_type = EC_METHOD_get_field_type(EC_GROUP_method_of(grp));
|
|
|
|
|
|
|
|
if (field_type == NID_X9_62_prime_field)
|
|
|
|
comp_id = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime;
|
|
|
|
else if (field_type == NID_X9_62_characteristic_two_field)
|
|
|
|
comp_id = TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2;
|
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If point formats extension present check it, otherwise everything is
|
|
|
|
* supported (see RFC4492).
|
|
|
|
*/
|
2019-06-18 10:45:26 +00:00
|
|
|
if (s->ext.peer_ecpointformats == NULL)
|
2019-06-13 10:06:12 +00:00
|
|
|
return 1;
|
|
|
|
|
2019-06-18 10:45:26 +00:00
|
|
|
for (i = 0; i < s->ext.peer_ecpointformats_len; i++) {
|
|
|
|
if (s->ext.peer_ecpointformats[i] == comp_id)
|
2019-06-13 10:06:12 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return group id of a key */
|
|
|
|
static uint16_t tls1_get_group_id(EVP_PKEY *pkey)
|
|
|
|
{
|
|
|
|
EC_KEY *ec = EVP_PKEY_get0_EC_KEY(pkey);
|
|
|
|
const EC_GROUP *grp;
|
|
|
|
|
|
|
|
if (ec == NULL)
|
|
|
|
return 0;
|
|
|
|
grp = EC_KEY_get0_group(ec);
|
|
|
|
return tls1_nid2group_id(EC_GROUP_get_curve_name(grp));
|
|
|
|
}
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* Check cert parameters compatible with extensions: currently just checks EC
|
|
|
|
* certificates have compatible curves and compression.
|
2012-06-28 12:45:49 +00:00
|
|
|
*/
|
2017-02-18 03:42:15 +00:00
|
|
|
static int tls1_check_cert_param(SSL *s, X509 *x, int check_ee_md)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-09-24 00:45:27 +00:00
|
|
|
uint16_t group_id;
|
2015-01-22 03:40:55 +00:00
|
|
|
EVP_PKEY *pkey;
|
2015-12-20 00:32:36 +00:00
|
|
|
pkey = X509_get0_pubkey(x);
|
2017-09-24 00:45:27 +00:00
|
|
|
if (pkey == NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
/* If not EC nothing to do */
|
2016-01-19 00:21:12 +00:00
|
|
|
if (EVP_PKEY_id(pkey) != EVP_PKEY_EC)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 1;
|
2017-09-24 00:45:27 +00:00
|
|
|
/* Check compression */
|
|
|
|
if (!tls1_check_pkey_comp(s, pkey))
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2017-09-24 00:45:27 +00:00
|
|
|
group_id = tls1_get_group_id(pkey);
|
2018-03-12 17:15:25 +00:00
|
|
|
/*
|
|
|
|
* For a server we allow the certificate to not be in our list of supported
|
|
|
|
* groups.
|
|
|
|
*/
|
|
|
|
if (!tls1_check_group_id(s, group_id, !s->server))
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
/*
|
|
|
|
* Special case for suite B. We *MUST* sign using SHA256+P-256 or
|
2017-02-18 03:42:15 +00:00
|
|
|
* SHA384+P-384.
|
2015-01-22 03:40:55 +00:00
|
|
|
*/
|
2017-02-18 03:42:15 +00:00
|
|
|
if (check_ee_md && tls1_suiteb(s)) {
|
2015-01-22 03:40:55 +00:00
|
|
|
int check_md;
|
|
|
|
size_t i;
|
2017-09-22 15:06:52 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/* Check to see we have necessary signing algorithm */
|
2017-09-24 00:45:27 +00:00
|
|
|
if (group_id == TLSEXT_curve_P_256)
|
2015-01-22 03:40:55 +00:00
|
|
|
check_md = NID_ecdsa_with_SHA256;
|
2017-09-24 00:45:27 +00:00
|
|
|
else if (group_id == TLSEXT_curve_P_384)
|
2015-01-22 03:40:55 +00:00
|
|
|
check_md = NID_ecdsa_with_SHA384;
|
|
|
|
else
|
|
|
|
return 0; /* Should never happen */
|
2019-06-13 19:26:12 +00:00
|
|
|
for (i = 0; i < s->shared_sigalgslen; i++) {
|
|
|
|
if (check_md == s->shared_sigalgs[i]->sigandhash)
|
2017-09-24 00:45:27 +00:00
|
|
|
return 1;;
|
|
|
|
}
|
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2017-09-24 00:45:27 +00:00
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2015-12-04 21:25:11 +00:00
|
|
|
/*
|
2016-03-10 20:34:48 +00:00
|
|
|
* tls1_check_ec_tmp_key - Check EC temporary key compatibility
|
2015-12-04 21:25:11 +00:00
|
|
|
* @s: SSL connection
|
|
|
|
* @cid: Cipher ID we're considering using
|
|
|
|
*
|
|
|
|
* Checks that the kECDHE cipher suite we're considering using
|
|
|
|
* is compatible with the client extensions.
|
|
|
|
*
|
|
|
|
* Returns 0 when the cipher can't be used or 1 when it can.
|
|
|
|
*/
|
2012-08-15 15:15:05 +00:00
|
|
|
int tls1_check_ec_tmp_key(SSL *s, unsigned long cid)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-09-24 00:45:27 +00:00
|
|
|
/* If not Suite B just need a shared group */
|
|
|
|
if (!tls1_suiteb(s))
|
|
|
|
return tls1_shared_group(s, 0) != 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* If Suite B, AES128 MUST use P-256 and AES256 MUST use P-384, no other
|
|
|
|
* curves permitted.
|
|
|
|
*/
|
2017-09-24 00:45:27 +00:00
|
|
|
if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256)
|
2018-03-12 17:15:25 +00:00
|
|
|
return tls1_check_group_id(s, TLSEXT_curve_P_256, 1);
|
2017-09-24 00:45:27 +00:00
|
|
|
if (cid == TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384)
|
2018-03-12 17:15:25 +00:00
|
|
|
return tls1_check_group_id(s, TLSEXT_curve_P_384, 1);
|
2017-09-24 00:45:27 +00:00
|
|
|
|
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2012-03-28 15:05:04 +00:00
|
|
|
|
2013-08-17 16:40:08 +00:00
|
|
|
#else
|
|
|
|
|
|
|
|
static int tls1_check_cert_param(SSL *s, X509 *x, int set_ee_md)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
2013-08-17 16:40:08 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
#endif /* OPENSSL_NO_EC */
|
2006-01-03 03:27:19 +00:00
|
|
|
|
2016-12-14 14:31:21 +00:00
|
|
|
/* Default sigalg schemes */
|
2017-01-25 14:33:55 +00:00
|
|
|
static const uint16_t tls12_sigalgs[] = {
|
2016-12-14 14:31:21 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
|
|
|
TLSEXT_SIGALG_ecdsa_secp256r1_sha256,
|
|
|
|
TLSEXT_SIGALG_ecdsa_secp384r1_sha384,
|
|
|
|
TLSEXT_SIGALG_ecdsa_secp521r1_sha512,
|
2017-05-24 20:56:38 +00:00
|
|
|
TLSEXT_SIGALG_ed25519,
|
2018-02-27 10:12:02 +00:00
|
|
|
TLSEXT_SIGALG_ed448,
|
2015-05-15 09:49:56 +00:00
|
|
|
#endif
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2018-01-11 19:39:30 +00:00
|
|
|
TLSEXT_SIGALG_rsa_pss_pss_sha256,
|
|
|
|
TLSEXT_SIGALG_rsa_pss_pss_sha384,
|
|
|
|
TLSEXT_SIGALG_rsa_pss_pss_sha512,
|
|
|
|
TLSEXT_SIGALG_rsa_pss_rsae_sha256,
|
|
|
|
TLSEXT_SIGALG_rsa_pss_rsae_sha384,
|
|
|
|
TLSEXT_SIGALG_rsa_pss_rsae_sha512,
|
2016-12-14 16:37:48 +00:00
|
|
|
|
2016-12-14 14:31:21 +00:00
|
|
|
TLSEXT_SIGALG_rsa_pkcs1_sha256,
|
|
|
|
TLSEXT_SIGALG_rsa_pkcs1_sha384,
|
|
|
|
TLSEXT_SIGALG_rsa_pkcs1_sha512,
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2017-01-10 14:38:09 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2017-06-08 16:15:45 +00:00
|
|
|
TLSEXT_SIGALG_ecdsa_sha224,
|
2017-01-10 13:45:24 +00:00
|
|
|
TLSEXT_SIGALG_ecdsa_sha1,
|
2017-01-10 14:38:09 +00:00
|
|
|
#endif
|
2017-06-08 16:15:45 +00:00
|
|
|
TLSEXT_SIGALG_rsa_pkcs1_sha224,
|
2017-01-10 13:45:24 +00:00
|
|
|
TLSEXT_SIGALG_rsa_pkcs1_sha1,
|
2017-01-10 14:38:09 +00:00
|
|
|
#ifndef OPENSSL_NO_DSA
|
2017-06-08 16:15:45 +00:00
|
|
|
TLSEXT_SIGALG_dsa_sha224,
|
2017-01-10 13:45:24 +00:00
|
|
|
TLSEXT_SIGALG_dsa_sha1,
|
|
|
|
|
2016-12-14 14:31:21 +00:00
|
|
|
TLSEXT_SIGALG_dsa_sha256,
|
|
|
|
TLSEXT_SIGALG_dsa_sha384,
|
2018-05-03 15:31:01 +00:00
|
|
|
TLSEXT_SIGALG_dsa_sha512,
|
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_GOST
|
|
|
|
TLSEXT_SIGALG_gostr34102012_256_gostr34112012_256,
|
|
|
|
TLSEXT_SIGALG_gostr34102012_512_gostr34112012_512,
|
|
|
|
TLSEXT_SIGALG_gostr34102001_gostr3411,
|
2017-01-10 14:38:09 +00:00
|
|
|
#endif
|
2011-05-11 16:33:28 +00:00
|
|
|
};
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2015-05-15 09:49:56 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2017-01-25 14:33:55 +00:00
|
|
|
static const uint16_t suiteb_sigalgs[] = {
|
2016-12-14 14:31:21 +00:00
|
|
|
TLSEXT_SIGALG_ecdsa_secp256r1_sha256,
|
|
|
|
TLSEXT_SIGALG_ecdsa_secp384r1_sha384
|
2012-08-15 15:15:05 +00:00
|
|
|
};
|
2015-05-15 09:49:56 +00:00
|
|
|
#endif
|
2016-12-08 19:18:40 +00:00
|
|
|
|
2017-01-10 14:23:02 +00:00
|
|
|
static const SIGALG_LOOKUP sigalg_lookup_tbl[] = {
|
2017-01-10 14:38:09 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2017-01-26 14:23:05 +00:00
|
|
|
{"ecdsa_secp256r1_sha256", TLSEXT_SIGALG_ecdsa_secp256r1_sha256,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_EC, SSL_PKEY_ECC,
|
|
|
|
NID_ecdsa_with_SHA256, NID_X9_62_prime256v1},
|
2017-01-26 14:23:05 +00:00
|
|
|
{"ecdsa_secp384r1_sha384", TLSEXT_SIGALG_ecdsa_secp384r1_sha384,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_EC, SSL_PKEY_ECC,
|
|
|
|
NID_ecdsa_with_SHA384, NID_secp384r1},
|
2017-01-26 14:23:05 +00:00
|
|
|
{"ecdsa_secp521r1_sha512", TLSEXT_SIGALG_ecdsa_secp521r1_sha512,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_EC, SSL_PKEY_ECC,
|
|
|
|
NID_ecdsa_with_SHA512, NID_secp521r1},
|
2017-05-24 14:28:26 +00:00
|
|
|
{"ed25519", TLSEXT_SIGALG_ed25519,
|
2017-06-20 15:32:44 +00:00
|
|
|
NID_undef, -1, EVP_PKEY_ED25519, SSL_PKEY_ED25519,
|
2017-05-24 14:28:26 +00:00
|
|
|
NID_undef, NID_undef},
|
2018-02-27 10:12:02 +00:00
|
|
|
{"ed448", TLSEXT_SIGALG_ed448,
|
|
|
|
NID_undef, -1, EVP_PKEY_ED448, SSL_PKEY_ED448,
|
|
|
|
NID_undef, NID_undef},
|
2017-06-08 16:15:45 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_ecdsa_sha224,
|
|
|
|
NID_sha224, SSL_MD_SHA224_IDX, EVP_PKEY_EC, SSL_PKEY_ECC,
|
|
|
|
NID_ecdsa_with_SHA224, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_ecdsa_sha1,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha1, SSL_MD_SHA1_IDX, EVP_PKEY_EC, SSL_PKEY_ECC,
|
|
|
|
NID_ecdsa_with_SHA1, NID_undef},
|
2017-01-10 14:38:09 +00:00
|
|
|
#endif
|
2018-01-11 19:39:30 +00:00
|
|
|
{"rsa_pss_rsae_sha256", TLSEXT_SIGALG_rsa_pss_rsae_sha256,
|
|
|
|
NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA,
|
|
|
|
NID_undef, NID_undef},
|
|
|
|
{"rsa_pss_rsae_sha384", TLSEXT_SIGALG_rsa_pss_rsae_sha384,
|
|
|
|
NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA,
|
|
|
|
NID_undef, NID_undef},
|
|
|
|
{"rsa_pss_rsae_sha512", TLSEXT_SIGALG_rsa_pss_rsae_sha512,
|
|
|
|
NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA,
|
|
|
|
NID_undef, NID_undef},
|
|
|
|
{"rsa_pss_pss_sha256", TLSEXT_SIGALG_rsa_pss_pss_sha256,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN,
|
|
|
|
NID_undef, NID_undef},
|
2018-01-11 19:39:30 +00:00
|
|
|
{"rsa_pss_pss_sha384", TLSEXT_SIGALG_rsa_pss_pss_sha384,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN,
|
|
|
|
NID_undef, NID_undef},
|
2018-01-11 19:39:30 +00:00
|
|
|
{"rsa_pss_pss_sha512", TLSEXT_SIGALG_rsa_pss_pss_sha512,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN,
|
|
|
|
NID_undef, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{"rsa_pkcs1_sha256", TLSEXT_SIGALG_rsa_pkcs1_sha256,
|
2017-02-10 04:23:53 +00:00
|
|
|
NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha256WithRSAEncryption, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{"rsa_pkcs1_sha384", TLSEXT_SIGALG_rsa_pkcs1_sha384,
|
2017-02-10 04:23:53 +00:00
|
|
|
NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha384WithRSAEncryption, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{"rsa_pkcs1_sha512", TLSEXT_SIGALG_rsa_pkcs1_sha512,
|
2017-02-10 04:23:53 +00:00
|
|
|
NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha512WithRSAEncryption, NID_undef},
|
2017-06-08 16:15:45 +00:00
|
|
|
{"rsa_pkcs1_sha224", TLSEXT_SIGALG_rsa_pkcs1_sha224,
|
|
|
|
NID_sha224, SSL_MD_SHA224_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA,
|
|
|
|
NID_sha224WithRSAEncryption, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{"rsa_pkcs1_sha1", TLSEXT_SIGALG_rsa_pkcs1_sha1,
|
2017-02-10 04:23:53 +00:00
|
|
|
NID_sha1, SSL_MD_SHA1_IDX, EVP_PKEY_RSA, SSL_PKEY_RSA,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha1WithRSAEncryption, NID_undef},
|
2017-01-10 14:38:09 +00:00
|
|
|
#ifndef OPENSSL_NO_DSA
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_dsa_sha256,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN,
|
|
|
|
NID_dsa_with_SHA256, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_dsa_sha384,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN,
|
|
|
|
NID_undef, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_dsa_sha512,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN,
|
|
|
|
NID_undef, NID_undef},
|
2017-06-08 16:15:45 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_dsa_sha224,
|
|
|
|
NID_sha224, SSL_MD_SHA224_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN,
|
|
|
|
NID_undef, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_dsa_sha1,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_sha1, SSL_MD_SHA1_IDX, EVP_PKEY_DSA, SSL_PKEY_DSA_SIGN,
|
|
|
|
NID_dsaWithSHA1, NID_undef},
|
2017-01-10 14:38:09 +00:00
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_GOST
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_gostr34102012_256_gostr34112012_256,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_id_GostR3411_2012_256, SSL_MD_GOST12_256_IDX,
|
|
|
|
NID_id_GostR3410_2012_256, SSL_PKEY_GOST12_256,
|
|
|
|
NID_undef, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_gostr34102012_512_gostr34112012_512,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_id_GostR3411_2012_512, SSL_MD_GOST12_512_IDX,
|
|
|
|
NID_id_GostR3410_2012_512, SSL_PKEY_GOST12_512,
|
|
|
|
NID_undef, NID_undef},
|
2017-01-26 14:23:05 +00:00
|
|
|
{NULL, TLSEXT_SIGALG_gostr34102001_gostr3411,
|
2017-01-30 16:05:23 +00:00
|
|
|
NID_id_GostR3411_94, SSL_MD_GOST94_IDX,
|
|
|
|
NID_id_GostR3410_2001, SSL_PKEY_GOST01,
|
|
|
|
NID_undef, NID_undef}
|
2017-01-10 14:38:09 +00:00
|
|
|
#endif
|
2016-12-14 14:31:21 +00:00
|
|
|
};
|
2017-02-13 16:04:07 +00:00
|
|
|
/* Legacy sigalgs for TLS < 1.2 RSA TLS signatures */
|
|
|
|
static const SIGALG_LOOKUP legacy_rsa_sigalg = {
|
|
|
|
"rsa_pkcs1_md5_sha1", 0,
|
|
|
|
NID_md5_sha1, SSL_MD_MD5_SHA1_IDX,
|
|
|
|
EVP_PKEY_RSA, SSL_PKEY_RSA,
|
|
|
|
NID_undef, NID_undef
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Default signature algorithm values used if signature algorithms not present.
|
|
|
|
* From RFC5246. Note: order must match certificate index order.
|
|
|
|
*/
|
|
|
|
static const uint16_t tls_default_sigalg[] = {
|
|
|
|
TLSEXT_SIGALG_rsa_pkcs1_sha1, /* SSL_PKEY_RSA */
|
2017-09-13 12:53:03 +00:00
|
|
|
0, /* SSL_PKEY_RSA_PSS_SIGN */
|
2017-02-13 16:04:07 +00:00
|
|
|
TLSEXT_SIGALG_dsa_sha1, /* SSL_PKEY_DSA_SIGN */
|
|
|
|
TLSEXT_SIGALG_ecdsa_sha1, /* SSL_PKEY_ECC */
|
|
|
|
TLSEXT_SIGALG_gostr34102001_gostr3411, /* SSL_PKEY_GOST01 */
|
|
|
|
TLSEXT_SIGALG_gostr34102012_256_gostr34112012_256, /* SSL_PKEY_GOST12_256 */
|
2017-05-24 20:54:03 +00:00
|
|
|
TLSEXT_SIGALG_gostr34102012_512_gostr34112012_512, /* SSL_PKEY_GOST12_512 */
|
2018-02-27 10:12:02 +00:00
|
|
|
0, /* SSL_PKEY_ED25519 */
|
|
|
|
0, /* SSL_PKEY_ED448 */
|
2017-02-13 16:04:07 +00:00
|
|
|
};
|
2016-12-14 14:31:21 +00:00
|
|
|
|
2017-01-26 15:24:35 +00:00
|
|
|
/* Lookup TLS signature algorithm */
|
|
|
|
static const SIGALG_LOOKUP *tls1_lookup_sigalg(uint16_t sigalg)
|
2016-12-14 14:31:21 +00:00
|
|
|
{
|
|
|
|
size_t i;
|
2017-01-26 15:24:35 +00:00
|
|
|
const SIGALG_LOOKUP *s;
|
2016-12-14 14:31:21 +00:00
|
|
|
|
2017-01-26 15:24:35 +00:00
|
|
|
for (i = 0, s = sigalg_lookup_tbl; i < OSSL_NELEM(sigalg_lookup_tbl);
|
|
|
|
i++, s++) {
|
|
|
|
if (s->sigalg == sigalg)
|
|
|
|
return s;
|
2016-12-14 14:31:21 +00:00
|
|
|
}
|
2017-01-26 15:24:35 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2017-06-14 15:54:08 +00:00
|
|
|
/* Lookup hash: return 0 if invalid or not enabled */
|
|
|
|
int tls1_lookup_md(const SIGALG_LOOKUP *lu, const EVP_MD **pmd)
|
|
|
|
{
|
|
|
|
const EVP_MD *md;
|
|
|
|
if (lu == NULL)
|
|
|
|
return 0;
|
|
|
|
/* lu->hash == NID_undef means no associated digest */
|
|
|
|
if (lu->hash == NID_undef) {
|
|
|
|
md = NULL;
|
|
|
|
} else {
|
|
|
|
md = ssl_md(lu->hash_idx);
|
|
|
|
if (md == NULL)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (pmd)
|
|
|
|
*pmd = md;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-09-19 16:15:42 +00:00
|
|
|
/*
|
|
|
|
* Check if key is large enough to generate RSA-PSS signature.
|
|
|
|
*
|
|
|
|
* The key must greater than or equal to 2 * hash length + 2.
|
|
|
|
* SHA512 has a hash length of 64 bytes, which is incompatible
|
|
|
|
* with a 128 byte (1024 bit) key.
|
|
|
|
*/
|
|
|
|
#define RSA_PSS_MINIMUM_KEY_SIZE(md) (2 * EVP_MD_size(md) + 2)
|
|
|
|
static int rsa_pss_check_min_key_size(const RSA *rsa, const SIGALG_LOOKUP *lu)
|
|
|
|
{
|
|
|
|
const EVP_MD *md;
|
|
|
|
|
|
|
|
if (rsa == NULL)
|
|
|
|
return 0;
|
|
|
|
if (!tls1_lookup_md(lu, &md) || md == NULL)
|
|
|
|
return 0;
|
|
|
|
if (RSA_size(rsa) < RSA_PSS_MINIMUM_KEY_SIZE(md))
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-02-13 16:04:07 +00:00
|
|
|
/*
|
|
|
|
* Return a signature algorithm for TLS < 1.2 where the signature type
|
|
|
|
* is fixed by the certificate type.
|
|
|
|
*/
|
|
|
|
static const SIGALG_LOOKUP *tls1_get_legacy_sigalg(const SSL *s, int idx)
|
|
|
|
{
|
2017-06-29 13:55:06 +00:00
|
|
|
if (idx == -1) {
|
|
|
|
if (s->server) {
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
/* Work out index corresponding to ciphersuite */
|
|
|
|
for (i = 0; i < SSL_PKEY_NUM; i++) {
|
|
|
|
const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(i);
|
|
|
|
|
2018-12-12 18:09:50 +00:00
|
|
|
if (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) {
|
2017-06-29 13:55:06 +00:00
|
|
|
idx = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2018-05-03 14:25:48 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Some GOST ciphersuites allow more than one signature algorithms
|
|
|
|
* */
|
2018-12-12 18:09:50 +00:00
|
|
|
if (idx == SSL_PKEY_GOST01 && s->s3.tmp.new_cipher->algorithm_auth != SSL_aGOST01) {
|
2018-05-03 14:25:48 +00:00
|
|
|
int real_idx;
|
|
|
|
|
|
|
|
for (real_idx = SSL_PKEY_GOST12_512; real_idx >= SSL_PKEY_GOST01;
|
|
|
|
real_idx--) {
|
|
|
|
if (s->cert->pkeys[real_idx].privatekey != NULL) {
|
|
|
|
idx = real_idx;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-06-29 13:55:06 +00:00
|
|
|
} else {
|
|
|
|
idx = s->cert->key - s->cert->pkeys;
|
|
|
|
}
|
|
|
|
}
|
2017-02-13 16:04:07 +00:00
|
|
|
if (idx < 0 || idx >= (int)OSSL_NELEM(tls_default_sigalg))
|
|
|
|
return NULL;
|
|
|
|
if (SSL_USE_SIGALGS(s) || idx != SSL_PKEY_RSA) {
|
|
|
|
const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(tls_default_sigalg[idx]);
|
|
|
|
|
2017-06-14 15:54:08 +00:00
|
|
|
if (!tls1_lookup_md(lu, NULL))
|
2017-02-13 16:04:07 +00:00
|
|
|
return NULL;
|
|
|
|
return lu;
|
|
|
|
}
|
|
|
|
return &legacy_rsa_sigalg;
|
|
|
|
}
|
|
|
|
/* Set peer sigalg based key type */
|
|
|
|
int tls1_set_peer_legacy_sigalg(SSL *s, const EVP_PKEY *pkey)
|
|
|
|
{
|
2017-06-29 14:20:09 +00:00
|
|
|
size_t idx;
|
|
|
|
const SIGALG_LOOKUP *lu;
|
2017-02-13 16:04:07 +00:00
|
|
|
|
2017-06-29 14:20:09 +00:00
|
|
|
if (ssl_cert_lookup_by_pkey(pkey, &idx) == NULL)
|
|
|
|
return 0;
|
|
|
|
lu = tls1_get_legacy_sigalg(s, idx);
|
2017-02-13 16:04:07 +00:00
|
|
|
if (lu == NULL)
|
|
|
|
return 0;
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.peer_sigalg = lu;
|
2017-02-13 16:04:07 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2016-12-14 14:31:21 +00:00
|
|
|
|
2017-01-25 14:33:55 +00:00
|
|
|
size_t tls12_get_psigalgs(SSL *s, int sent, const uint16_t **psigs)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If Suite B mode use Suite B sigalgs only, ignore any other
|
|
|
|
* preferences.
|
|
|
|
*/
|
2015-05-15 09:49:56 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2015-01-22 03:40:55 +00:00
|
|
|
switch (tls1_suiteb(s)) {
|
|
|
|
case SSL_CERT_FLAG_SUITEB_128_LOS:
|
|
|
|
*psigs = suiteb_sigalgs;
|
2017-01-10 14:23:02 +00:00
|
|
|
return OSSL_NELEM(suiteb_sigalgs);
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
case SSL_CERT_FLAG_SUITEB_128_LOS_ONLY:
|
|
|
|
*psigs = suiteb_sigalgs;
|
2017-01-10 14:23:02 +00:00
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
case SSL_CERT_FLAG_SUITEB_192_LOS:
|
2017-01-10 14:23:02 +00:00
|
|
|
*psigs = suiteb_sigalgs + 1;
|
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2015-05-15 09:49:56 +00:00
|
|
|
#endif
|
2017-01-25 19:12:48 +00:00
|
|
|
/*
|
|
|
|
* We use client_sigalgs (if not NULL) if we're a server
|
|
|
|
* and sending a certificate request or if we're a client and
|
|
|
|
* determining which shared algorithm to use.
|
|
|
|
*/
|
|
|
|
if ((s->server == sent) && s->cert->client_sigalgs != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
*psigs = s->cert->client_sigalgs;
|
|
|
|
return s->cert->client_sigalgslen;
|
|
|
|
} else if (s->cert->conf_sigalgs) {
|
|
|
|
*psigs = s->cert->conf_sigalgs;
|
|
|
|
return s->cert->conf_sigalgslen;
|
|
|
|
} else {
|
|
|
|
*psigs = tls12_sigalgs;
|
2016-12-14 14:31:21 +00:00
|
|
|
return OSSL_NELEM(tls12_sigalgs);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-12 14:23:07 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2018-10-19 13:01:22 +00:00
|
|
|
/*
|
|
|
|
* Called by servers only. Checks that we have a sig alg that supports the
|
|
|
|
* specified EC curve.
|
|
|
|
*/
|
|
|
|
int tls_check_sigalg_curve(const SSL *s, int curve)
|
|
|
|
{
|
|
|
|
const uint16_t *sigs;
|
|
|
|
size_t siglen, i;
|
|
|
|
|
|
|
|
if (s->cert->conf_sigalgs) {
|
|
|
|
sigs = s->cert->conf_sigalgs;
|
|
|
|
siglen = s->cert->conf_sigalgslen;
|
|
|
|
} else {
|
|
|
|
sigs = tls12_sigalgs;
|
|
|
|
siglen = OSSL_NELEM(tls12_sigalgs);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < siglen; i++) {
|
|
|
|
const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(sigs[i]);
|
|
|
|
|
|
|
|
if (lu == NULL)
|
|
|
|
continue;
|
|
|
|
if (lu->sig == EVP_PKEY_EC
|
|
|
|
&& lu->curve != NID_undef
|
|
|
|
&& curve == lu->curve)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2018-11-12 14:23:07 +00:00
|
|
|
#endif
|
2018-10-19 13:01:22 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* Check signature algorithm is consistent with sent supported signature
|
2017-01-25 16:22:13 +00:00
|
|
|
* algorithms and if so set relevant digest and signature scheme in
|
|
|
|
* s.
|
2012-07-24 18:11:27 +00:00
|
|
|
*/
|
2017-01-30 13:48:39 +00:00
|
|
|
int tls12_check_peer_sigalg(SSL *s, uint16_t sig, EVP_PKEY *pkey)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *sent_sigs;
|
2017-01-25 16:46:02 +00:00
|
|
|
const EVP_MD *md = NULL;
|
2016-12-14 14:31:21 +00:00
|
|
|
char sigalgstr[2];
|
2018-07-17 15:31:07 +00:00
|
|
|
size_t sent_sigslen, i, cidx;
|
2016-12-14 16:37:48 +00:00
|
|
|
int pkeyid = EVP_PKEY_id(pkey);
|
2017-01-30 13:48:39 +00:00
|
|
|
const SIGALG_LOOKUP *lu;
|
2017-01-26 15:24:35 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/* Should never happen */
|
2016-12-14 16:37:48 +00:00
|
|
|
if (pkeyid == -1)
|
2015-01-22 03:40:55 +00:00
|
|
|
return -1;
|
2017-02-17 16:08:19 +00:00
|
|
|
if (SSL_IS_TLS13(s)) {
|
|
|
|
/* Disallow DSA for TLS 1.3 */
|
|
|
|
if (pkeyid == EVP_PKEY_DSA) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
2017-02-17 16:08:19 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Only allow PSS for TLS 1.3 */
|
|
|
|
if (pkeyid == EVP_PKEY_RSA)
|
|
|
|
pkeyid = EVP_PKEY_RSA_PSS;
|
|
|
|
}
|
2017-01-30 13:48:39 +00:00
|
|
|
lu = tls1_lookup_sigalg(sig);
|
|
|
|
/*
|
2017-06-08 16:15:45 +00:00
|
|
|
* Check sigalgs is known. Disallow SHA1/SHA224 with TLS 1.3. Check key type
|
|
|
|
* is consistent with signature: RSA keys can be used for RSA-PSS
|
2017-01-30 13:48:39 +00:00
|
|
|
*/
|
2017-06-08 16:15:45 +00:00
|
|
|
if (lu == NULL
|
|
|
|
|| (SSL_IS_TLS13(s) && (lu->hash == NID_sha1 || lu->hash == NID_sha224))
|
2017-02-25 00:25:04 +00:00
|
|
|
|| (pkeyid != lu->sig
|
2017-01-30 13:48:39 +00:00
|
|
|
&& (lu->sig != EVP_PKEY_RSA_PSS || pkeyid != EVP_PKEY_RSA))) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2018-07-17 15:31:07 +00:00
|
|
|
/* Check the sigalg is consistent with the key OID */
|
|
|
|
if (!ssl_cert_lookup_by_nid(EVP_PKEY_id(pkey), &cidx)
|
|
|
|
|| lu->sig_idx != (int)cidx) {
|
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-05-15 09:49:56 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2017-01-03 10:01:39 +00:00
|
|
|
if (pkeyid == EVP_PKEY_EC) {
|
2017-01-30 17:27:35 +00:00
|
|
|
|
2017-09-24 00:45:27 +00:00
|
|
|
/* Check point compression is permitted */
|
|
|
|
if (!tls1_check_pkey_comp(s, pkey)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_ILLEGAL_POINT_COMPRESSION);
|
2017-09-24 00:45:27 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* For TLS 1.3 or Suite B check curve matches signature algorithm */
|
|
|
|
if (SSL_IS_TLS13(s) || tls1_suiteb(s)) {
|
|
|
|
EC_KEY *ec = EVP_PKEY_get0_EC_KEY(pkey);
|
|
|
|
int curve = EC_GROUP_get_curve_name(EC_KEY_get0_group(ec));
|
|
|
|
|
2017-02-14 14:27:15 +00:00
|
|
|
if (lu->curve != NID_undef && curve != lu->curve) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS12_CHECK_PEER_SIGALG, SSL_R_WRONG_CURVE);
|
2017-01-30 14:45:20 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2017-09-24 00:45:27 +00:00
|
|
|
}
|
|
|
|
if (!SSL_IS_TLS13(s)) {
|
|
|
|
/* Check curve matches extensions */
|
2018-03-12 17:15:25 +00:00
|
|
|
if (!tls1_check_group_id(s, tls1_get_group_id(pkey), 1)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS12_CHECK_PEER_SIGALG, SSL_R_WRONG_CURVE);
|
2017-01-30 14:45:20 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (tls1_suiteb(s)) {
|
2017-01-30 22:02:11 +00:00
|
|
|
/* Check sigalg matches a permissible Suite B value */
|
|
|
|
if (sig != TLSEXT_SIGALG_ecdsa_secp256r1_sha256
|
|
|
|
&& sig != TLSEXT_SIGALG_ecdsa_secp384r1_sha384) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE,
|
|
|
|
SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2017-01-30 22:02:11 +00:00
|
|
|
}
|
2017-01-30 14:45:20 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2017-01-30 14:45:20 +00:00
|
|
|
} else if (tls1_suiteb(s)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2017-01-30 14:45:20 +00:00
|
|
|
}
|
2015-05-15 09:49:56 +00:00
|
|
|
#endif
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
/* Check signature matches a type we sent */
|
2017-01-25 19:12:48 +00:00
|
|
|
sent_sigslen = tls12_get_psigalgs(s, 1, &sent_sigs);
|
2016-12-14 16:37:48 +00:00
|
|
|
for (i = 0; i < sent_sigslen; i++, sent_sigs++) {
|
2016-12-14 14:31:21 +00:00
|
|
|
if (sig == *sent_sigs)
|
2015-01-22 03:40:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* Allow fallback to SHA1 if not strict mode */
|
2017-01-30 13:48:39 +00:00
|
|
|
if (i == sent_sigslen && (lu->hash != NID_sha1
|
|
|
|
|| s->cert->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2017-06-14 15:54:08 +00:00
|
|
|
if (!tls1_lookup_md(lu, &md)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_UNKNOWN_DIGEST);
|
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2017-06-14 15:54:08 +00:00
|
|
|
if (md != NULL) {
|
|
|
|
/*
|
|
|
|
* Make sure security callback allows algorithm. For historical
|
|
|
|
* reasons we have to pass the sigalg as a two byte char array.
|
|
|
|
*/
|
|
|
|
sigalgstr[0] = (sig >> 8) & 0xff;
|
|
|
|
sigalgstr[1] = sig & 0xff;
|
|
|
|
if (!ssl_security(s, SSL_SECOP_SIGALG_CHECK,
|
|
|
|
EVP_MD_size(md) * 4, EVP_MD_type(md),
|
|
|
|
(void *)sigalgstr)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_F_TLS12_CHECK_PEER_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
2017-06-14 15:54:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2017-01-30 18:10:17 +00:00
|
|
|
/* Store the sigalg the peer uses */
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.peer_sigalg = lu;
|
2015-01-22 03:40:55 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2012-08-15 15:15:05 +00:00
|
|
|
|
2017-01-25 23:28:57 +00:00
|
|
|
int SSL_get_peer_signature_type_nid(const SSL *s, int *pnid)
|
|
|
|
{
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.peer_sigalg == NULL)
|
2017-01-25 23:28:57 +00:00
|
|
|
return 0;
|
2018-12-12 18:09:50 +00:00
|
|
|
*pnid = s->s3.tmp.peer_sigalg->sig;
|
2017-01-25 23:28:57 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-11-10 06:53:56 +00:00
|
|
|
int SSL_get_signature_type_nid(const SSL *s, int *pnid)
|
|
|
|
{
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.sigalg == NULL)
|
2018-11-10 06:53:56 +00:00
|
|
|
return 0;
|
2018-12-12 18:09:50 +00:00
|
|
|
*pnid = s->s3.tmp.sigalg->sig;
|
2018-11-10 06:53:56 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
2016-02-07 19:17:07 +00:00
|
|
|
* Set a mask of disabled algorithms: an algorithm is disabled if it isn't
|
|
|
|
* supported, doesn't appear in supported signature algorithms, isn't supported
|
|
|
|
* by the enabled protocol versions or by the security level.
|
|
|
|
*
|
|
|
|
* This function should only be used for checking which ciphers are supported
|
|
|
|
* by the client.
|
|
|
|
*
|
|
|
|
* Call ssl_cipher_disabled() to check that it's enabled or not.
|
2012-07-18 14:09:46 +00:00
|
|
|
*/
|
2018-02-09 18:03:08 +00:00
|
|
|
int ssl_set_client_disabled(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.mask_a = 0;
|
|
|
|
s->s3.tmp.mask_k = 0;
|
|
|
|
ssl_set_sig_mask(&s->s3.tmp.mask_a, s, SSL_SECOP_SIGALG_MASK);
|
|
|
|
if (ssl_get_min_max_version(s, &s->s3.tmp.min_ver,
|
|
|
|
&s->s3.tmp.max_ver, NULL) != 0)
|
2018-02-09 18:03:08 +00:00
|
|
|
return 0;
|
2016-08-05 17:03:17 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
2015-01-22 03:40:55 +00:00
|
|
|
/* with PSK there must be client callback set */
|
|
|
|
if (!s->psk_client_callback) {
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.mask_a |= SSL_aPSK;
|
|
|
|
s->s3.tmp.mask_k |= SSL_PSK;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-08-05 17:03:17 +00:00
|
|
|
#endif /* OPENSSL_NO_PSK */
|
2015-05-15 09:49:56 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
2015-01-22 03:40:55 +00:00
|
|
|
if (!(s->srp_ctx.srp_Mask & SSL_kSRP)) {
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.mask_a |= SSL_aSRP;
|
|
|
|
s->s3.tmp.mask_k |= SSL_kSRP;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2015-05-15 09:49:56 +00:00
|
|
|
#endif
|
2018-02-09 18:03:08 +00:00
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2011-05-11 16:33:28 +00:00
|
|
|
|
2016-02-07 19:17:07 +00:00
|
|
|
/*
|
|
|
|
* ssl_cipher_disabled - check that a cipher is disabled or not
|
|
|
|
* @s: SSL connection that you want to use the cipher on
|
|
|
|
* @c: cipher to check
|
|
|
|
* @op: Security check that you want to do
|
2017-04-12 16:02:42 +00:00
|
|
|
* @ecdhe: If set to 1 then TLSv1 ECDHE ciphers are also allowed in SSLv3
|
2016-02-07 19:17:07 +00:00
|
|
|
*
|
|
|
|
* Returns 1 when it's disabled, 0 when enabled.
|
|
|
|
*/
|
2017-04-12 16:02:42 +00:00
|
|
|
int ssl_cipher_disabled(SSL *s, const SSL_CIPHER *c, int op, int ecdhe)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2018-12-12 18:09:50 +00:00
|
|
|
if (c->algorithm_mkey & s->s3.tmp.mask_k
|
|
|
|
|| c->algorithm_auth & s->s3.tmp.mask_a)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 1;
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.max_ver == 0)
|
2016-02-07 19:17:07 +00:00
|
|
|
return 1;
|
2017-04-12 16:02:42 +00:00
|
|
|
if (!SSL_IS_DTLS(s)) {
|
|
|
|
int min_tls = c->min_tls;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For historical reasons we will allow ECHDE to be selected by a server
|
|
|
|
* in SSLv3 if we are a client
|
|
|
|
*/
|
|
|
|
if (min_tls == TLS1_VERSION && ecdhe
|
|
|
|
&& (c->algorithm_mkey & (SSL_kECDHE | SSL_kECDHEPSK)) != 0)
|
|
|
|
min_tls = SSL3_VERSION;
|
|
|
|
|
2018-12-12 18:09:50 +00:00
|
|
|
if ((min_tls > s->s3.tmp.max_ver) || (c->max_tls < s->s3.tmp.min_ver))
|
2017-04-12 16:02:42 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2018-12-12 18:09:50 +00:00
|
|
|
if (SSL_IS_DTLS(s) && (DTLS_VERSION_GT(c->min_dtls, s->s3.tmp.max_ver)
|
|
|
|
|| DTLS_VERSION_LT(c->max_dtls, s->s3.tmp.min_ver)))
|
2016-02-07 19:17:07 +00:00
|
|
|
return 1;
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
return !ssl_security(s, op, c->strength_bits, 0, (void *)c);
|
|
|
|
}
|
2013-12-15 13:32:24 +00:00
|
|
|
|
2016-11-25 10:22:02 +00:00
|
|
|
int tls_use_ticket(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-01-19 11:23:06 +00:00
|
|
|
if ((s->options & SSL_OP_NO_TICKET))
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
return ssl_security(s, SSL_SECOP_TICKET, 0, 0, NULL);
|
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
|
2014-11-17 16:52:59 +00:00
|
|
|
int tls1_set_server_sigalgs(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
size_t i;
|
2016-03-10 20:34:48 +00:00
|
|
|
|
|
|
|
/* Clear any shared signature algorithms */
|
2019-06-13 19:26:12 +00:00
|
|
|
OPENSSL_free(s->shared_sigalgs);
|
|
|
|
s->shared_sigalgs = NULL;
|
|
|
|
s->shared_sigalgslen = 0;
|
2017-02-18 03:42:15 +00:00
|
|
|
/* Clear certificate validity flags */
|
|
|
|
for (i = 0; i < SSL_PKEY_NUM; i++)
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.valid_flags[i] = 0;
|
2017-02-19 18:47:16 +00:00
|
|
|
/*
|
|
|
|
* If peer sent no signature algorithms check to see if we support
|
|
|
|
* the default algorithm for each certificate type
|
|
|
|
*/
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.peer_cert_sigalgs == NULL
|
|
|
|
&& s->s3.tmp.peer_sigalgs == NULL) {
|
2017-02-19 18:47:16 +00:00
|
|
|
const uint16_t *sent_sigs;
|
|
|
|
size_t sent_sigslen = tls12_get_psigalgs(s, 1, &sent_sigs);
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2017-02-19 18:47:16 +00:00
|
|
|
for (i = 0; i < SSL_PKEY_NUM; i++) {
|
|
|
|
const SIGALG_LOOKUP *lu = tls1_get_legacy_sigalg(s, i);
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
if (lu == NULL)
|
|
|
|
continue;
|
|
|
|
/* Check default matches a type we sent */
|
|
|
|
for (j = 0; j < sent_sigslen; j++) {
|
|
|
|
if (lu->sigalg == sent_sigs[j]) {
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.valid_flags[i] = CERT_PKEY_SIGN;
|
2017-02-19 18:47:16 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-02-18 03:42:15 +00:00
|
|
|
return 1;
|
2017-02-19 18:47:16 +00:00
|
|
|
}
|
2017-02-18 03:42:15 +00:00
|
|
|
|
|
|
|
if (!tls1_process_sigalgs(s)) {
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR,
|
|
|
|
SSL_F_TLS1_SET_SERVER_SIGALGS, ERR_R_INTERNAL_ERROR);
|
|
|
|
return 0;
|
2015-05-12 17:56:39 +00:00
|
|
|
}
|
2019-06-13 19:26:12 +00:00
|
|
|
if (s->shared_sigalgs != NULL)
|
2017-02-18 03:42:15 +00:00
|
|
|
return 1;
|
2017-11-21 17:18:43 +00:00
|
|
|
|
2017-05-16 16:28:23 +00:00
|
|
|
/* Fatal error if no shared signature algorithms */
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_F_TLS1_SET_SERVER_SIGALGS,
|
|
|
|
SSL_R_NO_SHARED_SIGNATURE_ALGORITHMS);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2014-11-17 16:52:59 +00:00
|
|
|
|
2014-12-28 02:48:40 +00:00
|
|
|
/*-
|
2016-10-22 16:24:37 +00:00
|
|
|
* Gets the ticket information supplied by the client if any.
|
2015-12-04 19:48:15 +00:00
|
|
|
*
|
2016-10-22 16:24:37 +00:00
|
|
|
* hello: The parsed ClientHello data
|
2011-09-05 13:36:23 +00:00
|
|
|
* ret: (output) on return, if a ticket was decrypted, then this is set to
|
|
|
|
* point to the resulting session.
|
2007-08-11 23:18:29 +00:00
|
|
|
*/
|
2018-05-09 17:22:36 +00:00
|
|
|
SSL_TICKET_STATUS tls_get_ticket_from_client(SSL *s, CLIENTHELLO_MSG *hello,
|
2017-03-15 17:25:55 +00:00
|
|
|
SSL_SESSION **ret)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-10-22 16:24:37 +00:00
|
|
|
size_t size;
|
|
|
|
RAW_EXTENSION *ticketext;
|
2015-12-04 19:48:15 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
*ret = NULL;
|
2016-12-08 19:18:40 +00:00
|
|
|
s->ext.ticket_expected = 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
/*
|
2016-11-08 16:10:21 +00:00
|
|
|
* If tickets disabled or not supported by the protocol version
|
|
|
|
* (e.g. TLSv1.3) behave as if no ticket present to permit stateful
|
2015-01-22 03:40:55 +00:00
|
|
|
* resumption.
|
|
|
|
*/
|
2016-10-22 16:24:37 +00:00
|
|
|
if (s->version <= SSL3_VERSION || !tls_use_ticket(s))
|
2017-03-15 17:25:55 +00:00
|
|
|
return SSL_TICKET_NONE;
|
2015-04-16 09:06:25 +00:00
|
|
|
|
2016-11-28 09:31:59 +00:00
|
|
|
ticketext = &hello->pre_proc_exts[TLSEXT_IDX_session_ticket];
|
|
|
|
if (!ticketext->present)
|
2017-03-15 17:25:55 +00:00
|
|
|
return SSL_TICKET_NONE;
|
2016-10-22 16:24:37 +00:00
|
|
|
|
|
|
|
size = PACKET_remaining(&ticketext->data);
|
2016-11-28 09:31:59 +00:00
|
|
|
|
2018-05-08 13:50:17 +00:00
|
|
|
return tls_decrypt_ticket(s, PACKET_data(&ticketext->data), size,
|
2016-11-28 09:31:59 +00:00
|
|
|
hello->session_id, hello->session_id_len, ret);
|
2016-10-22 16:24:37 +00:00
|
|
|
}
|
|
|
|
|
2014-12-28 02:48:40 +00:00
|
|
|
/*-
|
|
|
|
* tls_decrypt_ticket attempts to decrypt a session ticket.
|
2011-09-05 13:36:23 +00:00
|
|
|
*
|
2018-05-09 17:22:36 +00:00
|
|
|
* If s->tls_session_secret_cb is set and we're not doing TLSv1.3 then we are
|
|
|
|
* expecting a pre-shared key ciphersuite, in which case we have no use for
|
|
|
|
* session tickets and one will never be decrypted, nor will
|
|
|
|
* s->ext.ticket_expected be set to 1.
|
|
|
|
*
|
|
|
|
* Side effects:
|
|
|
|
* Sets s->ext.ticket_expected to 1 if the server will have to issue
|
|
|
|
* a new session ticket to the client because the client indicated support
|
|
|
|
* (and s->tls_session_secret_cb is NULL) but the client either doesn't have
|
|
|
|
* a session ticket or we couldn't use the one it gave us, or if
|
|
|
|
* s->ctx->ext.ticket_key_cb asked to renew the client's ticket.
|
|
|
|
* Otherwise, s->ext.ticket_expected is set to 0.
|
|
|
|
*
|
2011-09-05 13:36:23 +00:00
|
|
|
* etick: points to the body of the session ticket extension.
|
2016-03-10 20:34:48 +00:00
|
|
|
* eticklen: the length of the session tickets extension.
|
2011-09-05 13:36:23 +00:00
|
|
|
* sess_id: points at the session ID.
|
|
|
|
* sesslen: the length of the session ID.
|
|
|
|
* psess: (output) on return, if a ticket was decrypted, then this is set to
|
|
|
|
* point to the resulting session.
|
|
|
|
*/
|
2018-05-09 17:22:36 +00:00
|
|
|
SSL_TICKET_STATUS tls_decrypt_ticket(SSL *s, const unsigned char *etick,
|
2017-03-15 17:25:55 +00:00
|
|
|
size_t eticklen, const unsigned char *sess_id,
|
|
|
|
size_t sesslen, SSL_SESSION **psess)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2018-05-09 17:22:36 +00:00
|
|
|
SSL_SESSION *sess = NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
unsigned char *sdec;
|
|
|
|
const unsigned char *p;
|
2017-01-20 16:01:27 +00:00
|
|
|
int slen, renew_ticket = 0, declen;
|
2018-05-09 17:22:36 +00:00
|
|
|
SSL_TICKET_STATUS ret = SSL_TICKET_FATAL_ERR_OTHER;
|
2016-10-19 14:11:24 +00:00
|
|
|
size_t mlen;
|
2015-01-22 03:40:55 +00:00
|
|
|
unsigned char tick_hmac[EVP_MAX_MD_SIZE];
|
2015-11-30 12:44:28 +00:00
|
|
|
HMAC_CTX *hctx = NULL;
|
2018-02-20 10:20:20 +00:00
|
|
|
EVP_CIPHER_CTX *ctx = NULL;
|
2017-01-31 20:32:50 +00:00
|
|
|
SSL_CTX *tctx = s->session_ctx;
|
2016-08-22 16:20:01 +00:00
|
|
|
|
2018-05-09 17:22:36 +00:00
|
|
|
if (eticklen == 0) {
|
|
|
|
/*
|
|
|
|
* The client will accept a ticket but doesn't currently have
|
|
|
|
* one (TLSv1.2 and below), or treated as a fatal error in TLSv1.3
|
|
|
|
*/
|
|
|
|
ret = SSL_TICKET_EMPTY;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
if (!SSL_IS_TLS13(s) && s->ext.session_secret_cb) {
|
|
|
|
/*
|
|
|
|
* Indicate that the ticket couldn't be decrypted rather than
|
|
|
|
* generating the session from ticket now, trigger
|
|
|
|
* abbreviated handshake based on external mechanism to
|
|
|
|
* calculate the master secret later.
|
|
|
|
*/
|
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2018-02-20 10:20:20 +00:00
|
|
|
/* Need at least keyname + iv */
|
|
|
|
if (eticklen < TLSEXT_KEYNAME_LENGTH + EVP_MAX_IV_LENGTH) {
|
2017-03-15 17:25:55 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
2018-05-08 13:50:17 +00:00
|
|
|
goto end;
|
2018-02-20 10:20:20 +00:00
|
|
|
}
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/* Initialize session ticket encryption and HMAC contexts */
|
2015-11-30 12:44:28 +00:00
|
|
|
hctx = HMAC_CTX_new();
|
2018-05-08 13:50:17 +00:00
|
|
|
if (hctx == NULL) {
|
|
|
|
ret = SSL_TICKET_FATAL_ERR_MALLOC;
|
|
|
|
goto end;
|
|
|
|
}
|
2015-12-13 21:08:41 +00:00
|
|
|
ctx = EVP_CIPHER_CTX_new();
|
2016-02-13 23:22:45 +00:00
|
|
|
if (ctx == NULL) {
|
2017-03-15 17:25:55 +00:00
|
|
|
ret = SSL_TICKET_FATAL_ERR_MALLOC;
|
2018-05-08 13:50:17 +00:00
|
|
|
goto end;
|
2016-02-13 23:22:45 +00:00
|
|
|
}
|
2016-12-08 19:18:40 +00:00
|
|
|
if (tctx->ext.ticket_key_cb) {
|
2015-01-22 03:40:55 +00:00
|
|
|
unsigned char *nctick = (unsigned char *)etick;
|
2018-02-20 10:20:20 +00:00
|
|
|
int rv = tctx->ext.ticket_key_cb(s, nctick,
|
|
|
|
nctick + TLSEXT_KEYNAME_LENGTH,
|
|
|
|
ctx, hctx, 0);
|
2018-05-08 13:50:17 +00:00
|
|
|
if (rv < 0) {
|
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
goto end;
|
|
|
|
}
|
2016-02-13 23:22:45 +00:00
|
|
|
if (rv == 0) {
|
2017-03-15 17:25:55 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
2018-05-08 13:50:17 +00:00
|
|
|
goto end;
|
2016-02-13 23:22:45 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
if (rv == 2)
|
|
|
|
renew_ticket = 1;
|
|
|
|
} else {
|
|
|
|
/* Check key name matches */
|
2016-12-08 19:18:40 +00:00
|
|
|
if (memcmp(etick, tctx->ext.tick_key_name,
|
2018-02-20 10:20:20 +00:00
|
|
|
TLSEXT_KEYNAME_LENGTH) != 0) {
|
2017-03-15 17:25:55 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
2018-05-08 13:50:17 +00:00
|
|
|
goto end;
|
2016-02-13 23:22:45 +00:00
|
|
|
}
|
2018-03-19 14:50:51 +00:00
|
|
|
if (HMAC_Init_ex(hctx, tctx->ext.secure->tick_hmac_key,
|
|
|
|
sizeof(tctx->ext.secure->tick_hmac_key),
|
2015-11-06 16:31:21 +00:00
|
|
|
EVP_sha256(), NULL) <= 0
|
2016-08-05 17:03:17 +00:00
|
|
|
|| EVP_DecryptInit_ex(ctx, EVP_aes_256_cbc(), NULL,
|
2018-03-19 14:50:51 +00:00
|
|
|
tctx->ext.secure->tick_aes_key,
|
2018-02-20 10:20:20 +00:00
|
|
|
etick + TLSEXT_KEYNAME_LENGTH) <= 0) {
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
goto end;
|
2016-08-05 17:03:17 +00:00
|
|
|
}
|
2018-05-08 13:50:17 +00:00
|
|
|
if (SSL_IS_TLS13(s))
|
|
|
|
renew_ticket = 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Attempt to process session ticket, first conduct sanity and integrity
|
|
|
|
* checks on ticket.
|
|
|
|
*/
|
2015-11-30 12:44:28 +00:00
|
|
|
mlen = HMAC_size(hctx);
|
2016-10-19 14:11:24 +00:00
|
|
|
if (mlen == 0) {
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
goto end;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2018-05-08 13:50:17 +00:00
|
|
|
|
2016-08-22 16:20:01 +00:00
|
|
|
/* Sanity check ticket length: must exceed keyname + IV + HMAC */
|
|
|
|
if (eticklen <=
|
2016-10-19 14:11:24 +00:00
|
|
|
TLSEXT_KEYNAME_LENGTH + EVP_CIPHER_CTX_iv_length(ctx) + mlen) {
|
2017-03-15 17:25:55 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
2018-05-08 13:50:17 +00:00
|
|
|
goto end;
|
2016-08-22 16:20:01 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
eticklen -= mlen;
|
|
|
|
/* Check HMAC of encrypted ticket */
|
2015-11-30 12:44:28 +00:00
|
|
|
if (HMAC_Update(hctx, etick, eticklen) <= 0
|
2016-08-05 17:03:17 +00:00
|
|
|
|| HMAC_Final(hctx, tick_hmac, NULL) <= 0) {
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
goto end;
|
2015-11-06 16:31:21 +00:00
|
|
|
}
|
2018-05-08 13:50:17 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) {
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
|
|
|
goto end;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
/* Attempt to decrypt session data */
|
|
|
|
/* Move p after IV to start of encrypted ticket, update length */
|
2017-02-13 17:36:13 +00:00
|
|
|
p = etick + TLSEXT_KEYNAME_LENGTH + EVP_CIPHER_CTX_iv_length(ctx);
|
|
|
|
eticklen -= TLSEXT_KEYNAME_LENGTH + EVP_CIPHER_CTX_iv_length(ctx);
|
2015-01-22 03:40:55 +00:00
|
|
|
sdec = OPENSSL_malloc(eticklen);
|
2016-10-19 14:11:24 +00:00
|
|
|
if (sdec == NULL || EVP_DecryptUpdate(ctx, sdec, &slen, p,
|
|
|
|
(int)eticklen) <= 0) {
|
2016-03-15 11:38:56 +00:00
|
|
|
OPENSSL_free(sdec);
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
goto end;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-10-19 14:11:24 +00:00
|
|
|
if (EVP_DecryptFinal(ctx, sdec + slen, &declen) <= 0) {
|
2015-01-22 03:40:55 +00:00
|
|
|
OPENSSL_free(sdec);
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
|
|
|
goto end;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-10-19 14:11:24 +00:00
|
|
|
slen += declen;
|
2015-01-22 03:40:55 +00:00
|
|
|
p = sdec;
|
|
|
|
|
|
|
|
sess = d2i_SSL_SESSION(NULL, &p, slen);
|
2017-03-10 14:10:41 +00:00
|
|
|
slen -= p - sdec;
|
2015-01-22 03:40:55 +00:00
|
|
|
OPENSSL_free(sdec);
|
|
|
|
if (sess) {
|
2017-02-22 10:59:44 +00:00
|
|
|
/* Some additional consistency checks */
|
2018-03-15 17:47:29 +00:00
|
|
|
if (slen != 0) {
|
2017-02-22 10:59:44 +00:00
|
|
|
SSL_SESSION_free(sess);
|
2018-05-12 10:08:14 +00:00
|
|
|
sess = NULL;
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
|
|
|
goto end;
|
2017-02-22 10:59:44 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* The session ID, if non-empty, is used by some clients to detect
|
|
|
|
* that the ticket has been accepted. So we copy it to the session
|
|
|
|
* structure. If it is empty set length to zero as required by
|
|
|
|
* standard.
|
|
|
|
*/
|
2018-03-15 17:47:29 +00:00
|
|
|
if (sesslen) {
|
2015-01-22 03:40:55 +00:00
|
|
|
memcpy(sess->session_id, sess_id, sesslen);
|
2018-03-15 17:47:29 +00:00
|
|
|
sess->session_id_length = sesslen;
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
if (renew_ticket)
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_SUCCESS_RENEW;
|
2015-01-22 03:40:55 +00:00
|
|
|
else
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_SUCCESS;
|
|
|
|
goto end;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
ERR_clear_error();
|
|
|
|
/*
|
|
|
|
* For session parse failure, indicate that we need to send a new ticket.
|
|
|
|
*/
|
2018-05-08 13:50:17 +00:00
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
|
|
|
|
|
|
|
end:
|
2015-12-13 21:08:41 +00:00
|
|
|
EVP_CIPHER_CTX_free(ctx);
|
2015-11-30 12:44:28 +00:00
|
|
|
HMAC_CTX_free(hctx);
|
2018-05-08 13:50:17 +00:00
|
|
|
|
|
|
|
/*
|
2018-05-09 17:22:36 +00:00
|
|
|
* If set, the decrypt_ticket_cb() is called unless a fatal error was
|
|
|
|
* detected above. The callback is responsible for checking |ret| before it
|
|
|
|
* performs any action
|
2018-05-08 13:50:17 +00:00
|
|
|
*/
|
2018-05-09 17:22:36 +00:00
|
|
|
if (s->session_ctx->decrypt_ticket_cb != NULL
|
|
|
|
&& (ret == SSL_TICKET_EMPTY
|
|
|
|
|| ret == SSL_TICKET_NO_DECRYPT
|
|
|
|
|| ret == SSL_TICKET_SUCCESS
|
|
|
|
|| ret == SSL_TICKET_SUCCESS_RENEW)) {
|
2018-05-08 13:50:17 +00:00
|
|
|
size_t keyname_len = eticklen;
|
2018-05-09 17:22:36 +00:00
|
|
|
int retcb;
|
2018-05-08 13:50:17 +00:00
|
|
|
|
|
|
|
if (keyname_len > TLSEXT_KEYNAME_LENGTH)
|
|
|
|
keyname_len = TLSEXT_KEYNAME_LENGTH;
|
2018-05-09 17:22:36 +00:00
|
|
|
retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len,
|
|
|
|
ret,
|
|
|
|
s->session_ctx->ticket_cb_data);
|
|
|
|
switch (retcb) {
|
|
|
|
case SSL_TICKET_RETURN_ABORT:
|
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_TICKET_RETURN_IGNORE:
|
|
|
|
ret = SSL_TICKET_NONE;
|
|
|
|
SSL_SESSION_free(sess);
|
|
|
|
sess = NULL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_TICKET_RETURN_IGNORE_RENEW:
|
|
|
|
if (ret != SSL_TICKET_EMPTY && ret != SSL_TICKET_NO_DECRYPT)
|
|
|
|
ret = SSL_TICKET_NO_DECRYPT;
|
|
|
|
/* else the value of |ret| will already do the right thing */
|
|
|
|
SSL_SESSION_free(sess);
|
|
|
|
sess = NULL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_TICKET_RETURN_USE:
|
|
|
|
case SSL_TICKET_RETURN_USE_RENEW:
|
|
|
|
if (ret != SSL_TICKET_SUCCESS
|
|
|
|
&& ret != SSL_TICKET_SUCCESS_RENEW)
|
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
else if (retcb == SSL_TICKET_RETURN_USE)
|
|
|
|
ret = SSL_TICKET_SUCCESS;
|
|
|
|
else
|
|
|
|
ret = SSL_TICKET_SUCCESS_RENEW;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
ret = SSL_TICKET_FATAL_ERR_OTHER;
|
|
|
|
}
|
2018-05-08 13:50:17 +00:00
|
|
|
}
|
|
|
|
|
2018-06-06 10:54:32 +00:00
|
|
|
if (s->ext.session_secret_cb == NULL || SSL_IS_TLS13(s)) {
|
|
|
|
switch (ret) {
|
|
|
|
case SSL_TICKET_NO_DECRYPT:
|
|
|
|
case SSL_TICKET_SUCCESS_RENEW:
|
|
|
|
case SSL_TICKET_EMPTY:
|
|
|
|
s->ext.ticket_expected = 1;
|
|
|
|
}
|
2018-05-08 13:50:17 +00:00
|
|
|
}
|
|
|
|
|
2018-05-09 17:22:36 +00:00
|
|
|
*psess = sess;
|
|
|
|
|
|
|
|
return ret;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
|
2013-12-15 13:32:24 +00:00
|
|
|
/* Check to see if a signature algorithm is allowed */
|
2017-03-03 03:10:13 +00:00
|
|
|
static int tls12_sigalg_allowed(SSL *s, int op, const SIGALG_LOOKUP *lu)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-12-14 14:31:21 +00:00
|
|
|
unsigned char sigalgstr[2];
|
2017-01-30 17:27:35 +00:00
|
|
|
int secbits;
|
2016-12-14 14:31:21 +00:00
|
|
|
|
2017-01-30 17:27:35 +00:00
|
|
|
/* See if sigalgs is recognised and if hash is enabled */
|
2017-06-14 15:54:08 +00:00
|
|
|
if (!tls1_lookup_md(lu, NULL))
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2017-03-01 17:15:43 +00:00
|
|
|
/* DSA is not allowed in TLS 1.3 */
|
|
|
|
if (SSL_IS_TLS13(s) && lu->sig == EVP_PKEY_DSA)
|
|
|
|
return 0;
|
2017-04-24 23:20:33 +00:00
|
|
|
/* TODO(OpenSSL1.2) fully axe DSA/etc. in ClientHello per TLS 1.3 spec */
|
2018-12-12 18:09:50 +00:00
|
|
|
if (!s->server && !SSL_IS_DTLS(s) && s->s3.tmp.min_ver >= TLS1_3_VERSION
|
2017-04-24 23:20:33 +00:00
|
|
|
&& (lu->sig == EVP_PKEY_DSA || lu->hash_idx == SSL_MD_SHA1_IDX
|
|
|
|
|| lu->hash_idx == SSL_MD_MD5_IDX
|
|
|
|
|| lu->hash_idx == SSL_MD_SHA224_IDX))
|
|
|
|
return 0;
|
2018-07-03 16:45:35 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/* See if public key algorithm allowed */
|
2017-06-28 16:56:45 +00:00
|
|
|
if (ssl_cert_is_disabled(lu->sig_idx))
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2018-07-03 16:45:35 +00:00
|
|
|
|
|
|
|
if (lu->sig == NID_id_GostR3410_2012_256
|
|
|
|
|| lu->sig == NID_id_GostR3410_2012_512
|
|
|
|
|| lu->sig == NID_id_GostR3410_2001) {
|
|
|
|
/* We never allow GOST sig algs on the server with TLSv1.3 */
|
|
|
|
if (s->server && SSL_IS_TLS13(s))
|
|
|
|
return 0;
|
|
|
|
if (!s->server
|
|
|
|
&& s->method->version == TLS_ANY_VERSION
|
2018-12-12 18:09:50 +00:00
|
|
|
&& s->s3.tmp.max_ver >= TLS1_3_VERSION) {
|
2018-07-03 16:45:35 +00:00
|
|
|
int i, num;
|
|
|
|
STACK_OF(SSL_CIPHER) *sk;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We're a client that could negotiate TLSv1.3. We only allow GOST
|
|
|
|
* sig algs if we could negotiate TLSv1.2 or below and we have GOST
|
|
|
|
* ciphersuites enabled.
|
|
|
|
*/
|
|
|
|
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.min_ver >= TLS1_3_VERSION)
|
2018-07-03 16:45:35 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
sk = SSL_get_ciphers(s);
|
|
|
|
num = sk != NULL ? sk_SSL_CIPHER_num(sk) : 0;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
const SSL_CIPHER *c;
|
|
|
|
|
|
|
|
c = sk_SSL_CIPHER_value(sk, i);
|
|
|
|
/* Skip disabled ciphers */
|
|
|
|
if (ssl_cipher_disabled(s, c, SSL_SECOP_CIPHER_SUPPORTED, 0))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if ((c->algorithm_mkey & SSL_kGOST) != 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (i == num)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-14 15:54:08 +00:00
|
|
|
if (lu->hash == NID_undef)
|
|
|
|
return 1;
|
2017-01-30 17:27:35 +00:00
|
|
|
/* Security bits: half digest bits */
|
|
|
|
secbits = EVP_MD_size(ssl_md(lu->hash_idx)) * 4;
|
2015-01-22 03:40:55 +00:00
|
|
|
/* Finally see if security callback allows it */
|
2017-03-03 03:10:13 +00:00
|
|
|
sigalgstr[0] = (lu->sigalg >> 8) & 0xff;
|
|
|
|
sigalgstr[1] = lu->sigalg & 0xff;
|
2017-01-30 17:27:35 +00:00
|
|
|
return ssl_security(s, op, secbits, lu->hash, (void *)sigalgstr);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get a mask of disabled public key algorithms based on supported signature
|
|
|
|
* algorithms. For example if no signature algorithm supports RSA then RSA is
|
|
|
|
* disabled.
|
2013-12-15 13:32:24 +00:00
|
|
|
*/
|
|
|
|
|
2015-11-05 16:14:17 +00:00
|
|
|
void ssl_set_sig_mask(uint32_t *pmask_a, SSL *s, int op)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *sigalgs;
|
2015-01-22 03:40:55 +00:00
|
|
|
size_t i, sigalgslen;
|
2017-07-04 10:38:23 +00:00
|
|
|
uint32_t disabled_mask = SSL_aRSA | SSL_aDSS | SSL_aECDSA;
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
2017-07-04 10:38:23 +00:00
|
|
|
* Go through all signature algorithms seeing if we support any
|
|
|
|
* in disabled_mask.
|
2015-01-22 03:40:55 +00:00
|
|
|
*/
|
2017-01-25 19:12:48 +00:00
|
|
|
sigalgslen = tls12_get_psigalgs(s, 1, &sigalgs);
|
2017-10-21 02:58:46 +00:00
|
|
|
for (i = 0; i < sigalgslen; i++, sigalgs++) {
|
2017-03-03 03:10:13 +00:00
|
|
|
const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(*sigalgs);
|
2017-07-04 10:38:23 +00:00
|
|
|
const SSL_CERT_LOOKUP *clu;
|
2017-03-03 03:10:13 +00:00
|
|
|
|
|
|
|
if (lu == NULL)
|
|
|
|
continue;
|
2017-07-04 10:38:23 +00:00
|
|
|
|
|
|
|
clu = ssl_cert_lookup_by_idx(lu->sig_idx);
|
2019-07-16 10:24:10 +00:00
|
|
|
if (clu == NULL)
|
|
|
|
continue;
|
2017-07-04 10:38:23 +00:00
|
|
|
|
|
|
|
/* If algorithm is disabled see if we can enable it */
|
|
|
|
if ((clu->amask & disabled_mask) != 0
|
|
|
|
&& tls12_sigalg_allowed(s, op, lu))
|
|
|
|
disabled_mask &= ~clu->amask;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2017-07-04 10:38:23 +00:00
|
|
|
*pmask_a |= disabled_mask;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2013-12-15 13:32:24 +00:00
|
|
|
|
2016-09-05 16:34:04 +00:00
|
|
|
int tls12_copy_sigalgs(SSL *s, WPACKET *pkt,
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *psig, size_t psiglen)
|
2016-08-03 19:57:52 +00:00
|
|
|
{
|
|
|
|
size_t i;
|
2017-03-03 03:10:13 +00:00
|
|
|
int rv = 0;
|
2016-09-13 08:40:38 +00:00
|
|
|
|
2016-12-14 14:31:21 +00:00
|
|
|
for (i = 0; i < psiglen; i++, psig++) {
|
2017-03-03 03:10:13 +00:00
|
|
|
const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(*psig);
|
|
|
|
|
|
|
|
if (!tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SUPPORTED, lu))
|
|
|
|
continue;
|
|
|
|
if (!WPACKET_put_bytes_u16(pkt, *psig))
|
|
|
|
return 0;
|
|
|
|
/*
|
|
|
|
* If TLS 1.3 must have at least one valid TLS 1.3 message
|
2017-06-08 16:15:45 +00:00
|
|
|
* signing algorithm: i.e. neither RSA nor SHA1/SHA224
|
2017-03-03 03:10:13 +00:00
|
|
|
*/
|
|
|
|
if (rv == 0 && (!SSL_IS_TLS13(s)
|
2017-06-08 16:15:45 +00:00
|
|
|
|| (lu->sig != EVP_PKEY_RSA
|
|
|
|
&& lu->hash != NID_sha1
|
|
|
|
&& lu->hash != NID_sha224)))
|
2017-03-03 03:10:13 +00:00
|
|
|
rv = 1;
|
2016-08-03 19:57:52 +00:00
|
|
|
}
|
2017-03-03 03:23:27 +00:00
|
|
|
if (rv == 0)
|
|
|
|
SSLerr(SSL_F_TLS12_COPY_SIGALGS, SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM);
|
2017-03-03 03:10:13 +00:00
|
|
|
return rv;
|
2016-08-03 19:57:52 +00:00
|
|
|
}
|
|
|
|
|
2012-06-25 14:32:30 +00:00
|
|
|
/* Given preference and allowed sigalgs set shared sigalgs */
|
2017-01-26 15:24:35 +00:00
|
|
|
static size_t tls12_shared_sigalgs(SSL *s, const SIGALG_LOOKUP **shsig,
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *pref, size_t preflen,
|
|
|
|
const uint16_t *allow, size_t allowlen)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *ptmp, *atmp;
|
2015-01-22 03:40:55 +00:00
|
|
|
size_t i, j, nmatch = 0;
|
2016-12-14 14:31:21 +00:00
|
|
|
for (i = 0, ptmp = pref; i < preflen; i++, ptmp++) {
|
2017-03-03 03:10:13 +00:00
|
|
|
const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(*ptmp);
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/* Skip disabled hashes or signature algorithms */
|
2017-03-03 03:10:13 +00:00
|
|
|
if (!tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SHARED, lu))
|
2015-01-22 03:40:55 +00:00
|
|
|
continue;
|
2016-12-14 14:31:21 +00:00
|
|
|
for (j = 0, atmp = allow; j < allowlen; j++, atmp++) {
|
|
|
|
if (*ptmp == *atmp) {
|
2015-01-22 03:40:55 +00:00
|
|
|
nmatch++;
|
2017-03-03 03:10:13 +00:00
|
|
|
if (shsig)
|
|
|
|
*shsig++ = lu;
|
2015-01-22 03:40:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nmatch;
|
|
|
|
}
|
2012-06-25 14:32:30 +00:00
|
|
|
|
|
|
|
/* Set shared signature algorithms for SSL structures */
|
|
|
|
static int tls1_set_shared_sigalgs(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *pref, *allow, *conf;
|
2015-01-22 03:40:55 +00:00
|
|
|
size_t preflen, allowlen, conflen;
|
|
|
|
size_t nmatch;
|
2017-01-26 15:24:35 +00:00
|
|
|
const SIGALG_LOOKUP **salgs = NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
CERT *c = s->cert;
|
|
|
|
unsigned int is_suiteb = tls1_suiteb(s);
|
2015-05-01 14:02:07 +00:00
|
|
|
|
2019-06-13 19:26:12 +00:00
|
|
|
OPENSSL_free(s->shared_sigalgs);
|
|
|
|
s->shared_sigalgs = NULL;
|
|
|
|
s->shared_sigalgslen = 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
/* If client use client signature algorithms if not NULL */
|
|
|
|
if (!s->server && c->client_sigalgs && !is_suiteb) {
|
|
|
|
conf = c->client_sigalgs;
|
|
|
|
conflen = c->client_sigalgslen;
|
|
|
|
} else if (c->conf_sigalgs && !is_suiteb) {
|
|
|
|
conf = c->conf_sigalgs;
|
|
|
|
conflen = c->conf_sigalgslen;
|
|
|
|
} else
|
2017-01-25 19:12:48 +00:00
|
|
|
conflen = tls12_get_psigalgs(s, 0, &conf);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE || is_suiteb) {
|
|
|
|
pref = conf;
|
|
|
|
preflen = conflen;
|
2018-12-12 18:09:50 +00:00
|
|
|
allow = s->s3.tmp.peer_sigalgs;
|
|
|
|
allowlen = s->s3.tmp.peer_sigalgslen;
|
2015-01-22 03:40:55 +00:00
|
|
|
} else {
|
|
|
|
allow = conf;
|
|
|
|
allowlen = conflen;
|
2018-12-12 18:09:50 +00:00
|
|
|
pref = s->s3.tmp.peer_sigalgs;
|
|
|
|
preflen = s->s3.tmp.peer_sigalgslen;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
nmatch = tls12_shared_sigalgs(s, NULL, pref, preflen, allow, allowlen);
|
2015-03-03 13:20:57 +00:00
|
|
|
if (nmatch) {
|
2018-04-03 15:31:16 +00:00
|
|
|
if ((salgs = OPENSSL_malloc(nmatch * sizeof(*salgs))) == NULL) {
|
|
|
|
SSLerr(SSL_F_TLS1_SET_SHARED_SIGALGS, ERR_R_MALLOC_FAILURE);
|
2015-03-03 13:20:57 +00:00
|
|
|
return 0;
|
2018-04-03 15:31:16 +00:00
|
|
|
}
|
2015-03-03 13:20:57 +00:00
|
|
|
nmatch = tls12_shared_sigalgs(s, salgs, pref, preflen, allow, allowlen);
|
|
|
|
} else {
|
|
|
|
salgs = NULL;
|
|
|
|
}
|
2019-06-13 19:26:12 +00:00
|
|
|
s->shared_sigalgs = salgs;
|
|
|
|
s->shared_sigalgslen = nmatch;
|
2015-01-22 03:40:55 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2012-06-25 14:32:30 +00:00
|
|
|
|
2017-09-22 15:06:52 +00:00
|
|
|
int tls1_save_u16(PACKET *pkt, uint16_t **pdest, size_t *pdestlen)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-01-25 14:33:55 +00:00
|
|
|
unsigned int stmp;
|
2016-12-14 14:31:21 +00:00
|
|
|
size_t size, i;
|
2017-09-22 15:06:52 +00:00
|
|
|
uint16_t *buf;
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2016-12-14 14:31:21 +00:00
|
|
|
size = PACKET_remaining(pkt);
|
|
|
|
|
|
|
|
/* Invalid data length */
|
2017-03-03 02:44:18 +00:00
|
|
|
if (size == 0 || (size & 1) != 0)
|
2016-12-14 14:31:21 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
size >>= 1;
|
|
|
|
|
2018-04-03 15:31:16 +00:00
|
|
|
if ((buf = OPENSSL_malloc(size * sizeof(*buf))) == NULL) {
|
|
|
|
SSLerr(SSL_F_TLS1_SAVE_U16, ERR_R_MALLOC_FAILURE);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2018-04-03 15:31:16 +00:00
|
|
|
}
|
2017-01-25 14:33:55 +00:00
|
|
|
for (i = 0; i < size && PACKET_get_net_2(pkt, &stmp); i++)
|
2017-09-22 15:06:52 +00:00
|
|
|
buf[i] = stmp;
|
2016-12-14 14:31:21 +00:00
|
|
|
|
2017-09-22 15:06:52 +00:00
|
|
|
if (i != size) {
|
|
|
|
OPENSSL_free(buf);
|
2016-12-14 14:31:21 +00:00
|
|
|
return 0;
|
2017-09-22 15:06:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
OPENSSL_free(*pdest);
|
|
|
|
*pdest = buf;
|
|
|
|
*pdestlen = size;
|
2016-12-14 14:31:21 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2011-05-06 13:00:07 +00:00
|
|
|
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
int tls1_save_sigalgs(SSL *s, PACKET *pkt, int cert)
|
2017-09-22 15:06:52 +00:00
|
|
|
{
|
|
|
|
/* Extension ignored for inappropriate versions */
|
|
|
|
if (!SSL_USE_SIGALGS(s))
|
|
|
|
return 1;
|
|
|
|
/* Should never happen */
|
|
|
|
if (s->cert == NULL)
|
|
|
|
return 0;
|
|
|
|
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
if (cert)
|
2018-12-12 18:09:50 +00:00
|
|
|
return tls1_save_u16(pkt, &s->s3.tmp.peer_cert_sigalgs,
|
|
|
|
&s->s3.tmp.peer_cert_sigalgslen);
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
else
|
2018-12-12 18:09:50 +00:00
|
|
|
return tls1_save_u16(pkt, &s->s3.tmp.peer_sigalgs,
|
|
|
|
&s->s3.tmp.peer_sigalgslen);
|
2017-09-22 15:06:52 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set preferred digest for each key type */
|
|
|
|
|
2014-10-09 19:37:27 +00:00
|
|
|
int tls1_process_sigalgs(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
size_t i;
|
2018-12-12 18:09:50 +00:00
|
|
|
uint32_t *pvalid = s->s3.tmp.valid_flags;
|
2017-01-26 15:24:35 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (!tls1_set_shared_sigalgs(s))
|
|
|
|
return 0;
|
|
|
|
|
2017-02-18 03:42:15 +00:00
|
|
|
for (i = 0; i < SSL_PKEY_NUM; i++)
|
|
|
|
pvalid[i] = 0;
|
|
|
|
|
2019-06-13 19:26:12 +00:00
|
|
|
for (i = 0; i < s->shared_sigalgslen; i++) {
|
|
|
|
const SIGALG_LOOKUP *sigptr = s->shared_sigalgs[i];
|
2017-02-18 03:42:15 +00:00
|
|
|
int idx = sigptr->sig_idx;
|
2017-01-26 15:24:35 +00:00
|
|
|
|
2016-12-30 14:08:19 +00:00
|
|
|
/* Ignore PKCS1 based sig algs in TLSv1.3 */
|
2017-01-26 15:24:35 +00:00
|
|
|
if (SSL_IS_TLS13(s) && sigptr->sig == EVP_PKEY_RSA)
|
2016-12-30 14:08:19 +00:00
|
|
|
continue;
|
2017-02-18 03:42:15 +00:00
|
|
|
/* If not disabled indicate we can explicitly sign */
|
2017-06-28 16:56:45 +00:00
|
|
|
if (pvalid[idx] == 0 && !ssl_cert_is_disabled(idx))
|
|
|
|
pvalid[idx] = CERT_PKEY_EXPLICIT_SIGN | CERT_PKEY_SIGN;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
2011-12-31 22:59:57 +00:00
|
|
|
|
2012-03-06 14:28:21 +00:00
|
|
|
int SSL_get_sigalgs(SSL *s, int idx,
|
2015-01-22 03:40:55 +00:00
|
|
|
int *psign, int *phash, int *psignhash,
|
|
|
|
unsigned char *rsig, unsigned char *rhash)
|
|
|
|
{
|
2018-12-12 18:09:50 +00:00
|
|
|
uint16_t *psig = s->s3.tmp.peer_sigalgs;
|
|
|
|
size_t numsigalgs = s->s3.tmp.peer_sigalgslen;
|
2016-10-19 14:11:24 +00:00
|
|
|
if (psig == NULL || numsigalgs > INT_MAX)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
if (idx >= 0) {
|
2017-01-26 15:24:35 +00:00
|
|
|
const SIGALG_LOOKUP *lu;
|
|
|
|
|
2016-12-14 14:31:21 +00:00
|
|
|
if (idx >= (int)numsigalgs)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
psig += idx;
|
2017-01-26 15:24:35 +00:00
|
|
|
if (rhash != NULL)
|
2016-12-14 16:37:48 +00:00
|
|
|
*rhash = (unsigned char)((*psig >> 8) & 0xff);
|
2017-01-26 15:24:35 +00:00
|
|
|
if (rsig != NULL)
|
2016-12-14 16:37:48 +00:00
|
|
|
*rsig = (unsigned char)(*psig & 0xff);
|
2017-01-26 15:24:35 +00:00
|
|
|
lu = tls1_lookup_sigalg(*psig);
|
|
|
|
if (psign != NULL)
|
|
|
|
*psign = lu != NULL ? lu->sig : NID_undef;
|
|
|
|
if (phash != NULL)
|
|
|
|
*phash = lu != NULL ? lu->hash : NID_undef;
|
|
|
|
if (psignhash != NULL)
|
|
|
|
*psignhash = lu != NULL ? lu->sigandhash : NID_undef;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-10-19 14:11:24 +00:00
|
|
|
return (int)numsigalgs;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2012-06-25 14:32:30 +00:00
|
|
|
|
|
|
|
int SSL_get_shared_sigalgs(SSL *s, int idx,
|
2015-01-22 03:40:55 +00:00
|
|
|
int *psign, int *phash, int *psignhash,
|
|
|
|
unsigned char *rsig, unsigned char *rhash)
|
|
|
|
{
|
2017-01-26 15:24:35 +00:00
|
|
|
const SIGALG_LOOKUP *shsigalgs;
|
2019-06-13 19:26:12 +00:00
|
|
|
if (s->shared_sigalgs == NULL
|
2017-02-02 11:11:10 +00:00
|
|
|
|| idx < 0
|
2019-06-13 19:26:12 +00:00
|
|
|
|| idx >= (int)s->shared_sigalgslen
|
|
|
|
|| s->shared_sigalgslen > INT_MAX)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2019-06-13 19:26:12 +00:00
|
|
|
shsigalgs = s->shared_sigalgs[idx];
|
2017-01-26 15:24:35 +00:00
|
|
|
if (phash != NULL)
|
|
|
|
*phash = shsigalgs->hash;
|
|
|
|
if (psign != NULL)
|
|
|
|
*psign = shsigalgs->sig;
|
|
|
|
if (psignhash != NULL)
|
|
|
|
*psignhash = shsigalgs->sigandhash;
|
|
|
|
if (rsig != NULL)
|
|
|
|
*rsig = (unsigned char)(shsigalgs->sigalg & 0xff);
|
|
|
|
if (rhash != NULL)
|
|
|
|
*rhash = (unsigned char)((shsigalgs->sigalg >> 8) & 0xff);
|
2019-06-13 19:26:12 +00:00
|
|
|
return (int)s->shared_sigalgslen;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2017-01-29 15:12:58 +00:00
|
|
|
/* Maximum possible number of unique entries in sigalgs array */
|
|
|
|
#define TLS_MAX_SIGALGCNT (OSSL_NELEM(sigalg_lookup_tbl) * 2)
|
2012-06-22 14:03:31 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
typedef struct {
|
|
|
|
size_t sigalgcnt;
|
2018-01-17 17:55:29 +00:00
|
|
|
/* TLSEXT_SIGALG_XXX values */
|
|
|
|
uint16_t sigalgs[TLS_MAX_SIGALGCNT];
|
2015-01-22 03:40:55 +00:00
|
|
|
} sig_cb_st;
|
2012-06-22 14:03:31 +00:00
|
|
|
|
2015-07-23 13:57:42 +00:00
|
|
|
static void get_sigorhash(int *psig, int *phash, const char *str)
|
|
|
|
{
|
|
|
|
if (strcmp(str, "RSA") == 0) {
|
|
|
|
*psig = EVP_PKEY_RSA;
|
2017-01-25 16:22:13 +00:00
|
|
|
} else if (strcmp(str, "RSA-PSS") == 0 || strcmp(str, "PSS") == 0) {
|
|
|
|
*psig = EVP_PKEY_RSA_PSS;
|
2015-07-23 13:57:42 +00:00
|
|
|
} else if (strcmp(str, "DSA") == 0) {
|
|
|
|
*psig = EVP_PKEY_DSA;
|
|
|
|
} else if (strcmp(str, "ECDSA") == 0) {
|
|
|
|
*psig = EVP_PKEY_EC;
|
|
|
|
} else {
|
|
|
|
*phash = OBJ_sn2nid(str);
|
|
|
|
if (*phash == NID_undef)
|
|
|
|
*phash = OBJ_ln2nid(str);
|
|
|
|
}
|
|
|
|
}
|
2017-01-29 15:12:58 +00:00
|
|
|
/* Maximum length of a signature algorithm string component */
|
|
|
|
#define TLS_MAX_SIGSTRING_LEN 40
|
2015-07-23 13:57:42 +00:00
|
|
|
|
2012-06-22 14:03:31 +00:00
|
|
|
static int sig_cb(const char *elem, int len, void *arg)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
sig_cb_st *sarg = arg;
|
|
|
|
size_t i;
|
2018-01-17 17:55:29 +00:00
|
|
|
const SIGALG_LOOKUP *s;
|
2017-01-29 15:12:58 +00:00
|
|
|
char etmp[TLS_MAX_SIGSTRING_LEN], *p;
|
2015-07-23 13:57:42 +00:00
|
|
|
int sig_alg = NID_undef, hash_alg = NID_undef;
|
2015-01-24 13:46:50 +00:00
|
|
|
if (elem == NULL)
|
|
|
|
return 0;
|
2017-01-29 15:12:58 +00:00
|
|
|
if (sarg->sigalgcnt == TLS_MAX_SIGALGCNT)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
if (len > (int)(sizeof(etmp) - 1))
|
|
|
|
return 0;
|
|
|
|
memcpy(etmp, elem, len);
|
|
|
|
etmp[len] = 0;
|
|
|
|
p = strchr(etmp, '+');
|
2018-01-17 17:55:29 +00:00
|
|
|
/*
|
|
|
|
* We only allow SignatureSchemes listed in the sigalg_lookup_tbl;
|
|
|
|
* if there's no '+' in the provided name, look for the new-style combined
|
|
|
|
* name. If not, match both sig+hash to find the needed SIGALG_LOOKUP.
|
|
|
|
* Just sig+hash is not unique since TLS 1.3 adds rsa_pss_pss_* and
|
|
|
|
* rsa_pss_rsae_* that differ only by public key OID; in such cases
|
|
|
|
* we will pick the _rsae_ variant, by virtue of them appearing earlier
|
|
|
|
* in the table.
|
|
|
|
*/
|
2017-01-26 14:40:59 +00:00
|
|
|
if (p == NULL) {
|
|
|
|
for (i = 0, s = sigalg_lookup_tbl; i < OSSL_NELEM(sigalg_lookup_tbl);
|
|
|
|
i++, s++) {
|
|
|
|
if (s->name != NULL && strcmp(etmp, s->name) == 0) {
|
2018-01-17 17:55:29 +00:00
|
|
|
sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
|
2017-01-26 14:40:59 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2018-01-17 17:55:29 +00:00
|
|
|
if (i == OSSL_NELEM(sigalg_lookup_tbl))
|
|
|
|
return 0;
|
2017-01-26 14:40:59 +00:00
|
|
|
} else {
|
|
|
|
*p = 0;
|
|
|
|
p++;
|
|
|
|
if (*p == 0)
|
|
|
|
return 0;
|
|
|
|
get_sigorhash(&sig_alg, &hash_alg, etmp);
|
|
|
|
get_sigorhash(&sig_alg, &hash_alg, p);
|
2018-01-17 17:55:29 +00:00
|
|
|
if (sig_alg == NID_undef || hash_alg == NID_undef)
|
|
|
|
return 0;
|
|
|
|
for (i = 0, s = sigalg_lookup_tbl; i < OSSL_NELEM(sigalg_lookup_tbl);
|
|
|
|
i++, s++) {
|
|
|
|
if (s->hash == hash_alg && s->sig == sig_alg) {
|
|
|
|
sarg->sigalgs[sarg->sigalgcnt++] = s->sigalg;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (i == OSSL_NELEM(sigalg_lookup_tbl))
|
|
|
|
return 0;
|
2017-01-26 14:40:59 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2018-01-17 17:55:29 +00:00
|
|
|
/* Reject duplicates */
|
|
|
|
for (i = 0; i < sarg->sigalgcnt - 1; i++) {
|
2018-01-26 01:30:54 +00:00
|
|
|
if (sarg->sigalgs[i] == sarg->sigalgs[sarg->sigalgcnt - 1]) {
|
2018-01-17 17:55:29 +00:00
|
|
|
sarg->sigalgcnt--;
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2018-01-17 17:55:29 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2016-06-28 20:39:55 +00:00
|
|
|
* Set supported signature algorithms based on a colon separated list of the
|
2015-01-22 03:40:55 +00:00
|
|
|
* form sig+hash e.g. RSA+SHA512:DSA+SHA512
|
|
|
|
*/
|
2012-07-03 12:51:14 +00:00
|
|
|
int tls1_set_sigalgs_list(CERT *c, const char *str, int client)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
sig_cb_st sig;
|
|
|
|
sig.sigalgcnt = 0;
|
|
|
|
if (!CONF_parse_list(str, ':', 1, sig_cb, &sig))
|
|
|
|
return 0;
|
|
|
|
if (c == NULL)
|
|
|
|
return 1;
|
2018-01-17 17:55:29 +00:00
|
|
|
return tls1_set_raw_sigalgs(c, sig.sigalgs, sig.sigalgcnt, client);
|
|
|
|
}
|
|
|
|
|
|
|
|
int tls1_set_raw_sigalgs(CERT *c, const uint16_t *psigs, size_t salglen,
|
|
|
|
int client)
|
|
|
|
{
|
|
|
|
uint16_t *sigalgs;
|
|
|
|
|
2018-04-03 15:31:16 +00:00
|
|
|
if ((sigalgs = OPENSSL_malloc(salglen * sizeof(*sigalgs))) == NULL) {
|
|
|
|
SSLerr(SSL_F_TLS1_SET_RAW_SIGALGS, ERR_R_MALLOC_FAILURE);
|
2018-01-17 17:55:29 +00:00
|
|
|
return 0;
|
2018-04-03 15:31:16 +00:00
|
|
|
}
|
2018-01-17 17:55:29 +00:00
|
|
|
memcpy(sigalgs, psigs, salglen * sizeof(*sigalgs));
|
|
|
|
|
|
|
|
if (client) {
|
|
|
|
OPENSSL_free(c->client_sigalgs);
|
|
|
|
c->client_sigalgs = sigalgs;
|
|
|
|
c->client_sigalgslen = salglen;
|
|
|
|
} else {
|
|
|
|
OPENSSL_free(c->conf_sigalgs);
|
|
|
|
c->conf_sigalgs = sigalgs;
|
|
|
|
c->conf_sigalgslen = salglen;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2016-08-05 17:03:17 +00:00
|
|
|
int tls1_set_sigalgs(CERT *c, const int *psig_nids, size_t salglen, int client)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-01-25 14:33:55 +00:00
|
|
|
uint16_t *sigalgs, *sptr;
|
2015-01-22 03:40:55 +00:00
|
|
|
size_t i;
|
2016-12-14 16:50:14 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (salglen & 1)
|
|
|
|
return 0;
|
2018-04-03 15:31:16 +00:00
|
|
|
if ((sigalgs = OPENSSL_malloc((salglen / 2) * sizeof(*sigalgs))) == NULL) {
|
|
|
|
SSLerr(SSL_F_TLS1_SET_SIGALGS, ERR_R_MALLOC_FAILURE);
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
2018-04-03 15:31:16 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
for (i = 0, sptr = sigalgs; i < salglen; i += 2) {
|
2016-12-14 16:50:14 +00:00
|
|
|
size_t j;
|
2017-01-10 14:23:02 +00:00
|
|
|
const SIGALG_LOOKUP *curr;
|
2016-12-14 16:50:14 +00:00
|
|
|
int md_id = *psig_nids++;
|
|
|
|
int sig_id = *psig_nids++;
|
|
|
|
|
|
|
|
for (j = 0, curr = sigalg_lookup_tbl; j < OSSL_NELEM(sigalg_lookup_tbl);
|
|
|
|
j++, curr++) {
|
2017-01-03 10:01:39 +00:00
|
|
|
if (curr->hash == md_id && curr->sig == sig_id) {
|
2016-12-14 16:50:14 +00:00
|
|
|
*sptr++ = curr->sigalg;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2016-12-14 16:50:14 +00:00
|
|
|
if (j == OSSL_NELEM(sigalg_lookup_tbl))
|
2015-01-22 03:40:55 +00:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (client) {
|
2015-05-01 14:02:07 +00:00
|
|
|
OPENSSL_free(c->client_sigalgs);
|
2015-01-22 03:40:55 +00:00
|
|
|
c->client_sigalgs = sigalgs;
|
2017-01-10 14:23:02 +00:00
|
|
|
c->client_sigalgslen = salglen / 2;
|
2015-01-22 03:40:55 +00:00
|
|
|
} else {
|
2015-05-01 14:02:07 +00:00
|
|
|
OPENSSL_free(c->conf_sigalgs);
|
2015-01-22 03:40:55 +00:00
|
|
|
c->conf_sigalgs = sigalgs;
|
2017-01-10 14:23:02 +00:00
|
|
|
c->conf_sigalgslen = salglen / 2;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
err:
|
|
|
|
OPENSSL_free(sigalgs);
|
|
|
|
return 0;
|
|
|
|
}
|
2012-06-25 14:32:30 +00:00
|
|
|
|
2019-06-13 19:26:12 +00:00
|
|
|
static int tls1_check_sig_alg(SSL *s, X509 *x, int default_nid)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
int sig_nid;
|
|
|
|
size_t i;
|
|
|
|
if (default_nid == -1)
|
|
|
|
return 1;
|
|
|
|
sig_nid = X509_get_signature_nid(x);
|
|
|
|
if (default_nid)
|
|
|
|
return sig_nid == default_nid ? 1 : 0;
|
2019-06-13 19:26:12 +00:00
|
|
|
for (i = 0; i < s->shared_sigalgslen; i++)
|
|
|
|
if (sig_nid == s->shared_sigalgs[i]->sigandhash)
|
2015-01-22 03:40:55 +00:00
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-07-27 13:39:23 +00:00
|
|
|
/* Check to see if a certificate issuer name matches list of CA names */
|
|
|
|
static int ssl_check_ca_name(STACK_OF(X509_NAME) *names, X509 *x)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
X509_NAME *nm;
|
|
|
|
int i;
|
|
|
|
nm = X509_get_issuer_name(x);
|
|
|
|
for (i = 0; i < sk_X509_NAME_num(names); i++) {
|
|
|
|
if (!X509_NAME_cmp(nm, sk_X509_NAME_value(names, i)))
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check certificate chain is consistent with TLS extensions and is usable by
|
|
|
|
* server. This servers two purposes: it allows users to check chains before
|
|
|
|
* passing them to the server and it allows the server to check chains before
|
|
|
|
* attempting to use them.
|
2012-06-28 12:45:49 +00:00
|
|
|
*/
|
2012-07-27 13:39:23 +00:00
|
|
|
|
2017-03-28 21:57:28 +00:00
|
|
|
/* Flags which need to be set for a certificate when strict mode not set */
|
2012-07-27 13:39:23 +00:00
|
|
|
|
2015-05-15 09:49:56 +00:00
|
|
|
#define CERT_PKEY_VALID_FLAGS \
|
2015-01-22 03:40:55 +00:00
|
|
|
(CERT_PKEY_EE_SIGNATURE|CERT_PKEY_EE_PARAM)
|
2012-07-27 13:39:23 +00:00
|
|
|
/* Strict mode flags */
|
2015-05-15 09:49:56 +00:00
|
|
|
#define CERT_PKEY_STRICT_FLAGS \
|
2015-01-22 03:40:55 +00:00
|
|
|
(CERT_PKEY_VALID_FLAGS|CERT_PKEY_CA_SIGNATURE|CERT_PKEY_CA_PARAM \
|
|
|
|
| CERT_PKEY_ISSUER_NAME|CERT_PKEY_CERT_TYPE)
|
2012-07-27 13:39:23 +00:00
|
|
|
|
2012-06-28 12:45:49 +00:00
|
|
|
int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain,
|
2015-01-22 03:40:55 +00:00
|
|
|
int idx)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
int rv = 0;
|
|
|
|
int check_flags = 0, strict_mode;
|
|
|
|
CERT_PKEY *cpk = NULL;
|
|
|
|
CERT *c = s->cert;
|
2015-07-14 22:19:11 +00:00
|
|
|
uint32_t *pvalid;
|
2015-01-22 03:40:55 +00:00
|
|
|
unsigned int suiteb_flags = tls1_suiteb(s);
|
|
|
|
/* idx == -1 means checking server chains */
|
|
|
|
if (idx != -1) {
|
|
|
|
/* idx == -2 means checking client certificate chains */
|
|
|
|
if (idx == -2) {
|
|
|
|
cpk = c->key;
|
2016-10-19 14:11:24 +00:00
|
|
|
idx = (int)(cpk - c->pkeys);
|
2015-01-22 03:40:55 +00:00
|
|
|
} else
|
|
|
|
cpk = c->pkeys + idx;
|
2018-12-12 18:09:50 +00:00
|
|
|
pvalid = s->s3.tmp.valid_flags + idx;
|
2015-01-22 03:40:55 +00:00
|
|
|
x = cpk->x509;
|
|
|
|
pk = cpk->privatekey;
|
|
|
|
chain = cpk->chain;
|
|
|
|
strict_mode = c->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT;
|
|
|
|
/* If no cert or key, forget it */
|
|
|
|
if (!x || !pk)
|
|
|
|
goto end;
|
|
|
|
} else {
|
2017-06-29 14:20:09 +00:00
|
|
|
size_t certidx;
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (!x || !pk)
|
2015-03-11 17:01:38 +00:00
|
|
|
return 0;
|
2017-06-29 14:20:09 +00:00
|
|
|
|
|
|
|
if (ssl_cert_lookup_by_pkey(pk, &certidx) == NULL)
|
2015-03-11 17:01:38 +00:00
|
|
|
return 0;
|
2017-06-29 14:20:09 +00:00
|
|
|
idx = certidx;
|
2018-12-12 18:09:50 +00:00
|
|
|
pvalid = s->s3.tmp.valid_flags + idx;
|
2015-05-12 21:17:34 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (c->cert_flags & SSL_CERT_FLAGS_CHECK_TLS_STRICT)
|
|
|
|
check_flags = CERT_PKEY_STRICT_FLAGS;
|
|
|
|
else
|
|
|
|
check_flags = CERT_PKEY_VALID_FLAGS;
|
|
|
|
strict_mode = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (suiteb_flags) {
|
|
|
|
int ok;
|
|
|
|
if (check_flags)
|
|
|
|
check_flags |= CERT_PKEY_SUITEB;
|
|
|
|
ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags);
|
|
|
|
if (ok == X509_V_OK)
|
|
|
|
rv |= CERT_PKEY_SUITEB;
|
|
|
|
else if (!check_flags)
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check all signature algorithms are consistent with signature
|
|
|
|
* algorithms extension if TLS 1.2 or later and strict mode.
|
|
|
|
*/
|
|
|
|
if (TLS1_get_version(s) >= TLS1_2_VERSION && strict_mode) {
|
|
|
|
int default_nid;
|
2016-12-14 16:37:48 +00:00
|
|
|
int rsign = 0;
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.peer_cert_sigalgs != NULL
|
|
|
|
|| s->s3.tmp.peer_sigalgs != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
default_nid = 0;
|
|
|
|
/* If no sigalgs extension use defaults from RFC5246 */
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
} else {
|
2015-01-22 03:40:55 +00:00
|
|
|
switch (idx) {
|
2017-02-10 04:23:53 +00:00
|
|
|
case SSL_PKEY_RSA:
|
2016-12-14 16:37:48 +00:00
|
|
|
rsign = EVP_PKEY_RSA;
|
2015-01-22 03:40:55 +00:00
|
|
|
default_nid = NID_sha1WithRSAEncryption;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_PKEY_DSA_SIGN:
|
2016-12-14 16:37:48 +00:00
|
|
|
rsign = EVP_PKEY_DSA;
|
2015-01-22 03:40:55 +00:00
|
|
|
default_nid = NID_dsaWithSHA1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_PKEY_ECC:
|
2016-12-14 16:37:48 +00:00
|
|
|
rsign = EVP_PKEY_EC;
|
2015-01-22 03:40:55 +00:00
|
|
|
default_nid = NID_ecdsa_with_SHA1;
|
|
|
|
break;
|
|
|
|
|
2015-11-17 15:32:30 +00:00
|
|
|
case SSL_PKEY_GOST01:
|
2016-12-14 16:37:48 +00:00
|
|
|
rsign = NID_id_GostR3410_2001;
|
2015-11-17 15:32:30 +00:00
|
|
|
default_nid = NID_id_GostR3411_94_with_GostR3410_2001;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_PKEY_GOST12_256:
|
2016-12-14 16:37:48 +00:00
|
|
|
rsign = NID_id_GostR3410_2012_256;
|
2015-11-17 15:32:30 +00:00
|
|
|
default_nid = NID_id_tc26_signwithdigest_gost3410_2012_256;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SSL_PKEY_GOST12_512:
|
2016-12-14 16:37:48 +00:00
|
|
|
rsign = NID_id_GostR3410_2012_512;
|
2015-11-17 15:32:30 +00:00
|
|
|
default_nid = NID_id_tc26_signwithdigest_gost3410_2012_512;
|
|
|
|
break;
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
default:
|
|
|
|
default_nid = -1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If peer sent no signature algorithms extension and we have set
|
|
|
|
* preferred signature algorithms check we support sha1.
|
|
|
|
*/
|
|
|
|
if (default_nid > 0 && c->conf_sigalgs) {
|
|
|
|
size_t j;
|
2017-01-25 14:33:55 +00:00
|
|
|
const uint16_t *p = c->conf_sigalgs;
|
2016-12-14 14:31:21 +00:00
|
|
|
for (j = 0; j < c->conf_sigalgslen; j++, p++) {
|
2017-01-30 17:27:35 +00:00
|
|
|
const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(*p);
|
|
|
|
|
|
|
|
if (lu != NULL && lu->hash == NID_sha1 && lu->sig == rsign)
|
2015-01-22 03:40:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (j == c->conf_sigalgslen) {
|
|
|
|
if (check_flags)
|
|
|
|
goto skip_sigs;
|
|
|
|
else
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Check signature algorithm of each cert in chain */
|
2019-06-13 19:26:12 +00:00
|
|
|
if (!tls1_check_sig_alg(s, x, default_nid)) {
|
2015-01-22 03:40:55 +00:00
|
|
|
if (!check_flags)
|
|
|
|
goto end;
|
|
|
|
} else
|
|
|
|
rv |= CERT_PKEY_EE_SIGNATURE;
|
|
|
|
rv |= CERT_PKEY_CA_SIGNATURE;
|
|
|
|
for (i = 0; i < sk_X509_num(chain); i++) {
|
2019-06-13 19:26:12 +00:00
|
|
|
if (!tls1_check_sig_alg(s, sk_X509_value(chain, i), default_nid)) {
|
2015-01-22 03:40:55 +00:00
|
|
|
if (check_flags) {
|
|
|
|
rv &= ~CERT_PKEY_CA_SIGNATURE;
|
|
|
|
break;
|
|
|
|
} else
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Else not TLS 1.2, so mark EE and CA signing algorithms OK */
|
|
|
|
else if (check_flags)
|
|
|
|
rv |= CERT_PKEY_EE_SIGNATURE | CERT_PKEY_CA_SIGNATURE;
|
|
|
|
skip_sigs:
|
|
|
|
/* Check cert parameters are consistent */
|
2017-02-18 03:42:15 +00:00
|
|
|
if (tls1_check_cert_param(s, x, 1))
|
2015-01-22 03:40:55 +00:00
|
|
|
rv |= CERT_PKEY_EE_PARAM;
|
|
|
|
else if (!check_flags)
|
|
|
|
goto end;
|
|
|
|
if (!s->server)
|
|
|
|
rv |= CERT_PKEY_CA_PARAM;
|
|
|
|
/* In strict mode check rest of chain too */
|
|
|
|
else if (strict_mode) {
|
|
|
|
rv |= CERT_PKEY_CA_PARAM;
|
|
|
|
for (i = 0; i < sk_X509_num(chain); i++) {
|
|
|
|
X509 *ca = sk_X509_value(chain, i);
|
|
|
|
if (!tls1_check_cert_param(s, ca, 0)) {
|
|
|
|
if (check_flags) {
|
|
|
|
rv &= ~CERT_PKEY_CA_PARAM;
|
|
|
|
break;
|
|
|
|
} else
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!s->server && strict_mode) {
|
|
|
|
STACK_OF(X509_NAME) *ca_dn;
|
|
|
|
int check_type = 0;
|
2016-01-19 00:21:12 +00:00
|
|
|
switch (EVP_PKEY_id(pk)) {
|
2015-01-22 03:40:55 +00:00
|
|
|
case EVP_PKEY_RSA:
|
|
|
|
check_type = TLS_CT_RSA_SIGN;
|
|
|
|
break;
|
|
|
|
case EVP_PKEY_DSA:
|
|
|
|
check_type = TLS_CT_DSS_SIGN;
|
|
|
|
break;
|
|
|
|
case EVP_PKEY_EC:
|
|
|
|
check_type = TLS_CT_ECDSA_SIGN;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (check_type) {
|
2018-12-12 18:09:50 +00:00
|
|
|
const uint8_t *ctypes = s->s3.tmp.ctype;
|
2017-02-23 22:12:28 +00:00
|
|
|
size_t j;
|
|
|
|
|
2018-12-12 18:09:50 +00:00
|
|
|
for (j = 0; j < s->s3.tmp.ctype_len; j++, ctypes++) {
|
2017-02-23 22:12:28 +00:00
|
|
|
if (*ctypes == check_type) {
|
2015-01-22 03:40:55 +00:00
|
|
|
rv |= CERT_PKEY_CERT_TYPE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!(rv & CERT_PKEY_CERT_TYPE) && !check_flags)
|
|
|
|
goto end;
|
2017-02-23 22:12:28 +00:00
|
|
|
} else {
|
2015-01-22 03:40:55 +00:00
|
|
|
rv |= CERT_PKEY_CERT_TYPE;
|
2017-02-23 22:12:28 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2018-12-12 18:09:50 +00:00
|
|
|
ca_dn = s->s3.tmp.peer_ca_names;
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
if (!sk_X509_NAME_num(ca_dn))
|
|
|
|
rv |= CERT_PKEY_ISSUER_NAME;
|
|
|
|
|
|
|
|
if (!(rv & CERT_PKEY_ISSUER_NAME)) {
|
|
|
|
if (ssl_check_ca_name(ca_dn, x))
|
|
|
|
rv |= CERT_PKEY_ISSUER_NAME;
|
|
|
|
}
|
|
|
|
if (!(rv & CERT_PKEY_ISSUER_NAME)) {
|
|
|
|
for (i = 0; i < sk_X509_num(chain); i++) {
|
|
|
|
X509 *xtmp = sk_X509_value(chain, i);
|
|
|
|
if (ssl_check_ca_name(ca_dn, xtmp)) {
|
|
|
|
rv |= CERT_PKEY_ISSUER_NAME;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!check_flags && !(rv & CERT_PKEY_ISSUER_NAME))
|
|
|
|
goto end;
|
|
|
|
} else
|
|
|
|
rv |= CERT_PKEY_ISSUER_NAME | CERT_PKEY_CERT_TYPE;
|
|
|
|
|
|
|
|
if (!check_flags || (rv & check_flags) == check_flags)
|
|
|
|
rv |= CERT_PKEY_VALID;
|
|
|
|
|
|
|
|
end:
|
|
|
|
|
2017-02-19 18:47:16 +00:00
|
|
|
if (TLS1_get_version(s) >= TLS1_2_VERSION)
|
|
|
|
rv |= *pvalid & (CERT_PKEY_EXPLICIT_SIGN | CERT_PKEY_SIGN);
|
|
|
|
else
|
2015-01-22 03:40:55 +00:00
|
|
|
rv |= CERT_PKEY_SIGN | CERT_PKEY_EXPLICIT_SIGN;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* When checking a CERT_PKEY structure all flags are irrelevant if the
|
|
|
|
* chain is invalid.
|
|
|
|
*/
|
|
|
|
if (!check_flags) {
|
2017-02-19 18:47:16 +00:00
|
|
|
if (rv & CERT_PKEY_VALID) {
|
2015-05-12 21:17:34 +00:00
|
|
|
*pvalid = rv;
|
2017-02-19 18:47:16 +00:00
|
|
|
} else {
|
|
|
|
/* Preserve sign and explicit sign flag, clear rest */
|
|
|
|
*pvalid &= CERT_PKEY_EXPLICIT_SIGN | CERT_PKEY_SIGN;
|
2015-01-22 03:40:55 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
2012-06-28 12:45:49 +00:00
|
|
|
|
|
|
|
/* Set validity of certificates in an SSL structure */
|
|
|
|
void tls1_set_cert_validity(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-02-10 04:23:53 +00:00
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA);
|
2017-09-13 12:53:03 +00:00
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_RSA_PSS_SIGN);
|
2015-03-24 15:10:15 +00:00
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_DSA_SIGN);
|
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_ECC);
|
2015-11-17 15:32:30 +00:00
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_GOST01);
|
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_GOST12_256);
|
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_GOST12_512);
|
2017-05-24 20:56:38 +00:00
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_ED25519);
|
2018-02-27 10:12:02 +00:00
|
|
|
tls1_check_chain(s, NULL, NULL, NULL, SSL_PKEY_ED448);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2017-03-28 21:57:28 +00:00
|
|
|
/* User level utility function to check a chain is suitable */
|
2012-06-29 14:24:42 +00:00
|
|
|
int SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return tls1_check_chain(s, x, pk, chain, -1);
|
|
|
|
}
|
2012-06-28 12:45:49 +00:00
|
|
|
|
2014-01-22 16:22:48 +00:00
|
|
|
#ifndef OPENSSL_NO_DH
|
|
|
|
DH *ssl_get_auto_dh(SSL *s)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
int dh_secbits = 80;
|
|
|
|
if (s->cert->dh_tmp_auto == 2)
|
|
|
|
return DH_get_1024_160();
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.new_cipher->algorithm_auth & (SSL_aNULL | SSL_aPSK)) {
|
|
|
|
if (s->s3.tmp.new_cipher->strength_bits == 256)
|
2015-01-22 03:40:55 +00:00
|
|
|
dh_secbits = 128;
|
|
|
|
else
|
|
|
|
dh_secbits = 80;
|
|
|
|
} else {
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.cert == NULL)
|
2017-02-13 16:32:06 +00:00
|
|
|
return NULL;
|
2018-12-12 18:09:50 +00:00
|
|
|
dh_secbits = EVP_PKEY_security_bits(s->s3.tmp.cert->privatekey);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (dh_secbits >= 128) {
|
|
|
|
DH *dhp = DH_new();
|
2016-04-06 16:49:48 +00:00
|
|
|
BIGNUM *p, *g;
|
2015-10-30 10:05:53 +00:00
|
|
|
if (dhp == NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return NULL;
|
2016-04-06 16:49:48 +00:00
|
|
|
g = BN_new();
|
2018-06-28 23:55:23 +00:00
|
|
|
if (g == NULL || !BN_set_word(g, 2)) {
|
|
|
|
DH_free(dhp);
|
|
|
|
BN_free(g);
|
|
|
|
return NULL;
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
if (dh_secbits >= 192)
|
2016-04-18 11:43:54 +00:00
|
|
|
p = BN_get_rfc3526_prime_8192(NULL);
|
2015-01-22 03:40:55 +00:00
|
|
|
else
|
2016-04-18 11:43:54 +00:00
|
|
|
p = BN_get_rfc3526_prime_3072(NULL);
|
2018-06-28 23:55:23 +00:00
|
|
|
if (p == NULL || !DH_set0_pqg(dhp, p, NULL, g)) {
|
2015-01-22 03:40:55 +00:00
|
|
|
DH_free(dhp);
|
2016-04-06 16:49:48 +00:00
|
|
|
BN_free(p);
|
|
|
|
BN_free(g);
|
2015-01-22 03:40:55 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return dhp;
|
|
|
|
}
|
|
|
|
if (dh_secbits >= 112)
|
|
|
|
return DH_get_2048_224();
|
|
|
|
return DH_get_1024_160();
|
|
|
|
}
|
2014-01-22 16:22:48 +00:00
|
|
|
#endif
|
2013-12-15 13:32:24 +00:00
|
|
|
|
|
|
|
static int ssl_security_cert_key(SSL *s, SSL_CTX *ctx, X509 *x, int op)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2015-12-30 13:34:53 +00:00
|
|
|
int secbits = -1;
|
2015-12-20 00:32:36 +00:00
|
|
|
EVP_PKEY *pkey = X509_get0_pubkey(x);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (pkey) {
|
2015-12-30 13:34:53 +00:00
|
|
|
/*
|
|
|
|
* If no parameters this will return -1 and fail using the default
|
|
|
|
* security callback for any non-zero security level. This will
|
|
|
|
* reject keys which omit parameters but this only affects DSA and
|
|
|
|
* omission of parameters is never (?) done in practice.
|
|
|
|
*/
|
2015-01-22 03:40:55 +00:00
|
|
|
secbits = EVP_PKEY_security_bits(pkey);
|
2015-12-30 13:34:53 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
if (s)
|
|
|
|
return ssl_security(s, op, secbits, 0, x);
|
|
|
|
else
|
|
|
|
return ssl_ctx_security(ctx, op, secbits, 0, x);
|
|
|
|
}
|
2013-12-15 13:32:24 +00:00
|
|
|
|
|
|
|
static int ssl_security_cert_sig(SSL *s, SSL_CTX *ctx, X509 *x, int op)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
/* Lookup signature algorithm digest */
|
2017-05-24 21:01:00 +00:00
|
|
|
int secbits, nid, pknid;
|
2016-02-11 15:25:11 +00:00
|
|
|
/* Don't check signature if self signed */
|
|
|
|
if ((X509_get_extension_flags(x) & EXFLAG_SS) != 0)
|
|
|
|
return 1;
|
2017-05-24 21:01:00 +00:00
|
|
|
if (!X509_get_signature_info(x, &nid, &pknid, &secbits, NULL))
|
|
|
|
secbits = -1;
|
|
|
|
/* If digest NID not defined use signature NID */
|
|
|
|
if (nid == NID_undef)
|
|
|
|
nid = pknid;
|
2015-01-22 03:40:55 +00:00
|
|
|
if (s)
|
2017-05-24 21:01:00 +00:00
|
|
|
return ssl_security(s, op, secbits, nid, x);
|
2015-01-22 03:40:55 +00:00
|
|
|
else
|
2017-05-24 21:01:00 +00:00
|
|
|
return ssl_ctx_security(ctx, op, secbits, nid, x);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2013-12-15 13:32:24 +00:00
|
|
|
|
|
|
|
int ssl_security_cert(SSL *s, SSL_CTX *ctx, X509 *x, int vfy, int is_ee)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
if (vfy)
|
|
|
|
vfy = SSL_SECOP_PEER;
|
|
|
|
if (is_ee) {
|
|
|
|
if (!ssl_security_cert_key(s, ctx, x, SSL_SECOP_EE_KEY | vfy))
|
|
|
|
return SSL_R_EE_KEY_TOO_SMALL;
|
|
|
|
} else {
|
|
|
|
if (!ssl_security_cert_key(s, ctx, x, SSL_SECOP_CA_KEY | vfy))
|
|
|
|
return SSL_R_CA_KEY_TOO_SMALL;
|
|
|
|
}
|
|
|
|
if (!ssl_security_cert_sig(s, ctx, x, SSL_SECOP_CA_MD | vfy))
|
|
|
|
return SSL_R_CA_MD_TOO_WEAK;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2017-03-28 21:57:28 +00:00
|
|
|
* Check security of a chain, if |sk| includes the end entity certificate then
|
|
|
|
* |x| is NULL. If |vfy| is 1 then we are verifying a peer chain and not sending
|
2015-01-22 03:40:55 +00:00
|
|
|
* one to the peer. Return values: 1 if ok otherwise error code to use
|
2013-12-15 13:32:24 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
int ssl_security_cert_chain(SSL *s, STACK_OF(X509) *sk, X509 *x, int vfy)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
int rv, start_idx, i;
|
|
|
|
if (x == NULL) {
|
|
|
|
x = sk_X509_value(sk, 0);
|
|
|
|
start_idx = 1;
|
|
|
|
} else
|
|
|
|
start_idx = 0;
|
|
|
|
|
|
|
|
rv = ssl_security_cert(s, NULL, x, vfy, 1);
|
|
|
|
if (rv != 1)
|
|
|
|
return rv;
|
|
|
|
|
|
|
|
for (i = start_idx; i < sk_X509_num(sk); i++) {
|
|
|
|
x = sk_X509_value(sk, i);
|
|
|
|
rv = ssl_security_cert(s, NULL, x, vfy, 0);
|
|
|
|
if (rv != 1)
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
2017-01-31 17:45:00 +00:00
|
|
|
|
2017-06-29 13:55:06 +00:00
|
|
|
/*
|
|
|
|
* For TLS 1.2 servers check if we have a certificate which can be used
|
2017-09-14 13:53:52 +00:00
|
|
|
* with the signature algorithm "lu" and return index of certificate.
|
2017-06-29 13:55:06 +00:00
|
|
|
*/
|
|
|
|
|
2017-09-14 13:53:52 +00:00
|
|
|
static int tls12_get_cert_sigalg_idx(const SSL *s, const SIGALG_LOOKUP *lu)
|
2017-06-29 13:55:06 +00:00
|
|
|
{
|
2017-09-14 13:53:52 +00:00
|
|
|
int sig_idx = lu->sig_idx;
|
|
|
|
const SSL_CERT_LOOKUP *clu = ssl_cert_lookup_by_idx(sig_idx);
|
2017-06-29 13:55:06 +00:00
|
|
|
|
|
|
|
/* If not recognised or not supported by cipher mask it is not suitable */
|
2018-09-03 15:12:34 +00:00
|
|
|
if (clu == NULL
|
2018-12-12 18:09:50 +00:00
|
|
|
|| (clu->amask & s->s3.tmp.new_cipher->algorithm_auth) == 0
|
2018-09-03 15:12:34 +00:00
|
|
|
|| (clu->nid == EVP_PKEY_RSA_PSS
|
2018-12-12 18:09:50 +00:00
|
|
|
&& (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kRSA) != 0))
|
2017-09-14 13:53:52 +00:00
|
|
|
return -1;
|
|
|
|
|
2018-12-12 18:09:50 +00:00
|
|
|
return s->s3.tmp.valid_flags[sig_idx] & CERT_PKEY_VALID ? sig_idx : -1;
|
2017-06-29 13:55:06 +00:00
|
|
|
}
|
|
|
|
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
/*
|
|
|
|
* Returns true if |s| has a usable certificate configured for use
|
|
|
|
* with signature scheme |sig|.
|
|
|
|
* "Usable" includes a check for presence as well as applying
|
|
|
|
* the signature_algorithm_cert restrictions sent by the peer (if any).
|
|
|
|
* Returns false if no usable certificate is found.
|
|
|
|
*/
|
|
|
|
static int has_usable_cert(SSL *s, const SIGALG_LOOKUP *sig, int idx)
|
|
|
|
{
|
|
|
|
const SIGALG_LOOKUP *lu;
|
2018-10-22 17:49:54 +00:00
|
|
|
int mdnid, pknid, supported;
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
size_t i;
|
|
|
|
|
|
|
|
/* TLS 1.2 callers can override lu->sig_idx, but not TLS 1.3 callers. */
|
|
|
|
if (idx == -1)
|
|
|
|
idx = sig->sig_idx;
|
|
|
|
if (!ssl_has_cert(s, idx))
|
|
|
|
return 0;
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.peer_cert_sigalgs != NULL) {
|
|
|
|
for (i = 0; i < s->s3.tmp.peer_cert_sigalgslen; i++) {
|
|
|
|
lu = tls1_lookup_sigalg(s->s3.tmp.peer_cert_sigalgs[i]);
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
if (lu == NULL
|
|
|
|
|| !X509_get_signature_info(s->cert->pkeys[idx].x509, &mdnid,
|
2018-10-16 14:59:46 +00:00
|
|
|
&pknid, NULL, NULL)
|
2018-10-22 17:49:54 +00:00
|
|
|
/*
|
|
|
|
* TODO this does not differentiate between the
|
|
|
|
* rsa_pss_pss_* and rsa_pss_rsae_* schemes since we do not
|
|
|
|
* have a chain here that lets us look at the key OID in the
|
|
|
|
* signing certificate.
|
|
|
|
*/
|
|
|
|
|| mdnid != lu->hash
|
|
|
|
|| pknid != lu->sig)
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
continue;
|
2018-10-22 17:49:54 +00:00
|
|
|
|
|
|
|
ERR_set_mark();
|
|
|
|
supported = EVP_PKEY_supports_digest_nid(s->cert->pkeys[idx].privatekey,
|
|
|
|
mdnid);
|
|
|
|
if (supported == 0)
|
|
|
|
continue;
|
|
|
|
else if (supported < 0)
|
|
|
|
{
|
|
|
|
/* If it didn't report a mandatory NID, for whatever reasons,
|
|
|
|
* just clear the error and allow all hashes to be used. */
|
|
|
|
ERR_pop_to_mark();
|
|
|
|
}
|
|
|
|
return 1;
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2018-10-22 17:49:54 +00:00
|
|
|
supported = EVP_PKEY_supports_digest_nid(s->cert->pkeys[idx].privatekey,
|
|
|
|
sig->hash);
|
|
|
|
if (supported == 0)
|
|
|
|
return 0;
|
|
|
|
else if (supported < 0)
|
|
|
|
ERR_clear_error();
|
|
|
|
|
|
|
|
return 1;
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
}
|
|
|
|
|
2017-01-31 17:45:00 +00:00
|
|
|
/*
|
|
|
|
* Choose an appropriate signature algorithm based on available certificates
|
2017-02-15 16:19:43 +00:00
|
|
|
* Sets chosen certificate and signature algorithm.
|
|
|
|
*
|
2017-11-21 17:18:43 +00:00
|
|
|
* For servers if we fail to find a required certificate it is a fatal error,
|
|
|
|
* an appropriate error code is set and a TLS alert is sent.
|
2017-02-15 16:19:43 +00:00
|
|
|
*
|
2017-11-21 17:18:43 +00:00
|
|
|
* For clients fatalerrs is set to 0. If a certificate is not suitable it is not
|
2017-02-15 16:19:43 +00:00
|
|
|
* a fatal error: we will either try another certificate or not present one
|
|
|
|
* to the server. In this case no error is set.
|
2017-01-31 17:45:00 +00:00
|
|
|
*/
|
2017-11-21 17:18:43 +00:00
|
|
|
int tls_choose_sigalg(SSL *s, int fatalerrs)
|
2017-01-31 17:45:00 +00:00
|
|
|
{
|
2017-02-13 16:04:07 +00:00
|
|
|
const SIGALG_LOOKUP *lu = NULL;
|
2017-09-14 13:53:52 +00:00
|
|
|
int sig_idx = -1;
|
2017-02-13 16:04:07 +00:00
|
|
|
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.cert = NULL;
|
|
|
|
s->s3.tmp.sigalg = NULL;
|
2017-02-15 16:19:43 +00:00
|
|
|
|
2017-01-31 17:45:00 +00:00
|
|
|
if (SSL_IS_TLS13(s)) {
|
|
|
|
size_t i;
|
2017-02-03 12:56:54 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2018-04-23 13:02:23 +00:00
|
|
|
int curve = -1;
|
2017-02-03 12:56:54 +00:00
|
|
|
#endif
|
2017-01-31 17:45:00 +00:00
|
|
|
|
2017-03-28 21:57:28 +00:00
|
|
|
/* Look for a certificate matching shared sigalgs */
|
2019-06-13 19:26:12 +00:00
|
|
|
for (i = 0; i < s->shared_sigalgslen; i++) {
|
|
|
|
lu = s->shared_sigalgs[i];
|
2017-11-29 21:58:25 +00:00
|
|
|
sig_idx = -1;
|
2017-01-31 17:45:00 +00:00
|
|
|
|
2017-06-08 16:15:45 +00:00
|
|
|
/* Skip SHA1, SHA224, DSA and RSA if not PSS */
|
|
|
|
if (lu->hash == NID_sha1
|
|
|
|
|| lu->hash == NID_sha224
|
|
|
|
|| lu->sig == EVP_PKEY_DSA
|
2017-02-25 00:25:04 +00:00
|
|
|
|| lu->sig == EVP_PKEY_RSA)
|
2017-01-31 17:45:00 +00:00
|
|
|
continue;
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
/* Check that we have a cert, and signature_algorithms_cert */
|
|
|
|
if (!tls1_lookup_md(lu, NULL) || !has_usable_cert(s, lu, -1))
|
2017-01-31 17:45:00 +00:00
|
|
|
continue;
|
|
|
|
if (lu->sig == EVP_PKEY_EC) {
|
2017-02-03 12:56:54 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2017-01-31 17:45:00 +00:00
|
|
|
if (curve == -1) {
|
2017-06-29 13:55:06 +00:00
|
|
|
EC_KEY *ec = EVP_PKEY_get0_EC_KEY(s->cert->pkeys[SSL_PKEY_ECC].privatekey);
|
2017-01-31 17:45:00 +00:00
|
|
|
|
|
|
|
curve = EC_GROUP_get_curve_name(EC_KEY_get0_group(ec));
|
|
|
|
}
|
2018-04-23 13:02:23 +00:00
|
|
|
if (lu->curve != NID_undef && curve != lu->curve)
|
2017-01-31 17:45:00 +00:00
|
|
|
continue;
|
2017-02-03 12:56:54 +00:00
|
|
|
#else
|
|
|
|
continue;
|
|
|
|
#endif
|
2017-09-19 16:15:42 +00:00
|
|
|
} else if (lu->sig == EVP_PKEY_RSA_PSS) {
|
|
|
|
/* validate that key is large enough for the signature algorithm */
|
2017-11-29 21:58:25 +00:00
|
|
|
EVP_PKEY *pkey;
|
2017-09-19 16:15:42 +00:00
|
|
|
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
pkey = s->cert->pkeys[lu->sig_idx].privatekey;
|
2017-11-29 21:58:25 +00:00
|
|
|
if (!rsa_pss_check_min_key_size(EVP_PKEY_get0(pkey), lu))
|
2017-09-19 16:15:42 +00:00
|
|
|
continue;
|
2017-01-31 17:45:00 +00:00
|
|
|
}
|
2017-02-13 16:04:07 +00:00
|
|
|
break;
|
|
|
|
}
|
2019-06-13 19:26:12 +00:00
|
|
|
if (i == s->shared_sigalgslen) {
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!fatalerrs)
|
2017-02-15 16:19:43 +00:00
|
|
|
return 1;
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_F_TLS_CHOOSE_SIGALG,
|
|
|
|
SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM);
|
2017-02-13 16:04:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} else {
|
2017-06-29 13:55:06 +00:00
|
|
|
/* If ciphersuite doesn't require a cert nothing to do */
|
2018-12-12 18:09:50 +00:00
|
|
|
if (!(s->s3.tmp.new_cipher->algorithm_auth & SSL_aCERT))
|
2017-06-29 13:55:06 +00:00
|
|
|
return 1;
|
|
|
|
if (!s->server && !ssl_has_cert(s, s->cert->key - s->cert->pkeys))
|
2017-02-15 16:19:43 +00:00
|
|
|
return 1;
|
2017-02-13 16:04:07 +00:00
|
|
|
|
|
|
|
if (SSL_USE_SIGALGS(s)) {
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
size_t i;
|
2018-12-12 18:09:50 +00:00
|
|
|
if (s->s3.tmp.peer_sigalgs != NULL) {
|
2017-02-24 16:39:57 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
|
|
|
int curve;
|
|
|
|
|
|
|
|
/* For Suite B need to match signature algorithm to curve */
|
|
|
|
if (tls1_suiteb(s)) {
|
2017-06-29 13:55:06 +00:00
|
|
|
EC_KEY *ec = EVP_PKEY_get0_EC_KEY(s->cert->pkeys[SSL_PKEY_ECC].privatekey);
|
2017-02-24 16:39:57 +00:00
|
|
|
curve = EC_GROUP_get_curve_name(EC_KEY_get0_group(ec));
|
|
|
|
} else {
|
|
|
|
curve = -1;
|
|
|
|
}
|
|
|
|
#endif
|
2017-02-13 16:04:07 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Find highest preference signature algorithm matching
|
|
|
|
* cert type
|
|
|
|
*/
|
2019-06-13 19:26:12 +00:00
|
|
|
for (i = 0; i < s->shared_sigalgslen; i++) {
|
|
|
|
lu = s->shared_sigalgs[i];
|
2017-06-29 13:55:06 +00:00
|
|
|
|
|
|
|
if (s->server) {
|
2017-09-14 13:53:52 +00:00
|
|
|
if ((sig_idx = tls12_get_cert_sigalg_idx(s, lu)) == -1)
|
2017-06-29 13:55:06 +00:00
|
|
|
continue;
|
2017-09-14 13:53:52 +00:00
|
|
|
} else {
|
|
|
|
int cc_idx = s->cert->key - s->cert->pkeys;
|
|
|
|
|
|
|
|
sig_idx = lu->sig_idx;
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
if (cc_idx != sig_idx)
|
|
|
|
continue;
|
2017-06-16 17:55:28 +00:00
|
|
|
}
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
/* Check that we have a cert, and sig_algs_cert */
|
|
|
|
if (!has_usable_cert(s, lu, sig_idx))
|
|
|
|
continue;
|
2017-09-19 16:15:42 +00:00
|
|
|
if (lu->sig == EVP_PKEY_RSA_PSS) {
|
|
|
|
/* validate that key is large enough for the signature algorithm */
|
2017-11-29 21:58:25 +00:00
|
|
|
EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey;
|
2017-09-19 16:15:42 +00:00
|
|
|
|
2017-11-29 21:58:25 +00:00
|
|
|
if (!rsa_pss_check_min_key_size(EVP_PKEY_get0(pkey), lu))
|
2017-09-19 16:15:42 +00:00
|
|
|
continue;
|
|
|
|
}
|
2017-06-29 13:55:06 +00:00
|
|
|
#ifndef OPENSSL_NO_EC
|
|
|
|
if (curve == -1 || lu->curve == curve)
|
2017-02-24 16:39:57 +00:00
|
|
|
#endif
|
2017-02-13 16:04:07 +00:00
|
|
|
break;
|
|
|
|
}
|
2019-06-13 19:26:12 +00:00
|
|
|
if (i == s->shared_sigalgslen) {
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!fatalerrs)
|
2017-02-15 16:19:43 +00:00
|
|
|
return 1;
|
2018-09-03 15:12:34 +00:00
|
|
|
SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE,
|
|
|
|
SSL_F_TLS_CHOOSE_SIGALG,
|
|
|
|
SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM);
|
2017-02-13 16:04:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* If we have no sigalg use defaults
|
|
|
|
*/
|
|
|
|
const uint16_t *sent_sigs;
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
size_t sent_sigslen;
|
2017-02-13 16:04:07 +00:00
|
|
|
|
2017-06-29 13:55:06 +00:00
|
|
|
if ((lu = tls1_get_legacy_sigalg(s, -1)) == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!fatalerrs)
|
2017-02-15 16:19:43 +00:00
|
|
|
return 1;
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CHOOSE_SIGALG,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-02-13 16:04:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check signature matches a type we sent */
|
|
|
|
sent_sigslen = tls12_get_psigalgs(s, 1, &sent_sigs);
|
|
|
|
for (i = 0; i < sent_sigslen; i++, sent_sigs++) {
|
Add support for the TLS 1.3 signature_algorithms_cert extension
The new extension is like signature_algorithms, but only for the
signature *on* the certificate we will present to the peer (the
old signature_algorithms extension is still used for signatures that
we *generate*, i.e., those over TLS data structures).
We do not need to generate this extension, since we are the same
implementation as our X.509 stack and can handle the same types
of signatures, but we need to be prepared to receive it, and use the received
information when selecting what certificate to present.
There is a lot of interplay between signature_algorithms_cert and
signature_algorithms, since both affect what certificate we can
use, and thus the resulting signature algorithm used for TLS messages.
So, apply signature_algorithms_cert (if present) as a filter on what
certificates we can consider when choosing a certificate+sigalg
pair.
As part of this addition, we also remove the fallback code that let
keys of type EVP_PKEY_RSA be used to generate RSA-PSS signatures -- the
new rsa_pss_pss_* and rsa_pss_rsae_* signature schemes have pulled
the key type into what is covered by the signature algorithm, so
we should not apply this sort of compatibility workaround.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5068)
2018-01-11 17:47:12 +00:00
|
|
|
if (lu->sigalg == *sent_sigs
|
|
|
|
&& has_usable_cert(s, lu, lu->sig_idx))
|
2017-02-13 16:04:07 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (i == sent_sigslen) {
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!fatalerrs)
|
2017-02-15 16:19:43 +00:00
|
|
|
return 1;
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
|
|
|
|
SSL_F_TLS_CHOOSE_SIGALG,
|
|
|
|
SSL_R_WRONG_SIGNATURE_TYPE);
|
2017-02-13 16:04:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2017-06-29 13:55:06 +00:00
|
|
|
if ((lu = tls1_get_legacy_sigalg(s, -1)) == NULL) {
|
2017-11-21 17:18:43 +00:00
|
|
|
if (!fatalerrs)
|
2017-02-15 16:19:43 +00:00
|
|
|
return 1;
|
2017-11-21 17:18:43 +00:00
|
|
|
SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_CHOOSE_SIGALG,
|
|
|
|
ERR_R_INTERNAL_ERROR);
|
2017-02-13 16:04:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2017-01-31 17:45:00 +00:00
|
|
|
}
|
2017-09-14 13:53:52 +00:00
|
|
|
if (sig_idx == -1)
|
|
|
|
sig_idx = lu->sig_idx;
|
2018-12-12 18:09:50 +00:00
|
|
|
s->s3.tmp.cert = &s->cert->pkeys[sig_idx];
|
|
|
|
s->cert->key = s->s3.tmp.cert;
|
|
|
|
s->s3.tmp.sigalg = lu;
|
2017-01-31 17:45:00 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2017-11-05 16:46:48 +00:00
|
|
|
|
|
|
|
int SSL_CTX_set_tlsext_max_fragment_length(SSL_CTX *ctx, uint8_t mode)
|
|
|
|
{
|
|
|
|
if (mode != TLSEXT_max_fragment_length_DISABLED
|
|
|
|
&& !IS_MAX_FRAGMENT_LENGTH_EXT_VALID(mode)) {
|
|
|
|
SSLerr(SSL_F_SSL_CTX_SET_TLSEXT_MAX_FRAGMENT_LENGTH,
|
|
|
|
SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx->ext.max_fragment_len_mode = mode;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int SSL_set_tlsext_max_fragment_length(SSL *ssl, uint8_t mode)
|
|
|
|
{
|
|
|
|
if (mode != TLSEXT_max_fragment_length_DISABLED
|
|
|
|
&& !IS_MAX_FRAGMENT_LENGTH_EXT_VALID(mode)) {
|
|
|
|
SSLerr(SSL_F_SSL_SET_TLSEXT_MAX_FRAGMENT_LENGTH,
|
|
|
|
SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssl->ext.max_fragment_len_mode = mode;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint8_t SSL_SESSION_get_max_fragment_length(const SSL_SESSION *session)
|
|
|
|
{
|
|
|
|
return session->ext.max_fragment_len_mode;
|
|
|
|
}
|