Path: blob/main/crypto/openssl/ssl/statem/statem_lib.c
104862 views
/*1* Copyright 1995-2026 The OpenSSL Project Authors. All Rights Reserved.2* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved3*4* Licensed under the Apache License 2.0 (the "License"). You may not use5* this file except in compliance with the License. You can obtain a copy6* in the file LICENSE in the source distribution or at7* https://www.openssl.org/source/license.html8*/910#include <limits.h>11#include <string.h>12#include <stdio.h>13#include "../ssl_local.h"14#include "statem_local.h"15#include "internal/cryptlib.h"16#include "internal/ssl_unwrap.h"17#include <openssl/buffer.h>18#include <openssl/objects.h>19#include <openssl/evp.h>20#include <openssl/rsa.h>21#include <openssl/x509.h>22#include <openssl/trace.h>23#include <openssl/encoder.h>2425/*26* Map error codes to TLS/SSL alart types.27*/28typedef struct x509err2alert_st {29int x509err;30int alert;31} X509ERR2ALERT;3233/* Fixed value used in the ServerHello random field to identify an HRR */34const unsigned char hrrrandom[] = {350xcf, 0x21, 0xad, 0x74, 0xe5, 0x9a, 0x61, 0x11, 0xbe, 0x1d, 0x8c, 0x02,360x1e, 0x65, 0xb8, 0x91, 0xc2, 0xa2, 0x11, 0x16, 0x7a, 0xbb, 0x8c, 0x5e,370x07, 0x9e, 0x09, 0xe2, 0xc8, 0xa8, 0x33, 0x9c38};3940int ossl_statem_set_mutator(SSL *s,41ossl_statem_mutate_handshake_cb mutate_handshake_cb,42ossl_statem_finish_mutate_handshake_cb finish_mutate_handshake_cb,43void *mutatearg)44{45SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);4647if (sc == NULL)48return 0;4950sc->statem.mutate_handshake_cb = mutate_handshake_cb;51sc->statem.mutatearg = mutatearg;52sc->statem.finish_mutate_handshake_cb = finish_mutate_handshake_cb;5354return 1;55}5657/*58* send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or59* SSL3_RT_CHANGE_CIPHER_SPEC)60*/61int ssl3_do_write(SSL_CONNECTION *s, uint8_t type)62{63int ret;64size_t written = 0;65SSL *ssl = SSL_CONNECTION_GET_SSL(s);66SSL *ussl = SSL_CONNECTION_GET_USER_SSL(s);6768/*69* If we're running the test suite then we may need to mutate the message70* we've been asked to write. Does not happen in normal operation.71*/72if (s->statem.mutate_handshake_cb != NULL73&& !s->statem.write_in_progress74&& type == SSL3_RT_HANDSHAKE75&& s->init_num >= SSL3_HM_HEADER_LENGTH) {76unsigned char *msg;77size_t msglen;7879if (!s->statem.mutate_handshake_cb((unsigned char *)s->init_buf->data,80s->init_num,81&msg, &msglen,82s->statem.mutatearg))83return -1;84if (msglen < SSL3_HM_HEADER_LENGTH85|| !BUF_MEM_grow(s->init_buf, msglen))86return -1;87memcpy(s->init_buf->data, msg, msglen);88s->init_num = msglen;89s->init_msg = s->init_buf->data + SSL3_HM_HEADER_LENGTH;90s->statem.finish_mutate_handshake_cb(s->statem.mutatearg);91s->statem.write_in_progress = 1;92}9394ret = ssl3_write_bytes(ssl, type, &s->init_buf->data[s->init_off],95s->init_num, &written);96if (ret <= 0)97return -1;98if (type == SSL3_RT_HANDSHAKE)99/*100* should not be done for 'Hello Request's, but in that case we'll101* ignore the result anyway102* TLS1.3 KeyUpdate and NewSessionTicket do not need to be added103*/104if (!SSL_CONNECTION_IS_TLS13(s)105|| (s->statem.hand_state != TLS_ST_SW_SESSION_TICKET106&& s->statem.hand_state != TLS_ST_CW_KEY_UPDATE107&& s->statem.hand_state != TLS_ST_SW_KEY_UPDATE))108if (!ssl3_finish_mac(s,109(unsigned char *)&s->init_buf->data[s->init_off],110written))111return -1;112if (written == s->init_num) {113s->statem.write_in_progress = 0;114if (s->msg_callback)115s->msg_callback(1, s->version, type, s->init_buf->data,116(size_t)(s->init_off + s->init_num), ussl,117s->msg_callback_arg);118return 1;119}120s->init_off += written;121s->init_num -= written;122return 0;123}124125int tls_close_construct_packet(SSL_CONNECTION *s, WPACKET *pkt, int htype)126{127size_t msglen;128129if ((htype != SSL3_MT_CHANGE_CIPHER_SPEC && !WPACKET_close(pkt))130|| !WPACKET_get_length(pkt, &msglen)131|| msglen > INT_MAX)132return 0;133s->init_num = (int)msglen;134s->init_off = 0;135136return 1;137}138139int tls_setup_handshake(SSL_CONNECTION *s)140{141int ver_min, ver_max, ok;142SSL *ssl = SSL_CONNECTION_GET_SSL(s);143SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);144145if (!ssl3_init_finished_mac(s)) {146/* SSLfatal() already called */147return 0;148}149150/* Reset any extension flags */151memset(s->ext.extflags, 0, sizeof(s->ext.extflags));152153if (ssl_get_min_max_version(s, &ver_min, &ver_max, NULL) != 0) {154SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_NO_PROTOCOLS_AVAILABLE);155return 0;156}157158/* Sanity check that we have MD5-SHA1 if we need it */159if (sctx->ssl_digest_methods[SSL_MD_MD5_SHA1_IDX] == NULL) {160int negotiated_minversion;161int md5sha1_needed_maxversion = SSL_CONNECTION_IS_DTLS(s)162? DTLS1_VERSION163: TLS1_1_VERSION;164165/* We don't have MD5-SHA1 - do we need it? */166if (ssl_version_cmp(s, ver_max, md5sha1_needed_maxversion) <= 0) {167SSLfatal_data(s, SSL_AD_HANDSHAKE_FAILURE,168SSL_R_NO_SUITABLE_DIGEST_ALGORITHM,169"The max supported SSL/TLS version needs the"170" MD5-SHA1 digest but it is not available"171" in the loaded providers. Use (D)TLSv1.2 or"172" above, or load different providers");173return 0;174}175176ok = 1;177178/* Don't allow TLSv1.1 or below to be negotiated */179negotiated_minversion = SSL_CONNECTION_IS_DTLS(s) ? DTLS1_2_VERSION : TLS1_2_VERSION;180if (ssl_version_cmp(s, ver_min, negotiated_minversion) < 0)181ok = SSL_set_min_proto_version(ssl, negotiated_minversion);182if (!ok) {183/* Shouldn't happen */184SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, ERR_R_INTERNAL_ERROR);185return 0;186}187}188189ok = 0;190if (s->server) {191STACK_OF(SSL_CIPHER) *ciphers = SSL_get_ciphers(ssl);192int i;193194/*195* Sanity check that the maximum version we accept has ciphers196* enabled. For clients we do this check during construction of the197* ClientHello.198*/199for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {200const SSL_CIPHER *c = sk_SSL_CIPHER_value(ciphers, i);201int cipher_minprotover = SSL_CONNECTION_IS_DTLS(s)202? c->min_dtls203: c->min_tls;204int cipher_maxprotover = SSL_CONNECTION_IS_DTLS(s)205? c->max_dtls206: c->max_tls;207208if (ssl_version_cmp(s, ver_max, cipher_minprotover) >= 0209&& ssl_version_cmp(s, ver_max, cipher_maxprotover) <= 0) {210ok = 1;211break;212}213}214if (!ok) {215SSLfatal_data(s, SSL_AD_HANDSHAKE_FAILURE,216SSL_R_NO_CIPHERS_AVAILABLE,217"No ciphers enabled for max supported "218"SSL/TLS version");219return 0;220}221if (SSL_IS_FIRST_HANDSHAKE(s)) {222/* N.B. s->session_ctx == s->ctx here */223ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_accept);224} else {225/* N.B. s->ctx may not equal s->session_ctx */226ssl_tsan_counter(sctx, &sctx->stats.sess_accept_renegotiate);227228s->s3.tmp.cert_request = 0;229}230} else {231if (SSL_IS_FIRST_HANDSHAKE(s))232ssl_tsan_counter(s->session_ctx, &s->session_ctx->stats.sess_connect);233else234ssl_tsan_counter(s->session_ctx,235&s->session_ctx->stats.sess_connect_renegotiate);236237/* mark client_random uninitialized */238memset(s->s3.client_random, 0, sizeof(s->s3.client_random));239s->hit = 0;240241s->s3.tmp.cert_req = 0;242243if (SSL_CONNECTION_IS_DTLS(s))244s->statem.use_timer = 1;245}246247return 1;248}249250/*251* Size of the to-be-signed TLS13 data, without the hash size itself:252* 64 bytes of value 32, 33 context bytes, 1 byte separator253*/254#define TLS13_TBS_START_SIZE 64255#define TLS13_TBS_PREAMBLE_SIZE (TLS13_TBS_START_SIZE + 33 + 1)256257static int get_cert_verify_tbs_data(SSL_CONNECTION *s, unsigned char *tls13tbs,258void **hdata, size_t *hdatalen)259{260/* ASCII: "TLS 1.3, server CertificateVerify", in hex for EBCDIC compatibility */261static const char servercontext[] = "\x54\x4c\x53\x20\x31\x2e\x33\x2c\x20\x73\x65\x72"262"\x76\x65\x72\x20\x43\x65\x72\x74\x69\x66\x69\x63\x61\x74\x65\x56\x65\x72\x69\x66\x79";263/* ASCII: "TLS 1.3, client CertificateVerify", in hex for EBCDIC compatibility */264static const char clientcontext[] = "\x54\x4c\x53\x20\x31\x2e\x33\x2c\x20\x63\x6c\x69"265"\x65\x6e\x74\x20\x43\x65\x72\x74\x69\x66\x69\x63\x61\x74\x65\x56\x65\x72\x69\x66\x79";266267if (SSL_CONNECTION_IS_TLS13(s)) {268size_t hashlen;269270/* Set the first 64 bytes of to-be-signed data to octet 32 */271memset(tls13tbs, 32, TLS13_TBS_START_SIZE);272/* This copies the 33 bytes of context plus the 0 separator byte */273if (s->statem.hand_state == TLS_ST_CR_CERT_VRFY274|| s->statem.hand_state == TLS_ST_SW_CERT_VRFY)275strcpy((char *)tls13tbs + TLS13_TBS_START_SIZE, servercontext);276else277strcpy((char *)tls13tbs + TLS13_TBS_START_SIZE, clientcontext);278279/*280* If we're currently reading then we need to use the saved handshake281* hash value. We can't use the current handshake hash state because282* that includes the CertVerify itself.283*/284if (s->statem.hand_state == TLS_ST_CR_CERT_VRFY285|| s->statem.hand_state == TLS_ST_SR_CERT_VRFY) {286memcpy(tls13tbs + TLS13_TBS_PREAMBLE_SIZE, s->cert_verify_hash,287s->cert_verify_hash_len);288hashlen = s->cert_verify_hash_len;289} else if (!ssl_handshake_hash(s, tls13tbs + TLS13_TBS_PREAMBLE_SIZE,290EVP_MAX_MD_SIZE, &hashlen)) {291/* SSLfatal() already called */292return 0;293}294295*hdata = tls13tbs;296*hdatalen = TLS13_TBS_PREAMBLE_SIZE + hashlen;297} else {298size_t retlen;299long retlen_l;300301retlen = retlen_l = BIO_get_mem_data(s->s3.handshake_buffer, hdata);302if (retlen_l <= 0) {303SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);304return 0;305}306*hdatalen = retlen;307}308309return 1;310}311312CON_FUNC_RETURN tls_construct_cert_verify(SSL_CONNECTION *s, WPACKET *pkt)313{314EVP_PKEY *pkey = NULL;315const EVP_MD *md = NULL;316EVP_MD_CTX *mctx = NULL;317EVP_PKEY_CTX *pctx = NULL;318size_t hdatalen = 0, siglen = 0;319void *hdata;320unsigned char *sig = NULL;321unsigned char tls13tbs[TLS13_TBS_PREAMBLE_SIZE + EVP_MAX_MD_SIZE];322const SIGALG_LOOKUP *lu = s->s3.tmp.sigalg;323SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);324325if (lu == NULL || s->s3.tmp.cert == NULL) {326SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);327goto err;328}329pkey = s->s3.tmp.cert->privatekey;330331if (pkey == NULL || !tls1_lookup_md(sctx, lu, &md)) {332SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);333goto err;334}335336mctx = EVP_MD_CTX_new();337if (mctx == NULL) {338SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);339goto err;340}341342/* Get the data to be signed */343if (!get_cert_verify_tbs_data(s, tls13tbs, &hdata, &hdatalen)) {344/* SSLfatal() already called */345goto err;346}347348if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) {349SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);350goto err;351}352353if (EVP_DigestSignInit_ex(mctx, &pctx,354md == NULL ? NULL : EVP_MD_get0_name(md),355sctx->libctx, sctx->propq, pkey,356NULL)357<= 0) {358SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);359goto err;360}361362if (lu->sig == EVP_PKEY_RSA_PSS) {363if (EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) <= 0364|| EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx,365RSA_PSS_SALTLEN_DIGEST)366<= 0) {367SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);368goto err;369}370}371if (s->version == SSL3_VERSION) {372/*373* Here we use EVP_DigestSignUpdate followed by EVP_DigestSignFinal374* in order to add the EVP_CTRL_SSL3_MASTER_SECRET call between them.375*/376if (EVP_DigestSignUpdate(mctx, hdata, hdatalen) <= 0377|| EVP_MD_CTX_ctrl(mctx, EVP_CTRL_SSL3_MASTER_SECRET,378(int)s->session->master_key_length,379s->session->master_key)380<= 0381|| EVP_DigestSignFinal(mctx, NULL, &siglen) <= 0) {382383SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);384goto err;385}386sig = OPENSSL_malloc(siglen);387if (sig == NULL388|| EVP_DigestSignFinal(mctx, sig, &siglen) <= 0) {389SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);390goto err;391}392} else {393/*394* Here we *must* use EVP_DigestSign() because Ed25519/Ed448 does not395* support streaming via EVP_DigestSignUpdate/EVP_DigestSignFinal396*/397if (EVP_DigestSign(mctx, NULL, &siglen, hdata, hdatalen) <= 0) {398SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);399goto err;400}401sig = OPENSSL_malloc(siglen);402if (sig == NULL403|| EVP_DigestSign(mctx, sig, &siglen, hdata, hdatalen) <= 0) {404SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);405goto err;406}407}408409#ifndef OPENSSL_NO_GOST410{411int pktype = lu->sig;412413if (pktype == NID_id_GostR3410_2001414|| pktype == NID_id_GostR3410_2012_256415|| pktype == NID_id_GostR3410_2012_512)416BUF_reverse(sig, NULL, siglen);417}418#endif419420if (!WPACKET_sub_memcpy_u16(pkt, sig, siglen)) {421SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);422goto err;423}424425/* Digest cached records and discard handshake buffer */426if (!ssl3_digest_cached_records(s, 0)) {427/* SSLfatal() already called */428goto err;429}430431OPENSSL_free(sig);432EVP_MD_CTX_free(mctx);433return CON_FUNC_SUCCESS;434err:435OPENSSL_free(sig);436EVP_MD_CTX_free(mctx);437return CON_FUNC_ERROR;438}439440MSG_PROCESS_RETURN tls_process_cert_verify(SSL_CONNECTION *s, PACKET *pkt)441{442EVP_PKEY *pkey = NULL;443const unsigned char *data;444#ifndef OPENSSL_NO_GOST445unsigned char *gost_data = NULL;446#endif447MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR;448int j;449unsigned int len;450const EVP_MD *md = NULL;451size_t hdatalen = 0;452void *hdata;453unsigned char tls13tbs[TLS13_TBS_PREAMBLE_SIZE + EVP_MAX_MD_SIZE];454EVP_MD_CTX *mctx = EVP_MD_CTX_new();455EVP_PKEY_CTX *pctx = NULL;456SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);457458if (mctx == NULL) {459SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);460goto err;461}462463pkey = tls_get_peer_pkey(s);464if (pkey == NULL) {465SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);466goto err;467}468469if (ssl_cert_lookup_by_pkey(pkey, NULL, sctx) == NULL) {470SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,471SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE);472goto err;473}474475if (SSL_USE_SIGALGS(s)) {476unsigned int sigalg;477478if (!PACKET_get_net_2(pkt, &sigalg)) {479SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_PACKET);480goto err;481}482if (tls12_check_peer_sigalg(s, sigalg, pkey) <= 0) {483/* SSLfatal() already called */484goto err;485}486} else if (!tls1_set_peer_legacy_sigalg(s, pkey)) {487SSLfatal(s, SSL_AD_INTERNAL_ERROR,488SSL_R_LEGACY_SIGALG_DISALLOWED_OR_UNSUPPORTED);489goto err;490}491492if (!tls1_lookup_md(sctx, s->s3.tmp.peer_sigalg, &md)) {493SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);494goto err;495}496497if (SSL_USE_SIGALGS(s))498OSSL_TRACE1(TLS, "USING TLSv1.2 HASH %s\n",499md == NULL ? "n/a" : EVP_MD_get0_name(md));500501/* Check for broken implementations of GOST ciphersuites */502/*503* If key is GOST and len is exactly 64 or 128, it is signature without504* length field (CryptoPro implementations at least till TLS 1.2)505*/506#ifndef OPENSSL_NO_GOST507if (!SSL_USE_SIGALGS(s)508&& ((PACKET_remaining(pkt) == 64509&& (EVP_PKEY_get_id(pkey) == NID_id_GostR3410_2001510|| EVP_PKEY_get_id(pkey) == NID_id_GostR3410_2012_256))511|| (PACKET_remaining(pkt) == 128512&& EVP_PKEY_get_id(pkey) == NID_id_GostR3410_2012_512))) {513len = PACKET_remaining(pkt);514} else515#endif516if (!PACKET_get_net_2(pkt, &len)) {517SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);518goto err;519}520521if (!PACKET_get_bytes(pkt, &data, len)) {522SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);523goto err;524}525if (PACKET_remaining(pkt) != 0) {526SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);527goto err;528}529530if (!get_cert_verify_tbs_data(s, tls13tbs, &hdata, &hdatalen)) {531/* SSLfatal() already called */532goto err;533}534535OSSL_TRACE1(TLS, "Using client verify alg %s\n",536md == NULL ? "n/a" : EVP_MD_get0_name(md));537538if (EVP_DigestVerifyInit_ex(mctx, &pctx,539md == NULL ? NULL : EVP_MD_get0_name(md),540sctx->libctx, sctx->propq, pkey,541NULL)542<= 0) {543SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);544goto err;545}546#ifndef OPENSSL_NO_GOST547{548int pktype = EVP_PKEY_get_id(pkey);549if (pktype == NID_id_GostR3410_2001550|| pktype == NID_id_GostR3410_2012_256551|| pktype == NID_id_GostR3410_2012_512) {552if ((gost_data = OPENSSL_malloc(len)) == NULL)553goto err;554BUF_reverse(gost_data, data, len);555data = gost_data;556}557}558#endif559560if (SSL_USE_PSS(s)) {561if (EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) <= 0562|| EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx,563RSA_PSS_SALTLEN_DIGEST)564<= 0) {565SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);566goto err;567}568}569if (s->version == SSL3_VERSION) {570if (EVP_DigestVerifyUpdate(mctx, hdata, hdatalen) <= 0571|| EVP_MD_CTX_ctrl(mctx, EVP_CTRL_SSL3_MASTER_SECRET,572(int)s->session->master_key_length,573s->session->master_key)574<= 0) {575SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);576goto err;577}578if (EVP_DigestVerifyFinal(mctx, data, len) <= 0) {579SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_BAD_SIGNATURE);580goto err;581}582} else {583j = EVP_DigestVerify(mctx, data, len, hdata, hdatalen);584#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION585/* Ignore bad signatures when fuzzing */586if (SSL_IS_QUIC_HANDSHAKE(s))587j = 1;588#endif589if (j <= 0) {590SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_BAD_SIGNATURE);591goto err;592}593}594595/*596* In TLSv1.3 on the client side we make sure we prepare the client597* certificate after the CertVerify instead of when we get the598* CertificateRequest. This is because in TLSv1.3 the CertificateRequest599* comes *before* the Certificate message. In TLSv1.2 it comes after. We600* want to make sure that SSL_get1_peer_certificate() will return the actual601* server certificate from the client_cert_cb callback.602*/603if (!s->server && SSL_CONNECTION_IS_TLS13(s) && s->s3.tmp.cert_req == 1)604ret = MSG_PROCESS_CONTINUE_PROCESSING;605else606ret = MSG_PROCESS_CONTINUE_READING;607err:608BIO_free(s->s3.handshake_buffer);609s->s3.handshake_buffer = NULL;610EVP_MD_CTX_free(mctx);611#ifndef OPENSSL_NO_GOST612OPENSSL_free(gost_data);613#endif614return ret;615}616617CON_FUNC_RETURN tls_construct_finished(SSL_CONNECTION *s, WPACKET *pkt)618{619size_t finish_md_len;620const char *sender;621size_t slen;622SSL *ssl = SSL_CONNECTION_GET_SSL(s);623624/* This is a real handshake so make sure we clean it up at the end */625if (!s->server && s->post_handshake_auth != SSL_PHA_REQUESTED)626s->statem.cleanuphand = 1;627628/*629* If we attempted to write early data or we're in middlebox compat mode630* then we deferred changing the handshake write keys to the last possible631* moment. If we didn't already do this when we sent the client certificate632* then we need to do it now.633*/634if (SSL_CONNECTION_IS_TLS13(s)635&& !s->server636&& !SSL_IS_QUIC_HANDSHAKE(s)637&& (s->early_data_state != SSL_EARLY_DATA_NONE638|| (s->options & SSL_OP_ENABLE_MIDDLEBOX_COMPAT) != 0)639&& s->s3.tmp.cert_req == 0640&& (!ssl->method->ssl3_enc->change_cipher_state(s,641SSL3_CC_HANDSHAKE | SSL3_CHANGE_CIPHER_CLIENT_WRITE))) {642;643/* SSLfatal() already called */644return CON_FUNC_ERROR;645}646647if (s->server) {648sender = ssl->method->ssl3_enc->server_finished_label;649slen = ssl->method->ssl3_enc->server_finished_label_len;650} else {651sender = ssl->method->ssl3_enc->client_finished_label;652slen = ssl->method->ssl3_enc->client_finished_label_len;653}654655finish_md_len = ssl->method->ssl3_enc->final_finish_mac(s,656sender, slen,657s->s3.tmp.finish_md);658if (finish_md_len == 0) {659/* SSLfatal() already called */660return CON_FUNC_ERROR;661}662663s->s3.tmp.finish_md_len = finish_md_len;664665if (!WPACKET_memcpy(pkt, s->s3.tmp.finish_md, finish_md_len)) {666SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);667return CON_FUNC_ERROR;668}669670/*671* Log the master secret, if logging is enabled. We don't log it for672* TLSv1.3: there's a different key schedule for that.673*/674if (!SSL_CONNECTION_IS_TLS13(s)675&& !ssl_log_secret(s, MASTER_SECRET_LABEL, s->session->master_key,676s->session->master_key_length)) {677/* SSLfatal() already called */678return CON_FUNC_ERROR;679}680681/*682* Copy the finished so we can use it for renegotiation checks683*/684if (!ossl_assert(finish_md_len <= EVP_MAX_MD_SIZE)) {685SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);686return CON_FUNC_ERROR;687}688if (!s->server) {689memcpy(s->s3.previous_client_finished, s->s3.tmp.finish_md,690finish_md_len);691s->s3.previous_client_finished_len = finish_md_len;692} else {693memcpy(s->s3.previous_server_finished, s->s3.tmp.finish_md,694finish_md_len);695s->s3.previous_server_finished_len = finish_md_len;696}697698return CON_FUNC_SUCCESS;699}700701CON_FUNC_RETURN tls_construct_key_update(SSL_CONNECTION *s, WPACKET *pkt)702{703if (!WPACKET_put_bytes_u8(pkt, s->key_update)) {704SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);705return CON_FUNC_ERROR;706}707708s->key_update = SSL_KEY_UPDATE_NONE;709return CON_FUNC_SUCCESS;710}711712MSG_PROCESS_RETURN tls_process_key_update(SSL_CONNECTION *s, PACKET *pkt)713{714unsigned int updatetype;715716/*717* A KeyUpdate message signals a key change so the end of the message must718* be on a record boundary.719*/720if (RECORD_LAYER_processed_read_pending(&s->rlayer)) {721SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_NOT_ON_RECORD_BOUNDARY);722return MSG_PROCESS_ERROR;723}724725if (!PACKET_get_1(pkt, &updatetype)726|| PACKET_remaining(pkt) != 0) {727SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_KEY_UPDATE);728return MSG_PROCESS_ERROR;729}730731/*732* There are only two defined key update types. Fail if we get a value we733* didn't recognise.734*/735if (updatetype != SSL_KEY_UPDATE_NOT_REQUESTED736&& updatetype != SSL_KEY_UPDATE_REQUESTED) {737SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_UPDATE);738return MSG_PROCESS_ERROR;739}740741/*742* If we get a request for us to update our sending keys too then, we need743* to additionally send a KeyUpdate message. However that message should744* not also request an update (otherwise we get into an infinite loop).745*/746if (updatetype == SSL_KEY_UPDATE_REQUESTED)747s->key_update = SSL_KEY_UPDATE_NOT_REQUESTED;748749if (!tls13_update_key(s, 0)) {750/* SSLfatal() already called */751return MSG_PROCESS_ERROR;752}753754return MSG_PROCESS_FINISHED_READING;755}756757/*758* ssl3_take_mac calculates the Finished MAC for the handshakes messages seen759* to far.760*/761int ssl3_take_mac(SSL_CONNECTION *s)762{763const char *sender;764size_t slen;765SSL *ssl = SSL_CONNECTION_GET_SSL(s);766767if (!s->server) {768sender = ssl->method->ssl3_enc->server_finished_label;769slen = ssl->method->ssl3_enc->server_finished_label_len;770} else {771sender = ssl->method->ssl3_enc->client_finished_label;772slen = ssl->method->ssl3_enc->client_finished_label_len;773}774775s->s3.tmp.peer_finish_md_len = ssl->method->ssl3_enc->final_finish_mac(s, sender, slen,776s->s3.tmp.peer_finish_md);777778if (s->s3.tmp.peer_finish_md_len == 0) {779/* SSLfatal() already called */780return 0;781}782783return 1;784}785786MSG_PROCESS_RETURN tls_process_change_cipher_spec(SSL_CONNECTION *s,787PACKET *pkt)788{789size_t remain;790791remain = PACKET_remaining(pkt);792/*793* 'Change Cipher Spec' is just a single byte, which should already have794* been consumed by ssl_get_message() so there should be no bytes left,795* unless we're using DTLS1_BAD_VER, which has an extra 2 bytes796*/797if (SSL_CONNECTION_IS_DTLS(s)) {798if ((s->version == DTLS1_BAD_VER799&& remain != DTLS1_CCS_HEADER_LENGTH + 1)800|| (s->version != DTLS1_BAD_VER801&& remain != DTLS1_CCS_HEADER_LENGTH - 1)) {802SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_CHANGE_CIPHER_SPEC);803return MSG_PROCESS_ERROR;804}805} else {806if (remain != 0) {807SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_CHANGE_CIPHER_SPEC);808return MSG_PROCESS_ERROR;809}810}811812/* Check we have a cipher to change to */813if (s->s3.tmp.new_cipher == NULL) {814SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_CCS_RECEIVED_EARLY);815return MSG_PROCESS_ERROR;816}817818s->s3.change_cipher_spec = 1;819if (!ssl3_do_change_cipher_spec(s)) {820SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);821return MSG_PROCESS_ERROR;822}823824if (SSL_CONNECTION_IS_DTLS(s)) {825if (s->version == DTLS1_BAD_VER)826s->d1->handshake_read_seq++;827828#ifndef OPENSSL_NO_SCTP829/*830* Remember that a CCS has been received, so that an old key of831* SCTP-Auth can be deleted when a CCS is sent. Will be ignored if no832* SCTP is used833*/834BIO_ctrl(SSL_get_wbio(SSL_CONNECTION_GET_SSL(s)),835BIO_CTRL_DGRAM_SCTP_AUTH_CCS_RCVD, 1, NULL);836#endif837}838839return MSG_PROCESS_CONTINUE_READING;840}841842MSG_PROCESS_RETURN tls_process_finished(SSL_CONNECTION *s, PACKET *pkt)843{844size_t md_len;845SSL *ssl = SSL_CONNECTION_GET_SSL(s);846int was_first = SSL_IS_FIRST_HANDSHAKE(s);847int ok;848849/* This is a real handshake so make sure we clean it up at the end */850if (s->server) {851/*852* To get this far we must have read encrypted data from the client. We853* no longer tolerate unencrypted alerts. This is ignored if less than854* TLSv1.3855*/856if (s->rlayer.rrlmethod->set_plain_alerts != NULL)857s->rlayer.rrlmethod->set_plain_alerts(s->rlayer.rrl, 0);858if (s->post_handshake_auth != SSL_PHA_REQUESTED)859s->statem.cleanuphand = 1;860if (SSL_CONNECTION_IS_TLS13(s)861&& !tls13_save_handshake_digest_for_pha(s)) {862/* SSLfatal() already called */863return MSG_PROCESS_ERROR;864}865}866867/*868* In TLSv1.3 a Finished message signals a key change so the end of the869* message must be on a record boundary.870*/871if (SSL_CONNECTION_IS_TLS13(s)872&& RECORD_LAYER_processed_read_pending(&s->rlayer)) {873SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_NOT_ON_RECORD_BOUNDARY);874return MSG_PROCESS_ERROR;875}876877/* If this occurs, we have missed a message */878if (!SSL_CONNECTION_IS_TLS13(s) && !s->s3.change_cipher_spec) {879SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE, SSL_R_GOT_A_FIN_BEFORE_A_CCS);880return MSG_PROCESS_ERROR;881}882s->s3.change_cipher_spec = 0;883884md_len = s->s3.tmp.peer_finish_md_len;885886if (md_len != PACKET_remaining(pkt)) {887SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_DIGEST_LENGTH);888return MSG_PROCESS_ERROR;889}890891ok = CRYPTO_memcmp(PACKET_data(pkt), s->s3.tmp.peer_finish_md,892md_len);893#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION894if (ok != 0) {895if ((PACKET_data(pkt)[0] ^ s->s3.tmp.peer_finish_md[0]) != 0xFF) {896ok = 0;897}898}899#endif900if (ok != 0) {901SSLfatal(s, SSL_AD_DECRYPT_ERROR, SSL_R_DIGEST_CHECK_FAILED);902return MSG_PROCESS_ERROR;903}904905/*906* Copy the finished so we can use it for renegotiation checks907*/908if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) {909SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);910return MSG_PROCESS_ERROR;911}912if (s->server) {913memcpy(s->s3.previous_client_finished, s->s3.tmp.peer_finish_md,914md_len);915s->s3.previous_client_finished_len = md_len;916} else {917memcpy(s->s3.previous_server_finished, s->s3.tmp.peer_finish_md,918md_len);919s->s3.previous_server_finished_len = md_len;920}921922/*923* In TLS1.3 we also have to change cipher state and do any final processing924* of the initial server flight (if we are a client)925*/926if (SSL_CONNECTION_IS_TLS13(s)) {927if (s->server) {928if (s->post_handshake_auth != SSL_PHA_REQUESTED && !ssl->method->ssl3_enc->change_cipher_state(s, SSL3_CC_APPLICATION | SSL3_CHANGE_CIPHER_SERVER_READ)) {929/* SSLfatal() already called */930return MSG_PROCESS_ERROR;931}932} else {933/* TLS 1.3 gets the secret size from the handshake md */934size_t dummy;935if (!ssl->method->ssl3_enc->generate_master_secret(s,936s->master_secret, s->handshake_secret, 0,937&dummy)) {938/* SSLfatal() already called */939return MSG_PROCESS_ERROR;940}941if (!tls13_store_server_finished_hash(s)) {942/* SSLfatal() already called */943return MSG_PROCESS_ERROR;944}945946/*947* For non-QUIC we set up the client's app data read keys now, so948* that we can go straight into reading 0.5RTT data from the server.949* For QUIC we don't do that, and instead defer setting up the keys950* until after we have set up the write keys in order to ensure that951* write keys are always set up before read keys (so that if we read952* a message we have the correct keys in place to ack it)953*/954if (!SSL_IS_QUIC_HANDSHAKE(s)955&& !ssl->method->ssl3_enc->change_cipher_state(s,956SSL3_CC_APPLICATION | SSL3_CHANGE_CIPHER_CLIENT_READ)) {957/* SSLfatal() already called */958return MSG_PROCESS_ERROR;959}960if (!tls_process_initial_server_flight(s)) {961/* SSLfatal() already called */962return MSG_PROCESS_ERROR;963}964}965}966967if (was_first968&& !SSL_IS_FIRST_HANDSHAKE(s)969&& s->rlayer.rrlmethod->set_first_handshake != NULL)970s->rlayer.rrlmethod->set_first_handshake(s->rlayer.rrl, 0);971972return MSG_PROCESS_FINISHED_READING;973}974975CON_FUNC_RETURN tls_construct_change_cipher_spec(SSL_CONNECTION *s, WPACKET *pkt)976{977if (!WPACKET_put_bytes_u8(pkt, SSL3_MT_CCS)) {978SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);979return CON_FUNC_ERROR;980}981982return CON_FUNC_SUCCESS;983}984985/* Add a certificate to the WPACKET */986static int ssl_add_cert_to_wpacket(SSL_CONNECTION *s, WPACKET *pkt,987X509 *x, int chain, int for_comp)988{989int len;990unsigned char *outbytes;991int context = SSL_EXT_TLS1_3_CERTIFICATE;992993if (for_comp)994context |= SSL_EXT_TLS1_3_CERTIFICATE_COMPRESSION;995996len = i2d_X509(x, NULL);997if (len < 0) {998if (!for_comp)999SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_BUF_LIB);1000return 0;1001}1002if (!WPACKET_sub_allocate_bytes_u24(pkt, len, &outbytes)1003|| i2d_X509(x, &outbytes) != len) {1004if (!for_comp)1005SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1006return 0;1007}10081009if ((SSL_CONNECTION_IS_TLS13(s) || for_comp)1010&& !tls_construct_extensions(s, pkt, context, x, chain)) {1011/* SSLfatal() already called */1012return 0;1013}10141015return 1;1016}10171018/* Add certificate chain to provided WPACKET */1019static int ssl_add_cert_chain(SSL_CONNECTION *s, WPACKET *pkt, CERT_PKEY *cpk, int for_comp)1020{1021int i, chain_count;1022X509 *x;1023STACK_OF(X509) *extra_certs;1024STACK_OF(X509) *chain = NULL;1025X509_STORE *chain_store;1026SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);10271028if (cpk == NULL || cpk->x509 == NULL)1029return 1;10301031x = cpk->x509;10321033/*1034* If we have a certificate specific chain use it, else use parent ctx.1035*/1036if (cpk->chain != NULL)1037extra_certs = cpk->chain;1038else1039extra_certs = sctx->extra_certs;10401041if ((s->mode & SSL_MODE_NO_AUTO_CHAIN) || extra_certs)1042chain_store = NULL;1043else if (s->cert->chain_store)1044chain_store = s->cert->chain_store;1045else1046chain_store = sctx->cert_store;10471048if (chain_store != NULL) {1049X509_STORE_CTX *xs_ctx = X509_STORE_CTX_new_ex(sctx->libctx,1050sctx->propq);10511052if (xs_ctx == NULL) {1053if (!for_comp)1054SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_X509_LIB);1055return 0;1056}1057if (!X509_STORE_CTX_init(xs_ctx, chain_store, x, NULL)) {1058X509_STORE_CTX_free(xs_ctx);1059if (!for_comp)1060SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_X509_LIB);1061return 0;1062}1063/*1064* It is valid for the chain not to be complete (because normally we1065* don't include the root cert in the chain). Therefore we deliberately1066* ignore the error return from this call. We're not actually verifying1067* the cert - we're just building as much of the chain as we can1068*/1069(void)X509_verify_cert(xs_ctx);1070/* Don't leave errors in the queue */1071ERR_clear_error();1072chain = X509_STORE_CTX_get0_chain(xs_ctx);1073i = ssl_security_cert_chain(s, chain, NULL, 0);1074if (i != 1) {1075#if 01076/* Dummy error calls so mkerr generates them */1077ERR_raise(ERR_LIB_SSL, SSL_R_EE_KEY_TOO_SMALL);1078ERR_raise(ERR_LIB_SSL, SSL_R_CA_KEY_TOO_SMALL);1079ERR_raise(ERR_LIB_SSL, SSL_R_CA_MD_TOO_WEAK);1080#endif1081X509_STORE_CTX_free(xs_ctx);1082if (!for_comp)1083SSLfatal(s, SSL_AD_INTERNAL_ERROR, i);1084return 0;1085}1086chain_count = sk_X509_num(chain);1087for (i = 0; i < chain_count; i++) {1088x = sk_X509_value(chain, i);10891090if (!ssl_add_cert_to_wpacket(s, pkt, x, i, for_comp)) {1091/* SSLfatal() already called */1092X509_STORE_CTX_free(xs_ctx);1093return 0;1094}1095}1096X509_STORE_CTX_free(xs_ctx);1097} else {1098i = ssl_security_cert_chain(s, extra_certs, x, 0);1099if (i != 1) {1100if (!for_comp)1101SSLfatal(s, SSL_AD_INTERNAL_ERROR, i);1102return 0;1103}1104if (!ssl_add_cert_to_wpacket(s, pkt, x, 0, for_comp)) {1105/* SSLfatal() already called */1106return 0;1107}1108for (i = 0; i < sk_X509_num(extra_certs); i++) {1109x = sk_X509_value(extra_certs, i);1110if (!ssl_add_cert_to_wpacket(s, pkt, x, i + 1, for_comp)) {1111/* SSLfatal() already called */1112return 0;1113}1114}1115}1116return 1;1117}11181119EVP_PKEY *tls_get_peer_pkey(const SSL_CONNECTION *sc)1120{1121if (sc->session->peer_rpk != NULL)1122return sc->session->peer_rpk;1123if (sc->session->peer != NULL)1124return X509_get0_pubkey(sc->session->peer);1125return NULL;1126}11271128int tls_process_rpk(SSL_CONNECTION *sc, PACKET *pkt, EVP_PKEY **peer_rpk)1129{1130EVP_PKEY *pkey = NULL;1131int ret = 0;1132RAW_EXTENSION *rawexts = NULL;1133PACKET extensions;1134PACKET context;1135unsigned long cert_len = 0, spki_len = 0;1136const unsigned char *spki, *spkistart;1137SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(sc);11381139/*-1140* ----------------------------1141* TLS 1.3 Certificate message:1142* ----------------------------1143* https://datatracker.ietf.org/doc/html/rfc8446#section-4.4.21144*1145* enum {1146* X509(0),1147* RawPublicKey(2),1148* (255)1149* } CertificateType;1150*1151* struct {1152* select (certificate_type) {1153* case RawPublicKey:1154* // From RFC 7250 ASN.1_subjectPublicKeyInfo1155* opaque ASN1_subjectPublicKeyInfo<1..2^24-1>;1156*1157* case X509:1158* opaque cert_data<1..2^24-1>;1159* };1160* Extension extensions<0..2^16-1>;1161* } CertificateEntry;1162*1163* struct {1164* opaque certificate_request_context<0..2^8-1>;1165* CertificateEntry certificate_list<0..2^24-1>;1166* } Certificate;1167*1168* The client MUST send a Certificate message if and only if the server1169* has requested client authentication via a CertificateRequest message1170* (Section 4.3.2). If the server requests client authentication but no1171* suitable certificate is available, the client MUST send a Certificate1172* message containing no certificates (i.e., with the "certificate_list"1173* field having length 0).1174*1175* ----------------------------1176* TLS 1.2 Certificate message:1177* ----------------------------1178* https://datatracker.ietf.org/doc/html/rfc7250#section-31179*1180* opaque ASN.1Cert<1..2^24-1>;1181*1182* struct {1183* select(certificate_type){1184*1185* // certificate type defined in this document.1186* case RawPublicKey:1187* opaque ASN.1_subjectPublicKeyInfo<1..2^24-1>;1188*1189* // X.509 certificate defined in RFC 52461190* case X.509:1191* ASN.1Cert certificate_list<0..2^24-1>;1192*1193* // Additional certificate type based on1194* // "TLS Certificate Types" subregistry1195* };1196* } Certificate;1197*1198* -------------1199* Consequently:1200* -------------1201* After the (TLS 1.3 only) context octet string (1 byte length + data) the1202* Certificate message has a 3-byte length that is zero in the client to1203* server message when the client has no RPK to send. In that case, there1204* are no (TLS 1.3 only) per-certificate extensions either, because the1205* [CertificateEntry] list is empty.1206*1207* In the server to client direction, or when the client had an RPK to send,1208* the TLS 1.3 message just prepends the length of the RPK+extensions,1209* while TLS <= 1.2 sends just the RPK (octet-string).1210*1211* The context must be zero-length in the server to client direction, and1212* must match the value recorded in the certificate request in the client1213* to server direction.1214*/1215if (SSL_CONNECTION_IS_TLS13(sc)) {1216if (!PACKET_get_length_prefixed_1(pkt, &context)) {1217SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT);1218goto err;1219}1220if (sc->server) {1221if (sc->pha_context == NULL) {1222if (PACKET_remaining(&context) != 0) {1223SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT);1224goto err;1225}1226} else {1227if (!PACKET_equal(&context, sc->pha_context, sc->pha_context_len)) {1228SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT);1229goto err;1230}1231}1232} else {1233if (PACKET_remaining(&context) != 0) {1234SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_INVALID_CONTEXT);1235goto err;1236}1237}1238}12391240if (!PACKET_get_net_3(pkt, &cert_len)1241|| PACKET_remaining(pkt) != cert_len) {1242SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);1243goto err;1244}12451246/*1247* The list length may be zero when there is no RPK. In the case of TLS1248* 1.2 this is actually the RPK length, which cannot be zero as specified,1249* but that breaks the ability of the client to decline client auth. We1250* overload the 0 RPK length to mean "no RPK". This interpretation is1251* also used some other (reference?) implementations, but is not supported1252* by the verbatim RFC7250 text.1253*/1254if (cert_len == 0)1255return 1;12561257if (SSL_CONNECTION_IS_TLS13(sc)) {1258/*1259* With TLS 1.3, a non-empty explicit-length RPK octet-string followed1260* by a possibly empty extension block.1261*/1262if (!PACKET_get_net_3(pkt, &spki_len)) {1263SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);1264goto err;1265}1266if (spki_len == 0) {1267/* empty RPK */1268SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_EMPTY_RAW_PUBLIC_KEY);1269goto err;1270}1271} else {1272spki_len = cert_len;1273}12741275if (!PACKET_get_bytes(pkt, &spki, spki_len)) {1276SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);1277goto err;1278}1279spkistart = spki;1280if ((pkey = d2i_PUBKEY_ex(NULL, &spki, spki_len, sctx->libctx, sctx->propq)) == NULL1281|| spki != (spkistart + spki_len)) {1282SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);1283goto err;1284}1285if (EVP_PKEY_missing_parameters(pkey)) {1286SSLfatal(sc, SSL_AD_INTERNAL_ERROR,1287SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS);1288goto err;1289}12901291/* Process the Extensions block */1292if (SSL_CONNECTION_IS_TLS13(sc)) {1293if (PACKET_remaining(pkt) != (cert_len - 3 - spki_len)) {1294SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_LENGTH);1295goto err;1296}1297if (!PACKET_as_length_prefixed_2(pkt, &extensions)1298|| PACKET_remaining(pkt) != 0) {1299SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);1300goto err;1301}1302if (!tls_collect_extensions(sc, &extensions, SSL_EXT_TLS1_3_RAW_PUBLIC_KEY,1303&rawexts, NULL, 1)) {1304/* SSLfatal already called */1305goto err;1306}1307/* chain index is always zero and fin always 1 for RPK */1308if (!tls_parse_all_extensions(sc, SSL_EXT_TLS1_3_RAW_PUBLIC_KEY,1309rawexts, NULL, 0, 1)) {1310/* SSLfatal already called */1311goto err;1312}1313}1314ret = 1;1315if (peer_rpk != NULL) {1316*peer_rpk = pkey;1317pkey = NULL;1318}13191320err:1321OPENSSL_free(rawexts);1322EVP_PKEY_free(pkey);1323return ret;1324}13251326unsigned long tls_output_rpk(SSL_CONNECTION *sc, WPACKET *pkt, CERT_PKEY *cpk)1327{1328int pdata_len = 0;1329unsigned char *pdata = NULL;1330X509_PUBKEY *xpk = NULL;1331unsigned long ret = 0;1332X509 *x509 = NULL;13331334if (cpk != NULL && cpk->x509 != NULL) {1335x509 = cpk->x509;1336/* Get the RPK from the certificate */1337xpk = X509_get_X509_PUBKEY(cpk->x509);1338if (xpk == NULL) {1339SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1340goto err;1341}1342pdata_len = i2d_X509_PUBKEY(xpk, &pdata);1343} else if (cpk != NULL && cpk->privatekey != NULL) {1344/* Get the RPK from the private key */1345pdata_len = i2d_PUBKEY(cpk->privatekey, &pdata);1346} else {1347/* The server RPK is not optional */1348if (sc->server) {1349SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1350goto err;1351}1352/* The client can send a zero length certificate list */1353if (!WPACKET_sub_memcpy_u24(pkt, pdata, pdata_len)) {1354SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1355goto err;1356}1357return 1;1358}13591360if (pdata_len <= 0) {1361SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1362goto err;1363}13641365/*1366* TLSv1.2 is _just_ the raw public key1367* TLSv1.3 includes extensions, so there's a length wrapper1368*/1369if (SSL_CONNECTION_IS_TLS13(sc)) {1370if (!WPACKET_start_sub_packet_u24(pkt)) {1371SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1372goto err;1373}1374}13751376if (!WPACKET_sub_memcpy_u24(pkt, pdata, pdata_len)) {1377SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1378goto err;1379}13801381if (SSL_CONNECTION_IS_TLS13(sc)) {1382/*1383* Only send extensions relevant to raw public keys. Until such1384* extensions are defined, this will be an empty set of extensions.1385* |x509| may be NULL, which raw public-key extensions need to handle.1386*/1387if (!tls_construct_extensions(sc, pkt, SSL_EXT_TLS1_3_RAW_PUBLIC_KEY,1388x509, 0)) {1389/* SSLfatal() already called */1390goto err;1391}1392if (!WPACKET_close(pkt)) {1393SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1394goto err;1395}1396}13971398ret = 1;1399err:1400OPENSSL_free(pdata);1401return ret;1402}14031404unsigned long ssl3_output_cert_chain(SSL_CONNECTION *s, WPACKET *pkt,1405CERT_PKEY *cpk, int for_comp)1406{1407if (!WPACKET_start_sub_packet_u24(pkt)) {1408if (!for_comp)1409SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1410return 0;1411}14121413if (!ssl_add_cert_chain(s, pkt, cpk, for_comp))1414return 0;14151416if (!WPACKET_close(pkt)) {1417if (!for_comp)1418SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1419return 0;1420}14211422return 1;1423}14241425/*1426* Tidy up after the end of a handshake. In the case of SCTP this may result1427* in NBIO events. If |clearbufs| is set then init_buf and the wbio buffer is1428* freed up as well.1429*/1430WORK_STATE tls_finish_handshake(SSL_CONNECTION *s, ossl_unused WORK_STATE wst,1431int clearbufs, int stop)1432{1433void (*cb)(const SSL *ssl, int type, int val) = NULL;1434int cleanuphand = s->statem.cleanuphand;1435SSL *ssl = SSL_CONNECTION_GET_USER_SSL(s);1436SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);14371438if (clearbufs) {1439if (!SSL_CONNECTION_IS_DTLS(s)1440#ifndef OPENSSL_NO_SCTP1441/*1442* RFC6083: SCTP provides a reliable and in-sequence transport service for DTLS1443* messages that require it. Therefore, DTLS procedures for retransmissions1444* MUST NOT be used.1445* Hence the init_buf can be cleared when DTLS over SCTP as transport is used.1446*/1447|| BIO_dgram_is_sctp(SSL_get_wbio(SSL_CONNECTION_GET_SSL(s)))1448#endif1449) {1450/*1451* We don't do this in DTLS over UDP because we may still need the init_buf1452* in case there are any unexpected retransmits1453*/1454BUF_MEM_free(s->init_buf);1455s->init_buf = NULL;1456}14571458if (!ssl_free_wbio_buffer(s)) {1459SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);1460return WORK_ERROR;1461}1462s->init_num = 0;1463}14641465if (SSL_CONNECTION_IS_TLS13(s) && !s->server1466&& s->post_handshake_auth == SSL_PHA_REQUESTED)1467s->post_handshake_auth = SSL_PHA_EXT_SENT;14681469/*1470* Only set if there was a Finished message and this isn't after a TLSv1.31471* post handshake exchange1472*/1473if (cleanuphand) {1474/* skipped if we just sent a HelloRequest */1475s->renegotiate = 0;1476s->new_session = 0;1477s->statem.cleanuphand = 0;1478s->ext.ticket_expected = 0;14791480ssl3_cleanup_key_block(s);14811482if (s->server) {1483/*1484* In TLSv1.3 we update the cache as part of constructing the1485* NewSessionTicket1486*/1487if (!SSL_CONNECTION_IS_TLS13(s))1488ssl_update_cache(s, SSL_SESS_CACHE_SERVER);14891490/* N.B. s->ctx may not equal s->session_ctx */1491ssl_tsan_counter(sctx, &sctx->stats.sess_accept_good);1492s->handshake_func = ossl_statem_accept;1493} else {1494if (SSL_CONNECTION_IS_TLS13(s)) {1495/*1496* We encourage applications to only use TLSv1.3 tickets once,1497* so we remove this one from the cache.1498*/1499if ((s->session_ctx->session_cache_mode1500& SSL_SESS_CACHE_CLIENT)1501!= 0)1502SSL_CTX_remove_session(s->session_ctx, s->session);1503} else {1504/*1505* In TLSv1.3 we update the cache as part of processing the1506* NewSessionTicket1507*/1508ssl_update_cache(s, SSL_SESS_CACHE_CLIENT);1509}1510if (s->hit)1511ssl_tsan_counter(s->session_ctx,1512&s->session_ctx->stats.sess_hit);15131514s->handshake_func = ossl_statem_connect;1515ssl_tsan_counter(s->session_ctx,1516&s->session_ctx->stats.sess_connect_good);1517}15181519if (SSL_CONNECTION_IS_DTLS(s)) {1520/* done with handshaking */1521s->d1->handshake_read_seq = 0;1522s->d1->handshake_write_seq = 0;1523s->d1->next_handshake_write_seq = 0;1524dtls1_clear_received_buffer(s);1525}1526}15271528if (s->info_callback != NULL)1529cb = s->info_callback;1530else if (sctx->info_callback != NULL)1531cb = sctx->info_callback;15321533/* The callback may expect us to not be in init at handshake done */1534ossl_statem_set_in_init(s, 0);15351536if (cb != NULL) {1537if (cleanuphand1538|| !SSL_CONNECTION_IS_TLS13(s)1539|| SSL_IS_FIRST_HANDSHAKE(s))1540cb(ssl, SSL_CB_HANDSHAKE_DONE, 1);1541}15421543if (!stop) {1544/* If we've got more work to do we go back into init */1545ossl_statem_set_in_init(s, 1);1546return WORK_FINISHED_CONTINUE;1547}15481549return WORK_FINISHED_STOP;1550}15511552int tls_get_message_header(SSL_CONNECTION *s, int *mt)1553{1554/* s->init_num < SSL3_HM_HEADER_LENGTH */1555int skip_message, i;1556uint8_t recvd_type;1557unsigned char *p;1558size_t l, readbytes;1559SSL *ssl = SSL_CONNECTION_GET_SSL(s);1560SSL *ussl = SSL_CONNECTION_GET_USER_SSL(s);15611562p = (unsigned char *)s->init_buf->data;15631564do {1565while (s->init_num < SSL3_HM_HEADER_LENGTH) {1566i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, &recvd_type,1567&p[s->init_num],1568SSL3_HM_HEADER_LENGTH - s->init_num,15690, &readbytes);1570if (i <= 0) {1571s->rwstate = SSL_READING;1572return 0;1573}1574if (recvd_type == SSL3_RT_CHANGE_CIPHER_SPEC) {1575/*1576* A ChangeCipherSpec must be a single byte and may not occur1577* in the middle of a handshake message.1578*/1579if (s->init_num != 0 || readbytes != 1 || p[0] != SSL3_MT_CCS) {1580SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE,1581SSL_R_BAD_CHANGE_CIPHER_SPEC);1582return 0;1583}1584if (s->statem.hand_state == TLS_ST_BEFORE1585&& (s->s3.flags & TLS1_FLAGS_STATELESS) != 0) {1586/*1587* We are stateless and we received a CCS. Probably this is1588* from a client between the first and second ClientHellos.1589* We should ignore this, but return an error because we do1590* not return success until we see the second ClientHello1591* with a valid cookie.1592*/1593return 0;1594}1595s->s3.tmp.message_type = *mt = SSL3_MT_CHANGE_CIPHER_SPEC;1596s->init_num = readbytes - 1;1597s->init_msg = s->init_buf->data;1598s->s3.tmp.message_size = readbytes;1599return 1;1600} else if (recvd_type != SSL3_RT_HANDSHAKE) {1601SSLfatal(s, SSL_AD_UNEXPECTED_MESSAGE,1602SSL_R_CCS_RECEIVED_EARLY);1603return 0;1604}1605s->init_num += readbytes;1606}16071608skip_message = 0;1609if (!s->server)1610if (s->statem.hand_state != TLS_ST_OK1611&& p[0] == SSL3_MT_HELLO_REQUEST)1612/*1613* The server may always send 'Hello Request' messages --1614* we are doing a handshake anyway now, so ignore them if1615* their format is correct. Does not count for 'Finished'1616* MAC.1617*/1618if (p[1] == 0 && p[2] == 0 && p[3] == 0) {1619s->init_num = 0;1620skip_message = 1;16211622if (s->msg_callback)1623s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE,1624p, SSL3_HM_HEADER_LENGTH, ussl,1625s->msg_callback_arg);1626}1627} while (skip_message);1628/* s->init_num == SSL3_HM_HEADER_LENGTH */16291630*mt = *p;1631s->s3.tmp.message_type = *(p++);16321633if (RECORD_LAYER_is_sslv2_record(&s->rlayer)) {1634/*1635* Only happens with SSLv3+ in an SSLv2 backward compatible1636* ClientHello1637*1638* Total message size is the remaining record bytes to read1639* plus the SSL3_HM_HEADER_LENGTH bytes that we already read1640*/1641l = s->rlayer.tlsrecs[0].length + SSL3_HM_HEADER_LENGTH;1642s->s3.tmp.message_size = l;16431644s->init_msg = s->init_buf->data;1645s->init_num = SSL3_HM_HEADER_LENGTH;1646} else {1647n2l3(p, l);1648/* BUF_MEM_grow takes an 'int' parameter */1649if (l > (INT_MAX - SSL3_HM_HEADER_LENGTH)) {1650SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,1651SSL_R_EXCESSIVE_MESSAGE_SIZE);1652return 0;1653}1654s->s3.tmp.message_size = l;16551656s->init_msg = s->init_buf->data + SSL3_HM_HEADER_LENGTH;1657s->init_num = 0;1658}16591660return 1;1661}16621663int tls_get_message_body(SSL_CONNECTION *s, size_t *len)1664{1665size_t n, readbytes;1666unsigned char *p;1667int i;1668SSL *ssl = SSL_CONNECTION_GET_SSL(s);1669SSL *ussl = SSL_CONNECTION_GET_USER_SSL(s);16701671if (s->s3.tmp.message_type == SSL3_MT_CHANGE_CIPHER_SPEC) {1672/* We've already read everything in */1673*len = (unsigned long)s->init_num;1674return 1;1675}16761677p = s->init_msg;1678n = s->s3.tmp.message_size - s->init_num;1679while (n > 0) {1680i = ssl->method->ssl_read_bytes(ssl, SSL3_RT_HANDSHAKE, NULL,1681&p[s->init_num], n, 0, &readbytes);1682if (i <= 0) {1683s->rwstate = SSL_READING;1684*len = 0;1685return 0;1686}1687s->init_num += readbytes;1688n -= readbytes;1689}16901691/*1692* If receiving Finished, record MAC of prior handshake messages for1693* Finished verification.1694*/1695if (*(s->init_buf->data) == SSL3_MT_FINISHED && !ssl3_take_mac(s)) {1696/* SSLfatal() already called */1697*len = 0;1698return 0;1699}17001701/* Feed this message into MAC computation. */1702if (RECORD_LAYER_is_sslv2_record(&s->rlayer)) {1703if (!ssl3_finish_mac(s, (unsigned char *)s->init_buf->data,1704s->init_num)) {1705/* SSLfatal() already called */1706*len = 0;1707return 0;1708}1709if (s->msg_callback)1710s->msg_callback(0, SSL2_VERSION, 0, s->init_buf->data,1711(size_t)s->init_num, ussl, s->msg_callback_arg);1712} else {1713/*1714* We defer feeding in the HRR until later. We'll do it as part of1715* processing the message1716* The TLsv1.3 handshake transcript stops at the ClientFinished1717* message.1718*/1719#define SERVER_HELLO_RANDOM_OFFSET (SSL3_HM_HEADER_LENGTH + 2)1720/* KeyUpdate and NewSessionTicket do not need to be added */1721if (!SSL_CONNECTION_IS_TLS13(s)1722|| (s->s3.tmp.message_type != SSL3_MT_NEWSESSION_TICKET1723&& s->s3.tmp.message_type != SSL3_MT_KEY_UPDATE)) {1724if (s->s3.tmp.message_type != SSL3_MT_SERVER_HELLO1725|| s->init_num < SERVER_HELLO_RANDOM_OFFSET + SSL3_RANDOM_SIZE1726|| memcmp(hrrrandom,1727s->init_buf->data + SERVER_HELLO_RANDOM_OFFSET,1728SSL3_RANDOM_SIZE)1729!= 0) {1730if (!ssl3_finish_mac(s, (unsigned char *)s->init_buf->data,1731s->init_num + SSL3_HM_HEADER_LENGTH)) {1732/* SSLfatal() already called */1733*len = 0;1734return 0;1735}1736}1737}1738if (s->msg_callback)1739s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data,1740(size_t)s->init_num + SSL3_HM_HEADER_LENGTH, ussl,1741s->msg_callback_arg);1742}17431744*len = s->init_num;1745return 1;1746}17471748static const X509ERR2ALERT x509table[] = {1749{ X509_V_ERR_APPLICATION_VERIFICATION, SSL_AD_HANDSHAKE_FAILURE },1750{ X509_V_ERR_CA_KEY_TOO_SMALL, SSL_AD_BAD_CERTIFICATE },1751{ X509_V_ERR_EC_KEY_EXPLICIT_PARAMS, SSL_AD_BAD_CERTIFICATE },1752{ X509_V_ERR_CA_MD_TOO_WEAK, SSL_AD_BAD_CERTIFICATE },1753{ X509_V_ERR_CERT_CHAIN_TOO_LONG, SSL_AD_UNKNOWN_CA },1754{ X509_V_ERR_CERT_HAS_EXPIRED, SSL_AD_CERTIFICATE_EXPIRED },1755{ X509_V_ERR_CERT_NOT_YET_VALID, SSL_AD_BAD_CERTIFICATE },1756{ X509_V_ERR_CERT_REJECTED, SSL_AD_BAD_CERTIFICATE },1757{ X509_V_ERR_CERT_REVOKED, SSL_AD_CERTIFICATE_REVOKED },1758{ X509_V_ERR_CERT_SIGNATURE_FAILURE, SSL_AD_DECRYPT_ERROR },1759{ X509_V_ERR_CERT_UNTRUSTED, SSL_AD_BAD_CERTIFICATE },1760{ X509_V_ERR_CRL_HAS_EXPIRED, SSL_AD_CERTIFICATE_EXPIRED },1761{ X509_V_ERR_CRL_NOT_YET_VALID, SSL_AD_BAD_CERTIFICATE },1762{ X509_V_ERR_CRL_SIGNATURE_FAILURE, SSL_AD_DECRYPT_ERROR },1763{ X509_V_ERR_DANE_NO_MATCH, SSL_AD_BAD_CERTIFICATE },1764{ X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT, SSL_AD_UNKNOWN_CA },1765{ X509_V_ERR_EE_KEY_TOO_SMALL, SSL_AD_BAD_CERTIFICATE },1766{ X509_V_ERR_EMAIL_MISMATCH, SSL_AD_BAD_CERTIFICATE },1767{ X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD, SSL_AD_BAD_CERTIFICATE },1768{ X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD, SSL_AD_BAD_CERTIFICATE },1769{ X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD, SSL_AD_BAD_CERTIFICATE },1770{ X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD, SSL_AD_BAD_CERTIFICATE },1771{ X509_V_ERR_HOSTNAME_MISMATCH, SSL_AD_BAD_CERTIFICATE },1772{ X509_V_ERR_INVALID_CA, SSL_AD_UNKNOWN_CA },1773{ X509_V_ERR_INVALID_CALL, SSL_AD_INTERNAL_ERROR },1774{ X509_V_ERR_INVALID_PURPOSE, SSL_AD_UNSUPPORTED_CERTIFICATE },1775{ X509_V_ERR_IP_ADDRESS_MISMATCH, SSL_AD_BAD_CERTIFICATE },1776{ X509_V_ERR_OUT_OF_MEM, SSL_AD_INTERNAL_ERROR },1777{ X509_V_ERR_PATH_LENGTH_EXCEEDED, SSL_AD_UNKNOWN_CA },1778{ X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN, SSL_AD_UNKNOWN_CA },1779{ X509_V_ERR_STORE_LOOKUP, SSL_AD_INTERNAL_ERROR },1780{ X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY, SSL_AD_BAD_CERTIFICATE },1781{ X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE, SSL_AD_BAD_CERTIFICATE },1782{ X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE, SSL_AD_BAD_CERTIFICATE },1783{ X509_V_ERR_UNABLE_TO_GET_CRL, SSL_AD_UNKNOWN_CA },1784{ X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER, SSL_AD_UNKNOWN_CA },1785{ X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT, SSL_AD_UNKNOWN_CA },1786{ X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, SSL_AD_UNKNOWN_CA },1787{ X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE, SSL_AD_UNKNOWN_CA },1788{ X509_V_ERR_UNSPECIFIED, SSL_AD_INTERNAL_ERROR },17891790/* Last entry; return this if we don't find the value above. */1791{ X509_V_OK, SSL_AD_CERTIFICATE_UNKNOWN }1792};17931794int ssl_x509err2alert(int x509err)1795{1796const X509ERR2ALERT *tp;17971798for (tp = x509table; tp->x509err != X509_V_OK; ++tp)1799if (tp->x509err == x509err)1800break;1801return tp->alert;1802}18031804int ssl_allow_compression(SSL_CONNECTION *s)1805{1806if (s->options & SSL_OP_NO_COMPRESSION)1807return 0;1808return ssl_security(s, SSL_SECOP_COMPRESSION, 0, 0, NULL);1809}18101811/*1812* SSL/TLS/DTLS version comparison1813*1814* Returns1815* 0 if versiona is equal to versionb1816* 1 if versiona is greater than versionb1817* -1 if versiona is less than versionb1818*/1819int ssl_version_cmp(const SSL_CONNECTION *s, int versiona, int versionb)1820{1821int dtls = SSL_CONNECTION_IS_DTLS(s);18221823if (versiona == versionb)1824return 0;1825if (!dtls)1826return versiona < versionb ? -1 : 1;1827return DTLS_VERSION_LT(versiona, versionb) ? -1 : 1;1828}18291830typedef struct {1831int version;1832const SSL_METHOD *(*cmeth)(void);1833const SSL_METHOD *(*smeth)(void);1834} version_info;18351836#if TLS_MAX_VERSION_INTERNAL != TLS1_3_VERSION1837#error Code needs update for TLS_method() support beyond TLS1_3_VERSION.1838#endif18391840/* Must be in order high to low */1841static const version_info tls_version_table[] = {1842#ifndef OPENSSL_NO_TLS1_31843{ TLS1_3_VERSION, tlsv1_3_client_method, tlsv1_3_server_method },1844#else1845{ TLS1_3_VERSION, NULL, NULL },1846#endif1847#ifndef OPENSSL_NO_TLS1_21848{ TLS1_2_VERSION, tlsv1_2_client_method, tlsv1_2_server_method },1849#else1850{ TLS1_2_VERSION, NULL, NULL },1851#endif1852#ifndef OPENSSL_NO_TLS1_11853{ TLS1_1_VERSION, tlsv1_1_client_method, tlsv1_1_server_method },1854#else1855{ TLS1_1_VERSION, NULL, NULL },1856#endif1857#ifndef OPENSSL_NO_TLS11858{ TLS1_VERSION, tlsv1_client_method, tlsv1_server_method },1859#else1860{ TLS1_VERSION, NULL, NULL },1861#endif1862#ifndef OPENSSL_NO_SSL31863{ SSL3_VERSION, sslv3_client_method, sslv3_server_method },1864#else1865{ SSL3_VERSION, NULL, NULL },1866#endif1867{ 0, NULL, NULL },1868};18691870#if DTLS_MAX_VERSION_INTERNAL != DTLS1_2_VERSION1871#error Code needs update for DTLS_method() support beyond DTLS1_2_VERSION.1872#endif18731874/* Must be in order high to low */1875static const version_info dtls_version_table[] = {1876#ifndef OPENSSL_NO_DTLS1_21877{ DTLS1_2_VERSION, dtlsv1_2_client_method, dtlsv1_2_server_method },1878#else1879{ DTLS1_2_VERSION, NULL, NULL },1880#endif1881#ifndef OPENSSL_NO_DTLS11882{ DTLS1_VERSION, dtlsv1_client_method, dtlsv1_server_method },1883{ DTLS1_BAD_VER, dtls_bad_ver_client_method, NULL },1884#else1885{ DTLS1_VERSION, NULL, NULL },1886{ DTLS1_BAD_VER, NULL, NULL },1887#endif1888{ 0, NULL, NULL },1889};18901891/*1892* ssl_method_error - Check whether an SSL_METHOD is enabled.1893*1894* @s: The SSL handle for the candidate method1895* @method: the intended method.1896*1897* Returns 0 on success, or an SSL error reason on failure.1898*/1899static int ssl_method_error(const SSL_CONNECTION *s, const SSL_METHOD *method)1900{1901int version = method->version;19021903if ((s->min_proto_version != 0 && ssl_version_cmp(s, version, s->min_proto_version) < 0) || ssl_security(s, SSL_SECOP_VERSION, 0, version, NULL) == 0)1904return SSL_R_VERSION_TOO_LOW;19051906if (s->max_proto_version != 0 && ssl_version_cmp(s, version, s->max_proto_version) > 0)1907return SSL_R_VERSION_TOO_HIGH;19081909if ((s->options & method->mask) != 0)1910return SSL_R_UNSUPPORTED_PROTOCOL;1911if ((method->flags & SSL_METHOD_NO_SUITEB) != 0 && tls1_suiteb(s))1912return SSL_R_AT_LEAST_TLS_1_2_NEEDED_IN_SUITEB_MODE;19131914return 0;1915}19161917/*1918* Only called by servers. Returns 1 if the server has a TLSv1.3 capable1919* certificate type, or has PSK or a certificate callback configured, or has1920* a servername callback configure. Otherwise returns 0.1921*/1922static int is_tls13_capable(const SSL_CONNECTION *s)1923{1924size_t i;1925int curve;1926SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);19271928if (!ossl_assert(sctx != NULL) || !ossl_assert(s->session_ctx != NULL))1929return 0;19301931/*1932* A servername callback can change the available certs, so if a servername1933* cb is set then we just assume TLSv1.3 will be ok1934*/1935if (sctx->ext.servername_cb != NULL1936|| s->session_ctx->ext.servername_cb != NULL)1937return 1;19381939#ifndef OPENSSL_NO_PSK1940if (s->psk_server_callback != NULL)1941return 1;1942#endif19431944if (s->psk_find_session_cb != NULL || s->cert->cert_cb != NULL)1945return 1;19461947/* All provider-based sig algs are required to support at least TLS1.3 */1948for (i = 0; i < s->ssl_pkey_num; i++) {1949/* Skip over certs disallowed for TLSv1.3 */1950switch (i) {1951case SSL_PKEY_DSA_SIGN:1952case SSL_PKEY_GOST01:1953case SSL_PKEY_GOST12_256:1954case SSL_PKEY_GOST12_512:1955continue;1956default:1957break;1958}1959if (!ssl_has_cert(s, i))1960continue;1961if (i != SSL_PKEY_ECC)1962return 1;1963/*1964* Prior to TLSv1.3 sig algs allowed any curve to be used. TLSv1.3 is1965* more restrictive so check that our sig algs are consistent with this1966* EC cert. See section 4.2.3 of RFC8446.1967*/1968curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey);1969if (tls_check_sigalg_curve(s, curve))1970return 1;1971}19721973return 0;1974}19751976/*1977* ssl_version_supported - Check that the specified `version` is supported by1978* `SSL *` instance1979*1980* @s: The SSL handle for the candidate method1981* @version: Protocol version to test against1982*1983* Returns 1 when supported, otherwise 01984*/1985int ssl_version_supported(const SSL_CONNECTION *s, int version,1986const SSL_METHOD **meth)1987{1988const version_info *vent;1989const version_info *table;19901991switch (SSL_CONNECTION_GET_SSL(s)->method->version) {1992default:1993/* Version should match method version for non-ANY method */1994return ssl_version_cmp(s, version, s->version) == 0;1995case TLS_ANY_VERSION:1996table = tls_version_table;1997break;1998case DTLS_ANY_VERSION:1999table = dtls_version_table;2000break;2001}20022003for (vent = table;2004vent->version != 0 && ssl_version_cmp(s, version, vent->version) <= 0;2005++vent) {2006const SSL_METHOD *(*thismeth)(void) = s->server ? vent->smeth2007: vent->cmeth;20082009if (thismeth != NULL2010&& ssl_version_cmp(s, version, vent->version) == 02011&& ssl_method_error(s, thismeth()) == 02012&& (!s->server2013|| version != TLS1_3_VERSION2014|| is_tls13_capable(s))) {2015if (meth != NULL)2016*meth = thismeth();2017return 1;2018}2019}2020return 0;2021}20222023/*2024* ssl_check_version_downgrade - In response to RFC7507 SCSV version2025* fallback indication from a client check whether we're using the highest2026* supported protocol version.2027*2028* @s server SSL handle.2029*2030* Returns 1 when using the highest enabled version, 0 otherwise.2031*/2032int ssl_check_version_downgrade(SSL_CONNECTION *s)2033{2034const version_info *vent;2035const version_info *table;2036SSL *ssl = SSL_CONNECTION_GET_SSL(s);20372038/*2039* Check that the current protocol is the highest enabled version2040* (according to ssl->defltmethod, as version negotiation may have changed2041* s->method).2042*/2043if (s->version == ssl->defltmeth->version)2044return 1;20452046/*2047* Apparently we're using a version-flexible SSL_METHOD (not at its2048* highest protocol version).2049*/2050if (ssl->defltmeth->version == TLS_method()->version)2051table = tls_version_table;2052else if (ssl->defltmeth->version == DTLS_method()->version)2053table = dtls_version_table;2054else {2055/* Unexpected state; fail closed. */2056return 0;2057}20582059for (vent = table; vent->version != 0; ++vent) {2060if (vent->smeth != NULL && ssl_method_error(s, vent->smeth()) == 0)2061return s->version == vent->version;2062}2063return 0;2064}20652066/*2067* ssl_set_version_bound - set an upper or lower bound on the supported (D)TLS2068* protocols, provided the initial (D)TLS method is version-flexible. This2069* function sanity-checks the proposed value and makes sure the method is2070* version-flexible, then sets the limit if all is well.2071*2072* @method_version: The version of the current SSL_METHOD.2073* @version: the intended limit.2074* @bound: pointer to limit to be updated.2075*2076* Returns 1 on success, 0 on failure.2077*/2078int ssl_set_version_bound(int method_version, int version, int *bound)2079{2080int valid_tls;2081int valid_dtls;20822083if (version == 0) {2084*bound = version;2085return 1;2086}20872088valid_tls = version >= SSL3_VERSION && version <= TLS_MAX_VERSION_INTERNAL;2089valid_dtls =2090/* We support client side pre-standardisation version of DTLS */2091(version == DTLS1_BAD_VER)2092|| (DTLS_VERSION_LE(version, DTLS_MAX_VERSION_INTERNAL)2093&& DTLS_VERSION_GE(version, DTLS1_VERSION));20942095if (!valid_tls && !valid_dtls)2096return 0;20972098/*-2099* Restrict TLS methods to TLS protocol versions.2100* Restrict DTLS methods to DTLS protocol versions.2101* Note, DTLS version numbers are decreasing, use comparison macros.2102*2103* Note that for both lower-bounds we use explicit versions, not2104* (D)TLS_MIN_VERSION. This is because we don't want to break user2105* configurations. If the MIN (supported) version ever rises, the user's2106* "floor" remains valid even if no longer available. We don't expect the2107* MAX ceiling to ever get lower, so making that variable makes sense.2108*2109* We ignore attempts to set bounds on version-inflexible methods,2110* returning success.2111*/2112switch (method_version) {2113default:2114break;21152116case TLS_ANY_VERSION:2117if (valid_tls)2118*bound = version;2119break;21202121case DTLS_ANY_VERSION:2122if (valid_dtls)2123*bound = version;2124break;2125}2126return 1;2127}21282129static void check_for_downgrade(SSL_CONNECTION *s, int vers, DOWNGRADE *dgrd)2130{2131if (vers == TLS1_2_VERSION2132&& ssl_version_supported(s, TLS1_3_VERSION, NULL)) {2133*dgrd = DOWNGRADE_TO_1_2;2134} else if (!SSL_CONNECTION_IS_DTLS(s)2135&& vers < TLS1_2_VERSION2136/*2137* We need to ensure that a server that disables TLSv1.22138* (creating a hole between TLSv1.3 and TLSv1.1) can still2139* complete handshakes with clients that support TLSv1.2 and2140* below. Therefore we do not enable the sentinel if TLSv1.3 is2141* enabled and TLSv1.2 is not.2142*/2143&& ssl_version_supported(s, TLS1_2_VERSION, NULL)) {2144*dgrd = DOWNGRADE_TO_1_1;2145} else {2146*dgrd = DOWNGRADE_NONE;2147}2148}21492150/*2151* ssl_choose_server_version - Choose server (D)TLS version. Called when the2152* client HELLO is received to select the final server protocol version and2153* the version specific method.2154*2155* @s: server SSL handle.2156*2157* Returns 0 on success or an SSL error reason number on failure.2158*/2159int ssl_choose_server_version(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello,2160DOWNGRADE *dgrd)2161{2162/*-2163* With version-flexible methods we have an initial state with:2164*2165* s->method->version == (D)TLS_ANY_VERSION,2166* s->version == (D)TLS_MAX_VERSION_INTERNAL.2167*2168* So we detect version-flexible methods via the method version, not the2169* handle version.2170*/2171SSL *ssl = SSL_CONNECTION_GET_SSL(s);2172int server_version = ssl->method->version;2173int client_version = hello->legacy_version;2174const version_info *vent;2175const version_info *table;2176int disabled = 0;2177RAW_EXTENSION *suppversions;21782179s->client_version = client_version;21802181switch (server_version) {2182default:2183if (!SSL_CONNECTION_IS_TLS13(s)) {2184if (ssl_version_cmp(s, client_version, s->version) < 0)2185return SSL_R_WRONG_SSL_VERSION;2186*dgrd = DOWNGRADE_NONE;2187/*2188* If this SSL handle is not from a version flexible method we don't2189* (and never did) check min/max FIPS or Suite B constraints. Hope2190* that's OK. It is up to the caller to not choose fixed protocol2191* versions they don't want. If not, then easy to fix, just return2192* ssl_method_error(s, s->method)2193*/2194return 0;2195}2196/*2197* Fall through if we are TLSv1.3 already (this means we must be after2198* a HelloRetryRequest2199*/2200/* fall thru */2201case TLS_ANY_VERSION:2202table = tls_version_table;2203break;2204case DTLS_ANY_VERSION:2205table = dtls_version_table;2206break;2207}22082209suppversions = &hello->pre_proc_exts[TLSEXT_IDX_supported_versions];22102211/* If we did an HRR then supported versions is mandatory */2212if (!suppversions->present && s->hello_retry_request != SSL_HRR_NONE)2213return SSL_R_UNSUPPORTED_PROTOCOL;22142215if (suppversions->present && !SSL_CONNECTION_IS_DTLS(s)) {2216unsigned int candidate_vers = 0;2217unsigned int best_vers = 0;2218const SSL_METHOD *best_method = NULL;2219PACKET versionslist;22202221suppversions->parsed = 1;22222223if (!PACKET_as_length_prefixed_1(&suppversions->data, &versionslist)) {2224/* Trailing or invalid data? */2225return SSL_R_LENGTH_MISMATCH;2226}22272228/*2229* The TLSv1.3 spec says the client MUST set this to TLS1_2_VERSION.2230* The spec only requires servers to check that it isn't SSLv3:2231* "Any endpoint receiving a Hello message with2232* ClientHello.legacy_version or ServerHello.legacy_version set to2233* 0x0300 MUST abort the handshake with a "protocol_version" alert."2234* We are slightly stricter and require that it isn't SSLv3 or lower.2235* We tolerate TLSv1 and TLSv1.1.2236*/2237if (client_version <= SSL3_VERSION)2238return SSL_R_BAD_LEGACY_VERSION;22392240while (PACKET_get_net_2(&versionslist, &candidate_vers)) {2241if (ssl_version_cmp(s, candidate_vers, best_vers) <= 0)2242continue;2243if (ssl_version_supported(s, candidate_vers, &best_method))2244best_vers = candidate_vers;2245}2246if (PACKET_remaining(&versionslist) != 0) {2247/* Trailing data? */2248return SSL_R_LENGTH_MISMATCH;2249}22502251if (best_vers > 0) {2252if (s->hello_retry_request != SSL_HRR_NONE) {2253/*2254* This is after a HelloRetryRequest so we better check that we2255* negotiated TLSv1.32256*/2257if (best_vers != TLS1_3_VERSION)2258return SSL_R_UNSUPPORTED_PROTOCOL;2259return 0;2260}2261check_for_downgrade(s, best_vers, dgrd);2262s->version = best_vers;2263ssl->method = best_method;2264if (!ssl_set_record_protocol_version(s, best_vers))2265return ERR_R_INTERNAL_ERROR;22662267return 0;2268}2269return SSL_R_UNSUPPORTED_PROTOCOL;2270}22712272/*2273* If the supported versions extension isn't present, then the highest2274* version we can negotiate is TLSv1.22275*/2276if (ssl_version_cmp(s, client_version, TLS1_3_VERSION) >= 0)2277client_version = TLS1_2_VERSION;22782279/*2280* No supported versions extension, so we just use the version supplied in2281* the ClientHello.2282*/2283for (vent = table; vent->version != 0; ++vent) {2284const SSL_METHOD *method;22852286if (vent->smeth == NULL || ssl_version_cmp(s, client_version, vent->version) < 0)2287continue;2288method = vent->smeth();2289if (ssl_method_error(s, method) == 0) {2290check_for_downgrade(s, vent->version, dgrd);2291s->version = vent->version;2292ssl->method = method;2293if (!ssl_set_record_protocol_version(s, s->version))2294return ERR_R_INTERNAL_ERROR;22952296return 0;2297}2298disabled = 1;2299}2300return disabled ? SSL_R_UNSUPPORTED_PROTOCOL : SSL_R_VERSION_TOO_LOW;2301}23022303/*2304* ssl_choose_client_version - Choose client (D)TLS version. Called when the2305* server HELLO is received to select the final client protocol version and2306* the version specific method.2307*2308* @s: client SSL handle.2309* @version: The proposed version from the server's HELLO.2310* @extensions: The extensions received2311*2312* Returns 1 on success or 0 on error.2313*/2314int ssl_choose_client_version(SSL_CONNECTION *s, int version,2315RAW_EXTENSION *extensions)2316{2317const version_info *vent;2318const version_info *table;2319int ret, ver_min, ver_max, real_max, origv;2320SSL *ssl = SSL_CONNECTION_GET_SSL(s);23212322origv = s->version;2323s->version = version;23242325/* This will overwrite s->version if the extension is present */2326if (!tls_parse_extension(s, TLSEXT_IDX_supported_versions,2327SSL_EXT_TLS1_2_SERVER_HELLO2328| SSL_EXT_TLS1_3_SERVER_HELLO,2329extensions,2330NULL, 0)) {2331s->version = origv;2332return 0;2333}23342335if (s->hello_retry_request != SSL_HRR_NONE2336&& s->version != TLS1_3_VERSION) {2337s->version = origv;2338SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_SSL_VERSION);2339return 0;2340}23412342switch (ssl->method->version) {2343default:2344if (s->version != ssl->method->version) {2345s->version = origv;2346SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_WRONG_SSL_VERSION);2347return 0;2348}2349/*2350* If this SSL handle is not from a version flexible method we don't2351* (and never did) check min/max, FIPS or Suite B constraints. Hope2352* that's OK. It is up to the caller to not choose fixed protocol2353* versions they don't want. If not, then easy to fix, just return2354* ssl_method_error(s, s->method)2355*/2356if (!ssl_set_record_protocol_version(s, s->version)) {2357SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2358return 0;2359}2360return 1;2361case TLS_ANY_VERSION:2362table = tls_version_table;2363break;2364case DTLS_ANY_VERSION:2365table = dtls_version_table;2366break;2367}23682369ret = ssl_get_min_max_version(s, &ver_min, &ver_max, &real_max);2370if (ret != 0) {2371s->version = origv;2372SSLfatal(s, SSL_AD_PROTOCOL_VERSION, ret);2373return 0;2374}2375if (ssl_version_cmp(s, s->version, ver_min) < 02376|| ssl_version_cmp(s, s->version, ver_max) > 0) {2377s->version = origv;2378SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_UNSUPPORTED_PROTOCOL);2379return 0;2380}23812382if ((s->mode & SSL_MODE_SEND_FALLBACK_SCSV) == 0)2383real_max = ver_max;23842385/* Check for downgrades */2386/* TODO(DTLSv1.3): Update this code for DTLSv1.3 */2387if (!SSL_CONNECTION_IS_DTLS(s) && real_max > s->version) {2388/* Signal applies to all versions */2389if (memcmp(tls11downgrade,2390s->s3.server_random + SSL3_RANDOM_SIZE2391- sizeof(tls11downgrade),2392sizeof(tls11downgrade))2393== 0) {2394s->version = origv;2395SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,2396SSL_R_INAPPROPRIATE_FALLBACK);2397return 0;2398}2399/* Only when accepting TLS1.3 */2400if (real_max == TLS1_3_VERSION2401&& memcmp(tls12downgrade,2402s->s3.server_random + SSL3_RANDOM_SIZE2403- sizeof(tls12downgrade),2404sizeof(tls12downgrade))2405== 0) {2406s->version = origv;2407SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,2408SSL_R_INAPPROPRIATE_FALLBACK);2409return 0;2410}2411}24122413for (vent = table; vent->version != 0; ++vent) {2414if (vent->cmeth == NULL || s->version != vent->version)2415continue;24162417ssl->method = vent->cmeth();2418if (!ssl_set_record_protocol_version(s, s->version)) {2419SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2420return 0;2421}2422return 1;2423}24242425s->version = origv;2426SSLfatal(s, SSL_AD_PROTOCOL_VERSION, SSL_R_UNSUPPORTED_PROTOCOL);2427return 0;2428}24292430/*2431* ssl_get_min_max_version - get minimum and maximum protocol version2432* @s: The SSL connection2433* @min_version: The minimum supported version2434* @max_version: The maximum supported version2435* @real_max: The highest version below the lowest compile time version hole2436* where that hole lies above at least one run-time enabled2437* protocol.2438*2439* Work out what version we should be using for the initial ClientHello if the2440* version is initially (D)TLS_ANY_VERSION. We apply any explicit SSL_OP_NO_xxx2441* options, the MinProtocol and MaxProtocol configuration commands, any Suite B2442* constraints and any floor imposed by the security level here,2443* so we don't advertise the wrong protocol version to only reject the outcome later.2444*2445* Computing the right floor matters. If, e.g., TLS 1.0 and 1.2 are enabled,2446* TLS 1.1 is disabled, but the security level, Suite-B and/or MinProtocol2447* only allow TLS 1.2, we want to advertise TLS1.2, *not* TLS1.2448*2449* Returns 0 on success or an SSL error reason number on failure. On failure2450* min_version and max_version will also be set to 0.2451*/2452int ssl_get_min_max_version(const SSL_CONNECTION *s, int *min_version,2453int *max_version, int *real_max)2454{2455int version, tmp_real_max;2456int hole;2457const SSL_METHOD *method;2458const version_info *table;2459const version_info *vent;2460const SSL *ssl = SSL_CONNECTION_GET_SSL(s);24612462switch (ssl->method->version) {2463default:2464/*2465* If this SSL handle is not from a version flexible method we don't2466* (and never did) check min/max FIPS or Suite B constraints. Hope2467* that's OK. It is up to the caller to not choose fixed protocol2468* versions they don't want. If not, then easy to fix, just return2469* ssl_method_error(s, s->method)2470*/2471*min_version = *max_version = s->version;2472/*2473* Providing a real_max only makes sense where we're using a version2474* flexible method.2475*/2476if (!ossl_assert(real_max == NULL))2477return ERR_R_INTERNAL_ERROR;2478return 0;2479case TLS_ANY_VERSION:2480table = tls_version_table;2481break;2482case DTLS_ANY_VERSION:2483table = dtls_version_table;2484break;2485}24862487/*2488* SSL_OP_NO_X disables all protocols above X *if* there are some protocols2489* below X enabled. This is required in order to maintain the "version2490* capability" vector contiguous. Any versions with a NULL client method2491* (protocol version client is disabled at compile-time) is also a "hole".2492*2493* Our initial state is hole == 1, version == 0. That is, versions above2494* the first version in the method table are disabled (a "hole" above2495* the valid protocol entries) and we don't have a selected version yet.2496*2497* Whenever "hole == 1", and we hit an enabled method, its version becomes2498* the selected version. We're no longer in a hole, so "hole" becomes 0.2499*2500* If "hole == 0" and we hit an enabled method, we support a contiguous2501* range of at least two methods. If we hit a disabled method,2502* then hole becomes true again, but nothing else changes yet,2503* because all the remaining methods may be disabled too.2504* If we again hit an enabled method after the new hole, it becomes2505* selected, as we start from scratch.2506*/2507*min_version = version = 0;2508hole = 1;2509if (real_max != NULL)2510*real_max = 0;2511tmp_real_max = 0;2512for (vent = table; vent->version != 0; ++vent) {2513/*2514* A table entry with a NULL client method is still a hole in the2515* "version capability" vector.2516*/2517if (vent->cmeth == NULL) {2518hole = 1;2519tmp_real_max = 0;2520continue;2521}2522method = vent->cmeth();25232524if (hole == 1 && tmp_real_max == 0)2525tmp_real_max = vent->version;25262527if (ssl_method_error(s, method) != 0) {2528hole = 1;2529} else if (!hole) {2530*min_version = method->version;2531} else {2532if (real_max != NULL && tmp_real_max != 0)2533*real_max = tmp_real_max;2534version = method->version;2535*min_version = version;2536hole = 0;2537}2538}25392540*max_version = version;25412542/* Fail if everything is disabled */2543if (version == 0)2544return SSL_R_NO_PROTOCOLS_AVAILABLE;25452546return 0;2547}25482549/*2550* ssl_set_client_hello_version - Work out what version we should be using for2551* the initial ClientHello.legacy_version field.2552*2553* @s: client SSL handle.2554*2555* Returns 0 on success or an SSL error reason number on failure.2556*/2557int ssl_set_client_hello_version(SSL_CONNECTION *s)2558{2559int ver_min, ver_max, ret;25602561/*2562* In a renegotiation we always send the same client_version that we sent2563* last time, regardless of which version we eventually negotiated.2564*/2565if (!SSL_IS_FIRST_HANDSHAKE(s))2566return 0;25672568ret = ssl_get_min_max_version(s, &ver_min, &ver_max, NULL);25692570if (ret != 0)2571return ret;25722573s->version = ver_max;25742575if (SSL_CONNECTION_IS_DTLS(s)) {2576if (ver_max == DTLS1_BAD_VER) {2577/*2578* Even though this is technically before version negotiation,2579* because we have asked for DTLS1_BAD_VER we will never negotiate2580* anything else, and this has impacts on the record layer for when2581* we read the ServerHello. So we need to tell the record layer2582* about this immediately.2583*/2584if (!ssl_set_record_protocol_version(s, ver_max))2585return 0;2586}2587} else if (ver_max > TLS1_2_VERSION) {2588/* TLS1.3 always uses TLS1.2 in the legacy_version field */2589ver_max = TLS1_2_VERSION;2590}25912592s->client_version = ver_max;2593return 0;2594}25952596/*2597* Checks a list of |groups| to determine if the |group_id| is in it. If it is2598* and |checkallow| is 1 then additionally check if the group is allowed to be2599* used. Returns 1 if the group is in the list (and allowed if |checkallow| is2600* 1) or 0 otherwise. If provided a pointer it will also return the position2601* where the group was found.2602*/2603int check_in_list(SSL_CONNECTION *s, uint16_t group_id, const uint16_t *groups,2604size_t num_groups, int checkallow, size_t *pos)2605{2606size_t i;26072608if (groups == NULL || num_groups == 0)2609return 0;26102611for (i = 0; i < num_groups; i++) {2612uint16_t group = groups[i];26132614if (group_id == group2615&& (!checkallow2616|| tls_group_allowed(s, group, SSL_SECOP_CURVE_CHECK))) {2617if (pos != NULL)2618*pos = i;2619return 1;2620}2621}26222623return 0;2624}26252626/* Replace ClientHello1 in the transcript hash with a synthetic message */2627int create_synthetic_message_hash(SSL_CONNECTION *s,2628const unsigned char *hashval,2629size_t hashlen, const unsigned char *hrr,2630size_t hrrlen)2631{2632unsigned char hashvaltmp[EVP_MAX_MD_SIZE];2633unsigned char msghdr[SSL3_HM_HEADER_LENGTH];26342635memset(msghdr, 0, sizeof(msghdr));26362637if (hashval == NULL) {2638hashval = hashvaltmp;2639hashlen = 0;2640/* Get the hash of the initial ClientHello */2641if (!ssl3_digest_cached_records(s, 0)2642|| !ssl_handshake_hash(s, hashvaltmp, sizeof(hashvaltmp),2643&hashlen)) {2644/* SSLfatal() already called */2645return 0;2646}2647}26482649/* Reinitialise the transcript hash */2650if (!ssl3_init_finished_mac(s)) {2651/* SSLfatal() already called */2652return 0;2653}26542655/* Inject the synthetic message_hash message */2656msghdr[0] = SSL3_MT_MESSAGE_HASH;2657msghdr[SSL3_HM_HEADER_LENGTH - 1] = (unsigned char)hashlen;2658if (!ssl3_finish_mac(s, msghdr, SSL3_HM_HEADER_LENGTH)2659|| !ssl3_finish_mac(s, hashval, hashlen)) {2660/* SSLfatal() already called */2661return 0;2662}26632664/*2665* Now re-inject the HRR and current message if appropriate (we just deleted2666* it when we reinitialised the transcript hash above). Only necessary after2667* receiving a ClientHello2 with a cookie.2668*/2669if (hrr != NULL2670&& (!ssl3_finish_mac(s, hrr, hrrlen)2671|| !ssl3_finish_mac(s, (unsigned char *)s->init_buf->data,2672s->s3.tmp.message_size2673+ SSL3_HM_HEADER_LENGTH))) {2674/* SSLfatal() already called */2675return 0;2676}26772678return 1;2679}26802681static int ca_dn_cmp(const X509_NAME *const *a, const X509_NAME *const *b)2682{2683return X509_NAME_cmp(*a, *b);2684}26852686int parse_ca_names(SSL_CONNECTION *s, PACKET *pkt)2687{2688STACK_OF(X509_NAME) *ca_sk = sk_X509_NAME_new(ca_dn_cmp);2689X509_NAME *xn = NULL;2690PACKET cadns;26912692if (ca_sk == NULL) {2693SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);2694goto err;2695}2696/* get the CA RDNs */2697if (!PACKET_get_length_prefixed_2(pkt, &cadns)) {2698SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);2699goto err;2700}27012702while (PACKET_remaining(&cadns)) {2703const unsigned char *namestart, *namebytes;2704unsigned int name_len;27052706if (!PACKET_get_net_2(&cadns, &name_len)2707|| !PACKET_get_bytes(&cadns, &namebytes, name_len)) {2708SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);2709goto err;2710}27112712namestart = namebytes;2713if ((xn = d2i_X509_NAME(NULL, &namebytes, name_len)) == NULL) {2714SSLfatal(s, SSL_AD_DECODE_ERROR, ERR_R_ASN1_LIB);2715goto err;2716}2717if (namebytes != (namestart + name_len)) {2718SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_CA_DN_LENGTH_MISMATCH);2719goto err;2720}27212722if (!sk_X509_NAME_push(ca_sk, xn)) {2723SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);2724goto err;2725}2726xn = NULL;2727}27282729sk_X509_NAME_pop_free(s->s3.tmp.peer_ca_names, X509_NAME_free);2730s->s3.tmp.peer_ca_names = ca_sk;27312732return 1;27332734err:2735sk_X509_NAME_pop_free(ca_sk, X509_NAME_free);2736X509_NAME_free(xn);2737return 0;2738}27392740const STACK_OF(X509_NAME) *get_ca_names(SSL_CONNECTION *s)2741{2742const STACK_OF(X509_NAME) *ca_sk = NULL;2743SSL *ssl = SSL_CONNECTION_GET_SSL(s);27442745if (s->server) {2746ca_sk = SSL_get_client_CA_list(ssl);2747if (ca_sk != NULL && sk_X509_NAME_num(ca_sk) == 0)2748ca_sk = NULL;2749}27502751if (ca_sk == NULL)2752ca_sk = SSL_get0_CA_list(ssl);27532754return ca_sk;2755}27562757int construct_ca_names(SSL_CONNECTION *s, const STACK_OF(X509_NAME) *ca_sk,2758WPACKET *pkt)2759{2760/* Start sub-packet for client CA list */2761if (!WPACKET_start_sub_packet_u16(pkt)) {2762SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2763return 0;2764}27652766if ((ca_sk != NULL) && !(s->options & SSL_OP_DISABLE_TLSEXT_CA_NAMES)) {2767int i;27682769for (i = 0; i < sk_X509_NAME_num(ca_sk); i++) {2770unsigned char *namebytes;2771X509_NAME *name = sk_X509_NAME_value(ca_sk, i);2772int namelen;27732774if (name == NULL2775|| (namelen = i2d_X509_NAME(name, NULL)) < 02776|| !WPACKET_sub_allocate_bytes_u16(pkt, namelen,2777&namebytes)2778|| i2d_X509_NAME(name, &namebytes) != namelen) {2779SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2780return 0;2781}2782}2783}27842785if (!WPACKET_close(pkt)) {2786SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2787return 0;2788}27892790return 1;2791}27922793/* Create a buffer containing data to be signed for server key exchange */2794size_t construct_key_exchange_tbs(SSL_CONNECTION *s, unsigned char **ptbs,2795const void *param, size_t paramlen)2796{2797size_t tbslen = 2 * SSL3_RANDOM_SIZE + paramlen;2798unsigned char *tbs = OPENSSL_malloc(tbslen);27992800if (tbs == NULL) {2801SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);2802return 0;2803}2804memcpy(tbs, s->s3.client_random, SSL3_RANDOM_SIZE);2805memcpy(tbs + SSL3_RANDOM_SIZE, s->s3.server_random, SSL3_RANDOM_SIZE);28062807memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen);28082809*ptbs = tbs;2810return tbslen;2811}28122813/*2814* Saves the current handshake digest for Post-Handshake Auth,2815* Done after ClientFinished is processed, done exactly once2816*/2817int tls13_save_handshake_digest_for_pha(SSL_CONNECTION *s)2818{2819if (s->pha_dgst == NULL) {2820if (!ssl3_digest_cached_records(s, 1))2821/* SSLfatal() already called */2822return 0;28232824s->pha_dgst = EVP_MD_CTX_new();2825if (s->pha_dgst == NULL) {2826SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2827return 0;2828}2829if (!EVP_MD_CTX_copy_ex(s->pha_dgst,2830s->s3.handshake_dgst)) {2831SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2832EVP_MD_CTX_free(s->pha_dgst);2833s->pha_dgst = NULL;2834return 0;2835}2836}2837return 1;2838}28392840/*2841* Restores the Post-Handshake Auth handshake digest2842* Done just before sending/processing the Cert Request2843*/2844int tls13_restore_handshake_digest_for_pha(SSL_CONNECTION *s)2845{2846if (s->pha_dgst == NULL) {2847SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2848return 0;2849}2850if (!EVP_MD_CTX_copy_ex(s->s3.handshake_dgst,2851s->pha_dgst)) {2852SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2853return 0;2854}2855return 1;2856}28572858#ifndef OPENSSL_NO_COMP_ALG2859MSG_PROCESS_RETURN tls13_process_compressed_certificate(SSL_CONNECTION *sc,2860PACKET *pkt,2861PACKET *tmppkt,2862BUF_MEM *buf)2863{2864MSG_PROCESS_RETURN ret = MSG_PROCESS_ERROR;2865int comp_alg;2866COMP_METHOD *method = NULL;2867COMP_CTX *comp = NULL;2868size_t expected_length;2869size_t comp_length;2870int i;2871int found = 0;28722873if (buf == NULL) {2874SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);2875goto err;2876}2877if (!PACKET_get_net_2(pkt, (unsigned int *)&comp_alg)) {2878SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, ERR_R_INTERNAL_ERROR);2879goto err;2880}2881/* If we have a prefs list, make sure the algorithm is in it */2882if (sc->cert_comp_prefs[0] != TLSEXT_comp_cert_none) {2883for (i = 0; sc->cert_comp_prefs[i] != TLSEXT_comp_cert_none; i++) {2884if (sc->cert_comp_prefs[i] == comp_alg) {2885found = 1;2886break;2887}2888}2889if (!found) {2890SSLfatal(sc, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_COMPRESSION_ALGORITHM);2891goto err;2892}2893}2894if (!ossl_comp_has_alg(comp_alg)) {2895SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_COMPRESSION_ALGORITHM);2896goto err;2897}2898switch (comp_alg) {2899case TLSEXT_comp_cert_zlib:2900method = COMP_zlib_oneshot();2901break;2902case TLSEXT_comp_cert_brotli:2903method = COMP_brotli_oneshot();2904break;2905case TLSEXT_comp_cert_zstd:2906method = COMP_zstd_oneshot();2907break;2908default:2909SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_COMPRESSION_ALGORITHM);2910goto err;2911}29122913if ((comp = COMP_CTX_new(method)) == NULL2914|| !PACKET_get_net_3_len(pkt, &expected_length)2915|| !PACKET_get_net_3_len(pkt, &comp_length)) {2916SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_DECOMPRESSION);2917goto err;2918}29192920/* Prevent excessive pre-decompression allocation */2921if (expected_length > sc->max_cert_list) {2922SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_EXCESSIVE_MESSAGE_SIZE);2923goto err;2924}29252926if (PACKET_remaining(pkt) != comp_length || comp_length == 0) {2927SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_DECOMPRESSION);2928goto err;2929}29302931if (!BUF_MEM_grow(buf, expected_length)2932|| !PACKET_buf_init(tmppkt, (unsigned char *)buf->data, expected_length)2933|| COMP_expand_block(comp, (unsigned char *)buf->data, expected_length,2934(unsigned char *)PACKET_data(pkt), comp_length)2935!= (int)expected_length) {2936SSLfatal(sc, SSL_AD_BAD_CERTIFICATE, SSL_R_BAD_DECOMPRESSION);2937goto err;2938}2939ret = MSG_PROCESS_CONTINUE_PROCESSING;2940err:2941COMP_CTX_free(comp);2942return ret;2943}2944#endif294529462947