1 /* $OpenBSD: ssl_clnt.c,v 1.61 2019/03/31 15:49:03 jsing Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
58 /* ====================================================================
59 * Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
61 * Redistribution and use in source and binary forms, with or without
62 * modification, are permitted provided that the following conditions
65 * 1. Redistributions of source code must retain the above copyright
66 * notice, this list of conditions and the following disclaimer.
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in
70 * the documentation and/or other materials provided with the
73 * 3. All advertising materials mentioning features or use of this
74 * software must display the following acknowledgment:
75 * "This product includes software developed by the OpenSSL Project
76 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79 * endorse or promote products derived from this software without
80 * prior written permission. For written permission, please contact
81 * openssl-core@openssl.org.
83 * 5. Products derived from this software may not be called "OpenSSL"
84 * nor may "OpenSSL" appear in their names without prior written
85 * permission of the OpenSSL Project.
87 * 6. Redistributions of any form whatsoever must retain the following
89 * "This product includes software developed by the OpenSSL Project
90 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103 * OF THE POSSIBILITY OF SUCH DAMAGE.
104 * ====================================================================
106 * This product includes cryptographic software written by Eric Young
107 * (eay@cryptsoft.com). This product includes software written by Tim
108 * Hudson (tjh@cryptsoft.com).
111 /* ====================================================================
112 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
114 * Portions of the attached software ("Contribution") are developed by
115 * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
117 * The Contribution is licensed pursuant to the OpenSSL open source
118 * license provided above.
120 * ECC cipher suite support in OpenSSL originally written by
121 * Vipul Gupta and Sumit Gupta of Sun Microsystems Laboratories.
124 /* ====================================================================
125 * Copyright 2005 Nokia. All rights reserved.
127 * The portions of the attached software ("Contribution") is developed by
128 * Nokia Corporation and is licensed pursuant to the OpenSSL open source
131 * The Contribution, originally written by Mika Kousa and Pasi Eronen of
132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
133 * support (see RFC 4279) to OpenSSL.
135 * No patent licenses or other rights except those expressly stated in
136 * the OpenSSL open source license shall be deemed granted or received
137 * expressly, by implication, estoppel, or otherwise.
139 * No assurances are provided by Nokia that the Contribution does not
140 * infringe the patent or other intellectual property rights of any third
141 * party or that the license provides you with all the necessary rights
142 * to make use of the Contribution.
144 * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
145 * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
146 * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
147 * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
155 #include "ssl_locl.h"
157 #include <openssl/bn.h>
158 #include <openssl/buffer.h>
159 #include <openssl/curve25519.h>
160 #include <openssl/dh.h>
161 #include <openssl/evp.h>
162 #include <openssl/md5.h>
163 #include <openssl/objects.h>
165 #ifndef OPENSSL_NO_ENGINE
166 #include <openssl/engine.h>
168 #ifndef OPENSSL_NO_GOST
169 #include <openssl/gost.h>
172 #include "bytestring.h"
173 #include "ssl_sigalgs.h"
174 #include "ssl_tlsext.h"
176 static int ca_dn_cmp(const X509_NAME * const *a, const X509_NAME * const *b);
181 void (*cb)(const SSL *ssl, int type, int val) = NULL;
183 int new_state, state, skip = 0;
188 if (s->internal->info_callback != NULL)
189 cb = s->internal->info_callback;
190 else if (s->ctx->internal->info_callback != NULL)
191 cb = s->ctx->internal->info_callback;
193 s->internal->in_handshake++;
194 if (!SSL_in_init(s) || SSL_in_before(s))
198 state = S3I(s)->hs.state;
200 switch (S3I(s)->hs.state) {
201 case SSL_ST_RENEGOTIATE:
202 s->internal->renegotiate = 1;
203 S3I(s)->hs.state = SSL_ST_CONNECT;
204 s->ctx->internal->stats.sess_connect_renegotiate++;
208 case SSL_ST_BEFORE|SSL_ST_CONNECT:
209 case SSL_ST_OK|SSL_ST_CONNECT:
213 cb(s, SSL_CB_HANDSHAKE_START, 1);
215 if (SSL_IS_DTLS(s)) {
216 if ((s->version & 0xff00) != (DTLS1_VERSION & 0xff00)) {
217 SSLerror(s, ERR_R_INTERNAL_ERROR);
222 if ((s->version & 0xff00) != 0x0300) {
223 SSLerror(s, ERR_R_INTERNAL_ERROR);
229 /* s->version=SSL3_VERSION; */
230 s->internal->type = SSL_ST_CONNECT;
232 if (!ssl3_setup_init_buffer(s)) {
236 if (!ssl3_setup_buffers(s)) {
240 if (!ssl_init_wbio_buffer(s, 0)) {
245 /* don't push the buffering BIO quite yet */
247 if (!tls1_transcript_init(s)) {
252 S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A;
253 s->ctx->internal->stats.sess_connect++;
254 s->internal->init_num = 0;
256 if (SSL_IS_DTLS(s)) {
257 /* mark client_random uninitialized */
258 memset(s->s3->client_random, 0,
259 sizeof(s->s3->client_random));
260 D1I(s)->send_cookie = 0;
261 s->internal->hit = 0;
265 case SSL3_ST_CW_CLNT_HELLO_A:
266 case SSL3_ST_CW_CLNT_HELLO_B:
267 s->internal->shutdown = 0;
269 if (SSL_IS_DTLS(s)) {
270 /* every DTLS ClientHello resets Finished MAC */
271 tls1_transcript_reset(s);
273 dtls1_start_timer(s);
276 ret = ssl3_send_client_hello(s);
280 if (SSL_IS_DTLS(s) && D1I(s)->send_cookie) {
281 S3I(s)->hs.state = SSL3_ST_CW_FLUSH;
282 S3I(s)->hs.next_state = SSL3_ST_CR_SRVR_HELLO_A;
284 S3I(s)->hs.state = SSL3_ST_CR_SRVR_HELLO_A;
286 s->internal->init_num = 0;
288 /* turn on buffering for the next lot of output */
289 if (s->bbio != s->wbio)
290 s->wbio = BIO_push(s->bbio, s->wbio);
294 case SSL3_ST_CR_SRVR_HELLO_A:
295 case SSL3_ST_CR_SRVR_HELLO_B:
296 ret = ssl3_get_server_hello(s);
300 if (s->internal->hit) {
301 S3I(s)->hs.state = SSL3_ST_CR_FINISHED_A;
302 if (!SSL_IS_DTLS(s)) {
303 if (s->internal->tlsext_ticket_expected) {
304 /* receive renewed session ticket */
305 S3I(s)->hs.state = SSL3_ST_CR_SESSION_TICKET_A;
308 /* No client certificate verification. */
309 tls1_transcript_free(s);
311 } else if (SSL_IS_DTLS(s)) {
312 S3I(s)->hs.state = DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A;
314 S3I(s)->hs.state = SSL3_ST_CR_CERT_A;
316 s->internal->init_num = 0;
319 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
320 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B:
321 ret = dtls1_get_hello_verify(s);
325 if (D1I(s)->send_cookie) /* start again, with a cookie */
326 S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A;
328 S3I(s)->hs.state = SSL3_ST_CR_CERT_A;
329 s->internal->init_num = 0;
332 case SSL3_ST_CR_CERT_A:
333 case SSL3_ST_CR_CERT_B:
334 ret = ssl3_check_finished(s);
338 s->internal->hit = 1;
339 if (s->internal->tlsext_ticket_expected)
340 S3I(s)->hs.state = SSL3_ST_CR_SESSION_TICKET_A;
342 S3I(s)->hs.state = SSL3_ST_CR_FINISHED_A;
343 s->internal->init_num = 0;
346 /* Check if it is anon DH/ECDH. */
347 if (!(S3I(s)->hs.new_cipher->algorithm_auth &
349 ret = ssl3_get_server_certificate(s);
352 if (s->internal->tlsext_status_expected)
353 S3I(s)->hs.state = SSL3_ST_CR_CERT_STATUS_A;
355 S3I(s)->hs.state = SSL3_ST_CR_KEY_EXCH_A;
358 S3I(s)->hs.state = SSL3_ST_CR_KEY_EXCH_A;
360 s->internal->init_num = 0;
363 case SSL3_ST_CR_KEY_EXCH_A:
364 case SSL3_ST_CR_KEY_EXCH_B:
365 ret = ssl3_get_server_key_exchange(s);
368 S3I(s)->hs.state = SSL3_ST_CR_CERT_REQ_A;
369 s->internal->init_num = 0;
372 * At this point we check that we have the
373 * required stuff from the server.
375 if (!ssl3_check_cert_and_algorithm(s)) {
381 case SSL3_ST_CR_CERT_REQ_A:
382 case SSL3_ST_CR_CERT_REQ_B:
383 ret = ssl3_get_certificate_request(s);
386 S3I(s)->hs.state = SSL3_ST_CR_SRVR_DONE_A;
387 s->internal->init_num = 0;
390 case SSL3_ST_CR_SRVR_DONE_A:
391 case SSL3_ST_CR_SRVR_DONE_B:
392 ret = ssl3_get_server_done(s);
397 if (S3I(s)->tmp.cert_req)
398 S3I(s)->hs.state = SSL3_ST_CW_CERT_A;
400 S3I(s)->hs.state = SSL3_ST_CW_KEY_EXCH_A;
401 s->internal->init_num = 0;
405 case SSL3_ST_CW_CERT_A:
406 case SSL3_ST_CW_CERT_B:
407 case SSL3_ST_CW_CERT_C:
408 case SSL3_ST_CW_CERT_D:
410 dtls1_start_timer(s);
411 ret = ssl3_send_client_certificate(s);
414 S3I(s)->hs.state = SSL3_ST_CW_KEY_EXCH_A;
415 s->internal->init_num = 0;
418 case SSL3_ST_CW_KEY_EXCH_A:
419 case SSL3_ST_CW_KEY_EXCH_B:
421 dtls1_start_timer(s);
422 ret = ssl3_send_client_key_exchange(s);
426 * EAY EAY EAY need to check for DH fix cert
430 * For TLS, cert_req is set to 2, so a cert chain
431 * of nothing is sent, but no verify packet is sent
434 * XXX: For now, we do not support client
435 * authentication in ECDH cipher suites with
436 * ECDH (rather than ECDSA) certificates.
437 * We need to skip the certificate verify
438 * message when client's ECDH public key is sent
439 * inside the client certificate.
441 if (S3I(s)->tmp.cert_req == 1) {
442 S3I(s)->hs.state = SSL3_ST_CW_CERT_VRFY_A;
444 S3I(s)->hs.state = SSL3_ST_CW_CHANGE_A;
445 S3I(s)->change_cipher_spec = 0;
447 if (!SSL_IS_DTLS(s)) {
448 if (s->s3->flags & TLS1_FLAGS_SKIP_CERT_VERIFY) {
449 S3I(s)->hs.state = SSL3_ST_CW_CHANGE_A;
450 S3I(s)->change_cipher_spec = 0;
454 s->internal->init_num = 0;
457 case SSL3_ST_CW_CERT_VRFY_A:
458 case SSL3_ST_CW_CERT_VRFY_B:
460 dtls1_start_timer(s);
461 ret = ssl3_send_client_verify(s);
464 S3I(s)->hs.state = SSL3_ST_CW_CHANGE_A;
465 s->internal->init_num = 0;
466 S3I(s)->change_cipher_spec = 0;
469 case SSL3_ST_CW_CHANGE_A:
470 case SSL3_ST_CW_CHANGE_B:
471 if (SSL_IS_DTLS(s) && !s->internal->hit)
472 dtls1_start_timer(s);
473 ret = ssl3_send_change_cipher_spec(s,
474 SSL3_ST_CW_CHANGE_A, SSL3_ST_CW_CHANGE_B);
478 S3I(s)->hs.state = SSL3_ST_CW_FINISHED_A;
479 s->internal->init_num = 0;
481 s->session->cipher = S3I(s)->hs.new_cipher;
482 if (!tls1_setup_key_block(s)) {
487 if (!tls1_change_cipher_state(s,
488 SSL3_CHANGE_CIPHER_CLIENT_WRITE)) {
494 dtls1_reset_seq_numbers(s, SSL3_CC_WRITE);
498 case SSL3_ST_CW_FINISHED_A:
499 case SSL3_ST_CW_FINISHED_B:
500 if (SSL_IS_DTLS(s) && !s->internal->hit)
501 dtls1_start_timer(s);
502 ret = ssl3_send_finished(s, SSL3_ST_CW_FINISHED_A,
503 SSL3_ST_CW_FINISHED_B, TLS_MD_CLIENT_FINISH_CONST,
504 TLS_MD_CLIENT_FINISH_CONST_SIZE);
508 s->s3->flags |= SSL3_FLAGS_CCS_OK;
509 S3I(s)->hs.state = SSL3_ST_CW_FLUSH;
512 if (s->internal->hit) {
513 S3I(s)->hs.next_state = SSL_ST_OK;
515 /* Allow NewSessionTicket if ticket expected */
516 if (s->internal->tlsext_ticket_expected)
517 S3I(s)->hs.next_state =
518 SSL3_ST_CR_SESSION_TICKET_A;
520 S3I(s)->hs.next_state =
521 SSL3_ST_CR_FINISHED_A;
523 s->internal->init_num = 0;
526 case SSL3_ST_CR_SESSION_TICKET_A:
527 case SSL3_ST_CR_SESSION_TICKET_B:
528 ret = ssl3_get_new_session_ticket(s);
531 S3I(s)->hs.state = SSL3_ST_CR_FINISHED_A;
532 s->internal->init_num = 0;
535 case SSL3_ST_CR_CERT_STATUS_A:
536 case SSL3_ST_CR_CERT_STATUS_B:
537 ret = ssl3_get_cert_status(s);
540 S3I(s)->hs.state = SSL3_ST_CR_KEY_EXCH_A;
541 s->internal->init_num = 0;
544 case SSL3_ST_CR_FINISHED_A:
545 case SSL3_ST_CR_FINISHED_B:
547 D1I(s)->change_cipher_spec_ok = 1;
549 s->s3->flags |= SSL3_FLAGS_CCS_OK;
550 ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A,
551 SSL3_ST_CR_FINISHED_B);
557 if (s->internal->hit)
558 S3I(s)->hs.state = SSL3_ST_CW_CHANGE_A;
560 S3I(s)->hs.state = SSL_ST_OK;
561 s->internal->init_num = 0;
564 case SSL3_ST_CW_FLUSH:
565 s->internal->rwstate = SSL_WRITING;
566 if (BIO_flush(s->wbio) <= 0) {
567 if (SSL_IS_DTLS(s)) {
568 /* If the write error was fatal, stop trying */
569 if (!BIO_should_retry(s->wbio)) {
570 s->internal->rwstate = SSL_NOTHING;
571 S3I(s)->hs.state = S3I(s)->hs.next_state;
577 s->internal->rwstate = SSL_NOTHING;
578 S3I(s)->hs.state = S3I(s)->hs.next_state;
582 /* clean a few things up */
583 tls1_cleanup_key_block(s);
585 if (S3I(s)->handshake_transcript != NULL) {
586 SSLerror(s, ERR_R_INTERNAL_ERROR);
591 if (!SSL_IS_DTLS(s)) {
592 BUF_MEM_free(s->internal->init_buf);
593 s->internal->init_buf = NULL;
596 ssl_free_wbio_buffer(s);
598 s->internal->init_num = 0;
599 s->internal->renegotiate = 0;
600 s->internal->new_session = 0;
602 ssl_update_cache(s, SSL_SESS_CACHE_CLIENT);
603 if (s->internal->hit)
604 s->ctx->internal->stats.sess_hit++;
608 s->internal->handshake_func = ssl3_connect;
609 s->ctx->internal->stats.sess_connect_good++;
612 cb(s, SSL_CB_HANDSHAKE_DONE, 1);
614 if (SSL_IS_DTLS(s)) {
615 /* done with handshaking */
616 D1I(s)->handshake_read_seq = 0;
617 D1I(s)->next_handshake_write_seq = 0;
624 SSLerror(s, SSL_R_UNKNOWN_STATE);
630 /* did we do anything */
631 if (!S3I(s)->tmp.reuse_message && !skip) {
632 if (s->internal->debug) {
633 if ((ret = BIO_flush(s->wbio)) <= 0)
637 if ((cb != NULL) && (S3I(s)->hs.state != state)) {
638 new_state = S3I(s)->hs.state;
639 S3I(s)->hs.state = state;
640 cb(s, SSL_CB_CONNECT_LOOP, 1);
641 S3I(s)->hs.state = new_state;
648 s->internal->in_handshake--;
650 cb(s, SSL_CB_CONNECT_EXIT, ret);
656 ssl3_send_client_hello(SSL *s)
658 CBB cbb, client_hello, session_id, cookie, cipher_suites;
659 CBB compression_methods;
660 uint16_t max_version;
663 memset(&cbb, 0, sizeof(cbb));
665 if (S3I(s)->hs.state == SSL3_ST_CW_CLNT_HELLO_A) {
666 SSL_SESSION *sess = s->session;
668 if (ssl_supported_version_range(s, NULL, &max_version) != 1) {
669 SSLerror(s, SSL_R_NO_PROTOCOLS_AVAILABLE);
672 s->client_version = s->version = max_version;
675 sess->ssl_version != s->version ||
676 (!sess->session_id_length && !sess->tlsext_tick) ||
677 sess->internal->not_resumable) {
678 if (!ssl_get_new_session(s, 0))
681 /* else use the pre-loaded session */
684 * If a DTLS ClientHello message is being resent after a
685 * HelloVerifyRequest, we must retain the original client
688 if (!SSL_IS_DTLS(s) || D1I(s)->send_cookie == 0)
689 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE);
691 if (!ssl3_handshake_msg_start(s, &cbb, &client_hello,
692 SSL3_MT_CLIENT_HELLO))
696 * Version indicates the negotiated version: for example from
697 * an SSLv2/v3 compatible client hello). The client_version
698 * field is the maximum version we permit and it is also
699 * used in RSA encrypted premaster secrets. Some servers can
700 * choke if we initially report a higher version then
701 * renegotiate to a lower one in the premaster secret. This
702 * didn't happen with TLS 1.0 as most servers supported it
703 * but it can with TLS 1.1 or later if the server only supports
706 * Possible scenario with previous logic:
707 * 1. Client hello indicates TLS 1.2
708 * 2. Server hello says TLS 1.0
709 * 3. RSA encrypted premaster secret uses 1.2.
710 * 4. Handhaked proceeds using TLS 1.0.
711 * 5. Server sends hello request to renegotiate.
712 * 6. Client hello indicates TLS v1.0 as we now
713 * know that is maximum server supports.
714 * 7. Server chokes on RSA encrypted premaster secret
715 * containing version 1.0.
717 * For interoperability it should be OK to always use the
718 * maximum version we support in client hello and then rely
719 * on the checking of version to ensure the servers isn't
720 * being inconsistent: for example initially negotiating with
721 * TLS 1.0 and renegotiating with TLS 1.2. We do this by using
722 * client_version in client hello and not resetting it to
723 * the negotiated version.
725 if (!CBB_add_u16(&client_hello, s->client_version))
729 if (!CBB_add_bytes(&client_hello, s->s3->client_random,
730 sizeof(s->s3->client_random)))
734 if (!CBB_add_u8_length_prefixed(&client_hello, &session_id))
736 if (!s->internal->new_session &&
737 s->session->session_id_length > 0) {
738 sl = s->session->session_id_length;
739 if (sl > sizeof(s->session->session_id)) {
740 SSLerror(s, ERR_R_INTERNAL_ERROR);
743 if (!CBB_add_bytes(&session_id,
744 s->session->session_id, sl))
749 if (SSL_IS_DTLS(s)) {
750 if (D1I(s)->cookie_len > sizeof(D1I(s)->cookie)) {
751 SSLerror(s, ERR_R_INTERNAL_ERROR);
754 if (!CBB_add_u8_length_prefixed(&client_hello, &cookie))
756 if (!CBB_add_bytes(&cookie, D1I(s)->cookie,
761 /* Ciphers supported */
762 if (!CBB_add_u16_length_prefixed(&client_hello, &cipher_suites))
764 if (!ssl_cipher_list_to_bytes(s, SSL_get_ciphers(s),
766 SSLerror(s, SSL_R_NO_CIPHERS_AVAILABLE);
770 /* Add in compression methods (null) */
771 if (!CBB_add_u8_length_prefixed(&client_hello,
772 &compression_methods))
774 if (!CBB_add_u8(&compression_methods, 0))
778 if (!tlsext_client_build(s, &client_hello, SSL_TLSEXT_MSG_CH)) {
779 SSLerror(s, ERR_R_INTERNAL_ERROR);
783 if (!ssl3_handshake_msg_finish(s, &cbb))
786 S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_B;
789 /* SSL3_ST_CW_CLNT_HELLO_B */
790 return (ssl3_handshake_write(s));
799 ssl3_get_server_hello(SSL *s)
801 CBS cbs, server_random, session_id;
802 uint16_t server_version, cipher_suite;
803 uint16_t min_version, max_version;
804 uint8_t compression_method;
805 STACK_OF(SSL_CIPHER) *sk;
806 const SSL_CIPHER *cipher;
807 const SSL_METHOD *method;
813 s->internal->first_packet = 1;
814 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_SRVR_HELLO_A,
815 SSL3_ST_CR_SRVR_HELLO_B, -1, 20000, /* ?? */ &ok);
818 s->internal->first_packet = 0;
823 CBS_init(&cbs, s->internal->init_msg, n);
825 if (SSL_IS_DTLS(s)) {
826 if (S3I(s)->tmp.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) {
827 if (D1I(s)->send_cookie == 0) {
828 S3I(s)->tmp.reuse_message = 1;
831 /* Already sent a cookie. */
832 al = SSL_AD_UNEXPECTED_MESSAGE;
833 SSLerror(s, SSL_R_BAD_MESSAGE_TYPE);
839 if (S3I(s)->tmp.message_type != SSL3_MT_SERVER_HELLO) {
840 al = SSL_AD_UNEXPECTED_MESSAGE;
841 SSLerror(s, SSL_R_BAD_MESSAGE_TYPE);
845 if (!CBS_get_u16(&cbs, &server_version))
848 if (ssl_supported_version_range(s, &min_version, &max_version) != 1) {
849 SSLerror(s, SSL_R_NO_PROTOCOLS_AVAILABLE);
853 if (server_version < min_version || server_version > max_version) {
854 SSLerror(s, SSL_R_WRONG_SSL_VERSION);
855 s->version = (s->version & 0xff00) | (server_version & 0xff);
856 al = SSL_AD_PROTOCOL_VERSION;
859 s->version = server_version;
861 if ((method = tls1_get_client_method(server_version)) == NULL)
862 method = dtls1_get_client_method(server_version);
863 if (method == NULL) {
864 SSLerror(s, ERR_R_INTERNAL_ERROR);
870 if (!CBS_get_bytes(&cbs, &server_random, SSL3_RANDOM_SIZE))
872 if (!CBS_write_bytes(&server_random, s->s3->server_random,
873 sizeof(s->s3->server_random), NULL))
877 if (!CBS_get_u8_length_prefixed(&cbs, &session_id))
880 if ((CBS_len(&session_id) > sizeof(s->session->session_id)) ||
881 (CBS_len(&session_id) > SSL3_SESSION_ID_SIZE)) {
882 al = SSL_AD_ILLEGAL_PARAMETER;
883 SSLerror(s, SSL_R_SSL3_SESSION_ID_TOO_LONG);
888 if (!CBS_get_u16(&cbs, &cipher_suite))
892 * Check if we want to resume the session based on external
895 if (s->internal->tls_session_secret_cb) {
896 SSL_CIPHER *pref_cipher = NULL;
897 s->session->master_key_length = sizeof(s->session->master_key);
898 if (s->internal->tls_session_secret_cb(s, s->session->master_key,
899 &s->session->master_key_length, NULL, &pref_cipher,
900 s->internal->tls_session_secret_cb_arg)) {
901 s->session->cipher = pref_cipher ? pref_cipher :
902 ssl3_get_cipher_by_value(cipher_suite);
903 s->s3->flags |= SSL3_FLAGS_CCS_OK;
907 if (s->session->session_id_length != 0 &&
908 CBS_mem_equal(&session_id, s->session->session_id,
909 s->session->session_id_length)) {
910 if (s->sid_ctx_length != s->session->sid_ctx_length ||
911 timingsafe_memcmp(s->session->sid_ctx,
912 s->sid_ctx, s->sid_ctx_length) != 0) {
913 /* actually a client application bug */
914 al = SSL_AD_ILLEGAL_PARAMETER;
915 SSLerror(s, SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT);
918 s->s3->flags |= SSL3_FLAGS_CCS_OK;
919 s->internal->hit = 1;
921 /* a miss or crap from the other end */
923 /* If we were trying for session-id reuse, make a new
924 * SSL_SESSION so we don't stuff up other people */
925 s->internal->hit = 0;
926 if (s->session->session_id_length > 0) {
927 if (!ssl_get_new_session(s, 0)) {
928 al = SSL_AD_INTERNAL_ERROR;
934 * XXX - improve the handling for the case where there is a
935 * zero length session identifier.
937 if (!CBS_write_bytes(&session_id, s->session->session_id,
938 sizeof(s->session->session_id), &outlen))
940 s->session->session_id_length = outlen;
942 s->session->ssl_version = s->version;
945 if ((cipher = ssl3_get_cipher_by_value(cipher_suite)) == NULL) {
946 al = SSL_AD_ILLEGAL_PARAMETER;
947 SSLerror(s, SSL_R_UNKNOWN_CIPHER_RETURNED);
951 /* TLS v1.2 only ciphersuites require v1.2 or later. */
952 if ((cipher->algorithm_ssl & SSL_TLSV1_2) &&
953 (TLS1_get_version(s) < TLS1_2_VERSION)) {
954 al = SSL_AD_ILLEGAL_PARAMETER;
955 SSLerror(s, SSL_R_WRONG_CIPHER_RETURNED);
959 sk = ssl_get_ciphers_by_id(s);
960 i = sk_SSL_CIPHER_find(sk, cipher);
962 /* we did not say we would use this cipher */
963 al = SSL_AD_ILLEGAL_PARAMETER;
964 SSLerror(s, SSL_R_WRONG_CIPHER_RETURNED);
969 * Depending on the session caching (internal/external), the cipher
970 * and/or cipher_id values may not be set. Make sure that
971 * cipher_id is set and use it for comparison.
973 if (s->session->cipher)
974 s->session->cipher_id = s->session->cipher->id;
975 if (s->internal->hit && (s->session->cipher_id != cipher->id)) {
976 al = SSL_AD_ILLEGAL_PARAMETER;
977 SSLerror(s, SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED);
980 S3I(s)->hs.new_cipher = cipher;
982 if (!tls1_transcript_hash_init(s))
986 * Don't digest cached records if no sigalgs: we may need them for
987 * client authentication.
989 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
990 if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)))
991 tls1_transcript_free(s);
993 if (!CBS_get_u8(&cbs, &compression_method))
996 if (compression_method != 0) {
997 al = SSL_AD_ILLEGAL_PARAMETER;
998 SSLerror(s, SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM);
1002 if (!tlsext_client_parse(s, &cbs, &al, SSL_TLSEXT_MSG_SH)) {
1003 SSLerror(s, SSL_R_PARSE_TLSEXT);
1008 * Determine if we need to see RI. Strictly speaking if we want to
1009 * avoid an attack we should *always* see RI even on initial server
1010 * hello because the client doesn't see any renegotiation during an
1011 * attack. However this would mean we could not connect to any server
1012 * which doesn't support RI so for the immediate future tolerate RI
1013 * absence on initial connect only.
1015 if (!S3I(s)->renegotiate_seen &&
1016 !(s->internal->options & SSL_OP_LEGACY_SERVER_CONNECT)) {
1017 al = SSL_AD_HANDSHAKE_FAILURE;
1018 SSLerror(s, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);
1022 if (ssl_check_serverhello_tlsext(s) <= 0) {
1023 SSLerror(s, SSL_R_SERVERHELLO_TLSEXT);
1030 /* wrong packet length */
1031 al = SSL_AD_DECODE_ERROR;
1032 SSLerror(s, SSL_R_BAD_PACKET_LENGTH);
1034 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1040 ssl3_get_server_certificate(SSL *s)
1042 int al, i, ok, ret = -1;
1046 const unsigned char *q;
1047 STACK_OF(X509) *sk = NULL;
1049 EVP_PKEY *pkey = NULL;
1051 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_CERT_A,
1052 SSL3_ST_CR_CERT_B, -1, s->internal->max_cert_list, &ok);
1057 if (S3I(s)->tmp.message_type == SSL3_MT_SERVER_KEY_EXCHANGE) {
1058 S3I(s)->tmp.reuse_message = 1;
1062 if (S3I(s)->tmp.message_type != SSL3_MT_CERTIFICATE) {
1063 al = SSL_AD_UNEXPECTED_MESSAGE;
1064 SSLerror(s, SSL_R_BAD_MESSAGE_TYPE);
1069 if ((sk = sk_X509_new_null()) == NULL) {
1070 SSLerror(s, ERR_R_MALLOC_FAILURE);
1077 CBS_init(&cbs, s->internal->init_msg, n);
1078 if (CBS_len(&cbs) < 3)
1081 if (!CBS_get_u24_length_prefixed(&cbs, &cert_list) ||
1082 CBS_len(&cbs) != 0) {
1083 al = SSL_AD_DECODE_ERROR;
1084 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1088 while (CBS_len(&cert_list) > 0) {
1091 if (CBS_len(&cert_list) < 3)
1093 if (!CBS_get_u24_length_prefixed(&cert_list, &cert)) {
1094 al = SSL_AD_DECODE_ERROR;
1095 SSLerror(s, SSL_R_CERT_LENGTH_MISMATCH);
1099 q = CBS_data(&cert);
1100 x = d2i_X509(NULL, &q, CBS_len(&cert));
1102 al = SSL_AD_BAD_CERTIFICATE;
1103 SSLerror(s, ERR_R_ASN1_LIB);
1106 if (q != CBS_data(&cert) + CBS_len(&cert)) {
1107 al = SSL_AD_DECODE_ERROR;
1108 SSLerror(s, SSL_R_CERT_LENGTH_MISMATCH);
1111 if (!sk_X509_push(sk, x)) {
1112 SSLerror(s, ERR_R_MALLOC_FAILURE);
1118 i = ssl_verify_cert_chain(s, sk);
1119 if ((s->verify_mode != SSL_VERIFY_NONE) && (i <= 0)) {
1120 al = ssl_verify_alarm_type(s->verify_result);
1121 SSLerror(s, SSL_R_CERTIFICATE_VERIFY_FAILED);
1125 ERR_clear_error(); /* but we keep s->verify_result */
1127 sc = ssl_sess_cert_new();
1130 ssl_sess_cert_free(SSI(s)->sess_cert);
1131 SSI(s)->sess_cert = sc;
1133 sc->cert_chain = sk;
1135 * Inconsistency alert: cert_chain does include the peer's
1136 * certificate, which we don't include in s3_srvr.c
1138 x = sk_X509_value(sk, 0);
1140 /* VRS 19990621: possible memory leak; sk=null ==> !sk_pop_free() @end*/
1142 pkey = X509_get_pubkey(x);
1144 if (pkey == NULL || EVP_PKEY_missing_parameters(pkey)) {
1147 SSLerror(s, SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS);
1151 i = ssl_cert_type(x, pkey);
1155 SSLerror(s, SSL_R_UNKNOWN_CERTIFICATE_TYPE);
1159 sc->peer_cert_type = i;
1160 CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509);
1162 * Why would the following ever happen?
1163 * We just created sc a couple of lines ago.
1165 X509_free(sc->peer_pkeys[i].x509);
1166 sc->peer_pkeys[i].x509 = x;
1167 sc->peer_key = &(sc->peer_pkeys[i]);
1169 X509_free(s->session->peer);
1170 CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509);
1171 s->session->peer = x;
1172 s->session->verify_result = s->verify_result;
1179 /* wrong packet length */
1180 al = SSL_AD_DECODE_ERROR;
1181 SSLerror(s, SSL_R_BAD_PACKET_LENGTH);
1183 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1186 EVP_PKEY_free(pkey);
1188 sk_X509_pop_free(sk, X509_free);
1194 ssl3_get_server_kex_dhe(SSL *s, EVP_PKEY **pkey, CBS *cbs)
1197 BN_CTX *bn_ctx = NULL;
1198 SESS_CERT *sc = NULL;
1203 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
1204 sc = SSI(s)->sess_cert;
1206 if ((dh = DH_new()) == NULL) {
1207 SSLerror(s, ERR_R_DH_LIB);
1211 if (!CBS_get_u16_length_prefixed(cbs, &dhp))
1213 if ((dh->p = BN_bin2bn(CBS_data(&dhp), CBS_len(&dhp), NULL)) == NULL) {
1214 SSLerror(s, ERR_R_BN_LIB);
1218 if (!CBS_get_u16_length_prefixed(cbs, &dhg))
1220 if ((dh->g = BN_bin2bn(CBS_data(&dhg), CBS_len(&dhg), NULL)) == NULL) {
1221 SSLerror(s, ERR_R_BN_LIB);
1225 if (!CBS_get_u16_length_prefixed(cbs, &dhpk))
1227 if ((dh->pub_key = BN_bin2bn(CBS_data(&dhpk), CBS_len(&dhpk),
1229 SSLerror(s, ERR_R_BN_LIB);
1234 * Check the strength of the DH key just constructed.
1235 * Discard keys weaker than 1024 bits.
1237 if (DH_size(dh) < 1024 / 8) {
1238 SSLerror(s, SSL_R_BAD_DH_P_LENGTH);
1242 if (alg_a & SSL_aRSA)
1243 *pkey = X509_get_pubkey(sc->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1245 /* XXX - Anonymous DH, so no certificate or pkey. */
1248 sc->peer_dh_tmp = dh;
1253 al = SSL_AD_DECODE_ERROR;
1254 SSLerror(s, SSL_R_BAD_PACKET_LENGTH);
1255 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1259 BN_CTX_free(bn_ctx);
1265 ssl3_get_server_kex_ecdhe_ecp(SSL *s, SESS_CERT *sc, int nid, CBS *public)
1267 const EC_GROUP *group;
1268 EC_GROUP *ngroup = NULL;
1269 EC_POINT *point = NULL;
1270 BN_CTX *bn_ctx = NULL;
1271 EC_KEY *ecdh = NULL;
1275 * Extract the server's ephemeral ECDH public key.
1278 if ((ecdh = EC_KEY_new()) == NULL) {
1279 SSLerror(s, ERR_R_MALLOC_FAILURE);
1283 if ((ngroup = EC_GROUP_new_by_curve_name(nid)) == NULL) {
1284 SSLerror(s, ERR_R_EC_LIB);
1287 if (EC_KEY_set_group(ecdh, ngroup) == 0) {
1288 SSLerror(s, ERR_R_EC_LIB);
1292 group = EC_KEY_get0_group(ecdh);
1294 if ((point = EC_POINT_new(group)) == NULL ||
1295 (bn_ctx = BN_CTX_new()) == NULL) {
1296 SSLerror(s, ERR_R_MALLOC_FAILURE);
1300 if (EC_POINT_oct2point(group, point, CBS_data(public),
1301 CBS_len(public), bn_ctx) == 0) {
1302 SSLerror(s, SSL_R_BAD_ECPOINT);
1303 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1307 EC_KEY_set_public_key(ecdh, point);
1308 sc->peer_ecdh_tmp = ecdh;
1314 BN_CTX_free(bn_ctx);
1315 EC_GROUP_free(ngroup);
1316 EC_POINT_free(point);
1323 ssl3_get_server_kex_ecdhe_ecx(SSL *s, SESS_CERT *sc, int nid, CBS *public)
1327 if (nid != NID_X25519) {
1328 SSLerror(s, ERR_R_INTERNAL_ERROR);
1332 if (CBS_len(public) != X25519_KEY_LENGTH) {
1333 SSLerror(s, SSL_R_BAD_ECPOINT);
1334 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1338 if (!CBS_stow(public, &sc->peer_x25519_tmp, &outlen)) {
1339 SSLerror(s, ERR_R_MALLOC_FAILURE);
1350 ssl3_get_server_kex_ecdhe(SSL *s, EVP_PKEY **pkey, CBS *cbs)
1360 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
1361 sc = SSI(s)->sess_cert;
1363 /* Only named curves are supported. */
1364 if (!CBS_get_u8(cbs, &curve_type) ||
1365 curve_type != NAMED_CURVE_TYPE ||
1366 !CBS_get_u16(cbs, &curve_id)) {
1367 al = SSL_AD_DECODE_ERROR;
1368 SSLerror(s, SSL_R_LENGTH_TOO_SHORT);
1373 * Check that the curve is one of our preferences - if it is not,
1374 * the server has sent us an invalid curve.
1376 if (tls1_check_curve(s, curve_id) != 1) {
1377 al = SSL_AD_DECODE_ERROR;
1378 SSLerror(s, SSL_R_WRONG_CURVE);
1382 if ((nid = tls1_ec_curve_id2nid(curve_id)) == 0) {
1383 al = SSL_AD_INTERNAL_ERROR;
1384 SSLerror(s, SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS);
1388 if (!CBS_get_u8_length_prefixed(cbs, &public))
1391 if (nid == NID_X25519) {
1392 if (ssl3_get_server_kex_ecdhe_ecx(s, sc, nid, &public) != 1)
1395 if (ssl3_get_server_kex_ecdhe_ecp(s, sc, nid, &public) != 1)
1400 * The ECC/TLS specification does not mention the use of DSA to sign
1401 * ECParameters in the server key exchange message. We do support RSA
1404 if (alg_a & SSL_aRSA)
1405 *pkey = X509_get_pubkey(sc->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1406 else if (alg_a & SSL_aECDSA)
1407 *pkey = X509_get_pubkey(sc->peer_pkeys[SSL_PKEY_ECC].x509);
1409 /* XXX - Anonymous ECDH, so no certificate or pkey. */
1415 al = SSL_AD_DECODE_ERROR;
1416 SSLerror(s, SSL_R_BAD_PACKET_LENGTH);
1419 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1426 ssl3_get_server_key_exchange(SSL *s)
1429 const EVP_MD *md = NULL;
1430 EVP_PKEY *pkey = NULL;
1432 const unsigned char *param;
1433 long n, alg_k, alg_a;
1437 EVP_MD_CTX_init(&md_ctx);
1439 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
1440 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
1443 * Use same message size as in ssl3_get_certificate_request()
1444 * as ServerKeyExchange message may be skipped.
1446 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_KEY_EXCH_A,
1447 SSL3_ST_CR_KEY_EXCH_B, -1, s->internal->max_cert_list, &ok);
1454 CBS_init(&cbs, s->internal->init_msg, n);
1456 if (S3I(s)->tmp.message_type != SSL3_MT_SERVER_KEY_EXCHANGE) {
1458 * Do not skip server key exchange if this cipher suite uses
1461 if (alg_k & (SSL_kDHE|SSL_kECDHE)) {
1462 SSLerror(s, SSL_R_UNEXPECTED_MESSAGE);
1463 al = SSL_AD_UNEXPECTED_MESSAGE;
1467 S3I(s)->tmp.reuse_message = 1;
1468 EVP_MD_CTX_cleanup(&md_ctx);
1472 if (SSI(s)->sess_cert != NULL) {
1473 DH_free(SSI(s)->sess_cert->peer_dh_tmp);
1474 SSI(s)->sess_cert->peer_dh_tmp = NULL;
1476 EC_KEY_free(SSI(s)->sess_cert->peer_ecdh_tmp);
1477 SSI(s)->sess_cert->peer_ecdh_tmp = NULL;
1479 free(SSI(s)->sess_cert->peer_x25519_tmp);
1480 SSI(s)->sess_cert->peer_x25519_tmp = NULL;
1482 SSI(s)->sess_cert = ssl_sess_cert_new();
1483 if (SSI(s)->sess_cert == NULL)
1487 param = CBS_data(&cbs);
1488 param_len = CBS_len(&cbs);
1490 if (alg_k & SSL_kDHE) {
1491 if (ssl3_get_server_kex_dhe(s, &pkey, &cbs) != 1)
1493 } else if (alg_k & SSL_kECDHE) {
1494 if (ssl3_get_server_kex_ecdhe(s, &pkey, &cbs) != 1)
1496 } else if (alg_k != 0) {
1497 al = SSL_AD_UNEXPECTED_MESSAGE;
1498 SSLerror(s, SSL_R_UNEXPECTED_MESSAGE);
1502 param_len -= CBS_len(&cbs);
1504 /* if it was signed, check the signature */
1507 const struct ssl_sigalg *sigalg;
1509 if (SSL_USE_SIGALGS(s)) {
1510 uint16_t sigalg_value;
1512 if (!CBS_get_u16(&cbs, &sigalg_value))
1514 if ((sigalg = ssl_sigalg(sigalg_value, tls12_sigalgs,
1515 tls12_sigalgs_len)) == NULL) {
1516 SSLerror(s, SSL_R_UNKNOWN_DIGEST);
1517 al = SSL_AD_DECODE_ERROR;
1520 if ((md = sigalg->md()) == NULL) {
1521 SSLerror(s, SSL_R_UNKNOWN_DIGEST);
1522 al = SSL_AD_DECODE_ERROR;
1525 if (!ssl_sigalg_pkey_ok(sigalg, pkey, 0)) {
1526 SSLerror(s, SSL_R_WRONG_SIGNATURE_TYPE);
1527 al = SSL_AD_DECODE_ERROR;
1530 } else if (pkey->type == EVP_PKEY_RSA) {
1531 sigalg = ssl_sigalg_lookup(SIGALG_RSA_PKCS1_MD5_SHA1);
1532 } else if (pkey->type == EVP_PKEY_EC) {
1533 sigalg = ssl_sigalg_lookup(SIGALG_ECDSA_SHA1);
1535 SSLerror(s, SSL_R_UNKNOWN_PKEY_TYPE);
1536 al = SSL_AD_DECODE_ERROR;
1541 if (!CBS_get_u16_length_prefixed(&cbs, &signature))
1543 if (CBS_len(&signature) > EVP_PKEY_size(pkey)) {
1544 al = SSL_AD_DECODE_ERROR;
1545 SSLerror(s, SSL_R_WRONG_SIGNATURE_LENGTH);
1549 if (!EVP_DigestVerifyInit(&md_ctx, &pctx, md, NULL, pkey))
1551 if (!EVP_DigestVerifyUpdate(&md_ctx, s->s3->client_random,
1554 if ((sigalg->flags & SIGALG_FLAG_RSA_PSS) &&
1555 (!EVP_PKEY_CTX_set_rsa_padding(pctx,
1556 RSA_PKCS1_PSS_PADDING) ||
1557 !EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, -1)))
1559 if (!EVP_DigestVerifyUpdate(&md_ctx, s->s3->server_random,
1562 if (!EVP_DigestVerifyUpdate(&md_ctx, param, param_len))
1564 if (EVP_DigestVerifyFinal(&md_ctx, CBS_data(&signature),
1565 CBS_len(&signature)) <= 0) {
1566 al = SSL_AD_DECRYPT_ERROR;
1567 SSLerror(s, SSL_R_BAD_SIGNATURE);
1571 /* aNULL does not need public keys. */
1572 if (!(alg_a & SSL_aNULL)) {
1573 SSLerror(s, ERR_R_INTERNAL_ERROR);
1578 if (CBS_len(&cbs) != 0) {
1579 al = SSL_AD_DECODE_ERROR;
1580 SSLerror(s, SSL_R_EXTRA_DATA_IN_MESSAGE);
1584 EVP_PKEY_free(pkey);
1585 EVP_MD_CTX_cleanup(&md_ctx);
1590 al = SSL_AD_DECODE_ERROR;
1591 SSLerror(s, SSL_R_BAD_PACKET_LENGTH);
1594 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1597 EVP_PKEY_free(pkey);
1598 EVP_MD_CTX_cleanup(&md_ctx);
1604 ssl3_get_certificate_request(SSL *s)
1609 CBS cert_request, ctypes, rdn_list;
1610 X509_NAME *xn = NULL;
1611 const unsigned char *q;
1612 STACK_OF(X509_NAME) *ca_sk = NULL;
1614 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_CERT_REQ_A,
1615 SSL3_ST_CR_CERT_REQ_B, -1, s->internal->max_cert_list, &ok);
1620 S3I(s)->tmp.cert_req = 0;
1622 if (S3I(s)->tmp.message_type == SSL3_MT_SERVER_DONE) {
1623 S3I(s)->tmp.reuse_message = 1;
1625 * If we get here we don't need any cached handshake records
1626 * as we wont be doing client auth.
1628 tls1_transcript_free(s);
1632 if (S3I(s)->tmp.message_type != SSL3_MT_CERTIFICATE_REQUEST) {
1633 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE);
1634 SSLerror(s, SSL_R_WRONG_MESSAGE_TYPE);
1638 /* TLS does not like anon-DH with client cert */
1639 if (S3I(s)->hs.new_cipher->algorithm_auth & SSL_aNULL) {
1640 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE);
1641 SSLerror(s, SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER);
1647 CBS_init(&cert_request, s->internal->init_msg, n);
1649 if ((ca_sk = sk_X509_NAME_new(ca_dn_cmp)) == NULL) {
1650 SSLerror(s, ERR_R_MALLOC_FAILURE);
1654 /* get the certificate types */
1655 if (!CBS_get_u8(&cert_request, &ctype_num))
1658 if (ctype_num > SSL3_CT_NUMBER)
1659 ctype_num = SSL3_CT_NUMBER;
1660 if (!CBS_get_bytes(&cert_request, &ctypes, ctype_num) ||
1661 !CBS_write_bytes(&ctypes, (uint8_t *)S3I(s)->tmp.ctype,
1662 sizeof(S3I(s)->tmp.ctype), NULL)) {
1663 SSLerror(s, SSL_R_DATA_LENGTH_TOO_LONG);
1667 if (SSL_USE_SIGALGS(s)) {
1670 if (CBS_len(&cert_request) < 2) {
1671 SSLerror(s, SSL_R_DATA_LENGTH_TOO_LONG);
1674 if (!CBS_get_u16_length_prefixed(&cert_request, &sigalgs)) {
1675 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1676 SSLerror(s, SSL_R_DATA_LENGTH_TOO_LONG);
1679 if (CBS_len(&sigalgs) % 2 != 0 || CBS_len(&sigalgs) > 64) {
1680 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1681 SSLerror(s, SSL_R_SIGNATURE_ALGORITHMS_ERROR);
1684 if (!CBS_stow(&sigalgs, &S3I(s)->hs.sigalgs,
1685 &S3I(s)->hs.sigalgs_len))
1689 /* get the CA RDNs */
1690 if (CBS_len(&cert_request) < 2) {
1691 SSLerror(s, SSL_R_DATA_LENGTH_TOO_LONG);
1695 if (!CBS_get_u16_length_prefixed(&cert_request, &rdn_list) ||
1696 CBS_len(&cert_request) != 0) {
1697 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1698 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1702 while (CBS_len(&rdn_list) > 0) {
1705 if (CBS_len(&rdn_list) < 2) {
1706 SSLerror(s, SSL_R_DATA_LENGTH_TOO_LONG);
1710 if (!CBS_get_u16_length_prefixed(&rdn_list, &rdn)) {
1711 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1712 SSLerror(s, SSL_R_CA_DN_TOO_LONG);
1717 if ((xn = d2i_X509_NAME(NULL, &q, CBS_len(&rdn))) == NULL) {
1718 ssl3_send_alert(s, SSL3_AL_FATAL,
1719 SSL_AD_DECODE_ERROR);
1720 SSLerror(s, ERR_R_ASN1_LIB);
1724 if (q != CBS_data(&rdn) + CBS_len(&rdn)) {
1725 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1726 SSLerror(s, SSL_R_CA_DN_LENGTH_MISMATCH);
1729 if (!sk_X509_NAME_push(ca_sk, xn)) {
1730 SSLerror(s, ERR_R_MALLOC_FAILURE);
1733 xn = NULL; /* avoid free in err block */
1736 /* we should setup a certificate to return.... */
1737 S3I(s)->tmp.cert_req = 1;
1738 S3I(s)->tmp.ctype_num = ctype_num;
1739 sk_X509_NAME_pop_free(S3I(s)->tmp.ca_names, X509_NAME_free);
1740 S3I(s)->tmp.ca_names = ca_sk;
1746 SSLerror(s, SSL_R_BAD_PACKET_LENGTH);
1750 sk_X509_NAME_pop_free(ca_sk, X509_NAME_free);
1755 ca_dn_cmp(const X509_NAME * const *a, const X509_NAME * const *b)
1757 return (X509_NAME_cmp(*a, *b));
1761 ssl3_get_new_session_ticket(SSL *s)
1763 int ok, al, ret = 0;
1764 uint32_t lifetime_hint;
1766 CBS cbs, session_ticket;
1768 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_SESSION_TICKET_A,
1769 SSL3_ST_CR_SESSION_TICKET_B, -1, 16384, &ok);
1773 if (S3I(s)->tmp.message_type == SSL3_MT_FINISHED) {
1774 S3I(s)->tmp.reuse_message = 1;
1777 if (S3I(s)->tmp.message_type != SSL3_MT_NEWSESSION_TICKET) {
1778 al = SSL_AD_UNEXPECTED_MESSAGE;
1779 SSLerror(s, SSL_R_BAD_MESSAGE_TYPE);
1784 al = SSL_AD_DECODE_ERROR;
1785 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1789 CBS_init(&cbs, s->internal->init_msg, n);
1790 if (!CBS_get_u32(&cbs, &lifetime_hint) ||
1791 #if UINT32_MAX > LONG_MAX
1792 lifetime_hint > LONG_MAX ||
1794 !CBS_get_u16_length_prefixed(&cbs, &session_ticket) ||
1795 CBS_len(&cbs) != 0) {
1796 al = SSL_AD_DECODE_ERROR;
1797 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1800 s->session->tlsext_tick_lifetime_hint = (long)lifetime_hint;
1802 if (!CBS_stow(&session_ticket, &s->session->tlsext_tick,
1803 &s->session->tlsext_ticklen)) {
1804 SSLerror(s, ERR_R_MALLOC_FAILURE);
1809 * There are two ways to detect a resumed ticket sesion.
1810 * One is to set an appropriate session ID and then the server
1811 * must return a match in ServerHello. This allows the normal
1812 * client session ID matching to work and we know much
1813 * earlier that the ticket has been accepted.
1815 * The other way is to set zero length session ID when the
1816 * ticket is presented and rely on the handshake to determine
1817 * session resumption.
1819 * We choose the former approach because this fits in with
1820 * assumptions elsewhere in OpenSSL. The session ID is set
1821 * to the SHA256 (or SHA1 is SHA256 is disabled) hash of the
1824 EVP_Digest(CBS_data(&session_ticket), CBS_len(&session_ticket),
1825 s->session->session_id, &s->session->session_id_length,
1826 EVP_sha256(), NULL);
1830 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1836 ssl3_get_cert_status(SSL *s)
1838 CBS cert_status, response;
1842 uint8_t status_type;
1844 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_CERT_STATUS_A,
1845 SSL3_ST_CR_CERT_STATUS_B, SSL3_MT_CERTIFICATE_STATUS,
1852 /* need at least status type + length */
1853 al = SSL_AD_DECODE_ERROR;
1854 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1858 CBS_init(&cert_status, s->internal->init_msg, n);
1859 if (!CBS_get_u8(&cert_status, &status_type) ||
1860 CBS_len(&cert_status) < 3) {
1861 /* need at least status type + length */
1862 al = SSL_AD_DECODE_ERROR;
1863 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1867 if (status_type != TLSEXT_STATUSTYPE_ocsp) {
1868 al = SSL_AD_DECODE_ERROR;
1869 SSLerror(s, SSL_R_UNSUPPORTED_STATUS_TYPE);
1873 if (!CBS_get_u24_length_prefixed(&cert_status, &response) ||
1874 CBS_len(&cert_status) != 0) {
1875 al = SSL_AD_DECODE_ERROR;
1876 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1880 if (!CBS_stow(&response, &s->internal->tlsext_ocsp_resp,
1881 &stow_len) || stow_len > INT_MAX) {
1882 s->internal->tlsext_ocsp_resplen = 0;
1883 al = SSL_AD_INTERNAL_ERROR;
1884 SSLerror(s, ERR_R_MALLOC_FAILURE);
1887 s->internal->tlsext_ocsp_resplen = (int)stow_len;
1889 if (s->ctx->internal->tlsext_status_cb) {
1891 ret = s->ctx->internal->tlsext_status_cb(s,
1892 s->ctx->internal->tlsext_status_arg);
1894 al = SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE;
1895 SSLerror(s, SSL_R_INVALID_STATUS_RESPONSE);
1899 al = SSL_AD_INTERNAL_ERROR;
1900 SSLerror(s, ERR_R_MALLOC_FAILURE);
1906 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1911 ssl3_get_server_done(SSL *s)
1916 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_SRVR_DONE_A,
1917 SSL3_ST_CR_SRVR_DONE_B, SSL3_MT_SERVER_DONE,
1918 30, /* should be very small, like 0 :-) */ &ok);
1923 /* should contain no data */
1924 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
1925 SSLerror(s, SSL_R_LENGTH_MISMATCH);
1933 ssl3_send_client_kex_rsa(SSL *s, SESS_CERT *sess_cert, CBB *cbb)
1935 unsigned char pms[SSL_MAX_MASTER_KEY_LENGTH];
1936 unsigned char *enc_pms = NULL;
1937 EVP_PKEY *pkey = NULL;
1943 * RSA-Encrypted Premaster Secret Message - RFC 5246 section 7.4.7.1.
1946 pkey = X509_get_pubkey(sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1947 if (pkey == NULL || pkey->type != EVP_PKEY_RSA ||
1948 pkey->pkey.rsa == NULL) {
1949 SSLerror(s, ERR_R_INTERNAL_ERROR);
1953 pms[0] = s->client_version >> 8;
1954 pms[1] = s->client_version & 0xff;
1955 arc4random_buf(&pms[2], sizeof(pms) - 2);
1957 if ((enc_pms = malloc(RSA_size(pkey->pkey.rsa))) == NULL) {
1958 SSLerror(s, ERR_R_MALLOC_FAILURE);
1962 enc_len = RSA_public_encrypt(sizeof(pms), pms, enc_pms, pkey->pkey.rsa,
1965 SSLerror(s, SSL_R_BAD_RSA_ENCRYPT);
1969 if (!CBB_add_u16_length_prefixed(cbb, &epms))
1971 if (!CBB_add_bytes(&epms, enc_pms, enc_len))
1973 if (!CBB_flush(cbb))
1976 s->session->master_key_length =
1977 tls1_generate_master_secret(s,
1978 s->session->master_key, pms, sizeof(pms));
1983 explicit_bzero(pms, sizeof(pms));
1984 EVP_PKEY_free(pkey);
1991 ssl3_send_client_kex_dhe(SSL *s, SESS_CERT *sess_cert, CBB *cbb)
1993 DH *dh_srvr = NULL, *dh_clnt = NULL;
1994 unsigned char *key = NULL;
1995 int key_size = 0, key_len;
1996 unsigned char *data;
2000 /* Ensure that we have an ephemeral key for DHE. */
2001 if (sess_cert->peer_dh_tmp == NULL) {
2002 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_HANDSHAKE_FAILURE);
2003 SSLerror(s, SSL_R_UNABLE_TO_FIND_DH_PARAMETERS);
2006 dh_srvr = sess_cert->peer_dh_tmp;
2008 /* Generate a new random key. */
2009 if ((dh_clnt = DHparams_dup(dh_srvr)) == NULL) {
2010 SSLerror(s, ERR_R_DH_LIB);
2013 if (!DH_generate_key(dh_clnt)) {
2014 SSLerror(s, ERR_R_DH_LIB);
2017 if ((key_size = DH_size(dh_clnt)) <= 0) {
2018 SSLerror(s, ERR_R_DH_LIB);
2021 if ((key = malloc(key_size)) == NULL) {
2022 SSLerror(s, ERR_R_MALLOC_FAILURE);
2025 if ((key_len = DH_compute_key(key, dh_srvr->pub_key, dh_clnt)) <= 0) {
2026 SSLerror(s, ERR_R_DH_LIB);
2030 /* Generate master key from the result. */
2031 s->session->master_key_length =
2032 tls1_generate_master_secret(s,
2033 s->session->master_key, key, key_len);
2035 if (!CBB_add_u16_length_prefixed(cbb, &dh_Yc))
2037 if (!CBB_add_space(&dh_Yc, &data, BN_num_bytes(dh_clnt->pub_key)))
2039 BN_bn2bin(dh_clnt->pub_key, data);
2040 if (!CBB_flush(cbb))
2047 freezero(key, key_size);
2053 ssl3_send_client_kex_ecdhe_ecp(SSL *s, SESS_CERT *sc, CBB *cbb)
2055 const EC_GROUP *group = NULL;
2056 const EC_POINT *point = NULL;
2057 EC_KEY *ecdh = NULL;
2058 BN_CTX *bn_ctx = NULL;
2059 unsigned char *key = NULL;
2060 unsigned char *data;
2062 int key_size = 0, key_len;
2066 if ((group = EC_KEY_get0_group(sc->peer_ecdh_tmp)) == NULL ||
2067 (point = EC_KEY_get0_public_key(sc->peer_ecdh_tmp)) == NULL) {
2068 SSLerror(s, ERR_R_INTERNAL_ERROR);
2072 if ((ecdh = EC_KEY_new()) == NULL) {
2073 SSLerror(s, ERR_R_MALLOC_FAILURE);
2077 if (!EC_KEY_set_group(ecdh, group)) {
2078 SSLerror(s, ERR_R_EC_LIB);
2082 /* Generate a new ECDH key pair. */
2083 if (!EC_KEY_generate_key(ecdh)) {
2084 SSLerror(s, ERR_R_ECDH_LIB);
2087 if ((key_size = ECDH_size(ecdh)) <= 0) {
2088 SSLerror(s, ERR_R_ECDH_LIB);
2091 if ((key = malloc(key_size)) == NULL) {
2092 SSLerror(s, ERR_R_MALLOC_FAILURE);
2095 key_len = ECDH_compute_key(key, key_size, point, ecdh, NULL);
2097 SSLerror(s, ERR_R_ECDH_LIB);
2101 /* Generate master key from the result. */
2102 s->session->master_key_length =
2103 tls1_generate_master_secret(s,
2104 s->session->master_key, key, key_len);
2106 encoded_len = EC_POINT_point2oct(group, EC_KEY_get0_public_key(ecdh),
2107 POINT_CONVERSION_UNCOMPRESSED, NULL, 0, NULL);
2108 if (encoded_len == 0) {
2109 SSLerror(s, ERR_R_ECDH_LIB);
2113 if ((bn_ctx = BN_CTX_new()) == NULL) {
2114 SSLerror(s, ERR_R_MALLOC_FAILURE);
2118 /* Encode the public key. */
2119 if (!CBB_add_u8_length_prefixed(cbb, &ecpoint))
2121 if (!CBB_add_space(&ecpoint, &data, encoded_len))
2123 if (EC_POINT_point2oct(group, EC_KEY_get0_public_key(ecdh),
2124 POINT_CONVERSION_UNCOMPRESSED, data, encoded_len,
2127 if (!CBB_flush(cbb))
2133 freezero(key, key_size);
2135 BN_CTX_free(bn_ctx);
2142 ssl3_send_client_kex_ecdhe_ecx(SSL *s, SESS_CERT *sc, CBB *cbb)
2144 uint8_t *public_key = NULL, *private_key = NULL, *shared_key = NULL;
2148 /* Generate X25519 key pair and derive shared key. */
2149 if ((public_key = malloc(X25519_KEY_LENGTH)) == NULL)
2151 if ((private_key = malloc(X25519_KEY_LENGTH)) == NULL)
2153 if ((shared_key = malloc(X25519_KEY_LENGTH)) == NULL)
2155 X25519_keypair(public_key, private_key);
2156 if (!X25519(shared_key, private_key, sc->peer_x25519_tmp))
2159 /* Serialize the public key. */
2160 if (!CBB_add_u8_length_prefixed(cbb, &ecpoint))
2162 if (!CBB_add_bytes(&ecpoint, public_key, X25519_KEY_LENGTH))
2164 if (!CBB_flush(cbb))
2167 /* Generate master key from the result. */
2168 s->session->master_key_length =
2169 tls1_generate_master_secret(s,
2170 s->session->master_key, shared_key, X25519_KEY_LENGTH);
2176 freezero(private_key, X25519_KEY_LENGTH);
2177 freezero(shared_key, X25519_KEY_LENGTH);
2183 ssl3_send_client_kex_ecdhe(SSL *s, SESS_CERT *sc, CBB *cbb)
2185 if (sc->peer_x25519_tmp != NULL) {
2186 if (ssl3_send_client_kex_ecdhe_ecx(s, sc, cbb) != 1)
2188 } else if (sc->peer_ecdh_tmp != NULL) {
2189 if (ssl3_send_client_kex_ecdhe_ecp(s, sc, cbb) != 1)
2192 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_HANDSHAKE_FAILURE);
2193 SSLerror(s, ERR_R_INTERNAL_ERROR);
2204 ssl3_send_client_kex_gost(SSL *s, SESS_CERT *sess_cert, CBB *cbb)
2206 unsigned char premaster_secret[32], shared_ukm[32], tmp[256];
2207 EVP_PKEY *pub_key = NULL;
2208 EVP_PKEY_CTX *pkey_ctx;
2211 unsigned int md_len;
2212 EVP_MD_CTX *ukm_hash;
2217 /* Get server sertificate PKEY and create ctx from it */
2218 peer_cert = sess_cert->peer_pkeys[SSL_PKEY_GOST01].x509;
2219 if (peer_cert == NULL) {
2220 SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER);
2224 pub_key = X509_get_pubkey(peer_cert);
2225 pkey_ctx = EVP_PKEY_CTX_new(pub_key, NULL);
2228 * If we have send a certificate, and certificate key parameters match
2229 * those of server certificate, use certificate key for key exchange.
2230 * Otherwise, generate ephemeral key pair.
2232 EVP_PKEY_encrypt_init(pkey_ctx);
2234 /* Generate session key. */
2235 arc4random_buf(premaster_secret, 32);
2238 * If we have client certificate, use its secret as peer key.
2240 if (S3I(s)->tmp.cert_req && s->cert->key->privatekey) {
2241 if (EVP_PKEY_derive_set_peer(pkey_ctx,
2242 s->cert->key->privatekey) <=0) {
2244 * If there was an error - just ignore it.
2245 * Ephemeral key would be used.
2252 * Compute shared IV and store it in algorithm-specific context data.
2254 ukm_hash = EVP_MD_CTX_new();
2255 if (ukm_hash == NULL) {
2256 SSLerror(s, ERR_R_MALLOC_FAILURE);
2260 if (ssl_get_algorithm2(s) & SSL_HANDSHAKE_MAC_GOST94)
2261 nid = NID_id_GostR3411_94;
2263 nid = NID_id_tc26_gost3411_2012_256;
2264 if (!EVP_DigestInit(ukm_hash, EVP_get_digestbynid(nid)))
2266 EVP_DigestUpdate(ukm_hash, s->s3->client_random, SSL3_RANDOM_SIZE);
2267 EVP_DigestUpdate(ukm_hash, s->s3->server_random, SSL3_RANDOM_SIZE);
2268 EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len);
2269 EVP_MD_CTX_free(ukm_hash);
2270 if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, EVP_PKEY_OP_ENCRYPT,
2271 EVP_PKEY_CTRL_SET_IV, 8, shared_ukm) < 0) {
2272 SSLerror(s, SSL_R_LIBRARY_BUG);
2277 * Make GOST keytransport blob message, encapsulate it into sequence.
2280 if (EVP_PKEY_encrypt(pkey_ctx, tmp, &msglen, premaster_secret,
2282 SSLerror(s, SSL_R_LIBRARY_BUG);
2286 if (!CBB_add_asn1(cbb, &gostblob, CBS_ASN1_SEQUENCE))
2288 if (!CBB_add_bytes(&gostblob, tmp, msglen))
2290 if (!CBB_flush(cbb))
2293 /* Check if pubkey from client certificate was used. */
2294 if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, -1, EVP_PKEY_CTRL_PEER_KEY, 2,
2296 /* Set flag "skip certificate verify". */
2297 s->s3->flags |= TLS1_FLAGS_SKIP_CERT_VERIFY;
2299 EVP_PKEY_CTX_free(pkey_ctx);
2300 s->session->master_key_length =
2301 tls1_generate_master_secret(s,
2302 s->session->master_key, premaster_secret, 32);
2307 explicit_bzero(premaster_secret, sizeof(premaster_secret));
2308 EVP_PKEY_free(pub_key);
2314 ssl3_send_client_key_exchange(SSL *s)
2316 SESS_CERT *sess_cert;
2317 unsigned long alg_k;
2320 memset(&cbb, 0, sizeof(cbb));
2322 if (S3I(s)->hs.state == SSL3_ST_CW_KEY_EXCH_A) {
2323 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
2325 if ((sess_cert = SSI(s)->sess_cert) == NULL) {
2326 ssl3_send_alert(s, SSL3_AL_FATAL,
2327 SSL_AD_UNEXPECTED_MESSAGE);
2328 SSLerror(s, ERR_R_INTERNAL_ERROR);
2332 if (!ssl3_handshake_msg_start(s, &cbb, &kex,
2333 SSL3_MT_CLIENT_KEY_EXCHANGE))
2336 if (alg_k & SSL_kRSA) {
2337 if (ssl3_send_client_kex_rsa(s, sess_cert, &kex) != 1)
2339 } else if (alg_k & SSL_kDHE) {
2340 if (ssl3_send_client_kex_dhe(s, sess_cert, &kex) != 1)
2342 } else if (alg_k & SSL_kECDHE) {
2343 if (ssl3_send_client_kex_ecdhe(s, sess_cert, &kex) != 1)
2345 } else if (alg_k & SSL_kGOST) {
2346 if (ssl3_send_client_kex_gost(s, sess_cert, &kex) != 1)
2349 ssl3_send_alert(s, SSL3_AL_FATAL,
2350 SSL_AD_HANDSHAKE_FAILURE);
2351 SSLerror(s, ERR_R_INTERNAL_ERROR);
2355 if (!ssl3_handshake_msg_finish(s, &cbb))
2358 S3I(s)->hs.state = SSL3_ST_CW_KEY_EXCH_B;
2361 /* SSL3_ST_CW_KEY_EXCH_B */
2362 return (ssl3_handshake_write(s));
2371 ssl3_send_client_verify_sigalgs(SSL *s, CBB *cert_verify)
2373 const struct ssl_sigalg *sigalg;
2375 EVP_PKEY_CTX *pctx = NULL;
2379 const unsigned char *hdata;
2380 unsigned char *signature = NULL;
2381 size_t signature_len, hdata_len;
2384 EVP_MD_CTX_init(&mctx);
2386 pkey = s->cert->key->privatekey;
2387 if ((sigalg = ssl_sigalg_select(s, pkey)) == NULL) {
2388 SSLerror(s, SSL_R_SIGNATURE_ALGORITHMS_ERROR);
2391 if ((md = sigalg->md()) == NULL) {
2392 SSLerror(s, SSL_R_UNKNOWN_DIGEST);
2396 if (!tls1_transcript_data(s, &hdata, &hdata_len)) {
2397 SSLerror(s, ERR_R_INTERNAL_ERROR);
2400 if (!EVP_DigestSignInit(&mctx, &pctx, md, NULL, pkey)) {
2401 SSLerror(s, ERR_R_EVP_LIB);
2404 if ((sigalg->flags & SIGALG_FLAG_RSA_PSS) &&
2405 (!EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) ||
2406 !EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, -1))) {
2407 SSLerror(s, ERR_R_EVP_LIB);
2410 if (!EVP_DigestSignUpdate(&mctx, hdata, hdata_len)) {
2411 SSLerror(s, ERR_R_EVP_LIB);
2414 if (!EVP_DigestSignFinal(&mctx, NULL, &signature_len) ||
2415 signature_len == 0) {
2416 SSLerror(s, ERR_R_EVP_LIB);
2419 if ((signature = calloc(1, signature_len)) == NULL) {
2420 SSLerror(s, ERR_R_MALLOC_FAILURE);
2423 if (!EVP_DigestSignFinal(&mctx, signature, &signature_len)) {
2424 SSLerror(s, ERR_R_EVP_LIB);
2428 if (!CBB_add_u16(cert_verify, sigalg->value))
2430 if (!CBB_add_u16_length_prefixed(cert_verify, &cbb_signature))
2432 if (!CBB_add_bytes(&cbb_signature, signature, signature_len))
2434 if (!CBB_flush(cert_verify))
2440 EVP_MD_CTX_cleanup(&mctx);
2446 ssl3_send_client_verify_rsa(SSL *s, CBB *cert_verify)
2450 unsigned char data[EVP_MAX_MD_SIZE];
2451 unsigned char *signature = NULL;
2452 unsigned int signature_len;
2456 pkey = s->cert->key->privatekey;
2458 if (!tls1_transcript_hash_value(s, data, sizeof(data), &data_len))
2460 if ((signature = calloc(1, EVP_PKEY_size(pkey))) == NULL)
2462 if (RSA_sign(NID_md5_sha1, data, data_len, signature,
2463 &signature_len, pkey->pkey.rsa) <= 0 ) {
2464 SSLerror(s, ERR_R_RSA_LIB);
2468 if (!CBB_add_u16_length_prefixed(cert_verify, &cbb_signature))
2470 if (!CBB_add_bytes(&cbb_signature, signature, signature_len))
2472 if (!CBB_flush(cert_verify))
2482 ssl3_send_client_verify_ec(SSL *s, CBB *cert_verify)
2486 unsigned char data[EVP_MAX_MD_SIZE];
2487 unsigned char *signature = NULL;
2488 unsigned int signature_len;
2491 pkey = s->cert->key->privatekey;
2493 if (!tls1_transcript_hash_value(s, data, sizeof(data), NULL))
2495 if ((signature = calloc(1, EVP_PKEY_size(pkey))) == NULL)
2497 if (!ECDSA_sign(pkey->save_type, &data[MD5_DIGEST_LENGTH],
2498 SHA_DIGEST_LENGTH, signature, &signature_len, pkey->pkey.ec)) {
2499 SSLerror(s, ERR_R_ECDSA_LIB);
2503 if (!CBB_add_u16_length_prefixed(cert_verify, &cbb_signature))
2505 if (!CBB_add_bytes(&cbb_signature, signature, signature_len))
2507 if (!CBB_flush(cert_verify))
2516 #ifndef OPENSSL_NO_GOST
2518 ssl3_send_client_verify_gost(SSL *s, CBB *cert_verify)
2525 const unsigned char *hdata;
2526 unsigned char *signature = NULL;
2527 size_t signature_len;
2532 EVP_MD_CTX_init(&mctx);
2534 pkey = s->cert->key->privatekey;
2536 if (!tls1_transcript_data(s, &hdata, &hdata_len)) {
2537 SSLerror(s, ERR_R_INTERNAL_ERROR);
2540 if (!EVP_PKEY_get_default_digest_nid(pkey, &nid) ||
2541 (md = EVP_get_digestbynid(nid)) == NULL) {
2542 SSLerror(s, ERR_R_EVP_LIB);
2545 if (!EVP_DigestSignInit(&mctx, &pctx, md, NULL, pkey)) {
2546 SSLerror(s, ERR_R_EVP_LIB);
2549 if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_SIGN,
2550 EVP_PKEY_CTRL_GOST_SIG_FORMAT, GOST_SIG_FORMAT_RS_LE, NULL) <= 0) {
2551 SSLerror(s, ERR_R_EVP_LIB);
2554 if (!EVP_DigestSignUpdate(&mctx, hdata, hdata_len)) {
2555 SSLerror(s, ERR_R_EVP_LIB);
2558 if (!EVP_DigestSignFinal(&mctx, NULL, &signature_len) ||
2559 signature_len == 0) {
2560 SSLerror(s, ERR_R_EVP_LIB);
2563 if ((signature = calloc(1, signature_len)) == NULL) {
2564 SSLerror(s, ERR_R_MALLOC_FAILURE);
2567 if (!EVP_DigestSignFinal(&mctx, signature, &signature_len)) {
2568 SSLerror(s, ERR_R_EVP_LIB);
2572 if (!CBB_add_u16_length_prefixed(cert_verify, &cbb_signature))
2574 if (!CBB_add_bytes(&cbb_signature, signature, signature_len))
2576 if (!CBB_flush(cert_verify))
2581 EVP_MD_CTX_cleanup(&mctx);
2588 ssl3_send_client_verify(SSL *s)
2590 CBB cbb, cert_verify;
2593 memset(&cbb, 0, sizeof(cbb));
2595 if (S3I(s)->hs.state == SSL3_ST_CW_CERT_VRFY_A) {
2596 if (!ssl3_handshake_msg_start(s, &cbb, &cert_verify,
2597 SSL3_MT_CERTIFICATE_VERIFY))
2600 pkey = s->cert->key->privatekey;
2603 * For TLS v1.2 send signature algorithm and signature
2604 * using agreed digest and cached handshake records.
2606 if (SSL_USE_SIGALGS(s)) {
2607 if (!ssl3_send_client_verify_sigalgs(s, &cert_verify))
2609 } else if (pkey->type == EVP_PKEY_RSA) {
2610 if (!ssl3_send_client_verify_rsa(s, &cert_verify))
2612 } else if (pkey->type == EVP_PKEY_EC) {
2613 if (!ssl3_send_client_verify_ec(s, &cert_verify))
2615 #ifndef OPENSSL_NO_GOST
2616 } else if (pkey->type == NID_id_GostR3410_94 ||
2617 pkey->type == NID_id_GostR3410_2001) {
2618 if (!ssl3_send_client_verify_gost(s, &cert_verify))
2622 SSLerror(s, ERR_R_INTERNAL_ERROR);
2626 tls1_transcript_free(s);
2628 if (!ssl3_handshake_msg_finish(s, &cbb))
2631 S3I(s)->hs.state = SSL3_ST_CW_CERT_VRFY_B;
2634 return (ssl3_handshake_write(s));
2643 ssl3_send_client_certificate(SSL *s)
2645 EVP_PKEY *pkey = NULL;
2647 CBB cbb, client_cert;
2650 memset(&cbb, 0, sizeof(cbb));
2652 if (S3I(s)->hs.state == SSL3_ST_CW_CERT_A) {
2653 if (s->cert->key->x509 == NULL ||
2654 s->cert->key->privatekey == NULL)
2655 S3I(s)->hs.state = SSL3_ST_CW_CERT_B;
2657 S3I(s)->hs.state = SSL3_ST_CW_CERT_C;
2660 /* We need to get a client cert */
2661 if (S3I(s)->hs.state == SSL3_ST_CW_CERT_B) {
2663 * If we get an error, we need to
2664 * ssl->rwstate=SSL_X509_LOOKUP; return(-1);
2665 * We then get retied later
2667 i = ssl_do_client_cert_cb(s, &x509, &pkey);
2669 s->internal->rwstate = SSL_X509_LOOKUP;
2672 s->internal->rwstate = SSL_NOTHING;
2673 if ((i == 1) && (pkey != NULL) && (x509 != NULL)) {
2674 S3I(s)->hs.state = SSL3_ST_CW_CERT_B;
2675 if (!SSL_use_certificate(s, x509) ||
2676 !SSL_use_PrivateKey(s, pkey))
2678 } else if (i == 1) {
2680 SSLerror(s, SSL_R_BAD_DATA_RETURNED_BY_CALLBACK);
2684 EVP_PKEY_free(pkey);
2686 S3I(s)->tmp.cert_req = 2;
2688 /* There is no client certificate to verify. */
2689 tls1_transcript_free(s);
2692 /* Ok, we have a cert */
2693 S3I(s)->hs.state = SSL3_ST_CW_CERT_C;
2696 if (S3I(s)->hs.state == SSL3_ST_CW_CERT_C) {
2697 if (!ssl3_handshake_msg_start(s, &cbb, &client_cert,
2698 SSL3_MT_CERTIFICATE))
2700 if (!ssl3_output_cert_chain(s, &client_cert,
2701 (S3I(s)->tmp.cert_req == 2) ? NULL : s->cert->key))
2703 if (!ssl3_handshake_msg_finish(s, &cbb))
2706 S3I(s)->hs.state = SSL3_ST_CW_CERT_D;
2709 /* SSL3_ST_CW_CERT_D */
2710 return (ssl3_handshake_write(s));
2718 #define has_bits(i,m) (((i)&(m)) == (m))
2721 ssl3_check_cert_and_algorithm(SSL *s)
2725 EVP_PKEY *pkey = NULL;
2729 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
2730 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
2732 /* We don't have a certificate. */
2733 if (alg_a & SSL_aNULL)
2736 sc = SSI(s)->sess_cert;
2738 SSLerror(s, ERR_R_INTERNAL_ERROR);
2741 dh = SSI(s)->sess_cert->peer_dh_tmp;
2743 /* This is the passed certificate. */
2745 idx = sc->peer_cert_type;
2746 if (idx == SSL_PKEY_ECC) {
2747 if (ssl_check_srvr_ecc_cert_and_alg(
2748 sc->peer_pkeys[idx].x509, s) == 0) {
2750 SSLerror(s, SSL_R_BAD_ECC_CERT);
2756 pkey = X509_get_pubkey(sc->peer_pkeys[idx].x509);
2757 i = X509_certificate_type(sc->peer_pkeys[idx].x509, pkey);
2758 EVP_PKEY_free(pkey);
2760 /* Check that we have a certificate if we require one. */
2761 if ((alg_a & SSL_aRSA) && !has_bits(i, EVP_PK_RSA|EVP_PKT_SIGN)) {
2762 SSLerror(s, SSL_R_MISSING_RSA_SIGNING_CERT);
2765 if ((alg_k & SSL_kRSA) && !has_bits(i, EVP_PK_RSA|EVP_PKT_ENC)) {
2766 SSLerror(s, SSL_R_MISSING_RSA_ENCRYPTING_CERT);
2769 if ((alg_k & SSL_kDHE) &&
2770 !(has_bits(i, EVP_PK_DH|EVP_PKT_EXCH) || (dh != NULL))) {
2771 SSLerror(s, SSL_R_MISSING_DH_KEY);
2777 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_HANDSHAKE_FAILURE);
2783 * Check to see if handshake is full or resumed. Usually this is just a
2784 * case of checking to see if a cache hit has occurred. In the case of
2785 * session tickets we have to check the next message to be sure.
2789 ssl3_check_finished(SSL *s)
2794 /* If we have no ticket it cannot be a resumed session. */
2795 if (!s->session->tlsext_tick)
2797 /* this function is called when we really expect a Certificate
2798 * message, so permit appropriate message length */
2799 n = s->method->internal->ssl_get_message(s, SSL3_ST_CR_CERT_A,
2800 SSL3_ST_CR_CERT_B, -1, s->internal->max_cert_list, &ok);
2803 S3I(s)->tmp.reuse_message = 1;
2804 if ((S3I(s)->tmp.message_type == SSL3_MT_FINISHED) ||
2805 (S3I(s)->tmp.message_type == SSL3_MT_NEWSESSION_TICKET))
2812 ssl_do_client_cert_cb(SSL *s, X509 **px509, EVP_PKEY **ppkey)
2816 #ifndef OPENSSL_NO_ENGINE
2817 if (s->ctx->internal->client_cert_engine) {
2818 i = ENGINE_load_ssl_client_cert(
2819 s->ctx->internal->client_cert_engine, s,
2820 SSL_get_client_CA_list(s), px509, ppkey, NULL, NULL, NULL);
2825 if (s->ctx->internal->client_cert_cb)
2826 i = s->ctx->internal->client_cert_cb(s, px509, ppkey);