No valid groups is not an error

Of course TLS-1.3 won't be usable with such configuration.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/26801)
This commit is contained in:
Tomas Mraz 2025-02-20 16:53:10 +01:00
parent a89c99e04b
commit a3143c2400
4 changed files with 47 additions and 29 deletions

View File

@ -829,32 +829,43 @@ SSL *ossl_ssl_connection_new_int(SSL_CTX *ctx, SSL *user_ssl,
goto err;
s->session_ctx = ctx;
if (ctx->ext.ecpointformats) {
if (ctx->ext.ecpointformats != NULL) {
s->ext.ecpointformats =
OPENSSL_memdup(ctx->ext.ecpointformats,
ctx->ext.ecpointformats_len);
if (!s->ext.ecpointformats) {
if (s->ext.ecpointformats == NULL) {
s->ext.ecpointformats_len = 0;
goto err;
}
s->ext.ecpointformats_len =
ctx->ext.ecpointformats_len;
}
if (ctx->ext.supportedgroups) {
if (ctx->ext.supportedgroups != NULL) {
size_t add = 0;
if (ctx->ext.supportedgroups_len == 0)
/* Add 1 so allocation won't fail */
add = 1;
s->ext.supportedgroups =
OPENSSL_memdup(ctx->ext.supportedgroups,
ctx->ext.supportedgroups_len
* sizeof(*ctx->ext.supportedgroups));
if (!s->ext.supportedgroups) {
(ctx->ext.supportedgroups_len + add)
* sizeof(*ctx->ext.supportedgroups));
if (s->ext.supportedgroups == NULL) {
s->ext.supportedgroups_len = 0;
goto err;
}
s->ext.supportedgroups_len = ctx->ext.supportedgroups_len;
}
if (ctx->ext.keyshares != NULL) {
size_t add = 0;
if (ctx->ext.keyshares_len == 0)
/* Add 1 so allocation won't fail */
add = 1;
s->ext.keyshares =
OPENSSL_memdup(ctx->ext.keyshares,
ctx->ext.keyshares_len * sizeof(*ctx->ext.keyshares));
(ctx->ext.keyshares_len + add)
* sizeof(*ctx->ext.keyshares));
if (s->ext.keyshares == NULL) {
s->ext.keyshares_len = 0;
goto err;
@ -862,9 +873,15 @@ SSL *ossl_ssl_connection_new_int(SSL_CTX *ctx, SSL *user_ssl,
s->ext.keyshares_len = ctx->ext.keyshares_len;
}
if (ctx->ext.tuples != NULL) {
size_t add = 0;
if (ctx->ext.tuples_len == 0)
/* Add 1 so allocation won't fail */
add = 1;
s->ext.tuples =
OPENSSL_memdup(ctx->ext.tuples,
ctx->ext.tuples_len * sizeof(*ctx->ext.tuples));
(ctx->ext.tuples_len + add)
* sizeof(*ctx->ext.tuples));
if (s->ext.tuples == NULL) {
s->ext.tuples_len = 0;
goto err;

View File

@ -9,6 +9,7 @@
#include <stdio.h>
#include <stdlib.h>
#include <ctype.h>
#include <openssl/objects.h>
#include <openssl/evp.h>
#include <openssl/hmac.h>
@ -1565,13 +1566,13 @@ int tls1_set_groups_list(SSL_CTX *ctx,
size_t **tplext, size_t *tplextlen,
const char *str)
{
size_t i, j;
size_t i = 0, j;
int ret = 0, parse_ret = 0;
gid_cb_st gcb;
/* Sanity check */
if (ctx == NULL) {
ERR_raise(ERR_LIB_CONF, CONF_R_VARIABLE_HAS_NO_VALUE);
ERR_raise(ERR_LIB_CONF, ERR_R_INTERNAL_ERROR);
return 0;
}
@ -1595,6 +1596,11 @@ int tls1_set_groups_list(SSL_CTX *ctx,
if (gcb.ksid_arr == NULL)
goto end;
while (str[0] != '\0' && isspace((unsigned char)*str))
str++;
if (str[0] == '\0')
goto empty_list;
/*
* Start the (potentially recursive) tuple processing by calling CONF_parse_list
* with the TUPLE_DELIMITER_CHARACTER (which will call tuple_cb after cleaning spaces)
@ -1624,12 +1630,6 @@ int tls1_set_groups_list(SSL_CTX *ctx,
}
gcb.tplcnt = i;
/* Some more checks (at least one remaining group, not more that nominally 4 key shares */
if (gcb.gidcnt == 0) {
ERR_raise_data(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT,
"No valid groups in '%s'", str);
goto end;
}
if (gcb.ksidcnt > OPENSSL_CLIENT_MAX_KEY_SHARES) {
ERR_raise_data(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT,
"To many keyshares requested in '%s' (max = %d)",
@ -1641,7 +1641,7 @@ int tls1_set_groups_list(SSL_CTX *ctx,
* For backward compatibility we let the rest of the code know that a key share
* for the first valid group should be added if no "*" prefix was used anywhere
*/
if (gcb.ksidcnt == 0) {
if (gcb.gidcnt > 0 && gcb.ksidcnt == 0) {
/*
* No key share group prefix character was used, hence we indicate that a single
* key share should be sent and flag that it should come from the supported_groups list
@ -1650,6 +1650,7 @@ int tls1_set_groups_list(SSL_CTX *ctx,
gcb.ksid_arr[0] = 0;
}
empty_list:
/*
* A call to tls1_set_groups_list with any of the args (other than ctx) set
* to NULL only does a syntax check, hence we're done here and report success

View File

@ -9846,7 +9846,7 @@ static int test_unknown_sigalgs_groups(void)
0))
goto end;
if (!TEST_int_le(SSL_CTX_set1_groups_list(ctx,
if (!TEST_int_gt(SSL_CTX_set1_groups_list(ctx,
"?nonexistent1:?nonexistent2:?nonexistent3"),
0))
goto end;

View File

@ -278,33 +278,27 @@ static const struct tls13groupselection_test_st tls13groupselection_tests[] =
CLIENT_PREFERENCE,
SYNTAX_FAILURE
},
/* test 33 remove all groups */
{ "X25519:secp256r1:X448:secp521r1:-X448:-secp256r1:-X25519:-secp521r1",
{ "X25519:??secp256r1:X448", /* test 33 */
"",
CLIENT_PREFERENCE,
SYNTAX_FAILURE
},
{ "X25519:??secp256r1:X448", /* test 34 */
{ "X25519:secp256r1:**X448", /* test 34 */
"",
CLIENT_PREFERENCE,
SYNTAX_FAILURE
},
{ "X25519:secp256r1:**X448", /* test 35 */
{ "--X25519:secp256r1:X448", /* test 35 */
"",
CLIENT_PREFERENCE,
SYNTAX_FAILURE
},
{ "--X25519:secp256r1:X448", /* test 36 */
{ "-DEFAULT", /* test 36 */
"",
CLIENT_PREFERENCE,
SYNTAX_FAILURE
},
{ "-DEFAULT", /* test 37 */
"",
CLIENT_PREFERENCE,
SYNTAX_FAILURE
},
{ "?DEFAULT", /* test 38 */
{ "?DEFAULT", /* test 37 */
"",
CLIENT_PREFERENCE,
SYNTAX_FAILURE
@ -313,6 +307,12 @@ static const struct tls13groupselection_test_st tls13groupselection_tests[] =
* Negotiation Failures
* No overlapping groups between client and server
*/
/* test 38 remove all groups */
{ "X25519:secp256r1:X448:secp521r1:-X448:-secp256r1:-X25519:-secp521r1",
"",
CLIENT_PREFERENCE,
NEGOTIATION_FAILURE
},
{ "secp384r1:secp521r1:X25519", /* test 39 */
"prime256v1:X448",
CLIENT_PREFERENCE,