mirror of
https://github.com/openssl/openssl.git
synced 2024-11-21 01:15:20 +08:00
846e33c729
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org>
166 lines
5.1 KiB
C
166 lines
5.1 KiB
C
/*
|
|
* Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <openssl/objects.h>
|
|
#include "ssl_locl.h"
|
|
|
|
/* Add the client's renegotiation binding */
|
|
int ssl_add_clienthello_renegotiate_ext(SSL *s, unsigned char *p, int *len,
|
|
int maxlen)
|
|
{
|
|
if (p) {
|
|
if ((s->s3->previous_client_finished_len + 1) > maxlen) {
|
|
SSLerr(SSL_F_SSL_ADD_CLIENTHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATE_EXT_TOO_LONG);
|
|
return 0;
|
|
}
|
|
|
|
/* Length byte */
|
|
*p = s->s3->previous_client_finished_len;
|
|
p++;
|
|
|
|
memcpy(p, s->s3->previous_client_finished,
|
|
s->s3->previous_client_finished_len);
|
|
}
|
|
|
|
*len = s->s3->previous_client_finished_len + 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* Parse the client's renegotiation binding and abort if it's not right
|
|
*/
|
|
int ssl_parse_clienthello_renegotiate_ext(SSL *s, PACKET *pkt, int *al)
|
|
{
|
|
unsigned int ilen;
|
|
const unsigned char *d;
|
|
|
|
/* Parse the length byte */
|
|
if (!PACKET_get_1(pkt, &ilen)
|
|
|| !PACKET_get_bytes(pkt, &d, ilen)) {
|
|
SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_ENCODING_ERR);
|
|
*al = SSL_AD_ILLEGAL_PARAMETER;
|
|
return 0;
|
|
}
|
|
|
|
/* Check that the extension matches */
|
|
if (ilen != s->s3->previous_client_finished_len) {
|
|
SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
|
*al = SSL_AD_HANDSHAKE_FAILURE;
|
|
return 0;
|
|
}
|
|
|
|
if (memcmp(d, s->s3->previous_client_finished,
|
|
s->s3->previous_client_finished_len)) {
|
|
SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
|
*al = SSL_AD_HANDSHAKE_FAILURE;
|
|
return 0;
|
|
}
|
|
|
|
s->s3->send_connection_binding = 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* Add the server's renegotiation binding */
|
|
int ssl_add_serverhello_renegotiate_ext(SSL *s, unsigned char *p, int *len,
|
|
int maxlen)
|
|
{
|
|
if (p) {
|
|
if ((s->s3->previous_client_finished_len +
|
|
s->s3->previous_server_finished_len + 1) > maxlen) {
|
|
SSLerr(SSL_F_SSL_ADD_SERVERHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATE_EXT_TOO_LONG);
|
|
return 0;
|
|
}
|
|
|
|
/* Length byte */
|
|
*p = s->s3->previous_client_finished_len +
|
|
s->s3->previous_server_finished_len;
|
|
p++;
|
|
|
|
memcpy(p, s->s3->previous_client_finished,
|
|
s->s3->previous_client_finished_len);
|
|
p += s->s3->previous_client_finished_len;
|
|
|
|
memcpy(p, s->s3->previous_server_finished,
|
|
s->s3->previous_server_finished_len);
|
|
}
|
|
|
|
*len = s->s3->previous_client_finished_len
|
|
+ s->s3->previous_server_finished_len + 1;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* Parse the server's renegotiation binding and abort if it's not right
|
|
*/
|
|
int ssl_parse_serverhello_renegotiate_ext(SSL *s, PACKET *pkt, int *al)
|
|
{
|
|
unsigned int expected_len = s->s3->previous_client_finished_len
|
|
+ s->s3->previous_server_finished_len;
|
|
unsigned int ilen;
|
|
const unsigned char *data;
|
|
|
|
/* Check for logic errors */
|
|
OPENSSL_assert(!expected_len || s->s3->previous_client_finished_len);
|
|
OPENSSL_assert(!expected_len || s->s3->previous_server_finished_len);
|
|
|
|
/* Parse the length byte */
|
|
if (!PACKET_get_1(pkt, &ilen)) {
|
|
SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_ENCODING_ERR);
|
|
*al = SSL_AD_ILLEGAL_PARAMETER;
|
|
return 0;
|
|
}
|
|
|
|
/* Consistency check */
|
|
if (PACKET_remaining(pkt) != ilen) {
|
|
SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_ENCODING_ERR);
|
|
*al = SSL_AD_ILLEGAL_PARAMETER;
|
|
return 0;
|
|
}
|
|
|
|
/* Check that the extension matches */
|
|
if (ilen != expected_len) {
|
|
SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
|
*al = SSL_AD_HANDSHAKE_FAILURE;
|
|
return 0;
|
|
}
|
|
|
|
if (!PACKET_get_bytes(pkt, &data, s->s3->previous_client_finished_len)
|
|
|| memcmp(data, s->s3->previous_client_finished,
|
|
s->s3->previous_client_finished_len) != 0) {
|
|
SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
|
*al = SSL_AD_HANDSHAKE_FAILURE;
|
|
return 0;
|
|
}
|
|
|
|
if (!PACKET_get_bytes(pkt, &data, s->s3->previous_server_finished_len)
|
|
|| memcmp(data, s->s3->previous_server_finished,
|
|
s->s3->previous_server_finished_len) != 0) {
|
|
SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
|
|
SSL_R_RENEGOTIATION_MISMATCH);
|
|
*al = SSL_AD_ILLEGAL_PARAMETER;
|
|
return 0;
|
|
}
|
|
s->s3->send_connection_binding = 1;
|
|
|
|
return 1;
|
|
}
|