/src/openssl/ssl/tls_depr.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | /* We need to use some engine and HMAC deprecated APIs */ |
11 | | #define OPENSSL_SUPPRESS_DEPRECATED |
12 | | |
13 | | #include <openssl/engine.h> |
14 | | #include "ssl_local.h" |
15 | | #include "internal/ssl_unwrap.h" |
16 | | |
17 | | /* |
18 | | * Engine APIs are only used to support applications that still use ENGINEs. |
19 | | * Once ENGINE is removed completely, all of this code can also be removed. |
20 | | */ |
21 | | |
22 | | #ifndef OPENSSL_NO_ENGINE |
23 | | void tls_engine_finish(ENGINE *e) |
24 | 57.7k | { |
25 | 57.7k | ENGINE_finish(e); |
26 | 57.7k | } |
27 | | #endif |
28 | | |
29 | | const EVP_CIPHER *tls_get_cipher_from_engine(int nid) |
30 | 166k | { |
31 | 166k | const EVP_CIPHER *ret = NULL; |
32 | 166k | #ifndef OPENSSL_NO_ENGINE |
33 | 166k | ENGINE *eng; |
34 | | |
35 | | /* |
36 | | * If there is an Engine available for this cipher we use the "implicit" |
37 | | * form to ensure we use that engine later. |
38 | | */ |
39 | 166k | eng = ENGINE_get_cipher_engine(nid); |
40 | 166k | if (eng != NULL) { |
41 | 0 | ret = ENGINE_get_cipher(eng, nid); |
42 | 0 | ENGINE_finish(eng); |
43 | 0 | } |
44 | 166k | #endif |
45 | 166k | return ret; |
46 | 166k | } |
47 | | |
48 | | const EVP_MD *tls_get_digest_from_engine(int nid) |
49 | 116k | { |
50 | 116k | const EVP_MD *ret = NULL; |
51 | 116k | #ifndef OPENSSL_NO_ENGINE |
52 | 116k | ENGINE *eng; |
53 | | |
54 | | /* |
55 | | * If there is an Engine available for this digest we use the "implicit" |
56 | | * form to ensure we use that engine later. |
57 | | */ |
58 | 116k | eng = ENGINE_get_digest_engine(nid); |
59 | 116k | if (eng != NULL) { |
60 | 0 | ret = ENGINE_get_digest(eng, nid); |
61 | 0 | ENGINE_finish(eng); |
62 | 0 | } |
63 | 116k | #endif |
64 | 116k | return ret; |
65 | 116k | } |
66 | | |
67 | | #ifndef OPENSSL_NO_ENGINE |
68 | | int tls_engine_load_ssl_client_cert(SSL_CONNECTION *s, X509 **px509, |
69 | | EVP_PKEY **ppkey) |
70 | 0 | { |
71 | 0 | SSL *ssl = SSL_CONNECTION_GET_SSL(s); |
72 | |
|
73 | 0 | return ENGINE_load_ssl_client_cert(SSL_CONNECTION_GET_CTX(s)->client_cert_engine, |
74 | 0 | ssl, |
75 | 0 | SSL_get_client_CA_list(ssl), |
76 | 0 | px509, ppkey, NULL, NULL, NULL); |
77 | 0 | } |
78 | | #endif |
79 | | |
80 | | #ifndef OPENSSL_NO_ENGINE |
81 | | int SSL_CTX_set_client_cert_engine(SSL_CTX *ctx, ENGINE *e) |
82 | 0 | { |
83 | 0 | if (!ENGINE_init(e)) { |
84 | 0 | ERR_raise(ERR_LIB_SSL, ERR_R_ENGINE_LIB); |
85 | 0 | return 0; |
86 | 0 | } |
87 | 0 | if (!ENGINE_get_ssl_client_cert_function(e)) { |
88 | 0 | ERR_raise(ERR_LIB_SSL, SSL_R_NO_CLIENT_CERT_METHOD); |
89 | 0 | ENGINE_finish(e); |
90 | 0 | return 0; |
91 | 0 | } |
92 | 0 | ctx->client_cert_engine = e; |
93 | 0 | return 1; |
94 | 0 | } |
95 | | #endif |
96 | | |
97 | | /* |
98 | | * The HMAC APIs below are only used to support the deprecated public API |
99 | | * macro SSL_CTX_set_tlsext_ticket_key_cb(). The application supplied callback |
100 | | * takes an HMAC_CTX in its argument list. The preferred alternative is |
101 | | * SSL_CTX_set_tlsext_ticket_key_evp_cb(). Once |
102 | | * SSL_CTX_set_tlsext_ticket_key_cb() is removed, then all of this code can also |
103 | | * be removed. |
104 | | */ |
105 | | #ifndef OPENSSL_NO_DEPRECATED_3_0 |
106 | | int ssl_hmac_old_new(SSL_HMAC *ret) |
107 | 0 | { |
108 | 0 | ret->old_ctx = HMAC_CTX_new(); |
109 | 0 | if (ret->old_ctx == NULL) |
110 | 0 | return 0; |
111 | | |
112 | 0 | return 1; |
113 | 0 | } |
114 | | |
115 | | void ssl_hmac_old_free(SSL_HMAC *ctx) |
116 | 0 | { |
117 | 0 | HMAC_CTX_free(ctx->old_ctx); |
118 | 0 | } |
119 | | |
120 | | int ssl_hmac_old_init(SSL_HMAC *ctx, void *key, size_t len, char *md) |
121 | 0 | { |
122 | 0 | return HMAC_Init_ex(ctx->old_ctx, key, len, EVP_get_digestbyname(md), NULL); |
123 | 0 | } |
124 | | |
125 | | int ssl_hmac_old_update(SSL_HMAC *ctx, const unsigned char *data, size_t len) |
126 | 0 | { |
127 | 0 | return HMAC_Update(ctx->old_ctx, data, len); |
128 | 0 | } |
129 | | |
130 | | int ssl_hmac_old_final(SSL_HMAC *ctx, unsigned char *md, size_t *len) |
131 | 0 | { |
132 | 0 | unsigned int l; |
133 | |
|
134 | 0 | if (HMAC_Final(ctx->old_ctx, md, &l) > 0) { |
135 | 0 | if (len != NULL) |
136 | 0 | *len = l; |
137 | 0 | return 1; |
138 | 0 | } |
139 | | |
140 | 0 | return 0; |
141 | 0 | } |
142 | | |
143 | | size_t ssl_hmac_old_size(const SSL_HMAC *ctx) |
144 | 0 | { |
145 | 0 | return HMAC_size(ctx->old_ctx); |
146 | 0 | } |
147 | | |
148 | | HMAC_CTX *ssl_hmac_get0_HMAC_CTX(SSL_HMAC *ctx) |
149 | 0 | { |
150 | 0 | return ctx->old_ctx; |
151 | 0 | } |
152 | | |
153 | | /* Some deprecated public APIs pass DH objects */ |
154 | | EVP_PKEY *ssl_dh_to_pkey(DH *dh) |
155 | 0 | { |
156 | 0 | # ifndef OPENSSL_NO_DH |
157 | 0 | EVP_PKEY *ret; |
158 | |
|
159 | 0 | if (dh == NULL) |
160 | 0 | return NULL; |
161 | 0 | ret = EVP_PKEY_new(); |
162 | 0 | if (EVP_PKEY_set1_DH(ret, dh) <= 0) { |
163 | 0 | EVP_PKEY_free(ret); |
164 | 0 | return NULL; |
165 | 0 | } |
166 | 0 | return ret; |
167 | | # else |
168 | | return NULL; |
169 | | # endif |
170 | 0 | } |
171 | | |
172 | | /* Some deprecated public APIs pass EC_KEY objects */ |
173 | | int ssl_set_tmp_ecdh_groups(uint16_t **pext, size_t *pextlen, |
174 | | uint16_t **ksext, size_t *ksextlen, |
175 | | size_t **tplext, size_t *tplextlen, |
176 | | void *key) |
177 | 0 | { |
178 | 0 | # ifndef OPENSSL_NO_EC |
179 | 0 | const EC_GROUP *group = EC_KEY_get0_group((const EC_KEY *)key); |
180 | 0 | int nid; |
181 | |
|
182 | 0 | if (group == NULL) { |
183 | 0 | ERR_raise(ERR_LIB_SSL, SSL_R_MISSING_PARAMETERS); |
184 | 0 | return 0; |
185 | 0 | } |
186 | 0 | nid = EC_GROUP_get_curve_name(group); |
187 | 0 | if (nid == NID_undef) |
188 | 0 | return 0; |
189 | 0 | return tls1_set_groups(pext, pextlen, |
190 | 0 | ksext, ksextlen, |
191 | 0 | tplext, tplextlen, |
192 | 0 | &nid, 1); |
193 | | # else |
194 | | return 0; |
195 | | # endif |
196 | 0 | } |
197 | | |
198 | | /* |
199 | | * Set the callback for generating temporary DH keys. |
200 | | * ctx: the SSL context. |
201 | | * dh: the callback |
202 | | */ |
203 | | # if !defined(OPENSSL_NO_DH) |
204 | | void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx, |
205 | | DH *(*dh) (SSL *ssl, int is_export, |
206 | | int keylength)) |
207 | 0 | { |
208 | 0 | SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh); |
209 | 0 | } |
210 | | |
211 | | void SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh) (SSL *ssl, int is_export, |
212 | | int keylength)) |
213 | 0 | { |
214 | 0 | SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh); |
215 | 0 | } |
216 | | # endif |
217 | | #endif /* OPENSSL_NO_DEPRECATED */ |