Coverage Report

Created: 2025-06-13 06:57

/src/openssl/ssl/tls_depr.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2020-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
/* We need to use some engine and HMAC deprecated APIs */
11
#define OPENSSL_SUPPRESS_DEPRECATED
12
13
#include <openssl/engine.h>
14
#include "ssl_local.h"
15
#include "internal/ssl_unwrap.h"
16
17
/*
18
 * Engine APIs are only used to support applications that still use ENGINEs.
19
 * Once ENGINE is removed completely, all of this code can also be removed.
20
 */
21
22
#ifndef OPENSSL_NO_ENGINE
23
void tls_engine_finish(ENGINE *e)
24
57.7k
{
25
57.7k
    ENGINE_finish(e);
26
57.7k
}
27
#endif
28
29
const EVP_CIPHER *tls_get_cipher_from_engine(int nid)
30
166k
{
31
166k
    const EVP_CIPHER *ret = NULL;
32
166k
#ifndef OPENSSL_NO_ENGINE
33
166k
    ENGINE *eng;
34
35
    /*
36
     * If there is an Engine available for this cipher we use the "implicit"
37
     * form to ensure we use that engine later.
38
     */
39
166k
    eng = ENGINE_get_cipher_engine(nid);
40
166k
    if (eng != NULL) {
41
0
        ret = ENGINE_get_cipher(eng, nid);
42
0
        ENGINE_finish(eng);
43
0
    }
44
166k
#endif
45
166k
    return ret;
46
166k
}
47
48
const EVP_MD *tls_get_digest_from_engine(int nid)
49
116k
{
50
116k
    const EVP_MD *ret = NULL;
51
116k
#ifndef OPENSSL_NO_ENGINE
52
116k
    ENGINE *eng;
53
54
    /*
55
     * If there is an Engine available for this digest we use the "implicit"
56
     * form to ensure we use that engine later.
57
     */
58
116k
    eng = ENGINE_get_digest_engine(nid);
59
116k
    if (eng != NULL) {
60
0
        ret = ENGINE_get_digest(eng, nid);
61
0
        ENGINE_finish(eng);
62
0
    }
63
116k
#endif
64
116k
    return ret;
65
116k
}
66
67
#ifndef OPENSSL_NO_ENGINE
68
int tls_engine_load_ssl_client_cert(SSL_CONNECTION *s, X509 **px509,
69
                                    EVP_PKEY **ppkey)
70
0
{
71
0
    SSL *ssl = SSL_CONNECTION_GET_SSL(s);
72
73
0
    return ENGINE_load_ssl_client_cert(SSL_CONNECTION_GET_CTX(s)->client_cert_engine,
74
0
                                       ssl,
75
0
                                       SSL_get_client_CA_list(ssl),
76
0
                                       px509, ppkey, NULL, NULL, NULL);
77
0
}
78
#endif
79
80
#ifndef OPENSSL_NO_ENGINE
81
int SSL_CTX_set_client_cert_engine(SSL_CTX *ctx, ENGINE *e)
82
0
{
83
0
    if (!ENGINE_init(e)) {
84
0
        ERR_raise(ERR_LIB_SSL, ERR_R_ENGINE_LIB);
85
0
        return 0;
86
0
    }
87
0
    if (!ENGINE_get_ssl_client_cert_function(e)) {
88
0
        ERR_raise(ERR_LIB_SSL, SSL_R_NO_CLIENT_CERT_METHOD);
89
0
        ENGINE_finish(e);
90
0
        return 0;
91
0
    }
92
0
    ctx->client_cert_engine = e;
93
0
    return 1;
94
0
}
95
#endif
96
97
/*
98
 * The HMAC APIs below are only used to support the deprecated public API
99
 * macro SSL_CTX_set_tlsext_ticket_key_cb(). The application supplied callback
100
 * takes an HMAC_CTX in its argument list. The preferred alternative is
101
 * SSL_CTX_set_tlsext_ticket_key_evp_cb(). Once
102
 * SSL_CTX_set_tlsext_ticket_key_cb() is removed, then all of this code can also
103
 * be removed.
104
 */
105
#ifndef OPENSSL_NO_DEPRECATED_3_0
106
int ssl_hmac_old_new(SSL_HMAC *ret)
107
0
{
108
0
    ret->old_ctx = HMAC_CTX_new();
109
0
    if (ret->old_ctx == NULL)
110
0
        return 0;
111
112
0
    return 1;
113
0
}
114
115
void ssl_hmac_old_free(SSL_HMAC *ctx)
116
0
{
117
0
    HMAC_CTX_free(ctx->old_ctx);
118
0
}
119
120
int ssl_hmac_old_init(SSL_HMAC *ctx, void *key, size_t len, char *md)
121
0
{
122
0
    return HMAC_Init_ex(ctx->old_ctx, key, len, EVP_get_digestbyname(md), NULL);
123
0
}
124
125
int ssl_hmac_old_update(SSL_HMAC *ctx, const unsigned char *data, size_t len)
126
0
{
127
0
    return HMAC_Update(ctx->old_ctx, data, len);
128
0
}
129
130
int ssl_hmac_old_final(SSL_HMAC *ctx, unsigned char *md, size_t *len)
131
0
{
132
0
    unsigned int l;
133
134
0
    if (HMAC_Final(ctx->old_ctx, md, &l) > 0) {
135
0
        if (len != NULL)
136
0
            *len = l;
137
0
        return 1;
138
0
    }
139
140
0
    return 0;
141
0
}
142
143
size_t ssl_hmac_old_size(const SSL_HMAC *ctx)
144
0
{
145
0
    return HMAC_size(ctx->old_ctx);
146
0
}
147
148
HMAC_CTX *ssl_hmac_get0_HMAC_CTX(SSL_HMAC *ctx)
149
0
{
150
0
    return ctx->old_ctx;
151
0
}
152
153
/* Some deprecated public APIs pass DH objects */
154
EVP_PKEY *ssl_dh_to_pkey(DH *dh)
155
0
{
156
0
# ifndef OPENSSL_NO_DH
157
0
    EVP_PKEY *ret;
158
159
0
    if (dh == NULL)
160
0
        return NULL;
161
0
    ret = EVP_PKEY_new();
162
0
    if (EVP_PKEY_set1_DH(ret, dh) <= 0) {
163
0
        EVP_PKEY_free(ret);
164
0
        return NULL;
165
0
    }
166
0
    return ret;
167
# else
168
    return NULL;
169
# endif
170
0
}
171
172
/* Some deprecated public APIs pass EC_KEY objects */
173
int ssl_set_tmp_ecdh_groups(uint16_t **pext, size_t *pextlen,
174
                            uint16_t **ksext, size_t *ksextlen,
175
                            size_t **tplext, size_t *tplextlen,
176
                            void *key)
177
0
{
178
0
# ifndef OPENSSL_NO_EC
179
0
    const EC_GROUP *group = EC_KEY_get0_group((const EC_KEY *)key);
180
0
    int nid;
181
182
0
    if (group == NULL) {
183
0
        ERR_raise(ERR_LIB_SSL, SSL_R_MISSING_PARAMETERS);
184
0
        return 0;
185
0
    }
186
0
    nid = EC_GROUP_get_curve_name(group);
187
0
    if (nid == NID_undef)
188
0
        return 0;
189
0
    return tls1_set_groups(pext, pextlen,
190
0
                           ksext, ksextlen,
191
0
                           tplext, tplextlen,
192
0
                           &nid, 1);
193
# else
194
    return 0;
195
# endif
196
0
}
197
198
/*
199
 * Set the callback for generating temporary DH keys.
200
 * ctx: the SSL context.
201
 * dh: the callback
202
 */
203
# if !defined(OPENSSL_NO_DH)
204
void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,
205
                                 DH *(*dh) (SSL *ssl, int is_export,
206
                                            int keylength))
207
0
{
208
0
    SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh);
209
0
}
210
211
void SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh) (SSL *ssl, int is_export,
212
                                                  int keylength))
213
0
{
214
0
    SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh);
215
0
}
216
# endif
217
#endif /* OPENSSL_NO_DEPRECATED */