Coverage Report

Created: 2026-02-14 07:20

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl33/ssl/statem/extensions_srvr.c
Line
Count
Source
1
/*
2
 * Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <openssl/ocsp.h>
11
#include "../ssl_local.h"
12
#include "statem_local.h"
13
#include "internal/cryptlib.h"
14
15
0
#define COOKIE_STATE_FORMAT_VERSION 1
16
17
/*
18
 * 2 bytes for packet length, 2 bytes for format version, 2 bytes for
19
 * protocol version, 2 bytes for group id, 2 bytes for cipher id, 1 byte for
20
 * key_share present flag, 8 bytes for timestamp, 2 bytes for the hashlen,
21
 * EVP_MAX_MD_SIZE for transcript hash, 1 byte for app cookie length, app cookie
22
 * length bytes, SHA256_DIGEST_LENGTH bytes for the HMAC of the whole thing.
23
 */
24
0
#define MAX_COOKIE_SIZE (2 + 2 + 2 + 2 + 2 + 1 + 8 + 2 + EVP_MAX_MD_SIZE + 1 \
25
0
    + SSL_COOKIE_LENGTH + SHA256_DIGEST_LENGTH)
26
27
/*
28
 * Message header + 2 bytes for protocol version + number of random bytes +
29
 * + 1 byte for legacy session id length + number of bytes in legacy session id
30
 * + 2 bytes for ciphersuite + 1 byte for legacy compression
31
 * + 2 bytes for extension block length + 6 bytes for key_share extension
32
 * + 4 bytes for cookie extension header + the number of bytes in the cookie
33
 */
34
#define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \
35
    + SSL_MAX_SSL_SESSION_ID_LENGTH + 2 + 1 + 2 + 6 + 4                \
36
    + MAX_COOKIE_SIZE)
37
38
/*
39
 * Parse the client's renegotiation binding and abort if it's not right
40
 */
41
int tls_parse_ctos_renegotiate(SSL_CONNECTION *s, PACKET *pkt,
42
    unsigned int context,
43
    X509 *x, size_t chainidx)
44
5.22k
{
45
5.22k
    unsigned int ilen;
46
5.22k
    const unsigned char *data;
47
5.22k
    int ok;
48
49
    /* Parse the length byte */
50
5.22k
    if (!PACKET_get_1(pkt, &ilen)
51
5.20k
        || !PACKET_get_bytes(pkt, &data, ilen)) {
52
33
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_RENEGOTIATION_ENCODING_ERR);
53
33
        return 0;
54
33
    }
55
56
    /* Check that the extension matches */
57
5.18k
    if (ilen != s->s3.previous_client_finished_len) {
58
23
        SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_RENEGOTIATION_MISMATCH);
59
23
        return 0;
60
23
    }
61
62
5.16k
    ok = memcmp(data, s->s3.previous_client_finished,
63
5.16k
        s->s3.previous_client_finished_len);
64
5.16k
#ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
65
5.16k
    if (ok) {
66
0
        if ((data[0] ^ s->s3.previous_client_finished[0]) != 0xFF) {
67
0
            ok = 0;
68
0
        }
69
0
    }
70
5.16k
#endif
71
5.16k
    if (ok) {
72
0
        SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE, SSL_R_RENEGOTIATION_MISMATCH);
73
0
        return 0;
74
0
    }
75
76
5.16k
    s->s3.send_connection_binding = 1;
77
78
5.16k
    return 1;
79
5.16k
}
80
81
/*-
82
 * The servername extension is treated as follows:
83
 *
84
 * - Only the hostname type is supported with a maximum length of 255.
85
 * - The servername is rejected if too long or if it contains zeros,
86
 *   in which case an fatal alert is generated.
87
 * - The servername field is maintained together with the session cache.
88
 * - When a session is resumed, the servername call back invoked in order
89
 *   to allow the application to position itself to the right context.
90
 * - The servername is acknowledged if it is new for a session or when
91
 *   it is identical to a previously used for the same session.
92
 *   Applications can control the behaviour.  They can at any time
93
 *   set a 'desirable' servername for a new SSL object. This can be the
94
 *   case for example with HTTPS when a Host: header field is received and
95
 *   a renegotiation is requested. In this case, a possible servername
96
 *   presented in the new client hello is only acknowledged if it matches
97
 *   the value of the Host: field.
98
 * - Applications must  use SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
99
 *   if they provide for changing an explicit servername context for the
100
 *   session, i.e. when the session has been established with a servername
101
 *   extension.
102
 * - On session reconnect, the servername extension may be absent.
103
 */
104
int tls_parse_ctos_server_name(SSL_CONNECTION *s, PACKET *pkt,
105
    unsigned int context, X509 *x, size_t chainidx)
106
9.58k
{
107
9.58k
    unsigned int servname_type;
108
9.58k
    PACKET sni, hostname;
109
110
9.58k
    if (!PACKET_as_length_prefixed_2(pkt, &sni)
111
        /* ServerNameList must be at least 1 byte long. */
112
9.35k
        || PACKET_remaining(&sni) == 0) {
113
251
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
114
251
        return 0;
115
251
    }
116
117
    /*
118
     * Although the intent was for server_name to be extensible, RFC 4366
119
     * was not clear about it; and so OpenSSL among other implementations,
120
     * always and only allows a 'host_name' name types.
121
     * RFC 6066 corrected the mistake but adding new name types
122
     * is nevertheless no longer feasible, so act as if no other
123
     * SNI types can exist, to simplify parsing.
124
     *
125
     * Also note that the RFC permits only one SNI value per type,
126
     * i.e., we can only have a single hostname.
127
     */
128
9.33k
    if (!PACKET_get_1(&sni, &servname_type)
129
9.33k
        || servname_type != TLSEXT_NAMETYPE_host_name
130
9.30k
        || !PACKET_as_length_prefixed_2(&sni, &hostname)) {
131
171
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
132
171
        return 0;
133
171
    }
134
135
    /*
136
     * In TLSv1.2 and below the SNI is associated with the session. In TLSv1.3
137
     * we always use the SNI value from the handshake.
138
     */
139
9.15k
    if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) {
140
9.14k
        if (PACKET_remaining(&hostname) > TLSEXT_MAXLEN_host_name) {
141
6
            SSLfatal(s, SSL_AD_UNRECOGNIZED_NAME, SSL_R_BAD_EXTENSION);
142
6
            return 0;
143
6
        }
144
145
9.14k
        if (PACKET_contains_zero_byte(&hostname)) {
146
16
            SSLfatal(s, SSL_AD_UNRECOGNIZED_NAME, SSL_R_BAD_EXTENSION);
147
16
            return 0;
148
16
        }
149
150
        /*
151
         * Store the requested SNI in the SSL as temporary storage.
152
         * If we accept it, it will get stored in the SSL_SESSION as well.
153
         */
154
9.12k
        OPENSSL_free(s->ext.hostname);
155
9.12k
        s->ext.hostname = NULL;
156
9.12k
        if (!PACKET_strndup(&hostname, &s->ext.hostname)) {
157
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
158
0
            return 0;
159
0
        }
160
161
9.12k
        s->servername_done = 1;
162
9.12k
    } else {
163
        /*
164
         * In TLSv1.2 and below we should check if the SNI is consistent between
165
         * the initial handshake and the resumption. In TLSv1.3 SNI is not
166
         * associated with the session.
167
         */
168
13
        s->servername_done = (s->session->ext.hostname != NULL)
169
6
            && PACKET_equal(&hostname, s->session->ext.hostname,
170
6
                strlen(s->session->ext.hostname));
171
13
    }
172
173
9.13k
    return 1;
174
9.15k
}
175
176
int tls_parse_ctos_maxfragmentlen(SSL_CONNECTION *s, PACKET *pkt,
177
    unsigned int context,
178
    X509 *x, size_t chainidx)
179
1.32k
{
180
1.32k
    unsigned int value;
181
182
1.32k
    if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) {
183
114
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
184
114
        return 0;
185
114
    }
186
187
    /* Received |value| should be a valid max-fragment-length code. */
188
1.21k
    if (!IS_MAX_FRAGMENT_LENGTH_EXT_VALID(value)) {
189
48
        SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
190
48
            SSL_R_SSL3_EXT_INVALID_MAX_FRAGMENT_LENGTH);
191
48
        return 0;
192
48
    }
193
194
    /*
195
     * When doing a full handshake or a renegotiation max_fragment_len_mode will
196
     * be TLSEXT_max_fragment_length_UNSPECIFIED
197
     *
198
     * In case of a resumption max_fragment_len_mode will be one of
199
     *      TLSEXT_max_fragment_length_DISABLED, TLSEXT_max_fragment_length_512,
200
     *      TLSEXT_max_fragment_length_1024, TLSEXT_max_fragment_length_2048.
201
     *      TLSEXT_max_fragment_length_4096
202
     *
203
     * RFC 6066: The negotiated length applies for the duration of the session
204
     * including session resumptions.
205
     *
206
     * So we only set the value in case it is unspecified.
207
     */
208
1.16k
    if (s->session->ext.max_fragment_len_mode == TLSEXT_max_fragment_length_UNSPECIFIED)
209
        /*
210
         * Store it in session, so it'll become binding for us
211
         * and we'll include it in a next Server Hello.
212
         */
213
1.16k
        s->session->ext.max_fragment_len_mode = value;
214
215
1.16k
    return 1;
216
1.21k
}
217
218
#ifndef OPENSSL_NO_SRP
219
int tls_parse_ctos_srp(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
220
    X509 *x, size_t chainidx)
221
173
{
222
173
    PACKET srp_I;
223
224
173
    if (!PACKET_as_length_prefixed_1(pkt, &srp_I)
225
105
        || PACKET_contains_zero_byte(&srp_I)) {
226
105
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
227
105
        return 0;
228
105
    }
229
230
68
    if (!PACKET_strndup(&srp_I, &s->srp_ctx.login)) {
231
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
232
0
        return 0;
233
0
    }
234
235
68
    return 1;
236
68
}
237
#endif
238
239
int tls_parse_ctos_ec_pt_formats(SSL_CONNECTION *s, PACKET *pkt,
240
    unsigned int context,
241
    X509 *x, size_t chainidx)
242
6.18k
{
243
6.18k
    PACKET ec_point_format_list;
244
245
6.18k
    if (!PACKET_as_length_prefixed_1(pkt, &ec_point_format_list)
246
6.05k
        || PACKET_remaining(&ec_point_format_list) == 0) {
247
146
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
248
146
        return 0;
249
146
    }
250
251
6.04k
    if (!s->hit) {
252
5.88k
        if (!PACKET_memdup(&ec_point_format_list,
253
5.88k
                &s->ext.peer_ecpointformats,
254
5.88k
                &s->ext.peer_ecpointformats_len)) {
255
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
256
0
            return 0;
257
0
        }
258
5.88k
    }
259
260
6.04k
    return 1;
261
6.04k
}
262
263
int tls_parse_ctos_session_ticket(SSL_CONNECTION *s, PACKET *pkt,
264
    unsigned int context,
265
    X509 *x, size_t chainidx)
266
6.12k
{
267
6.12k
    if (s->ext.session_ticket_cb && !s->ext.session_ticket_cb(SSL_CONNECTION_GET_USER_SSL(s), PACKET_data(pkt), PACKET_remaining(pkt), s->ext.session_ticket_cb_arg)) {
268
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
269
0
        return 0;
270
0
    }
271
272
6.12k
    return 1;
273
6.12k
}
274
275
int tls_parse_ctos_sig_algs_cert(SSL_CONNECTION *s, PACKET *pkt,
276
    ossl_unused unsigned int context,
277
    ossl_unused X509 *x,
278
    ossl_unused size_t chainidx)
279
1.20k
{
280
1.20k
    PACKET supported_sig_algs;
281
282
1.20k
    if (!PACKET_as_length_prefixed_2(pkt, &supported_sig_algs)
283
1.02k
        || PACKET_remaining(&supported_sig_algs) == 0) {
284
195
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
285
195
        return 0;
286
195
    }
287
288
    /*
289
     * We use this routine on both clients and servers, and when clients
290
     * get asked for PHA we need to always save the sigalgs regardless
291
     * of whether it was a resumption or not.
292
     */
293
1.01k
    if ((!s->server || (s->server && !s->hit))
294
1.00k
        && !tls1_save_sigalgs(s, &supported_sig_algs, 1)) {
295
22
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
296
22
        return 0;
297
22
    }
298
299
990
    return 1;
300
1.01k
}
301
302
int tls_parse_ctos_sig_algs(SSL_CONNECTION *s, PACKET *pkt,
303
    unsigned int context, X509 *x, size_t chainidx)
304
9.98k
{
305
9.98k
    PACKET supported_sig_algs;
306
307
9.98k
    if (!PACKET_as_length_prefixed_2(pkt, &supported_sig_algs)
308
9.76k
        || PACKET_remaining(&supported_sig_algs) == 0) {
309
231
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
310
231
        return 0;
311
231
    }
312
313
    /*
314
     * We use this routine on both clients and servers, and when clients
315
     * get asked for PHA we need to always save the sigalgs regardless
316
     * of whether it was a resumption or not.
317
     */
318
9.75k
    if ((!s->server || (s->server && !s->hit))
319
9.62k
        && !tls1_save_sigalgs(s, &supported_sig_algs, 0)) {
320
18
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
321
18
        return 0;
322
18
    }
323
324
9.73k
    return 1;
325
9.75k
}
326
327
#ifndef OPENSSL_NO_OCSP
328
int tls_parse_ctos_status_request(SSL_CONNECTION *s, PACKET *pkt,
329
    unsigned int context,
330
    X509 *x, size_t chainidx)
331
6.70k
{
332
6.70k
    PACKET responder_id_list, exts;
333
334
    /* We ignore this in a resumption handshake */
335
6.70k
    if (s->hit)
336
35
        return 1;
337
338
    /* Not defined if we get one of these in a client Certificate */
339
6.66k
    if (x != NULL)
340
0
        return 1;
341
342
6.66k
    if (!PACKET_get_1(pkt, (unsigned int *)&s->ext.status_type)) {
343
20
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
344
20
        return 0;
345
20
    }
346
347
6.64k
    if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp) {
348
        /*
349
         * We don't know what to do with any other type so ignore it.
350
         */
351
280
        s->ext.status_type = TLSEXT_STATUSTYPE_nothing;
352
280
        return 1;
353
280
    }
354
355
6.36k
    if (!PACKET_get_length_prefixed_2(pkt, &responder_id_list)) {
356
109
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
357
109
        return 0;
358
109
    }
359
360
    /*
361
     * We remove any OCSP_RESPIDs from a previous handshake
362
     * to prevent unbounded memory growth - CVE-2016-6304
363
     */
364
6.25k
    sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free);
365
6.25k
    if (PACKET_remaining(&responder_id_list) > 0) {
366
3.23k
        s->ext.ocsp.ids = sk_OCSP_RESPID_new_null();
367
3.23k
        if (s->ext.ocsp.ids == NULL) {
368
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);
369
0
            return 0;
370
0
        }
371
3.23k
    } else {
372
3.02k
        s->ext.ocsp.ids = NULL;
373
3.02k
    }
374
375
6.37k
    while (PACKET_remaining(&responder_id_list) > 0) {
376
3.33k
        OCSP_RESPID *id;
377
3.33k
        PACKET responder_id;
378
3.33k
        const unsigned char *id_data;
379
380
3.33k
        if (!PACKET_get_length_prefixed_2(&responder_id_list, &responder_id)
381
3.22k
            || PACKET_remaining(&responder_id) == 0) {
382
126
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
383
126
            return 0;
384
126
        }
385
386
3.20k
        id_data = PACKET_data(&responder_id);
387
3.20k
        id = d2i_OCSP_RESPID(NULL, &id_data,
388
3.20k
            (int)PACKET_remaining(&responder_id));
389
3.20k
        if (id == NULL) {
390
3.02k
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
391
3.02k
            return 0;
392
3.02k
        }
393
394
181
        if (id_data != PACKET_end(&responder_id)) {
395
68
            OCSP_RESPID_free(id);
396
68
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
397
398
68
            return 0;
399
68
        }
400
401
113
        if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) {
402
0
            OCSP_RESPID_free(id);
403
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
404
405
0
            return 0;
406
0
        }
407
113
    }
408
409
    /* Read in request_extensions */
410
3.03k
    if (!PACKET_as_length_prefixed_2(pkt, &exts)) {
411
87
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
412
87
        return 0;
413
87
    }
414
415
2.95k
    if (PACKET_remaining(&exts) > 0) {
416
1.13k
        const unsigned char *ext_data = PACKET_data(&exts);
417
418
1.13k
        sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts,
419
1.13k
            X509_EXTENSION_free);
420
1.13k
        s->ext.ocsp.exts = d2i_X509_EXTENSIONS(NULL, &ext_data, (int)PACKET_remaining(&exts));
421
1.13k
        if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) {
422
1.12k
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
423
1.12k
            return 0;
424
1.12k
        }
425
1.13k
    }
426
427
1.82k
    return 1;
428
2.95k
}
429
#endif
430
431
#ifndef OPENSSL_NO_NEXTPROTONEG
432
int tls_parse_ctos_npn(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
433
    X509 *x, size_t chainidx)
434
18
{
435
    /*
436
     * We shouldn't accept this extension on a
437
     * renegotiation.
438
     */
439
18
    if (SSL_IS_FIRST_HANDSHAKE(s))
440
18
        s->s3.npn_seen = 1;
441
442
18
    return 1;
443
18
}
444
#endif
445
446
/*
447
 * Save the ALPN extension in a ClientHello.|pkt| holds the contents of the ALPN
448
 * extension, not including type and length. Returns: 1 on success, 0 on error.
449
 */
450
int tls_parse_ctos_alpn(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
451
    X509 *x, size_t chainidx)
452
462
{
453
462
    PACKET protocol_list, save_protocol_list, protocol;
454
455
462
    if (!SSL_IS_FIRST_HANDSHAKE(s))
456
0
        return 1;
457
458
462
    if (!PACKET_as_length_prefixed_2(pkt, &protocol_list)
459
314
        || PACKET_remaining(&protocol_list) < 2) {
460
159
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
461
159
        return 0;
462
159
    }
463
464
303
    save_protocol_list = protocol_list;
465
2.36k
    do {
466
        /* Protocol names can't be empty. */
467
2.36k
        if (!PACKET_get_length_prefixed_1(&protocol_list, &protocol)
468
2.28k
            || PACKET_remaining(&protocol) == 0) {
469
114
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
470
114
            return 0;
471
114
        }
472
2.36k
    } while (PACKET_remaining(&protocol_list) != 0);
473
474
189
    OPENSSL_free(s->s3.alpn_proposed);
475
189
    s->s3.alpn_proposed = NULL;
476
189
    s->s3.alpn_proposed_len = 0;
477
189
    if (!PACKET_memdup(&save_protocol_list,
478
189
            &s->s3.alpn_proposed, &s->s3.alpn_proposed_len)) {
479
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
480
0
        return 0;
481
0
    }
482
483
189
    return 1;
484
189
}
485
486
#ifndef OPENSSL_NO_SRTP
487
int tls_parse_ctos_use_srtp(SSL_CONNECTION *s, PACKET *pkt,
488
    unsigned int context, X509 *x, size_t chainidx)
489
1.06k
{
490
1.06k
    STACK_OF(SRTP_PROTECTION_PROFILE) *srvr;
491
1.06k
    unsigned int ct, mki_len, id;
492
1.06k
    int i, srtp_pref;
493
1.06k
    PACKET subpkt;
494
1.06k
    SSL *ssl = SSL_CONNECTION_GET_SSL(s);
495
496
    /* Ignore this if we have no SRTP profiles */
497
1.06k
    if (SSL_get_srtp_profiles(ssl) == NULL)
498
1.06k
        return 1;
499
500
    /* Pull off the length of the cipher suite list  and check it is even */
501
0
    if (!PACKET_get_net_2(pkt, &ct) || (ct & 1) != 0
502
0
        || !PACKET_get_sub_packet(pkt, &subpkt, ct)) {
503
0
        SSLfatal(s, SSL_AD_DECODE_ERROR,
504
0
            SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
505
0
        return 0;
506
0
    }
507
508
0
    srvr = SSL_get_srtp_profiles(ssl);
509
0
    s->srtp_profile = NULL;
510
    /* Search all profiles for a match initially */
511
0
    srtp_pref = sk_SRTP_PROTECTION_PROFILE_num(srvr);
512
513
0
    while (PACKET_remaining(&subpkt)) {
514
0
        if (!PACKET_get_net_2(&subpkt, &id)) {
515
0
            SSLfatal(s, SSL_AD_DECODE_ERROR,
516
0
                SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
517
0
            return 0;
518
0
        }
519
520
        /*
521
         * Only look for match in profiles of higher preference than
522
         * current match.
523
         * If no profiles have been have been configured then this
524
         * does nothing.
525
         */
526
0
        for (i = 0; i < srtp_pref; i++) {
527
0
            SRTP_PROTECTION_PROFILE *sprof = sk_SRTP_PROTECTION_PROFILE_value(srvr, i);
528
529
0
            if (sprof->id == id) {
530
0
                s->srtp_profile = sprof;
531
0
                srtp_pref = i;
532
0
                break;
533
0
            }
534
0
        }
535
0
    }
536
537
    /* Now extract the MKI value as a sanity check, but discard it for now */
538
0
    if (!PACKET_get_1(pkt, &mki_len)) {
539
0
        SSLfatal(s, SSL_AD_DECODE_ERROR,
540
0
            SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
541
0
        return 0;
542
0
    }
543
544
0
    if (!PACKET_forward(pkt, mki_len)
545
0
        || PACKET_remaining(pkt)) {
546
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_SRTP_MKI_VALUE);
547
0
        return 0;
548
0
    }
549
550
0
    return 1;
551
0
}
552
#endif
553
554
int tls_parse_ctos_etm(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
555
    X509 *x, size_t chainidx)
556
1.85k
{
557
1.85k
    if (!(s->options & SSL_OP_NO_ENCRYPT_THEN_MAC))
558
1.85k
        s->ext.use_etm = 1;
559
560
1.85k
    return 1;
561
1.85k
}
562
563
/*
564
 * Process a psk_kex_modes extension received in the ClientHello. |pkt| contains
565
 * the raw PACKET data for the extension. Returns 1 on success or 0 on failure.
566
 */
567
int tls_parse_ctos_psk_kex_modes(SSL_CONNECTION *s, PACKET *pkt,
568
    unsigned int context,
569
    X509 *x, size_t chainidx)
570
1.50k
{
571
1.50k
#ifndef OPENSSL_NO_TLS1_3
572
1.50k
    PACKET psk_kex_modes;
573
1.50k
    unsigned int mode;
574
575
1.50k
    if (!PACKET_as_length_prefixed_1(pkt, &psk_kex_modes)
576
1.45k
        || PACKET_remaining(&psk_kex_modes) == 0) {
577
54
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
578
54
        return 0;
579
54
    }
580
581
9.69k
    while (PACKET_get_1(&psk_kex_modes, &mode)) {
582
8.24k
        if (mode == TLSEXT_KEX_MODE_KE_DHE)
583
2.58k
            s->ext.psk_kex_mode |= TLSEXT_KEX_MODE_FLAG_KE_DHE;
584
5.65k
        else if (mode == TLSEXT_KEX_MODE_KE
585
1.88k
            && (s->options & SSL_OP_ALLOW_NO_DHE_KEX) != 0)
586
0
            s->ext.psk_kex_mode |= TLSEXT_KEX_MODE_FLAG_KE;
587
8.24k
    }
588
589
1.45k
    if (((s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE) != 0)
590
0
        && (s->options & SSL_OP_PREFER_NO_DHE_KEX) != 0) {
591
592
        /*
593
         * If NO_DHE is supported and preferred, then we only remember this
594
         * mode. DHE PSK will not be used for sure, because in any case where
595
         * it would be supported (i.e. if a key share is present), NO_DHE would
596
         * be supported as well. As the latter is preferred it would be
597
         * chosen. By removing DHE PSK here, we don't have to deal with the
598
         * SSL_OP_PREFER_NO_DHE_KEX option in any other place.
599
         */
600
0
        s->ext.psk_kex_mode = TLSEXT_KEX_MODE_FLAG_KE;
601
0
    }
602
603
1.45k
#endif
604
605
1.45k
    return 1;
606
1.50k
}
607
608
/*
609
 * Process a key_share extension received in the ClientHello. |pkt| contains
610
 * the raw PACKET data for the extension. Returns 1 on success or 0 on failure.
611
 */
612
int tls_parse_ctos_key_share(SSL_CONNECTION *s, PACKET *pkt,
613
    unsigned int context, X509 *x, size_t chainidx)
614
2.07k
{
615
2.07k
#ifndef OPENSSL_NO_TLS1_3
616
2.07k
    unsigned int group_id;
617
2.07k
    PACKET key_share_list, encoded_pt;
618
2.07k
    const uint16_t *clntgroups, *srvrgroups;
619
2.07k
    size_t clnt_num_groups, srvr_num_groups;
620
2.07k
    int found = 0;
621
622
2.07k
    if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0)
623
0
        return 1;
624
625
    /* Sanity check */
626
2.07k
    if (s->s3.peer_tmp != NULL) {
627
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
628
0
        return 0;
629
0
    }
630
631
2.07k
    if (!PACKET_as_length_prefixed_2(pkt, &key_share_list)) {
632
51
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
633
51
        return 0;
634
51
    }
635
636
    /* Get our list of supported groups */
637
2.02k
    tls1_get_supported_groups(s, &srvrgroups, &srvr_num_groups);
638
    /* Get the clients list of supported groups. */
639
2.02k
    tls1_get_peer_groups(s, &clntgroups, &clnt_num_groups);
640
2.02k
    if (clnt_num_groups == 0) {
641
        /*
642
         * This can only happen if the supported_groups extension was not sent,
643
         * because we verify that the length is non-zero when we process that
644
         * extension.
645
         */
646
3
        SSLfatal(s, SSL_AD_MISSING_EXTENSION,
647
3
            SSL_R_MISSING_SUPPORTED_GROUPS_EXTENSION);
648
3
        return 0;
649
3
    }
650
651
2.02k
    if (s->s3.group_id != 0 && PACKET_remaining(&key_share_list) == 0) {
652
        /*
653
         * If we set a group_id already, then we must have sent an HRR
654
         * requesting a new key_share. If we haven't got one then that is an
655
         * error
656
         */
657
3
        SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE);
658
3
        return 0;
659
3
    }
660
661
4.23k
    while (PACKET_remaining(&key_share_list) > 0) {
662
2.41k
        if (!PACKET_get_net_2(&key_share_list, &group_id)
663
2.41k
            || !PACKET_get_length_prefixed_2(&key_share_list, &encoded_pt)
664
2.35k
            || PACKET_remaining(&encoded_pt) == 0) {
665
70
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
666
70
            return 0;
667
70
        }
668
669
        /*
670
         * If we already found a suitable key_share we loop through the
671
         * rest to verify the structure, but don't process them.
672
         */
673
2.34k
        if (found)
674
217
            continue;
675
676
        /*
677
         * If we sent an HRR then the key_share sent back MUST be for the group
678
         * we requested, and must be the only key_share sent.
679
         */
680
2.12k
        if (s->s3.group_id != 0
681
100
            && (group_id != s->s3.group_id
682
64
                || PACKET_remaining(&key_share_list) != 0)) {
683
39
            SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE);
684
39
            return 0;
685
39
        }
686
687
        /* Check if this share is in supported_groups sent from client */
688
2.08k
        if (!check_in_list(s, group_id, clntgroups, clnt_num_groups, 0)) {
689
32
            SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_KEY_SHARE);
690
32
            return 0;
691
32
        }
692
693
        /* Check if this share is for a group we can use */
694
2.05k
        if (!check_in_list(s, group_id, srvrgroups, srvr_num_groups, 1)
695
1.48k
            || !tls_group_allowed(s, group_id, SSL_SECOP_CURVE_SUPPORTED)
696
            /*
697
             * We tolerate but ignore a group id that we don't think is
698
             * suitable for TLSv1.3
699
             */
700
1.48k
            || !tls_valid_group(s, group_id, TLS1_3_VERSION, TLS1_3_VERSION,
701
1.48k
                0, NULL)) {
702
            /* Share not suitable */
703
571
            continue;
704
571
        }
705
706
1.48k
        s->s3.group_id = group_id;
707
        /* Cache the selected group ID in the SSL_SESSION */
708
1.48k
        s->session->kex_group = group_id;
709
710
1.48k
        if ((s->s3.peer_tmp = ssl_generate_param_group(s, group_id)) == NULL) {
711
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR,
712
0
                SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS);
713
0
            return 0;
714
0
        }
715
716
1.48k
        if (tls13_set_encoded_pub_key(s->s3.peer_tmp,
717
1.48k
                PACKET_data(&encoded_pt),
718
1.48k
                PACKET_remaining(&encoded_pt))
719
1.48k
            <= 0) {
720
53
            SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_ECPOINT);
721
53
            return 0;
722
53
        }
723
724
1.43k
        found = 1;
725
1.43k
    }
726
1.82k
#endif
727
728
1.82k
    return 1;
729
2.01k
}
730
731
int tls_parse_ctos_cookie(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
732
    X509 *x, size_t chainidx)
733
75
{
734
75
#ifndef OPENSSL_NO_TLS1_3
735
75
    unsigned int format, version, key_share, group_id;
736
75
    EVP_MD_CTX *hctx;
737
75
    EVP_PKEY *pkey;
738
75
    PACKET cookie, raw, chhash, appcookie;
739
75
    WPACKET hrrpkt;
740
75
    const unsigned char *data, *mdin, *ciphdata;
741
75
    unsigned char hmac[SHA256_DIGEST_LENGTH];
742
75
    unsigned char hrr[MAX_HRR_SIZE];
743
75
    size_t rawlen, hmaclen, hrrlen, ciphlen;
744
75
    uint64_t tm, now;
745
75
    SSL *ssl = SSL_CONNECTION_GET_SSL(s);
746
75
    SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
747
748
    /* Ignore any cookie if we're not set up to verify it */
749
75
    if (sctx->verify_stateless_cookie_cb == NULL
750
0
        || (s->s3.flags & TLS1_FLAGS_STATELESS) == 0)
751
75
        return 1;
752
753
0
    if (!PACKET_as_length_prefixed_2(pkt, &cookie)) {
754
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
755
0
        return 0;
756
0
    }
757
758
0
    raw = cookie;
759
0
    data = PACKET_data(&raw);
760
0
    rawlen = PACKET_remaining(&raw);
761
0
    if (rawlen < SHA256_DIGEST_LENGTH
762
0
        || !PACKET_forward(&raw, rawlen - SHA256_DIGEST_LENGTH)) {
763
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
764
0
        return 0;
765
0
    }
766
0
    mdin = PACKET_data(&raw);
767
768
    /* Verify the HMAC of the cookie */
769
0
    hctx = EVP_MD_CTX_create();
770
0
    pkey = EVP_PKEY_new_raw_private_key_ex(sctx->libctx, "HMAC",
771
0
        sctx->propq,
772
0
        s->session_ctx->ext.cookie_hmac_key,
773
0
        sizeof(s->session_ctx->ext.cookie_hmac_key));
774
0
    if (hctx == NULL || pkey == NULL) {
775
0
        EVP_MD_CTX_free(hctx);
776
0
        EVP_PKEY_free(pkey);
777
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
778
0
        return 0;
779
0
    }
780
781
0
    hmaclen = SHA256_DIGEST_LENGTH;
782
0
    if (EVP_DigestSignInit_ex(hctx, NULL, "SHA2-256", sctx->libctx,
783
0
            sctx->propq, pkey, NULL)
784
0
            <= 0
785
0
        || EVP_DigestSign(hctx, hmac, &hmaclen, data,
786
0
               rawlen - SHA256_DIGEST_LENGTH)
787
0
            <= 0
788
0
        || hmaclen != SHA256_DIGEST_LENGTH) {
789
0
        EVP_MD_CTX_free(hctx);
790
0
        EVP_PKEY_free(pkey);
791
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
792
0
        return 0;
793
0
    }
794
795
0
    EVP_MD_CTX_free(hctx);
796
0
    EVP_PKEY_free(pkey);
797
798
0
    if (CRYPTO_memcmp(hmac, mdin, SHA256_DIGEST_LENGTH) != 0) {
799
0
        SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_COOKIE_MISMATCH);
800
0
        return 0;
801
0
    }
802
803
0
    if (!PACKET_get_net_2(&cookie, &format)) {
804
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
805
0
        return 0;
806
0
    }
807
    /* Check the cookie format is something we recognise. Ignore it if not */
808
0
    if (format != COOKIE_STATE_FORMAT_VERSION)
809
0
        return 1;
810
811
    /*
812
     * The rest of these checks really shouldn't fail since we have verified the
813
     * HMAC above.
814
     */
815
816
    /* Check the version number is sane */
817
0
    if (!PACKET_get_net_2(&cookie, &version)) {
818
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
819
0
        return 0;
820
0
    }
821
0
    if (version != TLS1_3_VERSION) {
822
0
        SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER,
823
0
            SSL_R_BAD_PROTOCOL_VERSION_NUMBER);
824
0
        return 0;
825
0
    }
826
827
0
    if (!PACKET_get_net_2(&cookie, &group_id)) {
828
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
829
0
        return 0;
830
0
    }
831
832
0
    ciphdata = PACKET_data(&cookie);
833
0
    if (!PACKET_forward(&cookie, 2)) {
834
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
835
0
        return 0;
836
0
    }
837
0
    if (group_id != s->s3.group_id
838
0
        || s->s3.tmp.new_cipher
839
0
            != ssl_get_cipher_by_char(s, ciphdata, 0)) {
840
        /*
841
         * We chose a different cipher or group id this time around to what is
842
         * in the cookie. Something must have changed.
843
         */
844
0
        SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_CIPHER);
845
0
        return 0;
846
0
    }
847
848
0
    if (!PACKET_get_1(&cookie, &key_share)
849
0
        || !PACKET_get_net_8(&cookie, &tm)
850
0
        || !PACKET_get_length_prefixed_2(&cookie, &chhash)
851
0
        || !PACKET_get_length_prefixed_1(&cookie, &appcookie)
852
0
        || PACKET_remaining(&cookie) != SHA256_DIGEST_LENGTH) {
853
0
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
854
0
        return 0;
855
0
    }
856
857
    /* We tolerate a cookie age of up to 10 minutes (= 60 * 10 seconds) */
858
0
    now = time(NULL);
859
0
    if (tm > now || (now - tm) > 600) {
860
        /* Cookie is stale. Ignore it */
861
0
        return 1;
862
0
    }
863
864
    /* Verify the app cookie */
865
0
    if (sctx->verify_stateless_cookie_cb(SSL_CONNECTION_GET_USER_SSL(s),
866
0
            PACKET_data(&appcookie),
867
0
            PACKET_remaining(&appcookie))
868
0
        == 0) {
869
0
        SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_COOKIE_MISMATCH);
870
0
        return 0;
871
0
    }
872
873
    /*
874
     * Reconstruct the HRR that we would have sent in response to the original
875
     * ClientHello so we can add it to the transcript hash.
876
     * Note: This won't work with custom HRR extensions
877
     */
878
0
    if (!WPACKET_init_static_len(&hrrpkt, hrr, sizeof(hrr), 0)) {
879
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
880
0
        return 0;
881
0
    }
882
0
    if (!WPACKET_put_bytes_u8(&hrrpkt, SSL3_MT_SERVER_HELLO)
883
0
        || !WPACKET_start_sub_packet_u24(&hrrpkt)
884
0
        || !WPACKET_put_bytes_u16(&hrrpkt, TLS1_2_VERSION)
885
0
        || !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE)
886
0
        || !WPACKET_sub_memcpy_u8(&hrrpkt, s->tmp_session_id,
887
0
            s->tmp_session_id_len)
888
0
        || !ssl->method->put_cipher_by_char(s->s3.tmp.new_cipher, &hrrpkt,
889
0
            &ciphlen)
890
0
        || !WPACKET_put_bytes_u8(&hrrpkt, 0)
891
0
        || !WPACKET_start_sub_packet_u16(&hrrpkt)) {
892
0
        WPACKET_cleanup(&hrrpkt);
893
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
894
0
        return 0;
895
0
    }
896
0
    if (!WPACKET_put_bytes_u16(&hrrpkt, TLSEXT_TYPE_supported_versions)
897
0
        || !WPACKET_start_sub_packet_u16(&hrrpkt)
898
0
        || !WPACKET_put_bytes_u16(&hrrpkt, s->version)
899
0
        || !WPACKET_close(&hrrpkt)) {
900
0
        WPACKET_cleanup(&hrrpkt);
901
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
902
0
        return 0;
903
0
    }
904
0
    if (key_share) {
905
0
        if (!WPACKET_put_bytes_u16(&hrrpkt, TLSEXT_TYPE_key_share)
906
0
            || !WPACKET_start_sub_packet_u16(&hrrpkt)
907
0
            || !WPACKET_put_bytes_u16(&hrrpkt, s->s3.group_id)
908
0
            || !WPACKET_close(&hrrpkt)) {
909
0
            WPACKET_cleanup(&hrrpkt);
910
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
911
0
            return 0;
912
0
        }
913
0
    }
914
0
    if (!WPACKET_put_bytes_u16(&hrrpkt, TLSEXT_TYPE_cookie)
915
0
        || !WPACKET_start_sub_packet_u16(&hrrpkt)
916
0
        || !WPACKET_sub_memcpy_u16(&hrrpkt, data, rawlen)
917
0
        || !WPACKET_close(&hrrpkt) /* cookie extension */
918
0
        || !WPACKET_close(&hrrpkt) /* extension block */
919
0
        || !WPACKET_close(&hrrpkt) /* message */
920
0
        || !WPACKET_get_total_written(&hrrpkt, &hrrlen)
921
0
        || !WPACKET_finish(&hrrpkt)) {
922
0
        WPACKET_cleanup(&hrrpkt);
923
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
924
0
        return 0;
925
0
    }
926
927
    /* Reconstruct the transcript hash */
928
0
    if (!create_synthetic_message_hash(s, PACKET_data(&chhash),
929
0
            PACKET_remaining(&chhash), hrr,
930
0
            hrrlen)) {
931
        /* SSLfatal() already called */
932
0
        return 0;
933
0
    }
934
935
    /* Act as if this ClientHello came after a HelloRetryRequest */
936
0
    s->hello_retry_request = SSL_HRR_PENDING;
937
938
0
    s->ext.cookieok = 1;
939
0
#endif
940
941
0
    return 1;
942
0
}
943
944
int tls_parse_ctos_supported_groups(SSL_CONNECTION *s, PACKET *pkt,
945
    unsigned int context,
946
    X509 *x, size_t chainidx)
947
19.8k
{
948
19.8k
    PACKET supported_groups_list;
949
950
    /* Each group is 2 bytes and we must have at least 1. */
951
19.8k
    if (!PACKET_as_length_prefixed_2(pkt, &supported_groups_list)
952
19.6k
        || PACKET_remaining(&supported_groups_list) == 0
953
19.6k
        || (PACKET_remaining(&supported_groups_list) % 2) != 0) {
954
276
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
955
276
        return 0;
956
276
    }
957
958
19.5k
    if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) {
959
19.4k
        OPENSSL_free(s->ext.peer_supportedgroups);
960
19.4k
        s->ext.peer_supportedgroups = NULL;
961
19.4k
        s->ext.peer_supportedgroups_len = 0;
962
19.4k
        if (!tls1_save_u16(&supported_groups_list,
963
19.4k
                &s->ext.peer_supportedgroups,
964
19.4k
                &s->ext.peer_supportedgroups_len)) {
965
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
966
0
            return 0;
967
0
        }
968
19.4k
    }
969
970
19.5k
    return 1;
971
19.5k
}
972
973
int tls_parse_ctos_ems(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
974
    X509 *x, size_t chainidx)
975
4.75k
{
976
    /* The extension must always be empty */
977
4.75k
    if (PACKET_remaining(pkt) != 0) {
978
16
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
979
16
        return 0;
980
16
    }
981
982
4.73k
    if (s->options & SSL_OP_NO_EXTENDED_MASTER_SECRET)
983
0
        return 1;
984
985
4.73k
    s->s3.flags |= TLS1_FLAGS_RECEIVED_EXTMS;
986
987
4.73k
    return 1;
988
4.73k
}
989
990
int tls_parse_ctos_early_data(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
991
    X509 *x, size_t chainidx)
992
2.61k
{
993
2.61k
    if (PACKET_remaining(pkt) != 0) {
994
7
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
995
7
        return 0;
996
7
    }
997
998
2.60k
    if (s->hello_retry_request != SSL_HRR_NONE) {
999
14
        SSLfatal(s, SSL_AD_ILLEGAL_PARAMETER, SSL_R_BAD_EXTENSION);
1000
14
        return 0;
1001
14
    }
1002
1003
2.59k
    return 1;
1004
2.60k
}
1005
1006
static SSL_TICKET_STATUS tls_get_stateful_ticket(SSL_CONNECTION *s, PACKET *tick,
1007
    SSL_SESSION **sess)
1008
0
{
1009
0
    SSL_SESSION *tmpsess = NULL;
1010
1011
0
    s->ext.ticket_expected = 1;
1012
1013
0
    switch (PACKET_remaining(tick)) {
1014
0
    case 0:
1015
0
        return SSL_TICKET_EMPTY;
1016
1017
0
    case SSL_MAX_SSL_SESSION_ID_LENGTH:
1018
0
        break;
1019
1020
0
    default:
1021
0
        return SSL_TICKET_NO_DECRYPT;
1022
0
    }
1023
1024
0
    tmpsess = lookup_sess_in_cache(s, PACKET_data(tick),
1025
0
        SSL_MAX_SSL_SESSION_ID_LENGTH);
1026
1027
0
    if (tmpsess == NULL)
1028
0
        return SSL_TICKET_NO_DECRYPT;
1029
1030
0
    *sess = tmpsess;
1031
0
    return SSL_TICKET_SUCCESS;
1032
0
}
1033
1034
int tls_parse_ctos_psk(SSL_CONNECTION *s, PACKET *pkt, unsigned int context,
1035
    X509 *x, size_t chainidx)
1036
114
{
1037
114
    PACKET identities, binders, binder;
1038
114
    size_t binderoffset, hashsize;
1039
114
    SSL_SESSION *sess = NULL;
1040
114
    unsigned int id, i, ext = 0;
1041
114
    const EVP_MD *md = NULL;
1042
114
    SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
1043
114
    SSL *ussl = SSL_CONNECTION_GET_USER_SSL(s);
1044
1045
    /*
1046
     * If we have no PSK kex mode that we recognise then we can't resume so
1047
     * ignore this extension
1048
     */
1049
114
    if ((s->ext.psk_kex_mode
1050
114
            & (TLSEXT_KEX_MODE_FLAG_KE | TLSEXT_KEX_MODE_FLAG_KE_DHE))
1051
114
        == 0)
1052
3
        return 1;
1053
1054
111
    if (!PACKET_get_length_prefixed_2(pkt, &identities)) {
1055
9
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
1056
9
        return 0;
1057
9
    }
1058
1059
102
    s->ext.ticket_expected = 0;
1060
207
    for (id = 0; PACKET_remaining(&identities) != 0; id++) {
1061
166
        PACKET identity;
1062
166
        unsigned long ticket_agel;
1063
166
        size_t idlen;
1064
1065
166
        if (!PACKET_get_length_prefixed_2(&identities, &identity)
1066
138
            || !PACKET_get_net_4(&identities, &ticket_agel)) {
1067
30
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
1068
30
            return 0;
1069
30
        }
1070
1071
136
        idlen = PACKET_remaining(&identity);
1072
136
        if (s->psk_find_session_cb != NULL
1073
0
            && !s->psk_find_session_cb(ussl, PACKET_data(&identity), idlen,
1074
0
                &sess)) {
1075
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_BAD_EXTENSION);
1076
0
            return 0;
1077
0
        }
1078
1079
136
#ifndef OPENSSL_NO_PSK
1080
136
        if (sess == NULL
1081
136
            && s->psk_server_callback != NULL
1082
0
            && idlen <= PSK_MAX_IDENTITY_LEN) {
1083
0
            char *pskid = NULL;
1084
0
            unsigned char pskdata[PSK_MAX_PSK_LEN];
1085
0
            unsigned int pskdatalen;
1086
1087
0
            if (!PACKET_strndup(&identity, &pskid)) {
1088
0
                SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1089
0
                return 0;
1090
0
            }
1091
0
            pskdatalen = s->psk_server_callback(ussl, pskid, pskdata,
1092
0
                sizeof(pskdata));
1093
0
            OPENSSL_free(pskid);
1094
0
            if (pskdatalen > PSK_MAX_PSK_LEN) {
1095
0
                SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1096
0
                return 0;
1097
0
            } else if (pskdatalen > 0) {
1098
0
                const SSL_CIPHER *cipher;
1099
0
                const unsigned char tls13_aes128gcmsha256_id[] = { 0x13, 0x01 };
1100
1101
                /*
1102
                 * We found a PSK using an old style callback. We don't know
1103
                 * the digest so we default to SHA256 as per the TLSv1.3 spec
1104
                 */
1105
0
                cipher = SSL_CIPHER_find(SSL_CONNECTION_GET_SSL(s),
1106
0
                    tls13_aes128gcmsha256_id);
1107
0
                if (cipher == NULL) {
1108
0
                    OPENSSL_cleanse(pskdata, pskdatalen);
1109
0
                    SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1110
0
                    return 0;
1111
0
                }
1112
1113
0
                sess = SSL_SESSION_new();
1114
0
                if (sess == NULL
1115
0
                    || !SSL_SESSION_set1_master_key(sess, pskdata,
1116
0
                        pskdatalen)
1117
0
                    || !SSL_SESSION_set_cipher(sess, cipher)
1118
0
                    || !SSL_SESSION_set_protocol_version(sess,
1119
0
                        TLS1_3_VERSION)) {
1120
0
                    OPENSSL_cleanse(pskdata, pskdatalen);
1121
0
                    SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1122
0
                    goto err;
1123
0
                }
1124
0
                OPENSSL_cleanse(pskdata, pskdatalen);
1125
0
            }
1126
0
        }
1127
136
#endif /* OPENSSL_NO_PSK */
1128
1129
136
        if (sess != NULL) {
1130
            /* We found a PSK */
1131
0
            SSL_SESSION *sesstmp = ssl_session_dup(sess, 0);
1132
1133
0
            if (sesstmp == NULL) {
1134
0
                SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1135
0
                goto err;
1136
0
            }
1137
0
            SSL_SESSION_free(sess);
1138
0
            sess = sesstmp;
1139
1140
            /*
1141
             * We've just been told to use this session for this context so
1142
             * make sure the sid_ctx matches up.
1143
             */
1144
0
            memcpy(sess->sid_ctx, s->sid_ctx, s->sid_ctx_length);
1145
0
            sess->sid_ctx_length = s->sid_ctx_length;
1146
0
            ext = 1;
1147
0
            if (id == 0)
1148
0
                s->ext.early_data_ok = 1;
1149
0
            s->ext.ticket_expected = 1;
1150
136
        } else {
1151
136
            OSSL_TIME t, age, expire;
1152
136
            int ret;
1153
1154
            /*
1155
             * If we are using anti-replay protection then we behave as if
1156
             * SSL_OP_NO_TICKET is set - we are caching tickets anyway so there
1157
             * is no point in using full stateless tickets.
1158
             */
1159
136
            if ((s->options & SSL_OP_NO_TICKET) != 0
1160
136
                || (s->max_early_data > 0
1161
0
                    && (s->options & SSL_OP_NO_ANTI_REPLAY) == 0))
1162
0
                ret = tls_get_stateful_ticket(s, &identity, &sess);
1163
136
            else
1164
136
                ret = tls_decrypt_ticket(s, PACKET_data(&identity),
1165
136
                    PACKET_remaining(&identity), NULL, 0,
1166
136
                    &sess);
1167
1168
136
            if (ret == SSL_TICKET_EMPTY) {
1169
2
                SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
1170
2
                return 0;
1171
2
            }
1172
1173
134
            if (ret == SSL_TICKET_FATAL_ERR_MALLOC
1174
134
                || ret == SSL_TICKET_FATAL_ERR_OTHER) {
1175
0
                SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1176
0
                return 0;
1177
0
            }
1178
134
            if (ret == SSL_TICKET_NONE || ret == SSL_TICKET_NO_DECRYPT)
1179
81
                continue;
1180
1181
            /* Check for replay */
1182
53
            if (s->max_early_data > 0
1183
0
                && (s->options & SSL_OP_NO_ANTI_REPLAY) == 0
1184
0
                && !SSL_CTX_remove_session(s->session_ctx, sess)) {
1185
0
                SSL_SESSION_free(sess);
1186
0
                sess = NULL;
1187
0
                continue;
1188
0
            }
1189
1190
53
            age = ossl_time_subtract(ossl_ms2time(ticket_agel),
1191
53
                ossl_ms2time(sess->ext.tick_age_add));
1192
53
            t = ossl_time_subtract(ossl_time_now(), sess->time);
1193
1194
            /*
1195
             * Although internally we use OSS_TIME which has ns granularity,
1196
             * when SSL_SESSION structures are serialised/deserialised we use
1197
             * second granularity for the sess->time field. Therefore it could
1198
             * appear that the client's ticket age is longer than ours (our
1199
             * ticket age calculation should always be slightly longer than the
1200
             * client's due to the network latency). Therefore we add 1000ms to
1201
             * our age calculation to adjust for rounding errors.
1202
             */
1203
53
            expire = ossl_time_add(t, ossl_ms2time(1000));
1204
1205
53
            if (id == 0
1206
50
                && ossl_time_compare(sess->timeout, t) >= 0
1207
24
                && ossl_time_compare(age, expire) <= 0
1208
19
                && ossl_time_compare(ossl_time_add(age, TICKET_AGE_ALLOWANCE),
1209
19
                       expire)
1210
19
                    >= 0) {
1211
                /*
1212
                 * Ticket age is within tolerance and not expired. We allow it
1213
                 * for early data
1214
                 */
1215
19
                s->ext.early_data_ok = 1;
1216
19
            }
1217
53
        }
1218
1219
53
        md = ssl_md(sctx, sess->cipher->algorithm2);
1220
53
        if (md == NULL) {
1221
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1222
0
            goto err;
1223
0
        }
1224
53
        if (!EVP_MD_is_a(md,
1225
53
                EVP_MD_get0_name(ssl_md(sctx,
1226
53
                    s->s3.tmp.new_cipher->algorithm2)))) {
1227
            /* The ciphersuite is not compatible with this session. */
1228
24
            SSL_SESSION_free(sess);
1229
24
            sess = NULL;
1230
24
            s->ext.early_data_ok = 0;
1231
24
            s->ext.ticket_expected = 0;
1232
24
            continue;
1233
24
        }
1234
29
        break;
1235
53
    }
1236
1237
70
    if (sess == NULL)
1238
41
        return 1;
1239
1240
29
    binderoffset = PACKET_data(pkt) - (const unsigned char *)s->init_buf->data;
1241
29
    hashsize = EVP_MD_get_size(md);
1242
1243
29
    if (!PACKET_get_length_prefixed_2(pkt, &binders)) {
1244
7
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
1245
7
        goto err;
1246
7
    }
1247
1248
41
    for (i = 0; i <= id; i++) {
1249
23
        if (!PACKET_get_length_prefixed_1(&binders, &binder)) {
1250
4
            SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
1251
4
            goto err;
1252
4
        }
1253
23
    }
1254
1255
18
    if (PACKET_remaining(&binder) != hashsize) {
1256
6
        SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
1257
6
        goto err;
1258
6
    }
1259
12
    if (tls_psk_do_binder(s, md, (const unsigned char *)s->init_buf->data,
1260
12
            binderoffset, PACKET_data(&binder), NULL, sess, 0,
1261
12
            ext)
1262
12
        != 1) {
1263
        /* SSLfatal() already called */
1264
11
        goto err;
1265
11
    }
1266
1267
1
    s->ext.tick_identity = id;
1268
1269
1
    SSL_SESSION_free(s->session);
1270
1
    s->session = sess;
1271
1
    return 1;
1272
28
err:
1273
28
    SSL_SESSION_free(sess);
1274
28
    return 0;
1275
12
}
1276
1277
int tls_parse_ctos_post_handshake_auth(SSL_CONNECTION *s, PACKET *pkt,
1278
    ossl_unused unsigned int context,
1279
    ossl_unused X509 *x,
1280
    ossl_unused size_t chainidx)
1281
160
{
1282
160
    if (PACKET_remaining(pkt) != 0) {
1283
11
        SSLfatal(s, SSL_AD_DECODE_ERROR,
1284
11
            SSL_R_POST_HANDSHAKE_AUTH_ENCODING_ERR);
1285
11
        return 0;
1286
11
    }
1287
1288
149
    s->post_handshake_auth = SSL_PHA_EXT_RECEIVED;
1289
1290
149
    return 1;
1291
160
}
1292
1293
/*
1294
 * Add the server's renegotiation binding
1295
 */
1296
EXT_RETURN tls_construct_stoc_renegotiate(SSL_CONNECTION *s, WPACKET *pkt,
1297
    unsigned int context, X509 *x,
1298
    size_t chainidx)
1299
25.2k
{
1300
25.2k
    if (!s->s3.send_connection_binding)
1301
17.4k
        return EXT_RETURN_NOT_SENT;
1302
1303
    /* Still add this even if SSL_OP_NO_RENEGOTIATION is set */
1304
7.76k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_renegotiate)
1305
7.76k
        || !WPACKET_start_sub_packet_u16(pkt)
1306
7.76k
        || !WPACKET_start_sub_packet_u8(pkt)
1307
7.76k
        || !WPACKET_memcpy(pkt, s->s3.previous_client_finished,
1308
7.76k
            s->s3.previous_client_finished_len)
1309
7.76k
        || !WPACKET_memcpy(pkt, s->s3.previous_server_finished,
1310
7.76k
            s->s3.previous_server_finished_len)
1311
7.76k
        || !WPACKET_close(pkt)
1312
7.76k
        || !WPACKET_close(pkt)) {
1313
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1314
0
        return EXT_RETURN_FAIL;
1315
0
    }
1316
1317
7.76k
    return EXT_RETURN_SENT;
1318
7.76k
}
1319
1320
EXT_RETURN tls_construct_stoc_server_name(SSL_CONNECTION *s, WPACKET *pkt,
1321
    unsigned int context, X509 *x,
1322
    size_t chainidx)
1323
28.1k
{
1324
28.1k
    if (s->servername_done != 1)
1325
28.1k
        return EXT_RETURN_NOT_SENT;
1326
1327
    /*
1328
     * Prior to TLSv1.3 we ignore any SNI in the current handshake if resuming.
1329
     * We just use the servername from the initial handshake.
1330
     */
1331
0
    if (s->hit && !SSL_CONNECTION_IS_TLS13(s))
1332
0
        return EXT_RETURN_NOT_SENT;
1333
1334
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_name)
1335
0
        || !WPACKET_put_bytes_u16(pkt, 0)) {
1336
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1337
0
        return EXT_RETURN_FAIL;
1338
0
    }
1339
1340
0
    return EXT_RETURN_SENT;
1341
0
}
1342
1343
/* Add/include the server's max fragment len extension into ServerHello */
1344
EXT_RETURN tls_construct_stoc_maxfragmentlen(SSL_CONNECTION *s, WPACKET *pkt,
1345
    unsigned int context, X509 *x,
1346
    size_t chainidx)
1347
28.1k
{
1348
28.1k
    if (!USE_MAX_FRAGMENT_LENGTH_EXT(s->session))
1349
27.0k
        return EXT_RETURN_NOT_SENT;
1350
1351
    /*-
1352
     * 4 bytes for this extension type and extension length
1353
     * 1 byte for the Max Fragment Length code value.
1354
     */
1355
1.08k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_max_fragment_length)
1356
1.08k
        || !WPACKET_start_sub_packet_u16(pkt)
1357
1.08k
        || !WPACKET_put_bytes_u8(pkt, s->session->ext.max_fragment_len_mode)
1358
1.08k
        || !WPACKET_close(pkt)) {
1359
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1360
0
        return EXT_RETURN_FAIL;
1361
0
    }
1362
1363
1.08k
    return EXT_RETURN_SENT;
1364
1.08k
}
1365
1366
EXT_RETURN tls_construct_stoc_ec_pt_formats(SSL_CONNECTION *s, WPACKET *pkt,
1367
    unsigned int context, X509 *x,
1368
    size_t chainidx)
1369
25.2k
{
1370
25.2k
    unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
1371
25.2k
    unsigned long alg_a = s->s3.tmp.new_cipher->algorithm_auth;
1372
25.2k
    int using_ecc = ((alg_k & SSL_kECDHE) || (alg_a & SSL_aECDSA))
1373
12.2k
        && (s->ext.peer_ecpointformats != NULL);
1374
25.2k
    const unsigned char *plist;
1375
25.2k
    size_t plistlen;
1376
1377
25.2k
    if (!using_ecc)
1378
21.7k
        return EXT_RETURN_NOT_SENT;
1379
1380
3.44k
    tls1_get_formatlist(s, &plist, &plistlen);
1381
3.44k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_ec_point_formats)
1382
3.44k
        || !WPACKET_start_sub_packet_u16(pkt)
1383
3.44k
        || !WPACKET_sub_memcpy_u8(pkt, plist, plistlen)
1384
3.44k
        || !WPACKET_close(pkt)) {
1385
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1386
0
        return EXT_RETURN_FAIL;
1387
0
    }
1388
1389
3.44k
    return EXT_RETURN_SENT;
1390
3.44k
}
1391
1392
EXT_RETURN tls_construct_stoc_supported_groups(SSL_CONNECTION *s, WPACKET *pkt,
1393
    unsigned int context, X509 *x,
1394
    size_t chainidx)
1395
28.1k
{
1396
28.1k
    const uint16_t *groups;
1397
28.1k
    size_t numgroups, i, first = 1;
1398
28.1k
    int version;
1399
1400
    /* s->s3.group_id is non zero if we accepted a key_share */
1401
28.1k
    if (s->s3.group_id == 0)
1402
25.2k
        return EXT_RETURN_NOT_SENT;
1403
1404
    /* Get our list of supported groups */
1405
2.88k
    tls1_get_supported_groups(s, &groups, &numgroups);
1406
2.88k
    if (numgroups == 0) {
1407
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1408
0
        return EXT_RETURN_FAIL;
1409
0
    }
1410
1411
    /* Copy group ID if supported */
1412
2.88k
    version = SSL_version(SSL_CONNECTION_GET_SSL(s));
1413
15.4k
    for (i = 0; i < numgroups; i++) {
1414
13.9k
        uint16_t group = groups[i];
1415
1416
13.9k
        if (tls_valid_group(s, group, version, version, 0, NULL)
1417
13.9k
            && tls_group_allowed(s, group, SSL_SECOP_CURVE_SUPPORTED)) {
1418
13.9k
            if (first) {
1419
                /*
1420
                 * Check if the client is already using our preferred group. If
1421
                 * so we don't need to add this extension
1422
                 */
1423
2.88k
                if (s->s3.group_id == group)
1424
1.32k
                    return EXT_RETURN_NOT_SENT;
1425
1426
                /* Add extension header */
1427
1.56k
                if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_groups)
1428
                    /* Sub-packet for supported_groups extension */
1429
1.56k
                    || !WPACKET_start_sub_packet_u16(pkt)
1430
1.56k
                    || !WPACKET_start_sub_packet_u16(pkt)) {
1431
0
                    SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1432
0
                    return EXT_RETURN_FAIL;
1433
0
                }
1434
1435
1.56k
                first = 0;
1436
1.56k
            }
1437
12.5k
            if (!WPACKET_put_bytes_u16(pkt, group)) {
1438
0
                SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1439
0
                return EXT_RETURN_FAIL;
1440
0
            }
1441
12.5k
        }
1442
13.9k
    }
1443
1444
1.56k
    if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
1445
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1446
0
        return EXT_RETURN_FAIL;
1447
0
    }
1448
1449
1.56k
    return EXT_RETURN_SENT;
1450
1.56k
}
1451
1452
EXT_RETURN tls_construct_stoc_session_ticket(SSL_CONNECTION *s, WPACKET *pkt,
1453
    unsigned int context, X509 *x,
1454
    size_t chainidx)
1455
25.2k
{
1456
25.2k
    if (!s->ext.ticket_expected || !tls_use_ticket(s)) {
1457
20.0k
        s->ext.ticket_expected = 0;
1458
20.0k
        return EXT_RETURN_NOT_SENT;
1459
20.0k
    }
1460
1461
5.20k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_session_ticket)
1462
5.20k
        || !WPACKET_put_bytes_u16(pkt, 0)) {
1463
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1464
0
        return EXT_RETURN_FAIL;
1465
0
    }
1466
1467
5.20k
    return EXT_RETURN_SENT;
1468
5.20k
}
1469
1470
#ifndef OPENSSL_NO_OCSP
1471
EXT_RETURN tls_construct_stoc_status_request(SSL_CONNECTION *s, WPACKET *pkt,
1472
    unsigned int context, X509 *x,
1473
    size_t chainidx)
1474
18.1k
{
1475
    /* We don't currently support this extension inside a CertificateRequest */
1476
18.1k
    if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST)
1477
0
        return EXT_RETURN_NOT_SENT;
1478
1479
18.1k
    if (!s->ext.status_expected)
1480
18.1k
        return EXT_RETURN_NOT_SENT;
1481
1482
0
    if (SSL_CONNECTION_IS_TLS13(s) && chainidx != 0)
1483
0
        return EXT_RETURN_NOT_SENT;
1484
1485
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_status_request)
1486
0
        || !WPACKET_start_sub_packet_u16(pkt)) {
1487
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1488
0
        return EXT_RETURN_FAIL;
1489
0
    }
1490
1491
    /*
1492
     * In TLSv1.3 we include the certificate status itself. In <= TLSv1.2 we
1493
     * send back an empty extension, with the certificate status appearing as a
1494
     * separate message
1495
     */
1496
0
    if (SSL_CONNECTION_IS_TLS13(s) && !tls_construct_cert_status_body(s, pkt)) {
1497
        /* SSLfatal() already called */
1498
0
        return EXT_RETURN_FAIL;
1499
0
    }
1500
0
    if (!WPACKET_close(pkt)) {
1501
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1502
0
        return EXT_RETURN_FAIL;
1503
0
    }
1504
1505
0
    return EXT_RETURN_SENT;
1506
0
}
1507
#endif
1508
1509
#ifndef OPENSSL_NO_NEXTPROTONEG
1510
EXT_RETURN tls_construct_stoc_next_proto_neg(SSL_CONNECTION *s, WPACKET *pkt,
1511
    unsigned int context, X509 *x,
1512
    size_t chainidx)
1513
25.2k
{
1514
25.2k
    const unsigned char *npa;
1515
25.2k
    unsigned int npalen;
1516
25.2k
    int ret;
1517
25.2k
    int npn_seen = s->s3.npn_seen;
1518
25.2k
    SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
1519
1520
25.2k
    s->s3.npn_seen = 0;
1521
25.2k
    if (!npn_seen || sctx->ext.npn_advertised_cb == NULL)
1522
25.2k
        return EXT_RETURN_NOT_SENT;
1523
1524
0
    ret = sctx->ext.npn_advertised_cb(SSL_CONNECTION_GET_USER_SSL(s), &npa,
1525
0
        &npalen, sctx->ext.npn_advertised_cb_arg);
1526
0
    if (ret == SSL_TLSEXT_ERR_OK) {
1527
0
        if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_next_proto_neg)
1528
0
            || !WPACKET_sub_memcpy_u16(pkt, npa, npalen)) {
1529
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1530
0
            return EXT_RETURN_FAIL;
1531
0
        }
1532
0
        s->s3.npn_seen = 1;
1533
0
        return EXT_RETURN_SENT;
1534
0
    }
1535
1536
0
    return EXT_RETURN_NOT_SENT;
1537
0
}
1538
#endif
1539
1540
EXT_RETURN tls_construct_stoc_alpn(SSL_CONNECTION *s, WPACKET *pkt, unsigned int context,
1541
    X509 *x, size_t chainidx)
1542
28.1k
{
1543
28.1k
    if (s->s3.alpn_selected == NULL)
1544
28.1k
        return EXT_RETURN_NOT_SENT;
1545
1546
0
    if (!WPACKET_put_bytes_u16(pkt,
1547
0
            TLSEXT_TYPE_application_layer_protocol_negotiation)
1548
0
        || !WPACKET_start_sub_packet_u16(pkt)
1549
0
        || !WPACKET_start_sub_packet_u16(pkt)
1550
0
        || !WPACKET_sub_memcpy_u8(pkt, s->s3.alpn_selected,
1551
0
            s->s3.alpn_selected_len)
1552
0
        || !WPACKET_close(pkt)
1553
0
        || !WPACKET_close(pkt)) {
1554
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1555
0
        return EXT_RETURN_FAIL;
1556
0
    }
1557
1558
0
    return EXT_RETURN_SENT;
1559
0
}
1560
1561
#ifndef OPENSSL_NO_SRTP
1562
EXT_RETURN tls_construct_stoc_use_srtp(SSL_CONNECTION *s, WPACKET *pkt,
1563
    unsigned int context, X509 *x,
1564
    size_t chainidx)
1565
28.1k
{
1566
28.1k
    if (s->srtp_profile == NULL)
1567
28.1k
        return EXT_RETURN_NOT_SENT;
1568
1569
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_use_srtp)
1570
0
        || !WPACKET_start_sub_packet_u16(pkt)
1571
0
        || !WPACKET_put_bytes_u16(pkt, 2)
1572
0
        || !WPACKET_put_bytes_u16(pkt, s->srtp_profile->id)
1573
0
        || !WPACKET_put_bytes_u8(pkt, 0)
1574
0
        || !WPACKET_close(pkt)) {
1575
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1576
0
        return EXT_RETURN_FAIL;
1577
0
    }
1578
1579
0
    return EXT_RETURN_SENT;
1580
0
}
1581
#endif
1582
1583
EXT_RETURN tls_construct_stoc_etm(SSL_CONNECTION *s, WPACKET *pkt,
1584
    unsigned int context,
1585
    X509 *x, size_t chainidx)
1586
25.2k
{
1587
25.2k
    if (!s->ext.use_etm)
1588
23.7k
        return EXT_RETURN_NOT_SENT;
1589
1590
    /*
1591
     * Don't use encrypt_then_mac if AEAD or RC4 might want to disable
1592
     * for other cases too.
1593
     */
1594
1.46k
    if (s->s3.tmp.new_cipher->algorithm_mac == SSL_AEAD
1595
1.17k
        || s->s3.tmp.new_cipher->algorithm_enc == SSL_RC4
1596
1.17k
        || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT
1597
1.17k
        || s->s3.tmp.new_cipher->algorithm_enc == SSL_eGOST2814789CNT12
1598
1.17k
        || s->s3.tmp.new_cipher->algorithm_enc == SSL_MAGMA
1599
1.17k
        || s->s3.tmp.new_cipher->algorithm_enc == SSL_KUZNYECHIK) {
1600
283
        s->ext.use_etm = 0;
1601
283
        return EXT_RETURN_NOT_SENT;
1602
283
    }
1603
1604
1.17k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_encrypt_then_mac)
1605
1.17k
        || !WPACKET_put_bytes_u16(pkt, 0)) {
1606
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1607
0
        return EXT_RETURN_FAIL;
1608
0
    }
1609
1610
1.17k
    return EXT_RETURN_SENT;
1611
1.17k
}
1612
1613
EXT_RETURN tls_construct_stoc_ems(SSL_CONNECTION *s, WPACKET *pkt,
1614
    unsigned int context,
1615
    X509 *x, size_t chainidx)
1616
25.2k
{
1617
25.2k
    if ((s->s3.flags & TLS1_FLAGS_RECEIVED_EXTMS) == 0)
1618
21.2k
        return EXT_RETURN_NOT_SENT;
1619
1620
4.00k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_extended_master_secret)
1621
4.00k
        || !WPACKET_put_bytes_u16(pkt, 0)) {
1622
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1623
0
        return EXT_RETURN_FAIL;
1624
0
    }
1625
1626
4.00k
    return EXT_RETURN_SENT;
1627
4.00k
}
1628
1629
EXT_RETURN tls_construct_stoc_supported_versions(SSL_CONNECTION *s, WPACKET *pkt,
1630
    unsigned int context, X509 *x,
1631
    size_t chainidx)
1632
3.62k
{
1633
3.62k
    if (!ossl_assert(SSL_CONNECTION_IS_TLS13(s))) {
1634
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1635
0
        return EXT_RETURN_FAIL;
1636
0
    }
1637
1638
3.62k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_versions)
1639
3.62k
        || !WPACKET_start_sub_packet_u16(pkt)
1640
3.62k
        || !WPACKET_put_bytes_u16(pkt, s->version)
1641
3.62k
        || !WPACKET_close(pkt)) {
1642
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1643
0
        return EXT_RETURN_FAIL;
1644
0
    }
1645
1646
3.62k
    return EXT_RETURN_SENT;
1647
3.62k
}
1648
1649
EXT_RETURN tls_construct_stoc_key_share(SSL_CONNECTION *s, WPACKET *pkt,
1650
    unsigned int context, X509 *x,
1651
    size_t chainidx)
1652
3.62k
{
1653
3.62k
#ifndef OPENSSL_NO_TLS1_3
1654
3.62k
    unsigned char *encodedPoint;
1655
3.62k
    size_t encoded_pt_len = 0;
1656
3.62k
    EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL;
1657
3.62k
    const TLS_GROUP_INFO *ginf = NULL;
1658
1659
3.62k
    if (s->hello_retry_request == SSL_HRR_PENDING) {
1660
714
        if (ckey != NULL) {
1661
            /* Original key_share was acceptable so don't ask for another one */
1662
0
            return EXT_RETURN_NOT_SENT;
1663
0
        }
1664
714
        if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_key_share)
1665
714
            || !WPACKET_start_sub_packet_u16(pkt)
1666
714
            || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)
1667
714
            || !WPACKET_close(pkt)) {
1668
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1669
0
            return EXT_RETURN_FAIL;
1670
0
        }
1671
1672
714
        return EXT_RETURN_SENT;
1673
714
    }
1674
1675
2.90k
    if (ckey == NULL) {
1676
        /* No key_share received from client - must be resuming */
1677
0
        if (!s->hit || !tls13_generate_handshake_secret(s, NULL, 0)) {
1678
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1679
0
            return EXT_RETURN_FAIL;
1680
0
        }
1681
0
        return EXT_RETURN_NOT_SENT;
1682
0
    }
1683
1684
2.90k
    if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) {
1685
        /*
1686
         * PSK ('hit') and explicitly not doing DHE. If the client sent the
1687
         * DHE option, we take it by default, except if non-DHE would be
1688
         * preferred by config, but this case would have been handled in
1689
         * tls_parse_ctos_psk_kex_modes().
1690
         */
1691
0
        return EXT_RETURN_NOT_SENT;
1692
0
    }
1693
1694
2.90k
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_key_share)
1695
2.90k
        || !WPACKET_start_sub_packet_u16(pkt)
1696
2.90k
        || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)) {
1697
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1698
0
        return EXT_RETURN_FAIL;
1699
0
    }
1700
1701
2.90k
    if ((ginf = tls1_group_id_lookup(SSL_CONNECTION_GET_CTX(s),
1702
2.90k
             s->s3.group_id))
1703
2.90k
        == NULL) {
1704
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1705
0
        return EXT_RETURN_FAIL;
1706
0
    }
1707
1708
2.90k
    if (!ginf->is_kem) {
1709
        /* Regular KEX */
1710
2.89k
        skey = ssl_generate_pkey(s, ckey);
1711
2.89k
        if (skey == NULL) {
1712
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_SSL_LIB);
1713
0
            return EXT_RETURN_FAIL;
1714
0
        }
1715
1716
        /* Generate encoding of server key */
1717
2.89k
        encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint);
1718
2.89k
        if (encoded_pt_len == 0) {
1719
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EC_LIB);
1720
0
            EVP_PKEY_free(skey);
1721
0
            return EXT_RETURN_FAIL;
1722
0
        }
1723
1724
2.89k
        if (!WPACKET_sub_memcpy_u16(pkt, encodedPoint, encoded_pt_len)
1725
2.89k
            || !WPACKET_close(pkt)) {
1726
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1727
0
            EVP_PKEY_free(skey);
1728
0
            OPENSSL_free(encodedPoint);
1729
0
            return EXT_RETURN_FAIL;
1730
0
        }
1731
2.89k
        OPENSSL_free(encodedPoint);
1732
1733
        /*
1734
         * This causes the crypto state to be updated based on the derived keys
1735
         */
1736
2.89k
        s->s3.tmp.pkey = skey;
1737
2.89k
        if (ssl_derive(s, skey, ckey, 1) == 0) {
1738
            /* SSLfatal() already called */
1739
19
            return EXT_RETURN_FAIL;
1740
19
        }
1741
2.89k
    } else {
1742
        /* KEM mode */
1743
19
        unsigned char *ct = NULL;
1744
19
        size_t ctlen = 0;
1745
1746
        /*
1747
         * This does not update the crypto state.
1748
         *
1749
         * The generated pms is stored in `s->s3.tmp.pms` to be later used via
1750
         * ssl_gensecret().
1751
         */
1752
19
        if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) {
1753
            /* SSLfatal() already called */
1754
5
            return EXT_RETURN_FAIL;
1755
5
        }
1756
1757
14
        if (ctlen == 0) {
1758
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1759
0
            OPENSSL_free(ct);
1760
0
            return EXT_RETURN_FAIL;
1761
0
        }
1762
1763
14
        if (!WPACKET_sub_memcpy_u16(pkt, ct, ctlen)
1764
14
            || !WPACKET_close(pkt)) {
1765
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1766
0
            OPENSSL_free(ct);
1767
0
            return EXT_RETURN_FAIL;
1768
0
        }
1769
14
        OPENSSL_free(ct);
1770
1771
        /*
1772
         * This causes the crypto state to be updated based on the generated pms
1773
         */
1774
14
        if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) {
1775
            /* SSLfatal() already called */
1776
0
            return EXT_RETURN_FAIL;
1777
0
        }
1778
14
    }
1779
2.88k
    s->s3.did_kex = 1;
1780
2.88k
    return EXT_RETURN_SENT;
1781
#else
1782
    return EXT_RETURN_FAIL;
1783
#endif
1784
2.90k
}
1785
1786
EXT_RETURN tls_construct_stoc_cookie(SSL_CONNECTION *s, WPACKET *pkt,
1787
    unsigned int context,
1788
    X509 *x, size_t chainidx)
1789
714
{
1790
714
#ifndef OPENSSL_NO_TLS1_3
1791
714
    unsigned char *hashval1, *hashval2, *appcookie1, *appcookie2, *cookie;
1792
714
    unsigned char *hmac, *hmac2;
1793
714
    size_t startlen, ciphlen, totcookielen, hashlen, hmaclen, appcookielen;
1794
714
    EVP_MD_CTX *hctx;
1795
714
    EVP_PKEY *pkey;
1796
714
    int ret = EXT_RETURN_FAIL;
1797
714
    SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
1798
714
    SSL *ssl = SSL_CONNECTION_GET_SSL(s);
1799
714
    SSL *ussl = SSL_CONNECTION_GET_USER_SSL(s);
1800
1801
714
    if ((s->s3.flags & TLS1_FLAGS_STATELESS) == 0)
1802
714
        return EXT_RETURN_NOT_SENT;
1803
1804
0
    if (sctx->gen_stateless_cookie_cb == NULL) {
1805
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_NO_COOKIE_CALLBACK_SET);
1806
0
        return EXT_RETURN_FAIL;
1807
0
    }
1808
1809
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_cookie)
1810
0
        || !WPACKET_start_sub_packet_u16(pkt)
1811
0
        || !WPACKET_start_sub_packet_u16(pkt)
1812
0
        || !WPACKET_get_total_written(pkt, &startlen)
1813
0
        || !WPACKET_reserve_bytes(pkt, MAX_COOKIE_SIZE, &cookie)
1814
0
        || !WPACKET_put_bytes_u16(pkt, COOKIE_STATE_FORMAT_VERSION)
1815
0
        || !WPACKET_put_bytes_u16(pkt, TLS1_3_VERSION)
1816
0
        || !WPACKET_put_bytes_u16(pkt, s->s3.group_id)
1817
0
        || !ssl->method->put_cipher_by_char(s->s3.tmp.new_cipher, pkt,
1818
0
            &ciphlen)
1819
        /* Is there a key_share extension present in this HRR? */
1820
0
        || !WPACKET_put_bytes_u8(pkt, s->s3.peer_tmp == NULL)
1821
0
        || !WPACKET_put_bytes_u64(pkt, time(NULL))
1822
0
        || !WPACKET_start_sub_packet_u16(pkt)
1823
0
        || !WPACKET_reserve_bytes(pkt, EVP_MAX_MD_SIZE, &hashval1)) {
1824
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1825
0
        return EXT_RETURN_FAIL;
1826
0
    }
1827
1828
    /*
1829
     * Get the hash of the initial ClientHello. ssl_handshake_hash() operates
1830
     * on raw buffers, so we first reserve sufficient bytes (above) and then
1831
     * subsequently allocate them (below)
1832
     */
1833
0
    if (!ssl3_digest_cached_records(s, 0)
1834
0
        || !ssl_handshake_hash(s, hashval1, EVP_MAX_MD_SIZE, &hashlen)) {
1835
        /* SSLfatal() already called */
1836
0
        return EXT_RETURN_FAIL;
1837
0
    }
1838
1839
0
    if (!WPACKET_allocate_bytes(pkt, hashlen, &hashval2)
1840
0
        || !ossl_assert(hashval1 == hashval2)
1841
0
        || !WPACKET_close(pkt)
1842
0
        || !WPACKET_start_sub_packet_u8(pkt)
1843
0
        || !WPACKET_reserve_bytes(pkt, SSL_COOKIE_LENGTH, &appcookie1)) {
1844
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1845
0
        return EXT_RETURN_FAIL;
1846
0
    }
1847
1848
    /* Generate the application cookie */
1849
0
    if (sctx->gen_stateless_cookie_cb(ussl, appcookie1,
1850
0
            &appcookielen)
1851
0
        == 0) {
1852
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_R_COOKIE_GEN_CALLBACK_FAILURE);
1853
0
        return EXT_RETURN_FAIL;
1854
0
    }
1855
1856
0
    if (!WPACKET_allocate_bytes(pkt, appcookielen, &appcookie2)
1857
0
        || !ossl_assert(appcookie1 == appcookie2)
1858
0
        || !WPACKET_close(pkt)
1859
0
        || !WPACKET_get_total_written(pkt, &totcookielen)
1860
0
        || !WPACKET_reserve_bytes(pkt, SHA256_DIGEST_LENGTH, &hmac)) {
1861
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1862
0
        return EXT_RETURN_FAIL;
1863
0
    }
1864
0
    hmaclen = SHA256_DIGEST_LENGTH;
1865
1866
0
    totcookielen -= startlen;
1867
0
    if (!ossl_assert(totcookielen <= MAX_COOKIE_SIZE - SHA256_DIGEST_LENGTH)) {
1868
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1869
0
        return EXT_RETURN_FAIL;
1870
0
    }
1871
1872
    /* HMAC the cookie */
1873
0
    hctx = EVP_MD_CTX_create();
1874
0
    pkey = EVP_PKEY_new_raw_private_key_ex(sctx->libctx, "HMAC",
1875
0
        sctx->propq,
1876
0
        s->session_ctx->ext.cookie_hmac_key,
1877
0
        sizeof(s->session_ctx->ext.cookie_hmac_key));
1878
0
    if (hctx == NULL || pkey == NULL) {
1879
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
1880
0
        goto err;
1881
0
    }
1882
1883
0
    if (EVP_DigestSignInit_ex(hctx, NULL, "SHA2-256", sctx->libctx,
1884
0
            sctx->propq, pkey, NULL)
1885
0
            <= 0
1886
0
        || EVP_DigestSign(hctx, hmac, &hmaclen, cookie,
1887
0
               totcookielen)
1888
0
            <= 0) {
1889
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1890
0
        goto err;
1891
0
    }
1892
1893
0
    if (!ossl_assert(totcookielen + hmaclen <= MAX_COOKIE_SIZE)) {
1894
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1895
0
        goto err;
1896
0
    }
1897
1898
0
    if (!WPACKET_allocate_bytes(pkt, hmaclen, &hmac2)
1899
0
        || !ossl_assert(hmac == hmac2)
1900
0
        || !ossl_assert(cookie == hmac - totcookielen)
1901
0
        || !WPACKET_close(pkt)
1902
0
        || !WPACKET_close(pkt)) {
1903
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1904
0
        goto err;
1905
0
    }
1906
1907
0
    ret = EXT_RETURN_SENT;
1908
1909
0
err:
1910
0
    EVP_MD_CTX_free(hctx);
1911
0
    EVP_PKEY_free(pkey);
1912
0
    return ret;
1913
#else
1914
    return EXT_RETURN_FAIL;
1915
#endif
1916
0
}
1917
1918
EXT_RETURN tls_construct_stoc_cryptopro_bug(SSL_CONNECTION *s, WPACKET *pkt,
1919
    unsigned int context, X509 *x,
1920
    size_t chainidx)
1921
25.2k
{
1922
25.2k
    const unsigned char cryptopro_ext[36] = {
1923
25.2k
        0xfd, 0xe8, /* 65000 */
1924
25.2k
        0x00, 0x20, /* 32 bytes length */
1925
25.2k
        0x30, 0x1e, 0x30, 0x08, 0x06, 0x06, 0x2a, 0x85,
1926
25.2k
        0x03, 0x02, 0x02, 0x09, 0x30, 0x08, 0x06, 0x06,
1927
25.2k
        0x2a, 0x85, 0x03, 0x02, 0x02, 0x16, 0x30, 0x08,
1928
25.2k
        0x06, 0x06, 0x2a, 0x85, 0x03, 0x02, 0x02, 0x17
1929
25.2k
    };
1930
1931
25.2k
    if (((s->s3.tmp.new_cipher->id & 0xFFFF) != 0x80
1932
25.2k
            && (s->s3.tmp.new_cipher->id & 0xFFFF) != 0x81)
1933
0
        || (SSL_get_options(SSL_CONNECTION_GET_SSL(s))
1934
0
               & SSL_OP_CRYPTOPRO_TLSEXT_BUG)
1935
0
            == 0)
1936
25.2k
        return EXT_RETURN_NOT_SENT;
1937
1938
0
    if (!WPACKET_memcpy(pkt, cryptopro_ext, sizeof(cryptopro_ext))) {
1939
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1940
0
        return EXT_RETURN_FAIL;
1941
0
    }
1942
1943
0
    return EXT_RETURN_SENT;
1944
0
}
1945
1946
EXT_RETURN tls_construct_stoc_early_data(SSL_CONNECTION *s, WPACKET *pkt,
1947
    unsigned int context, X509 *x,
1948
    size_t chainidx)
1949
2.88k
{
1950
2.88k
    if (context == SSL_EXT_TLS1_3_NEW_SESSION_TICKET) {
1951
0
        if (s->max_early_data == 0)
1952
0
            return EXT_RETURN_NOT_SENT;
1953
1954
0
        if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_early_data)
1955
0
            || !WPACKET_start_sub_packet_u16(pkt)
1956
0
            || !WPACKET_put_bytes_u32(pkt, s->max_early_data)
1957
0
            || !WPACKET_close(pkt)) {
1958
0
            SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1959
0
            return EXT_RETURN_FAIL;
1960
0
        }
1961
1962
0
        return EXT_RETURN_SENT;
1963
0
    }
1964
1965
2.88k
    if (s->ext.early_data != SSL_EARLY_DATA_ACCEPTED)
1966
2.88k
        return EXT_RETURN_NOT_SENT;
1967
1968
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_early_data)
1969
0
        || !WPACKET_start_sub_packet_u16(pkt)
1970
0
        || !WPACKET_close(pkt)) {
1971
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1972
0
        return EXT_RETURN_FAIL;
1973
0
    }
1974
1975
0
    return EXT_RETURN_SENT;
1976
0
}
1977
1978
EXT_RETURN tls_construct_stoc_psk(SSL_CONNECTION *s, WPACKET *pkt,
1979
    unsigned int context,
1980
    X509 *x, size_t chainidx)
1981
2.88k
{
1982
2.88k
    if (!s->hit)
1983
2.88k
        return EXT_RETURN_NOT_SENT;
1984
1985
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk)
1986
0
        || !WPACKET_start_sub_packet_u16(pkt)
1987
0
        || !WPACKET_put_bytes_u16(pkt, s->ext.tick_identity)
1988
0
        || !WPACKET_close(pkt)) {
1989
0
        SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
1990
0
        return EXT_RETURN_FAIL;
1991
0
    }
1992
1993
0
    return EXT_RETURN_SENT;
1994
0
}
1995
1996
EXT_RETURN tls_construct_stoc_client_cert_type(SSL_CONNECTION *sc, WPACKET *pkt,
1997
    unsigned int context,
1998
    X509 *x, size_t chainidx)
1999
25.7k
{
2000
25.7k
    if (sc->ext.client_cert_type_ctos == OSSL_CERT_TYPE_CTOS_ERROR
2001
0
        && (send_certificate_request(sc)
2002
0
            || sc->post_handshake_auth == SSL_PHA_EXT_RECEIVED)) {
2003
        /* Did not receive an acceptable cert type - and doing client auth */
2004
0
        SSLfatal(sc, SSL_AD_UNSUPPORTED_CERTIFICATE, SSL_R_BAD_EXTENSION);
2005
0
        return EXT_RETURN_FAIL;
2006
0
    }
2007
2008
25.7k
    if (sc->ext.client_cert_type == TLSEXT_cert_type_x509) {
2009
25.7k
        sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE;
2010
25.7k
        return EXT_RETURN_NOT_SENT;
2011
25.7k
    }
2012
2013
    /*
2014
     * Note: only supposed to send this if we are going to do a cert request,
2015
     * but TLSv1.3 could do a PHA request if the client supports it
2016
     */
2017
0
    if ((!send_certificate_request(sc) && sc->post_handshake_auth != SSL_PHA_EXT_RECEIVED)
2018
0
        || sc->ext.client_cert_type_ctos != OSSL_CERT_TYPE_CTOS_GOOD
2019
0
        || sc->client_cert_type == NULL) {
2020
        /* if we don't send it, reset to TLSEXT_cert_type_x509 */
2021
0
        sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE;
2022
0
        sc->ext.client_cert_type = TLSEXT_cert_type_x509;
2023
0
        return EXT_RETURN_NOT_SENT;
2024
0
    }
2025
2026
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_client_cert_type)
2027
0
        || !WPACKET_start_sub_packet_u16(pkt)
2028
0
        || !WPACKET_put_bytes_u8(pkt, sc->ext.client_cert_type)
2029
0
        || !WPACKET_close(pkt)) {
2030
0
        SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
2031
0
        return EXT_RETURN_FAIL;
2032
0
    }
2033
0
    return EXT_RETURN_SENT;
2034
0
}
2035
2036
/* One of |pref|, |other| is configured and the values are sanitized */
2037
static int reconcile_cert_type(const unsigned char *pref, size_t pref_len,
2038
    const unsigned char *other, size_t other_len,
2039
    uint8_t *chosen_cert_type)
2040
0
{
2041
0
    size_t i;
2042
2043
0
    for (i = 0; i < pref_len; i++) {
2044
0
        if (memchr(other, pref[i], other_len) != NULL) {
2045
0
            *chosen_cert_type = pref[i];
2046
0
            return OSSL_CERT_TYPE_CTOS_GOOD;
2047
0
        }
2048
0
    }
2049
0
    return OSSL_CERT_TYPE_CTOS_ERROR;
2050
0
}
2051
2052
int tls_parse_ctos_client_cert_type(SSL_CONNECTION *sc, PACKET *pkt,
2053
    unsigned int context,
2054
    X509 *x, size_t chainidx)
2055
266
{
2056
266
    PACKET supported_cert_types;
2057
266
    const unsigned char *data;
2058
266
    size_t len;
2059
2060
    /* Ignore the extension */
2061
266
    if (sc->client_cert_type == NULL) {
2062
266
        sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE;
2063
266
        sc->ext.client_cert_type = TLSEXT_cert_type_x509;
2064
266
        return 1;
2065
266
    }
2066
2067
0
    if (!PACKET_as_length_prefixed_1(pkt, &supported_cert_types)) {
2068
0
        sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_ERROR;
2069
0
        SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
2070
0
        return 0;
2071
0
    }
2072
0
    if ((len = PACKET_remaining(&supported_cert_types)) == 0) {
2073
0
        sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_ERROR;
2074
0
        SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
2075
0
        return 0;
2076
0
    }
2077
0
    if (!PACKET_get_bytes(&supported_cert_types, &data, len)) {
2078
0
        sc->ext.client_cert_type_ctos = OSSL_CERT_TYPE_CTOS_ERROR;
2079
0
        SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
2080
0
        return 0;
2081
0
    }
2082
    /* client_cert_type: client (peer) has priority */
2083
0
    sc->ext.client_cert_type_ctos = reconcile_cert_type(data, len,
2084
0
        sc->client_cert_type, sc->client_cert_type_len,
2085
0
        &sc->ext.client_cert_type);
2086
2087
    /* Ignore the error until sending - so we can check cert auth*/
2088
0
    return 1;
2089
0
}
2090
2091
EXT_RETURN tls_construct_stoc_server_cert_type(SSL_CONNECTION *sc, WPACKET *pkt,
2092
    unsigned int context,
2093
    X509 *x, size_t chainidx)
2094
25.7k
{
2095
25.7k
    if (sc->ext.server_cert_type == TLSEXT_cert_type_x509) {
2096
25.7k
        sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE;
2097
25.7k
        return EXT_RETURN_NOT_SENT;
2098
25.7k
    }
2099
0
    if (sc->ext.server_cert_type_ctos != OSSL_CERT_TYPE_CTOS_GOOD
2100
0
        || sc->server_cert_type == NULL) {
2101
        /* if we don't send it, reset to TLSEXT_cert_type_x509 */
2102
0
        sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE;
2103
0
        sc->ext.server_cert_type = TLSEXT_cert_type_x509;
2104
0
        return EXT_RETURN_NOT_SENT;
2105
0
    }
2106
2107
0
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_cert_type)
2108
0
        || !WPACKET_start_sub_packet_u16(pkt)
2109
0
        || !WPACKET_put_bytes_u8(pkt, sc->ext.server_cert_type)
2110
0
        || !WPACKET_close(pkt)) {
2111
0
        SSLfatal(sc, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
2112
0
        return EXT_RETURN_FAIL;
2113
0
    }
2114
0
    return EXT_RETURN_SENT;
2115
0
}
2116
2117
int tls_parse_ctos_server_cert_type(SSL_CONNECTION *sc, PACKET *pkt,
2118
    unsigned int context,
2119
    X509 *x, size_t chainidx)
2120
330
{
2121
330
    PACKET supported_cert_types;
2122
330
    const unsigned char *data;
2123
330
    size_t len;
2124
2125
    /* Ignore the extension */
2126
330
    if (sc->server_cert_type == NULL) {
2127
330
        sc->ext.server_cert_type_ctos = OSSL_CERT_TYPE_CTOS_NONE;
2128
330
        sc->ext.server_cert_type = TLSEXT_cert_type_x509;
2129
330
        return 1;
2130
330
    }
2131
2132
0
    if (!PACKET_as_length_prefixed_1(pkt, &supported_cert_types)) {
2133
0
        SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
2134
0
        return 0;
2135
0
    }
2136
2137
0
    if ((len = PACKET_remaining(&supported_cert_types)) == 0) {
2138
0
        SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
2139
0
        return 0;
2140
0
    }
2141
0
    if (!PACKET_get_bytes(&supported_cert_types, &data, len)) {
2142
0
        SSLfatal(sc, SSL_AD_DECODE_ERROR, SSL_R_BAD_EXTENSION);
2143
0
        return 0;
2144
0
    }
2145
    /* server_cert_type: server (this) has priority */
2146
0
    sc->ext.server_cert_type_ctos = reconcile_cert_type(sc->server_cert_type, sc->server_cert_type_len,
2147
0
        data, len,
2148
0
        &sc->ext.server_cert_type);
2149
0
    if (sc->ext.server_cert_type_ctos == OSSL_CERT_TYPE_CTOS_GOOD)
2150
0
        return 1;
2151
2152
    /* Did not receive an acceptable cert type */
2153
0
    SSLfatal(sc, SSL_AD_UNSUPPORTED_CERTIFICATE, SSL_R_BAD_EXTENSION);
2154
0
    return 0;
2155
0
}