/src/openssl/ssl/t1_enc.c
Line  | Count  | Source  | 
1  |  | /*  | 
2  |  |  * Copyright 1995-2025 The OpenSSL Project Authors. All Rights Reserved.  | 
3  |  |  * Copyright 2005 Nokia. All rights reserved.  | 
4  |  |  *  | 
5  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use  | 
6  |  |  * this file except in compliance with the License.  You can obtain a copy  | 
7  |  |  * in the file LICENSE in the source distribution or at  | 
8  |  |  * https://www.openssl.org/source/license.html  | 
9  |  |  */  | 
10  |  |  | 
11  |  | #include <stdio.h>  | 
12  |  | #include "ssl_local.h"  | 
13  |  | #include "record/record_local.h"  | 
14  |  | #include "internal/ktls.h"  | 
15  |  | #include "internal/cryptlib.h"  | 
16  |  | #include "internal/ssl_unwrap.h"  | 
17  |  | #include <openssl/comp.h>  | 
18  |  | #include <openssl/evp.h>  | 
19  |  | #include <openssl/kdf.h>  | 
20  |  | #include <openssl/rand.h>  | 
21  |  | #include <openssl/obj_mac.h>  | 
22  |  | #include <openssl/core_names.h>  | 
23  |  | #include <openssl/trace.h>  | 
24  |  |  | 
25  |  | /* seed1 through seed5 are concatenated */  | 
26  |  | static int tls1_PRF(SSL_CONNECTION *s,  | 
27  |  |                     const void *seed1, size_t seed1_len,  | 
28  |  |                     const void *seed2, size_t seed2_len,  | 
29  |  |                     const void *seed3, size_t seed3_len,  | 
30  |  |                     const void *seed4, size_t seed4_len,  | 
31  |  |                     const void *seed5, size_t seed5_len,  | 
32  |  |                     const unsigned char *sec, size_t slen,  | 
33  |  |                     unsigned char *out, size_t olen, int fatal)  | 
34  | 0  | { | 
35  | 0  |     const EVP_MD *md = ssl_prf_md(s);  | 
36  | 0  |     EVP_KDF *kdf;  | 
37  | 0  |     EVP_KDF_CTX *kctx = NULL;  | 
38  | 0  |     OSSL_PARAM params[9], *p = params;  | 
39  | 0  |     const char *mdname;  | 
40  |  | 
  | 
41  | 0  |     if (md == NULL) { | 
42  |  |         /* Should never happen */  | 
43  | 0  |         if (fatal)  | 
44  | 0  |             SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);  | 
45  | 0  |         else  | 
46  | 0  |             ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);  | 
47  | 0  |         return 0;  | 
48  | 0  |     }  | 
49  | 0  |     kdf = EVP_KDF_fetch(SSL_CONNECTION_GET_CTX(s)->libctx,  | 
50  | 0  |                         OSSL_KDF_NAME_TLS1_PRF,  | 
51  | 0  |                         SSL_CONNECTION_GET_CTX(s)->propq);  | 
52  | 0  |     if (kdf == NULL)  | 
53  | 0  |         goto err;  | 
54  | 0  |     kctx = EVP_KDF_CTX_new(kdf);  | 
55  | 0  |     EVP_KDF_free(kdf);  | 
56  | 0  |     if (kctx == NULL)  | 
57  | 0  |         goto err;  | 
58  | 0  |     mdname = EVP_MD_get0_name(md);  | 
59  | 0  |     *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST,  | 
60  | 0  |                                             (char *)mdname, 0);  | 
61  | 0  |     *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SECRET,  | 
62  | 0  |                                              (unsigned char *)sec,  | 
63  | 0  |                                              (size_t)slen);  | 
64  | 0  |     *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,  | 
65  | 0  |                                              (void *)seed1, (size_t)seed1_len);  | 
66  | 0  |     *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,  | 
67  | 0  |                                              (void *)seed2, (size_t)seed2_len);  | 
68  | 0  |     *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,  | 
69  | 0  |                                              (void *)seed3, (size_t)seed3_len);  | 
70  | 0  |     *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,  | 
71  | 0  |                                              (void *)seed4, (size_t)seed4_len);  | 
72  | 0  |     *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,  | 
73  | 0  |                                              (void *)seed5, (size_t)seed5_len);  | 
74  |  |     /*  | 
75  |  |      * If we have a property query string, the kdf needs to know about it in the event  | 
76  |  |      * the specific kdf in use allocated a digest as part of its implementation  | 
77  |  |      */  | 
78  | 0  |     if (SSL_CONNECTION_GET_CTX(s)->propq != NULL)  | 
79  | 0  |         *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_PROPERTIES,  | 
80  | 0  |                                                 (char *)SSL_CONNECTION_GET_CTX(s)->propq, 0);  | 
81  | 0  |     *p = OSSL_PARAM_construct_end();  | 
82  | 0  |     if (EVP_KDF_derive(kctx, out, olen, params)) { | 
83  | 0  |         EVP_KDF_CTX_free(kctx);  | 
84  | 0  |         return 1;  | 
85  | 0  |     }  | 
86  |  |  | 
87  | 0  |  err:  | 
88  | 0  |     if (fatal)  | 
89  | 0  |         SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);  | 
90  | 0  |     else  | 
91  | 0  |         ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);  | 
92  | 0  |     EVP_KDF_CTX_free(kctx);  | 
93  | 0  |     return 0;  | 
94  | 0  | }  | 
95  |  |  | 
96  |  | static int tls1_generate_key_block(SSL_CONNECTION *s, unsigned char *km,  | 
97  |  |                                    size_t num)  | 
98  | 0  | { | 
99  | 0  |     int ret;  | 
100  |  |  | 
101  |  |     /* Calls SSLfatal() as required */  | 
102  | 0  |     ret = tls1_PRF(s,  | 
103  | 0  |                    TLS_MD_KEY_EXPANSION_CONST,  | 
104  | 0  |                    TLS_MD_KEY_EXPANSION_CONST_SIZE, s->s3.server_random,  | 
105  | 0  |                    SSL3_RANDOM_SIZE, s->s3.client_random, SSL3_RANDOM_SIZE,  | 
106  | 0  |                    NULL, 0, NULL, 0, s->session->master_key,  | 
107  | 0  |                    s->session->master_key_length, km, num, 1);  | 
108  |  | 
  | 
109  | 0  |     return ret;  | 
110  | 0  | }  | 
111  |  |  | 
112  |  | static int tls_iv_length_within_key_block(const EVP_CIPHER *c)  | 
113  | 0  | { | 
114  |  |     /* If GCM/CCM mode only part of IV comes from PRF */  | 
115  | 0  |     if (EVP_CIPHER_get_mode(c) == EVP_CIPH_GCM_MODE)  | 
116  | 0  |         return EVP_GCM_TLS_FIXED_IV_LEN;  | 
117  | 0  |     else if (EVP_CIPHER_get_mode(c) == EVP_CIPH_CCM_MODE)  | 
118  | 0  |         return EVP_CCM_TLS_FIXED_IV_LEN;  | 
119  | 0  |     else  | 
120  | 0  |         return EVP_CIPHER_get_iv_length(c);  | 
121  | 0  | }  | 
122  |  |  | 
123  |  | int tls1_change_cipher_state(SSL_CONNECTION *s, int which)  | 
124  | 0  | { | 
125  | 0  |     unsigned char *p, *mac_secret;  | 
126  | 0  |     unsigned char *key, *iv;  | 
127  | 0  |     const EVP_CIPHER *c;  | 
128  | 0  |     const SSL_COMP *comp = NULL;  | 
129  | 0  |     const EVP_MD *m;  | 
130  | 0  |     int mac_type;  | 
131  | 0  |     size_t mac_secret_size;  | 
132  | 0  |     size_t n, i, j, k, cl;  | 
133  | 0  |     int iivlen;  | 
134  |  |     /*  | 
135  |  |      * Taglen is only relevant for CCM ciphersuites. Other ciphersuites  | 
136  |  |      * ignore this value so we can default it to 0.  | 
137  |  |      */  | 
138  | 0  |     size_t taglen = 0;  | 
139  | 0  |     int direction;  | 
140  |  | 
  | 
141  | 0  |     c = s->s3.tmp.new_sym_enc;  | 
142  | 0  |     m = s->s3.tmp.new_hash;  | 
143  | 0  |     mac_type = s->s3.tmp.new_mac_pkey_type;  | 
144  | 0  | #ifndef OPENSSL_NO_COMP  | 
145  | 0  |     comp = s->s3.tmp.new_compression;  | 
146  | 0  | #endif  | 
147  |  | 
  | 
148  | 0  |     p = s->s3.tmp.key_block;  | 
149  | 0  |     i = mac_secret_size = s->s3.tmp.new_mac_secret_size;  | 
150  |  | 
  | 
151  | 0  |     cl = EVP_CIPHER_get_key_length(c);  | 
152  | 0  |     j = cl;  | 
153  | 0  |     iivlen = tls_iv_length_within_key_block(c);  | 
154  | 0  |     if (iivlen < 0) { | 
155  | 0  |         SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);  | 
156  | 0  |         goto err;  | 
157  | 0  |     }  | 
158  | 0  |     k = iivlen;  | 
159  | 0  |     if ((which == SSL3_CHANGE_CIPHER_CLIENT_WRITE) ||  | 
160  | 0  |         (which == SSL3_CHANGE_CIPHER_SERVER_READ)) { | 
161  | 0  |         mac_secret = &(p[0]);  | 
162  | 0  |         n = i + i;  | 
163  | 0  |         key = &(p[n]);  | 
164  | 0  |         n += j + j;  | 
165  | 0  |         iv = &(p[n]);  | 
166  | 0  |         n += k + k;  | 
167  | 0  |     } else { | 
168  | 0  |         n = i;  | 
169  | 0  |         mac_secret = &(p[n]);  | 
170  | 0  |         n += i + j;  | 
171  | 0  |         key = &(p[n]);  | 
172  | 0  |         n += j + k;  | 
173  | 0  |         iv = &(p[n]);  | 
174  | 0  |         n += k;  | 
175  | 0  |     }  | 
176  |  | 
  | 
177  | 0  |     if (n > s->s3.tmp.key_block_length) { | 
178  | 0  |         SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);  | 
179  | 0  |         goto err;  | 
180  | 0  |     }  | 
181  |  |  | 
182  | 0  |     switch (EVP_CIPHER_get_mode(c)) { | 
183  | 0  |     case EVP_CIPH_GCM_MODE:  | 
184  | 0  |         taglen = EVP_GCM_TLS_TAG_LEN;  | 
185  | 0  |         break;  | 
186  | 0  |     case EVP_CIPH_CCM_MODE:  | 
187  | 0  |         if ((s->s3.tmp.new_cipher->algorithm_enc  | 
188  | 0  |                 & (SSL_AES128CCM8 | SSL_AES256CCM8)) != 0)  | 
189  | 0  |             taglen = EVP_CCM8_TLS_TAG_LEN;  | 
190  | 0  |         else  | 
191  | 0  |             taglen = EVP_CCM_TLS_TAG_LEN;  | 
192  | 0  |         break;  | 
193  | 0  |     default:  | 
194  | 0  |         if (EVP_CIPHER_is_a(c, "CHACHA20-POLY1305")) { | 
195  | 0  |             taglen = EVP_CHACHAPOLY_TLS_TAG_LEN;  | 
196  | 0  |         } else { | 
197  |  |             /* MAC secret size corresponds to the MAC output size */  | 
198  | 0  |             taglen = s->s3.tmp.new_mac_secret_size;  | 
199  | 0  |         }  | 
200  | 0  |         break;  | 
201  | 0  |     }  | 
202  |  |  | 
203  | 0  |     if (which & SSL3_CC_READ) { | 
204  | 0  |         if (s->ext.use_etm)  | 
205  | 0  |             s->s3.flags |= TLS1_FLAGS_ENCRYPT_THEN_MAC_READ;  | 
206  | 0  |         else  | 
207  | 0  |             s->s3.flags &= ~TLS1_FLAGS_ENCRYPT_THEN_MAC_READ;  | 
208  |  | 
  | 
209  | 0  |         if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)  | 
210  | 0  |             s->mac_flags |= SSL_MAC_FLAG_READ_MAC_STREAM;  | 
211  | 0  |         else  | 
212  | 0  |             s->mac_flags &= ~SSL_MAC_FLAG_READ_MAC_STREAM;  | 
213  |  | 
  | 
214  | 0  |         if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE)  | 
215  | 0  |             s->mac_flags |= SSL_MAC_FLAG_READ_MAC_TLSTREE;  | 
216  | 0  |         else  | 
217  | 0  |             s->mac_flags &= ~SSL_MAC_FLAG_READ_MAC_TLSTREE;  | 
218  |  | 
  | 
219  | 0  |         direction = OSSL_RECORD_DIRECTION_READ;  | 
220  | 0  |     } else { | 
221  | 0  |         if (s->ext.use_etm)  | 
222  | 0  |             s->s3.flags |= TLS1_FLAGS_ENCRYPT_THEN_MAC_WRITE;  | 
223  | 0  |         else  | 
224  | 0  |             s->s3.flags &= ~TLS1_FLAGS_ENCRYPT_THEN_MAC_WRITE;  | 
225  |  | 
  | 
226  | 0  |         if (s->s3.tmp.new_cipher->algorithm2 & TLS1_STREAM_MAC)  | 
227  | 0  |             s->mac_flags |= SSL_MAC_FLAG_WRITE_MAC_STREAM;  | 
228  | 0  |         else  | 
229  | 0  |             s->mac_flags &= ~SSL_MAC_FLAG_WRITE_MAC_STREAM;  | 
230  |  | 
  | 
231  | 0  |         if (s->s3.tmp.new_cipher->algorithm2 & TLS1_TLSTREE)  | 
232  | 0  |             s->mac_flags |= SSL_MAC_FLAG_WRITE_MAC_TLSTREE;  | 
233  | 0  |         else  | 
234  | 0  |             s->mac_flags &= ~SSL_MAC_FLAG_WRITE_MAC_TLSTREE;  | 
235  |  | 
  | 
236  | 0  |         direction = OSSL_RECORD_DIRECTION_WRITE;  | 
237  | 0  |     }  | 
238  |  | 
  | 
239  | 0  |     if (SSL_CONNECTION_IS_DTLS(s))  | 
240  | 0  |         dtls1_increment_epoch(s, which);  | 
241  |  | 
  | 
242  | 0  |     if (!ssl_set_new_record_layer(s, s->version, direction,  | 
243  | 0  |                                     OSSL_RECORD_PROTECTION_LEVEL_APPLICATION,  | 
244  | 0  |                                     NULL, 0, key, cl, iv, (size_t)k, mac_secret,  | 
245  | 0  |                                     mac_secret_size, c, taglen, mac_type,  | 
246  | 0  |                                     m, comp, NULL)) { | 
247  |  |         /* SSLfatal already called */  | 
248  | 0  |         goto err;  | 
249  | 0  |     }  | 
250  |  |  | 
251  | 0  |     OSSL_TRACE_BEGIN(TLS) { | 
252  | 0  |         BIO_printf(trc_out, "which = %04X, key:\n", which);  | 
253  | 0  |         BIO_dump_indent(trc_out, key, EVP_CIPHER_get_key_length(c), 4);  | 
254  | 0  |         BIO_printf(trc_out, "iv:\n");  | 
255  | 0  |         BIO_dump_indent(trc_out, iv, (int)k, 4);  | 
256  | 0  |     } OSSL_TRACE_END(TLS);  | 
257  |  | 
  | 
258  | 0  |     return 1;  | 
259  | 0  |  err:  | 
260  | 0  |     return 0;  | 
261  | 0  | }  | 
262  |  |  | 
263  |  | int tls1_setup_key_block(SSL_CONNECTION *s)  | 
264  | 0  | { | 
265  | 0  |     unsigned char *p;  | 
266  | 0  |     const EVP_CIPHER *c;  | 
267  | 0  |     const EVP_MD *hash;  | 
268  | 0  |     SSL_COMP *comp;  | 
269  | 0  |     int mac_type = NID_undef;  | 
270  | 0  |     size_t num, mac_secret_size = 0;  | 
271  | 0  |     int ret = 0;  | 
272  | 0  |     int ivlen;  | 
273  |  | 
  | 
274  | 0  |     if (s->s3.tmp.key_block_length != 0)  | 
275  | 0  |         return 1;  | 
276  |  |  | 
277  | 0  |     if (!ssl_cipher_get_evp(SSL_CONNECTION_GET_CTX(s), s->session, &c, &hash,  | 
278  | 0  |                             &mac_type, &mac_secret_size, &comp,  | 
279  | 0  |                             s->ext.use_etm)) { | 
280  |  |         /* Error is already recorded */  | 
281  | 0  |         SSLfatal_alert(s, SSL_AD_INTERNAL_ERROR);  | 
282  | 0  |         return 0;  | 
283  | 0  |     }  | 
284  |  |  | 
285  | 0  |     ssl_evp_cipher_free(s->s3.tmp.new_sym_enc);  | 
286  | 0  |     s->s3.tmp.new_sym_enc = c;  | 
287  | 0  |     ssl_evp_md_free(s->s3.tmp.new_hash);  | 
288  | 0  |     s->s3.tmp.new_hash = hash;  | 
289  | 0  |     s->s3.tmp.new_mac_pkey_type = mac_type;  | 
290  | 0  |     s->s3.tmp.new_mac_secret_size = mac_secret_size;  | 
291  | 0  |     ivlen = tls_iv_length_within_key_block(c);  | 
292  | 0  |     if (ivlen < 0) { | 
293  | 0  |         SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);  | 
294  | 0  |         return 0;  | 
295  | 0  |     }  | 
296  | 0  |     num = mac_secret_size + EVP_CIPHER_get_key_length(c) + ivlen;  | 
297  | 0  |     num *= 2;  | 
298  |  | 
  | 
299  | 0  |     ssl3_cleanup_key_block(s);  | 
300  |  | 
  | 
301  | 0  |     if ((p = OPENSSL_malloc(num)) == NULL) { | 
302  | 0  |         SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);  | 
303  | 0  |         goto err;  | 
304  | 0  |     }  | 
305  |  |  | 
306  | 0  |     s->s3.tmp.key_block_length = num;  | 
307  | 0  |     s->s3.tmp.key_block = p;  | 
308  |  | 
  | 
309  | 0  |     OSSL_TRACE_BEGIN(TLS) { | 
310  | 0  |         BIO_printf(trc_out, "key block length: %zu\n", num);  | 
311  | 0  |         BIO_printf(trc_out, "client random\n");  | 
312  | 0  |         BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4);  | 
313  | 0  |         BIO_printf(trc_out, "server random\n");  | 
314  | 0  |         BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4);  | 
315  | 0  |         BIO_printf(trc_out, "master key\n");  | 
316  | 0  |         BIO_dump_indent(trc_out,  | 
317  | 0  |                         s->session->master_key,  | 
318  | 0  |                         (int)s->session->master_key_length, 4);  | 
319  | 0  |     } OSSL_TRACE_END(TLS);  | 
320  |  | 
  | 
321  | 0  |     if (!tls1_generate_key_block(s, p, num)) { | 
322  |  |         /* SSLfatal() already called */  | 
323  | 0  |         goto err;  | 
324  | 0  |     }  | 
325  |  |  | 
326  | 0  |     OSSL_TRACE_BEGIN(TLS) { | 
327  | 0  |         BIO_printf(trc_out, "key block\n");  | 
328  | 0  |         BIO_dump_indent(trc_out, p, (int)num, 4);  | 
329  | 0  |     } OSSL_TRACE_END(TLS);  | 
330  |  | 
  | 
331  | 0  |     ret = 1;  | 
332  | 0  |  err:  | 
333  | 0  |     return ret;  | 
334  | 0  | }  | 
335  |  |  | 
336  |  | size_t tls1_final_finish_mac(SSL_CONNECTION *s, const char *str,  | 
337  |  |                              size_t slen, unsigned char *out)  | 
338  | 0  | { | 
339  | 0  |     size_t hashlen;  | 
340  | 0  |     unsigned char hash[EVP_MAX_MD_SIZE];  | 
341  | 0  |     size_t finished_size = TLS1_FINISH_MAC_LENGTH;  | 
342  |  | 
  | 
343  | 0  |     if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_kGOST18)  | 
344  | 0  |         finished_size = 32;  | 
345  |  | 
  | 
346  | 0  |     if (!ssl3_digest_cached_records(s, 0)) { | 
347  |  |         /* SSLfatal() already called */  | 
348  | 0  |         return 0;  | 
349  | 0  |     }  | 
350  |  |  | 
351  | 0  |     if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { | 
352  |  |         /* SSLfatal() already called */  | 
353  | 0  |         return 0;  | 
354  | 0  |     }  | 
355  |  |  | 
356  | 0  |     if (!tls1_PRF(s, str, slen, hash, hashlen, NULL, 0, NULL, 0, NULL, 0,  | 
357  | 0  |                   s->session->master_key, s->session->master_key_length,  | 
358  | 0  |                   out, finished_size, 1)) { | 
359  |  |         /* SSLfatal() already called */  | 
360  | 0  |         return 0;  | 
361  | 0  |     }  | 
362  | 0  |     OPENSSL_cleanse(hash, hashlen);  | 
363  | 0  |     return finished_size;  | 
364  | 0  | }  | 
365  |  |  | 
366  |  | int tls1_generate_master_secret(SSL_CONNECTION *s, unsigned char *out,  | 
367  |  |                                 unsigned char *p, size_t len,  | 
368  |  |                                 size_t *secret_size)  | 
369  | 0  | { | 
370  | 0  |     if (s->session->flags & SSL_SESS_FLAG_EXTMS) { | 
371  | 0  |         unsigned char hash[EVP_MAX_MD_SIZE * 2];  | 
372  | 0  |         size_t hashlen;  | 
373  |  |         /*  | 
374  |  |          * Digest cached records keeping record buffer (if present): this won't  | 
375  |  |          * affect client auth because we're freezing the buffer at the same  | 
376  |  |          * point (after client key exchange and before certificate verify)  | 
377  |  |          */  | 
378  | 0  |         if (!ssl3_digest_cached_records(s, 1)  | 
379  | 0  |                 || !ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { | 
380  |  |             /* SSLfatal() already called */  | 
381  | 0  |             return 0;  | 
382  | 0  |         }  | 
383  | 0  |         OSSL_TRACE_BEGIN(TLS) { | 
384  | 0  |             BIO_printf(trc_out, "Handshake hashes:\n");  | 
385  | 0  |             BIO_dump(trc_out, (char *)hash, (int)hashlen);  | 
386  | 0  |         } OSSL_TRACE_END(TLS);  | 
387  | 0  |         if (!tls1_PRF(s,  | 
388  | 0  |                       TLS_MD_EXTENDED_MASTER_SECRET_CONST,  | 
389  | 0  |                       TLS_MD_EXTENDED_MASTER_SECRET_CONST_SIZE,  | 
390  | 0  |                       hash, hashlen,  | 
391  | 0  |                       NULL, 0,  | 
392  | 0  |                       NULL, 0,  | 
393  | 0  |                       NULL, 0, p, len, out,  | 
394  | 0  |                       SSL3_MASTER_SECRET_SIZE, 1)) { | 
395  |  |             /* SSLfatal() already called */  | 
396  | 0  |             return 0;  | 
397  | 0  |         }  | 
398  | 0  |         OPENSSL_cleanse(hash, hashlen);  | 
399  | 0  |     } else { | 
400  | 0  |         if (!tls1_PRF(s,  | 
401  | 0  |                       TLS_MD_MASTER_SECRET_CONST,  | 
402  | 0  |                       TLS_MD_MASTER_SECRET_CONST_SIZE,  | 
403  | 0  |                       s->s3.client_random, SSL3_RANDOM_SIZE,  | 
404  | 0  |                       NULL, 0,  | 
405  | 0  |                       s->s3.server_random, SSL3_RANDOM_SIZE,  | 
406  | 0  |                       NULL, 0, p, len, out,  | 
407  | 0  |                       SSL3_MASTER_SECRET_SIZE, 1)) { | 
408  |  |            /* SSLfatal() already called */  | 
409  | 0  |             return 0;  | 
410  | 0  |         }  | 
411  | 0  |     }  | 
412  |  |  | 
413  | 0  |     OSSL_TRACE_BEGIN(TLS) { | 
414  | 0  |         BIO_printf(trc_out, "Premaster Secret:\n");  | 
415  | 0  |         BIO_dump_indent(trc_out, p, (int)len, 4);  | 
416  | 0  |         BIO_printf(trc_out, "Client Random:\n");  | 
417  | 0  |         BIO_dump_indent(trc_out, s->s3.client_random, SSL3_RANDOM_SIZE, 4);  | 
418  | 0  |         BIO_printf(trc_out, "Server Random:\n");  | 
419  | 0  |         BIO_dump_indent(trc_out, s->s3.server_random, SSL3_RANDOM_SIZE, 4);  | 
420  | 0  |         BIO_printf(trc_out, "Master Secret:\n");  | 
421  | 0  |         BIO_dump_indent(trc_out,  | 
422  | 0  |                         s->session->master_key,  | 
423  | 0  |                         SSL3_MASTER_SECRET_SIZE, 4);  | 
424  | 0  |     } OSSL_TRACE_END(TLS);  | 
425  |  | 
  | 
426  | 0  |     *secret_size = SSL3_MASTER_SECRET_SIZE;  | 
427  | 0  |     return 1;  | 
428  | 0  | }  | 
429  |  |  | 
430  |  | int tls1_export_keying_material(SSL_CONNECTION *s, unsigned char *out,  | 
431  |  |                                 size_t olen, const char *label, size_t llen,  | 
432  |  |                                 const unsigned char *context,  | 
433  |  |                                 size_t contextlen, int use_context)  | 
434  | 0  | { | 
435  | 0  |     unsigned char *val = NULL;  | 
436  | 0  |     size_t vallen = 0, currentvalpos;  | 
437  | 0  |     int rv = 0;  | 
438  |  |  | 
439  |  |     /*  | 
440  |  |      * RFC 5705 embeds context length as uint16; reject longer context  | 
441  |  |      * before proceeding.  | 
442  |  |      */  | 
443  | 0  |     if (contextlen > 0xffff) { | 
444  | 0  |         ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_INVALID_ARGUMENT);  | 
445  | 0  |         return 0;  | 
446  | 0  |     }  | 
447  |  |  | 
448  |  |     /*  | 
449  |  |      * construct PRF arguments we construct the PRF argument ourself rather  | 
450  |  |      * than passing separate values into the TLS PRF to ensure that the  | 
451  |  |      * concatenation of values does not create a prohibited label.  | 
452  |  |      */  | 
453  | 0  |     vallen = llen + SSL3_RANDOM_SIZE * 2;  | 
454  | 0  |     if (use_context) { | 
455  | 0  |         vallen += 2 + contextlen;  | 
456  | 0  |     }  | 
457  |  | 
  | 
458  | 0  |     val = OPENSSL_malloc(vallen);  | 
459  | 0  |     if (val == NULL)  | 
460  | 0  |         goto ret;  | 
461  | 0  |     currentvalpos = 0;  | 
462  | 0  |     memcpy(val + currentvalpos, (unsigned char *)label, llen);  | 
463  | 0  |     currentvalpos += llen;  | 
464  | 0  |     memcpy(val + currentvalpos, s->s3.client_random, SSL3_RANDOM_SIZE);  | 
465  | 0  |     currentvalpos += SSL3_RANDOM_SIZE;  | 
466  | 0  |     memcpy(val + currentvalpos, s->s3.server_random, SSL3_RANDOM_SIZE);  | 
467  | 0  |     currentvalpos += SSL3_RANDOM_SIZE;  | 
468  |  | 
  | 
469  | 0  |     if (use_context) { | 
470  | 0  |         val[currentvalpos] = (contextlen >> 8) & 0xff;  | 
471  | 0  |         currentvalpos++;  | 
472  | 0  |         val[currentvalpos] = contextlen & 0xff;  | 
473  | 0  |         currentvalpos++;  | 
474  | 0  |         if ((contextlen > 0) || (context != NULL)) { | 
475  | 0  |             memcpy(val + currentvalpos, context, contextlen);  | 
476  | 0  |         }  | 
477  | 0  |     }  | 
478  |  |  | 
479  |  |     /*  | 
480  |  |      * disallow prohibited labels note that SSL3_RANDOM_SIZE > max(prohibited  | 
481  |  |      * label len) = 15, so size of val > max(prohibited label len) = 15 and  | 
482  |  |      * the comparisons won't have buffer overflow  | 
483  |  |      */  | 
484  | 0  |     if (memcmp(val, TLS_MD_CLIENT_FINISH_CONST,  | 
485  | 0  |                TLS_MD_CLIENT_FINISH_CONST_SIZE) == 0)  | 
486  | 0  |         goto err1;  | 
487  | 0  |     if (memcmp(val, TLS_MD_SERVER_FINISH_CONST,  | 
488  | 0  |                TLS_MD_SERVER_FINISH_CONST_SIZE) == 0)  | 
489  | 0  |         goto err1;  | 
490  | 0  |     if (memcmp(val, TLS_MD_MASTER_SECRET_CONST,  | 
491  | 0  |                TLS_MD_MASTER_SECRET_CONST_SIZE) == 0)  | 
492  | 0  |         goto err1;  | 
493  | 0  |     if (memcmp(val, TLS_MD_EXTENDED_MASTER_SECRET_CONST,  | 
494  | 0  |                TLS_MD_EXTENDED_MASTER_SECRET_CONST_SIZE) == 0)  | 
495  | 0  |         goto err1;  | 
496  | 0  |     if (memcmp(val, TLS_MD_KEY_EXPANSION_CONST,  | 
497  | 0  |                TLS_MD_KEY_EXPANSION_CONST_SIZE) == 0)  | 
498  | 0  |         goto err1;  | 
499  |  |  | 
500  | 0  |     rv = tls1_PRF(s,  | 
501  | 0  |                   val, vallen,  | 
502  | 0  |                   NULL, 0,  | 
503  | 0  |                   NULL, 0,  | 
504  | 0  |                   NULL, 0,  | 
505  | 0  |                   NULL, 0,  | 
506  | 0  |                   s->session->master_key, s->session->master_key_length,  | 
507  | 0  |                   out, olen, 0);  | 
508  |  | 
  | 
509  | 0  |     goto ret;  | 
510  | 0  |  err1:  | 
511  | 0  |     ERR_raise(ERR_LIB_SSL, SSL_R_TLS_ILLEGAL_EXPORTER_LABEL);  | 
512  | 0  |  ret:  | 
513  | 0  |     OPENSSL_clear_free(val, vallen);  | 
514  | 0  |     return rv;  | 
515  | 0  | }  | 
516  |  |  | 
517  |  | int tls1_alert_code(int code)  | 
518  | 0  | { | 
519  | 0  |     switch (code) { | 
520  | 0  |     case SSL_AD_CLOSE_NOTIFY:  | 
521  | 0  |         return SSL3_AD_CLOSE_NOTIFY;  | 
522  | 0  |     case SSL_AD_UNEXPECTED_MESSAGE:  | 
523  | 0  |         return SSL3_AD_UNEXPECTED_MESSAGE;  | 
524  | 0  |     case SSL_AD_BAD_RECORD_MAC:  | 
525  | 0  |         return SSL3_AD_BAD_RECORD_MAC;  | 
526  | 0  |     case SSL_AD_DECRYPTION_FAILED:  | 
527  | 0  |         return TLS1_AD_DECRYPTION_FAILED;  | 
528  | 0  |     case SSL_AD_RECORD_OVERFLOW:  | 
529  | 0  |         return TLS1_AD_RECORD_OVERFLOW;  | 
530  | 0  |     case SSL_AD_DECOMPRESSION_FAILURE:  | 
531  | 0  |         return SSL3_AD_DECOMPRESSION_FAILURE;  | 
532  | 0  |     case SSL_AD_HANDSHAKE_FAILURE:  | 
533  | 0  |         return SSL3_AD_HANDSHAKE_FAILURE;  | 
534  | 0  |     case SSL_AD_NO_CERTIFICATE:  | 
535  | 0  |         return -1;  | 
536  | 0  |     case SSL_AD_BAD_CERTIFICATE:  | 
537  | 0  |         return SSL3_AD_BAD_CERTIFICATE;  | 
538  | 0  |     case SSL_AD_UNSUPPORTED_CERTIFICATE:  | 
539  | 0  |         return SSL3_AD_UNSUPPORTED_CERTIFICATE;  | 
540  | 0  |     case SSL_AD_CERTIFICATE_REVOKED:  | 
541  | 0  |         return SSL3_AD_CERTIFICATE_REVOKED;  | 
542  | 0  |     case SSL_AD_CERTIFICATE_EXPIRED:  | 
543  | 0  |         return SSL3_AD_CERTIFICATE_EXPIRED;  | 
544  | 0  |     case SSL_AD_CERTIFICATE_UNKNOWN:  | 
545  | 0  |         return SSL3_AD_CERTIFICATE_UNKNOWN;  | 
546  | 0  |     case SSL_AD_ILLEGAL_PARAMETER:  | 
547  | 0  |         return SSL3_AD_ILLEGAL_PARAMETER;  | 
548  | 0  |     case SSL_AD_UNKNOWN_CA:  | 
549  | 0  |         return TLS1_AD_UNKNOWN_CA;  | 
550  | 0  |     case SSL_AD_ACCESS_DENIED:  | 
551  | 0  |         return TLS1_AD_ACCESS_DENIED;  | 
552  | 0  |     case SSL_AD_DECODE_ERROR:  | 
553  | 0  |         return TLS1_AD_DECODE_ERROR;  | 
554  | 0  |     case SSL_AD_DECRYPT_ERROR:  | 
555  | 0  |         return TLS1_AD_DECRYPT_ERROR;  | 
556  | 0  |     case SSL_AD_EXPORT_RESTRICTION:  | 
557  | 0  |         return TLS1_AD_EXPORT_RESTRICTION;  | 
558  | 0  |     case SSL_AD_PROTOCOL_VERSION:  | 
559  | 0  |         return TLS1_AD_PROTOCOL_VERSION;  | 
560  | 0  |     case SSL_AD_INSUFFICIENT_SECURITY:  | 
561  | 0  |         return TLS1_AD_INSUFFICIENT_SECURITY;  | 
562  | 0  |     case SSL_AD_INTERNAL_ERROR:  | 
563  | 0  |         return TLS1_AD_INTERNAL_ERROR;  | 
564  | 0  |     case SSL_AD_USER_CANCELLED:  | 
565  | 0  |         return TLS1_AD_USER_CANCELLED;  | 
566  | 0  |     case SSL_AD_NO_RENEGOTIATION:  | 
567  | 0  |         return TLS1_AD_NO_RENEGOTIATION;  | 
568  | 0  |     case SSL_AD_UNSUPPORTED_EXTENSION:  | 
569  | 0  |         return TLS1_AD_UNSUPPORTED_EXTENSION;  | 
570  | 0  |     case SSL_AD_CERTIFICATE_UNOBTAINABLE:  | 
571  | 0  |         return TLS1_AD_CERTIFICATE_UNOBTAINABLE;  | 
572  | 0  |     case SSL_AD_UNRECOGNIZED_NAME:  | 
573  | 0  |         return TLS1_AD_UNRECOGNIZED_NAME;  | 
574  | 0  |     case SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE:  | 
575  | 0  |         return TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE;  | 
576  | 0  |     case SSL_AD_BAD_CERTIFICATE_HASH_VALUE:  | 
577  | 0  |         return TLS1_AD_BAD_CERTIFICATE_HASH_VALUE;  | 
578  | 0  |     case SSL_AD_UNKNOWN_PSK_IDENTITY:  | 
579  | 0  |         return TLS1_AD_UNKNOWN_PSK_IDENTITY;  | 
580  | 0  |     case SSL_AD_INAPPROPRIATE_FALLBACK:  | 
581  | 0  |         return TLS1_AD_INAPPROPRIATE_FALLBACK;  | 
582  | 0  |     case SSL_AD_NO_APPLICATION_PROTOCOL:  | 
583  | 0  |         return TLS1_AD_NO_APPLICATION_PROTOCOL;  | 
584  | 0  |     case SSL_AD_CERTIFICATE_REQUIRED:  | 
585  | 0  |         return SSL_AD_HANDSHAKE_FAILURE;  | 
586  | 0  |     case TLS13_AD_MISSING_EXTENSION:  | 
587  | 0  |         return SSL_AD_HANDSHAKE_FAILURE;  | 
588  | 0  |     default:  | 
589  | 0  |         return -1;  | 
590  | 0  |     }  | 
591  | 0  | }  |