ssl_rsa.c 31 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031
  1. /*
  2. * Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License 2.0 (the "License"). You may not use
  5. * this file except in compliance with the License. You can obtain a copy
  6. * in the file LICENSE in the source distribution or at
  7. * https://www.openssl.org/source/license.html
  8. */
  9. #include <stdio.h>
  10. #include "ssl_local.h"
  11. #include "internal/packet.h"
  12. #include <openssl/bio.h>
  13. #include <openssl/objects.h>
  14. #include <openssl/evp.h>
  15. #include <openssl/x509.h>
  16. #include <openssl/x509v3.h>
  17. #include <openssl/pem.h>
  18. static int ssl_set_cert(CERT *c, X509 *x509);
  19. static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey);
  20. #define SYNTHV1CONTEXT (SSL_EXT_TLS1_2_AND_BELOW_ONLY \
  21. | SSL_EXT_CLIENT_HELLO \
  22. | SSL_EXT_TLS1_2_SERVER_HELLO \
  23. | SSL_EXT_IGNORE_ON_RESUMPTION)
  24. int SSL_use_certificate(SSL *ssl, X509 *x)
  25. {
  26. int rv;
  27. if (x == NULL) {
  28. ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
  29. return 0;
  30. }
  31. rv = ssl_security_cert(ssl, NULL, x, 0, 1);
  32. if (rv != 1) {
  33. ERR_raise(ERR_LIB_SSL, rv);
  34. return 0;
  35. }
  36. return ssl_set_cert(ssl->cert, x);
  37. }
  38. int SSL_use_certificate_file(SSL *ssl, const char *file, int type)
  39. {
  40. int j;
  41. BIO *in;
  42. int ret = 0;
  43. X509 *cert = NULL, *x = NULL;
  44. in = BIO_new(BIO_s_file());
  45. if (in == NULL) {
  46. ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB);
  47. goto end;
  48. }
  49. if (BIO_read_filename(in, file) <= 0) {
  50. ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB);
  51. goto end;
  52. }
  53. if (type != SSL_FILETYPE_ASN1 && type != SSL_FILETYPE_PEM) {
  54. ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE);
  55. goto end;
  56. }
  57. x = X509_new_ex(ssl->ctx->libctx, ssl->ctx->propq);
  58. if (x == NULL) {
  59. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  60. goto end;
  61. }
  62. if (type == SSL_FILETYPE_ASN1) {
  63. j = ERR_R_ASN1_LIB;
  64. cert = d2i_X509_bio(in, &x);
  65. } else if (type == SSL_FILETYPE_PEM) {
  66. j = ERR_R_PEM_LIB;
  67. cert = PEM_read_bio_X509(in, &x, ssl->default_passwd_callback,
  68. ssl->default_passwd_callback_userdata);
  69. } else {
  70. ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE);
  71. goto end;
  72. }
  73. if (cert == NULL) {
  74. ERR_raise(ERR_LIB_SSL, j);
  75. goto end;
  76. }
  77. ret = SSL_use_certificate(ssl, x);
  78. end:
  79. X509_free(x);
  80. BIO_free(in);
  81. return ret;
  82. }
  83. int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len)
  84. {
  85. X509 *x;
  86. int ret;
  87. x = X509_new_ex(ssl->ctx->libctx, ssl->ctx->propq);
  88. if (x == NULL) {
  89. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  90. return 0;
  91. }
  92. if (d2i_X509(&x, &d, (long)len)== NULL) {
  93. X509_free(x);
  94. ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB);
  95. return 0;
  96. }
  97. ret = SSL_use_certificate(ssl, x);
  98. X509_free(x);
  99. return ret;
  100. }
  101. static int ssl_set_pkey(CERT *c, EVP_PKEY *pkey)
  102. {
  103. size_t i;
  104. if (ssl_cert_lookup_by_pkey(pkey, &i) == NULL) {
  105. ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE);
  106. return 0;
  107. }
  108. if (c->pkeys[i].x509 != NULL
  109. && !X509_check_private_key(c->pkeys[i].x509, pkey))
  110. return 0;
  111. EVP_PKEY_free(c->pkeys[i].privatekey);
  112. EVP_PKEY_up_ref(pkey);
  113. c->pkeys[i].privatekey = pkey;
  114. c->key = &c->pkeys[i];
  115. return 1;
  116. }
  117. int SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey)
  118. {
  119. int ret;
  120. if (pkey == NULL) {
  121. ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
  122. return 0;
  123. }
  124. ret = ssl_set_pkey(ssl->cert, pkey);
  125. return ret;
  126. }
  127. int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type)
  128. {
  129. int j, ret = 0;
  130. BIO *in;
  131. EVP_PKEY *pkey = NULL;
  132. in = BIO_new(BIO_s_file());
  133. if (in == NULL) {
  134. ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB);
  135. goto end;
  136. }
  137. if (BIO_read_filename(in, file) <= 0) {
  138. ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB);
  139. goto end;
  140. }
  141. if (type == SSL_FILETYPE_PEM) {
  142. j = ERR_R_PEM_LIB;
  143. pkey = PEM_read_bio_PrivateKey_ex(in, NULL,
  144. ssl->default_passwd_callback,
  145. ssl->default_passwd_callback_userdata,
  146. ssl->ctx->libctx,
  147. ssl->ctx->propq);
  148. } else if (type == SSL_FILETYPE_ASN1) {
  149. j = ERR_R_ASN1_LIB;
  150. pkey = d2i_PrivateKey_ex_bio(in, NULL, ssl->ctx->libctx,
  151. ssl->ctx->propq);
  152. } else {
  153. ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE);
  154. goto end;
  155. }
  156. if (pkey == NULL) {
  157. ERR_raise(ERR_LIB_SSL, j);
  158. goto end;
  159. }
  160. ret = SSL_use_PrivateKey(ssl, pkey);
  161. EVP_PKEY_free(pkey);
  162. end:
  163. BIO_free(in);
  164. return ret;
  165. }
  166. int SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d,
  167. long len)
  168. {
  169. int ret;
  170. const unsigned char *p;
  171. EVP_PKEY *pkey;
  172. p = d;
  173. if ((pkey = d2i_PrivateKey_ex(type, NULL, &p, (long)len, ssl->ctx->libctx,
  174. ssl->ctx->propq)) == NULL) {
  175. ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB);
  176. return 0;
  177. }
  178. ret = SSL_use_PrivateKey(ssl, pkey);
  179. EVP_PKEY_free(pkey);
  180. return ret;
  181. }
  182. int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x)
  183. {
  184. int rv;
  185. if (x == NULL) {
  186. ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
  187. return 0;
  188. }
  189. rv = ssl_security_cert(NULL, ctx, x, 0, 1);
  190. if (rv != 1) {
  191. ERR_raise(ERR_LIB_SSL, rv);
  192. return 0;
  193. }
  194. return ssl_set_cert(ctx->cert, x);
  195. }
  196. static int ssl_set_cert(CERT *c, X509 *x)
  197. {
  198. EVP_PKEY *pkey;
  199. size_t i;
  200. pkey = X509_get0_pubkey(x);
  201. if (pkey == NULL) {
  202. ERR_raise(ERR_LIB_SSL, SSL_R_X509_LIB);
  203. return 0;
  204. }
  205. if (ssl_cert_lookup_by_pkey(pkey, &i) == NULL) {
  206. ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE);
  207. return 0;
  208. }
  209. if (i == SSL_PKEY_ECC && !EVP_PKEY_can_sign(pkey)) {
  210. ERR_raise(ERR_LIB_SSL, SSL_R_ECC_CERT_NOT_FOR_SIGNING);
  211. return 0;
  212. }
  213. if (c->pkeys[i].privatekey != NULL) {
  214. /*
  215. * The return code from EVP_PKEY_copy_parameters is deliberately
  216. * ignored. Some EVP_PKEY types cannot do this.
  217. */
  218. EVP_PKEY_copy_parameters(pkey, c->pkeys[i].privatekey);
  219. ERR_clear_error();
  220. if (!X509_check_private_key(x, c->pkeys[i].privatekey)) {
  221. /*
  222. * don't fail for a cert/key mismatch, just free current private
  223. * key (when switching to a different cert & key, first this
  224. * function should be used, then ssl_set_pkey
  225. */
  226. EVP_PKEY_free(c->pkeys[i].privatekey);
  227. c->pkeys[i].privatekey = NULL;
  228. /* clear error queue */
  229. ERR_clear_error();
  230. }
  231. }
  232. X509_free(c->pkeys[i].x509);
  233. X509_up_ref(x);
  234. c->pkeys[i].x509 = x;
  235. c->key = &(c->pkeys[i]);
  236. return 1;
  237. }
  238. int SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type)
  239. {
  240. int j = SSL_R_BAD_VALUE;
  241. BIO *in;
  242. int ret = 0;
  243. X509 *x = NULL, *cert = NULL;
  244. in = BIO_new(BIO_s_file());
  245. if (in == NULL) {
  246. ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB);
  247. goto end;
  248. }
  249. if (BIO_read_filename(in, file) <= 0) {
  250. ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB);
  251. goto end;
  252. }
  253. if (type != SSL_FILETYPE_ASN1 && type != SSL_FILETYPE_PEM) {
  254. ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE);
  255. goto end;
  256. }
  257. x = X509_new_ex(ctx->libctx, ctx->propq);
  258. if (x == NULL) {
  259. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  260. goto end;
  261. }
  262. if (type == SSL_FILETYPE_ASN1) {
  263. j = ERR_R_ASN1_LIB;
  264. cert = d2i_X509_bio(in, &x);
  265. } else if (type == SSL_FILETYPE_PEM) {
  266. j = ERR_R_PEM_LIB;
  267. cert = PEM_read_bio_X509(in, &x, ctx->default_passwd_callback,
  268. ctx->default_passwd_callback_userdata);
  269. }
  270. if (cert == NULL) {
  271. ERR_raise(ERR_LIB_SSL, j);
  272. goto end;
  273. }
  274. ret = SSL_CTX_use_certificate(ctx, x);
  275. end:
  276. X509_free(x);
  277. BIO_free(in);
  278. return ret;
  279. }
  280. int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const unsigned char *d)
  281. {
  282. X509 *x;
  283. int ret;
  284. x = X509_new_ex(ctx->libctx, ctx->propq);
  285. if (x == NULL) {
  286. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  287. return 0;
  288. }
  289. if (d2i_X509(&x, &d, (long)len) == NULL) {
  290. X509_free(x);
  291. ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB);
  292. return 0;
  293. }
  294. ret = SSL_CTX_use_certificate(ctx, x);
  295. X509_free(x);
  296. return ret;
  297. }
  298. int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey)
  299. {
  300. if (pkey == NULL) {
  301. ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
  302. return 0;
  303. }
  304. return ssl_set_pkey(ctx->cert, pkey);
  305. }
  306. int SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type)
  307. {
  308. int j, ret = 0;
  309. BIO *in;
  310. EVP_PKEY *pkey = NULL;
  311. in = BIO_new(BIO_s_file());
  312. if (in == NULL) {
  313. ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB);
  314. goto end;
  315. }
  316. if (BIO_read_filename(in, file) <= 0) {
  317. ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB);
  318. goto end;
  319. }
  320. if (type == SSL_FILETYPE_PEM) {
  321. j = ERR_R_PEM_LIB;
  322. pkey = PEM_read_bio_PrivateKey_ex(in, NULL,
  323. ctx->default_passwd_callback,
  324. ctx->default_passwd_callback_userdata,
  325. ctx->libctx, ctx->propq);
  326. } else if (type == SSL_FILETYPE_ASN1) {
  327. j = ERR_R_ASN1_LIB;
  328. pkey = d2i_PrivateKey_ex_bio(in, NULL, ctx->libctx, ctx->propq);
  329. } else {
  330. ERR_raise(ERR_LIB_SSL, SSL_R_BAD_SSL_FILETYPE);
  331. goto end;
  332. }
  333. if (pkey == NULL) {
  334. ERR_raise(ERR_LIB_SSL, j);
  335. goto end;
  336. }
  337. ret = SSL_CTX_use_PrivateKey(ctx, pkey);
  338. EVP_PKEY_free(pkey);
  339. end:
  340. BIO_free(in);
  341. return ret;
  342. }
  343. int SSL_CTX_use_PrivateKey_ASN1(int type, SSL_CTX *ctx,
  344. const unsigned char *d, long len)
  345. {
  346. int ret;
  347. const unsigned char *p;
  348. EVP_PKEY *pkey;
  349. p = d;
  350. if ((pkey = d2i_PrivateKey_ex(type, NULL, &p, (long)len, ctx->libctx,
  351. ctx->propq)) == NULL) {
  352. ERR_raise(ERR_LIB_SSL, ERR_R_ASN1_LIB);
  353. return 0;
  354. }
  355. ret = SSL_CTX_use_PrivateKey(ctx, pkey);
  356. EVP_PKEY_free(pkey);
  357. return ret;
  358. }
  359. /*
  360. * Read a file that contains our certificate in "PEM" format, possibly
  361. * followed by a sequence of CA certificates that should be sent to the peer
  362. * in the Certificate message.
  363. */
  364. static int use_certificate_chain_file(SSL_CTX *ctx, SSL *ssl, const char *file)
  365. {
  366. BIO *in;
  367. int ret = 0;
  368. X509 *x = NULL;
  369. pem_password_cb *passwd_callback;
  370. void *passwd_callback_userdata;
  371. SSL_CTX *real_ctx = (ssl == NULL) ? ctx : ssl->ctx;
  372. if (ctx == NULL && ssl == NULL)
  373. return 0;
  374. ERR_clear_error(); /* clear error stack for
  375. * SSL_CTX_use_certificate() */
  376. if (ctx != NULL) {
  377. passwd_callback = ctx->default_passwd_callback;
  378. passwd_callback_userdata = ctx->default_passwd_callback_userdata;
  379. } else {
  380. passwd_callback = ssl->default_passwd_callback;
  381. passwd_callback_userdata = ssl->default_passwd_callback_userdata;
  382. }
  383. in = BIO_new(BIO_s_file());
  384. if (in == NULL) {
  385. ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB);
  386. goto end;
  387. }
  388. if (BIO_read_filename(in, file) <= 0) {
  389. ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB);
  390. goto end;
  391. }
  392. x = X509_new_ex(real_ctx->libctx, real_ctx->propq);
  393. if (x == NULL) {
  394. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  395. goto end;
  396. }
  397. if (PEM_read_bio_X509_AUX(in, &x, passwd_callback,
  398. passwd_callback_userdata) == NULL) {
  399. ERR_raise(ERR_LIB_SSL, ERR_R_PEM_LIB);
  400. goto end;
  401. }
  402. if (ctx)
  403. ret = SSL_CTX_use_certificate(ctx, x);
  404. else
  405. ret = SSL_use_certificate(ssl, x);
  406. if (ERR_peek_error() != 0)
  407. ret = 0; /* Key/certificate mismatch doesn't imply
  408. * ret==0 ... */
  409. if (ret) {
  410. /*
  411. * If we could set up our certificate, now proceed to the CA
  412. * certificates.
  413. */
  414. X509 *ca;
  415. int r;
  416. unsigned long err;
  417. if (ctx)
  418. r = SSL_CTX_clear_chain_certs(ctx);
  419. else
  420. r = SSL_clear_chain_certs(ssl);
  421. if (r == 0) {
  422. ret = 0;
  423. goto end;
  424. }
  425. while (1) {
  426. ca = X509_new_ex(real_ctx->libctx, real_ctx->propq);
  427. if (ca == NULL) {
  428. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  429. goto end;
  430. }
  431. if (PEM_read_bio_X509(in, &ca, passwd_callback,
  432. passwd_callback_userdata) != NULL) {
  433. if (ctx)
  434. r = SSL_CTX_add0_chain_cert(ctx, ca);
  435. else
  436. r = SSL_add0_chain_cert(ssl, ca);
  437. /*
  438. * Note that we must not free ca if it was successfully added to
  439. * the chain (while we must free the main certificate, since its
  440. * reference count is increased by SSL_CTX_use_certificate).
  441. */
  442. if (!r) {
  443. X509_free(ca);
  444. ret = 0;
  445. goto end;
  446. }
  447. } else {
  448. X509_free(ca);
  449. break;
  450. }
  451. }
  452. /* When the while loop ends, it's usually just EOF. */
  453. err = ERR_peek_last_error();
  454. if (ERR_GET_LIB(err) == ERR_LIB_PEM
  455. && ERR_GET_REASON(err) == PEM_R_NO_START_LINE)
  456. ERR_clear_error();
  457. else
  458. ret = 0; /* some real error */
  459. }
  460. end:
  461. X509_free(x);
  462. BIO_free(in);
  463. return ret;
  464. }
  465. int SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file)
  466. {
  467. return use_certificate_chain_file(ctx, NULL, file);
  468. }
  469. int SSL_use_certificate_chain_file(SSL *ssl, const char *file)
  470. {
  471. return use_certificate_chain_file(NULL, ssl, file);
  472. }
  473. static int serverinfo_find_extension(const unsigned char *serverinfo,
  474. size_t serverinfo_length,
  475. unsigned int extension_type,
  476. const unsigned char **extension_data,
  477. size_t *extension_length)
  478. {
  479. PACKET pkt, data;
  480. *extension_data = NULL;
  481. *extension_length = 0;
  482. if (serverinfo == NULL || serverinfo_length == 0)
  483. return -1;
  484. if (!PACKET_buf_init(&pkt, serverinfo, serverinfo_length))
  485. return -1;
  486. for (;;) {
  487. unsigned int type = 0;
  488. unsigned long context = 0;
  489. /* end of serverinfo */
  490. if (PACKET_remaining(&pkt) == 0)
  491. return 0; /* Extension not found */
  492. if (!PACKET_get_net_4(&pkt, &context)
  493. || !PACKET_get_net_2(&pkt, &type)
  494. || !PACKET_get_length_prefixed_2(&pkt, &data))
  495. return -1;
  496. if (type == extension_type) {
  497. *extension_data = PACKET_data(&data);
  498. *extension_length = PACKET_remaining(&data);;
  499. return 1; /* Success */
  500. }
  501. }
  502. /* Unreachable */
  503. }
  504. static int serverinfoex_srv_parse_cb(SSL *s, unsigned int ext_type,
  505. unsigned int context,
  506. const unsigned char *in,
  507. size_t inlen, X509 *x, size_t chainidx,
  508. int *al, void *arg)
  509. {
  510. if (inlen != 0) {
  511. *al = SSL_AD_DECODE_ERROR;
  512. return 0;
  513. }
  514. return 1;
  515. }
  516. static int serverinfo_srv_parse_cb(SSL *s, unsigned int ext_type,
  517. const unsigned char *in,
  518. size_t inlen, int *al, void *arg)
  519. {
  520. return serverinfoex_srv_parse_cb(s, ext_type, 0, in, inlen, NULL, 0, al,
  521. arg);
  522. }
  523. static int serverinfoex_srv_add_cb(SSL *s, unsigned int ext_type,
  524. unsigned int context,
  525. const unsigned char **out,
  526. size_t *outlen, X509 *x, size_t chainidx,
  527. int *al, void *arg)
  528. {
  529. const unsigned char *serverinfo = NULL;
  530. size_t serverinfo_length = 0;
  531. /* We only support extensions for the first Certificate */
  532. if ((context & SSL_EXT_TLS1_3_CERTIFICATE) != 0 && chainidx > 0)
  533. return 0;
  534. /* Is there serverinfo data for the chosen server cert? */
  535. if ((ssl_get_server_cert_serverinfo(s, &serverinfo,
  536. &serverinfo_length)) != 0) {
  537. /* Find the relevant extension from the serverinfo */
  538. int retval = serverinfo_find_extension(serverinfo, serverinfo_length,
  539. ext_type, out, outlen);
  540. if (retval == -1) {
  541. *al = SSL_AD_INTERNAL_ERROR;
  542. return -1; /* Error */
  543. }
  544. if (retval == 0)
  545. return 0; /* No extension found, don't send extension */
  546. return 1; /* Send extension */
  547. }
  548. return 0; /* No serverinfo data found, don't send
  549. * extension */
  550. }
  551. static int serverinfo_srv_add_cb(SSL *s, unsigned int ext_type,
  552. const unsigned char **out, size_t *outlen,
  553. int *al, void *arg)
  554. {
  555. return serverinfoex_srv_add_cb(s, ext_type, 0, out, outlen, NULL, 0, al,
  556. arg);
  557. }
  558. /*
  559. * With a NULL context, this function just checks that the serverinfo data
  560. * parses correctly. With a non-NULL context, it registers callbacks for
  561. * the included extensions.
  562. */
  563. static int serverinfo_process_buffer(unsigned int version,
  564. const unsigned char *serverinfo,
  565. size_t serverinfo_length, SSL_CTX *ctx)
  566. {
  567. PACKET pkt;
  568. if (serverinfo == NULL || serverinfo_length == 0)
  569. return 0;
  570. if (version != SSL_SERVERINFOV1 && version != SSL_SERVERINFOV2)
  571. return 0;
  572. if (!PACKET_buf_init(&pkt, serverinfo, serverinfo_length))
  573. return 0;
  574. while (PACKET_remaining(&pkt)) {
  575. unsigned long context = 0;
  576. unsigned int ext_type = 0;
  577. PACKET data;
  578. if ((version == SSL_SERVERINFOV2 && !PACKET_get_net_4(&pkt, &context))
  579. || !PACKET_get_net_2(&pkt, &ext_type)
  580. || !PACKET_get_length_prefixed_2(&pkt, &data))
  581. return 0;
  582. if (ctx == NULL)
  583. continue;
  584. /*
  585. * The old style custom extensions API could be set separately for
  586. * server/client, i.e. you could set one custom extension for a client,
  587. * and *for the same extension in the same SSL_CTX* you could set a
  588. * custom extension for the server as well. It seems quite weird to be
  589. * setting a custom extension for both client and server in a single
  590. * SSL_CTX - but theoretically possible. This isn't possible in the
  591. * new API. Therefore, if we have V1 serverinfo we use the old API. We
  592. * also use the old API even if we have V2 serverinfo but the context
  593. * looks like an old style <= TLSv1.2 extension.
  594. */
  595. if (version == SSL_SERVERINFOV1 || context == SYNTHV1CONTEXT) {
  596. if (!SSL_CTX_add_server_custom_ext(ctx, ext_type,
  597. serverinfo_srv_add_cb,
  598. NULL, NULL,
  599. serverinfo_srv_parse_cb,
  600. NULL))
  601. return 0;
  602. } else {
  603. if (!SSL_CTX_add_custom_ext(ctx, ext_type, context,
  604. serverinfoex_srv_add_cb,
  605. NULL, NULL,
  606. serverinfoex_srv_parse_cb,
  607. NULL))
  608. return 0;
  609. }
  610. }
  611. return 1;
  612. }
  613. static size_t extension_contextoff(unsigned int version)
  614. {
  615. return version == SSL_SERVERINFOV1 ? 4 : 0;
  616. }
  617. static size_t extension_append_length(unsigned int version, size_t extension_length)
  618. {
  619. return extension_length + extension_contextoff(version);
  620. }
  621. static void extension_append(unsigned int version,
  622. const unsigned char *extension,
  623. const size_t extension_length,
  624. unsigned char *serverinfo)
  625. {
  626. const size_t contextoff = extension_contextoff(version);
  627. if (contextoff > 0) {
  628. /* We know this only uses the last 2 bytes */
  629. serverinfo[0] = 0;
  630. serverinfo[1] = 0;
  631. serverinfo[2] = (SYNTHV1CONTEXT >> 8) & 0xff;
  632. serverinfo[3] = SYNTHV1CONTEXT & 0xff;
  633. }
  634. memcpy(serverinfo + contextoff, extension, extension_length);
  635. }
  636. int SSL_CTX_use_serverinfo_ex(SSL_CTX *ctx, unsigned int version,
  637. const unsigned char *serverinfo,
  638. size_t serverinfo_length)
  639. {
  640. unsigned char *new_serverinfo = NULL;
  641. if (ctx == NULL || serverinfo == NULL || serverinfo_length == 0) {
  642. ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
  643. return 0;
  644. }
  645. if (version == SSL_SERVERINFOV1) {
  646. /*
  647. * Convert serverinfo version v1 to v2 and call yourself recursively
  648. * over the converted serverinfo.
  649. */
  650. const size_t sinfo_length = extension_append_length(SSL_SERVERINFOV1,
  651. serverinfo_length);
  652. unsigned char *sinfo;
  653. int ret;
  654. sinfo = OPENSSL_malloc(sinfo_length);
  655. if (sinfo == NULL) {
  656. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  657. return 0;
  658. }
  659. extension_append(SSL_SERVERINFOV1, serverinfo, serverinfo_length, sinfo);
  660. ret = SSL_CTX_use_serverinfo_ex(ctx, SSL_SERVERINFOV2, sinfo,
  661. sinfo_length);
  662. OPENSSL_free(sinfo);
  663. return ret;
  664. }
  665. if (!serverinfo_process_buffer(version, serverinfo, serverinfo_length,
  666. NULL)) {
  667. ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SERVERINFO_DATA);
  668. return 0;
  669. }
  670. if (ctx->cert->key == NULL) {
  671. ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
  672. return 0;
  673. }
  674. new_serverinfo = OPENSSL_realloc(ctx->cert->key->serverinfo,
  675. serverinfo_length);
  676. if (new_serverinfo == NULL) {
  677. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  678. return 0;
  679. }
  680. ctx->cert->key->serverinfo = new_serverinfo;
  681. memcpy(ctx->cert->key->serverinfo, serverinfo, serverinfo_length);
  682. ctx->cert->key->serverinfo_length = serverinfo_length;
  683. /*
  684. * Now that the serverinfo is validated and stored, go ahead and
  685. * register callbacks.
  686. */
  687. if (!serverinfo_process_buffer(version, serverinfo, serverinfo_length,
  688. ctx)) {
  689. ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SERVERINFO_DATA);
  690. return 0;
  691. }
  692. return 1;
  693. }
  694. int SSL_CTX_use_serverinfo(SSL_CTX *ctx, const unsigned char *serverinfo,
  695. size_t serverinfo_length)
  696. {
  697. return SSL_CTX_use_serverinfo_ex(ctx, SSL_SERVERINFOV1, serverinfo,
  698. serverinfo_length);
  699. }
  700. int SSL_CTX_use_serverinfo_file(SSL_CTX *ctx, const char *file)
  701. {
  702. unsigned char *serverinfo = NULL;
  703. unsigned char *tmp;
  704. size_t serverinfo_length = 0;
  705. unsigned char *extension = 0;
  706. long extension_length = 0;
  707. char *name = NULL;
  708. char *header = NULL;
  709. static const char namePrefix1[] = "SERVERINFO FOR ";
  710. static const char namePrefix2[] = "SERVERINFOV2 FOR ";
  711. unsigned int name_len;
  712. int ret = 0;
  713. BIO *bin = NULL;
  714. size_t num_extensions = 0;
  715. if (ctx == NULL || file == NULL) {
  716. ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
  717. goto end;
  718. }
  719. bin = BIO_new(BIO_s_file());
  720. if (bin == NULL) {
  721. ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB);
  722. goto end;
  723. }
  724. if (BIO_read_filename(bin, file) <= 0) {
  725. ERR_raise(ERR_LIB_SSL, ERR_R_SYS_LIB);
  726. goto end;
  727. }
  728. for (num_extensions = 0;; num_extensions++) {
  729. unsigned int version;
  730. size_t append_length;
  731. if (PEM_read_bio(bin, &name, &header, &extension, &extension_length)
  732. == 0) {
  733. /*
  734. * There must be at least one extension in this file
  735. */
  736. if (num_extensions == 0) {
  737. ERR_raise(ERR_LIB_SSL, SSL_R_NO_PEM_EXTENSIONS);
  738. goto end;
  739. } else /* End of file, we're done */
  740. break;
  741. }
  742. /* Check that PEM name starts with "BEGIN SERVERINFO FOR " */
  743. name_len = strlen(name);
  744. if (name_len < sizeof(namePrefix1) - 1) {
  745. ERR_raise(ERR_LIB_SSL, SSL_R_PEM_NAME_TOO_SHORT);
  746. goto end;
  747. }
  748. if (strncmp(name, namePrefix1, sizeof(namePrefix1) - 1) == 0) {
  749. version = SSL_SERVERINFOV1;
  750. } else {
  751. if (name_len < sizeof(namePrefix2) - 1) {
  752. ERR_raise(ERR_LIB_SSL, SSL_R_PEM_NAME_TOO_SHORT);
  753. goto end;
  754. }
  755. if (strncmp(name, namePrefix2, sizeof(namePrefix2) - 1) != 0) {
  756. ERR_raise(ERR_LIB_SSL, SSL_R_PEM_NAME_BAD_PREFIX);
  757. goto end;
  758. }
  759. version = SSL_SERVERINFOV2;
  760. }
  761. /*
  762. * Check that the decoded PEM data is plausible (valid length field)
  763. */
  764. if (version == SSL_SERVERINFOV1) {
  765. /* 4 byte header: 2 bytes type, 2 bytes len */
  766. if (extension_length < 4
  767. || (extension[2] << 8) + extension[3]
  768. != extension_length - 4) {
  769. ERR_raise(ERR_LIB_SSL, SSL_R_BAD_DATA);
  770. goto end;
  771. }
  772. } else {
  773. /* 8 byte header: 4 bytes context, 2 bytes type, 2 bytes len */
  774. if (extension_length < 8
  775. || (extension[6] << 8) + extension[7]
  776. != extension_length - 8) {
  777. ERR_raise(ERR_LIB_SSL, SSL_R_BAD_DATA);
  778. goto end;
  779. }
  780. }
  781. /* Append the decoded extension to the serverinfo buffer */
  782. append_length = extension_append_length(version, extension_length);
  783. tmp = OPENSSL_realloc(serverinfo, serverinfo_length + append_length);
  784. if (tmp == NULL) {
  785. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  786. goto end;
  787. }
  788. serverinfo = tmp;
  789. extension_append(version, extension, extension_length,
  790. serverinfo + serverinfo_length);
  791. serverinfo_length += append_length;
  792. OPENSSL_free(name);
  793. name = NULL;
  794. OPENSSL_free(header);
  795. header = NULL;
  796. OPENSSL_free(extension);
  797. extension = NULL;
  798. }
  799. ret = SSL_CTX_use_serverinfo_ex(ctx, SSL_SERVERINFOV2, serverinfo,
  800. serverinfo_length);
  801. end:
  802. /* SSL_CTX_use_serverinfo makes a local copy of the serverinfo. */
  803. OPENSSL_free(name);
  804. OPENSSL_free(header);
  805. OPENSSL_free(extension);
  806. OPENSSL_free(serverinfo);
  807. BIO_free(bin);
  808. return ret;
  809. }
  810. static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
  811. STACK_OF(X509) *chain, int override)
  812. {
  813. int ret = 0;
  814. size_t i;
  815. int j;
  816. int rv;
  817. CERT *c = ssl != NULL ? ssl->cert : ctx->cert;
  818. STACK_OF(X509) *dup_chain = NULL;
  819. EVP_PKEY *pubkey = NULL;
  820. /* Do all security checks before anything else */
  821. rv = ssl_security_cert(ssl, ctx, x509, 0, 1);
  822. if (rv != 1) {
  823. ERR_raise(ERR_LIB_SSL, rv);
  824. goto out;
  825. }
  826. for (j = 0; j < sk_X509_num(chain); j++) {
  827. rv = ssl_security_cert(ssl, ctx, sk_X509_value(chain, j), 0, 0);
  828. if (rv != 1) {
  829. ERR_raise(ERR_LIB_SSL, rv);
  830. goto out;
  831. }
  832. }
  833. pubkey = X509_get_pubkey(x509); /* bumps reference */
  834. if (pubkey == NULL)
  835. goto out;
  836. if (privatekey == NULL) {
  837. privatekey = pubkey;
  838. } else {
  839. /* For RSA, which has no parameters, missing returns 0 */
  840. if (EVP_PKEY_missing_parameters(privatekey)) {
  841. if (EVP_PKEY_missing_parameters(pubkey)) {
  842. /* nobody has parameters? - error */
  843. ERR_raise(ERR_LIB_SSL, SSL_R_MISSING_PARAMETERS);
  844. goto out;
  845. } else {
  846. /* copy to privatekey from pubkey */
  847. if (!EVP_PKEY_copy_parameters(privatekey, pubkey)) {
  848. ERR_raise(ERR_LIB_SSL, SSL_R_COPY_PARAMETERS_FAILED);
  849. goto out;
  850. }
  851. }
  852. } else if (EVP_PKEY_missing_parameters(pubkey)) {
  853. /* copy to pubkey from privatekey */
  854. if (!EVP_PKEY_copy_parameters(pubkey, privatekey)) {
  855. ERR_raise(ERR_LIB_SSL, SSL_R_COPY_PARAMETERS_FAILED);
  856. goto out;
  857. }
  858. } /* else both have parameters */
  859. /* check that key <-> cert match */
  860. if (EVP_PKEY_eq(pubkey, privatekey) != 1) {
  861. ERR_raise(ERR_LIB_SSL, SSL_R_PRIVATE_KEY_MISMATCH);
  862. goto out;
  863. }
  864. }
  865. if (ssl_cert_lookup_by_pkey(pubkey, &i) == NULL) {
  866. ERR_raise(ERR_LIB_SSL, SSL_R_UNKNOWN_CERTIFICATE_TYPE);
  867. goto out;
  868. }
  869. if (!override && (c->pkeys[i].x509 != NULL
  870. || c->pkeys[i].privatekey != NULL
  871. || c->pkeys[i].chain != NULL)) {
  872. /* No override, and something already there */
  873. ERR_raise(ERR_LIB_SSL, SSL_R_NOT_REPLACING_CERTIFICATE);
  874. goto out;
  875. }
  876. if (chain != NULL) {
  877. dup_chain = X509_chain_up_ref(chain);
  878. if (dup_chain == NULL) {
  879. ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
  880. goto out;
  881. }
  882. }
  883. sk_X509_pop_free(c->pkeys[i].chain, X509_free);
  884. c->pkeys[i].chain = dup_chain;
  885. X509_free(c->pkeys[i].x509);
  886. X509_up_ref(x509);
  887. c->pkeys[i].x509 = x509;
  888. EVP_PKEY_free(c->pkeys[i].privatekey);
  889. EVP_PKEY_up_ref(privatekey);
  890. c->pkeys[i].privatekey = privatekey;
  891. c->key = &(c->pkeys[i]);
  892. ret = 1;
  893. out:
  894. EVP_PKEY_free(pubkey);
  895. return ret;
  896. }
  897. int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey,
  898. STACK_OF(X509) *chain, int override)
  899. {
  900. return ssl_set_cert_and_key(ssl, NULL, x509, privatekey, chain, override);
  901. }
  902. int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
  903. STACK_OF(X509) *chain, int override)
  904. {
  905. return ssl_set_cert_and_key(NULL, ctx, x509, privatekey, chain, override);
  906. }