diff options
author | markus <> | 2002-09-05 12:51:50 +0000 |
---|---|---|
committer | markus <> | 2002-09-05 12:51:50 +0000 |
commit | 15b5d84f9da2ce4bfae8580e56e34a859f74ad71 (patch) | |
tree | bf939e82d7fd73cc8a01cf6959002209972091bc /src/lib/libssl/s23_srvr.c | |
parent | 027351f729b9e837200dae6e1520cda6577ab930 (diff) | |
download | openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.gz openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.bz2 openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.zip |
import openssl-0.9.7-beta1
Diffstat (limited to 'src/lib/libssl/s23_srvr.c')
-rw-r--r-- | src/lib/libssl/s23_srvr.c | 338 |
1 files changed, 214 insertions, 124 deletions
diff --git a/src/lib/libssl/s23_srvr.c b/src/lib/libssl/s23_srvr.c index c7b9ecbcf2..9e89cc7f9a 100644 --- a/src/lib/libssl/s23_srvr.c +++ b/src/lib/libssl/s23_srvr.c | |||
@@ -55,28 +55,76 @@ | |||
55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
57 | */ | 57 | */ |
58 | /* ==================================================================== | ||
59 | * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. | ||
60 | * | ||
61 | * Redistribution and use in source and binary forms, with or without | ||
62 | * modification, are permitted provided that the following conditions | ||
63 | * are met: | ||
64 | * | ||
65 | * 1. Redistributions of source code must retain the above copyright | ||
66 | * notice, this list of conditions and the following disclaimer. | ||
67 | * | ||
68 | * 2. Redistributions in binary form must reproduce the above copyright | ||
69 | * notice, this list of conditions and the following disclaimer in | ||
70 | * the documentation and/or other materials provided with the | ||
71 | * distribution. | ||
72 | * | ||
73 | * 3. All advertising materials mentioning features or use of this | ||
74 | * software must display the following acknowledgment: | ||
75 | * "This product includes software developed by the OpenSSL Project | ||
76 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
77 | * | ||
78 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
79 | * endorse or promote products derived from this software without | ||
80 | * prior written permission. For written permission, please contact | ||
81 | * openssl-core@openssl.org. | ||
82 | * | ||
83 | * 5. Products derived from this software may not be called "OpenSSL" | ||
84 | * nor may "OpenSSL" appear in their names without prior written | ||
85 | * permission of the OpenSSL Project. | ||
86 | * | ||
87 | * 6. Redistributions of any form whatsoever must retain the following | ||
88 | * acknowledgment: | ||
89 | * "This product includes software developed by the OpenSSL Project | ||
90 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
91 | * | ||
92 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
93 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
94 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
95 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
96 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
97 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
98 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
99 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
100 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
101 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
102 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
103 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
104 | * ==================================================================== | ||
105 | * | ||
106 | * This product includes cryptographic software written by Eric Young | ||
107 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
108 | * Hudson (tjh@cryptsoft.com). | ||
109 | * | ||
110 | */ | ||
58 | 111 | ||
59 | #include <stdio.h> | 112 | #include <stdio.h> |
60 | #include "buffer.h" | 113 | #include <openssl/buffer.h> |
61 | #include "rand.h" | 114 | #include <openssl/rand.h> |
62 | #include "objects.h" | 115 | #include <openssl/objects.h> |
63 | #include "evp.h" | 116 | #include <openssl/evp.h> |
64 | #include "ssl_locl.h" | 117 | #include "ssl_locl.h" |
65 | 118 | ||
66 | #define BREAK break | 119 | static SSL_METHOD *ssl23_get_server_method(int ver); |
67 | |||
68 | #ifndef NOPROTO | ||
69 | int ssl23_get_client_hello(SSL *s); | 120 | int ssl23_get_client_hello(SSL *s); |
70 | #else | 121 | static SSL_METHOD *ssl23_get_server_method(int ver) |
71 | int ssl23_get_client_hello(); | ||
72 | #endif | ||
73 | |||
74 | static SSL_METHOD *ssl23_get_server_method(ver) | ||
75 | int ver; | ||
76 | { | 122 | { |
123 | #ifndef OPENSSL_NO_SSL2 | ||
77 | if (ver == SSL2_VERSION) | 124 | if (ver == SSL2_VERSION) |
78 | return(SSLv2_server_method()); | 125 | return(SSLv2_server_method()); |
79 | else if (ver == SSL3_VERSION) | 126 | #endif |
127 | if (ver == SSL3_VERSION) | ||
80 | return(SSLv3_server_method()); | 128 | return(SSLv3_server_method()); |
81 | else if (ver == TLS1_VERSION) | 129 | else if (ver == TLS1_VERSION) |
82 | return(TLSv1_server_method()); | 130 | return(TLSv1_server_method()); |
@@ -84,32 +132,31 @@ int ver; | |||
84 | return(NULL); | 132 | return(NULL); |
85 | } | 133 | } |
86 | 134 | ||
87 | SSL_METHOD *SSLv23_server_method() | 135 | SSL_METHOD *SSLv23_server_method(void) |
88 | { | 136 | { |
89 | static int init=1; | 137 | static int init=1; |
90 | static SSL_METHOD SSLv23_server_data; | 138 | static SSL_METHOD SSLv23_server_data; |
91 | 139 | ||
92 | if (init) | 140 | if (init) |
93 | { | 141 | { |
94 | init=0; | ||
95 | memcpy((char *)&SSLv23_server_data, | 142 | memcpy((char *)&SSLv23_server_data, |
96 | (char *)sslv23_base_method(),sizeof(SSL_METHOD)); | 143 | (char *)sslv23_base_method(),sizeof(SSL_METHOD)); |
97 | SSLv23_server_data.ssl_accept=ssl23_accept; | 144 | SSLv23_server_data.ssl_accept=ssl23_accept; |
98 | SSLv23_server_data.get_ssl_method=ssl23_get_server_method; | 145 | SSLv23_server_data.get_ssl_method=ssl23_get_server_method; |
146 | init=0; | ||
99 | } | 147 | } |
100 | return(&SSLv23_server_data); | 148 | return(&SSLv23_server_data); |
101 | } | 149 | } |
102 | 150 | ||
103 | int ssl23_accept(s) | 151 | int ssl23_accept(SSL *s) |
104 | SSL *s; | ||
105 | { | 152 | { |
106 | BUF_MEM *buf; | 153 | BUF_MEM *buf; |
107 | unsigned long Time=time(NULL); | 154 | unsigned long Time=time(NULL); |
108 | void (*cb)()=NULL; | 155 | void (*cb)(const SSL *ssl,int type,int val)=NULL; |
109 | int ret= -1; | 156 | int ret= -1; |
110 | int new_state,state; | 157 | int new_state,state; |
111 | 158 | ||
112 | RAND_seed((unsigned char *)&Time,sizeof(Time)); | 159 | RAND_add(&Time,sizeof(Time),0); |
113 | ERR_clear_error(); | 160 | ERR_clear_error(); |
114 | clear_sys_error(); | 161 | clear_sys_error(); |
115 | 162 | ||
@@ -118,8 +165,8 @@ SSL *s; | |||
118 | else if (s->ctx->info_callback != NULL) | 165 | else if (s->ctx->info_callback != NULL) |
119 | cb=s->ctx->info_callback; | 166 | cb=s->ctx->info_callback; |
120 | 167 | ||
121 | if (!SSL_in_init(s) || SSL_in_before(s)) SSL_clear(s); | ||
122 | s->in_handshake++; | 168 | s->in_handshake++; |
169 | if (!SSL_in_init(s) || SSL_in_before(s)) SSL_clear(s); | ||
123 | 170 | ||
124 | for (;;) | 171 | for (;;) |
125 | { | 172 | { |
@@ -132,6 +179,7 @@ SSL *s; | |||
132 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: | 179 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: |
133 | case SSL_ST_OK|SSL_ST_ACCEPT: | 180 | case SSL_ST_OK|SSL_ST_ACCEPT: |
134 | 181 | ||
182 | s->server=1; | ||
135 | if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); | 183 | if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); |
136 | 184 | ||
137 | /* s->version=SSL3_VERSION; */ | 185 | /* s->version=SSL3_VERSION; */ |
@@ -155,7 +203,7 @@ SSL *s; | |||
155 | ssl3_init_finished_mac(s); | 203 | ssl3_init_finished_mac(s); |
156 | 204 | ||
157 | s->state=SSL23_ST_SR_CLNT_HELLO_A; | 205 | s->state=SSL23_ST_SR_CLNT_HELLO_A; |
158 | s->ctx->sess_accept++; | 206 | s->ctx->stats.sess_accept++; |
159 | s->init_num=0; | 207 | s->init_num=0; |
160 | break; | 208 | break; |
161 | 209 | ||
@@ -166,7 +214,7 @@ SSL *s; | |||
166 | ret=ssl23_get_client_hello(s); | 214 | ret=ssl23_get_client_hello(s); |
167 | if (ret >= 0) cb=NULL; | 215 | if (ret >= 0) cb=NULL; |
168 | goto end; | 216 | goto end; |
169 | break; | 217 | /* break; */ |
170 | 218 | ||
171 | default: | 219 | default: |
172 | SSLerr(SSL_F_SSL23_ACCEPT,SSL_R_UNKNOWN_STATE); | 220 | SSLerr(SSL_F_SSL23_ACCEPT,SSL_R_UNKNOWN_STATE); |
@@ -184,31 +232,48 @@ SSL *s; | |||
184 | } | 232 | } |
185 | } | 233 | } |
186 | end: | 234 | end: |
235 | s->in_handshake--; | ||
187 | if (cb != NULL) | 236 | if (cb != NULL) |
188 | cb(s,SSL_CB_ACCEPT_EXIT,ret); | 237 | cb(s,SSL_CB_ACCEPT_EXIT,ret); |
189 | s->in_handshake--; | ||
190 | return(ret); | 238 | return(ret); |
191 | } | 239 | } |
192 | 240 | ||
193 | 241 | ||
194 | int ssl23_get_client_hello(s) | 242 | int ssl23_get_client_hello(SSL *s) |
195 | SSL *s; | ||
196 | { | 243 | { |
197 | char buf_space[8]; | 244 | char buf_space[11]; /* Request this many bytes in initial read. |
245 | * We can detect SSL 3.0/TLS 1.0 Client Hellos | ||
246 | * ('type == 3') correctly only when the following | ||
247 | * is in a single record, which is not guaranteed by | ||
248 | * the protocol specification: | ||
249 | * Byte Content | ||
250 | * 0 type \ | ||
251 | * 1/2 version > record header | ||
252 | * 3/4 length / | ||
253 | * 5 msg_type \ | ||
254 | * 6-8 length > Client Hello message | ||
255 | * 9/10 client_version / | ||
256 | */ | ||
198 | char *buf= &(buf_space[0]); | 257 | char *buf= &(buf_space[0]); |
199 | unsigned char *p,*d,*dd; | 258 | unsigned char *p,*d,*d_len,*dd; |
200 | unsigned int i; | 259 | unsigned int i; |
201 | unsigned int csl,sil,cl; | 260 | unsigned int csl,sil,cl; |
202 | int n=0,j,tls1=0; | 261 | int n=0,j; |
203 | int type=0,use_sslv2_strong=0; | 262 | int type=0; |
263 | int v[2]; | ||
264 | #ifndef OPENSSL_NO_RSA | ||
265 | int use_sslv2_strong=0; | ||
266 | #endif | ||
204 | 267 | ||
205 | /* read the initial header */ | ||
206 | if (s->state == SSL23_ST_SR_CLNT_HELLO_A) | 268 | if (s->state == SSL23_ST_SR_CLNT_HELLO_A) |
207 | { | 269 | { |
270 | /* read the initial header */ | ||
271 | v[0]=v[1]=0; | ||
272 | |||
208 | if (!ssl3_setup_buffers(s)) goto err; | 273 | if (!ssl3_setup_buffers(s)) goto err; |
209 | 274 | ||
210 | n=ssl23_read_bytes(s,7); | 275 | n=ssl23_read_bytes(s, sizeof buf_space); |
211 | if (n != 7) return(n); | 276 | if (n != sizeof buf_space) return(n); /* n == -1 || n == 0 */ |
212 | 277 | ||
213 | p=s->packet; | 278 | p=s->packet; |
214 | 279 | ||
@@ -216,124 +281,135 @@ SSL *s; | |||
216 | 281 | ||
217 | if ((p[0] & 0x80) && (p[2] == SSL2_MT_CLIENT_HELLO)) | 282 | if ((p[0] & 0x80) && (p[2] == SSL2_MT_CLIENT_HELLO)) |
218 | { | 283 | { |
219 | /* SSLv2 header */ | 284 | /* |
285 | * SSLv2 header | ||
286 | */ | ||
220 | if ((p[3] == 0x00) && (p[4] == 0x02)) | 287 | if ((p[3] == 0x00) && (p[4] == 0x02)) |
221 | { | 288 | { |
289 | v[0]=p[3]; v[1]=p[4]; | ||
222 | /* SSLv2 */ | 290 | /* SSLv2 */ |
223 | if (!(s->options & SSL_OP_NO_SSLv2)) | 291 | if (!(s->options & SSL_OP_NO_SSLv2)) |
224 | type=1; | 292 | type=1; |
225 | } | 293 | } |
226 | else if (p[3] == SSL3_VERSION_MAJOR) | 294 | else if (p[3] == SSL3_VERSION_MAJOR) |
227 | { | 295 | { |
296 | v[0]=p[3]; v[1]=p[4]; | ||
228 | /* SSLv3/TLSv1 */ | 297 | /* SSLv3/TLSv1 */ |
229 | if (p[4] >= TLS1_VERSION_MINOR) | 298 | if (p[4] >= TLS1_VERSION_MINOR) |
230 | { | 299 | { |
231 | if (!(s->options & SSL_OP_NO_TLSv1)) | 300 | if (!(s->options & SSL_OP_NO_TLSv1)) |
232 | { | 301 | { |
233 | tls1=1; | 302 | s->version=TLS1_VERSION; |
303 | /* type=2; */ /* done later to survive restarts */ | ||
234 | s->state=SSL23_ST_SR_CLNT_HELLO_B; | 304 | s->state=SSL23_ST_SR_CLNT_HELLO_B; |
235 | } | 305 | } |
236 | else if (!(s->options & SSL_OP_NO_SSLv3)) | 306 | else if (!(s->options & SSL_OP_NO_SSLv3)) |
237 | { | 307 | { |
308 | s->version=SSL3_VERSION; | ||
309 | /* type=2; */ | ||
238 | s->state=SSL23_ST_SR_CLNT_HELLO_B; | 310 | s->state=SSL23_ST_SR_CLNT_HELLO_B; |
239 | } | 311 | } |
312 | else if (!(s->options & SSL_OP_NO_SSLv2)) | ||
313 | { | ||
314 | type=1; | ||
315 | } | ||
240 | } | 316 | } |
241 | else if (!(s->options & SSL_OP_NO_SSLv3)) | 317 | else if (!(s->options & SSL_OP_NO_SSLv3)) |
242 | s->state=SSL23_ST_SR_CLNT_HELLO_B; | ||
243 | |||
244 | if (s->options & SSL_OP_NON_EXPORT_FIRST) | ||
245 | { | 318 | { |
246 | STACK *sk; | 319 | s->version=SSL3_VERSION; |
247 | SSL_CIPHER *c; | 320 | /* type=2; */ |
248 | int ne2,ne3; | 321 | s->state=SSL23_ST_SR_CLNT_HELLO_B; |
249 | |||
250 | j=((p[0]&0x7f)<<8)|p[1]; | ||
251 | if (j > (1024*4)) | ||
252 | { | ||
253 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_RECORD_TOO_LARGE); | ||
254 | goto err; | ||
255 | } | ||
256 | |||
257 | n=ssl23_read_bytes(s,j+2); | ||
258 | if (n <= 0) return(n); | ||
259 | p=s->packet; | ||
260 | |||
261 | if ((buf=Malloc(n)) == NULL) | ||
262 | { | ||
263 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,ERR_R_MALLOC_FAILURE); | ||
264 | goto err; | ||
265 | } | ||
266 | memcpy(buf,p,n); | ||
267 | |||
268 | p+=5; | ||
269 | n2s(p,csl); | ||
270 | p+=4; | ||
271 | |||
272 | sk=ssl_bytes_to_cipher_list( | ||
273 | s,p,csl,NULL); | ||
274 | if (sk != NULL) | ||
275 | { | ||
276 | ne2=ne3=0; | ||
277 | for (j=0; j<sk_num(sk); j++) | ||
278 | { | ||
279 | c=(SSL_CIPHER *)sk_value(sk,j); | ||
280 | if (!(c->algorithms & SSL_EXP)) | ||
281 | { | ||
282 | if ((c->id>>24L) == 2L) | ||
283 | ne2=1; | ||
284 | else | ||
285 | ne3=1; | ||
286 | } | ||
287 | } | ||
288 | if (ne2 && !ne3) | ||
289 | { | ||
290 | type=1; | ||
291 | use_sslv2_strong=1; | ||
292 | goto next_bit; | ||
293 | } | ||
294 | } | ||
295 | } | 322 | } |
323 | else if (!(s->options & SSL_OP_NO_SSLv2)) | ||
324 | type=1; | ||
325 | |||
296 | } | 326 | } |
297 | } | 327 | } |
298 | else if ((p[0] == SSL3_RT_HANDSHAKE) && | 328 | else if ((p[0] == SSL3_RT_HANDSHAKE) && |
299 | (p[1] == SSL3_VERSION_MAJOR) && | 329 | (p[1] == SSL3_VERSION_MAJOR) && |
300 | (p[5] == SSL3_MT_CLIENT_HELLO)) | 330 | (p[5] == SSL3_MT_CLIENT_HELLO) && |
331 | ((p[3] == 0 && p[4] < 5 /* silly record length? */) | ||
332 | || (p[9] == p[1]))) | ||
301 | { | 333 | { |
302 | /* true SSLv3 or tls1 */ | 334 | /* |
303 | if (p[2] >= TLS1_VERSION_MINOR) | 335 | * SSLv3 or tls1 header |
336 | */ | ||
337 | |||
338 | v[0]=p[1]; /* major version (= SSL3_VERSION_MAJOR) */ | ||
339 | /* We must look at client_version inside the Client Hello message | ||
340 | * to get the correct minor version. | ||
341 | * However if we have only a pathologically small fragment of the | ||
342 | * Client Hello message, this would be difficult, and we'd have | ||
343 | * to read more records to find out. | ||
344 | * No known SSL 3.0 client fragments ClientHello like this, | ||
345 | * so we simply assume TLS 1.0 to avoid protocol version downgrade | ||
346 | * attacks. */ | ||
347 | if (p[3] == 0 && p[4] < 6) | ||
348 | { | ||
349 | #if 0 | ||
350 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_RECORD_TOO_SMALL); | ||
351 | goto err; | ||
352 | #else | ||
353 | v[1] = TLS1_VERSION_MINOR; | ||
354 | #endif | ||
355 | } | ||
356 | else | ||
357 | v[1]=p[10]; /* minor version according to client_version */ | ||
358 | if (v[1] >= TLS1_VERSION_MINOR) | ||
304 | { | 359 | { |
305 | if (!(s->options & SSL_OP_NO_TLSv1)) | 360 | if (!(s->options & SSL_OP_NO_TLSv1)) |
306 | { | 361 | { |
362 | s->version=TLS1_VERSION; | ||
307 | type=3; | 363 | type=3; |
308 | tls1=1; | ||
309 | } | 364 | } |
310 | else if (!(s->options & SSL_OP_NO_SSLv3)) | 365 | else if (!(s->options & SSL_OP_NO_SSLv3)) |
366 | { | ||
367 | s->version=SSL3_VERSION; | ||
368 | type=3; | ||
369 | } | ||
370 | } | ||
371 | else | ||
372 | { | ||
373 | /* client requests SSL 3.0 */ | ||
374 | if (!(s->options & SSL_OP_NO_SSLv3)) | ||
375 | { | ||
376 | s->version=SSL3_VERSION; | ||
311 | type=3; | 377 | type=3; |
378 | } | ||
379 | else if (!(s->options & SSL_OP_NO_TLSv1)) | ||
380 | { | ||
381 | /* we won't be able to use TLS of course, | ||
382 | * but this will send an appropriate alert */ | ||
383 | s->version=TLS1_VERSION; | ||
384 | type=3; | ||
385 | } | ||
312 | } | 386 | } |
313 | else if (!(s->options & SSL_OP_NO_SSLv3)) | ||
314 | type=3; | ||
315 | } | 387 | } |
316 | else if ((strncmp("GET ", p,4) == 0) || | 388 | else if ((strncmp("GET ", (char *)p,4) == 0) || |
317 | (strncmp("POST ",p,5) == 0) || | 389 | (strncmp("POST ",(char *)p,5) == 0) || |
318 | (strncmp("HEAD ",p,5) == 0) || | 390 | (strncmp("HEAD ",(char *)p,5) == 0) || |
319 | (strncmp("PUT ", p,4) == 0)) | 391 | (strncmp("PUT ", (char *)p,4) == 0)) |
320 | { | 392 | { |
321 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_HTTP_REQUEST); | 393 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_HTTP_REQUEST); |
322 | goto err; | 394 | goto err; |
323 | } | 395 | } |
324 | else if (strncmp("CONNECT",p,7) == 0) | 396 | else if (strncmp("CONNECT",(char *)p,7) == 0) |
325 | { | 397 | { |
326 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_HTTPS_PROXY_REQUEST); | 398 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_HTTPS_PROXY_REQUEST); |
327 | goto err; | 399 | goto err; |
328 | } | 400 | } |
329 | } | 401 | } |
330 | 402 | ||
331 | next_bit: | ||
332 | if (s->state == SSL23_ST_SR_CLNT_HELLO_B) | 403 | if (s->state == SSL23_ST_SR_CLNT_HELLO_B) |
333 | { | 404 | { |
334 | /* we have a SSLv3/TLSv1 in a SSLv2 header */ | 405 | /* we have SSLv3/TLSv1 in an SSLv2 header |
406 | * (other cases skip this state) */ | ||
407 | |||
335 | type=2; | 408 | type=2; |
336 | p=s->packet; | 409 | p=s->packet; |
410 | v[0] = p[3]; /* == SSL3_VERSION_MAJOR */ | ||
411 | v[1] = p[4]; | ||
412 | |||
337 | n=((p[0]&0x7f)<<8)|p[1]; | 413 | n=((p[0]&0x7f)<<8)|p[1]; |
338 | if (n > (1024*4)) | 414 | if (n > (1024*4)) |
339 | { | 415 | { |
@@ -344,7 +420,9 @@ next_bit: | |||
344 | j=ssl23_read_bytes(s,n+2); | 420 | j=ssl23_read_bytes(s,n+2); |
345 | if (j <= 0) return(j); | 421 | if (j <= 0) return(j); |
346 | 422 | ||
347 | ssl3_finish_mac(s,&(s->packet[2]),s->packet_length-2); | 423 | ssl3_finish_mac(s, s->packet+2, s->packet_length-2); |
424 | if (s->msg_callback) | ||
425 | s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */ | ||
348 | 426 | ||
349 | p=s->packet; | 427 | p=s->packet; |
350 | p+=5; | 428 | p+=5; |
@@ -358,14 +436,18 @@ next_bit: | |||
358 | goto err; | 436 | goto err; |
359 | } | 437 | } |
360 | 438 | ||
361 | *(d++)=SSL3_VERSION_MAJOR; | 439 | /* record header: msg_type ... */ |
362 | if (tls1) | 440 | *(d++) = SSL3_MT_CLIENT_HELLO; |
363 | *(d++)=TLS1_VERSION_MINOR; | 441 | /* ... and length (actual value will be written later) */ |
364 | else | 442 | d_len = d; |
365 | *(d++)=SSL3_VERSION_MINOR; | 443 | d += 3; |
444 | |||
445 | /* client_version */ | ||
446 | *(d++) = SSL3_VERSION_MAJOR; /* == v[0] */ | ||
447 | *(d++) = v[1]; | ||
366 | 448 | ||
367 | /* lets populate the random area */ | 449 | /* lets populate the random area */ |
368 | /* get the chalenge_length */ | 450 | /* get the challenge_length */ |
369 | i=(cl > SSL3_RANDOM_SIZE)?SSL3_RANDOM_SIZE:cl; | 451 | i=(cl > SSL3_RANDOM_SIZE)?SSL3_RANDOM_SIZE:cl; |
370 | memset(d,0,SSL3_RANDOM_SIZE); | 452 | memset(d,0,SSL3_RANDOM_SIZE); |
371 | memcpy(&(d[SSL3_RANDOM_SIZE-i]),&(p[csl+sil]),i); | 453 | memcpy(&(d[SSL3_RANDOM_SIZE-i]),&(p[csl+sil]),i); |
@@ -387,11 +469,12 @@ next_bit: | |||
387 | } | 469 | } |
388 | s2n(j,dd); | 470 | s2n(j,dd); |
389 | 471 | ||
390 | /* compression */ | 472 | /* COMPRESSION */ |
391 | *(d++)=1; | 473 | *(d++)=1; |
392 | *(d++)=0; | 474 | *(d++)=0; |
393 | 475 | ||
394 | i=(d-(unsigned char *)s->init_buf->data); | 476 | i = (d-(unsigned char *)s->init_buf->data) - 4; |
477 | l2n3((long)i, d_len); | ||
395 | 478 | ||
396 | /* get the data reused from the init_buf */ | 479 | /* get the data reused from the init_buf */ |
397 | s->s3->tmp.reuse_message=1; | 480 | s->s3->tmp.reuse_message=1; |
@@ -399,8 +482,15 @@ next_bit: | |||
399 | s->s3->tmp.message_size=i; | 482 | s->s3->tmp.message_size=i; |
400 | } | 483 | } |
401 | 484 | ||
485 | /* imaginary new state (for program structure): */ | ||
486 | /* s->state = SSL23_SR_CLNT_HELLO_C */ | ||
487 | |||
402 | if (type == 1) | 488 | if (type == 1) |
403 | { | 489 | { |
490 | #ifdef OPENSSL_NO_SSL2 | ||
491 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO,SSL_R_UNSUPPORTED_PROTOCOL); | ||
492 | goto err; | ||
493 | #else | ||
404 | /* we are talking sslv2 */ | 494 | /* we are talking sslv2 */ |
405 | /* we need to clean up the SSLv3/TLSv1 setup and put in the | 495 | /* we need to clean up the SSLv3/TLSv1 setup and put in the |
406 | * sslv2 stuff. */ | 496 | * sslv2 stuff. */ |
@@ -423,12 +513,15 @@ next_bit: | |||
423 | 513 | ||
424 | s->state=SSL2_ST_GET_CLIENT_HELLO_A; | 514 | s->state=SSL2_ST_GET_CLIENT_HELLO_A; |
425 | if ((s->options & SSL_OP_MSIE_SSLV2_RSA_PADDING) || | 515 | if ((s->options & SSL_OP_MSIE_SSLV2_RSA_PADDING) || |
426 | use_sslv2_strong) | 516 | use_sslv2_strong || |
517 | (s->options & SSL_OP_NO_TLSv1 && s->options & SSL_OP_NO_SSLv3)) | ||
427 | s->s2->ssl2_rollback=0; | 518 | s->s2->ssl2_rollback=0; |
428 | else | 519 | else |
520 | /* reject SSL 2.0 session if client supports SSL 3.0 or TLS 1.0 | ||
521 | * (SSL 3.0 draft/RFC 2246, App. E.2) */ | ||
429 | s->s2->ssl2_rollback=1; | 522 | s->s2->ssl2_rollback=1; |
430 | 523 | ||
431 | /* setup the 5 bytes we have read so we get them from | 524 | /* setup the n bytes we have read so we get them from |
432 | * the sslv2 buffer */ | 525 | * the sslv2 buffer */ |
433 | s->rstate=SSL_ST_READ_HEADER; | 526 | s->rstate=SSL_ST_READ_HEADER; |
434 | s->packet_length=n; | 527 | s->packet_length=n; |
@@ -439,11 +532,12 @@ next_bit: | |||
439 | 532 | ||
440 | s->method=SSLv2_server_method(); | 533 | s->method=SSLv2_server_method(); |
441 | s->handshake_func=s->method->ssl_accept; | 534 | s->handshake_func=s->method->ssl_accept; |
535 | #endif | ||
442 | } | 536 | } |
443 | 537 | ||
444 | if ((type == 2) || (type == 3)) | 538 | if ((type == 2) || (type == 3)) |
445 | { | 539 | { |
446 | /* we have SSLv3/TLSv1 */ | 540 | /* we have SSLv3/TLSv1 (type 2: SSL2 style, type 3: SSL3/TLS style) */ |
447 | 541 | ||
448 | if (!ssl_init_wbio_buffer(s,1)) goto err; | 542 | if (!ssl_init_wbio_buffer(s,1)) goto err; |
449 | 543 | ||
@@ -468,16 +562,13 @@ next_bit: | |||
468 | s->s3->rbuf.offset=0; | 562 | s->s3->rbuf.offset=0; |
469 | } | 563 | } |
470 | 564 | ||
471 | if (tls1) | 565 | if (s->version == TLS1_VERSION) |
472 | { | 566 | s->method = TLSv1_server_method(); |
473 | s->version=TLS1_VERSION; | ||
474 | s->method=TLSv1_server_method(); | ||
475 | } | ||
476 | else | 567 | else |
477 | { | 568 | s->method = SSLv3_server_method(); |
478 | s->version=SSL3_VERSION; | 569 | #if 0 /* ssl3_get_client_hello does this */ |
479 | s->method=SSLv3_server_method(); | 570 | s->client_version=(v[0]<<8)|v[1]; |
480 | } | 571 | #endif |
481 | s->handshake_func=s->method->ssl_accept; | 572 | s->handshake_func=s->method->ssl_accept; |
482 | } | 573 | } |
483 | 574 | ||
@@ -489,11 +580,10 @@ next_bit: | |||
489 | } | 580 | } |
490 | s->init_num=0; | 581 | s->init_num=0; |
491 | 582 | ||
492 | if (buf != buf_space) Free(buf); | 583 | if (buf != buf_space) OPENSSL_free(buf); |
493 | s->first_packet=1; | 584 | s->first_packet=1; |
494 | return(SSL_accept(s)); | 585 | return(SSL_accept(s)); |
495 | err: | 586 | err: |
496 | if (buf != buf_space) Free(buf); | 587 | if (buf != buf_space) OPENSSL_free(buf); |
497 | return(-1); | 588 | return(-1); |
498 | } | 589 | } |
499 | |||