diff options
Diffstat (limited to 'src/lib/libssl/tls13_legacy.c')
| -rw-r--r-- | src/lib/libssl/tls13_legacy.c | 72 |
1 files changed, 36 insertions, 36 deletions
diff --git a/src/lib/libssl/tls13_legacy.c b/src/lib/libssl/tls13_legacy.c index 545f2cd978..57fb84cefb 100644 --- a/src/lib/libssl/tls13_legacy.c +++ b/src/lib/libssl/tls13_legacy.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls13_legacy.c,v 1.38 2022/07/17 15:49:20 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_legacy.c,v 1.39 2022/10/02 16:36:42 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -30,7 +30,7 @@ tls13_legacy_wire_read(SSL *ssl, uint8_t *buf, size_t len) | |||
| 30 | return TLS13_IO_FAILURE; | 30 | return TLS13_IO_FAILURE; |
| 31 | } | 31 | } |
| 32 | 32 | ||
| 33 | ssl->internal->rwstate = SSL_READING; | 33 | ssl->rwstate = SSL_READING; |
| 34 | errno = 0; | 34 | errno = 0; |
| 35 | 35 | ||
| 36 | if ((n = BIO_read(ssl->rbio, buf, len)) <= 0) { | 36 | if ((n = BIO_read(ssl->rbio, buf, len)) <= 0) { |
| @@ -46,7 +46,7 @@ tls13_legacy_wire_read(SSL *ssl, uint8_t *buf, size_t len) | |||
| 46 | } | 46 | } |
| 47 | 47 | ||
| 48 | if (n == len) | 48 | if (n == len) |
| 49 | ssl->internal->rwstate = SSL_NOTHING; | 49 | ssl->rwstate = SSL_NOTHING; |
| 50 | 50 | ||
| 51 | return n; | 51 | return n; |
| 52 | } | 52 | } |
| @@ -69,7 +69,7 @@ tls13_legacy_wire_write(SSL *ssl, const uint8_t *buf, size_t len) | |||
| 69 | return TLS13_IO_FAILURE; | 69 | return TLS13_IO_FAILURE; |
| 70 | } | 70 | } |
| 71 | 71 | ||
| 72 | ssl->internal->rwstate = SSL_WRITING; | 72 | ssl->rwstate = SSL_WRITING; |
| 73 | errno = 0; | 73 | errno = 0; |
| 74 | 74 | ||
| 75 | if ((n = BIO_write(ssl->wbio, buf, len)) <= 0) { | 75 | if ((n = BIO_write(ssl->wbio, buf, len)) <= 0) { |
| @@ -83,7 +83,7 @@ tls13_legacy_wire_write(SSL *ssl, const uint8_t *buf, size_t len) | |||
| 83 | } | 83 | } |
| 84 | 84 | ||
| 85 | if (n == len) | 85 | if (n == len) |
| 86 | ssl->internal->rwstate = SSL_NOTHING; | 86 | ssl->rwstate = SSL_NOTHING; |
| 87 | 87 | ||
| 88 | return n; | 88 | return n; |
| 89 | } | 89 | } |
| @@ -123,7 +123,7 @@ tls13_legacy_wire_flush_cb(void *arg) | |||
| 123 | static void | 123 | static void |
| 124 | tls13_legacy_error(SSL *ssl) | 124 | tls13_legacy_error(SSL *ssl) |
| 125 | { | 125 | { |
| 126 | struct tls13_ctx *ctx = ssl->internal->tls13; | 126 | struct tls13_ctx *ctx = ssl->tls13; |
| 127 | int reason = SSL_R_UNKNOWN; | 127 | int reason = SSL_R_UNKNOWN; |
| 128 | 128 | ||
| 129 | /* If we received a fatal alert we already put an error on the stack. */ | 129 | /* If we received a fatal alert we already put an error on the stack. */ |
| @@ -171,7 +171,7 @@ tls13_legacy_return_code(SSL *ssl, ssize_t ret) | |||
| 171 | if (ret > 0) | 171 | if (ret > 0) |
| 172 | return ret; | 172 | return ret; |
| 173 | 173 | ||
| 174 | ssl->internal->rwstate = SSL_NOTHING; | 174 | ssl->rwstate = SSL_NOTHING; |
| 175 | 175 | ||
| 176 | switch (ret) { | 176 | switch (ret) { |
| 177 | case TLS13_IO_EOF: | 177 | case TLS13_IO_EOF: |
| @@ -187,12 +187,12 @@ tls13_legacy_return_code(SSL *ssl, ssize_t ret) | |||
| 187 | 187 | ||
| 188 | case TLS13_IO_WANT_POLLIN: | 188 | case TLS13_IO_WANT_POLLIN: |
| 189 | BIO_set_retry_read(ssl->rbio); | 189 | BIO_set_retry_read(ssl->rbio); |
| 190 | ssl->internal->rwstate = SSL_READING; | 190 | ssl->rwstate = SSL_READING; |
| 191 | return -1; | 191 | return -1; |
| 192 | 192 | ||
| 193 | case TLS13_IO_WANT_POLLOUT: | 193 | case TLS13_IO_WANT_POLLOUT: |
| 194 | BIO_set_retry_write(ssl->wbio); | 194 | BIO_set_retry_write(ssl->wbio); |
| 195 | ssl->internal->rwstate = SSL_WRITING; | 195 | ssl->rwstate = SSL_WRITING; |
| 196 | return -1; | 196 | return -1; |
| 197 | 197 | ||
| 198 | case TLS13_IO_WANT_RETRY: | 198 | case TLS13_IO_WANT_RETRY: |
| @@ -207,7 +207,7 @@ tls13_legacy_return_code(SSL *ssl, ssize_t ret) | |||
| 207 | int | 207 | int |
| 208 | tls13_legacy_pending(const SSL *ssl) | 208 | tls13_legacy_pending(const SSL *ssl) |
| 209 | { | 209 | { |
| 210 | struct tls13_ctx *ctx = ssl->internal->tls13; | 210 | struct tls13_ctx *ctx = ssl->tls13; |
| 211 | ssize_t ret; | 211 | ssize_t ret; |
| 212 | 212 | ||
| 213 | if (ctx == NULL) | 213 | if (ctx == NULL) |
| @@ -223,11 +223,11 @@ tls13_legacy_pending(const SSL *ssl) | |||
| 223 | int | 223 | int |
| 224 | tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int peek) | 224 | tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int peek) |
| 225 | { | 225 | { |
| 226 | struct tls13_ctx *ctx = ssl->internal->tls13; | 226 | struct tls13_ctx *ctx = ssl->tls13; |
| 227 | ssize_t ret; | 227 | ssize_t ret; |
| 228 | 228 | ||
| 229 | if (ctx == NULL || !ctx->handshake_completed) { | 229 | if (ctx == NULL || !ctx->handshake_completed) { |
| 230 | if ((ret = ssl->internal->handshake_func(ssl)) <= 0) | 230 | if ((ret = ssl->handshake_func(ssl)) <= 0) |
| 231 | return ret; | 231 | return ret; |
| 232 | if (len == 0) | 232 | if (len == 0) |
| 233 | return 0; | 233 | return 0; |
| @@ -235,7 +235,7 @@ tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int pee | |||
| 235 | } | 235 | } |
| 236 | 236 | ||
| 237 | tls13_record_layer_set_retry_after_phh(ctx->rl, | 237 | tls13_record_layer_set_retry_after_phh(ctx->rl, |
| 238 | (ctx->ssl->internal->mode & SSL_MODE_AUTO_RETRY) != 0); | 238 | (ctx->ssl->mode & SSL_MODE_AUTO_RETRY) != 0); |
| 239 | 239 | ||
| 240 | if (type != SSL3_RT_APPLICATION_DATA) { | 240 | if (type != SSL3_RT_APPLICATION_DATA) { |
| 241 | SSLerror(ssl, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); | 241 | SSLerror(ssl, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); |
| @@ -257,13 +257,13 @@ tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int pee | |||
| 257 | int | 257 | int |
| 258 | tls13_legacy_write_bytes(SSL *ssl, int type, const void *vbuf, int len) | 258 | tls13_legacy_write_bytes(SSL *ssl, int type, const void *vbuf, int len) |
| 259 | { | 259 | { |
| 260 | struct tls13_ctx *ctx = ssl->internal->tls13; | 260 | struct tls13_ctx *ctx = ssl->tls13; |
| 261 | const uint8_t *buf = vbuf; | 261 | const uint8_t *buf = vbuf; |
| 262 | size_t n, sent; | 262 | size_t n, sent; |
| 263 | ssize_t ret; | 263 | ssize_t ret; |
| 264 | 264 | ||
| 265 | if (ctx == NULL || !ctx->handshake_completed) { | 265 | if (ctx == NULL || !ctx->handshake_completed) { |
| 266 | if ((ret = ssl->internal->handshake_func(ssl)) <= 0) | 266 | if ((ret = ssl->handshake_func(ssl)) <= 0) |
| 267 | return ret; | 267 | return ret; |
| 268 | if (len == 0) | 268 | if (len == 0) |
| 269 | return 0; | 269 | return 0; |
| @@ -283,7 +283,7 @@ tls13_legacy_write_bytes(SSL *ssl, int type, const void *vbuf, int len) | |||
| 283 | * The TLSv1.3 record layer write behaviour is the same as | 283 | * The TLSv1.3 record layer write behaviour is the same as |
| 284 | * SSL_MODE_ENABLE_PARTIAL_WRITE. | 284 | * SSL_MODE_ENABLE_PARTIAL_WRITE. |
| 285 | */ | 285 | */ |
| 286 | if (ssl->internal->mode & SSL_MODE_ENABLE_PARTIAL_WRITE) { | 286 | if (ssl->mode & SSL_MODE_ENABLE_PARTIAL_WRITE) { |
| 287 | ret = tls13_write_application_data(ctx->rl, buf, len); | 287 | ret = tls13_write_application_data(ctx->rl, buf, len); |
| 288 | return tls13_legacy_return_code(ssl, ret); | 288 | return tls13_legacy_return_code(ssl, ret); |
| 289 | } | 289 | } |
| @@ -352,18 +352,18 @@ tls13_use_legacy_stack(struct tls13_ctx *ctx) | |||
| 352 | s->s3->rbuf.left = CBS_len(&cbs); | 352 | s->s3->rbuf.left = CBS_len(&cbs); |
| 353 | s->s3->rrec.type = SSL3_RT_HANDSHAKE; | 353 | s->s3->rrec.type = SSL3_RT_HANDSHAKE; |
| 354 | s->s3->rrec.length = CBS_len(&cbs); | 354 | s->s3->rrec.length = CBS_len(&cbs); |
| 355 | s->internal->rstate = SSL_ST_READ_BODY; | 355 | s->rstate = SSL_ST_READ_BODY; |
| 356 | s->internal->packet = s->s3->rbuf.buf; | 356 | s->packet = s->s3->rbuf.buf; |
| 357 | s->internal->packet_length = SSL3_RT_HEADER_LENGTH; | 357 | s->packet_length = SSL3_RT_HEADER_LENGTH; |
| 358 | s->internal->mac_packet = 1; | 358 | s->mac_packet = 1; |
| 359 | } | 359 | } |
| 360 | 360 | ||
| 361 | /* Stash the current handshake message. */ | 361 | /* Stash the current handshake message. */ |
| 362 | tls13_handshake_msg_data(ctx->hs_msg, &cbs); | 362 | tls13_handshake_msg_data(ctx->hs_msg, &cbs); |
| 363 | if (!BUF_MEM_grow_clean(s->internal->init_buf, CBS_len(&cbs))) | 363 | if (!BUF_MEM_grow_clean(s->init_buf, CBS_len(&cbs))) |
| 364 | goto err; | 364 | goto err; |
| 365 | if (!CBS_write_bytes(&cbs, s->internal->init_buf->data, | 365 | if (!CBS_write_bytes(&cbs, s->init_buf->data, |
| 366 | s->internal->init_buf->length, NULL)) | 366 | s->init_buf->length, NULL)) |
| 367 | goto err; | 367 | goto err; |
| 368 | 368 | ||
| 369 | s->s3->hs.tls12.reuse_message = 1; | 369 | s->s3->hs.tls12.reuse_message = 1; |
| @@ -386,7 +386,7 @@ tls13_use_legacy_client(struct tls13_ctx *ctx) | |||
| 386 | if (!tls13_use_legacy_stack(ctx)) | 386 | if (!tls13_use_legacy_stack(ctx)) |
| 387 | return 0; | 387 | return 0; |
| 388 | 388 | ||
| 389 | s->internal->handshake_func = s->method->ssl_connect; | 389 | s->handshake_func = s->method->ssl_connect; |
| 390 | s->version = s->method->max_tls_version; | 390 | s->version = s->method->max_tls_version; |
| 391 | 391 | ||
| 392 | return 1; | 392 | return 1; |
| @@ -400,7 +400,7 @@ tls13_use_legacy_server(struct tls13_ctx *ctx) | |||
| 400 | if (!tls13_use_legacy_stack(ctx)) | 400 | if (!tls13_use_legacy_stack(ctx)) |
| 401 | return 0; | 401 | return 0; |
| 402 | 402 | ||
| 403 | s->internal->handshake_func = s->method->ssl_accept; | 403 | s->handshake_func = s->method->ssl_accept; |
| 404 | s->version = s->method->max_tls_version; | 404 | s->version = s->method->max_tls_version; |
| 405 | s->server = 1; | 405 | s->server = 1; |
| 406 | 406 | ||
| @@ -410,7 +410,7 @@ tls13_use_legacy_server(struct tls13_ctx *ctx) | |||
| 410 | int | 410 | int |
| 411 | tls13_legacy_accept(SSL *ssl) | 411 | tls13_legacy_accept(SSL *ssl) |
| 412 | { | 412 | { |
| 413 | struct tls13_ctx *ctx = ssl->internal->tls13; | 413 | struct tls13_ctx *ctx = ssl->tls13; |
| 414 | int ret; | 414 | int ret; |
| 415 | 415 | ||
| 416 | if (ctx == NULL) { | 416 | if (ctx == NULL) { |
| @@ -442,7 +442,7 @@ tls13_legacy_accept(SSL *ssl) | |||
| 442 | int | 442 | int |
| 443 | tls13_legacy_connect(SSL *ssl) | 443 | tls13_legacy_connect(SSL *ssl) |
| 444 | { | 444 | { |
| 445 | struct tls13_ctx *ctx = ssl->internal->tls13; | 445 | struct tls13_ctx *ctx = ssl->tls13; |
| 446 | int ret; | 446 | int ret; |
| 447 | 447 | ||
| 448 | if (ctx == NULL) { | 448 | if (ctx == NULL) { |
| @@ -474,7 +474,7 @@ tls13_legacy_connect(SSL *ssl) | |||
| 474 | int | 474 | int |
| 475 | tls13_legacy_shutdown(SSL *ssl) | 475 | tls13_legacy_shutdown(SSL *ssl) |
| 476 | { | 476 | { |
| 477 | struct tls13_ctx *ctx = ssl->internal->tls13; | 477 | struct tls13_ctx *ctx = ssl->tls13; |
| 478 | uint8_t buf[512]; /* XXX */ | 478 | uint8_t buf[512]; /* XXX */ |
| 479 | ssize_t ret; | 479 | ssize_t ret; |
| 480 | 480 | ||
| @@ -484,15 +484,15 @@ tls13_legacy_shutdown(SSL *ssl) | |||
| 484 | * alerts. All other cases, including EOF, return -1 and set internal | 484 | * alerts. All other cases, including EOF, return -1 and set internal |
| 485 | * state appropriately. | 485 | * state appropriately. |
| 486 | */ | 486 | */ |
| 487 | if (ctx == NULL || ssl->internal->quiet_shutdown) { | 487 | if (ctx == NULL || ssl->quiet_shutdown) { |
| 488 | ssl->internal->shutdown = SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN; | 488 | ssl->shutdown = SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN; |
| 489 | return 1; | 489 | return 1; |
| 490 | } | 490 | } |
| 491 | 491 | ||
| 492 | if (!ctx->close_notify_sent) { | 492 | if (!ctx->close_notify_sent) { |
| 493 | /* Enqueue and send close notify. */ | 493 | /* Enqueue and send close notify. */ |
| 494 | if (!(ssl->internal->shutdown & SSL_SENT_SHUTDOWN)) { | 494 | if (!(ssl->shutdown & SSL_SENT_SHUTDOWN)) { |
| 495 | ssl->internal->shutdown |= SSL_SENT_SHUTDOWN; | 495 | ssl->shutdown |= SSL_SENT_SHUTDOWN; |
| 496 | if ((ret = tls13_send_alert(ctx->rl, | 496 | if ((ret = tls13_send_alert(ctx->rl, |
| 497 | TLS13_ALERT_CLOSE_NOTIFY)) < 0) | 497 | TLS13_ALERT_CLOSE_NOTIFY)) < 0) |
| 498 | return tls13_legacy_return_code(ssl, ret); | 498 | return tls13_legacy_return_code(ssl, ret); |
| @@ -533,13 +533,13 @@ tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert) | |||
| 533 | SSL_CTX *ssl_ctx = ctx->ssl->ctx; | 533 | SSL_CTX *ssl_ctx = ctx->ssl->ctx; |
| 534 | SSL *s = ctx->ssl; | 534 | SSL *s = ctx->ssl; |
| 535 | 535 | ||
| 536 | if (ssl_ctx->internal->tlsext_servername_callback == NULL) | 536 | if (ssl_ctx->tlsext_servername_callback == NULL) |
| 537 | ssl_ctx = s->initial_ctx; | 537 | ssl_ctx = s->initial_ctx; |
| 538 | if (ssl_ctx->internal->tlsext_servername_callback == NULL) | 538 | if (ssl_ctx->tlsext_servername_callback == NULL) |
| 539 | return 1; | 539 | return 1; |
| 540 | 540 | ||
| 541 | ret = ssl_ctx->internal->tlsext_servername_callback(s, &legacy_alert, | 541 | ret = ssl_ctx->tlsext_servername_callback(s, &legacy_alert, |
| 542 | ssl_ctx->internal->tlsext_servername_arg); | 542 | ssl_ctx->tlsext_servername_arg); |
| 543 | 543 | ||
| 544 | /* | 544 | /* |
| 545 | * Ignore SSL_TLSEXT_ERR_ALERT_WARNING returns to match OpenSSL's | 545 | * Ignore SSL_TLSEXT_ERR_ALERT_WARNING returns to match OpenSSL's |
