diff options
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libssl/src/ssl/s3_enc.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl.h | 7 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl3.h | 7 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl_err.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl_lib.c | 62 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl_locl.h | 3 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/t1_enc.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/tls1.h | 3 | ||||
| -rw-r--r-- | src/lib/libssl/ssl.h | 7 | ||||
| -rw-r--r-- | src/lib/libssl/ssl3.h | 7 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_err.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_lib.c | 62 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_locl.h | 3 | ||||
| -rw-r--r-- | src/lib/libssl/t1_enc.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/tls1.h | 3 |
15 files changed, 159 insertions, 25 deletions
diff --git a/src/lib/libssl/src/ssl/s3_enc.c b/src/lib/libssl/src/ssl/s3_enc.c index 0c7cda3c60..7e244b6c19 100644 --- a/src/lib/libssl/src/ssl/s3_enc.c +++ b/src/lib/libssl/src/ssl/s3_enc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_enc.c,v 1.58 2014/12/15 00:46:53 doug Exp $ */ | 1 | /* $OpenBSD: s3_enc.c,v 1.59 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -846,6 +846,8 @@ ssl3_alert_code(int code) | |||
| 846 | return (SSL3_AD_HANDSHAKE_FAILURE); | 846 | return (SSL3_AD_HANDSHAKE_FAILURE); |
| 847 | case SSL_AD_UNKNOWN_PSK_IDENTITY: | 847 | case SSL_AD_UNKNOWN_PSK_IDENTITY: |
| 848 | return (TLS1_AD_UNKNOWN_PSK_IDENTITY); | 848 | return (TLS1_AD_UNKNOWN_PSK_IDENTITY); |
| 849 | case SSL_AD_INAPPROPRIATE_FALLBACK: | ||
| 850 | return (TLS1_AD_INAPPROPRIATE_FALLBACK); | ||
| 849 | default: | 851 | default: |
| 850 | return (-1); | 852 | return (-1); |
| 851 | } | 853 | } |
diff --git a/src/lib/libssl/src/ssl/ssl.h b/src/lib/libssl/src/ssl/ssl.h index 626b967f15..73d007400f 100644 --- a/src/lib/libssl/src/ssl/ssl.h +++ b/src/lib/libssl/src/ssl/ssl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl.h,v 1.82 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.83 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1363,7 +1363,8 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) | |||
| 1363 | #define SSL_AD_UNRECOGNIZED_NAME TLS1_AD_UNRECOGNIZED_NAME | 1363 | #define SSL_AD_UNRECOGNIZED_NAME TLS1_AD_UNRECOGNIZED_NAME |
| 1364 | #define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE | 1364 | #define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE |
| 1365 | #define SSL_AD_BAD_CERTIFICATE_HASH_VALUE TLS1_AD_BAD_CERTIFICATE_HASH_VALUE | 1365 | #define SSL_AD_BAD_CERTIFICATE_HASH_VALUE TLS1_AD_BAD_CERTIFICATE_HASH_VALUE |
| 1366 | #define SSL_AD_UNKNOWN_PSK_IDENTITY TLS1_AD_UNKNOWN_PSK_IDENTITY /* fatal */ | 1366 | #define SSL_AD_UNKNOWN_PSK_IDENTITY TLS1_AD_UNKNOWN_PSK_IDENTITY /* fatal */ |
| 1367 | #define SSL_AD_INAPPROPRIATE_FALLBACK TLS1_AD_INAPPROPRIATE_FALLBACK /* fatal */ | ||
| 1367 | 1368 | ||
| 1368 | #define SSL_ERROR_NONE 0 | 1369 | #define SSL_ERROR_NONE 0 |
| 1369 | #define SSL_ERROR_SSL 1 | 1370 | #define SSL_ERROR_SSL 1 |
| @@ -2174,6 +2175,7 @@ void ERR_load_SSL_strings(void); | |||
| 2174 | #define SSL_R_HTTPS_PROXY_REQUEST 155 | 2175 | #define SSL_R_HTTPS_PROXY_REQUEST 155 |
| 2175 | #define SSL_R_HTTP_REQUEST 156 | 2176 | #define SSL_R_HTTP_REQUEST 156 |
| 2176 | #define SSL_R_ILLEGAL_PADDING 283 | 2177 | #define SSL_R_ILLEGAL_PADDING 283 |
| 2178 | #define SSL_R_INAPPROPRIATE_FALLBACK 373 | ||
| 2177 | #define SSL_R_INCONSISTENT_COMPRESSION 340 | 2179 | #define SSL_R_INCONSISTENT_COMPRESSION 340 |
| 2178 | #define SSL_R_INVALID_CHALLENGE_LENGTH 158 | 2180 | #define SSL_R_INVALID_CHALLENGE_LENGTH 158 |
| 2179 | #define SSL_R_INVALID_COMMAND 280 | 2181 | #define SSL_R_INVALID_COMMAND 280 |
| @@ -2319,6 +2321,7 @@ void ERR_load_SSL_strings(void); | |||
| 2319 | #define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021 | 2321 | #define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021 |
| 2320 | #define SSL_R_TLSV1_ALERT_DECRYPT_ERROR 1051 | 2322 | #define SSL_R_TLSV1_ALERT_DECRYPT_ERROR 1051 |
| 2321 | #define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION 1060 | 2323 | #define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION 1060 |
| 2324 | #define SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK 1086 | ||
| 2322 | #define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY 1071 | 2325 | #define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY 1071 |
| 2323 | #define SSL_R_TLSV1_ALERT_INTERNAL_ERROR 1080 | 2326 | #define SSL_R_TLSV1_ALERT_INTERNAL_ERROR 1080 |
| 2324 | #define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION 1100 | 2327 | #define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION 1100 |
diff --git a/src/lib/libssl/src/ssl/ssl3.h b/src/lib/libssl/src/ssl/ssl3.h index 644e8df16b..61f600c55d 100644 --- a/src/lib/libssl/src/ssl/ssl3.h +++ b/src/lib/libssl/src/ssl/ssl3.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl3.h,v 1.35 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: ssl3.h,v 1.36 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -125,9 +125,12 @@ | |||
| 125 | extern "C" { | 125 | extern "C" { |
| 126 | #endif | 126 | #endif |
| 127 | 127 | ||
| 128 | /* Signalling cipher suite value: from draft-ietf-tls-renegotiation-03.txt */ | 128 | /* TLS_EMPTY_RENEGOTIATION_INFO_SCSV from RFC 5746. */ |
| 129 | #define SSL3_CK_SCSV 0x030000FF | 129 | #define SSL3_CK_SCSV 0x030000FF |
| 130 | 130 | ||
| 131 | /* TLS_FALLBACK_SCSV from draft-ietf-tls-downgrade-scsv-03. */ | ||
| 132 | #define SSL3_CK_FALLBACK_SCSV 0x03005600 | ||
| 133 | |||
| 131 | #define SSL3_CK_RSA_NULL_MD5 0x03000001 | 134 | #define SSL3_CK_RSA_NULL_MD5 0x03000001 |
| 132 | #define SSL3_CK_RSA_NULL_SHA 0x03000002 | 135 | #define SSL3_CK_RSA_NULL_SHA 0x03000002 |
| 133 | #define SSL3_CK_RSA_RC4_40_MD5 0x03000003 | 136 | #define SSL3_CK_RSA_RC4_40_MD5 0x03000003 |
diff --git a/src/lib/libssl/src/ssl/ssl_err.c b/src/lib/libssl/src/ssl/ssl_err.c index 891d5216c2..04742b60ca 100644 --- a/src/lib/libssl/src/ssl/ssl_err.c +++ b/src/lib/libssl/src/ssl/ssl_err.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_err.c,v 1.28 2014/12/14 15:30:50 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_err.c,v 1.29 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -385,6 +385,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
| 385 | {ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) , "https proxy request"}, | 385 | {ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) , "https proxy request"}, |
| 386 | {ERR_REASON(SSL_R_HTTP_REQUEST) , "http request"}, | 386 | {ERR_REASON(SSL_R_HTTP_REQUEST) , "http request"}, |
| 387 | {ERR_REASON(SSL_R_ILLEGAL_PADDING) , "illegal padding"}, | 387 | {ERR_REASON(SSL_R_ILLEGAL_PADDING) , "illegal padding"}, |
| 388 | {ERR_REASON(SSL_R_INAPPROPRIATE_FALLBACK), "inappropriate fallback"}, | ||
| 388 | {ERR_REASON(SSL_R_INCONSISTENT_COMPRESSION), "inconsistent compression"}, | 389 | {ERR_REASON(SSL_R_INCONSISTENT_COMPRESSION), "inconsistent compression"}, |
| 389 | {ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH), "invalid challenge length"}, | 390 | {ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH), "invalid challenge length"}, |
| 390 | {ERR_REASON(SSL_R_INVALID_COMMAND) , "invalid command"}, | 391 | {ERR_REASON(SSL_R_INVALID_COMMAND) , "invalid command"}, |
| @@ -530,6 +531,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
| 530 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED), "tlsv1 alert decryption failed"}, | 531 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED), "tlsv1 alert decryption failed"}, |
| 531 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR), "tlsv1 alert decrypt error"}, | 532 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR), "tlsv1 alert decrypt error"}, |
| 532 | {ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION), "tlsv1 alert export restriction"}, | 533 | {ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION), "tlsv1 alert export restriction"}, |
| 534 | {ERR_REASON(SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK), "tlsv1 alert inappropriate fallback"}, | ||
| 533 | {ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY), "tlsv1 alert insufficient security"}, | 535 | {ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY), "tlsv1 alert insufficient security"}, |
| 534 | {ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR), "tlsv1 alert internal error"}, | 536 | {ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR), "tlsv1 alert internal error"}, |
| 535 | {ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION), "tlsv1 alert no renegotiation"}, | 537 | {ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION), "tlsv1 alert no renegotiation"}, |
diff --git a/src/lib/libssl/src/ssl/ssl_lib.c b/src/lib/libssl/src/ssl/ssl_lib.c index 58835931d2..d7b5283501 100644 --- a/src/lib/libssl/src/ssl/ssl_lib.c +++ b/src/lib/libssl/src/ssl/ssl_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_lib.c,v 1.100 2015/02/22 15:29:39 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.101 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1419,7 +1419,9 @@ ssl_bytes_to_cipher_list(SSL *s, unsigned char *p, int num, | |||
| 1419 | const SSL_CIPHER *c; | 1419 | const SSL_CIPHER *c; |
| 1420 | STACK_OF(SSL_CIPHER) *sk; | 1420 | STACK_OF(SSL_CIPHER) *sk; |
| 1421 | int i; | 1421 | int i; |
| 1422 | unsigned long cipher_id; | ||
| 1422 | uint16_t cipher_value; | 1423 | uint16_t cipher_value; |
| 1424 | uint16_t max_version; | ||
| 1423 | 1425 | ||
| 1424 | if (s->s3) | 1426 | if (s->s3) |
| 1425 | s->s3->send_connection_binding = 0; | 1427 | s->s3->send_connection_binding = 0; |
| @@ -1440,10 +1442,13 @@ ssl_bytes_to_cipher_list(SSL *s, unsigned char *p, int num, | |||
| 1440 | 1442 | ||
| 1441 | for (i = 0; i < num; i += SSL3_CIPHER_VALUE_SIZE) { | 1443 | for (i = 0; i < num; i += SSL3_CIPHER_VALUE_SIZE) { |
| 1442 | n2s(p, cipher_value); | 1444 | n2s(p, cipher_value); |
| 1445 | cipher_id = SSL3_CK_ID | cipher_value; | ||
| 1443 | 1446 | ||
| 1444 | /* Check for SCSV */ | 1447 | if (s->s3 != NULL && cipher_id == SSL3_CK_SCSV) { |
| 1445 | if (s->s3 && (SSL3_CK_ID | cipher_value) == SSL3_CK_SCSV) { | 1448 | /* |
| 1446 | /* SCSV is fatal if renegotiating. */ | 1449 | * TLS_EMPTY_RENEGOTIATION_INFO_SCSV is fatal if |
| 1450 | * renegotiating. | ||
| 1451 | */ | ||
| 1447 | if (s->renegotiate) { | 1452 | if (s->renegotiate) { |
| 1448 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, | 1453 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, |
| 1449 | SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING); | 1454 | SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING); |
| @@ -1456,6 +1461,25 @@ ssl_bytes_to_cipher_list(SSL *s, unsigned char *p, int num, | |||
| 1456 | continue; | 1461 | continue; |
| 1457 | } | 1462 | } |
| 1458 | 1463 | ||
| 1464 | if (cipher_id == SSL3_CK_FALLBACK_SCSV) { | ||
| 1465 | /* | ||
| 1466 | * TLS_FALLBACK_SCSV indicates that the client | ||
| 1467 | * previously tried a higher protocol version. | ||
| 1468 | * Fail if the current version is an unexpected | ||
| 1469 | * downgrade. | ||
| 1470 | */ | ||
| 1471 | max_version = ssl_max_server_version(s); | ||
| 1472 | if (max_version == 0 || s->version < max_version) { | ||
| 1473 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, | ||
| 1474 | SSL_R_INAPPROPRIATE_FALLBACK); | ||
| 1475 | if (s->s3 != NULL) | ||
| 1476 | ssl3_send_alert(s, SSL3_AL_FATAL, | ||
| 1477 | SSL_AD_INAPPROPRIATE_FALLBACK); | ||
| 1478 | goto err; | ||
| 1479 | } | ||
| 1480 | continue; | ||
| 1481 | } | ||
| 1482 | |||
| 1459 | if ((c = ssl3_get_cipher_by_value(cipher_value)) != NULL) { | 1483 | if ((c = ssl3_get_cipher_by_value(cipher_value)) != NULL) { |
| 1460 | if (!sk_SSL_CIPHER_push(sk, c)) { | 1484 | if (!sk_SSL_CIPHER_push(sk, c)) { |
| 1461 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, | 1485 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, |
| @@ -2543,6 +2567,36 @@ SSL_get_version(const SSL *s) | |||
| 2543 | return ssl_version_string(s->version); | 2567 | return ssl_version_string(s->version); |
| 2544 | } | 2568 | } |
| 2545 | 2569 | ||
| 2570 | uint16_t | ||
| 2571 | ssl_max_server_version(SSL *s) | ||
| 2572 | { | ||
| 2573 | uint16_t max_version; | ||
| 2574 | |||
| 2575 | /* | ||
| 2576 | * The SSL method will be changed during version negotiation, as such | ||
| 2577 | * we want to use the SSL method from the context. | ||
| 2578 | */ | ||
| 2579 | max_version = s->ctx->method->version; | ||
| 2580 | |||
| 2581 | if (SSL_IS_DTLS(s)) | ||
| 2582 | return (DTLS1_VERSION); | ||
| 2583 | |||
| 2584 | if ((s->options & SSL_OP_NO_TLSv1_2) == 0 && | ||
| 2585 | max_version >= TLS1_2_VERSION) | ||
| 2586 | return (TLS1_2_VERSION); | ||
| 2587 | if ((s->options & SSL_OP_NO_TLSv1_1) == 0 && | ||
| 2588 | max_version >= TLS1_1_VERSION) | ||
| 2589 | return (TLS1_1_VERSION); | ||
| 2590 | if ((s->options & SSL_OP_NO_TLSv1) == 0 && | ||
| 2591 | max_version >= TLS1_VERSION) | ||
| 2592 | return (TLS1_VERSION); | ||
| 2593 | if ((s->options & SSL_OP_NO_SSLv3) == 0 && | ||
| 2594 | max_version >= SSL3_VERSION) | ||
| 2595 | return (SSL3_VERSION); | ||
| 2596 | |||
| 2597 | return (0); | ||
| 2598 | } | ||
| 2599 | |||
| 2546 | SSL * | 2600 | SSL * |
| 2547 | SSL_dup(SSL *s) | 2601 | SSL_dup(SSL *s) |
| 2548 | { | 2602 | { |
diff --git a/src/lib/libssl/src/ssl/ssl_locl.h b/src/lib/libssl/src/ssl/ssl_locl.h index 3b7694fc94..c38aa3a90d 100644 --- a/src/lib/libssl/src/ssl/ssl_locl.h +++ b/src/lib/libssl/src/ssl/ssl_locl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_locl.h,v 1.87 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.88 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -545,6 +545,7 @@ extern SSL_CIPHER ssl3_ciphers[]; | |||
| 545 | 545 | ||
| 546 | SSL_METHOD *ssl_bad_method(int ver); | 546 | SSL_METHOD *ssl_bad_method(int ver); |
| 547 | const char *ssl_version_string(int ver); | 547 | const char *ssl_version_string(int ver); |
| 548 | uint16_t ssl_max_server_version(SSL *s); | ||
| 548 | 549 | ||
| 549 | extern SSL3_ENC_METHOD TLSv1_enc_data; | 550 | extern SSL3_ENC_METHOD TLSv1_enc_data; |
| 550 | extern SSL3_ENC_METHOD TLSv1_1_enc_data; | 551 | extern SSL3_ENC_METHOD TLSv1_1_enc_data; |
diff --git a/src/lib/libssl/src/ssl/t1_enc.c b/src/lib/libssl/src/ssl/t1_enc.c index f7c4bc8dde..6e069edd4b 100644 --- a/src/lib/libssl/src/ssl/t1_enc.c +++ b/src/lib/libssl/src/ssl/t1_enc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t1_enc.c,v 1.76 2015/02/07 18:53:55 doug Exp $ */ | 1 | /* $OpenBSD: t1_enc.c,v 1.77 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1240,6 +1240,8 @@ tls1_alert_code(int code) | |||
| 1240 | return (TLS1_AD_BAD_CERTIFICATE_HASH_VALUE); | 1240 | return (TLS1_AD_BAD_CERTIFICATE_HASH_VALUE); |
| 1241 | case SSL_AD_UNKNOWN_PSK_IDENTITY: | 1241 | case SSL_AD_UNKNOWN_PSK_IDENTITY: |
| 1242 | return (TLS1_AD_UNKNOWN_PSK_IDENTITY); | 1242 | return (TLS1_AD_UNKNOWN_PSK_IDENTITY); |
| 1243 | case SSL_AD_INAPPROPRIATE_FALLBACK: | ||
| 1244 | return(TLS1_AD_INAPPROPRIATE_FALLBACK); | ||
| 1243 | default: | 1245 | default: |
| 1244 | return (-1); | 1246 | return (-1); |
| 1245 | } | 1247 | } |
diff --git a/src/lib/libssl/src/ssl/tls1.h b/src/lib/libssl/src/ssl/tls1.h index 6182daa837..3dffb97b5c 100644 --- a/src/lib/libssl/src/ssl/tls1.h +++ b/src/lib/libssl/src/ssl/tls1.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls1.h,v 1.24 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: tls1.h,v 1.25 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -187,6 +187,7 @@ extern "C" { | |||
| 187 | #define TLS1_AD_PROTOCOL_VERSION 70 /* fatal */ | 187 | #define TLS1_AD_PROTOCOL_VERSION 70 /* fatal */ |
| 188 | #define TLS1_AD_INSUFFICIENT_SECURITY 71 /* fatal */ | 188 | #define TLS1_AD_INSUFFICIENT_SECURITY 71 /* fatal */ |
| 189 | #define TLS1_AD_INTERNAL_ERROR 80 /* fatal */ | 189 | #define TLS1_AD_INTERNAL_ERROR 80 /* fatal */ |
| 190 | #define TLS1_AD_INAPPROPRIATE_FALLBACK 86 /* fatal */ | ||
| 190 | #define TLS1_AD_USER_CANCELLED 90 | 191 | #define TLS1_AD_USER_CANCELLED 90 |
| 191 | #define TLS1_AD_NO_RENEGOTIATION 100 | 192 | #define TLS1_AD_NO_RENEGOTIATION 100 |
| 192 | /* Codes 110-114 are from RFC 3546. */ | 193 | /* Codes 110-114 are from RFC 3546. */ |
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 626b967f15..73d007400f 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl.h,v 1.82 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.83 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1363,7 +1363,8 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) | |||
| 1363 | #define SSL_AD_UNRECOGNIZED_NAME TLS1_AD_UNRECOGNIZED_NAME | 1363 | #define SSL_AD_UNRECOGNIZED_NAME TLS1_AD_UNRECOGNIZED_NAME |
| 1364 | #define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE | 1364 | #define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE |
| 1365 | #define SSL_AD_BAD_CERTIFICATE_HASH_VALUE TLS1_AD_BAD_CERTIFICATE_HASH_VALUE | 1365 | #define SSL_AD_BAD_CERTIFICATE_HASH_VALUE TLS1_AD_BAD_CERTIFICATE_HASH_VALUE |
| 1366 | #define SSL_AD_UNKNOWN_PSK_IDENTITY TLS1_AD_UNKNOWN_PSK_IDENTITY /* fatal */ | 1366 | #define SSL_AD_UNKNOWN_PSK_IDENTITY TLS1_AD_UNKNOWN_PSK_IDENTITY /* fatal */ |
| 1367 | #define SSL_AD_INAPPROPRIATE_FALLBACK TLS1_AD_INAPPROPRIATE_FALLBACK /* fatal */ | ||
| 1367 | 1368 | ||
| 1368 | #define SSL_ERROR_NONE 0 | 1369 | #define SSL_ERROR_NONE 0 |
| 1369 | #define SSL_ERROR_SSL 1 | 1370 | #define SSL_ERROR_SSL 1 |
| @@ -2174,6 +2175,7 @@ void ERR_load_SSL_strings(void); | |||
| 2174 | #define SSL_R_HTTPS_PROXY_REQUEST 155 | 2175 | #define SSL_R_HTTPS_PROXY_REQUEST 155 |
| 2175 | #define SSL_R_HTTP_REQUEST 156 | 2176 | #define SSL_R_HTTP_REQUEST 156 |
| 2176 | #define SSL_R_ILLEGAL_PADDING 283 | 2177 | #define SSL_R_ILLEGAL_PADDING 283 |
| 2178 | #define SSL_R_INAPPROPRIATE_FALLBACK 373 | ||
| 2177 | #define SSL_R_INCONSISTENT_COMPRESSION 340 | 2179 | #define SSL_R_INCONSISTENT_COMPRESSION 340 |
| 2178 | #define SSL_R_INVALID_CHALLENGE_LENGTH 158 | 2180 | #define SSL_R_INVALID_CHALLENGE_LENGTH 158 |
| 2179 | #define SSL_R_INVALID_COMMAND 280 | 2181 | #define SSL_R_INVALID_COMMAND 280 |
| @@ -2319,6 +2321,7 @@ void ERR_load_SSL_strings(void); | |||
| 2319 | #define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021 | 2321 | #define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021 |
| 2320 | #define SSL_R_TLSV1_ALERT_DECRYPT_ERROR 1051 | 2322 | #define SSL_R_TLSV1_ALERT_DECRYPT_ERROR 1051 |
| 2321 | #define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION 1060 | 2323 | #define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION 1060 |
| 2324 | #define SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK 1086 | ||
| 2322 | #define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY 1071 | 2325 | #define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY 1071 |
| 2323 | #define SSL_R_TLSV1_ALERT_INTERNAL_ERROR 1080 | 2326 | #define SSL_R_TLSV1_ALERT_INTERNAL_ERROR 1080 |
| 2324 | #define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION 1100 | 2327 | #define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION 1100 |
diff --git a/src/lib/libssl/ssl3.h b/src/lib/libssl/ssl3.h index 644e8df16b..61f600c55d 100644 --- a/src/lib/libssl/ssl3.h +++ b/src/lib/libssl/ssl3.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl3.h,v 1.35 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: ssl3.h,v 1.36 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -125,9 +125,12 @@ | |||
| 125 | extern "C" { | 125 | extern "C" { |
| 126 | #endif | 126 | #endif |
| 127 | 127 | ||
| 128 | /* Signalling cipher suite value: from draft-ietf-tls-renegotiation-03.txt */ | 128 | /* TLS_EMPTY_RENEGOTIATION_INFO_SCSV from RFC 5746. */ |
| 129 | #define SSL3_CK_SCSV 0x030000FF | 129 | #define SSL3_CK_SCSV 0x030000FF |
| 130 | 130 | ||
| 131 | /* TLS_FALLBACK_SCSV from draft-ietf-tls-downgrade-scsv-03. */ | ||
| 132 | #define SSL3_CK_FALLBACK_SCSV 0x03005600 | ||
| 133 | |||
| 131 | #define SSL3_CK_RSA_NULL_MD5 0x03000001 | 134 | #define SSL3_CK_RSA_NULL_MD5 0x03000001 |
| 132 | #define SSL3_CK_RSA_NULL_SHA 0x03000002 | 135 | #define SSL3_CK_RSA_NULL_SHA 0x03000002 |
| 133 | #define SSL3_CK_RSA_RC4_40_MD5 0x03000003 | 136 | #define SSL3_CK_RSA_RC4_40_MD5 0x03000003 |
diff --git a/src/lib/libssl/ssl_err.c b/src/lib/libssl/ssl_err.c index 891d5216c2..04742b60ca 100644 --- a/src/lib/libssl/ssl_err.c +++ b/src/lib/libssl/ssl_err.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_err.c,v 1.28 2014/12/14 15:30:50 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_err.c,v 1.29 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -385,6 +385,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
| 385 | {ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) , "https proxy request"}, | 385 | {ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) , "https proxy request"}, |
| 386 | {ERR_REASON(SSL_R_HTTP_REQUEST) , "http request"}, | 386 | {ERR_REASON(SSL_R_HTTP_REQUEST) , "http request"}, |
| 387 | {ERR_REASON(SSL_R_ILLEGAL_PADDING) , "illegal padding"}, | 387 | {ERR_REASON(SSL_R_ILLEGAL_PADDING) , "illegal padding"}, |
| 388 | {ERR_REASON(SSL_R_INAPPROPRIATE_FALLBACK), "inappropriate fallback"}, | ||
| 388 | {ERR_REASON(SSL_R_INCONSISTENT_COMPRESSION), "inconsistent compression"}, | 389 | {ERR_REASON(SSL_R_INCONSISTENT_COMPRESSION), "inconsistent compression"}, |
| 389 | {ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH), "invalid challenge length"}, | 390 | {ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH), "invalid challenge length"}, |
| 390 | {ERR_REASON(SSL_R_INVALID_COMMAND) , "invalid command"}, | 391 | {ERR_REASON(SSL_R_INVALID_COMMAND) , "invalid command"}, |
| @@ -530,6 +531,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
| 530 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED), "tlsv1 alert decryption failed"}, | 531 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED), "tlsv1 alert decryption failed"}, |
| 531 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR), "tlsv1 alert decrypt error"}, | 532 | {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR), "tlsv1 alert decrypt error"}, |
| 532 | {ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION), "tlsv1 alert export restriction"}, | 533 | {ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION), "tlsv1 alert export restriction"}, |
| 534 | {ERR_REASON(SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK), "tlsv1 alert inappropriate fallback"}, | ||
| 533 | {ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY), "tlsv1 alert insufficient security"}, | 535 | {ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY), "tlsv1 alert insufficient security"}, |
| 534 | {ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR), "tlsv1 alert internal error"}, | 536 | {ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR), "tlsv1 alert internal error"}, |
| 535 | {ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION), "tlsv1 alert no renegotiation"}, | 537 | {ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION), "tlsv1 alert no renegotiation"}, |
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 58835931d2..d7b5283501 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_lib.c,v 1.100 2015/02/22 15:29:39 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.101 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1419,7 +1419,9 @@ ssl_bytes_to_cipher_list(SSL *s, unsigned char *p, int num, | |||
| 1419 | const SSL_CIPHER *c; | 1419 | const SSL_CIPHER *c; |
| 1420 | STACK_OF(SSL_CIPHER) *sk; | 1420 | STACK_OF(SSL_CIPHER) *sk; |
| 1421 | int i; | 1421 | int i; |
| 1422 | unsigned long cipher_id; | ||
| 1422 | uint16_t cipher_value; | 1423 | uint16_t cipher_value; |
| 1424 | uint16_t max_version; | ||
| 1423 | 1425 | ||
| 1424 | if (s->s3) | 1426 | if (s->s3) |
| 1425 | s->s3->send_connection_binding = 0; | 1427 | s->s3->send_connection_binding = 0; |
| @@ -1440,10 +1442,13 @@ ssl_bytes_to_cipher_list(SSL *s, unsigned char *p, int num, | |||
| 1440 | 1442 | ||
| 1441 | for (i = 0; i < num; i += SSL3_CIPHER_VALUE_SIZE) { | 1443 | for (i = 0; i < num; i += SSL3_CIPHER_VALUE_SIZE) { |
| 1442 | n2s(p, cipher_value); | 1444 | n2s(p, cipher_value); |
| 1445 | cipher_id = SSL3_CK_ID | cipher_value; | ||
| 1443 | 1446 | ||
| 1444 | /* Check for SCSV */ | 1447 | if (s->s3 != NULL && cipher_id == SSL3_CK_SCSV) { |
| 1445 | if (s->s3 && (SSL3_CK_ID | cipher_value) == SSL3_CK_SCSV) { | 1448 | /* |
| 1446 | /* SCSV is fatal if renegotiating. */ | 1449 | * TLS_EMPTY_RENEGOTIATION_INFO_SCSV is fatal if |
| 1450 | * renegotiating. | ||
| 1451 | */ | ||
| 1447 | if (s->renegotiate) { | 1452 | if (s->renegotiate) { |
| 1448 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, | 1453 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, |
| 1449 | SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING); | 1454 | SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING); |
| @@ -1456,6 +1461,25 @@ ssl_bytes_to_cipher_list(SSL *s, unsigned char *p, int num, | |||
| 1456 | continue; | 1461 | continue; |
| 1457 | } | 1462 | } |
| 1458 | 1463 | ||
| 1464 | if (cipher_id == SSL3_CK_FALLBACK_SCSV) { | ||
| 1465 | /* | ||
| 1466 | * TLS_FALLBACK_SCSV indicates that the client | ||
| 1467 | * previously tried a higher protocol version. | ||
| 1468 | * Fail if the current version is an unexpected | ||
| 1469 | * downgrade. | ||
| 1470 | */ | ||
| 1471 | max_version = ssl_max_server_version(s); | ||
| 1472 | if (max_version == 0 || s->version < max_version) { | ||
| 1473 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, | ||
| 1474 | SSL_R_INAPPROPRIATE_FALLBACK); | ||
| 1475 | if (s->s3 != NULL) | ||
| 1476 | ssl3_send_alert(s, SSL3_AL_FATAL, | ||
| 1477 | SSL_AD_INAPPROPRIATE_FALLBACK); | ||
| 1478 | goto err; | ||
| 1479 | } | ||
| 1480 | continue; | ||
| 1481 | } | ||
| 1482 | |||
| 1459 | if ((c = ssl3_get_cipher_by_value(cipher_value)) != NULL) { | 1483 | if ((c = ssl3_get_cipher_by_value(cipher_value)) != NULL) { |
| 1460 | if (!sk_SSL_CIPHER_push(sk, c)) { | 1484 | if (!sk_SSL_CIPHER_push(sk, c)) { |
| 1461 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, | 1485 | SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, |
| @@ -2543,6 +2567,36 @@ SSL_get_version(const SSL *s) | |||
| 2543 | return ssl_version_string(s->version); | 2567 | return ssl_version_string(s->version); |
| 2544 | } | 2568 | } |
| 2545 | 2569 | ||
| 2570 | uint16_t | ||
| 2571 | ssl_max_server_version(SSL *s) | ||
| 2572 | { | ||
| 2573 | uint16_t max_version; | ||
| 2574 | |||
| 2575 | /* | ||
| 2576 | * The SSL method will be changed during version negotiation, as such | ||
| 2577 | * we want to use the SSL method from the context. | ||
| 2578 | */ | ||
| 2579 | max_version = s->ctx->method->version; | ||
| 2580 | |||
| 2581 | if (SSL_IS_DTLS(s)) | ||
| 2582 | return (DTLS1_VERSION); | ||
| 2583 | |||
| 2584 | if ((s->options & SSL_OP_NO_TLSv1_2) == 0 && | ||
| 2585 | max_version >= TLS1_2_VERSION) | ||
| 2586 | return (TLS1_2_VERSION); | ||
| 2587 | if ((s->options & SSL_OP_NO_TLSv1_1) == 0 && | ||
| 2588 | max_version >= TLS1_1_VERSION) | ||
| 2589 | return (TLS1_1_VERSION); | ||
| 2590 | if ((s->options & SSL_OP_NO_TLSv1) == 0 && | ||
| 2591 | max_version >= TLS1_VERSION) | ||
| 2592 | return (TLS1_VERSION); | ||
| 2593 | if ((s->options & SSL_OP_NO_SSLv3) == 0 && | ||
| 2594 | max_version >= SSL3_VERSION) | ||
| 2595 | return (SSL3_VERSION); | ||
| 2596 | |||
| 2597 | return (0); | ||
| 2598 | } | ||
| 2599 | |||
| 2546 | SSL * | 2600 | SSL * |
| 2547 | SSL_dup(SSL *s) | 2601 | SSL_dup(SSL *s) |
| 2548 | { | 2602 | { |
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h index 3b7694fc94..c38aa3a90d 100644 --- a/src/lib/libssl/ssl_locl.h +++ b/src/lib/libssl/ssl_locl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_locl.h,v 1.87 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.88 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -545,6 +545,7 @@ extern SSL_CIPHER ssl3_ciphers[]; | |||
| 545 | 545 | ||
| 546 | SSL_METHOD *ssl_bad_method(int ver); | 546 | SSL_METHOD *ssl_bad_method(int ver); |
| 547 | const char *ssl_version_string(int ver); | 547 | const char *ssl_version_string(int ver); |
| 548 | uint16_t ssl_max_server_version(SSL *s); | ||
| 548 | 549 | ||
| 549 | extern SSL3_ENC_METHOD TLSv1_enc_data; | 550 | extern SSL3_ENC_METHOD TLSv1_enc_data; |
| 550 | extern SSL3_ENC_METHOD TLSv1_1_enc_data; | 551 | extern SSL3_ENC_METHOD TLSv1_1_enc_data; |
diff --git a/src/lib/libssl/t1_enc.c b/src/lib/libssl/t1_enc.c index f7c4bc8dde..6e069edd4b 100644 --- a/src/lib/libssl/t1_enc.c +++ b/src/lib/libssl/t1_enc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t1_enc.c,v 1.76 2015/02/07 18:53:55 doug Exp $ */ | 1 | /* $OpenBSD: t1_enc.c,v 1.77 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1240,6 +1240,8 @@ tls1_alert_code(int code) | |||
| 1240 | return (TLS1_AD_BAD_CERTIFICATE_HASH_VALUE); | 1240 | return (TLS1_AD_BAD_CERTIFICATE_HASH_VALUE); |
| 1241 | case SSL_AD_UNKNOWN_PSK_IDENTITY: | 1241 | case SSL_AD_UNKNOWN_PSK_IDENTITY: |
| 1242 | return (TLS1_AD_UNKNOWN_PSK_IDENTITY); | 1242 | return (TLS1_AD_UNKNOWN_PSK_IDENTITY); |
| 1243 | case SSL_AD_INAPPROPRIATE_FALLBACK: | ||
| 1244 | return(TLS1_AD_INAPPROPRIATE_FALLBACK); | ||
| 1243 | default: | 1245 | default: |
| 1244 | return (-1); | 1246 | return (-1); |
| 1245 | } | 1247 | } |
diff --git a/src/lib/libssl/tls1.h b/src/lib/libssl/tls1.h index 6182daa837..3dffb97b5c 100644 --- a/src/lib/libssl/tls1.h +++ b/src/lib/libssl/tls1.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls1.h,v 1.24 2015/02/12 03:45:25 jsing Exp $ */ | 1 | /* $OpenBSD: tls1.h,v 1.25 2015/02/22 15:54:27 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -187,6 +187,7 @@ extern "C" { | |||
| 187 | #define TLS1_AD_PROTOCOL_VERSION 70 /* fatal */ | 187 | #define TLS1_AD_PROTOCOL_VERSION 70 /* fatal */ |
| 188 | #define TLS1_AD_INSUFFICIENT_SECURITY 71 /* fatal */ | 188 | #define TLS1_AD_INSUFFICIENT_SECURITY 71 /* fatal */ |
| 189 | #define TLS1_AD_INTERNAL_ERROR 80 /* fatal */ | 189 | #define TLS1_AD_INTERNAL_ERROR 80 /* fatal */ |
| 190 | #define TLS1_AD_INAPPROPRIATE_FALLBACK 86 /* fatal */ | ||
| 190 | #define TLS1_AD_USER_CANCELLED 90 | 191 | #define TLS1_AD_USER_CANCELLED 90 |
| 191 | #define TLS1_AD_NO_RENEGOTIATION 100 | 192 | #define TLS1_AD_NO_RENEGOTIATION 100 |
| 192 | /* Codes 110-114 are from RFC 3546. */ | 193 | /* Codes 110-114 are from RFC 3546. */ |
