diff options
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libssl/ssl_locl.h | 4 | ||||
| -rw-r--r-- | src/lib/libssl/t1_enc.c | 69 | 
2 files changed, 43 insertions, 30 deletions
| diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h index 1b768e3939..b79e9269ce 100644 --- a/src/lib/libssl/ssl_locl.h +++ b/src/lib/libssl/ssl_locl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_locl.h,v 1.130 2016/10/19 16:38:40 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.131 2016/11/03 08:15:22 jsing Exp $ */ | 
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 
| 3 | * All rights reserved. | 3 | * All rights reserved. | 
| 4 | * | 4 | * | 
| @@ -754,7 +754,7 @@ int ssl_init_wbio_buffer(SSL *s, int push); | |||
| 754 | void ssl_free_wbio_buffer(SSL *s); | 754 | void ssl_free_wbio_buffer(SSL *s); | 
| 755 | 755 | ||
| 756 | int tls1_init_finished_mac(SSL *s); | 756 | int tls1_init_finished_mac(SSL *s); | 
| 757 | void tls1_finish_mac(SSL *s, const unsigned char *buf, int len); | 757 | int tls1_finish_mac(SSL *s, const unsigned char *buf, int len); | 
| 758 | void tls1_free_digest_list(SSL *s); | 758 | void tls1_free_digest_list(SSL *s); | 
| 759 | void tls1_cleanup_key_block(SSL *s); | 759 | void tls1_cleanup_key_block(SSL *s); | 
| 760 | int tls1_digest_cached_records(SSL *s); | 760 | int tls1_digest_cached_records(SSL *s); | 
| diff --git a/src/lib/libssl/t1_enc.c b/src/lib/libssl/t1_enc.c index 53570b2d4f..6305a6ffb9 100644 --- a/src/lib/libssl/t1_enc.c +++ b/src/lib/libssl/t1_enc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t1_enc.c,v 1.85 2016/04/28 16:39:45 jsing Exp $ */ | 1 | /* $OpenBSD: t1_enc.c,v 1.86 2016/11/03 08:15:22 jsing Exp $ */ | 
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 
| 3 | * All rights reserved. | 3 | * All rights reserved. | 
| 4 | * | 4 | * | 
| @@ -177,9 +177,9 @@ tls1_free_digest_list(SSL *s) | |||
| 177 | 177 | ||
| 178 | if (s == NULL) | 178 | if (s == NULL) | 
| 179 | return; | 179 | return; | 
| 180 | |||
| 181 | if (s->s3->handshake_dgst == NULL) | 180 | if (s->s3->handshake_dgst == NULL) | 
| 182 | return; | 181 | return; | 
| 182 | |||
| 183 | for (i = 0; i < SSL_MAX_DIGEST; i++) { | 183 | for (i = 0; i < SSL_MAX_DIGEST; i++) { | 
| 184 | if (s->s3->handshake_dgst[i]) | 184 | if (s->s3->handshake_dgst[i]) | 
| 185 | EVP_MD_CTX_destroy(s->s3->handshake_dgst[i]); | 185 | EVP_MD_CTX_destroy(s->s3->handshake_dgst[i]); | 
| @@ -188,61 +188,70 @@ tls1_free_digest_list(SSL *s) | |||
| 188 | s->s3->handshake_dgst = NULL; | 188 | s->s3->handshake_dgst = NULL; | 
| 189 | } | 189 | } | 
| 190 | 190 | ||
| 191 | void | 191 | int | 
| 192 | tls1_finish_mac(SSL *s, const unsigned char *buf, int len) | 192 | tls1_finish_mac(SSL *s, const unsigned char *buf, int len) | 
| 193 | { | 193 | { | 
| 194 | int i; | ||
| 195 | |||
| 194 | if (s->s3->handshake_buffer && | 196 | if (s->s3->handshake_buffer && | 
| 195 | !(s->s3->flags & TLS1_FLAGS_KEEP_HANDSHAKE)) { | 197 | !(s->s3->flags & TLS1_FLAGS_KEEP_HANDSHAKE)) { | 
| 196 | BIO_write(s->s3->handshake_buffer, (void *)buf, len); | 198 | BIO_write(s->s3->handshake_buffer, (void *)buf, len); | 
| 197 | } else { | 199 | return 1; | 
| 198 | int i; | 200 | } | 
| 199 | for (i = 0; i < SSL_MAX_DIGEST; i++) { | 201 | |
| 200 | if (s->s3->handshake_dgst[i]!= NULL) | 202 | for (i = 0; i < SSL_MAX_DIGEST; i++) { | 
| 201 | EVP_DigestUpdate(s->s3->handshake_dgst[i], buf, len); | 203 | if (s->s3->handshake_dgst[i] == NULL) | 
| 204 | continue; | ||
| 205 | if (!EVP_DigestUpdate(s->s3->handshake_dgst[i], buf, len)) { | ||
| 206 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, ERR_R_EVP_LIB); | ||
| 207 | return 0; | ||
| 202 | } | 208 | } | 
| 203 | } | 209 | } | 
| 210 | |||
| 211 | return 1; | ||
| 204 | } | 212 | } | 
| 205 | 213 | ||
| 206 | int | 214 | int | 
| 207 | tls1_digest_cached_records(SSL *s) | 215 | tls1_digest_cached_records(SSL *s) | 
| 208 | { | 216 | { | 
| 209 | int i; | ||
| 210 | long mask; | ||
| 211 | const EVP_MD *md; | 217 | const EVP_MD *md; | 
| 212 | long hdatalen; | 218 | long hdatalen, mask; | 
| 213 | void *hdata; | 219 | void *hdata; | 
| 220 | int i; | ||
| 214 | 221 | ||
| 215 | tls1_free_digest_list(s); | 222 | tls1_free_digest_list(s); | 
| 216 | 223 | ||
| 217 | s->s3->handshake_dgst = calloc(SSL_MAX_DIGEST, sizeof(EVP_MD_CTX *)); | 224 | s->s3->handshake_dgst = calloc(SSL_MAX_DIGEST, sizeof(EVP_MD_CTX *)); | 
| 218 | if (s->s3->handshake_dgst == NULL) { | 225 | if (s->s3->handshake_dgst == NULL) { | 
| 219 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, ERR_R_MALLOC_FAILURE); | 226 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, ERR_R_MALLOC_FAILURE); | 
| 220 | return 0; | 227 | goto err; | 
| 221 | } | 228 | } | 
| 222 | hdatalen = BIO_get_mem_data(s->s3->handshake_buffer, &hdata); | 229 | hdatalen = BIO_get_mem_data(s->s3->handshake_buffer, &hdata); | 
| 223 | if (hdatalen <= 0) { | 230 | if (hdatalen <= 0) { | 
| 224 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, | 231 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, | 
| 225 | SSL_R_BAD_HANDSHAKE_LENGTH); | 232 | SSL_R_BAD_HANDSHAKE_LENGTH); | 
| 226 | return 0; | 233 | goto err; | 
| 227 | } | 234 | } | 
| 228 | 235 | ||
| 229 | /* Loop through bits of the algorithm2 field and create MD contexts. */ | 236 | /* Loop through bits of the algorithm2 field and create MD contexts. */ | 
| 230 | for (i = 0; ssl_get_handshake_digest(i, &mask, &md); i++) { | 237 | for (i = 0; ssl_get_handshake_digest(i, &mask, &md); i++) { | 
| 231 | if ((mask & ssl_get_algorithm2(s)) && md) { | 238 | if ((mask & ssl_get_algorithm2(s)) == 0 || md == NULL) | 
| 232 | s->s3->handshake_dgst[i] = EVP_MD_CTX_create(); | 239 | continue; | 
| 233 | if (s->s3->handshake_dgst[i] == NULL) { | 240 | |
| 234 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, | 241 | s->s3->handshake_dgst[i] = EVP_MD_CTX_create(); | 
| 235 | ERR_R_MALLOC_FAILURE); | 242 | if (s->s3->handshake_dgst[i] == NULL) { | 
| 236 | return 0; | 243 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, | 
| 237 | } | 244 | ERR_R_MALLOC_FAILURE); | 
| 238 | if (!EVP_DigestInit_ex(s->s3->handshake_dgst[i], | 245 | goto err; | 
| 239 | md, NULL)) { | 246 | } | 
| 240 | EVP_MD_CTX_destroy(s->s3->handshake_dgst[i]); | 247 | if (!EVP_DigestInit_ex(s->s3->handshake_dgst[i], md, NULL)) { | 
| 241 | return 0; | 248 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, ERR_R_EVP_LIB); | 
| 242 | } | 249 | goto err; | 
| 243 | if (!EVP_DigestUpdate(s->s3->handshake_dgst[i], hdata, | 250 | } | 
| 244 | hdatalen)) | 251 | if (!EVP_DigestUpdate(s->s3->handshake_dgst[i], hdata, | 
| 245 | return 0; | 252 | hdatalen)) { | 
| 253 | SSLerr(SSL_F_SSL3_DIGEST_CACHED_RECORDS, ERR_R_EVP_LIB); | ||
| 254 | goto err; | ||
| 246 | } | 255 | } | 
| 247 | } | 256 | } | 
| 248 | 257 | ||
| @@ -252,6 +261,10 @@ tls1_digest_cached_records(SSL *s) | |||
| 252 | } | 261 | } | 
| 253 | 262 | ||
| 254 | return 1; | 263 | return 1; | 
| 264 | |||
| 265 | err: | ||
| 266 | tls1_free_digest_list(s); | ||
| 267 | return 0; | ||
| 255 | } | 268 | } | 
| 256 | 269 | ||
| 257 | void | 270 | void | 
