]>
Commit | Line | Data |
---|---|---|
1 | /* | |
2 | * Copyright 1995-2025 The OpenSSL Project Authors. All Rights Reserved. | |
3 | * | |
4 | * Licensed under the Apache License 2.0 (the "License"). You may not use | |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
8 | */ | |
9 | ||
10 | /* | |
11 | * callback functions used by s_client, s_server, and s_time, | |
12 | * as well as other common logic for those apps | |
13 | */ | |
14 | #include <stdio.h> | |
15 | #include <stdlib.h> | |
16 | #include <string.h> /* for memcpy() and strcmp() */ | |
17 | #include "apps.h" | |
18 | #include <openssl/core_names.h> | |
19 | #include <openssl/params.h> | |
20 | #include <openssl/err.h> | |
21 | #include <openssl/rand.h> | |
22 | #include <openssl/x509.h> | |
23 | #include <openssl/ssl.h> | |
24 | #include <openssl/bn.h> | |
25 | #ifndef OPENSSL_NO_DH | |
26 | # include <openssl/dh.h> | |
27 | #endif | |
28 | #include "s_apps.h" | |
29 | ||
30 | #define COOKIE_SECRET_LENGTH 16 | |
31 | ||
32 | VERIFY_CB_ARGS verify_args = { -1, 0, X509_V_OK, 0 }; | |
33 | ||
34 | #ifndef OPENSSL_NO_SOCK | |
35 | static unsigned char cookie_secret[COOKIE_SECRET_LENGTH]; | |
36 | static int cookie_initialized = 0; | |
37 | #endif | |
38 | static BIO *bio_keylog = NULL; | |
39 | ||
40 | static const char *lookup(int val, const STRINT_PAIR* list, const char* def) | |
41 | { | |
42 | for ( ; list->name; ++list) | |
43 | if (list->retval == val) | |
44 | return list->name; | |
45 | return def; | |
46 | } | |
47 | ||
48 | int verify_callback(int ok, X509_STORE_CTX *ctx) | |
49 | { | |
50 | X509 *err_cert; | |
51 | int err, depth; | |
52 | ||
53 | err_cert = X509_STORE_CTX_get_current_cert(ctx); | |
54 | err = X509_STORE_CTX_get_error(ctx); | |
55 | depth = X509_STORE_CTX_get_error_depth(ctx); | |
56 | ||
57 | if (!verify_args.quiet || !ok) { | |
58 | BIO_printf(bio_err, "depth=%d ", depth); | |
59 | if (err_cert != NULL) { | |
60 | X509_NAME_print_ex(bio_err, | |
61 | X509_get_subject_name(err_cert), | |
62 | 0, get_nameopt()); | |
63 | BIO_puts(bio_err, "\n"); | |
64 | } else { | |
65 | BIO_puts(bio_err, "<no cert>\n"); | |
66 | } | |
67 | } | |
68 | if (!ok) { | |
69 | BIO_printf(bio_err, "verify error:num=%d:%s\n", err, | |
70 | X509_verify_cert_error_string(err)); | |
71 | if (verify_args.depth < 0 || verify_args.depth >= depth) { | |
72 | if (!verify_args.return_error) | |
73 | ok = 1; | |
74 | verify_args.error = err; | |
75 | } else { | |
76 | ok = 0; | |
77 | verify_args.error = X509_V_ERR_CERT_CHAIN_TOO_LONG; | |
78 | } | |
79 | } | |
80 | switch (err) { | |
81 | case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT: | |
82 | if (err_cert != NULL) { | |
83 | BIO_puts(bio_err, "issuer= "); | |
84 | X509_NAME_print_ex(bio_err, X509_get_issuer_name(err_cert), | |
85 | 0, get_nameopt()); | |
86 | BIO_puts(bio_err, "\n"); | |
87 | } | |
88 | break; | |
89 | case X509_V_ERR_CERT_NOT_YET_VALID: | |
90 | case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: | |
91 | if (err_cert != NULL) { | |
92 | BIO_printf(bio_err, "notBefore="); | |
93 | ASN1_TIME_print(bio_err, X509_get0_notBefore(err_cert)); | |
94 | BIO_printf(bio_err, "\n"); | |
95 | } | |
96 | break; | |
97 | case X509_V_ERR_CERT_HAS_EXPIRED: | |
98 | case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: | |
99 | if (err_cert != NULL) { | |
100 | BIO_printf(bio_err, "notAfter="); | |
101 | ASN1_TIME_print(bio_err, X509_get0_notAfter(err_cert)); | |
102 | BIO_printf(bio_err, "\n"); | |
103 | } | |
104 | break; | |
105 | case X509_V_ERR_NO_EXPLICIT_POLICY: | |
106 | if (!verify_args.quiet) | |
107 | policies_print(ctx); | |
108 | break; | |
109 | } | |
110 | if (err == X509_V_OK && ok == 2 && !verify_args.quiet) | |
111 | policies_print(ctx); | |
112 | if (ok && !verify_args.quiet) | |
113 | BIO_printf(bio_err, "verify return:%d\n", ok); | |
114 | return ok; | |
115 | } | |
116 | ||
117 | int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) | |
118 | { | |
119 | if (cert_file != NULL) { | |
120 | if (SSL_CTX_use_certificate_file(ctx, cert_file, | |
121 | SSL_FILETYPE_PEM) <= 0) { | |
122 | BIO_printf(bio_err, "unable to get certificate from '%s'\n", | |
123 | cert_file); | |
124 | ERR_print_errors(bio_err); | |
125 | return 0; | |
126 | } | |
127 | if (key_file == NULL) | |
128 | key_file = cert_file; | |
129 | if (SSL_CTX_use_PrivateKey_file(ctx, key_file, SSL_FILETYPE_PEM) <= 0) { | |
130 | BIO_printf(bio_err, "unable to get private key from '%s'\n", | |
131 | key_file); | |
132 | ERR_print_errors(bio_err); | |
133 | return 0; | |
134 | } | |
135 | ||
136 | /* | |
137 | * If we are using DSA, we can copy the parameters from the private | |
138 | * key | |
139 | */ | |
140 | ||
141 | /* | |
142 | * Now we know that a key and cert have been set against the SSL | |
143 | * context | |
144 | */ | |
145 | if (!SSL_CTX_check_private_key(ctx)) { | |
146 | BIO_printf(bio_err, | |
147 | "Private key does not match the certificate public key\n"); | |
148 | return 0; | |
149 | } | |
150 | } | |
151 | return 1; | |
152 | } | |
153 | ||
154 | int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, | |
155 | STACK_OF(X509) *chain, int build_chain) | |
156 | { | |
157 | int chflags = chain ? SSL_BUILD_CHAIN_FLAG_CHECK : 0; | |
158 | ||
159 | if (cert == NULL) | |
160 | return 1; | |
161 | if (SSL_CTX_use_certificate(ctx, cert) <= 0) { | |
162 | BIO_printf(bio_err, "error setting certificate\n"); | |
163 | ERR_print_errors(bio_err); | |
164 | return 0; | |
165 | } | |
166 | ||
167 | if (SSL_CTX_use_PrivateKey(ctx, key) <= 0) { | |
168 | BIO_printf(bio_err, "error setting private key\n"); | |
169 | ERR_print_errors(bio_err); | |
170 | return 0; | |
171 | } | |
172 | ||
173 | /* | |
174 | * Now we know that a key and cert have been set against the SSL context | |
175 | */ | |
176 | if (!SSL_CTX_check_private_key(ctx)) { | |
177 | BIO_printf(bio_err, | |
178 | "Private key does not match the certificate public key\n"); | |
179 | return 0; | |
180 | } | |
181 | if (chain && !SSL_CTX_set1_chain(ctx, chain)) { | |
182 | BIO_printf(bio_err, "error setting certificate chain\n"); | |
183 | ERR_print_errors(bio_err); | |
184 | return 0; | |
185 | } | |
186 | if (build_chain && !SSL_CTX_build_cert_chain(ctx, chflags)) { | |
187 | BIO_printf(bio_err, "error building certificate chain\n"); | |
188 | ERR_print_errors(bio_err); | |
189 | return 0; | |
190 | } | |
191 | return 1; | |
192 | } | |
193 | ||
194 | static STRINT_PAIR cert_type_list[] = { | |
195 | {"RSA sign", TLS_CT_RSA_SIGN}, | |
196 | {"DSA sign", TLS_CT_DSS_SIGN}, | |
197 | {"RSA fixed DH", TLS_CT_RSA_FIXED_DH}, | |
198 | {"DSS fixed DH", TLS_CT_DSS_FIXED_DH}, | |
199 | {"ECDSA sign", TLS_CT_ECDSA_SIGN}, | |
200 | {"RSA fixed ECDH", TLS_CT_RSA_FIXED_ECDH}, | |
201 | {"ECDSA fixed ECDH", TLS_CT_ECDSA_FIXED_ECDH}, | |
202 | {"GOST01 Sign", TLS_CT_GOST01_SIGN}, | |
203 | {"GOST12 Sign", TLS_CT_GOST12_IANA_SIGN}, | |
204 | {NULL} | |
205 | }; | |
206 | ||
207 | static void ssl_print_client_cert_types(BIO *bio, SSL *s) | |
208 | { | |
209 | const unsigned char *p; | |
210 | int i; | |
211 | int cert_type_num = SSL_get0_certificate_types(s, &p); | |
212 | ||
213 | if (!cert_type_num) | |
214 | return; | |
215 | BIO_puts(bio, "Client Certificate Types: "); | |
216 | for (i = 0; i < cert_type_num; i++) { | |
217 | unsigned char cert_type = p[i]; | |
218 | const char *cname = lookup((int)cert_type, cert_type_list, NULL); | |
219 | ||
220 | if (i) | |
221 | BIO_puts(bio, ", "); | |
222 | if (cname != NULL) | |
223 | BIO_puts(bio, cname); | |
224 | else | |
225 | BIO_printf(bio, "UNKNOWN (%d),", cert_type); | |
226 | } | |
227 | BIO_puts(bio, "\n"); | |
228 | } | |
229 | ||
230 | static const char *get_sigtype(int nid) | |
231 | { | |
232 | switch (nid) { | |
233 | case EVP_PKEY_RSA: | |
234 | return "RSA"; | |
235 | ||
236 | case EVP_PKEY_RSA_PSS: | |
237 | return "RSA-PSS"; | |
238 | ||
239 | case EVP_PKEY_DSA: | |
240 | return "DSA"; | |
241 | ||
242 | case EVP_PKEY_EC: | |
243 | return "ECDSA"; | |
244 | ||
245 | case NID_ED25519: | |
246 | return "ed25519"; | |
247 | ||
248 | case NID_ED448: | |
249 | return "ed448"; | |
250 | ||
251 | case NID_id_GostR3410_2001: | |
252 | return "gost2001"; | |
253 | ||
254 | case NID_id_GostR3410_2012_256: | |
255 | return "gost2012_256"; | |
256 | ||
257 | case NID_id_GostR3410_2012_512: | |
258 | return "gost2012_512"; | |
259 | ||
260 | default: | |
261 | /* Try to output provider-registered sig alg name */ | |
262 | return OBJ_nid2sn(nid); | |
263 | } | |
264 | } | |
265 | ||
266 | static int do_print_sigalgs(BIO *out, SSL *s, int shared) | |
267 | { | |
268 | int i, nsig, client; | |
269 | ||
270 | client = SSL_is_server(s) ? 0 : 1; | |
271 | if (shared) | |
272 | nsig = SSL_get_shared_sigalgs(s, 0, NULL, NULL, NULL, NULL, NULL); | |
273 | else | |
274 | nsig = SSL_get_sigalgs(s, -1, NULL, NULL, NULL, NULL, NULL); | |
275 | if (nsig == 0) | |
276 | return 1; | |
277 | ||
278 | if (shared) | |
279 | BIO_puts(out, "Shared "); | |
280 | ||
281 | if (client) | |
282 | BIO_puts(out, "Requested "); | |
283 | BIO_puts(out, "Signature Algorithms: "); | |
284 | for (i = 0; i < nsig; i++) { | |
285 | int hash_nid, sign_nid; | |
286 | unsigned char rhash, rsign; | |
287 | const char *sstr = NULL; | |
288 | if (shared) | |
289 | SSL_get_shared_sigalgs(s, i, &sign_nid, &hash_nid, NULL, | |
290 | &rsign, &rhash); | |
291 | else | |
292 | SSL_get_sigalgs(s, i, &sign_nid, &hash_nid, NULL, &rsign, &rhash); | |
293 | if (i) | |
294 | BIO_puts(out, ":"); | |
295 | switch (rsign | rhash << 8) { | |
296 | case 0x0809: | |
297 | BIO_puts(out, "rsa_pss_pss_sha256"); | |
298 | continue; | |
299 | case 0x080a: | |
300 | BIO_puts(out, "rsa_pss_pss_sha384"); | |
301 | continue; | |
302 | case 0x080b: | |
303 | BIO_puts(out, "rsa_pss_pss_sha512"); | |
304 | continue; | |
305 | case 0x081a: | |
306 | BIO_puts(out, "ecdsa_brainpoolP256r1_sha256"); | |
307 | continue; | |
308 | case 0x081b: | |
309 | BIO_puts(out, "ecdsa_brainpoolP384r1_sha384"); | |
310 | continue; | |
311 | case 0x081c: | |
312 | BIO_puts(out, "ecdsa_brainpoolP512r1_sha512"); | |
313 | continue; | |
314 | } | |
315 | sstr = get_sigtype(sign_nid); | |
316 | if (sstr) | |
317 | BIO_printf(out, "%s", sstr); | |
318 | else | |
319 | BIO_printf(out, "0x%02X", (int)rsign); | |
320 | if (hash_nid != NID_undef) | |
321 | BIO_printf(out, "+%s", OBJ_nid2sn(hash_nid)); | |
322 | else if (sstr == NULL) | |
323 | BIO_printf(out, "+0x%02X", (int)rhash); | |
324 | } | |
325 | BIO_puts(out, "\n"); | |
326 | return 1; | |
327 | } | |
328 | ||
329 | int ssl_print_sigalgs(BIO *out, SSL *s) | |
330 | { | |
331 | const char *name; | |
332 | int nid; | |
333 | ||
334 | if (!SSL_is_server(s)) | |
335 | ssl_print_client_cert_types(out, s); | |
336 | do_print_sigalgs(out, s, 0); | |
337 | do_print_sigalgs(out, s, 1); | |
338 | if (SSL_get_peer_signature_nid(s, &nid) && nid != NID_undef) | |
339 | BIO_printf(out, "Peer signing digest: %s\n", OBJ_nid2sn(nid)); | |
340 | if (SSL_get0_peer_signature_name(s, &name)) | |
341 | BIO_printf(out, "Peer signature type: %s\n", name); | |
342 | else if (SSL_get_peer_signature_type_nid(s, &nid)) | |
343 | BIO_printf(out, "Peer signature type: %s\n", get_sigtype(nid)); | |
344 | return 1; | |
345 | } | |
346 | ||
347 | #ifndef OPENSSL_NO_EC | |
348 | int ssl_print_point_formats(BIO *out, SSL *s) | |
349 | { | |
350 | int i, nformats; | |
351 | const char *pformats; | |
352 | ||
353 | nformats = SSL_get0_ec_point_formats(s, &pformats); | |
354 | if (nformats <= 0) | |
355 | return 1; | |
356 | BIO_puts(out, "Supported Elliptic Curve Point Formats: "); | |
357 | for (i = 0; i < nformats; i++, pformats++) { | |
358 | if (i) | |
359 | BIO_puts(out, ":"); | |
360 | switch (*pformats) { | |
361 | case TLSEXT_ECPOINTFORMAT_uncompressed: | |
362 | BIO_puts(out, "uncompressed"); | |
363 | break; | |
364 | ||
365 | case TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime: | |
366 | BIO_puts(out, "ansiX962_compressed_prime"); | |
367 | break; | |
368 | ||
369 | case TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2: | |
370 | BIO_puts(out, "ansiX962_compressed_char2"); | |
371 | break; | |
372 | ||
373 | default: | |
374 | BIO_printf(out, "unknown(%d)", (int)*pformats); | |
375 | break; | |
376 | ||
377 | } | |
378 | } | |
379 | BIO_puts(out, "\n"); | |
380 | return 1; | |
381 | } | |
382 | ||
383 | int ssl_print_groups(BIO *out, SSL *s, int noshared) | |
384 | { | |
385 | int i, ngroups, *groups, nid; | |
386 | ||
387 | ngroups = SSL_get1_groups(s, NULL); | |
388 | if (ngroups <= 0) | |
389 | return 1; | |
390 | groups = app_malloc(ngroups * sizeof(int), "groups to print"); | |
391 | SSL_get1_groups(s, groups); | |
392 | ||
393 | BIO_puts(out, "Supported groups: "); | |
394 | for (i = 0; i < ngroups; i++) { | |
395 | if (i) | |
396 | BIO_puts(out, ":"); | |
397 | nid = groups[i]; | |
398 | BIO_printf(out, "%s", SSL_group_to_name(s, nid)); | |
399 | } | |
400 | OPENSSL_free(groups); | |
401 | if (noshared) { | |
402 | BIO_puts(out, "\n"); | |
403 | return 1; | |
404 | } | |
405 | BIO_puts(out, "\nShared groups: "); | |
406 | ngroups = SSL_get_shared_group(s, -1); | |
407 | for (i = 0; i < ngroups; i++) { | |
408 | if (i) | |
409 | BIO_puts(out, ":"); | |
410 | nid = SSL_get_shared_group(s, i); | |
411 | BIO_printf(out, "%s", SSL_group_to_name(s, nid)); | |
412 | } | |
413 | if (ngroups == 0) | |
414 | BIO_puts(out, "NONE"); | |
415 | BIO_puts(out, "\n"); | |
416 | return 1; | |
417 | } | |
418 | #endif | |
419 | ||
420 | int ssl_print_tmp_key(BIO *out, SSL *s) | |
421 | { | |
422 | const char *keyname; | |
423 | EVP_PKEY *key; | |
424 | ||
425 | if (!SSL_get_peer_tmp_key(s, &key)) { | |
426 | if (SSL_version(s) == TLS1_3_VERSION) | |
427 | BIO_printf(out, "Negotiated TLS1.3 group: %s\n", | |
428 | SSL_group_to_name(s, SSL_get_negotiated_group(s))); | |
429 | return 1; | |
430 | } | |
431 | ||
432 | BIO_puts(out, "Peer Temp Key: "); | |
433 | switch (EVP_PKEY_get_id(key)) { | |
434 | case EVP_PKEY_RSA: | |
435 | BIO_printf(out, "RSA, %d bits\n", EVP_PKEY_get_bits(key)); | |
436 | break; | |
437 | ||
438 | case EVP_PKEY_KEYMGMT: | |
439 | if ((keyname = EVP_PKEY_get0_type_name(key)) == NULL) | |
440 | keyname = "?"; | |
441 | BIO_printf(out, "%s\n", keyname); | |
442 | break; | |
443 | ||
444 | case EVP_PKEY_DH: | |
445 | BIO_printf(out, "DH, %d bits\n", EVP_PKEY_get_bits(key)); | |
446 | break; | |
447 | #ifndef OPENSSL_NO_EC | |
448 | case EVP_PKEY_EC: | |
449 | { | |
450 | char name[80]; | |
451 | size_t name_len; | |
452 | ||
453 | if (!EVP_PKEY_get_utf8_string_param(key, OSSL_PKEY_PARAM_GROUP_NAME, | |
454 | name, sizeof(name), &name_len)) | |
455 | strcpy(name, "?"); | |
456 | BIO_printf(out, "ECDH, %s, %d bits\n", name, EVP_PKEY_get_bits(key)); | |
457 | } | |
458 | break; | |
459 | #endif | |
460 | default: | |
461 | BIO_printf(out, "%s, %d bits\n", OBJ_nid2sn(EVP_PKEY_get_id(key)), | |
462 | EVP_PKEY_get_bits(key)); | |
463 | } | |
464 | EVP_PKEY_free(key); | |
465 | return 1; | |
466 | } | |
467 | ||
468 | long bio_dump_callback(BIO *bio, int cmd, const char *argp, size_t len, | |
469 | int argi, long argl, int ret, size_t *processed) | |
470 | { | |
471 | BIO *out; | |
472 | BIO_MMSG_CB_ARGS *mmsgargs; | |
473 | size_t i; | |
474 | ||
475 | out = (BIO *)BIO_get_callback_arg(bio); | |
476 | if (out == NULL) | |
477 | return ret; | |
478 | ||
479 | switch (cmd) { | |
480 | case (BIO_CB_READ | BIO_CB_RETURN): | |
481 | if (ret > 0 && processed != NULL) { | |
482 | BIO_printf(out, "read from %p [%p] (%zu bytes => %zu (0x%zX))\n", | |
483 | (void *)bio, (void *)argp, len, *processed, *processed); | |
484 | BIO_dump(out, argp, (int)*processed); | |
485 | } else { | |
486 | BIO_printf(out, "read from %p [%p] (%zu bytes => %d)\n", | |
487 | (void *)bio, (void *)argp, len, ret); | |
488 | } | |
489 | break; | |
490 | ||
491 | case (BIO_CB_WRITE | BIO_CB_RETURN): | |
492 | if (ret > 0 && processed != NULL) { | |
493 | BIO_printf(out, "write to %p [%p] (%zu bytes => %zu (0x%zX))\n", | |
494 | (void *)bio, (void *)argp, len, *processed, *processed); | |
495 | BIO_dump(out, argp, (int)*processed); | |
496 | } else { | |
497 | BIO_printf(out, "write to %p [%p] (%zu bytes => %d)\n", | |
498 | (void *)bio, (void *)argp, len, ret); | |
499 | } | |
500 | break; | |
501 | ||
502 | case (BIO_CB_RECVMMSG | BIO_CB_RETURN): | |
503 | mmsgargs = (BIO_MMSG_CB_ARGS *)argp; | |
504 | if (ret > 0) { | |
505 | for (i = 0; i < *(mmsgargs->msgs_processed); i++) { | |
506 | BIO_MSG *msg = (BIO_MSG *)((char *)mmsgargs->msg | |
507 | + (i * mmsgargs->stride)); | |
508 | ||
509 | BIO_printf(out, "read from %p [%p] (%zu bytes => %zu (0x%zX))\n", | |
510 | (void *)bio, (void *)msg->data, msg->data_len, | |
511 | msg->data_len, msg->data_len); | |
512 | if (msg->data_len <= INT_MAX) | |
513 | BIO_dump(out, msg->data, (int)msg->data_len); | |
514 | } | |
515 | } else if (mmsgargs->num_msg > 0) { | |
516 | BIO_MSG *msg = mmsgargs->msg; | |
517 | ||
518 | BIO_printf(out, "read from %p [%p] (%zu bytes => %d)\n", | |
519 | (void *)bio, (void *)msg->data, msg->data_len, ret); | |
520 | } | |
521 | break; | |
522 | ||
523 | case (BIO_CB_SENDMMSG | BIO_CB_RETURN): | |
524 | mmsgargs = (BIO_MMSG_CB_ARGS *)argp; | |
525 | if (ret > 0) { | |
526 | for (i = 0; i < *(mmsgargs->msgs_processed); i++) { | |
527 | BIO_MSG *msg = (BIO_MSG *)((char *)mmsgargs->msg | |
528 | + (i * mmsgargs->stride)); | |
529 | ||
530 | BIO_printf(out, "write to %p [%p] (%zu bytes => %zu (0x%zX))\n", | |
531 | (void *)bio, (void *)msg->data, msg->data_len, | |
532 | msg->data_len, msg->data_len); | |
533 | if (msg->data_len <= INT_MAX) | |
534 | BIO_dump(out, msg->data, (int)msg->data_len); | |
535 | } | |
536 | } else if (mmsgargs->num_msg > 0) { | |
537 | BIO_MSG *msg = mmsgargs->msg; | |
538 | ||
539 | BIO_printf(out, "write to %p [%p] (%zu bytes => %d)\n", | |
540 | (void *)bio, (void *)msg->data, msg->data_len, ret); | |
541 | } | |
542 | break; | |
543 | ||
544 | default: | |
545 | /* do nothing */ | |
546 | break; | |
547 | } | |
548 | return ret; | |
549 | } | |
550 | ||
551 | void apps_ssl_info_callback(const SSL *s, int where, int ret) | |
552 | { | |
553 | const char *str; | |
554 | int w; | |
555 | ||
556 | w = where & ~SSL_ST_MASK; | |
557 | ||
558 | if (w & SSL_ST_CONNECT) | |
559 | str = "SSL_connect"; | |
560 | else if (w & SSL_ST_ACCEPT) | |
561 | str = "SSL_accept"; | |
562 | else | |
563 | str = "undefined"; | |
564 | ||
565 | if (where & SSL_CB_LOOP) { | |
566 | BIO_printf(bio_err, "%s:%s\n", str, SSL_state_string_long(s)); | |
567 | } else if (where & SSL_CB_ALERT) { | |
568 | str = (where & SSL_CB_READ) ? "read" : "write"; | |
569 | BIO_printf(bio_err, "SSL3 alert %s:%s:%s\n", | |
570 | str, | |
571 | SSL_alert_type_string_long(ret), | |
572 | SSL_alert_desc_string_long(ret)); | |
573 | } else if (where & SSL_CB_EXIT) { | |
574 | if (ret == 0) | |
575 | BIO_printf(bio_err, "%s:failed in %s\n", | |
576 | str, SSL_state_string_long(s)); | |
577 | else if (ret < 0) | |
578 | BIO_printf(bio_err, "%s:error in %s\n", | |
579 | str, SSL_state_string_long(s)); | |
580 | } | |
581 | } | |
582 | ||
583 | static STRINT_PAIR ssl_versions[] = { | |
584 | {"SSL 3.0", SSL3_VERSION}, | |
585 | {"TLS 1.0", TLS1_VERSION}, | |
586 | {"TLS 1.1", TLS1_1_VERSION}, | |
587 | {"TLS 1.2", TLS1_2_VERSION}, | |
588 | {"TLS 1.3", TLS1_3_VERSION}, | |
589 | {"DTLS 1.0", DTLS1_VERSION}, | |
590 | {"DTLS 1.0 (bad)", DTLS1_BAD_VER}, | |
591 | {NULL} | |
592 | }; | |
593 | ||
594 | static STRINT_PAIR alert_types[] = { | |
595 | {" close_notify", 0}, | |
596 | {" end_of_early_data", 1}, | |
597 | {" unexpected_message", 10}, | |
598 | {" bad_record_mac", 20}, | |
599 | {" decryption_failed", 21}, | |
600 | {" record_overflow", 22}, | |
601 | {" decompression_failure", 30}, | |
602 | {" handshake_failure", 40}, | |
603 | {" bad_certificate", 42}, | |
604 | {" unsupported_certificate", 43}, | |
605 | {" certificate_revoked", 44}, | |
606 | {" certificate_expired", 45}, | |
607 | {" certificate_unknown", 46}, | |
608 | {" illegal_parameter", 47}, | |
609 | {" unknown_ca", 48}, | |
610 | {" access_denied", 49}, | |
611 | {" decode_error", 50}, | |
612 | {" decrypt_error", 51}, | |
613 | {" export_restriction", 60}, | |
614 | {" protocol_version", 70}, | |
615 | {" insufficient_security", 71}, | |
616 | {" internal_error", 80}, | |
617 | {" inappropriate_fallback", 86}, | |
618 | {" user_canceled", 90}, | |
619 | {" no_renegotiation", 100}, | |
620 | {" missing_extension", 109}, | |
621 | {" unsupported_extension", 110}, | |
622 | {" certificate_unobtainable", 111}, | |
623 | {" unrecognized_name", 112}, | |
624 | {" bad_certificate_status_response", 113}, | |
625 | {" bad_certificate_hash_value", 114}, | |
626 | {" unknown_psk_identity", 115}, | |
627 | {" certificate_required", 116}, | |
628 | {NULL} | |
629 | }; | |
630 | ||
631 | static STRINT_PAIR handshakes[] = { | |
632 | {", HelloRequest", SSL3_MT_HELLO_REQUEST}, | |
633 | {", ClientHello", SSL3_MT_CLIENT_HELLO}, | |
634 | {", ServerHello", SSL3_MT_SERVER_HELLO}, | |
635 | {", HelloVerifyRequest", DTLS1_MT_HELLO_VERIFY_REQUEST}, | |
636 | {", NewSessionTicket", SSL3_MT_NEWSESSION_TICKET}, | |
637 | {", EndOfEarlyData", SSL3_MT_END_OF_EARLY_DATA}, | |
638 | {", EncryptedExtensions", SSL3_MT_ENCRYPTED_EXTENSIONS}, | |
639 | {", Certificate", SSL3_MT_CERTIFICATE}, | |
640 | {", ServerKeyExchange", SSL3_MT_SERVER_KEY_EXCHANGE}, | |
641 | {", CertificateRequest", SSL3_MT_CERTIFICATE_REQUEST}, | |
642 | {", ServerHelloDone", SSL3_MT_SERVER_DONE}, | |
643 | {", CertificateVerify", SSL3_MT_CERTIFICATE_VERIFY}, | |
644 | {", ClientKeyExchange", SSL3_MT_CLIENT_KEY_EXCHANGE}, | |
645 | {", Finished", SSL3_MT_FINISHED}, | |
646 | {", CertificateUrl", SSL3_MT_CERTIFICATE_URL}, | |
647 | {", CertificateStatus", SSL3_MT_CERTIFICATE_STATUS}, | |
648 | {", SupplementalData", SSL3_MT_SUPPLEMENTAL_DATA}, | |
649 | {", KeyUpdate", SSL3_MT_KEY_UPDATE}, | |
650 | {", CompressedCertificate", SSL3_MT_COMPRESSED_CERTIFICATE}, | |
651 | #ifndef OPENSSL_NO_NEXTPROTONEG | |
652 | {", NextProto", SSL3_MT_NEXT_PROTO}, | |
653 | #endif | |
654 | {", MessageHash", SSL3_MT_MESSAGE_HASH}, | |
655 | {NULL} | |
656 | }; | |
657 | ||
658 | void msg_cb(int write_p, int version, int content_type, const void *buf, | |
659 | size_t len, SSL *ssl, void *arg) | |
660 | { | |
661 | BIO *bio = arg; | |
662 | const char *str_write_p = write_p ? ">>>" : "<<<"; | |
663 | char tmpbuf[128]; | |
664 | const char *str_version, *str_content_type = "", *str_details1 = "", *str_details2 = ""; | |
665 | const unsigned char* bp = buf; | |
666 | ||
667 | if (version == SSL3_VERSION || | |
668 | version == TLS1_VERSION || | |
669 | version == TLS1_1_VERSION || | |
670 | version == TLS1_2_VERSION || | |
671 | version == TLS1_3_VERSION || | |
672 | version == DTLS1_VERSION || version == DTLS1_BAD_VER) { | |
673 | str_version = lookup(version, ssl_versions, "???"); | |
674 | switch (content_type) { | |
675 | case SSL3_RT_CHANGE_CIPHER_SPEC: | |
676 | /* type 20 */ | |
677 | str_content_type = ", ChangeCipherSpec"; | |
678 | break; | |
679 | case SSL3_RT_ALERT: | |
680 | /* type 21 */ | |
681 | str_content_type = ", Alert"; | |
682 | str_details1 = ", ???"; | |
683 | if (len == 2) { | |
684 | switch (bp[0]) { | |
685 | case 1: | |
686 | str_details1 = ", warning"; | |
687 | break; | |
688 | case 2: | |
689 | str_details1 = ", fatal"; | |
690 | break; | |
691 | } | |
692 | str_details2 = lookup((int)bp[1], alert_types, " ???"); | |
693 | } | |
694 | break; | |
695 | case SSL3_RT_HANDSHAKE: | |
696 | /* type 22 */ | |
697 | str_content_type = ", Handshake"; | |
698 | str_details1 = "???"; | |
699 | if (len > 0) | |
700 | str_details1 = lookup((int)bp[0], handshakes, "???"); | |
701 | break; | |
702 | case SSL3_RT_APPLICATION_DATA: | |
703 | /* type 23 */ | |
704 | str_content_type = ", ApplicationData"; | |
705 | break; | |
706 | case SSL3_RT_HEADER: | |
707 | /* type 256 */ | |
708 | str_content_type = ", RecordHeader"; | |
709 | break; | |
710 | case SSL3_RT_INNER_CONTENT_TYPE: | |
711 | /* type 257 */ | |
712 | str_content_type = ", InnerContent"; | |
713 | break; | |
714 | default: | |
715 | BIO_snprintf(tmpbuf, sizeof(tmpbuf)-1, ", Unknown (content_type=%d)", content_type); | |
716 | str_content_type = tmpbuf; | |
717 | } | |
718 | } else { | |
719 | BIO_snprintf(tmpbuf, sizeof(tmpbuf)-1, "Not TLS data or unknown version (version=%d, content_type=%d)", version, content_type); | |
720 | str_version = tmpbuf; | |
721 | } | |
722 | ||
723 | BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version, | |
724 | str_content_type, (unsigned long)len, str_details1, | |
725 | str_details2); | |
726 | ||
727 | if (len > 0) { | |
728 | size_t num, i; | |
729 | ||
730 | BIO_printf(bio, " "); | |
731 | num = len; | |
732 | for (i = 0; i < num; i++) { | |
733 | if (i % 16 == 0 && i > 0) | |
734 | BIO_printf(bio, "\n "); | |
735 | BIO_printf(bio, " %02x", ((const unsigned char *)buf)[i]); | |
736 | } | |
737 | if (i < len) | |
738 | BIO_printf(bio, " ..."); | |
739 | BIO_printf(bio, "\n"); | |
740 | } | |
741 | (void)BIO_flush(bio); | |
742 | } | |
743 | ||
744 | static const STRINT_PAIR tlsext_types[] = { | |
745 | {"server name", TLSEXT_TYPE_server_name}, | |
746 | {"max fragment length", TLSEXT_TYPE_max_fragment_length}, | |
747 | {"client certificate URL", TLSEXT_TYPE_client_certificate_url}, | |
748 | {"trusted CA keys", TLSEXT_TYPE_trusted_ca_keys}, | |
749 | {"truncated HMAC", TLSEXT_TYPE_truncated_hmac}, | |
750 | {"status request", TLSEXT_TYPE_status_request}, | |
751 | {"user mapping", TLSEXT_TYPE_user_mapping}, | |
752 | {"client authz", TLSEXT_TYPE_client_authz}, | |
753 | {"server authz", TLSEXT_TYPE_server_authz}, | |
754 | {"cert type", TLSEXT_TYPE_cert_type}, | |
755 | {"supported_groups", TLSEXT_TYPE_supported_groups}, | |
756 | {"EC point formats", TLSEXT_TYPE_ec_point_formats}, | |
757 | {"SRP", TLSEXT_TYPE_srp}, | |
758 | {"signature algorithms", TLSEXT_TYPE_signature_algorithms}, | |
759 | {"use SRTP", TLSEXT_TYPE_use_srtp}, | |
760 | {"session ticket", TLSEXT_TYPE_session_ticket}, | |
761 | {"renegotiation info", TLSEXT_TYPE_renegotiate}, | |
762 | {"signed certificate timestamps", TLSEXT_TYPE_signed_certificate_timestamp}, | |
763 | {"client cert type", TLSEXT_TYPE_client_cert_type}, | |
764 | {"server cert type", TLSEXT_TYPE_server_cert_type}, | |
765 | {"TLS padding", TLSEXT_TYPE_padding}, | |
766 | #ifdef TLSEXT_TYPE_next_proto_neg | |
767 | {"next protocol", TLSEXT_TYPE_next_proto_neg}, | |
768 | #endif | |
769 | #ifdef TLSEXT_TYPE_encrypt_then_mac | |
770 | {"encrypt-then-mac", TLSEXT_TYPE_encrypt_then_mac}, | |
771 | #endif | |
772 | #ifdef TLSEXT_TYPE_application_layer_protocol_negotiation | |
773 | {"application layer protocol negotiation", | |
774 | TLSEXT_TYPE_application_layer_protocol_negotiation}, | |
775 | #endif | |
776 | #ifdef TLSEXT_TYPE_extended_master_secret | |
777 | {"extended master secret", TLSEXT_TYPE_extended_master_secret}, | |
778 | #endif | |
779 | {"compress certificate", TLSEXT_TYPE_compress_certificate}, | |
780 | {"key share", TLSEXT_TYPE_key_share}, | |
781 | {"supported versions", TLSEXT_TYPE_supported_versions}, | |
782 | {"psk", TLSEXT_TYPE_psk}, | |
783 | {"psk kex modes", TLSEXT_TYPE_psk_kex_modes}, | |
784 | {"certificate authorities", TLSEXT_TYPE_certificate_authorities}, | |
785 | {"post handshake auth", TLSEXT_TYPE_post_handshake_auth}, | |
786 | {"early_data", TLSEXT_TYPE_early_data}, | |
787 | {NULL} | |
788 | }; | |
789 | ||
790 | /* from rfc8446 4.2.3. + gost (https://tools.ietf.org/id/draft-smyshlyaev-tls12-gost-suites-04.html) */ | |
791 | static STRINT_PAIR signature_tls13_scheme_list[] = { | |
792 | {"rsa_pkcs1_sha1", 0x0201 /* TLSEXT_SIGALG_rsa_pkcs1_sha1 */}, | |
793 | {"ecdsa_sha1", 0x0203 /* TLSEXT_SIGALG_ecdsa_sha1 */}, | |
794 | /* {"rsa_pkcs1_sha224", 0x0301 TLSEXT_SIGALG_rsa_pkcs1_sha224}, not in rfc8446 */ | |
795 | /* {"ecdsa_sha224", 0x0303 TLSEXT_SIGALG_ecdsa_sha224} not in rfc8446 */ | |
796 | {"rsa_pkcs1_sha256", 0x0401 /* TLSEXT_SIGALG_rsa_pkcs1_sha256 */}, | |
797 | {"ecdsa_secp256r1_sha256", 0x0403 /* TLSEXT_SIGALG_ecdsa_secp256r1_sha256 */}, | |
798 | {"rsa_pkcs1_sha384", 0x0501 /* TLSEXT_SIGALG_rsa_pkcs1_sha384 */}, | |
799 | {"ecdsa_secp384r1_sha384", 0x0503 /* TLSEXT_SIGALG_ecdsa_secp384r1_sha384 */}, | |
800 | {"rsa_pkcs1_sha512", 0x0601 /* TLSEXT_SIGALG_rsa_pkcs1_sha512 */}, | |
801 | {"ecdsa_secp521r1_sha512", 0x0603 /* TLSEXT_SIGALG_ecdsa_secp521r1_sha512 */}, | |
802 | {"rsa_pss_rsae_sha256", 0x0804 /* TLSEXT_SIGALG_rsa_pss_rsae_sha256 */}, | |
803 | {"rsa_pss_rsae_sha384", 0x0805 /* TLSEXT_SIGALG_rsa_pss_rsae_sha384 */}, | |
804 | {"rsa_pss_rsae_sha512", 0x0806 /* TLSEXT_SIGALG_rsa_pss_rsae_sha512 */}, | |
805 | {"ed25519", 0x0807 /* TLSEXT_SIGALG_ed25519 */}, | |
806 | {"ed448", 0x0808 /* TLSEXT_SIGALG_ed448 */}, | |
807 | {"rsa_pss_pss_sha256", 0x0809 /* TLSEXT_SIGALG_rsa_pss_pss_sha256 */}, | |
808 | {"rsa_pss_pss_sha384", 0x080a /* TLSEXT_SIGALG_rsa_pss_pss_sha384 */}, | |
809 | {"rsa_pss_pss_sha512", 0x080b /* TLSEXT_SIGALG_rsa_pss_pss_sha512 */}, | |
810 | {"gostr34102001", 0xeded /* TLSEXT_SIGALG_gostr34102001_gostr3411 */}, | |
811 | {"gostr34102012_256", 0xeeee /* TLSEXT_SIGALG_gostr34102012_256_gostr34112012_256 */}, | |
812 | {"gostr34102012_512", 0xefef /* TLSEXT_SIGALG_gostr34102012_512_gostr34112012_512 */}, | |
813 | {NULL} | |
814 | }; | |
815 | ||
816 | /* from rfc5246 7.4.1.4.1. */ | |
817 | static STRINT_PAIR signature_tls12_alg_list[] = { | |
818 | {"anonymous", TLSEXT_signature_anonymous /* 0 */}, | |
819 | {"RSA", TLSEXT_signature_rsa /* 1 */}, | |
820 | {"DSA", TLSEXT_signature_dsa /* 2 */}, | |
821 | {"ECDSA", TLSEXT_signature_ecdsa /* 3 */}, | |
822 | {NULL} | |
823 | }; | |
824 | ||
825 | /* from rfc5246 7.4.1.4.1. */ | |
826 | static STRINT_PAIR signature_tls12_hash_list[] = { | |
827 | {"none", TLSEXT_hash_none /* 0 */}, | |
828 | {"MD5", TLSEXT_hash_md5 /* 1 */}, | |
829 | {"SHA1", TLSEXT_hash_sha1 /* 2 */}, | |
830 | {"SHA224", TLSEXT_hash_sha224 /* 3 */}, | |
831 | {"SHA256", TLSEXT_hash_sha256 /* 4 */}, | |
832 | {"SHA384", TLSEXT_hash_sha384 /* 5 */}, | |
833 | {"SHA512", TLSEXT_hash_sha512 /* 6 */}, | |
834 | {NULL} | |
835 | }; | |
836 | ||
837 | void tlsext_cb(SSL *s, int client_server, int type, | |
838 | const unsigned char *data, int len, void *arg) | |
839 | { | |
840 | BIO *bio = arg; | |
841 | const char *extname = lookup(type, tlsext_types, "unknown"); | |
842 | ||
843 | BIO_printf(bio, "TLS %s extension \"%s\" (id=%d), len=%d\n", | |
844 | client_server ? "server" : "client", extname, type, len); | |
845 | BIO_dump(bio, (const char *)data, len); | |
846 | (void)BIO_flush(bio); | |
847 | } | |
848 | ||
849 | #ifndef OPENSSL_NO_SOCK | |
850 | int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, | |
851 | size_t *cookie_len) | |
852 | { | |
853 | unsigned char *buffer = NULL; | |
854 | size_t length = 0; | |
855 | unsigned short port; | |
856 | BIO_ADDR *lpeer = NULL, *peer = NULL; | |
857 | int res = 0; | |
858 | ||
859 | /* Initialize a random secret */ | |
860 | if (!cookie_initialized) { | |
861 | if (RAND_bytes(cookie_secret, COOKIE_SECRET_LENGTH) <= 0) { | |
862 | BIO_printf(bio_err, "error setting random cookie secret\n"); | |
863 | return 0; | |
864 | } | |
865 | cookie_initialized = 1; | |
866 | } | |
867 | ||
868 | if (SSL_is_dtls(ssl)) { | |
869 | lpeer = peer = BIO_ADDR_new(); | |
870 | if (peer == NULL) { | |
871 | BIO_printf(bio_err, "memory full\n"); | |
872 | return 0; | |
873 | } | |
874 | ||
875 | /* Read peer information */ | |
876 | (void)BIO_dgram_get_peer(SSL_get_rbio(ssl), peer); | |
877 | } else { | |
878 | peer = ourpeer; | |
879 | } | |
880 | ||
881 | /* Create buffer with peer's address and port */ | |
882 | if (!BIO_ADDR_rawaddress(peer, NULL, &length)) { | |
883 | BIO_printf(bio_err, "Failed getting peer address\n"); | |
884 | BIO_ADDR_free(lpeer); | |
885 | return 0; | |
886 | } | |
887 | OPENSSL_assert(length != 0); | |
888 | port = BIO_ADDR_rawport(peer); | |
889 | length += sizeof(port); | |
890 | buffer = app_malloc(length, "cookie generate buffer"); | |
891 | ||
892 | memcpy(buffer, &port, sizeof(port)); | |
893 | BIO_ADDR_rawaddress(peer, buffer + sizeof(port), NULL); | |
894 | ||
895 | if (EVP_Q_mac(NULL, "HMAC", NULL, "SHA1", NULL, | |
896 | cookie_secret, COOKIE_SECRET_LENGTH, buffer, length, | |
897 | cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { | |
898 | BIO_printf(bio_err, | |
899 | "Error calculating HMAC-SHA1 of buffer with secret\n"); | |
900 | goto end; | |
901 | } | |
902 | res = 1; | |
903 | end: | |
904 | OPENSSL_free(buffer); | |
905 | BIO_ADDR_free(lpeer); | |
906 | ||
907 | return res; | |
908 | } | |
909 | ||
910 | int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, | |
911 | size_t cookie_len) | |
912 | { | |
913 | unsigned char result[EVP_MAX_MD_SIZE]; | |
914 | size_t resultlength; | |
915 | ||
916 | /* Note: we check cookie_initialized because if it's not, | |
917 | * it cannot be valid */ | |
918 | if (cookie_initialized | |
919 | && generate_stateless_cookie_callback(ssl, result, &resultlength) | |
920 | && cookie_len == resultlength | |
921 | && memcmp(result, cookie, resultlength) == 0) | |
922 | return 1; | |
923 | ||
924 | return 0; | |
925 | } | |
926 | ||
927 | int generate_cookie_callback(SSL *ssl, unsigned char *cookie, | |
928 | unsigned int *cookie_len) | |
929 | { | |
930 | size_t temp = 0; | |
931 | int res = generate_stateless_cookie_callback(ssl, cookie, &temp); | |
932 | ||
933 | if (res != 0) | |
934 | *cookie_len = (unsigned int)temp; | |
935 | return res; | |
936 | } | |
937 | ||
938 | int verify_cookie_callback(SSL *ssl, const unsigned char *cookie, | |
939 | unsigned int cookie_len) | |
940 | { | |
941 | return verify_stateless_cookie_callback(ssl, cookie, cookie_len); | |
942 | } | |
943 | ||
944 | #endif | |
945 | ||
946 | /* | |
947 | * Example of extended certificate handling. Where the standard support of | |
948 | * one certificate per algorithm is not sufficient an application can decide | |
949 | * which certificate(s) to use at runtime based on whatever criteria it deems | |
950 | * appropriate. | |
951 | */ | |
952 | ||
953 | /* Linked list of certificates, keys and chains */ | |
954 | struct ssl_excert_st { | |
955 | int certform; | |
956 | const char *certfile; | |
957 | int keyform; | |
958 | const char *keyfile; | |
959 | const char *chainfile; | |
960 | X509 *cert; | |
961 | EVP_PKEY *key; | |
962 | STACK_OF(X509) *chain; | |
963 | int build_chain; | |
964 | struct ssl_excert_st *next, *prev; | |
965 | }; | |
966 | ||
967 | static STRINT_PAIR chain_flags[] = { | |
968 | {"Overall Validity", CERT_PKEY_VALID}, | |
969 | {"Sign with EE key", CERT_PKEY_SIGN}, | |
970 | {"EE signature", CERT_PKEY_EE_SIGNATURE}, | |
971 | {"CA signature", CERT_PKEY_CA_SIGNATURE}, | |
972 | {"EE key parameters", CERT_PKEY_EE_PARAM}, | |
973 | {"CA key parameters", CERT_PKEY_CA_PARAM}, | |
974 | {"Explicitly sign with EE key", CERT_PKEY_EXPLICIT_SIGN}, | |
975 | {"Issuer Name", CERT_PKEY_ISSUER_NAME}, | |
976 | {"Certificate Type", CERT_PKEY_CERT_TYPE}, | |
977 | {NULL} | |
978 | }; | |
979 | ||
980 | static void print_chain_flags(SSL *s, int flags) | |
981 | { | |
982 | STRINT_PAIR *pp; | |
983 | ||
984 | for (pp = chain_flags; pp->name; ++pp) | |
985 | BIO_printf(bio_err, "\t%s: %s\n", | |
986 | pp->name, | |
987 | (flags & pp->retval) ? "OK" : "NOT OK"); | |
988 | BIO_printf(bio_err, "\tSuite B: "); | |
989 | if (SSL_set_cert_flags(s, 0) & SSL_CERT_FLAG_SUITEB_128_LOS) | |
990 | BIO_puts(bio_err, flags & CERT_PKEY_SUITEB ? "OK\n" : "NOT OK\n"); | |
991 | else | |
992 | BIO_printf(bio_err, "not tested\n"); | |
993 | } | |
994 | ||
995 | /* | |
996 | * Very basic selection callback: just use any certificate chain reported as | |
997 | * valid. More sophisticated could prioritise according to local policy. | |
998 | */ | |
999 | static int set_cert_cb(SSL *ssl, void *arg) | |
1000 | { | |
1001 | int i, rv; | |
1002 | SSL_EXCERT *exc = arg; | |
1003 | #ifdef CERT_CB_TEST_RETRY | |
1004 | static int retry_cnt; | |
1005 | ||
1006 | if (retry_cnt < 5) { | |
1007 | retry_cnt++; | |
1008 | BIO_printf(bio_err, | |
1009 | "Certificate callback retry test: count %d\n", | |
1010 | retry_cnt); | |
1011 | return -1; | |
1012 | } | |
1013 | #endif | |
1014 | SSL_certs_clear(ssl); | |
1015 | ||
1016 | if (exc == NULL) | |
1017 | return 1; | |
1018 | ||
1019 | /* | |
1020 | * Go to end of list and traverse backwards since we prepend newer | |
1021 | * entries this retains the original order. | |
1022 | */ | |
1023 | while (exc->next != NULL) | |
1024 | exc = exc->next; | |
1025 | ||
1026 | i = 0; | |
1027 | ||
1028 | while (exc != NULL) { | |
1029 | i++; | |
1030 | rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); | |
1031 | BIO_printf(bio_err, "Checking cert chain %d:\nSubject: ", i); | |
1032 | X509_NAME_print_ex(bio_err, X509_get_subject_name(exc->cert), 0, | |
1033 | get_nameopt()); | |
1034 | BIO_puts(bio_err, "\n"); | |
1035 | print_chain_flags(ssl, rv); | |
1036 | if (rv & CERT_PKEY_VALID) { | |
1037 | if (!SSL_use_certificate(ssl, exc->cert) | |
1038 | || !SSL_use_PrivateKey(ssl, exc->key)) { | |
1039 | return 0; | |
1040 | } | |
1041 | /* | |
1042 | * NB: we wouldn't normally do this as it is not efficient | |
1043 | * building chains on each connection better to cache the chain | |
1044 | * in advance. | |
1045 | */ | |
1046 | if (exc->build_chain) { | |
1047 | if (!SSL_build_cert_chain(ssl, 0)) | |
1048 | return 0; | |
1049 | } else if (exc->chain != NULL) { | |
1050 | if (!SSL_set1_chain(ssl, exc->chain)) | |
1051 | return 0; | |
1052 | } | |
1053 | } | |
1054 | exc = exc->prev; | |
1055 | } | |
1056 | return 1; | |
1057 | } | |
1058 | ||
1059 | void ssl_ctx_set_excert(SSL_CTX *ctx, SSL_EXCERT *exc) | |
1060 | { | |
1061 | SSL_CTX_set_cert_cb(ctx, set_cert_cb, exc); | |
1062 | } | |
1063 | ||
1064 | static int ssl_excert_prepend(SSL_EXCERT **pexc) | |
1065 | { | |
1066 | SSL_EXCERT *exc = app_malloc(sizeof(*exc), "prepend cert"); | |
1067 | ||
1068 | memset(exc, 0, sizeof(*exc)); | |
1069 | ||
1070 | exc->next = *pexc; | |
1071 | *pexc = exc; | |
1072 | ||
1073 | if (exc->next) { | |
1074 | exc->certform = exc->next->certform; | |
1075 | exc->keyform = exc->next->keyform; | |
1076 | exc->next->prev = exc; | |
1077 | } else { | |
1078 | exc->certform = FORMAT_PEM; | |
1079 | exc->keyform = FORMAT_PEM; | |
1080 | } | |
1081 | return 1; | |
1082 | ||
1083 | } | |
1084 | ||
1085 | void ssl_excert_free(SSL_EXCERT *exc) | |
1086 | { | |
1087 | SSL_EXCERT *curr; | |
1088 | ||
1089 | if (exc == NULL) | |
1090 | return; | |
1091 | while (exc) { | |
1092 | X509_free(exc->cert); | |
1093 | EVP_PKEY_free(exc->key); | |
1094 | OSSL_STACK_OF_X509_free(exc->chain); | |
1095 | curr = exc; | |
1096 | exc = exc->next; | |
1097 | OPENSSL_free(curr); | |
1098 | } | |
1099 | } | |
1100 | ||
1101 | int load_excert(SSL_EXCERT **pexc) | |
1102 | { | |
1103 | SSL_EXCERT *exc = *pexc; | |
1104 | ||
1105 | if (exc == NULL) | |
1106 | return 1; | |
1107 | /* If nothing in list, free and set to NULL */ | |
1108 | if (exc->certfile == NULL && exc->next == NULL) { | |
1109 | ssl_excert_free(exc); | |
1110 | *pexc = NULL; | |
1111 | return 1; | |
1112 | } | |
1113 | for (; exc; exc = exc->next) { | |
1114 | if (exc->certfile == NULL) { | |
1115 | BIO_printf(bio_err, "Missing filename\n"); | |
1116 | return 0; | |
1117 | } | |
1118 | exc->cert = load_cert(exc->certfile, exc->certform, | |
1119 | "Server Certificate"); | |
1120 | if (exc->cert == NULL) | |
1121 | return 0; | |
1122 | if (exc->keyfile != NULL) { | |
1123 | exc->key = load_key(exc->keyfile, exc->keyform, | |
1124 | 0, NULL, NULL, "server key"); | |
1125 | } else { | |
1126 | exc->key = load_key(exc->certfile, exc->certform, | |
1127 | 0, NULL, NULL, "server key"); | |
1128 | } | |
1129 | if (exc->key == NULL) | |
1130 | return 0; | |
1131 | if (exc->chainfile != NULL) { | |
1132 | if (!load_certs(exc->chainfile, 0, &exc->chain, NULL, "server chain")) | |
1133 | return 0; | |
1134 | } | |
1135 | } | |
1136 | return 1; | |
1137 | } | |
1138 | ||
1139 | enum range { OPT_X_ENUM }; | |
1140 | ||
1141 | int args_excert(int opt, SSL_EXCERT **pexc) | |
1142 | { | |
1143 | SSL_EXCERT *exc = *pexc; | |
1144 | ||
1145 | assert(opt > OPT_X__FIRST); | |
1146 | assert(opt < OPT_X__LAST); | |
1147 | ||
1148 | if (exc == NULL) { | |
1149 | if (!ssl_excert_prepend(&exc)) { | |
1150 | BIO_printf(bio_err, " %s: Error initialising xcert\n", | |
1151 | opt_getprog()); | |
1152 | goto err; | |
1153 | } | |
1154 | *pexc = exc; | |
1155 | } | |
1156 | ||
1157 | switch ((enum range)opt) { | |
1158 | case OPT_X__FIRST: | |
1159 | case OPT_X__LAST: | |
1160 | return 0; | |
1161 | case OPT_X_CERT: | |
1162 | if (exc->certfile != NULL && !ssl_excert_prepend(&exc)) { | |
1163 | BIO_printf(bio_err, "%s: Error adding xcert\n", opt_getprog()); | |
1164 | goto err; | |
1165 | } | |
1166 | *pexc = exc; | |
1167 | exc->certfile = opt_arg(); | |
1168 | break; | |
1169 | case OPT_X_KEY: | |
1170 | if (exc->keyfile != NULL) { | |
1171 | BIO_printf(bio_err, "%s: Key already specified\n", opt_getprog()); | |
1172 | goto err; | |
1173 | } | |
1174 | exc->keyfile = opt_arg(); | |
1175 | break; | |
1176 | case OPT_X_CHAIN: | |
1177 | if (exc->chainfile != NULL) { | |
1178 | BIO_printf(bio_err, "%s: Chain already specified\n", | |
1179 | opt_getprog()); | |
1180 | goto err; | |
1181 | } | |
1182 | exc->chainfile = opt_arg(); | |
1183 | break; | |
1184 | case OPT_X_CHAIN_BUILD: | |
1185 | exc->build_chain = 1; | |
1186 | break; | |
1187 | case OPT_X_CERTFORM: | |
1188 | if (!opt_format(opt_arg(), OPT_FMT_ANY, &exc->certform)) | |
1189 | return 0; | |
1190 | break; | |
1191 | case OPT_X_KEYFORM: | |
1192 | if (!opt_format(opt_arg(), OPT_FMT_ANY, &exc->keyform)) | |
1193 | return 0; | |
1194 | break; | |
1195 | } | |
1196 | return 1; | |
1197 | ||
1198 | err: | |
1199 | ERR_print_errors(bio_err); | |
1200 | ssl_excert_free(exc); | |
1201 | *pexc = NULL; | |
1202 | return 0; | |
1203 | } | |
1204 | ||
1205 | static void print_raw_cipherlist(SSL *s) | |
1206 | { | |
1207 | const unsigned char *rlist; | |
1208 | static const unsigned char scsv_id[] = { 0, 0xFF }; | |
1209 | size_t i, rlistlen, num; | |
1210 | ||
1211 | if (!SSL_is_server(s)) | |
1212 | return; | |
1213 | num = SSL_get0_raw_cipherlist(s, NULL); | |
1214 | OPENSSL_assert(num == 2); | |
1215 | rlistlen = SSL_get0_raw_cipherlist(s, &rlist); | |
1216 | BIO_puts(bio_err, "Client cipher list: "); | |
1217 | for (i = 0; i < rlistlen; i += num, rlist += num) { | |
1218 | const SSL_CIPHER *c = SSL_CIPHER_find(s, rlist); | |
1219 | if (i) | |
1220 | BIO_puts(bio_err, ":"); | |
1221 | if (c != NULL) { | |
1222 | BIO_puts(bio_err, SSL_CIPHER_get_name(c)); | |
1223 | } else if (memcmp(rlist, scsv_id, num) == 0) { | |
1224 | BIO_puts(bio_err, "SCSV"); | |
1225 | } else { | |
1226 | size_t j; | |
1227 | BIO_puts(bio_err, "0x"); | |
1228 | for (j = 0; j < num; j++) | |
1229 | BIO_printf(bio_err, "%02X", rlist[j]); | |
1230 | } | |
1231 | } | |
1232 | BIO_puts(bio_err, "\n"); | |
1233 | } | |
1234 | ||
1235 | /* | |
1236 | * Hex encoder for TLSA RRdata, not ':' delimited. | |
1237 | */ | |
1238 | static char *hexencode(const unsigned char *data, size_t len) | |
1239 | { | |
1240 | static const char *hex = "0123456789abcdef"; | |
1241 | char *out; | |
1242 | char *cp; | |
1243 | size_t outlen = 2 * len + 1; | |
1244 | int ilen = (int) outlen; | |
1245 | ||
1246 | if (outlen < len || ilen < 0 || outlen != (size_t)ilen) { | |
1247 | BIO_printf(bio_err, "%s: %zu-byte buffer too large to hexencode\n", | |
1248 | opt_getprog(), len); | |
1249 | exit(1); | |
1250 | } | |
1251 | cp = out = app_malloc(ilen, "TLSA hex data buffer"); | |
1252 | ||
1253 | while (len-- > 0) { | |
1254 | *cp++ = hex[(*data >> 4) & 0x0f]; | |
1255 | *cp++ = hex[*data++ & 0x0f]; | |
1256 | } | |
1257 | *cp = '\0'; | |
1258 | return out; | |
1259 | } | |
1260 | ||
1261 | void print_verify_detail(SSL *s, BIO *bio) | |
1262 | { | |
1263 | int mdpth; | |
1264 | EVP_PKEY *mspki = NULL; | |
1265 | long verify_err = SSL_get_verify_result(s); | |
1266 | ||
1267 | if (verify_err == X509_V_OK) { | |
1268 | const char *peername = SSL_get0_peername(s); | |
1269 | ||
1270 | BIO_printf(bio, "Verification: OK\n"); | |
1271 | if (peername != NULL) | |
1272 | BIO_printf(bio, "Verified peername: %s\n", peername); | |
1273 | } else { | |
1274 | const char *reason = X509_verify_cert_error_string(verify_err); | |
1275 | ||
1276 | BIO_printf(bio, "Verification error: %s\n", reason); | |
1277 | } | |
1278 | ||
1279 | if ((mdpth = SSL_get0_dane_authority(s, NULL, &mspki)) >= 0) { | |
1280 | uint8_t usage, selector, mtype; | |
1281 | const unsigned char *data = NULL; | |
1282 | size_t dlen = 0; | |
1283 | char *hexdata; | |
1284 | ||
1285 | mdpth = SSL_get0_dane_tlsa(s, &usage, &selector, &mtype, &data, &dlen); | |
1286 | ||
1287 | /* | |
1288 | * The TLSA data field can be quite long when it is a certificate, | |
1289 | * public key or even a SHA2-512 digest. Because the initial octets of | |
1290 | * ASN.1 certificates and public keys contain mostly boilerplate OIDs | |
1291 | * and lengths, we show the last 12 bytes of the data instead, as these | |
1292 | * are more likely to distinguish distinct TLSA records. | |
1293 | */ | |
1294 | #define TLSA_TAIL_SIZE 12 | |
1295 | if (dlen > TLSA_TAIL_SIZE) | |
1296 | hexdata = hexencode(data + dlen - TLSA_TAIL_SIZE, TLSA_TAIL_SIZE); | |
1297 | else | |
1298 | hexdata = hexencode(data, dlen); | |
1299 | BIO_printf(bio, "DANE TLSA %d %d %d %s%s ", | |
1300 | usage, selector, mtype, | |
1301 | (dlen > TLSA_TAIL_SIZE) ? "..." : "", hexdata); | |
1302 | if (SSL_get0_peer_rpk(s) == NULL) | |
1303 | BIO_printf(bio, "%s certificate at depth %d\n", | |
1304 | (mspki != NULL) ? "signed the peer" : | |
1305 | mdpth ? "matched the TA" : "matched the EE", mdpth); | |
1306 | else | |
1307 | BIO_printf(bio, "matched the peer raw public key\n"); | |
1308 | OPENSSL_free(hexdata); | |
1309 | } | |
1310 | } | |
1311 | ||
1312 | void print_ssl_summary(SSL *s) | |
1313 | { | |
1314 | const char *sigalg; | |
1315 | const SSL_CIPHER *c; | |
1316 | X509 *peer = SSL_get0_peer_certificate(s); | |
1317 | EVP_PKEY *peer_rpk = SSL_get0_peer_rpk(s); | |
1318 | int nid; | |
1319 | ||
1320 | BIO_printf(bio_err, "Protocol version: %s\n", SSL_get_version(s)); | |
1321 | print_raw_cipherlist(s); | |
1322 | c = SSL_get_current_cipher(s); | |
1323 | BIO_printf(bio_err, "Ciphersuite: %s\n", SSL_CIPHER_get_name(c)); | |
1324 | do_print_sigalgs(bio_err, s, 0); | |
1325 | if (peer != NULL) { | |
1326 | BIO_puts(bio_err, "Peer certificate: "); | |
1327 | X509_NAME_print_ex(bio_err, X509_get_subject_name(peer), | |
1328 | 0, get_nameopt()); | |
1329 | BIO_puts(bio_err, "\n"); | |
1330 | if (SSL_get_peer_signature_nid(s, &nid)) | |
1331 | BIO_printf(bio_err, "Hash used: %s\n", OBJ_nid2sn(nid)); | |
1332 | if (SSL_get0_peer_signature_name(s, &sigalg)) | |
1333 | BIO_printf(bio_err, "Signature type: %s\n", sigalg); | |
1334 | print_verify_detail(s, bio_err); | |
1335 | } else if (peer_rpk != NULL) { | |
1336 | BIO_printf(bio_err, "Peer used raw public key\n"); | |
1337 | if (SSL_get0_peer_signature_name(s, &sigalg)) | |
1338 | BIO_printf(bio_err, "Signature type: %s\n", sigalg); | |
1339 | print_verify_detail(s, bio_err); | |
1340 | } else { | |
1341 | BIO_puts(bio_err, "No peer certificate or raw public key\n"); | |
1342 | } | |
1343 | #ifndef OPENSSL_NO_EC | |
1344 | ssl_print_point_formats(bio_err, s); | |
1345 | if (SSL_is_server(s)) | |
1346 | ssl_print_groups(bio_err, s, 1); | |
1347 | #endif | |
1348 | ssl_print_tmp_key(bio_err, s); | |
1349 | } | |
1350 | ||
1351 | int config_ctx(SSL_CONF_CTX *cctx, STACK_OF(OPENSSL_STRING) *str, | |
1352 | SSL_CTX *ctx) | |
1353 | { | |
1354 | int i; | |
1355 | ||
1356 | SSL_CONF_CTX_set_ssl_ctx(cctx, ctx); | |
1357 | for (i = 0; i < sk_OPENSSL_STRING_num(str); i += 2) { | |
1358 | const char *flag = sk_OPENSSL_STRING_value(str, i); | |
1359 | const char *arg = sk_OPENSSL_STRING_value(str, i + 1); | |
1360 | ||
1361 | if (SSL_CONF_cmd(cctx, flag, arg) <= 0) { | |
1362 | BIO_printf(bio_err, "Call to SSL_CONF_cmd(%s, %s) failed\n", | |
1363 | flag, arg == NULL ? "<NULL>" : arg); | |
1364 | ERR_print_errors(bio_err); | |
1365 | return 0; | |
1366 | } | |
1367 | } | |
1368 | if (!SSL_CONF_CTX_finish(cctx)) { | |
1369 | BIO_puts(bio_err, "Error finishing context\n"); | |
1370 | ERR_print_errors(bio_err); | |
1371 | return 0; | |
1372 | } | |
1373 | return 1; | |
1374 | } | |
1375 | ||
1376 | static int add_crls_store(X509_STORE *st, STACK_OF(X509_CRL) *crls) | |
1377 | { | |
1378 | X509_CRL *crl; | |
1379 | int i, ret = 1; | |
1380 | ||
1381 | for (i = 0; i < sk_X509_CRL_num(crls); i++) { | |
1382 | crl = sk_X509_CRL_value(crls, i); | |
1383 | if (!X509_STORE_add_crl(st, crl)) | |
1384 | ret = 0; | |
1385 | } | |
1386 | return ret; | |
1387 | } | |
1388 | ||
1389 | int ssl_ctx_add_crls(SSL_CTX *ctx, STACK_OF(X509_CRL) *crls, int crl_download) | |
1390 | { | |
1391 | X509_STORE *st; | |
1392 | ||
1393 | st = SSL_CTX_get_cert_store(ctx); | |
1394 | add_crls_store(st, crls); | |
1395 | if (crl_download) | |
1396 | store_setup_crl_download(st); | |
1397 | return 1; | |
1398 | } | |
1399 | ||
1400 | int ssl_load_stores(SSL_CTX *ctx, | |
1401 | const char *vfyCApath, const char *vfyCAfile, | |
1402 | const char *vfyCAstore, | |
1403 | const char *chCApath, const char *chCAfile, | |
1404 | const char *chCAstore, | |
1405 | STACK_OF(X509_CRL) *crls, int crl_download) | |
1406 | { | |
1407 | X509_STORE *vfy = NULL, *ch = NULL; | |
1408 | int rv = 0; | |
1409 | ||
1410 | if (vfyCApath != NULL || vfyCAfile != NULL || vfyCAstore != NULL) { | |
1411 | vfy = X509_STORE_new(); | |
1412 | if (vfy == NULL) | |
1413 | goto err; | |
1414 | if (vfyCAfile != NULL && !X509_STORE_load_file(vfy, vfyCAfile)) | |
1415 | goto err; | |
1416 | if (vfyCApath != NULL && !X509_STORE_load_path(vfy, vfyCApath)) | |
1417 | goto err; | |
1418 | if (vfyCAstore != NULL && !X509_STORE_load_store(vfy, vfyCAstore)) | |
1419 | goto err; | |
1420 | add_crls_store(vfy, crls); | |
1421 | if (SSL_CTX_set1_verify_cert_store(ctx, vfy) == 0) | |
1422 | goto err; | |
1423 | if (crl_download) | |
1424 | store_setup_crl_download(vfy); | |
1425 | } | |
1426 | if (chCApath != NULL || chCAfile != NULL || chCAstore != NULL) { | |
1427 | ch = X509_STORE_new(); | |
1428 | if (ch == NULL) | |
1429 | goto err; | |
1430 | if (chCAfile != NULL && !X509_STORE_load_file(ch, chCAfile)) | |
1431 | goto err; | |
1432 | if (chCApath != NULL && !X509_STORE_load_path(ch, chCApath)) | |
1433 | goto err; | |
1434 | if (chCAstore != NULL && !X509_STORE_load_store(ch, chCAstore)) | |
1435 | goto err; | |
1436 | if (SSL_CTX_set1_chain_cert_store(ctx, ch) == 0) | |
1437 | goto err; | |
1438 | } | |
1439 | rv = 1; | |
1440 | err: | |
1441 | X509_STORE_free(vfy); | |
1442 | X509_STORE_free(ch); | |
1443 | return rv; | |
1444 | } | |
1445 | ||
1446 | /* Verbose print out of security callback */ | |
1447 | ||
1448 | typedef struct { | |
1449 | BIO *out; | |
1450 | int verbose; | |
1451 | int (*old_cb) (const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid, | |
1452 | void *other, void *ex); | |
1453 | } security_debug_ex; | |
1454 | ||
1455 | static STRINT_PAIR callback_types[] = { | |
1456 | {"Supported Ciphersuite", SSL_SECOP_CIPHER_SUPPORTED}, | |
1457 | {"Shared Ciphersuite", SSL_SECOP_CIPHER_SHARED}, | |
1458 | {"Check Ciphersuite", SSL_SECOP_CIPHER_CHECK}, | |
1459 | #ifndef OPENSSL_NO_DH | |
1460 | {"Temp DH key bits", SSL_SECOP_TMP_DH}, | |
1461 | #endif | |
1462 | {"Supported Curve", SSL_SECOP_CURVE_SUPPORTED}, | |
1463 | {"Shared Curve", SSL_SECOP_CURVE_SHARED}, | |
1464 | {"Check Curve", SSL_SECOP_CURVE_CHECK}, | |
1465 | {"Supported Signature Algorithm", SSL_SECOP_SIGALG_SUPPORTED}, | |
1466 | {"Shared Signature Algorithm", SSL_SECOP_SIGALG_SHARED}, | |
1467 | {"Check Signature Algorithm", SSL_SECOP_SIGALG_CHECK}, | |
1468 | {"Signature Algorithm mask", SSL_SECOP_SIGALG_MASK}, | |
1469 | {"Certificate chain EE key", SSL_SECOP_EE_KEY}, | |
1470 | {"Certificate chain CA key", SSL_SECOP_CA_KEY}, | |
1471 | {"Peer Chain EE key", SSL_SECOP_PEER_EE_KEY}, | |
1472 | {"Peer Chain CA key", SSL_SECOP_PEER_CA_KEY}, | |
1473 | {"Certificate chain CA digest", SSL_SECOP_CA_MD}, | |
1474 | {"Peer chain CA digest", SSL_SECOP_PEER_CA_MD}, | |
1475 | {"SSL compression", SSL_SECOP_COMPRESSION}, | |
1476 | {"Session ticket", SSL_SECOP_TICKET}, | |
1477 | {NULL} | |
1478 | }; | |
1479 | ||
1480 | static int security_callback_debug(const SSL *s, const SSL_CTX *ctx, | |
1481 | int op, int bits, int nid, | |
1482 | void *other, void *ex) | |
1483 | { | |
1484 | security_debug_ex *sdb = ex; | |
1485 | int rv, show_bits = 1, cert_md = 0; | |
1486 | const char *nm; | |
1487 | int show_nm; | |
1488 | ||
1489 | rv = sdb->old_cb(s, ctx, op, bits, nid, other, ex); | |
1490 | if (rv == 1 && sdb->verbose < 2) | |
1491 | return 1; | |
1492 | BIO_puts(sdb->out, "Security callback: "); | |
1493 | ||
1494 | nm = lookup(op, callback_types, NULL); | |
1495 | show_nm = nm != NULL; | |
1496 | switch (op) { | |
1497 | case SSL_SECOP_TICKET: | |
1498 | case SSL_SECOP_COMPRESSION: | |
1499 | show_bits = 0; | |
1500 | show_nm = 0; | |
1501 | break; | |
1502 | case SSL_SECOP_VERSION: | |
1503 | BIO_printf(sdb->out, "Version=%s", lookup(nid, ssl_versions, "???")); | |
1504 | show_bits = 0; | |
1505 | show_nm = 0; | |
1506 | break; | |
1507 | case SSL_SECOP_CA_MD: | |
1508 | case SSL_SECOP_PEER_CA_MD: | |
1509 | cert_md = 1; | |
1510 | break; | |
1511 | case SSL_SECOP_SIGALG_SUPPORTED: | |
1512 | case SSL_SECOP_SIGALG_SHARED: | |
1513 | case SSL_SECOP_SIGALG_CHECK: | |
1514 | case SSL_SECOP_SIGALG_MASK: | |
1515 | show_nm = 0; | |
1516 | break; | |
1517 | } | |
1518 | if (show_nm) | |
1519 | BIO_printf(sdb->out, "%s=", nm); | |
1520 | ||
1521 | switch (op & SSL_SECOP_OTHER_TYPE) { | |
1522 | ||
1523 | case SSL_SECOP_OTHER_CIPHER: | |
1524 | BIO_puts(sdb->out, SSL_CIPHER_get_name(other)); | |
1525 | break; | |
1526 | ||
1527 | #ifndef OPENSSL_NO_EC | |
1528 | case SSL_SECOP_OTHER_CURVE: | |
1529 | { | |
1530 | const char *cname; | |
1531 | cname = EC_curve_nid2nist(nid); | |
1532 | if (cname == NULL) | |
1533 | cname = OBJ_nid2sn(nid); | |
1534 | BIO_puts(sdb->out, cname); | |
1535 | } | |
1536 | break; | |
1537 | #endif | |
1538 | case SSL_SECOP_OTHER_CERT: | |
1539 | { | |
1540 | if (cert_md) { | |
1541 | int sig_nid = X509_get_signature_nid(other); | |
1542 | ||
1543 | BIO_puts(sdb->out, OBJ_nid2sn(sig_nid)); | |
1544 | } else { | |
1545 | EVP_PKEY *pkey = X509_get0_pubkey(other); | |
1546 | ||
1547 | if (pkey == NULL) { | |
1548 | BIO_printf(sdb->out, "Public key missing"); | |
1549 | } else { | |
1550 | const char *algname = ""; | |
1551 | ||
1552 | EVP_PKEY_asn1_get0_info(NULL, NULL, NULL, NULL, | |
1553 | &algname, EVP_PKEY_get0_asn1(pkey)); | |
1554 | BIO_printf(sdb->out, "%s, bits=%d", | |
1555 | algname, EVP_PKEY_get_bits(pkey)); | |
1556 | } | |
1557 | } | |
1558 | break; | |
1559 | } | |
1560 | case SSL_SECOP_OTHER_SIGALG: | |
1561 | { | |
1562 | const unsigned char *salg = other; | |
1563 | const char *sname = NULL; | |
1564 | int raw_sig_code = (salg[0] << 8) + salg[1]; /* always big endian (msb, lsb) */ | |
1565 | /* raw_sig_code: signature_scheme from tls1.3, or signature_and_hash from tls1.2 */ | |
1566 | ||
1567 | if (nm != NULL) | |
1568 | BIO_printf(sdb->out, "%s", nm); | |
1569 | else | |
1570 | BIO_printf(sdb->out, "s_cb.c:security_callback_debug op=0x%x", op); | |
1571 | ||
1572 | sname = lookup(raw_sig_code, signature_tls13_scheme_list, NULL); | |
1573 | if (sname != NULL) { | |
1574 | BIO_printf(sdb->out, " scheme=%s", sname); | |
1575 | } else { | |
1576 | int alg_code = salg[1]; | |
1577 | int hash_code = salg[0]; | |
1578 | const char *alg_str = lookup(alg_code, signature_tls12_alg_list, NULL); | |
1579 | const char *hash_str = lookup(hash_code, signature_tls12_hash_list, NULL); | |
1580 | ||
1581 | if (alg_str != NULL && hash_str != NULL) | |
1582 | BIO_printf(sdb->out, " digest=%s, algorithm=%s", hash_str, alg_str); | |
1583 | else | |
1584 | BIO_printf(sdb->out, " scheme=unknown(0x%04x)", raw_sig_code); | |
1585 | } | |
1586 | } | |
1587 | ||
1588 | } | |
1589 | ||
1590 | if (show_bits) | |
1591 | BIO_printf(sdb->out, ", security bits=%d", bits); | |
1592 | BIO_printf(sdb->out, ": %s\n", rv ? "yes" : "no"); | |
1593 | return rv; | |
1594 | } | |
1595 | ||
1596 | void ssl_ctx_security_debug(SSL_CTX *ctx, int verbose) | |
1597 | { | |
1598 | static security_debug_ex sdb; | |
1599 | ||
1600 | sdb.out = bio_err; | |
1601 | sdb.verbose = verbose; | |
1602 | sdb.old_cb = SSL_CTX_get_security_callback(ctx); | |
1603 | SSL_CTX_set_security_callback(ctx, security_callback_debug); | |
1604 | SSL_CTX_set0_security_ex_data(ctx, &sdb); | |
1605 | } | |
1606 | ||
1607 | static void keylog_callback(const SSL *ssl, const char *line) | |
1608 | { | |
1609 | if (bio_keylog == NULL) { | |
1610 | BIO_printf(bio_err, "Keylog callback is invoked without valid file!\n"); | |
1611 | return; | |
1612 | } | |
1613 | ||
1614 | /* | |
1615 | * There might be concurrent writers to the keylog file, so we must ensure | |
1616 | * that the given line is written at once. | |
1617 | */ | |
1618 | BIO_printf(bio_keylog, "%s\n", line); | |
1619 | (void)BIO_flush(bio_keylog); | |
1620 | } | |
1621 | ||
1622 | int set_keylog_file(SSL_CTX *ctx, const char *keylog_file) | |
1623 | { | |
1624 | /* Close any open files */ | |
1625 | BIO_free_all(bio_keylog); | |
1626 | bio_keylog = NULL; | |
1627 | ||
1628 | if (ctx == NULL || keylog_file == NULL) { | |
1629 | /* Keylogging is disabled, OK. */ | |
1630 | return 0; | |
1631 | } | |
1632 | ||
1633 | /* | |
1634 | * Append rather than write in order to allow concurrent modification. | |
1635 | * Furthermore, this preserves existing keylog files which is useful when | |
1636 | * the tool is run multiple times. | |
1637 | */ | |
1638 | bio_keylog = BIO_new_file(keylog_file, "a"); | |
1639 | if (bio_keylog == NULL) { | |
1640 | BIO_printf(bio_err, "Error writing keylog file %s\n", keylog_file); | |
1641 | return 1; | |
1642 | } | |
1643 | ||
1644 | /* Write a header for seekable, empty files (this excludes pipes). */ | |
1645 | if (BIO_tell(bio_keylog) == 0) { | |
1646 | BIO_puts(bio_keylog, | |
1647 | "# SSL/TLS secrets log file, generated by OpenSSL\n"); | |
1648 | (void)BIO_flush(bio_keylog); | |
1649 | } | |
1650 | SSL_CTX_set_keylog_callback(ctx, keylog_callback); | |
1651 | return 0; | |
1652 | } | |
1653 | ||
1654 | void print_ca_names(BIO *bio, SSL *s) | |
1655 | { | |
1656 | const char *cs = SSL_is_server(s) ? "server" : "client"; | |
1657 | const STACK_OF(X509_NAME) *sk = SSL_get0_peer_CA_list(s); | |
1658 | int i; | |
1659 | ||
1660 | if (sk == NULL || sk_X509_NAME_num(sk) == 0) { | |
1661 | if (!SSL_is_server(s)) | |
1662 | BIO_printf(bio, "---\nNo %s certificate CA names sent\n", cs); | |
1663 | return; | |
1664 | } | |
1665 | ||
1666 | BIO_printf(bio, "---\nAcceptable %s certificate CA names\n", cs); | |
1667 | for (i = 0; i < sk_X509_NAME_num(sk); i++) { | |
1668 | X509_NAME_print_ex(bio, sk_X509_NAME_value(sk, i), 0, get_nameopt()); | |
1669 | BIO_write(bio, "\n", 1); | |
1670 | } | |
1671 | } | |
1672 | ||
1673 | void ssl_print_secure_renegotiation_notes(BIO *bio, SSL *s) | |
1674 | { | |
1675 | if (SSL_VERSION_ALLOWS_RENEGOTIATION(s)) { | |
1676 | BIO_printf(bio, "Secure Renegotiation IS%s supported\n", | |
1677 | SSL_get_secure_renegotiation_support(s) ? "" : " NOT"); | |
1678 | } else { | |
1679 | BIO_printf(bio, "This TLS version forbids renegotiation.\n"); | |
1680 | } | |
1681 | } | |
1682 | ||
1683 | int progress_cb(EVP_PKEY_CTX *ctx) | |
1684 | { | |
1685 | BIO *b = EVP_PKEY_CTX_get_app_data(ctx); | |
1686 | int p = EVP_PKEY_CTX_get_keygen_info(ctx, 0); | |
1687 | static const char symbols[] = ".+*\n"; | |
1688 | char c = (p >= 0 && (size_t)p <= sizeof(symbols) - 1) ? symbols[p] : '?'; | |
1689 | ||
1690 | BIO_write(b, &c, 1); | |
1691 | (void)BIO_flush(b); | |
1692 | return 1; | |
1693 | } |