2 /* ====================================================================
3 * Copyright (c) 2014 The OpenSSL Project. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in
14 * the documentation and/or other materials provided with the
17 * 3. All advertising materials mentioning features or use of this
18 * software must display the following acknowledgment:
19 * "This product includes software developed by the OpenSSL Project
20 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
23 * endorse or promote products derived from this software without
24 * prior written permission. For written permission, please contact
25 * openssl-core@openssl.org.
27 * 5. Products derived from this software may not be called "OpenSSL"
28 * nor may "OpenSSL" appear in their names without prior written
29 * permission of the OpenSSL Project.
31 * 6. Redistributions of any form whatsoever must retain the following
33 * "This product includes software developed by the OpenSSL Project
34 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
47 * OF THE POSSIBILITY OF SUCH DAMAGE.
48 * ====================================================================
50 * This product includes cryptographic software written by Eric Young
51 * (eay@cryptsoft.com). This product includes software written by Tim
52 * Hudson (tjh@cryptsoft.com).
56 /* Custom extension utility functions */
60 #ifndef OPENSSL_NO_TLSEXT
62 /* Find a custom extension from the list. */
63 static custom_ext_method
*custom_ext_find(custom_ext_methods
*exts
,
64 unsigned int ext_type
)
67 custom_ext_method
*meth
= exts
->meths
;
68 for (i
= 0; i
< exts
->meths_count
; i
++, meth
++) {
69 if (ext_type
== meth
->ext_type
)
76 * Initialise custom extensions flags to indicate neither sent nor received.
78 void custom_ext_init(custom_ext_methods
*exts
)
81 custom_ext_method
*meth
= exts
->meths
;
82 for (i
= 0; i
< exts
->meths_count
; i
++, meth
++)
86 /* Pass received custom extension data to the application for parsing. */
87 int custom_ext_parse(SSL
*s
, int server
,
88 unsigned int ext_type
,
89 const unsigned char *ext_data
, size_t ext_size
, int *al
)
91 custom_ext_methods
*exts
= server
? &s
->cert
->srv_ext
: &s
->cert
->cli_ext
;
92 custom_ext_method
*meth
;
93 meth
= custom_ext_find(exts
, ext_type
);
94 /* If not found return success */
99 * If it's ServerHello we can't have any extensions not sent in
102 if (!(meth
->ext_flags
& SSL_EXT_FLAG_SENT
)) {
103 *al
= TLS1_AD_UNSUPPORTED_EXTENSION
;
107 /* If already present it's a duplicate */
108 if (meth
->ext_flags
& SSL_EXT_FLAG_RECEIVED
) {
109 *al
= TLS1_AD_DECODE_ERROR
;
112 meth
->ext_flags
|= SSL_EXT_FLAG_RECEIVED
;
113 /* If no parse function set return success */
117 return meth
->parse_cb(s
, ext_type
, ext_data
, ext_size
, al
,
122 * Request custom extension data from the application and add to the return
125 int custom_ext_add(SSL
*s
, int server
,
126 unsigned char **pret
, unsigned char *limit
, int *al
)
128 custom_ext_methods
*exts
= server
? &s
->cert
->srv_ext
: &s
->cert
->cli_ext
;
129 custom_ext_method
*meth
;
130 unsigned char *ret
= *pret
;
133 for (i
= 0; i
< exts
->meths_count
; i
++) {
134 const unsigned char *out
= NULL
;
136 meth
= exts
->meths
+ i
;
140 * For ServerHello only send extensions present in ClientHello.
142 if (!(meth
->ext_flags
& SSL_EXT_FLAG_RECEIVED
))
144 /* If callback absent for server skip it */
150 cb_retval
= meth
->add_cb(s
, meth
->ext_type
,
151 &out
, &outlen
, al
, meth
->add_arg
);
153 return 0; /* error */
155 continue; /* skip this extension */
157 if (4 > limit
- ret
|| outlen
> (size_t)(limit
- ret
- 4))
159 s2n(meth
->ext_type
, ret
);
162 memcpy(ret
, out
, outlen
);
166 * We can't send duplicates: code logic should prevent this.
168 OPENSSL_assert(!(meth
->ext_flags
& SSL_EXT_FLAG_SENT
));
170 * Indicate extension has been sent: this is both a sanity check to
171 * ensure we don't send duplicate extensions and indicates that it is
172 * not an error if the extension is present in ServerHello.
174 meth
->ext_flags
|= SSL_EXT_FLAG_SENT
;
176 meth
->free_cb(s
, meth
->ext_type
, out
, meth
->add_arg
);
182 /* Copy the flags from src to dst for any extensions that exist in both */
183 int custom_exts_copy_flags(custom_ext_methods
*dst
,
184 const custom_ext_methods
*src
)
187 custom_ext_method
*methsrc
= src
->meths
;
189 for (i
= 0; i
< src
->meths_count
; i
++, methsrc
++) {
190 custom_ext_method
*methdst
= custom_ext_find(dst
, methsrc
->ext_type
);
195 methdst
->ext_flags
= methsrc
->ext_flags
;
201 /* Copy table of custom extensions */
202 int custom_exts_copy(custom_ext_methods
*dst
, const custom_ext_methods
*src
)
204 if (src
->meths_count
) {
206 BUF_memdup(src
->meths
,
207 sizeof(custom_ext_method
) * src
->meths_count
);
208 if (dst
->meths
== NULL
)
210 dst
->meths_count
= src
->meths_count
;
215 void custom_exts_free(custom_ext_methods
*exts
)
218 OPENSSL_free(exts
->meths
);
221 /* Set callbacks for a custom extension. */
222 static int custom_ext_meth_add(custom_ext_methods
*exts
,
223 unsigned int ext_type
,
224 custom_ext_add_cb add_cb
,
225 custom_ext_free_cb free_cb
,
227 custom_ext_parse_cb parse_cb
, void *parse_arg
)
229 custom_ext_method
*meth
;
231 * Check application error: if add_cb is not set free_cb will never be
234 if (!add_cb
&& free_cb
)
236 /* Don't add if extension supported internally. */
237 if (SSL_extension_supported(ext_type
))
239 /* Extension type must fit in 16 bits */
240 if (ext_type
> 0xffff)
242 /* Search for duplicate */
243 if (custom_ext_find(exts
, ext_type
))
245 meth
= OPENSSL_realloc(exts
->meths
,
246 (exts
->meths_count
+ 1)
247 * sizeof(custom_ext_method
));
252 meth
+= exts
->meths_count
;
253 memset(meth
, 0, sizeof(custom_ext_method
));
254 meth
->parse_cb
= parse_cb
;
255 meth
->add_cb
= add_cb
;
256 meth
->free_cb
= free_cb
;
257 meth
->ext_type
= ext_type
;
258 meth
->add_arg
= add_arg
;
259 meth
->parse_arg
= parse_arg
;
264 /* Application level functions to add custom extension callbacks */
265 int SSL_CTX_add_client_custom_ext(SSL_CTX
*ctx
, unsigned int ext_type
,
266 custom_ext_add_cb add_cb
,
267 custom_ext_free_cb free_cb
,
269 custom_ext_parse_cb parse_cb
,
272 return custom_ext_meth_add(&ctx
->cert
->cli_ext
, ext_type
,
273 add_cb
, free_cb
, add_arg
, parse_cb
, parse_arg
);
276 int SSL_CTX_add_server_custom_ext(SSL_CTX
*ctx
, unsigned int ext_type
,
277 custom_ext_add_cb add_cb
,
278 custom_ext_free_cb free_cb
,
280 custom_ext_parse_cb parse_cb
,
283 return custom_ext_meth_add(&ctx
->cert
->srv_ext
, ext_type
,
284 add_cb
, free_cb
, add_arg
, parse_cb
, parse_arg
);
287 int SSL_extension_supported(unsigned int ext_type
)
290 /* Internally supported extensions. */
291 case TLSEXT_TYPE_application_layer_protocol_negotiation
:
292 case TLSEXT_TYPE_ec_point_formats
:
293 case TLSEXT_TYPE_elliptic_curves
:
294 case TLSEXT_TYPE_heartbeat
:
295 # ifndef OPENSSL_NO_NEXTPROTONEG
296 case TLSEXT_TYPE_next_proto_neg
:
298 case TLSEXT_TYPE_padding
:
299 case TLSEXT_TYPE_renegotiate
:
300 case TLSEXT_TYPE_server_name
:
301 case TLSEXT_TYPE_session_ticket
:
302 case TLSEXT_TYPE_signature_algorithms
:
303 case TLSEXT_TYPE_srp
:
304 case TLSEXT_TYPE_status_request
:
305 case TLSEXT_TYPE_use_srtp
:
306 # ifdef TLSEXT_TYPE_opaque_prf_input
307 case TLSEXT_TYPE_opaque_prf_input
:
309 # ifdef TLSEXT_TYPE_encrypt_then_mac
310 case TLSEXT_TYPE_encrypt_then_mac
: