extensions_clnt.c 53.9 KB
Newer Older
1
/*
2
 * Copyright 2016-2017 The OpenSSL Project Authors. All Rights Reserved.
3 4 5 6 7 8 9
 *
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
 */

10
#include <openssl/ocsp.h>
11
#include "../ssl_locl.h"
M
Matt Caswell 已提交
12
#include "internal/cryptlib.h"
13 14
#include "statem_locl.h"

15 16 17
EXT_RETURN tls_construct_ctos_renegotiate(SSL *s, WPACKET *pkt,
                                          unsigned int context, X509 *x,
                                          size_t chainidx, int *al)
18 19 20
{
    /* Add RI if renegotiating */
    if (!s->renegotiate)
21
        return EXT_RETURN_NOT_SENT;
22 23 24 25 26 27

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_renegotiate)
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_sub_memcpy_u8(pkt, s->s3->previous_client_finished,
                               s->s3->previous_client_finished_len)
            || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
28
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_RENEGOTIATE, ERR_R_INTERNAL_ERROR);
29
        return EXT_RETURN_FAIL;
30 31
    }

32
    return EXT_RETURN_SENT;
33 34
}

35 36 37
EXT_RETURN tls_construct_ctos_server_name(SSL *s, WPACKET *pkt,
                                          unsigned int context, X509 *x,
                                          size_t chainidx, int *al)
38
{
R
Rich Salz 已提交
39
    if (s->ext.hostname == NULL)
40
        return EXT_RETURN_NOT_SENT;
41 42 43 44 45 46 47 48

    /* Add TLS extension servername to the Client Hello message */
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_server_name)
               /* Sub-packet for server_name extension */
            || !WPACKET_start_sub_packet_u16(pkt)
               /* Sub-packet for servername list (always 1 hostname)*/
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_put_bytes_u8(pkt, TLSEXT_NAMETYPE_host_name)
R
Rich Salz 已提交
49 50
            || !WPACKET_sub_memcpy_u16(pkt, s->ext.hostname,
                                       strlen(s->ext.hostname))
51 52
            || !WPACKET_close(pkt)
            || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
53
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SERVER_NAME, ERR_R_INTERNAL_ERROR);
54
        return EXT_RETURN_FAIL;
55 56
    }

57
    return EXT_RETURN_SENT;
58 59 60
}

#ifndef OPENSSL_NO_SRP
61 62
EXT_RETURN tls_construct_ctos_srp(SSL *s, WPACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
63 64 65
{
    /* Add SRP username if there is one */
    if (s->srp_ctx.login == NULL)
66
        return EXT_RETURN_NOT_SENT;
67 68 69 70 71 72 73 74 75 76 77

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_srp)
               /* Sub-packet for SRP extension */
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_start_sub_packet_u8(pkt)
               /* login must not be zero...internal error if so */
            || !WPACKET_set_flags(pkt, WPACKET_FLAGS_NON_ZERO_LENGTH)
            || !WPACKET_memcpy(pkt, s->srp_ctx.login,
                               strlen(s->srp_ctx.login))
            || !WPACKET_close(pkt)
            || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
78
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SRP, ERR_R_INTERNAL_ERROR);
79
        return EXT_RETURN_FAIL;
80 81
    }

82
    return EXT_RETURN_SENT;
83 84 85 86 87 88
}
#endif

#ifndef OPENSSL_NO_EC
static int use_ecc(SSL *s)
{
89
    int i, end;
90 91 92 93 94 95 96 97
    unsigned long alg_k, alg_a;
    STACK_OF(SSL_CIPHER) *cipher_stack = NULL;

    /* See if we support any ECC ciphersuites */
    if (s->version == SSL3_VERSION)
        return 0;

    cipher_stack = SSL_get_ciphers(s);
98 99
    end = sk_SSL_CIPHER_num(cipher_stack);
    for (i = 0; i < end; i++) {
100 101 102 103 104
        const SSL_CIPHER *c = sk_SSL_CIPHER_value(cipher_stack, i);

        alg_k = c->algorithm_mkey;
        alg_a = c->algorithm_auth;
        if ((alg_k & (SSL_kECDHE | SSL_kECDHEPSK))
105 106
                || (alg_a & SSL_aECDSA)
                || c->min_tls >= TLS1_3_VERSION)
B
Benjamin Kaduk 已提交
107
            return 1;
108 109
    }

B
Benjamin Kaduk 已提交
110
    return 0;
111 112
}

113 114 115
EXT_RETURN tls_construct_ctos_ec_pt_formats(SSL *s, WPACKET *pkt,
                                            unsigned int context, X509 *x,
                                            size_t chainidx, int *al)
116 117 118 119 120
{
    const unsigned char *pformats;
    size_t num_formats;

    if (!use_ecc(s))
121
        return EXT_RETURN_NOT_SENT;
122 123 124 125 126 127 128 129 130

    /* Add TLS extension ECPointFormats to the ClientHello message */
    tls1_get_formatlist(s, &pformats, &num_formats);

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_ec_point_formats)
               /* Sub-packet for formats extension */
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_sub_memcpy_u8(pkt, pformats, num_formats)
            || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
131
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EC_PT_FORMATS, ERR_R_INTERNAL_ERROR);
132
        return EXT_RETURN_FAIL;
133 134
    }

135
    return EXT_RETURN_SENT;
136 137
}

138 139 140
EXT_RETURN tls_construct_ctos_supported_groups(SSL *s, WPACKET *pkt,
                                               unsigned int context, X509 *x,
                                               size_t chainidx, int *al)
141
{
D
Dr. Stephen Henson 已提交
142
    const uint16_t *pcurves = NULL;
143 144 145
    size_t num_curves = 0, i;

    if (!use_ecc(s))
146
        return EXT_RETURN_NOT_SENT;
147 148 149 150 151

    /*
     * Add TLS extension supported_groups to the ClientHello message
     */
    /* TODO(TLS1.3): Add support for DHE groups */
D
Dr. Stephen Henson 已提交
152
    tls1_get_grouplist(s, 0, &pcurves, &num_curves);
153 154 155 156 157

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_groups)
               /* Sub-packet for supported_groups extension */
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_start_sub_packet_u16(pkt)) {
M
Matt Caswell 已提交
158
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_GROUPS,
159
               ERR_R_INTERNAL_ERROR);
160
        return EXT_RETURN_FAIL;
161 162
    }
    /* Copy curve ID if supported */
D
Dr. Stephen Henson 已提交
163 164 165 166 167
    for (i = 0; i < num_curves; i++) {
        uint16_t ctmp = pcurves[i];

        if (tls_curve_allowed(s, ctmp, SSL_SECOP_CURVE_SUPPORTED)) {
            if (!WPACKET_put_bytes_u16(pkt, ctmp)) {
M
Matt Caswell 已提交
168
                    SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_GROUPS,
169
                           ERR_R_INTERNAL_ERROR);
170
                    return EXT_RETURN_FAIL;
171 172 173 174
                }
        }
    }
    if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
175
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_GROUPS,
176
               ERR_R_INTERNAL_ERROR);
177
        return EXT_RETURN_FAIL;
178 179
    }

180
    return EXT_RETURN_SENT;
181 182 183
}
#endif

184 185 186
EXT_RETURN tls_construct_ctos_session_ticket(SSL *s, WPACKET *pkt,
                                             unsigned int context, X509 *x,
                                             size_t chainidx, int *al)
187 188 189 190
{
    size_t ticklen;

    if (!tls_use_ticket(s))
191
        return EXT_RETURN_NOT_SENT;
192 193

    if (!s->new_session && s->session != NULL
194 195
            && s->session->ext.tick != NULL
            && s->session->ssl_version != TLS1_3_VERSION) {
R
Rich Salz 已提交
196 197 198 199 200 201
        ticklen = s->session->ext.ticklen;
    } else if (s->session && s->ext.session_ticket != NULL
               && s->ext.session_ticket->data != NULL) {
        ticklen = s->ext.session_ticket->length;
        s->session->ext.tick = OPENSSL_malloc(ticklen);
        if (s->session->ext.tick == NULL) {
M
Matt Caswell 已提交
202
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SESSION_TICKET,
203
                   ERR_R_INTERNAL_ERROR);
204
            return EXT_RETURN_FAIL;
205
        }
R
Rich Salz 已提交
206 207 208
        memcpy(s->session->ext.tick,
               s->ext.session_ticket->data, ticklen);
        s->session->ext.ticklen = ticklen;
209 210 211 212
    } else {
        ticklen = 0;
    }

R
Rich Salz 已提交
213 214
    if (ticklen == 0 && s->ext.session_ticket != NULL &&
            s->ext.session_ticket->data == NULL)
215
        return EXT_RETURN_NOT_SENT;
216 217

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_session_ticket)
R
Rich Salz 已提交
218
            || !WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick, ticklen)) {
M
Matt Caswell 已提交
219
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SESSION_TICKET, ERR_R_INTERNAL_ERROR);
220
        return EXT_RETURN_FAIL;
221 222
    }

223
    return EXT_RETURN_SENT;
224 225
}

226 227 228
EXT_RETURN tls_construct_ctos_sig_algs(SSL *s, WPACKET *pkt,
                                       unsigned int context, X509 *x,
                                       size_t chainidx, int *al)
229 230
{
    size_t salglen;
231
    const uint16_t *salg;
232 233

    if (!SSL_CLIENT_USE_SIGALGS(s))
234
        return EXT_RETURN_NOT_SENT;
235

236
    salglen = tls12_get_psigalgs(s, 1, &salg);
237 238 239 240 241 242 243 244
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_signature_algorithms)
               /* Sub-packet for sig-algs extension */
            || !WPACKET_start_sub_packet_u16(pkt)
               /* Sub-packet for the actual list */
            || !WPACKET_start_sub_packet_u16(pkt)
            || !tls12_copy_sigalgs(s, pkt, salg, salglen)
            || !WPACKET_close(pkt)
            || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
245
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SIG_ALGS, ERR_R_INTERNAL_ERROR);
246
        return EXT_RETURN_FAIL;
247 248
    }

249
    return EXT_RETURN_SENT;
250 251 252
}

#ifndef OPENSSL_NO_OCSP
253 254 255
EXT_RETURN tls_construct_ctos_status_request(SSL *s, WPACKET *pkt,
                                             unsigned int context, X509 *x,
                                             size_t chainidx, int *al)
256 257 258
{
    int i;

259 260
    /* This extension isn't defined for client Certificates */
    if (x != NULL)
261
        return EXT_RETURN_NOT_SENT;
262

R
Rich Salz 已提交
263
    if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp)
264
        return EXT_RETURN_NOT_SENT;
265 266 267 268 269 270 271

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_status_request)
               /* Sub-packet for status request extension */
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_put_bytes_u8(pkt, TLSEXT_STATUSTYPE_ocsp)
               /* Sub-packet for the ids */
            || !WPACKET_start_sub_packet_u16(pkt)) {
M
Matt Caswell 已提交
272
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST, ERR_R_INTERNAL_ERROR);
273
        return EXT_RETURN_FAIL;
274
    }
R
Rich Salz 已提交
275
    for (i = 0; i < sk_OCSP_RESPID_num(s->ext.ocsp.ids); i++) {
276
        unsigned char *idbytes;
R
Rich Salz 已提交
277
        OCSP_RESPID *id = sk_OCSP_RESPID_value(s->ext.ocsp.ids, i);
278
        int idlen = i2d_OCSP_RESPID(id, NULL);
279 280 281 282 283

        if (idlen <= 0
                   /* Sub-packet for an individual id */
                || !WPACKET_sub_allocate_bytes_u16(pkt, idlen, &idbytes)
                || i2d_OCSP_RESPID(id, &idbytes) != idlen) {
M
Matt Caswell 已提交
284
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST,
285
                   ERR_R_INTERNAL_ERROR);
286
            return EXT_RETURN_FAIL;
287 288 289 290
        }
    }
    if (!WPACKET_close(pkt)
            || !WPACKET_start_sub_packet_u16(pkt)) {
M
Matt Caswell 已提交
291
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST, ERR_R_INTERNAL_ERROR);
292
        return EXT_RETURN_FAIL;
293
    }
R
Rich Salz 已提交
294
    if (s->ext.ocsp.exts) {
295
        unsigned char *extbytes;
R
Rich Salz 已提交
296
        int extlen = i2d_X509_EXTENSIONS(s->ext.ocsp.exts, NULL);
297 298

        if (extlen < 0) {
M
Matt Caswell 已提交
299
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST,
300
                   ERR_R_INTERNAL_ERROR);
301
            return EXT_RETURN_FAIL;
302 303
        }
        if (!WPACKET_allocate_bytes(pkt, extlen, &extbytes)
R
Rich Salz 已提交
304
                || i2d_X509_EXTENSIONS(s->ext.ocsp.exts, &extbytes)
305
                   != extlen) {
M
Matt Caswell 已提交
306
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST,
307
                   ERR_R_INTERNAL_ERROR);
308
            return EXT_RETURN_FAIL;
309 310 311
       }
    }
    if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
312
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_STATUS_REQUEST, ERR_R_INTERNAL_ERROR);
313
        return EXT_RETURN_FAIL;
314 315
    }

316
    return EXT_RETURN_SENT;
317 318 319 320
}
#endif

#ifndef OPENSSL_NO_NEXTPROTONEG
321 322
EXT_RETURN tls_construct_ctos_npn(SSL *s, WPACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
323
{
324
    if (s->ctx->ext.npn_select_cb == NULL || !SSL_IS_FIRST_HANDSHAKE(s))
325
        return EXT_RETURN_NOT_SENT;
326 327 328 329 330 331 332

    /*
     * The client advertises an empty extension to indicate its support
     * for Next Protocol Negotiation
     */
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_next_proto_neg)
            || !WPACKET_put_bytes_u16(pkt, 0)) {
M
Matt Caswell 已提交
333
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_NPN, ERR_R_INTERNAL_ERROR);
334
        return EXT_RETURN_FAIL;
335 336
    }

337
    return EXT_RETURN_SENT;
338 339 340
}
#endif

341 342
EXT_RETURN tls_construct_ctos_alpn(SSL *s, WPACKET *pkt, unsigned int context,
                                   X509 *x, size_t chainidx, int *al)
343 344 345
{
    s->s3->alpn_sent = 0;

346
    if (s->ext.alpn == NULL || !SSL_IS_FIRST_HANDSHAKE(s))
347
        return EXT_RETURN_NOT_SENT;
348 349 350 351 352

    if (!WPACKET_put_bytes_u16(pkt,
                TLSEXT_TYPE_application_layer_protocol_negotiation)
               /* Sub-packet ALPN extension */
            || !WPACKET_start_sub_packet_u16(pkt)
R
Rich Salz 已提交
353
            || !WPACKET_sub_memcpy_u16(pkt, s->ext.alpn, s->ext.alpn_len)
354
            || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
355
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_ALPN, ERR_R_INTERNAL_ERROR);
356
        return EXT_RETURN_FAIL;
357 358 359
    }
    s->s3->alpn_sent = 1;

360
    return EXT_RETURN_SENT;
361 362 363 364
}


#ifndef OPENSSL_NO_SRTP
365 366 367
EXT_RETURN tls_construct_ctos_use_srtp(SSL *s, WPACKET *pkt,
                                       unsigned int context, X509 *x,
                                       size_t chainidx, int *al)
368 369
{
    STACK_OF(SRTP_PROTECTION_PROFILE) *clnt = SSL_get_srtp_profiles(s);
370
    int i, end;
371 372

    if (clnt == NULL)
373
        return EXT_RETURN_NOT_SENT;
374 375 376 377 378 379

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_use_srtp)
               /* Sub-packet for SRTP extension */
            || !WPACKET_start_sub_packet_u16(pkt)
               /* Sub-packet for the protection profile list */
            || !WPACKET_start_sub_packet_u16(pkt)) {
M
Matt Caswell 已提交
380
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_USE_SRTP, ERR_R_INTERNAL_ERROR);
381
        return EXT_RETURN_FAIL;
382
    }
383 384 385 386 387 388

    end = sk_SRTP_PROTECTION_PROFILE_num(clnt);
    for (i = 0; i < end; i++) {
        const SRTP_PROTECTION_PROFILE *prof =
            sk_SRTP_PROTECTION_PROFILE_value(clnt, i);

389
        if (prof == NULL || !WPACKET_put_bytes_u16(pkt, prof->id)) {
M
Matt Caswell 已提交
390
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_USE_SRTP, ERR_R_INTERNAL_ERROR);
391
            return EXT_RETURN_FAIL;
392 393 394 395 396 397
        }
    }
    if (!WPACKET_close(pkt)
               /* Add an empty use_mki value */
            || !WPACKET_put_bytes_u8(pkt, 0)
            || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
398
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_USE_SRTP, ERR_R_INTERNAL_ERROR);
399
        return EXT_RETURN_FAIL;
400 401
    }

402
    return EXT_RETURN_SENT;
403 404 405
}
#endif

406 407
EXT_RETURN tls_construct_ctos_etm(SSL *s, WPACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
408 409
{
    if (s->options & SSL_OP_NO_ENCRYPT_THEN_MAC)
410
        return EXT_RETURN_NOT_SENT;
411 412 413

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_encrypt_then_mac)
            || !WPACKET_put_bytes_u16(pkt, 0)) {
M
Matt Caswell 已提交
414
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_ETM, ERR_R_INTERNAL_ERROR);
415
        return EXT_RETURN_FAIL;
416 417
    }

418
    return EXT_RETURN_SENT;
419 420 421
}

#ifndef OPENSSL_NO_CT
422 423
EXT_RETURN tls_construct_ctos_sct(SSL *s, WPACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
424 425
{
    if (s->ct_validation_callback == NULL)
426
        return EXT_RETURN_NOT_SENT;
427

428 429
    /* Not defined for client Certificates */
    if (x != NULL)
430
        return EXT_RETURN_NOT_SENT;
431

432 433
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_signed_certificate_timestamp)
            || !WPACKET_put_bytes_u16(pkt, 0)) {
M
Matt Caswell 已提交
434
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SCT, ERR_R_INTERNAL_ERROR);
435
        return EXT_RETURN_FAIL;
436 437
    }

438
    return EXT_RETURN_SENT;
439 440 441
}
#endif

442 443
EXT_RETURN tls_construct_ctos_ems(SSL *s, WPACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
444 445 446
{
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_extended_master_secret)
            || !WPACKET_put_bytes_u16(pkt, 0)) {
M
Matt Caswell 已提交
447
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EMS, ERR_R_INTERNAL_ERROR);
448
        return EXT_RETURN_FAIL;
449 450
    }

451
    return EXT_RETURN_SENT;
452 453
}

454 455 456
EXT_RETURN tls_construct_ctos_supported_versions(SSL *s, WPACKET *pkt,
                                                 unsigned int context, X509 *x,
                                                 size_t chainidx, int *al)
457 458 459 460 461 462
{
    int currv, min_version, max_version, reason;

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_supported_versions)
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_start_sub_packet_u8(pkt)) {
M
Matt Caswell 已提交
463
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS,
464
               ERR_R_INTERNAL_ERROR);
465
        return EXT_RETURN_FAIL;
466 467
    }

468
    reason = ssl_get_min_max_version(s, &min_version, &max_version);
469
    if (reason != 0) {
M
Matt Caswell 已提交
470
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS, reason);
471
        return EXT_RETURN_FAIL;
472 473 474
    }

    /*
F
FdaSilvaYY 已提交
475
     * TODO(TLS1.3): There is some discussion on the TLS list as to whether
476 477 478 479 480 481 482
     * we should include versions <TLS1.2. For the moment we do. To be
     * reviewed later.
     */
    for (currv = max_version; currv >= min_version; currv--) {
        /* TODO(TLS1.3): Remove this first if clause prior to release!! */
        if (currv == TLS1_3_VERSION) {
            if (!WPACKET_put_bytes_u16(pkt, TLS1_3_VERSION_DRAFT)) {
M
Matt Caswell 已提交
483
                SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS,
484
                       ERR_R_INTERNAL_ERROR);
485
                return EXT_RETURN_FAIL;
486 487
            }
        } else if (!WPACKET_put_bytes_u16(pkt, currv)) {
M
Matt Caswell 已提交
488
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS,
489
                   ERR_R_INTERNAL_ERROR);
490
            return EXT_RETURN_FAIL;
491 492 493
        }
    }
    if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
494
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_SUPPORTED_VERSIONS,
495
               ERR_R_INTERNAL_ERROR);
496
        return EXT_RETURN_FAIL;
497 498
    }

499
    return EXT_RETURN_SENT;
500 501
}

502
/*
503
 * Construct a psk_kex_modes extension.
504
 */
505 506 507
EXT_RETURN tls_construct_ctos_psk_kex_modes(SSL *s, WPACKET *pkt,
                                            unsigned int context, X509 *x,
                                            size_t chainidx, int *al)
508 509
{
#ifndef OPENSSL_NO_TLS1_3
510 511
    int nodhe = s->options & SSL_OP_ALLOW_NO_DHE_KEX;

512 513 514 515
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk_kex_modes)
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_start_sub_packet_u8(pkt)
            || !WPACKET_put_bytes_u8(pkt, TLSEXT_KEX_MODE_KE_DHE)
516
            || (nodhe && !WPACKET_put_bytes_u8(pkt, TLSEXT_KEX_MODE_KE))
517 518 519
            || !WPACKET_close(pkt)
            || !WPACKET_close(pkt)) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK_KEX_MODES, ERR_R_INTERNAL_ERROR);
520
        return EXT_RETURN_FAIL;
521
    }
522

523 524 525
    s->ext.psk_kex_mode = TLSEXT_KEX_MODE_FLAG_KE_DHE;
    if (nodhe)
        s->ext.psk_kex_mode |= TLSEXT_KEX_MODE_FLAG_KE;
526 527
#endif

528
    return EXT_RETURN_SENT;
529 530
}

531 532 533
#ifndef OPENSSL_NO_TLS1_3
static int add_key_share(SSL *s, WPACKET *pkt, unsigned int curve_id)
{
M
Matt Caswell 已提交
534 535
    unsigned char *encoded_point = NULL;
    EVP_PKEY *key_share_key = NULL;
536 537
    size_t encodedlen;

M
Matt Caswell 已提交
538
    if (s->s3->tmp.pkey != NULL) {
539
        if (!ossl_assert(s->hello_retry_request)) {
M
Matt Caswell 已提交
540
            SSLerr(SSL_F_ADD_KEY_SHARE, ERR_R_INTERNAL_ERROR);
541
            return 0;
M
Matt Caswell 已提交
542 543 544 545 546 547
        }
        /*
         * Could happen if we got an HRR that wasn't requesting a new key_share
         */
        key_share_key = s->s3->tmp.pkey;
    } else {
548
        key_share_key = ssl_generate_pkey_group(curve_id);
M
Matt Caswell 已提交
549 550
        if (key_share_key == NULL) {
            SSLerr(SSL_F_ADD_KEY_SHARE, ERR_R_EVP_LIB);
551
            return 0;
M
Matt Caswell 已提交
552
        }
553 554 555 556
    }

    /* Encode the public key. */
    encodedlen = EVP_PKEY_get1_tls_encodedpoint(key_share_key,
557
                                                &encoded_point);
558 559
    if (encodedlen == 0) {
        SSLerr(SSL_F_ADD_KEY_SHARE, ERR_R_EC_LIB);
M
Matt Caswell 已提交
560
        goto err;
561 562 563 564
    }

    /* Create KeyShareEntry */
    if (!WPACKET_put_bytes_u16(pkt, curve_id)
565
            || !WPACKET_sub_memcpy_u16(pkt, encoded_point, encodedlen)) {
566
        SSLerr(SSL_F_ADD_KEY_SHARE, ERR_R_INTERNAL_ERROR);
M
Matt Caswell 已提交
567
        goto err;
568 569 570 571 572 573 574 575 576
    }

    /*
     * TODO(TLS1.3): When changing to send more than one key_share we're
     * going to need to be able to save more than one EVP_PKEY. For now
     * we reuse the existing tmp.pkey
     */
    s->s3->tmp.pkey = key_share_key;
    s->s3->group_id = curve_id;
577
    OPENSSL_free(encoded_point);
578

579
    return 1;
M
Matt Caswell 已提交
580 581 582 583
 err:
    if (s->s3->tmp.pkey == NULL)
        EVP_PKEY_free(key_share_key);
    OPENSSL_free(encoded_point);
584
    return 0;
585 586 587
}
#endif

588 589 590
EXT_RETURN tls_construct_ctos_key_share(SSL *s, WPACKET *pkt,
                                        unsigned int context, X509 *x,
                                        size_t chainidx, int *al)
591
{
M
Matt Caswell 已提交
592
#ifndef OPENSSL_NO_TLS1_3
593
    size_t i, num_curves = 0;
D
Dr. Stephen Henson 已提交
594 595
    const uint16_t *pcurves = NULL;
    uint16_t curve_id = 0;
596 597 598 599 600 601 602

    /* key_share extension */
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_key_share)
               /* Extension data sub-packet */
            || !WPACKET_start_sub_packet_u16(pkt)
               /* KeyShare list sub-packet */
            || !WPACKET_start_sub_packet_u16(pkt)) {
M
Matt Caswell 已提交
603
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_KEY_SHARE, ERR_R_INTERNAL_ERROR);
604
        return EXT_RETURN_FAIL;
605 606
    }

D
Dr. Stephen Henson 已提交
607
    tls1_get_grouplist(s, 0, &pcurves, &num_curves);
608 609 610 611 612

    /*
     * TODO(TLS1.3): Make the number of key_shares sent configurable. For
     * now, just send one
     */
613 614 615
    if (s->s3->group_id != 0) {
        curve_id = s->s3->group_id;
    } else {
D
Dr. Stephen Henson 已提交
616
        for (i = 0; i < num_curves; i++) {
617

D
Dr. Stephen Henson 已提交
618
            if (!tls_curve_allowed(s, pcurves[i], SSL_SECOP_CURVE_SUPPORTED))
619
                continue;
620

D
Dr. Stephen Henson 已提交
621
            curve_id = pcurves[i];
622
            break;
623
        }
624
    }
625

626 627
    if (curve_id == 0) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_KEY_SHARE, SSL_R_NO_SUITABLE_KEY_SHARE);
628
        return EXT_RETURN_FAIL;
629 630
    }

631
    if (!add_key_share(s, pkt, curve_id))
632
        return EXT_RETURN_FAIL;
633

634
    if (!WPACKET_close(pkt) || !WPACKET_close(pkt)) {
M
Matt Caswell 已提交
635
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_KEY_SHARE, ERR_R_INTERNAL_ERROR);
636
        return EXT_RETURN_FAIL;
637
    }
M
Matt Caswell 已提交
638
#endif
639

640
    return EXT_RETURN_SENT;
641 642
}

643 644
EXT_RETURN tls_construct_ctos_cookie(SSL *s, WPACKET *pkt, unsigned int context,
                                     X509 *x, size_t chainidx, int *al)
M
Matt Caswell 已提交
645
{
646
    EXT_RETURN ret = EXT_RETURN_FAIL;
M
Matt Caswell 已提交
647 648 649

    /* Should only be set if we've had an HRR */
    if (s->ext.tls13_cookie_len == 0)
650
        return EXT_RETURN_NOT_SENT;
M
Matt Caswell 已提交
651 652 653 654 655 656 657 658 659 660 661

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_cookie)
               /* Extension data sub-packet */
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_sub_memcpy_u16(pkt, s->ext.tls13_cookie,
                                       s->ext.tls13_cookie_len)
            || !WPACKET_close(pkt)) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_COOKIE, ERR_R_INTERNAL_ERROR);
        goto end;
    }

662
    ret = EXT_RETURN_SENT;
M
Matt Caswell 已提交
663 664
 end:
    OPENSSL_free(s->ext.tls13_cookie);
665
    s->ext.tls13_cookie = NULL;
M
Matt Caswell 已提交
666 667 668 669 670
    s->ext.tls13_cookie_len = 0;

    return ret;
}

671 672 673
EXT_RETURN tls_construct_ctos_early_data(SSL *s, WPACKET *pkt,
                                         unsigned int context, X509 *x,
                                         size_t chainidx, int *al)
674
{
675
    const unsigned char *id = NULL;
676
    size_t idlen = 0;
677
    SSL_SESSION *psksess = NULL;
678
    SSL_SESSION *edsess = NULL;
679 680 681 682 683 684
    const EVP_MD *handmd = NULL;

    if (s->hello_retry_request)
        handmd = ssl_handshake_md(s);

    if (s->psk_use_session_cb != NULL
685 686 687 688
            && (!s->psk_use_session_cb(s, handmd, &id, &idlen, &psksess)
                || (psksess != NULL
                    && psksess->ssl_version != TLS1_3_VERSION))) {
        SSL_SESSION_free(psksess);
689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, SSL_R_BAD_PSK);
        return EXT_RETURN_FAIL;
    }

    SSL_SESSION_free(s->psksession);
    s->psksession = psksess;
    if (psksess != NULL) {
        OPENSSL_free(s->psksession_id);
        s->psksession_id = OPENSSL_memdup(id, idlen);
        if (s->psksession_id == NULL) {
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, ERR_R_INTERNAL_ERROR);
            return EXT_RETURN_FAIL;
        }
        s->psksession_id_len = idlen;
    }

705
    if (s->early_data_state != SSL_EARLY_DATA_CONNECTING
706 707
            || (s->session->ext.max_early_data == 0
                && (psksess == NULL || psksess->ext.max_early_data == 0))) {
708
        s->max_early_data = 0;
709
        return EXT_RETURN_NOT_SENT;
710
    }
711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753
    edsess = s->session->ext.max_early_data != 0 ? s->session : psksess;
    s->max_early_data = edsess->ext.max_early_data;

    if ((s->ext.hostname == NULL && edsess->ext.hostname != NULL)
            || (s->ext.hostname != NULL
                && (edsess->ext.hostname == NULL
                    || strcmp(s->ext.hostname, edsess->ext.hostname) != 0))) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
               SSL_R_INCONSISTENT_EARLY_DATA_SNI);
        return EXT_RETURN_FAIL;
    }

    if ((s->ext.alpn == NULL && edsess->ext.alpn_selected != NULL)) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
               SSL_R_INCONSISTENT_EARLY_DATA_ALPN);
        return EXT_RETURN_FAIL;
    }

    /*
     * Verify that we are offering an ALPN protocol consistent with the early
     * data.
     */
    if (edsess->ext.alpn_selected != NULL) {
        PACKET prots, alpnpkt;
        int found = 0;

        if (!PACKET_buf_init(&prots, s->ext.alpn, s->ext.alpn_len)) {
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, ERR_R_INTERNAL_ERROR);
            return EXT_RETURN_FAIL;
        }
        while (PACKET_get_length_prefixed_1(&prots, &alpnpkt)) {
            if (PACKET_equal(&alpnpkt, edsess->ext.alpn_selected,
                             edsess->ext.alpn_selected_len)) {
                found = 1;
                break;
            }
        }
        if (!found) {
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA,
                   SSL_R_INCONSISTENT_EARLY_DATA_ALPN);
            return EXT_RETURN_FAIL;
        }
    }
754 755 756 757 758

    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_early_data)
            || !WPACKET_start_sub_packet_u16(pkt)
            || !WPACKET_close(pkt)) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, ERR_R_INTERNAL_ERROR);
759
        return EXT_RETURN_FAIL;
760 761 762 763 764 765 766
    }

    /*
     * We set this to rejected here. Later, if the server acknowledges the
     * extension, we set it to accepted.
     */
    s->ext.early_data = SSL_EARLY_DATA_REJECTED;
767
    s->ext.early_data_ok = 1;
768

769
    return EXT_RETURN_SENT;
770 771
}

772 773 774
#define F5_WORKAROUND_MIN_MSG_LEN   0xff
#define F5_WORKAROUND_MAX_MSG_LEN   0x200

M
Matt Caswell 已提交
775 776 777 778 779 780 781 782 783 784 785 786 787 788
/*
 * PSK pre binder overhead =
 *  2 bytes for TLSEXT_TYPE_psk
 *  2 bytes for extension length
 *  2 bytes for identities list length
 *  2 bytes for identity length
 *  4 bytes for obfuscated_ticket_age
 *  2 bytes for binder list length
 *  1 byte for binder length
 * The above excludes the number of bytes for the identity itself and the
 * subsequent binder bytes
 */
#define PSK_PRE_BINDER_OVERHEAD (2 + 2 + 2 + 2 + 4 + 2 + 1)

789 790 791
EXT_RETURN tls_construct_ctos_padding(SSL *s, WPACKET *pkt,
                                      unsigned int context, X509 *x,
                                      size_t chainidx, int *al)
792 793 794 795 796
{
    unsigned char *padbytes;
    size_t hlen;

    if ((s->options & SSL_OP_TLSEXT_PADDING) == 0)
797
        return EXT_RETURN_NOT_SENT;
798 799

    /*
M
Matt Caswell 已提交
800 801 802 803
     * Add padding to workaround bugs in F5 terminators. See RFC7685.
     * This code calculates the length of all extensions added so far but
     * excludes the PSK extension (because that MUST be written last). Therefore
     * this extension MUST always appear second to last.
804 805
     */
    if (!WPACKET_get_total_written(pkt, &hlen)) {
M
Matt Caswell 已提交
806
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PADDING, ERR_R_INTERNAL_ERROR);
807
        return EXT_RETURN_FAIL;
808 809
    }

M
Matt Caswell 已提交
810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828
    /*
     * If we're going to send a PSK then that will be written out after this
     * extension, so we need to calculate how long it is going to be.
     */
    if (s->session->ssl_version == TLS1_3_VERSION
            && s->session->ext.ticklen != 0
            && s->session->cipher != NULL) {
        const EVP_MD *md = ssl_md(s->session->cipher->algorithm2);

        if (md != NULL) {
            /*
             * Add the fixed PSK overhead, the identity length and the binder
             * length.
             */
            hlen +=  PSK_PRE_BINDER_OVERHEAD + s->session->ext.ticklen
                     + EVP_MD_size(md);
        }
    }

829
    if (hlen > F5_WORKAROUND_MIN_MSG_LEN && hlen < F5_WORKAROUND_MAX_MSG_LEN) {
F
FdaSilvaYY 已提交
830
        /* Calculate the amount of padding we need to add */
831 832 833 834
        hlen = F5_WORKAROUND_MAX_MSG_LEN - hlen;

        /*
         * Take off the size of extension header itself (2 bytes for type and
835 836 837
         * 2 bytes for length bytes), but ensure that the extension is at least
         * 1 byte long so as not to have an empty extension last (WebSphere 7.x,
         * 8.x are intolerant of that condition)
838
         */
839
        if (hlen > 4)
840 841
            hlen -= 4;
        else
842
            hlen = 1;
843 844 845

        if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_padding)
                || !WPACKET_sub_allocate_bytes_u16(pkt, hlen, &padbytes)) {
M
Matt Caswell 已提交
846
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PADDING, ERR_R_INTERNAL_ERROR);
847
            return EXT_RETURN_FAIL;
848 849 850 851
        }
        memset(padbytes, 0, hlen);
    }

852
    return EXT_RETURN_SENT;
853 854
}

855 856 857
/*
 * Construct the pre_shared_key extension
 */
858 859
EXT_RETURN tls_construct_ctos_psk(SSL *s, WPACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
860 861
{
#ifndef OPENSSL_NO_TLS1_3
P
Paul Yang 已提交
862
    uint32_t now, agesec, agems = 0;
863
    size_t reshashsize = 0, pskhashsize = 0, binderoffset, msglen;
864
    unsigned char *resbinder = NULL, *pskbinder = NULL, *msgstart = NULL;
P
Paul Yang 已提交
865
    const EVP_MD *handmd = NULL, *mdres = NULL, *mdpsk = NULL;
866
    EXT_RETURN ret = EXT_RETURN_FAIL;
867
    int dores = 0;
868 869 870

    s->session->ext.tick_identity = TLSEXT_PSK_BAD_IDENTITY;

M
Matt Caswell 已提交
871 872 873 874 875 876
    /*
     * Note: At this stage of the code we only support adding a single
     * resumption PSK. If we add support for multiple PSKs then the length
     * calculations in the padding extension will need to be adjusted.
     */

877
    /*
878 879
     * If this is an incompatible or new session then we have nothing to resume
     * so don't add this extension.
880
     */
881
    if (s->session->ssl_version != TLS1_3_VERSION
882
            || (s->session->ext.ticklen == 0 && s->psksession == NULL))
883
        return EXT_RETURN_NOT_SENT;
884

885 886 887 888
    if (s->hello_retry_request)
        handmd = ssl_handshake_md(s);

    if (s->session->ext.ticklen != 0) {
889
        /* Get the digest associated with the ciphersuite in the session */
890 891 892 893 894 895
        if (s->session->cipher == NULL) {
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, ERR_R_INTERNAL_ERROR);
            goto err;
        }
        mdres = ssl_md(s->session->cipher->algorithm2);
        if (mdres == NULL) {
896 897 898 899
            /*
             * Don't recognize this cipher so we can't use the session.
             * Ignore it
             */
900 901 902 903 904
            goto dopsksess;
        }

        if (s->hello_retry_request && mdres != handmd) {
            /*
905 906
             * Selected ciphersuite hash does not match the hash for the session
             * so we can't use it.
907 908 909
             */
            goto dopsksess;
        }
910

911
        /*
912
         * Technically the C standard just says time() returns a time_t and says
913 914 915 916 917
         * nothing about the encoding of that type. In practice most
         * implementations follow POSIX which holds it as an integral type in
         * seconds since epoch. We've already made the assumption that we can do
         * this in multiple places in the code, so portability shouldn't be an
         * issue.
918
         */
919 920
        now = (uint32_t)time(NULL);
        agesec = now - (uint32_t)s->session->time;
921

922 923 924 925
        if (s->session->ext.tick_lifetime_hint < agesec) {
            /* Ticket is too old. Ignore it. */
            goto dopsksess;
        }
926

927 928 929 930 931
        /*
         * Calculate age in ms. We're just doing it to nearest second. Should be
         * good enough.
         */
        agems = agesec * (uint32_t)1000;
M
Matt Caswell 已提交
932

933 934
        if (agesec != 0 && agems / (uint32_t)1000 != agesec) {
            /*
935 936
             * Overflow. Shouldn't happen unless this is a *really* old session.
             * If so we just ignore it.
937 938 939
             */
            goto dopsksess;
        }
940 941

        /*
942 943
         * Obfuscate the age. Overflow here is fine, this addition is supposed
         * to be mod 2^32.
944
         */
945 946 947 948
        agems += s->session->ext.tick_age_add;

        reshashsize = EVP_MD_size(mdres);
        dores = 1;
949 950
    }

951
 dopsksess:
952
    if (!dores && s->psksession == NULL)
953
        return EXT_RETURN_NOT_SENT;
954

955 956
    if (s->psksession != NULL) {
        mdpsk = ssl_md(s->psksession->cipher->algorithm2);
957 958 959 960 961 962 963 964 965
        if (mdpsk == NULL) {
            /*
             * Don't recognize this cipher so we can't use the session.
             * If this happens it's an application bug.
             */
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, SSL_R_BAD_PSK);
            goto err;
        }

966
        if (s->hello_retry_request && mdpsk != handmd) {
967 968 969 970 971 972 973 974 975 976
            /*
             * Selected ciphersuite hash does not match the hash for the PSK
             * session. This is an application bug.
             */
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, SSL_R_BAD_PSK);
            goto err;
        }

        pskhashsize = EVP_MD_size(mdpsk);
    }
977 978 979 980

    /* Create the extension, but skip over the binder for now */
    if (!WPACKET_put_bytes_u16(pkt, TLSEXT_TYPE_psk)
            || !WPACKET_start_sub_packet_u16(pkt)
981 982 983 984 985 986 987 988 989 990 991 992 993 994
            || !WPACKET_start_sub_packet_u16(pkt)) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, ERR_R_INTERNAL_ERROR);
        goto err;
    }

    if (dores) {
        if (!WPACKET_sub_memcpy_u16(pkt, s->session->ext.tick,
                                           s->session->ext.ticklen)
                || !WPACKET_put_bytes_u32(pkt, agems)) {
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, ERR_R_INTERNAL_ERROR);
            goto err;
        }
    }

995 996 997
    if (s->psksession != NULL) {
        if (!WPACKET_sub_memcpy_u16(pkt, s->psksession_id,
                                    s->psksession_id_len)
998 999 1000 1001 1002 1003 1004
                || !WPACKET_put_bytes_u32(pkt, 0)) {
            SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, ERR_R_INTERNAL_ERROR);
            goto err;
        }
    }

    if (!WPACKET_close(pkt)
1005 1006
            || !WPACKET_get_total_written(pkt, &binderoffset)
            || !WPACKET_start_sub_packet_u16(pkt)
1007 1008
            || (dores
                && !WPACKET_sub_allocate_bytes_u8(pkt, reshashsize, &resbinder))
1009
            || (s->psksession != NULL
1010
                && !WPACKET_sub_allocate_bytes_u8(pkt, pskhashsize, &pskbinder))
1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024
            || !WPACKET_close(pkt)
            || !WPACKET_close(pkt)
            || !WPACKET_get_total_written(pkt, &msglen)
               /*
                * We need to fill in all the sub-packet lengths now so we can
                * calculate the HMAC of the message up to the binders
                */
            || !WPACKET_fill_lengths(pkt)) {
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, ERR_R_INTERNAL_ERROR);
        goto err;
    }

    msgstart = WPACKET_get_curr(pkt) - msglen;

1025 1026 1027
    if (dores
            && tls_psk_do_binder(s, mdres, msgstart, binderoffset, NULL,
                                 resbinder, s->session, 1, 0) != 1) {
1028 1029 1030 1031
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, ERR_R_INTERNAL_ERROR);
        goto err;
    }

1032
    if (s->psksession != NULL
1033
            && tls_psk_do_binder(s, mdpsk, msgstart, binderoffset, NULL,
1034
                                 pskbinder, s->psksession, 1, 1) != 1) {
1035 1036 1037 1038 1039 1040
        SSLerr(SSL_F_TLS_CONSTRUCT_CTOS_PSK, ERR_R_INTERNAL_ERROR);
        goto err;
    }

    if (dores)
        s->session->ext.tick_identity = 0;
1041
    if (s->psksession != NULL)
1042
        s->psksession->ext.tick_identity = (dores ? 1 : 0);
1043

1044
    ret = EXT_RETURN_SENT;
1045 1046 1047
 err:
    return ret;
#else
1048
    return EXT_RETURN_NOT_SENT;
1049 1050 1051
#endif
}

1052 1053 1054
/*
 * Parse the server's renegotiation binding and abort if it's not right
 */
1055 1056
int tls_parse_stoc_renegotiate(SSL *s, PACKET *pkt, unsigned int context,
                               X509 *x, size_t chainidx, int *al)
1057 1058 1059 1060 1061 1062 1063
{
    size_t expected_len = s->s3->previous_client_finished_len
        + s->s3->previous_server_finished_len;
    size_t ilen;
    const unsigned char *data;

    /* Check for logic errors */
1064 1065 1066 1067 1068 1069 1070
    if (!ossl_assert(expected_len == 0
                     || s->s3->previous_client_finished_len != 0)
        || !ossl_assert(expected_len == 0
                        || s->s3->previous_server_finished_len != 0)) {
        *al = SSL_AD_INTERNAL_ERROR;
        return 0;
    }
1071 1072 1073

    /* Parse the length byte */
    if (!PACKET_get_1_len(pkt, &ilen)) {
M
Matt Caswell 已提交
1074
        SSLerr(SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
1075
               SSL_R_RENEGOTIATION_ENCODING_ERR);
1076
        *al = SSL_AD_DECODE_ERROR;
1077 1078 1079 1080 1081
        return 0;
    }

    /* Consistency check */
    if (PACKET_remaining(pkt) != ilen) {
M
Matt Caswell 已提交
1082
        SSLerr(SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
1083
               SSL_R_RENEGOTIATION_ENCODING_ERR);
1084
        *al = SSL_AD_DECODE_ERROR;
1085 1086 1087 1088 1089
        return 0;
    }

    /* Check that the extension matches */
    if (ilen != expected_len) {
M
Matt Caswell 已提交
1090
        SSLerr(SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
1091
               SSL_R_RENEGOTIATION_MISMATCH);
1092
        *al = SSL_AD_ILLEGAL_PARAMETER;
1093 1094 1095 1096 1097 1098
        return 0;
    }

    if (!PACKET_get_bytes(pkt, &data, s->s3->previous_client_finished_len)
        || memcmp(data, s->s3->previous_client_finished,
                  s->s3->previous_client_finished_len) != 0) {
M
Matt Caswell 已提交
1099
        SSLerr(SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
1100
               SSL_R_RENEGOTIATION_MISMATCH);
1101
        *al = SSL_AD_ILLEGAL_PARAMETER;
1102 1103 1104 1105 1106 1107
        return 0;
    }

    if (!PACKET_get_bytes(pkt, &data, s->s3->previous_server_finished_len)
        || memcmp(data, s->s3->previous_server_finished,
                  s->s3->previous_server_finished_len) != 0) {
M
Matt Caswell 已提交
1108
        SSLerr(SSL_F_TLS_PARSE_STOC_RENEGOTIATE,
1109 1110 1111 1112 1113 1114 1115 1116 1117
               SSL_R_RENEGOTIATION_MISMATCH);
        *al = SSL_AD_ILLEGAL_PARAMETER;
        return 0;
    }
    s->s3->send_connection_binding = 1;

    return 1;
}

1118 1119
int tls_parse_stoc_server_name(SSL *s, PACKET *pkt, unsigned int context,
                               X509 *x, size_t chainidx, int *al)
1120
{
1121 1122 1123 1124 1125 1126 1127
    if (s->ext.hostname == NULL) {
        *al = SSL_AD_INTERNAL_ERROR;
        return 0;
    }

    if (PACKET_remaining(pkt) > 0) {
        *al = SSL_AD_DECODE_ERROR;
1128 1129 1130 1131
        return 0;
    }

    if (!s->hit) {
R
Rich Salz 已提交
1132
        if (s->session->ext.hostname != NULL) {
1133 1134 1135
            *al = SSL_AD_INTERNAL_ERROR;
            return 0;
        }
R
Rich Salz 已提交
1136 1137
        s->session->ext.hostname = OPENSSL_strdup(s->ext.hostname);
        if (s->session->ext.hostname == NULL) {
1138 1139 1140 1141 1142 1143 1144 1145 1146
            *al = SSL_AD_INTERNAL_ERROR;
            return 0;
        }
    }

    return 1;
}

#ifndef OPENSSL_NO_EC
1147 1148
int tls_parse_stoc_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context,
                                 X509 *x, size_t chainidx, int *al)
1149
{
R
Rich Salz 已提交
1150
    unsigned int ecpointformats_len;
1151 1152 1153 1154 1155 1156 1157
    PACKET ecptformatlist;

    if (!PACKET_as_length_prefixed_1(pkt, &ecptformatlist)) {
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }
    if (!s->hit) {
R
Rich Salz 已提交
1158 1159
        ecpointformats_len = PACKET_remaining(&ecptformatlist);
        s->session->ext.ecpointformats_len = 0;
1160

R
Rich Salz 已提交
1161 1162 1163
        OPENSSL_free(s->session->ext.ecpointformats);
        s->session->ext.ecpointformats = OPENSSL_malloc(ecpointformats_len);
        if (s->session->ext.ecpointformats == NULL) {
1164 1165 1166 1167
            *al = SSL_AD_INTERNAL_ERROR;
            return 0;
        }

R
Rich Salz 已提交
1168
        s->session->ext.ecpointformats_len = ecpointformats_len;
1169 1170

        if (!PACKET_copy_bytes(&ecptformatlist,
R
Rich Salz 已提交
1171 1172
                               s->session->ext.ecpointformats,
                               ecpointformats_len)) {
1173 1174 1175 1176 1177 1178 1179 1180 1181
            *al = SSL_AD_INTERNAL_ERROR;
            return 0;
        }
    }

    return 1;
}
#endif

1182 1183
int tls_parse_stoc_session_ticket(SSL *s, PACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
1184
{
R
Rich Salz 已提交
1185 1186 1187 1188
    if (s->ext.session_ticket_cb != NULL &&
        !s->ext.session_ticket_cb(s, PACKET_data(pkt),
                              PACKET_remaining(pkt),
                              s->ext.session_ticket_cb_arg)) {
1189 1190 1191
        *al = SSL_AD_INTERNAL_ERROR;
        return 0;
    }
1192

1193
    if (!tls_use_ticket(s)) {
1194 1195 1196
        *al = SSL_AD_UNSUPPORTED_EXTENSION;
        return 0;
    }
1197 1198 1199 1200
    if (PACKET_remaining(pkt) > 0) {
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }
1201

R
Rich Salz 已提交
1202
    s->ext.ticket_expected = 1;
1203 1204 1205 1206

    return 1;
}

1207
#ifndef OPENSSL_NO_OCSP
1208 1209
int tls_parse_stoc_status_request(SSL *s, PACKET *pkt, unsigned int context,
                                  X509 *x, size_t chainidx, int *al)
1210 1211
{
    /*
1212 1213
     * MUST only be sent if we've requested a status
     * request message. In TLS <= 1.2 it must also be empty.
1214
     */
1215
    if (s->ext.status_type != TLSEXT_STATUSTYPE_ocsp) {
1216 1217 1218
        *al = SSL_AD_UNSUPPORTED_EXTENSION;
        return 0;
    }
1219 1220 1221 1222
    if (!SSL_IS_TLS13(s) && PACKET_remaining(pkt) > 0) {
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }
1223 1224 1225

    if (SSL_IS_TLS13(s)) {
        /* We only know how to handle this if it's for the first Certificate in
F
FdaSilvaYY 已提交
1226
         * the chain. We ignore any other responses.
1227
         */
1228
        if (chainidx != 0)
1229 1230 1231 1232
            return 1;
        return tls_process_cert_status_body(s, pkt, al);
    }

1233
    /* Set flag to expect CertificateStatus message */
R
Rich Salz 已提交
1234
    s->ext.status_expected = 1;
1235 1236 1237

    return 1;
}
1238
#endif
1239 1240 1241


#ifndef OPENSSL_NO_CT
1242 1243
int tls_parse_stoc_sct(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                       size_t chainidx, int *al)
1244 1245 1246 1247 1248 1249 1250 1251 1252 1253
{
    /*
     * Only take it if we asked for it - i.e if there is no CT validation
     * callback set, then a custom extension MAY be processing it, so we
     * need to let control continue to flow to that.
     */
    if (s->ct_validation_callback != NULL) {
        size_t size = PACKET_remaining(pkt);

        /* Simply copy it off for later processing */
R
Rich Salz 已提交
1254 1255
        OPENSSL_free(s->ext.scts);
        s->ext.scts = NULL;
1256

R
Rich Salz 已提交
1257
        s->ext.scts_len = size;
1258
        if (size > 0) {
R
Rich Salz 已提交
1259 1260 1261
            s->ext.scts = OPENSSL_malloc(size);
            if (s->ext.scts == NULL
                    || !PACKET_copy_bytes(pkt, s->ext.scts, size)) {
1262 1263 1264 1265 1266
                *al = SSL_AD_INTERNAL_ERROR;
                return 0;
            }
        }
    } else {
1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280
        ENDPOINT role = (context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0
                        ? ENDPOINT_CLIENT : ENDPOINT_BOTH;

        /*
         * If we didn't ask for it then there must be a custom extension,
         * otherwise this is unsolicited.
         */
        if (custom_ext_find(&s->cert->custext, role,
                            TLSEXT_TYPE_signed_certificate_timestamp,
                            NULL) == NULL) {
            *al = TLS1_AD_UNSUPPORTED_EXTENSION;
            return 0;
        }

1281 1282 1283 1284
        if (custom_ext_parse(s, context,
                             TLSEXT_TYPE_signed_certificate_timestamp,
                             PACKET_data(pkt), PACKET_remaining(pkt),
                             x, chainidx, al) <= 0)
1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311
            return 0;
    }

    return 1;
}
#endif


#ifndef OPENSSL_NO_NEXTPROTONEG
/*
 * ssl_next_proto_validate validates a Next Protocol Negotiation block. No
 * elements of zero length are allowed and the set of elements must exactly
 * fill the length of the block. Returns 1 on success or 0 on failure.
 */
static int ssl_next_proto_validate(PACKET *pkt)
{
    PACKET tmp_protocol;

    while (PACKET_remaining(pkt)) {
        if (!PACKET_get_length_prefixed_1(pkt, &tmp_protocol)
            || PACKET_remaining(&tmp_protocol) == 0)
            return 0;
    }

    return 1;
}

1312 1313
int tls_parse_stoc_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                       size_t chainidx, int *al)
1314 1315 1316 1317 1318
{
    unsigned char *selected;
    unsigned char selected_len;
    PACKET tmppkt;

1319
    /* Check if we are in a renegotiation. If so ignore this extension */
1320
    if (!SSL_IS_FIRST_HANDSHAKE(s))
1321 1322 1323
        return 1;

    /* We must have requested it. */
R
Rich Salz 已提交
1324
    if (s->ctx->ext.npn_select_cb == NULL) {
1325 1326 1327
        *al = SSL_AD_UNSUPPORTED_EXTENSION;
        return 0;
    }
1328

1329 1330 1331 1332 1333 1334
    /* The data must be valid */
    tmppkt = *pkt;
    if (!ssl_next_proto_validate(&tmppkt)) {
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }
R
Rich Salz 已提交
1335 1336 1337 1338
    if (s->ctx->ext.npn_select_cb(s, &selected, &selected_len,
                                  PACKET_data(pkt),
                                  PACKET_remaining(pkt),
                                  s->ctx->ext.npn_select_cb_arg) !=
1339 1340 1341 1342
             SSL_TLSEXT_ERR_OK) {
        *al = SSL_AD_INTERNAL_ERROR;
        return 0;
    }
1343

1344 1345 1346 1347
    /*
     * Could be non-NULL if server has sent multiple NPN extensions in
     * a single Serverhello
     */
R
Rich Salz 已提交
1348 1349 1350
    OPENSSL_free(s->ext.npn);
    s->ext.npn = OPENSSL_malloc(selected_len);
    if (s->ext.npn == NULL) {
1351 1352 1353 1354
        *al = SSL_AD_INTERNAL_ERROR;
        return 0;
    }

R
Rich Salz 已提交
1355 1356 1357
    memcpy(s->ext.npn, selected, selected_len);
    s->ext.npn_len = selected_len;
    s->s3->npn_seen = 1;
1358 1359 1360 1361 1362

    return 1;
}
#endif

1363 1364
int tls_parse_stoc_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                        size_t chainidx, int *al)
1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396
{
    size_t len;

    /* We must have requested it. */
    if (!s->s3->alpn_sent) {
        *al = SSL_AD_UNSUPPORTED_EXTENSION;
        return 0;
    }
    /*-
     * The extension data consists of:
     *   uint16 list_length
     *   uint8 proto_length;
     *   uint8 proto[proto_length];
     */
    if (!PACKET_get_net_2_len(pkt, &len)
        || PACKET_remaining(pkt) != len || !PACKET_get_1_len(pkt, &len)
        || PACKET_remaining(pkt) != len) {
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }
    OPENSSL_free(s->s3->alpn_selected);
    s->s3->alpn_selected = OPENSSL_malloc(len);
    if (s->s3->alpn_selected == NULL) {
        *al = SSL_AD_INTERNAL_ERROR;
        return 0;
    }
    if (!PACKET_copy_bytes(pkt, s->s3->alpn_selected, len)) {
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }
    s->s3->alpn_selected_len = len;

1397 1398 1399 1400
    if (s->session->ext.alpn_selected == NULL
            || s->session->ext.alpn_selected_len != len
            || memcmp(s->session->ext.alpn_selected, s->s3->alpn_selected, len)
               != 0) {
1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412
        /* ALPN not consistent with the old session so cannot use early_data */
        s->ext.early_data_ok = 0;
    }
    if (!s->hit) {
        /* If a new session then update it with the selected ALPN */
        s->session->ext.alpn_selected =
            OPENSSL_memdup(s->s3->alpn_selected, s->s3->alpn_selected_len);
        if (s->session->ext.alpn_selected == NULL) {
            *al = SSL_AD_INTERNAL_ERROR;
            return 0;
        }
        s->session->ext.alpn_selected_len = s->s3->alpn_selected_len;
1413 1414
    }

1415 1416 1417 1418
    return 1;
}

#ifndef OPENSSL_NO_SRTP
1419 1420
int tls_parse_stoc_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                            size_t chainidx, int *al)
1421 1422 1423 1424 1425 1426
{
    unsigned int id, ct, mki;
    int i;
    STACK_OF(SRTP_PROTECTION_PROFILE) *clnt;
    SRTP_PROTECTION_PROFILE *prof;

1427 1428 1429 1430
    if (!PACKET_get_net_2(pkt, &ct) || ct != 2
            || !PACKET_get_net_2(pkt, &id)
            || !PACKET_get_1(pkt, &mki)
            || PACKET_remaining(pkt) != 0) {
M
Matt Caswell 已提交
1431
        SSLerr(SSL_F_TLS_PARSE_STOC_USE_SRTP,
1432 1433 1434 1435 1436 1437 1438
               SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }

    if (mki != 0) {
        /* Must be no MKI, since we never offer one */
M
Matt Caswell 已提交
1439
        SSLerr(SSL_F_TLS_PARSE_STOC_USE_SRTP, SSL_R_BAD_SRTP_MKI_VALUE);
1440 1441 1442 1443 1444
        *al = SSL_AD_ILLEGAL_PARAMETER;
        return 0;
    }

    /* Throw an error if the server gave us an unsolicited extension */
1445
    clnt = SSL_get_srtp_profiles(s);
1446
    if (clnt == NULL) {
M
Matt Caswell 已提交
1447
        SSLerr(SSL_F_TLS_PARSE_STOC_USE_SRTP, SSL_R_NO_SRTP_PROFILES);
1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }

    /*
     * Check to see if the server gave us something we support (and
     * presumably offered)
     */
    for (i = 0; i < sk_SRTP_PROTECTION_PROFILE_num(clnt); i++) {
        prof = sk_SRTP_PROTECTION_PROFILE_value(clnt, i);

        if (prof->id == id) {
            s->srtp_profile = prof;
            *al = 0;
            return 1;
        }
    }

M
Matt Caswell 已提交
1466
    SSLerr(SSL_F_TLS_PARSE_STOC_USE_SRTP,
1467 1468 1469 1470 1471 1472
           SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
    *al = SSL_AD_DECODE_ERROR;
    return 0;
}
#endif

1473 1474
int tls_parse_stoc_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                       size_t chainidx, int *al)
1475 1476 1477 1478 1479
{
    /* Ignore if inappropriate ciphersuite */
    if (!(s->options & SSL_OP_NO_ENCRYPT_THEN_MAC)
            && s->s3->tmp.new_cipher->algorithm_mac != SSL_AEAD
            && s->s3->tmp.new_cipher->algorithm_enc != SSL_RC4)
1480
        s->ext.use_etm = 1;
1481 1482 1483 1484

    return 1;
}

1485 1486
int tls_parse_stoc_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                       size_t chainidx, int *al)
1487 1488 1489 1490 1491 1492 1493 1494
{
    s->s3->flags |= TLS1_FLAGS_RECEIVED_EXTMS;
    if (!s->hit)
        s->session->flags |= SSL_SESS_FLAG_EXTMS;

    return 1;
}

1495 1496
int tls_parse_stoc_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                             size_t chainidx, int *al)
1497
{
M
Matt Caswell 已提交
1498
#ifndef OPENSSL_NO_TLS1_3
1499 1500 1501 1502 1503
    unsigned int group_id;
    PACKET encoded_pt;
    EVP_PKEY *ckey = s->s3->tmp.pkey, *skey = NULL;

    /* Sanity check */
1504
    if (ckey == NULL || s->s3->peer_tmp != NULL) {
1505
        *al = SSL_AD_INTERNAL_ERROR;
M
Matt Caswell 已提交
1506
        SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, ERR_R_INTERNAL_ERROR);
1507 1508 1509 1510
        return 0;
    }

    if (!PACKET_get_net_2(pkt, &group_id)) {
M
Matt Caswell 已提交
1511
        *al = SSL_AD_DECODE_ERROR;
M
Matt Caswell 已提交
1512
        SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_LENGTH_MISMATCH);
1513 1514 1515
        return 0;
    }

1516
    if ((context & SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST) != 0) {
D
Dr. Stephen Henson 已提交
1517
        const uint16_t *pcurves = NULL;
1518 1519 1520
        size_t i, num_curves;

        if (PACKET_remaining(pkt) != 0) {
M
Matt Caswell 已提交
1521
            *al = SSL_AD_DECODE_ERROR;
1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536
            SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_LENGTH_MISMATCH);
            return 0;
        }

        /*
         * It is an error if the HelloRetryRequest wants a key_share that we
         * already sent in the first ClientHello
         */
        if (group_id == s->s3->group_id) {
            *al = SSL_AD_ILLEGAL_PARAMETER;
            SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_BAD_KEY_SHARE);
            return 0;
        }

        /* Validate the selected group is one we support */
D
Dr. Stephen Henson 已提交
1537
        tls1_get_grouplist(s, 0, &pcurves, &num_curves);
D
Dr. Stephen Henson 已提交
1538 1539
        for (i = 0; i < num_curves; i++) {
            if (group_id == pcurves[i])
1540 1541 1542
                break;
        }
        if (i >= num_curves
D
Dr. Stephen Henson 已提交
1543
                || !tls_curve_allowed(s, group_id, SSL_SECOP_CURVE_SUPPORTED)) {
1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554
            *al = SSL_AD_ILLEGAL_PARAMETER;
            SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_BAD_KEY_SHARE);
            return 0;
        }

        s->s3->group_id = group_id;
        EVP_PKEY_free(s->s3->tmp.pkey);
        s->s3->tmp.pkey = NULL;
        return 1;
    }

1555 1556 1557 1558 1559
    if (group_id != s->s3->group_id) {
        /*
         * This isn't for the group that we sent in the original
         * key_share!
         */
M
Matt Caswell 已提交
1560
        *al = SSL_AD_ILLEGAL_PARAMETER;
M
Matt Caswell 已提交
1561
        SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_BAD_KEY_SHARE);
1562 1563 1564 1565 1566 1567
        return 0;
    }

    if (!PACKET_as_length_prefixed_2(pkt, &encoded_pt)
            || PACKET_remaining(&encoded_pt) == 0) {
        *al = SSL_AD_DECODE_ERROR;
M
Matt Caswell 已提交
1568
        SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_LENGTH_MISMATCH);
1569 1570 1571 1572 1573 1574
        return 0;
    }

    skey = ssl_generate_pkey(ckey);
    if (skey == NULL) {
        *al = SSL_AD_INTERNAL_ERROR;
M
Matt Caswell 已提交
1575
        SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, ERR_R_MALLOC_FAILURE);
1576 1577 1578 1579
        return 0;
    }
    if (!EVP_PKEY_set1_tls_encodedpoint(skey, PACKET_data(&encoded_pt),
                                        PACKET_remaining(&encoded_pt))) {
1580
        *al = SSL_AD_ILLEGAL_PARAMETER;
M
Matt Caswell 已提交
1581
        SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, SSL_R_BAD_ECPOINT);
1582
        EVP_PKEY_free(skey);
1583 1584 1585 1586 1587
        return 0;
    }

    if (ssl_derive(s, ckey, skey, 1) == 0) {
        *al = SSL_AD_INTERNAL_ERROR;
M
Matt Caswell 已提交
1588
        SSLerr(SSL_F_TLS_PARSE_STOC_KEY_SHARE, ERR_R_INTERNAL_ERROR);
1589 1590 1591
        EVP_PKEY_free(skey);
        return 0;
    }
1592
    s->s3->peer_tmp = skey;
M
Matt Caswell 已提交
1593
#endif
1594 1595 1596

    return 1;
}
1597

M
Matt Caswell 已提交
1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613
int tls_parse_stoc_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                       size_t chainidx, int *al)
{
    PACKET cookie;

    if (!PACKET_as_length_prefixed_2(pkt, &cookie)
            || !PACKET_memdup(&cookie, &s->ext.tls13_cookie,
                              &s->ext.tls13_cookie_len)) {
        *al = SSL_AD_DECODE_ERROR;
        SSLerr(SSL_F_TLS_PARSE_STOC_COOKIE, SSL_R_LENGTH_MISMATCH);
        return 0;
    }

    return 1;
}

1614 1615 1616
int tls_parse_stoc_early_data(SSL *s, PACKET *pkt, unsigned int context,
                              X509 *x, size_t chainidx, int *al)
{
1617
    if (context == SSL_EXT_TLS1_3_NEW_SESSION_TICKET) {
1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632
        unsigned long max_early_data;

        if (!PACKET_get_net_4(pkt, &max_early_data)
                || PACKET_remaining(pkt) != 0) {
            SSLerr(SSL_F_TLS_PARSE_STOC_EARLY_DATA,
                   SSL_R_INVALID_MAX_EARLY_DATA);
            *al = SSL_AD_DECODE_ERROR;
            return 0;
        }

        s->session->ext.max_early_data = max_early_data;

        return 1;
    }

1633 1634 1635 1636 1637
    if (PACKET_remaining(pkt) != 0) {
        *al = SSL_AD_DECODE_ERROR;
        return 0;
    }

1638
    if (!s->ext.early_data_ok
1639 1640 1641 1642
            || !s->hit
            || s->session->ext.tick_identity != 0) {
        /*
         * If we get here then we didn't send early data, or we didn't resume
1643 1644
         * using the first identity, or the SNI/ALPN is not consistent so the
         * server should not be accepting it.
1645 1646 1647 1648 1649 1650 1651 1652 1653 1654
         */
        *al = SSL_AD_ILLEGAL_PARAMETER;
        return 0;
    }

    s->ext.early_data = SSL_EARLY_DATA_ACCEPTED;

    return 1;
}

1655 1656
int tls_parse_stoc_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
                       size_t chainidx, int *al)
1657 1658 1659 1660 1661
{
#ifndef OPENSSL_NO_TLS1_3
    unsigned int identity;

    if (!PACKET_get_net_2(pkt, &identity) || PACKET_remaining(pkt) != 0) {
M
Matt Caswell 已提交
1662
        *al = SSL_AD_DECODE_ERROR;
1663 1664 1665 1666
        SSLerr(SSL_F_TLS_PARSE_STOC_PSK, SSL_R_LENGTH_MISMATCH);
        return 0;
    }

1667 1668 1669 1670 1671 1672 1673 1674 1675
    if (s->session->ext.tick_identity == (int)identity) {
        s->hit = 1;
        SSL_SESSION_free(s->psksession);
        s->psksession = NULL;
        return 1;
    }

    if (s->psksession == NULL
            || s->psksession->ext.tick_identity != (int)identity) {
M
Matt Caswell 已提交
1676
        *al = SSL_AD_ILLEGAL_PARAMETER;
1677 1678 1679 1680
        SSLerr(SSL_F_TLS_PARSE_STOC_PSK, SSL_R_BAD_PSK_IDENTITY);
        return 0;
    }

1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691
    /*
     * If we used the external PSK for sending early_data then s->early_secret
     * is already set up, so don't overwrite it. Otherwise we copy the
     * early_secret across that we generated earlier.
     */
    if ((s->early_data_state != SSL_EARLY_DATA_WRITE_RETRY
                && s->early_data_state != SSL_EARLY_DATA_FINISHED_WRITING)
            || s->session->ext.max_early_data > 0
            || s->psksession->ext.max_early_data == 0)
        memcpy(s->early_secret, s->psksession->early_secret, EVP_MAX_MD_SIZE);

1692 1693 1694
    SSL_SESSION_free(s->session);
    s->session = s->psksession;
    s->psksession = NULL;
1695 1696 1697 1698 1699
    s->hit = 1;
#endif

    return 1;
}