- upstream fix compression handling on session resumption
- various null checks and other small fixes from upstream - upstream changes for the renegotiation info according to the latest draft
This commit is contained in:
		
							parent
							
								
									7f87929b98
								
							
						
					
					
						commit
						2d6ef07fa3
					
				
							
								
								
									
										334
									
								
								openssl-1.0.0-beta4-backports2.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										334
									
								
								openssl-1.0.0-beta4-backports2.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,334 @@ | ||||
| diff -up openssl-1.0.0-beta4/apps/ca.c.backports2 openssl-1.0.0-beta4/apps/ca.c
 | ||||
| --- openssl-1.0.0-beta4/apps/ca.c.backports2	2009-10-04 18:43:21.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/apps/ca.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -215,7 +215,6 @@ static int certify_spkac(X509 **xret, ch
 | ||||
|  			 char *startdate, char *enddate, long days, char *ext_sect, | ||||
|  			 CONF *conf, int verbose, unsigned long certopt,  | ||||
|  			 unsigned long nameopt, int default_op, int ext_copy); | ||||
| -static int fix_data(int nid, int *type);
 | ||||
|  static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext); | ||||
|  static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, | ||||
|  	STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn, | ||||
| @@ -2334,25 +2333,9 @@ static int certify_spkac(X509 **xret, ch
 | ||||
|  			continue; | ||||
|  			} | ||||
|   | ||||
| -		/*
 | ||||
| -		if ((nid == NID_pkcs9_emailAddress) && (email_dn == 0))
 | ||||
| -			continue;
 | ||||
| -		*/
 | ||||
| -		
 | ||||
| -		j=ASN1_PRINTABLE_type((unsigned char *)buf,-1);
 | ||||
| -		if (fix_data(nid, &j) == 0)
 | ||||
| -			{
 | ||||
| -			BIO_printf(bio_err,
 | ||||
| -				"invalid characters in string %s\n",buf);
 | ||||
| -			goto err;
 | ||||
| -			}
 | ||||
| -
 | ||||
| -		if ((ne=X509_NAME_ENTRY_create_by_NID(&ne,nid,j,
 | ||||
| -			(unsigned char *)buf,
 | ||||
| -			strlen(buf))) == NULL)
 | ||||
| +		if (!X509_NAME_add_entry_by_NID(n, nid, chtype,
 | ||||
| +				(unsigned char *)buf, -1, -1, 0))
 | ||||
|  			goto err; | ||||
| -
 | ||||
| -		if (!X509_NAME_add_entry(n,ne,-1, 0)) goto err;
 | ||||
|  		} | ||||
|  	if (spki == NULL) | ||||
|  		{ | ||||
| @@ -2395,21 +2378,6 @@ err:
 | ||||
|  	return(ok); | ||||
|  	} | ||||
|   | ||||
| -static int fix_data(int nid, int *type)
 | ||||
| -	{
 | ||||
| -	if (nid == NID_pkcs9_emailAddress)
 | ||||
| -		*type=V_ASN1_IA5STRING;
 | ||||
| -	if ((nid == NID_commonName) && (*type == V_ASN1_IA5STRING))
 | ||||
| -		*type=V_ASN1_T61STRING;
 | ||||
| -	if ((nid == NID_pkcs9_challengePassword) && (*type == V_ASN1_IA5STRING))
 | ||||
| -		*type=V_ASN1_T61STRING;
 | ||||
| -	if ((nid == NID_pkcs9_unstructuredName) && (*type == V_ASN1_T61STRING))
 | ||||
| -		return(0);
 | ||||
| -	if (nid == NID_pkcs9_unstructuredName)
 | ||||
| -		*type=V_ASN1_IA5STRING;
 | ||||
| -	return(1);
 | ||||
| -	}
 | ||||
| -
 | ||||
|  static int check_time_format(const char *str) | ||||
|  	{ | ||||
|  	return ASN1_TIME_set_string(NULL, str); | ||||
| diff -up openssl-1.0.0-beta4/crypto/asn1/ameth_lib.c.backports2 openssl-1.0.0-beta4/crypto/asn1/ameth_lib.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/asn1/ameth_lib.c.backports2	2008-11-12 04:57:49.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/asn1/ameth_lib.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -301,6 +301,8 @@ EVP_PKEY_ASN1_METHOD* EVP_PKEY_asn1_new(
 | ||||
|  		if (!ameth->info) | ||||
|  			goto err; | ||||
|  		} | ||||
| +	else
 | ||||
| +		ameth->info = NULL;
 | ||||
|   | ||||
|  	if (pem_str) | ||||
|  		{ | ||||
| @@ -308,6 +310,8 @@ EVP_PKEY_ASN1_METHOD* EVP_PKEY_asn1_new(
 | ||||
|  		if (!ameth->pem_str) | ||||
|  			goto err; | ||||
|  		} | ||||
| +	else
 | ||||
| +		ameth->pem_str = NULL;
 | ||||
|   | ||||
|  	ameth->pub_decode = 0; | ||||
|  	ameth->pub_encode = 0; | ||||
| diff -up openssl-1.0.0-beta4/crypto/bio/b_sock.c.backports2 openssl-1.0.0-beta4/crypto/bio/b_sock.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/bio/b_sock.c.backports2	2010-01-07 23:16:08.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/bio/b_sock.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -595,7 +595,7 @@ int BIO_get_accept_socket(char *host, in
 | ||||
|  		struct sockaddr_in6 sa_in6; | ||||
|  #endif | ||||
|  	} server,client; | ||||
| -	int s=INVALID_SOCKET,cs;
 | ||||
| +	int s=INVALID_SOCKET,cs,addrlen;
 | ||||
|  	unsigned char ip[4]; | ||||
|  	unsigned short port; | ||||
|  	char *str=NULL,*e; | ||||
| @@ -666,8 +666,10 @@ int BIO_get_accept_socket(char *host, in
 | ||||
|   | ||||
|  	if ((*p_getaddrinfo.f)(h,p,&hint,&res)) break; | ||||
|   | ||||
| -	memcpy(&server, res->ai_addr,
 | ||||
| -		res->ai_addrlen<=sizeof(server)?res->ai_addrlen:sizeof(server));
 | ||||
| +	addrlen = res->ai_addrlen<=sizeof(server) ?
 | ||||
| +			res->ai_addrlen :
 | ||||
| +			sizeof(server);
 | ||||
| +	memcpy(&server, res->ai_addr, addrlen);
 | ||||
|   | ||||
|  	(*p_freeaddrinfo.f)(res); | ||||
|  	goto again; | ||||
| @@ -679,6 +681,7 @@ int BIO_get_accept_socket(char *host, in
 | ||||
|  	memset((char *)&server,0,sizeof(server)); | ||||
|  	server.sa_in.sin_family=AF_INET; | ||||
|  	server.sa_in.sin_port=htons(port); | ||||
| +	addrlen = sizeof(server.sa_in);
 | ||||
|   | ||||
|  	if (h == NULL || strcmp(h,"*") == 0) | ||||
|  		server.sa_in.sin_addr.s_addr=INADDR_ANY; | ||||
| @@ -712,7 +715,7 @@ again:
 | ||||
|  		bind_mode=BIO_BIND_NORMAL; | ||||
|  		} | ||||
|  #endif | ||||
| -	if (bind(s,&server.sa,sizeof(server)) == -1)
 | ||||
| +	if (bind(s,&server.sa,addrlen) == -1)
 | ||||
|  		{ | ||||
|  #ifdef SO_REUSEADDR | ||||
|  		err_num=get_last_socket_error(); | ||||
| @@ -740,7 +743,7 @@ again:
 | ||||
|  			if (cs != INVALID_SOCKET) | ||||
|  				{ | ||||
|  				int ii; | ||||
| -				ii=connect(cs,&client.sa,sizeof(client));
 | ||||
| +				ii=connect(cs,&client.sa,addrlen);
 | ||||
|  				closesocket(cs); | ||||
|  				if (ii == INVALID_SOCKET) | ||||
|  					{ | ||||
| diff -up openssl-1.0.0-beta4/crypto/bio/bss_dgram.c.backports2 openssl-1.0.0-beta4/crypto/bio/bss_dgram.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/bio/bss_dgram.c.backports2	2010-01-07 23:16:08.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/bio/bss_dgram.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -335,11 +335,21 @@ static int dgram_write(BIO *b, const cha
 | ||||
|  	if ( data->connected ) | ||||
|  		ret=writesocket(b->num,in,inl); | ||||
|  	else | ||||
| +		{
 | ||||
| +		int peerlen = sizeof(data->peer);
 | ||||
| +
 | ||||
| +		if (data->peer.sa.sa_family == AF_INET)
 | ||||
| +			peerlen = sizeof(data->peer.sa_in);
 | ||||
| +#if OPENSSL_USE_IVP6
 | ||||
| +		else if (data->peer.sa.sa_family == AF_INET6)
 | ||||
| +			peerlen = sizeof(data->peer.sa_in6);
 | ||||
| +#endif
 | ||||
|  #if defined(NETWARE_CLIB) && defined(NETWARE_BSDSOCK) | ||||
| -		ret=sendto(b->num, (char *)in, inl, 0, &data->peer.sa, sizeof(data->peer));
 | ||||
| +		ret=sendto(b->num, (char *)in, inl, 0, &data->peer.sa, peerlen);
 | ||||
|  #else | ||||
| -		ret=sendto(b->num, in, inl, 0, &data->peer.sa, sizeof(data->peer));
 | ||||
| +		ret=sendto(b->num, in, inl, 0, &data->peer.sa, peerlen);
 | ||||
|  #endif | ||||
| +		}
 | ||||
|   | ||||
|  	BIO_clear_retry_flags(b); | ||||
|  	if (ret <= 0) | ||||
| diff -up openssl-1.0.0-beta4/crypto/bn/bn_mul.c.backports2 openssl-1.0.0-beta4/crypto/bn/bn_mul.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/bn/bn_mul.c.backports2	2009-06-17 13:47:54.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/crypto/bn/bn_mul.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -1032,15 +1032,15 @@ int BN_mul(BIGNUM *r, const BIGNUM *a, c
 | ||||
|  				goto err; | ||||
|  			if (al > j || bl > j) | ||||
|  				{ | ||||
| -				bn_wexpand(t,k*4);
 | ||||
| -				bn_wexpand(rr,k*4);
 | ||||
| +				if (bn_wexpand(t,k*4) == NULL) goto err;
 | ||||
| +				if (bn_wexpand(rr,k*4) == NULL) goto err;
 | ||||
|  				bn_mul_part_recursive(rr->d,a->d,b->d, | ||||
|  					j,al-j,bl-j,t->d); | ||||
|  				} | ||||
|  			else	/* al <= j || bl <= j */ | ||||
|  				{ | ||||
| -				bn_wexpand(t,k*2);
 | ||||
| -				bn_wexpand(rr,k*2);
 | ||||
| +				if (bn_wexpand(t,k*2) == NULL) goto err;
 | ||||
| +				if (bn_wexpand(rr,k*2) == NULL) goto err;
 | ||||
|  				bn_mul_recursive(rr->d,a->d,b->d, | ||||
|  					j,al-j,bl-j,t->d); | ||||
|  				} | ||||
| diff -up openssl-1.0.0-beta4/crypto/dsa/dsa_pmeth.c.backports2 openssl-1.0.0-beta4/crypto/dsa/dsa_pmeth.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/dsa/dsa_pmeth.c.backports2	2009-09-02 17:51:28.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/crypto/dsa/dsa_pmeth.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -132,7 +132,7 @@ static int pkey_dsa_sign(EVP_PKEY_CTX *c
 | ||||
|   | ||||
|  	ret = DSA_sign(type, tbs, tbslen, sig, &sltmp, dsa); | ||||
|   | ||||
| -	if (ret < 0)
 | ||||
| +	if (ret <= 0)
 | ||||
|  		return ret; | ||||
|  	*siglen = sltmp; | ||||
|  	return 1; | ||||
| diff -up openssl-1.0.0-beta4/crypto/evp/digest.c.backports2 openssl-1.0.0-beta4/crypto/evp/digest.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/evp/digest.c.backports2	2010-01-07 23:16:07.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/evp/digest.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -127,7 +127,8 @@ EVP_MD_CTX *EVP_MD_CTX_create(void)
 | ||||
|  	{ | ||||
|  	EVP_MD_CTX *ctx=OPENSSL_malloc(sizeof *ctx); | ||||
|   | ||||
| -	EVP_MD_CTX_init(ctx);
 | ||||
| +	if (ctx)
 | ||||
| +		EVP_MD_CTX_init(ctx);
 | ||||
|   | ||||
|  	return ctx; | ||||
|  	} | ||||
| @@ -256,6 +257,12 @@ int EVP_DigestInit_ex(EVP_MD_CTX *ctx, c
 | ||||
|  			{ | ||||
|  			ctx->update = type->update; | ||||
|  			ctx->md_data=OPENSSL_malloc(type->ctx_size); | ||||
| +			if (ctx->md_data == NULL)
 | ||||
| +				{
 | ||||
| +				EVPerr(EVP_F_EVP_DIGESTINIT_EX,
 | ||||
| +							ERR_R_MALLOC_FAILURE);
 | ||||
| +				return 0;
 | ||||
| +				}
 | ||||
|  			} | ||||
|  		} | ||||
|  #ifndef OPENSSL_NO_ENGINE | ||||
| @@ -346,8 +353,17 @@ int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, 
 | ||||
|   | ||||
|  	if (in->md_data && out->digest->ctx_size) | ||||
|  		{ | ||||
| -		if (tmp_buf) out->md_data = tmp_buf;
 | ||||
| -		else out->md_data=OPENSSL_malloc(out->digest->ctx_size);
 | ||||
| +		if (tmp_buf)
 | ||||
| +			out->md_data = tmp_buf;
 | ||||
| +		else
 | ||||
| +			{
 | ||||
| +			out->md_data=OPENSSL_malloc(out->digest->ctx_size);
 | ||||
| +			if (!out->md_data)
 | ||||
| +				{
 | ||||
| +				EVPerr(EVP_F_EVP_MD_CTX_COPY_EX,ERR_R_MALLOC_FAILURE);
 | ||||
| +				return 0;
 | ||||
| +				}
 | ||||
| +			}
 | ||||
|  		memcpy(out->md_data,in->md_data,out->digest->ctx_size); | ||||
|  		} | ||||
|   | ||||
| diff -up openssl-1.0.0-beta4/crypto/evp/evp_err.c.backports2 openssl-1.0.0-beta4/crypto/evp/evp_err.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/evp/evp_err.c.backports2	2010-01-07 23:16:07.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/evp/evp_err.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -186,6 +186,8 @@ static ERR_STRING_DATA EVP_str_reasons[]
 | ||||
|  {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"}, | ||||
|  {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"}, | ||||
|  {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA)    ,"public key not rsa"}, | ||||
| +{ERR_REASON(EVP_R_UNKNOWN_CIPHER)        ,"unknown cipher"},
 | ||||
| +{ERR_REASON(EVP_R_UNKNOWN_DIGEST)        ,"unknown digest"},
 | ||||
|  {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"}, | ||||
|  {ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS),"unsuported number of rounds"}, | ||||
|  {ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) ,"unsupported algorithm"}, | ||||
| diff -up openssl-1.0.0-beta4/crypto/evp/evp.h.backports2 openssl-1.0.0-beta4/crypto/evp/evp.h
 | ||||
| --- openssl-1.0.0-beta4/crypto/evp/evp.h.backports2	2010-01-07 23:16:07.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/evp/evp.h	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -1275,6 +1275,8 @@ void ERR_load_EVP_strings(void);
 | ||||
|  #define EVP_R_PRIVATE_KEY_DECODE_ERROR			 145 | ||||
|  #define EVP_R_PRIVATE_KEY_ENCODE_ERROR			 146 | ||||
|  #define EVP_R_PUBLIC_KEY_NOT_RSA			 106 | ||||
| +#define EVP_R_UNKNOWN_CIPHER				 160
 | ||||
| +#define EVP_R_UNKNOWN_DIGEST				 161
 | ||||
|  #define EVP_R_UNKNOWN_PBE_ALGORITHM			 121 | ||||
|  #define EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS		 135 | ||||
|  #define EVP_R_UNSUPPORTED_ALGORITHM			 156 | ||||
| diff -up openssl-1.0.0-beta4/crypto/evp/evp_pbe.c.backports2 openssl-1.0.0-beta4/crypto/evp/evp_pbe.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/evp/evp_pbe.c.backports2	2008-11-05 19:38:57.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/evp/evp_pbe.c	2010-01-07 23:17:15.000000000 +0100
 | ||||
| @@ -174,12 +174,26 @@ int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_
 | ||||
|  	if (cipher_nid == -1) | ||||
|  		cipher = NULL; | ||||
|  	else | ||||
| +		{
 | ||||
|  		cipher = EVP_get_cipherbynid(cipher_nid); | ||||
| +		if (!cipher)
 | ||||
| +			{
 | ||||
| +			EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_CIPHER);
 | ||||
| +			return 0;
 | ||||
| +			}
 | ||||
| +		}
 | ||||
|   | ||||
|  	if (md_nid == -1) | ||||
|  		md = NULL; | ||||
|  	else | ||||
| +		{
 | ||||
|  		md = EVP_get_digestbynid(md_nid); | ||||
| +		if (!md)
 | ||||
| +			{
 | ||||
| +			EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_DIGEST);
 | ||||
| +			return 0;
 | ||||
| +			}
 | ||||
| +		}
 | ||||
|   | ||||
|  	if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) | ||||
|  		{ | ||||
| diff -up openssl-1.0.0-beta4/crypto/rsa/rsa_lib.c.backports2 openssl-1.0.0-beta4/crypto/rsa/rsa_lib.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/rsa/rsa_lib.c.backports2	2010-01-07 23:16:07.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/rsa/rsa_lib.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -208,7 +208,16 @@ RSA *RSA_new_method(ENGINE *engine)
 | ||||
|  	ret->mt_blinding=NULL; | ||||
|  	ret->bignum_data=NULL; | ||||
|  	ret->flags=ret->meth->flags; | ||||
| -	CRYPTO_new_ex_data(CRYPTO_EX_INDEX_RSA, ret, &ret->ex_data);
 | ||||
| +	if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_RSA, ret, &ret->ex_data))
 | ||||
| +		{
 | ||||
| +#ifndef OPENSSL_NO_ENGINE
 | ||||
| +	if (ret->engine)
 | ||||
| +		ENGINE_finish(ret->engine);
 | ||||
| +#endif
 | ||||
| +		OPENSSL_free(ret);
 | ||||
| +		return(NULL);
 | ||||
| +		}
 | ||||
| +
 | ||||
|  	if ((ret->meth->init != NULL) && !ret->meth->init(ret)) | ||||
|  		{ | ||||
|  #ifndef OPENSSL_NO_ENGINE | ||||
| diff -up openssl-1.0.0-beta4/crypto/x509/x509_lu.c.backports2 openssl-1.0.0-beta4/crypto/x509/x509_lu.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/x509/x509_lu.c.backports2	2009-10-18 16:42:27.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/crypto/x509/x509_lu.c	2010-01-07 23:16:08.000000000 +0100
 | ||||
| @@ -200,7 +200,13 @@ X509_STORE *X509_STORE_new(void)
 | ||||
|  	ret->lookup_crls = 0; | ||||
|  	ret->cleanup = 0; | ||||
|   | ||||
| -	CRYPTO_new_ex_data(CRYPTO_EX_INDEX_X509_STORE, ret, &ret->ex_data);
 | ||||
| +	if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_X509_STORE, ret, &ret->ex_data))
 | ||||
| +		{
 | ||||
| +		sk_X509_OBJECT_free(ret->objs);
 | ||||
| +		OPENSSL_free(ret);
 | ||||
| +		return NULL;
 | ||||
| +		}
 | ||||
| +
 | ||||
|  	ret->references=1; | ||||
|  	return ret; | ||||
|  	} | ||||
| @ -13,7 +13,7 @@ diff -up openssl-1.0.0-beta4/crypto/bio/b_sock.c.dtls-ipv6 openssl-1.0.0-beta4/c | ||||
|  		{ | ||||
| diff -up openssl-1.0.0-beta4/crypto/bio/bss_dgram.c.dtls-ipv6 openssl-1.0.0-beta4/crypto/bio/bss_dgram.c
 | ||||
| --- openssl-1.0.0-beta4/crypto/bio/bss_dgram.c.dtls-ipv6	2009-10-15 19:41:44.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/crypto/bio/bss_dgram.c	2009-11-23 08:50:45.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/crypto/bio/bss_dgram.c	2010-01-07 17:31:00.000000000 +0100
 | ||||
| @@ -108,11 +108,13 @@ static BIO_METHOD methods_dgramp=
 | ||||
|   | ||||
|  typedef struct bio_dgram_data_st | ||||
| @ -135,7 +135,7 @@ diff -up openssl-1.0.0-beta4/crypto/bio/bss_dgram.c.dtls-ipv6 openssl-1.0.0-beta | ||||
|  #if 0 | ||||
|  			} | ||||
|  #endif | ||||
| @@ -537,41 +543,60 @@ static long dgram_ctrl(BIO *b, int cmd, 
 | ||||
| @@ -537,41 +543,62 @@ static long dgram_ctrl(BIO *b, int cmd, 
 | ||||
|  		if ( to != NULL) | ||||
|  			{ | ||||
|  			data->connected = 1; | ||||
| @ -170,12 +170,12 @@ diff -up openssl-1.0.0-beta4/crypto/bio/bss_dgram.c.dtls-ipv6 openssl-1.0.0-beta | ||||
|  			} | ||||
|  		break; | ||||
|  	case BIO_CTRL_DGRAM_GET_PEER: | ||||
|  		to = (struct sockaddr *) ptr; | ||||
| -		to = (struct sockaddr *) ptr;
 | ||||
| -
 | ||||
| +		switch (to->sa_family)
 | ||||
| +		switch (data->peer.sa.sa_family)
 | ||||
| +			{
 | ||||
| +			case AF_INET:
 | ||||
| +				memcpy(to,&data->peer,(ret=sizeof(data->peer.sa_in)));
 | ||||
| +				ret=sizeof(data->peer.sa_in);
 | ||||
| +				break;
 | ||||
|  #if OPENSSL_USE_IPV6 | ||||
| -		memcpy(to, &(data->peer), sizeof(struct sockaddr_storage));
 | ||||
| @ -185,13 +185,16 @@ diff -up openssl-1.0.0-beta4/crypto/bio/bss_dgram.c.dtls-ipv6 openssl-1.0.0-beta | ||||
| -		ret = sizeof(struct sockaddr_in);
 | ||||
| -#endif
 | ||||
| +			case AF_INET6:
 | ||||
| +				memcpy(to,&data->peer,(ret=sizeof(data->peer.sa_in6)));
 | ||||
| +				ret=sizeof(data->peer.sa_in6);
 | ||||
| +				break;
 | ||||
| +#endif
 | ||||
| +			default:
 | ||||
| +				memcpy(to,&data->peer,(ret=sizeof(data->peer.sa)));
 | ||||
| +				ret=sizeof(data->peer.sa);
 | ||||
| +				break;
 | ||||
| +			}
 | ||||
| +		if (num==0 || num>ret)
 | ||||
| +			num=ret;
 | ||||
| +		memcpy(ptr,&data->peer,(ret=num));
 | ||||
|  		break; | ||||
|  	case BIO_CTRL_DGRAM_SET_PEER: | ||||
|  		to = (struct sockaddr *) ptr; | ||||
|  | ||||
							
								
								
									
										571
									
								
								openssl-1.0.0-beta4-dtls-reneg.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										571
									
								
								openssl-1.0.0-beta4-dtls-reneg.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,571 @@ | ||||
| diff -up openssl-1.0.0-beta4/ssl/d1_both.c.dtls-reneg openssl-1.0.0-beta4/ssl/d1_both.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/d1_both.c.dtls-reneg	2009-11-02 14:37:17.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/d1_both.c	2010-01-07 17:35:19.000000000 +0100
 | ||||
| @@ -764,6 +764,24 @@ int dtls1_send_finished(SSL *s, int a, i
 | ||||
|  		p+=i; | ||||
|  		l=i; | ||||
|   | ||||
| +	/* Copy the finished so we can use it for
 | ||||
| +	 * renegotiation checks
 | ||||
| +	 */
 | ||||
| +	if(s->type == SSL_ST_CONNECT)
 | ||||
| +		{
 | ||||
| +		OPENSSL_assert(i <= EVP_MAX_MD_SIZE);
 | ||||
| +		memcpy(s->s3->previous_client_finished, 
 | ||||
| +		       s->s3->tmp.finish_md, i);
 | ||||
| +		s->s3->previous_client_finished_len=i;
 | ||||
| +		}
 | ||||
| +	else
 | ||||
| +		{
 | ||||
| +		OPENSSL_assert(i <= EVP_MAX_MD_SIZE);
 | ||||
| +		memcpy(s->s3->previous_server_finished, 
 | ||||
| +		       s->s3->tmp.finish_md, i);
 | ||||
| +		s->s3->previous_server_finished_len=i;
 | ||||
| +		}
 | ||||
| +
 | ||||
|  #ifdef OPENSSL_SYS_WIN16 | ||||
|  		/* MSVC 1.5 does not clear the top bytes of the word unless | ||||
|  		 * I do this. | ||||
| diff -up openssl-1.0.0-beta4/ssl/d1_clnt.c.dtls-reneg openssl-1.0.0-beta4/ssl/d1_clnt.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/d1_clnt.c.dtls-reneg	2009-07-24 13:52:32.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/ssl/d1_clnt.c	2010-01-07 17:44:55.000000000 +0100
 | ||||
| @@ -286,16 +286,44 @@ int dtls1_connect(SSL *s)
 | ||||
|   | ||||
|  		case SSL3_ST_CR_CERT_A: | ||||
|  		case SSL3_ST_CR_CERT_B: | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +			ret=ssl3_check_finished(s);
 | ||||
| +			if (ret <= 0) goto end;
 | ||||
| +			if (ret == 2)
 | ||||
| +				{
 | ||||
| +				s->hit = 1;
 | ||||
| +				if (s->tlsext_ticket_expected)
 | ||||
| +					s->state=SSL3_ST_CR_SESSION_TICKET_A;
 | ||||
| +				else
 | ||||
| +					s->state=SSL3_ST_CR_FINISHED_A;
 | ||||
| +				s->init_num=0;
 | ||||
| +				break;
 | ||||
| +				}
 | ||||
| +#endif
 | ||||
|  			/* Check if it is anon DH or PSK */ | ||||
|  			if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && | ||||
|  			    !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) | ||||
|  				{ | ||||
|  				ret=ssl3_get_server_certificate(s); | ||||
|  				if (ret <= 0) goto end; | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +				if (s->tlsext_status_expected)
 | ||||
| +					s->state=SSL3_ST_CR_CERT_STATUS_A;
 | ||||
| +				else
 | ||||
| +					s->state=SSL3_ST_CR_KEY_EXCH_A;
 | ||||
| +				}
 | ||||
| +			else
 | ||||
| +				{
 | ||||
| +				skip = 1;
 | ||||
| +				s->state=SSL3_ST_CR_KEY_EXCH_A;
 | ||||
| +				}
 | ||||
| +#else
 | ||||
|  				} | ||||
|  			else | ||||
|  				skip=1; | ||||
| +
 | ||||
|  			s->state=SSL3_ST_CR_KEY_EXCH_A; | ||||
| +#endif
 | ||||
|  			s->init_num=0; | ||||
|  			break; | ||||
|   | ||||
| @@ -437,11 +465,36 @@ int dtls1_connect(SSL *s)
 | ||||
|  				} | ||||
|  			else | ||||
|  				{ | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +				/* Allow NewSessionTicket if ticket expected */
 | ||||
| +				if (s->tlsext_ticket_expected)
 | ||||
| +					s->s3->tmp.next_state=SSL3_ST_CR_SESSION_TICKET_A;
 | ||||
| +				else
 | ||||
| +#endif
 | ||||
| +				
 | ||||
|  				s->s3->tmp.next_state=SSL3_ST_CR_FINISHED_A; | ||||
|  				} | ||||
|  			s->init_num=0; | ||||
|  			break; | ||||
|   | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +		case SSL3_ST_CR_SESSION_TICKET_A:
 | ||||
| +		case SSL3_ST_CR_SESSION_TICKET_B:
 | ||||
| +			ret=ssl3_get_new_session_ticket(s);
 | ||||
| +			if (ret <= 0) goto end;
 | ||||
| +			s->state=SSL3_ST_CR_FINISHED_A;
 | ||||
| +			s->init_num=0;
 | ||||
| +		break;
 | ||||
| +
 | ||||
| +		case SSL3_ST_CR_CERT_STATUS_A:
 | ||||
| +		case SSL3_ST_CR_CERT_STATUS_B:
 | ||||
| +			ret=ssl3_get_cert_status(s);
 | ||||
| +			if (ret <= 0) goto end;
 | ||||
| +			s->state=SSL3_ST_CR_KEY_EXCH_A;
 | ||||
| +			s->init_num=0;
 | ||||
| +		break;
 | ||||
| +#endif
 | ||||
| +
 | ||||
|  		case SSL3_ST_CR_FINISHED_A: | ||||
|  		case SSL3_ST_CR_FINISHED_B: | ||||
|  			s->d1->change_cipher_spec_ok = 1; | ||||
| @@ -554,8 +607,14 @@ int dtls1_client_hello(SSL *s)
 | ||||
|  	buf=(unsigned char *)s->init_buf->data; | ||||
|  	if (s->state == SSL3_ST_CW_CLNT_HELLO_A) | ||||
|  		{ | ||||
| +		SSL_SESSION *sess = s->session;
 | ||||
|  		if ((s->session == NULL) || | ||||
|  			(s->session->ssl_version != s->version) || | ||||
| +#ifdef OPENSSL_NO_TLSEXT
 | ||||
| +			!sess->session_id_length ||
 | ||||
| +#else
 | ||||
| +			(!sess->session_id_length && !sess->tlsext_tick) ||
 | ||||
| +#endif
 | ||||
|  			(s->session->not_resumable)) | ||||
|  			{ | ||||
|  			if (!ssl_get_new_session(s,0)) | ||||
| @@ -635,7 +694,15 @@ int dtls1_client_hello(SSL *s)
 | ||||
|  			*(p++)=comp->id; | ||||
|  			} | ||||
|  		*(p++)=0; /* Add the NULL method */ | ||||
| -		
 | ||||
| +
 | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +		if ((p = ssl_add_clienthello_tlsext(s, p, buf+SSL3_RT_MAX_PLAIN_LENGTH)) == NULL)
 | ||||
| +			{
 | ||||
| +			SSLerr(SSL_F_SSL3_CLIENT_HELLO,ERR_R_INTERNAL_ERROR);
 | ||||
| +			goto err;
 | ||||
| +			}
 | ||||
| +#endif		
 | ||||
| +
 | ||||
|  		l=(p-d); | ||||
|  		d=buf; | ||||
|   | ||||
| diff -up openssl-1.0.0-beta4/ssl/d1_lib.c.dtls-reneg openssl-1.0.0-beta4/ssl/d1_lib.c
 | ||||
| diff -up openssl-1.0.0-beta4/ssl/d1_srvr.c.dtls-reneg openssl-1.0.0-beta4/ssl/d1_srvr.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/d1_srvr.c.dtls-reneg	2009-09-09 19:05:42.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/ssl/d1_srvr.c	2010-01-07 17:44:55.000000000 +0100
 | ||||
| @@ -305,8 +305,18 @@ int dtls1_accept(SSL *s)
 | ||||
|  			ret=dtls1_send_server_hello(s); | ||||
|  			if (ret <= 0) goto end; | ||||
|   | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
|  			if (s->hit) | ||||
| -				s->state=SSL3_ST_SW_CHANGE_A;
 | ||||
| +				{
 | ||||
| +				if (s->tlsext_ticket_expected)
 | ||||
| +					s->state=SSL3_ST_SW_SESSION_TICKET_A;
 | ||||
| +				else
 | ||||
| +					s->state=SSL3_ST_SW_CHANGE_A;
 | ||||
| +				}
 | ||||
| +#else
 | ||||
| +			if (s->hit)
 | ||||
| +					s->state=SSL3_ST_SW_CHANGE_A;
 | ||||
| +#endif
 | ||||
|  			else | ||||
|  				s->state=SSL3_ST_SW_CERT_A; | ||||
|  			s->init_num=0; | ||||
| @@ -321,10 +331,24 @@ int dtls1_accept(SSL *s)
 | ||||
|  				dtls1_start_timer(s); | ||||
|  				ret=dtls1_send_server_certificate(s); | ||||
|  				if (ret <= 0) goto end; | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +				if (s->tlsext_status_expected)
 | ||||
| +					s->state=SSL3_ST_SW_CERT_STATUS_A;
 | ||||
| +				else
 | ||||
| +					s->state=SSL3_ST_SW_KEY_EXCH_A;
 | ||||
| +				}
 | ||||
| +			else
 | ||||
| +				{
 | ||||
| +				skip = 1;
 | ||||
| +				s->state=SSL3_ST_SW_KEY_EXCH_A;
 | ||||
| +				}
 | ||||
| +#else
 | ||||
|  				} | ||||
|  			else | ||||
|  				skip=1; | ||||
| +
 | ||||
|  			s->state=SSL3_ST_SW_KEY_EXCH_A; | ||||
| +#endif
 | ||||
|  			s->init_num=0; | ||||
|  			break; | ||||
|   | ||||
| @@ -519,11 +543,34 @@ int dtls1_accept(SSL *s)
 | ||||
|  			dtls1_stop_timer(s); | ||||
|  			if (s->hit) | ||||
|  				s->state=SSL_ST_OK; | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +			else if (s->tlsext_ticket_expected)
 | ||||
| +				s->state=SSL3_ST_SW_SESSION_TICKET_A;
 | ||||
| +#endif
 | ||||
|  			else | ||||
|  				s->state=SSL3_ST_SW_CHANGE_A; | ||||
|  			s->init_num=0; | ||||
|  			break; | ||||
|   | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +		case SSL3_ST_SW_SESSION_TICKET_A:
 | ||||
| +		case SSL3_ST_SW_SESSION_TICKET_B:
 | ||||
| +			ret=dtls1_send_newsession_ticket(s);
 | ||||
| +			if (ret <= 0) goto end;
 | ||||
| +			s->state=SSL3_ST_SW_CHANGE_A;
 | ||||
| +			s->init_num=0;
 | ||||
| +			break;
 | ||||
| +
 | ||||
| +		case SSL3_ST_SW_CERT_STATUS_A:
 | ||||
| +		case SSL3_ST_SW_CERT_STATUS_B:
 | ||||
| +			ret=ssl3_send_cert_status(s);
 | ||||
| +			if (ret <= 0) goto end;
 | ||||
| +			s->state=SSL3_ST_SW_KEY_EXCH_A;
 | ||||
| +			s->init_num=0;
 | ||||
| +			break;
 | ||||
| +
 | ||||
| +#endif
 | ||||
| +
 | ||||
|  		case SSL3_ST_SW_CHANGE_A: | ||||
|  		case SSL3_ST_SW_CHANGE_B: | ||||
|   | ||||
| @@ -749,6 +796,8 @@ int dtls1_send_server_hello(SSL *s)
 | ||||
|  		p+=sl; | ||||
|   | ||||
|  		/* put the cipher */ | ||||
| +		if (s->s3->tmp.new_cipher == NULL)
 | ||||
| +			return -1;
 | ||||
|  		i=ssl3_put_cipher_by_char(s->s3->tmp.new_cipher,p); | ||||
|  		p+=i; | ||||
|   | ||||
| @@ -762,6 +811,14 @@ int dtls1_send_server_hello(SSL *s)
 | ||||
|  			*(p++)=s->s3->tmp.new_compression->id; | ||||
|  #endif | ||||
|   | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +		if ((p = ssl_add_serverhello_tlsext(s, p, buf+SSL3_RT_MAX_PLAIN_LENGTH)) == NULL)
 | ||||
| +			{
 | ||||
| +			SSLerr(SSL_F_SSL3_SEND_SERVER_HELLO,ERR_R_INTERNAL_ERROR);
 | ||||
| +			return -1;
 | ||||
| +			}
 | ||||
| +#endif
 | ||||
| +
 | ||||
|  		/* do the header */ | ||||
|  		l=(p-d); | ||||
|  		d=buf; | ||||
| @@ -1384,3 +1441,114 @@ int dtls1_send_server_certificate(SSL *s
 | ||||
|  	/* SSL3_ST_SW_CERT_B */ | ||||
|  	return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); | ||||
|  	} | ||||
| +
 | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +int dtls1_send_newsession_ticket(SSL *s)
 | ||||
| +	{
 | ||||
| +	if (s->state == SSL3_ST_SW_SESSION_TICKET_A)
 | ||||
| +		{
 | ||||
| +		unsigned char *p, *senc, *macstart;
 | ||||
| +		int len, slen;
 | ||||
| +		unsigned int hlen, msg_len;
 | ||||
| +		EVP_CIPHER_CTX ctx;
 | ||||
| +		HMAC_CTX hctx;
 | ||||
| +		SSL_CTX *tctx = s->initial_ctx;
 | ||||
| +		unsigned char iv[EVP_MAX_IV_LENGTH];
 | ||||
| +		unsigned char key_name[16];
 | ||||
| +
 | ||||
| +		/* get session encoding length */
 | ||||
| +		slen = i2d_SSL_SESSION(s->session, NULL);
 | ||||
| +		/* Some length values are 16 bits, so forget it if session is
 | ||||
| + 		 * too long
 | ||||
| + 		 */
 | ||||
| +		if (slen > 0xFF00)
 | ||||
| +			return -1;
 | ||||
| +		/* Grow buffer if need be: the length calculation is as
 | ||||
| + 		 * follows 12 (DTLS handshake message header) +
 | ||||
| + 		 * 4 (ticket lifetime hint) + 2 (ticket length) +
 | ||||
| + 		 * 16 (key name) + max_iv_len (iv length) +
 | ||||
| + 		 * session_length + max_enc_block_size (max encrypted session
 | ||||
| + 		 * length) + max_md_size (HMAC).
 | ||||
| + 		 */
 | ||||
| +		if (!BUF_MEM_grow(s->init_buf,
 | ||||
| +			DTLS1_HM_HEADER_LENGTH + 22 + EVP_MAX_IV_LENGTH +
 | ||||
| +			EVP_MAX_BLOCK_LENGTH + EVP_MAX_MD_SIZE + slen))
 | ||||
| +			return -1;
 | ||||
| +		senc = OPENSSL_malloc(slen);
 | ||||
| +		if (!senc)
 | ||||
| +			return -1;
 | ||||
| +		p = senc;
 | ||||
| +		i2d_SSL_SESSION(s->session, &p);
 | ||||
| +
 | ||||
| +		p=(unsigned char *)&(s->init_buf->data[DTLS1_HM_HEADER_LENGTH]);
 | ||||
| +		EVP_CIPHER_CTX_init(&ctx);
 | ||||
| +		HMAC_CTX_init(&hctx);
 | ||||
| +		/* Initialize HMAC and cipher contexts. If callback present
 | ||||
| +		 * it does all the work otherwise use generated values
 | ||||
| +		 * from parent ctx.
 | ||||
| +		 */
 | ||||
| +		if (tctx->tlsext_ticket_key_cb)
 | ||||
| +			{
 | ||||
| +			if (tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx,
 | ||||
| +							 &hctx, 1) < 0)
 | ||||
| +				{
 | ||||
| +				OPENSSL_free(senc);
 | ||||
| +				return -1;
 | ||||
| +				}
 | ||||
| +			}
 | ||||
| +		else
 | ||||
| +			{
 | ||||
| +			RAND_pseudo_bytes(iv, 16);
 | ||||
| +			EVP_EncryptInit_ex(&ctx, EVP_aes_128_cbc(), NULL,
 | ||||
| +					tctx->tlsext_tick_aes_key, iv);
 | ||||
| +			HMAC_Init_ex(&hctx, tctx->tlsext_tick_hmac_key, 16,
 | ||||
| +					tlsext_tick_md(), NULL);
 | ||||
| +			memcpy(key_name, tctx->tlsext_tick_key_name, 16);
 | ||||
| +			}
 | ||||
| +		l2n(s->session->tlsext_tick_lifetime_hint, p);
 | ||||
| +		/* Skip ticket length for now */
 | ||||
| +		p += 2;
 | ||||
| +		/* Output key name */
 | ||||
| +		macstart = p;
 | ||||
| +		memcpy(p, key_name, 16);
 | ||||
| +		p += 16;
 | ||||
| +		/* output IV */
 | ||||
| +		memcpy(p, iv, EVP_CIPHER_CTX_iv_length(&ctx));
 | ||||
| +		p += EVP_CIPHER_CTX_iv_length(&ctx);
 | ||||
| +		/* Encrypt session data */
 | ||||
| +		EVP_EncryptUpdate(&ctx, p, &len, senc, slen);
 | ||||
| +		p += len;
 | ||||
| +		EVP_EncryptFinal(&ctx, p, &len);
 | ||||
| +		p += len;
 | ||||
| +		EVP_CIPHER_CTX_cleanup(&ctx);
 | ||||
| +
 | ||||
| +		HMAC_Update(&hctx, macstart, p - macstart);
 | ||||
| +		HMAC_Final(&hctx, p, &hlen);
 | ||||
| +		HMAC_CTX_cleanup(&hctx);
 | ||||
| +
 | ||||
| +		p += hlen;
 | ||||
| +		/* Now write out lengths: p points to end of data written */
 | ||||
| +		/* Total length */
 | ||||
| +		len = p - (unsigned char *)&(s->init_buf->data[DTLS1_HM_HEADER_LENGTH]);
 | ||||
| +		p=(unsigned char *)&(s->init_buf->data[DTLS1_HM_HEADER_LENGTH]) + 4;
 | ||||
| +		s2n(len - 18, p);  /* Ticket length */
 | ||||
| +
 | ||||
| +		/* number of bytes to write */
 | ||||
| +		s->init_num= len;
 | ||||
| +		s->state=SSL3_ST_SW_SESSION_TICKET_B;
 | ||||
| +		s->init_off=0;
 | ||||
| +		OPENSSL_free(senc);
 | ||||
| +
 | ||||
| +		/* XDTLS:  set message header ? */
 | ||||
| +		msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH;
 | ||||
| +		dtls1_set_message_header(s, (void *)s->init_buf->data,
 | ||||
| +			SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len);
 | ||||
| +
 | ||||
| +		/* buffer the message to handle re-xmits */
 | ||||
| +		dtls1_buffer_message(s, 0);
 | ||||
| +		}
 | ||||
| +
 | ||||
| +	/* SSL3_ST_SW_SESSION_TICKET_B */
 | ||||
| +	return(dtls1_do_write(s,SSL3_RT_HANDSHAKE));
 | ||||
| +	}
 | ||||
| +#endif
 | ||||
| diff -up openssl-1.0.0-beta4/ssl/ssl_locl.h.dtls-reneg openssl-1.0.0-beta4/ssl/ssl_locl.h
 | ||||
| --- openssl-1.0.0-beta4/ssl/ssl_locl.h.dtls-reneg	2009-11-23 08:36:03.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/ssl_locl.h	2010-01-07 17:44:55.000000000 +0100
 | ||||
| @@ -933,7 +933,7 @@ void dtls1_start_timer(SSL *s);
 | ||||
|  void dtls1_stop_timer(SSL *s); | ||||
|  int dtls1_is_timer_expired(SSL *s); | ||||
|  void dtls1_double_timeout(SSL *s); | ||||
| -
 | ||||
| +int dtls1_send_newsession_ticket(SSL *s);
 | ||||
|   | ||||
|  /* some client-only functions */ | ||||
|  int ssl3_client_hello(SSL *s); | ||||
| @@ -949,6 +949,9 @@ int ssl3_send_client_key_exchange(SSL *s
 | ||||
|  int ssl3_get_key_exchange(SSL *s); | ||||
|  int ssl3_get_server_certificate(SSL *s); | ||||
|  int ssl3_check_cert_and_algorithm(SSL *s); | ||||
| +#ifndef OPENSSL_NO_TLSEXT
 | ||||
| +int ssl3_check_finished(SSL *s);
 | ||||
| +#endif
 | ||||
|   | ||||
|  int dtls1_client_hello(SSL *s); | ||||
|  int dtls1_send_client_certificate(SSL *s); | ||||
| @@ -1030,6 +1033,7 @@ int ssl_prepare_clienthello_tlsext(SSL *
 | ||||
|  int ssl_prepare_serverhello_tlsext(SSL *s); | ||||
|  int ssl_check_clienthello_tlsext(SSL *s); | ||||
|  int ssl_check_serverhello_tlsext(SSL *s); | ||||
| +
 | ||||
|  #ifdef OPENSSL_NO_SHA256 | ||||
|  #define tlsext_tick_md	EVP_sha1 | ||||
|  #else | ||||
| diff -up openssl-1.0.0-beta4/ssl/s3_clnt.c.dtls-reneg openssl-1.0.0-beta4/ssl/s3_clnt.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/s3_clnt.c.dtls-reneg	2009-11-23 08:36:04.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/s3_clnt.c	2010-01-07 17:44:55.000000000 +0100
 | ||||
| @@ -170,9 +170,6 @@
 | ||||
|   | ||||
|  static const SSL_METHOD *ssl3_get_client_method(int ver); | ||||
|  static int ca_dn_cmp(const X509_NAME * const *a,const X509_NAME * const *b); | ||||
| -#ifndef OPENSSL_NO_TLSEXT
 | ||||
| -static int ssl3_check_finished(SSL *s);
 | ||||
| -#endif
 | ||||
|   | ||||
|  static const SSL_METHOD *ssl3_get_client_method(int ver) | ||||
|  	{ | ||||
| @@ -1827,6 +1824,7 @@ int ssl3_get_new_session_ticket(SSL *s)
 | ||||
|  		SSLerr(SSL_F_SSL3_GET_NEW_SESSION_TICKET,SSL_R_LENGTH_MISMATCH); | ||||
|  		goto f_err; | ||||
|  		} | ||||
| +
 | ||||
|  	p=d=(unsigned char *)s->init_msg; | ||||
|  	n2l(p, s->session->tlsext_tick_lifetime_hint); | ||||
|  	n2s(p, ticklen); | ||||
| @@ -2991,7 +2989,7 @@ err:
 | ||||
|   */ | ||||
|   | ||||
|  #ifndef OPENSSL_NO_TLSEXT | ||||
| -static int ssl3_check_finished(SSL *s)
 | ||||
| +int ssl3_check_finished(SSL *s)
 | ||||
|  	{ | ||||
|  	int ok; | ||||
|  	long n; | ||||
| diff -up openssl-1.0.0-beta4/ssl/t1_lib.c.dtls-reneg openssl-1.0.0-beta4/ssl/t1_lib.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/t1_lib.c.dtls-reneg	2009-11-23 08:36:04.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/t1_lib.c	2010-01-07 17:44:55.000000000 +0100
 | ||||
| @@ -340,7 +340,8 @@ unsigned char *ssl_add_clienthello_tlsex
 | ||||
|          } | ||||
|   | ||||
|  #ifndef OPENSSL_NO_EC | ||||
| -	if (s->tlsext_ecpointformatlist != NULL)
 | ||||
| +	if (s->tlsext_ecpointformatlist != NULL &&
 | ||||
| +	    s->version != DTLS1_VERSION)
 | ||||
|  		{ | ||||
|  		/* Add TLS extension ECPointFormats to the ClientHello message */ | ||||
|  		long lenmax;  | ||||
| @@ -359,7 +360,8 @@ unsigned char *ssl_add_clienthello_tlsex
 | ||||
|  		memcpy(ret, s->tlsext_ecpointformatlist, s->tlsext_ecpointformatlist_length); | ||||
|  		ret+=s->tlsext_ecpointformatlist_length; | ||||
|  		} | ||||
| -	if (s->tlsext_ellipticcurvelist != NULL)
 | ||||
| +	if (s->tlsext_ellipticcurvelist != NULL &&
 | ||||
| +	    s->version != DTLS1_VERSION)
 | ||||
|  		{ | ||||
|  		/* Add TLS extension EllipticCurves to the ClientHello message */ | ||||
|  		long lenmax;  | ||||
| @@ -423,7 +425,8 @@ unsigned char *ssl_add_clienthello_tlsex
 | ||||
|  		skip_ext: | ||||
|   | ||||
|  #ifdef TLSEXT_TYPE_opaque_prf_input | ||||
| -	if (s->s3->client_opaque_prf_input != NULL)
 | ||||
| +	if (s->s3->client_opaque_prf_input != NULL &&
 | ||||
| +	    s->version != DTLS1_VERSION)
 | ||||
|  		{ | ||||
|  		size_t col = s->s3->client_opaque_prf_input_len; | ||||
|  		 | ||||
| @@ -440,7 +443,8 @@ unsigned char *ssl_add_clienthello_tlsex
 | ||||
|  		} | ||||
|  #endif | ||||
|   | ||||
| -	if (s->tlsext_status_type == TLSEXT_STATUSTYPE_ocsp)
 | ||||
| +	if (s->tlsext_status_type == TLSEXT_STATUSTYPE_ocsp &&
 | ||||
| +	    s->version != DTLS1_VERSION)
 | ||||
|  		{ | ||||
|  		int i; | ||||
|  		long extlen, idlen, itmp; | ||||
| @@ -515,7 +519,7 @@ unsigned char *ssl_add_serverhello_tlsex
 | ||||
|  		s2n(0,ret); | ||||
|  		} | ||||
|   | ||||
| -        if(s->s3->send_connection_binding)
 | ||||
| +	if(s->s3->send_connection_binding)
 | ||||
|          { | ||||
|            int el; | ||||
|             | ||||
| @@ -540,7 +544,8 @@ unsigned char *ssl_add_serverhello_tlsex
 | ||||
|          } | ||||
|   | ||||
|  #ifndef OPENSSL_NO_EC | ||||
| -	if (s->tlsext_ecpointformatlist != NULL)
 | ||||
| +	if (s->tlsext_ecpointformatlist != NULL &&
 | ||||
| +	    s->version != DTLS1_VERSION)
 | ||||
|  		{ | ||||
|  		/* Add TLS extension ECPointFormats to the ServerHello message */ | ||||
|  		long lenmax;  | ||||
| @@ -579,7 +584,8 @@ unsigned char *ssl_add_serverhello_tlsex
 | ||||
|  		} | ||||
|   | ||||
|  #ifdef TLSEXT_TYPE_opaque_prf_input | ||||
| -	if (s->s3->server_opaque_prf_input != NULL)
 | ||||
| +	if (s->s3->server_opaque_prf_input != NULL &&
 | ||||
| +	    s->version != DTLS1_VERSION)
 | ||||
|  		{ | ||||
|  		size_t sol = s->s3->server_opaque_prf_input_len; | ||||
|  		 | ||||
| @@ -757,7 +763,8 @@ int ssl_parse_clienthello_tlsext(SSL *s,
 | ||||
|  			} | ||||
|   | ||||
|  #ifndef OPENSSL_NO_EC | ||||
| -		else if (type == TLSEXT_TYPE_ec_point_formats)
 | ||||
| +		else if (type == TLSEXT_TYPE_ec_point_formats &&
 | ||||
| +	             s->version != DTLS1_VERSION)
 | ||||
|  			{ | ||||
|  			unsigned char *sdata = data; | ||||
|  			int ecpointformatlist_length = *(sdata++); | ||||
| @@ -784,7 +791,8 @@ int ssl_parse_clienthello_tlsext(SSL *s,
 | ||||
|  			fprintf(stderr,"\n"); | ||||
|  #endif | ||||
|  			} | ||||
| -		else if (type == TLSEXT_TYPE_elliptic_curves)
 | ||||
| +		else if (type == TLSEXT_TYPE_elliptic_curves &&
 | ||||
| +	             s->version != DTLS1_VERSION)
 | ||||
|  			{ | ||||
|  			unsigned char *sdata = data; | ||||
|  			int ellipticcurvelist_length = (*(sdata++) << 8); | ||||
| @@ -814,7 +822,8 @@ int ssl_parse_clienthello_tlsext(SSL *s,
 | ||||
|  			} | ||||
|  #endif /* OPENSSL_NO_EC */ | ||||
|  #ifdef TLSEXT_TYPE_opaque_prf_input | ||||
| -		else if (type == TLSEXT_TYPE_opaque_prf_input)
 | ||||
| +		else if (type == TLSEXT_TYPE_opaque_prf_input &&
 | ||||
| +	             s->version != DTLS1_VERSION)
 | ||||
|  			{ | ||||
|  			unsigned char *sdata = data; | ||||
|   | ||||
| @@ -858,8 +867,8 @@ int ssl_parse_clienthello_tlsext(SSL *s,
 | ||||
|  				return 0; | ||||
|  			renegotiate_seen = 1; | ||||
|  			} | ||||
| -		else if (type == TLSEXT_TYPE_status_request
 | ||||
| -						&& s->ctx->tlsext_status_cb)
 | ||||
| +		else if (type == TLSEXT_TYPE_status_request &&
 | ||||
| +		         s->version != DTLS1_VERSION && s->ctx->tlsext_status_cb)
 | ||||
|  			{ | ||||
|  		 | ||||
|  			if (size < 5)  | ||||
| @@ -1027,7 +1036,8 @@ int ssl_parse_serverhello_tlsext(SSL *s,
 | ||||
|  			} | ||||
|   | ||||
|  #ifndef OPENSSL_NO_EC | ||||
| -		else if (type == TLSEXT_TYPE_ec_point_formats)
 | ||||
| +		else if (type == TLSEXT_TYPE_ec_point_formats &&
 | ||||
| +	             s->version != DTLS1_VERSION)
 | ||||
|  			{ | ||||
|  			unsigned char *sdata = data; | ||||
|  			int ecpointformatlist_length = *(sdata++); | ||||
| @@ -1073,7 +1083,8 @@ int ssl_parse_serverhello_tlsext(SSL *s,
 | ||||
|  			s->tlsext_ticket_expected = 1; | ||||
|  			} | ||||
|  #ifdef TLSEXT_TYPE_opaque_prf_input | ||||
| -		else if (type == TLSEXT_TYPE_opaque_prf_input)
 | ||||
| +		else if (type == TLSEXT_TYPE_opaque_prf_input &&
 | ||||
| +	             s->version != DTLS1_VERSION)
 | ||||
|  			{ | ||||
|  			unsigned char *sdata = data; | ||||
|   | ||||
| @@ -1103,7 +1114,8 @@ int ssl_parse_serverhello_tlsext(SSL *s,
 | ||||
|  				} | ||||
|  			} | ||||
|  #endif | ||||
| -		else if (type == TLSEXT_TYPE_status_request)
 | ||||
| +		else if (type == TLSEXT_TYPE_status_request &&
 | ||||
| +		         s->version != DTLS1_VERSION)
 | ||||
|  			{ | ||||
|  			/* MUST be empty and only sent if we've requested | ||||
|  			 * a status request message. | ||||
							
								
								
									
										793
									
								
								openssl-1.0.0-beta4-reneg-scsv.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										793
									
								
								openssl-1.0.0-beta4-reneg-scsv.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,793 @@ | ||||
| diff -up openssl-1.0.0-beta4/apps/s_client.c.scsv openssl-1.0.0-beta4/apps/s_client.c
 | ||||
| --- openssl-1.0.0-beta4/apps/s_client.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/apps/s_client.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -382,7 +382,7 @@ int MAIN(int, char **);
 | ||||
|   | ||||
|  int MAIN(int argc, char **argv) | ||||
|  	{ | ||||
| -	int off=0;
 | ||||
| +	unsigned int off=0, clr=0;
 | ||||
|  	SSL *con=NULL; | ||||
|  	int s,k,width,state=0; | ||||
|  	char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL; | ||||
| @@ -660,6 +660,10 @@ int MAIN(int argc, char **argv)
 | ||||
|  			off|=SSL_OP_CIPHER_SERVER_PREFERENCE; | ||||
|  		else if (strcmp(*argv,"-legacy_renegotiation") == 0) | ||||
|  			off|=SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION; | ||||
| +		else if	(strcmp(*argv,"-legacy_server_connect") == 0)
 | ||||
| +			{ off|=SSL_OP_LEGACY_SERVER_CONNECT; }
 | ||||
| +		else if	(strcmp(*argv,"-no_legacy_server_connect") == 0)
 | ||||
| +			{ clr|=SSL_OP_LEGACY_SERVER_CONNECT; }
 | ||||
|  		else if	(strcmp(*argv,"-cipher") == 0) | ||||
|  			{ | ||||
|  			if (--argc < 1) goto bad; | ||||
| @@ -870,6 +874,9 @@ bad:
 | ||||
|  		SSL_CTX_set_options(ctx,SSL_OP_ALL|off); | ||||
|  	else | ||||
|  		SSL_CTX_set_options(ctx,off); | ||||
| +
 | ||||
| +	if (clr)
 | ||||
| +		SSL_CTX_clear_options(ctx, clr);
 | ||||
|  	/* DTLS: partial reads end up discarding unread UDP bytes :-(  | ||||
|  	 * Setting read ahead solves this problem. | ||||
|  	 */ | ||||
| @@ -1725,6 +1732,8 @@ static void print_stuff(BIO *bio, SSL *s
 | ||||
|  							 EVP_PKEY_bits(pktmp)); | ||||
|  		EVP_PKEY_free(pktmp); | ||||
|  	} | ||||
| +	BIO_printf(bio, "Secure Renegotiation IS%s supported\n",
 | ||||
| +			SSL_get_secure_renegotiation_support(s) ? "" : " NOT");
 | ||||
|  #ifndef OPENSSL_NO_COMP | ||||
|  	comp=SSL_get_current_compression(s); | ||||
|  	expansion=SSL_get_current_expansion(s); | ||||
| diff -up openssl-1.0.0-beta4/apps/s_server.c.scsv openssl-1.0.0-beta4/apps/s_server.c
 | ||||
| --- openssl-1.0.0-beta4/apps/s_server.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/apps/s_server.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -2212,6 +2212,8 @@ static int init_ssl_connection(SSL *con)
 | ||||
|  			con->kssl_ctx->client_princ); | ||||
|  		} | ||||
|  #endif /* OPENSSL_NO_KRB5 */ | ||||
| +	BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
 | ||||
| +		      SSL_get_secure_renegotiation_support(con) ? "" : " NOT");
 | ||||
|  	return(1); | ||||
|  	} | ||||
|   | ||||
| diff -up openssl-1.0.0-beta4/doc/ssl/SSL_CTX_set_options.pod.scsv openssl-1.0.0-beta4/doc/ssl/SSL_CTX_set_options.pod
 | ||||
| --- openssl-1.0.0-beta4/doc/ssl/SSL_CTX_set_options.pod.scsv	2007-08-24 00:49:13.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/doc/ssl/SSL_CTX_set_options.pod	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -2,7 +2,7 @@
 | ||||
|   | ||||
|  =head1 NAME | ||||
|   | ||||
| -SSL_CTX_set_options, SSL_set_options, SSL_CTX_get_options, SSL_get_options - manipulate SSL engine options
 | ||||
| +SSL_CTX_set_options, SSL_set_options, SSL_CTX_clear_options, SSL_clear_options, SSL_CTX_get_options, SSL_get_options, SSL_get_secure_renegotiation_support - manipulate SSL options
 | ||||
|   | ||||
|  =head1 SYNOPSIS | ||||
|   | ||||
| @@ -11,26 +11,41 @@ SSL_CTX_set_options, SSL_set_options, SS
 | ||||
|   long SSL_CTX_set_options(SSL_CTX *ctx, long options); | ||||
|   long SSL_set_options(SSL *ssl, long options); | ||||
|   | ||||
| + long SSL_CTX_clear_options(SSL_CTX *ctx, long options);
 | ||||
| + long SSL_clear_options(SSL *ssl, long options);
 | ||||
| +
 | ||||
|   long SSL_CTX_get_options(SSL_CTX *ctx); | ||||
|   long SSL_get_options(SSL *ssl); | ||||
|   | ||||
| + long SSL_get_secure_renegotiation_support(SSL *ssl);
 | ||||
| +
 | ||||
|  =head1 DESCRIPTION | ||||
|   | ||||
| +Note: all these functions are implemented using macros.
 | ||||
| +
 | ||||
|  SSL_CTX_set_options() adds the options set via bitmask in B<options> to B<ctx>. | ||||
|  Options already set before are not cleared! | ||||
|   | ||||
|  SSL_set_options() adds the options set via bitmask in B<options> to B<ssl>. | ||||
|  Options already set before are not cleared! | ||||
|   | ||||
| +SSL_CTX_clear_options() clears the options set via bitmask in B<options>
 | ||||
| +to B<ctx>.
 | ||||
| +
 | ||||
| +SSL_clear_options() clears the options set via bitmask in B<options> to B<ssl>.
 | ||||
| +
 | ||||
|  SSL_CTX_get_options() returns the options set for B<ctx>. | ||||
|   | ||||
|  SSL_get_options() returns the options set for B<ssl>. | ||||
|   | ||||
| +SSL_get_secure_renegotiation_support() indicates whether the peer supports
 | ||||
| +secure renegotiation.
 | ||||
| +
 | ||||
|  =head1 NOTES | ||||
|   | ||||
|  The behaviour of the SSL library can be changed by setting several options. | ||||
|  The options are coded as bitmasks and can be combined by a logical B<or> | ||||
| -operation (|). Options can only be added but can never be reset.
 | ||||
| +operation (|).
 | ||||
|   | ||||
|  SSL_CTX_set_options() and SSL_set_options() affect the (external) | ||||
|  protocol behaviour of the SSL library. The (internal) behaviour of | ||||
| @@ -199,7 +214,7 @@ Do not use the TLSv1 protocol.
 | ||||
|   | ||||
|  When performing renegotiation as a server, always start a new session | ||||
|  (i.e., session resumption requests are only accepted in the initial | ||||
| -handshake).  This option is not needed for clients.
 | ||||
| +handshake). This option is not needed for clients.
 | ||||
|   | ||||
|  =item SSL_OP_NO_TICKET | ||||
|   | ||||
| @@ -209,15 +224,63 @@ of RFC4507bis tickets for stateless sess
 | ||||
|  If this option is set this functionality is disabled and tickets will | ||||
|  not be used by clients or servers. | ||||
|   | ||||
| +=item SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
 | ||||
| +
 | ||||
| +See the B<SECURE RENEGOTIATION> section for a discussion of the purpose of
 | ||||
| +this option
 | ||||
| +
 | ||||
|  =back | ||||
|   | ||||
| +=head1 SECURE RENEGOTIATION
 | ||||
| +
 | ||||
| +OpenSSL 0.9.8m and later always attempts to use secure renegotiation as
 | ||||
| +described in draft-ietf-tls-renegotiation (FIXME: replace by RFC). This
 | ||||
| +counters a prefix attack described in the draft and elsewhere (FIXME: need full
 | ||||
| +reference).
 | ||||
| +
 | ||||
| +This attack has far reaching consequences which application writers should be
 | ||||
| +aware of. In the description below an implementation supporting secure
 | ||||
| +renegotiation is referred to as I<patched>. A server not supporting secure
 | ||||
| +renegotiation is referred to as I<unpatched>.
 | ||||
| +
 | ||||
| +If an unpatched client attempts to connect to a patched OpenSSL server then
 | ||||
| +the attempt will succeed but renegotiation is not permitted. As required
 | ||||
| +by the standard a B<no_renegotiation> alert is sent back to the client if
 | ||||
| +the TLS v1.0 protocol is used. If SSLv3.0 is used then renegotiation results
 | ||||
| +in a fatal B<handshake_failed> alert.
 | ||||
| +
 | ||||
| +If a patched OpenSSL client attempts to connect to an unpatched server
 | ||||
| +then the connection will fail because it is not possible to determine
 | ||||
| +whether an attack is taking place.
 | ||||
| +
 | ||||
| +If the option B<SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION> is set then the
 | ||||
| +above restrictions are relaxed. Renegotiation is permissible and initial
 | ||||
| +connections to unpatched servers will succeed.
 | ||||
| +
 | ||||
| +This option should be used with caution because it leaves both clients and
 | ||||
| +servers vulnerable. However unpatched servers and clients are likely to be
 | ||||
| +around for some time and refusing to connect to unpatched servers or denying
 | ||||
| +renegotion altogether may be unacceptable. So applications may be forced to
 | ||||
| +tolerate unsafe renegotiation for the immediate future.
 | ||||
| +
 | ||||
| +The function SSL_get_secure_renegotiation_support() indicates whether the peer
 | ||||
| +supports secure renegotiation. 
 | ||||
| +
 | ||||
| +The deprecated SSLv2 protocol does not support secure renegotiation at all.
 | ||||
| +
 | ||||
|  =head1 RETURN VALUES | ||||
|   | ||||
|  SSL_CTX_set_options() and SSL_set_options() return the new options bitmask | ||||
|  after adding B<options>. | ||||
|   | ||||
| +SSL_CTX_clear_options() and SSL_clear_options() return the new options bitmask
 | ||||
| +after clearing B<options>.
 | ||||
| +
 | ||||
|  SSL_CTX_get_options() and SSL_get_options() return the current bitmask. | ||||
|   | ||||
| +SSL_get_secure_renegotiation_support() returns 1 is the peer supports
 | ||||
| +secure renegotiation and 0 if it does not.
 | ||||
| +
 | ||||
|  =head1 SEE ALSO | ||||
|   | ||||
|  L<ssl(3)|ssl(3)>, L<SSL_new(3)|SSL_new(3)>, L<SSL_clear(3)|SSL_clear(3)>, | ||||
| @@ -240,4 +303,10 @@ Versions up to OpenSSL 0.9.6c do not inc
 | ||||
|  can be disabled with this option (in OpenSSL 0.9.6d, it was always | ||||
|  enabled). | ||||
|   | ||||
| +SSL_CTX_clear_options() and SSL_clear_options() were first added in OpenSSL
 | ||||
| +0.9.8m.
 | ||||
| +
 | ||||
| +B<SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION> was first added in OpenSSL
 | ||||
| +0.9.8m.
 | ||||
| +
 | ||||
|  =cut | ||||
| diff -up openssl-1.0.0-beta4/ssl/d1_clnt.c.scsv openssl-1.0.0-beta4/ssl/d1_clnt.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/d1_clnt.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/d1_clnt.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -698,7 +698,7 @@ int dtls1_client_hello(SSL *s)
 | ||||
|  #ifndef OPENSSL_NO_TLSEXT | ||||
|  		if ((p = ssl_add_clienthello_tlsext(s, p, buf+SSL3_RT_MAX_PLAIN_LENGTH)) == NULL) | ||||
|  			{ | ||||
| -			SSLerr(SSL_F_SSL3_CLIENT_HELLO,ERR_R_INTERNAL_ERROR);
 | ||||
| +			SSLerr(SSL_F_DTLS1_CLIENT_HELLO,ERR_R_INTERNAL_ERROR);
 | ||||
|  			goto err; | ||||
|  			} | ||||
|  #endif		 | ||||
| diff -up openssl-1.0.0-beta4/ssl/d1_srvr.c.scsv openssl-1.0.0-beta4/ssl/d1_srvr.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/d1_srvr.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/d1_srvr.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -814,7 +814,7 @@ int dtls1_send_server_hello(SSL *s)
 | ||||
|  #ifndef OPENSSL_NO_TLSEXT | ||||
|  		if ((p = ssl_add_serverhello_tlsext(s, p, buf+SSL3_RT_MAX_PLAIN_LENGTH)) == NULL) | ||||
|  			{ | ||||
| -			SSLerr(SSL_F_SSL3_SEND_SERVER_HELLO,ERR_R_INTERNAL_ERROR);
 | ||||
| +			SSLerr(SSL_F_DTLS1_SEND_SERVER_HELLO,ERR_R_INTERNAL_ERROR);
 | ||||
|  			return -1; | ||||
|  			} | ||||
|  #endif | ||||
| diff -up openssl-1.0.0-beta4/ssl/ssl_err.c.scsv openssl-1.0.0-beta4/ssl/ssl_err.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/ssl_err.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/ssl_err.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -414,6 +414,7 @@ static ERR_STRING_DATA SSL_str_reasons[]
 | ||||
|  {ERR_REASON(SSL_R_NO_PRIVATE_KEY_ASSIGNED),"no private key assigned"}, | ||||
|  {ERR_REASON(SSL_R_NO_PROTOCOLS_AVAILABLE),"no protocols available"}, | ||||
|  {ERR_REASON(SSL_R_NO_PUBLICKEY)          ,"no publickey"}, | ||||
| +{ERR_REASON(SSL_R_NO_RENEGOTIATION)      ,"no renegotiation"},
 | ||||
|  {ERR_REASON(SSL_R_NO_REQUIRED_DIGEST)    ,"digest requred for handshake isn't computed"}, | ||||
|  {ERR_REASON(SSL_R_NO_SHARED_CIPHER)      ,"no shared cipher"}, | ||||
|  {ERR_REASON(SSL_R_NO_VERIFY_CALLBACK)    ,"no verify callback"}, | ||||
| @@ -453,6 +454,7 @@ static ERR_STRING_DATA SSL_str_reasons[]
 | ||||
|  {ERR_REASON(SSL_R_REUSE_CERT_LENGTH_NOT_ZERO),"reuse cert length not zero"}, | ||||
|  {ERR_REASON(SSL_R_REUSE_CERT_TYPE_NOT_ZERO),"reuse cert type not zero"}, | ||||
|  {ERR_REASON(SSL_R_REUSE_CIPHER_LIST_NOT_ZERO),"reuse cipher list not zero"}, | ||||
| +{ERR_REASON(SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING),"scsv received when renegotiating"},
 | ||||
|  {ERR_REASON(SSL_R_SERVERHELLO_TLSEXT)    ,"serverhello tlsext"}, | ||||
|  {ERR_REASON(SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED),"session id context uninitialized"}, | ||||
|  {ERR_REASON(SSL_R_SHORT_READ)            ,"short read"}, | ||||
| diff -up openssl-1.0.0-beta4/ssl/ssl.h.scsv openssl-1.0.0-beta4/ssl/ssl.h
 | ||||
| --- openssl-1.0.0-beta4/ssl/ssl.h.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/ssl.h	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -511,6 +511,8 @@ typedef struct ssl_session_st
 | ||||
|   | ||||
|  #define SSL_OP_MICROSOFT_SESS_ID_BUG			0x00000001L | ||||
|  #define SSL_OP_NETSCAPE_CHALLENGE_BUG			0x00000002L | ||||
| +/* Allow initial connection to servers that don't support RI */
 | ||||
| +#define SSL_OP_LEGACY_SERVER_CONNECT			0x00000004L
 | ||||
|  #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG		0x00000008L /* can break some security expectations */ | ||||
|  #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG		0x00000010L | ||||
|  #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER		0x00000020L | ||||
| @@ -518,7 +520,6 @@ typedef struct ssl_session_st
 | ||||
|  #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG			0x00000080L | ||||
|  #define SSL_OP_TLS_D5_BUG				0x00000100L | ||||
|  #define SSL_OP_TLS_BLOCK_PADDING_BUG			0x00000200L | ||||
| -#define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION	0x00000400L
 | ||||
|   | ||||
|  /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added | ||||
|   * in OpenSSL 0.9.6d.  Usually (depending on the application protocol) | ||||
| @@ -544,6 +545,8 @@ typedef struct ssl_session_st
 | ||||
|  #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION	0x00010000L | ||||
|  /* Don't use compression even if supported */ | ||||
|  #define SSL_OP_NO_COMPRESSION				0x00020000L | ||||
| +/* Permit unsafe legacy renegotiation */
 | ||||
| +#define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION	0x00040000L
 | ||||
|  /* If set, always create a new key when using tmp_ecdh parameters */ | ||||
|  #define SSL_OP_SINGLE_ECDH_USE				0x00080000L | ||||
|  /* If set, always create a new key when using tmp_dh parameters */ | ||||
| @@ -599,17 +602,25 @@ typedef struct ssl_session_st
 | ||||
|   | ||||
|  #define SSL_CTX_set_options(ctx,op) \ | ||||
|  	SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,(op),NULL) | ||||
| +#define SSL_CTX_clear_options(ctx,op) \
 | ||||
| +	SSL_CTX_ctrl((ctx),SSL_CTRL_CLEAR_OPTIONS,(op),NULL)
 | ||||
|  #define SSL_CTX_get_options(ctx) \ | ||||
|  	SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,0,NULL) | ||||
|  #define SSL_set_options(ssl,op) \ | ||||
|  	SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL) | ||||
| +#define SSL_clear_options(ssl,op) \
 | ||||
| +	SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL)
 | ||||
|  #define SSL_get_options(ssl) \ | ||||
|          SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL) | ||||
|   | ||||
|  #define SSL_CTX_set_mode(ctx,op) \ | ||||
|  	SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,(op),NULL) | ||||
| +#define SSL_CTX_clear_mode(ctx,op) \
 | ||||
| +	SSL_CTX_ctrl((ctx),SSL_CTRL_CLEAR_MODE,(op),NULL)
 | ||||
|  #define SSL_CTX_get_mode(ctx) \ | ||||
|  	SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,0,NULL) | ||||
| +#define SSL_clear_mode(ssl,op) \
 | ||||
| +	SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL)
 | ||||
|  #define SSL_set_mode(ssl,op) \ | ||||
|  	SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL) | ||||
|  #define SSL_get_mode(ssl) \ | ||||
| @@ -617,6 +628,8 @@ typedef struct ssl_session_st
 | ||||
|  #define SSL_set_mtu(ssl, mtu) \ | ||||
|          SSL_ctrl((ssl),SSL_CTRL_SET_MTU,(mtu),NULL) | ||||
|   | ||||
| +#define SSL_get_secure_renegotiation_support(ssl) \
 | ||||
| +	SSL_ctrl((ssl), SSL_CTRL_GET_RI_SUPPORT, 0, NULL)
 | ||||
|   | ||||
|  void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); | ||||
|  void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); | ||||
| @@ -1389,6 +1402,10 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION)
 | ||||
|  #define DTLS_CTRL_HANDLE_TIMEOUT	74 | ||||
|  #define DTLS_CTRL_LISTEN			75 | ||||
|   | ||||
| +#define SSL_CTRL_GET_RI_SUPPORT			76
 | ||||
| +#define SSL_CTRL_CLEAR_OPTIONS			77
 | ||||
| +#define SSL_CTRL_CLEAR_MODE			78
 | ||||
| +
 | ||||
|  #define DTLSv1_get_timeout(ssl, arg) \ | ||||
|  	SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg) | ||||
|  #define DTLSv1_handle_timeout(ssl) \ | ||||
| @@ -2119,6 +2136,7 @@ void ERR_load_SSL_strings(void);
 | ||||
|  #define SSL_R_NO_PRIVATE_KEY_ASSIGNED			 190 | ||||
|  #define SSL_R_NO_PROTOCOLS_AVAILABLE			 191 | ||||
|  #define SSL_R_NO_PUBLICKEY				 192 | ||||
| +#define SSL_R_NO_RENEGOTIATION				 339
 | ||||
|  #define SSL_R_NO_REQUIRED_DIGEST			 324 | ||||
|  #define SSL_R_NO_SHARED_CIPHER				 193 | ||||
|  #define SSL_R_NO_VERIFY_CALLBACK			 194 | ||||
| @@ -2158,6 +2176,7 @@ void ERR_load_SSL_strings(void);
 | ||||
|  #define SSL_R_REUSE_CERT_LENGTH_NOT_ZERO		 216 | ||||
|  #define SSL_R_REUSE_CERT_TYPE_NOT_ZERO			 217 | ||||
|  #define SSL_R_REUSE_CIPHER_LIST_NOT_ZERO		 218 | ||||
| +#define SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING		 345
 | ||||
|  #define SSL_R_SERVERHELLO_TLSEXT			 275 | ||||
|  #define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED		 277 | ||||
|  #define SSL_R_SHORT_READ				 219 | ||||
| diff -up openssl-1.0.0-beta4/ssl/ssl_lib.c.scsv openssl-1.0.0-beta4/ssl/ssl_lib.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/ssl_lib.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/ssl_lib.c	2010-01-07 23:38:08.000000000 +0100
 | ||||
| @@ -1041,8 +1041,12 @@ long SSL_ctrl(SSL *s,int cmd,long larg,v
 | ||||
|   | ||||
|  	case SSL_CTRL_OPTIONS: | ||||
|  		return(s->options|=larg); | ||||
| +	case SSL_CTRL_CLEAR_OPTIONS:
 | ||||
| +		return(s->options&=~larg);
 | ||||
|  	case SSL_CTRL_MODE: | ||||
|  		return(s->mode|=larg); | ||||
| +	case SSL_CTRL_CLEAR_MODE:
 | ||||
| +		return(s->mode &=~larg);
 | ||||
|  	case SSL_CTRL_GET_MAX_CERT_LIST: | ||||
|  		return(s->max_cert_list); | ||||
|  	case SSL_CTRL_SET_MAX_CERT_LIST: | ||||
| @@ -1062,6 +1066,10 @@ long SSL_ctrl(SSL *s,int cmd,long larg,v
 | ||||
|  			return 0; | ||||
|  		s->max_send_fragment = larg; | ||||
|  		return 1; | ||||
| +	case SSL_CTRL_GET_RI_SUPPORT:
 | ||||
| +		if (s->s3)
 | ||||
| +			return s->s3->send_connection_binding;
 | ||||
| +		else return 0;
 | ||||
|  	default: | ||||
|  		return(s->method->ssl_ctrl(s,cmd,larg,parg)); | ||||
|  		} | ||||
| @@ -1148,8 +1156,12 @@ long SSL_CTX_ctrl(SSL_CTX *ctx,int cmd,l
 | ||||
|  		return(ctx->stats.sess_cache_full); | ||||
|  	case SSL_CTRL_OPTIONS: | ||||
|  		return(ctx->options|=larg); | ||||
| +	case SSL_CTRL_CLEAR_OPTIONS:
 | ||||
| +		return(ctx->options&=~larg);
 | ||||
|  	case SSL_CTRL_MODE: | ||||
|  		return(ctx->mode|=larg); | ||||
| +	case SSL_CTRL_CLEAR_MODE:
 | ||||
| +		return(ctx->mode&=~larg);
 | ||||
|  	case SSL_CTRL_SET_MAX_SEND_FRAGMENT: | ||||
|  		if (larg < 512 || larg > SSL3_RT_MAX_PLAIN_LENGTH) | ||||
|  			return 0; | ||||
| @@ -1357,6 +1369,22 @@ int ssl_cipher_list_to_bytes(SSL *s,STAC
 | ||||
|  		j = put_cb ? put_cb(c,p) : ssl_put_cipher_by_char(s,c,p); | ||||
|  		p+=j; | ||||
|  		} | ||||
| +	/* If p == q, no ciphers and caller indicates an error. Otherwise
 | ||||
| +	 * add SCSV if not renegotiating.
 | ||||
| +	 */
 | ||||
| +	if (p != q && !s->new_session)
 | ||||
| +		{
 | ||||
| +		static SSL_CIPHER scsv =
 | ||||
| +			{
 | ||||
| +			0, NULL, SSL3_CK_SCSV, 0, 0, 0, 0, 0, 0, 0, 0, 0
 | ||||
| +			};
 | ||||
| +		j = put_cb ? put_cb(&scsv,p) : ssl_put_cipher_by_char(s,&scsv,p);
 | ||||
| +		p+=j;
 | ||||
| +#ifdef OPENSSL_RI_DEBUG
 | ||||
| +		fprintf(stderr, "SCSV sent by client\n");
 | ||||
| +#endif
 | ||||
| +		}
 | ||||
| +
 | ||||
|  	return(p-q); | ||||
|  	} | ||||
|   | ||||
| @@ -1366,6 +1394,8 @@ STACK_OF(SSL_CIPHER) *ssl_bytes_to_ciphe
 | ||||
|  	const SSL_CIPHER *c; | ||||
|  	STACK_OF(SSL_CIPHER) *sk; | ||||
|  	int i,n; | ||||
| +	if (s->s3)
 | ||||
| +		s->s3->send_connection_binding = 0;
 | ||||
|   | ||||
|  	n=ssl_put_cipher_by_char(s,NULL,NULL); | ||||
|  	if ((num%n) != 0) | ||||
| @@ -1383,6 +1413,26 @@ STACK_OF(SSL_CIPHER) *ssl_bytes_to_ciphe
 | ||||
|   | ||||
|  	for (i=0; i<num; i+=n) | ||||
|  		{ | ||||
| +		/* Check for SCSV */
 | ||||
| +		if (s->s3 && (n != 3 || !p[0]) &&
 | ||||
| +			(p[n-2] == ((SSL3_CK_SCSV >> 8) & 0xff)) &&
 | ||||
| +			(p[n-1] == (SSL3_CK_SCSV & 0xff)))
 | ||||
| +			{
 | ||||
| +			/* SCSV fatal if renegotiating */
 | ||||
| +			if (s->new_session)
 | ||||
| +				{
 | ||||
| +				SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST,SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING);
 | ||||
| +				ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_HANDSHAKE_FAILURE); 
 | ||||
| +				goto err;
 | ||||
| +				}
 | ||||
| +			s->s3->send_connection_binding = 1;
 | ||||
| +			p += n;
 | ||||
| +#ifdef OPENSSL_RI_DEBUG
 | ||||
| +			fprintf(stderr, "SCSV received by server\n");
 | ||||
| +#endif
 | ||||
| +			continue;
 | ||||
| +			}
 | ||||
| +
 | ||||
|  		c=ssl_get_cipher_by_char(s,p); | ||||
|  		p+=n; | ||||
|  		if (c != NULL) | ||||
| @@ -1642,6 +1692,10 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *m
 | ||||
|  	} | ||||
|  #endif | ||||
|  #endif | ||||
| +	/* Default is to connect to non-RI servers. When RI is more widely
 | ||||
| +	 * deployed might change this.
 | ||||
| +	 */
 | ||||
| +	ret->options = SSL_OP_LEGACY_SERVER_CONNECT;
 | ||||
|   | ||||
|  	return(ret); | ||||
|  err: | ||||
| diff -up openssl-1.0.0-beta4/ssl/ssl3.h.scsv openssl-1.0.0-beta4/ssl/ssl3.h
 | ||||
| --- openssl-1.0.0-beta4/ssl/ssl3.h.scsv	2010-01-07 23:37:38.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/ssl3.h	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -128,6 +128,9 @@
 | ||||
|  extern "C" { | ||||
|  #endif | ||||
|   | ||||
| +/* Signalling cipher suite value: from draft-ietf-tls-renegotiation-03.txt */
 | ||||
| +#define SSL3_CK_SCSV				0x030000FF
 | ||||
| +
 | ||||
|  #define SSL3_CK_RSA_NULL_MD5			0x03000001 | ||||
|  #define SSL3_CK_RSA_NULL_SHA			0x03000002 | ||||
|  #define SSL3_CK_RSA_RC4_40_MD5 			0x03000003 | ||||
| diff -up openssl-1.0.0-beta4/ssl/s3_clnt.c.scsv openssl-1.0.0-beta4/ssl/s3_clnt.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/s3_clnt.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/s3_clnt.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -916,7 +916,7 @@ int ssl3_get_server_hello(SSL *s)
 | ||||
|   | ||||
|  #ifndef OPENSSL_NO_TLSEXT | ||||
|  	/* TLS extensions*/ | ||||
| -	if (s->version > SSL3_VERSION)
 | ||||
| +	if (s->version >= SSL3_VERSION)
 | ||||
|  		{ | ||||
|  		if (!ssl_parse_serverhello_tlsext(s,&p,d,n, &al)) | ||||
|  			{ | ||||
| diff -up openssl-1.0.0-beta4/ssl/s3_pkt.c.scsv openssl-1.0.0-beta4/ssl/s3_pkt.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/s3_pkt.c.scsv	2009-07-14 17:28:44.000000000 +0200
 | ||||
| +++ openssl-1.0.0-beta4/ssl/s3_pkt.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -1120,7 +1120,25 @@ start:
 | ||||
|  		 * now try again to obtain the (application) data we were asked for */ | ||||
|  		goto start; | ||||
|  		} | ||||
| -
 | ||||
| +	/* If we are a server and get a client hello when renegotiation isn't
 | ||||
| +	 * allowed send back a no renegotiation alert and carry on.
 | ||||
| +	 * WARNING: experimental code, needs reviewing (steve)
 | ||||
| +	 */
 | ||||
| +	if (s->server &&
 | ||||
| +		SSL_is_init_finished(s) &&
 | ||||
| +    		!s->s3->send_connection_binding &&
 | ||||
| +		(s->version > SSL3_VERSION) &&
 | ||||
| +		(s->s3->handshake_fragment_len >= 4) &&
 | ||||
| +		(s->s3->handshake_fragment[0] == SSL3_MT_CLIENT_HELLO) &&
 | ||||
| +		(s->session != NULL) && (s->session->cipher != NULL) &&
 | ||||
| +		!(s->ctx->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
 | ||||
| +		
 | ||||
| +		{
 | ||||
| +		/*s->s3->handshake_fragment_len = 0;*/
 | ||||
| +		rr->length = 0;
 | ||||
| +		ssl3_send_alert(s,SSL3_AL_WARNING, SSL_AD_NO_RENEGOTIATION);
 | ||||
| +		goto start;
 | ||||
| +		}
 | ||||
|  	if (s->s3->alert_fragment_len >= 2) | ||||
|  		{ | ||||
|  		int alert_level = s->s3->alert_fragment[0]; | ||||
| @@ -1150,6 +1168,21 @@ start:
 | ||||
|  				s->shutdown |= SSL_RECEIVED_SHUTDOWN; | ||||
|  				return(0); | ||||
|  				} | ||||
| +			/* This is a warning but we receive it if we requested
 | ||||
| +			 * renegotiation and the peer denied it. Terminate with
 | ||||
| +			 * a fatal alert because if application tried to
 | ||||
| +			 * renegotiatie it presumably had a good reason and
 | ||||
| +			 * expects it to succeed.
 | ||||
| +			 *
 | ||||
| +			 * In future we might have a renegotiation where we
 | ||||
| +			 * don't care if the peer refused it where we carry on.
 | ||||
| +			 */
 | ||||
| +			else if (alert_descr == SSL_AD_NO_RENEGOTIATION)
 | ||||
| +				{
 | ||||
| +				al = SSL_AD_HANDSHAKE_FAILURE;
 | ||||
| +				SSLerr(SSL_F_SSL3_READ_BYTES,SSL_R_NO_RENEGOTIATION);
 | ||||
| +				goto f_err;
 | ||||
| +				}
 | ||||
|  			} | ||||
|  		else if (alert_level == 2) /* fatal */ | ||||
|  			{ | ||||
| diff -up openssl-1.0.0-beta4/ssl/s3_srvr.c.scsv openssl-1.0.0-beta4/ssl/s3_srvr.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/s3_srvr.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/s3_srvr.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -1015,7 +1015,7 @@ int ssl3_get_client_hello(SSL *s)
 | ||||
|   | ||||
|  #ifndef OPENSSL_NO_TLSEXT | ||||
|  	/* TLS extensions*/ | ||||
| -	if (s->version > SSL3_VERSION)
 | ||||
| +	if (s->version >= SSL3_VERSION)
 | ||||
|  		{ | ||||
|  		if (!ssl_parse_clienthello_tlsext(s,&p,d,n, &al)) | ||||
|  			{ | ||||
| diff -up openssl-1.0.0-beta4/ssl/t1_lib.c.scsv openssl-1.0.0-beta4/ssl/t1_lib.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/t1_lib.c.scsv	2010-01-07 23:37:39.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/t1_lib.c	2010-01-07 23:38:08.000000000 +0100
 | ||||
| @@ -275,8 +275,9 @@ unsigned char *ssl_add_clienthello_tlsex
 | ||||
|  	int extdatalen=0; | ||||
|  	unsigned char *ret = p; | ||||
|   | ||||
| -	/* don't add extensions for SSLv3 */
 | ||||
| -	if (s->client_version == SSL3_VERSION)
 | ||||
| +	/* don't add extensions for SSLv3 unless doing secure renegotiation */
 | ||||
| +	if (s->client_version == SSL3_VERSION
 | ||||
| +					&& !s->s3->send_connection_binding)
 | ||||
|  		return p; | ||||
|   | ||||
|  	ret+=2; | ||||
| @@ -315,8 +316,9 @@ unsigned char *ssl_add_clienthello_tlsex
 | ||||
|  		ret+=size_str; | ||||
|  		} | ||||
|   | ||||
| -        /* Add the renegotiation option: TODOEKR switch */
 | ||||
| -        {
 | ||||
| +        /* Add RI if renegotiating */
 | ||||
| +        if (s->new_session)
 | ||||
| +          {
 | ||||
|            int el; | ||||
|             | ||||
|            if(!ssl_add_clienthello_renegotiate_ext(s, 0, &el, 0)) | ||||
| @@ -504,8 +506,8 @@ unsigned char *ssl_add_serverhello_tlsex
 | ||||
|  	int extdatalen=0; | ||||
|  	unsigned char *ret = p; | ||||
|   | ||||
| -	/* don't add extensions for SSLv3 */
 | ||||
| -	if (s->version == SSL3_VERSION)
 | ||||
| +	/* don't add extensions for SSLv3, unless doing secure renegotiation */
 | ||||
| +	if (s->version == SSL3_VERSION && !s->s3->send_connection_binding)
 | ||||
|  		return p; | ||||
|  	 | ||||
|  	ret+=2; | ||||
| @@ -633,24 +635,13 @@ int ssl_parse_clienthello_tlsext(SSL *s,
 | ||||
|   | ||||
|  	s->servername_done = 0; | ||||
|  	s->tlsext_status_type = -1; | ||||
| -	s->s3->send_connection_binding = 0;
 | ||||
|   | ||||
|  	if (data >= (d+n-2)) | ||||
| -		{
 | ||||
| -		if (s->new_session
 | ||||
| -			&& !(s->ctx->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
 | ||||
| -			{
 | ||||
| -			/* We should always see one extension: the renegotiate extension */
 | ||||
| -			*al = SSL_AD_ILLEGAL_PARAMETER; /* is this the right alert? */
 | ||||
| -			SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_TLSEXT, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);
 | ||||
| -			return 0;
 | ||||
| -			}
 | ||||
| -		return 1;
 | ||||
| -		}
 | ||||
| +		goto ri_check;
 | ||||
|  	n2s(data,len); | ||||
|   | ||||
|  	if (data > (d+n-len))  | ||||
| -		return 1;
 | ||||
| +		goto ri_check;
 | ||||
|   | ||||
|  	while (data <= (d+n-4)) | ||||
|  		{ | ||||
| @@ -658,7 +649,7 @@ int ssl_parse_clienthello_tlsext(SSL *s,
 | ||||
|  		n2s(data,size); | ||||
|   | ||||
|  		if (data+size > (d+n)) | ||||
| -	   		return 1;
 | ||||
| +	   		goto ri_check;
 | ||||
|  #if 0 | ||||
|  		fprintf(stderr,"Received extension type %d size %d\n",type,size); | ||||
|  #endif | ||||
| @@ -971,17 +962,22 @@ int ssl_parse_clienthello_tlsext(SSL *s,
 | ||||
|  		/* session ticket processed earlier */ | ||||
|  		data+=size; | ||||
|  		} | ||||
| -  
 | ||||
| - 	if (s->new_session && !renegotiate_seen
 | ||||
| - 		&& !(s->ctx->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
 | ||||
| - 		{
 | ||||
| -		SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_TLSEXT, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);
 | ||||
| - 		*al = SSL_AD_ILLEGAL_PARAMETER; /* is this the right alert? */
 | ||||
| - 		return 0;
 | ||||
| - 		}
 | ||||
| - 
 | ||||
|  				 | ||||
|  	*p = data; | ||||
| +
 | ||||
| +	ri_check:
 | ||||
| +
 | ||||
| +	/* Need RI if renegotiating */
 | ||||
| +
 | ||||
| +	if (!renegotiate_seen && s->new_session &&
 | ||||
| +		!(s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
 | ||||
| +		{
 | ||||
| +		*al = SSL_AD_HANDSHAKE_FAILURE;
 | ||||
| +	 	SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_TLSEXT,
 | ||||
| +				SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);
 | ||||
| +		return 0;
 | ||||
| +		}
 | ||||
| +
 | ||||
|  	return 1; | ||||
|  	} | ||||
|   | ||||
| @@ -995,21 +991,7 @@ int ssl_parse_serverhello_tlsext(SSL *s,
 | ||||
|  	int renegotiate_seen = 0; | ||||
|   | ||||
|  	if (data >= (d+n-2)) | ||||
| -		{
 | ||||
| -#if 0
 | ||||
| -		/* Because the client does not see any renegotiation during an
 | ||||
| -		   attack, we must enforce this on all server hellos, even the
 | ||||
| -		   first */
 | ||||
| -		if (!(s->ctx->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
 | ||||
| -			{
 | ||||
| -			/* We should always see one extension: the renegotiate extension */
 | ||||
| -			*al = SSL_AD_ILLEGAL_PARAMETER; /* is this the right alert? */
 | ||||
| -			SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);
 | ||||
| -			return 0;
 | ||||
| -			}
 | ||||
| -#endif
 | ||||
| -		return 1;
 | ||||
| -		}
 | ||||
| +		goto ri_check;
 | ||||
|   | ||||
|  	n2s(data,len); | ||||
|   | ||||
| @@ -1019,7 +1001,7 @@ int ssl_parse_serverhello_tlsext(SSL *s,
 | ||||
|  		n2s(data,size); | ||||
|   | ||||
|  		if (data+size > (d+n)) | ||||
| -	   		return 1;
 | ||||
| +	   		goto ri_check;
 | ||||
|   | ||||
|  		if (s->tlsext_debug_cb) | ||||
|  			s->tlsext_debug_cb(s, 1, type, data, size, | ||||
| @@ -1143,16 +1125,6 @@ int ssl_parse_serverhello_tlsext(SSL *s,
 | ||||
|  		return 0; | ||||
|  		} | ||||
|   | ||||
| -#if 0
 | ||||
| -	if (!renegotiate_seen
 | ||||
| -		&& !(s->ctx->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
 | ||||
| -		{
 | ||||
| -		*al = SSL_AD_ILLEGAL_PARAMETER; /* is this the right alert? */
 | ||||
| -		SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);
 | ||||
| -		return 0;
 | ||||
| -		}
 | ||||
| -#endif
 | ||||
| -
 | ||||
|  	if (!s->hit && tlsext_servername == 1) | ||||
|  		{ | ||||
|   		if (s->tlsext_hostname) | ||||
| @@ -1175,6 +1147,26 @@ int ssl_parse_serverhello_tlsext(SSL *s,
 | ||||
|  		} | ||||
|   | ||||
|  	*p = data; | ||||
| +
 | ||||
| +	ri_check:
 | ||||
| +
 | ||||
| +	/* Determine if we need to see RI. Strictly speaking if we want to
 | ||||
| +	 * avoid an attack we should *always* see RI even on initial server
 | ||||
| +	 * hello because the client doesn't see any renegotiation during an
 | ||||
| +	 * attack. However this would mean we could not connect to any server
 | ||||
| +	 * which doesn't support RI so for the immediate future tolerate RI
 | ||||
| +	 * absence on initial connect only.
 | ||||
| +	 */
 | ||||
| +	if (!renegotiate_seen && 
 | ||||
| +		(s->new_session || !(s->options & SSL_OP_LEGACY_SERVER_CONNECT))
 | ||||
| +		&& !(s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
 | ||||
| +		{
 | ||||
| +		*al = SSL_AD_HANDSHAKE_FAILURE;
 | ||||
| +		SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT,
 | ||||
| +				SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);
 | ||||
| +		return 0;
 | ||||
| +		}
 | ||||
| +
 | ||||
|  	return 1; | ||||
|  	} | ||||
|   | ||||
| diff -up openssl-1.0.0-beta4/ssl/t1_reneg.c.scsv openssl-1.0.0-beta4/ssl/t1_reneg.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/t1_reneg.c.scsv	2009-11-09 19:45:42.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/t1_reneg.c	2010-01-07 23:37:39.000000000 +0100
 | ||||
| @@ -130,10 +130,15 @@ int ssl_add_clienthello_renegotiate_ext(
 | ||||
|   | ||||
|          memcpy(p, s->s3->previous_client_finished, | ||||
|  	       s->s3->previous_client_finished_len); | ||||
| +#ifdef OPENSSL_RI_DEBUG
 | ||||
| +    fprintf(stderr, "%s RI extension sent by client\n",
 | ||||
| +		s->s3->previous_client_finished_len ? "Non-empty" : "Empty");
 | ||||
| +#endif
 | ||||
|          } | ||||
|       | ||||
|      *len=s->s3->previous_client_finished_len + 1; | ||||
| -    
 | ||||
| +
 | ||||
| + 
 | ||||
|      return 1; | ||||
|      } | ||||
|   | ||||
| @@ -166,7 +171,7 @@ int ssl_parse_clienthello_renegotiate_ex
 | ||||
|      if(ilen != s->s3->previous_client_finished_len) | ||||
|          { | ||||
|          SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,SSL_R_RENEGOTIATION_MISMATCH); | ||||
| -        *al=SSL_AD_ILLEGAL_PARAMETER;
 | ||||
| +        *al=SSL_AD_HANDSHAKE_FAILURE;
 | ||||
|          return 0; | ||||
|          } | ||||
|       | ||||
| @@ -174,9 +179,13 @@ int ssl_parse_clienthello_renegotiate_ex
 | ||||
|  	      s->s3->previous_client_finished_len)) | ||||
|          { | ||||
|          SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,SSL_R_RENEGOTIATION_MISMATCH); | ||||
| -        *al=SSL_AD_ILLEGAL_PARAMETER;
 | ||||
| +        *al=SSL_AD_HANDSHAKE_FAILURE;
 | ||||
|          return 0; | ||||
|          } | ||||
| +#ifdef OPENSSL_RI_DEBUG
 | ||||
| +    fprintf(stderr, "%s RI extension received by server\n",
 | ||||
| +				ilen ? "Non-empty" : "Empty");
 | ||||
| +#endif
 | ||||
|   | ||||
|      s->s3->send_connection_binding=1; | ||||
|   | ||||
| @@ -206,6 +215,10 @@ int ssl_add_serverhello_renegotiate_ext(
 | ||||
|   | ||||
|          memcpy(p, s->s3->previous_server_finished, | ||||
|  	       s->s3->previous_server_finished_len); | ||||
| +#ifdef OPENSSL_RI_DEBUG
 | ||||
| +    fprintf(stderr, "%s RI extension sent by server\n",
 | ||||
| +    		s->s3->previous_client_finished_len ? "Non-empty" : "Empty");
 | ||||
| +#endif
 | ||||
|          } | ||||
|       | ||||
|      *len=s->s3->previous_client_finished_len | ||||
| @@ -249,7 +262,7 @@ int ssl_parse_serverhello_renegotiate_ex
 | ||||
|      if(ilen != expected_len) | ||||
|          { | ||||
|          SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,SSL_R_RENEGOTIATION_MISMATCH); | ||||
| -        *al=SSL_AD_ILLEGAL_PARAMETER;
 | ||||
| +        *al=SSL_AD_HANDSHAKE_FAILURE;
 | ||||
|          return 0; | ||||
|          } | ||||
|   | ||||
| @@ -257,7 +270,7 @@ int ssl_parse_serverhello_renegotiate_ex
 | ||||
|  	      s->s3->previous_client_finished_len)) | ||||
|          { | ||||
|          SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,SSL_R_RENEGOTIATION_MISMATCH); | ||||
| -        *al=SSL_AD_ILLEGAL_PARAMETER;
 | ||||
| +        *al=SSL_AD_HANDSHAKE_FAILURE;
 | ||||
|          return 0; | ||||
|          } | ||||
|      d += s->s3->previous_client_finished_len; | ||||
| @@ -269,6 +282,11 @@ int ssl_parse_serverhello_renegotiate_ex
 | ||||
|          *al=SSL_AD_ILLEGAL_PARAMETER; | ||||
|          return 0; | ||||
|          } | ||||
| +#ifdef OPENSSL_RI_DEBUG
 | ||||
| +    fprintf(stderr, "%s RI extension received by client\n",
 | ||||
| +				ilen ? "Non-empty" : "Empty");
 | ||||
| +#endif
 | ||||
| +    s->s3->send_connection_binding=1;
 | ||||
|   | ||||
|      return 1; | ||||
|      } | ||||
							
								
								
									
										193
									
								
								openssl-1.0.0-beta4-tls-comp.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										193
									
								
								openssl-1.0.0-beta4-tls-comp.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,193 @@ | ||||
| diff -up openssl-1.0.0-beta4/ssl/ssl_err.c.tls-comp openssl-1.0.0-beta4/ssl/ssl_err.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/ssl_err.c.tls-comp	2010-01-07 18:45:46.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/ssl_err.c	2010-01-07 22:46:10.000000000 +0100
 | ||||
| @@ -329,6 +329,7 @@ static ERR_STRING_DATA SSL_str_reasons[]
 | ||||
|  {ERR_REASON(SSL_R_CIPHER_TABLE_SRC_ERROR),"cipher table src error"}, | ||||
|  {ERR_REASON(SSL_R_CLIENTHELLO_TLSEXT)    ,"clienthello tlsext"}, | ||||
|  {ERR_REASON(SSL_R_COMPRESSED_LENGTH_TOO_LONG),"compressed length too long"}, | ||||
| +{ERR_REASON(SSL_R_COMPRESSION_DISABLED)  ,"compression disabled"},
 | ||||
|  {ERR_REASON(SSL_R_COMPRESSION_FAILURE)   ,"compression failure"}, | ||||
|  {ERR_REASON(SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE),"compression id not within private range"}, | ||||
|  {ERR_REASON(SSL_R_COMPRESSION_LIBRARY_ERROR),"compression library error"}, | ||||
| @@ -357,8 +358,10 @@ static ERR_STRING_DATA SSL_str_reasons[]
 | ||||
|  {ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST)   ,"https proxy request"}, | ||||
|  {ERR_REASON(SSL_R_HTTP_REQUEST)          ,"http request"}, | ||||
|  {ERR_REASON(SSL_R_ILLEGAL_PADDING)       ,"illegal padding"}, | ||||
| +{ERR_REASON(SSL_R_INCONSISTENT_COMPRESSION),"inconsistent compression"},
 | ||||
|  {ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH),"invalid challenge length"}, | ||||
|  {ERR_REASON(SSL_R_INVALID_COMMAND)       ,"invalid command"}, | ||||
| +{ERR_REASON(SSL_R_INVALID_COMPRESSION_ALGORITHM),"invalid compression algorithm"},
 | ||||
|  {ERR_REASON(SSL_R_INVALID_PURPOSE)       ,"invalid purpose"}, | ||||
|  {ERR_REASON(SSL_R_INVALID_STATUS_RESPONSE),"invalid status response"}, | ||||
|  {ERR_REASON(SSL_R_INVALID_TICKET_KEYS_LENGTH),"invalid ticket keys length"}, | ||||
| @@ -421,6 +424,7 @@ static ERR_STRING_DATA SSL_str_reasons[]
 | ||||
|  {ERR_REASON(SSL_R_NULL_SSL_CTX)          ,"null ssl ctx"}, | ||||
|  {ERR_REASON(SSL_R_NULL_SSL_METHOD_PASSED),"null ssl method passed"}, | ||||
|  {ERR_REASON(SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED),"old session cipher not returned"}, | ||||
| +{ERR_REASON(SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED),"old session compression algorithm not returned"},
 | ||||
|  {ERR_REASON(SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE),"only tls allowed in fips mode"}, | ||||
|  {ERR_REASON(SSL_R_OPAQUE_PRF_INPUT_TOO_LONG),"opaque PRF input too long"}, | ||||
|  {ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG),"packet length too long"}, | ||||
| @@ -451,6 +455,7 @@ static ERR_STRING_DATA SSL_str_reasons[]
 | ||||
|  {ERR_REASON(SSL_R_RENEGOTIATION_ENCODING_ERR),"renegotiation encoding err"}, | ||||
|  {ERR_REASON(SSL_R_RENEGOTIATION_MISMATCH),"renegotiation mismatch"}, | ||||
|  {ERR_REASON(SSL_R_REQUIRED_CIPHER_MISSING),"required cipher missing"}, | ||||
| +{ERR_REASON(SSL_R_REQUIRED_COMPRESSSION_ALGORITHM_MISSING),"required compresssion algorithm missing"},
 | ||||
|  {ERR_REASON(SSL_R_REUSE_CERT_LENGTH_NOT_ZERO),"reuse cert length not zero"}, | ||||
|  {ERR_REASON(SSL_R_REUSE_CERT_TYPE_NOT_ZERO),"reuse cert type not zero"}, | ||||
|  {ERR_REASON(SSL_R_REUSE_CIPHER_LIST_NOT_ZERO),"reuse cipher list not zero"}, | ||||
| diff -up openssl-1.0.0-beta4/ssl/ssl.h.tls-comp openssl-1.0.0-beta4/ssl/ssl.h
 | ||||
| --- openssl-1.0.0-beta4/ssl/ssl.h.tls-comp	2010-01-07 18:45:46.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/ssl.h	2010-01-07 22:47:07.000000000 +0100
 | ||||
| @@ -485,7 +485,7 @@ typedef struct ssl_session_st
 | ||||
|  	long timeout; | ||||
|  	long time; | ||||
|   | ||||
| -	int compress_meth;		/* Need to lookup the method */
 | ||||
| +	unsigned int compress_meth;	/* Need to lookup the method */
 | ||||
|   | ||||
|  	const SSL_CIPHER *cipher; | ||||
|  	unsigned long cipher_id;	/* when ASN.1 loaded, this | ||||
| @@ -2051,6 +2051,7 @@ void ERR_load_SSL_strings(void);
 | ||||
|  #define SSL_R_CIPHER_TABLE_SRC_ERROR			 139 | ||||
|  #define SSL_R_CLIENTHELLO_TLSEXT			 226 | ||||
|  #define SSL_R_COMPRESSED_LENGTH_TOO_LONG		 140 | ||||
| +#define SSL_R_COMPRESSION_DISABLED			 343
 | ||||
|  #define SSL_R_COMPRESSION_FAILURE			 141 | ||||
|  #define SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE	 307 | ||||
|  #define SSL_R_COMPRESSION_LIBRARY_ERROR			 142 | ||||
| @@ -2079,8 +2080,10 @@ void ERR_load_SSL_strings(void);
 | ||||
|  #define SSL_R_HTTPS_PROXY_REQUEST			 155 | ||||
|  #define SSL_R_HTTP_REQUEST				 156 | ||||
|  #define SSL_R_ILLEGAL_PADDING				 283 | ||||
| +#define SSL_R_INCONSISTENT_COMPRESSION			 340
 | ||||
|  #define SSL_R_INVALID_CHALLENGE_LENGTH			 158 | ||||
|  #define SSL_R_INVALID_COMMAND				 280 | ||||
| +#define SSL_R_INVALID_COMPRESSION_ALGORITHM		 341
 | ||||
|  #define SSL_R_INVALID_PURPOSE				 278 | ||||
|  #define SSL_R_INVALID_STATUS_RESPONSE			 328 | ||||
|  #define SSL_R_INVALID_TICKET_KEYS_LENGTH		 325 | ||||
| @@ -2143,6 +2146,7 @@ void ERR_load_SSL_strings(void);
 | ||||
|  #define SSL_R_NULL_SSL_CTX				 195 | ||||
|  #define SSL_R_NULL_SSL_METHOD_PASSED			 196 | ||||
|  #define SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED		 197 | ||||
| +#define SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED 344
 | ||||
|  #define SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE		 297 | ||||
|  #define SSL_R_OPAQUE_PRF_INPUT_TOO_LONG			 327 | ||||
|  #define SSL_R_PACKET_LENGTH_TOO_LONG			 198 | ||||
| @@ -2173,6 +2177,7 @@ void ERR_load_SSL_strings(void);
 | ||||
|  #define SSL_R_RENEGOTIATION_ENCODING_ERR		 336 | ||||
|  #define SSL_R_RENEGOTIATION_MISMATCH			 337 | ||||
|  #define SSL_R_REQUIRED_CIPHER_MISSING			 215 | ||||
| +#define SSL_R_REQUIRED_COMPRESSSION_ALGORITHM_MISSING	 342
 | ||||
|  #define SSL_R_REUSE_CERT_LENGTH_NOT_ZERO		 216 | ||||
|  #define SSL_R_REUSE_CERT_TYPE_NOT_ZERO			 217 | ||||
|  #define SSL_R_REUSE_CIPHER_LIST_NOT_ZERO		 218 | ||||
| diff -up openssl-1.0.0-beta4/ssl/s3_clnt.c.tls-comp openssl-1.0.0-beta4/ssl/s3_clnt.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/s3_clnt.c.tls-comp	2010-01-07 17:53:12.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/s3_clnt.c	2010-01-07 22:47:07.000000000 +0100
 | ||||
| @@ -895,10 +895,31 @@ int ssl3_get_server_hello(SSL *s)
 | ||||
|  		SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM); | ||||
|  		goto f_err; | ||||
|  		} | ||||
| +	/* If compression is disabled we'd better not try to resume a session
 | ||||
| +	 * using compression.
 | ||||
| +	 */
 | ||||
| +	if (s->session->compress_meth != 0)
 | ||||
| +		{
 | ||||
| +		al=SSL_AD_INTERNAL_ERROR;
 | ||||
| +		SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,SSL_R_INCONSISTENT_COMPRESSION);
 | ||||
| +		goto f_err;
 | ||||
| +		}
 | ||||
|  #else | ||||
|  	j= *(p++); | ||||
| -	if ((j == 0) || (s->options & SSL_OP_NO_COMPRESSION))
 | ||||
| +	if (s->hit && j != s->session->compress_meth)
 | ||||
| +		{
 | ||||
| +		al=SSL_AD_ILLEGAL_PARAMETER;
 | ||||
| +		SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED);
 | ||||
| +		goto f_err;
 | ||||
| +		}
 | ||||
| +	if (j == 0)
 | ||||
|  		comp=NULL; | ||||
| +	else if (s->options & SSL_OP_NO_COMPRESSION)
 | ||||
| +		{
 | ||||
| +		al=SSL_AD_ILLEGAL_PARAMETER;
 | ||||
| +		SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,SSL_R_COMPRESSION_DISABLED);
 | ||||
| +		goto f_err;
 | ||||
| +		}
 | ||||
|  	else | ||||
|  		comp=ssl3_comp_find(s->ctx->comp_methods,j); | ||||
|  	 | ||||
| diff -up openssl-1.0.0-beta4/ssl/s3_srvr.c.tls-comp openssl-1.0.0-beta4/ssl/s3_srvr.c
 | ||||
| --- openssl-1.0.0-beta4/ssl/s3_srvr.c.tls-comp	2010-01-07 17:53:12.000000000 +0100
 | ||||
| +++ openssl-1.0.0-beta4/ssl/s3_srvr.c	2010-01-07 22:46:10.000000000 +0100
 | ||||
| @@ -1088,7 +1088,50 @@ int ssl3_get_client_hello(SSL *s)
 | ||||
|  	 * algorithms from the client, starting at q. */ | ||||
|  	s->s3->tmp.new_compression=NULL; | ||||
|  #ifndef OPENSSL_NO_COMP | ||||
| -	if (!(s->options & SSL_OP_NO_COMPRESSION) && s->ctx->comp_methods)
 | ||||
| +	/* This only happens if we have a cache hit */
 | ||||
| +	if (s->session->compress_meth != 0)
 | ||||
| +		{
 | ||||
| +		int m, comp_id = s->session->compress_meth;
 | ||||
| +		/* Perform sanity checks on resumed compression algorithm */
 | ||||
| +		/* Can't disable compression */
 | ||||
| +		if (s->options & SSL_OP_NO_COMPRESSION)
 | ||||
| +			{
 | ||||
| +			al=SSL_AD_INTERNAL_ERROR;
 | ||||
| +			SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_INCONSISTENT_COMPRESSION);
 | ||||
| +			goto f_err;
 | ||||
| +			}
 | ||||
| +		/* Look for resumed compression method */
 | ||||
| +		for (m = 0; m < sk_SSL_COMP_num(s->ctx->comp_methods); m++)
 | ||||
| +			{
 | ||||
| +			comp=sk_SSL_COMP_value(s->ctx->comp_methods,m);
 | ||||
| +			if (comp_id == comp->id)
 | ||||
| +				{
 | ||||
| +				s->s3->tmp.new_compression=comp;
 | ||||
| +				break;
 | ||||
| +				}
 | ||||
| +			}
 | ||||
| +		if (s->s3->tmp.new_compression == NULL)
 | ||||
| +			{
 | ||||
| +			al=SSL_AD_INTERNAL_ERROR;
 | ||||
| +			SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_INVALID_COMPRESSION_ALGORITHM);
 | ||||
| +			goto f_err;
 | ||||
| +			}
 | ||||
| +		/* Look for resumed method in compression list */
 | ||||
| +		for (m = 0; m < i; m++)
 | ||||
| +			{
 | ||||
| +			if (q[m] == comp_id)
 | ||||
| +				break;
 | ||||
| +			}
 | ||||
| +		if (m >= i)
 | ||||
| +			{
 | ||||
| +			al=SSL_AD_ILLEGAL_PARAMETER;
 | ||||
| +			SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_REQUIRED_COMPRESSSION_ALGORITHM_MISSING);
 | ||||
| +			goto f_err;
 | ||||
| +			}
 | ||||
| +		}
 | ||||
| +	else if (s->hit)
 | ||||
| +		comp = NULL;
 | ||||
| +	else if (!(s->options & SSL_OP_NO_COMPRESSION) && s->ctx->comp_methods)
 | ||||
|  		{ /* See if we have a match */ | ||||
|  		int m,nn,o,v,done=0; | ||||
|   | ||||
| @@ -1112,6 +1155,16 @@ int ssl3_get_client_hello(SSL *s)
 | ||||
|  		else | ||||
|  			comp=NULL; | ||||
|  		} | ||||
| +#else
 | ||||
| +	/* If compression is disabled we'd better not try to resume a session
 | ||||
| +	 * using compression.
 | ||||
| +	 */
 | ||||
| +	if (s->session->compress_meth != 0)
 | ||||
| +		{
 | ||||
| +		al=SSL_AD_INTERNAL_ERROR;
 | ||||
| +		SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_INCONSISTENT_COMPRESSION);
 | ||||
| +		goto f_err;
 | ||||
| +		}
 | ||||
|  #endif | ||||
|   | ||||
|  	/* Given s->session->ciphers and SSL_get_ciphers, we must | ||||
							
								
								
									
										21
									
								
								openssl.spec
									
									
									
									
									
								
							
							
						
						
									
										21
									
								
								openssl.spec
									
									
									
									
									
								
							| @ -23,7 +23,7 @@ | ||||
| Summary: A general purpose cryptography library with TLS implementation | ||||
| Name: openssl | ||||
| Version: 1.0.0 | ||||
| Release: 0.16.%{beta}%{?dist} | ||||
| Release: 0.17.%{beta}%{?dist} | ||||
| # We remove certain patented algorithms from the openssl source tarball | ||||
| # with the hobble-openssl script which is included below. | ||||
| Source: openssl-%{version}-%{beta}-usa.tar.bz2 | ||||
| @ -68,6 +68,10 @@ Patch61: openssl-1.0.0-beta4-client-reneg.patch | ||||
| Patch62: openssl-1.0.0-beta4-backports.patch | ||||
| Patch63: openssl-1.0.0-beta4-reneg-err.patch | ||||
| Patch64: openssl-1.0.0-beta4-dtls-ipv6.patch | ||||
| Patch65: openssl-1.0.0-beta4-dtls-reneg.patch | ||||
| Patch66: openssl-1.0.0-beta4-backports2.patch | ||||
| Patch67: openssl-1.0.0-beta4-reneg-scsv.patch | ||||
| Patch68: openssl-1.0.0-beta4-tls-comp.patch | ||||
| 
 | ||||
| License: OpenSSL | ||||
| Group: System Environment/Libraries | ||||
| @ -152,6 +156,10 @@ from other formats to the formats used by the OpenSSL toolkit. | ||||
| %patch62 -p1 -b .backports | ||||
| %patch63 -p1 -b .reneg-err | ||||
| %patch64 -p1 -b .dtls-ipv6 | ||||
| %patch65 -p1 -b .dtls-reneg | ||||
| %patch66 -p1 -b .backports2 | ||||
| %patch67 -p1 -b .scsv | ||||
| %patch68 -p1 -b .tls-comp | ||||
| 
 | ||||
| # Modify the various perl scripts to reference perl in the right location. | ||||
| perl util/perlpath.pl `dirname %{__perl}` | ||||
| @ -160,7 +168,7 @@ perl util/perlpath.pl `dirname %{__perl}` | ||||
| touch Makefile | ||||
| make TABLE PERL=%{__perl} | ||||
| 
 | ||||
| %build  | ||||
| %build | ||||
| # Figure out which flags we want to use. | ||||
| # default | ||||
| sslarch=%{_os}-%{_arch} | ||||
| @ -347,7 +355,7 @@ rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.* | ||||
| %clean | ||||
| [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT | ||||
| 
 | ||||
| %files  | ||||
| %files | ||||
| %defattr(-,root,root) | ||||
| %doc FAQ LICENSE CHANGES NEWS INSTALL README | ||||
| %doc doc/c-indentation.el doc/openssl.txt | ||||
| @ -400,6 +408,11 @@ rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.* | ||||
| %postun -p /sbin/ldconfig | ||||
| 
 | ||||
| %changelog | ||||
| * Thu Jan  7 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.17.beta4 | ||||
| - upstream fix compression handling on session resumption | ||||
| - various null checks and other small fixes from upstream | ||||
| - upstream changes for the renegotiation info according to the latest draft  | ||||
| 
 | ||||
| * Mon Nov 23 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.16.beta4 | ||||
| - fix non-fips mingw build (patch by Kalev Lember) | ||||
| - add IPV6 fix for DTLS | ||||
| @ -419,7 +432,7 @@ rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.* | ||||
|   openssh and possibly other dependencies with too strict version check | ||||
| 
 | ||||
| * Thu Nov 12 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.11.beta4 | ||||
| - update to new upstream version, no soname bump needed  | ||||
| - update to new upstream version, no soname bump needed | ||||
| - fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used | ||||
|   so the compatibility with unfixed clients is not broken. The | ||||
|   protocol extension is also not final. | ||||
|  | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user