ssl.c 692 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120111211112211123111241112511126111271112811129111301113111132111331113411135111361113711138111391114011141111421114311144111451114611147111481114911150111511115211153111541115511156111571115811159111601116111162111631116411165111661116711168111691117011171111721117311174111751117611177111781117911180111811118211183111841118511186111871118811189111901119111192111931119411195111961119711198111991120011201112021120311204112051120611207112081120911210112111121211213112141121511216112171121811219112201122111222112231122411225112261122711228112291123011231112321123311234112351123611237112381123911240112411124211243112441124511246112471124811249112501125111252112531125411255112561125711258112591126011261112621126311264112651126611267112681126911270112711127211273112741127511276112771127811279112801128111282112831128411285112861128711288112891129011291112921129311294112951129611297112981129911300113011130211303113041130511306113071130811309113101131111312113131131411315113161131711318113191132011321113221132311324113251132611327113281132911330113311133211333113341133511336113371133811339113401134111342113431134411345113461134711348113491135011351113521135311354113551135611357113581135911360113611136211363113641136511366113671136811369113701137111372113731137411375113761137711378113791138011381113821138311384113851138611387113881138911390113911139211393113941139511396113971139811399114001140111402114031140411405114061140711408114091141011411114121141311414114151141611417114181141911420114211142211423114241142511426114271142811429114301143111432114331143411435114361143711438114391144011441114421144311444114451144611447114481144911450114511145211453114541145511456114571145811459114601146111462114631146411465114661146711468114691147011471114721147311474114751147611477114781147911480114811148211483114841148511486114871148811489114901149111492114931149411495114961149711498114991150011501115021150311504115051150611507115081150911510115111151211513115141151511516115171151811519115201152111522115231152411525115261152711528115291153011531115321153311534115351153611537115381153911540115411154211543115441154511546115471154811549115501155111552115531155411555115561155711558115591156011561115621156311564115651156611567115681156911570115711157211573115741157511576115771157811579115801158111582115831158411585115861158711588115891159011591115921159311594115951159611597115981159911600116011160211603116041160511606116071160811609116101161111612116131161411615116161161711618116191162011621116221162311624116251162611627116281162911630116311163211633116341163511636116371163811639116401164111642116431164411645116461164711648116491165011651116521165311654116551165611657116581165911660116611166211663116641166511666116671166811669116701167111672116731167411675116761167711678116791168011681116821168311684116851168611687116881168911690116911169211693116941169511696116971169811699117001170111702117031170411705117061170711708117091171011711117121171311714117151171611717117181171911720117211172211723117241172511726117271172811729117301173111732117331173411735117361173711738117391174011741117421174311744117451174611747117481174911750117511175211753117541175511756117571175811759117601176111762117631176411765117661176711768117691177011771117721177311774117751177611777117781177911780117811178211783117841178511786117871178811789117901179111792117931179411795117961179711798117991180011801118021180311804118051180611807118081180911810118111181211813118141181511816118171181811819118201182111822118231182411825118261182711828118291183011831118321183311834118351183611837118381183911840118411184211843118441184511846118471184811849118501185111852118531185411855118561185711858118591186011861118621186311864118651186611867118681186911870118711187211873118741187511876118771187811879118801188111882118831188411885118861188711888118891189011891118921189311894118951189611897118981189911900119011190211903119041190511906119071190811909119101191111912119131191411915119161191711918119191192011921119221192311924119251192611927119281192911930119311193211933119341193511936119371193811939119401194111942119431194411945119461194711948119491195011951119521195311954119551195611957119581195911960119611196211963119641196511966119671196811969119701197111972119731197411975119761197711978119791198011981119821198311984119851198611987119881198911990119911199211993119941199511996119971199811999120001200112002120031200412005120061200712008120091201012011120121201312014120151201612017120181201912020120211202212023120241202512026120271202812029120301203112032120331203412035120361203712038120391204012041120421204312044120451204612047120481204912050120511205212053120541205512056120571205812059120601206112062120631206412065120661206712068120691207012071120721207312074120751207612077120781207912080120811208212083120841208512086120871208812089120901209112092120931209412095120961209712098120991210012101121021210312104121051210612107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122521225312254122551225612257122581225912260122611226212263122641226512266122671226812269122701227112272122731227412275122761227712278122791228012281122821228312284122851228612287122881228912290122911229212293122941229512296122971229812299123001230112302123031230412305123061230712308123091231012311123121231312314123151231612317123181231912320123211232212323123241232512326123271232812329123301233112332123331233412335123361233712338123391234012341123421234312344123451234612347123481234912350123511235212353123541235512356123571235812359123601236112362123631236412365123661236712368123691237012371123721237312374123751237612377123781237912380123811238212383123841238512386123871238812389123901239112392123931239412395123961239712398123991240012401124021240312404124051240612407124081240912410124111241212413124141241512416124171241812419124201242112422124231242412425124261242712428124291243012431124321243312434124351243612437124381243912440124411244212443124441244512446124471244812449124501245112452124531245412455124561245712458124591246012461124621246312464124651246612467124681246912470124711247212473124741247512476124771247812479124801248112482124831248412485124861248712488124891249012491124921249312494124951249612497124981249912500125011250212503125041250512506125071250812509125101251112512125131251412515125161251712518125191252012521125221252312524125251252612527125281252912530125311253212533125341253512536125371253812539125401254112542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590125911259212593125941259512596125971259812599126001260112602126031260412605126061260712608126091261012611126121261312614126151261612617126181261912620126211262212623126241262512626126271262812629126301263112632126331263412635126361263712638126391264012641126421264312644126451264612647126481264912650126511265212653126541265512656126571265812659126601266112662126631266412665126661266712668126691267012671126721267312674126751267612677126781267912680126811268212683126841268512686126871268812689126901269112692126931269412695126961269712698126991270012701127021270312704127051270612707127081270912710127111271212713127141271512716127171271812719127201272112722127231272412725127261272712728127291273012731127321273312734127351273612737127381273912740127411274212743127441274512746127471274812749127501275112752127531275412755127561275712758127591276012761127621276312764127651276612767127681276912770127711277212773127741277512776127771277812779127801278112782127831278412785127861278712788127891279012791127921279312794127951279612797127981279912800128011280212803128041280512806128071280812809128101281112812128131281412815128161281712818128191282012821128221282312824128251282612827128281282912830128311283212833128341283512836128371283812839128401284112842128431284412845128461284712848128491285012851128521285312854128551285612857128581285912860128611286212863128641286512866128671286812869128701287112872128731287412875128761287712878128791288012881128821288312884128851288612887128881288912890128911289212893128941289512896128971289812899129001290112902129031290412905129061290712908129091291012911129121291312914129151291612917129181291912920129211292212923129241292512926129271292812929129301293112932129331293412935129361293712938129391294012941129421294312944129451294612947129481294912950129511295212953129541295512956129571295812959129601296112962129631296412965129661296712968129691297012971129721297312974129751297612977129781297912980129811298212983129841298512986129871298812989129901299112992129931299412995129961299712998129991300013001130021300313004130051300613007130081300913010130111301213013130141301513016130171301813019130201302113022130231302413025130261302713028130291303013031130321303313034130351303613037130381303913040130411304213043130441304513046130471304813049130501305113052130531305413055130561305713058130591306013061130621306313064130651306613067130681306913070130711307213073130741307513076130771307813079130801308113082130831308413085130861308713088130891309013091130921309313094130951309613097130981309913100131011310213103131041310513106131071310813109131101311113112131131311413115131161311713118131191312013121131221312313124131251312613127131281312913130131311313213133131341313513136131371313813139131401314113142131431314413145131461314713148131491315013151131521315313154131551315613157131581315913160131611316213163131641316513166131671316813169131701317113172131731317413175131761317713178131791318013181131821318313184131851318613187131881318913190131911319213193131941319513196131971319813199132001320113202132031320413205132061320713208132091321013211132121321313214132151321613217132181321913220132211322213223132241322513226132271322813229132301323113232132331323413235132361323713238132391324013241132421324313244132451324613247132481324913250132511325213253132541325513256132571325813259132601326113262132631326413265132661326713268132691327013271132721327313274132751327613277132781327913280132811328213283132841328513286132871328813289132901329113292132931329413295132961329713298132991330013301133021330313304133051330613307133081330913310133111331213313133141331513316133171331813319133201332113322133231332413325133261332713328133291333013331133321333313334133351333613337133381333913340133411334213343133441334513346133471334813349133501335113352133531335413355133561335713358133591336013361133621336313364133651336613367133681336913370133711337213373133741337513376133771337813379133801338113382133831338413385133861338713388133891339013391133921339313394133951339613397133981339913400134011340213403134041340513406134071340813409134101341113412134131341413415134161341713418134191342013421134221342313424134251342613427134281342913430134311343213433134341343513436134371343813439134401344113442134431344413445134461344713448134491345013451134521345313454134551345613457134581345913460134611346213463134641346513466134671346813469134701347113472134731347413475134761347713478134791348013481134821348313484134851348613487134881348913490134911349213493134941349513496134971349813499135001350113502135031350413505135061350713508135091351013511135121351313514135151351613517135181351913520135211352213523135241352513526135271352813529135301353113532135331353413535135361353713538135391354013541135421354313544135451354613547135481354913550135511355213553135541355513556135571355813559135601356113562135631356413565135661356713568135691357013571135721357313574135751357613577135781357913580135811358213583135841358513586135871358813589135901359113592135931359413595135961359713598135991360013601136021360313604136051360613607136081360913610136111361213613136141361513616136171361813619136201362113622136231362413625136261362713628136291363013631136321363313634136351363613637136381363913640136411364213643136441364513646136471364813649136501365113652136531365413655136561365713658136591366013661136621366313664136651366613667136681366913670136711367213673136741367513676136771367813679136801368113682136831368413685136861368713688136891369013691136921369313694136951369613697136981369913700137011370213703137041370513706137071370813709137101371113712137131371413715137161371713718137191372013721137221372313724137251372613727137281372913730137311373213733137341373513736137371373813739137401374113742137431374413745137461374713748137491375013751137521375313754137551375613757137581375913760137611376213763137641376513766137671376813769137701377113772137731377413775137761377713778137791378013781137821378313784137851378613787137881378913790137911379213793137941379513796137971379813799138001380113802138031380413805138061380713808138091381013811138121381313814138151381613817138181381913820138211382213823138241382513826138271382813829138301383113832138331383413835138361383713838138391384013841138421384313844138451384613847138481384913850138511385213853138541385513856138571385813859138601386113862138631386413865138661386713868138691387013871138721387313874138751387613877138781387913880138811388213883138841388513886138871388813889138901389113892138931389413895138961389713898138991390013901139021390313904139051390613907139081390913910139111391213913139141391513916139171391813919139201392113922139231392413925139261392713928139291393013931139321393313934139351393613937139381393913940139411394213943139441394513946139471394813949139501395113952139531395413955139561395713958139591396013961139621396313964139651396613967139681396913970139711397213973139741397513976139771397813979139801398113982139831398413985139861398713988139891399013991139921399313994139951399613997139981399914000140011400214003140041400514006140071400814009140101401114012140131401414015140161401714018140191402014021140221402314024140251402614027140281402914030140311403214033140341403514036140371403814039140401404114042140431404414045140461404714048140491405014051140521405314054140551405614057140581405914060140611406214063140641406514066140671406814069140701407114072140731407414075140761407714078140791408014081140821408314084140851408614087140881408914090140911409214093140941409514096140971409814099141001410114102141031410414105141061410714108141091411014111141121411314114141151411614117141181411914120141211412214123141241412514126141271412814129141301413114132141331413414135141361413714138141391414014141141421414314144141451414614147141481414914150141511415214153141541415514156141571415814159141601416114162141631416414165141661416714168141691417014171141721417314174141751417614177141781417914180141811418214183141841418514186141871418814189141901419114192141931419414195141961419714198141991420014201142021420314204142051420614207142081420914210142111421214213142141421514216142171421814219142201422114222142231422414225142261422714228142291423014231142321423314234142351423614237142381423914240142411424214243142441424514246142471424814249142501425114252142531425414255142561425714258142591426014261142621426314264142651426614267142681426914270142711427214273142741427514276142771427814279142801428114282142831428414285142861428714288142891429014291142921429314294142951429614297142981429914300143011430214303143041430514306143071430814309143101431114312143131431414315143161431714318143191432014321143221432314324143251432614327143281432914330143311433214333143341433514336143371433814339143401434114342143431434414345143461434714348143491435014351143521435314354143551435614357143581435914360143611436214363143641436514366143671436814369143701437114372143731437414375143761437714378143791438014381143821438314384143851438614387143881438914390143911439214393143941439514396143971439814399144001440114402144031440414405144061440714408144091441014411144121441314414144151441614417144181441914420144211442214423144241442514426144271442814429144301443114432144331443414435144361443714438144391444014441144421444314444144451444614447144481444914450144511445214453144541445514456144571445814459144601446114462144631446414465144661446714468144691447014471144721447314474144751447614477144781447914480144811448214483144841448514486144871448814489144901449114492144931449414495144961449714498144991450014501145021450314504145051450614507145081450914510145111451214513145141451514516145171451814519145201452114522145231452414525145261452714528145291453014531145321453314534145351453614537145381453914540145411454214543145441454514546145471454814549145501455114552145531455414555145561455714558145591456014561145621456314564145651456614567145681456914570145711457214573145741457514576145771457814579145801458114582145831458414585145861458714588145891459014591145921459314594145951459614597145981459914600146011460214603146041460514606146071460814609146101461114612146131461414615146161461714618146191462014621146221462314624146251462614627146281462914630146311463214633146341463514636146371463814639146401464114642146431464414645146461464714648146491465014651146521465314654146551465614657146581465914660146611466214663146641466514666146671466814669146701467114672146731467414675146761467714678146791468014681146821468314684146851468614687146881468914690146911469214693146941469514696146971469814699147001470114702147031470414705147061470714708147091471014711147121471314714147151471614717147181471914720147211472214723147241472514726147271472814729147301473114732147331473414735147361473714738147391474014741147421474314744147451474614747147481474914750147511475214753147541475514756147571475814759147601476114762147631476414765147661476714768147691477014771147721477314774147751477614777147781477914780147811478214783147841478514786147871478814789147901479114792147931479414795147961479714798147991480014801148021480314804148051480614807148081480914810148111481214813148141481514816148171481814819148201482114822148231482414825148261482714828148291483014831148321483314834148351483614837148381483914840148411484214843148441484514846148471484814849148501485114852148531485414855148561485714858148591486014861148621486314864148651486614867148681486914870148711487214873148741487514876148771487814879148801488114882148831488414885148861488714888148891489014891148921489314894148951489614897148981489914900149011490214903149041490514906149071490814909149101491114912149131491414915149161491714918149191492014921149221492314924149251492614927149281492914930149311493214933149341493514936149371493814939149401494114942149431494414945149461494714948149491495014951149521495314954149551495614957149581495914960149611496214963149641496514966149671496814969149701497114972149731497414975149761497714978149791498014981149821498314984149851498614987149881498914990149911499214993149941499514996149971499814999150001500115002150031500415005150061500715008150091501015011150121501315014150151501615017150181501915020150211502215023150241502515026150271502815029150301503115032150331503415035150361503715038150391504015041150421504315044150451504615047150481504915050150511505215053150541505515056150571505815059150601506115062150631506415065150661506715068150691507015071150721507315074150751507615077150781507915080150811508215083150841508515086150871508815089150901509115092150931509415095150961509715098150991510015101151021510315104151051510615107151081510915110151111511215113151141511515116151171511815119151201512115122151231512415125151261512715128151291513015131151321513315134151351513615137151381513915140151411514215143151441514515146151471514815149151501515115152151531515415155151561515715158151591516015161151621516315164151651516615167151681516915170151711517215173151741517515176151771517815179151801518115182151831518415185151861518715188151891519015191151921519315194151951519615197151981519915200152011520215203152041520515206152071520815209152101521115212152131521415215152161521715218152191522015221152221522315224152251522615227152281522915230152311523215233152341523515236152371523815239152401524115242152431524415245152461524715248152491525015251152521525315254152551525615257152581525915260152611526215263152641526515266152671526815269152701527115272152731527415275152761527715278152791528015281152821528315284152851528615287152881528915290152911529215293152941529515296152971529815299153001530115302153031530415305153061530715308153091531015311153121531315314153151531615317153181531915320153211532215323153241532515326153271532815329153301533115332153331533415335153361533715338153391534015341153421534315344153451534615347153481534915350153511535215353153541535515356153571535815359153601536115362153631536415365153661536715368153691537015371153721537315374153751537615377153781537915380153811538215383153841538515386153871538815389153901539115392153931539415395153961539715398153991540015401154021540315404154051540615407154081540915410154111541215413154141541515416154171541815419154201542115422154231542415425154261542715428154291543015431154321543315434154351543615437154381543915440154411544215443154441544515446154471544815449154501545115452154531545415455154561545715458154591546015461154621546315464154651546615467154681546915470154711547215473154741547515476154771547815479154801548115482154831548415485154861548715488154891549015491154921549315494154951549615497154981549915500155011550215503155041550515506155071550815509155101551115512155131551415515155161551715518155191552015521155221552315524155251552615527155281552915530155311553215533155341553515536155371553815539155401554115542155431554415545155461554715548155491555015551155521555315554155551555615557155581555915560155611556215563155641556515566155671556815569155701557115572155731557415575155761557715578155791558015581155821558315584155851558615587155881558915590155911559215593155941559515596155971559815599156001560115602156031560415605156061560715608156091561015611156121561315614156151561615617156181561915620156211562215623156241562515626156271562815629156301563115632156331563415635156361563715638156391564015641156421564315644156451564615647156481564915650156511565215653156541565515656156571565815659156601566115662156631566415665156661566715668156691567015671156721567315674156751567615677156781567915680156811568215683156841568515686156871568815689156901569115692156931569415695156961569715698156991570015701157021570315704157051570615707157081570915710157111571215713157141571515716157171571815719157201572115722157231572415725157261572715728157291573015731157321573315734157351573615737157381573915740157411574215743157441574515746157471574815749157501575115752157531575415755157561575715758157591576015761157621576315764157651576615767157681576915770157711577215773157741577515776157771577815779157801578115782157831578415785157861578715788157891579015791157921579315794157951579615797157981579915800158011580215803158041580515806158071580815809158101581115812158131581415815158161581715818158191582015821158221582315824158251582615827158281582915830158311583215833158341583515836158371583815839158401584115842158431584415845158461584715848158491585015851158521585315854158551585615857158581585915860158611586215863158641586515866158671586815869158701587115872158731587415875158761587715878158791588015881158821588315884158851588615887158881588915890158911589215893158941589515896158971589815899159001590115902159031590415905159061590715908159091591015911159121591315914159151591615917159181591915920159211592215923159241592515926159271592815929159301593115932159331593415935159361593715938159391594015941159421594315944159451594615947159481594915950159511595215953159541595515956159571595815959159601596115962159631596415965159661596715968159691597015971159721597315974159751597615977159781597915980159811598215983159841598515986159871598815989159901599115992159931599415995159961599715998159991600016001160021600316004160051600616007160081600916010160111601216013160141601516016160171601816019160201602116022160231602416025160261602716028160291603016031160321603316034160351603616037160381603916040160411604216043160441604516046160471604816049160501605116052160531605416055160561605716058160591606016061160621606316064160651606616067160681606916070160711607216073160741607516076160771607816079160801608116082160831608416085160861608716088160891609016091160921609316094160951609616097160981609916100161011610216103161041610516106161071610816109161101611116112161131611416115161161611716118161191612016121161221612316124161251612616127161281612916130161311613216133161341613516136161371613816139161401614116142161431614416145161461614716148161491615016151161521615316154161551615616157161581615916160161611616216163161641616516166161671616816169161701617116172161731617416175161761617716178161791618016181161821618316184161851618616187161881618916190161911619216193161941619516196161971619816199162001620116202162031620416205162061620716208162091621016211162121621316214162151621616217162181621916220162211622216223162241622516226162271622816229162301623116232162331623416235162361623716238162391624016241162421624316244162451624616247162481624916250162511625216253162541625516256162571625816259162601626116262162631626416265162661626716268162691627016271162721627316274162751627616277162781627916280162811628216283162841628516286162871628816289162901629116292162931629416295162961629716298162991630016301163021630316304163051630616307163081630916310163111631216313163141631516316163171631816319163201632116322163231632416325163261632716328163291633016331163321633316334163351633616337163381633916340163411634216343163441634516346163471634816349163501635116352163531635416355163561635716358163591636016361163621636316364163651636616367163681636916370163711637216373163741637516376163771637816379163801638116382163831638416385163861638716388163891639016391163921639316394163951639616397163981639916400164011640216403164041640516406164071640816409164101641116412164131641416415164161641716418164191642016421164221642316424164251642616427164281642916430164311643216433164341643516436164371643816439164401644116442164431644416445164461644716448164491645016451164521645316454164551645616457164581645916460164611646216463164641646516466164671646816469164701647116472164731647416475164761647716478164791648016481164821648316484164851648616487164881648916490164911649216493164941649516496164971649816499165001650116502165031650416505165061650716508165091651016511165121651316514165151651616517165181651916520165211652216523165241652516526165271652816529165301653116532165331653416535165361653716538165391654016541165421654316544165451654616547165481654916550165511655216553165541655516556165571655816559165601656116562165631656416565165661656716568165691657016571165721657316574165751657616577165781657916580165811658216583165841658516586165871658816589165901659116592165931659416595165961659716598165991660016601166021660316604166051660616607166081660916610166111661216613166141661516616166171661816619166201662116622166231662416625166261662716628166291663016631166321663316634166351663616637166381663916640166411664216643166441664516646166471664816649166501665116652166531665416655166561665716658166591666016661166621666316664166651666616667166681666916670166711667216673166741667516676166771667816679166801668116682166831668416685166861668716688166891669016691166921669316694166951669616697166981669916700167011670216703167041670516706167071670816709167101671116712167131671416715167161671716718167191672016721167221672316724167251672616727167281672916730167311673216733167341673516736167371673816739167401674116742167431674416745167461674716748167491675016751167521675316754167551675616757167581675916760167611676216763167641676516766167671676816769167701677116772167731677416775167761677716778167791678016781167821678316784167851678616787167881678916790167911679216793167941679516796167971679816799168001680116802168031680416805168061680716808168091681016811168121681316814168151681616817168181681916820168211682216823168241682516826168271682816829168301683116832168331683416835168361683716838168391684016841168421684316844168451684616847168481684916850168511685216853168541685516856168571685816859168601686116862168631686416865168661686716868168691687016871168721687316874168751687616877168781687916880168811688216883168841688516886168871688816889168901689116892168931689416895168961689716898168991690016901169021690316904169051690616907169081690916910169111691216913169141691516916169171691816919169201692116922169231692416925169261692716928169291693016931169321693316934169351693616937169381693916940169411694216943169441694516946169471694816949169501695116952169531695416955169561695716958169591696016961169621696316964169651696616967169681696916970169711697216973169741697516976169771697816979169801698116982169831698416985169861698716988169891699016991169921699316994169951699616997169981699917000170011700217003170041700517006170071700817009170101701117012170131701417015170161701717018170191702017021170221702317024170251702617027170281702917030170311703217033170341703517036170371703817039170401704117042170431704417045170461704717048170491705017051170521705317054170551705617057170581705917060170611706217063170641706517066170671706817069170701707117072170731707417075170761707717078170791708017081170821708317084170851708617087170881708917090170911709217093170941709517096170971709817099171001710117102171031710417105171061710717108171091711017111171121711317114171151711617117171181711917120171211712217123171241712517126171271712817129171301713117132171331713417135171361713717138171391714017141171421714317144171451714617147171481714917150171511715217153171541715517156171571715817159171601716117162171631716417165171661716717168171691717017171171721717317174171751717617177171781717917180171811718217183171841718517186171871718817189171901719117192171931719417195171961719717198171991720017201172021720317204172051720617207172081720917210172111721217213172141721517216172171721817219172201722117222172231722417225172261722717228172291723017231172321723317234172351723617237172381723917240172411724217243172441724517246172471724817249172501725117252172531725417255172561725717258172591726017261172621726317264172651726617267172681726917270172711727217273172741727517276172771727817279172801728117282172831728417285172861728717288172891729017291172921729317294172951729617297172981729917300173011730217303173041730517306173071730817309173101731117312173131731417315173161731717318173191732017321173221732317324173251732617327173281732917330173311733217333173341733517336173371733817339173401734117342173431734417345173461734717348173491735017351173521735317354173551735617357173581735917360173611736217363173641736517366173671736817369173701737117372173731737417375173761737717378173791738017381173821738317384173851738617387173881738917390173911739217393173941739517396173971739817399174001740117402174031740417405174061740717408174091741017411174121741317414174151741617417174181741917420174211742217423174241742517426174271742817429174301743117432174331743417435174361743717438174391744017441174421744317444174451744617447174481744917450174511745217453174541745517456174571745817459174601746117462174631746417465174661746717468174691747017471174721747317474174751747617477174781747917480174811748217483174841748517486174871748817489174901749117492174931749417495174961749717498174991750017501175021750317504175051750617507175081750917510175111751217513175141751517516175171751817519175201752117522175231752417525175261752717528175291753017531175321753317534175351753617537175381753917540175411754217543175441754517546175471754817549175501755117552175531755417555175561755717558175591756017561175621756317564175651756617567175681756917570175711757217573175741757517576175771757817579175801758117582175831758417585175861758717588175891759017591175921759317594175951759617597175981759917600176011760217603176041760517606176071760817609176101761117612176131761417615176161761717618176191762017621176221762317624176251762617627176281762917630176311763217633176341763517636176371763817639176401764117642176431764417645176461764717648176491765017651176521765317654176551765617657176581765917660176611766217663176641766517666176671766817669176701767117672176731767417675176761767717678176791768017681176821768317684176851768617687176881768917690176911769217693176941769517696176971769817699177001770117702177031770417705177061770717708177091771017711177121771317714177151771617717177181771917720177211772217723177241772517726177271772817729177301773117732177331773417735177361773717738177391774017741177421774317744177451774617747177481774917750177511775217753177541775517756177571775817759177601776117762177631776417765177661776717768177691777017771177721777317774177751777617777177781777917780177811778217783177841778517786177871778817789177901779117792177931779417795177961779717798177991780017801178021780317804178051780617807178081780917810178111781217813178141781517816178171781817819178201782117822178231782417825178261782717828178291783017831178321783317834178351783617837178381783917840178411784217843178441784517846178471784817849178501785117852178531785417855178561785717858178591786017861178621786317864178651786617867178681786917870178711787217873178741787517876178771787817879178801788117882178831788417885178861788717888178891789017891178921789317894178951789617897178981789917900179011790217903179041790517906179071790817909179101791117912179131791417915179161791717918179191792017921179221792317924179251792617927179281792917930179311793217933179341793517936179371793817939179401794117942179431794417945179461794717948179491795017951179521795317954179551795617957179581795917960179611796217963179641796517966179671796817969179701797117972179731797417975179761797717978179791798017981179821798317984179851798617987179881798917990179911799217993179941799517996179971799817999180001800118002180031800418005180061800718008180091801018011180121801318014180151801618017180181801918020180211802218023180241802518026180271802818029180301803118032180331803418035180361803718038180391804018041180421804318044180451804618047180481804918050180511805218053180541805518056180571805818059180601806118062180631806418065180661806718068180691807018071180721807318074180751807618077180781807918080180811808218083180841808518086180871808818089180901809118092180931809418095180961809718098180991810018101181021810318104181051810618107181081810918110181111811218113181141811518116181171811818119181201812118122181231812418125181261812718128181291813018131181321813318134181351813618137181381813918140181411814218143181441814518146181471814818149181501815118152181531815418155181561815718158181591816018161181621816318164181651816618167181681816918170181711817218173181741817518176181771817818179181801818118182181831818418185181861818718188181891819018191181921819318194181951819618197181981819918200182011820218203182041820518206182071820818209182101821118212182131821418215182161821718218182191822018221182221822318224182251822618227182281822918230182311823218233182341823518236182371823818239182401824118242182431824418245182461824718248182491825018251182521825318254182551825618257182581825918260182611826218263182641826518266182671826818269182701827118272182731827418275182761827718278182791828018281182821828318284182851828618287182881828918290182911829218293182941829518296182971829818299183001830118302183031830418305183061830718308183091831018311183121831318314183151831618317183181831918320183211832218323183241832518326183271832818329183301833118332183331833418335183361833718338183391834018341183421834318344183451834618347183481834918350183511835218353183541835518356183571835818359183601836118362183631836418365183661836718368183691837018371183721837318374183751837618377183781837918380183811838218383183841838518386183871838818389183901839118392183931839418395183961839718398183991840018401184021840318404184051840618407184081840918410184111841218413184141841518416184171841818419184201842118422184231842418425184261842718428184291843018431184321843318434184351843618437184381843918440184411844218443184441844518446184471844818449184501845118452184531845418455184561845718458184591846018461184621846318464184651846618467184681846918470184711847218473184741847518476184771847818479184801848118482184831848418485184861848718488184891849018491184921849318494184951849618497184981849918500185011850218503185041850518506185071850818509185101851118512185131851418515185161851718518185191852018521185221852318524185251852618527185281852918530185311853218533185341853518536185371853818539185401854118542185431854418545185461854718548185491855018551185521855318554185551855618557185581855918560185611856218563185641856518566185671856818569185701857118572185731857418575185761857718578185791858018581185821858318584185851858618587185881858918590185911859218593185941859518596185971859818599186001860118602186031860418605186061860718608186091861018611186121861318614186151861618617186181861918620186211862218623186241862518626186271862818629186301863118632186331863418635186361863718638186391864018641186421864318644186451864618647186481864918650186511865218653186541865518656186571865818659186601866118662186631866418665186661866718668186691867018671186721867318674186751867618677186781867918680186811868218683186841868518686186871868818689186901869118692186931869418695186961869718698186991870018701187021870318704187051870618707187081870918710187111871218713187141871518716187171871818719187201872118722187231872418725187261872718728187291873018731187321873318734187351873618737187381873918740187411874218743187441874518746187471874818749187501875118752187531875418755187561875718758187591876018761187621876318764187651876618767187681876918770187711877218773187741877518776187771877818779187801878118782187831878418785187861878718788187891879018791187921879318794187951879618797187981879918800188011880218803188041880518806188071880818809188101881118812188131881418815188161881718818188191882018821188221882318824188251882618827188281882918830188311883218833188341883518836188371883818839188401884118842188431884418845188461884718848188491885018851188521885318854188551885618857188581885918860188611886218863188641886518866188671886818869188701887118872188731887418875188761887718878188791888018881188821888318884188851888618887188881888918890188911889218893188941889518896188971889818899189001890118902189031890418905189061890718908189091891018911189121891318914189151891618917189181891918920189211892218923189241892518926189271892818929189301893118932189331893418935189361893718938189391894018941189421894318944189451894618947189481894918950189511895218953189541895518956189571895818959189601896118962189631896418965189661896718968189691897018971189721897318974189751897618977189781897918980189811898218983189841898518986189871898818989189901899118992189931899418995189961899718998189991900019001190021900319004190051900619007190081900919010190111901219013190141901519016190171901819019190201902119022190231902419025190261902719028190291903019031190321903319034190351903619037190381903919040190411904219043190441904519046190471904819049190501905119052190531905419055190561905719058190591906019061190621906319064190651906619067190681906919070190711907219073190741907519076190771907819079190801908119082190831908419085190861908719088190891909019091190921909319094190951909619097190981909919100191011910219103191041910519106191071910819109191101911119112191131911419115191161911719118191191912019121191221912319124191251912619127191281912919130191311913219133191341913519136191371913819139191401914119142191431914419145191461914719148191491915019151191521915319154191551915619157191581915919160191611916219163191641916519166191671916819169191701917119172191731917419175191761917719178191791918019181191821918319184191851918619187191881918919190191911919219193191941919519196191971919819199192001920119202192031920419205192061920719208192091921019211192121921319214192151921619217192181921919220192211922219223192241922519226192271922819229192301923119232192331923419235192361923719238192391924019241192421924319244192451924619247192481924919250192511925219253192541925519256192571925819259192601926119262192631926419265192661926719268192691927019271192721927319274192751927619277192781927919280192811928219283192841928519286192871928819289192901929119292192931929419295192961929719298192991930019301193021930319304193051930619307193081930919310193111931219313193141931519316193171931819319193201932119322193231932419325193261932719328193291933019331193321933319334193351933619337193381933919340193411934219343193441934519346193471934819349193501935119352193531935419355193561935719358193591936019361193621936319364193651936619367193681936919370193711937219373193741937519376193771937819379193801938119382193831938419385193861938719388193891939019391193921939319394193951939619397193981939919400194011940219403194041940519406194071940819409194101941119412194131941419415194161941719418194191942019421194221942319424194251942619427194281942919430194311943219433194341943519436194371943819439194401944119442194431944419445194461944719448194491945019451194521945319454194551945619457194581945919460194611946219463194641946519466194671946819469194701947119472194731947419475194761947719478194791948019481194821948319484194851948619487194881948919490194911949219493194941949519496194971949819499195001950119502195031950419505195061950719508195091951019511195121951319514195151951619517195181951919520195211952219523195241952519526195271952819529195301953119532195331953419535195361953719538195391954019541195421954319544195451954619547195481954919550195511955219553195541955519556195571955819559195601956119562195631956419565195661956719568195691957019571195721957319574195751957619577195781957919580195811958219583195841958519586195871958819589195901959119592195931959419595195961959719598195991960019601196021960319604196051960619607196081960919610196111961219613196141961519616196171961819619196201962119622196231962419625196261962719628196291963019631196321963319634196351963619637196381963919640196411964219643196441964519646196471964819649196501965119652196531965419655196561965719658196591966019661196621966319664196651966619667196681966919670196711967219673196741967519676196771967819679196801968119682196831968419685196861968719688196891969019691196921969319694196951969619697196981969919700197011970219703197041970519706197071970819709197101971119712197131971419715197161971719718197191972019721197221972319724197251972619727197281972919730197311973219733197341973519736197371973819739197401974119742197431974419745197461974719748197491975019751197521975319754197551975619757197581975919760197611976219763197641976519766197671976819769197701977119772197731977419775197761977719778197791978019781197821978319784197851978619787197881978919790197911979219793197941979519796197971979819799198001980119802198031980419805198061980719808198091981019811198121981319814198151981619817198181981919820198211982219823198241982519826198271982819829198301983119832198331983419835198361983719838198391984019841198421984319844198451984619847198481984919850198511985219853198541985519856198571985819859198601986119862198631986419865198661986719868198691987019871198721987319874198751987619877198781987919880198811988219883198841988519886198871988819889198901989119892198931989419895198961989719898198991990019901199021990319904199051990619907199081990919910199111991219913199141991519916199171991819919199201992119922199231992419925199261992719928199291993019931199321993319934199351993619937199381993919940199411994219943199441994519946199471994819949199501995119952199531995419955199561995719958199591996019961199621996319964199651996619967199681996919970199711997219973199741997519976199771997819979199801998119982199831998419985199861998719988199891999019991199921999319994199951999619997199981999920000200012000220003200042000520006200072000820009200102001120012200132001420015200162001720018200192002020021200222002320024200252002620027200282002920030200312003220033200342003520036200372003820039200402004120042200432004420045200462004720048200492005020051200522005320054200552005620057200582005920060200612006220063200642006520066200672006820069200702007120072200732007420075200762007720078200792008020081200822008320084200852008620087200882008920090200912009220093200942009520096200972009820099201002010120102201032010420105201062010720108201092011020111201122011320114201152011620117201182011920120201212012220123201242012520126201272012820129201302013120132201332013420135201362013720138201392014020141201422014320144201452014620147201482014920150201512015220153201542015520156201572015820159201602016120162201632016420165201662016720168201692017020171201722017320174201752017620177201782017920180201812018220183201842018520186201872018820189201902019120192201932019420195201962019720198201992020020201202022020320204202052020620207202082020920210202112021220213202142021520216202172021820219202202022120222202232022420225202262022720228202292023020231202322023320234202352023620237202382023920240202412024220243202442024520246202472024820249202502025120252202532025420255202562025720258202592026020261202622026320264202652026620267202682026920270202712027220273202742027520276202772027820279202802028120282202832028420285202862028720288202892029020291202922029320294202952029620297202982029920300203012030220303203042030520306203072030820309203102031120312203132031420315203162031720318203192032020321203222032320324203252032620327203282032920330203312033220333203342033520336203372033820339203402034120342203432034420345203462034720348203492035020351203522035320354203552035620357203582035920360203612036220363203642036520366203672036820369203702037120372203732037420375203762037720378203792038020381203822038320384203852038620387203882038920390203912039220393203942039520396203972039820399204002040120402204032040420405204062040720408204092041020411204122041320414204152041620417204182041920420204212042220423204242042520426204272042820429204302043120432204332043420435204362043720438204392044020441204422044320444204452044620447204482044920450204512045220453204542045520456204572045820459204602046120462204632046420465204662046720468204692047020471204722047320474204752047620477204782047920480204812048220483204842048520486204872048820489204902049120492204932049420495204962049720498204992050020501205022050320504205052050620507205082050920510205112051220513205142051520516205172051820519205202052120522205232052420525205262052720528205292053020531205322053320534205352053620537205382053920540205412054220543205442054520546205472054820549205502055120552205532055420555205562055720558205592056020561205622056320564205652056620567205682056920570205712057220573205742057520576205772057820579205802058120582205832058420585205862058720588205892059020591205922059320594205952059620597205982059920600206012060220603206042060520606206072060820609206102061120612206132061420615206162061720618206192062020621206222062320624206252062620627206282062920630206312063220633206342063520636206372063820639206402064120642206432064420645206462064720648206492065020651206522065320654206552065620657206582065920660206612066220663206642066520666206672066820669206702067120672206732067420675206762067720678206792068020681206822068320684206852068620687206882068920690206912069220693206942069520696206972069820699207002070120702207032070420705207062070720708207092071020711207122071320714207152071620717207182071920720207212072220723207242072520726207272072820729207302073120732207332073420735207362073720738207392074020741207422074320744207452074620747207482074920750207512075220753207542075520756207572075820759207602076120762207632076420765207662076720768207692077020771207722077320774207752077620777207782077920780207812078220783207842078520786207872078820789207902079120792207932079420795207962079720798207992080020801208022080320804208052080620807208082080920810208112081220813208142081520816208172081820819208202082120822208232082420825208262082720828208292083020831208322083320834208352083620837208382083920840208412084220843208442084520846208472084820849208502085120852208532085420855208562085720858208592086020861208622086320864208652086620867208682086920870208712087220873208742087520876208772087820879208802088120882208832088420885208862088720888208892089020891208922089320894208952089620897208982089920900209012090220903209042090520906209072090820909209102091120912209132091420915209162091720918209192092020921209222092320924209252092620927209282092920930209312093220933209342093520936209372093820939209402094120942209432094420945209462094720948209492095020951209522095320954209552095620957209582095920960209612096220963209642096520966209672096820969209702097120972209732097420975209762097720978209792098020981209822098320984209852098620987209882098920990209912099220993209942099520996209972099820999210002100121002210032100421005210062100721008210092101021011210122101321014210152101621017210182101921020210212102221023210242102521026210272102821029210302103121032210332103421035210362103721038210392104021041210422104321044210452104621047210482104921050210512105221053210542105521056210572105821059210602106121062210632106421065210662106721068210692107021071210722107321074210752107621077210782107921080210812108221083210842108521086210872108821089210902109121092210932109421095210962109721098210992110021101211022110321104211052110621107211082110921110211112111221113211142111521116211172111821119211202112121122211232112421125211262112721128211292113021131211322113321134211352113621137211382113921140211412114221143211442114521146211472114821149211502115121152211532115421155211562115721158211592116021161211622116321164211652116621167211682116921170211712117221173211742117521176211772117821179211802118121182211832118421185211862118721188211892119021191211922119321194211952119621197211982119921200212012120221203212042120521206212072120821209212102121121212212132121421215212162121721218212192122021221212222122321224212252122621227212282122921230212312123221233212342123521236212372123821239212402124121242212432124421245212462124721248212492125021251212522125321254212552125621257212582125921260212612126221263212642126521266212672126821269212702127121272212732127421275212762127721278212792128021281212822128321284212852128621287212882128921290212912129221293212942129521296212972129821299213002130121302213032130421305213062130721308213092131021311213122131321314213152131621317213182131921320213212132221323213242132521326213272132821329213302133121332213332133421335213362133721338213392134021341213422134321344213452134621347213482134921350213512135221353213542135521356213572135821359213602136121362213632136421365213662136721368213692137021371213722137321374213752137621377213782137921380213812138221383213842138521386213872138821389213902139121392213932139421395213962139721398213992140021401214022140321404214052140621407214082140921410214112141221413214142141521416214172141821419214202142121422214232142421425214262142721428214292143021431214322143321434214352143621437214382143921440214412144221443214442144521446214472144821449214502145121452214532145421455214562145721458214592146021461214622146321464214652146621467214682146921470214712147221473214742147521476214772147821479214802148121482214832148421485214862148721488214892149021491214922149321494214952149621497214982149921500215012150221503215042150521506215072150821509215102151121512215132151421515215162151721518215192152021521215222152321524215252152621527215282152921530215312153221533215342153521536215372153821539215402154121542215432154421545215462154721548215492155021551215522155321554215552155621557215582155921560215612156221563215642156521566215672156821569215702157121572215732157421575215762157721578215792158021581215822158321584215852158621587215882158921590215912159221593215942159521596215972159821599216002160121602216032160421605216062160721608216092161021611216122161321614216152161621617216182161921620216212162221623216242162521626216272162821629216302163121632216332163421635216362163721638216392164021641216422164321644216452164621647216482164921650216512165221653216542165521656216572165821659216602166121662216632166421665216662166721668216692167021671216722167321674216752167621677216782167921680216812168221683216842168521686216872168821689216902169121692216932169421695216962169721698216992170021701217022170321704217052170621707217082170921710217112171221713217142171521716217172171821719217202172121722217232172421725217262172721728217292173021731217322173321734217352173621737217382173921740217412174221743217442174521746217472174821749217502175121752217532175421755217562175721758217592176021761217622176321764217652176621767217682176921770217712177221773217742177521776217772177821779217802178121782217832178421785217862178721788217892179021791217922179321794217952179621797217982179921800218012180221803218042180521806218072180821809218102181121812218132181421815218162181721818218192182021821218222182321824218252182621827218282182921830218312183221833218342183521836218372183821839218402184121842218432184421845218462184721848218492185021851218522185321854218552185621857218582185921860218612186221863218642186521866218672186821869218702187121872218732187421875218762187721878218792188021881218822188321884218852188621887218882188921890218912189221893218942189521896218972189821899219002190121902219032190421905219062190721908219092191021911219122191321914219152191621917219182191921920219212192221923219242192521926219272192821929219302193121932219332193421935219362193721938219392194021941219422194321944219452194621947219482194921950219512195221953219542195521956219572195821959219602196121962219632196421965219662196721968219692197021971219722197321974219752197621977219782197921980219812198221983219842198521986219872198821989219902199121992219932199421995219962199721998219992200022001220022200322004220052200622007220082200922010220112201222013220142201522016220172201822019220202202122022220232202422025220262202722028220292203022031220322203322034220352203622037220382203922040220412204222043220442204522046220472204822049220502205122052220532205422055220562205722058220592206022061220622206322064220652206622067220682206922070220712207222073220742207522076220772207822079220802208122082220832208422085220862208722088220892209022091220922209322094220952209622097220982209922100221012210222103221042210522106221072210822109221102211122112221132211422115221162211722118221192212022121221222212322124221252212622127221282212922130221312213222133221342213522136221372213822139221402214122142221432214422145221462214722148221492215022151221522215322154221552215622157221582215922160221612216222163221642216522166221672216822169221702217122172221732217422175221762217722178221792218022181221822218322184221852218622187221882218922190221912219222193221942219522196221972219822199222002220122202222032220422205222062220722208222092221022211222122221322214222152221622217222182221922220222212222222223222242222522226222272222822229222302223122232222332223422235222362223722238222392224022241222422224322244222452224622247222482224922250222512225222253222542225522256222572225822259222602226122262222632226422265222662226722268222692227022271222722227322274222752227622277222782227922280222812228222283222842228522286222872228822289222902229122292222932229422295222962229722298222992230022301223022230322304223052230622307223082230922310223112231222313223142231522316223172231822319223202232122322223232232422325223262232722328223292233022331223322233322334223352233622337223382233922340223412234222343223442234522346223472234822349223502235122352223532235422355223562235722358223592236022361223622236322364223652236622367223682236922370223712237222373223742237522376223772237822379223802238122382223832238422385223862238722388223892239022391223922239322394223952239622397223982239922400224012240222403224042240522406224072240822409224102241122412224132241422415224162241722418224192242022421224222242322424224252242622427224282242922430224312243222433224342243522436224372243822439224402244122442224432244422445224462244722448224492245022451224522245322454224552245622457224582245922460224612246222463224642246522466224672246822469224702247122472224732247422475224762247722478224792248022481224822248322484224852248622487224882248922490224912249222493224942249522496224972249822499225002250122502225032250422505225062250722508225092251022511225122251322514225152251622517225182251922520225212252222523225242252522526225272252822529225302253122532225332253422535225362253722538225392254022541225422254322544225452254622547225482254922550225512255222553225542255522556225572255822559225602256122562225632256422565225662256722568225692257022571225722257322574225752257622577225782257922580225812258222583225842258522586225872258822589225902259122592225932259422595225962259722598225992260022601226022260322604226052260622607226082260922610226112261222613226142261522616226172261822619226202262122622226232262422625226262262722628226292263022631226322263322634226352263622637226382263922640226412264222643226442264522646226472264822649226502265122652226532265422655226562265722658226592266022661226622266322664226652266622667226682266922670226712267222673226742267522676226772267822679226802268122682226832268422685226862268722688226892269022691226922269322694226952269622697226982269922700227012270222703227042270522706227072270822709227102271122712227132271422715227162271722718227192272022721227222272322724227252272622727227282272922730227312273222733227342273522736227372273822739227402274122742227432274422745227462274722748227492275022751227522275322754227552275622757227582275922760227612276222763227642276522766227672276822769227702277122772227732277422775227762277722778227792278022781227822278322784227852278622787227882278922790227912279222793227942279522796227972279822799228002280122802228032280422805228062280722808228092281022811228122281322814228152281622817228182281922820228212282222823228242282522826228272282822829228302283122832228332283422835228362283722838228392284022841228422284322844228452284622847228482284922850228512285222853228542285522856228572285822859228602286122862228632286422865228662286722868228692287022871228722287322874228752287622877228782287922880228812288222883228842288522886228872288822889228902289122892228932289422895228962289722898228992290022901229022290322904229052290622907229082290922910229112291222913229142291522916229172291822919229202292122922229232292422925229262292722928229292293022931229322293322934229352293622937229382293922940229412294222943229442294522946229472294822949229502295122952229532295422955229562295722958229592296022961229622296322964229652296622967229682296922970229712297222973229742297522976229772297822979229802298122982229832298422985229862298722988229892299022991229922299322994229952299622997229982299923000230012300223003230042300523006230072300823009230102301123012230132301423015230162301723018230192302023021230222302323024230252302623027230282302923030230312303223033230342303523036230372303823039230402304123042230432304423045230462304723048230492305023051230522305323054230552305623057230582305923060230612306223063230642306523066230672306823069230702307123072230732307423075230762307723078230792308023081230822308323084230852308623087230882308923090230912309223093230942309523096230972309823099231002310123102231032310423105231062310723108231092311023111231122311323114231152311623117231182311923120231212312223123231242312523126231272312823129231302313123132231332313423135231362313723138231392314023141231422314323144231452314623147231482314923150231512315223153231542315523156231572315823159231602316123162231632316423165231662316723168231692317023171231722317323174231752317623177231782317923180231812318223183231842318523186231872318823189231902319123192231932319423195231962319723198231992320023201232022320323204232052320623207232082320923210232112321223213232142321523216232172321823219232202322123222232232322423225232262322723228232292323023231232322323323234232352323623237232382323923240232412324223243232442324523246232472324823249232502325123252232532325423255232562325723258232592326023261232622326323264232652326623267232682326923270232712327223273232742327523276232772327823279232802328123282232832328423285232862328723288232892329023291232922329323294232952329623297232982329923300233012330223303233042330523306233072330823309233102331123312233132331423315233162331723318233192332023321233222332323324233252332623327233282332923330233312333223333233342333523336233372333823339233402334123342233432334423345233462334723348233492335023351233522335323354233552335623357233582335923360233612336223363233642336523366233672336823369233702337123372233732337423375233762337723378233792338023381233822338323384233852338623387233882338923390233912339223393233942339523396233972339823399234002340123402234032340423405234062340723408234092341023411234122341323414234152341623417234182341923420234212342223423234242342523426234272342823429234302343123432234332343423435234362343723438234392344023441234422344323444234452344623447234482344923450234512345223453234542345523456234572345823459234602346123462234632346423465234662346723468234692347023471234722347323474234752347623477234782347923480234812348223483234842348523486234872348823489234902349123492234932349423495234962349723498234992350023501235022350323504235052350623507235082350923510235112351223513235142351523516235172351823519235202352123522235232352423525235262352723528235292353023531235322353323534235352353623537235382353923540235412354223543235442354523546235472354823549235502355123552235532355423555235562355723558235592356023561235622356323564235652356623567235682356923570235712357223573235742357523576235772357823579235802358123582235832358423585235862358723588235892359023591235922359323594235952359623597235982359923600236012360223603236042360523606236072360823609236102361123612236132361423615236162361723618236192362023621236222362323624236252362623627236282362923630236312363223633236342363523636236372363823639236402364123642236432364423645236462364723648236492365023651236522365323654236552365623657236582365923660236612366223663236642366523666236672366823669236702367123672236732367423675236762367723678236792368023681236822368323684236852368623687236882368923690236912369223693236942369523696236972369823699237002370123702237032370423705237062370723708237092371023711237122371323714237152371623717237182371923720237212372223723237242372523726237272372823729237302373123732237332373423735237362373723738237392374023741237422374323744237452374623747237482374923750237512375223753237542375523756237572375823759237602376123762237632376423765237662376723768237692377023771237722377323774237752377623777237782377923780237812378223783237842378523786237872378823789237902379123792237932379423795237962379723798237992380023801238022380323804238052380623807238082380923810238112381223813238142381523816238172381823819238202382123822238232382423825238262382723828238292383023831238322383323834238352383623837238382383923840238412384223843238442384523846238472384823849238502385123852238532385423855238562385723858238592386023861238622386323864238652386623867238682386923870238712387223873238742387523876238772387823879238802388123882238832388423885238862388723888238892389023891238922389323894238952389623897238982389923900239012390223903239042390523906239072390823909239102391123912239132391423915239162391723918239192392023921239222392323924239252392623927239282392923930239312393223933239342393523936239372393823939239402394123942239432394423945239462394723948239492395023951239522395323954239552395623957239582395923960239612396223963239642396523966239672396823969239702397123972239732397423975239762397723978239792398023981239822398323984239852398623987239882398923990239912399223993239942399523996239972399823999240002400124002240032400424005240062400724008240092401024011240122401324014240152401624017240182401924020240212402224023240242402524026240272402824029240302403124032240332403424035240362403724038240392404024041240422404324044240452404624047240482404924050240512405224053240542405524056240572405824059240602406124062240632406424065240662406724068240692407024071240722407324074240752407624077240782407924080240812408224083240842408524086240872408824089240902409124092240932409424095240962409724098240992410024101241022410324104241052410624107241082410924110241112411224113241142411524116241172411824119241202412124122241232412424125241262412724128241292413024131241322413324134241352413624137241382413924140241412414224143241442414524146241472414824149241502415124152241532415424155241562415724158241592416024161241622416324164241652416624167241682416924170241712417224173241742417524176241772417824179241802418124182241832418424185241862418724188241892419024191241922419324194241952419624197241982419924200242012420224203242042420524206242072420824209242102421124212242132421424215242162421724218242192422024221242222422324224242252422624227242282422924230242312423224233242342423524236242372423824239242402424124242242432424424245242462424724248242492425024251242522425324254242552425624257242582425924260242612426224263242642426524266242672426824269242702427124272242732427424275242762427724278242792428024281242822428324284242852428624287242882428924290242912429224293242942429524296242972429824299243002430124302243032430424305243062430724308243092431024311243122431324314243152431624317243182431924320243212432224323243242432524326243272432824329243302433124332243332433424335243362433724338243392434024341243422434324344243452434624347243482434924350243512435224353243542435524356243572435824359243602436124362243632436424365243662436724368243692437024371243722437324374243752437624377243782437924380243812438224383243842438524386243872438824389243902439124392243932439424395243962439724398243992440024401244022440324404244052440624407244082440924410244112441224413244142441524416244172441824419244202442124422244232442424425244262442724428244292443024431244322443324434244352443624437244382443924440244412444224443244442444524446244472444824449244502445124452244532445424455244562445724458244592446024461244622446324464244652446624467244682446924470244712447224473244742447524476244772447824479244802448124482244832448424485244862448724488244892449024491244922449324494244952449624497244982449924500245012450224503245042450524506245072450824509245102451124512245132451424515245162451724518245192452024521245222452324524245252452624527245282452924530245312453224533245342453524536245372453824539245402454124542245432454424545245462454724548245492455024551245522455324554245552455624557245582455924560245612456224563245642456524566245672456824569
  1. /* ssl.c
  2. *
  3. * Copyright (C) 2006-2023 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <wolfssl/wolfcrypt/settings.h>
  25. #if defined(OPENSSL_EXTRA) && !defined(_WIN32)
  26. /* turn on GNU extensions for XISASCII */
  27. #undef _GNU_SOURCE
  28. #define _GNU_SOURCE
  29. #endif
  30. #if !defined(WOLFCRYPT_ONLY) || defined(OPENSSL_EXTRA) || \
  31. defined(OPENSSL_EXTRA_X509_SMALL)
  32. #include <wolfssl/internal.h>
  33. #include <wolfssl/error-ssl.h>
  34. #include <wolfssl/wolfcrypt/coding.h>
  35. #include <wolfssl/wolfcrypt/kdf.h>
  36. #ifdef NO_INLINE
  37. #include <wolfssl/wolfcrypt/misc.h>
  38. #else
  39. #define WOLFSSL_MISC_INCLUDED
  40. #include <wolfcrypt/src/misc.c>
  41. #endif
  42. #ifdef HAVE_ERRNO_H
  43. #include <errno.h>
  44. #endif
  45. #if !defined(WOLFSSL_ALLOW_NO_SUITES) && !defined(WOLFCRYPT_ONLY)
  46. #if defined(NO_DH) && !defined(HAVE_ECC) && !defined(WOLFSSL_STATIC_RSA) \
  47. && !defined(WOLFSSL_STATIC_DH) && !defined(WOLFSSL_STATIC_PSK) \
  48. && !defined(HAVE_CURVE25519) && !defined(HAVE_CURVE448)
  49. #error "No cipher suites defined because DH disabled, ECC disabled, "
  50. "and no static suites defined. Please see top of README"
  51. #endif
  52. #ifdef WOLFSSL_CERT_GEN
  53. /* need access to Cert struct for creating certificate */
  54. #include <wolfssl/wolfcrypt/asn_public.h>
  55. #endif
  56. #endif
  57. #if !defined(WOLFCRYPT_ONLY) && (defined(OPENSSL_EXTRA) \
  58. || defined(OPENSSL_EXTRA_X509_SMALL) \
  59. || defined(HAVE_WEBSERVER) || defined(WOLFSSL_KEY_GEN))
  60. #include <wolfssl/openssl/evp.h>
  61. /* openssl headers end, wolfssl internal headers next */
  62. #endif
  63. #include <wolfssl/wolfcrypt/wc_encrypt.h>
  64. #ifndef NO_RSA
  65. #include <wolfssl/wolfcrypt/rsa.h>
  66. #endif
  67. #ifdef OPENSSL_EXTRA
  68. /* openssl headers begin */
  69. #include <wolfssl/openssl/ssl.h>
  70. #include <wolfssl/openssl/aes.h>
  71. #ifndef WOLFCRYPT_ONLY
  72. #include <wolfssl/openssl/hmac.h>
  73. #include <wolfssl/openssl/cmac.h>
  74. #endif
  75. #include <wolfssl/openssl/crypto.h>
  76. #include <wolfssl/openssl/des.h>
  77. #include <wolfssl/openssl/bn.h>
  78. #include <wolfssl/openssl/buffer.h>
  79. #include <wolfssl/openssl/dh.h>
  80. #include <wolfssl/openssl/rsa.h>
  81. #include <wolfssl/openssl/fips_rand.h>
  82. #include <wolfssl/openssl/pem.h>
  83. #include <wolfssl/openssl/ec.h>
  84. #include <wolfssl/openssl/ec25519.h>
  85. #include <wolfssl/openssl/ed25519.h>
  86. #include <wolfssl/openssl/ec448.h>
  87. #include <wolfssl/openssl/ed448.h>
  88. #include <wolfssl/openssl/ecdsa.h>
  89. #include <wolfssl/openssl/ecdh.h>
  90. #include <wolfssl/openssl/err.h>
  91. #include <wolfssl/openssl/modes.h>
  92. #include <wolfssl/openssl/opensslv.h>
  93. #include <wolfssl/openssl/rc4.h>
  94. #include <wolfssl/openssl/stack.h>
  95. #include <wolfssl/openssl/x509_vfy.h>
  96. /* openssl headers end, wolfssl internal headers next */
  97. #include <wolfssl/wolfcrypt/hmac.h>
  98. #include <wolfssl/wolfcrypt/random.h>
  99. #include <wolfssl/wolfcrypt/des3.h>
  100. #include <wolfssl/wolfcrypt/ecc.h>
  101. #include <wolfssl/wolfcrypt/md4.h>
  102. #include <wolfssl/wolfcrypt/md5.h>
  103. #include <wolfssl/wolfcrypt/arc4.h>
  104. #include <wolfssl/wolfcrypt/curve25519.h>
  105. #include <wolfssl/wolfcrypt/ed25519.h>
  106. #include <wolfssl/wolfcrypt/curve448.h>
  107. #if defined(HAVE_PQC)
  108. #if defined(HAVE_FALCON)
  109. #include <wolfssl/wolfcrypt/falcon.h>
  110. #endif /* HAVE_FALCON */
  111. #if defined(HAVE_DILITHIUM)
  112. #include <wolfssl/wolfcrypt/dilithium.h>
  113. #endif /* HAVE_DILITHIUM */
  114. #if defined(HAVE_SPHINCS)
  115. #include <wolfssl/wolfcrypt/sphincs.h>
  116. #endif /* HAVE_SPHINCS */
  117. #endif /* HAVE_PQC */
  118. #if defined(OPENSSL_ALL) || defined(HAVE_STUNNEL)
  119. #ifdef HAVE_OCSP
  120. #include <wolfssl/openssl/ocsp.h>
  121. #endif
  122. #include <wolfssl/openssl/lhash.h>
  123. #include <wolfssl/openssl/txt_db.h>
  124. #endif /* WITH_STUNNEL */
  125. #if defined(WOLFSSL_SHA512) || defined(WOLFSSL_SHA384)
  126. #include <wolfssl/wolfcrypt/sha512.h>
  127. #endif
  128. #if defined(WOLFCRYPT_HAVE_SRP) && !defined(NO_SHA256) \
  129. && !defined(WC_NO_RNG)
  130. #include <wolfssl/wolfcrypt/srp.h>
  131. #endif
  132. #endif
  133. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  134. #include <wolfssl/openssl/x509v3.h>
  135. int wolfssl_bn_get_value(WOLFSSL_BIGNUM* bn, mp_int* mpi);
  136. int wolfssl_bn_set_value(WOLFSSL_BIGNUM** bn, mp_int* mpi);
  137. #endif
  138. #if defined(WOLFSSL_QT)
  139. #include <wolfssl/wolfcrypt/sha.h>
  140. #endif
  141. #ifdef NO_ASN
  142. #include <wolfssl/wolfcrypt/dh.h>
  143. #endif
  144. #endif /* !WOLFCRYPT_ONLY || OPENSSL_EXTRA */
  145. /*
  146. * OPENSSL_COMPATIBLE_DEFAULTS:
  147. * Enable default behaviour that is compatible with OpenSSL. For example
  148. * SSL_CTX by default doesn't verify the loaded certs. Enabling this
  149. * should make porting to new projects easier.
  150. * WOLFSSL_CHECK_ALERT_ON_ERR:
  151. * Check for alerts during the handshake in the event of an error.
  152. * NO_SESSION_CACHE_REF:
  153. * wolfSSL_get_session on a client will return a reference to the internal
  154. * ClientCache by default for backwards compatibility. This define will
  155. * make wolfSSL_get_session return a reference to ssl->session. The returned
  156. * pointer will be freed with the related WOLFSSL object.
  157. * SESSION_CACHE_DYNAMIC_MEM:
  158. * Dynamically allocate sessions for the session cache from the heap, as
  159. * opposed to the default which allocates from the stack. Allocates
  160. * memory only when a session is added to the cache, frees memory after the
  161. * session is no longer being used. Recommended for memory-constrained
  162. * systems.
  163. * WOLFSSL_SYS_CA_CERTS
  164. * Enables ability to load system CA certs from the OS via
  165. * wolfSSL_CTX_load_system_CA_certs.
  166. */
  167. #define WOLFSSL_SSL_MISC_INCLUDED
  168. #include "src/ssl_misc.c"
  169. #define WOLFSSL_EVP_INCLUDED
  170. #include "wolfcrypt/src/evp.c"
  171. /* Crypto code uses EVP APIs. */
  172. #define WOLFSSL_SSL_CRYPTO_INCLUDED
  173. #include "src/ssl_crypto.c"
  174. #ifndef WOLFCRYPT_ONLY
  175. #define WOLFSSL_SSL_CERTMAN_INCLUDED
  176. #include "src/ssl_certman.c"
  177. #define WOLFSSL_SSL_SESS_INCLUDED
  178. #include "src/ssl_sess.c"
  179. #endif
  180. #if (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
  181. !defined(WOLFCRYPT_ONLY)
  182. /* Convert shortname to NID.
  183. *
  184. * For OpenSSL compatibility.
  185. *
  186. * This function shouldn't exist!
  187. * Uses defines in wolfssl/openssl/evp.h.
  188. * Uses EccEnumToNID which uses defines in wolfssl/openssl/ec.h.
  189. *
  190. * @param [in] sn Short name of OID.
  191. * @return NID corresponding to shortname on success.
  192. * @return NID_undef when not recognized.
  193. */
  194. int wc_OBJ_sn2nid(const char *sn)
  195. {
  196. const struct {
  197. const char *sn;
  198. int nid;
  199. } sn2nid[] = {
  200. #ifndef NO_CERTS
  201. {WOLFSSL_COMMON_NAME, NID_commonName},
  202. {WOLFSSL_COUNTRY_NAME, NID_countryName},
  203. {WOLFSSL_LOCALITY_NAME, NID_localityName},
  204. {WOLFSSL_STATE_NAME, NID_stateOrProvinceName},
  205. {WOLFSSL_ORG_NAME, NID_organizationName},
  206. {WOLFSSL_ORGUNIT_NAME, NID_organizationalUnitName},
  207. #ifdef WOLFSSL_CERT_NAME_ALL
  208. {WOLFSSL_NAME, NID_name},
  209. {WOLFSSL_INITIALS, NID_initials},
  210. {WOLFSSL_GIVEN_NAME, NID_givenName},
  211. {WOLFSSL_DNQUALIFIER, NID_dnQualifier},
  212. #endif
  213. {WOLFSSL_EMAIL_ADDR, NID_emailAddress},
  214. #endif
  215. {"SHA1", NID_sha1},
  216. {NULL, -1}};
  217. int i;
  218. #ifdef HAVE_ECC
  219. char curveName[ECC_MAXNAME + 1];
  220. int eccEnum;
  221. #endif
  222. WOLFSSL_ENTER("wc_OBJ_sn2nid");
  223. for(i=0; sn2nid[i].sn != NULL; i++) {
  224. if (XSTRCMP(sn, sn2nid[i].sn) == 0) {
  225. return sn2nid[i].nid;
  226. }
  227. }
  228. #ifdef HAVE_ECC
  229. if (XSTRLEN(sn) > ECC_MAXNAME)
  230. return NID_undef;
  231. /* Nginx uses this OpenSSL string. */
  232. if (XSTRCMP(sn, "prime256v1") == 0)
  233. sn = "SECP256R1";
  234. /* OpenSSL allows lowercase curve names */
  235. for (i = 0; i < (int)(sizeof(curveName) - 1) && *sn; i++) {
  236. curveName[i] = (char)XTOUPPER((unsigned char) *sn++);
  237. }
  238. curveName[i] = '\0';
  239. /* find based on name and return NID */
  240. for (i = 0;
  241. #ifndef WOLFSSL_ECC_CURVE_STATIC
  242. ecc_sets[i].size != 0 && ecc_sets[i].name != NULL;
  243. #else
  244. ecc_sets[i].size != 0;
  245. #endif
  246. i++) {
  247. if (XSTRCMP(curveName, ecc_sets[i].name) == 0) {
  248. eccEnum = ecc_sets[i].id;
  249. /* Convert enum value in ecc_curve_id to OpenSSL NID */
  250. return EccEnumToNID(eccEnum);
  251. }
  252. }
  253. #endif /* HAVE_ECC */
  254. return NID_undef;
  255. }
  256. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  257. #ifndef WOLFCRYPT_ONLY
  258. #if !defined(NO_RSA) || !defined(NO_DH) || defined(HAVE_ECC) || \
  259. (defined(OPENSSL_EXTRA) && defined(WOLFSSL_KEY_GEN) && !defined(NO_DSA))
  260. #define HAVE_GLOBAL_RNG /* consolidate flags for using globalRNG */
  261. static WC_RNG globalRNG;
  262. static int initGlobalRNG = 0;
  263. static WC_MAYBE_UNUSED wolfSSL_Mutex globalRNGMutex
  264. WOLFSSL_MUTEX_INITIALIZER_CLAUSE(globalRNGMutex);
  265. #ifndef WOLFSSL_MUTEX_INITIALIZER
  266. static int globalRNGMutex_valid = 0;
  267. #endif
  268. #if defined(OPENSSL_EXTRA) && defined(HAVE_HASHDRBG)
  269. static WOLFSSL_DRBG_CTX* gDrbgDefCtx = NULL;
  270. #endif
  271. WC_RNG* wolfssl_get_global_rng(void)
  272. {
  273. WC_RNG* ret = NULL;
  274. if (initGlobalRNG == 0)
  275. WOLFSSL_MSG("Global RNG no Init");
  276. else
  277. ret = &globalRNG;
  278. return ret;
  279. }
  280. /* Make a global RNG and return.
  281. *
  282. * @return Global RNG on success.
  283. * @return NULL on error.
  284. */
  285. WC_RNG* wolfssl_make_global_rng(void)
  286. {
  287. WC_RNG* ret;
  288. #ifdef HAVE_GLOBAL_RNG
  289. /* Get the global random number generator instead. */
  290. ret = wolfssl_get_global_rng();
  291. #ifdef OPENSSL_EXTRA
  292. if (ret == NULL) {
  293. /* Create a global random if possible. */
  294. (void)wolfSSL_RAND_Init();
  295. ret = wolfssl_get_global_rng();
  296. }
  297. #endif
  298. #else
  299. WOLFSSL_ERROR_MSG("Bad RNG Init");
  300. ret = NULL;
  301. #endif
  302. return ret;
  303. }
  304. /* Too many defines to check explicitly - prototype it and always include
  305. * for RSA, DH, ECC and DSA for BN. */
  306. WC_RNG* wolfssl_make_rng(WC_RNG* rng, int* local);
  307. /* Make a random number generator or get global if possible.
  308. *
  309. * Global may not be available and NULL will be returned.
  310. *
  311. * @param [in, out] rng Local random number generator.
  312. * @param [out] local Local random number generator returned.
  313. * @return NULL on failure.
  314. * @return A random number generator object.
  315. */
  316. WC_RNG* wolfssl_make_rng(WC_RNG* rng, int* local)
  317. {
  318. WC_RNG* ret = NULL;
  319. /* Assume not local until one created. */
  320. *local = 0;
  321. #ifdef WOLFSSL_SMALL_STACK
  322. /* Allocate RNG object . */
  323. rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
  324. #endif
  325. /* Check we have a local RNG object and initialize. */
  326. if ((rng != NULL) && (wc_InitRng(rng) == 0)) {
  327. ret = rng;
  328. *local = 1;
  329. }
  330. if (ret == NULL) {
  331. #ifdef HAVE_GLOBAL_RNG
  332. WOLFSSL_MSG("Bad RNG Init, trying global");
  333. #endif
  334. ret = wolfssl_make_global_rng();
  335. }
  336. if (ret != rng) {
  337. #ifdef WOLFSSL_SMALL_STACK
  338. XFREE(rng, NULL, DYNAMIC_TYPE_RNG);
  339. #endif
  340. }
  341. return ret;
  342. }
  343. #endif
  344. #ifdef OPENSSL_EXTRA
  345. /* WOLFSSL_NO_OPENSSL_RAND_CB: Allows way to reduce code size for
  346. * OPENSSL_EXTRA where RAND callbacks are not used */
  347. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  348. static const WOLFSSL_RAND_METHOD* gRandMethods = NULL;
  349. static wolfSSL_Mutex gRandMethodMutex
  350. WOLFSSL_MUTEX_INITIALIZER_CLAUSE(gRandMethodMutex);
  351. #ifndef WOLFSSL_MUTEX_INITIALIZER
  352. static int gRandMethodsInit = 0;
  353. #endif
  354. #endif /* !WOLFSSL_NO_OPENSSL_RAND_CB */
  355. #endif /* OPENSSL_EXTRA */
  356. #define WOLFSSL_SSL_BN_INCLUDED
  357. #include "src/ssl_bn.c"
  358. #ifndef OPENSSL_EXTRA_NO_ASN1
  359. #define WOLFSSL_SSL_ASN1_INCLUDED
  360. #include "src/ssl_asn1.c"
  361. #endif /* OPENSSL_EXTRA_NO_ASN1 */
  362. #define WOLFSSL_PK_INCLUDED
  363. #include "src/pk.c"
  364. #include <wolfssl/wolfcrypt/hpke.h>
  365. #if defined(OPENSSL_EXTRA) && defined(HAVE_ECC)
  366. const WOLF_EC_NIST_NAME kNistCurves[] = {
  367. {XSTR_SIZEOF("P-192"), "P-192", NID_X9_62_prime192v1},
  368. {XSTR_SIZEOF("P-256"), "P-256", NID_X9_62_prime256v1},
  369. {XSTR_SIZEOF("P-112"), "P-112", NID_secp112r1},
  370. {XSTR_SIZEOF("P-112-2"), "P-112-2", NID_secp112r2},
  371. {XSTR_SIZEOF("P-128"), "P-128", NID_secp128r1},
  372. {XSTR_SIZEOF("P-128-2"), "P-128-2", NID_secp128r2},
  373. {XSTR_SIZEOF("P-160"), "P-160", NID_secp160r1},
  374. {XSTR_SIZEOF("P-160-2"), "P-160-2", NID_secp160r2},
  375. {XSTR_SIZEOF("P-224"), "P-224", NID_secp224r1},
  376. {XSTR_SIZEOF("P-384"), "P-384", NID_secp384r1},
  377. {XSTR_SIZEOF("P-521"), "P-521", NID_secp521r1},
  378. {XSTR_SIZEOF("K-160"), "K-160", NID_secp160k1},
  379. {XSTR_SIZEOF("K-192"), "K-192", NID_secp192k1},
  380. {XSTR_SIZEOF("K-224"), "K-224", NID_secp224k1},
  381. {XSTR_SIZEOF("K-256"), "K-256", NID_secp256k1},
  382. {XSTR_SIZEOF("B-160"), "B-160", NID_brainpoolP160r1},
  383. {XSTR_SIZEOF("B-192"), "B-192", NID_brainpoolP192r1},
  384. {XSTR_SIZEOF("B-224"), "B-224", NID_brainpoolP224r1},
  385. {XSTR_SIZEOF("B-256"), "B-256", NID_brainpoolP256r1},
  386. {XSTR_SIZEOF("B-320"), "B-320", NID_brainpoolP320r1},
  387. {XSTR_SIZEOF("B-384"), "B-384", NID_brainpoolP384r1},
  388. {XSTR_SIZEOF("B-512"), "B-512", NID_brainpoolP512r1},
  389. #ifdef HAVE_PQC
  390. {XSTR_SIZEOF("KYBER_LEVEL1"), "KYBER_LEVEL1", WOLFSSL_KYBER_LEVEL1},
  391. {XSTR_SIZEOF("KYBER_LEVEL3"), "KYBER_LEVEL3", WOLFSSL_KYBER_LEVEL3},
  392. {XSTR_SIZEOF("KYBER_LEVEL5"), "KYBER_LEVEL5", WOLFSSL_KYBER_LEVEL5},
  393. #ifdef HAVE_LIBOQS
  394. {XSTR_SIZEOF("P256_KYBER_LEVEL1"), "P256_KYBER_LEVEL1",
  395. WOLFSSL_P256_KYBER_LEVEL1},
  396. {XSTR_SIZEOF("P384_KYBER_LEVEL3"), "P384_KYBER_LEVEL3",
  397. WOLFSSL_P384_KYBER_LEVEL3},
  398. {XSTR_SIZEOF("P521_KYBER_LEVEL5"), "P521_KYBER_LEVEL5",
  399. WOLFSSL_P521_KYBER_LEVEL5},
  400. #endif
  401. #endif
  402. #ifdef WOLFSSL_SM2
  403. {XSTR_SIZEOF("SM2"), "SM2", NID_sm2},
  404. #endif
  405. {0, NULL, 0},
  406. };
  407. #endif
  408. #if defined(WOLFSSL_TLS13) && defined(HAVE_ECH)
  409. /* create the hpke key and ech config to send to clients */
  410. int wolfSSL_CTX_GenerateEchConfig(WOLFSSL_CTX* ctx, const char* publicName,
  411. word16 kemId, word16 kdfId, word16 aeadId)
  412. {
  413. int ret = 0;
  414. word16 encLen = DHKEM_X25519_ENC_LEN;
  415. #ifdef WOLFSSL_SMALL_STACK
  416. Hpke* hpke = NULL;
  417. WC_RNG* rng;
  418. #else
  419. Hpke hpke[1];
  420. WC_RNG rng[1];
  421. #endif
  422. if (ctx == NULL || publicName == NULL)
  423. return BAD_FUNC_ARG;
  424. #ifdef WOLFSSL_SMALL_STACK
  425. rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), ctx->heap, DYNAMIC_TYPE_RNG);
  426. if (rng == NULL)
  427. return MEMORY_E;
  428. #endif
  429. ret = wc_InitRng(rng);
  430. if (ret != 0) {
  431. #ifdef WOLFSSL_SMALL_STACK
  432. XFREE(rng, ctx->heap, DYNAMIC_TYPE_RNG);
  433. #endif
  434. return ret;
  435. }
  436. ctx->echConfigs = (WOLFSSL_EchConfig*)XMALLOC(sizeof(WOLFSSL_EchConfig),
  437. ctx->heap, DYNAMIC_TYPE_TMP_BUFFER);
  438. if (ctx->echConfigs == NULL)
  439. ret = MEMORY_E;
  440. else
  441. XMEMSET(ctx->echConfigs, 0, sizeof(WOLFSSL_EchConfig));
  442. /* set random config id */
  443. if (ret == 0)
  444. ret = wc_RNG_GenerateByte(rng, &ctx->echConfigs->configId);
  445. /* if 0 is selected for algorithms use default, may change with draft */
  446. if (kemId == 0)
  447. kemId = DHKEM_X25519_HKDF_SHA256;
  448. if (kdfId == 0)
  449. kdfId = HKDF_SHA256;
  450. if (aeadId == 0)
  451. aeadId = HPKE_AES_128_GCM;
  452. if (ret == 0) {
  453. /* set the kem id */
  454. ctx->echConfigs->kemId = kemId;
  455. /* set the cipher suite, only 1 for now */
  456. ctx->echConfigs->numCipherSuites = 1;
  457. ctx->echConfigs->cipherSuites = (EchCipherSuite*)XMALLOC(
  458. sizeof(EchCipherSuite), ctx->heap, DYNAMIC_TYPE_TMP_BUFFER);
  459. if (ctx->echConfigs->cipherSuites == NULL) {
  460. ret = MEMORY_E;
  461. }
  462. else {
  463. ctx->echConfigs->cipherSuites[0].kdfId = kdfId;
  464. ctx->echConfigs->cipherSuites[0].aeadId = aeadId;
  465. }
  466. }
  467. #ifdef WOLFSSL_SMALL_STACK
  468. if (ret == 0) {
  469. hpke = (Hpke*)XMALLOC(sizeof(Hpke), ctx->heap, DYNAMIC_TYPE_TMP_BUFFER);
  470. if (hpke == NULL)
  471. ret = MEMORY_E;
  472. }
  473. #endif
  474. if (ret == 0)
  475. ret = wc_HpkeInit(hpke, kemId, kdfId, aeadId, ctx->heap);
  476. /* generate the receiver private key */
  477. if (ret == 0)
  478. ret = wc_HpkeGenerateKeyPair(hpke, &ctx->echConfigs->receiverPrivkey,
  479. rng);
  480. /* done with RNG */
  481. wc_FreeRng(rng);
  482. /* serialize the receiver key */
  483. if (ret == 0)
  484. ret = wc_HpkeSerializePublicKey(hpke, ctx->echConfigs->receiverPrivkey,
  485. ctx->echConfigs->receiverPubkey, &encLen);
  486. if (ret == 0) {
  487. ctx->echConfigs->publicName = (char*)XMALLOC(XSTRLEN(publicName) + 1,
  488. ctx->heap, DYNAMIC_TYPE_TMP_BUFFER);
  489. if (ctx->echConfigs->publicName == NULL) {
  490. ret = MEMORY_E;
  491. }
  492. else {
  493. XMEMCPY(ctx->echConfigs->publicName, publicName,
  494. XSTRLEN(publicName) + 1);
  495. }
  496. }
  497. if (ret != 0) {
  498. if (ctx->echConfigs) {
  499. XFREE(ctx->echConfigs->cipherSuites, ctx->heap,
  500. DYNAMIC_TYPE_TMP_BUFFER);
  501. XFREE(ctx->echConfigs->publicName, ctx->heap,
  502. DYNAMIC_TYPE_TMP_BUFFER);
  503. XFREE(ctx->echConfigs, ctx->heap, DYNAMIC_TYPE_TMP_BUFFER);
  504. /* set to null to avoid double free in cleanup */
  505. ctx->echConfigs = NULL;
  506. }
  507. }
  508. if (ret == 0)
  509. ret = WOLFSSL_SUCCESS;
  510. #ifdef WOLFSSL_SMALL_STACK
  511. XFREE(hpke, ctx->heap, DYNAMIC_TYPE_TMP_BUFFER);
  512. XFREE(rng, ctx->heap, DYNAMIC_TYPE_RNG);
  513. #endif
  514. return ret;
  515. }
  516. /* get the ech configs that the server context is using */
  517. int wolfSSL_CTX_GetEchConfigs(WOLFSSL_CTX* ctx, byte* output,
  518. word32* outputLen) {
  519. if (ctx == NULL || outputLen == NULL)
  520. return BAD_FUNC_ARG;
  521. /* if we don't have ech configs */
  522. if (ctx->echConfigs == NULL) {
  523. return WOLFSSL_FATAL_ERROR;
  524. }
  525. return GetEchConfigsEx(ctx->echConfigs, output, outputLen);
  526. }
  527. /* set the ech config from base64 for our client ssl object, base64 is the
  528. * format ech configs are sent using dns records */
  529. int wolfSSL_SetEchConfigsBase64(WOLFSSL* ssl, char* echConfigs64,
  530. word32 echConfigs64Len)
  531. {
  532. int ret = 0;
  533. word32 decodedLen = echConfigs64Len * 3 / 4 + 1;
  534. byte* decodedConfigs;
  535. if (ssl == NULL || echConfigs64 == NULL || echConfigs64Len == 0)
  536. return BAD_FUNC_ARG;
  537. /* already have ech configs */
  538. if (ssl->options.useEch == 1) {
  539. return WOLFSSL_FATAL_ERROR;
  540. }
  541. decodedConfigs = (byte*)XMALLOC(decodedLen, ssl->heap,
  542. DYNAMIC_TYPE_TMP_BUFFER);
  543. if (decodedConfigs == NULL)
  544. return MEMORY_E;
  545. decodedConfigs[decodedLen - 1] = 0;
  546. /* decode the echConfigs */
  547. ret = Base64_Decode((byte*)echConfigs64, echConfigs64Len,
  548. decodedConfigs, &decodedLen);
  549. if (ret != 0) {
  550. XFREE(decodedConfigs, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  551. return ret;
  552. }
  553. ret = wolfSSL_SetEchConfigs(ssl, decodedConfigs, decodedLen);
  554. XFREE(decodedConfigs, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  555. return ret;
  556. }
  557. /* set the ech config from a raw buffer, this is the format ech configs are
  558. * sent using retry_configs from the ech server */
  559. int wolfSSL_SetEchConfigs(WOLFSSL* ssl, const byte* echConfigs,
  560. word32 echConfigsLen)
  561. {
  562. int ret = 0;
  563. int i;
  564. int j;
  565. word16 totalLength;
  566. word16 version;
  567. word16 length;
  568. word16 hpkePubkeyLen;
  569. word16 cipherSuitesLen;
  570. word16 publicNameLen;
  571. WOLFSSL_EchConfig* configList = NULL;
  572. WOLFSSL_EchConfig* workingConfig = NULL;
  573. WOLFSSL_EchConfig* lastConfig = NULL;
  574. byte* echConfig = NULL;
  575. if (ssl == NULL || echConfigs == NULL || echConfigsLen == 0)
  576. return BAD_FUNC_ARG;
  577. /* already have ech configs */
  578. if (ssl->options.useEch == 1) {
  579. return WOLFSSL_FATAL_ERROR;
  580. }
  581. /* check that the total length is well formed */
  582. ato16(echConfigs, &totalLength);
  583. if (totalLength != echConfigsLen - 2) {
  584. return WOLFSSL_FATAL_ERROR;
  585. }
  586. /* skip the total length uint16_t */
  587. i = 2;
  588. do {
  589. echConfig = (byte*)echConfigs + i;
  590. ato16(echConfig, &version);
  591. ato16(echConfig + 2, &length);
  592. /* if the version does not match */
  593. if (version != TLSX_ECH) {
  594. /* we hit the end of the configs */
  595. if ( (word32)i + 2 >= echConfigsLen ) {
  596. break;
  597. }
  598. /* skip this config, +4 for version and length */
  599. i += length + 4;
  600. continue;
  601. }
  602. /* check if the length will overrun the buffer */
  603. if ((word32)i + length + 4 > echConfigsLen) {
  604. break;
  605. }
  606. if (workingConfig == NULL) {
  607. workingConfig =
  608. (WOLFSSL_EchConfig*)XMALLOC(sizeof(WOLFSSL_EchConfig),
  609. ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  610. configList = workingConfig;
  611. if (workingConfig != NULL) {
  612. workingConfig->next = NULL;
  613. }
  614. }
  615. else {
  616. lastConfig = workingConfig;
  617. workingConfig->next =
  618. (WOLFSSL_EchConfig*)XMALLOC(sizeof(WOLFSSL_EchConfig),
  619. ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  620. workingConfig = workingConfig->next;
  621. }
  622. if (workingConfig == NULL) {
  623. ret = MEMORY_E;
  624. break;
  625. }
  626. XMEMSET(workingConfig, 0, sizeof(WOLFSSL_EchConfig));
  627. /* rawLen */
  628. workingConfig->rawLen = length + 4;
  629. /* raw body */
  630. workingConfig->raw = (byte*)XMALLOC(workingConfig->rawLen,
  631. ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  632. if (workingConfig->raw == NULL) {
  633. ret = MEMORY_E;
  634. break;
  635. }
  636. XMEMCPY(workingConfig->raw, echConfig, workingConfig->rawLen);
  637. /* skip over version and length */
  638. echConfig += 4;
  639. /* configId, 1 byte */
  640. workingConfig->configId = *(echConfig);
  641. echConfig++;
  642. /* kemId, 2 bytes */
  643. ato16(echConfig, &workingConfig->kemId);
  644. echConfig += 2;
  645. /* hpke public_key length, 2 bytes */
  646. ato16(echConfig, &hpkePubkeyLen);
  647. echConfig += 2;
  648. /* hpke public_key */
  649. XMEMCPY(workingConfig->receiverPubkey, echConfig, hpkePubkeyLen);
  650. echConfig += hpkePubkeyLen;
  651. /* cipherSuitesLen */
  652. ato16(echConfig, &cipherSuitesLen);
  653. workingConfig->cipherSuites = (EchCipherSuite*)XMALLOC(cipherSuitesLen,
  654. ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  655. if (workingConfig->cipherSuites == NULL) {
  656. ret = MEMORY_E;
  657. break;
  658. }
  659. echConfig += 2;
  660. workingConfig->numCipherSuites = cipherSuitesLen / 4;
  661. /* cipherSuites */
  662. for (j = 0; j < workingConfig->numCipherSuites; j++) {
  663. ato16(echConfig + j * 4, &workingConfig->cipherSuites[j].kdfId);
  664. ato16(echConfig + j * 4 + 2,
  665. &workingConfig->cipherSuites[j].aeadId);
  666. }
  667. echConfig += cipherSuitesLen;
  668. /* publicNameLen */
  669. ato16(echConfig, &publicNameLen);
  670. workingConfig->publicName = (char*)XMALLOC(publicNameLen + 1,
  671. ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  672. if (workingConfig->publicName == NULL) {
  673. ret = MEMORY_E;
  674. break;
  675. }
  676. echConfig += 2;
  677. /* publicName */
  678. XMEMCPY(workingConfig->publicName, echConfig, publicNameLen);
  679. /* null terminated */
  680. workingConfig->publicName[publicNameLen] = 0;
  681. /* add length to go to next config, +4 for version and length */
  682. i += length + 4;
  683. /* check that we support this config */
  684. for (j = 0; j < HPKE_SUPPORTED_KEM_LEN; j++) {
  685. if (hpkeSupportedKem[j] == workingConfig->kemId)
  686. break;
  687. }
  688. /* if we don't support the kem or at least one cipher suite */
  689. if (j >= HPKE_SUPPORTED_KEM_LEN ||
  690. EchConfigGetSupportedCipherSuite(workingConfig) < 0)
  691. {
  692. XFREE(workingConfig->cipherSuites, ssl->heap,
  693. DYNAMIC_TYPE_TMP_BUFFER);
  694. XFREE(workingConfig->publicName, ssl->heap,
  695. DYNAMIC_TYPE_TMP_BUFFER);
  696. XFREE(workingConfig->raw, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  697. workingConfig = lastConfig;
  698. }
  699. } while ((word32)i < echConfigsLen);
  700. /* if we found valid configs */
  701. if (ret == 0 && configList != NULL) {
  702. ssl->options.useEch = 1;
  703. ssl->echConfigs = configList;
  704. return WOLFSSL_SUCCESS;
  705. }
  706. workingConfig = configList;
  707. while (workingConfig != NULL) {
  708. lastConfig = workingConfig;
  709. workingConfig = workingConfig->next;
  710. XFREE(lastConfig->cipherSuites, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  711. XFREE(lastConfig->publicName, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  712. XFREE(lastConfig->raw, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  713. XFREE(lastConfig, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  714. }
  715. if (ret == 0)
  716. return WOLFSSL_FATAL_ERROR;
  717. return ret;
  718. }
  719. /* get the raw ech config from our struct */
  720. int GetEchConfig(WOLFSSL_EchConfig* config, byte* output, word32* outputLen)
  721. {
  722. int i;
  723. word16 totalLen = 0;
  724. if (config == NULL || (output == NULL && outputLen == NULL))
  725. return BAD_FUNC_ARG;
  726. /* 2 for version */
  727. totalLen += 2;
  728. /* 2 for length */
  729. totalLen += 2;
  730. /* 1 for configId */
  731. totalLen += 1;
  732. /* 2 for kemId */
  733. totalLen += 2;
  734. /* 2 for hpke_len */
  735. totalLen += 2;
  736. /* hpke_pub_key */
  737. switch (config->kemId) {
  738. case DHKEM_P256_HKDF_SHA256:
  739. totalLen += DHKEM_P256_ENC_LEN;
  740. break;
  741. case DHKEM_P384_HKDF_SHA384:
  742. totalLen += DHKEM_P384_ENC_LEN;
  743. break;
  744. case DHKEM_P521_HKDF_SHA512:
  745. totalLen += DHKEM_P521_ENC_LEN;
  746. break;
  747. case DHKEM_X25519_HKDF_SHA256:
  748. totalLen += DHKEM_X25519_ENC_LEN;
  749. break;
  750. case DHKEM_X448_HKDF_SHA512:
  751. totalLen += DHKEM_X448_ENC_LEN;
  752. break;
  753. }
  754. /* cipherSuitesLen */
  755. totalLen += 2;
  756. /* cipherSuites */
  757. totalLen += config->numCipherSuites * 4;
  758. /* public name len */
  759. totalLen += 2;
  760. /* public name */
  761. totalLen += XSTRLEN(config->publicName);
  762. /* trailing zeros */
  763. totalLen += 2;
  764. if (output == NULL) {
  765. *outputLen = totalLen;
  766. return LENGTH_ONLY_E;
  767. }
  768. if (totalLen > *outputLen) {
  769. *outputLen = totalLen;
  770. return INPUT_SIZE_E;
  771. }
  772. /* version */
  773. c16toa(TLSX_ECH, output);
  774. output += 2;
  775. /* length - 4 for version and length itself */
  776. c16toa(totalLen - 4, output);
  777. output += 2;
  778. /* configId */
  779. *output = config->configId;
  780. output++;
  781. /* kemId */
  782. c16toa(config->kemId, output);
  783. output += 2;
  784. /* length and key itself */
  785. switch (config->kemId) {
  786. case DHKEM_P256_HKDF_SHA256:
  787. c16toa(DHKEM_P256_ENC_LEN, output);
  788. output += 2;
  789. XMEMCPY(output, config->receiverPubkey, DHKEM_P256_ENC_LEN);
  790. output += DHKEM_P256_ENC_LEN;
  791. break;
  792. case DHKEM_P384_HKDF_SHA384:
  793. c16toa(DHKEM_P384_ENC_LEN, output);
  794. output += 2;
  795. XMEMCPY(output, config->receiverPubkey, DHKEM_P384_ENC_LEN);
  796. output += DHKEM_P384_ENC_LEN;
  797. break;
  798. case DHKEM_P521_HKDF_SHA512:
  799. c16toa(DHKEM_P521_ENC_LEN, output);
  800. output += 2;
  801. XMEMCPY(output, config->receiverPubkey, DHKEM_P521_ENC_LEN);
  802. output += DHKEM_P521_ENC_LEN;
  803. break;
  804. case DHKEM_X25519_HKDF_SHA256:
  805. c16toa(DHKEM_X25519_ENC_LEN, output);
  806. output += 2;
  807. XMEMCPY(output, config->receiverPubkey, DHKEM_X25519_ENC_LEN);
  808. output += DHKEM_X25519_ENC_LEN;
  809. break;
  810. case DHKEM_X448_HKDF_SHA512:
  811. c16toa(DHKEM_X448_ENC_LEN, output);
  812. output += 2;
  813. XMEMCPY(output, config->receiverPubkey, DHKEM_X448_ENC_LEN);
  814. output += DHKEM_X448_ENC_LEN;
  815. break;
  816. }
  817. /* cipherSuites len */
  818. c16toa(config->numCipherSuites * 4, output);
  819. output += 2;
  820. /* cipherSuites */
  821. for (i = 0; i < config->numCipherSuites; i++) {
  822. c16toa(config->cipherSuites[i].kdfId, output);
  823. output += 2;
  824. c16toa(config->cipherSuites[i].aeadId, output);
  825. output += 2;
  826. }
  827. /* publicName len */
  828. c16toa(XSTRLEN(config->publicName), output);
  829. output += 2;
  830. /* publicName */
  831. XMEMCPY(output, config->publicName,
  832. XSTRLEN(config->publicName));
  833. output += XSTRLEN(config->publicName);
  834. /* terminating zeros */
  835. c16toa(0, output);
  836. /* output += 2; */
  837. *outputLen = totalLen;
  838. return 0;
  839. }
  840. /* wrapper function to get ech configs from application code */
  841. int wolfSSL_GetEchConfigs(WOLFSSL* ssl, byte* output, word32* outputLen)
  842. {
  843. if (ssl == NULL || outputLen == NULL)
  844. return BAD_FUNC_ARG;
  845. /* if we don't have ech configs */
  846. if (ssl->options.useEch != 1) {
  847. return WOLFSSL_FATAL_ERROR;
  848. }
  849. return GetEchConfigsEx(ssl->echConfigs, output, outputLen);
  850. }
  851. /* get the raw ech configs from our linked list of ech config structs */
  852. int GetEchConfigsEx(WOLFSSL_EchConfig* configs, byte* output, word32* outputLen)
  853. {
  854. int ret = 0;
  855. WOLFSSL_EchConfig* workingConfig = NULL;
  856. byte* outputStart = output;
  857. word32 totalLen = 2;
  858. word32 workingOutputLen;
  859. if (configs == NULL || outputLen == NULL)
  860. return BAD_FUNC_ARG;
  861. workingOutputLen = *outputLen - totalLen;
  862. /* skip over total length which we fill in later */
  863. if (output != NULL)
  864. output += 2;
  865. workingConfig = configs;
  866. while (workingConfig != NULL) {
  867. /* get this config */
  868. ret = GetEchConfig(workingConfig, output, &workingOutputLen);
  869. if (output != NULL)
  870. output += workingOutputLen;
  871. /* add this config's length to the total length */
  872. totalLen += workingOutputLen;
  873. if (totalLen > *outputLen)
  874. workingOutputLen = 0;
  875. else
  876. workingOutputLen = *outputLen - totalLen;
  877. /* only error we break on, other 2 we need to keep finding length */
  878. if (ret == BAD_FUNC_ARG)
  879. return BAD_FUNC_ARG;
  880. workingConfig = workingConfig->next;
  881. }
  882. if (output == NULL) {
  883. *outputLen = totalLen;
  884. return LENGTH_ONLY_E;
  885. }
  886. if (totalLen > *outputLen) {
  887. *outputLen = totalLen;
  888. return INPUT_SIZE_E;
  889. }
  890. /* total size -2 for size itself */
  891. c16toa(totalLen - 2, outputStart);
  892. *outputLen = totalLen;
  893. return WOLFSSL_SUCCESS;
  894. }
  895. #endif /* WOLFSSL_TLS13 && HAVE_ECH */
  896. #if defined(WOLFSSL_RENESAS_TSIP_TLS) || defined(WOLFSSL_RENESAS_FSPSM_TLS)
  897. #include <wolfssl/wolfcrypt/port/Renesas/renesas_cmn.h>
  898. #endif
  899. /* prevent multiple mutex initializations */
  900. static volatile WOLFSSL_GLOBAL int initRefCount = 0;
  901. /* init ref count mutex */
  902. static WOLFSSL_GLOBAL wolfSSL_Mutex inits_count_mutex
  903. WOLFSSL_MUTEX_INITIALIZER_CLAUSE(inits_count_mutex);
  904. #ifndef WOLFSSL_MUTEX_INITIALIZER
  905. static WOLFSSL_GLOBAL int inits_count_mutex_valid = 0;
  906. #endif
  907. /* Create a new WOLFSSL_CTX struct and return the pointer to created struct.
  908. WOLFSSL_METHOD pointer passed in is given to ctx to manage.
  909. This function frees the passed in WOLFSSL_METHOD struct on failure and on
  910. success is freed when ctx is freed.
  911. */
  912. WOLFSSL_CTX* wolfSSL_CTX_new_ex(WOLFSSL_METHOD* method, void* heap)
  913. {
  914. WOLFSSL_CTX* ctx = NULL;
  915. WOLFSSL_ENTER("wolfSSL_CTX_new_ex");
  916. if (initRefCount == 0) {
  917. /* user no longer forced to call Init themselves */
  918. int ret = wolfSSL_Init();
  919. if (ret != WOLFSSL_SUCCESS) {
  920. WOLFSSL_MSG("wolfSSL_Init failed");
  921. WOLFSSL_LEAVE("wolfSSL_CTX_new_ex", 0);
  922. if (method != NULL) {
  923. XFREE(method, heap, DYNAMIC_TYPE_METHOD);
  924. }
  925. return NULL;
  926. }
  927. }
  928. if (method == NULL)
  929. return ctx;
  930. ctx = (WOLFSSL_CTX*)XMALLOC(sizeof(WOLFSSL_CTX), heap, DYNAMIC_TYPE_CTX);
  931. if (ctx) {
  932. int ret;
  933. ret = InitSSL_Ctx(ctx, method, heap);
  934. #ifdef WOLFSSL_STATIC_MEMORY
  935. if (heap != NULL) {
  936. ctx->onHeapHint = 1; /* free the memory back to heap when done */
  937. }
  938. #endif
  939. if (ret < 0) {
  940. WOLFSSL_MSG("Init CTX failed");
  941. wolfSSL_CTX_free(ctx);
  942. ctx = NULL;
  943. }
  944. #if defined(OPENSSL_EXTRA) && defined(WOLFCRYPT_HAVE_SRP) \
  945. && !defined(NO_SHA256) && !defined(WC_NO_RNG)
  946. else {
  947. ctx->srp = (Srp*)XMALLOC(sizeof(Srp), heap, DYNAMIC_TYPE_SRP);
  948. if (ctx->srp == NULL){
  949. WOLFSSL_MSG("Init CTX failed");
  950. wolfSSL_CTX_free(ctx);
  951. return NULL;
  952. }
  953. XMEMSET(ctx->srp, 0, sizeof(Srp));
  954. }
  955. #endif
  956. }
  957. else {
  958. WOLFSSL_MSG("Alloc CTX failed, method freed");
  959. XFREE(method, heap, DYNAMIC_TYPE_METHOD);
  960. }
  961. #ifdef OPENSSL_COMPATIBLE_DEFAULTS
  962. if (ctx) {
  963. wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
  964. wolfSSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
  965. if (wolfSSL_CTX_set_min_proto_version(ctx,
  966. (method->version.major == DTLS_MAJOR) ?
  967. DTLS1_VERSION : SSL3_VERSION) != WOLFSSL_SUCCESS ||
  968. #ifdef HAVE_ANON
  969. wolfSSL_CTX_allow_anon_cipher(ctx) != WOLFSSL_SUCCESS ||
  970. #endif
  971. wolfSSL_CTX_set_group_messages(ctx) != WOLFSSL_SUCCESS) {
  972. WOLFSSL_MSG("Setting OpenSSL CTX defaults failed");
  973. wolfSSL_CTX_free(ctx);
  974. ctx = NULL;
  975. }
  976. }
  977. #endif
  978. WOLFSSL_LEAVE("wolfSSL_CTX_new_ex", 0);
  979. return ctx;
  980. }
  981. WOLFSSL_ABI
  982. WOLFSSL_CTX* wolfSSL_CTX_new(WOLFSSL_METHOD* method)
  983. {
  984. #ifdef WOLFSSL_HEAP_TEST
  985. /* if testing the heap hint then set top level CTX to have test value */
  986. return wolfSSL_CTX_new_ex(method, (void*)WOLFSSL_HEAP_TEST);
  987. #else
  988. return wolfSSL_CTX_new_ex(method, NULL);
  989. #endif
  990. }
  991. /* increases CTX reference count to track proper time to "free" */
  992. int wolfSSL_CTX_up_ref(WOLFSSL_CTX* ctx)
  993. {
  994. int ret;
  995. wolfSSL_RefInc(&ctx->ref, &ret);
  996. #ifdef WOLFSSL_REFCNT_ERROR_RETURN
  997. return ((ret == 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE);
  998. #else
  999. (void)ret;
  1000. return WOLFSSL_SUCCESS;
  1001. #endif
  1002. }
  1003. WOLFSSL_ABI
  1004. void wolfSSL_CTX_free(WOLFSSL_CTX* ctx)
  1005. {
  1006. WOLFSSL_ENTER("wolfSSL_CTX_free");
  1007. if (ctx) {
  1008. #if defined(OPENSSL_EXTRA) && defined(WOLFCRYPT_HAVE_SRP) \
  1009. && !defined(NO_SHA256) && !defined(WC_NO_RNG)
  1010. if (ctx->srp != NULL) {
  1011. if (ctx->srp_password != NULL){
  1012. XFREE(ctx->srp_password, ctx->heap, DYNAMIC_TYPE_SRP);
  1013. ctx->srp_password = NULL;
  1014. }
  1015. wc_SrpTerm(ctx->srp);
  1016. XFREE(ctx->srp, ctx->heap, DYNAMIC_TYPE_SRP);
  1017. ctx->srp = NULL;
  1018. }
  1019. #endif
  1020. FreeSSL_Ctx(ctx);
  1021. }
  1022. WOLFSSL_LEAVE("wolfSSL_CTX_free", 0);
  1023. }
  1024. #ifdef HAVE_ENCRYPT_THEN_MAC
  1025. /**
  1026. * Sets whether Encrypt-Then-MAC extension can be negotiated against context.
  1027. * The default value: enabled.
  1028. *
  1029. * ctx SSL/TLS context.
  1030. * set Whether to allow or not: 1 is allow and 0 is disallow.
  1031. * returns WOLFSSL_SUCCESS
  1032. */
  1033. int wolfSSL_CTX_AllowEncryptThenMac(WOLFSSL_CTX *ctx, int set)
  1034. {
  1035. ctx->disallowEncThenMac = !set;
  1036. return WOLFSSL_SUCCESS;
  1037. }
  1038. /**
  1039. * Sets whether Encrypt-Then-MAC extension can be negotiated against context.
  1040. * The default value comes from context.
  1041. *
  1042. * ctx SSL/TLS context.
  1043. * set Whether to allow or not: 1 is allow and 0 is disallow.
  1044. * returns WOLFSSL_SUCCESS
  1045. */
  1046. int wolfSSL_AllowEncryptThenMac(WOLFSSL *ssl, int set)
  1047. {
  1048. ssl->options.disallowEncThenMac = !set;
  1049. return WOLFSSL_SUCCESS;
  1050. }
  1051. #endif
  1052. #ifdef SINGLE_THREADED
  1053. /* no locking in single threaded mode, allow a CTX level rng to be shared with
  1054. * WOLFSSL objects, WOLFSSL_SUCCESS on ok */
  1055. int wolfSSL_CTX_new_rng(WOLFSSL_CTX* ctx)
  1056. {
  1057. WC_RNG* rng;
  1058. int ret;
  1059. if (ctx == NULL) {
  1060. return BAD_FUNC_ARG;
  1061. }
  1062. rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), ctx->heap, DYNAMIC_TYPE_RNG);
  1063. if (rng == NULL) {
  1064. return MEMORY_E;
  1065. }
  1066. #ifndef HAVE_FIPS
  1067. ret = wc_InitRng_ex(rng, ctx->heap, ctx->devId);
  1068. #else
  1069. ret = wc_InitRng(rng);
  1070. #endif
  1071. if (ret != 0) {
  1072. XFREE(rng, ctx->heap, DYNAMIC_TYPE_RNG);
  1073. return ret;
  1074. }
  1075. ctx->rng = rng;
  1076. return WOLFSSL_SUCCESS;
  1077. }
  1078. #endif
  1079. WOLFSSL_ABI
  1080. WOLFSSL* wolfSSL_new(WOLFSSL_CTX* ctx)
  1081. {
  1082. WOLFSSL* ssl = NULL;
  1083. int ret = 0;
  1084. WOLFSSL_ENTER("wolfSSL_new");
  1085. if (ctx == NULL) {
  1086. WOLFSSL_MSG("wolfSSL_new ctx is null");
  1087. return NULL;
  1088. }
  1089. ssl = (WOLFSSL*) XMALLOC(sizeof(WOLFSSL), ctx->heap, DYNAMIC_TYPE_SSL);
  1090. if (ssl == NULL) {
  1091. WOLFSSL_MSG_EX("ssl xmalloc failed to allocate %d bytes",
  1092. (int)sizeof(WOLFSSL));
  1093. }
  1094. else {
  1095. ret = InitSSL(ssl, ctx, 0);
  1096. if (ret < 0) {
  1097. WOLFSSL_MSG_EX("wolfSSL_new failed during InitSSL. err = %d", ret);
  1098. FreeSSL(ssl, ctx->heap);
  1099. ssl = NULL;
  1100. }
  1101. else if (ret == 0) {
  1102. WOLFSSL_MSG("wolfSSL_new InitSSL success");
  1103. }
  1104. else {
  1105. /* Only success (0) or negative values should ever be seen. */
  1106. WOLFSSL_MSG_EX("WARNING: wolfSSL_new unexpected InitSSL return"
  1107. " value = %d", ret);
  1108. } /* InitSSL check */
  1109. } /* ssl XMALLOC success */
  1110. WOLFSSL_LEAVE("wolfSSL_new InitSSL =", ret);
  1111. (void)ret;
  1112. return ssl;
  1113. }
  1114. WOLFSSL_ABI
  1115. void wolfSSL_free(WOLFSSL* ssl)
  1116. {
  1117. WOLFSSL_ENTER("wolfSSL_free");
  1118. if (ssl) {
  1119. WOLFSSL_MSG_EX("Free SSL: %p", (wc_ptr_t)ssl);
  1120. FreeSSL(ssl, ssl->ctx->heap);
  1121. }
  1122. else {
  1123. WOLFSSL_MSG("Free SSL: wolfSSL_free already null");
  1124. }
  1125. WOLFSSL_LEAVE("wolfSSL_free", 0);
  1126. }
  1127. int wolfSSL_is_server(WOLFSSL* ssl)
  1128. {
  1129. if (ssl == NULL)
  1130. return BAD_FUNC_ARG;
  1131. return ssl->options.side == WOLFSSL_SERVER_END;
  1132. }
  1133. #ifdef HAVE_WRITE_DUP
  1134. /*
  1135. * Release resources around WriteDup object
  1136. *
  1137. * ssl WOLFSSL object
  1138. *
  1139. * no return, destruction so make best attempt
  1140. */
  1141. void FreeWriteDup(WOLFSSL* ssl)
  1142. {
  1143. int doFree = 0;
  1144. WOLFSSL_ENTER("FreeWriteDup");
  1145. if (ssl->dupWrite) {
  1146. if (wc_LockMutex(&ssl->dupWrite->dupMutex) == 0) {
  1147. ssl->dupWrite->dupCount--;
  1148. if (ssl->dupWrite->dupCount == 0) {
  1149. doFree = 1;
  1150. } else {
  1151. WOLFSSL_MSG("WriteDup count not zero, no full free");
  1152. }
  1153. wc_UnLockMutex(&ssl->dupWrite->dupMutex);
  1154. }
  1155. }
  1156. if (doFree) {
  1157. WOLFSSL_MSG("Doing WriteDup full free, count to zero");
  1158. wc_FreeMutex(&ssl->dupWrite->dupMutex);
  1159. XFREE(ssl->dupWrite, ssl->heap, DYNAMIC_TYPE_WRITEDUP);
  1160. }
  1161. }
  1162. /*
  1163. * duplicate existing ssl members into dup needed for writing
  1164. *
  1165. * dup write only WOLFSSL
  1166. * ssl existing WOLFSSL
  1167. *
  1168. * 0 on success
  1169. */
  1170. static int DupSSL(WOLFSSL* dup, WOLFSSL* ssl)
  1171. {
  1172. word16 tmp_weOwnRng;
  1173. /* shared dupWrite setup */
  1174. ssl->dupWrite = (WriteDup*)XMALLOC(sizeof(WriteDup), ssl->heap,
  1175. DYNAMIC_TYPE_WRITEDUP);
  1176. if (ssl->dupWrite == NULL) {
  1177. return MEMORY_E;
  1178. }
  1179. XMEMSET(ssl->dupWrite, 0, sizeof(WriteDup));
  1180. if (wc_InitMutex(&ssl->dupWrite->dupMutex) != 0) {
  1181. XFREE(ssl->dupWrite, ssl->heap, DYNAMIC_TYPE_WRITEDUP);
  1182. ssl->dupWrite = NULL;
  1183. return BAD_MUTEX_E;
  1184. }
  1185. ssl->dupWrite->dupCount = 2; /* both sides have a count to start */
  1186. dup->dupWrite = ssl->dupWrite; /* each side uses */
  1187. tmp_weOwnRng = dup->options.weOwnRng;
  1188. /* copy write parts over to dup writer */
  1189. XMEMCPY(&dup->specs, &ssl->specs, sizeof(CipherSpecs));
  1190. XMEMCPY(&dup->options, &ssl->options, sizeof(Options));
  1191. XMEMCPY(&dup->keys, &ssl->keys, sizeof(Keys));
  1192. XMEMCPY(&dup->encrypt, &ssl->encrypt, sizeof(Ciphers));
  1193. XMEMCPY(&dup->version, &ssl->version, sizeof(ProtocolVersion));
  1194. XMEMCPY(&dup->chVersion, &ssl->chVersion, sizeof(ProtocolVersion));
  1195. #ifdef HAVE_ONE_TIME_AUTH
  1196. #ifdef HAVE_POLY1305
  1197. if (ssl->auth.setup && ssl->auth.poly1305 != NULL) {
  1198. dup->auth.poly1305 = (Poly1305*)XMALLOC(sizeof(Poly1305), dup->heap,
  1199. DYNAMIC_TYPE_CIPHER);
  1200. if (dup->auth.poly1305 == NULL)
  1201. return MEMORY_E;
  1202. dup->auth.setup = 1;
  1203. }
  1204. #endif
  1205. #endif
  1206. /* dup side now owns encrypt/write ciphers */
  1207. XMEMSET(&ssl->encrypt, 0, sizeof(Ciphers));
  1208. dup->IOCB_WriteCtx = ssl->IOCB_WriteCtx;
  1209. dup->CBIOSend = ssl->CBIOSend;
  1210. #ifdef OPENSSL_EXTRA
  1211. dup->cbioFlag = ssl->cbioFlag;
  1212. #endif
  1213. dup->wfd = ssl->wfd;
  1214. dup->wflags = ssl->wflags;
  1215. #ifndef WOLFSSL_AEAD_ONLY
  1216. dup->hmac = ssl->hmac;
  1217. #endif
  1218. #ifdef HAVE_TRUNCATED_HMAC
  1219. dup->truncated_hmac = ssl->truncated_hmac;
  1220. #endif
  1221. /* Restore rng option */
  1222. dup->options.weOwnRng = tmp_weOwnRng;
  1223. /* unique side dup setup */
  1224. dup->dupSide = WRITE_DUP_SIDE;
  1225. ssl->dupSide = READ_DUP_SIDE;
  1226. return 0;
  1227. }
  1228. /*
  1229. * duplicate a WOLFSSL object post handshake for writing only
  1230. * turn existing object into read only. Allows concurrent access from two
  1231. * different threads.
  1232. *
  1233. * ssl existing WOLFSSL object
  1234. *
  1235. * return dup'd WOLFSSL object on success
  1236. */
  1237. WOLFSSL* wolfSSL_write_dup(WOLFSSL* ssl)
  1238. {
  1239. WOLFSSL* dup = NULL;
  1240. int ret = 0;
  1241. (void)ret;
  1242. WOLFSSL_ENTER("wolfSSL_write_dup");
  1243. if (ssl == NULL) {
  1244. return ssl;
  1245. }
  1246. if (ssl->options.handShakeDone == 0) {
  1247. WOLFSSL_MSG("wolfSSL_write_dup called before handshake complete");
  1248. return NULL;
  1249. }
  1250. if (ssl->dupWrite) {
  1251. WOLFSSL_MSG("wolfSSL_write_dup already called once");
  1252. return NULL;
  1253. }
  1254. dup = (WOLFSSL*) XMALLOC(sizeof(WOLFSSL), ssl->ctx->heap, DYNAMIC_TYPE_SSL);
  1255. if (dup) {
  1256. if ( (ret = InitSSL(dup, ssl->ctx, 1)) < 0) {
  1257. FreeSSL(dup, ssl->ctx->heap);
  1258. dup = NULL;
  1259. } else if ( (ret = DupSSL(dup, ssl)) < 0) {
  1260. FreeSSL(dup, ssl->ctx->heap);
  1261. dup = NULL;
  1262. }
  1263. }
  1264. WOLFSSL_LEAVE("wolfSSL_write_dup", ret);
  1265. return dup;
  1266. }
  1267. /*
  1268. * Notify write dup side of fatal error or close notify
  1269. *
  1270. * ssl WOLFSSL object
  1271. * err Notify err
  1272. *
  1273. * 0 on success
  1274. */
  1275. int NotifyWriteSide(WOLFSSL* ssl, int err)
  1276. {
  1277. int ret;
  1278. WOLFSSL_ENTER("NotifyWriteSide");
  1279. ret = wc_LockMutex(&ssl->dupWrite->dupMutex);
  1280. if (ret == 0) {
  1281. ssl->dupWrite->dupErr = err;
  1282. ret = wc_UnLockMutex(&ssl->dupWrite->dupMutex);
  1283. }
  1284. return ret;
  1285. }
  1286. #endif /* HAVE_WRITE_DUP */
  1287. #ifdef HAVE_POLY1305
  1288. /* set if to use old poly 1 for yes 0 to use new poly */
  1289. int wolfSSL_use_old_poly(WOLFSSL* ssl, int value)
  1290. {
  1291. (void)ssl;
  1292. (void)value;
  1293. #ifndef WOLFSSL_NO_TLS12
  1294. WOLFSSL_ENTER("wolfSSL_use_old_poly");
  1295. WOLFSSL_MSG("Warning SSL connection auto detects old/new and this function"
  1296. "is depreciated");
  1297. ssl->options.oldPoly = (word16)value;
  1298. WOLFSSL_LEAVE("wolfSSL_use_old_poly", 0);
  1299. #endif
  1300. return 0;
  1301. }
  1302. #endif
  1303. WOLFSSL_ABI
  1304. int wolfSSL_set_fd(WOLFSSL* ssl, int fd)
  1305. {
  1306. int ret;
  1307. WOLFSSL_ENTER("wolfSSL_set_fd");
  1308. if (ssl == NULL) {
  1309. return BAD_FUNC_ARG;
  1310. }
  1311. ret = wolfSSL_set_read_fd(ssl, fd);
  1312. if (ret == WOLFSSL_SUCCESS) {
  1313. ret = wolfSSL_set_write_fd(ssl, fd);
  1314. }
  1315. return ret;
  1316. }
  1317. #ifdef WOLFSSL_DTLS
  1318. int wolfSSL_set_dtls_fd_connected(WOLFSSL* ssl, int fd)
  1319. {
  1320. int ret;
  1321. WOLFSSL_ENTER("wolfSSL_set_dtls_fd_connected");
  1322. if (ssl == NULL) {
  1323. return BAD_FUNC_ARG;
  1324. }
  1325. ret = wolfSSL_set_fd(ssl, fd);
  1326. if (ret == WOLFSSL_SUCCESS)
  1327. ssl->buffers.dtlsCtx.connected = 1;
  1328. return ret;
  1329. }
  1330. #endif
  1331. int wolfSSL_set_read_fd(WOLFSSL* ssl, int fd)
  1332. {
  1333. WOLFSSL_ENTER("wolfSSL_set_read_fd");
  1334. if (ssl == NULL) {
  1335. return BAD_FUNC_ARG;
  1336. }
  1337. ssl->rfd = fd; /* not used directly to allow IO callbacks */
  1338. ssl->IOCB_ReadCtx = &ssl->rfd;
  1339. #ifdef WOLFSSL_DTLS
  1340. ssl->buffers.dtlsCtx.connected = 0;
  1341. if (ssl->options.dtls) {
  1342. ssl->IOCB_ReadCtx = &ssl->buffers.dtlsCtx;
  1343. ssl->buffers.dtlsCtx.rfd = fd;
  1344. }
  1345. #endif
  1346. WOLFSSL_LEAVE("wolfSSL_set_read_fd", WOLFSSL_SUCCESS);
  1347. return WOLFSSL_SUCCESS;
  1348. }
  1349. int wolfSSL_set_write_fd(WOLFSSL* ssl, int fd)
  1350. {
  1351. WOLFSSL_ENTER("wolfSSL_set_write_fd");
  1352. if (ssl == NULL) {
  1353. return BAD_FUNC_ARG;
  1354. }
  1355. ssl->wfd = fd; /* not used directly to allow IO callbacks */
  1356. ssl->IOCB_WriteCtx = &ssl->wfd;
  1357. #ifdef WOLFSSL_DTLS
  1358. ssl->buffers.dtlsCtx.connected = 0;
  1359. if (ssl->options.dtls) {
  1360. ssl->IOCB_WriteCtx = &ssl->buffers.dtlsCtx;
  1361. ssl->buffers.dtlsCtx.wfd = fd;
  1362. }
  1363. #endif
  1364. WOLFSSL_LEAVE("wolfSSL_set_write_fd", WOLFSSL_SUCCESS);
  1365. return WOLFSSL_SUCCESS;
  1366. }
  1367. /**
  1368. * Get the name of cipher at priority level passed in.
  1369. */
  1370. char* wolfSSL_get_cipher_list(int priority)
  1371. {
  1372. const CipherSuiteInfo* ciphers = GetCipherNames();
  1373. if (priority >= GetCipherNamesSize() || priority < 0) {
  1374. return 0;
  1375. }
  1376. return (char*)ciphers[priority].name;
  1377. }
  1378. /**
  1379. * Get the name of cipher at priority level passed in.
  1380. */
  1381. char* wolfSSL_get_cipher_list_ex(WOLFSSL* ssl, int priority)
  1382. {
  1383. if (ssl == NULL) {
  1384. return NULL;
  1385. }
  1386. else {
  1387. const char* cipher;
  1388. if ((cipher = wolfSSL_get_cipher_name_internal(ssl)) != NULL) {
  1389. if (priority == 0) {
  1390. return (char*)cipher;
  1391. }
  1392. else {
  1393. return NULL;
  1394. }
  1395. }
  1396. else {
  1397. return wolfSSL_get_cipher_list(priority);
  1398. }
  1399. }
  1400. }
  1401. int wolfSSL_get_ciphers(char* buf, int len)
  1402. {
  1403. const CipherSuiteInfo* ciphers = GetCipherNames();
  1404. int ciphersSz = GetCipherNamesSize();
  1405. int i;
  1406. if (buf == NULL || len <= 0)
  1407. return BAD_FUNC_ARG;
  1408. /* Add each member to the buffer delimited by a : */
  1409. for (i = 0; i < ciphersSz; i++) {
  1410. int cipherNameSz = (int)XSTRLEN(ciphers[i].name);
  1411. if (cipherNameSz + 1 < len) {
  1412. XSTRNCPY(buf, ciphers[i].name, len);
  1413. buf += cipherNameSz;
  1414. if (i < ciphersSz - 1)
  1415. *buf++ = ':';
  1416. *buf = 0;
  1417. len -= cipherNameSz + 1;
  1418. }
  1419. else
  1420. return BUFFER_E;
  1421. }
  1422. return WOLFSSL_SUCCESS;
  1423. }
  1424. #ifndef NO_ERROR_STRINGS
  1425. /* places a list of all supported cipher suites in TLS_* format into "buf"
  1426. * return WOLFSSL_SUCCESS on success */
  1427. int wolfSSL_get_ciphers_iana(char* buf, int len)
  1428. {
  1429. const CipherSuiteInfo* ciphers = GetCipherNames();
  1430. int ciphersSz = GetCipherNamesSize();
  1431. int i;
  1432. int cipherNameSz;
  1433. if (buf == NULL || len <= 0)
  1434. return BAD_FUNC_ARG;
  1435. /* Add each member to the buffer delimited by a : */
  1436. for (i = 0; i < ciphersSz; i++) {
  1437. #ifndef NO_CIPHER_SUITE_ALIASES
  1438. if (ciphers[i].flags & WOLFSSL_CIPHER_SUITE_FLAG_NAMEALIAS)
  1439. continue;
  1440. #endif
  1441. cipherNameSz = (int)XSTRLEN(ciphers[i].name_iana);
  1442. if (cipherNameSz + 1 < len) {
  1443. XSTRNCPY(buf, ciphers[i].name_iana, len);
  1444. buf += cipherNameSz;
  1445. if (i < ciphersSz - 1)
  1446. *buf++ = ':';
  1447. *buf = 0;
  1448. len -= cipherNameSz + 1;
  1449. }
  1450. else
  1451. return BUFFER_E;
  1452. }
  1453. return WOLFSSL_SUCCESS;
  1454. }
  1455. #endif /* NO_ERROR_STRINGS */
  1456. const char* wolfSSL_get_shared_ciphers(WOLFSSL* ssl, char* buf, int len)
  1457. {
  1458. const char* cipher;
  1459. if (ssl == NULL)
  1460. return NULL;
  1461. cipher = wolfSSL_get_cipher_name_iana(ssl);
  1462. len = min(len, (int)(XSTRLEN(cipher) + 1));
  1463. XMEMCPY(buf, cipher, len);
  1464. return buf;
  1465. }
  1466. int wolfSSL_get_fd(const WOLFSSL* ssl)
  1467. {
  1468. int fd = -1;
  1469. WOLFSSL_ENTER("wolfSSL_get_fd");
  1470. if (ssl) {
  1471. fd = ssl->rfd;
  1472. }
  1473. WOLFSSL_LEAVE("wolfSSL_get_fd", fd);
  1474. return fd;
  1475. }
  1476. int wolfSSL_dtls(WOLFSSL* ssl)
  1477. {
  1478. int dtlsOpt = 0;
  1479. if (ssl)
  1480. dtlsOpt = ssl->options.dtls;
  1481. return dtlsOpt;
  1482. }
  1483. #if !defined(NO_CERTS)
  1484. /* Set whether mutual authentication is required for connections.
  1485. * Server side only.
  1486. *
  1487. * ctx The SSL/TLS CTX object.
  1488. * req 1 to indicate required and 0 when not.
  1489. * returns BAD_FUNC_ARG when ctx is NULL, SIDE_ERROR when not a server and
  1490. * 0 on success.
  1491. */
  1492. int wolfSSL_CTX_mutual_auth(WOLFSSL_CTX* ctx, int req)
  1493. {
  1494. if (ctx == NULL)
  1495. return BAD_FUNC_ARG;
  1496. if (ctx->method->side == WOLFSSL_CLIENT_END)
  1497. return SIDE_ERROR;
  1498. ctx->mutualAuth = (byte)req;
  1499. return 0;
  1500. }
  1501. /* Set whether mutual authentication is required for the connection.
  1502. * Server side only.
  1503. *
  1504. * ssl The SSL/TLS object.
  1505. * req 1 to indicate required and 0 when not.
  1506. * returns BAD_FUNC_ARG when ssl is NULL, or not using TLS v1.3,
  1507. * SIDE_ERROR when not a client and 0 on success.
  1508. */
  1509. int wolfSSL_mutual_auth(WOLFSSL* ssl, int req)
  1510. {
  1511. if (ssl == NULL)
  1512. return BAD_FUNC_ARG;
  1513. if (ssl->options.side == WOLFSSL_SERVER_END)
  1514. return SIDE_ERROR;
  1515. ssl->options.mutualAuth = (word16)req;
  1516. return 0;
  1517. }
  1518. #endif /* NO_CERTS */
  1519. #ifdef WOLFSSL_WOLFSENTRY_HOOKS
  1520. int wolfSSL_CTX_set_AcceptFilter(
  1521. WOLFSSL_CTX *ctx,
  1522. NetworkFilterCallback_t AcceptFilter,
  1523. void *AcceptFilter_arg)
  1524. {
  1525. if (ctx == NULL)
  1526. return BAD_FUNC_ARG;
  1527. ctx->AcceptFilter = AcceptFilter;
  1528. ctx->AcceptFilter_arg = AcceptFilter_arg;
  1529. return 0;
  1530. }
  1531. int wolfSSL_set_AcceptFilter(
  1532. WOLFSSL *ssl,
  1533. NetworkFilterCallback_t AcceptFilter,
  1534. void *AcceptFilter_arg)
  1535. {
  1536. if (ssl == NULL)
  1537. return BAD_FUNC_ARG;
  1538. ssl->AcceptFilter = AcceptFilter;
  1539. ssl->AcceptFilter_arg = AcceptFilter_arg;
  1540. return 0;
  1541. }
  1542. int wolfSSL_CTX_set_ConnectFilter(
  1543. WOLFSSL_CTX *ctx,
  1544. NetworkFilterCallback_t ConnectFilter,
  1545. void *ConnectFilter_arg)
  1546. {
  1547. if (ctx == NULL)
  1548. return BAD_FUNC_ARG;
  1549. ctx->ConnectFilter = ConnectFilter;
  1550. ctx->ConnectFilter_arg = ConnectFilter_arg;
  1551. return 0;
  1552. }
  1553. int wolfSSL_set_ConnectFilter(
  1554. WOLFSSL *ssl,
  1555. NetworkFilterCallback_t ConnectFilter,
  1556. void *ConnectFilter_arg)
  1557. {
  1558. if (ssl == NULL)
  1559. return BAD_FUNC_ARG;
  1560. ssl->ConnectFilter = ConnectFilter;
  1561. ssl->ConnectFilter_arg = ConnectFilter_arg;
  1562. return 0;
  1563. }
  1564. #endif /* WOLFSSL_WOLFSENTRY_HOOKS */
  1565. #ifndef WOLFSSL_LEANPSK
  1566. #if defined(WOLFSSL_DTLS) && defined(XINET_PTON) && \
  1567. !defined(WOLFSSL_NO_SOCK) && defined(HAVE_SOCKADDR)
  1568. void* wolfSSL_dtls_create_peer(int port, char* ip)
  1569. {
  1570. SOCKADDR_IN *addr;
  1571. addr = (SOCKADDR_IN*)XMALLOC(sizeof(*addr), NULL,
  1572. DYNAMIC_TYPE_SOCKADDR);
  1573. if (addr == NULL) {
  1574. return NULL;
  1575. }
  1576. addr->sin_family = AF_INET;
  1577. addr->sin_port = XHTONS((word16)port);
  1578. if (XINET_PTON(AF_INET, ip, &addr->sin_addr) < 1) {
  1579. XFREE(addr, NULL, DYNAMIC_TYPE_SOCKADDR);
  1580. return NULL;
  1581. }
  1582. return addr;
  1583. }
  1584. int wolfSSL_dtls_free_peer(void* addr)
  1585. {
  1586. XFREE(addr, NULL, DYNAMIC_TYPE_SOCKADDR);
  1587. return WOLFSSL_SUCCESS;
  1588. }
  1589. #endif
  1590. int wolfSSL_dtls_set_peer(WOLFSSL* ssl, void* peer, unsigned int peerSz)
  1591. {
  1592. #ifdef WOLFSSL_DTLS
  1593. void* sa;
  1594. if (ssl == NULL)
  1595. return WOLFSSL_FAILURE;
  1596. if (peer == NULL || peerSz == 0) {
  1597. if (ssl->buffers.dtlsCtx.peer.sa != NULL)
  1598. XFREE(ssl->buffers.dtlsCtx.peer.sa,ssl->heap,DYNAMIC_TYPE_SOCKADDR);
  1599. ssl->buffers.dtlsCtx.peer.sa = NULL;
  1600. ssl->buffers.dtlsCtx.peer.sz = 0;
  1601. ssl->buffers.dtlsCtx.peer.bufSz = 0;
  1602. ssl->buffers.dtlsCtx.userSet = 0;
  1603. return WOLFSSL_SUCCESS;
  1604. }
  1605. sa = (void*)XMALLOC(peerSz, ssl->heap, DYNAMIC_TYPE_SOCKADDR);
  1606. if (sa != NULL) {
  1607. if (ssl->buffers.dtlsCtx.peer.sa != NULL) {
  1608. XFREE(ssl->buffers.dtlsCtx.peer.sa,ssl->heap,DYNAMIC_TYPE_SOCKADDR);
  1609. ssl->buffers.dtlsCtx.peer.sa = NULL;
  1610. }
  1611. XMEMCPY(sa, peer, peerSz);
  1612. ssl->buffers.dtlsCtx.peer.sa = sa;
  1613. ssl->buffers.dtlsCtx.peer.sz = peerSz;
  1614. ssl->buffers.dtlsCtx.peer.bufSz = peerSz;
  1615. ssl->buffers.dtlsCtx.userSet = 1;
  1616. return WOLFSSL_SUCCESS;
  1617. }
  1618. return WOLFSSL_FAILURE;
  1619. #else
  1620. (void)ssl;
  1621. (void)peer;
  1622. (void)peerSz;
  1623. return WOLFSSL_NOT_IMPLEMENTED;
  1624. #endif
  1625. }
  1626. int wolfSSL_dtls_get_peer(WOLFSSL* ssl, void* peer, unsigned int* peerSz)
  1627. {
  1628. #ifdef WOLFSSL_DTLS
  1629. if (ssl == NULL) {
  1630. return WOLFSSL_FAILURE;
  1631. }
  1632. if (peer != NULL && peerSz != NULL
  1633. && *peerSz >= ssl->buffers.dtlsCtx.peer.sz
  1634. && ssl->buffers.dtlsCtx.peer.sa != NULL) {
  1635. *peerSz = ssl->buffers.dtlsCtx.peer.sz;
  1636. XMEMCPY(peer, ssl->buffers.dtlsCtx.peer.sa, *peerSz);
  1637. return WOLFSSL_SUCCESS;
  1638. }
  1639. return WOLFSSL_FAILURE;
  1640. #else
  1641. (void)ssl;
  1642. (void)peer;
  1643. (void)peerSz;
  1644. return WOLFSSL_NOT_IMPLEMENTED;
  1645. #endif
  1646. }
  1647. #if defined(WOLFSSL_SCTP) && defined(WOLFSSL_DTLS)
  1648. int wolfSSL_CTX_dtls_set_sctp(WOLFSSL_CTX* ctx)
  1649. {
  1650. WOLFSSL_ENTER("wolfSSL_CTX_dtls_set_sctp");
  1651. if (ctx == NULL)
  1652. return BAD_FUNC_ARG;
  1653. ctx->dtlsSctp = 1;
  1654. return WOLFSSL_SUCCESS;
  1655. }
  1656. int wolfSSL_dtls_set_sctp(WOLFSSL* ssl)
  1657. {
  1658. WOLFSSL_ENTER("wolfSSL_dtls_set_sctp");
  1659. if (ssl == NULL)
  1660. return BAD_FUNC_ARG;
  1661. ssl->options.dtlsSctp = 1;
  1662. return WOLFSSL_SUCCESS;
  1663. }
  1664. #endif /* WOLFSSL_DTLS && WOLFSSL_SCTP */
  1665. #if (defined(WOLFSSL_SCTP) || defined(WOLFSSL_DTLS_MTU)) && \
  1666. defined(WOLFSSL_DTLS)
  1667. int wolfSSL_CTX_dtls_set_mtu(WOLFSSL_CTX* ctx, word16 newMtu)
  1668. {
  1669. if (ctx == NULL || newMtu > MAX_RECORD_SIZE)
  1670. return BAD_FUNC_ARG;
  1671. ctx->dtlsMtuSz = newMtu;
  1672. return WOLFSSL_SUCCESS;
  1673. }
  1674. int wolfSSL_dtls_set_mtu(WOLFSSL* ssl, word16 newMtu)
  1675. {
  1676. if (ssl == NULL)
  1677. return BAD_FUNC_ARG;
  1678. if (newMtu > MAX_RECORD_SIZE) {
  1679. ssl->error = BAD_FUNC_ARG;
  1680. return WOLFSSL_FAILURE;
  1681. }
  1682. ssl->dtlsMtuSz = newMtu;
  1683. return WOLFSSL_SUCCESS;
  1684. }
  1685. #endif /* WOLFSSL_DTLS && (WOLFSSL_SCTP || WOLFSSL_DTLS_MTU) */
  1686. #ifdef WOLFSSL_SRTP
  1687. static const WOLFSSL_SRTP_PROTECTION_PROFILE gSrtpProfiles[] = {
  1688. /* AES CCM 128, Salt:112-bits, Auth HMAC-SHA1 Tag: 80-bits
  1689. * (master_key:128bits + master_salt:112bits) * 2 = 480 bits (60) */
  1690. {"SRTP_AES128_CM_SHA1_80", SRTP_AES128_CM_SHA1_80,
  1691. (((128 + 112) * 2) / 8) },
  1692. /* AES CCM 128, Salt:112-bits, Auth HMAC-SHA1 Tag: 32-bits
  1693. * (master_key:128bits + master_salt:112bits) * 2 = 480 bits (60) */
  1694. {"SRTP_AES128_CM_SHA1_32", SRTP_AES128_CM_SHA1_32,
  1695. (((128 + 112) * 2) / 8) },
  1696. /* NULL Cipher, Salt:112-bits, Auth HMAC-SHA1 Tag 80-bits */
  1697. {"SRTP_NULL_SHA1_80", SRTP_NULL_SHA1_80, ((112 * 2) / 8)},
  1698. /* NULL Cipher, Salt:112-bits, Auth HMAC-SHA1 Tag 32-bits */
  1699. {"SRTP_NULL_SHA1_32", SRTP_NULL_SHA1_32, ((112 * 2) / 8)},
  1700. /* AES GCM 128, Salt: 96-bits, Auth GCM Tag 128-bits
  1701. * (master_key:128bits + master_salt:96bits) * 2 = 448 bits (56) */
  1702. {"SRTP_AEAD_AES_128_GCM", SRTP_AEAD_AES_128_GCM, (((128 + 96) * 2) / 8) },
  1703. /* AES GCM 256, Salt: 96-bits, Auth GCM Tag 128-bits
  1704. * (master_key:256bits + master_salt:96bits) * 2 = 704 bits (88) */
  1705. {"SRTP_AEAD_AES_256_GCM", SRTP_AEAD_AES_256_GCM, (((256 + 96) * 2) / 8) },
  1706. };
  1707. static const WOLFSSL_SRTP_PROTECTION_PROFILE* DtlsSrtpFindProfile(
  1708. const char* profile_str, word32 profile_str_len, unsigned long id)
  1709. {
  1710. int i;
  1711. const WOLFSSL_SRTP_PROTECTION_PROFILE* profile = NULL;
  1712. for (i=0;
  1713. i<(int)(sizeof(gSrtpProfiles)/sizeof(WOLFSSL_SRTP_PROTECTION_PROFILE));
  1714. i++) {
  1715. if (profile_str != NULL) {
  1716. word32 srtp_profile_len = (word32)XSTRLEN(gSrtpProfiles[i].name);
  1717. if (srtp_profile_len == profile_str_len &&
  1718. XMEMCMP(gSrtpProfiles[i].name, profile_str, profile_str_len)
  1719. == 0) {
  1720. profile = &gSrtpProfiles[i];
  1721. break;
  1722. }
  1723. }
  1724. else if (id != 0 && gSrtpProfiles[i].id == id) {
  1725. profile = &gSrtpProfiles[i];
  1726. break;
  1727. }
  1728. }
  1729. return profile;
  1730. }
  1731. /* profile_str: accepts ":" colon separated list of SRTP profiles */
  1732. static int DtlsSrtpSelProfiles(word16* id, const char* profile_str)
  1733. {
  1734. const WOLFSSL_SRTP_PROTECTION_PROFILE* profile;
  1735. const char *current, *next = NULL;
  1736. word32 length = 0, current_length;
  1737. *id = 0; /* reset destination ID's */
  1738. if (profile_str == NULL) {
  1739. return WOLFSSL_FAILURE;
  1740. }
  1741. /* loop on end of line or colon ":" */
  1742. next = profile_str;
  1743. length = (word32)XSTRLEN(profile_str);
  1744. do {
  1745. current = next;
  1746. next = XSTRSTR(current, ":");
  1747. if (next) {
  1748. current_length = (word32)(next - current);
  1749. ++next; /* ++ needed to skip ':' */
  1750. } else {
  1751. current_length = (word32)XSTRLEN(current);
  1752. }
  1753. if (current_length < length)
  1754. length = current_length;
  1755. profile = DtlsSrtpFindProfile(current, current_length, 0);
  1756. if (profile != NULL) {
  1757. *id |= (1 << profile->id); /* selected bit based on ID */
  1758. }
  1759. } while (next != NULL);
  1760. return WOLFSSL_SUCCESS;
  1761. }
  1762. int wolfSSL_CTX_set_tlsext_use_srtp(WOLFSSL_CTX* ctx, const char* profile_str)
  1763. {
  1764. int ret = WOLFSSL_FAILURE;
  1765. if (ctx != NULL) {
  1766. ret = DtlsSrtpSelProfiles(&ctx->dtlsSrtpProfiles, profile_str);
  1767. }
  1768. return ret;
  1769. }
  1770. int wolfSSL_set_tlsext_use_srtp(WOLFSSL* ssl, const char* profile_str)
  1771. {
  1772. int ret = WOLFSSL_FAILURE;
  1773. if (ssl != NULL) {
  1774. ret = DtlsSrtpSelProfiles(&ssl->dtlsSrtpProfiles, profile_str);
  1775. }
  1776. return ret;
  1777. }
  1778. const WOLFSSL_SRTP_PROTECTION_PROFILE* wolfSSL_get_selected_srtp_profile(
  1779. WOLFSSL* ssl)
  1780. {
  1781. const WOLFSSL_SRTP_PROTECTION_PROFILE* profile = NULL;
  1782. if (ssl) {
  1783. profile = DtlsSrtpFindProfile(NULL, 0, ssl->dtlsSrtpId);
  1784. }
  1785. return profile;
  1786. }
  1787. #ifndef NO_WOLFSSL_STUB
  1788. WOLF_STACK_OF(WOLFSSL_SRTP_PROTECTION_PROFILE)* wolfSSL_get_srtp_profiles(
  1789. WOLFSSL* ssl)
  1790. {
  1791. /* Not yet implemented - should return list of available SRTP profiles
  1792. * ssl->dtlsSrtpProfiles */
  1793. (void)ssl;
  1794. return NULL;
  1795. }
  1796. #endif
  1797. #define DTLS_SRTP_KEYING_MATERIAL_LABEL "EXTRACTOR-dtls_srtp"
  1798. int wolfSSL_export_dtls_srtp_keying_material(WOLFSSL* ssl,
  1799. unsigned char* out, size_t* olen)
  1800. {
  1801. const WOLFSSL_SRTP_PROTECTION_PROFILE* profile = NULL;
  1802. if (ssl == NULL || olen == NULL) {
  1803. return BAD_FUNC_ARG;
  1804. }
  1805. profile = DtlsSrtpFindProfile(NULL, 0, ssl->dtlsSrtpId);
  1806. if (profile == NULL) {
  1807. WOLFSSL_MSG("Not using DTLS SRTP");
  1808. return EXT_MISSING;
  1809. }
  1810. if (out == NULL) {
  1811. *olen = profile->kdfBits;
  1812. return LENGTH_ONLY_E;
  1813. }
  1814. if (*olen < (size_t)profile->kdfBits) {
  1815. return BUFFER_E;
  1816. }
  1817. return wolfSSL_export_keying_material(ssl, out, profile->kdfBits,
  1818. DTLS_SRTP_KEYING_MATERIAL_LABEL,
  1819. XSTR_SIZEOF(DTLS_SRTP_KEYING_MATERIAL_LABEL), NULL, 0, 0);
  1820. }
  1821. #endif /* WOLFSSL_SRTP */
  1822. #ifdef WOLFSSL_DTLS_DROP_STATS
  1823. int wolfSSL_dtls_get_drop_stats(WOLFSSL* ssl,
  1824. word32* macDropCount, word32* replayDropCount)
  1825. {
  1826. int ret;
  1827. WOLFSSL_ENTER("wolfSSL_dtls_get_drop_stats");
  1828. if (ssl == NULL)
  1829. ret = BAD_FUNC_ARG;
  1830. else {
  1831. ret = WOLFSSL_SUCCESS;
  1832. if (macDropCount != NULL)
  1833. *macDropCount = ssl->macDropCount;
  1834. if (replayDropCount != NULL)
  1835. *replayDropCount = ssl->replayDropCount;
  1836. }
  1837. WOLFSSL_LEAVE("wolfSSL_dtls_get_drop_stats", ret);
  1838. return ret;
  1839. }
  1840. #endif /* WOLFSSL_DTLS_DROP_STATS */
  1841. #if defined(WOLFSSL_MULTICAST)
  1842. int wolfSSL_CTX_mcast_set_member_id(WOLFSSL_CTX* ctx, word16 id)
  1843. {
  1844. int ret = 0;
  1845. WOLFSSL_ENTER("wolfSSL_CTX_mcast_set_member_id");
  1846. if (ctx == NULL || id > 255)
  1847. ret = BAD_FUNC_ARG;
  1848. if (ret == 0) {
  1849. ctx->haveEMS = 0;
  1850. ctx->haveMcast = 1;
  1851. ctx->mcastID = (byte)id;
  1852. #ifndef WOLFSSL_USER_IO
  1853. ctx->CBIORecv = EmbedReceiveFromMcast;
  1854. #endif /* WOLFSSL_USER_IO */
  1855. ret = WOLFSSL_SUCCESS;
  1856. }
  1857. WOLFSSL_LEAVE("wolfSSL_CTX_mcast_set_member_id", ret);
  1858. return ret;
  1859. }
  1860. int wolfSSL_mcast_get_max_peers(void)
  1861. {
  1862. return WOLFSSL_MULTICAST_PEERS;
  1863. }
  1864. #ifdef WOLFSSL_DTLS
  1865. static WC_INLINE word32 UpdateHighwaterMark(word32 cur, word32 first,
  1866. word32 second, word32 high)
  1867. {
  1868. word32 newCur = 0;
  1869. if (cur < first)
  1870. newCur = first;
  1871. else if (cur < second)
  1872. newCur = second;
  1873. else if (cur < high)
  1874. newCur = high;
  1875. return newCur;
  1876. }
  1877. #endif /* WOLFSSL_DTLS */
  1878. int wolfSSL_set_secret(WOLFSSL* ssl, word16 epoch,
  1879. const byte* preMasterSecret, word32 preMasterSz,
  1880. const byte* clientRandom, const byte* serverRandom,
  1881. const byte* suite)
  1882. {
  1883. int ret = 0;
  1884. WOLFSSL_ENTER("wolfSSL_set_secret");
  1885. if (ssl == NULL || preMasterSecret == NULL ||
  1886. preMasterSz == 0 || preMasterSz > ENCRYPT_LEN ||
  1887. clientRandom == NULL || serverRandom == NULL || suite == NULL) {
  1888. ret = BAD_FUNC_ARG;
  1889. }
  1890. if (ret == 0 && ssl->arrays->preMasterSecret == NULL) {
  1891. ssl->arrays->preMasterSz = ENCRYPT_LEN;
  1892. ssl->arrays->preMasterSecret = (byte*)XMALLOC(ENCRYPT_LEN, ssl->heap,
  1893. DYNAMIC_TYPE_SECRET);
  1894. if (ssl->arrays->preMasterSecret == NULL) {
  1895. ret = MEMORY_E;
  1896. }
  1897. }
  1898. if (ret == 0) {
  1899. XMEMCPY(ssl->arrays->preMasterSecret, preMasterSecret, preMasterSz);
  1900. XMEMSET(ssl->arrays->preMasterSecret + preMasterSz, 0,
  1901. ENCRYPT_LEN - preMasterSz);
  1902. ssl->arrays->preMasterSz = preMasterSz;
  1903. XMEMCPY(ssl->arrays->clientRandom, clientRandom, RAN_LEN);
  1904. XMEMCPY(ssl->arrays->serverRandom, serverRandom, RAN_LEN);
  1905. ssl->options.cipherSuite0 = suite[0];
  1906. ssl->options.cipherSuite = suite[1];
  1907. ret = SetCipherSpecs(ssl);
  1908. }
  1909. if (ret == 0)
  1910. ret = MakeTlsMasterSecret(ssl);
  1911. if (ret == 0) {
  1912. ssl->keys.encryptionOn = 1;
  1913. ret = SetKeysSide(ssl, ENCRYPT_AND_DECRYPT_SIDE);
  1914. }
  1915. if (ret == 0) {
  1916. if (ssl->options.dtls) {
  1917. #ifdef WOLFSSL_DTLS
  1918. WOLFSSL_DTLS_PEERSEQ* peerSeq;
  1919. int i;
  1920. ssl->keys.dtls_epoch = epoch;
  1921. for (i = 0, peerSeq = ssl->keys.peerSeq;
  1922. i < WOLFSSL_DTLS_PEERSEQ_SZ;
  1923. i++, peerSeq++) {
  1924. peerSeq->nextEpoch = epoch;
  1925. peerSeq->prevSeq_lo = peerSeq->nextSeq_lo;
  1926. peerSeq->prevSeq_hi = peerSeq->nextSeq_hi;
  1927. peerSeq->nextSeq_lo = 0;
  1928. peerSeq->nextSeq_hi = 0;
  1929. XMEMCPY(peerSeq->prevWindow, peerSeq->window, DTLS_SEQ_SZ);
  1930. XMEMSET(peerSeq->window, 0, DTLS_SEQ_SZ);
  1931. peerSeq->highwaterMark = UpdateHighwaterMark(0,
  1932. ssl->ctx->mcastFirstSeq,
  1933. ssl->ctx->mcastSecondSeq,
  1934. ssl->ctx->mcastMaxSeq);
  1935. }
  1936. #else
  1937. (void)epoch;
  1938. #endif
  1939. }
  1940. FreeHandshakeResources(ssl);
  1941. ret = WOLFSSL_SUCCESS;
  1942. }
  1943. else {
  1944. if (ssl)
  1945. ssl->error = ret;
  1946. ret = WOLFSSL_FATAL_ERROR;
  1947. }
  1948. WOLFSSL_LEAVE("wolfSSL_set_secret", ret);
  1949. return ret;
  1950. }
  1951. #ifdef WOLFSSL_DTLS
  1952. int wolfSSL_mcast_peer_add(WOLFSSL* ssl, word16 peerId, int sub)
  1953. {
  1954. WOLFSSL_DTLS_PEERSEQ* p = NULL;
  1955. int ret = WOLFSSL_SUCCESS;
  1956. int i;
  1957. WOLFSSL_ENTER("wolfSSL_mcast_peer_add");
  1958. if (ssl == NULL || peerId > 255)
  1959. return BAD_FUNC_ARG;
  1960. if (!sub) {
  1961. /* Make sure it isn't already present, while keeping the first
  1962. * open spot. */
  1963. for (i = 0; i < WOLFSSL_DTLS_PEERSEQ_SZ; i++) {
  1964. if (ssl->keys.peerSeq[i].peerId == INVALID_PEER_ID)
  1965. p = &ssl->keys.peerSeq[i];
  1966. if (ssl->keys.peerSeq[i].peerId == peerId) {
  1967. WOLFSSL_MSG("Peer ID already in multicast peer list.");
  1968. p = NULL;
  1969. }
  1970. }
  1971. if (p != NULL) {
  1972. XMEMSET(p, 0, sizeof(WOLFSSL_DTLS_PEERSEQ));
  1973. p->peerId = peerId;
  1974. p->highwaterMark = UpdateHighwaterMark(0,
  1975. ssl->ctx->mcastFirstSeq,
  1976. ssl->ctx->mcastSecondSeq,
  1977. ssl->ctx->mcastMaxSeq);
  1978. }
  1979. else {
  1980. WOLFSSL_MSG("No room in peer list.");
  1981. ret = -1;
  1982. }
  1983. }
  1984. else {
  1985. for (i = 0; i < WOLFSSL_DTLS_PEERSEQ_SZ; i++) {
  1986. if (ssl->keys.peerSeq[i].peerId == peerId)
  1987. p = &ssl->keys.peerSeq[i];
  1988. }
  1989. if (p != NULL) {
  1990. p->peerId = INVALID_PEER_ID;
  1991. }
  1992. else {
  1993. WOLFSSL_MSG("Peer not found in list.");
  1994. }
  1995. }
  1996. WOLFSSL_LEAVE("wolfSSL_mcast_peer_add", ret);
  1997. return ret;
  1998. }
  1999. /* If peerId is in the list of peers and its last sequence number is non-zero,
  2000. * return 1, otherwise return 0. */
  2001. int wolfSSL_mcast_peer_known(WOLFSSL* ssl, unsigned short peerId)
  2002. {
  2003. int known = 0;
  2004. int i;
  2005. WOLFSSL_ENTER("wolfSSL_mcast_peer_known");
  2006. if (ssl == NULL || peerId > 255) {
  2007. return BAD_FUNC_ARG;
  2008. }
  2009. for (i = 0; i < WOLFSSL_DTLS_PEERSEQ_SZ; i++) {
  2010. if (ssl->keys.peerSeq[i].peerId == peerId) {
  2011. if (ssl->keys.peerSeq[i].nextSeq_hi ||
  2012. ssl->keys.peerSeq[i].nextSeq_lo) {
  2013. known = 1;
  2014. }
  2015. break;
  2016. }
  2017. }
  2018. WOLFSSL_LEAVE("wolfSSL_mcast_peer_known", known);
  2019. return known;
  2020. }
  2021. int wolfSSL_CTX_mcast_set_highwater_cb(WOLFSSL_CTX* ctx, word32 maxSeq,
  2022. word32 first, word32 second,
  2023. CallbackMcastHighwater cb)
  2024. {
  2025. if (ctx == NULL || (second && first > second) ||
  2026. first > maxSeq || second > maxSeq || cb == NULL) {
  2027. return BAD_FUNC_ARG;
  2028. }
  2029. ctx->mcastHwCb = cb;
  2030. ctx->mcastFirstSeq = first;
  2031. ctx->mcastSecondSeq = second;
  2032. ctx->mcastMaxSeq = maxSeq;
  2033. return WOLFSSL_SUCCESS;
  2034. }
  2035. int wolfSSL_mcast_set_highwater_ctx(WOLFSSL* ssl, void* ctx)
  2036. {
  2037. if (ssl == NULL || ctx == NULL)
  2038. return BAD_FUNC_ARG;
  2039. ssl->mcastHwCbCtx = ctx;
  2040. return WOLFSSL_SUCCESS;
  2041. }
  2042. #endif /* WOLFSSL_DTLS */
  2043. #endif /* WOLFSSL_MULTICAST */
  2044. #endif /* WOLFSSL_LEANPSK */
  2045. /* return underlying connect or accept, WOLFSSL_SUCCESS on ok */
  2046. int wolfSSL_negotiate(WOLFSSL* ssl)
  2047. {
  2048. int err = WOLFSSL_FATAL_ERROR;
  2049. WOLFSSL_ENTER("wolfSSL_negotiate");
  2050. if (ssl == NULL)
  2051. return WOLFSSL_FATAL_ERROR;
  2052. #ifndef NO_WOLFSSL_SERVER
  2053. if (ssl->options.side == WOLFSSL_SERVER_END) {
  2054. #ifdef WOLFSSL_TLS13
  2055. if (IsAtLeastTLSv1_3(ssl->version))
  2056. err = wolfSSL_accept_TLSv13(ssl);
  2057. else
  2058. #endif
  2059. err = wolfSSL_accept(ssl);
  2060. }
  2061. #endif
  2062. #ifndef NO_WOLFSSL_CLIENT
  2063. if (ssl->options.side == WOLFSSL_CLIENT_END) {
  2064. #ifdef WOLFSSL_TLS13
  2065. if (IsAtLeastTLSv1_3(ssl->version))
  2066. err = wolfSSL_connect_TLSv13(ssl);
  2067. else
  2068. #endif
  2069. err = wolfSSL_connect(ssl);
  2070. }
  2071. #endif
  2072. (void)ssl;
  2073. WOLFSSL_LEAVE("wolfSSL_negotiate", err);
  2074. return err;
  2075. }
  2076. WOLFSSL_ABI
  2077. WC_RNG* wolfSSL_GetRNG(WOLFSSL* ssl)
  2078. {
  2079. if (ssl) {
  2080. return ssl->rng;
  2081. }
  2082. return NULL;
  2083. }
  2084. #ifndef WOLFSSL_LEANPSK
  2085. /* object size based on build */
  2086. int wolfSSL_GetObjectSize(void)
  2087. {
  2088. #ifdef SHOW_SIZES
  2089. printf("sizeof suites = %lu\n", (unsigned long)sizeof(Suites));
  2090. printf("sizeof ciphers(2) = %lu\n", (unsigned long)sizeof(Ciphers));
  2091. #ifndef NO_RC4
  2092. printf("\tsizeof arc4 = %lu\n", (unsigned long)sizeof(Arc4));
  2093. #endif
  2094. printf("\tsizeof aes = %lu\n", (unsigned long)sizeof(Aes));
  2095. #ifndef NO_DES3
  2096. printf("\tsizeof des3 = %lu\n", (unsigned long)sizeof(Des3));
  2097. #endif
  2098. #ifdef HAVE_CHACHA
  2099. printf("\tsizeof chacha = %lu\n", (unsigned long)sizeof(ChaCha));
  2100. #endif
  2101. #ifdef WOLFSSL_SM4
  2102. printf("\tsizeof sm4 = %lu\n", (unsigned long)sizeof(Sm4));
  2103. #endif
  2104. printf("sizeof cipher specs = %lu\n", (unsigned long)
  2105. sizeof(CipherSpecs));
  2106. printf("sizeof keys = %lu\n", (unsigned long)sizeof(Keys));
  2107. printf("sizeof Hashes(2) = %lu\n", (unsigned long)sizeof(Hashes));
  2108. #ifndef NO_MD5
  2109. printf("\tsizeof MD5 = %lu\n", (unsigned long)sizeof(wc_Md5));
  2110. #endif
  2111. #ifndef NO_SHA
  2112. printf("\tsizeof SHA = %lu\n", (unsigned long)sizeof(wc_Sha));
  2113. #endif
  2114. #ifdef WOLFSSL_SHA224
  2115. printf("\tsizeof SHA224 = %lu\n", (unsigned long)sizeof(wc_Sha224));
  2116. #endif
  2117. #ifndef NO_SHA256
  2118. printf("\tsizeof SHA256 = %lu\n", (unsigned long)sizeof(wc_Sha256));
  2119. #endif
  2120. #ifdef WOLFSSL_SHA384
  2121. printf("\tsizeof SHA384 = %lu\n", (unsigned long)sizeof(wc_Sha384));
  2122. #endif
  2123. #ifdef WOLFSSL_SHA384
  2124. printf("\tsizeof SHA512 = %lu\n", (unsigned long)sizeof(wc_Sha512));
  2125. #endif
  2126. #ifdef WOLFSSL_SM3
  2127. printf("\tsizeof sm3 = %lu\n", (unsigned long)sizeof(Sm3));
  2128. #endif
  2129. printf("sizeof Buffers = %lu\n", (unsigned long)sizeof(Buffers));
  2130. printf("sizeof Options = %lu\n", (unsigned long)sizeof(Options));
  2131. printf("sizeof Arrays = %lu\n", (unsigned long)sizeof(Arrays));
  2132. #ifndef NO_RSA
  2133. printf("sizeof RsaKey = %lu\n", (unsigned long)sizeof(RsaKey));
  2134. #endif
  2135. #ifdef HAVE_ECC
  2136. printf("sizeof ecc_key = %lu\n", (unsigned long)sizeof(ecc_key));
  2137. #endif
  2138. printf("sizeof WOLFSSL_CIPHER = %lu\n", (unsigned long)
  2139. sizeof(WOLFSSL_CIPHER));
  2140. printf("sizeof WOLFSSL_SESSION = %lu\n", (unsigned long)
  2141. sizeof(WOLFSSL_SESSION));
  2142. printf("sizeof WOLFSSL = %lu\n", (unsigned long)sizeof(WOLFSSL));
  2143. printf("sizeof WOLFSSL_CTX = %lu\n", (unsigned long)
  2144. sizeof(WOLFSSL_CTX));
  2145. #endif
  2146. return sizeof(WOLFSSL);
  2147. }
  2148. int wolfSSL_CTX_GetObjectSize(void)
  2149. {
  2150. return sizeof(WOLFSSL_CTX);
  2151. }
  2152. int wolfSSL_METHOD_GetObjectSize(void)
  2153. {
  2154. return sizeof(WOLFSSL_METHOD);
  2155. }
  2156. #endif
  2157. #ifdef WOLFSSL_STATIC_MEMORY
  2158. int wolfSSL_CTX_load_static_memory(WOLFSSL_CTX** ctx,
  2159. wolfSSL_method_func method, unsigned char* buf, unsigned int sz, int flag,
  2160. int maxSz)
  2161. {
  2162. WOLFSSL_HEAP* heap;
  2163. WOLFSSL_HEAP_HINT* hint;
  2164. word32 idx = 0;
  2165. if (ctx == NULL || buf == NULL) {
  2166. return BAD_FUNC_ARG;
  2167. }
  2168. if (*ctx == NULL && method == NULL) {
  2169. return BAD_FUNC_ARG;
  2170. }
  2171. if (*ctx == NULL || (*ctx)->heap == NULL) {
  2172. if (sizeof(WOLFSSL_HEAP) + sizeof(WOLFSSL_HEAP_HINT) > sz - idx) {
  2173. return BUFFER_E; /* not enough memory for structures */
  2174. }
  2175. heap = (WOLFSSL_HEAP*)buf;
  2176. idx += sizeof(WOLFSSL_HEAP);
  2177. if (wolfSSL_init_memory_heap(heap) != 0) {
  2178. return WOLFSSL_FAILURE;
  2179. }
  2180. hint = (WOLFSSL_HEAP_HINT*)(buf + idx);
  2181. idx += sizeof(WOLFSSL_HEAP_HINT);
  2182. XMEMSET(hint, 0, sizeof(WOLFSSL_HEAP_HINT));
  2183. hint->memory = heap;
  2184. if (*ctx && (*ctx)->heap == NULL) {
  2185. (*ctx)->heap = (void*)hint;
  2186. }
  2187. }
  2188. else {
  2189. #ifdef WOLFSSL_HEAP_TEST
  2190. /* do not load in memory if test has been set */
  2191. if ((*ctx)->heap == (void*)WOLFSSL_HEAP_TEST) {
  2192. return WOLFSSL_SUCCESS;
  2193. }
  2194. #endif
  2195. hint = (WOLFSSL_HEAP_HINT*)((*ctx)->heap);
  2196. heap = hint->memory;
  2197. }
  2198. if (wolfSSL_load_static_memory(buf + idx, sz - idx, flag, heap) != 1) {
  2199. WOLFSSL_MSG("Error partitioning memory");
  2200. return WOLFSSL_FAILURE;
  2201. }
  2202. /* create ctx if needed */
  2203. if (*ctx == NULL) {
  2204. *ctx = wolfSSL_CTX_new_ex(method(hint), hint);
  2205. if (*ctx == NULL) {
  2206. WOLFSSL_MSG("Error creating ctx");
  2207. return WOLFSSL_FAILURE;
  2208. }
  2209. }
  2210. /* determine what max applies too */
  2211. if (flag & WOLFMEM_IO_POOL || flag & WOLFMEM_IO_POOL_FIXED) {
  2212. heap->maxIO = maxSz;
  2213. }
  2214. else { /* general memory used in handshakes */
  2215. heap->maxHa = maxSz;
  2216. }
  2217. heap->flag |= flag;
  2218. (void)maxSz;
  2219. (void)method;
  2220. return WOLFSSL_SUCCESS;
  2221. }
  2222. int wolfSSL_is_static_memory(WOLFSSL* ssl, WOLFSSL_MEM_CONN_STATS* mem_stats)
  2223. {
  2224. if (ssl == NULL) {
  2225. return BAD_FUNC_ARG;
  2226. }
  2227. WOLFSSL_ENTER("wolfSSL_is_static_memory");
  2228. /* fill out statistics if wanted and WOLFMEM_TRACK_STATS flag */
  2229. if (mem_stats != NULL && ssl->heap != NULL) {
  2230. WOLFSSL_HEAP_HINT* hint = ((WOLFSSL_HEAP_HINT*)(ssl->heap));
  2231. WOLFSSL_HEAP* heap = hint->memory;
  2232. if (heap->flag & WOLFMEM_TRACK_STATS && hint->stats != NULL) {
  2233. XMEMCPY(mem_stats, hint->stats, sizeof(WOLFSSL_MEM_CONN_STATS));
  2234. }
  2235. }
  2236. return (ssl->heap) ? 1 : 0;
  2237. }
  2238. int wolfSSL_CTX_is_static_memory(WOLFSSL_CTX* ctx, WOLFSSL_MEM_STATS* mem_stats)
  2239. {
  2240. if (ctx == NULL) {
  2241. return BAD_FUNC_ARG;
  2242. }
  2243. WOLFSSL_ENTER("wolfSSL_CTX_is_static_memory");
  2244. /* fill out statistics if wanted */
  2245. if (mem_stats != NULL && ctx->heap != NULL) {
  2246. WOLFSSL_HEAP* heap = ((WOLFSSL_HEAP_HINT*)(ctx->heap))->memory;
  2247. if (wolfSSL_GetMemStats(heap, mem_stats) != 1) {
  2248. return MEMORY_E;
  2249. }
  2250. }
  2251. return (ctx->heap) ? 1 : 0;
  2252. }
  2253. #endif /* WOLFSSL_STATIC_MEMORY */
  2254. /* return max record layer size plaintext input size */
  2255. int wolfSSL_GetMaxOutputSize(WOLFSSL* ssl)
  2256. {
  2257. WOLFSSL_ENTER("wolfSSL_GetMaxOutputSize");
  2258. if (ssl == NULL)
  2259. return BAD_FUNC_ARG;
  2260. if (ssl->options.handShakeState != HANDSHAKE_DONE) {
  2261. WOLFSSL_MSG("Handshake not complete yet");
  2262. return BAD_FUNC_ARG;
  2263. }
  2264. return wolfSSL_GetMaxFragSize(ssl, OUTPUT_RECORD_SIZE);
  2265. }
  2266. /* return record layer size of plaintext input size */
  2267. int wolfSSL_GetOutputSize(WOLFSSL* ssl, int inSz)
  2268. {
  2269. int maxSize;
  2270. WOLFSSL_ENTER("wolfSSL_GetOutputSize");
  2271. if (inSz < 0)
  2272. return BAD_FUNC_ARG;
  2273. maxSize = wolfSSL_GetMaxOutputSize(ssl);
  2274. if (maxSize < 0)
  2275. return maxSize; /* error */
  2276. if (inSz > maxSize)
  2277. return INPUT_SIZE_E;
  2278. return BuildMessage(ssl, NULL, 0, NULL, inSz, application_data, 0, 1, 0,
  2279. CUR_ORDER);
  2280. }
  2281. #ifdef HAVE_ECC
  2282. int wolfSSL_CTX_SetMinEccKey_Sz(WOLFSSL_CTX* ctx, short keySz)
  2283. {
  2284. if (ctx == NULL || keySz < 0 || keySz % 8 != 0) {
  2285. WOLFSSL_MSG("Key size must be divisible by 8 or ctx was null");
  2286. return BAD_FUNC_ARG;
  2287. }
  2288. ctx->minEccKeySz = keySz / 8;
  2289. #ifndef NO_CERTS
  2290. ctx->cm->minEccKeySz = keySz / 8;
  2291. #endif
  2292. return WOLFSSL_SUCCESS;
  2293. }
  2294. int wolfSSL_SetMinEccKey_Sz(WOLFSSL* ssl, short keySz)
  2295. {
  2296. if (ssl == NULL || keySz < 0 || keySz % 8 != 0) {
  2297. WOLFSSL_MSG("Key size must be divisible by 8 or ssl was null");
  2298. return BAD_FUNC_ARG;
  2299. }
  2300. ssl->options.minEccKeySz = keySz / 8;
  2301. return WOLFSSL_SUCCESS;
  2302. }
  2303. #endif /* HAVE_ECC */
  2304. #ifndef NO_RSA
  2305. int wolfSSL_CTX_SetMinRsaKey_Sz(WOLFSSL_CTX* ctx, short keySz)
  2306. {
  2307. if (ctx == NULL || keySz < 0 || keySz % 8 != 0) {
  2308. WOLFSSL_MSG("Key size must be divisible by 8 or ctx was null");
  2309. return BAD_FUNC_ARG;
  2310. }
  2311. ctx->minRsaKeySz = keySz / 8;
  2312. ctx->cm->minRsaKeySz = keySz / 8;
  2313. return WOLFSSL_SUCCESS;
  2314. }
  2315. int wolfSSL_SetMinRsaKey_Sz(WOLFSSL* ssl, short keySz)
  2316. {
  2317. if (ssl == NULL || keySz < 0 || keySz % 8 != 0) {
  2318. WOLFSSL_MSG("Key size must be divisible by 8 or ssl was null");
  2319. return BAD_FUNC_ARG;
  2320. }
  2321. ssl->options.minRsaKeySz = keySz / 8;
  2322. return WOLFSSL_SUCCESS;
  2323. }
  2324. #endif /* !NO_RSA */
  2325. #ifndef NO_DH
  2326. #if !defined(WOLFSSL_OLD_PRIME_CHECK) && !defined(HAVE_FIPS) && \
  2327. !defined(HAVE_SELFTEST)
  2328. /* Enables or disables the session's DH key prime test. */
  2329. int wolfSSL_SetEnableDhKeyTest(WOLFSSL* ssl, int enable)
  2330. {
  2331. WOLFSSL_ENTER("wolfSSL_SetEnableDhKeyTest");
  2332. if (ssl == NULL)
  2333. return BAD_FUNC_ARG;
  2334. if (!enable)
  2335. ssl->options.dhDoKeyTest = 0;
  2336. else
  2337. ssl->options.dhDoKeyTest = 1;
  2338. WOLFSSL_LEAVE("wolfSSL_SetEnableDhKeyTest", WOLFSSL_SUCCESS);
  2339. return WOLFSSL_SUCCESS;
  2340. }
  2341. #endif
  2342. int wolfSSL_CTX_SetMinDhKey_Sz(WOLFSSL_CTX* ctx, word16 keySz_bits)
  2343. {
  2344. if (ctx == NULL || keySz_bits > 16000 || keySz_bits % 8 != 0)
  2345. return BAD_FUNC_ARG;
  2346. ctx->minDhKeySz = keySz_bits / 8;
  2347. return WOLFSSL_SUCCESS;
  2348. }
  2349. int wolfSSL_SetMinDhKey_Sz(WOLFSSL* ssl, word16 keySz_bits)
  2350. {
  2351. if (ssl == NULL || keySz_bits > 16000 || keySz_bits % 8 != 0)
  2352. return BAD_FUNC_ARG;
  2353. ssl->options.minDhKeySz = keySz_bits / 8;
  2354. return WOLFSSL_SUCCESS;
  2355. }
  2356. int wolfSSL_CTX_SetMaxDhKey_Sz(WOLFSSL_CTX* ctx, word16 keySz_bits)
  2357. {
  2358. if (ctx == NULL || keySz_bits > 16000 || keySz_bits % 8 != 0)
  2359. return BAD_FUNC_ARG;
  2360. ctx->maxDhKeySz = keySz_bits / 8;
  2361. return WOLFSSL_SUCCESS;
  2362. }
  2363. int wolfSSL_SetMaxDhKey_Sz(WOLFSSL* ssl, word16 keySz_bits)
  2364. {
  2365. if (ssl == NULL || keySz_bits > 16000 || keySz_bits % 8 != 0)
  2366. return BAD_FUNC_ARG;
  2367. ssl->options.maxDhKeySz = keySz_bits / 8;
  2368. return WOLFSSL_SUCCESS;
  2369. }
  2370. int wolfSSL_GetDhKey_Sz(WOLFSSL* ssl)
  2371. {
  2372. if (ssl == NULL)
  2373. return BAD_FUNC_ARG;
  2374. return (ssl->options.dhKeySz * 8);
  2375. }
  2376. #endif /* !NO_DH */
  2377. WOLFSSL_ABI
  2378. int wolfSSL_write(WOLFSSL* ssl, const void* data, int sz)
  2379. {
  2380. int ret;
  2381. WOLFSSL_ENTER("wolfSSL_write");
  2382. if (ssl == NULL || data == NULL || sz < 0)
  2383. return BAD_FUNC_ARG;
  2384. #ifdef WOLFSSL_QUIC
  2385. if (WOLFSSL_IS_QUIC(ssl)) {
  2386. WOLFSSL_MSG("SSL_write() on QUIC not allowed");
  2387. return BAD_FUNC_ARG;
  2388. }
  2389. #endif
  2390. #ifdef HAVE_WRITE_DUP
  2391. { /* local variable scope */
  2392. int dupErr = 0; /* local copy */
  2393. ret = 0;
  2394. if (ssl->dupWrite && ssl->dupSide == READ_DUP_SIDE) {
  2395. WOLFSSL_MSG("Read dup side cannot write");
  2396. return WRITE_DUP_WRITE_E;
  2397. }
  2398. if (ssl->dupWrite) {
  2399. if (wc_LockMutex(&ssl->dupWrite->dupMutex) != 0) {
  2400. return BAD_MUTEX_E;
  2401. }
  2402. dupErr = ssl->dupWrite->dupErr;
  2403. ret = wc_UnLockMutex(&ssl->dupWrite->dupMutex);
  2404. }
  2405. if (ret != 0) {
  2406. ssl->error = ret; /* high priority fatal error */
  2407. return WOLFSSL_FATAL_ERROR;
  2408. }
  2409. if (dupErr != 0) {
  2410. WOLFSSL_MSG("Write dup error from other side");
  2411. ssl->error = dupErr;
  2412. return WOLFSSL_FATAL_ERROR;
  2413. }
  2414. }
  2415. #endif
  2416. #ifdef HAVE_ERRNO_H
  2417. errno = 0;
  2418. #endif
  2419. #ifdef OPENSSL_EXTRA
  2420. if (ssl->CBIS != NULL) {
  2421. ssl->CBIS(ssl, SSL_CB_WRITE, WOLFSSL_SUCCESS);
  2422. ssl->cbmode = SSL_CB_WRITE;
  2423. }
  2424. #endif
  2425. ret = SendData(ssl, data, sz);
  2426. WOLFSSL_LEAVE("wolfSSL_write", ret);
  2427. if (ret < 0)
  2428. return WOLFSSL_FATAL_ERROR;
  2429. else
  2430. return ret;
  2431. }
  2432. static int wolfSSL_read_internal(WOLFSSL* ssl, void* data, int sz, int peek)
  2433. {
  2434. int ret;
  2435. WOLFSSL_ENTER("wolfSSL_read_internal");
  2436. if (ssl == NULL || data == NULL || sz < 0)
  2437. return BAD_FUNC_ARG;
  2438. #ifdef WOLFSSL_QUIC
  2439. if (WOLFSSL_IS_QUIC(ssl)) {
  2440. WOLFSSL_MSG("SSL_read() on QUIC not allowed");
  2441. return BAD_FUNC_ARG;
  2442. }
  2443. #endif
  2444. #if defined(WOLFSSL_ERROR_CODE_OPENSSL) && defined(OPENSSL_EXTRA)
  2445. /* This additional logic is meant to simulate following openSSL behavior:
  2446. * After bidirectional SSL_shutdown complete, SSL_read returns 0 and
  2447. * SSL_get_error_code returns SSL_ERROR_ZERO_RETURN.
  2448. * This behavior is used to know the disconnect of the underlying
  2449. * transport layer.
  2450. *
  2451. * In this logic, CBIORecv is called with a read size of 0 to check the
  2452. * transport layer status. It also returns WOLFSSL_FAILURE so that
  2453. * SSL_read does not return a positive number on failure.
  2454. */
  2455. /* make sure bidirectional TLS shutdown completes */
  2456. if (ssl->error == WOLFSSL_ERROR_SYSCALL || ssl->options.shutdownDone) {
  2457. /* ask the underlying transport the connection is closed */
  2458. if (ssl->CBIORecv(ssl, (char*)data, 0, ssl->IOCB_ReadCtx) ==
  2459. WOLFSSL_CBIO_ERR_CONN_CLOSE) {
  2460. ssl->options.isClosed = 1;
  2461. ssl->error = WOLFSSL_ERROR_ZERO_RETURN;
  2462. }
  2463. return WOLFSSL_FAILURE;
  2464. }
  2465. #endif
  2466. #ifdef HAVE_WRITE_DUP
  2467. if (ssl->dupWrite && ssl->dupSide == WRITE_DUP_SIDE) {
  2468. WOLFSSL_MSG("Write dup side cannot read");
  2469. return WRITE_DUP_READ_E;
  2470. }
  2471. #endif
  2472. #ifdef HAVE_ERRNO_H
  2473. errno = 0;
  2474. #endif
  2475. ret = ReceiveData(ssl, (byte*)data, sz, peek);
  2476. #ifdef HAVE_WRITE_DUP
  2477. if (ssl->dupWrite) {
  2478. if (ssl->error != 0 && ssl->error != WANT_READ
  2479. #ifdef WOLFSSL_ASYNC_CRYPT
  2480. && ssl->error != WC_PENDING_E
  2481. #endif
  2482. ) {
  2483. int notifyErr;
  2484. WOLFSSL_MSG("Notifying write side of fatal read error");
  2485. notifyErr = NotifyWriteSide(ssl, ssl->error);
  2486. if (notifyErr < 0) {
  2487. ret = ssl->error = notifyErr;
  2488. }
  2489. }
  2490. }
  2491. #endif
  2492. WOLFSSL_LEAVE("wolfSSL_read_internal", ret);
  2493. if (ret < 0)
  2494. return WOLFSSL_FATAL_ERROR;
  2495. else
  2496. return ret;
  2497. }
  2498. int wolfSSL_peek(WOLFSSL* ssl, void* data, int sz)
  2499. {
  2500. WOLFSSL_ENTER("wolfSSL_peek");
  2501. return wolfSSL_read_internal(ssl, data, sz, TRUE);
  2502. }
  2503. WOLFSSL_ABI
  2504. int wolfSSL_read(WOLFSSL* ssl, void* data, int sz)
  2505. {
  2506. WOLFSSL_ENTER("wolfSSL_read");
  2507. #ifdef OPENSSL_EXTRA
  2508. if (ssl == NULL) {
  2509. return BAD_FUNC_ARG;
  2510. }
  2511. if (ssl->CBIS != NULL) {
  2512. ssl->CBIS(ssl, SSL_CB_READ, WOLFSSL_SUCCESS);
  2513. ssl->cbmode = SSL_CB_READ;
  2514. }
  2515. #endif
  2516. return wolfSSL_read_internal(ssl, data, sz, FALSE);
  2517. }
  2518. #ifdef WOLFSSL_MULTICAST
  2519. int wolfSSL_mcast_read(WOLFSSL* ssl, word16* id, void* data, int sz)
  2520. {
  2521. int ret = 0;
  2522. WOLFSSL_ENTER("wolfSSL_mcast_read");
  2523. if (ssl == NULL)
  2524. return BAD_FUNC_ARG;
  2525. ret = wolfSSL_read_internal(ssl, data, sz, FALSE);
  2526. if (ssl->options.dtls && ssl->options.haveMcast && id != NULL)
  2527. *id = ssl->keys.curPeerId;
  2528. return ret;
  2529. }
  2530. #endif /* WOLFSSL_MULTICAST */
  2531. /* helpers to set the device id, WOLFSSL_SUCCESS on ok */
  2532. WOLFSSL_ABI
  2533. int wolfSSL_SetDevId(WOLFSSL* ssl, int devId)
  2534. {
  2535. if (ssl == NULL)
  2536. return BAD_FUNC_ARG;
  2537. ssl->devId = devId;
  2538. return WOLFSSL_SUCCESS;
  2539. }
  2540. WOLFSSL_ABI
  2541. int wolfSSL_CTX_SetDevId(WOLFSSL_CTX* ctx, int devId)
  2542. {
  2543. if (ctx == NULL)
  2544. return BAD_FUNC_ARG;
  2545. ctx->devId = devId;
  2546. return WOLFSSL_SUCCESS;
  2547. }
  2548. /* helpers to get device id and heap */
  2549. WOLFSSL_ABI
  2550. int wolfSSL_CTX_GetDevId(WOLFSSL_CTX* ctx, WOLFSSL* ssl)
  2551. {
  2552. int devId = INVALID_DEVID;
  2553. if (ssl != NULL)
  2554. devId = ssl->devId;
  2555. if (ctx != NULL && devId == INVALID_DEVID)
  2556. devId = ctx->devId;
  2557. return devId;
  2558. }
  2559. void* wolfSSL_CTX_GetHeap(WOLFSSL_CTX* ctx, WOLFSSL* ssl)
  2560. {
  2561. void* heap = NULL;
  2562. if (ctx != NULL)
  2563. heap = ctx->heap;
  2564. else if (ssl != NULL)
  2565. heap = ssl->heap;
  2566. return heap;
  2567. }
  2568. #ifdef HAVE_SNI
  2569. WOLFSSL_ABI
  2570. int wolfSSL_UseSNI(WOLFSSL* ssl, byte type, const void* data, word16 size)
  2571. {
  2572. if (ssl == NULL)
  2573. return BAD_FUNC_ARG;
  2574. return TLSX_UseSNI(&ssl->extensions, type, data, size, ssl->heap);
  2575. }
  2576. WOLFSSL_ABI
  2577. int wolfSSL_CTX_UseSNI(WOLFSSL_CTX* ctx, byte type, const void* data,
  2578. word16 size)
  2579. {
  2580. if (ctx == NULL)
  2581. return BAD_FUNC_ARG;
  2582. return TLSX_UseSNI(&ctx->extensions, type, data, size, ctx->heap);
  2583. }
  2584. #ifndef NO_WOLFSSL_SERVER
  2585. void wolfSSL_SNI_SetOptions(WOLFSSL* ssl, byte type, byte options)
  2586. {
  2587. if (ssl && ssl->extensions)
  2588. TLSX_SNI_SetOptions(ssl->extensions, type, options);
  2589. }
  2590. void wolfSSL_CTX_SNI_SetOptions(WOLFSSL_CTX* ctx, byte type, byte options)
  2591. {
  2592. if (ctx && ctx->extensions)
  2593. TLSX_SNI_SetOptions(ctx->extensions, type, options);
  2594. }
  2595. byte wolfSSL_SNI_Status(WOLFSSL* ssl, byte type)
  2596. {
  2597. return TLSX_SNI_Status(ssl ? ssl->extensions : NULL, type);
  2598. }
  2599. word16 wolfSSL_SNI_GetRequest(WOLFSSL* ssl, byte type, void** data)
  2600. {
  2601. if (data)
  2602. *data = NULL;
  2603. if (ssl && ssl->extensions)
  2604. return TLSX_SNI_GetRequest(ssl->extensions, type, data);
  2605. return 0;
  2606. }
  2607. int wolfSSL_SNI_GetFromBuffer(const byte* clientHello, word32 helloSz,
  2608. byte type, byte* sni, word32* inOutSz)
  2609. {
  2610. if (clientHello && helloSz > 0 && sni && inOutSz && *inOutSz > 0)
  2611. return TLSX_SNI_GetFromBuffer(clientHello, helloSz, type, sni, inOutSz);
  2612. return BAD_FUNC_ARG;
  2613. }
  2614. #endif /* NO_WOLFSSL_SERVER */
  2615. #endif /* HAVE_SNI */
  2616. #ifdef HAVE_TRUSTED_CA
  2617. int wolfSSL_UseTrustedCA(WOLFSSL* ssl, byte type,
  2618. const byte* certId, word32 certIdSz)
  2619. {
  2620. if (ssl == NULL)
  2621. return BAD_FUNC_ARG;
  2622. if (type == WOLFSSL_TRUSTED_CA_PRE_AGREED) {
  2623. if (certId != NULL || certIdSz != 0)
  2624. return BAD_FUNC_ARG;
  2625. }
  2626. else if (type == WOLFSSL_TRUSTED_CA_X509_NAME) {
  2627. if (certId == NULL || certIdSz == 0)
  2628. return BAD_FUNC_ARG;
  2629. }
  2630. #ifndef NO_SHA
  2631. else if (type == WOLFSSL_TRUSTED_CA_KEY_SHA1 ||
  2632. type == WOLFSSL_TRUSTED_CA_CERT_SHA1) {
  2633. if (certId == NULL || certIdSz != WC_SHA_DIGEST_SIZE)
  2634. return BAD_FUNC_ARG;
  2635. }
  2636. #endif
  2637. else
  2638. return BAD_FUNC_ARG;
  2639. return TLSX_UseTrustedCA(&ssl->extensions,
  2640. type, certId, certIdSz, ssl->heap);
  2641. }
  2642. #endif /* HAVE_TRUSTED_CA */
  2643. #ifdef HAVE_MAX_FRAGMENT
  2644. #ifndef NO_WOLFSSL_CLIENT
  2645. int wolfSSL_UseMaxFragment(WOLFSSL* ssl, byte mfl)
  2646. {
  2647. if (ssl == NULL)
  2648. return BAD_FUNC_ARG;
  2649. #ifdef WOLFSSL_ALLOW_MAX_FRAGMENT_ADJUST
  2650. /* The following is a non-standard way to reconfigure the max packet size
  2651. post-handshake for wolfSSL_write/wolfSSL_read */
  2652. if (ssl->options.handShakeState == HANDSHAKE_DONE) {
  2653. switch (mfl) {
  2654. case WOLFSSL_MFL_2_8 : ssl->max_fragment = 256; break;
  2655. case WOLFSSL_MFL_2_9 : ssl->max_fragment = 512; break;
  2656. case WOLFSSL_MFL_2_10: ssl->max_fragment = 1024; break;
  2657. case WOLFSSL_MFL_2_11: ssl->max_fragment = 2048; break;
  2658. case WOLFSSL_MFL_2_12: ssl->max_fragment = 4096; break;
  2659. case WOLFSSL_MFL_2_13: ssl->max_fragment = 8192; break;
  2660. default: ssl->max_fragment = MAX_RECORD_SIZE; break;
  2661. }
  2662. return WOLFSSL_SUCCESS;
  2663. }
  2664. #endif /* WOLFSSL_MAX_FRAGMENT_ADJUST */
  2665. /* This call sets the max fragment TLS extension, which gets sent to server.
  2666. The server_hello response is what sets the `ssl->max_fragment` in
  2667. TLSX_MFL_Parse */
  2668. return TLSX_UseMaxFragment(&ssl->extensions, mfl, ssl->heap);
  2669. }
  2670. int wolfSSL_CTX_UseMaxFragment(WOLFSSL_CTX* ctx, byte mfl)
  2671. {
  2672. if (ctx == NULL)
  2673. return BAD_FUNC_ARG;
  2674. return TLSX_UseMaxFragment(&ctx->extensions, mfl, ctx->heap);
  2675. }
  2676. #endif /* NO_WOLFSSL_CLIENT */
  2677. #endif /* HAVE_MAX_FRAGMENT */
  2678. #ifdef HAVE_TRUNCATED_HMAC
  2679. #ifndef NO_WOLFSSL_CLIENT
  2680. int wolfSSL_UseTruncatedHMAC(WOLFSSL* ssl)
  2681. {
  2682. if (ssl == NULL)
  2683. return BAD_FUNC_ARG;
  2684. return TLSX_UseTruncatedHMAC(&ssl->extensions, ssl->heap);
  2685. }
  2686. int wolfSSL_CTX_UseTruncatedHMAC(WOLFSSL_CTX* ctx)
  2687. {
  2688. if (ctx == NULL)
  2689. return BAD_FUNC_ARG;
  2690. return TLSX_UseTruncatedHMAC(&ctx->extensions, ctx->heap);
  2691. }
  2692. #endif /* NO_WOLFSSL_CLIENT */
  2693. #endif /* HAVE_TRUNCATED_HMAC */
  2694. #ifdef HAVE_CERTIFICATE_STATUS_REQUEST
  2695. int wolfSSL_UseOCSPStapling(WOLFSSL* ssl, byte status_type, byte options)
  2696. {
  2697. WOLFSSL_ENTER("wolfSSL_UseOCSPStapling");
  2698. if (ssl == NULL || ssl->options.side != WOLFSSL_CLIENT_END)
  2699. return BAD_FUNC_ARG;
  2700. return TLSX_UseCertificateStatusRequest(&ssl->extensions, status_type,
  2701. options, NULL, ssl->heap, ssl->devId);
  2702. }
  2703. int wolfSSL_CTX_UseOCSPStapling(WOLFSSL_CTX* ctx, byte status_type,
  2704. byte options)
  2705. {
  2706. WOLFSSL_ENTER("wolfSSL_CTX_UseOCSPStapling");
  2707. if (ctx == NULL || ctx->method->side != WOLFSSL_CLIENT_END)
  2708. return BAD_FUNC_ARG;
  2709. return TLSX_UseCertificateStatusRequest(&ctx->extensions, status_type,
  2710. options, NULL, ctx->heap, ctx->devId);
  2711. }
  2712. #endif /* HAVE_CERTIFICATE_STATUS_REQUEST */
  2713. #ifdef HAVE_CERTIFICATE_STATUS_REQUEST_V2
  2714. int wolfSSL_UseOCSPStaplingV2(WOLFSSL* ssl, byte status_type, byte options)
  2715. {
  2716. if (ssl == NULL || ssl->options.side != WOLFSSL_CLIENT_END)
  2717. return BAD_FUNC_ARG;
  2718. return TLSX_UseCertificateStatusRequestV2(&ssl->extensions, status_type,
  2719. options, ssl->heap, ssl->devId);
  2720. }
  2721. int wolfSSL_CTX_UseOCSPStaplingV2(WOLFSSL_CTX* ctx, byte status_type,
  2722. byte options)
  2723. {
  2724. if (ctx == NULL || ctx->method->side != WOLFSSL_CLIENT_END)
  2725. return BAD_FUNC_ARG;
  2726. return TLSX_UseCertificateStatusRequestV2(&ctx->extensions, status_type,
  2727. options, ctx->heap, ctx->devId);
  2728. }
  2729. #endif /* HAVE_CERTIFICATE_STATUS_REQUEST_V2 */
  2730. /* Elliptic Curves */
  2731. #if defined(HAVE_SUPPORTED_CURVES)
  2732. static int isValidCurveGroup(word16 name)
  2733. {
  2734. switch (name) {
  2735. case WOLFSSL_ECC_SECP160K1:
  2736. case WOLFSSL_ECC_SECP160R1:
  2737. case WOLFSSL_ECC_SECP160R2:
  2738. case WOLFSSL_ECC_SECP192K1:
  2739. case WOLFSSL_ECC_SECP192R1:
  2740. case WOLFSSL_ECC_SECP224K1:
  2741. case WOLFSSL_ECC_SECP224R1:
  2742. case WOLFSSL_ECC_SECP256K1:
  2743. case WOLFSSL_ECC_SECP256R1:
  2744. case WOLFSSL_ECC_SECP384R1:
  2745. case WOLFSSL_ECC_SECP521R1:
  2746. case WOLFSSL_ECC_BRAINPOOLP256R1:
  2747. case WOLFSSL_ECC_BRAINPOOLP384R1:
  2748. case WOLFSSL_ECC_BRAINPOOLP512R1:
  2749. case WOLFSSL_ECC_SM2P256V1:
  2750. case WOLFSSL_ECC_X25519:
  2751. case WOLFSSL_ECC_X448:
  2752. case WOLFSSL_FFDHE_2048:
  2753. case WOLFSSL_FFDHE_3072:
  2754. case WOLFSSL_FFDHE_4096:
  2755. case WOLFSSL_FFDHE_6144:
  2756. case WOLFSSL_FFDHE_8192:
  2757. #ifdef HAVE_PQC
  2758. case WOLFSSL_KYBER_LEVEL1:
  2759. case WOLFSSL_KYBER_LEVEL3:
  2760. case WOLFSSL_KYBER_LEVEL5:
  2761. #ifdef HAVE_LIBOQS
  2762. case WOLFSSL_P256_KYBER_LEVEL1:
  2763. case WOLFSSL_P384_KYBER_LEVEL3:
  2764. case WOLFSSL_P521_KYBER_LEVEL5:
  2765. #endif
  2766. #endif
  2767. return 1;
  2768. default:
  2769. return 0;
  2770. }
  2771. }
  2772. int wolfSSL_UseSupportedCurve(WOLFSSL* ssl, word16 name)
  2773. {
  2774. if (ssl == NULL || !isValidCurveGroup(name))
  2775. return BAD_FUNC_ARG;
  2776. ssl->options.userCurves = 1;
  2777. #if defined(NO_TLS)
  2778. return WOLFSSL_FAILURE;
  2779. #else
  2780. return TLSX_UseSupportedCurve(&ssl->extensions, name, ssl->heap);
  2781. #endif /* NO_TLS */
  2782. }
  2783. int wolfSSL_CTX_UseSupportedCurve(WOLFSSL_CTX* ctx, word16 name)
  2784. {
  2785. if (ctx == NULL || !isValidCurveGroup(name))
  2786. return BAD_FUNC_ARG;
  2787. ctx->userCurves = 1;
  2788. #if defined(NO_TLS)
  2789. return WOLFSSL_FAILURE;
  2790. #else
  2791. return TLSX_UseSupportedCurve(&ctx->extensions, name, ctx->heap);
  2792. #endif /* NO_TLS */
  2793. }
  2794. #if defined(OPENSSL_EXTRA) && defined(WOLFSSL_TLS13)
  2795. int wolfSSL_CTX_set1_groups(WOLFSSL_CTX* ctx, int* groups,
  2796. int count)
  2797. {
  2798. int i;
  2799. int _groups[WOLFSSL_MAX_GROUP_COUNT];
  2800. WOLFSSL_ENTER("wolfSSL_CTX_set1_groups");
  2801. if (count == 0) {
  2802. WOLFSSL_MSG("Group count is zero");
  2803. return WOLFSSL_FAILURE;
  2804. }
  2805. for (i = 0; i < count; i++) {
  2806. if (isValidCurveGroup((word16)groups[i])) {
  2807. _groups[i] = groups[i];
  2808. }
  2809. #ifdef HAVE_ECC
  2810. else {
  2811. /* groups may be populated with curve NIDs */
  2812. int oid = nid2oid(groups[i], oidCurveType);
  2813. int name = (int)GetCurveByOID(oid);
  2814. if (name == 0) {
  2815. WOLFSSL_MSG("Invalid group name");
  2816. return WOLFSSL_FAILURE;
  2817. }
  2818. _groups[i] = name;
  2819. }
  2820. #else
  2821. else {
  2822. WOLFSSL_MSG("Invalid group name");
  2823. return WOLFSSL_FAILURE;
  2824. }
  2825. #endif
  2826. }
  2827. return wolfSSL_CTX_set_groups(ctx, _groups, count) == WOLFSSL_SUCCESS ?
  2828. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  2829. }
  2830. int wolfSSL_set1_groups(WOLFSSL* ssl, int* groups, int count)
  2831. {
  2832. int i;
  2833. int _groups[WOLFSSL_MAX_GROUP_COUNT];
  2834. WOLFSSL_ENTER("wolfSSL_CTX_set1_groups");
  2835. if (count == 0) {
  2836. WOLFSSL_MSG("Group count is zero");
  2837. return WOLFSSL_FAILURE;
  2838. }
  2839. for (i = 0; i < count; i++) {
  2840. if (isValidCurveGroup((word16)groups[i])) {
  2841. _groups[i] = groups[i];
  2842. }
  2843. #ifdef HAVE_ECC
  2844. else {
  2845. /* groups may be populated with curve NIDs */
  2846. int oid = nid2oid(groups[i], oidCurveType);
  2847. int name = (int)GetCurveByOID(oid);
  2848. if (name == 0) {
  2849. WOLFSSL_MSG("Invalid group name");
  2850. return WOLFSSL_FAILURE;
  2851. }
  2852. _groups[i] = name;
  2853. }
  2854. #else
  2855. else {
  2856. WOLFSSL_MSG("Invalid group name");
  2857. return WOLFSSL_FAILURE;
  2858. }
  2859. #endif
  2860. }
  2861. return wolfSSL_set_groups(ssl, _groups, count) == WOLFSSL_SUCCESS ?
  2862. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  2863. }
  2864. #endif /* OPENSSL_EXTRA && WOLFSSL_TLS13 */
  2865. #endif /* HAVE_SUPPORTED_CURVES */
  2866. /* Application-Layer Protocol Negotiation */
  2867. #ifdef HAVE_ALPN
  2868. WOLFSSL_ABI
  2869. int wolfSSL_UseALPN(WOLFSSL* ssl, char *protocol_name_list,
  2870. word32 protocol_name_listSz, byte options)
  2871. {
  2872. char *list, *ptr, **token;
  2873. word16 len;
  2874. int idx = 0;
  2875. int ret = WOLFSSL_FAILURE;
  2876. WOLFSSL_ENTER("wolfSSL_UseALPN");
  2877. if (ssl == NULL || protocol_name_list == NULL)
  2878. return BAD_FUNC_ARG;
  2879. if (protocol_name_listSz > (WOLFSSL_MAX_ALPN_NUMBER *
  2880. WOLFSSL_MAX_ALPN_PROTO_NAME_LEN +
  2881. WOLFSSL_MAX_ALPN_NUMBER)) {
  2882. WOLFSSL_MSG("Invalid arguments, protocol name list too long");
  2883. return BAD_FUNC_ARG;
  2884. }
  2885. if (!(options & WOLFSSL_ALPN_CONTINUE_ON_MISMATCH) &&
  2886. !(options & WOLFSSL_ALPN_FAILED_ON_MISMATCH)) {
  2887. WOLFSSL_MSG("Invalid arguments, options not supported");
  2888. return BAD_FUNC_ARG;
  2889. }
  2890. list = (char *)XMALLOC(protocol_name_listSz+1, ssl->heap,
  2891. DYNAMIC_TYPE_ALPN);
  2892. if (list == NULL) {
  2893. WOLFSSL_MSG("Memory failure");
  2894. return MEMORY_ERROR;
  2895. }
  2896. token = (char **)XMALLOC(sizeof(char *) * (WOLFSSL_MAX_ALPN_NUMBER+1),
  2897. ssl->heap, DYNAMIC_TYPE_ALPN);
  2898. if (token == NULL) {
  2899. XFREE(list, ssl->heap, DYNAMIC_TYPE_ALPN);
  2900. WOLFSSL_MSG("Memory failure");
  2901. return MEMORY_ERROR;
  2902. }
  2903. XMEMSET(token, 0, sizeof(char *) * (WOLFSSL_MAX_ALPN_NUMBER+1));
  2904. XSTRNCPY(list, protocol_name_list, protocol_name_listSz);
  2905. list[protocol_name_listSz] = '\0';
  2906. /* read all protocol name from the list */
  2907. token[idx] = XSTRTOK(list, ",", &ptr);
  2908. while (idx < WOLFSSL_MAX_ALPN_NUMBER && token[idx] != NULL)
  2909. token[++idx] = XSTRTOK(NULL, ",", &ptr);
  2910. /* add protocol name list in the TLS extension in reverse order */
  2911. while ((idx--) > 0) {
  2912. len = (word16)XSTRLEN(token[idx]);
  2913. ret = TLSX_UseALPN(&ssl->extensions, token[idx], len, options,
  2914. ssl->heap);
  2915. if (ret != WOLFSSL_SUCCESS) {
  2916. WOLFSSL_MSG("TLSX_UseALPN failure");
  2917. break;
  2918. }
  2919. }
  2920. XFREE(token, ssl->heap, DYNAMIC_TYPE_ALPN);
  2921. XFREE(list, ssl->heap, DYNAMIC_TYPE_ALPN);
  2922. return ret;
  2923. }
  2924. int wolfSSL_ALPN_GetProtocol(WOLFSSL* ssl, char **protocol_name, word16 *size)
  2925. {
  2926. return TLSX_ALPN_GetRequest(ssl ? ssl->extensions : NULL,
  2927. (void **)protocol_name, size);
  2928. }
  2929. int wolfSSL_ALPN_GetPeerProtocol(WOLFSSL* ssl, char **list, word16 *listSz)
  2930. {
  2931. int i, len;
  2932. char *p;
  2933. byte *s;
  2934. if (ssl == NULL || list == NULL || listSz == NULL)
  2935. return BAD_FUNC_ARG;
  2936. if (ssl->alpn_peer_requested == NULL
  2937. || ssl->alpn_peer_requested_length == 0)
  2938. return BUFFER_ERROR;
  2939. /* ssl->alpn_peer_requested are the original bytes sent in a ClientHello,
  2940. * formatted as (len-byte chars+)+. To turn n protocols into a
  2941. * comma-separated C string, one needs (n-1) commas and a final 0 byte
  2942. * which has the same length as the original.
  2943. * The returned length is the strlen() of the C string, so -1 of that. */
  2944. *listSz = ssl->alpn_peer_requested_length-1;
  2945. *list = p = (char *)XMALLOC(ssl->alpn_peer_requested_length, ssl->heap,
  2946. DYNAMIC_TYPE_TLSX);
  2947. if (p == NULL)
  2948. return MEMORY_ERROR;
  2949. for (i = 0, s = ssl->alpn_peer_requested;
  2950. i < ssl->alpn_peer_requested_length;
  2951. p += len, i += len)
  2952. {
  2953. if (i)
  2954. *p++ = ',';
  2955. len = s[i++];
  2956. /* guard against bad length bytes. */
  2957. if (i + len > ssl->alpn_peer_requested_length) {
  2958. XFREE(*list, ssl->heap, DYNAMIC_TYPE_TLSX);
  2959. *list = NULL;
  2960. return WOLFSSL_FAILURE;
  2961. }
  2962. XMEMCPY(p, s + i, len);
  2963. }
  2964. *p = 0;
  2965. return WOLFSSL_SUCCESS;
  2966. }
  2967. /* used to free memory allocated by wolfSSL_ALPN_GetPeerProtocol */
  2968. int wolfSSL_ALPN_FreePeerProtocol(WOLFSSL* ssl, char **list)
  2969. {
  2970. if (ssl == NULL) {
  2971. return BAD_FUNC_ARG;
  2972. }
  2973. XFREE(*list, ssl->heap, DYNAMIC_TYPE_TLSX);
  2974. *list = NULL;
  2975. return WOLFSSL_SUCCESS;
  2976. }
  2977. #endif /* HAVE_ALPN */
  2978. /* Secure Renegotiation */
  2979. #ifdef HAVE_SERVER_RENEGOTIATION_INFO
  2980. /* user is forcing ability to use secure renegotiation, we discourage it */
  2981. int wolfSSL_UseSecureRenegotiation(WOLFSSL* ssl)
  2982. {
  2983. int ret = BAD_FUNC_ARG;
  2984. #if defined(NO_TLS)
  2985. (void)ssl;
  2986. #else
  2987. if (ssl)
  2988. ret = TLSX_UseSecureRenegotiation(&ssl->extensions, ssl->heap);
  2989. if (ret == WOLFSSL_SUCCESS) {
  2990. TLSX* extension = TLSX_Find(ssl->extensions, TLSX_RENEGOTIATION_INFO);
  2991. if (extension)
  2992. ssl->secure_renegotiation = (SecureRenegotiation*)extension->data;
  2993. }
  2994. #endif /* !NO_TLS */
  2995. return ret;
  2996. }
  2997. int wolfSSL_CTX_UseSecureRenegotiation(WOLFSSL_CTX* ctx)
  2998. {
  2999. if (ctx == NULL)
  3000. return BAD_FUNC_ARG;
  3001. ctx->useSecureReneg = 1;
  3002. return WOLFSSL_SUCCESS;
  3003. }
  3004. #ifdef HAVE_SECURE_RENEGOTIATION
  3005. /* do a secure renegotiation handshake, user forced, we discourage */
  3006. static int _Rehandshake(WOLFSSL* ssl)
  3007. {
  3008. int ret;
  3009. if (ssl == NULL)
  3010. return BAD_FUNC_ARG;
  3011. if (IsAtLeastTLSv1_3(ssl->version)) {
  3012. WOLFSSL_MSG("Secure Renegotiation not supported in TLS 1.3");
  3013. return SECURE_RENEGOTIATION_E;
  3014. }
  3015. if (ssl->secure_renegotiation == NULL) {
  3016. WOLFSSL_MSG("Secure Renegotiation not forced on by user");
  3017. return SECURE_RENEGOTIATION_E;
  3018. }
  3019. if (ssl->secure_renegotiation->enabled == 0) {
  3020. WOLFSSL_MSG("Secure Renegotiation not enabled at extension level");
  3021. return SECURE_RENEGOTIATION_E;
  3022. }
  3023. #ifdef WOLFSSL_DTLS
  3024. if (ssl->options.dtls && ssl->keys.dtls_epoch == 0xFFFF) {
  3025. WOLFSSL_MSG("Secure Renegotiation not allowed. Epoch would wrap");
  3026. return SECURE_RENEGOTIATION_E;
  3027. }
  3028. #endif
  3029. /* If the client started the renegotiation, the server will already
  3030. * have processed the client's hello. */
  3031. if (ssl->options.side != WOLFSSL_SERVER_END ||
  3032. ssl->options.acceptState != ACCEPT_FIRST_REPLY_DONE) {
  3033. if (ssl->options.handShakeState != HANDSHAKE_DONE) {
  3034. if (!ssl->options.handShakeDone) {
  3035. WOLFSSL_MSG("Can't renegotiate until initial "
  3036. "handshake complete");
  3037. return SECURE_RENEGOTIATION_E;
  3038. }
  3039. else {
  3040. WOLFSSL_MSG("Renegotiation already started. "
  3041. "Moving it forward.");
  3042. ret = wolfSSL_negotiate(ssl);
  3043. if (ret == WOLFSSL_SUCCESS)
  3044. ssl->secure_rene_count++;
  3045. return ret;
  3046. }
  3047. }
  3048. /* reset handshake states */
  3049. ssl->options.sendVerify = 0;
  3050. ssl->options.serverState = NULL_STATE;
  3051. ssl->options.clientState = NULL_STATE;
  3052. ssl->options.connectState = CONNECT_BEGIN;
  3053. ssl->options.acceptState = ACCEPT_BEGIN_RENEG;
  3054. ssl->options.handShakeState = NULL_STATE;
  3055. ssl->options.processReply = 0; /* TODO, move states in internal.h */
  3056. XMEMSET(&ssl->msgsReceived, 0, sizeof(ssl->msgsReceived));
  3057. ssl->secure_renegotiation->cache_status = SCR_CACHE_NEEDED;
  3058. #if !defined(NO_WOLFSSL_SERVER)
  3059. if (ssl->options.side == WOLFSSL_SERVER_END) {
  3060. ret = SendHelloRequest(ssl);
  3061. if (ret != 0) {
  3062. ssl->error = ret;
  3063. return WOLFSSL_FATAL_ERROR;
  3064. }
  3065. }
  3066. #endif /* !NO_WOLFSSL_SERVER */
  3067. ret = InitHandshakeHashes(ssl);
  3068. if (ret != 0) {
  3069. ssl->error = ret;
  3070. return WOLFSSL_FATAL_ERROR;
  3071. }
  3072. }
  3073. ret = wolfSSL_negotiate(ssl);
  3074. if (ret == WOLFSSL_SUCCESS)
  3075. ssl->secure_rene_count++;
  3076. return ret;
  3077. }
  3078. /* do a secure renegotiation handshake, user forced, we discourage */
  3079. int wolfSSL_Rehandshake(WOLFSSL* ssl)
  3080. {
  3081. int ret;
  3082. WOLFSSL_ENTER("wolfSSL_Rehandshake");
  3083. if (ssl == NULL)
  3084. return WOLFSSL_FAILURE;
  3085. #ifdef HAVE_SESSION_TICKET
  3086. ret = WOLFSSL_SUCCESS;
  3087. #endif
  3088. if (ssl->options.side == WOLFSSL_SERVER_END) {
  3089. /* Reset option to send certificate verify. */
  3090. ssl->options.sendVerify = 0;
  3091. /* Reset resuming flag to do full secure handshake. */
  3092. ssl->options.resuming = 0;
  3093. }
  3094. else {
  3095. /* Reset resuming flag to do full secure handshake. */
  3096. ssl->options.resuming = 0;
  3097. #if defined(HAVE_SESSION_TICKET) && !defined(NO_WOLFSSL_CLIENT)
  3098. /* Clearing the ticket. */
  3099. ret = wolfSSL_UseSessionTicket(ssl);
  3100. #endif
  3101. }
  3102. /* CLIENT/SERVER: Reset peer authentication for full secure handshake. */
  3103. ssl->options.peerAuthGood = 0;
  3104. #ifdef HAVE_SESSION_TICKET
  3105. if (ret == WOLFSSL_SUCCESS)
  3106. #endif
  3107. ret = _Rehandshake(ssl);
  3108. return ret;
  3109. }
  3110. #ifndef NO_WOLFSSL_CLIENT
  3111. /* do a secure resumption handshake, user forced, we discourage */
  3112. int wolfSSL_SecureResume(WOLFSSL* ssl)
  3113. {
  3114. WOLFSSL_ENTER("wolfSSL_SecureResume");
  3115. if (ssl == NULL)
  3116. return BAD_FUNC_ARG;
  3117. if (ssl->options.side == WOLFSSL_SERVER_END) {
  3118. ssl->error = SIDE_ERROR;
  3119. return WOLFSSL_FATAL_ERROR;
  3120. }
  3121. return _Rehandshake(ssl);
  3122. }
  3123. #endif /* NO_WOLFSSL_CLIENT */
  3124. #endif /* HAVE_SECURE_RENEGOTIATION */
  3125. long wolfSSL_SSL_get_secure_renegotiation_support(WOLFSSL* ssl)
  3126. {
  3127. WOLFSSL_ENTER("wolfSSL_SSL_get_secure_renegotiation_support");
  3128. if (!ssl || !ssl->secure_renegotiation)
  3129. return WOLFSSL_FAILURE;
  3130. return ssl->secure_renegotiation->enabled;
  3131. }
  3132. #endif /* HAVE_SECURE_RENEGOTIATION_INFO */
  3133. #if defined(HAVE_SESSION_TICKET)
  3134. /* Session Ticket */
  3135. #if !defined(NO_WOLFSSL_SERVER)
  3136. int wolfSSL_CTX_NoTicketTLSv12(WOLFSSL_CTX* ctx)
  3137. {
  3138. if (ctx == NULL)
  3139. return BAD_FUNC_ARG;
  3140. ctx->noTicketTls12 = 1;
  3141. return WOLFSSL_SUCCESS;
  3142. }
  3143. int wolfSSL_NoTicketTLSv12(WOLFSSL* ssl)
  3144. {
  3145. if (ssl == NULL)
  3146. return BAD_FUNC_ARG;
  3147. ssl->options.noTicketTls12 = 1;
  3148. return WOLFSSL_SUCCESS;
  3149. }
  3150. /* WOLFSSL_SUCCESS on ok */
  3151. int wolfSSL_CTX_set_TicketEncCb(WOLFSSL_CTX* ctx, SessionTicketEncCb cb)
  3152. {
  3153. if (ctx == NULL)
  3154. return BAD_FUNC_ARG;
  3155. ctx->ticketEncCb = cb;
  3156. return WOLFSSL_SUCCESS;
  3157. }
  3158. /* set hint interval, WOLFSSL_SUCCESS on ok */
  3159. int wolfSSL_CTX_set_TicketHint(WOLFSSL_CTX* ctx, int hint)
  3160. {
  3161. if (ctx == NULL)
  3162. return BAD_FUNC_ARG;
  3163. ctx->ticketHint = hint;
  3164. return WOLFSSL_SUCCESS;
  3165. }
  3166. /* set user context, WOLFSSL_SUCCESS on ok */
  3167. int wolfSSL_CTX_set_TicketEncCtx(WOLFSSL_CTX* ctx, void* userCtx)
  3168. {
  3169. if (ctx == NULL)
  3170. return BAD_FUNC_ARG;
  3171. ctx->ticketEncCtx = userCtx;
  3172. return WOLFSSL_SUCCESS;
  3173. }
  3174. /* get user context - returns userCtx on success, NULL on failure */
  3175. void* wolfSSL_CTX_get_TicketEncCtx(WOLFSSL_CTX* ctx)
  3176. {
  3177. if (ctx == NULL)
  3178. return NULL;
  3179. return ctx->ticketEncCtx;
  3180. }
  3181. #ifdef WOLFSSL_TLS13
  3182. /* set the maximum number of tickets to send
  3183. * return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
  3184. */
  3185. int wolfSSL_CTX_set_num_tickets(WOLFSSL_CTX* ctx, size_t mxTickets)
  3186. {
  3187. if (ctx == NULL)
  3188. return WOLFSSL_FAILURE;
  3189. ctx->maxTicketTls13 = (unsigned int)mxTickets;
  3190. return WOLFSSL_SUCCESS;
  3191. }
  3192. /* get the maximum number of tickets to send
  3193. * return number of tickets set to be sent
  3194. */
  3195. size_t wolfSSL_CTX_get_num_tickets(WOLFSSL_CTX* ctx)
  3196. {
  3197. if (ctx == NULL)
  3198. return 0;
  3199. return (size_t)ctx->maxTicketTls13;
  3200. }
  3201. #endif /* WOLFSSL_TLS13 */
  3202. #endif /* !NO_WOLFSSL_SERVER */
  3203. #if !defined(NO_WOLFSSL_CLIENT)
  3204. int wolfSSL_UseSessionTicket(WOLFSSL* ssl)
  3205. {
  3206. if (ssl == NULL)
  3207. return BAD_FUNC_ARG;
  3208. return TLSX_UseSessionTicket(&ssl->extensions, NULL, ssl->heap);
  3209. }
  3210. int wolfSSL_CTX_UseSessionTicket(WOLFSSL_CTX* ctx)
  3211. {
  3212. if (ctx == NULL)
  3213. return BAD_FUNC_ARG;
  3214. return TLSX_UseSessionTicket(&ctx->extensions, NULL, ctx->heap);
  3215. }
  3216. int wolfSSL_get_SessionTicket(WOLFSSL* ssl, byte* buf, word32* bufSz)
  3217. {
  3218. if (ssl == NULL || buf == NULL || bufSz == NULL || *bufSz == 0)
  3219. return BAD_FUNC_ARG;
  3220. if (ssl->session->ticketLen <= *bufSz) {
  3221. XMEMCPY(buf, ssl->session->ticket, ssl->session->ticketLen);
  3222. *bufSz = ssl->session->ticketLen;
  3223. }
  3224. else
  3225. *bufSz = 0;
  3226. return WOLFSSL_SUCCESS;
  3227. }
  3228. int wolfSSL_set_SessionTicket(WOLFSSL* ssl, const byte* buf,
  3229. word32 bufSz)
  3230. {
  3231. if (ssl == NULL || (buf == NULL && bufSz > 0))
  3232. return BAD_FUNC_ARG;
  3233. if (bufSz > 0) {
  3234. /* Ticket will fit into static ticket */
  3235. if (bufSz <= SESSION_TICKET_LEN) {
  3236. if (ssl->session->ticketLenAlloc > 0) {
  3237. XFREE(ssl->session->ticket, ssl->session->heap,
  3238. DYNAMIC_TYPE_SESSION_TICK);
  3239. ssl->session->ticketLenAlloc = 0;
  3240. ssl->session->ticket = ssl->session->staticTicket;
  3241. }
  3242. }
  3243. else { /* Ticket requires dynamic ticket storage */
  3244. /* is dyn buffer big enough */
  3245. if (ssl->session->ticketLen < bufSz) {
  3246. if (ssl->session->ticketLenAlloc > 0) {
  3247. XFREE(ssl->session->ticket, ssl->session->heap,
  3248. DYNAMIC_TYPE_SESSION_TICK);
  3249. }
  3250. ssl->session->ticket = (byte*)XMALLOC(bufSz, ssl->session->heap,
  3251. DYNAMIC_TYPE_SESSION_TICK);
  3252. if(ssl->session->ticket == NULL) {
  3253. ssl->session->ticket = ssl->session->staticTicket;
  3254. ssl->session->ticketLenAlloc = 0;
  3255. return MEMORY_ERROR;
  3256. }
  3257. ssl->session->ticketLenAlloc = (word16)bufSz;
  3258. }
  3259. }
  3260. XMEMCPY(ssl->session->ticket, buf, bufSz);
  3261. }
  3262. ssl->session->ticketLen = (word16)bufSz;
  3263. return WOLFSSL_SUCCESS;
  3264. }
  3265. int wolfSSL_set_SessionTicket_cb(WOLFSSL* ssl,
  3266. CallbackSessionTicket cb, void* ctx)
  3267. {
  3268. if (ssl == NULL)
  3269. return BAD_FUNC_ARG;
  3270. ssl->session_ticket_cb = cb;
  3271. ssl->session_ticket_ctx = ctx;
  3272. return WOLFSSL_SUCCESS;
  3273. }
  3274. #endif /* !NO_WOLFSSL_CLIENT */
  3275. #endif /* HAVE_SESSION_TICKET */
  3276. #ifdef HAVE_EXTENDED_MASTER
  3277. #ifndef NO_WOLFSSL_CLIENT
  3278. int wolfSSL_CTX_DisableExtendedMasterSecret(WOLFSSL_CTX* ctx)
  3279. {
  3280. if (ctx == NULL)
  3281. return BAD_FUNC_ARG;
  3282. ctx->haveEMS = 0;
  3283. return WOLFSSL_SUCCESS;
  3284. }
  3285. int wolfSSL_DisableExtendedMasterSecret(WOLFSSL* ssl)
  3286. {
  3287. if (ssl == NULL)
  3288. return BAD_FUNC_ARG;
  3289. ssl->options.haveEMS = 0;
  3290. return WOLFSSL_SUCCESS;
  3291. }
  3292. #endif
  3293. #endif
  3294. #ifndef WOLFSSL_LEANPSK
  3295. int wolfSSL_send(WOLFSSL* ssl, const void* data, int sz, int flags)
  3296. {
  3297. int ret;
  3298. int oldFlags;
  3299. WOLFSSL_ENTER("wolfSSL_send");
  3300. if (ssl == NULL || data == NULL || sz < 0)
  3301. return BAD_FUNC_ARG;
  3302. oldFlags = ssl->wflags;
  3303. ssl->wflags = flags;
  3304. ret = wolfSSL_write(ssl, data, sz);
  3305. ssl->wflags = oldFlags;
  3306. WOLFSSL_LEAVE("wolfSSL_send", ret);
  3307. return ret;
  3308. }
  3309. int wolfSSL_recv(WOLFSSL* ssl, void* data, int sz, int flags)
  3310. {
  3311. int ret;
  3312. int oldFlags;
  3313. WOLFSSL_ENTER("wolfSSL_recv");
  3314. if (ssl == NULL || data == NULL || sz < 0)
  3315. return BAD_FUNC_ARG;
  3316. oldFlags = ssl->rflags;
  3317. ssl->rflags = flags;
  3318. ret = wolfSSL_read(ssl, data, sz);
  3319. ssl->rflags = oldFlags;
  3320. WOLFSSL_LEAVE("wolfSSL_recv", ret);
  3321. return ret;
  3322. }
  3323. #endif
  3324. /* WOLFSSL_SUCCESS on ok */
  3325. WOLFSSL_ABI
  3326. int wolfSSL_shutdown(WOLFSSL* ssl)
  3327. {
  3328. int ret = WOLFSSL_FATAL_ERROR;
  3329. WOLFSSL_ENTER("wolfSSL_shutdown");
  3330. if (ssl == NULL)
  3331. return WOLFSSL_FATAL_ERROR;
  3332. if (ssl->options.quietShutdown) {
  3333. WOLFSSL_MSG("quiet shutdown, no close notify sent");
  3334. ret = WOLFSSL_SUCCESS;
  3335. }
  3336. else {
  3337. /* try to send close notify, not an error if can't */
  3338. if (!ssl->options.isClosed && !ssl->options.connReset &&
  3339. !ssl->options.sentNotify) {
  3340. ssl->error = SendAlert(ssl, alert_warning, close_notify);
  3341. if (ssl->error < 0) {
  3342. WOLFSSL_ERROR(ssl->error);
  3343. return WOLFSSL_FATAL_ERROR;
  3344. }
  3345. ssl->options.sentNotify = 1; /* don't send close_notify twice */
  3346. if (ssl->options.closeNotify) {
  3347. ret = WOLFSSL_SUCCESS;
  3348. ssl->options.shutdownDone = 1;
  3349. }
  3350. else {
  3351. ret = WOLFSSL_SHUTDOWN_NOT_DONE;
  3352. WOLFSSL_LEAVE("wolfSSL_shutdown", ret);
  3353. return ret;
  3354. }
  3355. }
  3356. #ifdef WOLFSSL_SHUTDOWNONCE
  3357. if (ssl->options.isClosed || ssl->options.connReset) {
  3358. /* Shutdown has already occurred.
  3359. * Caller is free to ignore this error. */
  3360. return SSL_SHUTDOWN_ALREADY_DONE_E;
  3361. }
  3362. #endif
  3363. /* call wolfSSL_shutdown again for bidirectional shutdown */
  3364. if (ssl->options.sentNotify && !ssl->options.closeNotify) {
  3365. ret = ProcessReply(ssl);
  3366. if ((ret == ZERO_RETURN) || (ret == SOCKET_ERROR_E)) {
  3367. /* simulate OpenSSL behavior */
  3368. ssl->options.shutdownDone = 1;
  3369. /* Clear error */
  3370. ssl->error = WOLFSSL_ERROR_NONE;
  3371. ret = WOLFSSL_SUCCESS;
  3372. } else if (ret == MEMORY_E) {
  3373. ret = WOLFSSL_FATAL_ERROR;
  3374. } else if (ssl->error == WOLFSSL_ERROR_NONE) {
  3375. ret = WOLFSSL_SHUTDOWN_NOT_DONE;
  3376. } else {
  3377. WOLFSSL_ERROR(ssl->error);
  3378. ret = WOLFSSL_FATAL_ERROR;
  3379. }
  3380. }
  3381. }
  3382. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3383. /* reset WOLFSSL structure state for possible reuse */
  3384. if (ret == WOLFSSL_SUCCESS) {
  3385. if (wolfSSL_clear(ssl) != WOLFSSL_SUCCESS) {
  3386. WOLFSSL_MSG("could not clear WOLFSSL");
  3387. ret = WOLFSSL_FATAL_ERROR;
  3388. }
  3389. }
  3390. #endif
  3391. WOLFSSL_LEAVE("wolfSSL_shutdown", ret);
  3392. return ret;
  3393. }
  3394. /* get current error state value */
  3395. int wolfSSL_state(WOLFSSL* ssl)
  3396. {
  3397. if (ssl == NULL) {
  3398. return BAD_FUNC_ARG;
  3399. }
  3400. return ssl->error;
  3401. }
  3402. WOLFSSL_ABI
  3403. int wolfSSL_get_error(WOLFSSL* ssl, int ret)
  3404. {
  3405. WOLFSSL_ENTER("wolfSSL_get_error");
  3406. if (ret > 0)
  3407. return WOLFSSL_ERROR_NONE;
  3408. if (ssl == NULL)
  3409. return BAD_FUNC_ARG;
  3410. WOLFSSL_LEAVE("wolfSSL_get_error", ssl->error);
  3411. /* make sure converted types are handled in SetErrorString() too */
  3412. if (ssl->error == WANT_READ)
  3413. return WOLFSSL_ERROR_WANT_READ; /* convert to OpenSSL type */
  3414. else if (ssl->error == WANT_WRITE)
  3415. return WOLFSSL_ERROR_WANT_WRITE; /* convert to OpenSSL type */
  3416. else if (ssl->error == ZERO_RETURN || ssl->options.shutdownDone)
  3417. return WOLFSSL_ERROR_ZERO_RETURN; /* convert to OpenSSL type */
  3418. #ifdef OPENSSL_EXTRA
  3419. else if (ssl->error == SOCKET_PEER_CLOSED_E)
  3420. return WOLFSSL_ERROR_SYSCALL; /* convert to OpenSSL type */
  3421. #endif
  3422. #if defined(WOLFSSL_HAPROXY)
  3423. return GetX509Error(ssl->error);
  3424. #else
  3425. return (ssl->error);
  3426. #endif
  3427. }
  3428. /* retrieve alert history, WOLFSSL_SUCCESS on ok */
  3429. int wolfSSL_get_alert_history(WOLFSSL* ssl, WOLFSSL_ALERT_HISTORY *h)
  3430. {
  3431. if (ssl && h) {
  3432. *h = ssl->alert_history;
  3433. }
  3434. return WOLFSSL_SUCCESS;
  3435. }
  3436. #ifdef OPENSSL_EXTRA
  3437. /* returns SSL_WRITING, SSL_READING or SSL_NOTHING */
  3438. int wolfSSL_want(WOLFSSL* ssl)
  3439. {
  3440. int rw_state = SSL_NOTHING;
  3441. if (ssl) {
  3442. if (ssl->error == WANT_READ)
  3443. rw_state = SSL_READING;
  3444. else if (ssl->error == WANT_WRITE)
  3445. rw_state = SSL_WRITING;
  3446. }
  3447. return rw_state;
  3448. }
  3449. #endif
  3450. /* return TRUE if current error is want read */
  3451. int wolfSSL_want_read(WOLFSSL* ssl)
  3452. {
  3453. WOLFSSL_ENTER("wolfSSL_want_read");
  3454. if (ssl->error == WANT_READ)
  3455. return 1;
  3456. return 0;
  3457. }
  3458. /* return TRUE if current error is want write */
  3459. int wolfSSL_want_write(WOLFSSL* ssl)
  3460. {
  3461. WOLFSSL_ENTER("wolfSSL_want_write");
  3462. if (ssl->error == WANT_WRITE)
  3463. return 1;
  3464. return 0;
  3465. }
  3466. char* wolfSSL_ERR_error_string(unsigned long errNumber, char* data)
  3467. {
  3468. WOLFSSL_ENTER("wolfSSL_ERR_error_string");
  3469. if (data) {
  3470. SetErrorString((int)errNumber, data);
  3471. return data;
  3472. }
  3473. else {
  3474. static char tmp[WOLFSSL_MAX_ERROR_SZ] = {0};
  3475. SetErrorString((int)errNumber, tmp);
  3476. return tmp;
  3477. }
  3478. }
  3479. void wolfSSL_ERR_error_string_n(unsigned long e, char* buf, unsigned long len)
  3480. {
  3481. WOLFSSL_ENTER("wolfSSL_ERR_error_string_n");
  3482. if (len >= WOLFSSL_MAX_ERROR_SZ)
  3483. wolfSSL_ERR_error_string(e, buf);
  3484. else {
  3485. WOLFSSL_MSG("Error buffer too short, truncating");
  3486. if (len) {
  3487. char tmp[WOLFSSL_MAX_ERROR_SZ];
  3488. wolfSSL_ERR_error_string(e, tmp);
  3489. XMEMCPY(buf, tmp, len-1);
  3490. buf[len-1] = '\0';
  3491. }
  3492. }
  3493. }
  3494. /* don't free temporary arrays at end of handshake */
  3495. void wolfSSL_KeepArrays(WOLFSSL* ssl)
  3496. {
  3497. if (ssl)
  3498. ssl->options.saveArrays = 1;
  3499. }
  3500. /* user doesn't need temporary arrays anymore, Free */
  3501. void wolfSSL_FreeArrays(WOLFSSL* ssl)
  3502. {
  3503. if (ssl && ssl->options.handShakeState == HANDSHAKE_DONE) {
  3504. ssl->options.saveArrays = 0;
  3505. FreeArrays(ssl, 1);
  3506. }
  3507. }
  3508. /* Set option to indicate that the resources are not to be freed after
  3509. * handshake.
  3510. *
  3511. * ssl The SSL/TLS object.
  3512. * returns BAD_FUNC_ARG when ssl is NULL and 0 on success.
  3513. */
  3514. int wolfSSL_KeepHandshakeResources(WOLFSSL* ssl)
  3515. {
  3516. if (ssl == NULL)
  3517. return BAD_FUNC_ARG;
  3518. ssl->options.keepResources = 1;
  3519. return 0;
  3520. }
  3521. /* Free the handshake resources after handshake.
  3522. *
  3523. * ssl The SSL/TLS object.
  3524. * returns BAD_FUNC_ARG when ssl is NULL and 0 on success.
  3525. */
  3526. int wolfSSL_FreeHandshakeResources(WOLFSSL* ssl)
  3527. {
  3528. if (ssl == NULL)
  3529. return BAD_FUNC_ARG;
  3530. FreeHandshakeResources(ssl);
  3531. return 0;
  3532. }
  3533. /* Use the client's order of preference when matching cipher suites.
  3534. *
  3535. * ssl The SSL/TLS context object.
  3536. * returns BAD_FUNC_ARG when ssl is NULL and 0 on success.
  3537. */
  3538. int wolfSSL_CTX_UseClientSuites(WOLFSSL_CTX* ctx)
  3539. {
  3540. if (ctx == NULL)
  3541. return BAD_FUNC_ARG;
  3542. ctx->useClientOrder = 1;
  3543. return 0;
  3544. }
  3545. /* Use the client's order of preference when matching cipher suites.
  3546. *
  3547. * ssl The SSL/TLS object.
  3548. * returns BAD_FUNC_ARG when ssl is NULL and 0 on success.
  3549. */
  3550. int wolfSSL_UseClientSuites(WOLFSSL* ssl)
  3551. {
  3552. if (ssl == NULL)
  3553. return BAD_FUNC_ARG;
  3554. ssl->options.useClientOrder = 1;
  3555. return 0;
  3556. }
  3557. #ifdef WOLFSSL_DTLS
  3558. const byte* wolfSSL_GetDtlsMacSecret(WOLFSSL* ssl, int verify, int epochOrder)
  3559. {
  3560. #ifndef WOLFSSL_AEAD_ONLY
  3561. Keys* keys = NULL;
  3562. (void)epochOrder;
  3563. if (ssl == NULL)
  3564. return NULL;
  3565. #ifdef HAVE_SECURE_RENEGOTIATION
  3566. switch (epochOrder) {
  3567. case PEER_ORDER:
  3568. if (IsDtlsMsgSCRKeys(ssl))
  3569. keys = &ssl->secure_renegotiation->tmp_keys;
  3570. else
  3571. keys = &ssl->keys;
  3572. break;
  3573. case PREV_ORDER:
  3574. keys = &ssl->keys;
  3575. break;
  3576. case CUR_ORDER:
  3577. if (DtlsUseSCRKeys(ssl))
  3578. keys = &ssl->secure_renegotiation->tmp_keys;
  3579. else
  3580. keys = &ssl->keys;
  3581. break;
  3582. default:
  3583. WOLFSSL_MSG("Unknown epoch order");
  3584. return NULL;
  3585. }
  3586. #else
  3587. keys = &ssl->keys;
  3588. #endif
  3589. if ( (ssl->options.side == WOLFSSL_CLIENT_END && !verify) ||
  3590. (ssl->options.side == WOLFSSL_SERVER_END && verify) )
  3591. return keys->client_write_MAC_secret;
  3592. else
  3593. return keys->server_write_MAC_secret;
  3594. #else
  3595. (void)ssl;
  3596. (void)verify;
  3597. (void)epochOrder;
  3598. return NULL;
  3599. #endif
  3600. }
  3601. #endif /* WOLFSSL_DTLS */
  3602. const byte* wolfSSL_GetMacSecret(WOLFSSL* ssl, int verify)
  3603. {
  3604. #ifndef WOLFSSL_AEAD_ONLY
  3605. if (ssl == NULL)
  3606. return NULL;
  3607. if ( (ssl->options.side == WOLFSSL_CLIENT_END && !verify) ||
  3608. (ssl->options.side == WOLFSSL_SERVER_END && verify) )
  3609. return ssl->keys.client_write_MAC_secret;
  3610. else
  3611. return ssl->keys.server_write_MAC_secret;
  3612. #else
  3613. (void)ssl;
  3614. (void)verify;
  3615. return NULL;
  3616. #endif
  3617. }
  3618. int wolfSSL_GetSide(WOLFSSL* ssl)
  3619. {
  3620. if (ssl)
  3621. return ssl->options.side;
  3622. return BAD_FUNC_ARG;
  3623. }
  3624. #ifdef ATOMIC_USER
  3625. void wolfSSL_CTX_SetMacEncryptCb(WOLFSSL_CTX* ctx, CallbackMacEncrypt cb)
  3626. {
  3627. if (ctx)
  3628. ctx->MacEncryptCb = cb;
  3629. }
  3630. void wolfSSL_SetMacEncryptCtx(WOLFSSL* ssl, void *ctx)
  3631. {
  3632. if (ssl)
  3633. ssl->MacEncryptCtx = ctx;
  3634. }
  3635. void* wolfSSL_GetMacEncryptCtx(WOLFSSL* ssl)
  3636. {
  3637. if (ssl)
  3638. return ssl->MacEncryptCtx;
  3639. return NULL;
  3640. }
  3641. void wolfSSL_CTX_SetDecryptVerifyCb(WOLFSSL_CTX* ctx, CallbackDecryptVerify cb)
  3642. {
  3643. if (ctx)
  3644. ctx->DecryptVerifyCb = cb;
  3645. }
  3646. void wolfSSL_SetDecryptVerifyCtx(WOLFSSL* ssl, void *ctx)
  3647. {
  3648. if (ssl)
  3649. ssl->DecryptVerifyCtx = ctx;
  3650. }
  3651. void* wolfSSL_GetDecryptVerifyCtx(WOLFSSL* ssl)
  3652. {
  3653. if (ssl)
  3654. return ssl->DecryptVerifyCtx;
  3655. return NULL;
  3656. }
  3657. #if defined(HAVE_ENCRYPT_THEN_MAC) && !defined(WOLFSSL_AEAD_ONLY)
  3658. /**
  3659. * Set the callback, against the context, that encrypts then MACs.
  3660. *
  3661. * ctx SSL/TLS context.
  3662. * cb Callback function to use with Encrypt-Then-MAC.
  3663. */
  3664. void wolfSSL_CTX_SetEncryptMacCb(WOLFSSL_CTX* ctx, CallbackEncryptMac cb)
  3665. {
  3666. if (ctx)
  3667. ctx->EncryptMacCb = cb;
  3668. }
  3669. /**
  3670. * Set the context to use with callback that encrypts then MACs.
  3671. *
  3672. * ssl SSL/TLS object.
  3673. * ctx Callback function's context.
  3674. */
  3675. void wolfSSL_SetEncryptMacCtx(WOLFSSL* ssl, void *ctx)
  3676. {
  3677. if (ssl)
  3678. ssl->EncryptMacCtx = ctx;
  3679. }
  3680. /**
  3681. * Get the context being used with callback that encrypts then MACs.
  3682. *
  3683. * ssl SSL/TLS object.
  3684. * returns callback function's context or NULL if SSL/TLS object is NULL.
  3685. */
  3686. void* wolfSSL_GetEncryptMacCtx(WOLFSSL* ssl)
  3687. {
  3688. if (ssl)
  3689. return ssl->EncryptMacCtx;
  3690. return NULL;
  3691. }
  3692. /**
  3693. * Set the callback, against the context, that MAC verifies then decrypts.
  3694. *
  3695. * ctx SSL/TLS context.
  3696. * cb Callback function to use with Encrypt-Then-MAC.
  3697. */
  3698. void wolfSSL_CTX_SetVerifyDecryptCb(WOLFSSL_CTX* ctx, CallbackVerifyDecrypt cb)
  3699. {
  3700. if (ctx)
  3701. ctx->VerifyDecryptCb = cb;
  3702. }
  3703. /**
  3704. * Set the context to use with callback that MAC verifies then decrypts.
  3705. *
  3706. * ssl SSL/TLS object.
  3707. * ctx Callback function's context.
  3708. */
  3709. void wolfSSL_SetVerifyDecryptCtx(WOLFSSL* ssl, void *ctx)
  3710. {
  3711. if (ssl)
  3712. ssl->VerifyDecryptCtx = ctx;
  3713. }
  3714. /**
  3715. * Get the context being used with callback that MAC verifies then decrypts.
  3716. *
  3717. * ssl SSL/TLS object.
  3718. * returns callback function's context or NULL if SSL/TLS object is NULL.
  3719. */
  3720. void* wolfSSL_GetVerifyDecryptCtx(WOLFSSL* ssl)
  3721. {
  3722. if (ssl)
  3723. return ssl->VerifyDecryptCtx;
  3724. return NULL;
  3725. }
  3726. #endif /* HAVE_ENCRYPT_THEN_MAC !WOLFSSL_AEAD_ONLY */
  3727. const byte* wolfSSL_GetClientWriteKey(WOLFSSL* ssl)
  3728. {
  3729. if (ssl)
  3730. return ssl->keys.client_write_key;
  3731. return NULL;
  3732. }
  3733. const byte* wolfSSL_GetClientWriteIV(WOLFSSL* ssl)
  3734. {
  3735. if (ssl)
  3736. return ssl->keys.client_write_IV;
  3737. return NULL;
  3738. }
  3739. const byte* wolfSSL_GetServerWriteKey(WOLFSSL* ssl)
  3740. {
  3741. if (ssl)
  3742. return ssl->keys.server_write_key;
  3743. return NULL;
  3744. }
  3745. const byte* wolfSSL_GetServerWriteIV(WOLFSSL* ssl)
  3746. {
  3747. if (ssl)
  3748. return ssl->keys.server_write_IV;
  3749. return NULL;
  3750. }
  3751. int wolfSSL_GetKeySize(WOLFSSL* ssl)
  3752. {
  3753. if (ssl)
  3754. return ssl->specs.key_size;
  3755. return BAD_FUNC_ARG;
  3756. }
  3757. int wolfSSL_GetIVSize(WOLFSSL* ssl)
  3758. {
  3759. if (ssl)
  3760. return ssl->specs.iv_size;
  3761. return BAD_FUNC_ARG;
  3762. }
  3763. int wolfSSL_GetBulkCipher(WOLFSSL* ssl)
  3764. {
  3765. if (ssl)
  3766. return ssl->specs.bulk_cipher_algorithm;
  3767. return BAD_FUNC_ARG;
  3768. }
  3769. int wolfSSL_GetCipherType(WOLFSSL* ssl)
  3770. {
  3771. if (ssl == NULL)
  3772. return BAD_FUNC_ARG;
  3773. #ifndef WOLFSSL_AEAD_ONLY
  3774. if (ssl->specs.cipher_type == block)
  3775. return WOLFSSL_BLOCK_TYPE;
  3776. if (ssl->specs.cipher_type == stream)
  3777. return WOLFSSL_STREAM_TYPE;
  3778. #endif
  3779. if (ssl->specs.cipher_type == aead)
  3780. return WOLFSSL_AEAD_TYPE;
  3781. return -1;
  3782. }
  3783. int wolfSSL_GetCipherBlockSize(WOLFSSL* ssl)
  3784. {
  3785. if (ssl == NULL)
  3786. return BAD_FUNC_ARG;
  3787. return ssl->specs.block_size;
  3788. }
  3789. int wolfSSL_GetAeadMacSize(WOLFSSL* ssl)
  3790. {
  3791. if (ssl == NULL)
  3792. return BAD_FUNC_ARG;
  3793. return ssl->specs.aead_mac_size;
  3794. }
  3795. int wolfSSL_IsTLSv1_1(WOLFSSL* ssl)
  3796. {
  3797. if (ssl == NULL)
  3798. return BAD_FUNC_ARG;
  3799. if (ssl->options.tls1_1)
  3800. return 1;
  3801. return 0;
  3802. }
  3803. int wolfSSL_GetHmacSize(WOLFSSL* ssl)
  3804. {
  3805. /* AEAD ciphers don't have HMAC keys */
  3806. if (ssl)
  3807. return (ssl->specs.cipher_type != aead) ? ssl->specs.hash_size : 0;
  3808. return BAD_FUNC_ARG;
  3809. }
  3810. #ifdef WORD64_AVAILABLE
  3811. int wolfSSL_GetPeerSequenceNumber(WOLFSSL* ssl, word64 *seq)
  3812. {
  3813. if ((ssl == NULL) || (seq == NULL))
  3814. return BAD_FUNC_ARG;
  3815. *seq = ((word64)ssl->keys.peer_sequence_number_hi << 32) |
  3816. ssl->keys.peer_sequence_number_lo;
  3817. return !(*seq);
  3818. }
  3819. int wolfSSL_GetSequenceNumber(WOLFSSL* ssl, word64 *seq)
  3820. {
  3821. if ((ssl == NULL) || (seq == NULL))
  3822. return BAD_FUNC_ARG;
  3823. *seq = ((word64)ssl->keys.sequence_number_hi << 32) |
  3824. ssl->keys.sequence_number_lo;
  3825. return !(*seq);
  3826. }
  3827. #endif
  3828. #endif /* ATOMIC_USER */
  3829. #ifndef NO_CERTS
  3830. WOLFSSL_CERT_MANAGER* wolfSSL_CTX_GetCertManager(WOLFSSL_CTX* ctx)
  3831. {
  3832. WOLFSSL_CERT_MANAGER* cm = NULL;
  3833. if (ctx)
  3834. cm = ctx->cm;
  3835. return cm;
  3836. }
  3837. #endif /* NO_CERTS */
  3838. #if !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM) \
  3839. && defined(XFPRINTF)
  3840. void wolfSSL_ERR_print_errors_fp(XFILE fp, int err)
  3841. {
  3842. char data[WOLFSSL_MAX_ERROR_SZ + 1];
  3843. WOLFSSL_ENTER("wolfSSL_ERR_print_errors_fp");
  3844. SetErrorString(err, data);
  3845. if (XFPRINTF(fp, "%s", data) < 0)
  3846. WOLFSSL_MSG("fprintf failed in wolfSSL_ERR_print_errors_fp");
  3847. }
  3848. #if defined(OPENSSL_EXTRA) || defined(DEBUG_WOLFSSL_VERBOSE)
  3849. void wolfSSL_ERR_dump_errors_fp(XFILE fp)
  3850. {
  3851. wc_ERR_print_errors_fp(fp);
  3852. }
  3853. void wolfSSL_ERR_print_errors_cb (int (*cb)(const char *str, size_t len,
  3854. void *u), void *u)
  3855. {
  3856. wc_ERR_print_errors_cb(cb, u);
  3857. }
  3858. #endif
  3859. #endif /* !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM && XFPRINTF */
  3860. /*
  3861. * TODO This ssl parameter needs to be changed to const once our ABI checker
  3862. * stops flagging qualifier additions as ABI breaking.
  3863. */
  3864. WOLFSSL_ABI
  3865. int wolfSSL_pending(WOLFSSL* ssl)
  3866. {
  3867. WOLFSSL_ENTER("wolfSSL_pending");
  3868. if (ssl == NULL)
  3869. return WOLFSSL_FAILURE;
  3870. return ssl->buffers.clearOutputBuffer.length;
  3871. }
  3872. int wolfSSL_has_pending(const WOLFSSL* ssl)
  3873. {
  3874. WOLFSSL_ENTER("wolfSSL_has_pending");
  3875. if (ssl == NULL)
  3876. return WOLFSSL_FAILURE;
  3877. return ssl->buffers.clearOutputBuffer.length > 0;
  3878. }
  3879. #ifndef WOLFSSL_LEANPSK
  3880. /* turn on handshake group messages for context */
  3881. int wolfSSL_CTX_set_group_messages(WOLFSSL_CTX* ctx)
  3882. {
  3883. if (ctx == NULL)
  3884. return BAD_FUNC_ARG;
  3885. ctx->groupMessages = 1;
  3886. return WOLFSSL_SUCCESS;
  3887. }
  3888. #endif
  3889. #ifndef NO_WOLFSSL_CLIENT
  3890. /* connect enough to get peer cert chain */
  3891. int wolfSSL_connect_cert(WOLFSSL* ssl)
  3892. {
  3893. int ret;
  3894. if (ssl == NULL)
  3895. return WOLFSSL_FAILURE;
  3896. ssl->options.certOnly = 1;
  3897. ret = wolfSSL_connect(ssl);
  3898. ssl->options.certOnly = 0;
  3899. return ret;
  3900. }
  3901. #endif
  3902. #ifndef WOLFSSL_LEANPSK
  3903. /* turn on handshake group messages for ssl object */
  3904. int wolfSSL_set_group_messages(WOLFSSL* ssl)
  3905. {
  3906. if (ssl == NULL)
  3907. return BAD_FUNC_ARG;
  3908. ssl->options.groupMessages = 1;
  3909. return WOLFSSL_SUCCESS;
  3910. }
  3911. /* make minVersion the internal equivalent SSL version */
  3912. static int SetMinVersionHelper(byte* minVersion, int version)
  3913. {
  3914. #ifdef NO_TLS
  3915. (void)minVersion;
  3916. #endif
  3917. switch (version) {
  3918. #if defined(WOLFSSL_ALLOW_SSLV3) && !defined(NO_OLD_TLS)
  3919. case WOLFSSL_SSLV3:
  3920. *minVersion = SSLv3_MINOR;
  3921. break;
  3922. #endif
  3923. #ifndef NO_TLS
  3924. #ifndef NO_OLD_TLS
  3925. #ifdef WOLFSSL_ALLOW_TLSV10
  3926. case WOLFSSL_TLSV1:
  3927. *minVersion = TLSv1_MINOR;
  3928. break;
  3929. #endif
  3930. case WOLFSSL_TLSV1_1:
  3931. *minVersion = TLSv1_1_MINOR;
  3932. break;
  3933. #endif
  3934. #ifndef WOLFSSL_NO_TLS12
  3935. case WOLFSSL_TLSV1_2:
  3936. *minVersion = TLSv1_2_MINOR;
  3937. break;
  3938. #endif
  3939. #endif
  3940. #ifdef WOLFSSL_TLS13
  3941. case WOLFSSL_TLSV1_3:
  3942. *minVersion = TLSv1_3_MINOR;
  3943. break;
  3944. #endif
  3945. #ifdef WOLFSSL_DTLS
  3946. case WOLFSSL_DTLSV1:
  3947. *minVersion = DTLS_MINOR;
  3948. break;
  3949. case WOLFSSL_DTLSV1_2:
  3950. *minVersion = DTLSv1_2_MINOR;
  3951. break;
  3952. #ifdef WOLFSSL_DTLS13
  3953. case WOLFSSL_DTLSV1_3:
  3954. *minVersion = DTLSv1_3_MINOR;
  3955. break;
  3956. #endif /* WOLFSSL_DTLS13 */
  3957. #endif /* WOLFSSL_DTLS */
  3958. default:
  3959. WOLFSSL_MSG("Bad function argument");
  3960. return BAD_FUNC_ARG;
  3961. }
  3962. return WOLFSSL_SUCCESS;
  3963. }
  3964. /* Set minimum downgrade version allowed, WOLFSSL_SUCCESS on ok */
  3965. WOLFSSL_ABI
  3966. int wolfSSL_CTX_SetMinVersion(WOLFSSL_CTX* ctx, int version)
  3967. {
  3968. WOLFSSL_ENTER("wolfSSL_CTX_SetMinVersion");
  3969. if (ctx == NULL) {
  3970. WOLFSSL_MSG("Bad function argument");
  3971. return BAD_FUNC_ARG;
  3972. }
  3973. return SetMinVersionHelper(&ctx->minDowngrade, version);
  3974. }
  3975. /* Set minimum downgrade version allowed, WOLFSSL_SUCCESS on ok */
  3976. int wolfSSL_SetMinVersion(WOLFSSL* ssl, int version)
  3977. {
  3978. WOLFSSL_ENTER("wolfSSL_SetMinVersion");
  3979. if (ssl == NULL) {
  3980. WOLFSSL_MSG("Bad function argument");
  3981. return BAD_FUNC_ARG;
  3982. }
  3983. return SetMinVersionHelper(&ssl->options.minDowngrade, version);
  3984. }
  3985. /* Function to get version as WOLFSSL_ enum value for wolfSSL_SetVersion */
  3986. int wolfSSL_GetVersion(const WOLFSSL* ssl)
  3987. {
  3988. if (ssl == NULL)
  3989. return BAD_FUNC_ARG;
  3990. if (ssl->version.major == SSLv3_MAJOR) {
  3991. switch (ssl->version.minor) {
  3992. case SSLv3_MINOR :
  3993. return WOLFSSL_SSLV3;
  3994. case TLSv1_MINOR :
  3995. return WOLFSSL_TLSV1;
  3996. case TLSv1_1_MINOR :
  3997. return WOLFSSL_TLSV1_1;
  3998. case TLSv1_2_MINOR :
  3999. return WOLFSSL_TLSV1_2;
  4000. case TLSv1_3_MINOR :
  4001. return WOLFSSL_TLSV1_3;
  4002. default:
  4003. break;
  4004. }
  4005. }
  4006. return VERSION_ERROR;
  4007. }
  4008. int wolfSSL_SetVersion(WOLFSSL* ssl, int version)
  4009. {
  4010. word16 haveRSA = 1;
  4011. word16 havePSK = 0;
  4012. int keySz = 0;
  4013. WOLFSSL_ENTER("wolfSSL_SetVersion");
  4014. if (ssl == NULL) {
  4015. WOLFSSL_MSG("Bad function argument");
  4016. return BAD_FUNC_ARG;
  4017. }
  4018. switch (version) {
  4019. #if defined(WOLFSSL_ALLOW_SSLV3) && !defined(NO_OLD_TLS)
  4020. case WOLFSSL_SSLV3:
  4021. ssl->version = MakeSSLv3();
  4022. break;
  4023. #endif
  4024. #ifndef NO_TLS
  4025. #ifndef NO_OLD_TLS
  4026. #ifdef WOLFSSL_ALLOW_TLSV10
  4027. case WOLFSSL_TLSV1:
  4028. ssl->version = MakeTLSv1();
  4029. break;
  4030. #endif
  4031. case WOLFSSL_TLSV1_1:
  4032. ssl->version = MakeTLSv1_1();
  4033. break;
  4034. #endif
  4035. #ifndef WOLFSSL_NO_TLS12
  4036. case WOLFSSL_TLSV1_2:
  4037. ssl->version = MakeTLSv1_2();
  4038. break;
  4039. #endif
  4040. #ifdef WOLFSSL_TLS13
  4041. case WOLFSSL_TLSV1_3:
  4042. ssl->version = MakeTLSv1_3();
  4043. break;
  4044. #endif /* WOLFSSL_TLS13 */
  4045. #endif
  4046. default:
  4047. WOLFSSL_MSG("Bad function argument");
  4048. return BAD_FUNC_ARG;
  4049. }
  4050. #ifdef NO_RSA
  4051. haveRSA = 0;
  4052. #endif
  4053. #ifndef NO_PSK
  4054. havePSK = ssl->options.havePSK;
  4055. #endif
  4056. #ifndef NO_CERTS
  4057. keySz = ssl->buffers.keySz;
  4058. #endif
  4059. if (AllocateSuites(ssl) != 0)
  4060. return WOLFSSL_FAILURE;
  4061. InitSuites(ssl->suites, ssl->version, keySz, haveRSA, havePSK,
  4062. ssl->options.haveDH, ssl->options.haveECDSAsig,
  4063. ssl->options.haveECC, TRUE, ssl->options.haveStaticECC,
  4064. ssl->options.haveFalconSig, ssl->options.haveDilithiumSig,
  4065. ssl->options.useAnon, TRUE, ssl->options.side);
  4066. return WOLFSSL_SUCCESS;
  4067. }
  4068. #endif /* !leanpsk */
  4069. #ifndef NO_CERTS
  4070. /* hash is the SHA digest of name, just use first 32 bits as hash */
  4071. static WC_INLINE word32 HashSigner(const byte* hash)
  4072. {
  4073. return MakeWordFromHash(hash) % CA_TABLE_SIZE;
  4074. }
  4075. /* does CA already exist on signer list */
  4076. int AlreadySigner(WOLFSSL_CERT_MANAGER* cm, byte* hash)
  4077. {
  4078. Signer* signers;
  4079. int ret = 0;
  4080. word32 row;
  4081. if (cm == NULL || hash == NULL) {
  4082. return ret;
  4083. }
  4084. row = HashSigner(hash);
  4085. if (wc_LockMutex(&cm->caLock) != 0) {
  4086. return ret;
  4087. }
  4088. signers = cm->caTable[row];
  4089. while (signers) {
  4090. byte* subjectHash;
  4091. #ifndef NO_SKID
  4092. subjectHash = signers->subjectKeyIdHash;
  4093. #else
  4094. subjectHash = signers->subjectNameHash;
  4095. #endif
  4096. if (XMEMCMP(hash, subjectHash, SIGNER_DIGEST_SIZE) == 0) {
  4097. ret = 1; /* success */
  4098. break;
  4099. }
  4100. signers = signers->next;
  4101. }
  4102. wc_UnLockMutex(&cm->caLock);
  4103. return ret;
  4104. }
  4105. #ifdef WOLFSSL_TRUST_PEER_CERT
  4106. /* hash is the SHA digest of name, just use first 32 bits as hash */
  4107. static WC_INLINE word32 TrustedPeerHashSigner(const byte* hash)
  4108. {
  4109. return MakeWordFromHash(hash) % TP_TABLE_SIZE;
  4110. }
  4111. /* does trusted peer already exist on signer list */
  4112. int AlreadyTrustedPeer(WOLFSSL_CERT_MANAGER* cm, DecodedCert* cert)
  4113. {
  4114. TrustedPeerCert* tp;
  4115. int ret = 0;
  4116. word32 row = TrustedPeerHashSigner(cert->subjectHash);
  4117. if (wc_LockMutex(&cm->tpLock) != 0)
  4118. return ret;
  4119. tp = cm->tpTable[row];
  4120. while (tp) {
  4121. if (XMEMCMP(cert->subjectHash, tp->subjectNameHash,
  4122. SIGNER_DIGEST_SIZE) == 0)
  4123. ret = 1;
  4124. #ifndef NO_SKID
  4125. if (cert->extSubjKeyIdSet) {
  4126. /* Compare SKID as well if available */
  4127. if (ret == 1 && XMEMCMP(cert->extSubjKeyId, tp->subjectKeyIdHash,
  4128. SIGNER_DIGEST_SIZE) != 0)
  4129. ret = 0;
  4130. }
  4131. #endif
  4132. if (ret == 1)
  4133. break;
  4134. tp = tp->next;
  4135. }
  4136. wc_UnLockMutex(&cm->tpLock);
  4137. return ret;
  4138. }
  4139. /* return Trusted Peer if found, otherwise NULL
  4140. type is what to match on
  4141. */
  4142. TrustedPeerCert* GetTrustedPeer(void* vp, DecodedCert* cert)
  4143. {
  4144. WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp;
  4145. TrustedPeerCert* ret = NULL;
  4146. TrustedPeerCert* tp = NULL;
  4147. word32 row;
  4148. if (cm == NULL || cert == NULL)
  4149. return NULL;
  4150. row = TrustedPeerHashSigner(cert->subjectHash);
  4151. if (wc_LockMutex(&cm->tpLock) != 0)
  4152. return ret;
  4153. tp = cm->tpTable[row];
  4154. while (tp) {
  4155. if (XMEMCMP(cert->subjectHash, tp->subjectNameHash,
  4156. SIGNER_DIGEST_SIZE) == 0)
  4157. ret = tp;
  4158. #ifndef NO_SKID
  4159. if (cert->extSubjKeyIdSet) {
  4160. /* Compare SKID as well if available */
  4161. if (ret != NULL && XMEMCMP(cert->extSubjKeyId, tp->subjectKeyIdHash,
  4162. SIGNER_DIGEST_SIZE) != 0)
  4163. ret = NULL;
  4164. }
  4165. #endif
  4166. if (ret != NULL)
  4167. break;
  4168. tp = tp->next;
  4169. }
  4170. wc_UnLockMutex(&cm->tpLock);
  4171. return ret;
  4172. }
  4173. int MatchTrustedPeer(TrustedPeerCert* tp, DecodedCert* cert)
  4174. {
  4175. if (tp == NULL || cert == NULL)
  4176. return BAD_FUNC_ARG;
  4177. /* subject key id or subject hash has been compared when searching
  4178. tpTable for the cert from function GetTrustedPeer */
  4179. /* compare signatures */
  4180. if (tp->sigLen == cert->sigLength) {
  4181. if (XMEMCMP(tp->sig, cert->signature, cert->sigLength)) {
  4182. return WOLFSSL_FAILURE;
  4183. }
  4184. }
  4185. else {
  4186. return WOLFSSL_FAILURE;
  4187. }
  4188. return WOLFSSL_SUCCESS;
  4189. }
  4190. #endif /* WOLFSSL_TRUST_PEER_CERT */
  4191. /* return CA if found, otherwise NULL */
  4192. Signer* GetCA(void* vp, byte* hash)
  4193. {
  4194. WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp;
  4195. Signer* ret = NULL;
  4196. Signer* signers;
  4197. word32 row = 0;
  4198. if (cm == NULL || hash == NULL)
  4199. return NULL;
  4200. row = HashSigner(hash);
  4201. if (wc_LockMutex(&cm->caLock) != 0)
  4202. return ret;
  4203. signers = cm->caTable[row];
  4204. while (signers) {
  4205. byte* subjectHash;
  4206. #ifndef NO_SKID
  4207. subjectHash = signers->subjectKeyIdHash;
  4208. #else
  4209. subjectHash = signers->subjectNameHash;
  4210. #endif
  4211. if (XMEMCMP(hash, subjectHash, SIGNER_DIGEST_SIZE) == 0) {
  4212. ret = signers;
  4213. break;
  4214. }
  4215. signers = signers->next;
  4216. }
  4217. wc_UnLockMutex(&cm->caLock);
  4218. return ret;
  4219. }
  4220. #ifdef WOLFSSL_AKID_NAME
  4221. Signer* GetCAByAKID(void* vp, const byte* issuer, word32 issuerSz,
  4222. const byte* serial, word32 serialSz)
  4223. {
  4224. WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp;
  4225. Signer* ret = NULL;
  4226. Signer* signers;
  4227. byte nameHash[SIGNER_DIGEST_SIZE];
  4228. byte serialHash[SIGNER_DIGEST_SIZE];
  4229. word32 row;
  4230. if (cm == NULL || issuer == NULL || issuerSz == 0 ||
  4231. serial == NULL || serialSz == 0)
  4232. return NULL;
  4233. if (CalcHashId(issuer, issuerSz, nameHash) != 0 ||
  4234. CalcHashId(serial, serialSz, serialHash) != 0)
  4235. return NULL;
  4236. if (wc_LockMutex(&cm->caLock) != 0)
  4237. return ret;
  4238. /* Unfortunately we need to look through the entire table */
  4239. for (row = 0; row < CA_TABLE_SIZE && ret == NULL; row++) {
  4240. for (signers = cm->caTable[row]; signers != NULL;
  4241. signers = signers->next) {
  4242. if (XMEMCMP(signers->subjectNameHash, nameHash, SIGNER_DIGEST_SIZE)
  4243. == 0 && XMEMCMP(signers->serialHash, serialHash,
  4244. SIGNER_DIGEST_SIZE) == 0) {
  4245. ret = signers;
  4246. break;
  4247. }
  4248. }
  4249. }
  4250. wc_UnLockMutex(&cm->caLock);
  4251. return ret;
  4252. }
  4253. #endif
  4254. #ifndef NO_SKID
  4255. /* return CA if found, otherwise NULL. Walk through hash table. */
  4256. Signer* GetCAByName(void* vp, byte* hash)
  4257. {
  4258. WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp;
  4259. Signer* ret = NULL;
  4260. Signer* signers;
  4261. word32 row;
  4262. if (cm == NULL)
  4263. return NULL;
  4264. if (wc_LockMutex(&cm->caLock) != 0)
  4265. return ret;
  4266. for (row = 0; row < CA_TABLE_SIZE && ret == NULL; row++) {
  4267. signers = cm->caTable[row];
  4268. while (signers && ret == NULL) {
  4269. if (XMEMCMP(hash, signers->subjectNameHash,
  4270. SIGNER_DIGEST_SIZE) == 0) {
  4271. ret = signers;
  4272. }
  4273. signers = signers->next;
  4274. }
  4275. }
  4276. wc_UnLockMutex(&cm->caLock);
  4277. return ret;
  4278. }
  4279. #endif
  4280. #ifdef WOLFSSL_TRUST_PEER_CERT
  4281. /* add a trusted peer cert to linked list */
  4282. int AddTrustedPeer(WOLFSSL_CERT_MANAGER* cm, DerBuffer** pDer, int verify)
  4283. {
  4284. int ret = 0;
  4285. int row = 0;
  4286. TrustedPeerCert* peerCert;
  4287. DecodedCert* cert;
  4288. DerBuffer* der = *pDer;
  4289. WOLFSSL_MSG("Adding a Trusted Peer Cert");
  4290. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), cm->heap,
  4291. DYNAMIC_TYPE_DCERT);
  4292. if (cert == NULL) {
  4293. FreeDer(&der);
  4294. return MEMORY_E;
  4295. }
  4296. InitDecodedCert(cert, der->buffer, der->length, cm->heap);
  4297. if ((ret = ParseCert(cert, TRUSTED_PEER_TYPE, verify, cm)) != 0) {
  4298. FreeDecodedCert(cert);
  4299. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  4300. FreeDer(&der);
  4301. return ret;
  4302. }
  4303. WOLFSSL_MSG("\tParsed new trusted peer cert");
  4304. peerCert = (TrustedPeerCert*)XMALLOC(sizeof(TrustedPeerCert), cm->heap,
  4305. DYNAMIC_TYPE_CERT);
  4306. if (peerCert == NULL) {
  4307. FreeDecodedCert(cert);
  4308. XFREE(cert, cm->heap, DYNAMIC_TYPE_DCERT);
  4309. FreeDer(&der);
  4310. return MEMORY_E;
  4311. }
  4312. XMEMSET(peerCert, 0, sizeof(TrustedPeerCert));
  4313. #ifndef IGNORE_NAME_CONSTRAINTS
  4314. if (peerCert->permittedNames)
  4315. FreeNameSubtrees(peerCert->permittedNames, cm->heap);
  4316. if (peerCert->excludedNames)
  4317. FreeNameSubtrees(peerCert->excludedNames, cm->heap);
  4318. #endif
  4319. if (AlreadyTrustedPeer(cm, cert)) {
  4320. WOLFSSL_MSG("\tAlready have this CA, not adding again");
  4321. FreeTrustedPeer(peerCert, cm->heap);
  4322. (void)ret;
  4323. }
  4324. else {
  4325. /* add trusted peer signature */
  4326. peerCert->sigLen = cert->sigLength;
  4327. peerCert->sig = (byte *)XMALLOC(cert->sigLength, cm->heap,
  4328. DYNAMIC_TYPE_SIGNATURE);
  4329. if (peerCert->sig == NULL) {
  4330. FreeDecodedCert(cert);
  4331. XFREE(cert, cm->heap, DYNAMIC_TYPE_DCERT);
  4332. FreeTrustedPeer(peerCert, cm->heap);
  4333. FreeDer(&der);
  4334. return MEMORY_E;
  4335. }
  4336. XMEMCPY(peerCert->sig, cert->signature, cert->sigLength);
  4337. /* add trusted peer name */
  4338. peerCert->nameLen = cert->subjectCNLen;
  4339. peerCert->name = cert->subjectCN;
  4340. #ifndef IGNORE_NAME_CONSTRAINTS
  4341. peerCert->permittedNames = cert->permittedNames;
  4342. peerCert->excludedNames = cert->excludedNames;
  4343. #endif
  4344. /* add SKID when available and hash of name */
  4345. #ifndef NO_SKID
  4346. XMEMCPY(peerCert->subjectKeyIdHash, cert->extSubjKeyId,
  4347. SIGNER_DIGEST_SIZE);
  4348. #endif
  4349. XMEMCPY(peerCert->subjectNameHash, cert->subjectHash,
  4350. SIGNER_DIGEST_SIZE);
  4351. /* If Key Usage not set, all uses valid. */
  4352. peerCert->next = NULL;
  4353. cert->subjectCN = 0;
  4354. #ifndef IGNORE_NAME_CONSTRAINTS
  4355. cert->permittedNames = NULL;
  4356. cert->excludedNames = NULL;
  4357. #endif
  4358. row = TrustedPeerHashSigner(peerCert->subjectNameHash);
  4359. if (wc_LockMutex(&cm->tpLock) == 0) {
  4360. peerCert->next = cm->tpTable[row];
  4361. cm->tpTable[row] = peerCert; /* takes ownership */
  4362. wc_UnLockMutex(&cm->tpLock);
  4363. }
  4364. else {
  4365. WOLFSSL_MSG("\tTrusted Peer Cert Mutex Lock failed");
  4366. FreeDecodedCert(cert);
  4367. XFREE(cert, cm->heap, DYNAMIC_TYPE_DCERT);
  4368. FreeTrustedPeer(peerCert, cm->heap);
  4369. FreeDer(&der);
  4370. return BAD_MUTEX_E;
  4371. }
  4372. }
  4373. WOLFSSL_MSG("\tFreeing parsed trusted peer cert");
  4374. FreeDecodedCert(cert);
  4375. XFREE(cert, cm->heap, DYNAMIC_TYPE_DCERT);
  4376. WOLFSSL_MSG("\tFreeing der trusted peer cert");
  4377. FreeDer(&der);
  4378. WOLFSSL_MSG("\t\tOK Freeing der trusted peer cert");
  4379. WOLFSSL_LEAVE("AddTrustedPeer", ret);
  4380. return WOLFSSL_SUCCESS;
  4381. }
  4382. #endif /* WOLFSSL_TRUST_PEER_CERT */
  4383. /* owns der, internal now uses too */
  4384. /* type flag ids from user or from chain received during verify
  4385. don't allow chain ones to be added w/o isCA extension */
  4386. int AddCA(WOLFSSL_CERT_MANAGER* cm, DerBuffer** pDer, int type, int verify)
  4387. {
  4388. int ret;
  4389. Signer* signer = NULL;
  4390. word32 row;
  4391. byte* subjectHash;
  4392. #ifdef WOLFSSL_SMALL_STACK
  4393. DecodedCert* cert = NULL;
  4394. #else
  4395. DecodedCert cert[1];
  4396. #endif
  4397. DerBuffer* der = *pDer;
  4398. WOLFSSL_MSG("Adding a CA");
  4399. if (cm == NULL) {
  4400. FreeDer(pDer);
  4401. return BAD_FUNC_ARG;
  4402. }
  4403. #ifdef WOLFSSL_SMALL_STACK
  4404. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  4405. DYNAMIC_TYPE_DCERT);
  4406. if (cert == NULL) {
  4407. FreeDer(pDer);
  4408. return MEMORY_E;
  4409. }
  4410. #endif
  4411. InitDecodedCert(cert, der->buffer, der->length, cm->heap);
  4412. ret = ParseCert(cert, CA_TYPE, verify, cm);
  4413. WOLFSSL_MSG("\tParsed new CA");
  4414. #ifndef NO_SKID
  4415. subjectHash = cert->extSubjKeyId;
  4416. #else
  4417. subjectHash = cert->subjectHash;
  4418. #endif
  4419. /* check CA key size */
  4420. if (verify) {
  4421. switch (cert->keyOID) {
  4422. #ifndef NO_RSA
  4423. #ifdef WC_RSA_PSS
  4424. case RSAPSSk:
  4425. #endif
  4426. case RSAk:
  4427. if (cm->minRsaKeySz < 0 ||
  4428. cert->pubKeySize < (word16)cm->minRsaKeySz) {
  4429. ret = RSA_KEY_SIZE_E;
  4430. WOLFSSL_MSG("\tCA RSA key size error");
  4431. }
  4432. break;
  4433. #endif /* !NO_RSA */
  4434. #ifdef HAVE_ECC
  4435. case ECDSAk:
  4436. if (cm->minEccKeySz < 0 ||
  4437. cert->pubKeySize < (word16)cm->minEccKeySz) {
  4438. ret = ECC_KEY_SIZE_E;
  4439. WOLFSSL_MSG("\tCA ECC key size error");
  4440. }
  4441. break;
  4442. #endif /* HAVE_ECC */
  4443. #ifdef HAVE_ED25519
  4444. case ED25519k:
  4445. if (cm->minEccKeySz < 0 ||
  4446. ED25519_KEY_SIZE < (word16)cm->minEccKeySz) {
  4447. ret = ECC_KEY_SIZE_E;
  4448. WOLFSSL_MSG("\tCA ECC key size error");
  4449. }
  4450. break;
  4451. #endif /* HAVE_ED25519 */
  4452. #ifdef HAVE_ED448
  4453. case ED448k:
  4454. if (cm->minEccKeySz < 0 ||
  4455. ED448_KEY_SIZE < (word16)cm->minEccKeySz) {
  4456. ret = ECC_KEY_SIZE_E;
  4457. WOLFSSL_MSG("\tCA ECC key size error");
  4458. }
  4459. break;
  4460. #endif /* HAVE_ED448 */
  4461. #if defined(HAVE_PQC)
  4462. #if defined(HAVE_FALCON)
  4463. case FALCON_LEVEL1k:
  4464. if (cm->minFalconKeySz < 0 ||
  4465. FALCON_LEVEL1_KEY_SIZE < (word16)cm->minFalconKeySz) {
  4466. ret = FALCON_KEY_SIZE_E;
  4467. WOLFSSL_MSG("\tCA Falcon level 1 key size error");
  4468. }
  4469. break;
  4470. case FALCON_LEVEL5k:
  4471. if (cm->minFalconKeySz < 0 ||
  4472. FALCON_LEVEL5_KEY_SIZE < (word16)cm->minFalconKeySz) {
  4473. ret = FALCON_KEY_SIZE_E;
  4474. WOLFSSL_MSG("\tCA Falcon level 5 key size error");
  4475. }
  4476. break;
  4477. #endif /* HAVE_FALCON */
  4478. #if defined(HAVE_DILITHIUM)
  4479. case DILITHIUM_LEVEL2k:
  4480. if (cm->minDilithiumKeySz < 0 ||
  4481. DILITHIUM_LEVEL2_KEY_SIZE < (word16)cm->minDilithiumKeySz) {
  4482. ret = DILITHIUM_KEY_SIZE_E;
  4483. WOLFSSL_MSG("\tCA Dilithium level 2 key size error");
  4484. }
  4485. break;
  4486. case DILITHIUM_LEVEL3k:
  4487. if (cm->minDilithiumKeySz < 0 ||
  4488. DILITHIUM_LEVEL3_KEY_SIZE < (word16)cm->minDilithiumKeySz) {
  4489. ret = DILITHIUM_KEY_SIZE_E;
  4490. WOLFSSL_MSG("\tCA Dilithium level 3 key size error");
  4491. }
  4492. break;
  4493. case DILITHIUM_LEVEL5k:
  4494. if (cm->minDilithiumKeySz < 0 ||
  4495. DILITHIUM_LEVEL5_KEY_SIZE < (word16)cm->minDilithiumKeySz) {
  4496. ret = DILITHIUM_KEY_SIZE_E;
  4497. WOLFSSL_MSG("\tCA Dilithium level 5 key size error");
  4498. }
  4499. break;
  4500. #endif /* HAVE_DILITHIUM */
  4501. #endif /* HAVE_PQC */
  4502. default:
  4503. WOLFSSL_MSG("\tNo key size check done on CA");
  4504. break; /* no size check if key type is not in switch */
  4505. }
  4506. }
  4507. if (ret == 0 && cert->isCA == 0 && type != WOLFSSL_USER_CA) {
  4508. WOLFSSL_MSG("\tCan't add as CA if not actually one");
  4509. ret = NOT_CA_ERROR;
  4510. }
  4511. #ifndef ALLOW_INVALID_CERTSIGN
  4512. else if (ret == 0 && cert->isCA == 1 && type != WOLFSSL_USER_CA &&
  4513. !cert->selfSigned && (cert->extKeyUsage & KEYUSE_KEY_CERT_SIGN) == 0) {
  4514. /* Intermediate CA certs are required to have the keyCertSign
  4515. * extension set. User loaded root certs are not. */
  4516. WOLFSSL_MSG("\tDoesn't have key usage certificate signing");
  4517. ret = NOT_CA_ERROR;
  4518. }
  4519. #endif
  4520. else if (ret == 0 && AlreadySigner(cm, subjectHash)) {
  4521. WOLFSSL_MSG("\tAlready have this CA, not adding again");
  4522. (void)ret;
  4523. }
  4524. else if (ret == 0) {
  4525. /* take over signer parts */
  4526. signer = MakeSigner(cm->heap);
  4527. if (!signer)
  4528. ret = MEMORY_ERROR;
  4529. }
  4530. #if defined(WOLFSSL_AKID_NAME) || defined(HAVE_CRL)
  4531. if (ret == 0 && signer != NULL)
  4532. ret = CalcHashId(cert->serial, cert->serialSz, signer->serialHash);
  4533. #endif
  4534. if (ret == 0 && signer != NULL) {
  4535. #ifdef WOLFSSL_SIGNER_DER_CERT
  4536. ret = AllocDer(&signer->derCert, der->length, der->type, NULL);
  4537. }
  4538. if (ret == 0 && signer != NULL) {
  4539. XMEMCPY(signer->derCert->buffer, der->buffer, der->length);
  4540. #endif
  4541. signer->keyOID = cert->keyOID;
  4542. if (cert->pubKeyStored) {
  4543. signer->publicKey = cert->publicKey;
  4544. signer->pubKeySize = cert->pubKeySize;
  4545. }
  4546. #ifdef WOLFSSL_DUAL_ALG_CERTS
  4547. if (cert->extSapkiSet && cert->sapkiLen > 0) {
  4548. /* Allocated space for alternative public key. */
  4549. signer->sapkiDer = (byte*)XMALLOC(cert->sapkiLen, cm->heap,
  4550. DYNAMIC_TYPE_PUBLIC_KEY);
  4551. if (signer->sapkiDer == NULL) {
  4552. ret = MEMORY_E;
  4553. }
  4554. else {
  4555. XMEMCPY(signer->sapkiDer, cert->sapkiDer, cert->sapkiLen);
  4556. signer->sapkiLen = cert->sapkiLen;
  4557. signer->sapkiOID = cert->sapkiOID;
  4558. }
  4559. }
  4560. #endif /* WOLFSSL_DUAL_ALG_CERTS */
  4561. if (cert->subjectCNStored) {
  4562. signer->nameLen = cert->subjectCNLen;
  4563. signer->name = cert->subjectCN;
  4564. }
  4565. signer->maxPathLen = cert->maxPathLen;
  4566. signer->selfSigned = cert->selfSigned;
  4567. #ifndef IGNORE_NAME_CONSTRAINTS
  4568. signer->permittedNames = cert->permittedNames;
  4569. signer->excludedNames = cert->excludedNames;
  4570. #endif
  4571. #ifndef NO_SKID
  4572. XMEMCPY(signer->subjectKeyIdHash, cert->extSubjKeyId,
  4573. SIGNER_DIGEST_SIZE);
  4574. #endif
  4575. XMEMCPY(signer->subjectNameHash, cert->subjectHash,
  4576. SIGNER_DIGEST_SIZE);
  4577. #if defined(HAVE_OCSP) || defined(HAVE_CRL)
  4578. XMEMCPY(signer->issuerNameHash, cert->issuerHash,
  4579. SIGNER_DIGEST_SIZE);
  4580. #endif
  4581. #ifdef HAVE_OCSP
  4582. XMEMCPY(signer->subjectKeyHash, cert->subjectKeyHash,
  4583. KEYID_SIZE);
  4584. #endif
  4585. signer->keyUsage = cert->extKeyUsageSet ? cert->extKeyUsage
  4586. : 0xFFFF;
  4587. signer->next = NULL; /* If Key Usage not set, all uses valid. */
  4588. cert->publicKey = 0; /* in case lock fails don't free here. */
  4589. cert->subjectCN = 0;
  4590. #ifndef IGNORE_NAME_CONSTRAINTS
  4591. cert->permittedNames = NULL;
  4592. cert->excludedNames = NULL;
  4593. #endif
  4594. signer->type = (byte)type;
  4595. #ifndef NO_SKID
  4596. row = HashSigner(signer->subjectKeyIdHash);
  4597. #else
  4598. row = HashSigner(signer->subjectNameHash);
  4599. #endif
  4600. if (wc_LockMutex(&cm->caLock) == 0) {
  4601. signer->next = cm->caTable[row];
  4602. cm->caTable[row] = signer; /* takes ownership */
  4603. wc_UnLockMutex(&cm->caLock);
  4604. if (cm->caCacheCallback)
  4605. cm->caCacheCallback(der->buffer, (int)der->length, type);
  4606. }
  4607. else {
  4608. WOLFSSL_MSG("\tCA Mutex Lock failed");
  4609. ret = BAD_MUTEX_E;
  4610. }
  4611. }
  4612. #if defined(WOLFSSL_RENESAS_TSIP_TLS) || defined(WOLFSSL_RENESAS_FSPSM_TLS)
  4613. /* Verify CA by TSIP so that generated tsip key is going to be able to */
  4614. /* be used for peer's cert verification */
  4615. /* TSIP is only able to handle USER CA, and only one CA. */
  4616. /* Therefore, it doesn't need to call TSIP again if there is already */
  4617. /* verified CA. */
  4618. if ( ret == 0 && signer != NULL ) {
  4619. signer->cm_idx = row;
  4620. if (type == WOLFSSL_USER_CA) {
  4621. if ((ret = wc_Renesas_cmn_RootCertVerify(cert->source, cert->maxIdx,
  4622. cert->sigCtx.CertAtt.pubkey_n_start,
  4623. cert->sigCtx.CertAtt.pubkey_n_len - 1,
  4624. cert->sigCtx.CertAtt.pubkey_e_start,
  4625. cert->sigCtx.CertAtt.pubkey_e_len - 1,
  4626. row/* cm index */))
  4627. < 0)
  4628. WOLFSSL_MSG("Renesas_RootCertVerify() failed");
  4629. else
  4630. WOLFSSL_MSG("Renesas_RootCertVerify() succeed or skipped");
  4631. }
  4632. }
  4633. #endif /* TSIP or SCE */
  4634. WOLFSSL_MSG("\tFreeing Parsed CA");
  4635. FreeDecodedCert(cert);
  4636. if (ret != 0 && signer != NULL)
  4637. FreeSigner(signer, cm->heap);
  4638. #ifdef WOLFSSL_SMALL_STACK
  4639. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  4640. #endif
  4641. WOLFSSL_MSG("\tFreeing der CA");
  4642. FreeDer(pDer);
  4643. WOLFSSL_MSG("\t\tOK Freeing der CA");
  4644. WOLFSSL_LEAVE("AddCA", ret);
  4645. return ret == 0 ? WOLFSSL_SUCCESS : ret;
  4646. }
  4647. #endif /* !NO_CERTS */
  4648. #if defined(OPENSSL_EXTRA) && !defined(WOLFSSL_NO_OPENSSL_RAND_CB)
  4649. static int wolfSSL_RAND_InitMutex(void);
  4650. #endif
  4651. #if defined(OPENSSL_EXTRA) && defined(HAVE_ATEXIT)
  4652. static void AtExitCleanup(void)
  4653. {
  4654. if (initRefCount > 0) {
  4655. initRefCount = 1;
  4656. (void)wolfSSL_Cleanup();
  4657. }
  4658. }
  4659. #endif
  4660. WOLFSSL_ABI
  4661. int wolfSSL_Init(void)
  4662. {
  4663. int ret = WOLFSSL_SUCCESS;
  4664. #if !defined(NO_SESSION_CACHE) && defined(ENABLE_SESSION_CACHE_ROW_LOCK)
  4665. int i;
  4666. #endif
  4667. WOLFSSL_ENTER("wolfSSL_Init");
  4668. #ifndef WOLFSSL_MUTEX_INITIALIZER
  4669. if (inits_count_mutex_valid == 0) {
  4670. if (wc_InitMutex(&inits_count_mutex) != 0) {
  4671. WOLFSSL_MSG("Bad Init Mutex count");
  4672. return BAD_MUTEX_E;
  4673. }
  4674. else {
  4675. inits_count_mutex_valid = 1;
  4676. }
  4677. }
  4678. #endif /* !WOLFSSL_MUTEX_INITIALIZER */
  4679. if (wc_LockMutex(&inits_count_mutex) != 0) {
  4680. WOLFSSL_MSG("Bad Lock Mutex count");
  4681. return BAD_MUTEX_E;
  4682. }
  4683. #if FIPS_VERSION_GE(5,1)
  4684. if ((ret == WOLFSSL_SUCCESS) && (initRefCount == 0)) {
  4685. ret = wolfCrypt_SetPrivateKeyReadEnable_fips(1, WC_KEYTYPE_ALL);
  4686. if (ret == 0)
  4687. ret = WOLFSSL_SUCCESS;
  4688. }
  4689. #endif
  4690. if ((ret == WOLFSSL_SUCCESS) && (initRefCount == 0)) {
  4691. /* Initialize crypto for use with TLS connection */
  4692. if (wolfCrypt_Init() != 0) {
  4693. WOLFSSL_MSG("Bad wolfCrypt Init");
  4694. ret = WC_INIT_E;
  4695. }
  4696. #if defined(HAVE_GLOBAL_RNG) && !defined(WOLFSSL_MUTEX_INITIALIZER)
  4697. if (ret == WOLFSSL_SUCCESS) {
  4698. if (wc_InitMutex(&globalRNGMutex) != 0) {
  4699. WOLFSSL_MSG("Bad Init Mutex rng");
  4700. ret = BAD_MUTEX_E;
  4701. }
  4702. else {
  4703. globalRNGMutex_valid = 1;
  4704. }
  4705. }
  4706. #endif
  4707. #ifdef WC_RNG_SEED_CB
  4708. wc_SetSeed_Cb(wc_GenerateSeed);
  4709. #endif
  4710. #ifdef OPENSSL_EXTRA
  4711. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  4712. if ((ret == WOLFSSL_SUCCESS) && (wolfSSL_RAND_InitMutex() != 0)) {
  4713. ret = BAD_MUTEX_E;
  4714. }
  4715. #endif
  4716. if ((ret == WOLFSSL_SUCCESS) &&
  4717. (wolfSSL_RAND_seed(NULL, 0) != WOLFSSL_SUCCESS)) {
  4718. WOLFSSL_MSG("wolfSSL_RAND_seed failed");
  4719. ret = WC_INIT_E;
  4720. }
  4721. #endif
  4722. #ifndef NO_SESSION_CACHE
  4723. #ifdef ENABLE_SESSION_CACHE_ROW_LOCK
  4724. for (i = 0; i < SESSION_ROWS; ++i) {
  4725. SessionCache[i].lock_valid = 0;
  4726. }
  4727. for (i = 0; (ret == WOLFSSL_SUCCESS) && (i < SESSION_ROWS); ++i) {
  4728. if (wc_InitRwLock(&SessionCache[i].row_lock) != 0) {
  4729. WOLFSSL_MSG("Bad Init Mutex session");
  4730. ret = BAD_MUTEX_E;
  4731. }
  4732. else {
  4733. SessionCache[i].lock_valid = 1;
  4734. }
  4735. }
  4736. #else
  4737. if (ret == WOLFSSL_SUCCESS) {
  4738. if (wc_InitRwLock(&session_lock) != 0) {
  4739. WOLFSSL_MSG("Bad Init Mutex session");
  4740. ret = BAD_MUTEX_E;
  4741. }
  4742. else {
  4743. session_lock_valid = 1;
  4744. }
  4745. }
  4746. #endif
  4747. #ifndef NO_CLIENT_CACHE
  4748. #ifndef WOLFSSL_MUTEX_INITIALIZER
  4749. if (ret == WOLFSSL_SUCCESS) {
  4750. if (wc_InitMutex(&clisession_mutex) != 0) {
  4751. WOLFSSL_MSG("Bad Init Mutex session");
  4752. ret = BAD_MUTEX_E;
  4753. }
  4754. else {
  4755. clisession_mutex_valid = 1;
  4756. }
  4757. }
  4758. #endif
  4759. #endif
  4760. #endif
  4761. #if defined(OPENSSL_EXTRA) && defined(HAVE_ATEXIT)
  4762. /* OpenSSL registers cleanup using atexit */
  4763. if ((ret == WOLFSSL_SUCCESS) && (atexit(AtExitCleanup) != 0)) {
  4764. WOLFSSL_MSG("Bad atexit registration");
  4765. ret = WC_INIT_E;
  4766. }
  4767. #endif
  4768. }
  4769. if (ret == WOLFSSL_SUCCESS) {
  4770. initRefCount++;
  4771. }
  4772. wc_UnLockMutex(&inits_count_mutex);
  4773. if (ret != WOLFSSL_SUCCESS) {
  4774. initRefCount = 1; /* Force cleanup */
  4775. (void)wolfSSL_Cleanup(); /* Ignore any error from cleanup */
  4776. }
  4777. return ret;
  4778. }
  4779. #define WOLFSSL_SSL_LOAD_INCLUDED
  4780. #include <src/ssl_load.c>
  4781. #ifndef NO_CERTS
  4782. #ifdef HAVE_CRL
  4783. int wolfSSL_CTX_LoadCRLBuffer(WOLFSSL_CTX* ctx, const unsigned char* buff,
  4784. long sz, int type)
  4785. {
  4786. WOLFSSL_ENTER("wolfSSL_CTX_LoadCRLBuffer");
  4787. if (ctx == NULL)
  4788. return BAD_FUNC_ARG;
  4789. return wolfSSL_CertManagerLoadCRLBuffer(ctx->cm, buff, sz, type);
  4790. }
  4791. int wolfSSL_LoadCRLBuffer(WOLFSSL* ssl, const unsigned char* buff,
  4792. long sz, int type)
  4793. {
  4794. WOLFSSL_ENTER("wolfSSL_LoadCRLBuffer");
  4795. if (ssl == NULL || ssl->ctx == NULL)
  4796. return BAD_FUNC_ARG;
  4797. SSL_CM_WARNING(ssl);
  4798. return wolfSSL_CertManagerLoadCRLBuffer(SSL_CM(ssl), buff, sz, type);
  4799. }
  4800. #endif /* HAVE_CRL */
  4801. #ifdef HAVE_OCSP
  4802. int wolfSSL_EnableOCSP(WOLFSSL* ssl, int options)
  4803. {
  4804. WOLFSSL_ENTER("wolfSSL_EnableOCSP");
  4805. if (ssl) {
  4806. SSL_CM_WARNING(ssl);
  4807. return wolfSSL_CertManagerEnableOCSP(SSL_CM(ssl), options);
  4808. }
  4809. else
  4810. return BAD_FUNC_ARG;
  4811. }
  4812. int wolfSSL_DisableOCSP(WOLFSSL* ssl)
  4813. {
  4814. WOLFSSL_ENTER("wolfSSL_DisableOCSP");
  4815. if (ssl) {
  4816. SSL_CM_WARNING(ssl);
  4817. return wolfSSL_CertManagerDisableOCSP(SSL_CM(ssl));
  4818. }
  4819. else
  4820. return BAD_FUNC_ARG;
  4821. }
  4822. int wolfSSL_EnableOCSPStapling(WOLFSSL* ssl)
  4823. {
  4824. WOLFSSL_ENTER("wolfSSL_EnableOCSPStapling");
  4825. if (ssl) {
  4826. SSL_CM_WARNING(ssl);
  4827. return wolfSSL_CertManagerEnableOCSPStapling(SSL_CM(ssl));
  4828. }
  4829. else
  4830. return BAD_FUNC_ARG;
  4831. }
  4832. int wolfSSL_DisableOCSPStapling(WOLFSSL* ssl)
  4833. {
  4834. WOLFSSL_ENTER("wolfSSL_DisableOCSPStapling");
  4835. if (ssl) {
  4836. SSL_CM_WARNING(ssl);
  4837. return wolfSSL_CertManagerDisableOCSPStapling(SSL_CM(ssl));
  4838. }
  4839. else
  4840. return BAD_FUNC_ARG;
  4841. }
  4842. int wolfSSL_SetOCSP_OverrideURL(WOLFSSL* ssl, const char* url)
  4843. {
  4844. WOLFSSL_ENTER("wolfSSL_SetOCSP_OverrideURL");
  4845. if (ssl) {
  4846. SSL_CM_WARNING(ssl);
  4847. return wolfSSL_CertManagerSetOCSPOverrideURL(SSL_CM(ssl), url);
  4848. }
  4849. else
  4850. return BAD_FUNC_ARG;
  4851. }
  4852. int wolfSSL_SetOCSP_Cb(WOLFSSL* ssl,
  4853. CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx)
  4854. {
  4855. WOLFSSL_ENTER("wolfSSL_SetOCSP_Cb");
  4856. if (ssl) {
  4857. SSL_CM_WARNING(ssl);
  4858. ssl->ocspIOCtx = ioCbCtx; /* use SSL specific ioCbCtx */
  4859. return wolfSSL_CertManagerSetOCSP_Cb(SSL_CM(ssl),
  4860. ioCb, respFreeCb, NULL);
  4861. }
  4862. else
  4863. return BAD_FUNC_ARG;
  4864. }
  4865. int wolfSSL_CTX_EnableOCSP(WOLFSSL_CTX* ctx, int options)
  4866. {
  4867. WOLFSSL_ENTER("wolfSSL_CTX_EnableOCSP");
  4868. if (ctx)
  4869. return wolfSSL_CertManagerEnableOCSP(ctx->cm, options);
  4870. else
  4871. return BAD_FUNC_ARG;
  4872. }
  4873. int wolfSSL_CTX_DisableOCSP(WOLFSSL_CTX* ctx)
  4874. {
  4875. WOLFSSL_ENTER("wolfSSL_CTX_DisableOCSP");
  4876. if (ctx)
  4877. return wolfSSL_CertManagerDisableOCSP(ctx->cm);
  4878. else
  4879. return BAD_FUNC_ARG;
  4880. }
  4881. int wolfSSL_CTX_SetOCSP_OverrideURL(WOLFSSL_CTX* ctx, const char* url)
  4882. {
  4883. WOLFSSL_ENTER("wolfSSL_SetOCSP_OverrideURL");
  4884. if (ctx)
  4885. return wolfSSL_CertManagerSetOCSPOverrideURL(ctx->cm, url);
  4886. else
  4887. return BAD_FUNC_ARG;
  4888. }
  4889. int wolfSSL_CTX_SetOCSP_Cb(WOLFSSL_CTX* ctx, CbOCSPIO ioCb,
  4890. CbOCSPRespFree respFreeCb, void* ioCbCtx)
  4891. {
  4892. WOLFSSL_ENTER("wolfSSL_CTX_SetOCSP_Cb");
  4893. if (ctx)
  4894. return wolfSSL_CertManagerSetOCSP_Cb(ctx->cm, ioCb,
  4895. respFreeCb, ioCbCtx);
  4896. else
  4897. return BAD_FUNC_ARG;
  4898. }
  4899. #if defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
  4900. || defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2)
  4901. int wolfSSL_CTX_EnableOCSPStapling(WOLFSSL_CTX* ctx)
  4902. {
  4903. WOLFSSL_ENTER("wolfSSL_CTX_EnableOCSPStapling");
  4904. if (ctx)
  4905. return wolfSSL_CertManagerEnableOCSPStapling(ctx->cm);
  4906. else
  4907. return BAD_FUNC_ARG;
  4908. }
  4909. int wolfSSL_CTX_DisableOCSPStapling(WOLFSSL_CTX* ctx)
  4910. {
  4911. WOLFSSL_ENTER("wolfSSL_CTX_DisableOCSPStapling");
  4912. if (ctx)
  4913. return wolfSSL_CertManagerDisableOCSPStapling(ctx->cm);
  4914. else
  4915. return BAD_FUNC_ARG;
  4916. }
  4917. int wolfSSL_CTX_EnableOCSPMustStaple(WOLFSSL_CTX* ctx)
  4918. {
  4919. WOLFSSL_ENTER("wolfSSL_CTX_EnableOCSPMustStaple");
  4920. if (ctx)
  4921. return wolfSSL_CertManagerEnableOCSPMustStaple(ctx->cm);
  4922. else
  4923. return BAD_FUNC_ARG;
  4924. }
  4925. int wolfSSL_CTX_DisableOCSPMustStaple(WOLFSSL_CTX* ctx)
  4926. {
  4927. WOLFSSL_ENTER("wolfSSL_CTX_DisableOCSPMustStaple");
  4928. if (ctx)
  4929. return wolfSSL_CertManagerDisableOCSPMustStaple(ctx->cm);
  4930. else
  4931. return BAD_FUNC_ARG;
  4932. }
  4933. #endif /* HAVE_CERTIFICATE_STATUS_REQUEST || \
  4934. * HAVE_CERTIFICATE_STATUS_REQUEST_V2 */
  4935. #endif /* HAVE_OCSP */
  4936. #ifdef HAVE_CRL
  4937. int wolfSSL_EnableCRL(WOLFSSL* ssl, int options)
  4938. {
  4939. WOLFSSL_ENTER("wolfSSL_EnableCRL");
  4940. if (ssl) {
  4941. SSL_CM_WARNING(ssl);
  4942. return wolfSSL_CertManagerEnableCRL(SSL_CM(ssl), options);
  4943. }
  4944. else
  4945. return BAD_FUNC_ARG;
  4946. }
  4947. int wolfSSL_DisableCRL(WOLFSSL* ssl)
  4948. {
  4949. WOLFSSL_ENTER("wolfSSL_DisableCRL");
  4950. if (ssl) {
  4951. SSL_CM_WARNING(ssl);
  4952. return wolfSSL_CertManagerDisableCRL(SSL_CM(ssl));
  4953. }
  4954. else
  4955. return BAD_FUNC_ARG;
  4956. }
  4957. #ifndef NO_FILESYSTEM
  4958. int wolfSSL_LoadCRL(WOLFSSL* ssl, const char* path, int type, int monitor)
  4959. {
  4960. WOLFSSL_ENTER("wolfSSL_LoadCRL");
  4961. if (ssl) {
  4962. SSL_CM_WARNING(ssl);
  4963. return wolfSSL_CertManagerLoadCRL(SSL_CM(ssl), path, type, monitor);
  4964. }
  4965. else
  4966. return BAD_FUNC_ARG;
  4967. }
  4968. int wolfSSL_LoadCRLFile(WOLFSSL* ssl, const char* file, int type)
  4969. {
  4970. WOLFSSL_ENTER("wolfSSL_LoadCRLFile");
  4971. if (ssl) {
  4972. SSL_CM_WARNING(ssl);
  4973. return wolfSSL_CertManagerLoadCRLFile(SSL_CM(ssl), file, type);
  4974. }
  4975. else
  4976. return BAD_FUNC_ARG;
  4977. }
  4978. #endif
  4979. int wolfSSL_SetCRL_Cb(WOLFSSL* ssl, CbMissingCRL cb)
  4980. {
  4981. WOLFSSL_ENTER("wolfSSL_SetCRL_Cb");
  4982. if (ssl) {
  4983. SSL_CM_WARNING(ssl);
  4984. return wolfSSL_CertManagerSetCRL_Cb(SSL_CM(ssl), cb);
  4985. }
  4986. else
  4987. return BAD_FUNC_ARG;
  4988. }
  4989. #ifdef HAVE_CRL_IO
  4990. int wolfSSL_SetCRL_IOCb(WOLFSSL* ssl, CbCrlIO cb)
  4991. {
  4992. WOLFSSL_ENTER("wolfSSL_SetCRL_Cb");
  4993. if (ssl) {
  4994. SSL_CM_WARNING(ssl);
  4995. return wolfSSL_CertManagerSetCRL_IOCb(SSL_CM(ssl), cb);
  4996. }
  4997. else
  4998. return BAD_FUNC_ARG;
  4999. }
  5000. #endif
  5001. int wolfSSL_CTX_EnableCRL(WOLFSSL_CTX* ctx, int options)
  5002. {
  5003. WOLFSSL_ENTER("wolfSSL_CTX_EnableCRL");
  5004. if (ctx)
  5005. return wolfSSL_CertManagerEnableCRL(ctx->cm, options);
  5006. else
  5007. return BAD_FUNC_ARG;
  5008. }
  5009. int wolfSSL_CTX_DisableCRL(WOLFSSL_CTX* ctx)
  5010. {
  5011. WOLFSSL_ENTER("wolfSSL_CTX_DisableCRL");
  5012. if (ctx)
  5013. return wolfSSL_CertManagerDisableCRL(ctx->cm);
  5014. else
  5015. return BAD_FUNC_ARG;
  5016. }
  5017. #ifndef NO_FILESYSTEM
  5018. int wolfSSL_CTX_LoadCRL(WOLFSSL_CTX* ctx, const char* path,
  5019. int type, int monitor)
  5020. {
  5021. WOLFSSL_ENTER("wolfSSL_CTX_LoadCRL");
  5022. if (ctx)
  5023. return wolfSSL_CertManagerLoadCRL(ctx->cm, path, type, monitor);
  5024. else
  5025. return BAD_FUNC_ARG;
  5026. }
  5027. int wolfSSL_CTX_LoadCRLFile(WOLFSSL_CTX* ctx, const char* file,
  5028. int type)
  5029. {
  5030. WOLFSSL_ENTER("wolfSSL_CTX_LoadCRL");
  5031. if (ctx)
  5032. return wolfSSL_CertManagerLoadCRLFile(ctx->cm, file, type);
  5033. else
  5034. return BAD_FUNC_ARG;
  5035. }
  5036. #endif
  5037. int wolfSSL_CTX_SetCRL_Cb(WOLFSSL_CTX* ctx, CbMissingCRL cb)
  5038. {
  5039. WOLFSSL_ENTER("wolfSSL_CTX_SetCRL_Cb");
  5040. if (ctx)
  5041. return wolfSSL_CertManagerSetCRL_Cb(ctx->cm, cb);
  5042. else
  5043. return BAD_FUNC_ARG;
  5044. }
  5045. #ifdef HAVE_CRL_IO
  5046. int wolfSSL_CTX_SetCRL_IOCb(WOLFSSL_CTX* ctx, CbCrlIO cb)
  5047. {
  5048. WOLFSSL_ENTER("wolfSSL_CTX_SetCRL_IOCb");
  5049. if (ctx)
  5050. return wolfSSL_CertManagerSetCRL_IOCb(ctx->cm, cb);
  5051. else
  5052. return BAD_FUNC_ARG;
  5053. }
  5054. #endif
  5055. #endif /* HAVE_CRL */
  5056. /* Sets the max chain depth when verifying a certificate chain. Default depth
  5057. * is set to MAX_CHAIN_DEPTH.
  5058. *
  5059. * ctx WOLFSSL_CTX structure to set depth in
  5060. * depth max depth
  5061. */
  5062. void wolfSSL_CTX_set_verify_depth(WOLFSSL_CTX *ctx, int depth) {
  5063. WOLFSSL_ENTER("wolfSSL_CTX_set_verify_depth");
  5064. if (ctx == NULL || depth < 0 || depth > MAX_CHAIN_DEPTH) {
  5065. WOLFSSL_MSG("Bad depth argument, too large or less than 0");
  5066. return;
  5067. }
  5068. ctx->verifyDepth = (byte)depth;
  5069. }
  5070. /* get cert chaining depth using ssl struct */
  5071. long wolfSSL_get_verify_depth(WOLFSSL* ssl)
  5072. {
  5073. if(ssl == NULL) {
  5074. return BAD_FUNC_ARG;
  5075. }
  5076. #ifndef OPENSSL_EXTRA
  5077. return MAX_CHAIN_DEPTH;
  5078. #else
  5079. return ssl->options.verifyDepth;
  5080. #endif
  5081. }
  5082. /* get cert chaining depth using ctx struct */
  5083. long wolfSSL_CTX_get_verify_depth(WOLFSSL_CTX* ctx)
  5084. {
  5085. if (ctx == NULL) {
  5086. return BAD_FUNC_ARG;
  5087. }
  5088. #ifndef OPENSSL_EXTRA
  5089. return MAX_CHAIN_DEPTH;
  5090. #else
  5091. return ctx->verifyDepth;
  5092. #endif
  5093. }
  5094. #ifndef NO_CHECK_PRIVATE_KEY
  5095. #ifdef WOLF_PRIVATE_KEY_ID
  5096. /* Check private against public in certificate for match using external
  5097. * device with given devId */
  5098. static int check_cert_key_dev(word32 keyOID, byte* privKey, word32 privSz,
  5099. const byte* pubKey, word32 pubSz, int label, int id, void* heap, int devId)
  5100. {
  5101. int ret = 0;
  5102. int type = 0;
  5103. void *pkey = NULL;
  5104. if (privKey == NULL) {
  5105. return MISSING_KEY;
  5106. }
  5107. #ifndef NO_RSA
  5108. if (keyOID == RSAk) {
  5109. type = DYNAMIC_TYPE_RSA;
  5110. }
  5111. #ifdef WC_RSA_PSS
  5112. if (keyOID == RSAPSSk) {
  5113. type = DYNAMIC_TYPE_RSA;
  5114. }
  5115. #endif
  5116. #endif
  5117. #ifdef HAVE_ECC
  5118. if (keyOID == ECDSAk) {
  5119. type = DYNAMIC_TYPE_ECC;
  5120. }
  5121. #endif
  5122. #if defined(HAVE_PQC) && defined(HAVE_DILITHIUM)
  5123. if ((keyOID == DILITHIUM_LEVEL2k) ||
  5124. (keyOID == DILITHIUM_LEVEL3k) ||
  5125. (keyOID == DILITHIUM_LEVEL5k)) {
  5126. type = DYNAMIC_TYPE_DILITHIUM;
  5127. }
  5128. #endif
  5129. #if defined(HAVE_PQC) && defined(HAVE_FALCON)
  5130. if ((keyOID == FALCON_LEVEL1k) ||
  5131. (keyOID == FALCON_LEVEL5k)) {
  5132. type = DYNAMIC_TYPE_FALCON;
  5133. }
  5134. #endif
  5135. ret = CreateDevPrivateKey(&pkey, privKey, privSz, type, label, id,
  5136. heap, devId);
  5137. #ifdef WOLF_CRYPTO_CB
  5138. if (ret == 0) {
  5139. #ifndef NO_RSA
  5140. if (keyOID == RSAk
  5141. #ifdef WC_RSA_PSS
  5142. || keyOID == RSAPSSk
  5143. #endif
  5144. ) {
  5145. ret = wc_CryptoCb_RsaCheckPrivKey((RsaKey*)pkey, pubKey, pubSz);
  5146. }
  5147. #endif
  5148. #ifdef HAVE_ECC
  5149. if (keyOID == ECDSAk) {
  5150. ret = wc_CryptoCb_EccCheckPrivKey((ecc_key*)pkey, pubKey, pubSz);
  5151. }
  5152. #endif
  5153. #if defined(HAVE_PQC) && defined(HAVE_DILITHIUM)
  5154. if ((keyOID == DILITHIUM_LEVEL2k) ||
  5155. (keyOID == DILITHIUM_LEVEL3k) ||
  5156. (keyOID == DILITHIUM_LEVEL5k)) {
  5157. ret = wc_CryptoCb_PqcSignatureCheckPrivKey(pkey,
  5158. WC_PQC_SIG_TYPE_DILITHIUM,
  5159. pubKey, pubSz);
  5160. }
  5161. #endif
  5162. #if defined(HAVE_PQC) && defined(HAVE_FALCON)
  5163. if ((keyOID == FALCON_LEVEL1k) ||
  5164. (keyOID == FALCON_LEVEL5k)) {
  5165. ret = wc_CryptoCb_PqcSignatureCheckPrivKey(pkey,
  5166. WC_PQC_SIG_TYPE_FALCON,
  5167. pubKey, pubSz);
  5168. }
  5169. #endif
  5170. }
  5171. #else
  5172. /* devId was set, don't check, for now */
  5173. /* TODO: Add callback for private key check? */
  5174. (void) pubKey;
  5175. (void) pubSz;
  5176. #endif
  5177. if (pkey != NULL) {
  5178. #ifndef NO_RSA
  5179. if (keyOID == RSAk
  5180. #ifdef WC_RSA_PSS
  5181. || keyOID == RSAPSSk
  5182. #endif
  5183. ) {
  5184. wc_FreeRsaKey((RsaKey*)pkey);
  5185. }
  5186. #endif
  5187. #ifdef HAVE_ECC
  5188. if (keyOID == ECDSAk) {
  5189. wc_ecc_free((ecc_key*)pkey);
  5190. }
  5191. #endif
  5192. #if defined(HAVE_PQC) && defined(HAVE_DILITHIUM)
  5193. if ((keyOID == DILITHIUM_LEVEL2k) ||
  5194. (keyOID == DILITHIUM_LEVEL3k) ||
  5195. (keyOID == DILITHIUM_LEVEL5k)) {
  5196. wc_dilithium_free((dilithium_key*)pkey);
  5197. }
  5198. #endif
  5199. #if defined(HAVE_PQC) && defined(HAVE_FALCON)
  5200. if ((keyOID == FALCON_LEVEL1k) ||
  5201. (keyOID == FALCON_LEVEL5k)) {
  5202. wc_falcon_free((falcon_key*)pkey);
  5203. }
  5204. #endif
  5205. XFREE(pkey, heap, type);
  5206. }
  5207. return ret;
  5208. }
  5209. #endif /* WOLF_PRIVATE_KEY_ID */
  5210. /* Check private against public in certificate for match
  5211. *
  5212. * Returns WOLFSSL_SUCCESS on good private key
  5213. * WOLFSSL_FAILURE if mismatched */
  5214. static int check_cert_key(DerBuffer* cert, DerBuffer* key, DerBuffer* altKey,
  5215. void* heap, int devId, int isKeyLabel, int isKeyId, int altDevId,
  5216. int isAltKeyLabel, int isAltKeyId)
  5217. {
  5218. #ifdef WOLFSSL_SMALL_STACK
  5219. DecodedCert* der = NULL;
  5220. #else
  5221. DecodedCert der[1];
  5222. #endif
  5223. word32 size;
  5224. byte* buff;
  5225. int ret = WOLFSSL_FAILURE;
  5226. WOLFSSL_ENTER("check_cert_key");
  5227. if (cert == NULL || key == NULL) {
  5228. return WOLFSSL_FAILURE;
  5229. }
  5230. #ifdef WOLFSSL_SMALL_STACK
  5231. der = (DecodedCert*)XMALLOC(sizeof(DecodedCert), heap, DYNAMIC_TYPE_DCERT);
  5232. if (der == NULL)
  5233. return MEMORY_E;
  5234. #endif
  5235. size = cert->length;
  5236. buff = cert->buffer;
  5237. InitDecodedCert_ex(der, buff, size, heap, devId);
  5238. if (ParseCertRelative(der, CERT_TYPE, NO_VERIFY, NULL) != 0) {
  5239. FreeDecodedCert(der);
  5240. #ifdef WOLFSSL_SMALL_STACK
  5241. XFREE(der, heap, DYNAMIC_TYPE_DCERT);
  5242. #endif
  5243. return WOLFSSL_FAILURE;
  5244. }
  5245. size = key->length;
  5246. buff = key->buffer;
  5247. #ifdef WOLF_PRIVATE_KEY_ID
  5248. if (devId != INVALID_DEVID) {
  5249. ret = check_cert_key_dev(der->keyOID, buff, size, der->publicKey,
  5250. der->pubKeySize, isKeyLabel, isKeyId, heap,
  5251. devId);
  5252. if (ret != CRYPTOCB_UNAVAILABLE) {
  5253. ret = (ret == 0) ? WOLFSSL_SUCCESS: WOLFSSL_FAILURE;
  5254. }
  5255. }
  5256. else {
  5257. /* fall through if unavailable */
  5258. ret = CRYPTOCB_UNAVAILABLE;
  5259. }
  5260. if (ret == CRYPTOCB_UNAVAILABLE)
  5261. #endif /* WOLF_PRIVATE_KEY_ID */
  5262. {
  5263. ret = wc_CheckPrivateKeyCert(buff, size, der, 0);
  5264. ret = (ret == 1) ? WOLFSSL_SUCCESS: WOLFSSL_FAILURE;
  5265. }
  5266. #ifdef WOLFSSL_DUAL_ALG_CERTS
  5267. if (ret == WOLFSSL_SUCCESS && der->extSapkiSet && der->sapkiDer != NULL) {
  5268. /* Certificate contains an alternative public key. Hence, we also
  5269. * need an alternative private key. */
  5270. if (altKey == NULL) {
  5271. ret = MISSING_KEY;
  5272. buff = NULL;
  5273. size = 0;
  5274. }
  5275. else {
  5276. size = altKey->length;
  5277. buff = altKey->buffer;
  5278. }
  5279. #ifdef WOLF_PRIVATE_KEY_ID
  5280. if (ret == WOLFSSL_SUCCESS && altDevId != INVALID_DEVID) {
  5281. /* We have to decode the public key first */
  5282. word32 idx = 0;
  5283. /* Dilithium has the largest public key at the moment */
  5284. word32 pubKeyLen = DILITHIUM_MAX_PUB_KEY_SIZE;
  5285. byte* decodedPubKey = (byte*)XMALLOC(pubKeyLen, heap,
  5286. DYNAMIC_TYPE_PUBLIC_KEY);
  5287. if (decodedPubKey == NULL) {
  5288. ret = MEMORY_E;
  5289. }
  5290. if (ret == WOLFSSL_SUCCESS) {
  5291. if (der->sapkiOID == RSAk || der->sapkiOID == ECDSAk) {
  5292. /* Simply copy the data */
  5293. XMEMCPY(decodedPubKey, der->sapkiDer, der->sapkiLen);
  5294. pubKeyLen = der->sapkiLen;
  5295. ret = 0;
  5296. }
  5297. else {
  5298. ret = DecodeAsymKeyPublic(der->sapkiDer, &idx,
  5299. der->sapkiLen, decodedPubKey,
  5300. &pubKeyLen, der->sapkiOID);
  5301. }
  5302. }
  5303. if (ret == 0) {
  5304. ret = check_cert_key_dev(der->sapkiOID, buff, size,
  5305. decodedPubKey, pubKeyLen,
  5306. isAltKeyLabel, isAltKeyId,
  5307. heap, altDevId);
  5308. }
  5309. XFREE(decodedPubKey, heap, DYNAMIC_TYPE_PUBLIC_KEY);
  5310. if (ret != CRYPTOCB_UNAVAILABLE) {
  5311. ret = (ret == 0) ? WOLFSSL_SUCCESS: WOLFSSL_FAILURE;
  5312. }
  5313. }
  5314. else {
  5315. /* fall through if unavailable */
  5316. ret = CRYPTOCB_UNAVAILABLE;
  5317. }
  5318. if (ret == CRYPTOCB_UNAVAILABLE)
  5319. #endif /* WOLF_PRIVATE_KEY_ID */
  5320. {
  5321. ret = wc_CheckPrivateKeyCert(buff, size, der, 1);
  5322. ret = (ret == 1) ? WOLFSSL_SUCCESS: WOLFSSL_FAILURE;
  5323. }
  5324. }
  5325. #endif /* WOLFSSL_DUAL_ALG_CERTS */
  5326. FreeDecodedCert(der);
  5327. #ifdef WOLFSSL_SMALL_STACK
  5328. XFREE(der, heap, DYNAMIC_TYPE_DCERT);
  5329. #endif
  5330. (void)devId;
  5331. (void)isKeyLabel;
  5332. (void)isKeyId;
  5333. (void)altKey;
  5334. (void)altDevId;
  5335. (void)isAltKeyLabel;
  5336. (void)isAltKeyId;
  5337. return ret;
  5338. }
  5339. /* Check private against public in certificate for match
  5340. *
  5341. * ctx WOLFSSL_CTX structure to check private key in
  5342. *
  5343. * Returns WOLFSSL_SUCCESS on good private key
  5344. * WOLFSSL_FAILURE if mismatched. */
  5345. int wolfSSL_CTX_check_private_key(const WOLFSSL_CTX* ctx)
  5346. {
  5347. if (ctx == NULL) {
  5348. return WOLFSSL_FAILURE;
  5349. }
  5350. #ifdef WOLFSSL_DUAL_ALG_CERTS
  5351. return check_cert_key(ctx->certificate, ctx->privateKey, ctx->altPrivateKey,
  5352. ctx->heap, ctx->privateKeyDevId, ctx->privateKeyLabel,
  5353. ctx->privateKeyId, ctx->altPrivateKeyDevId, ctx->altPrivateKeyLabel,
  5354. ctx->altPrivateKeyId);
  5355. #else
  5356. return check_cert_key(ctx->certificate, ctx->privateKey, NULL, ctx->heap,
  5357. ctx->privateKeyDevId, ctx->privateKeyLabel, ctx->privateKeyId,
  5358. INVALID_DEVID, 0, 0);
  5359. #endif
  5360. }
  5361. #endif /* !NO_CHECK_PRIVATE_KEY */
  5362. #ifdef OPENSSL_ALL
  5363. /**
  5364. * Return the private key of the WOLFSSL_CTX struct
  5365. * @return WOLFSSL_EVP_PKEY* The caller doesn *NOT*` free the returned object.
  5366. */
  5367. WOLFSSL_EVP_PKEY* wolfSSL_CTX_get0_privatekey(const WOLFSSL_CTX* ctx)
  5368. {
  5369. const unsigned char *key;
  5370. int type;
  5371. WOLFSSL_ENTER("wolfSSL_CTX_get0_privatekey");
  5372. if (ctx == NULL || ctx->privateKey == NULL ||
  5373. ctx->privateKey->buffer == NULL) {
  5374. WOLFSSL_MSG("Bad parameter or key not set");
  5375. return NULL;
  5376. }
  5377. switch (ctx->privateKeyType) {
  5378. #ifndef NO_RSA
  5379. case rsa_sa_algo:
  5380. type = EVP_PKEY_RSA;
  5381. break;
  5382. #endif
  5383. #ifdef HAVE_ECC
  5384. case ecc_dsa_sa_algo:
  5385. type = EVP_PKEY_EC;
  5386. break;
  5387. #endif
  5388. #ifdef WOLFSSL_SM2
  5389. case sm2_sa_algo:
  5390. type = EVP_PKEY_EC;
  5391. break;
  5392. #endif
  5393. default:
  5394. /* Other key types not supported either as ssl private keys
  5395. * or in the EVP layer */
  5396. WOLFSSL_MSG("Unsupported key type");
  5397. return NULL;
  5398. }
  5399. key = ctx->privateKey->buffer;
  5400. if (ctx->privateKeyPKey != NULL)
  5401. return ctx->privateKeyPKey;
  5402. else
  5403. return wolfSSL_d2i_PrivateKey(type,
  5404. (WOLFSSL_EVP_PKEY**)&ctx->privateKeyPKey, &key,
  5405. (long)ctx->privateKey->length);
  5406. }
  5407. #endif
  5408. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  5409. #if !defined(NO_RSA)
  5410. static int d2iTryRsaKey(WOLFSSL_EVP_PKEY** out, const unsigned char* mem,
  5411. long memSz, int priv)
  5412. {
  5413. WOLFSSL_EVP_PKEY* pkey;
  5414. word32 keyIdx = 0;
  5415. int isRsaKey;
  5416. int ret = 1;
  5417. #ifndef WOLFSSL_SMALL_STACK
  5418. RsaKey rsa[1];
  5419. #else
  5420. RsaKey *rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
  5421. if (rsa == NULL)
  5422. return 0;
  5423. #endif
  5424. XMEMSET(rsa, 0, sizeof(RsaKey));
  5425. if (wc_InitRsaKey(rsa, NULL) != 0) {
  5426. #ifdef WOLFSSL_SMALL_STACK
  5427. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5428. #endif
  5429. return 0;
  5430. }
  5431. /* test if RSA key */
  5432. if (priv) {
  5433. isRsaKey =
  5434. (wc_RsaPrivateKeyDecode(mem, &keyIdx, rsa, (word32)memSz) == 0);
  5435. }
  5436. else {
  5437. isRsaKey =
  5438. (wc_RsaPublicKeyDecode(mem, &keyIdx, rsa, (word32)memSz) == 0);
  5439. }
  5440. wc_FreeRsaKey(rsa);
  5441. #ifdef WOLFSSL_SMALL_STACK
  5442. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5443. #endif
  5444. if (!isRsaKey) {
  5445. return -1;
  5446. }
  5447. if (*out != NULL) {
  5448. pkey = *out;
  5449. }
  5450. else {
  5451. pkey = wolfSSL_EVP_PKEY_new();
  5452. if (pkey == NULL) {
  5453. WOLFSSL_MSG("RSA wolfSSL_EVP_PKEY_new error");
  5454. return 0;
  5455. }
  5456. }
  5457. pkey->pkey_sz = keyIdx;
  5458. pkey->pkey.ptr = (char*)XMALLOC(memSz, NULL,
  5459. priv ? DYNAMIC_TYPE_PRIVATE_KEY :
  5460. DYNAMIC_TYPE_PUBLIC_KEY);
  5461. if (pkey->pkey.ptr == NULL) {
  5462. ret = 0;
  5463. }
  5464. if (ret == 1) {
  5465. XMEMCPY(pkey->pkey.ptr, mem, keyIdx);
  5466. pkey->type = EVP_PKEY_RSA;
  5467. pkey->ownRsa = 1;
  5468. pkey->rsa = wolfssl_rsa_d2i(NULL, mem, memSz,
  5469. priv ? WOLFSSL_RSA_LOAD_PRIVATE : WOLFSSL_RSA_LOAD_PUBLIC);
  5470. if (pkey->rsa == NULL) {
  5471. ret = 0;
  5472. }
  5473. }
  5474. if (ret == 1) {
  5475. *out = pkey;
  5476. }
  5477. if ((ret == 0) && (*out == NULL)) {
  5478. wolfSSL_EVP_PKEY_free(pkey);
  5479. }
  5480. return ret;
  5481. }
  5482. #endif /* !NO_RSA */
  5483. #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
  5484. static int d2iTryEccKey(WOLFSSL_EVP_PKEY** out, const unsigned char* mem,
  5485. long memSz, int priv)
  5486. {
  5487. WOLFSSL_EVP_PKEY* pkey;
  5488. word32 keyIdx = 0;
  5489. int isEccKey;
  5490. int ret = 1;
  5491. #ifndef WOLFSSL_SMALL_STACK
  5492. ecc_key ecc[1];
  5493. #else
  5494. ecc_key *ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL,
  5495. DYNAMIC_TYPE_ECC);
  5496. if (ecc == NULL)
  5497. return 0;
  5498. #endif
  5499. XMEMSET(ecc, 0, sizeof(ecc_key));
  5500. if (wc_ecc_init(ecc) != 0) {
  5501. #ifdef WOLFSSL_SMALL_STACK
  5502. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5503. #endif
  5504. return 0;
  5505. }
  5506. if (priv) {
  5507. isEccKey =
  5508. (wc_EccPrivateKeyDecode(mem, &keyIdx, ecc, (word32)memSz) == 0);
  5509. }
  5510. else {
  5511. isEccKey =
  5512. (wc_EccPublicKeyDecode(mem, &keyIdx, ecc, (word32)memSz) == 0);
  5513. }
  5514. wc_ecc_free(ecc);
  5515. #ifdef WOLFSSL_SMALL_STACK
  5516. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5517. #endif
  5518. if (!isEccKey) {
  5519. return -1;
  5520. }
  5521. if (*out != NULL) {
  5522. pkey = *out;
  5523. }
  5524. else {
  5525. pkey = wolfSSL_EVP_PKEY_new();
  5526. if (pkey == NULL) {
  5527. WOLFSSL_MSG("ECC wolfSSL_EVP_PKEY_new error");
  5528. return 0;
  5529. }
  5530. }
  5531. pkey->pkey_sz = keyIdx;
  5532. pkey->pkey.ptr = (char*)XMALLOC(keyIdx, NULL,
  5533. priv ? DYNAMIC_TYPE_PRIVATE_KEY :
  5534. DYNAMIC_TYPE_PUBLIC_KEY);
  5535. if (pkey->pkey.ptr == NULL) {
  5536. ret = 0;
  5537. }
  5538. if (ret == 1) {
  5539. XMEMCPY(pkey->pkey.ptr, mem, keyIdx);
  5540. pkey->type = EVP_PKEY_EC;
  5541. pkey->ownEcc = 1;
  5542. pkey->ecc = wolfSSL_EC_KEY_new();
  5543. if (pkey->ecc == NULL) {
  5544. ret = 0;
  5545. }
  5546. }
  5547. if ((ret == 1) && (wolfSSL_EC_KEY_LoadDer_ex(pkey->ecc,
  5548. (const unsigned char*)pkey->pkey.ptr,
  5549. pkey->pkey_sz, priv ? WOLFSSL_RSA_LOAD_PRIVATE
  5550. : WOLFSSL_RSA_LOAD_PUBLIC) != 1)) {
  5551. ret = 0;
  5552. }
  5553. if (ret == 1) {
  5554. *out = pkey;
  5555. }
  5556. if ((ret == 0) && (*out == NULL)) {
  5557. wolfSSL_EVP_PKEY_free(pkey);
  5558. }
  5559. return ret;
  5560. }
  5561. #endif /* HAVE_ECC && OPENSSL_EXTRA */
  5562. #if !defined(NO_DSA)
  5563. static int d2iTryDsaKey(WOLFSSL_EVP_PKEY** out, const unsigned char* mem,
  5564. long memSz, int priv)
  5565. {
  5566. WOLFSSL_EVP_PKEY* pkey;
  5567. word32 keyIdx = 0;
  5568. int isDsaKey;
  5569. int ret = 1;
  5570. #ifndef WOLFSSL_SMALL_STACK
  5571. DsaKey dsa[1];
  5572. #else
  5573. DsaKey *dsa = (DsaKey*)XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
  5574. if (dsa == NULL)
  5575. return 0;
  5576. #endif
  5577. XMEMSET(dsa, 0, sizeof(DsaKey));
  5578. if (wc_InitDsaKey(dsa) != 0) {
  5579. #ifdef WOLFSSL_SMALL_STACK
  5580. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  5581. #endif
  5582. return 0;
  5583. }
  5584. if (priv) {
  5585. isDsaKey =
  5586. (wc_DsaPrivateKeyDecode(mem, &keyIdx, dsa, (word32)memSz) == 0);
  5587. }
  5588. else {
  5589. isDsaKey =
  5590. (wc_DsaPublicKeyDecode(mem, &keyIdx, dsa, (word32)memSz) == 0);
  5591. }
  5592. wc_FreeDsaKey(dsa);
  5593. #ifdef WOLFSSL_SMALL_STACK
  5594. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  5595. #endif
  5596. /* test if DSA key */
  5597. if (!isDsaKey) {
  5598. return -1;
  5599. }
  5600. if (*out != NULL) {
  5601. pkey = *out;
  5602. }
  5603. else {
  5604. pkey = wolfSSL_EVP_PKEY_new();
  5605. if (pkey == NULL) {
  5606. WOLFSSL_MSG("DSA wolfSSL_EVP_PKEY_new error");
  5607. return 0;
  5608. }
  5609. }
  5610. pkey->pkey_sz = keyIdx;
  5611. pkey->pkey.ptr = (char*)XMALLOC(memSz, NULL,
  5612. priv ? DYNAMIC_TYPE_PRIVATE_KEY :
  5613. DYNAMIC_TYPE_PUBLIC_KEY);
  5614. if (pkey->pkey.ptr == NULL) {
  5615. ret = 0;
  5616. }
  5617. if (ret == 1) {
  5618. XMEMCPY(pkey->pkey.ptr, mem, keyIdx);
  5619. pkey->type = EVP_PKEY_DSA;
  5620. pkey->ownDsa = 1;
  5621. pkey->dsa = wolfSSL_DSA_new();
  5622. if (pkey->dsa == NULL) {
  5623. ret = 0;
  5624. }
  5625. }
  5626. if ((ret == 1) && (wolfSSL_DSA_LoadDer_ex(pkey->dsa,
  5627. (const unsigned char*)pkey->pkey.ptr,
  5628. pkey->pkey_sz, priv ? WOLFSSL_RSA_LOAD_PRIVATE
  5629. : WOLFSSL_RSA_LOAD_PUBLIC) != 1)) {
  5630. ret = 0;
  5631. }
  5632. if (ret == 1) {
  5633. *out = pkey;
  5634. }
  5635. if ((ret == 0) && (*out == NULL)) {
  5636. wolfSSL_EVP_PKEY_free(pkey);
  5637. }
  5638. return ret;
  5639. }
  5640. #endif /* NO_DSA */
  5641. #if !defined(NO_DH) && (defined(WOLFSSL_QT) || defined(OPENSSL_ALL))
  5642. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && \
  5643. (HAVE_FIPS_VERSION > 2))
  5644. static int d2iTryDhKey(WOLFSSL_EVP_PKEY** out, const unsigned char* mem,
  5645. long memSz, int priv)
  5646. {
  5647. WOLFSSL_EVP_PKEY* pkey;
  5648. int isDhKey;
  5649. word32 keyIdx = 0;
  5650. int ret = 1;
  5651. #ifndef WOLFSSL_SMALL_STACK
  5652. DhKey dh[1];
  5653. #else
  5654. DhKey *dh = (DhKey*)XMALLOC(sizeof(DhKey), NULL, DYNAMIC_TYPE_DH);
  5655. if (dh == NULL)
  5656. return 0;
  5657. #endif
  5658. XMEMSET(dh, 0, sizeof(DhKey));
  5659. if (wc_InitDhKey(dh) != 0) {
  5660. #ifdef WOLFSSL_SMALL_STACK
  5661. XFREE(dh, NULL, DYNAMIC_TYPE_DH);
  5662. #endif
  5663. return 0;
  5664. }
  5665. isDhKey = (wc_DhKeyDecode(mem, &keyIdx, dh, (word32)memSz) == 0);
  5666. wc_FreeDhKey(dh);
  5667. #ifdef WOLFSSL_SMALL_STACK
  5668. XFREE(dh, NULL, DYNAMIC_TYPE_DH);
  5669. #endif
  5670. /* test if DH key */
  5671. if (!isDhKey) {
  5672. return -1;
  5673. }
  5674. if (*out != NULL) {
  5675. pkey = *out;
  5676. }
  5677. else {
  5678. pkey = wolfSSL_EVP_PKEY_new();
  5679. if (pkey == NULL) {
  5680. WOLFSSL_MSG("DH wolfSSL_EVP_PKEY_new error");
  5681. return 0;
  5682. }
  5683. }
  5684. pkey->pkey_sz = (int)memSz;
  5685. pkey->pkey.ptr = (char*)XMALLOC(memSz, NULL,
  5686. priv ? DYNAMIC_TYPE_PRIVATE_KEY :
  5687. DYNAMIC_TYPE_PUBLIC_KEY);
  5688. if (pkey->pkey.ptr == NULL) {
  5689. ret = 0;
  5690. }
  5691. if (ret == 1) {
  5692. XMEMCPY(pkey->pkey.ptr, mem, memSz);
  5693. pkey->type = EVP_PKEY_DH;
  5694. pkey->ownDh = 1;
  5695. pkey->dh = wolfSSL_DH_new();
  5696. if (pkey->dh == NULL) {
  5697. ret = 0;
  5698. }
  5699. }
  5700. if ((ret == 1) && (wolfSSL_DH_LoadDer(pkey->dh,
  5701. (const unsigned char*)pkey->pkey.ptr,
  5702. pkey->pkey_sz) != WOLFSSL_SUCCESS)) {
  5703. ret = 0;
  5704. }
  5705. if (ret == 1) {
  5706. *out = pkey;
  5707. }
  5708. if ((ret == 0) && (*out == NULL)) {
  5709. wolfSSL_EVP_PKEY_free(pkey);
  5710. }
  5711. return ret;
  5712. }
  5713. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  5714. #endif /* !NO_DH && (WOLFSSL_QT || OPENSSL_ALL) */
  5715. #if !defined(NO_DH) && defined(OPENSSL_EXTRA) && defined(WOLFSSL_DH_EXTRA)
  5716. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && \
  5717. (HAVE_FIPS_VERSION > 2))
  5718. static int d2iTryAltDhKey(WOLFSSL_EVP_PKEY** out, const unsigned char* mem,
  5719. long memSz, int priv)
  5720. {
  5721. WOLFSSL_EVP_PKEY* pkey;
  5722. word32 keyIdx = 0;
  5723. DhKey* key = NULL;
  5724. int elements;
  5725. int ret;
  5726. #ifndef WOLFSSL_SMALL_STACK
  5727. DhKey dh[1];
  5728. #else
  5729. DhKey* dh = (DhKey*)XMALLOC(sizeof(DhKey), NULL, DYNAMIC_TYPE_DH);
  5730. if (dh == NULL)
  5731. return 0;
  5732. #endif
  5733. XMEMSET(dh, 0, sizeof(DhKey));
  5734. /* test if DH-public key */
  5735. if (wc_InitDhKey(dh) != 0) {
  5736. #ifdef WOLFSSL_SMALL_STACK
  5737. XFREE(dh, NULL, DYNAMIC_TYPE_DH);
  5738. #endif
  5739. return 0;
  5740. }
  5741. ret = wc_DhKeyDecode(mem, &keyIdx, dh, (word32)memSz);
  5742. wc_FreeDhKey(dh);
  5743. #ifdef WOLFSSL_SMALL_STACK
  5744. XFREE(dh, NULL, DYNAMIC_TYPE_DH);
  5745. #endif
  5746. if (ret != 0) {
  5747. return -1;
  5748. }
  5749. if (*out != NULL) {
  5750. pkey = *out;
  5751. }
  5752. else {
  5753. pkey = wolfSSL_EVP_PKEY_new();
  5754. if (pkey == NULL) {
  5755. return 0;
  5756. }
  5757. }
  5758. ret = 1;
  5759. pkey->type = EVP_PKEY_DH;
  5760. pkey->pkey_sz = (int)memSz;
  5761. pkey->pkey.ptr = (char*)XMALLOC(memSz, NULL,
  5762. priv ? DYNAMIC_TYPE_PRIVATE_KEY :
  5763. DYNAMIC_TYPE_PUBLIC_KEY);
  5764. if (pkey->pkey.ptr == NULL) {
  5765. ret = 0;
  5766. }
  5767. if (ret == 1) {
  5768. XMEMCPY(pkey->pkey.ptr, mem, memSz);
  5769. pkey->ownDh = 1;
  5770. pkey->dh = wolfSSL_DH_new();
  5771. if (pkey->dh == NULL) {
  5772. ret = 0;
  5773. }
  5774. }
  5775. if (ret == 1) {
  5776. key = (DhKey*)pkey->dh->internal;
  5777. keyIdx = 0;
  5778. if (wc_DhKeyDecode(mem, &keyIdx, key, (word32)memSz) != 0) {
  5779. ret = 0;
  5780. }
  5781. }
  5782. if (ret == 1) {
  5783. elements = ELEMENT_P | ELEMENT_G | ELEMENT_Q | ELEMENT_PUB;
  5784. if (priv) {
  5785. elements |= ELEMENT_PRV;
  5786. }
  5787. if (SetDhExternal_ex(pkey->dh, elements) != WOLFSSL_SUCCESS ) {
  5788. ret = 0;
  5789. }
  5790. }
  5791. if (ret == 1) {
  5792. *out = pkey;
  5793. }
  5794. if ((ret == 0) && (*out == NULL)) {
  5795. wolfSSL_EVP_PKEY_free(pkey);
  5796. }
  5797. return ret;
  5798. }
  5799. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  5800. #endif /* !NO_DH && OPENSSL_EXTRA && WOLFSSL_DH_EXTRA */
  5801. #ifdef HAVE_PQC
  5802. #ifdef HAVE_FALCON
  5803. static int d2iTryFalconKey(WOLFSSL_EVP_PKEY** out, const unsigned char* mem,
  5804. long memSz, int priv)
  5805. {
  5806. WOLFSSL_EVP_PKEY* pkey;
  5807. int isFalcon = 0;
  5808. #ifndef WOLFSSL_SMALL_STACK
  5809. falcon_key falcon[1];
  5810. #else
  5811. falcon_key *falcon = (falcon_key *)XMALLOC(sizeof(falcon_key), NULL,
  5812. DYNAMIC_TYPE_FALCON);
  5813. if (falcon == NULL) {
  5814. return 0;
  5815. }
  5816. #endif
  5817. if (wc_falcon_init(falcon) != 0) {
  5818. #ifdef WOLFSSL_SMALL_STACK
  5819. XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
  5820. #endif
  5821. return 0;
  5822. }
  5823. /* test if Falcon key */
  5824. if (priv) {
  5825. /* Try level 1 */
  5826. isFalcon = ((wc_falcon_set_level(falcon, 1) == 0) &&
  5827. (wc_falcon_import_private_only(mem, (word32)memSz,
  5828. falcon) == 0));
  5829. if (!isFalcon) {
  5830. /* Try level 5 */
  5831. isFalcon = ((wc_falcon_set_level(falcon, 5) == 0) &&
  5832. (wc_falcon_import_private_only(mem, (word32)memSz,
  5833. falcon) == 0));
  5834. }
  5835. }
  5836. else {
  5837. /* Try level 1 */
  5838. isFalcon = ((wc_falcon_set_level(falcon, 1) == 0) &&
  5839. (wc_falcon_import_public(mem, (word32)memSz, falcon) == 0));
  5840. if (!isFalcon) {
  5841. /* Try level 5 */
  5842. isFalcon = ((wc_falcon_set_level(falcon, 5) == 0) &&
  5843. (wc_falcon_import_public(mem, (word32)memSz,
  5844. falcon) == 0));
  5845. }
  5846. }
  5847. wc_falcon_free(falcon);
  5848. #ifdef WOLFSSL_SMALL_STACK
  5849. XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
  5850. #endif
  5851. if (!isFalcon) {
  5852. return -1;
  5853. }
  5854. if (*out != NULL) {
  5855. pkey = *out;
  5856. }
  5857. else {
  5858. /* Create a fake Falcon EVP_PKEY. In the future, we might integrate
  5859. * Falcon into the compatibility layer. */
  5860. pkey = wolfSSL_EVP_PKEY_new();
  5861. if (pkey == NULL) {
  5862. WOLFSSL_MSG("Falcon wolfSSL_EVP_PKEY_new error");
  5863. return 0;
  5864. }
  5865. }
  5866. pkey->type = EVP_PKEY_FALCON;
  5867. pkey->pkey.ptr = NULL;
  5868. pkey->pkey_sz = 0;
  5869. *out = pkey;
  5870. return 1;
  5871. }
  5872. #endif /* HAVE_FALCON */
  5873. #ifdef HAVE_DILITHIUM
  5874. static int d2iTryDilithiumKey(WOLFSSL_EVP_PKEY** out, const unsigned char* mem,
  5875. long memSz, int priv)
  5876. {
  5877. WOLFSSL_EVP_PKEY* pkey;
  5878. int isDilithium = 0;
  5879. #ifndef WOLFSSL_SMALL_STACK
  5880. dilithium_key dilithium[1];
  5881. #else
  5882. dilithium_key *dilithium = (dilithium_key *)
  5883. XMALLOC(sizeof(dilithium_key), NULL, DYNAMIC_TYPE_DILITHIUM);
  5884. if (dilithium == NULL) {
  5885. return 0;
  5886. }
  5887. #endif
  5888. if (wc_dilithium_init(dilithium) != 0) {
  5889. #ifdef WOLFSSL_SMALL_STACK
  5890. XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
  5891. #endif
  5892. return 0;
  5893. }
  5894. /* Test if Dilithium key. Try all levels. */
  5895. if (priv) {
  5896. isDilithium = ((wc_dilithium_set_level(dilithium, 2) == 0) &&
  5897. (wc_dilithium_import_private_only(mem,
  5898. (word32)memSz, dilithium) == 0));
  5899. if (!isDilithium) {
  5900. isDilithium = ((wc_dilithium_set_level(dilithium, 3) == 0) &&
  5901. (wc_dilithium_import_private_only(mem,
  5902. (word32)memSz, dilithium) == 0));
  5903. }
  5904. if (!isDilithium) {
  5905. isDilithium = ((wc_dilithium_set_level(dilithium, 5) == 0) &&
  5906. (wc_dilithium_import_private_only(mem,
  5907. (word32)memSz, dilithium) == 0));
  5908. }
  5909. }
  5910. else {
  5911. isDilithium = ((wc_dilithium_set_level(dilithium, 2) == 0) &&
  5912. (wc_dilithium_import_public(mem, (word32)memSz,
  5913. dilithium) == 0));
  5914. if (!isDilithium) {
  5915. isDilithium = ((wc_dilithium_set_level(dilithium, 3) == 0) &&
  5916. (wc_dilithium_import_public(mem, (word32)memSz,
  5917. dilithium) == 0));
  5918. }
  5919. if (!isDilithium) {
  5920. isDilithium = ((wc_dilithium_set_level(dilithium, 5) == 0) &&
  5921. (wc_dilithium_import_public(mem, (word32)memSz,
  5922. dilithium) == 0));
  5923. }
  5924. }
  5925. wc_dilithium_free(dilithium);
  5926. #ifdef WOLFSSL_SMALL_STACK
  5927. XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
  5928. #endif
  5929. if (!isDilithium) {
  5930. return -1;
  5931. }
  5932. if (*out != NULL) {
  5933. pkey = *out;
  5934. }
  5935. else {
  5936. /* Create a fake Dilithium EVP_PKEY. In the future, we might
  5937. * integrate Dilithium into the compatibility layer. */
  5938. pkey = wolfSSL_EVP_PKEY_new();
  5939. if (pkey == NULL) {
  5940. WOLFSSL_MSG("Dilithium wolfSSL_EVP_PKEY_new error");
  5941. return 0;
  5942. }
  5943. }
  5944. pkey->type = EVP_PKEY_DILITHIUM;
  5945. pkey->pkey.ptr = NULL;
  5946. pkey->pkey_sz = 0;
  5947. *out = pkey;
  5948. return 1;
  5949. }
  5950. #endif /* HAVE_DILITHIUM */
  5951. #endif /* HAVE_PQC */
  5952. static WOLFSSL_EVP_PKEY* d2iGenericKey(WOLFSSL_EVP_PKEY** out,
  5953. const unsigned char** in, long inSz, int priv)
  5954. {
  5955. WOLFSSL_EVP_PKEY* pkey = NULL;
  5956. WOLFSSL_ENTER("d2iGenericKey");
  5957. if (in == NULL || *in == NULL || inSz < 0) {
  5958. WOLFSSL_MSG("Bad argument");
  5959. return NULL;
  5960. }
  5961. if ((out != NULL) && (*out != NULL)) {
  5962. pkey = *out;
  5963. }
  5964. #if !defined(NO_RSA)
  5965. if (d2iTryRsaKey(&pkey, *in, inSz, priv) >= 0) {
  5966. ;
  5967. }
  5968. else
  5969. #endif /* NO_RSA */
  5970. #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
  5971. if (d2iTryEccKey(&pkey, *in, inSz, priv) >= 0) {
  5972. ;
  5973. }
  5974. else
  5975. #endif /* HAVE_ECC && OPENSSL_EXTRA */
  5976. #if !defined(NO_DSA)
  5977. if (d2iTryDsaKey(&pkey, *in, inSz, priv) >= 0) {
  5978. ;
  5979. }
  5980. else
  5981. #endif /* NO_DSA */
  5982. #if !defined(NO_DH) && (defined(WOLFSSL_QT) || defined(OPENSSL_ALL))
  5983. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && \
  5984. (HAVE_FIPS_VERSION > 2))
  5985. if (d2iTryDhKey(&pkey, *in, inSz, priv) >= 0) {
  5986. ;
  5987. }
  5988. else
  5989. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  5990. #endif /* !NO_DH && (WOLFSSL_QT || OPENSSL_ALL) */
  5991. #if !defined(NO_DH) && defined(OPENSSL_EXTRA) && defined(WOLFSSL_DH_EXTRA)
  5992. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && \
  5993. (HAVE_FIPS_VERSION > 2))
  5994. if (d2iTryAltDhKey(&pkey, *in, inSz, priv) >= 0) {
  5995. ;
  5996. }
  5997. else
  5998. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  5999. #endif /* !NO_DH && OPENSSL_EXTRA && WOLFSSL_DH_EXTRA */
  6000. #ifdef HAVE_PQC
  6001. #ifdef HAVE_FALCON
  6002. if (d2iTryFalconKey(&pkey, *in, inSz, priv) >= 0) {
  6003. ;
  6004. }
  6005. else
  6006. #endif /* HAVE_FALCON */
  6007. #ifdef HAVE_DILITHIUM
  6008. if (d2iTryDilithiumKey(&pkey, *in, inSz, priv) >= 0) {
  6009. ;
  6010. }
  6011. else
  6012. #endif /* HAVE_DILITHIUM */
  6013. #endif /* HAVE_PQC */
  6014. {
  6015. WOLFSSL_MSG("wolfSSL_d2i_PUBKEY couldn't determine key type");
  6016. }
  6017. if ((pkey != NULL) && (out != NULL)) {
  6018. *out = pkey;
  6019. }
  6020. return pkey;
  6021. }
  6022. #endif /* OPENSSL_EXTRA || WPA_SMALL */
  6023. #ifdef OPENSSL_EXTRA
  6024. WOLFSSL_PKCS8_PRIV_KEY_INFO* wolfSSL_d2i_PKCS8_PKEY(
  6025. WOLFSSL_PKCS8_PRIV_KEY_INFO** pkey, const unsigned char** keyBuf,
  6026. long keyLen)
  6027. {
  6028. WOLFSSL_PKCS8_PRIV_KEY_INFO* pkcs8 = NULL;
  6029. #ifdef WOLFSSL_PEM_TO_DER
  6030. int ret;
  6031. DerBuffer* der = NULL;
  6032. if (keyBuf == NULL || *keyBuf == NULL || keyLen <= 0) {
  6033. WOLFSSL_MSG("Bad key PEM/DER args");
  6034. return NULL;
  6035. }
  6036. ret = PemToDer(*keyBuf, keyLen, PRIVATEKEY_TYPE, &der, NULL, NULL, NULL);
  6037. if (ret < 0) {
  6038. WOLFSSL_MSG("Not PEM format");
  6039. ret = AllocDer(&der, (word32)keyLen, PRIVATEKEY_TYPE, NULL);
  6040. if (ret == 0) {
  6041. XMEMCPY(der->buffer, *keyBuf, keyLen);
  6042. }
  6043. }
  6044. if (ret == 0) {
  6045. /* Verify this is PKCS8 Key */
  6046. word32 inOutIdx = 0;
  6047. word32 algId;
  6048. ret = ToTraditionalInline_ex(der->buffer, &inOutIdx, der->length,
  6049. &algId);
  6050. if (ret >= 0) {
  6051. ret = 0; /* good DER */
  6052. }
  6053. }
  6054. if (ret == 0) {
  6055. pkcs8 = wolfSSL_EVP_PKEY_new();
  6056. if (pkcs8 == NULL)
  6057. ret = MEMORY_E;
  6058. }
  6059. if (ret == 0) {
  6060. pkcs8->pkey.ptr = (char*)XMALLOC(der->length, NULL,
  6061. DYNAMIC_TYPE_PUBLIC_KEY);
  6062. if (pkcs8->pkey.ptr == NULL)
  6063. ret = MEMORY_E;
  6064. }
  6065. if (ret == 0) {
  6066. XMEMCPY(pkcs8->pkey.ptr, der->buffer, der->length);
  6067. pkcs8->pkey_sz = der->length;
  6068. }
  6069. FreeDer(&der);
  6070. if (ret != 0) {
  6071. wolfSSL_EVP_PKEY_free(pkcs8);
  6072. pkcs8 = NULL;
  6073. }
  6074. if (pkey != NULL) {
  6075. *pkey = pkcs8;
  6076. }
  6077. #else
  6078. (void)bio;
  6079. (void)pkey;
  6080. #endif /* WOLFSSL_PEM_TO_DER */
  6081. return pkcs8;
  6082. }
  6083. #ifndef NO_BIO
  6084. /* put SSL type in extra for now, not very common */
  6085. /* Converts a DER format key read from "bio" to a PKCS8 structure.
  6086. *
  6087. * bio input bio to read DER from
  6088. * pkey If not NULL then this pointer will be overwritten with a new PKCS8
  6089. * structure.
  6090. *
  6091. * returns a WOLFSSL_PKCS8_PRIV_KEY_INFO pointer on success and NULL in fail
  6092. * case.
  6093. */
  6094. WOLFSSL_PKCS8_PRIV_KEY_INFO* wolfSSL_d2i_PKCS8_PKEY_bio(WOLFSSL_BIO* bio,
  6095. WOLFSSL_PKCS8_PRIV_KEY_INFO** pkey)
  6096. {
  6097. WOLFSSL_PKCS8_PRIV_KEY_INFO* pkcs8 = NULL;
  6098. #ifdef WOLFSSL_PEM_TO_DER
  6099. unsigned char* mem = NULL;
  6100. int memSz;
  6101. WOLFSSL_ENTER("wolfSSL_d2i_PKCS8_PKEY_bio");
  6102. if (bio == NULL) {
  6103. return NULL;
  6104. }
  6105. if ((memSz = wolfSSL_BIO_get_mem_data(bio, &mem)) < 0) {
  6106. return NULL;
  6107. }
  6108. pkcs8 = wolfSSL_d2i_PKCS8_PKEY(pkey, (const unsigned char**)&mem, memSz);
  6109. #else
  6110. (void)bio;
  6111. (void)pkey;
  6112. #endif /* WOLFSSL_PEM_TO_DER */
  6113. return pkcs8;
  6114. }
  6115. /* expecting DER format public key
  6116. *
  6117. * bio input bio to read DER from
  6118. * out If not NULL then this pointer will be overwritten with a new
  6119. * WOLFSSL_EVP_PKEY pointer
  6120. *
  6121. * returns a WOLFSSL_EVP_PKEY pointer on success and NULL in fail case.
  6122. */
  6123. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PUBKEY_bio(WOLFSSL_BIO* bio,
  6124. WOLFSSL_EVP_PKEY** out)
  6125. {
  6126. unsigned char* mem;
  6127. long memSz;
  6128. WOLFSSL_EVP_PKEY* pkey = NULL;
  6129. WOLFSSL_ENTER("wolfSSL_d2i_PUBKEY_bio");
  6130. if (bio == NULL) {
  6131. return NULL;
  6132. }
  6133. (void)out;
  6134. memSz = wolfSSL_BIO_get_len(bio);
  6135. if (memSz <= 0) {
  6136. return NULL;
  6137. }
  6138. mem = (unsigned char*)XMALLOC(memSz, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
  6139. if (mem == NULL) {
  6140. return NULL;
  6141. }
  6142. if (wolfSSL_BIO_read(bio, mem, (int)memSz) == memSz) {
  6143. pkey = wolfSSL_d2i_PUBKEY(NULL, (const unsigned char**)&mem, memSz);
  6144. if (out != NULL && pkey != NULL) {
  6145. *out = pkey;
  6146. }
  6147. }
  6148. XFREE(mem, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
  6149. return pkey;
  6150. }
  6151. #endif /* !NO_BIO */
  6152. /* Converts a DER encoded public key to a WOLFSSL_EVP_PKEY structure.
  6153. *
  6154. * out pointer to new WOLFSSL_EVP_PKEY structure. Can be NULL
  6155. * in DER buffer to convert
  6156. * inSz size of in buffer
  6157. *
  6158. * returns a pointer to a new WOLFSSL_EVP_PKEY structure on success and NULL
  6159. * on fail
  6160. */
  6161. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PUBKEY(WOLFSSL_EVP_PKEY** out,
  6162. const unsigned char** in, long inSz)
  6163. {
  6164. WOLFSSL_ENTER("wolfSSL_d2i_PUBKEY");
  6165. return d2iGenericKey(out, in, inSz, 0);
  6166. }
  6167. #if defined(OPENSSL_EXTRA) && !defined(NO_CERTS) && !defined(NO_ASN) && \
  6168. !defined(NO_PWDBASED)
  6169. /* helper function to get raw pointer to DER buffer from WOLFSSL_EVP_PKEY */
  6170. static int wolfSSL_EVP_PKEY_get_der(const WOLFSSL_EVP_PKEY* key,
  6171. unsigned char** der)
  6172. {
  6173. int sz;
  6174. word16 pkcs8HeaderSz;
  6175. if (!key || !key->pkey_sz)
  6176. return WOLFSSL_FATAL_ERROR;
  6177. /* return the key without PKCS8 for compatibility */
  6178. /* if pkcs8HeaderSz is invalid, use 0 and return all of pkey */
  6179. pkcs8HeaderSz = 0;
  6180. if (key->pkey_sz > key->pkcs8HeaderSz)
  6181. pkcs8HeaderSz = key->pkcs8HeaderSz;
  6182. sz = key->pkey_sz - pkcs8HeaderSz;
  6183. if (der) {
  6184. unsigned char* pt = (unsigned char*)key->pkey.ptr;
  6185. if (*der) {
  6186. /* since this function signature has no size value passed in it is
  6187. * assumed that the user has allocated a large enough buffer */
  6188. XMEMCPY(*der, pt + pkcs8HeaderSz, sz);
  6189. *der += sz;
  6190. }
  6191. else {
  6192. *der = (unsigned char*)XMALLOC(sz, NULL, DYNAMIC_TYPE_OPENSSL);
  6193. if (*der == NULL) {
  6194. return WOLFSSL_FATAL_ERROR;
  6195. }
  6196. XMEMCPY(*der, pt + pkcs8HeaderSz, sz);
  6197. }
  6198. }
  6199. return sz;
  6200. }
  6201. int wolfSSL_i2d_PUBKEY(const WOLFSSL_EVP_PKEY *key, unsigned char **der)
  6202. {
  6203. return wolfSSL_i2d_PublicKey(key, der);
  6204. }
  6205. #endif /* OPENSSL_EXTRA && !NO_CERTS && !NO_ASN && !NO_PWDBASED */
  6206. static WOLFSSL_EVP_PKEY* _d2i_PublicKey(int type, WOLFSSL_EVP_PKEY** out,
  6207. const unsigned char **in, long inSz, int priv)
  6208. {
  6209. int ret = 0;
  6210. word32 idx = 0, algId;
  6211. word16 pkcs8HeaderSz = 0;
  6212. WOLFSSL_EVP_PKEY* local;
  6213. int opt = 0;
  6214. (void)opt;
  6215. if (in == NULL || inSz < 0) {
  6216. WOLFSSL_MSG("Bad argument");
  6217. return NULL;
  6218. }
  6219. if (priv == 1) {
  6220. /* Check if input buffer has PKCS8 header. In the case that it does not
  6221. * have a PKCS8 header then do not error out. */
  6222. if ((ret = ToTraditionalInline_ex((const byte*)(*in), &idx,
  6223. (word32)inSz, &algId)) > 0) {
  6224. WOLFSSL_MSG("Found PKCS8 header");
  6225. pkcs8HeaderSz = (word16)idx;
  6226. if ((type == EVP_PKEY_RSA && algId != RSAk
  6227. #ifdef WC_RSA_PSS
  6228. && algId != RSAPSSk
  6229. #endif
  6230. ) ||
  6231. (type == EVP_PKEY_EC && algId != ECDSAk) ||
  6232. (type == EVP_PKEY_DSA && algId != DSAk) ||
  6233. (type == EVP_PKEY_DH && algId != DHk)) {
  6234. WOLFSSL_MSG("PKCS8 does not match EVP key type");
  6235. return NULL;
  6236. }
  6237. (void)idx; /* not used */
  6238. }
  6239. else {
  6240. if (ret != ASN_PARSE_E) {
  6241. WOLFSSL_MSG("Unexpected error with trying to remove PKCS8 "
  6242. "header");
  6243. return NULL;
  6244. }
  6245. }
  6246. }
  6247. if (out != NULL && *out != NULL) {
  6248. wolfSSL_EVP_PKEY_free(*out);
  6249. *out = NULL;
  6250. }
  6251. local = wolfSSL_EVP_PKEY_new();
  6252. if (local == NULL) {
  6253. return NULL;
  6254. }
  6255. local->type = type;
  6256. local->pkey_sz = (int)inSz;
  6257. local->pkcs8HeaderSz = pkcs8HeaderSz;
  6258. local->pkey.ptr = (char*)XMALLOC(inSz, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
  6259. if (local->pkey.ptr == NULL) {
  6260. wolfSSL_EVP_PKEY_free(local);
  6261. local = NULL;
  6262. return NULL;
  6263. }
  6264. else {
  6265. XMEMCPY(local->pkey.ptr, *in, inSz);
  6266. }
  6267. switch (type) {
  6268. #ifndef NO_RSA
  6269. case EVP_PKEY_RSA:
  6270. opt = priv ? WOLFSSL_RSA_LOAD_PRIVATE : WOLFSSL_RSA_LOAD_PUBLIC;
  6271. local->ownRsa = 1;
  6272. local->rsa = wolfssl_rsa_d2i(NULL,
  6273. (const unsigned char*)local->pkey.ptr, local->pkey_sz, opt);
  6274. if (local->rsa == NULL) {
  6275. wolfSSL_EVP_PKEY_free(local);
  6276. return NULL;
  6277. }
  6278. break;
  6279. #endif /* NO_RSA */
  6280. #ifdef HAVE_ECC
  6281. case EVP_PKEY_EC:
  6282. local->ownEcc = 1;
  6283. local->ecc = wolfSSL_EC_KEY_new();
  6284. if (local->ecc == NULL) {
  6285. wolfSSL_EVP_PKEY_free(local);
  6286. return NULL;
  6287. }
  6288. opt = priv ? WOLFSSL_EC_KEY_LOAD_PRIVATE :
  6289. WOLFSSL_EC_KEY_LOAD_PUBLIC;
  6290. if (wolfSSL_EC_KEY_LoadDer_ex(local->ecc,
  6291. (const unsigned char*)local->pkey.ptr, local->pkey_sz,
  6292. opt)
  6293. != WOLFSSL_SUCCESS) {
  6294. wolfSSL_EVP_PKEY_free(local);
  6295. return NULL;
  6296. }
  6297. break;
  6298. #endif /* HAVE_ECC */
  6299. #if defined(WOLFSSL_QT) || defined(OPENSSL_ALL) || defined(WOLFSSL_OPENSSH)
  6300. #ifndef NO_DSA
  6301. case EVP_PKEY_DSA:
  6302. local->ownDsa = 1;
  6303. local->dsa = wolfSSL_DSA_new();
  6304. if (local->dsa == NULL) {
  6305. wolfSSL_EVP_PKEY_free(local);
  6306. return NULL;
  6307. }
  6308. opt = priv ? WOLFSSL_DSA_LOAD_PRIVATE : WOLFSSL_DSA_LOAD_PUBLIC;
  6309. if (wolfSSL_DSA_LoadDer_ex(local->dsa,
  6310. (const unsigned char*)local->pkey.ptr, local->pkey_sz,
  6311. opt)
  6312. != WOLFSSL_SUCCESS) {
  6313. wolfSSL_EVP_PKEY_free(local);
  6314. return NULL;
  6315. }
  6316. break;
  6317. #endif /* NO_DSA */
  6318. #ifndef NO_DH
  6319. #if !defined(HAVE_FIPS) || (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION>2))
  6320. case EVP_PKEY_DH:
  6321. local->ownDh = 1;
  6322. local->dh = wolfSSL_DH_new();
  6323. if (local->dh == NULL) {
  6324. wolfSSL_EVP_PKEY_free(local);
  6325. return NULL;
  6326. }
  6327. if (wolfSSL_DH_LoadDer(local->dh,
  6328. (const unsigned char*)local->pkey.ptr, local->pkey_sz)
  6329. != WOLFSSL_SUCCESS) {
  6330. wolfSSL_EVP_PKEY_free(local);
  6331. return NULL;
  6332. }
  6333. break;
  6334. #endif /* !HAVE_FIPS || HAVE_FIPS_VERSION > 2 */
  6335. #endif /* HAVE_DH */
  6336. #endif /* WOLFSSL_QT || OPENSSL_ALL || WOLFSSL_OPENSSH */
  6337. default:
  6338. WOLFSSL_MSG("Unsupported key type");
  6339. wolfSSL_EVP_PKEY_free(local);
  6340. return NULL;
  6341. }
  6342. /* advance pointer with success */
  6343. if (local != NULL) {
  6344. if (local->pkey_sz <= (int)inSz) {
  6345. *in += local->pkey_sz;
  6346. }
  6347. if (out != NULL) {
  6348. *out = local;
  6349. }
  6350. }
  6351. return local;
  6352. }
  6353. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PublicKey(int type, WOLFSSL_EVP_PKEY** out,
  6354. const unsigned char **in, long inSz)
  6355. {
  6356. WOLFSSL_ENTER("wolfSSL_d2i_PublicKey");
  6357. return _d2i_PublicKey(type, out, in, inSz, 0);
  6358. }
  6359. /* Reads in a DER format key. If PKCS8 headers are found they are stripped off.
  6360. *
  6361. * type type of key
  6362. * out newly created WOLFSSL_EVP_PKEY structure
  6363. * in pointer to input key DER
  6364. * inSz size of in buffer
  6365. *
  6366. * On success a non null pointer is returned and the pointer in is advanced the
  6367. * same number of bytes read.
  6368. */
  6369. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PrivateKey(int type, WOLFSSL_EVP_PKEY** out,
  6370. const unsigned char **in, long inSz)
  6371. {
  6372. WOLFSSL_ENTER("wolfSSL_d2i_PrivateKey");
  6373. return _d2i_PublicKey(type, out, in, inSz, 1);
  6374. }
  6375. #ifdef WOLF_PRIVATE_KEY_ID
  6376. /* Create an EVP structure for use with crypto callbacks */
  6377. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PrivateKey_id(int type, WOLFSSL_EVP_PKEY** out,
  6378. void* heap, int devId)
  6379. {
  6380. WOLFSSL_EVP_PKEY* local;
  6381. if (out != NULL && *out != NULL) {
  6382. wolfSSL_EVP_PKEY_free(*out);
  6383. *out = NULL;
  6384. }
  6385. local = wolfSSL_EVP_PKEY_new_ex(heap);
  6386. if (local == NULL) {
  6387. return NULL;
  6388. }
  6389. local->type = type;
  6390. local->pkey_sz = 0;
  6391. local->pkcs8HeaderSz = 0;
  6392. switch (type) {
  6393. #ifndef NO_RSA
  6394. case EVP_PKEY_RSA:
  6395. {
  6396. RsaKey* key;
  6397. local->ownRsa = 1;
  6398. local->rsa = wolfSSL_RSA_new_ex(heap, devId);
  6399. if (local->rsa == NULL) {
  6400. wolfSSL_EVP_PKEY_free(local);
  6401. return NULL;
  6402. }
  6403. key = (RsaKey*)local->rsa->internal;
  6404. #ifdef WOLF_CRYPTO_CB
  6405. key->devId = devId;
  6406. #endif
  6407. (void)key;
  6408. local->rsa->inSet = 1;
  6409. break;
  6410. }
  6411. #endif /* !NO_RSA */
  6412. #ifdef HAVE_ECC
  6413. case EVP_PKEY_EC:
  6414. {
  6415. ecc_key* key;
  6416. local->ownEcc = 1;
  6417. local->ecc = wolfSSL_EC_KEY_new_ex(heap, devId);
  6418. if (local->ecc == NULL) {
  6419. wolfSSL_EVP_PKEY_free(local);
  6420. return NULL;
  6421. }
  6422. key = (ecc_key*)local->ecc->internal;
  6423. #ifdef WOLF_CRYPTO_CB
  6424. key->devId = devId;
  6425. #endif
  6426. key->type = ECC_PRIVATEKEY;
  6427. /* key is required to have a key size / curve set, although
  6428. * actual one used is determined by devId callback function */
  6429. wc_ecc_set_curve(key, ECDHE_SIZE, ECC_CURVE_DEF);
  6430. local->ecc->inSet = 1;
  6431. break;
  6432. }
  6433. #endif /* HAVE_ECC */
  6434. default:
  6435. WOLFSSL_MSG("Unsupported private key id type");
  6436. wolfSSL_EVP_PKEY_free(local);
  6437. return NULL;
  6438. }
  6439. if (local != NULL && out != NULL) {
  6440. *out = local;
  6441. }
  6442. return local;
  6443. }
  6444. #endif /* WOLF_PRIVATE_KEY_ID */
  6445. #ifndef NO_CERTS /* // NOLINT(readability-redundant-preprocessor) */
  6446. #ifndef NO_CHECK_PRIVATE_KEY
  6447. /* Check private against public in certificate for match
  6448. *
  6449. * ssl WOLFSSL structure to check private key in
  6450. *
  6451. * Returns WOLFSSL_SUCCESS on good private key
  6452. * WOLFSSL_FAILURE if mismatched. */
  6453. int wolfSSL_check_private_key(const WOLFSSL* ssl)
  6454. {
  6455. if (ssl == NULL) {
  6456. return WOLFSSL_FAILURE;
  6457. }
  6458. #ifdef WOLFSSL_DUAL_ALG_CERTS
  6459. return check_cert_key(ssl->buffers.certificate, ssl->buffers.key,
  6460. ssl->buffers.altKey, ssl->heap, ssl->buffers.keyDevId,
  6461. ssl->buffers.keyLabel, ssl->buffers.keyId, ssl->buffers.altKeyDevId,
  6462. ssl->buffers.altKeyLabel, ssl->buffers.altKeyId);
  6463. #else
  6464. return check_cert_key(ssl->buffers.certificate, ssl->buffers.key, NULL,
  6465. ssl->heap, ssl->buffers.keyDevId, ssl->buffers.keyLabel,
  6466. ssl->buffers.keyId, INVALID_DEVID, 0, 0);
  6467. #endif
  6468. }
  6469. #endif /* !NO_CHECK_PRIVATE_KEY */
  6470. #endif /* !NO_CERTS */
  6471. #endif /* OPENSSL_EXTRA */
  6472. #if defined(HAVE_RPK)
  6473. /* Confirm that all the byte data in the buffer is unique.
  6474. * return 1 if all the byte data in the buffer is unique, otherwise 0.
  6475. */
  6476. static int isArrayUnique(const char* buf, size_t len)
  6477. {
  6478. size_t i, j;
  6479. /* check the array is unique */
  6480. for (i = 0; i < len -1; ++i) {
  6481. for (j = i+ 1; j < len; ++j) {
  6482. if (buf[i] == buf[j]) {
  6483. return 0;
  6484. }
  6485. }
  6486. }
  6487. return 1;
  6488. }
  6489. /* Set user preference for the client_cert_type exetnsion.
  6490. * Takes byte array containing cert types the caller can provide to its peer.
  6491. * Cert types are in preferred order in the array.
  6492. */
  6493. WOLFSSL_API int wolfSSL_CTX_set_client_cert_type(WOLFSSL_CTX* ctx,
  6494. const char* buf, int bufLen)
  6495. {
  6496. int i;
  6497. if (ctx == NULL || bufLen > MAX_CLIENT_CERT_TYPE_CNT) {
  6498. return BAD_FUNC_ARG;
  6499. }
  6500. /* if buf is set to NULL or bufLen is set to zero, it defaults the setting*/
  6501. if (buf == NULL || bufLen == 0) {
  6502. ctx->rpkConfig.preferred_ClientCertTypeCnt = 1;
  6503. ctx->rpkConfig.preferred_ClientCertTypes[0]= WOLFSSL_CERT_TYPE_X509;
  6504. ctx->rpkConfig.preferred_ClientCertTypes[1]= WOLFSSL_CERT_TYPE_X509;
  6505. return WOLFSSL_SUCCESS;
  6506. }
  6507. if (!isArrayUnique(buf, bufLen))
  6508. return BAD_FUNC_ARG;
  6509. for (i = 0; i < bufLen; i++){
  6510. if (buf[i] != WOLFSSL_CERT_TYPE_RPK && buf[i] != WOLFSSL_CERT_TYPE_X509)
  6511. return BAD_FUNC_ARG;
  6512. ctx->rpkConfig.preferred_ClientCertTypes[i] = buf[i];
  6513. }
  6514. ctx->rpkConfig.preferred_ClientCertTypeCnt = bufLen;
  6515. return WOLFSSL_SUCCESS;
  6516. }
  6517. /* Set user preference for the server_cert_type exetnsion.
  6518. * Takes byte array containing cert types the caller can provide to its peer.
  6519. * Cert types are in preferred order in the array.
  6520. */
  6521. WOLFSSL_API int wolfSSL_CTX_set_server_cert_type(WOLFSSL_CTX* ctx,
  6522. const char* buf, int bufLen)
  6523. {
  6524. int i;
  6525. if (ctx == NULL || bufLen > MAX_SERVER_CERT_TYPE_CNT) {
  6526. return BAD_FUNC_ARG;
  6527. }
  6528. /* if buf is set to NULL or bufLen is set to zero, it defaults the setting*/
  6529. if (buf == NULL || bufLen == 0) {
  6530. ctx->rpkConfig.preferred_ServerCertTypeCnt = 1;
  6531. ctx->rpkConfig.preferred_ServerCertTypes[0]= WOLFSSL_CERT_TYPE_X509;
  6532. ctx->rpkConfig.preferred_ServerCertTypes[1]= WOLFSSL_CERT_TYPE_X509;
  6533. return WOLFSSL_SUCCESS;
  6534. }
  6535. if (!isArrayUnique(buf, bufLen))
  6536. return BAD_FUNC_ARG;
  6537. for (i = 0; i < bufLen; i++){
  6538. if (buf[i] != WOLFSSL_CERT_TYPE_RPK && buf[i] != WOLFSSL_CERT_TYPE_X509)
  6539. return BAD_FUNC_ARG;
  6540. ctx->rpkConfig.preferred_ServerCertTypes[i] = buf[i];
  6541. }
  6542. ctx->rpkConfig.preferred_ServerCertTypeCnt = bufLen;
  6543. return WOLFSSL_SUCCESS;
  6544. }
  6545. /* Set user preference for the client_cert_type exetnsion.
  6546. * Takes byte array containing cert types the caller can provide to its peer.
  6547. * Cert types are in preferred order in the array.
  6548. */
  6549. WOLFSSL_API int wolfSSL_set_client_cert_type(WOLFSSL* ssl,
  6550. const char* buf, int bufLen)
  6551. {
  6552. int i;
  6553. if (ssl == NULL || bufLen > MAX_CLIENT_CERT_TYPE_CNT) {
  6554. return BAD_FUNC_ARG;
  6555. }
  6556. /* if buf is set to NULL or bufLen is set to zero, it defaults the setting*/
  6557. if (buf == NULL || bufLen == 0) {
  6558. ssl->options.rpkConfig.preferred_ClientCertTypeCnt = 1;
  6559. ssl->options.rpkConfig.preferred_ClientCertTypes[0]
  6560. = WOLFSSL_CERT_TYPE_X509;
  6561. ssl->options.rpkConfig.preferred_ClientCertTypes[1]
  6562. = WOLFSSL_CERT_TYPE_X509;
  6563. return WOLFSSL_SUCCESS;
  6564. }
  6565. if (!isArrayUnique(buf, bufLen))
  6566. return BAD_FUNC_ARG;
  6567. for (i = 0; i < bufLen; i++){
  6568. if (buf[i] != WOLFSSL_CERT_TYPE_RPK && buf[i] != WOLFSSL_CERT_TYPE_X509)
  6569. return BAD_FUNC_ARG;
  6570. ssl->options.rpkConfig.preferred_ClientCertTypes[i] = buf[i];
  6571. }
  6572. ssl->options.rpkConfig.preferred_ClientCertTypeCnt = bufLen;
  6573. return WOLFSSL_SUCCESS;
  6574. }
  6575. /* Set user preference for the server_cert_type exetnsion.
  6576. * Takes byte array containing cert types the caller can provide to its peer.
  6577. * Cert types are in preferred order in the array.
  6578. */
  6579. WOLFSSL_API int wolfSSL_set_server_cert_type(WOLFSSL* ssl,
  6580. const char* buf, int bufLen)
  6581. {
  6582. int i;
  6583. if (ssl == NULL || bufLen > MAX_SERVER_CERT_TYPE_CNT) {
  6584. return BAD_FUNC_ARG;
  6585. }
  6586. /* if buf is set to NULL or bufLen is set to zero, it defaults the setting*/
  6587. if (buf == NULL || bufLen == 0) {
  6588. ssl->options.rpkConfig.preferred_ServerCertTypeCnt = 1;
  6589. ssl->options.rpkConfig.preferred_ServerCertTypes[0]
  6590. = WOLFSSL_CERT_TYPE_X509;
  6591. ssl->options.rpkConfig.preferred_ServerCertTypes[1]
  6592. = WOLFSSL_CERT_TYPE_X509;
  6593. return WOLFSSL_SUCCESS;
  6594. }
  6595. if (!isArrayUnique(buf, bufLen))
  6596. return BAD_FUNC_ARG;
  6597. for (i = 0; i < bufLen; i++){
  6598. if (buf[i] != WOLFSSL_CERT_TYPE_RPK && buf[i] != WOLFSSL_CERT_TYPE_X509)
  6599. return BAD_FUNC_ARG;
  6600. ssl->options.rpkConfig.preferred_ServerCertTypes[i] = buf[i];
  6601. }
  6602. ssl->options.rpkConfig.preferred_ServerCertTypeCnt = bufLen;
  6603. return WOLFSSL_SUCCESS;
  6604. }
  6605. /* get negotiated certificate type value and return it to the second parameter.
  6606. * cert type value:
  6607. * -1: WOLFSSL_CERT_TYPE_UNKNOWN
  6608. * 0: WOLFSSL_CERT_TYPE_X509
  6609. * 2: WOLFSSL_CERT_TYPE_RPK
  6610. * return WOLFSSL_SUCCESS on success, otherwise negative value.
  6611. * in case no negotiation performed, it returns WOLFSSL_SUCCESS and -1 is for
  6612. * cert type.
  6613. */
  6614. WOLFSSL_API int wolfSSL_get_negotiated_client_cert_type(WOLFSSL* ssl, int* tp)
  6615. {
  6616. int ret = WOLFSSL_SUCCESS;
  6617. if (ssl == NULL || tp == NULL)
  6618. return BAD_FUNC_ARG;
  6619. if (ssl->options.side == WOLFSSL_CLIENT_END) {
  6620. if (ssl->options.rpkState.received_ClientCertTypeCnt == 1)
  6621. *tp = ssl->options.rpkState.received_ClientCertTypes[0];
  6622. else
  6623. *tp = WOLFSSL_CERT_TYPE_UNKNOWN;
  6624. }
  6625. else {
  6626. if (ssl->options.rpkState.sending_ClientCertTypeCnt == 1)
  6627. *tp = ssl->options.rpkState.sending_ClientCertTypes[0];
  6628. else
  6629. *tp = WOLFSSL_CERT_TYPE_UNKNOWN;
  6630. }
  6631. return ret;
  6632. }
  6633. /* get negotiated certificate type value and return it to the second parameter.
  6634. * cert type value:
  6635. * -1: WOLFSSL_CERT_TYPE_UNKNOWN
  6636. * 0: WOLFSSL_CERT_TYPE_X509
  6637. * 2: WOLFSSL_CERT_TYPE_RPK
  6638. * return WOLFSSL_SUCCESS on success, otherwise negative value.
  6639. * in case no negotiation performed, it returns WOLFSSL_SUCCESS and -1 is for
  6640. * cert type.
  6641. */
  6642. WOLFSSL_API int wolfSSL_get_negotiated_server_cert_type(WOLFSSL* ssl, int* tp)
  6643. {
  6644. int ret = WOLFSSL_SUCCESS;
  6645. if (ssl == NULL || tp == NULL)
  6646. return BAD_FUNC_ARG;
  6647. if (ssl->options.side == WOLFSSL_CLIENT_END) {
  6648. if (ssl->options.rpkState.received_ServerCertTypeCnt == 1)
  6649. *tp = ssl->options.rpkState.received_ServerCertTypes[0];
  6650. else
  6651. *tp = WOLFSSL_CERT_TYPE_UNKNOWN;
  6652. }
  6653. else {
  6654. if (ssl->options.rpkState.sending_ServerCertTypeCnt == 1)
  6655. *tp = ssl->options.rpkState.sending_ServerCertTypes[0];
  6656. else
  6657. *tp = WOLFSSL_CERT_TYPE_UNKNOWN;
  6658. }
  6659. return ret;
  6660. }
  6661. #endif /* HAVE_RPK */
  6662. #ifdef HAVE_ECC
  6663. /* Set Temp CTX EC-DHE size in octets, can be 14 - 66 (112 - 521 bit) */
  6664. int wolfSSL_CTX_SetTmpEC_DHE_Sz(WOLFSSL_CTX* ctx, word16 sz)
  6665. {
  6666. if (ctx == NULL)
  6667. return BAD_FUNC_ARG;
  6668. /* if 0 then get from loaded private key */
  6669. if (sz == 0) {
  6670. /* applies only to ECDSA */
  6671. if (ctx->privateKeyType != ecc_dsa_sa_algo)
  6672. return WOLFSSL_SUCCESS;
  6673. if (ctx->privateKeySz == 0) {
  6674. WOLFSSL_MSG("Must set private key/cert first");
  6675. return BAD_FUNC_ARG;
  6676. }
  6677. sz = (word16)ctx->privateKeySz;
  6678. }
  6679. /* check size */
  6680. #if ECC_MIN_KEY_SZ > 0
  6681. if (sz < ECC_MINSIZE)
  6682. return BAD_FUNC_ARG;
  6683. #endif
  6684. if (sz > ECC_MAXSIZE)
  6685. return BAD_FUNC_ARG;
  6686. ctx->eccTempKeySz = sz;
  6687. return WOLFSSL_SUCCESS;
  6688. }
  6689. /* Set Temp SSL EC-DHE size in octets, can be 14 - 66 (112 - 521 bit) */
  6690. int wolfSSL_SetTmpEC_DHE_Sz(WOLFSSL* ssl, word16 sz)
  6691. {
  6692. if (ssl == NULL)
  6693. return BAD_FUNC_ARG;
  6694. /* check size */
  6695. #if ECC_MIN_KEY_SZ > 0
  6696. if (sz < ECC_MINSIZE)
  6697. return BAD_FUNC_ARG;
  6698. #endif
  6699. if (sz > ECC_MAXSIZE)
  6700. return BAD_FUNC_ARG;
  6701. ssl->eccTempKeySz = sz;
  6702. return WOLFSSL_SUCCESS;
  6703. }
  6704. #endif /* HAVE_ECC */
  6705. typedef struct {
  6706. byte verifyPeer:1;
  6707. byte verifyNone:1;
  6708. byte failNoCert:1;
  6709. byte failNoCertxPSK:1;
  6710. byte verifyPostHandshake:1;
  6711. } SetVerifyOptions;
  6712. static SetVerifyOptions ModeToVerifyOptions(int mode)
  6713. {
  6714. SetVerifyOptions opts;
  6715. XMEMSET(&opts, 0, sizeof(SetVerifyOptions));
  6716. if (mode != WOLFSSL_VERIFY_DEFAULT) {
  6717. opts.verifyNone = (mode == WOLFSSL_VERIFY_NONE);
  6718. if (!opts.verifyNone) {
  6719. opts.verifyPeer =
  6720. (mode & WOLFSSL_VERIFY_PEER) != 0;
  6721. opts.failNoCertxPSK =
  6722. (mode & WOLFSSL_VERIFY_FAIL_EXCEPT_PSK) != 0;
  6723. opts.failNoCert =
  6724. (mode & WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT) != 0;
  6725. #if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
  6726. opts.verifyPostHandshake =
  6727. (mode & WOLFSSL_VERIFY_POST_HANDSHAKE) != 0;
  6728. #endif
  6729. }
  6730. }
  6731. return opts;
  6732. }
  6733. WOLFSSL_ABI
  6734. void wolfSSL_CTX_set_verify(WOLFSSL_CTX* ctx, int mode, VerifyCallback vc)
  6735. {
  6736. SetVerifyOptions opts;
  6737. WOLFSSL_ENTER("wolfSSL_CTX_set_verify");
  6738. if (ctx == NULL)
  6739. return;
  6740. opts = ModeToVerifyOptions(mode);
  6741. ctx->verifyNone = opts.verifyNone;
  6742. ctx->verifyPeer = opts.verifyPeer;
  6743. ctx->failNoCert = opts.failNoCert;
  6744. ctx->failNoCertxPSK = opts.failNoCertxPSK;
  6745. #if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
  6746. ctx->verifyPostHandshake = opts.verifyPostHandshake;
  6747. #endif
  6748. ctx->verifyCallback = vc;
  6749. }
  6750. #ifdef OPENSSL_ALL
  6751. void wolfSSL_CTX_set_cert_verify_callback(WOLFSSL_CTX* ctx,
  6752. CertVerifyCallback cb, void* arg)
  6753. {
  6754. WOLFSSL_ENTER("wolfSSL_CTX_set_cert_verify_callback");
  6755. if (ctx == NULL)
  6756. return;
  6757. ctx->verifyCertCb = cb;
  6758. ctx->verifyCertCbArg = arg;
  6759. }
  6760. #endif
  6761. void wolfSSL_set_verify(WOLFSSL* ssl, int mode, VerifyCallback vc)
  6762. {
  6763. SetVerifyOptions opts;
  6764. WOLFSSL_ENTER("wolfSSL_set_verify");
  6765. if (ssl == NULL)
  6766. return;
  6767. opts = ModeToVerifyOptions(mode);
  6768. ssl->options.verifyNone = opts.verifyNone;
  6769. ssl->options.verifyPeer = opts.verifyPeer;
  6770. ssl->options.failNoCert = opts.failNoCert;
  6771. ssl->options.failNoCertxPSK = opts.failNoCertxPSK;
  6772. #if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
  6773. ssl->options.verifyPostHandshake = opts.verifyPostHandshake;
  6774. #endif
  6775. ssl->verifyCallback = vc;
  6776. }
  6777. void wolfSSL_set_verify_result(WOLFSSL *ssl, long v)
  6778. {
  6779. WOLFSSL_ENTER("wolfSSL_set_verify_result");
  6780. if (ssl == NULL)
  6781. return;
  6782. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
  6783. defined(OPENSSL_ALL)
  6784. ssl->peerVerifyRet = v;
  6785. #else
  6786. (void)v;
  6787. WOLFSSL_STUB("wolfSSL_set_verify_result");
  6788. #endif
  6789. }
  6790. #if defined(OPENSSL_EXTRA) && !defined(NO_CERTS) && \
  6791. defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
  6792. /* For TLS v1.3 send handshake messages after handshake completes. */
  6793. /* Returns 1=WOLFSSL_SUCCESS or 0=WOLFSSL_FAILURE */
  6794. int wolfSSL_verify_client_post_handshake(WOLFSSL* ssl)
  6795. {
  6796. int ret = wolfSSL_request_certificate(ssl);
  6797. if (ret != WOLFSSL_SUCCESS) {
  6798. if (!IsAtLeastTLSv1_3(ssl->version)) {
  6799. /* specific error of wrong version expected */
  6800. WOLFSSL_ERROR(UNSUPPORTED_PROTO_VERSION);
  6801. }
  6802. else {
  6803. WOLFSSL_ERROR(ret); /* log the error in the error queue */
  6804. }
  6805. }
  6806. return (ret == WOLFSSL_SUCCESS) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  6807. }
  6808. int wolfSSL_CTX_set_post_handshake_auth(WOLFSSL_CTX* ctx, int val)
  6809. {
  6810. int ret = wolfSSL_CTX_allow_post_handshake_auth(ctx);
  6811. if (ret == 0) {
  6812. ctx->postHandshakeAuth = (val != 0);
  6813. }
  6814. return (ret == 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  6815. }
  6816. int wolfSSL_set_post_handshake_auth(WOLFSSL* ssl, int val)
  6817. {
  6818. int ret = wolfSSL_allow_post_handshake_auth(ssl);
  6819. if (ret == 0) {
  6820. ssl->options.postHandshakeAuth = (val != 0);
  6821. }
  6822. return (ret == 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  6823. }
  6824. #endif /* OPENSSL_EXTRA && !NO_CERTS && WOLFSSL_TLS13 &&
  6825. * WOLFSSL_POST_HANDSHAKE_AUTH */
  6826. /* store user ctx for verify callback */
  6827. void wolfSSL_SetCertCbCtx(WOLFSSL* ssl, void* ctx)
  6828. {
  6829. WOLFSSL_ENTER("wolfSSL_SetCertCbCtx");
  6830. if (ssl)
  6831. ssl->verifyCbCtx = ctx;
  6832. }
  6833. /* store user ctx for verify callback */
  6834. void wolfSSL_CTX_SetCertCbCtx(WOLFSSL_CTX* ctx, void* userCtx)
  6835. {
  6836. WOLFSSL_ENTER("wolfSSL_CTX_SetCertCbCtx");
  6837. if (ctx)
  6838. ctx->verifyCbCtx = userCtx;
  6839. }
  6840. /* store context CA Cache addition callback */
  6841. void wolfSSL_CTX_SetCACb(WOLFSSL_CTX* ctx, CallbackCACache cb)
  6842. {
  6843. if (ctx && ctx->cm)
  6844. ctx->cm->caCacheCallback = cb;
  6845. }
  6846. #if defined(PERSIST_CERT_CACHE)
  6847. #if !defined(NO_FILESYSTEM)
  6848. /* Persist cert cache to file */
  6849. int wolfSSL_CTX_save_cert_cache(WOLFSSL_CTX* ctx, const char* fname)
  6850. {
  6851. WOLFSSL_ENTER("wolfSSL_CTX_save_cert_cache");
  6852. if (ctx == NULL || fname == NULL)
  6853. return BAD_FUNC_ARG;
  6854. return CM_SaveCertCache(ctx->cm, fname);
  6855. }
  6856. /* Persist cert cache from file */
  6857. int wolfSSL_CTX_restore_cert_cache(WOLFSSL_CTX* ctx, const char* fname)
  6858. {
  6859. WOLFSSL_ENTER("wolfSSL_CTX_restore_cert_cache");
  6860. if (ctx == NULL || fname == NULL)
  6861. return BAD_FUNC_ARG;
  6862. return CM_RestoreCertCache(ctx->cm, fname);
  6863. }
  6864. #endif /* NO_FILESYSTEM */
  6865. /* Persist cert cache to memory */
  6866. int wolfSSL_CTX_memsave_cert_cache(WOLFSSL_CTX* ctx, void* mem,
  6867. int sz, int* used)
  6868. {
  6869. WOLFSSL_ENTER("wolfSSL_CTX_memsave_cert_cache");
  6870. if (ctx == NULL || mem == NULL || used == NULL || sz <= 0)
  6871. return BAD_FUNC_ARG;
  6872. return CM_MemSaveCertCache(ctx->cm, mem, sz, used);
  6873. }
  6874. /* Restore cert cache from memory */
  6875. int wolfSSL_CTX_memrestore_cert_cache(WOLFSSL_CTX* ctx, const void* mem, int sz)
  6876. {
  6877. WOLFSSL_ENTER("wolfSSL_CTX_memrestore_cert_cache");
  6878. if (ctx == NULL || mem == NULL || sz <= 0)
  6879. return BAD_FUNC_ARG;
  6880. return CM_MemRestoreCertCache(ctx->cm, mem, sz);
  6881. }
  6882. /* get how big the the cert cache save buffer needs to be */
  6883. int wolfSSL_CTX_get_cert_cache_memsize(WOLFSSL_CTX* ctx)
  6884. {
  6885. WOLFSSL_ENTER("wolfSSL_CTX_get_cert_cache_memsize");
  6886. if (ctx == NULL)
  6887. return BAD_FUNC_ARG;
  6888. return CM_GetCertCacheMemSize(ctx->cm);
  6889. }
  6890. #endif /* PERSIST_CERT_CACHE */
  6891. #endif /* !NO_CERTS */
  6892. void wolfSSL_load_error_strings(void)
  6893. {
  6894. /* compatibility only */
  6895. }
  6896. int wolfSSL_library_init(void)
  6897. {
  6898. WOLFSSL_ENTER("wolfSSL_library_init");
  6899. if (wolfSSL_Init() == WOLFSSL_SUCCESS)
  6900. return WOLFSSL_SUCCESS;
  6901. else
  6902. return WOLFSSL_FATAL_ERROR;
  6903. }
  6904. #ifdef HAVE_SECRET_CALLBACK
  6905. int wolfSSL_set_session_secret_cb(WOLFSSL* ssl, SessionSecretCb cb, void* ctx)
  6906. {
  6907. WOLFSSL_ENTER("wolfSSL_set_session_secret_cb");
  6908. if (ssl == NULL)
  6909. return WOLFSSL_FATAL_ERROR;
  6910. ssl->sessionSecretCb = cb;
  6911. ssl->sessionSecretCtx = ctx;
  6912. if (cb != NULL) {
  6913. /* If using a pre-set key, assume session resumption. */
  6914. ssl->session->sessionIDSz = 0;
  6915. ssl->options.resuming = 1;
  6916. }
  6917. return WOLFSSL_SUCCESS;
  6918. }
  6919. #endif
  6920. #ifdef OPENSSL_EXTRA
  6921. /*
  6922. * check if the list has TLS13 and pre-TLS13 suites
  6923. * @param list cipher suite list that user want to set
  6924. * @return mixed: 0, only pre-TLS13: 1, only TLS13: 2
  6925. */
  6926. static int CheckcipherList(const char* list)
  6927. {
  6928. int ret;
  6929. int findTLSv13Suites = 0;
  6930. int findbeforeSuites = 0;
  6931. byte cipherSuite0;
  6932. byte cipherSuite1;
  6933. int flags;
  6934. char* next = (char*)list;
  6935. do {
  6936. char* current = next;
  6937. char name[MAX_SUITE_NAME + 1];
  6938. word32 length = MAX_SUITE_NAME;
  6939. word32 current_length;
  6940. next = XSTRSTR(next, ":");
  6941. current_length = (!next) ? (word32)XSTRLEN(current)
  6942. : (word32)(next - current);
  6943. if (current_length < length) {
  6944. length = current_length;
  6945. }
  6946. XMEMCPY(name, current, length);
  6947. name[length] = 0;
  6948. if (XSTRCMP(name, "ALL") == 0 || XSTRCMP(name, "DEFAULT") == 0 ||
  6949. XSTRCMP(name, "HIGH") == 0) {
  6950. findTLSv13Suites = 1;
  6951. findbeforeSuites = 1;
  6952. break;
  6953. }
  6954. ret = wolfSSL_get_cipher_suite_from_name(name, &cipherSuite0,
  6955. &cipherSuite1, &flags);
  6956. if (ret == 0) {
  6957. if (cipherSuite0 == TLS13_BYTE) {
  6958. /* TLSv13 suite */
  6959. findTLSv13Suites = 1;
  6960. }
  6961. else {
  6962. findbeforeSuites = 1;
  6963. }
  6964. }
  6965. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
  6966. /* check if mixed due to names like RSA:ECDHE+AESGCM etc. */
  6967. if (ret != 0) {
  6968. char* subStr = name;
  6969. char* subStrNext;
  6970. do {
  6971. subStrNext = XSTRSTR(subStr, "+");
  6972. if ((XSTRCMP(subStr, "ECDHE") == 0) ||
  6973. (XSTRCMP(subStr, "RSA") == 0)) {
  6974. return 0;
  6975. }
  6976. if (subStrNext && (XSTRLEN(subStrNext) > 0)) {
  6977. subStr = subStrNext + 1; /* +1 to skip past '+' */
  6978. }
  6979. } while (subStrNext != NULL);
  6980. }
  6981. #endif
  6982. if (findTLSv13Suites == 1 && findbeforeSuites == 1) {
  6983. /* list has mixed suites */
  6984. return 0;
  6985. }
  6986. }
  6987. while (next++); /* ++ needed to skip ':' */
  6988. if (findTLSv13Suites == 0 && findbeforeSuites == 1) {
  6989. ret = 1;/* only before TLSv13 suites */
  6990. }
  6991. else if (findTLSv13Suites == 1 && findbeforeSuites == 0) {
  6992. ret = 2;/* only TLSv13 suties */
  6993. }
  6994. else {
  6995. ret = 0;/* handle as mixed */
  6996. }
  6997. return ret;
  6998. }
  6999. /* parse some bulk lists like !eNULL / !aNULL
  7000. *
  7001. * returns WOLFSSL_SUCCESS on success and sets the cipher suite list
  7002. */
  7003. static int wolfSSL_parse_cipher_list(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
  7004. Suites* suites, const char* list)
  7005. {
  7006. int ret = 0;
  7007. int listattribute = 0;
  7008. int tls13Only = 0;
  7009. #ifndef WOLFSSL_SMALL_STACK
  7010. byte suitesCpy[WOLFSSL_MAX_SUITE_SZ];
  7011. #else
  7012. byte* suitesCpy = NULL;
  7013. #endif
  7014. word16 suitesCpySz = 0;
  7015. word16 i = 0;
  7016. word16 j = 0;
  7017. if (suites == NULL || list == NULL) {
  7018. WOLFSSL_MSG("NULL argument");
  7019. return WOLFSSL_FAILURE;
  7020. }
  7021. listattribute = CheckcipherList(list);
  7022. if (listattribute == 0) {
  7023. /* list has mixed(pre-TLSv13 and TLSv13) suites
  7024. * update cipher suites the same as before
  7025. */
  7026. return (SetCipherList_ex(ctx, ssl, suites, list)) ? WOLFSSL_SUCCESS :
  7027. WOLFSSL_FAILURE;
  7028. }
  7029. else if (listattribute == 1) {
  7030. /* list has only pre-TLSv13 suites.
  7031. * Only update before TLSv13 suites.
  7032. */
  7033. tls13Only = 0;
  7034. }
  7035. else if (listattribute == 2) {
  7036. /* list has only TLSv13 suites. Only update TLv13 suites
  7037. * simulate set_ciphersuites() compatibility layer API
  7038. */
  7039. tls13Only = 1;
  7040. if ((ctx != NULL && !IsAtLeastTLSv1_3(ctx->method->version)) ||
  7041. (ssl != NULL && !IsAtLeastTLSv1_3(ssl->version))) {
  7042. /* Silently ignore TLS 1.3 ciphers if we don't support it. */
  7043. return WOLFSSL_SUCCESS;
  7044. }
  7045. }
  7046. /* list contains ciphers either only for TLS 1.3 or <= TLS 1.2 */
  7047. if (suites->suiteSz == 0) {
  7048. WOLFSSL_MSG("Warning suites->suiteSz = 0 set to WOLFSSL_MAX_SUITE_SZ");
  7049. suites->suiteSz = WOLFSSL_MAX_SUITE_SZ;
  7050. }
  7051. #ifdef WOLFSSL_SMALL_STACK
  7052. if (suites->suiteSz > 0) {
  7053. suitesCpy = (byte*)XMALLOC(suites->suiteSz, NULL,
  7054. DYNAMIC_TYPE_TMP_BUFFER);
  7055. if (suitesCpy == NULL) {
  7056. return WOLFSSL_FAILURE;
  7057. }
  7058. XMEMSET(suitesCpy, 0, suites->suiteSz);
  7059. }
  7060. #else
  7061. XMEMSET(suitesCpy, 0, sizeof(suitesCpy));
  7062. #endif
  7063. if (suites->suiteSz > 0)
  7064. XMEMCPY(suitesCpy, suites->suites, suites->suiteSz);
  7065. suitesCpySz = suites->suiteSz;
  7066. ret = SetCipherList_ex(ctx, ssl, suites, list);
  7067. if (ret != 1) {
  7068. #ifdef WOLFSSL_SMALL_STACK
  7069. XFREE(suitesCpy, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7070. #endif
  7071. return WOLFSSL_FAILURE;
  7072. }
  7073. for (i = 0; i < suitesCpySz &&
  7074. suites->suiteSz <= (WOLFSSL_MAX_SUITE_SZ - SUITE_LEN); i += 2) {
  7075. /* Check for duplicates */
  7076. int duplicate = 0;
  7077. for (j = 0; j < suites->suiteSz; j += 2) {
  7078. if (suitesCpy[i] == suites->suites[j] &&
  7079. suitesCpy[i+1] == suites->suites[j+1]) {
  7080. duplicate = 1;
  7081. break;
  7082. }
  7083. }
  7084. if (!duplicate) {
  7085. if (tls13Only) {
  7086. /* Updating TLS 1.3 ciphers */
  7087. if (suitesCpy[i] != TLS13_BYTE) {
  7088. /* Only copy over <= TLS 1.2 ciphers */
  7089. /* TLS 1.3 ciphers take precedence */
  7090. suites->suites[suites->suiteSz++] = suitesCpy[i];
  7091. suites->suites[suites->suiteSz++] = suitesCpy[i+1];
  7092. }
  7093. }
  7094. else {
  7095. /* Updating <= TLS 1.2 ciphers */
  7096. if (suitesCpy[i] == TLS13_BYTE) {
  7097. /* Only copy over TLS 1.3 ciphers */
  7098. /* TLS 1.3 ciphers take precedence */
  7099. XMEMMOVE(suites->suites + SUITE_LEN, suites->suites,
  7100. suites->suiteSz);
  7101. suites->suites[0] = suitesCpy[i];
  7102. suites->suites[1] = suitesCpy[i+1];
  7103. suites->suiteSz += 2;
  7104. }
  7105. }
  7106. }
  7107. }
  7108. #ifdef WOLFSSL_SMALL_STACK
  7109. XFREE(suitesCpy, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7110. #endif
  7111. return ret;
  7112. }
  7113. #endif
  7114. int wolfSSL_CTX_set_cipher_list(WOLFSSL_CTX* ctx, const char* list)
  7115. {
  7116. WOLFSSL_ENTER("wolfSSL_CTX_set_cipher_list");
  7117. if (ctx == NULL)
  7118. return WOLFSSL_FAILURE;
  7119. if (AllocateCtxSuites(ctx) != 0)
  7120. return WOLFSSL_FAILURE;
  7121. #ifdef OPENSSL_EXTRA
  7122. return wolfSSL_parse_cipher_list(ctx, NULL, ctx->suites, list);
  7123. #else
  7124. return (SetCipherList(ctx, ctx->suites, list)) ?
  7125. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  7126. #endif
  7127. }
  7128. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_SET_CIPHER_BYTES)
  7129. int wolfSSL_CTX_set_cipher_list_bytes(WOLFSSL_CTX* ctx, const byte* list,
  7130. const int listSz)
  7131. {
  7132. WOLFSSL_ENTER("wolfSSL_CTX_set_cipher_list_bytes");
  7133. if (ctx == NULL)
  7134. return WOLFSSL_FAILURE;
  7135. if (AllocateCtxSuites(ctx) != 0)
  7136. return WOLFSSL_FAILURE;
  7137. return (SetCipherListFromBytes(ctx, ctx->suites, list, listSz)) ?
  7138. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  7139. }
  7140. #endif /* OPENSSL_EXTRA || WOLFSSL_SET_CIPHER_BYTES */
  7141. int wolfSSL_set_cipher_list(WOLFSSL* ssl, const char* list)
  7142. {
  7143. WOLFSSL_ENTER("wolfSSL_set_cipher_list");
  7144. if (ssl == NULL || ssl->ctx == NULL) {
  7145. return WOLFSSL_FAILURE;
  7146. }
  7147. if (AllocateSuites(ssl) != 0)
  7148. return WOLFSSL_FAILURE;
  7149. #ifdef OPENSSL_EXTRA
  7150. return wolfSSL_parse_cipher_list(NULL, ssl, ssl->suites, list);
  7151. #else
  7152. return (SetCipherList_ex(NULL, ssl, ssl->suites, list)) ?
  7153. WOLFSSL_SUCCESS :
  7154. WOLFSSL_FAILURE;
  7155. #endif
  7156. }
  7157. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_SET_CIPHER_BYTES)
  7158. int wolfSSL_set_cipher_list_bytes(WOLFSSL* ssl, const byte* list,
  7159. const int listSz)
  7160. {
  7161. WOLFSSL_ENTER("wolfSSL_set_cipher_list_bytes");
  7162. if (ssl == NULL || ssl->ctx == NULL) {
  7163. return WOLFSSL_FAILURE;
  7164. }
  7165. if (AllocateSuites(ssl) != 0)
  7166. return WOLFSSL_FAILURE;
  7167. return (SetCipherListFromBytes(ssl->ctx, ssl->suites, list, listSz))
  7168. ? WOLFSSL_SUCCESS
  7169. : WOLFSSL_FAILURE;
  7170. }
  7171. #endif /* OPENSSL_EXTRA || WOLFSSL_SET_CIPHER_BYTES */
  7172. #ifdef HAVE_KEYING_MATERIAL
  7173. #define TLS_PRF_LABEL_CLIENT_FINISHED "client finished"
  7174. #define TLS_PRF_LABEL_SERVER_FINISHED "server finished"
  7175. #define TLS_PRF_LABEL_MASTER_SECRET "master secret"
  7176. #define TLS_PRF_LABEL_EXT_MASTER_SECRET "extended master secret"
  7177. #define TLS_PRF_LABEL_KEY_EXPANSION "key expansion"
  7178. static const struct ForbiddenLabels {
  7179. const char* label;
  7180. size_t labelLen;
  7181. } forbiddenLabels[] = {
  7182. {TLS_PRF_LABEL_CLIENT_FINISHED, XSTR_SIZEOF(TLS_PRF_LABEL_CLIENT_FINISHED)},
  7183. {TLS_PRF_LABEL_SERVER_FINISHED, XSTR_SIZEOF(TLS_PRF_LABEL_SERVER_FINISHED)},
  7184. {TLS_PRF_LABEL_MASTER_SECRET, XSTR_SIZEOF(TLS_PRF_LABEL_MASTER_SECRET)},
  7185. {TLS_PRF_LABEL_EXT_MASTER_SECRET,
  7186. XSTR_SIZEOF(TLS_PRF_LABEL_EXT_MASTER_SECRET)},
  7187. {TLS_PRF_LABEL_KEY_EXPANSION, XSTR_SIZEOF(TLS_PRF_LABEL_KEY_EXPANSION)},
  7188. {NULL, 0},
  7189. };
  7190. /**
  7191. * Implement RFC 5705
  7192. * TLS 1.3 uses a different exporter definition (section 7.5 of RFC 8446)
  7193. * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
  7194. */
  7195. int wolfSSL_export_keying_material(WOLFSSL *ssl,
  7196. unsigned char *out, size_t outLen,
  7197. const char *label, size_t labelLen,
  7198. const unsigned char *context, size_t contextLen,
  7199. int use_context)
  7200. {
  7201. byte* seed = NULL;
  7202. word32 seedLen;
  7203. const struct ForbiddenLabels* fl;
  7204. WOLFSSL_ENTER("wolfSSL_export_keying_material");
  7205. if (ssl == NULL || out == NULL || label == NULL ||
  7206. (use_context && contextLen && context == NULL)) {
  7207. WOLFSSL_MSG("Bad argument");
  7208. return WOLFSSL_FAILURE;
  7209. }
  7210. /* clientRandom + serverRandom
  7211. * OR
  7212. * clientRandom + serverRandom + ctx len encoding + ctx */
  7213. seedLen = !use_context ? (word32)SEED_LEN :
  7214. (word32)SEED_LEN + 2 + (word32)contextLen;
  7215. if (ssl->options.saveArrays == 0 || ssl->arrays == NULL) {
  7216. WOLFSSL_MSG("To export keying material wolfSSL needs to keep handshake "
  7217. "data. Call wolfSSL_KeepArrays before attempting to "
  7218. "export keyid material.");
  7219. return WOLFSSL_FAILURE;
  7220. }
  7221. /* check forbidden labels */
  7222. for (fl = &forbiddenLabels[0]; fl->label != NULL; fl++) {
  7223. if (labelLen >= fl->labelLen &&
  7224. XMEMCMP(label, fl->label, fl->labelLen) == 0) {
  7225. WOLFSSL_MSG("Forbidden label");
  7226. return WOLFSSL_FAILURE;
  7227. }
  7228. }
  7229. #ifdef WOLFSSL_TLS13
  7230. if (IsAtLeastTLSv1_3(ssl->version)) {
  7231. /* Path for TLS 1.3 */
  7232. if (!use_context) {
  7233. contextLen = 0;
  7234. context = (byte*)""; /* Give valid pointer for 0 length memcpy */
  7235. }
  7236. if (Tls13_Exporter(ssl, out, (word32)outLen, label, labelLen,
  7237. context, contextLen) != 0) {
  7238. WOLFSSL_MSG("Tls13_Exporter error");
  7239. return WOLFSSL_FAILURE;
  7240. }
  7241. return WOLFSSL_SUCCESS;
  7242. }
  7243. #endif
  7244. /* Path for <=TLS 1.2 */
  7245. seed = (byte*)XMALLOC(seedLen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7246. if (seed == NULL) {
  7247. WOLFSSL_MSG("malloc error");
  7248. return WOLFSSL_FAILURE;
  7249. }
  7250. XMEMCPY(seed, ssl->arrays->clientRandom, RAN_LEN);
  7251. XMEMCPY(seed + RAN_LEN, ssl->arrays->serverRandom, RAN_LEN);
  7252. if (use_context) {
  7253. /* Encode len in big endian */
  7254. seed[SEED_LEN ] = (contextLen >> 8) & 0xFF;
  7255. seed[SEED_LEN + 1] = (contextLen) & 0xFF;
  7256. if (contextLen) {
  7257. /* 0 length context is allowed */
  7258. XMEMCPY(seed + SEED_LEN + 2, context, contextLen);
  7259. }
  7260. }
  7261. PRIVATE_KEY_UNLOCK();
  7262. if (wc_PRF_TLS(out, (word32)outLen, ssl->arrays->masterSecret, SECRET_LEN,
  7263. (byte*)label, (word32)labelLen, seed, seedLen,
  7264. IsAtLeastTLSv1_2(ssl), ssl->specs.mac_algorithm, ssl->heap,
  7265. ssl->devId) != 0) {
  7266. WOLFSSL_MSG("wc_PRF_TLS error");
  7267. PRIVATE_KEY_LOCK();
  7268. XFREE(seed, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7269. return WOLFSSL_FAILURE;
  7270. }
  7271. PRIVATE_KEY_LOCK();
  7272. XFREE(seed, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7273. return WOLFSSL_SUCCESS;
  7274. }
  7275. #endif /* HAVE_KEYING_MATERIAL */
  7276. int wolfSSL_dtls_get_using_nonblock(WOLFSSL* ssl)
  7277. {
  7278. int useNb = 0;
  7279. if (ssl == NULL)
  7280. return WOLFSSL_FAILURE;
  7281. WOLFSSL_ENTER("wolfSSL_dtls_get_using_nonblock");
  7282. if (ssl->options.dtls) {
  7283. #ifdef WOLFSSL_DTLS
  7284. useNb = ssl->options.dtlsUseNonblock;
  7285. #endif
  7286. }
  7287. else {
  7288. WOLFSSL_MSG("wolfSSL_dtls_get_using_nonblock() is "
  7289. "DEPRECATED for non-DTLS use.");
  7290. }
  7291. return useNb;
  7292. }
  7293. #ifndef WOLFSSL_LEANPSK
  7294. void wolfSSL_dtls_set_using_nonblock(WOLFSSL* ssl, int nonblock)
  7295. {
  7296. (void)nonblock;
  7297. WOLFSSL_ENTER("wolfSSL_dtls_set_using_nonblock");
  7298. if (ssl == NULL)
  7299. return;
  7300. if (ssl->options.dtls) {
  7301. #ifdef WOLFSSL_DTLS
  7302. ssl->options.dtlsUseNonblock = (nonblock != 0);
  7303. #endif
  7304. }
  7305. else {
  7306. WOLFSSL_MSG("wolfSSL_dtls_set_using_nonblock() is "
  7307. "DEPRECATED for non-DTLS use.");
  7308. }
  7309. }
  7310. #ifdef WOLFSSL_DTLS
  7311. int wolfSSL_dtls_get_current_timeout(WOLFSSL* ssl)
  7312. {
  7313. int timeout = 0;
  7314. if (ssl)
  7315. timeout = ssl->dtls_timeout;
  7316. WOLFSSL_LEAVE("wolfSSL_dtls_get_current_timeout", timeout);
  7317. return timeout;
  7318. }
  7319. #ifdef WOLFSSL_DTLS13
  7320. /*
  7321. * This API returns 1 when the user should set a short timeout for receiving
  7322. * data. It is recommended that it is at most 1/4 the value returned by
  7323. * wolfSSL_dtls_get_current_timeout().
  7324. */
  7325. int wolfSSL_dtls13_use_quick_timeout(WOLFSSL* ssl)
  7326. {
  7327. return ssl->dtls13FastTimeout;
  7328. }
  7329. /*
  7330. * When this is set, a DTLS 1.3 connection will send acks immediately when a
  7331. * disruption is detected to shortcut timeouts. This results in potentially
  7332. * more traffic but may make the handshake quicker.
  7333. */
  7334. void wolfSSL_dtls13_set_send_more_acks(WOLFSSL* ssl, int value)
  7335. {
  7336. if (ssl != NULL)
  7337. ssl->options.dtls13SendMoreAcks = !!value;
  7338. }
  7339. #endif /* WOLFSSL_DTLS13 */
  7340. int wolfSSL_DTLSv1_get_timeout(WOLFSSL* ssl, WOLFSSL_TIMEVAL* timeleft)
  7341. {
  7342. if (ssl && timeleft) {
  7343. XMEMSET(timeleft, 0, sizeof(WOLFSSL_TIMEVAL));
  7344. timeleft->tv_sec = ssl->dtls_timeout;
  7345. }
  7346. return 0;
  7347. }
  7348. #ifndef NO_WOLFSSL_STUB
  7349. int wolfSSL_DTLSv1_handle_timeout(WOLFSSL* ssl)
  7350. {
  7351. WOLFSSL_STUB("SSL_DTLSv1_handle_timeout");
  7352. (void)ssl;
  7353. return 0;
  7354. }
  7355. #endif
  7356. #ifndef NO_WOLFSSL_STUB
  7357. void wolfSSL_DTLSv1_set_initial_timeout_duration(WOLFSSL* ssl,
  7358. word32 duration_ms)
  7359. {
  7360. WOLFSSL_STUB("SSL_DTLSv1_set_initial_timeout_duration");
  7361. (void)ssl;
  7362. (void)duration_ms;
  7363. }
  7364. #endif
  7365. /* user may need to alter init dtls recv timeout, WOLFSSL_SUCCESS on ok */
  7366. int wolfSSL_dtls_set_timeout_init(WOLFSSL* ssl, int timeout)
  7367. {
  7368. if (ssl == NULL || timeout < 0)
  7369. return BAD_FUNC_ARG;
  7370. if (timeout > ssl->dtls_timeout_max) {
  7371. WOLFSSL_MSG("Can't set dtls timeout init greater than dtls timeout "
  7372. "max");
  7373. return BAD_FUNC_ARG;
  7374. }
  7375. ssl->dtls_timeout_init = timeout;
  7376. ssl->dtls_timeout = timeout;
  7377. return WOLFSSL_SUCCESS;
  7378. }
  7379. /* user may need to alter max dtls recv timeout, WOLFSSL_SUCCESS on ok */
  7380. int wolfSSL_dtls_set_timeout_max(WOLFSSL* ssl, int timeout)
  7381. {
  7382. if (ssl == NULL || timeout < 0)
  7383. return BAD_FUNC_ARG;
  7384. if (timeout < ssl->dtls_timeout_init) {
  7385. WOLFSSL_MSG("Can't set dtls timeout max less than dtls timeout init");
  7386. return BAD_FUNC_ARG;
  7387. }
  7388. ssl->dtls_timeout_max = timeout;
  7389. return WOLFSSL_SUCCESS;
  7390. }
  7391. int wolfSSL_dtls_got_timeout(WOLFSSL* ssl)
  7392. {
  7393. int result = WOLFSSL_SUCCESS;
  7394. WOLFSSL_ENTER("wolfSSL_dtls_got_timeout");
  7395. if (ssl == NULL)
  7396. return WOLFSSL_FATAL_ERROR;
  7397. #ifdef WOLFSSL_DTLS13
  7398. if (ssl->options.dtls && IsAtLeastTLSv1_3(ssl->version)) {
  7399. result = Dtls13RtxTimeout(ssl);
  7400. if (result < 0) {
  7401. if (result == WANT_WRITE)
  7402. ssl->dtls13SendingAckOrRtx = 1;
  7403. ssl->error = result;
  7404. WOLFSSL_ERROR(result);
  7405. return WOLFSSL_FATAL_ERROR;
  7406. }
  7407. return WOLFSSL_SUCCESS;
  7408. }
  7409. #endif /* WOLFSSL_DTLS13 */
  7410. if ((IsSCR(ssl) || !ssl->options.handShakeDone)) {
  7411. if (DtlsMsgPoolTimeout(ssl) < 0){
  7412. ssl->error = SOCKET_ERROR_E;
  7413. WOLFSSL_ERROR(ssl->error);
  7414. result = WOLFSSL_FATAL_ERROR;
  7415. }
  7416. else if ((result = DtlsMsgPoolSend(ssl, 0)) < 0) {
  7417. ssl->error = result;
  7418. WOLFSSL_ERROR(result);
  7419. result = WOLFSSL_FATAL_ERROR;
  7420. }
  7421. else {
  7422. /* Reset return value to success */
  7423. result = WOLFSSL_SUCCESS;
  7424. }
  7425. }
  7426. WOLFSSL_LEAVE("wolfSSL_dtls_got_timeout", result);
  7427. return result;
  7428. }
  7429. /* retransmit all the saves messages, WOLFSSL_SUCCESS on ok */
  7430. int wolfSSL_dtls_retransmit(WOLFSSL* ssl)
  7431. {
  7432. WOLFSSL_ENTER("wolfSSL_dtls_retransmit");
  7433. if (ssl == NULL)
  7434. return WOLFSSL_FATAL_ERROR;
  7435. if (!ssl->options.handShakeDone) {
  7436. int result = DtlsMsgPoolSend(ssl, 0);
  7437. if (result < 0) {
  7438. ssl->error = result;
  7439. WOLFSSL_ERROR(result);
  7440. return WOLFSSL_FATAL_ERROR;
  7441. }
  7442. }
  7443. return 0;
  7444. }
  7445. #endif /* DTLS */
  7446. #endif /* LEANPSK */
  7447. #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
  7448. /* Not an SSL function, return 0 for success, error code otherwise */
  7449. /* Prereq: ssl's RNG needs to be initialized. */
  7450. int wolfSSL_DTLS_SetCookieSecret(WOLFSSL* ssl,
  7451. const byte* secret, word32 secretSz)
  7452. {
  7453. int ret = 0;
  7454. WOLFSSL_ENTER("wolfSSL_DTLS_SetCookieSecret");
  7455. if (ssl == NULL) {
  7456. WOLFSSL_MSG("need a SSL object");
  7457. return BAD_FUNC_ARG;
  7458. }
  7459. if (secret != NULL && secretSz == 0) {
  7460. WOLFSSL_MSG("can't have a new secret without a size");
  7461. return BAD_FUNC_ARG;
  7462. }
  7463. /* If secretSz is 0, use the default size. */
  7464. if (secretSz == 0)
  7465. secretSz = COOKIE_SECRET_SZ;
  7466. if (secretSz != ssl->buffers.dtlsCookieSecret.length) {
  7467. byte* newSecret;
  7468. if (ssl->buffers.dtlsCookieSecret.buffer != NULL) {
  7469. ForceZero(ssl->buffers.dtlsCookieSecret.buffer,
  7470. ssl->buffers.dtlsCookieSecret.length);
  7471. XFREE(ssl->buffers.dtlsCookieSecret.buffer,
  7472. ssl->heap, DYNAMIC_TYPE_COOKIE_PWD);
  7473. }
  7474. newSecret = (byte*)XMALLOC(secretSz, ssl->heap,DYNAMIC_TYPE_COOKIE_PWD);
  7475. if (newSecret == NULL) {
  7476. ssl->buffers.dtlsCookieSecret.buffer = NULL;
  7477. ssl->buffers.dtlsCookieSecret.length = 0;
  7478. WOLFSSL_MSG("couldn't allocate new cookie secret");
  7479. return MEMORY_ERROR;
  7480. }
  7481. ssl->buffers.dtlsCookieSecret.buffer = newSecret;
  7482. ssl->buffers.dtlsCookieSecret.length = secretSz;
  7483. #ifdef WOLFSSL_CHECK_MEM_ZERO
  7484. wc_MemZero_Add("wolfSSL_DTLS_SetCookieSecret secret",
  7485. ssl->buffers.dtlsCookieSecret.buffer,
  7486. ssl->buffers.dtlsCookieSecret.length);
  7487. #endif
  7488. }
  7489. /* If the supplied secret is NULL, randomly generate a new secret. */
  7490. if (secret == NULL) {
  7491. ret = wc_RNG_GenerateBlock(ssl->rng,
  7492. ssl->buffers.dtlsCookieSecret.buffer, secretSz);
  7493. }
  7494. else
  7495. XMEMCPY(ssl->buffers.dtlsCookieSecret.buffer, secret, secretSz);
  7496. WOLFSSL_LEAVE("wolfSSL_DTLS_SetCookieSecret", 0);
  7497. return ret;
  7498. }
  7499. #endif /* WOLFSSL_DTLS && !NO_WOLFSSL_SERVER */
  7500. /* EITHER SIDE METHODS */
  7501. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
  7502. WOLFSSL_METHOD* wolfSSLv23_method(void)
  7503. {
  7504. return wolfSSLv23_method_ex(NULL);
  7505. }
  7506. WOLFSSL_METHOD* wolfSSLv23_method_ex(void* heap)
  7507. {
  7508. WOLFSSL_METHOD* m = NULL;
  7509. WOLFSSL_ENTER("wolfSSLv23_method");
  7510. #if !defined(NO_WOLFSSL_CLIENT)
  7511. m = wolfSSLv23_client_method_ex(heap);
  7512. #elif !defined(NO_WOLFSSL_SERVER)
  7513. m = wolfSSLv23_server_method_ex(heap);
  7514. #else
  7515. (void)heap;
  7516. #endif
  7517. if (m != NULL) {
  7518. m->side = WOLFSSL_NEITHER_END;
  7519. }
  7520. return m;
  7521. }
  7522. #ifdef WOLFSSL_ALLOW_SSLV3
  7523. WOLFSSL_METHOD* wolfSSLv3_method(void)
  7524. {
  7525. return wolfSSLv3_method_ex(NULL);
  7526. }
  7527. WOLFSSL_METHOD* wolfSSLv3_method_ex(void* heap)
  7528. {
  7529. WOLFSSL_METHOD* m = NULL;
  7530. WOLFSSL_ENTER("wolfSSLv3_method_ex");
  7531. #if !defined(NO_WOLFSSL_CLIENT)
  7532. m = wolfSSLv3_client_method_ex(heap);
  7533. #elif !defined(NO_WOLFSSL_SERVER)
  7534. m = wolfSSLv3_server_method_ex(heap);
  7535. #endif
  7536. if (m != NULL) {
  7537. m->side = WOLFSSL_NEITHER_END;
  7538. }
  7539. return m;
  7540. }
  7541. #endif
  7542. #endif /* OPENSSL_EXTRA || WOLFSSL_EITHER_SIDE */
  7543. /* client only parts */
  7544. #ifndef NO_WOLFSSL_CLIENT
  7545. #if defined(OPENSSL_EXTRA) && !defined(NO_OLD_TLS)
  7546. WOLFSSL_METHOD* wolfSSLv2_client_method(void)
  7547. {
  7548. WOLFSSL_STUB("wolfSSLv2_client_method");
  7549. return NULL;
  7550. }
  7551. #endif
  7552. #if defined(WOLFSSL_ALLOW_SSLV3) && !defined(NO_OLD_TLS)
  7553. WOLFSSL_METHOD* wolfSSLv3_client_method(void)
  7554. {
  7555. return wolfSSLv3_client_method_ex(NULL);
  7556. }
  7557. WOLFSSL_METHOD* wolfSSLv3_client_method_ex(void* heap)
  7558. {
  7559. WOLFSSL_METHOD* method =
  7560. (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD),
  7561. heap, DYNAMIC_TYPE_METHOD);
  7562. (void)heap;
  7563. WOLFSSL_ENTER("wolfSSLv3_client_method_ex");
  7564. if (method)
  7565. InitSSL_Method(method, MakeSSLv3());
  7566. return method;
  7567. }
  7568. #endif /* WOLFSSL_ALLOW_SSLV3 && !NO_OLD_TLS */
  7569. WOLFSSL_METHOD* wolfSSLv23_client_method(void)
  7570. {
  7571. return wolfSSLv23_client_method_ex(NULL);
  7572. }
  7573. WOLFSSL_METHOD* wolfSSLv23_client_method_ex(void* heap)
  7574. {
  7575. WOLFSSL_METHOD* method =
  7576. (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD),
  7577. heap, DYNAMIC_TYPE_METHOD);
  7578. (void)heap;
  7579. WOLFSSL_ENTER("wolfSSLv23_client_method_ex");
  7580. if (method) {
  7581. #if !defined(NO_SHA256) || defined(WOLFSSL_SHA384) || \
  7582. defined(WOLFSSL_SHA512)
  7583. #if defined(WOLFSSL_TLS13)
  7584. InitSSL_Method(method, MakeTLSv1_3());
  7585. #elif !defined(WOLFSSL_NO_TLS12)
  7586. InitSSL_Method(method, MakeTLSv1_2());
  7587. #elif !defined(NO_OLD_TLS)
  7588. InitSSL_Method(method, MakeTLSv1_1());
  7589. #endif
  7590. #else
  7591. #ifndef NO_OLD_TLS
  7592. InitSSL_Method(method, MakeTLSv1_1());
  7593. #endif
  7594. #endif
  7595. #if !defined(NO_OLD_TLS) || defined(WOLFSSL_TLS13)
  7596. method->downgrade = 1;
  7597. #endif
  7598. }
  7599. return method;
  7600. }
  7601. /* please see note at top of README if you get an error from connect */
  7602. WOLFSSL_ABI
  7603. int wolfSSL_connect(WOLFSSL* ssl)
  7604. {
  7605. #if !(defined(WOLFSSL_NO_TLS12) && defined(NO_OLD_TLS) && \
  7606. defined(WOLFSSL_TLS13))
  7607. int neededState;
  7608. byte advanceState;
  7609. #endif
  7610. int ret = 0;
  7611. (void)ret;
  7612. #ifdef HAVE_ERRNO_H
  7613. errno = 0;
  7614. #endif
  7615. if (ssl == NULL)
  7616. return BAD_FUNC_ARG;
  7617. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
  7618. if (ssl->options.side == WOLFSSL_NEITHER_END) {
  7619. ssl->error = InitSSL_Side(ssl, WOLFSSL_CLIENT_END);
  7620. if (ssl->error != WOLFSSL_SUCCESS) {
  7621. WOLFSSL_ERROR(ssl->error);
  7622. return WOLFSSL_FATAL_ERROR;
  7623. }
  7624. ssl->error = 0; /* expected to be zero here */
  7625. }
  7626. #ifdef OPENSSL_EXTRA
  7627. if (ssl->CBIS != NULL) {
  7628. ssl->CBIS(ssl, SSL_ST_CONNECT, WOLFSSL_SUCCESS);
  7629. ssl->cbmode = SSL_CB_WRITE;
  7630. }
  7631. #endif
  7632. #endif /* OPENSSL_EXTRA || WOLFSSL_EITHER_SIDE */
  7633. #if defined(WOLFSSL_NO_TLS12) && defined(NO_OLD_TLS) && \
  7634. defined(WOLFSSL_TLS13)
  7635. return wolfSSL_connect_TLSv13(ssl);
  7636. #else
  7637. #ifdef WOLFSSL_TLS13
  7638. if (ssl->options.tls1_3) {
  7639. WOLFSSL_MSG("TLS 1.3");
  7640. return wolfSSL_connect_TLSv13(ssl);
  7641. }
  7642. #endif
  7643. WOLFSSL_MSG("TLS 1.2 or lower");
  7644. WOLFSSL_ENTER("wolfSSL_connect");
  7645. /* make sure this wolfSSL object has arrays and rng setup. Protects
  7646. * case where the WOLFSSL object is reused via wolfSSL_clear() */
  7647. if ((ret = ReinitSSL(ssl, ssl->ctx, 0)) != 0) {
  7648. return ret;
  7649. }
  7650. #ifdef WOLFSSL_WOLFSENTRY_HOOKS
  7651. if ((ssl->ConnectFilter != NULL) &&
  7652. (ssl->options.connectState == CONNECT_BEGIN)) {
  7653. wolfSSL_netfilter_decision_t res;
  7654. if ((ssl->ConnectFilter(ssl, ssl->ConnectFilter_arg, &res) ==
  7655. WOLFSSL_SUCCESS) &&
  7656. (res == WOLFSSL_NETFILTER_REJECT)) {
  7657. ssl->error = SOCKET_FILTERED_E;
  7658. WOLFSSL_ERROR(ssl->error);
  7659. return WOLFSSL_FATAL_ERROR;
  7660. }
  7661. }
  7662. #endif /* WOLFSSL_WOLFSENTRY_HOOKS */
  7663. if (ssl->options.side != WOLFSSL_CLIENT_END) {
  7664. ssl->error = SIDE_ERROR;
  7665. WOLFSSL_ERROR(ssl->error);
  7666. return WOLFSSL_FATAL_ERROR;
  7667. }
  7668. #ifdef WOLFSSL_DTLS
  7669. if (ssl->version.major == DTLS_MAJOR) {
  7670. ssl->options.dtls = 1;
  7671. ssl->options.tls = 1;
  7672. ssl->options.tls1_1 = 1;
  7673. ssl->options.dtlsStateful = 1;
  7674. }
  7675. #endif
  7676. /* fragOffset is non-zero when sending fragments. On the last
  7677. * fragment, fragOffset is zero again, and the state can be
  7678. * advanced. */
  7679. advanceState = ssl->fragOffset == 0 &&
  7680. (ssl->options.connectState == CONNECT_BEGIN ||
  7681. ssl->options.connectState == HELLO_AGAIN ||
  7682. (ssl->options.connectState >= FIRST_REPLY_DONE &&
  7683. ssl->options.connectState <= FIRST_REPLY_FOURTH));
  7684. #ifdef WOLFSSL_DTLS13
  7685. if (ssl->options.dtls && IsAtLeastTLSv1_3(ssl->version))
  7686. advanceState = advanceState && !ssl->dtls13SendingAckOrRtx;
  7687. #endif /* WOLFSSL_DTLS13 */
  7688. if (ssl->buffers.outputBuffer.length > 0
  7689. #ifdef WOLFSSL_ASYNC_CRYPT
  7690. /* do not send buffered or advance state if last error was an
  7691. async pending operation */
  7692. && ssl->error != WC_PENDING_E
  7693. #endif
  7694. ) {
  7695. ret = SendBuffered(ssl);
  7696. if (ret == 0) {
  7697. if (ssl->fragOffset == 0 && !ssl->options.buildingMsg) {
  7698. if (advanceState) {
  7699. ssl->options.connectState++;
  7700. WOLFSSL_MSG("connect state: Advanced from last "
  7701. "buffered fragment send");
  7702. #ifdef WOLFSSL_ASYNC_IO
  7703. /* Cleanup async */
  7704. FreeAsyncCtx(ssl, 0);
  7705. #endif
  7706. }
  7707. }
  7708. else {
  7709. WOLFSSL_MSG("connect state: "
  7710. "Not advanced, more fragments to send");
  7711. }
  7712. }
  7713. else {
  7714. ssl->error = ret;
  7715. WOLFSSL_ERROR(ssl->error);
  7716. return WOLFSSL_FATAL_ERROR;
  7717. }
  7718. #ifdef WOLFSSL_DTLS13
  7719. if (ssl->options.dtls)
  7720. ssl->dtls13SendingAckOrRtx = 0;
  7721. #endif /* WOLFSSL_DTLS13 */
  7722. }
  7723. ret = RetrySendAlert(ssl);
  7724. if (ret != 0) {
  7725. ssl->error = ret;
  7726. WOLFSSL_ERROR(ssl->error);
  7727. return WOLFSSL_FATAL_ERROR;
  7728. }
  7729. switch (ssl->options.connectState) {
  7730. case CONNECT_BEGIN :
  7731. /* always send client hello first */
  7732. if ( (ssl->error = SendClientHello(ssl)) != 0) {
  7733. WOLFSSL_ERROR(ssl->error);
  7734. return WOLFSSL_FATAL_ERROR;
  7735. }
  7736. ssl->options.connectState = CLIENT_HELLO_SENT;
  7737. WOLFSSL_MSG("connect state: CLIENT_HELLO_SENT");
  7738. FALL_THROUGH;
  7739. case CLIENT_HELLO_SENT :
  7740. neededState = ssl->options.resuming ? SERVER_FINISHED_COMPLETE :
  7741. SERVER_HELLODONE_COMPLETE;
  7742. #ifdef WOLFSSL_DTLS
  7743. /* In DTLS, when resuming, we can go straight to FINISHED,
  7744. * or do a cookie exchange and then skip to FINISHED, assume
  7745. * we need the cookie exchange first. */
  7746. if (IsDtlsNotSctpMode(ssl))
  7747. neededState = SERVER_HELLOVERIFYREQUEST_COMPLETE;
  7748. #endif
  7749. /* get response */
  7750. WOLFSSL_MSG("Server state up to needed state.");
  7751. while (ssl->options.serverState < neededState) {
  7752. WOLFSSL_MSG("Progressing server state...");
  7753. #ifdef WOLFSSL_TLS13
  7754. if (ssl->options.tls1_3)
  7755. return wolfSSL_connect_TLSv13(ssl);
  7756. #endif
  7757. WOLFSSL_MSG("ProcessReply...");
  7758. if ( (ssl->error = ProcessReply(ssl)) < 0) {
  7759. WOLFSSL_ERROR(ssl->error);
  7760. return WOLFSSL_FATAL_ERROR;
  7761. }
  7762. /* if resumption failed, reset needed state */
  7763. else if (neededState == SERVER_FINISHED_COMPLETE) {
  7764. if (!ssl->options.resuming) {
  7765. #ifdef WOLFSSL_DTLS
  7766. if (IsDtlsNotSctpMode(ssl))
  7767. neededState = SERVER_HELLOVERIFYREQUEST_COMPLETE;
  7768. else
  7769. #endif
  7770. neededState = SERVER_HELLODONE_COMPLETE;
  7771. }
  7772. }
  7773. WOLFSSL_MSG("ProcessReply done.");
  7774. #ifdef WOLFSSL_DTLS13
  7775. if (ssl->options.dtls && IsAtLeastTLSv1_3(ssl->version)
  7776. && ssl->dtls13Rtx.sendAcks == 1
  7777. && ssl->options.seenUnifiedHdr) {
  7778. /* we aren't negotiated the version yet, so we aren't sure
  7779. * the other end can speak v1.3. On the other side we have
  7780. * received a unified records, assuming that the
  7781. * ServerHello got lost, we will send an empty ACK. In case
  7782. * the server is a DTLS with version less than 1.3, it
  7783. * should just ignore the message */
  7784. ssl->dtls13Rtx.sendAcks = 0;
  7785. if ((ssl->error = SendDtls13Ack(ssl)) < 0) {
  7786. if (ssl->error == WANT_WRITE)
  7787. ssl->dtls13SendingAckOrRtx = 1;
  7788. WOLFSSL_ERROR(ssl->error);
  7789. return WOLFSSL_FATAL_ERROR;
  7790. }
  7791. }
  7792. #endif /* WOLFSSL_DTLS13 */
  7793. }
  7794. ssl->options.connectState = HELLO_AGAIN;
  7795. WOLFSSL_MSG("connect state: HELLO_AGAIN");
  7796. FALL_THROUGH;
  7797. case HELLO_AGAIN :
  7798. #ifdef WOLFSSL_TLS13
  7799. if (ssl->options.tls1_3)
  7800. return wolfSSL_connect_TLSv13(ssl);
  7801. #endif
  7802. #ifdef WOLFSSL_DTLS
  7803. if (ssl->options.serverState ==
  7804. SERVER_HELLOVERIFYREQUEST_COMPLETE) {
  7805. if (IsDtlsNotSctpMode(ssl)) {
  7806. /* re-init hashes, exclude first hello and verify request */
  7807. if ((ssl->error = InitHandshakeHashes(ssl)) != 0) {
  7808. WOLFSSL_ERROR(ssl->error);
  7809. return WOLFSSL_FATAL_ERROR;
  7810. }
  7811. if ( (ssl->error = SendClientHello(ssl)) != 0) {
  7812. WOLFSSL_ERROR(ssl->error);
  7813. return WOLFSSL_FATAL_ERROR;
  7814. }
  7815. }
  7816. }
  7817. #endif
  7818. ssl->options.connectState = HELLO_AGAIN_REPLY;
  7819. WOLFSSL_MSG("connect state: HELLO_AGAIN_REPLY");
  7820. FALL_THROUGH;
  7821. case HELLO_AGAIN_REPLY :
  7822. #ifdef WOLFSSL_DTLS
  7823. if (IsDtlsNotSctpMode(ssl)) {
  7824. neededState = ssl->options.resuming ?
  7825. SERVER_FINISHED_COMPLETE : SERVER_HELLODONE_COMPLETE;
  7826. /* get response */
  7827. while (ssl->options.serverState < neededState) {
  7828. if ( (ssl->error = ProcessReply(ssl)) < 0) {
  7829. WOLFSSL_ERROR(ssl->error);
  7830. return WOLFSSL_FATAL_ERROR;
  7831. }
  7832. /* if resumption failed, reset needed state */
  7833. if (neededState == SERVER_FINISHED_COMPLETE) {
  7834. if (!ssl->options.resuming)
  7835. neededState = SERVER_HELLODONE_COMPLETE;
  7836. }
  7837. }
  7838. }
  7839. #endif
  7840. ssl->options.connectState = FIRST_REPLY_DONE;
  7841. WOLFSSL_MSG("connect state: FIRST_REPLY_DONE");
  7842. FALL_THROUGH;
  7843. case FIRST_REPLY_DONE :
  7844. if (ssl->options.certOnly)
  7845. return WOLFSSL_SUCCESS;
  7846. #if !defined(NO_CERTS) && !defined(WOLFSSL_NO_CLIENT_AUTH)
  7847. #ifdef WOLFSSL_TLS13
  7848. if (ssl->options.tls1_3)
  7849. return wolfSSL_connect_TLSv13(ssl);
  7850. #endif
  7851. if (ssl->options.sendVerify) {
  7852. if ( (ssl->error = SendCertificate(ssl)) != 0) {
  7853. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  7854. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  7855. #endif
  7856. WOLFSSL_ERROR(ssl->error);
  7857. return WOLFSSL_FATAL_ERROR;
  7858. }
  7859. WOLFSSL_MSG("sent: certificate");
  7860. }
  7861. #endif
  7862. ssl->options.connectState = FIRST_REPLY_FIRST;
  7863. WOLFSSL_MSG("connect state: FIRST_REPLY_FIRST");
  7864. FALL_THROUGH;
  7865. case FIRST_REPLY_FIRST :
  7866. #ifdef WOLFSSL_TLS13
  7867. if (ssl->options.tls1_3)
  7868. return wolfSSL_connect_TLSv13(ssl);
  7869. #endif
  7870. if (!ssl->options.resuming) {
  7871. if ( (ssl->error = SendClientKeyExchange(ssl)) != 0) {
  7872. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  7873. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  7874. #endif
  7875. #ifdef WOLFSSL_EXTRA_ALERTS
  7876. if (ssl->error == NO_PEER_KEY ||
  7877. ssl->error == PSK_KEY_ERROR) {
  7878. SendAlert(ssl, alert_fatal, handshake_failure);
  7879. }
  7880. #endif
  7881. WOLFSSL_ERROR(ssl->error);
  7882. return WOLFSSL_FATAL_ERROR;
  7883. }
  7884. WOLFSSL_MSG("sent: client key exchange");
  7885. }
  7886. ssl->options.connectState = FIRST_REPLY_SECOND;
  7887. WOLFSSL_MSG("connect state: FIRST_REPLY_SECOND");
  7888. FALL_THROUGH;
  7889. #if !defined(WOLFSSL_NO_TLS12) || !defined(NO_OLD_TLS)
  7890. case FIRST_REPLY_SECOND :
  7891. /* CLIENT: Fail-safe for Server Authentication. */
  7892. if (!ssl->options.peerAuthGood) {
  7893. WOLFSSL_MSG("Server authentication did not happen");
  7894. ssl->error = NO_PEER_VERIFY;
  7895. return WOLFSSL_FATAL_ERROR;
  7896. }
  7897. #if !defined(NO_CERTS) && !defined(WOLFSSL_NO_CLIENT_AUTH)
  7898. if (ssl->options.sendVerify) {
  7899. if ( (ssl->error = SendCertificateVerify(ssl)) != 0) {
  7900. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  7901. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  7902. #endif
  7903. WOLFSSL_ERROR(ssl->error);
  7904. return WOLFSSL_FATAL_ERROR;
  7905. }
  7906. WOLFSSL_MSG("sent: certificate verify");
  7907. }
  7908. #endif /* !NO_CERTS && !WOLFSSL_NO_CLIENT_AUTH */
  7909. ssl->options.connectState = FIRST_REPLY_THIRD;
  7910. WOLFSSL_MSG("connect state: FIRST_REPLY_THIRD");
  7911. FALL_THROUGH;
  7912. case FIRST_REPLY_THIRD :
  7913. if ( (ssl->error = SendChangeCipher(ssl)) != 0) {
  7914. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  7915. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  7916. #endif
  7917. WOLFSSL_ERROR(ssl->error);
  7918. return WOLFSSL_FATAL_ERROR;
  7919. }
  7920. WOLFSSL_MSG("sent: change cipher spec");
  7921. ssl->options.connectState = FIRST_REPLY_FOURTH;
  7922. WOLFSSL_MSG("connect state: FIRST_REPLY_FOURTH");
  7923. FALL_THROUGH;
  7924. case FIRST_REPLY_FOURTH :
  7925. if ( (ssl->error = SendFinished(ssl)) != 0) {
  7926. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  7927. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  7928. #endif
  7929. WOLFSSL_ERROR(ssl->error);
  7930. return WOLFSSL_FATAL_ERROR;
  7931. }
  7932. WOLFSSL_MSG("sent: finished");
  7933. ssl->options.connectState = FINISHED_DONE;
  7934. WOLFSSL_MSG("connect state: FINISHED_DONE");
  7935. FALL_THROUGH;
  7936. #ifdef WOLFSSL_DTLS13
  7937. case WAIT_FINISHED_ACK:
  7938. ssl->options.connectState = FINISHED_DONE;
  7939. FALL_THROUGH;
  7940. #endif /* WOLFSSL_DTLS13 */
  7941. case FINISHED_DONE :
  7942. /* get response */
  7943. while (ssl->options.serverState < SERVER_FINISHED_COMPLETE)
  7944. if ( (ssl->error = ProcessReply(ssl)) < 0) {
  7945. WOLFSSL_ERROR(ssl->error);
  7946. return WOLFSSL_FATAL_ERROR;
  7947. }
  7948. ssl->options.connectState = SECOND_REPLY_DONE;
  7949. WOLFSSL_MSG("connect state: SECOND_REPLY_DONE");
  7950. FALL_THROUGH;
  7951. case SECOND_REPLY_DONE:
  7952. #ifndef NO_HANDSHAKE_DONE_CB
  7953. if (ssl->hsDoneCb) {
  7954. int cbret = ssl->hsDoneCb(ssl, ssl->hsDoneCtx);
  7955. if (cbret < 0) {
  7956. ssl->error = cbret;
  7957. WOLFSSL_MSG("HandShake Done Cb don't continue error");
  7958. return WOLFSSL_FATAL_ERROR;
  7959. }
  7960. }
  7961. #endif /* NO_HANDSHAKE_DONE_CB */
  7962. if (!ssl->options.dtls) {
  7963. if (!ssl->options.keepResources) {
  7964. FreeHandshakeResources(ssl);
  7965. }
  7966. }
  7967. #ifdef WOLFSSL_DTLS
  7968. else {
  7969. ssl->options.dtlsHsRetain = 1;
  7970. }
  7971. #endif /* WOLFSSL_DTLS */
  7972. #if defined(WOLFSSL_ASYNC_CRYPT) && defined(HAVE_SECURE_RENEGOTIATION)
  7973. /* This may be necessary in async so that we don't try to
  7974. * renegotiate again */
  7975. if (ssl->secure_renegotiation &&
  7976. ssl->secure_renegotiation->startScr) {
  7977. ssl->secure_renegotiation->startScr = 0;
  7978. }
  7979. #endif /* WOLFSSL_ASYNC_CRYPT && HAVE_SECURE_RENEGOTIATION */
  7980. #if defined(WOLFSSL_ASYNC_IO) && !defined(WOLFSSL_ASYNC_CRYPT)
  7981. /* Free the remaining async context if not using it for crypto */
  7982. FreeAsyncCtx(ssl, 1);
  7983. #endif
  7984. ssl->error = 0; /* clear the error */
  7985. WOLFSSL_LEAVE("wolfSSL_connect", WOLFSSL_SUCCESS);
  7986. return WOLFSSL_SUCCESS;
  7987. #endif /* !WOLFSSL_NO_TLS12 || !NO_OLD_TLS */
  7988. default:
  7989. WOLFSSL_MSG("Unknown connect state ERROR");
  7990. return WOLFSSL_FATAL_ERROR; /* unknown connect state */
  7991. }
  7992. #endif /* !WOLFSSL_NO_TLS12 || !NO_OLD_TLS || !WOLFSSL_TLS13 */
  7993. }
  7994. #endif /* NO_WOLFSSL_CLIENT */
  7995. /* server only parts */
  7996. #ifndef NO_WOLFSSL_SERVER
  7997. #if defined(OPENSSL_EXTRA) && !defined(NO_OLD_TLS)
  7998. WOLFSSL_METHOD* wolfSSLv2_server_method(void)
  7999. {
  8000. WOLFSSL_STUB("wolfSSLv2_server_method");
  8001. return 0;
  8002. }
  8003. #endif
  8004. #if defined(WOLFSSL_ALLOW_SSLV3) && !defined(NO_OLD_TLS)
  8005. WOLFSSL_METHOD* wolfSSLv3_server_method(void)
  8006. {
  8007. return wolfSSLv3_server_method_ex(NULL);
  8008. }
  8009. WOLFSSL_METHOD* wolfSSLv3_server_method_ex(void* heap)
  8010. {
  8011. WOLFSSL_METHOD* method =
  8012. (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD),
  8013. heap, DYNAMIC_TYPE_METHOD);
  8014. (void)heap;
  8015. WOLFSSL_ENTER("wolfSSLv3_server_method_ex");
  8016. if (method) {
  8017. InitSSL_Method(method, MakeSSLv3());
  8018. method->side = WOLFSSL_SERVER_END;
  8019. }
  8020. return method;
  8021. }
  8022. #endif /* WOLFSSL_ALLOW_SSLV3 && !NO_OLD_TLS */
  8023. WOLFSSL_METHOD* wolfSSLv23_server_method(void)
  8024. {
  8025. return wolfSSLv23_server_method_ex(NULL);
  8026. }
  8027. WOLFSSL_METHOD* wolfSSLv23_server_method_ex(void* heap)
  8028. {
  8029. WOLFSSL_METHOD* method =
  8030. (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD),
  8031. heap, DYNAMIC_TYPE_METHOD);
  8032. (void)heap;
  8033. WOLFSSL_ENTER("wolfSSLv23_server_method_ex");
  8034. if (method) {
  8035. #if !defined(NO_SHA256) || defined(WOLFSSL_SHA384) || \
  8036. defined(WOLFSSL_SHA512)
  8037. #ifdef WOLFSSL_TLS13
  8038. InitSSL_Method(method, MakeTLSv1_3());
  8039. #elif !defined(WOLFSSL_NO_TLS12)
  8040. InitSSL_Method(method, MakeTLSv1_2());
  8041. #elif !defined(NO_OLD_TLS)
  8042. InitSSL_Method(method, MakeTLSv1_1());
  8043. #endif
  8044. #else
  8045. #ifndef NO_OLD_TLS
  8046. InitSSL_Method(method, MakeTLSv1_1());
  8047. #else
  8048. #error Must have SHA256, SHA384 or SHA512 enabled for TLS 1.2
  8049. #endif
  8050. #endif
  8051. #if !defined(NO_OLD_TLS) || defined(WOLFSSL_TLS13)
  8052. method->downgrade = 1;
  8053. #endif
  8054. method->side = WOLFSSL_SERVER_END;
  8055. }
  8056. return method;
  8057. }
  8058. WOLFSSL_ABI
  8059. int wolfSSL_accept(WOLFSSL* ssl)
  8060. {
  8061. #if !(defined(WOLFSSL_NO_TLS12) && defined(NO_OLD_TLS) && \
  8062. defined(WOLFSSL_TLS13))
  8063. word16 havePSK = 0;
  8064. word16 haveAnon = 0;
  8065. word16 haveMcast = 0;
  8066. #endif
  8067. int ret = 0;
  8068. (void)ret;
  8069. if (ssl == NULL)
  8070. return WOLFSSL_FATAL_ERROR;
  8071. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
  8072. if (ssl->options.side == WOLFSSL_NEITHER_END) {
  8073. WOLFSSL_MSG("Setting WOLFSSL_SSL to be server side");
  8074. ssl->error = InitSSL_Side(ssl, WOLFSSL_SERVER_END);
  8075. if (ssl->error != WOLFSSL_SUCCESS) {
  8076. WOLFSSL_ERROR(ssl->error);
  8077. return WOLFSSL_FATAL_ERROR;
  8078. }
  8079. ssl->error = 0; /* expected to be zero here */
  8080. }
  8081. #endif /* OPENSSL_EXTRA || WOLFSSL_EITHER_SIDE */
  8082. #if defined(WOLFSSL_NO_TLS12) && defined(NO_OLD_TLS) && defined(WOLFSSL_TLS13)
  8083. return wolfSSL_accept_TLSv13(ssl);
  8084. #else
  8085. #ifdef WOLFSSL_TLS13
  8086. if (ssl->options.tls1_3)
  8087. return wolfSSL_accept_TLSv13(ssl);
  8088. #endif
  8089. WOLFSSL_ENTER("wolfSSL_accept");
  8090. /* make sure this wolfSSL object has arrays and rng setup. Protects
  8091. * case where the WOLFSSL object is reused via wolfSSL_clear() */
  8092. if ((ret = ReinitSSL(ssl, ssl->ctx, 0)) != 0) {
  8093. return ret;
  8094. }
  8095. #ifdef WOLFSSL_WOLFSENTRY_HOOKS
  8096. if ((ssl->AcceptFilter != NULL) &&
  8097. ((ssl->options.acceptState == ACCEPT_BEGIN)
  8098. #ifdef HAVE_SECURE_RENEGOTIATION
  8099. || (ssl->options.acceptState == ACCEPT_BEGIN_RENEG)
  8100. #endif
  8101. ))
  8102. {
  8103. wolfSSL_netfilter_decision_t res;
  8104. if ((ssl->AcceptFilter(ssl, ssl->AcceptFilter_arg, &res) ==
  8105. WOLFSSL_SUCCESS) &&
  8106. (res == WOLFSSL_NETFILTER_REJECT)) {
  8107. ssl->error = SOCKET_FILTERED_E;
  8108. WOLFSSL_ERROR(ssl->error);
  8109. return WOLFSSL_FATAL_ERROR;
  8110. }
  8111. }
  8112. #endif /* WOLFSSL_WOLFSENTRY_HOOKS */
  8113. #ifdef HAVE_ERRNO_H
  8114. errno = 0;
  8115. #endif
  8116. #ifndef NO_PSK
  8117. havePSK = ssl->options.havePSK;
  8118. #endif
  8119. (void)havePSK;
  8120. #ifdef HAVE_ANON
  8121. haveAnon = ssl->options.useAnon;
  8122. #endif
  8123. (void)haveAnon;
  8124. #ifdef WOLFSSL_MULTICAST
  8125. haveMcast = ssl->options.haveMcast;
  8126. #endif
  8127. (void)haveMcast;
  8128. if (ssl->options.side != WOLFSSL_SERVER_END) {
  8129. ssl->error = SIDE_ERROR;
  8130. WOLFSSL_ERROR(ssl->error);
  8131. return WOLFSSL_FATAL_ERROR;
  8132. }
  8133. #ifndef NO_CERTS
  8134. /* in case used set_accept_state after init */
  8135. if (!havePSK && !haveAnon && !haveMcast) {
  8136. #ifdef OPENSSL_EXTRA
  8137. if (ssl->ctx->certSetupCb != NULL) {
  8138. WOLFSSL_MSG("CertSetupCb set. server cert and "
  8139. "key not checked");
  8140. }
  8141. else
  8142. #endif
  8143. {
  8144. if (!ssl->buffers.certificate ||
  8145. !ssl->buffers.certificate->buffer) {
  8146. WOLFSSL_MSG("accept error: server cert required");
  8147. ssl->error = NO_PRIVATE_KEY;
  8148. WOLFSSL_ERROR(ssl->error);
  8149. return WOLFSSL_FATAL_ERROR;
  8150. }
  8151. if (!ssl->buffers.key || !ssl->buffers.key->buffer) {
  8152. /* allow no private key if using existing key */
  8153. #ifdef WOLF_PRIVATE_KEY_ID
  8154. if (ssl->devId != INVALID_DEVID
  8155. #ifdef HAVE_PK_CALLBACKS
  8156. || wolfSSL_CTX_IsPrivatePkSet(ssl->ctx)
  8157. #endif
  8158. ) {
  8159. WOLFSSL_MSG("Allowing no server private key "
  8160. "(external)");
  8161. }
  8162. else
  8163. #endif
  8164. {
  8165. WOLFSSL_MSG("accept error: server key required");
  8166. ssl->error = NO_PRIVATE_KEY;
  8167. WOLFSSL_ERROR(ssl->error);
  8168. return WOLFSSL_FATAL_ERROR;
  8169. }
  8170. }
  8171. }
  8172. }
  8173. #endif
  8174. #ifdef WOLFSSL_DTLS
  8175. if (ssl->version.major == DTLS_MAJOR) {
  8176. ssl->options.dtls = 1;
  8177. ssl->options.tls = 1;
  8178. ssl->options.tls1_1 = 1;
  8179. if (!IsDtlsNotSctpMode(ssl) || !IsDtlsNotSrtpMode(ssl) ||
  8180. IsSCR(ssl))
  8181. ssl->options.dtlsStateful = 1;
  8182. }
  8183. #endif
  8184. if (ssl->buffers.outputBuffer.length > 0
  8185. #ifdef WOLFSSL_ASYNC_CRYPT
  8186. /* do not send buffered or advance state if last error was an
  8187. async pending operation */
  8188. && ssl->error != WC_PENDING_E
  8189. #endif
  8190. ) {
  8191. ret = SendBuffered(ssl);
  8192. if (ret == 0) {
  8193. /* fragOffset is non-zero when sending fragments. On the last
  8194. * fragment, fragOffset is zero again, and the state can be
  8195. * advanced. */
  8196. if (ssl->fragOffset == 0 && !ssl->options.buildingMsg) {
  8197. if (ssl->options.acceptState == ACCEPT_FIRST_REPLY_DONE ||
  8198. ssl->options.acceptState == SERVER_HELLO_SENT ||
  8199. ssl->options.acceptState == CERT_SENT ||
  8200. ssl->options.acceptState == CERT_STATUS_SENT ||
  8201. ssl->options.acceptState == KEY_EXCHANGE_SENT ||
  8202. ssl->options.acceptState == CERT_REQ_SENT ||
  8203. ssl->options.acceptState == ACCEPT_SECOND_REPLY_DONE ||
  8204. ssl->options.acceptState == TICKET_SENT ||
  8205. ssl->options.acceptState == CHANGE_CIPHER_SENT) {
  8206. ssl->options.acceptState++;
  8207. WOLFSSL_MSG("accept state: Advanced from last "
  8208. "buffered fragment send");
  8209. #ifdef WOLFSSL_ASYNC_IO
  8210. /* Cleanup async */
  8211. FreeAsyncCtx(ssl, 0);
  8212. #endif
  8213. }
  8214. }
  8215. else {
  8216. WOLFSSL_MSG("accept state: "
  8217. "Not advanced, more fragments to send");
  8218. }
  8219. }
  8220. else {
  8221. ssl->error = ret;
  8222. WOLFSSL_ERROR(ssl->error);
  8223. return WOLFSSL_FATAL_ERROR;
  8224. }
  8225. #ifdef WOLFSSL_DTLS13
  8226. if (ssl->options.dtls)
  8227. ssl->dtls13SendingAckOrRtx = 0;
  8228. #endif /* WOLFSSL_DTLS13 */
  8229. }
  8230. ret = RetrySendAlert(ssl);
  8231. if (ret != 0) {
  8232. ssl->error = ret;
  8233. WOLFSSL_ERROR(ssl->error);
  8234. return WOLFSSL_FATAL_ERROR;
  8235. }
  8236. switch (ssl->options.acceptState) {
  8237. case ACCEPT_BEGIN :
  8238. #ifdef HAVE_SECURE_RENEGOTIATION
  8239. case ACCEPT_BEGIN_RENEG:
  8240. #endif
  8241. /* get response */
  8242. while (ssl->options.clientState < CLIENT_HELLO_COMPLETE)
  8243. if ( (ssl->error = ProcessReply(ssl)) < 0) {
  8244. WOLFSSL_ERROR(ssl->error);
  8245. return WOLFSSL_FATAL_ERROR;
  8246. }
  8247. #ifdef WOLFSSL_TLS13
  8248. ssl->options.acceptState = ACCEPT_CLIENT_HELLO_DONE;
  8249. WOLFSSL_MSG("accept state ACCEPT_CLIENT_HELLO_DONE");
  8250. FALL_THROUGH;
  8251. case ACCEPT_CLIENT_HELLO_DONE :
  8252. if (ssl->options.tls1_3) {
  8253. return wolfSSL_accept_TLSv13(ssl);
  8254. }
  8255. #endif
  8256. ssl->options.acceptState = ACCEPT_FIRST_REPLY_DONE;
  8257. WOLFSSL_MSG("accept state ACCEPT_FIRST_REPLY_DONE");
  8258. FALL_THROUGH;
  8259. case ACCEPT_FIRST_REPLY_DONE :
  8260. if ( (ssl->error = SendServerHello(ssl)) != 0) {
  8261. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8262. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8263. #endif
  8264. WOLFSSL_ERROR(ssl->error);
  8265. return WOLFSSL_FATAL_ERROR;
  8266. }
  8267. ssl->options.acceptState = SERVER_HELLO_SENT;
  8268. WOLFSSL_MSG("accept state SERVER_HELLO_SENT");
  8269. FALL_THROUGH;
  8270. case SERVER_HELLO_SENT :
  8271. #ifdef WOLFSSL_TLS13
  8272. if (ssl->options.tls1_3) {
  8273. return wolfSSL_accept_TLSv13(ssl);
  8274. }
  8275. #endif
  8276. #ifndef NO_CERTS
  8277. if (!ssl->options.resuming)
  8278. if ( (ssl->error = SendCertificate(ssl)) != 0) {
  8279. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8280. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8281. #endif
  8282. WOLFSSL_ERROR(ssl->error);
  8283. return WOLFSSL_FATAL_ERROR;
  8284. }
  8285. #endif
  8286. ssl->options.acceptState = CERT_SENT;
  8287. WOLFSSL_MSG("accept state CERT_SENT");
  8288. FALL_THROUGH;
  8289. case CERT_SENT :
  8290. #ifndef NO_CERTS
  8291. if (!ssl->options.resuming)
  8292. if ( (ssl->error = SendCertificateStatus(ssl)) != 0) {
  8293. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8294. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8295. #endif
  8296. WOLFSSL_ERROR(ssl->error);
  8297. return WOLFSSL_FATAL_ERROR;
  8298. }
  8299. #endif
  8300. ssl->options.acceptState = CERT_STATUS_SENT;
  8301. WOLFSSL_MSG("accept state CERT_STATUS_SENT");
  8302. FALL_THROUGH;
  8303. case CERT_STATUS_SENT :
  8304. #ifdef WOLFSSL_TLS13
  8305. if (ssl->options.tls1_3) {
  8306. return wolfSSL_accept_TLSv13(ssl);
  8307. }
  8308. #endif
  8309. if (!ssl->options.resuming)
  8310. if ( (ssl->error = SendServerKeyExchange(ssl)) != 0) {
  8311. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8312. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8313. #endif
  8314. WOLFSSL_ERROR(ssl->error);
  8315. return WOLFSSL_FATAL_ERROR;
  8316. }
  8317. ssl->options.acceptState = KEY_EXCHANGE_SENT;
  8318. WOLFSSL_MSG("accept state KEY_EXCHANGE_SENT");
  8319. FALL_THROUGH;
  8320. case KEY_EXCHANGE_SENT :
  8321. #ifndef NO_CERTS
  8322. if (!ssl->options.resuming) {
  8323. if (ssl->options.verifyPeer) {
  8324. if ( (ssl->error = SendCertificateRequest(ssl)) != 0) {
  8325. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8326. /* See if an alert was sent. */
  8327. ProcessReplyEx(ssl, 1);
  8328. #endif
  8329. WOLFSSL_ERROR(ssl->error);
  8330. return WOLFSSL_FATAL_ERROR;
  8331. }
  8332. }
  8333. else {
  8334. /* SERVER: Peer auth good if not verifying client. */
  8335. ssl->options.peerAuthGood = 1;
  8336. }
  8337. }
  8338. #endif
  8339. ssl->options.acceptState = CERT_REQ_SENT;
  8340. WOLFSSL_MSG("accept state CERT_REQ_SENT");
  8341. FALL_THROUGH;
  8342. case CERT_REQ_SENT :
  8343. if (!ssl->options.resuming)
  8344. if ( (ssl->error = SendServerHelloDone(ssl)) != 0) {
  8345. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8346. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8347. #endif
  8348. WOLFSSL_ERROR(ssl->error);
  8349. return WOLFSSL_FATAL_ERROR;
  8350. }
  8351. ssl->options.acceptState = SERVER_HELLO_DONE;
  8352. WOLFSSL_MSG("accept state SERVER_HELLO_DONE");
  8353. FALL_THROUGH;
  8354. case SERVER_HELLO_DONE :
  8355. if (!ssl->options.resuming) {
  8356. while (ssl->options.clientState < CLIENT_FINISHED_COMPLETE)
  8357. if ( (ssl->error = ProcessReply(ssl)) < 0) {
  8358. WOLFSSL_ERROR(ssl->error);
  8359. return WOLFSSL_FATAL_ERROR;
  8360. }
  8361. }
  8362. ssl->options.acceptState = ACCEPT_SECOND_REPLY_DONE;
  8363. WOLFSSL_MSG("accept state ACCEPT_SECOND_REPLY_DONE");
  8364. FALL_THROUGH;
  8365. case ACCEPT_SECOND_REPLY_DONE :
  8366. #ifndef NO_CERTS
  8367. /* SERVER: When not resuming and verifying peer but no certificate
  8368. * received and not failing when not received then peer auth good.
  8369. */
  8370. if (!ssl->options.resuming && ssl->options.verifyPeer &&
  8371. !ssl->options.havePeerCert && !ssl->options.failNoCert) {
  8372. ssl->options.peerAuthGood = 1;
  8373. }
  8374. #endif /* !NO_CERTS */
  8375. #ifdef WOLFSSL_NO_CLIENT_AUTH
  8376. if (!ssl->options.resuming) {
  8377. ssl->options.peerAuthGood = 1;
  8378. }
  8379. #endif
  8380. #ifdef HAVE_SESSION_TICKET
  8381. if (ssl->options.createTicket && !ssl->options.noTicketTls12) {
  8382. if ( (ssl->error = SendTicket(ssl)) != 0) {
  8383. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8384. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8385. #endif
  8386. WOLFSSL_MSG("Thought we need ticket but failed");
  8387. WOLFSSL_ERROR(ssl->error);
  8388. return WOLFSSL_FATAL_ERROR;
  8389. }
  8390. }
  8391. #endif /* HAVE_SESSION_TICKET */
  8392. ssl->options.acceptState = TICKET_SENT;
  8393. WOLFSSL_MSG("accept state TICKET_SENT");
  8394. FALL_THROUGH;
  8395. case TICKET_SENT:
  8396. /* SERVER: Fail-safe for CLient Authentication. */
  8397. if (!ssl->options.peerAuthGood) {
  8398. WOLFSSL_MSG("Client authentication did not happen");
  8399. return WOLFSSL_FATAL_ERROR;
  8400. }
  8401. if ( (ssl->error = SendChangeCipher(ssl)) != 0) {
  8402. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8403. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8404. #endif
  8405. WOLFSSL_ERROR(ssl->error);
  8406. return WOLFSSL_FATAL_ERROR;
  8407. }
  8408. ssl->options.acceptState = CHANGE_CIPHER_SENT;
  8409. WOLFSSL_MSG("accept state CHANGE_CIPHER_SENT");
  8410. FALL_THROUGH;
  8411. case CHANGE_CIPHER_SENT :
  8412. if ( (ssl->error = SendFinished(ssl)) != 0) {
  8413. #ifdef WOLFSSL_CHECK_ALERT_ON_ERR
  8414. ProcessReplyEx(ssl, 1); /* See if an alert was sent. */
  8415. #endif
  8416. WOLFSSL_ERROR(ssl->error);
  8417. return WOLFSSL_FATAL_ERROR;
  8418. }
  8419. ssl->options.acceptState = ACCEPT_FINISHED_DONE;
  8420. WOLFSSL_MSG("accept state ACCEPT_FINISHED_DONE");
  8421. FALL_THROUGH;
  8422. case ACCEPT_FINISHED_DONE :
  8423. if (ssl->options.resuming) {
  8424. while (ssl->options.clientState < CLIENT_FINISHED_COMPLETE) {
  8425. if ( (ssl->error = ProcessReply(ssl)) < 0) {
  8426. WOLFSSL_ERROR(ssl->error);
  8427. return WOLFSSL_FATAL_ERROR;
  8428. }
  8429. }
  8430. }
  8431. ssl->options.acceptState = ACCEPT_THIRD_REPLY_DONE;
  8432. WOLFSSL_MSG("accept state ACCEPT_THIRD_REPLY_DONE");
  8433. FALL_THROUGH;
  8434. case ACCEPT_THIRD_REPLY_DONE :
  8435. #ifndef NO_HANDSHAKE_DONE_CB
  8436. if (ssl->hsDoneCb) {
  8437. int cbret = ssl->hsDoneCb(ssl, ssl->hsDoneCtx);
  8438. if (cbret < 0) {
  8439. ssl->error = cbret;
  8440. WOLFSSL_MSG("HandShake Done Cb don't continue error");
  8441. return WOLFSSL_FATAL_ERROR;
  8442. }
  8443. }
  8444. #endif /* NO_HANDSHAKE_DONE_CB */
  8445. if (!ssl->options.dtls) {
  8446. if (!ssl->options.keepResources) {
  8447. FreeHandshakeResources(ssl);
  8448. }
  8449. }
  8450. #ifdef WOLFSSL_DTLS
  8451. else {
  8452. ssl->options.dtlsHsRetain = 1;
  8453. }
  8454. #endif /* WOLFSSL_DTLS */
  8455. #if defined(WOLFSSL_ASYNC_CRYPT) && defined(HAVE_SECURE_RENEGOTIATION)
  8456. /* This may be necessary in async so that we don't try to
  8457. * renegotiate again */
  8458. if (ssl->secure_renegotiation &&
  8459. ssl->secure_renegotiation->startScr) {
  8460. ssl->secure_renegotiation->startScr = 0;
  8461. }
  8462. #endif /* WOLFSSL_ASYNC_CRYPT && HAVE_SECURE_RENEGOTIATION */
  8463. #if defined(WOLFSSL_ASYNC_IO) && !defined(WOLFSSL_ASYNC_CRYPT)
  8464. /* Free the remaining async context if not using it for crypto */
  8465. FreeAsyncCtx(ssl, 1);
  8466. #endif
  8467. #if defined(WOLFSSL_SESSION_EXPORT) && defined(WOLFSSL_DTLS)
  8468. if (ssl->dtls_export) {
  8469. if ((ssl->error = wolfSSL_send_session(ssl)) != 0) {
  8470. WOLFSSL_MSG("Export DTLS session error");
  8471. WOLFSSL_ERROR(ssl->error);
  8472. return WOLFSSL_FATAL_ERROR;
  8473. }
  8474. }
  8475. #endif
  8476. ssl->error = 0; /* clear the error */
  8477. WOLFSSL_LEAVE("wolfSSL_accept", WOLFSSL_SUCCESS);
  8478. return WOLFSSL_SUCCESS;
  8479. default :
  8480. WOLFSSL_MSG("Unknown accept state ERROR");
  8481. return WOLFSSL_FATAL_ERROR;
  8482. }
  8483. #endif /* !WOLFSSL_NO_TLS12 */
  8484. }
  8485. #endif /* NO_WOLFSSL_SERVER */
  8486. #if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
  8487. int wolfDTLS_SetChGoodCb(WOLFSSL* ssl, ClientHelloGoodCb cb, void* user_ctx)
  8488. {
  8489. WOLFSSL_ENTER("wolfDTLS_SetChGoodCb");
  8490. if (ssl == NULL)
  8491. return BAD_FUNC_ARG;
  8492. ssl->chGoodCb = cb;
  8493. ssl->chGoodCtx = user_ctx;
  8494. return WOLFSSL_SUCCESS;
  8495. }
  8496. #endif
  8497. #ifndef NO_HANDSHAKE_DONE_CB
  8498. int wolfSSL_SetHsDoneCb(WOLFSSL* ssl, HandShakeDoneCb cb, void* user_ctx)
  8499. {
  8500. WOLFSSL_ENTER("wolfSSL_SetHsDoneCb");
  8501. if (ssl == NULL)
  8502. return BAD_FUNC_ARG;
  8503. ssl->hsDoneCb = cb;
  8504. ssl->hsDoneCtx = user_ctx;
  8505. return WOLFSSL_SUCCESS;
  8506. }
  8507. #endif /* NO_HANDSHAKE_DONE_CB */
  8508. WOLFSSL_ABI
  8509. int wolfSSL_Cleanup(void)
  8510. {
  8511. int ret = WOLFSSL_SUCCESS; /* Only the first error will be returned */
  8512. int release = 0;
  8513. #if !defined(NO_SESSION_CACHE)
  8514. int i;
  8515. int j;
  8516. #endif
  8517. WOLFSSL_ENTER("wolfSSL_Cleanup");
  8518. #ifndef WOLFSSL_MUTEX_INITIALIZER
  8519. if (inits_count_mutex_valid == 1) {
  8520. #endif
  8521. if (wc_LockMutex(&inits_count_mutex) != 0) {
  8522. WOLFSSL_MSG("Bad Lock Mutex count");
  8523. return BAD_MUTEX_E;
  8524. }
  8525. #ifndef WOLFSSL_MUTEX_INITIALIZER
  8526. }
  8527. #endif
  8528. if (initRefCount > 0) {
  8529. --initRefCount;
  8530. if (initRefCount == 0)
  8531. release = 1;
  8532. }
  8533. #ifndef WOLFSSL_MUTEX_INITIALIZER
  8534. if (inits_count_mutex_valid == 1) {
  8535. #endif
  8536. wc_UnLockMutex(&inits_count_mutex);
  8537. #ifndef WOLFSSL_MUTEX_INITIALIZER
  8538. }
  8539. #endif
  8540. if (!release)
  8541. return ret;
  8542. #ifdef OPENSSL_EXTRA
  8543. wolfSSL_BN_free_one();
  8544. #endif
  8545. #ifndef NO_SESSION_CACHE
  8546. #ifdef ENABLE_SESSION_CACHE_ROW_LOCK
  8547. for (i = 0; i < SESSION_ROWS; ++i) {
  8548. if ((SessionCache[i].lock_valid == 1) &&
  8549. (wc_FreeRwLock(&SessionCache[i].row_lock) != 0)) {
  8550. if (ret == WOLFSSL_SUCCESS)
  8551. ret = BAD_MUTEX_E;
  8552. }
  8553. SessionCache[i].lock_valid = 0;
  8554. }
  8555. #else
  8556. if ((session_lock_valid == 1) && (wc_FreeRwLock(&session_lock) != 0)) {
  8557. if (ret == WOLFSSL_SUCCESS)
  8558. ret = BAD_MUTEX_E;
  8559. }
  8560. session_lock_valid = 0;
  8561. #endif
  8562. for (i = 0; i < SESSION_ROWS; i++) {
  8563. for (j = 0; j < SESSIONS_PER_ROW; j++) {
  8564. #ifdef SESSION_CACHE_DYNAMIC_MEM
  8565. if (SessionCache[i].Sessions[j]) {
  8566. EvictSessionFromCache(SessionCache[i].Sessions[j]);
  8567. XFREE(SessionCache[i].Sessions[j], SessionCache[i].heap,
  8568. DYNAMIC_TYPE_SESSION);
  8569. SessionCache[i].Sessions[j] = NULL;
  8570. }
  8571. #else
  8572. EvictSessionFromCache(&SessionCache[i].Sessions[j]);
  8573. #endif
  8574. }
  8575. }
  8576. #ifndef NO_CLIENT_CACHE
  8577. #ifndef WOLFSSL_MUTEX_INITIALIZER
  8578. if ((clisession_mutex_valid == 1) &&
  8579. (wc_FreeMutex(&clisession_mutex) != 0)) {
  8580. if (ret == WOLFSSL_SUCCESS)
  8581. ret = BAD_MUTEX_E;
  8582. }
  8583. clisession_mutex_valid = 0;
  8584. #endif
  8585. #endif
  8586. #endif /* !NO_SESSION_CACHE */
  8587. #ifndef WOLFSSL_MUTEX_INITIALIZER
  8588. if ((inits_count_mutex_valid == 1) &&
  8589. (wc_FreeMutex(&inits_count_mutex) != 0)) {
  8590. if (ret == WOLFSSL_SUCCESS)
  8591. ret = BAD_MUTEX_E;
  8592. }
  8593. inits_count_mutex_valid = 0;
  8594. #endif
  8595. #ifdef OPENSSL_EXTRA
  8596. wolfSSL_RAND_Cleanup();
  8597. #endif
  8598. if (wolfCrypt_Cleanup() != 0) {
  8599. WOLFSSL_MSG("Error with wolfCrypt_Cleanup call");
  8600. if (ret == WOLFSSL_SUCCESS)
  8601. ret = WC_CLEANUP_E;
  8602. }
  8603. #if FIPS_VERSION_GE(5,1)
  8604. if (wolfCrypt_SetPrivateKeyReadEnable_fips(0, WC_KEYTYPE_ALL) < 0) {
  8605. if (ret == WOLFSSL_SUCCESS)
  8606. ret = WC_CLEANUP_E;
  8607. }
  8608. #endif
  8609. #ifdef HAVE_GLOBAL_RNG
  8610. #ifndef WOLFSSL_MUTEX_INITIALIZER
  8611. if ((globalRNGMutex_valid == 1) && (wc_FreeMutex(&globalRNGMutex) != 0)) {
  8612. if (ret == WOLFSSL_SUCCESS)
  8613. ret = BAD_MUTEX_E;
  8614. }
  8615. globalRNGMutex_valid = 0;
  8616. #endif /* !WOLFSSL_MUTEX_INITIALIZER */
  8617. #if defined(OPENSSL_EXTRA) && defined(HAVE_HASHDRBG)
  8618. wolfSSL_FIPS_drbg_free(gDrbgDefCtx);
  8619. gDrbgDefCtx = NULL;
  8620. #endif
  8621. #endif
  8622. #if defined(HAVE_EX_DATA) && \
  8623. (defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || \
  8624. defined(WOLFSSL_HAPROXY) || defined(OPENSSL_EXTRA) || \
  8625. defined(HAVE_LIGHTY)) || defined(HAVE_EX_DATA) || \
  8626. defined(WOLFSSL_WPAS_SMALL)
  8627. crypto_ex_cb_free(crypto_ex_cb_ctx_session);
  8628. crypto_ex_cb_ctx_session = NULL;
  8629. #endif
  8630. #ifdef WOLFSSL_MEM_FAIL_COUNT
  8631. wc_MemFailCount_Free();
  8632. #endif
  8633. return ret;
  8634. }
  8635. /* call before SSL_connect, if verifying will add name check to
  8636. date check and signature check */
  8637. WOLFSSL_ABI
  8638. int wolfSSL_check_domain_name(WOLFSSL* ssl, const char* dn)
  8639. {
  8640. WOLFSSL_ENTER("wolfSSL_check_domain_name");
  8641. if (ssl == NULL || dn == NULL) {
  8642. WOLFSSL_MSG("Bad function argument: NULL");
  8643. return WOLFSSL_FAILURE;
  8644. }
  8645. if (ssl->buffers.domainName.buffer)
  8646. XFREE(ssl->buffers.domainName.buffer, ssl->heap, DYNAMIC_TYPE_DOMAIN);
  8647. ssl->buffers.domainName.length = (word32)XSTRLEN(dn);
  8648. ssl->buffers.domainName.buffer = (byte*)XMALLOC(
  8649. ssl->buffers.domainName.length + 1, ssl->heap, DYNAMIC_TYPE_DOMAIN);
  8650. if (ssl->buffers.domainName.buffer) {
  8651. unsigned char* domainName = ssl->buffers.domainName.buffer;
  8652. XMEMCPY(domainName, dn, ssl->buffers.domainName.length);
  8653. domainName[ssl->buffers.domainName.length] = '\0';
  8654. return WOLFSSL_SUCCESS;
  8655. }
  8656. else {
  8657. ssl->error = MEMORY_ERROR;
  8658. return WOLFSSL_FAILURE;
  8659. }
  8660. }
  8661. /* turn on wolfSSL zlib compression
  8662. returns WOLFSSL_SUCCESS for success, else error (not built in)
  8663. */
  8664. int wolfSSL_set_compression(WOLFSSL* ssl)
  8665. {
  8666. WOLFSSL_ENTER("wolfSSL_set_compression");
  8667. (void)ssl;
  8668. #ifdef HAVE_LIBZ
  8669. ssl->options.usingCompression = 1;
  8670. return WOLFSSL_SUCCESS;
  8671. #else
  8672. return NOT_COMPILED_IN;
  8673. #endif
  8674. }
  8675. #ifndef USE_WINDOWS_API
  8676. #ifndef NO_WRITEV
  8677. /* simulate writev semantics, doesn't actually do block at a time though
  8678. because of SSL_write behavior and because front adds may be small */
  8679. int wolfSSL_writev(WOLFSSL* ssl, const struct iovec* iov, int iovcnt)
  8680. {
  8681. #ifdef WOLFSSL_SMALL_STACK
  8682. byte staticBuffer[1]; /* force heap usage */
  8683. #else
  8684. byte staticBuffer[FILE_BUFFER_SIZE];
  8685. #endif
  8686. byte* myBuffer = staticBuffer;
  8687. int dynamic = 0;
  8688. int sending = 0;
  8689. int idx = 0;
  8690. int i;
  8691. int ret;
  8692. WOLFSSL_ENTER("wolfSSL_writev");
  8693. for (i = 0; i < iovcnt; i++)
  8694. sending += (int)iov[i].iov_len;
  8695. if (sending > (int)sizeof(staticBuffer)) {
  8696. myBuffer = (byte*)XMALLOC(sending, ssl->heap,
  8697. DYNAMIC_TYPE_WRITEV);
  8698. if (!myBuffer)
  8699. return MEMORY_ERROR;
  8700. dynamic = 1;
  8701. }
  8702. for (i = 0; i < iovcnt; i++) {
  8703. XMEMCPY(&myBuffer[idx], iov[i].iov_base, iov[i].iov_len);
  8704. idx += (int)iov[i].iov_len;
  8705. }
  8706. /* myBuffer may not be initialized fully, but the span up to the
  8707. * sending length will be.
  8708. */
  8709. PRAGMA_GCC_DIAG_PUSH
  8710. PRAGMA_GCC("GCC diagnostic ignored \"-Wmaybe-uninitialized\"")
  8711. ret = wolfSSL_write(ssl, myBuffer, sending);
  8712. PRAGMA_GCC_DIAG_POP
  8713. if (dynamic)
  8714. XFREE(myBuffer, ssl->heap, DYNAMIC_TYPE_WRITEV);
  8715. return ret;
  8716. }
  8717. #endif
  8718. #endif
  8719. #ifdef WOLFSSL_CALLBACKS
  8720. typedef struct itimerval Itimerval;
  8721. /* don't keep calling simple functions while setting up timer and signals
  8722. if no inlining these are the next best */
  8723. #define AddTimes(a, b, c) \
  8724. do { \
  8725. (c).tv_sec = (a).tv_sec + (b).tv_sec; \
  8726. (c).tv_usec = (a).tv_usec + (b).tv_usec;\
  8727. if ((c).tv_usec >= 1000000) { \
  8728. (c).tv_sec++; \
  8729. (c).tv_usec -= 1000000; \
  8730. } \
  8731. } while (0)
  8732. #define SubtractTimes(a, b, c) \
  8733. do { \
  8734. (c).tv_sec = (a).tv_sec - (b).tv_sec; \
  8735. (c).tv_usec = (a).tv_usec - (b).tv_usec;\
  8736. if ((c).tv_usec < 0) { \
  8737. (c).tv_sec--; \
  8738. (c).tv_usec += 1000000; \
  8739. } \
  8740. } while (0)
  8741. #define CmpTimes(a, b, cmp) \
  8742. (((a).tv_sec == (b).tv_sec) ? \
  8743. ((a).tv_usec cmp (b).tv_usec) : \
  8744. ((a).tv_sec cmp (b).tv_sec)) \
  8745. /* do nothing handler */
  8746. static void myHandler(int signo)
  8747. {
  8748. (void)signo;
  8749. return;
  8750. }
  8751. static int wolfSSL_ex_wrapper(WOLFSSL* ssl, HandShakeCallBack hsCb,
  8752. TimeoutCallBack toCb, WOLFSSL_TIMEVAL timeout)
  8753. {
  8754. int ret = WOLFSSL_FATAL_ERROR;
  8755. int oldTimerOn = 0; /* was timer already on */
  8756. WOLFSSL_TIMEVAL startTime;
  8757. WOLFSSL_TIMEVAL endTime;
  8758. WOLFSSL_TIMEVAL totalTime;
  8759. Itimerval myTimeout;
  8760. Itimerval oldTimeout; /* if old timer adjust from total time to reset */
  8761. struct sigaction act, oact;
  8762. #define ERR_OUT(x) { ssl->hsInfoOn = 0; ssl->toInfoOn = 0; return x; }
  8763. if (hsCb) {
  8764. ssl->hsInfoOn = 1;
  8765. InitHandShakeInfo(&ssl->handShakeInfo, ssl);
  8766. }
  8767. if (toCb) {
  8768. ssl->toInfoOn = 1;
  8769. InitTimeoutInfo(&ssl->timeoutInfo);
  8770. if (gettimeofday(&startTime, 0) < 0)
  8771. ERR_OUT(GETTIME_ERROR);
  8772. /* use setitimer to simulate getitimer, init 0 myTimeout */
  8773. myTimeout.it_interval.tv_sec = 0;
  8774. myTimeout.it_interval.tv_usec = 0;
  8775. myTimeout.it_value.tv_sec = 0;
  8776. myTimeout.it_value.tv_usec = 0;
  8777. if (setitimer(ITIMER_REAL, &myTimeout, &oldTimeout) < 0)
  8778. ERR_OUT(SETITIMER_ERROR);
  8779. if (oldTimeout.it_value.tv_sec || oldTimeout.it_value.tv_usec) {
  8780. oldTimerOn = 1;
  8781. /* is old timer going to expire before ours */
  8782. if (CmpTimes(oldTimeout.it_value, timeout, <)) {
  8783. timeout.tv_sec = oldTimeout.it_value.tv_sec;
  8784. timeout.tv_usec = oldTimeout.it_value.tv_usec;
  8785. }
  8786. }
  8787. myTimeout.it_value.tv_sec = timeout.tv_sec;
  8788. myTimeout.it_value.tv_usec = timeout.tv_usec;
  8789. /* set up signal handler, don't restart socket send/recv */
  8790. act.sa_handler = myHandler;
  8791. sigemptyset(&act.sa_mask);
  8792. act.sa_flags = 0;
  8793. #ifdef SA_INTERRUPT
  8794. act.sa_flags |= SA_INTERRUPT;
  8795. #endif
  8796. if (sigaction(SIGALRM, &act, &oact) < 0)
  8797. ERR_OUT(SIGACT_ERROR);
  8798. if (setitimer(ITIMER_REAL, &myTimeout, 0) < 0)
  8799. ERR_OUT(SETITIMER_ERROR);
  8800. }
  8801. /* do main work */
  8802. #ifndef NO_WOLFSSL_CLIENT
  8803. if (ssl->options.side == WOLFSSL_CLIENT_END)
  8804. ret = wolfSSL_connect(ssl);
  8805. #endif
  8806. #ifndef NO_WOLFSSL_SERVER
  8807. if (ssl->options.side == WOLFSSL_SERVER_END)
  8808. ret = wolfSSL_accept(ssl);
  8809. #endif
  8810. /* do callbacks */
  8811. if (toCb) {
  8812. if (oldTimerOn) {
  8813. if (gettimeofday(&endTime, 0) < 0)
  8814. ERR_OUT(SYSLIB_FAILED_E);
  8815. SubtractTimes(endTime, startTime, totalTime);
  8816. /* adjust old timer for elapsed time */
  8817. if (CmpTimes(totalTime, oldTimeout.it_value, <))
  8818. SubtractTimes(oldTimeout.it_value, totalTime,
  8819. oldTimeout.it_value);
  8820. else {
  8821. /* reset value to interval, may be off */
  8822. oldTimeout.it_value.tv_sec = oldTimeout.it_interval.tv_sec;
  8823. oldTimeout.it_value.tv_usec =oldTimeout.it_interval.tv_usec;
  8824. }
  8825. /* keep iter the same whether there or not */
  8826. }
  8827. /* restore old handler */
  8828. if (sigaction(SIGALRM, &oact, 0) < 0)
  8829. ret = SIGACT_ERROR; /* more pressing error, stomp */
  8830. else
  8831. /* use old settings which may turn off (expired or not there) */
  8832. if (setitimer(ITIMER_REAL, &oldTimeout, 0) < 0)
  8833. ret = SETITIMER_ERROR;
  8834. /* if we had a timeout call callback */
  8835. if (ssl->timeoutInfo.timeoutName[0]) {
  8836. ssl->timeoutInfo.timeoutValue.tv_sec = timeout.tv_sec;
  8837. ssl->timeoutInfo.timeoutValue.tv_usec = timeout.tv_usec;
  8838. (toCb)(&ssl->timeoutInfo);
  8839. }
  8840. ssl->toInfoOn = 0;
  8841. }
  8842. /* clean up buffers allocated by AddPacketInfo */
  8843. FreeTimeoutInfo(&ssl->timeoutInfo, ssl->heap);
  8844. if (hsCb) {
  8845. FinishHandShakeInfo(&ssl->handShakeInfo);
  8846. (hsCb)(&ssl->handShakeInfo);
  8847. ssl->hsInfoOn = 0;
  8848. }
  8849. return ret;
  8850. }
  8851. #ifndef NO_WOLFSSL_CLIENT
  8852. int wolfSSL_connect_ex(WOLFSSL* ssl, HandShakeCallBack hsCb,
  8853. TimeoutCallBack toCb, WOLFSSL_TIMEVAL timeout)
  8854. {
  8855. WOLFSSL_ENTER("wolfSSL_connect_ex");
  8856. return wolfSSL_ex_wrapper(ssl, hsCb, toCb, timeout);
  8857. }
  8858. #endif
  8859. #ifndef NO_WOLFSSL_SERVER
  8860. int wolfSSL_accept_ex(WOLFSSL* ssl, HandShakeCallBack hsCb,
  8861. TimeoutCallBack toCb, WOLFSSL_TIMEVAL timeout)
  8862. {
  8863. WOLFSSL_ENTER("wolfSSL_accept_ex");
  8864. return wolfSSL_ex_wrapper(ssl, hsCb, toCb, timeout);
  8865. }
  8866. #endif
  8867. #endif /* WOLFSSL_CALLBACKS */
  8868. #ifndef NO_PSK
  8869. void wolfSSL_CTX_set_psk_client_callback(WOLFSSL_CTX* ctx,
  8870. wc_psk_client_callback cb)
  8871. {
  8872. WOLFSSL_ENTER("wolfSSL_CTX_set_psk_client_callback");
  8873. if (ctx == NULL)
  8874. return;
  8875. ctx->havePSK = 1;
  8876. ctx->client_psk_cb = cb;
  8877. }
  8878. void wolfSSL_set_psk_client_callback(WOLFSSL* ssl,wc_psk_client_callback cb)
  8879. {
  8880. byte haveRSA = 1;
  8881. int keySz = 0;
  8882. WOLFSSL_ENTER("wolfSSL_set_psk_client_callback");
  8883. if (ssl == NULL)
  8884. return;
  8885. ssl->options.havePSK = 1;
  8886. ssl->options.client_psk_cb = cb;
  8887. #ifdef NO_RSA
  8888. haveRSA = 0;
  8889. #endif
  8890. #ifndef NO_CERTS
  8891. keySz = ssl->buffers.keySz;
  8892. #endif
  8893. if (AllocateSuites(ssl) != 0)
  8894. return;
  8895. InitSuites(ssl->suites, ssl->version, keySz, haveRSA, TRUE,
  8896. ssl->options.haveDH, ssl->options.haveECDSAsig,
  8897. ssl->options.haveECC, TRUE, ssl->options.haveStaticECC,
  8898. ssl->options.haveFalconSig, ssl->options.haveDilithiumSig,
  8899. ssl->options.useAnon, TRUE, ssl->options.side);
  8900. }
  8901. #ifdef OPENSSL_EXTRA
  8902. /**
  8903. * set call back function for psk session use
  8904. * @param ssl a pointer to WOLFSSL structure
  8905. * @param cb a function pointer to wc_psk_use_session_cb
  8906. * @return none
  8907. */
  8908. void wolfSSL_set_psk_use_session_callback(WOLFSSL* ssl,
  8909. wc_psk_use_session_cb_func cb)
  8910. {
  8911. WOLFSSL_ENTER("wolfSSL_set_psk_use_session_callback");
  8912. if (ssl != NULL) {
  8913. ssl->options.havePSK = 1;
  8914. ssl->options.session_psk_cb = cb;
  8915. }
  8916. WOLFSSL_LEAVE("wolfSSL_set_psk_use_session_callback", WOLFSSL_SUCCESS);
  8917. }
  8918. #endif
  8919. void wolfSSL_CTX_set_psk_server_callback(WOLFSSL_CTX* ctx,
  8920. wc_psk_server_callback cb)
  8921. {
  8922. WOLFSSL_ENTER("wolfSSL_CTX_set_psk_server_callback");
  8923. if (ctx == NULL)
  8924. return;
  8925. ctx->havePSK = 1;
  8926. ctx->server_psk_cb = cb;
  8927. }
  8928. void wolfSSL_set_psk_server_callback(WOLFSSL* ssl,wc_psk_server_callback cb)
  8929. {
  8930. byte haveRSA = 1;
  8931. int keySz = 0;
  8932. WOLFSSL_ENTER("wolfSSL_set_psk_server_callback");
  8933. if (ssl == NULL)
  8934. return;
  8935. ssl->options.havePSK = 1;
  8936. ssl->options.server_psk_cb = cb;
  8937. #ifdef NO_RSA
  8938. haveRSA = 0;
  8939. #endif
  8940. #ifndef NO_CERTS
  8941. keySz = ssl->buffers.keySz;
  8942. #endif
  8943. if (AllocateSuites(ssl) != 0)
  8944. return;
  8945. InitSuites(ssl->suites, ssl->version, keySz, haveRSA, TRUE,
  8946. ssl->options.haveDH, ssl->options.haveECDSAsig,
  8947. ssl->options.haveECC, TRUE, ssl->options.haveStaticECC,
  8948. ssl->options.haveFalconSig, ssl->options.haveDilithiumSig,
  8949. ssl->options.useAnon, TRUE, ssl->options.side);
  8950. }
  8951. const char* wolfSSL_get_psk_identity_hint(const WOLFSSL* ssl)
  8952. {
  8953. WOLFSSL_ENTER("wolfSSL_get_psk_identity_hint");
  8954. if (ssl == NULL || ssl->arrays == NULL)
  8955. return NULL;
  8956. return ssl->arrays->server_hint;
  8957. }
  8958. const char* wolfSSL_get_psk_identity(const WOLFSSL* ssl)
  8959. {
  8960. WOLFSSL_ENTER("wolfSSL_get_psk_identity");
  8961. if (ssl == NULL || ssl->arrays == NULL)
  8962. return NULL;
  8963. return ssl->arrays->client_identity;
  8964. }
  8965. int wolfSSL_CTX_use_psk_identity_hint(WOLFSSL_CTX* ctx, const char* hint)
  8966. {
  8967. WOLFSSL_ENTER("wolfSSL_CTX_use_psk_identity_hint");
  8968. if (hint == 0)
  8969. ctx->server_hint[0] = '\0';
  8970. else {
  8971. /* Qt does not call CTX_set_*_psk_callbacks where havePSK is set */
  8972. #ifdef WOLFSSL_QT
  8973. ctx->havePSK=1;
  8974. #endif
  8975. XSTRNCPY(ctx->server_hint, hint, MAX_PSK_ID_LEN);
  8976. ctx->server_hint[MAX_PSK_ID_LEN] = '\0'; /* null term */
  8977. }
  8978. return WOLFSSL_SUCCESS;
  8979. }
  8980. int wolfSSL_use_psk_identity_hint(WOLFSSL* ssl, const char* hint)
  8981. {
  8982. WOLFSSL_ENTER("wolfSSL_use_psk_identity_hint");
  8983. if (ssl == NULL || ssl->arrays == NULL)
  8984. return WOLFSSL_FAILURE;
  8985. if (hint == 0)
  8986. ssl->arrays->server_hint[0] = 0;
  8987. else {
  8988. XSTRNCPY(ssl->arrays->server_hint, hint,
  8989. sizeof(ssl->arrays->server_hint)-1);
  8990. ssl->arrays->server_hint[sizeof(ssl->arrays->server_hint)-1] = '\0';
  8991. }
  8992. return WOLFSSL_SUCCESS;
  8993. }
  8994. void* wolfSSL_get_psk_callback_ctx(WOLFSSL* ssl)
  8995. {
  8996. return ssl ? ssl->options.psk_ctx : NULL;
  8997. }
  8998. void* wolfSSL_CTX_get_psk_callback_ctx(WOLFSSL_CTX* ctx)
  8999. {
  9000. return ctx ? ctx->psk_ctx : NULL;
  9001. }
  9002. int wolfSSL_set_psk_callback_ctx(WOLFSSL* ssl, void* psk_ctx)
  9003. {
  9004. if (ssl == NULL)
  9005. return WOLFSSL_FAILURE;
  9006. ssl->options.psk_ctx = psk_ctx;
  9007. return WOLFSSL_SUCCESS;
  9008. }
  9009. int wolfSSL_CTX_set_psk_callback_ctx(WOLFSSL_CTX* ctx, void* psk_ctx)
  9010. {
  9011. if (ctx == NULL)
  9012. return WOLFSSL_FAILURE;
  9013. ctx->psk_ctx = psk_ctx;
  9014. return WOLFSSL_SUCCESS;
  9015. }
  9016. #endif /* NO_PSK */
  9017. #ifdef HAVE_ANON
  9018. int wolfSSL_CTX_allow_anon_cipher(WOLFSSL_CTX* ctx)
  9019. {
  9020. WOLFSSL_ENTER("wolfSSL_CTX_allow_anon_cipher");
  9021. if (ctx == NULL)
  9022. return WOLFSSL_FAILURE;
  9023. ctx->useAnon = 1;
  9024. return WOLFSSL_SUCCESS;
  9025. }
  9026. #endif /* HAVE_ANON */
  9027. #ifndef NO_CERTS
  9028. /* unload any certs or keys that SSL owns, leave CTX as is
  9029. WOLFSSL_SUCCESS on ok */
  9030. int wolfSSL_UnloadCertsKeys(WOLFSSL* ssl)
  9031. {
  9032. if (ssl == NULL) {
  9033. WOLFSSL_MSG("Null function arg");
  9034. return BAD_FUNC_ARG;
  9035. }
  9036. if (ssl->buffers.weOwnCert && !ssl->keepCert) {
  9037. WOLFSSL_MSG("Unloading cert");
  9038. FreeDer(&ssl->buffers.certificate);
  9039. #ifdef KEEP_OUR_CERT
  9040. wolfSSL_X509_free(ssl->ourCert);
  9041. ssl->ourCert = NULL;
  9042. #endif
  9043. ssl->buffers.weOwnCert = 0;
  9044. }
  9045. if (ssl->buffers.weOwnCertChain) {
  9046. WOLFSSL_MSG("Unloading cert chain");
  9047. FreeDer(&ssl->buffers.certChain);
  9048. ssl->buffers.weOwnCertChain = 0;
  9049. }
  9050. if (ssl->buffers.weOwnKey) {
  9051. WOLFSSL_MSG("Unloading key");
  9052. ForceZero(ssl->buffers.key->buffer, ssl->buffers.key->length);
  9053. FreeDer(&ssl->buffers.key);
  9054. ssl->buffers.weOwnKey = 0;
  9055. }
  9056. #ifdef WOLFSSL_DUAL_ALG_CERTS
  9057. if (ssl->buffers.weOwnAltKey) {
  9058. WOLFSSL_MSG("Unloading alt key");
  9059. ForceZero(ssl->buffers.altKey->buffer, ssl->buffers.altKey->length);
  9060. FreeDer(&ssl->buffers.altKey);
  9061. ssl->buffers.weOwnAltKey = 0;
  9062. }
  9063. #endif /* WOLFSSL_DUAL_ALG_CERTS */
  9064. return WOLFSSL_SUCCESS;
  9065. }
  9066. int wolfSSL_CTX_UnloadCAs(WOLFSSL_CTX* ctx)
  9067. {
  9068. WOLFSSL_ENTER("wolfSSL_CTX_UnloadCAs");
  9069. if (ctx == NULL)
  9070. return BAD_FUNC_ARG;
  9071. return wolfSSL_CertManagerUnloadCAs(ctx->cm);
  9072. }
  9073. int wolfSSL_CTX_UnloadIntermediateCerts(WOLFSSL_CTX* ctx)
  9074. {
  9075. WOLFSSL_ENTER("wolfSSL_CTX_UnloadIntermediateCerts");
  9076. if (ctx == NULL)
  9077. return BAD_FUNC_ARG;
  9078. if (ctx->ref.count > 1) {
  9079. WOLFSSL_MSG("ctx object must have a ref count of 1 before "
  9080. "unloading intermediate certs");
  9081. return BAD_STATE_E;
  9082. }
  9083. return wolfSSL_CertManagerUnloadIntermediateCerts(ctx->cm);
  9084. }
  9085. #ifdef WOLFSSL_TRUST_PEER_CERT
  9086. int wolfSSL_CTX_Unload_trust_peers(WOLFSSL_CTX* ctx)
  9087. {
  9088. WOLFSSL_ENTER("wolfSSL_CTX_Unload_trust_peers");
  9089. if (ctx == NULL)
  9090. return BAD_FUNC_ARG;
  9091. return wolfSSL_CertManagerUnload_trust_peers(ctx->cm);
  9092. }
  9093. #ifdef WOLFSSL_LOCAL_X509_STORE
  9094. int wolfSSL_Unload_trust_peers(WOLFSSL* ssl)
  9095. {
  9096. WOLFSSL_ENTER("wolfSSL_CTX_Unload_trust_peers");
  9097. if (ssl == NULL)
  9098. return BAD_FUNC_ARG;
  9099. SSL_CM_WARNING(ssl);
  9100. return wolfSSL_CertManagerUnload_trust_peers(SSL_CM(ssl));
  9101. }
  9102. #endif /* WOLFSSL_LOCAL_X509_STORE */
  9103. #endif /* WOLFSSL_TRUST_PEER_CERT */
  9104. /* old NO_FILESYSTEM end */
  9105. #endif /* !NO_CERTS */
  9106. #ifdef OPENSSL_EXTRA
  9107. int wolfSSL_add_all_algorithms(void)
  9108. {
  9109. WOLFSSL_ENTER("wolfSSL_add_all_algorithms");
  9110. if (initRefCount != 0 || wolfSSL_Init() == WOLFSSL_SUCCESS)
  9111. return WOLFSSL_SUCCESS;
  9112. else
  9113. return WOLFSSL_FATAL_ERROR;
  9114. }
  9115. int wolfSSL_OpenSSL_add_all_algorithms_noconf(void)
  9116. {
  9117. WOLFSSL_ENTER("wolfSSL_OpenSSL_add_all_algorithms_noconf");
  9118. if (wolfSSL_add_all_algorithms() == WOLFSSL_FATAL_ERROR)
  9119. return WOLFSSL_FATAL_ERROR;
  9120. return WOLFSSL_SUCCESS;
  9121. }
  9122. int wolfSSL_OpenSSL_add_all_algorithms_conf(void)
  9123. {
  9124. WOLFSSL_ENTER("wolfSSL_OpenSSL_add_all_algorithms_conf");
  9125. /* This function is currently the same as
  9126. wolfSSL_OpenSSL_add_all_algorithms_noconf since we do not employ
  9127. the use of a wolfssl.cnf type configuration file and is only used for
  9128. OpenSSL compatibility. */
  9129. if (wolfSSL_add_all_algorithms() == WOLFSSL_FATAL_ERROR) {
  9130. return WOLFSSL_FATAL_ERROR;
  9131. }
  9132. return WOLFSSL_SUCCESS;
  9133. }
  9134. #endif
  9135. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
  9136. defined(WOLFSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  9137. void wolfSSL_CTX_set_quiet_shutdown(WOLFSSL_CTX* ctx, int mode)
  9138. {
  9139. WOLFSSL_ENTER("wolfSSL_CTX_set_quiet_shutdown");
  9140. if (mode)
  9141. ctx->quietShutdown = 1;
  9142. }
  9143. void wolfSSL_set_quiet_shutdown(WOLFSSL* ssl, int mode)
  9144. {
  9145. WOLFSSL_ENTER("wolfSSL_set_quiet_shutdown");
  9146. if (mode)
  9147. ssl->options.quietShutdown = 1;
  9148. }
  9149. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL ||
  9150. WOLFSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  9151. #ifdef OPENSSL_EXTRA
  9152. #ifndef NO_BIO
  9153. void wolfSSL_set_bio(WOLFSSL* ssl, WOLFSSL_BIO* rd, WOLFSSL_BIO* wr)
  9154. {
  9155. WOLFSSL_ENTER("wolfSSL_set_bio");
  9156. if (ssl == NULL) {
  9157. WOLFSSL_MSG("Bad argument, ssl was NULL");
  9158. return;
  9159. }
  9160. /* free any existing WOLFSSL_BIOs in use but don't free those in
  9161. * a chain */
  9162. if (ssl->biord != NULL) {
  9163. if (ssl->biord != ssl->biowr) {
  9164. if (ssl->biowr != NULL && ssl->biowr->prev != NULL)
  9165. wolfSSL_BIO_free(ssl->biowr);
  9166. ssl->biowr = NULL;
  9167. }
  9168. if (ssl->biord->prev != NULL)
  9169. wolfSSL_BIO_free(ssl->biord);
  9170. ssl->biord = NULL;
  9171. }
  9172. /* set flag obviously */
  9173. if (rd && !(rd->flags & WOLFSSL_BIO_FLAG_READ))
  9174. rd->flags |= WOLFSSL_BIO_FLAG_READ;
  9175. if (wr && !(wr->flags & WOLFSSL_BIO_FLAG_WRITE))
  9176. wr->flags |= WOLFSSL_BIO_FLAG_WRITE;
  9177. ssl->biord = rd;
  9178. ssl->biowr = wr;
  9179. /* set SSL to use BIO callbacks instead */
  9180. if (((ssl->cbioFlag & WOLFSSL_CBIO_RECV) == 0)) {
  9181. ssl->CBIORecv = BioReceive;
  9182. }
  9183. if (((ssl->cbioFlag & WOLFSSL_CBIO_SEND) == 0)) {
  9184. ssl->CBIOSend = BioSend;
  9185. }
  9186. /* User programs should always retry reading from these BIOs */
  9187. if (rd) {
  9188. /* User writes to rd */
  9189. BIO_set_retry_write(rd);
  9190. }
  9191. if (wr) {
  9192. /* User reads from wr */
  9193. BIO_set_retry_read(wr);
  9194. }
  9195. }
  9196. #endif /* !NO_BIO */
  9197. #endif /* OPENSSL_EXTRA */
  9198. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EXTRA)
  9199. void wolfSSL_CTX_set_client_CA_list(WOLFSSL_CTX* ctx,
  9200. WOLF_STACK_OF(WOLFSSL_X509_NAME)* names)
  9201. {
  9202. WOLFSSL_ENTER("wolfSSL_CTX_set_client_CA_list");
  9203. if (ctx != NULL) {
  9204. wolfSSL_sk_X509_NAME_pop_free(ctx->client_ca_names, NULL);
  9205. ctx->client_ca_names = names;
  9206. }
  9207. }
  9208. void wolfSSL_set_client_CA_list(WOLFSSL* ssl,
  9209. WOLF_STACK_OF(WOLFSSL_X509_NAME)* names)
  9210. {
  9211. WOLFSSL_ENTER("wolfSSL_set_client_CA_list");
  9212. if (ssl != NULL) {
  9213. if (ssl->client_ca_names != ssl->ctx->client_ca_names)
  9214. wolfSSL_sk_X509_NAME_pop_free(ssl->client_ca_names, NULL);
  9215. ssl->client_ca_names = names;
  9216. }
  9217. }
  9218. #ifdef OPENSSL_EXTRA
  9219. /* registers client cert callback, called during handshake if server
  9220. requests client auth but user has not loaded client cert/key */
  9221. void wolfSSL_CTX_set_client_cert_cb(WOLFSSL_CTX *ctx, client_cert_cb cb)
  9222. {
  9223. WOLFSSL_ENTER("wolfSSL_CTX_set_client_cert_cb");
  9224. if (ctx != NULL) {
  9225. ctx->CBClientCert = cb;
  9226. }
  9227. }
  9228. void wolfSSL_CTX_set_cert_cb(WOLFSSL_CTX* ctx,
  9229. CertSetupCallback cb, void *arg)
  9230. {
  9231. WOLFSSL_ENTER("wolfSSL_CTX_set_cert_cb");
  9232. if (ctx == NULL)
  9233. return;
  9234. ctx->certSetupCb = cb;
  9235. ctx->certSetupCbArg = arg;
  9236. }
  9237. int wolfSSL_get_client_suites_sigalgs(const WOLFSSL* ssl,
  9238. const byte** suites, word16* suiteSz,
  9239. const byte** hashSigAlgo, word16* hashSigAlgoSz)
  9240. {
  9241. WOLFSSL_ENTER("wolfSSL_get_client_suites_sigalgs");
  9242. if (suites != NULL)
  9243. *suites = NULL;
  9244. if (suiteSz != NULL)
  9245. *suiteSz = 0;
  9246. if (hashSigAlgo != NULL)
  9247. *hashSigAlgo = NULL;
  9248. if (hashSigAlgoSz != NULL)
  9249. *hashSigAlgoSz = 0;
  9250. if (ssl != NULL && ssl->clSuites != NULL) {
  9251. if (suites != NULL && suiteSz != NULL) {
  9252. *suites = ssl->clSuites->suites;
  9253. *suiteSz = ssl->clSuites->suiteSz;
  9254. }
  9255. if (hashSigAlgo != NULL && hashSigAlgoSz != NULL) {
  9256. *hashSigAlgo = ssl->clSuites->hashSigAlgo;
  9257. *hashSigAlgoSz = ssl->clSuites->hashSigAlgoSz;
  9258. }
  9259. return WOLFSSL_SUCCESS;
  9260. }
  9261. return WOLFSSL_FAILURE;
  9262. }
  9263. WOLFSSL_CIPHERSUITE_INFO wolfSSL_get_ciphersuite_info(byte first,
  9264. byte second)
  9265. {
  9266. WOLFSSL_CIPHERSUITE_INFO info;
  9267. info.rsaAuth = (byte)(CipherRequires(first, second, REQUIRES_RSA) ||
  9268. CipherRequires(first, second, REQUIRES_RSA_SIG));
  9269. info.eccAuth = (byte)(CipherRequires(first, second, REQUIRES_ECC) ||
  9270. /* Static ECC ciphers may require RSA for authentication */
  9271. (CipherRequires(first, second, REQUIRES_ECC_STATIC) &&
  9272. !CipherRequires(first, second, REQUIRES_RSA_SIG)));
  9273. info.eccStatic =
  9274. (byte)CipherRequires(first, second, REQUIRES_ECC_STATIC);
  9275. info.psk = (byte)CipherRequires(first, second, REQUIRES_PSK);
  9276. return info;
  9277. }
  9278. /**
  9279. * @param first First byte of the hash and signature algorithm
  9280. * @param second Second byte of the hash and signature algorithm
  9281. * @param hashAlgo The enum wc_HashType of the MAC algorithm
  9282. * @param sigAlgo The enum Key_Sum of the authentication algorithm
  9283. */
  9284. int wolfSSL_get_sigalg_info(byte first, byte second,
  9285. int* hashAlgo, int* sigAlgo)
  9286. {
  9287. byte input[2];
  9288. byte hashType;
  9289. byte sigType;
  9290. if (hashAlgo == NULL || sigAlgo == NULL)
  9291. return BAD_FUNC_ARG;
  9292. input[0] = first;
  9293. input[1] = second;
  9294. DecodeSigAlg(input, &hashType, &sigType);
  9295. /* cast so that compiler reminds us of unimplemented values */
  9296. switch ((enum SignatureAlgorithm)sigType) {
  9297. case anonymous_sa_algo:
  9298. *sigAlgo = ANONk;
  9299. break;
  9300. case rsa_sa_algo:
  9301. *sigAlgo = RSAk;
  9302. break;
  9303. case dsa_sa_algo:
  9304. *sigAlgo = DSAk;
  9305. break;
  9306. case ecc_dsa_sa_algo:
  9307. *sigAlgo = ECDSAk;
  9308. break;
  9309. case rsa_pss_sa_algo:
  9310. *sigAlgo = RSAPSSk;
  9311. break;
  9312. case ed25519_sa_algo:
  9313. *sigAlgo = ED25519k;
  9314. break;
  9315. case rsa_pss_pss_algo:
  9316. *sigAlgo = RSAPSSk;
  9317. break;
  9318. case ed448_sa_algo:
  9319. *sigAlgo = ED448k;
  9320. break;
  9321. case falcon_level1_sa_algo:
  9322. *sigAlgo = FALCON_LEVEL1k;
  9323. break;
  9324. case falcon_level5_sa_algo:
  9325. *sigAlgo = FALCON_LEVEL5k;
  9326. break;
  9327. case dilithium_level2_sa_algo:
  9328. *sigAlgo = DILITHIUM_LEVEL2k;
  9329. break;
  9330. case dilithium_level3_sa_algo:
  9331. *sigAlgo = DILITHIUM_LEVEL3k;
  9332. break;
  9333. case dilithium_level5_sa_algo:
  9334. *sigAlgo = DILITHIUM_LEVEL5k;
  9335. break;
  9336. case sm2_sa_algo:
  9337. *sigAlgo = SM2k;
  9338. break;
  9339. case invalid_sa_algo:
  9340. default:
  9341. *hashAlgo = WC_HASH_TYPE_NONE;
  9342. *sigAlgo = 0;
  9343. return BAD_FUNC_ARG;
  9344. }
  9345. /* cast so that compiler reminds us of unimplemented values */
  9346. switch((enum wc_MACAlgorithm)hashType) {
  9347. case no_mac:
  9348. case rmd_mac: /* Don't have a RIPEMD type in wc_HashType */
  9349. *hashAlgo = WC_HASH_TYPE_NONE;
  9350. break;
  9351. case md5_mac:
  9352. *hashAlgo = WC_HASH_TYPE_MD5;
  9353. break;
  9354. case sha_mac:
  9355. *hashAlgo = WC_HASH_TYPE_SHA;
  9356. break;
  9357. case sha224_mac:
  9358. *hashAlgo = WC_HASH_TYPE_SHA224;
  9359. break;
  9360. case sha256_mac:
  9361. *hashAlgo = WC_HASH_TYPE_SHA256;
  9362. break;
  9363. case sha384_mac:
  9364. *hashAlgo = WC_HASH_TYPE_SHA384;
  9365. break;
  9366. case sha512_mac:
  9367. *hashAlgo = WC_HASH_TYPE_SHA512;
  9368. break;
  9369. case blake2b_mac:
  9370. *hashAlgo = WC_HASH_TYPE_BLAKE2B;
  9371. break;
  9372. case sm3_mac:
  9373. #ifdef WOLFSSL_SM3
  9374. *hashAlgo = WC_HASH_TYPE_SM3;
  9375. #else
  9376. *hashAlgo = WC_HASH_TYPE_NONE;
  9377. #endif
  9378. break;
  9379. default:
  9380. *hashAlgo = WC_HASH_TYPE_NONE;
  9381. *sigAlgo = 0;
  9382. return BAD_FUNC_ARG;
  9383. }
  9384. return 0;
  9385. }
  9386. /**
  9387. * Internal wrapper for calling certSetupCb
  9388. * @param ssl The SSL/TLS Object
  9389. * @return 0 on success
  9390. */
  9391. int CertSetupCbWrapper(WOLFSSL* ssl)
  9392. {
  9393. int ret = 0;
  9394. if (ssl->ctx->certSetupCb != NULL) {
  9395. WOLFSSL_MSG("Calling user cert setup callback");
  9396. ret = ssl->ctx->certSetupCb(ssl, ssl->ctx->certSetupCbArg);
  9397. if (ret == 1) {
  9398. WOLFSSL_MSG("User cert callback returned success");
  9399. ret = 0;
  9400. }
  9401. else if (ret == 0) {
  9402. SendAlert(ssl, alert_fatal, internal_error);
  9403. ret = CLIENT_CERT_CB_ERROR;
  9404. }
  9405. else if (ret < 0) {
  9406. ret = WOLFSSL_ERROR_WANT_X509_LOOKUP;
  9407. }
  9408. else {
  9409. WOLFSSL_MSG("Unexpected user callback return");
  9410. ret = CLIENT_CERT_CB_ERROR;
  9411. }
  9412. }
  9413. return ret;
  9414. }
  9415. #endif /* OPENSSL_EXTRA */
  9416. #endif /* OPENSSL_EXTRA || WOLFSSL_EXTRA || HAVE_WEBSERVER */
  9417. #ifndef WOLFSSL_NO_CA_NAMES
  9418. WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_CTX_get_client_CA_list(
  9419. const WOLFSSL_CTX *ctx)
  9420. {
  9421. WOLFSSL_ENTER("wolfSSL_CTX_get_client_CA_list");
  9422. if (ctx == NULL) {
  9423. WOLFSSL_MSG("Bad argument passed to "
  9424. "wolfSSL_CTX_get_client_CA_list");
  9425. return NULL;
  9426. }
  9427. return ctx->client_ca_names;
  9428. }
  9429. /* returns the CA's set on server side or the CA's sent from server when
  9430. * on client side */
  9431. WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_get_client_CA_list(
  9432. const WOLFSSL* ssl)
  9433. {
  9434. WOLFSSL_ENTER("wolfSSL_get_client_CA_list");
  9435. if (ssl == NULL) {
  9436. WOLFSSL_MSG("Bad argument passed to wolfSSL_get_client_CA_list");
  9437. return NULL;
  9438. }
  9439. return SSL_CA_NAMES(ssl);
  9440. }
  9441. #if !defined(NO_CERTS)
  9442. int wolfSSL_CTX_add_client_CA(WOLFSSL_CTX* ctx, WOLFSSL_X509* x509)
  9443. {
  9444. WOLFSSL_X509_NAME *nameCopy = NULL;
  9445. WOLFSSL_ENTER("wolfSSL_CTX_add_client_CA");
  9446. if (ctx == NULL || x509 == NULL){
  9447. WOLFSSL_MSG("Bad argument");
  9448. return WOLFSSL_FAILURE;
  9449. }
  9450. if (ctx->client_ca_names == NULL) {
  9451. ctx->client_ca_names = wolfSSL_sk_X509_NAME_new(NULL);
  9452. if (ctx->client_ca_names == NULL) {
  9453. WOLFSSL_MSG("wolfSSL_sk_X509_NAME_new error");
  9454. return WOLFSSL_FAILURE;
  9455. }
  9456. }
  9457. nameCopy = wolfSSL_X509_NAME_dup(wolfSSL_X509_get_subject_name(x509));
  9458. if (nameCopy == NULL) {
  9459. WOLFSSL_MSG("wolfSSL_X509_NAME_dup error");
  9460. return WOLFSSL_FAILURE;
  9461. }
  9462. if (wolfSSL_sk_X509_NAME_push(ctx->client_ca_names, nameCopy) !=
  9463. WOLFSSL_SUCCESS) {
  9464. WOLFSSL_MSG("wolfSSL_sk_X509_NAME_push error");
  9465. wolfSSL_X509_NAME_free(nameCopy);
  9466. return WOLFSSL_FAILURE;
  9467. }
  9468. return WOLFSSL_SUCCESS;
  9469. }
  9470. #endif
  9471. #ifndef NO_BIO
  9472. #if !defined(NO_RSA) && !defined(NO_CERTS)
  9473. WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_load_client_CA_file(
  9474. const char* fname)
  9475. {
  9476. /* The webserver build is using this to load a CA into the server
  9477. * for client authentication as an option. Have this return NULL in
  9478. * that case. If OPENSSL_EXTRA is enabled, go ahead and include
  9479. * the function. */
  9480. #ifdef OPENSSL_EXTRA
  9481. WOLFSSL_STACK *list = NULL;
  9482. WOLFSSL_BIO* bio = NULL;
  9483. WOLFSSL_X509 *cert = NULL;
  9484. WOLFSSL_X509_NAME *nameCopy = NULL;
  9485. unsigned long err = WOLFSSL_FAILURE;
  9486. WOLFSSL_ENTER("wolfSSL_load_client_CA_file");
  9487. bio = wolfSSL_BIO_new_file(fname, "rb");
  9488. if (bio == NULL) {
  9489. WOLFSSL_MSG("wolfSSL_BIO_new_file error");
  9490. goto cleanup;
  9491. }
  9492. list = wolfSSL_sk_X509_NAME_new(NULL);
  9493. if (list == NULL) {
  9494. WOLFSSL_MSG("wolfSSL_sk_X509_NAME_new error");
  9495. goto cleanup;
  9496. }
  9497. /* Read each certificate in the chain out of the file. */
  9498. while (wolfSSL_PEM_read_bio_X509(bio, &cert, NULL, NULL) != NULL) {
  9499. /* Need a persistent copy of the subject name. */
  9500. nameCopy = wolfSSL_X509_NAME_dup(
  9501. wolfSSL_X509_get_subject_name(cert));
  9502. if (nameCopy == NULL) {
  9503. WOLFSSL_MSG("wolfSSL_X509_NAME_dup error");
  9504. goto cleanup;
  9505. }
  9506. /*
  9507. * Original cert will be freed so make sure not to try to access
  9508. * it in the future.
  9509. */
  9510. nameCopy->x509 = NULL;
  9511. if (wolfSSL_sk_X509_NAME_push(list, nameCopy) !=
  9512. WOLFSSL_SUCCESS) {
  9513. WOLFSSL_MSG("wolfSSL_sk_X509_NAME_push error");
  9514. /* Do free in loop because nameCopy is now responsibility
  9515. * of list to free and adding jumps to cleanup after this
  9516. * might result in a double free. */
  9517. wolfSSL_X509_NAME_free(nameCopy);
  9518. goto cleanup;
  9519. }
  9520. wolfSSL_X509_free(cert);
  9521. cert = NULL;
  9522. }
  9523. CLEAR_ASN_NO_PEM_HEADER_ERROR(err);
  9524. err = WOLFSSL_SUCCESS;
  9525. cleanup:
  9526. wolfSSL_X509_free(cert);
  9527. wolfSSL_BIO_free(bio);
  9528. if (err != WOLFSSL_SUCCESS) {
  9529. /* We failed so return NULL */
  9530. wolfSSL_sk_X509_NAME_pop_free(list, NULL);
  9531. list = NULL;
  9532. }
  9533. return list;
  9534. #else
  9535. (void)fname;
  9536. return NULL;
  9537. #endif
  9538. }
  9539. #endif
  9540. #endif /* !NO_BIO */
  9541. #endif /* OPENSSL_EXTRA || WOLFSSL_EXTRA */
  9542. #ifdef OPENSSL_EXTRA
  9543. #if defined(WOLFCRYPT_HAVE_SRP) && !defined(NO_SHA256) \
  9544. && !defined(WC_NO_RNG)
  9545. static const byte srp_N[] = {
  9546. 0xEE, 0xAF, 0x0A, 0xB9, 0xAD, 0xB3, 0x8D, 0xD6, 0x9C, 0x33, 0xF8,
  9547. 0x0A, 0xFA, 0x8F, 0xC5, 0xE8, 0x60, 0x72, 0x61, 0x87, 0x75, 0xFF,
  9548. 0x3C, 0x0B, 0x9E, 0xA2, 0x31, 0x4C, 0x9C, 0x25, 0x65, 0x76, 0xD6,
  9549. 0x74, 0xDF, 0x74, 0x96, 0xEA, 0x81, 0xD3, 0x38, 0x3B, 0x48, 0x13,
  9550. 0xD6, 0x92, 0xC6, 0xE0, 0xE0, 0xD5, 0xD8, 0xE2, 0x50, 0xB9, 0x8B,
  9551. 0xE4, 0x8E, 0x49, 0x5C, 0x1D, 0x60, 0x89, 0xDA, 0xD1, 0x5D, 0xC7,
  9552. 0xD7, 0xB4, 0x61, 0x54, 0xD6, 0xB6, 0xCE, 0x8E, 0xF4, 0xAD, 0x69,
  9553. 0xB1, 0x5D, 0x49, 0x82, 0x55, 0x9B, 0x29, 0x7B, 0xCF, 0x18, 0x85,
  9554. 0xC5, 0x29, 0xF5, 0x66, 0x66, 0x0E, 0x57, 0xEC, 0x68, 0xED, 0xBC,
  9555. 0x3C, 0x05, 0x72, 0x6C, 0xC0, 0x2F, 0xD4, 0xCB, 0xF4, 0x97, 0x6E,
  9556. 0xAA, 0x9A, 0xFD, 0x51, 0x38, 0xFE, 0x83, 0x76, 0x43, 0x5B, 0x9F,
  9557. 0xC6, 0x1D, 0x2F, 0xC0, 0xEB, 0x06, 0xE3
  9558. };
  9559. static const byte srp_g[] = {
  9560. 0x02
  9561. };
  9562. int wolfSSL_CTX_set_srp_username(WOLFSSL_CTX* ctx, char* username)
  9563. {
  9564. int r = 0;
  9565. SrpSide srp_side = SRP_CLIENT_SIDE;
  9566. byte salt[SRP_SALT_SIZE];
  9567. WOLFSSL_ENTER("wolfSSL_CTX_set_srp_username");
  9568. if (ctx == NULL || ctx->srp == NULL || username==NULL)
  9569. return WOLFSSL_FAILURE;
  9570. if (ctx->method->side == WOLFSSL_SERVER_END){
  9571. srp_side = SRP_SERVER_SIDE;
  9572. } else if (ctx->method->side == WOLFSSL_CLIENT_END){
  9573. srp_side = SRP_CLIENT_SIDE;
  9574. } else {
  9575. WOLFSSL_MSG("Init CTX failed");
  9576. return WOLFSSL_FAILURE;
  9577. }
  9578. if (wc_SrpInit(ctx->srp, SRP_TYPE_SHA256, srp_side) < 0) {
  9579. WOLFSSL_MSG("Init SRP CTX failed");
  9580. XFREE(ctx->srp, ctx->heap, DYNAMIC_TYPE_SRP);
  9581. ctx->srp = NULL;
  9582. return WOLFSSL_FAILURE;
  9583. }
  9584. r = wc_SrpSetUsername(ctx->srp, (const byte*)username,
  9585. (word32)XSTRLEN(username));
  9586. if (r < 0) {
  9587. WOLFSSL_MSG("fail to set srp username.");
  9588. return WOLFSSL_FAILURE;
  9589. }
  9590. /* if wolfSSL_CTX_set_srp_password has already been called, */
  9591. /* execute wc_SrpSetPassword here */
  9592. if (ctx->srp_password != NULL) {
  9593. WC_RNG rng;
  9594. if (wc_InitRng(&rng) < 0){
  9595. WOLFSSL_MSG("wc_InitRng failed");
  9596. return WOLFSSL_FAILURE;
  9597. }
  9598. XMEMSET(salt, 0, sizeof(salt)/sizeof(salt[0]));
  9599. r = wc_RNG_GenerateBlock(&rng, salt, sizeof(salt)/sizeof(salt[0]));
  9600. wc_FreeRng(&rng);
  9601. if (r < 0) {
  9602. WOLFSSL_MSG("wc_RNG_GenerateBlock failed");
  9603. return WOLFSSL_FAILURE;
  9604. }
  9605. if (wc_SrpSetParams(ctx->srp, srp_N, sizeof(srp_N)/sizeof(srp_N[0]),
  9606. srp_g, sizeof(srp_g)/sizeof(srp_g[0]),
  9607. salt, sizeof(salt)/sizeof(salt[0])) < 0) {
  9608. WOLFSSL_MSG("wc_SrpSetParam failed");
  9609. return WOLFSSL_FAILURE;
  9610. }
  9611. r = wc_SrpSetPassword(ctx->srp,
  9612. (const byte*)ctx->srp_password,
  9613. (word32)XSTRLEN((char *)ctx->srp_password));
  9614. if (r < 0) {
  9615. WOLFSSL_MSG("fail to set srp password.");
  9616. return WOLFSSL_FAILURE;
  9617. }
  9618. XFREE(ctx->srp_password, ctx->heap, DYNAMIC_TYPE_SRP);
  9619. ctx->srp_password = NULL;
  9620. }
  9621. return WOLFSSL_SUCCESS;
  9622. }
  9623. int wolfSSL_CTX_set_srp_password(WOLFSSL_CTX* ctx, char* password)
  9624. {
  9625. int r;
  9626. byte salt[SRP_SALT_SIZE];
  9627. WOLFSSL_ENTER("wolfSSL_CTX_set_srp_password");
  9628. if (ctx == NULL || ctx->srp == NULL || password == NULL)
  9629. return WOLFSSL_FAILURE;
  9630. if (ctx->srp->user != NULL) {
  9631. WC_RNG rng;
  9632. if (wc_InitRng(&rng) < 0) {
  9633. WOLFSSL_MSG("wc_InitRng failed");
  9634. return WOLFSSL_FAILURE;
  9635. }
  9636. XMEMSET(salt, 0, sizeof(salt)/sizeof(salt[0]));
  9637. r = wc_RNG_GenerateBlock(&rng, salt, sizeof(salt)/sizeof(salt[0]));
  9638. wc_FreeRng(&rng);
  9639. if (r < 0) {
  9640. WOLFSSL_MSG("wc_RNG_GenerateBlock failed");
  9641. return WOLFSSL_FAILURE;
  9642. }
  9643. if (wc_SrpSetParams(ctx->srp, srp_N, sizeof(srp_N)/sizeof(srp_N[0]),
  9644. srp_g, sizeof(srp_g)/sizeof(srp_g[0]),
  9645. salt, sizeof(salt)/sizeof(salt[0])) < 0){
  9646. WOLFSSL_MSG("wc_SrpSetParam failed");
  9647. wc_FreeRng(&rng);
  9648. return WOLFSSL_FAILURE;
  9649. }
  9650. r = wc_SrpSetPassword(ctx->srp, (const byte*)password,
  9651. (word32)XSTRLEN(password));
  9652. if (r < 0) {
  9653. WOLFSSL_MSG("wc_SrpSetPassword failed.");
  9654. wc_FreeRng(&rng);
  9655. return WOLFSSL_FAILURE;
  9656. }
  9657. if (ctx->srp_password != NULL){
  9658. XFREE(ctx->srp_password,NULL,
  9659. DYNAMIC_TYPE_SRP);
  9660. ctx->srp_password = NULL;
  9661. }
  9662. wc_FreeRng(&rng);
  9663. } else {
  9664. /* save password for wolfSSL_set_srp_username */
  9665. if (ctx->srp_password != NULL)
  9666. XFREE(ctx->srp_password,ctx->heap, DYNAMIC_TYPE_SRP);
  9667. ctx->srp_password = (byte*)XMALLOC(XSTRLEN(password) + 1, ctx->heap,
  9668. DYNAMIC_TYPE_SRP);
  9669. if (ctx->srp_password == NULL){
  9670. WOLFSSL_MSG("memory allocation error");
  9671. return WOLFSSL_FAILURE;
  9672. }
  9673. XMEMCPY(ctx->srp_password, password, XSTRLEN(password) + 1);
  9674. }
  9675. return WOLFSSL_SUCCESS;
  9676. }
  9677. /**
  9678. * The modulus passed to wc_SrpSetParams in ssl.c is constant so check
  9679. * that the requested strength is less than or equal to the size of the
  9680. * static modulus size.
  9681. * @param ctx Not used
  9682. * @param strength Minimum number of bits for the modulus
  9683. * @return 1 if strength is less than or equal to static modulus
  9684. * 0 if strength is greater than static modulus
  9685. */
  9686. int wolfSSL_CTX_set_srp_strength(WOLFSSL_CTX *ctx, int strength)
  9687. {
  9688. (void)ctx;
  9689. WOLFSSL_ENTER("wolfSSL_CTX_set_srp_strength");
  9690. if (strength > (int)(sizeof(srp_N)*8)) {
  9691. WOLFSSL_MSG("Bad Parameter");
  9692. return WOLFSSL_FAILURE;
  9693. }
  9694. return WOLFSSL_SUCCESS;
  9695. }
  9696. char* wolfSSL_get_srp_username(WOLFSSL *ssl)
  9697. {
  9698. if (ssl && ssl->ctx && ssl->ctx->srp) {
  9699. return (char*) ssl->ctx->srp->user;
  9700. }
  9701. return NULL;
  9702. }
  9703. #endif /* WOLFCRYPT_HAVE_SRP && !NO_SHA256 && !WC_NO_RNG */
  9704. /* keyblock size in bytes or -1 */
  9705. int wolfSSL_get_keyblock_size(WOLFSSL* ssl)
  9706. {
  9707. if (ssl == NULL)
  9708. return WOLFSSL_FATAL_ERROR;
  9709. return 2 * (ssl->specs.key_size + ssl->specs.iv_size +
  9710. ssl->specs.hash_size);
  9711. }
  9712. #endif /* OPENSSL_EXTRA */
  9713. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EXTRA) || \
  9714. defined(WOLFSSL_WPAS_SMALL)
  9715. /* store keys returns WOLFSSL_SUCCESS or -1 on error */
  9716. int wolfSSL_get_keys(WOLFSSL* ssl, unsigned char** ms, unsigned int* msLen,
  9717. unsigned char** sr, unsigned int* srLen,
  9718. unsigned char** cr, unsigned int* crLen)
  9719. {
  9720. if (ssl == NULL || ssl->arrays == NULL)
  9721. return WOLFSSL_FATAL_ERROR;
  9722. *ms = ssl->arrays->masterSecret;
  9723. *sr = ssl->arrays->serverRandom;
  9724. *cr = ssl->arrays->clientRandom;
  9725. *msLen = SECRET_LEN;
  9726. *srLen = RAN_LEN;
  9727. *crLen = RAN_LEN;
  9728. return WOLFSSL_SUCCESS;
  9729. }
  9730. void wolfSSL_set_accept_state(WOLFSSL* ssl)
  9731. {
  9732. WOLFSSL_ENTER("wolfSSL_set_accept_state");
  9733. if (ssl == NULL)
  9734. return;
  9735. if (ssl->options.side == WOLFSSL_CLIENT_END) {
  9736. #ifdef HAVE_ECC
  9737. #ifdef WOLFSSL_SMALL_STACK
  9738. ecc_key* key = NULL;
  9739. #else
  9740. ecc_key key[1];
  9741. #endif
  9742. word32 idx = 0;
  9743. #ifdef WOLFSSL_SMALL_STACK
  9744. key = (ecc_key*)XMALLOC(sizeof(ecc_key), ssl->heap,
  9745. DYNAMIC_TYPE_ECC);
  9746. if (key == NULL) {
  9747. WOLFSSL_MSG("Error allocating memory for ecc_key");
  9748. }
  9749. #endif
  9750. if (ssl->options.haveStaticECC && ssl->buffers.key != NULL) {
  9751. if (wc_ecc_init(key) >= 0) {
  9752. if (wc_EccPrivateKeyDecode(ssl->buffers.key->buffer, &idx,
  9753. key, ssl->buffers.key->length) != 0) {
  9754. ssl->options.haveECDSAsig = 0;
  9755. ssl->options.haveECC = 0;
  9756. ssl->options.haveStaticECC = 0;
  9757. }
  9758. wc_ecc_free(key);
  9759. }
  9760. }
  9761. #ifdef WOLFSSL_SMALL_STACK
  9762. XFREE(key, ssl->heap, DYNAMIC_TYPE_ECC);
  9763. #endif
  9764. #endif
  9765. #ifndef NO_DH
  9766. if (!ssl->options.haveDH && ssl->ctx->haveDH) {
  9767. ssl->buffers.serverDH_P = ssl->ctx->serverDH_P;
  9768. ssl->buffers.serverDH_G = ssl->ctx->serverDH_G;
  9769. ssl->options.haveDH = 1;
  9770. }
  9771. #endif
  9772. }
  9773. if (InitSSL_Side(ssl, WOLFSSL_SERVER_END) != WOLFSSL_SUCCESS) {
  9774. WOLFSSL_MSG("Error initializing server side");
  9775. }
  9776. }
  9777. #endif /* OPENSSL_EXTRA || WOLFSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  9778. /* return true if connection established */
  9779. int wolfSSL_is_init_finished(const WOLFSSL* ssl)
  9780. {
  9781. if (ssl == NULL)
  9782. return 0;
  9783. /* Can't use ssl->options.connectState and ssl->options.acceptState
  9784. * because they differ in meaning for TLS <=1.2 and 1.3 */
  9785. if (ssl->options.handShakeState == HANDSHAKE_DONE)
  9786. return 1;
  9787. return 0;
  9788. }
  9789. #ifdef OPENSSL_EXTRA
  9790. void wolfSSL_CTX_set_tmp_rsa_callback(WOLFSSL_CTX* ctx,
  9791. WOLFSSL_RSA*(*f)(WOLFSSL*, int, int))
  9792. {
  9793. /* wolfSSL verifies all these internally */
  9794. (void)ctx;
  9795. (void)f;
  9796. }
  9797. void wolfSSL_set_shutdown(WOLFSSL* ssl, int opt)
  9798. {
  9799. WOLFSSL_ENTER("wolfSSL_set_shutdown");
  9800. if(ssl==NULL) {
  9801. WOLFSSL_MSG("Shutdown not set. ssl is null");
  9802. return;
  9803. }
  9804. ssl->options.sentNotify = (opt&WOLFSSL_SENT_SHUTDOWN) > 0;
  9805. ssl->options.closeNotify = (opt&WOLFSSL_RECEIVED_SHUTDOWN) > 0;
  9806. }
  9807. #endif
  9808. long wolfSSL_CTX_get_options(WOLFSSL_CTX* ctx)
  9809. {
  9810. WOLFSSL_ENTER("wolfSSL_CTX_get_options");
  9811. WOLFSSL_MSG("wolfSSL options are set through API calls and macros");
  9812. if(ctx == NULL)
  9813. return BAD_FUNC_ARG;
  9814. return ctx->mask;
  9815. }
  9816. /* forward declaration */
  9817. static long wolf_set_options(long old_op, long op);
  9818. long wolfSSL_CTX_set_options(WOLFSSL_CTX* ctx, long opt)
  9819. {
  9820. WOLFSSL_ENTER("wolfSSL_CTX_set_options");
  9821. if (ctx == NULL)
  9822. return BAD_FUNC_ARG;
  9823. ctx->mask = wolf_set_options(ctx->mask, opt);
  9824. #if defined(HAVE_SESSION_TICKET) && (defined(OPENSSL_EXTRA) \
  9825. || defined(HAVE_WEBSERVER) || defined(WOLFSSL_WPAS_SMALL))
  9826. if ((ctx->mask & WOLFSSL_OP_NO_TICKET) == WOLFSSL_OP_NO_TICKET) {
  9827. ctx->noTicketTls12 = 1;
  9828. }
  9829. /* This code is here for documentation purpose. You must not turn off
  9830. * session tickets with the WOLFSSL_OP_NO_TICKET option for TLSv1.3.
  9831. * Because we need to support both stateful and stateless tickets.
  9832. #ifdef WOLFSSL_TLS13
  9833. if ((ctx->mask & WOLFSSL_OP_NO_TICKET) == WOLFSSL_OP_NO_TICKET) {
  9834. ctx->noTicketTls13 = 1;
  9835. }
  9836. #endif
  9837. */
  9838. #endif
  9839. return ctx->mask;
  9840. }
  9841. long wolfSSL_CTX_clear_options(WOLFSSL_CTX* ctx, long opt)
  9842. {
  9843. WOLFSSL_ENTER("wolfSSL_CTX_clear_options");
  9844. if(ctx == NULL)
  9845. return BAD_FUNC_ARG;
  9846. ctx->mask &= ~opt;
  9847. return ctx->mask;
  9848. }
  9849. #ifdef OPENSSL_EXTRA
  9850. int wolfSSL_set_rfd(WOLFSSL* ssl, int rfd)
  9851. {
  9852. WOLFSSL_ENTER("wolfSSL_set_rfd");
  9853. ssl->rfd = rfd; /* not used directly to allow IO callbacks */
  9854. ssl->IOCB_ReadCtx = &ssl->rfd;
  9855. #ifdef WOLFSSL_DTLS
  9856. if (ssl->options.dtls) {
  9857. ssl->IOCB_ReadCtx = &ssl->buffers.dtlsCtx;
  9858. ssl->buffers.dtlsCtx.rfd = rfd;
  9859. }
  9860. #endif
  9861. return WOLFSSL_SUCCESS;
  9862. }
  9863. int wolfSSL_set_wfd(WOLFSSL* ssl, int wfd)
  9864. {
  9865. WOLFSSL_ENTER("wolfSSL_set_wfd");
  9866. ssl->wfd = wfd; /* not used directly to allow IO callbacks */
  9867. ssl->IOCB_WriteCtx = &ssl->wfd;
  9868. return WOLFSSL_SUCCESS;
  9869. }
  9870. #endif /* OPENSSL_EXTRA */
  9871. #if !defined(NO_CERTS) && (defined(OPENSSL_EXTRA) || \
  9872. defined(WOLFSSL_WPAS_SMALL))
  9873. #if defined(SESSION_CERTS) && defined(OPENSSL_EXTRA)
  9874. /**
  9875. * Implemented in a similar way that ngx_ssl_ocsp_validate does it when
  9876. * SSL_get0_verified_chain is not available.
  9877. * @param ssl WOLFSSL object to extract certs from
  9878. * @return Stack of verified certs
  9879. */
  9880. WOLF_STACK_OF(WOLFSSL_X509) *wolfSSL_get0_verified_chain(const WOLFSSL *ssl)
  9881. {
  9882. WOLF_STACK_OF(WOLFSSL_X509)* chain = NULL;
  9883. WOLFSSL_X509_STORE_CTX* storeCtx = NULL;
  9884. WOLFSSL_X509* peerCert = NULL;
  9885. WOLFSSL_ENTER("wolfSSL_get0_verified_chain");
  9886. if (ssl == NULL || ssl->ctx == NULL) {
  9887. WOLFSSL_MSG("Bad parameter");
  9888. return NULL;
  9889. }
  9890. peerCert = wolfSSL_get_peer_certificate((WOLFSSL*)ssl);
  9891. if (peerCert == NULL) {
  9892. WOLFSSL_MSG("wolfSSL_get_peer_certificate error");
  9893. return NULL;
  9894. }
  9895. /* wolfSSL_get_peer_certificate returns a copy. We want the internal
  9896. * member so that we don't have to worry about free'ing it. We call
  9897. * wolfSSL_get_peer_certificate so that we don't have to worry about
  9898. * setting up the internal pointer. */
  9899. wolfSSL_X509_free(peerCert);
  9900. peerCert = (WOLFSSL_X509*)&ssl->peerCert;
  9901. chain = wolfSSL_get_peer_cert_chain(ssl);
  9902. if (chain == NULL) {
  9903. WOLFSSL_MSG("wolfSSL_get_peer_cert_chain error");
  9904. return NULL;
  9905. }
  9906. storeCtx = wolfSSL_X509_STORE_CTX_new();
  9907. if (storeCtx == NULL) {
  9908. WOLFSSL_MSG("wolfSSL_X509_STORE_CTX_new error");
  9909. return NULL;
  9910. }
  9911. if (wolfSSL_X509_STORE_CTX_init(storeCtx, SSL_STORE(ssl),
  9912. peerCert, chain) != WOLFSSL_SUCCESS) {
  9913. WOLFSSL_MSG("wolfSSL_X509_STORE_CTX_init error");
  9914. wolfSSL_X509_STORE_CTX_free(storeCtx);
  9915. return NULL;
  9916. }
  9917. if (wolfSSL_X509_verify_cert(storeCtx) <= 0) {
  9918. WOLFSSL_MSG("wolfSSL_X509_verify_cert error");
  9919. wolfSSL_X509_STORE_CTX_free(storeCtx);
  9920. return NULL;
  9921. }
  9922. wolfSSL_X509_STORE_CTX_free(storeCtx);
  9923. return chain;
  9924. }
  9925. #endif /* SESSION_CERTS && OPENSSL_EXTRA */
  9926. WOLFSSL_X509_STORE* wolfSSL_CTX_get_cert_store(WOLFSSL_CTX* ctx)
  9927. {
  9928. if (ctx == NULL) {
  9929. return NULL;
  9930. }
  9931. if (ctx->x509_store_pt != NULL)
  9932. return ctx->x509_store_pt;
  9933. return &ctx->x509_store;
  9934. }
  9935. void wolfSSL_CTX_set_cert_store(WOLFSSL_CTX* ctx, WOLFSSL_X509_STORE* str)
  9936. {
  9937. WOLFSSL_ENTER("wolfSSL_CTX_set_cert_store");
  9938. if (ctx == NULL || str == NULL || ctx->cm == str->cm) {
  9939. return;
  9940. }
  9941. if (wolfSSL_CertManager_up_ref(str->cm) != WOLFSSL_SUCCESS) {
  9942. WOLFSSL_MSG("wolfSSL_CertManager_up_ref error");
  9943. return;
  9944. }
  9945. /* free cert manager if have one */
  9946. if (ctx->cm != NULL) {
  9947. wolfSSL_CertManagerFree(ctx->cm);
  9948. }
  9949. ctx->cm = str->cm;
  9950. ctx->x509_store.cm = str->cm;
  9951. /* free existing store if it exists */
  9952. wolfSSL_X509_STORE_free(ctx->x509_store_pt);
  9953. ctx->x509_store.cache = str->cache;
  9954. ctx->x509_store_pt = str; /* take ownership of store and free it
  9955. with CTX free */
  9956. ctx->cm->x509_store_p = ctx->x509_store_pt;/* CTX has ownership
  9957. and free it with CTX free*/
  9958. }
  9959. #ifdef OPENSSL_ALL
  9960. int wolfSSL_CTX_set1_verify_cert_store(WOLFSSL_CTX* ctx,
  9961. WOLFSSL_X509_STORE* str)
  9962. {
  9963. WOLFSSL_ENTER("wolfSSL_CTX_set1_verify_cert_store");
  9964. if (ctx == NULL || str == NULL) {
  9965. WOLFSSL_MSG("Bad parameter");
  9966. return WOLFSSL_FAILURE;
  9967. }
  9968. /* NO-OP when setting existing store */
  9969. if (str == CTX_STORE(ctx))
  9970. return WOLFSSL_SUCCESS;
  9971. if (wolfSSL_X509_STORE_up_ref(str) != WOLFSSL_SUCCESS) {
  9972. WOLFSSL_MSG("wolfSSL_X509_STORE_up_ref error");
  9973. return WOLFSSL_FAILURE;
  9974. }
  9975. /* free existing store if it exists */
  9976. wolfSSL_X509_STORE_free(ctx->x509_store_pt);
  9977. ctx->x509_store_pt = str; /* take ownership of store and free it
  9978. with CTX free */
  9979. return WOLFSSL_SUCCESS;
  9980. }
  9981. #endif
  9982. int wolfSSL_set0_verify_cert_store(WOLFSSL *ssl, WOLFSSL_X509_STORE* str)
  9983. {
  9984. WOLFSSL_ENTER("wolfSSL_set0_verify_cert_store");
  9985. if (ssl == NULL || str == NULL) {
  9986. WOLFSSL_MSG("Bad parameter");
  9987. return WOLFSSL_FAILURE;
  9988. }
  9989. /* NO-OP when setting existing store */
  9990. if (str == SSL_STORE(ssl))
  9991. return WOLFSSL_SUCCESS;
  9992. /* free existing store if it exists */
  9993. wolfSSL_X509_STORE_free(ssl->x509_store_pt);
  9994. if (str == ssl->ctx->x509_store_pt)
  9995. ssl->x509_store_pt = NULL; /* if setting ctx store then just revert
  9996. to using that instead */
  9997. else
  9998. ssl->x509_store_pt = str; /* take ownership of store and free it
  9999. with SSL free */
  10000. return WOLFSSL_SUCCESS;
  10001. }
  10002. int wolfSSL_set1_verify_cert_store(WOLFSSL *ssl, WOLFSSL_X509_STORE* str)
  10003. {
  10004. WOLFSSL_ENTER("wolfSSL_set1_verify_cert_store");
  10005. if (ssl == NULL || str == NULL) {
  10006. WOLFSSL_MSG("Bad parameter");
  10007. return WOLFSSL_FAILURE;
  10008. }
  10009. /* NO-OP when setting existing store */
  10010. if (str == SSL_STORE(ssl))
  10011. return WOLFSSL_SUCCESS;
  10012. if (wolfSSL_X509_STORE_up_ref(str) != WOLFSSL_SUCCESS) {
  10013. WOLFSSL_MSG("wolfSSL_X509_STORE_up_ref error");
  10014. return WOLFSSL_FAILURE;
  10015. }
  10016. /* free existing store if it exists */
  10017. wolfSSL_X509_STORE_free(ssl->x509_store_pt);
  10018. if (str == ssl->ctx->x509_store_pt)
  10019. ssl->x509_store_pt = NULL; /* if setting ctx store then just revert
  10020. to using that instead */
  10021. else
  10022. ssl->x509_store_pt = str; /* take ownership of store and free it
  10023. with SSL free */
  10024. return WOLFSSL_SUCCESS;
  10025. }
  10026. #endif /* !NO_CERTS && (OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL) */
  10027. #ifdef WOLFSSL_ENCRYPTED_KEYS
  10028. void wolfSSL_CTX_set_default_passwd_cb_userdata(WOLFSSL_CTX* ctx,
  10029. void* userdata)
  10030. {
  10031. WOLFSSL_ENTER("wolfSSL_CTX_set_default_passwd_cb_userdata");
  10032. if (ctx)
  10033. ctx->passwd_userdata = userdata;
  10034. }
  10035. void wolfSSL_CTX_set_default_passwd_cb(WOLFSSL_CTX* ctx, wc_pem_password_cb*
  10036. cb)
  10037. {
  10038. WOLFSSL_ENTER("wolfSSL_CTX_set_default_passwd_cb");
  10039. if (ctx)
  10040. ctx->passwd_cb = cb;
  10041. }
  10042. wc_pem_password_cb* wolfSSL_CTX_get_default_passwd_cb(WOLFSSL_CTX *ctx)
  10043. {
  10044. if (ctx == NULL || ctx->passwd_cb == NULL) {
  10045. return NULL;
  10046. }
  10047. return ctx->passwd_cb;
  10048. }
  10049. void* wolfSSL_CTX_get_default_passwd_cb_userdata(WOLFSSL_CTX *ctx)
  10050. {
  10051. if (ctx == NULL) {
  10052. return NULL;
  10053. }
  10054. return ctx->passwd_userdata;
  10055. }
  10056. #endif /* WOLFSSL_ENCRYPTED_KEYS */
  10057. #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) || defined(HAVE_MEMCACHED)
  10058. unsigned long wolfSSL_ERR_get_error(void)
  10059. {
  10060. WOLFSSL_ENTER("wolfSSL_ERR_get_error");
  10061. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  10062. return wc_GetErrorNodeErr();
  10063. #else
  10064. return (unsigned long)(0 - NOT_COMPILED_IN);
  10065. #endif
  10066. }
  10067. #endif
  10068. #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
  10069. int wolfSSL_num_locks(void)
  10070. {
  10071. return 0;
  10072. }
  10073. void wolfSSL_set_locking_callback(mutex_cb* f)
  10074. {
  10075. WOLFSSL_ENTER("wolfSSL_set_locking_callback");
  10076. if (wc_SetMutexCb(f) != 0) {
  10077. WOLFSSL_MSG("Error when setting mutex call back");
  10078. }
  10079. }
  10080. mutex_cb* wolfSSL_get_locking_callback(void)
  10081. {
  10082. WOLFSSL_ENTER("wolfSSL_get_locking_callback");
  10083. return wc_GetMutexCb();
  10084. }
  10085. typedef unsigned long (idCb)(void);
  10086. static idCb* inner_idCb = NULL;
  10087. unsigned long wolfSSL_thread_id(void)
  10088. {
  10089. if (inner_idCb != NULL) {
  10090. return inner_idCb();
  10091. }
  10092. else {
  10093. return 0;
  10094. }
  10095. }
  10096. void wolfSSL_set_id_callback(unsigned long (*f)(void))
  10097. {
  10098. inner_idCb = f;
  10099. }
  10100. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  10101. #ifndef NO_BIO
  10102. /* print out and clear all errors */
  10103. void wolfSSL_ERR_print_errors(WOLFSSL_BIO* bio)
  10104. {
  10105. const char* file = NULL;
  10106. const char* reason = NULL;
  10107. int ret;
  10108. int line = 0;
  10109. char buf[WOLFSSL_MAX_ERROR_SZ * 2];
  10110. WOLFSSL_ENTER("wolfSSL_ERR_print_errors");
  10111. if (bio == NULL) {
  10112. WOLFSSL_MSG("BIO passed in was null");
  10113. return;
  10114. }
  10115. do {
  10116. ret = wc_PeekErrorNode(0, &file, &reason, &line);
  10117. if (ret >= 0) {
  10118. const char* r = wolfSSL_ERR_reason_error_string(0 - ret);
  10119. if (XSNPRINTF(buf, sizeof(buf),
  10120. "error:%d:wolfSSL library:%s:%s:%d\n",
  10121. ret, r, file, line)
  10122. >= (int)sizeof(buf))
  10123. {
  10124. WOLFSSL_MSG("Buffer overrun formatting error message");
  10125. }
  10126. wolfSSL_BIO_write(bio, buf, (int)XSTRLEN(buf));
  10127. wc_RemoveErrorNode(0);
  10128. }
  10129. } while (ret >= 0);
  10130. if (wolfSSL_BIO_write(bio, "", 1) != 1) {
  10131. WOLFSSL_MSG("Issue writing final string terminator");
  10132. }
  10133. }
  10134. #endif /* !NO_BIO */
  10135. #endif /* WOLFSSL_HAVE_ERROR_QUEUE */
  10136. #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */
  10137. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  10138. defined(HAVE_SECRET_CALLBACK)
  10139. #if !defined(NO_WOLFSSL_SERVER)
  10140. /* Return the amount of random bytes copied over or error case.
  10141. * ssl : ssl struct after handshake
  10142. * out : buffer to hold random bytes
  10143. * outSz : either 0 (return max buffer sz) or size of out buffer
  10144. */
  10145. size_t wolfSSL_get_server_random(const WOLFSSL *ssl, unsigned char *out,
  10146. size_t outSz)
  10147. {
  10148. size_t size;
  10149. /* return max size of buffer */
  10150. if (outSz == 0) {
  10151. return RAN_LEN;
  10152. }
  10153. if (ssl == NULL || out == NULL) {
  10154. return 0;
  10155. }
  10156. if (ssl->arrays == NULL) {
  10157. WOLFSSL_MSG("Arrays struct not saved after handshake");
  10158. return 0;
  10159. }
  10160. if (outSz > RAN_LEN) {
  10161. size = RAN_LEN;
  10162. }
  10163. else {
  10164. size = outSz;
  10165. }
  10166. XMEMCPY(out, ssl->arrays->serverRandom, size);
  10167. return size;
  10168. }
  10169. #endif /* !NO_WOLFSSL_SERVER */
  10170. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || HAVE_SECRET_CALLBACK */
  10171. #ifdef OPENSSL_EXTRA
  10172. #if !defined(NO_WOLFSSL_SERVER)
  10173. /* Used to get the peer ephemeral public key sent during the connection
  10174. * NOTE: currently wolfSSL_KeepHandshakeResources(WOLFSSL* ssl) must be called
  10175. * before the ephemeral key is stored.
  10176. * return WOLFSSL_SUCCESS on success */
  10177. int wolfSSL_get_peer_tmp_key(const WOLFSSL* ssl, WOLFSSL_EVP_PKEY** pkey)
  10178. {
  10179. WOLFSSL_EVP_PKEY* ret = NULL;
  10180. WOLFSSL_ENTER("wolfSSL_get_server_tmp_key");
  10181. if (ssl == NULL || pkey == NULL) {
  10182. WOLFSSL_MSG("Bad argument passed in");
  10183. return WOLFSSL_FAILURE;
  10184. }
  10185. #ifdef HAVE_ECC
  10186. if (ssl->peerEccKey != NULL) {
  10187. unsigned char* der;
  10188. const unsigned char* pt;
  10189. unsigned int derSz = 0;
  10190. int sz;
  10191. PRIVATE_KEY_UNLOCK();
  10192. if (wc_ecc_export_x963(ssl->peerEccKey, NULL, &derSz) !=
  10193. LENGTH_ONLY_E) {
  10194. WOLFSSL_MSG("get ecc der size failed");
  10195. PRIVATE_KEY_LOCK();
  10196. return WOLFSSL_FAILURE;
  10197. }
  10198. PRIVATE_KEY_LOCK();
  10199. derSz += MAX_SEQ_SZ + (2 * MAX_ALGO_SZ) + MAX_SEQ_SZ + TRAILING_ZERO;
  10200. der = (unsigned char*)XMALLOC(derSz, ssl->heap, DYNAMIC_TYPE_KEY);
  10201. if (der == NULL) {
  10202. WOLFSSL_MSG("Memory error");
  10203. return WOLFSSL_FAILURE;
  10204. }
  10205. if ((sz = wc_EccPublicKeyToDer(ssl->peerEccKey, der, derSz, 1)) <= 0) {
  10206. WOLFSSL_MSG("get ecc der failed");
  10207. XFREE(der, ssl->heap, DYNAMIC_TYPE_KEY);
  10208. return WOLFSSL_FAILURE;
  10209. }
  10210. pt = der; /* in case pointer gets advanced */
  10211. ret = wolfSSL_d2i_PUBKEY(NULL, &pt, sz);
  10212. XFREE(der, ssl->heap, DYNAMIC_TYPE_KEY);
  10213. }
  10214. #endif
  10215. *pkey = ret;
  10216. #ifdef HAVE_ECC
  10217. if (ret != NULL)
  10218. return WOLFSSL_SUCCESS;
  10219. else
  10220. #endif
  10221. return WOLFSSL_FAILURE;
  10222. }
  10223. #endif /* !NO_WOLFSSL_SERVER */
  10224. /**
  10225. * This function checks if any compiled in protocol versions are
  10226. * left enabled after calls to set_min or set_max API.
  10227. * @param major The SSL/TLS major version
  10228. * @return WOLFSSL_SUCCESS on valid settings and WOLFSSL_FAILURE when no
  10229. * protocol versions are left enabled.
  10230. */
  10231. static int CheckSslMethodVersion(byte major, unsigned long options)
  10232. {
  10233. int sanityConfirmed = 0;
  10234. (void)options;
  10235. switch (major) {
  10236. #ifndef NO_TLS
  10237. case SSLv3_MAJOR:
  10238. #ifdef WOLFSSL_ALLOW_SSLV3
  10239. if (!(options & WOLFSSL_OP_NO_SSLv3)) {
  10240. sanityConfirmed = 1;
  10241. }
  10242. #endif
  10243. #ifndef NO_OLD_TLS
  10244. if (!(options & WOLFSSL_OP_NO_TLSv1))
  10245. sanityConfirmed = 1;
  10246. if (!(options & WOLFSSL_OP_NO_TLSv1_1))
  10247. sanityConfirmed = 1;
  10248. #endif
  10249. #ifndef WOLFSSL_NO_TLS12
  10250. if (!(options & WOLFSSL_OP_NO_TLSv1_2))
  10251. sanityConfirmed = 1;
  10252. #endif
  10253. #ifdef WOLFSSL_TLS13
  10254. if (!(options & WOLFSSL_OP_NO_TLSv1_3))
  10255. sanityConfirmed = 1;
  10256. #endif
  10257. break;
  10258. #endif
  10259. #ifdef WOLFSSL_DTLS
  10260. case DTLS_MAJOR:
  10261. sanityConfirmed = 1;
  10262. break;
  10263. #endif
  10264. default:
  10265. WOLFSSL_MSG("Invalid major version");
  10266. return WOLFSSL_FAILURE;
  10267. }
  10268. if (!sanityConfirmed) {
  10269. WOLFSSL_MSG("All compiled in TLS versions disabled");
  10270. return WOLFSSL_FAILURE;
  10271. }
  10272. return WOLFSSL_SUCCESS;
  10273. }
  10274. /**
  10275. * protoVerTbl holds (D)TLS version numbers in ascending order.
  10276. * Except DTLS versions, the newer version is located in the latter part of
  10277. * the table. This table is referred by wolfSSL_CTX_set_min_proto_version and
  10278. * wolfSSL_CTX_set_max_proto_version.
  10279. */
  10280. static const int protoVerTbl[] = {
  10281. SSL3_VERSION,
  10282. TLS1_VERSION,
  10283. TLS1_1_VERSION,
  10284. TLS1_2_VERSION,
  10285. TLS1_3_VERSION,
  10286. DTLS1_VERSION,
  10287. DTLS1_2_VERSION
  10288. };
  10289. /* number of protocol versions listed in protoVerTbl */
  10290. #define NUMBER_OF_PROTOCOLS (sizeof(protoVerTbl)/sizeof(int))
  10291. /**
  10292. * wolfSSL_CTX_set_min_proto_version attempts to set the minimum protocol
  10293. * version to use by SSL objects created from this WOLFSSL_CTX.
  10294. * This API guarantees that a version of SSL/TLS lower than specified
  10295. * here will not be allowed. If the version specified is not compiled in
  10296. * then this API sets the lowest compiled in protocol version.
  10297. * This API also accept 0 as version, to set the minimum version automatically.
  10298. * CheckSslMethodVersion() is called to check if any remaining protocol versions
  10299. * are enabled.
  10300. * @param ctx The wolfSSL CONTEXT factory for spawning SSL/TLS objects
  10301. * @param version Any of the following
  10302. * * 0
  10303. * * SSL3_VERSION
  10304. * * TLS1_VERSION
  10305. * * TLS1_1_VERSION
  10306. * * TLS1_2_VERSION
  10307. * * TLS1_3_VERSION
  10308. * * DTLS1_VERSION
  10309. * * DTLS1_2_VERSION
  10310. * @return WOLFSSL_SUCCESS on valid settings and WOLFSSL_FAILURE when no
  10311. * protocol versions are left enabled.
  10312. */
  10313. static int Set_CTX_min_proto_version(WOLFSSL_CTX* ctx, int version)
  10314. {
  10315. WOLFSSL_ENTER("wolfSSL_CTX_set_min_proto_version_ex");
  10316. if (ctx == NULL) {
  10317. return WOLFSSL_FAILURE;
  10318. }
  10319. switch (version) {
  10320. #ifndef NO_TLS
  10321. case SSL3_VERSION:
  10322. #if defined(WOLFSSL_ALLOW_SSLV3) && !defined(NO_OLD_TLS)
  10323. ctx->minDowngrade = SSLv3_MINOR;
  10324. break;
  10325. #endif
  10326. case TLS1_VERSION:
  10327. #ifdef WOLFSSL_ALLOW_TLSV10
  10328. ctx->minDowngrade = TLSv1_MINOR;
  10329. break;
  10330. #endif
  10331. case TLS1_1_VERSION:
  10332. #ifndef NO_OLD_TLS
  10333. ctx->minDowngrade = TLSv1_1_MINOR;
  10334. break;
  10335. #endif
  10336. case TLS1_2_VERSION:
  10337. #ifndef WOLFSSL_NO_TLS12
  10338. ctx->minDowngrade = TLSv1_2_MINOR;
  10339. break;
  10340. #endif
  10341. case TLS1_3_VERSION:
  10342. #ifdef WOLFSSL_TLS13
  10343. ctx->minDowngrade = TLSv1_3_MINOR;
  10344. break;
  10345. #endif
  10346. #endif
  10347. #ifdef WOLFSSL_DTLS
  10348. case DTLS1_VERSION:
  10349. #ifndef NO_OLD_TLS
  10350. ctx->minDowngrade = DTLS_MINOR;
  10351. break;
  10352. #endif
  10353. case DTLS1_2_VERSION:
  10354. ctx->minDowngrade = DTLSv1_2_MINOR;
  10355. break;
  10356. #endif
  10357. default:
  10358. WOLFSSL_MSG("Unrecognized protocol version or not compiled in");
  10359. return WOLFSSL_FAILURE;
  10360. }
  10361. switch (version) {
  10362. #ifndef NO_TLS
  10363. case TLS1_3_VERSION:
  10364. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_TLSv1_2);
  10365. FALL_THROUGH;
  10366. case TLS1_2_VERSION:
  10367. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_TLSv1_1);
  10368. FALL_THROUGH;
  10369. case TLS1_1_VERSION:
  10370. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_TLSv1);
  10371. FALL_THROUGH;
  10372. case TLS1_VERSION:
  10373. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_SSLv3);
  10374. break;
  10375. case SSL3_VERSION:
  10376. case SSL2_VERSION:
  10377. /* Nothing to do here */
  10378. break;
  10379. #endif
  10380. #ifdef WOLFSSL_DTLS
  10381. case DTLS1_VERSION:
  10382. case DTLS1_2_VERSION:
  10383. break;
  10384. #endif
  10385. default:
  10386. WOLFSSL_MSG("Unrecognized protocol version or not compiled in");
  10387. return WOLFSSL_FAILURE;
  10388. }
  10389. return CheckSslMethodVersion(ctx->method->version.major, ctx->mask);
  10390. }
  10391. /* Sets the min protocol version allowed with WOLFSSL_CTX
  10392. * returns WOLFSSL_SUCCESS on success */
  10393. int wolfSSL_CTX_set_min_proto_version(WOLFSSL_CTX* ctx, int version)
  10394. {
  10395. int ret;
  10396. int proto = 0;
  10397. int maxProto = 0;
  10398. int i;
  10399. int idx = 0;
  10400. WOLFSSL_ENTER("wolfSSL_CTX_set_min_proto_version");
  10401. if (ctx == NULL) {
  10402. return WOLFSSL_FAILURE;
  10403. }
  10404. if (version != 0) {
  10405. proto = version;
  10406. ctx->minProto = 0; /* turn min proto flag off */
  10407. for (i = 0; (unsigned)i < NUMBER_OF_PROTOCOLS; i++) {
  10408. if (protoVerTbl[i] == version) {
  10409. break;
  10410. }
  10411. }
  10412. }
  10413. else {
  10414. /* when 0 is specified as version, try to find out the min version */
  10415. for (i = 0; (unsigned)i < NUMBER_OF_PROTOCOLS; i++) {
  10416. ret = Set_CTX_min_proto_version(ctx, protoVerTbl[i]);
  10417. if (ret == WOLFSSL_SUCCESS) {
  10418. proto = protoVerTbl[i];
  10419. ctx->minProto = 1; /* turn min proto flag on */
  10420. break;
  10421. }
  10422. }
  10423. }
  10424. /* check case where max > min , if so then clear the NO_* options
  10425. * i is the index into the table for proto version used, see if the max
  10426. * proto version index found is smaller */
  10427. maxProto = wolfSSL_CTX_get_max_proto_version(ctx);
  10428. for (idx = 0; (unsigned)idx < NUMBER_OF_PROTOCOLS; idx++) {
  10429. if (protoVerTbl[idx] == maxProto) {
  10430. break;
  10431. }
  10432. }
  10433. if (idx < i) {
  10434. wolfSSL_CTX_clear_options(ctx, WOLFSSL_OP_NO_TLSv1 |
  10435. WOLFSSL_OP_NO_TLSv1_1 | WOLFSSL_OP_NO_TLSv1_2 |
  10436. WOLFSSL_OP_NO_TLSv1_3);
  10437. }
  10438. ret = Set_CTX_min_proto_version(ctx, proto);
  10439. return ret;
  10440. }
  10441. /**
  10442. * wolfSSL_CTX_set_max_proto_version attempts to set the maximum protocol
  10443. * version to use by SSL objects created from this WOLFSSL_CTX.
  10444. * This API guarantees that a version of SSL/TLS higher than specified
  10445. * here will not be allowed. If the version specified is not compiled in
  10446. * then this API sets the highest compiled in protocol version.
  10447. * This API also accept 0 as version, to set the maximum version automatically.
  10448. * CheckSslMethodVersion() is called to check if any remaining protocol versions
  10449. * are enabled.
  10450. * @param ctx The wolfSSL CONTEXT factory for spawning SSL/TLS objects
  10451. * @param ver Any of the following
  10452. * * 0
  10453. * * SSL3_VERSION
  10454. * * TLS1_VERSION
  10455. * * TLS1_1_VERSION
  10456. * * TLS1_2_VERSION
  10457. * * TLS1_3_VERSION
  10458. * * DTLS1_VERSION
  10459. * * DTLS1_2_VERSION
  10460. * @return WOLFSSL_SUCCESS on valid settings and WOLFSSL_FAILURE when no
  10461. * protocol versions are left enabled.
  10462. */
  10463. static int Set_CTX_max_proto_version(WOLFSSL_CTX* ctx, int ver)
  10464. {
  10465. int ret;
  10466. WOLFSSL_ENTER("Set_CTX_max_proto_version");
  10467. if (!ctx || !ctx->method) {
  10468. WOLFSSL_MSG("Bad parameter");
  10469. return WOLFSSL_FAILURE;
  10470. }
  10471. switch (ver) {
  10472. case SSL2_VERSION:
  10473. WOLFSSL_MSG("wolfSSL does not support SSLv2");
  10474. return WOLFSSL_FAILURE;
  10475. #ifndef NO_TLS
  10476. case SSL3_VERSION:
  10477. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_TLSv1);
  10478. FALL_THROUGH;
  10479. case TLS1_VERSION:
  10480. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_TLSv1_1);
  10481. FALL_THROUGH;
  10482. case TLS1_1_VERSION:
  10483. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_TLSv1_2);
  10484. FALL_THROUGH;
  10485. case TLS1_2_VERSION:
  10486. wolfSSL_CTX_set_options(ctx, WOLFSSL_OP_NO_TLSv1_3);
  10487. FALL_THROUGH;
  10488. case TLS1_3_VERSION:
  10489. /* Nothing to do here */
  10490. break;
  10491. #endif
  10492. #ifdef WOLFSSL_DTLS
  10493. case DTLS1_VERSION:
  10494. case DTLS1_2_VERSION:
  10495. break;
  10496. #endif
  10497. default:
  10498. WOLFSSL_MSG("Unrecognized protocol version or not compiled in");
  10499. return WOLFSSL_FAILURE;
  10500. }
  10501. ret = CheckSslMethodVersion(ctx->method->version.major, ctx->mask);
  10502. if (ret == WOLFSSL_SUCCESS) {
  10503. /* Check the major */
  10504. switch (ver) {
  10505. #ifndef NO_TLS
  10506. case SSL3_VERSION:
  10507. case TLS1_VERSION:
  10508. case TLS1_1_VERSION:
  10509. case TLS1_2_VERSION:
  10510. case TLS1_3_VERSION:
  10511. if (ctx->method->version.major != SSLv3_MAJOR) {
  10512. WOLFSSL_MSG("Mismatched protocol version");
  10513. return WOLFSSL_FAILURE;
  10514. }
  10515. break;
  10516. #endif
  10517. #ifdef WOLFSSL_DTLS
  10518. case DTLS1_VERSION:
  10519. case DTLS1_2_VERSION:
  10520. if (ctx->method->version.major != DTLS_MAJOR) {
  10521. WOLFSSL_MSG("Mismatched protocol version");
  10522. return WOLFSSL_FAILURE;
  10523. }
  10524. break;
  10525. #endif
  10526. }
  10527. /* Update the method */
  10528. switch (ver) {
  10529. case SSL2_VERSION:
  10530. WOLFSSL_MSG("wolfSSL does not support SSLv2");
  10531. return WOLFSSL_FAILURE;
  10532. #ifndef NO_TLS
  10533. case SSL3_VERSION:
  10534. ctx->method->version.minor = SSLv3_MINOR;
  10535. break;
  10536. case TLS1_VERSION:
  10537. ctx->method->version.minor = TLSv1_MINOR;
  10538. break;
  10539. case TLS1_1_VERSION:
  10540. ctx->method->version.minor = TLSv1_1_MINOR;
  10541. break;
  10542. case TLS1_2_VERSION:
  10543. ctx->method->version.minor = TLSv1_2_MINOR;
  10544. break;
  10545. case TLS1_3_VERSION:
  10546. ctx->method->version.minor = TLSv1_3_MINOR;
  10547. break;
  10548. #endif
  10549. #ifdef WOLFSSL_DTLS
  10550. case DTLS1_VERSION:
  10551. ctx->method->version.minor = DTLS_MINOR;
  10552. break;
  10553. case DTLS1_2_VERSION:
  10554. ctx->method->version.minor = DTLSv1_2_MINOR;
  10555. break;
  10556. #endif
  10557. default:
  10558. WOLFSSL_MSG("Unrecognized protocol version or not compiled in");
  10559. return WOLFSSL_FAILURE;
  10560. }
  10561. }
  10562. return ret;
  10563. }
  10564. /* Sets the max protocol version allowed with WOLFSSL_CTX
  10565. * returns WOLFSSL_SUCCESS on success */
  10566. int wolfSSL_CTX_set_max_proto_version(WOLFSSL_CTX* ctx, int version)
  10567. {
  10568. int i;
  10569. int ret = WOLFSSL_FAILURE;
  10570. int minProto;
  10571. WOLFSSL_ENTER("wolfSSL_CTX_set_max_proto_version");
  10572. if (ctx == NULL) {
  10573. return ret;
  10574. }
  10575. /* clear out flags and reset min protocol version */
  10576. minProto = wolfSSL_CTX_get_min_proto_version(ctx);
  10577. wolfSSL_CTX_clear_options(ctx,
  10578. WOLFSSL_OP_NO_TLSv1 | WOLFSSL_OP_NO_TLSv1_1 |
  10579. WOLFSSL_OP_NO_TLSv1_2 | WOLFSSL_OP_NO_TLSv1_3);
  10580. wolfSSL_CTX_set_min_proto_version(ctx, minProto);
  10581. if (version != 0) {
  10582. ctx->maxProto = 0; /* turn max proto flag off */
  10583. return Set_CTX_max_proto_version(ctx, version);
  10584. }
  10585. /* when 0 is specified as version, try to find out the min version from
  10586. * the bottom to top of the protoverTbl.
  10587. */
  10588. for (i = NUMBER_OF_PROTOCOLS -1; i >= 0; i--) {
  10589. ret = Set_CTX_max_proto_version(ctx, protoVerTbl[i]);
  10590. if (ret == WOLFSSL_SUCCESS) {
  10591. ctx->maxProto = 1; /* turn max proto flag on */
  10592. break;
  10593. }
  10594. }
  10595. return ret;
  10596. }
  10597. static int Set_SSL_min_proto_version(WOLFSSL* ssl, int ver)
  10598. {
  10599. WOLFSSL_ENTER("Set_SSL_min_proto_version");
  10600. if (ssl == NULL) {
  10601. return WOLFSSL_FAILURE;
  10602. }
  10603. switch (ver) {
  10604. #ifndef NO_TLS
  10605. case SSL3_VERSION:
  10606. #if defined(WOLFSSL_ALLOW_SSLV3) && !defined(NO_OLD_TLS)
  10607. ssl->options.minDowngrade = SSLv3_MINOR;
  10608. break;
  10609. #endif
  10610. case TLS1_VERSION:
  10611. #ifdef WOLFSSL_ALLOW_TLSV10
  10612. ssl->options.minDowngrade = TLSv1_MINOR;
  10613. break;
  10614. #endif
  10615. case TLS1_1_VERSION:
  10616. #ifndef NO_OLD_TLS
  10617. ssl->options.minDowngrade = TLSv1_1_MINOR;
  10618. break;
  10619. #endif
  10620. case TLS1_2_VERSION:
  10621. #ifndef WOLFSSL_NO_TLS12
  10622. ssl->options.minDowngrade = TLSv1_2_MINOR;
  10623. break;
  10624. #endif
  10625. case TLS1_3_VERSION:
  10626. #ifdef WOLFSSL_TLS13
  10627. ssl->options.minDowngrade = TLSv1_3_MINOR;
  10628. break;
  10629. #endif
  10630. #endif
  10631. #ifdef WOLFSSL_DTLS
  10632. case DTLS1_VERSION:
  10633. #ifndef NO_OLD_TLS
  10634. ssl->options.minDowngrade = DTLS_MINOR;
  10635. break;
  10636. #endif
  10637. case DTLS1_2_VERSION:
  10638. ssl->options.minDowngrade = DTLSv1_2_MINOR;
  10639. break;
  10640. #endif
  10641. default:
  10642. WOLFSSL_MSG("Unrecognized protocol version or not compiled in");
  10643. return WOLFSSL_FAILURE;
  10644. }
  10645. switch (ver) {
  10646. #ifndef NO_TLS
  10647. case TLS1_3_VERSION:
  10648. ssl->options.mask |= WOLFSSL_OP_NO_TLSv1_2;
  10649. FALL_THROUGH;
  10650. case TLS1_2_VERSION:
  10651. ssl->options.mask |= WOLFSSL_OP_NO_TLSv1_1;
  10652. FALL_THROUGH;
  10653. case TLS1_1_VERSION:
  10654. ssl->options.mask |= WOLFSSL_OP_NO_TLSv1;
  10655. FALL_THROUGH;
  10656. case TLS1_VERSION:
  10657. ssl->options.mask |= WOLFSSL_OP_NO_SSLv3;
  10658. break;
  10659. case SSL3_VERSION:
  10660. case SSL2_VERSION:
  10661. /* Nothing to do here */
  10662. break;
  10663. #endif
  10664. #ifdef WOLFSSL_DTLS
  10665. case DTLS1_VERSION:
  10666. case DTLS1_2_VERSION:
  10667. break;
  10668. #endif
  10669. default:
  10670. WOLFSSL_MSG("Unrecognized protocol version or not compiled in");
  10671. return WOLFSSL_FAILURE;
  10672. }
  10673. return CheckSslMethodVersion(ssl->version.major, ssl->options.mask);
  10674. }
  10675. int wolfSSL_set_min_proto_version(WOLFSSL* ssl, int version)
  10676. {
  10677. int i;
  10678. int ret = WOLFSSL_FAILURE;;
  10679. WOLFSSL_ENTER("wolfSSL_set_min_proto_version");
  10680. if (ssl == NULL) {
  10681. return WOLFSSL_FAILURE;
  10682. }
  10683. if (version != 0) {
  10684. return Set_SSL_min_proto_version(ssl, version);
  10685. }
  10686. /* when 0 is specified as version, try to find out the min version */
  10687. for (i= 0; (unsigned)i < NUMBER_OF_PROTOCOLS; i++) {
  10688. ret = Set_SSL_min_proto_version(ssl, protoVerTbl[i]);
  10689. if (ret == WOLFSSL_SUCCESS)
  10690. break;
  10691. }
  10692. return ret;
  10693. }
  10694. static int Set_SSL_max_proto_version(WOLFSSL* ssl, int ver)
  10695. {
  10696. WOLFSSL_ENTER("Set_SSL_max_proto_version");
  10697. if (!ssl) {
  10698. WOLFSSL_MSG("Bad parameter");
  10699. return WOLFSSL_FAILURE;
  10700. }
  10701. switch (ver) {
  10702. case SSL2_VERSION:
  10703. WOLFSSL_MSG("wolfSSL does not support SSLv2");
  10704. return WOLFSSL_FAILURE;
  10705. #ifndef NO_TLS
  10706. case SSL3_VERSION:
  10707. ssl->options.mask |= WOLFSSL_OP_NO_TLSv1;
  10708. FALL_THROUGH;
  10709. case TLS1_VERSION:
  10710. ssl->options.mask |= WOLFSSL_OP_NO_TLSv1_1;
  10711. FALL_THROUGH;
  10712. case TLS1_1_VERSION:
  10713. ssl->options.mask |= WOLFSSL_OP_NO_TLSv1_2;
  10714. FALL_THROUGH;
  10715. case TLS1_2_VERSION:
  10716. ssl->options.mask |= WOLFSSL_OP_NO_TLSv1_3;
  10717. FALL_THROUGH;
  10718. case TLS1_3_VERSION:
  10719. /* Nothing to do here */
  10720. break;
  10721. #endif
  10722. #ifdef WOLFSSL_DTLS
  10723. case DTLS1_VERSION:
  10724. case DTLS1_2_VERSION:
  10725. break;
  10726. #endif
  10727. default:
  10728. WOLFSSL_MSG("Unrecognized protocol version or not compiled in");
  10729. return WOLFSSL_FAILURE;
  10730. }
  10731. return CheckSslMethodVersion(ssl->version.major, ssl->options.mask);
  10732. }
  10733. int wolfSSL_set_max_proto_version(WOLFSSL* ssl, int version)
  10734. {
  10735. int i;
  10736. int ret = WOLFSSL_FAILURE;;
  10737. WOLFSSL_ENTER("wolfSSL_set_max_proto_version");
  10738. if (ssl == NULL) {
  10739. return WOLFSSL_FAILURE;
  10740. }
  10741. if (version != 0) {
  10742. return Set_SSL_max_proto_version(ssl, version);
  10743. }
  10744. /* when 0 is specified as version, try to find out the min version from
  10745. * the bottom to top of the protoverTbl.
  10746. */
  10747. for (i = NUMBER_OF_PROTOCOLS -1; i >= 0; i--) {
  10748. ret = Set_SSL_max_proto_version(ssl, protoVerTbl[i]);
  10749. if (ret == WOLFSSL_SUCCESS)
  10750. break;
  10751. }
  10752. return ret;
  10753. }
  10754. static int GetMinProtoVersion(int minDowngrade)
  10755. {
  10756. int ret;
  10757. switch (minDowngrade) {
  10758. #ifndef NO_OLD_TLS
  10759. #ifdef WOLFSSL_ALLOW_SSLV3
  10760. case SSLv3_MINOR:
  10761. ret = SSL3_VERSION;
  10762. break;
  10763. #endif
  10764. #ifdef WOLFSSL_ALLOW_TLSV10
  10765. case TLSv1_MINOR:
  10766. ret = TLS1_VERSION;
  10767. break;
  10768. #endif
  10769. case TLSv1_1_MINOR:
  10770. ret = TLS1_1_VERSION;
  10771. break;
  10772. #endif
  10773. #ifndef WOLFSSL_NO_TLS12
  10774. case TLSv1_2_MINOR:
  10775. ret = TLS1_2_VERSION;
  10776. break;
  10777. #endif
  10778. #ifdef WOLFSSL_TLS13
  10779. case TLSv1_3_MINOR:
  10780. ret = TLS1_3_VERSION;
  10781. break;
  10782. #endif
  10783. default:
  10784. ret = 0;
  10785. break;
  10786. }
  10787. return ret;
  10788. }
  10789. int wolfSSL_CTX_get_min_proto_version(WOLFSSL_CTX* ctx)
  10790. {
  10791. int ret = 0;
  10792. WOLFSSL_ENTER("wolfSSL_CTX_get_min_proto_version");
  10793. if (ctx != NULL) {
  10794. if (ctx->minProto) {
  10795. ret = 0;
  10796. }
  10797. else {
  10798. ret = GetMinProtoVersion(ctx->minDowngrade);
  10799. }
  10800. }
  10801. else {
  10802. ret = GetMinProtoVersion(WOLFSSL_MIN_DOWNGRADE);
  10803. }
  10804. WOLFSSL_LEAVE("wolfSSL_CTX_get_min_proto_version", ret);
  10805. return ret;
  10806. }
  10807. /* returns the maximum allowed protocol version given the 'options' used
  10808. * returns WOLFSSL_FATAL_ERROR on no match */
  10809. static int GetMaxProtoVersion(long options)
  10810. {
  10811. #ifndef NO_TLS
  10812. #ifdef WOLFSSL_TLS13
  10813. if (!(options & WOLFSSL_OP_NO_TLSv1_3))
  10814. return TLS1_3_VERSION;
  10815. #endif
  10816. #ifndef WOLFSSL_NO_TLS12
  10817. if (!(options & WOLFSSL_OP_NO_TLSv1_2))
  10818. return TLS1_2_VERSION;
  10819. #endif
  10820. #ifndef NO_OLD_TLS
  10821. if (!(options & WOLFSSL_OP_NO_TLSv1_1))
  10822. return TLS1_1_VERSION;
  10823. #ifdef WOLFSSL_ALLOW_TLSV10
  10824. if (!(options & WOLFSSL_OP_NO_TLSv1))
  10825. return TLS1_VERSION;
  10826. #endif
  10827. #ifdef WOLFSSL_ALLOW_SSLV3
  10828. if (!(options & WOLFSSL_OP_NO_SSLv3))
  10829. return SSL3_VERSION;
  10830. #endif
  10831. #endif
  10832. #else
  10833. (void)options;
  10834. #endif /* NO_TLS */
  10835. return WOLFSSL_FATAL_ERROR;
  10836. }
  10837. /* returns the maximum protocol version for 'ctx' */
  10838. int wolfSSL_CTX_get_max_proto_version(WOLFSSL_CTX* ctx)
  10839. {
  10840. int ret = 0;
  10841. long options = 0; /* default to nothing set */
  10842. WOLFSSL_ENTER("wolfSSL_CTX_get_max_proto_version");
  10843. if (ctx != NULL) {
  10844. options = wolfSSL_CTX_get_options(ctx);
  10845. }
  10846. if ((ctx != NULL) && ctx->maxProto) {
  10847. ret = 0;
  10848. }
  10849. else {
  10850. ret = GetMaxProtoVersion(options);
  10851. }
  10852. WOLFSSL_LEAVE("wolfSSL_CTX_get_max_proto_version", ret);
  10853. if (ret == WOLFSSL_FATAL_ERROR) {
  10854. WOLFSSL_MSG("Error getting max proto version");
  10855. ret = 0; /* setting ret to 0 to match compat return */
  10856. }
  10857. return ret;
  10858. }
  10859. #endif /* OPENSSL_EXTRA */
  10860. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  10861. defined(HAVE_SECRET_CALLBACK)
  10862. #if !defined(NO_WOLFSSL_CLIENT)
  10863. /* Return the amount of random bytes copied over or error case.
  10864. * ssl : ssl struct after handshake
  10865. * out : buffer to hold random bytes
  10866. * outSz : either 0 (return max buffer sz) or size of out buffer
  10867. */
  10868. size_t wolfSSL_get_client_random(const WOLFSSL* ssl, unsigned char* out,
  10869. size_t outSz)
  10870. {
  10871. size_t size;
  10872. /* return max size of buffer */
  10873. if (outSz == 0) {
  10874. return RAN_LEN;
  10875. }
  10876. if (ssl == NULL || out == NULL) {
  10877. return 0;
  10878. }
  10879. if (ssl->arrays == NULL) {
  10880. WOLFSSL_MSG("Arrays struct not saved after handshake");
  10881. return 0;
  10882. }
  10883. if (outSz > RAN_LEN) {
  10884. size = RAN_LEN;
  10885. }
  10886. else {
  10887. size = outSz;
  10888. }
  10889. XMEMCPY(out, ssl->arrays->clientRandom, size);
  10890. return size;
  10891. }
  10892. #endif /* !NO_WOLFSSL_CLIENT */
  10893. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || HAVE_SECRET_CALLBACK */
  10894. #ifdef OPENSSL_EXTRA
  10895. unsigned long wolfSSLeay(void)
  10896. {
  10897. return SSLEAY_VERSION_NUMBER;
  10898. }
  10899. unsigned long wolfSSL_OpenSSL_version_num(void)
  10900. {
  10901. return OPENSSL_VERSION_NUMBER;
  10902. }
  10903. const char* wolfSSLeay_version(int type)
  10904. {
  10905. (void)type;
  10906. #if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
  10907. return wolfSSL_OpenSSL_version(type);
  10908. #else
  10909. return wolfSSL_OpenSSL_version();
  10910. #endif
  10911. }
  10912. #endif /* OPENSSL_EXTRA */
  10913. #ifdef OPENSSL_EXTRA
  10914. void wolfSSL_ERR_free_strings(void)
  10915. {
  10916. /* handled internally */
  10917. }
  10918. void wolfSSL_cleanup_all_ex_data(void)
  10919. {
  10920. /* nothing to do here */
  10921. }
  10922. #endif /* OPENSSL_EXTRA */
  10923. #if defined(OPENSSL_EXTRA) || defined(DEBUG_WOLFSSL_VERBOSE) || \
  10924. defined(HAVE_CURL)
  10925. void wolfSSL_ERR_clear_error(void)
  10926. {
  10927. WOLFSSL_ENTER("wolfSSL_ERR_clear_error");
  10928. #if defined(OPENSSL_EXTRA) || defined(DEBUG_WOLFSSL_VERBOSE)
  10929. wc_ClearErrorNodes();
  10930. #endif
  10931. }
  10932. #endif
  10933. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  10934. int wolfSSL_clear(WOLFSSL* ssl)
  10935. {
  10936. WOLFSSL_ENTER("wolfSSL_clear");
  10937. if (ssl == NULL) {
  10938. return WOLFSSL_FAILURE;
  10939. }
  10940. if (!ssl->options.handShakeDone) {
  10941. /* Only reset the session if we didn't complete a handshake */
  10942. wolfSSL_FreeSession(ssl->ctx, ssl->session);
  10943. ssl->session = wolfSSL_NewSession(ssl->heap);
  10944. if (ssl->session == NULL) {
  10945. return WOLFSSL_FAILURE;
  10946. }
  10947. }
  10948. /* reset error */
  10949. ssl->error = 0;
  10950. /* reset option bits */
  10951. ssl->options.isClosed = 0;
  10952. ssl->options.connReset = 0;
  10953. ssl->options.sentNotify = 0;
  10954. ssl->options.closeNotify = 0;
  10955. ssl->options.sendVerify = 0;
  10956. ssl->options.serverState = NULL_STATE;
  10957. ssl->options.clientState = NULL_STATE;
  10958. ssl->options.connectState = CONNECT_BEGIN;
  10959. ssl->options.acceptState = ACCEPT_BEGIN;
  10960. ssl->options.handShakeState = NULL_STATE;
  10961. ssl->options.handShakeDone = 0;
  10962. ssl->options.processReply = 0; /* doProcessInit */
  10963. ssl->options.havePeerVerify = 0;
  10964. ssl->options.havePeerCert = 0;
  10965. ssl->options.peerAuthGood = 0;
  10966. ssl->options.tls1_3 = 0;
  10967. ssl->options.haveSessionId = 0;
  10968. ssl->options.tls = 0;
  10969. ssl->options.tls1_1 = 0;
  10970. #ifdef WOLFSSL_DTLS
  10971. ssl->options.dtlsStateful = 0;
  10972. #endif
  10973. #if defined(HAVE_SESSION_TICKET) || !defined(NO_PSK)
  10974. ssl->options.noPskDheKe = 0;
  10975. #ifdef HAVE_SUPPORTED_CURVES
  10976. ssl->options.onlyPskDheKe = 0;
  10977. #endif
  10978. #endif
  10979. #ifdef HAVE_SESSION_TICKET
  10980. #ifdef WOLFSSL_TLS13
  10981. ssl->options.ticketsSent = 0;
  10982. #endif
  10983. ssl->options.rejectTicket = 0;
  10984. #endif
  10985. #ifdef WOLFSSL_EARLY_DATA
  10986. ssl->earlyData = no_early_data;
  10987. ssl->earlyDataSz = 0;
  10988. #endif
  10989. #if defined(HAVE_TLS_EXTENSIONS) && !defined(NO_TLS)
  10990. TLSX_FreeAll(ssl->extensions, ssl->heap);
  10991. ssl->extensions = NULL;
  10992. #endif
  10993. if (ssl->keys.encryptionOn) {
  10994. ForceZero(ssl->buffers.inputBuffer.buffer -
  10995. ssl->buffers.inputBuffer.offset,
  10996. ssl->buffers.inputBuffer.bufferSize);
  10997. #ifdef WOLFSSL_CHECK_MEM_ZERO
  10998. wc_MemZero_Check(ssl->buffers.inputBuffer.buffer -
  10999. ssl->buffers.inputBuffer.offset,
  11000. ssl->buffers.inputBuffer.bufferSize);
  11001. #endif
  11002. }
  11003. ssl->keys.encryptionOn = 0;
  11004. XMEMSET(&ssl->msgsReceived, 0, sizeof(ssl->msgsReceived));
  11005. if (InitSSL_Suites(ssl) != WOLFSSL_SUCCESS)
  11006. return WOLFSSL_FAILURE;
  11007. if (InitHandshakeHashes(ssl) != 0)
  11008. return WOLFSSL_FAILURE;
  11009. #ifdef KEEP_PEER_CERT
  11010. FreeX509(&ssl->peerCert);
  11011. InitX509(&ssl->peerCert, 0, ssl->heap);
  11012. #endif
  11013. #ifdef WOLFSSL_QUIC
  11014. wolfSSL_quic_clear(ssl);
  11015. #endif
  11016. return WOLFSSL_SUCCESS;
  11017. }
  11018. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  11019. #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) || defined(HAVE_MEMCACHED)
  11020. long wolfSSL_CTX_set_mode(WOLFSSL_CTX* ctx, long mode)
  11021. {
  11022. /* WOLFSSL_MODE_ACCEPT_MOVING_WRITE_BUFFER is wolfSSL default mode */
  11023. WOLFSSL_ENTER("wolfSSL_CTX_set_mode");
  11024. switch(mode) {
  11025. case SSL_MODE_ENABLE_PARTIAL_WRITE:
  11026. ctx->partialWrite = 1;
  11027. break;
  11028. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  11029. case SSL_MODE_RELEASE_BUFFERS:
  11030. WOLFSSL_MSG("SSL_MODE_RELEASE_BUFFERS not implemented.");
  11031. break;
  11032. #endif
  11033. case SSL_MODE_AUTO_RETRY:
  11034. ctx->autoRetry = 1;
  11035. break;
  11036. default:
  11037. WOLFSSL_MSG("Mode Not Implemented");
  11038. }
  11039. /* SSL_MODE_AUTO_RETRY
  11040. * Should not return -1 with renegotiation on read/write */
  11041. return mode;
  11042. }
  11043. long wolfSSL_CTX_clear_mode(WOLFSSL_CTX* ctx, long mode)
  11044. {
  11045. /* WOLFSSL_MODE_ACCEPT_MOVING_WRITE_BUFFER is wolfSSL default mode */
  11046. WOLFSSL_ENTER("wolfSSL_CTX_clear_mode");
  11047. switch(mode) {
  11048. case SSL_MODE_ENABLE_PARTIAL_WRITE:
  11049. ctx->partialWrite = 0;
  11050. break;
  11051. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  11052. case SSL_MODE_RELEASE_BUFFERS:
  11053. WOLFSSL_MSG("SSL_MODE_RELEASE_BUFFERS not implemented.");
  11054. break;
  11055. #endif
  11056. case SSL_MODE_AUTO_RETRY:
  11057. ctx->autoRetry = 0;
  11058. break;
  11059. default:
  11060. WOLFSSL_MSG("Mode Not Implemented");
  11061. }
  11062. /* SSL_MODE_AUTO_RETRY
  11063. * Should not return -1 with renegotiation on read/write */
  11064. return 0;
  11065. }
  11066. #endif
  11067. #ifdef OPENSSL_EXTRA
  11068. #ifndef NO_WOLFSSL_STUB
  11069. long wolfSSL_SSL_get_mode(WOLFSSL* ssl)
  11070. {
  11071. /* TODO: */
  11072. (void)ssl;
  11073. WOLFSSL_STUB("SSL_get_mode");
  11074. return 0;
  11075. }
  11076. #endif
  11077. #ifndef NO_WOLFSSL_STUB
  11078. long wolfSSL_CTX_get_mode(WOLFSSL_CTX* ctx)
  11079. {
  11080. /* TODO: */
  11081. (void)ctx;
  11082. WOLFSSL_STUB("SSL_CTX_get_mode");
  11083. return 0;
  11084. }
  11085. #endif
  11086. #ifndef NO_WOLFSSL_STUB
  11087. void wolfSSL_CTX_set_default_read_ahead(WOLFSSL_CTX* ctx, int m)
  11088. {
  11089. /* TODO: maybe? */
  11090. (void)ctx;
  11091. (void)m;
  11092. WOLFSSL_STUB("SSL_CTX_set_default_read_ahead");
  11093. }
  11094. #endif
  11095. /* returns the unsigned error value and increments the pointer into the
  11096. * error queue.
  11097. *
  11098. * file pointer to file name
  11099. * line gets set to line number of error when not NULL
  11100. */
  11101. unsigned long wolfSSL_ERR_get_error_line(const char** file, int* line)
  11102. {
  11103. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  11104. int ret = wc_PullErrorNode(file, NULL, line);
  11105. if (ret < 0) {
  11106. if (ret == BAD_STATE_E) return 0; /* no errors in queue */
  11107. WOLFSSL_MSG("Issue getting error node");
  11108. WOLFSSL_LEAVE("wolfSSL_ERR_get_error_line", ret);
  11109. ret = 0 - ret; /* return absolute value of error */
  11110. /* panic and try to clear out nodes */
  11111. wc_ClearErrorNodes();
  11112. }
  11113. return (unsigned long)ret;
  11114. #else
  11115. (void)file;
  11116. (void)line;
  11117. return 0;
  11118. #endif
  11119. }
  11120. #if (defined(DEBUG_WOLFSSL) || defined(OPENSSL_EXTRA)) && \
  11121. (!defined(_WIN32) && !defined(NO_ERROR_QUEUE))
  11122. static const char WOLFSSL_SYS_ACCEPT_T[] = "accept";
  11123. static const char WOLFSSL_SYS_BIND_T[] = "bind";
  11124. static const char WOLFSSL_SYS_CONNECT_T[] = "connect";
  11125. static const char WOLFSSL_SYS_FOPEN_T[] = "fopen";
  11126. static const char WOLFSSL_SYS_FREAD_T[] = "fread";
  11127. static const char WOLFSSL_SYS_GETADDRINFO_T[] = "getaddrinfo";
  11128. static const char WOLFSSL_SYS_GETSOCKOPT_T[] = "getsockopt";
  11129. static const char WOLFSSL_SYS_GETSOCKNAME_T[] = "getsockname";
  11130. static const char WOLFSSL_SYS_GETHOSTBYNAME_T[] = "gethostbyname";
  11131. static const char WOLFSSL_SYS_GETNAMEINFO_T[] = "getnameinfo";
  11132. static const char WOLFSSL_SYS_GETSERVBYNAME_T[] = "getservbyname";
  11133. static const char WOLFSSL_SYS_IOCTLSOCKET_T[] = "ioctlsocket";
  11134. static const char WOLFSSL_SYS_LISTEN_T[] = "listen";
  11135. static const char WOLFSSL_SYS_OPENDIR_T[] = "opendir";
  11136. static const char WOLFSSL_SYS_SETSOCKOPT_T[] = "setsockopt";
  11137. static const char WOLFSSL_SYS_SOCKET_T[] = "socket";
  11138. /* switch with int mapped to function name for compatibility */
  11139. static const char* wolfSSL_ERR_sys_func(int fun)
  11140. {
  11141. switch (fun) {
  11142. case WOLFSSL_SYS_ACCEPT: return WOLFSSL_SYS_ACCEPT_T;
  11143. case WOLFSSL_SYS_BIND: return WOLFSSL_SYS_BIND_T;
  11144. case WOLFSSL_SYS_CONNECT: return WOLFSSL_SYS_CONNECT_T;
  11145. case WOLFSSL_SYS_FOPEN: return WOLFSSL_SYS_FOPEN_T;
  11146. case WOLFSSL_SYS_FREAD: return WOLFSSL_SYS_FREAD_T;
  11147. case WOLFSSL_SYS_GETADDRINFO: return WOLFSSL_SYS_GETADDRINFO_T;
  11148. case WOLFSSL_SYS_GETSOCKOPT: return WOLFSSL_SYS_GETSOCKOPT_T;
  11149. case WOLFSSL_SYS_GETSOCKNAME: return WOLFSSL_SYS_GETSOCKNAME_T;
  11150. case WOLFSSL_SYS_GETHOSTBYNAME: return WOLFSSL_SYS_GETHOSTBYNAME_T;
  11151. case WOLFSSL_SYS_GETNAMEINFO: return WOLFSSL_SYS_GETNAMEINFO_T;
  11152. case WOLFSSL_SYS_GETSERVBYNAME: return WOLFSSL_SYS_GETSERVBYNAME_T;
  11153. case WOLFSSL_SYS_IOCTLSOCKET: return WOLFSSL_SYS_IOCTLSOCKET_T;
  11154. case WOLFSSL_SYS_LISTEN: return WOLFSSL_SYS_LISTEN_T;
  11155. case WOLFSSL_SYS_OPENDIR: return WOLFSSL_SYS_OPENDIR_T;
  11156. case WOLFSSL_SYS_SETSOCKOPT: return WOLFSSL_SYS_SETSOCKOPT_T;
  11157. case WOLFSSL_SYS_SOCKET: return WOLFSSL_SYS_SOCKET_T;
  11158. default:
  11159. return "NULL";
  11160. }
  11161. }
  11162. #endif /* DEBUG_WOLFSSL */
  11163. void wolfSSL_ERR_put_error(int lib, int fun, int err, const char* file,
  11164. int line)
  11165. {
  11166. WOLFSSL_ENTER("wolfSSL_ERR_put_error");
  11167. #if !defined(DEBUG_WOLFSSL) && !defined(OPENSSL_EXTRA)
  11168. (void)fun;
  11169. (void)err;
  11170. (void)file;
  11171. (void)line;
  11172. WOLFSSL_MSG("Not compiled in debug mode");
  11173. #elif defined(OPENSSL_EXTRA) && \
  11174. (defined(_WIN32) || defined(NO_ERROR_QUEUE))
  11175. (void)fun;
  11176. (void)file;
  11177. (void)line;
  11178. WOLFSSL_ERROR(err);
  11179. #else
  11180. WOLFSSL_ERROR_LINE(err, wolfSSL_ERR_sys_func(fun), (unsigned int)line,
  11181. file, NULL);
  11182. #endif
  11183. (void)lib;
  11184. }
  11185. /* Similar to wolfSSL_ERR_get_error_line but takes in a flags argument for
  11186. * more flexibility.
  11187. *
  11188. * file output pointer to file where error happened
  11189. * line output to line number of error
  11190. * data output data. Is a string if ERR_TXT_STRING flag is used
  11191. * flags output format of output
  11192. *
  11193. * Returns the error value or 0 if no errors are in the queue
  11194. */
  11195. unsigned long wolfSSL_ERR_get_error_line_data(const char** file, int* line,
  11196. const char** data, int *flags)
  11197. {
  11198. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  11199. int ret;
  11200. WOLFSSL_ENTER("wolfSSL_ERR_get_error_line_data");
  11201. if (flags != NULL)
  11202. *flags = ERR_TXT_STRING; /* Clear the flags */
  11203. ret = wc_PullErrorNode(file, data, line);
  11204. if (ret < 0) {
  11205. if (ret == BAD_STATE_E) return 0; /* no errors in queue */
  11206. WOLFSSL_MSG("Error with pulling error node!");
  11207. WOLFSSL_LEAVE("wolfSSL_ERR_get_error_line_data", ret);
  11208. ret = 0 - ret; /* return absolute value of error */
  11209. /* panic and try to clear out nodes */
  11210. wc_ClearErrorNodes();
  11211. }
  11212. return (unsigned long)ret;
  11213. #else
  11214. WOLFSSL_ENTER("wolfSSL_ERR_get_error_line_data");
  11215. WOLFSSL_MSG("Error queue turned off, can not get error line");
  11216. (void)file;
  11217. (void)line;
  11218. (void)data;
  11219. (void)flags;
  11220. return 0;
  11221. #endif
  11222. }
  11223. #endif /* OPENSSL_EXTRA */
  11224. #if (defined(KEEP_PEER_CERT) && defined(SESSION_CERTS)) || \
  11225. (defined(OPENSSL_EXTRA) && defined(SESSION_CERTS))
  11226. /* Decode the X509 DER encoded certificate into a WOLFSSL_X509 object.
  11227. *
  11228. * x509 WOLFSSL_X509 object to decode into.
  11229. * in X509 DER data.
  11230. * len Length of the X509 DER data.
  11231. * returns the new certificate on success, otherwise NULL.
  11232. */
  11233. static int DecodeToX509(WOLFSSL_X509* x509, const byte* in, int len)
  11234. {
  11235. int ret;
  11236. #ifdef WOLFSSL_SMALL_STACK
  11237. DecodedCert* cert;
  11238. #else
  11239. DecodedCert cert[1];
  11240. #endif
  11241. if (x509 == NULL || in == NULL || len <= 0)
  11242. return BAD_FUNC_ARG;
  11243. #ifdef WOLFSSL_SMALL_STACK
  11244. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  11245. DYNAMIC_TYPE_DCERT);
  11246. if (cert == NULL)
  11247. return MEMORY_E;
  11248. #endif
  11249. /* Create a DecodedCert object and copy fields into WOLFSSL_X509 object.
  11250. */
  11251. InitDecodedCert(cert, (byte*)in, len, NULL);
  11252. if ((ret = ParseCertRelative(cert, CERT_TYPE, 0, NULL)) == 0) {
  11253. /* Check if x509 was not previously initialized by wolfSSL_X509_new() */
  11254. if (x509->dynamicMemory != TRUE)
  11255. InitX509(x509, 0, NULL);
  11256. ret = CopyDecodedToX509(x509, cert);
  11257. }
  11258. FreeDecodedCert(cert);
  11259. #ifdef WOLFSSL_SMALL_STACK
  11260. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  11261. #endif
  11262. return ret;
  11263. }
  11264. #endif /* (KEEP_PEER_CERT & SESSION_CERTS) || (OPENSSL_EXTRA & SESSION_CERTS) */
  11265. #ifdef KEEP_PEER_CERT
  11266. WOLFSSL_ABI
  11267. WOLFSSL_X509* wolfSSL_get_peer_certificate(WOLFSSL* ssl)
  11268. {
  11269. WOLFSSL_X509* ret = NULL;
  11270. WOLFSSL_ENTER("wolfSSL_get_peer_certificate");
  11271. if (ssl != NULL) {
  11272. if (ssl->peerCert.issuer.sz)
  11273. ret = wolfSSL_X509_dup(&ssl->peerCert);
  11274. #ifdef SESSION_CERTS
  11275. else if (ssl->session->chain.count > 0) {
  11276. if (DecodeToX509(&ssl->peerCert,
  11277. ssl->session->chain.certs[0].buffer,
  11278. ssl->session->chain.certs[0].length) == 0) {
  11279. ret = wolfSSL_X509_dup(&ssl->peerCert);
  11280. }
  11281. }
  11282. #endif
  11283. }
  11284. WOLFSSL_LEAVE("wolfSSL_get_peer_certificate", ret != NULL);
  11285. return ret;
  11286. }
  11287. #endif /* KEEP_PEER_CERT */
  11288. #if defined(SESSION_CERTS) && defined(OPENSSL_EXTRA)
  11289. /* Return stack of peer certs.
  11290. * Caller does not need to free return. The stack is Free'd when WOLFSSL* ssl
  11291. * is.
  11292. */
  11293. WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_get_peer_cert_chain(const WOLFSSL* ssl)
  11294. {
  11295. WOLFSSL_ENTER("wolfSSL_get_peer_cert_chain");
  11296. if (ssl == NULL)
  11297. return NULL;
  11298. /* Try to populate if NULL or empty */
  11299. if (ssl->peerCertChain == NULL ||
  11300. wolfSSL_sk_X509_num(ssl->peerCertChain) == 0)
  11301. wolfSSL_set_peer_cert_chain((WOLFSSL*) ssl);
  11302. return ssl->peerCertChain;
  11303. }
  11304. #ifndef WOLFSSL_QT
  11305. static int x509GetIssuerFromCM(WOLFSSL_X509 **issuer, WOLFSSL_CERT_MANAGER* cm,
  11306. WOLFSSL_X509 *x);
  11307. /**
  11308. * Recursively push the issuer CA chain onto the stack
  11309. * @param cm The cert manager that is queried for the issuer
  11310. * @param x This cert's issuer will be queried in cm
  11311. * @param sk The issuer is pushed onto this stack
  11312. * @return WOLFSSL_SUCCESS on success
  11313. * WOLFSSL_FAILURE on no issuer found
  11314. * WOLFSSL_FATAL_ERROR on a fatal error
  11315. */
  11316. static int PushCAx509Chain(WOLFSSL_CERT_MANAGER* cm,
  11317. WOLFSSL_X509 *x, WOLFSSL_STACK* sk)
  11318. {
  11319. WOLFSSL_X509* issuer[MAX_CHAIN_DEPTH];
  11320. int i;
  11321. int push = 1;
  11322. int ret = WOLFSSL_SUCCESS;
  11323. for (i = 0; i < MAX_CHAIN_DEPTH; i++) {
  11324. if (x509GetIssuerFromCM(&issuer[i], cm, x)
  11325. != WOLFSSL_SUCCESS)
  11326. break;
  11327. x = issuer[i];
  11328. }
  11329. if (i == 0) /* No further chain found */
  11330. return WOLFSSL_FAILURE;
  11331. i--;
  11332. for (; i >= 0; i--) {
  11333. if (push) {
  11334. if (wolfSSL_sk_X509_push(sk, issuer[i]) != WOLFSSL_SUCCESS) {
  11335. wolfSSL_X509_free(issuer[i]);
  11336. ret = WOLFSSL_FATAL_ERROR;
  11337. push = 0; /* Free the rest of the unpushed certs */
  11338. }
  11339. }
  11340. else {
  11341. wolfSSL_X509_free(issuer[i]);
  11342. }
  11343. }
  11344. return ret;
  11345. }
  11346. #endif /* !WOLFSSL_QT */
  11347. /* Builds up and creates a stack of peer certificates for ssl->peerCertChain
  11348. based off of the ssl session chain. Attempts to place CA certificates
  11349. at the bottom of the stack. Returns stack of WOLFSSL_X509 certs or
  11350. NULL on failure */
  11351. WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_set_peer_cert_chain(WOLFSSL* ssl)
  11352. {
  11353. WOLFSSL_STACK* sk;
  11354. WOLFSSL_X509* x509;
  11355. int i = 0;
  11356. int ret;
  11357. WOLFSSL_ENTER("wolfSSL_set_peer_cert_chain");
  11358. if ((ssl == NULL) || (ssl->session->chain.count == 0))
  11359. return NULL;
  11360. sk = wolfSSL_sk_X509_new_null();
  11361. i = ssl->session->chain.count-1;
  11362. for (; i >= 0; i--) {
  11363. x509 = wolfSSL_X509_new_ex(ssl->heap);
  11364. if (x509 == NULL) {
  11365. WOLFSSL_MSG("Error Creating X509");
  11366. wolfSSL_sk_X509_pop_free(sk, NULL);
  11367. return NULL;
  11368. }
  11369. ret = DecodeToX509(x509, ssl->session->chain.certs[i].buffer,
  11370. ssl->session->chain.certs[i].length);
  11371. #if !defined(WOLFSSL_QT)
  11372. if (ret == 0 && i == ssl->session->chain.count-1) {
  11373. /* On the last element in the chain try to add the CA chain
  11374. * first if we have one for this cert */
  11375. SSL_CM_WARNING(ssl);
  11376. if (PushCAx509Chain(SSL_CM(ssl), x509, sk)
  11377. == WOLFSSL_FATAL_ERROR) {
  11378. ret = WOLFSSL_FATAL_ERROR;
  11379. }
  11380. }
  11381. #endif
  11382. if (ret != 0 || wolfSSL_sk_X509_push(sk, x509) != WOLFSSL_SUCCESS) {
  11383. WOLFSSL_MSG("Error decoding cert");
  11384. wolfSSL_X509_free(x509);
  11385. wolfSSL_sk_X509_pop_free(sk, NULL);
  11386. return NULL;
  11387. }
  11388. }
  11389. if (sk == NULL) {
  11390. WOLFSSL_MSG("Null session chain");
  11391. }
  11392. #if defined(OPENSSL_ALL)
  11393. else if (ssl->options.side == WOLFSSL_SERVER_END) {
  11394. /* to be compliant with openssl
  11395. first element is kept as peer cert on server side.*/
  11396. wolfSSL_sk_X509_pop(sk);
  11397. }
  11398. #endif
  11399. if (ssl->peerCertChain != NULL)
  11400. wolfSSL_sk_X509_pop_free(ssl->peerCertChain, NULL);
  11401. /* This is Free'd when ssl is Free'd */
  11402. ssl->peerCertChain = sk;
  11403. return sk;
  11404. }
  11405. #endif /* SESSION_CERTS && OPENSSL_EXTRA */
  11406. #ifndef NO_CERTS
  11407. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  11408. /* create a generic wolfSSL stack node
  11409. * returns a new WOLFSSL_STACK structure on success */
  11410. WOLFSSL_STACK* wolfSSL_sk_new_node(void* heap)
  11411. {
  11412. WOLFSSL_STACK* sk;
  11413. WOLFSSL_ENTER("wolfSSL_sk_new_node");
  11414. sk = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), heap,
  11415. DYNAMIC_TYPE_OPENSSL);
  11416. if (sk != NULL) {
  11417. XMEMSET(sk, 0, sizeof(*sk));
  11418. sk->heap = heap;
  11419. }
  11420. return sk;
  11421. }
  11422. /* free's node but does not free internal data such as in->data.x509 */
  11423. void wolfSSL_sk_free_node(WOLFSSL_STACK* in)
  11424. {
  11425. if (in != NULL) {
  11426. XFREE(in, in->heap, DYNAMIC_TYPE_OPENSSL);
  11427. }
  11428. }
  11429. /* pushes node "in" onto "stack" and returns pointer to the new stack on success
  11430. * also handles internal "num" for number of nodes on stack
  11431. * return WOLFSSL_SUCCESS on success
  11432. */
  11433. int wolfSSL_sk_push_node(WOLFSSL_STACK** stack, WOLFSSL_STACK* in)
  11434. {
  11435. if (stack == NULL || in == NULL) {
  11436. return WOLFSSL_FAILURE;
  11437. }
  11438. if (*stack == NULL) {
  11439. in->num = 1;
  11440. *stack = in;
  11441. return WOLFSSL_SUCCESS;
  11442. }
  11443. in->num = (*stack)->num + 1;
  11444. in->next = *stack;
  11445. *stack = in;
  11446. return WOLFSSL_SUCCESS;
  11447. }
  11448. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  11449. static WC_INLINE int compare_WOLFSSL_CIPHER(
  11450. WOLFSSL_CIPHER *a,
  11451. WOLFSSL_CIPHER *b)
  11452. {
  11453. if ((a->cipherSuite0 == b->cipherSuite0) &&
  11454. (a->cipherSuite == b->cipherSuite) &&
  11455. (a->ssl == b->ssl) &&
  11456. (XMEMCMP(a->description, b->description, sizeof a->description) == 0) &&
  11457. (a->offset == b->offset) &&
  11458. (a->in_stack == b->in_stack) &&
  11459. (a->bits == b->bits))
  11460. return 0;
  11461. else
  11462. return -1;
  11463. }
  11464. #endif /* OPENSSL_ALL || WOLFSSL_QT */
  11465. /* return 1 on success 0 on fail */
  11466. int wolfSSL_sk_push(WOLFSSL_STACK* sk, const void *data)
  11467. {
  11468. WOLFSSL_STACK* node;
  11469. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  11470. WOLFSSL_CIPHER ciph;
  11471. #endif
  11472. WOLFSSL_ENTER("wolfSSL_sk_push");
  11473. if (!sk) {
  11474. return WOLFSSL_FAILURE;
  11475. }
  11476. /* Check if empty data */
  11477. switch (sk->type) {
  11478. case STACK_TYPE_CIPHER:
  11479. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  11480. /* check if entire struct is zero */
  11481. XMEMSET(&ciph, 0, sizeof(WOLFSSL_CIPHER));
  11482. if (compare_WOLFSSL_CIPHER(&sk->data.cipher, &ciph) == 0) {
  11483. sk->data.cipher = *(WOLFSSL_CIPHER*)data;
  11484. sk->num = 1;
  11485. if (sk->hash_fn) {
  11486. sk->hash = sk->hash_fn(&sk->data.cipher);
  11487. }
  11488. return WOLFSSL_SUCCESS;
  11489. }
  11490. break;
  11491. #endif
  11492. case STACK_TYPE_X509:
  11493. case STACK_TYPE_GEN_NAME:
  11494. case STACK_TYPE_BIO:
  11495. case STACK_TYPE_OBJ:
  11496. case STACK_TYPE_STRING:
  11497. case STACK_TYPE_ACCESS_DESCRIPTION:
  11498. case STACK_TYPE_X509_EXT:
  11499. case STACK_TYPE_X509_REQ_ATTR:
  11500. case STACK_TYPE_NULL:
  11501. case STACK_TYPE_X509_NAME:
  11502. case STACK_TYPE_X509_NAME_ENTRY:
  11503. case STACK_TYPE_CONF_VALUE:
  11504. case STACK_TYPE_X509_INFO:
  11505. case STACK_TYPE_BY_DIR_entry:
  11506. case STACK_TYPE_BY_DIR_hash:
  11507. case STACK_TYPE_X509_OBJ:
  11508. case STACK_TYPE_DIST_POINT:
  11509. case STACK_TYPE_X509_CRL:
  11510. default:
  11511. /* All other types are pointers */
  11512. if (!sk->data.generic) {
  11513. sk->data.generic = (void*)data;
  11514. sk->num = 1;
  11515. #ifdef OPENSSL_ALL
  11516. if (sk->hash_fn) {
  11517. sk->hash = sk->hash_fn(sk->data.generic);
  11518. }
  11519. #endif
  11520. return WOLFSSL_SUCCESS;
  11521. }
  11522. break;
  11523. }
  11524. /* stack already has value(s) create a new node and add more */
  11525. node = wolfSSL_sk_new_node(sk->heap);
  11526. if (!node) {
  11527. WOLFSSL_MSG("Memory error");
  11528. return WOLFSSL_FAILURE;
  11529. }
  11530. /* push new x509 onto head of stack */
  11531. node->next = sk->next;
  11532. node->type = sk->type;
  11533. sk->next = node;
  11534. sk->num += 1;
  11535. #ifdef OPENSSL_ALL
  11536. node->hash_fn = sk->hash_fn;
  11537. node->hash = sk->hash;
  11538. sk->hash = 0;
  11539. #endif
  11540. switch (sk->type) {
  11541. case STACK_TYPE_CIPHER:
  11542. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  11543. node->data.cipher = sk->data.cipher;
  11544. sk->data.cipher = *(WOLFSSL_CIPHER*)data;
  11545. if (sk->hash_fn) {
  11546. sk->hash = sk->hash_fn(&sk->data.cipher);
  11547. }
  11548. break;
  11549. #endif
  11550. case STACK_TYPE_X509:
  11551. case STACK_TYPE_GEN_NAME:
  11552. case STACK_TYPE_BIO:
  11553. case STACK_TYPE_OBJ:
  11554. case STACK_TYPE_STRING:
  11555. case STACK_TYPE_ACCESS_DESCRIPTION:
  11556. case STACK_TYPE_X509_EXT:
  11557. case STACK_TYPE_X509_REQ_ATTR:
  11558. case STACK_TYPE_NULL:
  11559. case STACK_TYPE_X509_NAME:
  11560. case STACK_TYPE_X509_NAME_ENTRY:
  11561. case STACK_TYPE_CONF_VALUE:
  11562. case STACK_TYPE_X509_INFO:
  11563. case STACK_TYPE_BY_DIR_entry:
  11564. case STACK_TYPE_BY_DIR_hash:
  11565. case STACK_TYPE_X509_OBJ:
  11566. case STACK_TYPE_DIST_POINT:
  11567. case STACK_TYPE_X509_CRL:
  11568. default:
  11569. /* All other types are pointers */
  11570. node->data.generic = sk->data.generic;
  11571. sk->data.generic = (void*)data;
  11572. #ifdef OPENSSL_ALL
  11573. if (sk->hash_fn) {
  11574. sk->hash = sk->hash_fn(sk->data.generic);
  11575. }
  11576. #endif
  11577. break;
  11578. }
  11579. return WOLFSSL_SUCCESS;
  11580. }
  11581. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  11582. #ifdef OPENSSL_EXTRA
  11583. /* returns the node at index "idx", NULL if not found */
  11584. WOLFSSL_STACK* wolfSSL_sk_get_node(WOLFSSL_STACK* sk, int idx)
  11585. {
  11586. int i;
  11587. WOLFSSL_STACK* ret = NULL;
  11588. WOLFSSL_STACK* current;
  11589. current = sk;
  11590. for (i = 0; i <= idx && current != NULL; i++) {
  11591. if (i == idx) {
  11592. ret = current;
  11593. break;
  11594. }
  11595. current = current->next;
  11596. }
  11597. return ret;
  11598. }
  11599. #endif /* OPENSSL_EXTRA */
  11600. #ifdef OPENSSL_EXTRA
  11601. #if defined(OPENSSL_ALL)
  11602. void *wolfSSL_lh_retrieve(WOLFSSL_STACK *sk, void *data)
  11603. {
  11604. unsigned long hash;
  11605. WOLFSSL_ENTER("wolfSSL_lh_retrieve");
  11606. if (!sk || !data) {
  11607. WOLFSSL_MSG("Bad parameters");
  11608. return NULL;
  11609. }
  11610. if (!sk->hash_fn) {
  11611. WOLFSSL_MSG("No hash function defined");
  11612. return NULL;
  11613. }
  11614. hash = sk->hash_fn(data);
  11615. while (sk) {
  11616. /* Calc hash if not done so yet */
  11617. if (!sk->hash) {
  11618. switch (sk->type) {
  11619. case STACK_TYPE_CIPHER:
  11620. sk->hash = sk->hash_fn(&sk->data.cipher);
  11621. break;
  11622. case STACK_TYPE_X509:
  11623. case STACK_TYPE_GEN_NAME:
  11624. case STACK_TYPE_BIO:
  11625. case STACK_TYPE_OBJ:
  11626. case STACK_TYPE_STRING:
  11627. case STACK_TYPE_ACCESS_DESCRIPTION:
  11628. case STACK_TYPE_X509_EXT:
  11629. case STACK_TYPE_X509_REQ_ATTR:
  11630. case STACK_TYPE_NULL:
  11631. case STACK_TYPE_X509_NAME:
  11632. case STACK_TYPE_X509_NAME_ENTRY:
  11633. case STACK_TYPE_CONF_VALUE:
  11634. case STACK_TYPE_X509_INFO:
  11635. case STACK_TYPE_BY_DIR_entry:
  11636. case STACK_TYPE_BY_DIR_hash:
  11637. case STACK_TYPE_X509_OBJ:
  11638. case STACK_TYPE_DIST_POINT:
  11639. case STACK_TYPE_X509_CRL:
  11640. default:
  11641. sk->hash = sk->hash_fn(sk->data.generic);
  11642. break;
  11643. }
  11644. }
  11645. if (sk->hash == hash) {
  11646. switch (sk->type) {
  11647. case STACK_TYPE_CIPHER:
  11648. return &sk->data.cipher;
  11649. case STACK_TYPE_X509:
  11650. case STACK_TYPE_GEN_NAME:
  11651. case STACK_TYPE_BIO:
  11652. case STACK_TYPE_OBJ:
  11653. case STACK_TYPE_STRING:
  11654. case STACK_TYPE_ACCESS_DESCRIPTION:
  11655. case STACK_TYPE_X509_EXT:
  11656. case STACK_TYPE_X509_REQ_ATTR:
  11657. case STACK_TYPE_NULL:
  11658. case STACK_TYPE_X509_NAME:
  11659. case STACK_TYPE_X509_NAME_ENTRY:
  11660. case STACK_TYPE_CONF_VALUE:
  11661. case STACK_TYPE_X509_INFO:
  11662. case STACK_TYPE_BY_DIR_entry:
  11663. case STACK_TYPE_BY_DIR_hash:
  11664. case STACK_TYPE_X509_OBJ:
  11665. case STACK_TYPE_DIST_POINT:
  11666. case STACK_TYPE_X509_CRL:
  11667. default:
  11668. return sk->data.generic;
  11669. }
  11670. }
  11671. sk = sk->next;
  11672. }
  11673. return NULL;
  11674. }
  11675. #endif /* OPENSSL_ALL */
  11676. #endif /* OPENSSL_EXTRA */
  11677. /* OPENSSL_EXTRA is needed for wolfSSL_X509_d21 function
  11678. KEEP_OUR_CERT is to insure ability for returning ssl certificate */
  11679. #if (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
  11680. defined(KEEP_OUR_CERT)
  11681. WOLFSSL_X509* wolfSSL_get_certificate(WOLFSSL* ssl)
  11682. {
  11683. if (ssl == NULL) {
  11684. return NULL;
  11685. }
  11686. if (ssl->buffers.weOwnCert) {
  11687. if (ssl->ourCert == NULL) {
  11688. if (ssl->buffers.certificate == NULL) {
  11689. WOLFSSL_MSG("Certificate buffer not set!");
  11690. return NULL;
  11691. }
  11692. #ifndef WOLFSSL_X509_STORE_CERTS
  11693. ssl->ourCert = wolfSSL_X509_d2i_ex(NULL,
  11694. ssl->buffers.certificate->buffer,
  11695. ssl->buffers.certificate->length,
  11696. ssl->heap);
  11697. #endif
  11698. }
  11699. return ssl->ourCert;
  11700. }
  11701. else { /* if cert not owned get parent ctx cert or return null */
  11702. if (ssl->ctx) {
  11703. if (ssl->ctx->ourCert == NULL) {
  11704. if (ssl->ctx->certificate == NULL) {
  11705. WOLFSSL_MSG("Ctx Certificate buffer not set!");
  11706. return NULL;
  11707. }
  11708. #ifndef WOLFSSL_X509_STORE_CERTS
  11709. ssl->ctx->ourCert = wolfSSL_X509_d2i_ex(NULL,
  11710. ssl->ctx->certificate->buffer,
  11711. ssl->ctx->certificate->length,
  11712. ssl->heap);
  11713. #endif
  11714. ssl->ctx->ownOurCert = 1;
  11715. }
  11716. return ssl->ctx->ourCert;
  11717. }
  11718. }
  11719. return NULL;
  11720. }
  11721. WOLFSSL_X509* wolfSSL_CTX_get0_certificate(WOLFSSL_CTX* ctx)
  11722. {
  11723. if (ctx) {
  11724. if (ctx->ourCert == NULL) {
  11725. if (ctx->certificate == NULL) {
  11726. WOLFSSL_MSG("Ctx Certificate buffer not set!");
  11727. return NULL;
  11728. }
  11729. #ifndef WOLFSSL_X509_STORE_CERTS
  11730. ctx->ourCert = wolfSSL_X509_d2i_ex(NULL,
  11731. ctx->certificate->buffer,
  11732. ctx->certificate->length, ctx->heap);
  11733. #endif
  11734. ctx->ownOurCert = 1;
  11735. }
  11736. return ctx->ourCert;
  11737. }
  11738. return NULL;
  11739. }
  11740. #endif /* OPENSSL_EXTRA && KEEP_OUR_CERT */
  11741. #endif /* NO_CERTS */
  11742. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  11743. void wolfSSL_set_connect_state(WOLFSSL* ssl)
  11744. {
  11745. WOLFSSL_ENTER("wolfSSL_set_connect_state");
  11746. if (ssl == NULL) {
  11747. WOLFSSL_MSG("WOLFSSL struct pointer passed in was null");
  11748. return;
  11749. }
  11750. #ifndef NO_DH
  11751. /* client creates its own DH parameters on handshake */
  11752. if (ssl->buffers.serverDH_P.buffer && ssl->buffers.weOwnDH) {
  11753. XFREE(ssl->buffers.serverDH_P.buffer, ssl->heap,
  11754. DYNAMIC_TYPE_PUBLIC_KEY);
  11755. }
  11756. ssl->buffers.serverDH_P.buffer = NULL;
  11757. if (ssl->buffers.serverDH_G.buffer && ssl->buffers.weOwnDH) {
  11758. XFREE(ssl->buffers.serverDH_G.buffer, ssl->heap,
  11759. DYNAMIC_TYPE_PUBLIC_KEY);
  11760. }
  11761. ssl->buffers.serverDH_G.buffer = NULL;
  11762. #endif
  11763. if (InitSSL_Side(ssl, WOLFSSL_CLIENT_END) != WOLFSSL_SUCCESS) {
  11764. WOLFSSL_MSG("Error initializing client side");
  11765. }
  11766. }
  11767. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  11768. int wolfSSL_get_shutdown(const WOLFSSL* ssl)
  11769. {
  11770. int isShutdown = 0;
  11771. WOLFSSL_ENTER("wolfSSL_get_shutdown");
  11772. if (ssl) {
  11773. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  11774. if (ssl->options.shutdownDone) {
  11775. /* The SSL object was possibly cleared with wolfSSL_clear after
  11776. * a successful shutdown. Simulate a response for a full
  11777. * bidirectional shutdown. */
  11778. isShutdown = WOLFSSL_SENT_SHUTDOWN | WOLFSSL_RECEIVED_SHUTDOWN;
  11779. }
  11780. else
  11781. #endif
  11782. {
  11783. /* in OpenSSL, WOLFSSL_SENT_SHUTDOWN = 1, when closeNotifySent *
  11784. * WOLFSSL_RECEIVED_SHUTDOWN = 2, from close notify or fatal err */
  11785. if (ssl->options.sentNotify)
  11786. isShutdown |= WOLFSSL_SENT_SHUTDOWN;
  11787. if (ssl->options.closeNotify||ssl->options.connReset)
  11788. isShutdown |= WOLFSSL_RECEIVED_SHUTDOWN;
  11789. }
  11790. }
  11791. WOLFSSL_LEAVE("wolfSSL_get_shutdown", isShutdown);
  11792. return isShutdown;
  11793. }
  11794. int wolfSSL_session_reused(WOLFSSL* ssl)
  11795. {
  11796. int resuming = 0;
  11797. WOLFSSL_ENTER("wolfSSL_session_reused");
  11798. if (ssl) {
  11799. #ifndef HAVE_SECURE_RENEGOTIATION
  11800. resuming = ssl->options.resuming;
  11801. #else
  11802. resuming = ssl->options.resuming || ssl->options.resumed;
  11803. #endif
  11804. }
  11805. WOLFSSL_LEAVE("wolfSSL_session_reused", resuming);
  11806. return resuming;
  11807. }
  11808. /* helper function that takes in a protocol version struct and returns string */
  11809. static const char* wolfSSL_internal_get_version(const ProtocolVersion* version)
  11810. {
  11811. WOLFSSL_ENTER("wolfSSL_get_version");
  11812. if (version == NULL) {
  11813. return "Bad arg";
  11814. }
  11815. if (version->major == SSLv3_MAJOR) {
  11816. switch (version->minor) {
  11817. case SSLv3_MINOR :
  11818. return "SSLv3";
  11819. case TLSv1_MINOR :
  11820. return "TLSv1";
  11821. case TLSv1_1_MINOR :
  11822. return "TLSv1.1";
  11823. case TLSv1_2_MINOR :
  11824. return "TLSv1.2";
  11825. case TLSv1_3_MINOR :
  11826. return "TLSv1.3";
  11827. default:
  11828. return "unknown";
  11829. }
  11830. }
  11831. #ifdef WOLFSSL_DTLS
  11832. else if (version->major == DTLS_MAJOR) {
  11833. switch (version->minor) {
  11834. case DTLS_MINOR :
  11835. return "DTLS";
  11836. case DTLSv1_2_MINOR :
  11837. return "DTLSv1.2";
  11838. case DTLSv1_3_MINOR :
  11839. return "DTLSv1.3";
  11840. default:
  11841. return "unknown";
  11842. }
  11843. }
  11844. #endif /* WOLFSSL_DTLS */
  11845. return "unknown";
  11846. }
  11847. const char* wolfSSL_get_version(const WOLFSSL* ssl)
  11848. {
  11849. if (ssl == NULL) {
  11850. WOLFSSL_MSG("Bad argument");
  11851. return "unknown";
  11852. }
  11853. return wolfSSL_internal_get_version(&ssl->version);
  11854. }
  11855. /* current library version */
  11856. const char* wolfSSL_lib_version(void)
  11857. {
  11858. return LIBWOLFSSL_VERSION_STRING;
  11859. }
  11860. #ifdef OPENSSL_EXTRA
  11861. #if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
  11862. const char* wolfSSL_OpenSSL_version(int a)
  11863. {
  11864. (void)a;
  11865. return "wolfSSL " LIBWOLFSSL_VERSION_STRING;
  11866. }
  11867. #else
  11868. const char* wolfSSL_OpenSSL_version(void)
  11869. {
  11870. return "wolfSSL " LIBWOLFSSL_VERSION_STRING;
  11871. }
  11872. #endif /* WOLFSSL_QT */
  11873. #endif
  11874. /* current library version in hex */
  11875. word32 wolfSSL_lib_version_hex(void)
  11876. {
  11877. return LIBWOLFSSL_VERSION_HEX;
  11878. }
  11879. int wolfSSL_get_current_cipher_suite(WOLFSSL* ssl)
  11880. {
  11881. WOLFSSL_ENTER("wolfSSL_get_current_cipher_suite");
  11882. if (ssl)
  11883. return (ssl->options.cipherSuite0 << 8) | ssl->options.cipherSuite;
  11884. return 0;
  11885. }
  11886. WOLFSSL_CIPHER* wolfSSL_get_current_cipher(WOLFSSL* ssl)
  11887. {
  11888. WOLFSSL_ENTER("wolfSSL_get_current_cipher");
  11889. if (ssl) {
  11890. ssl->cipher.cipherSuite0 = ssl->options.cipherSuite0;
  11891. ssl->cipher.cipherSuite = ssl->options.cipherSuite;
  11892. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  11893. ssl->cipher.bits = ssl->specs.key_size * 8;
  11894. #endif
  11895. return &ssl->cipher;
  11896. }
  11897. else
  11898. return NULL;
  11899. }
  11900. const char* wolfSSL_CIPHER_get_name(const WOLFSSL_CIPHER* cipher)
  11901. {
  11902. WOLFSSL_ENTER("wolfSSL_CIPHER_get_name");
  11903. if (cipher == NULL) {
  11904. return NULL;
  11905. }
  11906. #if !defined(WOLFSSL_CIPHER_INTERNALNAME) && !defined(NO_ERROR_STRINGS) && \
  11907. !defined(WOLFSSL_QT)
  11908. return GetCipherNameIana(cipher->cipherSuite0, cipher->cipherSuite);
  11909. #else
  11910. return wolfSSL_get_cipher_name_from_suite(cipher->cipherSuite0,
  11911. cipher->cipherSuite);
  11912. #endif
  11913. }
  11914. const char* wolfSSL_CIPHER_get_version(const WOLFSSL_CIPHER* cipher)
  11915. {
  11916. WOLFSSL_ENTER("wolfSSL_CIPHER_get_version");
  11917. if (cipher == NULL || cipher->ssl == NULL) {
  11918. return NULL;
  11919. }
  11920. return wolfSSL_get_version(cipher->ssl);
  11921. }
  11922. const char* wolfSSL_get_cipher(WOLFSSL* ssl)
  11923. {
  11924. WOLFSSL_ENTER("wolfSSL_get_cipher");
  11925. return wolfSSL_CIPHER_get_name(wolfSSL_get_current_cipher(ssl));
  11926. }
  11927. /* gets cipher name in the format DHE-RSA-... rather then TLS_DHE... */
  11928. const char* wolfSSL_get_cipher_name(WOLFSSL* ssl)
  11929. {
  11930. /* get access to cipher_name_idx in internal.c */
  11931. return wolfSSL_get_cipher_name_internal(ssl);
  11932. }
  11933. const char* wolfSSL_get_cipher_name_from_suite(const byte cipherSuite0,
  11934. const byte cipherSuite)
  11935. {
  11936. return GetCipherNameInternal(cipherSuite0, cipherSuite);
  11937. }
  11938. const char* wolfSSL_get_cipher_name_iana_from_suite(const byte cipherSuite0,
  11939. const byte cipherSuite)
  11940. {
  11941. return GetCipherNameIana(cipherSuite0, cipherSuite);
  11942. }
  11943. int wolfSSL_get_cipher_suite_from_name(const char* name, byte* cipherSuite0,
  11944. byte* cipherSuite, int *flags) {
  11945. if ((name == NULL) ||
  11946. (cipherSuite0 == NULL) ||
  11947. (cipherSuite == NULL) ||
  11948. (flags == NULL))
  11949. return BAD_FUNC_ARG;
  11950. return GetCipherSuiteFromName(name, cipherSuite0, cipherSuite, flags);
  11951. }
  11952. #if defined(WOLFSSL_QT) || defined(OPENSSL_ALL)
  11953. /* Creates and returns a new WOLFSSL_CIPHER stack. */
  11954. WOLFSSL_STACK* wolfSSL_sk_new_cipher(void)
  11955. {
  11956. WOLFSSL_STACK* sk;
  11957. WOLFSSL_ENTER("wolfSSL_sk_new_cipher");
  11958. sk = wolfSSL_sk_new_null();
  11959. if (sk == NULL)
  11960. return NULL;
  11961. sk->type = STACK_TYPE_CIPHER;
  11962. return sk;
  11963. }
  11964. /* return 1 on success 0 on fail */
  11965. int wolfSSL_sk_CIPHER_push(WOLF_STACK_OF(WOLFSSL_CIPHER)* sk,
  11966. WOLFSSL_CIPHER* cipher)
  11967. {
  11968. return wolfSSL_sk_push(sk, cipher);
  11969. }
  11970. #ifndef NO_WOLFSSL_STUB
  11971. WOLFSSL_CIPHER* wolfSSL_sk_CIPHER_pop(WOLF_STACK_OF(WOLFSSL_CIPHER)* sk)
  11972. {
  11973. WOLFSSL_STUB("wolfSSL_sk_CIPHER_pop");
  11974. (void)sk;
  11975. return NULL;
  11976. }
  11977. #endif /* NO_WOLFSSL_STUB */
  11978. #endif /* WOLFSSL_QT || OPENSSL_ALL */
  11979. word32 wolfSSL_CIPHER_get_id(const WOLFSSL_CIPHER* cipher)
  11980. {
  11981. word16 cipher_id = 0;
  11982. WOLFSSL_ENTER("wolfSSL_CIPHER_get_id");
  11983. if (cipher && cipher->ssl) {
  11984. cipher_id = (cipher->ssl->options.cipherSuite0 << 8) |
  11985. cipher->ssl->options.cipherSuite;
  11986. }
  11987. return cipher_id;
  11988. }
  11989. const WOLFSSL_CIPHER* wolfSSL_get_cipher_by_value(word16 value)
  11990. {
  11991. const WOLFSSL_CIPHER* cipher = NULL;
  11992. byte cipherSuite0, cipherSuite;
  11993. WOLFSSL_ENTER("wolfSSL_get_cipher_by_value");
  11994. /* extract cipher id information */
  11995. cipherSuite = (value & 0xFF);
  11996. cipherSuite0 = ((value >> 8) & 0xFF);
  11997. /* TODO: lookup by cipherSuite0 / cipherSuite */
  11998. (void)cipherSuite0;
  11999. (void)cipherSuite;
  12000. return cipher;
  12001. }
  12002. #if defined(OPENSSL_EXTRA)
  12003. /* Free the structure for WOLFSSL_CIPHER stack
  12004. *
  12005. * sk stack to free nodes in
  12006. */
  12007. void wolfSSL_sk_CIPHER_free(WOLF_STACK_OF(WOLFSSL_CIPHER)* sk)
  12008. {
  12009. WOLFSSL_ENTER("wolfSSL_sk_CIPHER_free");
  12010. wolfSSL_sk_free(sk);
  12011. }
  12012. #endif /* OPENSSL_ALL */
  12013. #if defined(HAVE_ECC) || defined(HAVE_CURVE25519) || defined(HAVE_CURVE448) || \
  12014. !defined(NO_DH)
  12015. #ifdef HAVE_FFDHE
  12016. static const char* wolfssl_ffdhe_name(word16 group)
  12017. {
  12018. const char* str = NULL;
  12019. switch (group) {
  12020. case WOLFSSL_FFDHE_2048:
  12021. str = "FFDHE_2048";
  12022. break;
  12023. case WOLFSSL_FFDHE_3072:
  12024. str = "FFDHE_3072";
  12025. break;
  12026. case WOLFSSL_FFDHE_4096:
  12027. str = "FFDHE_4096";
  12028. break;
  12029. case WOLFSSL_FFDHE_6144:
  12030. str = "FFDHE_6144";
  12031. break;
  12032. case WOLFSSL_FFDHE_8192:
  12033. str = "FFDHE_8192";
  12034. break;
  12035. default:
  12036. break;
  12037. }
  12038. return str;
  12039. }
  12040. #endif
  12041. /* Return the name of the curve used for key exchange as a printable string.
  12042. *
  12043. * ssl The SSL/TLS object.
  12044. * returns NULL if ECDH was not used, otherwise the name as a string.
  12045. */
  12046. const char* wolfSSL_get_curve_name(WOLFSSL* ssl)
  12047. {
  12048. const char* cName = NULL;
  12049. WOLFSSL_ENTER("wolfSSL_get_curve_name");
  12050. if (ssl == NULL)
  12051. return NULL;
  12052. #if defined(WOLFSSL_TLS13) && defined(HAVE_PQC)
  12053. /* Check for post-quantum groups. Return now because we do not want the ECC
  12054. * check to override this result in the case of a hybrid. */
  12055. if (IsAtLeastTLSv1_3(ssl->version)) {
  12056. switch (ssl->namedGroup) {
  12057. #ifdef HAVE_LIBOQS
  12058. case WOLFSSL_KYBER_LEVEL1:
  12059. return "KYBER_LEVEL1";
  12060. case WOLFSSL_KYBER_LEVEL3:
  12061. return "KYBER_LEVEL3";
  12062. case WOLFSSL_KYBER_LEVEL5:
  12063. return "KYBER_LEVEL5";
  12064. case WOLFSSL_P256_KYBER_LEVEL1:
  12065. return "P256_KYBER_LEVEL1";
  12066. case WOLFSSL_P384_KYBER_LEVEL3:
  12067. return "P384_KYBER_LEVEL3";
  12068. case WOLFSSL_P521_KYBER_LEVEL5:
  12069. return "P521_KYBER_LEVEL5";
  12070. #elif defined(HAVE_PQM4)
  12071. case WOLFSSL_KYBER_LEVEL1:
  12072. return "KYBER_LEVEL1";
  12073. #elif defined(WOLFSSL_WC_KYBER)
  12074. #ifdef WOLFSSL_KYBER512
  12075. case WOLFSSL_KYBER_LEVEL1:
  12076. return "KYBER_LEVEL1";
  12077. #endif
  12078. #ifdef WOLFSSL_KYBER768
  12079. case WOLFSSL_KYBER_LEVEL3:
  12080. return "KYBER_LEVEL3";
  12081. #endif
  12082. #ifdef WOLFSSL_KYBER1024
  12083. case WOLFSSL_KYBER_LEVEL5:
  12084. return "KYBER_LEVEL5";
  12085. #endif
  12086. #endif
  12087. }
  12088. }
  12089. #endif /* WOLFSSL_TLS13 && HAVE_PQC */
  12090. #ifdef HAVE_FFDHE
  12091. if (ssl->namedGroup != 0) {
  12092. cName = wolfssl_ffdhe_name(ssl->namedGroup);
  12093. }
  12094. #endif
  12095. #ifdef HAVE_CURVE25519
  12096. if (ssl->ecdhCurveOID == ECC_X25519_OID && cName == NULL) {
  12097. cName = "X25519";
  12098. }
  12099. #endif
  12100. #ifdef HAVE_CURVE448
  12101. if (ssl->ecdhCurveOID == ECC_X448_OID && cName == NULL) {
  12102. cName = "X448";
  12103. }
  12104. #endif
  12105. #ifdef HAVE_ECC
  12106. if (ssl->ecdhCurveOID != 0 && cName == NULL) {
  12107. cName = wc_ecc_get_name(wc_ecc_get_oid(ssl->ecdhCurveOID, NULL,
  12108. NULL));
  12109. }
  12110. #endif
  12111. return cName;
  12112. }
  12113. #endif
  12114. #ifdef OPENSSL_EXTRA
  12115. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  12116. /* return authentication NID corresponding to cipher suite
  12117. * @param cipher a pointer to WOLFSSL_CIPHER
  12118. * return NID if found, NID_undef if not found
  12119. */
  12120. int wolfSSL_CIPHER_get_auth_nid(const WOLFSSL_CIPHER* cipher)
  12121. {
  12122. static const struct authnid {
  12123. const char* alg_name;
  12124. const int nid;
  12125. } authnid_tbl[] = {
  12126. {"RSA", NID_auth_rsa},
  12127. {"PSK", NID_auth_psk},
  12128. {"SRP", NID_auth_srp},
  12129. {"ECDSA", NID_auth_ecdsa},
  12130. {"None", NID_auth_null},
  12131. {NULL, NID_undef}
  12132. };
  12133. const char* authStr;
  12134. char n[MAX_SEGMENTS][MAX_SEGMENT_SZ] = {{0}};
  12135. if (GetCipherSegment(cipher, n) == NULL) {
  12136. WOLFSSL_MSG("no suitable cipher name found");
  12137. return NID_undef;
  12138. }
  12139. authStr = GetCipherAuthStr(n);
  12140. if (authStr != NULL) {
  12141. const struct authnid* sa;
  12142. for(sa = authnid_tbl; sa->alg_name != NULL; sa++) {
  12143. if (XSTRCMP(sa->alg_name, authStr) == 0) {
  12144. return sa->nid;
  12145. }
  12146. }
  12147. }
  12148. return NID_undef;
  12149. }
  12150. /* return cipher NID corresponding to cipher suite
  12151. * @param cipher a pointer to WOLFSSL_CIPHER
  12152. * return NID if found, NID_undef if not found
  12153. */
  12154. int wolfSSL_CIPHER_get_cipher_nid(const WOLFSSL_CIPHER* cipher)
  12155. {
  12156. static const struct ciphernid {
  12157. const char* alg_name;
  12158. const int nid;
  12159. } ciphernid_tbl[] = {
  12160. {"AESGCM(256)", NID_aes_256_gcm},
  12161. {"AESGCM(128)", NID_aes_128_gcm},
  12162. {"AESCCM(128)", NID_aes_128_ccm},
  12163. {"AES(128)", NID_aes_128_cbc},
  12164. {"AES(256)", NID_aes_256_cbc},
  12165. {"CAMELLIA(256)", NID_camellia_256_cbc},
  12166. {"CAMELLIA(128)", NID_camellia_128_cbc},
  12167. {"RC4", NID_rc4},
  12168. {"3DES", NID_des_ede3_cbc},
  12169. {"CHACHA20/POLY1305(256)", NID_chacha20_poly1305},
  12170. {"None", NID_undef},
  12171. {NULL, NID_undef}
  12172. };
  12173. const char* encStr;
  12174. char n[MAX_SEGMENTS][MAX_SEGMENT_SZ] = {{0}};
  12175. WOLFSSL_ENTER("wolfSSL_CIPHER_get_cipher_nid");
  12176. if (GetCipherSegment(cipher, n) == NULL) {
  12177. WOLFSSL_MSG("no suitable cipher name found");
  12178. return NID_undef;
  12179. }
  12180. encStr = GetCipherEncStr(n);
  12181. if (encStr != NULL) {
  12182. const struct ciphernid* c;
  12183. for(c = ciphernid_tbl; c->alg_name != NULL; c++) {
  12184. if (XSTRCMP(c->alg_name, encStr) == 0) {
  12185. return c->nid;
  12186. }
  12187. }
  12188. }
  12189. return NID_undef;
  12190. }
  12191. /* return digest NID corresponding to cipher suite
  12192. * @param cipher a pointer to WOLFSSL_CIPHER
  12193. * return NID if found, NID_undef if not found
  12194. */
  12195. int wolfSSL_CIPHER_get_digest_nid(const WOLFSSL_CIPHER* cipher)
  12196. {
  12197. static const struct macnid {
  12198. const char* alg_name;
  12199. const int nid;
  12200. } macnid_tbl[] = {
  12201. {"SHA1", NID_sha1},
  12202. {"SHA256", NID_sha256},
  12203. {"SHA384", NID_sha384},
  12204. {NULL, NID_undef}
  12205. };
  12206. const char* name;
  12207. const char* macStr;
  12208. char n[MAX_SEGMENTS][MAX_SEGMENT_SZ] = {{0}};
  12209. (void)name;
  12210. WOLFSSL_ENTER("wolfSSL_CIPHER_get_digest_nid");
  12211. if ((name = GetCipherSegment(cipher, n)) == NULL) {
  12212. WOLFSSL_MSG("no suitable cipher name found");
  12213. return NID_undef;
  12214. }
  12215. /* in MD5 case, NID will be NID_md5 */
  12216. if (XSTRSTR(name, "MD5") != NULL) {
  12217. return NID_md5;
  12218. }
  12219. macStr = GetCipherMacStr(n);
  12220. if (macStr != NULL) {
  12221. const struct macnid* mc;
  12222. for(mc = macnid_tbl; mc->alg_name != NULL; mc++) {
  12223. if (XSTRCMP(mc->alg_name, macStr) == 0) {
  12224. return mc->nid;
  12225. }
  12226. }
  12227. }
  12228. return NID_undef;
  12229. }
  12230. /* return key exchange NID corresponding to cipher suite
  12231. * @param cipher a pointer to WOLFSSL_CIPHER
  12232. * return NID if found, NID_undef if not found
  12233. */
  12234. int wolfSSL_CIPHER_get_kx_nid(const WOLFSSL_CIPHER* cipher)
  12235. {
  12236. static const struct kxnid {
  12237. const char* name;
  12238. const int nid;
  12239. } kxnid_table[] = {
  12240. {"ECDHEPSK", NID_kx_ecdhe_psk},
  12241. {"ECDH", NID_kx_ecdhe},
  12242. {"DHEPSK", NID_kx_dhe_psk},
  12243. {"DH", NID_kx_dhe},
  12244. {"RSAPSK", NID_kx_rsa_psk},
  12245. {"SRP", NID_kx_srp},
  12246. {"EDH", NID_kx_dhe},
  12247. {"RSA", NID_kx_rsa},
  12248. {NULL, NID_undef}
  12249. };
  12250. const char* keaStr;
  12251. char n[MAX_SEGMENTS][MAX_SEGMENT_SZ] = {{0}};
  12252. WOLFSSL_ENTER("wolfSSL_CIPHER_get_kx_nid");
  12253. if (GetCipherSegment(cipher, n) == NULL) {
  12254. WOLFSSL_MSG("no suitable cipher name found");
  12255. return NID_undef;
  12256. }
  12257. /* in TLS 1.3 case, NID will be NID_kx_any */
  12258. if (XSTRCMP(n[0], "TLS13") == 0) {
  12259. return NID_kx_any;
  12260. }
  12261. keaStr = GetCipherKeaStr(n);
  12262. if (keaStr != NULL) {
  12263. const struct kxnid* k;
  12264. for(k = kxnid_table; k->name != NULL; k++) {
  12265. if (XSTRCMP(k->name, keaStr) == 0) {
  12266. return k->nid;
  12267. }
  12268. }
  12269. }
  12270. return NID_undef;
  12271. }
  12272. /* check if cipher suite is AEAD
  12273. * @param cipher a pointer to WOLFSSL_CIPHER
  12274. * return 1 if cipher is AEAD, 0 otherwise
  12275. */
  12276. int wolfSSL_CIPHER_is_aead(const WOLFSSL_CIPHER* cipher)
  12277. {
  12278. char n[MAX_SEGMENTS][MAX_SEGMENT_SZ] = {{0}};
  12279. WOLFSSL_ENTER("wolfSSL_CIPHER_is_aead");
  12280. if (GetCipherSegment(cipher, n) == NULL) {
  12281. WOLFSSL_MSG("no suitable cipher name found");
  12282. return NID_undef;
  12283. }
  12284. return IsCipherAEAD(n);
  12285. }
  12286. /* Creates cipher->description based on cipher->offset
  12287. * cipher->offset is set in wolfSSL_get_ciphers_compat when it is added
  12288. * to a stack of ciphers.
  12289. * @param [in] cipher: A cipher from a stack of ciphers.
  12290. * return WOLFSSL_SUCCESS if cipher->description is set, else WOLFSSL_FAILURE
  12291. */
  12292. int wolfSSL_sk_CIPHER_description(WOLFSSL_CIPHER* cipher)
  12293. {
  12294. int strLen;
  12295. unsigned long offset;
  12296. char* dp;
  12297. const char* name;
  12298. const char *keaStr, *authStr, *encStr, *macStr, *protocol;
  12299. char n[MAX_SEGMENTS][MAX_SEGMENT_SZ] = {{0}};
  12300. int len = MAX_DESCRIPTION_SZ-1;
  12301. const CipherSuiteInfo* cipher_names;
  12302. ProtocolVersion pv;
  12303. WOLFSSL_ENTER("wolfSSL_sk_CIPHER_description");
  12304. if (cipher == NULL)
  12305. return WOLFSSL_FAILURE;
  12306. dp = cipher->description;
  12307. if (dp == NULL)
  12308. return WOLFSSL_FAILURE;
  12309. cipher_names = GetCipherNames();
  12310. offset = cipher->offset;
  12311. if (offset >= (unsigned long)GetCipherNamesSize())
  12312. return WOLFSSL_FAILURE;
  12313. pv.major = cipher_names[offset].major;
  12314. pv.minor = cipher_names[offset].minor;
  12315. protocol = wolfSSL_internal_get_version(&pv);
  12316. if ((name = GetCipherSegment(cipher, n)) == NULL) {
  12317. WOLFSSL_MSG("no suitable cipher name found");
  12318. return WOLFSSL_FAILURE;
  12319. }
  12320. /* keaStr */
  12321. keaStr = GetCipherKeaStr(n);
  12322. /* authStr */
  12323. authStr = GetCipherAuthStr(n);
  12324. /* encStr */
  12325. encStr = GetCipherEncStr(n);
  12326. if ((cipher->bits = SetCipherBits(encStr)) == WOLFSSL_FAILURE) {
  12327. WOLFSSL_MSG("Cipher Bits Not Set.");
  12328. }
  12329. /* macStr */
  12330. macStr = GetCipherMacStr(n);
  12331. /* Build up the string by copying onto the end. */
  12332. XSTRNCPY(dp, name, len);
  12333. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12334. len -= strLen; dp += strLen;
  12335. XSTRNCPY(dp, " ", len);
  12336. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12337. len -= strLen; dp += strLen;
  12338. XSTRNCPY(dp, protocol, len);
  12339. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12340. len -= strLen; dp += strLen;
  12341. XSTRNCPY(dp, " Kx=", len);
  12342. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12343. len -= strLen; dp += strLen;
  12344. XSTRNCPY(dp, keaStr, len);
  12345. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12346. len -= strLen; dp += strLen;
  12347. XSTRNCPY(dp, " Au=", len);
  12348. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12349. len -= strLen; dp += strLen;
  12350. XSTRNCPY(dp, authStr, len);
  12351. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12352. len -= strLen; dp += strLen;
  12353. XSTRNCPY(dp, " Enc=", len);
  12354. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12355. len -= strLen; dp += strLen;
  12356. XSTRNCPY(dp, encStr, len);
  12357. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12358. len -= strLen; dp += strLen;
  12359. XSTRNCPY(dp, " Mac=", len);
  12360. dp[len-1] = '\0'; strLen = (int)XSTRLEN(dp);
  12361. len -= strLen; dp += strLen;
  12362. XSTRNCPY(dp, macStr, len);
  12363. dp[len-1] = '\0';
  12364. return WOLFSSL_SUCCESS;
  12365. }
  12366. #endif /* OPENSSL_ALL || WOLFSSL_QT */
  12367. static WC_INLINE const char* wolfssl_kea_to_string(int kea)
  12368. {
  12369. const char* keaStr;
  12370. switch (kea) {
  12371. case no_kea:
  12372. keaStr = "None";
  12373. break;
  12374. #ifndef NO_RSA
  12375. case rsa_kea:
  12376. keaStr = "RSA";
  12377. break;
  12378. #endif
  12379. #ifndef NO_DH
  12380. case diffie_hellman_kea:
  12381. keaStr = "DHE";
  12382. break;
  12383. #endif
  12384. case fortezza_kea:
  12385. keaStr = "FZ";
  12386. break;
  12387. #ifndef NO_PSK
  12388. case psk_kea:
  12389. keaStr = "PSK";
  12390. break;
  12391. #ifndef NO_DH
  12392. case dhe_psk_kea:
  12393. keaStr = "DHEPSK";
  12394. break;
  12395. #endif
  12396. #ifdef HAVE_ECC
  12397. case ecdhe_psk_kea:
  12398. keaStr = "ECDHEPSK";
  12399. break;
  12400. #endif
  12401. #endif
  12402. #ifdef HAVE_ECC
  12403. case ecc_diffie_hellman_kea:
  12404. keaStr = "ECDHE";
  12405. break;
  12406. case ecc_static_diffie_hellman_kea:
  12407. keaStr = "ECDH";
  12408. break;
  12409. #endif
  12410. default:
  12411. keaStr = "unknown";
  12412. break;
  12413. }
  12414. return keaStr;
  12415. }
  12416. static WC_INLINE const char* wolfssl_sigalg_to_string(int sig_algo)
  12417. {
  12418. const char* authStr;
  12419. switch (sig_algo) {
  12420. case anonymous_sa_algo:
  12421. authStr = "None";
  12422. break;
  12423. #ifndef NO_RSA
  12424. case rsa_sa_algo:
  12425. authStr = "RSA";
  12426. break;
  12427. #ifdef WC_RSA_PSS
  12428. case rsa_pss_sa_algo:
  12429. authStr = "RSA-PSS";
  12430. break;
  12431. #endif
  12432. #endif
  12433. #ifndef NO_DSA
  12434. case dsa_sa_algo:
  12435. authStr = "DSA";
  12436. break;
  12437. #endif
  12438. #ifdef HAVE_ECC
  12439. case ecc_dsa_sa_algo:
  12440. authStr = "ECDSA";
  12441. break;
  12442. #endif
  12443. #ifdef WOLFSSL_SM2
  12444. case sm2_sa_algo:
  12445. authStr = "SM2";
  12446. break;
  12447. #endif
  12448. #ifdef HAVE_ED25519
  12449. case ed25519_sa_algo:
  12450. authStr = "Ed25519";
  12451. break;
  12452. #endif
  12453. #ifdef HAVE_ED448
  12454. case ed448_sa_algo:
  12455. authStr = "Ed448";
  12456. break;
  12457. #endif
  12458. default:
  12459. authStr = "unknown";
  12460. break;
  12461. }
  12462. return authStr;
  12463. }
  12464. static WC_INLINE const char* wolfssl_cipher_to_string(int cipher, int key_size)
  12465. {
  12466. const char* encStr;
  12467. (void)key_size;
  12468. switch (cipher) {
  12469. case wolfssl_cipher_null:
  12470. encStr = "None";
  12471. break;
  12472. #ifndef NO_RC4
  12473. case wolfssl_rc4:
  12474. encStr = "RC4(128)";
  12475. break;
  12476. #endif
  12477. #ifndef NO_DES3
  12478. case wolfssl_triple_des:
  12479. encStr = "3DES(168)";
  12480. break;
  12481. #endif
  12482. #ifndef NO_AES
  12483. case wolfssl_aes:
  12484. if (key_size == 128)
  12485. encStr = "AES(128)";
  12486. else if (key_size == 256)
  12487. encStr = "AES(256)";
  12488. else
  12489. encStr = "AES(?)";
  12490. break;
  12491. #ifdef HAVE_AESGCM
  12492. case wolfssl_aes_gcm:
  12493. if (key_size == 128)
  12494. encStr = "AESGCM(128)";
  12495. else if (key_size == 256)
  12496. encStr = "AESGCM(256)";
  12497. else
  12498. encStr = "AESGCM(?)";
  12499. break;
  12500. #endif
  12501. #ifdef HAVE_AESCCM
  12502. case wolfssl_aes_ccm:
  12503. if (key_size == 128)
  12504. encStr = "AESCCM(128)";
  12505. else if (key_size == 256)
  12506. encStr = "AESCCM(256)";
  12507. else
  12508. encStr = "AESCCM(?)";
  12509. break;
  12510. #endif
  12511. #endif
  12512. #ifdef HAVE_CHACHA
  12513. case wolfssl_chacha:
  12514. encStr = "CHACHA20/POLY1305(256)";
  12515. break;
  12516. #endif
  12517. #ifdef HAVE_ARIA
  12518. case wolfssl_aria_gcm:
  12519. if (key_size == 128)
  12520. encStr = "Aria(128)";
  12521. else if (key_size == 192)
  12522. encStr = "Aria(192)";
  12523. else if (key_size == 256)
  12524. encStr = "Aria(256)";
  12525. else
  12526. encStr = "Aria(?)";
  12527. break;
  12528. #endif
  12529. #ifdef HAVE_CAMELLIA
  12530. case wolfssl_camellia:
  12531. if (key_size == 128)
  12532. encStr = "Camellia(128)";
  12533. else if (key_size == 256)
  12534. encStr = "Camellia(256)";
  12535. else
  12536. encStr = "Camellia(?)";
  12537. break;
  12538. #endif
  12539. default:
  12540. encStr = "unknown";
  12541. break;
  12542. }
  12543. return encStr;
  12544. }
  12545. static WC_INLINE const char* wolfssl_mac_to_string(int mac)
  12546. {
  12547. const char* macStr;
  12548. switch (mac) {
  12549. case no_mac:
  12550. macStr = "None";
  12551. break;
  12552. #ifndef NO_MD5
  12553. case md5_mac:
  12554. macStr = "MD5";
  12555. break;
  12556. #endif
  12557. #ifndef NO_SHA
  12558. case sha_mac:
  12559. macStr = "SHA1";
  12560. break;
  12561. #endif
  12562. #ifdef HAVE_SHA224
  12563. case sha224_mac:
  12564. macStr = "SHA224";
  12565. break;
  12566. #endif
  12567. #ifndef NO_SHA256
  12568. case sha256_mac:
  12569. macStr = "SHA256";
  12570. break;
  12571. #endif
  12572. #ifdef HAVE_SHA384
  12573. case sha384_mac:
  12574. macStr = "SHA384";
  12575. break;
  12576. #endif
  12577. #ifdef HAVE_SHA512
  12578. case sha512_mac:
  12579. macStr = "SHA512";
  12580. break;
  12581. #endif
  12582. default:
  12583. macStr = "unknown";
  12584. break;
  12585. }
  12586. return macStr;
  12587. }
  12588. char* wolfSSL_CIPHER_description(const WOLFSSL_CIPHER* cipher, char* in,
  12589. int len)
  12590. {
  12591. char *ret = in;
  12592. const char *keaStr, *authStr, *encStr, *macStr;
  12593. size_t strLen;
  12594. WOLFSSL_ENTER("wolfSSL_CIPHER_description");
  12595. if (cipher == NULL || in == NULL)
  12596. return NULL;
  12597. #if defined(WOLFSSL_QT) || defined(OPENSSL_ALL)
  12598. /* if cipher is in the stack from wolfSSL_get_ciphers_compat then
  12599. * Return the description based on cipher_names[cipher->offset]
  12600. */
  12601. if (cipher->in_stack == TRUE) {
  12602. wolfSSL_sk_CIPHER_description((WOLFSSL_CIPHER*)cipher);
  12603. XSTRNCPY(in,cipher->description,len);
  12604. return ret;
  12605. }
  12606. #endif
  12607. /* Get the cipher description based on the SSL session cipher */
  12608. keaStr = wolfssl_kea_to_string(cipher->ssl->specs.kea);
  12609. authStr = wolfssl_sigalg_to_string(cipher->ssl->specs.sig_algo);
  12610. encStr = wolfssl_cipher_to_string(cipher->ssl->specs.bulk_cipher_algorithm,
  12611. cipher->ssl->specs.key_size);
  12612. macStr = wolfssl_mac_to_string(cipher->ssl->specs.mac_algorithm);
  12613. /* Build up the string by copying onto the end. */
  12614. XSTRNCPY(in, wolfSSL_CIPHER_get_name(cipher), len);
  12615. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12616. XSTRNCPY(in, " ", len);
  12617. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12618. XSTRNCPY(in, wolfSSL_get_version(cipher->ssl), len);
  12619. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12620. XSTRNCPY(in, " Kx=", len);
  12621. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12622. XSTRNCPY(in, keaStr, len);
  12623. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12624. XSTRNCPY(in, " Au=", len);
  12625. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12626. XSTRNCPY(in, authStr, len);
  12627. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12628. XSTRNCPY(in, " Enc=", len);
  12629. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12630. XSTRNCPY(in, encStr, len);
  12631. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12632. XSTRNCPY(in, " Mac=", len);
  12633. in[len-1] = '\0'; strLen = XSTRLEN(in); len -= (int)strLen; in += strLen;
  12634. XSTRNCPY(in, macStr, len);
  12635. in[len-1] = '\0';
  12636. return ret;
  12637. }
  12638. #ifndef NO_WOLFSSL_STUB
  12639. int wolfSSL_OCSP_parse_url(char* url, char** host, char** port, char** path,
  12640. int* ssl)
  12641. {
  12642. (void)url;
  12643. (void)host;
  12644. (void)port;
  12645. (void)path;
  12646. (void)ssl;
  12647. WOLFSSL_STUB("OCSP_parse_url");
  12648. return 0;
  12649. }
  12650. #endif
  12651. #ifndef NO_WOLFSSL_STUB
  12652. WOLFSSL_COMP_METHOD* wolfSSL_COMP_zlib(void)
  12653. {
  12654. WOLFSSL_STUB("COMP_zlib");
  12655. return 0;
  12656. }
  12657. #endif
  12658. #ifndef NO_WOLFSSL_STUB
  12659. WOLFSSL_COMP_METHOD* wolfSSL_COMP_rle(void)
  12660. {
  12661. WOLFSSL_STUB("COMP_rle");
  12662. return 0;
  12663. }
  12664. #endif
  12665. #ifndef NO_WOLFSSL_STUB
  12666. int wolfSSL_COMP_add_compression_method(int method, void* data)
  12667. {
  12668. (void)method;
  12669. (void)data;
  12670. WOLFSSL_STUB("COMP_add_compression_method");
  12671. return 0;
  12672. }
  12673. #endif
  12674. /* wolfSSL_set_dynlock_create_callback
  12675. * CRYPTO_set_dynlock_create_callback has been deprecated since openSSL 1.0.1.
  12676. * This function exists for compatibility purposes because wolfSSL satisfies
  12677. * thread safety without relying on the callback.
  12678. */
  12679. void wolfSSL_set_dynlock_create_callback(WOLFSSL_dynlock_value* (*f)(
  12680. const char*, int))
  12681. {
  12682. WOLFSSL_STUB("CRYPTO_set_dynlock_create_callback");
  12683. (void)f;
  12684. }
  12685. /* wolfSSL_set_dynlock_lock_callback
  12686. * CRYPTO_set_dynlock_lock_callback has been deprecated since openSSL 1.0.1.
  12687. * This function exists for compatibility purposes because wolfSSL satisfies
  12688. * thread safety without relying on the callback.
  12689. */
  12690. void wolfSSL_set_dynlock_lock_callback(
  12691. void (*f)(int, WOLFSSL_dynlock_value*, const char*, int))
  12692. {
  12693. WOLFSSL_STUB("CRYPTO_set_set_dynlock_lock_callback");
  12694. (void)f;
  12695. }
  12696. /* wolfSSL_set_dynlock_destroy_callback
  12697. * CRYPTO_set_dynlock_destroy_callback has been deprecated since openSSL 1.0.1.
  12698. * This function exists for compatibility purposes because wolfSSL satisfies
  12699. * thread safety without relying on the callback.
  12700. */
  12701. void wolfSSL_set_dynlock_destroy_callback(
  12702. void (*f)(WOLFSSL_dynlock_value*, const char*, int))
  12703. {
  12704. WOLFSSL_STUB("CRYPTO_set_set_dynlock_destroy_callback");
  12705. (void)f;
  12706. }
  12707. #endif /* OPENSSL_EXTRA */
  12708. #ifdef OPENSSL_EXTRA
  12709. #ifndef NO_CERTS
  12710. #if !defined(NO_ASN) && !defined(NO_PWDBASED)
  12711. /* Copies unencrypted DER key buffer into "der". If "der" is null then the size
  12712. * of buffer needed is returned. If *der == NULL then it allocates a buffer.
  12713. * NOTE: This also advances the "der" pointer to be at the end of buffer.
  12714. *
  12715. * Returns size of key buffer on success
  12716. */
  12717. int wolfSSL_i2d_PrivateKey(const WOLFSSL_EVP_PKEY* key, unsigned char** der)
  12718. {
  12719. return wolfSSL_EVP_PKEY_get_der(key, der);
  12720. }
  12721. int wolfSSL_i2d_PublicKey(const WOLFSSL_EVP_PKEY *key, unsigned char **der)
  12722. {
  12723. #if !defined(NO_RSA) || defined(HAVE_ECC)
  12724. #ifdef HAVE_ECC
  12725. unsigned char *local_der = NULL;
  12726. word32 local_derSz = 0;
  12727. unsigned char *pub_der = NULL;
  12728. ecc_key *eccKey = NULL;
  12729. word32 inOutIdx = 0;
  12730. #endif
  12731. word32 pub_derSz = 0;
  12732. int ret;
  12733. int key_type = 0;
  12734. if (key == NULL) {
  12735. return WOLFSSL_FATAL_ERROR;
  12736. }
  12737. key_type = key->type;
  12738. if ((key_type != EVP_PKEY_EC) && (key_type != EVP_PKEY_RSA)) {
  12739. return WOLFSSL_FATAL_ERROR;
  12740. }
  12741. #ifndef NO_RSA
  12742. if (key_type == EVP_PKEY_RSA) {
  12743. return wolfSSL_i2d_RSAPublicKey(key->rsa, der);
  12744. }
  12745. #endif
  12746. /* Now that RSA is taken care of, we only need to consider the ECC case. */
  12747. #ifdef HAVE_ECC
  12748. /* We need to get the DER, then convert it to a public key. But what we get
  12749. * might be a buffered private key so we need to decode it and then encode
  12750. * the public part. */
  12751. ret = wolfSSL_EVP_PKEY_get_der(key, &local_der);
  12752. if (ret <= 0) {
  12753. /* In this case, there was no buffered DER at all. This could be the
  12754. * case where the key that was passed in was generated. So now we
  12755. * have to create the local DER. */
  12756. local_derSz = wolfSSL_i2d_ECPrivateKey(key->ecc, &local_der);
  12757. if (local_derSz == 0) {
  12758. ret = WOLFSSL_FATAL_ERROR;
  12759. }
  12760. } else {
  12761. local_derSz = ret;
  12762. ret = 0;
  12763. }
  12764. if (ret == 0) {
  12765. eccKey = (ecc_key *)XMALLOC(sizeof(*eccKey), NULL, DYNAMIC_TYPE_ECC);
  12766. if (eccKey == NULL) {
  12767. WOLFSSL_MSG("Failed to allocate key buffer.");
  12768. ret = WOLFSSL_FATAL_ERROR;
  12769. }
  12770. }
  12771. if (ret == 0) {
  12772. ret = wc_ecc_init(eccKey);
  12773. }
  12774. if (ret == 0) {
  12775. ret = wc_EccPublicKeyDecode(local_der, &inOutIdx, eccKey, local_derSz);
  12776. if (ret < 0) {
  12777. /* We now try again as x.963 [point type][x][opt y]. */
  12778. ret = wc_ecc_import_x963(local_der, local_derSz, eccKey);
  12779. }
  12780. }
  12781. if (ret == 0) {
  12782. pub_derSz = wc_EccPublicKeyDerSize(eccKey, 0);
  12783. if ((int)pub_derSz <= 0) {
  12784. ret = WOLFSSL_FAILURE;
  12785. }
  12786. }
  12787. if (ret == 0) {
  12788. pub_der = (unsigned char*)XMALLOC(pub_derSz, NULL,
  12789. DYNAMIC_TYPE_PUBLIC_KEY);
  12790. if (pub_der == NULL) {
  12791. WOLFSSL_MSG("Failed to allocate output buffer.");
  12792. ret = WOLFSSL_FATAL_ERROR;
  12793. }
  12794. }
  12795. if (ret == 0) {
  12796. pub_derSz = wc_EccPublicKeyToDer(eccKey, pub_der, pub_derSz, 0);
  12797. if ((int)pub_derSz <= 0) {
  12798. ret = WOLFSSL_FATAL_ERROR;
  12799. }
  12800. }
  12801. /* This block is for actually returning the DER of the public key */
  12802. if ((ret == 0) && (der != NULL)) {
  12803. if (*der == NULL) {
  12804. *der = (unsigned char*)XMALLOC(pub_derSz, NULL,
  12805. DYNAMIC_TYPE_PUBLIC_KEY);
  12806. if (*der == NULL) {
  12807. WOLFSSL_MSG("Failed to allocate output buffer.");
  12808. ret = WOLFSSL_FATAL_ERROR;
  12809. }
  12810. if (ret == 0) {
  12811. XMEMCPY(*der, pub_der, pub_derSz);
  12812. }
  12813. }
  12814. else {
  12815. XMEMCPY(*der, pub_der, pub_derSz);
  12816. *der += pub_derSz;
  12817. }
  12818. }
  12819. XFREE(pub_der, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
  12820. XFREE(local_der, NULL, DYNAMIC_TYPE_PUBLIC_KEY);
  12821. wc_ecc_free(eccKey);
  12822. XFREE(eccKey, NULL, DYNAMIC_TYPE_ECC);
  12823. #else
  12824. ret = WOLFSSL_FATAL_ERROR;
  12825. #endif /* HAVE_ECC */
  12826. if (ret == 0) {
  12827. return pub_derSz;
  12828. }
  12829. return ret;
  12830. #else
  12831. return WOLFSSL_FATAL_ERROR;
  12832. #endif /* !NO_RSA || HAVE_ECC */
  12833. }
  12834. #endif /* !NO_ASN && !NO_PWDBASED */
  12835. #endif /* !NO_CERTS */
  12836. #endif /* OPENSSL_EXTRA */
  12837. #ifdef OPENSSL_EXTRA
  12838. /* Sets the DNS hostname to name.
  12839. * Hostname is cleared if name is NULL or empty. */
  12840. int wolfSSL_set1_host(WOLFSSL * ssl, const char* name)
  12841. {
  12842. if (ssl == NULL) {
  12843. return WOLFSSL_FAILURE;
  12844. }
  12845. return wolfSSL_X509_VERIFY_PARAM_set1_host(ssl->param, name, 0);
  12846. }
  12847. /******************************************************************************
  12848. * wolfSSL_CTX_set1_param - set a pointer to the SSL verification parameters
  12849. *
  12850. * RETURNS:
  12851. * WOLFSSL_SUCCESS on success, otherwise returns WOLFSSL_FAILURE
  12852. * Note: Returns WOLFSSL_SUCCESS, in case either parameter is NULL,
  12853. * same as openssl.
  12854. */
  12855. int wolfSSL_CTX_set1_param(WOLFSSL_CTX* ctx, WOLFSSL_X509_VERIFY_PARAM *vpm)
  12856. {
  12857. if (ctx == NULL || vpm == NULL)
  12858. return WOLFSSL_SUCCESS;
  12859. return wolfSSL_X509_VERIFY_PARAM_set1(ctx->param, vpm);
  12860. }
  12861. /******************************************************************************
  12862. * wolfSSL_CTX/_get0_param - return a pointer to the SSL verification parameters
  12863. *
  12864. * RETURNS:
  12865. * returns pointer to the SSL verification parameters on success,
  12866. * otherwise returns NULL
  12867. */
  12868. WOLFSSL_X509_VERIFY_PARAM* wolfSSL_CTX_get0_param(WOLFSSL_CTX* ctx)
  12869. {
  12870. if (ctx == NULL) {
  12871. return NULL;
  12872. }
  12873. return ctx->param;
  12874. }
  12875. WOLFSSL_X509_VERIFY_PARAM* wolfSSL_get0_param(WOLFSSL* ssl)
  12876. {
  12877. if (ssl == NULL) {
  12878. return NULL;
  12879. }
  12880. return ssl->param;
  12881. }
  12882. #endif /* OPENSSL_EXTRA */
  12883. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  12884. /* Gets an index to store SSL structure at.
  12885. *
  12886. * Returns positive index on success and negative values on failure
  12887. */
  12888. int wolfSSL_get_ex_data_X509_STORE_CTX_idx(void)
  12889. {
  12890. WOLFSSL_ENTER("wolfSSL_get_ex_data_X509_STORE_CTX_idx");
  12891. /* store SSL at index 0 */
  12892. return 0;
  12893. }
  12894. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  12895. #ifdef OPENSSL_EXTRA
  12896. /* Sets a function callback that will send information about the state of all
  12897. * WOLFSSL objects that have been created by the WOLFSSL_CTX structure passed
  12898. * in.
  12899. *
  12900. * ctx WOLFSSL_CTX structure to set callback function in
  12901. * f callback function to use
  12902. */
  12903. void wolfSSL_CTX_set_info_callback(WOLFSSL_CTX* ctx,
  12904. void (*f)(const WOLFSSL* ssl, int type, int val))
  12905. {
  12906. WOLFSSL_ENTER("wolfSSL_CTX_set_info_callback");
  12907. if (ctx == NULL) {
  12908. WOLFSSL_MSG("Bad function argument");
  12909. }
  12910. else {
  12911. ctx->CBIS = f;
  12912. }
  12913. }
  12914. void wolfSSL_set_info_callback(WOLFSSL* ssl,
  12915. void (*f)(const WOLFSSL* ssl, int type, int val))
  12916. {
  12917. WOLFSSL_ENTER("wolfSSL_set_info_callback");
  12918. if (ssl == NULL) {
  12919. WOLFSSL_MSG("Bad function argument");
  12920. }
  12921. else {
  12922. ssl->CBIS = f;
  12923. }
  12924. }
  12925. unsigned long wolfSSL_ERR_peek_error(void)
  12926. {
  12927. WOLFSSL_ENTER("wolfSSL_ERR_peek_error");
  12928. return wolfSSL_ERR_peek_error_line_data(NULL, NULL, NULL, NULL);
  12929. }
  12930. int wolfSSL_ERR_GET_LIB(unsigned long err)
  12931. {
  12932. unsigned long value;
  12933. value = (err & 0xFFFFFFL);
  12934. switch (value) {
  12935. case -SSL_R_HTTP_REQUEST:
  12936. return ERR_LIB_SSL;
  12937. case -ASN_NO_PEM_HEADER:
  12938. case PEM_R_NO_START_LINE:
  12939. case PEM_R_PROBLEMS_GETTING_PASSWORD:
  12940. case PEM_R_BAD_PASSWORD_READ:
  12941. case PEM_R_BAD_DECRYPT:
  12942. return ERR_LIB_PEM;
  12943. case EVP_R_BAD_DECRYPT:
  12944. case EVP_R_BN_DECODE_ERROR:
  12945. case EVP_R_DECODE_ERROR:
  12946. case EVP_R_PRIVATE_KEY_DECODE_ERROR:
  12947. return ERR_LIB_EVP;
  12948. case ASN1_R_HEADER_TOO_LONG:
  12949. return ERR_LIB_ASN1;
  12950. default:
  12951. return 0;
  12952. }
  12953. }
  12954. /* This function is to find global error values that are the same through out
  12955. * all library version. With wolfSSL having only one set of error codes the
  12956. * return value is pretty straight forward. The only thing needed is all wolfSSL
  12957. * error values are typically negative.
  12958. *
  12959. * Returns the error reason
  12960. */
  12961. int wolfSSL_ERR_GET_REASON(unsigned long err)
  12962. {
  12963. int ret = (int)err;
  12964. WOLFSSL_ENTER("wolfSSL_ERR_GET_REASON");
  12965. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY)
  12966. /* Nginx looks for this error to know to stop parsing certificates.
  12967. * Same for HAProxy. */
  12968. if (err == ((ERR_LIB_PEM << 24) | PEM_R_NO_START_LINE) ||
  12969. ((err & 0xFFFFFFL) == -ASN_NO_PEM_HEADER) ||
  12970. ((err & 0xFFFL) == PEM_R_NO_START_LINE ))
  12971. return PEM_R_NO_START_LINE;
  12972. if (err == ((ERR_LIB_SSL << 24) | -SSL_R_HTTP_REQUEST))
  12973. return SSL_R_HTTP_REQUEST;
  12974. #endif
  12975. #if defined(OPENSSL_ALL) && defined(WOLFSSL_PYTHON)
  12976. if (err == ((ERR_LIB_ASN1 << 24) | ASN1_R_HEADER_TOO_LONG))
  12977. return ASN1_R_HEADER_TOO_LONG;
  12978. #endif
  12979. /* check if error value is in range of wolfSSL errors */
  12980. ret = 0 - ret; /* setting as negative value */
  12981. /* wolfCrypt range is less than MAX (-100)
  12982. wolfSSL range is MIN (-300) and lower */
  12983. if (ret < MAX_CODE_E && ret > MIN_CODE_E) {
  12984. return ret;
  12985. }
  12986. else {
  12987. WOLFSSL_MSG("Not in range of typical error values");
  12988. ret = (int)err;
  12989. }
  12990. return ret;
  12991. }
  12992. /* returns a string that describes the alert
  12993. *
  12994. * alertID the alert value to look up
  12995. */
  12996. const char* wolfSSL_alert_type_string_long(int alertID)
  12997. {
  12998. WOLFSSL_ENTER("wolfSSL_alert_type_string_long");
  12999. return AlertTypeToString(alertID);
  13000. }
  13001. const char* wolfSSL_alert_desc_string_long(int alertID)
  13002. {
  13003. WOLFSSL_ENTER("wolfSSL_alert_desc_string_long");
  13004. return AlertTypeToString(alertID);
  13005. }
  13006. #define STATE_STRINGS_PROTO(s) \
  13007. { \
  13008. {"SSLv3 " s, \
  13009. "SSLv3 " s, \
  13010. "SSLv3 " s}, \
  13011. {"TLSv1 " s, \
  13012. "TLSv1 " s, \
  13013. "TLSv1 " s}, \
  13014. {"TLSv1_1 " s, \
  13015. "TLSv1_1 " s, \
  13016. "TLSv1_1 " s}, \
  13017. {"TLSv1_2 " s, \
  13018. "TLSv1_2 " s, \
  13019. "TLSv1_2 " s}, \
  13020. {"TLSv1_3 " s, \
  13021. "TLSv1_3 " s, \
  13022. "TLSv1_3 " s}, \
  13023. {"DTLSv1 " s, \
  13024. "DTLSv1 " s, \
  13025. "DTLSv1 " s}, \
  13026. {"DTLSv1_2 " s, \
  13027. "DTLSv1_2 " s, \
  13028. "DTLSv1_2 " s}, \
  13029. {"DTLSv1_3 " s, \
  13030. "DTLSv1_3 " s, \
  13031. "DTLSv1_3 " s}, \
  13032. }
  13033. #define STATE_STRINGS_PROTO_RW(s) \
  13034. { \
  13035. {"SSLv3 read " s, \
  13036. "SSLv3 write " s, \
  13037. "SSLv3 " s}, \
  13038. {"TLSv1 read " s, \
  13039. "TLSv1 write " s, \
  13040. "TLSv1 " s}, \
  13041. {"TLSv1_1 read " s, \
  13042. "TLSv1_1 write " s, \
  13043. "TLSv1_1 " s}, \
  13044. {"TLSv1_2 read " s, \
  13045. "TLSv1_2 write " s, \
  13046. "TLSv1_2 " s}, \
  13047. {"TLSv1_3 read " s, \
  13048. "TLSv1_3 write " s, \
  13049. "TLSv1_3 " s}, \
  13050. {"DTLSv1 read " s, \
  13051. "DTLSv1 write " s, \
  13052. "DTLSv1 " s}, \
  13053. {"DTLSv1_2 read " s, \
  13054. "DTLSv1_2 write " s, \
  13055. "DTLSv1_2 " s}, \
  13056. {"DTLSv1_3 read " s, \
  13057. "DTLSv1_3 write " s, \
  13058. "DTLSv1_3 " s}, \
  13059. }
  13060. /* Gets the current state of the WOLFSSL structure
  13061. *
  13062. * ssl WOLFSSL structure to get state of
  13063. *
  13064. * Returns a human readable string of the WOLFSSL structure state
  13065. */
  13066. const char* wolfSSL_state_string_long(const WOLFSSL* ssl)
  13067. {
  13068. static const char* OUTPUT_STR[24][8][3] = {
  13069. STATE_STRINGS_PROTO("Initialization"),
  13070. STATE_STRINGS_PROTO_RW("Server Hello Request"),
  13071. STATE_STRINGS_PROTO_RW("Server Hello Verify Request"),
  13072. STATE_STRINGS_PROTO_RW("Server Hello Retry Request"),
  13073. STATE_STRINGS_PROTO_RW("Server Hello"),
  13074. STATE_STRINGS_PROTO_RW("Server Certificate Status"),
  13075. STATE_STRINGS_PROTO_RW("Server Encrypted Extensions"),
  13076. STATE_STRINGS_PROTO_RW("Server Session Ticket"),
  13077. STATE_STRINGS_PROTO_RW("Server Certificate Request"),
  13078. STATE_STRINGS_PROTO_RW("Server Cert"),
  13079. STATE_STRINGS_PROTO_RW("Server Key Exchange"),
  13080. STATE_STRINGS_PROTO_RW("Server Hello Done"),
  13081. STATE_STRINGS_PROTO_RW("Server Change CipherSpec"),
  13082. STATE_STRINGS_PROTO_RW("Server Finished"),
  13083. STATE_STRINGS_PROTO_RW("server Key Update"),
  13084. STATE_STRINGS_PROTO_RW("Client Hello"),
  13085. STATE_STRINGS_PROTO_RW("Client Key Exchange"),
  13086. STATE_STRINGS_PROTO_RW("Client Cert"),
  13087. STATE_STRINGS_PROTO_RW("Client Change CipherSpec"),
  13088. STATE_STRINGS_PROTO_RW("Client Certificate Verify"),
  13089. STATE_STRINGS_PROTO_RW("Client End Of Early Data"),
  13090. STATE_STRINGS_PROTO_RW("Client Finished"),
  13091. STATE_STRINGS_PROTO_RW("Client Key Update"),
  13092. STATE_STRINGS_PROTO("Handshake Done"),
  13093. };
  13094. enum ProtocolVer {
  13095. SSL_V3 = 0,
  13096. TLS_V1,
  13097. TLS_V1_1,
  13098. TLS_V1_2,
  13099. TLS_V1_3,
  13100. DTLS_V1,
  13101. DTLS_V1_2,
  13102. DTLS_V1_3,
  13103. UNKNOWN = 100
  13104. };
  13105. enum IOMode {
  13106. SS_READ = 0,
  13107. SS_WRITE,
  13108. SS_NEITHER
  13109. };
  13110. enum SslState {
  13111. ss_null_state = 0,
  13112. ss_server_hellorequest,
  13113. ss_server_helloverify,
  13114. ss_server_helloretryrequest,
  13115. ss_server_hello,
  13116. ss_server_certificatestatus,
  13117. ss_server_encryptedextensions,
  13118. ss_server_sessionticket,
  13119. ss_server_certrequest,
  13120. ss_server_cert,
  13121. ss_server_keyexchange,
  13122. ss_server_hellodone,
  13123. ss_server_changecipherspec,
  13124. ss_server_finished,
  13125. ss_server_keyupdate,
  13126. ss_client_hello,
  13127. ss_client_keyexchange,
  13128. ss_client_cert,
  13129. ss_client_changecipherspec,
  13130. ss_client_certverify,
  13131. ss_client_endofearlydata,
  13132. ss_client_finished,
  13133. ss_client_keyupdate,
  13134. ss_handshake_done
  13135. };
  13136. int protocol = 0;
  13137. int cbmode = 0;
  13138. int state = 0;
  13139. WOLFSSL_ENTER("wolfSSL_state_string_long");
  13140. if (ssl == NULL) {
  13141. WOLFSSL_MSG("Null argument passed in");
  13142. return NULL;
  13143. }
  13144. /* Get state of callback */
  13145. if (ssl->cbmode == SSL_CB_MODE_WRITE) {
  13146. cbmode = SS_WRITE;
  13147. }
  13148. else if (ssl->cbmode == SSL_CB_MODE_READ) {
  13149. cbmode = SS_READ;
  13150. }
  13151. else {
  13152. cbmode = SS_NEITHER;
  13153. }
  13154. /* Get protocol version */
  13155. switch (ssl->version.major) {
  13156. case SSLv3_MAJOR:
  13157. switch (ssl->version.minor) {
  13158. case SSLv3_MINOR:
  13159. protocol = SSL_V3;
  13160. break;
  13161. case TLSv1_MINOR:
  13162. protocol = TLS_V1;
  13163. break;
  13164. case TLSv1_1_MINOR:
  13165. protocol = TLS_V1_1;
  13166. break;
  13167. case TLSv1_2_MINOR:
  13168. protocol = TLS_V1_2;
  13169. break;
  13170. case TLSv1_3_MINOR:
  13171. protocol = TLS_V1_3;
  13172. break;
  13173. default:
  13174. protocol = UNKNOWN;
  13175. }
  13176. break;
  13177. case DTLS_MAJOR:
  13178. switch (ssl->version.minor) {
  13179. case DTLS_MINOR:
  13180. protocol = DTLS_V1;
  13181. break;
  13182. case DTLSv1_2_MINOR:
  13183. protocol = DTLS_V1_2;
  13184. break;
  13185. case DTLSv1_3_MINOR:
  13186. protocol = DTLS_V1_3;
  13187. break;
  13188. default:
  13189. protocol = UNKNOWN;
  13190. }
  13191. break;
  13192. default:
  13193. protocol = UNKNOWN;
  13194. }
  13195. /* accept process */
  13196. if (ssl->cbmode == SSL_CB_MODE_READ) {
  13197. state = ssl->cbtype;
  13198. switch (state) {
  13199. case hello_request:
  13200. state = ss_server_hellorequest;
  13201. break;
  13202. case client_hello:
  13203. state = ss_client_hello;
  13204. break;
  13205. case server_hello:
  13206. state = ss_server_hello;
  13207. break;
  13208. case hello_verify_request:
  13209. state = ss_server_helloverify;
  13210. break;
  13211. case session_ticket:
  13212. state = ss_server_sessionticket;
  13213. break;
  13214. case end_of_early_data:
  13215. state = ss_client_endofearlydata;
  13216. break;
  13217. case hello_retry_request:
  13218. state = ss_server_helloretryrequest;
  13219. break;
  13220. case encrypted_extensions:
  13221. state = ss_server_encryptedextensions;
  13222. break;
  13223. case certificate:
  13224. if (ssl->options.side == WOLFSSL_SERVER_END)
  13225. state = ss_client_cert;
  13226. else if (ssl->options.side == WOLFSSL_CLIENT_END)
  13227. state = ss_server_cert;
  13228. else {
  13229. WOLFSSL_MSG("Unknown State");
  13230. state = ss_null_state;
  13231. }
  13232. break;
  13233. case server_key_exchange:
  13234. state = ss_server_keyexchange;
  13235. break;
  13236. case certificate_request:
  13237. state = ss_server_certrequest;
  13238. break;
  13239. case server_hello_done:
  13240. state = ss_server_hellodone;
  13241. break;
  13242. case certificate_verify:
  13243. state = ss_client_certverify;
  13244. break;
  13245. case client_key_exchange:
  13246. state = ss_client_keyexchange;
  13247. break;
  13248. case finished:
  13249. if (ssl->options.side == WOLFSSL_SERVER_END)
  13250. state = ss_client_finished;
  13251. else if (ssl->options.side == WOLFSSL_CLIENT_END)
  13252. state = ss_server_finished;
  13253. else {
  13254. WOLFSSL_MSG("Unknown State");
  13255. state = ss_null_state;
  13256. }
  13257. break;
  13258. case certificate_status:
  13259. state = ss_server_certificatestatus;
  13260. break;
  13261. case key_update:
  13262. if (ssl->options.side == WOLFSSL_SERVER_END)
  13263. state = ss_client_keyupdate;
  13264. else if (ssl->options.side == WOLFSSL_CLIENT_END)
  13265. state = ss_server_keyupdate;
  13266. else {
  13267. WOLFSSL_MSG("Unknown State");
  13268. state = ss_null_state;
  13269. }
  13270. break;
  13271. case change_cipher_hs:
  13272. if (ssl->options.side == WOLFSSL_SERVER_END)
  13273. state = ss_client_changecipherspec;
  13274. else if (ssl->options.side == WOLFSSL_CLIENT_END)
  13275. state = ss_server_changecipherspec;
  13276. else {
  13277. WOLFSSL_MSG("Unknown State");
  13278. state = ss_null_state;
  13279. }
  13280. break;
  13281. default:
  13282. WOLFSSL_MSG("Unknown State");
  13283. state = ss_null_state;
  13284. }
  13285. }
  13286. else {
  13287. /* Send process */
  13288. if (ssl->options.side == WOLFSSL_SERVER_END)
  13289. state = ssl->options.serverState;
  13290. else
  13291. state = ssl->options.clientState;
  13292. switch (state) {
  13293. case SERVER_HELLOVERIFYREQUEST_COMPLETE:
  13294. state = ss_server_helloverify;
  13295. break;
  13296. case SERVER_HELLO_RETRY_REQUEST_COMPLETE:
  13297. state = ss_server_helloretryrequest;
  13298. break;
  13299. case SERVER_HELLO_COMPLETE:
  13300. state = ss_server_hello;
  13301. break;
  13302. case SERVER_ENCRYPTED_EXTENSIONS_COMPLETE:
  13303. state = ss_server_encryptedextensions;
  13304. break;
  13305. case SERVER_CERT_COMPLETE:
  13306. state = ss_server_cert;
  13307. break;
  13308. case SERVER_KEYEXCHANGE_COMPLETE:
  13309. state = ss_server_keyexchange;
  13310. break;
  13311. case SERVER_HELLODONE_COMPLETE:
  13312. state = ss_server_hellodone;
  13313. break;
  13314. case SERVER_CHANGECIPHERSPEC_COMPLETE:
  13315. state = ss_server_changecipherspec;
  13316. break;
  13317. case SERVER_FINISHED_COMPLETE:
  13318. state = ss_server_finished;
  13319. break;
  13320. case CLIENT_HELLO_RETRY:
  13321. case CLIENT_HELLO_COMPLETE:
  13322. state = ss_client_hello;
  13323. break;
  13324. case CLIENT_KEYEXCHANGE_COMPLETE:
  13325. state = ss_client_keyexchange;
  13326. break;
  13327. case CLIENT_CHANGECIPHERSPEC_COMPLETE:
  13328. state = ss_client_changecipherspec;
  13329. break;
  13330. case CLIENT_FINISHED_COMPLETE:
  13331. state = ss_client_finished;
  13332. break;
  13333. case HANDSHAKE_DONE:
  13334. state = ss_handshake_done;
  13335. break;
  13336. default:
  13337. WOLFSSL_MSG("Unknown State");
  13338. state = ss_null_state;
  13339. }
  13340. }
  13341. if (protocol == UNKNOWN) {
  13342. WOLFSSL_MSG("Unknown protocol");
  13343. return "";
  13344. }
  13345. else {
  13346. return OUTPUT_STR[state][protocol][cbmode];
  13347. }
  13348. }
  13349. #endif /* OPENSSL_EXTRA */
  13350. static long wolf_set_options(long old_op, long op)
  13351. {
  13352. /* if SSL_OP_ALL then turn all bug workarounds on */
  13353. if ((op & WOLFSSL_OP_ALL) == WOLFSSL_OP_ALL) {
  13354. WOLFSSL_MSG("\tSSL_OP_ALL");
  13355. }
  13356. /* by default cookie exchange is on with DTLS */
  13357. if ((op & WOLFSSL_OP_COOKIE_EXCHANGE) == WOLFSSL_OP_COOKIE_EXCHANGE) {
  13358. WOLFSSL_MSG("\tSSL_OP_COOKIE_EXCHANGE : on by default");
  13359. }
  13360. if ((op & WOLFSSL_OP_NO_SSLv2) == WOLFSSL_OP_NO_SSLv2) {
  13361. WOLFSSL_MSG("\tWOLFSSL_OP_NO_SSLv2 : wolfSSL does not support SSLv2");
  13362. }
  13363. #ifdef SSL_OP_NO_TLSv1_3
  13364. if ((op & WOLFSSL_OP_NO_TLSv1_3) == WOLFSSL_OP_NO_TLSv1_3) {
  13365. WOLFSSL_MSG("\tSSL_OP_NO_TLSv1_3");
  13366. }
  13367. #endif
  13368. if ((op & WOLFSSL_OP_NO_TLSv1_2) == WOLFSSL_OP_NO_TLSv1_2) {
  13369. WOLFSSL_MSG("\tSSL_OP_NO_TLSv1_2");
  13370. }
  13371. if ((op & WOLFSSL_OP_NO_TLSv1_1) == WOLFSSL_OP_NO_TLSv1_1) {
  13372. WOLFSSL_MSG("\tSSL_OP_NO_TLSv1_1");
  13373. }
  13374. if ((op & WOLFSSL_OP_NO_TLSv1) == WOLFSSL_OP_NO_TLSv1) {
  13375. WOLFSSL_MSG("\tSSL_OP_NO_TLSv1");
  13376. }
  13377. if ((op & WOLFSSL_OP_NO_SSLv3) == WOLFSSL_OP_NO_SSLv3) {
  13378. WOLFSSL_MSG("\tSSL_OP_NO_SSLv3");
  13379. }
  13380. if ((op & WOLFSSL_OP_CIPHER_SERVER_PREFERENCE) ==
  13381. WOLFSSL_OP_CIPHER_SERVER_PREFERENCE) {
  13382. WOLFSSL_MSG("\tWOLFSSL_OP_CIPHER_SERVER_PREFERENCE");
  13383. }
  13384. if ((op & WOLFSSL_OP_NO_COMPRESSION) == WOLFSSL_OP_NO_COMPRESSION) {
  13385. #ifdef HAVE_LIBZ
  13386. WOLFSSL_MSG("SSL_OP_NO_COMPRESSION");
  13387. #else
  13388. WOLFSSL_MSG("SSL_OP_NO_COMPRESSION: compression not compiled in");
  13389. #endif
  13390. }
  13391. return old_op | op;
  13392. }
  13393. long wolfSSL_set_options(WOLFSSL* ssl, long op)
  13394. {
  13395. word16 haveRSA = 1;
  13396. word16 havePSK = 0;
  13397. int keySz = 0;
  13398. WOLFSSL_ENTER("wolfSSL_set_options");
  13399. if (ssl == NULL) {
  13400. return 0;
  13401. }
  13402. ssl->options.mask = wolf_set_options(ssl->options.mask, op);
  13403. if ((ssl->options.mask & WOLFSSL_OP_NO_TLSv1_3) == WOLFSSL_OP_NO_TLSv1_3) {
  13404. if (ssl->version.minor == TLSv1_3_MINOR)
  13405. ssl->version.minor = TLSv1_2_MINOR;
  13406. }
  13407. if ((ssl->options.mask & WOLFSSL_OP_NO_TLSv1_2) == WOLFSSL_OP_NO_TLSv1_2) {
  13408. if (ssl->version.minor == TLSv1_2_MINOR)
  13409. ssl->version.minor = TLSv1_1_MINOR;
  13410. }
  13411. if ((ssl->options.mask & WOLFSSL_OP_NO_TLSv1_1) == WOLFSSL_OP_NO_TLSv1_1) {
  13412. if (ssl->version.minor == TLSv1_1_MINOR)
  13413. ssl->version.minor = TLSv1_MINOR;
  13414. }
  13415. if ((ssl->options.mask & WOLFSSL_OP_NO_TLSv1) == WOLFSSL_OP_NO_TLSv1) {
  13416. if (ssl->version.minor == TLSv1_MINOR)
  13417. ssl->version.minor = SSLv3_MINOR;
  13418. }
  13419. if ((ssl->options.mask & WOLFSSL_OP_NO_COMPRESSION)
  13420. == WOLFSSL_OP_NO_COMPRESSION) {
  13421. #ifdef HAVE_LIBZ
  13422. ssl->options.usingCompression = 0;
  13423. #endif
  13424. }
  13425. #if defined(HAVE_SESSION_TICKET) && (defined(OPENSSL_EXTRA) \
  13426. || defined(HAVE_WEBSERVER) || defined(WOLFSSL_WPAS_SMALL))
  13427. if ((ssl->options.mask & WOLFSSL_OP_NO_TICKET) == WOLFSSL_OP_NO_TICKET) {
  13428. ssl->options.noTicketTls12 = 1;
  13429. }
  13430. #endif
  13431. /* in the case of a version change the cipher suites should be reset */
  13432. #ifndef NO_PSK
  13433. havePSK = ssl->options.havePSK;
  13434. #endif
  13435. #ifdef NO_RSA
  13436. haveRSA = 0;
  13437. #endif
  13438. #ifndef NO_CERTS
  13439. keySz = ssl->buffers.keySz;
  13440. #endif
  13441. if (ssl->options.side != WOLFSSL_NEITHER_END) {
  13442. if (AllocateSuites(ssl) != 0)
  13443. return 0;
  13444. InitSuites(ssl->suites, ssl->version, keySz, haveRSA, havePSK,
  13445. ssl->options.haveDH, ssl->options.haveECDSAsig,
  13446. ssl->options.haveECC, TRUE, ssl->options.haveStaticECC,
  13447. ssl->options.haveFalconSig, ssl->options.haveDilithiumSig,
  13448. ssl->options.useAnon, TRUE, ssl->options.side);
  13449. }
  13450. return ssl->options.mask;
  13451. }
  13452. long wolfSSL_get_options(const WOLFSSL* ssl)
  13453. {
  13454. WOLFSSL_ENTER("wolfSSL_get_options");
  13455. if(ssl == NULL)
  13456. return WOLFSSL_FAILURE;
  13457. return ssl->options.mask;
  13458. }
  13459. #if defined(HAVE_SECURE_RENEGOTIATION) \
  13460. || defined(HAVE_SERVER_RENEGOTIATION_INFO)
  13461. /* clears the counter for number of renegotiations done
  13462. * returns the current count before it is cleared */
  13463. long wolfSSL_clear_num_renegotiations(WOLFSSL *s)
  13464. {
  13465. long total;
  13466. WOLFSSL_ENTER("wolfSSL_clear_num_renegotiations");
  13467. if (s == NULL)
  13468. return 0;
  13469. total = s->secure_rene_count;
  13470. s->secure_rene_count = 0;
  13471. return total;
  13472. }
  13473. /* return the number of renegotiations since wolfSSL_new */
  13474. long wolfSSL_total_renegotiations(WOLFSSL *s)
  13475. {
  13476. WOLFSSL_ENTER("wolfSSL_total_renegotiations");
  13477. return wolfSSL_num_renegotiations(s);
  13478. }
  13479. /* return the number of renegotiations since wolfSSL_new */
  13480. long wolfSSL_num_renegotiations(WOLFSSL* s)
  13481. {
  13482. if (s == NULL) {
  13483. return 0;
  13484. }
  13485. return s->secure_rene_count;
  13486. }
  13487. /* Is there a renegotiation currently in progress? */
  13488. int wolfSSL_SSL_renegotiate_pending(WOLFSSL *s)
  13489. {
  13490. return s && s->options.handShakeDone &&
  13491. s->options.handShakeState != HANDSHAKE_DONE ? 1 : 0;
  13492. }
  13493. #endif /* HAVE_SECURE_RENEGOTIATION || HAVE_SERVER_RENEGOTIATION_INFO */
  13494. #ifdef OPENSSL_EXTRA
  13495. long wolfSSL_clear_options(WOLFSSL* ssl, long opt)
  13496. {
  13497. WOLFSSL_ENTER("wolfSSL_clear_options");
  13498. if(ssl == NULL)
  13499. return WOLFSSL_FAILURE;
  13500. ssl->options.mask &= ~opt;
  13501. return ssl->options.mask;
  13502. }
  13503. #ifdef HAVE_PK_CALLBACKS
  13504. long wolfSSL_set_tlsext_debug_arg(WOLFSSL* ssl, void *arg)
  13505. {
  13506. if (ssl == NULL) {
  13507. return WOLFSSL_FAILURE;
  13508. }
  13509. ssl->loggingCtx = arg;
  13510. return WOLFSSL_SUCCESS;
  13511. }
  13512. #endif /* HAVE_PK_CALLBACKS */
  13513. /*** TBD ***/
  13514. #ifndef NO_WOLFSSL_STUB
  13515. int wolfSSL_sk_SSL_COMP_zero(WOLFSSL_STACK* st)
  13516. {
  13517. (void)st;
  13518. WOLFSSL_STUB("wolfSSL_sk_SSL_COMP_zero");
  13519. /* wolfSSL_set_options(ssl, SSL_OP_NO_COMPRESSION); */
  13520. return WOLFSSL_FAILURE;
  13521. }
  13522. #endif
  13523. #ifdef HAVE_CERTIFICATE_STATUS_REQUEST
  13524. long wolfSSL_set_tlsext_status_type(WOLFSSL *s, int type)
  13525. {
  13526. WOLFSSL_ENTER("wolfSSL_set_tlsext_status_type");
  13527. if (s == NULL){
  13528. return BAD_FUNC_ARG;
  13529. }
  13530. if (type == TLSEXT_STATUSTYPE_ocsp){
  13531. int r = TLSX_UseCertificateStatusRequest(&s->extensions, (byte)type, 0,
  13532. s, s->heap, s->devId);
  13533. return (long)r;
  13534. } else {
  13535. WOLFSSL_MSG(
  13536. "SSL_set_tlsext_status_type only supports TLSEXT_STATUSTYPE_ocsp type.");
  13537. return WOLFSSL_FAILURE;
  13538. }
  13539. }
  13540. long wolfSSL_get_tlsext_status_type(WOLFSSL *s)
  13541. {
  13542. TLSX* extension;
  13543. if (s == NULL)
  13544. return WOLFSSL_FATAL_ERROR;
  13545. extension = TLSX_Find(s->extensions, TLSX_STATUS_REQUEST);
  13546. return extension != NULL ? TLSEXT_STATUSTYPE_ocsp : WOLFSSL_FATAL_ERROR;
  13547. }
  13548. #endif /* HAVE_CERTIFICATE_STATUS_REQUEST */
  13549. #ifndef NO_WOLFSSL_STUB
  13550. long wolfSSL_get_tlsext_status_exts(WOLFSSL *s, void *arg)
  13551. {
  13552. (void)s;
  13553. (void)arg;
  13554. WOLFSSL_STUB("wolfSSL_get_tlsext_status_exts");
  13555. return WOLFSSL_FAILURE;
  13556. }
  13557. #endif
  13558. /*** TBD ***/
  13559. #ifndef NO_WOLFSSL_STUB
  13560. long wolfSSL_set_tlsext_status_exts(WOLFSSL *s, void *arg)
  13561. {
  13562. (void)s;
  13563. (void)arg;
  13564. WOLFSSL_STUB("wolfSSL_set_tlsext_status_exts");
  13565. return WOLFSSL_FAILURE;
  13566. }
  13567. #endif
  13568. /*** TBD ***/
  13569. #ifndef NO_WOLFSSL_STUB
  13570. long wolfSSL_get_tlsext_status_ids(WOLFSSL *s, void *arg)
  13571. {
  13572. (void)s;
  13573. (void)arg;
  13574. WOLFSSL_STUB("wolfSSL_get_tlsext_status_ids");
  13575. return WOLFSSL_FAILURE;
  13576. }
  13577. #endif
  13578. /*** TBD ***/
  13579. #ifndef NO_WOLFSSL_STUB
  13580. long wolfSSL_set_tlsext_status_ids(WOLFSSL *s, void *arg)
  13581. {
  13582. (void)s;
  13583. (void)arg;
  13584. WOLFSSL_STUB("wolfSSL_set_tlsext_status_ids");
  13585. return WOLFSSL_FAILURE;
  13586. }
  13587. #endif
  13588. #ifndef NO_WOLFSSL_STUB
  13589. /*** TBD ***/
  13590. WOLFSSL_EVP_PKEY *wolfSSL_get_privatekey(const WOLFSSL *ssl)
  13591. {
  13592. (void)ssl;
  13593. WOLFSSL_STUB("SSL_get_privatekey");
  13594. return NULL;
  13595. }
  13596. #endif
  13597. #ifndef NO_WOLFSSL_STUB
  13598. /*** TBD ***/
  13599. void SSL_CTX_set_tmp_dh_callback(WOLFSSL_CTX *ctx,
  13600. WOLFSSL_DH *(*dh) (WOLFSSL *ssl, int is_export, int keylength))
  13601. {
  13602. (void)ctx;
  13603. (void)dh;
  13604. WOLFSSL_STUB("SSL_CTX_set_tmp_dh_callback");
  13605. }
  13606. #endif
  13607. #ifndef NO_WOLFSSL_STUB
  13608. /*** TBD ***/
  13609. WOLF_STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void)
  13610. {
  13611. WOLFSSL_STUB("SSL_COMP_get_compression_methods");
  13612. return NULL;
  13613. }
  13614. #endif
  13615. int wolfSSL_sk_SSL_CIPHER_num(const WOLF_STACK_OF(WOLFSSL_CIPHER)* p)
  13616. {
  13617. WOLFSSL_ENTER("wolfSSL_sk_SSL_CIPHER_num");
  13618. if (p == NULL) {
  13619. return WOLFSSL_FATAL_ERROR;
  13620. }
  13621. return (int)p->num;
  13622. }
  13623. WOLFSSL_CIPHER* wolfSSL_sk_SSL_CIPHER_value(WOLFSSL_STACK* sk, int i)
  13624. {
  13625. WOLFSSL_ENTER("wolfSSL_sk_SSL_CIPHER_value");
  13626. return (WOLFSSL_CIPHER*)wolfSSL_sk_value(sk, i);
  13627. }
  13628. #if !defined(NETOS)
  13629. void ERR_load_SSL_strings(void)
  13630. {
  13631. }
  13632. #endif
  13633. #ifdef HAVE_OCSP
  13634. long wolfSSL_get_tlsext_status_ocsp_resp(WOLFSSL *s, unsigned char **resp)
  13635. {
  13636. if (s == NULL || resp == NULL)
  13637. return 0;
  13638. *resp = s->ocspResp;
  13639. return s->ocspRespSz;
  13640. }
  13641. long wolfSSL_set_tlsext_status_ocsp_resp(WOLFSSL *s, unsigned char *resp,
  13642. int len)
  13643. {
  13644. if (s == NULL)
  13645. return WOLFSSL_FAILURE;
  13646. s->ocspResp = resp;
  13647. s->ocspRespSz = len;
  13648. return WOLFSSL_SUCCESS;
  13649. }
  13650. #endif /* HAVE_OCSP */
  13651. #ifdef HAVE_MAX_FRAGMENT
  13652. #ifndef NO_WOLFSSL_CLIENT
  13653. /**
  13654. * Set max fragment tls extension
  13655. * @param c a pointer to WOLFSSL_CTX object
  13656. * @param mode maximum fragment length mode
  13657. * @return 1 on success, otherwise 0 or negative error code
  13658. */
  13659. int wolfSSL_CTX_set_tlsext_max_fragment_length(WOLFSSL_CTX *c,
  13660. unsigned char mode)
  13661. {
  13662. if (c == NULL || (mode < WOLFSSL_MFL_2_9 || mode > WOLFSSL_MFL_2_12 ))
  13663. return BAD_FUNC_ARG;
  13664. return wolfSSL_CTX_UseMaxFragment(c, mode);
  13665. }
  13666. /**
  13667. * Set max fragment tls extension
  13668. * @param c a pointer to WOLFSSL object
  13669. * @param mode maximum fragment length mode
  13670. * @return 1 on success, otherwise 0 or negative error code
  13671. */
  13672. int wolfSSL_set_tlsext_max_fragment_length(WOLFSSL *s, unsigned char mode)
  13673. {
  13674. if (s == NULL || (mode < WOLFSSL_MFL_2_9 || mode > WOLFSSL_MFL_2_12 ))
  13675. return BAD_FUNC_ARG;
  13676. return wolfSSL_UseMaxFragment(s, mode);
  13677. }
  13678. #endif /* NO_WOLFSSL_CLIENT */
  13679. #endif /* HAVE_MAX_FRAGMENT */
  13680. #endif /* OPENSSL_EXTRA */
  13681. #ifdef WOLFSSL_HAVE_TLS_UNIQUE
  13682. size_t wolfSSL_get_finished(const WOLFSSL *ssl, void *buf, size_t count)
  13683. {
  13684. byte len = 0;
  13685. WOLFSSL_ENTER("wolfSSL_get_finished");
  13686. if (!ssl || !buf || count < TLS_FINISHED_SZ) {
  13687. WOLFSSL_MSG("Bad parameter");
  13688. return WOLFSSL_FAILURE;
  13689. }
  13690. if (ssl->options.side == WOLFSSL_SERVER_END) {
  13691. len = ssl->serverFinished_len;
  13692. XMEMCPY(buf, ssl->serverFinished, len);
  13693. }
  13694. else {
  13695. len = ssl->clientFinished_len;
  13696. XMEMCPY(buf, ssl->clientFinished, len);
  13697. }
  13698. return len;
  13699. }
  13700. size_t wolfSSL_get_peer_finished(const WOLFSSL *ssl, void *buf, size_t count)
  13701. {
  13702. byte len = 0;
  13703. WOLFSSL_ENTER("wolfSSL_get_peer_finished");
  13704. if (!ssl || !buf || count < TLS_FINISHED_SZ) {
  13705. WOLFSSL_MSG("Bad parameter");
  13706. return WOLFSSL_FAILURE;
  13707. }
  13708. if (ssl->options.side == WOLFSSL_CLIENT_END) {
  13709. len = ssl->serverFinished_len;
  13710. XMEMCPY(buf, ssl->serverFinished, len);
  13711. }
  13712. else {
  13713. len = ssl->clientFinished_len;
  13714. XMEMCPY(buf, ssl->clientFinished, len);
  13715. }
  13716. return len;
  13717. }
  13718. #endif /* WOLFSSL_HAVE_TLS_UNIQUE */
  13719. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
  13720. defined(OPENSSL_ALL)
  13721. long wolfSSL_get_verify_result(const WOLFSSL *ssl)
  13722. {
  13723. if (ssl == NULL) {
  13724. return WOLFSSL_FAILURE;
  13725. }
  13726. return ssl->peerVerifyRet;
  13727. }
  13728. #endif
  13729. #ifdef OPENSSL_EXTRA
  13730. #ifndef NO_WOLFSSL_STUB
  13731. /* shows the number of accepts attempted by CTX in it's lifetime */
  13732. long wolfSSL_CTX_sess_accept(WOLFSSL_CTX* ctx)
  13733. {
  13734. WOLFSSL_STUB("wolfSSL_CTX_sess_accept");
  13735. (void)ctx;
  13736. return 0;
  13737. }
  13738. #endif
  13739. #ifndef NO_WOLFSSL_STUB
  13740. /* shows the number of connects attempted CTX in it's lifetime */
  13741. long wolfSSL_CTX_sess_connect(WOLFSSL_CTX* ctx)
  13742. {
  13743. WOLFSSL_STUB("wolfSSL_CTX_sess_connect");
  13744. (void)ctx;
  13745. return 0;
  13746. }
  13747. #endif
  13748. #ifndef NO_WOLFSSL_STUB
  13749. /* shows the number of accepts completed by CTX in it's lifetime */
  13750. long wolfSSL_CTX_sess_accept_good(WOLFSSL_CTX* ctx)
  13751. {
  13752. WOLFSSL_STUB("wolfSSL_CTX_sess_accept_good");
  13753. (void)ctx;
  13754. return 0;
  13755. }
  13756. #endif
  13757. #ifndef NO_WOLFSSL_STUB
  13758. /* shows the number of connects completed by CTX in it's lifetime */
  13759. long wolfSSL_CTX_sess_connect_good(WOLFSSL_CTX* ctx)
  13760. {
  13761. WOLFSSL_STUB("wolfSSL_CTX_sess_connect_good");
  13762. (void)ctx;
  13763. return 0;
  13764. }
  13765. #endif
  13766. #ifndef NO_WOLFSSL_STUB
  13767. /* shows the number of renegotiation accepts attempted by CTX */
  13768. long wolfSSL_CTX_sess_accept_renegotiate(WOLFSSL_CTX* ctx)
  13769. {
  13770. WOLFSSL_STUB("wolfSSL_CTX_sess_accept_renegotiate");
  13771. (void)ctx;
  13772. return 0;
  13773. }
  13774. #endif
  13775. #ifndef NO_WOLFSSL_STUB
  13776. /* shows the number of renegotiation accepts attempted by CTX */
  13777. long wolfSSL_CTX_sess_connect_renegotiate(WOLFSSL_CTX* ctx)
  13778. {
  13779. WOLFSSL_STUB("wolfSSL_CTX_sess_connect_renegotiate");
  13780. (void)ctx;
  13781. return 0;
  13782. }
  13783. #endif
  13784. #ifndef NO_WOLFSSL_STUB
  13785. long wolfSSL_CTX_sess_hits(WOLFSSL_CTX* ctx)
  13786. {
  13787. WOLFSSL_STUB("wolfSSL_CTX_sess_hits");
  13788. (void)ctx;
  13789. return 0;
  13790. }
  13791. #endif
  13792. #ifndef NO_WOLFSSL_STUB
  13793. long wolfSSL_CTX_sess_cb_hits(WOLFSSL_CTX* ctx)
  13794. {
  13795. WOLFSSL_STUB("wolfSSL_CTX_sess_cb_hits");
  13796. (void)ctx;
  13797. return 0;
  13798. }
  13799. #endif
  13800. #ifndef NO_WOLFSSL_STUB
  13801. long wolfSSL_CTX_sess_cache_full(WOLFSSL_CTX* ctx)
  13802. {
  13803. WOLFSSL_STUB("wolfSSL_CTX_sess_cache_full");
  13804. (void)ctx;
  13805. return 0;
  13806. }
  13807. #endif
  13808. #ifndef NO_WOLFSSL_STUB
  13809. long wolfSSL_CTX_sess_misses(WOLFSSL_CTX* ctx)
  13810. {
  13811. WOLFSSL_STUB("wolfSSL_CTX_sess_misses");
  13812. (void)ctx;
  13813. return 0;
  13814. }
  13815. #endif
  13816. #ifndef NO_WOLFSSL_STUB
  13817. long wolfSSL_CTX_sess_timeouts(WOLFSSL_CTX* ctx)
  13818. {
  13819. WOLFSSL_STUB("wolfSSL_CTX_sess_timeouts");
  13820. (void)ctx;
  13821. return 0;
  13822. }
  13823. #endif
  13824. #ifndef NO_CERTS
  13825. long wolfSSL_CTX_set_tlsext_status_arg(WOLFSSL_CTX* ctx, void* arg)
  13826. {
  13827. if (ctx == NULL || ctx->cm == NULL) {
  13828. return WOLFSSL_FAILURE;
  13829. }
  13830. ctx->cm->ocspIOCtx = arg;
  13831. return WOLFSSL_SUCCESS;
  13832. }
  13833. #endif /* !NO_CERTS */
  13834. int wolfSSL_get_read_ahead(const WOLFSSL* ssl)
  13835. {
  13836. if (ssl == NULL) {
  13837. return WOLFSSL_FAILURE;
  13838. }
  13839. return ssl->readAhead;
  13840. }
  13841. int wolfSSL_set_read_ahead(WOLFSSL* ssl, int v)
  13842. {
  13843. if (ssl == NULL) {
  13844. return WOLFSSL_FAILURE;
  13845. }
  13846. ssl->readAhead = (byte)v;
  13847. return WOLFSSL_SUCCESS;
  13848. }
  13849. int wolfSSL_CTX_get_read_ahead(WOLFSSL_CTX* ctx)
  13850. {
  13851. if (ctx == NULL) {
  13852. return WOLFSSL_FAILURE;
  13853. }
  13854. return ctx->readAhead;
  13855. }
  13856. int wolfSSL_CTX_set_read_ahead(WOLFSSL_CTX* ctx, int v)
  13857. {
  13858. if (ctx == NULL) {
  13859. return WOLFSSL_FAILURE;
  13860. }
  13861. ctx->readAhead = (byte)v;
  13862. return WOLFSSL_SUCCESS;
  13863. }
  13864. long wolfSSL_CTX_set_tlsext_opaque_prf_input_callback_arg(WOLFSSL_CTX* ctx,
  13865. void* arg)
  13866. {
  13867. if (ctx == NULL) {
  13868. return WOLFSSL_FAILURE;
  13869. }
  13870. ctx->userPRFArg = arg;
  13871. return WOLFSSL_SUCCESS;
  13872. }
  13873. #endif /* OPENSSL_EXTRA */
  13874. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  13875. int wolfSSL_sk_num(const WOLFSSL_STACK* sk)
  13876. {
  13877. WOLFSSL_ENTER("wolfSSL_sk_num");
  13878. if (sk == NULL)
  13879. return 0;
  13880. return (int)sk->num;
  13881. }
  13882. void* wolfSSL_sk_value(const WOLFSSL_STACK* sk, int i)
  13883. {
  13884. WOLFSSL_ENTER("wolfSSL_sk_value");
  13885. for (; sk != NULL && i > 0; i--)
  13886. sk = sk->next;
  13887. if (sk == NULL)
  13888. return NULL;
  13889. switch (sk->type) {
  13890. case STACK_TYPE_X509:
  13891. return (void*)sk->data.x509;
  13892. case STACK_TYPE_GEN_NAME:
  13893. return (void*)sk->data.gn;
  13894. case STACK_TYPE_BIO:
  13895. return (void*)sk->data.bio;
  13896. case STACK_TYPE_OBJ:
  13897. return (void*)sk->data.obj;
  13898. case STACK_TYPE_STRING:
  13899. return (void*)sk->data.string;
  13900. case STACK_TYPE_CIPHER:
  13901. return (void*)&sk->data.cipher;
  13902. case STACK_TYPE_ACCESS_DESCRIPTION:
  13903. return (void*)sk->data.access;
  13904. case STACK_TYPE_X509_EXT:
  13905. return (void*)sk->data.ext;
  13906. case STACK_TYPE_X509_REQ_ATTR:
  13907. return (void*)sk->data.generic;
  13908. case STACK_TYPE_NULL:
  13909. return (void*)sk->data.generic;
  13910. case STACK_TYPE_X509_NAME:
  13911. return (void*)sk->data.name;
  13912. case STACK_TYPE_X509_NAME_ENTRY:
  13913. return (void*)sk->data.name_entry;
  13914. case STACK_TYPE_CONF_VALUE:
  13915. #ifdef OPENSSL_EXTRA
  13916. return (void*)sk->data.conf;
  13917. #else
  13918. return NULL;
  13919. #endif
  13920. case STACK_TYPE_X509_INFO:
  13921. return (void*)sk->data.info;
  13922. case STACK_TYPE_BY_DIR_entry:
  13923. return (void*)sk->data.dir_entry;
  13924. case STACK_TYPE_BY_DIR_hash:
  13925. return (void*)sk->data.dir_hash;
  13926. case STACK_TYPE_X509_OBJ:
  13927. return (void*)sk->data.x509_obj;
  13928. case STACK_TYPE_DIST_POINT:
  13929. return (void*)sk->data.dp;
  13930. case STACK_TYPE_X509_CRL:
  13931. return (void*)sk->data.crl;
  13932. default:
  13933. return (void*)sk->data.generic;
  13934. }
  13935. }
  13936. /* copies over data of "in" to "out" */
  13937. static void wolfSSL_CIPHER_copy(WOLFSSL_CIPHER* in, WOLFSSL_CIPHER* out)
  13938. {
  13939. if (in == NULL || out == NULL)
  13940. return;
  13941. *out = *in;
  13942. }
  13943. WOLFSSL_STACK* wolfSSL_sk_dup(WOLFSSL_STACK* sk)
  13944. {
  13945. WOLFSSL_STACK* ret = NULL;
  13946. WOLFSSL_STACK* last = NULL;
  13947. WOLFSSL_ENTER("wolfSSL_sk_dup");
  13948. while (sk) {
  13949. WOLFSSL_STACK* cur = wolfSSL_sk_new_node(sk->heap);
  13950. if (!cur) {
  13951. WOLFSSL_MSG("wolfSSL_sk_new_node error");
  13952. goto error;
  13953. }
  13954. if (!ret) {
  13955. /* Set first node */
  13956. ret = cur;
  13957. }
  13958. if (last) {
  13959. last->next = cur;
  13960. }
  13961. XMEMCPY(cur, sk, sizeof(WOLFSSL_STACK));
  13962. /* We will allocate new memory for this */
  13963. XMEMSET(&cur->data, 0, sizeof(cur->data));
  13964. cur->next = NULL;
  13965. switch (sk->type) {
  13966. case STACK_TYPE_X509:
  13967. if (!sk->data.x509)
  13968. break;
  13969. cur->data.x509 = wolfSSL_X509_dup(sk->data.x509);
  13970. if (!cur->data.x509) {
  13971. WOLFSSL_MSG("wolfSSL_X509_dup error");
  13972. goto error;
  13973. }
  13974. break;
  13975. case STACK_TYPE_CIPHER:
  13976. wolfSSL_CIPHER_copy(&sk->data.cipher, &cur->data.cipher);
  13977. break;
  13978. case STACK_TYPE_GEN_NAME:
  13979. if (!sk->data.gn)
  13980. break;
  13981. cur->data.gn = wolfSSL_GENERAL_NAME_dup(sk->data.gn);
  13982. if (!cur->data.gn) {
  13983. WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
  13984. goto error;
  13985. }
  13986. break;
  13987. case STACK_TYPE_OBJ:
  13988. if (!sk->data.obj)
  13989. break;
  13990. cur->data.obj = wolfSSL_ASN1_OBJECT_dup(sk->data.obj);
  13991. if (!cur->data.obj) {
  13992. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup error");
  13993. goto error;
  13994. }
  13995. break;
  13996. case STACK_TYPE_BIO:
  13997. case STACK_TYPE_STRING:
  13998. case STACK_TYPE_ACCESS_DESCRIPTION:
  13999. case STACK_TYPE_X509_EXT:
  14000. case STACK_TYPE_X509_REQ_ATTR:
  14001. case STACK_TYPE_NULL:
  14002. case STACK_TYPE_X509_NAME:
  14003. case STACK_TYPE_X509_NAME_ENTRY:
  14004. case STACK_TYPE_CONF_VALUE:
  14005. case STACK_TYPE_X509_INFO:
  14006. case STACK_TYPE_BY_DIR_entry:
  14007. case STACK_TYPE_BY_DIR_hash:
  14008. case STACK_TYPE_X509_OBJ:
  14009. case STACK_TYPE_DIST_POINT:
  14010. case STACK_TYPE_X509_CRL:
  14011. default:
  14012. WOLFSSL_MSG("Unsupported stack type");
  14013. goto error;
  14014. }
  14015. sk = sk->next;
  14016. last = cur;
  14017. }
  14018. return ret;
  14019. error:
  14020. if (ret) {
  14021. wolfSSL_sk_GENERAL_NAME_free(ret);
  14022. }
  14023. return NULL;
  14024. }
  14025. WOLFSSL_STACK* wolfSSL_shallow_sk_dup(WOLFSSL_STACK* sk)
  14026. {
  14027. WOLFSSL_STACK* ret = NULL;
  14028. WOLFSSL_STACK** prev = &ret;
  14029. WOLFSSL_ENTER("wolfSSL_shallow_sk_dup");
  14030. for (; sk != NULL; sk = sk->next) {
  14031. WOLFSSL_STACK* cur = wolfSSL_sk_new_node(sk->heap);
  14032. if (!cur) {
  14033. WOLFSSL_MSG("wolfSSL_sk_new_node error");
  14034. goto error;
  14035. }
  14036. XMEMCPY(cur, sk, sizeof(WOLFSSL_STACK));
  14037. cur->next = NULL;
  14038. *prev = cur;
  14039. prev = &cur->next;
  14040. }
  14041. return ret;
  14042. error:
  14043. if (ret) {
  14044. wolfSSL_sk_free(ret);
  14045. }
  14046. return NULL;
  14047. }
  14048. /* Free the just the stack structure */
  14049. void wolfSSL_sk_free(WOLFSSL_STACK* sk)
  14050. {
  14051. WOLFSSL_ENTER("wolfSSL_sk_free");
  14052. while (sk != NULL) {
  14053. WOLFSSL_STACK* next = sk->next;
  14054. XFREE(sk, NULL, DYNAMIC_TYPE_OPENSSL);
  14055. sk = next;
  14056. }
  14057. }
  14058. /* Frees each node in the stack and frees the stack.
  14059. */
  14060. void wolfSSL_sk_GENERIC_pop_free(WOLFSSL_STACK* sk,
  14061. void (*f) (void*))
  14062. {
  14063. WOLFSSL_ENTER("wolfSSL_sk_GENERIC_pop_free");
  14064. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  14065. }
  14066. /* return 1 on success 0 on fail */
  14067. int wolfSSL_sk_GENERIC_push(WOLFSSL_STACK* sk, void* generic)
  14068. {
  14069. WOLFSSL_ENTER("wolfSSL_sk_GENERIC_push");
  14070. return wolfSSL_sk_push(sk, generic);
  14071. }
  14072. void wolfSSL_sk_GENERIC_free(WOLFSSL_STACK* sk)
  14073. {
  14074. wolfSSL_sk_free(sk);
  14075. }
  14076. /* Pop off data from the stack. Checks that the type matches the stack type.
  14077. *
  14078. * @param [in, out] sk Stack of objects.
  14079. * @param [in] type Type of stack.
  14080. * @return Object on success.
  14081. * @return NULL when stack is NULL or no nodes left in stack.
  14082. */
  14083. void* wolfssl_sk_pop_type(WOLFSSL_STACK* sk, WOLF_STACK_TYPE type)
  14084. {
  14085. WOLFSSL_STACK* node;
  14086. void* data = NULL;
  14087. /* Check we have a stack passed in of the right type. */
  14088. if ((sk != NULL) && (sk->type == type)) {
  14089. /* Get the next node to become the new first node. */
  14090. node = sk->next;
  14091. /* Get the ASN.1 OBJECT_ID object in the first node. */
  14092. data = sk->data.generic;
  14093. /* Check whether there is a next node. */
  14094. if (node != NULL) {
  14095. /* Move content out of next node into current node. */
  14096. sk->data.obj = node->data.obj;
  14097. sk->next = node->next;
  14098. /* Dispose of node. */
  14099. XFREE(node, NULL, DYNAMIC_TYPE_ASN1);
  14100. }
  14101. else {
  14102. /* No more nodes - clear out data. */
  14103. sk->data.obj = NULL;
  14104. }
  14105. /* Decrement count as long as we thought we had nodes. */
  14106. if (sk->num > 0) {
  14107. sk->num -= 1;
  14108. }
  14109. }
  14110. return data;
  14111. }
  14112. /* Free all nodes in a stack including the pushed objects */
  14113. void wolfSSL_sk_pop_free(WOLF_STACK_OF(WOLFSSL_ASN1_OBJECT)* sk,
  14114. wolfSSL_sk_freefunc func)
  14115. {
  14116. WOLFSSL_ENTER("wolfSSL_sk_pop_free");
  14117. if (sk == NULL) {
  14118. /* pop_free can be called with NULL, do not print bad argument */
  14119. return;
  14120. }
  14121. #if defined(WOLFSSL_QT)
  14122. /* In Qt v15.5, it calls OPENSSL_sk_free(xxx, OPENSSL_sk_free).
  14123. * By using OPENSSL_sk_free for free causes access violation.
  14124. * Therefore, switching free func to wolfSSL_ACCESS_DESCRIPTION_free
  14125. * is needed even the func isn't NULL.
  14126. */
  14127. if (sk->type == STACK_TYPE_ACCESS_DESCRIPTION) {
  14128. func = (wolfSSL_sk_freefunc)wolfSSL_ACCESS_DESCRIPTION_free;
  14129. }
  14130. #endif
  14131. if (func == NULL) {
  14132. switch(sk->type) {
  14133. case STACK_TYPE_ACCESS_DESCRIPTION:
  14134. #if defined(OPENSSL_ALL)
  14135. func = (wolfSSL_sk_freefunc)wolfSSL_ACCESS_DESCRIPTION_free;
  14136. #endif
  14137. break;
  14138. case STACK_TYPE_X509:
  14139. func = (wolfSSL_sk_freefunc)wolfSSL_X509_free;
  14140. break;
  14141. case STACK_TYPE_X509_OBJ:
  14142. #ifdef OPENSSL_ALL
  14143. func = (wolfSSL_sk_freefunc)wolfSSL_X509_OBJECT_free;
  14144. #endif
  14145. break;
  14146. case STACK_TYPE_OBJ:
  14147. func = (wolfSSL_sk_freefunc)wolfSSL_ASN1_OBJECT_free;
  14148. break;
  14149. case STACK_TYPE_DIST_POINT:
  14150. #ifdef OPENSSL_EXTRA
  14151. func = (wolfSSL_sk_freefunc)wolfSSL_DIST_POINT_free;
  14152. #endif
  14153. break;
  14154. case STACK_TYPE_GEN_NAME:
  14155. func = (wolfSSL_sk_freefunc)wolfSSL_GENERAL_NAME_free;
  14156. break;
  14157. case STACK_TYPE_STRING:
  14158. #if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
  14159. defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
  14160. func = (wolfSSL_sk_freefunc)wolfSSL_WOLFSSL_STRING_free;
  14161. #endif
  14162. break;
  14163. case STACK_TYPE_X509_NAME:
  14164. #if (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) \
  14165. && !defined(WOLFCRYPT_ONLY)
  14166. func = (wolfSSL_sk_freefunc)wolfSSL_X509_NAME_free;
  14167. #endif
  14168. break;
  14169. case STACK_TYPE_X509_NAME_ENTRY:
  14170. #if (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) \
  14171. && !defined(WOLFCRYPT_ONLY)
  14172. func = (wolfSSL_sk_freefunc)wolfSSL_X509_NAME_ENTRY_free;
  14173. #endif
  14174. break;
  14175. case STACK_TYPE_X509_EXT:
  14176. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
  14177. func = (wolfSSL_sk_freefunc)wolfSSL_X509_EXTENSION_free;
  14178. #endif
  14179. break;
  14180. case STACK_TYPE_X509_REQ_ATTR:
  14181. #if defined(OPENSSL_ALL) && \
  14182. (defined(WOLFSSL_CERT_GEN) || defined(WOLFSSL_CERT_REQ))
  14183. func = (wolfSSL_sk_freefunc)wolfSSL_X509_ATTRIBUTE_free;
  14184. #endif
  14185. break;
  14186. case STACK_TYPE_CONF_VALUE:
  14187. #if defined(OPENSSL_ALL)
  14188. func = (wolfSSL_sk_freefunc)wolfSSL_X509V3_conf_free;
  14189. #endif
  14190. break;
  14191. case STACK_TYPE_X509_INFO:
  14192. #if defined(OPENSSL_ALL)
  14193. func = (wolfSSL_sk_freefunc)wolfSSL_X509_INFO_free;
  14194. #endif
  14195. break;
  14196. case STACK_TYPE_BIO:
  14197. #if !defined(NO_BIO) && defined(OPENSSL_EXTRA)
  14198. func = (wolfSSL_sk_freefunc)wolfSSL_BIO_vfree;
  14199. #endif
  14200. break;
  14201. case STACK_TYPE_BY_DIR_entry:
  14202. #if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
  14203. func = (wolfSSL_sk_freefunc)wolfSSL_BY_DIR_entry_free;
  14204. #endif
  14205. break;
  14206. case STACK_TYPE_BY_DIR_hash:
  14207. #if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
  14208. func = (wolfSSL_sk_freefunc)wolfSSL_BY_DIR_HASH_free;
  14209. #endif
  14210. break;
  14211. case STACK_TYPE_X509_CRL:
  14212. #if defined(HAVE_CRL) && (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL))
  14213. func = (wolfSSL_sk_freefunc)wolfSSL_X509_CRL_free;
  14214. #endif
  14215. break;
  14216. case STACK_TYPE_CIPHER:
  14217. case STACK_TYPE_NULL:
  14218. default:
  14219. break;
  14220. }
  14221. }
  14222. while (sk != NULL) {
  14223. WOLFSSL_STACK* next = sk->next;
  14224. if (func != NULL) {
  14225. if (sk->type != STACK_TYPE_CIPHER)
  14226. func(sk->data.generic);
  14227. }
  14228. XFREE(sk, NULL, DYNAMIC_TYPE_OPENSSL);
  14229. sk = next;
  14230. }
  14231. }
  14232. /* Creates a new stack of the requested type.
  14233. *
  14234. * @param [in] type Type of stack.
  14235. * @return Empty stack on success.
  14236. * @return NULL when dynamic memory allocation fails.
  14237. */
  14238. WOLFSSL_STACK* wolfssl_sk_new_type(WOLF_STACK_TYPE type)
  14239. {
  14240. WOLFSSL_STACK* sk;
  14241. /* Allocate a new stack - first node. */
  14242. sk = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  14243. DYNAMIC_TYPE_OPENSSL);
  14244. if (sk == NULL) {
  14245. WOLFSSL_MSG("WOLFSSL_STACK memory error");
  14246. }
  14247. else {
  14248. /* Clear node and set type. */
  14249. XMEMSET(sk, 0, sizeof(WOLFSSL_STACK));
  14250. sk->type = type;
  14251. }
  14252. return sk;
  14253. }
  14254. /* Creates and returns a new null stack. */
  14255. WOLFSSL_STACK* wolfSSL_sk_new_null(void)
  14256. {
  14257. WOLFSSL_ENTER("wolfSSL_sk_new_null");
  14258. return wolfssl_sk_new_type(STACK_TYPE_NULL);
  14259. }
  14260. int wolfSSL_sk_SSL_COMP_num(WOLF_STACK_OF(WOLFSSL_COMP)* sk)
  14261. {
  14262. if (sk == NULL)
  14263. return 0;
  14264. return (int)sk->num;
  14265. }
  14266. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  14267. #ifdef OPENSSL_EXTRA
  14268. #if defined(HAVE_EX_DATA) && !defined(NO_FILESYSTEM)
  14269. int wolfSSL_cmp_peer_cert_to_file(WOLFSSL* ssl, const char *fname)
  14270. {
  14271. int ret = WOLFSSL_FATAL_ERROR;
  14272. WOLFSSL_ENTER("wolfSSL_cmp_peer_cert_to_file");
  14273. if (ssl != NULL && fname != NULL)
  14274. {
  14275. #ifdef WOLFSSL_SMALL_STACK
  14276. byte staticBuffer[1]; /* force heap usage */
  14277. #else
  14278. byte staticBuffer[FILE_BUFFER_SIZE];
  14279. #endif
  14280. byte* myBuffer = staticBuffer;
  14281. int dynamic = 0;
  14282. XFILE file;
  14283. long sz = 0;
  14284. WOLFSSL_CTX* ctx = ssl->ctx;
  14285. WOLFSSL_X509* peer_cert = &ssl->peerCert;
  14286. DerBuffer* fileDer = NULL;
  14287. file = XFOPEN(fname, "rb");
  14288. if (file == XBADFILE)
  14289. return WOLFSSL_BAD_FILE;
  14290. if (XFSEEK(file, 0, XSEEK_END) != 0) {
  14291. XFCLOSE(file);
  14292. return WOLFSSL_BAD_FILE;
  14293. }
  14294. sz = XFTELL(file);
  14295. if (XFSEEK(file, 0, XSEEK_SET) != 0) {
  14296. XFCLOSE(file);
  14297. return WOLFSSL_BAD_FILE;
  14298. }
  14299. if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
  14300. WOLFSSL_MSG("cmp_peer_cert_to_file size error");
  14301. XFCLOSE(file);
  14302. return WOLFSSL_BAD_FILE;
  14303. }
  14304. if (sz > (long)sizeof(staticBuffer)) {
  14305. WOLFSSL_MSG("Getting dynamic buffer");
  14306. myBuffer = (byte*)XMALLOC(sz, ctx->heap, DYNAMIC_TYPE_FILE);
  14307. dynamic = 1;
  14308. }
  14309. if ((myBuffer != NULL) &&
  14310. (sz > 0) &&
  14311. (XFREAD(myBuffer, 1, sz, file) == (size_t)sz) &&
  14312. (PemToDer(myBuffer, (long)sz, CERT_TYPE,
  14313. &fileDer, ctx->heap, NULL, NULL) == 0) &&
  14314. (fileDer->length != 0) &&
  14315. (fileDer->length == peer_cert->derCert->length) &&
  14316. (XMEMCMP(peer_cert->derCert->buffer, fileDer->buffer,
  14317. fileDer->length) == 0))
  14318. {
  14319. ret = 0;
  14320. }
  14321. FreeDer(&fileDer);
  14322. if (dynamic)
  14323. XFREE(myBuffer, ctx->heap, DYNAMIC_TYPE_FILE);
  14324. XFCLOSE(file);
  14325. }
  14326. return ret;
  14327. }
  14328. #endif
  14329. #endif /* OPENSSL_EXTRA */
  14330. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  14331. const WOLFSSL_ObjectInfo wolfssl_object_info[] = {
  14332. #ifndef NO_CERTS
  14333. /* oidCertExtType */
  14334. { NID_basic_constraints, BASIC_CA_OID, oidCertExtType, "basicConstraints",
  14335. "X509v3 Basic Constraints"},
  14336. { NID_subject_alt_name, ALT_NAMES_OID, oidCertExtType, "subjectAltName",
  14337. "X509v3 Subject Alternative Name"},
  14338. { NID_crl_distribution_points, CRL_DIST_OID, oidCertExtType,
  14339. "crlDistributionPoints", "X509v3 CRL Distribution Points"},
  14340. { NID_info_access, AUTH_INFO_OID, oidCertExtType, "authorityInfoAccess",
  14341. "Authority Information Access"},
  14342. { NID_authority_key_identifier, AUTH_KEY_OID, oidCertExtType,
  14343. "authorityKeyIdentifier", "X509v3 Authority Key Identifier"},
  14344. { NID_subject_key_identifier, SUBJ_KEY_OID, oidCertExtType,
  14345. "subjectKeyIdentifier", "X509v3 Subject Key Identifier"},
  14346. { NID_key_usage, KEY_USAGE_OID, oidCertExtType, "keyUsage",
  14347. "X509v3 Key Usage"},
  14348. { NID_inhibit_any_policy, INHIBIT_ANY_OID, oidCertExtType,
  14349. "inhibitAnyPolicy", "X509v3 Inhibit Any Policy"},
  14350. { NID_ext_key_usage, EXT_KEY_USAGE_OID, oidCertExtType,
  14351. "extendedKeyUsage", "X509v3 Extended Key Usage"},
  14352. { NID_name_constraints, NAME_CONS_OID, oidCertExtType,
  14353. "nameConstraints", "X509v3 Name Constraints"},
  14354. { NID_certificate_policies, CERT_POLICY_OID, oidCertExtType,
  14355. "certificatePolicies", "X509v3 Certificate Policies"},
  14356. /* oidCertAuthInfoType */
  14357. { NID_ad_OCSP, AIA_OCSP_OID, oidCertAuthInfoType, "OCSP",
  14358. "OCSP"},
  14359. { NID_ad_ca_issuers, AIA_CA_ISSUER_OID, oidCertAuthInfoType,
  14360. "caIssuers", "CA Issuers"},
  14361. /* oidCertPolicyType */
  14362. { NID_any_policy, CP_ANY_OID, oidCertPolicyType, "anyPolicy",
  14363. "X509v3 Any Policy"},
  14364. /* oidCertAltNameType */
  14365. { NID_hw_name_oid, HW_NAME_OID, oidCertAltNameType, "Hardware name",""},
  14366. /* oidCertKeyUseType */
  14367. { NID_anyExtendedKeyUsage, EKU_ANY_OID, oidCertKeyUseType,
  14368. "anyExtendedKeyUsage", "Any Extended Key Usage"},
  14369. { EKU_SERVER_AUTH_OID, EKU_SERVER_AUTH_OID, oidCertKeyUseType,
  14370. "serverAuth", "TLS Web Server Authentication"},
  14371. { EKU_CLIENT_AUTH_OID, EKU_CLIENT_AUTH_OID, oidCertKeyUseType,
  14372. "clientAuth", "TLS Web Client Authentication"},
  14373. { EKU_OCSP_SIGN_OID, EKU_OCSP_SIGN_OID, oidCertKeyUseType,
  14374. "OCSPSigning", "OCSP Signing"},
  14375. /* oidCertNameType */
  14376. { NID_commonName, NID_commonName, oidCertNameType, "CN", "commonName"},
  14377. #if !defined(WOLFSSL_CERT_REQ)
  14378. { NID_surname, NID_surname, oidCertNameType, "SN", "surname"},
  14379. #endif
  14380. { NID_serialNumber, NID_serialNumber, oidCertNameType, "serialNumber",
  14381. "serialNumber"},
  14382. { NID_userId, NID_userId, oidCertNameType, "UID", "userid"},
  14383. { NID_countryName, NID_countryName, oidCertNameType, "C", "countryName"},
  14384. { NID_localityName, NID_localityName, oidCertNameType, "L", "localityName"},
  14385. { NID_stateOrProvinceName, NID_stateOrProvinceName, oidCertNameType, "ST",
  14386. "stateOrProvinceName"},
  14387. { NID_streetAddress, NID_streetAddress, oidCertNameType, "street",
  14388. "streetAddress"},
  14389. { NID_organizationName, NID_organizationName, oidCertNameType, "O",
  14390. "organizationName"},
  14391. { NID_organizationalUnitName, NID_organizationalUnitName, oidCertNameType,
  14392. "OU", "organizationalUnitName"},
  14393. { NID_emailAddress, NID_emailAddress, oidCertNameType, "emailAddress",
  14394. "emailAddress"},
  14395. { NID_domainComponent, NID_domainComponent, oidCertNameType, "DC",
  14396. "domainComponent"},
  14397. { NID_favouriteDrink, NID_favouriteDrink, oidCertNameType, "favouriteDrink",
  14398. "favouriteDrink"},
  14399. { NID_businessCategory, NID_businessCategory, oidCertNameType,
  14400. "businessCategory", "businessCategory"},
  14401. { NID_jurisdictionCountryName, NID_jurisdictionCountryName, oidCertNameType,
  14402. "jurisdictionC", "jurisdictionCountryName"},
  14403. { NID_jurisdictionStateOrProvinceName, NID_jurisdictionStateOrProvinceName,
  14404. oidCertNameType, "jurisdictionST", "jurisdictionStateOrProvinceName"},
  14405. { NID_postalCode, NID_postalCode, oidCertNameType, "postalCode",
  14406. "postalCode"},
  14407. { NID_userId, NID_userId, oidCertNameType, "UID", "userId"},
  14408. #if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_NAME_ALL)
  14409. { NID_pkcs9_challengePassword, CHALLENGE_PASSWORD_OID,
  14410. oidCsrAttrType, "challengePassword", "challengePassword"},
  14411. { NID_pkcs9_contentType, PKCS9_CONTENT_TYPE_OID,
  14412. oidCsrAttrType, "contentType", "contentType" },
  14413. { NID_pkcs9_unstructuredName, UNSTRUCTURED_NAME_OID,
  14414. oidCsrAttrType, "unstructuredName", "unstructuredName" },
  14415. { NID_name, NAME_OID, oidCsrAttrType, "name", "name" },
  14416. { NID_surname, SURNAME_OID,
  14417. oidCsrAttrType, "surname", "surname" },
  14418. { NID_givenName, GIVEN_NAME_OID,
  14419. oidCsrAttrType, "givenName", "givenName" },
  14420. { NID_initials, INITIALS_OID,
  14421. oidCsrAttrType, "initials", "initials" },
  14422. { NID_dnQualifier, DNQUALIFIER_OID,
  14423. oidCsrAttrType, "dnQualifer", "dnQualifier" },
  14424. #endif
  14425. #endif
  14426. #ifdef OPENSSL_EXTRA /* OPENSSL_EXTRA_X509_SMALL only needs the above */
  14427. /* oidHashType */
  14428. #ifdef WOLFSSL_MD2
  14429. { NID_md2, MD2h, oidHashType, "MD2", "md2"},
  14430. #endif
  14431. #ifdef WOLFSSL_MD5
  14432. { NID_md5, MD5h, oidHashType, "MD5", "md5"},
  14433. #endif
  14434. #ifndef NO_SHA
  14435. { NID_sha1, SHAh, oidHashType, "SHA1", "sha1"},
  14436. #endif
  14437. #ifdef WOLFSSL_SHA224
  14438. { NID_sha224, SHA224h, oidHashType, "SHA224", "sha224"},
  14439. #endif
  14440. #ifndef NO_SHA256
  14441. { NID_sha256, SHA256h, oidHashType, "SHA256", "sha256"},
  14442. #endif
  14443. #ifdef WOLFSSL_SHA384
  14444. { NID_sha384, SHA384h, oidHashType, "SHA384", "sha384"},
  14445. #endif
  14446. #ifdef WOLFSSL_SHA512
  14447. { NID_sha512, SHA512h, oidHashType, "SHA512", "sha512"},
  14448. #endif
  14449. #ifdef WOLFSSL_SHA3
  14450. #ifndef WOLFSSL_NOSHA3_224
  14451. { NID_sha3_224, SHA3_224h, oidHashType, "SHA3-224", "sha3-224"},
  14452. #endif
  14453. #ifndef WOLFSSL_NOSHA3_256
  14454. { NID_sha3_256, SHA3_256h, oidHashType, "SHA3-256", "sha3-256"},
  14455. #endif
  14456. #ifndef WOLFSSL_NOSHA3_384
  14457. { NID_sha3_384, SHA3_384h, oidHashType, "SHA3-384", "sha3-384"},
  14458. #endif
  14459. #ifndef WOLFSSL_NOSHA3_512
  14460. { NID_sha3_512, SHA3_512h, oidHashType, "SHA3-512", "sha3-512"},
  14461. #endif
  14462. #endif /* WOLFSSL_SHA3 */
  14463. #ifdef WOLFSSL_SM3
  14464. { NID_sm3, SM3h, oidHashType, "SM3", "sm3"},
  14465. #endif
  14466. /* oidSigType */
  14467. #ifndef NO_DSA
  14468. #ifndef NO_SHA
  14469. { NID_dsaWithSHA1, CTC_SHAwDSA, oidSigType, "DSA-SHA1", "dsaWithSHA1"},
  14470. { NID_dsa_with_SHA256, CTC_SHA256wDSA, oidSigType, "dsa_with_SHA256",
  14471. "dsa_with_SHA256"},
  14472. #endif
  14473. #endif /* NO_DSA */
  14474. #ifndef NO_RSA
  14475. #ifdef WOLFSSL_MD2
  14476. { NID_md2WithRSAEncryption, CTC_MD2wRSA, oidSigType, "RSA-MD2",
  14477. "md2WithRSAEncryption"},
  14478. #endif
  14479. #ifndef NO_MD5
  14480. { NID_md5WithRSAEncryption, CTC_MD5wRSA, oidSigType, "RSA-MD5",
  14481. "md5WithRSAEncryption"},
  14482. #endif
  14483. #ifndef NO_SHA
  14484. { NID_sha1WithRSAEncryption, CTC_SHAwRSA, oidSigType, "RSA-SHA1",
  14485. "sha1WithRSAEncryption"},
  14486. #endif
  14487. #ifdef WOLFSSL_SHA224
  14488. { NID_sha224WithRSAEncryption, CTC_SHA224wRSA, oidSigType, "RSA-SHA224",
  14489. "sha224WithRSAEncryption"},
  14490. #endif
  14491. #ifndef NO_SHA256
  14492. { NID_sha256WithRSAEncryption, CTC_SHA256wRSA, oidSigType, "RSA-SHA256",
  14493. "sha256WithRSAEncryption"},
  14494. #endif
  14495. #ifdef WOLFSSL_SHA384
  14496. { NID_sha384WithRSAEncryption, CTC_SHA384wRSA, oidSigType, "RSA-SHA384",
  14497. "sha384WithRSAEncryption"},
  14498. #endif
  14499. #ifdef WOLFSSL_SHA512
  14500. { NID_sha512WithRSAEncryption, CTC_SHA512wRSA, oidSigType, "RSA-SHA512",
  14501. "sha512WithRSAEncryption"},
  14502. #endif
  14503. #ifdef WOLFSSL_SHA3
  14504. #ifndef WOLFSSL_NOSHA3_224
  14505. { NID_RSA_SHA3_224, CTC_SHA3_224wRSA, oidSigType, "RSA-SHA3-224",
  14506. "sha3-224WithRSAEncryption"},
  14507. #endif
  14508. #ifndef WOLFSSL_NOSHA3_256
  14509. { NID_RSA_SHA3_256, CTC_SHA3_256wRSA, oidSigType, "RSA-SHA3-256",
  14510. "sha3-256WithRSAEncryption"},
  14511. #endif
  14512. #ifndef WOLFSSL_NOSHA3_384
  14513. { NID_RSA_SHA3_384, CTC_SHA3_384wRSA, oidSigType, "RSA-SHA3-384",
  14514. "sha3-384WithRSAEncryption"},
  14515. #endif
  14516. #ifndef WOLFSSL_NOSHA3_512
  14517. { NID_RSA_SHA3_512, CTC_SHA3_512wRSA, oidSigType, "RSA-SHA3-512",
  14518. "sha3-512WithRSAEncryption"},
  14519. #endif
  14520. #endif
  14521. #ifdef WC_RSA_PSS
  14522. { NID_rsassaPss, CTC_RSASSAPSS, oidSigType, "RSASSA-PSS", "rsassaPss" },
  14523. #endif
  14524. #endif /* NO_RSA */
  14525. #ifdef HAVE_ECC
  14526. #ifndef NO_SHA
  14527. { NID_ecdsa_with_SHA1, CTC_SHAwECDSA, oidSigType, "ecdsa-with-SHA1",
  14528. "shaWithECDSA"},
  14529. #endif
  14530. #ifdef WOLFSSL_SHA224
  14531. { NID_ecdsa_with_SHA224, CTC_SHA224wECDSA, oidSigType,
  14532. "ecdsa-with-SHA224","sha224WithECDSA"},
  14533. #endif
  14534. #ifndef NO_SHA256
  14535. { NID_ecdsa_with_SHA256, CTC_SHA256wECDSA, oidSigType,
  14536. "ecdsa-with-SHA256","sha256WithECDSA"},
  14537. #endif
  14538. #ifdef WOLFSSL_SHA384
  14539. { NID_ecdsa_with_SHA384, CTC_SHA384wECDSA, oidSigType,
  14540. "ecdsa-with-SHA384","sha384WithECDSA"},
  14541. #endif
  14542. #ifdef WOLFSSL_SHA512
  14543. { NID_ecdsa_with_SHA512, CTC_SHA512wECDSA, oidSigType,
  14544. "ecdsa-with-SHA512","sha512WithECDSA"},
  14545. #endif
  14546. #ifdef WOLFSSL_SHA3
  14547. #ifndef WOLFSSL_NOSHA3_224
  14548. { NID_ecdsa_with_SHA3_224, CTC_SHA3_224wECDSA, oidSigType,
  14549. "id-ecdsa-with-SHA3-224", "ecdsa_with_SHA3-224"},
  14550. #endif
  14551. #ifndef WOLFSSL_NOSHA3_256
  14552. { NID_ecdsa_with_SHA3_256, CTC_SHA3_256wECDSA, oidSigType,
  14553. "id-ecdsa-with-SHA3-256", "ecdsa_with_SHA3-256"},
  14554. #endif
  14555. #ifndef WOLFSSL_NOSHA3_384
  14556. { NID_ecdsa_with_SHA3_384, CTC_SHA3_384wECDSA, oidSigType,
  14557. "id-ecdsa-with-SHA3-384", "ecdsa_with_SHA3-384"},
  14558. #endif
  14559. #ifndef WOLFSSL_NOSHA3_512
  14560. { NID_ecdsa_with_SHA3_512, CTC_SHA3_512wECDSA, oidSigType,
  14561. "id-ecdsa-with-SHA3-512", "ecdsa_with_SHA3-512"},
  14562. #endif
  14563. #endif
  14564. #endif /* HAVE_ECC */
  14565. /* oidKeyType */
  14566. #ifndef NO_DSA
  14567. { NID_dsa, DSAk, oidKeyType, "DSA", "dsaEncryption"},
  14568. #endif /* NO_DSA */
  14569. #ifndef NO_RSA
  14570. { NID_rsaEncryption, RSAk, oidKeyType, "rsaEncryption",
  14571. "rsaEncryption"},
  14572. #ifdef WC_RSA_PSS
  14573. { NID_rsassaPss, RSAPSSk, oidKeyType, "RSASSA-PSS", "rsassaPss"},
  14574. #endif
  14575. #endif /* NO_RSA */
  14576. #ifdef HAVE_ECC
  14577. { NID_X9_62_id_ecPublicKey, ECDSAk, oidKeyType, "id-ecPublicKey",
  14578. "id-ecPublicKey"},
  14579. #endif /* HAVE_ECC */
  14580. #ifndef NO_DH
  14581. { NID_dhKeyAgreement, DHk, oidKeyType, "dhKeyAgreement",
  14582. "dhKeyAgreement"},
  14583. #endif
  14584. #ifdef HAVE_ED448
  14585. { NID_ED448, ED448k, oidKeyType, "ED448", "ED448"},
  14586. #endif
  14587. #ifdef HAVE_ED25519
  14588. { NID_ED25519, ED25519k, oidKeyType, "ED25519", "ED25519"},
  14589. #endif
  14590. #ifdef HAVE_PQC
  14591. #ifdef HAVE_FALCON
  14592. { CTC_FALCON_LEVEL1, FALCON_LEVEL1k, oidKeyType, "Falcon Level 1",
  14593. "Falcon Level 1"},
  14594. { CTC_FALCON_LEVEL5, FALCON_LEVEL5k, oidKeyType, "Falcon Level 5",
  14595. "Falcon Level 5"},
  14596. #endif /* HAVE_FALCON */
  14597. #ifdef HAVE_DILITHIUM
  14598. { CTC_DILITHIUM_LEVEL2, DILITHIUM_LEVEL2k, oidKeyType,
  14599. "Dilithium Level 2", "Dilithium Level 2"},
  14600. { CTC_DILITHIUM_LEVEL3, DILITHIUM_LEVEL3k, oidKeyType,
  14601. "Dilithium Level 3", "Dilithium Level 3"},
  14602. { CTC_DILITHIUM_LEVEL5, DILITHIUM_LEVEL5k, oidKeyType,
  14603. "Dilithium Level 5", "Dilithium Level 5"},
  14604. #endif /* HAVE_DILITHIUM */
  14605. #endif /* HAVE_PQC */
  14606. /* oidCurveType */
  14607. #ifdef HAVE_ECC
  14608. { NID_X9_62_prime192v1, ECC_SECP192R1_OID, oidCurveType, "prime192v1",
  14609. "prime192v1"},
  14610. { NID_X9_62_prime192v2, ECC_PRIME192V2_OID, oidCurveType, "prime192v2",
  14611. "prime192v2"},
  14612. { NID_X9_62_prime192v3, ECC_PRIME192V3_OID, oidCurveType, "prime192v3",
  14613. "prime192v3"},
  14614. { NID_X9_62_prime239v1, ECC_PRIME239V1_OID, oidCurveType, "prime239v1",
  14615. "prime239v1"},
  14616. { NID_X9_62_prime239v2, ECC_PRIME239V2_OID, oidCurveType, "prime239v2",
  14617. "prime239v2"},
  14618. { NID_X9_62_prime239v3, ECC_PRIME239V3_OID, oidCurveType, "prime239v3",
  14619. "prime239v3"},
  14620. { NID_X9_62_prime256v1, ECC_SECP256R1_OID, oidCurveType, "prime256v1",
  14621. "prime256v1"},
  14622. { NID_secp112r1, ECC_SECP112R1_OID, oidCurveType, "secp112r1",
  14623. "secp112r1"},
  14624. { NID_secp112r2, ECC_SECP112R2_OID, oidCurveType, "secp112r2",
  14625. "secp112r2"},
  14626. { NID_secp128r1, ECC_SECP128R1_OID, oidCurveType, "secp128r1",
  14627. "secp128r1"},
  14628. { NID_secp128r2, ECC_SECP128R2_OID, oidCurveType, "secp128r2",
  14629. "secp128r2"},
  14630. { NID_secp160r1, ECC_SECP160R1_OID, oidCurveType, "secp160r1",
  14631. "secp160r1"},
  14632. { NID_secp160r2, ECC_SECP160R2_OID, oidCurveType, "secp160r2",
  14633. "secp160r2"},
  14634. { NID_secp224r1, ECC_SECP224R1_OID, oidCurveType, "secp224r1",
  14635. "secp224r1"},
  14636. { NID_secp384r1, ECC_SECP384R1_OID, oidCurveType, "secp384r1",
  14637. "secp384r1"},
  14638. { NID_secp521r1, ECC_SECP521R1_OID, oidCurveType, "secp521r1",
  14639. "secp521r1"},
  14640. { NID_secp160k1, ECC_SECP160K1_OID, oidCurveType, "secp160k1",
  14641. "secp160k1"},
  14642. { NID_secp192k1, ECC_SECP192K1_OID, oidCurveType, "secp192k1",
  14643. "secp192k1"},
  14644. { NID_secp224k1, ECC_SECP224K1_OID, oidCurveType, "secp224k1",
  14645. "secp224k1"},
  14646. { NID_secp256k1, ECC_SECP256K1_OID, oidCurveType, "secp256k1",
  14647. "secp256k1"},
  14648. { NID_brainpoolP160r1, ECC_BRAINPOOLP160R1_OID, oidCurveType,
  14649. "brainpoolP160r1", "brainpoolP160r1"},
  14650. { NID_brainpoolP192r1, ECC_BRAINPOOLP192R1_OID, oidCurveType,
  14651. "brainpoolP192r1", "brainpoolP192r1"},
  14652. { NID_brainpoolP224r1, ECC_BRAINPOOLP224R1_OID, oidCurveType,
  14653. "brainpoolP224r1", "brainpoolP224r1"},
  14654. { NID_brainpoolP256r1, ECC_BRAINPOOLP256R1_OID, oidCurveType,
  14655. "brainpoolP256r1", "brainpoolP256r1"},
  14656. { NID_brainpoolP320r1, ECC_BRAINPOOLP320R1_OID, oidCurveType,
  14657. "brainpoolP320r1", "brainpoolP320r1"},
  14658. { NID_brainpoolP384r1, ECC_BRAINPOOLP384R1_OID, oidCurveType,
  14659. "brainpoolP384r1", "brainpoolP384r1"},
  14660. { NID_brainpoolP512r1, ECC_BRAINPOOLP512R1_OID, oidCurveType,
  14661. "brainpoolP512r1", "brainpoolP512r1"},
  14662. #ifdef WOLFSSL_SM2
  14663. { NID_sm2, ECC_SM2P256V1_OID, oidCurveType, "sm2", "sm2"},
  14664. #endif
  14665. #endif /* HAVE_ECC */
  14666. /* oidBlkType */
  14667. #ifdef WOLFSSL_AES_128
  14668. { AES128CBCb, AES128CBCb, oidBlkType, "AES-128-CBC", "aes-128-cbc"},
  14669. #endif
  14670. #ifdef WOLFSSL_AES_192
  14671. { AES192CBCb, AES192CBCb, oidBlkType, "AES-192-CBC", "aes-192-cbc"},
  14672. #endif
  14673. #ifdef WOLFSSL_AES_256
  14674. { AES256CBCb, AES256CBCb, oidBlkType, "AES-256-CBC", "aes-256-cbc"},
  14675. #endif
  14676. #ifndef NO_DES3
  14677. { NID_des, DESb, oidBlkType, "DES-CBC", "des-cbc"},
  14678. { NID_des3, DES3b, oidBlkType, "DES-EDE3-CBC", "des-ede3-cbc"},
  14679. #endif /* !NO_DES3 */
  14680. #if defined(HAVE_CHACHA) && defined(HAVE_POLY1305)
  14681. { NID_chacha20_poly1305, NID_chacha20_poly1305, oidBlkType,
  14682. "ChaCha20-Poly1305", "chacha20-poly1305"},
  14683. #endif
  14684. /* oidOcspType */
  14685. #ifdef HAVE_OCSP
  14686. { NID_id_pkix_OCSP_basic, OCSP_BASIC_OID, oidOcspType,
  14687. "basicOCSPResponse", "Basic OCSP Response"},
  14688. { OCSP_NONCE_OID, OCSP_NONCE_OID, oidOcspType, "Nonce", "OCSP Nonce"},
  14689. #endif /* HAVE_OCSP */
  14690. #ifndef NO_PWDBASED
  14691. /* oidKdfType */
  14692. { PBKDF2_OID, PBKDF2_OID, oidKdfType, "PBKDFv2", "PBKDF2"},
  14693. /* oidPBEType */
  14694. { PBE_SHA1_RC4_128, PBE_SHA1_RC4_128, oidPBEType,
  14695. "PBE-SHA1-RC4-128", "pbeWithSHA1And128BitRC4"},
  14696. { PBE_SHA1_DES, PBE_SHA1_DES, oidPBEType, "PBE-SHA1-DES",
  14697. "pbeWithSHA1AndDES-CBC"},
  14698. { PBE_SHA1_DES3, PBE_SHA1_DES3, oidPBEType, "PBE-SHA1-3DES",
  14699. "pbeWithSHA1And3-KeyTripleDES-CBC"},
  14700. #endif
  14701. /* oidKeyWrapType */
  14702. #ifdef WOLFSSL_AES_128
  14703. { AES128_WRAP, AES128_WRAP, oidKeyWrapType, "AES-128 wrap",
  14704. "aes128-wrap"},
  14705. #endif
  14706. #ifdef WOLFSSL_AES_192
  14707. { AES192_WRAP, AES192_WRAP, oidKeyWrapType, "AES-192 wrap",
  14708. "aes192-wrap"},
  14709. #endif
  14710. #ifdef WOLFSSL_AES_256
  14711. { AES256_WRAP, AES256_WRAP, oidKeyWrapType, "AES-256 wrap",
  14712. "aes256-wrap"},
  14713. #endif
  14714. #ifndef NO_PKCS7
  14715. #ifndef NO_DH
  14716. /* oidCmsKeyAgreeType */
  14717. #ifndef NO_SHA
  14718. { dhSinglePass_stdDH_sha1kdf_scheme, dhSinglePass_stdDH_sha1kdf_scheme,
  14719. oidCmsKeyAgreeType, "dhSinglePass-stdDH-sha1kdf-scheme",
  14720. "dhSinglePass-stdDH-sha1kdf-scheme"},
  14721. #endif
  14722. #ifdef WOLFSSL_SHA224
  14723. { dhSinglePass_stdDH_sha224kdf_scheme,
  14724. dhSinglePass_stdDH_sha224kdf_scheme, oidCmsKeyAgreeType,
  14725. "dhSinglePass-stdDH-sha224kdf-scheme",
  14726. "dhSinglePass-stdDH-sha224kdf-scheme"},
  14727. #endif
  14728. #ifndef NO_SHA256
  14729. { dhSinglePass_stdDH_sha256kdf_scheme,
  14730. dhSinglePass_stdDH_sha256kdf_scheme, oidCmsKeyAgreeType,
  14731. "dhSinglePass-stdDH-sha256kdf-scheme",
  14732. "dhSinglePass-stdDH-sha256kdf-scheme"},
  14733. #endif
  14734. #ifdef WOLFSSL_SHA384
  14735. { dhSinglePass_stdDH_sha384kdf_scheme,
  14736. dhSinglePass_stdDH_sha384kdf_scheme, oidCmsKeyAgreeType,
  14737. "dhSinglePass-stdDH-sha384kdf-scheme",
  14738. "dhSinglePass-stdDH-sha384kdf-scheme"},
  14739. #endif
  14740. #ifdef WOLFSSL_SHA512
  14741. { dhSinglePass_stdDH_sha512kdf_scheme,
  14742. dhSinglePass_stdDH_sha512kdf_scheme, oidCmsKeyAgreeType,
  14743. "dhSinglePass-stdDH-sha512kdf-scheme",
  14744. "dhSinglePass-stdDH-sha512kdf-scheme"},
  14745. #endif
  14746. #endif
  14747. #endif
  14748. #if defined(WOLFSSL_APACHE_HTTPD)
  14749. /* "1.3.6.1.5.5.7.8.7" */
  14750. { NID_id_on_dnsSRV, NID_id_on_dnsSRV, oidCertNameType,
  14751. WOLFSSL_SN_DNS_SRV, WOLFSSL_LN_DNS_SRV },
  14752. /* "1.3.6.1.4.1.311.20.2.3" */
  14753. { NID_ms_upn, WOLFSSL_MS_UPN_SUM, oidCertExtType, WOLFSSL_SN_MS_UPN,
  14754. WOLFSSL_LN_MS_UPN },
  14755. /* "1.3.6.1.5.5.7.1.24" */
  14756. { NID_tlsfeature, WOLFSSL_TLS_FEATURE_SUM, oidTlsExtType,
  14757. WOLFSSL_SN_TLS_FEATURE, WOLFSSL_LN_TLS_FEATURE },
  14758. #endif
  14759. #endif /* OPENSSL_EXTRA */
  14760. };
  14761. #define WOLFSSL_OBJECT_INFO_SZ \
  14762. (sizeof(wolfssl_object_info) / sizeof(*wolfssl_object_info))
  14763. const size_t wolfssl_object_info_sz = WOLFSSL_OBJECT_INFO_SZ;
  14764. #endif
  14765. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  14766. /* Free the dynamically allocated data.
  14767. *
  14768. * p Pointer to dynamically allocated memory.
  14769. */
  14770. void wolfSSL_OPENSSL_free(void* p)
  14771. {
  14772. WOLFSSL_MSG("wolfSSL_OPENSSL_free");
  14773. XFREE(p, NULL, DYNAMIC_TYPE_OPENSSL);
  14774. }
  14775. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  14776. #ifdef OPENSSL_EXTRA
  14777. void *wolfSSL_OPENSSL_malloc(size_t a)
  14778. {
  14779. return (void *)XMALLOC(a, NULL, DYNAMIC_TYPE_OPENSSL);
  14780. }
  14781. int wolfSSL_OPENSSL_hexchar2int(unsigned char c)
  14782. {
  14783. /* 'char' is unsigned on some platforms. */
  14784. return (int)(signed char)HexCharToByte((char)c);
  14785. }
  14786. unsigned char *wolfSSL_OPENSSL_hexstr2buf(const char *str, long *len)
  14787. {
  14788. unsigned char* targetBuf;
  14789. int srcDigitHigh = 0;
  14790. int srcDigitLow = 0;
  14791. size_t srcLen;
  14792. size_t srcIdx = 0;
  14793. long targetIdx = 0;
  14794. srcLen = XSTRLEN(str);
  14795. targetBuf = (unsigned char*)XMALLOC(srcLen / 2, NULL, DYNAMIC_TYPE_OPENSSL);
  14796. if (targetBuf == NULL) {
  14797. return NULL;
  14798. }
  14799. while (srcIdx < srcLen) {
  14800. if (str[srcIdx] == ':') {
  14801. srcIdx++;
  14802. continue;
  14803. }
  14804. srcDigitHigh = wolfSSL_OPENSSL_hexchar2int(str[srcIdx++]);
  14805. srcDigitLow = wolfSSL_OPENSSL_hexchar2int(str[srcIdx++]);
  14806. if (srcDigitHigh < 0 || srcDigitLow < 0) {
  14807. WOLFSSL_MSG("Invalid hex character.");
  14808. XFREE(targetBuf, NULL, DYNAMIC_TYPE_OPENSSL);
  14809. return NULL;
  14810. }
  14811. targetBuf[targetIdx++] = (unsigned char)((srcDigitHigh << 4) |
  14812. srcDigitLow );
  14813. }
  14814. if (len != NULL)
  14815. *len = targetIdx;
  14816. return targetBuf;
  14817. }
  14818. int wolfSSL_OPENSSL_init_ssl(word64 opts, const OPENSSL_INIT_SETTINGS *settings)
  14819. {
  14820. (void)opts;
  14821. (void)settings;
  14822. return wolfSSL_library_init();
  14823. }
  14824. int wolfSSL_OPENSSL_init_crypto(word64 opts,
  14825. const OPENSSL_INIT_SETTINGS* settings)
  14826. {
  14827. (void)opts;
  14828. (void)settings;
  14829. return wolfSSL_library_init();
  14830. }
  14831. /* Colon separated list of <public key>+<digest> algorithms.
  14832. * Replaces list in context.
  14833. */
  14834. int wolfSSL_CTX_set1_sigalgs_list(WOLFSSL_CTX* ctx, const char* list)
  14835. {
  14836. WOLFSSL_MSG("wolfSSL_CTX_set1_sigalg_list");
  14837. if (ctx == NULL || list == NULL) {
  14838. WOLFSSL_MSG("Bad function arguments");
  14839. return WOLFSSL_FAILURE;
  14840. }
  14841. if (AllocateCtxSuites(ctx) != 0)
  14842. return WOLFSSL_FAILURE;
  14843. return SetSuitesHashSigAlgo(ctx->suites, list);
  14844. }
  14845. /* Colon separated list of <public key>+<digest> algorithms.
  14846. * Replaces list in SSL.
  14847. */
  14848. int wolfSSL_set1_sigalgs_list(WOLFSSL* ssl, const char* list)
  14849. {
  14850. WOLFSSL_MSG("wolfSSL_set1_sigalg_list");
  14851. if (ssl == NULL || list == NULL) {
  14852. WOLFSSL_MSG("Bad function arguments");
  14853. return WOLFSSL_FAILURE;
  14854. }
  14855. if (AllocateSuites(ssl) != 0)
  14856. return WOLFSSL_FAILURE;
  14857. return SetSuitesHashSigAlgo(ssl->suites, list);
  14858. }
  14859. static int HashToNid(byte hashAlgo, int* nid)
  14860. {
  14861. int ret = WOLFSSL_SUCCESS;
  14862. /* Cast for compiler to check everything is implemented */
  14863. switch ((enum wc_MACAlgorithm)hashAlgo) {
  14864. case no_mac:
  14865. case rmd_mac:
  14866. *nid = NID_undef;
  14867. break;
  14868. case md5_mac:
  14869. *nid = NID_md5;
  14870. break;
  14871. case sha_mac:
  14872. *nid = NID_sha1;
  14873. break;
  14874. case sha224_mac:
  14875. *nid = NID_sha224;
  14876. break;
  14877. case sha256_mac:
  14878. *nid = NID_sha256;
  14879. break;
  14880. case sha384_mac:
  14881. *nid = NID_sha384;
  14882. break;
  14883. case sha512_mac:
  14884. *nid = NID_sha512;
  14885. break;
  14886. case blake2b_mac:
  14887. *nid = NID_blake2b512;
  14888. break;
  14889. case sm3_mac:
  14890. *nid = NID_sm3;
  14891. break;
  14892. default:
  14893. ret = WOLFSSL_FAILURE;
  14894. break;
  14895. }
  14896. return ret;
  14897. }
  14898. static int SaToNid(byte sa, int* nid)
  14899. {
  14900. int ret = WOLFSSL_SUCCESS;
  14901. /* Cast for compiler to check everything is implemented */
  14902. switch ((enum SignatureAlgorithm)sa) {
  14903. case anonymous_sa_algo:
  14904. *nid = NID_undef;
  14905. break;
  14906. case rsa_sa_algo:
  14907. *nid = NID_rsaEncryption;
  14908. break;
  14909. case dsa_sa_algo:
  14910. *nid = NID_dsa;
  14911. break;
  14912. case ecc_dsa_sa_algo:
  14913. *nid = NID_X9_62_id_ecPublicKey;
  14914. break;
  14915. case rsa_pss_sa_algo:
  14916. *nid = NID_rsassaPss;
  14917. break;
  14918. case ed25519_sa_algo:
  14919. #ifdef HAVE_ED25519
  14920. *nid = NID_ED25519;
  14921. #else
  14922. ret = WOLFSSL_FAILURE;
  14923. #endif
  14924. break;
  14925. case rsa_pss_pss_algo:
  14926. *nid = NID_rsassaPss;
  14927. break;
  14928. case ed448_sa_algo:
  14929. #ifdef HAVE_ED448
  14930. *nid = NID_ED448;
  14931. #else
  14932. ret = WOLFSSL_FAILURE;
  14933. #endif
  14934. break;
  14935. case falcon_level1_sa_algo:
  14936. *nid = CTC_FALCON_LEVEL1;
  14937. break;
  14938. case falcon_level5_sa_algo:
  14939. *nid = CTC_FALCON_LEVEL5;
  14940. break;
  14941. case dilithium_level2_sa_algo:
  14942. *nid = CTC_DILITHIUM_LEVEL2;
  14943. break;
  14944. case dilithium_level3_sa_algo:
  14945. *nid = CTC_DILITHIUM_LEVEL3;
  14946. break;
  14947. case dilithium_level5_sa_algo:
  14948. *nid = CTC_DILITHIUM_LEVEL5;
  14949. break;
  14950. case sm2_sa_algo:
  14951. *nid = NID_sm2;
  14952. break;
  14953. case invalid_sa_algo:
  14954. default:
  14955. ret = WOLFSSL_FAILURE;
  14956. break;
  14957. }
  14958. return ret;
  14959. }
  14960. /* This API returns the hash selected. */
  14961. int wolfSSL_get_signature_nid(WOLFSSL *ssl, int* nid)
  14962. {
  14963. WOLFSSL_MSG("wolfSSL_get_signature_nid");
  14964. if (ssl == NULL || nid == NULL) {
  14965. WOLFSSL_MSG("Bad function arguments");
  14966. return WOLFSSL_FAILURE;
  14967. }
  14968. return HashToNid(ssl->options.hashAlgo, nid);
  14969. }
  14970. /* This API returns the signature selected. */
  14971. int wolfSSL_get_signature_type_nid(const WOLFSSL* ssl, int* nid)
  14972. {
  14973. WOLFSSL_MSG("wolfSSL_get_signature_type_nid");
  14974. if (ssl == NULL || nid == NULL) {
  14975. WOLFSSL_MSG("Bad function arguments");
  14976. return WOLFSSL_FAILURE;
  14977. }
  14978. return SaToNid(ssl->options.sigAlgo, nid);
  14979. }
  14980. int wolfSSL_get_peer_signature_nid(WOLFSSL* ssl, int* nid)
  14981. {
  14982. WOLFSSL_MSG("wolfSSL_get_peer_signature_nid");
  14983. if (ssl == NULL || nid == NULL) {
  14984. WOLFSSL_MSG("Bad function arguments");
  14985. return WOLFSSL_FAILURE;
  14986. }
  14987. return HashToNid(ssl->options.peerHashAlgo, nid);
  14988. }
  14989. int wolfSSL_get_peer_signature_type_nid(const WOLFSSL* ssl, int* nid)
  14990. {
  14991. WOLFSSL_MSG("wolfSSL_get_peer_signature_type_nid");
  14992. if (ssl == NULL || nid == NULL) {
  14993. WOLFSSL_MSG("Bad function arguments");
  14994. return WOLFSSL_FAILURE;
  14995. }
  14996. return SaToNid(ssl->options.peerSigAlgo, nid);
  14997. }
  14998. #ifdef HAVE_ECC
  14999. #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
  15000. static int populate_groups(int* groups, int max_count, const char *list)
  15001. {
  15002. const char *end;
  15003. int count = 0;
  15004. const WOLF_EC_NIST_NAME* nist_name;
  15005. if (!groups || !list) {
  15006. return -1;
  15007. }
  15008. for (end = list; ; list = ++end) {
  15009. int len;
  15010. if (count > max_count) {
  15011. WOLFSSL_MSG("Too many curves in list");
  15012. return -1;
  15013. }
  15014. while (*end != ':' && *end != '\0') end++;
  15015. len = (int)(end - list); /* end points to char after end
  15016. * of curve name so no need for -1 */
  15017. if ((len < kNistCurves_MIN_NAME_LEN) ||
  15018. (len > kNistCurves_MAX_NAME_LEN)) {
  15019. WOLFSSL_MSG("Unrecognized curve name in list");
  15020. return -1;
  15021. }
  15022. for (nist_name = kNistCurves; nist_name->name != NULL; nist_name++) {
  15023. if (len == nist_name->name_len &&
  15024. XSTRNCMP(list, nist_name->name, nist_name->name_len) == 0) {
  15025. break;
  15026. }
  15027. }
  15028. if (!nist_name->name) {
  15029. WOLFSSL_MSG("Unrecognized curve name in list");
  15030. return -1;
  15031. }
  15032. groups[count++] = nist_name->nid;
  15033. if (*end == '\0') break;
  15034. }
  15035. return count;
  15036. }
  15037. int wolfSSL_CTX_set1_groups_list(WOLFSSL_CTX *ctx, const char *list)
  15038. {
  15039. int groups[WOLFSSL_MAX_GROUP_COUNT];
  15040. int count = 0;
  15041. if (!ctx || !list) {
  15042. return WOLFSSL_FAILURE;
  15043. }
  15044. if ((count = populate_groups(groups,
  15045. WOLFSSL_MAX_GROUP_COUNT, list)) == -1) {
  15046. return WOLFSSL_FAILURE;
  15047. }
  15048. return wolfSSL_CTX_set1_groups(ctx, groups, count);
  15049. }
  15050. int wolfSSL_set1_groups_list(WOLFSSL *ssl, const char *list)
  15051. {
  15052. int groups[WOLFSSL_MAX_GROUP_COUNT];
  15053. int count = 0;
  15054. if (!ssl || !list) {
  15055. return WOLFSSL_FAILURE;
  15056. }
  15057. if ((count = populate_groups(groups,
  15058. WOLFSSL_MAX_GROUP_COUNT, list)) == -1) {
  15059. return WOLFSSL_FAILURE;
  15060. }
  15061. return wolfSSL_set1_groups(ssl, groups, count);
  15062. }
  15063. #endif /* WOLFSSL_TLS13 */
  15064. #endif /* HAVE_ECC */
  15065. #endif /* OPENSSL_EXTRA */
  15066. #ifdef WOLFSSL_ALT_CERT_CHAINS
  15067. int wolfSSL_is_peer_alt_cert_chain(const WOLFSSL* ssl)
  15068. {
  15069. int isUsing = 0;
  15070. if (ssl)
  15071. isUsing = ssl->options.usingAltCertChain;
  15072. return isUsing;
  15073. }
  15074. #endif /* WOLFSSL_ALT_CERT_CHAINS */
  15075. #ifdef SESSION_CERTS
  15076. #ifdef WOLFSSL_ALT_CERT_CHAINS
  15077. /* Get peer's alternate certificate chain */
  15078. WOLFSSL_X509_CHAIN* wolfSSL_get_peer_alt_chain(WOLFSSL* ssl)
  15079. {
  15080. WOLFSSL_ENTER("wolfSSL_get_peer_alt_chain");
  15081. if (ssl)
  15082. return &ssl->session->altChain;
  15083. return 0;
  15084. }
  15085. #endif /* WOLFSSL_ALT_CERT_CHAINS */
  15086. /* Get peer's certificate chain */
  15087. WOLFSSL_X509_CHAIN* wolfSSL_get_peer_chain(WOLFSSL* ssl)
  15088. {
  15089. WOLFSSL_ENTER("wolfSSL_get_peer_chain");
  15090. if (ssl)
  15091. return &ssl->session->chain;
  15092. return 0;
  15093. }
  15094. /* Get peer's certificate chain total count */
  15095. int wolfSSL_get_chain_count(WOLFSSL_X509_CHAIN* chain)
  15096. {
  15097. WOLFSSL_ENTER("wolfSSL_get_chain_count");
  15098. if (chain)
  15099. return chain->count;
  15100. return 0;
  15101. }
  15102. /* Get peer's ASN.1 DER certificate at index (idx) length in bytes */
  15103. int wolfSSL_get_chain_length(WOLFSSL_X509_CHAIN* chain, int idx)
  15104. {
  15105. WOLFSSL_ENTER("wolfSSL_get_chain_length");
  15106. if (chain)
  15107. return chain->certs[idx].length;
  15108. return 0;
  15109. }
  15110. /* Get peer's ASN.1 DER certificate at index (idx) */
  15111. byte* wolfSSL_get_chain_cert(WOLFSSL_X509_CHAIN* chain, int idx)
  15112. {
  15113. WOLFSSL_ENTER("wolfSSL_get_chain_cert");
  15114. if (chain)
  15115. return chain->certs[idx].buffer;
  15116. return 0;
  15117. }
  15118. /* Get peer's wolfSSL X509 certificate at index (idx) */
  15119. WOLFSSL_X509* wolfSSL_get_chain_X509(WOLFSSL_X509_CHAIN* chain, int idx)
  15120. {
  15121. int ret = 0;
  15122. WOLFSSL_X509* x509 = NULL;
  15123. #ifdef WOLFSSL_SMALL_STACK
  15124. DecodedCert* cert = NULL;
  15125. #else
  15126. DecodedCert cert[1];
  15127. #endif
  15128. WOLFSSL_ENTER("wolfSSL_get_chain_X509");
  15129. if (chain != NULL) {
  15130. #ifdef WOLFSSL_SMALL_STACK
  15131. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  15132. DYNAMIC_TYPE_DCERT);
  15133. if (cert != NULL)
  15134. #endif
  15135. {
  15136. InitDecodedCert(cert, chain->certs[idx].buffer,
  15137. chain->certs[idx].length, NULL);
  15138. if ((ret = ParseCertRelative(cert, CERT_TYPE, 0, NULL)) != 0) {
  15139. WOLFSSL_MSG("Failed to parse cert");
  15140. }
  15141. else {
  15142. x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
  15143. DYNAMIC_TYPE_X509);
  15144. if (x509 == NULL) {
  15145. WOLFSSL_MSG("Failed alloc X509");
  15146. }
  15147. else {
  15148. InitX509(x509, 1, NULL);
  15149. if ((ret = CopyDecodedToX509(x509, cert)) != 0) {
  15150. WOLFSSL_MSG("Failed to copy decoded");
  15151. wolfSSL_X509_free(x509);
  15152. x509 = NULL;
  15153. }
  15154. }
  15155. }
  15156. FreeDecodedCert(cert);
  15157. #ifdef WOLFSSL_SMALL_STACK
  15158. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  15159. #endif
  15160. }
  15161. }
  15162. (void)ret;
  15163. return x509;
  15164. }
  15165. /* Get peer's PEM certificate at index (idx), output to buffer if inLen big
  15166. enough else return error (-1). If buffer is NULL only calculate
  15167. outLen. Output length is in *outLen WOLFSSL_SUCCESS on ok */
  15168. int wolfSSL_get_chain_cert_pem(WOLFSSL_X509_CHAIN* chain, int idx,
  15169. unsigned char* buf, int inLen, int* outLen)
  15170. {
  15171. #if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
  15172. const char* header = NULL;
  15173. const char* footer = NULL;
  15174. int headerLen;
  15175. int footerLen;
  15176. int i;
  15177. int err;
  15178. word32 szNeeded = 0;
  15179. WOLFSSL_ENTER("wolfSSL_get_chain_cert_pem");
  15180. if (!chain || !outLen || idx < 0 || idx >= wolfSSL_get_chain_count(chain))
  15181. return BAD_FUNC_ARG;
  15182. err = wc_PemGetHeaderFooter(CERT_TYPE, &header, &footer);
  15183. if (err != 0)
  15184. return err;
  15185. headerLen = (int)XSTRLEN(header);
  15186. footerLen = (int)XSTRLEN(footer);
  15187. /* Null output buffer return size needed in outLen */
  15188. if(!buf) {
  15189. if(Base64_Encode(chain->certs[idx].buffer, chain->certs[idx].length,
  15190. NULL, &szNeeded) != LENGTH_ONLY_E)
  15191. return WOLFSSL_FAILURE;
  15192. *outLen = szNeeded + headerLen + footerLen;
  15193. return LENGTH_ONLY_E;
  15194. }
  15195. /* don't even try if inLen too short */
  15196. if (inLen < headerLen + footerLen + chain->certs[idx].length)
  15197. return BAD_FUNC_ARG;
  15198. /* header */
  15199. if (XMEMCPY(buf, header, headerLen) == NULL)
  15200. return WOLFSSL_FATAL_ERROR;
  15201. i = headerLen;
  15202. /* body */
  15203. *outLen = inLen; /* input to Base64_Encode */
  15204. if ( (err = Base64_Encode(chain->certs[idx].buffer,
  15205. chain->certs[idx].length, buf + i, (word32*)outLen)) < 0)
  15206. return err;
  15207. i += *outLen;
  15208. /* footer */
  15209. if ( (i + footerLen) > inLen)
  15210. return BAD_FUNC_ARG;
  15211. if (XMEMCPY(buf + i, footer, footerLen) == NULL)
  15212. return WOLFSSL_FATAL_ERROR;
  15213. *outLen += headerLen + footerLen;
  15214. return WOLFSSL_SUCCESS;
  15215. #else
  15216. (void)chain;
  15217. (void)idx;
  15218. (void)buf;
  15219. (void)inLen;
  15220. (void)outLen;
  15221. return WOLFSSL_FAILURE;
  15222. #endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
  15223. }
  15224. #endif /* SESSION_CERTS */
  15225. #ifdef HAVE_FUZZER
  15226. void wolfSSL_SetFuzzerCb(WOLFSSL* ssl, CallbackFuzzer cbf, void* fCtx)
  15227. {
  15228. if (ssl) {
  15229. ssl->fuzzerCb = cbf;
  15230. ssl->fuzzerCtx = fCtx;
  15231. }
  15232. }
  15233. #endif
  15234. #ifndef NO_CERTS
  15235. #ifdef HAVE_PK_CALLBACKS
  15236. #ifdef HAVE_ECC
  15237. void wolfSSL_CTX_SetEccKeyGenCb(WOLFSSL_CTX* ctx, CallbackEccKeyGen cb)
  15238. {
  15239. if (ctx)
  15240. ctx->EccKeyGenCb = cb;
  15241. }
  15242. void wolfSSL_SetEccKeyGenCtx(WOLFSSL* ssl, void *ctx)
  15243. {
  15244. if (ssl)
  15245. ssl->EccKeyGenCtx = ctx;
  15246. }
  15247. void* wolfSSL_GetEccKeyGenCtx(WOLFSSL* ssl)
  15248. {
  15249. if (ssl)
  15250. return ssl->EccKeyGenCtx;
  15251. return NULL;
  15252. }
  15253. void wolfSSL_CTX_SetEccSignCtx(WOLFSSL_CTX* ctx, void *userCtx)
  15254. {
  15255. if (ctx)
  15256. ctx->EccSignCtx = userCtx;
  15257. }
  15258. void* wolfSSL_CTX_GetEccSignCtx(WOLFSSL_CTX* ctx)
  15259. {
  15260. if (ctx)
  15261. return ctx->EccSignCtx;
  15262. return NULL;
  15263. }
  15264. WOLFSSL_ABI
  15265. void wolfSSL_CTX_SetEccSignCb(WOLFSSL_CTX* ctx, CallbackEccSign cb)
  15266. {
  15267. if (ctx)
  15268. ctx->EccSignCb = cb;
  15269. }
  15270. void wolfSSL_SetEccSignCtx(WOLFSSL* ssl, void *ctx)
  15271. {
  15272. if (ssl)
  15273. ssl->EccSignCtx = ctx;
  15274. }
  15275. void* wolfSSL_GetEccSignCtx(WOLFSSL* ssl)
  15276. {
  15277. if (ssl)
  15278. return ssl->EccSignCtx;
  15279. return NULL;
  15280. }
  15281. void wolfSSL_CTX_SetEccVerifyCb(WOLFSSL_CTX* ctx, CallbackEccVerify cb)
  15282. {
  15283. if (ctx)
  15284. ctx->EccVerifyCb = cb;
  15285. }
  15286. void wolfSSL_SetEccVerifyCtx(WOLFSSL* ssl, void *ctx)
  15287. {
  15288. if (ssl)
  15289. ssl->EccVerifyCtx = ctx;
  15290. }
  15291. void* wolfSSL_GetEccVerifyCtx(WOLFSSL* ssl)
  15292. {
  15293. if (ssl)
  15294. return ssl->EccVerifyCtx;
  15295. return NULL;
  15296. }
  15297. void wolfSSL_CTX_SetEccSharedSecretCb(WOLFSSL_CTX* ctx,
  15298. CallbackEccSharedSecret cb)
  15299. {
  15300. if (ctx)
  15301. ctx->EccSharedSecretCb = cb;
  15302. }
  15303. void wolfSSL_SetEccSharedSecretCtx(WOLFSSL* ssl, void *ctx)
  15304. {
  15305. if (ssl)
  15306. ssl->EccSharedSecretCtx = ctx;
  15307. }
  15308. void* wolfSSL_GetEccSharedSecretCtx(WOLFSSL* ssl)
  15309. {
  15310. if (ssl)
  15311. return ssl->EccSharedSecretCtx;
  15312. return NULL;
  15313. }
  15314. #endif /* HAVE_ECC */
  15315. #ifdef HAVE_ED25519
  15316. void wolfSSL_CTX_SetEd25519SignCb(WOLFSSL_CTX* ctx, CallbackEd25519Sign cb)
  15317. {
  15318. if (ctx)
  15319. ctx->Ed25519SignCb = cb;
  15320. }
  15321. void wolfSSL_SetEd25519SignCtx(WOLFSSL* ssl, void *ctx)
  15322. {
  15323. if (ssl)
  15324. ssl->Ed25519SignCtx = ctx;
  15325. }
  15326. void* wolfSSL_GetEd25519SignCtx(WOLFSSL* ssl)
  15327. {
  15328. if (ssl)
  15329. return ssl->Ed25519SignCtx;
  15330. return NULL;
  15331. }
  15332. void wolfSSL_CTX_SetEd25519VerifyCb(WOLFSSL_CTX* ctx, CallbackEd25519Verify cb)
  15333. {
  15334. if (ctx)
  15335. ctx->Ed25519VerifyCb = cb;
  15336. }
  15337. void wolfSSL_SetEd25519VerifyCtx(WOLFSSL* ssl, void *ctx)
  15338. {
  15339. if (ssl)
  15340. ssl->Ed25519VerifyCtx = ctx;
  15341. }
  15342. void* wolfSSL_GetEd25519VerifyCtx(WOLFSSL* ssl)
  15343. {
  15344. if (ssl)
  15345. return ssl->Ed25519VerifyCtx;
  15346. return NULL;
  15347. }
  15348. #endif /* HAVE_ED25519 */
  15349. #ifdef HAVE_CURVE25519
  15350. void wolfSSL_CTX_SetX25519KeyGenCb(WOLFSSL_CTX* ctx,
  15351. CallbackX25519KeyGen cb)
  15352. {
  15353. if (ctx)
  15354. ctx->X25519KeyGenCb = cb;
  15355. }
  15356. void wolfSSL_SetX25519KeyGenCtx(WOLFSSL* ssl, void *ctx)
  15357. {
  15358. if (ssl)
  15359. ssl->X25519KeyGenCtx = ctx;
  15360. }
  15361. void* wolfSSL_GetX25519KeyGenCtx(WOLFSSL* ssl)
  15362. {
  15363. if (ssl)
  15364. return ssl->X25519KeyGenCtx;
  15365. return NULL;
  15366. }
  15367. void wolfSSL_CTX_SetX25519SharedSecretCb(WOLFSSL_CTX* ctx,
  15368. CallbackX25519SharedSecret cb)
  15369. {
  15370. if (ctx)
  15371. ctx->X25519SharedSecretCb = cb;
  15372. }
  15373. void wolfSSL_SetX25519SharedSecretCtx(WOLFSSL* ssl, void *ctx)
  15374. {
  15375. if (ssl)
  15376. ssl->X25519SharedSecretCtx = ctx;
  15377. }
  15378. void* wolfSSL_GetX25519SharedSecretCtx(WOLFSSL* ssl)
  15379. {
  15380. if (ssl)
  15381. return ssl->X25519SharedSecretCtx;
  15382. return NULL;
  15383. }
  15384. #endif /* HAVE_CURVE25519 */
  15385. #ifdef HAVE_ED448
  15386. void wolfSSL_CTX_SetEd448SignCb(WOLFSSL_CTX* ctx, CallbackEd448Sign cb)
  15387. {
  15388. if (ctx)
  15389. ctx->Ed448SignCb = cb;
  15390. }
  15391. void wolfSSL_SetEd448SignCtx(WOLFSSL* ssl, void *ctx)
  15392. {
  15393. if (ssl)
  15394. ssl->Ed448SignCtx = ctx;
  15395. }
  15396. void* wolfSSL_GetEd448SignCtx(WOLFSSL* ssl)
  15397. {
  15398. if (ssl)
  15399. return ssl->Ed448SignCtx;
  15400. return NULL;
  15401. }
  15402. void wolfSSL_CTX_SetEd448VerifyCb(WOLFSSL_CTX* ctx, CallbackEd448Verify cb)
  15403. {
  15404. if (ctx)
  15405. ctx->Ed448VerifyCb = cb;
  15406. }
  15407. void wolfSSL_SetEd448VerifyCtx(WOLFSSL* ssl, void *ctx)
  15408. {
  15409. if (ssl)
  15410. ssl->Ed448VerifyCtx = ctx;
  15411. }
  15412. void* wolfSSL_GetEd448VerifyCtx(WOLFSSL* ssl)
  15413. {
  15414. if (ssl)
  15415. return ssl->Ed448VerifyCtx;
  15416. return NULL;
  15417. }
  15418. #endif /* HAVE_ED448 */
  15419. #ifdef HAVE_CURVE448
  15420. void wolfSSL_CTX_SetX448KeyGenCb(WOLFSSL_CTX* ctx,
  15421. CallbackX448KeyGen cb)
  15422. {
  15423. if (ctx)
  15424. ctx->X448KeyGenCb = cb;
  15425. }
  15426. void wolfSSL_SetX448KeyGenCtx(WOLFSSL* ssl, void *ctx)
  15427. {
  15428. if (ssl)
  15429. ssl->X448KeyGenCtx = ctx;
  15430. }
  15431. void* wolfSSL_GetX448KeyGenCtx(WOLFSSL* ssl)
  15432. {
  15433. if (ssl)
  15434. return ssl->X448KeyGenCtx;
  15435. return NULL;
  15436. }
  15437. void wolfSSL_CTX_SetX448SharedSecretCb(WOLFSSL_CTX* ctx,
  15438. CallbackX448SharedSecret cb)
  15439. {
  15440. if (ctx)
  15441. ctx->X448SharedSecretCb = cb;
  15442. }
  15443. void wolfSSL_SetX448SharedSecretCtx(WOLFSSL* ssl, void *ctx)
  15444. {
  15445. if (ssl)
  15446. ssl->X448SharedSecretCtx = ctx;
  15447. }
  15448. void* wolfSSL_GetX448SharedSecretCtx(WOLFSSL* ssl)
  15449. {
  15450. if (ssl)
  15451. return ssl->X448SharedSecretCtx;
  15452. return NULL;
  15453. }
  15454. #endif /* HAVE_CURVE448 */
  15455. #ifndef NO_RSA
  15456. void wolfSSL_CTX_SetRsaSignCb(WOLFSSL_CTX* ctx, CallbackRsaSign cb)
  15457. {
  15458. if (ctx)
  15459. ctx->RsaSignCb = cb;
  15460. }
  15461. void wolfSSL_CTX_SetRsaSignCheckCb(WOLFSSL_CTX* ctx, CallbackRsaVerify cb)
  15462. {
  15463. if (ctx)
  15464. ctx->RsaSignCheckCb = cb;
  15465. }
  15466. void wolfSSL_SetRsaSignCtx(WOLFSSL* ssl, void *ctx)
  15467. {
  15468. if (ssl)
  15469. ssl->RsaSignCtx = ctx;
  15470. }
  15471. void* wolfSSL_GetRsaSignCtx(WOLFSSL* ssl)
  15472. {
  15473. if (ssl)
  15474. return ssl->RsaSignCtx;
  15475. return NULL;
  15476. }
  15477. void wolfSSL_CTX_SetRsaVerifyCb(WOLFSSL_CTX* ctx, CallbackRsaVerify cb)
  15478. {
  15479. if (ctx)
  15480. ctx->RsaVerifyCb = cb;
  15481. }
  15482. void wolfSSL_SetRsaVerifyCtx(WOLFSSL* ssl, void *ctx)
  15483. {
  15484. if (ssl)
  15485. ssl->RsaVerifyCtx = ctx;
  15486. }
  15487. void* wolfSSL_GetRsaVerifyCtx(WOLFSSL* ssl)
  15488. {
  15489. if (ssl)
  15490. return ssl->RsaVerifyCtx;
  15491. return NULL;
  15492. }
  15493. #ifdef WC_RSA_PSS
  15494. void wolfSSL_CTX_SetRsaPssSignCb(WOLFSSL_CTX* ctx, CallbackRsaPssSign cb)
  15495. {
  15496. if (ctx)
  15497. ctx->RsaPssSignCb = cb;
  15498. }
  15499. void wolfSSL_CTX_SetRsaPssSignCheckCb(WOLFSSL_CTX* ctx,
  15500. CallbackRsaPssVerify cb)
  15501. {
  15502. if (ctx)
  15503. ctx->RsaPssSignCheckCb = cb;
  15504. }
  15505. void wolfSSL_SetRsaPssSignCtx(WOLFSSL* ssl, void *ctx)
  15506. {
  15507. if (ssl)
  15508. ssl->RsaPssSignCtx = ctx;
  15509. }
  15510. void* wolfSSL_GetRsaPssSignCtx(WOLFSSL* ssl)
  15511. {
  15512. if (ssl)
  15513. return ssl->RsaPssSignCtx;
  15514. return NULL;
  15515. }
  15516. void wolfSSL_CTX_SetRsaPssVerifyCb(WOLFSSL_CTX* ctx, CallbackRsaPssVerify cb)
  15517. {
  15518. if (ctx)
  15519. ctx->RsaPssVerifyCb = cb;
  15520. }
  15521. void wolfSSL_SetRsaPssVerifyCtx(WOLFSSL* ssl, void *ctx)
  15522. {
  15523. if (ssl)
  15524. ssl->RsaPssVerifyCtx = ctx;
  15525. }
  15526. void* wolfSSL_GetRsaPssVerifyCtx(WOLFSSL* ssl)
  15527. {
  15528. if (ssl)
  15529. return ssl->RsaPssVerifyCtx;
  15530. return NULL;
  15531. }
  15532. #endif /* WC_RSA_PSS */
  15533. void wolfSSL_CTX_SetRsaEncCb(WOLFSSL_CTX* ctx, CallbackRsaEnc cb)
  15534. {
  15535. if (ctx)
  15536. ctx->RsaEncCb = cb;
  15537. }
  15538. void wolfSSL_SetRsaEncCtx(WOLFSSL* ssl, void *ctx)
  15539. {
  15540. if (ssl)
  15541. ssl->RsaEncCtx = ctx;
  15542. }
  15543. void* wolfSSL_GetRsaEncCtx(WOLFSSL* ssl)
  15544. {
  15545. if (ssl)
  15546. return ssl->RsaEncCtx;
  15547. return NULL;
  15548. }
  15549. void wolfSSL_CTX_SetRsaDecCb(WOLFSSL_CTX* ctx, CallbackRsaDec cb)
  15550. {
  15551. if (ctx)
  15552. ctx->RsaDecCb = cb;
  15553. }
  15554. void wolfSSL_SetRsaDecCtx(WOLFSSL* ssl, void *ctx)
  15555. {
  15556. if (ssl)
  15557. ssl->RsaDecCtx = ctx;
  15558. }
  15559. void* wolfSSL_GetRsaDecCtx(WOLFSSL* ssl)
  15560. {
  15561. if (ssl)
  15562. return ssl->RsaDecCtx;
  15563. return NULL;
  15564. }
  15565. #endif /* NO_RSA */
  15566. /* callback for premaster secret generation */
  15567. void wolfSSL_CTX_SetGenPreMasterCb(WOLFSSL_CTX* ctx, CallbackGenPreMaster cb)
  15568. {
  15569. if (ctx)
  15570. ctx->GenPreMasterCb = cb;
  15571. }
  15572. /* Set premaster secret generation callback context */
  15573. void wolfSSL_SetGenPreMasterCtx(WOLFSSL* ssl, void *ctx)
  15574. {
  15575. if (ssl)
  15576. ssl->GenPreMasterCtx = ctx;
  15577. }
  15578. /* Get premaster secret generation callback context */
  15579. void* wolfSSL_GetGenPreMasterCtx(WOLFSSL* ssl)
  15580. {
  15581. if (ssl)
  15582. return ssl->GenPreMasterCtx;
  15583. return NULL;
  15584. }
  15585. /* callback for master secret generation */
  15586. void wolfSSL_CTX_SetGenMasterSecretCb(WOLFSSL_CTX* ctx,
  15587. CallbackGenMasterSecret cb)
  15588. {
  15589. if (ctx)
  15590. ctx->GenMasterCb = cb;
  15591. }
  15592. /* Set master secret generation callback context */
  15593. void wolfSSL_SetGenMasterSecretCtx(WOLFSSL* ssl, void *ctx)
  15594. {
  15595. if (ssl)
  15596. ssl->GenMasterCtx = ctx;
  15597. }
  15598. /* Get master secret generation callback context */
  15599. void* wolfSSL_GetGenMasterSecretCtx(WOLFSSL* ssl)
  15600. {
  15601. if (ssl)
  15602. return ssl->GenMasterCtx;
  15603. return NULL;
  15604. }
  15605. /* callback for session key generation */
  15606. void wolfSSL_CTX_SetGenSessionKeyCb(WOLFSSL_CTX* ctx, CallbackGenSessionKey cb)
  15607. {
  15608. if (ctx)
  15609. ctx->GenSessionKeyCb = cb;
  15610. }
  15611. /* Set session key generation callback context */
  15612. void wolfSSL_SetGenSessionKeyCtx(WOLFSSL* ssl, void *ctx)
  15613. {
  15614. if (ssl)
  15615. ssl->GenSessionKeyCtx = ctx;
  15616. }
  15617. /* Get session key generation callback context */
  15618. void* wolfSSL_GetGenSessionKeyCtx(WOLFSSL* ssl)
  15619. {
  15620. if (ssl)
  15621. return ssl->GenSessionKeyCtx;
  15622. return NULL;
  15623. }
  15624. /* callback for setting encryption keys */
  15625. void wolfSSL_CTX_SetEncryptKeysCb(WOLFSSL_CTX* ctx, CallbackEncryptKeys cb)
  15626. {
  15627. if (ctx)
  15628. ctx->EncryptKeysCb = cb;
  15629. }
  15630. /* Set encryption keys callback context */
  15631. void wolfSSL_SetEncryptKeysCtx(WOLFSSL* ssl, void *ctx)
  15632. {
  15633. if (ssl)
  15634. ssl->EncryptKeysCtx = ctx;
  15635. }
  15636. /* Get encryption keys callback context */
  15637. void* wolfSSL_GetEncryptKeysCtx(WOLFSSL* ssl)
  15638. {
  15639. if (ssl)
  15640. return ssl->EncryptKeysCtx;
  15641. return NULL;
  15642. }
  15643. /* callback for Tls finished */
  15644. /* the callback can be used to build TLS Finished message if enabled */
  15645. void wolfSSL_CTX_SetTlsFinishedCb(WOLFSSL_CTX* ctx, CallbackTlsFinished cb)
  15646. {
  15647. if (ctx)
  15648. ctx->TlsFinishedCb = cb;
  15649. }
  15650. /* Set Tls finished callback context */
  15651. void wolfSSL_SetTlsFinishedCtx(WOLFSSL* ssl, void *ctx)
  15652. {
  15653. if (ssl)
  15654. ssl->TlsFinishedCtx = ctx;
  15655. }
  15656. /* Get Tls finished callback context */
  15657. void* wolfSSL_GetTlsFinishedCtx(WOLFSSL* ssl)
  15658. {
  15659. if (ssl)
  15660. return ssl->TlsFinishedCtx;
  15661. return NULL;
  15662. }
  15663. #if !defined(WOLFSSL_NO_TLS12) && !defined(WOLFSSL_AEAD_ONLY)
  15664. /* callback for verify data */
  15665. void wolfSSL_CTX_SetVerifyMacCb(WOLFSSL_CTX* ctx, CallbackVerifyMac cb)
  15666. {
  15667. if (ctx)
  15668. ctx->VerifyMacCb = cb;
  15669. }
  15670. /* Set set keys callback context */
  15671. void wolfSSL_SetVerifyMacCtx(WOLFSSL* ssl, void *ctx)
  15672. {
  15673. if (ssl)
  15674. ssl->VerifyMacCtx = ctx;
  15675. }
  15676. /* Get set keys callback context */
  15677. void* wolfSSL_GetVerifyMacCtx(WOLFSSL* ssl)
  15678. {
  15679. if (ssl)
  15680. return ssl->VerifyMacCtx;
  15681. return NULL;
  15682. }
  15683. #endif /* !WOLFSSL_NO_TLS12 && !WOLFSSL_AEAD_ONLY */
  15684. void wolfSSL_CTX_SetHKDFExpandLabelCb(WOLFSSL_CTX* ctx,
  15685. CallbackHKDFExpandLabel cb)
  15686. {
  15687. if (ctx)
  15688. ctx->HKDFExpandLabelCb = cb;
  15689. }
  15690. #ifdef WOLFSSL_PUBLIC_ASN
  15691. void wolfSSL_CTX_SetProcessPeerCertCb(WOLFSSL_CTX* ctx,
  15692. CallbackProcessPeerCert cb)
  15693. {
  15694. if (ctx)
  15695. ctx->ProcessPeerCertCb = cb;
  15696. }
  15697. #endif /* WOLFSSL_PUBLIC_ASN */
  15698. void wolfSSL_CTX_SetProcessServerSigKexCb(WOLFSSL_CTX* ctx,
  15699. CallbackProcessServerSigKex cb)
  15700. {
  15701. if (ctx)
  15702. ctx->ProcessServerSigKexCb = cb;
  15703. }
  15704. void wolfSSL_CTX_SetPerformTlsRecordProcessingCb(WOLFSSL_CTX* ctx,
  15705. CallbackPerformTlsRecordProcessing cb)
  15706. {
  15707. if (ctx)
  15708. ctx->PerformTlsRecordProcessingCb = cb;
  15709. }
  15710. #endif /* HAVE_PK_CALLBACKS */
  15711. #endif /* NO_CERTS */
  15712. #if defined(HAVE_PK_CALLBACKS) && !defined(NO_DH)
  15713. void wolfSSL_CTX_SetDhGenerateKeyPair(WOLFSSL_CTX* ctx,
  15714. CallbackDhGenerateKeyPair cb) {
  15715. if (ctx)
  15716. ctx->DhGenerateKeyPairCb = cb;
  15717. }
  15718. void wolfSSL_CTX_SetDhAgreeCb(WOLFSSL_CTX* ctx, CallbackDhAgree cb)
  15719. {
  15720. if (ctx)
  15721. ctx->DhAgreeCb = cb;
  15722. }
  15723. void wolfSSL_SetDhAgreeCtx(WOLFSSL* ssl, void *ctx)
  15724. {
  15725. if (ssl)
  15726. ssl->DhAgreeCtx = ctx;
  15727. }
  15728. void* wolfSSL_GetDhAgreeCtx(WOLFSSL* ssl)
  15729. {
  15730. if (ssl)
  15731. return ssl->DhAgreeCtx;
  15732. return NULL;
  15733. }
  15734. #endif /* HAVE_PK_CALLBACKS && !NO_DH */
  15735. #if defined(HAVE_PK_CALLBACKS) && defined(HAVE_HKDF)
  15736. void wolfSSL_CTX_SetHKDFExtractCb(WOLFSSL_CTX* ctx, CallbackHKDFExtract cb)
  15737. {
  15738. if (ctx)
  15739. ctx->HkdfExtractCb = cb;
  15740. }
  15741. void wolfSSL_SetHKDFExtractCtx(WOLFSSL* ssl, void *ctx)
  15742. {
  15743. if (ssl)
  15744. ssl->HkdfExtractCtx = ctx;
  15745. }
  15746. void* wolfSSL_GetHKDFExtractCtx(WOLFSSL* ssl)
  15747. {
  15748. if (ssl)
  15749. return ssl->HkdfExtractCtx;
  15750. return NULL;
  15751. }
  15752. #endif /* HAVE_PK_CALLBACKS && HAVE_HKDF */
  15753. #ifdef WOLFSSL_HAVE_WOLFSCEP
  15754. /* Used by autoconf to see if wolfSCEP is available */
  15755. void wolfSSL_wolfSCEP(void) {}
  15756. #endif
  15757. #ifdef WOLFSSL_HAVE_CERT_SERVICE
  15758. /* Used by autoconf to see if cert service is available */
  15759. void wolfSSL_cert_service(void) {}
  15760. #endif
  15761. #if (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
  15762. !defined(WOLFCRYPT_ONLY)
  15763. /* NID variables are dependent on compatibility header files currently
  15764. *
  15765. * returns a pointer to a new WOLFSSL_ASN1_OBJECT struct on success and NULL
  15766. * on fail
  15767. */
  15768. WOLFSSL_ASN1_OBJECT* wolfSSL_OBJ_nid2obj(int id)
  15769. {
  15770. return wolfSSL_OBJ_nid2obj_ex(id, NULL);
  15771. }
  15772. WOLFSSL_LOCAL WOLFSSL_ASN1_OBJECT* wolfSSL_OBJ_nid2obj_ex(int id,
  15773. WOLFSSL_ASN1_OBJECT* arg_obj)
  15774. {
  15775. word32 oidSz = 0;
  15776. int nid = 0;
  15777. const byte* oid;
  15778. word32 type = 0;
  15779. WOLFSSL_ASN1_OBJECT* obj = arg_obj;
  15780. byte objBuf[MAX_OID_SZ + MAX_LENGTH_SZ + 1]; /* +1 for object tag */
  15781. word32 objSz = 0;
  15782. const char* sName = NULL;
  15783. int i;
  15784. #ifdef WOLFSSL_DEBUG_OPENSSL
  15785. WOLFSSL_ENTER("wolfSSL_OBJ_nid2obj");
  15786. #endif
  15787. for (i = 0; i < (int)WOLFSSL_OBJECT_INFO_SZ; i++) {
  15788. if (wolfssl_object_info[i].nid == id) {
  15789. nid = id;
  15790. id = wolfssl_object_info[i].id;
  15791. sName = wolfssl_object_info[i].sName;
  15792. type = wolfssl_object_info[i].type;
  15793. break;
  15794. }
  15795. }
  15796. if (i == (int)WOLFSSL_OBJECT_INFO_SZ) {
  15797. WOLFSSL_MSG("NID not in table");
  15798. #ifdef WOLFSSL_QT
  15799. sName = NULL;
  15800. type = id;
  15801. #else
  15802. return NULL;
  15803. #endif
  15804. }
  15805. #ifdef HAVE_ECC
  15806. if (type == 0 && wc_ecc_get_oid(id, &oid, &oidSz) > 0) {
  15807. type = oidCurveType;
  15808. }
  15809. #endif /* HAVE_ECC */
  15810. if (sName != NULL) {
  15811. if (XSTRLEN(sName) > WOLFSSL_MAX_SNAME - 1) {
  15812. WOLFSSL_MSG("Attempted short name is too large");
  15813. return NULL;
  15814. }
  15815. }
  15816. oid = OidFromId(id, type, &oidSz);
  15817. /* set object ID to buffer */
  15818. if (obj == NULL){
  15819. obj = wolfSSL_ASN1_OBJECT_new();
  15820. if (obj == NULL) {
  15821. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  15822. return NULL;
  15823. }
  15824. }
  15825. obj->nid = nid;
  15826. obj->type = id;
  15827. obj->grp = type;
  15828. obj->sName[0] = '\0';
  15829. if (sName != NULL) {
  15830. XMEMCPY(obj->sName, (char*)sName, XSTRLEN((char*)sName));
  15831. }
  15832. objBuf[0] = ASN_OBJECT_ID; objSz++;
  15833. objSz += SetLength(oidSz, objBuf + 1);
  15834. if (oidSz) {
  15835. XMEMCPY(objBuf + objSz, oid, oidSz);
  15836. objSz += oidSz;
  15837. }
  15838. if (obj->objSz == 0 || objSz != obj->objSz) {
  15839. obj->objSz = objSz;
  15840. if(((obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) ||
  15841. (obj->obj == NULL)) {
  15842. if (obj->obj != NULL)
  15843. XFREE((byte*)obj->obj, NULL, DYNAMIC_TYPE_ASN1);
  15844. obj->obj = (byte*)XMALLOC(obj->objSz, NULL, DYNAMIC_TYPE_ASN1);
  15845. if (obj->obj == NULL) {
  15846. wolfSSL_ASN1_OBJECT_free(obj);
  15847. return NULL;
  15848. }
  15849. obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
  15850. }
  15851. else {
  15852. obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
  15853. }
  15854. }
  15855. XMEMCPY((byte*)obj->obj, objBuf, obj->objSz);
  15856. (void)type;
  15857. return obj;
  15858. }
  15859. static const char* oid_translate_num_to_str(const char* oid)
  15860. {
  15861. const struct oid_dict {
  15862. const char* num;
  15863. const char* desc;
  15864. } oid_dict[] = {
  15865. { "2.5.29.37.0", "Any Extended Key Usage" },
  15866. { "1.3.6.1.5.5.7.3.1", "TLS Web Server Authentication" },
  15867. { "1.3.6.1.5.5.7.3.2", "TLS Web Client Authentication" },
  15868. { "1.3.6.1.5.5.7.3.3", "Code Signing" },
  15869. { "1.3.6.1.5.5.7.3.4", "E-mail Protection" },
  15870. { "1.3.6.1.5.5.7.3.8", "Time Stamping" },
  15871. { "1.3.6.1.5.5.7.3.9", "OCSP Signing" },
  15872. { NULL, NULL }
  15873. };
  15874. const struct oid_dict* idx;
  15875. for (idx = oid_dict; idx->num != NULL; idx++) {
  15876. if (!XSTRCMP(oid, idx->num)) {
  15877. return idx->desc;
  15878. }
  15879. }
  15880. return NULL;
  15881. }
  15882. static int wolfssl_obj2txt_numeric(char *buf, int bufLen,
  15883. const WOLFSSL_ASN1_OBJECT *a)
  15884. {
  15885. int bufSz;
  15886. int length;
  15887. word32 idx = 0;
  15888. byte tag;
  15889. if (GetASNTag(a->obj, &idx, &tag, a->objSz) != 0) {
  15890. return WOLFSSL_FAILURE;
  15891. }
  15892. if (tag != ASN_OBJECT_ID) {
  15893. WOLFSSL_MSG("Bad ASN1 Object");
  15894. return WOLFSSL_FAILURE;
  15895. }
  15896. if (GetLength((const byte*)a->obj, &idx, &length,
  15897. a->objSz) < 0 || length < 0) {
  15898. return ASN_PARSE_E;
  15899. }
  15900. if (bufLen < MAX_OID_STRING_SZ) {
  15901. bufSz = bufLen - 1;
  15902. }
  15903. else {
  15904. bufSz = MAX_OID_STRING_SZ;
  15905. }
  15906. if ((bufSz = DecodePolicyOID(buf, (word32)bufSz, a->obj + idx,
  15907. (word32)length)) <= 0) {
  15908. WOLFSSL_MSG("Error decoding OID");
  15909. return WOLFSSL_FAILURE;
  15910. }
  15911. buf[bufSz] = '\0';
  15912. return bufSz;
  15913. }
  15914. /* If no_name is one then use numerical form, otherwise short name.
  15915. *
  15916. * Returns the buffer size on success, WOLFSSL_FAILURE on error
  15917. */
  15918. int wolfSSL_OBJ_obj2txt(char *buf, int bufLen, const WOLFSSL_ASN1_OBJECT *a,
  15919. int no_name)
  15920. {
  15921. int bufSz;
  15922. const char* desc;
  15923. const char* name;
  15924. WOLFSSL_ENTER("wolfSSL_OBJ_obj2txt");
  15925. if (buf == NULL || bufLen <= 1 || a == NULL) {
  15926. WOLFSSL_MSG("Bad input argument");
  15927. return WOLFSSL_FAILURE;
  15928. }
  15929. if (no_name == 1) {
  15930. return wolfssl_obj2txt_numeric(buf, bufLen, a);
  15931. }
  15932. /* return long name unless using x509small, then return short name */
  15933. #if defined(OPENSSL_EXTRA_X509_SMALL) && !defined(OPENSSL_EXTRA)
  15934. name = a->sName;
  15935. #else
  15936. name = wolfSSL_OBJ_nid2ln(wolfSSL_OBJ_obj2nid(a));
  15937. #endif
  15938. if (name == NULL) {
  15939. WOLFSSL_MSG("Name not found");
  15940. bufSz = 0;
  15941. }
  15942. else if (XSTRLEN(name) + 1 < (word32)bufLen - 1) {
  15943. bufSz = (int)XSTRLEN(name);
  15944. }
  15945. else {
  15946. bufSz = bufLen - 1;
  15947. }
  15948. if (bufSz) {
  15949. XMEMCPY(buf, name, bufSz);
  15950. }
  15951. else if (a->type == GEN_DNS || a->type == GEN_EMAIL ||
  15952. a->type == GEN_URI) {
  15953. bufSz = (int)XSTRLEN((const char*)a->obj);
  15954. XMEMCPY(buf, a->obj, min(bufSz, bufLen));
  15955. }
  15956. else if ((bufSz = wolfssl_obj2txt_numeric(buf, bufLen, a)) > 0) {
  15957. if ((desc = oid_translate_num_to_str(buf))) {
  15958. bufSz = (int)XSTRLEN(desc);
  15959. bufSz = min(bufSz, bufLen - 1);
  15960. XMEMCPY(buf, desc, bufSz);
  15961. }
  15962. }
  15963. else {
  15964. bufSz = 0;
  15965. }
  15966. buf[bufSz] = '\0';
  15967. return bufSz;
  15968. }
  15969. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  15970. #if defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY) || \
  15971. defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(HAVE_STUNNEL) || \
  15972. defined(WOLFSSL_NGINX) || defined(HAVE_POCO_LIB) || \
  15973. defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_WPAS_SMALL)
  15974. /* Returns the long name that corresponds with an ASN1_OBJECT nid value.
  15975. * n : NID value of ASN1_OBJECT to search */
  15976. const char* wolfSSL_OBJ_nid2ln(int n)
  15977. {
  15978. const WOLFSSL_ObjectInfo *obj_info = wolfssl_object_info;
  15979. size_t i;
  15980. WOLFSSL_ENTER("wolfSSL_OBJ_nid2ln");
  15981. for (i = 0; i < WOLFSSL_OBJECT_INFO_SZ; i++, obj_info++) {
  15982. if (obj_info->nid == n) {
  15983. return obj_info->lName;
  15984. }
  15985. }
  15986. WOLFSSL_MSG("NID not found in table");
  15987. return NULL;
  15988. }
  15989. #endif /* OPENSSL_EXTRA, HAVE_LIGHTY, WOLFSSL_MYSQL_COMPATIBLE, HAVE_STUNNEL,
  15990. WOLFSSL_NGINX, HAVE_POCO_LIB, WOLFSSL_HAPROXY, WOLFSSL_WPAS_SMALL */
  15991. #if defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY) || \
  15992. defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(HAVE_STUNNEL) || \
  15993. defined(WOLFSSL_NGINX) || defined(HAVE_POCO_LIB) || \
  15994. defined(WOLFSSL_HAPROXY)
  15995. /* Return the corresponding short name for the nid <n>.
  15996. * or NULL if short name can't be found.
  15997. */
  15998. const char * wolfSSL_OBJ_nid2sn(int n) {
  15999. const WOLFSSL_ObjectInfo *obj_info = wolfssl_object_info;
  16000. size_t i;
  16001. WOLFSSL_ENTER("wolfSSL_OBJ_nid2sn");
  16002. if (n == NID_md5) {
  16003. /* NID_surname == NID_md5 and NID_surname comes before NID_md5 in
  16004. * wolfssl_object_info. As a result, the loop below will incorrectly
  16005. * return "SN" instead of "MD5." NID_surname isn't the true OpenSSL
  16006. * NID, but other functions rely on this table and modifying it to
  16007. * conform with OpenSSL's NIDs isn't trivial. */
  16008. return "MD5";
  16009. }
  16010. for (i = 0; i < WOLFSSL_OBJECT_INFO_SZ; i++, obj_info++) {
  16011. if (obj_info->nid == n) {
  16012. return obj_info->sName;
  16013. }
  16014. }
  16015. WOLFSSL_MSG_EX("SN not found (nid:%d)",n);
  16016. return NULL;
  16017. }
  16018. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  16019. int wolfSSL_OBJ_sn2nid(const char *sn) {
  16020. WOLFSSL_ENTER("wolfSSL_OBJ_sn2nid");
  16021. if (sn == NULL)
  16022. return NID_undef;
  16023. return wc_OBJ_sn2nid(sn);
  16024. }
  16025. #endif
  16026. size_t wolfSSL_OBJ_length(const WOLFSSL_ASN1_OBJECT* o)
  16027. {
  16028. size_t ret = 0;
  16029. int err = 0;
  16030. word32 idx = 0;
  16031. int len = 0;
  16032. WOLFSSL_ENTER("wolfSSL_OBJ_length");
  16033. if (o == NULL || o->obj == NULL) {
  16034. WOLFSSL_MSG("Bad argument.");
  16035. err = 1;
  16036. }
  16037. if (err == 0 && GetASNObjectId(o->obj, &idx, &len, o->objSz)) {
  16038. WOLFSSL_MSG("Error parsing ASN.1 header.");
  16039. err = 1;
  16040. }
  16041. if (err == 0) {
  16042. ret = len;
  16043. }
  16044. WOLFSSL_LEAVE("wolfSSL_OBJ_length", (int)ret);
  16045. return ret;
  16046. }
  16047. const unsigned char* wolfSSL_OBJ_get0_data(const WOLFSSL_ASN1_OBJECT* o)
  16048. {
  16049. const unsigned char* ret = NULL;
  16050. int err = 0;
  16051. word32 idx = 0;
  16052. int len = 0;
  16053. WOLFSSL_ENTER("wolfSSL_OBJ_get0_data");
  16054. if (o == NULL || o->obj == NULL) {
  16055. WOLFSSL_MSG("Bad argument.");
  16056. err = 1;
  16057. }
  16058. if (err == 0 && GetASNObjectId(o->obj, &idx, &len, o->objSz)) {
  16059. WOLFSSL_MSG("Error parsing ASN.1 header.");
  16060. err = 1;
  16061. }
  16062. if (err == 0) {
  16063. ret = o->obj + idx;
  16064. }
  16065. return ret;
  16066. }
  16067. /* Gets the NID value that corresponds with the ASN1 object.
  16068. *
  16069. * o ASN1 object to get NID of
  16070. *
  16071. * Return NID on success and a negative value on failure
  16072. */
  16073. int wolfSSL_OBJ_obj2nid(const WOLFSSL_ASN1_OBJECT *o)
  16074. {
  16075. word32 oid = 0;
  16076. word32 idx = 0;
  16077. int ret;
  16078. #ifdef WOLFSSL_DEBUG_OPENSSL
  16079. WOLFSSL_ENTER("wolfSSL_OBJ_obj2nid");
  16080. #endif
  16081. if (o == NULL) {
  16082. return -1;
  16083. }
  16084. #ifdef WOLFSSL_QT
  16085. if (o->grp == oidCertExtType) {
  16086. /* If nid is an unknown extension, return NID_undef */
  16087. if (wolfSSL_OBJ_nid2sn(o->nid) == NULL)
  16088. return NID_undef;
  16089. }
  16090. #endif
  16091. if (o->nid > 0)
  16092. return o->nid;
  16093. if ((ret = GetObjectId(o->obj, &idx, &oid, o->grp, o->objSz)) < 0) {
  16094. if (ret == ASN_OBJECT_ID_E) {
  16095. /* Put ASN object tag in front and try again */
  16096. int len = SetObjectId(o->objSz, NULL) + o->objSz;
  16097. byte* buf = (byte*)XMALLOC(len, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  16098. if (!buf) {
  16099. WOLFSSL_MSG("malloc error");
  16100. return -1;
  16101. }
  16102. idx = SetObjectId(o->objSz, buf);
  16103. XMEMCPY(buf + idx, o->obj, o->objSz);
  16104. idx = 0;
  16105. ret = GetObjectId(buf, &idx, &oid, o->grp, len);
  16106. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  16107. if (ret < 0) {
  16108. WOLFSSL_MSG("Issue getting OID of object");
  16109. return -1;
  16110. }
  16111. }
  16112. else {
  16113. WOLFSSL_MSG("Issue getting OID of object");
  16114. return -1;
  16115. }
  16116. }
  16117. return oid2nid(oid, o->grp);
  16118. }
  16119. /* Return the corresponding NID for the long name <ln>
  16120. * or NID_undef if NID can't be found.
  16121. */
  16122. int wolfSSL_OBJ_ln2nid(const char *ln)
  16123. {
  16124. const WOLFSSL_ObjectInfo *obj_info = wolfssl_object_info;
  16125. size_t lnlen;
  16126. WOLFSSL_ENTER("wolfSSL_OBJ_ln2nid");
  16127. if (ln && (lnlen = XSTRLEN(ln)) > 0) {
  16128. /* Accept input like "/commonName=" */
  16129. if (ln[0] == '/') {
  16130. ln++;
  16131. lnlen--;
  16132. }
  16133. if (lnlen) {
  16134. size_t i;
  16135. if (ln[lnlen-1] == '=') {
  16136. lnlen--;
  16137. }
  16138. for (i = 0; i < WOLFSSL_OBJECT_INFO_SZ; i++, obj_info++) {
  16139. if (lnlen == XSTRLEN(obj_info->lName) &&
  16140. XSTRNCMP(ln, obj_info->lName, lnlen) == 0) {
  16141. return obj_info->nid;
  16142. }
  16143. }
  16144. }
  16145. }
  16146. return NID_undef;
  16147. }
  16148. /* compares two objects, return 0 if equal */
  16149. int wolfSSL_OBJ_cmp(const WOLFSSL_ASN1_OBJECT* a,
  16150. const WOLFSSL_ASN1_OBJECT* b)
  16151. {
  16152. WOLFSSL_ENTER("wolfSSL_OBJ_cmp");
  16153. if (a && b && a->obj && b->obj) {
  16154. if (a->objSz == b->objSz) {
  16155. return XMEMCMP(a->obj, b->obj, a->objSz);
  16156. }
  16157. else if (a->type == EXT_KEY_USAGE_OID ||
  16158. b->type == EXT_KEY_USAGE_OID) {
  16159. /* Special case for EXT_KEY_USAGE_OID so that
  16160. * cmp will be treated as a substring search */
  16161. /* Used in libest to check for id-kp-cmcRA in
  16162. * EXT_KEY_USAGE extension */
  16163. unsigned int idx;
  16164. const byte* s; /* shorter */
  16165. unsigned int sLen;
  16166. const byte* l; /* longer */
  16167. unsigned int lLen;
  16168. if (a->objSz > b->objSz) {
  16169. s = b->obj; sLen = b->objSz;
  16170. l = a->obj; lLen = a->objSz;
  16171. }
  16172. else {
  16173. s = a->obj; sLen = a->objSz;
  16174. l = b->obj; lLen = b->objSz;
  16175. }
  16176. for (idx = 0; idx <= lLen - sLen; idx++) {
  16177. if (XMEMCMP(l + idx, s, sLen) == 0) {
  16178. /* Found substring */
  16179. return 0;
  16180. }
  16181. }
  16182. }
  16183. }
  16184. return WOLFSSL_FATAL_ERROR;
  16185. }
  16186. #endif /* OPENSSL_EXTRA, HAVE_LIGHTY, WOLFSSL_MYSQL_COMPATIBLE, HAVE_STUNNEL,
  16187. WOLFSSL_NGINX, HAVE_POCO_LIB, WOLFSSL_HAPROXY */
  16188. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
  16189. defined(HAVE_LIGHTY) || defined(WOLFSSL_MYSQL_COMPATIBLE) || \
  16190. defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  16191. defined(HAVE_POCO_LIB) || defined(WOLFSSL_HAPROXY)
  16192. /* Gets the NID value that is related to the OID string passed in. Example
  16193. * string would be "2.5.29.14" for subject key ID.
  16194. *
  16195. * returns NID value on success and NID_undef on error
  16196. */
  16197. int wolfSSL_OBJ_txt2nid(const char* s)
  16198. {
  16199. unsigned int i;
  16200. #ifdef WOLFSSL_CERT_EXT
  16201. int ret;
  16202. unsigned int sum = 0;
  16203. unsigned int outSz = MAX_OID_SZ;
  16204. unsigned char out[MAX_OID_SZ];
  16205. #endif
  16206. WOLFSSL_ENTER("wolfSSL_OBJ_txt2nid");
  16207. if (s == NULL) {
  16208. return NID_undef;
  16209. }
  16210. #ifdef WOLFSSL_CERT_EXT
  16211. ret = EncodePolicyOID(out, &outSz, s, NULL);
  16212. if (ret == 0) {
  16213. /* sum OID */
  16214. for (i = 0; i < outSz; i++) {
  16215. sum += out[i];
  16216. }
  16217. }
  16218. #endif /* WOLFSSL_CERT_EXT */
  16219. /* get the group that the OID's sum is in
  16220. * @TODO possible conflict with multiples */
  16221. for (i = 0; i < WOLFSSL_OBJECT_INFO_SZ; i++) {
  16222. int len;
  16223. #ifdef WOLFSSL_CERT_EXT
  16224. if (ret == 0) {
  16225. if (wolfssl_object_info[i].id == (int)sum) {
  16226. return wolfssl_object_info[i].nid;
  16227. }
  16228. }
  16229. #endif
  16230. /* try as a short name */
  16231. len = (int)XSTRLEN(s);
  16232. if ((int)XSTRLEN(wolfssl_object_info[i].sName) == len &&
  16233. XSTRNCMP(wolfssl_object_info[i].sName, s, len) == 0) {
  16234. return wolfssl_object_info[i].nid;
  16235. }
  16236. /* try as a long name */
  16237. if ((int)XSTRLEN(wolfssl_object_info[i].lName) == len &&
  16238. XSTRNCMP(wolfssl_object_info[i].lName, s, len) == 0) {
  16239. return wolfssl_object_info[i].nid;
  16240. }
  16241. }
  16242. return NID_undef;
  16243. }
  16244. #endif
  16245. #if defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY) || \
  16246. defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(HAVE_STUNNEL) || \
  16247. defined(WOLFSSL_NGINX) || defined(HAVE_POCO_LIB) || \
  16248. defined(WOLFSSL_HAPROXY)
  16249. /* Creates new ASN1_OBJECT from short name, long name, or text
  16250. * representation of oid. If no_name is 0, then short name, long name, and
  16251. * numerical value of oid are interpreted. If no_name is 1, then only the
  16252. * numerical value of the oid is interpreted.
  16253. *
  16254. * Returns pointer to ASN1_OBJECT on success, or NULL on error.
  16255. */
  16256. #if defined(WOLFSSL_CERT_EXT) && defined(WOLFSSL_CERT_GEN)
  16257. WOLFSSL_ASN1_OBJECT* wolfSSL_OBJ_txt2obj(const char* s, int no_name)
  16258. {
  16259. int i, ret;
  16260. int nid = NID_undef;
  16261. unsigned int outSz = MAX_OID_SZ;
  16262. unsigned char out[MAX_OID_SZ];
  16263. WOLFSSL_ASN1_OBJECT* obj;
  16264. WOLFSSL_ENTER("wolfSSL_OBJ_txt2obj");
  16265. if (s == NULL)
  16266. return NULL;
  16267. /* If s is numerical value, try to sum oid */
  16268. ret = EncodePolicyOID(out, &outSz, s, NULL);
  16269. if (ret == 0 && outSz > 0) {
  16270. /* If numerical encode succeeded then just
  16271. * create object from that because sums are
  16272. * not unique and can cause confusion. */
  16273. obj = wolfSSL_ASN1_OBJECT_new();
  16274. if (obj == NULL) {
  16275. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  16276. return NULL;
  16277. }
  16278. obj->dynamic |= WOLFSSL_ASN1_DYNAMIC;
  16279. obj->obj = (byte*)XMALLOC(1 + MAX_LENGTH_SZ + outSz, NULL,
  16280. DYNAMIC_TYPE_ASN1);
  16281. if (obj->obj == NULL) {
  16282. wolfSSL_ASN1_OBJECT_free(obj);
  16283. return NULL;
  16284. }
  16285. obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
  16286. i = SetObjectId(outSz, (byte*)obj->obj);
  16287. XMEMCPY((byte*)obj->obj + i, out, outSz);
  16288. obj->objSz = i + outSz;
  16289. return obj;
  16290. }
  16291. /* TODO: update short names in wolfssl_object_info and check OID sums
  16292. are correct */
  16293. for (i = 0; i < (int)WOLFSSL_OBJECT_INFO_SZ; i++) {
  16294. /* Short name, long name, and numerical value are interpreted */
  16295. if (no_name == 0 &&
  16296. ((XSTRCMP(s, wolfssl_object_info[i].sName) == 0) ||
  16297. (XSTRCMP(s, wolfssl_object_info[i].lName) == 0)))
  16298. {
  16299. nid = wolfssl_object_info[i].nid;
  16300. }
  16301. }
  16302. if (nid != NID_undef)
  16303. return wolfSSL_OBJ_nid2obj(nid);
  16304. return NULL;
  16305. }
  16306. #endif
  16307. /* compatibility function. Its intended use is to remove OID's from an
  16308. * internal table that have been added with OBJ_create. wolfSSL manages its
  16309. * own internal OID values and does not currently support OBJ_create. */
  16310. void wolfSSL_OBJ_cleanup(void)
  16311. {
  16312. WOLFSSL_ENTER("wolfSSL_OBJ_cleanup");
  16313. }
  16314. #ifndef NO_WOLFSSL_STUB
  16315. int wolfSSL_OBJ_create(const char *oid, const char *sn, const char *ln)
  16316. {
  16317. (void)oid;
  16318. (void)sn;
  16319. (void)ln;
  16320. WOLFSSL_STUB("wolfSSL_OBJ_create");
  16321. return WOLFSSL_FAILURE;
  16322. }
  16323. #endif
  16324. void wolfSSL_set_verify_depth(WOLFSSL *ssl, int depth)
  16325. {
  16326. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  16327. WOLFSSL_ENTER("wolfSSL_set_verify_depth");
  16328. ssl->options.verifyDepth = (byte)depth;
  16329. #endif
  16330. }
  16331. #endif /* OPENSSL_ALL || HAVE_LIGHTY || WOLFSSL_MYSQL_COMPATIBLE ||
  16332. HAVE_STUNNEL || WOLFSSL_NGINX || HAVE_POCO_LIB || WOLFSSL_HAPROXY */
  16333. #ifdef OPENSSL_EXTRA
  16334. /* wolfSSL uses negative values for error states. This function returns an
  16335. * unsigned type so the value returned is the absolute value of the error.
  16336. */
  16337. unsigned long wolfSSL_ERR_peek_last_error_line(const char **file, int *line)
  16338. {
  16339. WOLFSSL_ENTER("wolfSSL_ERR_peek_last_error");
  16340. (void)line;
  16341. (void)file;
  16342. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  16343. {
  16344. int ret;
  16345. if ((ret = wc_PeekErrorNode(-1, file, NULL, line)) < 0) {
  16346. WOLFSSL_MSG("Issue peeking at error node in queue");
  16347. return 0;
  16348. }
  16349. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) \
  16350. || defined(WOLFSSL_HAPROXY)
  16351. if (ret == -ASN_NO_PEM_HEADER)
  16352. return (ERR_LIB_PEM << 24) | PEM_R_NO_START_LINE;
  16353. #endif
  16354. #if defined(OPENSSL_ALL) && defined(WOLFSSL_PYTHON)
  16355. if (ret == ASN1_R_HEADER_TOO_LONG) {
  16356. return (ERR_LIB_ASN1 << 24) | ASN1_R_HEADER_TOO_LONG;
  16357. }
  16358. #endif
  16359. return (unsigned long)ret;
  16360. }
  16361. #else
  16362. return (unsigned long)(0 - NOT_COMPILED_IN);
  16363. #endif
  16364. }
  16365. #endif /* OPENSSL_EXTRA */
  16366. #if defined(HAVE_EX_DATA) && \
  16367. (defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || \
  16368. defined(WOLFSSL_HAPROXY) || defined(OPENSSL_EXTRA) || \
  16369. defined(HAVE_LIGHTY)) || defined(HAVE_EX_DATA) || \
  16370. defined(WOLFSSL_WPAS_SMALL)
  16371. CRYPTO_EX_cb_ctx* crypto_ex_cb_ctx_session = NULL;
  16372. static int crypto_ex_cb_new(CRYPTO_EX_cb_ctx** dst, long ctx_l, void* ctx_ptr,
  16373. WOLFSSL_CRYPTO_EX_new* new_func, WOLFSSL_CRYPTO_EX_dup* dup_func,
  16374. WOLFSSL_CRYPTO_EX_free* free_func)
  16375. {
  16376. CRYPTO_EX_cb_ctx* new_ctx = (CRYPTO_EX_cb_ctx*)XMALLOC(
  16377. sizeof(CRYPTO_EX_cb_ctx), NULL, DYNAMIC_TYPE_OPENSSL);
  16378. if (new_ctx == NULL)
  16379. return -1;
  16380. new_ctx->ctx_l = ctx_l;
  16381. new_ctx->ctx_ptr = ctx_ptr;
  16382. new_ctx->new_func = new_func;
  16383. new_ctx->free_func = free_func;
  16384. new_ctx->dup_func = dup_func;
  16385. new_ctx->next = NULL;
  16386. /* Push to end of list */
  16387. while (*dst != NULL)
  16388. dst = &(*dst)->next;
  16389. *dst = new_ctx;
  16390. return 0;
  16391. }
  16392. void crypto_ex_cb_free(CRYPTO_EX_cb_ctx* cb_ctx)
  16393. {
  16394. while (cb_ctx != NULL) {
  16395. CRYPTO_EX_cb_ctx* next = cb_ctx->next;
  16396. XFREE(cb_ctx, NULL, DYNAMIC_TYPE_OPENSSL);
  16397. cb_ctx = next;
  16398. }
  16399. }
  16400. void crypto_ex_cb_setup_new_data(void *new_obj, CRYPTO_EX_cb_ctx* cb_ctx,
  16401. WOLFSSL_CRYPTO_EX_DATA* ex_data)
  16402. {
  16403. int idx = 0;
  16404. for (; cb_ctx != NULL; idx++, cb_ctx = cb_ctx->next) {
  16405. if (cb_ctx->new_func != NULL)
  16406. cb_ctx->new_func(new_obj, NULL, ex_data, idx, cb_ctx->ctx_l,
  16407. cb_ctx->ctx_ptr);
  16408. }
  16409. }
  16410. int crypto_ex_cb_dup_data(const WOLFSSL_CRYPTO_EX_DATA *in,
  16411. WOLFSSL_CRYPTO_EX_DATA *out, CRYPTO_EX_cb_ctx* cb_ctx)
  16412. {
  16413. int idx = 0;
  16414. for (; cb_ctx != NULL; idx++, cb_ctx = cb_ctx->next) {
  16415. if (cb_ctx->dup_func != NULL) {
  16416. void* ptr = wolfSSL_CRYPTO_get_ex_data(in, idx);
  16417. if (!cb_ctx->dup_func(out, in,
  16418. &ptr, idx,
  16419. cb_ctx->ctx_l, cb_ctx->ctx_ptr)) {
  16420. return WOLFSSL_FAILURE;
  16421. }
  16422. wolfSSL_CRYPTO_set_ex_data(out, idx, ptr);
  16423. }
  16424. }
  16425. return WOLFSSL_SUCCESS;
  16426. }
  16427. void crypto_ex_cb_free_data(void *obj, CRYPTO_EX_cb_ctx* cb_ctx,
  16428. WOLFSSL_CRYPTO_EX_DATA* ex_data)
  16429. {
  16430. int idx = 0;
  16431. for (; cb_ctx != NULL; idx++, cb_ctx = cb_ctx->next) {
  16432. if (cb_ctx->free_func != NULL)
  16433. cb_ctx->free_func(obj, NULL, ex_data, idx, cb_ctx->ctx_l,
  16434. cb_ctx->ctx_ptr);
  16435. }
  16436. }
  16437. /**
  16438. * get_ex_new_index is a helper function for the following
  16439. * xx_get_ex_new_index functions:
  16440. * - wolfSSL_CRYPTO_get_ex_new_index
  16441. * - wolfSSL_CTX_get_ex_new_index
  16442. * - wolfSSL_get_ex_new_index
  16443. * Issues a unique index number for the specified class-index.
  16444. * Returns an index number greater or equal to zero on success,
  16445. * -1 on failure.
  16446. */
  16447. int wolfssl_get_ex_new_index(int class_index, long ctx_l, void* ctx_ptr,
  16448. WOLFSSL_CRYPTO_EX_new* new_func, WOLFSSL_CRYPTO_EX_dup* dup_func,
  16449. WOLFSSL_CRYPTO_EX_free* free_func)
  16450. {
  16451. /* index counter for each class index*/
  16452. static int ctx_idx = 0;
  16453. static int ssl_idx = 0;
  16454. static int ssl_session_idx = 0;
  16455. static int x509_idx = 0;
  16456. int idx = -1;
  16457. switch(class_index) {
  16458. case WOLF_CRYPTO_EX_INDEX_SSL:
  16459. WOLFSSL_CRYPTO_EX_DATA_IGNORE_PARAMS(ctx_l, ctx_ptr, new_func,
  16460. dup_func, free_func);
  16461. idx = ssl_idx++;
  16462. break;
  16463. case WOLF_CRYPTO_EX_INDEX_SSL_CTX:
  16464. WOLFSSL_CRYPTO_EX_DATA_IGNORE_PARAMS(ctx_l, ctx_ptr, new_func,
  16465. dup_func, free_func);
  16466. idx = ctx_idx++;
  16467. break;
  16468. case WOLF_CRYPTO_EX_INDEX_X509:
  16469. WOLFSSL_CRYPTO_EX_DATA_IGNORE_PARAMS(ctx_l, ctx_ptr, new_func,
  16470. dup_func, free_func);
  16471. idx = x509_idx++;
  16472. break;
  16473. case WOLF_CRYPTO_EX_INDEX_SSL_SESSION:
  16474. if (crypto_ex_cb_new(&crypto_ex_cb_ctx_session, ctx_l, ctx_ptr,
  16475. new_func, dup_func, free_func) != 0)
  16476. return -1;
  16477. idx = ssl_session_idx++;
  16478. break;
  16479. /* following class indexes are not supoprted */
  16480. case WOLF_CRYPTO_EX_INDEX_X509_STORE:
  16481. case WOLF_CRYPTO_EX_INDEX_X509_STORE_CTX:
  16482. case WOLF_CRYPTO_EX_INDEX_DH:
  16483. case WOLF_CRYPTO_EX_INDEX_DSA:
  16484. case WOLF_CRYPTO_EX_INDEX_EC_KEY:
  16485. case WOLF_CRYPTO_EX_INDEX_RSA:
  16486. case WOLF_CRYPTO_EX_INDEX_ENGINE:
  16487. case WOLF_CRYPTO_EX_INDEX_UI:
  16488. case WOLF_CRYPTO_EX_INDEX_BIO:
  16489. case WOLF_CRYPTO_EX_INDEX_APP:
  16490. case WOLF_CRYPTO_EX_INDEX_UI_METHOD:
  16491. case WOLF_CRYPTO_EX_INDEX_DRBG:
  16492. default:
  16493. break;
  16494. }
  16495. if (idx >= MAX_EX_DATA)
  16496. return -1;
  16497. return idx;
  16498. }
  16499. #endif /* HAVE_EX_DATA || WOLFSSL_WPAS_SMALL */
  16500. #if defined(HAVE_EX_DATA) || defined(WOLFSSL_WPAS_SMALL)
  16501. void* wolfSSL_CTX_get_ex_data(const WOLFSSL_CTX* ctx, int idx)
  16502. {
  16503. WOLFSSL_ENTER("wolfSSL_CTX_get_ex_data");
  16504. #ifdef HAVE_EX_DATA
  16505. if(ctx != NULL) {
  16506. return wolfSSL_CRYPTO_get_ex_data(&ctx->ex_data, idx);
  16507. }
  16508. #else
  16509. (void)ctx;
  16510. (void)idx;
  16511. #endif
  16512. return NULL;
  16513. }
  16514. int wolfSSL_CTX_get_ex_new_index(long idx, void* arg,
  16515. WOLFSSL_CRYPTO_EX_new* new_func,
  16516. WOLFSSL_CRYPTO_EX_dup* dup_func,
  16517. WOLFSSL_CRYPTO_EX_free* free_func)
  16518. {
  16519. WOLFSSL_ENTER("wolfSSL_CTX_get_ex_new_index");
  16520. return wolfssl_get_ex_new_index(WOLF_CRYPTO_EX_INDEX_SSL_CTX, idx, arg,
  16521. new_func, dup_func, free_func);
  16522. }
  16523. /* Return the index that can be used for the WOLFSSL structure to store
  16524. * application data.
  16525. *
  16526. */
  16527. int wolfSSL_get_ex_new_index(long argValue, void* arg,
  16528. WOLFSSL_CRYPTO_EX_new* cb1, WOLFSSL_CRYPTO_EX_dup* cb2,
  16529. WOLFSSL_CRYPTO_EX_free* cb3)
  16530. {
  16531. WOLFSSL_ENTER("wolfSSL_get_ex_new_index");
  16532. return wolfssl_get_ex_new_index(WOLF_CRYPTO_EX_INDEX_SSL, argValue, arg,
  16533. cb1, cb2, cb3);
  16534. }
  16535. int wolfSSL_CTX_set_ex_data(WOLFSSL_CTX* ctx, int idx, void* data)
  16536. {
  16537. WOLFSSL_ENTER("wolfSSL_CTX_set_ex_data");
  16538. #ifdef HAVE_EX_DATA
  16539. if (ctx != NULL)
  16540. {
  16541. return wolfSSL_CRYPTO_set_ex_data(&ctx->ex_data, idx, data);
  16542. }
  16543. #else
  16544. (void)ctx;
  16545. (void)idx;
  16546. (void)data;
  16547. #endif
  16548. return WOLFSSL_FAILURE;
  16549. }
  16550. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  16551. int wolfSSL_CTX_set_ex_data_with_cleanup(
  16552. WOLFSSL_CTX* ctx,
  16553. int idx,
  16554. void* data,
  16555. wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
  16556. {
  16557. WOLFSSL_ENTER("wolfSSL_CTX_set_ex_data_with_cleanup");
  16558. if (ctx != NULL)
  16559. {
  16560. return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&ctx->ex_data, idx, data,
  16561. cleanup_routine);
  16562. }
  16563. return WOLFSSL_FAILURE;
  16564. }
  16565. #endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
  16566. #endif /* defined(HAVE_EX_DATA) || defined(WOLFSSL_WPAS_SMALL) */
  16567. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  16568. /* Returns char* to app data stored in ex[0].
  16569. *
  16570. * ssl WOLFSSL structure to get app data from
  16571. */
  16572. void* wolfSSL_get_app_data(const WOLFSSL *ssl)
  16573. {
  16574. /* checkout exdata stuff... */
  16575. WOLFSSL_ENTER("wolfSSL_get_app_data");
  16576. return wolfSSL_get_ex_data(ssl, 0);
  16577. }
  16578. /* Set ex array 0 to have app data
  16579. *
  16580. * ssl WOLFSSL struct to set app data in
  16581. * arg data to be stored
  16582. *
  16583. * Returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  16584. */
  16585. int wolfSSL_set_app_data(WOLFSSL *ssl, void* arg) {
  16586. WOLFSSL_ENTER("wolfSSL_set_app_data");
  16587. return wolfSSL_set_ex_data(ssl, 0, arg);
  16588. }
  16589. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  16590. #if defined(HAVE_EX_DATA) || defined(OPENSSL_EXTRA) || \
  16591. defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
  16592. int wolfSSL_set_ex_data(WOLFSSL* ssl, int idx, void* data)
  16593. {
  16594. WOLFSSL_ENTER("wolfSSL_set_ex_data");
  16595. #ifdef HAVE_EX_DATA
  16596. if (ssl != NULL)
  16597. {
  16598. return wolfSSL_CRYPTO_set_ex_data(&ssl->ex_data, idx, data);
  16599. }
  16600. #else
  16601. WOLFSSL_MSG("HAVE_EX_DATA macro is not defined");
  16602. (void)ssl;
  16603. (void)idx;
  16604. (void)data;
  16605. #endif
  16606. return WOLFSSL_FAILURE;
  16607. }
  16608. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  16609. int wolfSSL_set_ex_data_with_cleanup(
  16610. WOLFSSL* ssl,
  16611. int idx,
  16612. void* data,
  16613. wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
  16614. {
  16615. WOLFSSL_ENTER("wolfSSL_set_ex_data_with_cleanup");
  16616. if (ssl != NULL)
  16617. {
  16618. return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&ssl->ex_data, idx, data,
  16619. cleanup_routine);
  16620. }
  16621. return WOLFSSL_FAILURE;
  16622. }
  16623. #endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
  16624. void* wolfSSL_get_ex_data(const WOLFSSL* ssl, int idx)
  16625. {
  16626. WOLFSSL_ENTER("wolfSSL_get_ex_data");
  16627. #ifdef HAVE_EX_DATA
  16628. if (ssl != NULL) {
  16629. return wolfSSL_CRYPTO_get_ex_data(&ssl->ex_data, idx);
  16630. }
  16631. #else
  16632. WOLFSSL_MSG("HAVE_EX_DATA macro is not defined");
  16633. (void)ssl;
  16634. (void)idx;
  16635. #endif
  16636. return 0;
  16637. }
  16638. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL */
  16639. #if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
  16640. || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
  16641. /* returns the enum value associated with handshake state
  16642. *
  16643. * ssl the WOLFSSL structure to get state of
  16644. */
  16645. int wolfSSL_get_state(const WOLFSSL* ssl)
  16646. {
  16647. WOLFSSL_ENTER("wolfSSL_get_state");
  16648. if (ssl == NULL) {
  16649. WOLFSSL_MSG("Null argument passed in");
  16650. return WOLFSSL_FAILURE;
  16651. }
  16652. return ssl->options.handShakeState;
  16653. }
  16654. #endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE */
  16655. #ifdef OPENSSL_EXTRA
  16656. void wolfSSL_certs_clear(WOLFSSL* ssl)
  16657. {
  16658. WOLFSSL_ENTER("wolfSSL_certs_clear");
  16659. if (ssl == NULL)
  16660. return;
  16661. /* ctx still owns certificate, certChain, key, dh, and cm */
  16662. if (ssl->buffers.weOwnCert)
  16663. FreeDer(&ssl->buffers.certificate);
  16664. ssl->buffers.certificate = NULL;
  16665. if (ssl->buffers.weOwnCertChain)
  16666. FreeDer(&ssl->buffers.certChain);
  16667. ssl->buffers.certChain = NULL;
  16668. #ifdef WOLFSSL_TLS13
  16669. ssl->buffers.certChainCnt = 0;
  16670. #endif
  16671. if (ssl->buffers.weOwnKey)
  16672. FreeDer(&ssl->buffers.key);
  16673. ssl->buffers.key = NULL;
  16674. ssl->buffers.keyType = 0;
  16675. ssl->buffers.keyId = 0;
  16676. ssl->buffers.keyLabel = 0;
  16677. ssl->buffers.keySz = 0;
  16678. ssl->buffers.keyDevId = 0;
  16679. #ifdef WOLFSSL_DUAL_ALG_CERTS
  16680. if (ssl->buffers.weOwnAltKey)
  16681. FreeDer(&ssl->buffers.altKey);
  16682. ssl->buffers.altKey = NULL;
  16683. #endif /* WOLFSSL_DUAL_ALG_CERTS */
  16684. }
  16685. #endif
  16686. #if defined(OPENSSL_ALL) || defined(WOLFSSL_ASIO) || defined(WOLFSSL_HAPROXY) \
  16687. || defined(WOLFSSL_NGINX) || defined(WOLFSSL_QT)
  16688. long wolfSSL_ctrl(WOLFSSL* ssl, int cmd, long opt, void* pt)
  16689. {
  16690. WOLFSSL_ENTER("wolfSSL_ctrl");
  16691. if (ssl == NULL)
  16692. return BAD_FUNC_ARG;
  16693. switch (cmd) {
  16694. #if defined(WOLFSSL_NGINX) || defined(WOLFSSL_QT) || \
  16695. defined(OPENSSL_ALL)
  16696. #ifdef HAVE_SNI
  16697. case SSL_CTRL_SET_TLSEXT_HOSTNAME:
  16698. WOLFSSL_MSG("Entering Case: SSL_CTRL_SET_TLSEXT_HOSTNAME.");
  16699. if (pt == NULL) {
  16700. WOLFSSL_MSG("Passed in NULL Host Name.");
  16701. break;
  16702. }
  16703. return wolfSSL_set_tlsext_host_name(ssl, (const char*) pt);
  16704. #endif /* HAVE_SNI */
  16705. #endif /* WOLFSSL_NGINX || WOLFSSL_QT || OPENSSL_ALL */
  16706. default:
  16707. WOLFSSL_MSG("Case not implemented.");
  16708. }
  16709. (void)opt;
  16710. (void)pt;
  16711. return WOLFSSL_FAILURE;
  16712. }
  16713. long wolfSSL_CTX_ctrl(WOLFSSL_CTX* ctx, int cmd, long opt, void* pt)
  16714. {
  16715. #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
  16716. long ctrl_opt;
  16717. #endif
  16718. long ret = WOLFSSL_SUCCESS;
  16719. WOLFSSL_ENTER("wolfSSL_CTX_ctrl");
  16720. if (ctx == NULL)
  16721. return WOLFSSL_FAILURE;
  16722. switch (cmd) {
  16723. case SSL_CTRL_CHAIN:
  16724. #ifdef SESSION_CERTS
  16725. {
  16726. /*
  16727. * We don't care about opt here because a copy of the certificate is
  16728. * stored anyway so increasing the reference counter is not necessary.
  16729. * Just check to make sure that it is set to one of the correct values.
  16730. */
  16731. WOLF_STACK_OF(WOLFSSL_X509)* sk = (WOLF_STACK_OF(WOLFSSL_X509)*) pt;
  16732. WOLFSSL_X509* x509;
  16733. int i;
  16734. if (opt != 0 && opt != 1) {
  16735. ret = WOLFSSL_FAILURE;
  16736. break;
  16737. }
  16738. /* Clear certificate chain */
  16739. FreeDer(&ctx->certChain);
  16740. if (sk) {
  16741. for (i = 0; i < wolfSSL_sk_X509_num(sk); i++) {
  16742. x509 = wolfSSL_sk_X509_value(sk, i);
  16743. /* Prevent wolfSSL_CTX_add_extra_chain_cert from freeing cert */
  16744. if (wolfSSL_X509_up_ref(x509) != 1) {
  16745. WOLFSSL_MSG("Error increasing reference count");
  16746. continue;
  16747. }
  16748. if (wolfSSL_CTX_add_extra_chain_cert(ctx, x509) !=
  16749. WOLFSSL_SUCCESS) {
  16750. WOLFSSL_MSG("Error adding certificate to context");
  16751. /* Decrease reference count on failure */
  16752. wolfSSL_X509_free(x509);
  16753. }
  16754. }
  16755. }
  16756. /* Free previous chain */
  16757. wolfSSL_sk_X509_pop_free(ctx->x509Chain, NULL);
  16758. ctx->x509Chain = sk;
  16759. if (sk && opt == 1) {
  16760. /* up all refs when opt == 1 */
  16761. for (i = 0; i < wolfSSL_sk_X509_num(sk); i++) {
  16762. x509 = wolfSSL_sk_X509_value(sk, i);
  16763. if (wolfSSL_X509_up_ref(x509) != 1) {
  16764. WOLFSSL_MSG("Error increasing reference count");
  16765. continue;
  16766. }
  16767. }
  16768. }
  16769. }
  16770. #else
  16771. WOLFSSL_MSG("Session certificates not compiled in");
  16772. ret = WOLFSSL_FAILURE;
  16773. #endif
  16774. break;
  16775. #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)
  16776. case SSL_CTRL_OPTIONS:
  16777. WOLFSSL_MSG("Entering Case: SSL_CTRL_OPTIONS.");
  16778. ctrl_opt = wolfSSL_CTX_set_options(ctx, opt);
  16779. #ifdef WOLFSSL_QT
  16780. /* Set whether to use client or server cipher preference */
  16781. if ((ctrl_opt & WOLFSSL_OP_CIPHER_SERVER_PREFERENCE)
  16782. == WOLFSSL_OP_CIPHER_SERVER_PREFERENCE) {
  16783. WOLFSSL_MSG("Using Server's Cipher Preference.");
  16784. ctx->useClientOrder = FALSE;
  16785. } else {
  16786. WOLFSSL_MSG("Using Client's Cipher Preference.");
  16787. ctx->useClientOrder = TRUE;
  16788. }
  16789. #endif /* WOLFSSL_QT */
  16790. return ctrl_opt;
  16791. #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */
  16792. case SSL_CTRL_EXTRA_CHAIN_CERT:
  16793. WOLFSSL_MSG("Entering Case: SSL_CTRL_EXTRA_CHAIN_CERT.");
  16794. if (pt == NULL) {
  16795. WOLFSSL_MSG("Passed in x509 pointer NULL.");
  16796. ret = WOLFSSL_FAILURE;
  16797. break;
  16798. }
  16799. return wolfSSL_CTX_add_extra_chain_cert(ctx, (WOLFSSL_X509*)pt);
  16800. #ifndef NO_DH
  16801. case SSL_CTRL_SET_TMP_DH:
  16802. WOLFSSL_MSG("Entering Case: SSL_CTRL_SET_TMP_DH.");
  16803. if (pt == NULL) {
  16804. WOLFSSL_MSG("Passed in DH pointer NULL.");
  16805. ret = WOLFSSL_FAILURE;
  16806. break;
  16807. }
  16808. return wolfSSL_CTX_set_tmp_dh(ctx, (WOLFSSL_DH*)pt);
  16809. #endif
  16810. #ifdef HAVE_ECC
  16811. case SSL_CTRL_SET_TMP_ECDH:
  16812. WOLFSSL_MSG("Entering Case: SSL_CTRL_SET_TMP_ECDH.");
  16813. if (pt == NULL) {
  16814. WOLFSSL_MSG("Passed in ECDH pointer NULL.");
  16815. ret = WOLFSSL_FAILURE;
  16816. break;
  16817. }
  16818. return wolfSSL_SSL_CTX_set_tmp_ecdh(ctx, (WOLFSSL_EC_KEY*)pt);
  16819. #endif
  16820. case SSL_CTRL_MODE:
  16821. wolfSSL_CTX_set_mode(ctx,opt);
  16822. break;
  16823. case SSL_CTRL_SET_MIN_PROTO_VERSION:
  16824. WOLFSSL_MSG("set min proto version");
  16825. return wolfSSL_CTX_set_min_proto_version(ctx, (int)opt);
  16826. case SSL_CTRL_SET_MAX_PROTO_VERSION:
  16827. WOLFSSL_MSG("set max proto version");
  16828. return wolfSSL_CTX_set_max_proto_version(ctx, (int)opt);
  16829. case SSL_CTRL_GET_MIN_PROTO_VERSION:
  16830. WOLFSSL_MSG("get min proto version");
  16831. return wolfSSL_CTX_get_min_proto_version(ctx);
  16832. case SSL_CTRL_GET_MAX_PROTO_VERSION:
  16833. WOLFSSL_MSG("get max proto version");
  16834. return wolfSSL_CTX_get_max_proto_version(ctx);
  16835. default:
  16836. WOLFSSL_MSG("CTX_ctrl cmd not implemented");
  16837. ret = WOLFSSL_FAILURE;
  16838. break;
  16839. }
  16840. (void)ctx;
  16841. (void)cmd;
  16842. (void)opt;
  16843. (void)pt;
  16844. WOLFSSL_LEAVE("wolfSSL_CTX_ctrl", (int)ret);
  16845. return ret;
  16846. }
  16847. #ifndef WOLFSSL_NO_STUB
  16848. long wolfSSL_CTX_callback_ctrl(WOLFSSL_CTX* ctx, int cmd, void (*fp)(void))
  16849. {
  16850. (void) ctx;
  16851. (void) cmd;
  16852. (void) fp;
  16853. WOLFSSL_STUB("wolfSSL_CTX_callback_ctrl");
  16854. return WOLFSSL_FAILURE;
  16855. }
  16856. #endif /* WOLFSSL_NO_STUB */
  16857. #ifndef NO_WOLFSSL_STUB
  16858. long wolfSSL_CTX_clear_extra_chain_certs(WOLFSSL_CTX* ctx)
  16859. {
  16860. return wolfSSL_CTX_ctrl(ctx, SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS, 0L, NULL);
  16861. }
  16862. #endif
  16863. /* Returns the verifyCallback from the ssl structure if successful.
  16864. Returns NULL otherwise. */
  16865. VerifyCallback wolfSSL_get_verify_callback(WOLFSSL* ssl)
  16866. {
  16867. WOLFSSL_ENTER("wolfSSL_get_verify_callback");
  16868. if (ssl) {
  16869. return ssl->verifyCallback;
  16870. }
  16871. return NULL;
  16872. }
  16873. #ifndef NO_BIO
  16874. /* Converts EVP_PKEY data from a bio buffer to a WOLFSSL_EVP_PKEY structure.
  16875. Returns pointer to private EVP_PKEY struct upon success, NULL if there
  16876. is a failure.*/
  16877. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PrivateKey_bio(WOLFSSL_BIO* bio,
  16878. WOLFSSL_EVP_PKEY** out)
  16879. {
  16880. unsigned char* mem = NULL;
  16881. int memSz = 0;
  16882. WOLFSSL_EVP_PKEY* key = NULL;
  16883. unsigned char* extraBioMem = NULL;
  16884. WOLFSSL_ENTER("wolfSSL_d2i_PrivateKey_bio");
  16885. if (bio == NULL) {
  16886. return NULL;
  16887. }
  16888. (void)out;
  16889. memSz = wolfSSL_BIO_get_len(bio);
  16890. if (memSz <= 0) {
  16891. WOLFSSL_MSG("wolfSSL_BIO_get_len() failure");
  16892. return NULL;
  16893. }
  16894. mem = (unsigned char*)XMALLOC(memSz, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
  16895. if (mem == NULL) {
  16896. WOLFSSL_MSG("Malloc failure");
  16897. return NULL;
  16898. }
  16899. if (wolfSSL_BIO_read(bio, (unsigned char*)mem, memSz) == memSz) {
  16900. int extraBioMemSz;
  16901. int derLength;
  16902. /* Determines key type and returns the new private EVP_PKEY object */
  16903. if ((key = wolfSSL_d2i_PrivateKey_EVP(NULL, &mem, (long)memSz)) ==
  16904. NULL) {
  16905. WOLFSSL_MSG("wolfSSL_d2i_PrivateKey_EVP() failure");
  16906. XFREE(mem, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
  16907. return NULL;
  16908. }
  16909. /* Write extra data back into bio object if necessary. */
  16910. derLength = key->pkey_sz;
  16911. extraBioMemSz = (memSz - derLength);
  16912. if (extraBioMemSz > 0) {
  16913. int i;
  16914. int j = 0;
  16915. extraBioMem = (unsigned char *)XMALLOC(extraBioMemSz, NULL,
  16916. DYNAMIC_TYPE_TMP_BUFFER);
  16917. if (extraBioMem == NULL) {
  16918. WOLFSSL_MSG("Malloc failure");
  16919. XFREE((unsigned char*)extraBioMem, bio->heap,
  16920. DYNAMIC_TYPE_TMP_BUFFER);
  16921. XFREE(mem, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
  16922. return NULL;
  16923. }
  16924. for (i = derLength; i < memSz; i++) {
  16925. *(extraBioMem + j) = *(mem + i);
  16926. j++;
  16927. }
  16928. wolfSSL_BIO_write(bio, extraBioMem, extraBioMemSz);
  16929. if (wolfSSL_BIO_get_len(bio) <= 0) {
  16930. WOLFSSL_MSG("Failed to write memory to bio");
  16931. XFREE((unsigned char*)extraBioMem, bio->heap,
  16932. DYNAMIC_TYPE_TMP_BUFFER);
  16933. XFREE(mem, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
  16934. return NULL;
  16935. }
  16936. XFREE((unsigned char*)extraBioMem, bio->heap,
  16937. DYNAMIC_TYPE_TMP_BUFFER);
  16938. }
  16939. if (out != NULL) {
  16940. *out = key;
  16941. }
  16942. }
  16943. XFREE(mem, bio->heap, DYNAMIC_TYPE_TMP_BUFFER);
  16944. return key;
  16945. }
  16946. #endif /* !NO_BIO */
  16947. #endif /* OPENSSL_ALL || WOLFSSL_ASIO || WOLFSSL_HAPROXY || WOLFSSL_QT */
  16948. #if defined(OPENSSL_ALL) || defined(WOLFSSL_ASIO) || \
  16949. defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_NGINX) || \
  16950. defined(WOLFSSL_QT) || defined(WOLFSSL_WPAS_SMALL)
  16951. /* Converts a DER encoded private key to a WOLFSSL_EVP_PKEY structure.
  16952. * returns a pointer to a new WOLFSSL_EVP_PKEY structure on success and NULL
  16953. * on fail */
  16954. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PrivateKey_EVP(WOLFSSL_EVP_PKEY** out,
  16955. unsigned char** in, long inSz)
  16956. {
  16957. WOLFSSL_ENTER("wolfSSL_d2i_PrivateKey_EVP");
  16958. return d2iGenericKey(out, (const unsigned char**)in, inSz, 1);
  16959. }
  16960. #endif /* OPENSSL_ALL || WOLFSSL_ASIO || WOLFSSL_HAPROXY || WOLFSSL_QT ||
  16961. * WOLFSSL_WPAS_SMALL*/
  16962. /* stunnel compatibility functions*/
  16963. #if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && \
  16964. (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  16965. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  16966. defined(WOLFSSL_OPENSSH)))
  16967. void wolfSSL_ERR_remove_thread_state(void* pid)
  16968. {
  16969. (void) pid;
  16970. return;
  16971. }
  16972. #ifndef NO_FILESYSTEM
  16973. /***TBD ***/
  16974. void wolfSSL_print_all_errors_fp(XFILE fp)
  16975. {
  16976. (void)fp;
  16977. }
  16978. #endif /* !NO_FILESYSTEM */
  16979. #endif /* OPENSSL_ALL || OPENSSL_EXTRA || HAVE_STUNNEL || WOLFSSL_NGINX ||
  16980. HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH */
  16981. /* Note: This is a huge section of API's - through
  16982. * wolfSSL_X509_OBJECT_get0_X509_CRL */
  16983. #if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && \
  16984. (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  16985. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  16986. defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB)))
  16987. #if defined(USE_WOLFSSL_MEMORY) && !defined(WOLFSSL_DEBUG_MEMORY) && \
  16988. !defined(WOLFSSL_STATIC_MEMORY)
  16989. static wolfSSL_OSSL_Malloc_cb ossl_malloc = NULL;
  16990. static wolfSSL_OSSL_Free_cb ossl_free = NULL;
  16991. static wolfSSL_OSSL_Realloc_cb ossl_realloc = NULL;
  16992. static void* OSSL_Malloc(size_t size)
  16993. {
  16994. if (ossl_malloc != NULL)
  16995. return ossl_malloc(size, NULL, 0);
  16996. else
  16997. return NULL;
  16998. }
  16999. static void OSSL_Free(void *ptr)
  17000. {
  17001. if (ossl_free != NULL)
  17002. ossl_free(ptr, NULL, 0);
  17003. }
  17004. static void* OSSL_Realloc(void *ptr, size_t size)
  17005. {
  17006. if (ossl_realloc != NULL)
  17007. return ossl_realloc(ptr, size, NULL, 0);
  17008. else
  17009. return NULL;
  17010. }
  17011. #endif /* USE_WOLFSSL_MEMORY && !WOLFSSL_DEBUG_MEMORY &&
  17012. * !WOLFSSL_STATIC_MEMORY */
  17013. int wolfSSL_CRYPTO_set_mem_functions(
  17014. wolfSSL_OSSL_Malloc_cb m,
  17015. wolfSSL_OSSL_Realloc_cb r,
  17016. wolfSSL_OSSL_Free_cb f)
  17017. {
  17018. #if defined(USE_WOLFSSL_MEMORY) && !defined(WOLFSSL_STATIC_MEMORY)
  17019. #ifdef WOLFSSL_DEBUG_MEMORY
  17020. WOLFSSL_MSG("mem functions will receive function name instead of "
  17021. "file name");
  17022. if (wolfSSL_SetAllocators((wolfSSL_Malloc_cb)m, (wolfSSL_Free_cb)f,
  17023. (wolfSSL_Realloc_cb)r) == 0)
  17024. return WOLFSSL_SUCCESS;
  17025. #else
  17026. WOLFSSL_MSG("wolfSSL was compiled without WOLFSSL_DEBUG_MEMORY mem "
  17027. "functions will receive a NULL file name and 0 for the "
  17028. "line number.");
  17029. if (wolfSSL_SetAllocators((wolfSSL_Malloc_cb)OSSL_Malloc,
  17030. (wolfSSL_Free_cb)OSSL_Free, (wolfSSL_Realloc_cb)OSSL_Realloc) == 0) {
  17031. ossl_malloc = m;
  17032. ossl_free = f;
  17033. ossl_realloc = r;
  17034. return WOLFSSL_SUCCESS;
  17035. }
  17036. #endif
  17037. else
  17038. return WOLFSSL_FAILURE;
  17039. #else
  17040. (void)m;
  17041. (void)r;
  17042. (void)f;
  17043. WOLFSSL_MSG("wolfSSL allocator callback functions not compiled in");
  17044. return WOLFSSL_FAILURE;
  17045. #endif
  17046. }
  17047. int wolfSSL_ERR_load_ERR_strings(void)
  17048. {
  17049. return WOLFSSL_SUCCESS;
  17050. }
  17051. void wolfSSL_ERR_load_crypto_strings(void)
  17052. {
  17053. WOLFSSL_ENTER("wolfSSL_ERR_load_crypto_strings");
  17054. /* Do nothing */
  17055. return;
  17056. }
  17057. int wolfSSL_FIPS_mode(void)
  17058. {
  17059. #ifdef HAVE_FIPS
  17060. return 1;
  17061. #else
  17062. return 0;
  17063. #endif
  17064. }
  17065. int wolfSSL_FIPS_mode_set(int r)
  17066. {
  17067. #ifdef HAVE_FIPS
  17068. if (r == 0) {
  17069. WOLFSSL_MSG("Cannot disable FIPS at runtime.");
  17070. return WOLFSSL_FAILURE;
  17071. }
  17072. return WOLFSSL_SUCCESS;
  17073. #else
  17074. if (r == 0) {
  17075. return WOLFSSL_SUCCESS;
  17076. }
  17077. WOLFSSL_MSG("Cannot enable FIPS. This isn't the wolfSSL FIPS code.");
  17078. return WOLFSSL_FAILURE;
  17079. #endif
  17080. }
  17081. int wolfSSL_CIPHER_get_bits(const WOLFSSL_CIPHER *c, int *alg_bits)
  17082. {
  17083. int ret = WOLFSSL_FAILURE;
  17084. WOLFSSL_ENTER("wolfSSL_CIPHER_get_bits");
  17085. #if defined(WOLFSSL_QT) || defined(OPENSSL_ALL)
  17086. (void)alg_bits;
  17087. if (c!= NULL)
  17088. ret = c->bits;
  17089. #else
  17090. if (c != NULL && c->ssl != NULL) {
  17091. ret = 8 * c->ssl->specs.key_size;
  17092. if (alg_bits != NULL) {
  17093. *alg_bits = ret;
  17094. }
  17095. }
  17096. #endif
  17097. return ret;
  17098. }
  17099. /* returns value less than 0 on fail to match
  17100. * On a successful match the priority level found is returned
  17101. */
  17102. int wolfSSL_sk_SSL_CIPHER_find(
  17103. WOLF_STACK_OF(WOLFSSL_CIPHER)* sk, const WOLFSSL_CIPHER* toFind)
  17104. {
  17105. WOLFSSL_STACK* next;
  17106. int i, sz;
  17107. if (sk == NULL || toFind == NULL) {
  17108. return WOLFSSL_FATAL_ERROR;
  17109. }
  17110. sz = wolfSSL_sk_SSL_CIPHER_num(sk);
  17111. next = sk;
  17112. for (i = 0; i < sz && next != NULL; i++) {
  17113. if (next->data.cipher.cipherSuite0 == toFind->cipherSuite0 &&
  17114. next->data.cipher.cipherSuite == toFind->cipherSuite) {
  17115. return sz - i; /* reverse because stack pushed highest on first */
  17116. }
  17117. next = next->next;
  17118. }
  17119. return WOLFSSL_FATAL_ERROR;
  17120. }
  17121. /* free's all nodes in the stack and there data */
  17122. void wolfSSL_sk_SSL_CIPHER_free(WOLF_STACK_OF(WOLFSSL_CIPHER)* sk)
  17123. {
  17124. WOLFSSL_ENTER("wolfSSL_sk_SSL_CIPHER_free");
  17125. wolfSSL_sk_free(sk);
  17126. }
  17127. #ifdef HAVE_SNI
  17128. int wolfSSL_set_tlsext_host_name(WOLFSSL* ssl, const char* host_name)
  17129. {
  17130. int ret;
  17131. WOLFSSL_ENTER("wolfSSL_set_tlsext_host_name");
  17132. ret = wolfSSL_UseSNI(ssl, WOLFSSL_SNI_HOST_NAME,
  17133. host_name, (word16)XSTRLEN(host_name));
  17134. WOLFSSL_LEAVE("wolfSSL_set_tlsext_host_name", ret);
  17135. return ret;
  17136. }
  17137. #ifndef NO_WOLFSSL_SERVER
  17138. const char * wolfSSL_get_servername(WOLFSSL* ssl, byte type)
  17139. {
  17140. void * serverName = NULL;
  17141. if (ssl == NULL)
  17142. return NULL;
  17143. TLSX_SNI_GetRequest(ssl->extensions, type, &serverName);
  17144. return (const char *)serverName;
  17145. }
  17146. #endif /* NO_WOLFSSL_SERVER */
  17147. #endif /* HAVE_SNI */
  17148. WOLFSSL_CTX* wolfSSL_set_SSL_CTX(WOLFSSL* ssl, WOLFSSL_CTX* ctx)
  17149. {
  17150. int ret;
  17151. /* This method requires some explanation. Its sibling is
  17152. * int SetSSL_CTX(WOLFSSL* ssl, WOLFSSL_CTX* ctx, int writeDup)
  17153. * which re-inits the WOLFSSL* with all settings in the new CTX.
  17154. * That one is the right one to use *before* a handshake is started.
  17155. *
  17156. * This method was added by OpenSSL to be used *during* the handshake, e.g.
  17157. * when a server inspects the SNI in a ClientHello callback and
  17158. * decides which set of certificates to use.
  17159. *
  17160. * Since, at the time the SNI callback is run, some decisions on
  17161. * Extensions or the ServerHello might already have been taken, this
  17162. * method is very restricted in what it does:
  17163. * - changing the server certificate(s)
  17164. * - changing the server id for session handling
  17165. * and everything else in WOLFSSL* needs to remain untouched.
  17166. */
  17167. WOLFSSL_ENTER("wolfSSL_set_SSL_CTX");
  17168. if (ssl == NULL || ctx == NULL)
  17169. return NULL;
  17170. if (ssl->ctx == ctx)
  17171. return ssl->ctx;
  17172. wolfSSL_RefInc(&ctx->ref, &ret);
  17173. #ifdef WOLFSSL_REFCNT_ERROR_RETURN
  17174. if (ret != 0) {
  17175. /* can only fail on serious stuff, like mutex not working
  17176. * or ctx refcount out of whack. */
  17177. return NULL;
  17178. }
  17179. #else
  17180. (void)ret;
  17181. #endif
  17182. if (ssl->ctx != NULL)
  17183. wolfSSL_CTX_free(ssl->ctx);
  17184. ssl->ctx = ctx;
  17185. #ifndef NO_CERTS
  17186. /* ctx owns certificate, certChain and key */
  17187. ssl->buffers.certificate = ctx->certificate;
  17188. ssl->buffers.certChain = ctx->certChain;
  17189. #ifdef WOLFSSL_TLS13
  17190. ssl->buffers.certChainCnt = ctx->certChainCnt;
  17191. #endif
  17192. ssl->buffers.key = ctx->privateKey;
  17193. ssl->buffers.keyType = ctx->privateKeyType;
  17194. ssl->buffers.keyId = ctx->privateKeyId;
  17195. ssl->buffers.keyLabel = ctx->privateKeyLabel;
  17196. ssl->buffers.keySz = ctx->privateKeySz;
  17197. ssl->buffers.keyDevId = ctx->privateKeyDevId;
  17198. /* flags indicating what certs/keys are available */
  17199. ssl->options.haveRSA = ctx->haveRSA;
  17200. ssl->options.haveDH = ctx->haveDH;
  17201. ssl->options.haveECDSAsig = ctx->haveECDSAsig;
  17202. ssl->options.haveECC = ctx->haveECC;
  17203. ssl->options.haveStaticECC = ctx->haveStaticECC;
  17204. ssl->options.haveFalconSig = ctx->haveFalconSig;
  17205. ssl->options.haveDilithiumSig = ctx->haveDilithiumSig;
  17206. #ifdef WOLFSSL_DUAL_ALG_CERTS
  17207. ssl->buffers.altKey = ctx->altPrivateKey;
  17208. ssl->buffers.altKeySz = ctx->altPrivateKeySz;
  17209. ssl->buffers.altKeyType = ctx->altPrivateKeyType;
  17210. #endif /* WOLFSSL_DUAL_ALG_CERTS */
  17211. #endif
  17212. #ifdef WOLFSSL_SESSION_ID_CTX
  17213. /* copy over application session context ID */
  17214. ssl->sessionCtxSz = ctx->sessionCtxSz;
  17215. XMEMCPY(ssl->sessionCtx, ctx->sessionCtx, ctx->sessionCtxSz);
  17216. #endif
  17217. return ssl->ctx;
  17218. }
  17219. VerifyCallback wolfSSL_CTX_get_verify_callback(WOLFSSL_CTX* ctx)
  17220. {
  17221. WOLFSSL_ENTER("wolfSSL_CTX_get_verify_callback");
  17222. if(ctx)
  17223. return ctx->verifyCallback;
  17224. return NULL;
  17225. }
  17226. #ifdef HAVE_SNI
  17227. void wolfSSL_CTX_set_servername_callback(WOLFSSL_CTX* ctx, CallbackSniRecv cb)
  17228. {
  17229. WOLFSSL_ENTER("wolfSSL_CTX_set_servername_callback");
  17230. if (ctx)
  17231. ctx->sniRecvCb = cb;
  17232. }
  17233. int wolfSSL_CTX_set_tlsext_servername_callback(WOLFSSL_CTX* ctx,
  17234. CallbackSniRecv cb)
  17235. {
  17236. WOLFSSL_ENTER("wolfSSL_CTX_set_tlsext_servername_callback");
  17237. if (ctx) {
  17238. ctx->sniRecvCb = cb;
  17239. return WOLFSSL_SUCCESS;
  17240. }
  17241. return WOLFSSL_FAILURE;
  17242. }
  17243. int wolfSSL_CTX_set_servername_arg(WOLFSSL_CTX* ctx, void* arg)
  17244. {
  17245. WOLFSSL_ENTER("wolfSSL_CTX_set_servername_arg");
  17246. if (ctx) {
  17247. ctx->sniRecvCbArg = arg;
  17248. return WOLFSSL_SUCCESS;
  17249. }
  17250. return WOLFSSL_FAILURE;
  17251. }
  17252. #endif /* HAVE_SNI */
  17253. #ifndef NO_BIO
  17254. void wolfSSL_ERR_load_BIO_strings(void) {
  17255. WOLFSSL_ENTER("wolfSSL_ERR_load_BIO_strings");
  17256. /* do nothing */
  17257. }
  17258. #endif
  17259. #ifndef NO_WOLFSSL_STUB
  17260. /* Set THREADID callback, return 1 on success, 0 on error */
  17261. int wolfSSL_THREADID_set_callback(
  17262. void(*threadid_func)(WOLFSSL_CRYPTO_THREADID*))
  17263. {
  17264. WOLFSSL_ENTER("wolfSSL_THREADID_set_callback");
  17265. WOLFSSL_STUB("CRYPTO_THREADID_set_callback");
  17266. (void)threadid_func;
  17267. return 1;
  17268. }
  17269. #endif
  17270. #ifndef NO_WOLFSSL_STUB
  17271. void wolfSSL_THREADID_set_numeric(void* id, unsigned long val)
  17272. {
  17273. WOLFSSL_ENTER("wolfSSL_THREADID_set_numeric");
  17274. WOLFSSL_STUB("CRYPTO_THREADID_set_numeric");
  17275. (void)id;
  17276. (void)val;
  17277. return;
  17278. }
  17279. #endif
  17280. #endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
  17281. * HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
  17282. * HAVE_SBLIM_SFCB)) */
  17283. #if defined(OPENSSL_EXTRA)
  17284. int wolfSSL_CRYPTO_memcmp(const void *a, const void *b, size_t size)
  17285. {
  17286. if (!a || !b)
  17287. return 0;
  17288. return ConstantCompare((const byte*)a, (const byte*)b, (int)size);
  17289. }
  17290. unsigned long wolfSSL_ERR_peek_last_error(void)
  17291. {
  17292. WOLFSSL_ENTER("wolfSSL_ERR_peek_last_error");
  17293. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  17294. {
  17295. int ret;
  17296. if ((ret = wc_PeekErrorNode(-1, NULL, NULL, NULL)) < 0) {
  17297. WOLFSSL_MSG("Issue peeking at error node in queue");
  17298. return 0;
  17299. }
  17300. if (ret == -ASN_NO_PEM_HEADER)
  17301. return (ERR_LIB_PEM << 24) | PEM_R_NO_START_LINE;
  17302. #if defined(WOLFSSL_PYTHON)
  17303. if (ret == ASN1_R_HEADER_TOO_LONG)
  17304. return (ERR_LIB_ASN1 << 24) | ASN1_R_HEADER_TOO_LONG;
  17305. #endif
  17306. return (unsigned long)ret;
  17307. }
  17308. #else
  17309. return (unsigned long)(0 - NOT_COMPILED_IN);
  17310. #endif
  17311. }
  17312. #endif /* OPENSSL_EXTRA */
  17313. int wolfSSL_version(WOLFSSL* ssl)
  17314. {
  17315. WOLFSSL_ENTER("wolfSSL_version");
  17316. if (ssl->version.major == SSLv3_MAJOR) {
  17317. switch (ssl->version.minor) {
  17318. case SSLv3_MINOR :
  17319. return SSL3_VERSION;
  17320. case TLSv1_MINOR :
  17321. return TLS1_VERSION;
  17322. case TLSv1_1_MINOR :
  17323. return TLS1_1_VERSION;
  17324. case TLSv1_2_MINOR :
  17325. return TLS1_2_VERSION;
  17326. case TLSv1_3_MINOR :
  17327. return TLS1_3_VERSION;
  17328. default:
  17329. return WOLFSSL_FAILURE;
  17330. }
  17331. }
  17332. else if (ssl->version.major == DTLS_MAJOR) {
  17333. switch (ssl->version.minor) {
  17334. case DTLS_MINOR :
  17335. return DTLS1_VERSION;
  17336. case DTLSv1_2_MINOR :
  17337. return DTLS1_2_VERSION;
  17338. case DTLSv1_3_MINOR:
  17339. return DTLS1_3_VERSION;
  17340. default:
  17341. return WOLFSSL_FAILURE;
  17342. }
  17343. }
  17344. return WOLFSSL_FAILURE;
  17345. }
  17346. WOLFSSL_CTX* wolfSSL_get_SSL_CTX(WOLFSSL* ssl)
  17347. {
  17348. WOLFSSL_ENTER("wolfSSL_get_SSL_CTX");
  17349. return ssl->ctx;
  17350. }
  17351. #if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && defined(HAVE_STUNNEL)) \
  17352. || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(WOLFSSL_NGINX)
  17353. /* TODO: Doesn't currently track SSL_VERIFY_CLIENT_ONCE */
  17354. int wolfSSL_get_verify_mode(const WOLFSSL* ssl) {
  17355. int mode = 0;
  17356. WOLFSSL_ENTER("wolfSSL_get_verify_mode");
  17357. if (!ssl) {
  17358. return WOLFSSL_FAILURE;
  17359. }
  17360. if (ssl->options.verifyNone) {
  17361. mode = WOLFSSL_VERIFY_NONE;
  17362. }
  17363. else {
  17364. if (ssl->options.verifyPeer) {
  17365. mode |= WOLFSSL_VERIFY_PEER;
  17366. }
  17367. if (ssl->options.failNoCert) {
  17368. mode |= WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT;
  17369. }
  17370. if (ssl->options.failNoCertxPSK) {
  17371. mode |= WOLFSSL_VERIFY_FAIL_EXCEPT_PSK;
  17372. }
  17373. #if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
  17374. if (ssl->options.verifyPostHandshake) {
  17375. mode |= WOLFSSL_VERIFY_POST_HANDSHAKE;
  17376. }
  17377. #endif
  17378. }
  17379. WOLFSSL_LEAVE("wolfSSL_get_verify_mode", mode);
  17380. return mode;
  17381. }
  17382. int wolfSSL_CTX_get_verify_mode(const WOLFSSL_CTX* ctx)
  17383. {
  17384. int mode = 0;
  17385. WOLFSSL_ENTER("wolfSSL_CTX_get_verify_mode");
  17386. if (!ctx) {
  17387. return WOLFSSL_FAILURE;
  17388. }
  17389. if (ctx->verifyNone) {
  17390. mode = WOLFSSL_VERIFY_NONE;
  17391. }
  17392. else {
  17393. if (ctx->verifyPeer) {
  17394. mode |= WOLFSSL_VERIFY_PEER;
  17395. }
  17396. if (ctx->failNoCert) {
  17397. mode |= WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT;
  17398. }
  17399. if (ctx->failNoCertxPSK) {
  17400. mode |= WOLFSSL_VERIFY_FAIL_EXCEPT_PSK;
  17401. }
  17402. #if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
  17403. if (ctx->verifyPostHandshake) {
  17404. mode |= WOLFSSL_VERIFY_POST_HANDSHAKE;
  17405. }
  17406. #endif
  17407. }
  17408. WOLFSSL_LEAVE("wolfSSL_CTX_get_verify_mode", mode);
  17409. return mode;
  17410. }
  17411. #endif
  17412. #ifdef WOLFSSL_JNI
  17413. int wolfSSL_set_jobject(WOLFSSL* ssl, void* objPtr)
  17414. {
  17415. WOLFSSL_ENTER("wolfSSL_set_jobject");
  17416. if (ssl != NULL)
  17417. {
  17418. ssl->jObjectRef = objPtr;
  17419. return WOLFSSL_SUCCESS;
  17420. }
  17421. return WOLFSSL_FAILURE;
  17422. }
  17423. void* wolfSSL_get_jobject(WOLFSSL* ssl)
  17424. {
  17425. WOLFSSL_ENTER("wolfSSL_get_jobject");
  17426. if (ssl != NULL)
  17427. return ssl->jObjectRef;
  17428. return NULL;
  17429. }
  17430. #endif /* WOLFSSL_JNI */
  17431. #ifdef WOLFSSL_ASYNC_CRYPT
  17432. int wolfSSL_CTX_AsyncPoll(WOLFSSL_CTX* ctx, WOLF_EVENT** events, int maxEvents,
  17433. WOLF_EVENT_FLAG flags, int* eventCount)
  17434. {
  17435. if (ctx == NULL) {
  17436. return BAD_FUNC_ARG;
  17437. }
  17438. return wolfAsync_EventQueuePoll(&ctx->event_queue, NULL,
  17439. events, maxEvents, flags, eventCount);
  17440. }
  17441. int wolfSSL_AsyncPoll(WOLFSSL* ssl, WOLF_EVENT_FLAG flags)
  17442. {
  17443. int ret, eventCount = 0;
  17444. WOLF_EVENT* events[1];
  17445. if (ssl == NULL) {
  17446. return BAD_FUNC_ARG;
  17447. }
  17448. ret = wolfAsync_EventQueuePoll(&ssl->ctx->event_queue, ssl,
  17449. events, sizeof(events)/sizeof(events[0]), flags, &eventCount);
  17450. if (ret == 0) {
  17451. ret = eventCount;
  17452. }
  17453. return ret;
  17454. }
  17455. #endif /* WOLFSSL_ASYNC_CRYPT */
  17456. #ifdef OPENSSL_EXTRA
  17457. static int peek_ignore_err(int err)
  17458. {
  17459. switch(err) {
  17460. case -WANT_READ:
  17461. case -WANT_WRITE:
  17462. case -ZERO_RETURN:
  17463. case -WOLFSSL_ERROR_ZERO_RETURN:
  17464. case -SOCKET_PEER_CLOSED_E:
  17465. case -SOCKET_ERROR_E:
  17466. return 1;
  17467. default:
  17468. return 0;
  17469. }
  17470. }
  17471. unsigned long wolfSSL_ERR_peek_error_line_data(const char **file, int *line,
  17472. const char **data, int *flags)
  17473. {
  17474. unsigned long err;
  17475. WOLFSSL_ENTER("wolfSSL_ERR_peek_error_line_data");
  17476. err = wc_PeekErrorNodeLineData(file, line, data, flags, peek_ignore_err);
  17477. if (err == -ASN_NO_PEM_HEADER)
  17478. return (ERR_LIB_PEM << 24) | PEM_R_NO_START_LINE;
  17479. #ifdef OPENSSL_ALL
  17480. /* PARSE_ERROR is returned if an HTTP request is detected. */
  17481. else if (err == -SSL_R_HTTP_REQUEST)
  17482. return (ERR_LIB_SSL << 24) | -SSL_R_HTTP_REQUEST;
  17483. #endif
  17484. #if defined(OPENSSL_ALL) && defined(WOLFSSL_PYTHON)
  17485. else if (err == ASN1_R_HEADER_TOO_LONG)
  17486. return (ERR_LIB_ASN1 << 24) | ASN1_R_HEADER_TOO_LONG;
  17487. #endif
  17488. return err;
  17489. }
  17490. #endif
  17491. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY)
  17492. #if !defined(WOLFSSL_USER_IO)
  17493. /* converts an IPv6 or IPv4 address into an octet string for use with rfc3280
  17494. * example input would be "127.0.0.1" and the returned value would be 7F000001
  17495. */
  17496. WOLFSSL_ASN1_STRING* wolfSSL_a2i_IPADDRESS(const char* ipa)
  17497. {
  17498. int ipaSz = WOLFSSL_IP4_ADDR_LEN;
  17499. char buf[WOLFSSL_IP6_ADDR_LEN + 1]; /* plus 1 for terminator */
  17500. int af = WOLFSSL_IP4;
  17501. WOLFSSL_ASN1_STRING *ret = NULL;
  17502. if (ipa == NULL)
  17503. return NULL;
  17504. if (XSTRSTR(ipa, ":") != NULL) {
  17505. af = WOLFSSL_IP6;
  17506. ipaSz = WOLFSSL_IP6_ADDR_LEN;
  17507. }
  17508. buf[WOLFSSL_IP6_ADDR_LEN] = '\0';
  17509. if (XINET_PTON(af, ipa, (void*)buf) != 1) {
  17510. WOLFSSL_MSG("Error parsing IP address");
  17511. return NULL;
  17512. }
  17513. ret = wolfSSL_ASN1_STRING_new();
  17514. if (ret != NULL) {
  17515. if (wolfSSL_ASN1_STRING_set(ret, buf, ipaSz) != WOLFSSL_SUCCESS) {
  17516. WOLFSSL_MSG("Error setting the string");
  17517. wolfSSL_ASN1_STRING_free(ret);
  17518. ret = NULL;
  17519. }
  17520. }
  17521. return ret;
  17522. }
  17523. #endif /* !WOLFSSL_USER_IO */
  17524. /* Is the specified cipher suite a fake one used an an extension proxy? */
  17525. static WC_INLINE int SCSV_Check(byte suite0, byte suite)
  17526. {
  17527. (void)suite0;
  17528. (void)suite;
  17529. #ifdef HAVE_RENEGOTIATION_INDICATION
  17530. if (suite0 == CIPHER_BYTE && suite == TLS_EMPTY_RENEGOTIATION_INFO_SCSV)
  17531. return 1;
  17532. #endif
  17533. return 0;
  17534. }
  17535. static WC_INLINE int sslCipherMinMaxCheck(const WOLFSSL *ssl, byte suite0,
  17536. byte suite)
  17537. {
  17538. const CipherSuiteInfo* cipher_names = GetCipherNames();
  17539. int cipherSz = GetCipherNamesSize();
  17540. int i;
  17541. for (i = 0; i < cipherSz; i++)
  17542. if (cipher_names[i].cipherSuite0 == suite0 &&
  17543. cipher_names[i].cipherSuite == suite)
  17544. break;
  17545. if (i == cipherSz)
  17546. return 1;
  17547. /* Check min version */
  17548. if (cipher_names[i].minor < ssl->options.minDowngrade) {
  17549. if (ssl->options.minDowngrade <= TLSv1_2_MINOR &&
  17550. cipher_names[i].minor >= TLSv1_MINOR)
  17551. /* 1.0 ciphersuites are in general available in 1.1 and
  17552. * 1.1 ciphersuites are in general available in 1.2 */
  17553. return 0;
  17554. return 1;
  17555. }
  17556. /* Check max version */
  17557. switch (cipher_names[i].minor) {
  17558. case SSLv3_MINOR :
  17559. return ssl->options.mask & WOLFSSL_OP_NO_SSLv3;
  17560. case TLSv1_MINOR :
  17561. return ssl->options.mask & WOLFSSL_OP_NO_TLSv1;
  17562. case TLSv1_1_MINOR :
  17563. return ssl->options.mask & WOLFSSL_OP_NO_TLSv1_1;
  17564. case TLSv1_2_MINOR :
  17565. return ssl->options.mask & WOLFSSL_OP_NO_TLSv1_2;
  17566. case TLSv1_3_MINOR :
  17567. return ssl->options.mask & WOLFSSL_OP_NO_TLSv1_3;
  17568. default:
  17569. WOLFSSL_MSG("Unrecognized minor version");
  17570. return 1;
  17571. }
  17572. }
  17573. /* returns a pointer to internal cipher suite list. Should not be free'd by
  17574. * caller.
  17575. */
  17576. WOLF_STACK_OF(WOLFSSL_CIPHER) *wolfSSL_get_ciphers_compat(const WOLFSSL *ssl)
  17577. {
  17578. WOLF_STACK_OF(WOLFSSL_CIPHER)* ret = NULL;
  17579. const Suites* suites;
  17580. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  17581. const CipherSuiteInfo* cipher_names = GetCipherNames();
  17582. int cipherSz = GetCipherNamesSize();
  17583. #endif
  17584. WOLFSSL_ENTER("wolfSSL_get_ciphers_compat");
  17585. if (ssl == NULL)
  17586. return NULL;
  17587. suites = WOLFSSL_SUITES(ssl);
  17588. if (suites == NULL)
  17589. return NULL;
  17590. /* check if stack needs populated */
  17591. if (ssl->suitesStack == NULL) {
  17592. int i;
  17593. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  17594. int j;
  17595. /* higher priority of cipher suite will be on top of stack */
  17596. for (i = suites->suiteSz - 2; i >=0; i-=2) {
  17597. #else
  17598. for (i = 0; i < suites->suiteSz; i+=2) {
  17599. #endif
  17600. WOLFSSL_STACK* add;
  17601. /* A couple of suites are placeholders for special options,
  17602. * skip those. */
  17603. if (SCSV_Check(suites->suites[i], suites->suites[i+1])
  17604. || sslCipherMinMaxCheck(ssl, suites->suites[i],
  17605. suites->suites[i+1])) {
  17606. continue;
  17607. }
  17608. add = wolfSSL_sk_new_node(ssl->heap);
  17609. if (add != NULL) {
  17610. add->type = STACK_TYPE_CIPHER;
  17611. add->data.cipher.cipherSuite0 = suites->suites[i];
  17612. add->data.cipher.cipherSuite = suites->suites[i+1];
  17613. add->data.cipher.ssl = ssl;
  17614. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  17615. for (j = 0; j < cipherSz; j++) {
  17616. if (cipher_names[j].cipherSuite0 ==
  17617. add->data.cipher.cipherSuite0 &&
  17618. cipher_names[j].cipherSuite ==
  17619. add->data.cipher.cipherSuite) {
  17620. add->data.cipher.offset = j;
  17621. break;
  17622. }
  17623. }
  17624. #endif
  17625. #if defined(WOLFSSL_QT) || defined(OPENSSL_ALL)
  17626. /* in_stack is checked in wolfSSL_CIPHER_description */
  17627. add->data.cipher.in_stack = 1;
  17628. #endif
  17629. add->next = ret;
  17630. if (ret != NULL) {
  17631. add->num = ret->num + 1;
  17632. }
  17633. else {
  17634. add->num = 1;
  17635. }
  17636. ret = add;
  17637. }
  17638. }
  17639. ((WOLFSSL*)ssl)->suitesStack = ret;
  17640. }
  17641. return ssl->suitesStack;
  17642. }
  17643. #endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY */
  17644. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || \
  17645. defined(WOLFSSL_HAPROXY) || defined(OPENSSL_EXTRA) || \
  17646. defined(HAVE_LIGHTY) || defined(HAVE_SECRET_CALLBACK)
  17647. long wolfSSL_SSL_CTX_get_timeout(const WOLFSSL_CTX *ctx)
  17648. {
  17649. WOLFSSL_ENTER("wolfSSL_SSL_CTX_get_timeout");
  17650. if (ctx == NULL)
  17651. return 0;
  17652. return ctx->timeout;
  17653. }
  17654. /* returns the time in seconds of the current timeout */
  17655. long wolfSSL_get_timeout(WOLFSSL* ssl)
  17656. {
  17657. WOLFSSL_ENTER("wolfSSL_get_timeout");
  17658. if (ssl == NULL)
  17659. return 0;
  17660. return ssl->timeout;
  17661. }
  17662. #endif
  17663. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) \
  17664. || defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY)
  17665. #ifdef HAVE_ECC
  17666. int wolfSSL_SSL_CTX_set_tmp_ecdh(WOLFSSL_CTX *ctx, WOLFSSL_EC_KEY *ecdh)
  17667. {
  17668. WOLFSSL_ENTER("wolfSSL_SSL_CTX_set_tmp_ecdh");
  17669. if (ctx == NULL || ecdh == NULL)
  17670. return BAD_FUNC_ARG;
  17671. ctx->ecdhCurveOID = ecdh->group->curve_oid;
  17672. return WOLFSSL_SUCCESS;
  17673. }
  17674. #endif
  17675. #ifndef NO_BIO
  17676. BIO *wolfSSL_SSL_get_rbio(const WOLFSSL *s)
  17677. {
  17678. WOLFSSL_ENTER("wolfSSL_SSL_get_rbio");
  17679. /* Nginx sets the buffer size if the read BIO is different to write BIO.
  17680. * The setting buffer size doesn't do anything so return NULL for both.
  17681. */
  17682. if (s == NULL)
  17683. return NULL;
  17684. return s->biord;
  17685. }
  17686. BIO *wolfSSL_SSL_get_wbio(const WOLFSSL *s)
  17687. {
  17688. WOLFSSL_ENTER("wolfSSL_SSL_get_wbio");
  17689. (void)s;
  17690. /* Nginx sets the buffer size if the read BIO is different to write BIO.
  17691. * The setting buffer size doesn't do anything so return NULL for both.
  17692. */
  17693. if (s == NULL)
  17694. return NULL;
  17695. return s->biowr;
  17696. }
  17697. #endif /* !NO_BIO */
  17698. int wolfSSL_SSL_do_handshake_internal(WOLFSSL *s)
  17699. {
  17700. WOLFSSL_ENTER("wolfSSL_SSL_do_handshake_internal");
  17701. if (s == NULL)
  17702. return WOLFSSL_FAILURE;
  17703. if (s->options.side == WOLFSSL_CLIENT_END) {
  17704. #ifndef NO_WOLFSSL_CLIENT
  17705. return wolfSSL_connect(s);
  17706. #else
  17707. WOLFSSL_MSG("Client not compiled in");
  17708. return WOLFSSL_FAILURE;
  17709. #endif
  17710. }
  17711. #ifndef NO_WOLFSSL_SERVER
  17712. return wolfSSL_accept(s);
  17713. #else
  17714. WOLFSSL_MSG("Server not compiled in");
  17715. return WOLFSSL_FAILURE;
  17716. #endif
  17717. }
  17718. int wolfSSL_SSL_do_handshake(WOLFSSL *s)
  17719. {
  17720. WOLFSSL_ENTER("wolfSSL_SSL_do_handshake");
  17721. #ifdef WOLFSSL_QUIC
  17722. if (WOLFSSL_IS_QUIC(s)) {
  17723. return wolfSSL_quic_do_handshake(s);
  17724. }
  17725. #endif
  17726. return wolfSSL_SSL_do_handshake_internal(s);
  17727. }
  17728. #if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
  17729. int wolfSSL_SSL_in_init(const WOLFSSL *ssl)
  17730. #else
  17731. int wolfSSL_SSL_in_init(WOLFSSL *ssl)
  17732. #endif
  17733. {
  17734. WOLFSSL_ENTER("wolfSSL_SSL_in_init");
  17735. return !wolfSSL_is_init_finished(ssl);
  17736. }
  17737. int wolfSSL_SSL_in_before(const WOLFSSL *ssl)
  17738. {
  17739. WOLFSSL_ENTER("wolfSSL_SSL_in_before");
  17740. if (ssl == NULL)
  17741. return WOLFSSL_FAILURE;
  17742. return ssl->options.handShakeState == NULL_STATE;
  17743. }
  17744. int wolfSSL_SSL_in_connect_init(WOLFSSL* ssl)
  17745. {
  17746. WOLFSSL_ENTER("wolfSSL_SSL_in_connect_init");
  17747. if (ssl == NULL)
  17748. return WOLFSSL_FAILURE;
  17749. if (ssl->options.side == WOLFSSL_CLIENT_END) {
  17750. return ssl->options.connectState > CONNECT_BEGIN &&
  17751. ssl->options.connectState < SECOND_REPLY_DONE;
  17752. }
  17753. return ssl->options.acceptState > ACCEPT_BEGIN &&
  17754. ssl->options.acceptState < ACCEPT_THIRD_REPLY_DONE;
  17755. }
  17756. #if defined(HAVE_SESSION_TICKET) && !defined(NO_WOLFSSL_SERVER)
  17757. /* Expected return values from implementations of OpenSSL ticket key callback.
  17758. */
  17759. #define TICKET_KEY_CB_RET_FAILURE (-1)
  17760. #define TICKET_KEY_CB_RET_NOT_FOUND 0
  17761. #define TICKET_KEY_CB_RET_OK 1
  17762. #define TICKET_KEY_CB_RET_RENEW 2
  17763. /* Implementation of session ticket encryption/decryption using OpenSSL
  17764. * callback to initialize the cipher and HMAC.
  17765. *
  17766. * ssl The SSL/TLS object.
  17767. * keyName The key name - used to identify the key to be used.
  17768. * iv The IV to use.
  17769. * mac The MAC of the encrypted data.
  17770. * enc Encrypt ticket.
  17771. * encTicket The ticket data.
  17772. * encTicketLen The length of the ticket data.
  17773. * encLen The encrypted/decrypted ticket length - output length.
  17774. * ctx Ignored. Application specific data.
  17775. * returns WOLFSSL_TICKET_RET_OK to indicate success,
  17776. * WOLFSSL_TICKET_RET_CREATE if a new ticket is required and
  17777. * WOLFSSL_TICKET_RET_FATAL on error.
  17778. */
  17779. static int wolfSSL_TicketKeyCb(WOLFSSL* ssl,
  17780. unsigned char keyName[WOLFSSL_TICKET_NAME_SZ],
  17781. unsigned char iv[WOLFSSL_TICKET_IV_SZ],
  17782. unsigned char mac[WOLFSSL_TICKET_MAC_SZ],
  17783. int enc, unsigned char* encTicket,
  17784. int encTicketLen, int* encLen, void* ctx)
  17785. {
  17786. byte digest[WC_MAX_DIGEST_SIZE];
  17787. #ifdef WOLFSSL_SMALL_STACK
  17788. WOLFSSL_EVP_CIPHER_CTX *evpCtx;
  17789. #else
  17790. WOLFSSL_EVP_CIPHER_CTX evpCtx[1];
  17791. #endif
  17792. WOLFSSL_HMAC_CTX hmacCtx;
  17793. unsigned int mdSz = 0;
  17794. int len = 0;
  17795. int ret = WOLFSSL_TICKET_RET_FATAL;
  17796. int res;
  17797. int totalSz = 0;
  17798. (void)ctx;
  17799. WOLFSSL_ENTER("wolfSSL_TicketKeyCb");
  17800. if (ssl == NULL || ssl->ctx == NULL || ssl->ctx->ticketEncWrapCb == NULL) {
  17801. WOLFSSL_MSG("Bad parameter");
  17802. return WOLFSSL_TICKET_RET_FATAL;
  17803. }
  17804. #ifdef WOLFSSL_SMALL_STACK
  17805. evpCtx = (WOLFSSL_EVP_CIPHER_CTX *)XMALLOC(sizeof(*evpCtx), ssl->heap,
  17806. DYNAMIC_TYPE_TMP_BUFFER);
  17807. if (evpCtx == NULL) {
  17808. WOLFSSL_MSG("out of memory");
  17809. return WOLFSSL_TICKET_RET_FATAL;
  17810. }
  17811. #endif
  17812. /* Initialize the cipher and HMAC. */
  17813. wolfSSL_EVP_CIPHER_CTX_init(evpCtx);
  17814. if (wolfSSL_HMAC_CTX_Init(&hmacCtx) != WOLFSSL_SUCCESS) {
  17815. WOLFSSL_MSG("wolfSSL_HMAC_CTX_Init error");
  17816. #ifdef WOLFSSL_SMALL_STACK
  17817. XFREE(evpCtx, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  17818. #endif
  17819. return WOLFSSL_TICKET_RET_FATAL;
  17820. }
  17821. res = ssl->ctx->ticketEncWrapCb(ssl, keyName,
  17822. iv, evpCtx, &hmacCtx, enc);
  17823. if (res != TICKET_KEY_CB_RET_OK && res != TICKET_KEY_CB_RET_RENEW) {
  17824. WOLFSSL_MSG("Ticket callback error");
  17825. ret = WOLFSSL_TICKET_RET_FATAL;
  17826. goto end;
  17827. }
  17828. if (wolfSSL_HMAC_size(&hmacCtx) > WOLFSSL_TICKET_MAC_SZ) {
  17829. WOLFSSL_MSG("Ticket cipher MAC size error");
  17830. goto end;
  17831. }
  17832. if (enc)
  17833. {
  17834. /* Encrypt in place. */
  17835. if (!wolfSSL_EVP_CipherUpdate(evpCtx, encTicket, &len,
  17836. encTicket, encTicketLen))
  17837. goto end;
  17838. totalSz = len;
  17839. if (totalSz > *encLen)
  17840. goto end;
  17841. if (!wolfSSL_EVP_EncryptFinal(evpCtx, &encTicket[len], &len))
  17842. goto end;
  17843. /* Total length of encrypted data. */
  17844. totalSz += len;
  17845. if (totalSz > *encLen)
  17846. goto end;
  17847. /* HMAC the encrypted data into the parameter 'mac'. */
  17848. if (!wolfSSL_HMAC_Update(&hmacCtx, encTicket, totalSz))
  17849. goto end;
  17850. if (!wolfSSL_HMAC_Final(&hmacCtx, mac, &mdSz))
  17851. goto end;
  17852. }
  17853. else
  17854. {
  17855. /* HMAC the encrypted data and compare it to the passed in data. */
  17856. if (!wolfSSL_HMAC_Update(&hmacCtx, encTicket, encTicketLen))
  17857. goto end;
  17858. if (!wolfSSL_HMAC_Final(&hmacCtx, digest, &mdSz))
  17859. goto end;
  17860. if (XMEMCMP(mac, digest, mdSz) != 0)
  17861. goto end;
  17862. /* Decrypt the ticket data in place. */
  17863. if (!wolfSSL_EVP_CipherUpdate(evpCtx, encTicket, &len,
  17864. encTicket, encTicketLen))
  17865. goto end;
  17866. totalSz = len;
  17867. if (totalSz > encTicketLen)
  17868. goto end;
  17869. if (!wolfSSL_EVP_DecryptFinal(evpCtx, &encTicket[len], &len))
  17870. goto end;
  17871. /* Total length of decrypted data. */
  17872. totalSz += len;
  17873. if (totalSz > encTicketLen)
  17874. goto end;
  17875. }
  17876. *encLen = totalSz;
  17877. if (res == TICKET_KEY_CB_RET_RENEW && !IsAtLeastTLSv1_3(ssl->version)
  17878. && !enc)
  17879. ret = WOLFSSL_TICKET_RET_CREATE;
  17880. else
  17881. ret = WOLFSSL_TICKET_RET_OK;
  17882. end:
  17883. (void)wc_HmacFree(&hmacCtx.hmac);
  17884. (void)wolfSSL_EVP_CIPHER_CTX_cleanup(evpCtx);
  17885. #ifdef WOLFSSL_SMALL_STACK
  17886. XFREE(evpCtx, ssl->heap, DYNAMIC_TYPE_TMP_BUFFER);
  17887. #endif
  17888. return ret;
  17889. }
  17890. /* Set the callback to use when encrypting/decrypting tickets.
  17891. *
  17892. * ctx The SSL/TLS context object.
  17893. * cb The OpenSSL session ticket callback.
  17894. * returns WOLFSSL_SUCCESS to indicate success.
  17895. */
  17896. int wolfSSL_CTX_set_tlsext_ticket_key_cb(WOLFSSL_CTX *ctx, ticketCompatCb cb)
  17897. {
  17898. /* Set the ticket encryption callback to be a wrapper around OpenSSL
  17899. * callback.
  17900. */
  17901. ctx->ticketEncCb = wolfSSL_TicketKeyCb;
  17902. ctx->ticketEncWrapCb = cb;
  17903. return WOLFSSL_SUCCESS;
  17904. }
  17905. #endif /* HAVE_SESSION_TICKET */
  17906. #endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY ||
  17907. OPENSSL_EXTRA || HAVE_LIGHTY */
  17908. #if defined(HAVE_SESSION_TICKET) && !defined(WOLFSSL_NO_DEF_TICKET_ENC_CB) && \
  17909. !defined(NO_WOLFSSL_SERVER)
  17910. /* Serialize the session ticket encryption keys.
  17911. *
  17912. * @param [in] ctx SSL/TLS context object.
  17913. * @param [in] keys Buffer to hold session ticket keys.
  17914. * @param [in] keylen Length of buffer.
  17915. * @return WOLFSSL_SUCCESS on success.
  17916. * @return WOLFSSL_FAILURE when ctx is NULL, keys is NULL or keylen is not the
  17917. * correct length.
  17918. */
  17919. long wolfSSL_CTX_get_tlsext_ticket_keys(WOLFSSL_CTX *ctx,
  17920. unsigned char *keys, int keylen)
  17921. {
  17922. if (ctx == NULL || keys == NULL) {
  17923. return WOLFSSL_FAILURE;
  17924. }
  17925. if (keylen != WOLFSSL_TICKET_KEYS_SZ) {
  17926. return WOLFSSL_FAILURE;
  17927. }
  17928. XMEMCPY(keys, ctx->ticketKeyCtx.name, WOLFSSL_TICKET_NAME_SZ);
  17929. keys += WOLFSSL_TICKET_NAME_SZ;
  17930. XMEMCPY(keys, ctx->ticketKeyCtx.key[0], WOLFSSL_TICKET_KEY_SZ);
  17931. keys += WOLFSSL_TICKET_KEY_SZ;
  17932. XMEMCPY(keys, ctx->ticketKeyCtx.key[1], WOLFSSL_TICKET_KEY_SZ);
  17933. keys += WOLFSSL_TICKET_KEY_SZ;
  17934. c32toa(ctx->ticketKeyCtx.expirary[0], keys);
  17935. keys += OPAQUE32_LEN;
  17936. c32toa(ctx->ticketKeyCtx.expirary[1], keys);
  17937. return WOLFSSL_SUCCESS;
  17938. }
  17939. /* Deserialize the session ticket encryption keys.
  17940. *
  17941. * @param [in] ctx SSL/TLS context object.
  17942. * @param [in] keys Session ticket keys.
  17943. * @param [in] keylen Length of data.
  17944. * @return WOLFSSL_SUCCESS on success.
  17945. * @return WOLFSSL_FAILURE when ctx is NULL, keys is NULL or keylen is not the
  17946. * correct length.
  17947. */
  17948. long wolfSSL_CTX_set_tlsext_ticket_keys(WOLFSSL_CTX *ctx,
  17949. unsigned char *keys, int keylen)
  17950. {
  17951. if (ctx == NULL || keys == NULL) {
  17952. return WOLFSSL_FAILURE;
  17953. }
  17954. if (keylen != WOLFSSL_TICKET_KEYS_SZ) {
  17955. return WOLFSSL_FAILURE;
  17956. }
  17957. XMEMCPY(ctx->ticketKeyCtx.name, keys, WOLFSSL_TICKET_NAME_SZ);
  17958. keys += WOLFSSL_TICKET_NAME_SZ;
  17959. XMEMCPY(ctx->ticketKeyCtx.key[0], keys, WOLFSSL_TICKET_KEY_SZ);
  17960. keys += WOLFSSL_TICKET_KEY_SZ;
  17961. XMEMCPY(ctx->ticketKeyCtx.key[1], keys, WOLFSSL_TICKET_KEY_SZ);
  17962. keys += WOLFSSL_TICKET_KEY_SZ;
  17963. ato32(keys, &ctx->ticketKeyCtx.expirary[0]);
  17964. keys += OPAQUE32_LEN;
  17965. ato32(keys, &ctx->ticketKeyCtx.expirary[1]);
  17966. return WOLFSSL_SUCCESS;
  17967. }
  17968. #endif
  17969. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY)
  17970. #ifdef HAVE_OCSP
  17971. /* Not an OpenSSL API. */
  17972. int wolfSSL_get_ocsp_response(WOLFSSL* ssl, byte** response)
  17973. {
  17974. *response = ssl->ocspResp;
  17975. return ssl->ocspRespSz;
  17976. }
  17977. /* Not an OpenSSL API. */
  17978. char* wolfSSL_get_ocsp_url(WOLFSSL* ssl)
  17979. {
  17980. return ssl->url;
  17981. }
  17982. /* Not an OpenSSL API. */
  17983. int wolfSSL_set_ocsp_url(WOLFSSL* ssl, char* url)
  17984. {
  17985. if (ssl == NULL)
  17986. return WOLFSSL_FAILURE;
  17987. ssl->url = url;
  17988. return WOLFSSL_SUCCESS;
  17989. }
  17990. #endif /* OCSP */
  17991. #endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY */
  17992. #if defined(HAVE_OCSP) && !defined(NO_ASN_TIME)
  17993. int wolfSSL_get_ocsp_producedDate(
  17994. WOLFSSL *ssl,
  17995. byte *producedDate,
  17996. size_t producedDate_space,
  17997. int *producedDateFormat)
  17998. {
  17999. if ((ssl->ocspProducedDateFormat != ASN_UTC_TIME) &&
  18000. (ssl->ocspProducedDateFormat != ASN_GENERALIZED_TIME))
  18001. return BAD_FUNC_ARG;
  18002. if ((producedDate == NULL) || (producedDateFormat == NULL))
  18003. return BAD_FUNC_ARG;
  18004. if (XSTRLEN((char *)ssl->ocspProducedDate) >= producedDate_space)
  18005. return BUFFER_E;
  18006. XSTRNCPY((char *)producedDate, (const char *)ssl->ocspProducedDate,
  18007. producedDate_space);
  18008. *producedDateFormat = ssl->ocspProducedDateFormat;
  18009. return 0;
  18010. }
  18011. int wolfSSL_get_ocsp_producedDate_tm(WOLFSSL *ssl, struct tm *produced_tm) {
  18012. int idx = 0;
  18013. if ((ssl->ocspProducedDateFormat != ASN_UTC_TIME) &&
  18014. (ssl->ocspProducedDateFormat != ASN_GENERALIZED_TIME))
  18015. return BAD_FUNC_ARG;
  18016. if (produced_tm == NULL)
  18017. return BAD_FUNC_ARG;
  18018. if (ExtractDate(ssl->ocspProducedDate,
  18019. (unsigned char)ssl->ocspProducedDateFormat, produced_tm, &idx))
  18020. return 0;
  18021. else
  18022. return ASN_PARSE_E;
  18023. }
  18024. #endif
  18025. #if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
  18026. defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
  18027. int wolfSSL_CTX_get_extra_chain_certs(WOLFSSL_CTX* ctx,
  18028. WOLF_STACK_OF(X509)** chain)
  18029. {
  18030. word32 idx;
  18031. word32 length;
  18032. WOLFSSL_STACK* node;
  18033. WOLFSSL_STACK* last = NULL;
  18034. if (ctx == NULL || chain == NULL) {
  18035. chain = NULL;
  18036. return WOLFSSL_FAILURE;
  18037. }
  18038. if (ctx->x509Chain != NULL) {
  18039. *chain = ctx->x509Chain;
  18040. return WOLFSSL_SUCCESS;
  18041. }
  18042. /* If there are no chains then success! */
  18043. *chain = NULL;
  18044. if (ctx->certChain == NULL || ctx->certChain->length == 0) {
  18045. return WOLFSSL_SUCCESS;
  18046. }
  18047. /* Create a new stack of WOLFSSL_X509 object from chain buffer. */
  18048. for (idx = 0; idx < ctx->certChain->length; ) {
  18049. node = wolfSSL_sk_X509_new_null();
  18050. if (node == NULL)
  18051. return WOLFSSL_FAILURE;
  18052. node->next = NULL;
  18053. /* 3 byte length | X509 DER data */
  18054. ato24(ctx->certChain->buffer + idx, &length);
  18055. idx += 3;
  18056. /* Create a new X509 from DER encoded data. */
  18057. node->data.x509 = wolfSSL_X509_d2i_ex(NULL,
  18058. ctx->certChain->buffer + idx, length, ctx->heap);
  18059. if (node->data.x509 == NULL) {
  18060. XFREE(node, NULL, DYNAMIC_TYPE_OPENSSL);
  18061. /* Return as much of the chain as we created. */
  18062. ctx->x509Chain = *chain;
  18063. return WOLFSSL_FAILURE;
  18064. }
  18065. idx += length;
  18066. /* Add object to the end of the stack. */
  18067. if (last == NULL) {
  18068. node->num = 1;
  18069. *chain = node;
  18070. }
  18071. else {
  18072. (*chain)->num++;
  18073. last->next = node;
  18074. }
  18075. last = node;
  18076. }
  18077. ctx->x509Chain = *chain;
  18078. return WOLFSSL_SUCCESS;
  18079. }
  18080. int wolfSSL_CTX_get_tlsext_status_cb(WOLFSSL_CTX* ctx, tlsextStatusCb* cb)
  18081. {
  18082. if (ctx == NULL || ctx->cm == NULL || cb == NULL)
  18083. return WOLFSSL_FAILURE;
  18084. #if !defined(NO_WOLFSSL_SERVER) && (defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
  18085. || defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2))
  18086. if (ctx->cm->ocsp_stapling == NULL)
  18087. return WOLFSSL_FAILURE;
  18088. *cb = ctx->cm->ocsp_stapling->statusCb;
  18089. #else
  18090. (void)cb;
  18091. *cb = NULL;
  18092. #endif
  18093. return WOLFSSL_SUCCESS;
  18094. }
  18095. int wolfSSL_CTX_set_tlsext_status_cb(WOLFSSL_CTX* ctx, tlsextStatusCb cb)
  18096. {
  18097. if (ctx == NULL || ctx->cm == NULL)
  18098. return WOLFSSL_FAILURE;
  18099. #if !defined(NO_WOLFSSL_SERVER) && (defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
  18100. || defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2))
  18101. /* Ensure stapling is on for callback to be used. */
  18102. wolfSSL_CTX_EnableOCSPStapling(ctx);
  18103. if (ctx->cm->ocsp_stapling == NULL)
  18104. return WOLFSSL_FAILURE;
  18105. ctx->cm->ocsp_stapling->statusCb = cb;
  18106. #else
  18107. (void)cb;
  18108. #endif
  18109. return WOLFSSL_SUCCESS;
  18110. }
  18111. int wolfSSL_CTX_get0_chain_certs(WOLFSSL_CTX *ctx,
  18112. WOLF_STACK_OF(WOLFSSL_X509) **sk)
  18113. {
  18114. WOLFSSL_ENTER("wolfSSL_CTX_get0_chain_certs");
  18115. if (ctx == NULL || sk == NULL) {
  18116. WOLFSSL_MSG("Bad parameter");
  18117. return WOLFSSL_FAILURE;
  18118. }
  18119. /* This function should return ctx->x509Chain if it is populated, otherwise
  18120. it should be populated from ctx->certChain. This matches the behavior of
  18121. wolfSSL_CTX_get_extra_chain_certs, so it is used directly. */
  18122. return wolfSSL_CTX_get_extra_chain_certs(ctx, sk);
  18123. }
  18124. #ifdef KEEP_OUR_CERT
  18125. int wolfSSL_get0_chain_certs(WOLFSSL *ssl,
  18126. WOLF_STACK_OF(WOLFSSL_X509) **sk)
  18127. {
  18128. WOLFSSL_ENTER("wolfSSL_get0_chain_certs");
  18129. if (ssl == NULL || sk == NULL) {
  18130. WOLFSSL_MSG("Bad parameter");
  18131. return WOLFSSL_FAILURE;
  18132. }
  18133. *sk = ssl->ourCertChain;
  18134. return WOLFSSL_SUCCESS;
  18135. }
  18136. #endif
  18137. WOLF_STACK_OF(WOLFSSL_STRING)* wolfSSL_sk_WOLFSSL_STRING_new(void)
  18138. {
  18139. WOLF_STACK_OF(WOLFSSL_STRING)* ret = wolfSSL_sk_new_node(NULL);
  18140. if (ret) {
  18141. ret->type = STACK_TYPE_STRING;
  18142. }
  18143. return ret;
  18144. }
  18145. void wolfSSL_WOLFSSL_STRING_free(WOLFSSL_STRING s)
  18146. {
  18147. WOLFSSL_ENTER("wolfSSL_WOLFSSL_STRING_free");
  18148. if (s != NULL)
  18149. XFREE(s, NULL, DYNAMIC_TYPE_OPENSSL);
  18150. }
  18151. void wolfSSL_sk_WOLFSSL_STRING_free(WOLF_STACK_OF(WOLFSSL_STRING)* sk)
  18152. {
  18153. WOLFSSL_STACK* tmp;
  18154. WOLFSSL_ENTER("wolfSSL_sk_WOLFSSL_STRING_free");
  18155. if (sk == NULL)
  18156. return;
  18157. /* parse through stack freeing each node */
  18158. while (sk) {
  18159. tmp = sk->next;
  18160. XFREE(sk->data.string, NULL, DYNAMIC_TYPE_OPENSSL);
  18161. XFREE(sk, NULL, DYNAMIC_TYPE_OPENSSL);
  18162. sk = tmp;
  18163. }
  18164. }
  18165. WOLFSSL_STRING wolfSSL_sk_WOLFSSL_STRING_value(
  18166. WOLF_STACK_OF(WOLFSSL_STRING)* strings, int idx)
  18167. {
  18168. for (; idx > 0 && strings != NULL; idx--)
  18169. strings = strings->next;
  18170. if (strings == NULL)
  18171. return NULL;
  18172. return strings->data.string;
  18173. }
  18174. int wolfSSL_sk_WOLFSSL_STRING_num(WOLF_STACK_OF(WOLFSSL_STRING)* strings)
  18175. {
  18176. if (strings)
  18177. return (int)strings->num;
  18178. return 0;
  18179. }
  18180. #endif /* WOLFSSL_NGINX || WOLFSSL_HAPROXY || OPENSSL_EXTRA || OPENSSL_ALL */
  18181. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || \
  18182. defined(WOLFSSL_HAPROXY) || defined(HAVE_LIGHTY) || \
  18183. defined(WOLFSSL_QUIC)
  18184. #ifdef HAVE_ALPN
  18185. void wolfSSL_get0_alpn_selected(const WOLFSSL *ssl, const unsigned char **data,
  18186. unsigned int *len)
  18187. {
  18188. word16 nameLen;
  18189. if (ssl != NULL && data != NULL && len != NULL) {
  18190. TLSX_ALPN_GetRequest(ssl->extensions, (void **)data, &nameLen);
  18191. *len = nameLen;
  18192. }
  18193. }
  18194. int wolfSSL_select_next_proto(unsigned char **out, unsigned char *outLen,
  18195. const unsigned char *in, unsigned int inLen,
  18196. const unsigned char *clientNames,
  18197. unsigned int clientLen)
  18198. {
  18199. unsigned int i, j;
  18200. byte lenIn, lenClient;
  18201. if (out == NULL || outLen == NULL || in == NULL || clientNames == NULL)
  18202. return OPENSSL_NPN_UNSUPPORTED;
  18203. for (i = 0; i < inLen; i += lenIn) {
  18204. lenIn = in[i++];
  18205. for (j = 0; j < clientLen; j += lenClient) {
  18206. lenClient = clientNames[j++];
  18207. if (lenIn != lenClient)
  18208. continue;
  18209. if (XMEMCMP(in + i, clientNames + j, lenIn) == 0) {
  18210. *out = (unsigned char *)(in + i);
  18211. *outLen = lenIn;
  18212. return OPENSSL_NPN_NEGOTIATED;
  18213. }
  18214. }
  18215. }
  18216. *out = (unsigned char *)clientNames + 1;
  18217. *outLen = clientNames[0];
  18218. return OPENSSL_NPN_NO_OVERLAP;
  18219. }
  18220. void wolfSSL_set_alpn_select_cb(WOLFSSL *ssl,
  18221. int (*cb) (WOLFSSL *ssl,
  18222. const unsigned char **out,
  18223. unsigned char *outlen,
  18224. const unsigned char *in,
  18225. unsigned int inlen,
  18226. void *arg), void *arg)
  18227. {
  18228. if (ssl != NULL) {
  18229. ssl->alpnSelect = cb;
  18230. ssl->alpnSelectArg = arg;
  18231. }
  18232. }
  18233. void wolfSSL_CTX_set_alpn_select_cb(WOLFSSL_CTX *ctx,
  18234. int (*cb) (WOLFSSL *ssl,
  18235. const unsigned char **out,
  18236. unsigned char *outlen,
  18237. const unsigned char *in,
  18238. unsigned int inlen,
  18239. void *arg), void *arg)
  18240. {
  18241. if (ctx != NULL) {
  18242. ctx->alpnSelect = cb;
  18243. ctx->alpnSelectArg = arg;
  18244. }
  18245. }
  18246. void wolfSSL_CTX_set_next_protos_advertised_cb(WOLFSSL_CTX *s,
  18247. int (*cb) (WOLFSSL *ssl,
  18248. const unsigned char
  18249. **out,
  18250. unsigned int *outlen,
  18251. void *arg), void *arg)
  18252. {
  18253. (void)s;
  18254. (void)cb;
  18255. (void)arg;
  18256. WOLFSSL_STUB("wolfSSL_CTX_set_next_protos_advertised_cb");
  18257. }
  18258. void wolfSSL_CTX_set_next_proto_select_cb(WOLFSSL_CTX *s,
  18259. int (*cb) (WOLFSSL *ssl,
  18260. unsigned char **out,
  18261. unsigned char *outlen,
  18262. const unsigned char *in,
  18263. unsigned int inlen,
  18264. void *arg), void *arg)
  18265. {
  18266. (void)s;
  18267. (void)cb;
  18268. (void)arg;
  18269. WOLFSSL_STUB("wolfSSL_CTX_set_next_proto_select_cb");
  18270. }
  18271. void wolfSSL_get0_next_proto_negotiated(const WOLFSSL *s,
  18272. const unsigned char **data, unsigned *len)
  18273. {
  18274. (void)s;
  18275. (void)data;
  18276. (void)len;
  18277. WOLFSSL_STUB("wolfSSL_get0_next_proto_negotiated");
  18278. }
  18279. #endif /* HAVE_ALPN */
  18280. #endif /* WOLFSSL_NGINX / WOLFSSL_HAPROXY */
  18281. #if defined(OPENSSL_EXTRA) || defined(HAVE_CURL)
  18282. int wolfSSL_curve_is_disabled(const WOLFSSL* ssl, word16 curve_id)
  18283. {
  18284. if (curve_id >= WOLFSSL_FFDHE_START) {
  18285. /* DH parameters are never disabled. */
  18286. return 0;
  18287. }
  18288. if (curve_id > WOLFSSL_ECC_MAX_AVAIL) {
  18289. WOLFSSL_MSG("Curve id out of supported range");
  18290. /* Disabled if not in valid range. */
  18291. return 1;
  18292. }
  18293. if (curve_id >= 32) {
  18294. /* 0 is for invalid and 1-14 aren't used otherwise. */
  18295. return (ssl->disabledCurves & (1U << (curve_id - 32))) != 0;
  18296. }
  18297. return (ssl->disabledCurves & (1U << curve_id)) != 0;
  18298. }
  18299. #if (defined(HAVE_ECC) || \
  18300. defined(HAVE_CURVE25519) || defined(HAVE_CURVE448))
  18301. static int set_curves_list(WOLFSSL* ssl, WOLFSSL_CTX *ctx, const char* names)
  18302. {
  18303. int idx, start = 0, len, i, ret = WOLFSSL_FAILURE;
  18304. word16 curve;
  18305. word32 disabled;
  18306. char name[MAX_CURVE_NAME_SZ];
  18307. byte groups_len = 0;
  18308. #ifdef WOLFSSL_SMALL_STACK
  18309. void *heap = ssl? ssl->heap : ctx ? ctx->heap : NULL;
  18310. int *groups;
  18311. #else
  18312. int groups[WOLFSSL_MAX_GROUP_COUNT];
  18313. #endif
  18314. #ifdef WOLFSSL_SMALL_STACK
  18315. groups = (int*)XMALLOC(sizeof(int)*WOLFSSL_MAX_GROUP_COUNT,
  18316. heap, DYNAMIC_TYPE_TMP_BUFFER);
  18317. if (groups == NULL) {
  18318. ret = MEMORY_E;
  18319. goto leave;
  18320. }
  18321. #endif
  18322. for (idx = 1; names[idx-1] != '\0'; idx++) {
  18323. if (names[idx] != ':' && names[idx] != '\0')
  18324. continue;
  18325. len = idx - start;
  18326. if (len > MAX_CURVE_NAME_SZ - 1)
  18327. goto leave;
  18328. XMEMCPY(name, names + start, len);
  18329. name[len++] = 0;
  18330. /* Use XSTRNCMP to avoid valgrind error. */
  18331. if ((XSTRNCMP(name, "prime256v1", len) == 0) ||
  18332. (XSTRNCMP(name, "secp256r1", len) == 0) ||
  18333. (XSTRNCMP(name, "P-256", len) == 0))
  18334. {
  18335. curve = WOLFSSL_ECC_SECP256R1;
  18336. }
  18337. else if ((XSTRNCMP(name, "secp384r1", len) == 0) ||
  18338. (XSTRNCMP(name, "P-384", len) == 0))
  18339. {
  18340. curve = WOLFSSL_ECC_SECP384R1;
  18341. }
  18342. else if ((XSTRNCMP(name, "secp521r1", len) == 0) ||
  18343. (XSTRNCMP(name, "P-521", len) == 0))
  18344. {
  18345. curve = WOLFSSL_ECC_SECP521R1;
  18346. }
  18347. #ifdef WOLFSSL_SM2
  18348. else if ((XSTRNCMP(name, "sm2p256v1", len) == 0) ||
  18349. (XSTRNCMP(name, "SM2", len) == 0))
  18350. {
  18351. curve = WOLFSSL_ECC_SM2P256V1;
  18352. }
  18353. #endif
  18354. #ifdef HAVE_CURVE25519
  18355. else if (XSTRNCMP(name, "X25519", len) == 0)
  18356. {
  18357. curve = WOLFSSL_ECC_X25519;
  18358. }
  18359. #endif
  18360. #ifdef HAVE_CURVE448
  18361. else if (XSTRNCMP(name, "X448", len) == 0)
  18362. {
  18363. curve = WOLFSSL_ECC_X448;
  18364. }
  18365. #endif
  18366. else {
  18367. #if !defined(HAVE_FIPS) && !defined(HAVE_SELFTEST) && defined(HAVE_ECC)
  18368. int nret;
  18369. const ecc_set_type *eccSet;
  18370. nret = wc_ecc_get_curve_idx_from_name(name);
  18371. if (nret < 0) {
  18372. WOLFSSL_MSG("Could not find name in set");
  18373. goto leave;
  18374. }
  18375. eccSet = wc_ecc_get_curve_params(ret);
  18376. if (eccSet == NULL) {
  18377. WOLFSSL_MSG("NULL set returned");
  18378. goto leave;
  18379. }
  18380. curve = GetCurveByOID(eccSet->oidSum);
  18381. #else
  18382. WOLFSSL_MSG("API not present to search farther using name");
  18383. goto leave;
  18384. #endif
  18385. }
  18386. if (curve >= WOLFSSL_ECC_MAX_AVAIL) {
  18387. WOLFSSL_MSG("curve value is not supported");
  18388. goto leave;
  18389. }
  18390. for (i = 0; i < groups_len; ++i) {
  18391. if (groups[i] == curve) {
  18392. /* silently drop duplicates */
  18393. break;
  18394. }
  18395. }
  18396. if (i >= groups_len) {
  18397. if (groups_len >= WOLFSSL_MAX_GROUP_COUNT) {
  18398. WOLFSSL_MSG_EX("setting %d or more supported "
  18399. "curves is not permitted", groups_len);
  18400. goto leave;
  18401. }
  18402. groups[groups_len++] = (int)curve;
  18403. }
  18404. start = idx + 1;
  18405. }
  18406. /* Disable all curves so that only the ones the user wants are enabled. */
  18407. disabled = 0xFFFFFFFFUL;
  18408. for (i = 0; i < groups_len; ++i) {
  18409. /* Switch the bit to off and therefore is enabled. */
  18410. curve = (word16)groups[i];
  18411. if (curve >= 32) {
  18412. /* 0 is for invalid and 1-14 aren't used otherwise. */
  18413. disabled &= ~(1U << (curve - 32));
  18414. }
  18415. else {
  18416. disabled &= ~(1U << curve);
  18417. }
  18418. #ifdef HAVE_SUPPORTED_CURVES
  18419. #if defined(WOLFSSL_TLS13) && !defined(WOLFSSL_OLD_SET_CURVES_LIST)
  18420. /* using the wolfSSL API to set the groups, this will populate
  18421. * (ssl|ctx)->groups and reset any TLSX_SUPPORTED_GROUPS.
  18422. * The order in (ssl|ctx)->groups will then be respected
  18423. * when TLSX_KEY_SHARE needs to be established */
  18424. if ((ssl && wolfSSL_set_groups(ssl, groups, groups_len)
  18425. != WOLFSSL_SUCCESS)
  18426. || (ctx && wolfSSL_CTX_set_groups(ctx, groups, groups_len)
  18427. != WOLFSSL_SUCCESS)) {
  18428. WOLFSSL_MSG("Unable to set supported curve");
  18429. goto leave;
  18430. }
  18431. #elif !defined(NO_WOLFSSL_CLIENT)
  18432. /* set the supported curve so client TLS extension contains only the
  18433. * desired curves */
  18434. if ((ssl && wolfSSL_UseSupportedCurve(ssl, curve) != WOLFSSL_SUCCESS)
  18435. || (ctx && wolfSSL_CTX_UseSupportedCurve(ctx, curve)
  18436. != WOLFSSL_SUCCESS)) {
  18437. WOLFSSL_MSG("Unable to set supported curve");
  18438. goto leave;
  18439. }
  18440. #endif
  18441. #endif /* HAVE_SUPPORTED_CURVES */
  18442. }
  18443. if (ssl)
  18444. ssl->disabledCurves = disabled;
  18445. else
  18446. ctx->disabledCurves = disabled;
  18447. ret = WOLFSSL_SUCCESS;
  18448. leave:
  18449. #ifdef WOLFSSL_SMALL_STACK
  18450. if (groups)
  18451. XFREE((void*)groups, heap, DYNAMIC_TYPE_TMP_BUFFER);
  18452. #endif
  18453. return ret;
  18454. }
  18455. int wolfSSL_CTX_set1_curves_list(WOLFSSL_CTX* ctx, const char* names)
  18456. {
  18457. if (ctx == NULL || names == NULL) {
  18458. WOLFSSL_MSG("ctx or names was NULL");
  18459. return WOLFSSL_FAILURE;
  18460. }
  18461. return set_curves_list(NULL, ctx, names);
  18462. }
  18463. int wolfSSL_set1_curves_list(WOLFSSL* ssl, const char* names)
  18464. {
  18465. if (ssl == NULL || names == NULL) {
  18466. WOLFSSL_MSG("ssl or names was NULL");
  18467. return WOLFSSL_FAILURE;
  18468. }
  18469. return set_curves_list(ssl, NULL, names);
  18470. }
  18471. #endif /* (HAVE_ECC || HAVE_CURVE25519 || HAVE_CURVE448) */
  18472. #endif /* OPENSSL_EXTRA || HAVE_CURL */
  18473. #ifdef OPENSSL_EXTRA
  18474. /* Sets a callback for when sending and receiving protocol messages.
  18475. * This callback is copied to all WOLFSSL objects created from the ctx.
  18476. *
  18477. * ctx WOLFSSL_CTX structure to set callback in
  18478. * cb callback to use
  18479. *
  18480. * return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE with error case
  18481. */
  18482. int wolfSSL_CTX_set_msg_callback(WOLFSSL_CTX *ctx, SSL_Msg_Cb cb)
  18483. {
  18484. WOLFSSL_ENTER("wolfSSL_CTX_set_msg_callback");
  18485. if (ctx == NULL) {
  18486. WOLFSSL_MSG("Null ctx passed in");
  18487. return WOLFSSL_FAILURE;
  18488. }
  18489. ctx->protoMsgCb = cb;
  18490. return WOLFSSL_SUCCESS;
  18491. }
  18492. /* Sets a callback for when sending and receiving protocol messages.
  18493. *
  18494. * ssl WOLFSSL structure to set callback in
  18495. * cb callback to use
  18496. *
  18497. * return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE with error case
  18498. */
  18499. int wolfSSL_set_msg_callback(WOLFSSL *ssl, SSL_Msg_Cb cb)
  18500. {
  18501. WOLFSSL_ENTER("wolfSSL_set_msg_callback");
  18502. if (ssl == NULL) {
  18503. return WOLFSSL_FAILURE;
  18504. }
  18505. if (cb != NULL) {
  18506. ssl->toInfoOn = 1;
  18507. }
  18508. ssl->protoMsgCb = cb;
  18509. return WOLFSSL_SUCCESS;
  18510. }
  18511. /* set the user argument to pass to the msg callback when called
  18512. * return WOLFSSL_SUCCESS on success */
  18513. int wolfSSL_CTX_set_msg_callback_arg(WOLFSSL_CTX *ctx, void* arg)
  18514. {
  18515. WOLFSSL_ENTER("wolfSSL_CTX_set_msg_callback_arg");
  18516. if (ctx == NULL) {
  18517. WOLFSSL_MSG("Null WOLFSSL_CTX passed in");
  18518. return WOLFSSL_FAILURE;
  18519. }
  18520. ctx->protoMsgCtx = arg;
  18521. return WOLFSSL_SUCCESS;
  18522. }
  18523. int wolfSSL_set_msg_callback_arg(WOLFSSL *ssl, void* arg)
  18524. {
  18525. WOLFSSL_ENTER("wolfSSL_set_msg_callback_arg");
  18526. if (ssl == NULL)
  18527. return WOLFSSL_FAILURE;
  18528. ssl->protoMsgCtx = arg;
  18529. return WOLFSSL_SUCCESS;
  18530. }
  18531. void *wolfSSL_OPENSSL_memdup(const void *data, size_t siz, const char* file,
  18532. int line)
  18533. {
  18534. void *ret;
  18535. (void)file;
  18536. (void)line;
  18537. if (data == NULL || siz >= INT_MAX)
  18538. return NULL;
  18539. ret = OPENSSL_malloc(siz);
  18540. if (ret == NULL) {
  18541. return NULL;
  18542. }
  18543. return XMEMCPY(ret, data, siz);
  18544. }
  18545. void wolfSSL_OPENSSL_cleanse(void *ptr, size_t len)
  18546. {
  18547. if (ptr)
  18548. ForceZero(ptr, (word32)len);
  18549. }
  18550. int wolfSSL_CTX_set_alpn_protos(WOLFSSL_CTX *ctx, const unsigned char *p,
  18551. unsigned int p_len)
  18552. {
  18553. WOLFSSL_ENTER("wolfSSL_CTX_set_alpn_protos");
  18554. if (ctx == NULL)
  18555. return BAD_FUNC_ARG;
  18556. if (ctx->alpn_cli_protos != NULL) {
  18557. XFREE((void*)ctx->alpn_cli_protos, ctx->heap, DYNAMIC_TYPE_OPENSSL);
  18558. }
  18559. ctx->alpn_cli_protos = (const unsigned char*)XMALLOC(p_len,
  18560. ctx->heap, DYNAMIC_TYPE_OPENSSL);
  18561. if (ctx->alpn_cli_protos == NULL) {
  18562. #if defined(WOLFSSL_ERROR_CODE_OPENSSL)
  18563. /* 0 on success in OpenSSL, non-0 on failure in OpenSSL
  18564. * the function reverses the return value convention.
  18565. */
  18566. return 1;
  18567. #else
  18568. return WOLFSSL_FAILURE;
  18569. #endif
  18570. }
  18571. XMEMCPY((void*)ctx->alpn_cli_protos, p, p_len);
  18572. ctx->alpn_cli_protos_len = p_len;
  18573. #if defined(WOLFSSL_ERROR_CODE_OPENSSL)
  18574. /* 0 on success in OpenSSL, non-0 on failure in OpenSSL
  18575. * the function reverses the return value convention.
  18576. */
  18577. return 0;
  18578. #else
  18579. return WOLFSSL_SUCCESS;
  18580. #endif
  18581. }
  18582. #ifdef HAVE_ALPN
  18583. #ifndef NO_BIO
  18584. /* Sets the ALPN extension protos
  18585. *
  18586. * example format is
  18587. * unsigned char p[] = {
  18588. * 8, 'h', 't', 't', 'p', '/', '1', '.', '1'
  18589. * };
  18590. *
  18591. * returns WOLFSSL_SUCCESS on success */
  18592. int wolfSSL_set_alpn_protos(WOLFSSL* ssl,
  18593. const unsigned char* p, unsigned int p_len)
  18594. {
  18595. WOLFSSL_BIO* bio;
  18596. char* pt = NULL;
  18597. unsigned int sz;
  18598. unsigned int idx = 0;
  18599. int alpn_opt = WOLFSSL_ALPN_CONTINUE_ON_MISMATCH;
  18600. WOLFSSL_ENTER("wolfSSL_set_alpn_protos");
  18601. if (ssl == NULL || p_len <= 1) {
  18602. #if defined(WOLFSSL_ERROR_CODE_OPENSSL)
  18603. /* 0 on success in OpenSSL, non-0 on failure in OpenSSL
  18604. * the function reverses the return value convention.
  18605. */
  18606. return 1;
  18607. #else
  18608. return WOLFSSL_FAILURE;
  18609. #endif
  18610. }
  18611. bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem());
  18612. if (bio == NULL) {
  18613. #if defined(WOLFSSL_ERROR_CODE_OPENSSL)
  18614. /* 0 on success in OpenSSL, non-0 on failure in OpenSSL
  18615. * the function reverses the return value convention.
  18616. */
  18617. return 1;
  18618. #else
  18619. return WOLFSSL_FAILURE;
  18620. #endif
  18621. }
  18622. /* convert into comma separated list */
  18623. while (idx < p_len - 1) {
  18624. unsigned int i;
  18625. sz = p[idx++];
  18626. if (idx + sz > p_len) {
  18627. WOLFSSL_MSG("Bad list format");
  18628. wolfSSL_BIO_free(bio);
  18629. #if defined(WOLFSSL_ERROR_CODE_OPENSSL)
  18630. /* 0 on success in OpenSSL, non-0 on failure in OpenSSL
  18631. * the function reverses the return value convention.
  18632. */
  18633. return 1;
  18634. #else
  18635. return WOLFSSL_FAILURE;
  18636. #endif
  18637. }
  18638. if (sz > 0) {
  18639. for (i = 0; i < sz; i++) {
  18640. wolfSSL_BIO_write(bio, &p[idx++], 1);
  18641. }
  18642. if (idx < p_len - 1)
  18643. wolfSSL_BIO_write(bio, ",", 1);
  18644. }
  18645. }
  18646. wolfSSL_BIO_write(bio, "\0", 1);
  18647. /* clears out all current ALPN extensions set */
  18648. TLSX_Remove(&ssl->extensions, TLSX_APPLICATION_LAYER_PROTOCOL, ssl->heap);
  18649. if ((sz = wolfSSL_BIO_get_mem_data(bio, &pt)) > 0) {
  18650. wolfSSL_UseALPN(ssl, pt, sz, (byte) alpn_opt);
  18651. }
  18652. wolfSSL_BIO_free(bio);
  18653. #if defined(WOLFSSL_ERROR_CODE_OPENSSL)
  18654. /* 0 on success in OpenSSL, non-0 on failure in OpenSSL
  18655. * the function reverses the return value convention.
  18656. */
  18657. return 0;
  18658. #else
  18659. return WOLFSSL_SUCCESS;
  18660. #endif
  18661. }
  18662. #endif /* !NO_BIO */
  18663. #endif /* HAVE_ALPN */
  18664. #endif /* OPENSSL_EXTRA */
  18665. #if defined(OPENSSL_EXTRA)
  18666. #ifndef NO_BIO
  18667. #define WOLFSSL_BIO_INCLUDED
  18668. #include "src/bio.c"
  18669. #endif
  18670. word32 nid2oid(int nid, int grp)
  18671. {
  18672. /* get OID type */
  18673. switch (grp) {
  18674. /* oidHashType */
  18675. case oidHashType:
  18676. switch (nid) {
  18677. #ifdef WOLFSSL_MD2
  18678. case NID_md2:
  18679. return MD2h;
  18680. #endif
  18681. #ifndef NO_MD5
  18682. case NID_md5:
  18683. return MD5h;
  18684. #endif
  18685. #ifndef NO_SHA
  18686. case NID_sha1:
  18687. return SHAh;
  18688. #endif
  18689. case NID_sha224:
  18690. return SHA224h;
  18691. #ifndef NO_SHA256
  18692. case NID_sha256:
  18693. return SHA256h;
  18694. #endif
  18695. #ifdef WOLFSSL_SHA384
  18696. case NID_sha384:
  18697. return SHA384h;
  18698. #endif
  18699. #ifdef WOLFSSL_SHA512
  18700. case NID_sha512:
  18701. return SHA512h;
  18702. #endif
  18703. #ifndef WOLFSSL_NOSHA3_224
  18704. case NID_sha3_224:
  18705. return SHA3_224h;
  18706. #endif
  18707. #ifndef WOLFSSL_NOSHA3_256
  18708. case NID_sha3_256:
  18709. return SHA3_256h;
  18710. #endif
  18711. #ifndef WOLFSSL_NOSHA3_384
  18712. case NID_sha3_384:
  18713. return SHA3_384h;
  18714. #endif
  18715. #ifndef WOLFSSL_NOSHA3_512
  18716. case NID_sha3_512:
  18717. return SHA3_512h;
  18718. #endif
  18719. }
  18720. break;
  18721. /* oidSigType */
  18722. case oidSigType:
  18723. switch (nid) {
  18724. #ifndef NO_DSA
  18725. case NID_dsaWithSHA1:
  18726. return CTC_SHAwDSA;
  18727. case NID_dsa_with_SHA256:
  18728. return CTC_SHA256wDSA;
  18729. #endif /* NO_DSA */
  18730. #ifndef NO_RSA
  18731. case NID_md2WithRSAEncryption:
  18732. return CTC_MD2wRSA;
  18733. case NID_md5WithRSAEncryption:
  18734. return CTC_MD5wRSA;
  18735. case NID_sha1WithRSAEncryption:
  18736. return CTC_SHAwRSA;
  18737. case NID_sha224WithRSAEncryption:
  18738. return CTC_SHA224wRSA;
  18739. case NID_sha256WithRSAEncryption:
  18740. return CTC_SHA256wRSA;
  18741. case NID_sha384WithRSAEncryption:
  18742. return CTC_SHA384wRSA;
  18743. case NID_sha512WithRSAEncryption:
  18744. return CTC_SHA512wRSA;
  18745. #ifdef WOLFSSL_SHA3
  18746. case NID_RSA_SHA3_224:
  18747. return CTC_SHA3_224wRSA;
  18748. case NID_RSA_SHA3_256:
  18749. return CTC_SHA3_256wRSA;
  18750. case NID_RSA_SHA3_384:
  18751. return CTC_SHA3_384wRSA;
  18752. case NID_RSA_SHA3_512:
  18753. return CTC_SHA3_512wRSA;
  18754. #endif
  18755. #endif /* NO_RSA */
  18756. #ifdef HAVE_ECC
  18757. case NID_ecdsa_with_SHA1:
  18758. return CTC_SHAwECDSA;
  18759. case NID_ecdsa_with_SHA224:
  18760. return CTC_SHA224wECDSA;
  18761. case NID_ecdsa_with_SHA256:
  18762. return CTC_SHA256wECDSA;
  18763. case NID_ecdsa_with_SHA384:
  18764. return CTC_SHA384wECDSA;
  18765. case NID_ecdsa_with_SHA512:
  18766. return CTC_SHA512wECDSA;
  18767. #ifdef WOLFSSL_SHA3
  18768. case NID_ecdsa_with_SHA3_224:
  18769. return CTC_SHA3_224wECDSA;
  18770. case NID_ecdsa_with_SHA3_256:
  18771. return CTC_SHA3_256wECDSA;
  18772. case NID_ecdsa_with_SHA3_384:
  18773. return CTC_SHA3_384wECDSA;
  18774. case NID_ecdsa_with_SHA3_512:
  18775. return CTC_SHA3_512wECDSA;
  18776. #endif
  18777. #endif /* HAVE_ECC */
  18778. }
  18779. break;
  18780. /* oidKeyType */
  18781. case oidKeyType:
  18782. switch (nid) {
  18783. #ifndef NO_DSA
  18784. case NID_dsa:
  18785. return DSAk;
  18786. #endif /* NO_DSA */
  18787. #ifndef NO_RSA
  18788. case NID_rsaEncryption:
  18789. return RSAk;
  18790. #endif /* NO_RSA */
  18791. #ifdef HAVE_ECC
  18792. case NID_X9_62_id_ecPublicKey:
  18793. return ECDSAk;
  18794. #endif /* HAVE_ECC */
  18795. }
  18796. break;
  18797. #ifdef HAVE_ECC
  18798. case oidCurveType:
  18799. switch (nid) {
  18800. case NID_X9_62_prime192v1:
  18801. return ECC_SECP192R1_OID;
  18802. case NID_X9_62_prime192v2:
  18803. return ECC_PRIME192V2_OID;
  18804. case NID_X9_62_prime192v3:
  18805. return ECC_PRIME192V3_OID;
  18806. case NID_X9_62_prime239v1:
  18807. return ECC_PRIME239V1_OID;
  18808. case NID_X9_62_prime239v2:
  18809. return ECC_PRIME239V2_OID;
  18810. case NID_X9_62_prime239v3:
  18811. return ECC_PRIME239V3_OID;
  18812. case NID_X9_62_prime256v1:
  18813. return ECC_SECP256R1_OID;
  18814. case NID_secp112r1:
  18815. return ECC_SECP112R1_OID;
  18816. case NID_secp112r2:
  18817. return ECC_SECP112R2_OID;
  18818. case NID_secp128r1:
  18819. return ECC_SECP128R1_OID;
  18820. case NID_secp128r2:
  18821. return ECC_SECP128R2_OID;
  18822. case NID_secp160r1:
  18823. return ECC_SECP160R1_OID;
  18824. case NID_secp160r2:
  18825. return ECC_SECP160R2_OID;
  18826. case NID_secp224r1:
  18827. return ECC_SECP224R1_OID;
  18828. case NID_secp384r1:
  18829. return ECC_SECP384R1_OID;
  18830. case NID_secp521r1:
  18831. return ECC_SECP521R1_OID;
  18832. case NID_secp160k1:
  18833. return ECC_SECP160K1_OID;
  18834. case NID_secp192k1:
  18835. return ECC_SECP192K1_OID;
  18836. case NID_secp224k1:
  18837. return ECC_SECP224K1_OID;
  18838. case NID_secp256k1:
  18839. return ECC_SECP256K1_OID;
  18840. case NID_brainpoolP160r1:
  18841. return ECC_BRAINPOOLP160R1_OID;
  18842. case NID_brainpoolP192r1:
  18843. return ECC_BRAINPOOLP192R1_OID;
  18844. case NID_brainpoolP224r1:
  18845. return ECC_BRAINPOOLP224R1_OID;
  18846. case NID_brainpoolP256r1:
  18847. return ECC_BRAINPOOLP256R1_OID;
  18848. case NID_brainpoolP320r1:
  18849. return ECC_BRAINPOOLP320R1_OID;
  18850. case NID_brainpoolP384r1:
  18851. return ECC_BRAINPOOLP384R1_OID;
  18852. case NID_brainpoolP512r1:
  18853. return ECC_BRAINPOOLP512R1_OID;
  18854. }
  18855. break;
  18856. #endif /* HAVE_ECC */
  18857. /* oidBlkType */
  18858. case oidBlkType:
  18859. switch (nid) {
  18860. #ifdef WOLFSSL_AES_128
  18861. case AES128CBCb:
  18862. return AES128CBCb;
  18863. #endif
  18864. #ifdef WOLFSSL_AES_192
  18865. case AES192CBCb:
  18866. return AES192CBCb;
  18867. #endif
  18868. #ifdef WOLFSSL_AES_256
  18869. case AES256CBCb:
  18870. return AES256CBCb;
  18871. #endif
  18872. #ifndef NO_DES3
  18873. case NID_des:
  18874. return DESb;
  18875. case NID_des3:
  18876. return DES3b;
  18877. #endif
  18878. }
  18879. break;
  18880. #ifdef HAVE_OCSP
  18881. case oidOcspType:
  18882. switch (nid) {
  18883. case NID_id_pkix_OCSP_basic:
  18884. return OCSP_BASIC_OID;
  18885. case OCSP_NONCE_OID:
  18886. return OCSP_NONCE_OID;
  18887. }
  18888. break;
  18889. #endif /* HAVE_OCSP */
  18890. /* oidCertExtType */
  18891. case oidCertExtType:
  18892. switch (nid) {
  18893. case NID_basic_constraints:
  18894. return BASIC_CA_OID;
  18895. case NID_subject_alt_name:
  18896. return ALT_NAMES_OID;
  18897. case NID_crl_distribution_points:
  18898. return CRL_DIST_OID;
  18899. case NID_info_access:
  18900. return AUTH_INFO_OID;
  18901. case NID_authority_key_identifier:
  18902. return AUTH_KEY_OID;
  18903. case NID_subject_key_identifier:
  18904. return SUBJ_KEY_OID;
  18905. case NID_inhibit_any_policy:
  18906. return INHIBIT_ANY_OID;
  18907. case NID_key_usage:
  18908. return KEY_USAGE_OID;
  18909. case NID_name_constraints:
  18910. return NAME_CONS_OID;
  18911. case NID_certificate_policies:
  18912. return CERT_POLICY_OID;
  18913. case NID_ext_key_usage:
  18914. return EXT_KEY_USAGE_OID;
  18915. }
  18916. break;
  18917. /* oidCertAuthInfoType */
  18918. case oidCertAuthInfoType:
  18919. switch (nid) {
  18920. case NID_ad_OCSP:
  18921. return AIA_OCSP_OID;
  18922. case NID_ad_ca_issuers:
  18923. return AIA_CA_ISSUER_OID;
  18924. }
  18925. break;
  18926. /* oidCertPolicyType */
  18927. case oidCertPolicyType:
  18928. switch (nid) {
  18929. case NID_any_policy:
  18930. return CP_ANY_OID;
  18931. }
  18932. break;
  18933. /* oidCertAltNameType */
  18934. case oidCertAltNameType:
  18935. switch (nid) {
  18936. case NID_hw_name_oid:
  18937. return HW_NAME_OID;
  18938. }
  18939. break;
  18940. /* oidCertKeyUseType */
  18941. case oidCertKeyUseType:
  18942. switch (nid) {
  18943. case NID_anyExtendedKeyUsage:
  18944. return EKU_ANY_OID;
  18945. case EKU_SERVER_AUTH_OID:
  18946. return EKU_SERVER_AUTH_OID;
  18947. case EKU_CLIENT_AUTH_OID:
  18948. return EKU_CLIENT_AUTH_OID;
  18949. case EKU_OCSP_SIGN_OID:
  18950. return EKU_OCSP_SIGN_OID;
  18951. }
  18952. break;
  18953. /* oidKdfType */
  18954. case oidKdfType:
  18955. switch (nid) {
  18956. case PBKDF2_OID:
  18957. return PBKDF2_OID;
  18958. }
  18959. break;
  18960. /* oidPBEType */
  18961. case oidPBEType:
  18962. switch (nid) {
  18963. case PBE_SHA1_RC4_128:
  18964. return PBE_SHA1_RC4_128;
  18965. case PBE_SHA1_DES:
  18966. return PBE_SHA1_DES;
  18967. case PBE_SHA1_DES3:
  18968. return PBE_SHA1_DES3;
  18969. }
  18970. break;
  18971. /* oidKeyWrapType */
  18972. case oidKeyWrapType:
  18973. switch (nid) {
  18974. #ifdef WOLFSSL_AES_128
  18975. case AES128_WRAP:
  18976. return AES128_WRAP;
  18977. #endif
  18978. #ifdef WOLFSSL_AES_192
  18979. case AES192_WRAP:
  18980. return AES192_WRAP;
  18981. #endif
  18982. #ifdef WOLFSSL_AES_256
  18983. case AES256_WRAP:
  18984. return AES256_WRAP;
  18985. #endif
  18986. }
  18987. break;
  18988. /* oidCmsKeyAgreeType */
  18989. case oidCmsKeyAgreeType:
  18990. switch (nid) {
  18991. #ifndef NO_SHA
  18992. case dhSinglePass_stdDH_sha1kdf_scheme:
  18993. return dhSinglePass_stdDH_sha1kdf_scheme;
  18994. #endif
  18995. #ifdef WOLFSSL_SHA224
  18996. case dhSinglePass_stdDH_sha224kdf_scheme:
  18997. return dhSinglePass_stdDH_sha224kdf_scheme;
  18998. #endif
  18999. #ifndef NO_SHA256
  19000. case dhSinglePass_stdDH_sha256kdf_scheme:
  19001. return dhSinglePass_stdDH_sha256kdf_scheme;
  19002. #endif
  19003. #ifdef WOLFSSL_SHA384
  19004. case dhSinglePass_stdDH_sha384kdf_scheme:
  19005. return dhSinglePass_stdDH_sha384kdf_scheme;
  19006. #endif
  19007. #ifdef WOLFSSL_SHA512
  19008. case dhSinglePass_stdDH_sha512kdf_scheme:
  19009. return dhSinglePass_stdDH_sha512kdf_scheme;
  19010. #endif
  19011. }
  19012. break;
  19013. /* oidCmsKeyAgreeType */
  19014. #ifdef WOLFSSL_CERT_REQ
  19015. case oidCsrAttrType:
  19016. switch (nid) {
  19017. case NID_pkcs9_contentType:
  19018. return PKCS9_CONTENT_TYPE_OID;
  19019. case NID_pkcs9_challengePassword:
  19020. return CHALLENGE_PASSWORD_OID;
  19021. case NID_serialNumber:
  19022. return SERIAL_NUMBER_OID;
  19023. case NID_userId:
  19024. return USER_ID_OID;
  19025. case NID_surname:
  19026. return SURNAME_OID;
  19027. }
  19028. break;
  19029. #endif
  19030. default:
  19031. WOLFSSL_MSG("NID not in table");
  19032. /* MSVC warns without the cast */
  19033. return (word32)-1;
  19034. }
  19035. /* MSVC warns without the cast */
  19036. return (word32)-1;
  19037. }
  19038. int oid2nid(word32 oid, int grp)
  19039. {
  19040. size_t i;
  19041. /* get OID type */
  19042. switch (grp) {
  19043. /* oidHashType */
  19044. case oidHashType:
  19045. switch (oid) {
  19046. #ifdef WOLFSSL_MD2
  19047. case MD2h:
  19048. return NID_md2;
  19049. #endif
  19050. #ifndef NO_MD5
  19051. case MD5h:
  19052. return NID_md5;
  19053. #endif
  19054. #ifndef NO_SHA
  19055. case SHAh:
  19056. return NID_sha1;
  19057. #endif
  19058. case SHA224h:
  19059. return NID_sha224;
  19060. #ifndef NO_SHA256
  19061. case SHA256h:
  19062. return NID_sha256;
  19063. #endif
  19064. #ifdef WOLFSSL_SHA384
  19065. case SHA384h:
  19066. return NID_sha384;
  19067. #endif
  19068. #ifdef WOLFSSL_SHA512
  19069. case SHA512h:
  19070. return NID_sha512;
  19071. #endif
  19072. }
  19073. break;
  19074. /* oidSigType */
  19075. case oidSigType:
  19076. switch (oid) {
  19077. #ifndef NO_DSA
  19078. case CTC_SHAwDSA:
  19079. return NID_dsaWithSHA1;
  19080. case CTC_SHA256wDSA:
  19081. return NID_dsa_with_SHA256;
  19082. #endif /* NO_DSA */
  19083. #ifndef NO_RSA
  19084. case CTC_MD2wRSA:
  19085. return NID_md2WithRSAEncryption;
  19086. case CTC_MD5wRSA:
  19087. return NID_md5WithRSAEncryption;
  19088. case CTC_SHAwRSA:
  19089. return NID_sha1WithRSAEncryption;
  19090. case CTC_SHA224wRSA:
  19091. return NID_sha224WithRSAEncryption;
  19092. case CTC_SHA256wRSA:
  19093. return NID_sha256WithRSAEncryption;
  19094. case CTC_SHA384wRSA:
  19095. return NID_sha384WithRSAEncryption;
  19096. case CTC_SHA512wRSA:
  19097. return NID_sha512WithRSAEncryption;
  19098. #ifdef WOLFSSL_SHA3
  19099. case CTC_SHA3_224wRSA:
  19100. return NID_RSA_SHA3_224;
  19101. case CTC_SHA3_256wRSA:
  19102. return NID_RSA_SHA3_256;
  19103. case CTC_SHA3_384wRSA:
  19104. return NID_RSA_SHA3_384;
  19105. case CTC_SHA3_512wRSA:
  19106. return NID_RSA_SHA3_512;
  19107. #endif
  19108. #ifdef WC_RSA_PSS
  19109. case CTC_RSASSAPSS:
  19110. return NID_rsassaPss;
  19111. #endif
  19112. #endif /* NO_RSA */
  19113. #ifdef HAVE_ECC
  19114. case CTC_SHAwECDSA:
  19115. return NID_ecdsa_with_SHA1;
  19116. case CTC_SHA224wECDSA:
  19117. return NID_ecdsa_with_SHA224;
  19118. case CTC_SHA256wECDSA:
  19119. return NID_ecdsa_with_SHA256;
  19120. case CTC_SHA384wECDSA:
  19121. return NID_ecdsa_with_SHA384;
  19122. case CTC_SHA512wECDSA:
  19123. return NID_ecdsa_with_SHA512;
  19124. #ifdef WOLFSSL_SHA3
  19125. case CTC_SHA3_224wECDSA:
  19126. return NID_ecdsa_with_SHA3_224;
  19127. case CTC_SHA3_256wECDSA:
  19128. return NID_ecdsa_with_SHA3_256;
  19129. case CTC_SHA3_384wECDSA:
  19130. return NID_ecdsa_with_SHA3_384;
  19131. case CTC_SHA3_512wECDSA:
  19132. return NID_ecdsa_with_SHA3_512;
  19133. #endif
  19134. #endif /* HAVE_ECC */
  19135. }
  19136. break;
  19137. /* oidKeyType */
  19138. case oidKeyType:
  19139. switch (oid) {
  19140. #ifndef NO_DSA
  19141. case DSAk:
  19142. return NID_dsa;
  19143. #endif /* NO_DSA */
  19144. #ifndef NO_RSA
  19145. case RSAk:
  19146. return NID_rsaEncryption;
  19147. #ifdef WC_RSA_PSS
  19148. case RSAPSSk:
  19149. return NID_rsassaPss;
  19150. #endif
  19151. #endif /* NO_RSA */
  19152. #ifdef HAVE_ECC
  19153. case ECDSAk:
  19154. return NID_X9_62_id_ecPublicKey;
  19155. #endif /* HAVE_ECC */
  19156. }
  19157. break;
  19158. #ifdef HAVE_ECC
  19159. case oidCurveType:
  19160. switch (oid) {
  19161. case ECC_SECP192R1_OID:
  19162. return NID_X9_62_prime192v1;
  19163. case ECC_PRIME192V2_OID:
  19164. return NID_X9_62_prime192v2;
  19165. case ECC_PRIME192V3_OID:
  19166. return NID_X9_62_prime192v3;
  19167. case ECC_PRIME239V1_OID:
  19168. return NID_X9_62_prime239v1;
  19169. case ECC_PRIME239V2_OID:
  19170. return NID_X9_62_prime239v2;
  19171. case ECC_PRIME239V3_OID:
  19172. return NID_X9_62_prime239v3;
  19173. case ECC_SECP256R1_OID:
  19174. return NID_X9_62_prime256v1;
  19175. case ECC_SECP112R1_OID:
  19176. return NID_secp112r1;
  19177. case ECC_SECP112R2_OID:
  19178. return NID_secp112r2;
  19179. case ECC_SECP128R1_OID:
  19180. return NID_secp128r1;
  19181. case ECC_SECP128R2_OID:
  19182. return NID_secp128r2;
  19183. case ECC_SECP160R1_OID:
  19184. return NID_secp160r1;
  19185. case ECC_SECP160R2_OID:
  19186. return NID_secp160r2;
  19187. case ECC_SECP224R1_OID:
  19188. return NID_secp224r1;
  19189. case ECC_SECP384R1_OID:
  19190. return NID_secp384r1;
  19191. case ECC_SECP521R1_OID:
  19192. return NID_secp521r1;
  19193. case ECC_SECP160K1_OID:
  19194. return NID_secp160k1;
  19195. case ECC_SECP192K1_OID:
  19196. return NID_secp192k1;
  19197. case ECC_SECP224K1_OID:
  19198. return NID_secp224k1;
  19199. case ECC_SECP256K1_OID:
  19200. return NID_secp256k1;
  19201. case ECC_BRAINPOOLP160R1_OID:
  19202. return NID_brainpoolP160r1;
  19203. case ECC_BRAINPOOLP192R1_OID:
  19204. return NID_brainpoolP192r1;
  19205. case ECC_BRAINPOOLP224R1_OID:
  19206. return NID_brainpoolP224r1;
  19207. case ECC_BRAINPOOLP256R1_OID:
  19208. return NID_brainpoolP256r1;
  19209. case ECC_BRAINPOOLP320R1_OID:
  19210. return NID_brainpoolP320r1;
  19211. case ECC_BRAINPOOLP384R1_OID:
  19212. return NID_brainpoolP384r1;
  19213. case ECC_BRAINPOOLP512R1_OID:
  19214. return NID_brainpoolP512r1;
  19215. }
  19216. break;
  19217. #endif /* HAVE_ECC */
  19218. /* oidBlkType */
  19219. case oidBlkType:
  19220. switch (oid) {
  19221. #ifdef WOLFSSL_AES_128
  19222. case AES128CBCb:
  19223. return AES128CBCb;
  19224. #endif
  19225. #ifdef WOLFSSL_AES_192
  19226. case AES192CBCb:
  19227. return AES192CBCb;
  19228. #endif
  19229. #ifdef WOLFSSL_AES_256
  19230. case AES256CBCb:
  19231. return AES256CBCb;
  19232. #endif
  19233. #ifndef NO_DES3
  19234. case DESb:
  19235. return NID_des;
  19236. case DES3b:
  19237. return NID_des3;
  19238. #endif
  19239. }
  19240. break;
  19241. #ifdef HAVE_OCSP
  19242. case oidOcspType:
  19243. switch (oid) {
  19244. case OCSP_BASIC_OID:
  19245. return NID_id_pkix_OCSP_basic;
  19246. case OCSP_NONCE_OID:
  19247. return OCSP_NONCE_OID;
  19248. }
  19249. break;
  19250. #endif /* HAVE_OCSP */
  19251. /* oidCertExtType */
  19252. case oidCertExtType:
  19253. switch (oid) {
  19254. case BASIC_CA_OID:
  19255. return NID_basic_constraints;
  19256. case ALT_NAMES_OID:
  19257. return NID_subject_alt_name;
  19258. case CRL_DIST_OID:
  19259. return NID_crl_distribution_points;
  19260. case AUTH_INFO_OID:
  19261. return NID_info_access;
  19262. case AUTH_KEY_OID:
  19263. return NID_authority_key_identifier;
  19264. case SUBJ_KEY_OID:
  19265. return NID_subject_key_identifier;
  19266. case INHIBIT_ANY_OID:
  19267. return NID_inhibit_any_policy;
  19268. case KEY_USAGE_OID:
  19269. return NID_key_usage;
  19270. case NAME_CONS_OID:
  19271. return NID_name_constraints;
  19272. case CERT_POLICY_OID:
  19273. return NID_certificate_policies;
  19274. case EXT_KEY_USAGE_OID:
  19275. return NID_ext_key_usage;
  19276. }
  19277. break;
  19278. /* oidCertAuthInfoType */
  19279. case oidCertAuthInfoType:
  19280. switch (oid) {
  19281. case AIA_OCSP_OID:
  19282. return NID_ad_OCSP;
  19283. case AIA_CA_ISSUER_OID:
  19284. return NID_ad_ca_issuers;
  19285. }
  19286. break;
  19287. /* oidCertPolicyType */
  19288. case oidCertPolicyType:
  19289. switch (oid) {
  19290. case CP_ANY_OID:
  19291. return NID_any_policy;
  19292. }
  19293. break;
  19294. /* oidCertAltNameType */
  19295. case oidCertAltNameType:
  19296. switch (oid) {
  19297. case HW_NAME_OID:
  19298. return NID_hw_name_oid;
  19299. }
  19300. break;
  19301. /* oidCertKeyUseType */
  19302. case oidCertKeyUseType:
  19303. switch (oid) {
  19304. case EKU_ANY_OID:
  19305. return NID_anyExtendedKeyUsage;
  19306. case EKU_SERVER_AUTH_OID:
  19307. return EKU_SERVER_AUTH_OID;
  19308. case EKU_CLIENT_AUTH_OID:
  19309. return EKU_CLIENT_AUTH_OID;
  19310. case EKU_OCSP_SIGN_OID:
  19311. return EKU_OCSP_SIGN_OID;
  19312. }
  19313. break;
  19314. /* oidKdfType */
  19315. case oidKdfType:
  19316. switch (oid) {
  19317. case PBKDF2_OID:
  19318. return PBKDF2_OID;
  19319. }
  19320. break;
  19321. /* oidPBEType */
  19322. case oidPBEType:
  19323. switch (oid) {
  19324. case PBE_SHA1_RC4_128:
  19325. return PBE_SHA1_RC4_128;
  19326. case PBE_SHA1_DES:
  19327. return PBE_SHA1_DES;
  19328. case PBE_SHA1_DES3:
  19329. return PBE_SHA1_DES3;
  19330. }
  19331. break;
  19332. /* oidKeyWrapType */
  19333. case oidKeyWrapType:
  19334. switch (oid) {
  19335. #ifdef WOLFSSL_AES_128
  19336. case AES128_WRAP:
  19337. return AES128_WRAP;
  19338. #endif
  19339. #ifdef WOLFSSL_AES_192
  19340. case AES192_WRAP:
  19341. return AES192_WRAP;
  19342. #endif
  19343. #ifdef WOLFSSL_AES_256
  19344. case AES256_WRAP:
  19345. return AES256_WRAP;
  19346. #endif
  19347. }
  19348. break;
  19349. /* oidCmsKeyAgreeType */
  19350. case oidCmsKeyAgreeType:
  19351. switch (oid) {
  19352. #ifndef NO_SHA
  19353. case dhSinglePass_stdDH_sha1kdf_scheme:
  19354. return dhSinglePass_stdDH_sha1kdf_scheme;
  19355. #endif
  19356. #ifdef WOLFSSL_SHA224
  19357. case dhSinglePass_stdDH_sha224kdf_scheme:
  19358. return dhSinglePass_stdDH_sha224kdf_scheme;
  19359. #endif
  19360. #ifndef NO_SHA256
  19361. case dhSinglePass_stdDH_sha256kdf_scheme:
  19362. return dhSinglePass_stdDH_sha256kdf_scheme;
  19363. #endif
  19364. #ifdef WOLFSSL_SHA384
  19365. case dhSinglePass_stdDH_sha384kdf_scheme:
  19366. return dhSinglePass_stdDH_sha384kdf_scheme;
  19367. #endif
  19368. #ifdef WOLFSSL_SHA512
  19369. case dhSinglePass_stdDH_sha512kdf_scheme:
  19370. return dhSinglePass_stdDH_sha512kdf_scheme;
  19371. #endif
  19372. }
  19373. break;
  19374. #ifdef WOLFSSL_CERT_REQ
  19375. case oidCsrAttrType:
  19376. switch (oid) {
  19377. case PKCS9_CONTENT_TYPE_OID:
  19378. return NID_pkcs9_contentType;
  19379. case CHALLENGE_PASSWORD_OID:
  19380. return NID_pkcs9_challengePassword;
  19381. case SERIAL_NUMBER_OID:
  19382. return NID_serialNumber;
  19383. case USER_ID_OID:
  19384. return NID_userId;
  19385. }
  19386. break;
  19387. #endif
  19388. default:
  19389. WOLFSSL_MSG("OID not in table");
  19390. }
  19391. /* If not found in above switch then try the table */
  19392. for (i = 0; i < WOLFSSL_OBJECT_INFO_SZ; i++) {
  19393. if (wolfssl_object_info[i].id == (int)oid) {
  19394. return wolfssl_object_info[i].nid;
  19395. }
  19396. }
  19397. return -1;
  19398. }
  19399. /* frees all nodes in the current threads error queue
  19400. *
  19401. * id thread id. ERR_remove_state is depreciated and id is ignored. The
  19402. * current threads queue will be free'd.
  19403. */
  19404. void wolfSSL_ERR_remove_state(unsigned long id)
  19405. {
  19406. WOLFSSL_ENTER("wolfSSL_ERR_remove_state");
  19407. (void)id;
  19408. if (wc_ERR_remove_state() != 0) {
  19409. WOLFSSL_MSG("Error with removing the state");
  19410. }
  19411. }
  19412. #endif /* OPENSSL_EXTRA */
  19413. #ifdef OPENSSL_ALL
  19414. #if !defined(NO_BIO) && !defined(NO_PWDBASED) && defined(HAVE_PKCS8)
  19415. static int bio_get_data(WOLFSSL_BIO* bio, byte** data)
  19416. {
  19417. int ret = 0;
  19418. byte* mem = NULL;
  19419. ret = wolfSSL_BIO_get_len(bio);
  19420. if (ret > 0) {
  19421. mem = (byte*)XMALLOC(ret, bio->heap, DYNAMIC_TYPE_OPENSSL);
  19422. if (mem == NULL) {
  19423. WOLFSSL_MSG("Memory error");
  19424. ret = MEMORY_E;
  19425. }
  19426. if (ret >= 0) {
  19427. if ((ret = wolfSSL_BIO_read(bio, mem, ret)) <= 0) {
  19428. XFREE(mem, bio->heap, DYNAMIC_TYPE_OPENSSL);
  19429. ret = MEMORY_E;
  19430. mem = NULL;
  19431. }
  19432. }
  19433. }
  19434. *data = mem;
  19435. return ret;
  19436. }
  19437. /* DER data is PKCS#8 encrypted. */
  19438. WOLFSSL_EVP_PKEY* wolfSSL_d2i_PKCS8PrivateKey_bio(WOLFSSL_BIO* bio,
  19439. WOLFSSL_EVP_PKEY** pkey,
  19440. wc_pem_password_cb* cb,
  19441. void* ctx)
  19442. {
  19443. int ret;
  19444. byte* der;
  19445. int len;
  19446. byte* p;
  19447. word32 algId;
  19448. WOLFSSL_EVP_PKEY* key;
  19449. if ((len = bio_get_data(bio, &der)) < 0)
  19450. return NULL;
  19451. if (cb != NULL) {
  19452. char password[NAME_SZ];
  19453. int passwordSz = cb(password, sizeof(password), PEM_PASS_READ, ctx);
  19454. if (passwordSz < 0) {
  19455. XFREE(der, bio->heap, DYNAMIC_TYPE_OPENSSL);
  19456. return NULL;
  19457. }
  19458. #ifdef WOLFSSL_CHECK_MEM_ZERO
  19459. wc_MemZero_Add("wolfSSL_d2i_PKCS8PrivateKey_bio password", password,
  19460. passwordSz);
  19461. #endif
  19462. ret = ToTraditionalEnc(der, len, password, passwordSz, &algId);
  19463. if (ret < 0) {
  19464. XFREE(der, bio->heap, DYNAMIC_TYPE_OPENSSL);
  19465. return NULL;
  19466. }
  19467. ForceZero(password, passwordSz);
  19468. #ifdef WOLFSSL_CHECK_MEM_ZERO
  19469. wc_MemZero_Check(password, passwordSz);
  19470. #endif
  19471. }
  19472. p = der;
  19473. key = wolfSSL_d2i_PrivateKey_EVP(pkey, &p, len);
  19474. XFREE(der, bio->heap, DYNAMIC_TYPE_OPENSSL);
  19475. return key;
  19476. }
  19477. #endif /* !NO_BIO && !NO_PWDBASED && HAVE_PKCS8 */
  19478. /* Detect which type of key it is before decoding. */
  19479. WOLFSSL_EVP_PKEY* wolfSSL_d2i_AutoPrivateKey(WOLFSSL_EVP_PKEY** pkey,
  19480. const unsigned char** pp,
  19481. long length)
  19482. {
  19483. int ret;
  19484. WOLFSSL_EVP_PKEY* key = NULL;
  19485. const byte* der = *pp;
  19486. word32 idx = 0;
  19487. int len = 0;
  19488. int cnt = 0;
  19489. word32 algId;
  19490. word32 keyLen = (word32)length;
  19491. /* Take off PKCS#8 wrapper if found. */
  19492. if ((len = ToTraditionalInline_ex(der, &idx, keyLen, &algId)) >= 0) {
  19493. der += idx;
  19494. keyLen = len;
  19495. }
  19496. idx = 0;
  19497. len = 0;
  19498. /* Use the number of elements in the outer sequence to determine key type.
  19499. */
  19500. ret = GetSequence(der, &idx, &len, keyLen);
  19501. if (ret >= 0) {
  19502. word32 end = idx + len;
  19503. while (ret >= 0 && idx < end) {
  19504. /* Skip type */
  19505. idx++;
  19506. /* Get length and skip over - keeping count */
  19507. len = 0;
  19508. ret = GetLength(der, &idx, &len, keyLen);
  19509. if (ret >= 0) {
  19510. if (idx + len > end)
  19511. ret = ASN_PARSE_E;
  19512. else {
  19513. idx += len;
  19514. cnt++;
  19515. }
  19516. }
  19517. }
  19518. }
  19519. if (ret >= 0) {
  19520. int type;
  19521. /* ECC includes version, private[, curve][, public key] */
  19522. if (cnt >= 2 && cnt <= 4)
  19523. type = EVP_PKEY_EC;
  19524. else
  19525. type = EVP_PKEY_RSA;
  19526. key = wolfSSL_d2i_PrivateKey(type, pkey, &der, keyLen);
  19527. *pp = der;
  19528. }
  19529. return key;
  19530. }
  19531. #endif /* OPENSSL_ALL */
  19532. #ifdef WOLFSSL_STATIC_EPHEMERAL
  19533. int wolfSSL_StaticEphemeralKeyLoad(WOLFSSL* ssl, int keyAlgo, void* keyPtr)
  19534. {
  19535. int ret;
  19536. word32 idx = 0;
  19537. DerBuffer* der = NULL;
  19538. if (ssl == NULL || ssl->ctx == NULL || keyPtr == NULL) {
  19539. return BAD_FUNC_ARG;
  19540. }
  19541. #ifndef SINGLE_THREADED
  19542. if (!ssl->ctx->staticKELockInit) {
  19543. return BUFFER_E; /* no keys set */
  19544. }
  19545. ret = wc_LockMutex(&ssl->ctx->staticKELock);
  19546. if (ret != 0) {
  19547. return ret;
  19548. }
  19549. #endif
  19550. ret = BUFFER_E; /* set default error */
  19551. switch (keyAlgo) {
  19552. #ifndef NO_DH
  19553. case WC_PK_TYPE_DH:
  19554. if (ssl != NULL)
  19555. der = ssl->staticKE.dhKey;
  19556. if (der == NULL)
  19557. der = ssl->ctx->staticKE.dhKey;
  19558. if (der != NULL) {
  19559. DhKey* key = (DhKey*)keyPtr;
  19560. WOLFSSL_MSG("Using static DH key");
  19561. ret = wc_DhKeyDecode(der->buffer, &idx, key, der->length);
  19562. }
  19563. break;
  19564. #endif
  19565. #ifdef HAVE_ECC
  19566. case WC_PK_TYPE_ECDH:
  19567. if (ssl != NULL)
  19568. der = ssl->staticKE.ecKey;
  19569. if (der == NULL)
  19570. der = ssl->ctx->staticKE.ecKey;
  19571. if (der != NULL) {
  19572. ecc_key* key = (ecc_key*)keyPtr;
  19573. WOLFSSL_MSG("Using static ECDH key");
  19574. ret = wc_EccPrivateKeyDecode(der->buffer, &idx, key,
  19575. der->length);
  19576. }
  19577. break;
  19578. #endif
  19579. #ifdef HAVE_CURVE25519
  19580. case WC_PK_TYPE_CURVE25519:
  19581. if (ssl != NULL)
  19582. der = ssl->staticKE.x25519Key;
  19583. if (der == NULL)
  19584. der = ssl->ctx->staticKE.x25519Key;
  19585. if (der != NULL) {
  19586. curve25519_key* key = (curve25519_key*)keyPtr;
  19587. WOLFSSL_MSG("Using static X25519 key");
  19588. ret = wc_Curve25519PrivateKeyDecode(der->buffer, &idx, key,
  19589. der->length);
  19590. }
  19591. break;
  19592. #endif
  19593. #ifdef HAVE_CURVE448
  19594. case WC_PK_TYPE_CURVE448:
  19595. if (ssl != NULL)
  19596. der = ssl->staticKE.x448Key;
  19597. if (der == NULL)
  19598. der = ssl->ctx->staticKE.x448Key;
  19599. if (der != NULL) {
  19600. curve448_key* key = (curve448_key*)keyPtr;
  19601. WOLFSSL_MSG("Using static X448 key");
  19602. ret = wc_Curve448PrivateKeyDecode(der->buffer, &idx, key,
  19603. der->length);
  19604. }
  19605. break;
  19606. #endif
  19607. default:
  19608. /* not supported */
  19609. ret = NOT_COMPILED_IN;
  19610. break;
  19611. }
  19612. #ifndef SINGLE_THREADED
  19613. wc_UnLockMutex(&ssl->ctx->staticKELock);
  19614. #endif
  19615. return ret;
  19616. }
  19617. static int SetStaticEphemeralKey(WOLFSSL_CTX* ctx,
  19618. StaticKeyExchangeInfo_t* staticKE, int keyAlgo, const char* key,
  19619. unsigned int keySz, int format, void* heap)
  19620. {
  19621. int ret = 0;
  19622. DerBuffer* der = NULL;
  19623. byte* keyBuf = NULL;
  19624. #ifndef NO_FILESYSTEM
  19625. const char* keyFile = NULL;
  19626. #endif
  19627. /* allow empty key to free buffer */
  19628. if (staticKE == NULL || (key == NULL && keySz > 0)) {
  19629. return BAD_FUNC_ARG;
  19630. }
  19631. WOLFSSL_ENTER("SetStaticEphemeralKey");
  19632. /* if just free'ing key then skip loading */
  19633. if (key != NULL) {
  19634. #ifndef NO_FILESYSTEM
  19635. /* load file from filesystem */
  19636. if (key != NULL && keySz == 0) {
  19637. size_t keyBufSz = 0;
  19638. keyFile = (const char*)key;
  19639. ret = wc_FileLoad(keyFile, &keyBuf, &keyBufSz, heap);
  19640. if (ret != 0) {
  19641. return ret;
  19642. }
  19643. keySz = (unsigned int)keyBufSz;
  19644. }
  19645. else
  19646. #endif
  19647. {
  19648. /* use as key buffer directly */
  19649. keyBuf = (byte*)key;
  19650. }
  19651. if (format == WOLFSSL_FILETYPE_PEM) {
  19652. #ifdef WOLFSSL_PEM_TO_DER
  19653. int keyFormat = 0;
  19654. ret = PemToDer(keyBuf, keySz, PRIVATEKEY_TYPE, &der,
  19655. heap, NULL, &keyFormat);
  19656. /* auto detect key type */
  19657. if (ret == 0 && keyAlgo == WC_PK_TYPE_NONE) {
  19658. if (keyFormat == ECDSAk)
  19659. keyAlgo = WC_PK_TYPE_ECDH;
  19660. else if (keyFormat == X25519k)
  19661. keyAlgo = WC_PK_TYPE_CURVE25519;
  19662. else
  19663. keyAlgo = WC_PK_TYPE_DH;
  19664. }
  19665. #else
  19666. ret = NOT_COMPILED_IN;
  19667. #endif
  19668. }
  19669. else {
  19670. /* Detect PK type (if required) */
  19671. #ifdef HAVE_ECC
  19672. if (keyAlgo == WC_PK_TYPE_NONE) {
  19673. word32 idx = 0;
  19674. ecc_key eccKey;
  19675. ret = wc_ecc_init_ex(&eccKey, heap, INVALID_DEVID);
  19676. if (ret == 0) {
  19677. ret = wc_EccPrivateKeyDecode(keyBuf, &idx, &eccKey, keySz);
  19678. if (ret == 0)
  19679. keyAlgo = WC_PK_TYPE_ECDH;
  19680. wc_ecc_free(&eccKey);
  19681. }
  19682. }
  19683. #endif
  19684. #if !defined(NO_DH) && defined(WOLFSSL_DH_EXTRA)
  19685. if (keyAlgo == WC_PK_TYPE_NONE) {
  19686. word32 idx = 0;
  19687. DhKey dhKey;
  19688. ret = wc_InitDhKey_ex(&dhKey, heap, INVALID_DEVID);
  19689. if (ret == 0) {
  19690. ret = wc_DhKeyDecode(keyBuf, &idx, &dhKey, keySz);
  19691. if (ret == 0)
  19692. keyAlgo = WC_PK_TYPE_DH;
  19693. wc_FreeDhKey(&dhKey);
  19694. }
  19695. }
  19696. #endif
  19697. #ifdef HAVE_CURVE25519
  19698. if (keyAlgo == WC_PK_TYPE_NONE) {
  19699. word32 idx = 0;
  19700. curve25519_key x25519Key;
  19701. ret = wc_curve25519_init_ex(&x25519Key, heap, INVALID_DEVID);
  19702. if (ret == 0) {
  19703. ret = wc_Curve25519PrivateKeyDecode(keyBuf, &idx,
  19704. &x25519Key, keySz);
  19705. if (ret == 0)
  19706. keyAlgo = WC_PK_TYPE_CURVE25519;
  19707. wc_curve25519_free(&x25519Key);
  19708. }
  19709. }
  19710. #endif
  19711. #ifdef HAVE_CURVE448
  19712. if (keyAlgo == WC_PK_TYPE_NONE) {
  19713. word32 idx = 0;
  19714. curve448_key x448Key;
  19715. ret = wc_curve448_init(&x448Key);
  19716. if (ret == 0) {
  19717. ret = wc_Curve448PrivateKeyDecode(keyBuf, &idx, &x448Key,
  19718. keySz);
  19719. if (ret == 0)
  19720. keyAlgo = WC_PK_TYPE_CURVE448;
  19721. wc_curve448_free(&x448Key);
  19722. }
  19723. }
  19724. #endif
  19725. if (keyAlgo != WC_PK_TYPE_NONE) {
  19726. ret = AllocDer(&der, keySz, PRIVATEKEY_TYPE, heap);
  19727. if (ret == 0) {
  19728. XMEMCPY(der->buffer, keyBuf, keySz);
  19729. }
  19730. }
  19731. }
  19732. }
  19733. #ifndef NO_FILESYSTEM
  19734. /* done with keyFile buffer */
  19735. if (keyFile && keyBuf) {
  19736. XFREE(keyBuf, heap, DYNAMIC_TYPE_TMP_BUFFER);
  19737. }
  19738. #endif
  19739. #ifndef SINGLE_THREADED
  19740. if (ret == 0 && !ctx->staticKELockInit) {
  19741. ret = wc_InitMutex(&ctx->staticKELock);
  19742. if (ret == 0) {
  19743. ctx->staticKELockInit = 1;
  19744. }
  19745. }
  19746. #endif
  19747. if (ret == 0
  19748. #ifndef SINGLE_THREADED
  19749. && (ret = wc_LockMutex(&ctx->staticKELock)) == 0
  19750. #endif
  19751. ) {
  19752. switch (keyAlgo) {
  19753. #ifndef NO_DH
  19754. case WC_PK_TYPE_DH:
  19755. FreeDer(&staticKE->dhKey);
  19756. staticKE->dhKey = der; der = NULL;
  19757. break;
  19758. #endif
  19759. #ifdef HAVE_ECC
  19760. case WC_PK_TYPE_ECDH:
  19761. FreeDer(&staticKE->ecKey);
  19762. staticKE->ecKey = der; der = NULL;
  19763. break;
  19764. #endif
  19765. #ifdef HAVE_CURVE25519
  19766. case WC_PK_TYPE_CURVE25519:
  19767. FreeDer(&staticKE->x25519Key);
  19768. staticKE->x25519Key = der; der = NULL;
  19769. break;
  19770. #endif
  19771. #ifdef HAVE_CURVE448
  19772. case WC_PK_TYPE_CURVE448:
  19773. FreeDer(&staticKE->x448Key);
  19774. staticKE->x448Key = der; der = NULL;
  19775. break;
  19776. #endif
  19777. default:
  19778. /* not supported */
  19779. ret = NOT_COMPILED_IN;
  19780. break;
  19781. }
  19782. #ifndef SINGLE_THREADED
  19783. wc_UnLockMutex(&ctx->staticKELock);
  19784. #endif
  19785. }
  19786. if (ret != 0) {
  19787. FreeDer(&der);
  19788. }
  19789. (void)ctx; /* not used for single threaded */
  19790. WOLFSSL_LEAVE("SetStaticEphemeralKey", ret);
  19791. return ret;
  19792. }
  19793. int wolfSSL_CTX_set_ephemeral_key(WOLFSSL_CTX* ctx, int keyAlgo,
  19794. const char* key, unsigned int keySz, int format)
  19795. {
  19796. if (ctx == NULL) {
  19797. return BAD_FUNC_ARG;
  19798. }
  19799. return SetStaticEphemeralKey(ctx, &ctx->staticKE, keyAlgo,
  19800. key, keySz, format, ctx->heap);
  19801. }
  19802. int wolfSSL_set_ephemeral_key(WOLFSSL* ssl, int keyAlgo,
  19803. const char* key, unsigned int keySz, int format)
  19804. {
  19805. if (ssl == NULL || ssl->ctx == NULL) {
  19806. return BAD_FUNC_ARG;
  19807. }
  19808. return SetStaticEphemeralKey(ssl->ctx, &ssl->staticKE, keyAlgo,
  19809. key, keySz, format, ssl->heap);
  19810. }
  19811. static int GetStaticEphemeralKey(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
  19812. int keyAlgo, const unsigned char** key, unsigned int* keySz)
  19813. {
  19814. int ret = 0;
  19815. DerBuffer* der = NULL;
  19816. if (key) *key = NULL;
  19817. if (keySz) *keySz = 0;
  19818. #ifndef SINGLE_THREADED
  19819. if (ctx->staticKELockInit &&
  19820. (ret = wc_LockMutex(&ctx->staticKELock)) != 0) {
  19821. return ret;
  19822. }
  19823. #endif
  19824. switch (keyAlgo) {
  19825. #ifndef NO_DH
  19826. case WC_PK_TYPE_DH:
  19827. if (ssl != NULL)
  19828. der = ssl->staticKE.dhKey;
  19829. if (der == NULL)
  19830. der = ctx->staticKE.dhKey;
  19831. break;
  19832. #endif
  19833. #ifdef HAVE_ECC
  19834. case WC_PK_TYPE_ECDH:
  19835. if (ssl != NULL)
  19836. der = ssl->staticKE.ecKey;
  19837. if (der == NULL)
  19838. der = ctx->staticKE.ecKey;
  19839. break;
  19840. #endif
  19841. #ifdef HAVE_CURVE25519
  19842. case WC_PK_TYPE_CURVE25519:
  19843. if (ssl != NULL)
  19844. der = ssl->staticKE.x25519Key;
  19845. if (der == NULL)
  19846. der = ctx->staticKE.x25519Key;
  19847. break;
  19848. #endif
  19849. #ifdef HAVE_CURVE448
  19850. case WC_PK_TYPE_CURVE448:
  19851. if (ssl != NULL)
  19852. der = ssl->staticKE.x448Key;
  19853. if (der == NULL)
  19854. der = ctx->staticKE.x448Key;
  19855. break;
  19856. #endif
  19857. default:
  19858. /* not supported */
  19859. ret = NOT_COMPILED_IN;
  19860. break;
  19861. }
  19862. if (der) {
  19863. if (key)
  19864. *key = der->buffer;
  19865. if (keySz)
  19866. *keySz = der->length;
  19867. }
  19868. #ifndef SINGLE_THREADED
  19869. wc_UnLockMutex(&ctx->staticKELock);
  19870. #endif
  19871. return ret;
  19872. }
  19873. /* returns pointer to currently loaded static ephemeral as ASN.1 */
  19874. /* this can be converted to PEM using wc_DerToPem */
  19875. int wolfSSL_CTX_get_ephemeral_key(WOLFSSL_CTX* ctx, int keyAlgo,
  19876. const unsigned char** key, unsigned int* keySz)
  19877. {
  19878. if (ctx == NULL) {
  19879. return BAD_FUNC_ARG;
  19880. }
  19881. return GetStaticEphemeralKey(ctx, NULL, keyAlgo, key, keySz);
  19882. }
  19883. int wolfSSL_get_ephemeral_key(WOLFSSL* ssl, int keyAlgo,
  19884. const unsigned char** key, unsigned int* keySz)
  19885. {
  19886. if (ssl == NULL || ssl->ctx == NULL) {
  19887. return BAD_FUNC_ARG;
  19888. }
  19889. return GetStaticEphemeralKey(ssl->ctx, ssl, keyAlgo, key, keySz);
  19890. }
  19891. #endif /* WOLFSSL_STATIC_EPHEMERAL */
  19892. #if defined(OPENSSL_EXTRA)
  19893. /* wolfSSL_THREADID_current is provided as a compat API with
  19894. * CRYPTO_THREADID_current to register current thread id into given id object.
  19895. * However, CRYPTO_THREADID_current API has been deprecated and no longer
  19896. * exists in the OpenSSL 1.0.0 or later.This API only works as a stub
  19897. * like as existing wolfSSL_THREADID_set_numeric.
  19898. */
  19899. void wolfSSL_THREADID_current(WOLFSSL_CRYPTO_THREADID* id)
  19900. {
  19901. (void)id;
  19902. return;
  19903. }
  19904. /* wolfSSL_THREADID_hash is provided as a compatible API with
  19905. * CRYPTO_THREADID_hash which returns a hash value calculated from the
  19906. * specified thread id. However, CRYPTO_THREADID_hash API has been
  19907. * deprecated and no longer exists in the OpenSSL 1.0.0 or later.
  19908. * This API only works as a stub to returns 0. This behavior is
  19909. * equivalent to the latest OpenSSL CRYPTO_THREADID_hash.
  19910. */
  19911. unsigned long wolfSSL_THREADID_hash(const WOLFSSL_CRYPTO_THREADID* id)
  19912. {
  19913. (void)id;
  19914. return 0UL;
  19915. }
  19916. /* wolfSSL_CTX_set_ecdh_auto is provided as compatible API with
  19917. * SSL_CTX_set_ecdh_auto to enable auto ecdh curve selection functionality.
  19918. * Since this functionality is enabled by default in wolfSSL,
  19919. * this API exists as a stub.
  19920. */
  19921. int wolfSSL_CTX_set_ecdh_auto(WOLFSSL_CTX* ctx, int onoff)
  19922. {
  19923. (void)ctx;
  19924. (void)onoff;
  19925. return WOLFSSL_SUCCESS;
  19926. }
  19927. /**
  19928. * set security level (wolfSSL doesn't support security level)
  19929. * @param ctx a pointer to WOLFSSL_EVP_PKEY_CTX structure
  19930. * @param level security level
  19931. */
  19932. void wolfSSL_CTX_set_security_level(WOLFSSL_CTX* ctx, int level)
  19933. {
  19934. WOLFSSL_ENTER("wolfSSL_CTX_set_security_level");
  19935. (void)ctx;
  19936. (void)level;
  19937. }
  19938. /**
  19939. * get security level (wolfSSL doesn't support security level)
  19940. * @param ctx a pointer to WOLFSSL_EVP_PKEY_CTX structure
  19941. * @return always 0(level 0)
  19942. */
  19943. int wolfSSL_CTX_get_security_level(const WOLFSSL_CTX* ctx)
  19944. {
  19945. WOLFSSL_ENTER("wolfSSL_CTX_get_security_level");
  19946. (void)ctx;
  19947. return 0;
  19948. }
  19949. #if defined(OPENSSL_EXTRA) && defined(HAVE_SECRET_CALLBACK)
  19950. /*
  19951. * This API accepts a user callback which puts key-log records into
  19952. * a KEY LOGFILE. The callback is stored into a CTX and propagated to
  19953. * each SSL object on its creation timing.
  19954. */
  19955. void wolfSSL_CTX_set_keylog_callback(WOLFSSL_CTX* ctx,
  19956. wolfSSL_CTX_keylog_cb_func cb)
  19957. {
  19958. WOLFSSL_ENTER("wolfSSL_CTX_set_keylog_callback");
  19959. /* stores the callback into WOLFSSL_CTX */
  19960. if (ctx != NULL) {
  19961. ctx->keyLogCb = cb;
  19962. }
  19963. }
  19964. wolfSSL_CTX_keylog_cb_func wolfSSL_CTX_get_keylog_callback(
  19965. const WOLFSSL_CTX* ctx)
  19966. {
  19967. WOLFSSL_ENTER("wolfSSL_CTX_get_keylog_callback");
  19968. if (ctx != NULL)
  19969. return ctx->keyLogCb;
  19970. else
  19971. return NULL;
  19972. }
  19973. #endif /* OPENSSL_EXTRA && HAVE_SECRET_CALLBACK */
  19974. #endif /* OPENSSL_EXTRA */
  19975. #ifndef NO_CERT
  19976. #define WOLFSSL_X509_INCLUDED
  19977. #include "src/x509.c"
  19978. #endif
  19979. /*******************************************************************************
  19980. * START OF standard C library wrapping APIs
  19981. ******************************************************************************/
  19982. #if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && \
  19983. (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  19984. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  19985. defined(WOLFSSL_OPENSSH)))
  19986. #ifndef NO_WOLFSSL_STUB
  19987. int wolfSSL_CRYPTO_set_mem_ex_functions(void *(*m) (size_t, const char *, int),
  19988. void *(*r) (void *, size_t, const char *,
  19989. int), void (*f) (void *))
  19990. {
  19991. (void) m;
  19992. (void) r;
  19993. (void) f;
  19994. WOLFSSL_ENTER("wolfSSL_CRYPTO_set_mem_ex_functions");
  19995. WOLFSSL_STUB("CRYPTO_set_mem_ex_functions");
  19996. return WOLFSSL_FAILURE;
  19997. }
  19998. #endif
  19999. #endif
  20000. #if defined(OPENSSL_EXTRA)
  20001. /**
  20002. * free allocated memory resource
  20003. * @param str a pointer to resource to be freed
  20004. * @param file dummy argument
  20005. * @param line dummy argument
  20006. */
  20007. void wolfSSL_CRYPTO_free(void *str, const char *file, int line)
  20008. {
  20009. (void)file;
  20010. (void)line;
  20011. XFREE(str, 0, DYNAMIC_TYPE_TMP_BUFFER);
  20012. }
  20013. /**
  20014. * allocate memory with size of num
  20015. * @param num size of memory allocation to be malloced
  20016. * @param file dummy argument
  20017. * @param line dummy argument
  20018. * @return a pointer to allocated memory on succssesful, otherwise NULL
  20019. */
  20020. void *wolfSSL_CRYPTO_malloc(size_t num, const char *file, int line)
  20021. {
  20022. (void)file;
  20023. (void)line;
  20024. return XMALLOC(num, 0, DYNAMIC_TYPE_TMP_BUFFER);
  20025. }
  20026. #endif
  20027. /*******************************************************************************
  20028. * END OF standard C library wrapping APIs
  20029. ******************************************************************************/
  20030. /*******************************************************************************
  20031. * START OF EX_DATA APIs
  20032. ******************************************************************************/
  20033. #if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && \
  20034. (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  20035. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  20036. defined(WOLFSSL_OPENSSH)))
  20037. void wolfSSL_CRYPTO_cleanup_all_ex_data(void){
  20038. WOLFSSL_ENTER("CRYPTO_cleanup_all_ex_data");
  20039. }
  20040. #endif
  20041. #ifdef HAVE_EX_DATA
  20042. void* wolfSSL_CRYPTO_get_ex_data(const WOLFSSL_CRYPTO_EX_DATA* ex_data, int idx)
  20043. {
  20044. WOLFSSL_ENTER("wolfSSL_CTX_get_ex_data");
  20045. #ifdef MAX_EX_DATA
  20046. if(ex_data && idx < MAX_EX_DATA && idx >= 0) {
  20047. return ex_data->ex_data[idx];
  20048. }
  20049. #else
  20050. (void)ex_data;
  20051. (void)idx;
  20052. #endif
  20053. return NULL;
  20054. }
  20055. int wolfSSL_CRYPTO_set_ex_data(WOLFSSL_CRYPTO_EX_DATA* ex_data, int idx,
  20056. void *data)
  20057. {
  20058. WOLFSSL_ENTER("wolfSSL_CRYPTO_set_ex_data");
  20059. #ifdef MAX_EX_DATA
  20060. if (ex_data && idx < MAX_EX_DATA && idx >= 0) {
  20061. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  20062. if (ex_data->ex_data_cleanup_routines[idx]) {
  20063. if (ex_data->ex_data[idx])
  20064. ex_data->ex_data_cleanup_routines[idx](ex_data->ex_data[idx]);
  20065. ex_data->ex_data_cleanup_routines[idx] = NULL;
  20066. }
  20067. #endif
  20068. ex_data->ex_data[idx] = data;
  20069. return WOLFSSL_SUCCESS;
  20070. }
  20071. #else
  20072. (void)ex_data;
  20073. (void)idx;
  20074. (void)data;
  20075. #endif
  20076. return WOLFSSL_FAILURE;
  20077. }
  20078. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  20079. int wolfSSL_CRYPTO_set_ex_data_with_cleanup(
  20080. WOLFSSL_CRYPTO_EX_DATA* ex_data,
  20081. int idx,
  20082. void *data,
  20083. wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
  20084. {
  20085. WOLFSSL_ENTER("wolfSSL_CRYPTO_set_ex_data_with_cleanup");
  20086. if (ex_data && idx < MAX_EX_DATA && idx >= 0) {
  20087. if (ex_data->ex_data_cleanup_routines[idx] && ex_data->ex_data[idx])
  20088. ex_data->ex_data_cleanup_routines[idx](ex_data->ex_data[idx]);
  20089. ex_data->ex_data[idx] = data;
  20090. ex_data->ex_data_cleanup_routines[idx] = cleanup_routine;
  20091. return WOLFSSL_SUCCESS;
  20092. }
  20093. return WOLFSSL_FAILURE;
  20094. }
  20095. #endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
  20096. /**
  20097. * Issues unique index for the class specified by class_index.
  20098. * Other parameter except class_index are ignored.
  20099. * Currently, following class_index are accepted:
  20100. * - WOLF_CRYPTO_EX_INDEX_SSL
  20101. * - WOLF_CRYPTO_EX_INDEX_SSL_CTX
  20102. * - WOLF_CRYPTO_EX_INDEX_X509
  20103. * @param class_index index one of CRYPTO_EX_INDEX_xxx
  20104. * @param argp parameters to be saved
  20105. * @param argl parameters to be saved
  20106. * @param new_func a pointer to WOLFSSL_CRYPTO_EX_new
  20107. * @param dup_func a pointer to WOLFSSL_CRYPTO_EX_dup
  20108. * @param free_func a pointer to WOLFSSL_CRYPTO_EX_free
  20109. * @return index value grater or equal to zero on success, -1 on failure.
  20110. */
  20111. int wolfSSL_CRYPTO_get_ex_new_index(int class_index, long argl, void *argp,
  20112. WOLFSSL_CRYPTO_EX_new* new_func,
  20113. WOLFSSL_CRYPTO_EX_dup* dup_func,
  20114. WOLFSSL_CRYPTO_EX_free* free_func)
  20115. {
  20116. WOLFSSL_ENTER("wolfSSL_CRYPTO_get_ex_new_index");
  20117. return wolfssl_get_ex_new_index(class_index, argl, argp, new_func,
  20118. dup_func, free_func);
  20119. }
  20120. #endif /* HAVE_EX_DATA */
  20121. /*******************************************************************************
  20122. * END OF EX_DATA APIs
  20123. ******************************************************************************/
  20124. /*******************************************************************************
  20125. * START OF BUF_MEM API
  20126. ******************************************************************************/
  20127. #if defined(OPENSSL_EXTRA)
  20128. /* Begin functions for openssl/buffer.h */
  20129. WOLFSSL_BUF_MEM* wolfSSL_BUF_MEM_new(void)
  20130. {
  20131. WOLFSSL_BUF_MEM* buf;
  20132. buf = (WOLFSSL_BUF_MEM*)XMALLOC(sizeof(WOLFSSL_BUF_MEM), NULL,
  20133. DYNAMIC_TYPE_OPENSSL);
  20134. if (buf) {
  20135. XMEMSET(buf, 0, sizeof(WOLFSSL_BUF_MEM));
  20136. }
  20137. return buf;
  20138. }
  20139. /* non-compat API returns length of buffer on success */
  20140. int wolfSSL_BUF_MEM_grow_ex(WOLFSSL_BUF_MEM* buf, size_t len,
  20141. char zeroFill)
  20142. {
  20143. int len_int = (int)len;
  20144. int mx;
  20145. char* tmp;
  20146. /* verify provided arguments */
  20147. if (buf == NULL || len_int < 0) {
  20148. return 0; /* BAD_FUNC_ARG; */
  20149. }
  20150. /* check to see if fits in existing length */
  20151. if (buf->length > len) {
  20152. buf->length = len;
  20153. return len_int;
  20154. }
  20155. /* check to see if fits in max buffer */
  20156. if (buf->max >= len) {
  20157. if (buf->data != NULL && zeroFill) {
  20158. XMEMSET(&buf->data[buf->length], 0, len - buf->length);
  20159. }
  20160. buf->length = len;
  20161. return len_int;
  20162. }
  20163. /* expand size, to handle growth */
  20164. mx = (len_int + 3) / 3 * 4;
  20165. /* use realloc */
  20166. tmp = (char*)XREALLOC(buf->data, mx, NULL, DYNAMIC_TYPE_OPENSSL);
  20167. if (tmp == NULL) {
  20168. return 0; /* ERR_R_MALLOC_FAILURE; */
  20169. }
  20170. buf->data = tmp;
  20171. buf->max = mx;
  20172. if (zeroFill)
  20173. XMEMSET(&buf->data[buf->length], 0, len - buf->length);
  20174. buf->length = len;
  20175. return len_int;
  20176. }
  20177. /* returns length of buffer on success */
  20178. int wolfSSL_BUF_MEM_grow(WOLFSSL_BUF_MEM* buf, size_t len)
  20179. {
  20180. return wolfSSL_BUF_MEM_grow_ex(buf, len, 1);
  20181. }
  20182. /* non-compat API returns length of buffer on success */
  20183. int wolfSSL_BUF_MEM_resize(WOLFSSL_BUF_MEM* buf, size_t len)
  20184. {
  20185. char* tmp;
  20186. int mx;
  20187. /* verify provided arguments */
  20188. if (buf == NULL || len == 0 || (int)len <= 0) {
  20189. return 0; /* BAD_FUNC_ARG; */
  20190. }
  20191. if (len == buf->length)
  20192. return (int)len;
  20193. if (len > buf->length)
  20194. return wolfSSL_BUF_MEM_grow_ex(buf, len, 0);
  20195. /* expand size, to handle growth */
  20196. mx = ((int)len + 3) / 3 * 4;
  20197. /* We want to shrink the internal buffer */
  20198. tmp = (char*)XREALLOC(buf->data, mx, NULL, DYNAMIC_TYPE_OPENSSL);
  20199. if (tmp == NULL)
  20200. return 0;
  20201. buf->data = tmp;
  20202. buf->length = len;
  20203. buf->max = mx;
  20204. return (int)len;
  20205. }
  20206. void wolfSSL_BUF_MEM_free(WOLFSSL_BUF_MEM* buf)
  20207. {
  20208. if (buf) {
  20209. if (buf->data) {
  20210. XFREE(buf->data, NULL, DYNAMIC_TYPE_OPENSSL);
  20211. buf->data = NULL;
  20212. }
  20213. buf->max = 0;
  20214. buf->length = 0;
  20215. XFREE(buf, NULL, DYNAMIC_TYPE_OPENSSL);
  20216. }
  20217. }
  20218. /* End Functions for openssl/buffer.h */
  20219. #endif /* OPENSSL_EXTRA */
  20220. /*******************************************************************************
  20221. * END OF BUF_MEM API
  20222. ******************************************************************************/
  20223. #define WOLFSSL_CONF_INCLUDED
  20224. #include <src/conf.c>
  20225. /*******************************************************************************
  20226. * START OF RAND API
  20227. ******************************************************************************/
  20228. #if defined(OPENSSL_EXTRA) && !defined(WOLFSSL_NO_OPENSSL_RAND_CB)
  20229. static int wolfSSL_RAND_InitMutex(void)
  20230. {
  20231. #ifndef WOLFSSL_MUTEX_INITIALIZER
  20232. if (gRandMethodsInit == 0) {
  20233. if (wc_InitMutex(&gRandMethodMutex) != 0) {
  20234. WOLFSSL_MSG("Bad Init Mutex rand methods");
  20235. return BAD_MUTEX_E;
  20236. }
  20237. gRandMethodsInit = 1;
  20238. }
  20239. #endif
  20240. return 0;
  20241. }
  20242. #endif
  20243. #ifdef OPENSSL_EXTRA
  20244. /* Checks if the global RNG has been created. If not then one is created.
  20245. *
  20246. * Returns WOLFSSL_SUCCESS when no error is encountered.
  20247. */
  20248. int wolfSSL_RAND_Init(void)
  20249. {
  20250. int ret = WOLFSSL_FAILURE;
  20251. #ifdef HAVE_GLOBAL_RNG
  20252. if (wc_LockMutex(&globalRNGMutex) == 0) {
  20253. if (initGlobalRNG == 0) {
  20254. ret = wc_InitRng(&globalRNG);
  20255. if (ret == 0) {
  20256. initGlobalRNG = 1;
  20257. ret = WOLFSSL_SUCCESS;
  20258. }
  20259. }
  20260. else {
  20261. /* GlobalRNG is already initialized */
  20262. ret = WOLFSSL_SUCCESS;
  20263. }
  20264. wc_UnLockMutex(&globalRNGMutex);
  20265. }
  20266. #endif
  20267. return ret;
  20268. }
  20269. /* WOLFSSL_SUCCESS on ok */
  20270. int wolfSSL_RAND_seed(const void* seed, int len)
  20271. {
  20272. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  20273. if (wolfSSL_RAND_InitMutex() == 0 && wc_LockMutex(&gRandMethodMutex) == 0) {
  20274. if (gRandMethods && gRandMethods->seed) {
  20275. int ret = gRandMethods->seed(seed, len);
  20276. wc_UnLockMutex(&gRandMethodMutex);
  20277. return ret;
  20278. }
  20279. wc_UnLockMutex(&gRandMethodMutex);
  20280. }
  20281. #else
  20282. (void)seed;
  20283. (void)len;
  20284. #endif
  20285. /* Make sure global shared RNG (globalRNG) is initialized */
  20286. return wolfSSL_RAND_Init();
  20287. }
  20288. /* Returns the path for reading seed data from.
  20289. * Uses the env variable $RANDFILE first if set, if not then used $HOME/.rnd
  20290. *
  20291. * Note uses stdlib by default unless XGETENV macro is overwritten
  20292. *
  20293. * fname buffer to hold path
  20294. * len length of fname buffer
  20295. *
  20296. * Returns a pointer to fname on success and NULL on failure
  20297. */
  20298. const char* wolfSSL_RAND_file_name(char* fname, unsigned long len)
  20299. {
  20300. #if !defined(NO_FILESYSTEM) && defined(XGETENV)
  20301. char* rt;
  20302. WOLFSSL_ENTER("wolfSSL_RAND_file_name");
  20303. if (fname == NULL) {
  20304. return NULL;
  20305. }
  20306. XMEMSET(fname, 0, len);
  20307. if ((rt = XGETENV("RANDFILE")) != NULL) {
  20308. if (len > XSTRLEN(rt)) {
  20309. XMEMCPY(fname, rt, XSTRLEN(rt));
  20310. }
  20311. else {
  20312. WOLFSSL_MSG("RANDFILE too large for buffer");
  20313. rt = NULL;
  20314. }
  20315. }
  20316. /* $RANDFILE was not set or is too large, check $HOME */
  20317. if (rt == NULL) {
  20318. const char ap[] = "/.rnd";
  20319. WOLFSSL_MSG("Environment variable RANDFILE not set");
  20320. if ((rt = XGETENV("HOME")) == NULL) {
  20321. WOLFSSL_MSG("Environment variable HOME not set");
  20322. return NULL;
  20323. }
  20324. if (len > XSTRLEN(rt) + XSTRLEN(ap)) {
  20325. fname[0] = '\0';
  20326. XSTRNCAT(fname, rt, len);
  20327. XSTRNCAT(fname, ap, len - XSTRLEN(rt));
  20328. return fname;
  20329. }
  20330. else {
  20331. WOLFSSL_MSG("HOME too large for buffer");
  20332. return NULL;
  20333. }
  20334. }
  20335. return fname;
  20336. #else
  20337. WOLFSSL_ENTER("wolfSSL_RAND_file_name");
  20338. WOLFSSL_MSG("RAND_file_name requires filesystem and getenv support, "
  20339. "not compiled in");
  20340. (void)fname;
  20341. (void)len;
  20342. return NULL;
  20343. #endif
  20344. }
  20345. /* Writes 1024 bytes from the RNG to the given file name.
  20346. *
  20347. * fname name of file to write to
  20348. *
  20349. * Returns the number of bytes written
  20350. */
  20351. int wolfSSL_RAND_write_file(const char* fname)
  20352. {
  20353. int bytes = 0;
  20354. WOLFSSL_ENTER("wolfSSL_RAND_write_file");
  20355. if (fname == NULL) {
  20356. return WOLFSSL_FAILURE;
  20357. }
  20358. #ifndef NO_FILESYSTEM
  20359. {
  20360. #ifndef WOLFSSL_SMALL_STACK
  20361. unsigned char buf[1024];
  20362. #else
  20363. unsigned char* buf = (unsigned char *)XMALLOC(1024, NULL,
  20364. DYNAMIC_TYPE_TMP_BUFFER);
  20365. if (buf == NULL) {
  20366. WOLFSSL_MSG("malloc failed");
  20367. return WOLFSSL_FAILURE;
  20368. }
  20369. #endif
  20370. bytes = 1024; /* default size of buf */
  20371. if (initGlobalRNG == 0 && wolfSSL_RAND_Init() != WOLFSSL_SUCCESS) {
  20372. WOLFSSL_MSG("No RNG to use");
  20373. #ifdef WOLFSSL_SMALL_STACK
  20374. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  20375. #endif
  20376. return 0;
  20377. }
  20378. if (wc_RNG_GenerateBlock(&globalRNG, buf, bytes) != 0) {
  20379. WOLFSSL_MSG("Error generating random buffer");
  20380. bytes = 0;
  20381. }
  20382. else {
  20383. XFILE f;
  20384. #ifdef WOLFSSL_CHECK_MEM_ZERO
  20385. wc_MemZero_Add("wolfSSL_RAND_write_file buf", buf, bytes);
  20386. #endif
  20387. f = XFOPEN(fname, "wb");
  20388. if (f == XBADFILE) {
  20389. WOLFSSL_MSG("Error opening the file");
  20390. bytes = 0;
  20391. }
  20392. else {
  20393. size_t bytes_written = XFWRITE(buf, 1, bytes, f);
  20394. bytes = (int)bytes_written;
  20395. XFCLOSE(f);
  20396. }
  20397. }
  20398. ForceZero(buf, bytes);
  20399. #ifdef WOLFSSL_SMALL_STACK
  20400. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  20401. #elif defined(WOLFSSL_CHECK_MEM_ZERO)
  20402. wc_MemZero_Check(buf, sizeof(buf));
  20403. #endif
  20404. }
  20405. #endif
  20406. return bytes;
  20407. }
  20408. #ifndef FREERTOS_TCP
  20409. /* These constant values are protocol values made by egd */
  20410. #if defined(USE_WOLFSSL_IO) && !defined(USE_WINDOWS_API) && \
  20411. !defined(HAVE_FIPS) && defined(HAVE_HASHDRBG) && !defined(NETOS) && \
  20412. defined(HAVE_SYS_UN_H)
  20413. #define WOLFSSL_EGD_NBLOCK 0x01
  20414. #include <sys/un.h>
  20415. #endif
  20416. /* This collects entropy from the path nm and seeds the global PRNG with it.
  20417. *
  20418. * nm is the file path to the egd server
  20419. *
  20420. * Returns the number of bytes read.
  20421. */
  20422. int wolfSSL_RAND_egd(const char* nm)
  20423. {
  20424. #ifdef WOLFSSL_EGD_NBLOCK
  20425. struct sockaddr_un rem;
  20426. int fd;
  20427. int ret = WOLFSSL_SUCCESS;
  20428. word32 bytes = 0;
  20429. word32 idx = 0;
  20430. #ifndef WOLFSSL_SMALL_STACK
  20431. unsigned char buf[256];
  20432. #else
  20433. unsigned char* buf;
  20434. buf = (unsigned char*)XMALLOC(256, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  20435. if (buf == NULL) {
  20436. WOLFSSL_MSG("Not enough memory");
  20437. return WOLFSSL_FATAL_ERROR;
  20438. }
  20439. #endif
  20440. XMEMSET(&rem, 0, sizeof(struct sockaddr_un));
  20441. if (nm == NULL) {
  20442. #ifdef WOLFSSL_SMALL_STACK
  20443. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  20444. #endif
  20445. return WOLFSSL_FATAL_ERROR;
  20446. }
  20447. fd = socket(AF_UNIX, SOCK_STREAM, 0);
  20448. if (fd < 0) {
  20449. WOLFSSL_MSG("Error creating socket");
  20450. #ifdef WOLFSSL_SMALL_STACK
  20451. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  20452. #endif
  20453. return WOLFSSL_FATAL_ERROR;
  20454. }
  20455. rem.sun_family = AF_UNIX;
  20456. XSTRNCPY(rem.sun_path, nm, sizeof(rem.sun_path) - 1);
  20457. rem.sun_path[sizeof(rem.sun_path)-1] = '\0';
  20458. /* connect to egd server */
  20459. if (connect(fd, (struct sockaddr*)&rem, sizeof(struct sockaddr_un)) == -1) {
  20460. WOLFSSL_MSG("error connecting to egd server");
  20461. ret = WOLFSSL_FATAL_ERROR;
  20462. }
  20463. #ifdef WOLFSSL_CHECK_MEM_ZERO
  20464. if (ret == WOLFSSL_SUCCESS) {
  20465. wc_MemZero_Add("wolfSSL_RAND_egd buf", buf, 256);
  20466. }
  20467. #endif
  20468. while (ret == WOLFSSL_SUCCESS && bytes < 255 && idx + 2 < 256) {
  20469. buf[idx] = WOLFSSL_EGD_NBLOCK;
  20470. buf[idx + 1] = 255 - bytes; /* request 255 bytes from server */
  20471. ret = (int)write(fd, buf + idx, 2);
  20472. if (ret != 2) {
  20473. if (errno == EAGAIN) {
  20474. ret = WOLFSSL_SUCCESS;
  20475. continue;
  20476. }
  20477. WOLFSSL_MSG("error requesting entropy from egd server");
  20478. ret = WOLFSSL_FATAL_ERROR;
  20479. break;
  20480. }
  20481. /* attempting to read */
  20482. buf[idx] = 0;
  20483. ret = (int)read(fd, buf + idx, 256 - bytes);
  20484. if (ret == 0) {
  20485. WOLFSSL_MSG("error reading entropy from egd server");
  20486. ret = WOLFSSL_FATAL_ERROR;
  20487. break;
  20488. }
  20489. if (ret > 0 && buf[idx] > 0) {
  20490. bytes += buf[idx]; /* egd stores amount sent in first byte */
  20491. if (bytes + idx > 255 || buf[idx] > ret) {
  20492. WOLFSSL_MSG("Buffer error");
  20493. ret = WOLFSSL_FATAL_ERROR;
  20494. break;
  20495. }
  20496. XMEMMOVE(buf + idx, buf + idx + 1, buf[idx]);
  20497. idx = bytes;
  20498. ret = WOLFSSL_SUCCESS;
  20499. if (bytes >= 255) {
  20500. break;
  20501. }
  20502. }
  20503. else {
  20504. if (errno == EAGAIN || errno == EINTR) {
  20505. WOLFSSL_MSG("EGD would read");
  20506. ret = WOLFSSL_SUCCESS; /* try again */
  20507. }
  20508. else if (buf[idx] == 0) {
  20509. /* if egd returned 0 then there is no more entropy to be had.
  20510. Do not try more reads. */
  20511. ret = WOLFSSL_SUCCESS;
  20512. break;
  20513. }
  20514. else {
  20515. WOLFSSL_MSG("Error with read");
  20516. ret = WOLFSSL_FATAL_ERROR;
  20517. }
  20518. }
  20519. }
  20520. if (bytes > 0 && ret == WOLFSSL_SUCCESS) {
  20521. /* call to check global RNG is created */
  20522. if (wolfSSL_RAND_Init() != WOLFSSL_SUCCESS) {
  20523. WOLFSSL_MSG("Error with initializing global RNG structure");
  20524. ret = WOLFSSL_FATAL_ERROR;
  20525. }
  20526. else if (wc_RNG_DRBG_Reseed(&globalRNG, (const byte*) buf, bytes)
  20527. != 0) {
  20528. WOLFSSL_MSG("Error with reseeding DRBG structure");
  20529. ret = WOLFSSL_FATAL_ERROR;
  20530. }
  20531. #ifdef SHOW_SECRETS
  20532. else { /* print out entropy found only when no error occurred */
  20533. word32 i;
  20534. printf("EGD Entropy = ");
  20535. for (i = 0; i < bytes; i++) {
  20536. printf("%02X", buf[i]);
  20537. }
  20538. printf("\n");
  20539. }
  20540. #endif
  20541. }
  20542. ForceZero(buf, bytes);
  20543. #ifdef WOLFSSL_SMALL_STACK
  20544. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  20545. #elif defined(WOLFSSL_CHECK_MEM_ZERO)
  20546. wc_MemZero_Check(buf, 256);
  20547. #endif
  20548. close(fd);
  20549. if (ret == WOLFSSL_SUCCESS) {
  20550. return bytes;
  20551. }
  20552. else {
  20553. return ret;
  20554. }
  20555. #else
  20556. WOLFSSL_MSG("Type of socket needed is not available");
  20557. WOLFSSL_MSG("\tor using mode where DRBG API is not available");
  20558. (void)nm;
  20559. return WOLFSSL_FATAL_ERROR;
  20560. #endif /* WOLFSSL_EGD_NBLOCK */
  20561. }
  20562. #endif /* !FREERTOS_TCP */
  20563. void wolfSSL_RAND_Cleanup(void)
  20564. {
  20565. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  20566. if (wolfSSL_RAND_InitMutex() == 0 && wc_LockMutex(&gRandMethodMutex) == 0) {
  20567. if (gRandMethods && gRandMethods->cleanup)
  20568. gRandMethods->cleanup();
  20569. wc_UnLockMutex(&gRandMethodMutex);
  20570. }
  20571. #ifndef WOLFSSL_MUTEX_INITIALIZER
  20572. if (wc_FreeMutex(&gRandMethodMutex) == 0)
  20573. gRandMethodsInit = 0;
  20574. #endif
  20575. #endif
  20576. #ifdef HAVE_GLOBAL_RNG
  20577. if (wc_LockMutex(&globalRNGMutex) == 0) {
  20578. if (initGlobalRNG) {
  20579. wc_FreeRng(&globalRNG);
  20580. initGlobalRNG = 0;
  20581. }
  20582. wc_UnLockMutex(&globalRNGMutex);
  20583. }
  20584. #endif
  20585. }
  20586. /* returns WOLFSSL_SUCCESS if the bytes generated are valid otherwise
  20587. * WOLFSSL_FAILURE */
  20588. int wolfSSL_RAND_pseudo_bytes(unsigned char* buf, int num)
  20589. {
  20590. int ret;
  20591. int hash;
  20592. byte secret[DRBG_SEED_LEN]; /* secret length arbitrarily chosen */
  20593. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  20594. if (wolfSSL_RAND_InitMutex() == 0 && wc_LockMutex(&gRandMethodMutex) == 0) {
  20595. if (gRandMethods && gRandMethods->pseudorand) {
  20596. ret = gRandMethods->pseudorand(buf, num);
  20597. wc_UnLockMutex(&gRandMethodMutex);
  20598. return ret;
  20599. }
  20600. wc_UnLockMutex(&gRandMethodMutex);
  20601. }
  20602. #endif
  20603. #ifdef WOLFSSL_HAVE_PRF
  20604. #ifndef NO_SHA256
  20605. hash = WC_SHA256;
  20606. #elif defined(WOLFSSL_SHA384)
  20607. hash = WC_SHA384;
  20608. #elif !defined(NO_SHA)
  20609. hash = WC_SHA;
  20610. #elif !defined(NO_MD5)
  20611. hash = WC_MD5;
  20612. #endif
  20613. /* get secret value from source of entropy */
  20614. ret = wolfSSL_RAND_bytes(secret, DRBG_SEED_LEN);
  20615. /* uses input buffer to seed for pseudo random number generation, each
  20616. * thread will potentially have different results this way */
  20617. if (ret == WOLFSSL_SUCCESS) {
  20618. PRIVATE_KEY_UNLOCK();
  20619. ret = wc_PRF(buf, num, secret, DRBG_SEED_LEN, (const byte*)buf, num,
  20620. hash, NULL, INVALID_DEVID);
  20621. PRIVATE_KEY_LOCK();
  20622. ret = (ret == 0) ? WOLFSSL_SUCCESS: WOLFSSL_FAILURE;
  20623. }
  20624. #else
  20625. /* fall back to just doing wolfSSL_RAND_bytes if PRF not avialbale */
  20626. ret = wolfSSL_RAND_bytes(buf, num);
  20627. (void)hash;
  20628. (void)secret;
  20629. #endif
  20630. return ret;
  20631. }
  20632. /* returns WOLFSSL_SUCCESS if the bytes generated are valid otherwise
  20633. * WOLFSSL_FAILURE */
  20634. int wolfSSL_RAND_bytes(unsigned char* buf, int num)
  20635. {
  20636. int ret = 0;
  20637. WC_RNG* rng = NULL;
  20638. #ifdef WOLFSSL_SMALL_STACK
  20639. WC_RNG* tmpRNG = NULL;
  20640. #else
  20641. WC_RNG tmpRNG[1];
  20642. #endif
  20643. int initTmpRng = 0;
  20644. #ifdef HAVE_GLOBAL_RNG
  20645. int used_global = 0;
  20646. #endif
  20647. WOLFSSL_ENTER("wolfSSL_RAND_bytes");
  20648. /* sanity check */
  20649. if (buf == NULL || num < 0)
  20650. /* return code compliant with OpenSSL */
  20651. return 0;
  20652. /* if a RAND callback has been set try and use it */
  20653. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  20654. if (wolfSSL_RAND_InitMutex() == 0 && wc_LockMutex(&gRandMethodMutex) == 0) {
  20655. if (gRandMethods && gRandMethods->bytes) {
  20656. ret = gRandMethods->bytes(buf, num);
  20657. wc_UnLockMutex(&gRandMethodMutex);
  20658. return ret;
  20659. }
  20660. wc_UnLockMutex(&gRandMethodMutex);
  20661. }
  20662. #endif
  20663. #ifdef HAVE_GLOBAL_RNG
  20664. if (initGlobalRNG) {
  20665. if (wc_LockMutex(&globalRNGMutex) != 0) {
  20666. WOLFSSL_MSG("Bad Lock Mutex rng");
  20667. return ret;
  20668. }
  20669. rng = &globalRNG;
  20670. used_global = 1;
  20671. }
  20672. else
  20673. #endif
  20674. {
  20675. #ifdef WOLFSSL_SMALL_STACK
  20676. tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
  20677. if (tmpRNG == NULL)
  20678. return ret;
  20679. #endif
  20680. if (wc_InitRng(tmpRNG) == 0) {
  20681. rng = tmpRNG;
  20682. initTmpRng = 1;
  20683. }
  20684. }
  20685. if (rng) {
  20686. /* handles size greater than RNG_MAX_BLOCK_LEN */
  20687. int blockCount = num / RNG_MAX_BLOCK_LEN;
  20688. while (blockCount--) {
  20689. ret = wc_RNG_GenerateBlock(rng, buf, RNG_MAX_BLOCK_LEN);
  20690. if (ret != 0) {
  20691. WOLFSSL_MSG("Bad wc_RNG_GenerateBlock");
  20692. break;
  20693. }
  20694. num -= RNG_MAX_BLOCK_LEN;
  20695. buf += RNG_MAX_BLOCK_LEN;
  20696. }
  20697. if (ret == 0 && num)
  20698. ret = wc_RNG_GenerateBlock(rng, buf, num);
  20699. if (ret != 0)
  20700. WOLFSSL_MSG("Bad wc_RNG_GenerateBlock");
  20701. else
  20702. ret = WOLFSSL_SUCCESS;
  20703. }
  20704. #ifdef HAVE_GLOBAL_RNG
  20705. if (used_global == 1)
  20706. wc_UnLockMutex(&globalRNGMutex);
  20707. #endif
  20708. if (initTmpRng)
  20709. wc_FreeRng(tmpRNG);
  20710. #ifdef WOLFSSL_SMALL_STACK
  20711. if (tmpRNG)
  20712. XFREE(tmpRNG, NULL, DYNAMIC_TYPE_RNG);
  20713. #endif
  20714. return ret;
  20715. }
  20716. int wolfSSL_RAND_poll(void)
  20717. {
  20718. byte entropy[16];
  20719. int ret = 0;
  20720. word32 entropy_sz = 16;
  20721. WOLFSSL_ENTER("wolfSSL_RAND_poll");
  20722. if (initGlobalRNG == 0){
  20723. WOLFSSL_MSG("Global RNG no Init");
  20724. return WOLFSSL_FAILURE;
  20725. }
  20726. ret = wc_GenerateSeed(&globalRNG.seed, entropy, entropy_sz);
  20727. if (ret != 0){
  20728. WOLFSSL_MSG("Bad wc_RNG_GenerateBlock");
  20729. ret = WOLFSSL_FAILURE;
  20730. }else
  20731. ret = WOLFSSL_SUCCESS;
  20732. return ret;
  20733. }
  20734. /* If a valid struct is provided with function pointers, will override
  20735. RAND_seed, bytes, cleanup, add, pseudo_bytes and status. If a NULL
  20736. pointer is passed in, it will cancel any previous function overrides.
  20737. Returns WOLFSSL_SUCCESS on success, WOLFSSL_FAILURE on failure. */
  20738. int wolfSSL_RAND_set_rand_method(const WOLFSSL_RAND_METHOD *methods)
  20739. {
  20740. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  20741. if (wolfSSL_RAND_InitMutex() == 0 &&
  20742. wc_LockMutex(&gRandMethodMutex) == 0) {
  20743. gRandMethods = methods;
  20744. wc_UnLockMutex(&gRandMethodMutex);
  20745. return WOLFSSL_SUCCESS;
  20746. }
  20747. #else
  20748. (void)methods;
  20749. #endif
  20750. return WOLFSSL_FAILURE;
  20751. }
  20752. /* Returns WOLFSSL_SUCCESS if the RNG has been seeded with enough data */
  20753. int wolfSSL_RAND_status(void)
  20754. {
  20755. int ret = WOLFSSL_SUCCESS;
  20756. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  20757. if (wolfSSL_RAND_InitMutex() == 0 &&
  20758. wc_LockMutex(&gRandMethodMutex) == 0) {
  20759. if (gRandMethods && gRandMethods->status)
  20760. ret = gRandMethods->status();
  20761. wc_UnLockMutex(&gRandMethodMutex);
  20762. }
  20763. else {
  20764. ret = WOLFSSL_FAILURE;
  20765. }
  20766. #else
  20767. /* wolfCrypt provides enough seed internally, so return success */
  20768. #endif
  20769. return ret;
  20770. }
  20771. void wolfSSL_RAND_add(const void* add, int len, double entropy)
  20772. {
  20773. #ifndef WOLFSSL_NO_OPENSSL_RAND_CB
  20774. if (wolfSSL_RAND_InitMutex() == 0 &&
  20775. wc_LockMutex(&gRandMethodMutex) == 0) {
  20776. if (gRandMethods && gRandMethods->add) {
  20777. /* callback has return code, but RAND_add does not */
  20778. (void)gRandMethods->add(add, len, entropy);
  20779. }
  20780. wc_UnLockMutex(&gRandMethodMutex);
  20781. }
  20782. #else
  20783. /* wolfSSL seeds/adds internally, use explicit RNG if you want
  20784. to take control */
  20785. (void)add;
  20786. (void)len;
  20787. (void)entropy;
  20788. #endif
  20789. }
  20790. #ifndef NO_WOLFSSL_STUB
  20791. void wolfSSL_RAND_screen(void)
  20792. {
  20793. WOLFSSL_STUB("RAND_screen");
  20794. }
  20795. #endif
  20796. int wolfSSL_RAND_load_file(const char* fname, long len)
  20797. {
  20798. (void)fname;
  20799. /* wolfCrypt provides enough entropy internally or will report error */
  20800. if (len == -1)
  20801. return 1024;
  20802. else
  20803. return (int)len;
  20804. }
  20805. #endif /* OPENSSL_EXTRA */
  20806. /*******************************************************************************
  20807. * END OF RAND API
  20808. ******************************************************************************/
  20809. /*******************************************************************************
  20810. * START OF EVP_CIPHER API
  20811. ******************************************************************************/
  20812. #ifdef OPENSSL_EXTRA
  20813. /* store for external read of iv, WOLFSSL_SUCCESS on success */
  20814. int wolfSSL_StoreExternalIV(WOLFSSL_EVP_CIPHER_CTX* ctx)
  20815. {
  20816. WOLFSSL_ENTER("wolfSSL_StoreExternalIV");
  20817. if (ctx == NULL) {
  20818. WOLFSSL_MSG("Bad function argument");
  20819. return WOLFSSL_FATAL_ERROR;
  20820. }
  20821. switch (ctx->cipherType) {
  20822. #ifndef NO_AES
  20823. #if defined(HAVE_AES_CBC) || defined(WOLFSSL_AES_DIRECT)
  20824. case AES_128_CBC_TYPE :
  20825. case AES_192_CBC_TYPE :
  20826. case AES_256_CBC_TYPE :
  20827. WOLFSSL_MSG("AES CBC");
  20828. XMEMCPY(ctx->iv, &ctx->cipher.aes.reg, ctx->ivSz);
  20829. break;
  20830. #endif
  20831. #ifdef HAVE_AESGCM
  20832. case AES_128_GCM_TYPE :
  20833. case AES_192_GCM_TYPE :
  20834. case AES_256_GCM_TYPE :
  20835. WOLFSSL_MSG("AES GCM");
  20836. XMEMCPY(ctx->iv, &ctx->cipher.aes.reg, ctx->ivSz);
  20837. break;
  20838. #endif /* HAVE_AESGCM */
  20839. #ifdef HAVE_AESCCM
  20840. case AES_128_CCM_TYPE :
  20841. case AES_192_CCM_TYPE :
  20842. case AES_256_CCM_TYPE :
  20843. WOLFSSL_MSG("AES CCM");
  20844. XMEMCPY(ctx->iv, &ctx->cipher.aes.reg, ctx->ivSz);
  20845. break;
  20846. #endif /* HAVE_AESCCM */
  20847. #ifdef HAVE_AES_ECB
  20848. case AES_128_ECB_TYPE :
  20849. case AES_192_ECB_TYPE :
  20850. case AES_256_ECB_TYPE :
  20851. WOLFSSL_MSG("AES ECB");
  20852. break;
  20853. #endif
  20854. #ifdef WOLFSSL_AES_COUNTER
  20855. case AES_128_CTR_TYPE :
  20856. case AES_192_CTR_TYPE :
  20857. case AES_256_CTR_TYPE :
  20858. WOLFSSL_MSG("AES CTR");
  20859. XMEMCPY(ctx->iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE);
  20860. break;
  20861. #endif /* WOLFSSL_AES_COUNTER */
  20862. #ifdef WOLFSSL_AES_CFB
  20863. #if !defined(HAVE_SELFTEST) && !defined(HAVE_FIPS)
  20864. case AES_128_CFB1_TYPE:
  20865. case AES_192_CFB1_TYPE:
  20866. case AES_256_CFB1_TYPE:
  20867. WOLFSSL_MSG("AES CFB1");
  20868. break;
  20869. case AES_128_CFB8_TYPE:
  20870. case AES_192_CFB8_TYPE:
  20871. case AES_256_CFB8_TYPE:
  20872. WOLFSSL_MSG("AES CFB8");
  20873. break;
  20874. #endif /* !HAVE_SELFTEST && !HAVE_FIPS */
  20875. case AES_128_CFB128_TYPE:
  20876. case AES_192_CFB128_TYPE:
  20877. case AES_256_CFB128_TYPE:
  20878. WOLFSSL_MSG("AES CFB128");
  20879. break;
  20880. #endif /* WOLFSSL_AES_CFB */
  20881. #if defined(WOLFSSL_AES_OFB)
  20882. case AES_128_OFB_TYPE:
  20883. case AES_192_OFB_TYPE:
  20884. case AES_256_OFB_TYPE:
  20885. WOLFSSL_MSG("AES OFB");
  20886. break;
  20887. #endif /* WOLFSSL_AES_OFB */
  20888. #ifdef WOLFSSL_AES_XTS
  20889. case AES_128_XTS_TYPE:
  20890. case AES_256_XTS_TYPE:
  20891. WOLFSSL_MSG("AES XTS");
  20892. break;
  20893. #endif /* WOLFSSL_AES_XTS */
  20894. #endif /* NO_AES */
  20895. #ifdef HAVE_ARIA
  20896. case ARIA_128_GCM_TYPE :
  20897. case ARIA_192_GCM_TYPE :
  20898. case ARIA_256_GCM_TYPE :
  20899. WOLFSSL_MSG("ARIA GCM");
  20900. XMEMCPY(ctx->iv, &ctx->cipher.aria.nonce, ARIA_BLOCK_SIZE);
  20901. break;
  20902. #endif /* HAVE_ARIA */
  20903. #ifndef NO_DES3
  20904. case DES_CBC_TYPE :
  20905. WOLFSSL_MSG("DES CBC");
  20906. XMEMCPY(ctx->iv, &ctx->cipher.des.reg, DES_BLOCK_SIZE);
  20907. break;
  20908. case DES_EDE3_CBC_TYPE :
  20909. WOLFSSL_MSG("DES EDE3 CBC");
  20910. XMEMCPY(ctx->iv, &ctx->cipher.des3.reg, DES_BLOCK_SIZE);
  20911. break;
  20912. #endif
  20913. #ifdef WOLFSSL_DES_ECB
  20914. case DES_ECB_TYPE :
  20915. WOLFSSL_MSG("DES ECB");
  20916. break;
  20917. case DES_EDE3_ECB_TYPE :
  20918. WOLFSSL_MSG("DES3 ECB");
  20919. break;
  20920. #endif
  20921. case ARC4_TYPE :
  20922. WOLFSSL_MSG("ARC4");
  20923. break;
  20924. #if defined(HAVE_CHACHA) && defined(HAVE_POLY1305)
  20925. case CHACHA20_POLY1305_TYPE:
  20926. break;
  20927. #endif
  20928. #ifdef HAVE_CHACHA
  20929. case CHACHA20_TYPE:
  20930. break;
  20931. #endif
  20932. #ifdef WOLFSSL_SM4_ECB
  20933. case SM4_ECB_TYPE:
  20934. break;
  20935. #endif
  20936. #ifdef WOLFSSL_SM4_CBC
  20937. case SM4_CBC_TYPE:
  20938. WOLFSSL_MSG("SM4 CBC");
  20939. XMEMCPY(&ctx->cipher.sm4.iv, ctx->iv, SM4_BLOCK_SIZE);
  20940. break;
  20941. #endif
  20942. #ifdef WOLFSSL_SM4_CTR
  20943. case SM4_CTR_TYPE:
  20944. WOLFSSL_MSG("SM4 CTR");
  20945. XMEMCPY(&ctx->cipher.sm4.iv, ctx->iv, SM4_BLOCK_SIZE);
  20946. break;
  20947. #endif
  20948. #ifdef WOLFSSL_SM4_GCM
  20949. case SM4_GCM_TYPE:
  20950. WOLFSSL_MSG("SM4 GCM");
  20951. XMEMCPY(&ctx->cipher.sm4.iv, ctx->iv, SM4_BLOCK_SIZE);
  20952. break;
  20953. #endif
  20954. #ifdef WOLFSSL_SM4_CCM
  20955. case SM4_CCM_TYPE:
  20956. WOLFSSL_MSG("SM4 CCM");
  20957. XMEMCPY(&ctx->cipher.sm4.iv, ctx->iv, SM4_BLOCK_SIZE);
  20958. break;
  20959. #endif
  20960. case NULL_CIPHER_TYPE :
  20961. WOLFSSL_MSG("NULL");
  20962. break;
  20963. default: {
  20964. WOLFSSL_MSG("bad type");
  20965. return WOLFSSL_FATAL_ERROR;
  20966. }
  20967. }
  20968. return WOLFSSL_SUCCESS;
  20969. }
  20970. /* set internal IV from external, WOLFSSL_SUCCESS on success */
  20971. int wolfSSL_SetInternalIV(WOLFSSL_EVP_CIPHER_CTX* ctx)
  20972. {
  20973. WOLFSSL_ENTER("wolfSSL_SetInternalIV");
  20974. if (ctx == NULL) {
  20975. WOLFSSL_MSG("Bad function argument");
  20976. return WOLFSSL_FATAL_ERROR;
  20977. }
  20978. switch (ctx->cipherType) {
  20979. #ifndef NO_AES
  20980. #if defined(HAVE_AES_CBC) || defined(WOLFSSL_AES_DIRECT)
  20981. case AES_128_CBC_TYPE :
  20982. case AES_192_CBC_TYPE :
  20983. case AES_256_CBC_TYPE :
  20984. WOLFSSL_MSG("AES CBC");
  20985. XMEMCPY(&ctx->cipher.aes.reg, ctx->iv, AES_BLOCK_SIZE);
  20986. break;
  20987. #endif
  20988. #ifdef HAVE_AESGCM
  20989. case AES_128_GCM_TYPE :
  20990. case AES_192_GCM_TYPE :
  20991. case AES_256_GCM_TYPE :
  20992. WOLFSSL_MSG("AES GCM");
  20993. XMEMCPY(&ctx->cipher.aes.reg, ctx->iv, AES_BLOCK_SIZE);
  20994. break;
  20995. #endif
  20996. #ifdef HAVE_AES_ECB
  20997. case AES_128_ECB_TYPE :
  20998. case AES_192_ECB_TYPE :
  20999. case AES_256_ECB_TYPE :
  21000. WOLFSSL_MSG("AES ECB");
  21001. break;
  21002. #endif
  21003. #ifdef WOLFSSL_AES_COUNTER
  21004. case AES_128_CTR_TYPE :
  21005. case AES_192_CTR_TYPE :
  21006. case AES_256_CTR_TYPE :
  21007. WOLFSSL_MSG("AES CTR");
  21008. XMEMCPY(&ctx->cipher.aes.reg, ctx->iv, AES_BLOCK_SIZE);
  21009. break;
  21010. #endif
  21011. #endif /* NO_AES */
  21012. #ifdef HAVE_ARIA
  21013. case ARIA_128_GCM_TYPE :
  21014. case ARIA_192_GCM_TYPE :
  21015. case ARIA_256_GCM_TYPE :
  21016. WOLFSSL_MSG("ARIA GCM");
  21017. XMEMCPY(&ctx->cipher.aria.nonce, ctx->iv, ARIA_BLOCK_SIZE);
  21018. break;
  21019. #endif /* HAVE_ARIA */
  21020. #ifndef NO_DES3
  21021. case DES_CBC_TYPE :
  21022. WOLFSSL_MSG("DES CBC");
  21023. XMEMCPY(&ctx->cipher.des.reg, ctx->iv, DES_BLOCK_SIZE);
  21024. break;
  21025. case DES_EDE3_CBC_TYPE :
  21026. WOLFSSL_MSG("DES EDE3 CBC");
  21027. XMEMCPY(&ctx->cipher.des3.reg, ctx->iv, DES_BLOCK_SIZE);
  21028. break;
  21029. #endif
  21030. #ifdef WOLFSSL_DES_ECB
  21031. case DES_ECB_TYPE :
  21032. WOLFSSL_MSG("DES ECB");
  21033. break;
  21034. case DES_EDE3_ECB_TYPE :
  21035. WOLFSSL_MSG("DES3 ECB");
  21036. break;
  21037. #endif
  21038. case ARC4_TYPE :
  21039. WOLFSSL_MSG("ARC4");
  21040. break;
  21041. #if defined(HAVE_CHACHA) && defined(HAVE_POLY1305)
  21042. case CHACHA20_POLY1305_TYPE:
  21043. break;
  21044. #endif
  21045. #ifdef HAVE_CHACHA
  21046. case CHACHA20_TYPE:
  21047. break;
  21048. #endif
  21049. #ifdef WOLFSSL_SM4_ECB
  21050. case SM4_ECB_TYPE:
  21051. break;
  21052. #endif
  21053. #ifdef WOLFSSL_SM4_CBC
  21054. case SM4_CBC_TYPE:
  21055. WOLFSSL_MSG("SM4 CBC");
  21056. XMEMCPY(ctx->iv, &ctx->cipher.sm4.iv, ctx->ivSz);
  21057. break;
  21058. #endif
  21059. #ifdef WOLFSSL_SM4_CTR
  21060. case SM4_CTR_TYPE:
  21061. WOLFSSL_MSG("SM4 CTR");
  21062. XMEMCPY(ctx->iv, &ctx->cipher.sm4.iv, ctx->ivSz);
  21063. break;
  21064. #endif
  21065. #ifdef WOLFSSL_SM4_GCM
  21066. case SM4_GCM_TYPE:
  21067. WOLFSSL_MSG("SM4 GCM");
  21068. XMEMCPY(ctx->iv, &ctx->cipher.sm4.iv, ctx->ivSz);
  21069. break;
  21070. #endif
  21071. #ifdef WOLFSSL_SM4_CCM
  21072. case SM4_CCM_TYPE:
  21073. WOLFSSL_MSG("SM4 CCM");
  21074. XMEMCPY(ctx->iv, &ctx->cipher.sm4.iv, ctx->ivSz);
  21075. break;
  21076. #endif
  21077. case NULL_CIPHER_TYPE :
  21078. WOLFSSL_MSG("NULL");
  21079. break;
  21080. default: {
  21081. WOLFSSL_MSG("bad type");
  21082. return WOLFSSL_FATAL_ERROR;
  21083. }
  21084. }
  21085. return WOLFSSL_SUCCESS;
  21086. }
  21087. #ifndef NO_DES3
  21088. void wolfSSL_3des_iv(WOLFSSL_EVP_CIPHER_CTX* ctx, int doset,
  21089. unsigned char* iv, int len)
  21090. {
  21091. (void)len;
  21092. WOLFSSL_MSG("wolfSSL_3des_iv");
  21093. if (ctx == NULL || iv == NULL) {
  21094. WOLFSSL_MSG("Bad function argument");
  21095. return;
  21096. }
  21097. if (doset)
  21098. wc_Des3_SetIV(&ctx->cipher.des3, iv); /* OpenSSL compat, no ret */
  21099. else
  21100. XMEMCPY(iv, &ctx->cipher.des3.reg, DES_BLOCK_SIZE);
  21101. }
  21102. #endif /* NO_DES3 */
  21103. #ifndef NO_AES
  21104. void wolfSSL_aes_ctr_iv(WOLFSSL_EVP_CIPHER_CTX* ctx, int doset,
  21105. unsigned char* iv, int len)
  21106. {
  21107. (void)len;
  21108. WOLFSSL_MSG("wolfSSL_aes_ctr_iv");
  21109. if (ctx == NULL || iv == NULL) {
  21110. WOLFSSL_MSG("Bad function argument");
  21111. return;
  21112. }
  21113. if (doset)
  21114. (void)wc_AesSetIV(&ctx->cipher.aes, iv); /* OpenSSL compat, no ret */
  21115. else
  21116. XMEMCPY(iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE);
  21117. }
  21118. #endif /* NO_AES */
  21119. #endif /* OPENSSL_EXTRA */
  21120. /*******************************************************************************
  21121. * END OF EVP_CIPHER API
  21122. ******************************************************************************/
  21123. #ifndef NO_CERTS
  21124. #define WOLFSSL_X509_STORE_INCLUDED
  21125. #include <src/x509_str.c>
  21126. #define WOLFSSL_SSL_P7P12_INCLUDED
  21127. #include <src/ssl_p7p12.c>
  21128. #endif /* !NO_CERTS */
  21129. /*******************************************************************************
  21130. * BEGIN OPENSSL FIPS DRBG APIs
  21131. ******************************************************************************/
  21132. #if defined(OPENSSL_EXTRA) && !defined(WC_NO_RNG) && defined(HAVE_HASHDRBG)
  21133. int wolfSSL_FIPS_drbg_init(WOLFSSL_DRBG_CTX *ctx, int type, unsigned int flags)
  21134. {
  21135. int ret = WOLFSSL_FAILURE;
  21136. if (ctx != NULL) {
  21137. XMEMSET(ctx, 0, sizeof(WOLFSSL_DRBG_CTX));
  21138. ctx->type = type;
  21139. ctx->xflags = flags;
  21140. ctx->status = DRBG_STATUS_UNINITIALISED;
  21141. ret = WOLFSSL_SUCCESS;
  21142. }
  21143. return ret;
  21144. }
  21145. WOLFSSL_DRBG_CTX* wolfSSL_FIPS_drbg_new(int type, unsigned int flags)
  21146. {
  21147. int ret = WOLFSSL_FAILURE;
  21148. WOLFSSL_DRBG_CTX* ctx = (WOLFSSL_DRBG_CTX*)XMALLOC(sizeof(WOLFSSL_DRBG_CTX),
  21149. NULL, DYNAMIC_TYPE_OPENSSL);
  21150. ret = wolfSSL_FIPS_drbg_init(ctx, type, flags);
  21151. if (ret == WOLFSSL_SUCCESS && type != 0) {
  21152. ret = wolfSSL_FIPS_drbg_instantiate(ctx, NULL, 0);
  21153. }
  21154. if (ret != WOLFSSL_SUCCESS) {
  21155. WOLFSSL_ERROR(ret);
  21156. wolfSSL_FIPS_drbg_free(ctx);
  21157. ctx = NULL;
  21158. }
  21159. return ctx;
  21160. }
  21161. int wolfSSL_FIPS_drbg_instantiate(WOLFSSL_DRBG_CTX* ctx,
  21162. const unsigned char* pers, size_t perslen)
  21163. {
  21164. int ret = WOLFSSL_FAILURE;
  21165. if (ctx != NULL && ctx->rng == NULL) {
  21166. #if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || \
  21167. (defined(HAVE_FIPS) && FIPS_VERSION_GE(5,0)))
  21168. ctx->rng = wc_rng_new((byte*)pers, (word32)perslen, NULL);
  21169. #else
  21170. ctx->rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_RNG);
  21171. if (ctx->rng != NULL) {
  21172. #if defined(HAVE_FIPS) && FIPS_VERSION_GE(2,0)
  21173. ret = wc_InitRngNonce(ctx->rng, (byte*)pers, (word32)perslen);
  21174. #else
  21175. ret = wc_InitRng(ctx->rng);
  21176. (void)pers;
  21177. (void)perslen;
  21178. #endif
  21179. if (ret != 0) {
  21180. WOLFSSL_ERROR(ret);
  21181. XFREE(ctx->rng, NULL, DYNAMIC_TYPE_RNG);
  21182. ctx->rng = NULL;
  21183. }
  21184. }
  21185. #endif
  21186. }
  21187. if (ctx != NULL && ctx->rng != NULL) {
  21188. ctx->status = DRBG_STATUS_READY;
  21189. ret = WOLFSSL_SUCCESS;
  21190. }
  21191. return ret;
  21192. }
  21193. int wolfSSL_FIPS_drbg_set_callbacks(WOLFSSL_DRBG_CTX* ctx,
  21194. drbg_entropy_get entropy_get, drbg_entropy_clean entropy_clean,
  21195. size_t entropy_blocklen,
  21196. drbg_nonce_get none_get, drbg_nonce_clean nonce_clean)
  21197. {
  21198. int ret = WOLFSSL_FAILURE;
  21199. if (ctx != NULL) {
  21200. ctx->entropy_get = entropy_get;
  21201. ctx->entropy_clean = entropy_clean;
  21202. ctx->entropy_blocklen = entropy_blocklen;
  21203. ctx->none_get = none_get;
  21204. ctx->nonce_clean = nonce_clean;
  21205. ret = WOLFSSL_SUCCESS;
  21206. }
  21207. return ret;
  21208. }
  21209. void wolfSSL_FIPS_rand_add(const void* buf, int num, double entropy)
  21210. {
  21211. /* not implemented */
  21212. (void)buf;
  21213. (void)num;
  21214. (void)entropy;
  21215. }
  21216. int wolfSSL_FIPS_drbg_reseed(WOLFSSL_DRBG_CTX* ctx, const unsigned char* adin,
  21217. size_t adinlen)
  21218. {
  21219. int ret = WOLFSSL_FAILURE;
  21220. if (ctx != NULL && ctx->rng != NULL) {
  21221. #if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || \
  21222. (defined(HAVE_FIPS) && FIPS_VERSION_GE(2,0)))
  21223. if (wc_RNG_DRBG_Reseed(ctx->rng, adin, (word32)adinlen) == 0) {
  21224. ret = WOLFSSL_SUCCESS;
  21225. }
  21226. #else
  21227. ret = WOLFSSL_SUCCESS;
  21228. (void)adin;
  21229. (void)adinlen;
  21230. #endif
  21231. }
  21232. return ret;
  21233. }
  21234. int wolfSSL_FIPS_drbg_generate(WOLFSSL_DRBG_CTX* ctx, unsigned char* out,
  21235. size_t outlen, int prediction_resistance, const unsigned char* adin,
  21236. size_t adinlen)
  21237. {
  21238. int ret = WOLFSSL_FAILURE;
  21239. if (ctx != NULL && ctx->rng != NULL) {
  21240. ret = wc_RNG_GenerateBlock(ctx->rng, out, (word32)outlen);
  21241. if (ret == 0) {
  21242. ret = WOLFSSL_SUCCESS;
  21243. }
  21244. }
  21245. (void)prediction_resistance;
  21246. (void)adin;
  21247. (void)adinlen;
  21248. return ret;
  21249. }
  21250. int wolfSSL_FIPS_drbg_uninstantiate(WOLFSSL_DRBG_CTX *ctx)
  21251. {
  21252. if (ctx != NULL && ctx->rng != NULL) {
  21253. #if !defined(HAVE_SELFTEST) && (!defined(HAVE_FIPS) || \
  21254. (defined(HAVE_FIPS) && FIPS_VERSION_GE(5,0)))
  21255. wc_rng_free(ctx->rng);
  21256. #else
  21257. wc_FreeRng(ctx->rng);
  21258. XFREE(ctx->rng, NULL, DYNAMIC_TYPE_RNG);
  21259. #endif
  21260. ctx->rng = NULL;
  21261. ctx->status = DRBG_STATUS_UNINITIALISED;
  21262. }
  21263. return WOLFSSL_SUCCESS;
  21264. }
  21265. void wolfSSL_FIPS_drbg_free(WOLFSSL_DRBG_CTX *ctx)
  21266. {
  21267. if (ctx != NULL) {
  21268. /* As safety check if free'ing the default drbg, then mark global NULL.
  21269. * Technically the user should not call free on the default drbg. */
  21270. if (ctx == gDrbgDefCtx) {
  21271. gDrbgDefCtx = NULL;
  21272. }
  21273. wolfSSL_FIPS_drbg_uninstantiate(ctx);
  21274. XFREE(ctx, NULL, DYNAMIC_TYPE_OPENSSL);
  21275. }
  21276. }
  21277. WOLFSSL_DRBG_CTX* wolfSSL_FIPS_get_default_drbg(void)
  21278. {
  21279. if (gDrbgDefCtx == NULL) {
  21280. gDrbgDefCtx = wolfSSL_FIPS_drbg_new(0, 0);
  21281. }
  21282. return gDrbgDefCtx;
  21283. }
  21284. void wolfSSL_FIPS_get_timevec(unsigned char* buf, unsigned long* pctr)
  21285. {
  21286. /* not implemented */
  21287. (void)buf;
  21288. (void)pctr;
  21289. }
  21290. void* wolfSSL_FIPS_drbg_get_app_data(WOLFSSL_DRBG_CTX *ctx)
  21291. {
  21292. if (ctx != NULL) {
  21293. return ctx->app_data;
  21294. }
  21295. return NULL;
  21296. }
  21297. void wolfSSL_FIPS_drbg_set_app_data(WOLFSSL_DRBG_CTX *ctx, void *app_data)
  21298. {
  21299. if (ctx != NULL) {
  21300. ctx->app_data = app_data;
  21301. }
  21302. }
  21303. #endif
  21304. /*******************************************************************************
  21305. * END OF OPENSSL FIPS DRBG APIs
  21306. ******************************************************************************/
  21307. #endif /* !WOLFCRYPT_ONLY */