|
|
|
@ -132,40 +132,44 @@ int tls1_clear(SSL *s)
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Table of curve information.
|
|
|
|
|
* Do not delete entries or reorder this array! It is used as a lookup
|
|
|
|
|
* table: the index of each entry is one less than the TLS curve id.
|
|
|
|
|
*/
|
|
|
|
|
static const TLS_GROUP_INFO nid_list[] = {
|
|
|
|
|
{NID_sect163k1, 80, TLS_CURVE_CHAR2}, /* sect163k1 (1) */
|
|
|
|
|
{NID_sect163r1, 80, TLS_CURVE_CHAR2}, /* sect163r1 (2) */
|
|
|
|
|
{NID_sect163r2, 80, TLS_CURVE_CHAR2}, /* sect163r2 (3) */
|
|
|
|
|
{NID_sect193r1, 80, TLS_CURVE_CHAR2}, /* sect193r1 (4) */
|
|
|
|
|
{NID_sect193r2, 80, TLS_CURVE_CHAR2}, /* sect193r2 (5) */
|
|
|
|
|
{NID_sect233k1, 112, TLS_CURVE_CHAR2}, /* sect233k1 (6) */
|
|
|
|
|
{NID_sect233r1, 112, TLS_CURVE_CHAR2}, /* sect233r1 (7) */
|
|
|
|
|
{NID_sect239k1, 112, TLS_CURVE_CHAR2}, /* sect239k1 (8) */
|
|
|
|
|
{NID_sect283k1, 128, TLS_CURVE_CHAR2}, /* sect283k1 (9) */
|
|
|
|
|
{NID_sect283r1, 128, TLS_CURVE_CHAR2}, /* sect283r1 (10) */
|
|
|
|
|
{NID_sect409k1, 192, TLS_CURVE_CHAR2}, /* sect409k1 (11) */
|
|
|
|
|
{NID_sect409r1, 192, TLS_CURVE_CHAR2}, /* sect409r1 (12) */
|
|
|
|
|
{NID_sect571k1, 256, TLS_CURVE_CHAR2}, /* sect571k1 (13) */
|
|
|
|
|
{NID_sect571r1, 256, TLS_CURVE_CHAR2}, /* sect571r1 (14) */
|
|
|
|
|
{NID_secp160k1, 80, TLS_CURVE_PRIME}, /* secp160k1 (15) */
|
|
|
|
|
{NID_secp160r1, 80, TLS_CURVE_PRIME}, /* secp160r1 (16) */
|
|
|
|
|
{NID_secp160r2, 80, TLS_CURVE_PRIME}, /* secp160r2 (17) */
|
|
|
|
|
{NID_secp192k1, 80, TLS_CURVE_PRIME}, /* secp192k1 (18) */
|
|
|
|
|
{NID_X9_62_prime192v1, 80, TLS_CURVE_PRIME}, /* secp192r1 (19) */
|
|
|
|
|
{NID_secp224k1, 112, TLS_CURVE_PRIME}, /* secp224k1 (20) */
|
|
|
|
|
{NID_secp224r1, 112, TLS_CURVE_PRIME}, /* secp224r1 (21) */
|
|
|
|
|
{NID_secp256k1, 128, TLS_CURVE_PRIME}, /* secp256k1 (22) */
|
|
|
|
|
{NID_X9_62_prime256v1, 128, TLS_CURVE_PRIME}, /* secp256r1 (23) */
|
|
|
|
|
{NID_secp384r1, 192, TLS_CURVE_PRIME}, /* secp384r1 (24) */
|
|
|
|
|
{NID_secp521r1, 256, TLS_CURVE_PRIME}, /* secp521r1 (25) */
|
|
|
|
|
{NID_brainpoolP256r1, 128, TLS_CURVE_PRIME}, /* brainpoolP256r1 (26) */
|
|
|
|
|
{NID_brainpoolP384r1, 192, TLS_CURVE_PRIME}, /* brainpoolP384r1 (27) */
|
|
|
|
|
{NID_brainpoolP512r1, 256, TLS_CURVE_PRIME}, /* brainpool512r1 (28) */
|
|
|
|
|
{EVP_PKEY_X25519, 128, TLS_CURVE_CUSTOM}, /* X25519 (29) */
|
|
|
|
|
{EVP_PKEY_X448, 224, TLS_CURVE_CUSTOM}, /* X448 (30) */
|
|
|
|
|
{NID_sect163k1, 80, TLS_GROUP_CURVE_CHAR2, 0x0001}, /* sect163k1 (1) */
|
|
|
|
|
{NID_sect163r1, 80, TLS_GROUP_CURVE_CHAR2, 0x0002}, /* sect163r1 (2) */
|
|
|
|
|
{NID_sect163r2, 80, TLS_GROUP_CURVE_CHAR2, 0x0003}, /* sect163r2 (3) */
|
|
|
|
|
{NID_sect193r1, 80, TLS_GROUP_CURVE_CHAR2, 0x0004}, /* sect193r1 (4) */
|
|
|
|
|
{NID_sect193r2, 80, TLS_GROUP_CURVE_CHAR2, 0x0005}, /* sect193r2 (5) */
|
|
|
|
|
{NID_sect233k1, 112, TLS_GROUP_CURVE_CHAR2, 0x0006}, /* sect233k1 (6) */
|
|
|
|
|
{NID_sect233r1, 112, TLS_GROUP_CURVE_CHAR2, 0x0007}, /* sect233r1 (7) */
|
|
|
|
|
{NID_sect239k1, 112, TLS_GROUP_CURVE_CHAR2, 0x0008}, /* sect239k1 (8) */
|
|
|
|
|
{NID_sect283k1, 128, TLS_GROUP_CURVE_CHAR2, 0x0009}, /* sect283k1 (9) */
|
|
|
|
|
{NID_sect283r1, 128, TLS_GROUP_CURVE_CHAR2, 0x000A}, /* sect283r1 (10) */
|
|
|
|
|
{NID_sect409k1, 192, TLS_GROUP_CURVE_CHAR2, 0x000B}, /* sect409k1 (11) */
|
|
|
|
|
{NID_sect409r1, 192, TLS_GROUP_CURVE_CHAR2, 0x000C}, /* sect409r1 (12) */
|
|
|
|
|
{NID_sect571k1, 256, TLS_GROUP_CURVE_CHAR2, 0x000D}, /* sect571k1 (13) */
|
|
|
|
|
{NID_sect571r1, 256, TLS_GROUP_CURVE_CHAR2, 0x000E}, /* sect571r1 (14) */
|
|
|
|
|
{NID_secp160k1, 80, TLS_GROUP_CURVE_PRIME, 0x000F}, /* secp160k1 (15) */
|
|
|
|
|
{NID_secp160r1, 80, TLS_GROUP_CURVE_PRIME, 0x0010}, /* secp160r1 (16) */
|
|
|
|
|
{NID_secp160r2, 80, TLS_GROUP_CURVE_PRIME, 0x0011}, /* secp160r2 (17) */
|
|
|
|
|
{NID_secp192k1, 80, TLS_GROUP_CURVE_PRIME, 0x0012}, /* secp192k1 (18) */
|
|
|
|
|
{NID_X9_62_prime192v1, 80, TLS_GROUP_CURVE_PRIME, 0x0013}, /* secp192r1 (19) */
|
|
|
|
|
{NID_secp224k1, 112, TLS_GROUP_CURVE_PRIME, 0x0014}, /* secp224k1 (20) */
|
|
|
|
|
{NID_secp224r1, 112, TLS_GROUP_CURVE_PRIME, 0x0015}, /* secp224r1 (21) */
|
|
|
|
|
{NID_secp256k1, 128, TLS_GROUP_CURVE_PRIME, 0x0016}, /* secp256k1 (22) */
|
|
|
|
|
{NID_X9_62_prime256v1, 128, TLS_GROUP_CURVE_PRIME, 0x0017}, /* secp256r1 (23) */
|
|
|
|
|
{NID_secp384r1, 192, TLS_GROUP_CURVE_PRIME, 0x0018}, /* secp384r1 (24) */
|
|
|
|
|
{NID_secp521r1, 256, TLS_GROUP_CURVE_PRIME, 0x0019}, /* secp521r1 (25) */
|
|
|
|
|
{NID_brainpoolP256r1, 128, TLS_GROUP_CURVE_PRIME, 0x001A}, /* brainpoolP256r1 (26) */
|
|
|
|
|
{NID_brainpoolP384r1, 192, TLS_GROUP_CURVE_PRIME, 0x001B}, /* brainpoolP384r1 (27) */
|
|
|
|
|
{NID_brainpoolP512r1, 256, TLS_GROUP_CURVE_PRIME, 0x001C}, /* brainpool512r1 (28) */
|
|
|
|
|
{EVP_PKEY_X25519, 128, TLS_GROUP_CURVE_CUSTOM, 0x001D}, /* X25519 (29) */
|
|
|
|
|
{EVP_PKEY_X448, 224, TLS_GROUP_CURVE_CUSTOM, 0x001E}, /* X448 (30) */
|
|
|
|
|
/* Security bit values for FFDHE groups are updated as per RFC 7919 */
|
|
|
|
|
{NID_ffdhe2048, 103, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0100}, /* ffdhe2048 (0x0100) */
|
|
|
|
|
{NID_ffdhe3072, 125, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0101}, /* ffdhe3072 (0x0101) */
|
|
|
|
|
{NID_ffdhe4096, 150, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0102}, /* ffdhe4096 (0x0102) */
|
|
|
|
|
{NID_ffdhe6144, 175, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0103}, /* ffdhe6144 (0x0103) */
|
|
|
|
|
{NID_ffdhe8192, 192, TLS_GROUP_FFDHE_FOR_TLS1_3, 0x0104}, /* ffdhe8192 (0x0104) */
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static const unsigned char ecformats_default[] = {
|
|
|
|
@ -175,12 +179,17 @@ static const unsigned char ecformats_default[] = {
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
/* The default curves */
|
|
|
|
|
static const uint16_t eccurves_default[] = {
|
|
|
|
|
static const uint16_t supported_groups_default[] = {
|
|
|
|
|
29, /* X25519 (29) */
|
|
|
|
|
23, /* secp256r1 (23) */
|
|
|
|
|
30, /* X448 (30) */
|
|
|
|
|
25, /* secp521r1 (25) */
|
|
|
|
|
24, /* secp384r1 (24) */
|
|
|
|
|
0x100, /* ffdhe2048 (0x100) */
|
|
|
|
|
0x101, /* ffdhe3072 (0x101) */
|
|
|
|
|
0x102, /* ffdhe4096 (0x102) */
|
|
|
|
|
0x103, /* ffdhe6144 (0x103) */
|
|
|
|
|
0x104, /* ffdhe8192 (0x104) */
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static const uint16_t suiteb_curves[] = {
|
|
|
|
@ -190,18 +199,23 @@ static const uint16_t suiteb_curves[] = {
|
|
|
|
|
|
|
|
|
|
const TLS_GROUP_INFO *tls1_group_id_lookup(uint16_t group_id)
|
|
|
|
|
{
|
|
|
|
|
/* ECC curves from RFC 4492 and RFC 7027 */
|
|
|
|
|
if (group_id < 1 || group_id > OSSL_NELEM(nid_list))
|
|
|
|
|
return NULL;
|
|
|
|
|
return &nid_list[group_id - 1];
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
/* ECC curves from RFC 4492 and RFC 7027 FFDHE group from RFC 8446 */
|
|
|
|
|
for (i = 0; i < OSSL_NELEM(nid_list); i++) {
|
|
|
|
|
if (nid_list[i].group_id == group_id)
|
|
|
|
|
return &nid_list[i];
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static uint16_t tls1_nid2group_id(int nid)
|
|
|
|
|
{
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < OSSL_NELEM(nid_list); i++) {
|
|
|
|
|
if (nid_list[i].nid == nid)
|
|
|
|
|
return (uint16_t)(i + 1);
|
|
|
|
|
return nid_list[i].group_id;
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
@ -233,8 +247,8 @@ void tls1_get_supported_groups(SSL *s, const uint16_t **pgroups,
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
if (s->ext.supportedgroups == NULL) {
|
|
|
|
|
*pgroups = eccurves_default;
|
|
|
|
|
*pgroupslen = OSSL_NELEM(eccurves_default);
|
|
|
|
|
*pgroups = supported_groups_default;
|
|
|
|
|
*pgroupslen = OSSL_NELEM(supported_groups_default);
|
|
|
|
|
} else {
|
|
|
|
|
*pgroups = s->ext.supportedgroups;
|
|
|
|
|
*pgroupslen = s->ext.supportedgroups_len;
|
|
|
|
@ -243,6 +257,17 @@ void tls1_get_supported_groups(SSL *s, const uint16_t **pgroups,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int tls_valid_group(SSL *s, uint16_t group_id, int version)
|
|
|
|
|
{
|
|
|
|
|
const TLS_GROUP_INFO *ginfo = tls1_group_id_lookup(group_id);
|
|
|
|
|
|
|
|
|
|
if (version < TLS1_3_VERSION) {
|
|
|
|
|
if ((ginfo->flags & TLS_GROUP_ONLY_FOR_TLS1_3) != 0)
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* See if curve is allowed by security callback */
|
|
|
|
|
int tls_curve_allowed(SSL *s, uint16_t curve, int op)
|
|
|
|
|
{
|
|
|
|
@ -252,7 +277,11 @@ int tls_curve_allowed(SSL *s, uint16_t curve, int op)
|
|
|
|
|
if (cinfo == NULL)
|
|
|
|
|
return 0;
|
|
|
|
|
# ifdef OPENSSL_NO_EC2M
|
|
|
|
|
if (cinfo->flags & TLS_CURVE_CHAR2)
|
|
|
|
|
if (cinfo->flags & TLS_GROUP_CURVE_CHAR2)
|
|
|
|
|
return 0;
|
|
|
|
|
# endif
|
|
|
|
|
# ifdef OPENSSL_NO_DH
|
|
|
|
|
if (cinfo->flags & TLS_GROUP_FFDHE)
|
|
|
|
|
return 0;
|
|
|
|
|
# endif
|
|
|
|
|
ctmp[0] = curve >> 8;
|
|
|
|
@ -338,10 +367,12 @@ int tls1_set_groups(uint16_t **pext, size_t *pextlen,
|
|
|
|
|
uint16_t *glist;
|
|
|
|
|
size_t i;
|
|
|
|
|
/*
|
|
|
|
|
* Bitmap of groups included to detect duplicates: only works while group
|
|
|
|
|
* ids < 32
|
|
|
|
|
* Bitmap of groups included to detect duplicates: two variables are added
|
|
|
|
|
* to detect duplicates as some values are more than 32.
|
|
|
|
|
*/
|
|
|
|
|
unsigned long dup_list = 0;
|
|
|
|
|
unsigned long *dup_list = NULL;
|
|
|
|
|
unsigned long dup_list_egrp = 0;
|
|
|
|
|
unsigned long dup_list_dhgrp = 0;
|
|
|
|
|
|
|
|
|
|
if (ngroups == 0) {
|
|
|
|
|
SSLerr(SSL_F_TLS1_SET_GROUPS, SSL_R_BAD_LENGTH);
|
|
|
|
@ -354,20 +385,23 @@ int tls1_set_groups(uint16_t **pext, size_t *pextlen,
|
|
|
|
|
for (i = 0; i < ngroups; i++) {
|
|
|
|
|
unsigned long idmask;
|
|
|
|
|
uint16_t id;
|
|
|
|
|
/* TODO(TLS1.3): Convert for DH groups */
|
|
|
|
|
id = tls1_nid2group_id(groups[i]);
|
|
|
|
|
idmask = 1L << id;
|
|
|
|
|
if (!id || (dup_list & idmask)) {
|
|
|
|
|
OPENSSL_free(glist);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
dup_list |= idmask;
|
|
|
|
|
if ((id & 0x00FF) >= (sizeof(unsigned long) * 8))
|
|
|
|
|
goto err;
|
|
|
|
|
idmask = 1L << (id & 0x00FF);
|
|
|
|
|
dup_list = (id < 0x100) ? &dup_list_egrp : &dup_list_dhgrp;
|
|
|
|
|
if (!id || ((*dup_list) & idmask))
|
|
|
|
|
goto err;
|
|
|
|
|
*dup_list |= idmask;
|
|
|
|
|
glist[i] = id;
|
|
|
|
|
}
|
|
|
|
|
OPENSSL_free(*pext);
|
|
|
|
|
*pext = glist;
|
|
|
|
|
*pextlen = ngroups;
|
|
|
|
|
return 1;
|
|
|
|
|
err:
|
|
|
|
|
OPENSSL_free(glist);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
# define MAX_CURVELIST OSSL_NELEM(nid_list)
|
|
|
|
|