yuzu/externals/libressl/ssl/ssl_versions.c

368 lines
9.1 KiB
C
Raw Normal View History

2022-04-25 00:29:35 +04:00
/* $OpenBSD: ssl_versions.c,v 1.22 2022/02/05 14:54:10 jsing Exp $ */
2020-12-28 19:15:37 +04:00
/*
* Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include "ssl_locl.h"
2022-04-25 00:29:35 +04:00
static uint16_t
ssl_dtls_to_tls_version(uint16_t dtls_ver)
{
if (dtls_ver == DTLS1_VERSION)
return TLS1_1_VERSION;
if (dtls_ver == DTLS1_2_VERSION)
return TLS1_2_VERSION;
return 0;
}
static uint16_t
ssl_tls_to_dtls_version(uint16_t tls_ver)
{
if (tls_ver == TLS1_1_VERSION)
return DTLS1_VERSION;
if (tls_ver == TLS1_2_VERSION)
return DTLS1_2_VERSION;
return 0;
}
2020-12-28 19:15:37 +04:00
static int
2022-04-25 00:29:35 +04:00
ssl_clamp_tls_version_range(uint16_t *min_ver, uint16_t *max_ver,
2020-12-28 19:15:37 +04:00
uint16_t clamp_min, uint16_t clamp_max)
{
if (clamp_min > clamp_max || *min_ver > *max_ver)
return 0;
if (clamp_max < *min_ver || clamp_min > *max_ver)
return 0;
if (*min_ver < clamp_min)
*min_ver = clamp_min;
if (*max_ver > clamp_max)
*max_ver = clamp_max;
return 1;
}
int
2022-04-25 00:29:35 +04:00
ssl_version_set_min(const SSL_METHOD *meth, uint16_t proto_ver,
uint16_t max_tls_ver, uint16_t *out_tls_ver, uint16_t *out_proto_ver)
2020-12-28 19:15:37 +04:00
{
2022-04-25 00:29:35 +04:00
uint16_t min_proto, min_version, max_version;
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
if (proto_ver == 0) {
*out_tls_ver = meth->min_tls_version;
*out_proto_ver = 0;
2020-12-28 19:15:37 +04:00
return 1;
}
2022-04-25 00:29:35 +04:00
min_version = proto_ver;
max_version = max_tls_ver;
if (meth->dtls) {
if ((min_version = ssl_dtls_to_tls_version(proto_ver)) == 0)
return 0;
}
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
meth->min_tls_version, meth->max_tls_version))
2020-12-28 19:15:37 +04:00
return 0;
2022-04-25 00:29:35 +04:00
min_proto = min_version;
if (meth->dtls) {
if ((min_proto = ssl_tls_to_dtls_version(min_version)) == 0)
return 0;
}
*out_tls_ver = min_version;
*out_proto_ver = min_proto;
2020-12-28 19:15:37 +04:00
return 1;
}
int
2022-04-25 00:29:35 +04:00
ssl_version_set_max(const SSL_METHOD *meth, uint16_t proto_ver,
uint16_t min_tls_ver, uint16_t *out_tls_ver, uint16_t *out_proto_ver)
2020-12-28 19:15:37 +04:00
{
2022-04-25 00:29:35 +04:00
uint16_t max_proto, min_version, max_version;
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
if (proto_ver == 0) {
*out_tls_ver = meth->max_tls_version;
*out_proto_ver = 0;
2020-12-28 19:15:37 +04:00
return 1;
}
2022-04-25 00:29:35 +04:00
min_version = min_tls_ver;
max_version = proto_ver;
if (meth->dtls) {
if ((max_version = ssl_dtls_to_tls_version(proto_ver)) == 0)
return 0;
}
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
meth->min_tls_version, meth->max_tls_version))
2020-12-28 19:15:37 +04:00
return 0;
2022-04-25 00:29:35 +04:00
max_proto = max_version;
if (meth->dtls) {
if ((max_proto = ssl_tls_to_dtls_version(max_version)) == 0)
return 0;
}
*out_tls_ver = max_version;
*out_proto_ver = max_proto;
2020-12-28 19:15:37 +04:00
return 1;
}
int
2022-04-25 00:29:35 +04:00
ssl_enabled_tls_version_range(SSL *s, uint16_t *min_ver, uint16_t *max_ver)
2020-12-28 19:15:37 +04:00
{
uint16_t min_version, max_version;
2022-04-25 00:29:35 +04:00
unsigned long options;
2020-12-28 19:15:37 +04:00
/*
* The enabled versions have to be a contiguous range, which means we
* cannot enable and disable single versions at our whim, even though
* this is what the OpenSSL flags allow. The historical way this has
* been handled is by making a flag mean that all higher versions
* are disabled, if any version lower than the flag is enabled.
*/
min_version = 0;
max_version = TLS1_3_VERSION;
2022-04-25 00:29:35 +04:00
options = s->internal->options;
if (SSL_is_dtls(s)) {
options = 0;
if (s->internal->options & SSL_OP_NO_DTLSv1)
options |= SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1;
if (s->internal->options & SSL_OP_NO_DTLSv1_2)
options |= SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_2;
}
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
if ((options & SSL_OP_NO_TLSv1) == 0)
2020-12-28 19:15:37 +04:00
min_version = TLS1_VERSION;
2022-04-25 00:29:35 +04:00
else if ((options & SSL_OP_NO_TLSv1_1) == 0)
2020-12-28 19:15:37 +04:00
min_version = TLS1_1_VERSION;
2022-04-25 00:29:35 +04:00
else if ((options & SSL_OP_NO_TLSv1_2) == 0)
2020-12-28 19:15:37 +04:00
min_version = TLS1_2_VERSION;
2022-04-25 00:29:35 +04:00
else if ((options & SSL_OP_NO_TLSv1_3) == 0)
2020-12-28 19:15:37 +04:00
min_version = TLS1_3_VERSION;
2022-04-25 00:29:35 +04:00
if ((options & SSL_OP_NO_TLSv1_3) && min_version < TLS1_3_VERSION)
2020-12-28 19:15:37 +04:00
max_version = TLS1_2_VERSION;
2022-04-25 00:29:35 +04:00
if ((options & SSL_OP_NO_TLSv1_2) && min_version < TLS1_2_VERSION)
2020-12-28 19:15:37 +04:00
max_version = TLS1_1_VERSION;
2022-04-25 00:29:35 +04:00
if ((options & SSL_OP_NO_TLSv1_1) && min_version < TLS1_1_VERSION)
2020-12-28 19:15:37 +04:00
max_version = TLS1_VERSION;
2022-04-25 00:29:35 +04:00
if ((options & SSL_OP_NO_TLSv1) && min_version < TLS1_VERSION)
2020-12-28 19:15:37 +04:00
max_version = 0;
/* Everything has been disabled... */
if (min_version == 0 || max_version == 0)
return 0;
/* Limit to configured version range. */
2022-04-25 00:29:35 +04:00
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
s->internal->min_tls_version, s->internal->max_tls_version))
2020-12-28 19:15:37 +04:00
return 0;
if (min_ver != NULL)
*min_ver = min_version;
if (max_ver != NULL)
*max_ver = max_version;
return 1;
}
int
2022-04-25 00:29:35 +04:00
ssl_supported_tls_version_range(SSL *s, uint16_t *min_ver, uint16_t *max_ver)
2020-12-28 19:15:37 +04:00
{
uint16_t min_version, max_version;
2022-04-25 00:29:35 +04:00
if (!ssl_enabled_tls_version_range(s, &min_version, &max_version))
2020-12-28 19:15:37 +04:00
return 0;
/* Limit to the versions supported by this method. */
2022-04-25 00:29:35 +04:00
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
s->method->min_tls_version, s->method->max_tls_version))
2020-12-28 19:15:37 +04:00
return 0;
if (min_ver != NULL)
*min_ver = min_version;
if (max_ver != NULL)
*max_ver = max_version;
return 1;
}
2022-04-25 00:29:35 +04:00
uint16_t
ssl_tls_version(uint16_t version)
{
if (version == TLS1_VERSION || version == TLS1_1_VERSION ||
version == TLS1_2_VERSION || version == TLS1_3_VERSION)
return version;
if (version == DTLS1_VERSION)
return TLS1_1_VERSION;
if (version == DTLS1_2_VERSION)
return TLS1_2_VERSION;
return 0;
}
uint16_t
ssl_effective_tls_version(SSL *s)
{
if (s->s3->hs.negotiated_tls_version > 0)
return s->s3->hs.negotiated_tls_version;
return s->s3->hs.our_max_tls_version;
}
2020-12-28 19:15:37 +04:00
int
2022-04-25 00:29:35 +04:00
ssl_max_supported_version(SSL *s, uint16_t *max_ver)
2020-12-28 19:15:37 +04:00
{
2022-04-25 00:29:35 +04:00
uint16_t max_version;
2020-12-28 19:15:37 +04:00
*max_ver = 0;
2022-04-25 00:29:35 +04:00
if (!ssl_supported_tls_version_range(s, NULL, &max_version))
2020-12-28 19:15:37 +04:00
return 0;
2022-04-25 00:29:35 +04:00
if (SSL_is_dtls(s)) {
if ((max_version = ssl_tls_to_dtls_version(max_version)) == 0)
return 0;
}
*max_ver = max_version;
return 1;
}
int
ssl_max_legacy_version(SSL *s, uint16_t *max_ver)
{
uint16_t max_version;
if ((max_version = s->s3->hs.our_max_tls_version) > TLS1_2_VERSION)
max_version = TLS1_2_VERSION;
if (SSL_is_dtls(s)) {
if ((max_version = ssl_tls_to_dtls_version(max_version)) == 0)
return 0;
}
*max_ver = max_version;
return 1;
}
int
ssl_max_shared_version(SSL *s, uint16_t peer_ver, uint16_t *max_ver)
{
uint16_t min_version, max_version, peer_tls_version, shared_version;
*max_ver = 0;
peer_tls_version = peer_ver;
if (SSL_is_dtls(s)) {
if ((peer_ver >> 8) != DTLS1_VERSION_MAJOR)
return 0;
/*
* Convert the peer version to a TLS version - DTLS versions are
* the 1's complement of TLS version numbers (but not the actual
* protocol version numbers, that would be too sensible). Not to
* mention that DTLSv1.0 is really equivalent to DTLSv1.1.
*/
peer_tls_version = ssl_dtls_to_tls_version(peer_ver);
/*
* This may be a version that we do not know about, if it is
* newer than DTLS1_2_VERSION (yes, less than is correct due
* to the "clever" versioning scheme), use TLS1_2_VERSION.
*/
if (peer_tls_version == 0) {
if (peer_ver < DTLS1_2_VERSION)
peer_tls_version = TLS1_2_VERSION;
}
2020-12-28 19:15:37 +04:00
}
2022-04-25 00:29:35 +04:00
if (peer_tls_version >= TLS1_3_VERSION)
2020-12-28 19:15:37 +04:00
shared_version = TLS1_3_VERSION;
2022-04-25 00:29:35 +04:00
else if (peer_tls_version >= TLS1_2_VERSION)
2020-12-28 19:15:37 +04:00
shared_version = TLS1_2_VERSION;
2022-04-25 00:29:35 +04:00
else if (peer_tls_version >= TLS1_1_VERSION)
2020-12-28 19:15:37 +04:00
shared_version = TLS1_1_VERSION;
2022-04-25 00:29:35 +04:00
else if (peer_tls_version >= TLS1_VERSION)
2020-12-28 19:15:37 +04:00
shared_version = TLS1_VERSION;
else
return 0;
2022-04-25 00:29:35 +04:00
if (!ssl_supported_tls_version_range(s, &min_version, &max_version))
2020-12-28 19:15:37 +04:00
return 0;
if (shared_version < min_version)
return 0;
if (shared_version > max_version)
shared_version = max_version;
2022-04-25 00:29:35 +04:00
if (SSL_is_dtls(s)) {
/*
* The resulting shared version will by definition be something
* that we know about. Switch back from TLS to DTLS.
*/
shared_version = ssl_tls_to_dtls_version(shared_version);
if (shared_version == 0)
return 0;
}
2020-12-28 19:15:37 +04:00
*max_ver = shared_version;
return 1;
}
int
2022-04-25 00:29:35 +04:00
ssl_check_version_from_server(SSL *s, uint16_t server_version)
2020-12-28 19:15:37 +04:00
{
2022-04-25 00:29:35 +04:00
uint16_t min_tls_version, max_tls_version, server_tls_version;
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
/* Ensure that the version selected by the server is valid. */
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
server_tls_version = server_version;
if (SSL_is_dtls(s)) {
server_tls_version = ssl_dtls_to_tls_version(server_version);
if (server_tls_version == 0)
return 0;
2020-12-28 19:15:37 +04:00
}
2022-04-25 00:29:35 +04:00
if (!ssl_supported_tls_version_range(s, &min_tls_version,
&max_tls_version))
2020-12-28 19:15:37 +04:00
return 0;
2022-04-25 00:29:35 +04:00
return (server_tls_version >= min_tls_version &&
server_tls_version <= max_tls_version);
}
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
int
ssl_legacy_stack_version(SSL *s, uint16_t version)
{
if (SSL_is_dtls(s))
return version == DTLS1_VERSION || version == DTLS1_2_VERSION;
2020-12-28 19:15:37 +04:00
2022-04-25 00:29:35 +04:00
return version == TLS1_VERSION || version == TLS1_1_VERSION ||
version == TLS1_2_VERSION;
2020-12-28 19:15:37 +04:00
}