apply patch supplied with OpenSSL Security Advisory [30 July 2002]
advisory 1: four potentially remotely-exploitable vulnerability in SSL2/SSL3 code advisory 2: ASN1 parser vulnerability (all SSL/TLS apps affected)
This commit is contained in:
parent
c68c6aa7e0
commit
e9316c8858
|
@ -1,4 +1,4 @@
|
||||||
# $NetBSD: Makefile.openssl,v 1.6 2002/06/09 16:12:52 itojun Exp $
|
# $NetBSD: Makefile.openssl,v 1.7 2002/07/30 12:55:08 itojun Exp $
|
||||||
|
|
||||||
.ifndef _MAKEFILE_OPENSSL_INCLUDED
|
.ifndef _MAKEFILE_OPENSSL_INCLUDED
|
||||||
_MAKEFILE_OPENSSL_INCLUDED=1
|
_MAKEFILE_OPENSSL_INCLUDED=1
|
||||||
|
@ -8,5 +8,6 @@ _MAKEFILE_OPENSSL_INCLUDED=1
|
||||||
OPENSSLSRC= ${CRYPTODIST}/openssl
|
OPENSSLSRC= ${CRYPTODIST}/openssl
|
||||||
CPPFLAGS+= -DOPENSSLDIR=\"/etc/openssl\"
|
CPPFLAGS+= -DOPENSSLDIR=\"/etc/openssl\"
|
||||||
CPPFLAGS+= -DDSO_DLFCN -DHAVE_DLFCN_H
|
CPPFLAGS+= -DDSO_DLFCN -DHAVE_DLFCN_H
|
||||||
|
CPPFLAGS+= -I${CRYPTODIST}/openssl/crypto
|
||||||
|
|
||||||
.endif
|
.endif
|
||||||
|
|
|
@ -2,6 +2,35 @@
|
||||||
OpenSSL CHANGES
|
OpenSSL CHANGES
|
||||||
_______________
|
_______________
|
||||||
|
|
||||||
|
Changes in security patch
|
||||||
|
|
||||||
|
Changes marked "(CHATS)" were sponsored by the Defense Advanced
|
||||||
|
Research Projects Agency (DARPA) and Air Force Research Laboratory,
|
||||||
|
Air Force Materiel Command, USAF, under agreement number
|
||||||
|
F30602-01-2-0537.
|
||||||
|
|
||||||
|
*) Add various sanity checks to asn1_get_length() to reject
|
||||||
|
the ASN1 length bytes if they exceed sizeof(long), will appear
|
||||||
|
negative or the content length exceeds the length of the
|
||||||
|
supplied buffer. (CAN-2002-0659)
|
||||||
|
[Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>]
|
||||||
|
|
||||||
|
*) Assertions for various potential buffer overflows, not known to
|
||||||
|
happen in practice.
|
||||||
|
[Ben Laurie (CHATS)]
|
||||||
|
|
||||||
|
*) Various temporary buffers to hold ASCII versions of integers were
|
||||||
|
too small for 64 bit platforms. (CAN-2002-0655)
|
||||||
|
[Matthew Byng-Maddick <mbm@aldigital.co.uk> and Ben Laurie (CHATS)>
|
||||||
|
|
||||||
|
*) Remote buffer overflow in SSL3 protocol - an attacker could
|
||||||
|
supply an oversized session ID to a client. (CAN-2002-0656)
|
||||||
|
[Ben Laurie (CHATS)]
|
||||||
|
|
||||||
|
*) Remote buffer overflow in SSL2 protocol - an attacker could
|
||||||
|
supply an oversized client master key. (CAN-2002-0656)
|
||||||
|
[Ben Laurie (CHATS)]
|
||||||
|
|
||||||
Changes between 0.9.6c and 0.9.6d [9 May 2002]
|
Changes between 0.9.6c and 0.9.6d [9 May 2002]
|
||||||
|
|
||||||
*) Fix crypto/asn1/a_sign.c so that 'parameters' is omitted (not
|
*) Fix crypto/asn1/a_sign.c so that 'parameters' is omitted (not
|
||||||
|
|
|
@ -124,15 +124,13 @@ int ASN1_get_object(unsigned char **pp, long *plength, int *ptag, int *pclass,
|
||||||
(int)(omax+ *pp));
|
(int)(omax+ *pp));
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
#if 0
|
if (*plength > (omax - (*pp - p)))
|
||||||
if ((p+ *plength) > (omax+ *pp))
|
|
||||||
{
|
{
|
||||||
ASN1err(ASN1_F_ASN1_GET_OBJECT,ASN1_R_TOO_LONG);
|
ASN1err(ASN1_F_ASN1_GET_OBJECT,ASN1_R_TOO_LONG);
|
||||||
/* Set this so that even if things are not long enough
|
/* Set this so that even if things are not long enough
|
||||||
* the values are set correctly */
|
* the values are set correctly */
|
||||||
ret|=0x80;
|
ret|=0x80;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
*pp=p;
|
*pp=p;
|
||||||
return(ret|inf);
|
return(ret|inf);
|
||||||
err:
|
err:
|
||||||
|
@ -159,6 +157,8 @@ static int asn1_get_length(unsigned char **pp, int *inf, long *rl, int max)
|
||||||
i= *p&0x7f;
|
i= *p&0x7f;
|
||||||
if (*(p++) & 0x80)
|
if (*(p++) & 0x80)
|
||||||
{
|
{
|
||||||
|
if (i > sizeof(long))
|
||||||
|
return 0;
|
||||||
if (max-- == 0) return(0);
|
if (max-- == 0) return(0);
|
||||||
while (i-- > 0)
|
while (i-- > 0)
|
||||||
{
|
{
|
||||||
|
@ -170,6 +170,8 @@ static int asn1_get_length(unsigned char **pp, int *inf, long *rl, int max)
|
||||||
else
|
else
|
||||||
ret=i;
|
ret=i;
|
||||||
}
|
}
|
||||||
|
if (ret < 0)
|
||||||
|
return 0;
|
||||||
*pp=p;
|
*pp=p;
|
||||||
*rl=ret;
|
*rl=ret;
|
||||||
return(1);
|
return(1);
|
||||||
|
@ -407,7 +409,7 @@ int ASN1_STRING_cmp(ASN1_STRING *a, ASN1_STRING *b)
|
||||||
|
|
||||||
void asn1_add_error(unsigned char *address, int offset)
|
void asn1_add_error(unsigned char *address, int offset)
|
||||||
{
|
{
|
||||||
char buf1[16],buf2[16];
|
char buf1[DECIMAL_SIZE(address)+1],buf2[DECIMAL_SIZE(offset)+1];
|
||||||
|
|
||||||
sprintf(buf1,"%lu",(unsigned long)address);
|
sprintf(buf1,"%lu",(unsigned long)address);
|
||||||
sprintf(buf2,"%d",offset);
|
sprintf(buf2,"%d",offset);
|
||||||
|
|
|
@ -67,6 +67,7 @@
|
||||||
#include "conf_def.h"
|
#include "conf_def.h"
|
||||||
#include <openssl/buffer.h>
|
#include <openssl/buffer.h>
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
static char *eat_ws(CONF *conf, char *p);
|
static char *eat_ws(CONF *conf, char *p);
|
||||||
static char *eat_alpha_numeric(CONF *conf, char *p);
|
static char *eat_alpha_numeric(CONF *conf, char *p);
|
||||||
|
@ -180,12 +181,12 @@ static int def_destroy_data(CONF *conf)
|
||||||
static int def_load(CONF *conf, BIO *in, long *line)
|
static int def_load(CONF *conf, BIO *in, long *line)
|
||||||
{
|
{
|
||||||
#define BUFSIZE 512
|
#define BUFSIZE 512
|
||||||
char btmp[16];
|
|
||||||
int bufnum=0,i,ii;
|
int bufnum=0,i,ii;
|
||||||
BUF_MEM *buff=NULL;
|
BUF_MEM *buff=NULL;
|
||||||
char *s,*p,*end;
|
char *s,*p,*end;
|
||||||
int again,n;
|
int again,n;
|
||||||
long eline=0;
|
long eline=0;
|
||||||
|
char btmp[DECIMAL_SIZE(eline)+1];
|
||||||
CONF_VALUE *v=NULL,*tv;
|
CONF_VALUE *v=NULL,*tv;
|
||||||
CONF_VALUE *sv=NULL;
|
CONF_VALUE *sv=NULL;
|
||||||
char *section=NULL,*buf;
|
char *section=NULL,*buf;
|
||||||
|
|
|
@ -491,3 +491,11 @@ BOOL WINAPI DLLEntryPoint(HINSTANCE hinstDLL, DWORD fdwReason,
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
void OpenSSLDie(const char *file,int line,const char *assertion)
|
||||||
|
{
|
||||||
|
fprintf(stderr,"%s(%d): OpenSSL internal error, assertion failed: %s\n",
|
||||||
|
file,line,assertion);
|
||||||
|
abort();
|
||||||
|
}
|
||||||
|
|
||||||
|
|
|
@ -89,6 +89,14 @@ extern "C" {
|
||||||
#define X509_CERT_DIR_EVP "SSL_CERT_DIR"
|
#define X509_CERT_DIR_EVP "SSL_CERT_DIR"
|
||||||
#define X509_CERT_FILE_EVP "SSL_CERT_FILE"
|
#define X509_CERT_FILE_EVP "SSL_CERT_FILE"
|
||||||
|
|
||||||
|
/* size of string represenations */
|
||||||
|
#define DECIMAL_SIZE(type) ((sizeof(type)*8+2)/3+1)
|
||||||
|
#define HEX_SIZE(type) ((sizeof(type)*2)
|
||||||
|
|
||||||
|
/* die if we have to */
|
||||||
|
void OpenSSLDie(const char *file,int line,const char *assertion);
|
||||||
|
#define die(e) ((e) ? (void)0 : OpenSSLDie(__FILE__, __LINE__, #e))
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -428,7 +428,7 @@ int OBJ_obj2txt(char *buf, int buf_len, ASN1_OBJECT *a, int no_name)
|
||||||
unsigned long l;
|
unsigned long l;
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
const char *s;
|
const char *s;
|
||||||
char tbuf[32];
|
char tbuf[DECIMAL_SIZE(i)+DECIMAL_SIZE(l)+2];
|
||||||
|
|
||||||
if (buf_len <= 0) return(0);
|
if (buf_len <= 0) return(0);
|
||||||
|
|
||||||
|
|
|
@ -116,6 +116,7 @@
|
||||||
#include <openssl/buffer.h>
|
#include <openssl/buffer.h>
|
||||||
#include <openssl/objects.h>
|
#include <openssl/objects.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
static SSL_METHOD *ssl2_get_client_method(int ver);
|
static SSL_METHOD *ssl2_get_client_method(int ver);
|
||||||
static int get_server_finished(SSL *s);
|
static int get_server_finished(SSL *s);
|
||||||
|
@ -517,6 +518,7 @@ static int get_server_hello(SSL *s)
|
||||||
}
|
}
|
||||||
|
|
||||||
s->s2->conn_id_length=s->s2->tmp.conn_id_length;
|
s->s2->conn_id_length=s->s2->tmp.conn_id_length;
|
||||||
|
die(s->s2->conn_id_length <= sizeof s->s2->conn_id);
|
||||||
memcpy(s->s2->conn_id,p,s->s2->tmp.conn_id_length);
|
memcpy(s->s2->conn_id,p,s->s2->tmp.conn_id_length);
|
||||||
return(1);
|
return(1);
|
||||||
}
|
}
|
||||||
|
@ -618,6 +620,7 @@ static int client_master_key(SSL *s)
|
||||||
/* make key_arg data */
|
/* make key_arg data */
|
||||||
i=EVP_CIPHER_iv_length(c);
|
i=EVP_CIPHER_iv_length(c);
|
||||||
sess->key_arg_length=i;
|
sess->key_arg_length=i;
|
||||||
|
die(i <= SSL_MAX_KEY_ARG_LENGTH);
|
||||||
if (i > 0) RAND_pseudo_bytes(sess->key_arg,i);
|
if (i > 0) RAND_pseudo_bytes(sess->key_arg,i);
|
||||||
|
|
||||||
/* make a master key */
|
/* make a master key */
|
||||||
|
@ -625,6 +628,7 @@ static int client_master_key(SSL *s)
|
||||||
sess->master_key_length=i;
|
sess->master_key_length=i;
|
||||||
if (i > 0)
|
if (i > 0)
|
||||||
{
|
{
|
||||||
|
die(i <= sizeof sess->master_key);
|
||||||
if (RAND_bytes(sess->master_key,i) <= 0)
|
if (RAND_bytes(sess->master_key,i) <= 0)
|
||||||
{
|
{
|
||||||
ssl2_return_error(s,SSL2_PE_UNDEFINED_ERROR);
|
ssl2_return_error(s,SSL2_PE_UNDEFINED_ERROR);
|
||||||
|
@ -668,6 +672,7 @@ static int client_master_key(SSL *s)
|
||||||
d+=enc;
|
d+=enc;
|
||||||
karg=sess->key_arg_length;
|
karg=sess->key_arg_length;
|
||||||
s2n(karg,p); /* key arg size */
|
s2n(karg,p); /* key arg size */
|
||||||
|
die(karg <= sizeof sess->key_arg);
|
||||||
memcpy(d,sess->key_arg,(unsigned int)karg);
|
memcpy(d,sess->key_arg,(unsigned int)karg);
|
||||||
d+=karg;
|
d+=karg;
|
||||||
|
|
||||||
|
@ -688,6 +693,7 @@ static int client_finished(SSL *s)
|
||||||
{
|
{
|
||||||
p=(unsigned char *)s->init_buf->data;
|
p=(unsigned char *)s->init_buf->data;
|
||||||
*(p++)=SSL2_MT_CLIENT_FINISHED;
|
*(p++)=SSL2_MT_CLIENT_FINISHED;
|
||||||
|
die(s->s2->conn_id_length <= sizeof s->s2->conn_id);
|
||||||
memcpy(p,s->s2->conn_id,(unsigned int)s->s2->conn_id_length);
|
memcpy(p,s->s2->conn_id,(unsigned int)s->s2->conn_id_length);
|
||||||
|
|
||||||
s->state=SSL2_ST_SEND_CLIENT_FINISHED_B;
|
s->state=SSL2_ST_SEND_CLIENT_FINISHED_B;
|
||||||
|
@ -944,6 +950,8 @@ static int get_server_finished(SSL *s)
|
||||||
{
|
{
|
||||||
if (!(s->options & SSL_OP_MICROSOFT_SESS_ID_BUG))
|
if (!(s->options & SSL_OP_MICROSOFT_SESS_ID_BUG))
|
||||||
{
|
{
|
||||||
|
die(s->session->session_id_length
|
||||||
|
<= sizeof s->session->session_id);
|
||||||
if (memcmp(buf,s->session->session_id,
|
if (memcmp(buf,s->session->session_id,
|
||||||
(unsigned int)s->session->session_id_length) != 0)
|
(unsigned int)s->session->session_id_length) != 0)
|
||||||
{
|
{
|
||||||
|
|
|
@ -62,6 +62,7 @@
|
||||||
#include <openssl/rsa.h>
|
#include <openssl/rsa.h>
|
||||||
#include <openssl/objects.h>
|
#include <openssl/objects.h>
|
||||||
#include <openssl/md5.h>
|
#include <openssl/md5.h>
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
static long ssl2_default_timeout(void );
|
static long ssl2_default_timeout(void );
|
||||||
const char *ssl2_version_str="SSLv2" OPENSSL_VERSION_PTEXT;
|
const char *ssl2_version_str="SSLv2" OPENSSL_VERSION_PTEXT;
|
||||||
|
@ -427,10 +428,14 @@ void ssl2_generate_key_material(SSL *s)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
km=s->s2->key_material;
|
km=s->s2->key_material;
|
||||||
|
die(s->s2->key_material_length <= sizeof s->s2->key_material);
|
||||||
for (i=0; i<s->s2->key_material_length; i+=MD5_DIGEST_LENGTH)
|
for (i=0; i<s->s2->key_material_length; i+=MD5_DIGEST_LENGTH)
|
||||||
{
|
{
|
||||||
MD5_Init(&ctx);
|
MD5_Init(&ctx);
|
||||||
|
|
||||||
|
die(s->session->master_key_length >= 0
|
||||||
|
&& s->session->master_key_length
|
||||||
|
< sizeof s->session->master_key);
|
||||||
MD5_Update(&ctx,s->session->master_key,s->session->master_key_length);
|
MD5_Update(&ctx,s->session->master_key,s->session->master_key_length);
|
||||||
MD5_Update(&ctx,&c,1);
|
MD5_Update(&ctx,&c,1);
|
||||||
c++;
|
c++;
|
||||||
|
@ -465,6 +470,7 @@ void ssl2_write_error(SSL *s)
|
||||||
/* state=s->rwstate;*/
|
/* state=s->rwstate;*/
|
||||||
error=s->error;
|
error=s->error;
|
||||||
s->error=0;
|
s->error=0;
|
||||||
|
die(error >= 0 && error <= 3);
|
||||||
i=ssl2_write(s,&(buf[3-error]),error);
|
i=ssl2_write(s,&(buf[3-error]),error);
|
||||||
/* if (i == error) s->rwstate=state; */
|
/* if (i == error) s->rwstate=state; */
|
||||||
|
|
||||||
|
|
|
@ -116,6 +116,7 @@
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
#include <openssl/objects.h>
|
#include <openssl/objects.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
static SSL_METHOD *ssl2_get_server_method(int ver);
|
static SSL_METHOD *ssl2_get_server_method(int ver);
|
||||||
static int get_client_master_key(SSL *s);
|
static int get_client_master_key(SSL *s);
|
||||||
|
@ -417,11 +418,18 @@ static int get_client_master_key(SSL *s)
|
||||||
n2s(p,i); s->s2->tmp.clear=i;
|
n2s(p,i); s->s2->tmp.clear=i;
|
||||||
n2s(p,i); s->s2->tmp.enc=i;
|
n2s(p,i); s->s2->tmp.enc=i;
|
||||||
n2s(p,i); s->session->key_arg_length=i;
|
n2s(p,i); s->session->key_arg_length=i;
|
||||||
|
if(s->session->key_arg_length > SSL_MAX_KEY_ARG_LENGTH)
|
||||||
|
{
|
||||||
|
SSLerr(SSL_F_GET_CLIENT_MASTER_KEY,
|
||||||
|
SSL_R_KEY_ARG_TOO_LONG);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
s->state=SSL2_ST_GET_CLIENT_MASTER_KEY_B;
|
s->state=SSL2_ST_GET_CLIENT_MASTER_KEY_B;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* SSL2_ST_GET_CLIENT_MASTER_KEY_B */
|
/* SSL2_ST_GET_CLIENT_MASTER_KEY_B */
|
||||||
p=(unsigned char *)s->init_buf->data;
|
p=(unsigned char *)s->init_buf->data;
|
||||||
|
die(s->init_buf->length >= SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER);
|
||||||
keya=s->session->key_arg_length;
|
keya=s->session->key_arg_length;
|
||||||
len = 10 + (unsigned long)s->s2->tmp.clear + (unsigned long)s->s2->tmp.enc + (unsigned long)keya;
|
len = 10 + (unsigned long)s->s2->tmp.clear + (unsigned long)s->s2->tmp.enc + (unsigned long)keya;
|
||||||
if (len > SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER)
|
if (len > SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER)
|
||||||
|
@ -502,6 +510,7 @@ static int get_client_master_key(SSL *s)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (is_export) i+=s->s2->tmp.clear;
|
if (is_export) i+=s->s2->tmp.clear;
|
||||||
|
die(i <= SSL_MAX_MASTER_KEY_LENGTH);
|
||||||
s->session->master_key_length=i;
|
s->session->master_key_length=i;
|
||||||
memcpy(s->session->master_key,p,(unsigned int)i);
|
memcpy(s->session->master_key,p,(unsigned int)i);
|
||||||
return(1);
|
return(1);
|
||||||
|
@ -649,6 +658,7 @@ static int get_client_hello(SSL *s)
|
||||||
p+=s->s2->tmp.session_id_length;
|
p+=s->s2->tmp.session_id_length;
|
||||||
|
|
||||||
/* challenge */
|
/* challenge */
|
||||||
|
die(s->s2->challenge_length <= sizeof s->s2->challenge);
|
||||||
memcpy(s->s2->challenge,p,(unsigned int)s->s2->challenge_length);
|
memcpy(s->s2->challenge,p,(unsigned int)s->s2->challenge_length);
|
||||||
return(1);
|
return(1);
|
||||||
mem_err:
|
mem_err:
|
||||||
|
@ -800,6 +810,7 @@ static int get_client_finished(SSL *s)
|
||||||
}
|
}
|
||||||
|
|
||||||
/* SSL2_ST_GET_CLIENT_FINISHED_B */
|
/* SSL2_ST_GET_CLIENT_FINISHED_B */
|
||||||
|
die(s->s2->conn_id_length <= sizeof s->s2->conn_id);
|
||||||
len = 1 + (unsigned long)s->s2->conn_id_length;
|
len = 1 + (unsigned long)s->s2->conn_id_length;
|
||||||
n = (int)len - s->init_num;
|
n = (int)len - s->init_num;
|
||||||
i = ssl2_read(s,(char *)&(p[s->init_num]),n);
|
i = ssl2_read(s,(char *)&(p[s->init_num]),n);
|
||||||
|
@ -825,6 +836,7 @@ static int server_verify(SSL *s)
|
||||||
{
|
{
|
||||||
p=(unsigned char *)s->init_buf->data;
|
p=(unsigned char *)s->init_buf->data;
|
||||||
*(p++)=SSL2_MT_SERVER_VERIFY;
|
*(p++)=SSL2_MT_SERVER_VERIFY;
|
||||||
|
die(s->s2->challenge_length <= sizeof s->s2->challenge);
|
||||||
memcpy(p,s->s2->challenge,(unsigned int)s->s2->challenge_length);
|
memcpy(p,s->s2->challenge,(unsigned int)s->s2->challenge_length);
|
||||||
/* p+=s->s2->challenge_length; */
|
/* p+=s->s2->challenge_length; */
|
||||||
|
|
||||||
|
@ -844,6 +856,8 @@ static int server_finish(SSL *s)
|
||||||
p=(unsigned char *)s->init_buf->data;
|
p=(unsigned char *)s->init_buf->data;
|
||||||
*(p++)=SSL2_MT_SERVER_FINISHED;
|
*(p++)=SSL2_MT_SERVER_FINISHED;
|
||||||
|
|
||||||
|
die(s->session->session_id_length
|
||||||
|
<= sizeof s->session->session_id);
|
||||||
memcpy(p,s->session->session_id,
|
memcpy(p,s->session->session_id,
|
||||||
(unsigned int)s->session->session_id_length);
|
(unsigned int)s->session->session_id_length);
|
||||||
/* p+=s->session->session_id_length; */
|
/* p+=s->session->session_id_length; */
|
||||||
|
|
|
@ -117,6 +117,7 @@
|
||||||
#include <openssl/sha.h>
|
#include <openssl/sha.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#include "ssl_locl.h"
|
#include "ssl_locl.h"
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
static SSL_METHOD *ssl3_get_client_method(int ver);
|
static SSL_METHOD *ssl3_get_client_method(int ver);
|
||||||
static int ssl3_client_hello(SSL *s);
|
static int ssl3_client_hello(SSL *s);
|
||||||
|
@ -545,6 +546,7 @@ static int ssl3_client_hello(SSL *s)
|
||||||
*(p++)=i;
|
*(p++)=i;
|
||||||
if (i != 0)
|
if (i != 0)
|
||||||
{
|
{
|
||||||
|
die(i <= sizeof s->session->session_id);
|
||||||
memcpy(p,s->session->session_id,i);
|
memcpy(p,s->session->session_id,i);
|
||||||
p+=i;
|
p+=i;
|
||||||
}
|
}
|
||||||
|
@ -626,6 +628,14 @@ static int ssl3_get_server_hello(SSL *s)
|
||||||
/* get the session-id */
|
/* get the session-id */
|
||||||
j= *(p++);
|
j= *(p++);
|
||||||
|
|
||||||
|
if(j > sizeof s->session->session_id)
|
||||||
|
{
|
||||||
|
al=SSL_AD_ILLEGAL_PARAMETER;
|
||||||
|
SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,
|
||||||
|
SSL_R_SSL3_SESSION_ID_TOO_LONG);
|
||||||
|
goto f_err;
|
||||||
|
}
|
||||||
|
|
||||||
if ((j != 0) && (j != SSL3_SESSION_ID_SIZE))
|
if ((j != 0) && (j != SSL3_SESSION_ID_SIZE))
|
||||||
{
|
{
|
||||||
/* SSLref returns 16 :-( */
|
/* SSLref returns 16 :-( */
|
||||||
|
|
|
@ -122,6 +122,7 @@
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include "ssl_locl.h"
|
#include "ssl_locl.h"
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
static SSL_METHOD *ssl3_get_server_method(int ver);
|
static SSL_METHOD *ssl3_get_server_method(int ver);
|
||||||
static int ssl3_get_client_hello(SSL *s);
|
static int ssl3_get_client_hello(SSL *s);
|
||||||
|
@ -948,6 +949,7 @@ static int ssl3_send_server_hello(SSL *s)
|
||||||
s->session->session_id_length=0;
|
s->session->session_id_length=0;
|
||||||
|
|
||||||
sl=s->session->session_id_length;
|
sl=s->session->session_id_length;
|
||||||
|
die(sl <= sizeof s->session->session_id);
|
||||||
*(p++)=sl;
|
*(p++)=sl;
|
||||||
memcpy(p,s->session->session_id,sl);
|
memcpy(p,s->session->session_id,sl);
|
||||||
p+=sl;
|
p+=sl;
|
||||||
|
|
|
@ -1426,6 +1426,7 @@ void ERR_load_SSL_strings(void);
|
||||||
#define SSL_R_INVALID_COMMAND 280
|
#define SSL_R_INVALID_COMMAND 280
|
||||||
#define SSL_R_INVALID_PURPOSE 278
|
#define SSL_R_INVALID_PURPOSE 278
|
||||||
#define SSL_R_INVALID_TRUST 279
|
#define SSL_R_INVALID_TRUST 279
|
||||||
|
#define SSL_R_KEY_ARG_TOO_LONG 1112
|
||||||
#define SSL_R_LENGTH_MISMATCH 159
|
#define SSL_R_LENGTH_MISMATCH 159
|
||||||
#define SSL_R_LENGTH_TOO_SHORT 160
|
#define SSL_R_LENGTH_TOO_SHORT 160
|
||||||
#define SSL_R_LIBRARY_BUG 274
|
#define SSL_R_LIBRARY_BUG 274
|
||||||
|
@ -1494,6 +1495,7 @@ void ERR_load_SSL_strings(void);
|
||||||
#define SSL_R_SHORT_READ 219
|
#define SSL_R_SHORT_READ 219
|
||||||
#define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220
|
#define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220
|
||||||
#define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221
|
#define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221
|
||||||
|
#define SSL_R_SSL3_SESSION_ID_TOO_LONG 1113
|
||||||
#define SSL_R_SSL3_SESSION_ID_TOO_SHORT 222
|
#define SSL_R_SSL3_SESSION_ID_TOO_SHORT 222
|
||||||
#define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE 1042
|
#define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE 1042
|
||||||
#define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC 1020
|
#define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC 1020
|
||||||
|
|
|
@ -62,6 +62,7 @@
|
||||||
#include <openssl/objects.h>
|
#include <openssl/objects.h>
|
||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include "ssl_locl.h"
|
#include "ssl_locl.h"
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
typedef struct ssl_session_asn1_st
|
typedef struct ssl_session_asn1_st
|
||||||
{
|
{
|
||||||
|
@ -275,6 +276,7 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp,
|
||||||
os.length=i;
|
os.length=i;
|
||||||
|
|
||||||
ret->session_id_length=os.length;
|
ret->session_id_length=os.length;
|
||||||
|
die(os.length <= sizeof ret->session_id);
|
||||||
memcpy(ret->session_id,os.data,os.length);
|
memcpy(ret->session_id,os.data,os.length);
|
||||||
|
|
||||||
M_ASN1_D2I_get(osp,d2i_ASN1_OCTET_STRING);
|
M_ASN1_D2I_get(osp,d2i_ASN1_OCTET_STRING);
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/* ssl/ssl_err.c */
|
/* ssl/ssl_err.c */
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1999-2002 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
|
@ -275,6 +275,7 @@ static ERR_STRING_DATA SSL_str_reasons[]=
|
||||||
{SSL_R_INVALID_COMMAND ,"invalid command"},
|
{SSL_R_INVALID_COMMAND ,"invalid command"},
|
||||||
{SSL_R_INVALID_PURPOSE ,"invalid purpose"},
|
{SSL_R_INVALID_PURPOSE ,"invalid purpose"},
|
||||||
{SSL_R_INVALID_TRUST ,"invalid trust"},
|
{SSL_R_INVALID_TRUST ,"invalid trust"},
|
||||||
|
{SSL_R_KEY_ARG_TOO_LONG ,"key arg too long"},
|
||||||
{SSL_R_LENGTH_MISMATCH ,"length mismatch"},
|
{SSL_R_LENGTH_MISMATCH ,"length mismatch"},
|
||||||
{SSL_R_LENGTH_TOO_SHORT ,"length too short"},
|
{SSL_R_LENGTH_TOO_SHORT ,"length too short"},
|
||||||
{SSL_R_LIBRARY_BUG ,"library bug"},
|
{SSL_R_LIBRARY_BUG ,"library bug"},
|
||||||
|
@ -343,6 +344,7 @@ static ERR_STRING_DATA SSL_str_reasons[]=
|
||||||
{SSL_R_SHORT_READ ,"short read"},
|
{SSL_R_SHORT_READ ,"short read"},
|
||||||
{SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE,"signature for non signing certificate"},
|
{SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE,"signature for non signing certificate"},
|
||||||
{SSL_R_SSL23_DOING_SESSION_ID_REUSE ,"ssl23 doing session id reuse"},
|
{SSL_R_SSL23_DOING_SESSION_ID_REUSE ,"ssl23 doing session id reuse"},
|
||||||
|
{SSL_R_SSL3_SESSION_ID_TOO_LONG ,"ssl3 session id too long"},
|
||||||
{SSL_R_SSL3_SESSION_ID_TOO_SHORT ,"ssl3 session id too short"},
|
{SSL_R_SSL3_SESSION_ID_TOO_SHORT ,"ssl3 session id too short"},
|
||||||
{SSL_R_SSLV3_ALERT_BAD_CERTIFICATE ,"sslv3 alert bad certificate"},
|
{SSL_R_SSLV3_ALERT_BAD_CERTIFICATE ,"sslv3 alert bad certificate"},
|
||||||
{SSL_R_SSLV3_ALERT_BAD_RECORD_MAC ,"sslv3 alert bad record mac"},
|
{SSL_R_SSLV3_ALERT_BAD_RECORD_MAC ,"sslv3 alert bad record mac"},
|
||||||
|
|
|
@ -60,6 +60,7 @@
|
||||||
#include <openssl/lhash.h>
|
#include <openssl/lhash.h>
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
#include "ssl_locl.h"
|
#include "ssl_locl.h"
|
||||||
|
#include "cryptlib.h"
|
||||||
|
|
||||||
static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *s);
|
static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *s);
|
||||||
static void SSL_SESSION_list_add(SSL_CTX *ctx,SSL_SESSION *s);
|
static void SSL_SESSION_list_add(SSL_CTX *ctx,SSL_SESSION *s);
|
||||||
|
@ -199,6 +200,7 @@ int ssl_get_new_session(SSL *s, int session)
|
||||||
ss->session_id_length=0;
|
ss->session_id_length=0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
die(s->sid_ctx_length <= sizeof ss->sid_ctx);
|
||||||
memcpy(ss->sid_ctx,s->sid_ctx,s->sid_ctx_length);
|
memcpy(ss->sid_ctx,s->sid_ctx,s->sid_ctx_length);
|
||||||
ss->sid_ctx_length=s->sid_ctx_length;
|
ss->sid_ctx_length=s->sid_ctx_length;
|
||||||
s->session=ss;
|
s->session=ss;
|
||||||
|
|
Loading…
Reference in New Issue