blob: 58995003e40675850ba480ee5acc8853d43c5921 [file] [log] [blame]
Adam Langley95c29f32014-06-20 12:00:00 -07001/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2 * All rights reserved.
3 *
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
Adam Langleye745b252018-02-26 14:02:17 -08007 *
Adam Langley95c29f32014-06-20 12:00:00 -07008 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
Adam Langleye745b252018-02-26 14:02:17 -080014 *
Adam Langley95c29f32014-06-20 12:00:00 -070015 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
Adam Langleye745b252018-02-26 14:02:17 -080021 *
Adam Langley95c29f32014-06-20 12:00:00 -070022 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
24 * are met:
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
Adam Langleye745b252018-02-26 14:02:17 -080036 * 4. If you include any Windows specific code (or a derivative thereof) from
Adam Langley95c29f32014-06-20 12:00:00 -070037 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
Adam Langleye745b252018-02-26 14:02:17 -080039 *
Adam Langley95c29f32014-06-20 12:00:00 -070040 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * SUCH DAMAGE.
Adam Langleye745b252018-02-26 14:02:17 -080051 *
Adam Langley95c29f32014-06-20 12:00:00 -070052 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.]
56 */
57/* ====================================================================
58 * Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
59 *
60 * Redistribution and use in source and binary forms, with or without
61 * modification, are permitted provided that the following conditions
62 * are met:
63 *
64 * 1. Redistributions of source code must retain the above copyright
Adam Langleye745b252018-02-26 14:02:17 -080065 * notice, this list of conditions and the following disclaimer.
Adam Langley95c29f32014-06-20 12:00:00 -070066 *
67 * 2. Redistributions in binary form must reproduce the above copyright
68 * notice, this list of conditions and the following disclaimer in
69 * the documentation and/or other materials provided with the
70 * distribution.
71 *
72 * 3. All advertising materials mentioning features or use of this
73 * software must display the following acknowledgment:
74 * "This product includes software developed by the OpenSSL Project
75 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
76 *
77 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
78 * endorse or promote products derived from this software without
79 * prior written permission. For written permission, please contact
80 * openssl-core@openssl.org.
81 *
82 * 5. Products derived from this software may not be called "OpenSSL"
83 * nor may "OpenSSL" appear in their names without prior written
84 * permission of the OpenSSL Project.
85 *
86 * 6. Redistributions of any form whatsoever must retain the following
87 * acknowledgment:
88 * "This product includes software developed by the OpenSSL Project
89 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
90 *
91 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
92 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
93 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
94 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
95 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
96 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
97 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
98 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
99 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
100 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
101 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
102 * OF THE POSSIBILITY OF SUCH DAMAGE.
103 * ====================================================================
104 *
105 * This product includes cryptographic software written by Eric Young
106 * (eay@cryptsoft.com). This product includes software written by Tim
107 * Hudson (tjh@cryptsoft.com).
108 *
109 */
110/* ====================================================================
111 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
Adam Langleye745b252018-02-26 14:02:17 -0800112 * ECC cipher suite support in OpenSSL originally developed by
Adam Langley95c29f32014-06-20 12:00:00 -0700113 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
114 */
115/* ====================================================================
116 * Copyright 2005 Nokia. All rights reserved.
117 *
118 * The portions of the attached software ("Contribution") is developed by
119 * Nokia Corporation and is licensed pursuant to the OpenSSL open source
120 * license.
121 *
122 * The Contribution, originally written by Mika Kousa and Pasi Eronen of
123 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
124 * support (see RFC 4279) to OpenSSL.
125 *
126 * No patent licenses or other rights except those expressly stated in
127 * the OpenSSL open source license shall be deemed granted or received
128 * expressly, by implication, estoppel, or otherwise.
129 *
130 * No assurances are provided by Nokia that the Contribution does not
131 * infringe the patent or other intellectual property rights of any third
132 * party or that the license provides you with all the necessary rights
133 * to make use of the Contribution.
134 *
135 * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
136 * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
137 * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
138 * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
139 * OTHERWISE. */
140
David Benjamin9e4e01e2015-09-15 01:48:04 -0400141#include <openssl/ssl.h>
142
Adam Langley95c29f32014-06-20 12:00:00 -0700143#include <assert.h>
David Benjaminf0ae1702015-04-07 23:05:04 -0400144#include <string.h>
Adam Langley95c29f32014-06-20 12:00:00 -0700145
David Benjamin71f07942015-04-08 02:36:59 -0400146#include <openssl/buf.h>
David Benjaminf0ae1702015-04-07 23:05:04 -0400147#include <openssl/err.h>
David Benjaminea72bd02014-12-21 21:27:41 -0500148#include <openssl/md5.h>
Adam Langley95c29f32014-06-20 12:00:00 -0700149#include <openssl/mem.h>
David Benjaminea72bd02014-12-21 21:27:41 -0500150#include <openssl/sha.h>
David Benjamin71f07942015-04-08 02:36:59 -0400151#include <openssl/stack.h>
Adam Langley95c29f32014-06-20 12:00:00 -0700152
David Benjamin2ee94aa2015-04-07 22:38:30 -0400153#include "internal.h"
Steven Valdezcb966542016-08-17 16:56:14 -0400154#include "../crypto/internal.h"
Adam Langley95c29f32014-06-20 12:00:00 -0700155
Adam Langley95c29f32014-06-20 12:00:00 -0700156
David Benjamin86e95b82017-07-18 16:34:25 -0400157namespace bssl {
158
David Benjaminc11ea9422017-08-29 16:33:21 -0400159// kCiphers is an array of all supported ciphers, sorted by id.
MichaƂ Janiszewskic4f3b8a2018-07-30 22:50:40 +0200160static constexpr SSL_CIPHER kCiphers[] = {
David Benjaminc11ea9422017-08-29 16:33:21 -0400161 // The RSA ciphers
162 // Cipher 02
Matt Braithwaiteaf096752015-09-02 19:48:16 -0700163 {
David Benjaminff2df332015-11-18 10:01:16 -0500164 SSL3_TXT_RSA_NULL_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400165 "TLS_RSA_WITH_NULL_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500166 SSL3_CK_RSA_NULL_SHA,
167 SSL_kRSA,
168 SSL_aRSA,
169 SSL_eNULL,
170 SSL_SHA1,
171 SSL_HANDSHAKE_MAC_DEFAULT,
Matt Braithwaiteaf096752015-09-02 19:48:16 -0700172 },
173
David Benjaminc11ea9422017-08-29 16:33:21 -0400174 // Cipher 0A
David Benjamina1c90a52015-05-30 17:03:14 -0400175 {
David Benjaminff2df332015-11-18 10:01:16 -0500176 SSL3_TXT_RSA_DES_192_CBC3_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400177 "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500178 SSL3_CK_RSA_DES_192_CBC3_SHA,
179 SSL_kRSA,
180 SSL_aRSA,
181 SSL_3DES,
182 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500183 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400184 },
185
186
David Benjaminc11ea9422017-08-29 16:33:21 -0400187 // New AES ciphersuites
David Benjamina1c90a52015-05-30 17:03:14 -0400188
David Benjaminc11ea9422017-08-29 16:33:21 -0400189 // Cipher 2F
David Benjamina1c90a52015-05-30 17:03:14 -0400190 {
David Benjaminff2df332015-11-18 10:01:16 -0500191 TLS1_TXT_RSA_WITH_AES_128_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400192 "TLS_RSA_WITH_AES_128_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500193 TLS1_CK_RSA_WITH_AES_128_SHA,
194 SSL_kRSA,
195 SSL_aRSA,
196 SSL_AES128,
197 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500198 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400199 },
200
David Benjaminc11ea9422017-08-29 16:33:21 -0400201 // Cipher 35
David Benjamina1c90a52015-05-30 17:03:14 -0400202 {
David Benjaminff2df332015-11-18 10:01:16 -0500203 TLS1_TXT_RSA_WITH_AES_256_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400204 "TLS_RSA_WITH_AES_256_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500205 TLS1_CK_RSA_WITH_AES_256_SHA,
206 SSL_kRSA,
207 SSL_aRSA,
208 SSL_AES256,
209 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500210 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400211 },
212
David Benjaminc11ea9422017-08-29 16:33:21 -0400213 // PSK cipher suites.
Adam Langley85bc5602015-06-09 09:54:04 -0700214
David Benjaminc11ea9422017-08-29 16:33:21 -0400215 // Cipher 8C
David Benjamina1c90a52015-05-30 17:03:14 -0400216 {
David Benjaminff2df332015-11-18 10:01:16 -0500217 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400218 "TLS_PSK_WITH_AES_128_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500219 TLS1_CK_PSK_WITH_AES_128_CBC_SHA,
220 SSL_kPSK,
221 SSL_aPSK,
222 SSL_AES128,
223 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500224 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400225 },
226
David Benjaminc11ea9422017-08-29 16:33:21 -0400227 // Cipher 8D
David Benjamina1c90a52015-05-30 17:03:14 -0400228 {
David Benjaminff2df332015-11-18 10:01:16 -0500229 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400230 "TLS_PSK_WITH_AES_256_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500231 TLS1_CK_PSK_WITH_AES_256_CBC_SHA,
232 SSL_kPSK,
233 SSL_aPSK,
234 SSL_AES256,
235 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500236 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400237 },
238
David Benjaminc11ea9422017-08-29 16:33:21 -0400239 // GCM ciphersuites from RFC5288
David Benjamina1c90a52015-05-30 17:03:14 -0400240
David Benjaminc11ea9422017-08-29 16:33:21 -0400241 // Cipher 9C
David Benjamina1c90a52015-05-30 17:03:14 -0400242 {
243 TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400244 "TLS_RSA_WITH_AES_128_GCM_SHA256",
David Benjaminff2df332015-11-18 10:01:16 -0500245 TLS1_CK_RSA_WITH_AES_128_GCM_SHA256,
246 SSL_kRSA,
247 SSL_aRSA,
248 SSL_AES128GCM,
David Benjamind6e9eec2015-11-18 09:48:55 -0500249 SSL_AEAD,
David Benjaminb2a985b2015-06-21 15:13:57 -0400250 SSL_HANDSHAKE_MAC_SHA256,
David Benjamina1c90a52015-05-30 17:03:14 -0400251 },
252
David Benjaminc11ea9422017-08-29 16:33:21 -0400253 // Cipher 9D
David Benjamina1c90a52015-05-30 17:03:14 -0400254 {
255 TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384,
David Benjamin6fff3862017-06-21 21:07:04 -0400256 "TLS_RSA_WITH_AES_256_GCM_SHA384",
David Benjaminff2df332015-11-18 10:01:16 -0500257 TLS1_CK_RSA_WITH_AES_256_GCM_SHA384,
258 SSL_kRSA,
259 SSL_aRSA,
260 SSL_AES256GCM,
David Benjamind6e9eec2015-11-18 09:48:55 -0500261 SSL_AEAD,
David Benjaminb2a985b2015-06-21 15:13:57 -0400262 SSL_HANDSHAKE_MAC_SHA384,
David Benjamina1c90a52015-05-30 17:03:14 -0400263 },
264
David Benjaminc11ea9422017-08-29 16:33:21 -0400265 // TLS 1.3 suites.
Steven Valdez803c77a2016-09-06 14:13:43 -0400266
David Benjaminc11ea9422017-08-29 16:33:21 -0400267 // Cipher 1301
Steven Valdez803c77a2016-09-06 14:13:43 -0400268 {
269 TLS1_TXT_AES_128_GCM_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400270 "TLS_AES_128_GCM_SHA256",
Steven Valdez803c77a2016-09-06 14:13:43 -0400271 TLS1_CK_AES_128_GCM_SHA256,
272 SSL_kGENERIC,
273 SSL_aGENERIC,
274 SSL_AES128GCM,
275 SSL_AEAD,
276 SSL_HANDSHAKE_MAC_SHA256,
277 },
278
David Benjaminc11ea9422017-08-29 16:33:21 -0400279 // Cipher 1302
Steven Valdez803c77a2016-09-06 14:13:43 -0400280 {
281 TLS1_TXT_AES_256_GCM_SHA384,
David Benjamin6fff3862017-06-21 21:07:04 -0400282 "TLS_AES_256_GCM_SHA384",
Steven Valdez803c77a2016-09-06 14:13:43 -0400283 TLS1_CK_AES_256_GCM_SHA384,
284 SSL_kGENERIC,
285 SSL_aGENERIC,
286 SSL_AES256GCM,
287 SSL_AEAD,
288 SSL_HANDSHAKE_MAC_SHA384,
289 },
290
David Benjaminc11ea9422017-08-29 16:33:21 -0400291 // Cipher 1303
Steven Valdez803c77a2016-09-06 14:13:43 -0400292 {
293 TLS1_TXT_CHACHA20_POLY1305_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400294 "TLS_CHACHA20_POLY1305_SHA256",
Steven Valdez803c77a2016-09-06 14:13:43 -0400295 TLS1_CK_CHACHA20_POLY1305_SHA256,
296 SSL_kGENERIC,
297 SSL_aGENERIC,
298 SSL_CHACHA20POLY1305,
299 SSL_AEAD,
300 SSL_HANDSHAKE_MAC_SHA256,
301 },
302
David Benjaminc11ea9422017-08-29 16:33:21 -0400303 // Cipher C009
David Benjamina1c90a52015-05-30 17:03:14 -0400304 {
305 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400306 "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500307 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
308 SSL_kECDHE,
309 SSL_aECDSA,
310 SSL_AES128,
311 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500312 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400313 },
314
David Benjaminc11ea9422017-08-29 16:33:21 -0400315 // Cipher C00A
David Benjamina1c90a52015-05-30 17:03:14 -0400316 {
317 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400318 "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500319 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
320 SSL_kECDHE,
321 SSL_aECDSA,
322 SSL_AES256,
323 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500324 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400325 },
326
David Benjaminc11ea9422017-08-29 16:33:21 -0400327 // Cipher C013
David Benjamina1c90a52015-05-30 17:03:14 -0400328 {
329 TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400330 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500331 TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
332 SSL_kECDHE,
333 SSL_aRSA,
334 SSL_AES128,
David Benjamind6e9eec2015-11-18 09:48:55 -0500335 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500336 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400337 },
338
David Benjaminc11ea9422017-08-29 16:33:21 -0400339 // Cipher C014
David Benjamina1c90a52015-05-30 17:03:14 -0400340 {
341 TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400342 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
David Benjaminff2df332015-11-18 10:01:16 -0500343 TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
344 SSL_kECDHE,
345 SSL_aRSA,
346 SSL_AES256,
David Benjamind6e9eec2015-11-18 09:48:55 -0500347 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500348 SSL_HANDSHAKE_MAC_DEFAULT,
David Benjamina1c90a52015-05-30 17:03:14 -0400349 },
350
David Benjaminc11ea9422017-08-29 16:33:21 -0400351 // GCM based TLS v1.2 ciphersuites from RFC5289
David Benjamina1c90a52015-05-30 17:03:14 -0400352
David Benjaminc11ea9422017-08-29 16:33:21 -0400353 // Cipher C02B
David Benjamina1c90a52015-05-30 17:03:14 -0400354 {
355 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400356 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
David Benjaminff2df332015-11-18 10:01:16 -0500357 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
358 SSL_kECDHE,
359 SSL_aECDSA,
360 SSL_AES128GCM,
361 SSL_AEAD,
David Benjaminb2a985b2015-06-21 15:13:57 -0400362 SSL_HANDSHAKE_MAC_SHA256,
David Benjamina1c90a52015-05-30 17:03:14 -0400363 },
364
David Benjaminc11ea9422017-08-29 16:33:21 -0400365 // Cipher C02C
David Benjamina1c90a52015-05-30 17:03:14 -0400366 {
367 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
David Benjamin6fff3862017-06-21 21:07:04 -0400368 "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
David Benjaminff2df332015-11-18 10:01:16 -0500369 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
370 SSL_kECDHE,
371 SSL_aECDSA,
372 SSL_AES256GCM,
373 SSL_AEAD,
David Benjaminb2a985b2015-06-21 15:13:57 -0400374 SSL_HANDSHAKE_MAC_SHA384,
David Benjamina1c90a52015-05-30 17:03:14 -0400375 },
376
David Benjaminc11ea9422017-08-29 16:33:21 -0400377 // Cipher C02F
David Benjamina1c90a52015-05-30 17:03:14 -0400378 {
379 TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400380 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
David Benjaminff2df332015-11-18 10:01:16 -0500381 TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
382 SSL_kECDHE,
383 SSL_aRSA,
384 SSL_AES128GCM,
385 SSL_AEAD,
David Benjaminb2a985b2015-06-21 15:13:57 -0400386 SSL_HANDSHAKE_MAC_SHA256,
David Benjamina1c90a52015-05-30 17:03:14 -0400387 },
388
David Benjaminc11ea9422017-08-29 16:33:21 -0400389 // Cipher C030
David Benjamina1c90a52015-05-30 17:03:14 -0400390 {
391 TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
David Benjamin6fff3862017-06-21 21:07:04 -0400392 "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
David Benjaminff2df332015-11-18 10:01:16 -0500393 TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
394 SSL_kECDHE,
395 SSL_aRSA,
396 SSL_AES256GCM,
397 SSL_AEAD,
David Benjaminb2a985b2015-06-21 15:13:57 -0400398 SSL_HANDSHAKE_MAC_SHA384,
David Benjamina1c90a52015-05-30 17:03:14 -0400399 },
400
David Benjaminc11ea9422017-08-29 16:33:21 -0400401 // ECDHE-PSK cipher suites.
Adam Langley85bc5602015-06-09 09:54:04 -0700402
David Benjaminc11ea9422017-08-29 16:33:21 -0400403 // Cipher C035
Adam Langley85bc5602015-06-09 09:54:04 -0700404 {
405 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400406 "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA",
Adam Langley85bc5602015-06-09 09:54:04 -0700407 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA,
David Benjaminff2df332015-11-18 10:01:16 -0500408 SSL_kECDHE,
409 SSL_aPSK,
410 SSL_AES128,
411 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500412 SSL_HANDSHAKE_MAC_DEFAULT,
Adam Langley85bc5602015-06-09 09:54:04 -0700413 },
414
David Benjaminc11ea9422017-08-29 16:33:21 -0400415 // Cipher C036
Adam Langley85bc5602015-06-09 09:54:04 -0700416 {
417 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA,
David Benjamin6fff3862017-06-21 21:07:04 -0400418 "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA",
Adam Langley85bc5602015-06-09 09:54:04 -0700419 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA,
David Benjaminff2df332015-11-18 10:01:16 -0500420 SSL_kECDHE,
421 SSL_aPSK,
422 SSL_AES256,
423 SSL_SHA1,
David Benjamin9f2e2772015-11-18 09:59:43 -0500424 SSL_HANDSHAKE_MAC_DEFAULT,
Adam Langley85bc5602015-06-09 09:54:04 -0700425 },
426
David Benjaminc11ea9422017-08-29 16:33:21 -0400427 // ChaCha20-Poly1305 cipher suites.
Adam Langley85bc5602015-06-09 09:54:04 -0700428
David Benjaminc11ea9422017-08-29 16:33:21 -0400429 // Cipher CCA8
David Benjamin13414b32015-12-09 23:02:39 -0500430 {
431 TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400432 "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
David Benjamin13414b32015-12-09 23:02:39 -0500433 TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
434 SSL_kECDHE,
435 SSL_aRSA,
436 SSL_CHACHA20POLY1305,
437 SSL_AEAD,
438 SSL_HANDSHAKE_MAC_SHA256,
439 },
440
David Benjaminc11ea9422017-08-29 16:33:21 -0400441 // Cipher CCA9
David Benjamin13414b32015-12-09 23:02:39 -0500442 {
443 TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400444 "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
David Benjamin13414b32015-12-09 23:02:39 -0500445 TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
446 SSL_kECDHE,
447 SSL_aECDSA,
448 SSL_CHACHA20POLY1305,
449 SSL_AEAD,
450 SSL_HANDSHAKE_MAC_SHA256,
451 },
452
David Benjaminc11ea9422017-08-29 16:33:21 -0400453 // Cipher CCAB
David Benjamin13414b32015-12-09 23:02:39 -0500454 {
455 TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256,
David Benjamin6fff3862017-06-21 21:07:04 -0400456 "TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256",
David Benjamin13414b32015-12-09 23:02:39 -0500457 TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256,
458 SSL_kECDHE,
459 SSL_aPSK,
460 SSL_CHACHA20POLY1305,
461 SSL_AEAD,
462 SSL_HANDSHAKE_MAC_SHA256,
463 },
Matt Braithwaite053931e2016-05-25 12:06:05 -0700464
David Benjamina1c90a52015-05-30 17:03:14 -0400465};
466
Steven Valdezcb966542016-08-17 16:56:14 -0400467static const size_t kCiphersLen = OPENSSL_ARRAY_SIZE(kCiphers);
David Benjamina1c90a52015-05-30 17:03:14 -0400468
Adam Langleyfcf25832014-12-18 17:42:32 -0800469#define CIPHER_ADD 1
470#define CIPHER_KILL 2
471#define CIPHER_DEL 3
472#define CIPHER_ORD 4
473#define CIPHER_SPECIAL 5
Adam Langley95c29f32014-06-20 12:00:00 -0700474
Adam Langleyfcf25832014-12-18 17:42:32 -0800475typedef struct cipher_order_st {
476 const SSL_CIPHER *cipher;
David Benjaminf4962492017-09-27 19:34:32 -0400477 bool active;
478 bool in_group;
Adam Langleyfcf25832014-12-18 17:42:32 -0800479 struct cipher_order_st *next, *prev;
480} CIPHER_ORDER;
Adam Langley95c29f32014-06-20 12:00:00 -0700481
David Benjamin0344daf2015-04-08 02:08:01 -0400482typedef struct cipher_alias_st {
David Benjaminc11ea9422017-08-29 16:33:21 -0400483 // name is the name of the cipher alias.
David Benjamin0344daf2015-04-08 02:08:01 -0400484 const char *name;
485
David Benjaminc11ea9422017-08-29 16:33:21 -0400486 // The following fields are bitmasks for the corresponding fields on
487 // |SSL_CIPHER|. A cipher matches a cipher alias iff, for each bitmask, the
488 // bit corresponding to the cipher's value is set to 1. If any bitmask is
489 // all zeroes, the alias matches nothing. Use |~0u| for the default value.
David Benjamin0344daf2015-04-08 02:08:01 -0400490 uint32_t algorithm_mkey;
491 uint32_t algorithm_auth;
492 uint32_t algorithm_enc;
493 uint32_t algorithm_mac;
David Benjamindcb6ef02015-11-06 15:35:54 -0500494
David Benjaminc11ea9422017-08-29 16:33:21 -0400495 // min_version, if non-zero, matches all ciphers which were added in that
496 // particular protocol version.
David Benjamindcb6ef02015-11-06 15:35:54 -0500497 uint16_t min_version;
David Benjamin0344daf2015-04-08 02:08:01 -0400498} CIPHER_ALIAS;
499
David Benjamina1c90a52015-05-30 17:03:14 -0400500static const CIPHER_ALIAS kCipherAliases[] = {
David Benjaminc11ea9422017-08-29 16:33:21 -0400501 // "ALL" doesn't include eNULL. It must be explicitly enabled.
David Benjamin3b903f22017-09-29 18:44:56 -0400502 {"ALL", ~0u, ~0u, ~0u, ~0u, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700503
David Benjaminc11ea9422017-08-29 16:33:21 -0400504 // The "COMPLEMENTOFDEFAULT" rule is omitted. It matches nothing.
Adam Langley95c29f32014-06-20 12:00:00 -0700505
David Benjaminc11ea9422017-08-29 16:33:21 -0400506 // key exchange aliases
507 // (some of those using only a single bit here combine
508 // multiple key exchange algs according to the RFCs.
David Benjamind6e9eec2015-11-18 09:48:55 -0500509 {"kRSA", SSL_kRSA, ~0u, ~0u, ~0u, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700510
David Benjamind6e9eec2015-11-18 09:48:55 -0500511 {"kECDHE", SSL_kECDHE, ~0u, ~0u, ~0u, 0},
512 {"kEECDH", SSL_kECDHE, ~0u, ~0u, ~0u, 0},
513 {"ECDH", SSL_kECDHE, ~0u, ~0u, ~0u, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700514
David Benjamind6e9eec2015-11-18 09:48:55 -0500515 {"kPSK", SSL_kPSK, ~0u, ~0u, ~0u, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700516
David Benjaminc11ea9422017-08-29 16:33:21 -0400517 // server authentication aliases
David Benjamin3b903f22017-09-29 18:44:56 -0400518 {"aRSA", ~0u, SSL_aRSA, ~0u, ~0u, 0},
Matthew Braithwaite651aaef2016-12-08 16:14:36 -0800519 {"aECDSA", ~0u, SSL_aECDSA, ~0u, ~0u, 0},
520 {"ECDSA", ~0u, SSL_aECDSA, ~0u, ~0u, 0},
David Benjamind6e9eec2015-11-18 09:48:55 -0500521 {"aPSK", ~0u, SSL_aPSK, ~0u, ~0u, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700522
David Benjaminc11ea9422017-08-29 16:33:21 -0400523 // aliases combining key exchange and server authentication
David Benjamind6e9eec2015-11-18 09:48:55 -0500524 {"ECDHE", SSL_kECDHE, ~0u, ~0u, ~0u, 0},
525 {"EECDH", SSL_kECDHE, ~0u, ~0u, ~0u, 0},
David Benjamin3b903f22017-09-29 18:44:56 -0400526 {"RSA", SSL_kRSA, SSL_aRSA, ~0u, ~0u, 0},
David Benjamind6e9eec2015-11-18 09:48:55 -0500527 {"PSK", SSL_kPSK, SSL_aPSK, ~0u, ~0u, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700528
David Benjaminc11ea9422017-08-29 16:33:21 -0400529 // symmetric encryption aliases
David Benjamind6e9eec2015-11-18 09:48:55 -0500530 {"3DES", ~0u, ~0u, SSL_3DES, ~0u, 0},
David Benjamind6e9eec2015-11-18 09:48:55 -0500531 {"AES128", ~0u, ~0u, SSL_AES128 | SSL_AES128GCM, ~0u, 0},
Matthew Braithwaite651aaef2016-12-08 16:14:36 -0800532 {"AES256", ~0u, ~0u, SSL_AES256 | SSL_AES256GCM, ~0u, 0},
533 {"AES", ~0u, ~0u, SSL_AES, ~0u, 0},
534 {"AESGCM", ~0u, ~0u, SSL_AES128GCM | SSL_AES256GCM, ~0u, 0},
Adam Langley2e839242017-01-19 15:12:44 -0800535 {"CHACHA20", ~0u, ~0u, SSL_CHACHA20POLY1305, ~0u, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700536
David Benjaminc11ea9422017-08-29 16:33:21 -0400537 // MAC aliases
David Benjamin3b903f22017-09-29 18:44:56 -0400538 {"SHA1", ~0u, ~0u, ~0u, SSL_SHA1, 0},
539 {"SHA", ~0u, ~0u, ~0u, SSL_SHA1, 0},
Adam Langley95c29f32014-06-20 12:00:00 -0700540
David Benjaminc11ea9422017-08-29 16:33:21 -0400541 // Legacy protocol minimum version aliases. "TLSv1" is intentionally the
542 // same as "SSLv3".
David Benjamin3b903f22017-09-29 18:44:56 -0400543 {"SSLv3", ~0u, ~0u, ~0u, ~0u, SSL3_VERSION},
544 {"TLSv1", ~0u, ~0u, ~0u, ~0u, SSL3_VERSION},
545 {"TLSv1.2", ~0u, ~0u, ~0u, ~0u, TLS1_2_VERSION},
Adam Langley95c29f32014-06-20 12:00:00 -0700546
David Benjaminc11ea9422017-08-29 16:33:21 -0400547 // Legacy strength classes.
David Benjamin3b903f22017-09-29 18:44:56 -0400548 {"HIGH", ~0u, ~0u, ~0u, ~0u, 0},
549 {"FIPS", ~0u, ~0u, ~0u, ~0u, 0},
David Benjamin0ca92142018-05-03 11:35:10 -0400550
551 // Temporary no-op aliases corresponding to removed SHA-2 legacy CBC
552 // ciphers. These should be removed after 2018-05-14.
553 {"SHA256", 0, 0, 0, 0, 0},
554 {"SHA384", 0, 0, 0, 0, 0},
Adam Langleyfcf25832014-12-18 17:42:32 -0800555};
Adam Langley95c29f32014-06-20 12:00:00 -0700556
Steven Valdezcb966542016-08-17 16:56:14 -0400557static const size_t kCipherAliasesLen = OPENSSL_ARRAY_SIZE(kCipherAliases);
David Benjamina1c90a52015-05-30 17:03:14 -0400558
David Benjaminf4962492017-09-27 19:34:32 -0400559bool ssl_cipher_get_evp_aead(const EVP_AEAD **out_aead,
560 size_t *out_mac_secret_len,
561 size_t *out_fixed_iv_len, const SSL_CIPHER *cipher,
562 uint16_t version, int is_dtls) {
David Benjaminea72bd02014-12-21 21:27:41 -0500563 *out_aead = NULL;
564 *out_mac_secret_len = 0;
565 *out_fixed_iv_len = 0;
Adam Langleyc9fb3752014-06-20 12:00:00 -0700566
Steven Valdez2f3404b2017-05-24 16:54:35 -0400567 const int is_tls12 = version == TLS1_2_VERSION && !is_dtls;
Adam Langleybcfb4992018-06-18 14:04:41 -0700568 const int is_tls13 = version == TLS1_3_VERSION && !is_dtls;
Steven Valdez2f3404b2017-05-24 16:54:35 -0400569
David Benjamin305e6fb2016-10-27 18:19:00 -0400570 if (cipher->algorithm_mac == SSL_AEAD) {
571 if (cipher->algorithm_enc == SSL_AES128GCM) {
Adam Langleybcfb4992018-06-18 14:04:41 -0700572 if (is_tls12) {
573 *out_aead = EVP_aead_aes_128_gcm_tls12();
574 } else if (is_tls13) {
575 *out_aead = EVP_aead_aes_128_gcm_tls13();
576 } else {
577 *out_aead = EVP_aead_aes_128_gcm();
578 }
David Benjaminea72bd02014-12-21 21:27:41 -0500579 *out_fixed_iv_len = 4;
David Benjamin305e6fb2016-10-27 18:19:00 -0400580 } else if (cipher->algorithm_enc == SSL_AES256GCM) {
Adam Langleybcfb4992018-06-18 14:04:41 -0700581 if (is_tls12) {
582 *out_aead = EVP_aead_aes_256_gcm_tls12();
583 } else if (is_tls13) {
584 *out_aead = EVP_aead_aes_256_gcm_tls13();
585 } else {
586 *out_aead = EVP_aead_aes_256_gcm();
587 }
David Benjaminea72bd02014-12-21 21:27:41 -0500588 *out_fixed_iv_len = 4;
David Benjamin305e6fb2016-10-27 18:19:00 -0400589 } else if (cipher->algorithm_enc == SSL_CHACHA20POLY1305) {
David Benjamin13414b32015-12-09 23:02:39 -0500590 *out_aead = EVP_aead_chacha20_poly1305();
591 *out_fixed_iv_len = 12;
David Benjamin305e6fb2016-10-27 18:19:00 -0400592 } else {
David Benjaminf4962492017-09-27 19:34:32 -0400593 return false;
David Benjamin305e6fb2016-10-27 18:19:00 -0400594 }
595
David Benjaminc11ea9422017-08-29 16:33:21 -0400596 // In TLS 1.3, the iv_len is equal to the AEAD nonce length whereas the code
597 // above computes the TLS 1.2 construction.
David Benjamin305e6fb2016-10-27 18:19:00 -0400598 if (version >= TLS1_3_VERSION) {
599 *out_fixed_iv_len = EVP_AEAD_nonce_length(*out_aead);
600 }
601 } else if (cipher->algorithm_mac == SSL_SHA1) {
602 if (cipher->algorithm_enc == SSL_eNULL) {
David Benjamin9bb15f52018-06-26 00:07:40 -0400603 *out_aead = EVP_aead_null_sha1_tls();
David Benjamin305e6fb2016-10-27 18:19:00 -0400604 } else if (cipher->algorithm_enc == SSL_3DES) {
David Benjamin9bb15f52018-06-26 00:07:40 -0400605 if (version == TLS1_VERSION) {
David Benjamin305e6fb2016-10-27 18:19:00 -0400606 *out_aead = EVP_aead_des_ede3_cbc_sha1_tls_implicit_iv();
607 *out_fixed_iv_len = 8;
608 } else {
609 *out_aead = EVP_aead_des_ede3_cbc_sha1_tls();
610 }
611 } else if (cipher->algorithm_enc == SSL_AES128) {
David Benjamin9bb15f52018-06-26 00:07:40 -0400612 if (version == TLS1_VERSION) {
David Benjamin305e6fb2016-10-27 18:19:00 -0400613 *out_aead = EVP_aead_aes_128_cbc_sha1_tls_implicit_iv();
614 *out_fixed_iv_len = 16;
615 } else {
616 *out_aead = EVP_aead_aes_128_cbc_sha1_tls();
617 }
618 } else if (cipher->algorithm_enc == SSL_AES256) {
David Benjamin9bb15f52018-06-26 00:07:40 -0400619 if (version == TLS1_VERSION) {
David Benjamin305e6fb2016-10-27 18:19:00 -0400620 *out_aead = EVP_aead_aes_256_cbc_sha1_tls_implicit_iv();
621 *out_fixed_iv_len = 16;
622 } else {
623 *out_aead = EVP_aead_aes_256_cbc_sha1_tls();
624 }
625 } else {
David Benjaminf4962492017-09-27 19:34:32 -0400626 return false;
David Benjamin305e6fb2016-10-27 18:19:00 -0400627 }
628
629 *out_mac_secret_len = SHA_DIGEST_LENGTH;
David Benjamin305e6fb2016-10-27 18:19:00 -0400630 } else {
David Benjaminf4962492017-09-27 19:34:32 -0400631 return false;
David Benjaminea72bd02014-12-21 21:27:41 -0500632 }
Steven Valdez79750562016-06-16 06:38:04 -0400633
David Benjaminf4962492017-09-27 19:34:32 -0400634 return true;
Adam Langleyfcf25832014-12-18 17:42:32 -0800635}
Adam Langleyc9fb3752014-06-20 12:00:00 -0700636
David Benjaminca9e8f52017-08-09 15:02:34 -0400637const EVP_MD *ssl_get_handshake_digest(uint16_t version,
638 const SSL_CIPHER *cipher) {
639 switch (cipher->algorithm_prf) {
David Benjaminb0883312015-08-06 09:54:13 -0400640 case SSL_HANDSHAKE_MAC_DEFAULT:
Steven Valdez908ac192017-01-12 13:17:07 -0500641 return version >= TLS1_2_VERSION ? EVP_sha256() : EVP_md5_sha1();
David Benjaminb0883312015-08-06 09:54:13 -0400642 case SSL_HANDSHAKE_MAC_SHA256:
643 return EVP_sha256();
644 case SSL_HANDSHAKE_MAC_SHA384:
645 return EVP_sha384();
646 default:
David Benjaminca9e8f52017-08-09 15:02:34 -0400647 assert(0);
David Benjaminb0883312015-08-06 09:54:13 -0400648 return NULL;
Adam Langleyfcf25832014-12-18 17:42:32 -0800649 }
Adam Langley95c29f32014-06-20 12:00:00 -0700650}
651
Adam Langley22df6912017-07-25 12:27:37 -0700652static bool is_cipher_list_separator(char c, int is_strict) {
653 if (c == ':') {
654 return true;
655 }
656 return !is_strict && (c == ' ' || c == ';' || c == ',');
657}
Adam Langley95c29f32014-06-20 12:00:00 -0700658
David Benjaminf4962492017-09-27 19:34:32 -0400659// rule_equals returns whether the NUL-terminated string |rule| is equal to the
David Benjaminc11ea9422017-08-29 16:33:21 -0400660// |buf_len| bytes at |buf|.
David Benjaminf4962492017-09-27 19:34:32 -0400661static bool rule_equals(const char *rule, const char *buf, size_t buf_len) {
David Benjaminc11ea9422017-08-29 16:33:21 -0400662 // |strncmp| alone only checks that |buf| is a prefix of |rule|.
David Benjamin0344daf2015-04-08 02:08:01 -0400663 return strncmp(rule, buf, buf_len) == 0 && rule[buf_len] == '\0';
664}
665
Adam Langley95c29f32014-06-20 12:00:00 -0700666static void ll_append_tail(CIPHER_ORDER **head, CIPHER_ORDER *curr,
Adam Langleyfcf25832014-12-18 17:42:32 -0800667 CIPHER_ORDER **tail) {
668 if (curr == *tail) {
669 return;
670 }
671 if (curr == *head) {
672 *head = curr->next;
673 }
674 if (curr->prev != NULL) {
675 curr->prev->next = curr->next;
676 }
677 if (curr->next != NULL) {
678 curr->next->prev = curr->prev;
679 }
680 (*tail)->next = curr;
681 curr->prev = *tail;
682 curr->next = NULL;
683 *tail = curr;
684}
Adam Langley95c29f32014-06-20 12:00:00 -0700685
686static void ll_append_head(CIPHER_ORDER **head, CIPHER_ORDER *curr,
Adam Langleyfcf25832014-12-18 17:42:32 -0800687 CIPHER_ORDER **tail) {
688 if (curr == *head) {
689 return;
690 }
691 if (curr == *tail) {
692 *tail = curr->prev;
693 }
694 if (curr->next != NULL) {
695 curr->next->prev = curr->prev;
696 }
697 if (curr->prev != NULL) {
698 curr->prev->next = curr->next;
699 }
700 (*head)->prev = curr;
701 curr->next = *head;
702 curr->prev = NULL;
703 *head = curr;
704}
Adam Langley95c29f32014-06-20 12:00:00 -0700705
David Benjamin48b276d2018-04-12 17:37:32 -0400706static bool ssl_cipher_collect_ciphers(Array<CIPHER_ORDER> *out_co_list,
707 CIPHER_ORDER **out_head,
708 CIPHER_ORDER **out_tail) {
709 Array<CIPHER_ORDER> co_list;
710 if (!co_list.Init(kCiphersLen)) {
711 return false;
712 }
713
David Benjamina1c90a52015-05-30 17:03:14 -0400714 size_t co_list_num = 0;
David Benjamin5be3a742017-10-28 16:08:58 -0400715 for (const SSL_CIPHER &cipher : kCiphers) {
716 // TLS 1.3 ciphers do not participate in this mechanism.
717 if (cipher.algorithm_mkey != SSL_kGENERIC) {
718 co_list[co_list_num].cipher = &cipher;
Adam Langleyfcf25832014-12-18 17:42:32 -0800719 co_list[co_list_num].next = NULL;
720 co_list[co_list_num].prev = NULL;
David Benjaminf4962492017-09-27 19:34:32 -0400721 co_list[co_list_num].active = false;
722 co_list[co_list_num].in_group = false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800723 co_list_num++;
724 }
725 }
Adam Langley95c29f32014-06-20 12:00:00 -0700726
David Benjaminc11ea9422017-08-29 16:33:21 -0400727 // Prepare linked list from list entries.
Adam Langleyfcf25832014-12-18 17:42:32 -0800728 if (co_list_num > 0) {
729 co_list[0].prev = NULL;
Adam Langley95c29f32014-06-20 12:00:00 -0700730
Adam Langleyfcf25832014-12-18 17:42:32 -0800731 if (co_list_num > 1) {
732 co_list[0].next = &co_list[1];
Adam Langley95c29f32014-06-20 12:00:00 -0700733
David Benjamin54091232016-09-05 12:47:25 -0400734 for (size_t i = 1; i < co_list_num - 1; i++) {
Adam Langleyfcf25832014-12-18 17:42:32 -0800735 co_list[i].prev = &co_list[i - 1];
736 co_list[i].next = &co_list[i + 1];
737 }
Adam Langley95c29f32014-06-20 12:00:00 -0700738
Adam Langleyfcf25832014-12-18 17:42:32 -0800739 co_list[co_list_num - 1].prev = &co_list[co_list_num - 2];
740 }
741
742 co_list[co_list_num - 1].next = NULL;
743
David Benjamin48b276d2018-04-12 17:37:32 -0400744 *out_head = &co_list[0];
745 *out_tail = &co_list[co_list_num - 1];
746 } else {
747 *out_head = nullptr;
748 *out_tail = nullptr;
Adam Langleyfcf25832014-12-18 17:42:32 -0800749 }
David Benjamin48b276d2018-04-12 17:37:32 -0400750 *out_co_list = std::move(co_list);
751 return true;
752}
753
754SSLCipherPreferenceList::~SSLCipherPreferenceList() {
755 OPENSSL_free(in_group_flags);
756}
757
758bool SSLCipherPreferenceList::Init(UniquePtr<STACK_OF(SSL_CIPHER)> ciphers_arg,
759 Span<const bool> in_group_flags_arg) {
760 if (sk_SSL_CIPHER_num(ciphers_arg.get()) != in_group_flags_arg.size()) {
761 OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
762 return false;
763 }
764
765 Array<bool> copy;
766 if (!copy.CopyFrom(in_group_flags_arg)) {
767 return false;
768 }
769 ciphers = std::move(ciphers_arg);
770 size_t unused_len;
771 copy.Release(&in_group_flags, &unused_len);
772 return true;
Adam Langleyfcf25832014-12-18 17:42:32 -0800773}
Adam Langley95c29f32014-06-20 12:00:00 -0700774
David Benjaminc11ea9422017-08-29 16:33:21 -0400775// ssl_cipher_apply_rule applies the rule type |rule| to ciphers matching its
776// parameters in the linked list from |*head_p| to |*tail_p|. It writes the new
777// head and tail of the list to |*head_p| and |*tail_p|, respectively.
778//
779// - If |cipher_id| is non-zero, only that cipher is selected.
780// - Otherwise, if |strength_bits| is non-negative, it selects ciphers
781// of that strength.
782// - Otherwise, it selects ciphers that match each bitmasks in |alg_*| and
783// |min_version|.
Adam Langleyfcf25832014-12-18 17:42:32 -0800784static void ssl_cipher_apply_rule(
David Benjamin107db582015-04-08 00:41:59 -0400785 uint32_t cipher_id, uint32_t alg_mkey, uint32_t alg_auth,
David Benjamind6e9eec2015-11-18 09:48:55 -0500786 uint32_t alg_enc, uint32_t alg_mac, uint16_t min_version, int rule,
David Benjaminf4962492017-09-27 19:34:32 -0400787 int strength_bits, bool in_group, CIPHER_ORDER **head_p,
David Benjamind6e9eec2015-11-18 09:48:55 -0500788 CIPHER_ORDER **tail_p) {
Adam Langleyfcf25832014-12-18 17:42:32 -0800789 CIPHER_ORDER *head, *tail, *curr, *next, *last;
790 const SSL_CIPHER *cp;
David Benjaminf4962492017-09-27 19:34:32 -0400791 bool reverse = false;
Adam Langley95c29f32014-06-20 12:00:00 -0700792
David Benjamindcb6ef02015-11-06 15:35:54 -0500793 if (cipher_id == 0 && strength_bits == -1 && min_version == 0 &&
David Benjamind6e9eec2015-11-18 09:48:55 -0500794 (alg_mkey == 0 || alg_auth == 0 || alg_enc == 0 || alg_mac == 0)) {
David Benjaminc11ea9422017-08-29 16:33:21 -0400795 // The rule matches nothing, so bail early.
David Benjamin0344daf2015-04-08 02:08:01 -0400796 return;
797 }
798
Adam Langleyfcf25832014-12-18 17:42:32 -0800799 if (rule == CIPHER_DEL) {
David Benjaminc11ea9422017-08-29 16:33:21 -0400800 // needed to maintain sorting between currently deleted ciphers
David Benjaminf4962492017-09-27 19:34:32 -0400801 reverse = true;
Adam Langleyfcf25832014-12-18 17:42:32 -0800802 }
Adam Langley95c29f32014-06-20 12:00:00 -0700803
Adam Langleyfcf25832014-12-18 17:42:32 -0800804 head = *head_p;
805 tail = *tail_p;
Adam Langley95c29f32014-06-20 12:00:00 -0700806
Adam Langleyfcf25832014-12-18 17:42:32 -0800807 if (reverse) {
808 next = tail;
809 last = head;
810 } else {
811 next = head;
812 last = tail;
813 }
Adam Langley95c29f32014-06-20 12:00:00 -0700814
Adam Langleyfcf25832014-12-18 17:42:32 -0800815 curr = NULL;
816 for (;;) {
817 if (curr == last) {
818 break;
819 }
Adam Langley95c29f32014-06-20 12:00:00 -0700820
Adam Langleyfcf25832014-12-18 17:42:32 -0800821 curr = next;
822 if (curr == NULL) {
823 break;
824 }
Adam Langleye3142a72014-07-24 17:56:48 -0700825
Adam Langleyfcf25832014-12-18 17:42:32 -0800826 next = reverse ? curr->prev : curr->next;
827 cp = curr->cipher;
Adam Langleye3142a72014-07-24 17:56:48 -0700828
David Benjaminc11ea9422017-08-29 16:33:21 -0400829 // Selection criteria is either a specific cipher, the value of
830 // |strength_bits|, or the algorithms used.
David Benjamin0344daf2015-04-08 02:08:01 -0400831 if (cipher_id != 0) {
832 if (cipher_id != cp->id) {
833 continue;
834 }
835 } else if (strength_bits >= 0) {
David Benjamin9f2e2772015-11-18 09:59:43 -0500836 if (strength_bits != SSL_CIPHER_get_bits(cp, NULL)) {
Adam Langleyfcf25832014-12-18 17:42:32 -0800837 continue;
838 }
David Benjamin881f1962016-08-10 18:29:12 -0400839 } else {
840 if (!(alg_mkey & cp->algorithm_mkey) ||
841 !(alg_auth & cp->algorithm_auth) ||
842 !(alg_enc & cp->algorithm_enc) ||
843 !(alg_mac & cp->algorithm_mac) ||
David Benjamin3b903f22017-09-29 18:44:56 -0400844 (min_version != 0 && SSL_CIPHER_get_min_version(cp) != min_version) ||
845 // The NULL cipher must be selected explicitly.
846 cp->algorithm_enc == SSL_eNULL) {
David Benjamin881f1962016-08-10 18:29:12 -0400847 continue;
848 }
Adam Langleyfcf25832014-12-18 17:42:32 -0800849 }
Adam Langleye3142a72014-07-24 17:56:48 -0700850
David Benjaminc11ea9422017-08-29 16:33:21 -0400851 // add the cipher if it has not been added yet.
Adam Langleyfcf25832014-12-18 17:42:32 -0800852 if (rule == CIPHER_ADD) {
David Benjaminf4962492017-09-27 19:34:32 -0400853 // reverse == false
Adam Langleyfcf25832014-12-18 17:42:32 -0800854 if (!curr->active) {
855 ll_append_tail(&head, curr, &tail);
David Benjaminf4962492017-09-27 19:34:32 -0400856 curr->active = true;
Adam Langleyfcf25832014-12-18 17:42:32 -0800857 curr->in_group = in_group;
858 }
859 }
Adam Langley95c29f32014-06-20 12:00:00 -0700860
David Benjaminc11ea9422017-08-29 16:33:21 -0400861 // Move the added cipher to this location
Adam Langleyfcf25832014-12-18 17:42:32 -0800862 else if (rule == CIPHER_ORD) {
David Benjaminf4962492017-09-27 19:34:32 -0400863 // reverse == false
Adam Langleyfcf25832014-12-18 17:42:32 -0800864 if (curr->active) {
865 ll_append_tail(&head, curr, &tail);
David Benjaminf4962492017-09-27 19:34:32 -0400866 curr->in_group = false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800867 }
868 } else if (rule == CIPHER_DEL) {
David Benjaminf4962492017-09-27 19:34:32 -0400869 // reverse == true
Adam Langleyfcf25832014-12-18 17:42:32 -0800870 if (curr->active) {
David Benjaminc11ea9422017-08-29 16:33:21 -0400871 // most recently deleted ciphersuites get best positions
872 // for any future CIPHER_ADD (note that the CIPHER_DEL loop
873 // works in reverse to maintain the order)
Adam Langleyfcf25832014-12-18 17:42:32 -0800874 ll_append_head(&head, curr, &tail);
David Benjaminf4962492017-09-27 19:34:32 -0400875 curr->active = false;
876 curr->in_group = false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800877 }
878 } else if (rule == CIPHER_KILL) {
David Benjaminf4962492017-09-27 19:34:32 -0400879 // reverse == false
Adam Langleyfcf25832014-12-18 17:42:32 -0800880 if (head == curr) {
881 head = curr->next;
882 } else {
883 curr->prev->next = curr->next;
884 }
Adam Langley95c29f32014-06-20 12:00:00 -0700885
Adam Langleyfcf25832014-12-18 17:42:32 -0800886 if (tail == curr) {
887 tail = curr->prev;
888 }
David Benjaminf4962492017-09-27 19:34:32 -0400889 curr->active = false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800890 if (curr->next != NULL) {
891 curr->next->prev = curr->prev;
892 }
893 if (curr->prev != NULL) {
894 curr->prev->next = curr->next;
895 }
896 curr->next = NULL;
897 curr->prev = NULL;
898 }
899 }
Adam Langley95c29f32014-06-20 12:00:00 -0700900
Adam Langleyfcf25832014-12-18 17:42:32 -0800901 *head_p = head;
902 *tail_p = tail;
903}
Adam Langley95c29f32014-06-20 12:00:00 -0700904
David Benjaminf4962492017-09-27 19:34:32 -0400905static bool ssl_cipher_strength_sort(CIPHER_ORDER **head_p,
906 CIPHER_ORDER **tail_p) {
David Benjaminc11ea9422017-08-29 16:33:21 -0400907 // This routine sorts the ciphers with descending strength. The sorting must
908 // keep the pre-sorted sequence, so we apply the normal sorting routine as
909 // '+' movement to the end of the list.
David Benjaminf4962492017-09-27 19:34:32 -0400910 int max_strength_bits = 0;
911 CIPHER_ORDER *curr = *head_p;
Adam Langleyfcf25832014-12-18 17:42:32 -0800912 while (curr != NULL) {
David Benjamin9f2e2772015-11-18 09:59:43 -0500913 if (curr->active &&
914 SSL_CIPHER_get_bits(curr->cipher, NULL) > max_strength_bits) {
915 max_strength_bits = SSL_CIPHER_get_bits(curr->cipher, NULL);
Adam Langleyfcf25832014-12-18 17:42:32 -0800916 }
917 curr = curr->next;
918 }
Adam Langley95c29f32014-06-20 12:00:00 -0700919
David Benjaminf4962492017-09-27 19:34:32 -0400920 Array<int> number_uses;
921 if (!number_uses.Init(max_strength_bits + 1)) {
922 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800923 }
David Benjaminf4962492017-09-27 19:34:32 -0400924 OPENSSL_memset(number_uses.data(), 0, (max_strength_bits + 1) * sizeof(int));
Adam Langley95c29f32014-06-20 12:00:00 -0700925
David Benjaminc11ea9422017-08-29 16:33:21 -0400926 // Now find the strength_bits values actually used.
Adam Langleyfcf25832014-12-18 17:42:32 -0800927 curr = *head_p;
928 while (curr != NULL) {
929 if (curr->active) {
David Benjamin9f2e2772015-11-18 09:59:43 -0500930 number_uses[SSL_CIPHER_get_bits(curr->cipher, NULL)]++;
Adam Langleyfcf25832014-12-18 17:42:32 -0800931 }
932 curr = curr->next;
933 }
Adam Langley95c29f32014-06-20 12:00:00 -0700934
David Benjaminc11ea9422017-08-29 16:33:21 -0400935 // Go through the list of used strength_bits values in descending order.
David Benjaminf4962492017-09-27 19:34:32 -0400936 for (int i = max_strength_bits; i >= 0; i--) {
Adam Langleyfcf25832014-12-18 17:42:32 -0800937 if (number_uses[i] > 0) {
David Benjaminf4962492017-09-27 19:34:32 -0400938 ssl_cipher_apply_rule(0, 0, 0, 0, 0, 0, CIPHER_ORD, i, false, head_p,
939 tail_p);
Adam Langleyfcf25832014-12-18 17:42:32 -0800940 }
941 }
942
David Benjaminf4962492017-09-27 19:34:32 -0400943 return true;
Adam Langleyfcf25832014-12-18 17:42:32 -0800944}
Adam Langley95c29f32014-06-20 12:00:00 -0700945
David Benjamin5be3a742017-10-28 16:08:58 -0400946static bool ssl_cipher_process_rulestr(const char *rule_str,
David Benjaminf4962492017-09-27 19:34:32 -0400947 CIPHER_ORDER **head_p,
948 CIPHER_ORDER **tail_p, bool strict) {
David Benjamind6e9eec2015-11-18 09:48:55 -0500949 uint32_t alg_mkey, alg_auth, alg_enc, alg_mac;
David Benjamindcb6ef02015-11-06 15:35:54 -0500950 uint16_t min_version;
Adam Langleyfcf25832014-12-18 17:42:32 -0800951 const char *l, *buf;
David Benjaminf4962492017-09-27 19:34:32 -0400952 int rule;
953 bool multi, skip_rule, in_group = false, has_group = false;
David Benjamin0344daf2015-04-08 02:08:01 -0400954 size_t j, buf_len;
955 uint32_t cipher_id;
Adam Langleyfcf25832014-12-18 17:42:32 -0800956 char ch;
Adam Langley95c29f32014-06-20 12:00:00 -0700957
Adam Langleyfcf25832014-12-18 17:42:32 -0800958 l = rule_str;
959 for (;;) {
960 ch = *l;
Adam Langley95c29f32014-06-20 12:00:00 -0700961
Adam Langleyfcf25832014-12-18 17:42:32 -0800962 if (ch == '\0') {
David Benjaminc11ea9422017-08-29 16:33:21 -0400963 break; // done
Adam Langleyfcf25832014-12-18 17:42:32 -0800964 }
Adam Langley95c29f32014-06-20 12:00:00 -0700965
Adam Langleyfcf25832014-12-18 17:42:32 -0800966 if (in_group) {
967 if (ch == ']') {
Adam Langleyfcf25832014-12-18 17:42:32 -0800968 if (*tail_p) {
David Benjaminf4962492017-09-27 19:34:32 -0400969 (*tail_p)->in_group = false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800970 }
David Benjaminf4962492017-09-27 19:34:32 -0400971 in_group = false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800972 l++;
973 continue;
974 }
David Benjamin37d92462014-09-20 17:54:24 -0400975
Adam Langleyfcf25832014-12-18 17:42:32 -0800976 if (ch == '|') {
977 rule = CIPHER_ADD;
978 l++;
979 continue;
980 } else if (!(ch >= 'a' && ch <= 'z') && !(ch >= 'A' && ch <= 'Z') &&
981 !(ch >= '0' && ch <= '9')) {
David Benjamin3570d732015-06-29 00:28:17 -0400982 OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_OPERATOR_IN_GROUP);
David Benjaminf4962492017-09-27 19:34:32 -0400983 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -0800984 } else {
985 rule = CIPHER_ADD;
986 }
987 } else if (ch == '-') {
988 rule = CIPHER_DEL;
989 l++;
990 } else if (ch == '+') {
991 rule = CIPHER_ORD;
992 l++;
993 } else if (ch == '!') {
994 rule = CIPHER_KILL;
995 l++;
996 } else if (ch == '@') {
997 rule = CIPHER_SPECIAL;
998 l++;
999 } else if (ch == '[') {
David Benjaminbf5f1922017-07-01 11:13:53 -04001000 assert(!in_group);
David Benjaminf4962492017-09-27 19:34:32 -04001001 in_group = true;
1002 has_group = true;
Adam Langleyfcf25832014-12-18 17:42:32 -08001003 l++;
1004 continue;
1005 } else {
1006 rule = CIPHER_ADD;
1007 }
Adam Langley95c29f32014-06-20 12:00:00 -07001008
David Benjaminc11ea9422017-08-29 16:33:21 -04001009 // If preference groups are enabled, the only legal operator is +.
1010 // Otherwise the in_group bits will get mixed up.
Adam Langleyfcf25832014-12-18 17:42:32 -08001011 if (has_group && rule != CIPHER_ADD) {
David Benjamin3570d732015-06-29 00:28:17 -04001012 OPENSSL_PUT_ERROR(SSL, SSL_R_MIXED_SPECIAL_OPERATOR_WITH_GROUPS);
David Benjaminf4962492017-09-27 19:34:32 -04001013 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001014 }
Adam Langley95c29f32014-06-20 12:00:00 -07001015
Adam Langley22df6912017-07-25 12:27:37 -07001016 if (is_cipher_list_separator(ch, strict)) {
Adam Langleyfcf25832014-12-18 17:42:32 -08001017 l++;
1018 continue;
1019 }
Adam Langley95c29f32014-06-20 12:00:00 -07001020
David Benjaminf4962492017-09-27 19:34:32 -04001021 multi = false;
David Benjamin0344daf2015-04-08 02:08:01 -04001022 cipher_id = 0;
1023 alg_mkey = ~0u;
1024 alg_auth = ~0u;
1025 alg_enc = ~0u;
1026 alg_mac = ~0u;
David Benjamindcb6ef02015-11-06 15:35:54 -05001027 min_version = 0;
David Benjaminf4962492017-09-27 19:34:32 -04001028 skip_rule = false;
Adam Langley95c29f32014-06-20 12:00:00 -07001029
Adam Langleyfcf25832014-12-18 17:42:32 -08001030 for (;;) {
1031 ch = *l;
1032 buf = l;
David Benjamin0344daf2015-04-08 02:08:01 -04001033 buf_len = 0;
David Benjamin6fff3862017-06-21 21:07:04 -04001034 while ((ch >= 'A' && ch <= 'Z') || (ch >= '0' && ch <= '9') ||
1035 (ch >= 'a' && ch <= 'z') || ch == '-' || ch == '.' || ch == '_') {
Adam Langleyfcf25832014-12-18 17:42:32 -08001036 ch = *(++l);
David Benjamin0344daf2015-04-08 02:08:01 -04001037 buf_len++;
Adam Langleyfcf25832014-12-18 17:42:32 -08001038 }
Adam Langley95c29f32014-06-20 12:00:00 -07001039
David Benjamin0344daf2015-04-08 02:08:01 -04001040 if (buf_len == 0) {
David Benjaminc11ea9422017-08-29 16:33:21 -04001041 // We hit something we cannot deal with, it is no command or separator
1042 // nor alphanumeric, so we call this an error.
David Benjamin3570d732015-06-29 00:28:17 -04001043 OPENSSL_PUT_ERROR(SSL, SSL_R_INVALID_COMMAND);
David Benjaminf4962492017-09-27 19:34:32 -04001044 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001045 }
Adam Langley95c29f32014-06-20 12:00:00 -07001046
Adam Langleyfcf25832014-12-18 17:42:32 -08001047 if (rule == CIPHER_SPECIAL) {
Adam Langleyfcf25832014-12-18 17:42:32 -08001048 break;
1049 }
David Benjamin0344daf2015-04-08 02:08:01 -04001050
David Benjaminc11ea9422017-08-29 16:33:21 -04001051 // Look for a matching exact cipher. These aren't allowed in multipart
1052 // rules.
David Benjamin0344daf2015-04-08 02:08:01 -04001053 if (!multi && ch != '+') {
David Benjamina1c90a52015-05-30 17:03:14 -04001054 for (j = 0; j < kCiphersLen; j++) {
1055 const SSL_CIPHER *cipher = &kCiphers[j];
David Benjamin6fff3862017-06-21 21:07:04 -04001056 if (rule_equals(cipher->name, buf, buf_len) ||
1057 rule_equals(cipher->standard_name, buf, buf_len)) {
David Benjamin0344daf2015-04-08 02:08:01 -04001058 cipher_id = cipher->id;
1059 break;
1060 }
1061 }
1062 }
1063 if (cipher_id == 0) {
David Benjaminc11ea9422017-08-29 16:33:21 -04001064 // If not an exact cipher, look for a matching cipher alias.
David Benjamina1c90a52015-05-30 17:03:14 -04001065 for (j = 0; j < kCipherAliasesLen; j++) {
David Benjamin0344daf2015-04-08 02:08:01 -04001066 if (rule_equals(kCipherAliases[j].name, buf, buf_len)) {
1067 alg_mkey &= kCipherAliases[j].algorithm_mkey;
1068 alg_auth &= kCipherAliases[j].algorithm_auth;
1069 alg_enc &= kCipherAliases[j].algorithm_enc;
1070 alg_mac &= kCipherAliases[j].algorithm_mac;
David Benjamindcb6ef02015-11-06 15:35:54 -05001071
1072 if (min_version != 0 &&
1073 min_version != kCipherAliases[j].min_version) {
David Benjaminf4962492017-09-27 19:34:32 -04001074 skip_rule = true;
David Benjamindcb6ef02015-11-06 15:35:54 -05001075 } else {
1076 min_version = kCipherAliases[j].min_version;
1077 }
David Benjamin0344daf2015-04-08 02:08:01 -04001078 break;
1079 }
1080 }
David Benjamina1c90a52015-05-30 17:03:14 -04001081 if (j == kCipherAliasesLen) {
David Benjaminf4962492017-09-27 19:34:32 -04001082 skip_rule = true;
Matthew Braithwaitea57dcfb2017-02-17 22:08:23 -08001083 if (strict) {
1084 OPENSSL_PUT_ERROR(SSL, SSL_R_INVALID_COMMAND);
David Benjaminf4962492017-09-27 19:34:32 -04001085 return false;
Matthew Braithwaitea57dcfb2017-02-17 22:08:23 -08001086 }
David Benjamin0344daf2015-04-08 02:08:01 -04001087 }
1088 }
1089
David Benjaminc11ea9422017-08-29 16:33:21 -04001090 // Check for a multipart rule.
David Benjamin0344daf2015-04-08 02:08:01 -04001091 if (ch != '+') {
1092 break;
1093 }
1094 l++;
David Benjaminf4962492017-09-27 19:34:32 -04001095 multi = true;
Adam Langleyfcf25832014-12-18 17:42:32 -08001096 }
Adam Langley95c29f32014-06-20 12:00:00 -07001097
David Benjaminc11ea9422017-08-29 16:33:21 -04001098 // Ok, we have the rule, now apply it.
Adam Langleyfcf25832014-12-18 17:42:32 -08001099 if (rule == CIPHER_SPECIAL) {
David Benjaminbf5f1922017-07-01 11:13:53 -04001100 if (buf_len != 8 || strncmp(buf, "STRENGTH", 8) != 0) {
David Benjamin3570d732015-06-29 00:28:17 -04001101 OPENSSL_PUT_ERROR(SSL, SSL_R_INVALID_COMMAND);
David Benjaminf4962492017-09-27 19:34:32 -04001102 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001103 }
David Benjaminbf5f1922017-07-01 11:13:53 -04001104 if (!ssl_cipher_strength_sort(head_p, tail_p)) {
David Benjaminf4962492017-09-27 19:34:32 -04001105 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001106 }
Adam Langley95c29f32014-06-20 12:00:00 -07001107
David Benjaminc11ea9422017-08-29 16:33:21 -04001108 // We do not support any "multi" options together with "@", so throw away
1109 // the rest of the command, if any left, until end or ':' is found.
Adam Langley22df6912017-07-25 12:27:37 -07001110 while (*l != '\0' && !is_cipher_list_separator(*l, strict)) {
Adam Langleyfcf25832014-12-18 17:42:32 -08001111 l++;
1112 }
David Benjamindcb6ef02015-11-06 15:35:54 -05001113 } else if (!skip_rule) {
Adam Langleyfcf25832014-12-18 17:42:32 -08001114 ssl_cipher_apply_rule(cipher_id, alg_mkey, alg_auth, alg_enc, alg_mac,
David Benjamind6e9eec2015-11-18 09:48:55 -05001115 min_version, rule, -1, in_group, head_p, tail_p);
Adam Langleyfcf25832014-12-18 17:42:32 -08001116 }
1117 }
Adam Langley95c29f32014-06-20 12:00:00 -07001118
Adam Langleyfcf25832014-12-18 17:42:32 -08001119 if (in_group) {
David Benjamin3570d732015-06-29 00:28:17 -04001120 OPENSSL_PUT_ERROR(SSL, SSL_R_INVALID_COMMAND);
David Benjaminf4962492017-09-27 19:34:32 -04001121 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001122 }
Adam Langley95c29f32014-06-20 12:00:00 -07001123
David Benjaminf4962492017-09-27 19:34:32 -04001124 return true;
Adam Langleyfcf25832014-12-18 17:42:32 -08001125}
Adam Langley95c29f32014-06-20 12:00:00 -07001126
David Benjamin0ce090a2018-07-02 20:24:40 -04001127bool ssl_create_cipher_list(UniquePtr<SSLCipherPreferenceList> *out_cipher_list,
David Benjamin48b276d2018-04-12 17:37:32 -04001128 const char *rule_str, bool strict) {
David Benjaminc11ea9422017-08-29 16:33:21 -04001129 // Return with error if nothing to do.
David Benjamin71f07942015-04-08 02:36:59 -04001130 if (rule_str == NULL || out_cipher_list == NULL) {
David Benjaminf4962492017-09-27 19:34:32 -04001131 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001132 }
David Benjamin5213df42014-08-20 14:19:54 -04001133
David Benjaminc11ea9422017-08-29 16:33:21 -04001134 // Now we have to collect the available ciphers from the compiled in ciphers.
1135 // We cannot get more than the number compiled in, so it is used for
1136 // allocation.
David Benjamin48b276d2018-04-12 17:37:32 -04001137 Array<CIPHER_ORDER> co_list;
1138 CIPHER_ORDER *head = nullptr, *tail = nullptr;
1139 if (!ssl_cipher_collect_ciphers(&co_list, &head, &tail)) {
David Benjaminf4962492017-09-27 19:34:32 -04001140 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001141 }
Adam Langley95c29f32014-06-20 12:00:00 -07001142
David Benjaminc11ea9422017-08-29 16:33:21 -04001143 // Now arrange all ciphers by preference:
1144 // TODO(davidben): Compute this order once and copy it.
Adam Langley95c29f32014-06-20 12:00:00 -07001145
David Benjaminc11ea9422017-08-29 16:33:21 -04001146 // Everything else being equal, prefer ECDHE_ECDSA and ECDHE_RSA over other
1147 // key exchange mechanisms
David Benjamind6e9eec2015-11-18 09:48:55 -05001148 ssl_cipher_apply_rule(0, SSL_kECDHE, SSL_aECDSA, ~0u, ~0u, 0, CIPHER_ADD, -1,
David Benjaminf4962492017-09-27 19:34:32 -04001149 false, &head, &tail);
1150 ssl_cipher_apply_rule(0, SSL_kECDHE, ~0u, ~0u, ~0u, 0, CIPHER_ADD, -1, false,
David Benjamind6e9eec2015-11-18 09:48:55 -05001151 &head, &tail);
David Benjaminf4962492017-09-27 19:34:32 -04001152 ssl_cipher_apply_rule(0, ~0u, ~0u, ~0u, ~0u, 0, CIPHER_DEL, -1, false, &head,
Steven Valdez803c77a2016-09-06 14:13:43 -04001153 &tail);
Adam Langley95c29f32014-06-20 12:00:00 -07001154
David Benjaminc11ea9422017-08-29 16:33:21 -04001155 // Order the bulk ciphers. First the preferred AEAD ciphers. We prefer
1156 // CHACHA20 unless there is hardware support for fast and constant-time
1157 // AES_GCM. Of the two CHACHA20 variants, the new one is preferred over the
1158 // old one.
Adam Langleyfcf25832014-12-18 17:42:32 -08001159 if (EVP_has_aes_hardware()) {
David Benjaminf4962492017-09-27 19:34:32 -04001160 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_AES128GCM, ~0u, 0, CIPHER_ADD, -1,
1161 false, &head, &tail);
1162 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_AES256GCM, ~0u, 0, CIPHER_ADD, -1,
1163 false, &head, &tail);
David Benjamin13414b32015-12-09 23:02:39 -05001164 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_CHACHA20POLY1305, ~0u, 0, CIPHER_ADD,
David Benjaminf4962492017-09-27 19:34:32 -04001165 -1, false, &head, &tail);
Adam Langleyfcf25832014-12-18 17:42:32 -08001166 } else {
David Benjamin13414b32015-12-09 23:02:39 -05001167 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_CHACHA20POLY1305, ~0u, 0, CIPHER_ADD,
David Benjaminf4962492017-09-27 19:34:32 -04001168 -1, false, &head, &tail);
1169 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_AES128GCM, ~0u, 0, CIPHER_ADD, -1,
1170 false, &head, &tail);
1171 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_AES256GCM, ~0u, 0, CIPHER_ADD, -1,
1172 false, &head, &tail);
Adam Langleyfcf25832014-12-18 17:42:32 -08001173 }
Adam Langley95c29f32014-06-20 12:00:00 -07001174
David Benjaminc11ea9422017-08-29 16:33:21 -04001175 // Then the legacy non-AEAD ciphers: AES_128_CBC, AES_256_CBC,
1176 // 3DES_EDE_CBC_SHA.
David Benjaminf4962492017-09-27 19:34:32 -04001177 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_AES128, ~0u, 0, CIPHER_ADD, -1, false,
David Benjamind6e9eec2015-11-18 09:48:55 -05001178 &head, &tail);
David Benjaminf4962492017-09-27 19:34:32 -04001179 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_AES256, ~0u, 0, CIPHER_ADD, -1, false,
David Benjamin43336652016-03-03 15:32:29 -05001180 &head, &tail);
David Benjaminf4962492017-09-27 19:34:32 -04001181 ssl_cipher_apply_rule(0, ~0u, ~0u, SSL_3DES, ~0u, 0, CIPHER_ADD, -1, false,
1182 &head, &tail);
Adam Langley95c29f32014-06-20 12:00:00 -07001183
David Benjaminc11ea9422017-08-29 16:33:21 -04001184 // Temporarily enable everything else for sorting
David Benjaminf4962492017-09-27 19:34:32 -04001185 ssl_cipher_apply_rule(0, ~0u, ~0u, ~0u, ~0u, 0, CIPHER_ADD, -1, false, &head,
David Benjamind6e9eec2015-11-18 09:48:55 -05001186 &tail);
Adam Langley95c29f32014-06-20 12:00:00 -07001187
David Benjaminc11ea9422017-08-29 16:33:21 -04001188 // Move ciphers without forward secrecy to the end.
David Benjaminf4962492017-09-27 19:34:32 -04001189 ssl_cipher_apply_rule(0, (SSL_kRSA | SSL_kPSK), ~0u, ~0u, ~0u, 0, CIPHER_ORD,
1190 -1, false, &head, &tail);
Adam Langley95c29f32014-06-20 12:00:00 -07001191
David Benjaminc11ea9422017-08-29 16:33:21 -04001192 // Now disable everything (maintaining the ordering!)
David Benjaminf4962492017-09-27 19:34:32 -04001193 ssl_cipher_apply_rule(0, ~0u, ~0u, ~0u, ~0u, 0, CIPHER_DEL, -1, false, &head,
David Benjamind6e9eec2015-11-18 09:48:55 -05001194 &tail);
Adam Langley95c29f32014-06-20 12:00:00 -07001195
David Benjaminc11ea9422017-08-29 16:33:21 -04001196 // If the rule_string begins with DEFAULT, apply the default rule before
1197 // using the (possibly available) additional rules.
David Benjamin11a7b3c2016-11-03 17:03:48 -04001198 const char *rule_p = rule_str;
Adam Langleyfcf25832014-12-18 17:42:32 -08001199 if (strncmp(rule_str, "DEFAULT", 7) == 0) {
David Benjamin5be3a742017-10-28 16:08:58 -04001200 if (!ssl_cipher_process_rulestr(SSL_DEFAULT_CIPHER_LIST, &head, &tail,
1201 strict)) {
David Benjamin48b276d2018-04-12 17:37:32 -04001202 return false;
David Benjamin11a7b3c2016-11-03 17:03:48 -04001203 }
Adam Langleyfcf25832014-12-18 17:42:32 -08001204 rule_p += 7;
1205 if (*rule_p == ':') {
1206 rule_p++;
1207 }
1208 }
Adam Langley858a88d2014-06-20 12:00:00 -07001209
David Benjamin11a7b3c2016-11-03 17:03:48 -04001210 if (*rule_p != '\0' &&
David Benjamin5be3a742017-10-28 16:08:58 -04001211 !ssl_cipher_process_rulestr(rule_p, &head, &tail, strict)) {
David Benjamin48b276d2018-04-12 17:37:32 -04001212 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001213 }
1214
David Benjaminc11ea9422017-08-29 16:33:21 -04001215 // Allocate new "cipherstack" for the result, return with error
1216 // if we cannot get one.
David Benjamin48b276d2018-04-12 17:37:32 -04001217 UniquePtr<STACK_OF(SSL_CIPHER)> cipherstack(sk_SSL_CIPHER_new_null());
1218 Array<bool> in_group_flags;
1219 if (cipherstack == nullptr ||
1220 !in_group_flags.Init(kCiphersLen)) {
1221 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001222 }
1223
David Benjaminc11ea9422017-08-29 16:33:21 -04001224 // The cipher selection for the list is done. The ciphers are added
1225 // to the resulting precedence to the STACK_OF(SSL_CIPHER).
David Benjamin48b276d2018-04-12 17:37:32 -04001226 size_t num_in_group_flags = 0;
1227 for (CIPHER_ORDER *curr = head; curr != NULL; curr = curr->next) {
Adam Langleyfcf25832014-12-18 17:42:32 -08001228 if (curr->active) {
David Benjamin48b276d2018-04-12 17:37:32 -04001229 if (!sk_SSL_CIPHER_push(cipherstack.get(), curr->cipher)) {
1230 return false;
David Benjamin2adb7ec2015-01-11 19:59:06 -05001231 }
Adam Langleyfcf25832014-12-18 17:42:32 -08001232 in_group_flags[num_in_group_flags++] = curr->in_group;
1233 }
1234 }
Adam Langleyfcf25832014-12-18 17:42:32 -08001235
David Benjamin48b276d2018-04-12 17:37:32 -04001236 UniquePtr<SSLCipherPreferenceList> pref_list =
1237 MakeUnique<SSLCipherPreferenceList>();
1238 if (!pref_list ||
1239 !pref_list->Init(
1240 std::move(cipherstack),
1241 MakeConstSpan(in_group_flags).subspan(0, num_in_group_flags))) {
1242 return false;
Adam Langleyfcf25832014-12-18 17:42:32 -08001243 }
David Benjamin48b276d2018-04-12 17:37:32 -04001244
David Benjamin0ce090a2018-07-02 20:24:40 -04001245 *out_cipher_list = std::move(pref_list);
Adam Langleyfcf25832014-12-18 17:42:32 -08001246
David Benjaminc11ea9422017-08-29 16:33:21 -04001247 // Configuring an empty cipher list is an error but still updates the
1248 // output.
David Benjamin48b276d2018-04-12 17:37:32 -04001249 if (sk_SSL_CIPHER_num((*out_cipher_list)->ciphers.get()) == 0) {
David Benjamin91222b82017-03-09 20:10:56 -05001250 OPENSSL_PUT_ERROR(SSL, SSL_R_NO_CIPHER_MATCH);
David Benjaminf4962492017-09-27 19:34:32 -04001251 return false;
David Benjamin91222b82017-03-09 20:10:56 -05001252 }
1253
David Benjaminf4962492017-09-27 19:34:32 -04001254 return true;
Adam Langleyfcf25832014-12-18 17:42:32 -08001255}
Adam Langley95c29f32014-06-20 12:00:00 -07001256
David Benjamina1c90a52015-05-30 17:03:14 -04001257uint16_t ssl_cipher_get_value(const SSL_CIPHER *cipher) {
1258 uint32_t id = cipher->id;
David Benjaminc59b9aa2018-07-16 21:34:03 -04001259 // All OpenSSL cipher IDs are prefaced with 0x03. Historically this referred
1260 // to SSLv2 vs SSLv3.
David Benjamina1c90a52015-05-30 17:03:14 -04001261 assert((id & 0xff000000) == 0x03000000);
1262 return id & 0xffff;
1263}
1264
David Benjamin86e95b82017-07-18 16:34:25 -04001265uint32_t ssl_cipher_auth_mask_for_key(const EVP_PKEY *key) {
1266 switch (EVP_PKEY_id(key)) {
1267 case EVP_PKEY_RSA:
1268 return SSL_aRSA;
1269 case EVP_PKEY_EC:
1270 case EVP_PKEY_ED25519:
David Benjaminc11ea9422017-08-29 16:33:21 -04001271 // Ed25519 keys in TLS 1.2 repurpose the ECDSA ciphers.
David Benjamin86e95b82017-07-18 16:34:25 -04001272 return SSL_aECDSA;
1273 default:
1274 return 0;
1275 }
1276}
1277
David Benjaminf4962492017-09-27 19:34:32 -04001278bool ssl_cipher_uses_certificate_auth(const SSL_CIPHER *cipher) {
David Benjamin86e95b82017-07-18 16:34:25 -04001279 return (cipher->algorithm_auth & SSL_aCERT) != 0;
1280}
1281
David Benjaminf4962492017-09-27 19:34:32 -04001282bool ssl_cipher_requires_server_key_exchange(const SSL_CIPHER *cipher) {
1283 // Ephemeral Diffie-Hellman key exchanges require a ServerKeyExchange. It is
1284 // optional or omitted in all others.
1285 return (cipher->algorithm_mkey & SSL_kECDHE) != 0;
David Benjamin86e95b82017-07-18 16:34:25 -04001286}
1287
1288size_t ssl_cipher_get_record_split_len(const SSL_CIPHER *cipher) {
1289 size_t block_size;
1290 switch (cipher->algorithm_enc) {
1291 case SSL_3DES:
1292 block_size = 8;
1293 break;
1294 case SSL_AES128:
1295 case SSL_AES256:
1296 block_size = 16;
1297 break;
1298 default:
1299 return 0;
1300 }
1301
David Benjaminc11ea9422017-08-29 16:33:21 -04001302 // All supported TLS 1.0 ciphers use SHA-1.
David Benjamin86e95b82017-07-18 16:34:25 -04001303 assert(cipher->algorithm_mac == SSL_SHA1);
1304 size_t ret = 1 + SHA_DIGEST_LENGTH;
1305 ret += block_size - (ret % block_size);
1306 return ret;
1307}
1308
1309} // namespace bssl
1310
1311using namespace bssl;
1312
MichaƂ Janiszewskic4f3b8a2018-07-30 22:50:40 +02001313static constexpr int ssl_cipher_id_cmp_inner(const SSL_CIPHER *a,
1314 const SSL_CIPHER *b) {
1315 // C++11's constexpr functions must have a body consisting of just a
1316 // return-statement.
1317 return (a->id > b->id) ? 1 : ((a->id < b->id) ? -1 : 0);
1318}
1319
1320static int ssl_cipher_id_cmp(const void *in_a, const void *in_b) {
1321 return ssl_cipher_id_cmp_inner(reinterpret_cast<const SSL_CIPHER *>(in_a),
1322 reinterpret_cast<const SSL_CIPHER *>(in_b));
1323}
1324
1325template <typename T, size_t N>
1326static constexpr size_t countof(T const (&)[N]) {
1327 return N;
1328}
1329
1330template <typename T, size_t I>
1331static constexpr int check_order(const T (&arr)[I], size_t N) {
1332 // C++11's constexpr functions must have a body consisting of just a
1333 // return-statement.
1334 return N > 1 ? ((ssl_cipher_id_cmp_inner(&arr[N - 2], &arr[N - 1]) < 0)
1335 ? check_order(arr, N - 1)
1336 : 0)
1337 : 1;
1338}
1339
1340static_assert(check_order(kCiphers, countof(kCiphers)) == 1,
1341 "Ciphers are not sorted, bsearch won't work");
1342
David Benjamin86e95b82017-07-18 16:34:25 -04001343const SSL_CIPHER *SSL_get_cipher_by_value(uint16_t value) {
1344 SSL_CIPHER c;
1345
1346 c.id = 0x03000000L | value;
1347 return reinterpret_cast<const SSL_CIPHER *>(bsearch(
1348 &c, kCiphers, kCiphersLen, sizeof(SSL_CIPHER), ssl_cipher_id_cmp));
1349}
1350
1351uint32_t SSL_CIPHER_get_id(const SSL_CIPHER *cipher) { return cipher->id; }
1352
David Benjamin348f0d82017-08-10 16:06:27 -04001353int SSL_CIPHER_is_aead(const SSL_CIPHER *cipher) {
Alessandro Ghedini0726fb72017-01-17 13:27:08 +00001354 return (cipher->algorithm_mac & SSL_AEAD) != 0;
1355}
1356
David Benjamin348f0d82017-08-10 16:06:27 -04001357int SSL_CIPHER_get_cipher_nid(const SSL_CIPHER *cipher) {
1358 switch (cipher->algorithm_enc) {
1359 case SSL_eNULL:
1360 return NID_undef;
1361 case SSL_3DES:
1362 return NID_des_ede3_cbc;
1363 case SSL_AES128:
1364 return NID_aes_128_cbc;
1365 case SSL_AES256:
1366 return NID_aes_256_cbc;
1367 case SSL_AES128GCM:
1368 return NID_aes_128_gcm;
1369 case SSL_AES256GCM:
1370 return NID_aes_256_gcm;
1371 case SSL_CHACHA20POLY1305:
1372 return NID_chacha20_poly1305;
1373 }
1374 assert(0);
1375 return NID_undef;
1376}
1377
1378int SSL_CIPHER_get_digest_nid(const SSL_CIPHER *cipher) {
1379 switch (cipher->algorithm_mac) {
1380 case SSL_AEAD:
1381 return NID_undef;
1382 case SSL_SHA1:
1383 return NID_sha1;
David Benjamin348f0d82017-08-10 16:06:27 -04001384 }
1385 assert(0);
1386 return NID_undef;
1387}
1388
1389int SSL_CIPHER_get_kx_nid(const SSL_CIPHER *cipher) {
1390 switch (cipher->algorithm_mkey) {
1391 case SSL_kRSA:
1392 return NID_kx_rsa;
1393 case SSL_kECDHE:
1394 return NID_kx_ecdhe;
1395 case SSL_kPSK:
1396 return NID_kx_psk;
1397 case SSL_kGENERIC:
1398 return NID_kx_any;
1399 }
1400 assert(0);
1401 return NID_undef;
1402}
1403
1404int SSL_CIPHER_get_auth_nid(const SSL_CIPHER *cipher) {
1405 switch (cipher->algorithm_auth) {
1406 case SSL_aRSA:
1407 return NID_auth_rsa;
1408 case SSL_aECDSA:
1409 return NID_auth_ecdsa;
1410 case SSL_aPSK:
1411 return NID_auth_psk;
1412 case SSL_aGENERIC:
1413 return NID_auth_any;
1414 }
1415 assert(0);
1416 return NID_undef;
1417}
1418
David Benjaminb1b76ae2017-09-21 17:03:34 -04001419int SSL_CIPHER_get_prf_nid(const SSL_CIPHER *cipher) {
1420 switch (cipher->algorithm_prf) {
1421 case SSL_HANDSHAKE_MAC_DEFAULT:
1422 return NID_md5_sha1;
1423 case SSL_HANDSHAKE_MAC_SHA256:
1424 return NID_sha256;
1425 case SSL_HANDSHAKE_MAC_SHA384:
1426 return NID_sha384;
1427 }
1428 assert(0);
1429 return NID_undef;
1430}
1431
Matt Braithwaiteaf096752015-09-02 19:48:16 -07001432int SSL_CIPHER_is_block_cipher(const SSL_CIPHER *cipher) {
Matthew Braithwaite8aaa9e12016-09-07 15:09:58 -07001433 return (cipher->algorithm_enc & SSL_eNULL) == 0 &&
Matt Braithwaiteaf096752015-09-02 19:48:16 -07001434 cipher->algorithm_mac != SSL_AEAD;
1435}
1436
David Benjaminef793f42015-11-05 18:16:27 -05001437uint16_t SSL_CIPHER_get_min_version(const SSL_CIPHER *cipher) {
Steven Valdez803c77a2016-09-06 14:13:43 -04001438 if (cipher->algorithm_mkey == SSL_kGENERIC ||
1439 cipher->algorithm_auth == SSL_aGENERIC) {
1440 return TLS1_3_VERSION;
1441 }
1442
David Benjamindcb6ef02015-11-06 15:35:54 -05001443 if (cipher->algorithm_prf != SSL_HANDSHAKE_MAC_DEFAULT) {
David Benjaminc11ea9422017-08-29 16:33:21 -04001444 // Cipher suites before TLS 1.2 use the default PRF, while all those added
1445 // afterwards specify a particular hash.
David Benjaminef793f42015-11-05 18:16:27 -05001446 return TLS1_2_VERSION;
1447 }
1448 return SSL3_VERSION;
1449}
1450
Nick Harper1fd39d82016-06-14 18:14:35 -07001451uint16_t SSL_CIPHER_get_max_version(const SSL_CIPHER *cipher) {
Steven Valdez803c77a2016-09-06 14:13:43 -04001452 if (cipher->algorithm_mkey == SSL_kGENERIC ||
1453 cipher->algorithm_auth == SSL_aGENERIC) {
Nick Harper1fd39d82016-06-14 18:14:35 -07001454 return TLS1_3_VERSION;
1455 }
1456 return TLS1_2_VERSION;
1457}
1458
David Benjaminc11ea9422017-08-29 16:33:21 -04001459// return the actual cipher being used
David Benjamin71f07942015-04-08 02:36:59 -04001460const char *SSL_CIPHER_get_name(const SSL_CIPHER *cipher) {
1461 if (cipher != NULL) {
1462 return cipher->name;
1463 }
1464
1465 return "(NONE)";
1466}
1467
David Benjamin6fff3862017-06-21 21:07:04 -04001468const char *SSL_CIPHER_standard_name(const SSL_CIPHER *cipher) {
1469 return cipher->standard_name;
1470}
1471
David Benjamin71f07942015-04-08 02:36:59 -04001472const char *SSL_CIPHER_get_kx_name(const SSL_CIPHER *cipher) {
1473 if (cipher == NULL) {
1474 return "";
1475 }
1476
1477 switch (cipher->algorithm_mkey) {
1478 case SSL_kRSA:
1479 return "RSA";
1480
David Benjamin71f07942015-04-08 02:36:59 -04001481 case SSL_kECDHE:
1482 switch (cipher->algorithm_auth) {
1483 case SSL_aECDSA:
1484 return "ECDHE_ECDSA";
1485 case SSL_aRSA:
1486 return "ECDHE_RSA";
1487 case SSL_aPSK:
1488 return "ECDHE_PSK";
1489 default:
1490 assert(0);
1491 return "UNKNOWN";
1492 }
1493
1494 case SSL_kPSK:
1495 assert(cipher->algorithm_auth == SSL_aPSK);
1496 return "PSK";
1497
Steven Valdez803c77a2016-09-06 14:13:43 -04001498 case SSL_kGENERIC:
1499 assert(cipher->algorithm_auth == SSL_aGENERIC);
1500 return "GENERIC";
1501
David Benjamin71f07942015-04-08 02:36:59 -04001502 default:
1503 assert(0);
1504 return "UNKNOWN";
1505 }
1506}
1507
David Benjamin71f07942015-04-08 02:36:59 -04001508char *SSL_CIPHER_get_rfc_name(const SSL_CIPHER *cipher) {
1509 if (cipher == NULL) {
1510 return NULL;
1511 }
1512
David Benjamin6fff3862017-06-21 21:07:04 -04001513 return OPENSSL_strdup(SSL_CIPHER_standard_name(cipher));
David Benjamin71f07942015-04-08 02:36:59 -04001514}
1515
1516int SSL_CIPHER_get_bits(const SSL_CIPHER *cipher, int *out_alg_bits) {
1517 if (cipher == NULL) {
1518 return 0;
1519 }
1520
David Benjamin9f2e2772015-11-18 09:59:43 -05001521 int alg_bits, strength_bits;
1522 switch (cipher->algorithm_enc) {
1523 case SSL_AES128:
1524 case SSL_AES128GCM:
David Benjamin9f2e2772015-11-18 09:59:43 -05001525 alg_bits = 128;
1526 strength_bits = 128;
1527 break;
1528
1529 case SSL_AES256:
1530 case SSL_AES256GCM:
David Benjamin13414b32015-12-09 23:02:39 -05001531 case SSL_CHACHA20POLY1305:
David Benjamin9f2e2772015-11-18 09:59:43 -05001532 alg_bits = 256;
1533 strength_bits = 256;
1534 break;
1535
1536 case SSL_3DES:
1537 alg_bits = 168;
1538 strength_bits = 112;
1539 break;
1540
1541 case SSL_eNULL:
1542 alg_bits = 0;
1543 strength_bits = 0;
1544 break;
1545
1546 default:
1547 assert(0);
1548 alg_bits = 0;
1549 strength_bits = 0;
David Benjamin71f07942015-04-08 02:36:59 -04001550 }
David Benjamin9f2e2772015-11-18 09:59:43 -05001551
1552 if (out_alg_bits != NULL) {
1553 *out_alg_bits = alg_bits;
1554 }
1555 return strength_bits;
David Benjamin71f07942015-04-08 02:36:59 -04001556}
1557
Adam Langleyfcf25832014-12-18 17:42:32 -08001558const char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf,
1559 int len) {
Adam Langleyfcf25832014-12-18 17:42:32 -08001560 const char *kx, *au, *enc, *mac;
David Benjamindcb6ef02015-11-06 15:35:54 -05001561 uint32_t alg_mkey, alg_auth, alg_enc, alg_mac;
Adam Langley95c29f32014-06-20 12:00:00 -07001562
Adam Langleyfcf25832014-12-18 17:42:32 -08001563 alg_mkey = cipher->algorithm_mkey;
1564 alg_auth = cipher->algorithm_auth;
1565 alg_enc = cipher->algorithm_enc;
1566 alg_mac = cipher->algorithm_mac;
Adam Langley95c29f32014-06-20 12:00:00 -07001567
Adam Langleyfcf25832014-12-18 17:42:32 -08001568 switch (alg_mkey) {
1569 case SSL_kRSA:
1570 kx = "RSA";
1571 break;
Adam Langley95c29f32014-06-20 12:00:00 -07001572
David Benjamin7061e282015-03-19 11:10:48 -04001573 case SSL_kECDHE:
Adam Langleyfcf25832014-12-18 17:42:32 -08001574 kx = "ECDH";
1575 break;
Adam Langley95c29f32014-06-20 12:00:00 -07001576
Adam Langleyfcf25832014-12-18 17:42:32 -08001577 case SSL_kPSK:
1578 kx = "PSK";
1579 break;
Adam Langley95c29f32014-06-20 12:00:00 -07001580
Steven Valdez803c77a2016-09-06 14:13:43 -04001581 case SSL_kGENERIC:
1582 kx = "GENERIC";
1583 break;
1584
Adam Langleyfcf25832014-12-18 17:42:32 -08001585 default:
1586 kx = "unknown";
1587 }
Adam Langley95c29f32014-06-20 12:00:00 -07001588
Adam Langleyfcf25832014-12-18 17:42:32 -08001589 switch (alg_auth) {
1590 case SSL_aRSA:
1591 au = "RSA";
1592 break;
Adam Langley95c29f32014-06-20 12:00:00 -07001593
Adam Langleyfcf25832014-12-18 17:42:32 -08001594 case SSL_aECDSA:
1595 au = "ECDSA";
1596 break;
Adam Langley4d4bff82014-06-20 12:00:00 -07001597
Adam Langleyfcf25832014-12-18 17:42:32 -08001598 case SSL_aPSK:
1599 au = "PSK";
1600 break;
Adam Langley4d4bff82014-06-20 12:00:00 -07001601
Steven Valdez803c77a2016-09-06 14:13:43 -04001602 case SSL_aGENERIC:
1603 au = "GENERIC";
1604 break;
1605
Adam Langleyfcf25832014-12-18 17:42:32 -08001606 default:
1607 au = "unknown";
1608 break;
1609 }
Adam Langleyde0b2022014-06-20 12:00:00 -07001610
Adam Langleyfcf25832014-12-18 17:42:32 -08001611 switch (alg_enc) {
1612 case SSL_3DES:
1613 enc = "3DES(168)";
1614 break;
Adam Langley95c29f32014-06-20 12:00:00 -07001615
Adam Langleyfcf25832014-12-18 17:42:32 -08001616 case SSL_AES128:
1617 enc = "AES(128)";
1618 break;
1619
1620 case SSL_AES256:
1621 enc = "AES(256)";
1622 break;
1623
1624 case SSL_AES128GCM:
1625 enc = "AESGCM(128)";
1626 break;
1627
1628 case SSL_AES256GCM:
1629 enc = "AESGCM(256)";
1630 break;
1631
David Benjamin13414b32015-12-09 23:02:39 -05001632 case SSL_CHACHA20POLY1305:
Adam Langleyfcf25832014-12-18 17:42:32 -08001633 enc = "ChaCha20-Poly1305";
1634 break;
1635
Matt Braithwaiteaf096752015-09-02 19:48:16 -07001636 case SSL_eNULL:
1637 enc="None";
1638 break;
1639
Adam Langleyfcf25832014-12-18 17:42:32 -08001640 default:
1641 enc = "unknown";
1642 break;
1643 }
1644
1645 switch (alg_mac) {
Adam Langleyfcf25832014-12-18 17:42:32 -08001646 case SSL_SHA1:
1647 mac = "SHA1";
1648 break;
1649
Adam Langleyfcf25832014-12-18 17:42:32 -08001650 case SSL_AEAD:
1651 mac = "AEAD";
1652 break;
1653
1654 default:
1655 mac = "unknown";
1656 break;
1657 }
1658
1659 if (buf == NULL) {
1660 len = 128;
David Benjamine64d2c72017-07-12 16:31:08 -04001661 buf = (char *)OPENSSL_malloc(len);
David Benjamin1eed2c02015-02-08 23:20:06 -05001662 if (buf == NULL) {
1663 return NULL;
1664 }
Adam Langleyfcf25832014-12-18 17:42:32 -08001665 } else if (len < 128) {
1666 return "Buffer too small";
1667 }
1668
Brian Smith0687bdf2016-01-17 09:18:26 -10001669 BIO_snprintf(buf, len, "%-23s Kx=%-8s Au=%-4s Enc=%-9s Mac=%-4s\n",
1670 cipher->name, kx, au, enc, mac);
Adam Langleyfcf25832014-12-18 17:42:32 -08001671 return buf;
1672}
1673
David Benjamin71f07942015-04-08 02:36:59 -04001674const char *SSL_CIPHER_get_version(const SSL_CIPHER *cipher) {
1675 return "TLSv1/SSLv3";
Adam Langleyfcf25832014-12-18 17:42:32 -08001676}
1677
David Benjamind55bd792017-05-18 11:33:08 -04001678STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void) { return NULL; }
Adam Langleyfcf25832014-12-18 17:42:32 -08001679
Matt Braithwaite6a1275b2015-06-26 12:09:10 -07001680int SSL_COMP_add_compression_method(int id, COMP_METHOD *cm) { return 1; }
Adam Langleyfcf25832014-12-18 17:42:32 -08001681
Matt Braithwaite6a1275b2015-06-26 12:09:10 -07001682const char *SSL_COMP_get_name(const COMP_METHOD *comp) { return NULL; }
Adam Langley95c29f32014-06-20 12:00:00 -07001683
Adam Langleyfa3e9c32018-03-14 17:32:04 -07001684const char *SSL_COMP_get0_name(const SSL_COMP *comp) { return comp->name; }
1685
1686int SSL_COMP_get_id(const SSL_COMP *comp) { return comp->id; }
1687
Adam Langley3e9e0432016-10-03 15:58:07 -07001688void SSL_COMP_free_compression_methods(void) {}