1*b077aed3SPierre Pronchery /*
2*b077aed3SPierre Pronchery * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
3*b077aed3SPierre Pronchery *
4*b077aed3SPierre Pronchery * Licensed under the Apache License 2.0 (the "License"). You may not use
5*b077aed3SPierre Pronchery * this file except in compliance with the License. You can obtain a copy
6*b077aed3SPierre Pronchery * in the file LICENSE in the source distribution or at
7*b077aed3SPierre Pronchery * https://www.openssl.org/source/license.html
8*b077aed3SPierre Pronchery */
9*b077aed3SPierre Pronchery
10*b077aed3SPierre Pronchery /* We need to use some engine and HMAC deprecated APIs */
11*b077aed3SPierre Pronchery #define OPENSSL_SUPPRESS_DEPRECATED
12*b077aed3SPierre Pronchery
13*b077aed3SPierre Pronchery #include <openssl/engine.h>
14*b077aed3SPierre Pronchery #include "ssl_local.h"
15*b077aed3SPierre Pronchery
16*b077aed3SPierre Pronchery /*
17*b077aed3SPierre Pronchery * Engine APIs are only used to support applications that still use ENGINEs.
18*b077aed3SPierre Pronchery * Once ENGINE is removed completely, all of this code can also be removed.
19*b077aed3SPierre Pronchery */
20*b077aed3SPierre Pronchery
21*b077aed3SPierre Pronchery #ifndef OPENSSL_NO_ENGINE
tls_engine_finish(ENGINE * e)22*b077aed3SPierre Pronchery void tls_engine_finish(ENGINE *e)
23*b077aed3SPierre Pronchery {
24*b077aed3SPierre Pronchery ENGINE_finish(e);
25*b077aed3SPierre Pronchery }
26*b077aed3SPierre Pronchery #endif
27*b077aed3SPierre Pronchery
tls_get_cipher_from_engine(int nid)28*b077aed3SPierre Pronchery const EVP_CIPHER *tls_get_cipher_from_engine(int nid)
29*b077aed3SPierre Pronchery {
30*b077aed3SPierre Pronchery const EVP_CIPHER *ret = NULL;
31*b077aed3SPierre Pronchery #ifndef OPENSSL_NO_ENGINE
32*b077aed3SPierre Pronchery ENGINE *eng;
33*b077aed3SPierre Pronchery
34*b077aed3SPierre Pronchery /*
35*b077aed3SPierre Pronchery * If there is an Engine available for this cipher we use the "implicit"
36*b077aed3SPierre Pronchery * form to ensure we use that engine later.
37*b077aed3SPierre Pronchery */
38*b077aed3SPierre Pronchery eng = ENGINE_get_cipher_engine(nid);
39*b077aed3SPierre Pronchery if (eng != NULL) {
40*b077aed3SPierre Pronchery ret = ENGINE_get_cipher(eng, nid);
41*b077aed3SPierre Pronchery ENGINE_finish(eng);
42*b077aed3SPierre Pronchery }
43*b077aed3SPierre Pronchery #endif
44*b077aed3SPierre Pronchery return ret;
45*b077aed3SPierre Pronchery }
46*b077aed3SPierre Pronchery
tls_get_digest_from_engine(int nid)47*b077aed3SPierre Pronchery const EVP_MD *tls_get_digest_from_engine(int nid)
48*b077aed3SPierre Pronchery {
49*b077aed3SPierre Pronchery const EVP_MD *ret = NULL;
50*b077aed3SPierre Pronchery #ifndef OPENSSL_NO_ENGINE
51*b077aed3SPierre Pronchery ENGINE *eng;
52*b077aed3SPierre Pronchery
53*b077aed3SPierre Pronchery /*
54*b077aed3SPierre Pronchery * If there is an Engine available for this digest we use the "implicit"
55*b077aed3SPierre Pronchery * form to ensure we use that engine later.
56*b077aed3SPierre Pronchery */
57*b077aed3SPierre Pronchery eng = ENGINE_get_digest_engine(nid);
58*b077aed3SPierre Pronchery if (eng != NULL) {
59*b077aed3SPierre Pronchery ret = ENGINE_get_digest(eng, nid);
60*b077aed3SPierre Pronchery ENGINE_finish(eng);
61*b077aed3SPierre Pronchery }
62*b077aed3SPierre Pronchery #endif
63*b077aed3SPierre Pronchery return ret;
64*b077aed3SPierre Pronchery }
65*b077aed3SPierre Pronchery
66*b077aed3SPierre Pronchery #ifndef OPENSSL_NO_ENGINE
tls_engine_load_ssl_client_cert(SSL * s,X509 ** px509,EVP_PKEY ** ppkey)67*b077aed3SPierre Pronchery int tls_engine_load_ssl_client_cert(SSL *s, X509 **px509, EVP_PKEY **ppkey)
68*b077aed3SPierre Pronchery {
69*b077aed3SPierre Pronchery return ENGINE_load_ssl_client_cert(s->ctx->client_cert_engine, s,
70*b077aed3SPierre Pronchery SSL_get_client_CA_list(s),
71*b077aed3SPierre Pronchery px509, ppkey, NULL, NULL, NULL);
72*b077aed3SPierre Pronchery }
73*b077aed3SPierre Pronchery #endif
74*b077aed3SPierre Pronchery
75*b077aed3SPierre Pronchery #ifndef OPENSSL_NO_ENGINE
SSL_CTX_set_client_cert_engine(SSL_CTX * ctx,ENGINE * e)76*b077aed3SPierre Pronchery int SSL_CTX_set_client_cert_engine(SSL_CTX *ctx, ENGINE *e)
77*b077aed3SPierre Pronchery {
78*b077aed3SPierre Pronchery if (!ENGINE_init(e)) {
79*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_SSL, ERR_R_ENGINE_LIB);
80*b077aed3SPierre Pronchery return 0;
81*b077aed3SPierre Pronchery }
82*b077aed3SPierre Pronchery if (!ENGINE_get_ssl_client_cert_function(e)) {
83*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_SSL, SSL_R_NO_CLIENT_CERT_METHOD);
84*b077aed3SPierre Pronchery ENGINE_finish(e);
85*b077aed3SPierre Pronchery return 0;
86*b077aed3SPierre Pronchery }
87*b077aed3SPierre Pronchery ctx->client_cert_engine = e;
88*b077aed3SPierre Pronchery return 1;
89*b077aed3SPierre Pronchery }
90*b077aed3SPierre Pronchery #endif
91*b077aed3SPierre Pronchery
92*b077aed3SPierre Pronchery /*
93*b077aed3SPierre Pronchery * The HMAC APIs below are only used to support the deprecated public API
94*b077aed3SPierre Pronchery * macro SSL_CTX_set_tlsext_ticket_key_cb(). The application supplied callback
95*b077aed3SPierre Pronchery * takes an HMAC_CTX in its argument list. The preferred alternative is
96*b077aed3SPierre Pronchery * SSL_CTX_set_tlsext_ticket_key_evp_cb(). Once
97*b077aed3SPierre Pronchery * SSL_CTX_set_tlsext_ticket_key_cb() is removed, then all of this code can also
98*b077aed3SPierre Pronchery * be removed.
99*b077aed3SPierre Pronchery */
100*b077aed3SPierre Pronchery #ifndef OPENSSL_NO_DEPRECATED_3_0
ssl_hmac_old_new(SSL_HMAC * ret)101*b077aed3SPierre Pronchery int ssl_hmac_old_new(SSL_HMAC *ret)
102*b077aed3SPierre Pronchery {
103*b077aed3SPierre Pronchery ret->old_ctx = HMAC_CTX_new();
104*b077aed3SPierre Pronchery if (ret->old_ctx == NULL)
105*b077aed3SPierre Pronchery return 0;
106*b077aed3SPierre Pronchery
107*b077aed3SPierre Pronchery return 1;
108*b077aed3SPierre Pronchery }
109*b077aed3SPierre Pronchery
ssl_hmac_old_free(SSL_HMAC * ctx)110*b077aed3SPierre Pronchery void ssl_hmac_old_free(SSL_HMAC *ctx)
111*b077aed3SPierre Pronchery {
112*b077aed3SPierre Pronchery HMAC_CTX_free(ctx->old_ctx);
113*b077aed3SPierre Pronchery }
114*b077aed3SPierre Pronchery
ssl_hmac_old_init(SSL_HMAC * ctx,void * key,size_t len,char * md)115*b077aed3SPierre Pronchery int ssl_hmac_old_init(SSL_HMAC *ctx, void *key, size_t len, char *md)
116*b077aed3SPierre Pronchery {
117*b077aed3SPierre Pronchery return HMAC_Init_ex(ctx->old_ctx, key, len, EVP_get_digestbyname(md), NULL);
118*b077aed3SPierre Pronchery }
119*b077aed3SPierre Pronchery
ssl_hmac_old_update(SSL_HMAC * ctx,const unsigned char * data,size_t len)120*b077aed3SPierre Pronchery int ssl_hmac_old_update(SSL_HMAC *ctx, const unsigned char *data, size_t len)
121*b077aed3SPierre Pronchery {
122*b077aed3SPierre Pronchery return HMAC_Update(ctx->old_ctx, data, len);
123*b077aed3SPierre Pronchery }
124*b077aed3SPierre Pronchery
ssl_hmac_old_final(SSL_HMAC * ctx,unsigned char * md,size_t * len)125*b077aed3SPierre Pronchery int ssl_hmac_old_final(SSL_HMAC *ctx, unsigned char *md, size_t *len)
126*b077aed3SPierre Pronchery {
127*b077aed3SPierre Pronchery unsigned int l;
128*b077aed3SPierre Pronchery
129*b077aed3SPierre Pronchery if (HMAC_Final(ctx->old_ctx, md, &l) > 0) {
130*b077aed3SPierre Pronchery if (len != NULL)
131*b077aed3SPierre Pronchery *len = l;
132*b077aed3SPierre Pronchery return 1;
133*b077aed3SPierre Pronchery }
134*b077aed3SPierre Pronchery
135*b077aed3SPierre Pronchery return 0;
136*b077aed3SPierre Pronchery }
137*b077aed3SPierre Pronchery
ssl_hmac_old_size(const SSL_HMAC * ctx)138*b077aed3SPierre Pronchery size_t ssl_hmac_old_size(const SSL_HMAC *ctx)
139*b077aed3SPierre Pronchery {
140*b077aed3SPierre Pronchery return HMAC_size(ctx->old_ctx);
141*b077aed3SPierre Pronchery }
142*b077aed3SPierre Pronchery
ssl_hmac_get0_HMAC_CTX(SSL_HMAC * ctx)143*b077aed3SPierre Pronchery HMAC_CTX *ssl_hmac_get0_HMAC_CTX(SSL_HMAC *ctx)
144*b077aed3SPierre Pronchery {
145*b077aed3SPierre Pronchery return ctx->old_ctx;
146*b077aed3SPierre Pronchery }
147*b077aed3SPierre Pronchery
148*b077aed3SPierre Pronchery /* Some deprecated public APIs pass DH objects */
ssl_dh_to_pkey(DH * dh)149*b077aed3SPierre Pronchery EVP_PKEY *ssl_dh_to_pkey(DH *dh)
150*b077aed3SPierre Pronchery {
151*b077aed3SPierre Pronchery # ifndef OPENSSL_NO_DH
152*b077aed3SPierre Pronchery EVP_PKEY *ret;
153*b077aed3SPierre Pronchery
154*b077aed3SPierre Pronchery if (dh == NULL)
155*b077aed3SPierre Pronchery return NULL;
156*b077aed3SPierre Pronchery ret = EVP_PKEY_new();
157*b077aed3SPierre Pronchery if (EVP_PKEY_set1_DH(ret, dh) <= 0) {
158*b077aed3SPierre Pronchery EVP_PKEY_free(ret);
159*b077aed3SPierre Pronchery return NULL;
160*b077aed3SPierre Pronchery }
161*b077aed3SPierre Pronchery return ret;
162*b077aed3SPierre Pronchery # else
163*b077aed3SPierre Pronchery return NULL;
164*b077aed3SPierre Pronchery # endif
165*b077aed3SPierre Pronchery }
166*b077aed3SPierre Pronchery
167*b077aed3SPierre Pronchery /* Some deprecated public APIs pass EC_KEY objects */
ssl_set_tmp_ecdh_groups(uint16_t ** pext,size_t * pextlen,void * key)168*b077aed3SPierre Pronchery int ssl_set_tmp_ecdh_groups(uint16_t **pext, size_t *pextlen,
169*b077aed3SPierre Pronchery void *key)
170*b077aed3SPierre Pronchery {
171*b077aed3SPierre Pronchery # ifndef OPENSSL_NO_EC
172*b077aed3SPierre Pronchery const EC_GROUP *group = EC_KEY_get0_group((const EC_KEY *)key);
173*b077aed3SPierre Pronchery int nid;
174*b077aed3SPierre Pronchery
175*b077aed3SPierre Pronchery if (group == NULL) {
176*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_SSL, SSL_R_MISSING_PARAMETERS);
177*b077aed3SPierre Pronchery return 0;
178*b077aed3SPierre Pronchery }
179*b077aed3SPierre Pronchery nid = EC_GROUP_get_curve_name(group);
180*b077aed3SPierre Pronchery if (nid == NID_undef)
181*b077aed3SPierre Pronchery return 0;
182*b077aed3SPierre Pronchery return tls1_set_groups(pext, pextlen, &nid, 1);
183*b077aed3SPierre Pronchery # else
184*b077aed3SPierre Pronchery return 0;
185*b077aed3SPierre Pronchery # endif
186*b077aed3SPierre Pronchery }
187*b077aed3SPierre Pronchery
188*b077aed3SPierre Pronchery /*
189*b077aed3SPierre Pronchery * Set the callback for generating temporary DH keys.
190*b077aed3SPierre Pronchery * ctx: the SSL context.
191*b077aed3SPierre Pronchery * dh: the callback
192*b077aed3SPierre Pronchery */
193*b077aed3SPierre Pronchery # if !defined(OPENSSL_NO_DH)
SSL_CTX_set_tmp_dh_callback(SSL_CTX * ctx,DH * (* dh)(SSL * ssl,int is_export,int keylength))194*b077aed3SPierre Pronchery void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,
195*b077aed3SPierre Pronchery DH *(*dh) (SSL *ssl, int is_export,
196*b077aed3SPierre Pronchery int keylength))
197*b077aed3SPierre Pronchery {
198*b077aed3SPierre Pronchery SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh);
199*b077aed3SPierre Pronchery }
200*b077aed3SPierre Pronchery
SSL_set_tmp_dh_callback(SSL * ssl,DH * (* dh)(SSL * ssl,int is_export,int keylength))201*b077aed3SPierre Pronchery void SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh) (SSL *ssl, int is_export,
202*b077aed3SPierre Pronchery int keylength))
203*b077aed3SPierre Pronchery {
204*b077aed3SPierre Pronchery SSL_callback_ctrl(ssl, SSL_CTRL_SET_TMP_DH_CB, (void (*)(void))dh);
205*b077aed3SPierre Pronchery }
206*b077aed3SPierre Pronchery # endif
207*b077aed3SPierre Pronchery #endif /* OPENSSL_NO_DEPRECATED */
208