25개 이상의 토픽을 선택하실 수 없습니다. Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

468 lines
13 KiB

  1. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  2. * All rights reserved.
  3. *
  4. * This package is an SSL implementation written
  5. * by Eric Young (eay@cryptsoft.com).
  6. * The implementation was written so as to conform with Netscapes SSL.
  7. *
  8. * This library is free for commercial and non-commercial use as long as
  9. * the following conditions are aheared to. The following conditions
  10. * apply to all code found in this distribution, be it the RC4, RSA,
  11. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  12. * included with this distribution is covered by the same copyright terms
  13. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  14. *
  15. * Copyright remains Eric Young's, and as such any Copyright notices in
  16. * the code are not to be removed.
  17. * If this package is used in a product, Eric Young should be given attribution
  18. * as the author of the parts of the library used.
  19. * This can be in the form of a textual message at program startup or
  20. * in documentation (online or textual) provided with the package.
  21. *
  22. * Redistribution and use in source and binary forms, with or without
  23. * modification, are permitted provided that the following conditions
  24. * are met:
  25. * 1. Redistributions of source code must retain the copyright
  26. * notice, this list of conditions and the following disclaimer.
  27. * 2. Redistributions in binary form must reproduce the above copyright
  28. * notice, this list of conditions and the following disclaimer in the
  29. * documentation and/or other materials provided with the distribution.
  30. * 3. All advertising materials mentioning features or use of this software
  31. * must display the following acknowledgement:
  32. * "This product includes cryptographic software written by
  33. * Eric Young (eay@cryptsoft.com)"
  34. * The word 'cryptographic' can be left out if the rouines from the library
  35. * being used are not cryptographic related :-).
  36. * 4. If you include any Windows specific code (or a derivative thereof) from
  37. * the apps directory (application code) you must include an acknowledgement:
  38. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  39. *
  40. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  41. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  42. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  43. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  44. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  45. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  46. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  48. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  49. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  50. * SUCH DAMAGE.
  51. *
  52. * The licence and distribution terms for any publically available version or
  53. * derivative of this code cannot be changed. i.e. this code cannot simply be
  54. * copied and put under another distribution licence
  55. * [including the GNU Public Licence.]
  56. */
  57. /* ====================================================================
  58. * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
  59. *
  60. * Redistribution and use in source and binary forms, with or without
  61. * modification, are permitted provided that the following conditions
  62. * are met:
  63. *
  64. * 1. Redistributions of source code must retain the above copyright
  65. * notice, this list of conditions and the following disclaimer.
  66. *
  67. * 2. Redistributions in binary form must reproduce the above copyright
  68. * notice, this list of conditions and the following disclaimer in
  69. * the documentation and/or other materials provided with the
  70. * distribution.
  71. *
  72. * 3. All advertising materials mentioning features or use of this
  73. * software must display the following acknowledgment:
  74. * "This product includes software developed by the OpenSSL Project
  75. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  76. *
  77. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  78. * endorse or promote products derived from this software without
  79. * prior written permission. For written permission, please contact
  80. * openssl-core@openssl.org.
  81. *
  82. * 5. Products derived from this software may not be called "OpenSSL"
  83. * nor may "OpenSSL" appear in their names without prior written
  84. * permission of the OpenSSL Project.
  85. *
  86. * 6. Redistributions of any form whatsoever must retain the following
  87. * acknowledgment:
  88. * "This product includes software developed by the OpenSSL Project
  89. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  90. *
  91. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  92. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  93. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  94. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  95. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  96. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  97. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  98. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  99. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  100. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  101. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  102. * OF THE POSSIBILITY OF SUCH DAMAGE.
  103. * ====================================================================
  104. *
  105. * This product includes cryptographic software written by Eric Young
  106. * (eay@cryptsoft.com). This product includes software written by Tim
  107. * Hudson (tjh@cryptsoft.com).
  108. *
  109. */
  110. /*
  111. DTLS code by Eric Rescorla <ekr@rtfm.com>
  112. Copyright (C) 2006, Network Resonance, Inc.
  113. Copyright (C) 2011, RTFM, Inc.
  114. */
  115. #ifndef OPENSSL_NO_SRTP
  116. #include <stdio.h>
  117. #include <openssl/bytestring.h>
  118. #include <openssl/obj.h>
  119. #include <openssl/err.h>
  120. #include "ssl_locl.h"
  121. #include <openssl/srtp.h>
  122. static SRTP_PROTECTION_PROFILE srtp_known_profiles[]=
  123. {
  124. {
  125. "SRTP_AES128_CM_SHA1_80",
  126. SRTP_AES128_CM_SHA1_80,
  127. },
  128. {
  129. "SRTP_AES128_CM_SHA1_32",
  130. SRTP_AES128_CM_SHA1_32,
  131. },
  132. #if 0
  133. {
  134. "SRTP_NULL_SHA1_80",
  135. SRTP_NULL_SHA1_80,
  136. },
  137. {
  138. "SRTP_NULL_SHA1_32",
  139. SRTP_NULL_SHA1_32,
  140. },
  141. #endif
  142. {0}
  143. };
  144. static int find_profile_by_name(char *profile_name,
  145. SRTP_PROTECTION_PROFILE **pptr,unsigned len)
  146. {
  147. SRTP_PROTECTION_PROFILE *p;
  148. p=srtp_known_profiles;
  149. while(p->name)
  150. {
  151. if((len == strlen(p->name)) && !strncmp(p->name,profile_name,
  152. len))
  153. {
  154. *pptr=p;
  155. return 0;
  156. }
  157. p++;
  158. }
  159. return 1;
  160. }
  161. static int find_profile_by_num(unsigned profile_num,
  162. SRTP_PROTECTION_PROFILE **pptr)
  163. {
  164. SRTP_PROTECTION_PROFILE *p;
  165. p=srtp_known_profiles;
  166. while(p->name)
  167. {
  168. if(p->id == profile_num)
  169. {
  170. *pptr=p;
  171. return 0;
  172. }
  173. p++;
  174. }
  175. return 1;
  176. }
  177. static int ssl_ctx_make_profiles(const char *profiles_string,STACK_OF(SRTP_PROTECTION_PROFILE) **out)
  178. {
  179. STACK_OF(SRTP_PROTECTION_PROFILE) *profiles;
  180. char *col;
  181. char *ptr=(char *)profiles_string;
  182. SRTP_PROTECTION_PROFILE *p;
  183. if(!(profiles=sk_SRTP_PROTECTION_PROFILE_new_null()))
  184. {
  185. OPENSSL_PUT_ERROR(SSL, ssl_ctx_make_profiles, SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES);
  186. return 1;
  187. }
  188. do
  189. {
  190. col=strchr(ptr,':');
  191. if(!find_profile_by_name(ptr,&p,
  192. col ? col-ptr : (int)strlen(ptr)))
  193. {
  194. sk_SRTP_PROTECTION_PROFILE_push(profiles,p);
  195. }
  196. else
  197. {
  198. OPENSSL_PUT_ERROR(SSL, ssl_ctx_make_profiles, SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE);
  199. return 1;
  200. }
  201. if(col) ptr=col+1;
  202. } while (col);
  203. *out=profiles;
  204. return 0;
  205. }
  206. int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx,const char *profiles)
  207. {
  208. return ssl_ctx_make_profiles(profiles,&ctx->srtp_profiles);
  209. }
  210. int SSL_set_tlsext_use_srtp(SSL *s,const char *profiles)
  211. {
  212. return ssl_ctx_make_profiles(profiles,&s->srtp_profiles);
  213. }
  214. STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *s)
  215. {
  216. if(s != NULL)
  217. {
  218. if(s->srtp_profiles != NULL)
  219. {
  220. return s->srtp_profiles;
  221. }
  222. else if((s->ctx != NULL) &&
  223. (s->ctx->srtp_profiles != NULL))
  224. {
  225. return s->ctx->srtp_profiles;
  226. }
  227. }
  228. return NULL;
  229. }
  230. SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s)
  231. {
  232. return s->srtp_profile;
  233. }
  234. /* Note: this function returns 0 length if there are no
  235. profiles specified */
  236. int ssl_add_clienthello_use_srtp_ext(SSL *s, unsigned char *p, int *len, int maxlen)
  237. {
  238. int ct=0;
  239. int i;
  240. STACK_OF(SRTP_PROTECTION_PROFILE) *clnt=0;
  241. SRTP_PROTECTION_PROFILE *prof;
  242. clnt=SSL_get_srtp_profiles(s);
  243. ct=sk_SRTP_PROTECTION_PROFILE_num(clnt); /* -1 if clnt == 0 */
  244. if(p)
  245. {
  246. if(ct==0)
  247. {
  248. OPENSSL_PUT_ERROR(SSL, ssl_add_clienthello_use_srtp_ext, SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST);
  249. return 1;
  250. }
  251. if((2 + ct*2 + 1) > maxlen)
  252. {
  253. OPENSSL_PUT_ERROR(SSL, ssl_add_clienthello_use_srtp_ext, SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG);
  254. return 1;
  255. }
  256. /* Add the length */
  257. s2n(ct * 2, p);
  258. for(i=0;i<ct;i++)
  259. {
  260. prof=sk_SRTP_PROTECTION_PROFILE_value(clnt,i);
  261. s2n(prof->id,p);
  262. }
  263. /* Add an empty use_mki value */
  264. *p++ = 0;
  265. }
  266. *len=2 + ct*2 + 1;
  267. return 0;
  268. }
  269. int ssl_parse_clienthello_use_srtp_ext(SSL *s, CBS *cbs, int *out_alert)
  270. {
  271. CBS profile_ids, srtp_mki;
  272. SRTP_PROTECTION_PROFILE *cprof, *sprof;
  273. STACK_OF(SRTP_PROTECTION_PROFILE) *clnt = 0,*srvr;
  274. int i,j;
  275. int ret = 0;
  276. if (!CBS_get_u16_length_prefixed(cbs, &profile_ids) ||
  277. CBS_len(&profile_ids) < 2 ||
  278. !CBS_get_u8_length_prefixed(cbs, &srtp_mki) ||
  279. CBS_len(cbs) != 0)
  280. {
  281. OPENSSL_PUT_ERROR(SSL, ssl_parse_clienthello_use_srtp_ext, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
  282. *out_alert = SSL_AD_DECODE_ERROR;
  283. goto done;
  284. }
  285. clnt = sk_SRTP_PROTECTION_PROFILE_new_null();
  286. while (CBS_len(&profile_ids) > 0)
  287. {
  288. uint16_t profile_id;
  289. if (!CBS_get_u16(&profile_ids, &profile_id))
  290. {
  291. *out_alert = SSL_AD_DECODE_ERROR;
  292. goto done;
  293. }
  294. if (!find_profile_by_num(profile_id, &cprof))
  295. {
  296. sk_SRTP_PROTECTION_PROFILE_push(clnt, cprof);
  297. }
  298. }
  299. /* Discard the MKI value for now. */
  300. srvr = SSL_get_srtp_profiles(s);
  301. /* Pick our most preferred profile. If no profiles have been
  302. configured then the outer loop doesn't run
  303. (sk_SRTP_PROTECTION_PROFILE_num() = -1)
  304. and so we just return without doing anything */
  305. for(i=0;i<sk_SRTP_PROTECTION_PROFILE_num(srvr);i++)
  306. {
  307. sprof=sk_SRTP_PROTECTION_PROFILE_value(srvr,i);
  308. for(j=0;j<sk_SRTP_PROTECTION_PROFILE_num(clnt);j++)
  309. {
  310. cprof=sk_SRTP_PROTECTION_PROFILE_value(clnt,j);
  311. if(cprof->id==sprof->id)
  312. {
  313. s->srtp_profile = sprof;
  314. ret = 1;
  315. goto done;
  316. }
  317. }
  318. }
  319. ret = 1;
  320. done:
  321. if(clnt) sk_SRTP_PROTECTION_PROFILE_free(clnt);
  322. return ret;
  323. }
  324. int ssl_add_serverhello_use_srtp_ext(SSL *s, unsigned char *p, int *len, int maxlen)
  325. {
  326. if(p)
  327. {
  328. if(maxlen < 5)
  329. {
  330. OPENSSL_PUT_ERROR(SSL, ssl_add_serverhello_use_srtp_ext, SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG);
  331. return 1;
  332. }
  333. if(s->srtp_profile==0)
  334. {
  335. OPENSSL_PUT_ERROR(SSL, ssl_add_serverhello_use_srtp_ext, SSL_R_USE_SRTP_NOT_NEGOTIATED);
  336. return 1;
  337. }
  338. s2n(2, p);
  339. s2n(s->srtp_profile->id,p);
  340. *p++ = 0;
  341. }
  342. *len=5;
  343. return 0;
  344. }
  345. int ssl_parse_serverhello_use_srtp_ext(SSL *s, CBS *cbs, int *out_alert)
  346. {
  347. CBS profile_ids, srtp_mki;
  348. uint16_t profile_id;
  349. int i;
  350. STACK_OF(SRTP_PROTECTION_PROFILE) *clnt;
  351. SRTP_PROTECTION_PROFILE *prof;
  352. /* The extension consists of a u16-prefixed profile ID list containing a
  353. * single uint16_t profile ID, then followed by a u8-prefixed srtp_mki
  354. * field.
  355. *
  356. * See https://tools.ietf.org/html/rfc5764#section-4.1.1
  357. */
  358. if (!CBS_get_u16_length_prefixed(cbs, &profile_ids) ||
  359. !CBS_get_u16(&profile_ids, &profile_id) ||
  360. CBS_len(&profile_ids) != 0 ||
  361. !CBS_get_u8_length_prefixed(cbs, &srtp_mki) ||
  362. CBS_len(cbs) != 0)
  363. {
  364. OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
  365. *out_alert = SSL_AD_DECODE_ERROR;
  366. return 0;
  367. }
  368. if (CBS_len(&srtp_mki) != 0)
  369. {
  370. /* Must be no MKI, since we never offer one. */
  371. OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_MKI_VALUE);
  372. *out_alert = SSL_AD_ILLEGAL_PARAMETER;
  373. return 0;
  374. }
  375. clnt=SSL_get_srtp_profiles(s);
  376. /* Throw an error if the server gave us an unsolicited extension */
  377. if (clnt == NULL)
  378. {
  379. OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_NO_SRTP_PROFILES);
  380. *out_alert = SSL_AD_DECODE_ERROR;
  381. return 0;
  382. }
  383. /* Check to see if the server gave us something we support
  384. (and presumably offered)
  385. */
  386. for(i=0;i<sk_SRTP_PROTECTION_PROFILE_num(clnt);i++)
  387. {
  388. prof=sk_SRTP_PROTECTION_PROFILE_value(clnt,i);
  389. if(prof->id == profile_id)
  390. {
  391. s->srtp_profile=prof;
  392. *out_alert = 0;
  393. return 1;
  394. }
  395. }
  396. OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
  397. *out_alert = SSL_AD_ILLEGAL_PARAMETER;
  398. return 0;
  399. }
  400. #endif