2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include <openssl/objects.h>
15 * Parse the client's renegotiation binding and abort if it's not right
17 int ssl_parse_clienthello_renegotiate_ext(SSL *s, PACKET *pkt, int *al)
20 const unsigned char *d;
22 /* Parse the length byte */
23 if (!PACKET_get_1(pkt, &ilen)
24 || !PACKET_get_bytes(pkt, &d, ilen)) {
25 SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,
26 SSL_R_RENEGOTIATION_ENCODING_ERR);
27 *al = SSL_AD_ILLEGAL_PARAMETER;
31 /* Check that the extension matches */
32 if (ilen != s->s3->previous_client_finished_len) {
33 SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,
34 SSL_R_RENEGOTIATION_MISMATCH);
35 *al = SSL_AD_HANDSHAKE_FAILURE;
39 if (memcmp(d, s->s3->previous_client_finished,
40 s->s3->previous_client_finished_len)) {
41 SSLerr(SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT,
42 SSL_R_RENEGOTIATION_MISMATCH);
43 *al = SSL_AD_HANDSHAKE_FAILURE;
47 s->s3->send_connection_binding = 1;
52 /* Add the server's renegotiation binding */
53 int ssl_add_serverhello_renegotiate_ext(SSL *s, unsigned char *p, int *len,
57 if ((s->s3->previous_client_finished_len +
58 s->s3->previous_server_finished_len + 1) > maxlen) {
59 SSLerr(SSL_F_SSL_ADD_SERVERHELLO_RENEGOTIATE_EXT,
60 SSL_R_RENEGOTIATE_EXT_TOO_LONG);
65 *p = s->s3->previous_client_finished_len +
66 s->s3->previous_server_finished_len;
69 memcpy(p, s->s3->previous_client_finished,
70 s->s3->previous_client_finished_len);
71 p += s->s3->previous_client_finished_len;
73 memcpy(p, s->s3->previous_server_finished,
74 s->s3->previous_server_finished_len);
77 *len = s->s3->previous_client_finished_len
78 + s->s3->previous_server_finished_len + 1;
84 * Parse the server's renegotiation binding and abort if it's not right
86 int ssl_parse_serverhello_renegotiate_ext(SSL *s, PACKET *pkt, int *al)
88 unsigned int expected_len = s->s3->previous_client_finished_len
89 + s->s3->previous_server_finished_len;
91 const unsigned char *data;
93 /* Check for logic errors */
94 OPENSSL_assert(!expected_len || s->s3->previous_client_finished_len);
95 OPENSSL_assert(!expected_len || s->s3->previous_server_finished_len);
97 /* Parse the length byte */
98 if (!PACKET_get_1(pkt, &ilen)) {
99 SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
100 SSL_R_RENEGOTIATION_ENCODING_ERR);
101 *al = SSL_AD_ILLEGAL_PARAMETER;
105 /* Consistency check */
106 if (PACKET_remaining(pkt) != ilen) {
107 SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
108 SSL_R_RENEGOTIATION_ENCODING_ERR);
109 *al = SSL_AD_ILLEGAL_PARAMETER;
113 /* Check that the extension matches */
114 if (ilen != expected_len) {
115 SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
116 SSL_R_RENEGOTIATION_MISMATCH);
117 *al = SSL_AD_HANDSHAKE_FAILURE;
121 if (!PACKET_get_bytes(pkt, &data, s->s3->previous_client_finished_len)
122 || memcmp(data, s->s3->previous_client_finished,
123 s->s3->previous_client_finished_len) != 0) {
124 SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
125 SSL_R_RENEGOTIATION_MISMATCH);
126 *al = SSL_AD_HANDSHAKE_FAILURE;
130 if (!PACKET_get_bytes(pkt, &data, s->s3->previous_server_finished_len)
131 || memcmp(data, s->s3->previous_server_finished,
132 s->s3->previous_server_finished_len) != 0) {
133 SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT,
134 SSL_R_RENEGOTIATION_MISMATCH);
135 *al = SSL_AD_ILLEGAL_PARAMETER;
138 s->s3->send_connection_binding = 1;