| Index: openssl/ssl/ssl_asn1.c
|
| ===================================================================
|
| --- openssl/ssl/ssl_asn1.c (revision 105093)
|
| +++ openssl/ssl/ssl_asn1.c (working copy)
|
| @@ -55,6 +55,32 @@
|
| * copied and put under another distribution licence
|
| * [including the GNU Public Licence.]
|
| */
|
| +/* ====================================================================
|
| + * Copyright 2005 Nokia. All rights reserved.
|
| + *
|
| + * The portions of the attached software ("Contribution") is developed by
|
| + * Nokia Corporation and is licensed pursuant to the OpenSSL open source
|
| + * license.
|
| + *
|
| + * The Contribution, originally written by Mika Kousa and Pasi Eronen of
|
| + * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
|
| + * support (see RFC 4279) to OpenSSL.
|
| + *
|
| + * No patent licenses or other rights except those expressly stated in
|
| + * the OpenSSL open source license shall be deemed granted or received
|
| + * expressly, by implication, estoppel, or otherwise.
|
| + *
|
| + * No assurances are provided by Nokia that the Contribution does not
|
| + * infringe the patent or other intellectual property rights of any third
|
| + * party or that the license provides you with all the necessary rights
|
| + * to make use of the Contribution.
|
| + *
|
| + * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
|
| + * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
|
| + * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
|
| + * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
|
| + * OTHERWISE.
|
| + */
|
|
|
| #include <stdio.h>
|
| #include <stdlib.h>
|
| @@ -84,12 +110,16 @@
|
| ASN1_INTEGER tlsext_tick_lifetime;
|
| ASN1_OCTET_STRING tlsext_tick;
|
| #endif /* OPENSSL_NO_TLSEXT */
|
| +#ifndef OPENSSL_NO_PSK
|
| + ASN1_OCTET_STRING psk_identity_hint;
|
| + ASN1_OCTET_STRING psk_identity;
|
| +#endif /* OPENSSL_NO_PSK */
|
| } SSL_SESSION_ASN1;
|
|
|
| int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp)
|
| {
|
| #define LSIZE2 (sizeof(long)*2)
|
| - int v1=0,v2=0,v3=0,v4=0,v5=0;
|
| + int v1=0,v2=0,v3=0,v4=0,v5=0,v7=0,v8=0;
|
| unsigned char buf[4],ibuf1[LSIZE2],ibuf2[LSIZE2];
|
| unsigned char ibuf3[LSIZE2],ibuf4[LSIZE2],ibuf5[LSIZE2];
|
| #ifndef OPENSSL_NO_TLSEXT
|
| @@ -97,8 +127,8 @@
|
| unsigned char ibuf6[LSIZE2];
|
| #endif
|
| #ifndef OPENSSL_NO_COMP
|
| + unsigned char cbuf;
|
| int v11=0;
|
| - unsigned char cbuf;
|
| #endif
|
| long l;
|
| SSL_SESSION_ASN1 a;
|
| @@ -177,7 +207,7 @@
|
| a.krb5_princ.data=in->krb5_client_princ;
|
| }
|
| #endif /* OPENSSL_NO_KRB5 */
|
| -
|
| +
|
| if (in->time != 0L)
|
| {
|
| a.time.length=LSIZE2;
|
| @@ -223,6 +253,21 @@
|
| ASN1_INTEGER_set(&a.tlsext_tick_lifetime,in->tlsext_tick_lifetime_hint);
|
| }
|
| #endif /* OPENSSL_NO_TLSEXT */
|
| +#ifndef OPENSSL_NO_PSK
|
| + if (in->psk_identity_hint)
|
| + {
|
| + a.psk_identity_hint.length=strlen(in->psk_identity_hint);
|
| + a.psk_identity_hint.type=V_ASN1_OCTET_STRING;
|
| + a.psk_identity_hint.data=(unsigned char *)(in->psk_identity_hint);
|
| + }
|
| + if (in->psk_identity)
|
| + {
|
| + a.psk_identity.length=strlen(in->psk_identity);
|
| + a.psk_identity.type=V_ASN1_OCTET_STRING;
|
| + a.psk_identity.data=(unsigned char *)(in->psk_identity);
|
| + }
|
| +#endif /* OPENSSL_NO_PSK */
|
| +
|
| M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER);
|
| M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER);
|
| M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
|
| @@ -256,6 +301,13 @@
|
| M_ASN1_I2D_len_EXP_opt(&(a.comp_id), i2d_ASN1_OCTET_STRING,11,v11);
|
| #endif
|
| #endif /* OPENSSL_NO_TLSEXT */
|
| +#ifndef OPENSSL_NO_PSK
|
| + if (in->psk_identity_hint)
|
| + M_ASN1_I2D_len_EXP_opt(&(a.psk_identity_hint), i2d_ASN1_OCTET_STRING,7,v7);
|
| + if (in->psk_identity)
|
| + M_ASN1_I2D_len_EXP_opt(&(a.psk_identity), i2d_ASN1_OCTET_STRING,8,v8);
|
| +#endif /* OPENSSL_NO_PSK */
|
| +
|
| M_ASN1_I2D_seq_total();
|
|
|
| M_ASN1_I2D_put(&(a.version), i2d_ASN1_INTEGER);
|
| @@ -282,6 +334,14 @@
|
| #ifndef OPENSSL_NO_TLSEXT
|
| if (in->tlsext_hostname)
|
| M_ASN1_I2D_put_EXP_opt(&(a.tlsext_hostname), i2d_ASN1_OCTET_STRING,6,v6);
|
| +#endif /* OPENSSL_NO_TLSEXT */
|
| +#ifndef OPENSSL_NO_PSK
|
| + if (in->psk_identity_hint)
|
| + M_ASN1_I2D_put_EXP_opt(&(a.psk_identity_hint), i2d_ASN1_OCTET_STRING,7,v7);
|
| + if (in->psk_identity)
|
| + M_ASN1_I2D_put_EXP_opt(&(a.psk_identity), i2d_ASN1_OCTET_STRING,8,v8);
|
| +#endif /* OPENSSL_NO_PSK */
|
| +#ifndef OPENSSL_NO_TLSEXT
|
| if (in->tlsext_tick_lifetime_hint > 0)
|
| M_ASN1_I2D_put_EXP_opt(&a.tlsext_tick_lifetime, i2d_ASN1_INTEGER,9,v9);
|
| if (in->tlsext_tick)
|
| @@ -295,9 +355,9 @@
|
| }
|
|
|
| SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp,
|
| - long length)
|
| + long length)
|
| {
|
| - int version,ssl_version=0,i;
|
| + int ssl_version=0,i;
|
| long id;
|
| ASN1_INTEGER ai,*aip;
|
| ASN1_OCTET_STRING os,*osp;
|
| @@ -311,7 +371,6 @@
|
|
|
| ai.data=NULL; ai.length=0;
|
| M_ASN1_D2I_get_x(ASN1_INTEGER,aip,d2i_ASN1_INTEGER);
|
| - version=(int)ASN1_INTEGER_get(aip);
|
| if (ai.data != NULL) { OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; }
|
|
|
| /* we don't care about the version right now :-) */
|
| @@ -475,6 +534,24 @@
|
| }
|
| else
|
| ret->tlsext_hostname=NULL;
|
| +#endif /* OPENSSL_NO_TLSEXT */
|
| +
|
| +#ifndef OPENSSL_NO_PSK
|
| + os.length=0;
|
| + os.data=NULL;
|
| + M_ASN1_D2I_get_EXP_opt(osp,d2i_ASN1_OCTET_STRING,7);
|
| + if (os.data)
|
| + {
|
| + ret->psk_identity_hint = BUF_strndup((char *)os.data, os.length);
|
| + OPENSSL_free(os.data);
|
| + os.data = NULL;
|
| + os.length = 0;
|
| + }
|
| + else
|
| + ret->psk_identity_hint=NULL;
|
| +#endif /* OPENSSL_NO_PSK */
|
| +
|
| +#ifndef OPENSSL_NO_TLSEXT
|
| ai.length=0;
|
| M_ASN1_D2I_get_EXP_opt(aip,d2i_ASN1_INTEGER,9);
|
| if (ai.data != NULL)
|
| @@ -485,17 +562,17 @@
|
| else if (ret->tlsext_ticklen && ret->session_id_length)
|
| ret->tlsext_tick_lifetime_hint = -1;
|
| else
|
| - ret->tlsext_tick_lifetime_hint = 0;
|
| - os.length=0;
|
| - os.data=NULL;
|
| - M_ASN1_D2I_get_EXP_opt(osp,d2i_ASN1_OCTET_STRING,10);
|
| - if (os.data)
|
| - {
|
| + ret->tlsext_tick_lifetime_hint=0;
|
| + os.length=0;
|
| + os.data=NULL;
|
| + M_ASN1_D2I_get_EXP_opt(osp,d2i_ASN1_OCTET_STRING,10);
|
| + if (os.data)
|
| + {
|
| ret->tlsext_tick = os.data;
|
| ret->tlsext_ticklen = os.length;
|
| - os.data = NULL;
|
| - os.length = 0;
|
| - }
|
| + os.data = NULL;
|
| + os.length = 0;
|
| + }
|
| else
|
| ret->tlsext_tick=NULL;
|
| #endif /* OPENSSL_NO_TLSEXT */
|
|
|