1--- openssl-1.0.0b.orig/ssl/ssl.h 2010-11-30 00:03:46.000000000 +0000 2+++ openssl-1.0.0b/ssl/ssl.h 2010-11-30 00:03:47.000000000 +0000 3@@ -1133,6 +1133,9 @@ struct ssl_st 4 /* This can also be in the session once a session is established */ 5 SSL_SESSION *session; 6 7+ /* This can be disabled to prevent the use of uncached sessions */ 8+ int session_creation_enabled; 9+ 10 /* Default generate session ID callback. */ 11 GEN_SESSION_CB generate_session_id; 12 13@@ -1546,6 +1549,7 @@ const SSL_CIPHER *SSL_get_current_cipher 14 int SSL_CIPHER_get_bits(const SSL_CIPHER *c,int *alg_bits); 15 char * SSL_CIPHER_get_version(const SSL_CIPHER *c); 16 const char * SSL_CIPHER_get_name(const SSL_CIPHER *c); 17+const char * SSL_CIPHER_authentication_method(const SSL_CIPHER *c); 18 19 int SSL_get_fd(const SSL *s); 20 int SSL_get_rfd(const SSL *s); 21@@ -1554,6 +1558,7 @@ const char * SSL_get_cipher_list(const 22 char * SSL_get_shared_ciphers(const SSL *s, char *buf, int len); 23 int SSL_get_read_ahead(const SSL * s); 24 int SSL_pending(const SSL *s); 25+const char * SSL_authentication_method(const SSL *c); 26 #ifndef OPENSSL_NO_SOCK 27 int SSL_set_fd(SSL *s, int fd); 28 int SSL_set_rfd(SSL *s, int fd); 29@@ -1565,6 +1570,7 @@ BIO * SSL_get_rbio(const SSL *s); 30 BIO * SSL_get_wbio(const SSL *s); 31 #endif 32 int SSL_set_cipher_list(SSL *s, const char *str); 33+int SSL_set_cipher_lists(SSL *s, STACK_OF(SSL_CIPHER) *sk); 34 void SSL_set_read_ahead(SSL *s, int yes); 35 int SSL_get_verify_mode(const SSL *s); 36 int SSL_get_verify_depth(const SSL *s); 37@@ -1580,6 +1586,8 @@ int SSL_use_PrivateKey(SSL *ssl, EVP_PKE 38 int SSL_use_PrivateKey_ASN1(int pk,SSL *ssl, const unsigned char *d, long len); 39 int SSL_use_certificate(SSL *ssl, X509 *x); 40 int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len); 41+int SSL_use_certificate_chain(SSL *ssl, STACK_OF(X509) *cert_chain); 42+STACK_OF(X509) * SSL_get_certificate_chain(SSL *ssl, X509 *x); 43 44 #ifndef OPENSSL_NO_STDIO 45 int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type); 46@@ -1615,6 +1623,7 @@ void SSL_copy_session_id(SSL *to,const S 47 SSL_SESSION *SSL_SESSION_new(void); 48 const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, 49 unsigned int *len); 50+const char * SSL_SESSION_get_version(const SSL_SESSION *s); 51 #ifndef OPENSSL_NO_FP_API 52 int SSL_SESSION_print_fp(FILE *fp,const SSL_SESSION *ses); 53 #endif 54@@ -1624,6 +1633,7 @@ int SSL_SESSION_print(BIO *fp,const SSL_ 55 void SSL_SESSION_free(SSL_SESSION *ses); 56 int i2d_SSL_SESSION(SSL_SESSION *in,unsigned char **pp); 57 int SSL_set_session(SSL *to, SSL_SESSION *session); 58+void SSL_set_session_creation_enabled(SSL *, int); 59 int SSL_CTX_add_session(SSL_CTX *s, SSL_SESSION *c); 60 int SSL_CTX_remove_session(SSL_CTX *,SSL_SESSION *c); 61 int SSL_CTX_set_generate_session_id(SSL_CTX *, GEN_SESSION_CB); 62@@ -2066,6 +2076,7 @@ void ERR_load_SSL_strings(void); 63 #define SSL_F_SSL_UNDEFINED_VOID_FUNCTION 244 64 #define SSL_F_SSL_USE_CERTIFICATE 198 65 #define SSL_F_SSL_USE_CERTIFICATE_ASN1 199 66+#define SSL_F_SSL_USE_CERTIFICATE_CHAIN 2000 67 #define SSL_F_SSL_USE_CERTIFICATE_FILE 200 68 #define SSL_F_SSL_USE_PRIVATEKEY 201 69 #define SSL_F_SSL_USE_PRIVATEKEY_ASN1 202 70@@ -2272,6 +2283,7 @@ void ERR_load_SSL_strings(void); 71 #define SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING 345 72 #define SSL_R_SERVERHELLO_TLSEXT 275 73 #define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED 277 74+#define SSL_R_SESSION_MAY_NOT_BE_CREATED 2000 75 #define SSL_R_SHORT_READ 219 76 #define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220 77 #define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221 78--- openssl-1.0.0b.orig/ssl/d1_clnt.c 2010-01-26 19:46:29.000000000 +0000 79+++ openssl-1.0.0b/ssl/d1_clnt.c 2010-11-30 00:03:47.000000000 +0000 80@@ -613,6 +613,12 @@ int dtls1_client_hello(SSL *s) 81 #endif 82 (s->session->not_resumable)) 83 { 84+ if (!s->session_creation_enabled) 85+ { 86+ ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_HANDSHAKE_FAILURE); 87+ SSLerr(SSL_F_DTLS1_CLIENT_HELLO,SSL_R_SESSION_MAY_NOT_BE_CREATED); 88+ goto err; 89+ } 90 if (!ssl_get_new_session(s,0)) 91 goto err; 92 } 93--- openssl-1.0.0b.orig/ssl/s23_clnt.c 2010-02-16 14:20:40.000000000 +0000 94+++ openssl-1.0.0b/ssl/s23_clnt.c 2010-11-30 00:03:47.000000000 +0000 95@@ -687,6 +687,13 @@ static int ssl23_get_server_hello(SSL *s 96 97 /* Since, if we are sending a ssl23 client hello, we are not 98 * reusing a session-id */ 99+ if (!s->session_creation_enabled) 100+ { 101+ if (!(s->client_version == SSL2_VERSION)) 102+ ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_HANDSHAKE_FAILURE); 103+ SSLerr(SSL_F_SSL23_GET_SERVER_HELLO,SSL_R_SESSION_MAY_NOT_BE_CREATED); 104+ goto err; 105+ } 106 if (!ssl_get_new_session(s,0)) 107 goto err; 108 109--- openssl-1.0.0b.orig/ssl/s3_both.c 2010-11-30 00:03:46.000000000 +0000 110+++ openssl-1.0.0b/ssl/s3_both.c 2010-11-30 00:03:47.000000000 +0000 111@@ -347,8 +347,11 @@ unsigned long ssl3_output_cert_chain(SSL 112 unsigned long l=7; 113 BUF_MEM *buf; 114 int no_chain; 115+ STACK_OF(X509) *cert_chain; 116 117- if ((s->mode & SSL_MODE_NO_AUTO_CHAIN) || s->ctx->extra_certs) 118+ cert_chain = SSL_get_certificate_chain(s, x); 119+ 120+ if ((s->mode & SSL_MODE_NO_AUTO_CHAIN) || s->ctx->extra_certs || cert_chain) 121 no_chain = 1; 122 else 123 no_chain = 0; 124@@ -400,6 +403,10 @@ unsigned long ssl3_output_cert_chain(SSL 125 return(0); 126 } 127 128+ for (i=0; i<sk_X509_num(cert_chain); i++) 129+ if (ssl3_add_cert_to_buf(buf, &l, sk_X509_value(cert_chain,i))) 130+ return(0); 131+ 132 l-=7; 133 p=(unsigned char *)&(buf->data[4]); 134 l2n3(l,p); 135--- openssl-1.0.0b.orig/ssl/s3_clnt.c 2010-11-30 00:03:46.000000000 +0000 136+++ openssl-1.0.0b/ssl/s3_clnt.c 2010-11-30 00:03:47.000000000 +0000 137@@ -686,6 +686,12 @@ int ssl3_client_hello(SSL *s) 138 #endif 139 (sess->not_resumable)) 140 { 141+ if (!s->session_creation_enabled) 142+ { 143+ ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_HANDSHAKE_FAILURE); 144+ SSLerr(SSL_F_SSL3_CLIENT_HELLO,SSL_R_SESSION_MAY_NOT_BE_CREATED); 145+ goto err; 146+ } 147 if (!ssl_get_new_session(s,0)) 148 goto err; 149 } 150@@ -894,6 +900,12 @@ int ssl3_get_server_hello(SSL *s) 151 s->hit=0; 152 if (s->session->session_id_length > 0) 153 { 154+ if (!s->session_creation_enabled) 155+ { 156+ ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_HANDSHAKE_FAILURE); 157+ SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,SSL_R_SESSION_MAY_NOT_BE_CREATED); 158+ goto err; 159+ } 160 if (!ssl_get_new_session(s,0)) 161 { 162 al=SSL_AD_INTERNAL_ERROR; 163--- openssl-1.0.0b.orig/ssl/s3_srvr.c 2010-11-30 00:03:46.000000000 +0000 164+++ openssl-1.0.0b/ssl/s3_srvr.c 2010-11-30 00:03:47.000000000 +0000 165@@ -902,6 +902,12 @@ int ssl3_get_client_hello(SSL *s) 166 */ 167 if ((s->new_session && (s->options & SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION))) 168 { 169+ if (!s->session_creation_enabled) 170+ { 171+ ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_HANDSHAKE_FAILURE); 172+ SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_SESSION_MAY_NOT_BE_CREATED); 173+ goto err; 174+ } 175 if (!ssl_get_new_session(s,1)) 176 goto err; 177 } 178@@ -916,6 +922,12 @@ int ssl3_get_client_hello(SSL *s) 179 goto err; 180 else /* i == 0 */ 181 { 182+ if (!s->session_creation_enabled) 183+ { 184+ ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_HANDSHAKE_FAILURE); 185+ SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_SESSION_MAY_NOT_BE_CREATED); 186+ goto err; 187+ } 188 if (!ssl_get_new_session(s,1)) 189 goto err; 190 } 191--- openssl-1.0.0b.orig/ssl/ssl_ciph.c 2010-06-15 17:25:14.000000000 +0000 192+++ openssl-1.0.0b/ssl/ssl_ciph.c 2010-11-30 00:03:47.000000000 +0000 193@@ -1652,6 +1652,52 @@ int SSL_CIPHER_get_bits(const SSL_CIPHER 194 return(ret); 195 } 196 197+/* return string version of key exchange algorithm */ 198+const char* SSL_CIPHER_authentication_method(const SSL_CIPHER* cipher) 199+ { 200+ switch (cipher->algorithm_mkey) 201+ { 202+ case SSL_kRSA: 203+ return SSL_TXT_RSA; 204+ case SSL_kDHr: 205+ return SSL_TXT_DH "_" SSL_TXT_RSA; 206+ case SSL_kDHd: 207+ return SSL_TXT_DH "_" SSL_TXT_DSS; 208+ case SSL_kEDH: 209+ switch (cipher->algorithm_auth) 210+ { 211+ case SSL_aDSS: 212+ return "DHE_" SSL_TXT_DSS; 213+ case SSL_aRSA: 214+ return "DHE_" SSL_TXT_RSA; 215+ case SSL_aNULL: 216+ return SSL_TXT_DH "_anon"; 217+ default: 218+ return "UNKNOWN"; 219+ } 220+ case SSL_kKRB5: 221+ return SSL_TXT_KRB5; 222+ case SSL_kECDHr: 223+ return SSL_TXT_ECDH "_" SSL_TXT_RSA; 224+ case SSL_kECDHe: 225+ return SSL_TXT_ECDH "_" SSL_TXT_ECDSA; 226+ case SSL_kEECDH: 227+ switch (cipher->algorithm_auth) 228+ { 229+ case SSL_aECDSA: 230+ return "ECDHE_" SSL_TXT_ECDSA; 231+ case SSL_aRSA: 232+ return "ECDHE_" SSL_TXT_RSA; 233+ case SSL_aNULL: 234+ return SSL_TXT_ECDH "_anon"; 235+ default: 236+ return "UNKNOWN"; 237+ } 238+ default: 239+ return "UNKNOWN"; 240+ } 241+ } 242+ 243 SSL_COMP *ssl3_comp_find(STACK_OF(SSL_COMP) *sk, int n) 244 { 245 SSL_COMP *ctmp; 246--- openssl-1.0.0b.orig/ssl/ssl_err.c 2010-11-30 00:03:46.000000000 +0000 247+++ openssl-1.0.0b/ssl/ssl_err.c 2010-11-30 00:03:47.000000000 +0000 248@@ -465,6 +465,7 @@ static ERR_STRING_DATA SSL_str_reasons[] 249 {ERR_REASON(SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING),"scsv received when renegotiating"}, 250 {ERR_REASON(SSL_R_SERVERHELLO_TLSEXT) ,"serverhello tlsext"}, 251 {ERR_REASON(SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED),"session id context uninitialized"}, 252+{ERR_REASON(SSL_R_SESSION_MAY_NOT_BE_CREATED),"session may not be created"}, 253 {ERR_REASON(SSL_R_SHORT_READ) ,"short read"}, 254 {ERR_REASON(SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE),"signature for non signing certificate"}, 255 {ERR_REASON(SSL_R_SSL23_DOING_SESSION_ID_REUSE),"ssl23 doing session id reuse"}, 256--- openssl-1.0.0b.orig/ssl/ssl_lib.c 2010-11-30 00:03:46.000000000 +0000 257+++ openssl-1.0.0b/ssl/ssl_lib.c 2010-11-30 00:03:47.000000000 +0000 258@@ -326,6 +326,7 @@ SSL *SSL_new(SSL_CTX *ctx) 259 OPENSSL_assert(s->sid_ctx_length <= sizeof s->sid_ctx); 260 memcpy(&s->sid_ctx,&ctx->sid_ctx,sizeof(s->sid_ctx)); 261 s->verify_callback=ctx->default_verify_callback; 262+ s->session_creation_enabled=1; 263 s->generate_session_id=ctx->generate_session_id; 264 265 s->param = X509_VERIFY_PARAM_new(); 266@@ -1311,6 +1312,32 @@ int SSL_set_cipher_list(SSL *s,const cha 267 return 1; 268 } 269 270+/** specify the ciphers to be used by the SSL */ 271+int SSL_set_cipher_lists(SSL *s,STACK_OF(SSL_CIPHER) *sk) 272+ { 273+ STACK_OF(SSL_CIPHER) *tmp_cipher_list; 274+ 275+ if (sk == NULL) 276+ return 0; 277+ 278+ /* Based on end of ssl_create_cipher_list */ 279+ tmp_cipher_list = sk_SSL_CIPHER_dup(sk); 280+ if (tmp_cipher_list == NULL) 281+ { 282+ return 0; 283+ } 284+ if (s->cipher_list != NULL) 285+ sk_SSL_CIPHER_free(s->cipher_list); 286+ s->cipher_list = sk; 287+ if (s->cipher_list_by_id != NULL) 288+ sk_SSL_CIPHER_free(s->cipher_list_by_id); 289+ s->cipher_list_by_id = tmp_cipher_list; 290+ (void)sk_SSL_CIPHER_set_cmp_func(s->cipher_list_by_id,ssl_cipher_ptr_id_cmp); 291+ 292+ sk_SSL_CIPHER_sort(s->cipher_list_by_id); 293+ return 1; 294+ } 295+ 296 /* works well for SSLv2, not so good for SSLv3 */ 297 char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len) 298 { 299@@ -2551,18 +2578,45 @@ SSL_METHOD *ssl_bad_method(int ver) 300 return(NULL); 301 } 302 303-const char *SSL_get_version(const SSL *s) 304+static const char *ssl_get_version(int version) 305 { 306- if (s->version == TLS1_VERSION) 307+ if (version == TLS1_VERSION) 308 return("TLSv1"); 309- else if (s->version == SSL3_VERSION) 310+ else if (version == SSL3_VERSION) 311 return("SSLv3"); 312- else if (s->version == SSL2_VERSION) 313+ else if (version == SSL2_VERSION) 314 return("SSLv2"); 315 else 316 return("unknown"); 317 } 318 319+const char *SSL_get_version(const SSL *s) 320+ { 321+ return ssl_get_version(s->version); 322+ } 323+ 324+const char *SSL_SESSION_get_version(const SSL_SESSION *s) 325+ { 326+ return ssl_get_version(s->ssl_version); 327+ } 328+ 329+const char* SSL_authentication_method(const SSL* ssl) 330+ { 331+ if (ssl->cert != NULL && ssl->cert->rsa_tmp != NULL) 332+ return SSL_TXT_RSA "_" SSL_TXT_EXPORT; 333+ switch (ssl->version) 334+ { 335+ case SSL2_VERSION: 336+ return SSL_TXT_RSA; 337+ case SSL3_VERSION: 338+ case TLS1_VERSION: 339+ case DTLS1_VERSION: 340+ return SSL_CIPHER_authentication_method(ssl->s3->tmp.new_cipher); 341+ default: 342+ return "UNKNOWN"; 343+ } 344+ } 345+ 346 SSL *SSL_dup(SSL *s) 347 { 348 STACK_OF(X509_NAME) *sk; 349--- openssl-1.0.0b.orig/ssl/ssl_locl.h 2010-11-30 00:03:46.000000000 +0000 350+++ openssl-1.0.0b/ssl/ssl_locl.h 2010-11-30 00:03:47.000000000 +0000 351@@ -456,6 +456,7 @@ 352 typedef struct cert_pkey_st 353 { 354 X509 *x509; 355+ STACK_OF(X509) *cert_chain; 356 EVP_PKEY *privatekey; 357 } CERT_PKEY; 358 359--- openssl-1.0.0b.orig/ssl/ssl_rsa.c 2009-09-12 23:09:26.000000000 +0000 360+++ openssl-1.0.0b/ssl/ssl_rsa.c 2010-11-30 00:03:47.000000000 +0000 361@@ -697,6 +697,42 @@ int SSL_CTX_use_PrivateKey_ASN1(int type 362 } 363 364 365+int SSL_use_certificate_chain(SSL *ssl, STACK_OF(X509) *cert_chain) 366+ { 367+ if (ssl == NULL) 368+ { 369+ SSLerr(SSL_F_SSL_USE_CERTIFICATE_CHAIN,ERR_R_PASSED_NULL_PARAMETER); 370+ return(0); 371+ } 372+ if (ssl->cert == NULL) 373+ { 374+ SSLerr(SSL_F_SSL_USE_CERTIFICATE_CHAIN,SSL_R_NO_CERTIFICATE_ASSIGNED); 375+ return(0); 376+ } 377+ if (ssl->cert->key == NULL) 378+ { 379+ SSLerr(SSL_F_SSL_USE_CERTIFICATE_CHAIN,SSL_R_NO_CERTIFICATE_ASSIGNED); 380+ return(0); 381+ } 382+ ssl->cert->key->cert_chain = cert_chain; 383+ return(1); 384+ } 385+ 386+STACK_OF(X509) *SSL_get_certificate_chain(SSL *ssl, X509 *x) 387+ { 388+ int i; 389+ if (x == NULL) 390+ return NULL; 391+ if (ssl == NULL) 392+ return NULL; 393+ if (ssl->cert == NULL) 394+ return NULL; 395+ for (i = 0; i < SSL_PKEY_NUM; i++) 396+ if (ssl->cert->pkeys[i].x509 == x) 397+ return ssl->cert->pkeys[i].cert_chain; 398+ return NULL; 399+ } 400+ 401 #ifndef OPENSSL_NO_STDIO 402 /* Read a file that contains our certificate in "PEM" format, 403 * possibly followed by a sequence of CA certificates that should be 404--- openssl-1.0.0b.orig/ssl/ssl_sess.c 2010-02-01 16:49:42.000000000 +0000 405+++ openssl-1.0.0b/ssl/ssl_sess.c 2010-11-30 00:03:47.000000000 +0000 406@@ -261,6 +261,11 @@ static int def_generate_session_id(const 407 return 0; 408 } 409 410+void SSL_set_session_creation_enabled (SSL *s, int creation_enabled) 411+ { 412+ s->session_creation_enabled = creation_enabled; 413+ } 414+ 415 int ssl_get_new_session(SSL *s, int session) 416 { 417 /* This gets used by clients and servers. */ 418@@ -269,6 +274,8 @@ int ssl_get_new_session(SSL *s, int sess 419 SSL_SESSION *ss=NULL; 420 GEN_SESSION_CB cb = def_generate_session_id; 421 422+ /* caller should check this if they can do better error handling */ 423+ if (!s->session_creation_enabled) return(0); 424 if ((ss=SSL_SESSION_new()) == NULL) return(0); 425 426 /* If the context has a default timeout, use it */ 427