2009-01-03 22:22:43 +01:00
|
|
|
/*
|
2021-02-18 13:55:21 +01:00
|
|
|
* TLS client-side functions
|
2009-01-03 22:22:43 +01:00
|
|
|
*
|
2020-08-07 13:07:28 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2015-09-04 14:21:07 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2010-07-18 22:36:00 +02:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2009-01-04 17:27:10 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2009-01-03 22:22:43 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
2009-01-03 22:22:43 +01:00
|
|
|
*/
|
|
|
|
|
2020-06-03 01:43:33 +02:00
|
|
|
#include "common.h"
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_CLI_C)
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_PLATFORM_C)
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/platform.h"
|
2013-07-31 12:58:16 +02:00
|
|
|
#else
|
2015-02-06 14:43:58 +01:00
|
|
|
#include <stdlib.h>
|
2015-05-26 16:04:06 +02:00
|
|
|
#define mbedtls_calloc calloc
|
2016-04-26 08:43:27 +02:00
|
|
|
#define mbedtls_free free
|
2013-07-31 12:58:16 +02:00
|
|
|
#endif
|
|
|
|
|
2016-04-26 08:43:27 +02:00
|
|
|
#include "mbedtls/ssl.h"
|
2021-03-05 19:38:47 +01:00
|
|
|
#include "ssl_misc.h"
|
2019-12-18 16:07:04 +01:00
|
|
|
#include "mbedtls/debug.h"
|
|
|
|
#include "mbedtls/error.h"
|
2021-10-19 12:22:25 +02:00
|
|
|
#include "mbedtls/constant_time.h"
|
2016-04-26 08:43:27 +02:00
|
|
|
|
2019-01-08 13:54:37 +01:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
|
|
#include "mbedtls/psa_util.h"
|
2021-10-18 09:47:58 +02:00
|
|
|
#include "psa/crypto.h"
|
2019-01-08 13:54:37 +01:00
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
|
|
|
2016-04-26 08:43:27 +02:00
|
|
|
#include <string.h>
|
|
|
|
|
2015-06-22 19:21:23 +02:00
|
|
|
#include <stdint.h>
|
2013-07-03 15:31:03 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_HAVE_TIME)
|
2016-07-13 15:46:18 +02:00
|
|
|
#include "mbedtls/platform_time.h"
|
2013-07-03 15:31:03 +02:00
|
|
|
#endif
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
2018-04-17 16:51:09 +02:00
|
|
|
#include "mbedtls/platform_util.h"
|
2014-06-13 17:20:13 +02:00
|
|
|
#endif
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
2018-10-26 12:38:07 +02:00
|
|
|
static int ssl_conf_has_static_psk( mbedtls_ssl_config const *conf )
|
2018-10-23 12:54:44 +02:00
|
|
|
{
|
|
|
|
if( conf->psk_identity == NULL ||
|
|
|
|
conf->psk_identity_len == 0 )
|
|
|
|
{
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
|
|
|
if( conf->psk != NULL && conf->psk_len != 0 )
|
|
|
|
return( 1 );
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
2020-08-04 09:51:30 +02:00
|
|
|
if( ! mbedtls_svc_key_id_is_null( conf->psk_opaque ) )
|
2018-10-23 12:54:44 +02:00
|
|
|
return( 1 );
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2018-10-23 12:59:34 +02:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
2018-10-26 12:38:07 +02:00
|
|
|
static int ssl_conf_has_static_raw_psk( mbedtls_ssl_config const *conf )
|
2018-10-23 12:59:34 +02:00
|
|
|
{
|
|
|
|
if( conf->psk_identity == NULL ||
|
|
|
|
conf->psk_identity_len == 0 )
|
|
|
|
{
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
|
|
|
if( conf->psk != NULL && conf->psk_len != 0 )
|
|
|
|
return( 1 );
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
|
2018-10-23 12:54:44 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
|
2021-11-09 04:10:05 +01:00
|
|
|
int mbedtls_ssl_write_hostname_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2013-03-20 16:07:17 +01:00
|
|
|
unsigned char *p = buf;
|
2015-05-06 11:47:06 +02:00
|
|
|
size_t hostname_len;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
|
|
|
*olen = 0;
|
|
|
|
|
2014-06-17 16:39:18 +02:00
|
|
|
if( ssl->hostname == NULL )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding server name extension: %s",
|
|
|
|
ssl->hostname ) );
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2015-05-06 11:47:06 +02:00
|
|
|
hostname_len = strlen( ssl->hostname );
|
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, hostname_len + 9 );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2013-03-20 16:07:17 +01:00
|
|
|
/*
|
2017-04-07 14:02:16 +02:00
|
|
|
* Sect. 3, RFC 6066 (TLS Extensions Definitions)
|
|
|
|
*
|
|
|
|
* In order to provide any of the server names, clients MAY include an
|
|
|
|
* extension of type "server_name" in the (extended) client hello. The
|
|
|
|
* "extension_data" field of this extension SHALL contain
|
|
|
|
* "ServerNameList" where:
|
|
|
|
*
|
2013-03-20 16:07:17 +01:00
|
|
|
* struct {
|
|
|
|
* NameType name_type;
|
|
|
|
* select (name_type) {
|
|
|
|
* case host_name: HostName;
|
|
|
|
* } name;
|
|
|
|
* } ServerName;
|
|
|
|
*
|
|
|
|
* enum {
|
|
|
|
* host_name(0), (255)
|
|
|
|
* } NameType;
|
|
|
|
*
|
|
|
|
* opaque HostName<1..2^16-1>;
|
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* ServerName server_name_list<1..2^16-1>
|
|
|
|
* } ServerNameList;
|
2017-04-07 14:02:16 +02:00
|
|
|
*
|
2013-03-20 16:07:17 +01:00
|
|
|
*/
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SERVERNAME, p, 0 );
|
|
|
|
p += 2;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( hostname_len + 5, p, 0 );
|
|
|
|
p += 2;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( hostname_len + 3, p, 0 );
|
|
|
|
p += 2;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2021-07-14 13:31:31 +02:00
|
|
|
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME );
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( hostname_len, p, 0 );
|
|
|
|
p += 2;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2015-05-06 11:47:06 +02:00
|
|
|
memcpy( p, ssl->hostname, hostname_len );
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2015-05-06 11:47:06 +02:00
|
|
|
*olen = hostname_len + 9;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2013-03-20 16:07:17 +01:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_renegotiation_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2013-03-20 16:07:17 +01:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
|
|
|
|
|
|
|
*olen = 0;
|
|
|
|
|
2017-10-12 15:58:55 +02:00
|
|
|
/* We're always including an TLS_EMPTY_RENEGOTIATION_INFO_SCSV in the
|
|
|
|
* initial ClientHello, in which case also adding the renegotiation
|
|
|
|
* info extension is NOT RECOMMENDED as per RFC 5746 Section 3.4. */
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->renego_status != MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding renegotiation extension" ) );
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 5 + ssl->verify_data_len );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2013-03-20 16:07:17 +01:00
|
|
|
/*
|
|
|
|
* Secure renegotiation
|
|
|
|
*/
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_RENEGOTIATION_INFO, p, 0 );
|
|
|
|
p += 2;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
|
|
|
*p++ = 0x00;
|
2021-07-14 13:31:31 +02:00
|
|
|
*p++ = MBEDTLS_BYTE_0( ssl->verify_data_len + 1 );
|
|
|
|
*p++ = MBEDTLS_BYTE_0( ssl->verify_data_len );
|
2013-03-20 16:07:17 +01:00
|
|
|
|
|
|
|
memcpy( p, ssl->own_verify_data, ssl->verify_data_len );
|
|
|
|
|
|
|
|
*olen = 5 + ssl->verify_data_len;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2013-03-20 16:07:17 +01:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2015-09-15 10:53:51 +02:00
|
|
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
2015-10-06 18:11:18 +02:00
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_supported_point_formats_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2013-03-20 16:07:17 +01:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
2017-04-12 15:54:42 +02:00
|
|
|
(void) ssl; /* ssl used for debugging only */
|
2013-03-20 16:07:17 +01:00
|
|
|
|
|
|
|
*olen = 0;
|
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding supported_point_formats extension" ) );
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS, p, 0 );
|
|
|
|
p += 2;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
|
|
|
*p++ = 0x00;
|
|
|
|
*p++ = 2;
|
2013-08-15 17:42:02 +02:00
|
|
|
|
|
|
|
*p++ = 1;
|
2015-04-08 12:49:31 +02:00
|
|
|
*p++ = MBEDTLS_ECP_PF_UNCOMPRESSED;
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2013-08-15 17:42:02 +02:00
|
|
|
*olen = 6;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2013-03-20 16:07:17 +01:00
|
|
|
}
|
2018-03-13 16:22:58 +01:00
|
|
|
#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
|
2015-10-06 18:11:18 +02:00
|
|
|
MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-09-16 10:05:04 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_ecjpake_kkpp_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2015-09-15 16:55:05 +02:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-09-15 16:55:05 +02:00
|
|
|
unsigned char *p = buf;
|
|
|
|
size_t kkpp_len;
|
|
|
|
|
|
|
|
*olen = 0;
|
|
|
|
|
|
|
|
/* Skip costly extension if we can't use EC J-PAKE anyway */
|
|
|
|
if( mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2015-09-15 16:55:05 +02:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding ecjpake_kkpp extension" ) );
|
2015-09-15 16:55:05 +02:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 );
|
2015-09-15 16:55:05 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_ECJPAKE_KKPP, p, 0 );
|
|
|
|
p += 2;
|
2015-09-15 16:55:05 +02:00
|
|
|
|
2015-09-17 14:16:30 +02:00
|
|
|
/*
|
|
|
|
* We may need to send ClientHello multiple times for Hello verification.
|
|
|
|
* We don't want to compute fresh values every time (both for performance
|
|
|
|
* and consistency reasons), so cache the extension content.
|
|
|
|
*/
|
|
|
|
if( ssl->handshake->ecjpake_cache == NULL ||
|
|
|
|
ssl->handshake->ecjpake_cache_len == 0 )
|
2015-09-15 16:55:05 +02:00
|
|
|
{
|
2015-09-17 14:16:30 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "generating new ecjpake parameters" ) );
|
|
|
|
|
2015-10-19 15:14:03 +02:00
|
|
|
ret = mbedtls_ecjpake_write_round_one( &ssl->handshake->ecjpake_ctx,
|
2017-04-12 15:54:42 +02:00
|
|
|
p + 2, end - p - 2, &kkpp_len,
|
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng );
|
2015-10-19 15:14:03 +02:00
|
|
|
if( ret != 0 )
|
2015-09-17 14:16:30 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1 ,
|
|
|
|
"mbedtls_ecjpake_write_round_one", ret );
|
2017-04-12 15:54:42 +02:00
|
|
|
return( ret );
|
2015-09-17 14:16:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ssl->handshake->ecjpake_cache = mbedtls_calloc( 1, kkpp_len );
|
|
|
|
if( ssl->handshake->ecjpake_cache == NULL )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "allocation failed" ) );
|
2017-04-12 15:54:42 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
|
2015-09-17 14:16:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
memcpy( ssl->handshake->ecjpake_cache, p + 2, kkpp_len );
|
|
|
|
ssl->handshake->ecjpake_cache_len = kkpp_len;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "re-using cached ecjpake parameters" ) );
|
|
|
|
|
|
|
|
kkpp_len = ssl->handshake->ecjpake_cache_len;
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p + 2, end, kkpp_len );
|
2015-09-17 14:16:30 +02:00
|
|
|
|
|
|
|
memcpy( p + 2, ssl->handshake->ecjpake_cache, kkpp_len );
|
2015-09-15 16:55:05 +02:00
|
|
|
}
|
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( kkpp_len, p, 0 );
|
|
|
|
p += 2;
|
2015-09-15 16:55:05 +02:00
|
|
|
|
|
|
|
*olen = kkpp_len + 4;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2015-09-15 16:55:05 +02:00
|
|
|
}
|
2015-09-16 10:05:04 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2019-05-15 15:03:01 +02:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_cid_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2019-04-25 17:55:15 +02:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
|
|
|
size_t ext_len;
|
|
|
|
|
|
|
|
/*
|
2019-05-15 11:26:32 +02:00
|
|
|
* Quoting draft-ietf-tls-dtls-connection-id-05
|
|
|
|
* https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05
|
2019-04-25 17:55:15 +02:00
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* opaque cid<0..2^8-1>;
|
|
|
|
* } ConnectionId;
|
|
|
|
*/
|
|
|
|
|
|
|
|
*olen = 0;
|
|
|
|
if( ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ||
|
|
|
|
ssl->negotiate_cid == MBEDTLS_SSL_CID_DISABLED )
|
|
|
|
{
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2019-04-25 17:55:15 +02:00
|
|
|
}
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding CID extension" ) );
|
|
|
|
|
|
|
|
/* ssl->own_cid_len is at most MBEDTLS_SSL_CID_IN_LEN_MAX
|
|
|
|
* which is at most 255, so the increment cannot overflow. */
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, (unsigned)( ssl->own_cid_len + 5 ) );
|
2019-04-25 17:55:15 +02:00
|
|
|
|
|
|
|
/* Add extension ID + size */
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_CID, p, 0 );
|
|
|
|
p += 2;
|
2019-04-25 17:55:15 +02:00
|
|
|
ext_len = (size_t) ssl->own_cid_len + 1;
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( ext_len, p, 0 );
|
|
|
|
p += 2;
|
2019-04-25 17:55:15 +02:00
|
|
|
|
|
|
|
*p++ = (uint8_t) ssl->own_cid_len;
|
|
|
|
memcpy( p, ssl->own_cid, ssl->own_cid_len );
|
|
|
|
|
|
|
|
*olen = ssl->own_cid_len + 5;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2019-04-25 17:55:15 +02:00
|
|
|
}
|
2019-05-15 15:03:01 +02:00
|
|
|
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
|
2019-04-25 17:55:15 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_max_fragment_length_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2013-07-16 17:26:28 +02:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
|
|
|
|
2015-09-28 21:52:04 +02:00
|
|
|
*olen = 0;
|
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ssl->conf->mfl_code == MBEDTLS_SSL_MAX_FRAG_LEN_NONE )
|
|
|
|
return( 0 );
|
2013-07-16 17:26:28 +02:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding max_fragment_length extension" ) );
|
2013-07-16 17:26:28 +02:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 5 );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH, p, 0 );
|
|
|
|
p += 2;
|
2013-07-16 17:26:28 +02:00
|
|
|
|
|
|
|
*p++ = 0x00;
|
|
|
|
*p++ = 1;
|
|
|
|
|
2015-05-04 10:55:58 +02:00
|
|
|
*p++ = ssl->conf->mfl_code;
|
2013-07-16 17:26:28 +02:00
|
|
|
|
|
|
|
*olen = 5;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2013-07-16 17:26:28 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
|
2013-07-16 17:26:28 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_encrypt_then_mac_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2014-10-27 13:57:03 +01:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
|
|
|
|
2015-09-28 21:52:04 +02:00
|
|
|
*olen = 0;
|
|
|
|
|
2021-02-18 13:55:21 +01:00
|
|
|
if( ssl->conf->encrypt_then_mac == MBEDTLS_SSL_ETM_DISABLED )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2014-10-27 13:57:03 +01:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding encrypt_then_mac extension" ) );
|
2014-10-27 13:57:03 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC, p, 0 );
|
|
|
|
p += 2;
|
2014-10-27 13:57:03 +01:00
|
|
|
|
|
|
|
*p++ = 0x00;
|
|
|
|
*p++ = 0x00;
|
|
|
|
|
|
|
|
*olen = 4;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2014-10-27 13:57:03 +01:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
|
2014-10-27 13:57:03 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_extended_ms_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2014-10-20 18:40:56 +02:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
|
|
|
|
2015-09-28 21:52:04 +02:00
|
|
|
*olen = 0;
|
|
|
|
|
2021-02-18 13:55:21 +01:00
|
|
|
if( ssl->conf->extended_ms == MBEDTLS_SSL_EXTENDED_MS_DISABLED )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2014-10-20 18:40:56 +02:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding extended_master_secret extension" ) );
|
2014-10-20 18:40:56 +02:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET, p, 0 );
|
|
|
|
p += 2;
|
2014-10-20 18:40:56 +02:00
|
|
|
|
|
|
|
*p++ = 0x00;
|
|
|
|
*p++ = 0x00;
|
|
|
|
|
|
|
|
*olen = 4;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2014-10-20 18:40:56 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
|
2014-10-20 18:40:56 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_session_ticket_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2013-08-02 14:44:54 +02:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
|
|
|
size_t tlen = ssl->session_negotiate->ticket_len;
|
|
|
|
|
2015-09-28 21:52:04 +02:00
|
|
|
*olen = 0;
|
|
|
|
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->session_tickets == MBEDTLS_SSL_SESSION_TICKETS_DISABLED )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2013-08-03 13:02:31 +02:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, adding session ticket extension" ) );
|
2013-08-02 14:44:54 +02:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
/* The addition is safe here since the ticket length is 16 bit. */
|
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 + tlen );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SESSION_TICKET, p, 0 );
|
|
|
|
p += 2;
|
2013-08-02 14:44:54 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( tlen, p, 0 );
|
|
|
|
p += 2;
|
2013-08-02 14:44:54 +02:00
|
|
|
|
|
|
|
*olen = 4;
|
|
|
|
|
2015-09-28 03:14:30 +02:00
|
|
|
if( ssl->session_negotiate->ticket == NULL || tlen == 0 )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2013-08-02 14:44:54 +02:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
2021-01-07 15:47:05 +01:00
|
|
|
( "sending session ticket of length %" MBEDTLS_PRINTF_SIZET, tlen ) );
|
2013-08-02 14:44:54 +02:00
|
|
|
|
|
|
|
memcpy( p, ssl->session_negotiate->ticket, tlen );
|
|
|
|
|
|
|
|
*olen += tlen;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2013-08-02 14:44:54 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_SESSION_TICKETS */
|
2013-08-02 14:44:54 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ALPN)
|
2017-04-12 15:54:42 +02:00
|
|
|
static int ssl_write_alpn_ext( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2014-04-07 10:57:45 +02:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
2015-09-28 03:14:30 +02:00
|
|
|
size_t alpnlen = 0;
|
2014-04-07 10:57:45 +02:00
|
|
|
const char **cur;
|
|
|
|
|
2015-09-28 21:52:04 +02:00
|
|
|
*olen = 0;
|
|
|
|
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->alpn_list == NULL )
|
2017-04-12 15:54:42 +02:00
|
|
|
return( 0 );
|
2014-04-07 10:57:45 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding alpn extension" ) );
|
2014-04-07 10:57:45 +02:00
|
|
|
|
2015-09-28 03:14:30 +02:00
|
|
|
for( cur = ssl->conf->alpn_list; *cur != NULL; cur++ )
|
2017-04-12 15:54:42 +02:00
|
|
|
alpnlen += strlen( *cur ) + 1;
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 + alpnlen );
|
2015-09-28 03:14:30 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_ALPN, p, 0 );
|
|
|
|
p += 2;
|
2014-04-07 10:57:45 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* opaque ProtocolName<1..2^8-1>;
|
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* ProtocolName protocol_name_list<2..2^16-1>
|
|
|
|
* } ProtocolNameList;
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Skip writing extension and list length for now */
|
|
|
|
p += 4;
|
|
|
|
|
2015-05-04 10:55:58 +02:00
|
|
|
for( cur = ssl->conf->alpn_list; *cur != NULL; cur++ )
|
2014-04-07 10:57:45 +02:00
|
|
|
{
|
2017-04-12 15:54:42 +02:00
|
|
|
/*
|
|
|
|
* mbedtls_ssl_conf_set_alpn_protocols() checked that the length of
|
|
|
|
* protocol names is less than 255.
|
|
|
|
*/
|
|
|
|
*p = (unsigned char)strlen( *cur );
|
2014-04-07 10:57:45 +02:00
|
|
|
memcpy( p + 1, *cur, *p );
|
|
|
|
p += 1 + *p;
|
|
|
|
}
|
|
|
|
|
|
|
|
*olen = p - buf;
|
|
|
|
|
|
|
|
/* List length = olen - 2 (ext_type) - 2 (ext_len) - 2 (list_len) */
|
2021-07-19 12:56:54 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( *olen - 6, buf, 4 );
|
2014-04-07 10:57:45 +02:00
|
|
|
|
|
|
|
/* Extension length = olen - 2 (ext_type) - 2 (ext_len) */
|
2021-07-19 12:56:54 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( *olen - 4, buf, 2 );
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2014-04-07 10:57:45 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_ALPN */
|
2014-04-07 10:57:45 +02:00
|
|
|
|
2018-12-05 10:04:31 +01:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_SRTP)
|
2020-09-22 21:49:40 +02:00
|
|
|
static int ssl_write_use_srtp_ext( mbedtls_ssl_context *ssl,
|
2020-09-23 18:47:56 +02:00
|
|
|
unsigned char *buf,
|
|
|
|
const unsigned char *end,
|
|
|
|
size_t *olen )
|
2015-12-03 21:56:45 +01:00
|
|
|
{
|
|
|
|
unsigned char *p = buf;
|
2020-09-22 15:15:19 +02:00
|
|
|
size_t protection_profiles_index = 0, ext_len = 0;
|
|
|
|
uint16_t mki_len = 0, profile_value = 0;
|
2015-12-03 21:56:45 +01:00
|
|
|
|
|
|
|
*olen = 0;
|
|
|
|
|
2020-10-28 17:18:18 +01:00
|
|
|
if( ( ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ) ||
|
|
|
|
( ssl->conf->dtls_srtp_profile_list == NULL ) ||
|
|
|
|
( ssl->conf->dtls_srtp_profile_list_len == 0 ) )
|
2015-12-03 21:56:45 +01:00
|
|
|
{
|
2020-09-22 21:49:40 +02:00
|
|
|
return( 0 );
|
2015-12-03 21:56:45 +01:00
|
|
|
}
|
|
|
|
|
2018-12-05 10:04:31 +01:00
|
|
|
/* RFC 5764 section 4.1.1
|
2015-12-03 21:56:45 +01:00
|
|
|
* uint8 SRTPProtectionProfile[2];
|
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* SRTPProtectionProfiles SRTPProtectionProfiles;
|
|
|
|
* opaque srtp_mki<0..255>;
|
|
|
|
* } UseSRTPData;
|
|
|
|
* SRTPProtectionProfile SRTPProtectionProfiles<2..2^16-1>;
|
|
|
|
*/
|
2020-09-21 23:44:45 +02:00
|
|
|
if( ssl->conf->dtls_srtp_mki_support == MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED )
|
2018-01-22 11:30:04 +01:00
|
|
|
{
|
|
|
|
mki_len = ssl->dtls_srtp_info.mki_len;
|
|
|
|
}
|
2018-07-12 10:54:20 +02:00
|
|
|
/* Extension length = 2 bytes for profiles length,
|
|
|
|
* ssl->conf->dtls_srtp_profile_list_len * 2 (each profile is 2 bytes length ),
|
|
|
|
* 1 byte for srtp_mki vector length and the mki_len value
|
|
|
|
*/
|
2018-12-06 16:12:49 +01:00
|
|
|
ext_len = 2 + 2 * ( ssl->conf->dtls_srtp_profile_list_len ) + 1 + mki_len;
|
|
|
|
|
2020-09-22 21:49:40 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding use_srtp extension" ) );
|
|
|
|
|
|
|
|
/* Check there is room in the buffer for the extension + 4 bytes
|
|
|
|
* - the extension tag (2 bytes)
|
|
|
|
* - the extension length (2 bytes)
|
|
|
|
*/
|
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, ext_len + 4 );
|
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_USE_SRTP, p, 0 );
|
|
|
|
p += 2;
|
2020-09-22 21:49:40 +02:00
|
|
|
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( ext_len, p, 0 );
|
|
|
|
p += 2;
|
2015-12-03 21:56:45 +01:00
|
|
|
|
2017-12-21 09:15:08 +01:00
|
|
|
/* protection profile length: 2*(ssl->conf->dtls_srtp_profile_list_len) */
|
2020-09-22 21:21:39 +02:00
|
|
|
/* micro-optimization:
|
|
|
|
* the list size is limited to MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH
|
|
|
|
* which is lower than 127, so the upper byte of the length is always 0
|
|
|
|
* For the documentation, the more generic code is left in comments
|
|
|
|
* *p++ = (unsigned char)( ( ( 2 * ssl->conf->dtls_srtp_profile_list_len )
|
|
|
|
* >> 8 ) & 0xFF );
|
|
|
|
*/
|
|
|
|
*p++ = 0;
|
2021-07-14 13:31:31 +02:00
|
|
|
*p++ = MBEDTLS_BYTE_0( 2 * ssl->conf->dtls_srtp_profile_list_len );
|
2015-12-03 21:56:45 +01:00
|
|
|
|
2018-07-12 10:54:20 +02:00
|
|
|
for( protection_profiles_index=0;
|
|
|
|
protection_profiles_index < ssl->conf->dtls_srtp_profile_list_len;
|
|
|
|
protection_profiles_index++ )
|
2015-12-03 21:56:45 +01:00
|
|
|
{
|
2020-09-22 12:25:52 +02:00
|
|
|
profile_value = mbedtls_ssl_check_srtp_profile_value
|
2018-12-06 16:12:49 +01:00
|
|
|
( ssl->conf->dtls_srtp_profile_list[protection_profiles_index] );
|
2020-09-22 12:25:52 +02:00
|
|
|
if( profile_value != MBEDTLS_TLS_SRTP_UNSET )
|
2018-12-06 16:12:49 +01:00
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "ssl_write_use_srtp_ext, add profile: %04x",
|
|
|
|
profile_value ) );
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( profile_value, p, 0 );
|
|
|
|
p += 2;
|
2018-12-06 16:12:49 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Note: we shall never arrive here as protection profiles
|
2020-10-22 23:31:00 +02:00
|
|
|
* is checked by mbedtls_ssl_conf_dtls_srtp_protection_profiles function
|
2018-12-06 16:12:49 +01:00
|
|
|
*/
|
2020-09-22 15:51:27 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "client hello, "
|
2020-10-22 23:31:00 +02:00
|
|
|
"illegal DTLS-SRTP protection profile %d",
|
2020-09-22 15:51:27 +02:00
|
|
|
ssl->conf->dtls_srtp_profile_list[protection_profiles_index]
|
|
|
|
) );
|
2020-10-22 23:31:00 +02:00
|
|
|
return( MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED );
|
2015-12-03 21:56:45 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-22 11:30:04 +01:00
|
|
|
*p++ = mki_len & 0xFF;
|
|
|
|
|
|
|
|
if( mki_len != 0 )
|
|
|
|
{
|
2018-12-06 16:31:55 +01:00
|
|
|
memcpy( p, ssl->dtls_srtp_info.mki_value, mki_len );
|
2018-12-10 13:56:21 +01:00
|
|
|
/*
|
|
|
|
* Increment p to point to the current position.
|
|
|
|
*/
|
|
|
|
p += mki_len;
|
2018-07-12 10:54:20 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "sending mki", ssl->dtls_srtp_info.mki_value,
|
|
|
|
ssl->dtls_srtp_info.mki_len );
|
2018-01-22 11:30:04 +01:00
|
|
|
}
|
|
|
|
|
2018-07-12 10:54:20 +02:00
|
|
|
/*
|
|
|
|
* total extension length: extension type (2 bytes)
|
|
|
|
* + extension length (2 bytes)
|
|
|
|
* + protection profile length (2 bytes)
|
|
|
|
* + 2 * number of protection profiles
|
|
|
|
* + srtp_mki vector length(1 byte)
|
2018-12-10 13:56:21 +01:00
|
|
|
* + mki value
|
2018-07-12 10:54:20 +02:00
|
|
|
*/
|
2018-12-10 13:56:21 +01:00
|
|
|
*olen = p - buf;
|
2020-09-22 21:49:40 +02:00
|
|
|
|
|
|
|
return( 0 );
|
2015-12-03 21:56:45 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_SSL_DTLS_SRTP */
|
|
|
|
|
2014-07-22 15:53:27 +02:00
|
|
|
/*
|
|
|
|
* Generate random bytes for ClientHello
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_generate_random( mbedtls_ssl_context *ssl )
|
2014-07-22 15:53:27 +02:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2014-07-22 15:53:27 +02:00
|
|
|
unsigned char *p = ssl->handshake->randbytes;
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_HAVE_TIME)
|
2016-04-26 08:43:27 +02:00
|
|
|
mbedtls_time_t t;
|
2014-07-22 15:53:27 +02:00
|
|
|
#endif
|
|
|
|
|
2014-07-22 15:59:14 +02:00
|
|
|
/*
|
|
|
|
* When responding to a verify request, MUST reuse random (RFC 6347 4.2.1)
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM &&
|
2014-07-22 15:59:14 +02:00
|
|
|
ssl->handshake->verify_cookie != NULL )
|
|
|
|
{
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_HAVE_TIME)
|
2016-04-26 08:43:27 +02:00
|
|
|
t = mbedtls_time( NULL );
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT32_BE( t, p, 0 );
|
|
|
|
p += 4;
|
2014-07-22 15:53:27 +02:00
|
|
|
|
2021-01-07 15:47:05 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, current time: %" MBEDTLS_PRINTF_LONGLONG,
|
|
|
|
(long long) t ) );
|
2014-07-22 15:53:27 +02:00
|
|
|
#else
|
2015-05-07 13:35:38 +02:00
|
|
|
if( ( ret = ssl->conf->f_rng( ssl->conf->p_rng, p, 4 ) ) != 0 )
|
2014-07-22 15:53:27 +02:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
p += 4;
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_HAVE_TIME */
|
2014-07-22 15:53:27 +02:00
|
|
|
|
2015-05-07 13:35:38 +02:00
|
|
|
if( ( ret = ssl->conf->f_rng( ssl->conf->p_rng, p, 28 ) ) != 0 )
|
2014-07-22 15:53:27 +02:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2018-04-18 20:35:00 +02:00
|
|
|
/**
|
|
|
|
* \brief Validate cipher suite against config in SSL context.
|
|
|
|
*
|
|
|
|
* \param suite_info cipher suite to validate
|
|
|
|
* \param ssl SSL context
|
2018-04-25 11:06:07 +02:00
|
|
|
* \param min_minor_ver Minimal minor version to accept a cipher suite
|
|
|
|
* \param max_minor_ver Maximal minor version to accept a cipher suite
|
2018-04-18 20:35:00 +02:00
|
|
|
*
|
|
|
|
* \return 0 if valid, else 1
|
|
|
|
*/
|
2017-05-08 12:06:19 +02:00
|
|
|
static int ssl_validate_ciphersuite(
|
|
|
|
const mbedtls_ssl_ciphersuite_t * suite_info,
|
|
|
|
const mbedtls_ssl_context * ssl,
|
|
|
|
int min_minor_ver, int max_minor_ver )
|
2018-04-18 20:35:00 +02:00
|
|
|
{
|
2018-04-25 11:06:07 +02:00
|
|
|
(void) ssl;
|
2018-04-18 20:35:00 +02:00
|
|
|
if( suite_info == NULL )
|
|
|
|
return( 1 );
|
|
|
|
|
2018-04-25 11:06:07 +02:00
|
|
|
if( suite_info->min_minor_ver > max_minor_ver ||
|
|
|
|
suite_info->max_minor_ver < min_minor_ver )
|
2018-04-18 20:35:00 +02:00
|
|
|
return( 1 );
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
|
|
|
if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM &&
|
|
|
|
( suite_info->flags & MBEDTLS_CIPHERSUITE_NODTLS ) )
|
|
|
|
return( 1 );
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
|
|
|
if( suite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE &&
|
|
|
|
mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 )
|
|
|
|
return( 1 );
|
|
|
|
#endif
|
|
|
|
|
2018-10-23 12:54:44 +02:00
|
|
|
/* Don't suggest PSK-based ciphersuite if no PSK is available. */
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
2018-10-23 12:54:44 +02:00
|
|
|
if( mbedtls_ssl_ciphersuite_uses_psk( suite_info ) &&
|
2018-10-26 12:38:07 +02:00
|
|
|
ssl_conf_has_static_psk( ssl->conf ) == 0 )
|
2018-10-23 12:54:44 +02:00
|
|
|
{
|
|
|
|
return( 1 );
|
|
|
|
}
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
|
2018-10-23 12:54:44 +02:00
|
|
|
|
2018-04-18 20:35:00 +02:00
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_write_client_hello( mbedtls_ssl_context *ssl )
|
2013-03-20 16:07:17 +01:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2013-03-20 16:07:17 +01:00
|
|
|
size_t i, n, olen, ext_len = 0;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
2013-03-20 16:07:17 +01:00
|
|
|
unsigned char *buf;
|
2013-06-29 16:01:15 +02:00
|
|
|
unsigned char *p, *q;
|
2017-04-12 15:54:42 +02:00
|
|
|
const unsigned char *end;
|
|
|
|
|
2013-04-15 15:09:54 +02:00
|
|
|
const int *ciphersuites;
|
2015-04-08 12:49:31 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info;
|
2018-02-14 18:30:48 +01:00
|
|
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
|
|
|
int uses_ec = 0;
|
|
|
|
#endif
|
2013-03-20 16:07:17 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write client hello" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-05-07 13:35:38 +02:00
|
|
|
if( ssl->conf->f_rng == NULL )
|
2013-11-21 17:31:06 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "no RNG provided") );
|
|
|
|
return( MBEDTLS_ERR_SSL_NO_RNG );
|
2013-11-21 17:31:06 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
if( ssl->renego_status == MBEDTLS_SSL_INITIAL_HANDSHAKE )
|
2014-11-03 08:23:14 +01:00
|
|
|
#endif
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2015-05-04 10:55:58 +02:00
|
|
|
ssl->major_ver = ssl->conf->min_major_ver;
|
|
|
|
ssl->minor_ver = ssl->conf->min_minor_ver;
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-05-10 23:27:38 +02:00
|
|
|
if( ssl->conf->max_major_ver == 0 )
|
2011-10-06 15:04:09 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "configured max major version is invalid, consider using mbedtls_ssl_config_defaults()" ) );
|
2015-05-10 23:27:38 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
|
2011-10-06 15:04:09 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
buf = ssl->out_msg;
|
|
|
|
end = buf + MBEDTLS_SSL_OUT_CONTENT_LEN;
|
|
|
|
|
2009-01-03 22:22:43 +01:00
|
|
|
/*
|
2017-04-12 15:54:42 +02:00
|
|
|
* Check if there's enough space for the first part of the ClientHello
|
|
|
|
* consisting of the 38 bytes described below, the session identifier (at
|
|
|
|
* most 32 bytes) and its length (1 byte).
|
|
|
|
*
|
|
|
|
* Use static upper bounds instead of the actual values
|
|
|
|
* to allow the compiler to optimize this away.
|
|
|
|
*/
|
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( buf, end, 38 + 1 + 32 );
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The 38 first bytes of the ClientHello:
|
|
|
|
* 0 . 0 handshake type (written later)
|
|
|
|
* 1 . 3 handshake length (written later)
|
2009-01-03 22:22:43 +01:00
|
|
|
* 4 . 5 highest version supported
|
|
|
|
* 6 . 9 current UNIX time
|
|
|
|
* 10 . 37 random bytes
|
2017-04-12 15:54:42 +02:00
|
|
|
*
|
|
|
|
* The current UNIX time (4 bytes) and following 28 random bytes are written
|
|
|
|
* by ssl_generate_random() into ssl->handshake->randbytes buffer and then
|
|
|
|
* copied from there into the output buffer.
|
2009-01-03 22:22:43 +01:00
|
|
|
*/
|
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
p = buf + 4;
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_write_version( ssl->conf->max_major_ver,
|
|
|
|
ssl->conf->max_minor_ver,
|
|
|
|
ssl->conf->transport, p );
|
2014-02-11 18:15:03 +01:00
|
|
|
p += 2;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, max version: [%d:%d]",
|
2009-01-03 22:22:43 +01:00
|
|
|
buf[4], buf[5] ) );
|
|
|
|
|
2014-07-22 15:53:27 +02:00
|
|
|
if( ( ret = ssl_generate_random( ssl ) ) != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_generate_random", ret );
|
2011-11-27 22:07:34 +01:00
|
|
|
return( ret );
|
2014-07-22 15:53:27 +02:00
|
|
|
}
|
2011-11-27 22:07:34 +01:00
|
|
|
|
2014-07-22 15:53:27 +02:00
|
|
|
memcpy( p, ssl->handshake->randbytes, 32 );
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "client hello, random bytes", p, 32 );
|
2014-07-22 15:53:27 +02:00
|
|
|
p += 32;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* 38 . 38 session id length
|
|
|
|
* 39 . 39+n session id
|
2014-03-21 09:40:12 +01:00
|
|
|
* 39+n . 39+n DTLS only: cookie length (1 byte)
|
2017-04-12 15:54:42 +02:00
|
|
|
* 40+n . .. DTLS only: cookie
|
2014-03-21 09:40:12 +01:00
|
|
|
* .. . .. ciphersuitelist length (2 bytes)
|
|
|
|
* .. . .. ciphersuitelist
|
|
|
|
* .. . .. compression methods length (1 byte)
|
2012-04-11 18:11:49 +02:00
|
|
|
* .. . .. compression methods
|
2014-03-21 09:40:12 +01:00
|
|
|
* .. . .. extensions length (2 bytes)
|
2012-04-11 18:11:49 +02:00
|
|
|
* .. . .. extensions
|
2009-01-03 22:22:43 +01:00
|
|
|
*/
|
2015-06-18 15:50:37 +02:00
|
|
|
n = ssl->session_negotiate->id_len;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2014-11-03 08:23:14 +01:00
|
|
|
if( n < 16 || n > 32 ||
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE ||
|
2014-11-03 08:23:14 +01:00
|
|
|
#endif
|
2012-09-25 23:55:46 +02:00
|
|
|
ssl->handshake->resume == 0 )
|
2013-07-31 16:31:33 +02:00
|
|
|
{
|
2009-01-03 22:22:43 +01:00
|
|
|
n = 0;
|
2013-07-31 16:31:33 +02:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
2013-07-31 16:31:33 +02:00
|
|
|
/*
|
|
|
|
* RFC 5077 section 3.4: "When presenting a ticket, the client MAY
|
|
|
|
* generate and include a Session ID in the TLS ClientHello."
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
if( ssl->renego_status == MBEDTLS_SSL_INITIAL_HANDSHAKE )
|
2015-01-22 12:06:40 +01:00
|
|
|
#endif
|
2015-03-10 12:40:43 +01:00
|
|
|
{
|
2015-01-22 12:06:40 +01:00
|
|
|
if( ssl->session_negotiate->ticket != NULL &&
|
|
|
|
ssl->session_negotiate->ticket_len != 0 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
ret = ssl->conf->f_rng( ssl->conf->p_rng,
|
|
|
|
ssl->session_negotiate->id, 32 );
|
2013-07-31 16:31:33 +02:00
|
|
|
|
2015-01-22 12:06:40 +01:00
|
|
|
if( ret != 0 )
|
|
|
|
return( ret );
|
2013-07-31 16:31:33 +02:00
|
|
|
|
2015-06-18 15:50:37 +02:00
|
|
|
ssl->session_negotiate->id_len = n = 32;
|
2015-01-22 12:06:40 +01:00
|
|
|
}
|
2013-07-31 16:31:33 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_SESSION_TICKETS */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
/*
|
|
|
|
* The first check of the output buffer size above (
|
|
|
|
* MBEDTLS_SSL_CHK_BUF_PTR( buf, end, 38 + 1 + 32 );)
|
|
|
|
* has checked that there is enough space in the output buffer for the
|
|
|
|
* session identifier length byte and the session identifier (n <= 32).
|
|
|
|
*/
|
2009-01-03 22:22:43 +01:00
|
|
|
*p++ = (unsigned char) n;
|
|
|
|
|
|
|
|
for( i = 0; i < n; i++ )
|
2012-09-16 21:57:18 +02:00
|
|
|
*p++ = ssl->session_negotiate->id[i];
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2021-01-07 15:47:05 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, session id len.: %" MBEDTLS_PRINTF_SIZET, n ) );
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "client hello, session id", buf + 39, n );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
/*
|
|
|
|
* With 'n' being the length of the session identifier
|
|
|
|
*
|
|
|
|
* 39+n . 39+n DTLS only: cookie length (1 byte)
|
|
|
|
* 40+n . .. DTLS only: cookie
|
|
|
|
* .. . .. ciphersuitelist length (2 bytes)
|
|
|
|
* .. . .. ciphersuitelist
|
|
|
|
* .. . .. compression methods length (1 byte)
|
|
|
|
* .. . .. compression methods
|
|
|
|
* .. . .. extensions length (2 bytes)
|
|
|
|
* .. . .. extensions
|
|
|
|
*/
|
|
|
|
|
2014-03-21 09:40:12 +01:00
|
|
|
/*
|
|
|
|
* DTLS cookie
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
|
2014-03-21 09:40:12 +01:00
|
|
|
{
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 1 );
|
|
|
|
|
2014-07-11 02:43:49 +02:00
|
|
|
if( ssl->handshake->verify_cookie == NULL )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "no verify cookie to send" ) );
|
2014-07-11 02:43:49 +02:00
|
|
|
*p++ = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "client hello, cookie",
|
2014-07-11 02:43:49 +02:00
|
|
|
ssl->handshake->verify_cookie,
|
|
|
|
ssl->handshake->verify_cookie_len );
|
|
|
|
|
|
|
|
*p++ = ssl->handshake->verify_cookie_len;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end,
|
|
|
|
ssl->handshake->verify_cookie_len );
|
2014-07-11 02:43:49 +02:00
|
|
|
memcpy( p, ssl->handshake->verify_cookie,
|
|
|
|
ssl->handshake->verify_cookie_len );
|
|
|
|
p += ssl->handshake->verify_cookie_len;
|
|
|
|
}
|
2014-03-21 09:40:12 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ciphersuite list
|
|
|
|
*/
|
2021-04-29 13:04:11 +02:00
|
|
|
ciphersuites = ssl->conf->ciphersuite_list;
|
2014-03-21 09:40:12 +01:00
|
|
|
|
|
|
|
/* Skip writing ciphersuite length for now */
|
2013-06-29 16:01:15 +02:00
|
|
|
n = 0;
|
|
|
|
q = p;
|
2017-04-12 15:54:42 +02:00
|
|
|
|
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
2013-06-29 16:01:15 +02:00
|
|
|
p += 2;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2013-06-29 16:01:15 +02:00
|
|
|
for( i = 0; ciphersuites[i] != 0; i++ )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( ciphersuites[i] );
|
2013-06-29 16:01:15 +02:00
|
|
|
|
2018-04-25 11:06:07 +02:00
|
|
|
if( ssl_validate_ciphersuite( ciphersuite_info, ssl,
|
|
|
|
ssl->conf->min_minor_ver,
|
|
|
|
ssl->conf->max_minor_ver ) != 0 )
|
2013-06-29 16:01:15 +02:00
|
|
|
continue;
|
|
|
|
|
2019-01-02 12:17:25 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, add ciphersuite: %#04x (%s)",
|
2020-12-09 15:55:45 +01:00
|
|
|
(unsigned int)ciphersuites[i], ciphersuite_info->name ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2018-02-14 18:30:48 +01:00
|
|
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
|
|
|
uses_ec |= mbedtls_ssl_ciphersuite_uses_ec( ciphersuite_info );
|
|
|
|
#endif
|
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
|
|
|
|
2013-06-29 16:01:15 +02:00
|
|
|
n++;
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( ciphersuites[i], p, 0 );
|
|
|
|
p += 2;
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
2021-01-07 15:47:05 +01:00
|
|
|
( "client hello, got %" MBEDTLS_PRINTF_SIZET " ciphersuites (excluding SCSVs)", n ) );
|
2017-08-28 12:55:55 +02:00
|
|
|
|
2015-01-22 11:49:41 +01:00
|
|
|
/*
|
|
|
|
* Add TLS_EMPTY_RENEGOTIATION_INFO_SCSV
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
if( ssl->renego_status == MBEDTLS_SSL_INITIAL_HANDSHAKE )
|
2015-01-22 11:49:41 +01:00
|
|
|
#endif
|
|
|
|
{
|
2017-09-10 16:03:50 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding EMPTY_RENEGOTIATION_INFO_SCSV" ) );
|
2017-04-12 15:54:42 +02:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO, p, 0 );
|
|
|
|
p += 2;
|
2015-01-22 11:49:41 +01:00
|
|
|
n++;
|
|
|
|
}
|
|
|
|
|
2013-06-29 16:01:15 +02:00
|
|
|
*q++ = (unsigned char)( n >> 7 );
|
|
|
|
*q++ = (unsigned char)( n << 1 );
|
|
|
|
|
2021-02-19 14:27:22 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress len.: %d", 1 ) );
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress alg.: %d",
|
|
|
|
MBEDTLS_SSL_COMPRESS_NULL ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2021-02-19 14:27:22 +01:00
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
|
|
|
*p++ = 1;
|
|
|
|
*p++ = MBEDTLS_SSL_COMPRESS_NULL;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
/* First write extensions, then the total length */
|
|
|
|
|
|
|
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
|
2021-11-09 05:08:32 +01:00
|
|
|
if( ( ret = mbedtls_ssl_write_hostname_ext( ssl, p + 2 + ext_len,
|
2021-11-09 10:28:25 +01:00
|
|
|
end, &olen ) ) != 0 )
|
2017-04-12 15:54:42 +02:00
|
|
|
{
|
2021-11-09 05:08:32 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_hostname_ext", ret );
|
2017-04-12 15:54:42 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
2013-03-20 16:07:17 +01:00
|
|
|
ext_len += olen;
|
2013-08-27 21:55:01 +02:00
|
|
|
#endif
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2017-10-12 15:58:55 +02:00
|
|
|
/* Note that TLS_EMPTY_RENEGOTIATION_INFO_SCSV is always added
|
|
|
|
* even if MBEDTLS_SSL_RENEGOTIATION is not defined. */
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_renegotiation_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_renegotiation_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2013-03-20 16:07:17 +01:00
|
|
|
ext_len += olen;
|
2014-11-03 08:23:14 +01:00
|
|
|
#endif
|
2012-04-11 18:11:49 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
|
2020-03-10 12:19:08 +01:00
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
2022-01-12 08:49:48 +01:00
|
|
|
if( ( ret = mbedtls_ssl_write_sig_alg_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
2017-04-12 15:54:42 +02:00
|
|
|
{
|
2022-01-12 08:49:48 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_sig_alg_ext", ret );
|
2017-04-12 15:54:42 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
2013-03-20 16:07:17 +01:00
|
|
|
ext_len += olen;
|
2013-08-27 21:19:20 +02:00
|
|
|
#endif
|
2012-04-11 18:11:49 +02:00
|
|
|
|
2015-09-15 10:53:51 +02:00
|
|
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
2015-10-06 18:11:18 +02:00
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
2018-02-14 18:30:48 +01:00
|
|
|
if( uses_ec )
|
|
|
|
{
|
2021-12-20 15:27:58 +01:00
|
|
|
if( ( ret = mbedtls_ssl_write_supported_groups_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
2017-04-12 15:54:42 +02:00
|
|
|
{
|
2021-12-20 10:34:40 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_supported_groups_ext", ret );
|
2017-04-12 15:54:42 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
2018-02-14 18:30:48 +01:00
|
|
|
ext_len += olen;
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_supported_point_formats_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_supported_point_formats_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2018-02-14 18:30:48 +01:00
|
|
|
ext_len += olen;
|
|
|
|
}
|
2013-03-20 14:39:14 +01:00
|
|
|
#endif
|
|
|
|
|
2015-09-16 10:05:04 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_ecjpake_kkpp_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_ecjpake_kkpp_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2015-09-15 16:55:05 +02:00
|
|
|
ext_len += olen;
|
|
|
|
#endif
|
|
|
|
|
2019-05-15 15:03:01 +02:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_cid_ext( ssl, p + 2 + ext_len, end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_cid_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2019-04-25 17:55:15 +02:00
|
|
|
ext_len += olen;
|
2019-05-15 15:03:01 +02:00
|
|
|
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
|
2019-04-25 17:55:15 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_max_fragment_length_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_max_fragment_length_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2013-07-16 17:26:28 +02:00
|
|
|
ext_len += olen;
|
2013-08-15 13:33:48 +02:00
|
|
|
#endif
|
2013-07-16 17:26:28 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_encrypt_then_mac_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_encrypt_then_mac_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2014-10-27 13:57:03 +01:00
|
|
|
ext_len += olen;
|
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_extended_ms_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_extended_ms_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2014-10-20 18:40:56 +02:00
|
|
|
ext_len += olen;
|
|
|
|
#endif
|
|
|
|
|
2015-09-29 02:06:06 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ALPN)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_alpn_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_alpn_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2013-08-02 14:44:54 +02:00
|
|
|
ext_len += olen;
|
2013-08-14 13:48:06 +02:00
|
|
|
#endif
|
2013-08-02 14:44:54 +02:00
|
|
|
|
2015-12-03 21:56:45 +01:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_SRTP)
|
2020-10-28 17:18:18 +01:00
|
|
|
if( ( ret = ssl_write_use_srtp_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
2017-12-21 09:15:08 +01:00
|
|
|
{
|
2020-10-28 17:18:18 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_use_srtp_ext", ret );
|
|
|
|
return( ret );
|
2017-12-21 09:15:08 +01:00
|
|
|
}
|
2020-10-28 17:18:18 +01:00
|
|
|
ext_len += olen;
|
2015-12-03 21:56:45 +01:00
|
|
|
#endif
|
|
|
|
|
2015-09-29 02:06:06 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
2017-04-12 15:54:42 +02:00
|
|
|
if( ( ret = ssl_write_session_ticket_ext( ssl, p + 2 + ext_len,
|
|
|
|
end, &olen ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_session_ticket_ext", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2014-04-07 10:57:45 +02:00
|
|
|
ext_len += olen;
|
|
|
|
#endif
|
|
|
|
|
2014-11-06 02:38:02 +01:00
|
|
|
/* olen unused if all extensions are disabled */
|
|
|
|
((void) olen);
|
|
|
|
|
2021-01-07 15:47:05 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, total extension length: %" MBEDTLS_PRINTF_SIZET,
|
2017-04-12 15:54:42 +02:00
|
|
|
ext_len ) );
|
2012-04-11 18:11:49 +02:00
|
|
|
|
2014-04-30 10:15:38 +02:00
|
|
|
if( ext_len > 0 )
|
|
|
|
{
|
2017-04-12 15:54:42 +02:00
|
|
|
/* No need to check for space here, because the extension
|
|
|
|
* writing functions already took care of that. */
|
2021-08-20 12:44:44 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( ext_len, p, 0 );
|
2021-08-20 17:20:44 +02:00
|
|
|
p += 2 + ext_len;
|
2014-04-30 10:15:38 +02:00
|
|
|
}
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2009-01-03 22:22:43 +01:00
|
|
|
ssl->out_msglen = p - buf;
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
|
|
|
|
ssl->out_msg[0] = MBEDTLS_SSL_HS_CLIENT_HELLO;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
ssl->state++;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_ssl_send_flight_completed( ssl );
|
2014-09-29 15:29:48 +02:00
|
|
|
#endif
|
|
|
|
|
2017-09-13 09:38:11 +02:00
|
|
|
if( ( ret = mbedtls_ssl_write_handshake_msg( ssl ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2017-09-13 09:38:11 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_handshake_msg", ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2017-09-13 12:45:21 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
|
|
|
if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM &&
|
|
|
|
( ret = mbedtls_ssl_flight_transmit( ssl ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_flight_transmit", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2018-08-28 11:13:29 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_DTLS */
|
2017-09-13 12:45:21 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write client hello" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_renegotiation_info( mbedtls_ssl_context *ssl,
|
2013-07-19 12:47:00 +02:00
|
|
|
const unsigned char *buf,
|
2012-09-16 21:57:18 +02:00
|
|
|
size_t len )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
if( ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE )
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2014-11-03 08:23:14 +01:00
|
|
|
/* Check verify-data in constant-time. The length OTOH is no secret */
|
|
|
|
if( len != 1 + ssl->verify_data_len * 2 ||
|
|
|
|
buf[0] != ssl->verify_data_len * 2 ||
|
2021-10-20 11:59:27 +02:00
|
|
|
mbedtls_ct_memcmp( buf + 1,
|
2014-11-03 08:23:14 +01:00
|
|
|
ssl->own_verify_data, ssl->verify_data_len ) != 0 ||
|
2021-10-20 11:59:27 +02:00
|
|
|
mbedtls_ct_memcmp( buf + 1 + ssl->verify_data_len,
|
2014-11-03 08:23:14 +01:00
|
|
|
ssl->peer_verify_data, ssl->verify_data_len ) != 0 )
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-matching renegotiation info" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2021-06-28 22:49:15 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2014-11-03 08:23:14 +01:00
|
|
|
if( len != 1 || buf[0] != 0x00 )
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2020-06-11 09:34:06 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "non-zero length renegotiation info" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2021-06-28 22:49:15 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
2014-11-03 08:23:14 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->secure_renegotiation = MBEDTLS_SSL_SECURE_RENEGOTIATION;
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2013-07-19 11:41:43 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
|
|
|
static int ssl_parse_max_fragment_length_ext( mbedtls_ssl_context *ssl,
|
2013-07-19 12:47:00 +02:00
|
|
|
const unsigned char *buf,
|
2013-07-17 10:14:38 +02:00
|
|
|
size_t len )
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* server should use the extension only if we did,
|
|
|
|
* and if so the server's value should match ours (and len is always 1)
|
|
|
|
*/
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->mfl_code == MBEDTLS_SSL_MAX_FRAG_LEN_NONE ||
|
2013-07-17 10:14:38 +02:00
|
|
|
len != 1 ||
|
2015-05-04 10:55:58 +02:00
|
|
|
buf[0] != ssl->conf->mfl_code )
|
2013-07-17 10:14:38 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "non-matching max fragment length extension" ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-24 12:09:00 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2013-07-17 10:14:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
|
2012-09-16 21:57:18 +02:00
|
|
|
|
2019-05-15 15:03:01 +02:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
|
2019-04-26 16:37:26 +02:00
|
|
|
static int ssl_parse_cid_ext( mbedtls_ssl_context *ssl,
|
|
|
|
const unsigned char *buf,
|
|
|
|
size_t len )
|
|
|
|
{
|
|
|
|
size_t peer_cid_len;
|
|
|
|
|
|
|
|
if( /* CID extension only makes sense in DTLS */
|
|
|
|
ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ||
|
|
|
|
/* The server must only send the CID extension if we have offered it. */
|
2019-05-03 13:46:59 +02:00
|
|
|
ssl->negotiate_cid == MBEDTLS_SSL_CID_DISABLED )
|
2019-04-26 16:37:26 +02:00
|
|
|
{
|
2019-05-03 13:46:59 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension unexpected" ) );
|
2019-04-26 16:37:26 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-28 22:49:15 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
|
2021-06-29 11:02:06 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION );
|
2019-05-03 13:46:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if( len == 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension invalid" ) );
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-24 12:09:00 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2019-04-26 16:37:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
peer_cid_len = *buf++;
|
|
|
|
len--;
|
|
|
|
|
|
|
|
if( peer_cid_len > MBEDTLS_SSL_CID_OUT_LEN_MAX )
|
|
|
|
{
|
2019-05-03 13:46:59 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension invalid" ) );
|
2019-04-26 16:37:26 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-24 12:09:00 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2019-04-26 16:37:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if( len != peer_cid_len )
|
|
|
|
{
|
2019-05-03 13:46:59 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension invalid" ) );
|
2019-04-26 16:37:26 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-24 12:09:00 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2019-04-26 16:37:26 +02:00
|
|
|
}
|
|
|
|
|
2019-05-03 13:47:49 +02:00
|
|
|
ssl->handshake->cid_in_use = MBEDTLS_SSL_CID_ENABLED;
|
2019-04-26 16:37:26 +02:00
|
|
|
ssl->handshake->peer_cid_len = (uint8_t) peer_cid_len;
|
|
|
|
memcpy( ssl->handshake->peer_cid, buf, peer_cid_len );
|
|
|
|
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "Use of CID extension negotiated" ) );
|
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "Server CID", buf, peer_cid_len );
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2019-05-15 15:03:01 +02:00
|
|
|
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
|
2019-04-26 16:37:26 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
|
|
|
|
static int ssl_parse_encrypt_then_mac_ext( mbedtls_ssl_context *ssl,
|
2014-10-27 13:57:03 +01:00
|
|
|
const unsigned char *buf,
|
|
|
|
size_t len )
|
|
|
|
{
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->encrypt_then_mac == MBEDTLS_SSL_ETM_DISABLED ||
|
2014-10-27 13:57:03 +01:00
|
|
|
len != 0 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "non-matching encrypt-then-MAC extension" ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-28 22:49:15 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
|
2021-06-29 11:02:06 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION );
|
2014-10-27 13:57:03 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
((void) buf);
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->session_negotiate->encrypt_then_mac = MBEDTLS_SSL_ETM_ENABLED;
|
2014-10-27 13:57:03 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
|
2014-10-27 13:57:03 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
|
|
|
|
static int ssl_parse_extended_ms_ext( mbedtls_ssl_context *ssl,
|
2014-10-20 18:40:56 +02:00
|
|
|
const unsigned char *buf,
|
|
|
|
size_t len )
|
|
|
|
{
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->extended_ms == MBEDTLS_SSL_EXTENDED_MS_DISABLED ||
|
2014-10-20 18:40:56 +02:00
|
|
|
len != 0 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "non-matching extended master secret extension" ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-29 13:06:32 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
|
|
|
|
return( MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION );
|
2014-10-20 18:40:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
((void) buf);
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->handshake->extended_ms = MBEDTLS_SSL_EXTENDED_MS_ENABLED;
|
2014-10-20 18:40:56 +02:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
|
2014-10-20 18:40:56 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
|
|
|
static int ssl_parse_session_ticket_ext( mbedtls_ssl_context *ssl,
|
2013-08-02 14:44:54 +02:00
|
|
|
const unsigned char *buf,
|
|
|
|
size_t len )
|
|
|
|
{
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->session_tickets == MBEDTLS_SSL_SESSION_TICKETS_DISABLED ||
|
2013-08-03 13:02:31 +02:00
|
|
|
len != 0 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "non-matching session ticket extension" ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-29 13:06:32 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
|
|
|
|
return( MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION );
|
2013-08-03 13:02:31 +02:00
|
|
|
}
|
2013-08-02 14:44:54 +02:00
|
|
|
|
|
|
|
((void) buf);
|
2013-07-31 12:58:16 +02:00
|
|
|
|
|
|
|
ssl->handshake->new_session_ticket = 1;
|
2013-08-02 14:44:54 +02:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_SESSION_TICKETS */
|
2013-08-02 14:44:54 +02:00
|
|
|
|
2015-10-02 14:34:31 +02:00
|
|
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
2015-10-06 18:11:18 +02:00
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_supported_point_formats_ext( mbedtls_ssl_context *ssl,
|
2013-08-15 18:01:11 +02:00
|
|
|
const unsigned char *buf,
|
|
|
|
size_t len )
|
|
|
|
{
|
|
|
|
size_t list_size;
|
|
|
|
const unsigned char *p;
|
|
|
|
|
2018-05-30 09:13:21 +02:00
|
|
|
if( len == 0 || (size_t)( buf[0] + 1 ) != len )
|
2013-08-15 18:01:11 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2013-08-15 18:01:11 +02:00
|
|
|
}
|
2018-05-30 09:13:21 +02:00
|
|
|
list_size = buf[0];
|
2013-08-15 18:01:11 +02:00
|
|
|
|
2014-06-23 14:10:13 +02:00
|
|
|
p = buf + 1;
|
2013-08-15 18:01:11 +02:00
|
|
|
while( list_size > 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
if( p[0] == MBEDTLS_ECP_PF_UNCOMPRESSED ||
|
|
|
|
p[0] == MBEDTLS_ECP_PF_COMPRESSED )
|
2013-08-15 18:01:11 +02:00
|
|
|
{
|
2015-10-02 14:34:31 +02:00
|
|
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
|
2013-08-15 19:04:02 +02:00
|
|
|
ssl->handshake->ecdh_ctx.point_format = p[0];
|
2017-05-10 10:46:40 +02:00
|
|
|
#endif
|
2015-10-06 18:11:18 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
2021-05-27 23:17:34 +02:00
|
|
|
mbedtls_ecjpake_set_point_format( &ssl->handshake->ecjpake_ctx,
|
|
|
|
p[0] );
|
2015-10-02 14:34:31 +02:00
|
|
|
#endif
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 4, ( "point format selected: %d", p[0] ) );
|
2013-08-15 18:01:11 +02:00
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
|
|
|
list_size--;
|
|
|
|
p++;
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "no point format in common" ) );
|
2017-05-10 16:37:56 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2013-08-15 18:01:11 +02:00
|
|
|
}
|
2018-03-13 16:22:58 +01:00
|
|
|
#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
|
2015-10-06 18:11:18 +02:00
|
|
|
MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
2013-08-15 18:01:11 +02:00
|
|
|
|
2015-09-16 16:01:00 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
|
|
|
static int ssl_parse_ecjpake_kkpp( mbedtls_ssl_context *ssl,
|
|
|
|
const unsigned char *buf,
|
|
|
|
size_t len )
|
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-09-16 16:01:00 +02:00
|
|
|
|
2017-12-27 22:34:08 +01:00
|
|
|
if( ssl->handshake->ciphersuite_info->key_exchange !=
|
2015-09-16 16:01:00 +02:00
|
|
|
MBEDTLS_KEY_EXCHANGE_ECJPAKE )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "skip ecjpake kkpp extension" ) );
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-09-17 14:16:30 +02:00
|
|
|
/* If we got here, we no longer need our cached extension */
|
|
|
|
mbedtls_free( ssl->handshake->ecjpake_cache );
|
|
|
|
ssl->handshake->ecjpake_cache = NULL;
|
|
|
|
ssl->handshake->ecjpake_cache_len = 0;
|
|
|
|
|
2015-09-16 16:01:00 +02:00
|
|
|
if( ( ret = mbedtls_ecjpake_read_round_one( &ssl->handshake->ecjpake_ctx,
|
|
|
|
buf, len ) ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_read_round_one", ret );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2015-09-16 16:01:00 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
2013-08-15 18:01:11 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ALPN)
|
|
|
|
static int ssl_parse_alpn_ext( mbedtls_ssl_context *ssl,
|
2014-04-07 10:57:45 +02:00
|
|
|
const unsigned char *buf, size_t len )
|
|
|
|
{
|
|
|
|
size_t list_len, name_len;
|
|
|
|
const char **p;
|
|
|
|
|
|
|
|
/* If we didn't send it, the server shouldn't send it */
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->alpn_list == NULL )
|
2017-05-03 16:28:34 +02:00
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-matching ALPN extension" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-29 13:06:32 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
|
|
|
|
return( MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION );
|
2017-05-03 16:28:34 +02:00
|
|
|
}
|
2014-04-07 10:57:45 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* opaque ProtocolName<1..2^8-1>;
|
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* ProtocolName protocol_name_list<2..2^16-1>
|
|
|
|
* } ProtocolNameList;
|
|
|
|
*
|
|
|
|
* the "ProtocolNameList" MUST contain exactly one "ProtocolName"
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Min length is 2 (list_len) + 1 (name_len) + 1 (name) */
|
|
|
|
if( len < 4 )
|
2017-05-03 16:28:34 +02:00
|
|
|
{
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2017-05-03 16:28:34 +02:00
|
|
|
}
|
2014-04-07 10:57:45 +02:00
|
|
|
|
|
|
|
list_len = ( buf[0] << 8 ) | buf[1];
|
|
|
|
if( list_len != len - 2 )
|
2017-05-03 16:28:34 +02:00
|
|
|
{
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2017-05-03 16:28:34 +02:00
|
|
|
}
|
2014-04-07 10:57:45 +02:00
|
|
|
|
|
|
|
name_len = buf[2];
|
|
|
|
if( name_len != list_len - 1 )
|
2017-05-03 16:28:34 +02:00
|
|
|
{
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2017-05-03 16:28:34 +02:00
|
|
|
}
|
2014-04-07 10:57:45 +02:00
|
|
|
|
|
|
|
/* Check that the server chosen protocol was in our list and save it */
|
2015-05-04 10:55:58 +02:00
|
|
|
for( p = ssl->conf->alpn_list; *p != NULL; p++ )
|
2014-04-07 10:57:45 +02:00
|
|
|
{
|
|
|
|
if( name_len == strlen( *p ) &&
|
|
|
|
memcmp( buf + 3, *p, name_len ) == 0 )
|
|
|
|
{
|
|
|
|
ssl->alpn_chosen = *p;
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-03 16:28:34 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "ALPN extension: no matching protocol" ) );
|
2017-05-10 16:37:56 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2014-04-07 10:57:45 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_ALPN */
|
2014-04-07 10:57:45 +02:00
|
|
|
|
2015-12-03 21:56:45 +01:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_SRTP)
|
|
|
|
static int ssl_parse_use_srtp_ext( mbedtls_ssl_context *ssl,
|
2018-07-12 10:54:20 +02:00
|
|
|
const unsigned char *buf,
|
|
|
|
size_t len )
|
2015-12-03 21:56:45 +01:00
|
|
|
{
|
2020-09-22 12:25:52 +02:00
|
|
|
mbedtls_ssl_srtp_profile server_protection = MBEDTLS_TLS_SRTP_UNSET;
|
2018-01-22 11:30:04 +01:00
|
|
|
size_t i, mki_len = 0;
|
2015-12-03 21:56:45 +01:00
|
|
|
uint16_t server_protection_profile_value = 0;
|
|
|
|
|
|
|
|
/* If use_srtp is not configured, just ignore the extension */
|
2020-10-28 17:18:18 +01:00
|
|
|
if( ( ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ) ||
|
|
|
|
( ssl->conf->dtls_srtp_profile_list == NULL ) ||
|
|
|
|
( ssl->conf->dtls_srtp_profile_list_len == 0 ) )
|
2015-12-03 21:56:45 +01:00
|
|
|
return( 0 );
|
|
|
|
|
2018-12-05 10:04:31 +01:00
|
|
|
/* RFC 5764 section 4.1.1
|
2015-12-03 21:56:45 +01:00
|
|
|
* uint8 SRTPProtectionProfile[2];
|
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* SRTPProtectionProfiles SRTPProtectionProfiles;
|
|
|
|
* opaque srtp_mki<0..255>;
|
|
|
|
* } UseSRTPData;
|
|
|
|
|
|
|
|
* SRTPProtectionProfile SRTPProtectionProfiles<2..2^16-1>;
|
|
|
|
*
|
|
|
|
*/
|
2020-09-22 15:15:19 +02:00
|
|
|
if( ssl->conf->dtls_srtp_mki_support == MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED )
|
2018-01-22 11:30:04 +01:00
|
|
|
{
|
|
|
|
mki_len = ssl->dtls_srtp_info.mki_len;
|
|
|
|
}
|
2015-12-03 21:56:45 +01:00
|
|
|
|
2018-07-12 10:54:20 +02:00
|
|
|
/*
|
2020-10-22 23:31:00 +02:00
|
|
|
* Length is 5 + optional mki_value : one protection profile length (2 bytes)
|
|
|
|
* + protection profile (2 bytes)
|
|
|
|
* + mki_len(1 byte)
|
2018-12-10 13:56:21 +01:00
|
|
|
* and optional srtp_mki
|
2018-07-12 10:54:20 +02:00
|
|
|
*/
|
2020-10-26 21:24:25 +01:00
|
|
|
if( ( len < 5 ) || ( len != ( buf[4] + 5u ) ) )
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2015-12-03 21:56:45 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* get the server protection profile
|
|
|
|
*/
|
2018-07-12 10:54:20 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* protection profile length must be 0x0002 as we must have only
|
|
|
|
* one protection profile in server Hello
|
|
|
|
*/
|
2018-12-06 16:12:49 +01:00
|
|
|
if( ( buf[0] != 0 ) || ( buf[1] != 2 ) )
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2018-12-06 16:12:49 +01:00
|
|
|
|
|
|
|
server_protection_profile_value = ( buf[2] << 8 ) | buf[3];
|
2020-09-22 12:25:52 +02:00
|
|
|
server_protection = mbedtls_ssl_check_srtp_profile_value(
|
|
|
|
server_protection_profile_value );
|
|
|
|
if( server_protection != MBEDTLS_TLS_SRTP_UNSET )
|
2018-07-12 10:54:20 +02:00
|
|
|
{
|
2020-09-22 12:25:52 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found srtp profile: %s",
|
|
|
|
mbedtls_ssl_get_srtp_profile_as_string(
|
|
|
|
server_protection ) ) );
|
2015-12-03 21:56:45 +01:00
|
|
|
}
|
|
|
|
|
2020-09-22 12:25:52 +02:00
|
|
|
ssl->dtls_srtp_info.chosen_dtls_srtp_profile = MBEDTLS_TLS_SRTP_UNSET;
|
2018-01-22 11:30:04 +01:00
|
|
|
|
2015-12-03 21:56:45 +01:00
|
|
|
/*
|
|
|
|
* Check we have the server profile in our list
|
|
|
|
*/
|
2017-12-21 09:15:08 +01:00
|
|
|
for( i=0; i < ssl->conf->dtls_srtp_profile_list_len; i++)
|
2015-12-03 21:56:45 +01:00
|
|
|
{
|
2020-10-28 17:05:47 +01:00
|
|
|
if( server_protection == ssl->conf->dtls_srtp_profile_list[i] )
|
|
|
|
{
|
2017-12-21 09:15:08 +01:00
|
|
|
ssl->dtls_srtp_info.chosen_dtls_srtp_profile = ssl->conf->dtls_srtp_profile_list[i];
|
2020-09-22 12:25:52 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "selected srtp profile: %s",
|
|
|
|
mbedtls_ssl_get_srtp_profile_as_string(
|
|
|
|
server_protection ) ) );
|
2018-01-22 11:30:04 +01:00
|
|
|
break;
|
2015-12-03 21:56:45 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-22 11:30:04 +01:00
|
|
|
/* If no match was found : server problem, it shall never answer with incompatible profile */
|
2020-09-22 12:25:52 +02:00
|
|
|
if( ssl->dtls_srtp_info.chosen_dtls_srtp_profile == MBEDTLS_TLS_SRTP_UNSET )
|
2018-01-22 11:30:04 +01:00
|
|
|
{
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2018-07-12 10:54:20 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2018-01-22 11:30:04 +01:00
|
|
|
}
|
2020-10-26 22:45:58 +01:00
|
|
|
|
|
|
|
/* If server does not use mki in its reply, make sure the client won't keep
|
|
|
|
* one as negotiated */
|
|
|
|
if( len == 5 )
|
|
|
|
{
|
|
|
|
ssl->dtls_srtp_info.mki_len = 0;
|
|
|
|
}
|
|
|
|
|
2018-07-12 10:54:20 +02:00
|
|
|
/*
|
|
|
|
* RFC5764:
|
2018-01-22 11:30:04 +01:00
|
|
|
* If the client detects a nonzero-length MKI in the server's response
|
|
|
|
* that is different than the one the client offered, then the client
|
|
|
|
* MUST abort the handshake and SHOULD send an invalid_parameter alert.
|
|
|
|
*/
|
2018-12-10 13:56:21 +01:00
|
|
|
if( len > 5 && ( buf[4] != mki_len ||
|
|
|
|
( memcmp( ssl->dtls_srtp_info.mki_value, &buf[5], mki_len ) ) ) )
|
2018-01-22 11:30:04 +01:00
|
|
|
{
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2018-01-22 11:30:04 +01:00
|
|
|
}
|
2018-07-05 17:25:39 +02:00
|
|
|
#if defined (MBEDTLS_DEBUG_C)
|
2018-07-12 10:54:20 +02:00
|
|
|
if( len > 5 )
|
2018-07-05 17:25:39 +02:00
|
|
|
{
|
2018-12-05 10:04:31 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "received mki", ssl->dtls_srtp_info.mki_value,
|
|
|
|
ssl->dtls_srtp_info.mki_len );
|
2018-07-05 17:25:39 +02:00
|
|
|
}
|
|
|
|
#endif
|
2018-12-05 10:04:31 +01:00
|
|
|
return( 0 );
|
2015-12-03 21:56:45 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_SSL_DTLS_SRTP */
|
|
|
|
|
2014-07-11 02:43:49 +02:00
|
|
|
/*
|
|
|
|
* Parse HelloVerifyRequest. Only called after verifying the HS type.
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
|
|
|
static int ssl_parse_hello_verify_request( mbedtls_ssl_context *ssl )
|
2014-07-11 02:43:49 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
const unsigned char *p = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
|
2014-07-11 02:43:49 +02:00
|
|
|
int major_ver, minor_ver;
|
|
|
|
unsigned char cookie_len;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse hello verify request" ) );
|
2014-07-11 02:43:49 +02:00
|
|
|
|
2019-09-27 14:02:44 +02:00
|
|
|
/* Check that there is enough room for:
|
|
|
|
* - 2 bytes of version
|
|
|
|
* - 1 byte of cookie_len
|
|
|
|
*/
|
|
|
|
if( mbedtls_ssl_hs_hdr_len( ssl ) + 3 > ssl->in_msglen )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "incoming HelloVerifyRequest message is too short" ) );
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2019-09-27 14:02:44 +02:00
|
|
|
}
|
|
|
|
|
2014-07-11 02:43:49 +02:00
|
|
|
/*
|
|
|
|
* struct {
|
|
|
|
* ProtocolVersion server_version;
|
|
|
|
* opaque cookie<0..2^8-1>;
|
|
|
|
* } HelloVerifyRequest;
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "server version", p, 2 );
|
2015-05-04 10:55:58 +02:00
|
|
|
mbedtls_ssl_read_version( &major_ver, &minor_ver, ssl->conf->transport, p );
|
2014-07-11 02:43:49 +02:00
|
|
|
p += 2;
|
|
|
|
|
2021-05-13 19:14:19 +02:00
|
|
|
/*
|
|
|
|
* Since the RFC is not clear on this point, accept DTLS 1.0 (TLS 1.1)
|
|
|
|
* even is lower than our min version.
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
if( major_ver < MBEDTLS_SSL_MAJOR_VERSION_3 ||
|
2021-05-13 17:11:23 +02:00
|
|
|
minor_ver < MBEDTLS_SSL_MINOR_VERSION_2 ||
|
2015-05-04 10:55:58 +02:00
|
|
|
major_ver > ssl->conf->max_major_ver ||
|
|
|
|
minor_ver > ssl->conf->max_minor_ver )
|
2014-07-11 02:43:49 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server version" ) );
|
2014-07-11 02:43:49 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION );
|
2014-07-11 02:43:49 +02:00
|
|
|
|
2021-06-24 10:18:19 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION );
|
2014-07-11 02:43:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
cookie_len = *p++;
|
2016-09-26 15:53:05 +02:00
|
|
|
if( ( ssl->in_msg + ssl->in_msglen ) - p < cookie_len )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "cookie length does not match incoming message size" ) );
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2016-09-26 15:53:05 +02:00
|
|
|
}
|
2019-09-27 14:00:36 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "cookie", p, cookie_len );
|
2016-09-26 15:53:05 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_free( ssl->handshake->verify_cookie );
|
2014-07-11 02:43:49 +02:00
|
|
|
|
2015-05-26 16:04:06 +02:00
|
|
|
ssl->handshake->verify_cookie = mbedtls_calloc( 1, cookie_len );
|
2014-07-11 02:43:49 +02:00
|
|
|
if( ssl->handshake->verify_cookie == NULL )
|
|
|
|
{
|
2015-05-27 16:29:56 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc failed (%d bytes)", cookie_len ) );
|
2015-05-28 09:33:39 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
|
2014-07-11 02:43:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
memcpy( ssl->handshake->verify_cookie, p, cookie_len );
|
|
|
|
ssl->handshake->verify_cookie_len = cookie_len;
|
|
|
|
|
2014-07-11 13:45:34 +02:00
|
|
|
/* Start over at ClientHello */
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->state = MBEDTLS_SSL_CLIENT_HELLO;
|
|
|
|
mbedtls_ssl_reset_checksum( ssl );
|
2014-07-11 02:43:49 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_ssl_recv_flight_completed( ssl );
|
2014-09-19 15:09:21 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse hello verify request" ) );
|
2014-07-11 02:43:49 +02:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_DTLS */
|
2014-07-11 02:43:49 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_server_hello( mbedtls_ssl_context *ssl )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2014-07-14 17:38:41 +02:00
|
|
|
int ret, i;
|
2011-04-24 10:57:21 +02:00
|
|
|
size_t n;
|
2014-10-17 17:02:10 +02:00
|
|
|
size_t ext_len;
|
2012-09-16 21:57:18 +02:00
|
|
|
unsigned char *buf, *ext;
|
2015-06-24 22:28:19 +02:00
|
|
|
unsigned char comp;
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
2012-09-16 21:57:18 +02:00
|
|
|
int renegotiation_info_seen = 0;
|
2014-11-06 02:38:02 +01:00
|
|
|
#endif
|
2012-09-17 11:18:12 +02:00
|
|
|
int handshake_failure = 0;
|
2015-04-08 12:49:31 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *suite_info;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2018-08-15 14:56:18 +02:00
|
|
|
if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2017-05-03 16:28:34 +02:00
|
|
|
/* No alert on a read error. */
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2019-05-08 10:38:41 +02:00
|
|
|
buf = ssl->in_msg;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS )
|
2014-08-19 12:50:30 +02:00
|
|
|
{
|
2014-08-19 13:58:40 +02:00
|
|
|
ssl->renego_records_seen++;
|
|
|
|
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->renego_max_records >= 0 &&
|
|
|
|
ssl->renego_records_seen > ssl->conf->renego_max_records )
|
2014-08-19 13:58:40 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "renegotiation requested, but not honored by server" ) );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
|
2014-08-19 13:58:40 +02:00
|
|
|
}
|
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "non-handshake message during renegotiation" ) );
|
2017-05-24 10:16:26 +02:00
|
|
|
|
|
|
|
ssl->keep_current_message = 1;
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO );
|
2014-08-19 12:50:30 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
2014-08-19 12:50:30 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
|
2014-07-11 02:43:49 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
if( buf[0] == MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST )
|
2014-07-11 02:43:49 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "received hello verify request" ) );
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello" ) );
|
2014-07-11 02:43:49 +02:00
|
|
|
return( ssl_parse_hello_verify_request( ssl ) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* We made it through the verification process */
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_free( ssl->handshake->verify_cookie );
|
2014-07-11 02:43:49 +02:00
|
|
|
ssl->handshake->verify_cookie = NULL;
|
|
|
|
ssl->handshake->verify_cookie_len = 0;
|
|
|
|
}
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_DTLS */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->in_hslen < 38 + mbedtls_ssl_hs_hdr_len( ssl ) ||
|
|
|
|
buf[0] != MBEDTLS_SSL_HS_SERVER_HELLO )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2014-09-10 21:23:41 +02:00
|
|
|
/*
|
|
|
|
* 0 . 1 server_version
|
|
|
|
* 2 . 33 random (maybe including 4 bytes of Unix time)
|
|
|
|
* 34 . 34 session_id length = n
|
|
|
|
* 35 . 34+n session_id
|
|
|
|
* 35+n . 36+n cipher_suite
|
|
|
|
* 37+n . 37+n compression_method
|
|
|
|
*
|
|
|
|
* 38+n . 39+n extensions length (optional)
|
|
|
|
* 40+n . .. extensions
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
buf += mbedtls_ssl_hs_hdr_len( ssl );
|
2014-09-10 21:23:41 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, version", buf + 0, 2 );
|
|
|
|
mbedtls_ssl_read_version( &ssl->major_ver, &ssl->minor_ver,
|
2015-05-04 10:55:58 +02:00
|
|
|
ssl->conf->transport, buf + 0 );
|
Store TLS version in SSL session structure
Instances of `mbedtls_ssl_session` represent data enabling session resumption.
With the introduction of TLS 1.3, the format of this data changes. We therefore
need TLS-version field as part of `mbedtlsl_ssl_session` which allows distinguish
1.2 and 1.3 sessions.
This commit introduces such a TLS-version field to mbedtls_ssl_session.
The change has a few ramifications:
- Session serialization/deserialization routines need to be adjusted.
This is achieved by adding the TLS-version after the header of
Mbed TLS version+config, and by having the subsequent structure
of the serialized data depend on the value of this field.
The details are described in terms of the RFC 8446 presentation language.
The 1.2 session (de)serialization are moved into static helper functions,
while the top-level session (de)serialization only parses the Mbed TLS
version+config header and the TLS-version field, and dispatches according
to the found version.
This way, it will be easy to add support for TLS 1.3 sessions in the future.
- Tests for session serialization need to be adjusted
- Once we add support for TLS 1.3, with runtime negotiation of 1.2 vs. 1.3,
we will need to have some logic comparing the TLS version of the proposed session
to the negotiated TLS version. For now, however, we only support TLS 1.2,
and no such logic is needed. Instead, we just store the TLS version in the
session structure at the same point when we populate mbedtls_ssl_context.minor_ver.
The change introduces some overlap between `mbedtls_ssl_session.minor_ver` and
`mbedtls_ssl_context.minor_ver`, which should be studied and potentially resolved.
However, with both fields being private and explicitly marked so, this can happen
in a later change.
Signed-off-by: Hanno Becker <hanno.becker@arm.com>
2021-07-23 07:25:48 +02:00
|
|
|
ssl->session_negotiate->minor_ver = ssl->minor_ver;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->major_ver < ssl->conf->min_major_ver ||
|
|
|
|
ssl->minor_ver < ssl->conf->min_minor_ver ||
|
|
|
|
ssl->major_ver > ssl->conf->max_major_ver ||
|
|
|
|
ssl->minor_ver > ssl->conf->max_minor_ver )
|
2012-09-28 15:28:45 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "server version out of bounds - min: [%d:%d], server: [%d:%d], max: [%d:%d]",
|
|
|
|
ssl->conf->min_major_ver,
|
|
|
|
ssl->conf->min_minor_ver,
|
|
|
|
ssl->major_ver, ssl->minor_ver,
|
|
|
|
ssl->conf->max_major_ver,
|
|
|
|
ssl->conf->max_minor_ver ) );
|
2012-09-28 15:28:45 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION );
|
2012-09-28 15:28:45 +02:00
|
|
|
|
2021-06-24 10:18:19 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION );
|
2012-09-28 15:28:45 +02:00
|
|
|
}
|
|
|
|
|
2017-09-06 16:33:34 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, current time: %lu",
|
2020-12-09 15:55:45 +01:00
|
|
|
( (unsigned long) buf[2] << 24 ) |
|
|
|
|
( (unsigned long) buf[3] << 16 ) |
|
|
|
|
( (unsigned long) buf[4] << 8 ) |
|
|
|
|
( (unsigned long) buf[5] ) ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2014-09-10 21:23:41 +02:00
|
|
|
memcpy( ssl->handshake->randbytes + 32, buf + 2, 32 );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2014-09-10 21:23:41 +02:00
|
|
|
n = buf[34];
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, random bytes", buf + 2, 32 );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2012-09-16 21:57:18 +02:00
|
|
|
if( n > 32 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
|
|
|
|
2015-07-23 12:14:13 +02:00
|
|
|
if( ssl->in_hslen > mbedtls_ssl_hs_hdr_len( ssl ) + 39 + n )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2014-09-10 21:23:41 +02:00
|
|
|
ext_len = ( ( buf[38 + n] << 8 )
|
|
|
|
| ( buf[39 + n] ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2012-09-16 21:57:18 +02:00
|
|
|
if( ( ext_len > 0 && ext_len < 4 ) ||
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) + 40 + n + ext_len )
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
2015-07-23 12:14:13 +02:00
|
|
|
else if( ssl->in_hslen == mbedtls_ssl_hs_hdr_len( ssl ) + 38 + n )
|
2014-10-17 17:02:10 +02:00
|
|
|
{
|
|
|
|
ext_len = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2014-10-17 17:02:10 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2014-07-14 17:38:41 +02:00
|
|
|
/* ciphersuite (used later) */
|
2014-09-10 21:23:41 +02:00
|
|
|
i = ( buf[35 + n] << 8 ) | buf[36 + n];
|
2014-07-14 17:38:41 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Read and check compression
|
|
|
|
*/
|
2014-09-10 21:23:41 +02:00
|
|
|
comp = buf[37 + n];
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-06-24 22:28:19 +02:00
|
|
|
if( comp != MBEDTLS_SSL_COMPRESS_NULL )
|
2014-07-14 17:38:41 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "server hello, bad compression: %d", comp ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
|
2014-07-14 17:38:41 +02:00
|
|
|
}
|
|
|
|
|
2012-04-18 18:10:25 +02:00
|
|
|
/*
|
|
|
|
* Initialize update checksum functions
|
|
|
|
*/
|
2017-12-27 22:34:08 +01:00
|
|
|
ssl->handshake->ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( i );
|
|
|
|
if( ssl->handshake->ciphersuite_info == NULL )
|
2013-01-07 18:20:04 +01:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
2020-12-09 15:55:45 +01:00
|
|
|
( "ciphersuite info for %04x not found", (unsigned int)i ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
|
2013-01-07 18:20:04 +01:00
|
|
|
}
|
2012-04-18 18:10:25 +02:00
|
|
|
|
2017-12-27 22:34:08 +01:00
|
|
|
mbedtls_ssl_optimize_checksum( ssl, ssl->handshake->ciphersuite_info );
|
2014-03-10 13:25:07 +01:00
|
|
|
|
2021-01-07 15:47:05 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, session id len.: %" MBEDTLS_PRINTF_SIZET, n ) );
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, session id", buf + 35, n );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if the session can be resumed
|
|
|
|
*/
|
2014-11-03 08:23:14 +01:00
|
|
|
if( ssl->handshake->resume == 0 || n == 0 ||
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE ||
|
2014-11-03 08:23:14 +01:00
|
|
|
#endif
|
2012-09-16 21:57:18 +02:00
|
|
|
ssl->session_negotiate->ciphersuite != i ||
|
|
|
|
ssl->session_negotiate->compression != comp ||
|
2015-06-18 15:50:37 +02:00
|
|
|
ssl->session_negotiate->id_len != n ||
|
2014-09-10 21:23:41 +02:00
|
|
|
memcmp( ssl->session_negotiate->id, buf + 35, n ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
|
|
|
ssl->state++;
|
2012-09-25 23:55:46 +02:00
|
|
|
ssl->handshake->resume = 0;
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_HAVE_TIME)
|
2016-04-26 08:43:27 +02:00
|
|
|
ssl->session_negotiate->start = mbedtls_time( NULL );
|
2013-07-03 15:31:03 +02:00
|
|
|
#endif
|
2012-09-16 21:57:18 +02:00
|
|
|
ssl->session_negotiate->ciphersuite = i;
|
|
|
|
ssl->session_negotiate->compression = comp;
|
2015-06-18 15:50:37 +02:00
|
|
|
ssl->session_negotiate->id_len = n;
|
2014-09-10 21:23:41 +02:00
|
|
|
memcpy( ssl->session_negotiate->id, buf + 35, n );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->state = MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC;
|
2010-03-16 22:09:09 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_ssl_derive_keys( ssl ) ) != 0 )
|
2010-03-16 22:09:09 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_derive_keys", ret );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR );
|
2010-03-16 22:09:09 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "%s session has been resumed",
|
2012-09-25 23:55:46 +02:00
|
|
|
ssl->handshake->resume ? "a" : "no" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2020-12-17 19:42:40 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen ciphersuite: %04x", (unsigned) i ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, compress alg.: %d",
|
|
|
|
buf[37 + n] ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2018-04-25 11:06:07 +02:00
|
|
|
/*
|
|
|
|
* Perform cipher suite validation in same way as in ssl_write_client_hello.
|
2018-04-18 20:35:00 +02:00
|
|
|
*/
|
2009-01-03 22:22:43 +01:00
|
|
|
i = 0;
|
|
|
|
while( 1 )
|
|
|
|
{
|
2021-04-29 13:04:11 +02:00
|
|
|
if( ssl->conf->ciphersuite_list[i] == 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2021-04-29 13:04:11 +02:00
|
|
|
if( ssl->conf->ciphersuite_list[i++] ==
|
2013-04-15 15:09:54 +02:00
|
|
|
ssl->session_negotiate->ciphersuite )
|
|
|
|
{
|
2009-01-03 22:22:43 +01:00
|
|
|
break;
|
2013-04-15 15:09:54 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
suite_info = mbedtls_ssl_ciphersuite_from_id(
|
|
|
|
ssl->session_negotiate->ciphersuite );
|
|
|
|
if( ssl_validate_ciphersuite( suite_info, ssl, ssl->minor_ver,
|
|
|
|
ssl->minor_ver ) != 0 )
|
2018-04-18 20:35:00 +02:00
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-24 12:09:00 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2018-04-18 20:35:00 +02:00
|
|
|
}
|
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "server hello, chosen ciphersuite: %s", suite_info->name ) );
|
2018-04-18 20:35:00 +02:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2018-06-12 12:40:54 +02:00
|
|
|
if( suite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA &&
|
|
|
|
ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
|
|
|
|
{
|
|
|
|
ssl->handshake->ecrs_enabled = 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( comp != MBEDTLS_SSL_COMPRESS_NULL
|
2012-07-03 15:30:23 +02:00
|
|
|
)
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
2012-09-16 21:57:18 +02:00
|
|
|
ssl->session_negotiate->compression = comp;
|
|
|
|
|
2014-09-10 21:23:41 +02:00
|
|
|
ext = buf + 40 + n;
|
2012-09-16 21:57:18 +02:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2,
|
2021-01-07 15:47:05 +01:00
|
|
|
( "server hello, total extension length: %" MBEDTLS_PRINTF_SIZET, ext_len ) );
|
2013-07-16 17:26:28 +02:00
|
|
|
|
2012-09-16 21:57:18 +02:00
|
|
|
while( ext_len )
|
|
|
|
{
|
|
|
|
unsigned int ext_id = ( ( ext[0] << 8 )
|
|
|
|
| ( ext[1] ) );
|
|
|
|
unsigned int ext_size = ( ( ext[2] << 8 )
|
|
|
|
| ( ext[3] ) );
|
|
|
|
|
|
|
|
if( ext_size + 4 > ext_len )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
switch( ext_id )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_TLS_EXT_RENEGOTIATION_INFO:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found renegotiation extension" ) );
|
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
2012-09-16 21:57:18 +02:00
|
|
|
renegotiation_info_seen = 1;
|
2014-11-06 02:38:02 +01:00
|
|
|
#endif
|
2012-09-16 21:57:18 +02:00
|
|
|
|
2014-05-01 14:18:25 +02:00
|
|
|
if( ( ret = ssl_parse_renegotiation_info( ssl, ext + 4,
|
|
|
|
ext_size ) ) != 0 )
|
2012-09-16 21:57:18 +02:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
|
|
|
case MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH:
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "found max_fragment_length extension" ) );
|
2013-07-17 10:14:38 +02:00
|
|
|
|
|
|
|
if( ( ret = ssl_parse_max_fragment_length_ext( ssl,
|
|
|
|
ext + 4, ext_size ) ) != 0 )
|
|
|
|
{
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
|
2013-07-17 10:14:38 +02:00
|
|
|
|
2019-05-15 15:03:01 +02:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
|
2019-04-26 16:37:26 +02:00
|
|
|
case MBEDTLS_TLS_EXT_CID:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found CID extension" ) );
|
|
|
|
|
|
|
|
if( ( ret = ssl_parse_cid_ext( ssl,
|
|
|
|
ext + 4,
|
|
|
|
ext_size ) ) != 0 )
|
|
|
|
{
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2019-05-15 15:03:01 +02:00
|
|
|
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
|
2019-04-26 16:37:26 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
|
|
|
|
case MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found encrypt_then_mac extension" ) );
|
2014-10-27 13:57:03 +01:00
|
|
|
|
|
|
|
if( ( ret = ssl_parse_encrypt_then_mac_ext( ssl,
|
|
|
|
ext + 4, ext_size ) ) != 0 )
|
|
|
|
{
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
|
2014-10-27 13:57:03 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
|
|
|
|
case MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET:
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "found extended_master_secret extension" ) );
|
2014-10-20 18:40:56 +02:00
|
|
|
|
|
|
|
if( ( ret = ssl_parse_extended_ms_ext( ssl,
|
|
|
|
ext + 4, ext_size ) ) != 0 )
|
|
|
|
{
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
|
2014-10-20 18:40:56 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
|
|
|
case MBEDTLS_TLS_EXT_SESSION_TICKET:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found session_ticket extension" ) );
|
2013-08-02 14:44:54 +02:00
|
|
|
|
|
|
|
if( ( ret = ssl_parse_session_ticket_ext( ssl,
|
|
|
|
ext + 4, ext_size ) ) != 0 )
|
|
|
|
{
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_SESSION_TICKETS */
|
2013-08-02 14:44:54 +02:00
|
|
|
|
2015-10-02 14:34:31 +02:00
|
|
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
2015-10-06 18:11:18 +02:00
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS:
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "found supported_point_formats extension" ) );
|
2013-08-15 18:01:11 +02:00
|
|
|
|
|
|
|
if( ( ret = ssl_parse_supported_point_formats_ext( ssl,
|
|
|
|
ext + 4, ext_size ) ) != 0 )
|
|
|
|
{
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2015-10-06 18:11:18 +02:00
|
|
|
#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
2013-08-15 18:01:11 +02:00
|
|
|
|
2015-09-16 16:01:00 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
|
|
|
case MBEDTLS_TLS_EXT_ECJPAKE_KKPP:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found ecjpake_kkpp extension" ) );
|
|
|
|
|
|
|
|
if( ( ret = ssl_parse_ecjpake_kkpp( ssl,
|
|
|
|
ext + 4, ext_size ) ) != 0 )
|
|
|
|
{
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
2013-08-15 18:01:11 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_ALPN)
|
|
|
|
case MBEDTLS_TLS_EXT_ALPN:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found alpn extension" ) );
|
2014-04-07 10:57:45 +02:00
|
|
|
|
2020-10-27 10:43:53 +01:00
|
|
|
if( ( ret = ssl_parse_alpn_ext( ssl, ext + 4, ext_size ) ) != 0 )
|
|
|
|
return( ret );
|
2014-04-07 10:57:45 +02:00
|
|
|
|
|
|
|
break;
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_ALPN */
|
2014-04-07 10:57:45 +02:00
|
|
|
|
2015-12-03 21:56:45 +01:00
|
|
|
#if defined(MBEDTLS_SSL_DTLS_SRTP)
|
|
|
|
case MBEDTLS_TLS_EXT_USE_SRTP:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "found use_srtp extension" ) );
|
|
|
|
|
2020-10-28 17:18:18 +01:00
|
|
|
if( ( ret = ssl_parse_use_srtp_ext( ssl, ext + 4, ext_size ) ) != 0 )
|
|
|
|
return( ret );
|
2015-12-03 21:56:45 +01:00
|
|
|
|
|
|
|
break;
|
|
|
|
#endif /* MBEDTLS_SSL_DTLS_SRTP */
|
|
|
|
|
2012-09-16 21:57:18 +02:00
|
|
|
default:
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
2020-12-09 15:55:45 +01:00
|
|
|
( "unknown extension found: %u (ignoring)", ext_id ) );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ext_len -= 4 + ext_size;
|
|
|
|
ext += 4 + ext_size;
|
|
|
|
|
|
|
|
if( ext_len > 0 && ext_len < 4 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Renegotiation security checks
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->secure_renegotiation == MBEDTLS_SSL_LEGACY_RENEGOTIATION &&
|
2017-05-08 12:06:19 +02:00
|
|
|
ssl->conf->allow_legacy_renegotiation ==
|
|
|
|
MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE )
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "legacy renegotiation, breaking off handshake" ) );
|
2012-09-17 11:18:12 +02:00
|
|
|
handshake_failure = 1;
|
2013-04-16 13:15:56 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
|
|
|
else if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS &&
|
|
|
|
ssl->secure_renegotiation == MBEDTLS_SSL_SECURE_RENEGOTIATION &&
|
2012-09-17 11:18:12 +02:00
|
|
|
renegotiation_info_seen == 0 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "renegotiation_info extension missing (secure)" ) );
|
2012-09-17 11:18:12 +02:00
|
|
|
handshake_failure = 1;
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
else if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS &&
|
|
|
|
ssl->secure_renegotiation == MBEDTLS_SSL_LEGACY_RENEGOTIATION &&
|
2017-05-08 12:06:19 +02:00
|
|
|
ssl->conf->allow_legacy_renegotiation ==
|
|
|
|
MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION )
|
2012-09-16 21:57:18 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation not allowed" ) );
|
2012-09-17 11:18:12 +02:00
|
|
|
handshake_failure = 1;
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
else if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS &&
|
|
|
|
ssl->secure_renegotiation == MBEDTLS_SSL_LEGACY_RENEGOTIATION &&
|
2012-09-17 11:18:12 +02:00
|
|
|
renegotiation_info_seen == 1 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "renegotiation_info extension present (legacy)" ) );
|
2012-09-17 11:18:12 +02:00
|
|
|
handshake_failure = 1;
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
2012-09-17 11:18:12 +02:00
|
|
|
|
|
|
|
if( handshake_failure == 1 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2021-06-24 12:09:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2012-09-16 21:57:18 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
2017-05-08 12:06:19 +02:00
|
|
|
static int ssl_parse_server_dh_params( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char **p,
|
2013-04-16 13:07:56 +02:00
|
|
|
unsigned char *end )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
|
2020-12-08 22:46:11 +01:00
|
|
|
size_t dhm_actual_bitlen;
|
2013-04-16 13:07:56 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Ephemeral DH parameters:
|
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* opaque dh_p<1..2^16-1>;
|
|
|
|
* opaque dh_g<1..2^16-1>;
|
|
|
|
* opaque dh_Ys<1..2^16-1>;
|
|
|
|
* } ServerDHParams;
|
|
|
|
*/
|
2017-05-08 12:06:19 +02:00
|
|
|
if( ( ret = mbedtls_dhm_read_params( &ssl->handshake->dhm_ctx,
|
|
|
|
p, end ) ) != 0 )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 2, ( "mbedtls_dhm_read_params" ), ret );
|
2013-04-16 13:07:56 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2021-05-27 22:17:07 +02:00
|
|
|
dhm_actual_bitlen = mbedtls_dhm_get_bitlen( &ssl->handshake->dhm_ctx );
|
2020-12-08 22:46:11 +01:00
|
|
|
if( dhm_actual_bitlen < ssl->conf->dhm_min_bitlen )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2021-01-07 15:47:05 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "DHM prime too short: %" MBEDTLS_PRINTF_SIZET " < %u",
|
2020-12-08 22:46:11 +01:00
|
|
|
dhm_actual_bitlen,
|
2015-06-11 14:49:42 +02:00
|
|
|
ssl->conf->dhm_min_bitlen ) );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2013-04-16 13:07:56 +02:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: P ", &ssl->handshake->dhm_ctx.P );
|
|
|
|
MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: G ", &ssl->handshake->dhm_ctx.G );
|
|
|
|
MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: GY", &ssl->handshake->dhm_ctx.GY );
|
2013-04-16 13:07:56 +02:00
|
|
|
|
|
|
|
return( ret );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
|
|
static int ssl_check_server_ecdh_params( const mbedtls_ssl_context *ssl )
|
2013-12-11 17:45:46 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
const mbedtls_ecp_curve_info *curve_info;
|
2019-01-31 14:20:20 +01:00
|
|
|
mbedtls_ecp_group_id grp_id;
|
|
|
|
#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
|
|
|
|
grp_id = ssl->handshake->ecdh_ctx.grp.id;
|
|
|
|
#else
|
|
|
|
grp_id = ssl->handshake->ecdh_ctx.grp_id;
|
|
|
|
#endif
|
2014-02-06 10:13:09 +01:00
|
|
|
|
2019-01-31 14:20:20 +01:00
|
|
|
curve_info = mbedtls_ecp_curve_info_from_grp_id( grp_id );
|
2014-02-06 10:13:09 +01:00
|
|
|
if( curve_info == NULL )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2014-02-06 10:13:09 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "ECDH curve: %s", curve_info->name ) );
|
2013-12-11 17:45:46 +01:00
|
|
|
|
2015-06-17 11:43:30 +02:00
|
|
|
#if defined(MBEDTLS_ECP_C)
|
2019-01-31 14:20:20 +01:00
|
|
|
if( mbedtls_ssl_check_curve( ssl, grp_id ) != 0 )
|
2014-02-04 16:18:07 +01:00
|
|
|
#else
|
2013-12-11 17:45:46 +01:00
|
|
|
if( ssl->handshake->ecdh_ctx.grp.nbits < 163 ||
|
|
|
|
ssl->handshake->ecdh_ctx.grp.nbits > 521 )
|
2014-02-04 16:18:07 +01:00
|
|
|
#endif
|
2013-12-11 17:45:46 +01:00
|
|
|
return( -1 );
|
|
|
|
|
2019-01-31 14:20:20 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
|
|
|
|
MBEDTLS_DEBUG_ECDH_QP );
|
2013-12-11 17:45:46 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
|
|
|
2019-01-08 13:54:37 +01:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO) && \
|
|
|
|
( defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) )
|
|
|
|
static int ssl_parse_server_ecdh_params_psa( mbedtls_ssl_context *ssl,
|
|
|
|
unsigned char **p,
|
|
|
|
unsigned char *end )
|
|
|
|
{
|
|
|
|
uint16_t tls_id;
|
2019-12-19 13:31:53 +01:00
|
|
|
size_t ecdh_bits = 0;
|
2019-01-08 13:54:37 +01:00
|
|
|
uint8_t ecpoint_len;
|
|
|
|
mbedtls_ssl_handshake_params *handshake = ssl->handshake;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Parse ECC group
|
|
|
|
*/
|
|
|
|
|
|
|
|
if( end - *p < 4 )
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2019-01-08 13:54:37 +01:00
|
|
|
|
|
|
|
/* First byte is curve_type; only named_curve is handled */
|
|
|
|
if( *(*p)++ != MBEDTLS_ECP_TLS_NAMED_CURVE )
|
2021-06-24 16:40:11 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2019-01-08 13:54:37 +01:00
|
|
|
|
|
|
|
/* Next two bytes are the namedcurve value */
|
|
|
|
tls_id = *(*p)++;
|
|
|
|
tls_id <<= 8;
|
|
|
|
tls_id |= *(*p)++;
|
|
|
|
|
|
|
|
/* Convert EC group to PSA key type. */
|
2019-12-19 13:31:53 +01:00
|
|
|
if( ( handshake->ecdh_psa_type =
|
|
|
|
mbedtls_psa_parse_tls_ecc_group( tls_id, &ecdh_bits ) ) == 0 )
|
2019-01-08 13:54:37 +01:00
|
|
|
{
|
2021-06-24 16:40:11 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2019-01-08 13:54:37 +01:00
|
|
|
}
|
2019-12-19 13:31:53 +01:00
|
|
|
if( ecdh_bits > 0xffff )
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2019-12-19 13:31:53 +01:00
|
|
|
handshake->ecdh_bits = (uint16_t) ecdh_bits;
|
2019-01-08 13:54:37 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Put peer's ECDH public key in the format understood by PSA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ecpoint_len = *(*p)++;
|
|
|
|
if( (size_t)( end - *p ) < ecpoint_len )
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2019-01-08 13:54:37 +01:00
|
|
|
|
2019-12-19 13:31:53 +01:00
|
|
|
if( mbedtls_psa_tls_ecpoint_to_psa_ec(
|
2019-01-08 13:54:37 +01:00
|
|
|
*p, ecpoint_len,
|
|
|
|
handshake->ecdh_psa_peerkey,
|
|
|
|
sizeof( handshake->ecdh_psa_peerkey ),
|
|
|
|
&handshake->ecdh_psa_peerkey_len ) != 0 )
|
|
|
|
{
|
|
|
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
|
|
|
}
|
|
|
|
|
|
|
|
*p += ecpoint_len;
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO &&
|
|
|
|
( MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ) */
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
|
|
|
static int ssl_parse_server_ecdh_params( mbedtls_ssl_context *ssl,
|
2013-04-16 13:07:56 +02:00
|
|
|
unsigned char **p,
|
|
|
|
unsigned char *end )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
|
2013-04-16 13:07:56 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Ephemeral ECDH parameters:
|
|
|
|
*
|
|
|
|
* struct {
|
|
|
|
* ECParameters curve_params;
|
|
|
|
* ECPoint public;
|
|
|
|
* } ServerECDHParams;
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_ecdh_read_params( &ssl->handshake->ecdh_ctx,
|
2013-04-16 13:07:56 +02:00
|
|
|
(const unsigned char **) p, end ) ) != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, ( "mbedtls_ecdh_read_params" ), ret );
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2018-09-12 10:34:43 +02:00
|
|
|
if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
|
|
|
|
ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
|
2018-06-13 12:02:12 +02:00
|
|
|
#endif
|
2013-04-16 13:07:56 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2013-12-11 17:45:46 +01:00
|
|
|
if( ssl_check_server_ecdh_params( ssl ) != 0 )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "bad server key exchange message (ECDHE curve)" ) );
|
2021-06-24 16:40:11 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2013-04-16 13:07:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return( ret );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED */
|
2013-04-16 13:07:56 +02:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl,
|
2013-04-16 18:05:29 +02:00
|
|
|
unsigned char **p,
|
|
|
|
unsigned char *end )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
|
2019-09-21 17:51:25 +02:00
|
|
|
uint16_t len;
|
2013-06-26 15:08:35 +02:00
|
|
|
((void) ssl);
|
2013-04-16 18:05:29 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* PSK parameters:
|
|
|
|
*
|
|
|
|
* opaque psk_identity_hint<0..2^16-1>;
|
|
|
|
*/
|
2018-10-08 14:40:50 +02:00
|
|
|
if( end - (*p) < 2 )
|
2018-03-13 11:31:14 +01:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "bad server key exchange message (psk_identity_hint length)" ) );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2018-03-13 11:31:14 +01:00
|
|
|
}
|
2013-10-15 11:55:33 +02:00
|
|
|
len = (*p)[0] << 8 | (*p)[1];
|
2013-04-19 14:30:58 +02:00
|
|
|
*p += 2;
|
2013-04-16 18:05:29 +02:00
|
|
|
|
2019-09-21 17:51:25 +02:00
|
|
|
if( end - (*p) < len )
|
2013-04-16 18:05:29 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "bad server key exchange message (psk_identity_hint length)" ) );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2013-04-16 18:05:29 +02:00
|
|
|
}
|
|
|
|
|
2016-02-22 11:10:14 +01:00
|
|
|
/*
|
|
|
|
* Note: we currently ignore the PKS identity hint, as we only allow one
|
|
|
|
* PSK to be provisionned on the client. This could be changed later if
|
|
|
|
* someone needs that feature.
|
|
|
|
*/
|
2013-04-16 18:05:29 +02:00
|
|
|
*p += len;
|
2013-04-19 14:30:58 +02:00
|
|
|
ret = 0;
|
2013-04-16 18:05:29 +02:00
|
|
|
|
|
|
|
return( ret );
|
|
|
|
}
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
|
2013-04-16 18:05:29 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
|
2013-10-14 17:39:48 +02:00
|
|
|
/*
|
|
|
|
* Generate a pre-master secret and encrypt it with the server's RSA key
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_write_encrypted_pms( mbedtls_ssl_context *ssl,
|
2013-10-14 17:39:48 +02:00
|
|
|
size_t offset, size_t *olen,
|
|
|
|
size_t pms_offset )
|
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2021-02-18 13:55:21 +01:00
|
|
|
size_t len_bytes = 2;
|
2013-10-14 17:39:48 +02:00
|
|
|
unsigned char *p = ssl->handshake->premaster + pms_offset;
|
2019-02-06 17:49:54 +01:00
|
|
|
mbedtls_pk_context * peer_pk;
|
2013-10-14 17:39:48 +02:00
|
|
|
|
2016-05-25 12:56:48 +02:00
|
|
|
if( offset + len_bytes > MBEDTLS_SSL_OUT_CONTENT_LEN )
|
2015-08-27 16:37:35 +02:00
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small for encrypted pms" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL );
|
|
|
|
}
|
|
|
|
|
2013-10-14 17:39:48 +02:00
|
|
|
/*
|
|
|
|
* Generate (part of) the pre-master as
|
|
|
|
* struct {
|
|
|
|
* ProtocolVersion client_version;
|
|
|
|
* opaque random[46];
|
|
|
|
* } PreMasterSecret;
|
|
|
|
*/
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_write_version( ssl->conf->max_major_ver,
|
|
|
|
ssl->conf->max_minor_ver,
|
|
|
|
ssl->conf->transport, p );
|
2013-10-14 17:39:48 +02:00
|
|
|
|
2015-05-07 13:35:38 +02:00
|
|
|
if( ( ret = ssl->conf->f_rng( ssl->conf->p_rng, p + 2, 46 ) ) != 0 )
|
2013-10-14 17:39:48 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "f_rng", ret );
|
2013-10-14 17:39:48 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
ssl->handshake->pmslen = 48;
|
|
|
|
|
2019-02-06 17:49:54 +01:00
|
|
|
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
peer_pk = &ssl->handshake->peer_pubkey;
|
|
|
|
#else /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2015-09-03 10:44:32 +02:00
|
|
|
if( ssl->session_negotiate->peer_cert == NULL )
|
|
|
|
{
|
2019-02-06 18:37:32 +01:00
|
|
|
/* Should never happen */
|
2019-02-26 12:51:06 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
2019-02-06 18:37:32 +01:00
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2015-09-03 10:44:32 +02:00
|
|
|
}
|
2019-02-06 17:49:54 +01:00
|
|
|
peer_pk = &ssl->session_negotiate->peer_cert->pk;
|
|
|
|
#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2015-09-03 10:44:32 +02:00
|
|
|
|
2013-10-14 17:39:48 +02:00
|
|
|
/*
|
|
|
|
* Now write it out, encrypted
|
|
|
|
*/
|
2019-02-06 17:49:54 +01:00
|
|
|
if( ! mbedtls_pk_can_do( peer_pk, MBEDTLS_PK_RSA ) )
|
2013-10-14 17:39:48 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "certificate key type mismatch" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH );
|
2013-10-14 17:39:48 +02:00
|
|
|
}
|
|
|
|
|
2019-02-06 17:49:54 +01:00
|
|
|
if( ( ret = mbedtls_pk_encrypt( peer_pk,
|
2013-10-14 17:39:48 +02:00
|
|
|
p, ssl->handshake->pmslen,
|
|
|
|
ssl->out_msg + offset + len_bytes, olen,
|
2016-05-25 12:56:48 +02:00
|
|
|
MBEDTLS_SSL_OUT_CONTENT_LEN - offset - len_bytes,
|
2015-05-07 13:35:38 +02:00
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 )
|
2013-10-14 17:39:48 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_rsa_pkcs1_encrypt", ret );
|
2013-10-14 17:39:48 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2021-05-12 17:49:18 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
2013-10-14 17:39:48 +02:00
|
|
|
if( len_bytes == 2 )
|
|
|
|
{
|
2021-07-19 12:56:54 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( *olen, ssl->out_msg, offset );
|
2013-10-14 17:39:48 +02:00
|
|
|
*olen += 2;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-02-08 15:06:00 +01:00
|
|
|
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
/* We don't need the peer's public key anymore. Free it. */
|
|
|
|
mbedtls_pk_free( peer_pk );
|
|
|
|
#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2013-10-14 17:39:48 +02:00
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
2015-10-23 08:48:41 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_signature_algorithm( mbedtls_ssl_context *ssl,
|
2013-04-16 13:07:56 +02:00
|
|
|
unsigned char **p,
|
|
|
|
unsigned char *end,
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_md_type_t *md_alg,
|
|
|
|
mbedtls_pk_type_t *pk_alg )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
*md_alg = MBEDTLS_MD_NONE;
|
|
|
|
*pk_alg = MBEDTLS_PK_NONE;
|
2013-04-16 13:07:56 +02:00
|
|
|
|
2013-08-19 12:06:38 +02:00
|
|
|
/* Only in TLS 1.2 */
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->minor_ver != MBEDTLS_SSL_MINOR_VERSION_3 )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2013-08-19 12:06:38 +02:00
|
|
|
return( 0 );
|
2013-04-16 13:07:56 +02:00
|
|
|
}
|
|
|
|
|
2013-04-19 14:30:58 +02:00
|
|
|
if( (*p) + 2 > end )
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2013-04-16 13:07:56 +02:00
|
|
|
|
2013-08-19 12:06:38 +02:00
|
|
|
/*
|
|
|
|
* Get hash algorithm
|
|
|
|
*/
|
2017-05-08 12:06:19 +02:00
|
|
|
if( ( *md_alg = mbedtls_ssl_md_alg_from_hash( (*p)[0] ) )
|
|
|
|
== MBEDTLS_MD_NONE )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "Server used unsupported HashAlgorithm %d", *(p)[0] ) );
|
2021-06-24 16:40:11 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2013-04-16 13:07:56 +02:00
|
|
|
}
|
|
|
|
|
2013-08-19 12:06:38 +02:00
|
|
|
/*
|
|
|
|
* Get signature algorithm
|
|
|
|
*/
|
2017-05-08 12:06:19 +02:00
|
|
|
if( ( *pk_alg = mbedtls_ssl_pk_alg_from_sig( (*p)[1] ) )
|
|
|
|
== MBEDTLS_PK_NONE )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "server used unsupported SignatureAlgorithm %d", (*p)[1] ) );
|
2021-06-28 12:58:00 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2013-04-16 13:07:56 +02:00
|
|
|
}
|
|
|
|
|
2015-06-17 14:34:48 +02:00
|
|
|
/*
|
2022-01-19 11:02:15 +01:00
|
|
|
* Check if the signature algorithm is acceptable
|
2015-06-17 14:34:48 +02:00
|
|
|
*/
|
2022-01-19 11:02:15 +01:00
|
|
|
if( !mbedtls_ssl_sig_alg_is_offered( ssl, MBEDTLS_GET_UINT16_BE( *p, 0 ) ) )
|
2015-06-17 14:34:48 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "server used HashAlgorithm %d that was not offered", *(p)[0] ) );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2015-06-17 14:34:48 +02:00
|
|
|
}
|
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "Server used SignatureAlgorithm %d",
|
|
|
|
(*p)[1] ) );
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "Server used HashAlgorithm %d",
|
|
|
|
(*p)[0] ) );
|
2013-04-16 13:07:56 +02:00
|
|
|
*p += 2;
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-10-23 08:48:41 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
2013-04-16 13:07:56 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
|
|
static int ssl_get_ecdh_params_from_cert( mbedtls_ssl_context *ssl )
|
2013-12-11 17:45:46 +01:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-04-08 12:49:31 +02:00
|
|
|
const mbedtls_ecp_keypair *peer_key;
|
2019-02-06 18:44:07 +01:00
|
|
|
mbedtls_pk_context * peer_pk;
|
2013-12-11 17:45:46 +01:00
|
|
|
|
2019-02-06 18:44:07 +01:00
|
|
|
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
peer_pk = &ssl->handshake->peer_pubkey;
|
|
|
|
#else /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2015-09-03 10:44:32 +02:00
|
|
|
if( ssl->session_negotiate->peer_cert == NULL )
|
|
|
|
{
|
2019-02-06 18:37:32 +01:00
|
|
|
/* Should never happen */
|
2019-02-26 13:36:01 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
2019-02-06 18:37:32 +01:00
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2015-09-03 10:44:32 +02:00
|
|
|
}
|
2019-02-06 18:44:07 +01:00
|
|
|
peer_pk = &ssl->session_negotiate->peer_cert->pk;
|
|
|
|
#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2015-09-03 10:44:32 +02:00
|
|
|
|
2019-02-06 18:44:07 +01:00
|
|
|
if( ! mbedtls_pk_can_do( peer_pk, MBEDTLS_PK_ECKEY ) )
|
2013-12-11 17:45:46 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "server key not ECDH capable" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH );
|
2013-12-11 17:45:46 +01:00
|
|
|
}
|
|
|
|
|
2019-02-06 18:44:07 +01:00
|
|
|
peer_key = mbedtls_pk_ec( *peer_pk );
|
2013-12-11 17:45:46 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_ecdh_get_params( &ssl->handshake->ecdh_ctx, peer_key,
|
|
|
|
MBEDTLS_ECDH_THEIRS ) ) != 0 )
|
2013-12-11 17:45:46 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, ( "mbedtls_ecdh_get_params" ), ret );
|
2013-12-11 17:45:46 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
if( ssl_check_server_ecdh_params( ssl ) != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server certificate (ECDH curve)" ) );
|
2021-06-24 12:03:13 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_BAD_CERTIFICATE );
|
2013-12-11 17:45:46 +01:00
|
|
|
}
|
|
|
|
|
2019-02-08 15:06:00 +01:00
|
|
|
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
/* We don't need the peer's public key anymore. Free it,
|
|
|
|
* so that more RAM is available for upcoming expensive
|
|
|
|
* operations like ECDHE. */
|
|
|
|
mbedtls_pk_free( peer_pk );
|
|
|
|
#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
|
|
|
|
2013-12-11 17:45:46 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
2013-12-11 17:45:46 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2017-05-11 15:06:43 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
|
2017-12-27 22:34:08 +01:00
|
|
|
ssl->handshake->ciphersuite_info;
|
2017-06-27 17:15:06 +02:00
|
|
|
unsigned char *p = NULL, *end = NULL;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
ssl->state++;
|
|
|
|
return( 0 );
|
|
|
|
}
|
2013-10-15 11:54:47 +02:00
|
|
|
((void) p);
|
|
|
|
((void) end);
|
|
|
|
#endif
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA )
|
2013-12-11 17:45:46 +01:00
|
|
|
{
|
2014-02-04 16:18:07 +01:00
|
|
|
if( ( ret = ssl_get_ecdh_params_from_cert( ssl ) ) != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_get_ecdh_params_from_cert", ret );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2014-02-04 16:18:07 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
2013-12-11 17:45:46 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) );
|
2013-12-11 17:45:46 +01:00
|
|
|
ssl->state++;
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
((void) p);
|
|
|
|
((void) end);
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
2013-12-11 17:45:46 +01:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-15 11:49:08 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled &&
|
2017-08-24 12:08:33 +02:00
|
|
|
ssl->handshake->ecrs_state == ssl_ecrs_ske_start_processing )
|
2017-08-15 11:49:08 +02:00
|
|
|
{
|
2017-08-24 12:08:33 +02:00
|
|
|
goto start_processing;
|
2017-08-15 11:49:08 +02:00
|
|
|
}
|
2017-05-18 11:27:06 +02:00
|
|
|
#endif
|
|
|
|
|
2018-08-15 14:56:18 +02:00
|
|
|
if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2013-10-15 10:43:36 +02:00
|
|
|
/*
|
|
|
|
* ServerKeyExchange may be skipped with PSK and RSA-PSK when the server
|
|
|
|
* doesn't use a psk_identity_hint
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->in_msg[0] != MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK )
|
2013-04-19 09:13:37 +02:00
|
|
|
{
|
2017-05-24 10:16:26 +02:00
|
|
|
/* Current message is probably either
|
|
|
|
* CertificateRequest or ServerHelloDone */
|
|
|
|
ssl->keep_current_message = 1;
|
2013-04-19 09:13:37 +02:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "server key exchange message must not be skipped" ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
|
2017-05-24 10:16:26 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-24 12:08:33 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled )
|
|
|
|
ssl->handshake->ecrs_state = ssl_ecrs_ske_start_processing;
|
|
|
|
|
|
|
|
start_processing:
|
|
|
|
#endif
|
2015-04-08 12:49:31 +02:00
|
|
|
p = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
|
2013-03-21 11:56:50 +01:00
|
|
|
end = ssl->in_msg + ssl->in_hslen;
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "server key exchange", p, end - p );
|
2013-03-21 11:56:50 +01:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK )
|
2013-04-16 18:05:29 +02:00
|
|
|
{
|
|
|
|
if( ssl_parse_server_psk_hint( ssl, &p, end ) != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-28 13:02:21 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2013-04-16 18:05:29 +02:00
|
|
|
}
|
2013-10-15 10:43:36 +02:00
|
|
|
} /* FALLTROUGH */
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
|
2013-10-15 10:43:36 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK )
|
2013-10-15 10:43:36 +02:00
|
|
|
; /* nothing more to do */
|
2013-04-19 14:30:58 +02:00
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED */
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK )
|
2013-04-19 14:30:58 +02:00
|
|
|
{
|
|
|
|
if( ssl_parse_server_dh_params( ssl, &p, end ) != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-29 13:06:32 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2013-04-19 14:30:58 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
2019-01-08 13:54:37 +01:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO) && \
|
|
|
|
( defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) )
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA )
|
|
|
|
{
|
|
|
|
if( ssl_parse_server_ecdh_params_psa( ssl, &p, end ) != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-29 15:40:23 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2019-01-08 13:54:37 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO &&
|
|
|
|
( MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ) */
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA )
|
2013-10-11 16:53:50 +02:00
|
|
|
{
|
|
|
|
if( ssl_parse_server_ecdh_params( ssl, &p, end ) != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-29 16:25:21 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2013-10-11 16:53:50 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
|
2015-09-16 22:41:06 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE )
|
|
|
|
{
|
|
|
|
ret = mbedtls_ecjpake_read_round_two( &ssl->handshake->ecjpake_ctx,
|
|
|
|
p, end - p );
|
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_read_round_two", ret );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
2021-06-24 17:27:09 +02:00
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
|
|
|
return( MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE );
|
2015-09-16 22:41:06 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
2013-04-19 14:30:58 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2013-04-19 14:30:58 +02:00
|
|
|
}
|
2012-04-11 14:09:53 +02:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED)
|
2017-04-28 18:08:27 +02:00
|
|
|
if( mbedtls_ssl_ciphersuite_uses_server_signature( ciphersuite_info ) )
|
2012-04-11 14:09:53 +02:00
|
|
|
{
|
2014-09-10 17:25:02 +02:00
|
|
|
size_t sig_len, hashlen;
|
2021-10-18 09:47:58 +02:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
|
|
unsigned char hash[PSA_HASH_MAX_SIZE];
|
|
|
|
#else
|
|
|
|
unsigned char hash[MBEDTLS_MD_MAX_SIZE];
|
|
|
|
#endif
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_md_type_t md_alg = MBEDTLS_MD_NONE;
|
|
|
|
mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
|
|
|
|
unsigned char *params = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
|
2014-09-10 17:25:02 +02:00
|
|
|
size_t params_len = p - params;
|
2017-05-18 11:27:06 +02:00
|
|
|
void *rs_ctx = NULL;
|
2013-08-19 12:06:38 +02:00
|
|
|
|
2019-02-06 19:26:03 +01:00
|
|
|
mbedtls_pk_context * peer_pk;
|
|
|
|
|
2013-04-16 13:07:56 +02:00
|
|
|
/*
|
|
|
|
* Handle the digitally-signed structure
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
|
|
|
if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
|
2013-03-20 14:39:14 +01:00
|
|
|
{
|
2013-08-28 16:21:34 +02:00
|
|
|
if( ssl_parse_signature_algorithm( ssl, &p, end,
|
|
|
|
&md_alg, &pk_alg ) != 0 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "bad server key exchange message" ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2013-08-28 16:21:34 +02:00
|
|
|
}
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2017-05-08 12:06:19 +02:00
|
|
|
if( pk_alg !=
|
|
|
|
mbedtls_ssl_get_ciphersuite_sig_pk_alg( ciphersuite_info ) )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "bad server key exchange message" ) );
|
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER );
|
2013-04-16 13:07:56 +02:00
|
|
|
}
|
|
|
|
}
|
2013-08-19 13:50:33 +02:00
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
2013-08-28 16:21:34 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2013-08-28 16:21:34 +02:00
|
|
|
}
|
2013-07-11 10:46:21 +02:00
|
|
|
|
2013-08-27 13:31:28 +02:00
|
|
|
/*
|
|
|
|
* Read signature
|
|
|
|
*/
|
2018-03-13 11:28:49 +01:00
|
|
|
|
|
|
|
if( p > end - 2 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2018-03-13 11:28:49 +01:00
|
|
|
}
|
2013-08-19 12:06:38 +02:00
|
|
|
sig_len = ( p[0] << 8 ) | p[1];
|
|
|
|
p += 2;
|
2013-07-11 10:46:21 +02:00
|
|
|
|
2018-03-13 11:29:24 +01:00
|
|
|
if( p != end - sig_len )
|
2013-03-20 14:39:14 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:32:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2013-03-20 14:39:14 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "signature", p, sig_len );
|
2013-08-27 13:31:28 +02:00
|
|
|
|
2013-08-19 12:06:38 +02:00
|
|
|
/*
|
|
|
|
* Compute the hash that has been signed
|
|
|
|
*/
|
2021-05-12 17:49:18 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
2015-04-08 12:49:31 +02:00
|
|
|
if( md_alg != MBEDTLS_MD_NONE )
|
2013-04-16 13:07:56 +02:00
|
|
|
{
|
2018-04-24 11:53:22 +02:00
|
|
|
ret = mbedtls_ssl_get_key_exchange_md_tls1_2( ssl, hash, &hashlen,
|
|
|
|
params, params_len,
|
|
|
|
md_alg );
|
2017-07-20 17:17:51 +02:00
|
|
|
if( ret != 0 )
|
2013-04-16 13:07:56 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
2013-08-27 21:19:20 +02:00
|
|
|
else
|
2021-05-12 17:49:18 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
2013-08-28 11:57:20 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2013-08-28 11:57:20 +02:00
|
|
|
}
|
2012-04-11 18:11:49 +02:00
|
|
|
|
2018-04-24 11:53:22 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_BUF( 3, "parameters hash", hash, hashlen );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2019-02-06 19:26:03 +01:00
|
|
|
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
peer_pk = &ssl->handshake->peer_pubkey;
|
|
|
|
#else /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2015-09-03 10:44:32 +02:00
|
|
|
if( ssl->session_negotiate->peer_cert == NULL )
|
|
|
|
{
|
2019-02-06 18:37:32 +01:00
|
|
|
/* Should never happen */
|
2019-02-26 13:36:01 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
2019-02-06 18:37:32 +01:00
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2015-09-03 10:44:32 +02:00
|
|
|
}
|
2019-02-06 19:26:03 +01:00
|
|
|
peer_pk = &ssl->session_negotiate->peer_cert->pk;
|
|
|
|
#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2015-09-03 10:44:32 +02:00
|
|
|
|
2013-08-19 12:06:38 +02:00
|
|
|
/*
|
|
|
|
* Verify signature
|
|
|
|
*/
|
2019-02-06 19:26:03 +01:00
|
|
|
if( !mbedtls_pk_can_do( peer_pk, pk_alg ) )
|
2012-04-11 18:11:49 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH );
|
2013-08-19 12:06:38 +02:00
|
|
|
}
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-15 11:49:08 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled )
|
2017-08-17 14:33:31 +02:00
|
|
|
rs_ctx = &ssl->handshake->ecrs_ctx.pk;
|
2017-05-18 11:27:06 +02:00
|
|
|
#endif
|
|
|
|
|
2019-02-06 19:26:03 +01:00
|
|
|
if( ( ret = mbedtls_pk_verify_restartable( peer_pk,
|
2017-05-18 11:27:06 +02:00
|
|
|
md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 )
|
2013-08-19 12:06:38 +02:00
|
|
|
{
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-05-18 11:27:06 +02:00
|
|
|
if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS )
|
|
|
|
#endif
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR );
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_pk_verify", ret );
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2018-06-13 12:02:12 +02:00
|
|
|
if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
|
|
|
|
ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
|
|
|
|
#endif
|
2013-04-07 22:00:46 +02:00
|
|
|
return( ret );
|
2012-04-11 18:11:49 +02:00
|
|
|
}
|
2019-02-08 15:06:00 +01:00
|
|
|
|
|
|
|
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
|
|
/* We don't need the peer's public key anymore. Free it,
|
|
|
|
* so that more RAM is available for upcoming expensive
|
|
|
|
* operations like ECDHE. */
|
|
|
|
mbedtls_pk_free( peer_pk );
|
|
|
|
#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2013-04-16 18:05:29 +02:00
|
|
|
exit:
|
2009-01-03 22:22:43 +01:00
|
|
|
ssl->state++;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server key exchange" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if ! defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_certificate_request( mbedtls_ssl_context *ssl )
|
2013-11-25 17:38:36 +01:00
|
|
|
{
|
2017-05-11 15:06:43 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
|
2017-12-27 22:34:08 +01:00
|
|
|
ssl->handshake->ciphersuite_info;
|
2013-11-25 17:38:36 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate request" ) );
|
2013-11-25 17:38:36 +01:00
|
|
|
|
2017-04-28 18:08:27 +02:00
|
|
|
if( ! mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
|
2013-11-25 17:38:36 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate request" ) );
|
2013-11-25 17:38:36 +01:00
|
|
|
ssl->state++;
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2013-11-25 17:38:36 +01:00
|
|
|
}
|
2020-03-10 12:19:08 +01:00
|
|
|
#else /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_certificate_request( mbedtls_ssl_context *ssl )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2016-02-24 15:13:22 +01:00
|
|
|
unsigned char *buf;
|
|
|
|
size_t n = 0;
|
2013-08-27 21:19:20 +02:00
|
|
|
size_t cert_type_len = 0, dn_len = 0;
|
2017-05-11 15:06:43 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
|
2017-12-27 22:34:08 +01:00
|
|
|
ssl->handshake->ciphersuite_info;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate request" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2017-04-28 18:08:27 +02:00
|
|
|
if( ! mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
|
2013-11-25 17:38:36 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate request" ) );
|
2013-11-25 17:38:36 +01:00
|
|
|
ssl->state++;
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2018-08-15 14:56:18 +02:00
|
|
|
if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2017-05-24 10:16:26 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2013-04-16 18:05:29 +02:00
|
|
|
|
2017-05-24 10:16:26 +02:00
|
|
|
if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
|
2017-05-24 10:16:26 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
ssl->state++;
|
2017-05-24 10:16:26 +02:00
|
|
|
ssl->client_auth = ( ssl->in_msg[0] == MBEDTLS_SSL_HS_CERTIFICATE_REQUEST );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "got %s certificate request",
|
2009-01-03 22:22:43 +01:00
|
|
|
ssl->client_auth ? "a" : "no" ) );
|
|
|
|
|
2012-11-23 13:38:07 +01:00
|
|
|
if( ssl->client_auth == 0 )
|
2017-05-24 10:16:26 +02:00
|
|
|
{
|
2020-08-25 10:03:19 +02:00
|
|
|
/* Current message is probably the ServerHelloDone */
|
|
|
|
ssl->keep_current_message = 1;
|
2012-11-23 13:38:07 +01:00
|
|
|
goto exit;
|
2017-05-24 10:16:26 +02:00
|
|
|
}
|
2013-04-16 18:05:29 +02:00
|
|
|
|
2014-09-10 19:25:43 +02:00
|
|
|
/*
|
|
|
|
* struct {
|
|
|
|
* ClientCertificateType certificate_types<1..2^8-1>;
|
|
|
|
* SignatureAndHashAlgorithm
|
|
|
|
* supported_signature_algorithms<2^16-1>; -- TLS 1.2 only
|
|
|
|
* DistinguishedName certificate_authorities<0..2^16-1>;
|
|
|
|
* } CertificateRequest;
|
2016-02-24 15:13:22 +01:00
|
|
|
*
|
|
|
|
* Since we only support a single certificate on clients, let's just
|
|
|
|
* ignore all the information that's supposed to help us pick a
|
|
|
|
* certificate.
|
|
|
|
*
|
|
|
|
* We could check that our certificate matches the request, and bail out
|
|
|
|
* if it doesn't, but it's simpler to just send the certificate anyway,
|
|
|
|
* and give the server the opportunity to decide if it should terminate
|
|
|
|
* the connection when it doesn't like our certificate.
|
|
|
|
*
|
|
|
|
* Same goes for the hash in TLS 1.2's signature_algorithms: at this
|
|
|
|
* point we only have one hash available (see comments in
|
2016-03-01 14:16:57 +01:00
|
|
|
* write_certificate_verify), so let's just use what we have.
|
2016-02-24 15:13:22 +01:00
|
|
|
*
|
|
|
|
* However, we still minimally parse the message to check it is at least
|
|
|
|
* superficially sane.
|
2014-09-10 19:25:43 +02:00
|
|
|
*/
|
2012-11-23 13:38:07 +01:00
|
|
|
buf = ssl->in_msg;
|
2013-04-16 13:15:56 +02:00
|
|
|
|
2016-02-24 15:13:22 +01:00
|
|
|
/* certificate_types */
|
2018-04-05 10:20:09 +02:00
|
|
|
if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl ) )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:33:51 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2018-04-05 10:20:09 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
cert_type_len = buf[mbedtls_ssl_hs_hdr_len( ssl )];
|
2012-11-23 13:38:07 +01:00
|
|
|
n = cert_type_len;
|
|
|
|
|
2018-03-20 11:19:50 +01:00
|
|
|
/*
|
2018-04-05 14:48:55 +02:00
|
|
|
* In the subsequent code there are two paths that read from buf:
|
2018-03-20 11:19:50 +01:00
|
|
|
* * the length of the signature algorithms field (if minor version of
|
|
|
|
* SSL is 3),
|
|
|
|
* * distinguished name length otherwise.
|
|
|
|
* Both reach at most the index:
|
|
|
|
* ...hdr_len + 2 + n,
|
|
|
|
* therefore the buffer length at this point must be greater than that
|
|
|
|
* regardless of the actual code path.
|
|
|
|
*/
|
|
|
|
if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n )
|
2012-11-23 13:38:07 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:33:51 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2012-11-23 13:38:07 +01:00
|
|
|
}
|
|
|
|
|
2016-02-24 15:13:22 +01:00
|
|
|
/* supported_signature_algorithms */
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
|
|
|
if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
|
2012-11-23 13:38:07 +01:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
size_t sig_alg_len =
|
|
|
|
( ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 1 + n] << 8 )
|
|
|
|
| ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n] ) );
|
2016-10-13 18:21:01 +02:00
|
|
|
#if defined(MBEDTLS_DEBUG_C)
|
2018-03-20 14:09:53 +01:00
|
|
|
unsigned char* sig_alg;
|
2016-10-13 18:21:01 +02:00
|
|
|
size_t i;
|
2018-03-20 14:09:53 +01:00
|
|
|
#endif
|
2016-10-13 18:21:01 +02:00
|
|
|
|
2018-03-20 14:09:53 +01:00
|
|
|
/*
|
2018-04-05 14:48:55 +02:00
|
|
|
* The furthest access in buf is in the loop few lines below:
|
2018-03-20 14:09:53 +01:00
|
|
|
* sig_alg[i + 1],
|
|
|
|
* where:
|
|
|
|
* sig_alg = buf + ...hdr_len + 3 + n,
|
|
|
|
* max(i) = sig_alg_len - 1.
|
2018-04-05 14:48:55 +02:00
|
|
|
* Therefore the furthest access is:
|
2018-03-20 14:09:53 +01:00
|
|
|
* buf[...hdr_len + 3 + n + sig_alg_len - 1 + 1],
|
|
|
|
* which reduces to:
|
|
|
|
* buf[...hdr_len + 3 + n + sig_alg_len],
|
|
|
|
* which is one less than we need the buf to be.
|
|
|
|
*/
|
2017-05-08 12:06:19 +02:00
|
|
|
if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl )
|
|
|
|
+ 3 + n + sig_alg_len )
|
2018-03-20 14:09:53 +01:00
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:33:51 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2018-03-20 14:09:53 +01:00
|
|
|
}
|
2016-10-13 18:21:01 +02:00
|
|
|
|
2018-03-20 14:09:53 +01:00
|
|
|
#if defined(MBEDTLS_DEBUG_C)
|
|
|
|
sig_alg = buf + mbedtls_ssl_hs_hdr_len( ssl ) + 3 + n;
|
2016-10-13 18:21:01 +02:00
|
|
|
for( i = 0; i < sig_alg_len; i += 2 )
|
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
|
|
|
( "Supported Signature Algorithm found: %d,%d",
|
|
|
|
sig_alg[i], sig_alg[i + 1] ) );
|
2016-10-13 18:21:01 +02:00
|
|
|
}
|
|
|
|
#endif
|
2012-11-23 13:38:07 +01:00
|
|
|
|
2016-02-24 15:13:22 +01:00
|
|
|
n += 2 + sig_alg_len;
|
2013-04-16 13:15:56 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
2012-11-23 13:38:07 +01:00
|
|
|
|
2016-02-24 15:13:22 +01:00
|
|
|
/* certificate_authorities */
|
|
|
|
dn_len = ( ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 1 + n] << 8 )
|
|
|
|
| ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n] ) );
|
2012-11-23 13:38:07 +01:00
|
|
|
|
|
|
|
n += dn_len;
|
2016-02-24 15:13:22 +01:00
|
|
|
if( ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) + 3 + n )
|
2012-11-23 13:38:07 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:33:51 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2012-11-23 13:38:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
exit:
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate request" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_parse_server_hello_done( mbedtls_ssl_context *ssl )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello done" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2018-08-15 14:56:18 +02:00
|
|
|
if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2017-05-24 10:16:26 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2017-05-24 10:16:26 +02:00
|
|
|
if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) ||
|
|
|
|
ssl->in_msg[0] != MBEDTLS_SSL_HS_SERVER_HELLO_DONE )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 11:09:50 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
ssl->state++;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
2015-05-04 10:55:58 +02:00
|
|
|
if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_ssl_recv_flight_completed( ssl );
|
2014-09-19 15:09:21 +02:00
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello done" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_write_client_key_exchange( mbedtls_ssl_context *ssl )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2019-01-14 10:41:16 +01:00
|
|
|
|
|
|
|
size_t header_len;
|
|
|
|
size_t content_len;
|
2017-05-11 15:06:43 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
|
2017-12-27 22:34:08 +01:00
|
|
|
ssl->handshake->ciphersuite_info;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write client key exchange" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* DHM key exchange -- send G^X mod P
|
|
|
|
*/
|
2021-05-27 22:17:07 +02:00
|
|
|
content_len = mbedtls_dhm_get_len( &ssl->handshake->dhm_ctx );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2021-07-19 12:56:54 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( content_len, ssl->out_msg, 4 );
|
2019-01-14 10:41:16 +01:00
|
|
|
header_len = 6;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
ret = mbedtls_dhm_make_public( &ssl->handshake->dhm_ctx,
|
2021-05-27 22:17:07 +02:00
|
|
|
(int) mbedtls_dhm_get_len( &ssl->handshake->dhm_ctx ),
|
2017-05-08 12:06:19 +02:00
|
|
|
&ssl->out_msg[header_len], content_len,
|
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng );
|
2009-01-03 22:22:43 +01:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_make_public", ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: X ", &ssl->handshake->dhm_ctx.X );
|
|
|
|
MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: GX", &ssl->handshake->dhm_ctx.GX );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_dhm_calc_secret( &ssl->handshake->dhm_ctx,
|
2017-05-08 12:06:19 +02:00
|
|
|
ssl->handshake->premaster,
|
|
|
|
MBEDTLS_PREMASTER_SIZE,
|
|
|
|
&ssl->handshake->pmslen,
|
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_calc_secret", ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: K ", &ssl->handshake->dhm_ctx.K );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED */
|
2019-01-08 12:39:35 +01:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO) && \
|
|
|
|
( defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) )
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA )
|
|
|
|
{
|
|
|
|
psa_status_t status;
|
2019-08-08 11:28:27 +02:00
|
|
|
psa_key_attributes_t key_attributes;
|
2019-01-08 12:39:35 +01:00
|
|
|
|
|
|
|
mbedtls_ssl_handshake_params *handshake = ssl->handshake;
|
|
|
|
|
|
|
|
unsigned char own_pubkey[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
|
|
|
|
size_t own_pubkey_len;
|
|
|
|
unsigned char *own_pubkey_ecpoint;
|
|
|
|
size_t own_pubkey_ecpoint_len;
|
|
|
|
|
2019-01-14 10:41:16 +01:00
|
|
|
header_len = 4;
|
2019-01-08 12:39:35 +01:00
|
|
|
|
2019-01-11 15:35:30 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "Perform PSA-based ECDH computation." ) );
|
|
|
|
|
2019-01-08 12:39:35 +01:00
|
|
|
/*
|
|
|
|
* Generate EC private key for ECDHE exchange.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* The master secret is obtained from the shared ECDH secret by
|
|
|
|
* applying the TLS 1.2 PRF with a specific salt and label. While
|
|
|
|
* the PSA Crypto API encourages combining key agreement schemes
|
|
|
|
* such as ECDH with fixed KDFs such as TLS 1.2 PRF, it does not
|
|
|
|
* yet support the provisioning of salt + label to the KDF.
|
|
|
|
* For the time being, we therefore need to split the computation
|
|
|
|
* of the ECDH secret and the application of the TLS 1.2 PRF. */
|
2019-08-08 11:28:27 +02:00
|
|
|
key_attributes = psa_key_attributes_init();
|
|
|
|
psa_set_key_usage_flags( &key_attributes, PSA_KEY_USAGE_DERIVE );
|
2019-08-08 12:12:24 +02:00
|
|
|
psa_set_key_algorithm( &key_attributes, PSA_ALG_ECDH );
|
2019-12-19 13:31:53 +01:00
|
|
|
psa_set_key_type( &key_attributes, handshake->ecdh_psa_type );
|
|
|
|
psa_set_key_bits( &key_attributes, handshake->ecdh_bits );
|
2019-01-08 12:39:35 +01:00
|
|
|
|
|
|
|
/* Generate ECDH private key. */
|
2019-08-08 11:28:27 +02:00
|
|
|
status = psa_generate_key( &key_attributes,
|
2019-08-08 12:12:24 +02:00
|
|
|
&handshake->ecdh_psa_privkey );
|
2019-01-08 12:39:35 +01:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
|
|
|
|
|
|
|
/* Export the public part of the ECDH private key from PSA
|
|
|
|
* and convert it to ECPoint format used in ClientKeyExchange. */
|
|
|
|
status = psa_export_public_key( handshake->ecdh_psa_privkey,
|
|
|
|
own_pubkey, sizeof( own_pubkey ),
|
|
|
|
&own_pubkey_len );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
|
|
|
|
|
|
|
if( mbedtls_psa_tls_psa_ec_to_ecpoint( own_pubkey,
|
|
|
|
own_pubkey_len,
|
|
|
|
&own_pubkey_ecpoint,
|
|
|
|
&own_pubkey_ecpoint_len ) != 0 )
|
|
|
|
{
|
|
|
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy ECPoint structure to outgoing message buffer. */
|
2019-05-07 14:19:33 +02:00
|
|
|
ssl->out_msg[header_len] = (unsigned char) own_pubkey_ecpoint_len;
|
2019-01-14 10:41:16 +01:00
|
|
|
memcpy( ssl->out_msg + header_len + 1,
|
|
|
|
own_pubkey_ecpoint, own_pubkey_ecpoint_len );
|
|
|
|
content_len = own_pubkey_ecpoint_len + 1;
|
2019-01-08 12:39:35 +01:00
|
|
|
|
|
|
|
/* The ECDH secret is the premaster secret used for key derivation. */
|
|
|
|
|
2019-08-08 12:12:24 +02:00
|
|
|
/* Compute ECDH shared secret. */
|
|
|
|
status = psa_raw_key_agreement( PSA_ALG_ECDH,
|
|
|
|
handshake->ecdh_psa_privkey,
|
|
|
|
handshake->ecdh_psa_peerkey,
|
|
|
|
handshake->ecdh_psa_peerkey_len,
|
|
|
|
ssl->handshake->premaster,
|
|
|
|
sizeof( ssl->handshake->premaster ),
|
|
|
|
&ssl->handshake->pmslen );
|
2019-01-08 12:39:35 +01:00
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
|
|
|
|
|
|
|
status = psa_destroy_key( handshake->ecdh_psa_privkey );
|
|
|
|
if( status != PSA_SUCCESS )
|
|
|
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
2020-08-04 09:51:30 +02:00
|
|
|
handshake->ecdh_psa_privkey = MBEDTLS_SVC_KEY_ID_INIT;
|
2019-01-08 12:39:35 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO &&
|
|
|
|
( MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ) */
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA ||
|
|
|
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA )
|
2013-03-20 14:39:14 +01:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* ECDH key exchange -- send client public value
|
|
|
|
*/
|
2019-01-14 10:41:16 +01:00
|
|
|
header_len = 4;
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-15 11:49:08 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled )
|
|
|
|
{
|
2018-10-16 10:28:17 +02:00
|
|
|
if( ssl->handshake->ecrs_state == ssl_ecrs_cke_ecdh_calc_secret )
|
2017-08-15 11:49:08 +02:00
|
|
|
goto ecdh_calc_secret;
|
2017-05-18 12:35:37 +02:00
|
|
|
|
2017-08-15 11:49:08 +02:00
|
|
|
mbedtls_ecdh_enable_restart( &ssl->handshake->ecdh_ctx );
|
|
|
|
}
|
2017-05-16 09:26:48 +02:00
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
ret = mbedtls_ecdh_make_public( &ssl->handshake->ecdh_ctx,
|
2019-01-14 10:41:16 +01:00
|
|
|
&content_len,
|
|
|
|
&ssl->out_msg[header_len], 1000,
|
2015-05-07 13:35:38 +02:00
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng );
|
2013-03-20 14:39:14 +01:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_make_public", ret );
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2018-06-13 12:02:12 +02:00
|
|
|
if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
|
|
|
|
ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
|
|
|
|
#endif
|
2013-03-20 14:39:14 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2019-01-31 14:20:20 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
|
|
|
|
MBEDTLS_DEBUG_ECDH_Q );
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-15 11:49:08 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled )
|
|
|
|
{
|
2019-01-14 10:41:16 +01:00
|
|
|
ssl->handshake->ecrs_n = content_len;
|
2018-10-16 10:28:17 +02:00
|
|
|
ssl->handshake->ecrs_state = ssl_ecrs_cke_ecdh_calc_secret;
|
2017-08-15 11:49:08 +02:00
|
|
|
}
|
2017-05-16 09:26:48 +02:00
|
|
|
|
|
|
|
ecdh_calc_secret:
|
2017-08-15 11:49:08 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled )
|
2019-01-14 10:41:16 +01:00
|
|
|
content_len = ssl->handshake->ecrs_n;
|
2017-05-16 09:26:48 +02:00
|
|
|
#endif
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_ecdh_calc_secret( &ssl->handshake->ecdh_ctx,
|
2017-05-08 12:06:19 +02:00
|
|
|
&ssl->handshake->pmslen,
|
|
|
|
ssl->handshake->premaster,
|
|
|
|
MBEDTLS_MPI_MAX_SIZE,
|
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 )
|
2013-03-20 14:39:14 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_calc_secret", ret );
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2018-06-13 12:02:12 +02:00
|
|
|
if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
|
|
|
|
ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
|
|
|
|
#endif
|
2013-03-20 14:39:14 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2019-01-31 14:20:20 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
|
|
|
|
MBEDTLS_DEBUG_ECDH_Z );
|
2013-03-20 14:39:14 +01:00
|
|
|
}
|
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
|
|
|
|
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
2017-04-28 18:08:27 +02:00
|
|
|
if( mbedtls_ssl_ciphersuite_uses_psk( ciphersuite_info ) )
|
2013-04-16 18:05:29 +02:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* opaque psk_identity<0..2^16-1>;
|
|
|
|
*/
|
2018-10-26 12:38:07 +02:00
|
|
|
if( ssl_conf_has_static_psk( ssl->conf ) == 0 )
|
2015-07-07 11:41:21 +02:00
|
|
|
{
|
2018-10-23 12:54:44 +02:00
|
|
|
/* We don't offer PSK suites if we don't have a PSK,
|
|
|
|
* and we check that the server's choice is among the
|
|
|
|
* ciphersuites we offered, so this should never happen. */
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2015-07-07 11:41:21 +02:00
|
|
|
}
|
2013-04-16 18:05:29 +02:00
|
|
|
|
2019-01-14 10:41:16 +01:00
|
|
|
header_len = 4;
|
|
|
|
content_len = ssl->conf->psk_identity_len;
|
2015-08-27 16:37:35 +02:00
|
|
|
|
2019-01-14 10:41:16 +01:00
|
|
|
if( header_len + 2 + content_len > MBEDTLS_SSL_OUT_CONTENT_LEN )
|
2015-08-27 16:37:35 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "psk identity too long or SSL buffer too short" ) );
|
2015-08-27 16:37:35 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL );
|
|
|
|
}
|
|
|
|
|
2021-07-16 15:27:50 +02:00
|
|
|
ssl->out_msg[header_len++] = MBEDTLS_BYTE_1( content_len );
|
|
|
|
ssl->out_msg[header_len++] = MBEDTLS_BYTE_0( content_len );
|
2013-04-16 18:05:29 +02:00
|
|
|
|
2019-01-14 10:41:16 +01:00
|
|
|
memcpy( ssl->out_msg + header_len,
|
|
|
|
ssl->conf->psk_identity,
|
|
|
|
ssl->conf->psk_identity_len );
|
|
|
|
header_len += ssl->conf->psk_identity_len;
|
2013-04-16 18:05:29 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK )
|
2013-10-14 13:09:25 +02:00
|
|
|
{
|
2019-01-14 10:41:16 +01:00
|
|
|
content_len = 0;
|
2013-10-14 13:09:25 +02:00
|
|
|
}
|
2013-10-14 14:01:58 +02:00
|
|
|
else
|
|
|
|
#endif
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK )
|
2013-10-14 17:39:48 +02:00
|
|
|
{
|
2018-10-23 12:59:34 +02:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
|
|
/* Opaque PSKs are currently only supported for PSK-only suites. */
|
2018-10-26 12:38:07 +02:00
|
|
|
if( ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
|
2018-10-23 12:59:34 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
|
|
|
2019-01-14 10:41:16 +01:00
|
|
|
if( ( ret = ssl_write_encrypted_pms( ssl, header_len,
|
|
|
|
&content_len, 2 ) ) != 0 )
|
2013-10-14 17:39:48 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK )
|
2013-04-19 14:30:58 +02:00
|
|
|
{
|
2018-10-23 12:59:34 +02:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
|
|
/* Opaque PSKs are currently only supported for PSK-only suites. */
|
2018-10-26 12:38:07 +02:00
|
|
|
if( ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
|
2018-10-23 12:59:34 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
|
|
|
2013-10-14 14:01:58 +02:00
|
|
|
/*
|
|
|
|
* ClientDiffieHellmanPublic public (DHM send G^X mod P)
|
|
|
|
*/
|
2021-05-27 22:17:07 +02:00
|
|
|
content_len = mbedtls_dhm_get_len( &ssl->handshake->dhm_ctx );
|
2015-08-27 16:37:35 +02:00
|
|
|
|
2019-01-14 10:41:16 +01:00
|
|
|
if( header_len + 2 + content_len >
|
|
|
|
MBEDTLS_SSL_OUT_CONTENT_LEN )
|
2015-08-27 16:37:35 +02:00
|
|
|
{
|
2017-05-08 12:06:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "psk identity or DHM size too long or SSL buffer too short" ) );
|
2015-08-27 16:37:35 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL );
|
|
|
|
}
|
|
|
|
|
2021-07-16 15:27:50 +02:00
|
|
|
ssl->out_msg[header_len++] = MBEDTLS_BYTE_1( content_len );
|
|
|
|
ssl->out_msg[header_len++] = MBEDTLS_BYTE_0( content_len );
|
2013-10-14 14:01:58 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
ret = mbedtls_dhm_make_public( &ssl->handshake->dhm_ctx,
|
2021-05-27 22:17:07 +02:00
|
|
|
(int) mbedtls_dhm_get_len( &ssl->handshake->dhm_ctx ),
|
2019-01-14 10:41:16 +01:00
|
|
|
&ssl->out_msg[header_len], content_len,
|
2015-05-07 13:35:38 +02:00
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng );
|
2013-10-14 14:01:58 +02:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_make_public", ret );
|
2013-10-14 14:01:58 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
2013-04-19 14:30:58 +02:00
|
|
|
}
|
2013-10-14 14:01:58 +02:00
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK )
|
2013-10-14 14:01:58 +02:00
|
|
|
{
|
2018-10-23 12:59:34 +02:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
|
|
/* Opaque PSKs are currently only supported for PSK-only suites. */
|
2018-10-26 12:38:07 +02:00
|
|
|
if( ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
|
2018-10-23 12:59:34 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
|
|
|
2013-10-14 14:01:58 +02:00
|
|
|
/*
|
|
|
|
* ClientECDiffieHellmanPublic public;
|
|
|
|
*/
|
2019-01-14 10:41:16 +01:00
|
|
|
ret = mbedtls_ecdh_make_public( &ssl->handshake->ecdh_ctx,
|
|
|
|
&content_len,
|
|
|
|
&ssl->out_msg[header_len],
|
|
|
|
MBEDTLS_SSL_OUT_CONTENT_LEN - header_len,
|
2015-05-07 13:35:38 +02:00
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng );
|
2013-10-14 14:01:58 +02:00
|
|
|
if( ret != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_make_public", ret );
|
2013-10-14 14:01:58 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
2013-04-19 14:30:58 +02:00
|
|
|
|
2019-01-31 14:20:20 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
|
|
|
|
MBEDTLS_DEBUG_ECDH_Q );
|
2013-10-14 14:01:58 +02:00
|
|
|
}
|
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED */
|
2013-10-11 16:53:50 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2013-10-11 16:53:50 +02:00
|
|
|
}
|
2013-04-19 14:30:58 +02:00
|
|
|
|
2018-10-23 16:26:40 +02:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO) && \
|
|
|
|
defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK &&
|
|
|
|
ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 &&
|
2018-10-26 12:38:07 +02:00
|
|
|
ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
|
2018-10-23 16:26:40 +02:00
|
|
|
{
|
2020-06-11 09:34:06 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1,
|
|
|
|
( "skip PMS generation for opaque PSK" ) );
|
2018-10-23 16:26:40 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO &&
|
|
|
|
MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_ssl_psk_derive_premaster( ssl,
|
2013-10-14 13:09:25 +02:00
|
|
|
ciphersuite_info->key_exchange ) ) != 0 )
|
2013-04-19 14:30:58 +02:00
|
|
|
{
|
2020-06-11 09:34:06 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1,
|
|
|
|
"mbedtls_ssl_psk_derive_premaster", ret );
|
2013-04-19 14:30:58 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2019-01-14 10:41:16 +01:00
|
|
|
header_len = 4;
|
|
|
|
if( ( ret = ssl_write_encrypted_pms( ssl, header_len,
|
|
|
|
&content_len, 0 ) ) != 0 )
|
2013-08-21 11:51:08 +02:00
|
|
|
return( ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
2013-04-18 22:46:23 +02:00
|
|
|
else
|
2015-09-16 22:41:06 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED */
|
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
|
|
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE )
|
|
|
|
{
|
2019-01-14 10:41:16 +01:00
|
|
|
header_len = 4;
|
2015-09-16 22:41:06 +02:00
|
|
|
|
|
|
|
ret = mbedtls_ecjpake_write_round_two( &ssl->handshake->ecjpake_ctx,
|
2019-01-14 10:41:16 +01:00
|
|
|
ssl->out_msg + header_len,
|
|
|
|
MBEDTLS_SSL_OUT_CONTENT_LEN - header_len,
|
|
|
|
&content_len,
|
2015-09-16 22:41:06 +02:00
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng );
|
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_write_round_two", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = mbedtls_ecjpake_derive_secret( &ssl->handshake->ecjpake_ctx,
|
|
|
|
ssl->handshake->premaster, 32, &ssl->handshake->pmslen,
|
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng );
|
|
|
|
if( ret != 0 )
|
|
|
|
{
|
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_derive_secret", ret );
|
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED */
|
2013-04-18 22:46:23 +02:00
|
|
|
{
|
|
|
|
((void) ciphersuite_info);
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2013-04-18 22:46:23 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2019-01-14 10:41:16 +01:00
|
|
|
ssl->out_msglen = header_len + content_len;
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
|
|
|
|
ssl->out_msg[0] = MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
ssl->state++;
|
|
|
|
|
2017-09-13 09:38:11 +02:00
|
|
|
if( ( ret = mbedtls_ssl_write_handshake_msg( ssl ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2017-09-13 09:38:11 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_handshake_msg", ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write client key exchange" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if !defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_write_certificate_verify( mbedtls_ssl_context *ssl )
|
2013-04-19 14:30:58 +02:00
|
|
|
{
|
2017-05-11 15:06:43 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
|
2017-12-27 22:34:08 +01:00
|
|
|
ssl->handshake->ciphersuite_info;
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2013-04-19 14:30:58 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) );
|
2013-04-19 14:30:58 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_ssl_derive_keys( ssl ) ) != 0 )
|
2014-10-20 20:33:10 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_derive_keys", ret );
|
2014-10-20 20:33:10 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2019-02-07 13:32:43 +01:00
|
|
|
if( !mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
|
2013-04-19 14:30:58 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
|
2013-04-19 14:30:58 +02:00
|
|
|
ssl->state++;
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2013-04-19 14:30:58 +02:00
|
|
|
}
|
2020-03-10 12:19:08 +01:00
|
|
|
#else /* !MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
|
2015-04-08 12:49:31 +02:00
|
|
|
static int ssl_write_certificate_verify( mbedtls_ssl_context *ssl )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
|
2017-05-11 15:06:43 +02:00
|
|
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
|
2017-12-27 22:34:08 +01:00
|
|
|
ssl->handshake->ciphersuite_info;
|
2012-04-11 14:09:53 +02:00
|
|
|
size_t n = 0, offset = 0;
|
2012-04-18 16:23:57 +02:00
|
|
|
unsigned char hash[48];
|
2013-08-27 13:31:28 +02:00
|
|
|
unsigned char *hash_start = hash;
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_md_type_t md_alg = MBEDTLS_MD_NONE;
|
2019-05-03 11:43:28 +02:00
|
|
|
size_t hashlen;
|
2017-05-17 11:56:15 +02:00
|
|
|
void *rs_ctx = NULL;
|
2021-06-22 00:09:00 +02:00
|
|
|
#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
|
|
|
|
size_t out_buf_len = ssl->out_buf_len - ( ssl->out_msg - ssl->out_buf );
|
|
|
|
#else
|
|
|
|
size_t out_buf_len = MBEDTLS_SSL_OUT_BUFFER_LEN - ( ssl->out_msg - ssl->out_buf );
|
|
|
|
#endif
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-15 11:49:08 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled &&
|
2017-08-24 12:08:33 +02:00
|
|
|
ssl->handshake->ecrs_state == ssl_ecrs_crt_vrfy_sign )
|
2017-08-15 11:49:08 +02:00
|
|
|
{
|
2017-08-24 12:08:33 +02:00
|
|
|
goto sign;
|
2017-08-15 11:49:08 +02:00
|
|
|
}
|
2017-05-17 11:56:15 +02:00
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_ssl_derive_keys( ssl ) ) != 0 )
|
2014-10-20 20:33:10 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_derive_keys", ret );
|
2014-10-20 20:33:10 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2019-02-07 13:32:43 +01:00
|
|
|
if( !mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
|
2013-04-18 22:46:23 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
|
2013-04-18 22:46:23 +02:00
|
|
|
ssl->state++;
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->client_auth == 0 || mbedtls_ssl_own_cert( ssl ) == NULL )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2020-08-25 10:03:19 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
|
|
|
|
ssl->state++;
|
|
|
|
return( 0 );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( mbedtls_ssl_own_key( ssl ) == NULL )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-07-07 11:41:21 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no private key for certificate" ) );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2017-08-24 12:08:33 +02:00
|
|
|
* Make a signature of the handshake digests
|
2009-01-03 22:22:43 +01:00
|
|
|
*/
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-24 12:08:33 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled )
|
|
|
|
ssl->handshake->ecrs_state = ssl_ecrs_crt_vrfy_sign;
|
|
|
|
|
|
|
|
sign:
|
|
|
|
#endif
|
|
|
|
|
2019-05-03 11:43:28 +02:00
|
|
|
ssl->handshake->calc_verify( ssl, hash, &hashlen );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
|
|
|
if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
|
2012-11-23 13:38:07 +01:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* digitally-signed struct {
|
|
|
|
* opaque handshake_messages[handshake_messages_length];
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
* Taking shortcut here. We assume that the server always allows the
|
|
|
|
* PRF Hash function and has sent it in the allowed signature
|
|
|
|
* algorithms list received in the Certificate Request message.
|
|
|
|
*
|
|
|
|
* Until we encounter a server that does not, we will take this
|
|
|
|
* shortcut.
|
|
|
|
*
|
2017-05-08 12:06:19 +02:00
|
|
|
* Reason: Otherwise we should have running hashes for SHA512 and
|
|
|
|
* SHA224 in order to satisfy 'weird' needs from the server
|
|
|
|
* side.
|
2012-11-23 13:38:07 +01:00
|
|
|
*/
|
2017-12-27 22:34:08 +01:00
|
|
|
if( ssl->handshake->ciphersuite_info->mac == MBEDTLS_MD_SHA384 )
|
2012-04-18 16:23:57 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
md_alg = MBEDTLS_MD_SHA384;
|
|
|
|
ssl->out_msg[4] = MBEDTLS_SSL_HASH_SHA384;
|
2012-04-18 16:23:57 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
md_alg = MBEDTLS_MD_SHA256;
|
|
|
|
ssl->out_msg[4] = MBEDTLS_SSL_HASH_SHA256;
|
2012-04-18 16:23:57 +02:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->out_msg[5] = mbedtls_ssl_sig_from_pk( mbedtls_ssl_own_key( ssl ) );
|
2012-04-11 14:09:53 +02:00
|
|
|
|
2013-08-22 14:55:30 +02:00
|
|
|
/* Info from md_alg will be used instead */
|
|
|
|
hashlen = 0;
|
2012-04-11 14:09:53 +02:00
|
|
|
offset = 2;
|
|
|
|
}
|
2013-08-27 21:19:20 +02:00
|
|
|
else
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
2011-01-18 16:27:19 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
2011-01-18 16:27:19 +01:00
|
|
|
}
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2017-08-15 11:49:08 +02:00
|
|
|
if( ssl->handshake->ecrs_enabled )
|
2017-08-17 14:33:31 +02:00
|
|
|
rs_ctx = &ssl->handshake->ecrs_ctx.pk;
|
2017-05-17 11:56:15 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
if( ( ret = mbedtls_pk_sign_restartable( mbedtls_ssl_own_key( ssl ),
|
|
|
|
md_alg, hash_start, hashlen,
|
2021-06-22 00:09:00 +02:00
|
|
|
ssl->out_msg + 6 + offset,
|
|
|
|
out_buf_len - 6 - offset,
|
|
|
|
&n,
|
2017-05-17 11:56:15 +02:00
|
|
|
ssl->conf->f_rng, ssl->conf->p_rng, rs_ctx ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_pk_sign", ret );
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
2018-06-13 12:02:12 +02:00
|
|
|
if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
|
|
|
|
ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
|
|
|
|
#endif
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2021-07-19 12:56:54 +02:00
|
|
|
MBEDTLS_PUT_UINT16_BE( n, ssl->out_msg, offset + 4 );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2012-04-11 14:09:53 +02:00
|
|
|
ssl->out_msglen = 6 + n + offset;
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
|
|
|
|
ssl->out_msg[0] = MBEDTLS_SSL_HS_CERTIFICATE_VERIFY;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
ssl->state++;
|
|
|
|
|
2017-09-13 09:38:11 +02:00
|
|
|
if( ( ret = mbedtls_ssl_write_handshake_msg( ssl ) ) != 0 )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2017-09-13 09:38:11 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_handshake_msg", ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write certificate verify" ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2013-04-18 22:46:23 +02:00
|
|
|
return( ret );
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
2020-03-10 12:19:08 +01:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
|
|
|
static int ssl_parse_new_session_ticket( mbedtls_ssl_context *ssl )
|
2013-07-31 12:58:16 +02:00
|
|
|
{
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2013-07-31 12:58:16 +02:00
|
|
|
uint32_t lifetime;
|
|
|
|
size_t ticket_len;
|
|
|
|
unsigned char *ticket;
|
2014-09-10 21:52:12 +02:00
|
|
|
const unsigned char *msg;
|
2013-07-31 12:58:16 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse new session ticket" ) );
|
2013-07-31 12:58:16 +02:00
|
|
|
|
2018-08-15 14:56:18 +02:00
|
|
|
if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
|
2013-07-31 12:58:16 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
|
2013-07-31 12:58:16 +02:00
|
|
|
return( ret );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
|
2013-07-31 12:58:16 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
|
2017-05-08 12:06:19 +02:00
|
|
|
mbedtls_ssl_send_alert_message(
|
|
|
|
ssl,
|
|
|
|
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
|
2013-07-31 12:58:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* struct {
|
|
|
|
* uint32 ticket_lifetime_hint;
|
|
|
|
* opaque ticket<0..2^16-1>;
|
|
|
|
* } NewSessionTicket;
|
|
|
|
*
|
2014-09-10 21:52:12 +02:00
|
|
|
* 0 . 3 ticket_lifetime_hint
|
|
|
|
* 4 . 5 ticket_len (n)
|
|
|
|
* 6 . 5+n ticket content
|
2013-07-31 12:58:16 +02:00
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ssl->in_msg[0] != MBEDTLS_SSL_HS_NEW_SESSION_TICKET ||
|
|
|
|
ssl->in_hslen < 6 + mbedtls_ssl_hs_hdr_len( ssl ) )
|
2013-07-31 12:58:16 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 10:44:26 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2013-07-31 12:58:16 +02:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
|
2014-09-10 21:52:12 +02:00
|
|
|
|
2018-05-11 11:06:29 +02:00
|
|
|
lifetime = ( ((uint32_t) msg[0]) << 24 ) | ( msg[1] << 16 ) |
|
|
|
|
( msg[2] << 8 ) | ( msg[3] );
|
2013-07-31 12:58:16 +02:00
|
|
|
|
2014-09-10 21:52:12 +02:00
|
|
|
ticket_len = ( msg[4] << 8 ) | ( msg[5] );
|
2013-07-31 12:58:16 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ticket_len + 6 + mbedtls_ssl_hs_hdr_len( ssl ) != ssl->in_hslen )
|
2013-07-31 12:58:16 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
|
2021-06-24 10:44:26 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
2013-07-31 12:58:16 +02:00
|
|
|
}
|
|
|
|
|
2021-01-07 15:47:05 +01:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket length: %" MBEDTLS_PRINTF_SIZET, ticket_len ) );
|
2013-07-31 12:58:16 +02:00
|
|
|
|
2013-08-02 13:24:41 +02:00
|
|
|
/* We're not waiting for a NewSessionTicket message any more */
|
|
|
|
ssl->handshake->new_session_ticket = 0;
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->state = MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC;
|
2013-08-02 13:24:41 +02:00
|
|
|
|
2013-07-31 12:58:16 +02:00
|
|
|
/*
|
|
|
|
* Zero-length ticket means the server changed his mind and doesn't want
|
|
|
|
* to send a ticket after all, so just forget it
|
|
|
|
*/
|
2014-06-17 16:39:18 +02:00
|
|
|
if( ticket_len == 0 )
|
2013-07-31 12:58:16 +02:00
|
|
|
return( 0 );
|
|
|
|
|
2019-01-30 15:46:35 +01:00
|
|
|
if( ssl->session != NULL && ssl->session->ticket != NULL )
|
|
|
|
{
|
|
|
|
mbedtls_platform_zeroize( ssl->session->ticket,
|
|
|
|
ssl->session->ticket_len );
|
|
|
|
mbedtls_free( ssl->session->ticket );
|
|
|
|
ssl->session->ticket = NULL;
|
|
|
|
ssl->session->ticket_len = 0;
|
|
|
|
}
|
|
|
|
|
2018-04-17 16:51:09 +02:00
|
|
|
mbedtls_platform_zeroize( ssl->session_negotiate->ticket,
|
|
|
|
ssl->session_negotiate->ticket_len );
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_free( ssl->session_negotiate->ticket );
|
2013-07-31 12:58:16 +02:00
|
|
|
ssl->session_negotiate->ticket = NULL;
|
|
|
|
ssl->session_negotiate->ticket_len = 0;
|
|
|
|
|
2015-05-26 16:04:06 +02:00
|
|
|
if( ( ticket = mbedtls_calloc( 1, ticket_len ) ) == NULL )
|
2013-07-31 12:58:16 +02:00
|
|
|
{
|
2015-05-27 16:29:56 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "ticket alloc failed" ) );
|
2017-05-03 16:28:34 +02:00
|
|
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
|
|
MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR );
|
2015-05-28 09:33:39 +02:00
|
|
|
return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
|
2013-07-31 12:58:16 +02:00
|
|
|
}
|
|
|
|
|
2014-09-10 21:52:12 +02:00
|
|
|
memcpy( ticket, msg + 6, ticket_len );
|
2013-07-31 12:58:16 +02:00
|
|
|
|
|
|
|
ssl->session_negotiate->ticket = ticket;
|
|
|
|
ssl->session_negotiate->ticket_len = ticket_len;
|
|
|
|
ssl->session_negotiate->ticket_lifetime = lifetime;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* RFC 5077 section 3.4:
|
|
|
|
* "If the client receives a session ticket from the server, then it
|
|
|
|
* discards any Session ID that was sent in the ServerHello."
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket in use, discarding session id" ) );
|
2015-06-18 15:50:37 +02:00
|
|
|
ssl->session_negotiate->id_len = 0;
|
2013-07-31 12:58:16 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse new session ticket" ) );
|
2013-07-31 12:58:16 +02:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_SESSION_TICKETS */
|
2013-07-31 12:58:16 +02:00
|
|
|
|
2009-01-03 22:22:43 +01:00
|
|
|
/*
|
2013-01-25 14:49:24 +01:00
|
|
|
* SSL handshake -- client side -- single step
|
2009-01-03 22:22:43 +01:00
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_ssl_handshake_client_step( mbedtls_ssl_context *ssl )
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "client state: %d", ssl->state ) );
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
/* Change state now, so that it is right in mbedtls_ssl_read_record(), used
|
2014-09-20 13:54:12 +02:00
|
|
|
* by DTLS for dropping out-of-sequence ChangeCipherSpec records */
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
|
|
|
if( ssl->state == MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC &&
|
2014-09-20 13:54:12 +02:00
|
|
|
ssl->handshake->new_session_ticket != 0 )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
ssl->state = MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET;
|
2014-09-20 13:54:12 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-01-25 14:49:24 +01:00
|
|
|
switch( ssl->state )
|
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_HELLO_REQUEST:
|
|
|
|
ssl->state = MBEDTLS_SSL_CLIENT_HELLO;
|
2009-01-03 22:22:43 +01:00
|
|
|
break;
|
|
|
|
|
2013-01-25 14:49:24 +01:00
|
|
|
/*
|
|
|
|
* ==> ClientHello
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_CLIENT_HELLO:
|
2013-01-25 14:49:24 +01:00
|
|
|
ret = ssl_write_client_hello( ssl );
|
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* <== ServerHello
|
|
|
|
* Certificate
|
|
|
|
* ( ServerKeyExchange )
|
|
|
|
* ( CertificateRequest )
|
|
|
|
* ServerHelloDone
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_SERVER_HELLO:
|
2013-01-25 14:49:24 +01:00
|
|
|
ret = ssl_parse_server_hello( ssl );
|
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_SERVER_CERTIFICATE:
|
|
|
|
ret = mbedtls_ssl_parse_certificate( ssl );
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_SERVER_KEY_EXCHANGE:
|
2013-01-25 14:49:24 +01:00
|
|
|
ret = ssl_parse_server_key_exchange( ssl );
|
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_CERTIFICATE_REQUEST:
|
2013-01-25 14:49:24 +01:00
|
|
|
ret = ssl_parse_certificate_request( ssl );
|
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_SERVER_HELLO_DONE:
|
2013-01-25 14:49:24 +01:00
|
|
|
ret = ssl_parse_server_hello_done( ssl );
|
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* ==> ( Certificate/Alert )
|
|
|
|
* ClientKeyExchange
|
|
|
|
* ( CertificateVerify )
|
|
|
|
* ChangeCipherSpec
|
|
|
|
* Finished
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_CLIENT_CERTIFICATE:
|
|
|
|
ret = mbedtls_ssl_write_certificate( ssl );
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_CLIENT_KEY_EXCHANGE:
|
2013-01-25 14:49:24 +01:00
|
|
|
ret = ssl_write_client_key_exchange( ssl );
|
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_CERTIFICATE_VERIFY:
|
2013-01-25 14:49:24 +01:00
|
|
|
ret = ssl_write_certificate_verify( ssl );
|
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC:
|
|
|
|
ret = mbedtls_ssl_write_change_cipher_spec( ssl );
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_CLIENT_FINISHED:
|
|
|
|
ret = mbedtls_ssl_write_finished( ssl );
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
2013-07-31 12:58:16 +02:00
|
|
|
* <== ( NewSessionTicket )
|
|
|
|
* ChangeCipherSpec
|
2013-01-25 14:49:24 +01:00
|
|
|
* Finished
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_SSL_SESSION_TICKETS)
|
|
|
|
case MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET:
|
2014-09-20 13:54:12 +02:00
|
|
|
ret = ssl_parse_new_session_ticket( ssl );
|
|
|
|
break;
|
2013-08-14 13:48:06 +02:00
|
|
|
#endif
|
2014-09-20 13:54:12 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC:
|
|
|
|
ret = mbedtls_ssl_parse_change_cipher_spec( ssl );
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_SERVER_FINISHED:
|
|
|
|
ret = mbedtls_ssl_parse_finished( ssl );
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_FLUSH_BUFFERS:
|
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "handshake: done" ) );
|
|
|
|
ssl->state = MBEDTLS_SSL_HANDSHAKE_WRAPUP;
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
case MBEDTLS_SSL_HANDSHAKE_WRAPUP:
|
|
|
|
mbedtls_ssl_handshake_wrapup( ssl );
|
2013-01-25 14:49:24 +01:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2015-04-08 12:49:31 +02:00
|
|
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "invalid state %d", ssl->state ) );
|
|
|
|
return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
|
2013-01-25 14:49:24 +01:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
return( ret );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_SSL_CLI_C */
|