merge write sig_alg of tls12 and tls13
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com> # Conflicts: # library/ssl_misc.h
This commit is contained in:
parent
1abd1bc22f
commit
f017ee4203
6 changed files with 183 additions and 182 deletions
|
@ -1359,11 +1359,11 @@ struct mbedtls_ssl_config
|
||||||
#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
|
#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
const int *MBEDTLS_PRIVATE(sig_hashes); /*!< allowed signature hashes */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
const uint16_t *MBEDTLS_PRIVATE(tls13_sig_algs); /*!< allowed signature algorithms for TLS 1.3 */
|
const int *MBEDTLS_PRIVATE(sig_hashes); /*!< allowed signature hashes */
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
#endif
|
||||||
|
const uint16_t *MBEDTLS_PRIVATE(sig_algs); /*!< allowed signature algorithms */
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
|
#if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
|
@ -3267,6 +3267,7 @@ void mbedtls_ssl_conf_groups( mbedtls_ssl_config *conf,
|
||||||
const uint16_t *groups );
|
const uint16_t *groups );
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
/**
|
/**
|
||||||
* \brief Set the allowed hashes for signatures during the handshake.
|
* \brief Set the allowed hashes for signatures during the handshake.
|
||||||
*
|
*
|
||||||
|
@ -3296,8 +3297,9 @@ void mbedtls_ssl_conf_groups( mbedtls_ssl_config *conf,
|
||||||
* \param hashes Ordered list of allowed signature hashes,
|
* \param hashes Ordered list of allowed signature hashes,
|
||||||
* terminated by \c MBEDTLS_MD_NONE.
|
* terminated by \c MBEDTLS_MD_NONE.
|
||||||
*/
|
*/
|
||||||
void mbedtls_ssl_conf_sig_hashes( mbedtls_ssl_config *conf,
|
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_sig_hashes( mbedtls_ssl_config *conf,
|
||||||
const int *hashes );
|
const int *hashes );
|
||||||
|
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -199,85 +199,6 @@ static int ssl_write_renegotiation_ext( mbedtls_ssl_context *ssl,
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
||||||
|
|
||||||
/*
|
|
||||||
* Only if we handle at least one key exchange that needs signatures.
|
|
||||||
*/
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
|
||||||
|
|
||||||
static int ssl_write_sig_alg_ext( mbedtls_ssl_context *ssl, unsigned char *buf,
|
|
||||||
const unsigned char *end, size_t *out_len )
|
|
||||||
{
|
|
||||||
unsigned char *p = buf;
|
|
||||||
unsigned char *supported_sig_alg; /* Start of supported_signature_algorithms */
|
|
||||||
size_t supported_sig_alg_len = 0; /* Length of supported_signature_algorithms */
|
|
||||||
|
|
||||||
*out_len = 0;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* enum {
|
|
||||||
* none(0), md5(1), sha1(2), sha224(3), sha256(4), sha384(5),
|
|
||||||
* sha512(6), (255)
|
|
||||||
* } HashAlgorithm;
|
|
||||||
*
|
|
||||||
* enum { anonymous(0), rsa(1), dsa(2), ecdsa(3), (255) }
|
|
||||||
* SignatureAlgorithm;
|
|
||||||
*
|
|
||||||
* struct {
|
|
||||||
* HashAlgorithm hash;
|
|
||||||
* SignatureAlgorithm signature;
|
|
||||||
* } SignatureAndHashAlgorithm;
|
|
||||||
*
|
|
||||||
* SignatureAndHashAlgorithm
|
|
||||||
* supported_signature_algorithms<2..2^16-2>;
|
|
||||||
*/
|
|
||||||
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding signature_algorithms extension" ) );
|
|
||||||
|
|
||||||
/* Check if we have space for header and length field:
|
|
||||||
* - extension_type (2 bytes)
|
|
||||||
* - extension_data_length (2 bytes)
|
|
||||||
* - supported_signature_algorithms_length (2 bytes)
|
|
||||||
*/
|
|
||||||
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 );
|
|
||||||
p += 6;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Write supported_signature_algorithms
|
|
||||||
*/
|
|
||||||
supported_sig_alg = p;
|
|
||||||
for( const uint16_t *sig_alg = mbedtls_ssl_conf_get_sig_algs( ssl->conf );
|
|
||||||
*sig_alg != MBEDTLS_TLS1_3_SIG_NONE; sig_alg++ )
|
|
||||||
{
|
|
||||||
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
|
||||||
MBEDTLS_PUT_UINT16_BE( *sig_alg, p, 0 );
|
|
||||||
p += 2;
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "signature scheme [%x]", *sig_alg ) );
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Length of supported_signature_algorithms */
|
|
||||||
supported_sig_alg_len = p - supported_sig_alg;
|
|
||||||
if( supported_sig_alg_len == 0 )
|
|
||||||
{
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "No signature algorithms defined." ) );
|
|
||||||
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Write extension_type */
|
|
||||||
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SIG_ALG, buf, 0 );
|
|
||||||
/* Write extension_data_length */
|
|
||||||
MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len + 2, buf, 2 );
|
|
||||||
/* Write length of supported_signature_algorithms */
|
|
||||||
MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len, buf, 4 );
|
|
||||||
|
|
||||||
/* Output the total length of signature algorithms extension. */
|
|
||||||
*out_len = p - buf;
|
|
||||||
|
|
||||||
return( 0 );
|
|
||||||
}
|
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 &&
|
|
||||||
MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
|
||||||
|
|
||||||
|
@ -1109,10 +1030,10 @@ static int ssl_write_client_hello( mbedtls_ssl_context *ssl )
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
if( ( ret = ssl_write_sig_alg_ext( ssl, p + 2 + ext_len,
|
if( ( ret = mbedtls_ssl_write_sig_alg_ext( ssl, p + 2 + ext_len,
|
||||||
end, &olen ) ) != 0 )
|
end, &olen ) ) != 0 )
|
||||||
{
|
{
|
||||||
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_sig_alg_ext", ret );
|
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_sig_alg_ext", ret );
|
||||||
return( ret );
|
return( ret );
|
||||||
}
|
}
|
||||||
ext_len += olen;
|
ext_len += olen;
|
||||||
|
|
|
@ -554,6 +554,7 @@ struct mbedtls_ssl_handshake_params
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
unsigned char group_list_heap_allocated;
|
unsigned char group_list_heap_allocated;
|
||||||
|
unsigned char sig_algs_heap_allocated;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
||||||
|
@ -592,6 +593,7 @@ struct mbedtls_ssl_handshake_params
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
const uint16_t *group_list;
|
const uint16_t *group_list;
|
||||||
|
const uint16_t *sig_algs;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_DHM_C)
|
#if defined(MBEDTLS_DHM_C)
|
||||||
|
@ -1719,19 +1721,17 @@ void mbedtls_ssl_tls13_add_hs_msg_to_checksum( mbedtls_ssl_context *ssl,
|
||||||
unsigned char const *msg,
|
unsigned char const *msg,
|
||||||
size_t msg_len );
|
size_t msg_len );
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
/*
|
/*
|
||||||
* Write TLS 1.3 Signature Algorithm extension
|
* Write Signature Algorithm extension
|
||||||
*/
|
*/
|
||||||
int mbedtls_ssl_tls13_write_sig_alg_ext( mbedtls_ssl_context *ssl,
|
int mbedtls_ssl_write_sig_alg_ext( mbedtls_ssl_context *ssl, unsigned char *buf,
|
||||||
unsigned char *buf,
|
const unsigned char *end, size_t *out_len);
|
||||||
unsigned char *end,
|
|
||||||
size_t *out_len);
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
|
||||||
|
|
||||||
/* Get handshake transcript */
|
/* Get handshake transcript */
|
||||||
int mbedtls_ssl_get_handshake_transcript( mbedtls_ssl_context *ssl,
|
int mbedtls_ssl_get_handshake_transcript( mbedtls_ssl_context *ssl,
|
||||||
const mbedtls_md_type_t md,
|
const mbedtls_md_type_t md,
|
||||||
|
@ -1827,7 +1827,7 @@ static inline const void *mbedtls_ssl_conf_get_sig_algs(
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||||
if( mbedtls_ssl_conf_is_tls13_enabled( conf ))
|
if( mbedtls_ssl_conf_is_tls13_enabled( conf ))
|
||||||
return( conf->tls13_sig_algs );
|
return( conf->sig_algs );
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
||||||
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
|
@ -3150,6 +3150,62 @@ static int ssl_handshake_init( mbedtls_ssl_context *ssl )
|
||||||
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
||||||
#endif /* MBEDTLS_ECP_C */
|
#endif /* MBEDTLS_ECP_C */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
|
/* Heap allocate and translate curve_list from internal to IANA group ids */
|
||||||
|
if ( mbedtls_ssl_conf_is_tls12_enabled( ssl->conf ) &&
|
||||||
|
ssl->conf->sig_hashes != NULL )
|
||||||
|
{
|
||||||
|
const int *md;
|
||||||
|
const int *sig_hashes = ssl->conf->sig_hashes;
|
||||||
|
size_t sig_algs_len = 0;
|
||||||
|
uint16_t *p;
|
||||||
|
|
||||||
|
for( md = sig_hashes; *md != MBEDTLS_MD_NONE; md++ )
|
||||||
|
{
|
||||||
|
if( mbedtls_ssl_hash_from_md_alg( *md ) == MBEDTLS_SSL_HASH_NONE )
|
||||||
|
continue;
|
||||||
|
#if defined(MBEDTLS_ECDSA_C)
|
||||||
|
sig_algs_len++;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_RSA_C)
|
||||||
|
sig_algs_len++;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if( sig_algs_len == 0 )
|
||||||
|
return( MBEDTLS_ERR_SSL_BAD_CONFIG );
|
||||||
|
|
||||||
|
ssl->handshake->sig_algs = mbedtls_calloc( sig_algs_len + 1,
|
||||||
|
sizeof( uint16_t ) );
|
||||||
|
if( ssl->handshake->sig_algs == NULL )
|
||||||
|
return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
|
||||||
|
|
||||||
|
p = (uint16_t *)ssl->handshake->sig_algs;
|
||||||
|
for( md = sig_hashes; *md != MBEDTLS_MD_NONE; md++ )
|
||||||
|
{
|
||||||
|
unsigned char hash = mbedtls_ssl_hash_from_md_alg( *md );
|
||||||
|
if( hash == MBEDTLS_SSL_HASH_NONE )
|
||||||
|
continue;
|
||||||
|
#if defined(MBEDTLS_ECDSA_C)
|
||||||
|
*p = (( hash << 8 ) | MBEDTLS_SSL_SIG_ECDSA);
|
||||||
|
p++;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_RSA_C)
|
||||||
|
*p = (( hash << 8 ) | MBEDTLS_SSL_SIG_RSA);
|
||||||
|
p++;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
*p = MBEDTLS_TLS1_3_SIG_NONE;
|
||||||
|
ssl->handshake->sig_algs_heap_allocated = 1;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
ssl->handshake->sig_algs = ssl->conf->sig_algs;
|
||||||
|
ssl->handshake->sig_algs_heap_allocated = 0;
|
||||||
|
}
|
||||||
|
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -3991,6 +4047,7 @@ void mbedtls_ssl_conf_dhm_min_bitlen( mbedtls_ssl_config *conf,
|
||||||
#endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
|
#endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
/*
|
/*
|
||||||
* Set allowed/preferred hashes for handshake signatures
|
* Set allowed/preferred hashes for handshake signatures
|
||||||
*/
|
*/
|
||||||
|
@ -3998,16 +4055,19 @@ void mbedtls_ssl_conf_sig_hashes( mbedtls_ssl_config *conf,
|
||||||
const int *hashes )
|
const int *hashes )
|
||||||
{
|
{
|
||||||
conf->sig_hashes = hashes;
|
conf->sig_hashes = hashes;
|
||||||
|
conf->sig_algs = NULL;
|
||||||
}
|
}
|
||||||
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
/* Configure allowed signature algorithms for handshake */
|
||||||
/* Configure allowed signature algorithms for use in TLS 1.3 */
|
|
||||||
void mbedtls_ssl_conf_sig_algs( mbedtls_ssl_config *conf,
|
void mbedtls_ssl_conf_sig_algs( mbedtls_ssl_config *conf,
|
||||||
const uint16_t* sig_algs )
|
const uint16_t* sig_algs )
|
||||||
{
|
{
|
||||||
conf->tls13_sig_algs = sig_algs;
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
|
conf->sig_hashes = NULL;
|
||||||
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
conf->sig_algs = sig_algs;
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_C)
|
#if defined(MBEDTLS_ECP_C)
|
||||||
|
@ -5498,6 +5558,15 @@ void mbedtls_ssl_handshake_free( mbedtls_ssl_context *ssl )
|
||||||
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
||||||
#endif /* MBEDTLS_ECP_C */
|
#endif /* MBEDTLS_ECP_C */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
|
if ( ssl->handshake->sig_algs_heap_allocated )
|
||||||
|
mbedtls_free( (void*) handshake->sig_algs );
|
||||||
|
handshake->sig_algs = NULL;
|
||||||
|
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
|
#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
|
||||||
if( ssl->conf->f_async_cancel != NULL && handshake->async_in_progress != 0 )
|
if( ssl->conf->f_async_cancel != NULL && handshake->async_in_progress != 0 )
|
||||||
{
|
{
|
||||||
|
@ -6335,6 +6404,7 @@ void mbedtls_ssl_config_init( mbedtls_ssl_config *conf )
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
/* The selection should be the same as mbedtls_x509_crt_profile_default in
|
/* The selection should be the same as mbedtls_x509_crt_profile_default in
|
||||||
* x509_crt.c. Here, the order matters. Currently we favor stronger hashes,
|
* x509_crt.c. Here, the order matters. Currently we favor stronger hashes,
|
||||||
* for no fundamental reason.
|
* for no fundamental reason.
|
||||||
|
@ -6352,7 +6422,8 @@ static int ssl_preset_default_hashes[] = {
|
||||||
#endif
|
#endif
|
||||||
MBEDTLS_MD_NONE
|
MBEDTLS_MD_NONE
|
||||||
};
|
};
|
||||||
#endif
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
/* The selection should be the same as mbedtls_x509_crt_profile_default in
|
/* The selection should be the same as mbedtls_x509_crt_profile_default in
|
||||||
* x509_crt.c, plus Montgomery curves for ECDHE. Here, the order matters:
|
* x509_crt.c, plus Montgomery curves for ECDHE. Here, the order matters:
|
||||||
|
@ -6395,11 +6466,17 @@ static int ssl_preset_suiteb_ciphersuites[] = {
|
||||||
};
|
};
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
static int ssl_preset_suiteb_hashes[] = {
|
static int ssl_preset_suiteb_hashes[] = {
|
||||||
MBEDTLS_MD_SHA256,
|
#if defined(MBEDTLS_SHA384_C)
|
||||||
MBEDTLS_MD_SHA384,
|
MBEDTLS_MD_SHA384,
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_SHA256_C)
|
||||||
|
MBEDTLS_MD_SHA256,
|
||||||
|
#endif
|
||||||
MBEDTLS_MD_NONE
|
MBEDTLS_MD_NONE
|
||||||
};
|
};
|
||||||
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||||
static uint16_t ssl_preset_default_sig_algs[] = {
|
static uint16_t ssl_preset_default_sig_algs[] = {
|
||||||
|
@ -6563,10 +6640,10 @@ int mbedtls_ssl_config_defaults( mbedtls_ssl_config *conf,
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
conf->sig_hashes = ssl_preset_suiteb_hashes;
|
conf->sig_hashes = ssl_preset_suiteb_hashes;
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
||||||
conf->tls13_sig_algs = ssl_preset_suiteb_sig_algs;
|
conf->sig_algs = ssl_preset_suiteb_sig_algs;
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
|
#if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
|
@ -6601,10 +6678,10 @@ int mbedtls_ssl_config_defaults( mbedtls_ssl_config *conf,
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
conf->sig_hashes = ssl_preset_default_hashes;
|
conf->sig_hashes = ssl_preset_default_hashes;
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
||||||
conf->tls13_sig_algs = ssl_preset_default_sig_algs;
|
conf->sig_algs = ssl_preset_default_sig_algs;
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
|
#if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
|
@ -7332,4 +7409,79 @@ int mbedtls_ssl_write_supported_groups_ext( mbedtls_ssl_context *ssl,
|
||||||
MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
|
MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
|
||||||
MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
/*
|
||||||
|
* mbedtls_ssl_tls13_write_sig_alg_ext( )
|
||||||
|
*
|
||||||
|
* enum {
|
||||||
|
* ....
|
||||||
|
* ecdsa_secp256r1_sha256( 0x0403 ),
|
||||||
|
* ecdsa_secp384r1_sha384( 0x0503 ),
|
||||||
|
* ecdsa_secp521r1_sha512( 0x0603 ),
|
||||||
|
* ....
|
||||||
|
* } SignatureScheme;
|
||||||
|
*
|
||||||
|
* struct {
|
||||||
|
* SignatureScheme supported_signature_algorithms<2..2^16-2>;
|
||||||
|
* } SignatureSchemeList;
|
||||||
|
*
|
||||||
|
* Only if we handle at least one key exchange that needs signatures.
|
||||||
|
*/
|
||||||
|
int mbedtls_ssl_write_sig_alg_ext( mbedtls_ssl_context *ssl, unsigned char *buf,
|
||||||
|
const unsigned char *end, size_t *out_len )
|
||||||
|
{
|
||||||
|
unsigned char *p = buf;
|
||||||
|
unsigned char *supported_sig_alg; /* Start of supported_signature_algorithms */
|
||||||
|
size_t supported_sig_alg_len = 0; /* Length of supported_signature_algorithms */
|
||||||
|
|
||||||
|
*out_len = 0;
|
||||||
|
|
||||||
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding signature_algorithms extension" ) );
|
||||||
|
|
||||||
|
/* Check if we have space for header and length field:
|
||||||
|
* - extension_type (2 bytes)
|
||||||
|
* - extension_data_length (2 bytes)
|
||||||
|
* - supported_signature_algorithms_length (2 bytes)
|
||||||
|
*/
|
||||||
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 );
|
||||||
|
p += 6;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Write supported_signature_algorithms
|
||||||
|
*/
|
||||||
|
supported_sig_alg = p;
|
||||||
|
for( const uint16_t *sig_alg = mbedtls_ssl_conf_get_sig_algs( ssl->conf );
|
||||||
|
*sig_alg != MBEDTLS_TLS1_3_SIG_NONE; sig_alg++ )
|
||||||
|
{
|
||||||
|
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
||||||
|
MBEDTLS_PUT_UINT16_BE( *sig_alg, p, 0 );
|
||||||
|
p += 2;
|
||||||
|
MBEDTLS_SSL_DEBUG_MSG( 3, ( "signature scheme [%x]", *sig_alg ) );
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Length of supported_signature_algorithms */
|
||||||
|
supported_sig_alg_len = p - supported_sig_alg;
|
||||||
|
if( supported_sig_alg_len == 0 )
|
||||||
|
{
|
||||||
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "No signature algorithms defined." ) );
|
||||||
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Write extension_type */
|
||||||
|
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SIG_ALG, buf, 0 );
|
||||||
|
/* Write extension_data_length */
|
||||||
|
MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len + 2, buf, 2 );
|
||||||
|
/* Write length of supported_signature_algorithms */
|
||||||
|
MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len, buf, 4 );
|
||||||
|
|
||||||
|
/* Output the total length of signature algorithms extension. */
|
||||||
|
*out_len = p - buf;
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
|
||||||
|
ssl->handshake->extensions_present |= MBEDTLS_SSL_EXT_SIG_ALG;
|
||||||
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
|
||||||
|
return( 0 );
|
||||||
|
}
|
||||||
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
#endif /* MBEDTLS_SSL_TLS_C */
|
#endif /* MBEDTLS_SSL_TLS_C */
|
||||||
|
|
|
@ -630,7 +630,7 @@ static int ssl_tls13_write_client_hello_body( mbedtls_ssl_context *ssl,
|
||||||
return( ret );
|
return( ret );
|
||||||
p += output_len;
|
p += output_len;
|
||||||
|
|
||||||
ret = mbedtls_ssl_tls13_write_sig_alg_ext( ssl, p, end, &output_len );
|
ret = mbedtls_ssl_write_sig_alg_ext( ssl, p, end, &output_len );
|
||||||
if( ret != 0 )
|
if( ret != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
p += output_len;
|
p += output_len;
|
||||||
|
|
|
@ -136,80 +136,6 @@ void mbedtls_ssl_tls13_add_hs_hdr_to_checksum( mbedtls_ssl_context *ssl,
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
|
||||||
/*
|
|
||||||
* mbedtls_ssl_tls13_write_sig_alg_ext( )
|
|
||||||
*
|
|
||||||
* enum {
|
|
||||||
* ....
|
|
||||||
* ecdsa_secp256r1_sha256( 0x0403 ),
|
|
||||||
* ecdsa_secp384r1_sha384( 0x0503 ),
|
|
||||||
* ecdsa_secp521r1_sha512( 0x0603 ),
|
|
||||||
* ....
|
|
||||||
* } SignatureScheme;
|
|
||||||
*
|
|
||||||
* struct {
|
|
||||||
* SignatureScheme supported_signature_algorithms<2..2^16-2>;
|
|
||||||
* } SignatureSchemeList;
|
|
||||||
*
|
|
||||||
* Only if we handle at least one key exchange that needs signatures.
|
|
||||||
*/
|
|
||||||
int mbedtls_ssl_tls13_write_sig_alg_ext( mbedtls_ssl_context *ssl,
|
|
||||||
unsigned char *buf,
|
|
||||||
unsigned char *end,
|
|
||||||
size_t *out_len )
|
|
||||||
{
|
|
||||||
unsigned char *p = buf;
|
|
||||||
unsigned char *supported_sig_alg; /* Start of supported_signature_algorithms */
|
|
||||||
size_t supported_sig_alg_len = 0; /* Length of supported_signature_algorithms */
|
|
||||||
|
|
||||||
*out_len = 0;
|
|
||||||
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding signature_algorithms extension" ) );
|
|
||||||
|
|
||||||
/* Check if we have space for header and length field:
|
|
||||||
* - extension_type (2 bytes)
|
|
||||||
* - extension_data_length (2 bytes)
|
|
||||||
* - supported_signature_algorithms_length (2 bytes)
|
|
||||||
*/
|
|
||||||
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 );
|
|
||||||
p += 6;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Write supported_signature_algorithms
|
|
||||||
*/
|
|
||||||
supported_sig_alg = p;
|
|
||||||
for( const uint16_t *sig_alg = mbedtls_ssl_conf_get_sig_algs( ssl->conf );
|
|
||||||
*sig_alg != MBEDTLS_TLS1_3_SIG_NONE; sig_alg++ )
|
|
||||||
{
|
|
||||||
MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
|
|
||||||
MBEDTLS_PUT_UINT16_BE( *sig_alg, p, 0 );
|
|
||||||
p += 2;
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "signature scheme [%x]", *sig_alg ) );
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Length of supported_signature_algorithms */
|
|
||||||
supported_sig_alg_len = p - supported_sig_alg;
|
|
||||||
if( supported_sig_alg_len == 0 )
|
|
||||||
{
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "No signature algorithms defined." ) );
|
|
||||||
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Write extension_type */
|
|
||||||
MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SIG_ALG, buf, 0 );
|
|
||||||
/* Write extension_data_length */
|
|
||||||
MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len + 2, buf, 2 );
|
|
||||||
/* Write length of supported_signature_algorithms */
|
|
||||||
MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len, buf, 4 );
|
|
||||||
|
|
||||||
/* Output the total length of signature algorithms extension. */
|
|
||||||
*out_len = p - buf;
|
|
||||||
|
|
||||||
ssl->handshake->extensions_present |= MBEDTLS_SSL_EXT_SIG_ALG;
|
|
||||||
return( 0 );
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* STATE HANDLING: Read CertificateVerify
|
* STATE HANDLING: Read CertificateVerify
|
||||||
*/
|
*/
|
||||||
|
|
Loading…
Reference in a new issue