ssl_tls.c 63 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275
  1. /*
  2. * SSLv3/TLSv1 shared functions
  3. *
  4. * Copyright (C) 2006-2010, Brainspark B.V.
  5. *
  6. * This file is part of PolarSSL (http://www.polarssl.org)
  7. * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
  8. *
  9. * All rights reserved.
  10. *
  11. * This program is free software; you can redistribute it and/or modify
  12. * it under the terms of the GNU General Public License as published by
  13. * the Free Software Foundation; either version 2 of the License, or
  14. * (at your option) any later version.
  15. *
  16. * This program is distributed in the hope that it will be useful,
  17. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  18. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  19. * GNU General Public License for more details.
  20. *
  21. * You should have received a copy of the GNU General Public License along
  22. * with this program; if not, write to the Free Software Foundation, Inc.,
  23. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  24. */
  25. /*
  26. * The SSL 3.0 specification was drafted by Netscape in 1996,
  27. * and became an IETF standard in 1999.
  28. *
  29. * http://wp.netscape.com/eng/ssl3/
  30. * http://www.ietf.org/rfc/rfc2246.txt
  31. * http://www.ietf.org/rfc/rfc4346.txt
  32. */
  33. #include "config.h"
  34. #include "FreeRTOS.h"
  35. #include "task.h"
  36. #if defined(POLARSSL_SSL_TLS_C)
  37. #include "polarssl/aes.h"
  38. #include "polarssl/arc4.h"
  39. #include "polarssl/camellia.h"
  40. #include "polarssl/des.h"
  41. #include "polarssl/debug.h"
  42. #include "polarssl/ssl.h"
  43. #include <stdlib.h>
  44. #include <time.h>
  45. #if defined _MSC_VER && !defined strcasecmp
  46. #define strcasecmp _stricmp
  47. #endif
  48. /*
  49. * Key material generation
  50. */
  51. static int tls1_prf( unsigned char *secret, size_t slen, char *label,
  52. unsigned char *random, size_t rlen,
  53. unsigned char *dstbuf, size_t dlen )
  54. {
  55. size_t nb, hs;
  56. size_t i, j, k;
  57. unsigned char *S1, *S2;
  58. unsigned char tmp[128];
  59. unsigned char h_i[20];
  60. if( sizeof( tmp ) < 20 + strlen( label ) + rlen )
  61. return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
  62. hs = ( slen + 1 ) / 2;
  63. S1 = secret;
  64. S2 = secret + slen - hs;
  65. nb = strlen( label );
  66. memcpy( tmp + 20, label, nb );
  67. memcpy( tmp + 20 + nb, random, rlen );
  68. nb += rlen;
  69. /*
  70. * First compute P_md5(secret,label+random)[0..dlen]
  71. */
  72. md5_hmac( S1, hs, tmp + 20, nb, 4 + tmp );
  73. for( i = 0; i < dlen; i += 16 )
  74. {
  75. md5_hmac( S1, hs, 4 + tmp, 16 + nb, h_i );
  76. md5_hmac( S1, hs, 4 + tmp, 16, 4 + tmp );
  77. k = ( i + 16 > dlen ) ? dlen % 16 : 16;
  78. for( j = 0; j < k; j++ )
  79. dstbuf[i + j] = h_i[j];
  80. }
  81. /*
  82. * XOR out with P_sha1(secret,label+random)[0..dlen]
  83. */
  84. sha1_hmac( S2, hs, tmp + 20, nb, tmp );
  85. for( i = 0; i < dlen; i += 20 )
  86. {
  87. sha1_hmac( S2, hs, tmp, 20 + nb, h_i );
  88. sha1_hmac( S2, hs, tmp, 20, tmp );
  89. k = ( i + 20 > dlen ) ? dlen % 20 : 20;
  90. for( j = 0; j < k; j++ )
  91. dstbuf[i + j] = (unsigned char)( dstbuf[i + j] ^ h_i[j] );
  92. }
  93. memset( tmp, 0, sizeof( tmp ) );
  94. memset( h_i, 0, sizeof( h_i ) );
  95. return( 0 );
  96. }
  97. int ssl_derive_keys( ssl_context *ssl )
  98. {
  99. int i;
  100. md5_context md5;
  101. sha1_context sha1;
  102. unsigned char tmp[64];
  103. unsigned char padding[16];
  104. unsigned char sha1sum[20];
  105. unsigned char keyblk[256];
  106. unsigned char *key1;
  107. unsigned char *key2;
  108. SSL_DEBUG_MSG( 2, ( "=> derive keys" ) );
  109. /*
  110. * SSLv3:
  111. * master =
  112. * MD5( premaster + SHA1( 'A' + premaster + randbytes ) ) +
  113. * MD5( premaster + SHA1( 'BB' + premaster + randbytes ) ) +
  114. * MD5( premaster + SHA1( 'CCC' + premaster + randbytes ) )
  115. *
  116. * TLSv1:
  117. * master = PRF( premaster, "master secret", randbytes )[0..47]
  118. */
  119. if( ssl->resume == 0 )
  120. {
  121. size_t len = ssl->pmslen;
  122. SSL_DEBUG_BUF( 3, "premaster secret", ssl->premaster, len );
  123. if( ssl->minor_ver == SSL_MINOR_VERSION_0 )
  124. {
  125. for( i = 0; i < 3; i++ )
  126. {
  127. memset( padding, 'A' + i, 1 + i );
  128. sha1_starts( &sha1 );
  129. sha1_update( &sha1, padding, 1 + i );
  130. sha1_update( &sha1, ssl->premaster, len );
  131. sha1_update( &sha1, ssl->randbytes, 64 );
  132. sha1_finish( &sha1, sha1sum );
  133. md5_starts( &md5 );
  134. md5_update( &md5, ssl->premaster, len );
  135. md5_update( &md5, sha1sum, 20 );
  136. md5_finish( &md5, ssl->session->master + i * 16 );
  137. }
  138. }
  139. else
  140. tls1_prf( ssl->premaster, len, "master secret",
  141. ssl->randbytes, 64, ssl->session->master, 48 );
  142. memset( ssl->premaster, 0, sizeof( ssl->premaster ) );
  143. }
  144. else
  145. SSL_DEBUG_MSG( 3, ( "no premaster (session resumed)" ) );
  146. /*
  147. * Swap the client and server random values.
  148. */
  149. memcpy( tmp, ssl->randbytes, 64 );
  150. memcpy( ssl->randbytes, tmp + 32, 32 );
  151. memcpy( ssl->randbytes + 32, tmp, 32 );
  152. memset( tmp, 0, sizeof( tmp ) );
  153. /*
  154. * SSLv3:
  155. * key block =
  156. * MD5( master + SHA1( 'A' + master + randbytes ) ) +
  157. * MD5( master + SHA1( 'BB' + master + randbytes ) ) +
  158. * MD5( master + SHA1( 'CCC' + master + randbytes ) ) +
  159. * MD5( master + SHA1( 'DDDD' + master + randbytes ) ) +
  160. * ...
  161. *
  162. * TLSv1:
  163. * key block = PRF( master, "key expansion", randbytes )
  164. */
  165. if( ssl->minor_ver == SSL_MINOR_VERSION_0 )
  166. {
  167. for( i = 0; i < 16; i++ )
  168. {
  169. memset( padding, 'A' + i, 1 + i );
  170. sha1_starts( &sha1 );
  171. sha1_update( &sha1, padding, 1 + i );
  172. sha1_update( &sha1, ssl->session->master, 48 );
  173. sha1_update( &sha1, ssl->randbytes, 64 );
  174. sha1_finish( &sha1, sha1sum );
  175. md5_starts( &md5 );
  176. md5_update( &md5, ssl->session->master, 48 );
  177. md5_update( &md5, sha1sum, 20 );
  178. md5_finish( &md5, keyblk + i * 16 );
  179. }
  180. memset( &md5, 0, sizeof( md5 ) );
  181. memset( &sha1, 0, sizeof( sha1 ) );
  182. memset( padding, 0, sizeof( padding ) );
  183. memset( sha1sum, 0, sizeof( sha1sum ) );
  184. }
  185. else
  186. tls1_prf( ssl->session->master, 48, "key expansion",
  187. ssl->randbytes, 64, keyblk, 256 );
  188. SSL_DEBUG_MSG( 3, ( "ciphersuite = %s", ssl_get_ciphersuite( ssl ) ) );
  189. SSL_DEBUG_BUF( 3, "master secret", ssl->session->master, 48 );
  190. SSL_DEBUG_BUF( 4, "random bytes", ssl->randbytes, 64 );
  191. SSL_DEBUG_BUF( 4, "key block", keyblk, 256 );
  192. memset( ssl->randbytes, 0, sizeof( ssl->randbytes ) );
  193. /*
  194. * Determine the appropriate key, IV and MAC length.
  195. */
  196. switch( ssl->session->ciphersuite )
  197. {
  198. #if defined(POLARSSL_ARC4_C)
  199. case SSL_RSA_RC4_128_MD5:
  200. ssl->keylen = 16; ssl->minlen = 16;
  201. ssl->ivlen = 0; ssl->maclen = 16;
  202. break;
  203. case SSL_RSA_RC4_128_SHA:
  204. ssl->keylen = 16; ssl->minlen = 20;
  205. ssl->ivlen = 0; ssl->maclen = 20;
  206. break;
  207. #endif
  208. #if defined(POLARSSL_DES_C)
  209. case SSL_RSA_DES_168_SHA:
  210. case SSL_EDH_RSA_DES_168_SHA:
  211. ssl->keylen = 24; ssl->minlen = 24;
  212. ssl->ivlen = 8; ssl->maclen = 20;
  213. break;
  214. #endif
  215. #if defined(POLARSSL_AES_C)
  216. case SSL_RSA_AES_128_SHA:
  217. case SSL_EDH_RSA_AES_128_SHA:
  218. ssl->keylen = 16; ssl->minlen = 32;
  219. ssl->ivlen = 16; ssl->maclen = 20;
  220. break;
  221. case SSL_RSA_AES_256_SHA:
  222. case SSL_EDH_RSA_AES_256_SHA:
  223. ssl->keylen = 32; ssl->minlen = 32;
  224. ssl->ivlen = 16; ssl->maclen = 20;
  225. break;
  226. #endif
  227. #if defined(POLARSSL_CAMELLIA_C)
  228. case SSL_RSA_CAMELLIA_128_SHA:
  229. case SSL_EDH_RSA_CAMELLIA_128_SHA:
  230. ssl->keylen = 16; ssl->minlen = 32;
  231. ssl->ivlen = 16; ssl->maclen = 20;
  232. break;
  233. case SSL_RSA_CAMELLIA_256_SHA:
  234. case SSL_EDH_RSA_CAMELLIA_256_SHA:
  235. ssl->keylen = 32; ssl->minlen = 32;
  236. ssl->ivlen = 16; ssl->maclen = 20;
  237. break;
  238. #endif
  239. default:
  240. SSL_DEBUG_MSG( 1, ( "ciphersuite %s is not available",
  241. ssl_get_ciphersuite( ssl ) ) );
  242. return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
  243. }
  244. SSL_DEBUG_MSG( 3, ( "keylen: %d, minlen: %d, ivlen: %d, maclen: %d",
  245. ssl->keylen, ssl->minlen, ssl->ivlen, ssl->maclen ) );
  246. /*
  247. * Finally setup the cipher contexts, IVs and MAC secrets.
  248. */
  249. if( ssl->endpoint == SSL_IS_CLIENT )
  250. {
  251. key1 = keyblk + ssl->maclen * 2;
  252. key2 = keyblk + ssl->maclen * 2 + ssl->keylen;
  253. memcpy( ssl->mac_enc, keyblk, ssl->maclen );
  254. memcpy( ssl->mac_dec, keyblk + ssl->maclen, ssl->maclen );
  255. /*
  256. * This is not used in TLS v1.1.
  257. */
  258. memcpy( ssl->iv_enc, key2 + ssl->keylen, ssl->ivlen );
  259. memcpy( ssl->iv_dec, key2 + ssl->keylen + ssl->ivlen,
  260. ssl->ivlen );
  261. }
  262. else
  263. {
  264. key1 = keyblk + ssl->maclen * 2 + ssl->keylen;
  265. key2 = keyblk + ssl->maclen * 2;
  266. memcpy( ssl->mac_dec, keyblk, ssl->maclen );
  267. memcpy( ssl->mac_enc, keyblk + ssl->maclen, ssl->maclen );
  268. /*
  269. * This is not used in TLS v1.1.
  270. */
  271. memcpy( ssl->iv_dec, key1 + ssl->keylen, ssl->ivlen );
  272. memcpy( ssl->iv_enc, key1 + ssl->keylen + ssl->ivlen,
  273. ssl->ivlen );
  274. }
  275. switch( ssl->session->ciphersuite )
  276. {
  277. #if defined(POLARSSL_ARC4_C)
  278. case SSL_RSA_RC4_128_MD5:
  279. case SSL_RSA_RC4_128_SHA:
  280. arc4_setup( (arc4_context *) ssl->ctx_enc, key1, ssl->keylen );
  281. arc4_setup( (arc4_context *) ssl->ctx_dec, key2, ssl->keylen );
  282. break;
  283. #endif
  284. #if defined(POLARSSL_DES_C)
  285. case SSL_RSA_DES_168_SHA:
  286. case SSL_EDH_RSA_DES_168_SHA:
  287. des3_set3key_enc( (des3_context *) ssl->ctx_enc, key1 );
  288. des3_set3key_dec( (des3_context *) ssl->ctx_dec, key2 );
  289. break;
  290. #endif
  291. #if defined(POLARSSL_AES_C)
  292. case SSL_RSA_AES_128_SHA:
  293. case SSL_EDH_RSA_AES_128_SHA:
  294. aes_setkey_enc( (aes_context *) ssl->ctx_enc, key1, 128 );
  295. aes_setkey_dec( (aes_context *) ssl->ctx_dec, key2, 128 );
  296. break;
  297. case SSL_RSA_AES_256_SHA:
  298. case SSL_EDH_RSA_AES_256_SHA:
  299. aes_setkey_enc( (aes_context *) ssl->ctx_enc, key1, 256 );
  300. aes_setkey_dec( (aes_context *) ssl->ctx_dec, key2, 256 );
  301. break;
  302. #endif
  303. #if defined(POLARSSL_CAMELLIA_C)
  304. case SSL_RSA_CAMELLIA_128_SHA:
  305. case SSL_EDH_RSA_CAMELLIA_128_SHA:
  306. camellia_setkey_enc( (camellia_context *) ssl->ctx_enc, key1, 128 );
  307. camellia_setkey_dec( (camellia_context *) ssl->ctx_dec, key2, 128 );
  308. break;
  309. case SSL_RSA_CAMELLIA_256_SHA:
  310. case SSL_EDH_RSA_CAMELLIA_256_SHA:
  311. camellia_setkey_enc( (camellia_context *) ssl->ctx_enc, key1, 256 );
  312. camellia_setkey_dec( (camellia_context *) ssl->ctx_dec, key2, 256 );
  313. break;
  314. #endif
  315. default:
  316. return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
  317. }
  318. memset( keyblk, 0, sizeof( keyblk ) );
  319. SSL_DEBUG_MSG( 2, ( "<= derive keys" ) );
  320. return( 0 );
  321. }
  322. void ssl_calc_verify( ssl_context *ssl, unsigned char hash[36] )
  323. {
  324. md5_context md5;
  325. sha1_context sha1;
  326. unsigned char pad_1[48];
  327. unsigned char pad_2[48];
  328. SSL_DEBUG_MSG( 2, ( "=> calc verify" ) );
  329. memcpy( &md5 , &ssl->fin_md5 , sizeof( md5_context ) );
  330. memcpy( &sha1, &ssl->fin_sha1, sizeof( sha1_context ) );
  331. if( ssl->minor_ver == SSL_MINOR_VERSION_0 )
  332. {
  333. memset( pad_1, 0x36, 48 );
  334. memset( pad_2, 0x5C, 48 );
  335. md5_update( &md5, ssl->session->master, 48 );
  336. md5_update( &md5, pad_1, 48 );
  337. md5_finish( &md5, hash );
  338. md5_starts( &md5 );
  339. md5_update( &md5, ssl->session->master, 48 );
  340. md5_update( &md5, pad_2, 48 );
  341. md5_update( &md5, hash, 16 );
  342. md5_finish( &md5, hash );
  343. sha1_update( &sha1, ssl->session->master, 48 );
  344. sha1_update( &sha1, pad_1, 40 );
  345. sha1_finish( &sha1, hash + 16 );
  346. sha1_starts( &sha1 );
  347. sha1_update( &sha1, ssl->session->master, 48 );
  348. sha1_update( &sha1, pad_2, 40 );
  349. sha1_update( &sha1, hash + 16, 20 );
  350. sha1_finish( &sha1, hash + 16 );
  351. }
  352. else /* TLSv1 */
  353. {
  354. md5_finish( &md5, hash );
  355. sha1_finish( &sha1, hash + 16 );
  356. }
  357. SSL_DEBUG_BUF( 3, "calculated verify result", hash, 36 );
  358. SSL_DEBUG_MSG( 2, ( "<= calc verify" ) );
  359. return;
  360. }
  361. /*
  362. * SSLv3.0 MAC functions
  363. */
  364. static void ssl_mac_md5( unsigned char *secret,
  365. unsigned char *buf, size_t len,
  366. unsigned char *ctr, int type )
  367. {
  368. unsigned char header[11];
  369. unsigned char padding[48];
  370. md5_context md5;
  371. memcpy( header, ctr, 8 );
  372. header[ 8] = (unsigned char) type;
  373. header[ 9] = (unsigned char)( len >> 8 );
  374. header[10] = (unsigned char)( len );
  375. memset( padding, 0x36, 48 );
  376. md5_starts( &md5 );
  377. md5_update( &md5, secret, 16 );
  378. md5_update( &md5, padding, 48 );
  379. md5_update( &md5, header, 11 );
  380. md5_update( &md5, buf, len );
  381. md5_finish( &md5, buf + len );
  382. memset( padding, 0x5C, 48 );
  383. md5_starts( &md5 );
  384. md5_update( &md5, secret, 16 );
  385. md5_update( &md5, padding, 48 );
  386. md5_update( &md5, buf + len, 16 );
  387. md5_finish( &md5, buf + len );
  388. }
  389. static void ssl_mac_sha1( unsigned char *secret,
  390. unsigned char *buf, size_t len,
  391. unsigned char *ctr, int type )
  392. {
  393. unsigned char header[11];
  394. unsigned char padding[40];
  395. sha1_context sha1;
  396. memcpy( header, ctr, 8 );
  397. header[ 8] = (unsigned char) type;
  398. header[ 9] = (unsigned char)( len >> 8 );
  399. header[10] = (unsigned char)( len );
  400. memset( padding, 0x36, 40 );
  401. sha1_starts( &sha1 );
  402. sha1_update( &sha1, secret, 20 );
  403. sha1_update( &sha1, padding, 40 );
  404. sha1_update( &sha1, header, 11 );
  405. sha1_update( &sha1, buf, len );
  406. sha1_finish( &sha1, buf + len );
  407. memset( padding, 0x5C, 40 );
  408. sha1_starts( &sha1 );
  409. sha1_update( &sha1, secret, 20 );
  410. sha1_update( &sha1, padding, 40 );
  411. sha1_update( &sha1, buf + len, 20 );
  412. sha1_finish( &sha1, buf + len );
  413. }
  414. /*
  415. * Encryption/decryption functions
  416. */
  417. static int ssl_encrypt_buf( ssl_context *ssl )
  418. {
  419. size_t i, padlen;
  420. SSL_DEBUG_MSG( 2, ( "=> encrypt buf" ) );
  421. /*
  422. * Add MAC then encrypt
  423. */
  424. if( ssl->minor_ver == SSL_MINOR_VERSION_0 )
  425. {
  426. if( ssl->maclen == 16 )
  427. ssl_mac_md5( ssl->mac_enc,
  428. ssl->out_msg, ssl->out_msglen,
  429. ssl->out_ctr, ssl->out_msgtype );
  430. if( ssl->maclen == 20 )
  431. ssl_mac_sha1( ssl->mac_enc,
  432. ssl->out_msg, ssl->out_msglen,
  433. ssl->out_ctr, ssl->out_msgtype );
  434. }
  435. else
  436. {
  437. if( ssl->maclen == 16 )
  438. md5_hmac( ssl->mac_enc, 16,
  439. ssl->out_ctr, ssl->out_msglen + 13,
  440. ssl->out_msg + ssl->out_msglen );
  441. if( ssl->maclen == 20 )
  442. sha1_hmac( ssl->mac_enc, 20,
  443. ssl->out_ctr, ssl->out_msglen + 13,
  444. ssl->out_msg + ssl->out_msglen );
  445. }
  446. SSL_DEBUG_BUF( 4, "computed mac",
  447. ssl->out_msg + ssl->out_msglen, ssl->maclen );
  448. ssl->out_msglen += ssl->maclen;
  449. for( i = 8; i > 0; i-- )
  450. if( ++ssl->out_ctr[i - 1] != 0 )
  451. break;
  452. if( ssl->ivlen == 0 )
  453. {
  454. #if defined(POLARSSL_ARC4_C)
  455. padlen = 0;
  456. SSL_DEBUG_MSG( 3, ( "before encrypt: msglen = %d, "
  457. "including %d bytes of padding",
  458. ssl->out_msglen, 0 ) );
  459. SSL_DEBUG_BUF( 4, "before encrypt: output payload",
  460. ssl->out_msg, ssl->out_msglen );
  461. arc4_crypt( (arc4_context *) ssl->ctx_enc,
  462. ssl->out_msglen, ssl->out_msg,
  463. ssl->out_msg );
  464. #else
  465. return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
  466. #endif
  467. }
  468. else
  469. {
  470. unsigned char *enc_msg;
  471. size_t enc_msglen;
  472. padlen = ssl->ivlen - ( ssl->out_msglen + 1 ) % ssl->ivlen;
  473. if( padlen == ssl->ivlen )
  474. padlen = 0;
  475. for( i = 0; i <= padlen; i++ )
  476. ssl->out_msg[ssl->out_msglen + i] = (unsigned char) padlen;
  477. ssl->out_msglen += padlen + 1;
  478. enc_msglen = ssl->out_msglen;
  479. enc_msg = ssl->out_msg;
  480. /*
  481. * Prepend per-record IV for block cipher in TLS v1.1 as per
  482. * Method 1 (6.2.3.2. in RFC4346)
  483. */
  484. if( ssl->minor_ver == SSL_MINOR_VERSION_2 )
  485. {
  486. /*
  487. * Generate IV
  488. */
  489. for( i = 0; i < ssl->ivlen; i++ )
  490. ssl->iv_enc[i] = ssl->f_rng( ssl->p_rng );
  491. /*
  492. * Shift message for ivlen bytes and prepend IV
  493. */
  494. memmove( ssl->out_msg + ssl->ivlen, ssl->out_msg, ssl->out_msglen );
  495. memcpy( ssl->out_msg, ssl->iv_enc, ssl->ivlen );
  496. /*
  497. * Fix pointer positions and message length with added IV
  498. */
  499. enc_msg = ssl->out_msg + ssl->ivlen;
  500. enc_msglen = ssl->out_msglen;
  501. ssl->out_msglen += ssl->ivlen;
  502. }
  503. SSL_DEBUG_MSG( 3, ( "before encrypt: msglen = %d, "
  504. "including %d bytes of IV and %d bytes of padding",
  505. ssl->out_msglen, ssl->ivlen, padlen + 1 ) );
  506. SSL_DEBUG_BUF( 4, "before encrypt: output payload",
  507. ssl->out_msg, ssl->out_msglen );
  508. switch( ssl->ivlen )
  509. {
  510. case 8:
  511. #if defined(POLARSSL_DES_C)
  512. des3_crypt_cbc( (des3_context *) ssl->ctx_enc,
  513. DES_ENCRYPT, enc_msglen,
  514. ssl->iv_enc, enc_msg, enc_msg );
  515. break;
  516. #endif
  517. case 16:
  518. #if defined(POLARSSL_AES_C)
  519. if ( ssl->session->ciphersuite == SSL_RSA_AES_128_SHA ||
  520. ssl->session->ciphersuite == SSL_EDH_RSA_AES_128_SHA ||
  521. ssl->session->ciphersuite == SSL_RSA_AES_256_SHA ||
  522. ssl->session->ciphersuite == SSL_EDH_RSA_AES_256_SHA)
  523. {
  524. aes_crypt_cbc( (aes_context *) ssl->ctx_enc,
  525. AES_ENCRYPT, enc_msglen,
  526. ssl->iv_enc, enc_msg, enc_msg);
  527. break;
  528. }
  529. #endif
  530. #if defined(POLARSSL_CAMELLIA_C)
  531. if ( ssl->session->ciphersuite == SSL_RSA_CAMELLIA_128_SHA ||
  532. ssl->session->ciphersuite == SSL_EDH_RSA_CAMELLIA_128_SHA ||
  533. ssl->session->ciphersuite == SSL_RSA_CAMELLIA_256_SHA ||
  534. ssl->session->ciphersuite == SSL_EDH_RSA_CAMELLIA_256_SHA)
  535. {
  536. camellia_crypt_cbc( (camellia_context *) ssl->ctx_enc,
  537. CAMELLIA_ENCRYPT, enc_msglen,
  538. ssl->iv_enc, enc_msg, enc_msg );
  539. break;
  540. }
  541. #endif
  542. default:
  543. return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
  544. }
  545. }
  546. SSL_DEBUG_MSG( 2, ( "<= encrypt buf" ) );
  547. return( 0 );
  548. }
  549. static int ssl_decrypt_buf( ssl_context *ssl )
  550. {
  551. size_t i, padlen;
  552. unsigned char tmp[20];
  553. SSL_DEBUG_MSG( 2, ( "=> decrypt buf" ) );
  554. if( ssl->in_msglen < ssl->minlen )
  555. {
  556. SSL_DEBUG_MSG( 1, ( "in_msglen (%d) < minlen (%d)",
  557. ssl->in_msglen, ssl->minlen ) );
  558. return( POLARSSL_ERR_SSL_INVALID_MAC );
  559. }
  560. if( ssl->ivlen == 0 )
  561. {
  562. #if defined(POLARSSL_ARC4_C)
  563. padlen = 0;
  564. arc4_crypt( (arc4_context *) ssl->ctx_dec,
  565. ssl->in_msglen, ssl->in_msg,
  566. ssl->in_msg );
  567. #else
  568. return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
  569. #endif
  570. }
  571. else
  572. {
  573. unsigned char *dec_msg;
  574. unsigned char *dec_msg_result;
  575. size_t dec_msglen;
  576. /*
  577. * Decrypt and check the padding
  578. */
  579. if( ssl->in_msglen % ssl->ivlen != 0 )
  580. {
  581. SSL_DEBUG_MSG( 1, ( "msglen (%d) %% ivlen (%d) != 0",
  582. ssl->in_msglen, ssl->ivlen ) );
  583. return( POLARSSL_ERR_SSL_INVALID_MAC );
  584. }
  585. dec_msglen = ssl->in_msglen;
  586. dec_msg = ssl->in_msg;
  587. dec_msg_result = ssl->in_msg;
  588. /*
  589. * Initialize for prepended IV for block cipher in TLS v1.1
  590. */
  591. if( ssl->minor_ver == SSL_MINOR_VERSION_2 )
  592. {
  593. dec_msg += ssl->ivlen;
  594. dec_msglen -= ssl->ivlen;
  595. ssl->in_msglen -= ssl->ivlen;
  596. for( i = 0; i < ssl->ivlen; i++ )
  597. ssl->iv_dec[i] = ssl->in_msg[i];
  598. }
  599. switch( ssl->ivlen )
  600. {
  601. #if defined(POLARSSL_DES_C)
  602. case 8:
  603. des3_crypt_cbc( (des3_context *) ssl->ctx_dec,
  604. DES_DECRYPT, dec_msglen,
  605. ssl->iv_dec, dec_msg, dec_msg_result );
  606. break;
  607. #endif
  608. case 16:
  609. #if defined(POLARSSL_AES_C)
  610. if ( ssl->session->ciphersuite == SSL_RSA_AES_128_SHA ||
  611. ssl->session->ciphersuite == SSL_EDH_RSA_AES_128_SHA ||
  612. ssl->session->ciphersuite == SSL_RSA_AES_256_SHA ||
  613. ssl->session->ciphersuite == SSL_EDH_RSA_AES_256_SHA)
  614. {
  615. aes_crypt_cbc( (aes_context *) ssl->ctx_dec,
  616. AES_DECRYPT, dec_msglen,
  617. ssl->iv_dec, dec_msg, dec_msg_result );
  618. break;
  619. }
  620. #endif
  621. #if defined(POLARSSL_CAMELLIA_C)
  622. if ( ssl->session->ciphersuite == SSL_RSA_CAMELLIA_128_SHA ||
  623. ssl->session->ciphersuite == SSL_EDH_RSA_CAMELLIA_128_SHA ||
  624. ssl->session->ciphersuite == SSL_RSA_CAMELLIA_256_SHA ||
  625. ssl->session->ciphersuite == SSL_EDH_RSA_CAMELLIA_256_SHA)
  626. {
  627. camellia_crypt_cbc( (camellia_context *) ssl->ctx_dec,
  628. CAMELLIA_DECRYPT, dec_msglen,
  629. ssl->iv_dec, dec_msg, dec_msg_result );
  630. break;
  631. }
  632. #endif
  633. default:
  634. return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
  635. }
  636. padlen = 1 + ssl->in_msg[ssl->in_msglen - 1];
  637. if( ssl->minor_ver == SSL_MINOR_VERSION_0 )
  638. {
  639. if( padlen > ssl->ivlen )
  640. {
  641. SSL_DEBUG_MSG( 1, ( "bad padding length: is %d, "
  642. "should be no more than %d",
  643. padlen, ssl->ivlen ) );
  644. padlen = 0;
  645. }
  646. }
  647. else
  648. {
  649. /*
  650. * TLSv1: always check the padding
  651. */
  652. for( i = 1; i <= padlen; i++ )
  653. {
  654. if( ssl->in_msg[ssl->in_msglen - i] != padlen - 1 )
  655. {
  656. SSL_DEBUG_MSG( 1, ( "bad padding byte: should be "
  657. "%02x, but is %02x", padlen - 1,
  658. ssl->in_msg[ssl->in_msglen - i] ) );
  659. padlen = 0;
  660. }
  661. }
  662. }
  663. }
  664. SSL_DEBUG_BUF( 4, "raw buffer after decryption",
  665. ssl->in_msg, ssl->in_msglen );
  666. /*
  667. * Always compute the MAC (RFC4346, CBCTIME).
  668. */
  669. ssl->in_msglen -= ( ssl->maclen + padlen );
  670. ssl->in_hdr[3] = (unsigned char)( ssl->in_msglen >> 8 );
  671. ssl->in_hdr[4] = (unsigned char)( ssl->in_msglen );
  672. memcpy( tmp, ssl->in_msg + ssl->in_msglen, 20 );
  673. if( ssl->minor_ver == SSL_MINOR_VERSION_0 )
  674. {
  675. if( ssl->maclen == 16 )
  676. ssl_mac_md5( ssl->mac_dec,
  677. ssl->in_msg, ssl->in_msglen,
  678. ssl->in_ctr, ssl->in_msgtype );
  679. else
  680. ssl_mac_sha1( ssl->mac_dec,
  681. ssl->in_msg, ssl->in_msglen,
  682. ssl->in_ctr, ssl->in_msgtype );
  683. }
  684. else
  685. {
  686. if( ssl->maclen == 16 )
  687. md5_hmac( ssl->mac_dec, 16,
  688. ssl->in_ctr, ssl->in_msglen + 13,
  689. ssl->in_msg + ssl->in_msglen );
  690. else
  691. sha1_hmac( ssl->mac_dec, 20,
  692. ssl->in_ctr, ssl->in_msglen + 13,
  693. ssl->in_msg + ssl->in_msglen );
  694. }
  695. SSL_DEBUG_BUF( 4, "message mac", tmp, ssl->maclen );
  696. SSL_DEBUG_BUF( 4, "computed mac", ssl->in_msg + ssl->in_msglen,
  697. ssl->maclen );
  698. if( memcmp( tmp, ssl->in_msg + ssl->in_msglen,
  699. ssl->maclen ) != 0 )
  700. {
  701. SSL_DEBUG_MSG( 1, ( "message mac does not match" ) );
  702. return( POLARSSL_ERR_SSL_INVALID_MAC );
  703. }
  704. /*
  705. * Finally check the padding length; bad padding
  706. * will produce the same error as an invalid MAC.
  707. */
  708. if( ssl->ivlen != 0 && padlen == 0 )
  709. return( POLARSSL_ERR_SSL_INVALID_MAC );
  710. if( ssl->in_msglen == 0 )
  711. {
  712. ssl->nb_zero++;
  713. /*
  714. * Three or more empty messages may be a DoS attack
  715. * (excessive CPU consumption).
  716. */
  717. if( ssl->nb_zero > 3 )
  718. {
  719. SSL_DEBUG_MSG( 1, ( "received four consecutive empty "
  720. "messages, possible DoS attack" ) );
  721. return( POLARSSL_ERR_SSL_INVALID_MAC );
  722. }
  723. }
  724. else
  725. ssl->nb_zero = 0;
  726. for( i = 8; i > 0; i-- )
  727. if( ++ssl->in_ctr[i - 1] != 0 )
  728. break;
  729. SSL_DEBUG_MSG( 2, ( "<= decrypt buf" ) );
  730. return( 0 );
  731. }
  732. /*
  733. * Fill the input message buffer
  734. */
  735. int ssl_fetch_input( ssl_context *ssl, size_t nb_want )
  736. {
  737. int ret;
  738. size_t len;
  739. SSL_DEBUG_MSG( 2, ( "=> fetch input" ) );
  740. while( ssl->in_left < nb_want )
  741. {
  742. len = nb_want - ssl->in_left;
  743. ret = ssl->f_recv( ssl->p_recv, ssl->in_hdr + ssl->in_left, len );
  744. SSL_DEBUG_MSG( 2, ( "in_left: %d, nb_want: %d",
  745. ssl->in_left, nb_want ) );
  746. SSL_DEBUG_RET( 2, "ssl->f_recv", ret );
  747. if( ret == 0 )
  748. return( POLARSSL_ERR_SSL_CONN_EOF );
  749. if( ret < 0 )
  750. return( ret );
  751. ssl->in_left += ret;
  752. }
  753. SSL_DEBUG_MSG( 2, ( "<= fetch input" ) );
  754. return( 0 );
  755. }
  756. /*
  757. * Flush any data not yet written
  758. */
  759. int ssl_flush_output( ssl_context *ssl )
  760. {
  761. int ret;
  762. unsigned char *buf;
  763. SSL_DEBUG_MSG( 2, ( "=> flush output" ) );
  764. while( ssl->out_left > 0 )
  765. {
  766. SSL_DEBUG_MSG( 2, ( "message length: %d, out_left: %d",
  767. 5 + ssl->out_msglen, ssl->out_left ) );
  768. buf = ssl->out_hdr + 5 + ssl->out_msglen - ssl->out_left;
  769. ret = ssl->f_send( ssl->p_send, buf, ssl->out_left );
  770. SSL_DEBUG_RET( 2, "ssl->f_send", ret );
  771. if( ret <= 0 )
  772. return( ret );
  773. ssl->out_left -= ret;
  774. }
  775. SSL_DEBUG_MSG( 2, ( "<= flush output" ) );
  776. return( 0 );
  777. }
  778. /*
  779. * Record layer functions
  780. */
  781. int ssl_write_record( ssl_context *ssl )
  782. {
  783. int ret;
  784. size_t len = ssl->out_msglen;
  785. SSL_DEBUG_MSG( 2, ( "=> write record" ) );
  786. ssl->out_hdr[0] = (unsigned char) ssl->out_msgtype;
  787. ssl->out_hdr[1] = (unsigned char) ssl->major_ver;
  788. ssl->out_hdr[2] = (unsigned char) ssl->minor_ver;
  789. ssl->out_hdr[3] = (unsigned char)( len >> 8 );
  790. ssl->out_hdr[4] = (unsigned char)( len );
  791. if( ssl->out_msgtype == SSL_MSG_HANDSHAKE )
  792. {
  793. ssl->out_msg[1] = (unsigned char)( ( len - 4 ) >> 16 );
  794. ssl->out_msg[2] = (unsigned char)( ( len - 4 ) >> 8 );
  795. ssl->out_msg[3] = (unsigned char)( ( len - 4 ) );
  796. md5_update( &ssl->fin_md5 , ssl->out_msg, len );
  797. sha1_update( &ssl->fin_sha1, ssl->out_msg, len );
  798. }
  799. if( ssl->do_crypt != 0 )
  800. {
  801. if( ( ret = ssl_encrypt_buf( ssl ) ) != 0 )
  802. {
  803. SSL_DEBUG_RET( 1, "ssl_encrypt_buf", ret );
  804. return( ret );
  805. }
  806. len = ssl->out_msglen;
  807. ssl->out_hdr[3] = (unsigned char)( len >> 8 );
  808. ssl->out_hdr[4] = (unsigned char)( len );
  809. }
  810. ssl->out_left = 5 + ssl->out_msglen;
  811. SSL_DEBUG_MSG( 3, ( "output record: msgtype = %d, "
  812. "version = [%d:%d], msglen = %d",
  813. ssl->out_hdr[0], ssl->out_hdr[1], ssl->out_hdr[2],
  814. ( ssl->out_hdr[3] << 8 ) | ssl->out_hdr[4] ) );
  815. SSL_DEBUG_BUF( 4, "output record sent to network",
  816. ssl->out_hdr, 5 + ssl->out_msglen );
  817. if( ( ret = ssl_flush_output( ssl ) ) != 0 )
  818. {
  819. SSL_DEBUG_RET( 1, "ssl_flush_output", ret );
  820. return( ret );
  821. }
  822. SSL_DEBUG_MSG( 2, ( "<= write record" ) );
  823. return( 0 );
  824. }
  825. int ssl_read_record( ssl_context *ssl )
  826. {
  827. int ret;
  828. SSL_DEBUG_MSG( 2, ( "=> read record" ) );
  829. if( ssl->in_hslen != 0 &&
  830. ssl->in_hslen < ssl->in_msglen )
  831. {
  832. /*
  833. * Get next Handshake message in the current record
  834. */
  835. ssl->in_msglen -= ssl->in_hslen;
  836. memmove( ssl->in_msg, ssl->in_msg + ssl->in_hslen,
  837. ssl->in_msglen );
  838. ssl->in_hslen = 4;
  839. ssl->in_hslen += ( ssl->in_msg[2] << 8 ) | ssl->in_msg[3];
  840. SSL_DEBUG_MSG( 3, ( "handshake message: msglen ="
  841. " %d, type = %d, hslen = %d",
  842. ssl->in_msglen, ssl->in_msg[0], ssl->in_hslen ) );
  843. if( ssl->in_msglen < 4 || ssl->in_msg[1] != 0 )
  844. {
  845. SSL_DEBUG_MSG( 1, ( "bad handshake length" ) );
  846. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  847. }
  848. if( ssl->in_msglen < ssl->in_hslen )
  849. {
  850. SSL_DEBUG_MSG( 1, ( "bad handshake length" ) );
  851. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  852. }
  853. md5_update( &ssl->fin_md5 , ssl->in_msg, ssl->in_hslen );
  854. sha1_update( &ssl->fin_sha1, ssl->in_msg, ssl->in_hslen );
  855. return( 0 );
  856. }
  857. ssl->in_hslen = 0;
  858. /*
  859. * Read the record header and validate it
  860. */
  861. if( ( ret = ssl_fetch_input( ssl, 5 ) ) != 0 )
  862. {
  863. SSL_DEBUG_RET( 1, "ssl_fetch_input", ret );
  864. return( ret );
  865. }
  866. ssl->in_msgtype = ssl->in_hdr[0];
  867. ssl->in_msglen = ( ssl->in_hdr[3] << 8 ) | ssl->in_hdr[4];
  868. SSL_DEBUG_MSG( 3, ( "input record: msgtype = %d, "
  869. "version = [%d:%d], msglen = %d",
  870. ssl->in_hdr[0], ssl->in_hdr[1], ssl->in_hdr[2],
  871. ( ssl->in_hdr[3] << 8 ) | ssl->in_hdr[4] ) );
  872. if( ssl->in_hdr[1] != ssl->major_ver )
  873. {
  874. SSL_DEBUG_MSG( 1, ( "major version mismatch" ) );
  875. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  876. }
  877. if( ssl->in_hdr[2] > ssl->max_minor_ver )
  878. {
  879. SSL_DEBUG_MSG( 1, ( "minor version mismatch" ) );
  880. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  881. }
  882. /*
  883. * Make sure the message length is acceptable
  884. */
  885. if( ssl->do_crypt == 0 )
  886. {
  887. if( ssl->in_msglen < 1 ||
  888. ssl->in_msglen > SSL_MAX_CONTENT_LEN )
  889. {
  890. SSL_DEBUG_MSG( 1, ( "bad message length" ) );
  891. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  892. }
  893. }
  894. else
  895. {
  896. if( ssl->in_msglen < ssl->minlen )
  897. {
  898. SSL_DEBUG_MSG( 1, ( "bad message length" ) );
  899. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  900. }
  901. if( ssl->minor_ver == SSL_MINOR_VERSION_0 &&
  902. ssl->in_msglen > ssl->minlen + SSL_MAX_CONTENT_LEN )
  903. {
  904. SSL_DEBUG_MSG( 1, ( "bad message length" ) );
  905. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  906. }
  907. /*
  908. * TLS encrypted messages can have up to 256 bytes of padding
  909. */
  910. if( ssl->minor_ver == SSL_MINOR_VERSION_1 &&
  911. ssl->in_msglen > ssl->minlen + SSL_MAX_CONTENT_LEN + 256 )
  912. {
  913. SSL_DEBUG_MSG( 1, ( "bad message length" ) );
  914. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  915. }
  916. }
  917. /*
  918. * Read and optionally decrypt the message contents
  919. */
  920. if( ( ret = ssl_fetch_input( ssl, 5 + ssl->in_msglen ) ) != 0 )
  921. {
  922. SSL_DEBUG_RET( 1, "ssl_fetch_input", ret );
  923. return( ret );
  924. }
  925. SSL_DEBUG_BUF( 4, "input record from network",
  926. ssl->in_hdr, 5 + ssl->in_msglen );
  927. if( ssl->do_crypt != 0 )
  928. {
  929. if( ( ret = ssl_decrypt_buf( ssl ) ) != 0 )
  930. {
  931. SSL_DEBUG_RET( 1, "ssl_decrypt_buf", ret );
  932. return( ret );
  933. }
  934. SSL_DEBUG_BUF( 4, "input payload after decrypt",
  935. ssl->in_msg, ssl->in_msglen );
  936. if( ssl->in_msglen > SSL_MAX_CONTENT_LEN )
  937. {
  938. SSL_DEBUG_MSG( 1, ( "bad message length" ) );
  939. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  940. }
  941. }
  942. if( ssl->in_msgtype == SSL_MSG_HANDSHAKE )
  943. {
  944. ssl->in_hslen = 4;
  945. ssl->in_hslen += ( ssl->in_msg[2] << 8 ) | ssl->in_msg[3];
  946. SSL_DEBUG_MSG( 3, ( "handshake message: msglen ="
  947. " %d, type = %d, hslen = %d",
  948. ssl->in_msglen, ssl->in_msg[0], ssl->in_hslen ) );
  949. /*
  950. * Additional checks to validate the handshake header
  951. */
  952. if( ssl->in_msglen < 4 || ssl->in_msg[1] != 0 )
  953. {
  954. SSL_DEBUG_MSG( 1, ( "bad handshake length" ) );
  955. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  956. }
  957. if( ssl->in_msglen < ssl->in_hslen )
  958. {
  959. SSL_DEBUG_MSG( 1, ( "bad handshake length" ) );
  960. return( POLARSSL_ERR_SSL_INVALID_RECORD );
  961. }
  962. md5_update( &ssl->fin_md5 , ssl->in_msg, ssl->in_hslen );
  963. sha1_update( &ssl->fin_sha1, ssl->in_msg, ssl->in_hslen );
  964. }
  965. if( ssl->in_msgtype == SSL_MSG_ALERT )
  966. {
  967. SSL_DEBUG_MSG( 2, ( "got an alert message, type: [%d:%d]",
  968. ssl->in_msg[0], ssl->in_msg[1] ) );
  969. /*
  970. * Ignore non-fatal alerts, except close_notify
  971. */
  972. if( ssl->in_msg[0] == SSL_ALERT_LEVEL_FATAL )
  973. {
  974. SSL_DEBUG_MSG( 1, ( "is a fatal alert message" ) );
  975. /**
  976. * Subtract from error code as ssl->in_msg[1] is 7-bit positive
  977. * error identifier.
  978. */
  979. return( POLARSSL_ERR_SSL_FATAL_ALERT_MESSAGE - ssl->in_msg[1] );
  980. }
  981. if( ssl->in_msg[0] == SSL_ALERT_LEVEL_WARNING &&
  982. ssl->in_msg[1] == SSL_ALERT_MSG_CLOSE_NOTIFY )
  983. {
  984. SSL_DEBUG_MSG( 2, ( "is a close notify message" ) );
  985. return( POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY );
  986. }
  987. }
  988. ssl->in_left = 0;
  989. SSL_DEBUG_MSG( 2, ( "<= read record" ) );
  990. return( 0 );
  991. }
  992. /*
  993. * Handshake functions
  994. */
  995. int ssl_write_certificate( ssl_context *ssl )
  996. {
  997. int ret;
  998. size_t i, n;
  999. const x509_cert *crt;
  1000. SSL_DEBUG_MSG( 2, ( "=> write certificate" ) );
  1001. if( ssl->endpoint == SSL_IS_CLIENT )
  1002. {
  1003. if( ssl->client_auth == 0 )
  1004. {
  1005. SSL_DEBUG_MSG( 2, ( "<= skip write certificate" ) );
  1006. ssl->state++;
  1007. return( 0 );
  1008. }
  1009. /*
  1010. * If using SSLv3 and got no cert, send an Alert message
  1011. * (otherwise an empty Certificate message will be sent).
  1012. */
  1013. if( ssl->own_cert == NULL &&
  1014. ssl->minor_ver == SSL_MINOR_VERSION_0 )
  1015. {
  1016. ssl->out_msglen = 2;
  1017. ssl->out_msgtype = SSL_MSG_ALERT;
  1018. ssl->out_msg[0] = SSL_ALERT_LEVEL_WARNING;
  1019. ssl->out_msg[1] = SSL_ALERT_MSG_NO_CERT;
  1020. SSL_DEBUG_MSG( 2, ( "got no certificate to send" ) );
  1021. goto write_msg;
  1022. }
  1023. }
  1024. else /* SSL_IS_SERVER */
  1025. {
  1026. if( ssl->own_cert == NULL )
  1027. {
  1028. SSL_DEBUG_MSG( 1, ( "got no certificate to send" ) );
  1029. return( POLARSSL_ERR_SSL_CERTIFICATE_REQUIRED );
  1030. }
  1031. }
  1032. SSL_DEBUG_CRT( 3, "own certificate", ssl->own_cert );
  1033. /*
  1034. * 0 . 0 handshake type
  1035. * 1 . 3 handshake length
  1036. * 4 . 6 length of all certs
  1037. * 7 . 9 length of cert. 1
  1038. * 10 . n-1 peer certificate
  1039. * n . n+2 length of cert. 2
  1040. * n+3 . ... upper level cert, etc.
  1041. */
  1042. i = 7;
  1043. crt = ssl->own_cert;
  1044. while( crt != NULL )
  1045. {
  1046. n = crt->raw.len;
  1047. if( i + 3 + n > SSL_MAX_CONTENT_LEN )
  1048. {
  1049. SSL_DEBUG_MSG( 1, ( "certificate too large, %d > %d",
  1050. i + 3 + n, SSL_MAX_CONTENT_LEN ) );
  1051. return( POLARSSL_ERR_SSL_CERTIFICATE_TOO_LARGE );
  1052. }
  1053. ssl->out_msg[i ] = (unsigned char)( n >> 16 );
  1054. ssl->out_msg[i + 1] = (unsigned char)( n >> 8 );
  1055. ssl->out_msg[i + 2] = (unsigned char)( n );
  1056. i += 3; memcpy( ssl->out_msg + i, crt->raw.p, n );
  1057. i += n; crt = crt->next;
  1058. }
  1059. ssl->out_msg[4] = (unsigned char)( ( i - 7 ) >> 16 );
  1060. ssl->out_msg[5] = (unsigned char)( ( i - 7 ) >> 8 );
  1061. ssl->out_msg[6] = (unsigned char)( ( i - 7 ) );
  1062. ssl->out_msglen = i;
  1063. ssl->out_msgtype = SSL_MSG_HANDSHAKE;
  1064. ssl->out_msg[0] = SSL_HS_CERTIFICATE;
  1065. write_msg:
  1066. ssl->state++;
  1067. if( ( ret = ssl_write_record( ssl ) ) != 0 )
  1068. {
  1069. SSL_DEBUG_RET( 1, "ssl_write_record", ret );
  1070. return( ret );
  1071. }
  1072. SSL_DEBUG_MSG( 2, ( "<= write certificate" ) );
  1073. return( 0 );
  1074. }
  1075. int ssl_parse_certificate( ssl_context *ssl )
  1076. {
  1077. int ret;
  1078. size_t i, n;
  1079. SSL_DEBUG_MSG( 2, ( "=> parse certificate" ) );
  1080. if( ssl->endpoint == SSL_IS_SERVER &&
  1081. ssl->authmode == SSL_VERIFY_NONE )
  1082. {
  1083. ssl->verify_result = BADCERT_SKIP_VERIFY;
  1084. SSL_DEBUG_MSG( 2, ( "<= skip parse certificate" ) );
  1085. ssl->state++;
  1086. return( 0 );
  1087. }
  1088. if( ( ret = ssl_read_record( ssl ) ) != 0 )
  1089. {
  1090. SSL_DEBUG_RET( 1, "ssl_read_record", ret );
  1091. return( ret );
  1092. }
  1093. ssl->state++;
  1094. /*
  1095. * Check if the client sent an empty certificate
  1096. */
  1097. if( ssl->endpoint == SSL_IS_SERVER &&
  1098. ssl->minor_ver == SSL_MINOR_VERSION_0 )
  1099. {
  1100. if( ssl->in_msglen == 2 &&
  1101. ssl->in_msgtype == SSL_MSG_ALERT &&
  1102. ssl->in_msg[0] == SSL_ALERT_LEVEL_WARNING &&
  1103. ssl->in_msg[1] == SSL_ALERT_MSG_NO_CERT )
  1104. {
  1105. SSL_DEBUG_MSG( 1, ( "SSLv3 client has no certificate" ) );
  1106. ssl->verify_result = BADCERT_MISSING;
  1107. if( ssl->authmode == SSL_VERIFY_OPTIONAL )
  1108. return( 0 );
  1109. else
  1110. return( POLARSSL_ERR_SSL_NO_CLIENT_CERTIFICATE );
  1111. }
  1112. }
  1113. if( ssl->endpoint == SSL_IS_SERVER &&
  1114. ssl->minor_ver != SSL_MINOR_VERSION_0 )
  1115. {
  1116. if( ssl->in_hslen == 7 &&
  1117. ssl->in_msgtype == SSL_MSG_HANDSHAKE &&
  1118. ssl->in_msg[0] == SSL_HS_CERTIFICATE &&
  1119. memcmp( ssl->in_msg + 4, "\0\0\0", 3 ) == 0 )
  1120. {
  1121. SSL_DEBUG_MSG( 1, ( "TLSv1 client has no certificate" ) );
  1122. ssl->verify_result = BADCERT_MISSING;
  1123. if( ssl->authmode == SSL_VERIFY_REQUIRED )
  1124. return( POLARSSL_ERR_SSL_NO_CLIENT_CERTIFICATE );
  1125. else
  1126. return( 0 );
  1127. }
  1128. }
  1129. if( ssl->in_msgtype != SSL_MSG_HANDSHAKE )
  1130. {
  1131. SSL_DEBUG_MSG( 1, ( "bad certificate message" ) );
  1132. return( POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE );
  1133. }
  1134. if( ssl->in_msg[0] != SSL_HS_CERTIFICATE || ssl->in_hslen < 10 )
  1135. {
  1136. SSL_DEBUG_MSG( 1, ( "bad certificate message" ) );
  1137. return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE );
  1138. }
  1139. /*
  1140. * Same message structure as in ssl_write_certificate()
  1141. */
  1142. n = ( ssl->in_msg[5] << 8 ) | ssl->in_msg[6];
  1143. if( ssl->in_msg[4] != 0 || ssl->in_hslen != 7 + n )
  1144. {
  1145. SSL_DEBUG_MSG( 1, ( "bad certificate message" ) );
  1146. return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE );
  1147. }
  1148. if( ( ssl->peer_cert = (x509_cert *) malloc(
  1149. sizeof( x509_cert ) ) ) == NULL )
  1150. {
  1151. SSL_DEBUG_MSG( 1, ( "malloc(%d bytes) failed",
  1152. sizeof( x509_cert ) ) );
  1153. return( 1 );
  1154. }
  1155. memset( ssl->peer_cert, 0, sizeof( x509_cert ) );
  1156. i = 7;
  1157. while( i < ssl->in_hslen )
  1158. {
  1159. if( ssl->in_msg[i] != 0 )
  1160. {
  1161. SSL_DEBUG_MSG( 1, ( "bad certificate message" ) );
  1162. return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE );
  1163. }
  1164. n = ( (unsigned int) ssl->in_msg[i + 1] << 8 )
  1165. | (unsigned int) ssl->in_msg[i + 2];
  1166. i += 3;
  1167. if( n < 128 || i + n > ssl->in_hslen )
  1168. {
  1169. SSL_DEBUG_MSG( 1, ( "bad certificate message" ) );
  1170. return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE );
  1171. }
  1172. ret = x509parse_crt( ssl->peer_cert, ssl->in_msg + i, n );
  1173. if( ret != 0 )
  1174. {
  1175. SSL_DEBUG_RET( 1, " x509parse_crt", ret );
  1176. return( ret );
  1177. }
  1178. i += n;
  1179. }
  1180. SSL_DEBUG_CRT( 3, "peer certificate", ssl->peer_cert );
  1181. if( ssl->authmode != SSL_VERIFY_NONE )
  1182. {
  1183. if( ssl->ca_chain == NULL )
  1184. {
  1185. SSL_DEBUG_MSG( 1, ( "got no CA chain" ) );
  1186. return( POLARSSL_ERR_SSL_CA_CHAIN_REQUIRED );
  1187. }
  1188. ret = x509parse_verify( ssl->peer_cert, ssl->ca_chain, ssl->ca_crl,
  1189. ssl->peer_cn, &ssl->verify_result,
  1190. ssl->f_vrfy, ssl->p_vrfy );
  1191. if( ret != 0 )
  1192. SSL_DEBUG_RET( 1, "x509_verify_cert", ret );
  1193. if( ssl->authmode != SSL_VERIFY_REQUIRED )
  1194. ret = 0;
  1195. }
  1196. SSL_DEBUG_MSG( 2, ( "<= parse certificate" ) );
  1197. return( ret );
  1198. }
  1199. int ssl_write_change_cipher_spec( ssl_context *ssl )
  1200. {
  1201. int ret;
  1202. SSL_DEBUG_MSG( 2, ( "=> write change cipher spec" ) );
  1203. ssl->out_msgtype = SSL_MSG_CHANGE_CIPHER_SPEC;
  1204. ssl->out_msglen = 1;
  1205. ssl->out_msg[0] = 1;
  1206. ssl->do_crypt = 0;
  1207. ssl->state++;
  1208. if( ( ret = ssl_write_record( ssl ) ) != 0 )
  1209. {
  1210. SSL_DEBUG_RET( 1, "ssl_write_record", ret );
  1211. return( ret );
  1212. }
  1213. SSL_DEBUG_MSG( 2, ( "<= write change cipher spec" ) );
  1214. return( 0 );
  1215. }
  1216. int ssl_parse_change_cipher_spec( ssl_context *ssl )
  1217. {
  1218. int ret;
  1219. SSL_DEBUG_MSG( 2, ( "=> parse change cipher spec" ) );
  1220. ssl->do_crypt = 0;
  1221. if( ( ret = ssl_read_record( ssl ) ) != 0 )
  1222. {
  1223. SSL_DEBUG_RET( 1, "ssl_read_record", ret );
  1224. return( ret );
  1225. }
  1226. if( ssl->in_msgtype != SSL_MSG_CHANGE_CIPHER_SPEC )
  1227. {
  1228. SSL_DEBUG_MSG( 1, ( "bad change cipher spec message" ) );
  1229. return( POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE );
  1230. }
  1231. if( ssl->in_msglen != 1 || ssl->in_msg[0] != 1 )
  1232. {
  1233. SSL_DEBUG_MSG( 1, ( "bad change cipher spec message" ) );
  1234. return( POLARSSL_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC );
  1235. }
  1236. ssl->state++;
  1237. SSL_DEBUG_MSG( 2, ( "<= parse change cipher spec" ) );
  1238. return( 0 );
  1239. }
  1240. static void ssl_calc_finished(
  1241. ssl_context *ssl, unsigned char *buf, int from,
  1242. md5_context *md5, sha1_context *sha1 )
  1243. {
  1244. int len = 12;
  1245. char *sender;
  1246. unsigned char padbuf[48];
  1247. unsigned char md5sum[16];
  1248. unsigned char sha1sum[20];
  1249. SSL_DEBUG_MSG( 2, ( "=> calc finished" ) );
  1250. /*
  1251. * SSLv3:
  1252. * hash =
  1253. * MD5( master + pad2 +
  1254. * MD5( handshake + sender + master + pad1 ) )
  1255. * + SHA1( master + pad2 +
  1256. * SHA1( handshake + sender + master + pad1 ) )
  1257. *
  1258. * TLSv1:
  1259. * hash = PRF( master, finished_label,
  1260. * MD5( handshake ) + SHA1( handshake ) )[0..11]
  1261. */
  1262. SSL_DEBUG_BUF( 4, "finished md5 state", (unsigned char *)
  1263. md5->state, sizeof( md5->state ) );
  1264. SSL_DEBUG_BUF( 4, "finished sha1 state", (unsigned char *)
  1265. sha1->state, sizeof( sha1->state ) );
  1266. if( ssl->minor_ver == SSL_MINOR_VERSION_0 )
  1267. {
  1268. sender = ( from == SSL_IS_CLIENT ) ? (char *) "CLNT"
  1269. : (char *) "SRVR";
  1270. memset( padbuf, 0x36, 48 );
  1271. md5_update( md5, (unsigned char *) sender, 4 );
  1272. md5_update( md5, ssl->session->master, 48 );
  1273. md5_update( md5, padbuf, 48 );
  1274. md5_finish( md5, md5sum );
  1275. sha1_update( sha1, (unsigned char *) sender, 4 );
  1276. sha1_update( sha1, ssl->session->master, 48 );
  1277. sha1_update( sha1, padbuf, 40 );
  1278. sha1_finish( sha1, sha1sum );
  1279. memset( padbuf, 0x5C, 48 );
  1280. md5_starts( md5 );
  1281. md5_update( md5, ssl->session->master, 48 );
  1282. md5_update( md5, padbuf, 48 );
  1283. md5_update( md5, md5sum, 16 );
  1284. md5_finish( md5, buf );
  1285. sha1_starts( sha1 );
  1286. sha1_update( sha1, ssl->session->master, 48 );
  1287. sha1_update( sha1, padbuf , 40 );
  1288. sha1_update( sha1, sha1sum, 20 );
  1289. sha1_finish( sha1, buf + 16 );
  1290. len += 24;
  1291. }
  1292. else
  1293. {
  1294. sender = ( from == SSL_IS_CLIENT )
  1295. ? (char *) "client finished"
  1296. : (char *) "server finished";
  1297. md5_finish( md5, padbuf );
  1298. sha1_finish( sha1, padbuf + 16 );
  1299. tls1_prf( ssl->session->master, 48, sender,
  1300. padbuf, 36, buf, len );
  1301. }
  1302. SSL_DEBUG_BUF( 3, "calc finished result", buf, len );
  1303. memset( md5, 0, sizeof( md5_context ) );
  1304. memset( sha1, 0, sizeof( sha1_context ) );
  1305. memset( padbuf, 0, sizeof( padbuf ) );
  1306. memset( md5sum, 0, sizeof( md5sum ) );
  1307. memset( sha1sum, 0, sizeof( sha1sum ) );
  1308. SSL_DEBUG_MSG( 2, ( "<= calc finished" ) );
  1309. }
  1310. int ssl_write_finished( ssl_context *ssl )
  1311. {
  1312. int ret, hash_len;
  1313. md5_context md5;
  1314. sha1_context sha1;
  1315. SSL_DEBUG_MSG( 2, ( "=> write finished" ) );
  1316. memcpy( &md5 , &ssl->fin_md5 , sizeof( md5_context ) );
  1317. memcpy( &sha1, &ssl->fin_sha1, sizeof( sha1_context ) );
  1318. ssl_calc_finished( ssl, ssl->out_msg + 4,
  1319. ssl->endpoint, &md5, &sha1 );
  1320. hash_len = ( ssl->minor_ver == SSL_MINOR_VERSION_0 ) ? 36 : 12;
  1321. ssl->out_msglen = 4 + hash_len;
  1322. ssl->out_msgtype = SSL_MSG_HANDSHAKE;
  1323. ssl->out_msg[0] = SSL_HS_FINISHED;
  1324. /*
  1325. * In case of session resuming, invert the client and server
  1326. * ChangeCipherSpec messages order.
  1327. */
  1328. if( ssl->resume != 0 )
  1329. {
  1330. if( ssl->endpoint == SSL_IS_CLIENT )
  1331. ssl->state = SSL_HANDSHAKE_OVER;
  1332. else
  1333. ssl->state = SSL_CLIENT_CHANGE_CIPHER_SPEC;
  1334. }
  1335. else
  1336. ssl->state++;
  1337. ssl->do_crypt = 1;
  1338. if( ( ret = ssl_write_record( ssl ) ) != 0 )
  1339. {
  1340. SSL_DEBUG_RET( 1, "ssl_write_record", ret );
  1341. return( ret );
  1342. }
  1343. SSL_DEBUG_MSG( 2, ( "<= write finished" ) );
  1344. return( 0 );
  1345. }
  1346. int ssl_parse_finished( ssl_context *ssl )
  1347. {
  1348. int ret;
  1349. unsigned int hash_len;
  1350. unsigned char buf[36];
  1351. md5_context md5;
  1352. sha1_context sha1;
  1353. SSL_DEBUG_MSG( 2, ( "=> parse finished" ) );
  1354. memcpy( &md5 , &ssl->fin_md5 , sizeof( md5_context ) );
  1355. memcpy( &sha1, &ssl->fin_sha1, sizeof( sha1_context ) );
  1356. ssl->do_crypt = 1;
  1357. if( ( ret = ssl_read_record( ssl ) ) != 0 )
  1358. {
  1359. SSL_DEBUG_RET( 1, "ssl_read_record", ret );
  1360. return( ret );
  1361. }
  1362. if( ssl->in_msgtype != SSL_MSG_HANDSHAKE )
  1363. {
  1364. SSL_DEBUG_MSG( 1, ( "bad finished message" ) );
  1365. return( POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE );
  1366. }
  1367. hash_len = ( ssl->minor_ver == SSL_MINOR_VERSION_0 ) ? 36 : 12;
  1368. if( ssl->in_msg[0] != SSL_HS_FINISHED ||
  1369. ssl->in_hslen != 4 + hash_len )
  1370. {
  1371. SSL_DEBUG_MSG( 1, ( "bad finished message" ) );
  1372. return( POLARSSL_ERR_SSL_BAD_HS_FINISHED );
  1373. }
  1374. ssl_calc_finished( ssl, buf, ssl->endpoint ^ 1, &md5, &sha1 );
  1375. if( memcmp( ssl->in_msg + 4, buf, hash_len ) != 0 )
  1376. {
  1377. SSL_DEBUG_MSG( 1, ( "bad finished message" ) );
  1378. return( POLARSSL_ERR_SSL_BAD_HS_FINISHED );
  1379. }
  1380. if( ssl->resume != 0 )
  1381. {
  1382. if( ssl->endpoint == SSL_IS_CLIENT )
  1383. ssl->state = SSL_CLIENT_CHANGE_CIPHER_SPEC;
  1384. if( ssl->endpoint == SSL_IS_SERVER )
  1385. ssl->state = SSL_HANDSHAKE_OVER;
  1386. }
  1387. else
  1388. ssl->state++;
  1389. SSL_DEBUG_MSG( 2, ( "<= parse finished" ) );
  1390. return( 0 );
  1391. }
  1392. /*
  1393. * Initialize an SSL context
  1394. */
  1395. int ssl_init( ssl_context *ssl )
  1396. {
  1397. int len = SSL_BUFFER_LEN;
  1398. memset( ssl, 0, sizeof( ssl_context ) );
  1399. ssl->in_ctr = (unsigned char *) malloc( len );
  1400. ssl->in_hdr = ssl->in_ctr + 8;
  1401. ssl->in_msg = ssl->in_ctr + 13;
  1402. if( ssl->in_ctr == NULL )
  1403. {
  1404. SSL_DEBUG_MSG( 1, ( "malloc(%d bytes) failed", len ) );
  1405. return( 1 );
  1406. }
  1407. ssl->out_ctr = (unsigned char *) malloc( len );
  1408. ssl->out_hdr = ssl->out_ctr + 8;
  1409. ssl->out_msg = ssl->out_ctr + 13;
  1410. if( ssl->out_ctr == NULL )
  1411. {
  1412. SSL_DEBUG_MSG( 1, ( "malloc(%d bytes) failed", len ) );
  1413. free( ssl-> in_ctr );
  1414. return( 1 );
  1415. }
  1416. memset( ssl-> in_ctr, 0, SSL_BUFFER_LEN );
  1417. memset( ssl->out_ctr, 0, SSL_BUFFER_LEN );
  1418. ssl->hostname = NULL;
  1419. ssl->hostname_len = 0;
  1420. md5_starts( &ssl->fin_md5 );
  1421. sha1_starts( &ssl->fin_sha1 );
  1422. return( 0 );
  1423. }
  1424. /*
  1425. * SSL set accessors
  1426. */
  1427. void ssl_set_endpoint( ssl_context *ssl, int endpoint )
  1428. {
  1429. ssl->endpoint = endpoint;
  1430. }
  1431. void ssl_set_authmode( ssl_context *ssl, int authmode )
  1432. {
  1433. ssl->authmode = authmode;
  1434. }
  1435. void ssl_set_verify( ssl_context *ssl,
  1436. int (*f_vrfy)(void *, x509_cert *, int, int),
  1437. void *p_vrfy )
  1438. {
  1439. ssl->f_vrfy = f_vrfy;
  1440. ssl->p_vrfy = p_vrfy;
  1441. }
  1442. void ssl_set_rng( ssl_context *ssl,
  1443. int (*f_rng)(void *),
  1444. void *p_rng )
  1445. {
  1446. ssl->f_rng = f_rng;
  1447. ssl->p_rng = p_rng;
  1448. }
  1449. void ssl_set_dbg( ssl_context *ssl,
  1450. void (*f_dbg)(void *, int, const char *),
  1451. void *p_dbg )
  1452. {
  1453. ssl->f_dbg = f_dbg;
  1454. ssl->p_dbg = p_dbg;
  1455. }
  1456. void ssl_set_bio( ssl_context *ssl,
  1457. int (*f_recv)(void *, unsigned char *, size_t), void *p_recv,
  1458. int (*f_send)(void *, const unsigned char *, size_t), void *p_send )
  1459. {
  1460. ssl->f_recv = f_recv;
  1461. ssl->f_send = f_send;
  1462. ssl->p_recv = p_recv;
  1463. ssl->p_send = p_send;
  1464. }
  1465. void ssl_set_scb( ssl_context *ssl,
  1466. int (*s_get)(ssl_context *),
  1467. int (*s_set)(ssl_context *) )
  1468. {
  1469. ssl->s_get = s_get;
  1470. ssl->s_set = s_set;
  1471. }
  1472. void ssl_set_session( ssl_context *ssl, int resume, int timeout,
  1473. ssl_session *session )
  1474. {
  1475. ssl->resume = resume;
  1476. ssl->timeout = timeout;
  1477. ssl->session = session;
  1478. }
  1479. void ssl_set_ciphersuites( ssl_context *ssl, int *ciphersuites )
  1480. {
  1481. ssl->ciphersuites = ciphersuites;
  1482. }
  1483. void ssl_set_ca_chain( ssl_context *ssl, x509_cert *ca_chain,
  1484. x509_crl *ca_crl, const char *peer_cn )
  1485. {
  1486. ssl->ca_chain = ca_chain;
  1487. ssl->ca_crl = ca_crl;
  1488. ssl->peer_cn = peer_cn;
  1489. }
  1490. void ssl_set_own_cert( ssl_context *ssl, x509_cert *own_cert,
  1491. rsa_context *rsa_key )
  1492. {
  1493. ssl->own_cert = own_cert;
  1494. ssl->rsa_key = rsa_key;
  1495. }
  1496. #if defined(POLARSSL_PKCS11_C)
  1497. void ssl_set_own_cert_pkcs11( ssl_context *ssl, x509_cert *own_cert,
  1498. pkcs11_context *pkcs11_key )
  1499. {
  1500. ssl->own_cert = own_cert;
  1501. ssl->pkcs11_key = pkcs11_key;
  1502. }
  1503. #endif
  1504. int ssl_set_dh_param( ssl_context *ssl, const char *dhm_P, const char *dhm_G )
  1505. {
  1506. int ret;
  1507. if( ( ret = mpi_read_string( &ssl->dhm_ctx.P, 16, dhm_P ) ) != 0 )
  1508. {
  1509. SSL_DEBUG_RET( 1, "mpi_read_string", ret );
  1510. return( ret );
  1511. }
  1512. if( ( ret = mpi_read_string( &ssl->dhm_ctx.G, 16, dhm_G ) ) != 0 )
  1513. {
  1514. SSL_DEBUG_RET( 1, "mpi_read_string", ret );
  1515. return( ret );
  1516. }
  1517. return( 0 );
  1518. }
  1519. int ssl_set_dh_param_ctx( ssl_context *ssl, dhm_context *dhm_ctx )
  1520. {
  1521. int ret;
  1522. if( ( ret = mpi_copy(&ssl->dhm_ctx.P, &dhm_ctx->P) ) != 0 )
  1523. {
  1524. SSL_DEBUG_RET( 1, "mpi_copy", ret );
  1525. return( ret );
  1526. }
  1527. if( ( ret = mpi_copy(&ssl->dhm_ctx.G, &dhm_ctx->G) ) != 0 )
  1528. {
  1529. SSL_DEBUG_RET( 1, "mpi_copy", ret );
  1530. return( ret );
  1531. }
  1532. return( 0 );
  1533. }
  1534. int ssl_set_hostname( ssl_context *ssl, const char *hostname )
  1535. {
  1536. if( hostname == NULL )
  1537. return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
  1538. ssl->hostname_len = strlen( hostname );
  1539. ssl->hostname = (unsigned char *) malloc( ssl->hostname_len + 1 );
  1540. memcpy( ssl->hostname, (unsigned char *) hostname,
  1541. ssl->hostname_len );
  1542. ssl->hostname[ssl->hostname_len] = '\0';
  1543. return( 0 );
  1544. }
  1545. /*
  1546. * SSL get accessors
  1547. */
  1548. size_t ssl_get_bytes_avail( const ssl_context *ssl )
  1549. {
  1550. return( ssl->in_offt == NULL ? 0 : ssl->in_msglen );
  1551. }
  1552. int ssl_get_verify_result( const ssl_context *ssl )
  1553. {
  1554. return( ssl->verify_result );
  1555. }
  1556. const char *ssl_get_ciphersuite_name( const int ciphersuite_id )
  1557. {
  1558. switch( ciphersuite_id )
  1559. {
  1560. #if defined(POLARSSL_ARC4_C)
  1561. case SSL_RSA_RC4_128_MD5:
  1562. return( "SSL-RSA-RC4-128-MD5" );
  1563. case SSL_RSA_RC4_128_SHA:
  1564. return( "SSL-RSA-RC4-128-SHA" );
  1565. #endif
  1566. #if defined(POLARSSL_DES_C)
  1567. case SSL_RSA_DES_168_SHA:
  1568. return( "SSL-RSA-DES-168-SHA" );
  1569. case SSL_EDH_RSA_DES_168_SHA:
  1570. return( "SSL-EDH-RSA-DES-168-SHA" );
  1571. #endif
  1572. #if defined(POLARSSL_AES_C)
  1573. case SSL_RSA_AES_128_SHA:
  1574. return( "SSL-RSA-AES-128-SHA" );
  1575. case SSL_EDH_RSA_AES_128_SHA:
  1576. return( "SSL-EDH-RSA-AES-128-SHA" );
  1577. case SSL_RSA_AES_256_SHA:
  1578. return( "SSL-RSA-AES-256-SHA" );
  1579. case SSL_EDH_RSA_AES_256_SHA:
  1580. return( "SSL-EDH-RSA-AES-256-SHA" );
  1581. #endif
  1582. #if defined(POLARSSL_CAMELLIA_C)
  1583. case SSL_RSA_CAMELLIA_128_SHA:
  1584. return( "SSL-RSA-CAMELLIA-128-SHA" );
  1585. case SSL_EDH_RSA_CAMELLIA_128_SHA:
  1586. return( "SSL-EDH-RSA-CAMELLIA-128-SHA" );
  1587. case SSL_RSA_CAMELLIA_256_SHA:
  1588. return( "SSL-RSA-CAMELLIA-256-SHA" );
  1589. case SSL_EDH_RSA_CAMELLIA_256_SHA:
  1590. return( "SSL-EDH-RSA-CAMELLIA-256-SHA" );
  1591. #endif
  1592. default:
  1593. break;
  1594. }
  1595. return( "unknown" );
  1596. }
  1597. int ssl_get_ciphersuite_id( const char *ciphersuite_name )
  1598. {
  1599. #if defined(POLARSSL_ARC4_C)
  1600. if (0 == strcasecmp(ciphersuite_name, "SSL-RSA-RC4-128-MD5"))
  1601. return( SSL_RSA_RC4_128_MD5 );
  1602. if (0 == strcasecmp(ciphersuite_name, "SSL-RSA-RC4-128-SHA"))
  1603. return( SSL_RSA_RC4_128_SHA );
  1604. #endif
  1605. #if defined(POLARSSL_DES_C)
  1606. if (0 == strcasecmp(ciphersuite_name, "SSL-RSA-DES-168-SHA"))
  1607. return( SSL_RSA_DES_168_SHA );
  1608. if (0 == strcasecmp(ciphersuite_name, "SSL-EDH-RSA-DES-168-SHA"))
  1609. return( SSL_EDH_RSA_DES_168_SHA );
  1610. #endif
  1611. #if defined(POLARSSL_AES_C)
  1612. if (0 == strcasecmp(ciphersuite_name, "SSL-RSA-AES-128-SHA"))
  1613. return( SSL_RSA_AES_128_SHA );
  1614. if (0 == strcasecmp(ciphersuite_name, "SSL-EDH-RSA-AES-128-SHA"))
  1615. return( SSL_EDH_RSA_AES_128_SHA );
  1616. if (0 == strcasecmp(ciphersuite_name, "SSL-RSA-AES-256-SHA"))
  1617. return( SSL_RSA_AES_256_SHA );
  1618. if (0 == strcasecmp(ciphersuite_name, "SSL-EDH-RSA-AES-256-SHA"))
  1619. return( SSL_EDH_RSA_AES_256_SHA );
  1620. #endif
  1621. #if defined(POLARSSL_CAMELLIA_C)
  1622. if (0 == strcasecmp(ciphersuite_name, "SSL-RSA-CAMELLIA-128-SHA"))
  1623. return( SSL_RSA_CAMELLIA_128_SHA );
  1624. if (0 == strcasecmp(ciphersuite_name, "SSL-EDH-RSA-CAMELLIA-128-SHA"))
  1625. return( SSL_EDH_RSA_CAMELLIA_128_SHA );
  1626. if (0 == strcasecmp(ciphersuite_name, "SSL-RSA-CAMELLIA-256-SHA"))
  1627. return( SSL_RSA_CAMELLIA_256_SHA );
  1628. if (0 == strcasecmp(ciphersuite_name, "SSL-EDH-RSA-CAMELLIA-256-SHA"))
  1629. return( SSL_EDH_RSA_CAMELLIA_256_SHA );
  1630. #endif
  1631. return( 0 );
  1632. }
  1633. const char *ssl_get_ciphersuite( const ssl_context *ssl )
  1634. {
  1635. return ssl_get_ciphersuite_name( ssl->session->ciphersuite );
  1636. }
  1637. const char *ssl_get_version( const ssl_context *ssl )
  1638. {
  1639. switch( ssl->minor_ver )
  1640. {
  1641. case SSL_MINOR_VERSION_0:
  1642. return( "SSLv3.0" );
  1643. case SSL_MINOR_VERSION_1:
  1644. return( "TLSv1.0" );
  1645. case SSL_MINOR_VERSION_2:
  1646. return( "TLSv1.1" );
  1647. default:
  1648. break;
  1649. }
  1650. return( "unknown" );
  1651. }
  1652. int ssl_default_ciphersuites[] =
  1653. {
  1654. #if defined(POLARSSL_DHM_C)
  1655. #if defined(POLARSSL_AES_C)
  1656. SSL_EDH_RSA_AES_128_SHA,
  1657. SSL_EDH_RSA_AES_256_SHA,
  1658. #endif
  1659. #if defined(POLARSSL_CAMELLIA_C)
  1660. SSL_EDH_RSA_CAMELLIA_128_SHA,
  1661. SSL_EDH_RSA_CAMELLIA_256_SHA,
  1662. #endif
  1663. #if defined(POLARSSL_DES_C)
  1664. SSL_EDH_RSA_DES_168_SHA,
  1665. #endif
  1666. #endif
  1667. #if defined(POLARSSL_AES_C)
  1668. SSL_RSA_AES_256_SHA,
  1669. #endif
  1670. #if defined(POLARSSL_CAMELLIA_C)
  1671. SSL_RSA_CAMELLIA_256_SHA,
  1672. #endif
  1673. #if defined(POLARSSL_AES_C)
  1674. SSL_RSA_AES_128_SHA,
  1675. #endif
  1676. #if defined(POLARSSL_CAMELLIA_C)
  1677. SSL_RSA_CAMELLIA_128_SHA,
  1678. #endif
  1679. #if defined(POLARSSL_DES_C)
  1680. SSL_RSA_DES_168_SHA,
  1681. #endif
  1682. #if defined(POLARSSL_ARC4_C)
  1683. SSL_RSA_RC4_128_SHA,
  1684. SSL_RSA_RC4_128_MD5,
  1685. #endif
  1686. 0
  1687. };
  1688. /*
  1689. * Perform the SSL handshake
  1690. */
  1691. int ssl_handshake( ssl_context *ssl )
  1692. {
  1693. int ret = POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE;
  1694. SSL_DEBUG_MSG( 2, ( "=> handshake" ) );
  1695. #if defined(POLARSSL_SSL_CLI_C)
  1696. if( ssl->endpoint == SSL_IS_CLIENT )
  1697. ret = ssl_handshake_client( ssl );
  1698. #endif
  1699. #if defined(POLARSSL_SSL_SRV_C)
  1700. if( ssl->endpoint == SSL_IS_SERVER )
  1701. ret = ssl_handshake_server( ssl );
  1702. #endif
  1703. SSL_DEBUG_MSG( 2, ( "<= handshake" ) );
  1704. return( ret );
  1705. }
  1706. /*
  1707. * Receive application data decrypted from the SSL layer
  1708. */
  1709. int ssl_read( ssl_context *ssl, unsigned char *buf, size_t len )
  1710. {
  1711. int ret;
  1712. size_t n;
  1713. SSL_DEBUG_MSG( 2, ( "=> read" ) );
  1714. if( ssl->state != SSL_HANDSHAKE_OVER )
  1715. {
  1716. if( ( ret = ssl_handshake( ssl ) ) != 0 )
  1717. {
  1718. SSL_DEBUG_RET( 1, "ssl_handshake", ret );
  1719. return( ret );
  1720. }
  1721. }
  1722. if( ssl->in_offt == NULL )
  1723. {
  1724. if( ( ret = ssl_read_record( ssl ) ) != 0 )
  1725. {
  1726. if( ret == POLARSSL_ERR_SSL_CONN_EOF )
  1727. return( 0 );
  1728. SSL_DEBUG_RET( 1, "ssl_read_record", ret );
  1729. return( ret );
  1730. }
  1731. if( ssl->in_msglen == 0 &&
  1732. ssl->in_msgtype == SSL_MSG_APPLICATION_DATA )
  1733. {
  1734. /*
  1735. * OpenSSL sends empty messages to randomize the IV
  1736. */
  1737. if( ( ret = ssl_read_record( ssl ) ) != 0 )
  1738. {
  1739. if( ret == POLARSSL_ERR_SSL_CONN_EOF )
  1740. return( 0 );
  1741. SSL_DEBUG_RET( 1, "ssl_read_record", ret );
  1742. return( ret );
  1743. }
  1744. }
  1745. if( ssl->in_msgtype != SSL_MSG_APPLICATION_DATA )
  1746. {
  1747. SSL_DEBUG_MSG( 1, ( "bad application data message" ) );
  1748. return( POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE );
  1749. }
  1750. ssl->in_offt = ssl->in_msg;
  1751. }
  1752. n = ( len < ssl->in_msglen )
  1753. ? len : ssl->in_msglen;
  1754. memcpy( buf, ssl->in_offt, n );
  1755. ssl->in_msglen -= n;
  1756. if( ssl->in_msglen == 0 )
  1757. /* all bytes consumed */
  1758. ssl->in_offt = NULL;
  1759. else
  1760. /* more data available */
  1761. ssl->in_offt += n;
  1762. SSL_DEBUG_MSG( 2, ( "<= read" ) );
  1763. return( (int) n );
  1764. }
  1765. /*
  1766. * Send application data to be encrypted by the SSL layer
  1767. */
  1768. int ssl_write( ssl_context *ssl, const unsigned char *buf, size_t len )
  1769. {
  1770. int ret;
  1771. size_t n;
  1772. SSL_DEBUG_MSG( 2, ( "=> write" ) );
  1773. if( ssl->state != SSL_HANDSHAKE_OVER )
  1774. {
  1775. if( ( ret = ssl_handshake( ssl ) ) != 0 )
  1776. {
  1777. SSL_DEBUG_RET( 1, "ssl_handshake", ret );
  1778. return( ret );
  1779. }
  1780. }
  1781. n = ( len < SSL_MAX_CONTENT_LEN )
  1782. ? len : SSL_MAX_CONTENT_LEN;
  1783. if( ssl->out_left != 0 )
  1784. {
  1785. if( ( ret = ssl_flush_output( ssl ) ) != 0 )
  1786. {
  1787. SSL_DEBUG_RET( 1, "ssl_flush_output", ret );
  1788. return( ret );
  1789. }
  1790. }
  1791. else
  1792. {
  1793. ssl->out_msglen = n;
  1794. ssl->out_msgtype = SSL_MSG_APPLICATION_DATA;
  1795. memcpy( ssl->out_msg, buf, n );
  1796. if( ( ret = ssl_write_record( ssl ) ) != 0 )
  1797. {
  1798. SSL_DEBUG_RET( 1, "ssl_write_record", ret );
  1799. return( ret );
  1800. }
  1801. }
  1802. SSL_DEBUG_MSG( 2, ( "<= write" ) );
  1803. return( (int) n );
  1804. }
  1805. /*
  1806. * Notify the peer that the connection is being closed
  1807. */
  1808. int ssl_close_notify( ssl_context *ssl )
  1809. {
  1810. int ret;
  1811. SSL_DEBUG_MSG( 2, ( "=> write close notify" ) );
  1812. if( ( ret = ssl_flush_output( ssl ) ) != 0 )
  1813. {
  1814. SSL_DEBUG_RET( 1, "ssl_flush_output", ret );
  1815. return( ret );
  1816. }
  1817. if( ssl->state == SSL_HANDSHAKE_OVER )
  1818. {
  1819. ssl->out_msgtype = SSL_MSG_ALERT;
  1820. ssl->out_msglen = 2;
  1821. ssl->out_msg[0] = SSL_ALERT_LEVEL_WARNING;
  1822. ssl->out_msg[1] = SSL_ALERT_MSG_CLOSE_NOTIFY;
  1823. if( ( ret = ssl_write_record( ssl ) ) != 0 )
  1824. {
  1825. SSL_DEBUG_RET( 1, "ssl_write_record", ret );
  1826. return( ret );
  1827. }
  1828. }
  1829. SSL_DEBUG_MSG( 2, ( "<= write close notify" ) );
  1830. return( ret );
  1831. }
  1832. /*
  1833. * Free an SSL context
  1834. */
  1835. void ssl_free( ssl_context *ssl )
  1836. {
  1837. SSL_DEBUG_MSG( 2, ( "=> free" ) );
  1838. if( ssl->peer_cert != NULL )
  1839. {
  1840. x509_free( ssl->peer_cert );
  1841. memset( ssl->peer_cert, 0, sizeof( x509_cert ) );
  1842. free( ssl->peer_cert );
  1843. }
  1844. if( ssl->out_ctr != NULL )
  1845. {
  1846. memset( ssl->out_ctr, 0, SSL_BUFFER_LEN );
  1847. free( ssl->out_ctr );
  1848. }
  1849. if( ssl->in_ctr != NULL )
  1850. {
  1851. memset( ssl->in_ctr, 0, SSL_BUFFER_LEN );
  1852. free( ssl->in_ctr );
  1853. }
  1854. #if defined(POLARSSL_DHM_C)
  1855. dhm_free( &ssl->dhm_ctx );
  1856. #endif
  1857. if ( ssl->hostname != NULL)
  1858. {
  1859. memset( ssl->hostname, 0, ssl->hostname_len );
  1860. free( ssl->hostname );
  1861. ssl->hostname_len = 0;
  1862. }
  1863. SSL_DEBUG_MSG( 2, ( "<= free" ) );
  1864. /* Actually free after last debug message */
  1865. memset( ssl, 0, sizeof( ssl_context ) );
  1866. }
  1867. #endif