ssl_cli.c 151 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545
  1. /*
  2. * SSLv3/TLSv1 client-side functions
  3. *
  4. * Copyright The Mbed TLS Contributors
  5. * SPDX-License-Identifier: Apache-2.0
  6. *
  7. * Licensed under the Apache License, Version 2.0 (the "License"); you may
  8. * not use this file except in compliance with the License.
  9. * You may obtain a copy of the License at
  10. *
  11. * http://www.apache.org/licenses/LICENSE-2.0
  12. *
  13. * Unless required by applicable law or agreed to in writing, software
  14. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  15. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  16. * See the License for the specific language governing permissions and
  17. * limitations under the License.
  18. */
  19. #include "common.h"
  20. #if defined(MBEDTLS_SSL_CLI_C)
  21. #if defined(MBEDTLS_PLATFORM_C)
  22. #include "mbedtls/platform.h"
  23. #else
  24. #include <stdlib.h>
  25. #define mbedtls_calloc calloc
  26. #define mbedtls_free free
  27. #endif
  28. #include "mbedtls/ssl.h"
  29. #include "mbedtls/ssl_internal.h"
  30. #include "mbedtls/debug.h"
  31. #include "mbedtls/error.h"
  32. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  33. #include "mbedtls/psa_util.h"
  34. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  35. #include <string.h>
  36. #include <stdint.h>
  37. #if defined(MBEDTLS_HAVE_TIME)
  38. #include "mbedtls/platform_time.h"
  39. #endif
  40. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  41. #include "mbedtls/platform_util.h"
  42. #endif
  43. #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
  44. static int ssl_conf_has_static_psk( mbedtls_ssl_config const *conf )
  45. {
  46. if( conf->psk_identity == NULL ||
  47. conf->psk_identity_len == 0 )
  48. {
  49. return( 0 );
  50. }
  51. if( conf->psk != NULL && conf->psk_len != 0 )
  52. return( 1 );
  53. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  54. if( ! mbedtls_svc_key_id_is_null( conf->psk_opaque ) )
  55. return( 1 );
  56. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  57. return( 0 );
  58. }
  59. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  60. static int ssl_conf_has_static_raw_psk( mbedtls_ssl_config const *conf )
  61. {
  62. if( conf->psk_identity == NULL ||
  63. conf->psk_identity_len == 0 )
  64. {
  65. return( 0 );
  66. }
  67. if( conf->psk != NULL && conf->psk_len != 0 )
  68. return( 1 );
  69. return( 0 );
  70. }
  71. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  72. #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
  73. #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
  74. static int ssl_write_hostname_ext( mbedtls_ssl_context *ssl,
  75. unsigned char *buf,
  76. const unsigned char *end,
  77. size_t *olen )
  78. {
  79. unsigned char *p = buf;
  80. size_t hostname_len;
  81. *olen = 0;
  82. if( ssl->hostname == NULL )
  83. return( 0 );
  84. MBEDTLS_SSL_DEBUG_MSG( 3,
  85. ( "client hello, adding server name extension: %s",
  86. ssl->hostname ) );
  87. hostname_len = strlen( ssl->hostname );
  88. MBEDTLS_SSL_CHK_BUF_PTR( p, end, hostname_len + 9 );
  89. /*
  90. * Sect. 3, RFC 6066 (TLS Extensions Definitions)
  91. *
  92. * In order to provide any of the server names, clients MAY include an
  93. * extension of type "server_name" in the (extended) client hello. The
  94. * "extension_data" field of this extension SHALL contain
  95. * "ServerNameList" where:
  96. *
  97. * struct {
  98. * NameType name_type;
  99. * select (name_type) {
  100. * case host_name: HostName;
  101. * } name;
  102. * } ServerName;
  103. *
  104. * enum {
  105. * host_name(0), (255)
  106. * } NameType;
  107. *
  108. * opaque HostName<1..2^16-1>;
  109. *
  110. * struct {
  111. * ServerName server_name_list<1..2^16-1>
  112. * } ServerNameList;
  113. *
  114. */
  115. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SERVERNAME >> 8 ) & 0xFF );
  116. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SERVERNAME ) & 0xFF );
  117. *p++ = (unsigned char)( ( (hostname_len + 5) >> 8 ) & 0xFF );
  118. *p++ = (unsigned char)( ( (hostname_len + 5) ) & 0xFF );
  119. *p++ = (unsigned char)( ( (hostname_len + 3) >> 8 ) & 0xFF );
  120. *p++ = (unsigned char)( ( (hostname_len + 3) ) & 0xFF );
  121. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME ) & 0xFF );
  122. *p++ = (unsigned char)( ( hostname_len >> 8 ) & 0xFF );
  123. *p++ = (unsigned char)( ( hostname_len ) & 0xFF );
  124. memcpy( p, ssl->hostname, hostname_len );
  125. *olen = hostname_len + 9;
  126. return( 0 );
  127. }
  128. #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
  129. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  130. static int ssl_write_renegotiation_ext( mbedtls_ssl_context *ssl,
  131. unsigned char *buf,
  132. const unsigned char *end,
  133. size_t *olen )
  134. {
  135. unsigned char *p = buf;
  136. *olen = 0;
  137. /* We're always including an TLS_EMPTY_RENEGOTIATION_INFO_SCSV in the
  138. * initial ClientHello, in which case also adding the renegotiation
  139. * info extension is NOT RECOMMENDED as per RFC 5746 Section 3.4. */
  140. if( ssl->renego_status != MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS )
  141. return( 0 );
  142. MBEDTLS_SSL_DEBUG_MSG( 3,
  143. ( "client hello, adding renegotiation extension" ) );
  144. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 5 + ssl->verify_data_len );
  145. /*
  146. * Secure renegotiation
  147. */
  148. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_RENEGOTIATION_INFO >> 8 )
  149. & 0xFF );
  150. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_RENEGOTIATION_INFO )
  151. & 0xFF );
  152. *p++ = 0x00;
  153. *p++ = ( ssl->verify_data_len + 1 ) & 0xFF;
  154. *p++ = ssl->verify_data_len & 0xFF;
  155. memcpy( p, ssl->own_verify_data, ssl->verify_data_len );
  156. *olen = 5 + ssl->verify_data_len;
  157. return( 0 );
  158. }
  159. #endif /* MBEDTLS_SSL_RENEGOTIATION */
  160. /*
  161. * Only if we handle at least one key exchange that needs signatures.
  162. */
  163. #if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
  164. defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
  165. static int ssl_write_signature_algorithms_ext( mbedtls_ssl_context *ssl,
  166. unsigned char *buf,
  167. const unsigned char *end,
  168. size_t *olen )
  169. {
  170. unsigned char *p = buf;
  171. size_t sig_alg_len = 0;
  172. const int *md;
  173. #if defined(MBEDTLS_RSA_C) || defined(MBEDTLS_ECDSA_C)
  174. unsigned char *sig_alg_list = buf + 6;
  175. #endif
  176. *olen = 0;
  177. if( ssl->conf->max_minor_ver != MBEDTLS_SSL_MINOR_VERSION_3 )
  178. return( 0 );
  179. MBEDTLS_SSL_DEBUG_MSG( 3,
  180. ( "client hello, adding signature_algorithms extension" ) );
  181. if( ssl->conf->sig_hashes == NULL )
  182. return( MBEDTLS_ERR_SSL_BAD_CONFIG );
  183. for( md = ssl->conf->sig_hashes; *md != MBEDTLS_MD_NONE; md++ )
  184. {
  185. #if defined(MBEDTLS_ECDSA_C)
  186. sig_alg_len += 2;
  187. #endif
  188. #if defined(MBEDTLS_RSA_C)
  189. sig_alg_len += 2;
  190. #endif
  191. if( sig_alg_len > MBEDTLS_SSL_MAX_SIG_HASH_ALG_LIST_LEN )
  192. {
  193. MBEDTLS_SSL_DEBUG_MSG( 3,
  194. ( "length in bytes of sig-hash-alg extension too big" ) );
  195. return( MBEDTLS_ERR_SSL_BAD_CONFIG );
  196. }
  197. }
  198. /* Empty signature algorithms list, this is a configuration error. */
  199. if( sig_alg_len == 0 )
  200. return( MBEDTLS_ERR_SSL_BAD_CONFIG );
  201. MBEDTLS_SSL_CHK_BUF_PTR( p, end, sig_alg_len + 6 );
  202. /*
  203. * Prepare signature_algorithms extension (TLS 1.2)
  204. */
  205. sig_alg_len = 0;
  206. for( md = ssl->conf->sig_hashes; *md != MBEDTLS_MD_NONE; md++ )
  207. {
  208. #if defined(MBEDTLS_ECDSA_C)
  209. sig_alg_list[sig_alg_len++] = mbedtls_ssl_hash_from_md_alg( *md );
  210. sig_alg_list[sig_alg_len++] = MBEDTLS_SSL_SIG_ECDSA;
  211. #endif
  212. #if defined(MBEDTLS_RSA_C)
  213. sig_alg_list[sig_alg_len++] = mbedtls_ssl_hash_from_md_alg( *md );
  214. sig_alg_list[sig_alg_len++] = MBEDTLS_SSL_SIG_RSA;
  215. #endif
  216. }
  217. /*
  218. * enum {
  219. * none(0), md5(1), sha1(2), sha224(3), sha256(4), sha384(5),
  220. * sha512(6), (255)
  221. * } HashAlgorithm;
  222. *
  223. * enum { anonymous(0), rsa(1), dsa(2), ecdsa(3), (255) }
  224. * SignatureAlgorithm;
  225. *
  226. * struct {
  227. * HashAlgorithm hash;
  228. * SignatureAlgorithm signature;
  229. * } SignatureAndHashAlgorithm;
  230. *
  231. * SignatureAndHashAlgorithm
  232. * supported_signature_algorithms<2..2^16-2>;
  233. */
  234. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SIG_ALG >> 8 ) & 0xFF );
  235. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SIG_ALG ) & 0xFF );
  236. *p++ = (unsigned char)( ( ( sig_alg_len + 2 ) >> 8 ) & 0xFF );
  237. *p++ = (unsigned char)( ( ( sig_alg_len + 2 ) ) & 0xFF );
  238. *p++ = (unsigned char)( ( sig_alg_len >> 8 ) & 0xFF );
  239. *p++ = (unsigned char)( ( sig_alg_len ) & 0xFF );
  240. *olen = 6 + sig_alg_len;
  241. return( 0 );
  242. }
  243. #endif /* MBEDTLS_SSL_PROTO_TLS1_2 &&
  244. MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
  245. #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
  246. defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  247. static int ssl_write_supported_elliptic_curves_ext( mbedtls_ssl_context *ssl,
  248. unsigned char *buf,
  249. const unsigned char *end,
  250. size_t *olen )
  251. {
  252. unsigned char *p = buf;
  253. unsigned char *elliptic_curve_list = p + 6;
  254. size_t elliptic_curve_len = 0;
  255. const mbedtls_ecp_curve_info *info;
  256. const mbedtls_ecp_group_id *grp_id;
  257. *olen = 0;
  258. MBEDTLS_SSL_DEBUG_MSG( 3,
  259. ( "client hello, adding supported_elliptic_curves extension" ) );
  260. if( ssl->conf->curve_list == NULL )
  261. return( MBEDTLS_ERR_SSL_BAD_CONFIG );
  262. for( grp_id = ssl->conf->curve_list;
  263. *grp_id != MBEDTLS_ECP_DP_NONE;
  264. grp_id++ )
  265. {
  266. info = mbedtls_ecp_curve_info_from_grp_id( *grp_id );
  267. if( info == NULL )
  268. {
  269. MBEDTLS_SSL_DEBUG_MSG( 1,
  270. ( "invalid curve in ssl configuration" ) );
  271. return( MBEDTLS_ERR_SSL_BAD_CONFIG );
  272. }
  273. elliptic_curve_len += 2;
  274. if( elliptic_curve_len > MBEDTLS_SSL_MAX_CURVE_LIST_LEN )
  275. {
  276. MBEDTLS_SSL_DEBUG_MSG( 3,
  277. ( "malformed supported_elliptic_curves extension in config" ) );
  278. return( MBEDTLS_ERR_SSL_BAD_CONFIG );
  279. }
  280. }
  281. /* Empty elliptic curve list, this is a configuration error. */
  282. if( elliptic_curve_len == 0 )
  283. return( MBEDTLS_ERR_SSL_BAD_CONFIG );
  284. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 + elliptic_curve_len );
  285. elliptic_curve_len = 0;
  286. for( grp_id = ssl->conf->curve_list;
  287. *grp_id != MBEDTLS_ECP_DP_NONE;
  288. grp_id++ )
  289. {
  290. info = mbedtls_ecp_curve_info_from_grp_id( *grp_id );
  291. elliptic_curve_list[elliptic_curve_len++] = info->tls_id >> 8;
  292. elliptic_curve_list[elliptic_curve_len++] = info->tls_id & 0xFF;
  293. }
  294. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES >> 8 )
  295. & 0xFF );
  296. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES )
  297. & 0xFF );
  298. *p++ = (unsigned char)( ( ( elliptic_curve_len + 2 ) >> 8 ) & 0xFF );
  299. *p++ = (unsigned char)( ( ( elliptic_curve_len + 2 ) ) & 0xFF );
  300. *p++ = (unsigned char)( ( ( elliptic_curve_len ) >> 8 ) & 0xFF );
  301. *p++ = (unsigned char)( ( ( elliptic_curve_len ) ) & 0xFF );
  302. *olen = 6 + elliptic_curve_len;
  303. return( 0 );
  304. }
  305. static int ssl_write_supported_point_formats_ext( mbedtls_ssl_context *ssl,
  306. unsigned char *buf,
  307. const unsigned char *end,
  308. size_t *olen )
  309. {
  310. unsigned char *p = buf;
  311. (void) ssl; /* ssl used for debugging only */
  312. *olen = 0;
  313. MBEDTLS_SSL_DEBUG_MSG( 3,
  314. ( "client hello, adding supported_point_formats extension" ) );
  315. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 );
  316. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS >> 8 )
  317. & 0xFF );
  318. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS )
  319. & 0xFF );
  320. *p++ = 0x00;
  321. *p++ = 2;
  322. *p++ = 1;
  323. *p++ = MBEDTLS_ECP_PF_UNCOMPRESSED;
  324. *olen = 6;
  325. return( 0 );
  326. }
  327. #endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
  328. MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
  329. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  330. static int ssl_write_ecjpake_kkpp_ext( mbedtls_ssl_context *ssl,
  331. unsigned char *buf,
  332. const unsigned char *end,
  333. size_t *olen )
  334. {
  335. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  336. unsigned char *p = buf;
  337. size_t kkpp_len;
  338. *olen = 0;
  339. /* Skip costly extension if we can't use EC J-PAKE anyway */
  340. if( mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 )
  341. return( 0 );
  342. MBEDTLS_SSL_DEBUG_MSG( 3,
  343. ( "client hello, adding ecjpake_kkpp extension" ) );
  344. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 );
  345. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_ECJPAKE_KKPP >> 8 ) & 0xFF );
  346. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_ECJPAKE_KKPP ) & 0xFF );
  347. /*
  348. * We may need to send ClientHello multiple times for Hello verification.
  349. * We don't want to compute fresh values every time (both for performance
  350. * and consistency reasons), so cache the extension content.
  351. */
  352. if( ssl->handshake->ecjpake_cache == NULL ||
  353. ssl->handshake->ecjpake_cache_len == 0 )
  354. {
  355. MBEDTLS_SSL_DEBUG_MSG( 3, ( "generating new ecjpake parameters" ) );
  356. ret = mbedtls_ecjpake_write_round_one( &ssl->handshake->ecjpake_ctx,
  357. p + 2, end - p - 2, &kkpp_len,
  358. ssl->conf->f_rng, ssl->conf->p_rng );
  359. if( ret != 0 )
  360. {
  361. MBEDTLS_SSL_DEBUG_RET( 1 ,
  362. "mbedtls_ecjpake_write_round_one", ret );
  363. return( ret );
  364. }
  365. ssl->handshake->ecjpake_cache = mbedtls_calloc( 1, kkpp_len );
  366. if( ssl->handshake->ecjpake_cache == NULL )
  367. {
  368. MBEDTLS_SSL_DEBUG_MSG( 1, ( "allocation failed" ) );
  369. return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
  370. }
  371. memcpy( ssl->handshake->ecjpake_cache, p + 2, kkpp_len );
  372. ssl->handshake->ecjpake_cache_len = kkpp_len;
  373. }
  374. else
  375. {
  376. MBEDTLS_SSL_DEBUG_MSG( 3, ( "re-using cached ecjpake parameters" ) );
  377. kkpp_len = ssl->handshake->ecjpake_cache_len;
  378. MBEDTLS_SSL_CHK_BUF_PTR( p + 2, end, kkpp_len );
  379. memcpy( p + 2, ssl->handshake->ecjpake_cache, kkpp_len );
  380. }
  381. *p++ = (unsigned char)( ( kkpp_len >> 8 ) & 0xFF );
  382. *p++ = (unsigned char)( ( kkpp_len ) & 0xFF );
  383. *olen = kkpp_len + 4;
  384. return( 0 );
  385. }
  386. #endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
  387. #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
  388. static int ssl_write_cid_ext( mbedtls_ssl_context *ssl,
  389. unsigned char *buf,
  390. const unsigned char *end,
  391. size_t *olen )
  392. {
  393. unsigned char *p = buf;
  394. size_t ext_len;
  395. /*
  396. * Quoting draft-ietf-tls-dtls-connection-id-05
  397. * https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05
  398. *
  399. * struct {
  400. * opaque cid<0..2^8-1>;
  401. * } ConnectionId;
  402. */
  403. *olen = 0;
  404. if( ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ||
  405. ssl->negotiate_cid == MBEDTLS_SSL_CID_DISABLED )
  406. {
  407. return( 0 );
  408. }
  409. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding CID extension" ) );
  410. /* ssl->own_cid_len is at most MBEDTLS_SSL_CID_IN_LEN_MAX
  411. * which is at most 255, so the increment cannot overflow. */
  412. MBEDTLS_SSL_CHK_BUF_PTR( p, end, (unsigned)( ssl->own_cid_len + 5 ) );
  413. /* Add extension ID + size */
  414. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_CID >> 8 ) & 0xFF );
  415. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_CID ) & 0xFF );
  416. ext_len = (size_t) ssl->own_cid_len + 1;
  417. *p++ = (unsigned char)( ( ext_len >> 8 ) & 0xFF );
  418. *p++ = (unsigned char)( ( ext_len ) & 0xFF );
  419. *p++ = (uint8_t) ssl->own_cid_len;
  420. memcpy( p, ssl->own_cid, ssl->own_cid_len );
  421. *olen = ssl->own_cid_len + 5;
  422. return( 0 );
  423. }
  424. #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
  425. #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
  426. static int ssl_write_max_fragment_length_ext( mbedtls_ssl_context *ssl,
  427. unsigned char *buf,
  428. const unsigned char *end,
  429. size_t *olen )
  430. {
  431. unsigned char *p = buf;
  432. *olen = 0;
  433. if( ssl->conf->mfl_code == MBEDTLS_SSL_MAX_FRAG_LEN_NONE )
  434. return( 0 );
  435. MBEDTLS_SSL_DEBUG_MSG( 3,
  436. ( "client hello, adding max_fragment_length extension" ) );
  437. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 5 );
  438. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH >> 8 )
  439. & 0xFF );
  440. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH )
  441. & 0xFF );
  442. *p++ = 0x00;
  443. *p++ = 1;
  444. *p++ = ssl->conf->mfl_code;
  445. *olen = 5;
  446. return( 0 );
  447. }
  448. #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
  449. #if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
  450. static int ssl_write_truncated_hmac_ext( mbedtls_ssl_context *ssl,
  451. unsigned char *buf,
  452. const unsigned char *end,
  453. size_t *olen )
  454. {
  455. unsigned char *p = buf;
  456. *olen = 0;
  457. if( ssl->conf->trunc_hmac == MBEDTLS_SSL_TRUNC_HMAC_DISABLED )
  458. return( 0 );
  459. MBEDTLS_SSL_DEBUG_MSG( 3,
  460. ( "client hello, adding truncated_hmac extension" ) );
  461. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 );
  462. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_TRUNCATED_HMAC >> 8 ) & 0xFF );
  463. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_TRUNCATED_HMAC ) & 0xFF );
  464. *p++ = 0x00;
  465. *p++ = 0x00;
  466. *olen = 4;
  467. return( 0 );
  468. }
  469. #endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
  470. #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
  471. static int ssl_write_encrypt_then_mac_ext( mbedtls_ssl_context *ssl,
  472. unsigned char *buf,
  473. const unsigned char *end,
  474. size_t *olen )
  475. {
  476. unsigned char *p = buf;
  477. *olen = 0;
  478. if( ssl->conf->encrypt_then_mac == MBEDTLS_SSL_ETM_DISABLED ||
  479. ssl->conf->max_minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 )
  480. return( 0 );
  481. MBEDTLS_SSL_DEBUG_MSG( 3,
  482. ( "client hello, adding encrypt_then_mac extension" ) );
  483. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 );
  484. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC >> 8 ) & 0xFF );
  485. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC ) & 0xFF );
  486. *p++ = 0x00;
  487. *p++ = 0x00;
  488. *olen = 4;
  489. return( 0 );
  490. }
  491. #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
  492. #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
  493. static int ssl_write_extended_ms_ext( mbedtls_ssl_context *ssl,
  494. unsigned char *buf,
  495. const unsigned char *end,
  496. size_t *olen )
  497. {
  498. unsigned char *p = buf;
  499. *olen = 0;
  500. if( ssl->conf->extended_ms == MBEDTLS_SSL_EXTENDED_MS_DISABLED ||
  501. ssl->conf->max_minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 )
  502. return( 0 );
  503. MBEDTLS_SSL_DEBUG_MSG( 3,
  504. ( "client hello, adding extended_master_secret extension" ) );
  505. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 );
  506. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET >> 8 )
  507. & 0xFF );
  508. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET )
  509. & 0xFF );
  510. *p++ = 0x00;
  511. *p++ = 0x00;
  512. *olen = 4;
  513. return( 0 );
  514. }
  515. #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
  516. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  517. static int ssl_write_session_ticket_ext( mbedtls_ssl_context *ssl,
  518. unsigned char *buf,
  519. const unsigned char *end,
  520. size_t *olen )
  521. {
  522. unsigned char *p = buf;
  523. size_t tlen = ssl->session_negotiate->ticket_len;
  524. *olen = 0;
  525. if( ssl->conf->session_tickets == MBEDTLS_SSL_SESSION_TICKETS_DISABLED )
  526. return( 0 );
  527. MBEDTLS_SSL_DEBUG_MSG( 3,
  528. ( "client hello, adding session ticket extension" ) );
  529. /* The addition is safe here since the ticket length is 16 bit. */
  530. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 4 + tlen );
  531. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SESSION_TICKET >> 8 ) & 0xFF );
  532. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_SESSION_TICKET ) & 0xFF );
  533. *p++ = (unsigned char)( ( tlen >> 8 ) & 0xFF );
  534. *p++ = (unsigned char)( ( tlen ) & 0xFF );
  535. *olen = 4;
  536. if( ssl->session_negotiate->ticket == NULL || tlen == 0 )
  537. return( 0 );
  538. MBEDTLS_SSL_DEBUG_MSG( 3,
  539. ( "sending session ticket of length %" MBEDTLS_PRINTF_SIZET, tlen ) );
  540. memcpy( p, ssl->session_negotiate->ticket, tlen );
  541. *olen += tlen;
  542. return( 0 );
  543. }
  544. #endif /* MBEDTLS_SSL_SESSION_TICKETS */
  545. #if defined(MBEDTLS_SSL_ALPN)
  546. static int ssl_write_alpn_ext( mbedtls_ssl_context *ssl,
  547. unsigned char *buf,
  548. const unsigned char *end,
  549. size_t *olen )
  550. {
  551. unsigned char *p = buf;
  552. size_t alpnlen = 0;
  553. const char **cur;
  554. *olen = 0;
  555. if( ssl->conf->alpn_list == NULL )
  556. return( 0 );
  557. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding alpn extension" ) );
  558. for( cur = ssl->conf->alpn_list; *cur != NULL; cur++ )
  559. alpnlen += strlen( *cur ) + 1;
  560. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 + alpnlen );
  561. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_ALPN >> 8 ) & 0xFF );
  562. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_ALPN ) & 0xFF );
  563. /*
  564. * opaque ProtocolName<1..2^8-1>;
  565. *
  566. * struct {
  567. * ProtocolName protocol_name_list<2..2^16-1>
  568. * } ProtocolNameList;
  569. */
  570. /* Skip writing extension and list length for now */
  571. p += 4;
  572. for( cur = ssl->conf->alpn_list; *cur != NULL; cur++ )
  573. {
  574. /*
  575. * mbedtls_ssl_conf_set_alpn_protocols() checked that the length of
  576. * protocol names is less than 255.
  577. */
  578. *p = (unsigned char)strlen( *cur );
  579. memcpy( p + 1, *cur, *p );
  580. p += 1 + *p;
  581. }
  582. *olen = p - buf;
  583. /* List length = olen - 2 (ext_type) - 2 (ext_len) - 2 (list_len) */
  584. buf[4] = (unsigned char)( ( ( *olen - 6 ) >> 8 ) & 0xFF );
  585. buf[5] = (unsigned char)( ( ( *olen - 6 ) ) & 0xFF );
  586. /* Extension length = olen - 2 (ext_type) - 2 (ext_len) */
  587. buf[2] = (unsigned char)( ( ( *olen - 4 ) >> 8 ) & 0xFF );
  588. buf[3] = (unsigned char)( ( ( *olen - 4 ) ) & 0xFF );
  589. return( 0 );
  590. }
  591. #endif /* MBEDTLS_SSL_ALPN */
  592. #if defined(MBEDTLS_SSL_DTLS_SRTP)
  593. static int ssl_write_use_srtp_ext( mbedtls_ssl_context *ssl,
  594. unsigned char *buf,
  595. const unsigned char *end,
  596. size_t *olen )
  597. {
  598. unsigned char *p = buf;
  599. size_t protection_profiles_index = 0, ext_len = 0;
  600. uint16_t mki_len = 0, profile_value = 0;
  601. *olen = 0;
  602. if( ( ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ) ||
  603. ( ssl->conf->dtls_srtp_profile_list == NULL ) ||
  604. ( ssl->conf->dtls_srtp_profile_list_len == 0 ) )
  605. {
  606. return( 0 );
  607. }
  608. /* RFC 5764 section 4.1.1
  609. * uint8 SRTPProtectionProfile[2];
  610. *
  611. * struct {
  612. * SRTPProtectionProfiles SRTPProtectionProfiles;
  613. * opaque srtp_mki<0..255>;
  614. * } UseSRTPData;
  615. * SRTPProtectionProfile SRTPProtectionProfiles<2..2^16-1>;
  616. */
  617. if( ssl->conf->dtls_srtp_mki_support == MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED )
  618. {
  619. mki_len = ssl->dtls_srtp_info.mki_len;
  620. }
  621. /* Extension length = 2 bytes for profiles length,
  622. * ssl->conf->dtls_srtp_profile_list_len * 2 (each profile is 2 bytes length ),
  623. * 1 byte for srtp_mki vector length and the mki_len value
  624. */
  625. ext_len = 2 + 2 * ( ssl->conf->dtls_srtp_profile_list_len ) + 1 + mki_len;
  626. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding use_srtp extension" ) );
  627. /* Check there is room in the buffer for the extension + 4 bytes
  628. * - the extension tag (2 bytes)
  629. * - the extension length (2 bytes)
  630. */
  631. MBEDTLS_SSL_CHK_BUF_PTR( p, end, ext_len + 4 );
  632. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_USE_SRTP >> 8 ) & 0xFF );
  633. *p++ = (unsigned char)( ( MBEDTLS_TLS_EXT_USE_SRTP ) & 0xFF );
  634. *p++ = (unsigned char)( ( ( ext_len & 0xFF00 ) >> 8 ) & 0xFF );
  635. *p++ = (unsigned char)( ext_len & 0xFF );
  636. /* protection profile length: 2*(ssl->conf->dtls_srtp_profile_list_len) */
  637. /* micro-optimization:
  638. * the list size is limited to MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH
  639. * which is lower than 127, so the upper byte of the length is always 0
  640. * For the documentation, the more generic code is left in comments
  641. * *p++ = (unsigned char)( ( ( 2 * ssl->conf->dtls_srtp_profile_list_len )
  642. * >> 8 ) & 0xFF );
  643. */
  644. *p++ = 0;
  645. *p++ = (unsigned char)( ( 2 * ssl->conf->dtls_srtp_profile_list_len )
  646. & 0xFF );
  647. for( protection_profiles_index=0;
  648. protection_profiles_index < ssl->conf->dtls_srtp_profile_list_len;
  649. protection_profiles_index++ )
  650. {
  651. profile_value = mbedtls_ssl_check_srtp_profile_value
  652. ( ssl->conf->dtls_srtp_profile_list[protection_profiles_index] );
  653. if( profile_value != MBEDTLS_TLS_SRTP_UNSET )
  654. {
  655. MBEDTLS_SSL_DEBUG_MSG( 3, ( "ssl_write_use_srtp_ext, add profile: %04x",
  656. profile_value ) );
  657. *p++ = ( ( profile_value >> 8 ) & 0xFF );
  658. *p++ = ( profile_value & 0xFF );
  659. }
  660. else
  661. {
  662. /*
  663. * Note: we shall never arrive here as protection profiles
  664. * is checked by mbedtls_ssl_conf_dtls_srtp_protection_profiles function
  665. */
  666. MBEDTLS_SSL_DEBUG_MSG( 3,
  667. ( "client hello, "
  668. "illegal DTLS-SRTP protection profile %d",
  669. ssl->conf->dtls_srtp_profile_list[protection_profiles_index]
  670. ) );
  671. return( MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED );
  672. }
  673. }
  674. *p++ = mki_len & 0xFF;
  675. if( mki_len != 0 )
  676. {
  677. memcpy( p, ssl->dtls_srtp_info.mki_value, mki_len );
  678. /*
  679. * Increment p to point to the current position.
  680. */
  681. p += mki_len;
  682. MBEDTLS_SSL_DEBUG_BUF( 3, "sending mki", ssl->dtls_srtp_info.mki_value,
  683. ssl->dtls_srtp_info.mki_len );
  684. }
  685. /*
  686. * total extension length: extension type (2 bytes)
  687. * + extension length (2 bytes)
  688. * + protection profile length (2 bytes)
  689. * + 2 * number of protection profiles
  690. * + srtp_mki vector length(1 byte)
  691. * + mki value
  692. */
  693. *olen = p - buf;
  694. return( 0 );
  695. }
  696. #endif /* MBEDTLS_SSL_DTLS_SRTP */
  697. /*
  698. * Generate random bytes for ClientHello
  699. */
  700. static int ssl_generate_random( mbedtls_ssl_context *ssl )
  701. {
  702. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  703. unsigned char *p = ssl->handshake->randbytes;
  704. #if defined(MBEDTLS_HAVE_TIME)
  705. mbedtls_time_t t;
  706. #endif
  707. /*
  708. * When responding to a verify request, MUST reuse random (RFC 6347 4.2.1)
  709. */
  710. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  711. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM &&
  712. ssl->handshake->verify_cookie != NULL )
  713. {
  714. return( 0 );
  715. }
  716. #endif
  717. #if defined(MBEDTLS_HAVE_TIME)
  718. t = mbedtls_time( NULL );
  719. *p++ = (unsigned char)( t >> 24 );
  720. *p++ = (unsigned char)( t >> 16 );
  721. *p++ = (unsigned char)( t >> 8 );
  722. *p++ = (unsigned char)( t );
  723. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, current time: %" MBEDTLS_PRINTF_LONGLONG,
  724. (long long) t ) );
  725. #else
  726. if( ( ret = ssl->conf->f_rng( ssl->conf->p_rng, p, 4 ) ) != 0 )
  727. return( ret );
  728. p += 4;
  729. #endif /* MBEDTLS_HAVE_TIME */
  730. if( ( ret = ssl->conf->f_rng( ssl->conf->p_rng, p, 28 ) ) != 0 )
  731. return( ret );
  732. return( 0 );
  733. }
  734. /**
  735. * \brief Validate cipher suite against config in SSL context.
  736. *
  737. * \param suite_info cipher suite to validate
  738. * \param ssl SSL context
  739. * \param min_minor_ver Minimal minor version to accept a cipher suite
  740. * \param max_minor_ver Maximal minor version to accept a cipher suite
  741. *
  742. * \return 0 if valid, else 1
  743. */
  744. static int ssl_validate_ciphersuite(
  745. const mbedtls_ssl_ciphersuite_t * suite_info,
  746. const mbedtls_ssl_context * ssl,
  747. int min_minor_ver, int max_minor_ver )
  748. {
  749. (void) ssl;
  750. if( suite_info == NULL )
  751. return( 1 );
  752. if( suite_info->min_minor_ver > max_minor_ver ||
  753. suite_info->max_minor_ver < min_minor_ver )
  754. return( 1 );
  755. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  756. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM &&
  757. ( suite_info->flags & MBEDTLS_CIPHERSUITE_NODTLS ) )
  758. return( 1 );
  759. #endif
  760. #if defined(MBEDTLS_ARC4_C)
  761. if( ssl->conf->arc4_disabled == MBEDTLS_SSL_ARC4_DISABLED &&
  762. suite_info->cipher == MBEDTLS_CIPHER_ARC4_128 )
  763. return( 1 );
  764. #endif
  765. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  766. if( suite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE &&
  767. mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 )
  768. return( 1 );
  769. #endif
  770. /* Don't suggest PSK-based ciphersuite if no PSK is available. */
  771. #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
  772. if( mbedtls_ssl_ciphersuite_uses_psk( suite_info ) &&
  773. ssl_conf_has_static_psk( ssl->conf ) == 0 )
  774. {
  775. return( 1 );
  776. }
  777. #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
  778. return( 0 );
  779. }
  780. static int ssl_write_client_hello( mbedtls_ssl_context *ssl )
  781. {
  782. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  783. size_t i, n, olen, ext_len = 0;
  784. unsigned char *buf;
  785. unsigned char *p, *q;
  786. const unsigned char *end;
  787. unsigned char offer_compress;
  788. const int *ciphersuites;
  789. const mbedtls_ssl_ciphersuite_t *ciphersuite_info;
  790. #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
  791. defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  792. int uses_ec = 0;
  793. #endif
  794. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write client hello" ) );
  795. if( ssl->conf->f_rng == NULL )
  796. {
  797. MBEDTLS_SSL_DEBUG_MSG( 1, ( "no RNG provided") );
  798. return( MBEDTLS_ERR_SSL_NO_RNG );
  799. }
  800. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  801. if( ssl->renego_status == MBEDTLS_SSL_INITIAL_HANDSHAKE )
  802. #endif
  803. {
  804. ssl->major_ver = ssl->conf->min_major_ver;
  805. ssl->minor_ver = ssl->conf->min_minor_ver;
  806. }
  807. if( ssl->conf->max_major_ver == 0 )
  808. {
  809. MBEDTLS_SSL_DEBUG_MSG( 1,
  810. ( "configured max major version is invalid, consider using mbedtls_ssl_config_defaults()" ) );
  811. return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
  812. }
  813. buf = ssl->out_msg;
  814. end = buf + MBEDTLS_SSL_OUT_CONTENT_LEN;
  815. /*
  816. * Check if there's enough space for the first part of the ClientHello
  817. * consisting of the 38 bytes described below, the session identifier (at
  818. * most 32 bytes) and its length (1 byte).
  819. *
  820. * Use static upper bounds instead of the actual values
  821. * to allow the compiler to optimize this away.
  822. */
  823. MBEDTLS_SSL_CHK_BUF_PTR( buf, end, 38 + 1 + 32 );
  824. /*
  825. * The 38 first bytes of the ClientHello:
  826. * 0 . 0 handshake type (written later)
  827. * 1 . 3 handshake length (written later)
  828. * 4 . 5 highest version supported
  829. * 6 . 9 current UNIX time
  830. * 10 . 37 random bytes
  831. *
  832. * The current UNIX time (4 bytes) and following 28 random bytes are written
  833. * by ssl_generate_random() into ssl->handshake->randbytes buffer and then
  834. * copied from there into the output buffer.
  835. */
  836. p = buf + 4;
  837. mbedtls_ssl_write_version( ssl->conf->max_major_ver,
  838. ssl->conf->max_minor_ver,
  839. ssl->conf->transport, p );
  840. p += 2;
  841. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, max version: [%d:%d]",
  842. buf[4], buf[5] ) );
  843. if( ( ret = ssl_generate_random( ssl ) ) != 0 )
  844. {
  845. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_generate_random", ret );
  846. return( ret );
  847. }
  848. memcpy( p, ssl->handshake->randbytes, 32 );
  849. MBEDTLS_SSL_DEBUG_BUF( 3, "client hello, random bytes", p, 32 );
  850. p += 32;
  851. /*
  852. * 38 . 38 session id length
  853. * 39 . 39+n session id
  854. * 39+n . 39+n DTLS only: cookie length (1 byte)
  855. * 40+n . .. DTLS only: cookie
  856. * .. . .. ciphersuitelist length (2 bytes)
  857. * .. . .. ciphersuitelist
  858. * .. . .. compression methods length (1 byte)
  859. * .. . .. compression methods
  860. * .. . .. extensions length (2 bytes)
  861. * .. . .. extensions
  862. */
  863. n = ssl->session_negotiate->id_len;
  864. if( n < 16 || n > 32 ||
  865. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  866. ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE ||
  867. #endif
  868. ssl->handshake->resume == 0 )
  869. {
  870. n = 0;
  871. }
  872. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  873. /*
  874. * RFC 5077 section 3.4: "When presenting a ticket, the client MAY
  875. * generate and include a Session ID in the TLS ClientHello."
  876. */
  877. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  878. if( ssl->renego_status == MBEDTLS_SSL_INITIAL_HANDSHAKE )
  879. #endif
  880. {
  881. if( ssl->session_negotiate->ticket != NULL &&
  882. ssl->session_negotiate->ticket_len != 0 )
  883. {
  884. ret = ssl->conf->f_rng( ssl->conf->p_rng,
  885. ssl->session_negotiate->id, 32 );
  886. if( ret != 0 )
  887. return( ret );
  888. ssl->session_negotiate->id_len = n = 32;
  889. }
  890. }
  891. #endif /* MBEDTLS_SSL_SESSION_TICKETS */
  892. /*
  893. * The first check of the output buffer size above (
  894. * MBEDTLS_SSL_CHK_BUF_PTR( buf, end, 38 + 1 + 32 );)
  895. * has checked that there is enough space in the output buffer for the
  896. * session identifier length byte and the session identifier (n <= 32).
  897. */
  898. *p++ = (unsigned char) n;
  899. for( i = 0; i < n; i++ )
  900. *p++ = ssl->session_negotiate->id[i];
  901. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, session id len.: %" MBEDTLS_PRINTF_SIZET, n ) );
  902. MBEDTLS_SSL_DEBUG_BUF( 3, "client hello, session id", buf + 39, n );
  903. /*
  904. * With 'n' being the length of the session identifier
  905. *
  906. * 39+n . 39+n DTLS only: cookie length (1 byte)
  907. * 40+n . .. DTLS only: cookie
  908. * .. . .. ciphersuitelist length (2 bytes)
  909. * .. . .. ciphersuitelist
  910. * .. . .. compression methods length (1 byte)
  911. * .. . .. compression methods
  912. * .. . .. extensions length (2 bytes)
  913. * .. . .. extensions
  914. */
  915. /*
  916. * DTLS cookie
  917. */
  918. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  919. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
  920. {
  921. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 1 );
  922. if( ssl->handshake->verify_cookie == NULL )
  923. {
  924. MBEDTLS_SSL_DEBUG_MSG( 3, ( "no verify cookie to send" ) );
  925. *p++ = 0;
  926. }
  927. else
  928. {
  929. MBEDTLS_SSL_DEBUG_BUF( 3, "client hello, cookie",
  930. ssl->handshake->verify_cookie,
  931. ssl->handshake->verify_cookie_len );
  932. *p++ = ssl->handshake->verify_cookie_len;
  933. MBEDTLS_SSL_CHK_BUF_PTR( p, end,
  934. ssl->handshake->verify_cookie_len );
  935. memcpy( p, ssl->handshake->verify_cookie,
  936. ssl->handshake->verify_cookie_len );
  937. p += ssl->handshake->verify_cookie_len;
  938. }
  939. }
  940. #endif
  941. /*
  942. * Ciphersuite list
  943. */
  944. ciphersuites = ssl->conf->ciphersuite_list[ssl->minor_ver];
  945. /* Skip writing ciphersuite length for now */
  946. n = 0;
  947. q = p;
  948. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
  949. p += 2;
  950. for( i = 0; ciphersuites[i] != 0; i++ )
  951. {
  952. ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( ciphersuites[i] );
  953. if( ssl_validate_ciphersuite( ciphersuite_info, ssl,
  954. ssl->conf->min_minor_ver,
  955. ssl->conf->max_minor_ver ) != 0 )
  956. continue;
  957. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, add ciphersuite: %#04x (%s)",
  958. (unsigned int)ciphersuites[i], ciphersuite_info->name ) );
  959. #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
  960. defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  961. uses_ec |= mbedtls_ssl_ciphersuite_uses_ec( ciphersuite_info );
  962. #endif
  963. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
  964. n++;
  965. *p++ = (unsigned char)( ciphersuites[i] >> 8 );
  966. *p++ = (unsigned char)( ciphersuites[i] );
  967. }
  968. MBEDTLS_SSL_DEBUG_MSG( 3,
  969. ( "client hello, got %" MBEDTLS_PRINTF_SIZET " ciphersuites (excluding SCSVs)", n ) );
  970. /*
  971. * Add TLS_EMPTY_RENEGOTIATION_INFO_SCSV
  972. */
  973. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  974. if( ssl->renego_status == MBEDTLS_SSL_INITIAL_HANDSHAKE )
  975. #endif
  976. {
  977. MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding EMPTY_RENEGOTIATION_INFO_SCSV" ) );
  978. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
  979. *p++ = (unsigned char)( MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO >> 8 );
  980. *p++ = (unsigned char)( MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO );
  981. n++;
  982. }
  983. /* Some versions of OpenSSL don't handle it correctly if not at end */
  984. #if defined(MBEDTLS_SSL_FALLBACK_SCSV)
  985. if( ssl->conf->fallback == MBEDTLS_SSL_IS_FALLBACK )
  986. {
  987. MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding FALLBACK_SCSV" ) );
  988. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
  989. *p++ = (unsigned char)( MBEDTLS_SSL_FALLBACK_SCSV_VALUE >> 8 );
  990. *p++ = (unsigned char)( MBEDTLS_SSL_FALLBACK_SCSV_VALUE );
  991. n++;
  992. }
  993. #endif
  994. *q++ = (unsigned char)( n >> 7 );
  995. *q++ = (unsigned char)( n << 1 );
  996. #if defined(MBEDTLS_ZLIB_SUPPORT)
  997. offer_compress = 1;
  998. #else
  999. offer_compress = 0;
  1000. #endif
  1001. /*
  1002. * We don't support compression with DTLS right now: if many records come
  1003. * in the same datagram, uncompressing one could overwrite the next one.
  1004. * We don't want to add complexity for handling that case unless there is
  1005. * an actual need for it.
  1006. */
  1007. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1008. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
  1009. offer_compress = 0;
  1010. #endif
  1011. if( offer_compress )
  1012. {
  1013. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress len.: %d", 2 ) );
  1014. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress alg.: %d %d",
  1015. MBEDTLS_SSL_COMPRESS_DEFLATE,
  1016. MBEDTLS_SSL_COMPRESS_NULL ) );
  1017. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 3 );
  1018. *p++ = 2;
  1019. *p++ = MBEDTLS_SSL_COMPRESS_DEFLATE;
  1020. *p++ = MBEDTLS_SSL_COMPRESS_NULL;
  1021. }
  1022. else
  1023. {
  1024. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress len.: %d", 1 ) );
  1025. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress alg.: %d",
  1026. MBEDTLS_SSL_COMPRESS_NULL ) );
  1027. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
  1028. *p++ = 1;
  1029. *p++ = MBEDTLS_SSL_COMPRESS_NULL;
  1030. }
  1031. /* First write extensions, then the total length */
  1032. MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
  1033. #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
  1034. if( ( ret = ssl_write_hostname_ext( ssl, p + 2 + ext_len,
  1035. end, &olen ) ) != 0 )
  1036. {
  1037. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_hostname_ext", ret );
  1038. return( ret );
  1039. }
  1040. ext_len += olen;
  1041. #endif
  1042. /* Note that TLS_EMPTY_RENEGOTIATION_INFO_SCSV is always added
  1043. * even if MBEDTLS_SSL_RENEGOTIATION is not defined. */
  1044. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  1045. if( ( ret = ssl_write_renegotiation_ext( ssl, p + 2 + ext_len,
  1046. end, &olen ) ) != 0 )
  1047. {
  1048. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_renegotiation_ext", ret );
  1049. return( ret );
  1050. }
  1051. ext_len += olen;
  1052. #endif
  1053. #if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
  1054. defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
  1055. if( ( ret = ssl_write_signature_algorithms_ext( ssl, p + 2 + ext_len,
  1056. end, &olen ) ) != 0 )
  1057. {
  1058. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_signature_algorithms_ext", ret );
  1059. return( ret );
  1060. }
  1061. ext_len += olen;
  1062. #endif
  1063. #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
  1064. defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  1065. if( uses_ec )
  1066. {
  1067. if( ( ret = ssl_write_supported_elliptic_curves_ext( ssl, p + 2 + ext_len,
  1068. end, &olen ) ) != 0 )
  1069. {
  1070. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_supported_elliptic_curves_ext", ret );
  1071. return( ret );
  1072. }
  1073. ext_len += olen;
  1074. if( ( ret = ssl_write_supported_point_formats_ext( ssl, p + 2 + ext_len,
  1075. end, &olen ) ) != 0 )
  1076. {
  1077. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_supported_point_formats_ext", ret );
  1078. return( ret );
  1079. }
  1080. ext_len += olen;
  1081. }
  1082. #endif
  1083. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  1084. if( ( ret = ssl_write_ecjpake_kkpp_ext( ssl, p + 2 + ext_len,
  1085. end, &olen ) ) != 0 )
  1086. {
  1087. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_ecjpake_kkpp_ext", ret );
  1088. return( ret );
  1089. }
  1090. ext_len += olen;
  1091. #endif
  1092. #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
  1093. if( ( ret = ssl_write_cid_ext( ssl, p + 2 + ext_len, end, &olen ) ) != 0 )
  1094. {
  1095. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_cid_ext", ret );
  1096. return( ret );
  1097. }
  1098. ext_len += olen;
  1099. #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
  1100. #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
  1101. if( ( ret = ssl_write_max_fragment_length_ext( ssl, p + 2 + ext_len,
  1102. end, &olen ) ) != 0 )
  1103. {
  1104. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_max_fragment_length_ext", ret );
  1105. return( ret );
  1106. }
  1107. ext_len += olen;
  1108. #endif
  1109. #if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
  1110. if( ( ret = ssl_write_truncated_hmac_ext( ssl, p + 2 + ext_len,
  1111. end, &olen ) ) != 0 )
  1112. {
  1113. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_truncated_hmac_ext", ret );
  1114. return( ret );
  1115. }
  1116. ext_len += olen;
  1117. #endif
  1118. #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
  1119. if( ( ret = ssl_write_encrypt_then_mac_ext( ssl, p + 2 + ext_len,
  1120. end, &olen ) ) != 0 )
  1121. {
  1122. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_encrypt_then_mac_ext", ret );
  1123. return( ret );
  1124. }
  1125. ext_len += olen;
  1126. #endif
  1127. #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
  1128. if( ( ret = ssl_write_extended_ms_ext( ssl, p + 2 + ext_len,
  1129. end, &olen ) ) != 0 )
  1130. {
  1131. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_extended_ms_ext", ret );
  1132. return( ret );
  1133. }
  1134. ext_len += olen;
  1135. #endif
  1136. #if defined(MBEDTLS_SSL_ALPN)
  1137. if( ( ret = ssl_write_alpn_ext( ssl, p + 2 + ext_len,
  1138. end, &olen ) ) != 0 )
  1139. {
  1140. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_alpn_ext", ret );
  1141. return( ret );
  1142. }
  1143. ext_len += olen;
  1144. #endif
  1145. #if defined(MBEDTLS_SSL_DTLS_SRTP)
  1146. if( ( ret = ssl_write_use_srtp_ext( ssl, p + 2 + ext_len,
  1147. end, &olen ) ) != 0 )
  1148. {
  1149. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_use_srtp_ext", ret );
  1150. return( ret );
  1151. }
  1152. ext_len += olen;
  1153. #endif
  1154. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  1155. if( ( ret = ssl_write_session_ticket_ext( ssl, p + 2 + ext_len,
  1156. end, &olen ) ) != 0 )
  1157. {
  1158. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_write_session_ticket_ext", ret );
  1159. return( ret );
  1160. }
  1161. ext_len += olen;
  1162. #endif
  1163. /* olen unused if all extensions are disabled */
  1164. ((void) olen);
  1165. MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, total extension length: %" MBEDTLS_PRINTF_SIZET,
  1166. ext_len ) );
  1167. if( ext_len > 0 )
  1168. {
  1169. /* No need to check for space here, because the extension
  1170. * writing functions already took care of that. */
  1171. *p++ = (unsigned char)( ( ext_len >> 8 ) & 0xFF );
  1172. *p++ = (unsigned char)( ( ext_len ) & 0xFF );
  1173. p += ext_len;
  1174. }
  1175. ssl->out_msglen = p - buf;
  1176. ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
  1177. ssl->out_msg[0] = MBEDTLS_SSL_HS_CLIENT_HELLO;
  1178. ssl->state++;
  1179. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1180. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
  1181. mbedtls_ssl_send_flight_completed( ssl );
  1182. #endif
  1183. if( ( ret = mbedtls_ssl_write_handshake_msg( ssl ) ) != 0 )
  1184. {
  1185. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_handshake_msg", ret );
  1186. return( ret );
  1187. }
  1188. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1189. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM &&
  1190. ( ret = mbedtls_ssl_flight_transmit( ssl ) ) != 0 )
  1191. {
  1192. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_flight_transmit", ret );
  1193. return( ret );
  1194. }
  1195. #endif /* MBEDTLS_SSL_PROTO_DTLS */
  1196. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write client hello" ) );
  1197. return( 0 );
  1198. }
  1199. static int ssl_parse_renegotiation_info( mbedtls_ssl_context *ssl,
  1200. const unsigned char *buf,
  1201. size_t len )
  1202. {
  1203. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  1204. if( ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE )
  1205. {
  1206. /* Check verify-data in constant-time. The length OTOH is no secret */
  1207. if( len != 1 + ssl->verify_data_len * 2 ||
  1208. buf[0] != ssl->verify_data_len * 2 ||
  1209. mbedtls_ssl_safer_memcmp( buf + 1,
  1210. ssl->own_verify_data, ssl->verify_data_len ) != 0 ||
  1211. mbedtls_ssl_safer_memcmp( buf + 1 + ssl->verify_data_len,
  1212. ssl->peer_verify_data, ssl->verify_data_len ) != 0 )
  1213. {
  1214. MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-matching renegotiation info" ) );
  1215. mbedtls_ssl_send_alert_message(
  1216. ssl,
  1217. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1218. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1219. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1220. }
  1221. }
  1222. else
  1223. #endif /* MBEDTLS_SSL_RENEGOTIATION */
  1224. {
  1225. if( len != 1 || buf[0] != 0x00 )
  1226. {
  1227. MBEDTLS_SSL_DEBUG_MSG( 1,
  1228. ( "non-zero length renegotiation info" ) );
  1229. mbedtls_ssl_send_alert_message(
  1230. ssl,
  1231. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1232. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1233. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1234. }
  1235. ssl->secure_renegotiation = MBEDTLS_SSL_SECURE_RENEGOTIATION;
  1236. }
  1237. return( 0 );
  1238. }
  1239. #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
  1240. static int ssl_parse_max_fragment_length_ext( mbedtls_ssl_context *ssl,
  1241. const unsigned char *buf,
  1242. size_t len )
  1243. {
  1244. /*
  1245. * server should use the extension only if we did,
  1246. * and if so the server's value should match ours (and len is always 1)
  1247. */
  1248. if( ssl->conf->mfl_code == MBEDTLS_SSL_MAX_FRAG_LEN_NONE ||
  1249. len != 1 ||
  1250. buf[0] != ssl->conf->mfl_code )
  1251. {
  1252. MBEDTLS_SSL_DEBUG_MSG( 1,
  1253. ( "non-matching max fragment length extension" ) );
  1254. mbedtls_ssl_send_alert_message(
  1255. ssl,
  1256. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1257. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  1258. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1259. }
  1260. return( 0 );
  1261. }
  1262. #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
  1263. #if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
  1264. static int ssl_parse_truncated_hmac_ext( mbedtls_ssl_context *ssl,
  1265. const unsigned char *buf,
  1266. size_t len )
  1267. {
  1268. if( ssl->conf->trunc_hmac == MBEDTLS_SSL_TRUNC_HMAC_DISABLED ||
  1269. len != 0 )
  1270. {
  1271. MBEDTLS_SSL_DEBUG_MSG( 1,
  1272. ( "non-matching truncated HMAC extension" ) );
  1273. mbedtls_ssl_send_alert_message(
  1274. ssl,
  1275. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1276. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1277. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1278. }
  1279. ((void) buf);
  1280. ssl->session_negotiate->trunc_hmac = MBEDTLS_SSL_TRUNC_HMAC_ENABLED;
  1281. return( 0 );
  1282. }
  1283. #endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
  1284. #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
  1285. static int ssl_parse_cid_ext( mbedtls_ssl_context *ssl,
  1286. const unsigned char *buf,
  1287. size_t len )
  1288. {
  1289. size_t peer_cid_len;
  1290. if( /* CID extension only makes sense in DTLS */
  1291. ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ||
  1292. /* The server must only send the CID extension if we have offered it. */
  1293. ssl->negotiate_cid == MBEDTLS_SSL_CID_DISABLED )
  1294. {
  1295. MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension unexpected" ) );
  1296. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1297. MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
  1298. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1299. }
  1300. if( len == 0 )
  1301. {
  1302. MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension invalid" ) );
  1303. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1304. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1305. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1306. }
  1307. peer_cid_len = *buf++;
  1308. len--;
  1309. if( peer_cid_len > MBEDTLS_SSL_CID_OUT_LEN_MAX )
  1310. {
  1311. MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension invalid" ) );
  1312. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1313. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1314. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1315. }
  1316. if( len != peer_cid_len )
  1317. {
  1318. MBEDTLS_SSL_DEBUG_MSG( 1, ( "CID extension invalid" ) );
  1319. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1320. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  1321. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1322. }
  1323. ssl->handshake->cid_in_use = MBEDTLS_SSL_CID_ENABLED;
  1324. ssl->handshake->peer_cid_len = (uint8_t) peer_cid_len;
  1325. memcpy( ssl->handshake->peer_cid, buf, peer_cid_len );
  1326. MBEDTLS_SSL_DEBUG_MSG( 3, ( "Use of CID extension negotiated" ) );
  1327. MBEDTLS_SSL_DEBUG_BUF( 3, "Server CID", buf, peer_cid_len );
  1328. return( 0 );
  1329. }
  1330. #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
  1331. #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
  1332. static int ssl_parse_encrypt_then_mac_ext( mbedtls_ssl_context *ssl,
  1333. const unsigned char *buf,
  1334. size_t len )
  1335. {
  1336. if( ssl->conf->encrypt_then_mac == MBEDTLS_SSL_ETM_DISABLED ||
  1337. ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ||
  1338. len != 0 )
  1339. {
  1340. MBEDTLS_SSL_DEBUG_MSG( 1,
  1341. ( "non-matching encrypt-then-MAC extension" ) );
  1342. mbedtls_ssl_send_alert_message(
  1343. ssl,
  1344. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1345. MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
  1346. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1347. }
  1348. ((void) buf);
  1349. ssl->session_negotiate->encrypt_then_mac = MBEDTLS_SSL_ETM_ENABLED;
  1350. return( 0 );
  1351. }
  1352. #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
  1353. #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
  1354. static int ssl_parse_extended_ms_ext( mbedtls_ssl_context *ssl,
  1355. const unsigned char *buf,
  1356. size_t len )
  1357. {
  1358. if( ssl->conf->extended_ms == MBEDTLS_SSL_EXTENDED_MS_DISABLED ||
  1359. ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ||
  1360. len != 0 )
  1361. {
  1362. MBEDTLS_SSL_DEBUG_MSG( 1,
  1363. ( "non-matching extended master secret extension" ) );
  1364. mbedtls_ssl_send_alert_message(
  1365. ssl,
  1366. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1367. MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
  1368. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1369. }
  1370. ((void) buf);
  1371. ssl->handshake->extended_ms = MBEDTLS_SSL_EXTENDED_MS_ENABLED;
  1372. return( 0 );
  1373. }
  1374. #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
  1375. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  1376. static int ssl_parse_session_ticket_ext( mbedtls_ssl_context *ssl,
  1377. const unsigned char *buf,
  1378. size_t len )
  1379. {
  1380. if( ssl->conf->session_tickets == MBEDTLS_SSL_SESSION_TICKETS_DISABLED ||
  1381. len != 0 )
  1382. {
  1383. MBEDTLS_SSL_DEBUG_MSG( 1,
  1384. ( "non-matching session ticket extension" ) );
  1385. mbedtls_ssl_send_alert_message(
  1386. ssl,
  1387. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1388. MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
  1389. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1390. }
  1391. ((void) buf);
  1392. ssl->handshake->new_session_ticket = 1;
  1393. return( 0 );
  1394. }
  1395. #endif /* MBEDTLS_SSL_SESSION_TICKETS */
  1396. #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
  1397. defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  1398. static int ssl_parse_supported_point_formats_ext( mbedtls_ssl_context *ssl,
  1399. const unsigned char *buf,
  1400. size_t len )
  1401. {
  1402. size_t list_size;
  1403. const unsigned char *p;
  1404. if( len == 0 || (size_t)( buf[0] + 1 ) != len )
  1405. {
  1406. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1407. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1408. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1409. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1410. }
  1411. list_size = buf[0];
  1412. p = buf + 1;
  1413. while( list_size > 0 )
  1414. {
  1415. if( p[0] == MBEDTLS_ECP_PF_UNCOMPRESSED ||
  1416. p[0] == MBEDTLS_ECP_PF_COMPRESSED )
  1417. {
  1418. #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
  1419. ssl->handshake->ecdh_ctx.point_format = p[0];
  1420. #endif
  1421. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  1422. ssl->handshake->ecjpake_ctx.point_format = p[0];
  1423. #endif
  1424. MBEDTLS_SSL_DEBUG_MSG( 4, ( "point format selected: %d", p[0] ) );
  1425. return( 0 );
  1426. }
  1427. list_size--;
  1428. p++;
  1429. }
  1430. MBEDTLS_SSL_DEBUG_MSG( 1, ( "no point format in common" ) );
  1431. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1432. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1433. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1434. }
  1435. #endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
  1436. MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
  1437. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  1438. static int ssl_parse_ecjpake_kkpp( mbedtls_ssl_context *ssl,
  1439. const unsigned char *buf,
  1440. size_t len )
  1441. {
  1442. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  1443. if( ssl->handshake->ciphersuite_info->key_exchange !=
  1444. MBEDTLS_KEY_EXCHANGE_ECJPAKE )
  1445. {
  1446. MBEDTLS_SSL_DEBUG_MSG( 3, ( "skip ecjpake kkpp extension" ) );
  1447. return( 0 );
  1448. }
  1449. /* If we got here, we no longer need our cached extension */
  1450. mbedtls_free( ssl->handshake->ecjpake_cache );
  1451. ssl->handshake->ecjpake_cache = NULL;
  1452. ssl->handshake->ecjpake_cache_len = 0;
  1453. if( ( ret = mbedtls_ecjpake_read_round_one( &ssl->handshake->ecjpake_ctx,
  1454. buf, len ) ) != 0 )
  1455. {
  1456. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_read_round_one", ret );
  1457. mbedtls_ssl_send_alert_message(
  1458. ssl,
  1459. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1460. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1461. return( ret );
  1462. }
  1463. return( 0 );
  1464. }
  1465. #endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
  1466. #if defined(MBEDTLS_SSL_ALPN)
  1467. static int ssl_parse_alpn_ext( mbedtls_ssl_context *ssl,
  1468. const unsigned char *buf, size_t len )
  1469. {
  1470. size_t list_len, name_len;
  1471. const char **p;
  1472. /* If we didn't send it, the server shouldn't send it */
  1473. if( ssl->conf->alpn_list == NULL )
  1474. {
  1475. MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-matching ALPN extension" ) );
  1476. mbedtls_ssl_send_alert_message(
  1477. ssl,
  1478. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1479. MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT );
  1480. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1481. }
  1482. /*
  1483. * opaque ProtocolName<1..2^8-1>;
  1484. *
  1485. * struct {
  1486. * ProtocolName protocol_name_list<2..2^16-1>
  1487. * } ProtocolNameList;
  1488. *
  1489. * the "ProtocolNameList" MUST contain exactly one "ProtocolName"
  1490. */
  1491. /* Min length is 2 (list_len) + 1 (name_len) + 1 (name) */
  1492. if( len < 4 )
  1493. {
  1494. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1495. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1496. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1497. }
  1498. list_len = ( buf[0] << 8 ) | buf[1];
  1499. if( list_len != len - 2 )
  1500. {
  1501. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1502. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1503. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1504. }
  1505. name_len = buf[2];
  1506. if( name_len != list_len - 1 )
  1507. {
  1508. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1509. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1510. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1511. }
  1512. /* Check that the server chosen protocol was in our list and save it */
  1513. for( p = ssl->conf->alpn_list; *p != NULL; p++ )
  1514. {
  1515. if( name_len == strlen( *p ) &&
  1516. memcmp( buf + 3, *p, name_len ) == 0 )
  1517. {
  1518. ssl->alpn_chosen = *p;
  1519. return( 0 );
  1520. }
  1521. }
  1522. MBEDTLS_SSL_DEBUG_MSG( 1, ( "ALPN extension: no matching protocol" ) );
  1523. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1524. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1525. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1526. }
  1527. #endif /* MBEDTLS_SSL_ALPN */
  1528. #if defined(MBEDTLS_SSL_DTLS_SRTP)
  1529. static int ssl_parse_use_srtp_ext( mbedtls_ssl_context *ssl,
  1530. const unsigned char *buf,
  1531. size_t len )
  1532. {
  1533. mbedtls_ssl_srtp_profile server_protection = MBEDTLS_TLS_SRTP_UNSET;
  1534. size_t i, mki_len = 0;
  1535. uint16_t server_protection_profile_value = 0;
  1536. /* If use_srtp is not configured, just ignore the extension */
  1537. if( ( ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM ) ||
  1538. ( ssl->conf->dtls_srtp_profile_list == NULL ) ||
  1539. ( ssl->conf->dtls_srtp_profile_list_len == 0 ) )
  1540. return( 0 );
  1541. /* RFC 5764 section 4.1.1
  1542. * uint8 SRTPProtectionProfile[2];
  1543. *
  1544. * struct {
  1545. * SRTPProtectionProfiles SRTPProtectionProfiles;
  1546. * opaque srtp_mki<0..255>;
  1547. * } UseSRTPData;
  1548. * SRTPProtectionProfile SRTPProtectionProfiles<2..2^16-1>;
  1549. *
  1550. */
  1551. if( ssl->conf->dtls_srtp_mki_support == MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED )
  1552. {
  1553. mki_len = ssl->dtls_srtp_info.mki_len;
  1554. }
  1555. /*
  1556. * Length is 5 + optional mki_value : one protection profile length (2 bytes)
  1557. * + protection profile (2 bytes)
  1558. * + mki_len(1 byte)
  1559. * and optional srtp_mki
  1560. */
  1561. if( ( len < 5 ) || ( len != ( buf[4] + 5u ) ) )
  1562. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1563. /*
  1564. * get the server protection profile
  1565. */
  1566. /*
  1567. * protection profile length must be 0x0002 as we must have only
  1568. * one protection profile in server Hello
  1569. */
  1570. if( ( buf[0] != 0 ) || ( buf[1] != 2 ) )
  1571. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1572. server_protection_profile_value = ( buf[2] << 8 ) | buf[3];
  1573. server_protection = mbedtls_ssl_check_srtp_profile_value(
  1574. server_protection_profile_value );
  1575. if( server_protection != MBEDTLS_TLS_SRTP_UNSET )
  1576. {
  1577. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found srtp profile: %s",
  1578. mbedtls_ssl_get_srtp_profile_as_string(
  1579. server_protection ) ) );
  1580. }
  1581. ssl->dtls_srtp_info.chosen_dtls_srtp_profile = MBEDTLS_TLS_SRTP_UNSET;
  1582. /*
  1583. * Check we have the server profile in our list
  1584. */
  1585. for( i=0; i < ssl->conf->dtls_srtp_profile_list_len; i++)
  1586. {
  1587. if( server_protection == ssl->conf->dtls_srtp_profile_list[i] )
  1588. {
  1589. ssl->dtls_srtp_info.chosen_dtls_srtp_profile = ssl->conf->dtls_srtp_profile_list[i];
  1590. MBEDTLS_SSL_DEBUG_MSG( 3, ( "selected srtp profile: %s",
  1591. mbedtls_ssl_get_srtp_profile_as_string(
  1592. server_protection ) ) );
  1593. break;
  1594. }
  1595. }
  1596. /* If no match was found : server problem, it shall never answer with incompatible profile */
  1597. if( ssl->dtls_srtp_info.chosen_dtls_srtp_profile == MBEDTLS_TLS_SRTP_UNSET )
  1598. {
  1599. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1600. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  1601. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1602. }
  1603. /* If server does not use mki in its reply, make sure the client won't keep
  1604. * one as negotiated */
  1605. if( len == 5 )
  1606. {
  1607. ssl->dtls_srtp_info.mki_len = 0;
  1608. }
  1609. /*
  1610. * RFC5764:
  1611. * If the client detects a nonzero-length MKI in the server's response
  1612. * that is different than the one the client offered, then the client
  1613. * MUST abort the handshake and SHOULD send an invalid_parameter alert.
  1614. */
  1615. if( len > 5 && ( buf[4] != mki_len ||
  1616. ( memcmp( ssl->dtls_srtp_info.mki_value, &buf[5], mki_len ) ) ) )
  1617. {
  1618. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1619. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  1620. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1621. }
  1622. #if defined (MBEDTLS_DEBUG_C)
  1623. if( len > 5 )
  1624. {
  1625. MBEDTLS_SSL_DEBUG_BUF( 3, "received mki", ssl->dtls_srtp_info.mki_value,
  1626. ssl->dtls_srtp_info.mki_len );
  1627. }
  1628. #endif
  1629. return( 0 );
  1630. }
  1631. #endif /* MBEDTLS_SSL_DTLS_SRTP */
  1632. /*
  1633. * Parse HelloVerifyRequest. Only called after verifying the HS type.
  1634. */
  1635. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1636. static int ssl_parse_hello_verify_request( mbedtls_ssl_context *ssl )
  1637. {
  1638. const unsigned char *p = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
  1639. int major_ver, minor_ver;
  1640. unsigned char cookie_len;
  1641. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse hello verify request" ) );
  1642. /* Check that there is enough room for:
  1643. * - 2 bytes of version
  1644. * - 1 byte of cookie_len
  1645. */
  1646. if( mbedtls_ssl_hs_hdr_len( ssl ) + 3 > ssl->in_msglen )
  1647. {
  1648. MBEDTLS_SSL_DEBUG_MSG( 1,
  1649. ( "incoming HelloVerifyRequest message is too short" ) );
  1650. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1651. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1652. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1653. }
  1654. /*
  1655. * struct {
  1656. * ProtocolVersion server_version;
  1657. * opaque cookie<0..2^8-1>;
  1658. * } HelloVerifyRequest;
  1659. */
  1660. MBEDTLS_SSL_DEBUG_BUF( 3, "server version", p, 2 );
  1661. mbedtls_ssl_read_version( &major_ver, &minor_ver, ssl->conf->transport, p );
  1662. p += 2;
  1663. /*
  1664. * Since the RFC is not clear on this point, accept DTLS 1.0 (TLS 1.1)
  1665. * even is lower than our min version.
  1666. */
  1667. if( major_ver < MBEDTLS_SSL_MAJOR_VERSION_3 ||
  1668. minor_ver < MBEDTLS_SSL_MINOR_VERSION_2 ||
  1669. major_ver > ssl->conf->max_major_ver ||
  1670. minor_ver > ssl->conf->max_minor_ver )
  1671. {
  1672. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server version" ) );
  1673. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1674. MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION );
  1675. return( MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION );
  1676. }
  1677. cookie_len = *p++;
  1678. if( ( ssl->in_msg + ssl->in_msglen ) - p < cookie_len )
  1679. {
  1680. MBEDTLS_SSL_DEBUG_MSG( 1,
  1681. ( "cookie length does not match incoming message size" ) );
  1682. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1683. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1684. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1685. }
  1686. MBEDTLS_SSL_DEBUG_BUF( 3, "cookie", p, cookie_len );
  1687. mbedtls_free( ssl->handshake->verify_cookie );
  1688. ssl->handshake->verify_cookie = mbedtls_calloc( 1, cookie_len );
  1689. if( ssl->handshake->verify_cookie == NULL )
  1690. {
  1691. MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc failed (%d bytes)", cookie_len ) );
  1692. return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
  1693. }
  1694. memcpy( ssl->handshake->verify_cookie, p, cookie_len );
  1695. ssl->handshake->verify_cookie_len = cookie_len;
  1696. /* Start over at ClientHello */
  1697. ssl->state = MBEDTLS_SSL_CLIENT_HELLO;
  1698. mbedtls_ssl_reset_checksum( ssl );
  1699. mbedtls_ssl_recv_flight_completed( ssl );
  1700. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse hello verify request" ) );
  1701. return( 0 );
  1702. }
  1703. #endif /* MBEDTLS_SSL_PROTO_DTLS */
  1704. static int ssl_parse_server_hello( mbedtls_ssl_context *ssl )
  1705. {
  1706. int ret, i;
  1707. size_t n;
  1708. size_t ext_len;
  1709. unsigned char *buf, *ext;
  1710. unsigned char comp;
  1711. #if defined(MBEDTLS_ZLIB_SUPPORT)
  1712. int accept_comp;
  1713. #endif
  1714. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  1715. int renegotiation_info_seen = 0;
  1716. #endif
  1717. int handshake_failure = 0;
  1718. const mbedtls_ssl_ciphersuite_t *suite_info;
  1719. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello" ) );
  1720. if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
  1721. {
  1722. /* No alert on a read error. */
  1723. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
  1724. return( ret );
  1725. }
  1726. buf = ssl->in_msg;
  1727. if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
  1728. {
  1729. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  1730. if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS )
  1731. {
  1732. ssl->renego_records_seen++;
  1733. if( ssl->conf->renego_max_records >= 0 &&
  1734. ssl->renego_records_seen > ssl->conf->renego_max_records )
  1735. {
  1736. MBEDTLS_SSL_DEBUG_MSG( 1,
  1737. ( "renegotiation requested, but not honored by server" ) );
  1738. return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
  1739. }
  1740. MBEDTLS_SSL_DEBUG_MSG( 1,
  1741. ( "non-handshake message during renegotiation" ) );
  1742. ssl->keep_current_message = 1;
  1743. return( MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO );
  1744. }
  1745. #endif /* MBEDTLS_SSL_RENEGOTIATION */
  1746. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1747. mbedtls_ssl_send_alert_message(
  1748. ssl,
  1749. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1750. MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
  1751. return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
  1752. }
  1753. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1754. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
  1755. {
  1756. if( buf[0] == MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST )
  1757. {
  1758. MBEDTLS_SSL_DEBUG_MSG( 2, ( "received hello verify request" ) );
  1759. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello" ) );
  1760. return( ssl_parse_hello_verify_request( ssl ) );
  1761. }
  1762. else
  1763. {
  1764. /* We made it through the verification process */
  1765. mbedtls_free( ssl->handshake->verify_cookie );
  1766. ssl->handshake->verify_cookie = NULL;
  1767. ssl->handshake->verify_cookie_len = 0;
  1768. }
  1769. }
  1770. #endif /* MBEDTLS_SSL_PROTO_DTLS */
  1771. if( ssl->in_hslen < 38 + mbedtls_ssl_hs_hdr_len( ssl ) ||
  1772. buf[0] != MBEDTLS_SSL_HS_SERVER_HELLO )
  1773. {
  1774. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1775. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1776. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1777. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1778. }
  1779. /*
  1780. * 0 . 1 server_version
  1781. * 2 . 33 random (maybe including 4 bytes of Unix time)
  1782. * 34 . 34 session_id length = n
  1783. * 35 . 34+n session_id
  1784. * 35+n . 36+n cipher_suite
  1785. * 37+n . 37+n compression_method
  1786. *
  1787. * 38+n . 39+n extensions length (optional)
  1788. * 40+n . .. extensions
  1789. */
  1790. buf += mbedtls_ssl_hs_hdr_len( ssl );
  1791. MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, version", buf + 0, 2 );
  1792. mbedtls_ssl_read_version( &ssl->major_ver, &ssl->minor_ver,
  1793. ssl->conf->transport, buf + 0 );
  1794. if( ssl->major_ver < ssl->conf->min_major_ver ||
  1795. ssl->minor_ver < ssl->conf->min_minor_ver ||
  1796. ssl->major_ver > ssl->conf->max_major_ver ||
  1797. ssl->minor_ver > ssl->conf->max_minor_ver )
  1798. {
  1799. MBEDTLS_SSL_DEBUG_MSG( 1,
  1800. ( "server version out of bounds - min: [%d:%d], server: [%d:%d], max: [%d:%d]",
  1801. ssl->conf->min_major_ver,
  1802. ssl->conf->min_minor_ver,
  1803. ssl->major_ver, ssl->minor_ver,
  1804. ssl->conf->max_major_ver,
  1805. ssl->conf->max_minor_ver ) );
  1806. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1807. MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION );
  1808. return( MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION );
  1809. }
  1810. MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, current time: %lu",
  1811. ( (unsigned long) buf[2] << 24 ) |
  1812. ( (unsigned long) buf[3] << 16 ) |
  1813. ( (unsigned long) buf[4] << 8 ) |
  1814. ( (unsigned long) buf[5] ) ) );
  1815. memcpy( ssl->handshake->randbytes + 32, buf + 2, 32 );
  1816. n = buf[34];
  1817. MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, random bytes", buf + 2, 32 );
  1818. if( n > 32 )
  1819. {
  1820. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1821. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1822. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1823. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1824. }
  1825. if( ssl->in_hslen > mbedtls_ssl_hs_hdr_len( ssl ) + 39 + n )
  1826. {
  1827. ext_len = ( ( buf[38 + n] << 8 )
  1828. | ( buf[39 + n] ) );
  1829. if( ( ext_len > 0 && ext_len < 4 ) ||
  1830. ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) + 40 + n + ext_len )
  1831. {
  1832. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1833. mbedtls_ssl_send_alert_message(
  1834. ssl,
  1835. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1836. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1837. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1838. }
  1839. }
  1840. else if( ssl->in_hslen == mbedtls_ssl_hs_hdr_len( ssl ) + 38 + n )
  1841. {
  1842. ext_len = 0;
  1843. }
  1844. else
  1845. {
  1846. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1847. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1848. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  1849. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1850. }
  1851. /* ciphersuite (used later) */
  1852. i = ( buf[35 + n] << 8 ) | buf[36 + n];
  1853. /*
  1854. * Read and check compression
  1855. */
  1856. comp = buf[37 + n];
  1857. #if defined(MBEDTLS_ZLIB_SUPPORT)
  1858. /* See comments in ssl_write_client_hello() */
  1859. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  1860. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
  1861. accept_comp = 0;
  1862. else
  1863. #endif
  1864. accept_comp = 1;
  1865. if( comp != MBEDTLS_SSL_COMPRESS_NULL &&
  1866. ( comp != MBEDTLS_SSL_COMPRESS_DEFLATE || accept_comp == 0 ) )
  1867. #else /* MBEDTLS_ZLIB_SUPPORT */
  1868. if( comp != MBEDTLS_SSL_COMPRESS_NULL )
  1869. #endif/* MBEDTLS_ZLIB_SUPPORT */
  1870. {
  1871. MBEDTLS_SSL_DEBUG_MSG( 1,
  1872. ( "server hello, bad compression: %d", comp ) );
  1873. mbedtls_ssl_send_alert_message(
  1874. ssl,
  1875. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1876. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  1877. return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
  1878. }
  1879. /*
  1880. * Initialize update checksum functions
  1881. */
  1882. ssl->handshake->ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( i );
  1883. if( ssl->handshake->ciphersuite_info == NULL )
  1884. {
  1885. MBEDTLS_SSL_DEBUG_MSG( 1,
  1886. ( "ciphersuite info for %04x not found", (unsigned int)i ) );
  1887. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1888. MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR );
  1889. return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
  1890. }
  1891. mbedtls_ssl_optimize_checksum( ssl, ssl->handshake->ciphersuite_info );
  1892. MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, session id len.: %" MBEDTLS_PRINTF_SIZET, n ) );
  1893. MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, session id", buf + 35, n );
  1894. /*
  1895. * Check if the session can be resumed
  1896. */
  1897. if( ssl->handshake->resume == 0 || n == 0 ||
  1898. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  1899. ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE ||
  1900. #endif
  1901. ssl->session_negotiate->ciphersuite != i ||
  1902. ssl->session_negotiate->compression != comp ||
  1903. ssl->session_negotiate->id_len != n ||
  1904. memcmp( ssl->session_negotiate->id, buf + 35, n ) != 0 )
  1905. {
  1906. ssl->state++;
  1907. ssl->handshake->resume = 0;
  1908. #if defined(MBEDTLS_HAVE_TIME)
  1909. ssl->session_negotiate->start = mbedtls_time( NULL );
  1910. #endif
  1911. ssl->session_negotiate->ciphersuite = i;
  1912. ssl->session_negotiate->compression = comp;
  1913. ssl->session_negotiate->id_len = n;
  1914. memcpy( ssl->session_negotiate->id, buf + 35, n );
  1915. }
  1916. else
  1917. {
  1918. ssl->state = MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC;
  1919. if( ( ret = mbedtls_ssl_derive_keys( ssl ) ) != 0 )
  1920. {
  1921. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_derive_keys", ret );
  1922. mbedtls_ssl_send_alert_message(
  1923. ssl,
  1924. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1925. MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR );
  1926. return( ret );
  1927. }
  1928. }
  1929. MBEDTLS_SSL_DEBUG_MSG( 3, ( "%s session has been resumed",
  1930. ssl->handshake->resume ? "a" : "no" ) );
  1931. MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen ciphersuite: %04x", (unsigned) i ) );
  1932. MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, compress alg.: %d",
  1933. buf[37 + n] ) );
  1934. /*
  1935. * Perform cipher suite validation in same way as in ssl_write_client_hello.
  1936. */
  1937. i = 0;
  1938. while( 1 )
  1939. {
  1940. if( ssl->conf->ciphersuite_list[ssl->minor_ver][i] == 0 )
  1941. {
  1942. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1943. mbedtls_ssl_send_alert_message(
  1944. ssl,
  1945. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1946. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  1947. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1948. }
  1949. if( ssl->conf->ciphersuite_list[ssl->minor_ver][i++] ==
  1950. ssl->session_negotiate->ciphersuite )
  1951. {
  1952. break;
  1953. }
  1954. }
  1955. suite_info = mbedtls_ssl_ciphersuite_from_id(
  1956. ssl->session_negotiate->ciphersuite );
  1957. if( ssl_validate_ciphersuite( suite_info, ssl, ssl->minor_ver,
  1958. ssl->minor_ver ) != 0 )
  1959. {
  1960. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1961. mbedtls_ssl_send_alert_message(
  1962. ssl,
  1963. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1964. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  1965. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1966. }
  1967. MBEDTLS_SSL_DEBUG_MSG( 3,
  1968. ( "server hello, chosen ciphersuite: %s", suite_info->name ) );
  1969. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  1970. if( suite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA &&
  1971. ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
  1972. {
  1973. ssl->handshake->ecrs_enabled = 1;
  1974. }
  1975. #endif
  1976. if( comp != MBEDTLS_SSL_COMPRESS_NULL
  1977. #if defined(MBEDTLS_ZLIB_SUPPORT)
  1978. && comp != MBEDTLS_SSL_COMPRESS_DEFLATE
  1979. #endif
  1980. )
  1981. {
  1982. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  1983. mbedtls_ssl_send_alert_message(
  1984. ssl,
  1985. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  1986. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  1987. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  1988. }
  1989. ssl->session_negotiate->compression = comp;
  1990. ext = buf + 40 + n;
  1991. MBEDTLS_SSL_DEBUG_MSG( 2,
  1992. ( "server hello, total extension length: %" MBEDTLS_PRINTF_SIZET, ext_len ) );
  1993. while( ext_len )
  1994. {
  1995. unsigned int ext_id = ( ( ext[0] << 8 )
  1996. | ( ext[1] ) );
  1997. unsigned int ext_size = ( ( ext[2] << 8 )
  1998. | ( ext[3] ) );
  1999. if( ext_size + 4 > ext_len )
  2000. {
  2001. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  2002. mbedtls_ssl_send_alert_message(
  2003. ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2004. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  2005. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  2006. }
  2007. switch( ext_id )
  2008. {
  2009. case MBEDTLS_TLS_EXT_RENEGOTIATION_INFO:
  2010. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found renegotiation extension" ) );
  2011. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  2012. renegotiation_info_seen = 1;
  2013. #endif
  2014. if( ( ret = ssl_parse_renegotiation_info( ssl, ext + 4,
  2015. ext_size ) ) != 0 )
  2016. return( ret );
  2017. break;
  2018. #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
  2019. case MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH:
  2020. MBEDTLS_SSL_DEBUG_MSG( 3,
  2021. ( "found max_fragment_length extension" ) );
  2022. if( ( ret = ssl_parse_max_fragment_length_ext( ssl,
  2023. ext + 4, ext_size ) ) != 0 )
  2024. {
  2025. return( ret );
  2026. }
  2027. break;
  2028. #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
  2029. #if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
  2030. case MBEDTLS_TLS_EXT_TRUNCATED_HMAC:
  2031. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found truncated_hmac extension" ) );
  2032. if( ( ret = ssl_parse_truncated_hmac_ext( ssl,
  2033. ext + 4, ext_size ) ) != 0 )
  2034. {
  2035. return( ret );
  2036. }
  2037. break;
  2038. #endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
  2039. #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
  2040. case MBEDTLS_TLS_EXT_CID:
  2041. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found CID extension" ) );
  2042. if( ( ret = ssl_parse_cid_ext( ssl,
  2043. ext + 4,
  2044. ext_size ) ) != 0 )
  2045. {
  2046. return( ret );
  2047. }
  2048. break;
  2049. #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
  2050. #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
  2051. case MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC:
  2052. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found encrypt_then_mac extension" ) );
  2053. if( ( ret = ssl_parse_encrypt_then_mac_ext( ssl,
  2054. ext + 4, ext_size ) ) != 0 )
  2055. {
  2056. return( ret );
  2057. }
  2058. break;
  2059. #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
  2060. #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
  2061. case MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET:
  2062. MBEDTLS_SSL_DEBUG_MSG( 3,
  2063. ( "found extended_master_secret extension" ) );
  2064. if( ( ret = ssl_parse_extended_ms_ext( ssl,
  2065. ext + 4, ext_size ) ) != 0 )
  2066. {
  2067. return( ret );
  2068. }
  2069. break;
  2070. #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
  2071. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  2072. case MBEDTLS_TLS_EXT_SESSION_TICKET:
  2073. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found session_ticket extension" ) );
  2074. if( ( ret = ssl_parse_session_ticket_ext( ssl,
  2075. ext + 4, ext_size ) ) != 0 )
  2076. {
  2077. return( ret );
  2078. }
  2079. break;
  2080. #endif /* MBEDTLS_SSL_SESSION_TICKETS */
  2081. #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
  2082. defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  2083. case MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS:
  2084. MBEDTLS_SSL_DEBUG_MSG( 3,
  2085. ( "found supported_point_formats extension" ) );
  2086. if( ( ret = ssl_parse_supported_point_formats_ext( ssl,
  2087. ext + 4, ext_size ) ) != 0 )
  2088. {
  2089. return( ret );
  2090. }
  2091. break;
  2092. #endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
  2093. MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
  2094. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  2095. case MBEDTLS_TLS_EXT_ECJPAKE_KKPP:
  2096. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found ecjpake_kkpp extension" ) );
  2097. if( ( ret = ssl_parse_ecjpake_kkpp( ssl,
  2098. ext + 4, ext_size ) ) != 0 )
  2099. {
  2100. return( ret );
  2101. }
  2102. break;
  2103. #endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
  2104. #if defined(MBEDTLS_SSL_ALPN)
  2105. case MBEDTLS_TLS_EXT_ALPN:
  2106. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found alpn extension" ) );
  2107. if( ( ret = ssl_parse_alpn_ext( ssl, ext + 4, ext_size ) ) != 0 )
  2108. return( ret );
  2109. break;
  2110. #endif /* MBEDTLS_SSL_ALPN */
  2111. #if defined(MBEDTLS_SSL_DTLS_SRTP)
  2112. case MBEDTLS_TLS_EXT_USE_SRTP:
  2113. MBEDTLS_SSL_DEBUG_MSG( 3, ( "found use_srtp extension" ) );
  2114. if( ( ret = ssl_parse_use_srtp_ext( ssl, ext + 4, ext_size ) ) != 0 )
  2115. return( ret );
  2116. break;
  2117. #endif /* MBEDTLS_SSL_DTLS_SRTP */
  2118. default:
  2119. MBEDTLS_SSL_DEBUG_MSG( 3,
  2120. ( "unknown extension found: %u (ignoring)", ext_id ) );
  2121. }
  2122. ext_len -= 4 + ext_size;
  2123. ext += 4 + ext_size;
  2124. if( ext_len > 0 && ext_len < 4 )
  2125. {
  2126. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
  2127. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  2128. }
  2129. }
  2130. /*
  2131. * Renegotiation security checks
  2132. */
  2133. if( ssl->secure_renegotiation == MBEDTLS_SSL_LEGACY_RENEGOTIATION &&
  2134. ssl->conf->allow_legacy_renegotiation ==
  2135. MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE )
  2136. {
  2137. MBEDTLS_SSL_DEBUG_MSG( 1,
  2138. ( "legacy renegotiation, breaking off handshake" ) );
  2139. handshake_failure = 1;
  2140. }
  2141. #if defined(MBEDTLS_SSL_RENEGOTIATION)
  2142. else if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS &&
  2143. ssl->secure_renegotiation == MBEDTLS_SSL_SECURE_RENEGOTIATION &&
  2144. renegotiation_info_seen == 0 )
  2145. {
  2146. MBEDTLS_SSL_DEBUG_MSG( 1,
  2147. ( "renegotiation_info extension missing (secure)" ) );
  2148. handshake_failure = 1;
  2149. }
  2150. else if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS &&
  2151. ssl->secure_renegotiation == MBEDTLS_SSL_LEGACY_RENEGOTIATION &&
  2152. ssl->conf->allow_legacy_renegotiation ==
  2153. MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION )
  2154. {
  2155. MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation not allowed" ) );
  2156. handshake_failure = 1;
  2157. }
  2158. else if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS &&
  2159. ssl->secure_renegotiation == MBEDTLS_SSL_LEGACY_RENEGOTIATION &&
  2160. renegotiation_info_seen == 1 )
  2161. {
  2162. MBEDTLS_SSL_DEBUG_MSG( 1,
  2163. ( "renegotiation_info extension present (legacy)" ) );
  2164. handshake_failure = 1;
  2165. }
  2166. #endif /* MBEDTLS_SSL_RENEGOTIATION */
  2167. if( handshake_failure == 1 )
  2168. {
  2169. mbedtls_ssl_send_alert_message(
  2170. ssl,
  2171. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2172. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  2173. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
  2174. }
  2175. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello" ) );
  2176. return( 0 );
  2177. }
  2178. #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
  2179. defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
  2180. static int ssl_parse_server_dh_params( mbedtls_ssl_context *ssl,
  2181. unsigned char **p,
  2182. unsigned char *end )
  2183. {
  2184. int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
  2185. size_t dhm_actual_bitlen;
  2186. /*
  2187. * Ephemeral DH parameters:
  2188. *
  2189. * struct {
  2190. * opaque dh_p<1..2^16-1>;
  2191. * opaque dh_g<1..2^16-1>;
  2192. * opaque dh_Ys<1..2^16-1>;
  2193. * } ServerDHParams;
  2194. */
  2195. if( ( ret = mbedtls_dhm_read_params( &ssl->handshake->dhm_ctx,
  2196. p, end ) ) != 0 )
  2197. {
  2198. MBEDTLS_SSL_DEBUG_RET( 2, ( "mbedtls_dhm_read_params" ), ret );
  2199. return( ret );
  2200. }
  2201. dhm_actual_bitlen = mbedtls_mpi_bitlen( &ssl->handshake->dhm_ctx.P );
  2202. if( dhm_actual_bitlen < ssl->conf->dhm_min_bitlen )
  2203. {
  2204. MBEDTLS_SSL_DEBUG_MSG( 1, ( "DHM prime too short: %" MBEDTLS_PRINTF_SIZET " < %u",
  2205. dhm_actual_bitlen,
  2206. ssl->conf->dhm_min_bitlen ) );
  2207. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2208. }
  2209. MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: P ", &ssl->handshake->dhm_ctx.P );
  2210. MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: G ", &ssl->handshake->dhm_ctx.G );
  2211. MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: GY", &ssl->handshake->dhm_ctx.GY );
  2212. return( ret );
  2213. }
  2214. #endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
  2215. MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
  2216. #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  2217. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
  2218. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
  2219. defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
  2220. defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
  2221. static int ssl_check_server_ecdh_params( const mbedtls_ssl_context *ssl )
  2222. {
  2223. const mbedtls_ecp_curve_info *curve_info;
  2224. mbedtls_ecp_group_id grp_id;
  2225. #if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
  2226. grp_id = ssl->handshake->ecdh_ctx.grp.id;
  2227. #else
  2228. grp_id = ssl->handshake->ecdh_ctx.grp_id;
  2229. #endif
  2230. curve_info = mbedtls_ecp_curve_info_from_grp_id( grp_id );
  2231. if( curve_info == NULL )
  2232. {
  2233. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2234. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2235. }
  2236. MBEDTLS_SSL_DEBUG_MSG( 2, ( "ECDH curve: %s", curve_info->name ) );
  2237. #if defined(MBEDTLS_ECP_C)
  2238. if( mbedtls_ssl_check_curve( ssl, grp_id ) != 0 )
  2239. #else
  2240. if( ssl->handshake->ecdh_ctx.grp.nbits < 163 ||
  2241. ssl->handshake->ecdh_ctx.grp.nbits > 521 )
  2242. #endif
  2243. return( -1 );
  2244. MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
  2245. MBEDTLS_DEBUG_ECDH_QP );
  2246. return( 0 );
  2247. }
  2248. #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  2249. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
  2250. MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED ||
  2251. MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
  2252. MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
  2253. #if defined(MBEDTLS_USE_PSA_CRYPTO) && \
  2254. ( defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  2255. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) )
  2256. static int ssl_parse_server_ecdh_params_psa( mbedtls_ssl_context *ssl,
  2257. unsigned char **p,
  2258. unsigned char *end )
  2259. {
  2260. uint16_t tls_id;
  2261. size_t ecdh_bits = 0;
  2262. uint8_t ecpoint_len;
  2263. mbedtls_ssl_handshake_params *handshake = ssl->handshake;
  2264. /*
  2265. * Parse ECC group
  2266. */
  2267. if( end - *p < 4 )
  2268. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2269. /* First byte is curve_type; only named_curve is handled */
  2270. if( *(*p)++ != MBEDTLS_ECP_TLS_NAMED_CURVE )
  2271. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2272. /* Next two bytes are the namedcurve value */
  2273. tls_id = *(*p)++;
  2274. tls_id <<= 8;
  2275. tls_id |= *(*p)++;
  2276. /* Convert EC group to PSA key type. */
  2277. if( ( handshake->ecdh_psa_type =
  2278. mbedtls_psa_parse_tls_ecc_group( tls_id, &ecdh_bits ) ) == 0 )
  2279. {
  2280. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2281. }
  2282. if( ecdh_bits > 0xffff )
  2283. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2284. handshake->ecdh_bits = (uint16_t) ecdh_bits;
  2285. /*
  2286. * Put peer's ECDH public key in the format understood by PSA.
  2287. */
  2288. ecpoint_len = *(*p)++;
  2289. if( (size_t)( end - *p ) < ecpoint_len )
  2290. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2291. if( mbedtls_psa_tls_ecpoint_to_psa_ec(
  2292. *p, ecpoint_len,
  2293. handshake->ecdh_psa_peerkey,
  2294. sizeof( handshake->ecdh_psa_peerkey ),
  2295. &handshake->ecdh_psa_peerkey_len ) != 0 )
  2296. {
  2297. return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
  2298. }
  2299. *p += ecpoint_len;
  2300. return( 0 );
  2301. }
  2302. #endif /* MBEDTLS_USE_PSA_CRYPTO &&
  2303. ( MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  2304. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ) */
  2305. #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  2306. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
  2307. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
  2308. static int ssl_parse_server_ecdh_params( mbedtls_ssl_context *ssl,
  2309. unsigned char **p,
  2310. unsigned char *end )
  2311. {
  2312. int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
  2313. /*
  2314. * Ephemeral ECDH parameters:
  2315. *
  2316. * struct {
  2317. * ECParameters curve_params;
  2318. * ECPoint public;
  2319. * } ServerECDHParams;
  2320. */
  2321. if( ( ret = mbedtls_ecdh_read_params( &ssl->handshake->ecdh_ctx,
  2322. (const unsigned char **) p, end ) ) != 0 )
  2323. {
  2324. MBEDTLS_SSL_DEBUG_RET( 1, ( "mbedtls_ecdh_read_params" ), ret );
  2325. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  2326. if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
  2327. ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
  2328. #endif
  2329. return( ret );
  2330. }
  2331. if( ssl_check_server_ecdh_params( ssl ) != 0 )
  2332. {
  2333. MBEDTLS_SSL_DEBUG_MSG( 1,
  2334. ( "bad server key exchange message (ECDHE curve)" ) );
  2335. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2336. }
  2337. return( ret );
  2338. }
  2339. #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  2340. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
  2341. MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED */
  2342. #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
  2343. static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl,
  2344. unsigned char **p,
  2345. unsigned char *end )
  2346. {
  2347. int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
  2348. uint16_t len;
  2349. ((void) ssl);
  2350. /*
  2351. * PSK parameters:
  2352. *
  2353. * opaque psk_identity_hint<0..2^16-1>;
  2354. */
  2355. if( end - (*p) < 2 )
  2356. {
  2357. MBEDTLS_SSL_DEBUG_MSG( 1,
  2358. ( "bad server key exchange message (psk_identity_hint length)" ) );
  2359. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2360. }
  2361. len = (*p)[0] << 8 | (*p)[1];
  2362. *p += 2;
  2363. if( end - (*p) < len )
  2364. {
  2365. MBEDTLS_SSL_DEBUG_MSG( 1,
  2366. ( "bad server key exchange message (psk_identity_hint length)" ) );
  2367. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2368. }
  2369. /*
  2370. * Note: we currently ignore the PKS identity hint, as we only allow one
  2371. * PSK to be provisionned on the client. This could be changed later if
  2372. * someone needs that feature.
  2373. */
  2374. *p += len;
  2375. ret = 0;
  2376. return( ret );
  2377. }
  2378. #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
  2379. #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
  2380. defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
  2381. /*
  2382. * Generate a pre-master secret and encrypt it with the server's RSA key
  2383. */
  2384. static int ssl_write_encrypted_pms( mbedtls_ssl_context *ssl,
  2385. size_t offset, size_t *olen,
  2386. size_t pms_offset )
  2387. {
  2388. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  2389. size_t len_bytes = ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ? 0 : 2;
  2390. unsigned char *p = ssl->handshake->premaster + pms_offset;
  2391. mbedtls_pk_context * peer_pk;
  2392. if( offset + len_bytes > MBEDTLS_SSL_OUT_CONTENT_LEN )
  2393. {
  2394. MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small for encrypted pms" ) );
  2395. return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL );
  2396. }
  2397. /*
  2398. * Generate (part of) the pre-master as
  2399. * struct {
  2400. * ProtocolVersion client_version;
  2401. * opaque random[46];
  2402. * } PreMasterSecret;
  2403. */
  2404. mbedtls_ssl_write_version( ssl->conf->max_major_ver,
  2405. ssl->conf->max_minor_ver,
  2406. ssl->conf->transport, p );
  2407. if( ( ret = ssl->conf->f_rng( ssl->conf->p_rng, p + 2, 46 ) ) != 0 )
  2408. {
  2409. MBEDTLS_SSL_DEBUG_RET( 1, "f_rng", ret );
  2410. return( ret );
  2411. }
  2412. ssl->handshake->pmslen = 48;
  2413. #if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
  2414. peer_pk = &ssl->handshake->peer_pubkey;
  2415. #else /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2416. if( ssl->session_negotiate->peer_cert == NULL )
  2417. {
  2418. /* Should never happen */
  2419. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2420. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2421. }
  2422. peer_pk = &ssl->session_negotiate->peer_cert->pk;
  2423. #endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2424. /*
  2425. * Now write it out, encrypted
  2426. */
  2427. if( ! mbedtls_pk_can_do( peer_pk, MBEDTLS_PK_RSA ) )
  2428. {
  2429. MBEDTLS_SSL_DEBUG_MSG( 1, ( "certificate key type mismatch" ) );
  2430. return( MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH );
  2431. }
  2432. if( ( ret = mbedtls_pk_encrypt( peer_pk,
  2433. p, ssl->handshake->pmslen,
  2434. ssl->out_msg + offset + len_bytes, olen,
  2435. MBEDTLS_SSL_OUT_CONTENT_LEN - offset - len_bytes,
  2436. ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 )
  2437. {
  2438. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_rsa_pkcs1_encrypt", ret );
  2439. return( ret );
  2440. }
  2441. #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) || \
  2442. defined(MBEDTLS_SSL_PROTO_TLS1_2)
  2443. if( len_bytes == 2 )
  2444. {
  2445. ssl->out_msg[offset+0] = (unsigned char)( *olen >> 8 );
  2446. ssl->out_msg[offset+1] = (unsigned char)( *olen );
  2447. *olen += 2;
  2448. }
  2449. #endif
  2450. #if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
  2451. /* We don't need the peer's public key anymore. Free it. */
  2452. mbedtls_pk_free( peer_pk );
  2453. #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2454. return( 0 );
  2455. }
  2456. #endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED ||
  2457. MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED */
  2458. #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
  2459. #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
  2460. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  2461. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
  2462. static int ssl_parse_signature_algorithm( mbedtls_ssl_context *ssl,
  2463. unsigned char **p,
  2464. unsigned char *end,
  2465. mbedtls_md_type_t *md_alg,
  2466. mbedtls_pk_type_t *pk_alg )
  2467. {
  2468. ((void) ssl);
  2469. *md_alg = MBEDTLS_MD_NONE;
  2470. *pk_alg = MBEDTLS_PK_NONE;
  2471. /* Only in TLS 1.2 */
  2472. if( ssl->minor_ver != MBEDTLS_SSL_MINOR_VERSION_3 )
  2473. {
  2474. return( 0 );
  2475. }
  2476. if( (*p) + 2 > end )
  2477. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2478. /*
  2479. * Get hash algorithm
  2480. */
  2481. if( ( *md_alg = mbedtls_ssl_md_alg_from_hash( (*p)[0] ) )
  2482. == MBEDTLS_MD_NONE )
  2483. {
  2484. MBEDTLS_SSL_DEBUG_MSG( 1,
  2485. ( "Server used unsupported HashAlgorithm %d", *(p)[0] ) );
  2486. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2487. }
  2488. /*
  2489. * Get signature algorithm
  2490. */
  2491. if( ( *pk_alg = mbedtls_ssl_pk_alg_from_sig( (*p)[1] ) )
  2492. == MBEDTLS_PK_NONE )
  2493. {
  2494. MBEDTLS_SSL_DEBUG_MSG( 1,
  2495. ( "server used unsupported SignatureAlgorithm %d", (*p)[1] ) );
  2496. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2497. }
  2498. /*
  2499. * Check if the hash is acceptable
  2500. */
  2501. if( mbedtls_ssl_check_sig_hash( ssl, *md_alg ) != 0 )
  2502. {
  2503. MBEDTLS_SSL_DEBUG_MSG( 1,
  2504. ( "server used HashAlgorithm %d that was not offered", *(p)[0] ) );
  2505. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2506. }
  2507. MBEDTLS_SSL_DEBUG_MSG( 2, ( "Server used SignatureAlgorithm %d",
  2508. (*p)[1] ) );
  2509. MBEDTLS_SSL_DEBUG_MSG( 2, ( "Server used HashAlgorithm %d",
  2510. (*p)[0] ) );
  2511. *p += 2;
  2512. return( 0 );
  2513. }
  2514. #endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
  2515. MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  2516. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
  2517. #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
  2518. #if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
  2519. defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
  2520. static int ssl_get_ecdh_params_from_cert( mbedtls_ssl_context *ssl )
  2521. {
  2522. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  2523. const mbedtls_ecp_keypair *peer_key;
  2524. mbedtls_pk_context * peer_pk;
  2525. #if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
  2526. peer_pk = &ssl->handshake->peer_pubkey;
  2527. #else /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2528. if( ssl->session_negotiate->peer_cert == NULL )
  2529. {
  2530. /* Should never happen */
  2531. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2532. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2533. }
  2534. peer_pk = &ssl->session_negotiate->peer_cert->pk;
  2535. #endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2536. if( ! mbedtls_pk_can_do( peer_pk, MBEDTLS_PK_ECKEY ) )
  2537. {
  2538. MBEDTLS_SSL_DEBUG_MSG( 1, ( "server key not ECDH capable" ) );
  2539. return( MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH );
  2540. }
  2541. peer_key = mbedtls_pk_ec( *peer_pk );
  2542. if( ( ret = mbedtls_ecdh_get_params( &ssl->handshake->ecdh_ctx, peer_key,
  2543. MBEDTLS_ECDH_THEIRS ) ) != 0 )
  2544. {
  2545. MBEDTLS_SSL_DEBUG_RET( 1, ( "mbedtls_ecdh_get_params" ), ret );
  2546. return( ret );
  2547. }
  2548. if( ssl_check_server_ecdh_params( ssl ) != 0 )
  2549. {
  2550. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server certificate (ECDH curve)" ) );
  2551. return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE );
  2552. }
  2553. #if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
  2554. /* We don't need the peer's public key anymore. Free it,
  2555. * so that more RAM is available for upcoming expensive
  2556. * operations like ECDHE. */
  2557. mbedtls_pk_free( peer_pk );
  2558. #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2559. return( ret );
  2560. }
  2561. #endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) ||
  2562. MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
  2563. static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl )
  2564. {
  2565. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  2566. const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
  2567. ssl->handshake->ciphersuite_info;
  2568. unsigned char *p = NULL, *end = NULL;
  2569. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) );
  2570. #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
  2571. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA )
  2572. {
  2573. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) );
  2574. ssl->state++;
  2575. return( 0 );
  2576. }
  2577. ((void) p);
  2578. ((void) end);
  2579. #endif
  2580. #if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
  2581. defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
  2582. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA ||
  2583. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA )
  2584. {
  2585. if( ( ret = ssl_get_ecdh_params_from_cert( ssl ) ) != 0 )
  2586. {
  2587. MBEDTLS_SSL_DEBUG_RET( 1, "ssl_get_ecdh_params_from_cert", ret );
  2588. mbedtls_ssl_send_alert_message(
  2589. ssl,
  2590. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2591. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  2592. return( ret );
  2593. }
  2594. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) );
  2595. ssl->state++;
  2596. return( 0 );
  2597. }
  2598. ((void) p);
  2599. ((void) end);
  2600. #endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
  2601. MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
  2602. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  2603. if( ssl->handshake->ecrs_enabled &&
  2604. ssl->handshake->ecrs_state == ssl_ecrs_ske_start_processing )
  2605. {
  2606. goto start_processing;
  2607. }
  2608. #endif
  2609. if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
  2610. {
  2611. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
  2612. return( ret );
  2613. }
  2614. if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
  2615. {
  2616. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2617. mbedtls_ssl_send_alert_message(
  2618. ssl,
  2619. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2620. MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
  2621. return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
  2622. }
  2623. /*
  2624. * ServerKeyExchange may be skipped with PSK and RSA-PSK when the server
  2625. * doesn't use a psk_identity_hint
  2626. */
  2627. if( ssl->in_msg[0] != MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE )
  2628. {
  2629. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
  2630. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK )
  2631. {
  2632. /* Current message is probably either
  2633. * CertificateRequest or ServerHelloDone */
  2634. ssl->keep_current_message = 1;
  2635. goto exit;
  2636. }
  2637. MBEDTLS_SSL_DEBUG_MSG( 1,
  2638. ( "server key exchange message must not be skipped" ) );
  2639. mbedtls_ssl_send_alert_message(
  2640. ssl,
  2641. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2642. MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
  2643. return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
  2644. }
  2645. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  2646. if( ssl->handshake->ecrs_enabled )
  2647. ssl->handshake->ecrs_state = ssl_ecrs_ske_start_processing;
  2648. start_processing:
  2649. #endif
  2650. p = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
  2651. end = ssl->in_msg + ssl->in_hslen;
  2652. MBEDTLS_SSL_DEBUG_BUF( 3, "server key exchange", p, end - p );
  2653. #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
  2654. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
  2655. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK ||
  2656. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK ||
  2657. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK )
  2658. {
  2659. if( ssl_parse_server_psk_hint( ssl, &p, end ) != 0 )
  2660. {
  2661. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2662. mbedtls_ssl_send_alert_message(
  2663. ssl,
  2664. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2665. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  2666. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2667. }
  2668. } /* FALLTROUGH */
  2669. #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
  2670. #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
  2671. defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
  2672. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
  2673. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK )
  2674. ; /* nothing more to do */
  2675. else
  2676. #endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED ||
  2677. MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED */
  2678. #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
  2679. defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
  2680. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA ||
  2681. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK )
  2682. {
  2683. if( ssl_parse_server_dh_params( ssl, &p, end ) != 0 )
  2684. {
  2685. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2686. mbedtls_ssl_send_alert_message(
  2687. ssl,
  2688. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2689. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  2690. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2691. }
  2692. }
  2693. else
  2694. #endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
  2695. MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
  2696. #if defined(MBEDTLS_USE_PSA_CRYPTO) && \
  2697. ( defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  2698. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) )
  2699. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
  2700. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA )
  2701. {
  2702. if( ssl_parse_server_ecdh_params_psa( ssl, &p, end ) != 0 )
  2703. {
  2704. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2705. mbedtls_ssl_send_alert_message(
  2706. ssl,
  2707. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2708. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  2709. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2710. }
  2711. }
  2712. else
  2713. #endif /* MBEDTLS_USE_PSA_CRYPTO &&
  2714. ( MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  2715. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ) */
  2716. #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  2717. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
  2718. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
  2719. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
  2720. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK ||
  2721. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA )
  2722. {
  2723. if( ssl_parse_server_ecdh_params( ssl, &p, end ) != 0 )
  2724. {
  2725. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2726. mbedtls_ssl_send_alert_message(
  2727. ssl,
  2728. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2729. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  2730. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2731. }
  2732. }
  2733. else
  2734. #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  2735. MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED ||
  2736. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
  2737. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  2738. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE )
  2739. {
  2740. ret = mbedtls_ecjpake_read_round_two( &ssl->handshake->ecjpake_ctx,
  2741. p, end - p );
  2742. if( ret != 0 )
  2743. {
  2744. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_read_round_two", ret );
  2745. mbedtls_ssl_send_alert_message(
  2746. ssl,
  2747. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2748. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  2749. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2750. }
  2751. }
  2752. else
  2753. #endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
  2754. {
  2755. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2756. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2757. }
  2758. #if defined(MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED)
  2759. if( mbedtls_ssl_ciphersuite_uses_server_signature( ciphersuite_info ) )
  2760. {
  2761. size_t sig_len, hashlen;
  2762. unsigned char hash[64];
  2763. mbedtls_md_type_t md_alg = MBEDTLS_MD_NONE;
  2764. mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE;
  2765. unsigned char *params = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
  2766. size_t params_len = p - params;
  2767. void *rs_ctx = NULL;
  2768. mbedtls_pk_context * peer_pk;
  2769. /*
  2770. * Handle the digitally-signed structure
  2771. */
  2772. #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
  2773. if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
  2774. {
  2775. if( ssl_parse_signature_algorithm( ssl, &p, end,
  2776. &md_alg, &pk_alg ) != 0 )
  2777. {
  2778. MBEDTLS_SSL_DEBUG_MSG( 1,
  2779. ( "bad server key exchange message" ) );
  2780. mbedtls_ssl_send_alert_message(
  2781. ssl,
  2782. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2783. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  2784. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2785. }
  2786. if( pk_alg !=
  2787. mbedtls_ssl_get_ciphersuite_sig_pk_alg( ciphersuite_info ) )
  2788. {
  2789. MBEDTLS_SSL_DEBUG_MSG( 1,
  2790. ( "bad server key exchange message" ) );
  2791. mbedtls_ssl_send_alert_message(
  2792. ssl,
  2793. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2794. MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER );
  2795. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2796. }
  2797. }
  2798. else
  2799. #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
  2800. #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \
  2801. defined(MBEDTLS_SSL_PROTO_TLS1_1)
  2802. if( ssl->minor_ver < MBEDTLS_SSL_MINOR_VERSION_3 )
  2803. {
  2804. pk_alg = mbedtls_ssl_get_ciphersuite_sig_pk_alg( ciphersuite_info );
  2805. /* Default hash for ECDSA is SHA-1 */
  2806. if( pk_alg == MBEDTLS_PK_ECDSA && md_alg == MBEDTLS_MD_NONE )
  2807. md_alg = MBEDTLS_MD_SHA1;
  2808. }
  2809. else
  2810. #endif
  2811. {
  2812. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2813. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2814. }
  2815. /*
  2816. * Read signature
  2817. */
  2818. if( p > end - 2 )
  2819. {
  2820. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2821. mbedtls_ssl_send_alert_message(
  2822. ssl,
  2823. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2824. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  2825. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2826. }
  2827. sig_len = ( p[0] << 8 ) | p[1];
  2828. p += 2;
  2829. if( p != end - sig_len )
  2830. {
  2831. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2832. mbedtls_ssl_send_alert_message(
  2833. ssl,
  2834. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2835. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  2836. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE );
  2837. }
  2838. MBEDTLS_SSL_DEBUG_BUF( 3, "signature", p, sig_len );
  2839. /*
  2840. * Compute the hash that has been signed
  2841. */
  2842. #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \
  2843. defined(MBEDTLS_SSL_PROTO_TLS1_1)
  2844. if( md_alg == MBEDTLS_MD_NONE )
  2845. {
  2846. hashlen = 36;
  2847. ret = mbedtls_ssl_get_key_exchange_md_ssl_tls( ssl, hash, params,
  2848. params_len );
  2849. if( ret != 0 )
  2850. return( ret );
  2851. }
  2852. else
  2853. #endif /* MBEDTLS_SSL_PROTO_SSL3 || MBEDTLS_SSL_PROTO_TLS1 || \
  2854. MBEDTLS_SSL_PROTO_TLS1_1 */
  2855. #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) || \
  2856. defined(MBEDTLS_SSL_PROTO_TLS1_2)
  2857. if( md_alg != MBEDTLS_MD_NONE )
  2858. {
  2859. ret = mbedtls_ssl_get_key_exchange_md_tls1_2( ssl, hash, &hashlen,
  2860. params, params_len,
  2861. md_alg );
  2862. if( ret != 0 )
  2863. return( ret );
  2864. }
  2865. else
  2866. #endif /* MBEDTLS_SSL_PROTO_TLS1 || MBEDTLS_SSL_PROTO_TLS1_1 || \
  2867. MBEDTLS_SSL_PROTO_TLS1_2 */
  2868. {
  2869. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2870. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2871. }
  2872. MBEDTLS_SSL_DEBUG_BUF( 3, "parameters hash", hash, hashlen );
  2873. #if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
  2874. peer_pk = &ssl->handshake->peer_pubkey;
  2875. #else /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2876. if( ssl->session_negotiate->peer_cert == NULL )
  2877. {
  2878. /* Should never happen */
  2879. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2880. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2881. }
  2882. peer_pk = &ssl->session_negotiate->peer_cert->pk;
  2883. #endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2884. /*
  2885. * Verify signature
  2886. */
  2887. if( !mbedtls_pk_can_do( peer_pk, pk_alg ) )
  2888. {
  2889. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
  2890. mbedtls_ssl_send_alert_message(
  2891. ssl,
  2892. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2893. MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE );
  2894. return( MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH );
  2895. }
  2896. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  2897. if( ssl->handshake->ecrs_enabled )
  2898. rs_ctx = &ssl->handshake->ecrs_ctx.pk;
  2899. #endif
  2900. if( ( ret = mbedtls_pk_verify_restartable( peer_pk,
  2901. md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 )
  2902. {
  2903. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  2904. if( ret != MBEDTLS_ERR_ECP_IN_PROGRESS )
  2905. #endif
  2906. mbedtls_ssl_send_alert_message(
  2907. ssl,
  2908. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2909. MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR );
  2910. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_pk_verify", ret );
  2911. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  2912. if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
  2913. ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
  2914. #endif
  2915. return( ret );
  2916. }
  2917. #if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
  2918. /* We don't need the peer's public key anymore. Free it,
  2919. * so that more RAM is available for upcoming expensive
  2920. * operations like ECDHE. */
  2921. mbedtls_pk_free( peer_pk );
  2922. #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
  2923. }
  2924. #endif /* MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED */
  2925. exit:
  2926. ssl->state++;
  2927. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server key exchange" ) );
  2928. return( 0 );
  2929. }
  2930. #if ! defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
  2931. static int ssl_parse_certificate_request( mbedtls_ssl_context *ssl )
  2932. {
  2933. const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
  2934. ssl->handshake->ciphersuite_info;
  2935. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate request" ) );
  2936. if( ! mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
  2937. {
  2938. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate request" ) );
  2939. ssl->state++;
  2940. return( 0 );
  2941. }
  2942. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  2943. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  2944. }
  2945. #else /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
  2946. static int ssl_parse_certificate_request( mbedtls_ssl_context *ssl )
  2947. {
  2948. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  2949. unsigned char *buf;
  2950. size_t n = 0;
  2951. size_t cert_type_len = 0, dn_len = 0;
  2952. const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
  2953. ssl->handshake->ciphersuite_info;
  2954. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate request" ) );
  2955. if( ! mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
  2956. {
  2957. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate request" ) );
  2958. ssl->state++;
  2959. return( 0 );
  2960. }
  2961. if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
  2962. {
  2963. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
  2964. return( ret );
  2965. }
  2966. if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
  2967. {
  2968. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
  2969. mbedtls_ssl_send_alert_message(
  2970. ssl,
  2971. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  2972. MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
  2973. return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
  2974. }
  2975. ssl->state++;
  2976. ssl->client_auth = ( ssl->in_msg[0] == MBEDTLS_SSL_HS_CERTIFICATE_REQUEST );
  2977. MBEDTLS_SSL_DEBUG_MSG( 3, ( "got %s certificate request",
  2978. ssl->client_auth ? "a" : "no" ) );
  2979. if( ssl->client_auth == 0 )
  2980. {
  2981. /* Current message is probably the ServerHelloDone */
  2982. ssl->keep_current_message = 1;
  2983. goto exit;
  2984. }
  2985. /*
  2986. * struct {
  2987. * ClientCertificateType certificate_types<1..2^8-1>;
  2988. * SignatureAndHashAlgorithm
  2989. * supported_signature_algorithms<2^16-1>; -- TLS 1.2 only
  2990. * DistinguishedName certificate_authorities<0..2^16-1>;
  2991. * } CertificateRequest;
  2992. *
  2993. * Since we only support a single certificate on clients, let's just
  2994. * ignore all the information that's supposed to help us pick a
  2995. * certificate.
  2996. *
  2997. * We could check that our certificate matches the request, and bail out
  2998. * if it doesn't, but it's simpler to just send the certificate anyway,
  2999. * and give the server the opportunity to decide if it should terminate
  3000. * the connection when it doesn't like our certificate.
  3001. *
  3002. * Same goes for the hash in TLS 1.2's signature_algorithms: at this
  3003. * point we only have one hash available (see comments in
  3004. * write_certificate_verify), so let's just use what we have.
  3005. *
  3006. * However, we still minimally parse the message to check it is at least
  3007. * superficially sane.
  3008. */
  3009. buf = ssl->in_msg;
  3010. /* certificate_types */
  3011. if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl ) )
  3012. {
  3013. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
  3014. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3015. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  3016. return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST );
  3017. }
  3018. cert_type_len = buf[mbedtls_ssl_hs_hdr_len( ssl )];
  3019. n = cert_type_len;
  3020. /*
  3021. * In the subsequent code there are two paths that read from buf:
  3022. * * the length of the signature algorithms field (if minor version of
  3023. * SSL is 3),
  3024. * * distinguished name length otherwise.
  3025. * Both reach at most the index:
  3026. * ...hdr_len + 2 + n,
  3027. * therefore the buffer length at this point must be greater than that
  3028. * regardless of the actual code path.
  3029. */
  3030. if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n )
  3031. {
  3032. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
  3033. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3034. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  3035. return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST );
  3036. }
  3037. /* supported_signature_algorithms */
  3038. #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
  3039. if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
  3040. {
  3041. size_t sig_alg_len =
  3042. ( ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 1 + n] << 8 )
  3043. | ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n] ) );
  3044. #if defined(MBEDTLS_DEBUG_C)
  3045. unsigned char* sig_alg;
  3046. size_t i;
  3047. #endif
  3048. /*
  3049. * The furthest access in buf is in the loop few lines below:
  3050. * sig_alg[i + 1],
  3051. * where:
  3052. * sig_alg = buf + ...hdr_len + 3 + n,
  3053. * max(i) = sig_alg_len - 1.
  3054. * Therefore the furthest access is:
  3055. * buf[...hdr_len + 3 + n + sig_alg_len - 1 + 1],
  3056. * which reduces to:
  3057. * buf[...hdr_len + 3 + n + sig_alg_len],
  3058. * which is one less than we need the buf to be.
  3059. */
  3060. if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl )
  3061. + 3 + n + sig_alg_len )
  3062. {
  3063. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
  3064. mbedtls_ssl_send_alert_message(
  3065. ssl,
  3066. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3067. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  3068. return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST );
  3069. }
  3070. #if defined(MBEDTLS_DEBUG_C)
  3071. sig_alg = buf + mbedtls_ssl_hs_hdr_len( ssl ) + 3 + n;
  3072. for( i = 0; i < sig_alg_len; i += 2 )
  3073. {
  3074. MBEDTLS_SSL_DEBUG_MSG( 3,
  3075. ( "Supported Signature Algorithm found: %d,%d",
  3076. sig_alg[i], sig_alg[i + 1] ) );
  3077. }
  3078. #endif
  3079. n += 2 + sig_alg_len;
  3080. }
  3081. #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
  3082. /* certificate_authorities */
  3083. dn_len = ( ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 1 + n] << 8 )
  3084. | ( buf[mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n] ) );
  3085. n += dn_len;
  3086. if( ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) + 3 + n )
  3087. {
  3088. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
  3089. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3090. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  3091. return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST );
  3092. }
  3093. exit:
  3094. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate request" ) );
  3095. return( 0 );
  3096. }
  3097. #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
  3098. static int ssl_parse_server_hello_done( mbedtls_ssl_context *ssl )
  3099. {
  3100. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  3101. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello done" ) );
  3102. if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
  3103. {
  3104. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
  3105. return( ret );
  3106. }
  3107. if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
  3108. {
  3109. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) );
  3110. return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
  3111. }
  3112. if( ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) ||
  3113. ssl->in_msg[0] != MBEDTLS_SSL_HS_SERVER_HELLO_DONE )
  3114. {
  3115. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) );
  3116. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3117. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  3118. return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE );
  3119. }
  3120. ssl->state++;
  3121. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  3122. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
  3123. mbedtls_ssl_recv_flight_completed( ssl );
  3124. #endif
  3125. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello done" ) );
  3126. return( 0 );
  3127. }
  3128. static int ssl_write_client_key_exchange( mbedtls_ssl_context *ssl )
  3129. {
  3130. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  3131. size_t header_len;
  3132. size_t content_len;
  3133. const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
  3134. ssl->handshake->ciphersuite_info;
  3135. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write client key exchange" ) );
  3136. #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
  3137. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA )
  3138. {
  3139. /*
  3140. * DHM key exchange -- send G^X mod P
  3141. */
  3142. content_len = ssl->handshake->dhm_ctx.len;
  3143. ssl->out_msg[4] = (unsigned char)( content_len >> 8 );
  3144. ssl->out_msg[5] = (unsigned char)( content_len );
  3145. header_len = 6;
  3146. ret = mbedtls_dhm_make_public( &ssl->handshake->dhm_ctx,
  3147. (int) mbedtls_mpi_size( &ssl->handshake->dhm_ctx.P ),
  3148. &ssl->out_msg[header_len], content_len,
  3149. ssl->conf->f_rng, ssl->conf->p_rng );
  3150. if( ret != 0 )
  3151. {
  3152. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_make_public", ret );
  3153. return( ret );
  3154. }
  3155. MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: X ", &ssl->handshake->dhm_ctx.X );
  3156. MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: GX", &ssl->handshake->dhm_ctx.GX );
  3157. if( ( ret = mbedtls_dhm_calc_secret( &ssl->handshake->dhm_ctx,
  3158. ssl->handshake->premaster,
  3159. MBEDTLS_PREMASTER_SIZE,
  3160. &ssl->handshake->pmslen,
  3161. ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 )
  3162. {
  3163. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_calc_secret", ret );
  3164. return( ret );
  3165. }
  3166. MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: K ", &ssl->handshake->dhm_ctx.K );
  3167. }
  3168. else
  3169. #endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED */
  3170. #if defined(MBEDTLS_USE_PSA_CRYPTO) && \
  3171. ( defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  3172. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) )
  3173. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
  3174. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA )
  3175. {
  3176. psa_status_t status;
  3177. psa_key_attributes_t key_attributes;
  3178. mbedtls_ssl_handshake_params *handshake = ssl->handshake;
  3179. unsigned char own_pubkey[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
  3180. size_t own_pubkey_len;
  3181. unsigned char *own_pubkey_ecpoint;
  3182. size_t own_pubkey_ecpoint_len;
  3183. header_len = 4;
  3184. MBEDTLS_SSL_DEBUG_MSG( 1, ( "Perform PSA-based ECDH computation." ) );
  3185. /*
  3186. * Generate EC private key for ECDHE exchange.
  3187. */
  3188. /* The master secret is obtained from the shared ECDH secret by
  3189. * applying the TLS 1.2 PRF with a specific salt and label. While
  3190. * the PSA Crypto API encourages combining key agreement schemes
  3191. * such as ECDH with fixed KDFs such as TLS 1.2 PRF, it does not
  3192. * yet support the provisioning of salt + label to the KDF.
  3193. * For the time being, we therefore need to split the computation
  3194. * of the ECDH secret and the application of the TLS 1.2 PRF. */
  3195. key_attributes = psa_key_attributes_init();
  3196. psa_set_key_usage_flags( &key_attributes, PSA_KEY_USAGE_DERIVE );
  3197. psa_set_key_algorithm( &key_attributes, PSA_ALG_ECDH );
  3198. psa_set_key_type( &key_attributes, handshake->ecdh_psa_type );
  3199. psa_set_key_bits( &key_attributes, handshake->ecdh_bits );
  3200. /* Generate ECDH private key. */
  3201. status = psa_generate_key( &key_attributes,
  3202. &handshake->ecdh_psa_privkey );
  3203. if( status != PSA_SUCCESS )
  3204. return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
  3205. /* Export the public part of the ECDH private key from PSA
  3206. * and convert it to ECPoint format used in ClientKeyExchange. */
  3207. status = psa_export_public_key( handshake->ecdh_psa_privkey,
  3208. own_pubkey, sizeof( own_pubkey ),
  3209. &own_pubkey_len );
  3210. if( status != PSA_SUCCESS )
  3211. return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
  3212. if( mbedtls_psa_tls_psa_ec_to_ecpoint( own_pubkey,
  3213. own_pubkey_len,
  3214. &own_pubkey_ecpoint,
  3215. &own_pubkey_ecpoint_len ) != 0 )
  3216. {
  3217. return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
  3218. }
  3219. /* Copy ECPoint structure to outgoing message buffer. */
  3220. ssl->out_msg[header_len] = (unsigned char) own_pubkey_ecpoint_len;
  3221. memcpy( ssl->out_msg + header_len + 1,
  3222. own_pubkey_ecpoint, own_pubkey_ecpoint_len );
  3223. content_len = own_pubkey_ecpoint_len + 1;
  3224. /* The ECDH secret is the premaster secret used for key derivation. */
  3225. /* Compute ECDH shared secret. */
  3226. status = psa_raw_key_agreement( PSA_ALG_ECDH,
  3227. handshake->ecdh_psa_privkey,
  3228. handshake->ecdh_psa_peerkey,
  3229. handshake->ecdh_psa_peerkey_len,
  3230. ssl->handshake->premaster,
  3231. sizeof( ssl->handshake->premaster ),
  3232. &ssl->handshake->pmslen );
  3233. if( status != PSA_SUCCESS )
  3234. return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
  3235. status = psa_destroy_key( handshake->ecdh_psa_privkey );
  3236. if( status != PSA_SUCCESS )
  3237. return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
  3238. handshake->ecdh_psa_privkey = MBEDTLS_SVC_KEY_ID_INIT;
  3239. }
  3240. else
  3241. #endif /* MBEDTLS_USE_PSA_CRYPTO &&
  3242. ( MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  3243. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ) */
  3244. #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
  3245. defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
  3246. defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
  3247. defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
  3248. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
  3249. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA ||
  3250. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA ||
  3251. ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA )
  3252. {
  3253. /*
  3254. * ECDH key exchange -- send client public value
  3255. */
  3256. header_len = 4;
  3257. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3258. if( ssl->handshake->ecrs_enabled )
  3259. {
  3260. if( ssl->handshake->ecrs_state == ssl_ecrs_cke_ecdh_calc_secret )
  3261. goto ecdh_calc_secret;
  3262. mbedtls_ecdh_enable_restart( &ssl->handshake->ecdh_ctx );
  3263. }
  3264. #endif
  3265. ret = mbedtls_ecdh_make_public( &ssl->handshake->ecdh_ctx,
  3266. &content_len,
  3267. &ssl->out_msg[header_len], 1000,
  3268. ssl->conf->f_rng, ssl->conf->p_rng );
  3269. if( ret != 0 )
  3270. {
  3271. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_make_public", ret );
  3272. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3273. if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
  3274. ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
  3275. #endif
  3276. return( ret );
  3277. }
  3278. MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
  3279. MBEDTLS_DEBUG_ECDH_Q );
  3280. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3281. if( ssl->handshake->ecrs_enabled )
  3282. {
  3283. ssl->handshake->ecrs_n = content_len;
  3284. ssl->handshake->ecrs_state = ssl_ecrs_cke_ecdh_calc_secret;
  3285. }
  3286. ecdh_calc_secret:
  3287. if( ssl->handshake->ecrs_enabled )
  3288. content_len = ssl->handshake->ecrs_n;
  3289. #endif
  3290. if( ( ret = mbedtls_ecdh_calc_secret( &ssl->handshake->ecdh_ctx,
  3291. &ssl->handshake->pmslen,
  3292. ssl->handshake->premaster,
  3293. MBEDTLS_MPI_MAX_SIZE,
  3294. ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 )
  3295. {
  3296. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_calc_secret", ret );
  3297. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3298. if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
  3299. ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
  3300. #endif
  3301. return( ret );
  3302. }
  3303. MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
  3304. MBEDTLS_DEBUG_ECDH_Z );
  3305. }
  3306. else
  3307. #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
  3308. MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
  3309. MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
  3310. MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
  3311. #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
  3312. if( mbedtls_ssl_ciphersuite_uses_psk( ciphersuite_info ) )
  3313. {
  3314. /*
  3315. * opaque psk_identity<0..2^16-1>;
  3316. */
  3317. if( ssl_conf_has_static_psk( ssl->conf ) == 0 )
  3318. {
  3319. /* We don't offer PSK suites if we don't have a PSK,
  3320. * and we check that the server's choice is among the
  3321. * ciphersuites we offered, so this should never happen. */
  3322. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  3323. }
  3324. header_len = 4;
  3325. content_len = ssl->conf->psk_identity_len;
  3326. if( header_len + 2 + content_len > MBEDTLS_SSL_OUT_CONTENT_LEN )
  3327. {
  3328. MBEDTLS_SSL_DEBUG_MSG( 1,
  3329. ( "psk identity too long or SSL buffer too short" ) );
  3330. return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL );
  3331. }
  3332. ssl->out_msg[header_len++] = (unsigned char)( content_len >> 8 );
  3333. ssl->out_msg[header_len++] = (unsigned char)( content_len );
  3334. memcpy( ssl->out_msg + header_len,
  3335. ssl->conf->psk_identity,
  3336. ssl->conf->psk_identity_len );
  3337. header_len += ssl->conf->psk_identity_len;
  3338. #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
  3339. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK )
  3340. {
  3341. content_len = 0;
  3342. }
  3343. else
  3344. #endif
  3345. #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
  3346. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK )
  3347. {
  3348. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  3349. /* Opaque PSKs are currently only supported for PSK-only suites. */
  3350. if( ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
  3351. return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
  3352. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  3353. if( ( ret = ssl_write_encrypted_pms( ssl, header_len,
  3354. &content_len, 2 ) ) != 0 )
  3355. return( ret );
  3356. }
  3357. else
  3358. #endif
  3359. #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
  3360. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK )
  3361. {
  3362. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  3363. /* Opaque PSKs are currently only supported for PSK-only suites. */
  3364. if( ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
  3365. return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
  3366. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  3367. /*
  3368. * ClientDiffieHellmanPublic public (DHM send G^X mod P)
  3369. */
  3370. content_len = ssl->handshake->dhm_ctx.len;
  3371. if( header_len + 2 + content_len >
  3372. MBEDTLS_SSL_OUT_CONTENT_LEN )
  3373. {
  3374. MBEDTLS_SSL_DEBUG_MSG( 1,
  3375. ( "psk identity or DHM size too long or SSL buffer too short" ) );
  3376. return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL );
  3377. }
  3378. ssl->out_msg[header_len++] = (unsigned char)( content_len >> 8 );
  3379. ssl->out_msg[header_len++] = (unsigned char)( content_len );
  3380. ret = mbedtls_dhm_make_public( &ssl->handshake->dhm_ctx,
  3381. (int) mbedtls_mpi_size( &ssl->handshake->dhm_ctx.P ),
  3382. &ssl->out_msg[header_len], content_len,
  3383. ssl->conf->f_rng, ssl->conf->p_rng );
  3384. if( ret != 0 )
  3385. {
  3386. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_make_public", ret );
  3387. return( ret );
  3388. }
  3389. }
  3390. else
  3391. #endif /* MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
  3392. #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
  3393. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK )
  3394. {
  3395. #if defined(MBEDTLS_USE_PSA_CRYPTO)
  3396. /* Opaque PSKs are currently only supported for PSK-only suites. */
  3397. if( ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
  3398. return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
  3399. #endif /* MBEDTLS_USE_PSA_CRYPTO */
  3400. /*
  3401. * ClientECDiffieHellmanPublic public;
  3402. */
  3403. ret = mbedtls_ecdh_make_public( &ssl->handshake->ecdh_ctx,
  3404. &content_len,
  3405. &ssl->out_msg[header_len],
  3406. MBEDTLS_SSL_OUT_CONTENT_LEN - header_len,
  3407. ssl->conf->f_rng, ssl->conf->p_rng );
  3408. if( ret != 0 )
  3409. {
  3410. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_make_public", ret );
  3411. return( ret );
  3412. }
  3413. MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
  3414. MBEDTLS_DEBUG_ECDH_Q );
  3415. }
  3416. else
  3417. #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED */
  3418. {
  3419. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  3420. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  3421. }
  3422. #if defined(MBEDTLS_USE_PSA_CRYPTO) && \
  3423. defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
  3424. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK &&
  3425. ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 &&
  3426. ssl_conf_has_static_raw_psk( ssl->conf ) == 0 )
  3427. {
  3428. MBEDTLS_SSL_DEBUG_MSG( 1,
  3429. ( "skip PMS generation for opaque PSK" ) );
  3430. }
  3431. else
  3432. #endif /* MBEDTLS_USE_PSA_CRYPTO &&
  3433. MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
  3434. if( ( ret = mbedtls_ssl_psk_derive_premaster( ssl,
  3435. ciphersuite_info->key_exchange ) ) != 0 )
  3436. {
  3437. MBEDTLS_SSL_DEBUG_RET( 1,
  3438. "mbedtls_ssl_psk_derive_premaster", ret );
  3439. return( ret );
  3440. }
  3441. }
  3442. else
  3443. #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
  3444. #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
  3445. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA )
  3446. {
  3447. header_len = 4;
  3448. if( ( ret = ssl_write_encrypted_pms( ssl, header_len,
  3449. &content_len, 0 ) ) != 0 )
  3450. return( ret );
  3451. }
  3452. else
  3453. #endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED */
  3454. #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
  3455. if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE )
  3456. {
  3457. header_len = 4;
  3458. ret = mbedtls_ecjpake_write_round_two( &ssl->handshake->ecjpake_ctx,
  3459. ssl->out_msg + header_len,
  3460. MBEDTLS_SSL_OUT_CONTENT_LEN - header_len,
  3461. &content_len,
  3462. ssl->conf->f_rng, ssl->conf->p_rng );
  3463. if( ret != 0 )
  3464. {
  3465. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_write_round_two", ret );
  3466. return( ret );
  3467. }
  3468. ret = mbedtls_ecjpake_derive_secret( &ssl->handshake->ecjpake_ctx,
  3469. ssl->handshake->premaster, 32, &ssl->handshake->pmslen,
  3470. ssl->conf->f_rng, ssl->conf->p_rng );
  3471. if( ret != 0 )
  3472. {
  3473. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_derive_secret", ret );
  3474. return( ret );
  3475. }
  3476. }
  3477. else
  3478. #endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED */
  3479. {
  3480. ((void) ciphersuite_info);
  3481. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  3482. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  3483. }
  3484. ssl->out_msglen = header_len + content_len;
  3485. ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
  3486. ssl->out_msg[0] = MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE;
  3487. ssl->state++;
  3488. if( ( ret = mbedtls_ssl_write_handshake_msg( ssl ) ) != 0 )
  3489. {
  3490. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_handshake_msg", ret );
  3491. return( ret );
  3492. }
  3493. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write client key exchange" ) );
  3494. return( 0 );
  3495. }
  3496. #if !defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
  3497. static int ssl_write_certificate_verify( mbedtls_ssl_context *ssl )
  3498. {
  3499. const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
  3500. ssl->handshake->ciphersuite_info;
  3501. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  3502. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) );
  3503. if( ( ret = mbedtls_ssl_derive_keys( ssl ) ) != 0 )
  3504. {
  3505. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_derive_keys", ret );
  3506. return( ret );
  3507. }
  3508. if( !mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
  3509. {
  3510. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
  3511. ssl->state++;
  3512. return( 0 );
  3513. }
  3514. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  3515. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  3516. }
  3517. #else /* !MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
  3518. static int ssl_write_certificate_verify( mbedtls_ssl_context *ssl )
  3519. {
  3520. int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
  3521. const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
  3522. ssl->handshake->ciphersuite_info;
  3523. size_t n = 0, offset = 0;
  3524. unsigned char hash[48];
  3525. unsigned char *hash_start = hash;
  3526. mbedtls_md_type_t md_alg = MBEDTLS_MD_NONE;
  3527. size_t hashlen;
  3528. void *rs_ctx = NULL;
  3529. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) );
  3530. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3531. if( ssl->handshake->ecrs_enabled &&
  3532. ssl->handshake->ecrs_state == ssl_ecrs_crt_vrfy_sign )
  3533. {
  3534. goto sign;
  3535. }
  3536. #endif
  3537. if( ( ret = mbedtls_ssl_derive_keys( ssl ) ) != 0 )
  3538. {
  3539. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_derive_keys", ret );
  3540. return( ret );
  3541. }
  3542. if( !mbedtls_ssl_ciphersuite_cert_req_allowed( ciphersuite_info ) )
  3543. {
  3544. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
  3545. ssl->state++;
  3546. return( 0 );
  3547. }
  3548. if( ssl->client_auth == 0 || mbedtls_ssl_own_cert( ssl ) == NULL )
  3549. {
  3550. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
  3551. ssl->state++;
  3552. return( 0 );
  3553. }
  3554. if( mbedtls_ssl_own_key( ssl ) == NULL )
  3555. {
  3556. MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no private key for certificate" ) );
  3557. return( MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED );
  3558. }
  3559. /*
  3560. * Make a signature of the handshake digests
  3561. */
  3562. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3563. if( ssl->handshake->ecrs_enabled )
  3564. ssl->handshake->ecrs_state = ssl_ecrs_crt_vrfy_sign;
  3565. sign:
  3566. #endif
  3567. ssl->handshake->calc_verify( ssl, hash, &hashlen );
  3568. #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \
  3569. defined(MBEDTLS_SSL_PROTO_TLS1_1)
  3570. if( ssl->minor_ver != MBEDTLS_SSL_MINOR_VERSION_3 )
  3571. {
  3572. /*
  3573. * digitally-signed struct {
  3574. * opaque md5_hash[16];
  3575. * opaque sha_hash[20];
  3576. * };
  3577. *
  3578. * md5_hash
  3579. * MD5(handshake_messages);
  3580. *
  3581. * sha_hash
  3582. * SHA(handshake_messages);
  3583. */
  3584. md_alg = MBEDTLS_MD_NONE;
  3585. /*
  3586. * For ECDSA, default hash is SHA-1 only
  3587. */
  3588. if( mbedtls_pk_can_do( mbedtls_ssl_own_key( ssl ), MBEDTLS_PK_ECDSA ) )
  3589. {
  3590. hash_start += 16;
  3591. hashlen -= 16;
  3592. md_alg = MBEDTLS_MD_SHA1;
  3593. }
  3594. }
  3595. else
  3596. #endif /* MBEDTLS_SSL_PROTO_SSL3 || MBEDTLS_SSL_PROTO_TLS1 || \
  3597. MBEDTLS_SSL_PROTO_TLS1_1 */
  3598. #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
  3599. if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 )
  3600. {
  3601. /*
  3602. * digitally-signed struct {
  3603. * opaque handshake_messages[handshake_messages_length];
  3604. * };
  3605. *
  3606. * Taking shortcut here. We assume that the server always allows the
  3607. * PRF Hash function and has sent it in the allowed signature
  3608. * algorithms list received in the Certificate Request message.
  3609. *
  3610. * Until we encounter a server that does not, we will take this
  3611. * shortcut.
  3612. *
  3613. * Reason: Otherwise we should have running hashes for SHA512 and
  3614. * SHA224 in order to satisfy 'weird' needs from the server
  3615. * side.
  3616. */
  3617. if( ssl->handshake->ciphersuite_info->mac == MBEDTLS_MD_SHA384 )
  3618. {
  3619. md_alg = MBEDTLS_MD_SHA384;
  3620. ssl->out_msg[4] = MBEDTLS_SSL_HASH_SHA384;
  3621. }
  3622. else
  3623. {
  3624. md_alg = MBEDTLS_MD_SHA256;
  3625. ssl->out_msg[4] = MBEDTLS_SSL_HASH_SHA256;
  3626. }
  3627. ssl->out_msg[5] = mbedtls_ssl_sig_from_pk( mbedtls_ssl_own_key( ssl ) );
  3628. /* Info from md_alg will be used instead */
  3629. hashlen = 0;
  3630. offset = 2;
  3631. }
  3632. else
  3633. #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
  3634. {
  3635. MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
  3636. return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
  3637. }
  3638. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3639. if( ssl->handshake->ecrs_enabled )
  3640. rs_ctx = &ssl->handshake->ecrs_ctx.pk;
  3641. #endif
  3642. if( ( ret = mbedtls_pk_sign_restartable( mbedtls_ssl_own_key( ssl ),
  3643. md_alg, hash_start, hashlen,
  3644. ssl->out_msg + 6 + offset, &n,
  3645. ssl->conf->f_rng, ssl->conf->p_rng, rs_ctx ) ) != 0 )
  3646. {
  3647. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_pk_sign", ret );
  3648. #if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
  3649. if( ret == MBEDTLS_ERR_ECP_IN_PROGRESS )
  3650. ret = MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS;
  3651. #endif
  3652. return( ret );
  3653. }
  3654. ssl->out_msg[4 + offset] = (unsigned char)( n >> 8 );
  3655. ssl->out_msg[5 + offset] = (unsigned char)( n );
  3656. ssl->out_msglen = 6 + n + offset;
  3657. ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
  3658. ssl->out_msg[0] = MBEDTLS_SSL_HS_CERTIFICATE_VERIFY;
  3659. ssl->state++;
  3660. if( ( ret = mbedtls_ssl_write_handshake_msg( ssl ) ) != 0 )
  3661. {
  3662. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_handshake_msg", ret );
  3663. return( ret );
  3664. }
  3665. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write certificate verify" ) );
  3666. return( ret );
  3667. }
  3668. #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
  3669. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  3670. static int ssl_parse_new_session_ticket( mbedtls_ssl_context *ssl )
  3671. {
  3672. int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
  3673. uint32_t lifetime;
  3674. size_t ticket_len;
  3675. unsigned char *ticket;
  3676. const unsigned char *msg;
  3677. MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse new session ticket" ) );
  3678. if( ( ret = mbedtls_ssl_read_record( ssl, 1 ) ) != 0 )
  3679. {
  3680. MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
  3681. return( ret );
  3682. }
  3683. if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE )
  3684. {
  3685. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
  3686. mbedtls_ssl_send_alert_message(
  3687. ssl,
  3688. MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3689. MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE );
  3690. return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
  3691. }
  3692. /*
  3693. * struct {
  3694. * uint32 ticket_lifetime_hint;
  3695. * opaque ticket<0..2^16-1>;
  3696. * } NewSessionTicket;
  3697. *
  3698. * 0 . 3 ticket_lifetime_hint
  3699. * 4 . 5 ticket_len (n)
  3700. * 6 . 5+n ticket content
  3701. */
  3702. if( ssl->in_msg[0] != MBEDTLS_SSL_HS_NEW_SESSION_TICKET ||
  3703. ssl->in_hslen < 6 + mbedtls_ssl_hs_hdr_len( ssl ) )
  3704. {
  3705. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
  3706. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3707. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  3708. return( MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET );
  3709. }
  3710. msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
  3711. lifetime = ( ((uint32_t) msg[0]) << 24 ) | ( msg[1] << 16 ) |
  3712. ( msg[2] << 8 ) | ( msg[3] );
  3713. ticket_len = ( msg[4] << 8 ) | ( msg[5] );
  3714. if( ticket_len + 6 + mbedtls_ssl_hs_hdr_len( ssl ) != ssl->in_hslen )
  3715. {
  3716. MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
  3717. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3718. MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR );
  3719. return( MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET );
  3720. }
  3721. MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket length: %" MBEDTLS_PRINTF_SIZET, ticket_len ) );
  3722. /* We're not waiting for a NewSessionTicket message any more */
  3723. ssl->handshake->new_session_ticket = 0;
  3724. ssl->state = MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC;
  3725. /*
  3726. * Zero-length ticket means the server changed his mind and doesn't want
  3727. * to send a ticket after all, so just forget it
  3728. */
  3729. if( ticket_len == 0 )
  3730. return( 0 );
  3731. if( ssl->session != NULL && ssl->session->ticket != NULL )
  3732. {
  3733. mbedtls_platform_zeroize( ssl->session->ticket,
  3734. ssl->session->ticket_len );
  3735. mbedtls_free( ssl->session->ticket );
  3736. ssl->session->ticket = NULL;
  3737. ssl->session->ticket_len = 0;
  3738. }
  3739. mbedtls_platform_zeroize( ssl->session_negotiate->ticket,
  3740. ssl->session_negotiate->ticket_len );
  3741. mbedtls_free( ssl->session_negotiate->ticket );
  3742. ssl->session_negotiate->ticket = NULL;
  3743. ssl->session_negotiate->ticket_len = 0;
  3744. if( ( ticket = mbedtls_calloc( 1, ticket_len ) ) == NULL )
  3745. {
  3746. MBEDTLS_SSL_DEBUG_MSG( 1, ( "ticket alloc failed" ) );
  3747. mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
  3748. MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR );
  3749. return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
  3750. }
  3751. memcpy( ticket, msg + 6, ticket_len );
  3752. ssl->session_negotiate->ticket = ticket;
  3753. ssl->session_negotiate->ticket_len = ticket_len;
  3754. ssl->session_negotiate->ticket_lifetime = lifetime;
  3755. /*
  3756. * RFC 5077 section 3.4:
  3757. * "If the client receives a session ticket from the server, then it
  3758. * discards any Session ID that was sent in the ServerHello."
  3759. */
  3760. MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket in use, discarding session id" ) );
  3761. ssl->session_negotiate->id_len = 0;
  3762. MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse new session ticket" ) );
  3763. return( 0 );
  3764. }
  3765. #endif /* MBEDTLS_SSL_SESSION_TICKETS */
  3766. /*
  3767. * SSL handshake -- client side -- single step
  3768. */
  3769. int mbedtls_ssl_handshake_client_step( mbedtls_ssl_context *ssl )
  3770. {
  3771. int ret = 0;
  3772. if( ssl->state == MBEDTLS_SSL_HANDSHAKE_OVER || ssl->handshake == NULL )
  3773. return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
  3774. MBEDTLS_SSL_DEBUG_MSG( 2, ( "client state: %d", ssl->state ) );
  3775. if( ( ret = mbedtls_ssl_flush_output( ssl ) ) != 0 )
  3776. return( ret );
  3777. #if defined(MBEDTLS_SSL_PROTO_DTLS)
  3778. if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM &&
  3779. ssl->handshake->retransmit_state == MBEDTLS_SSL_RETRANS_SENDING )
  3780. {
  3781. if( ( ret = mbedtls_ssl_flight_transmit( ssl ) ) != 0 )
  3782. return( ret );
  3783. }
  3784. #endif /* MBEDTLS_SSL_PROTO_DTLS */
  3785. /* Change state now, so that it is right in mbedtls_ssl_read_record(), used
  3786. * by DTLS for dropping out-of-sequence ChangeCipherSpec records */
  3787. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  3788. if( ssl->state == MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC &&
  3789. ssl->handshake->new_session_ticket != 0 )
  3790. {
  3791. ssl->state = MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET;
  3792. }
  3793. #endif
  3794. switch( ssl->state )
  3795. {
  3796. case MBEDTLS_SSL_HELLO_REQUEST:
  3797. ssl->state = MBEDTLS_SSL_CLIENT_HELLO;
  3798. break;
  3799. /*
  3800. * ==> ClientHello
  3801. */
  3802. case MBEDTLS_SSL_CLIENT_HELLO:
  3803. ret = ssl_write_client_hello( ssl );
  3804. break;
  3805. /*
  3806. * <== ServerHello
  3807. * Certificate
  3808. * ( ServerKeyExchange )
  3809. * ( CertificateRequest )
  3810. * ServerHelloDone
  3811. */
  3812. case MBEDTLS_SSL_SERVER_HELLO:
  3813. ret = ssl_parse_server_hello( ssl );
  3814. break;
  3815. case MBEDTLS_SSL_SERVER_CERTIFICATE:
  3816. ret = mbedtls_ssl_parse_certificate( ssl );
  3817. break;
  3818. case MBEDTLS_SSL_SERVER_KEY_EXCHANGE:
  3819. ret = ssl_parse_server_key_exchange( ssl );
  3820. break;
  3821. case MBEDTLS_SSL_CERTIFICATE_REQUEST:
  3822. ret = ssl_parse_certificate_request( ssl );
  3823. break;
  3824. case MBEDTLS_SSL_SERVER_HELLO_DONE:
  3825. ret = ssl_parse_server_hello_done( ssl );
  3826. break;
  3827. /*
  3828. * ==> ( Certificate/Alert )
  3829. * ClientKeyExchange
  3830. * ( CertificateVerify )
  3831. * ChangeCipherSpec
  3832. * Finished
  3833. */
  3834. case MBEDTLS_SSL_CLIENT_CERTIFICATE:
  3835. ret = mbedtls_ssl_write_certificate( ssl );
  3836. break;
  3837. case MBEDTLS_SSL_CLIENT_KEY_EXCHANGE:
  3838. ret = ssl_write_client_key_exchange( ssl );
  3839. break;
  3840. case MBEDTLS_SSL_CERTIFICATE_VERIFY:
  3841. ret = ssl_write_certificate_verify( ssl );
  3842. break;
  3843. case MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC:
  3844. ret = mbedtls_ssl_write_change_cipher_spec( ssl );
  3845. break;
  3846. case MBEDTLS_SSL_CLIENT_FINISHED:
  3847. ret = mbedtls_ssl_write_finished( ssl );
  3848. break;
  3849. /*
  3850. * <== ( NewSessionTicket )
  3851. * ChangeCipherSpec
  3852. * Finished
  3853. */
  3854. #if defined(MBEDTLS_SSL_SESSION_TICKETS)
  3855. case MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET:
  3856. ret = ssl_parse_new_session_ticket( ssl );
  3857. break;
  3858. #endif
  3859. case MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC:
  3860. ret = mbedtls_ssl_parse_change_cipher_spec( ssl );
  3861. break;
  3862. case MBEDTLS_SSL_SERVER_FINISHED:
  3863. ret = mbedtls_ssl_parse_finished( ssl );
  3864. break;
  3865. case MBEDTLS_SSL_FLUSH_BUFFERS:
  3866. MBEDTLS_SSL_DEBUG_MSG( 2, ( "handshake: done" ) );
  3867. ssl->state = MBEDTLS_SSL_HANDSHAKE_WRAPUP;
  3868. break;
  3869. case MBEDTLS_SSL_HANDSHAKE_WRAPUP:
  3870. mbedtls_ssl_handshake_wrapup( ssl );
  3871. break;
  3872. default:
  3873. MBEDTLS_SSL_DEBUG_MSG( 1, ( "invalid state %d", ssl->state ) );
  3874. return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
  3875. }
  3876. return( ret );
  3877. }
  3878. #endif /* MBEDTLS_SSL_CLI_C */