2610 lines
67 KiB
C
2610 lines
67 KiB
C
/*
|
|
* wpa_supplicant: TLSv1 client (RFC 2246)
|
|
* Copyright (c) 2006, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
* license.
|
|
*
|
|
* See README and COPYING for more details.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include "common.h"
|
|
#include "base64.h"
|
|
#include "md5.h"
|
|
#include "sha1.h"
|
|
#include "crypto.h"
|
|
#include "tls.h"
|
|
#include "tlsv1_common.h"
|
|
#include "tlsv1_client.h"
|
|
#include "x509v3.h"
|
|
|
|
/* TODO:
|
|
* Support for a message fragmented across several records (RFC 2246, 6.2.1)
|
|
*/
|
|
|
|
struct tlsv1_client {
|
|
enum {
|
|
CLIENT_HELLO, SERVER_HELLO, SERVER_CERTIFICATE,
|
|
SERVER_KEY_EXCHANGE, SERVER_CERTIFICATE_REQUEST,
|
|
SERVER_HELLO_DONE, CLIENT_KEY_EXCHANGE, CHANGE_CIPHER_SPEC,
|
|
SERVER_CHANGE_CIPHER_SPEC, SERVER_FINISHED, ACK_FINISHED,
|
|
ESTABLISHED, FAILED
|
|
} state;
|
|
|
|
struct tlsv1_record_layer rl;
|
|
|
|
u8 session_id[TLS_SESSION_ID_MAX_LEN];
|
|
size_t session_id_len;
|
|
u8 client_random[TLS_RANDOM_LEN];
|
|
u8 server_random[TLS_RANDOM_LEN];
|
|
u8 master_secret[TLS_MASTER_SECRET_LEN];
|
|
|
|
u8 alert_level;
|
|
u8 alert_description;
|
|
|
|
unsigned int certificate_requested:1;
|
|
unsigned int session_resumed:1;
|
|
unsigned int ticket:1;
|
|
unsigned int ticket_key:1;
|
|
|
|
struct crypto_public_key *server_rsa_key;
|
|
|
|
struct crypto_hash *verify_md5_client;
|
|
struct crypto_hash *verify_sha1_client;
|
|
struct crypto_hash *verify_md5_server;
|
|
struct crypto_hash *verify_sha1_server;
|
|
struct crypto_hash *verify_md5_cert;
|
|
struct crypto_hash *verify_sha1_cert;
|
|
|
|
#define MAX_CIPHER_COUNT 30
|
|
u16 cipher_suites[MAX_CIPHER_COUNT];
|
|
size_t num_cipher_suites;
|
|
|
|
u16 prev_cipher_suite;
|
|
|
|
u8 *client_hello_ext;
|
|
size_t client_hello_ext_len;
|
|
|
|
/* The prime modulus used for Diffie-Hellman */
|
|
u8 *dh_p;
|
|
size_t dh_p_len;
|
|
/* The generator used for Diffie-Hellman */
|
|
u8 *dh_g;
|
|
size_t dh_g_len;
|
|
/* The server's Diffie-Hellman public value */
|
|
u8 *dh_ys;
|
|
size_t dh_ys_len;
|
|
|
|
struct x509_certificate *trusted_certs;
|
|
struct x509_certificate *client_cert;
|
|
struct crypto_private_key *client_key;
|
|
};
|
|
|
|
|
|
static int tls_derive_keys(struct tlsv1_client *conn,
|
|
const u8 *pre_master_secret,
|
|
size_t pre_master_secret_len);
|
|
static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len);
|
|
static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len);
|
|
static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len);
|
|
|
|
|
|
static void tls_alert(struct tlsv1_client *conn, u8 level, u8 description)
|
|
{
|
|
conn->alert_level = level;
|
|
conn->alert_description = description;
|
|
}
|
|
|
|
|
|
static void tls_verify_hash_add(struct tlsv1_client *conn, const u8 *buf,
|
|
size_t len)
|
|
{
|
|
if (conn->verify_md5_client && conn->verify_sha1_client) {
|
|
crypto_hash_update(conn->verify_md5_client, buf, len);
|
|
crypto_hash_update(conn->verify_sha1_client, buf, len);
|
|
}
|
|
if (conn->verify_md5_server && conn->verify_sha1_server) {
|
|
crypto_hash_update(conn->verify_md5_server, buf, len);
|
|
crypto_hash_update(conn->verify_sha1_server, buf, len);
|
|
}
|
|
if (conn->verify_md5_cert && conn->verify_sha1_cert) {
|
|
crypto_hash_update(conn->verify_md5_cert, buf, len);
|
|
crypto_hash_update(conn->verify_sha1_cert, buf, len);
|
|
}
|
|
}
|
|
|
|
|
|
static u8 * tls_send_alert(struct tlsv1_client *conn,
|
|
u8 level, u8 description,
|
|
size_t *out_len)
|
|
{
|
|
u8 *alert, *pos, *length;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Send Alert(%d:%d)", level, description);
|
|
*out_len = 0;
|
|
|
|
alert = os_malloc(10);
|
|
if (alert == NULL)
|
|
return NULL;
|
|
|
|
pos = alert;
|
|
|
|
/* TLSPlaintext */
|
|
/* ContentType type */
|
|
*pos++ = TLS_CONTENT_TYPE_ALERT;
|
|
/* ProtocolVersion version */
|
|
WPA_PUT_BE16(pos, TLS_VERSION);
|
|
pos += 2;
|
|
/* uint16 length (to be filled) */
|
|
length = pos;
|
|
pos += 2;
|
|
/* opaque fragment[TLSPlaintext.length] */
|
|
|
|
/* Alert */
|
|
/* AlertLevel level */
|
|
*pos++ = level;
|
|
/* AlertDescription description */
|
|
*pos++ = description;
|
|
|
|
WPA_PUT_BE16(length, pos - length - 2);
|
|
*out_len = pos - alert;
|
|
|
|
return alert;
|
|
}
|
|
|
|
|
|
static u8 * tls_send_client_hello(struct tlsv1_client *conn,
|
|
size_t *out_len)
|
|
{
|
|
u8 *hello, *end, *pos, *hs_length, *hs_start, *rhdr;
|
|
struct os_time now;
|
|
size_t len, i;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello");
|
|
*out_len = 0;
|
|
|
|
os_get_time(&now);
|
|
WPA_PUT_BE32(conn->client_random, now.sec);
|
|
if (os_get_random(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
|
|
wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
|
|
"client_random");
|
|
return NULL;
|
|
}
|
|
wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
|
|
conn->client_random, TLS_RANDOM_LEN);
|
|
|
|
len = 100 + conn->num_cipher_suites * 2 + conn->client_hello_ext_len;
|
|
hello = os_malloc(len);
|
|
if (hello == NULL)
|
|
return NULL;
|
|
end = hello + len;
|
|
|
|
rhdr = hello;
|
|
pos = rhdr + TLS_RECORD_HEADER_LEN;
|
|
|
|
/* opaque fragment[TLSPlaintext.length] */
|
|
|
|
/* Handshake */
|
|
hs_start = pos;
|
|
/* HandshakeType msg_type */
|
|
*pos++ = TLS_HANDSHAKE_TYPE_CLIENT_HELLO;
|
|
/* uint24 length (to be filled) */
|
|
hs_length = pos;
|
|
pos += 3;
|
|
/* body - ClientHello */
|
|
/* ProtocolVersion client_version */
|
|
WPA_PUT_BE16(pos, TLS_VERSION);
|
|
pos += 2;
|
|
/* Random random: uint32 gmt_unix_time, opaque random_bytes */
|
|
os_memcpy(pos, conn->client_random, TLS_RANDOM_LEN);
|
|
pos += TLS_RANDOM_LEN;
|
|
/* SessionID session_id */
|
|
*pos++ = conn->session_id_len;
|
|
os_memcpy(pos, conn->session_id, conn->session_id_len);
|
|
pos += conn->session_id_len;
|
|
/* CipherSuite cipher_suites<2..2^16-1> */
|
|
WPA_PUT_BE16(pos, 2 * conn->num_cipher_suites);
|
|
pos += 2;
|
|
for (i = 0; i < conn->num_cipher_suites; i++) {
|
|
WPA_PUT_BE16(pos, conn->cipher_suites[i]);
|
|
pos += 2;
|
|
}
|
|
/* CompressionMethod compression_methods<1..2^8-1> */
|
|
*pos++ = 1;
|
|
*pos++ = TLS_COMPRESSION_NULL;
|
|
|
|
if (conn->client_hello_ext) {
|
|
os_memcpy(pos, conn->client_hello_ext,
|
|
conn->client_hello_ext_len);
|
|
pos += conn->client_hello_ext_len;
|
|
}
|
|
|
|
WPA_PUT_BE24(hs_length, pos - hs_length - 3);
|
|
tls_verify_hash_add(conn, hs_start, pos - hs_start);
|
|
|
|
if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE,
|
|
rhdr, end - rhdr, pos - hs_start, out_len) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
os_free(hello);
|
|
return NULL;
|
|
}
|
|
|
|
conn->state = SERVER_HELLO;
|
|
|
|
return hello;
|
|
}
|
|
|
|
|
|
static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len)
|
|
{
|
|
const u8 *pos, *end;
|
|
size_t left, len, i;
|
|
u16 cipher_suite;
|
|
|
|
if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
|
|
"received content type 0x%x", ct);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
pos = in_data;
|
|
left = *in_len;
|
|
|
|
if (left < 4)
|
|
goto decode_error;
|
|
|
|
/* HandshakeType msg_type */
|
|
if (*pos != TLS_HANDSHAKE_TYPE_SERVER_HELLO) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
|
|
"message %d (expected ServerHello)", *pos);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
|
|
pos++;
|
|
/* uint24 length */
|
|
len = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
left -= 4;
|
|
|
|
if (len > left)
|
|
goto decode_error;
|
|
|
|
/* body - ServerHello */
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len);
|
|
end = pos + len;
|
|
|
|
/* ProtocolVersion server_version */
|
|
if (end - pos < 2)
|
|
goto decode_error;
|
|
if (WPA_GET_BE16(pos) != TLS_VERSION) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
|
|
"ServerHello");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_PROTOCOL_VERSION);
|
|
return -1;
|
|
}
|
|
pos += 2;
|
|
|
|
/* Random random */
|
|
if (end - pos < TLS_RANDOM_LEN)
|
|
goto decode_error;
|
|
|
|
os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN);
|
|
pos += TLS_RANDOM_LEN;
|
|
wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
|
|
conn->server_random, TLS_RANDOM_LEN);
|
|
|
|
/* SessionID session_id */
|
|
if (end - pos < 1)
|
|
goto decode_error;
|
|
if (end - pos < 1 + *pos || *pos > TLS_SESSION_ID_MAX_LEN)
|
|
goto decode_error;
|
|
if (conn->session_id_len && conn->session_id_len == *pos &&
|
|
os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
|
|
pos += 1 + conn->session_id_len;
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
|
|
conn->session_resumed = 1;
|
|
} else {
|
|
conn->session_id_len = *pos;
|
|
pos++;
|
|
os_memcpy(conn->session_id, pos, conn->session_id_len);
|
|
pos += conn->session_id_len;
|
|
}
|
|
wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
|
|
conn->session_id, conn->session_id_len);
|
|
|
|
/* CipherSuite cipher_suite */
|
|
if (end - pos < 2)
|
|
goto decode_error;
|
|
cipher_suite = WPA_GET_BE16(pos);
|
|
pos += 2;
|
|
for (i = 0; i < conn->num_cipher_suites; i++) {
|
|
if (cipher_suite == conn->cipher_suites[i])
|
|
break;
|
|
}
|
|
if (i == conn->num_cipher_suites) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected "
|
|
"cipher suite 0x%04x", cipher_suite);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_ILLEGAL_PARAMETER);
|
|
return -1;
|
|
}
|
|
|
|
if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
|
|
"cipher suite for a resumed connection (0x%04x != "
|
|
"0x%04x)", cipher_suite, conn->prev_cipher_suite);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_ILLEGAL_PARAMETER);
|
|
return -1;
|
|
}
|
|
|
|
if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
|
|
"record layer");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
conn->prev_cipher_suite = cipher_suite;
|
|
|
|
if (conn->session_resumed || conn->ticket_key)
|
|
tls_derive_keys(conn, NULL, 0);
|
|
|
|
/* CompressionMethod compression_method */
|
|
if (end - pos < 1)
|
|
goto decode_error;
|
|
if (*pos != TLS_COMPRESSION_NULL) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected "
|
|
"compression 0x%02x", *pos);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_ILLEGAL_PARAMETER);
|
|
return -1;
|
|
}
|
|
pos++;
|
|
|
|
if (end != pos) {
|
|
wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
|
|
"end of ServerHello", pos, end - pos);
|
|
goto decode_error;
|
|
}
|
|
|
|
*in_len = end - in_data;
|
|
|
|
conn->state = (conn->session_resumed || conn->ticket) ?
|
|
SERVER_CHANGE_CIPHER_SPEC : SERVER_CERTIFICATE;
|
|
|
|
return 0;
|
|
|
|
decode_error:
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to decode ServerHello");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int tls_server_key_exchange_allowed(struct tlsv1_client *conn)
|
|
{
|
|
const struct tls_cipher_suite *suite;
|
|
|
|
/* RFC 2246, Section 7.4.3 */
|
|
suite = tls_get_cipher_suite(conn->rl.cipher_suite);
|
|
if (suite == NULL)
|
|
return 0;
|
|
|
|
switch (suite->key_exchange) {
|
|
case TLS_KEY_X_DHE_DSS:
|
|
case TLS_KEY_X_DHE_DSS_EXPORT:
|
|
case TLS_KEY_X_DHE_RSA:
|
|
case TLS_KEY_X_DHE_RSA_EXPORT:
|
|
case TLS_KEY_X_DH_anon_EXPORT:
|
|
case TLS_KEY_X_DH_anon:
|
|
return 1;
|
|
case TLS_KEY_X_RSA_EXPORT:
|
|
return 1 /* FIX: public key len > 512 bits */;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
static int tls_process_certificate(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len)
|
|
{
|
|
const u8 *pos, *end;
|
|
size_t left, len, list_len, cert_len, idx;
|
|
u8 type;
|
|
struct x509_certificate *chain = NULL, *last = NULL, *cert;
|
|
int reason;
|
|
|
|
if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
|
|
"received content type 0x%x", ct);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
pos = in_data;
|
|
left = *in_len;
|
|
|
|
if (left < 4) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate message "
|
|
"(len=%lu)", (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
type = *pos++;
|
|
len = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
left -= 4;
|
|
|
|
if (len > left) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected Certificate message "
|
|
"length (len=%lu != left=%lu)",
|
|
(unsigned long) len, (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
if (type == TLS_HANDSHAKE_TYPE_SERVER_KEY_EXCHANGE)
|
|
return tls_process_server_key_exchange(conn, ct, in_data,
|
|
in_len);
|
|
if (type == TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST)
|
|
return tls_process_certificate_request(conn, ct, in_data,
|
|
in_len);
|
|
if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
|
|
return tls_process_server_hello_done(conn, ct, in_data,
|
|
in_len);
|
|
if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
|
|
"message %d (expected Certificate/"
|
|
"ServerKeyExchange/CertificateRequest/"
|
|
"ServerHelloDone)", type);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
"TLSv1: Received Certificate (certificate_list len %lu)",
|
|
(unsigned long) len);
|
|
|
|
/*
|
|
* opaque ASN.1Cert<2^24-1>;
|
|
*
|
|
* struct {
|
|
* ASN.1Cert certificate_list<1..2^24-1>;
|
|
* } Certificate;
|
|
*/
|
|
|
|
end = pos + len;
|
|
|
|
if (end - pos < 3) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate "
|
|
"(left=%lu)", (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
list_len = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
|
|
if ((size_t) (end - pos) != list_len) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate_list "
|
|
"length (len=%lu left=%lu)",
|
|
(unsigned long) list_len,
|
|
(unsigned long) (end - pos));
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
idx = 0;
|
|
while (pos < end) {
|
|
if (end - pos < 3) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
|
|
"certificate_list");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECODE_ERROR);
|
|
x509_certificate_chain_free(chain);
|
|
return -1;
|
|
}
|
|
|
|
cert_len = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
|
|
if ((size_t) (end - pos) < cert_len) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate "
|
|
"length (len=%lu left=%lu)",
|
|
(unsigned long) cert_len,
|
|
(unsigned long) (end - pos));
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECODE_ERROR);
|
|
x509_certificate_chain_free(chain);
|
|
return -1;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Certificate %lu (len %lu)",
|
|
(unsigned long) idx, (unsigned long) cert_len);
|
|
|
|
if (idx == 0) {
|
|
crypto_public_key_free(conn->server_rsa_key);
|
|
if (tls_parse_cert(pos, cert_len,
|
|
&conn->server_rsa_key)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
|
|
"the certificate");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_BAD_CERTIFICATE);
|
|
x509_certificate_chain_free(chain);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
cert = x509_certificate_parse(pos, cert_len);
|
|
if (cert == NULL) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
|
|
"the certificate");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_BAD_CERTIFICATE);
|
|
x509_certificate_chain_free(chain);
|
|
return -1;
|
|
}
|
|
|
|
if (last == NULL)
|
|
chain = cert;
|
|
else
|
|
last->next = cert;
|
|
last = cert;
|
|
|
|
idx++;
|
|
pos += cert_len;
|
|
}
|
|
|
|
if (x509_certificate_chain_validate(conn->trusted_certs, chain,
|
|
&reason) < 0) {
|
|
int tls_reason;
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
|
|
"validation failed (reason=%d)", reason);
|
|
switch (reason) {
|
|
case X509_VALIDATE_BAD_CERTIFICATE:
|
|
tls_reason = TLS_ALERT_BAD_CERTIFICATE;
|
|
break;
|
|
case X509_VALIDATE_UNSUPPORTED_CERTIFICATE:
|
|
tls_reason = TLS_ALERT_UNSUPPORTED_CERTIFICATE;
|
|
break;
|
|
case X509_VALIDATE_CERTIFICATE_REVOKED:
|
|
tls_reason = TLS_ALERT_CERTIFICATE_REVOKED;
|
|
break;
|
|
case X509_VALIDATE_CERTIFICATE_EXPIRED:
|
|
tls_reason = TLS_ALERT_CERTIFICATE_EXPIRED;
|
|
break;
|
|
case X509_VALIDATE_CERTIFICATE_UNKNOWN:
|
|
tls_reason = TLS_ALERT_CERTIFICATE_UNKNOWN;
|
|
break;
|
|
case X509_VALIDATE_UNKNOWN_CA:
|
|
tls_reason = TLS_ALERT_UNKNOWN_CA;
|
|
break;
|
|
default:
|
|
tls_reason = TLS_ALERT_BAD_CERTIFICATE;
|
|
break;
|
|
}
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, tls_reason);
|
|
x509_certificate_chain_free(chain);
|
|
return -1;
|
|
}
|
|
|
|
x509_certificate_chain_free(chain);
|
|
|
|
*in_len = end - in_data;
|
|
|
|
conn->state = SERVER_KEY_EXCHANGE;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void tlsv1_client_free_dh(struct tlsv1_client *conn)
|
|
{
|
|
os_free(conn->dh_p);
|
|
os_free(conn->dh_g);
|
|
os_free(conn->dh_ys);
|
|
conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
|
|
}
|
|
|
|
|
|
static int tlsv1_process_diffie_hellman(struct tlsv1_client *conn,
|
|
const u8 *buf, size_t len)
|
|
{
|
|
const u8 *pos, *end;
|
|
|
|
tlsv1_client_free_dh(conn);
|
|
|
|
pos = buf;
|
|
end = buf + len;
|
|
|
|
if (end - pos < 3)
|
|
goto fail;
|
|
conn->dh_p_len = WPA_GET_BE16(pos);
|
|
pos += 2;
|
|
if (conn->dh_p_len == 0 || end - pos < (int) conn->dh_p_len)
|
|
goto fail;
|
|
conn->dh_p = os_malloc(conn->dh_p_len);
|
|
if (conn->dh_p == NULL)
|
|
goto fail;
|
|
os_memcpy(conn->dh_p, pos, conn->dh_p_len);
|
|
pos += conn->dh_p_len;
|
|
wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)",
|
|
conn->dh_p, conn->dh_p_len);
|
|
|
|
if (end - pos < 3)
|
|
goto fail;
|
|
conn->dh_g_len = WPA_GET_BE16(pos);
|
|
pos += 2;
|
|
if (conn->dh_g_len == 0 || end - pos < (int) conn->dh_g_len)
|
|
goto fail;
|
|
conn->dh_g = os_malloc(conn->dh_g_len);
|
|
if (conn->dh_g == NULL)
|
|
goto fail;
|
|
os_memcpy(conn->dh_g, pos, conn->dh_g_len);
|
|
pos += conn->dh_g_len;
|
|
wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)",
|
|
conn->dh_g, conn->dh_g_len);
|
|
if (conn->dh_g_len == 1 && conn->dh_g[0] < 2)
|
|
goto fail;
|
|
|
|
if (end - pos < 3)
|
|
goto fail;
|
|
conn->dh_ys_len = WPA_GET_BE16(pos);
|
|
pos += 2;
|
|
if (conn->dh_ys_len == 0 || end - pos < (int) conn->dh_ys_len)
|
|
goto fail;
|
|
conn->dh_ys = os_malloc(conn->dh_ys_len);
|
|
if (conn->dh_ys == NULL)
|
|
goto fail;
|
|
os_memcpy(conn->dh_ys, pos, conn->dh_ys_len);
|
|
pos += conn->dh_ys_len;
|
|
wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)",
|
|
conn->dh_ys, conn->dh_ys_len);
|
|
|
|
return 0;
|
|
|
|
fail:
|
|
tlsv1_client_free_dh(conn);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len)
|
|
{
|
|
const u8 *pos, *end;
|
|
size_t left, len;
|
|
u8 type;
|
|
const struct tls_cipher_suite *suite;
|
|
|
|
if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
|
|
"received content type 0x%x", ct);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
pos = in_data;
|
|
left = *in_len;
|
|
|
|
if (left < 4) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short ServerKeyExchange "
|
|
"(Left=%lu)", (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
type = *pos++;
|
|
len = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
left -= 4;
|
|
|
|
if (len > left) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerKeyExchange "
|
|
"length (len=%lu != left=%lu)",
|
|
(unsigned long) len, (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
end = pos + len;
|
|
|
|
if (type == TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST)
|
|
return tls_process_certificate_request(conn, ct, in_data,
|
|
in_len);
|
|
if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
|
|
return tls_process_server_hello_done(conn, ct, in_data,
|
|
in_len);
|
|
if (type != TLS_HANDSHAKE_TYPE_SERVER_KEY_EXCHANGE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
|
|
"message %d (expected ServerKeyExchange/"
|
|
"CertificateRequest/ServerHelloDone)", type);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received ServerKeyExchange");
|
|
|
|
if (!tls_server_key_exchange_allowed(conn)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: ServerKeyExchange not allowed "
|
|
"with the selected cipher suite");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len);
|
|
suite = tls_get_cipher_suite(conn->rl.cipher_suite);
|
|
if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
|
|
if (tlsv1_process_diffie_hellman(conn, pos, len) < 0) {
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
} else {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: UnexpectedServerKeyExchange");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
*in_len = end - in_data;
|
|
|
|
conn->state = SERVER_CERTIFICATE_REQUEST;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len)
|
|
{
|
|
const u8 *pos, *end;
|
|
size_t left, len;
|
|
u8 type;
|
|
|
|
if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
|
|
"received content type 0x%x", ct);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
pos = in_data;
|
|
left = *in_len;
|
|
|
|
if (left < 4) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short CertificateRequest "
|
|
"(left=%lu)", (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
type = *pos++;
|
|
len = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
left -= 4;
|
|
|
|
if (len > left) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in CertificateRequest "
|
|
"length (len=%lu != left=%lu)",
|
|
(unsigned long) len, (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
end = pos + len;
|
|
|
|
if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
|
|
return tls_process_server_hello_done(conn, ct, in_data,
|
|
in_len);
|
|
if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
|
|
"message %d (expected CertificateRequest/"
|
|
"ServerHelloDone)", type);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received CertificateRequest");
|
|
|
|
conn->certificate_requested = 1;
|
|
|
|
*in_len = end - in_data;
|
|
|
|
conn->state = SERVER_HELLO_DONE;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len)
|
|
{
|
|
const u8 *pos, *end;
|
|
size_t left, len;
|
|
u8 type;
|
|
|
|
if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
|
|
"received content type 0x%x", ct);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
pos = in_data;
|
|
left = *in_len;
|
|
|
|
if (left < 4) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short ServerHelloDone "
|
|
"(left=%lu)", (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
type = *pos++;
|
|
len = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
left -= 4;
|
|
|
|
if (len > left) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerHelloDone "
|
|
"length (len=%lu != left=%lu)",
|
|
(unsigned long) len, (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
end = pos + len;
|
|
|
|
if (type != TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
|
|
"message %d (expected ServerHelloDone)", type);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHelloDone");
|
|
|
|
*in_len = end - in_data;
|
|
|
|
conn->state = CLIENT_KEY_EXCHANGE;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_process_server_change_cipher_spec(struct tlsv1_client *conn,
|
|
u8 ct, const u8 *in_data,
|
|
size_t *in_len)
|
|
{
|
|
const u8 *pos;
|
|
size_t left;
|
|
|
|
if (ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
|
|
"received content type 0x%x", ct);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
pos = in_data;
|
|
left = *in_len;
|
|
|
|
if (left < 1) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short ChangeCipherSpec");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
if (*pos != TLS_CHANGE_CIPHER_SPEC) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
|
|
"received data 0x%x", *pos);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received ChangeCipherSpec");
|
|
if (tlsv1_record_change_read_cipher(&conn->rl) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher "
|
|
"for record layer");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
*in_len = pos + 1 - in_data;
|
|
|
|
conn->state = SERVER_FINISHED;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_process_server_finished(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *in_data, size_t *in_len)
|
|
{
|
|
const u8 *pos, *end;
|
|
size_t left, len, hlen;
|
|
u8 verify_data[TLS_VERIFY_DATA_LEN];
|
|
u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
|
|
|
|
if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected Finished; "
|
|
"received content type 0x%x", ct);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
pos = in_data;
|
|
left = *in_len;
|
|
|
|
if (left < 4) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short record (left=%lu) for "
|
|
"Finished",
|
|
(unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
if (pos[0] != TLS_HANDSHAKE_TYPE_FINISHED) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Expected Finished; received "
|
|
"type 0x%x", pos[0]);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
len = WPA_GET_BE24(pos + 1);
|
|
|
|
pos += 4;
|
|
left -= 4;
|
|
|
|
if (len > left) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Too short buffer for Finished "
|
|
"(len=%lu > left=%lu)",
|
|
(unsigned long) len, (unsigned long) left);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
end = pos + len;
|
|
if (len != TLS_VERIFY_DATA_LEN) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
|
|
"in Finished: %lu (expected %d)",
|
|
(unsigned long) len, TLS_VERIFY_DATA_LEN);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
|
|
pos, TLS_VERIFY_DATA_LEN);
|
|
|
|
hlen = MD5_MAC_LEN;
|
|
if (conn->verify_md5_server == NULL ||
|
|
crypto_hash_finish(conn->verify_md5_server, hash, &hlen) < 0) {
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
conn->verify_md5_server = NULL;
|
|
crypto_hash_finish(conn->verify_sha1_server, NULL, NULL);
|
|
conn->verify_sha1_server = NULL;
|
|
return -1;
|
|
}
|
|
conn->verify_md5_server = NULL;
|
|
hlen = SHA1_MAC_LEN;
|
|
if (conn->verify_sha1_server == NULL ||
|
|
crypto_hash_finish(conn->verify_sha1_server, hash + MD5_MAC_LEN,
|
|
&hlen) < 0) {
|
|
conn->verify_sha1_server = NULL;
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
conn->verify_sha1_server = NULL;
|
|
|
|
if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
|
|
"server finished", hash, MD5_MAC_LEN + SHA1_MAC_LEN,
|
|
verify_data, TLS_VERIFY_DATA_LEN)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECRYPT_ERROR);
|
|
return -1;
|
|
}
|
|
wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
|
|
verify_data, TLS_VERIFY_DATA_LEN);
|
|
|
|
if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
|
|
return -1;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Received Finished");
|
|
|
|
*in_len = end - in_data;
|
|
|
|
conn->state = (conn->session_resumed || conn->ticket) ?
|
|
CHANGE_CIPHER_SPEC : ACK_FINISHED;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_derive_pre_master_secret(u8 *pre_master_secret)
|
|
{
|
|
WPA_PUT_BE16(pre_master_secret, TLS_VERSION);
|
|
if (os_get_random(pre_master_secret + 2,
|
|
TLS_PRE_MASTER_SECRET_LEN - 2))
|
|
return -1;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_derive_keys(struct tlsv1_client *conn,
|
|
const u8 *pre_master_secret,
|
|
size_t pre_master_secret_len)
|
|
{
|
|
u8 seed[2 * TLS_RANDOM_LEN];
|
|
u8 key_block[TLS_MAX_KEY_BLOCK_LEN];
|
|
u8 *pos;
|
|
size_t key_block_len;
|
|
|
|
if (pre_master_secret) {
|
|
wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret",
|
|
pre_master_secret, pre_master_secret_len);
|
|
os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
|
|
os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
|
|
TLS_RANDOM_LEN);
|
|
if (tls_prf(pre_master_secret, pre_master_secret_len,
|
|
"master secret", seed, 2 * TLS_RANDOM_LEN,
|
|
conn->master_secret, TLS_MASTER_SECRET_LEN)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
|
|
"master_secret");
|
|
return -1;
|
|
}
|
|
wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
|
|
conn->master_secret, TLS_MASTER_SECRET_LEN);
|
|
}
|
|
|
|
os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
|
|
os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
|
|
key_block_len = 2 * (conn->rl.hash_size + conn->rl.key_material_len +
|
|
conn->rl.iv_size);
|
|
if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
|
|
"key expansion", seed, 2 * TLS_RANDOM_LEN,
|
|
key_block, key_block_len)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
|
|
return -1;
|
|
}
|
|
wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
|
|
key_block, key_block_len);
|
|
|
|
pos = key_block;
|
|
|
|
/* client_write_MAC_secret */
|
|
os_memcpy(conn->rl.write_mac_secret, pos, conn->rl.hash_size);
|
|
pos += conn->rl.hash_size;
|
|
/* server_write_MAC_secret */
|
|
os_memcpy(conn->rl.read_mac_secret, pos, conn->rl.hash_size);
|
|
pos += conn->rl.hash_size;
|
|
|
|
/* client_write_key */
|
|
os_memcpy(conn->rl.write_key, pos, conn->rl.key_material_len);
|
|
pos += conn->rl.key_material_len;
|
|
/* server_write_key */
|
|
os_memcpy(conn->rl.read_key, pos, conn->rl.key_material_len);
|
|
pos += conn->rl.key_material_len;
|
|
|
|
/* client_write_IV */
|
|
os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size);
|
|
pos += conn->rl.iv_size;
|
|
/* server_write_IV */
|
|
os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size);
|
|
pos += conn->rl.iv_size;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_write_client_certificate(struct tlsv1_client *conn,
|
|
u8 **msgpos, u8 *end)
|
|
{
|
|
u8 *pos, *rhdr, *hs_start, *hs_length, *cert_start;
|
|
size_t rlen;
|
|
struct x509_certificate *cert;
|
|
|
|
pos = *msgpos;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
|
|
rhdr = pos;
|
|
pos += TLS_RECORD_HEADER_LEN;
|
|
|
|
/* opaque fragment[TLSPlaintext.length] */
|
|
|
|
/* Handshake */
|
|
hs_start = pos;
|
|
/* HandshakeType msg_type */
|
|
*pos++ = TLS_HANDSHAKE_TYPE_CERTIFICATE;
|
|
/* uint24 length (to be filled) */
|
|
hs_length = pos;
|
|
pos += 3;
|
|
/* body - Certificate */
|
|
/* uint24 length (to be filled) */
|
|
cert_start = pos;
|
|
pos += 3;
|
|
cert = conn->client_cert;
|
|
while (cert) {
|
|
if (pos + 3 + cert->cert_len > end) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
|
|
"for Certificate (cert_len=%lu left=%lu)",
|
|
(unsigned long) cert->cert_len,
|
|
(unsigned long) (end - pos));
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
WPA_PUT_BE24(pos, cert->cert_len);
|
|
pos += 3;
|
|
os_memcpy(pos, cert->cert_start, cert->cert_len);
|
|
pos += cert->cert_len;
|
|
|
|
if (x509_certificate_self_signed(cert))
|
|
break;
|
|
cert = x509_certificate_get_subject(conn->trusted_certs,
|
|
&cert->issuer);
|
|
}
|
|
if (cert == conn->client_cert || cert == NULL) {
|
|
/*
|
|
* Client was not configured with all the needed certificates
|
|
* to form a full certificate chain. The server may fail to
|
|
* validate the chain unless it is configured with all the
|
|
* missing CA certificates.
|
|
*/
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
|
|
"not configured - validation may fail");
|
|
}
|
|
WPA_PUT_BE24(cert_start, pos - cert_start - 3);
|
|
|
|
WPA_PUT_BE24(hs_length, pos - hs_length - 3);
|
|
|
|
if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE,
|
|
rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
pos = rhdr + rlen;
|
|
|
|
tls_verify_hash_add(conn, hs_start, pos - hs_start);
|
|
|
|
*msgpos = pos;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tlsv1_key_x_anon_dh(struct tlsv1_client *conn, u8 **pos, u8 *end)
|
|
{
|
|
#ifdef EAP_FAST
|
|
/* ClientDiffieHellmanPublic */
|
|
u8 *csecret, *csecret_start, *dh_yc, *shared;
|
|
size_t csecret_len, dh_yc_len, shared_len;
|
|
|
|
csecret_len = conn->dh_p_len;
|
|
csecret = os_malloc(csecret_len);
|
|
if (csecret == NULL) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
|
|
"memory for Yc (Diffie-Hellman)");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
if (os_get_random(csecret, csecret_len)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random "
|
|
"data for Diffie-Hellman");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
os_free(csecret);
|
|
return -1;
|
|
}
|
|
|
|
if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
|
|
csecret[0] = 0; /* make sure Yc < p */
|
|
|
|
csecret_start = csecret;
|
|
while (csecret_len > 1 && *csecret_start == 0) {
|
|
csecret_start++;
|
|
csecret_len--;
|
|
}
|
|
wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value",
|
|
csecret_start, csecret_len);
|
|
|
|
/* Yc = g^csecret mod p */
|
|
dh_yc_len = conn->dh_p_len;
|
|
dh_yc = os_malloc(dh_yc_len);
|
|
if (dh_yc == NULL) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
|
|
"memory for Diffie-Hellman");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
os_free(csecret);
|
|
return -1;
|
|
}
|
|
crypto_mod_exp(conn->dh_g, conn->dh_g_len,
|
|
csecret_start, csecret_len,
|
|
conn->dh_p, conn->dh_p_len,
|
|
dh_yc, &dh_yc_len);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)",
|
|
dh_yc, dh_yc_len);
|
|
|
|
WPA_PUT_BE16(*pos, dh_yc_len);
|
|
*pos += 2;
|
|
if (*pos + dh_yc_len > end) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Not enough room in the "
|
|
"message buffer for Yc");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
os_free(csecret);
|
|
os_free(dh_yc);
|
|
return -1;
|
|
}
|
|
os_memcpy(*pos, dh_yc, dh_yc_len);
|
|
*pos += dh_yc_len;
|
|
os_free(dh_yc);
|
|
|
|
shared_len = conn->dh_p_len;
|
|
shared = os_malloc(shared_len);
|
|
if (shared == NULL) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Could not allocate memory for "
|
|
"DH");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
os_free(csecret);
|
|
return -1;
|
|
}
|
|
|
|
/* shared = Ys^csecret mod p */
|
|
crypto_mod_exp(conn->dh_ys, conn->dh_ys_len,
|
|
csecret_start, csecret_len,
|
|
conn->dh_p, conn->dh_p_len,
|
|
shared, &shared_len);
|
|
wpa_hexdump_key(MSG_DEBUG, "TLSv1: Shared secret from DH key exchange",
|
|
shared, shared_len);
|
|
|
|
os_memset(csecret_start, 0, csecret_len);
|
|
os_free(csecret);
|
|
if (tls_derive_keys(conn, shared, shared_len)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
os_free(shared);
|
|
return -1;
|
|
}
|
|
os_memset(shared, 0, shared_len);
|
|
os_free(shared);
|
|
tlsv1_client_free_dh(conn);
|
|
return 0;
|
|
#else /* EAP_FAST */
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
#endif /* EAP_FAST */
|
|
}
|
|
|
|
|
|
static int tlsv1_key_x_rsa(struct tlsv1_client *conn, u8 **pos, u8 *end)
|
|
{
|
|
u8 pre_master_secret[TLS_PRE_MASTER_SECRET_LEN];
|
|
size_t clen;
|
|
int res;
|
|
|
|
if (tls_derive_pre_master_secret(pre_master_secret) < 0 ||
|
|
tls_derive_keys(conn, pre_master_secret,
|
|
TLS_PRE_MASTER_SECRET_LEN)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
/* EncryptedPreMasterSecret */
|
|
if (conn->server_rsa_key == NULL) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: No server RSA key to "
|
|
"use for encrypting pre-master secret");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
/* RSA encrypted value is encoded with PKCS #1 v1.5 block type 2. */
|
|
*pos += 2;
|
|
clen = end - *pos;
|
|
res = crypto_public_key_encrypt_pkcs1_v15(
|
|
conn->server_rsa_key,
|
|
pre_master_secret, TLS_PRE_MASTER_SECRET_LEN,
|
|
*pos, &clen);
|
|
os_memset(pre_master_secret, 0, TLS_PRE_MASTER_SECRET_LEN);
|
|
if (res < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: RSA encryption failed");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
WPA_PUT_BE16(*pos - 2, clen);
|
|
wpa_hexdump(MSG_MSGDUMP, "TLSv1: Encrypted pre_master_secret",
|
|
*pos, clen);
|
|
*pos += clen;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_write_client_key_exchange(struct tlsv1_client *conn,
|
|
u8 **msgpos, u8 *end)
|
|
{
|
|
u8 *pos, *rhdr, *hs_start, *hs_length;
|
|
size_t rlen;
|
|
tls_key_exchange keyx;
|
|
const struct tls_cipher_suite *suite;
|
|
|
|
suite = tls_get_cipher_suite(conn->rl.cipher_suite);
|
|
if (suite == NULL)
|
|
keyx = TLS_KEY_X_NULL;
|
|
else
|
|
keyx = suite->key_exchange;
|
|
|
|
pos = *msgpos;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Send ClientKeyExchange");
|
|
|
|
rhdr = pos;
|
|
pos += TLS_RECORD_HEADER_LEN;
|
|
|
|
/* opaque fragment[TLSPlaintext.length] */
|
|
|
|
/* Handshake */
|
|
hs_start = pos;
|
|
/* HandshakeType msg_type */
|
|
*pos++ = TLS_HANDSHAKE_TYPE_CLIENT_KEY_EXCHANGE;
|
|
/* uint24 length (to be filled) */
|
|
hs_length = pos;
|
|
pos += 3;
|
|
/* body - ClientKeyExchange */
|
|
if (keyx == TLS_KEY_X_DH_anon) {
|
|
if (tlsv1_key_x_anon_dh(conn, &pos, end) < 0)
|
|
return -1;
|
|
} else {
|
|
if (tlsv1_key_x_rsa(conn, &pos, end) < 0)
|
|
return -1;
|
|
}
|
|
|
|
WPA_PUT_BE24(hs_length, pos - hs_length - 3);
|
|
|
|
if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE,
|
|
rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
pos = rhdr + rlen;
|
|
tls_verify_hash_add(conn, hs_start, pos - hs_start);
|
|
|
|
*msgpos = pos;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_write_client_certificate_verify(struct tlsv1_client *conn,
|
|
u8 **msgpos, u8 *end)
|
|
{
|
|
u8 *pos, *rhdr, *hs_start, *hs_length, *signed_start;
|
|
size_t rlen, hlen, clen;
|
|
u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos;
|
|
enum { SIGN_ALG_RSA, SIGN_ALG_DSA } alg = SIGN_ALG_RSA;
|
|
|
|
pos = *msgpos;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Send CertificateVerify");
|
|
rhdr = pos;
|
|
pos += TLS_RECORD_HEADER_LEN;
|
|
|
|
/* Handshake */
|
|
hs_start = pos;
|
|
/* HandshakeType msg_type */
|
|
*pos++ = TLS_HANDSHAKE_TYPE_CERTIFICATE_VERIFY;
|
|
/* uint24 length (to be filled) */
|
|
hs_length = pos;
|
|
pos += 3;
|
|
|
|
/*
|
|
* RFC 2246: 7.4.3 and 7.4.8:
|
|
* Signature signature
|
|
*
|
|
* RSA:
|
|
* digitally-signed struct {
|
|
* opaque md5_hash[16];
|
|
* opaque sha_hash[20];
|
|
* };
|
|
*
|
|
* DSA:
|
|
* digitally-signed struct {
|
|
* opaque sha_hash[20];
|
|
* };
|
|
*
|
|
* The hash values are calculated over all handshake messages sent or
|
|
* received starting at ClientHello up to, but not including, this
|
|
* CertificateVerify message, including the type and length fields of
|
|
* the handshake messages.
|
|
*/
|
|
|
|
hpos = hash;
|
|
|
|
if (alg == SIGN_ALG_RSA) {
|
|
hlen = MD5_MAC_LEN;
|
|
if (conn->verify_md5_cert == NULL ||
|
|
crypto_hash_finish(conn->verify_md5_cert, hpos, &hlen) < 0)
|
|
{
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
conn->verify_md5_cert = NULL;
|
|
crypto_hash_finish(conn->verify_sha1_cert, NULL, NULL);
|
|
conn->verify_sha1_cert = NULL;
|
|
return -1;
|
|
}
|
|
hpos += MD5_MAC_LEN;
|
|
} else
|
|
crypto_hash_finish(conn->verify_md5_cert, NULL, NULL);
|
|
|
|
conn->verify_md5_cert = NULL;
|
|
hlen = SHA1_MAC_LEN;
|
|
if (conn->verify_sha1_cert == NULL ||
|
|
crypto_hash_finish(conn->verify_sha1_cert, hpos, &hlen) < 0) {
|
|
conn->verify_sha1_cert = NULL;
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
conn->verify_sha1_cert = NULL;
|
|
|
|
if (alg == SIGN_ALG_RSA)
|
|
hlen += MD5_MAC_LEN;
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
|
|
|
|
/*
|
|
* RFC 2246, 4.7:
|
|
* In digital signing, one-way hash functions are used as input for a
|
|
* signing algorithm. A digitally-signed element is encoded as an
|
|
* opaque vector <0..2^16-1>, where the length is specified by the
|
|
* signing algorithm and key.
|
|
*
|
|
* In RSA signing, a 36-byte structure of two hashes (one SHA and one
|
|
* MD5) is signed (encrypted with the private key). It is encoded with
|
|
* PKCS #1 block type 0 or type 1 as described in [PKCS1].
|
|
*/
|
|
signed_start = pos; /* length to be filled */
|
|
pos += 2;
|
|
clen = end - pos;
|
|
if (crypto_private_key_sign_pkcs1(conn->client_key, hash, hlen,
|
|
pos, &clen) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to sign hash (PKCS #1)");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
WPA_PUT_BE16(signed_start, clen);
|
|
|
|
pos += clen;
|
|
|
|
WPA_PUT_BE24(hs_length, pos - hs_length - 3);
|
|
|
|
if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE,
|
|
rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
pos = rhdr + rlen;
|
|
|
|
tls_verify_hash_add(conn, hs_start, pos - hs_start);
|
|
|
|
*msgpos = pos;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_write_client_change_cipher_spec(struct tlsv1_client *conn,
|
|
u8 **msgpos, u8 *end)
|
|
{
|
|
u8 *pos, *rhdr;
|
|
size_t rlen;
|
|
|
|
pos = *msgpos;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Send ChangeCipherSpec");
|
|
rhdr = pos;
|
|
pos += TLS_RECORD_HEADER_LEN;
|
|
*pos = TLS_CHANGE_CIPHER_SPEC;
|
|
if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC,
|
|
rhdr, end - rhdr, 1, &rlen) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
if (tlsv1_record_change_write_cipher(&conn->rl) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to set write cipher for "
|
|
"record layer");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
*msgpos = rhdr + rlen;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tls_write_client_finished(struct tlsv1_client *conn,
|
|
u8 **msgpos, u8 *end)
|
|
{
|
|
u8 *pos, *rhdr, *hs_start, *hs_length;
|
|
size_t rlen, hlen;
|
|
u8 verify_data[TLS_VERIFY_DATA_LEN];
|
|
u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
|
|
|
|
pos = *msgpos;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Send Finished");
|
|
|
|
/* Encrypted Handshake Message: Finished */
|
|
|
|
hlen = MD5_MAC_LEN;
|
|
if (conn->verify_md5_client == NULL ||
|
|
crypto_hash_finish(conn->verify_md5_client, hash, &hlen) < 0) {
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
conn->verify_md5_client = NULL;
|
|
crypto_hash_finish(conn->verify_sha1_client, NULL, NULL);
|
|
conn->verify_sha1_client = NULL;
|
|
return -1;
|
|
}
|
|
conn->verify_md5_client = NULL;
|
|
hlen = SHA1_MAC_LEN;
|
|
if (conn->verify_sha1_client == NULL ||
|
|
crypto_hash_finish(conn->verify_sha1_client, hash + MD5_MAC_LEN,
|
|
&hlen) < 0) {
|
|
conn->verify_sha1_client = NULL;
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
conn->verify_sha1_client = NULL;
|
|
|
|
if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
|
|
"client finished", hash, MD5_MAC_LEN + SHA1_MAC_LEN,
|
|
verify_data, TLS_VERIFY_DATA_LEN)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate verify_data");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
|
|
verify_data, TLS_VERIFY_DATA_LEN);
|
|
|
|
rhdr = pos;
|
|
pos += TLS_RECORD_HEADER_LEN;
|
|
/* Handshake */
|
|
hs_start = pos;
|
|
/* HandshakeType msg_type */
|
|
*pos++ = TLS_HANDSHAKE_TYPE_FINISHED;
|
|
/* uint24 length (to be filled) */
|
|
hs_length = pos;
|
|
pos += 3;
|
|
os_memcpy(pos, verify_data, TLS_VERIFY_DATA_LEN);
|
|
pos += TLS_VERIFY_DATA_LEN;
|
|
WPA_PUT_BE24(hs_length, pos - hs_length - 3);
|
|
tls_verify_hash_add(conn, hs_start, pos - hs_start);
|
|
|
|
if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_HANDSHAKE,
|
|
rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
pos = rhdr + rlen;
|
|
|
|
*msgpos = pos;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static size_t tls_client_cert_chain_der_len(struct tlsv1_client *conn)
|
|
{
|
|
size_t len = 0;
|
|
struct x509_certificate *cert;
|
|
|
|
cert = conn->client_cert;
|
|
while (cert) {
|
|
len += 3 + cert->cert_len;
|
|
if (x509_certificate_self_signed(cert))
|
|
break;
|
|
cert = x509_certificate_get_subject(conn->trusted_certs,
|
|
&cert->issuer);
|
|
}
|
|
|
|
return len;
|
|
}
|
|
|
|
|
|
static u8 * tls_send_client_key_exchange(struct tlsv1_client *conn,
|
|
size_t *out_len)
|
|
{
|
|
u8 *msg, *end, *pos;
|
|
size_t msglen;
|
|
|
|
*out_len = 0;
|
|
|
|
msglen = 1000;
|
|
if (conn->certificate_requested)
|
|
msglen += tls_client_cert_chain_der_len(conn);
|
|
|
|
msg = os_malloc(msglen);
|
|
if (msg == NULL)
|
|
return NULL;
|
|
|
|
pos = msg;
|
|
end = msg + msglen;
|
|
|
|
if (conn->certificate_requested) {
|
|
if (tls_write_client_certificate(conn, &pos, end) < 0) {
|
|
os_free(msg);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
if (tls_write_client_key_exchange(conn, &pos, end) < 0 ||
|
|
(conn->certificate_requested && conn->client_key &&
|
|
tls_write_client_certificate_verify(conn, &pos, end) < 0) ||
|
|
tls_write_client_change_cipher_spec(conn, &pos, end) < 0 ||
|
|
tls_write_client_finished(conn, &pos, end) < 0) {
|
|
os_free(msg);
|
|
return NULL;
|
|
}
|
|
|
|
*out_len = pos - msg;
|
|
|
|
conn->state = SERVER_CHANGE_CIPHER_SPEC;
|
|
|
|
return msg;
|
|
}
|
|
|
|
|
|
static u8 * tls_send_change_cipher_spec(struct tlsv1_client *conn,
|
|
size_t *out_len)
|
|
{
|
|
u8 *msg, *end, *pos;
|
|
|
|
*out_len = 0;
|
|
|
|
msg = os_malloc(1000);
|
|
if (msg == NULL)
|
|
return NULL;
|
|
|
|
pos = msg;
|
|
end = msg + 1000;
|
|
|
|
if (tls_write_client_change_cipher_spec(conn, &pos, end) < 0 ||
|
|
tls_write_client_finished(conn, &pos, end) < 0) {
|
|
os_free(msg);
|
|
return NULL;
|
|
}
|
|
|
|
*out_len = pos - msg;
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Session resumption completed "
|
|
"successfully");
|
|
conn->state = ESTABLISHED;
|
|
|
|
return msg;
|
|
}
|
|
|
|
|
|
static int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
|
|
const u8 *buf, size_t *len)
|
|
{
|
|
if (ct == TLS_CONTENT_TYPE_HANDSHAKE && *len >= 4 &&
|
|
buf[0] == TLS_HANDSHAKE_TYPE_HELLO_REQUEST) {
|
|
size_t hr_len = WPA_GET_BE24(buf + 1);
|
|
if (hr_len > *len - 4) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: HelloRequest underflow");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_DECODE_ERROR);
|
|
return -1;
|
|
}
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Ignored HelloRequest");
|
|
*len = 4 + hr_len;
|
|
return 0;
|
|
}
|
|
|
|
switch (conn->state) {
|
|
case SERVER_HELLO:
|
|
if (tls_process_server_hello(conn, ct, buf, len))
|
|
return -1;
|
|
break;
|
|
case SERVER_CERTIFICATE:
|
|
if (tls_process_certificate(conn, ct, buf, len))
|
|
return -1;
|
|
break;
|
|
case SERVER_KEY_EXCHANGE:
|
|
if (tls_process_server_key_exchange(conn, ct, buf, len))
|
|
return -1;
|
|
break;
|
|
case SERVER_CERTIFICATE_REQUEST:
|
|
if (tls_process_certificate_request(conn, ct, buf, len))
|
|
return -1;
|
|
break;
|
|
case SERVER_HELLO_DONE:
|
|
if (tls_process_server_hello_done(conn, ct, buf, len))
|
|
return -1;
|
|
break;
|
|
case SERVER_CHANGE_CIPHER_SPEC:
|
|
if (tls_process_server_change_cipher_spec(conn, ct, buf, len))
|
|
return -1;
|
|
break;
|
|
case SERVER_FINISHED:
|
|
if (tls_process_server_finished(conn, ct, buf, len))
|
|
return -1;
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected state %d "
|
|
"while processing received message",
|
|
conn->state);
|
|
return -1;
|
|
}
|
|
|
|
if (ct == TLS_CONTENT_TYPE_HANDSHAKE)
|
|
tls_verify_hash_add(conn, buf, *len);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_handshake - Process TLS handshake
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @in_data: Input data from TLS peer
|
|
* @in_len: Input data length
|
|
* @out_len: Length of the output buffer.
|
|
* Returns: Pointer to output data, %NULL on failure
|
|
*/
|
|
u8 * tlsv1_client_handshake(struct tlsv1_client *conn,
|
|
const u8 *in_data, size_t in_len,
|
|
size_t *out_len)
|
|
{
|
|
const u8 *pos, *end;
|
|
u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct;
|
|
size_t in_msg_len;
|
|
|
|
if (conn->state == CLIENT_HELLO) {
|
|
if (in_len)
|
|
return NULL;
|
|
return tls_send_client_hello(conn, out_len);
|
|
}
|
|
|
|
if (in_data == NULL || in_len == 0)
|
|
return NULL;
|
|
|
|
pos = in_data;
|
|
end = in_data + in_len;
|
|
in_msg = os_malloc(in_len);
|
|
if (in_msg == NULL)
|
|
return NULL;
|
|
|
|
/* Each received packet may include multiple records */
|
|
while (pos < end) {
|
|
in_msg_len = in_len;
|
|
if (tlsv1_record_receive(&conn->rl, pos, end - pos,
|
|
in_msg, &in_msg_len, &alert)) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
|
|
"record failed");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
|
|
goto failed;
|
|
}
|
|
ct = pos[0];
|
|
|
|
in_pos = in_msg;
|
|
in_end = in_msg + in_msg_len;
|
|
|
|
/* Each received record may include multiple messages of the
|
|
* same ContentType. */
|
|
while (in_pos < in_end) {
|
|
in_msg_len = in_end - in_pos;
|
|
if (tlsv1_client_process_handshake(conn, ct, in_pos,
|
|
&in_msg_len) < 0)
|
|
goto failed;
|
|
in_pos += in_msg_len;
|
|
}
|
|
|
|
pos += TLS_RECORD_HEADER_LEN + WPA_GET_BE16(pos + 3);
|
|
}
|
|
|
|
os_free(in_msg);
|
|
in_msg = NULL;
|
|
|
|
switch (conn->state) {
|
|
case CLIENT_KEY_EXCHANGE:
|
|
msg = tls_send_client_key_exchange(conn, out_len);
|
|
break;
|
|
case CHANGE_CIPHER_SPEC:
|
|
msg = tls_send_change_cipher_spec(conn, out_len);
|
|
break;
|
|
case ACK_FINISHED:
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Handshake completed "
|
|
"successfully");
|
|
conn->state = ESTABLISHED;
|
|
/* Need to return something to get final TLS ACK. */
|
|
msg = os_malloc(1);
|
|
*out_len = 0;
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected state %d while "
|
|
"generating reply", conn->state);
|
|
break;
|
|
}
|
|
|
|
failed:
|
|
os_free(in_msg);
|
|
if (conn->alert_level) {
|
|
conn->state = FAILED;
|
|
os_free(msg);
|
|
msg = tls_send_alert(conn, conn->alert_level,
|
|
conn->alert_description, out_len);
|
|
}
|
|
|
|
return msg;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_encrypt - Encrypt data into TLS tunnel
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @in_data: Pointer to plaintext data to be encrypted
|
|
* @in_len: Input buffer length
|
|
* @out_data: Pointer to output buffer (encrypted TLS data)
|
|
* @out_len: Maximum out_data length
|
|
* Returns: Number of bytes written to out_data, -1 on failure
|
|
*
|
|
* This function is used after TLS handshake has been completed successfully to
|
|
* send data in the encrypted tunnel.
|
|
*/
|
|
int tlsv1_client_encrypt(struct tlsv1_client *conn,
|
|
const u8 *in_data, size_t in_len,
|
|
u8 *out_data, size_t out_len)
|
|
{
|
|
size_t rlen;
|
|
|
|
wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
|
|
in_data, in_len);
|
|
|
|
os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
|
|
|
|
if (tlsv1_record_send(&conn->rl, TLS_CONTENT_TYPE_APPLICATION_DATA,
|
|
out_data, out_len, in_len, &rlen) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
return rlen;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_decrypt - Decrypt data from TLS tunnel
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @in_data: Pointer to input buffer (encrypted TLS data)
|
|
* @in_len: Input buffer length
|
|
* @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
|
|
* @out_len: Maximum out_data length
|
|
* Returns: Number of bytes written to out_data, -1 on failure
|
|
*
|
|
* This function is used after TLS handshake has been completed successfully to
|
|
* receive data from the encrypted tunnel.
|
|
*/
|
|
int tlsv1_client_decrypt(struct tlsv1_client *conn,
|
|
const u8 *in_data, size_t in_len,
|
|
u8 *out_data, size_t out_len)
|
|
{
|
|
const u8 *in_end, *pos;
|
|
int res;
|
|
u8 alert, *out_end, *out_pos;
|
|
size_t olen;
|
|
|
|
pos = in_data;
|
|
in_end = in_data + in_len;
|
|
out_pos = out_data;
|
|
out_end = out_data + out_len;
|
|
|
|
while (pos < in_end) {
|
|
if (pos[0] != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type "
|
|
"0x%x", pos[0]);
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_UNEXPECTED_MESSAGE);
|
|
return -1;
|
|
}
|
|
|
|
olen = out_end - out_pos;
|
|
res = tlsv1_record_receive(&conn->rl, pos, in_end - pos,
|
|
out_pos, &olen, &alert);
|
|
if (res < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
|
|
"failed");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
|
|
return -1;
|
|
}
|
|
out_pos += olen;
|
|
if (out_pos > out_end) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough "
|
|
"for processing the received record");
|
|
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
|
TLS_ALERT_INTERNAL_ERROR);
|
|
return -1;
|
|
}
|
|
|
|
pos += TLS_RECORD_HEADER_LEN + WPA_GET_BE16(pos + 3);
|
|
}
|
|
|
|
return out_pos - out_data;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_global_init - Initialize TLSv1 client
|
|
* Returns: 0 on success, -1 on failure
|
|
*
|
|
* This function must be called before using any other TLSv1 client functions.
|
|
*/
|
|
int tlsv1_client_global_init(void)
|
|
{
|
|
return crypto_global_init();
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_global_deinit - Deinitialize TLSv1 client
|
|
*
|
|
* This function can be used to deinitialize the TLSv1 client that was
|
|
* initialized by calling tlsv1_client_global_init(). No TLSv1 client functions
|
|
* can be called after this before calling tlsv1_client_global_init() again.
|
|
*/
|
|
void tlsv1_client_global_deinit(void)
|
|
{
|
|
crypto_global_deinit();
|
|
}
|
|
|
|
|
|
static void tlsv1_client_free_verify_hashes(struct tlsv1_client *conn)
|
|
{
|
|
crypto_hash_finish(conn->verify_md5_client, NULL, NULL);
|
|
crypto_hash_finish(conn->verify_md5_server, NULL, NULL);
|
|
crypto_hash_finish(conn->verify_md5_cert, NULL, NULL);
|
|
crypto_hash_finish(conn->verify_sha1_client, NULL, NULL);
|
|
crypto_hash_finish(conn->verify_sha1_server, NULL, NULL);
|
|
crypto_hash_finish(conn->verify_sha1_cert, NULL, NULL);
|
|
conn->verify_md5_client = NULL;
|
|
conn->verify_md5_server = NULL;
|
|
conn->verify_md5_cert = NULL;
|
|
conn->verify_sha1_client = NULL;
|
|
conn->verify_sha1_server = NULL;
|
|
conn->verify_sha1_cert = NULL;
|
|
}
|
|
|
|
|
|
static int tlsv1_client_init_verify_hashes(struct tlsv1_client *conn)
|
|
{
|
|
conn->verify_md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL,
|
|
0);
|
|
conn->verify_md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL,
|
|
0);
|
|
conn->verify_md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
|
|
conn->verify_sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL,
|
|
0);
|
|
conn->verify_sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL,
|
|
0);
|
|
conn->verify_sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL,
|
|
0);
|
|
if (conn->verify_md5_client == NULL ||
|
|
conn->verify_md5_server == NULL ||
|
|
conn->verify_md5_cert == NULL ||
|
|
conn->verify_sha1_client == NULL ||
|
|
conn->verify_sha1_server == NULL ||
|
|
conn->verify_sha1_cert == NULL) {
|
|
tlsv1_client_free_verify_hashes(conn);
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_init - Initialize TLSv1 client connection
|
|
* Returns: Pointer to TLSv1 client connection data or %NULL on failure
|
|
*/
|
|
struct tlsv1_client * tlsv1_client_init(void)
|
|
{
|
|
struct tlsv1_client *conn;
|
|
size_t count;
|
|
u16 *suites;
|
|
|
|
conn = os_zalloc(sizeof(*conn));
|
|
if (conn == NULL)
|
|
return NULL;
|
|
|
|
conn->state = CLIENT_HELLO;
|
|
|
|
if (tlsv1_client_init_verify_hashes(conn) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
|
|
"hash");
|
|
os_free(conn);
|
|
return NULL;
|
|
}
|
|
|
|
count = 0;
|
|
suites = conn->cipher_suites;
|
|
#ifndef CONFIG_CRYPTO_INTERNAL
|
|
suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA;
|
|
#endif /* CONFIG_CRYPTO_INTERNAL */
|
|
suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA;
|
|
suites[count++] = TLS_RSA_WITH_3DES_EDE_CBC_SHA;
|
|
suites[count++] = TLS_RSA_WITH_RC4_128_SHA;
|
|
suites[count++] = TLS_RSA_WITH_RC4_128_MD5;
|
|
conn->num_cipher_suites = count;
|
|
|
|
return conn;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_deinit - Deinitialize TLSv1 client connection
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
*/
|
|
void tlsv1_client_deinit(struct tlsv1_client *conn)
|
|
{
|
|
crypto_public_key_free(conn->server_rsa_key);
|
|
tlsv1_record_set_cipher_suite(&conn->rl, TLS_NULL_WITH_NULL_NULL);
|
|
tlsv1_record_change_write_cipher(&conn->rl);
|
|
tlsv1_record_change_read_cipher(&conn->rl);
|
|
tlsv1_client_free_verify_hashes(conn);
|
|
os_free(conn->client_hello_ext);
|
|
tlsv1_client_free_dh(conn);
|
|
x509_certificate_chain_free(conn->trusted_certs);
|
|
x509_certificate_chain_free(conn->client_cert);
|
|
crypto_private_key_free(conn->client_key);
|
|
os_free(conn);
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_established - Check whether connection has been established
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* Returns: 1 if connection is established, 0 if not
|
|
*/
|
|
int tlsv1_client_established(struct tlsv1_client *conn)
|
|
{
|
|
return conn->state == ESTABLISHED;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_prf - Use TLS-PRF to derive keying material
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @label: Label (e.g., description of the key) for PRF
|
|
* @server_random_first: seed is 0 = client_random|server_random,
|
|
* 1 = server_random|client_random
|
|
* @out: Buffer for output data from TLS-PRF
|
|
* @out_len: Length of the output buffer
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_prf(struct tlsv1_client *conn, const char *label,
|
|
int server_random_first, u8 *out, size_t out_len)
|
|
{
|
|
u8 seed[2 * TLS_RANDOM_LEN];
|
|
|
|
if (conn->state != ESTABLISHED)
|
|
return -1;
|
|
|
|
if (server_random_first) {
|
|
os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
|
|
os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random,
|
|
TLS_RANDOM_LEN);
|
|
} else {
|
|
os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
|
|
os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
|
|
TLS_RANDOM_LEN);
|
|
}
|
|
|
|
return tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
|
|
label, seed, 2 * TLS_RANDOM_LEN, out, out_len);
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_get_cipher - Get current cipher name
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @buf: Buffer for the cipher name
|
|
* @buflen: buf size
|
|
* Returns: 0 on success, -1 on failure
|
|
*
|
|
* Get the name of the currently used cipher.
|
|
*/
|
|
int tlsv1_client_get_cipher(struct tlsv1_client *conn, char *buf,
|
|
size_t buflen)
|
|
{
|
|
char *cipher;
|
|
|
|
switch (conn->rl.cipher_suite) {
|
|
case TLS_RSA_WITH_RC4_128_MD5:
|
|
cipher = "RC4-MD5";
|
|
break;
|
|
case TLS_RSA_WITH_RC4_128_SHA:
|
|
cipher = "RC4-SHA";
|
|
break;
|
|
case TLS_RSA_WITH_DES_CBC_SHA:
|
|
cipher = "DES-CBC-SHA";
|
|
break;
|
|
case TLS_RSA_WITH_3DES_EDE_CBC_SHA:
|
|
cipher = "DES-CBC3-SHA";
|
|
break;
|
|
default:
|
|
return -1;
|
|
}
|
|
|
|
os_snprintf(buf, buflen, "%s", cipher);
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_shutdown - Shutdown TLS connection
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_shutdown(struct tlsv1_client *conn)
|
|
{
|
|
conn->state = CLIENT_HELLO;
|
|
|
|
tlsv1_client_free_verify_hashes(conn);
|
|
if (tlsv1_client_init_verify_hashes(conn) < 0) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
|
|
"hash");
|
|
return -1;
|
|
}
|
|
|
|
tlsv1_record_set_cipher_suite(&conn->rl, TLS_NULL_WITH_NULL_NULL);
|
|
tlsv1_record_change_write_cipher(&conn->rl);
|
|
tlsv1_record_change_read_cipher(&conn->rl);
|
|
|
|
conn->certificate_requested = 0;
|
|
crypto_public_key_free(conn->server_rsa_key);
|
|
conn->server_rsa_key = NULL;
|
|
conn->session_resumed = 0;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_resumed - Was session resumption used
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* Returns: 1 if current session used session resumption, 0 if not
|
|
*/
|
|
int tlsv1_client_resumed(struct tlsv1_client *conn)
|
|
{
|
|
return !!conn->session_resumed;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_hello_ext - Set TLS extension for ClientHello
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @ext_type: Extension type
|
|
* @data: Extension payload (%NULL to remove extension)
|
|
* @data_len: Extension payload length
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type,
|
|
const u8 *data, size_t data_len)
|
|
{
|
|
u8 *pos;
|
|
|
|
conn->ticket = 0;
|
|
os_free(conn->client_hello_ext);
|
|
conn->client_hello_ext = NULL;
|
|
conn->client_hello_ext_len = 0;
|
|
|
|
if (data == NULL || data_len == 0)
|
|
return 0;
|
|
|
|
pos = conn->client_hello_ext = os_malloc(6 + data_len);
|
|
if (pos == NULL)
|
|
return -1;
|
|
|
|
WPA_PUT_BE16(pos, 4 + data_len);
|
|
pos += 2;
|
|
WPA_PUT_BE16(pos, ext_type);
|
|
pos += 2;
|
|
WPA_PUT_BE16(pos, data_len);
|
|
pos += 2;
|
|
os_memcpy(pos, data, data_len);
|
|
conn->client_hello_ext_len = 6 + data_len;
|
|
|
|
if (ext_type == TLS_EXT_PAC_OPAQUE) {
|
|
conn->ticket = 1;
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Using session ticket");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_get_keys - Get master key and random data from TLS connection
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @keys: Structure of key/random data (filled on success)
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_get_keys(struct tlsv1_client *conn, struct tls_keys *keys)
|
|
{
|
|
os_memset(keys, 0, sizeof(*keys));
|
|
if (conn->state == CLIENT_HELLO)
|
|
return -1;
|
|
|
|
keys->client_random = conn->client_random;
|
|
keys->client_random_len = TLS_RANDOM_LEN;
|
|
|
|
if (conn->state != SERVER_HELLO) {
|
|
keys->server_random = conn->server_random;
|
|
keys->server_random_len = TLS_RANDOM_LEN;
|
|
keys->master_key = conn->master_secret;
|
|
keys->master_key_len = TLS_MASTER_SECRET_LEN;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_set_master_key - Configure master secret for TLS connection
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @key: TLS pre-master-secret
|
|
* @key_len: length of key in bytes
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_set_master_key(struct tlsv1_client *conn,
|
|
const u8 *key, size_t key_len)
|
|
{
|
|
if (key_len > TLS_MASTER_SECRET_LEN)
|
|
return -1;
|
|
wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret from session "
|
|
"ticket", key, key_len);
|
|
os_memcpy(conn->master_secret, key, key_len);
|
|
conn->ticket_key = 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_get_keyblock_size - Get TLS key_block size
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* Returns: Size of the key_block for the negotiated cipher suite or -1 on
|
|
* failure
|
|
*/
|
|
int tlsv1_client_get_keyblock_size(struct tlsv1_client *conn)
|
|
{
|
|
if (conn->state == CLIENT_HELLO || conn->state == SERVER_HELLO)
|
|
return -1;
|
|
|
|
return 2 * (conn->rl.hash_size + conn->rl.key_material_len +
|
|
conn->rl.iv_size);
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_set_cipher_list - Configure acceptable cipher suites
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
|
|
* (TLS_CIPHER_*).
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers)
|
|
{
|
|
#ifdef EAP_FAST
|
|
size_t count;
|
|
u16 *suites;
|
|
|
|
/* TODO: implement proper configuration of cipher suites */
|
|
if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
|
|
count = 0;
|
|
suites = conn->cipher_suites;
|
|
suites[count++] = TLS_DH_anon_WITH_AES_256_CBC_SHA;
|
|
suites[count++] = TLS_DH_anon_WITH_AES_128_CBC_SHA;
|
|
suites[count++] = TLS_DH_anon_WITH_3DES_EDE_CBC_SHA;
|
|
suites[count++] = TLS_DH_anon_WITH_RC4_128_MD5;
|
|
suites[count++] = TLS_DH_anon_WITH_DES_CBC_SHA;
|
|
conn->num_cipher_suites = count;
|
|
}
|
|
|
|
return 0;
|
|
#else /* EAP_FAST */
|
|
return -1;
|
|
#endif /* EAP_FAST */
|
|
}
|
|
|
|
|
|
static int tlsv1_client_add_cert_der(struct x509_certificate **chain,
|
|
const u8 *buf, size_t len)
|
|
{
|
|
struct x509_certificate *cert;
|
|
char name[128];
|
|
|
|
cert = x509_certificate_parse(buf, len);
|
|
if (cert == NULL) {
|
|
wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate",
|
|
__func__);
|
|
return -1;
|
|
}
|
|
|
|
cert->next = *chain;
|
|
*chain = cert;
|
|
|
|
x509_name_string(&cert->subject, name, sizeof(name));
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static const char *pem_cert_begin = "-----BEGIN CERTIFICATE-----";
|
|
static const char *pem_cert_end = "-----END CERTIFICATE-----";
|
|
|
|
|
|
static const u8 * search_tag(const char *tag, const u8 *buf, size_t len)
|
|
{
|
|
size_t i, plen;
|
|
|
|
plen = os_strlen(tag);
|
|
if (len < plen)
|
|
return NULL;
|
|
|
|
for (i = 0; i < len - plen; i++) {
|
|
if (os_memcmp(buf + i, tag, plen) == 0)
|
|
return buf + i;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static int tlsv1_client_add_cert(struct x509_certificate **chain,
|
|
const u8 *buf, size_t len)
|
|
{
|
|
const u8 *pos, *end;
|
|
unsigned char *der;
|
|
size_t der_len;
|
|
|
|
pos = search_tag(pem_cert_begin, buf, len);
|
|
if (!pos) {
|
|
wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
|
|
"assume DER format");
|
|
return tlsv1_client_add_cert_der(chain, buf, len);
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
|
|
"DER format");
|
|
|
|
while (pos) {
|
|
pos += os_strlen(pem_cert_begin);
|
|
end = search_tag(pem_cert_end, pos, buf + len - pos);
|
|
if (end == NULL) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Could not find PEM "
|
|
"certificate end tag (%s)", pem_cert_end);
|
|
return -1;
|
|
}
|
|
|
|
der = base64_decode(pos, end - pos, &der_len);
|
|
if (der == NULL) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM "
|
|
"certificate");
|
|
return -1;
|
|
}
|
|
|
|
if (tlsv1_client_add_cert_der(chain, der, der_len) < 0) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM "
|
|
"certificate after DER conversion");
|
|
os_free(der);
|
|
return -1;
|
|
}
|
|
|
|
os_free(der);
|
|
|
|
end += os_strlen(pem_cert_end);
|
|
pos = search_tag(pem_cert_begin, end, buf + len - end);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int tlsv1_client_set_cert_chain(struct x509_certificate **chain,
|
|
const char *cert, const u8 *cert_blob,
|
|
size_t cert_blob_len)
|
|
{
|
|
if (cert_blob)
|
|
return tlsv1_client_add_cert(chain, cert_blob, cert_blob_len);
|
|
|
|
if (cert) {
|
|
u8 *buf;
|
|
size_t len;
|
|
int ret;
|
|
|
|
buf = (u8 *) os_readfile(cert, &len);
|
|
if (buf == NULL) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
|
|
cert);
|
|
return -1;
|
|
}
|
|
|
|
ret = tlsv1_client_add_cert(chain, buf, len);
|
|
os_free(buf);
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_set_ca_cert - Set trusted CA certificate(s)
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @cert: File or reference name for X.509 certificate in PEM or DER format
|
|
* @cert_blob: cert as inlined data or %NULL if not used
|
|
* @cert_blob_len: ca_cert_blob length
|
|
* @path: Path to CA certificates (not yet supported)
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_set_ca_cert(struct tlsv1_client *conn, const char *cert,
|
|
const u8 *cert_blob, size_t cert_blob_len,
|
|
const char *path)
|
|
{
|
|
if (tlsv1_client_set_cert_chain(&conn->trusted_certs, cert,
|
|
cert_blob, cert_blob_len) < 0)
|
|
return -1;
|
|
|
|
if (path) {
|
|
/* TODO: add support for reading number of certificate files */
|
|
wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory "
|
|
"not yet supported");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_set_client_cert - Set client certificate
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @cert: File or reference name for X.509 certificate in PEM or DER format
|
|
* @cert_blob: cert as inlined data or %NULL if not used
|
|
* @cert_blob_len: ca_cert_blob length
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_set_client_cert(struct tlsv1_client *conn, const char *cert,
|
|
const u8 *cert_blob, size_t cert_blob_len)
|
|
{
|
|
return tlsv1_client_set_cert_chain(&conn->client_cert, cert,
|
|
cert_blob, cert_blob_len);
|
|
}
|
|
|
|
|
|
static int tlsv1_client_set_key(struct tlsv1_client *conn,
|
|
const u8 *key, size_t len)
|
|
{
|
|
conn->client_key = crypto_private_key_import(key, len);
|
|
if (conn->client_key == NULL) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key");
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* tlsv1_client_set_private_key - Set client private key
|
|
* @conn: TLSv1 client connection data from tlsv1_client_init()
|
|
* @private_key: File or reference name for the key in PEM or DER format
|
|
* @private_key_passwd: Passphrase for decrypted private key, %NULL if no
|
|
* passphrase is used.
|
|
* @private_key_blob: private_key as inlined data or %NULL if not used
|
|
* @private_key_blob_len: private_key_blob length
|
|
* Returns: 0 on success, -1 on failure
|
|
*/
|
|
int tlsv1_client_set_private_key(struct tlsv1_client *conn,
|
|
const char *private_key,
|
|
const char *private_key_passwd,
|
|
const u8 *private_key_blob,
|
|
size_t private_key_blob_len)
|
|
{
|
|
crypto_private_key_free(conn->client_key);
|
|
conn->client_key = NULL;
|
|
|
|
if (private_key_blob)
|
|
return tlsv1_client_set_key(conn, private_key_blob,
|
|
private_key_blob_len);
|
|
|
|
if (private_key) {
|
|
u8 *buf;
|
|
size_t len;
|
|
int ret;
|
|
|
|
buf = (u8 *) os_readfile(private_key, &len);
|
|
if (buf == NULL) {
|
|
wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
|
|
private_key);
|
|
return -1;
|
|
}
|
|
|
|
ret = tlsv1_client_set_key(conn, buf, len);
|
|
os_free(buf);
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|