internal.c 175 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830
  1. /* internal.c
  2. *
  3. * Copyright (C) 2006-2011 Sawtooth Consulting Ltd.
  4. *
  5. * This file is part of CyaSSL.
  6. *
  7. * CyaSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * CyaSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <cyassl/internal.h>
  25. #include <cyassl/error.h>
  26. #include <cyassl/ctaocrypt/asn.h>
  27. #ifdef HAVE_LIBZ
  28. #include "zlib.h"
  29. #endif
  30. #ifdef HAVE_NTRU
  31. #include "crypto_ntru.h"
  32. #endif
  33. #if defined(DEBUG_CYASSL) || defined(SHOW_SECRETS)
  34. #include <stdio.h>
  35. #endif
  36. #ifdef __sun
  37. #include <sys/filio.h>
  38. #endif
  39. #define TRUE 1
  40. #define FALSE 0
  41. #if defined(OPENSSL_EXTRA) && defined(NO_DH)
  42. #error OPENSSL_EXTRA needs DH, please remove NO_DH
  43. #endif
  44. #ifndef NO_CYASSL_CLIENT
  45. static int DoHelloVerifyRequest(CYASSL* ssl, const byte* input, word32*);
  46. static int DoServerHello(CYASSL* ssl, const byte* input, word32*);
  47. static int DoCertificateRequest(CYASSL* ssl, const byte* input, word32*);
  48. static int DoServerKeyExchange(CYASSL* ssl, const byte* input, word32*);
  49. #endif
  50. #ifndef NO_CYASSL_SERVER
  51. static int DoClientHello(CYASSL* ssl, const byte* input, word32*, word32,
  52. word32);
  53. static int DoCertificateVerify(CYASSL* ssl, byte*, word32*, word32);
  54. static int DoClientKeyExchange(CYASSL* ssl, byte* input, word32*);
  55. #endif
  56. typedef enum {
  57. doProcessInit = 0,
  58. #ifndef NO_CYASSL_SERVER
  59. runProcessOldClientHello,
  60. #endif
  61. getRecordLayerHeader,
  62. getData,
  63. runProcessingOneMessage
  64. } processReply;
  65. static void Hmac(CYASSL* ssl, byte* digest, const byte* buffer, word32 sz,
  66. int content, int verify);
  67. static void BuildCertHashes(CYASSL* ssl, Hashes* hashes);
  68. #ifndef min
  69. static INLINE word32 min(word32 a, word32 b)
  70. {
  71. return a > b ? b : a;
  72. }
  73. #endif /* min */
  74. int IsTLS(const CYASSL* ssl)
  75. {
  76. if (ssl->version.major == SSLv3_MAJOR && ssl->version.minor >=TLSv1_MINOR)
  77. return 1;
  78. return 0;
  79. }
  80. int IsAtLeastTLSv1_2(const CYASSL* ssl)
  81. {
  82. if (ssl->version.major == SSLv3_MAJOR && ssl->version.minor >=TLSv1_2_MINOR)
  83. return 1;
  84. return 0;
  85. }
  86. #ifdef HAVE_NTRU
  87. static byte GetEntropy(ENTROPY_CMD cmd, byte* out)
  88. {
  89. /* TODO: add locking? */
  90. static RNG rng;
  91. if (cmd == INIT) {
  92. int ret = InitRng(&rng);
  93. if (ret == 0)
  94. return 1;
  95. else
  96. return 0;
  97. }
  98. if (out == NULL)
  99. return 0;
  100. if (cmd == GET_BYTE_OF_ENTROPY) {
  101. RNG_GenerateBlock(&rng, out, 1);
  102. return 1;
  103. }
  104. if (cmd == GET_NUM_BYTES_PER_BYTE_OF_ENTROPY) {
  105. *out = 1;
  106. return 1;
  107. }
  108. return 0;
  109. }
  110. #endif /* HAVE_NTRU */
  111. /* used by ssl.c too */
  112. void c32to24(word32 in, word24 out)
  113. {
  114. out[0] = (in >> 16) & 0xff;
  115. out[1] = (in >> 8) & 0xff;
  116. out[2] = in & 0xff;
  117. }
  118. #ifdef CYASSL_DTLS
  119. static INLINE void c32to48(word32 in, byte out[6])
  120. {
  121. out[0] = 0;
  122. out[1] = 0;
  123. out[2] = (in >> 24) & 0xff;
  124. out[3] = (in >> 16) & 0xff;
  125. out[4] = (in >> 8) & 0xff;
  126. out[5] = in & 0xff;
  127. }
  128. #endif /* CYASSL_DTLS */
  129. /* convert 16 bit integer to opaque */
  130. static INLINE void c16toa(word16 u16, byte* c)
  131. {
  132. c[0] = (u16 >> 8) & 0xff;
  133. c[1] = u16 & 0xff;
  134. }
  135. /* convert 32 bit integer to opaque */
  136. static INLINE void c32toa(word32 u32, byte* c)
  137. {
  138. c[0] = (u32 >> 24) & 0xff;
  139. c[1] = (u32 >> 16) & 0xff;
  140. c[2] = (u32 >> 8) & 0xff;
  141. c[3] = u32 & 0xff;
  142. }
  143. /* convert a 24 bit integer into a 32 bit one */
  144. static INLINE void c24to32(const word24 u24, word32* u32)
  145. {
  146. *u32 = 0;
  147. *u32 = (u24[0] << 16) | (u24[1] << 8) | u24[2];
  148. }
  149. /* convert opaque to 16 bit integer */
  150. static INLINE void ato16(const byte* c, word16* u16)
  151. {
  152. *u16 = 0;
  153. *u16 = (c[0] << 8) | (c[1]);
  154. }
  155. #ifdef CYASSL_DTLS
  156. /* convert opaque to 32 bit integer */
  157. static INLINE void ato32(const byte* c, word32* u32)
  158. {
  159. *u32 = 0;
  160. *u32 = (c[0] << 24) | (c[1] << 16) | (c[2] << 8) | c[3];
  161. }
  162. #endif /* CYASSL_DTLS */
  163. #ifdef HAVE_LIBZ
  164. /* alloc user allocs to work with zlib */
  165. static void* myAlloc(void* opaque, unsigned int item, unsigned int size)
  166. {
  167. (void)opaque;
  168. return XMALLOC(item * size, opaque, DYNAMIC_TYPE_LIBZ);
  169. }
  170. static void myFree(void* opaque, void* memory)
  171. {
  172. (void)opaque;
  173. XFREE(memory, opaque, DYNAMIC_TYPE_LIBZ);
  174. }
  175. /* init zlib comp/decomp streams, 0 on success */
  176. static int InitStreams(CYASSL* ssl)
  177. {
  178. ssl->c_stream.zalloc = (alloc_func)myAlloc;
  179. ssl->c_stream.zfree = (free_func)myFree;
  180. ssl->c_stream.opaque = (voidpf)ssl->heap;
  181. if (deflateInit(&ssl->c_stream, 8) != Z_OK) return ZLIB_INIT_ERROR;
  182. ssl->didStreamInit = 1;
  183. ssl->d_stream.zalloc = (alloc_func)myAlloc;
  184. ssl->d_stream.zfree = (free_func)myFree;
  185. ssl->d_stream.opaque = (voidpf)ssl->heap;
  186. if (inflateInit(&ssl->d_stream) != Z_OK) return ZLIB_INIT_ERROR;
  187. return 0;
  188. }
  189. static void FreeStreams(CYASSL* ssl)
  190. {
  191. if (ssl->didStreamInit) {
  192. deflateEnd(&ssl->c_stream);
  193. inflateEnd(&ssl->d_stream);
  194. }
  195. }
  196. /* compress in to out, return out size or error */
  197. static int Compress(CYASSL* ssl, byte* in, int inSz, byte* out, int outSz)
  198. {
  199. int err;
  200. int currTotal = ssl->c_stream.total_out;
  201. /* put size in front of compression */
  202. c16toa((word16)inSz, out);
  203. out += 2;
  204. outSz -= 2;
  205. ssl->c_stream.next_in = in;
  206. ssl->c_stream.avail_in = inSz;
  207. ssl->c_stream.next_out = out;
  208. ssl->c_stream.avail_out = outSz;
  209. err = deflate(&ssl->c_stream, Z_SYNC_FLUSH);
  210. if (err != Z_OK && err != Z_STREAM_END) return ZLIB_COMPRESS_ERROR;
  211. return ssl->c_stream.total_out - currTotal + sizeof(word16);
  212. }
  213. /* decompress in to out, returnn out size or error */
  214. static int DeCompress(CYASSL* ssl, byte* in, int inSz, byte* out, int outSz)
  215. {
  216. int err;
  217. int currTotal = ssl->d_stream.total_out;
  218. word16 len;
  219. /* find size in front of compression */
  220. ato16(in, &len);
  221. in += 2;
  222. inSz -= 2;
  223. ssl->d_stream.next_in = in;
  224. ssl->d_stream.avail_in = inSz;
  225. ssl->d_stream.next_out = out;
  226. ssl->d_stream.avail_out = outSz;
  227. err = inflate(&ssl->d_stream, Z_SYNC_FLUSH);
  228. if (err != Z_OK && err != Z_STREAM_END) return ZLIB_DECOMPRESS_ERROR;
  229. return ssl->d_stream.total_out - currTotal;
  230. }
  231. #endif /* HAVE_LIBZ */
  232. void InitSSL_Method(CYASSL_METHOD* method, ProtocolVersion pv)
  233. {
  234. method->version = pv;
  235. method->side = CLIENT_END;
  236. method->verifyPeer = 0;
  237. method->verifyNone = 0;
  238. method->failNoCert = 0;
  239. method->downgrade = 0;
  240. }
  241. void InitSSL_Ctx(CYASSL_CTX* ctx, CYASSL_METHOD* method)
  242. {
  243. ctx->method = method;
  244. ctx->certificate.buffer = 0;
  245. ctx->certChain.buffer = 0;
  246. ctx->privateKey.buffer = 0;
  247. ctx->serverDH_P.buffer = 0;
  248. ctx->serverDH_G.buffer = 0;
  249. ctx->haveDH = 0;
  250. ctx->haveNTRU = 0; /* start off */
  251. ctx->haveECDSA = 0; /* start off */
  252. ctx->heap = ctx; /* defaults to self */
  253. #ifndef NO_PSK
  254. ctx->havePSK = 0;
  255. ctx->server_hint[0] = 0;
  256. ctx->client_psk_cb = 0;
  257. ctx->server_psk_cb = 0;
  258. #endif /* NO_PSK */
  259. #ifdef OPENSSL_EXTRA
  260. ctx->passwd_cb = 0;
  261. ctx->userdata = 0;
  262. #endif /* OPENSSL_EXTRA */
  263. #ifndef CYASSL_USER_IO
  264. ctx->CBIORecv = EmbedReceive;
  265. ctx->CBIOSend = EmbedSend;
  266. #else
  267. /* user will set */
  268. ctx->CBIORecv = NULL;
  269. ctx->CBIOSend = NULL;
  270. #endif
  271. ctx->partialWrite = 0;
  272. ctx->verifyCallback = 0;
  273. ctx->caList = 0;
  274. #ifdef HAVE_NTRU
  275. if (method->side == CLIENT_END)
  276. ctx->haveNTRU = 1; /* always on cliet side */
  277. /* server can turn on by loading key */
  278. #endif
  279. #ifdef HAVE_ECC
  280. if (method->side == CLIENT_END)
  281. ctx->haveECDSA = 1; /* always on cliet side */
  282. /* server can turn on by loading key */
  283. #endif
  284. ctx->suites.setSuites = 0; /* user hasn't set yet */
  285. /* remove DH later if server didn't set, add psk later */
  286. InitSuites(&ctx->suites, method->version, TRUE, FALSE, ctx->haveNTRU,
  287. ctx->haveECDSA, method->side);
  288. ctx->verifyPeer = 0;
  289. ctx->verifyNone = 0;
  290. ctx->failNoCert = 0;
  291. ctx->sessionCacheOff = 0; /* initially on */
  292. ctx->sessionCacheFlushOff = 0; /* initially on */
  293. ctx->sendVerify = 0;
  294. ctx->quietShutdown = 0;
  295. }
  296. /* In case contexts are held in array and don't want to free actual ctx */
  297. void SSL_CtxResourceFree(CYASSL_CTX* ctx)
  298. {
  299. XFREE(ctx->serverDH_G.buffer, ctx->heap, DYNAMIC_TYPE_DH);
  300. XFREE(ctx->serverDH_P.buffer, ctx->heap, DYNAMIC_TYPE_DH);
  301. XFREE(ctx->privateKey.buffer, ctx->heap, DYNAMIC_TYPE_KEY);
  302. XFREE(ctx->certificate.buffer, ctx->heap, DYNAMIC_TYPE_CERT);
  303. XFREE(ctx->certChain.buffer, ctx->heap, DYNAMIC_TYPE_CERT);
  304. XFREE(ctx->method, ctx->heap, DYNAMIC_TYPE_METHOD);
  305. FreeSigners(ctx->caList, ctx->heap);
  306. }
  307. void FreeSSL_Ctx(CYASSL_CTX* ctx)
  308. {
  309. SSL_CtxResourceFree(ctx);
  310. XFREE(ctx, ctx->heap, DYNAMIC_TYPE_CTX);
  311. }
  312. void InitSuites(Suites* suites, ProtocolVersion pv, byte haveDH, byte havePSK,
  313. byte haveNTRU, byte haveECDSA, int side)
  314. {
  315. word16 idx = 0;
  316. int tls = pv.major == SSLv3_MAJOR && pv.minor >= TLSv1_MINOR;
  317. int tls1_2 = pv.major == SSLv3_MAJOR && pv.minor >= TLSv1_2_MINOR;
  318. int haveRSA = 1;
  319. (void)tls; /* shut up compiler */
  320. (void)haveDH;
  321. (void)havePSK;
  322. (void)haveNTRU;
  323. if (suites->setSuites)
  324. return; /* trust user settings, don't override */
  325. if (side == SERVER_END && haveECDSA)
  326. haveRSA = 0; /* can't do RSA with ECDSA cert */
  327. #ifdef CYASSL_DTLS
  328. if (pv.major == DTLS_MAJOR && pv.minor == DTLS_MINOR)
  329. tls = 1;
  330. #endif
  331. #ifdef BUILD_TLS_NTRU_RSA_WITH_AES_256_CBC_SHA
  332. if (tls && haveNTRU && haveRSA) {
  333. suites->suites[idx++] = 0;
  334. suites->suites[idx++] = TLS_NTRU_RSA_WITH_AES_256_CBC_SHA;
  335. }
  336. #endif
  337. #ifdef BUILD_TLS_NTRU_RSA_WITH_AES_128_CBC_SHA
  338. if (tls && haveNTRU && haveRSA) {
  339. suites->suites[idx++] = 0;
  340. suites->suites[idx++] = TLS_NTRU_RSA_WITH_AES_128_CBC_SHA;
  341. }
  342. #endif
  343. #ifdef BUILD_TLS_NTRU_RSA_WITH_RC4_128_SHA
  344. if (tls && haveNTRU && haveRSA) {
  345. suites->suites[idx++] = 0;
  346. suites->suites[idx++] = TLS_NTRU_RSA_WITH_RC4_128_SHA;
  347. }
  348. #endif
  349. #ifdef BUILD_TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA
  350. if (tls && haveNTRU && haveRSA) {
  351. suites->suites[idx++] = 0;
  352. suites->suites[idx++] = TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA;
  353. }
  354. #endif
  355. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  356. if (tls && haveECDSA) {
  357. suites->suites[idx++] = ECC_BYTE;
  358. suites->suites[idx++] = TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA;
  359. }
  360. #endif
  361. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  362. if (tls && haveECDSA) {
  363. suites->suites[idx++] = ECC_BYTE;
  364. suites->suites[idx++] = TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA;
  365. }
  366. #endif
  367. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
  368. if (tls && haveECDSA) {
  369. suites->suites[idx++] = ECC_BYTE;
  370. suites->suites[idx++] = TLS_ECDHE_ECDSA_WITH_RC4_128_SHA;
  371. }
  372. #endif
  373. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
  374. if (tls && haveECDSA) {
  375. suites->suites[idx++] = ECC_BYTE;
  376. suites->suites[idx++] = TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA;
  377. }
  378. #endif
  379. #ifdef BUILD_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  380. if (tls && haveRSA) {
  381. suites->suites[idx++] = ECC_BYTE;
  382. suites->suites[idx++] = TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA;
  383. }
  384. #endif
  385. #ifdef BUILD_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  386. if (tls && haveRSA) {
  387. suites->suites[idx++] = ECC_BYTE;
  388. suites->suites[idx++] = TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA;
  389. }
  390. #endif
  391. #ifdef BUILD_TLS_ECDHE_RSA_WITH_RC4_128_SHA
  392. if (tls && haveRSA) {
  393. suites->suites[idx++] = ECC_BYTE;
  394. suites->suites[idx++] = TLS_ECDHE_RSA_WITH_RC4_128_SHA;
  395. }
  396. #endif
  397. #ifdef BUILD_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
  398. if (tls && haveRSA) {
  399. suites->suites[idx++] = ECC_BYTE;
  400. suites->suites[idx++] = TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA;
  401. }
  402. #endif
  403. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  404. if (tls1_2 && haveDH && haveRSA) {
  405. suites->suites[idx++] = 0;
  406. suites->suites[idx++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256;
  407. }
  408. #endif
  409. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
  410. if (tls1_2 && haveDH && haveRSA) {
  411. suites->suites[idx++] = 0;
  412. suites->suites[idx++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256;
  413. }
  414. #endif
  415. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  416. if (tls && haveDH && haveRSA) {
  417. suites->suites[idx++] = 0;
  418. suites->suites[idx++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA;
  419. }
  420. #endif
  421. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
  422. if (tls && haveDH && haveRSA) {
  423. suites->suites[idx++] = 0;
  424. suites->suites[idx++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA;
  425. }
  426. #endif
  427. #ifdef BUILD_TLS_RSA_WITH_AES_256_CBC_SHA256
  428. if (tls1_2 && haveRSA) {
  429. suites->suites[idx++] = 0;
  430. suites->suites[idx++] = TLS_RSA_WITH_AES_256_CBC_SHA256;
  431. }
  432. #endif
  433. #ifdef BUILD_TLS_RSA_WITH_AES_128_CBC_SHA256
  434. if (tls1_2 && haveRSA) {
  435. suites->suites[idx++] = 0;
  436. suites->suites[idx++] = TLS_RSA_WITH_AES_128_CBC_SHA256;
  437. }
  438. #endif
  439. #ifdef BUILD_TLS_RSA_WITH_AES_256_CBC_SHA
  440. if (tls && haveRSA) {
  441. suites->suites[idx++] = 0;
  442. suites->suites[idx++] = TLS_RSA_WITH_AES_256_CBC_SHA;
  443. }
  444. #endif
  445. #ifdef BUILD_TLS_RSA_WITH_AES_128_CBC_SHA
  446. if (tls && haveRSA) {
  447. suites->suites[idx++] = 0;
  448. suites->suites[idx++] = TLS_RSA_WITH_AES_128_CBC_SHA;
  449. }
  450. #endif
  451. #ifdef BUILD_TLS_PSK_WITH_AES_256_CBC_SHA
  452. if (tls && havePSK) {
  453. suites->suites[idx++] = 0;
  454. suites->suites[idx++] = TLS_PSK_WITH_AES_256_CBC_SHA;
  455. }
  456. #endif
  457. #ifdef BUILD_TLS_PSK_WITH_AES_128_CBC_SHA
  458. if (tls && havePSK) {
  459. suites->suites[idx++] = 0;
  460. suites->suites[idx++] = TLS_PSK_WITH_AES_128_CBC_SHA;
  461. }
  462. #endif
  463. #ifdef BUILD_SSL_RSA_WITH_RC4_128_SHA
  464. if (haveRSA ) {
  465. suites->suites[idx++] = 0;
  466. suites->suites[idx++] = SSL_RSA_WITH_RC4_128_SHA;
  467. }
  468. #endif
  469. #ifdef BUILD_SSL_RSA_WITH_RC4_128_MD5
  470. if (haveRSA ) {
  471. suites->suites[idx++] = 0;
  472. suites->suites[idx++] = SSL_RSA_WITH_RC4_128_MD5;
  473. }
  474. #endif
  475. #ifdef BUILD_SSL_RSA_WITH_3DES_EDE_CBC_SHA
  476. if (haveRSA ) {
  477. suites->suites[idx++] = 0;
  478. suites->suites[idx++] = SSL_RSA_WITH_3DES_EDE_CBC_SHA;
  479. }
  480. #endif
  481. #ifdef BUILD_TLS_RSA_WITH_HC_128_CBC_MD5
  482. if (tls && haveRSA) {
  483. suites->suites[idx++] = 0;
  484. suites->suites[idx++] = TLS_RSA_WITH_HC_128_CBC_MD5;
  485. }
  486. #endif
  487. #ifdef BUILD_TLS_RSA_WITH_HC_128_CBC_SHA
  488. if (tls && haveRSA) {
  489. suites->suites[idx++] = 0;
  490. suites->suites[idx++] = TLS_RSA_WITH_HC_128_CBC_SHA;
  491. }
  492. #endif
  493. #ifdef BUILD_TLS_RSA_WITH_RABBIT_CBC_SHA
  494. if (tls && haveRSA) {
  495. suites->suites[idx++] = 0;
  496. suites->suites[idx++] = TLS_RSA_WITH_RABBIT_CBC_SHA;
  497. }
  498. #endif
  499. suites->suiteSz = idx;
  500. }
  501. int InitSSL(CYASSL* ssl, CYASSL_CTX* ctx)
  502. {
  503. int ret;
  504. byte havePSK = 0;
  505. ssl->ctx = ctx; /* only for passing to calls, options could change */
  506. ssl->version = ctx->method->version;
  507. ssl->suites = ctx->suites;
  508. #ifdef HAVE_LIBZ
  509. ssl->didStreamInit = 0;
  510. #endif
  511. ssl->buffers.certificate.buffer = 0;
  512. ssl->buffers.key.buffer = 0;
  513. ssl->buffers.certChain.buffer = 0;
  514. ssl->buffers.inputBuffer.length = 0;
  515. ssl->buffers.inputBuffer.idx = 0;
  516. ssl->buffers.inputBuffer.buffer = ssl->buffers.inputBuffer.staticBuffer;
  517. ssl->buffers.inputBuffer.bufferSize = STATIC_BUFFER_LEN;
  518. ssl->buffers.inputBuffer.dynamicFlag = 0;
  519. ssl->buffers.outputBuffer.length = 0;
  520. ssl->buffers.outputBuffer.idx = 0;
  521. ssl->buffers.outputBuffer.buffer = ssl->buffers.outputBuffer.staticBuffer;
  522. ssl->buffers.outputBuffer.bufferSize = STATIC_BUFFER_LEN;
  523. ssl->buffers.outputBuffer.dynamicFlag = 0;
  524. ssl->buffers.domainName.buffer = 0;
  525. ssl->buffers.serverDH_P.buffer = 0;
  526. ssl->buffers.serverDH_G.buffer = 0;
  527. ssl->buffers.serverDH_Pub.buffer = 0;
  528. ssl->buffers.serverDH_Priv.buffer = 0;
  529. ssl->buffers.clearOutputBuffer.buffer = 0;
  530. ssl->buffers.clearOutputBuffer.length = 0;
  531. ssl->buffers.prevSent = 0;
  532. ssl->buffers.plainSz = 0;
  533. if ( (ret = InitRng(&ssl->rng)) != 0)
  534. return ret;
  535. InitMd5(&ssl->hashMd5);
  536. InitSha(&ssl->hashSha);
  537. #ifndef NO_SHA256
  538. InitSha256(&ssl->hashSha256);
  539. #endif
  540. InitRsaKey(&ssl->peerRsaKey, ctx->heap);
  541. ssl->verifyCallback = ctx->verifyCallback;
  542. ssl->peerRsaKeyPresent = 0;
  543. ssl->options.side = ctx->method->side;
  544. ssl->options.downgrade = ctx->method->downgrade;
  545. ssl->error = 0;
  546. ssl->options.connReset = 0;
  547. ssl->options.isClosed = 0;
  548. ssl->options.closeNotify = 0;
  549. ssl->options.sentNotify = 0;
  550. ssl->options.usingCompression = 0;
  551. if (ssl->options.side == SERVER_END)
  552. ssl->options.haveDH = ctx->haveDH;
  553. else
  554. ssl->options.haveDH = 0;
  555. ssl->options.haveNTRU = ctx->haveNTRU;
  556. ssl->options.haveECDSA = ctx->haveECDSA;
  557. ssl->options.havePeerCert = 0;
  558. ssl->options.usingPSK_cipher = 0;
  559. ssl->options.sendAlertState = 0;
  560. #ifndef NO_PSK
  561. havePSK = ctx->havePSK;
  562. ssl->options.havePSK = ctx->havePSK;
  563. ssl->options.client_psk_cb = ctx->client_psk_cb;
  564. ssl->options.server_psk_cb = ctx->server_psk_cb;
  565. #endif /* NO_PSK */
  566. ssl->options.serverState = NULL_STATE;
  567. ssl->options.clientState = NULL_STATE;
  568. ssl->options.connectState = CONNECT_BEGIN;
  569. ssl->options.acceptState = ACCEPT_BEGIN;
  570. ssl->options.handShakeState = NULL_STATE;
  571. ssl->options.processReply = doProcessInit;
  572. #ifdef CYASSL_DTLS
  573. ssl->keys.dtls_sequence_number = 0;
  574. ssl->keys.dtls_peer_sequence_number = 0;
  575. ssl->keys.dtls_handshake_number = 0;
  576. ssl->keys.dtls_epoch = 0;
  577. ssl->keys.dtls_peer_epoch = 0;
  578. #endif
  579. ssl->keys.encryptionOn = 0; /* initially off */
  580. ssl->options.sessionCacheOff = ctx->sessionCacheOff;
  581. ssl->options.sessionCacheFlushOff = ctx->sessionCacheFlushOff;
  582. ssl->options.verifyPeer = ctx->verifyPeer;
  583. ssl->options.verifyNone = ctx->verifyNone;
  584. ssl->options.failNoCert = ctx->failNoCert;
  585. ssl->options.sendVerify = ctx->sendVerify;
  586. ssl->options.resuming = 0;
  587. ssl->hmac = Hmac; /* default to SSLv3 */
  588. ssl->heap = ctx->heap; /* defaults to self */
  589. ssl->options.tls = 0;
  590. ssl->options.tls1_1 = 0;
  591. ssl->options.dtls = 0;
  592. ssl->options.partialWrite = ctx->partialWrite;
  593. ssl->options.quietShutdown = ctx->quietShutdown;
  594. ssl->options.certOnly = 0;
  595. /* ctx still owns certificate, certChain, key, dh, and caList buffers */
  596. ssl->buffers.certificate = ctx->certificate;
  597. ssl->buffers.certChain = ctx->certChain;
  598. ssl->buffers.key = ctx->privateKey;
  599. if (ssl->options.side == SERVER_END) {
  600. ssl->buffers.serverDH_P = ctx->serverDH_P;
  601. ssl->buffers.serverDH_G = ctx->serverDH_G;
  602. }
  603. ssl->buffers.weOwnCert = 0;
  604. ssl->buffers.weOwnKey = 0;
  605. ssl->buffers.weOwnDH = 0;
  606. #ifdef OPENSSL_EXTRA
  607. ssl->peerCert.issuer.sz = 0;
  608. ssl->peerCert.subject.sz = 0;
  609. #endif
  610. /* make sure server has cert and key unless using PSK */
  611. if (ssl->options.side == SERVER_END && !havePSK)
  612. if (!ssl->buffers.certificate.buffer || !ssl->buffers.key.buffer) {
  613. CYASSL_MSG("Server missing certificate and/or private key");
  614. return NO_PRIVATE_KEY;
  615. }
  616. #ifndef NO_PSK
  617. ssl->arrays.client_identity[0] = 0;
  618. if (ctx->server_hint[0]) /* set in CTX */
  619. XSTRNCPY(ssl->arrays.server_hint, ctx->server_hint, MAX_PSK_ID_LEN);
  620. else
  621. ssl->arrays.server_hint[0] = 0;
  622. #endif /* NO_PSK */
  623. #ifdef CYASSL_CALLBACKS
  624. ssl->hsInfoOn = 0;
  625. ssl->toInfoOn = 0;
  626. #endif
  627. #ifdef HAVE_ECC
  628. ssl->peerEccKeyPresent = 0;
  629. ecc_init(&ssl->peerEccKey);
  630. ssl->peerEccDsaKeyPresent = 0;
  631. ecc_init(&ssl->peerEccDsaKey);
  632. ssl->eccDsaKeyPresent = 0;
  633. ecc_init(&ssl->eccDsaKey);
  634. ssl->eccTempKeyPresent = 0;
  635. ecc_init(&ssl->eccTempKey);
  636. /* make ECDHE for server side */
  637. if (ssl->options.side == SERVER_END) {
  638. if (ecc_make_key(&ssl->rng, ECDHE_SIZE, &ssl->eccTempKey) != 0)
  639. return ECC_MAKEKEY_ERROR;
  640. ssl->eccTempKeyPresent = 1;
  641. }
  642. #endif
  643. /* make sure server has DH parms, and add PSK if there, add NTRU too */
  644. if (ssl->options.side == SERVER_END)
  645. InitSuites(&ssl->suites, ssl->version,ssl->options.haveDH, havePSK,
  646. ssl->options.haveNTRU, ssl->options.haveECDSA,
  647. ssl->ctx->method->side);
  648. else
  649. InitSuites(&ssl->suites, ssl->version, TRUE, havePSK,
  650. ssl->options.haveNTRU, ssl->options.haveECDSA,
  651. ssl->ctx->method->side);
  652. ssl->rfd = -1; /* set to invalid descriptor */
  653. ssl->wfd = -1;
  654. ssl->biord = 0;
  655. ssl->biowr = 0;
  656. ssl->IOCB_ReadCtx = &ssl->rfd; /* prevent invalid pointer acess if not */
  657. ssl->IOCB_WriteCtx = &ssl->wfd; /* correctly set */
  658. #ifdef SESSION_CERTS
  659. ssl->session.chain.count = 0;
  660. #endif
  661. ssl->cipher.ssl = ssl;
  662. return 0;
  663. }
  664. /* In case holding SSL object in array and don't want to free actual ssl */
  665. void SSL_ResourceFree(CYASSL* ssl)
  666. {
  667. XFREE(ssl->buffers.serverDH_Priv.buffer, ssl->heap, DYNAMIC_TYPE_DH);
  668. XFREE(ssl->buffers.serverDH_Pub.buffer, ssl->heap, DYNAMIC_TYPE_DH);
  669. /* parameters (p,g) may be owned by ctx */
  670. if (ssl->buffers.weOwnDH) {
  671. XFREE(ssl->buffers.serverDH_G.buffer, ssl->heap, DYNAMIC_TYPE_DH);
  672. XFREE(ssl->buffers.serverDH_P.buffer, ssl->heap, DYNAMIC_TYPE_DH);
  673. }
  674. XFREE(ssl->buffers.domainName.buffer, ssl->heap, DYNAMIC_TYPE_DOMAIN);
  675. /* CYASSL_CTX always owns certChain */
  676. if (ssl->buffers.weOwnCert)
  677. XFREE(ssl->buffers.certificate.buffer, ssl->heap, DYNAMIC_TYPE_CERT);
  678. if (ssl->buffers.weOwnKey)
  679. XFREE(ssl->buffers.key.buffer, ssl->heap, DYNAMIC_TYPE_KEY);
  680. FreeRsaKey(&ssl->peerRsaKey);
  681. if (ssl->buffers.inputBuffer.dynamicFlag)
  682. ShrinkInputBuffer(ssl, FORCED_FREE);
  683. if (ssl->buffers.outputBuffer.dynamicFlag)
  684. ShrinkOutputBuffer(ssl);
  685. #if defined(OPENSSL_EXTRA) || defined(GOAHEAD_WS)
  686. CyaSSL_BIO_free(ssl->biord);
  687. if (ssl->biord != ssl->biowr) /* in case same as write */
  688. CyaSSL_BIO_free(ssl->biowr);
  689. #endif
  690. #ifdef HAVE_LIBZ
  691. FreeStreams(ssl);
  692. #endif
  693. #ifdef HAVE_ECC
  694. ecc_free(&ssl->peerEccKey);
  695. ecc_free(&ssl->peerEccDsaKey);
  696. ecc_free(&ssl->eccTempKey);
  697. ecc_free(&ssl->eccDsaKey);
  698. #endif
  699. }
  700. void FreeSSL(CYASSL* ssl)
  701. {
  702. SSL_ResourceFree(ssl);
  703. XFREE(ssl, ssl->heap, DYNAMIC_TYPE_SSL);
  704. }
  705. ProtocolVersion MakeSSLv3(void)
  706. {
  707. ProtocolVersion pv;
  708. pv.major = SSLv3_MAJOR;
  709. pv.minor = SSLv3_MINOR;
  710. return pv;
  711. }
  712. #ifdef CYASSL_DTLS
  713. ProtocolVersion MakeDTLSv1(void)
  714. {
  715. ProtocolVersion pv;
  716. pv.major = DTLS_MAJOR;
  717. pv.minor = DTLS_MINOR;
  718. return pv;
  719. }
  720. #endif /* CYASSL_DTLS */
  721. #ifdef USE_WINDOWS_API
  722. timer_d Timer(void)
  723. {
  724. static int init = 0;
  725. static LARGE_INTEGER freq;
  726. LARGE_INTEGER count;
  727. if (!init) {
  728. QueryPerformanceFrequency(&freq);
  729. init = 1;
  730. }
  731. QueryPerformanceCounter(&count);
  732. return (double)count.QuadPart / freq.QuadPart;
  733. }
  734. word32 LowResTimer(void)
  735. {
  736. return (word32)Timer();
  737. }
  738. #elif defined(THREADX)
  739. #include "rtptime.h"
  740. word32 LowResTimer(void)
  741. {
  742. return (word32)rtp_get_system_sec();
  743. }
  744. #elif defined(MICRIUM)
  745. word32 LowResTimer(void)
  746. {
  747. NET_SECURE_OS_TICK clk;
  748. #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
  749. clk = NetSecure_OS_TimeGet();
  750. #endif
  751. return (word32)clk;
  752. }
  753. #elif defined(USER_TICKS)
  754. word32 LowResTimer(void)
  755. {
  756. /*
  757. write your own clock tick function if don't want time(0)
  758. needs second accuracy but doesn't have to correlated to EPOCH
  759. */
  760. }
  761. #else /* !USE_WINDOWS_API && !THREADX && !MICRIUM && !USER_TICKS */
  762. #include <time.h>
  763. word32 LowResTimer(void)
  764. {
  765. return time(0);
  766. }
  767. #endif /* USE_WINDOWS_API */
  768. /* add output to md5 and sha handshake hashes, exclude record header */
  769. static void HashOutput(CYASSL* ssl, const byte* output, int sz, int ivSz)
  770. {
  771. const byte* adj = output + RECORD_HEADER_SZ + ivSz;
  772. sz -= RECORD_HEADER_SZ;
  773. #ifdef CYASSL_DTLS
  774. if (ssl->options.dtls) {
  775. adj += DTLS_RECORD_EXTRA;
  776. sz -= DTLS_RECORD_EXTRA;
  777. }
  778. #endif
  779. Md5Update(&ssl->hashMd5, adj, sz);
  780. ShaUpdate(&ssl->hashSha, adj, sz);
  781. #ifndef NO_SHA256
  782. if (IsAtLeastTLSv1_2(ssl))
  783. Sha256Update(&ssl->hashSha256, adj, sz);
  784. #endif
  785. }
  786. /* add input to md5 and sha handshake hashes, include handshake header */
  787. static void HashInput(CYASSL* ssl, const byte* input, int sz)
  788. {
  789. const byte* adj = input - HANDSHAKE_HEADER_SZ;
  790. sz += HANDSHAKE_HEADER_SZ;
  791. #ifdef CYASSL_DTLS
  792. if (ssl->options.dtls) {
  793. adj -= DTLS_HANDSHAKE_EXTRA;
  794. sz += DTLS_HANDSHAKE_EXTRA;
  795. }
  796. #endif
  797. Md5Update(&ssl->hashMd5, adj, sz);
  798. ShaUpdate(&ssl->hashSha, adj, sz);
  799. #ifndef NO_SHA256
  800. if (IsAtLeastTLSv1_2(ssl))
  801. Sha256Update(&ssl->hashSha256, adj, sz);
  802. #endif
  803. }
  804. /* add record layer header for message */
  805. static void AddRecordHeader(byte* output, word32 length, byte type, CYASSL* ssl)
  806. {
  807. RecordLayerHeader* rl;
  808. /* record layer header */
  809. rl = (RecordLayerHeader*)output;
  810. rl->type = type;
  811. rl->version = ssl->version; /* type and version same in each */
  812. if (!ssl->options.dtls)
  813. c16toa((word16)length, rl->length);
  814. else {
  815. #ifdef CYASSL_DTLS
  816. DtlsRecordLayerHeader* dtls;
  817. /* dtls record layer header extensions */
  818. dtls = (DtlsRecordLayerHeader*)output;
  819. c16toa(ssl->keys.dtls_epoch, dtls->epoch);
  820. c32to48(ssl->keys.dtls_sequence_number++, dtls->sequence_number);
  821. c16toa((word16)length, dtls->length);
  822. #endif
  823. }
  824. }
  825. /* add handshake header for message */
  826. static void AddHandShakeHeader(byte* output, word32 length, byte type,
  827. CYASSL* ssl)
  828. {
  829. HandShakeHeader* hs;
  830. (void)ssl;
  831. /* handshake header */
  832. hs = (HandShakeHeader*)output;
  833. hs->type = type;
  834. c32to24(length, hs->length); /* type and length same for each */
  835. #ifdef CYASSL_DTLS
  836. if (ssl->options.dtls) {
  837. DtlsHandShakeHeader* dtls;
  838. /* dtls handshake header extensions */
  839. dtls = (DtlsHandShakeHeader*)output;
  840. c16toa(ssl->keys.dtls_handshake_number++, dtls->message_seq);
  841. c32to24(0, dtls->fragment_offset);
  842. c32to24(length, dtls->fragment_length);
  843. }
  844. #endif
  845. }
  846. /* add both headers for handshake message */
  847. static void AddHeaders(byte* output, word32 length, byte type, CYASSL* ssl)
  848. {
  849. if (!ssl->options.dtls) {
  850. AddRecordHeader(output, length + HANDSHAKE_HEADER_SZ, handshake, ssl);
  851. AddHandShakeHeader(output + RECORD_HEADER_SZ, length, type, ssl);
  852. }
  853. #ifdef CYASSL_DTLS
  854. else {
  855. AddRecordHeader(output, length+DTLS_HANDSHAKE_HEADER_SZ, handshake,ssl);
  856. AddHandShakeHeader(output + DTLS_RECORD_HEADER_SZ, length, type, ssl);
  857. }
  858. #endif
  859. }
  860. /* return bytes received, -1 on error */
  861. static int Receive(CYASSL* ssl, byte* buf, word32 sz)
  862. {
  863. int recvd;
  864. retry:
  865. recvd = ssl->ctx->CBIORecv((char *)buf, (int)sz, ssl->IOCB_ReadCtx);
  866. if (recvd < 0)
  867. switch (recvd) {
  868. case IO_ERR_GENERAL: /* general/unknown error */
  869. return -1;
  870. case IO_ERR_WANT_READ: /* want read, would block */
  871. return WANT_READ;
  872. case IO_ERR_CONN_RST: /* connection reset */
  873. ssl->options.connReset = 1;
  874. return -1;
  875. case IO_ERR_ISR: /* interrupt */
  876. /* see if we got our timeout */
  877. #ifdef CYASSL_CALLBACKS
  878. if (ssl->toInfoOn) {
  879. struct itimerval timeout;
  880. getitimer(ITIMER_REAL, &timeout);
  881. if (timeout.it_value.tv_sec == 0 &&
  882. timeout.it_value.tv_usec == 0) {
  883. XSTRNCPY(ssl->timeoutInfo.timeoutName,
  884. "recv() timeout", MAX_TIMEOUT_NAME_SZ);
  885. CYASSL_MSG("Got our timeout");
  886. return WANT_READ;
  887. }
  888. }
  889. #endif
  890. goto retry;
  891. case IO_ERR_CONN_CLOSE: /* peer closed connection */
  892. ssl->options.isClosed = 1;
  893. return -1;
  894. default:
  895. return recvd;
  896. }
  897. return recvd;
  898. }
  899. /* Switch dynamic output buffer back to static, buffer is assumed clear */
  900. void ShrinkOutputBuffer(CYASSL* ssl)
  901. {
  902. CYASSL_MSG("Shrinking output buffer\n");
  903. XFREE(ssl->buffers.outputBuffer.buffer, ssl->heap, DYNAMIC_TYPE_OUT_BUFFER);
  904. ssl->buffers.outputBuffer.buffer = ssl->buffers.outputBuffer.staticBuffer;
  905. ssl->buffers.outputBuffer.bufferSize = STATIC_BUFFER_LEN;
  906. ssl->buffers.outputBuffer.dynamicFlag = 0;
  907. }
  908. /* Switch dynamic input buffer back to static, keep any remaining input */
  909. /* forced free means cleaning up */
  910. void ShrinkInputBuffer(CYASSL* ssl, int forcedFree)
  911. {
  912. int usedLength = ssl->buffers.inputBuffer.length -
  913. ssl->buffers.inputBuffer.idx;
  914. if (!forcedFree && usedLength > STATIC_BUFFER_LEN)
  915. return;
  916. CYASSL_MSG("Shrinking input buffer\n");
  917. if (!forcedFree && usedLength)
  918. XMEMCPY(ssl->buffers.inputBuffer.staticBuffer,
  919. ssl->buffers.inputBuffer.buffer + ssl->buffers.inputBuffer.idx,
  920. usedLength);
  921. XFREE(ssl->buffers.inputBuffer.buffer, ssl->heap, DYNAMIC_TYPE_IN_BUFFER);
  922. ssl->buffers.inputBuffer.buffer = ssl->buffers.inputBuffer.staticBuffer;
  923. ssl->buffers.inputBuffer.bufferSize = STATIC_BUFFER_LEN;
  924. ssl->buffers.inputBuffer.dynamicFlag = 0;
  925. ssl->buffers.inputBuffer.idx = 0;
  926. ssl->buffers.inputBuffer.length = usedLength;
  927. }
  928. int SendBuffered(CYASSL* ssl)
  929. {
  930. while (ssl->buffers.outputBuffer.length > 0) {
  931. int sent = ssl->ctx->CBIOSend((char*)ssl->buffers.outputBuffer.buffer +
  932. ssl->buffers.outputBuffer.idx,
  933. (int)ssl->buffers.outputBuffer.length,
  934. ssl->IOCB_WriteCtx);
  935. if (sent < 0) {
  936. switch (sent) {
  937. case IO_ERR_WANT_WRITE: /* would block */
  938. return WANT_WRITE;
  939. case IO_ERR_CONN_RST: /* connection reset */
  940. ssl->options.connReset = 1;
  941. break;
  942. case IO_ERR_ISR: /* interrupt */
  943. /* see if we got our timeout */
  944. #ifdef CYASSL_CALLBACKS
  945. if (ssl->toInfoOn) {
  946. struct itimerval timeout;
  947. getitimer(ITIMER_REAL, &timeout);
  948. if (timeout.it_value.tv_sec == 0 &&
  949. timeout.it_value.tv_usec == 0) {
  950. XSTRNCPY(ssl->timeoutInfo.timeoutName,
  951. "send() timeout", MAX_TIMEOUT_NAME_SZ);
  952. CYASSL_MSG("Got our timeout");
  953. return WANT_WRITE;
  954. }
  955. }
  956. #endif
  957. continue;
  958. case IO_ERR_CONN_CLOSE: /* epipe / conn closed, same as reset */
  959. ssl->options.connReset = 1;
  960. break;
  961. default:
  962. return SOCKET_ERROR_E;
  963. }
  964. return SOCKET_ERROR_E;
  965. }
  966. ssl->buffers.outputBuffer.idx += sent;
  967. ssl->buffers.outputBuffer.length -= sent;
  968. }
  969. ssl->buffers.outputBuffer.idx = 0;
  970. if (ssl->buffers.outputBuffer.dynamicFlag)
  971. ShrinkOutputBuffer(ssl);
  972. return 0;
  973. }
  974. /* Grow the output buffer, should only be to send cert, should be blank */
  975. static INLINE int GrowOutputBuffer(CYASSL* ssl, int size)
  976. {
  977. byte* tmp = (byte*) XMALLOC(size + ssl->buffers.outputBuffer.length,
  978. ssl->heap, DYNAMIC_TYPE_OUT_BUFFER);
  979. CYASSL_MSG("growing output buffer\n");
  980. if (!tmp) return MEMORY_E;
  981. if (ssl->buffers.outputBuffer.length)
  982. XMEMCPY(tmp, ssl->buffers.outputBuffer.buffer,
  983. ssl->buffers.outputBuffer.length);
  984. if (ssl->buffers.outputBuffer.dynamicFlag)
  985. XFREE(ssl->buffers.outputBuffer.buffer, ssl->heap,
  986. DYNAMIC_TYPE_OUT_BUFFER);
  987. ssl->buffers.outputBuffer.dynamicFlag = 1;
  988. ssl->buffers.outputBuffer.buffer = tmp;
  989. ssl->buffers.outputBuffer.bufferSize = size +
  990. ssl->buffers.outputBuffer.length;
  991. return 0;
  992. }
  993. /* Grow the input buffer, should only be to read cert or big app data */
  994. static INLINE int GrowInputBuffer(CYASSL* ssl, int size, int usedLength)
  995. {
  996. byte* tmp = (byte*) XMALLOC(size + usedLength, ssl->heap,
  997. DYNAMIC_TYPE_IN_BUFFER);
  998. CYASSL_MSG("growing input buffer\n");
  999. if (!tmp) return MEMORY_E;
  1000. if (usedLength)
  1001. XMEMCPY(tmp, ssl->buffers.inputBuffer.buffer +
  1002. ssl->buffers.inputBuffer.idx, usedLength);
  1003. if (ssl->buffers.inputBuffer.dynamicFlag)
  1004. XFREE(ssl->buffers.inputBuffer.buffer,ssl->heap,DYNAMIC_TYPE_IN_BUFFER);
  1005. ssl->buffers.inputBuffer.dynamicFlag = 1;
  1006. ssl->buffers.inputBuffer.buffer = tmp;
  1007. ssl->buffers.inputBuffer.bufferSize = size + usedLength;
  1008. ssl->buffers.inputBuffer.idx = 0;
  1009. ssl->buffers.inputBuffer.length = usedLength;
  1010. return 0;
  1011. }
  1012. /* check avalaible size into output buffer */
  1013. static INLINE int CheckAvalaibleSize(CYASSL *ssl, int size)
  1014. {
  1015. if ((word32)size > ssl->buffers.outputBuffer.bufferSize)
  1016. if (GrowOutputBuffer(ssl, size) < 0)
  1017. return MEMORY_E;
  1018. if (ssl->buffers.outputBuffer.bufferSize - ssl->buffers.outputBuffer.length
  1019. < (word32)size) {
  1020. if (SendBuffered(ssl) == SOCKET_ERROR_E)
  1021. return SOCKET_ERROR_E;
  1022. if (ssl->buffers.outputBuffer.bufferSize -
  1023. ssl->buffers.outputBuffer.length < (word32)size)
  1024. return WANT_WRITE;
  1025. }
  1026. return 0;
  1027. }
  1028. /* do all verify and sanity checks on record header */
  1029. static int GetRecordHeader(CYASSL* ssl, const byte* input, word32* inOutIdx,
  1030. RecordLayerHeader* rh, word16 *size)
  1031. {
  1032. if (!ssl->options.dtls) {
  1033. XMEMCPY(rh, input + *inOutIdx, RECORD_HEADER_SZ);
  1034. *inOutIdx += RECORD_HEADER_SZ;
  1035. ato16(rh->length, size);
  1036. }
  1037. else {
  1038. #ifdef CYASSL_DTLS
  1039. /* type and version in same sport */
  1040. XMEMCPY(rh, input + *inOutIdx, ENUM_LEN + VERSION_SZ);
  1041. *inOutIdx += ENUM_LEN + VERSION_SZ;
  1042. *inOutIdx += 4; /* skip epoch and first 2 seq bytes for now */
  1043. ato32(input + *inOutIdx, &ssl->keys.dtls_peer_sequence_number);
  1044. *inOutIdx += 4; /* advance past rest of seq */
  1045. ato16(input + *inOutIdx, size);
  1046. *inOutIdx += LENGTH_SZ;
  1047. #endif
  1048. }
  1049. /* catch version mismatch */
  1050. if (rh->version.major != ssl->version.major ||
  1051. rh->version.minor != ssl->version.minor) {
  1052. if (ssl->options.side == SERVER_END &&
  1053. ssl->options.acceptState == ACCEPT_BEGIN)
  1054. CYASSL_MSG("Client attempting to connect with different version");
  1055. else if (ssl->options.side == CLIENT_END && ssl->options.downgrade &&
  1056. ssl->options.connectState < FIRST_REPLY_DONE)
  1057. CYASSL_MSG("Server attempting to accept with different version");
  1058. else {
  1059. CYASSL_MSG("SSL version error");
  1060. return VERSION_ERROR; /* only use requested version */
  1061. }
  1062. }
  1063. /* record layer length check */
  1064. if (*size > (MAX_RECORD_SIZE + MAX_COMP_EXTRA + MAX_MSG_EXTRA))
  1065. return LENGTH_ERROR;
  1066. /* verify record type here as well */
  1067. switch ((enum ContentType)rh->type) {
  1068. case handshake:
  1069. case change_cipher_spec:
  1070. case application_data:
  1071. case alert:
  1072. break;
  1073. case no_type:
  1074. default:
  1075. CYASSL_MSG("Unknown Record Type");
  1076. return UNKNOWN_RECORD_TYPE;
  1077. }
  1078. return 0;
  1079. }
  1080. static int GetHandShakeHeader(CYASSL* ssl, const byte* input, word32* inOutIdx,
  1081. byte *type, word32 *size)
  1082. {
  1083. const byte *ptr = input + *inOutIdx;
  1084. (void)ssl;
  1085. *inOutIdx += HANDSHAKE_HEADER_SZ;
  1086. #ifdef CYASSL_DTLS
  1087. if (ssl->options.dtls)
  1088. *inOutIdx += DTLS_HANDSHAKE_EXTRA;
  1089. #endif
  1090. *type = ptr[0];
  1091. c24to32(&ptr[1], size);
  1092. return 0;
  1093. }
  1094. /* fill with MD5 pad size since biggest required */
  1095. static const byte PAD1[PAD_MD5] =
  1096. { 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  1097. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  1098. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  1099. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  1100. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  1101. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36
  1102. };
  1103. static const byte PAD2[PAD_MD5] =
  1104. { 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c,
  1105. 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c,
  1106. 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c,
  1107. 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c,
  1108. 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c,
  1109. 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c, 0x5c
  1110. };
  1111. /* calculate MD5 hash for finished */
  1112. static void BuildMD5(CYASSL* ssl, Hashes* hashes, const byte* sender)
  1113. {
  1114. byte md5_result[MD5_DIGEST_SIZE];
  1115. /* make md5 inner */
  1116. Md5Update(&ssl->hashMd5, sender, SIZEOF_SENDER);
  1117. Md5Update(&ssl->hashMd5, ssl->arrays.masterSecret, SECRET_LEN);
  1118. Md5Update(&ssl->hashMd5, PAD1, PAD_MD5);
  1119. Md5Final(&ssl->hashMd5, md5_result);
  1120. /* make md5 outer */
  1121. Md5Update(&ssl->hashMd5, ssl->arrays.masterSecret, SECRET_LEN);
  1122. Md5Update(&ssl->hashMd5, PAD2, PAD_MD5);
  1123. Md5Update(&ssl->hashMd5, md5_result, MD5_DIGEST_SIZE);
  1124. Md5Final(&ssl->hashMd5, hashes->md5);
  1125. }
  1126. /* calculate SHA hash for finished */
  1127. static void BuildSHA(CYASSL* ssl, Hashes* hashes, const byte* sender)
  1128. {
  1129. byte sha_result[SHA_DIGEST_SIZE];
  1130. /* make sha inner */
  1131. ShaUpdate(&ssl->hashSha, sender, SIZEOF_SENDER);
  1132. ShaUpdate(&ssl->hashSha, ssl->arrays.masterSecret, SECRET_LEN);
  1133. ShaUpdate(&ssl->hashSha, PAD1, PAD_SHA);
  1134. ShaFinal(&ssl->hashSha, sha_result);
  1135. /* make sha outer */
  1136. ShaUpdate(&ssl->hashSha, ssl->arrays.masterSecret, SECRET_LEN);
  1137. ShaUpdate(&ssl->hashSha, PAD2, PAD_SHA);
  1138. ShaUpdate(&ssl->hashSha, sha_result, SHA_DIGEST_SIZE);
  1139. ShaFinal(&ssl->hashSha, hashes->sha);
  1140. }
  1141. static void BuildFinished(CYASSL* ssl, Hashes* hashes, const byte* sender)
  1142. {
  1143. /* store current states, building requires get_digest which resets state */
  1144. Md5 md5 = ssl->hashMd5;
  1145. Sha sha = ssl->hashSha;
  1146. #ifndef NO_SHA256
  1147. Sha256 sha256;
  1148. InitSha256(&sha256);
  1149. if (IsAtLeastTLSv1_2(ssl))
  1150. sha256 = ssl->hashSha256;
  1151. #endif
  1152. if (ssl->options.tls)
  1153. BuildTlsFinished(ssl, hashes, sender);
  1154. else {
  1155. BuildMD5(ssl, hashes, sender);
  1156. BuildSHA(ssl, hashes, sender);
  1157. }
  1158. /* restore */
  1159. ssl->hashMd5 = md5;
  1160. ssl->hashSha = sha;
  1161. #ifndef NO_SHA256
  1162. if (IsAtLeastTLSv1_2(ssl))
  1163. ssl->hashSha256 = sha256;
  1164. #endif
  1165. }
  1166. static int DoCertificate(CYASSL* ssl, byte* input, word32* inOutIdx)
  1167. {
  1168. word32 listSz, i = *inOutIdx;
  1169. int ret = 0;
  1170. int anyError = 0;
  1171. int totalCerts = 0; /* number of certs in certs buffer */
  1172. int count;
  1173. char domain[ASN_NAME_MAX];
  1174. buffer certs[MAX_CHAIN_DEPTH];
  1175. #ifdef CYASSL_CALLBACKS
  1176. if (ssl->hsInfoOn) AddPacketName("Certificate", &ssl->handShakeInfo);
  1177. if (ssl->toInfoOn) AddLateName("Certificate", &ssl->timeoutInfo);
  1178. #endif
  1179. c24to32(&input[i], &listSz);
  1180. i += CERT_HEADER_SZ;
  1181. CYASSL_MSG("Loading peer's cert chain");
  1182. /* first put cert chain into buffer so can verify top down
  1183. we're sent bottom up */
  1184. while (listSz) {
  1185. /* cert size */
  1186. word32 certSz;
  1187. if (totalCerts >= MAX_CHAIN_DEPTH)
  1188. return BUFFER_E;
  1189. c24to32(&input[i], &certSz);
  1190. i += CERT_HEADER_SZ;
  1191. if (listSz > MAX_RECORD_SIZE || certSz > MAX_RECORD_SIZE)
  1192. return BUFFER_E;
  1193. certs[totalCerts].length = certSz;
  1194. certs[totalCerts].buffer = input + i;
  1195. #ifdef SESSION_CERTS
  1196. if (ssl->session.chain.count < MAX_CHAIN_DEPTH &&
  1197. certSz < MAX_X509_SIZE) {
  1198. ssl->session.chain.certs[ssl->session.chain.count].length = certSz;
  1199. XMEMCPY(ssl->session.chain.certs[ssl->session.chain.count].buffer,
  1200. input + i, certSz);
  1201. ssl->session.chain.count++;
  1202. } else {
  1203. CYASSL_MSG("Couldn't store chain cert for session");
  1204. }
  1205. #endif
  1206. i += certSz;
  1207. listSz -= certSz + CERT_HEADER_SZ;
  1208. totalCerts++;
  1209. CYASSL_MSG(" Put another cert into chain");
  1210. }
  1211. count = totalCerts;
  1212. /* verify up to peer's first */
  1213. while (count > 1) {
  1214. buffer myCert = certs[count - 1];
  1215. DecodedCert dCert;
  1216. InitDecodedCert(&dCert, myCert.buffer, myCert.length, ssl->heap);
  1217. ret = ParseCertRelative(&dCert, CERT_TYPE, !ssl->options.verifyNone,
  1218. ssl->ctx->caList);
  1219. if (ret == 0 && !IsCA(ssl->ctx, dCert.subjectHash)) {
  1220. buffer add;
  1221. add.length = myCert.length;
  1222. add.buffer = (byte*)XMALLOC(myCert.length, ssl->heap,
  1223. DYNAMIC_TYPE_CA);
  1224. CYASSL_MSG("Adding CA from chain");
  1225. if (add.buffer == NULL)
  1226. return MEMORY_E;
  1227. XMEMCPY(add.buffer, myCert.buffer, myCert.length);
  1228. ret = AddCA(ssl->ctx, add);
  1229. if (ret == 1) ret = 0; /* SSL_SUCCESS for external */
  1230. }
  1231. else if (ret != 0) {
  1232. CYASSL_MSG("Failed to verify CA from chain");
  1233. (void)ret;
  1234. }
  1235. else {
  1236. CYASSL_MSG("Verified CA from chain and already had it");
  1237. (void)ret;
  1238. }
  1239. if (ret != 0 && anyError == 0)
  1240. anyError = ret; /* save error from last time */
  1241. FreeDecodedCert(&dCert);
  1242. count--;
  1243. }
  1244. /* peer's, may not have one if blank client cert sent by TLSv1.2 */
  1245. if (count) {
  1246. buffer myCert = certs[0];
  1247. DecodedCert dCert;
  1248. CYASSL_MSG("Veriying Peer's cert");
  1249. InitDecodedCert(&dCert, myCert.buffer, myCert.length, ssl->heap);
  1250. ret = ParseCertRelative(&dCert, CERT_TYPE, !ssl->options.verifyNone,
  1251. ssl->ctx->caList);
  1252. if (ret != 0) {
  1253. CYASSL_MSG("Failed to verify Peer's cert");
  1254. (void)ret;
  1255. }
  1256. ssl->options.havePeerCert = 1;
  1257. /* set X509 format */
  1258. #ifdef OPENSSL_EXTRA
  1259. ssl->peerCert.issuer.sz = (int)XSTRLEN(dCert.issuer) + 1;
  1260. XSTRNCPY(ssl->peerCert.issuer.name, dCert.issuer, ASN_NAME_MAX);
  1261. ssl->peerCert.subject.sz = (int)XSTRLEN(dCert.subject) + 1;
  1262. XSTRNCPY(ssl->peerCert.subject.name, dCert.subject, ASN_NAME_MAX);
  1263. XMEMCPY(ssl->peerCert.serial, dCert.serial, EXTERNAL_SERIAL_SIZE);
  1264. ssl->peerCert.serialSz = dCert.serialSz;
  1265. if (dCert.subjectCNLen < ASN_NAME_MAX) {
  1266. XMEMCPY(ssl->peerCert.subjectCN,dCert.subjectCN,dCert.subjectCNLen);
  1267. ssl->peerCert.subjectCN[dCert.subjectCNLen] = '\0';
  1268. }
  1269. else
  1270. ssl->peerCert.subjectCN[0] = '\0';
  1271. #endif
  1272. /* store for callback use */
  1273. if (dCert.subjectCNLen < ASN_NAME_MAX) {
  1274. XMEMCPY(domain, dCert.subjectCN, dCert.subjectCNLen);
  1275. domain[dCert.subjectCNLen] = '\0';
  1276. }
  1277. else
  1278. domain[0] = '\0';
  1279. if (!ssl->options.verifyNone && ssl->buffers.domainName.buffer)
  1280. if (XSTRNCMP((char*)ssl->buffers.domainName.buffer,
  1281. dCert.subjectCN,
  1282. ssl->buffers.domainName.length - 1)) {
  1283. ret = DOMAIN_NAME_MISMATCH; /* try to get peer key still */
  1284. }
  1285. /* decode peer key */
  1286. if (dCert.keyOID == RSAk) {
  1287. word32 idx = 0;
  1288. if (RsaPublicKeyDecode(dCert.publicKey, &idx,
  1289. &ssl->peerRsaKey, dCert.pubKeySize) != 0) {
  1290. ret = PEER_KEY_ERROR;
  1291. }
  1292. ssl->peerRsaKeyPresent = 1;
  1293. }
  1294. #ifdef HAVE_NTRU
  1295. else if (dCert.keyOID == NTRUk) {
  1296. if (dCert.pubKeySize > sizeof(ssl->peerNtruKey)) {
  1297. ret = PEER_KEY_ERROR;
  1298. }
  1299. XMEMCPY(ssl->peerNtruKey, dCert.publicKey, dCert.pubKeySize);
  1300. ssl->peerNtruKeyLen = (word16)dCert.pubKeySize;
  1301. ssl->peerNtruKeyPresent = 1;
  1302. }
  1303. #endif /* HAVE_NTRU */
  1304. #ifdef HAVE_ECC
  1305. else if (dCert.keyOID == ECDSAk) {
  1306. if (ecc_import_x963(dCert.publicKey, dCert.pubKeySize,
  1307. &ssl->peerEccDsaKey) != 0) {
  1308. ret = PEER_KEY_ERROR;
  1309. }
  1310. ssl->peerEccDsaKeyPresent = 1;
  1311. }
  1312. #endif /* HAVE_ECC */
  1313. FreeDecodedCert(&dCert);
  1314. }
  1315. if (anyError != 0 && ret == 0)
  1316. ret = anyError;
  1317. if (ret == 0 && ssl->options.side == CLIENT_END)
  1318. ssl->options.serverState = SERVER_CERT_COMPLETE;
  1319. if (ret != 0) {
  1320. if (!ssl->options.verifyNone) {
  1321. int why = bad_certificate;
  1322. if (ret == ASN_AFTER_DATE_E || ret == ASN_BEFORE_DATE_E)
  1323. why = certificate_expired;
  1324. if (ssl->verifyCallback) {
  1325. int ok;
  1326. CYASSL_X509_STORE_CTX store;
  1327. store.error = ret;
  1328. store.error_depth = totalCerts;
  1329. store.domain = domain;
  1330. #ifdef OPENSSL_EXTRA
  1331. store.current_cert = &ssl->peerCert;
  1332. #else
  1333. store.current_cert = NULL;
  1334. #endif
  1335. ok = ssl->verifyCallback(0, &store);
  1336. if (ok) {
  1337. CYASSL_MSG("Verify callback overriding error!");
  1338. ret = 0;
  1339. }
  1340. }
  1341. if (ret != 0) {
  1342. SendAlert(ssl, alert_fatal, why); /* try to send */
  1343. ssl->options.isClosed = 1;
  1344. }
  1345. }
  1346. ssl->error = ret;
  1347. }
  1348. *inOutIdx = i;
  1349. return ret;
  1350. }
  1351. int DoFinished(CYASSL* ssl, const byte* input, word32* inOutIdx, int sniff)
  1352. {
  1353. byte verifyMAC[SHA256_DIGEST_SIZE];
  1354. int finishedSz = ssl->options.tls ? TLS_FINISHED_SZ : FINISHED_SZ;
  1355. int headerSz = HANDSHAKE_HEADER_SZ;
  1356. word32 macSz = finishedSz + HANDSHAKE_HEADER_SZ,
  1357. idx = *inOutIdx,
  1358. padSz = ssl->keys.encryptSz - HANDSHAKE_HEADER_SZ - finishedSz -
  1359. ssl->specs.hash_size;
  1360. const byte* mac;
  1361. #ifdef CYASSL_DTLS
  1362. if (ssl->options.dtls) {
  1363. headerSz += DTLS_HANDSHAKE_EXTRA;
  1364. macSz += DTLS_HANDSHAKE_EXTRA;
  1365. padSz -= DTLS_HANDSHAKE_EXTRA;
  1366. }
  1367. #endif
  1368. #ifdef CYASSL_CALLBACKS
  1369. if (ssl->hsInfoOn) AddPacketName("Finished", &ssl->handShakeInfo);
  1370. if (ssl->toInfoOn) AddLateName("Finished", &ssl->timeoutInfo);
  1371. #endif
  1372. if (sniff == NO_SNIFF) {
  1373. if (XMEMCMP(input + idx, &ssl->verifyHashes, finishedSz)) {
  1374. CYASSL_MSG("Verify finished error on hashes");
  1375. return VERIFY_FINISHED_ERROR;
  1376. }
  1377. }
  1378. ssl->hmac(ssl, verifyMAC, input + idx - headerSz, macSz,
  1379. handshake, 1);
  1380. idx += finishedSz;
  1381. /* read mac and fill */
  1382. mac = input + idx;
  1383. idx += ssl->specs.hash_size;
  1384. if (ssl->options.tls1_1 && ssl->specs.cipher_type == block)
  1385. padSz -= ssl->specs.block_size;
  1386. idx += padSz;
  1387. /* verify mac */
  1388. if (XMEMCMP(mac, verifyMAC, ssl->specs.hash_size)) {
  1389. CYASSL_MSG("Verify finished error on mac");
  1390. return VERIFY_MAC_ERROR;
  1391. }
  1392. if (ssl->options.side == CLIENT_END) {
  1393. ssl->options.serverState = SERVER_FINISHED_COMPLETE;
  1394. if (!ssl->options.resuming)
  1395. ssl->options.handShakeState = HANDSHAKE_DONE;
  1396. }
  1397. else {
  1398. ssl->options.clientState = CLIENT_FINISHED_COMPLETE;
  1399. if (ssl->options.resuming)
  1400. ssl->options.handShakeState = HANDSHAKE_DONE;
  1401. }
  1402. *inOutIdx = idx;
  1403. return 0;
  1404. }
  1405. static int DoHandShakeMsg(CYASSL* ssl, byte* input, word32* inOutIdx,
  1406. word32 totalSz)
  1407. {
  1408. byte type;
  1409. word32 size;
  1410. int ret = 0;
  1411. CYASSL_ENTER("DoHandShakeMsg()");
  1412. if (GetHandShakeHeader(ssl, input, inOutIdx, &type, &size) != 0)
  1413. return PARSE_ERROR;
  1414. if (*inOutIdx + size > totalSz)
  1415. return INCOMPLETE_DATA;
  1416. HashInput(ssl, input + *inOutIdx, size);
  1417. #ifdef CYASSL_CALLBACKS
  1418. /* add name later, add on record and handshake header part back on */
  1419. if (ssl->toInfoOn) {
  1420. int add = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  1421. AddPacketInfo(0, &ssl->timeoutInfo, input + *inOutIdx - add,
  1422. size + add, ssl->heap);
  1423. AddLateRecordHeader(&ssl->curRL, &ssl->timeoutInfo);
  1424. }
  1425. #endif
  1426. switch (type) {
  1427. #ifndef NO_CYASSL_CLIENT
  1428. case hello_verify_request:
  1429. CYASSL_MSG("processing hello verify request");
  1430. ret = DoHelloVerifyRequest(ssl, input,inOutIdx);
  1431. break;
  1432. case server_hello:
  1433. CYASSL_MSG("processing server hello");
  1434. ret = DoServerHello(ssl, input, inOutIdx);
  1435. break;
  1436. case certificate_request:
  1437. CYASSL_MSG("processing certificate request");
  1438. ret = DoCertificateRequest(ssl, input, inOutIdx);
  1439. break;
  1440. case server_key_exchange:
  1441. CYASSL_MSG("processing server key exchange");
  1442. ret = DoServerKeyExchange(ssl, input, inOutIdx);
  1443. break;
  1444. #endif
  1445. case certificate:
  1446. CYASSL_MSG("processing certificate");
  1447. ret = DoCertificate(ssl, input, inOutIdx);
  1448. break;
  1449. case server_hello_done:
  1450. CYASSL_MSG("processing server hello done");
  1451. #ifdef CYASSL_CALLBACKS
  1452. if (ssl->hsInfoOn)
  1453. AddPacketName("ServerHelloDone", &ssl->handShakeInfo);
  1454. if (ssl->toInfoOn)
  1455. AddLateName("ServerHelloDone", &ssl->timeoutInfo);
  1456. #endif
  1457. ssl->options.serverState = SERVER_HELLODONE_COMPLETE;
  1458. break;
  1459. case finished:
  1460. CYASSL_MSG("processing finished");
  1461. ret = DoFinished(ssl, input, inOutIdx, NO_SNIFF);
  1462. break;
  1463. #ifndef NO_CYASSL_SERVER
  1464. case client_hello:
  1465. CYASSL_MSG("processing client hello");
  1466. ret = DoClientHello(ssl, input, inOutIdx, totalSz, size);
  1467. break;
  1468. case client_key_exchange:
  1469. CYASSL_MSG("processing client key exchange");
  1470. ret = DoClientKeyExchange(ssl, input, inOutIdx);
  1471. break;
  1472. case certificate_verify:
  1473. CYASSL_MSG("processing certificate verify");
  1474. ret = DoCertificateVerify(ssl, input, inOutIdx, totalSz);
  1475. break;
  1476. #endif
  1477. default:
  1478. CYASSL_MSG("Unknown handshake message type");
  1479. ret = UNKNOWN_HANDSHAKE_TYPE;
  1480. }
  1481. CYASSL_LEAVE("DoHandShakeMsg()", ret);
  1482. return ret;
  1483. }
  1484. static INLINE void Encrypt(CYASSL* ssl, byte* out, const byte* input, word32 sz)
  1485. {
  1486. switch (ssl->specs.bulk_cipher_algorithm) {
  1487. #ifdef BUILD_ARC4
  1488. case rc4:
  1489. Arc4Process(&ssl->encrypt.arc4, out, input, sz);
  1490. break;
  1491. #endif
  1492. #ifdef BUILD_DES3
  1493. case triple_des:
  1494. Des3_CbcEncrypt(&ssl->encrypt.des3, out, input, sz);
  1495. break;
  1496. #endif
  1497. #ifdef BUILD_AES
  1498. case aes:
  1499. #ifdef CYASSL_AESNI
  1500. if ((word)input % 16) {
  1501. byte buffer[MAX_RECORD_SIZE + MAX_COMP_EXTRA+MAX_MSG_EXTRA];
  1502. XMEMCPY(buffer, input, sz);
  1503. AesCbcEncrypt(&ssl->encrypt.aes, buffer, buffer, sz);
  1504. XMEMCPY(out, buffer, sz);
  1505. break;
  1506. }
  1507. #endif
  1508. AesCbcEncrypt(&ssl->encrypt.aes, out, input, sz);
  1509. break;
  1510. #endif
  1511. #ifdef HAVE_HC128
  1512. case hc128:
  1513. Hc128_Process(&ssl->encrypt.hc128, out, input, sz);
  1514. break;
  1515. #endif
  1516. #ifdef BUILD_RABBIT
  1517. case rabbit:
  1518. RabbitProcess(&ssl->encrypt.rabbit, out, input, sz);
  1519. break;
  1520. #endif
  1521. default:
  1522. CYASSL_MSG("CyaSSL Encrypt programming error");
  1523. }
  1524. }
  1525. static INLINE void Decrypt(CYASSL* ssl, byte* plain, const byte* input,
  1526. word32 sz)
  1527. {
  1528. switch (ssl->specs.bulk_cipher_algorithm) {
  1529. #ifdef BUILD_ARC4
  1530. case rc4:
  1531. Arc4Process(&ssl->decrypt.arc4, plain, input, sz);
  1532. break;
  1533. #endif
  1534. #ifdef BUILD_DES3
  1535. case triple_des:
  1536. Des3_CbcDecrypt(&ssl->decrypt.des3, plain, input, sz);
  1537. break;
  1538. #endif
  1539. #ifdef BUILD_AES
  1540. case aes:
  1541. AesCbcDecrypt(&ssl->decrypt.aes, plain, input, sz);
  1542. break;
  1543. #endif
  1544. #ifdef HAVE_HC128
  1545. case hc128:
  1546. Hc128_Process(&ssl->decrypt.hc128, plain, input, sz);
  1547. break;
  1548. #endif
  1549. #ifdef BUILD_RABBIT
  1550. case rabbit:
  1551. RabbitProcess(&ssl->decrypt.rabbit, plain, input, sz);
  1552. break;
  1553. #endif
  1554. default:
  1555. CYASSL_MSG("CyaSSL Decrypt programming error");
  1556. }
  1557. }
  1558. /* decrypt input message in place */
  1559. static int DecryptMessage(CYASSL* ssl, byte* input, word32 sz, word32* idx)
  1560. {
  1561. Decrypt(ssl, input, input, sz);
  1562. ssl->keys.encryptSz = sz;
  1563. if (ssl->options.tls1_1 && ssl->specs.cipher_type == block)
  1564. *idx += ssl->specs.block_size; /* go past TLSv1.1 IV */
  1565. return 0;
  1566. }
  1567. static INLINE word32 GetSEQIncrement(CYASSL* ssl, int verify)
  1568. {
  1569. if (verify)
  1570. return ssl->keys.peer_sequence_number++;
  1571. else
  1572. return ssl->keys.sequence_number++;
  1573. }
  1574. int DoApplicationData(CYASSL* ssl, byte* input, word32* inOutIdx)
  1575. {
  1576. word32 msgSz = ssl->keys.encryptSz;
  1577. word32 pad = 0,
  1578. padByte = 0,
  1579. idx = *inOutIdx,
  1580. digestSz = ssl->specs.hash_size;
  1581. int dataSz;
  1582. int ivExtra = 0;
  1583. byte* rawData = input + idx; /* keep current for hmac */
  1584. #ifdef HAVE_LIBZ
  1585. byte decomp[MAX_RECORD_SIZE + MAX_COMP_EXTRA];
  1586. #endif
  1587. byte verify[SHA256_DIGEST_SIZE];
  1588. const byte* mac;
  1589. if (ssl->specs.cipher_type == block) {
  1590. if (ssl->options.tls1_1)
  1591. ivExtra = ssl->specs.block_size;
  1592. pad = *(input + idx + msgSz - ivExtra - 1);
  1593. padByte = 1;
  1594. }
  1595. dataSz = msgSz - ivExtra - digestSz - pad - padByte;
  1596. if (dataSz < 0) {
  1597. CYASSL_MSG("App data buffer error, malicious input?");
  1598. return BUFFER_ERROR;
  1599. }
  1600. /* read data */
  1601. if (dataSz) {
  1602. int rawSz = dataSz; /* keep raw size for hmac */
  1603. ssl->hmac(ssl, verify, rawData, rawSz, application_data, 1);
  1604. #ifdef HAVE_LIBZ
  1605. if (ssl->options.usingCompression) {
  1606. dataSz = DeCompress(ssl, rawData, dataSz, decomp, sizeof(decomp));
  1607. if (dataSz < 0) return dataSz;
  1608. }
  1609. #endif
  1610. if (ssl->options.usingCompression)
  1611. idx += rawSz;
  1612. else
  1613. idx += dataSz;
  1614. ssl->buffers.clearOutputBuffer.buffer = rawData;
  1615. ssl->buffers.clearOutputBuffer.length = dataSz;
  1616. }
  1617. /* read mac and fill */
  1618. mac = input + idx;
  1619. idx += digestSz;
  1620. idx += pad;
  1621. if (padByte)
  1622. idx++;
  1623. #ifdef HAVE_LIBZ
  1624. if (ssl->options.usingCompression)
  1625. XMEMMOVE(rawData, decomp, dataSz);
  1626. #endif
  1627. /* verify */
  1628. if (dataSz) {
  1629. if (XMEMCMP(mac, verify, digestSz)) {
  1630. CYASSL_MSG("App data verify mac error");
  1631. return VERIFY_MAC_ERROR;
  1632. }
  1633. }
  1634. else
  1635. GetSEQIncrement(ssl, 1); /* even though no data, increment verify */
  1636. *inOutIdx = idx;
  1637. return 0;
  1638. }
  1639. /* process alert, return level */
  1640. static int DoAlert(CYASSL* ssl, byte* input, word32* inOutIdx, int* type)
  1641. {
  1642. byte level;
  1643. #ifdef CYASSL_CALLBACKS
  1644. if (ssl->hsInfoOn)
  1645. AddPacketName("Alert", &ssl->handShakeInfo);
  1646. if (ssl->toInfoOn)
  1647. /* add record header back on to info + 2 byte level, data */
  1648. AddPacketInfo("Alert", &ssl->timeoutInfo, input + *inOutIdx -
  1649. RECORD_HEADER_SZ, 2 + RECORD_HEADER_SZ, ssl->heap);
  1650. #endif
  1651. level = input[(*inOutIdx)++];
  1652. *type = (int)input[(*inOutIdx)++];
  1653. CYASSL_MSG("Got alert");
  1654. if (*type == close_notify) {
  1655. CYASSL_MSG(" close notify");
  1656. ssl->options.closeNotify = 1;
  1657. }
  1658. CYASSL_ERROR(*type);
  1659. if (ssl->keys.encryptionOn) {
  1660. int aSz = ALERT_SIZE;
  1661. const byte* mac;
  1662. byte verify[SHA256_DIGEST_SIZE];
  1663. int padSz = ssl->keys.encryptSz - aSz - ssl->specs.hash_size;
  1664. ssl->hmac(ssl, verify, input + *inOutIdx - aSz, aSz, alert, 1);
  1665. /* read mac and fill */
  1666. mac = input + *inOutIdx;
  1667. *inOutIdx += (ssl->specs.hash_size + padSz);
  1668. /* verify */
  1669. if (XMEMCMP(mac, verify, ssl->specs.hash_size)) {
  1670. CYASSL_MSG(" alert verify mac error");
  1671. return VERIFY_MAC_ERROR;
  1672. }
  1673. }
  1674. return level;
  1675. }
  1676. static int GetInputData(CYASSL *ssl, word32 size)
  1677. {
  1678. int in;
  1679. int inSz;
  1680. int maxLength;
  1681. int usedLength;
  1682. /* check max input length */
  1683. usedLength = ssl->buffers.inputBuffer.length - ssl->buffers.inputBuffer.idx;
  1684. maxLength = ssl->buffers.inputBuffer.bufferSize - usedLength;
  1685. inSz = (int)(size - usedLength); /* from last partial read */
  1686. #ifdef CYASSL_DTLS
  1687. if (ssl->options.dtls)
  1688. inSz = MAX_MTU; /* read ahead up to MTU */
  1689. #endif
  1690. if (inSz > maxLength) {
  1691. if (GrowInputBuffer(ssl, size, usedLength) < 0)
  1692. return MEMORY_E;
  1693. }
  1694. if (inSz <= 0)
  1695. return BUFFER_ERROR;
  1696. /* Put buffer data at start if not there */
  1697. if (usedLength > 0 && ssl->buffers.inputBuffer.idx != 0)
  1698. XMEMMOVE(ssl->buffers.inputBuffer.buffer,
  1699. ssl->buffers.inputBuffer.buffer + ssl->buffers.inputBuffer.idx,
  1700. usedLength);
  1701. /* remove processed data */
  1702. ssl->buffers.inputBuffer.idx = 0;
  1703. ssl->buffers.inputBuffer.length = usedLength;
  1704. /* read data from network */
  1705. do {
  1706. in = Receive(ssl,
  1707. ssl->buffers.inputBuffer.buffer +
  1708. ssl->buffers.inputBuffer.length,
  1709. inSz);
  1710. if (in == -1)
  1711. return SOCKET_ERROR_E;
  1712. if (in == WANT_READ)
  1713. return WANT_READ;
  1714. ssl->buffers.inputBuffer.length += in;
  1715. inSz -= in;
  1716. } while (ssl->buffers.inputBuffer.length < size);
  1717. return 0;
  1718. }
  1719. /* process input requests, return 0 is done, 1 is call again to complete, and
  1720. negative number is error */
  1721. int ProcessReply(CYASSL* ssl)
  1722. {
  1723. int ret, type, readSz;
  1724. word32 startIdx = 0;
  1725. #ifndef NO_CYASSL_SERVER
  1726. byte b0, b1;
  1727. #endif
  1728. #ifdef CYASSL_DTLS
  1729. int used;
  1730. #endif
  1731. for (;;) {
  1732. switch ((processReply)ssl->options.processReply) {
  1733. /* in the CYASSL_SERVER case, get the first byte for detecting
  1734. * old client hello */
  1735. case doProcessInit:
  1736. readSz = RECORD_HEADER_SZ;
  1737. #ifdef CYASSL_DTLS
  1738. if (ssl->options.dtls)
  1739. readSz = DTLS_RECORD_HEADER_SZ;
  1740. #endif
  1741. /* get header or return error */
  1742. if (!ssl->options.dtls) {
  1743. if ((ret = GetInputData(ssl, readSz)) < 0)
  1744. return ret;
  1745. } else {
  1746. #ifdef CYASSL_DTLS
  1747. /* read ahead may already have header */
  1748. used = ssl->buffers.inputBuffer.length -
  1749. ssl->buffers.inputBuffer.idx;
  1750. if (used < readSz)
  1751. if ((ret = GetInputData(ssl, readSz)) < 0)
  1752. return ret;
  1753. #endif
  1754. }
  1755. #ifndef NO_CYASSL_SERVER
  1756. /* see if sending SSLv2 client hello */
  1757. if ( ssl->options.side == SERVER_END &&
  1758. ssl->options.clientState == NULL_STATE &&
  1759. ssl->buffers.inputBuffer.buffer[ssl->buffers.inputBuffer.idx]
  1760. != handshake) {
  1761. ssl->options.processReply = runProcessOldClientHello;
  1762. /* how many bytes need ProcessOldClientHello */
  1763. b0 =
  1764. ssl->buffers.inputBuffer.buffer[ssl->buffers.inputBuffer.idx++];
  1765. b1 =
  1766. ssl->buffers.inputBuffer.buffer[ssl->buffers.inputBuffer.idx++];
  1767. ssl->curSize = ((b0 & 0x7f) << 8) | b1;
  1768. }
  1769. else {
  1770. ssl->options.processReply = getRecordLayerHeader;
  1771. continue;
  1772. }
  1773. /* in the CYASSL_SERVER case, run the old client hello */
  1774. case runProcessOldClientHello:
  1775. /* get sz bytes or return error */
  1776. if (!ssl->options.dtls) {
  1777. if ((ret = GetInputData(ssl, ssl->curSize)) < 0)
  1778. return ret;
  1779. } else {
  1780. #ifdef CYASSL_DTLS
  1781. /* read ahead may already have */
  1782. used = ssl->buffers.inputBuffer.length -
  1783. ssl->buffers.inputBuffer.idx;
  1784. if (used < ssl->curSize)
  1785. if ((ret = GetInputData(ssl, ssl->curSize)) < 0)
  1786. return ret;
  1787. #endif /* CYASSL_DTLS */
  1788. }
  1789. ret = ProcessOldClientHello(ssl, ssl->buffers.inputBuffer.buffer,
  1790. &ssl->buffers.inputBuffer.idx,
  1791. ssl->buffers.inputBuffer.length -
  1792. ssl->buffers.inputBuffer.idx,
  1793. ssl->curSize);
  1794. if (ret < 0)
  1795. return ret;
  1796. else if (ssl->buffers.inputBuffer.idx ==
  1797. ssl->buffers.inputBuffer.length) {
  1798. ssl->options.processReply = doProcessInit;
  1799. return 0;
  1800. }
  1801. #endif /* NO_CYASSL_SERVER */
  1802. /* get the record layer header */
  1803. case getRecordLayerHeader:
  1804. ret = GetRecordHeader(ssl, ssl->buffers.inputBuffer.buffer,
  1805. &ssl->buffers.inputBuffer.idx,
  1806. &ssl->curRL, &ssl->curSize);
  1807. if (ret != 0)
  1808. return ret;
  1809. ssl->options.processReply = getData;
  1810. /* retrieve record layer data */
  1811. case getData:
  1812. /* get sz bytes or return error */
  1813. if (!ssl->options.dtls) {
  1814. if ((ret = GetInputData(ssl, ssl->curSize)) < 0)
  1815. return ret;
  1816. } else {
  1817. #ifdef CYASSL_DTLS
  1818. /* read ahead may already have */
  1819. used = ssl->buffers.inputBuffer.length -
  1820. ssl->buffers.inputBuffer.idx;
  1821. if (used < ssl->curSize)
  1822. if ((ret = GetInputData(ssl, ssl->curSize)) < 0)
  1823. return ret;
  1824. #endif
  1825. }
  1826. ssl->options.processReply = runProcessingOneMessage;
  1827. startIdx = ssl->buffers.inputBuffer.idx; /* in case > 1 msg per */
  1828. /* the record layer is here */
  1829. case runProcessingOneMessage:
  1830. if (ssl->keys.encryptionOn)
  1831. if (DecryptMessage(ssl, ssl->buffers.inputBuffer.buffer +
  1832. ssl->buffers.inputBuffer.idx,
  1833. ssl->curSize,
  1834. &ssl->buffers.inputBuffer.idx) < 0)
  1835. return DECRYPT_ERROR;
  1836. CYASSL_MSG("received record layer msg");
  1837. switch (ssl->curRL.type) {
  1838. case handshake :
  1839. /* debugging in DoHandShakeMsg */
  1840. if ((ret = DoHandShakeMsg(ssl,
  1841. ssl->buffers.inputBuffer.buffer,
  1842. &ssl->buffers.inputBuffer.idx,
  1843. ssl->buffers.inputBuffer.length))
  1844. != 0)
  1845. return ret;
  1846. break;
  1847. case change_cipher_spec:
  1848. CYASSL_MSG("got CHANGE CIPHER SPEC");
  1849. #ifdef CYASSL_CALLBACKS
  1850. if (ssl->hsInfoOn)
  1851. AddPacketName("ChangeCipher", &ssl->handShakeInfo);
  1852. /* add record header back on info */
  1853. if (ssl->toInfoOn) {
  1854. AddPacketInfo("ChangeCipher", &ssl->timeoutInfo,
  1855. ssl->buffers.inputBuffer.buffer +
  1856. ssl->buffers.inputBuffer.idx - RECORD_HEADER_SZ,
  1857. 1 + RECORD_HEADER_SZ, ssl->heap);
  1858. AddLateRecordHeader(&ssl->curRL, &ssl->timeoutInfo);
  1859. }
  1860. #endif
  1861. ssl->buffers.inputBuffer.idx++;
  1862. ssl->keys.encryptionOn = 1;
  1863. #ifdef CYASSL_DTLS
  1864. if (ssl->options.dtls)
  1865. ssl->keys.dtls_peer_epoch++;
  1866. #endif
  1867. #ifdef HAVE_LIBZ
  1868. if (ssl->options.usingCompression)
  1869. if ( (ret = InitStreams(ssl)) != 0)
  1870. return ret;
  1871. #endif
  1872. if (ssl->options.resuming && ssl->options.side ==
  1873. CLIENT_END)
  1874. BuildFinished(ssl, &ssl->verifyHashes, server);
  1875. else if (!ssl->options.resuming && ssl->options.side ==
  1876. SERVER_END)
  1877. BuildFinished(ssl, &ssl->verifyHashes, client);
  1878. break;
  1879. case application_data:
  1880. CYASSL_MSG("got app DATA");
  1881. if ((ret = DoApplicationData(ssl,
  1882. ssl->buffers.inputBuffer.buffer,
  1883. &ssl->buffers.inputBuffer.idx))
  1884. != 0) {
  1885. CYASSL_ERROR(ret);
  1886. return ret;
  1887. }
  1888. break;
  1889. case alert:
  1890. CYASSL_MSG("got ALERT!");
  1891. if (DoAlert(ssl, ssl->buffers.inputBuffer.buffer,
  1892. &ssl->buffers.inputBuffer.idx, &type) == alert_fatal)
  1893. return FATAL_ERROR;
  1894. /* catch warnings that are handled as errors */
  1895. if (type == close_notify)
  1896. return ssl->error = ZERO_RETURN;
  1897. if (type == decrypt_error)
  1898. return FATAL_ERROR;
  1899. break;
  1900. default:
  1901. CYASSL_ERROR(UNKNOWN_RECORD_TYPE);
  1902. return UNKNOWN_RECORD_TYPE;
  1903. }
  1904. ssl->options.processReply = doProcessInit;
  1905. /* input exhausted? */
  1906. if (ssl->buffers.inputBuffer.idx == ssl->buffers.inputBuffer.length)
  1907. return 0;
  1908. /* more messages per record */
  1909. else if ((ssl->buffers.inputBuffer.idx - startIdx) < ssl->curSize) {
  1910. CYASSL_MSG("More messages in record");
  1911. #ifdef CYASSL_DTLS
  1912. /* read-ahead but dtls doesn't bundle messages per record */
  1913. if (ssl->options.dtls) {
  1914. ssl->options.processReply = doProcessInit;
  1915. continue;
  1916. }
  1917. #endif
  1918. ssl->options.processReply = runProcessingOneMessage;
  1919. continue;
  1920. }
  1921. /* more records */
  1922. else {
  1923. CYASSL_MSG("More records in input");
  1924. ssl->options.processReply = doProcessInit;
  1925. continue;
  1926. }
  1927. default:
  1928. CYASSL_MSG("Bad process input state, programming error");
  1929. return INPUT_CASE_ERROR;
  1930. }
  1931. }
  1932. }
  1933. int SendChangeCipher(CYASSL* ssl)
  1934. {
  1935. byte *output;
  1936. int sendSz = RECORD_HEADER_SZ + ENUM_LEN;
  1937. int idx = RECORD_HEADER_SZ;
  1938. int ret;
  1939. #ifdef CYASSL_DTLS
  1940. if (ssl->options.dtls) {
  1941. sendSz += DTLS_RECORD_EXTRA;
  1942. idx += DTLS_RECORD_EXTRA;
  1943. }
  1944. #endif
  1945. /* check for avalaible size */
  1946. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  1947. return ret;
  1948. /* get ouput buffer */
  1949. output = ssl->buffers.outputBuffer.buffer +
  1950. ssl->buffers.outputBuffer.idx;
  1951. AddRecordHeader(output, 1, change_cipher_spec, ssl);
  1952. output[idx] = 1; /* turn it on */
  1953. #ifdef CYASSL_CALLBACKS
  1954. if (ssl->hsInfoOn) AddPacketName("ChangeCipher", &ssl->handShakeInfo);
  1955. if (ssl->toInfoOn)
  1956. AddPacketInfo("ChangeCipher", &ssl->timeoutInfo, output, sendSz,
  1957. ssl->heap);
  1958. #endif
  1959. ssl->buffers.outputBuffer.length += sendSz;
  1960. return SendBuffered(ssl);
  1961. }
  1962. static INLINE const byte* GetMacSecret(CYASSL* ssl, int verify)
  1963. {
  1964. if ( (ssl->options.side == CLIENT_END && !verify) ||
  1965. (ssl->options.side == SERVER_END && verify) )
  1966. return ssl->keys.client_write_MAC_secret;
  1967. else
  1968. return ssl->keys.server_write_MAC_secret;
  1969. }
  1970. static void Hmac(CYASSL* ssl, byte* digest, const byte* in, word32 sz,
  1971. int content, int verify)
  1972. {
  1973. byte result[SHA256_DIGEST_SIZE]; /* max possible sizes */
  1974. word32 digestSz = ssl->specs.hash_size; /* actual sizes */
  1975. word32 padSz = ssl->specs.pad_size;
  1976. Md5 md5;
  1977. Sha sha;
  1978. /* data */
  1979. byte seq[SEQ_SZ] = { 0x00, 0x00, 0x00, 0x00 };
  1980. byte conLen[ENUM_LEN + LENGTH_SZ]; /* content & length */
  1981. const byte* macSecret = GetMacSecret(ssl, verify);
  1982. conLen[0] = (byte)content;
  1983. c16toa((word16)sz, &conLen[ENUM_LEN]);
  1984. c32toa(GetSEQIncrement(ssl, verify), &seq[sizeof(word32)]);
  1985. if (ssl->specs.mac_algorithm == md5_mac) {
  1986. InitMd5(&md5);
  1987. /* inner */
  1988. Md5Update(&md5, macSecret, digestSz);
  1989. Md5Update(&md5, PAD1, padSz);
  1990. Md5Update(&md5, seq, SEQ_SZ);
  1991. Md5Update(&md5, conLen, sizeof(conLen));
  1992. /* in buffer */
  1993. Md5Update(&md5, in, sz);
  1994. Md5Final(&md5, result);
  1995. /* outer */
  1996. Md5Update(&md5, macSecret, digestSz);
  1997. Md5Update(&md5, PAD2, padSz);
  1998. Md5Update(&md5, result, digestSz);
  1999. Md5Final(&md5, digest);
  2000. }
  2001. else {
  2002. InitSha(&sha);
  2003. /* inner */
  2004. ShaUpdate(&sha, macSecret, digestSz);
  2005. ShaUpdate(&sha, PAD1, padSz);
  2006. ShaUpdate(&sha, seq, SEQ_SZ);
  2007. ShaUpdate(&sha, conLen, sizeof(conLen));
  2008. /* in buffer */
  2009. ShaUpdate(&sha, in, sz);
  2010. ShaFinal(&sha, result);
  2011. /* outer */
  2012. ShaUpdate(&sha, macSecret, digestSz);
  2013. ShaUpdate(&sha, PAD2, padSz);
  2014. ShaUpdate(&sha, result, digestSz);
  2015. ShaFinal(&sha, digest);
  2016. }
  2017. }
  2018. static void BuildMD5_CertVerify(CYASSL* ssl, byte* digest)
  2019. {
  2020. byte md5_result[MD5_DIGEST_SIZE];
  2021. /* make md5 inner */
  2022. Md5Update(&ssl->hashMd5, ssl->arrays.masterSecret, SECRET_LEN);
  2023. Md5Update(&ssl->hashMd5, PAD1, PAD_MD5);
  2024. Md5Final(&ssl->hashMd5, md5_result);
  2025. /* make md5 outer */
  2026. Md5Update(&ssl->hashMd5, ssl->arrays.masterSecret, SECRET_LEN);
  2027. Md5Update(&ssl->hashMd5, PAD2, PAD_MD5);
  2028. Md5Update(&ssl->hashMd5, md5_result, MD5_DIGEST_SIZE);
  2029. Md5Final(&ssl->hashMd5, digest);
  2030. }
  2031. static void BuildSHA_CertVerify(CYASSL* ssl, byte* digest)
  2032. {
  2033. byte sha_result[SHA_DIGEST_SIZE];
  2034. /* make sha inner */
  2035. ShaUpdate(&ssl->hashSha, ssl->arrays.masterSecret, SECRET_LEN);
  2036. ShaUpdate(&ssl->hashSha, PAD1, PAD_SHA);
  2037. ShaFinal(&ssl->hashSha, sha_result);
  2038. /* make sha outer */
  2039. ShaUpdate(&ssl->hashSha, ssl->arrays.masterSecret, SECRET_LEN);
  2040. ShaUpdate(&ssl->hashSha, PAD2, PAD_SHA);
  2041. ShaUpdate(&ssl->hashSha, sha_result, SHA_DIGEST_SIZE);
  2042. ShaFinal(&ssl->hashSha, digest);
  2043. }
  2044. static void BuildCertHashes(CYASSL* ssl, Hashes* hashes)
  2045. {
  2046. /* store current states, building requires get_digest which resets state */
  2047. Md5 md5 = ssl->hashMd5;
  2048. Sha sha = ssl->hashSha;
  2049. #ifndef NO_SHA256 /* for possible future changes */
  2050. Sha256 sha256;
  2051. InitSha256(&sha256);
  2052. if (IsAtLeastTLSv1_2(ssl))
  2053. sha256 = ssl->hashSha256;
  2054. #endif
  2055. if (ssl->options.tls) {
  2056. Md5Final(&ssl->hashMd5, hashes->md5);
  2057. ShaFinal(&ssl->hashSha, hashes->sha);
  2058. }
  2059. else {
  2060. BuildMD5_CertVerify(ssl, hashes->md5);
  2061. BuildSHA_CertVerify(ssl, hashes->sha);
  2062. }
  2063. /* restore */
  2064. ssl->hashMd5 = md5;
  2065. ssl->hashSha = sha;
  2066. #ifndef NO_SHA256
  2067. if (IsAtLeastTLSv1_2(ssl))
  2068. ssl->hashSha256 = sha256;
  2069. #endif
  2070. }
  2071. /* Build SSL Message, encrypted */
  2072. static int BuildMessage(CYASSL* ssl, byte* output, const byte* input, int inSz,
  2073. int type)
  2074. {
  2075. word32 digestSz = ssl->specs.hash_size;
  2076. word32 sz = RECORD_HEADER_SZ + inSz + digestSz;
  2077. word32 pad = 0, i;
  2078. word32 idx = RECORD_HEADER_SZ;
  2079. word32 ivSz = 0; /* TLSv1.1 IV */
  2080. word32 headerSz = RECORD_HEADER_SZ;
  2081. word16 size;
  2082. byte iv[AES_BLOCK_SIZE]; /* max size */
  2083. #ifdef CYASSL_DTLS
  2084. if (ssl->options.dtls) {
  2085. sz += DTLS_RECORD_EXTRA;
  2086. idx += DTLS_RECORD_EXTRA;
  2087. headerSz += DTLS_RECORD_EXTRA;
  2088. }
  2089. #endif
  2090. if (ssl->specs.cipher_type == block) {
  2091. word32 blockSz = ssl->specs.block_size;
  2092. if (ssl->options.tls1_1) {
  2093. ivSz = blockSz;
  2094. sz += ivSz;
  2095. RNG_GenerateBlock(&ssl->rng, iv, ivSz);
  2096. }
  2097. sz += 1; /* pad byte */
  2098. pad = (sz - headerSz) % blockSz;
  2099. pad = blockSz - pad;
  2100. sz += pad;
  2101. }
  2102. size = (word16)(sz - headerSz); /* include mac and digest */
  2103. AddRecordHeader(output, size, (byte)type, ssl);
  2104. /* write to output */
  2105. if (ivSz) {
  2106. XMEMCPY(output + idx, iv, ivSz);
  2107. idx += ivSz;
  2108. }
  2109. XMEMCPY(output + idx, input, inSz);
  2110. idx += inSz;
  2111. if (type == handshake)
  2112. HashOutput(ssl, output, headerSz + inSz, ivSz);
  2113. ssl->hmac(ssl, output+idx, output + headerSz + ivSz, inSz, type, 0);
  2114. idx += digestSz;
  2115. if (ssl->specs.cipher_type == block)
  2116. for (i = 0; i <= pad; i++)
  2117. output[idx++] = (byte)pad; /* pad byte gets pad value too */
  2118. Encrypt(ssl, output + headerSz, output + headerSz, size);
  2119. return sz;
  2120. }
  2121. int SendFinished(CYASSL* ssl)
  2122. {
  2123. int sendSz,
  2124. finishedSz = ssl->options.tls ? TLS_FINISHED_SZ :
  2125. FINISHED_SZ;
  2126. byte input[FINISHED_SZ + DTLS_HANDSHAKE_HEADER_SZ]; /* max */
  2127. byte *output;
  2128. Hashes* hashes;
  2129. int ret;
  2130. int headerSz = HANDSHAKE_HEADER_SZ;
  2131. #ifdef CYASSL_DTLS
  2132. if (ssl->options.dtls) {
  2133. headerSz += DTLS_HANDSHAKE_EXTRA;
  2134. ssl->keys.dtls_epoch++;
  2135. ssl->keys.dtls_sequence_number = 0; /* reset after epoch change */
  2136. }
  2137. #endif
  2138. /* check for avalaible size */
  2139. if ((ret = CheckAvalaibleSize(ssl, sizeof(input) + MAX_MSG_EXTRA)) != 0)
  2140. return ret;
  2141. /* get ouput buffer */
  2142. output = ssl->buffers.outputBuffer.buffer +
  2143. ssl->buffers.outputBuffer.idx;
  2144. AddHandShakeHeader(input, finishedSz, finished, ssl);
  2145. /* make finished hashes */
  2146. hashes = (Hashes*)&input[headerSz];
  2147. BuildFinished(ssl, hashes, ssl->options.side == CLIENT_END ? client :
  2148. server);
  2149. if ( (sendSz = BuildMessage(ssl, output, input, headerSz +
  2150. finishedSz, handshake)) < 0)
  2151. return BUILD_MSG_ERROR;
  2152. if (!ssl->options.resuming) {
  2153. #ifndef NO_SESSION_CACHE
  2154. AddSession(ssl); /* just try */
  2155. #endif
  2156. if (ssl->options.side == CLIENT_END)
  2157. BuildFinished(ssl, &ssl->verifyHashes, server);
  2158. else
  2159. ssl->options.handShakeState = HANDSHAKE_DONE;
  2160. }
  2161. else {
  2162. if (ssl->options.side == CLIENT_END)
  2163. ssl->options.handShakeState = HANDSHAKE_DONE;
  2164. else
  2165. BuildFinished(ssl, &ssl->verifyHashes, client);
  2166. }
  2167. #ifdef CYASSL_CALLBACKS
  2168. if (ssl->hsInfoOn) AddPacketName("Finished", &ssl->handShakeInfo);
  2169. if (ssl->toInfoOn)
  2170. AddPacketInfo("Finished", &ssl->timeoutInfo, output, sendSz,
  2171. ssl->heap);
  2172. #endif
  2173. ssl->buffers.outputBuffer.length += sendSz;
  2174. return SendBuffered(ssl);
  2175. }
  2176. int SendCertificate(CYASSL* ssl)
  2177. {
  2178. int sendSz, length, ret = 0;
  2179. word32 i = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  2180. word32 certSz, listSz;
  2181. byte* output = 0;
  2182. if (ssl->options.usingPSK_cipher) return 0; /* not needed */
  2183. if (ssl->options.sendVerify == SEND_BLANK_CERT) {
  2184. certSz = 0;
  2185. length = CERT_HEADER_SZ;
  2186. listSz = 0;
  2187. }
  2188. else {
  2189. certSz = ssl->buffers.certificate.length;
  2190. /* list + cert size */
  2191. length = certSz + 2 * CERT_HEADER_SZ;
  2192. listSz = certSz + CERT_HEADER_SZ;
  2193. /* may need to send rest of chain, already has leading size(s) */
  2194. if (ssl->buffers.certChain.buffer) {
  2195. length += ssl->buffers.certChain.length;
  2196. listSz += ssl->buffers.certChain.length;
  2197. }
  2198. }
  2199. sendSz = length + RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  2200. #ifdef CYASSL_DTLS
  2201. if (ssl->options.dtls) {
  2202. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  2203. i += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  2204. }
  2205. #endif
  2206. /* check for avalaible size */
  2207. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  2208. return ret;
  2209. /* get ouput buffer */
  2210. output = ssl->buffers.outputBuffer.buffer +
  2211. ssl->buffers.outputBuffer.idx;
  2212. AddHeaders(output, length, certificate, ssl);
  2213. /* list total */
  2214. c32to24(listSz, output + i);
  2215. i += CERT_HEADER_SZ;
  2216. /* member */
  2217. if (certSz) {
  2218. c32to24(certSz, output + i);
  2219. i += CERT_HEADER_SZ;
  2220. XMEMCPY(output + i, ssl->buffers.certificate.buffer, certSz);
  2221. i += certSz;
  2222. /* send rest of chain? */
  2223. if (ssl->buffers.certChain.buffer) {
  2224. XMEMCPY(output + i, ssl->buffers.certChain.buffer,
  2225. ssl->buffers.certChain.length);
  2226. i += ssl->buffers.certChain.length;
  2227. }
  2228. }
  2229. HashOutput(ssl, output, sendSz, 0);
  2230. #ifdef CYASSL_CALLBACKS
  2231. if (ssl->hsInfoOn) AddPacketName("Certificate", &ssl->handShakeInfo);
  2232. if (ssl->toInfoOn)
  2233. AddPacketInfo("Certificate", &ssl->timeoutInfo, output, sendSz,
  2234. ssl->heap);
  2235. #endif
  2236. if (ssl->options.side == SERVER_END)
  2237. ssl->options.serverState = SERVER_CERT_COMPLETE;
  2238. ssl->buffers.outputBuffer.length += sendSz;
  2239. return SendBuffered(ssl);
  2240. }
  2241. int SendCertificateRequest(CYASSL* ssl)
  2242. {
  2243. byte *output;
  2244. int ret;
  2245. int sendSz;
  2246. word32 i = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  2247. int typeTotal = 1; /* only rsa for now */
  2248. int reqSz = ENUM_LEN + typeTotal + REQ_HEADER_SZ; /* add auth later */
  2249. if (IsAtLeastTLSv1_2(ssl))
  2250. reqSz += LENGTH_SZ + HASH_SIG_SIZE;
  2251. if (ssl->options.usingPSK_cipher) return 0; /* not needed */
  2252. sendSz = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ + reqSz;
  2253. #ifdef CYASSL_DTLS
  2254. if (ssl->options.dtls) {
  2255. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  2256. i += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  2257. }
  2258. #endif
  2259. /* check for avalaible size */
  2260. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  2261. return ret;
  2262. /* get ouput buffer */
  2263. output = ssl->buffers.outputBuffer.buffer + ssl->buffers.outputBuffer.idx;
  2264. AddHeaders(output, reqSz, certificate_request, ssl);
  2265. /* write to output */
  2266. output[i++] = (byte)typeTotal; /* # of types */
  2267. output[i++] = rsa_sign;
  2268. /* supported hash/sig */
  2269. if (IsAtLeastTLSv1_2(ssl)) {
  2270. c16toa(HASH_SIG_SIZE, &output[i]);
  2271. i += LENGTH_SZ;
  2272. output[i++] = sha_mac; /* hash */
  2273. output[i++] = rsa_sa_algo; /* sig */
  2274. }
  2275. c16toa(0, &output[i]); /* auth's */
  2276. i += REQ_HEADER_SZ;
  2277. HashOutput(ssl, output, sendSz, 0);
  2278. #ifdef CYASSL_CALLBACKS
  2279. if (ssl->hsInfoOn)
  2280. AddPacketName("CertificateRequest", &ssl->handShakeInfo);
  2281. if (ssl->toInfoOn)
  2282. AddPacketInfo("CertificateRequest", &ssl->timeoutInfo, output,
  2283. sendSz, ssl->heap);
  2284. #endif
  2285. ssl->buffers.outputBuffer.length += sendSz;
  2286. return SendBuffered(ssl);
  2287. }
  2288. int SendData(CYASSL* ssl, const void* data, int sz)
  2289. {
  2290. int sent = 0, /* plainText size */
  2291. sendSz,
  2292. ret;
  2293. if (ssl->error == WANT_WRITE)
  2294. ssl->error = 0;
  2295. if (ssl->options.handShakeState != HANDSHAKE_DONE) {
  2296. int err;
  2297. CYASSL_MSG("handshake not complete, trying to finish");
  2298. if ( (err = CyaSSL_negotiate(ssl)) != 0)
  2299. return err;
  2300. }
  2301. /* last time system socket output buffer was full, try again to send */
  2302. if (ssl->buffers.outputBuffer.length > 0) {
  2303. CYASSL_MSG("output buffer was full, trying to send again");
  2304. if ( (ssl->error = SendBuffered(ssl)) < 0) {
  2305. CYASSL_ERROR(ssl->error);
  2306. if (ssl->error == SOCKET_ERROR_E && ssl->options.connReset)
  2307. return 0; /* peer reset */
  2308. return ssl->error;
  2309. }
  2310. else {
  2311. /* advance sent to previous sent + plain size just sent */
  2312. sent = ssl->buffers.prevSent + ssl->buffers.plainSz;
  2313. CYASSL_MSG("sent write buffered data");
  2314. }
  2315. }
  2316. for (;;) {
  2317. int len = min(sz - sent, OUTPUT_RECORD_SIZE);
  2318. byte* out;
  2319. byte* sendBuffer = (byte*)data + sent; /* may switch on comp */
  2320. int buffSz = len; /* may switch on comp */
  2321. #ifdef HAVE_LIBZ
  2322. byte comp[MAX_RECORD_SIZE + MAX_COMP_EXTRA];
  2323. #endif
  2324. if (sent == sz) break;
  2325. #ifdef CYASSL_DTLS
  2326. if (ssl->options.dtls) {
  2327. len = min(len, MAX_UDP_SIZE);
  2328. buffSz = len;
  2329. }
  2330. #endif
  2331. /* check for avalaible size */
  2332. if ((ret = CheckAvalaibleSize(ssl, len + COMP_EXTRA +
  2333. MAX_MSG_EXTRA)) != 0)
  2334. return ret;
  2335. /* get ouput buffer */
  2336. out = ssl->buffers.outputBuffer.buffer +
  2337. ssl->buffers.outputBuffer.idx;
  2338. #ifdef HAVE_LIBZ
  2339. if (ssl->options.usingCompression) {
  2340. buffSz = Compress(ssl, sendBuffer, buffSz, comp, sizeof(comp));
  2341. if (buffSz < 0) {
  2342. return buffSz;
  2343. }
  2344. sendBuffer = comp;
  2345. }
  2346. #endif
  2347. sendSz = BuildMessage(ssl, out, sendBuffer, buffSz,
  2348. application_data);
  2349. ssl->buffers.outputBuffer.length += sendSz;
  2350. if ( (ret = SendBuffered(ssl)) < 0) {
  2351. CYASSL_ERROR(ret);
  2352. /* store for next call if WANT_WRITE or user embedSend() that
  2353. doesn't present like WANT_WRITE */
  2354. ssl->buffers.plainSz = len;
  2355. ssl->buffers.prevSent = sent;
  2356. if (ret == SOCKET_ERROR_E && ssl->options.connReset)
  2357. return 0; /* peer reset */
  2358. return ssl->error = ret;
  2359. }
  2360. sent += len;
  2361. /* only one message per attempt */
  2362. if (ssl->options.partialWrite == 1) {
  2363. CYASSL_MSG("Paritial Write on, only sending one record");
  2364. break;
  2365. }
  2366. }
  2367. return sent;
  2368. }
  2369. /* process input data */
  2370. int ReceiveData(CYASSL* ssl, byte* output, int sz)
  2371. {
  2372. int size;
  2373. CYASSL_ENTER("ReceiveData()");
  2374. if (ssl->error == WANT_READ)
  2375. ssl->error = 0;
  2376. if (ssl->options.handShakeState != HANDSHAKE_DONE) {
  2377. int err;
  2378. CYASSL_MSG("Handshake not complete, trying to finish");
  2379. if ( (err = CyaSSL_negotiate(ssl)) != 0)
  2380. return err;
  2381. }
  2382. while (ssl->buffers.clearOutputBuffer.length == 0)
  2383. if ( (ssl->error = ProcessReply(ssl)) < 0) {
  2384. CYASSL_ERROR(ssl->error);
  2385. if (ssl->error == ZERO_RETURN) {
  2386. CYASSL_MSG("Zero return, no more data coming");
  2387. ssl->options.isClosed = 1;
  2388. return 0; /* no more data coming */
  2389. }
  2390. if (ssl->error == SOCKET_ERROR_E) {
  2391. if (ssl->options.connReset || ssl->options.isClosed) {
  2392. CYASSL_MSG("Peer reset or closed, connection done");
  2393. return 0; /* peer reset or closed */
  2394. }
  2395. }
  2396. return ssl->error;
  2397. }
  2398. if (sz < (int)ssl->buffers.clearOutputBuffer.length)
  2399. size = sz;
  2400. else
  2401. size = ssl->buffers.clearOutputBuffer.length;
  2402. XMEMCPY(output, ssl->buffers.clearOutputBuffer.buffer, size);
  2403. ssl->buffers.clearOutputBuffer.length -= size;
  2404. ssl->buffers.clearOutputBuffer.buffer += size;
  2405. if (ssl->buffers.clearOutputBuffer.length == 0 &&
  2406. ssl->buffers.inputBuffer.dynamicFlag)
  2407. ShrinkInputBuffer(ssl, NO_FORCED_FREE);
  2408. CYASSL_LEAVE("ReceiveData()", size);
  2409. return size;
  2410. }
  2411. /* send alert message */
  2412. int SendAlert(CYASSL* ssl, int severity, int type)
  2413. {
  2414. byte input[ALERT_SIZE];
  2415. byte *output;
  2416. int sendSz;
  2417. int ret;
  2418. /* if sendalert is called again for nonbloking */
  2419. if (ssl->options.sendAlertState != 0) {
  2420. ret = SendBuffered(ssl);
  2421. if (ret == 0)
  2422. ssl->options.sendAlertState = 0;
  2423. return ret;
  2424. }
  2425. /* check for avalaible size */
  2426. if ((ret = CheckAvalaibleSize(ssl, ALERT_SIZE + MAX_MSG_EXTRA)) != 0)
  2427. return ret;
  2428. /* get ouput buffer */
  2429. output = ssl->buffers.outputBuffer.buffer +
  2430. ssl->buffers.outputBuffer.idx;
  2431. input[0] = (byte)severity;
  2432. input[1] = (byte)type;
  2433. if (ssl->keys.encryptionOn)
  2434. sendSz = BuildMessage(ssl, output, input, ALERT_SIZE, alert);
  2435. else {
  2436. RecordLayerHeader *const rl = (RecordLayerHeader*)output;
  2437. rl->type = alert;
  2438. rl->version = ssl->version;
  2439. c16toa(ALERT_SIZE, rl->length);
  2440. XMEMCPY(output + RECORD_HEADER_SZ, input, ALERT_SIZE);
  2441. sendSz = RECORD_HEADER_SZ + ALERT_SIZE;
  2442. }
  2443. #ifdef CYASSL_CALLBACKS
  2444. if (ssl->hsInfoOn)
  2445. AddPacketName("Alert", &ssl->handShakeInfo);
  2446. if (ssl->toInfoOn)
  2447. AddPacketInfo("Alert", &ssl->timeoutInfo, output, sendSz,ssl->heap);
  2448. #endif
  2449. ssl->buffers.outputBuffer.length += sendSz;
  2450. ssl->options.sendAlertState = 1;
  2451. return SendBuffered(ssl);
  2452. }
  2453. void SetErrorString(int error, char* str)
  2454. {
  2455. const int max = MAX_ERROR_SZ; /* shorthand */
  2456. #ifdef NO_ERROR_STRINGS
  2457. XSTRNCPY(str, "no support for error strings built in", max);
  2458. #else
  2459. /* pass to CTaoCrypt */
  2460. if (error < MAX_CODE_E && error > MIN_CODE_E) {
  2461. CTaoCryptErrorString(error, str);
  2462. return;
  2463. }
  2464. switch (error) {
  2465. case UNSUPPORTED_SUITE :
  2466. XSTRNCPY(str, "unsupported cipher suite", max);
  2467. break;
  2468. case INPUT_CASE_ERROR :
  2469. XSTRNCPY(str, "input state error", max);
  2470. break;
  2471. case PREFIX_ERROR :
  2472. XSTRNCPY(str, "bad index to key rounds", max);
  2473. break;
  2474. case MEMORY_ERROR :
  2475. XSTRNCPY(str, "out of memory", max);
  2476. break;
  2477. case VERIFY_FINISHED_ERROR :
  2478. XSTRNCPY(str, "verify problem on finished", max);
  2479. break;
  2480. case VERIFY_MAC_ERROR :
  2481. XSTRNCPY(str, "verify mac problem", max);
  2482. break;
  2483. case PARSE_ERROR :
  2484. XSTRNCPY(str, "parse error on header", max);
  2485. break;
  2486. case SIDE_ERROR :
  2487. XSTRNCPY(str, "wrong client/server type", max);
  2488. break;
  2489. case NO_PEER_CERT :
  2490. XSTRNCPY(str, "peer didn't send cert", max);
  2491. break;
  2492. case UNKNOWN_HANDSHAKE_TYPE :
  2493. XSTRNCPY(str, "weird handshake type", max);
  2494. break;
  2495. case SOCKET_ERROR_E :
  2496. XSTRNCPY(str, "error state on socket", max);
  2497. break;
  2498. case SOCKET_NODATA :
  2499. XSTRNCPY(str, "expected data, not there", max);
  2500. break;
  2501. case INCOMPLETE_DATA :
  2502. XSTRNCPY(str, "don't have enough data to complete task", max);
  2503. break;
  2504. case UNKNOWN_RECORD_TYPE :
  2505. XSTRNCPY(str, "unknown type in record hdr", max);
  2506. break;
  2507. case DECRYPT_ERROR :
  2508. XSTRNCPY(str, "error during decryption", max);
  2509. break;
  2510. case FATAL_ERROR :
  2511. XSTRNCPY(str, "revcd alert fatal error", max);
  2512. break;
  2513. case ENCRYPT_ERROR :
  2514. XSTRNCPY(str, "error during encryption", max);
  2515. break;
  2516. case FREAD_ERROR :
  2517. XSTRNCPY(str, "fread problem", max);
  2518. break;
  2519. case NO_PEER_KEY :
  2520. XSTRNCPY(str, "need peer's key", max);
  2521. break;
  2522. case NO_PRIVATE_KEY :
  2523. XSTRNCPY(str, "need the private key", max);
  2524. break;
  2525. case NO_DH_PARAMS :
  2526. XSTRNCPY(str, "server missing DH params", max);
  2527. break;
  2528. case RSA_PRIVATE_ERROR :
  2529. XSTRNCPY(str, "error during rsa priv op", max);
  2530. break;
  2531. case MATCH_SUITE_ERROR :
  2532. XSTRNCPY(str, "can't match cipher suite", max);
  2533. break;
  2534. case BUILD_MSG_ERROR :
  2535. XSTRNCPY(str, "build message failure", max);
  2536. break;
  2537. case BAD_HELLO :
  2538. XSTRNCPY(str, "client hello malformed", max);
  2539. break;
  2540. case DOMAIN_NAME_MISMATCH :
  2541. XSTRNCPY(str, "peer subject name mismatch", max);
  2542. break;
  2543. case WANT_READ :
  2544. XSTRNCPY(str, "non-blocking socket wants data to be read", max);
  2545. break;
  2546. case NOT_READY_ERROR :
  2547. XSTRNCPY(str, "handshake layer not ready yet, complete first", max);
  2548. break;
  2549. case PMS_VERSION_ERROR :
  2550. XSTRNCPY(str, "premaster secret version mismatch error", max);
  2551. break;
  2552. case VERSION_ERROR :
  2553. XSTRNCPY(str, "record layer version error", max);
  2554. break;
  2555. case WANT_WRITE :
  2556. XSTRNCPY(str, "non-blocking socket write buffer full", max);
  2557. break;
  2558. case BUFFER_ERROR :
  2559. XSTRNCPY(str, "malformed buffer input error", max);
  2560. break;
  2561. case VERIFY_CERT_ERROR :
  2562. XSTRNCPY(str, "verify problem on certificate", max);
  2563. break;
  2564. case VERIFY_SIGN_ERROR :
  2565. XSTRNCPY(str, "verify problem based on signature", max);
  2566. break;
  2567. case CLIENT_ID_ERROR :
  2568. XSTRNCPY(str, "psk client identity error", max);
  2569. break;
  2570. case SERVER_HINT_ERROR:
  2571. XSTRNCPY(str, "psk server hint error", max);
  2572. break;
  2573. case PSK_KEY_ERROR:
  2574. XSTRNCPY(str, "psk key callback error", max);
  2575. break;
  2576. case NTRU_KEY_ERROR:
  2577. XSTRNCPY(str, "NTRU key error", max);
  2578. break;
  2579. case NTRU_DRBG_ERROR:
  2580. XSTRNCPY(str, "NTRU drbg error", max);
  2581. break;
  2582. case NTRU_ENCRYPT_ERROR:
  2583. XSTRNCPY(str, "NTRU encrypt error", max);
  2584. break;
  2585. case NTRU_DECRYPT_ERROR:
  2586. XSTRNCPY(str, "NTRU decrypt error", max);
  2587. break;
  2588. case ZLIB_INIT_ERROR:
  2589. XSTRNCPY(str, "zlib init error", max);
  2590. break;
  2591. case ZLIB_COMPRESS_ERROR:
  2592. XSTRNCPY(str, "zlib compress error", max);
  2593. break;
  2594. case ZLIB_DECOMPRESS_ERROR:
  2595. XSTRNCPY(str, "zlib decompress error", max);
  2596. break;
  2597. case GETTIME_ERROR:
  2598. XSTRNCPY(str, "gettimeofday() error", max);
  2599. break;
  2600. case GETITIMER_ERROR:
  2601. XSTRNCPY(str, "getitimer() error", max);
  2602. break;
  2603. case SIGACT_ERROR:
  2604. XSTRNCPY(str, "sigaction() error", max);
  2605. break;
  2606. case SETITIMER_ERROR:
  2607. XSTRNCPY(str, "setitimer() error", max);
  2608. break;
  2609. case LENGTH_ERROR:
  2610. XSTRNCPY(str, "record layer length error", max);
  2611. break;
  2612. case PEER_KEY_ERROR:
  2613. XSTRNCPY(str, "cant decode peer key", max);
  2614. break;
  2615. case ZERO_RETURN:
  2616. XSTRNCPY(str, "peer sent close notify alert", max);
  2617. break;
  2618. case ECC_CURVETYPE_ERROR:
  2619. XSTRNCPY(str, "Bad ECC Curve Type or unsupported", max);
  2620. break;
  2621. case ECC_CURVE_ERROR:
  2622. XSTRNCPY(str, "Bad ECC Curve or unsupported", max);
  2623. break;
  2624. case ECC_PEERKEY_ERROR:
  2625. XSTRNCPY(str, "Bad ECC Peer Key", max);
  2626. break;
  2627. case ECC_MAKEKEY_ERROR:
  2628. XSTRNCPY(str, "ECC Make Key failure", max);
  2629. break;
  2630. case ECC_EXPORT_ERROR:
  2631. XSTRNCPY(str, "ECC Export Key failure", max);
  2632. break;
  2633. case ECC_SHARED_ERROR:
  2634. XSTRNCPY(str, "ECC DHE shared failure", max);
  2635. break;
  2636. case BAD_MUTEX_ERROR:
  2637. XSTRNCPY(str, "Bad mutex, operation failed", max);
  2638. break;
  2639. default :
  2640. XSTRNCPY(str, "unknown error number", max);
  2641. }
  2642. #endif /* NO_ERROR_STRINGS */
  2643. }
  2644. /* be sure to add to cipher_name_idx too !!!! */
  2645. const char* const cipher_names[] =
  2646. {
  2647. #ifdef BUILD_SSL_RSA_WITH_RC4_128_SHA
  2648. "RC4-SHA",
  2649. #endif
  2650. #ifdef BUILD_SSL_RSA_WITH_RC4_128_MD5
  2651. "RC4-MD5",
  2652. #endif
  2653. #ifdef BUILD_SSL_RSA_WITH_3DES_EDE_CBC_SHA
  2654. "DES-CBC3-SHA",
  2655. #endif
  2656. #ifdef BUILD_TLS_RSA_WITH_AES_128_CBC_SHA
  2657. "AES128-SHA",
  2658. #endif
  2659. #ifdef BUILD_TLS_RSA_WITH_AES_256_CBC_SHA
  2660. "AES256-SHA",
  2661. #endif
  2662. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
  2663. "DHE-RSA-AES128-SHA",
  2664. #endif
  2665. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  2666. "DHE-RSA-AES256-SHA",
  2667. #endif
  2668. #ifdef BUILD_TLS_PSK_WITH_AES_128_CBC_SHA
  2669. "PSK-AES128-CBC-SHA",
  2670. #endif
  2671. #ifdef BUILD_TLS_PSK_WITH_AES_256_CBC_SHA
  2672. "PSK-AES256-CBC-SHA",
  2673. #endif
  2674. #ifdef BUILD_TLS_RSA_WITH_HC_128_CBC_MD5
  2675. "HC128-MD5",
  2676. #endif
  2677. #ifdef BUILD_TLS_RSA_WITH_HC_128_CBC_SHA
  2678. "HC128-SHA",
  2679. #endif
  2680. #ifdef BUILD_TLS_RSA_WITH_RABBIT_CBC_SHA
  2681. "RABBIT-SHA",
  2682. #endif
  2683. #ifdef BUILD_TLS_NTRU_RSA_WITH_RC4_128_SHA
  2684. "NTRU-RC4-SHA",
  2685. #endif
  2686. #ifdef BUILD_TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA
  2687. "NTRU-DES-CBC3-SHA",
  2688. #endif
  2689. #ifdef BUILD_TLS_NTRU_RSA_WITH_AES_128_CBC_SHA
  2690. "NTRU-AES128-SHA",
  2691. #endif
  2692. #ifdef BUILD_TLS_NTRU_RSA_WITH_AES_256_CBC_SHA
  2693. "NTRU-AES256-SHA",
  2694. #endif
  2695. #ifdef BUILD_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  2696. "ECDHE-RSA-AES128-SHA",
  2697. #endif
  2698. #ifdef BUILD_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  2699. "ECDHE-RSA-AES256-SHA",
  2700. #endif
  2701. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  2702. "ECDHE-ECDSA-AES128-SHA",
  2703. #endif
  2704. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  2705. "ECDHE-ECDSA-AES256-SHA",
  2706. #endif
  2707. #ifdef BUILD_TLS_ECDHE_RSA_WITH_RC4_128_SHA
  2708. "ECDHE-RSA-RC4-SHA",
  2709. #endif
  2710. #ifdef BUILD_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
  2711. "ECDHE-RSA-DES-CBC3-SHA",
  2712. #endif
  2713. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
  2714. "ECDHE-ECDSA-RC4-SHA",
  2715. #endif
  2716. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
  2717. "ECDHE-ECDSA-DES-CBC3-SHA",
  2718. #endif
  2719. #ifdef BUILD_TLS_RSA_WITH_AES_128_CBC_SHA256
  2720. "AES128-SHA256",
  2721. #endif
  2722. #ifdef BUILD_TLS_RSA_WITH_AES_256_CBC_SHA256
  2723. "AES256-SHA256",
  2724. #endif
  2725. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
  2726. "DHE-RSA-AES128-SHA256",
  2727. #endif
  2728. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  2729. "DHE-RSA-AES256-SHA256"
  2730. #endif
  2731. };
  2732. /* cipher suite number that matches above name table */
  2733. int cipher_name_idx[] =
  2734. {
  2735. #ifdef BUILD_SSL_RSA_WITH_RC4_128_SHA
  2736. SSL_RSA_WITH_RC4_128_SHA,
  2737. #endif
  2738. #ifdef BUILD_SSL_RSA_WITH_RC4_128_MD5
  2739. SSL_RSA_WITH_RC4_128_MD5,
  2740. #endif
  2741. #ifdef BUILD_SSL_RSA_WITH_3DES_EDE_CBC_SHA
  2742. SSL_RSA_WITH_3DES_EDE_CBC_SHA,
  2743. #endif
  2744. #ifdef BUILD_TLS_RSA_WITH_AES_128_CBC_SHA
  2745. TLS_RSA_WITH_AES_128_CBC_SHA,
  2746. #endif
  2747. #ifdef BUILD_TLS_RSA_WITH_AES_256_CBC_SHA
  2748. TLS_RSA_WITH_AES_256_CBC_SHA,
  2749. #endif
  2750. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
  2751. TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
  2752. #endif
  2753. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  2754. TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
  2755. #endif
  2756. #ifdef BUILD_TLS_PSK_WITH_AES_128_CBC_SHA
  2757. TLS_PSK_WITH_AES_128_CBC_SHA,
  2758. #endif
  2759. #ifdef BUILD_TLS_PSK_WITH_AES_256_CBC_SHA
  2760. TLS_PSK_WITH_AES_256_CBC_SHA,
  2761. #endif
  2762. #ifdef BUILD_TLS_RSA_WITH_HC_128_CBC_MD5
  2763. TLS_RSA_WITH_HC_128_CBC_MD5,
  2764. #endif
  2765. #ifdef BUILD_TLS_RSA_WITH_HC_128_CBC_SHA
  2766. TLS_RSA_WITH_HC_128_CBC_SHA,
  2767. #endif
  2768. #ifdef BUILD_TLS_RSA_WITH_RABBIT_CBC_SHA
  2769. TLS_RSA_WITH_RABBIT_CBC_SHA,
  2770. #endif
  2771. #ifdef BUILD_TLS_NTRU_RSA_WITH_RC4_128_SHA
  2772. TLS_NTRU_RSA_WITH_RC4_128_SHA,
  2773. #endif
  2774. #ifdef BUILD_TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA
  2775. TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA,
  2776. #endif
  2777. #ifdef BUILD_TLS_NTRU_RSA_WITH_AES_128_CBC_SHA
  2778. TLS_NTRU_RSA_WITH_AES_128_CBC_SHA,
  2779. #endif
  2780. #ifdef BUILD_TLS_NTRU_RSA_WITH_AES_256_CBC_SHA
  2781. TLS_NTRU_RSA_WITH_AES_256_CBC_SHA,
  2782. #endif
  2783. #ifdef BUILD_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  2784. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
  2785. #endif
  2786. #ifdef BUILD_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  2787. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
  2788. #endif
  2789. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  2790. TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
  2791. #endif
  2792. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  2793. TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
  2794. #endif
  2795. #ifdef BUILD_TLS_ECDHE_RSA_WITH_RC4_128_SHA
  2796. TLS_ECDHE_RSA_WITH_RC4_128_SHA,
  2797. #endif
  2798. #ifdef BUILD_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
  2799. TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
  2800. #endif
  2801. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
  2802. TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
  2803. #endif
  2804. #ifdef BUILD_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
  2805. TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
  2806. #endif
  2807. #ifdef BUILD_TLS_RSA_WITH_AES_128_CBC_SHA256
  2808. TLS_RSA_WITH_AES_128_CBC_SHA256,
  2809. #endif
  2810. #ifdef BUILD_TLS_RSA_WITH_AES_256_CBC_SHA256
  2811. TLS_RSA_WITH_AES_256_CBC_SHA256,
  2812. #endif
  2813. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
  2814. TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
  2815. #endif
  2816. #ifdef BUILD_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  2817. TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  2818. #endif
  2819. };
  2820. /* return true if set, else false */
  2821. /* only supports full name from cipher_name[] delimited by : */
  2822. int SetCipherList(Suites* s, const char* list)
  2823. {
  2824. int ret = 0, i;
  2825. char name[MAX_SUITE_NAME];
  2826. char needle[] = ":";
  2827. char* haystack = (char*)list;
  2828. char* prev;
  2829. const int suiteSz = sizeof(cipher_names) / sizeof(cipher_names[0]);
  2830. int idx = 0;
  2831. if (!list)
  2832. return 0;
  2833. if (*list == 0) return 1; /* CyaSSL default */
  2834. if (XSTRNCMP(haystack, "ALL", 3) == 0) return 1; /* CyaSSL defualt */
  2835. for(;;) {
  2836. word32 len;
  2837. prev = haystack;
  2838. haystack = XSTRSTR(haystack, needle);
  2839. if (!haystack) /* last cipher */
  2840. len = min(sizeof(name), XSTRLEN(prev));
  2841. else
  2842. len = min(sizeof(name), (word32)(haystack - prev));
  2843. XSTRNCPY(name, prev, len);
  2844. name[(len == sizeof(name)) ? len - 1 : len] = 0;
  2845. for (i = 0; i < suiteSz; i++)
  2846. if (XSTRNCMP(name, cipher_names[i], sizeof(name)) == 0) {
  2847. if (XSTRSTR(name, "EC"))
  2848. s->suites[idx++] = ECC_BYTE; /* ECC suite */
  2849. else
  2850. s->suites[idx++] = 0x00; /* normal */
  2851. s->suites[idx++] = (byte)cipher_name_idx[i];
  2852. if (!ret) ret = 1; /* found at least one */
  2853. break;
  2854. }
  2855. if (!haystack) break;
  2856. haystack++;
  2857. }
  2858. if (ret) {
  2859. s->setSuites = 1;
  2860. s->suiteSz = (word16)idx;
  2861. }
  2862. return ret;
  2863. }
  2864. #ifdef CYASSL_CALLBACKS
  2865. /* Initialisze HandShakeInfo */
  2866. void InitHandShakeInfo(HandShakeInfo* info)
  2867. {
  2868. int i;
  2869. info->cipherName[0] = 0;
  2870. for (i = 0; i < MAX_PACKETS_HANDSHAKE; i++)
  2871. info->packetNames[i][0] = 0;
  2872. info->numberPackets = 0;
  2873. info->negotiationError = 0;
  2874. }
  2875. /* Set Final HandShakeInfo parameters */
  2876. void FinishHandShakeInfo(HandShakeInfo* info, const CYASSL* ssl)
  2877. {
  2878. int i;
  2879. int sz = sizeof(cipher_name_idx)/sizeof(int);
  2880. for (i = 0; i < sz; i++)
  2881. if (ssl->options.cipherSuite == (byte)cipher_name_idx[i]) {
  2882. if (ssl->options.cipherSuite0 == ECC_BYTE)
  2883. continue; /* ECC suites at end */
  2884. XSTRNCPY(info->cipherName, cipher_names[i], MAX_CIPHERNAME_SZ);
  2885. break;
  2886. }
  2887. /* error max and min are negative numbers */
  2888. if (ssl->error <= MIN_PARAM_ERR && ssl->error >= MAX_PARAM_ERR)
  2889. info->negotiationError = ssl->error;
  2890. }
  2891. /* Add name to info packet names, increase packet name count */
  2892. void AddPacketName(const char* name, HandShakeInfo* info)
  2893. {
  2894. if (info->numberPackets < MAX_PACKETS_HANDSHAKE) {
  2895. XSTRNCPY(info->packetNames[info->numberPackets++], name,
  2896. MAX_PACKETNAME_SZ);
  2897. }
  2898. }
  2899. /* Initialisze TimeoutInfo */
  2900. void InitTimeoutInfo(TimeoutInfo* info)
  2901. {
  2902. int i;
  2903. info->timeoutName[0] = 0;
  2904. info->flags = 0;
  2905. for (i = 0; i < MAX_PACKETS_HANDSHAKE; i++) {
  2906. info->packets[i].packetName[0] = 0;
  2907. info->packets[i].timestamp.tv_sec = 0;
  2908. info->packets[i].timestamp.tv_usec = 0;
  2909. info->packets[i].bufferValue = 0;
  2910. info->packets[i].valueSz = 0;
  2911. }
  2912. info->numberPackets = 0;
  2913. info->timeoutValue.tv_sec = 0;
  2914. info->timeoutValue.tv_usec = 0;
  2915. }
  2916. /* Free TimeoutInfo */
  2917. void FreeTimeoutInfo(TimeoutInfo* info, void* heap)
  2918. {
  2919. int i;
  2920. for (i = 0; i < MAX_PACKETS_HANDSHAKE; i++)
  2921. if (info->packets[i].bufferValue) {
  2922. XFREE(info->packets[i].bufferValue, heap, DYNAMIC_TYPE_INFO);
  2923. info->packets[i].bufferValue = 0;
  2924. }
  2925. }
  2926. /* Add PacketInfo to TimeoutInfo */
  2927. void AddPacketInfo(const char* name, TimeoutInfo* info, const byte* data,
  2928. int sz, void* heap)
  2929. {
  2930. if (info->numberPackets < (MAX_PACKETS_HANDSHAKE - 1)) {
  2931. Timeval currTime;
  2932. /* may add name after */
  2933. if (name)
  2934. XSTRNCPY(info->packets[info->numberPackets].packetName, name,
  2935. MAX_PACKETNAME_SZ);
  2936. /* add data, put in buffer if bigger than static buffer */
  2937. info->packets[info->numberPackets].valueSz = sz;
  2938. if (sz < MAX_VALUE_SZ)
  2939. XMEMCPY(info->packets[info->numberPackets].value, data, sz);
  2940. else {
  2941. info->packets[info->numberPackets].bufferValue =
  2942. XMALLOC(sz, heap, DYNAMIC_TYPE_INFO);
  2943. if (!info->packets[info->numberPackets].bufferValue)
  2944. /* let next alloc catch, just don't fill, not fatal here */
  2945. info->packets[info->numberPackets].valueSz = 0;
  2946. else
  2947. XMEMCPY(info->packets[info->numberPackets].bufferValue,
  2948. data, sz);
  2949. }
  2950. gettimeofday(&currTime, 0);
  2951. info->packets[info->numberPackets].timestamp.tv_sec =
  2952. currTime.tv_sec;
  2953. info->packets[info->numberPackets].timestamp.tv_usec =
  2954. currTime.tv_usec;
  2955. info->numberPackets++;
  2956. }
  2957. }
  2958. /* Add packet name to previsouly added packet info */
  2959. void AddLateName(const char* name, TimeoutInfo* info)
  2960. {
  2961. /* make sure we have a valid previous one */
  2962. if (info->numberPackets > 0 && info->numberPackets <
  2963. MAX_PACKETS_HANDSHAKE) {
  2964. XSTRNCPY(info->packets[info->numberPackets - 1].packetName, name,
  2965. MAX_PACKETNAME_SZ);
  2966. }
  2967. }
  2968. /* Add record header to previsouly added packet info */
  2969. void AddLateRecordHeader(const RecordLayerHeader* rl, TimeoutInfo* info)
  2970. {
  2971. /* make sure we have a valid previous one */
  2972. if (info->numberPackets > 0 && info->numberPackets <
  2973. MAX_PACKETS_HANDSHAKE) {
  2974. if (info->packets[info->numberPackets - 1].bufferValue)
  2975. XMEMCPY(info->packets[info->numberPackets - 1].bufferValue, rl,
  2976. RECORD_HEADER_SZ);
  2977. else
  2978. XMEMCPY(info->packets[info->numberPackets - 1].value, rl,
  2979. RECORD_HEADER_SZ);
  2980. }
  2981. }
  2982. #endif /* CYASSL_CALLBACKS */
  2983. /* client only parts */
  2984. #ifndef NO_CYASSL_CLIENT
  2985. int SendClientHello(CYASSL* ssl)
  2986. {
  2987. byte *output;
  2988. word32 length, idx = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  2989. int sendSz;
  2990. int idSz = ssl->options.resuming ? ID_LEN : 0;
  2991. int ret;
  2992. length = sizeof(ProtocolVersion) + RAN_LEN
  2993. + idSz + ENUM_LEN
  2994. + ssl->suites.suiteSz + SUITE_LEN
  2995. + COMP_LEN + ENUM_LEN;
  2996. sendSz = length + HANDSHAKE_HEADER_SZ + RECORD_HEADER_SZ;
  2997. #ifdef CYASSL_DTLS
  2998. if (ssl->options.dtls) {
  2999. length += ENUM_LEN; /* cookie */
  3000. sendSz = length + DTLS_HANDSHAKE_HEADER_SZ + DTLS_RECORD_HEADER_SZ;
  3001. idx += DTLS_HANDSHAKE_EXTRA + DTLS_RECORD_EXTRA;
  3002. }
  3003. #endif
  3004. /* check for avalaible size */
  3005. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  3006. return ret;
  3007. /* get ouput buffer */
  3008. output = ssl->buffers.outputBuffer.buffer +
  3009. ssl->buffers.outputBuffer.idx;
  3010. AddHeaders(output, length, client_hello, ssl);
  3011. /* client hello, first version */
  3012. XMEMCPY(output + idx, &ssl->version, sizeof(ProtocolVersion));
  3013. idx += sizeof(ProtocolVersion);
  3014. ssl->chVersion = ssl->version; /* store in case changed */
  3015. /* then random */
  3016. if (ssl->options.connectState == CONNECT_BEGIN) {
  3017. RNG_GenerateBlock(&ssl->rng, output + idx, RAN_LEN);
  3018. /* store random */
  3019. XMEMCPY(ssl->arrays.clientRandom, output + idx, RAN_LEN);
  3020. } else {
  3021. #ifdef CYASSL_DTLS
  3022. /* send same random on hello again */
  3023. XMEMCPY(output + idx, ssl->arrays.clientRandom, RAN_LEN);
  3024. #endif
  3025. }
  3026. idx += RAN_LEN;
  3027. /* then session id */
  3028. output[idx++] = (byte)idSz;
  3029. if (idSz) {
  3030. XMEMCPY(output + idx, ssl->session.sessionID, ID_LEN);
  3031. idx += ID_LEN;
  3032. }
  3033. /* then DTLS cookie */
  3034. #ifdef CYASSL_DTLS
  3035. if (ssl->options.dtls) {
  3036. output[idx++] = 0;
  3037. }
  3038. #endif
  3039. /* then cipher suites */
  3040. c16toa(ssl->suites.suiteSz, output + idx);
  3041. idx += 2;
  3042. XMEMCPY(output + idx, &ssl->suites.suites, ssl->suites.suiteSz);
  3043. idx += ssl->suites.suiteSz;
  3044. /* last, compression */
  3045. output[idx++] = COMP_LEN;
  3046. if (ssl->options.usingCompression)
  3047. output[idx++] = ZLIB_COMPRESSION;
  3048. else
  3049. output[idx++] = NO_COMPRESSION;
  3050. HashOutput(ssl, output, sendSz, 0);
  3051. ssl->options.clientState = CLIENT_HELLO_COMPLETE;
  3052. #ifdef CYASSL_CALLBACKS
  3053. if (ssl->hsInfoOn) AddPacketName("ClientHello", &ssl->handShakeInfo);
  3054. if (ssl->toInfoOn)
  3055. AddPacketInfo("ClientHello", &ssl->timeoutInfo, output, sendSz,
  3056. ssl->heap);
  3057. #endif
  3058. ssl->buffers.outputBuffer.length += sendSz;
  3059. return SendBuffered(ssl);
  3060. }
  3061. static int DoHelloVerifyRequest(CYASSL* ssl, const byte* input,
  3062. word32* inOutIdx)
  3063. {
  3064. ProtocolVersion pv;
  3065. byte cookieSz;
  3066. #ifdef CYASSL_CALLBACKS
  3067. if (ssl->hsInfoOn) AddPacketName("HelloVerifyRequest",
  3068. &ssl->handShakeInfo);
  3069. if (ssl->toInfoOn) AddLateName("HelloVerifyRequest", &ssl->timeoutInfo);
  3070. #endif
  3071. XMEMCPY(&pv, input + *inOutIdx, sizeof(pv));
  3072. *inOutIdx += sizeof(pv);
  3073. cookieSz = input[(*inOutIdx)++];
  3074. if (cookieSz)
  3075. *inOutIdx += cookieSz; /* skip for now */
  3076. ssl->options.serverState = SERVER_HELLOVERIFYREQUEST_COMPLETE;
  3077. return 0;
  3078. }
  3079. static int DoServerHello(CYASSL* ssl, const byte* input, word32* inOutIdx)
  3080. {
  3081. byte b;
  3082. byte compression;
  3083. ProtocolVersion pv;
  3084. word32 i = *inOutIdx;
  3085. #ifdef CYASSL_CALLBACKS
  3086. if (ssl->hsInfoOn) AddPacketName("ServerHello", &ssl->handShakeInfo);
  3087. if (ssl->toInfoOn) AddLateName("ServerHello", &ssl->timeoutInfo);
  3088. #endif
  3089. XMEMCPY(&pv, input + i, sizeof(pv));
  3090. i += sizeof(pv);
  3091. if (pv.minor > ssl->version.minor) {
  3092. CYASSL_MSG("Server using higher version, fatal error");
  3093. return VERSION_ERROR;
  3094. }
  3095. else if (pv.minor < ssl->version.minor) {
  3096. CYASSL_MSG("server using lower version");
  3097. if (!ssl->options.downgrade) {
  3098. CYASSL_MSG(" no downgrade allowed, fatal error");
  3099. return VERSION_ERROR;
  3100. }
  3101. else if (pv.minor == SSLv3_MINOR) {
  3102. /* turn off tls */
  3103. CYASSL_MSG(" downgrading to SSLv3");
  3104. ssl->options.tls = 0;
  3105. ssl->options.tls1_1 = 0;
  3106. ssl->version.minor = SSLv3_MINOR;
  3107. }
  3108. else if (pv.minor == TLSv1_MINOR) {
  3109. /* turn off tls 1.1+ */
  3110. CYASSL_MSG(" downgrading to TLSv1");
  3111. ssl->options.tls1_1 = 0;
  3112. ssl->version.minor = TLSv1_MINOR;
  3113. }
  3114. else if (pv.minor == TLSv1_1_MINOR) {
  3115. CYASSL_MSG(" downgrading to TLSv1.1");
  3116. ssl->version.minor = TLSv1_1_MINOR;
  3117. }
  3118. }
  3119. XMEMCPY(ssl->arrays.serverRandom, input + i, RAN_LEN);
  3120. i += RAN_LEN;
  3121. b = input[i++];
  3122. if (b) {
  3123. XMEMCPY(ssl->arrays.sessionID, input + i, b);
  3124. i += b;
  3125. }
  3126. ssl->options.cipherSuite0 = input[i++];
  3127. ssl->options.cipherSuite = input[i++];
  3128. compression = input[i++];
  3129. if (compression != ZLIB_COMPRESSION && ssl->options.usingCompression) {
  3130. CYASSL_MSG("Server refused compression, turning off");
  3131. ssl->options.usingCompression = 0; /* turn off if server refused */
  3132. }
  3133. ssl->options.serverState = SERVER_HELLO_COMPLETE;
  3134. *inOutIdx = i;
  3135. if (ssl->options.resuming) {
  3136. if (XMEMCMP(ssl->arrays.sessionID, ssl->session.sessionID, ID_LEN)
  3137. == 0) {
  3138. if (SetCipherSpecs(ssl) == 0) {
  3139. int ret;
  3140. XMEMCPY(ssl->arrays.masterSecret, ssl->session.masterSecret,
  3141. SECRET_LEN);
  3142. if (ssl->options.tls)
  3143. ret = DeriveTlsKeys(ssl);
  3144. else
  3145. ret = DeriveKeys(ssl);
  3146. ssl->options.serverState = SERVER_HELLODONE_COMPLETE;
  3147. return ret;
  3148. }
  3149. else
  3150. return UNSUPPORTED_SUITE;
  3151. }
  3152. else {
  3153. CYASSL_MSG("Server denied resumption attempt");
  3154. ssl->options.resuming = 0; /* server denied resumption try */
  3155. }
  3156. }
  3157. return SetCipherSpecs(ssl);
  3158. }
  3159. /* just read in and ignore for now TODO: */
  3160. static int DoCertificateRequest(CYASSL* ssl, const byte* input, word32*
  3161. inOutIdx)
  3162. {
  3163. word16 len;
  3164. #ifdef CYASSL_CALLBACKS
  3165. if (ssl->hsInfoOn)
  3166. AddPacketName("CertificateRequest", &ssl->handShakeInfo);
  3167. if (ssl->toInfoOn)
  3168. AddLateName("CertificateRequest", &ssl->timeoutInfo);
  3169. #endif
  3170. len = input[(*inOutIdx)++];
  3171. /* types, read in here */
  3172. *inOutIdx += len;
  3173. ato16(&input[*inOutIdx], &len);
  3174. *inOutIdx += LENGTH_SZ;
  3175. if (IsAtLeastTLSv1_2(ssl)) {
  3176. /* hash sig format */
  3177. *inOutIdx += len;
  3178. ato16(&input[*inOutIdx], &len);
  3179. *inOutIdx += LENGTH_SZ;
  3180. }
  3181. /* authorities */
  3182. while (len) {
  3183. word16 dnSz;
  3184. ato16(&input[*inOutIdx], &dnSz);
  3185. *inOutIdx += (REQUEST_HEADER + dnSz);
  3186. len -= dnSz + REQUEST_HEADER;
  3187. }
  3188. /* don't send client cert or cert verify if user hasn't provided
  3189. cert and private key */
  3190. if (ssl->buffers.certificate.buffer && ssl->buffers.key.buffer)
  3191. ssl->options.sendVerify = SEND_CERT;
  3192. else if (IsAtLeastTLSv1_2(ssl))
  3193. ssl->options.sendVerify = SEND_BLANK_CERT;
  3194. return 0;
  3195. }
  3196. static int DoServerKeyExchange(CYASSL* ssl, const byte* input,
  3197. word32* inOutIdx)
  3198. {
  3199. #if defined(OPENSSL_EXTRA) || defined(HAVE_ECC)
  3200. word16 length = 0;
  3201. word16 sigLen = 0;
  3202. word16 verifySz = (word16)*inOutIdx; /* keep start idx */
  3203. byte* signature = 0;
  3204. #endif
  3205. (void)ssl;
  3206. (void)input;
  3207. (void)inOutIdx;
  3208. #ifdef CYASSL_CALLBACKS
  3209. if (ssl->hsInfoOn)
  3210. AddPacketName("ServerKeyExchange", &ssl->handShakeInfo);
  3211. if (ssl->toInfoOn)
  3212. AddLateName("ServerKeyExchange", &ssl->timeoutInfo);
  3213. #endif
  3214. #ifndef NO_PSK
  3215. if (ssl->specs.kea == psk_kea) {
  3216. word16 pskLen = 0;
  3217. ato16(&input[*inOutIdx], &pskLen);
  3218. *inOutIdx += LENGTH_SZ;
  3219. XMEMCPY(ssl->arrays.server_hint, &input[*inOutIdx],
  3220. min(pskLen, MAX_PSK_ID_LEN));
  3221. if (pskLen < MAX_PSK_ID_LEN)
  3222. ssl->arrays.server_hint[pskLen] = 0;
  3223. else
  3224. ssl->arrays.server_hint[MAX_PSK_ID_LEN - 1] = 0;
  3225. *inOutIdx += pskLen;
  3226. return 0;
  3227. }
  3228. #endif
  3229. #ifdef OPENSSL_EXTRA
  3230. if (ssl->specs.kea == diffie_hellman_kea)
  3231. {
  3232. /* p */
  3233. ato16(&input[*inOutIdx], &length);
  3234. *inOutIdx += LENGTH_SZ;
  3235. ssl->buffers.serverDH_P.buffer = (byte*) XMALLOC(length, ssl->heap,
  3236. DYNAMIC_TYPE_DH);
  3237. if (ssl->buffers.serverDH_P.buffer)
  3238. ssl->buffers.serverDH_P.length = length;
  3239. else
  3240. return MEMORY_ERROR;
  3241. XMEMCPY(ssl->buffers.serverDH_P.buffer, &input[*inOutIdx], length);
  3242. *inOutIdx += length;
  3243. /* g */
  3244. ato16(&input[*inOutIdx], &length);
  3245. *inOutIdx += LENGTH_SZ;
  3246. ssl->buffers.serverDH_G.buffer = (byte*) XMALLOC(length, ssl->heap,
  3247. DYNAMIC_TYPE_DH);
  3248. if (ssl->buffers.serverDH_G.buffer)
  3249. ssl->buffers.serverDH_G.length = length;
  3250. else
  3251. return MEMORY_ERROR;
  3252. XMEMCPY(ssl->buffers.serverDH_G.buffer, &input[*inOutIdx], length);
  3253. *inOutIdx += length;
  3254. /* pub */
  3255. ato16(&input[*inOutIdx], &length);
  3256. *inOutIdx += LENGTH_SZ;
  3257. ssl->buffers.serverDH_Pub.buffer = (byte*) XMALLOC(length, ssl->heap,
  3258. DYNAMIC_TYPE_DH);
  3259. if (ssl->buffers.serverDH_Pub.buffer)
  3260. ssl->buffers.serverDH_Pub.length = length;
  3261. else
  3262. return MEMORY_ERROR;
  3263. XMEMCPY(ssl->buffers.serverDH_Pub.buffer, &input[*inOutIdx], length);
  3264. *inOutIdx += length;
  3265. } /* dh_kea */
  3266. #endif /* OPENSSL_EXTRA */
  3267. #ifdef HAVE_ECC
  3268. if (ssl->specs.kea == ecc_diffie_hellman_kea)
  3269. {
  3270. byte b = input[*inOutIdx];
  3271. *inOutIdx += 1;
  3272. if (b != named_curve)
  3273. return ECC_CURVETYPE_ERROR;
  3274. *inOutIdx += 1; /* curve type, eat leading 0 */
  3275. b = input[*inOutIdx];
  3276. *inOutIdx += 1;
  3277. if (b != secp256r1 && b != secp384r1 && b != secp521r1 && b !=
  3278. secp160r1 && b != secp192r1 && b != secp224r1)
  3279. return ECC_CURVE_ERROR;
  3280. length = input[*inOutIdx];
  3281. *inOutIdx += 1;
  3282. if (ecc_import_x963(&input[*inOutIdx], length, &ssl->peerEccKey) != 0)
  3283. return ECC_PEERKEY_ERROR;
  3284. *inOutIdx += length;
  3285. ssl->peerEccKeyPresent = 1;
  3286. }
  3287. #endif /* HAVE_ECC */
  3288. #if defined(OPENSSL_EXTRA) || defined(HAVE_ECC)
  3289. {
  3290. Md5 md5;
  3291. Sha sha;
  3292. byte hash[FINISHED_SZ];
  3293. byte messageVerify[MAX_DH_SZ];
  3294. /* adjust from start idx */
  3295. verifySz = (word16)(*inOutIdx - verifySz);
  3296. /* save message for hash verify */
  3297. if (verifySz > sizeof(messageVerify))
  3298. return BUFFER_ERROR;
  3299. XMEMCPY(messageVerify, &input[*inOutIdx - verifySz], verifySz);
  3300. if (IsAtLeastTLSv1_2(ssl)) {
  3301. /* just advance for now TODO: validate hash algo params */
  3302. *inOutIdx += LENGTH_SZ;
  3303. }
  3304. /* signature */
  3305. ato16(&input[*inOutIdx], &length);
  3306. *inOutIdx += LENGTH_SZ;
  3307. signature = (byte*)&input[*inOutIdx];
  3308. *inOutIdx += length;
  3309. sigLen = length;
  3310. /* verify signature */
  3311. /* md5 */
  3312. InitMd5(&md5);
  3313. Md5Update(&md5, ssl->arrays.clientRandom, RAN_LEN);
  3314. Md5Update(&md5, ssl->arrays.serverRandom, RAN_LEN);
  3315. Md5Update(&md5, messageVerify, verifySz);
  3316. Md5Final(&md5, hash);
  3317. /* sha */
  3318. InitSha(&sha);
  3319. ShaUpdate(&sha, ssl->arrays.clientRandom, RAN_LEN);
  3320. ShaUpdate(&sha, ssl->arrays.serverRandom, RAN_LEN);
  3321. ShaUpdate(&sha, messageVerify, verifySz);
  3322. ShaFinal(&sha, &hash[MD5_DIGEST_SIZE]);
  3323. /* rsa */
  3324. if (ssl->specs.sig_algo == rsa_sa_algo)
  3325. {
  3326. int ret;
  3327. byte* out;
  3328. if (!ssl->peerRsaKeyPresent)
  3329. return NO_PEER_KEY;
  3330. ret = RsaSSL_VerifyInline(signature, sigLen,&out, &ssl->peerRsaKey);
  3331. if (IsAtLeastTLSv1_2(ssl)) {
  3332. byte encodedSig[MAX_ENCODED_SIG_SZ];
  3333. word32 encSigSz;
  3334. byte* digest;
  3335. int typeH;
  3336. int digestSz;
  3337. /* sha1 for now */
  3338. digest = &hash[MD5_DIGEST_SIZE];
  3339. typeH = SHAh;
  3340. digestSz = SHA_DIGEST_SIZE;
  3341. encSigSz = EncodeSignature(encodedSig, digest, digestSz, typeH);
  3342. if (encSigSz != (word32)ret || XMEMCMP(out, encodedSig,
  3343. encSigSz) != 0)
  3344. return VERIFY_SIGN_ERROR;
  3345. }
  3346. else {
  3347. if (ret != sizeof(hash) || XMEMCMP(out, hash, sizeof(hash)))
  3348. return VERIFY_SIGN_ERROR;
  3349. }
  3350. }
  3351. #ifdef HAVE_ECC
  3352. /* ecdsa */
  3353. else if (ssl->specs.sig_algo == ecc_dsa_sa_algo) {
  3354. int verify = 0, ret;
  3355. if (!ssl->peerEccDsaKeyPresent)
  3356. return NO_PEER_KEY;
  3357. ret = ecc_verify_hash(signature, sigLen, &hash[MD5_DIGEST_SIZE],
  3358. SHA_DIGEST_SIZE, &verify, &ssl->peerEccDsaKey);
  3359. if (ret != 0 || verify == 0)
  3360. return VERIFY_SIGN_ERROR;
  3361. }
  3362. #endif /* HAVE_ECC */
  3363. else
  3364. return ALGO_ID_E;
  3365. ssl->options.serverState = SERVER_KEYEXCHANGE_COMPLETE;
  3366. return 0;
  3367. }
  3368. #else /* HAVE_OPENSSL or HAVE_ECC */
  3369. return NOT_COMPILED_IN; /* not supported by build */
  3370. #endif /* HAVE_OPENSSL or HAVE_ECC */
  3371. }
  3372. int SendClientKeyExchange(CYASSL* ssl)
  3373. {
  3374. byte encSecret[MAX_NTRU_ENCRYPT_SZ];
  3375. word32 encSz = 0;
  3376. word32 idx = 0;
  3377. int ret = 0;
  3378. if (ssl->specs.kea == rsa_kea) {
  3379. RNG_GenerateBlock(&ssl->rng, ssl->arrays.preMasterSecret,
  3380. SECRET_LEN);
  3381. ssl->arrays.preMasterSecret[0] = ssl->chVersion.major;
  3382. ssl->arrays.preMasterSecret[1] = ssl->chVersion.minor;
  3383. ssl->arrays.preMasterSz = SECRET_LEN;
  3384. if (ssl->peerRsaKeyPresent == 0)
  3385. return NO_PEER_KEY;
  3386. ret = RsaPublicEncrypt(ssl->arrays.preMasterSecret, SECRET_LEN,
  3387. encSecret, sizeof(encSecret), &ssl->peerRsaKey,
  3388. &ssl->rng);
  3389. if (ret > 0) {
  3390. encSz = ret;
  3391. ret = 0; /* set success to 0 */
  3392. }
  3393. #ifdef OPENSSL_EXTRA
  3394. } else if (ssl->specs.kea == diffie_hellman_kea) {
  3395. buffer serverP = ssl->buffers.serverDH_P;
  3396. buffer serverG = ssl->buffers.serverDH_G;
  3397. buffer serverPub = ssl->buffers.serverDH_Pub;
  3398. byte priv[ENCRYPT_LEN];
  3399. word32 privSz = 0;
  3400. DhKey key;
  3401. if (serverP.buffer == 0 || serverG.buffer == 0 ||
  3402. serverPub.buffer == 0)
  3403. return NO_PEER_KEY;
  3404. InitDhKey(&key);
  3405. ret = DhSetKey(&key, serverP.buffer, serverP.length,
  3406. serverG.buffer, serverG.length);
  3407. if (ret == 0)
  3408. /* for DH, encSecret is Yc, agree is pre-master */
  3409. ret = DhGenerateKeyPair(&key, &ssl->rng, priv, &privSz,
  3410. encSecret, &encSz);
  3411. if (ret == 0)
  3412. ret = DhAgree(&key, ssl->arrays.preMasterSecret,
  3413. &ssl->arrays.preMasterSz, priv, privSz,
  3414. serverPub.buffer, serverPub.length);
  3415. FreeDhKey(&key);
  3416. #endif /* OPENSSL_EXTRA */
  3417. #ifndef NO_PSK
  3418. } else if (ssl->specs.kea == psk_kea) {
  3419. byte* pms = ssl->arrays.preMasterSecret;
  3420. ssl->arrays.psk_keySz = ssl->options.client_psk_cb(ssl,
  3421. ssl->arrays.server_hint, ssl->arrays.client_identity,
  3422. MAX_PSK_ID_LEN, ssl->arrays.psk_key, MAX_PSK_KEY_LEN);
  3423. if (ssl->arrays.psk_keySz == 0 ||
  3424. ssl->arrays.psk_keySz > MAX_PSK_KEY_LEN)
  3425. return PSK_KEY_ERROR;
  3426. encSz = (word32)XSTRLEN(ssl->arrays.client_identity);
  3427. if (encSz > MAX_PSK_ID_LEN) return CLIENT_ID_ERROR;
  3428. XMEMCPY(encSecret, ssl->arrays.client_identity, encSz);
  3429. /* make psk pre master secret */
  3430. /* length of key + length 0s + length of key + key */
  3431. c16toa((word16)ssl->arrays.psk_keySz, pms);
  3432. pms += 2;
  3433. XMEMSET(pms, 0, ssl->arrays.psk_keySz);
  3434. pms += ssl->arrays.psk_keySz;
  3435. c16toa((word16)ssl->arrays.psk_keySz, pms);
  3436. pms += 2;
  3437. XMEMCPY(pms, ssl->arrays.psk_key, ssl->arrays.psk_keySz);
  3438. ssl->arrays.preMasterSz = ssl->arrays.psk_keySz * 2 + 4;
  3439. #endif /* NO_PSK */
  3440. #ifdef HAVE_NTRU
  3441. } else if (ssl->specs.kea == ntru_kea) {
  3442. word32 rc;
  3443. word16 cipherLen = sizeof(encSecret);
  3444. DRBG_HANDLE drbg;
  3445. static uint8_t const cyasslStr[] = {
  3446. 'C', 'y', 'a', 'S', 'S', 'L', ' ', 'N', 'T', 'R', 'U'
  3447. };
  3448. RNG_GenerateBlock(&ssl->rng, ssl->arrays.preMasterSecret,
  3449. SECRET_LEN);
  3450. ssl->arrays.preMasterSz = SECRET_LEN;
  3451. if (ssl->peerNtruKeyPresent == 0)
  3452. return NO_PEER_KEY;
  3453. rc = crypto_drbg_instantiate(MAX_NTRU_BITS, cyasslStr,
  3454. sizeof(cyasslStr), GetEntropy, &drbg);
  3455. if (rc != DRBG_OK)
  3456. return NTRU_DRBG_ERROR;
  3457. rc = crypto_ntru_encrypt(drbg, ssl->peerNtruKeyLen,ssl->peerNtruKey,
  3458. ssl->arrays.preMasterSz,
  3459. ssl->arrays.preMasterSecret,
  3460. &cipherLen, encSecret);
  3461. crypto_drbg_uninstantiate(drbg);
  3462. if (rc != NTRU_OK)
  3463. return NTRU_ENCRYPT_ERROR;
  3464. encSz = cipherLen;
  3465. ret = 0;
  3466. #endif /* HAVE_NTRU */
  3467. #ifdef HAVE_ECC
  3468. } else if (ssl->specs.kea == ecc_diffie_hellman_kea) {
  3469. ecc_key myKey;
  3470. word32 size = sizeof(encSecret);
  3471. if (!ssl->peerEccKeyPresent || !ssl->peerEccKey.dp)
  3472. return NO_PEER_KEY;
  3473. ecc_init(&myKey);
  3474. ret = ecc_make_key(&ssl->rng, ssl->peerEccKey.dp->size, &myKey);
  3475. if (ret != 0)
  3476. return ECC_MAKEKEY_ERROR;
  3477. /* precede export with 1 byte length */
  3478. ret = ecc_export_x963(&myKey, encSecret + 1, &size);
  3479. encSecret[0] = size;
  3480. encSz = size + 1;
  3481. if (ret != 0)
  3482. ret = ECC_EXPORT_ERROR;
  3483. else {
  3484. size = sizeof(ssl->arrays.preMasterSecret);
  3485. ret = ecc_shared_secret(&myKey, &ssl->peerEccKey,
  3486. ssl->arrays.preMasterSecret, &size);
  3487. if (ret != 0)
  3488. ret = ECC_SHARED_ERROR;
  3489. }
  3490. ssl->arrays.preMasterSz = size;
  3491. ecc_free(&myKey);
  3492. #endif /* HAVE_ECC */
  3493. } else
  3494. return ALGO_ID_E; /* unsupported kea */
  3495. if (ret == 0) {
  3496. byte *output;
  3497. int sendSz;
  3498. word32 tlsSz = 0;
  3499. if (ssl->options.tls || ssl->specs.kea == diffie_hellman_kea)
  3500. tlsSz = 2;
  3501. if (ssl->specs.kea == ecc_diffie_hellman_kea) /* always off */
  3502. tlsSz = 0;
  3503. sendSz = encSz + tlsSz + HANDSHAKE_HEADER_SZ + RECORD_HEADER_SZ;
  3504. idx = HANDSHAKE_HEADER_SZ + RECORD_HEADER_SZ;
  3505. #ifdef CYASSL_DTLS
  3506. if (ssl->options.dtls) {
  3507. sendSz += DTLS_HANDSHAKE_EXTRA + DTLS_RECORD_EXTRA;
  3508. idx += DTLS_HANDSHAKE_EXTRA + DTLS_RECORD_EXTRA;
  3509. }
  3510. #endif
  3511. /* check for avalaible size */
  3512. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  3513. return ret;
  3514. /* get ouput buffer */
  3515. output = ssl->buffers.outputBuffer.buffer +
  3516. ssl->buffers.outputBuffer.idx;
  3517. AddHeaders(output, encSz + tlsSz, client_key_exchange, ssl);
  3518. if (tlsSz) {
  3519. c16toa((word16)encSz, &output[idx]);
  3520. idx += 2;
  3521. }
  3522. XMEMCPY(output + idx, encSecret, encSz);
  3523. idx += encSz;
  3524. HashOutput(ssl, output, sendSz, 0);
  3525. #ifdef CYASSL_CALLBACKS
  3526. if (ssl->hsInfoOn)
  3527. AddPacketName("ClientKeyExchange", &ssl->handShakeInfo);
  3528. if (ssl->toInfoOn)
  3529. AddPacketInfo("ClientKeyExchange", &ssl->timeoutInfo,
  3530. output, sendSz, ssl->heap);
  3531. #endif
  3532. ssl->buffers.outputBuffer.length += sendSz;
  3533. ret = SendBuffered(ssl);
  3534. }
  3535. if (ret == 0 || ret == WANT_WRITE) {
  3536. int tmpRet = MakeMasterSecret(ssl);
  3537. if (tmpRet != 0)
  3538. ret = tmpRet; /* save WANT_WRITE unless more serious */
  3539. ssl->options.clientState = CLIENT_KEYEXCHANGE_COMPLETE;
  3540. }
  3541. return ret;
  3542. }
  3543. int SendCertificateVerify(CYASSL* ssl)
  3544. {
  3545. byte *output;
  3546. int sendSz = 0, length, ret;
  3547. word32 idx = 0;
  3548. RsaKey key;
  3549. if (ssl->options.sendVerify == SEND_BLANK_CERT)
  3550. return 0; /* sent blank cert, can't verify */
  3551. /* check for avalaible size */
  3552. if ((ret = CheckAvalaibleSize(ssl, MAX_CERT_VERIFY_SZ)) != 0)
  3553. return ret;
  3554. /* get ouput buffer */
  3555. output = ssl->buffers.outputBuffer.buffer +
  3556. ssl->buffers.outputBuffer.idx;
  3557. BuildCertHashes(ssl, &ssl->certHashes);
  3558. /* TODO: when add DSS support check here */
  3559. InitRsaKey(&key, ssl->heap);
  3560. ret = RsaPrivateKeyDecode(ssl->buffers.key.buffer, &idx, &key,
  3561. ssl->buffers.key.length);
  3562. if (ret == 0) {
  3563. byte* verify = (byte*)&output[RECORD_HEADER_SZ +
  3564. HANDSHAKE_HEADER_SZ];
  3565. byte* signBuffer = ssl->certHashes.md5;
  3566. word32 signSz = sizeof(Hashes);
  3567. byte encodedSig[MAX_ENCODED_SIG_SZ];
  3568. word32 extraSz = 0; /* tls 1.2 hash/sig */
  3569. #ifdef CYASSL_DTLS
  3570. if (ssl->options.dtls)
  3571. verify += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3572. #endif
  3573. length = RsaEncryptSize(&key);
  3574. if (IsAtLeastTLSv1_2(ssl)) {
  3575. verify[0] = sha_mac;
  3576. verify[1] = rsa_sa_algo;
  3577. extraSz = HASH_SIG_SIZE;
  3578. }
  3579. c16toa((word16)length, verify + extraSz); /* prepend verify header*/
  3580. if (IsAtLeastTLSv1_2(ssl)) {
  3581. byte* digest;
  3582. int typeH;
  3583. int digestSz;
  3584. /* sha1 for now */
  3585. digest = ssl->certHashes.sha;
  3586. typeH = SHAh;
  3587. digestSz = SHA_DIGEST_SIZE;
  3588. signSz = EncodeSignature(encodedSig, digest, digestSz, typeH);
  3589. signBuffer = encodedSig;
  3590. }
  3591. ret = RsaSSL_Sign(signBuffer, signSz, verify + extraSz +
  3592. VERIFY_HEADER, ENCRYPT_LEN, &key, &ssl->rng);
  3593. if (ret > 0) {
  3594. ret = 0; /* reset */
  3595. AddHeaders(output, length + extraSz + VERIFY_HEADER,
  3596. certificate_verify, ssl);
  3597. sendSz = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ + length +
  3598. extraSz + VERIFY_HEADER;
  3599. #ifdef CYASSL_DTLS
  3600. if (ssl->options.dtls)
  3601. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3602. #endif
  3603. HashOutput(ssl, output, sendSz, 0);
  3604. }
  3605. }
  3606. FreeRsaKey(&key);
  3607. if (ret == 0) {
  3608. #ifdef CYASSL_CALLBACKS
  3609. if (ssl->hsInfoOn)
  3610. AddPacketName("CertificateVerify", &ssl->handShakeInfo);
  3611. if (ssl->toInfoOn)
  3612. AddPacketInfo("CertificateVerify", &ssl->timeoutInfo,
  3613. output, sendSz, ssl->heap);
  3614. #endif
  3615. ssl->buffers.outputBuffer.length += sendSz;
  3616. return SendBuffered(ssl);
  3617. }
  3618. else
  3619. return ret;
  3620. }
  3621. #endif /* NO_CYASSL_CLIENT */
  3622. #ifndef NO_CYASSL_SERVER
  3623. int SendServerHello(CYASSL* ssl)
  3624. {
  3625. byte *output;
  3626. word32 length, idx = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  3627. int sendSz;
  3628. int ret;
  3629. length = sizeof(ProtocolVersion) + RAN_LEN
  3630. + ID_LEN + ENUM_LEN
  3631. + SUITE_LEN
  3632. + ENUM_LEN;
  3633. /* check for avalaible size */
  3634. if ((ret = CheckAvalaibleSize(ssl, MAX_HELLO_SZ)) != 0)
  3635. return ret;
  3636. /* get ouput buffer */
  3637. output = ssl->buffers.outputBuffer.buffer +
  3638. ssl->buffers.outputBuffer.idx;
  3639. sendSz = length + HANDSHAKE_HEADER_SZ + RECORD_HEADER_SZ;
  3640. AddHeaders(output, length, server_hello, ssl);
  3641. #ifdef CYASSL_DTLS
  3642. if (ssl->options.dtls) {
  3643. idx += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3644. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3645. }
  3646. #endif
  3647. /* now write to output */
  3648. /* first version */
  3649. XMEMCPY(output + idx, &ssl->version, sizeof(ProtocolVersion));
  3650. idx += sizeof(ProtocolVersion);
  3651. /* then random */
  3652. if (!ssl->options.resuming)
  3653. RNG_GenerateBlock(&ssl->rng, ssl->arrays.serverRandom, RAN_LEN);
  3654. XMEMCPY(output + idx, ssl->arrays.serverRandom, RAN_LEN);
  3655. idx += RAN_LEN;
  3656. #ifdef SHOW_SECRETS
  3657. {
  3658. int j;
  3659. printf("server random: ");
  3660. for (j = 0; j < RAN_LEN; j++)
  3661. printf("%02x", ssl->arrays.serverRandom[j]);
  3662. printf("\n");
  3663. }
  3664. #endif
  3665. /* then session id */
  3666. output[idx++] = ID_LEN;
  3667. if (!ssl->options.resuming)
  3668. RNG_GenerateBlock(&ssl->rng, ssl->arrays.sessionID, ID_LEN);
  3669. XMEMCPY(output + idx, ssl->arrays.sessionID, ID_LEN);
  3670. idx += ID_LEN;
  3671. /* then cipher suite */
  3672. output[idx++] = ssl->options.cipherSuite0;
  3673. output[idx++] = ssl->options.cipherSuite;
  3674. /* last, compression */
  3675. if (ssl->options.usingCompression)
  3676. output[idx++] = ZLIB_COMPRESSION;
  3677. else
  3678. output[idx++] = NO_COMPRESSION;
  3679. ssl->buffers.outputBuffer.length += sendSz;
  3680. HashOutput(ssl, output, sendSz, 0);
  3681. #ifdef CYASSL_CALLBACKS
  3682. if (ssl->hsInfoOn)
  3683. AddPacketName("ServerHello", &ssl->handShakeInfo);
  3684. if (ssl->toInfoOn)
  3685. AddPacketInfo("ServerHello", &ssl->timeoutInfo, output, sendSz,
  3686. ssl->heap);
  3687. #endif
  3688. ssl->options.serverState = SERVER_HELLO_COMPLETE;
  3689. return SendBuffered(ssl);
  3690. }
  3691. #ifdef HAVE_ECC
  3692. static byte SetCurveId(int size)
  3693. {
  3694. switch(size) {
  3695. case 20:
  3696. return secp160r1;
  3697. break;
  3698. case 24:
  3699. return secp192r1;
  3700. break;
  3701. case 28:
  3702. return secp224r1;
  3703. break;
  3704. case 32:
  3705. return secp256r1;
  3706. break;
  3707. case 48:
  3708. return secp384r1;
  3709. break;
  3710. case 66:
  3711. return secp521r1;
  3712. break;
  3713. default:
  3714. return 0;
  3715. }
  3716. }
  3717. #endif /* HAVE_ECC */
  3718. int SendServerKeyExchange(CYASSL* ssl)
  3719. {
  3720. int ret = 0;
  3721. (void)ssl;
  3722. #ifndef NO_PSK
  3723. if (ssl->specs.kea == psk_kea)
  3724. {
  3725. byte *output;
  3726. word32 length, idx = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  3727. int sendSz;
  3728. if (ssl->arrays.server_hint[0] == 0) return 0; /* don't send */
  3729. /* include size part */
  3730. length = (word32)XSTRLEN(ssl->arrays.server_hint);
  3731. if (length > MAX_PSK_ID_LEN) return SERVER_HINT_ERROR;
  3732. length += HINT_LEN_SZ;
  3733. sendSz = length + HANDSHAKE_HEADER_SZ + RECORD_HEADER_SZ;
  3734. #ifdef CYASSL_DTLS
  3735. if (ssl->options.dtls) {
  3736. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3737. idx += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3738. }
  3739. #endif
  3740. /* check for avalaible size */
  3741. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  3742. return ret;
  3743. /* get ouput buffer */
  3744. output = ssl->buffers.outputBuffer.buffer +
  3745. ssl->buffers.outputBuffer.idx;
  3746. AddHeaders(output, length, server_key_exchange, ssl);
  3747. /* key data */
  3748. c16toa((word16)(length - HINT_LEN_SZ), output + idx);
  3749. idx += HINT_LEN_SZ;
  3750. XMEMCPY(output + idx, ssl->arrays.server_hint, length -HINT_LEN_SZ);
  3751. HashOutput(ssl, output, sendSz, 0);
  3752. #ifdef CYASSL_CALLBACKS
  3753. if (ssl->hsInfoOn)
  3754. AddPacketName("ServerKeyExchange", &ssl->handShakeInfo);
  3755. if (ssl->toInfoOn)
  3756. AddPacketInfo("ServerKeyExchange", &ssl->timeoutInfo,
  3757. output, sendSz, ssl->heap);
  3758. #endif
  3759. ssl->buffers.outputBuffer.length += sendSz;
  3760. ret = SendBuffered(ssl);
  3761. ssl->options.serverState = SERVER_KEYEXCHANGE_COMPLETE;
  3762. }
  3763. #endif /*NO_PSK */
  3764. #ifdef HAVE_ECC
  3765. if (ssl->specs.kea == ecc_diffie_hellman_kea)
  3766. {
  3767. byte *output;
  3768. word32 length, idx = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  3769. int sendSz;
  3770. byte export[MAX_EXPORT_ECC_SZ];
  3771. word32 expSz = sizeof(export);
  3772. word32 sigSz;
  3773. word32 preSigSz, preSigIdx;
  3774. RsaKey rsaKey;
  3775. ecc_key dsaKey;
  3776. /* curve type, named curve, length(1) */
  3777. length = ENUM_LEN + CURVE_LEN + ENUM_LEN;
  3778. /* pub key size */
  3779. if (ecc_export_x963(&ssl->eccTempKey, export, &expSz) != 0)
  3780. return ECC_EXPORT_ERROR;
  3781. length += expSz;
  3782. preSigSz = length;
  3783. preSigIdx = idx;
  3784. InitRsaKey(&rsaKey, ssl->heap);
  3785. ecc_init(&dsaKey);
  3786. /* sig length */
  3787. length += LENGTH_SZ;
  3788. if (!ssl->buffers.key.buffer) {
  3789. FreeRsaKey(&rsaKey);
  3790. ecc_free(&dsaKey);
  3791. return NO_PRIVATE_KEY;
  3792. }
  3793. if (ssl->specs.sig_algo == rsa_sa_algo) {
  3794. /* rsa sig size */
  3795. word32 i = 0;
  3796. ret = RsaPrivateKeyDecode(ssl->buffers.key.buffer, &i,
  3797. &rsaKey, ssl->buffers.key.length);
  3798. if (ret != 0) return ret;
  3799. sigSz = RsaEncryptSize(&rsaKey);
  3800. }
  3801. else if (ssl->specs.sig_algo == ecc_dsa_sa_algo) {
  3802. /* ecdsa sig size */
  3803. word32 i = 0;
  3804. ret = EccPrivateKeyDecode(ssl->buffers.key.buffer, &i,
  3805. &dsaKey, ssl->buffers.key.length);
  3806. if (ret != 0) return ret;
  3807. sigSz = ecc_sig_size(&dsaKey);
  3808. }
  3809. else {
  3810. FreeRsaKey(&rsaKey);
  3811. ecc_free(&dsaKey);
  3812. return ALGO_ID_E; /* unsupported type */
  3813. }
  3814. length += sigSz;
  3815. if (IsAtLeastTLSv1_2(ssl))
  3816. length += HASH_SIG_SIZE;
  3817. sendSz = length + HANDSHAKE_HEADER_SZ + RECORD_HEADER_SZ;
  3818. #ifdef CYASSL_DTLS
  3819. if (ssl->options.dtls) {
  3820. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3821. idx += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3822. preSigIdx = idx;
  3823. }
  3824. #endif
  3825. /* check for avalaible size */
  3826. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0) {
  3827. FreeRsaKey(&rsaKey);
  3828. ecc_free(&dsaKey);
  3829. return ret;
  3830. }
  3831. /* get ouput buffer */
  3832. output = ssl->buffers.outputBuffer.buffer +
  3833. ssl->buffers.outputBuffer.idx;
  3834. AddHeaders(output, length, server_key_exchange, ssl);
  3835. /* key exchange data */
  3836. output[idx++] = named_curve;
  3837. output[idx++] = 0x00; /* leading zero */
  3838. output[idx++] = SetCurveId(ecc_size(&ssl->eccTempKey));
  3839. output[idx++] = expSz;
  3840. XMEMCPY(output + idx, export, expSz);
  3841. idx += expSz;
  3842. if (IsAtLeastTLSv1_2(ssl)) {
  3843. output[idx++] = sha_mac;
  3844. output[idx++] = ssl->specs.sig_algo;
  3845. }
  3846. c16toa(sigSz, output + idx);
  3847. idx += LENGTH_SZ;
  3848. /* do signature */
  3849. {
  3850. Md5 md5;
  3851. Sha sha;
  3852. byte hash[FINISHED_SZ];
  3853. byte* signBuffer = hash;
  3854. word32 signSz = sizeof(hash);
  3855. /* md5 */
  3856. InitMd5(&md5);
  3857. Md5Update(&md5, ssl->arrays.clientRandom, RAN_LEN);
  3858. Md5Update(&md5, ssl->arrays.serverRandom, RAN_LEN);
  3859. Md5Update(&md5, output + preSigIdx, preSigSz);
  3860. Md5Final(&md5, hash);
  3861. /* sha */
  3862. InitSha(&sha);
  3863. ShaUpdate(&sha, ssl->arrays.clientRandom, RAN_LEN);
  3864. ShaUpdate(&sha, ssl->arrays.serverRandom, RAN_LEN);
  3865. ShaUpdate(&sha, output + preSigIdx, preSigSz);
  3866. ShaFinal(&sha, &hash[MD5_DIGEST_SIZE]);
  3867. if (ssl->specs.sig_algo == rsa_sa_algo) {
  3868. byte encodedSig[MAX_ENCODED_SIG_SZ];
  3869. if (IsAtLeastTLSv1_2(ssl)) {
  3870. byte* digest;
  3871. int hType;
  3872. int digestSz;
  3873. /* sha1 for now */
  3874. digest = &hash[MD5_DIGEST_SIZE];
  3875. hType = SHAh;
  3876. digestSz = SHA_DIGEST_SIZE;
  3877. signSz = EncodeSignature(encodedSig, digest, digestSz,
  3878. hType);
  3879. signBuffer = encodedSig;
  3880. }
  3881. ret = RsaSSL_Sign(signBuffer, signSz, output + idx, sigSz,
  3882. &rsaKey, &ssl->rng);
  3883. FreeRsaKey(&rsaKey);
  3884. if (ret > 0)
  3885. ret = 0; /* reset on success */
  3886. else
  3887. return ret;
  3888. }
  3889. else if (ssl->specs.sig_algo == ecc_dsa_sa_algo) {
  3890. word32 sz = sigSz;
  3891. FreeRsaKey(&rsaKey);
  3892. ret = ecc_sign_hash(&hash[MD5_DIGEST_SIZE], SHA_DIGEST_SIZE,
  3893. output + idx, &sz, &ssl->rng, &dsaKey);
  3894. if (ret < 0) return ret;
  3895. }
  3896. }
  3897. HashOutput(ssl, output, sendSz, 0);
  3898. #ifdef CYASSL_CALLBACKS
  3899. if (ssl->hsInfoOn)
  3900. AddPacketName("ServerKeyExchange", &ssl->handShakeInfo);
  3901. if (ssl->toInfoOn)
  3902. AddPacketInfo("ServerKeyExchange", &ssl->timeoutInfo,
  3903. output, sendSz, ssl->heap);
  3904. #endif
  3905. ssl->buffers.outputBuffer.length += sendSz;
  3906. ret = SendBuffered(ssl);
  3907. ssl->options.serverState = SERVER_KEYEXCHANGE_COMPLETE;
  3908. }
  3909. #endif /* HAVE_ECC */
  3910. #ifdef OPENSSL_EXTRA
  3911. if (ssl->specs.kea == diffie_hellman_kea) {
  3912. byte *output;
  3913. word32 length = 0, idx = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  3914. int sendSz;
  3915. word32 sigSz = 0, i = 0;
  3916. word32 preSigSz = 0, preSigIdx = 0;
  3917. RsaKey rsaKey;
  3918. DhKey dhKey;
  3919. if (ssl->buffers.serverDH_P.buffer == NULL ||
  3920. ssl->buffers.serverDH_G.buffer == NULL)
  3921. return NO_DH_PARAMS;
  3922. if (ssl->buffers.serverDH_Pub.buffer == NULL) {
  3923. ssl->buffers.serverDH_Pub.buffer = (byte*)XMALLOC(
  3924. ssl->buffers.serverDH_P.length + 2, ssl->ctx->heap,
  3925. DYNAMIC_TYPE_DH);
  3926. if (ssl->buffers.serverDH_Pub.buffer == NULL)
  3927. return MEMORY_E;
  3928. }
  3929. if (ssl->buffers.serverDH_Priv.buffer == NULL) {
  3930. ssl->buffers.serverDH_Priv.buffer = (byte*)XMALLOC(
  3931. ssl->buffers.serverDH_P.length + 2, ssl->ctx->heap,
  3932. DYNAMIC_TYPE_DH);
  3933. if (ssl->buffers.serverDH_Priv.buffer == NULL)
  3934. return MEMORY_E;
  3935. }
  3936. InitDhKey(&dhKey);
  3937. ret = DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
  3938. ssl->buffers.serverDH_P.length,
  3939. ssl->buffers.serverDH_G.buffer,
  3940. ssl->buffers.serverDH_G.length);
  3941. if (ret == 0)
  3942. ret = DhGenerateKeyPair(&dhKey, &ssl->rng,
  3943. ssl->buffers.serverDH_Priv.buffer,
  3944. &ssl->buffers.serverDH_Priv.length,
  3945. ssl->buffers.serverDH_Pub.buffer,
  3946. &ssl->buffers.serverDH_Pub.length);
  3947. FreeDhKey(&dhKey);
  3948. if (ret == 0) {
  3949. length = LENGTH_SZ * 3; /* p, g, pub */
  3950. length += ssl->buffers.serverDH_P.length +
  3951. ssl->buffers.serverDH_G.length +
  3952. ssl->buffers.serverDH_Pub.length;
  3953. preSigIdx = idx;
  3954. preSigSz = length;
  3955. /* sig length */
  3956. length += LENGTH_SZ;
  3957. if (!ssl->buffers.key.buffer)
  3958. return NO_PRIVATE_KEY;
  3959. InitRsaKey(&rsaKey, ssl->heap);
  3960. ret = RsaPrivateKeyDecode(ssl->buffers.key.buffer, &i, &rsaKey,
  3961. ssl->buffers.key.length);
  3962. if (ret == 0) {
  3963. sigSz = RsaEncryptSize(&rsaKey);
  3964. length += sigSz;
  3965. }
  3966. }
  3967. if (ret != 0) {
  3968. FreeRsaKey(&rsaKey);
  3969. return ret;
  3970. }
  3971. if (IsAtLeastTLSv1_2(ssl))
  3972. length += HASH_SIG_SIZE;
  3973. sendSz = length + HANDSHAKE_HEADER_SZ + RECORD_HEADER_SZ;
  3974. #ifdef CYASSL_DTLS
  3975. if (ssl->options.dtls) {
  3976. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3977. idx += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  3978. preSigIdx = idx;
  3979. }
  3980. #endif
  3981. /* check for avalaible size */
  3982. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0) {
  3983. FreeRsaKey(&rsaKey);
  3984. return ret;
  3985. }
  3986. /* get ouput buffer */
  3987. output = ssl->buffers.outputBuffer.buffer +
  3988. ssl->buffers.outputBuffer.idx;
  3989. AddHeaders(output, length, server_key_exchange, ssl);
  3990. /* add p, g, pub */
  3991. c16toa((word16)ssl->buffers.serverDH_P.length, output + idx);
  3992. idx += LENGTH_SZ;
  3993. XMEMCPY(output + idx, ssl->buffers.serverDH_P.buffer,
  3994. ssl->buffers.serverDH_P.length);
  3995. idx += ssl->buffers.serverDH_P.length;
  3996. /* g */
  3997. c16toa((word16)ssl->buffers.serverDH_G.length, output + idx);
  3998. idx += LENGTH_SZ;
  3999. XMEMCPY(output + idx, ssl->buffers.serverDH_G.buffer,
  4000. ssl->buffers.serverDH_G.length);
  4001. idx += ssl->buffers.serverDH_G.length;
  4002. /* pub */
  4003. c16toa((word16)ssl->buffers.serverDH_Pub.length, output + idx);
  4004. idx += LENGTH_SZ;
  4005. XMEMCPY(output + idx, ssl->buffers.serverDH_Pub.buffer,
  4006. ssl->buffers.serverDH_Pub.length);
  4007. idx += ssl->buffers.serverDH_Pub.length;
  4008. /* Add signature */
  4009. if (IsAtLeastTLSv1_2(ssl)) {
  4010. output[idx++] = sha_mac;
  4011. output[idx++] = ssl->specs.sig_algo;
  4012. }
  4013. /* size */
  4014. c16toa((word16)sigSz, output + idx);
  4015. idx += LENGTH_SZ;
  4016. /* do signature */
  4017. {
  4018. Md5 md5;
  4019. Sha sha;
  4020. byte hash[FINISHED_SZ];
  4021. byte* signBuffer = hash;
  4022. word32 signSz = sizeof(hash);
  4023. /* md5 */
  4024. InitMd5(&md5);
  4025. Md5Update(&md5, ssl->arrays.clientRandom, RAN_LEN);
  4026. Md5Update(&md5, ssl->arrays.serverRandom, RAN_LEN);
  4027. Md5Update(&md5, output + preSigIdx, preSigSz);
  4028. Md5Final(&md5, hash);
  4029. /* sha */
  4030. InitSha(&sha);
  4031. ShaUpdate(&sha, ssl->arrays.clientRandom, RAN_LEN);
  4032. ShaUpdate(&sha, ssl->arrays.serverRandom, RAN_LEN);
  4033. ShaUpdate(&sha, output + preSigIdx, preSigSz);
  4034. ShaFinal(&sha, &hash[MD5_DIGEST_SIZE]);
  4035. if (ssl->specs.sig_algo == rsa_sa_algo) {
  4036. byte encodedSig[MAX_ENCODED_SIG_SZ];
  4037. if (IsAtLeastTLSv1_2(ssl)) {
  4038. byte* digest;
  4039. int typeH;
  4040. int digestSz;
  4041. /* sha1 for now */
  4042. digest = &hash[MD5_DIGEST_SIZE];
  4043. typeH = SHAh;
  4044. digestSz = SHA_DIGEST_SIZE;
  4045. signSz = EncodeSignature(encodedSig, digest, digestSz,
  4046. typeH);
  4047. signBuffer = encodedSig;
  4048. }
  4049. ret = RsaSSL_Sign(signBuffer, signSz, output + idx, sigSz,
  4050. &rsaKey, &ssl->rng);
  4051. FreeRsaKey(&rsaKey);
  4052. if (ret > 0)
  4053. ret = 0; /* reset on success */
  4054. else
  4055. return ret;
  4056. }
  4057. }
  4058. HashOutput(ssl, output, sendSz, 0);
  4059. #ifdef CYASSL_CALLBACKS
  4060. if (ssl->hsInfoOn)
  4061. AddPacketName("ServerKeyExchange", &ssl->handShakeInfo);
  4062. if (ssl->toInfoOn)
  4063. AddPacketInfo("ServerKeyExchange", &ssl->timeoutInfo,
  4064. output, sendSz, ssl->heap);
  4065. #endif
  4066. ssl->buffers.outputBuffer.length += sendSz;
  4067. ret = SendBuffered(ssl);
  4068. ssl->options.serverState = SERVER_KEYEXCHANGE_COMPLETE;
  4069. }
  4070. #endif /* OPENSSL_EXTRA */
  4071. return ret;
  4072. }
  4073. static int MatchSuite(CYASSL* ssl, Suites* peerSuites)
  4074. {
  4075. word16 i, j;
  4076. /* & 0x1 equivalent % 2 */
  4077. if (peerSuites->suiteSz == 0 || peerSuites->suiteSz & 0x1)
  4078. return MATCH_SUITE_ERROR;
  4079. /* start with best, if a match we are good */
  4080. for (i = 0; i < ssl->suites.suiteSz; i += 2)
  4081. for (j = 0; j < peerSuites->suiteSz; j += 2)
  4082. if (ssl->suites.suites[i] == peerSuites->suites[j] &&
  4083. ssl->suites.suites[i+1] == peerSuites->suites[j+1] ) {
  4084. ssl->options.cipherSuite0 = ssl->suites.suites[i];
  4085. ssl->options.cipherSuite = ssl->suites.suites[i+1];
  4086. return SetCipherSpecs(ssl);
  4087. }
  4088. return MATCH_SUITE_ERROR;
  4089. }
  4090. /* process old style client hello, deprecate? */
  4091. int ProcessOldClientHello(CYASSL* ssl, const byte* input, word32* inOutIdx,
  4092. word32 inSz, word16 sz)
  4093. {
  4094. word32 idx = *inOutIdx;
  4095. word16 sessionSz;
  4096. word16 randomSz;
  4097. word16 i, j;
  4098. ProtocolVersion pv;
  4099. Suites clSuites;
  4100. (void)inSz;
  4101. CYASSL_MSG("Got old format client hello");
  4102. #ifdef CYASSL_CALLBACKS
  4103. if (ssl->hsInfoOn)
  4104. AddPacketName("ClientHello", &ssl->handShakeInfo);
  4105. if (ssl->toInfoOn)
  4106. AddLateName("ClientHello", &ssl->timeoutInfo);
  4107. #endif
  4108. /* manually hash input since different format */
  4109. Md5Update(&ssl->hashMd5, input + idx, sz);
  4110. ShaUpdate(&ssl->hashSha, input + idx, sz);
  4111. #ifndef NO_SHA256
  4112. if (IsAtLeastTLSv1_2(ssl))
  4113. Sha256Update(&ssl->hashSha256, input + idx, sz);
  4114. #endif
  4115. /* does this value mean client_hello? */
  4116. idx++;
  4117. /* version */
  4118. pv.major = input[idx++];
  4119. pv.minor = input[idx++];
  4120. ssl->chVersion = pv; /* store */
  4121. if (ssl->version.minor > pv.minor) {
  4122. byte havePSK = 0;
  4123. if (!ssl->options.downgrade) {
  4124. CYASSL_MSG("Client trying to connect with lesser version");
  4125. return VERSION_ERROR;
  4126. }
  4127. if (pv.minor == SSLv3_MINOR) {
  4128. /* turn off tls */
  4129. CYASSL_MSG(" downgrading to SSLv3");
  4130. ssl->options.tls = 0;
  4131. ssl->options.tls1_1 = 0;
  4132. ssl->version.minor = SSLv3_MINOR;
  4133. }
  4134. else if (pv.minor == TLSv1_MINOR) {
  4135. CYASSL_MSG(" downgrading to TLSv1");
  4136. /* turn off tls 1.1+ */
  4137. ssl->options.tls1_1 = 0;
  4138. ssl->version.minor = TLSv1_MINOR;
  4139. }
  4140. else if (pv.minor == TLSv1_1_MINOR) {
  4141. CYASSL_MSG(" downgrading to TLSv1.1");
  4142. ssl->version.minor = TLSv1_1_MINOR;
  4143. }
  4144. #ifndef NO_PSK
  4145. havePSK = ssl->options.havePSK;
  4146. #endif
  4147. InitSuites(&ssl->suites, ssl->version, ssl->options.haveDH, havePSK,
  4148. ssl->options.haveNTRU, ssl->options.haveECDSA,
  4149. ssl->ctx->method->side);
  4150. }
  4151. /* suite size */
  4152. ato16(&input[idx], &clSuites.suiteSz);
  4153. idx += 2;
  4154. if (clSuites.suiteSz > MAX_SUITE_SZ)
  4155. return BUFFER_ERROR;
  4156. /* session size */
  4157. ato16(&input[idx], &sessionSz);
  4158. idx += 2;
  4159. if (sessionSz > ID_LEN)
  4160. return BUFFER_ERROR;
  4161. /* random size */
  4162. ato16(&input[idx], &randomSz);
  4163. idx += 2;
  4164. if (randomSz > RAN_LEN)
  4165. return BUFFER_ERROR;
  4166. /* suites */
  4167. for (i = 0, j = 0; i < clSuites.suiteSz; i += 3) {
  4168. byte first = input[idx++];
  4169. if (!first) { /* implicit: skip sslv2 type */
  4170. XMEMCPY(&clSuites.suites[j], &input[idx], 2);
  4171. j += 2;
  4172. }
  4173. idx += 2;
  4174. }
  4175. clSuites.suiteSz = j;
  4176. /* session id */
  4177. if (sessionSz) {
  4178. XMEMCPY(ssl->arrays.sessionID, input + idx, sessionSz);
  4179. idx += sessionSz;
  4180. ssl->options.resuming = 1;
  4181. }
  4182. /* random */
  4183. if (randomSz < RAN_LEN)
  4184. XMEMSET(ssl->arrays.clientRandom, 0, RAN_LEN - randomSz);
  4185. XMEMCPY(&ssl->arrays.clientRandom[RAN_LEN - randomSz], input + idx,
  4186. randomSz);
  4187. idx += randomSz;
  4188. if (ssl->options.usingCompression)
  4189. ssl->options.usingCompression = 0; /* turn off */
  4190. ssl->options.clientState = CLIENT_HELLO_COMPLETE;
  4191. *inOutIdx = idx;
  4192. /* DoClientHello uses same resume code */
  4193. while (ssl->options.resuming) { /* let's try */
  4194. int ret;
  4195. CYASSL_SESSION* session = GetSession(ssl, ssl->arrays.masterSecret);
  4196. if (!session) {
  4197. ssl->options.resuming = 0;
  4198. break; /* session lookup failed */
  4199. }
  4200. if (MatchSuite(ssl, &clSuites) < 0)
  4201. return UNSUPPORTED_SUITE;
  4202. RNG_GenerateBlock(&ssl->rng, ssl->arrays.serverRandom, RAN_LEN);
  4203. if (ssl->options.tls)
  4204. ret = DeriveTlsKeys(ssl);
  4205. else
  4206. ret = DeriveKeys(ssl);
  4207. ssl->options.clientState = CLIENT_KEYEXCHANGE_COMPLETE;
  4208. return ret;
  4209. }
  4210. return MatchSuite(ssl, &clSuites);
  4211. }
  4212. static int DoClientHello(CYASSL* ssl, const byte* input, word32* inOutIdx,
  4213. word32 totalSz, word32 helloSz)
  4214. {
  4215. byte b;
  4216. ProtocolVersion pv;
  4217. Suites clSuites;
  4218. word32 i = *inOutIdx;
  4219. word32 begin = i;
  4220. #ifdef CYASSL_CALLBACKS
  4221. if (ssl->hsInfoOn) AddPacketName("ClientHello", &ssl->handShakeInfo);
  4222. if (ssl->toInfoOn) AddLateName("ClientHello", &ssl->timeoutInfo);
  4223. #endif
  4224. /* make sure can read up to session */
  4225. if (i + sizeof(pv) + RAN_LEN + ENUM_LEN > totalSz)
  4226. return INCOMPLETE_DATA;
  4227. XMEMCPY(&pv, input + i, sizeof(pv));
  4228. ssl->chVersion = pv; /* store */
  4229. i += sizeof(pv);
  4230. if (ssl->version.minor > pv.minor) {
  4231. byte havePSK = 0;
  4232. if (!ssl->options.downgrade) {
  4233. CYASSL_MSG("Client trying to connect with lesser version");
  4234. return VERSION_ERROR;
  4235. }
  4236. if (pv.minor == SSLv3_MINOR) {
  4237. /* turn off tls */
  4238. CYASSL_MSG(" downgrading to SSLv3");
  4239. ssl->options.tls = 0;
  4240. ssl->options.tls1_1 = 0;
  4241. ssl->version.minor = SSLv3_MINOR;
  4242. }
  4243. else if (pv.minor == TLSv1_MINOR) {
  4244. /* turn off tls 1.1+ */
  4245. CYASSL_MSG(" downgrading to TLSv1");
  4246. ssl->options.tls1_1 = 0;
  4247. ssl->version.minor = TLSv1_MINOR;
  4248. }
  4249. else if (pv.minor == TLSv1_1_MINOR) {
  4250. CYASSL_MSG(" downgrading to TLSv1.1");
  4251. ssl->version.minor = TLSv1_1_MINOR;
  4252. }
  4253. #ifndef NO_PSK
  4254. havePSK = ssl->options.havePSK;
  4255. #endif
  4256. InitSuites(&ssl->suites, ssl->version, ssl->options.haveDH, havePSK,
  4257. ssl->options.haveNTRU, ssl->options.haveECDSA,
  4258. ssl->ctx->method->side);
  4259. }
  4260. /* random */
  4261. XMEMCPY(ssl->arrays.clientRandom, input + i, RAN_LEN);
  4262. i += RAN_LEN;
  4263. #ifdef SHOW_SECRETS
  4264. {
  4265. int j;
  4266. printf("client random: ");
  4267. for (j = 0; j < RAN_LEN; j++)
  4268. printf("%02x", ssl->arrays.clientRandom[j]);
  4269. printf("\n");
  4270. }
  4271. #endif
  4272. /* session id */
  4273. b = input[i++];
  4274. if (b) {
  4275. if (i + ID_LEN > totalSz)
  4276. return INCOMPLETE_DATA;
  4277. XMEMCPY(ssl->arrays.sessionID, input + i, ID_LEN);
  4278. i += b;
  4279. ssl->options.resuming= 1; /* client wants to resume */
  4280. CYASSL_MSG("Client wants to resume session");
  4281. }
  4282. #ifdef CYASSL_DTLS
  4283. /* cookie */
  4284. if (ssl->options.dtls) {
  4285. b = input[i++];
  4286. if (b) {
  4287. if (b > MAX_COOKIE_LEN)
  4288. return BUFFER_ERROR;
  4289. if (i + b > totalSz)
  4290. return INCOMPLETE_DATA;
  4291. XMEMCPY(ssl->arrays.cookie, input + i, b);
  4292. i += b;
  4293. }
  4294. }
  4295. #endif
  4296. if (i + LENGTH_SZ > totalSz)
  4297. return INCOMPLETE_DATA;
  4298. /* suites */
  4299. ato16(&input[i], &clSuites.suiteSz);
  4300. i += 2;
  4301. /* suites and comp len */
  4302. if (i + clSuites.suiteSz + ENUM_LEN > totalSz)
  4303. return INCOMPLETE_DATA;
  4304. if (clSuites.suiteSz > MAX_SUITE_SZ)
  4305. return BUFFER_ERROR;
  4306. XMEMCPY(clSuites.suites, input + i, clSuites.suiteSz);
  4307. i += clSuites.suiteSz;
  4308. b = input[i++]; /* comp len */
  4309. if (i + b > totalSz)
  4310. return INCOMPLETE_DATA;
  4311. if (ssl->options.usingCompression) {
  4312. int match = 0;
  4313. while (b--) {
  4314. byte comp = input[i++];
  4315. if (comp == ZLIB_COMPRESSION)
  4316. match = 1;
  4317. }
  4318. if (!match) {
  4319. CYASSL_MSG("Not matching compression, turning off");
  4320. ssl->options.usingCompression = 0; /* turn off */
  4321. }
  4322. }
  4323. else
  4324. i += b; /* ignore, since we're not on */
  4325. ssl->options.clientState = CLIENT_HELLO_COMPLETE;
  4326. *inOutIdx = i;
  4327. if ( (i - begin) < helloSz)
  4328. *inOutIdx = begin + helloSz; /* skip extensions */
  4329. /* ProcessOld uses same resume code */
  4330. while (ssl->options.resuming) { /* let's try */
  4331. int ret;
  4332. CYASSL_SESSION* session = GetSession(ssl, ssl->arrays.masterSecret);
  4333. if (!session) {
  4334. ssl->options.resuming = 0;
  4335. CYASSL_MSG("Session lookup for resume failed");
  4336. break; /* session lookup failed */
  4337. }
  4338. if (MatchSuite(ssl, &clSuites) < 0)
  4339. return UNSUPPORTED_SUITE;
  4340. RNG_GenerateBlock(&ssl->rng, ssl->arrays.serverRandom, RAN_LEN);
  4341. if (ssl->options.tls)
  4342. ret = DeriveTlsKeys(ssl);
  4343. else
  4344. ret = DeriveKeys(ssl);
  4345. ssl->options.clientState = CLIENT_KEYEXCHANGE_COMPLETE;
  4346. return ret;
  4347. }
  4348. return MatchSuite(ssl, &clSuites);
  4349. }
  4350. static int DoCertificateVerify(CYASSL* ssl, byte* input, word32* inOutsz,
  4351. word32 totalSz)
  4352. {
  4353. word16 sz = 0;
  4354. word32 i = *inOutsz;
  4355. int ret = VERIFY_CERT_ERROR; /* start in error state */
  4356. byte* sig;
  4357. byte* out;
  4358. int outLen;
  4359. #ifdef CYASSL_CALLBACKS
  4360. if (ssl->hsInfoOn)
  4361. AddPacketName("CertificateVerify", &ssl->handShakeInfo);
  4362. if (ssl->toInfoOn)
  4363. AddLateName("CertificateVerify", &ssl->timeoutInfo);
  4364. #endif
  4365. if ( (i + VERIFY_HEADER) > totalSz)
  4366. return INCOMPLETE_DATA;
  4367. if (IsAtLeastTLSv1_2(ssl))
  4368. i += HASH_SIG_SIZE;
  4369. ato16(&input[i], &sz);
  4370. i += VERIFY_HEADER;
  4371. if ( (i + sz) > totalSz)
  4372. return INCOMPLETE_DATA;
  4373. if (sz > ENCRYPT_LEN)
  4374. return BUFFER_ERROR;
  4375. sig = &input[i];
  4376. *inOutsz = i + sz;
  4377. /* TODO: when add DSS support check here */
  4378. if (ssl->peerRsaKeyPresent != 0) {
  4379. outLen = RsaSSL_VerifyInline(sig, sz, &out, &ssl->peerRsaKey);
  4380. if (IsAtLeastTLSv1_2(ssl)) {
  4381. byte encodedSig[MAX_ENCODED_SIG_SZ];
  4382. word32 sigSz;
  4383. byte* digest;
  4384. int typeH;
  4385. int digestSz;
  4386. /* sha1 for now */
  4387. digest = ssl->certHashes.sha;
  4388. typeH = SHAh;
  4389. digestSz = SHA_DIGEST_SIZE;
  4390. sigSz = EncodeSignature(encodedSig, digest, digestSz, typeH);
  4391. if (outLen == (int)sigSz && XMEMCMP(out, encodedSig,sigSz) == 0)
  4392. ret = 0;
  4393. }
  4394. else {
  4395. if (outLen == sizeof(ssl->certHashes) && XMEMCMP(out,
  4396. ssl->certHashes.md5, sizeof(ssl->certHashes)) == 0)
  4397. ret = 0;
  4398. }
  4399. }
  4400. return ret;
  4401. }
  4402. int SendServerHelloDone(CYASSL* ssl)
  4403. {
  4404. byte *output;
  4405. int sendSz = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
  4406. int ret;
  4407. #ifdef CYASSL_DTLS
  4408. if (ssl->options.dtls)
  4409. sendSz += DTLS_RECORD_EXTRA + DTLS_HANDSHAKE_EXTRA;
  4410. #endif
  4411. /* check for avalaible size */
  4412. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  4413. return ret;
  4414. /* get ouput buffer */
  4415. output = ssl->buffers.outputBuffer.buffer +
  4416. ssl->buffers.outputBuffer.idx;
  4417. AddHeaders(output, 0, server_hello_done, ssl);
  4418. HashOutput(ssl, output, sendSz, 0);
  4419. #ifdef CYASSL_CALLBACKS
  4420. if (ssl->hsInfoOn)
  4421. AddPacketName("ServerHelloDone", &ssl->handShakeInfo);
  4422. if (ssl->toInfoOn)
  4423. AddPacketInfo("ServerHelloDone", &ssl->timeoutInfo, output, sendSz,
  4424. ssl->heap);
  4425. #endif
  4426. ssl->options.serverState = SERVER_HELLODONE_COMPLETE;
  4427. ssl->buffers.outputBuffer.length += sendSz;
  4428. return SendBuffered(ssl);
  4429. }
  4430. int SendHelloVerifyRequest(CYASSL* ssl)
  4431. {
  4432. byte* output;
  4433. int length = VERSION_SZ + ENUM_LEN;
  4434. int idx = DTLS_RECORD_HEADER_SZ + DTLS_HANDSHAKE_HEADER_SZ;
  4435. int sendSz = length + idx;
  4436. int ret;
  4437. /* check for avalaible size */
  4438. if ((ret = CheckAvalaibleSize(ssl, sendSz)) != 0)
  4439. return ret;
  4440. /* get ouput buffer */
  4441. output = ssl->buffers.outputBuffer.buffer +
  4442. ssl->buffers.outputBuffer.idx;
  4443. AddHeaders(output, length, hello_verify_request, ssl);
  4444. XMEMCPY(output + idx, &ssl->chVersion, VERSION_SZ);
  4445. idx += VERSION_SZ;
  4446. output[idx++] = 0; /* no cookie for now */
  4447. HashOutput(ssl, output, sendSz, 0);
  4448. #ifdef CYASSL_CALLBACKS
  4449. if (ssl->hsInfoOn)
  4450. AddPacketName("HelloVerifyRequest", &ssl->handShakeInfo);
  4451. if (ssl->toInfoOn)
  4452. AddPacketInfo("HelloVerifyRequest", &ssl->timeoutInfo, output,
  4453. sendSz, ssl->heap);
  4454. #endif
  4455. ssl->options.serverState = SERVER_HELLOVERIFYREQUEST_COMPLETE;
  4456. ssl->buffers.outputBuffer.length += sendSz;
  4457. return SendBuffered(ssl);
  4458. }
  4459. static int DoClientKeyExchange(CYASSL* ssl, byte* input,
  4460. word32* inOutIdx)
  4461. {
  4462. int ret = 0;
  4463. word32 length = 0;
  4464. byte* out;
  4465. if (ssl->options.verifyPeer && ssl->options.failNoCert)
  4466. if (!ssl->options.havePeerCert) {
  4467. CYASSL_MSG("client didn't present peer cert");
  4468. return NO_PEER_CERT;
  4469. }
  4470. #ifdef CYASSL_CALLBACKS
  4471. if (ssl->hsInfoOn)
  4472. AddPacketName("ClientKeyExchange", &ssl->handShakeInfo);
  4473. if (ssl->toInfoOn)
  4474. AddLateName("ClientKeyExchange", &ssl->timeoutInfo);
  4475. #endif
  4476. if (ssl->specs.kea == rsa_kea) {
  4477. word32 idx = 0;
  4478. RsaKey key;
  4479. byte* tmp = 0;
  4480. InitRsaKey(&key, ssl->heap);
  4481. if (ssl->buffers.key.buffer)
  4482. ret = RsaPrivateKeyDecode(ssl->buffers.key.buffer, &idx, &key,
  4483. ssl->buffers.key.length);
  4484. else
  4485. return NO_PRIVATE_KEY;
  4486. if (ret == 0) {
  4487. length = RsaEncryptSize(&key);
  4488. ssl->arrays.preMasterSz = SECRET_LEN;
  4489. if (ssl->options.tls)
  4490. (*inOutIdx) += 2;
  4491. tmp = input + *inOutIdx;
  4492. *inOutIdx += length;
  4493. if (RsaPrivateDecryptInline(tmp, length, &out, &key) ==
  4494. SECRET_LEN) {
  4495. XMEMCPY(ssl->arrays.preMasterSecret, out, SECRET_LEN);
  4496. if (ssl->arrays.preMasterSecret[0] != ssl->chVersion.major
  4497. ||
  4498. ssl->arrays.preMasterSecret[1] != ssl->chVersion.minor)
  4499. ret = PMS_VERSION_ERROR;
  4500. else
  4501. ret = MakeMasterSecret(ssl);
  4502. }
  4503. else
  4504. ret = RSA_PRIVATE_ERROR;
  4505. }
  4506. FreeRsaKey(&key);
  4507. #ifndef NO_PSK
  4508. } else if (ssl->specs.kea == psk_kea) {
  4509. byte* pms = ssl->arrays.preMasterSecret;
  4510. word16 ci_sz;
  4511. ato16(&input[*inOutIdx], &ci_sz);
  4512. *inOutIdx += LENGTH_SZ;
  4513. if (ci_sz > MAX_PSK_ID_LEN) return CLIENT_ID_ERROR;
  4514. XMEMCPY(ssl->arrays.client_identity, &input[*inOutIdx], ci_sz);
  4515. *inOutIdx += ci_sz;
  4516. ssl->arrays.client_identity[ci_sz] = 0;
  4517. ssl->arrays.psk_keySz = ssl->options.server_psk_cb(ssl,
  4518. ssl->arrays.client_identity, ssl->arrays.psk_key,
  4519. MAX_PSK_KEY_LEN);
  4520. if (ssl->arrays.psk_keySz == 0 ||
  4521. ssl->arrays.psk_keySz > MAX_PSK_KEY_LEN) return PSK_KEY_ERROR;
  4522. /* make psk pre master secret */
  4523. /* length of key + length 0s + length of key + key */
  4524. c16toa((word16)ssl->arrays.psk_keySz, pms);
  4525. pms += 2;
  4526. XMEMSET(pms, 0, ssl->arrays.psk_keySz);
  4527. pms += ssl->arrays.psk_keySz;
  4528. c16toa((word16)ssl->arrays.psk_keySz, pms);
  4529. pms += 2;
  4530. XMEMCPY(pms, ssl->arrays.psk_key, ssl->arrays.psk_keySz);
  4531. ssl->arrays.preMasterSz = ssl->arrays.psk_keySz * 2 + 4;
  4532. ret = MakeMasterSecret(ssl);
  4533. #endif /* NO_PSK */
  4534. #ifdef HAVE_NTRU
  4535. } else if (ssl->specs.kea == ntru_kea) {
  4536. word32 rc;
  4537. word16 cipherLen;
  4538. word16 plainLen = sizeof(ssl->arrays.preMasterSecret);
  4539. byte* tmp;
  4540. if (!ssl->buffers.key.buffer)
  4541. return NO_PRIVATE_KEY;
  4542. ato16(&input[*inOutIdx], &cipherLen);
  4543. *inOutIdx += LENGTH_SZ;
  4544. if (cipherLen > MAX_NTRU_ENCRYPT_SZ)
  4545. return NTRU_KEY_ERROR;
  4546. tmp = input + *inOutIdx;
  4547. rc = crypto_ntru_decrypt((word16)ssl->buffers.key.length,
  4548. ssl->buffers.key.buffer, cipherLen, tmp, &plainLen,
  4549. ssl->arrays.preMasterSecret);
  4550. if (rc != NTRU_OK || plainLen != SECRET_LEN)
  4551. return NTRU_DECRYPT_ERROR;
  4552. *inOutIdx += cipherLen;
  4553. ssl->arrays.preMasterSz = plainLen;
  4554. ret = MakeMasterSecret(ssl);
  4555. #endif /* HAVE_NTRU */
  4556. #ifdef HAVE_ECC
  4557. } else if (ssl->specs.kea == ecc_diffie_hellman_kea) {
  4558. word32 size;
  4559. word32 bLength = input[*inOutIdx]; /* one byte length */
  4560. *inOutIdx += 1;
  4561. ret = ecc_import_x963(&input[*inOutIdx], bLength, &ssl->peerEccKey);
  4562. if (ret != 0)
  4563. return ECC_PEERKEY_ERROR;
  4564. *inOutIdx += bLength;
  4565. ssl->peerEccKeyPresent = 1;
  4566. size = sizeof(ssl->arrays.preMasterSecret);
  4567. ret = ecc_shared_secret(&ssl->eccTempKey, &ssl->peerEccKey,
  4568. ssl->arrays.preMasterSecret, &size);
  4569. if (ret != 0)
  4570. return ECC_SHARED_ERROR;
  4571. ssl->arrays.preMasterSz = size;
  4572. ret = MakeMasterSecret(ssl);
  4573. #endif /* HAVE_ECC */
  4574. #ifdef OPENSSL_EXTRA
  4575. } else if (ssl->specs.kea == diffie_hellman_kea) {
  4576. byte* clientPub;
  4577. word16 clientPubSz;
  4578. DhKey dhKey;
  4579. ato16(&input[*inOutIdx], &clientPubSz);
  4580. *inOutIdx += LENGTH_SZ;
  4581. clientPub = &input[*inOutIdx];
  4582. *inOutIdx += clientPubSz;
  4583. InitDhKey(&dhKey);
  4584. ret = DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
  4585. ssl->buffers.serverDH_P.length,
  4586. ssl->buffers.serverDH_G.buffer,
  4587. ssl->buffers.serverDH_G.length);
  4588. if (ret == 0)
  4589. ret = DhAgree(&dhKey, ssl->arrays.preMasterSecret,
  4590. &ssl->arrays.preMasterSz,
  4591. ssl->buffers.serverDH_Priv.buffer,
  4592. ssl->buffers.serverDH_Priv.length,
  4593. clientPub, clientPubSz);
  4594. FreeDhKey(&dhKey);
  4595. if (ret == 0)
  4596. ret = MakeMasterSecret(ssl);
  4597. #endif /* OPENSSL_EXTRA */
  4598. }
  4599. if (ret == 0) {
  4600. ssl->options.clientState = CLIENT_KEYEXCHANGE_COMPLETE;
  4601. if (ssl->options.verifyPeer)
  4602. BuildCertHashes(ssl, &ssl->certHashes);
  4603. }
  4604. return ret;
  4605. }
  4606. #endif /* NO_CYASSL_SERVER */
  4607. #ifdef SINGLE_THREADED
  4608. int InitMutex(CyaSSL_Mutex* m)
  4609. {
  4610. return 0;
  4611. }
  4612. int FreeMutex(CyaSSL_Mutex* m)
  4613. {
  4614. return 0;
  4615. }
  4616. int LockMutex(CyaSSL_Mutex* m)
  4617. {
  4618. return 0;
  4619. }
  4620. int UnLockMutex(CyaSSL_Mutex* m)
  4621. {
  4622. return 0;
  4623. }
  4624. #else /* MULTI_THREAD */
  4625. #ifdef USE_WINDOWS_API
  4626. int InitMutex(CyaSSL_Mutex* m)
  4627. {
  4628. InitializeCriticalSection(m);
  4629. return 0;
  4630. }
  4631. int FreeMutex(CyaSSL_Mutex* m)
  4632. {
  4633. DeleteCriticalSection(m);
  4634. return 0;
  4635. }
  4636. int LockMutex(CyaSSL_Mutex* m)
  4637. {
  4638. EnterCriticalSection(m);
  4639. return 0;
  4640. }
  4641. int UnLockMutex(CyaSSL_Mutex* m)
  4642. {
  4643. LeaveCriticalSection(m);
  4644. return 0;
  4645. }
  4646. #elif defined(CYASSL_PTHREADS)
  4647. int InitMutex(CyaSSL_Mutex* m)
  4648. {
  4649. if (pthread_mutex_init(m, 0) == 0)
  4650. return 0;
  4651. else
  4652. return BAD_MUTEX_ERROR;
  4653. }
  4654. int FreeMutex(CyaSSL_Mutex* m)
  4655. {
  4656. if (pthread_mutex_destroy(m) == 0)
  4657. return 0;
  4658. else
  4659. return BAD_MUTEX_ERROR;
  4660. }
  4661. int LockMutex(CyaSSL_Mutex* m)
  4662. {
  4663. if (pthread_mutex_lock(m) == 0)
  4664. return 0;
  4665. else
  4666. return BAD_MUTEX_ERROR;
  4667. }
  4668. int UnLockMutex(CyaSSL_Mutex* m)
  4669. {
  4670. if (pthread_mutex_unlock(m) == 0)
  4671. return 0;
  4672. else
  4673. return BAD_MUTEX_ERROR;
  4674. }
  4675. #elif defined(THREADX)
  4676. int InitMutex(CyaSSL_Mutex* m)
  4677. {
  4678. if (tx_mutex_create(m, "CyaSSL Mutex", TX_NO_INHERIT) == 0)
  4679. return 0;
  4680. else
  4681. return BAD_MUTEX_ERROR;
  4682. }
  4683. int FreeMutex(CyaSSL_Mutex* m)
  4684. {
  4685. if (tx_mutex_delete(m) == 0)
  4686. return 0;
  4687. else
  4688. return BAD_MUTEX_ERROR;
  4689. }
  4690. int LockMutex(CyaSSL_Mutex* m)
  4691. {
  4692. if (tx_mutex_get(m, TX_WAIT_FOREVER) == 0)
  4693. return 0;
  4694. else
  4695. return BAD_MUTEX_ERROR;
  4696. }
  4697. int UnLockMutex(CyaSSL_Mutex* m)
  4698. {
  4699. if (tx_mutex_put(m) == 0)
  4700. return 0;
  4701. else
  4702. return BAD_MUTEX_ERROR;
  4703. }
  4704. #elif defined(MICRIUM)
  4705. int InitMutex(CyaSSL_Mutex* m)
  4706. {
  4707. #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
  4708. if (NetSecure_OS_MutexCreate(m) == 0)
  4709. return 0;
  4710. else
  4711. return BAD_MUTEX_ERROR;
  4712. #else
  4713. return 0;
  4714. #endif
  4715. }
  4716. int FreeMutex(CyaSSL_Mutex* m)
  4717. {
  4718. #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
  4719. if (NetSecure_OS_FreeMutex(m) == 0)
  4720. return 0;
  4721. else
  4722. return BAD_MUTEX_ERROR;
  4723. #else
  4724. return 0;
  4725. #endif
  4726. }
  4727. int LockMutex(CyaSSL_Mutex* m)
  4728. {
  4729. #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
  4730. if (NetSecure_OS_LockMutex(m) == 0)
  4731. return 0;
  4732. else
  4733. return BAD_MUTEX_ERROR;
  4734. #else
  4735. return 0;
  4736. #endif
  4737. }
  4738. int UnLockMutex(CyaSSL_Mutex* m)
  4739. {
  4740. #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
  4741. if (NetSecure_OS_UnLockMutex(m) == 0)
  4742. return 0;
  4743. else
  4744. return BAD_MUTEX_ERROR;
  4745. #else
  4746. return 0;
  4747. #endif
  4748. }
  4749. #endif /* USE_WINDOWS_API */
  4750. #endif /* SINGLE_THREADED */