| OLD | NEW |
| (Empty) |
| 1 /* | |
| 2 * SSL3 Protocol | |
| 3 * | |
| 4 * This Source Code Form is subject to the terms of the Mozilla Public | |
| 5 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
| 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| 7 | |
| 8 /* TLS extension code moved here from ssl3ecc.c */ | |
| 9 | |
| 10 #include "nssrenam.h" | |
| 11 #include "nss.h" | |
| 12 #include "ssl.h" | |
| 13 #include "sslimpl.h" | |
| 14 #include "sslproto.h" | |
| 15 #include "pk11pub.h" | |
| 16 #ifdef NO_PKCS11_BYPASS | |
| 17 #include "blapit.h" | |
| 18 #else | |
| 19 #include "blapi.h" | |
| 20 #endif | |
| 21 #include "prinit.h" | |
| 22 | |
| 23 static unsigned char key_name[SESS_TICKET_KEY_NAME_LEN]; | |
| 24 static PK11SymKey *session_ticket_enc_key_pkcs11 = NULL; | |
| 25 static PK11SymKey *session_ticket_mac_key_pkcs11 = NULL; | |
| 26 | |
| 27 #ifndef NO_PKCS11_BYPASS | |
| 28 static unsigned char session_ticket_enc_key[AES_256_KEY_LENGTH]; | |
| 29 static unsigned char session_ticket_mac_key[SHA256_LENGTH]; | |
| 30 | |
| 31 static PRBool session_ticket_keys_initialized = PR_FALSE; | |
| 32 #endif | |
| 33 static PRCallOnceType generate_session_keys_once; | |
| 34 | |
| 35 /* forward static function declarations */ | |
| 36 static SECStatus ssl3_ParseEncryptedSessionTicket(sslSocket *ss, | |
| 37 SECItem *data, EncryptedSessionTicket *enc_session_ticket); | |
| 38 static SECStatus ssl3_AppendToItem(SECItem *item, const unsigned char *buf, | |
| 39 PRUint32 bytes); | |
| 40 static SECStatus ssl3_AppendNumberToItem(SECItem *item, PRUint32 num, | |
| 41 PRInt32 lenSize); | |
| 42 static SECStatus ssl3_GetSessionTicketKeysPKCS11(sslSocket *ss, | |
| 43 PK11SymKey **aes_key, PK11SymKey **mac_key); | |
| 44 #ifndef NO_PKCS11_BYPASS | |
| 45 static SECStatus ssl3_GetSessionTicketKeys(const unsigned char **aes_key, | |
| 46 PRUint32 *aes_key_length, const unsigned char **mac_key, | |
| 47 PRUint32 *mac_key_length); | |
| 48 #endif | |
| 49 static PRInt32 ssl3_SendRenegotiationInfoXtn(sslSocket * ss, | |
| 50 PRBool append, PRUint32 maxBytes); | |
| 51 static SECStatus ssl3_HandleRenegotiationInfoXtn(sslSocket *ss, | |
| 52 PRUint16 ex_type, SECItem *data); | |
| 53 static SECStatus ssl3_ClientHandleNextProtoNegoXtn(sslSocket *ss, | |
| 54 PRUint16 ex_type, SECItem *data); | |
| 55 static SECStatus ssl3_ClientHandleAppProtoXtn(sslSocket *ss, | |
| 56 PRUint16 ex_type, SECItem *data); | |
| 57 static SECStatus ssl3_ServerHandleNextProtoNegoXtn(sslSocket *ss, | |
| 58 PRUint16 ex_type, SECItem *data); | |
| 59 static SECStatus ssl3_ServerHandleAppProtoXtn(sslSocket *ss, PRUint16 ex_type, | |
| 60 SECItem *data); | |
| 61 static PRInt32 ssl3_ClientSendNextProtoNegoXtn(sslSocket *ss, PRBool append, | |
| 62 PRUint32 maxBytes); | |
| 63 static PRInt32 ssl3_ClientSendAppProtoXtn(sslSocket *ss, PRBool append, | |
| 64 PRUint32 maxBytes); | |
| 65 static PRInt32 ssl3_ServerSendAppProtoXtn(sslSocket *ss, PRBool append, | |
| 66 PRUint32 maxBytes); | |
| 67 static PRInt32 ssl3_SendUseSRTPXtn(sslSocket *ss, PRBool append, | |
| 68 PRUint32 maxBytes); | |
| 69 static SECStatus ssl3_HandleUseSRTPXtn(sslSocket * ss, PRUint16 ex_type, | |
| 70 SECItem *data); | |
| 71 static SECStatus ssl3_ClientHandleChannelIDXtn(sslSocket *ss, | |
| 72 PRUint16 ex_type, SECItem *data); | |
| 73 static PRInt32 ssl3_ClientSendChannelIDXtn(sslSocket *ss, PRBool append, | |
| 74 PRUint32 maxBytes); | |
| 75 static SECStatus ssl3_ServerSendStatusRequestXtn(sslSocket * ss, | |
| 76 PRBool append, PRUint32 maxBytes); | |
| 77 static SECStatus ssl3_ServerHandleStatusRequestXtn(sslSocket *ss, | |
| 78 PRUint16 ex_type, SECItem *data); | |
| 79 static SECStatus ssl3_ClientHandleStatusRequestXtn(sslSocket *ss, | |
| 80 PRUint16 ex_type, | |
| 81 SECItem *data); | |
| 82 static PRInt32 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append, | |
| 83 PRUint32 maxBytes); | |
| 84 static PRInt32 ssl3_ClientSendSigAlgsXtn(sslSocket *ss, PRBool append, | |
| 85 PRUint32 maxBytes); | |
| 86 static SECStatus ssl3_ServerHandleSigAlgsXtn(sslSocket *ss, PRUint16 ex_type, | |
| 87 SECItem *data); | |
| 88 static PRInt32 ssl3_ClientSendSignedCertTimestampXtn(sslSocket *ss, | |
| 89 PRBool append, | |
| 90 PRUint32 maxBytes); | |
| 91 static SECStatus ssl3_ClientHandleSignedCertTimestampXtn(sslSocket *ss, | |
| 92 PRUint16 ex_type, | |
| 93 SECItem *data); | |
| 94 | |
| 95 /* | |
| 96 * Write bytes. Using this function means the SECItem structure | |
| 97 * cannot be freed. The caller is expected to call this function | |
| 98 * on a shallow copy of the structure. | |
| 99 */ | |
| 100 static SECStatus | |
| 101 ssl3_AppendToItem(SECItem *item, const unsigned char *buf, PRUint32 bytes) | |
| 102 { | |
| 103 if (bytes > item->len) | |
| 104 return SECFailure; | |
| 105 | |
| 106 PORT_Memcpy(item->data, buf, bytes); | |
| 107 item->data += bytes; | |
| 108 item->len -= bytes; | |
| 109 return SECSuccess; | |
| 110 } | |
| 111 | |
| 112 /* | |
| 113 * Write a number in network byte order. Using this function means the | |
| 114 * SECItem structure cannot be freed. The caller is expected to call | |
| 115 * this function on a shallow copy of the structure. | |
| 116 */ | |
| 117 static SECStatus | |
| 118 ssl3_AppendNumberToItem(SECItem *item, PRUint32 num, PRInt32 lenSize) | |
| 119 { | |
| 120 SECStatus rv; | |
| 121 PRUint8 b[4]; | |
| 122 PRUint8 * p = b; | |
| 123 | |
| 124 switch (lenSize) { | |
| 125 case 4: | |
| 126 *p++ = (PRUint8) (num >> 24); | |
| 127 case 3: | |
| 128 *p++ = (PRUint8) (num >> 16); | |
| 129 case 2: | |
| 130 *p++ = (PRUint8) (num >> 8); | |
| 131 case 1: | |
| 132 *p = (PRUint8) num; | |
| 133 } | |
| 134 rv = ssl3_AppendToItem(item, &b[0], lenSize); | |
| 135 return rv; | |
| 136 } | |
| 137 | |
| 138 static SECStatus ssl3_SessionTicketShutdown(void* appData, void* nssData) | |
| 139 { | |
| 140 if (session_ticket_enc_key_pkcs11) { | |
| 141 PK11_FreeSymKey(session_ticket_enc_key_pkcs11); | |
| 142 session_ticket_enc_key_pkcs11 = NULL; | |
| 143 } | |
| 144 if (session_ticket_mac_key_pkcs11) { | |
| 145 PK11_FreeSymKey(session_ticket_mac_key_pkcs11); | |
| 146 session_ticket_mac_key_pkcs11 = NULL; | |
| 147 } | |
| 148 PORT_Memset(&generate_session_keys_once, 0, | |
| 149 sizeof(generate_session_keys_once)); | |
| 150 return SECSuccess; | |
| 151 } | |
| 152 | |
| 153 | |
| 154 static PRStatus | |
| 155 ssl3_GenerateSessionTicketKeysPKCS11(void *data) | |
| 156 { | |
| 157 SECStatus rv; | |
| 158 sslSocket *ss = (sslSocket *)data; | |
| 159 SECKEYPrivateKey *svrPrivKey = ss->serverCerts[kt_rsa].SERVERKEY; | |
| 160 SECKEYPublicKey *svrPubKey = ss->serverCerts[kt_rsa].serverKeyPair->pubKey; | |
| 161 | |
| 162 if (svrPrivKey == NULL || svrPubKey == NULL) { | |
| 163 SSL_DBG(("%d: SSL[%d]: Pub or priv key(s) is NULL.", | |
| 164 SSL_GETPID(), ss->fd)); | |
| 165 goto loser; | |
| 166 } | |
| 167 | |
| 168 /* Get a copy of the session keys from shared memory. */ | |
| 169 PORT_Memcpy(key_name, SESS_TICKET_KEY_NAME_PREFIX, | |
| 170 sizeof(SESS_TICKET_KEY_NAME_PREFIX)); | |
| 171 if (!ssl_GetSessionTicketKeysPKCS11(svrPrivKey, svrPubKey, | |
| 172 ss->pkcs11PinArg, &key_name[SESS_TICKET_KEY_NAME_PREFIX_LEN], | |
| 173 &session_ticket_enc_key_pkcs11, &session_ticket_mac_key_pkcs11)) | |
| 174 return PR_FAILURE; | |
| 175 | |
| 176 rv = NSS_RegisterShutdown(ssl3_SessionTicketShutdown, NULL); | |
| 177 if (rv != SECSuccess) | |
| 178 goto loser; | |
| 179 | |
| 180 return PR_SUCCESS; | |
| 181 | |
| 182 loser: | |
| 183 ssl3_SessionTicketShutdown(NULL, NULL); | |
| 184 return PR_FAILURE; | |
| 185 } | |
| 186 | |
| 187 static SECStatus | |
| 188 ssl3_GetSessionTicketKeysPKCS11(sslSocket *ss, PK11SymKey **aes_key, | |
| 189 PK11SymKey **mac_key) | |
| 190 { | |
| 191 if (PR_CallOnceWithArg(&generate_session_keys_once, | |
| 192 ssl3_GenerateSessionTicketKeysPKCS11, ss) != PR_SUCCESS) | |
| 193 return SECFailure; | |
| 194 | |
| 195 if (session_ticket_enc_key_pkcs11 == NULL || | |
| 196 session_ticket_mac_key_pkcs11 == NULL) | |
| 197 return SECFailure; | |
| 198 | |
| 199 *aes_key = session_ticket_enc_key_pkcs11; | |
| 200 *mac_key = session_ticket_mac_key_pkcs11; | |
| 201 return SECSuccess; | |
| 202 } | |
| 203 | |
| 204 #ifndef NO_PKCS11_BYPASS | |
| 205 static PRStatus | |
| 206 ssl3_GenerateSessionTicketKeys(void) | |
| 207 { | |
| 208 PORT_Memcpy(key_name, SESS_TICKET_KEY_NAME_PREFIX, | |
| 209 sizeof(SESS_TICKET_KEY_NAME_PREFIX)); | |
| 210 | |
| 211 if (!ssl_GetSessionTicketKeys(&key_name[SESS_TICKET_KEY_NAME_PREFIX_LEN], | |
| 212 session_ticket_enc_key, session_ticket_mac_key)) | |
| 213 return PR_FAILURE; | |
| 214 | |
| 215 session_ticket_keys_initialized = PR_TRUE; | |
| 216 return PR_SUCCESS; | |
| 217 } | |
| 218 | |
| 219 static SECStatus | |
| 220 ssl3_GetSessionTicketKeys(const unsigned char **aes_key, | |
| 221 PRUint32 *aes_key_length, const unsigned char **mac_key, | |
| 222 PRUint32 *mac_key_length) | |
| 223 { | |
| 224 if (PR_CallOnce(&generate_session_keys_once, | |
| 225 ssl3_GenerateSessionTicketKeys) != PR_SUCCESS) | |
| 226 return SECFailure; | |
| 227 | |
| 228 if (!session_ticket_keys_initialized) | |
| 229 return SECFailure; | |
| 230 | |
| 231 *aes_key = session_ticket_enc_key; | |
| 232 *aes_key_length = sizeof(session_ticket_enc_key); | |
| 233 *mac_key = session_ticket_mac_key; | |
| 234 *mac_key_length = sizeof(session_ticket_mac_key); | |
| 235 | |
| 236 return SECSuccess; | |
| 237 } | |
| 238 #endif | |
| 239 | |
| 240 /* Table of handlers for received TLS hello extensions, one per extension. | |
| 241 * In the second generation, this table will be dynamic, and functions | |
| 242 * will be registered here. | |
| 243 */ | |
| 244 /* This table is used by the server, to handle client hello extensions. */ | |
| 245 static const ssl3HelloExtensionHandler clientHelloHandlers[] = { | |
| 246 { ssl_server_name_xtn, &ssl3_HandleServerNameXtn }, | |
| 247 #ifdef NSS_ENABLE_ECC | |
| 248 { ssl_elliptic_curves_xtn, &ssl3_HandleSupportedCurvesXtn }, | |
| 249 { ssl_ec_point_formats_xtn, &ssl3_HandleSupportedPointFormatsXtn }, | |
| 250 #endif | |
| 251 { ssl_session_ticket_xtn, &ssl3_ServerHandleSessionTicketXtn }, | |
| 252 { ssl_renegotiation_info_xtn, &ssl3_HandleRenegotiationInfoXtn }, | |
| 253 { ssl_next_proto_nego_xtn, &ssl3_ServerHandleNextProtoNegoXtn }, | |
| 254 { ssl_app_layer_protocol_xtn, &ssl3_ServerHandleAppProtoXtn }, | |
| 255 { ssl_use_srtp_xtn, &ssl3_HandleUseSRTPXtn }, | |
| 256 { ssl_cert_status_xtn, &ssl3_ServerHandleStatusRequestXtn }, | |
| 257 { ssl_signature_algorithms_xtn, &ssl3_ServerHandleSigAlgsXtn }, | |
| 258 { -1, NULL } | |
| 259 }; | |
| 260 | |
| 261 /* These two tables are used by the client, to handle server hello | |
| 262 * extensions. */ | |
| 263 static const ssl3HelloExtensionHandler serverHelloHandlersTLS[] = { | |
| 264 { ssl_server_name_xtn, &ssl3_HandleServerNameXtn }, | |
| 265 /* TODO: add a handler for ssl_ec_point_formats_xtn */ | |
| 266 { ssl_session_ticket_xtn, &ssl3_ClientHandleSessionTicketXtn }, | |
| 267 { ssl_renegotiation_info_xtn, &ssl3_HandleRenegotiationInfoXtn }, | |
| 268 { ssl_next_proto_nego_xtn, &ssl3_ClientHandleNextProtoNegoXtn }, | |
| 269 { ssl_app_layer_protocol_xtn, &ssl3_ClientHandleAppProtoXtn }, | |
| 270 { ssl_use_srtp_xtn, &ssl3_HandleUseSRTPXtn }, | |
| 271 { ssl_channel_id_xtn, &ssl3_ClientHandleChannelIDXtn }, | |
| 272 { ssl_cert_status_xtn, &ssl3_ClientHandleStatusRequestXtn }, | |
| 273 { ssl_signed_certificate_timestamp_xtn, | |
| 274 &ssl3_ClientHandleSignedCertTimestampXtn }, | |
| 275 { -1, NULL } | |
| 276 }; | |
| 277 | |
| 278 static const ssl3HelloExtensionHandler serverHelloHandlersSSL3[] = { | |
| 279 { ssl_renegotiation_info_xtn, &ssl3_HandleRenegotiationInfoXtn }, | |
| 280 { -1, NULL } | |
| 281 }; | |
| 282 | |
| 283 /* Tables of functions to format TLS hello extensions, one function per | |
| 284 * extension. | |
| 285 * These static tables are for the formatting of client hello extensions. | |
| 286 * The server's table of hello senders is dynamic, in the socket struct, | |
| 287 * and sender functions are registered there. | |
| 288 */ | |
| 289 static const | |
| 290 ssl3HelloExtensionSender clientHelloSendersTLS[SSL_MAX_EXTENSIONS] = { | |
| 291 { ssl_server_name_xtn, &ssl3_SendServerNameXtn }, | |
| 292 { ssl_renegotiation_info_xtn, &ssl3_SendRenegotiationInfoXtn }, | |
| 293 #ifdef NSS_ENABLE_ECC | |
| 294 { ssl_elliptic_curves_xtn, &ssl3_SendSupportedCurvesXtn }, | |
| 295 { ssl_ec_point_formats_xtn, &ssl3_SendSupportedPointFormatsXtn }, | |
| 296 #endif | |
| 297 { ssl_session_ticket_xtn, &ssl3_SendSessionTicketXtn }, | |
| 298 { ssl_next_proto_nego_xtn, &ssl3_ClientSendNextProtoNegoXtn }, | |
| 299 { ssl_app_layer_protocol_xtn, &ssl3_ClientSendAppProtoXtn }, | |
| 300 { ssl_use_srtp_xtn, &ssl3_SendUseSRTPXtn }, | |
| 301 { ssl_channel_id_xtn, &ssl3_ClientSendChannelIDXtn }, | |
| 302 { ssl_cert_status_xtn, &ssl3_ClientSendStatusRequestXtn }, | |
| 303 { ssl_signed_certificate_timestamp_xtn, | |
| 304 &ssl3_ClientSendSignedCertTimestampXtn }, | |
| 305 /* WebSphere Application Server 7.0 is intolerant to the last extension | |
| 306 * being zero-length. It is not intolerant of TLS 1.2, so move | |
| 307 * signature_algorithms to the end. */ | |
| 308 { ssl_signature_algorithms_xtn, &ssl3_ClientSendSigAlgsXtn } | |
| 309 /* any extra entries will appear as { 0, NULL } */ | |
| 310 }; | |
| 311 | |
| 312 static const | |
| 313 ssl3HelloExtensionSender clientHelloSendersSSL3[SSL_MAX_EXTENSIONS] = { | |
| 314 { ssl_renegotiation_info_xtn, &ssl3_SendRenegotiationInfoXtn } | |
| 315 /* any extra entries will appear as { 0, NULL } */ | |
| 316 }; | |
| 317 | |
| 318 static PRBool | |
| 319 arrayContainsExtension(const PRUint16 *array, PRUint32 len, PRUint16 ex_type) | |
| 320 { | |
| 321 int i; | |
| 322 for (i = 0; i < len; i++) { | |
| 323 if (ex_type == array[i]) | |
| 324 return PR_TRUE; | |
| 325 } | |
| 326 return PR_FALSE; | |
| 327 } | |
| 328 | |
| 329 PRBool | |
| 330 ssl3_ExtensionNegotiated(sslSocket *ss, PRUint16 ex_type) { | |
| 331 TLSExtensionData *xtnData = &ss->xtnData; | |
| 332 return arrayContainsExtension(xtnData->negotiated, | |
| 333 xtnData->numNegotiated, ex_type); | |
| 334 } | |
| 335 | |
| 336 static PRBool | |
| 337 ssl3_ClientExtensionAdvertised(sslSocket *ss, PRUint16 ex_type) { | |
| 338 TLSExtensionData *xtnData = &ss->xtnData; | |
| 339 return arrayContainsExtension(xtnData->advertised, | |
| 340 xtnData->numAdvertised, ex_type); | |
| 341 } | |
| 342 | |
| 343 /* Format an SNI extension, using the name from the socket's URL, | |
| 344 * unless that name is a dotted decimal string. | |
| 345 * Used by client and server. | |
| 346 */ | |
| 347 PRInt32 | |
| 348 ssl3_SendServerNameXtn(sslSocket * ss, PRBool append, | |
| 349 PRUint32 maxBytes) | |
| 350 { | |
| 351 SECStatus rv; | |
| 352 if (!ss) | |
| 353 return 0; | |
| 354 if (!ss->sec.isServer) { | |
| 355 PRUint32 len; | |
| 356 PRNetAddr netAddr; | |
| 357 | |
| 358 /* must have a hostname */ | |
| 359 if (!ss->url || !ss->url[0]) | |
| 360 return 0; | |
| 361 /* must not be an IPv4 or IPv6 address */ | |
| 362 if (PR_SUCCESS == PR_StringToNetAddr(ss->url, &netAddr)) { | |
| 363 /* is an IP address (v4 or v6) */ | |
| 364 return 0; | |
| 365 } | |
| 366 len = PORT_Strlen(ss->url); | |
| 367 if (append && maxBytes >= len + 9) { | |
| 368 /* extension_type */ | |
| 369 rv = ssl3_AppendHandshakeNumber(ss, ssl_server_name_xtn, 2); | |
| 370 if (rv != SECSuccess) return -1; | |
| 371 /* length of extension_data */ | |
| 372 rv = ssl3_AppendHandshakeNumber(ss, len + 5, 2); | |
| 373 if (rv != SECSuccess) return -1; | |
| 374 /* length of server_name_list */ | |
| 375 rv = ssl3_AppendHandshakeNumber(ss, len + 3, 2); | |
| 376 if (rv != SECSuccess) return -1; | |
| 377 /* Name Type (sni_host_name) */ | |
| 378 rv = ssl3_AppendHandshake(ss, "\0", 1); | |
| 379 if (rv != SECSuccess) return -1; | |
| 380 /* HostName (length and value) */ | |
| 381 rv = ssl3_AppendHandshakeVariable(ss, (PRUint8 *)ss->url, len, 2); | |
| 382 if (rv != SECSuccess) return -1; | |
| 383 if (!ss->sec.isServer) { | |
| 384 TLSExtensionData *xtnData = &ss->xtnData; | |
| 385 xtnData->advertised[xtnData->numAdvertised++] = | |
| 386 ssl_server_name_xtn; | |
| 387 } | |
| 388 } | |
| 389 return len + 9; | |
| 390 } | |
| 391 /* Server side */ | |
| 392 if (append && maxBytes >= 4) { | |
| 393 rv = ssl3_AppendHandshakeNumber(ss, ssl_server_name_xtn, 2); | |
| 394 if (rv != SECSuccess) return -1; | |
| 395 /* length of extension_data */ | |
| 396 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 397 if (rv != SECSuccess) return -1; | |
| 398 } | |
| 399 return 4; | |
| 400 } | |
| 401 | |
| 402 /* handle an incoming SNI extension, by ignoring it. */ | |
| 403 SECStatus | |
| 404 ssl3_HandleServerNameXtn(sslSocket * ss, PRUint16 ex_type, SECItem *data) | |
| 405 { | |
| 406 SECItem *names = NULL; | |
| 407 PRUint32 listCount = 0, namesPos = 0, i; | |
| 408 TLSExtensionData *xtnData = &ss->xtnData; | |
| 409 SECItem ldata; | |
| 410 PRInt32 listLenBytes = 0; | |
| 411 | |
| 412 if (!ss->sec.isServer) { | |
| 413 /* Verify extension_data is empty. */ | |
| 414 if (data->data || data->len || | |
| 415 !ssl3_ExtensionNegotiated(ss, ssl_server_name_xtn)) { | |
| 416 /* malformed or was not initiated by the client.*/ | |
| 417 return SECFailure; | |
| 418 } | |
| 419 return SECSuccess; | |
| 420 } | |
| 421 | |
| 422 /* Server side - consume client data and register server sender. */ | |
| 423 /* do not parse the data if don't have user extension handling function. */ | |
| 424 if (!ss->sniSocketConfig) { | |
| 425 return SECSuccess; | |
| 426 } | |
| 427 /* length of server_name_list */ | |
| 428 listLenBytes = ssl3_ConsumeHandshakeNumber(ss, 2, &data->data, &data->len); | |
| 429 if (listLenBytes == 0 || listLenBytes != data->len) { | |
| 430 return SECFailure; | |
| 431 } | |
| 432 ldata = *data; | |
| 433 /* Calculate the size of the array.*/ | |
| 434 while (listLenBytes > 0) { | |
| 435 SECItem litem; | |
| 436 SECStatus rv; | |
| 437 PRInt32 type; | |
| 438 /* Name Type (sni_host_name) */ | |
| 439 type = ssl3_ConsumeHandshakeNumber(ss, 1, &ldata.data, &ldata.len); | |
| 440 if (!ldata.len) { | |
| 441 return SECFailure; | |
| 442 } | |
| 443 rv = ssl3_ConsumeHandshakeVariable(ss, &litem, 2, &ldata.data, &ldata.le
n); | |
| 444 if (rv != SECSuccess) { | |
| 445 return SECFailure; | |
| 446 } | |
| 447 /* Adjust total length for cunsumed item, item len and type.*/ | |
| 448 listLenBytes -= litem.len + 3; | |
| 449 if (listLenBytes > 0 && !ldata.len) { | |
| 450 return SECFailure; | |
| 451 } | |
| 452 listCount += 1; | |
| 453 } | |
| 454 if (!listCount) { | |
| 455 return SECFailure; | |
| 456 } | |
| 457 names = PORT_ZNewArray(SECItem, listCount); | |
| 458 if (!names) { | |
| 459 return SECFailure; | |
| 460 } | |
| 461 for (i = 0;i < listCount;i++) { | |
| 462 int j; | |
| 463 PRInt32 type; | |
| 464 SECStatus rv; | |
| 465 PRBool nametypePresent = PR_FALSE; | |
| 466 /* Name Type (sni_host_name) */ | |
| 467 type = ssl3_ConsumeHandshakeNumber(ss, 1, &data->data, &data->len); | |
| 468 /* Check if we have such type in the list */ | |
| 469 for (j = 0;j < listCount && names[j].data;j++) { | |
| 470 if (names[j].type == type) { | |
| 471 nametypePresent = PR_TRUE; | |
| 472 break; | |
| 473 } | |
| 474 } | |
| 475 /* HostName (length and value) */ | |
| 476 rv = ssl3_ConsumeHandshakeVariable(ss, &names[namesPos], 2, | |
| 477 &data->data, &data->len); | |
| 478 if (rv != SECSuccess) { | |
| 479 goto loser; | |
| 480 } | |
| 481 if (nametypePresent == PR_FALSE) { | |
| 482 namesPos += 1; | |
| 483 } | |
| 484 } | |
| 485 /* Free old and set the new data. */ | |
| 486 if (xtnData->sniNameArr) { | |
| 487 PORT_Free(ss->xtnData.sniNameArr); | |
| 488 } | |
| 489 xtnData->sniNameArr = names; | |
| 490 xtnData->sniNameArrSize = namesPos; | |
| 491 xtnData->negotiated[xtnData->numNegotiated++] = ssl_server_name_xtn; | |
| 492 | |
| 493 return SECSuccess; | |
| 494 | |
| 495 loser: | |
| 496 PORT_Free(names); | |
| 497 return SECFailure; | |
| 498 } | |
| 499 | |
| 500 /* Called by both clients and servers. | |
| 501 * Clients sends a filled in session ticket if one is available, and otherwise | |
| 502 * sends an empty ticket. Servers always send empty tickets. | |
| 503 */ | |
| 504 PRInt32 | |
| 505 ssl3_SendSessionTicketXtn( | |
| 506 sslSocket * ss, | |
| 507 PRBool append, | |
| 508 PRUint32 maxBytes) | |
| 509 { | |
| 510 PRInt32 extension_length; | |
| 511 NewSessionTicket *session_ticket = NULL; | |
| 512 sslSessionID *sid = ss->sec.ci.sid; | |
| 513 | |
| 514 /* Ignore the SessionTicket extension if processing is disabled. */ | |
| 515 if (!ss->opt.enableSessionTickets) | |
| 516 return 0; | |
| 517 | |
| 518 /* Empty extension length = extension_type (2-bytes) + | |
| 519 * length(extension_data) (2-bytes) | |
| 520 */ | |
| 521 extension_length = 4; | |
| 522 | |
| 523 /* If we are a client then send a session ticket if one is availble. | |
| 524 * Servers that support the extension and are willing to negotiate the | |
| 525 * the extension always respond with an empty extension. | |
| 526 */ | |
| 527 if (!ss->sec.isServer) { | |
| 528 /* The caller must be holding sid->u.ssl3.lock for reading. We cannot | |
| 529 * just acquire and release the lock within this function because the | |
| 530 * caller will call this function twice, and we need the inputs to be | |
| 531 * consistent between the two calls. Note that currently the caller | |
| 532 * will only be holding the lock when we are the client and when we're | |
| 533 * attempting to resume an existing session. | |
| 534 */ | |
| 535 | |
| 536 session_ticket = &sid->u.ssl3.locked.sessionTicket; | |
| 537 if (session_ticket->ticket.data) { | |
| 538 if (ss->xtnData.ticketTimestampVerified) { | |
| 539 extension_length += session_ticket->ticket.len; | |
| 540 } else if (!append && | |
| 541 (session_ticket->ticket_lifetime_hint == 0 || | |
| 542 (session_ticket->ticket_lifetime_hint + | |
| 543 session_ticket->received_timestamp > ssl_Time()))) { | |
| 544 extension_length += session_ticket->ticket.len; | |
| 545 ss->xtnData.ticketTimestampVerified = PR_TRUE; | |
| 546 } | |
| 547 } | |
| 548 } | |
| 549 | |
| 550 if (append && maxBytes >= extension_length) { | |
| 551 SECStatus rv; | |
| 552 /* extension_type */ | |
| 553 rv = ssl3_AppendHandshakeNumber(ss, ssl_session_ticket_xtn, 2); | |
| 554 if (rv != SECSuccess) | |
| 555 goto loser; | |
| 556 if (session_ticket && session_ticket->ticket.data && | |
| 557 ss->xtnData.ticketTimestampVerified) { | |
| 558 rv = ssl3_AppendHandshakeVariable(ss, session_ticket->ticket.data, | |
| 559 session_ticket->ticket.len, 2); | |
| 560 ss->xtnData.ticketTimestampVerified = PR_FALSE; | |
| 561 ss->xtnData.sentSessionTicketInClientHello = PR_TRUE; | |
| 562 } else { | |
| 563 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 564 } | |
| 565 if (rv != SECSuccess) | |
| 566 goto loser; | |
| 567 | |
| 568 if (!ss->sec.isServer) { | |
| 569 TLSExtensionData *xtnData = &ss->xtnData; | |
| 570 xtnData->advertised[xtnData->numAdvertised++] = | |
| 571 ssl_session_ticket_xtn; | |
| 572 } | |
| 573 } else if (maxBytes < extension_length) { | |
| 574 PORT_Assert(0); | |
| 575 return 0; | |
| 576 } | |
| 577 return extension_length; | |
| 578 | |
| 579 loser: | |
| 580 ss->xtnData.ticketTimestampVerified = PR_FALSE; | |
| 581 return -1; | |
| 582 } | |
| 583 | |
| 584 /* handle an incoming Next Protocol Negotiation extension. */ | |
| 585 static SECStatus | |
| 586 ssl3_ServerHandleNextProtoNegoXtn(sslSocket * ss, PRUint16 ex_type, | |
| 587 SECItem *data) | |
| 588 { | |
| 589 if (ss->firstHsDone || data->len != 0) { | |
| 590 /* Clients MUST send an empty NPN extension, if any. */ | |
| 591 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID); | |
| 592 return SECFailure; | |
| 593 } | |
| 594 | |
| 595 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 596 | |
| 597 /* TODO: server side NPN support would require calling | |
| 598 * ssl3_RegisterServerHelloExtensionSender here in order to echo the | |
| 599 * extension back to the client. */ | |
| 600 | |
| 601 return SECSuccess; | |
| 602 } | |
| 603 | |
| 604 /* ssl3_ValidateNextProtoNego checks that the given block of data is valid: none | |
| 605 * of the lengths may be 0 and the sum of the lengths must equal the length of | |
| 606 * the block. */ | |
| 607 SECStatus | |
| 608 ssl3_ValidateNextProtoNego(const unsigned char* data, unsigned int length) | |
| 609 { | |
| 610 unsigned int offset = 0; | |
| 611 | |
| 612 while (offset < length) { | |
| 613 unsigned int newOffset = offset + 1 + (unsigned int) data[offset]; | |
| 614 /* Reject embedded nulls to protect against buggy applications that | |
| 615 * store protocol identifiers in null-terminated strings. | |
| 616 */ | |
| 617 if (newOffset > length || data[offset] == 0) { | |
| 618 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID); | |
| 619 return SECFailure; | |
| 620 } | |
| 621 offset = newOffset; | |
| 622 } | |
| 623 | |
| 624 if (offset > length) { | |
| 625 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID); | |
| 626 return SECFailure; | |
| 627 } | |
| 628 | |
| 629 return SECSuccess; | |
| 630 } | |
| 631 | |
| 632 /* protocol selection handler for ALPN (server side) and NPN (client side) */ | |
| 633 static SECStatus | |
| 634 ssl3_SelectAppProtocol(sslSocket *ss, PRUint16 ex_type, SECItem *data) | |
| 635 { | |
| 636 SECStatus rv; | |
| 637 unsigned char resultBuffer[255]; | |
| 638 SECItem result = { siBuffer, resultBuffer, 0 }; | |
| 639 | |
| 640 rv = ssl3_ValidateNextProtoNego(data->data, data->len); | |
| 641 if (rv != SECSuccess) | |
| 642 return rv; | |
| 643 | |
| 644 PORT_Assert(ss->nextProtoCallback); | |
| 645 rv = ss->nextProtoCallback(ss->nextProtoArg, ss->fd, data->data, data->len, | |
| 646 result.data, &result.len, sizeof resultBuffer); | |
| 647 if (rv != SECSuccess) | |
| 648 return rv; | |
| 649 /* If the callback wrote more than allowed to |result| it has corrupted our | |
| 650 * stack. */ | |
| 651 if (result.len > sizeof resultBuffer) { | |
| 652 PORT_SetError(SEC_ERROR_OUTPUT_LEN); | |
| 653 return SECFailure; | |
| 654 } | |
| 655 | |
| 656 if (ex_type == ssl_app_layer_protocol_xtn && | |
| 657 ss->ssl3.nextProtoState != SSL_NEXT_PROTO_NEGOTIATED) { | |
| 658 /* The callback might say OK, but then it's picked a default. | |
| 659 * That's OK for NPN, but not ALPN. */ | |
| 660 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); | |
| 661 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL); | |
| 662 (void)SSL3_SendAlert(ss, alert_fatal, no_application_protocol); | |
| 663 return SECFailure; | |
| 664 } | |
| 665 | |
| 666 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 667 | |
| 668 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); | |
| 669 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &result); | |
| 670 } | |
| 671 | |
| 672 /* handle an incoming ALPN extension at the server */ | |
| 673 static SECStatus | |
| 674 ssl3_ServerHandleAppProtoXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) | |
| 675 { | |
| 676 int count; | |
| 677 SECStatus rv; | |
| 678 | |
| 679 /* We expressly don't want to allow ALPN on renegotiation, | |
| 680 * despite it being permitted by the spec. */ | |
| 681 if (ss->firstHsDone || data->len == 0) { | |
| 682 /* Clients MUST send a non-empty ALPN extension. */ | |
| 683 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID); | |
| 684 return SECFailure; | |
| 685 } | |
| 686 | |
| 687 /* unlike NPN, ALPN has extra redundant length information so that | |
| 688 * the extension is the same in both ClientHello and ServerHello */ | |
| 689 count = ssl3_ConsumeHandshakeNumber(ss, 2, &data->data, &data->len); | |
| 690 if (count < 0) { | |
| 691 return SECFailure; /* fatal alert was sent */ | |
| 692 } | |
| 693 if (count != data->len) { | |
| 694 return ssl3_DecodeError(ss); | |
| 695 } | |
| 696 | |
| 697 if (!ss->nextProtoCallback) { | |
| 698 /* we're not configured for it */ | |
| 699 return SECSuccess; | |
| 700 } | |
| 701 | |
| 702 rv = ssl3_SelectAppProtocol(ss, ex_type, data); | |
| 703 if (rv != SECSuccess) { | |
| 704 return rv; | |
| 705 } | |
| 706 | |
| 707 /* prepare to send back a response, if we negotiated */ | |
| 708 if (ss->ssl3.nextProtoState == SSL_NEXT_PROTO_NEGOTIATED) { | |
| 709 return ssl3_RegisterServerHelloExtensionSender( | |
| 710 ss, ex_type, ssl3_ServerSendAppProtoXtn); | |
| 711 } | |
| 712 return SECSuccess; | |
| 713 } | |
| 714 | |
| 715 static SECStatus | |
| 716 ssl3_ClientHandleNextProtoNegoXtn(sslSocket *ss, PRUint16 ex_type, | |
| 717 SECItem *data) | |
| 718 { | |
| 719 PORT_Assert(!ss->firstHsDone); | |
| 720 | |
| 721 if (ssl3_ExtensionNegotiated(ss, ssl_app_layer_protocol_xtn)) { | |
| 722 /* If the server negotiated ALPN then it has already told us what protoc
ol | |
| 723 * to use, so it doesn't make sense for us to try to negotiate a differe
nt | |
| 724 * one by sending the NPN handshake message. However, if we've negotiate
d | |
| 725 * NPN then we're required to send the NPN handshake message. Thus, thes
e | |
| 726 * two extensions cannot both be negotiated on the same connection. */ | |
| 727 PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); | |
| 728 return SECFailure; | |
| 729 } | |
| 730 | |
| 731 /* We should only get this call if we sent the extension, so | |
| 732 * ss->nextProtoCallback needs to be non-NULL. However, it is possible | |
| 733 * that an application erroneously cleared the callback between the time | |
| 734 * we sent the ClientHello and now. */ | |
| 735 if (!ss->nextProtoCallback) { | |
| 736 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_NO_CALLBACK); | |
| 737 return SECFailure; | |
| 738 } | |
| 739 | |
| 740 return ssl3_SelectAppProtocol(ss, ex_type, data); | |
| 741 } | |
| 742 | |
| 743 static SECStatus | |
| 744 ssl3_ClientHandleAppProtoXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) | |
| 745 { | |
| 746 const unsigned char* d = data->data; | |
| 747 PRUint16 name_list_len; | |
| 748 SECItem protocol_name; | |
| 749 | |
| 750 if (ssl3_ExtensionNegotiated(ss, ssl_next_proto_nego_xtn)) { | |
| 751 PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); | |
| 752 return SECFailure; | |
| 753 } | |
| 754 | |
| 755 /* The extension data from the server has the following format: | |
| 756 * uint16 name_list_len; | |
| 757 * uint8 len; | |
| 758 * uint8 protocol_name[len]; */ | |
| 759 if (data->len < 4 || data->len > 2 + 1 + 255) { | |
| 760 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID); | |
| 761 return SECFailure; | |
| 762 } | |
| 763 | |
| 764 name_list_len = ((PRUint16) d[0]) << 8 | | |
| 765 ((PRUint16) d[1]); | |
| 766 if (name_list_len != data->len - 2 || d[2] != data->len - 3) { | |
| 767 PORT_SetError(SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID); | |
| 768 return SECFailure; | |
| 769 } | |
| 770 | |
| 771 protocol_name.data = data->data + 3; | |
| 772 protocol_name.len = data->len - 3; | |
| 773 | |
| 774 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); | |
| 775 ss->ssl3.nextProtoState = SSL_NEXT_PROTO_SELECTED; | |
| 776 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 777 return SECITEM_CopyItem(NULL, &ss->ssl3.nextProto, &protocol_name); | |
| 778 } | |
| 779 | |
| 780 static PRInt32 | |
| 781 ssl3_ClientSendNextProtoNegoXtn(sslSocket * ss, PRBool append, | |
| 782 PRUint32 maxBytes) | |
| 783 { | |
| 784 PRInt32 extension_length; | |
| 785 | |
| 786 /* Renegotiations do not send this extension. */ | |
| 787 if (!ss->opt.enableNPN || !ss->nextProtoCallback || ss->firstHsDone) { | |
| 788 return 0; | |
| 789 } | |
| 790 | |
| 791 extension_length = 4; | |
| 792 | |
| 793 if (append && maxBytes >= extension_length) { | |
| 794 SECStatus rv; | |
| 795 rv = ssl3_AppendHandshakeNumber(ss, ssl_next_proto_nego_xtn, 2); | |
| 796 if (rv != SECSuccess) | |
| 797 goto loser; | |
| 798 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 799 if (rv != SECSuccess) | |
| 800 goto loser; | |
| 801 ss->xtnData.advertised[ss->xtnData.numAdvertised++] = | |
| 802 ssl_next_proto_nego_xtn; | |
| 803 } else if (maxBytes < extension_length) { | |
| 804 return 0; | |
| 805 } | |
| 806 | |
| 807 return extension_length; | |
| 808 | |
| 809 loser: | |
| 810 return -1; | |
| 811 } | |
| 812 | |
| 813 static PRInt32 | |
| 814 ssl3_ClientSendAppProtoXtn(sslSocket * ss, PRBool append, PRUint32 maxBytes) | |
| 815 { | |
| 816 PRInt32 extension_length; | |
| 817 unsigned char *alpn_protos = NULL; | |
| 818 | |
| 819 /* Renegotiations do not send this extension. */ | |
| 820 if (!ss->opt.enableALPN || !ss->opt.nextProtoNego.data || ss->firstHsDone) { | |
| 821 return 0; | |
| 822 } | |
| 823 | |
| 824 extension_length = 2 /* extension type */ + 2 /* extension length */ + | |
| 825 2 /* protocol name list length */ + | |
| 826 ss->opt.nextProtoNego.len; | |
| 827 | |
| 828 if (append && maxBytes >= extension_length) { | |
| 829 /* NPN requires that the client's fallback protocol is first in the | |
| 830 * list. However, ALPN sends protocols in preference order. So we | |
| 831 * allocate a buffer and move the first protocol to the end of the | |
| 832 * list. */ | |
| 833 SECStatus rv; | |
| 834 const unsigned int len = ss->opt.nextProtoNego.len; | |
| 835 | |
| 836 alpn_protos = PORT_Alloc(len); | |
| 837 if (alpn_protos == NULL) { | |
| 838 return SECFailure; | |
| 839 } | |
| 840 if (len > 0) { | |
| 841 /* Each protocol string is prefixed with a single byte length. */ | |
| 842 unsigned int i = ss->opt.nextProtoNego.data[0] + 1; | |
| 843 if (i <= len) { | |
| 844 memcpy(alpn_protos, &ss->opt.nextProtoNego.data[i], len - i); | |
| 845 memcpy(alpn_protos + len - i, ss->opt.nextProtoNego.data, i); | |
| 846 } else { | |
| 847 /* This seems to be invalid data so we'll send as-is. */ | |
| 848 memcpy(alpn_protos, ss->opt.nextProtoNego.data, len); | |
| 849 } | |
| 850 } | |
| 851 | |
| 852 rv = ssl3_AppendHandshakeNumber(ss, ssl_app_layer_protocol_xtn, 2); | |
| 853 if (rv != SECSuccess) { | |
| 854 goto loser; | |
| 855 } | |
| 856 rv = ssl3_AppendHandshakeNumber(ss, extension_length - 4, 2); | |
| 857 if (rv != SECSuccess) { | |
| 858 goto loser; | |
| 859 } | |
| 860 rv = ssl3_AppendHandshakeVariable(ss, alpn_protos, len, 2); | |
| 861 PORT_Free(alpn_protos); | |
| 862 alpn_protos = NULL; | |
| 863 if (rv != SECSuccess) { | |
| 864 goto loser; | |
| 865 } | |
| 866 ss->xtnData.advertised[ss->xtnData.numAdvertised++] = | |
| 867 ssl_app_layer_protocol_xtn; | |
| 868 } else if (maxBytes < extension_length) { | |
| 869 return 0; | |
| 870 } | |
| 871 | |
| 872 return extension_length; | |
| 873 | |
| 874 loser: | |
| 875 if (alpn_protos) { | |
| 876 PORT_Free(alpn_protos); | |
| 877 } | |
| 878 return -1; | |
| 879 } | |
| 880 | |
| 881 static PRInt32 | |
| 882 ssl3_ServerSendAppProtoXtn(sslSocket * ss, PRBool append, PRUint32 maxBytes) | |
| 883 { | |
| 884 PRInt32 extension_length; | |
| 885 | |
| 886 PORT_Assert(ss->opt.enableALPN); | |
| 887 PORT_Assert(ss->ssl3.nextProto.data); | |
| 888 PORT_Assert(ss->ssl3.nextProto.len > 0); | |
| 889 PORT_Assert(ss->ssl3.nextProtoState == SSL_NEXT_PROTO_NEGOTIATED); | |
| 890 PORT_Assert(!ss->firstHsDone); | |
| 891 | |
| 892 extension_length = 2 /* extension type */ + 2 /* extension length */ + | |
| 893 2 /* protocol name list */ + 1 /* name length */ + | |
| 894 ss->ssl3.nextProto.len; | |
| 895 | |
| 896 if (append && maxBytes >= extension_length) { | |
| 897 SECStatus rv; | |
| 898 rv = ssl3_AppendHandshakeNumber(ss, ssl_app_layer_protocol_xtn, 2); | |
| 899 if (rv != SECSuccess) { | |
| 900 return -1; | |
| 901 } | |
| 902 rv = ssl3_AppendHandshakeNumber(ss, extension_length - 4, 2); | |
| 903 if (rv != SECSuccess) { | |
| 904 return -1; | |
| 905 } | |
| 906 rv = ssl3_AppendHandshakeNumber(ss, ss->ssl3.nextProto.len + 1, 2); | |
| 907 if (rv != SECSuccess) { | |
| 908 return -1; | |
| 909 } | |
| 910 rv = ssl3_AppendHandshakeVariable(ss, ss->ssl3.nextProto.data, | |
| 911 ss->ssl3.nextProto.len, 1); | |
| 912 if (rv != SECSuccess) { | |
| 913 return -1; | |
| 914 } | |
| 915 } else if (maxBytes < extension_length) { | |
| 916 return 0; | |
| 917 } | |
| 918 | |
| 919 return extension_length; | |
| 920 } | |
| 921 | |
| 922 static SECStatus | |
| 923 ssl3_ClientHandleChannelIDXtn(sslSocket *ss, PRUint16 ex_type, | |
| 924 SECItem *data) | |
| 925 { | |
| 926 PORT_Assert(ss->getChannelID != NULL); | |
| 927 | |
| 928 if (data->len) { | |
| 929 PORT_SetError(SSL_ERROR_BAD_CHANNEL_ID_DATA); | |
| 930 return SECFailure; | |
| 931 } | |
| 932 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 933 return SECSuccess; | |
| 934 } | |
| 935 | |
| 936 static PRInt32 | |
| 937 ssl3_ClientSendChannelIDXtn(sslSocket * ss, PRBool append, | |
| 938 PRUint32 maxBytes) | |
| 939 { | |
| 940 PRInt32 extension_length = 4; | |
| 941 | |
| 942 if (!ss->getChannelID) | |
| 943 return 0; | |
| 944 | |
| 945 if (maxBytes < extension_length) { | |
| 946 PORT_Assert(0); | |
| 947 return 0; | |
| 948 } | |
| 949 | |
| 950 if (ss->sec.ci.sid->cached != never_cached && | |
| 951 ss->sec.ci.sid->u.ssl3.originalHandshakeHash.len == 0) { | |
| 952 /* We can't do ChannelID on a connection if we're resuming and didn't | |
| 953 * do ChannelID on the original connection: without ChannelID on the | |
| 954 * original connection we didn't record the handshake hashes needed for | |
| 955 * the signature. */ | |
| 956 return 0; | |
| 957 } | |
| 958 | |
| 959 if (append) { | |
| 960 SECStatus rv; | |
| 961 rv = ssl3_AppendHandshakeNumber(ss, ssl_channel_id_xtn, 2); | |
| 962 if (rv != SECSuccess) | |
| 963 goto loser; | |
| 964 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 965 if (rv != SECSuccess) | |
| 966 goto loser; | |
| 967 ss->xtnData.advertised[ss->xtnData.numAdvertised++] = | |
| 968 ssl_channel_id_xtn; | |
| 969 } | |
| 970 | |
| 971 return extension_length; | |
| 972 | |
| 973 loser: | |
| 974 return -1; | |
| 975 } | |
| 976 | |
| 977 static SECStatus | |
| 978 ssl3_ClientHandleStatusRequestXtn(sslSocket *ss, PRUint16 ex_type, | |
| 979 SECItem *data) | |
| 980 { | |
| 981 /* The echoed extension must be empty. */ | |
| 982 if (data->len != 0) | |
| 983 return SECFailure; | |
| 984 | |
| 985 /* Keep track of negotiated extensions. */ | |
| 986 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 987 | |
| 988 return SECSuccess; | |
| 989 } | |
| 990 | |
| 991 static PRInt32 | |
| 992 ssl3_ServerSendStatusRequestXtn( | |
| 993 sslSocket * ss, | |
| 994 PRBool append, | |
| 995 PRUint32 maxBytes) | |
| 996 { | |
| 997 PRInt32 extension_length; | |
| 998 SECStatus rv; | |
| 999 int i; | |
| 1000 PRBool haveStatus = PR_FALSE; | |
| 1001 | |
| 1002 for (i = kt_null; i < kt_kea_size; i++) { | |
| 1003 /* TODO: This is a temporary workaround. | |
| 1004 * The correct code needs to see if we have an OCSP response for | |
| 1005 * the server certificate being used, rather than if we have any | |
| 1006 * OCSP response. See also ssl3_SendCertificateStatus. | |
| 1007 */ | |
| 1008 if (ss->certStatusArray[i] && ss->certStatusArray[i]->len) { | |
| 1009 haveStatus = PR_TRUE; | |
| 1010 break; | |
| 1011 } | |
| 1012 } | |
| 1013 if (!haveStatus) | |
| 1014 return 0; | |
| 1015 | |
| 1016 extension_length = 2 + 2; | |
| 1017 if (append && maxBytes >= extension_length) { | |
| 1018 /* extension_type */ | |
| 1019 rv = ssl3_AppendHandshakeNumber(ss, ssl_cert_status_xtn, 2); | |
| 1020 if (rv != SECSuccess) | |
| 1021 return -1; | |
| 1022 /* length of extension_data */ | |
| 1023 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 1024 if (rv != SECSuccess) | |
| 1025 return -1; | |
| 1026 } | |
| 1027 | |
| 1028 return extension_length; | |
| 1029 } | |
| 1030 | |
| 1031 /* ssl3_ClientSendStatusRequestXtn builds the status_request extension on the | |
| 1032 * client side. See RFC 4366 section 3.6. */ | |
| 1033 static PRInt32 | |
| 1034 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append, | |
| 1035 PRUint32 maxBytes) | |
| 1036 { | |
| 1037 PRInt32 extension_length; | |
| 1038 | |
| 1039 if (!ss->opt.enableOCSPStapling) | |
| 1040 return 0; | |
| 1041 | |
| 1042 /* extension_type (2-bytes) + | |
| 1043 * length(extension_data) (2-bytes) + | |
| 1044 * status_type (1) + | |
| 1045 * responder_id_list length (2) + | |
| 1046 * request_extensions length (2) | |
| 1047 */ | |
| 1048 extension_length = 9; | |
| 1049 | |
| 1050 if (append && maxBytes >= extension_length) { | |
| 1051 SECStatus rv; | |
| 1052 TLSExtensionData *xtnData; | |
| 1053 | |
| 1054 /* extension_type */ | |
| 1055 rv = ssl3_AppendHandshakeNumber(ss, ssl_cert_status_xtn, 2); | |
| 1056 if (rv != SECSuccess) | |
| 1057 return -1; | |
| 1058 rv = ssl3_AppendHandshakeNumber(ss, extension_length - 4, 2); | |
| 1059 if (rv != SECSuccess) | |
| 1060 return -1; | |
| 1061 rv = ssl3_AppendHandshakeNumber(ss, 1 /* status_type ocsp */, 1); | |
| 1062 if (rv != SECSuccess) | |
| 1063 return -1; | |
| 1064 /* A zero length responder_id_list means that the responders are | |
| 1065 * implicitly known to the server. */ | |
| 1066 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 1067 if (rv != SECSuccess) | |
| 1068 return -1; | |
| 1069 /* A zero length request_extensions means that there are no extensions. | |
| 1070 * Specifically, we don't set the id-pkix-ocsp-nonce extension. This | |
| 1071 * means that the server can replay a cached OCSP response to us. */ | |
| 1072 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 1073 if (rv != SECSuccess) | |
| 1074 return -1; | |
| 1075 | |
| 1076 xtnData = &ss->xtnData; | |
| 1077 xtnData->advertised[xtnData->numAdvertised++] = ssl_cert_status_xtn; | |
| 1078 } else if (maxBytes < extension_length) { | |
| 1079 PORT_Assert(0); | |
| 1080 return 0; | |
| 1081 } | |
| 1082 return extension_length; | |
| 1083 } | |
| 1084 | |
| 1085 /* | |
| 1086 * NewSessionTicket | |
| 1087 * Called from ssl3_HandleFinished | |
| 1088 */ | |
| 1089 SECStatus | |
| 1090 ssl3_SendNewSessionTicket(sslSocket *ss) | |
| 1091 { | |
| 1092 int i; | |
| 1093 SECStatus rv; | |
| 1094 NewSessionTicket ticket; | |
| 1095 SECItem plaintext; | |
| 1096 SECItem plaintext_item = {0, NULL, 0}; | |
| 1097 SECItem ciphertext = {0, NULL, 0}; | |
| 1098 PRUint32 ciphertext_length; | |
| 1099 PRBool ms_is_wrapped; | |
| 1100 unsigned char wrapped_ms[SSL3_MASTER_SECRET_LENGTH]; | |
| 1101 SECItem ms_item = {0, NULL, 0}; | |
| 1102 SSL3KEAType effectiveExchKeyType = ssl_kea_null; | |
| 1103 PRUint32 padding_length; | |
| 1104 PRUint32 message_length; | |
| 1105 PRUint32 cert_length; | |
| 1106 PRUint8 length_buf[4]; | |
| 1107 PRUint32 now; | |
| 1108 PK11SymKey *aes_key_pkcs11; | |
| 1109 PK11SymKey *mac_key_pkcs11; | |
| 1110 #ifndef NO_PKCS11_BYPASS | |
| 1111 const unsigned char *aes_key; | |
| 1112 const unsigned char *mac_key; | |
| 1113 PRUint32 aes_key_length; | |
| 1114 PRUint32 mac_key_length; | |
| 1115 PRUint64 aes_ctx_buf[MAX_CIPHER_CONTEXT_LLONGS]; | |
| 1116 AESContext *aes_ctx; | |
| 1117 const SECHashObject *hashObj = NULL; | |
| 1118 PRUint64 hmac_ctx_buf[MAX_MAC_CONTEXT_LLONGS]; | |
| 1119 HMACContext *hmac_ctx; | |
| 1120 #endif | |
| 1121 CK_MECHANISM_TYPE cipherMech = CKM_AES_CBC; | |
| 1122 PK11Context *aes_ctx_pkcs11; | |
| 1123 CK_MECHANISM_TYPE macMech = CKM_SHA256_HMAC; | |
| 1124 PK11Context *hmac_ctx_pkcs11; | |
| 1125 unsigned char computed_mac[TLS_EX_SESS_TICKET_MAC_LENGTH]; | |
| 1126 unsigned int computed_mac_length; | |
| 1127 unsigned char iv[AES_BLOCK_SIZE]; | |
| 1128 SECItem ivItem; | |
| 1129 SECItem *srvName = NULL; | |
| 1130 PRUint32 srvNameLen = 0; | |
| 1131 CK_MECHANISM_TYPE msWrapMech = 0; /* dummy default value, | |
| 1132 * must be >= 0 */ | |
| 1133 | |
| 1134 SSL_TRC(3, ("%d: SSL3[%d]: send session_ticket handshake", | |
| 1135 SSL_GETPID(), ss->fd)); | |
| 1136 | |
| 1137 PORT_Assert( ss->opt.noLocks || ssl_HaveXmitBufLock(ss)); | |
| 1138 PORT_Assert( ss->opt.noLocks || ssl_HaveSSL3HandshakeLock(ss)); | |
| 1139 | |
| 1140 ticket.ticket_lifetime_hint = TLS_EX_SESS_TICKET_LIFETIME_HINT; | |
| 1141 cert_length = (ss->opt.requestCertificate && ss->sec.ci.sid->peerCert) ? | |
| 1142 3 + ss->sec.ci.sid->peerCert->derCert.len : 0; | |
| 1143 | |
| 1144 /* Get IV and encryption keys */ | |
| 1145 ivItem.data = iv; | |
| 1146 ivItem.len = sizeof(iv); | |
| 1147 rv = PK11_GenerateRandom(iv, sizeof(iv)); | |
| 1148 if (rv != SECSuccess) goto loser; | |
| 1149 | |
| 1150 #ifndef NO_PKCS11_BYPASS | |
| 1151 if (ss->opt.bypassPKCS11) { | |
| 1152 rv = ssl3_GetSessionTicketKeys(&aes_key, &aes_key_length, | |
| 1153 &mac_key, &mac_key_length); | |
| 1154 } else | |
| 1155 #endif | |
| 1156 { | |
| 1157 rv = ssl3_GetSessionTicketKeysPKCS11(ss, &aes_key_pkcs11, | |
| 1158 &mac_key_pkcs11); | |
| 1159 } | |
| 1160 if (rv != SECSuccess) goto loser; | |
| 1161 | |
| 1162 if (ss->ssl3.pwSpec->msItem.len && ss->ssl3.pwSpec->msItem.data) { | |
| 1163 /* The master secret is available unwrapped. */ | |
| 1164 ms_item.data = ss->ssl3.pwSpec->msItem.data; | |
| 1165 ms_item.len = ss->ssl3.pwSpec->msItem.len; | |
| 1166 ms_is_wrapped = PR_FALSE; | |
| 1167 } else { | |
| 1168 /* Extract the master secret wrapped. */ | |
| 1169 sslSessionID sid; | |
| 1170 PORT_Memset(&sid, 0, sizeof(sslSessionID)); | |
| 1171 | |
| 1172 if (ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa) { | |
| 1173 effectiveExchKeyType = kt_rsa; | |
| 1174 } else { | |
| 1175 effectiveExchKeyType = ss->ssl3.hs.kea_def->exchKeyType; | |
| 1176 } | |
| 1177 | |
| 1178 rv = ssl3_CacheWrappedMasterSecret(ss, &sid, ss->ssl3.pwSpec, | |
| 1179 effectiveExchKeyType); | |
| 1180 if (rv == SECSuccess) { | |
| 1181 if (sid.u.ssl3.keys.wrapped_master_secret_len > sizeof(wrapped_ms)) | |
| 1182 goto loser; | |
| 1183 memcpy(wrapped_ms, sid.u.ssl3.keys.wrapped_master_secret, | |
| 1184 sid.u.ssl3.keys.wrapped_master_secret_len); | |
| 1185 ms_item.data = wrapped_ms; | |
| 1186 ms_item.len = sid.u.ssl3.keys.wrapped_master_secret_len; | |
| 1187 msWrapMech = sid.u.ssl3.masterWrapMech; | |
| 1188 } else { | |
| 1189 /* TODO: else send an empty ticket. */ | |
| 1190 goto loser; | |
| 1191 } | |
| 1192 ms_is_wrapped = PR_TRUE; | |
| 1193 } | |
| 1194 /* Prep to send negotiated name */ | |
| 1195 srvName = &ss->ssl3.pwSpec->srvVirtName; | |
| 1196 if (srvName->data && srvName->len) { | |
| 1197 srvNameLen = 2 + srvName->len; /* len bytes + name len */ | |
| 1198 } | |
| 1199 | |
| 1200 ciphertext_length = | |
| 1201 sizeof(PRUint16) /* ticket_version */ | |
| 1202 + sizeof(SSL3ProtocolVersion) /* ssl_version */ | |
| 1203 + sizeof(ssl3CipherSuite) /* ciphersuite */ | |
| 1204 + 1 /* compression */ | |
| 1205 + 10 /* cipher spec parameters */ | |
| 1206 + 1 /* SessionTicket.ms_is_wrapped */ | |
| 1207 + 1 /* effectiveExchKeyType */ | |
| 1208 + 4 /* msWrapMech */ | |
| 1209 + 2 /* master_secret.length */ | |
| 1210 + ms_item.len /* master_secret */ | |
| 1211 + 1 /* client_auth_type */ | |
| 1212 + cert_length /* cert */ | |
| 1213 + 1 /* server name type */ | |
| 1214 + srvNameLen /* name len + length field */ | |
| 1215 + sizeof(ticket.ticket_lifetime_hint); | |
| 1216 padding_length = AES_BLOCK_SIZE - | |
| 1217 (ciphertext_length % AES_BLOCK_SIZE); | |
| 1218 ciphertext_length += padding_length; | |
| 1219 | |
| 1220 message_length = | |
| 1221 sizeof(ticket.ticket_lifetime_hint) /* ticket_lifetime_hint */ | |
| 1222 + 2 /* length field for NewSessionTicket.ticket */ | |
| 1223 + SESS_TICKET_KEY_NAME_LEN /* key_name */ | |
| 1224 + AES_BLOCK_SIZE /* iv */ | |
| 1225 + 2 /* length field for NewSessionTicket.ticket.encrypted_state */ | |
| 1226 + ciphertext_length /* encrypted_state */ | |
| 1227 + TLS_EX_SESS_TICKET_MAC_LENGTH; /* mac */ | |
| 1228 | |
| 1229 if (SECITEM_AllocItem(NULL, &plaintext_item, ciphertext_length) == NULL) | |
| 1230 goto loser; | |
| 1231 | |
| 1232 plaintext = plaintext_item; | |
| 1233 | |
| 1234 /* ticket_version */ | |
| 1235 rv = ssl3_AppendNumberToItem(&plaintext, TLS_EX_SESS_TICKET_VERSION, | |
| 1236 sizeof(PRUint16)); | |
| 1237 if (rv != SECSuccess) goto loser; | |
| 1238 | |
| 1239 /* ssl_version */ | |
| 1240 rv = ssl3_AppendNumberToItem(&plaintext, ss->version, | |
| 1241 sizeof(SSL3ProtocolVersion)); | |
| 1242 if (rv != SECSuccess) goto loser; | |
| 1243 | |
| 1244 /* ciphersuite */ | |
| 1245 rv = ssl3_AppendNumberToItem(&plaintext, ss->ssl3.hs.cipher_suite, | |
| 1246 sizeof(ssl3CipherSuite)); | |
| 1247 if (rv != SECSuccess) goto loser; | |
| 1248 | |
| 1249 /* compression */ | |
| 1250 rv = ssl3_AppendNumberToItem(&plaintext, ss->ssl3.hs.compression, 1); | |
| 1251 if (rv != SECSuccess) goto loser; | |
| 1252 | |
| 1253 /* cipher spec parameters */ | |
| 1254 rv = ssl3_AppendNumberToItem(&plaintext, ss->sec.authAlgorithm, 1); | |
| 1255 if (rv != SECSuccess) goto loser; | |
| 1256 rv = ssl3_AppendNumberToItem(&plaintext, ss->sec.authKeyBits, 4); | |
| 1257 if (rv != SECSuccess) goto loser; | |
| 1258 rv = ssl3_AppendNumberToItem(&plaintext, ss->sec.keaType, 1); | |
| 1259 if (rv != SECSuccess) goto loser; | |
| 1260 rv = ssl3_AppendNumberToItem(&plaintext, ss->sec.keaKeyBits, 4); | |
| 1261 if (rv != SECSuccess) goto loser; | |
| 1262 | |
| 1263 /* master_secret */ | |
| 1264 rv = ssl3_AppendNumberToItem(&plaintext, ms_is_wrapped, 1); | |
| 1265 if (rv != SECSuccess) goto loser; | |
| 1266 rv = ssl3_AppendNumberToItem(&plaintext, effectiveExchKeyType, 1); | |
| 1267 if (rv != SECSuccess) goto loser; | |
| 1268 rv = ssl3_AppendNumberToItem(&plaintext, msWrapMech, 4); | |
| 1269 if (rv != SECSuccess) goto loser; | |
| 1270 rv = ssl3_AppendNumberToItem(&plaintext, ms_item.len, 2); | |
| 1271 if (rv != SECSuccess) goto loser; | |
| 1272 rv = ssl3_AppendToItem(&plaintext, ms_item.data, ms_item.len); | |
| 1273 if (rv != SECSuccess) goto loser; | |
| 1274 | |
| 1275 /* client_identity */ | |
| 1276 if (ss->opt.requestCertificate && ss->sec.ci.sid->peerCert) { | |
| 1277 rv = ssl3_AppendNumberToItem(&plaintext, CLIENT_AUTH_CERTIFICATE, 1); | |
| 1278 if (rv != SECSuccess) goto loser; | |
| 1279 rv = ssl3_AppendNumberToItem(&plaintext, | |
| 1280 ss->sec.ci.sid->peerCert->derCert.len, 3); | |
| 1281 if (rv != SECSuccess) goto loser; | |
| 1282 rv = ssl3_AppendToItem(&plaintext, | |
| 1283 ss->sec.ci.sid->peerCert->derCert.data, | |
| 1284 ss->sec.ci.sid->peerCert->derCert.len); | |
| 1285 if (rv != SECSuccess) goto loser; | |
| 1286 } else { | |
| 1287 rv = ssl3_AppendNumberToItem(&plaintext, 0, 1); | |
| 1288 if (rv != SECSuccess) goto loser; | |
| 1289 } | |
| 1290 | |
| 1291 /* timestamp */ | |
| 1292 now = ssl_Time(); | |
| 1293 rv = ssl3_AppendNumberToItem(&plaintext, now, | |
| 1294 sizeof(ticket.ticket_lifetime_hint)); | |
| 1295 if (rv != SECSuccess) goto loser; | |
| 1296 | |
| 1297 if (srvNameLen) { | |
| 1298 /* Name Type (sni_host_name) */ | |
| 1299 rv = ssl3_AppendNumberToItem(&plaintext, srvName->type, 1); | |
| 1300 if (rv != SECSuccess) goto loser; | |
| 1301 /* HostName (length and value) */ | |
| 1302 rv = ssl3_AppendNumberToItem(&plaintext, srvName->len, 2); | |
| 1303 if (rv != SECSuccess) goto loser; | |
| 1304 rv = ssl3_AppendToItem(&plaintext, srvName->data, srvName->len); | |
| 1305 if (rv != SECSuccess) goto loser; | |
| 1306 } else { | |
| 1307 /* No Name */ | |
| 1308 rv = ssl3_AppendNumberToItem(&plaintext, (char)TLS_STE_NO_SERVER_NAME, | |
| 1309 1); | |
| 1310 if (rv != SECSuccess) goto loser; | |
| 1311 } | |
| 1312 | |
| 1313 PORT_Assert(plaintext.len == padding_length); | |
| 1314 for (i = 0; i < padding_length; i++) | |
| 1315 plaintext.data[i] = (unsigned char)padding_length; | |
| 1316 | |
| 1317 if (SECITEM_AllocItem(NULL, &ciphertext, ciphertext_length) == NULL) { | |
| 1318 rv = SECFailure; | |
| 1319 goto loser; | |
| 1320 } | |
| 1321 | |
| 1322 /* Generate encrypted portion of ticket. */ | |
| 1323 #ifndef NO_PKCS11_BYPASS | |
| 1324 if (ss->opt.bypassPKCS11) { | |
| 1325 aes_ctx = (AESContext *)aes_ctx_buf; | |
| 1326 rv = AES_InitContext(aes_ctx, aes_key, aes_key_length, iv, | |
| 1327 NSS_AES_CBC, 1, AES_BLOCK_SIZE); | |
| 1328 if (rv != SECSuccess) goto loser; | |
| 1329 | |
| 1330 rv = AES_Encrypt(aes_ctx, ciphertext.data, &ciphertext.len, | |
| 1331 ciphertext.len, plaintext_item.data, | |
| 1332 plaintext_item.len); | |
| 1333 if (rv != SECSuccess) goto loser; | |
| 1334 } else | |
| 1335 #endif | |
| 1336 { | |
| 1337 aes_ctx_pkcs11 = PK11_CreateContextBySymKey(cipherMech, | |
| 1338 CKA_ENCRYPT, aes_key_pkcs11, &ivItem); | |
| 1339 if (!aes_ctx_pkcs11) | |
| 1340 goto loser; | |
| 1341 | |
| 1342 rv = PK11_CipherOp(aes_ctx_pkcs11, ciphertext.data, | |
| 1343 (int *)&ciphertext.len, ciphertext.len, | |
| 1344 plaintext_item.data, plaintext_item.len); | |
| 1345 PK11_Finalize(aes_ctx_pkcs11); | |
| 1346 PK11_DestroyContext(aes_ctx_pkcs11, PR_TRUE); | |
| 1347 if (rv != SECSuccess) goto loser; | |
| 1348 } | |
| 1349 | |
| 1350 /* Convert ciphertext length to network order. */ | |
| 1351 length_buf[0] = (ciphertext.len >> 8) & 0xff; | |
| 1352 length_buf[1] = (ciphertext.len ) & 0xff; | |
| 1353 | |
| 1354 /* Compute MAC. */ | |
| 1355 #ifndef NO_PKCS11_BYPASS | |
| 1356 if (ss->opt.bypassPKCS11) { | |
| 1357 hmac_ctx = (HMACContext *)hmac_ctx_buf; | |
| 1358 hashObj = HASH_GetRawHashObject(HASH_AlgSHA256); | |
| 1359 if (HMAC_Init(hmac_ctx, hashObj, mac_key, | |
| 1360 mac_key_length, PR_FALSE) != SECSuccess) | |
| 1361 goto loser; | |
| 1362 | |
| 1363 HMAC_Begin(hmac_ctx); | |
| 1364 HMAC_Update(hmac_ctx, key_name, SESS_TICKET_KEY_NAME_LEN); | |
| 1365 HMAC_Update(hmac_ctx, iv, sizeof(iv)); | |
| 1366 HMAC_Update(hmac_ctx, (unsigned char *)length_buf, 2); | |
| 1367 HMAC_Update(hmac_ctx, ciphertext.data, ciphertext.len); | |
| 1368 HMAC_Finish(hmac_ctx, computed_mac, &computed_mac_length, | |
| 1369 sizeof(computed_mac)); | |
| 1370 } else | |
| 1371 #endif | |
| 1372 { | |
| 1373 SECItem macParam; | |
| 1374 macParam.data = NULL; | |
| 1375 macParam.len = 0; | |
| 1376 hmac_ctx_pkcs11 = PK11_CreateContextBySymKey(macMech, | |
| 1377 CKA_SIGN, mac_key_pkcs11, &macParam); | |
| 1378 if (!hmac_ctx_pkcs11) | |
| 1379 goto loser; | |
| 1380 | |
| 1381 rv = PK11_DigestBegin(hmac_ctx_pkcs11); | |
| 1382 rv = PK11_DigestOp(hmac_ctx_pkcs11, key_name, | |
| 1383 SESS_TICKET_KEY_NAME_LEN); | |
| 1384 rv = PK11_DigestOp(hmac_ctx_pkcs11, iv, sizeof(iv)); | |
| 1385 rv = PK11_DigestOp(hmac_ctx_pkcs11, (unsigned char *)length_buf, 2); | |
| 1386 rv = PK11_DigestOp(hmac_ctx_pkcs11, ciphertext.data, ciphertext.len); | |
| 1387 rv = PK11_DigestFinal(hmac_ctx_pkcs11, computed_mac, | |
| 1388 &computed_mac_length, sizeof(computed_mac)); | |
| 1389 PK11_DestroyContext(hmac_ctx_pkcs11, PR_TRUE); | |
| 1390 if (rv != SECSuccess) goto loser; | |
| 1391 } | |
| 1392 | |
| 1393 /* Serialize the handshake message. */ | |
| 1394 rv = ssl3_AppendHandshakeHeader(ss, new_session_ticket, message_length); | |
| 1395 if (rv != SECSuccess) goto loser; | |
| 1396 | |
| 1397 rv = ssl3_AppendHandshakeNumber(ss, ticket.ticket_lifetime_hint, | |
| 1398 sizeof(ticket.ticket_lifetime_hint)); | |
| 1399 if (rv != SECSuccess) goto loser; | |
| 1400 | |
| 1401 rv = ssl3_AppendHandshakeNumber(ss, | |
| 1402 message_length - sizeof(ticket.ticket_lifetime_hint) - 2, 2); | |
| 1403 if (rv != SECSuccess) goto loser; | |
| 1404 | |
| 1405 rv = ssl3_AppendHandshake(ss, key_name, SESS_TICKET_KEY_NAME_LEN); | |
| 1406 if (rv != SECSuccess) goto loser; | |
| 1407 | |
| 1408 rv = ssl3_AppendHandshake(ss, iv, sizeof(iv)); | |
| 1409 if (rv != SECSuccess) goto loser; | |
| 1410 | |
| 1411 rv = ssl3_AppendHandshakeVariable(ss, ciphertext.data, ciphertext.len, 2); | |
| 1412 if (rv != SECSuccess) goto loser; | |
| 1413 | |
| 1414 rv = ssl3_AppendHandshake(ss, computed_mac, computed_mac_length); | |
| 1415 if (rv != SECSuccess) goto loser; | |
| 1416 | |
| 1417 loser: | |
| 1418 if (plaintext_item.data) | |
| 1419 SECITEM_FreeItem(&plaintext_item, PR_FALSE); | |
| 1420 if (ciphertext.data) | |
| 1421 SECITEM_FreeItem(&ciphertext, PR_FALSE); | |
| 1422 | |
| 1423 return rv; | |
| 1424 } | |
| 1425 | |
| 1426 /* When a client receives a SessionTicket extension a NewSessionTicket | |
| 1427 * message is expected during the handshake. | |
| 1428 */ | |
| 1429 SECStatus | |
| 1430 ssl3_ClientHandleSessionTicketXtn(sslSocket *ss, PRUint16 ex_type, | |
| 1431 SECItem *data) | |
| 1432 { | |
| 1433 if (data->len != 0) | |
| 1434 return SECFailure; | |
| 1435 | |
| 1436 /* Keep track of negotiated extensions. */ | |
| 1437 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 1438 return SECSuccess; | |
| 1439 } | |
| 1440 | |
| 1441 SECStatus | |
| 1442 ssl3_ServerHandleSessionTicketXtn(sslSocket *ss, PRUint16 ex_type, | |
| 1443 SECItem *data) | |
| 1444 { | |
| 1445 SECStatus rv; | |
| 1446 SECItem *decrypted_state = NULL; | |
| 1447 SessionTicket *parsed_session_ticket = NULL; | |
| 1448 sslSessionID *sid = NULL; | |
| 1449 SSL3Statistics *ssl3stats; | |
| 1450 | |
| 1451 /* Ignore the SessionTicket extension if processing is disabled. */ | |
| 1452 if (!ss->opt.enableSessionTickets) | |
| 1453 return SECSuccess; | |
| 1454 | |
| 1455 /* Keep track of negotiated extensions. */ | |
| 1456 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 1457 | |
| 1458 /* Parse the received ticket sent in by the client. We are | |
| 1459 * lenient about some parse errors, falling back to a fullshake | |
| 1460 * instead of terminating the current connection. | |
| 1461 */ | |
| 1462 if (data->len == 0) { | |
| 1463 ss->xtnData.emptySessionTicket = PR_TRUE; | |
| 1464 } else { | |
| 1465 int i; | |
| 1466 SECItem extension_data; | |
| 1467 EncryptedSessionTicket enc_session_ticket; | |
| 1468 unsigned char computed_mac[TLS_EX_SESS_TICKET_MAC_LENGTH]; | |
| 1469 unsigned int computed_mac_length; | |
| 1470 #ifndef NO_PKCS11_BYPASS | |
| 1471 const SECHashObject *hashObj; | |
| 1472 const unsigned char *aes_key; | |
| 1473 const unsigned char *mac_key; | |
| 1474 PRUint32 aes_key_length; | |
| 1475 PRUint32 mac_key_length; | |
| 1476 PRUint64 hmac_ctx_buf[MAX_MAC_CONTEXT_LLONGS]; | |
| 1477 HMACContext *hmac_ctx; | |
| 1478 PRUint64 aes_ctx_buf[MAX_CIPHER_CONTEXT_LLONGS]; | |
| 1479 AESContext *aes_ctx; | |
| 1480 #endif | |
| 1481 PK11SymKey *aes_key_pkcs11; | |
| 1482 PK11SymKey *mac_key_pkcs11; | |
| 1483 PK11Context *hmac_ctx_pkcs11; | |
| 1484 CK_MECHANISM_TYPE macMech = CKM_SHA256_HMAC; | |
| 1485 PK11Context *aes_ctx_pkcs11; | |
| 1486 CK_MECHANISM_TYPE cipherMech = CKM_AES_CBC; | |
| 1487 unsigned char * padding; | |
| 1488 PRUint32 padding_length; | |
| 1489 unsigned char *buffer; | |
| 1490 unsigned int buffer_len; | |
| 1491 PRInt32 temp; | |
| 1492 SECItem cert_item; | |
| 1493 PRInt8 nameType = TLS_STE_NO_SERVER_NAME; | |
| 1494 | |
| 1495 /* Turn off stateless session resumption if the client sends a | |
| 1496 * SessionTicket extension, even if the extension turns out to be | |
| 1497 * malformed (ss->sec.ci.sid is non-NULL when doing session | |
| 1498 * renegotiation.) | |
| 1499 */ | |
| 1500 if (ss->sec.ci.sid != NULL) { | |
| 1501 if (ss->sec.uncache) | |
| 1502 ss->sec.uncache(ss->sec.ci.sid); | |
| 1503 ssl_FreeSID(ss->sec.ci.sid); | |
| 1504 ss->sec.ci.sid = NULL; | |
| 1505 } | |
| 1506 | |
| 1507 extension_data.data = data->data; /* Keep a copy for future use. */ | |
| 1508 extension_data.len = data->len; | |
| 1509 | |
| 1510 if (ssl3_ParseEncryptedSessionTicket(ss, data, &enc_session_ticket) | |
| 1511 != SECSuccess) | |
| 1512 return SECFailure; | |
| 1513 | |
| 1514 /* Get session ticket keys. */ | |
| 1515 #ifndef NO_PKCS11_BYPASS | |
| 1516 if (ss->opt.bypassPKCS11) { | |
| 1517 rv = ssl3_GetSessionTicketKeys(&aes_key, &aes_key_length, | |
| 1518 &mac_key, &mac_key_length); | |
| 1519 } else | |
| 1520 #endif | |
| 1521 { | |
| 1522 rv = ssl3_GetSessionTicketKeysPKCS11(ss, &aes_key_pkcs11, | |
| 1523 &mac_key_pkcs11); | |
| 1524 } | |
| 1525 if (rv != SECSuccess) { | |
| 1526 SSL_DBG(("%d: SSL[%d]: Unable to get/generate session ticket keys.", | |
| 1527 SSL_GETPID(), ss->fd)); | |
| 1528 goto loser; | |
| 1529 } | |
| 1530 | |
| 1531 /* If the ticket sent by the client was generated under a key different | |
| 1532 * from the one we have, bypass ticket processing. | |
| 1533 */ | |
| 1534 if (PORT_Memcmp(enc_session_ticket.key_name, key_name, | |
| 1535 SESS_TICKET_KEY_NAME_LEN) != 0) { | |
| 1536 SSL_DBG(("%d: SSL[%d]: Session ticket key_name sent mismatch.", | |
| 1537 SSL_GETPID(), ss->fd)); | |
| 1538 goto no_ticket; | |
| 1539 } | |
| 1540 | |
| 1541 /* Verify the MAC on the ticket. MAC verification may also | |
| 1542 * fail if the MAC key has been recently refreshed. | |
| 1543 */ | |
| 1544 #ifndef NO_PKCS11_BYPASS | |
| 1545 if (ss->opt.bypassPKCS11) { | |
| 1546 hmac_ctx = (HMACContext *)hmac_ctx_buf; | |
| 1547 hashObj = HASH_GetRawHashObject(HASH_AlgSHA256); | |
| 1548 if (HMAC_Init(hmac_ctx, hashObj, mac_key, | |
| 1549 sizeof(session_ticket_mac_key), PR_FALSE) != SECSuccess) | |
| 1550 goto no_ticket; | |
| 1551 HMAC_Begin(hmac_ctx); | |
| 1552 HMAC_Update(hmac_ctx, extension_data.data, | |
| 1553 extension_data.len - TLS_EX_SESS_TICKET_MAC_LENGTH); | |
| 1554 if (HMAC_Finish(hmac_ctx, computed_mac, &computed_mac_length, | |
| 1555 sizeof(computed_mac)) != SECSuccess) | |
| 1556 goto no_ticket; | |
| 1557 } else | |
| 1558 #endif | |
| 1559 { | |
| 1560 SECItem macParam; | |
| 1561 macParam.data = NULL; | |
| 1562 macParam.len = 0; | |
| 1563 hmac_ctx_pkcs11 = PK11_CreateContextBySymKey(macMech, | |
| 1564 CKA_SIGN, mac_key_pkcs11, &macParam); | |
| 1565 if (!hmac_ctx_pkcs11) { | |
| 1566 SSL_DBG(("%d: SSL[%d]: Unable to create HMAC context: %d.", | |
| 1567 SSL_GETPID(), ss->fd, PORT_GetError())); | |
| 1568 goto no_ticket; | |
| 1569 } else { | |
| 1570 SSL_DBG(("%d: SSL[%d]: Successfully created HMAC context.", | |
| 1571 SSL_GETPID(), ss->fd)); | |
| 1572 } | |
| 1573 rv = PK11_DigestBegin(hmac_ctx_pkcs11); | |
| 1574 rv = PK11_DigestOp(hmac_ctx_pkcs11, extension_data.data, | |
| 1575 extension_data.len - TLS_EX_SESS_TICKET_MAC_LENGTH); | |
| 1576 if (rv != SECSuccess) { | |
| 1577 PK11_DestroyContext(hmac_ctx_pkcs11, PR_TRUE); | |
| 1578 goto no_ticket; | |
| 1579 } | |
| 1580 rv = PK11_DigestFinal(hmac_ctx_pkcs11, computed_mac, | |
| 1581 &computed_mac_length, sizeof(computed_mac)); | |
| 1582 PK11_DestroyContext(hmac_ctx_pkcs11, PR_TRUE); | |
| 1583 if (rv != SECSuccess) | |
| 1584 goto no_ticket; | |
| 1585 } | |
| 1586 if (NSS_SecureMemcmp(computed_mac, enc_session_ticket.mac, | |
| 1587 computed_mac_length) != 0) { | |
| 1588 SSL_DBG(("%d: SSL[%d]: Session ticket MAC mismatch.", | |
| 1589 SSL_GETPID(), ss->fd)); | |
| 1590 goto no_ticket; | |
| 1591 } | |
| 1592 | |
| 1593 /* We ignore key_name for now. | |
| 1594 * This is ok as MAC verification succeeded. | |
| 1595 */ | |
| 1596 | |
| 1597 /* Decrypt the ticket. */ | |
| 1598 | |
| 1599 /* Plaintext is shorter than the ciphertext due to padding. */ | |
| 1600 decrypted_state = SECITEM_AllocItem(NULL, NULL, | |
| 1601 enc_session_ticket.encrypted_state.len); | |
| 1602 | |
| 1603 #ifndef NO_PKCS11_BYPASS | |
| 1604 if (ss->opt.bypassPKCS11) { | |
| 1605 aes_ctx = (AESContext *)aes_ctx_buf; | |
| 1606 rv = AES_InitContext(aes_ctx, aes_key, | |
| 1607 sizeof(session_ticket_enc_key), enc_session_ticket.iv, | |
| 1608 NSS_AES_CBC, 0,AES_BLOCK_SIZE); | |
| 1609 if (rv != SECSuccess) { | |
| 1610 SSL_DBG(("%d: SSL[%d]: Unable to create AES context.", | |
| 1611 SSL_GETPID(), ss->fd)); | |
| 1612 goto no_ticket; | |
| 1613 } | |
| 1614 | |
| 1615 rv = AES_Decrypt(aes_ctx, decrypted_state->data, | |
| 1616 &decrypted_state->len, decrypted_state->len, | |
| 1617 enc_session_ticket.encrypted_state.data, | |
| 1618 enc_session_ticket.encrypted_state.len); | |
| 1619 if (rv != SECSuccess) | |
| 1620 goto no_ticket; | |
| 1621 } else | |
| 1622 #endif | |
| 1623 { | |
| 1624 SECItem ivItem; | |
| 1625 ivItem.data = enc_session_ticket.iv; | |
| 1626 ivItem.len = AES_BLOCK_SIZE; | |
| 1627 aes_ctx_pkcs11 = PK11_CreateContextBySymKey(cipherMech, | |
| 1628 CKA_DECRYPT, aes_key_pkcs11, &ivItem); | |
| 1629 if (!aes_ctx_pkcs11) { | |
| 1630 SSL_DBG(("%d: SSL[%d]: Unable to create AES context.", | |
| 1631 SSL_GETPID(), ss->fd)); | |
| 1632 goto no_ticket; | |
| 1633 } | |
| 1634 | |
| 1635 rv = PK11_CipherOp(aes_ctx_pkcs11, decrypted_state->data, | |
| 1636 (int *)&decrypted_state->len, decrypted_state->len, | |
| 1637 enc_session_ticket.encrypted_state.data, | |
| 1638 enc_session_ticket.encrypted_state.len); | |
| 1639 PK11_Finalize(aes_ctx_pkcs11); | |
| 1640 PK11_DestroyContext(aes_ctx_pkcs11, PR_TRUE); | |
| 1641 if (rv != SECSuccess) | |
| 1642 goto no_ticket; | |
| 1643 } | |
| 1644 | |
| 1645 /* Check padding. */ | |
| 1646 padding_length = | |
| 1647 (PRUint32)decrypted_state->data[decrypted_state->len - 1]; | |
| 1648 if (padding_length == 0 || padding_length > AES_BLOCK_SIZE) | |
| 1649 goto no_ticket; | |
| 1650 | |
| 1651 padding = &decrypted_state->data[decrypted_state->len - padding_length]; | |
| 1652 for (i = 0; i < padding_length; i++, padding++) { | |
| 1653 if (padding_length != (PRUint32)*padding) | |
| 1654 goto no_ticket; | |
| 1655 } | |
| 1656 | |
| 1657 /* Deserialize session state. */ | |
| 1658 buffer = decrypted_state->data; | |
| 1659 buffer_len = decrypted_state->len; | |
| 1660 | |
| 1661 parsed_session_ticket = PORT_ZAlloc(sizeof(SessionTicket)); | |
| 1662 if (parsed_session_ticket == NULL) { | |
| 1663 rv = SECFailure; | |
| 1664 goto loser; | |
| 1665 } | |
| 1666 | |
| 1667 /* Read ticket_version (which is ignored for now.) */ | |
| 1668 temp = ssl3_ConsumeHandshakeNumber(ss, 2, &buffer, &buffer_len); | |
| 1669 if (temp < 0) goto no_ticket; | |
| 1670 parsed_session_ticket->ticket_version = (SSL3ProtocolVersion)temp; | |
| 1671 | |
| 1672 /* Read SSLVersion. */ | |
| 1673 temp = ssl3_ConsumeHandshakeNumber(ss, 2, &buffer, &buffer_len); | |
| 1674 if (temp < 0) goto no_ticket; | |
| 1675 parsed_session_ticket->ssl_version = (SSL3ProtocolVersion)temp; | |
| 1676 | |
| 1677 /* Read cipher_suite. */ | |
| 1678 temp = ssl3_ConsumeHandshakeNumber(ss, 2, &buffer, &buffer_len); | |
| 1679 if (temp < 0) goto no_ticket; | |
| 1680 parsed_session_ticket->cipher_suite = (ssl3CipherSuite)temp; | |
| 1681 | |
| 1682 /* Read compression_method. */ | |
| 1683 temp = ssl3_ConsumeHandshakeNumber(ss, 1, &buffer, &buffer_len); | |
| 1684 if (temp < 0) goto no_ticket; | |
| 1685 parsed_session_ticket->compression_method = (SSLCompressionMethod)temp; | |
| 1686 | |
| 1687 /* Read cipher spec parameters. */ | |
| 1688 temp = ssl3_ConsumeHandshakeNumber(ss, 1, &buffer, &buffer_len); | |
| 1689 if (temp < 0) goto no_ticket; | |
| 1690 parsed_session_ticket->authAlgorithm = (SSLSignType)temp; | |
| 1691 temp = ssl3_ConsumeHandshakeNumber(ss, 4, &buffer, &buffer_len); | |
| 1692 if (temp < 0) goto no_ticket; | |
| 1693 parsed_session_ticket->authKeyBits = (PRUint32)temp; | |
| 1694 temp = ssl3_ConsumeHandshakeNumber(ss, 1, &buffer, &buffer_len); | |
| 1695 if (temp < 0) goto no_ticket; | |
| 1696 parsed_session_ticket->keaType = (SSLKEAType)temp; | |
| 1697 temp = ssl3_ConsumeHandshakeNumber(ss, 4, &buffer, &buffer_len); | |
| 1698 if (temp < 0) goto no_ticket; | |
| 1699 parsed_session_ticket->keaKeyBits = (PRUint32)temp; | |
| 1700 | |
| 1701 /* Read wrapped master_secret. */ | |
| 1702 temp = ssl3_ConsumeHandshakeNumber(ss, 1, &buffer, &buffer_len); | |
| 1703 if (temp < 0) goto no_ticket; | |
| 1704 parsed_session_ticket->ms_is_wrapped = (PRBool)temp; | |
| 1705 | |
| 1706 temp = ssl3_ConsumeHandshakeNumber(ss, 1, &buffer, &buffer_len); | |
| 1707 if (temp < 0) goto no_ticket; | |
| 1708 parsed_session_ticket->exchKeyType = (SSL3KEAType)temp; | |
| 1709 | |
| 1710 temp = ssl3_ConsumeHandshakeNumber(ss, 4, &buffer, &buffer_len); | |
| 1711 if (temp < 0) goto no_ticket; | |
| 1712 parsed_session_ticket->msWrapMech = (CK_MECHANISM_TYPE)temp; | |
| 1713 | |
| 1714 temp = ssl3_ConsumeHandshakeNumber(ss, 2, &buffer, &buffer_len); | |
| 1715 if (temp < 0) goto no_ticket; | |
| 1716 parsed_session_ticket->ms_length = (PRUint16)temp; | |
| 1717 if (parsed_session_ticket->ms_length == 0 || /* sanity check MS. */ | |
| 1718 parsed_session_ticket->ms_length > | |
| 1719 sizeof(parsed_session_ticket->master_secret)) | |
| 1720 goto no_ticket; | |
| 1721 | |
| 1722 /* Allow for the wrapped master secret to be longer. */ | |
| 1723 if (buffer_len < parsed_session_ticket->ms_length) | |
| 1724 goto no_ticket; | |
| 1725 PORT_Memcpy(parsed_session_ticket->master_secret, buffer, | |
| 1726 parsed_session_ticket->ms_length); | |
| 1727 buffer += parsed_session_ticket->ms_length; | |
| 1728 buffer_len -= parsed_session_ticket->ms_length; | |
| 1729 | |
| 1730 /* Read client_identity */ | |
| 1731 temp = ssl3_ConsumeHandshakeNumber(ss, 1, &buffer, &buffer_len); | |
| 1732 if (temp < 0) | |
| 1733 goto no_ticket; | |
| 1734 parsed_session_ticket->client_identity.client_auth_type = | |
| 1735 (ClientAuthenticationType)temp; | |
| 1736 switch(parsed_session_ticket->client_identity.client_auth_type) { | |
| 1737 case CLIENT_AUTH_ANONYMOUS: | |
| 1738 break; | |
| 1739 case CLIENT_AUTH_CERTIFICATE: | |
| 1740 rv = ssl3_ConsumeHandshakeVariable(ss, &cert_item, 3, | |
| 1741 &buffer, &buffer_len); | |
| 1742 if (rv != SECSuccess) goto no_ticket; | |
| 1743 rv = SECITEM_CopyItem(NULL, &parsed_session_ticket->peer_cert, | |
| 1744 &cert_item); | |
| 1745 if (rv != SECSuccess) goto no_ticket; | |
| 1746 break; | |
| 1747 default: | |
| 1748 goto no_ticket; | |
| 1749 } | |
| 1750 /* Read timestamp. */ | |
| 1751 temp = ssl3_ConsumeHandshakeNumber(ss, 4, &buffer, &buffer_len); | |
| 1752 if (temp < 0) | |
| 1753 goto no_ticket; | |
| 1754 parsed_session_ticket->timestamp = (PRUint32)temp; | |
| 1755 | |
| 1756 /* Read server name */ | |
| 1757 nameType = | |
| 1758 ssl3_ConsumeHandshakeNumber(ss, 1, &buffer, &buffer_len); | |
| 1759 if (nameType != TLS_STE_NO_SERVER_NAME) { | |
| 1760 SECItem name_item; | |
| 1761 rv = ssl3_ConsumeHandshakeVariable(ss, &name_item, 2, &buffer, | |
| 1762 &buffer_len); | |
| 1763 if (rv != SECSuccess) goto no_ticket; | |
| 1764 rv = SECITEM_CopyItem(NULL, &parsed_session_ticket->srvName, | |
| 1765 &name_item); | |
| 1766 if (rv != SECSuccess) goto no_ticket; | |
| 1767 parsed_session_ticket->srvName.type = nameType; | |
| 1768 } | |
| 1769 | |
| 1770 /* Done parsing. Check that all bytes have been consumed. */ | |
| 1771 if (buffer_len != padding_length) | |
| 1772 goto no_ticket; | |
| 1773 | |
| 1774 /* Use the ticket if it has not expired, otherwise free the allocated | |
| 1775 * memory since the ticket is of no use. | |
| 1776 */ | |
| 1777 if (parsed_session_ticket->timestamp != 0 && | |
| 1778 parsed_session_ticket->timestamp + | |
| 1779 TLS_EX_SESS_TICKET_LIFETIME_HINT > ssl_Time()) { | |
| 1780 | |
| 1781 sid = ssl3_NewSessionID(ss, PR_TRUE); | |
| 1782 if (sid == NULL) { | |
| 1783 rv = SECFailure; | |
| 1784 goto loser; | |
| 1785 } | |
| 1786 | |
| 1787 /* Copy over parameters. */ | |
| 1788 sid->version = parsed_session_ticket->ssl_version; | |
| 1789 sid->u.ssl3.cipherSuite = parsed_session_ticket->cipher_suite; | |
| 1790 sid->u.ssl3.compression = parsed_session_ticket->compression_method; | |
| 1791 sid->authAlgorithm = parsed_session_ticket->authAlgorithm; | |
| 1792 sid->authKeyBits = parsed_session_ticket->authKeyBits; | |
| 1793 sid->keaType = parsed_session_ticket->keaType; | |
| 1794 sid->keaKeyBits = parsed_session_ticket->keaKeyBits; | |
| 1795 | |
| 1796 /* Copy master secret. */ | |
| 1797 #ifndef NO_PKCS11_BYPASS | |
| 1798 if (ss->opt.bypassPKCS11 && | |
| 1799 parsed_session_ticket->ms_is_wrapped) | |
| 1800 goto no_ticket; | |
| 1801 #endif | |
| 1802 if (parsed_session_ticket->ms_length > | |
| 1803 sizeof(sid->u.ssl3.keys.wrapped_master_secret)) | |
| 1804 goto no_ticket; | |
| 1805 PORT_Memcpy(sid->u.ssl3.keys.wrapped_master_secret, | |
| 1806 parsed_session_ticket->master_secret, | |
| 1807 parsed_session_ticket->ms_length); | |
| 1808 sid->u.ssl3.keys.wrapped_master_secret_len = | |
| 1809 parsed_session_ticket->ms_length; | |
| 1810 sid->u.ssl3.exchKeyType = parsed_session_ticket->exchKeyType; | |
| 1811 sid->u.ssl3.masterWrapMech = parsed_session_ticket->msWrapMech; | |
| 1812 sid->u.ssl3.keys.msIsWrapped = | |
| 1813 parsed_session_ticket->ms_is_wrapped; | |
| 1814 sid->u.ssl3.masterValid = PR_TRUE; | |
| 1815 sid->u.ssl3.keys.resumable = PR_TRUE; | |
| 1816 | |
| 1817 /* Copy over client cert from session ticket if there is one. */ | |
| 1818 if (parsed_session_ticket->peer_cert.data != NULL) { | |
| 1819 if (sid->peerCert != NULL) | |
| 1820 CERT_DestroyCertificate(sid->peerCert); | |
| 1821 sid->peerCert = CERT_NewTempCertificate(ss->dbHandle, | |
| 1822 &parsed_session_ticket->peer_cert, NULL, PR_FALSE, PR_TRUE); | |
| 1823 if (sid->peerCert == NULL) { | |
| 1824 rv = SECFailure; | |
| 1825 goto loser; | |
| 1826 } | |
| 1827 } | |
| 1828 if (parsed_session_ticket->srvName.data != NULL) { | |
| 1829 sid->u.ssl3.srvName = parsed_session_ticket->srvName; | |
| 1830 } | |
| 1831 ss->statelessResume = PR_TRUE; | |
| 1832 ss->sec.ci.sid = sid; | |
| 1833 } | |
| 1834 } | |
| 1835 | |
| 1836 if (0) { | |
| 1837 no_ticket: | |
| 1838 SSL_DBG(("%d: SSL[%d]: Session ticket parsing failed.", | |
| 1839 SSL_GETPID(), ss->fd)); | |
| 1840 ssl3stats = SSL_GetStatistics(); | |
| 1841 SSL_AtomicIncrementLong(& ssl3stats->hch_sid_ticket_parse_failures ); | |
| 1842 } | |
| 1843 rv = SECSuccess; | |
| 1844 | |
| 1845 loser: | |
| 1846 /* ss->sec.ci.sid == sid if it did NOT come here via goto statement | |
| 1847 * in that case do not free sid | |
| 1848 */ | |
| 1849 if (sid && (ss->sec.ci.sid != sid)) { | |
| 1850 ssl_FreeSID(sid); | |
| 1851 sid = NULL; | |
| 1852 } | |
| 1853 if (decrypted_state != NULL) { | |
| 1854 SECITEM_FreeItem(decrypted_state, PR_TRUE); | |
| 1855 decrypted_state = NULL; | |
| 1856 } | |
| 1857 | |
| 1858 if (parsed_session_ticket != NULL) { | |
| 1859 if (parsed_session_ticket->peer_cert.data) { | |
| 1860 SECITEM_FreeItem(&parsed_session_ticket->peer_cert, PR_FALSE); | |
| 1861 } | |
| 1862 PORT_ZFree(parsed_session_ticket, sizeof(SessionTicket)); | |
| 1863 } | |
| 1864 | |
| 1865 return rv; | |
| 1866 } | |
| 1867 | |
| 1868 /* | |
| 1869 * Read bytes. Using this function means the SECItem structure | |
| 1870 * cannot be freed. The caller is expected to call this function | |
| 1871 * on a shallow copy of the structure. | |
| 1872 */ | |
| 1873 static SECStatus | |
| 1874 ssl3_ConsumeFromItem(SECItem *item, unsigned char **buf, PRUint32 bytes) | |
| 1875 { | |
| 1876 if (bytes > item->len) | |
| 1877 return SECFailure; | |
| 1878 | |
| 1879 *buf = item->data; | |
| 1880 item->data += bytes; | |
| 1881 item->len -= bytes; | |
| 1882 return SECSuccess; | |
| 1883 } | |
| 1884 | |
| 1885 static SECStatus | |
| 1886 ssl3_ParseEncryptedSessionTicket(sslSocket *ss, SECItem *data, | |
| 1887 EncryptedSessionTicket *enc_session_ticket) | |
| 1888 { | |
| 1889 if (ssl3_ConsumeFromItem(data, &enc_session_ticket->key_name, | |
| 1890 SESS_TICKET_KEY_NAME_LEN) != SECSuccess) | |
| 1891 return SECFailure; | |
| 1892 if (ssl3_ConsumeFromItem(data, &enc_session_ticket->iv, | |
| 1893 AES_BLOCK_SIZE) != SECSuccess) | |
| 1894 return SECFailure; | |
| 1895 if (ssl3_ConsumeHandshakeVariable(ss, &enc_session_ticket->encrypted_state, | |
| 1896 2, &data->data, &data->len) != SECSuccess) | |
| 1897 return SECFailure; | |
| 1898 if (ssl3_ConsumeFromItem(data, &enc_session_ticket->mac, | |
| 1899 TLS_EX_SESS_TICKET_MAC_LENGTH) != SECSuccess) | |
| 1900 return SECFailure; | |
| 1901 if (data->len != 0) /* Make sure that we have consumed all bytes. */ | |
| 1902 return SECFailure; | |
| 1903 | |
| 1904 return SECSuccess; | |
| 1905 } | |
| 1906 | |
| 1907 /* go through hello extensions in buffer "b". | |
| 1908 * For each one, find the extension handler in the table, and | |
| 1909 * if present, invoke that handler. | |
| 1910 * Servers ignore any extensions with unknown extension types. | |
| 1911 * Clients reject any extensions with unadvertised extension types. | |
| 1912 */ | |
| 1913 SECStatus | |
| 1914 ssl3_HandleHelloExtensions(sslSocket *ss, SSL3Opaque **b, PRUint32 *length) | |
| 1915 { | |
| 1916 const ssl3HelloExtensionHandler * handlers; | |
| 1917 | |
| 1918 if (ss->sec.isServer) { | |
| 1919 handlers = clientHelloHandlers; | |
| 1920 } else if (ss->version > SSL_LIBRARY_VERSION_3_0) { | |
| 1921 handlers = serverHelloHandlersTLS; | |
| 1922 } else { | |
| 1923 handlers = serverHelloHandlersSSL3; | |
| 1924 } | |
| 1925 | |
| 1926 while (*length) { | |
| 1927 const ssl3HelloExtensionHandler * handler; | |
| 1928 SECStatus rv; | |
| 1929 PRInt32 extension_type; | |
| 1930 SECItem extension_data; | |
| 1931 | |
| 1932 /* Get the extension's type field */ | |
| 1933 extension_type = ssl3_ConsumeHandshakeNumber(ss, 2, b, length); | |
| 1934 if (extension_type < 0) /* failure to decode extension_type */ | |
| 1935 return SECFailure; /* alert already sent */ | |
| 1936 | |
| 1937 /* get the data for this extension, so we can pass it or skip it. */ | |
| 1938 rv = ssl3_ConsumeHandshakeVariable(ss, &extension_data, 2, b, length); | |
| 1939 if (rv != SECSuccess) | |
| 1940 return rv; | |
| 1941 | |
| 1942 /* Check whether the server sent an extension which was not advertised | |
| 1943 * in the ClientHello. | |
| 1944 */ | |
| 1945 if (!ss->sec.isServer && | |
| 1946 !ssl3_ClientExtensionAdvertised(ss, extension_type)) | |
| 1947 return SECFailure; /* TODO: send unsupported_extension alert */ | |
| 1948 | |
| 1949 /* Check whether an extension has been sent multiple times. */ | |
| 1950 if (ssl3_ExtensionNegotiated(ss, extension_type)) | |
| 1951 return SECFailure; | |
| 1952 | |
| 1953 /* find extension_type in table of Hello Extension Handlers */ | |
| 1954 for (handler = handlers; handler->ex_type >= 0; handler++) { | |
| 1955 /* if found, call this handler */ | |
| 1956 if (handler->ex_type == extension_type) { | |
| 1957 rv = (*handler->ex_handler)(ss, (PRUint16)extension_type, | |
| 1958 &extension_data); | |
| 1959 /* Ignore this result */ | |
| 1960 /* Treat all bad extensions as unrecognized types. */ | |
| 1961 break; | |
| 1962 } | |
| 1963 } | |
| 1964 } | |
| 1965 return SECSuccess; | |
| 1966 } | |
| 1967 | |
| 1968 /* Add a callback function to the table of senders of server hello extensions. | |
| 1969 */ | |
| 1970 SECStatus | |
| 1971 ssl3_RegisterServerHelloExtensionSender(sslSocket *ss, PRUint16 ex_type, | |
| 1972 ssl3HelloExtensionSenderFunc cb) | |
| 1973 { | |
| 1974 int i; | |
| 1975 ssl3HelloExtensionSender *sender = &ss->xtnData.serverSenders[0]; | |
| 1976 | |
| 1977 for (i = 0; i < SSL_MAX_EXTENSIONS; ++i, ++sender) { | |
| 1978 if (!sender->ex_sender) { | |
| 1979 sender->ex_type = ex_type; | |
| 1980 sender->ex_sender = cb; | |
| 1981 return SECSuccess; | |
| 1982 } | |
| 1983 /* detect duplicate senders */ | |
| 1984 PORT_Assert(sender->ex_type != ex_type); | |
| 1985 if (sender->ex_type == ex_type) { | |
| 1986 /* duplicate */ | |
| 1987 break; | |
| 1988 } | |
| 1989 } | |
| 1990 PORT_Assert(i < SSL_MAX_EXTENSIONS); /* table needs to grow */ | |
| 1991 PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); | |
| 1992 return SECFailure; | |
| 1993 } | |
| 1994 | |
| 1995 /* call each of the extension senders and return the accumulated length */ | |
| 1996 PRInt32 | |
| 1997 ssl3_CallHelloExtensionSenders(sslSocket *ss, PRBool append, PRUint32 maxBytes, | |
| 1998 const ssl3HelloExtensionSender *sender) | |
| 1999 { | |
| 2000 PRInt32 total_exten_len = 0; | |
| 2001 int i; | |
| 2002 | |
| 2003 if (!sender) { | |
| 2004 sender = ss->version > SSL_LIBRARY_VERSION_3_0 ? | |
| 2005 &clientHelloSendersTLS[0] : &clientHelloSendersSSL3[0]; | |
| 2006 } | |
| 2007 | |
| 2008 for (i = 0; i < SSL_MAX_EXTENSIONS; ++i, ++sender) { | |
| 2009 if (sender->ex_sender) { | |
| 2010 PRInt32 extLen = (*sender->ex_sender)(ss, append, maxBytes); | |
| 2011 if (extLen < 0) | |
| 2012 return -1; | |
| 2013 maxBytes -= extLen; | |
| 2014 total_exten_len += extLen; | |
| 2015 } | |
| 2016 } | |
| 2017 return total_exten_len; | |
| 2018 } | |
| 2019 | |
| 2020 | |
| 2021 /* Extension format: | |
| 2022 * Extension number: 2 bytes | |
| 2023 * Extension length: 2 bytes | |
| 2024 * Verify Data Length: 1 byte | |
| 2025 * Verify Data (TLS): 12 bytes (client) or 24 bytes (server) | |
| 2026 * Verify Data (SSL): 36 bytes (client) or 72 bytes (server) | |
| 2027 */ | |
| 2028 static PRInt32 | |
| 2029 ssl3_SendRenegotiationInfoXtn( | |
| 2030 sslSocket * ss, | |
| 2031 PRBool append, | |
| 2032 PRUint32 maxBytes) | |
| 2033 { | |
| 2034 PRInt32 len, needed; | |
| 2035 | |
| 2036 /* In draft-ietf-tls-renegotiation-03, it is NOT RECOMMENDED to send | |
| 2037 * both the SCSV and the empty RI, so when we send SCSV in | |
| 2038 * the initial handshake, we don't also send RI. | |
| 2039 */ | |
| 2040 if (!ss || ss->ssl3.hs.sendingSCSV) | |
| 2041 return 0; | |
| 2042 len = !ss->firstHsDone ? 0 : | |
| 2043 (ss->sec.isServer ? ss->ssl3.hs.finishedBytes * 2 | |
| 2044 : ss->ssl3.hs.finishedBytes); | |
| 2045 needed = 5 + len; | |
| 2046 if (append && maxBytes >= needed) { | |
| 2047 SECStatus rv; | |
| 2048 /* extension_type */ | |
| 2049 rv = ssl3_AppendHandshakeNumber(ss, ssl_renegotiation_info_xtn, 2); | |
| 2050 if (rv != SECSuccess) return -1; | |
| 2051 /* length of extension_data */ | |
| 2052 rv = ssl3_AppendHandshakeNumber(ss, len + 1, 2); | |
| 2053 if (rv != SECSuccess) return -1; | |
| 2054 /* verify_Data from previous Finished message(s) */ | |
| 2055 rv = ssl3_AppendHandshakeVariable(ss, | |
| 2056 ss->ssl3.hs.finishedMsgs.data, len, 1); | |
| 2057 if (rv != SECSuccess) return -1; | |
| 2058 if (!ss->sec.isServer) { | |
| 2059 TLSExtensionData *xtnData = &ss->xtnData; | |
| 2060 xtnData->advertised[xtnData->numAdvertised++] = | |
| 2061 ssl_renegotiation_info_xtn; | |
| 2062 } | |
| 2063 } | |
| 2064 return needed; | |
| 2065 } | |
| 2066 | |
| 2067 static SECStatus | |
| 2068 ssl3_ServerHandleStatusRequestXtn(sslSocket *ss, PRUint16 ex_type, | |
| 2069 SECItem *data) | |
| 2070 { | |
| 2071 SECStatus rv = SECSuccess; | |
| 2072 | |
| 2073 /* remember that we got this extension. */ | |
| 2074 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 2075 PORT_Assert(ss->sec.isServer); | |
| 2076 /* prepare to send back the appropriate response */ | |
| 2077 rv = ssl3_RegisterServerHelloExtensionSender(ss, ex_type, | |
| 2078 ssl3_ServerSendStatusRequestXtn); | |
| 2079 return rv; | |
| 2080 } | |
| 2081 | |
| 2082 /* This function runs in both the client and server. */ | |
| 2083 static SECStatus | |
| 2084 ssl3_HandleRenegotiationInfoXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) | |
| 2085 { | |
| 2086 SECStatus rv = SECSuccess; | |
| 2087 PRUint32 len = 0; | |
| 2088 | |
| 2089 if (ss->firstHsDone) { | |
| 2090 len = ss->sec.isServer ? ss->ssl3.hs.finishedBytes | |
| 2091 : ss->ssl3.hs.finishedBytes * 2; | |
| 2092 } | |
| 2093 if (data->len != 1 + len || | |
| 2094 data->data[0] != len || (len && | |
| 2095 NSS_SecureMemcmp(ss->ssl3.hs.finishedMsgs.data, | |
| 2096 data->data + 1, len))) { | |
| 2097 /* Can we do this here? Or, must we arrange for the caller to do it? */
| |
| 2098 (void)SSL3_SendAlert(ss, alert_fatal, handshake_failure);
| |
| 2099 PORT_SetError(SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE); | |
| 2100 return SECFailure; | |
| 2101 } | |
| 2102 /* remember that we got this extension and it was correct. */ | |
| 2103 ss->peerRequestedProtection = 1; | |
| 2104 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 2105 if (ss->sec.isServer) { | |
| 2106 /* prepare to send back the appropriate response */ | |
| 2107 rv = ssl3_RegisterServerHelloExtensionSender(ss, ex_type, | |
| 2108 ssl3_SendRenegotiationInfoXtn); | |
| 2109 } | |
| 2110 return rv; | |
| 2111 } | |
| 2112 | |
| 2113 static PRInt32 | |
| 2114 ssl3_SendUseSRTPXtn(sslSocket *ss, PRBool append, PRUint32 maxBytes) | |
| 2115 { | |
| 2116 PRUint32 ext_data_len; | |
| 2117 PRInt16 i; | |
| 2118 SECStatus rv; | |
| 2119 | |
| 2120 if (!ss) | |
| 2121 return 0; | |
| 2122 | |
| 2123 if (!ss->sec.isServer) { | |
| 2124 /* Client side */ | |
| 2125 | |
| 2126 if (!IS_DTLS(ss) || !ss->ssl3.dtlsSRTPCipherCount) | |
| 2127 return 0; /* Not relevant */ | |
| 2128 | |
| 2129 ext_data_len = 2 + 2 * ss->ssl3.dtlsSRTPCipherCount + 1; | |
| 2130 | |
| 2131 if (append && maxBytes >= 4 + ext_data_len) { | |
| 2132 /* Extension type */ | |
| 2133 rv = ssl3_AppendHandshakeNumber(ss, ssl_use_srtp_xtn, 2); | |
| 2134 if (rv != SECSuccess) return -1; | |
| 2135 /* Length of extension data */ | |
| 2136 rv = ssl3_AppendHandshakeNumber(ss, ext_data_len, 2); | |
| 2137 if (rv != SECSuccess) return -1; | |
| 2138 /* Length of the SRTP cipher list */ | |
| 2139 rv = ssl3_AppendHandshakeNumber(ss, | |
| 2140 2 * ss->ssl3.dtlsSRTPCipherCount, | |
| 2141 2); | |
| 2142 if (rv != SECSuccess) return -1; | |
| 2143 /* The SRTP ciphers */ | |
| 2144 for (i = 0; i < ss->ssl3.dtlsSRTPCipherCount; i++) { | |
| 2145 rv = ssl3_AppendHandshakeNumber(ss, | |
| 2146 ss->ssl3.dtlsSRTPCiphers[i], | |
| 2147 2); | |
| 2148 } | |
| 2149 /* Empty MKI value */ | |
| 2150 ssl3_AppendHandshakeVariable(ss, NULL, 0, 1); | |
| 2151 | |
| 2152 ss->xtnData.advertised[ss->xtnData.numAdvertised++] = | |
| 2153 ssl_use_srtp_xtn; | |
| 2154 } | |
| 2155 | |
| 2156 return 4 + ext_data_len; | |
| 2157 } | |
| 2158 | |
| 2159 /* Server side */ | |
| 2160 if (append && maxBytes >= 9) { | |
| 2161 /* Extension type */ | |
| 2162 rv = ssl3_AppendHandshakeNumber(ss, ssl_use_srtp_xtn, 2); | |
| 2163 if (rv != SECSuccess) return -1; | |
| 2164 /* Length of extension data */ | |
| 2165 rv = ssl3_AppendHandshakeNumber(ss, 5, 2); | |
| 2166 if (rv != SECSuccess) return -1; | |
| 2167 /* Length of the SRTP cipher list */ | |
| 2168 rv = ssl3_AppendHandshakeNumber(ss, 2, 2); | |
| 2169 if (rv != SECSuccess) return -1; | |
| 2170 /* The selected cipher */ | |
| 2171 rv = ssl3_AppendHandshakeNumber(ss, ss->ssl3.dtlsSRTPCipherSuite, 2); | |
| 2172 if (rv != SECSuccess) return -1; | |
| 2173 /* Empty MKI value */ | |
| 2174 ssl3_AppendHandshakeVariable(ss, NULL, 0, 1); | |
| 2175 } | |
| 2176 | |
| 2177 return 9; | |
| 2178 } | |
| 2179 | |
| 2180 static SECStatus | |
| 2181 ssl3_HandleUseSRTPXtn(sslSocket * ss, PRUint16 ex_type, SECItem *data) | |
| 2182 { | |
| 2183 SECStatus rv; | |
| 2184 SECItem ciphers = {siBuffer, NULL, 0}; | |
| 2185 PRUint16 i; | |
| 2186 unsigned int j; | |
| 2187 PRUint16 cipher = 0; | |
| 2188 PRBool found = PR_FALSE; | |
| 2189 SECItem litem; | |
| 2190 | |
| 2191 if (!ss->sec.isServer) { | |
| 2192 /* Client side */ | |
| 2193 if (!data->data || !data->len) { | |
| 2194 /* malformed */ | |
| 2195 return SECFailure; | |
| 2196 } | |
| 2197 | |
| 2198 /* Get the cipher list */ | |
| 2199 rv = ssl3_ConsumeHandshakeVariable(ss, &ciphers, 2, | |
| 2200 &data->data, &data->len); | |
| 2201 if (rv != SECSuccess) { | |
| 2202 return SECFailure; | |
| 2203 } | |
| 2204 /* Now check that the number of ciphers listed is 1 (len = 2) */ | |
| 2205 if (ciphers.len != 2) { | |
| 2206 return SECFailure; | |
| 2207 } | |
| 2208 | |
| 2209 /* Get the selected cipher */ | |
| 2210 cipher = (ciphers.data[0] << 8) | ciphers.data[1]; | |
| 2211 | |
| 2212 /* Now check that this is one of the ciphers we offered */ | |
| 2213 for (i = 0; i < ss->ssl3.dtlsSRTPCipherCount; i++) { | |
| 2214 if (cipher == ss->ssl3.dtlsSRTPCiphers[i]) { | |
| 2215 found = PR_TRUE; | |
| 2216 break; | |
| 2217 } | |
| 2218 } | |
| 2219 | |
| 2220 if (!found) { | |
| 2221 return SECFailure; | |
| 2222 } | |
| 2223 | |
| 2224 /* Get the srtp_mki value */ | |
| 2225 rv = ssl3_ConsumeHandshakeVariable(ss, &litem, 1, | |
| 2226 &data->data, &data->len); | |
| 2227 if (rv != SECSuccess) { | |
| 2228 return SECFailure; | |
| 2229 } | |
| 2230 | |
| 2231 /* We didn't offer an MKI, so this must be 0 length */ | |
| 2232 /* XXX RFC 5764 Section 4.1.3 says: | |
| 2233 * If the client detects a nonzero-length MKI in the server's | |
| 2234 * response that is different than the one the client offered, | |
| 2235 * then the client MUST abort the handshake and SHOULD send an | |
| 2236 * invalid_parameter alert. | |
| 2237 * | |
| 2238 * Due to a limitation of the ssl3_HandleHelloExtensions function, | |
| 2239 * returning SECFailure here won't abort the handshake. It will | |
| 2240 * merely cause the use_srtp extension to be not negotiated. We | |
| 2241 * should fix this. See NSS bug 753136. | |
| 2242 */ | |
| 2243 if (litem.len != 0) { | |
| 2244 return SECFailure; | |
| 2245 } | |
| 2246 | |
| 2247 if (data->len != 0) { | |
| 2248 /* malformed */ | |
| 2249 return SECFailure; | |
| 2250 } | |
| 2251 | |
| 2252 /* OK, this looks fine. */ | |
| 2253 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn; | |
| 2254 ss->ssl3.dtlsSRTPCipherSuite = cipher; | |
| 2255 return SECSuccess; | |
| 2256 } | |
| 2257 | |
| 2258 /* Server side */ | |
| 2259 if (!IS_DTLS(ss) || !ss->ssl3.dtlsSRTPCipherCount) { | |
| 2260 /* Ignore the extension if we aren't doing DTLS or no DTLS-SRTP | |
| 2261 * preferences have been set. */ | |
| 2262 return SECSuccess; | |
| 2263 } | |
| 2264 | |
| 2265 if (!data->data || data->len < 5) { | |
| 2266 /* malformed */ | |
| 2267 return SECFailure; | |
| 2268 } | |
| 2269 | |
| 2270 /* Get the cipher list */ | |
| 2271 rv = ssl3_ConsumeHandshakeVariable(ss, &ciphers, 2, | |
| 2272 &data->data, &data->len); | |
| 2273 if (rv != SECSuccess) { | |
| 2274 return SECFailure; | |
| 2275 } | |
| 2276 /* Check that the list is even length */ | |
| 2277 if (ciphers.len % 2) { | |
| 2278 return SECFailure; | |
| 2279 } | |
| 2280 | |
| 2281 /* Walk through the offered list and pick the most preferred of our | |
| 2282 * ciphers, if any */ | |
| 2283 for (i = 0; !found && i < ss->ssl3.dtlsSRTPCipherCount; i++) { | |
| 2284 for (j = 0; j + 1 < ciphers.len; j += 2) { | |
| 2285 cipher = (ciphers.data[j] << 8) | ciphers.data[j + 1]; | |
| 2286 if (cipher == ss->ssl3.dtlsSRTPCiphers[i]) { | |
| 2287 found = PR_TRUE; | |
| 2288 break; | |
| 2289 } | |
| 2290 } | |
| 2291 } | |
| 2292 | |
| 2293 /* Get the srtp_mki value */ | |
| 2294 rv = ssl3_ConsumeHandshakeVariable(ss, &litem, 1, &data->data, &data->len); | |
| 2295 if (rv != SECSuccess) { | |
| 2296 return SECFailure; | |
| 2297 } | |
| 2298 | |
| 2299 if (data->len != 0) { | |
| 2300 return SECFailure; /* Malformed */ | |
| 2301 } | |
| 2302 | |
| 2303 /* Now figure out what to do */ | |
| 2304 if (!found) { | |
| 2305 /* No matching ciphers */ | |
| 2306 return SECSuccess; | |
| 2307 } | |
| 2308 | |
| 2309 /* OK, we have a valid cipher and we've selected it */ | |
| 2310 ss->ssl3.dtlsSRTPCipherSuite = cipher; | |
| 2311 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn; | |
| 2312 | |
| 2313 return ssl3_RegisterServerHelloExtensionSender(ss, ssl_use_srtp_xtn, | |
| 2314 ssl3_SendUseSRTPXtn); | |
| 2315 } | |
| 2316 | |
| 2317 /* ssl3_ServerHandleSigAlgsXtn handles the signature_algorithms extension | |
| 2318 * from a client. | |
| 2319 * See https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1 */ | |
| 2320 static SECStatus | |
| 2321 ssl3_ServerHandleSigAlgsXtn(sslSocket * ss, PRUint16 ex_type, SECItem *data) | |
| 2322 { | |
| 2323 SECStatus rv; | |
| 2324 SECItem algorithms; | |
| 2325 const unsigned char *b; | |
| 2326 unsigned int numAlgorithms, i; | |
| 2327 | |
| 2328 /* Ignore this extension if we aren't doing TLS 1.2 or greater. */ | |
| 2329 if (ss->version < SSL_LIBRARY_VERSION_TLS_1_2) { | |
| 2330 return SECSuccess; | |
| 2331 } | |
| 2332 | |
| 2333 /* Keep track of negotiated extensions. */ | |
| 2334 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 2335 | |
| 2336 rv = ssl3_ConsumeHandshakeVariable(ss, &algorithms, 2, &data->data, | |
| 2337 &data->len); | |
| 2338 if (rv != SECSuccess) { | |
| 2339 return SECFailure; | |
| 2340 } | |
| 2341 /* Trailing data, empty value, or odd-length value is invalid. */ | |
| 2342 if (data->len != 0 || algorithms.len == 0 || (algorithms.len & 1) != 0) { | |
| 2343 PORT_SetError(SSL_ERROR_RX_MALFORMED_CLIENT_HELLO); | |
| 2344 return SECFailure; | |
| 2345 } | |
| 2346 | |
| 2347 numAlgorithms = algorithms.len/2; | |
| 2348 | |
| 2349 /* We don't care to process excessive numbers of algorithms. */ | |
| 2350 if (numAlgorithms > 512) { | |
| 2351 numAlgorithms = 512; | |
| 2352 } | |
| 2353 | |
| 2354 ss->ssl3.hs.clientSigAndHash = | |
| 2355 PORT_NewArray(SSL3SignatureAndHashAlgorithm, numAlgorithms); | |
| 2356 if (!ss->ssl3.hs.clientSigAndHash) { | |
| 2357 return SECFailure; | |
| 2358 } | |
| 2359 ss->ssl3.hs.numClientSigAndHash = 0; | |
| 2360 | |
| 2361 b = algorithms.data; | |
| 2362 for (i = 0; i < numAlgorithms; i++) { | |
| 2363 unsigned char tls_hash = *(b++); | |
| 2364 unsigned char tls_sig = *(b++); | |
| 2365 SECOidTag hash = ssl3_TLSHashAlgorithmToOID(tls_hash); | |
| 2366 | |
| 2367 if (hash == SEC_OID_UNKNOWN) { | |
| 2368 /* We ignore formats that we don't understand. */ | |
| 2369 continue; | |
| 2370 } | |
| 2371 /* tls_sig support will be checked later in | |
| 2372 * ssl3_PickSignatureHashAlgorithm. */ | |
| 2373 ss->ssl3.hs.clientSigAndHash[i].hashAlg = hash; | |
| 2374 ss->ssl3.hs.clientSigAndHash[i].sigAlg = tls_sig; | |
| 2375 ss->ssl3.hs.numClientSigAndHash++; | |
| 2376 } | |
| 2377 | |
| 2378 if (!ss->ssl3.hs.numClientSigAndHash) { | |
| 2379 /* We didn't understand any of the client's requested signature | |
| 2380 * formats. We'll use the defaults. */ | |
| 2381 PORT_Free(ss->ssl3.hs.clientSigAndHash); | |
| 2382 ss->ssl3.hs.clientSigAndHash = NULL; | |
| 2383 } | |
| 2384 | |
| 2385 return SECSuccess; | |
| 2386 } | |
| 2387 | |
| 2388 /* ssl3_ClientSendSigAlgsXtn sends the signature_algorithm extension for TLS | |
| 2389 * 1.2 ClientHellos. */ | |
| 2390 static PRInt32 | |
| 2391 ssl3_ClientSendSigAlgsXtn(sslSocket * ss, PRBool append, PRUint32 maxBytes) | |
| 2392 { | |
| 2393 static const unsigned char signatureAlgorithms[] = { | |
| 2394 /* This block is the contents of our signature_algorithms extension, in | |
| 2395 * wire format. See | |
| 2396 * https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1 */ | |
| 2397 tls_hash_sha256, tls_sig_rsa, | |
| 2398 tls_hash_sha384, tls_sig_rsa, | |
| 2399 tls_hash_sha1, tls_sig_rsa, | |
| 2400 #ifdef NSS_ENABLE_ECC | |
| 2401 tls_hash_sha256, tls_sig_ecdsa, | |
| 2402 tls_hash_sha384, tls_sig_ecdsa, | |
| 2403 tls_hash_sha1, tls_sig_ecdsa, | |
| 2404 #endif | |
| 2405 tls_hash_sha256, tls_sig_dsa, | |
| 2406 tls_hash_sha1, tls_sig_dsa, | |
| 2407 }; | |
| 2408 PRInt32 extension_length; | |
| 2409 | |
| 2410 if (ss->version < SSL_LIBRARY_VERSION_TLS_1_2) { | |
| 2411 return 0; | |
| 2412 } | |
| 2413 | |
| 2414 extension_length = | |
| 2415 2 /* extension type */ + | |
| 2416 2 /* extension length */ + | |
| 2417 2 /* supported_signature_algorithms length */ + | |
| 2418 sizeof(signatureAlgorithms); | |
| 2419 | |
| 2420 if (append && maxBytes >= extension_length) { | |
| 2421 SECStatus rv; | |
| 2422 rv = ssl3_AppendHandshakeNumber(ss, ssl_signature_algorithms_xtn, 2); | |
| 2423 if (rv != SECSuccess) | |
| 2424 goto loser; | |
| 2425 rv = ssl3_AppendHandshakeNumber(ss, extension_length - 4, 2); | |
| 2426 if (rv != SECSuccess) | |
| 2427 goto loser; | |
| 2428 rv = ssl3_AppendHandshakeVariable(ss, signatureAlgorithms, | |
| 2429 sizeof(signatureAlgorithms), 2); | |
| 2430 if (rv != SECSuccess) | |
| 2431 goto loser; | |
| 2432 ss->xtnData.advertised[ss->xtnData.numAdvertised++] = | |
| 2433 ssl_signature_algorithms_xtn; | |
| 2434 } else if (maxBytes < extension_length) { | |
| 2435 PORT_Assert(0); | |
| 2436 return 0; | |
| 2437 } | |
| 2438 | |
| 2439 return extension_length; | |
| 2440 | |
| 2441 loser: | |
| 2442 return -1; | |
| 2443 } | |
| 2444 | |
| 2445 unsigned int | |
| 2446 ssl3_CalculatePaddingExtensionLength(unsigned int clientHelloLength) | |
| 2447 { | |
| 2448 unsigned int recordLength = 1 /* handshake message type */ + | |
| 2449 3 /* handshake message length */ + | |
| 2450 clientHelloLength; | |
| 2451 unsigned int extensionLength; | |
| 2452 | |
| 2453 if (recordLength < 256 || recordLength >= 512) { | |
| 2454 return 0; | |
| 2455 } | |
| 2456 | |
| 2457 extensionLength = 512 - recordLength; | |
| 2458 /* Extensions take at least four bytes to encode. Always include at least | |
| 2459 * one byte of data if including the extension. WebSphere Application Server | |
| 2460 * 7.0 is intolerant to the last extension being zero-length. */ | |
| 2461 if (extensionLength < 4 + 1) { | |
| 2462 extensionLength = 4 + 1; | |
| 2463 } | |
| 2464 | |
| 2465 return extensionLength; | |
| 2466 } | |
| 2467 | |
| 2468 /* ssl3_AppendPaddingExtension possibly adds an extension which ensures that a | |
| 2469 * ClientHello record is either < 256 bytes or is >= 512 bytes. This ensures | |
| 2470 * that we don't trigger bugs in F5 products. */ | |
| 2471 PRInt32 | |
| 2472 ssl3_AppendPaddingExtension(sslSocket *ss, unsigned int extensionLen, | |
| 2473 PRUint32 maxBytes) | |
| 2474 { | |
| 2475 unsigned int paddingLen = extensionLen - 4; | |
| 2476 static unsigned char padding[256]; | |
| 2477 | |
| 2478 if (extensionLen == 0) { | |
| 2479 return 0; | |
| 2480 } | |
| 2481 | |
| 2482 if (extensionLen < 4 || | |
| 2483 extensionLen > maxBytes || | |
| 2484 paddingLen > sizeof(padding)) { | |
| 2485 PORT_Assert(0); | |
| 2486 return -1; | |
| 2487 } | |
| 2488 | |
| 2489 if (SECSuccess != ssl3_AppendHandshakeNumber(ss, ssl_padding_xtn, 2)) | |
| 2490 return -1; | |
| 2491 if (SECSuccess != ssl3_AppendHandshakeNumber(ss, paddingLen, 2)) | |
| 2492 return -1; | |
| 2493 if (SECSuccess != ssl3_AppendHandshake(ss, padding, paddingLen)) | |
| 2494 return -1; | |
| 2495 | |
| 2496 return extensionLen; | |
| 2497 } | |
| 2498 | |
| 2499 /* ssl3_ClientSendSignedCertTimestampXtn sends the signed_certificate_timestamp | |
| 2500 * extension for TLS ClientHellos. */ | |
| 2501 static PRInt32 | |
| 2502 ssl3_ClientSendSignedCertTimestampXtn(sslSocket *ss, PRBool append, | |
| 2503 PRUint32 maxBytes) | |
| 2504 { | |
| 2505 PRInt32 extension_length = 2 /* extension_type */ + | |
| 2506 2 /* length(extension_data) */; | |
| 2507 | |
| 2508 /* Only send the extension if processing is enabled. */ | |
| 2509 if (!ss->opt.enableSignedCertTimestamps) | |
| 2510 return 0; | |
| 2511 | |
| 2512 if (append && maxBytes >= extension_length) { | |
| 2513 SECStatus rv; | |
| 2514 /* extension_type */ | |
| 2515 rv = ssl3_AppendHandshakeNumber(ss, | |
| 2516 ssl_signed_certificate_timestamp_xtn, | |
| 2517 2); | |
| 2518 if (rv != SECSuccess) | |
| 2519 goto loser; | |
| 2520 /* zero length */ | |
| 2521 rv = ssl3_AppendHandshakeNumber(ss, 0, 2); | |
| 2522 if (rv != SECSuccess) | |
| 2523 goto loser; | |
| 2524 ss->xtnData.advertised[ss->xtnData.numAdvertised++] = | |
| 2525 ssl_signed_certificate_timestamp_xtn; | |
| 2526 } else if (maxBytes < extension_length) { | |
| 2527 PORT_Assert(0); | |
| 2528 return 0; | |
| 2529 } | |
| 2530 | |
| 2531 return extension_length; | |
| 2532 loser: | |
| 2533 return -1; | |
| 2534 } | |
| 2535 | |
| 2536 static SECStatus | |
| 2537 ssl3_ClientHandleSignedCertTimestampXtn(sslSocket *ss, PRUint16 ex_type, | |
| 2538 SECItem *data) | |
| 2539 { | |
| 2540 /* We do not yet know whether we'll be resuming a session or creating | |
| 2541 * a new one, so we keep a pointer to the data in the TLSExtensionData | |
| 2542 * structure. This pointer is only valid in the scope of | |
| 2543 * ssl3_HandleServerHello, and, if not resuming a session, the data is | |
| 2544 * copied once a new session structure has been set up. | |
| 2545 * All parsing is currently left to the application and we accept | |
| 2546 * everything, including empty data. | |
| 2547 */ | |
| 2548 SECItem *scts = &ss->xtnData.signedCertTimestamps; | |
| 2549 PORT_Assert(!scts->data && !scts->len); | |
| 2550 | |
| 2551 if (!data->len) { | |
| 2552 /* Empty extension data: RFC 6962 mandates non-empty contents. */ | |
| 2553 return SECFailure; | |
| 2554 } | |
| 2555 *scts = *data; | |
| 2556 /* Keep track of negotiated extensions. */ | |
| 2557 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type; | |
| 2558 return SECSuccess; | |
| 2559 } | |
| OLD | NEW |