mirror of
https://github.com/RGBCube/serenity
synced 2025-07-26 08:47:34 +00:00
LibTLS: Rework method names and arrangement in cpp files
This commit only moves and renames methods. The code hasn't changed.
This commit is contained in:
parent
6d190b299e
commit
851e254e8f
9 changed files with 886 additions and 862 deletions
|
@ -2,9 +2,10 @@ add_compile_options(-Wvla)
|
||||||
|
|
||||||
set(SOURCES
|
set(SOURCES
|
||||||
Certificate.cpp
|
Certificate.cpp
|
||||||
ClientHandshake.cpp
|
|
||||||
Exchange.cpp
|
|
||||||
Handshake.cpp
|
Handshake.cpp
|
||||||
|
HandshakeCertificate.cpp
|
||||||
|
HandshakeClient.cpp
|
||||||
|
HandshakeServer.cpp
|
||||||
Record.cpp
|
Record.cpp
|
||||||
Socket.cpp
|
Socket.cpp
|
||||||
TLSv12.cpp
|
TLSv12.cpp
|
||||||
|
|
|
@ -1,620 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright (c) 2020, Ali Mohammad Pur <mpfard@serenityos.org>
|
|
||||||
*
|
|
||||||
* SPDX-License-Identifier: BSD-2-Clause
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <AK/Debug.h>
|
|
||||||
#include <AK/Endian.h>
|
|
||||||
#include <AK/Random.h>
|
|
||||||
|
|
||||||
#include <LibCore/Timer.h>
|
|
||||||
#include <LibCrypto/ASN1/DER.h>
|
|
||||||
#include <LibCrypto/PK/Code/EMSA_PSS.h>
|
|
||||||
#include <LibTLS/TLSv12.h>
|
|
||||||
|
|
||||||
namespace TLS {
|
|
||||||
|
|
||||||
ssize_t TLSv12::handle_server_hello_done(ReadonlyBytes buffer)
|
|
||||||
{
|
|
||||||
if (buffer.size() < 3)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
|
|
||||||
size_t size = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
|
||||||
|
|
||||||
if (buffer.size() - 3 < size)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
|
|
||||||
return size + 3;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssize_t TLSv12::handle_hello(ReadonlyBytes buffer, WritePacketStage& write_packets)
|
|
||||||
{
|
|
||||||
write_packets = WritePacketStage::Initial;
|
|
||||||
if (m_context.connection_status != ConnectionStatus::Disconnected && m_context.connection_status != ConnectionStatus::Renegotiating) {
|
|
||||||
dbgln("unexpected hello message");
|
|
||||||
return (i8)Error::UnexpectedMessage;
|
|
||||||
}
|
|
||||||
ssize_t res = 0;
|
|
||||||
size_t min_hello_size = 41;
|
|
||||||
|
|
||||||
if (min_hello_size > buffer.size()) {
|
|
||||||
dbgln("need more data");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
size_t following_bytes = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
|
||||||
res += 3;
|
|
||||||
if (buffer.size() - res < following_bytes) {
|
|
||||||
dbgln("not enough data after header: {} < {}", buffer.size() - res, following_bytes);
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (buffer.size() - res < 2) {
|
|
||||||
dbgln("not enough data for version");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
auto version = static_cast<Version>(AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res))));
|
|
||||||
|
|
||||||
res += 2;
|
|
||||||
if (!supports_version(version))
|
|
||||||
return (i8)Error::NotSafe;
|
|
||||||
|
|
||||||
memcpy(m_context.remote_random, buffer.offset_pointer(res), sizeof(m_context.remote_random));
|
|
||||||
res += sizeof(m_context.remote_random);
|
|
||||||
|
|
||||||
u8 session_length = buffer[res++];
|
|
||||||
if (buffer.size() - res < session_length) {
|
|
||||||
dbgln("not enough data for session id");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (session_length && session_length <= 32) {
|
|
||||||
memcpy(m_context.session_id, buffer.offset_pointer(res), session_length);
|
|
||||||
m_context.session_id_size = session_length;
|
|
||||||
if constexpr (TLS_DEBUG) {
|
|
||||||
dbgln("Remote session ID:");
|
|
||||||
print_buffer(ReadonlyBytes { m_context.session_id, session_length });
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
m_context.session_id_size = 0;
|
|
||||||
}
|
|
||||||
res += session_length;
|
|
||||||
|
|
||||||
if (buffer.size() - res < 2) {
|
|
||||||
dbgln("not enough data for cipher suite listing");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
auto cipher = static_cast<CipherSuite>(AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res))));
|
|
||||||
res += 2;
|
|
||||||
if (!supports_cipher(cipher)) {
|
|
||||||
m_context.cipher = CipherSuite::Invalid;
|
|
||||||
dbgln("No supported cipher could be agreed upon");
|
|
||||||
return (i8)Error::NoCommonCipher;
|
|
||||||
}
|
|
||||||
m_context.cipher = cipher;
|
|
||||||
dbgln_if(TLS_DEBUG, "Cipher: {}", (u16)cipher);
|
|
||||||
|
|
||||||
// The handshake hash function is _always_ SHA256
|
|
||||||
m_context.handshake_hash.initialize(Crypto::Hash::HashKind::SHA256);
|
|
||||||
|
|
||||||
// Compression method
|
|
||||||
if (buffer.size() - res < 1)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
u8 compression = buffer[res++];
|
|
||||||
if (compression != 0)
|
|
||||||
return (i8)Error::CompressionNotSupported;
|
|
||||||
|
|
||||||
if (m_context.connection_status != ConnectionStatus::Renegotiating)
|
|
||||||
m_context.connection_status = ConnectionStatus::Negotiating;
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("unsupported: server mode");
|
|
||||||
write_packets = WritePacketStage::ServerHandshake;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Presence of extensions is determined by availability of bytes after compression_method
|
|
||||||
if (buffer.size() - res >= 2) {
|
|
||||||
auto extensions_bytes_total = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res += 2)));
|
|
||||||
dbgln_if(TLS_DEBUG, "Extensions bytes total: {}", extensions_bytes_total);
|
|
||||||
}
|
|
||||||
|
|
||||||
while (buffer.size() - res >= 4) {
|
|
||||||
auto extension_type = (HandshakeExtension)AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res)));
|
|
||||||
res += 2;
|
|
||||||
u16 extension_length = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res)));
|
|
||||||
res += 2;
|
|
||||||
|
|
||||||
dbgln_if(TLS_DEBUG, "Extension {} with length {}", (u16)extension_type, extension_length);
|
|
||||||
|
|
||||||
if (buffer.size() - res < extension_length)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
|
|
||||||
if (extension_type == HandshakeExtension::ServerName) {
|
|
||||||
// RFC6066 section 3: SNI extension_data can be empty in the server hello
|
|
||||||
if (extension_length > 0) {
|
|
||||||
// ServerNameList total size
|
|
||||||
if (buffer.size() - res < 2)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
auto sni_name_list_bytes = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res += 2)));
|
|
||||||
dbgln_if(TLS_DEBUG, "SNI: expecting ServerNameList of {} bytes", sni_name_list_bytes);
|
|
||||||
|
|
||||||
// Exactly one ServerName should be present
|
|
||||||
if (buffer.size() - res < 3)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
auto sni_name_type = (NameType)(*(const u8*)buffer.offset_pointer(res++));
|
|
||||||
auto sni_name_length = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res += 2)));
|
|
||||||
|
|
||||||
if (sni_name_type != NameType::HostName)
|
|
||||||
return (i8)Error::NotUnderstood;
|
|
||||||
|
|
||||||
if (sizeof(sni_name_type) + sizeof(sni_name_length) + sni_name_length != sni_name_list_bytes)
|
|
||||||
return (i8)Error::BrokenPacket;
|
|
||||||
|
|
||||||
// Read out the host_name
|
|
||||||
if (buffer.size() - res < sni_name_length)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
m_context.extensions.SNI = String { (const char*)buffer.offset_pointer(res), sni_name_length };
|
|
||||||
res += sni_name_length;
|
|
||||||
dbgln("SNI host_name: {}", m_context.extensions.SNI);
|
|
||||||
}
|
|
||||||
} else if (extension_type == HandshakeExtension::ApplicationLayerProtocolNegotiation && m_context.alpn.size()) {
|
|
||||||
if (buffer.size() - res > 2) {
|
|
||||||
auto alpn_length = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res)));
|
|
||||||
if (alpn_length && alpn_length <= extension_length - 2) {
|
|
||||||
const u8* alpn = buffer.offset_pointer(res + 2);
|
|
||||||
size_t alpn_position = 0;
|
|
||||||
while (alpn_position < alpn_length) {
|
|
||||||
u8 alpn_size = alpn[alpn_position++];
|
|
||||||
if (alpn_size + alpn_position >= extension_length)
|
|
||||||
break;
|
|
||||||
String alpn_str { (const char*)alpn + alpn_position, alpn_length };
|
|
||||||
if (alpn_size && m_context.alpn.contains_slow(alpn_str)) {
|
|
||||||
m_context.negotiated_alpn = alpn_str;
|
|
||||||
dbgln("negotiated alpn: {}", alpn_str);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
alpn_position += alpn_length;
|
|
||||||
if (!m_context.is_server) // server hello must contain one ALPN
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
res += extension_length;
|
|
||||||
} else if (extension_type == HandshakeExtension::SignatureAlgorithms) {
|
|
||||||
dbgln("supported signatures: ");
|
|
||||||
print_buffer(buffer.slice(res, extension_length));
|
|
||||||
res += extension_length;
|
|
||||||
// FIXME: what are we supposed to do here?
|
|
||||||
} else {
|
|
||||||
dbgln("Encountered unknown extension {} with length {}", (u16)extension_type, extension_length);
|
|
||||||
res += extension_length;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return res;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssize_t TLSv12::handle_finished(ReadonlyBytes buffer, WritePacketStage& write_packets)
|
|
||||||
{
|
|
||||||
if (m_context.connection_status < ConnectionStatus::KeyExchange || m_context.connection_status == ConnectionStatus::Established) {
|
|
||||||
dbgln("unexpected finished message");
|
|
||||||
return (i8)Error::UnexpectedMessage;
|
|
||||||
}
|
|
||||||
|
|
||||||
write_packets = WritePacketStage::Initial;
|
|
||||||
|
|
||||||
if (buffer.size() < 3) {
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
|
|
||||||
size_t index = 3;
|
|
||||||
|
|
||||||
u32 size = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
|
||||||
|
|
||||||
if (size < 12) {
|
|
||||||
dbgln_if(TLS_DEBUG, "finished packet smaller than minimum size: {}", size);
|
|
||||||
return (i8)Error::BrokenPacket;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (size < buffer.size() - index) {
|
|
||||||
dbgln_if(TLS_DEBUG, "not enough data after length: {} > {}", size, buffer.size() - index);
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO: Compare Hashes
|
|
||||||
dbgln_if(TLS_DEBUG, "FIXME: handle_finished :: Check message validity");
|
|
||||||
m_context.connection_status = ConnectionStatus::Established;
|
|
||||||
|
|
||||||
if (m_handshake_timeout_timer) {
|
|
||||||
// Disable the handshake timeout timer as handshake has been established.
|
|
||||||
m_handshake_timeout_timer->stop();
|
|
||||||
m_handshake_timeout_timer->remove_from_parent();
|
|
||||||
m_handshake_timeout_timer = nullptr;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (on_tls_ready_to_write)
|
|
||||||
on_tls_ready_to_write(*this);
|
|
||||||
|
|
||||||
return index + size;
|
|
||||||
}
|
|
||||||
|
|
||||||
void TLSv12::build_random(PacketBuilder& builder)
|
|
||||||
{
|
|
||||||
u8 random_bytes[48];
|
|
||||||
size_t bytes = 48;
|
|
||||||
|
|
||||||
fill_with_random(random_bytes, bytes);
|
|
||||||
|
|
||||||
// remove zeros from the random bytes
|
|
||||||
for (size_t i = 0; i < bytes; ++i) {
|
|
||||||
if (!random_bytes[i])
|
|
||||||
random_bytes[i--] = get_random<u8>();
|
|
||||||
}
|
|
||||||
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("Server mode not supported");
|
|
||||||
return;
|
|
||||||
} else {
|
|
||||||
*(u16*)random_bytes = AK::convert_between_host_and_network_endian((u16)Version::V12);
|
|
||||||
}
|
|
||||||
|
|
||||||
m_context.premaster_key = ByteBuffer::copy(random_bytes, bytes);
|
|
||||||
|
|
||||||
const auto& certificate_option = verify_chain_and_get_matching_certificate(m_context.extensions.SNI); // if the SNI is empty, we'll make a special case and match *a* leaf certificate.
|
|
||||||
if (!certificate_option.has_value()) {
|
|
||||||
dbgln("certificate verification failed :(");
|
|
||||||
alert(AlertLevel::Critical, AlertDescription::BadCertificate);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
auto& certificate = m_context.certificates[certificate_option.value()];
|
|
||||||
if constexpr (TLS_DEBUG) {
|
|
||||||
dbgln("PreMaster secret");
|
|
||||||
print_buffer(m_context.premaster_key);
|
|
||||||
}
|
|
||||||
|
|
||||||
Crypto::PK::RSA_PKCS1_EME rsa(certificate.public_key.modulus(), 0, certificate.public_key.public_exponent());
|
|
||||||
|
|
||||||
Vector<u8, 32> out;
|
|
||||||
out.resize(rsa.output_size());
|
|
||||||
auto outbuf = out.span();
|
|
||||||
rsa.encrypt(m_context.premaster_key, outbuf);
|
|
||||||
|
|
||||||
if constexpr (TLS_DEBUG) {
|
|
||||||
dbgln("Encrypted: ");
|
|
||||||
print_buffer(outbuf);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!compute_master_secret(bytes)) {
|
|
||||||
dbgln("oh noes we could not derive a master key :(");
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
builder.append_u24(outbuf.size() + 2);
|
|
||||||
builder.append((u16)outbuf.size());
|
|
||||||
builder.append(outbuf);
|
|
||||||
}
|
|
||||||
|
|
||||||
ssize_t TLSv12::handle_payload(ReadonlyBytes vbuffer)
|
|
||||||
{
|
|
||||||
if (m_context.connection_status == ConnectionStatus::Established) {
|
|
||||||
dbgln_if(TLS_DEBUG, "Renegotiation attempt ignored");
|
|
||||||
// FIXME: We should properly say "NoRenegotiation", but that causes a handshake failure
|
|
||||||
// so we just roll with it and pretend that we _did_ renegotiate
|
|
||||||
// This will cause issues when we decide to have long-lasting connections, but
|
|
||||||
// we do not have those at the moment :^)
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
auto buffer = vbuffer;
|
|
||||||
auto buffer_length = buffer.size();
|
|
||||||
auto original_length = buffer_length;
|
|
||||||
while (buffer_length >= 4 && !m_context.critical_error) {
|
|
||||||
ssize_t payload_res = 0;
|
|
||||||
if (buffer_length < 1)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
auto type = buffer[0];
|
|
||||||
auto write_packets { WritePacketStage::Initial };
|
|
||||||
size_t payload_size = buffer[1] * 0x10000 + buffer[2] * 0x100 + buffer[3] + 3;
|
|
||||||
dbgln_if(TLS_DEBUG, "payload size: {} buffer length: {}", payload_size, buffer_length);
|
|
||||||
if (payload_size + 1 > buffer_length)
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
|
|
||||||
switch (type) {
|
|
||||||
case HelloRequest:
|
|
||||||
if (m_context.handshake_messages[0] >= 1) {
|
|
||||||
dbgln("unexpected hello request message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[0];
|
|
||||||
dbgln("hello request (renegotiation?)");
|
|
||||||
if (m_context.connection_status == ConnectionStatus::Established) {
|
|
||||||
// renegotiation
|
|
||||||
payload_res = (i8)Error::NoRenegotiation;
|
|
||||||
} else {
|
|
||||||
// :shrug:
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case ClientHello:
|
|
||||||
// FIXME: We only support client mode right now
|
|
||||||
if (m_context.is_server) {
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
}
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
case ServerHello:
|
|
||||||
if (m_context.handshake_messages[2] >= 1) {
|
|
||||||
dbgln("unexpected server hello message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[2];
|
|
||||||
dbgln_if(TLS_DEBUG, "server hello");
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("unsupported: server mode");
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
}
|
|
||||||
payload_res = handle_hello(buffer.slice(1, payload_size), write_packets);
|
|
||||||
break;
|
|
||||||
case HelloVerifyRequest:
|
|
||||||
dbgln("unsupported: DTLS");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
case CertificateMessage:
|
|
||||||
if (m_context.handshake_messages[4] >= 1) {
|
|
||||||
dbgln("unexpected certificate message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[4];
|
|
||||||
dbgln_if(TLS_DEBUG, "certificate");
|
|
||||||
if (m_context.connection_status == ConnectionStatus::Negotiating) {
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("unsupported: server mode");
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
}
|
|
||||||
payload_res = handle_certificate(buffer.slice(1, payload_size));
|
|
||||||
if (m_context.certificates.size()) {
|
|
||||||
auto it = m_context.certificates.find_if([](const auto& cert) { return cert.is_valid(); });
|
|
||||||
|
|
||||||
if (it.is_end()) {
|
|
||||||
// no valid certificates
|
|
||||||
dbgln("No valid certificates found");
|
|
||||||
payload_res = (i8)Error::BadCertificate;
|
|
||||||
m_context.critical_error = payload_res;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
// swap the first certificate with the valid one
|
|
||||||
if (it.index() != 0)
|
|
||||||
swap(m_context.certificates[0], m_context.certificates[it.index()]);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case ServerKeyExchange:
|
|
||||||
if (m_context.handshake_messages[5] >= 1) {
|
|
||||||
dbgln("unexpected server key exchange message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[5];
|
|
||||||
dbgln_if(TLS_DEBUG, "server key exchange");
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("unsupported: server mode");
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
} else {
|
|
||||||
payload_res = handle_server_key_exchange(buffer.slice(1, payload_size));
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case CertificateRequest:
|
|
||||||
if (m_context.handshake_messages[6] >= 1) {
|
|
||||||
dbgln("unexpected certificate request message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[6];
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("invalid request");
|
|
||||||
dbgln("unsupported: server mode");
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
} else {
|
|
||||||
// we do not support "certificate request"
|
|
||||||
dbgln("certificate request");
|
|
||||||
if (on_tls_certificate_request)
|
|
||||||
on_tls_certificate_request(*this);
|
|
||||||
m_context.client_verified = VerificationNeeded;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case ServerHelloDone:
|
|
||||||
if (m_context.handshake_messages[7] >= 1) {
|
|
||||||
dbgln("unexpected server hello done message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[7];
|
|
||||||
dbgln_if(TLS_DEBUG, "server hello done");
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("unsupported: server mode");
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
} else {
|
|
||||||
payload_res = handle_server_hello_done(buffer.slice(1, payload_size));
|
|
||||||
if (payload_res > 0)
|
|
||||||
write_packets = WritePacketStage::ClientHandshake;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case CertificateVerify:
|
|
||||||
if (m_context.handshake_messages[8] >= 1) {
|
|
||||||
dbgln("unexpected certificate verify message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[8];
|
|
||||||
dbgln_if(TLS_DEBUG, "certificate verify");
|
|
||||||
if (m_context.connection_status == ConnectionStatus::KeyExchange) {
|
|
||||||
payload_res = handle_verify(buffer.slice(1, payload_size));
|
|
||||||
} else {
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case ClientKeyExchange:
|
|
||||||
if (m_context.handshake_messages[9] >= 1) {
|
|
||||||
dbgln("unexpected client key exchange message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[9];
|
|
||||||
dbgln_if(TLS_DEBUG, "client key exchange");
|
|
||||||
if (m_context.is_server) {
|
|
||||||
dbgln("unsupported: server mode");
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
} else {
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case Finished:
|
|
||||||
m_context.cached_handshake.clear();
|
|
||||||
if (m_context.handshake_messages[10] >= 1) {
|
|
||||||
dbgln("unexpected finished message");
|
|
||||||
payload_res = (i8)Error::UnexpectedMessage;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++m_context.handshake_messages[10];
|
|
||||||
dbgln_if(TLS_DEBUG, "finished");
|
|
||||||
payload_res = handle_finished(buffer.slice(1, payload_size), write_packets);
|
|
||||||
if (payload_res > 0) {
|
|
||||||
memset(m_context.handshake_messages, 0, sizeof(m_context.handshake_messages));
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
dbgln("message type not understood: {}", type);
|
|
||||||
return (i8)Error::NotUnderstood;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (type != HelloRequest) {
|
|
||||||
update_hash(buffer.slice(0, payload_size + 1), 0);
|
|
||||||
}
|
|
||||||
|
|
||||||
// if something went wrong, send an alert about it
|
|
||||||
if (payload_res < 0) {
|
|
||||||
switch ((Error)payload_res) {
|
|
||||||
case Error::UnexpectedMessage: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::UnexpectedMessage);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::CompressionNotSupported: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::DecompressionFailure);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::BrokenPacket: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::DecodeError);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::NotVerified: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::BadRecordMAC);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::BadCertificate: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::BadCertificate);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::UnsupportedCertificate: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::UnsupportedCertificate);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::NoCommonCipher: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::InsufficientSecurity);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::NotUnderstood: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::InternalError);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::NoRenegotiation: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::NoRenegotiation);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::DecryptionFailed: {
|
|
||||||
auto packet = build_alert(true, (u8)AlertDescription::DecryptionFailed);
|
|
||||||
write_packet(packet);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
case Error::NeedMoreData:
|
|
||||||
// Ignore this, as it's not an "error"
|
|
||||||
dbgln_if(TLS_DEBUG, "More data needed");
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
dbgln("Unknown TLS::Error with value {}", payload_res);
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
if (payload_res < 0)
|
|
||||||
return payload_res;
|
|
||||||
}
|
|
||||||
switch (write_packets) {
|
|
||||||
case WritePacketStage::Initial:
|
|
||||||
// nothing to write
|
|
||||||
break;
|
|
||||||
case WritePacketStage::ClientHandshake:
|
|
||||||
if (m_context.client_verified == VerificationNeeded) {
|
|
||||||
dbgln_if(TLS_DEBUG, "> Client Certificate");
|
|
||||||
auto packet = build_certificate();
|
|
||||||
write_packet(packet);
|
|
||||||
m_context.client_verified = Verified;
|
|
||||||
}
|
|
||||||
{
|
|
||||||
dbgln_if(TLS_DEBUG, "> Key exchange");
|
|
||||||
auto packet = build_client_key_exchange();
|
|
||||||
write_packet(packet);
|
|
||||||
}
|
|
||||||
{
|
|
||||||
dbgln_if(TLS_DEBUG, "> change cipher spec");
|
|
||||||
auto packet = build_change_cipher_spec();
|
|
||||||
write_packet(packet);
|
|
||||||
}
|
|
||||||
m_context.cipher_spec_set = 1;
|
|
||||||
m_context.local_sequence_number = 0;
|
|
||||||
{
|
|
||||||
dbgln_if(TLS_DEBUG, "> client finished");
|
|
||||||
auto packet = build_finished();
|
|
||||||
write_packet(packet);
|
|
||||||
}
|
|
||||||
m_context.cipher_spec_set = 0;
|
|
||||||
break;
|
|
||||||
case WritePacketStage::ServerHandshake:
|
|
||||||
// server handshake
|
|
||||||
dbgln("UNSUPPORTED: Server mode");
|
|
||||||
VERIFY_NOT_REACHED();
|
|
||||||
break;
|
|
||||||
case WritePacketStage::Finished:
|
|
||||||
// finished
|
|
||||||
{
|
|
||||||
dbgln_if(TLS_DEBUG, "> change cipher spec");
|
|
||||||
auto packet = build_change_cipher_spec();
|
|
||||||
write_packet(packet);
|
|
||||||
}
|
|
||||||
{
|
|
||||||
dbgln_if(TLS_DEBUG, "> client finished");
|
|
||||||
auto packet = build_finished();
|
|
||||||
write_packet(packet);
|
|
||||||
}
|
|
||||||
m_context.connection_status = ConnectionStatus::Established;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
payload_size++;
|
|
||||||
buffer_length -= payload_size;
|
|
||||||
buffer = buffer.slice(payload_size, buffer_length);
|
|
||||||
}
|
|
||||||
return original_length;
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -4,7 +4,11 @@
|
||||||
* SPDX-License-Identifier: BSD-2-Clause
|
* SPDX-License-Identifier: BSD-2-Clause
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <AK/Debug.h>
|
||||||
|
#include <AK/Endian.h>
|
||||||
#include <AK/Random.h>
|
#include <AK/Random.h>
|
||||||
|
|
||||||
|
#include <LibCore/Timer.h>
|
||||||
#include <LibCrypto/ASN1/DER.h>
|
#include <LibCrypto/ASN1/DER.h>
|
||||||
#include <LibCrypto/PK/Code/EMSA_PSS.h>
|
#include <LibCrypto/PK/Code/EMSA_PSS.h>
|
||||||
#include <LibTLS/TLSv12.h>
|
#include <LibTLS/TLSv12.h>
|
||||||
|
@ -121,22 +125,17 @@ ByteBuffer TLSv12::build_hello()
|
||||||
return packet;
|
return packet;
|
||||||
}
|
}
|
||||||
|
|
||||||
ByteBuffer TLSv12::build_alert(bool critical, u8 code)
|
ByteBuffer TLSv12::build_change_cipher_spec()
|
||||||
{
|
{
|
||||||
PacketBuilder builder(MessageType::Alert, (u16)m_context.options.version);
|
PacketBuilder builder { MessageType::ChangeCipher, m_context.options.version, 64 };
|
||||||
builder.append((u8)(critical ? AlertLevel::Critical : AlertLevel::Warning));
|
builder.append((u8)1);
|
||||||
builder.append(code);
|
|
||||||
|
|
||||||
if (critical)
|
|
||||||
m_context.critical_error = code;
|
|
||||||
|
|
||||||
auto packet = builder.build();
|
auto packet = builder.build();
|
||||||
update_packet(packet);
|
update_packet(packet);
|
||||||
|
m_context.local_sequence_number = 0;
|
||||||
return packet;
|
return packet;
|
||||||
}
|
}
|
||||||
|
|
||||||
ByteBuffer TLSv12::build_finished()
|
ByteBuffer TLSv12::build_handshake_finished()
|
||||||
{
|
{
|
||||||
PacketBuilder builder { MessageType::Handshake, m_context.options.version, 12 + 64 };
|
PacketBuilder builder { MessageType::Handshake, m_context.options.version, 12 + 64 };
|
||||||
builder.append((u8)HandshakeType::Finished);
|
builder.append((u8)HandshakeType::Finished);
|
||||||
|
@ -160,11 +159,371 @@ ByteBuffer TLSv12::build_finished()
|
||||||
return packet;
|
return packet;
|
||||||
}
|
}
|
||||||
|
|
||||||
void TLSv12::alert(AlertLevel level, AlertDescription code)
|
ssize_t TLSv12::handle_handshake_finished(ReadonlyBytes buffer, WritePacketStage& write_packets)
|
||||||
{
|
{
|
||||||
auto the_alert = build_alert(level == AlertLevel::Critical, (u8)code);
|
if (m_context.connection_status < ConnectionStatus::KeyExchange || m_context.connection_status == ConnectionStatus::Established) {
|
||||||
write_packet(the_alert);
|
dbgln("unexpected finished message");
|
||||||
flush();
|
return (i8)Error::UnexpectedMessage;
|
||||||
|
}
|
||||||
|
|
||||||
|
write_packets = WritePacketStage::Initial;
|
||||||
|
|
||||||
|
if (buffer.size() < 3) {
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t index = 3;
|
||||||
|
|
||||||
|
u32 size = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
||||||
|
|
||||||
|
if (size < 12) {
|
||||||
|
dbgln_if(TLS_DEBUG, "finished packet smaller than minimum size: {}", size);
|
||||||
|
return (i8)Error::BrokenPacket;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (size < buffer.size() - index) {
|
||||||
|
dbgln_if(TLS_DEBUG, "not enough data after length: {} > {}", size, buffer.size() - index);
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
|
||||||
|
// TODO: Compare Hashes
|
||||||
|
dbgln_if(TLS_DEBUG, "FIXME: handle_handshake_finished :: Check message validity");
|
||||||
|
m_context.connection_status = ConnectionStatus::Established;
|
||||||
|
|
||||||
|
if (m_handshake_timeout_timer) {
|
||||||
|
// Disable the handshake timeout timer as handshake has been established.
|
||||||
|
m_handshake_timeout_timer->stop();
|
||||||
|
m_handshake_timeout_timer->remove_from_parent();
|
||||||
|
m_handshake_timeout_timer = nullptr;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (on_tls_ready_to_write)
|
||||||
|
on_tls_ready_to_write(*this);
|
||||||
|
|
||||||
|
return index + size;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ssize_t TLSv12::handle_handshake_payload(ReadonlyBytes vbuffer)
|
||||||
|
{
|
||||||
|
if (m_context.connection_status == ConnectionStatus::Established) {
|
||||||
|
dbgln_if(TLS_DEBUG, "Renegotiation attempt ignored");
|
||||||
|
// FIXME: We should properly say "NoRenegotiation", but that causes a handshake failure
|
||||||
|
// so we just roll with it and pretend that we _did_ renegotiate
|
||||||
|
// This will cause issues when we decide to have long-lasting connections, but
|
||||||
|
// we do not have those at the moment :^)
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
auto buffer = vbuffer;
|
||||||
|
auto buffer_length = buffer.size();
|
||||||
|
auto original_length = buffer_length;
|
||||||
|
while (buffer_length >= 4 && !m_context.critical_error) {
|
||||||
|
ssize_t payload_res = 0;
|
||||||
|
if (buffer_length < 1)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
auto type = buffer[0];
|
||||||
|
auto write_packets { WritePacketStage::Initial };
|
||||||
|
size_t payload_size = buffer[1] * 0x10000 + buffer[2] * 0x100 + buffer[3] + 3;
|
||||||
|
dbgln_if(TLS_DEBUG, "payload size: {} buffer length: {}", payload_size, buffer_length);
|
||||||
|
if (payload_size + 1 > buffer_length)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
|
||||||
|
switch (type) {
|
||||||
|
case HelloRequest:
|
||||||
|
if (m_context.handshake_messages[0] >= 1) {
|
||||||
|
dbgln("unexpected hello request message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[0];
|
||||||
|
dbgln("hello request (renegotiation?)");
|
||||||
|
if (m_context.connection_status == ConnectionStatus::Established) {
|
||||||
|
// renegotiation
|
||||||
|
payload_res = (i8)Error::NoRenegotiation;
|
||||||
|
} else {
|
||||||
|
// :shrug:
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case ClientHello:
|
||||||
|
// FIXME: We only support client mode right now
|
||||||
|
if (m_context.is_server) {
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
}
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
case ServerHello:
|
||||||
|
if (m_context.handshake_messages[2] >= 1) {
|
||||||
|
dbgln("unexpected server hello message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[2];
|
||||||
|
dbgln_if(TLS_DEBUG, "server hello");
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("unsupported: server mode");
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
}
|
||||||
|
payload_res = handle_server_hello(buffer.slice(1, payload_size), write_packets);
|
||||||
|
break;
|
||||||
|
case HelloVerifyRequest:
|
||||||
|
dbgln("unsupported: DTLS");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
case CertificateMessage:
|
||||||
|
if (m_context.handshake_messages[4] >= 1) {
|
||||||
|
dbgln("unexpected certificate message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[4];
|
||||||
|
dbgln_if(TLS_DEBUG, "certificate");
|
||||||
|
if (m_context.connection_status == ConnectionStatus::Negotiating) {
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("unsupported: server mode");
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
}
|
||||||
|
payload_res = handle_certificate(buffer.slice(1, payload_size));
|
||||||
|
if (m_context.certificates.size()) {
|
||||||
|
auto it = m_context.certificates.find_if([](const auto& cert) { return cert.is_valid(); });
|
||||||
|
|
||||||
|
if (it.is_end()) {
|
||||||
|
// no valid certificates
|
||||||
|
dbgln("No valid certificates found");
|
||||||
|
payload_res = (i8)Error::BadCertificate;
|
||||||
|
m_context.critical_error = payload_res;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
// swap the first certificate with the valid one
|
||||||
|
if (it.index() != 0)
|
||||||
|
swap(m_context.certificates[0], m_context.certificates[it.index()]);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case ServerKeyExchange:
|
||||||
|
if (m_context.handshake_messages[5] >= 1) {
|
||||||
|
dbgln("unexpected server key exchange message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[5];
|
||||||
|
dbgln_if(TLS_DEBUG, "server key exchange");
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("unsupported: server mode");
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
} else {
|
||||||
|
payload_res = handle_server_key_exchange(buffer.slice(1, payload_size));
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case CertificateRequest:
|
||||||
|
if (m_context.handshake_messages[6] >= 1) {
|
||||||
|
dbgln("unexpected certificate request message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[6];
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("invalid request");
|
||||||
|
dbgln("unsupported: server mode");
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
} else {
|
||||||
|
// we do not support "certificate request"
|
||||||
|
dbgln("certificate request");
|
||||||
|
if (on_tls_certificate_request)
|
||||||
|
on_tls_certificate_request(*this);
|
||||||
|
m_context.client_verified = VerificationNeeded;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case ServerHelloDone:
|
||||||
|
if (m_context.handshake_messages[7] >= 1) {
|
||||||
|
dbgln("unexpected server hello done message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[7];
|
||||||
|
dbgln_if(TLS_DEBUG, "server hello done");
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("unsupported: server mode");
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
} else {
|
||||||
|
payload_res = handle_server_hello_done(buffer.slice(1, payload_size));
|
||||||
|
if (payload_res > 0)
|
||||||
|
write_packets = WritePacketStage::ClientHandshake;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case CertificateVerify:
|
||||||
|
if (m_context.handshake_messages[8] >= 1) {
|
||||||
|
dbgln("unexpected certificate verify message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[8];
|
||||||
|
dbgln_if(TLS_DEBUG, "certificate verify");
|
||||||
|
if (m_context.connection_status == ConnectionStatus::KeyExchange) {
|
||||||
|
payload_res = handle_certificate_verify(buffer.slice(1, payload_size));
|
||||||
|
} else {
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case ClientKeyExchange:
|
||||||
|
if (m_context.handshake_messages[9] >= 1) {
|
||||||
|
dbgln("unexpected client key exchange message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[9];
|
||||||
|
dbgln_if(TLS_DEBUG, "client key exchange");
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("unsupported: server mode");
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
} else {
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
case Finished:
|
||||||
|
m_context.cached_handshake.clear();
|
||||||
|
if (m_context.handshake_messages[10] >= 1) {
|
||||||
|
dbgln("unexpected finished message");
|
||||||
|
payload_res = (i8)Error::UnexpectedMessage;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++m_context.handshake_messages[10];
|
||||||
|
dbgln_if(TLS_DEBUG, "finished");
|
||||||
|
payload_res = handle_handshake_finished(buffer.slice(1, payload_size), write_packets);
|
||||||
|
if (payload_res > 0) {
|
||||||
|
memset(m_context.handshake_messages, 0, sizeof(m_context.handshake_messages));
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
dbgln("message type not understood: {}", type);
|
||||||
|
return (i8)Error::NotUnderstood;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (type != HelloRequest) {
|
||||||
|
update_hash(buffer.slice(0, payload_size + 1), 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
// if something went wrong, send an alert about it
|
||||||
|
if (payload_res < 0) {
|
||||||
|
switch ((Error)payload_res) {
|
||||||
|
case Error::UnexpectedMessage: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::UnexpectedMessage);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::CompressionNotSupported: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::DecompressionFailure);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::BrokenPacket: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::DecodeError);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::NotVerified: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::BadRecordMAC);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::BadCertificate: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::BadCertificate);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::UnsupportedCertificate: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::UnsupportedCertificate);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::NoCommonCipher: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::InsufficientSecurity);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::NotUnderstood: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::InternalError);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::NoRenegotiation: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::NoRenegotiation);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::DecryptionFailed: {
|
||||||
|
auto packet = build_alert(true, (u8)AlertDescription::DecryptionFailed);
|
||||||
|
write_packet(packet);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
case Error::NeedMoreData:
|
||||||
|
// Ignore this, as it's not an "error"
|
||||||
|
dbgln_if(TLS_DEBUG, "More data needed");
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
dbgln("Unknown TLS::Error with value {}", payload_res);
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
if (payload_res < 0)
|
||||||
|
return payload_res;
|
||||||
|
}
|
||||||
|
switch (write_packets) {
|
||||||
|
case WritePacketStage::Initial:
|
||||||
|
// nothing to write
|
||||||
|
break;
|
||||||
|
case WritePacketStage::ClientHandshake:
|
||||||
|
if (m_context.client_verified == VerificationNeeded) {
|
||||||
|
dbgln_if(TLS_DEBUG, "> Client Certificate");
|
||||||
|
auto packet = build_certificate();
|
||||||
|
write_packet(packet);
|
||||||
|
m_context.client_verified = Verified;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
dbgln_if(TLS_DEBUG, "> Key exchange");
|
||||||
|
auto packet = build_client_key_exchange();
|
||||||
|
write_packet(packet);
|
||||||
|
}
|
||||||
|
{
|
||||||
|
dbgln_if(TLS_DEBUG, "> change cipher spec");
|
||||||
|
auto packet = build_change_cipher_spec();
|
||||||
|
write_packet(packet);
|
||||||
|
}
|
||||||
|
m_context.cipher_spec_set = 1;
|
||||||
|
m_context.local_sequence_number = 0;
|
||||||
|
{
|
||||||
|
dbgln_if(TLS_DEBUG, "> client finished");
|
||||||
|
auto packet = build_handshake_finished();
|
||||||
|
write_packet(packet);
|
||||||
|
}
|
||||||
|
m_context.cipher_spec_set = 0;
|
||||||
|
break;
|
||||||
|
case WritePacketStage::ServerHandshake:
|
||||||
|
// server handshake
|
||||||
|
dbgln("UNSUPPORTED: Server mode");
|
||||||
|
VERIFY_NOT_REACHED();
|
||||||
|
break;
|
||||||
|
case WritePacketStage::Finished:
|
||||||
|
// finished
|
||||||
|
{
|
||||||
|
dbgln_if(TLS_DEBUG, "> change cipher spec");
|
||||||
|
auto packet = build_change_cipher_spec();
|
||||||
|
write_packet(packet);
|
||||||
|
}
|
||||||
|
{
|
||||||
|
dbgln_if(TLS_DEBUG, "> client finished");
|
||||||
|
auto packet = build_handshake_finished();
|
||||||
|
write_packet(packet);
|
||||||
|
}
|
||||||
|
m_context.connection_status = ConnectionStatus::Established;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
payload_size++;
|
||||||
|
buffer_length -= payload_size;
|
||||||
|
buffer = buffer.slice(payload_size, buffer_length);
|
||||||
|
}
|
||||||
|
return original_length;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
113
Userland/Libraries/LibTLS/HandshakeCertificate.cpp
Normal file
113
Userland/Libraries/LibTLS/HandshakeCertificate.cpp
Normal file
|
@ -0,0 +1,113 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2020, Ali Mohammad Pur <mpfard@serenityos.org>
|
||||||
|
*
|
||||||
|
* SPDX-License-Identifier: BSD-2-Clause
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <AK/Debug.h>
|
||||||
|
#include <AK/Endian.h>
|
||||||
|
#include <AK/Random.h>
|
||||||
|
|
||||||
|
#include <LibCore/Timer.h>
|
||||||
|
#include <LibCrypto/ASN1/DER.h>
|
||||||
|
#include <LibCrypto/PK/Code/EMSA_PSS.h>
|
||||||
|
#include <LibTLS/TLSv12.h>
|
||||||
|
|
||||||
|
namespace TLS {
|
||||||
|
|
||||||
|
ssize_t TLSv12::handle_certificate(ReadonlyBytes buffer)
|
||||||
|
{
|
||||||
|
ssize_t res = 0;
|
||||||
|
|
||||||
|
if (buffer.size() < 3) {
|
||||||
|
dbgln_if(TLS_DEBUG, "not enough certificate header data");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
|
||||||
|
u32 certificate_total_length = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
||||||
|
|
||||||
|
dbgln_if(TLS_DEBUG, "total length: {}", certificate_total_length);
|
||||||
|
|
||||||
|
if (certificate_total_length <= 4)
|
||||||
|
return 3 * certificate_total_length;
|
||||||
|
|
||||||
|
res += 3;
|
||||||
|
|
||||||
|
if (certificate_total_length > buffer.size() - res) {
|
||||||
|
dbgln_if(TLS_DEBUG, "not enough data for claimed total cert length");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
size_t size = certificate_total_length;
|
||||||
|
|
||||||
|
size_t index = 0;
|
||||||
|
bool valid_certificate = false;
|
||||||
|
|
||||||
|
while (size > 0) {
|
||||||
|
++index;
|
||||||
|
if (buffer.size() - res < 3) {
|
||||||
|
dbgln_if(TLS_DEBUG, "not enough data for certificate length");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
size_t certificate_size = buffer[res] * 0x10000 + buffer[res + 1] * 0x100 + buffer[res + 2];
|
||||||
|
res += 3;
|
||||||
|
|
||||||
|
if (buffer.size() - res < certificate_size) {
|
||||||
|
dbgln_if(TLS_DEBUG, "not enough data for certificate body");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
|
||||||
|
auto res_cert = res;
|
||||||
|
auto remaining = certificate_size;
|
||||||
|
size_t certificates_in_chain = 0;
|
||||||
|
|
||||||
|
do {
|
||||||
|
if (remaining <= 3) {
|
||||||
|
dbgln("Ran out of data");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
++certificates_in_chain;
|
||||||
|
if (buffer.size() < (size_t)res_cert + 3) {
|
||||||
|
dbgln("not enough data to read cert size ({} < {})", buffer.size(), res_cert + 3);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
size_t certificate_size_specific = buffer[res_cert] * 0x10000 + buffer[res_cert + 1] * 0x100 + buffer[res_cert + 2];
|
||||||
|
res_cert += 3;
|
||||||
|
remaining -= 3;
|
||||||
|
|
||||||
|
if (certificate_size_specific > remaining) {
|
||||||
|
dbgln("invalid certificate size (expected {} but got {})", remaining, certificate_size_specific);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
remaining -= certificate_size_specific;
|
||||||
|
|
||||||
|
auto certificate = Certificate::parse_asn1(buffer.slice(res_cert, certificate_size_specific), false);
|
||||||
|
if (certificate.has_value()) {
|
||||||
|
if (certificate.value().is_valid()) {
|
||||||
|
m_context.certificates.append(certificate.value());
|
||||||
|
valid_certificate = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
res_cert += certificate_size_specific;
|
||||||
|
} while (remaining > 0);
|
||||||
|
if (remaining) {
|
||||||
|
dbgln("extraneous {} bytes left over after parsing certificates", remaining);
|
||||||
|
}
|
||||||
|
size -= certificate_size + 3;
|
||||||
|
res += certificate_size;
|
||||||
|
}
|
||||||
|
if (!valid_certificate)
|
||||||
|
return (i8)Error::UnsupportedCertificate;
|
||||||
|
|
||||||
|
if ((size_t)res != buffer.size())
|
||||||
|
dbgln("some data left unread: {} bytes out of {}", res, buffer.size());
|
||||||
|
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssize_t TLSv12::handle_certificate_verify(ReadonlyBytes)
|
||||||
|
{
|
||||||
|
dbgln("FIXME: parse_verify");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -5,6 +5,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <AK/Debug.h>
|
#include <AK/Debug.h>
|
||||||
|
#include <AK/Random.h>
|
||||||
#include <LibCrypto/ASN1/DER.h>
|
#include <LibCrypto/ASN1/DER.h>
|
||||||
#include <LibCrypto/PK/Code/EMSA_PSS.h>
|
#include <LibCrypto/PK/Code/EMSA_PSS.h>
|
||||||
#include <LibTLS/TLSv12.h>
|
#include <LibTLS/TLSv12.h>
|
||||||
|
@ -89,50 +90,6 @@ bool TLSv12::expand_key()
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
void TLSv12::pseudorandom_function(Bytes output, ReadonlyBytes secret, const u8* label, size_t label_length, ReadonlyBytes seed, ReadonlyBytes seed_b)
|
|
||||||
{
|
|
||||||
if (!secret.size()) {
|
|
||||||
dbgln("null secret");
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// RFC 5246: "In this section, we define one PRF, based on HMAC. This PRF with the
|
|
||||||
// SHA-256 hash function is used for all cipher suites defined in this
|
|
||||||
// document and in TLS documents published prior to this document when
|
|
||||||
// TLS 1.2 is negotiated."
|
|
||||||
// Apparently this PRF _always_ uses SHA256
|
|
||||||
|
|
||||||
auto append_label_seed = [&](auto& hmac) {
|
|
||||||
hmac.update(label, label_length);
|
|
||||||
hmac.update(seed);
|
|
||||||
if (seed_b.size() > 0)
|
|
||||||
hmac.update(seed_b);
|
|
||||||
};
|
|
||||||
|
|
||||||
Crypto::Authentication::HMAC<Crypto::Hash::SHA256> hmac(secret);
|
|
||||||
append_label_seed(hmac);
|
|
||||||
|
|
||||||
constexpr auto digest_size = hmac.digest_size();
|
|
||||||
u8 digest[digest_size];
|
|
||||||
auto digest_0 = Bytes { digest, digest_size };
|
|
||||||
|
|
||||||
digest_0.overwrite(0, hmac.digest().immutable_data(), digest_size);
|
|
||||||
|
|
||||||
size_t index = 0;
|
|
||||||
while (index < output.size()) {
|
|
||||||
hmac.update(digest_0);
|
|
||||||
append_label_seed(hmac);
|
|
||||||
auto digest_1 = hmac.digest();
|
|
||||||
|
|
||||||
auto copy_size = min(digest_size, output.size() - index);
|
|
||||||
|
|
||||||
output.overwrite(index, digest_1.immutable_data(), copy_size);
|
|
||||||
index += copy_size;
|
|
||||||
|
|
||||||
digest_0.overwrite(0, hmac.process(digest_0).immutable_data(), digest_size);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
bool TLSv12::compute_master_secret(size_t length)
|
bool TLSv12::compute_master_secret(size_t length)
|
||||||
{
|
{
|
||||||
if (m_context.premaster_key.size() == 0 || length < 48) {
|
if (m_context.premaster_key.size() == 0 || length < 48) {
|
||||||
|
@ -160,6 +117,95 @@ bool TLSv12::compute_master_secret(size_t length)
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static bool wildcard_matches(const StringView& host, const StringView& subject)
|
||||||
|
{
|
||||||
|
if (host.matches(subject))
|
||||||
|
return true;
|
||||||
|
|
||||||
|
if (subject.starts_with("*."))
|
||||||
|
return wildcard_matches(host, subject.substring_view(2));
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
Optional<size_t> TLSv12::verify_chain_and_get_matching_certificate(const StringView& host) const
|
||||||
|
{
|
||||||
|
if (m_context.certificates.is_empty() || !m_context.verify_chain())
|
||||||
|
return {};
|
||||||
|
|
||||||
|
if (host.is_empty())
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
for (size_t i = 0; i < m_context.certificates.size(); ++i) {
|
||||||
|
auto& cert = m_context.certificates[i];
|
||||||
|
if (wildcard_matches(host, cert.subject.subject))
|
||||||
|
return i;
|
||||||
|
for (auto& san : cert.SAN) {
|
||||||
|
if (wildcard_matches(host, san))
|
||||||
|
return i;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return {};
|
||||||
|
}
|
||||||
|
|
||||||
|
void TLSv12::build_random(PacketBuilder& builder)
|
||||||
|
{
|
||||||
|
u8 random_bytes[48];
|
||||||
|
size_t bytes = 48;
|
||||||
|
|
||||||
|
fill_with_random(random_bytes, bytes);
|
||||||
|
|
||||||
|
// remove zeros from the random bytes
|
||||||
|
for (size_t i = 0; i < bytes; ++i) {
|
||||||
|
if (!random_bytes[i])
|
||||||
|
random_bytes[i--] = get_random<u8>();
|
||||||
|
}
|
||||||
|
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("Server mode not supported");
|
||||||
|
return;
|
||||||
|
} else {
|
||||||
|
*(u16*)random_bytes = AK::convert_between_host_and_network_endian((u16)Version::V12);
|
||||||
|
}
|
||||||
|
|
||||||
|
m_context.premaster_key = ByteBuffer::copy(random_bytes, bytes);
|
||||||
|
|
||||||
|
const auto& certificate_option = verify_chain_and_get_matching_certificate(m_context.extensions.SNI); // if the SNI is empty, we'll make a special case and match *a* leaf certificate.
|
||||||
|
if (!certificate_option.has_value()) {
|
||||||
|
dbgln("certificate verification failed :(");
|
||||||
|
alert(AlertLevel::Critical, AlertDescription::BadCertificate);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
auto& certificate = m_context.certificates[certificate_option.value()];
|
||||||
|
if constexpr (TLS_DEBUG) {
|
||||||
|
dbgln("PreMaster secret");
|
||||||
|
print_buffer(m_context.premaster_key);
|
||||||
|
}
|
||||||
|
|
||||||
|
Crypto::PK::RSA_PKCS1_EME rsa(certificate.public_key.modulus(), 0, certificate.public_key.public_exponent());
|
||||||
|
|
||||||
|
Vector<u8, 32> out;
|
||||||
|
out.resize(rsa.output_size());
|
||||||
|
auto outbuf = out.span();
|
||||||
|
rsa.encrypt(m_context.premaster_key, outbuf);
|
||||||
|
|
||||||
|
if constexpr (TLS_DEBUG) {
|
||||||
|
dbgln("Encrypted: ");
|
||||||
|
print_buffer(outbuf);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!compute_master_secret(bytes)) {
|
||||||
|
dbgln("oh noes we could not derive a master key :(");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
builder.append_u24(outbuf.size() + 2);
|
||||||
|
builder.append((u16)outbuf.size());
|
||||||
|
builder.append(outbuf);
|
||||||
|
}
|
||||||
|
|
||||||
ByteBuffer TLSv12::build_certificate()
|
ByteBuffer TLSv12::build_certificate()
|
||||||
{
|
{
|
||||||
PacketBuilder builder { MessageType::Handshake, m_context.options.version };
|
PacketBuilder builder { MessageType::Handshake, m_context.options.version };
|
||||||
|
@ -213,22 +259,6 @@ ByteBuffer TLSv12::build_certificate()
|
||||||
return packet;
|
return packet;
|
||||||
}
|
}
|
||||||
|
|
||||||
ByteBuffer TLSv12::build_change_cipher_spec()
|
|
||||||
{
|
|
||||||
PacketBuilder builder { MessageType::ChangeCipher, m_context.options.version, 64 };
|
|
||||||
builder.append((u8)1);
|
|
||||||
auto packet = builder.build();
|
|
||||||
update_packet(packet);
|
|
||||||
m_context.local_sequence_number = 0;
|
|
||||||
return packet;
|
|
||||||
}
|
|
||||||
|
|
||||||
ByteBuffer TLSv12::build_server_key_exchange()
|
|
||||||
{
|
|
||||||
dbgln("FIXME: build_server_key_exchange");
|
|
||||||
return {};
|
|
||||||
}
|
|
||||||
|
|
||||||
ByteBuffer TLSv12::build_client_key_exchange()
|
ByteBuffer TLSv12::build_client_key_exchange()
|
||||||
{
|
{
|
||||||
PacketBuilder builder { MessageType::Handshake, m_context.options.version };
|
PacketBuilder builder { MessageType::Handshake, m_context.options.version };
|
||||||
|
@ -244,16 +274,4 @@ ByteBuffer TLSv12::build_client_key_exchange()
|
||||||
return packet;
|
return packet;
|
||||||
}
|
}
|
||||||
|
|
||||||
ssize_t TLSv12::handle_server_key_exchange(ReadonlyBytes)
|
|
||||||
{
|
|
||||||
dbgln("FIXME: parse_server_key_exchange");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssize_t TLSv12::handle_verify(ReadonlyBytes)
|
|
||||||
{
|
|
||||||
dbgln("FIXME: parse_verify");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
208
Userland/Libraries/LibTLS/HandshakeServer.cpp
Normal file
208
Userland/Libraries/LibTLS/HandshakeServer.cpp
Normal file
|
@ -0,0 +1,208 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2020, Ali Mohammad Pur <mpfard@serenityos.org>
|
||||||
|
*
|
||||||
|
* SPDX-License-Identifier: BSD-2-Clause
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <AK/Debug.h>
|
||||||
|
#include <AK/Endian.h>
|
||||||
|
#include <AK/Random.h>
|
||||||
|
|
||||||
|
#include <LibCore/Timer.h>
|
||||||
|
#include <LibCrypto/ASN1/DER.h>
|
||||||
|
#include <LibCrypto/PK/Code/EMSA_PSS.h>
|
||||||
|
#include <LibTLS/TLSv12.h>
|
||||||
|
|
||||||
|
namespace TLS {
|
||||||
|
|
||||||
|
ssize_t TLSv12::handle_server_hello(ReadonlyBytes buffer, WritePacketStage& write_packets)
|
||||||
|
{
|
||||||
|
write_packets = WritePacketStage::Initial;
|
||||||
|
if (m_context.connection_status != ConnectionStatus::Disconnected && m_context.connection_status != ConnectionStatus::Renegotiating) {
|
||||||
|
dbgln("unexpected hello message");
|
||||||
|
return (i8)Error::UnexpectedMessage;
|
||||||
|
}
|
||||||
|
ssize_t res = 0;
|
||||||
|
size_t min_hello_size = 41;
|
||||||
|
|
||||||
|
if (min_hello_size > buffer.size()) {
|
||||||
|
dbgln("need more data");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
size_t following_bytes = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
||||||
|
res += 3;
|
||||||
|
if (buffer.size() - res < following_bytes) {
|
||||||
|
dbgln("not enough data after header: {} < {}", buffer.size() - res, following_bytes);
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (buffer.size() - res < 2) {
|
||||||
|
dbgln("not enough data for version");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
auto version = static_cast<Version>(AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res))));
|
||||||
|
|
||||||
|
res += 2;
|
||||||
|
if (!supports_version(version))
|
||||||
|
return (i8)Error::NotSafe;
|
||||||
|
|
||||||
|
memcpy(m_context.remote_random, buffer.offset_pointer(res), sizeof(m_context.remote_random));
|
||||||
|
res += sizeof(m_context.remote_random);
|
||||||
|
|
||||||
|
u8 session_length = buffer[res++];
|
||||||
|
if (buffer.size() - res < session_length) {
|
||||||
|
dbgln("not enough data for session id");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (session_length && session_length <= 32) {
|
||||||
|
memcpy(m_context.session_id, buffer.offset_pointer(res), session_length);
|
||||||
|
m_context.session_id_size = session_length;
|
||||||
|
if constexpr (TLS_DEBUG) {
|
||||||
|
dbgln("Remote session ID:");
|
||||||
|
print_buffer(ReadonlyBytes { m_context.session_id, session_length });
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
m_context.session_id_size = 0;
|
||||||
|
}
|
||||||
|
res += session_length;
|
||||||
|
|
||||||
|
if (buffer.size() - res < 2) {
|
||||||
|
dbgln("not enough data for cipher suite listing");
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
}
|
||||||
|
auto cipher = static_cast<CipherSuite>(AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res))));
|
||||||
|
res += 2;
|
||||||
|
if (!supports_cipher(cipher)) {
|
||||||
|
m_context.cipher = CipherSuite::Invalid;
|
||||||
|
dbgln("No supported cipher could be agreed upon");
|
||||||
|
return (i8)Error::NoCommonCipher;
|
||||||
|
}
|
||||||
|
m_context.cipher = cipher;
|
||||||
|
dbgln_if(TLS_DEBUG, "Cipher: {}", (u16)cipher);
|
||||||
|
|
||||||
|
// The handshake hash function is _always_ SHA256
|
||||||
|
m_context.handshake_hash.initialize(Crypto::Hash::HashKind::SHA256);
|
||||||
|
|
||||||
|
// Compression method
|
||||||
|
if (buffer.size() - res < 1)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
u8 compression = buffer[res++];
|
||||||
|
if (compression != 0)
|
||||||
|
return (i8)Error::CompressionNotSupported;
|
||||||
|
|
||||||
|
if (m_context.connection_status != ConnectionStatus::Renegotiating)
|
||||||
|
m_context.connection_status = ConnectionStatus::Negotiating;
|
||||||
|
if (m_context.is_server) {
|
||||||
|
dbgln("unsupported: server mode");
|
||||||
|
write_packets = WritePacketStage::ServerHandshake;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Presence of extensions is determined by availability of bytes after compression_method
|
||||||
|
if (buffer.size() - res >= 2) {
|
||||||
|
auto extensions_bytes_total = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res += 2)));
|
||||||
|
dbgln_if(TLS_DEBUG, "Extensions bytes total: {}", extensions_bytes_total);
|
||||||
|
}
|
||||||
|
|
||||||
|
while (buffer.size() - res >= 4) {
|
||||||
|
auto extension_type = (HandshakeExtension)AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res)));
|
||||||
|
res += 2;
|
||||||
|
u16 extension_length = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res)));
|
||||||
|
res += 2;
|
||||||
|
|
||||||
|
dbgln_if(TLS_DEBUG, "Extension {} with length {}", (u16)extension_type, extension_length);
|
||||||
|
|
||||||
|
if (buffer.size() - res < extension_length)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
|
||||||
|
if (extension_type == HandshakeExtension::ServerName) {
|
||||||
|
// RFC6066 section 3: SNI extension_data can be empty in the server hello
|
||||||
|
if (extension_length > 0) {
|
||||||
|
// ServerNameList total size
|
||||||
|
if (buffer.size() - res < 2)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
auto sni_name_list_bytes = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res += 2)));
|
||||||
|
dbgln_if(TLS_DEBUG, "SNI: expecting ServerNameList of {} bytes", sni_name_list_bytes);
|
||||||
|
|
||||||
|
// Exactly one ServerName should be present
|
||||||
|
if (buffer.size() - res < 3)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
auto sni_name_type = (NameType)(*(const u8*)buffer.offset_pointer(res++));
|
||||||
|
auto sni_name_length = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res += 2)));
|
||||||
|
|
||||||
|
if (sni_name_type != NameType::HostName)
|
||||||
|
return (i8)Error::NotUnderstood;
|
||||||
|
|
||||||
|
if (sizeof(sni_name_type) + sizeof(sni_name_length) + sni_name_length != sni_name_list_bytes)
|
||||||
|
return (i8)Error::BrokenPacket;
|
||||||
|
|
||||||
|
// Read out the host_name
|
||||||
|
if (buffer.size() - res < sni_name_length)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
m_context.extensions.SNI = String { (const char*)buffer.offset_pointer(res), sni_name_length };
|
||||||
|
res += sni_name_length;
|
||||||
|
dbgln("SNI host_name: {}", m_context.extensions.SNI);
|
||||||
|
}
|
||||||
|
} else if (extension_type == HandshakeExtension::ApplicationLayerProtocolNegotiation && m_context.alpn.size()) {
|
||||||
|
if (buffer.size() - res > 2) {
|
||||||
|
auto alpn_length = AK::convert_between_host_and_network_endian(ByteReader::load16(buffer.offset_pointer(res)));
|
||||||
|
if (alpn_length && alpn_length <= extension_length - 2) {
|
||||||
|
const u8* alpn = buffer.offset_pointer(res + 2);
|
||||||
|
size_t alpn_position = 0;
|
||||||
|
while (alpn_position < alpn_length) {
|
||||||
|
u8 alpn_size = alpn[alpn_position++];
|
||||||
|
if (alpn_size + alpn_position >= extension_length)
|
||||||
|
break;
|
||||||
|
String alpn_str { (const char*)alpn + alpn_position, alpn_length };
|
||||||
|
if (alpn_size && m_context.alpn.contains_slow(alpn_str)) {
|
||||||
|
m_context.negotiated_alpn = alpn_str;
|
||||||
|
dbgln("negotiated alpn: {}", alpn_str);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
alpn_position += alpn_length;
|
||||||
|
if (!m_context.is_server) // server hello must contain one ALPN
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
res += extension_length;
|
||||||
|
} else if (extension_type == HandshakeExtension::SignatureAlgorithms) {
|
||||||
|
dbgln("supported signatures: ");
|
||||||
|
print_buffer(buffer.slice(res, extension_length));
|
||||||
|
res += extension_length;
|
||||||
|
// FIXME: what are we supposed to do here?
|
||||||
|
} else {
|
||||||
|
dbgln("Encountered unknown extension {} with length {}", (u16)extension_type, extension_length);
|
||||||
|
res += extension_length;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssize_t TLSv12::handle_server_hello_done(ReadonlyBytes buffer)
|
||||||
|
{
|
||||||
|
if (buffer.size() < 3)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
|
||||||
|
size_t size = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
||||||
|
|
||||||
|
if (buffer.size() - 3 < size)
|
||||||
|
return (i8)Error::NeedMoreData;
|
||||||
|
|
||||||
|
return size + 3;
|
||||||
|
}
|
||||||
|
|
||||||
|
ByteBuffer TLSv12::build_server_key_exchange()
|
||||||
|
{
|
||||||
|
dbgln("FIXME: build_server_key_exchange");
|
||||||
|
return {};
|
||||||
|
}
|
||||||
|
|
||||||
|
ssize_t TLSv12::handle_server_key_exchange(ReadonlyBytes)
|
||||||
|
{
|
||||||
|
dbgln("FIXME: parse_server_key_exchange");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -13,6 +13,28 @@
|
||||||
|
|
||||||
namespace TLS {
|
namespace TLS {
|
||||||
|
|
||||||
|
ByteBuffer TLSv12::build_alert(bool critical, u8 code)
|
||||||
|
{
|
||||||
|
PacketBuilder builder(MessageType::Alert, (u16)m_context.options.version);
|
||||||
|
builder.append((u8)(critical ? AlertLevel::Critical : AlertLevel::Warning));
|
||||||
|
builder.append(code);
|
||||||
|
|
||||||
|
if (critical)
|
||||||
|
m_context.critical_error = code;
|
||||||
|
|
||||||
|
auto packet = builder.build();
|
||||||
|
update_packet(packet);
|
||||||
|
|
||||||
|
return packet;
|
||||||
|
}
|
||||||
|
|
||||||
|
void TLSv12::alert(AlertLevel level, AlertDescription code)
|
||||||
|
{
|
||||||
|
auto the_alert = build_alert(level == AlertLevel::Critical, (u8)code);
|
||||||
|
write_packet(the_alert);
|
||||||
|
flush();
|
||||||
|
}
|
||||||
|
|
||||||
void TLSv12::write_packet(ByteBuffer& packet)
|
void TLSv12::write_packet(ByteBuffer& packet)
|
||||||
{
|
{
|
||||||
m_context.tls_buffer.append(packet.data(), packet.size());
|
m_context.tls_buffer.append(packet.data(), packet.size());
|
||||||
|
@ -175,6 +197,38 @@ void TLSv12::update_hash(ReadonlyBytes message, size_t header_size)
|
||||||
m_context.handshake_hash.update(message.slice(header_size));
|
m_context.handshake_hash.update(message.slice(header_size));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void TLSv12::ensure_hmac(size_t digest_size, bool local)
|
||||||
|
{
|
||||||
|
if (local && m_hmac_local)
|
||||||
|
return;
|
||||||
|
|
||||||
|
if (!local && m_hmac_remote)
|
||||||
|
return;
|
||||||
|
|
||||||
|
auto hash_kind = Crypto::Hash::HashKind::None;
|
||||||
|
|
||||||
|
switch (digest_size) {
|
||||||
|
case Crypto::Hash::SHA1::DigestSize:
|
||||||
|
hash_kind = Crypto::Hash::HashKind::SHA1;
|
||||||
|
break;
|
||||||
|
case Crypto::Hash::SHA256::DigestSize:
|
||||||
|
hash_kind = Crypto::Hash::HashKind::SHA256;
|
||||||
|
break;
|
||||||
|
case Crypto::Hash::SHA512::DigestSize:
|
||||||
|
hash_kind = Crypto::Hash::HashKind::SHA512;
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
dbgln("Failed to find a suitable hash for size {}", digest_size);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
auto hmac = make<Crypto::Authentication::HMAC<Crypto::Hash::Manager>>(ReadonlyBytes { local ? m_context.crypto.local_mac : m_context.crypto.remote_mac, digest_size }, hash_kind);
|
||||||
|
if (local)
|
||||||
|
m_hmac_local = move(hmac);
|
||||||
|
else
|
||||||
|
m_hmac_remote = move(hmac);
|
||||||
|
}
|
||||||
|
|
||||||
ByteBuffer TLSv12::hmac_message(const ReadonlyBytes& buf, const Optional<ReadonlyBytes> buf2, size_t mac_length, bool local)
|
ByteBuffer TLSv12::hmac_message(const ReadonlyBytes& buf, const Optional<ReadonlyBytes> buf2, size_t mac_length, bool local)
|
||||||
{
|
{
|
||||||
u64 sequence_number = AK::convert_between_host_and_network_endian(local ? m_context.local_sequence_number : m_context.remote_sequence_number);
|
u64 sequence_number = AK::convert_between_host_and_network_endian(local ? m_context.local_sequence_number : m_context.remote_sequence_number);
|
||||||
|
@ -377,7 +431,7 @@ ssize_t TLSv12::handle_message(ReadonlyBytes buffer)
|
||||||
break;
|
break;
|
||||||
case MessageType::Handshake:
|
case MessageType::Handshake:
|
||||||
dbgln_if(TLS_DEBUG, "tls handshake message");
|
dbgln_if(TLS_DEBUG, "tls handshake message");
|
||||||
payload_res = handle_payload(plain);
|
payload_res = handle_handshake_payload(plain);
|
||||||
break;
|
break;
|
||||||
case MessageType::ChangeCipher:
|
case MessageType::ChangeCipher:
|
||||||
if (m_context.connection_status != ConnectionStatus::KeyExchange) {
|
if (m_context.connection_status != ConnectionStatus::KeyExchange) {
|
||||||
|
|
|
@ -23,95 +23,6 @@
|
||||||
|
|
||||||
namespace TLS {
|
namespace TLS {
|
||||||
|
|
||||||
ssize_t TLSv12::handle_certificate(ReadonlyBytes buffer)
|
|
||||||
{
|
|
||||||
ssize_t res = 0;
|
|
||||||
|
|
||||||
if (buffer.size() < 3) {
|
|
||||||
dbgln_if(TLS_DEBUG, "not enough certificate header data");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
|
|
||||||
u32 certificate_total_length = buffer[0] * 0x10000 + buffer[1] * 0x100 + buffer[2];
|
|
||||||
|
|
||||||
dbgln_if(TLS_DEBUG, "total length: {}", certificate_total_length);
|
|
||||||
|
|
||||||
if (certificate_total_length <= 4)
|
|
||||||
return 3 * certificate_total_length;
|
|
||||||
|
|
||||||
res += 3;
|
|
||||||
|
|
||||||
if (certificate_total_length > buffer.size() - res) {
|
|
||||||
dbgln_if(TLS_DEBUG, "not enough data for claimed total cert length");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
size_t size = certificate_total_length;
|
|
||||||
|
|
||||||
size_t index = 0;
|
|
||||||
bool valid_certificate = false;
|
|
||||||
|
|
||||||
while (size > 0) {
|
|
||||||
++index;
|
|
||||||
if (buffer.size() - res < 3) {
|
|
||||||
dbgln_if(TLS_DEBUG, "not enough data for certificate length");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
size_t certificate_size = buffer[res] * 0x10000 + buffer[res + 1] * 0x100 + buffer[res + 2];
|
|
||||||
res += 3;
|
|
||||||
|
|
||||||
if (buffer.size() - res < certificate_size) {
|
|
||||||
dbgln_if(TLS_DEBUG, "not enough data for certificate body");
|
|
||||||
return (i8)Error::NeedMoreData;
|
|
||||||
}
|
|
||||||
|
|
||||||
auto res_cert = res;
|
|
||||||
auto remaining = certificate_size;
|
|
||||||
size_t certificates_in_chain = 0;
|
|
||||||
|
|
||||||
do {
|
|
||||||
if (remaining <= 3) {
|
|
||||||
dbgln("Ran out of data");
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
++certificates_in_chain;
|
|
||||||
if (buffer.size() < (size_t)res_cert + 3) {
|
|
||||||
dbgln("not enough data to read cert size ({} < {})", buffer.size(), res_cert + 3);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
size_t certificate_size_specific = buffer[res_cert] * 0x10000 + buffer[res_cert + 1] * 0x100 + buffer[res_cert + 2];
|
|
||||||
res_cert += 3;
|
|
||||||
remaining -= 3;
|
|
||||||
|
|
||||||
if (certificate_size_specific > remaining) {
|
|
||||||
dbgln("invalid certificate size (expected {} but got {})", remaining, certificate_size_specific);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
remaining -= certificate_size_specific;
|
|
||||||
|
|
||||||
auto certificate = Certificate::parse_asn1(buffer.slice(res_cert, certificate_size_specific), false);
|
|
||||||
if (certificate.has_value()) {
|
|
||||||
if (certificate.value().is_valid()) {
|
|
||||||
m_context.certificates.append(certificate.value());
|
|
||||||
valid_certificate = true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
res_cert += certificate_size_specific;
|
|
||||||
} while (remaining > 0);
|
|
||||||
if (remaining) {
|
|
||||||
dbgln("extraneous {} bytes left over after parsing certificates", remaining);
|
|
||||||
}
|
|
||||||
size -= certificate_size + 3;
|
|
||||||
res += certificate_size;
|
|
||||||
}
|
|
||||||
if (!valid_certificate)
|
|
||||||
return (i8)Error::UnsupportedCertificate;
|
|
||||||
|
|
||||||
if ((size_t)res != buffer.size())
|
|
||||||
dbgln("some data left unread: {} bytes out of {}", res, buffer.size());
|
|
||||||
|
|
||||||
return res;
|
|
||||||
}
|
|
||||||
|
|
||||||
void TLSv12::consume(ReadonlyBytes record)
|
void TLSv12::consume(ReadonlyBytes record)
|
||||||
{
|
{
|
||||||
if (m_context.critical_error) {
|
if (m_context.critical_error) {
|
||||||
|
@ -181,38 +92,6 @@ void TLSv12::consume(ReadonlyBytes record)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void TLSv12::ensure_hmac(size_t digest_size, bool local)
|
|
||||||
{
|
|
||||||
if (local && m_hmac_local)
|
|
||||||
return;
|
|
||||||
|
|
||||||
if (!local && m_hmac_remote)
|
|
||||||
return;
|
|
||||||
|
|
||||||
auto hash_kind = Crypto::Hash::HashKind::None;
|
|
||||||
|
|
||||||
switch (digest_size) {
|
|
||||||
case Crypto::Hash::SHA1::DigestSize:
|
|
||||||
hash_kind = Crypto::Hash::HashKind::SHA1;
|
|
||||||
break;
|
|
||||||
case Crypto::Hash::SHA256::DigestSize:
|
|
||||||
hash_kind = Crypto::Hash::HashKind::SHA256;
|
|
||||||
break;
|
|
||||||
case Crypto::Hash::SHA512::DigestSize:
|
|
||||||
hash_kind = Crypto::Hash::HashKind::SHA512;
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
dbgln("Failed to find a suitable hash for size {}", digest_size);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
auto hmac = make<Crypto::Authentication::HMAC<Crypto::Hash::Manager>>(ReadonlyBytes { local ? m_context.crypto.local_mac : m_context.crypto.remote_mac, digest_size }, hash_kind);
|
|
||||||
if (local)
|
|
||||||
m_hmac_local = move(hmac);
|
|
||||||
else
|
|
||||||
m_hmac_remote = move(hmac);
|
|
||||||
}
|
|
||||||
|
|
||||||
bool Certificate::is_valid() const
|
bool Certificate::is_valid() const
|
||||||
{
|
{
|
||||||
auto now = Core::DateTime::now();
|
auto now = Core::DateTime::now();
|
||||||
|
@ -353,36 +232,48 @@ bool Context::verify_chain() const
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool wildcard_matches(const StringView& host, const StringView& subject)
|
void TLSv12::pseudorandom_function(Bytes output, ReadonlyBytes secret, const u8* label, size_t label_length, ReadonlyBytes seed, ReadonlyBytes seed_b)
|
||||||
{
|
{
|
||||||
if (host.matches(subject))
|
if (!secret.size()) {
|
||||||
return true;
|
dbgln("null secret");
|
||||||
|
return;
|
||||||
if (subject.starts_with("*."))
|
|
||||||
return wildcard_matches(host, subject.substring_view(2));
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
Optional<size_t> TLSv12::verify_chain_and_get_matching_certificate(const StringView& host) const
|
|
||||||
{
|
|
||||||
if (m_context.certificates.is_empty() || !m_context.verify_chain())
|
|
||||||
return {};
|
|
||||||
|
|
||||||
if (host.is_empty())
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
for (size_t i = 0; i < m_context.certificates.size(); ++i) {
|
|
||||||
auto& cert = m_context.certificates[i];
|
|
||||||
if (wildcard_matches(host, cert.subject.subject))
|
|
||||||
return i;
|
|
||||||
for (auto& san : cert.SAN) {
|
|
||||||
if (wildcard_matches(host, san))
|
|
||||||
return i;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return {};
|
// RFC 5246: "In this section, we define one PRF, based on HMAC. This PRF with the
|
||||||
|
// SHA-256 hash function is used for all cipher suites defined in this
|
||||||
|
// document and in TLS documents published prior to this document when
|
||||||
|
// TLS 1.2 is negotiated."
|
||||||
|
// Apparently this PRF _always_ uses SHA256
|
||||||
|
|
||||||
|
auto append_label_seed = [&](auto& hmac) {
|
||||||
|
hmac.update(label, label_length);
|
||||||
|
hmac.update(seed);
|
||||||
|
if (seed_b.size() > 0)
|
||||||
|
hmac.update(seed_b);
|
||||||
|
};
|
||||||
|
|
||||||
|
Crypto::Authentication::HMAC<Crypto::Hash::SHA256> hmac(secret);
|
||||||
|
append_label_seed(hmac);
|
||||||
|
|
||||||
|
constexpr auto digest_size = hmac.digest_size();
|
||||||
|
u8 digest[digest_size];
|
||||||
|
auto digest_0 = Bytes { digest, digest_size };
|
||||||
|
|
||||||
|
digest_0.overwrite(0, hmac.digest().immutable_data(), digest_size);
|
||||||
|
|
||||||
|
size_t index = 0;
|
||||||
|
while (index < output.size()) {
|
||||||
|
hmac.update(digest_0);
|
||||||
|
append_label_seed(hmac);
|
||||||
|
auto digest_1 = hmac.digest();
|
||||||
|
|
||||||
|
auto copy_size = min(digest_size, output.size() - index);
|
||||||
|
|
||||||
|
output.overwrite(index, digest_1.immutable_data(), copy_size);
|
||||||
|
index += copy_size;
|
||||||
|
|
||||||
|
digest_0.overwrite(0, hmac.process(digest_0).immutable_data(), digest_size);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
TLSv12::TLSv12(Core::Object* parent, Options options)
|
TLSv12::TLSv12(Core::Object* parent, Options options)
|
||||||
|
|
|
@ -370,7 +370,7 @@ private:
|
||||||
ByteBuffer build_server_key_exchange();
|
ByteBuffer build_server_key_exchange();
|
||||||
|
|
||||||
ByteBuffer build_hello();
|
ByteBuffer build_hello();
|
||||||
ByteBuffer build_finished();
|
ByteBuffer build_handshake_finished();
|
||||||
ByteBuffer build_certificate();
|
ByteBuffer build_certificate();
|
||||||
ByteBuffer build_done();
|
ByteBuffer build_done();
|
||||||
ByteBuffer build_alert(bool critical, u8 code);
|
ByteBuffer build_alert(bool critical, u8 code);
|
||||||
|
@ -384,13 +384,13 @@ private:
|
||||||
|
|
||||||
bool check_connection_state(bool read);
|
bool check_connection_state(bool read);
|
||||||
|
|
||||||
ssize_t handle_hello(ReadonlyBytes, WritePacketStage&);
|
ssize_t handle_server_hello(ReadonlyBytes, WritePacketStage&);
|
||||||
ssize_t handle_finished(ReadonlyBytes, WritePacketStage&);
|
ssize_t handle_handshake_finished(ReadonlyBytes, WritePacketStage&);
|
||||||
ssize_t handle_certificate(ReadonlyBytes);
|
ssize_t handle_certificate(ReadonlyBytes);
|
||||||
ssize_t handle_server_key_exchange(ReadonlyBytes);
|
ssize_t handle_server_key_exchange(ReadonlyBytes);
|
||||||
ssize_t handle_server_hello_done(ReadonlyBytes);
|
ssize_t handle_server_hello_done(ReadonlyBytes);
|
||||||
ssize_t handle_verify(ReadonlyBytes);
|
ssize_t handle_certificate_verify(ReadonlyBytes);
|
||||||
ssize_t handle_payload(ReadonlyBytes);
|
ssize_t handle_handshake_payload(ReadonlyBytes);
|
||||||
ssize_t handle_message(ReadonlyBytes);
|
ssize_t handle_message(ReadonlyBytes);
|
||||||
ssize_t handle_random(ReadonlyBytes);
|
ssize_t handle_random(ReadonlyBytes);
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue