Updated through tag hostap_2_5 from git://w1.fi/hostap.git
[mech_eap.git] / libeap / src / tls / tlsv1_client_read.c
1 /*
2  * TLSv1 client - read handshake message
3  * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "crypto/md5.h"
13 #include "crypto/sha1.h"
14 #include "crypto/sha256.h"
15 #include "crypto/tls.h"
16 #include "x509v3.h"
17 #include "tlsv1_common.h"
18 #include "tlsv1_record.h"
19 #include "tlsv1_client.h"
20 #include "tlsv1_client_i.h"
21
22 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
23                                            const u8 *in_data, size_t *in_len);
24 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
25                                            const u8 *in_data, size_t *in_len);
26 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
27                                          const u8 *in_data, size_t *in_len);
28
29
30 static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct,
31                                     const u8 *in_data, size_t *in_len)
32 {
33         const u8 *pos, *end;
34         size_t left, len, i;
35         u16 cipher_suite;
36         u16 tls_version;
37
38         if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
39                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
40                            "received content type 0x%x", ct);
41                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
42                           TLS_ALERT_UNEXPECTED_MESSAGE);
43                 return -1;
44         }
45
46         pos = in_data;
47         left = *in_len;
48
49         if (left < 4)
50                 goto decode_error;
51
52         /* HandshakeType msg_type */
53         if (*pos != TLS_HANDSHAKE_TYPE_SERVER_HELLO) {
54                 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
55                            "message %d (expected ServerHello)", *pos);
56                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
57                           TLS_ALERT_UNEXPECTED_MESSAGE);
58                 return -1;
59         }
60         wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
61         pos++;
62         /* uint24 length */
63         len = WPA_GET_BE24(pos);
64         pos += 3;
65         left -= 4;
66
67         if (len > left)
68                 goto decode_error;
69
70         /* body - ServerHello */
71
72         wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len);
73         end = pos + len;
74
75         /* ProtocolVersion server_version */
76         if (end - pos < 2)
77                 goto decode_error;
78         tls_version = WPA_GET_BE16(pos);
79         if (!tls_version_ok(tls_version)) {
80                 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
81                            "ServerHello %u.%u", pos[0], pos[1]);
82                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
83                           TLS_ALERT_PROTOCOL_VERSION);
84                 return -1;
85         }
86         pos += 2;
87
88         wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
89                    tls_version_str(tls_version));
90         conn->rl.tls_version = tls_version;
91
92         /* Random random */
93         if (end - pos < TLS_RANDOM_LEN)
94                 goto decode_error;
95
96         os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN);
97         pos += TLS_RANDOM_LEN;
98         wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
99                     conn->server_random, TLS_RANDOM_LEN);
100
101         /* SessionID session_id */
102         if (end - pos < 1)
103                 goto decode_error;
104         if (end - pos < 1 + *pos || *pos > TLS_SESSION_ID_MAX_LEN)
105                 goto decode_error;
106         if (conn->session_id_len && conn->session_id_len == *pos &&
107             os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
108                 pos += 1 + conn->session_id_len;
109                 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
110                 conn->session_resumed = 1;
111         } else {
112                 conn->session_id_len = *pos;
113                 pos++;
114                 os_memcpy(conn->session_id, pos, conn->session_id_len);
115                 pos += conn->session_id_len;
116         }
117         wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
118                     conn->session_id, conn->session_id_len);
119
120         /* CipherSuite cipher_suite */
121         if (end - pos < 2)
122                 goto decode_error;
123         cipher_suite = WPA_GET_BE16(pos);
124         pos += 2;
125         for (i = 0; i < conn->num_cipher_suites; i++) {
126                 if (cipher_suite == conn->cipher_suites[i])
127                         break;
128         }
129         if (i == conn->num_cipher_suites) {
130                 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected "
131                            "cipher suite 0x%04x", cipher_suite);
132                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
133                           TLS_ALERT_ILLEGAL_PARAMETER);
134                 return -1;
135         }
136
137         if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) {
138                 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
139                            "cipher suite for a resumed connection (0x%04x != "
140                            "0x%04x)", cipher_suite, conn->prev_cipher_suite);
141                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
142                           TLS_ALERT_ILLEGAL_PARAMETER);
143                 return -1;
144         }
145
146         if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) {
147                 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
148                            "record layer");
149                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
150                           TLS_ALERT_INTERNAL_ERROR);
151                 return -1;
152         }
153
154         conn->prev_cipher_suite = cipher_suite;
155
156         /* CompressionMethod compression_method */
157         if (end - pos < 1)
158                 goto decode_error;
159         if (*pos != TLS_COMPRESSION_NULL) {
160                 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected "
161                            "compression 0x%02x", *pos);
162                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
163                           TLS_ALERT_ILLEGAL_PARAMETER);
164                 return -1;
165         }
166         pos++;
167
168         if (end != pos) {
169                 /* TODO: ServerHello extensions */
170                 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
171                             "end of ServerHello", pos, end - pos);
172                 goto decode_error;
173         }
174
175         if (conn->session_ticket_included && conn->session_ticket_cb) {
176                 /* TODO: include SessionTicket extension if one was included in
177                  * ServerHello */
178                 int res = conn->session_ticket_cb(
179                         conn->session_ticket_cb_ctx, NULL, 0,
180                         conn->client_random, conn->server_random,
181                         conn->master_secret);
182                 if (res < 0) {
183                         wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
184                                    "indicated failure");
185                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
186                                   TLS_ALERT_HANDSHAKE_FAILURE);
187                         return -1;
188                 }
189                 conn->use_session_ticket = !!res;
190         }
191
192         if ((conn->session_resumed || conn->use_session_ticket) &&
193             tls_derive_keys(conn, NULL, 0)) {
194                 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys");
195                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
196                           TLS_ALERT_INTERNAL_ERROR);
197                 return -1;
198         }
199
200         *in_len = end - in_data;
201
202         conn->state = (conn->session_resumed || conn->use_session_ticket) ?
203                 SERVER_CHANGE_CIPHER_SPEC : SERVER_CERTIFICATE;
204
205         return 0;
206
207 decode_error:
208         wpa_printf(MSG_DEBUG, "TLSv1: Failed to decode ServerHello");
209         tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
210         return -1;
211 }
212
213
214 static int tls_process_certificate(struct tlsv1_client *conn, u8 ct,
215                                    const u8 *in_data, size_t *in_len)
216 {
217         const u8 *pos, *end;
218         size_t left, len, list_len, cert_len, idx;
219         u8 type;
220         struct x509_certificate *chain = NULL, *last = NULL, *cert;
221         int reason;
222
223         if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
224                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
225                            "received content type 0x%x", ct);
226                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
227                           TLS_ALERT_UNEXPECTED_MESSAGE);
228                 return -1;
229         }
230
231         pos = in_data;
232         left = *in_len;
233
234         if (left < 4) {
235                 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate message "
236                            "(len=%lu)", (unsigned long) left);
237                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
238                 return -1;
239         }
240
241         type = *pos++;
242         len = WPA_GET_BE24(pos);
243         pos += 3;
244         left -= 4;
245
246         if (len > left) {
247                 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected Certificate message "
248                            "length (len=%lu != left=%lu)",
249                            (unsigned long) len, (unsigned long) left);
250                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
251                 return -1;
252         }
253
254         if (type == TLS_HANDSHAKE_TYPE_SERVER_KEY_EXCHANGE)
255                 return tls_process_server_key_exchange(conn, ct, in_data,
256                                                        in_len);
257         if (type == TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST)
258                 return tls_process_certificate_request(conn, ct, in_data,
259                                                        in_len);
260         if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
261                 return tls_process_server_hello_done(conn, ct, in_data,
262                                                      in_len);
263         if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE) {
264                 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
265                            "message %d (expected Certificate/"
266                            "ServerKeyExchange/CertificateRequest/"
267                            "ServerHelloDone)", type);
268                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
269                           TLS_ALERT_UNEXPECTED_MESSAGE);
270                 return -1;
271         }
272
273         wpa_printf(MSG_DEBUG,
274                    "TLSv1: Received Certificate (certificate_list len %lu)",
275                    (unsigned long) len);
276
277         /*
278          * opaque ASN.1Cert<2^24-1>;
279          *
280          * struct {
281          *     ASN.1Cert certificate_list<1..2^24-1>;
282          * } Certificate;
283          */
284
285         end = pos + len;
286
287         if (end - pos < 3) {
288                 wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate "
289                            "(left=%lu)", (unsigned long) left);
290                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
291                 return -1;
292         }
293
294         list_len = WPA_GET_BE24(pos);
295         pos += 3;
296
297         if ((size_t) (end - pos) != list_len) {
298                 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate_list "
299                            "length (len=%lu left=%lu)",
300                            (unsigned long) list_len,
301                            (unsigned long) (end - pos));
302                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
303                 return -1;
304         }
305
306         idx = 0;
307         while (pos < end) {
308                 if (end - pos < 3) {
309                         wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
310                                    "certificate_list");
311                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
312                                   TLS_ALERT_DECODE_ERROR);
313                         x509_certificate_chain_free(chain);
314                         return -1;
315                 }
316
317                 cert_len = WPA_GET_BE24(pos);
318                 pos += 3;
319
320                 if ((size_t) (end - pos) < cert_len) {
321                         wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate "
322                                    "length (len=%lu left=%lu)",
323                                    (unsigned long) cert_len,
324                                    (unsigned long) (end - pos));
325                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
326                                   TLS_ALERT_DECODE_ERROR);
327                         x509_certificate_chain_free(chain);
328                         return -1;
329                 }
330
331                 wpa_printf(MSG_DEBUG, "TLSv1: Certificate %lu (len %lu)",
332                            (unsigned long) idx, (unsigned long) cert_len);
333
334                 if (idx == 0) {
335                         crypto_public_key_free(conn->server_rsa_key);
336                         if (tls_parse_cert(pos, cert_len,
337                                            &conn->server_rsa_key)) {
338                                 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
339                                            "the certificate");
340                                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
341                                           TLS_ALERT_BAD_CERTIFICATE);
342                                 x509_certificate_chain_free(chain);
343                                 return -1;
344                         }
345                 }
346
347                 cert = x509_certificate_parse(pos, cert_len);
348                 if (cert == NULL) {
349                         wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
350                                    "the certificate");
351                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
352                                   TLS_ALERT_BAD_CERTIFICATE);
353                         x509_certificate_chain_free(chain);
354                         return -1;
355                 }
356
357                 if (last == NULL)
358                         chain = cert;
359                 else
360                         last->next = cert;
361                 last = cert;
362
363                 idx++;
364                 pos += cert_len;
365         }
366
367         if (conn->cred &&
368             x509_certificate_chain_validate(conn->cred->trusted_certs, chain,
369                                             &reason, conn->disable_time_checks)
370             < 0) {
371                 int tls_reason;
372                 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
373                            "validation failed (reason=%d)", reason);
374                 switch (reason) {
375                 case X509_VALIDATE_BAD_CERTIFICATE:
376                         tls_reason = TLS_ALERT_BAD_CERTIFICATE;
377                         break;
378                 case X509_VALIDATE_UNSUPPORTED_CERTIFICATE:
379                         tls_reason = TLS_ALERT_UNSUPPORTED_CERTIFICATE;
380                         break;
381                 case X509_VALIDATE_CERTIFICATE_REVOKED:
382                         tls_reason = TLS_ALERT_CERTIFICATE_REVOKED;
383                         break;
384                 case X509_VALIDATE_CERTIFICATE_EXPIRED:
385                         tls_reason = TLS_ALERT_CERTIFICATE_EXPIRED;
386                         break;
387                 case X509_VALIDATE_CERTIFICATE_UNKNOWN:
388                         tls_reason = TLS_ALERT_CERTIFICATE_UNKNOWN;
389                         break;
390                 case X509_VALIDATE_UNKNOWN_CA:
391                         tls_reason = TLS_ALERT_UNKNOWN_CA;
392                         break;
393                 default:
394                         tls_reason = TLS_ALERT_BAD_CERTIFICATE;
395                         break;
396                 }
397                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, tls_reason);
398                 x509_certificate_chain_free(chain);
399                 return -1;
400         }
401
402         x509_certificate_chain_free(chain);
403
404         *in_len = end - in_data;
405
406         conn->state = SERVER_KEY_EXCHANGE;
407
408         return 0;
409 }
410
411
412 static unsigned int count_bits(const u8 *val, size_t len)
413 {
414         size_t i;
415         unsigned int bits;
416         u8 tmp;
417
418         for (i = 0; i < len; i++) {
419                 if (val[i])
420                         break;
421         }
422         if (i == len)
423                 return 0;
424
425         bits = (len - i - 1) * 8;
426         tmp = val[i];
427         while (tmp) {
428                 bits++;
429                 tmp >>= 1;
430         }
431
432         return bits;
433 }
434
435
436 static int tlsv1_process_diffie_hellman(struct tlsv1_client *conn,
437                                         const u8 *buf, size_t len,
438                                         tls_key_exchange key_exchange)
439 {
440         const u8 *pos, *end, *server_params, *server_params_end;
441         u8 alert;
442         unsigned int bits;
443         u16 val;
444
445         tlsv1_client_free_dh(conn);
446
447         pos = buf;
448         end = buf + len;
449
450         if (end - pos < 3)
451                 goto fail;
452         server_params = pos;
453         val = WPA_GET_BE16(pos);
454         pos += 2;
455         if (val == 0 || val > (size_t) (end - pos)) {
456                 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %u", val);
457                 goto fail;
458         }
459         conn->dh_p_len = val;
460         bits = count_bits(pos, conn->dh_p_len);
461         if (bits < 768) {
462                 wpa_printf(MSG_INFO, "TLSv1: Reject under 768-bit DH prime (insecure; only %u bits)",
463                            bits);
464                 wpa_hexdump(MSG_DEBUG, "TLSv1: Rejected DH prime",
465                             pos, conn->dh_p_len);
466                 goto fail;
467         }
468         conn->dh_p = os_malloc(conn->dh_p_len);
469         if (conn->dh_p == NULL)
470                 goto fail;
471         os_memcpy(conn->dh_p, pos, conn->dh_p_len);
472         pos += conn->dh_p_len;
473         wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)",
474                     conn->dh_p, conn->dh_p_len);
475
476         if (end - pos < 3)
477                 goto fail;
478         val = WPA_GET_BE16(pos);
479         pos += 2;
480         if (val == 0 || val > (size_t) (end - pos))
481                 goto fail;
482         conn->dh_g_len = val;
483         conn->dh_g = os_malloc(conn->dh_g_len);
484         if (conn->dh_g == NULL)
485                 goto fail;
486         os_memcpy(conn->dh_g, pos, conn->dh_g_len);
487         pos += conn->dh_g_len;
488         wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)",
489                     conn->dh_g, conn->dh_g_len);
490         if (conn->dh_g_len == 1 && conn->dh_g[0] < 2)
491                 goto fail;
492
493         if (end - pos < 3)
494                 goto fail;
495         val = WPA_GET_BE16(pos);
496         pos += 2;
497         if (val == 0 || val > (size_t) (end - pos))
498                 goto fail;
499         conn->dh_ys_len = val;
500         conn->dh_ys = os_malloc(conn->dh_ys_len);
501         if (conn->dh_ys == NULL)
502                 goto fail;
503         os_memcpy(conn->dh_ys, pos, conn->dh_ys_len);
504         pos += conn->dh_ys_len;
505         wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)",
506                     conn->dh_ys, conn->dh_ys_len);
507         server_params_end = pos;
508
509         if (key_exchange == TLS_KEY_X_DHE_RSA) {
510                 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
511                 int hlen;
512
513                 if (conn->rl.tls_version == TLS_VERSION_1_2) {
514 #ifdef CONFIG_TLSV12
515                         /*
516                          * RFC 5246, 4.7:
517                          * TLS v1.2 adds explicit indication of the used
518                          * signature and hash algorithms.
519                          *
520                          * struct {
521                          *   HashAlgorithm hash;
522                          *   SignatureAlgorithm signature;
523                          * } SignatureAndHashAlgorithm;
524                          */
525                         if (end - pos < 2)
526                                 goto fail;
527                         if (pos[0] != TLS_HASH_ALG_SHA256 ||
528                             pos[1] != TLS_SIGN_ALG_RSA) {
529                                 wpa_printf(MSG_DEBUG, "TLSv1.2: Unsupported hash(%u)/signature(%u) algorithm",
530                                            pos[0], pos[1]);
531                                 goto fail;
532                         }
533                         pos += 2;
534
535                         hlen = tlsv12_key_x_server_params_hash(
536                                 conn->rl.tls_version, conn->client_random,
537                                 conn->server_random, server_params,
538                                 server_params_end - server_params, hash);
539 #else /* CONFIG_TLSV12 */
540                         goto fail;
541 #endif /* CONFIG_TLSV12 */
542                 } else {
543                         hlen = tls_key_x_server_params_hash(
544                                 conn->rl.tls_version, conn->client_random,
545                                 conn->server_random, server_params,
546                                 server_params_end - server_params, hash);
547                 }
548
549                 if (hlen < 0)
550                         goto fail;
551                 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerKeyExchange hash",
552                             hash, hlen);
553
554                 if (tls_verify_signature(conn->rl.tls_version,
555                                          conn->server_rsa_key,
556                                          hash, hlen, pos, end - pos,
557                                          &alert) < 0)
558                         goto fail;
559         }
560
561         return 0;
562
563 fail:
564         wpa_printf(MSG_DEBUG, "TLSv1: Processing DH params failed");
565         tlsv1_client_free_dh(conn);
566         return -1;
567 }
568
569
570 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
571                                            const u8 *in_data, size_t *in_len)
572 {
573         const u8 *pos, *end;
574         size_t left, len;
575         u8 type;
576         const struct tls_cipher_suite *suite;
577
578         if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
579                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
580                            "received content type 0x%x", ct);
581                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
582                           TLS_ALERT_UNEXPECTED_MESSAGE);
583                 return -1;
584         }
585
586         pos = in_data;
587         left = *in_len;
588
589         if (left < 4) {
590                 wpa_printf(MSG_DEBUG, "TLSv1: Too short ServerKeyExchange "
591                            "(Left=%lu)", (unsigned long) left);
592                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
593                 return -1;
594         }
595
596         type = *pos++;
597         len = WPA_GET_BE24(pos);
598         pos += 3;
599         left -= 4;
600
601         if (len > left) {
602                 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerKeyExchange "
603                            "length (len=%lu != left=%lu)",
604                            (unsigned long) len, (unsigned long) left);
605                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
606                 return -1;
607         }
608
609         end = pos + len;
610
611         if (type == TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST)
612                 return tls_process_certificate_request(conn, ct, in_data,
613                                                        in_len);
614         if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
615                 return tls_process_server_hello_done(conn, ct, in_data,
616                                                      in_len);
617         if (type != TLS_HANDSHAKE_TYPE_SERVER_KEY_EXCHANGE) {
618                 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
619                            "message %d (expected ServerKeyExchange/"
620                            "CertificateRequest/ServerHelloDone)", type);
621                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
622                           TLS_ALERT_UNEXPECTED_MESSAGE);
623                 return -1;
624         }
625
626         wpa_printf(MSG_DEBUG, "TLSv1: Received ServerKeyExchange");
627
628         if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) {
629                 wpa_printf(MSG_DEBUG, "TLSv1: ServerKeyExchange not allowed "
630                            "with the selected cipher suite");
631                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
632                           TLS_ALERT_UNEXPECTED_MESSAGE);
633                 return -1;
634         }
635
636         wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len);
637         suite = tls_get_cipher_suite(conn->rl.cipher_suite);
638         if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon ||
639                       suite->key_exchange == TLS_KEY_X_DHE_RSA)) {
640                 if (tlsv1_process_diffie_hellman(conn, pos, len,
641                                                  suite->key_exchange) < 0) {
642                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
643                                   TLS_ALERT_DECODE_ERROR);
644                         return -1;
645                 }
646         } else {
647                 wpa_printf(MSG_DEBUG, "TLSv1: UnexpectedServerKeyExchange");
648                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
649                           TLS_ALERT_UNEXPECTED_MESSAGE);
650                 return -1;
651         }
652
653         *in_len = end - in_data;
654
655         conn->state = SERVER_CERTIFICATE_REQUEST;
656
657         return 0;
658 }
659
660
661 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
662                                            const u8 *in_data, size_t *in_len)
663 {
664         const u8 *pos, *end;
665         size_t left, len;
666         u8 type;
667
668         if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
669                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
670                            "received content type 0x%x", ct);
671                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
672                           TLS_ALERT_UNEXPECTED_MESSAGE);
673                 return -1;
674         }
675
676         pos = in_data;
677         left = *in_len;
678
679         if (left < 4) {
680                 wpa_printf(MSG_DEBUG, "TLSv1: Too short CertificateRequest "
681                            "(left=%lu)", (unsigned long) left);
682                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
683                 return -1;
684         }
685
686         type = *pos++;
687         len = WPA_GET_BE24(pos);
688         pos += 3;
689         left -= 4;
690
691         if (len > left) {
692                 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in CertificateRequest "
693                            "length (len=%lu != left=%lu)",
694                            (unsigned long) len, (unsigned long) left);
695                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
696                 return -1;
697         }
698
699         end = pos + len;
700
701         if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
702                 return tls_process_server_hello_done(conn, ct, in_data,
703                                                      in_len);
704         if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST) {
705                 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
706                            "message %d (expected CertificateRequest/"
707                            "ServerHelloDone)", type);
708                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
709                           TLS_ALERT_UNEXPECTED_MESSAGE);
710                 return -1;
711         }
712
713         wpa_printf(MSG_DEBUG, "TLSv1: Received CertificateRequest");
714
715         conn->certificate_requested = 1;
716
717         *in_len = end - in_data;
718
719         conn->state = SERVER_HELLO_DONE;
720
721         return 0;
722 }
723
724
725 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
726                                          const u8 *in_data, size_t *in_len)
727 {
728         const u8 *pos, *end;
729         size_t left, len;
730         u8 type;
731
732         if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
733                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
734                            "received content type 0x%x", ct);
735                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
736                           TLS_ALERT_UNEXPECTED_MESSAGE);
737                 return -1;
738         }
739
740         pos = in_data;
741         left = *in_len;
742
743         if (left < 4) {
744                 wpa_printf(MSG_DEBUG, "TLSv1: Too short ServerHelloDone "
745                            "(left=%lu)", (unsigned long) left);
746                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
747                 return -1;
748         }
749
750         type = *pos++;
751         len = WPA_GET_BE24(pos);
752         pos += 3;
753         left -= 4;
754
755         if (len > left) {
756                 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerHelloDone "
757                            "length (len=%lu != left=%lu)",
758                            (unsigned long) len, (unsigned long) left);
759                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
760                 return -1;
761         }
762         end = pos + len;
763
764         if (type != TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE) {
765                 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
766                            "message %d (expected ServerHelloDone)", type);
767                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
768                           TLS_ALERT_UNEXPECTED_MESSAGE);
769                 return -1;
770         }
771
772         wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHelloDone");
773
774         *in_len = end - in_data;
775
776         conn->state = CLIENT_KEY_EXCHANGE;
777
778         return 0;
779 }
780
781
782 static int tls_process_server_change_cipher_spec(struct tlsv1_client *conn,
783                                                  u8 ct, const u8 *in_data,
784                                                  size_t *in_len)
785 {
786         const u8 *pos;
787         size_t left;
788
789         if (ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC) {
790                 wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
791                            "received content type 0x%x", ct);
792                 if (conn->use_session_ticket) {
793                         int res;
794                         wpa_printf(MSG_DEBUG, "TLSv1: Server may have "
795                                    "rejected SessionTicket");
796                         conn->use_session_ticket = 0;
797
798                         /* Notify upper layers that SessionTicket failed */
799                         res = conn->session_ticket_cb(
800                                 conn->session_ticket_cb_ctx, NULL, 0, NULL,
801                                 NULL, NULL);
802                         if (res < 0) {
803                                 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket "
804                                            "callback indicated failure");
805                                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
806                                           TLS_ALERT_HANDSHAKE_FAILURE);
807                                 return -1;
808                         }
809
810                         conn->state = SERVER_CERTIFICATE;
811                         return tls_process_certificate(conn, ct, in_data,
812                                                        in_len);
813                 }
814                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
815                           TLS_ALERT_UNEXPECTED_MESSAGE);
816                 return -1;
817         }
818
819         pos = in_data;
820         left = *in_len;
821
822         if (left < 1) {
823                 wpa_printf(MSG_DEBUG, "TLSv1: Too short ChangeCipherSpec");
824                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
825                 return -1;
826         }
827
828         if (*pos != TLS_CHANGE_CIPHER_SPEC) {
829                 wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
830                            "received data 0x%x", *pos);
831                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
832                           TLS_ALERT_UNEXPECTED_MESSAGE);
833                 return -1;
834         }
835
836         wpa_printf(MSG_DEBUG, "TLSv1: Received ChangeCipherSpec");
837         if (tlsv1_record_change_read_cipher(&conn->rl) < 0) {
838                 wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher "
839                            "for record layer");
840                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
841                           TLS_ALERT_INTERNAL_ERROR);
842                 return -1;
843         }
844
845         *in_len = pos + 1 - in_data;
846
847         conn->state = SERVER_FINISHED;
848
849         return 0;
850 }
851
852
853 static int tls_process_server_finished(struct tlsv1_client *conn, u8 ct,
854                                        const u8 *in_data, size_t *in_len)
855 {
856         const u8 *pos, *end;
857         size_t left, len, hlen;
858         u8 verify_data[TLS_VERIFY_DATA_LEN];
859         u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
860
861         if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
862                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Finished; "
863                            "received content type 0x%x", ct);
864                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
865                           TLS_ALERT_UNEXPECTED_MESSAGE);
866                 return -1;
867         }
868
869         pos = in_data;
870         left = *in_len;
871
872         if (left < 4) {
873                 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (left=%lu) for "
874                            "Finished",
875                            (unsigned long) left);
876                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
877                           TLS_ALERT_DECODE_ERROR);
878                 return -1;
879         }
880
881         if (pos[0] != TLS_HANDSHAKE_TYPE_FINISHED) {
882                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Finished; received "
883                            "type 0x%x", pos[0]);
884                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
885                           TLS_ALERT_UNEXPECTED_MESSAGE);
886                 return -1;
887         }
888
889         len = WPA_GET_BE24(pos + 1);
890
891         pos += 4;
892         left -= 4;
893
894         if (len > left) {
895                 wpa_printf(MSG_DEBUG, "TLSv1: Too short buffer for Finished "
896                            "(len=%lu > left=%lu)",
897                            (unsigned long) len, (unsigned long) left);
898                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
899                           TLS_ALERT_DECODE_ERROR);
900                 return -1;
901         }
902         end = pos + len;
903         if (len != TLS_VERIFY_DATA_LEN) {
904                 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
905                            "in Finished: %lu (expected %d)",
906                            (unsigned long) len, TLS_VERIFY_DATA_LEN);
907                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
908                           TLS_ALERT_DECODE_ERROR);
909                 return -1;
910         }
911         wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
912                     pos, TLS_VERIFY_DATA_LEN);
913
914 #ifdef CONFIG_TLSV12
915         if (conn->rl.tls_version >= TLS_VERSION_1_2) {
916                 hlen = SHA256_MAC_LEN;
917                 if (conn->verify.sha256_server == NULL ||
918                     crypto_hash_finish(conn->verify.sha256_server, hash, &hlen)
919                     < 0) {
920                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
921                                   TLS_ALERT_INTERNAL_ERROR);
922                         conn->verify.sha256_server = NULL;
923                         return -1;
924                 }
925                 conn->verify.sha256_server = NULL;
926         } else {
927 #endif /* CONFIG_TLSV12 */
928
929         hlen = MD5_MAC_LEN;
930         if (conn->verify.md5_server == NULL ||
931             crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) {
932                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
933                           TLS_ALERT_INTERNAL_ERROR);
934                 conn->verify.md5_server = NULL;
935                 crypto_hash_finish(conn->verify.sha1_server, NULL, NULL);
936                 conn->verify.sha1_server = NULL;
937                 return -1;
938         }
939         conn->verify.md5_server = NULL;
940         hlen = SHA1_MAC_LEN;
941         if (conn->verify.sha1_server == NULL ||
942             crypto_hash_finish(conn->verify.sha1_server, hash + MD5_MAC_LEN,
943                                &hlen) < 0) {
944                 conn->verify.sha1_server = NULL;
945                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
946                           TLS_ALERT_INTERNAL_ERROR);
947                 return -1;
948         }
949         conn->verify.sha1_server = NULL;
950         hlen = MD5_MAC_LEN + SHA1_MAC_LEN;
951
952 #ifdef CONFIG_TLSV12
953         }
954 #endif /* CONFIG_TLSV12 */
955
956         if (tls_prf(conn->rl.tls_version,
957                     conn->master_secret, TLS_MASTER_SECRET_LEN,
958                     "server finished", hash, hlen,
959                     verify_data, TLS_VERIFY_DATA_LEN)) {
960                 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
961                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
962                           TLS_ALERT_DECRYPT_ERROR);
963                 return -1;
964         }
965         wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
966                         verify_data, TLS_VERIFY_DATA_LEN);
967
968         if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
969                 wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
970                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
971                           TLS_ALERT_DECRYPT_ERROR);
972                 return -1;
973         }
974
975         wpa_printf(MSG_DEBUG, "TLSv1: Received Finished");
976
977         *in_len = end - in_data;
978
979         conn->state = (conn->session_resumed || conn->use_session_ticket) ?
980                 CHANGE_CIPHER_SPEC : ACK_FINISHED;
981
982         return 0;
983 }
984
985
986 static int tls_process_application_data(struct tlsv1_client *conn, u8 ct,
987                                         const u8 *in_data, size_t *in_len,
988                                         u8 **out_data, size_t *out_len)
989 {
990         const u8 *pos;
991         size_t left;
992
993         if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
994                 wpa_printf(MSG_DEBUG, "TLSv1: Expected Application Data; "
995                            "received content type 0x%x", ct);
996                 tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
997                           TLS_ALERT_UNEXPECTED_MESSAGE);
998                 return -1;
999         }
1000
1001         pos = in_data;
1002         left = *in_len;
1003
1004         wpa_hexdump(MSG_DEBUG, "TLSv1: Application Data included in Handshake",
1005                     pos, left);
1006
1007         *out_data = os_malloc(left);
1008         if (*out_data) {
1009                 os_memcpy(*out_data, pos, left);
1010                 *out_len = left;
1011         }
1012
1013         return 0;
1014 }
1015
1016
1017 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
1018                                    const u8 *buf, size_t *len,
1019                                    u8 **out_data, size_t *out_len)
1020 {
1021         if (ct == TLS_CONTENT_TYPE_ALERT) {
1022                 if (*len < 2) {
1023                         wpa_printf(MSG_DEBUG, "TLSv1: Alert underflow");
1024                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1025                                   TLS_ALERT_DECODE_ERROR);
1026                         return -1;
1027                 }
1028                 wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
1029                            buf[0], buf[1]);
1030                 *len = 2;
1031                 conn->state = FAILED;
1032                 return -1;
1033         }
1034
1035         if (ct == TLS_CONTENT_TYPE_HANDSHAKE && *len >= 4 &&
1036             buf[0] == TLS_HANDSHAKE_TYPE_HELLO_REQUEST) {
1037                 size_t hr_len = WPA_GET_BE24(buf + 1);
1038                 if (hr_len > *len - 4) {
1039                         wpa_printf(MSG_DEBUG, "TLSv1: HelloRequest underflow");
1040                         tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1041                                   TLS_ALERT_DECODE_ERROR);
1042                         return -1;
1043                 }
1044                 wpa_printf(MSG_DEBUG, "TLSv1: Ignored HelloRequest");
1045                 *len = 4 + hr_len;
1046                 return 0;
1047         }
1048
1049         switch (conn->state) {
1050         case SERVER_HELLO:
1051                 if (tls_process_server_hello(conn, ct, buf, len))
1052                         return -1;
1053                 break;
1054         case SERVER_CERTIFICATE:
1055                 if (tls_process_certificate(conn, ct, buf, len))
1056                         return -1;
1057                 break;
1058         case SERVER_KEY_EXCHANGE:
1059                 if (tls_process_server_key_exchange(conn, ct, buf, len))
1060                         return -1;
1061                 break;
1062         case SERVER_CERTIFICATE_REQUEST:
1063                 if (tls_process_certificate_request(conn, ct, buf, len))
1064                         return -1;
1065                 break;
1066         case SERVER_HELLO_DONE:
1067                 if (tls_process_server_hello_done(conn, ct, buf, len))
1068                         return -1;
1069                 break;
1070         case SERVER_CHANGE_CIPHER_SPEC:
1071                 if (tls_process_server_change_cipher_spec(conn, ct, buf, len))
1072                         return -1;
1073                 break;
1074         case SERVER_FINISHED:
1075                 if (tls_process_server_finished(conn, ct, buf, len))
1076                         return -1;
1077                 break;
1078         case ACK_FINISHED:
1079                 if (out_data &&
1080                     tls_process_application_data(conn, ct, buf, len, out_data,
1081                                                  out_len))
1082                         return -1;
1083                 break;
1084         default:
1085                 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected state %d "
1086                            "while processing received message",
1087                            conn->state);
1088                 return -1;
1089         }
1090
1091         if (ct == TLS_CONTENT_TYPE_HANDSHAKE)
1092                 tls_verify_hash_add(&conn->verify, buf, *len);
1093
1094         return 0;
1095 }