Blame lib/extv.c

Packit Service 4684c1
/*
Packit Service 4684c1
 * Copyright (C) 2017-2018 Red Hat, Inc.
Packit Service 4684c1
 *
Packit Service 4684c1
 * Author: Nikos Mavrogiannopoulos
Packit Service 4684c1
 *
Packit Service 4684c1
 * This file is part of GnuTLS.
Packit Service 4684c1
 *
Packit Service 4684c1
 * The GnuTLS is free software; you can redistribute it and/or
Packit Service 4684c1
 * modify it under the terms of the GNU Lesser General Public License
Packit Service 4684c1
 * as published by the Free Software Foundation; either version 2.1 of
Packit Service 4684c1
 * the License, or (at your option) any later version.
Packit Service 4684c1
 *
Packit Service 4684c1
 * This library is distributed in the hope that it will be useful, but
Packit Service 4684c1
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 4684c1
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit Service 4684c1
 * Lesser General Public License for more details.
Packit Service 4684c1
 *
Packit Service 4684c1
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 4684c1
 * along with this program.  If not, see <https://www.gnu.org/licenses/>
Packit Service 4684c1
 *
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
#include "gnutls_int.h"
Packit Service 4684c1
#include "hello_ext.h"
Packit Service 4684c1
#include "errors.h"
Packit Service 4684c1
#include "extv.h"
Packit Service 4684c1
Packit Service 4684c1
/* Iterates through all extensions found, and calls the cb()
Packit Service 4684c1
 * function with their data */
Packit Service 4684c1
int _gnutls_extv_parse(void *ctx,
Packit Service 4684c1
		       gnutls_ext_raw_process_func cb,
Packit Service 4684c1
		       const uint8_t * data, int data_size)
Packit Service 4684c1
{
Packit Service 4684c1
	int next, ret;
Packit Service 4684c1
	int pos = 0;
Packit Service 4684c1
	uint16_t tls_id;
Packit Service 4684c1
	const uint8_t *sdata;
Packit Service 4684c1
	uint16_t size;
Packit Service 4684c1
Packit Service 4684c1
	if (data_size == 0)
Packit Service 4684c1
		return 0;
Packit Service 4684c1
Packit Service 4684c1
	DECR_LENGTH_RET(data_size, 2, GNUTLS_E_UNEXPECTED_EXTENSIONS_LENGTH);
Packit Service 4684c1
	next = _gnutls_read_uint16(data);
Packit Service 4684c1
	pos += 2;
Packit Service 4684c1
Packit Service 4684c1
	DECR_LENGTH_RET(data_size, next, GNUTLS_E_UNEXPECTED_EXTENSIONS_LENGTH);
Packit Service 4684c1
Packit Service 4684c1
	if (next == 0 && data_size == 0) /* field is present, but has zero length? Ignore it. */
Packit Service 4684c1
		return 0;
Packit Service 4684c1
	else if (data_size > 0) /* forbid unaccounted data */
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_UNEXPECTED_EXTENSIONS_LENGTH);
Packit Service 4684c1
Packit Service 4684c1
	do {
Packit Service 4684c1
		DECR_LENGTH_RET(next, 2, GNUTLS_E_UNEXPECTED_EXTENSIONS_LENGTH);
Packit Service 4684c1
		tls_id = _gnutls_read_uint16(&data[pos]);
Packit Service 4684c1
		pos += 2;
Packit Service 4684c1
Packit Service 4684c1
		DECR_LENGTH_RET(next, 2, GNUTLS_E_UNEXPECTED_EXTENSIONS_LENGTH);
Packit Service 4684c1
		size = _gnutls_read_uint16(&data[pos]);
Packit Service 4684c1
		pos += 2;
Packit Service 4684c1
Packit Service 4684c1
		DECR_LENGTH_RET(next, size, GNUTLS_E_UNEXPECTED_EXTENSIONS_LENGTH);
Packit Service 4684c1
		sdata = &data[pos];
Packit Service 4684c1
		pos += size;
Packit Service 4684c1
Packit Service 4684c1
		ret = cb(ctx, tls_id, sdata, size);
Packit Service 4684c1
		if (ret < 0)
Packit Service 4684c1
			return gnutls_assert_val(ret);
Packit Service 4684c1
	}
Packit Service 4684c1
	while (next > 2);
Packit Service 4684c1
Packit Service 4684c1
	/* forbid leftovers */
Packit Service 4684c1
	if (next > 0)
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_UNEXPECTED_EXTENSIONS_LENGTH);
Packit Service 4684c1
Packit Service 4684c1
	return 0;
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
#define HANDSHAKE_SESSION_ID_POS (34)
Packit Service 4684c1
/**
Packit Service 4684c1
 * gnutls_ext_raw_parse:
Packit Service 4684c1
 * @ctx: a pointer to pass to callback function
Packit Service 4684c1
 * @cb: callback function to process each extension found
Packit Service 4684c1
 * @data: TLS extension data
Packit Service 4684c1
 * @flags: should be zero or %GNUTLS_EXT_RAW_FLAG_TLS_CLIENT_HELLO or %GNUTLS_EXT_RAW_FLAG_DTLS_CLIENT_HELLO
Packit Service 4684c1
 *
Packit Service 4684c1
 * This function iterates through the TLS extensions as passed in
Packit Service 4684c1
 * @data, passing the individual extension data to callback. The
Packit Service 4684c1
 * @data must conform to Extension extensions<0..2^16-1> format.
Packit Service 4684c1
 *
Packit Service 4684c1
 * If flags is %GNUTLS_EXT_RAW_TLS_FLAG_CLIENT_HELLO then this function
Packit Service 4684c1
 * will parse the extension data from the position, as if the packet in
Packit Service 4684c1
 * @data is a client hello (without record or handshake headers) -
Packit Service 4684c1
 * as provided by gnutls_handshake_set_hook_function().
Packit Service 4684c1
 *
Packit Service 4684c1
 * The return value of the callback will be propagated.
Packit Service 4684c1
 *
Packit Service 4684c1
 * Returns: %GNUTLS_E_SUCCESS on success, or an error code. On unknown
Packit Service 4684c1
 *   flags it returns %GNUTLS_E_INVALID_REQUEST.
Packit Service 4684c1
 *
Packit Service 4684c1
 * Since: 3.6.3
Packit Service 4684c1
 **/
Packit Service 4684c1
int gnutls_ext_raw_parse(void *ctx, gnutls_ext_raw_process_func cb,
Packit Service 4684c1
			 const gnutls_datum_t *data, unsigned int flags)
Packit Service 4684c1
{
Packit Service 4684c1
	if (flags & GNUTLS_EXT_RAW_FLAG_TLS_CLIENT_HELLO) {
Packit Service 4684c1
		size_t size = data->size;
Packit Service 4684c1
		size_t len;
Packit Service 4684c1
		uint8_t *p = data->data;
Packit Service 4684c1
Packit Service 4684c1
		DECR_LEN(size, HANDSHAKE_SESSION_ID_POS);
Packit Service 4684c1
Packit Service 4684c1
		if (p[0] != 0x03)
Packit Service 4684c1
			return gnutls_assert_val(GNUTLS_E_UNSUPPORTED_VERSION_PACKET);
Packit Service 4684c1
Packit Service 4684c1
		p += HANDSHAKE_SESSION_ID_POS;
Packit Service 4684c1
Packit Service 4684c1
		/* skip session id */
Packit Service 4684c1
		DECR_LEN(size, 1);
Packit Service 4684c1
		len = p[0];
Packit Service 4684c1
		p++;
Packit Service 4684c1
		DECR_LEN(size, len);
Packit Service 4684c1
		p += len;
Packit Service 4684c1
Packit Service 4684c1
		/* CipherSuites */
Packit Service 4684c1
		DECR_LEN(size, 2);
Packit Service 4684c1
		len = _gnutls_read_uint16(p);
Packit Service 4684c1
		p += 2;
Packit Service 4684c1
		DECR_LEN(size, len);
Packit Service 4684c1
		p += len;
Packit Service 4684c1
Packit Service 4684c1
		/* legacy_compression_methods */
Packit Service 4684c1
		DECR_LEN(size, 1);
Packit Service 4684c1
		len = p[0];
Packit Service 4684c1
		p++;
Packit Service 4684c1
		DECR_LEN(size, len);
Packit Service 4684c1
		p += len;
Packit Service 4684c1
Packit Service 4684c1
		if (size == 0)
Packit Service 4684c1
			return gnutls_assert_val(GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE);
Packit Service 4684c1
Packit Service 4684c1
		return _gnutls_extv_parse(ctx, cb, p, size);
Packit Service 4684c1
	} else if (flags & GNUTLS_EXT_RAW_FLAG_DTLS_CLIENT_HELLO) {
Packit Service 4684c1
		size_t size = data->size;
Packit Service 4684c1
		size_t len;
Packit Service 4684c1
		uint8_t *p = data->data;
Packit Service 4684c1
Packit Service 4684c1
		DECR_LEN(size, HANDSHAKE_SESSION_ID_POS);
Packit Service 4684c1
Packit Service 4684c1
		if (p[0] != 254)
Packit Service 4684c1
			return gnutls_assert_val(GNUTLS_E_UNSUPPORTED_VERSION_PACKET);
Packit Service 4684c1
Packit Service 4684c1
		p += HANDSHAKE_SESSION_ID_POS;
Packit Service 4684c1
Packit Service 4684c1
		/* skip session id */
Packit Service 4684c1
		DECR_LEN(size, 1);
Packit Service 4684c1
		len = p[0];
Packit Service 4684c1
		p++;
Packit Service 4684c1
		DECR_LEN(size, len);
Packit Service 4684c1
		p += len;
Packit Service 4684c1
Packit Service 4684c1
		/* skip cookie */
Packit Service 4684c1
		DECR_LEN(size, 1);
Packit Service 4684c1
		len = p[0];
Packit Service 4684c1
		p++;
Packit Service 4684c1
		DECR_LEN(size, len);
Packit Service 4684c1
		p += len;
Packit Service 4684c1
Packit Service 4684c1
		/* CipherSuites */
Packit Service 4684c1
		DECR_LEN(size, 2);
Packit Service 4684c1
		len = _gnutls_read_uint16(p);
Packit Service 4684c1
		p += 2;
Packit Service 4684c1
		DECR_LEN(size, len);
Packit Service 4684c1
		p += len;
Packit Service 4684c1
Packit Service 4684c1
		/* legacy_compression_methods */
Packit Service 4684c1
		DECR_LEN(size, 1);
Packit Service 4684c1
		len = p[0];
Packit Service 4684c1
		p++;
Packit Service 4684c1
		DECR_LEN(size, len);
Packit Service 4684c1
		p += len;
Packit Service 4684c1
Packit Service 4684c1
		if (size == 0)
Packit Service 4684c1
			return gnutls_assert_val(GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE);
Packit Service 4684c1
Packit Service 4684c1
		return _gnutls_extv_parse(ctx, cb, p, size);
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	if (flags != 0)
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
Packit Service 4684c1
Packit Service 4684c1
	return _gnutls_extv_parse(ctx, cb, data->data, data->size);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
/* Returns:
Packit Service 4684c1
 *  * On success the number of bytes appended (always positive), or zero if not sent
Packit Service 4684c1
 *  * On failure, a negative error code.
Packit Service 4684c1
 */
Packit Service 4684c1
int _gnutls_extv_append(gnutls_buffer_st *buf,
Packit Service 4684c1
			uint16_t tls_id,
Packit Service 4684c1
		        void *ctx,
Packit Service 4684c1
		        int (*cb)(void *ctx, gnutls_buffer_st *buf))
Packit Service 4684c1
{
Packit Service 4684c1
	int size_pos, appended, ret;
Packit Service 4684c1
	size_t size_prev;
Packit Service 4684c1
Packit Service 4684c1
	ret = _gnutls_buffer_append_prefix(buf, 16, tls_id);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		return gnutls_assert_val(ret);
Packit Service 4684c1
Packit Service 4684c1
	size_pos = buf->length;
Packit Service 4684c1
	ret = _gnutls_buffer_append_prefix(buf, 16, 0);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		return gnutls_assert_val(ret);
Packit Service 4684c1
Packit Service 4684c1
	size_prev = buf->length;
Packit Service 4684c1
	ret = cb(ctx, buf);
Packit Service 4684c1
	if (ret < 0 && ret != GNUTLS_E_INT_RET_0) {
Packit Service 4684c1
		return gnutls_assert_val(ret);
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	/* returning GNUTLS_E_INT_RET_0 means to send an empty
Packit Service 4684c1
	 * extension of this type.
Packit Service 4684c1
	 */
Packit Service 4684c1
	appended = buf->length - size_prev;
Packit Service 4684c1
Packit Service 4684c1
	if (appended > 0 || ret == GNUTLS_E_INT_RET_0) {
Packit Service 4684c1
		if (ret == GNUTLS_E_INT_RET_0)
Packit Service 4684c1
			appended = 0;
Packit Service 4684c1
Packit Service 4684c1
		/* write the real size */
Packit Service 4684c1
		_gnutls_write_uint16(appended,
Packit Service 4684c1
				     &buf->data[size_pos]);
Packit Service 4684c1
	} else if (appended == 0) {
Packit Service 4684c1
		buf->length -= 4;	/* reset type and size */
Packit Service 4684c1
		return 0;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	return appended + 4;
Packit Service 4684c1
}
Packit Service 4684c1