Blame lib/handshake-checks.c

Packit Service 4684c1
/*
Packit Service 4684c1
 * Copyright (C) 2015-2016 Red Hat, Inc.
Packit Service 4684c1
 *
Packit Service 4684c1
 * Author: Nikos Mavrogiannopoulos
Packit Service 4684c1
 *
Packit Service 4684c1
 * This file is part of GnuTLS.
Packit Service 4684c1
 *
Packit Service 4684c1
 * The GnuTLS is free software; you can redistribute it and/or
Packit Service 4684c1
 * modify it under the terms of the GNU Lesser General Public License
Packit Service 4684c1
 * as published by the Free Software Foundation; either version 2.1 of
Packit Service 4684c1
 * the License, or (at your option) any later version.
Packit Service 4684c1
 *
Packit Service 4684c1
 * This library is distributed in the hope that it will be useful, but
Packit Service 4684c1
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 4684c1
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit Service 4684c1
 * Lesser General Public License for more details.
Packit Service 4684c1
 *
Packit Service 4684c1
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 4684c1
 * along with this program.  If not, see <https://www.gnu.org/licenses/>
Packit Service 4684c1
 *
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
/* Functions that relate to the TLS handshake procedure.
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
#include "gnutls_int.h"
Packit Service 4684c1
#include "errors.h"
Packit Service 4684c1
#include "debug.h"
Packit Service 4684c1
#include "handshake.h"
Packit Service 4684c1
#include <auth/cert.h>
Packit Service 4684c1
#include "constate.h"
Packit Service 4684c1
#include <record.h>
Packit Service 4684c1
#include <state.h>
Packit Service 4684c1
#include <ext/safe_renegotiation.h>
Packit Service 4684c1
#include <auth/anon.h>		/* for gnutls_anon_server_credentials_t */
Packit Service 4684c1
#include <auth/psk.h>		/* for gnutls_psk_server_credentials_t */
Packit Service 4684c1
#ifdef ENABLE_SRP
Packit Service 4684c1
# include <auth/srp_kx.h>
Packit Service 4684c1
#endif
Packit Service 4684c1
Packit Service 4684c1
int _gnutls_check_id_for_change(gnutls_session_t session)
Packit Service 4684c1
{
Packit Service 4684c1
	int cred_type;
Packit Service 4684c1
Packit Service 4684c1
	/* This checks in PSK and SRP ciphersuites that the username remained the
Packit Service 4684c1
	 * same on a rehandshake. */
Packit Service 4684c1
	if (session->internals.flags & GNUTLS_ALLOW_ID_CHANGE)
Packit Service 4684c1
		return 0;
Packit Service 4684c1
Packit Service 4684c1
	cred_type = gnutls_auth_get_type(session);
Packit Service 4684c1
	if (cred_type == GNUTLS_CRD_PSK || cred_type == GNUTLS_CRD_SRP) {
Packit Service 4684c1
		const char *username = NULL;
Packit Service 4684c1
		int username_length;
Packit Service 4684c1
Packit Service 4684c1
		if (cred_type == GNUTLS_CRD_PSK) {
Packit Service 4684c1
			psk_auth_info_t ai;
Packit Service 4684c1
Packit Service 4684c1
			ai = _gnutls_get_auth_info(session, GNUTLS_CRD_PSK);
Packit Service 4684c1
			if (ai == NULL)
Packit Service 4684c1
				return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
Packit Service 4684c1
			username = ai->username;
Packit Service 4684c1
			username_length = ai->username_len;
Packit Service 4684c1
#ifdef ENABLE_SRP
Packit Service 4684c1
		} else {
Packit Service 4684c1
			srp_server_auth_info_t ai = _gnutls_get_auth_info(session, GNUTLS_CRD_SRP);
Packit Service 4684c1
			if (ai == NULL)
Packit Service 4684c1
				return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
Packit Service 4684c1
			username = ai->username;
Packit Service 4684c1
			username_length = strlen(ai->username);
Packit Service 4684c1
#endif
Packit Service 4684c1
		}
Packit Service 4684c1
Packit Service 4684c1
		if (username == NULL)
Packit Service 4684c1
			return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
Packit Service 4684c1
		if (session->internals.saved_username_size != -1) {
Packit Service 4684c1
			if (session->internals.saved_username_size == username_length &&
Packit Service 4684c1
			    strncmp(session->internals.saved_username, username, username_length) != 0) {
Packit Service 4684c1
				_gnutls_debug_log("Session's PSK username changed during rehandshake; aborting!\n");
Packit Service 4684c1
				return gnutls_assert_val(GNUTLS_E_SESSION_USER_ID_CHANGED);
Packit Service 4684c1
			}
Packit Service 4684c1
		} else {
Packit Service 4684c1
			memcpy(session->internals.saved_username, username, username_length);
Packit Service 4684c1
			session->internals.saved_username[username_length] = 0;
Packit Service 4684c1
			session->internals.saved_username_size = username_length;
Packit Service 4684c1
		}
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	return 0;
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
int _gnutls_check_if_cert_hash_is_same(gnutls_session_t session, gnutls_certificate_credentials_t cred)
Packit Service 4684c1
{
Packit Service 4684c1
	cert_auth_info_t ai;
Packit Service 4684c1
	char tmp[32];
Packit Service 4684c1
	int ret;
Packit Service 4684c1
Packit Service 4684c1
	if (session->internals.flags & GNUTLS_ALLOW_ID_CHANGE)
Packit Service 4684c1
		return 0;
Packit Service 4684c1
Packit Service 4684c1
	ai = _gnutls_get_auth_info(session, GNUTLS_CRD_CERTIFICATE);
Packit Service 4684c1
	if (ai == NULL || ai->ncerts == 0)
Packit Service 4684c1
		return 0;
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_hash_fast(GNUTLS_DIG_SHA256, 
Packit Service 4684c1
			       ai->raw_certificate_list[0].data,
Packit Service 4684c1
			       ai->raw_certificate_list[0].size,
Packit Service 4684c1
			       tmp);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		return gnutls_assert_val(ret);
Packit Service 4684c1
Packit Service 4684c1
	if (session->internals.cert_hash_set) {
Packit Service 4684c1
		if (memcmp(tmp, session->internals.cert_hash, 32) != 0) {
Packit Service 4684c1
			_gnutls_debug_log("Session certificate changed during rehandshake; aborting!\n");
Packit Service 4684c1
			return gnutls_assert_val(GNUTLS_E_SESSION_USER_ID_CHANGED);
Packit Service 4684c1
		}
Packit Service 4684c1
	} else {
Packit Service 4684c1
		memcpy(session->internals.cert_hash, tmp, 32);
Packit Service 4684c1
		session->internals.cert_hash_set = 1;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	return 0;
Packit Service 4684c1
}