Blame lib/handshake-tls13.c

Packit aea12f
/*
Packit aea12f
 * Copyright (C) 2017-2018 Red Hat, Inc.
Packit aea12f
 *
Packit aea12f
 * Author: Nikos Mavrogiannopoulos
Packit aea12f
 *
Packit aea12f
 * This file is part of GnuTLS.
Packit aea12f
 *
Packit aea12f
 * The GnuTLS is free software; you can redistribute it and/or
Packit aea12f
 * modify it under the terms of the GNU Lesser General Public License
Packit aea12f
 * as published by the Free Software Foundation; either version 2.1 of
Packit aea12f
 * the License, or (at your option) any later version.
Packit aea12f
 *
Packit aea12f
 * This library is distributed in the hope that it will be useful, but
Packit aea12f
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit aea12f
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit aea12f
 * Lesser General Public License for more details.
Packit aea12f
 *
Packit aea12f
 * You should have received a copy of the GNU Lesser General Public License
Packit aea12f
 * along with this program.  If not, see <https://www.gnu.org/licenses/>
Packit aea12f
 *
Packit aea12f
 */
Packit aea12f
Packit aea12f
/* Functions that relate to the TLS handshake procedure.
Packit aea12f
 */
Packit aea12f
Packit aea12f
#include "gnutls_int.h"
Packit aea12f
#include "errors.h"
Packit aea12f
#include "dh.h"
Packit aea12f
#include "debug.h"
Packit aea12f
#include "algorithms.h"
Packit aea12f
#include "cipher.h"
Packit aea12f
#include "buffers.h"
Packit aea12f
#include "mbuffers.h"
Packit aea12f
#include "kx.h"
Packit aea12f
#include "handshake.h"
Packit aea12f
#include "num.h"
Packit aea12f
#include "hash_int.h"
Packit aea12f
#include "db.h"
Packit aea12f
#include "hello_ext.h"
Packit aea12f
#include "supplemental.h"
Packit aea12f
#include "auth.h"
Packit aea12f
#include "sslv2_compat.h"
Packit aea12f
#include <auth/cert.h>
Packit aea12f
#include "constate.h"
Packit aea12f
#include <record.h>
Packit aea12f
#include <state.h>
Packit aea12f
#include <random.h>
Packit aea12f
#include <dtls.h>
Packit aea12f
#include "secrets.h"
Packit aea12f
#include "tls13/hello_retry.h"
Packit aea12f
#include "tls13/encrypted_extensions.h"
Packit aea12f
#include "tls13/certificate_request.h"
Packit aea12f
#include "tls13/certificate_verify.h"
Packit aea12f
#include "tls13/certificate.h"
Packit aea12f
#include "tls13/early_data.h"
Packit aea12f
#include "tls13/finished.h"
Packit aea12f
#include "tls13/key_update.h"
Packit aea12f
#include "ext/pre_shared_key.h"
Packit aea12f
#include "locks.h"
Packit aea12f
Packit aea12f
static int generate_rms_keys(gnutls_session_t session);
Packit aea12f
static int generate_hs_traffic_keys(gnutls_session_t session);
Packit aea12f
static int generate_ap_traffic_keys(gnutls_session_t session);
Packit aea12f
Packit aea12f
#define SAVE_TRANSCRIPT \
Packit aea12f
	if (session->internals.flags & GNUTLS_POST_HANDSHAKE_AUTH) { \
Packit aea12f
		/* If post-handshake auth is in use we need a copy of the original \
Packit aea12f
		 * handshake transcript */ \
Packit aea12f
		memcpy( &session->internals.post_handshake_hash_buffer, \
Packit aea12f
			&session->internals.handshake_hash_buffer, \
Packit aea12f
			sizeof(session->internals.handshake_hash_buffer)); \
Packit aea12f
		_gnutls_buffer_init(&session->internals.handshake_hash_buffer); \
Packit aea12f
	}
Packit aea12f
Packit aea12f
/*
Packit aea12f
 * _gnutls13_handshake_client
Packit aea12f
 * This function performs the client side of the handshake of the TLS/SSL protocol.
Packit aea12f
 */
Packit aea12f
int _gnutls13_handshake_client(gnutls_session_t session)
Packit aea12f
{
Packit aea12f
	int ret = 0;
Packit aea12f
Packit aea12f
	switch (STATE) {
Packit aea12f
	case STATE99:
Packit aea12f
	case STATE100:
Packit aea12f
#ifdef TLS13_APPENDIX_D4
Packit aea12f
		/* We send it before keys are generated. That works because CCS
Packit aea12f
		 * is always being cached and queued and not being sent directly */
Packit aea12f
		ret = _gnutls_send_change_cipher_spec(session, AGAIN(STATE100));
Packit aea12f
		STATE = STATE100;
Packit aea12f
		IMED_RET("send change cipher spec", ret, 0);
Packit aea12f
#endif
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE101:
Packit aea12f
		/* Note that we check IN_FLIGHT, not ACCEPTED
Packit aea12f
		 * here. This is because the client sends early data
Packit aea12f
		 * speculatively. */
Packit aea12f
		if (session->internals.hsk_flags & HSK_EARLY_DATA_IN_FLIGHT) {
Packit aea12f
			ret = _tls13_write_connection_state_init(session, STAGE_EARLY);
Packit aea12f
			if (ret == 0) {
Packit aea12f
				_gnutls_epoch_bump(session);
Packit aea12f
				ret = _gnutls_epoch_dup(session, EPOCH_WRITE_CURRENT);
Packit aea12f
			}
Packit aea12f
			STATE = STATE101;
Packit aea12f
			IMED_RET_FATAL("set early traffic keys", ret, 0);
Packit aea12f
		}
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE102:
Packit aea12f
		ret = _gnutls13_send_early_data(session);
Packit aea12f
		STATE = STATE102;
Packit aea12f
		IMED_RET("send early data", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE103:
Packit aea12f
		STATE = STATE103;
Packit aea12f
		ret = generate_hs_traffic_keys(session);
Packit aea12f
		/* Note that we check IN_FLIGHT, not ACCEPTED
Packit aea12f
		 * here. This is because the client sends early data
Packit aea12f
		 * speculatively. */
Packit aea12f
		IMED_RET_FATAL("generate hs traffic keys", ret, 0);
Packit aea12f
		if (session->internals.hsk_flags & HSK_EARLY_DATA_IN_FLIGHT)
Packit aea12f
			ret = _tls13_read_connection_state_init(session, STAGE_HS);
Packit aea12f
		else
Packit aea12f
			ret = _tls13_connection_state_init(session, STAGE_HS);
Packit aea12f
		IMED_RET_FATAL("set hs traffic keys", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE104:
Packit aea12f
		ret = _gnutls13_recv_encrypted_extensions(session);
Packit aea12f
		STATE = STATE104;
Packit aea12f
		IMED_RET("recv encrypted extensions", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE105:
Packit aea12f
		ret = _gnutls13_recv_certificate_request(session);
Packit aea12f
		STATE = STATE105;
Packit aea12f
		IMED_RET("recv certificate request", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE106:
Packit aea12f
		ret = _gnutls13_recv_certificate(session);
Packit aea12f
		STATE = STATE106;
Packit aea12f
		IMED_RET("recv certificate", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE107:
Packit aea12f
		ret = _gnutls13_recv_certificate_verify(session);
Packit aea12f
		STATE = STATE107;
Packit aea12f
		IMED_RET("recv server certificate verify", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE108:
Packit aea12f
		ret = _gnutls_run_verify_callback(session, GNUTLS_CLIENT);
Packit aea12f
		STATE = STATE108;
Packit aea12f
		if (ret < 0)
Packit aea12f
			return gnutls_assert_val(ret);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE109:
Packit aea12f
		ret = _gnutls13_recv_finished(session);
Packit aea12f
		STATE = STATE109;
Packit aea12f
		IMED_RET("recv finished", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE110:
Packit aea12f
		ret = _gnutls13_send_end_of_early_data(session, AGAIN(STATE110));
Packit aea12f
		STATE = STATE110;
Packit aea12f
		IMED_RET("send end of early data", ret, 0);
Packit aea12f
Packit aea12f
		/* Note that we check IN_FLIGHT, not ACCEPTED
Packit aea12f
		 * here. This is because the client sends early data
Packit aea12f
		 * speculatively. */
Packit aea12f
		if (session->internals.hsk_flags & HSK_EARLY_DATA_IN_FLIGHT) {
Packit aea12f
			session->internals.hsk_flags &= ~HSK_EARLY_DATA_IN_FLIGHT;
Packit aea12f
			ret = _tls13_write_connection_state_init(session, STAGE_HS);
Packit aea12f
			IMED_RET_FATAL("set hs traffic key after sending early data", ret, 0);
Packit aea12f
		}
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE111:
Packit aea12f
		ret = _gnutls13_send_certificate(session, AGAIN(STATE111));
Packit aea12f
		STATE = STATE111;
Packit aea12f
		IMED_RET("send certificate", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE112:
Packit aea12f
		ret = _gnutls13_send_certificate_verify(session, AGAIN(STATE112));
Packit aea12f
		STATE = STATE112;
Packit aea12f
		IMED_RET("send certificate verify", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE113:
Packit aea12f
		ret = _gnutls13_send_finished(session, AGAIN(STATE113));
Packit aea12f
		STATE = STATE113;
Packit aea12f
		IMED_RET("send finished", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE114:
Packit aea12f
		STATE = STATE114;
Packit aea12f
Packit aea12f
		ret =
Packit aea12f
		    generate_ap_traffic_keys(session);
Packit aea12f
		IMED_RET_FATAL("generate app keys", ret, 0);
Packit aea12f
Packit aea12f
		ret = generate_rms_keys(session);
Packit aea12f
		IMED_RET_FATAL("generate rms keys", ret, 0);
Packit aea12f
Packit aea12f
		/* set traffic keys */
Packit aea12f
		ret = _tls13_connection_state_init(session, STAGE_APP);
Packit aea12f
		IMED_RET_FATAL("set app keys", ret, 0);
Packit aea12f
Packit aea12f
		STATE = STATE0;
Packit aea12f
		break;
Packit aea12f
	default:
Packit aea12f
		return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit aea12f
	}
Packit aea12f
Packit aea12f
	/* no lock of post_negotiation_lock is required here as this is not run
Packit aea12f
	 * after handshake */
Packit aea12f
	session->internals.recv_state = RECV_STATE_0;
Packit aea12f
	session->internals.initial_negotiation_completed = 1;
Packit aea12f
Packit aea12f
	SAVE_TRANSCRIPT;
Packit aea12f
Packit aea12f
	if (session->internals.resumed != RESUME_FALSE)
Packit aea12f
		_gnutls_set_resumed_parameters(session);
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
Packit aea12f
static int generate_non_auth_rms_keys(gnutls_session_t session)
Packit aea12f
{
Packit aea12f
	int ret;
Packit aea12f
	/* we simulate client finished */
Packit aea12f
	uint8_t finished[MAX_HASH_SIZE+TLS_HANDSHAKE_HEADER_SIZE];
Packit aea12f
	unsigned spos;
Packit aea12f
Packit aea12f
	ret = _gnutls13_compute_finished(session->security_parameters.prf,
Packit aea12f
					 session->key.proto.tls13.hs_ckey,
Packit aea12f
					 &session->internals.handshake_hash_buffer,
Packit aea12f
					 finished+TLS_HANDSHAKE_HEADER_SIZE);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	spos = session->internals.handshake_hash_buffer.length;
Packit aea12f
Packit aea12f
	finished[0] = GNUTLS_HANDSHAKE_FINISHED;
Packit aea12f
	_gnutls_write_uint24(session->security_parameters.prf->output_size, finished+1);
Packit aea12f
Packit aea12f
	ret = _gnutls_buffer_append_data(&session->internals.handshake_hash_buffer, finished,
Packit aea12f
					 TLS_HANDSHAKE_HEADER_SIZE+session->security_parameters.prf->output_size);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	ret = _tls13_derive_secret(session, RMS_MASTER_LABEL, sizeof(RMS_MASTER_LABEL)-1,
Packit aea12f
				   session->internals.handshake_hash_buffer.data,
Packit aea12f
				   session->internals.handshake_hash_buffer.length,
Packit aea12f
				   session->key.proto.tls13.temp_secret,
Packit aea12f
				   session->key.proto.tls13.ap_rms);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	session->internals.handshake_hash_buffer.length = spos;
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
Packit aea12f
static int generate_rms_keys(gnutls_session_t session)
Packit aea12f
{
Packit aea12f
	int ret;
Packit aea12f
Packit aea12f
	ret = _tls13_derive_secret(session, RMS_MASTER_LABEL, sizeof(RMS_MASTER_LABEL)-1,
Packit aea12f
				   session->internals.handshake_hash_buffer.data,
Packit aea12f
				   session->internals.handshake_hash_buffer_client_finished_len,
Packit aea12f
				   session->key.proto.tls13.temp_secret,
Packit aea12f
				   session->key.proto.tls13.ap_rms);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
Packit aea12f
static int generate_ap_traffic_keys(gnutls_session_t session)
Packit aea12f
{
Packit aea12f
	int ret;
Packit aea12f
	uint8_t zero[MAX_HASH_SIZE];
Packit aea12f
Packit aea12f
	ret = _tls13_derive_secret(session, DERIVED_LABEL, sizeof(DERIVED_LABEL)-1,
Packit aea12f
				   NULL, 0, session->key.proto.tls13.temp_secret,
Packit aea12f
				   session->key.proto.tls13.temp_secret);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	memset(zero, 0, session->security_parameters.prf->output_size);
Packit aea12f
	ret = _tls13_update_secret(session, zero, session->security_parameters.prf->output_size);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	ret = _tls13_derive_secret(session, EXPORTER_MASTER_LABEL, sizeof(EXPORTER_MASTER_LABEL)-1,
Packit aea12f
				   session->internals.handshake_hash_buffer.data,
Packit aea12f
				   session->internals.handshake_hash_buffer_server_finished_len,
Packit aea12f
				   session->key.proto.tls13.temp_secret,
Packit aea12f
				   session->key.proto.tls13.ap_expkey);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit Service 991b93
	ret = _gnutls_call_keylog_func(session, "EXPORTER_SECRET",
Packit Service 991b93
				       session->key.proto.tls13.ap_expkey,
Packit Service 991b93
				       session->security_parameters.prf->output_size);
Packit Service 991b93
	if (ret < 0)
Packit Service 991b93
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	_gnutls_epoch_bump(session);
Packit aea12f
	ret = _gnutls_epoch_dup(session, EPOCH_READ_CURRENT);
Packit aea12f
	if (ret < 0)
Packit aea12f
		return gnutls_assert_val(ret);
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
Packit aea12f
static int generate_hs_traffic_keys(gnutls_session_t session)
Packit aea12f
{
Packit aea12f
	int ret;
Packit aea12f
	unsigned null_key = 0;
Packit aea12f
Packit aea12f
	if (unlikely(session->key.proto.tls13.temp_secret_size == 0))
Packit aea12f
		return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit aea12f
Packit aea12f
	ret = _tls13_derive_secret(session, DERIVED_LABEL, sizeof(DERIVED_LABEL)-1,
Packit aea12f
				   NULL, 0, session->key.proto.tls13.temp_secret,
Packit aea12f
				   session->key.proto.tls13.temp_secret);
Packit aea12f
	if (ret < 0) {
Packit aea12f
		gnutls_assert();
Packit aea12f
		return ret;
Packit aea12f
	}
Packit aea12f
Packit aea12f
	if ((session->security_parameters.entity == GNUTLS_CLIENT &&
Packit aea12f
	      (!(session->internals.hsk_flags & HSK_KEY_SHARE_RECEIVED) ||
Packit aea12f
	        (!(session->internals.hsk_flags & HSK_PSK_KE_MODE_DHE_PSK) &&
Packit aea12f
	           session->internals.resumed != RESUME_FALSE))) ||
Packit aea12f
	    (session->security_parameters.entity == GNUTLS_SERVER &&
Packit aea12f
	      !(session->internals.hsk_flags & HSK_KEY_SHARE_SENT))) {
Packit aea12f
Packit aea12f
		if ((session->internals.hsk_flags & HSK_PSK_SELECTED) &&
Packit aea12f
		    (session->internals.hsk_flags & HSK_PSK_KE_MODE_PSK)) {
Packit aea12f
			null_key = 1;
Packit aea12f
		}
Packit aea12f
	}
Packit aea12f
Packit aea12f
	if (null_key) {
Packit aea12f
		uint8_t digest[MAX_HASH_SIZE];
Packit aea12f
		unsigned digest_size;
Packit aea12f
Packit aea12f
		if (unlikely(session->security_parameters.prf == NULL))
Packit aea12f
			return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER);
Packit aea12f
Packit aea12f
		digest_size = session->security_parameters.prf->output_size;
Packit aea12f
		memset(digest, 0, digest_size);
Packit aea12f
Packit aea12f
		ret = _tls13_update_secret(session, digest, digest_size);
Packit aea12f
		if (ret < 0) {
Packit aea12f
			gnutls_assert();
Packit aea12f
			return ret;
Packit aea12f
		}
Packit aea12f
	} else {
Packit aea12f
		if (unlikely(session->key.key.size == 0))
Packit aea12f
			return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER);
Packit aea12f
Packit aea12f
		ret = _tls13_update_secret(session, session->key.key.data, session->key.key.size);
Packit aea12f
		if (ret < 0) {
Packit aea12f
			gnutls_assert();
Packit aea12f
			return ret;
Packit aea12f
		}
Packit aea12f
	}
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
Packit aea12f
/*
Packit aea12f
 * _gnutls13_handshake_server
Packit aea12f
 * This function does the server stuff of the handshake protocol.
Packit aea12f
 */
Packit aea12f
int _gnutls13_handshake_server(gnutls_session_t session)
Packit aea12f
{
Packit aea12f
	int ret = 0;
Packit aea12f
Packit aea12f
	switch (STATE) {
Packit aea12f
	case STATE90:
Packit aea12f
		ret = _gnutls13_handshake_hash_buffers_synth(session, session->security_parameters.prf, 0);
Packit aea12f
		STATE = STATE90;
Packit aea12f
		IMED_RET_FATAL("reset handshake buffers", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE91:
Packit aea12f
		ret = _gnutls13_send_hello_retry_request(session, AGAIN(STATE91));
Packit aea12f
		STATE = STATE91;
Packit aea12f
		IMED_RET("send hello retry request", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE92:
Packit aea12f
#ifdef TLS13_APPENDIX_D4
Packit aea12f
		ret = _gnutls_send_change_cipher_spec(session, AGAIN(STATE92));
Packit aea12f
		STATE = STATE92;
Packit aea12f
		IMED_RET("send change cipher spec", ret, 0);
Packit aea12f
#endif
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE93:
Packit aea12f
		ret =
Packit aea12f
		    _gnutls_recv_handshake(session,
Packit aea12f
					   GNUTLS_HANDSHAKE_CLIENT_HELLO,
Packit aea12f
					   0, NULL);
Packit aea12f
		if (ret == GNUTLS_E_INT_RET_0) {
Packit aea12f
			/* this is triggered by post_client_hello, and instructs the
Packit aea12f
			 * handshake to proceed but be put on hold */
Packit aea12f
			ret = GNUTLS_E_INTERRUPTED;
Packit aea12f
			STATE = STATE94; /* hello already parsed -> move to next state */
Packit aea12f
		} else {
Packit aea12f
			STATE = STATE93;
Packit aea12f
		}
Packit aea12f
Packit aea12f
		IMED_RET("recv client hello", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE94:
Packit aea12f
		ret = _gnutls_send_server_hello(session, AGAIN(STATE94));
Packit aea12f
		STATE = STATE94;
Packit aea12f
		IMED_RET("send hello", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE99:
Packit aea12f
	case STATE100:
Packit aea12f
#ifdef TLS13_APPENDIX_D4
Packit aea12f
		/* don't send CCS twice: when HRR has already been
Packit aea12f
		 * sent, CCS should have followed it (see above) */
Packit aea12f
		if (!(session->internals.hsk_flags & HSK_HRR_SENT)) {
Packit aea12f
			ret = _gnutls_send_change_cipher_spec(session, AGAIN(STATE100));
Packit aea12f
			STATE = STATE100;
Packit aea12f
			IMED_RET("send change cipher spec", ret, 0);
Packit aea12f
		}
Packit aea12f
#endif
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE101:
Packit aea12f
		STATE = STATE101;
Packit aea12f
		if (session->internals.hsk_flags & HSK_EARLY_DATA_ACCEPTED) {
Packit aea12f
			ret = _tls13_read_connection_state_init(session, STAGE_EARLY);
Packit aea12f
			if (ret == 0) {
Packit aea12f
				_gnutls_epoch_bump(session);
Packit aea12f
				ret = _gnutls_epoch_dup(session, EPOCH_READ_CURRENT);
Packit aea12f
			}
Packit aea12f
			IMED_RET_FATAL("set early traffic keys", ret, 0);
Packit aea12f
Packit aea12f
			ret = generate_hs_traffic_keys(session);
Packit aea12f
			IMED_RET_FATAL("generate hs traffic keys", ret, 0);
Packit aea12f
Packit aea12f
			ret = _tls13_write_connection_state_init(session, STAGE_HS);
Packit aea12f
		} else {
Packit aea12f
			ret = generate_hs_traffic_keys(session);
Packit aea12f
			IMED_RET_FATAL("generate hs traffic keys", ret, 0);
Packit aea12f
Packit aea12f
			ret = _tls13_connection_state_init(session, STAGE_HS);
Packit aea12f
		}
Packit aea12f
		IMED_RET_FATAL("set hs traffic keys", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE102:
Packit aea12f
		ret = _gnutls13_send_encrypted_extensions(session, AGAIN(STATE102));
Packit aea12f
		STATE = STATE102;
Packit aea12f
		IMED_RET("send encrypted extensions", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE103:
Packit aea12f
		ret = _gnutls13_send_certificate_request(session, AGAIN(STATE103));
Packit aea12f
		STATE = STATE103;
Packit aea12f
		IMED_RET("send certificate request", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE104:
Packit aea12f
		ret = _gnutls13_send_certificate(session, AGAIN(STATE104));
Packit aea12f
		STATE = STATE104;
Packit aea12f
		IMED_RET("send certificate", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE105:
Packit aea12f
		ret = _gnutls13_send_certificate_verify(session, AGAIN(STATE105));
Packit aea12f
		STATE = STATE105;
Packit aea12f
		IMED_RET("send certificate verify", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE106:
Packit aea12f
		ret = _gnutls13_send_finished(session, AGAIN(STATE106));
Packit aea12f
		STATE = STATE106;
Packit aea12f
		IMED_RET("send finished", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE107:
Packit aea12f
		ret = _gnutls13_recv_end_of_early_data(session);
Packit aea12f
		STATE = STATE107;
Packit aea12f
		IMED_RET("recv end of early data", ret, 0);
Packit aea12f
Packit aea12f
		if (session->internals.hsk_flags & HSK_EARLY_DATA_ACCEPTED) {
Packit aea12f
			ret = _tls13_read_connection_state_init(session, STAGE_HS);
Packit aea12f
			IMED_RET_FATAL("set hs traffic key after receiving early data", ret, 0);
Packit aea12f
		}
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE108:
Packit aea12f
		/* At this point our sending keys should be the app keys
Packit aea12f
		 * see 4.4.4 at draft-ietf-tls-tls13-28 */
Packit aea12f
		ret =
Packit aea12f
		    generate_ap_traffic_keys(session);
Packit aea12f
		IMED_RET_FATAL("generate app keys", ret, 0);
Packit aea12f
Packit aea12f
		/* If the session is unauthenticated, try to optimize the handshake by
Packit aea12f
		 * sending the session ticket early. */
Packit aea12f
		if (!(session->internals.hsk_flags & (HSK_CRT_REQ_SENT|HSK_PSK_SELECTED))) {
Packit aea12f
			STATE = STATE108;
Packit aea12f
Packit aea12f
			ret = generate_non_auth_rms_keys(session);
Packit aea12f
			IMED_RET_FATAL("generate rms keys", ret, 0);
Packit aea12f
Packit aea12f
			session->internals.hsk_flags |= HSK_EARLY_START_USED;
Packit aea12f
			_gnutls_handshake_log("HSK[%p]: unauthenticated session eligible for early start\n", session);
Packit aea12f
		}
Packit aea12f
Packit aea12f
		ret = _tls13_write_connection_state_init(session, STAGE_APP);
Packit aea12f
		IMED_RET_FATAL("set write app keys", ret, 0);
Packit aea12f
Packit aea12f
		_gnutls_handshake_log("HSK[%p]: switching early to application traffic keys\n", session);
Packit aea12f
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE109:
Packit aea12f
		if (session->internals.resumed != RESUME_FALSE)
Packit aea12f
			_gnutls_set_resumed_parameters(session);
Packit aea12f
Packit aea12f
		if (session->internals.hsk_flags & HSK_EARLY_START_USED) {
Packit Service 991b93
			if (!(session->internals.flags & GNUTLS_NO_AUTO_SEND_TICKET))
Packit Service 991b93
				ret = _gnutls13_send_session_ticket(session, TLS13_TICKETS_TO_SEND,
Packit Service 991b93
								    AGAIN(STATE109));
Packit aea12f
Packit aea12f
			STATE = STATE109;
Packit aea12f
			IMED_RET("send session ticket", ret, 0);
Packit aea12f
Packit aea12f
			/* complete this phase of the handshake. We
Packit aea12f
			 * should be called again by gnutls_record_recv()
Packit aea12f
			 */
Packit aea12f
Packit aea12f
			if (session->internals.flags & GNUTLS_ENABLE_EARLY_START) {
Packit aea12f
				STATE = STATE113; /* finished */
Packit aea12f
				gnutls_assert();
Packit aea12f
Packit aea12f
				session->internals.recv_state = RECV_STATE_EARLY_START;
Packit aea12f
				return 0;
Packit aea12f
			}
Packit aea12f
		}
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE110:
Packit aea12f
		ret = _gnutls13_recv_certificate(session);
Packit aea12f
		STATE = STATE110;
Packit aea12f
		IMED_RET("recv certificate", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE111:
Packit aea12f
		ret = _gnutls13_recv_certificate_verify(session);
Packit aea12f
		STATE = STATE111;
Packit aea12f
		IMED_RET("recv certificate verify", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE112:
Packit aea12f
		ret = _gnutls_run_verify_callback(session, GNUTLS_CLIENT);
Packit aea12f
		STATE = STATE112;
Packit aea12f
		if (ret < 0)
Packit aea12f
			return gnutls_assert_val(ret);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE113: /* can enter from STATE109 */
Packit aea12f
		ret = _gnutls13_recv_finished(session);
Packit aea12f
		STATE = STATE113;
Packit aea12f
		IMED_RET("recv finished", ret, 0);
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE114:
Packit aea12f
		/* If we did request a client certificate, then we can
Packit aea12f
		 * only send the tickets here */
Packit aea12f
		STATE = STATE114;
Packit aea12f
Packit aea12f
		if (!(session->internals.hsk_flags & HSK_EARLY_START_USED)) {
Packit aea12f
			ret = generate_rms_keys(session);
Packit aea12f
			IMED_RET_FATAL("generate rms keys", ret, 0);
Packit aea12f
		}
Packit aea12f
Packit aea12f
		ret = _tls13_read_connection_state_init(session, STAGE_APP);
Packit aea12f
		IMED_RET_FATAL("set read app keys", ret, 0);
Packit aea12f
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case STATE115:
Packit Service 991b93
		if (!(session->internals.hsk_flags & (HSK_TLS13_TICKET_SENT|HSK_EARLY_START_USED)) &&
Packit Service 991b93
		    !(session->internals.flags & GNUTLS_NO_AUTO_SEND_TICKET)) {
Packit aea12f
			ret = _gnutls13_send_session_ticket(session, TLS13_TICKETS_TO_SEND,
Packit aea12f
							    AGAIN(STATE115));
Packit aea12f
			STATE = STATE115;
Packit aea12f
			IMED_RET("send session ticket", ret, 0);
Packit aea12f
		}
Packit aea12f
Packit aea12f
		STATE = STATE0;
Packit aea12f
		break;
Packit aea12f
	default:
Packit aea12f
		return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit aea12f
	}
Packit aea12f
Packit aea12f
	/* explicitly reset any early start flags */
Packit aea12f
	gnutls_mutex_lock(&session->internals.post_negotiation_lock);
Packit aea12f
	session->internals.recv_state = RECV_STATE_0;
Packit aea12f
	session->internals.initial_negotiation_completed = 1;
Packit aea12f
	gnutls_mutex_unlock(&session->internals.post_negotiation_lock);
Packit aea12f
Packit aea12f
	SAVE_TRANSCRIPT;
Packit aea12f
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
Packit aea12f
/* Processes handshake messages received asynchronously after initial handshake.
Packit aea12f
 *
Packit aea12f
 * It is called once per message and should return success, or a fatal error code.
Packit aea12f
 */
Packit aea12f
int
Packit aea12f
_gnutls13_recv_async_handshake(gnutls_session_t session)
Packit aea12f
{
Packit aea12f
	int ret;
Packit aea12f
	handshake_buffer_st hsk;
Packit aea12f
	recv_state_t next_state = RECV_STATE_0;
Packit aea12f
Packit aea12f
	/* The following messages are expected asynchronously after
Packit aea12f
	 * the handshake process is complete */
Packit aea12f
	if (unlikely(session->internals.handshake_in_progress))
Packit aea12f
		return gnutls_assert_val(GNUTLS_E_UNEXPECTED_PACKET);
Packit aea12f
Packit aea12f
	do {
Packit aea12f
		_gnutls_handshake_buffer_init(&hsk;;
Packit aea12f
Packit aea12f
		/* the received handshake message has already been pushed into
Packit aea12f
		 * handshake buffers. As we do not need to use the handshake hash
Packit aea12f
		 * buffers we call the lower level receive functions */
Packit aea12f
		ret = _gnutls_handshake_io_recv_int(session, GNUTLS_HANDSHAKE_ANY, &hsk, 0);
Packit aea12f
		if (ret < 0) {
Packit aea12f
			gnutls_assert();
Packit aea12f
			goto cleanup;
Packit aea12f
		}
Packit aea12f
		session->internals.last_handshake_in = hsk.htype;
Packit aea12f
Packit aea12f
		ret = _gnutls_call_hook_func(session, hsk.htype, GNUTLS_HOOK_PRE, 1,
Packit aea12f
					     hsk.data.data, hsk.data.length);
Packit aea12f
		if (ret < 0) {
Packit aea12f
			gnutls_assert();
Packit aea12f
			goto cleanup;
Packit aea12f
		}
Packit aea12f
Packit aea12f
		switch(hsk.htype) {
Packit aea12f
			case GNUTLS_HANDSHAKE_CERTIFICATE_REQUEST:
Packit aea12f
				if (!(session->security_parameters.entity == GNUTLS_CLIENT) ||
Packit aea12f
				    !(session->internals.flags & GNUTLS_POST_HANDSHAKE_AUTH)) {
Packit aea12f
					ret = gnutls_assert_val(GNUTLS_E_UNEXPECTED_PACKET);
Packit aea12f
					goto cleanup;
Packit aea12f
				}
Packit aea12f
Packit aea12f
				_gnutls_buffer_reset(&session->internals.reauth_buffer);
Packit aea12f
Packit aea12f
				/* include the handshake headers in reauth buffer */
Packit aea12f
				ret = _gnutls_buffer_append_data(&session->internals.reauth_buffer,
Packit aea12f
								 hsk.header, hsk.header_size);
Packit aea12f
				if (ret < 0) {
Packit aea12f
					gnutls_assert();
Packit aea12f
					goto cleanup;
Packit aea12f
				}
Packit aea12f
Packit aea12f
				ret = _gnutls_buffer_append_data(&session->internals.reauth_buffer,
Packit aea12f
								 hsk.data.data, hsk.data.length);
Packit aea12f
				if (ret < 0) {
Packit aea12f
					gnutls_assert();
Packit aea12f
					goto cleanup;
Packit aea12f
				}
Packit aea12f
Packit aea12f
				if (session->internals.flags & GNUTLS_AUTO_REAUTH) {
Packit aea12f
					ret = gnutls_reauth(session, 0);
Packit aea12f
					if (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED) {
Packit aea12f
						next_state = RECV_STATE_REAUTH;
Packit aea12f
					} else if (ret < 0) {
Packit aea12f
						gnutls_assert();
Packit aea12f
						goto cleanup;
Packit aea12f
					}
Packit aea12f
				} else {
Packit aea12f
					/* Application is expected to handle re-authentication
Packit aea12f
					 * explicitly.  */
Packit aea12f
					ret = GNUTLS_E_REAUTH_REQUEST;
Packit aea12f
				}
Packit aea12f
Packit aea12f
				goto cleanup;
Packit aea12f
Packit aea12f
			case GNUTLS_HANDSHAKE_KEY_UPDATE:
Packit aea12f
				ret = _gnutls13_recv_key_update(session, &hsk.data);
Packit aea12f
				if (ret < 0) {
Packit aea12f
					gnutls_assert();
Packit aea12f
					goto cleanup;
Packit aea12f
				}
Packit aea12f
Packit aea12f
				/* Handshake messages MUST NOT span key changes, i.e., we
Packit aea12f
				 * should not have any other pending handshake messages from
Packit aea12f
				 * the same record. */
Packit aea12f
				if (session->internals.handshake_recv_buffer_size != 0) {
Packit aea12f
					ret = gnutls_assert_val(GNUTLS_E_UNEXPECTED_PACKET);
Packit aea12f
					goto cleanup;
Packit aea12f
				}
Packit aea12f
				break;
Packit aea12f
			case GNUTLS_HANDSHAKE_NEW_SESSION_TICKET:
Packit aea12f
				if (session->security_parameters.entity != GNUTLS_CLIENT) {
Packit aea12f
					ret = gnutls_assert_val(GNUTLS_E_UNEXPECTED_PACKET);
Packit aea12f
					goto cleanup;
Packit aea12f
				}
Packit aea12f
Packit aea12f
				ret = _gnutls13_recv_session_ticket(session, &hsk.data);
Packit aea12f
				if (ret < 0) {
Packit aea12f
					gnutls_assert();
Packit aea12f
					goto cleanup;
Packit aea12f
				}
Packit aea12f
Packit aea12f
				memcpy(session->internals.tls13_ticket.resumption_master_secret,
Packit aea12f
				       session->key.proto.tls13.ap_rms,
Packit aea12f
				       session->key.proto.tls13.temp_secret_size);
Packit aea12f
Packit aea12f
				session->internals.tls13_ticket.prf = session->security_parameters.prf;
Packit aea12f
				session->internals.hsk_flags |= HSK_TICKET_RECEIVED;
Packit aea12f
				break;
Packit aea12f
			default:
Packit aea12f
				gnutls_assert();
Packit aea12f
				ret = GNUTLS_E_UNEXPECTED_PACKET;
Packit aea12f
				goto cleanup;
Packit aea12f
		}
Packit aea12f
Packit aea12f
		ret = _gnutls_call_hook_func(session, hsk.htype, GNUTLS_HOOK_POST, 1, hsk.data.data, hsk.data.length);
Packit aea12f
		if (ret < 0) {
Packit aea12f
			gnutls_assert();
Packit aea12f
			goto cleanup;
Packit aea12f
		}
Packit aea12f
		_gnutls_handshake_buffer_clear(&hsk;;
Packit aea12f
Packit aea12f
	} while (_gnutls_record_buffer_get_size(session) > 0);
Packit aea12f
Packit aea12f
	session->internals.recv_state = next_state;
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
Packit aea12f
 cleanup:
Packit aea12f
	/* if we have pending/partial handshake data in buffers, ensure that
Packit aea12f
	 * next read will read handshake data */
Packit aea12f
	if (_gnutls_record_buffer_get_size(session) > 0)
Packit aea12f
		session->internals.recv_state = RECV_STATE_ASYNC_HANDSHAKE;
Packit aea12f
	else
Packit aea12f
		session->internals.recv_state = next_state;
Packit aea12f
Packit aea12f
	_gnutls_handshake_buffer_clear(&hsk;;
Packit aea12f
	return ret;
Packit aea12f
}
Packit aea12f
Packit aea12f
/**
Packit aea12f
 * gnutls_session_ticket_send:
Packit aea12f
 * @session: is a #gnutls_session_t type.
Packit aea12f
 * @nr: the number of tickets to send
Packit aea12f
 * @flags: must be zero
Packit aea12f
 *
Packit aea12f
 * Sends a fresh session ticket to the peer. This is relevant only
Packit aea12f
 * in server side under TLS1.3. This function may also return %GNUTLS_E_AGAIN
Packit aea12f
 * or %GNUTLS_E_INTERRUPTED and in that case it must be called again.
Packit aea12f
 *
Packit aea12f
 * Returns: %GNUTLS_E_SUCCESS on success, or a negative error code.
Packit aea12f
 **/
Packit aea12f
int gnutls_session_ticket_send(gnutls_session_t session, unsigned nr, unsigned flags)
Packit aea12f
{
Packit aea12f
	int ret = 0;
Packit aea12f
	const version_entry_st *vers = get_version(session);
Packit aea12f
Packit aea12f
	if (!vers->tls13_sem || session->security_parameters.entity == GNUTLS_CLIENT)
Packit aea12f
		return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
Packit aea12f
Packit aea12f
	if (nr == 0)
Packit aea12f
		return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
Packit aea12f
Packit aea12f
	switch (TICKET_STATE) {
Packit aea12f
	case TICKET_STATE0:
Packit aea12f
		ret = _gnutls_io_write_flush(session);
Packit aea12f
		TICKET_STATE = TICKET_STATE0;
Packit aea12f
		if (ret < 0) {
Packit aea12f
			gnutls_assert();
Packit aea12f
			return ret;
Packit aea12f
		}
Packit aea12f
		FALLTHROUGH;
Packit aea12f
	case TICKET_STATE1:
Packit aea12f
		ret =
Packit aea12f
		    _gnutls13_send_session_ticket(session, nr, TICKET_STATE==TICKET_STATE1?1:0);
Packit aea12f
		TICKET_STATE = TICKET_STATE1;
Packit aea12f
		if (ret < 0) {
Packit aea12f
			gnutls_assert();
Packit aea12f
			return ret;
Packit aea12f
		}
Packit aea12f
		break;
Packit aea12f
	default:
Packit aea12f
		gnutls_assert();
Packit aea12f
		return GNUTLS_E_INTERNAL_ERROR;
Packit aea12f
	}
Packit aea12f
Packit aea12f
	TICKET_STATE = TICKET_STATE0;
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}