|
Packit |
549fdc |
/*
|
|
Packit |
549fdc |
* Copyright (C) 2015-2016 Red Hat, Inc.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* Author: Nikos Mavrogiannopoulos
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* This file is part of GnuTLS.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* The GnuTLS is free software; you can redistribute it and/or
|
|
Packit |
549fdc |
* modify it under the terms of the GNU Lesser General Public License
|
|
Packit |
549fdc |
* as published by the Free Software Foundation; either version 2.1 of
|
|
Packit |
549fdc |
* the License, or (at your option) any later version.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* This library is distributed in the hope that it will be useful, but
|
|
Packit |
549fdc |
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit |
549fdc |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Packit |
549fdc |
* Lesser General Public License for more details.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* You should have received a copy of the GNU Lesser General Public License
|
|
Packit |
549fdc |
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* Functions that relate to the TLS handshake procedure.
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#include "gnutls_int.h"
|
|
Packit |
549fdc |
#include "errors.h"
|
|
Packit |
549fdc |
#include "debug.h"
|
|
Packit |
549fdc |
#include "handshake.h"
|
|
Packit |
549fdc |
#include <auth/cert.h>
|
|
Packit |
549fdc |
#include "constate.h"
|
|
Packit |
549fdc |
#include <record.h>
|
|
Packit |
549fdc |
#include <state.h>
|
|
Packit |
549fdc |
#include <ext/safe_renegotiation.h>
|
|
Packit |
549fdc |
#include <auth/anon.h> /* for gnutls_anon_server_credentials_t */
|
|
Packit |
549fdc |
#include <auth/psk.h> /* for gnutls_psk_server_credentials_t */
|
|
Packit |
549fdc |
#ifdef ENABLE_SRP
|
|
Packit |
549fdc |
# include <auth/srp_kx.h>
|
|
Packit |
549fdc |
#endif
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
int _gnutls_check_id_for_change(gnutls_session_t session)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
int cred_type;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* This checks in PSK and SRP ciphersuites that the username remained the
|
|
Packit |
549fdc |
* same on a rehandshake. */
|
|
Packit |
549fdc |
if (session->internals.flags & GNUTLS_ALLOW_ID_CHANGE)
|
|
Packit |
549fdc |
return 0;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
cred_type = gnutls_auth_get_type(session);
|
|
Packit |
549fdc |
if (cred_type == GNUTLS_CRD_PSK || cred_type == GNUTLS_CRD_SRP) {
|
|
Packit |
549fdc |
const char *username = NULL;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (cred_type == GNUTLS_CRD_PSK) {
|
|
Packit |
549fdc |
psk_auth_info_t ai;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ai = _gnutls_get_auth_info(session, GNUTLS_CRD_PSK);
|
|
Packit |
549fdc |
if (ai == NULL)
|
|
Packit |
549fdc |
return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
username = ai->username;
|
|
Packit |
549fdc |
#ifdef ENABLE_SRP
|
|
Packit |
549fdc |
} else {
|
|
Packit |
549fdc |
srp_server_auth_info_t ai = _gnutls_get_auth_info(session, GNUTLS_CRD_SRP);
|
|
Packit |
549fdc |
if (ai == NULL)
|
|
Packit |
549fdc |
return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
username = ai->username;
|
|
Packit |
549fdc |
#endif
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (username == NULL)
|
|
Packit |
549fdc |
return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (session->internals.saved_username_set) {
|
|
Packit |
549fdc |
if (strcmp(session->internals.saved_username, username) != 0) {
|
|
Packit |
549fdc |
_gnutls_debug_log("Session's PSK username changed during rehandshake; aborting!\n");
|
|
Packit |
549fdc |
return gnutls_assert_val(GNUTLS_E_SESSION_USER_ID_CHANGED);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
} else {
|
|
Packit |
549fdc |
size_t len = strlen(username);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
memcpy(session->internals.saved_username, username, len);
|
|
Packit |
549fdc |
session->internals.saved_username[len] = 0;
|
|
Packit |
549fdc |
session->internals.saved_username_set = 1;
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
return 0;
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
int _gnutls_check_if_cert_hash_is_same(gnutls_session_t session, gnutls_certificate_credentials_t cred)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
cert_auth_info_t ai;
|
|
Packit |
549fdc |
char tmp[32];
|
|
Packit |
549fdc |
int ret;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (session->internals.flags & GNUTLS_ALLOW_ID_CHANGE)
|
|
Packit |
549fdc |
return 0;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ai = _gnutls_get_auth_info(session, GNUTLS_CRD_CERTIFICATE);
|
|
Packit |
549fdc |
if (ai == NULL || ai->ncerts == 0)
|
|
Packit |
549fdc |
return 0;
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
ret = gnutls_hash_fast(GNUTLS_DIG_SHA256,
|
|
Packit |
549fdc |
ai->raw_certificate_list[0].data,
|
|
Packit |
549fdc |
ai->raw_certificate_list[0].size,
|
|
Packit |
549fdc |
tmp);
|
|
Packit |
549fdc |
if (ret < 0)
|
|
Packit |
549fdc |
return gnutls_assert_val(ret);
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
if (session->internals.cert_hash_set) {
|
|
Packit |
549fdc |
if (memcmp(tmp, session->internals.cert_hash, 32) != 0) {
|
|
Packit |
549fdc |
_gnutls_debug_log("Session certificate changed during rehandshake; aborting!\n");
|
|
Packit |
549fdc |
return gnutls_assert_val(GNUTLS_E_SESSION_USER_ID_CHANGED);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
} else {
|
|
Packit |
549fdc |
memcpy(session->internals.cert_hash, tmp, 32);
|
|
Packit |
549fdc |
session->internals.cert_hash_set = 1;
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
return 0;
|
|
Packit |
549fdc |
}
|