blob: 18bb984178a04d2472fcc390c4c6613280ec2833 [file] [log] [blame]
Jerry Yu65dd2cc2021-08-18 16:38:40 +08001/*
2 * TLS 1.3 functionality shared between client and server
3 *
4 * Copyright The Mbed TLS Contributors
5 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
18 */
19
20#include "common.h"
21
22#if defined(MBEDTLS_SSL_TLS_C)
23
24#if defined(MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL)
25
Jerry Yuc8a392c2021-08-18 16:46:28 +080026#include "mbedtls/error.h"
Jerry Yu75336352021-09-01 15:59:36 +080027#include "mbedtls/debug.h"
Jerry Yuc8a392c2021-08-18 16:46:28 +080028
Jerry Yu65dd2cc2021-08-18 16:38:40 +080029#include "ssl_misc.h"
Xiaofei Bai947571e2021-09-29 09:12:03 +000030#include <mbedtls/debug.h>
31#include <mbedtls/oid.h>
32#include <mbedtls/platform.h>
33
Jerry Yu65dd2cc2021-08-18 16:38:40 +080034
XiaokangQian6b226b02021-09-24 07:51:16 +000035int mbedtls_ssl_tls1_3_fetch_handshake_msg( mbedtls_ssl_context *ssl,
XiaokangQian16c61aa2021-09-27 09:30:17 +000036 unsigned hs_type,
37 unsigned char **buf,
38 size_t *buflen )
XiaokangQian6b226b02021-09-24 07:51:16 +000039{
40 int ret;
41
42 if( ( ret = mbedtls_ssl_read_record( ssl, 0 ) ) != 0 )
43 {
44 MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
45 goto cleanup;
46 }
47
XiaokangQian16c61aa2021-09-27 09:30:17 +000048 if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE ||
XiaokangQian6b226b02021-09-24 07:51:16 +000049 ssl->in_msg[0] != hs_type )
50 {
XiaokangQian16c61aa2021-09-27 09:30:17 +000051 MBEDTLS_SSL_DEBUG_MSG( 1, ( "Receive unexpected handshake message." ) );
XiaokangQian6b226b02021-09-24 07:51:16 +000052 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE,
XiaokangQian05420b12021-09-29 08:46:37 +000053 MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
XiaokangQian6b226b02021-09-24 07:51:16 +000054 ret = MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE;
55 goto cleanup;
56 }
57
XiaokangQian05420b12021-09-29 08:46:37 +000058 /*
59 * Jump handshake header (4 bytes, see Section 4 of RFC 8446).
60 * ...
61 * HandshakeType msg_type;
62 * uint24 length;
63 * ...
64 */
XiaokangQian6b226b02021-09-24 07:51:16 +000065 *buf = ssl->in_msg + 4;
66 *buflen = ssl->in_hslen - 4;
67
XiaokangQian6b226b02021-09-24 07:51:16 +000068cleanup:
69
70 return( ret );
71}
72
Jerry Yuf4436812021-08-26 22:59:56 +080073int mbedtls_ssl_tls13_start_handshake_msg( mbedtls_ssl_context *ssl,
Jerry Yueecfbf02021-08-30 18:32:07 +080074 unsigned hs_type,
75 unsigned char **buf,
Jerry Yu0c63af62021-09-02 12:59:12 +080076 size_t *buf_len )
Jerry Yu65dd2cc2021-08-18 16:38:40 +080077{
Jerry Yu1bc2c1f2021-09-01 12:57:29 +080078 /*
79 * Reserve 4 bytes for hanshake header. ( Section 4,RFC 8446 )
80 * ...
81 * HandshakeType msg_type;
82 * uint24 length;
83 * ...
84 */
Jerry Yuc8a392c2021-08-18 16:46:28 +080085 *buf = ssl->out_msg + 4;
Jerry Yu0c63af62021-09-02 12:59:12 +080086 *buf_len = MBEDTLS_SSL_OUT_CONTENT_LEN - 4;
Jerry Yuc8a392c2021-08-18 16:46:28 +080087
88 ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
89 ssl->out_msg[0] = hs_type;
90
91 return( 0 );
Jerry Yu65dd2cc2021-08-18 16:38:40 +080092}
93
Jerry Yuf4436812021-08-26 22:59:56 +080094int mbedtls_ssl_tls13_finish_handshake_msg( mbedtls_ssl_context *ssl,
Jerry Yueecfbf02021-08-30 18:32:07 +080095 size_t buf_len,
96 size_t msg_len )
Jerry Yu65dd2cc2021-08-18 16:38:40 +080097{
Jerry Yuc8a392c2021-08-18 16:46:28 +080098 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Jerry Yudbfb7bd2021-09-04 09:58:58 +080099 size_t msg_len_with_header;
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800100 ((void) buf_len);
Jerry Yuc8a392c2021-08-18 16:46:28 +0800101
Jerry Yu1bc2c1f2021-09-01 12:57:29 +0800102 /* Add reserved 4 bytes for handshake header */
Jerry Yudbfb7bd2021-09-04 09:58:58 +0800103 msg_len_with_header = msg_len + 4;
104 ssl->out_msglen = msg_len_with_header;
Jerry Yu2c0fbf32021-09-02 13:53:46 +0800105 MBEDTLS_SSL_PROC_CHK( mbedtls_ssl_write_handshake_msg_ext( ssl, 0 ) );
Jerry Yuc8a392c2021-08-18 16:46:28 +0800106
107cleanup:
108 return( ret );
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800109}
110
Jerry Yu48369522021-09-18 16:09:01 +0800111void mbedtls_ssl_tls1_3_add_hs_msg_to_checksum( mbedtls_ssl_context *ssl,
112 unsigned hs_type,
113 unsigned char const *msg,
114 size_t msg_len )
Jerry Yu7bea4ba2021-09-09 15:06:18 +0800115{
116 mbedtls_ssl_tls13_add_hs_hdr_to_checksum( ssl, hs_type, msg_len );
117 ssl->handshake->update_checksum( ssl, msg, msg_len );
118}
119
Jerry Yuf4436812021-08-26 22:59:56 +0800120void mbedtls_ssl_tls13_add_hs_hdr_to_checksum( mbedtls_ssl_context *ssl,
Jerry Yueecfbf02021-08-30 18:32:07 +0800121 unsigned hs_type,
122 size_t total_hs_len )
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800123{
124 unsigned char hs_hdr[4];
125
126 /* Build HS header for checksum update. */
Jerry Yu2ac64192021-08-26 18:38:58 +0800127 hs_hdr[0] = MBEDTLS_BYTE_0( hs_type );
128 hs_hdr[1] = MBEDTLS_BYTE_2( total_hs_len );
129 hs_hdr[2] = MBEDTLS_BYTE_1( total_hs_len );
130 hs_hdr[3] = MBEDTLS_BYTE_0( total_hs_len );
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800131
132 ssl->handshake->update_checksum( ssl, hs_hdr, sizeof( hs_hdr ) );
133}
134
Jerry Yubc20bdd2021-08-24 15:59:48 +0800135#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
136
137/*
Jerry Yue41dec02021-08-31 10:57:07 +0800138 * mbedtls_ssl_tls13_write_sig_alg_ext( )
Jerry Yubc20bdd2021-08-24 15:59:48 +0800139 *
140 * enum {
141 * ....
142 * ecdsa_secp256r1_sha256( 0x0403 ),
143 * ecdsa_secp384r1_sha384( 0x0503 ),
144 * ecdsa_secp521r1_sha512( 0x0603 ),
145 * ....
146 * } SignatureScheme;
147 *
148 * struct {
149 * SignatureScheme supported_signature_algorithms<2..2^16-2>;
150 * } SignatureSchemeList;
151 *
152 * Only if we handle at least one key exchange that needs signatures.
153 */
Jerry Yue41dec02021-08-31 10:57:07 +0800154int mbedtls_ssl_tls13_write_sig_alg_ext( mbedtls_ssl_context *ssl,
155 unsigned char *buf,
156 unsigned char *end,
157 size_t *olen )
Jerry Yubc20bdd2021-08-24 15:59:48 +0800158{
Jerry Yu72369942021-08-31 15:41:21 +0800159 unsigned char *p = buf;
Jerry Yub60e3cf2021-09-08 16:41:02 +0800160 unsigned char *supported_sig_alg_ptr; /* Start of supported_signature_algorithms */
161 size_t supported_sig_alg_len = 0; /* Length of supported_signature_algorithms */
Jerry Yu72369942021-08-31 15:41:21 +0800162
Jerry Yu75336352021-09-01 15:59:36 +0800163 *olen = 0;
Jerry Yu72369942021-08-31 15:41:21 +0800164
165 /* Skip the extension on the client if all allowed key exchanges
166 * are PSK-based. */
167#if defined(MBEDTLS_SSL_CLI_C)
168 if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT &&
169 !mbedtls_ssl_conf_tls13_some_ephemeral_enabled( ssl ) )
170 {
171 return( 0 );
172 }
173#endif /* MBEDTLS_SSL_CLI_C */
174
175 MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding signature_algorithms extension" ) );
176
Jerry Yub60e3cf2021-09-08 16:41:02 +0800177 /* Check if we have space for header and length field:
178 * - extension_type (2 bytes)
179 * - extension_data_length (2 bytes)
180 * - supported_signature_algorithms_length (2 bytes)
181 */
Jerry Yu72369942021-08-31 15:41:21 +0800182 MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 );
183 p += 6;
184
185 /*
186 * Write supported_signature_algorithms
187 */
Jerry Yub60e3cf2021-09-08 16:41:02 +0800188 supported_sig_alg_ptr = p;
Jerry Yu72369942021-08-31 15:41:21 +0800189 for( const uint16_t *sig_alg = ssl->conf->tls13_sig_algs;
190 *sig_alg != MBEDTLS_TLS13_SIG_NONE; sig_alg++ )
191 {
192 MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
193 MBEDTLS_PUT_UINT16_BE( *sig_alg, p, 0 );
194 p += 2;
195 MBEDTLS_SSL_DEBUG_MSG( 3, ( "signature scheme [%x]", *sig_alg ) );
196 }
197
Jerry Yub60e3cf2021-09-08 16:41:02 +0800198 /* Length of supported_signature_algorithms */
199 supported_sig_alg_len = p - supported_sig_alg_ptr;
200 if( supported_sig_alg_len == 0 )
Jerry Yu72369942021-08-31 15:41:21 +0800201 {
202 MBEDTLS_SSL_DEBUG_MSG( 1, ( "No signature algorithms defined." ) );
203 return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
204 }
205
206 /* Write extension_type */
207 MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SIG_ALG, buf, 0 );
208 /* Write extension_data_length */
Jerry Yub60e3cf2021-09-08 16:41:02 +0800209 MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len + 2, buf, 2 );
Jerry Yu72369942021-08-31 15:41:21 +0800210 /* Write length of supported_signature_algorithms */
Jerry Yub60e3cf2021-09-08 16:41:02 +0800211 MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len, buf, 4 );
Jerry Yu72369942021-08-31 15:41:21 +0800212
213 /* Output the total length of signature algorithms extension. */
214 *olen = p - buf;
215
216 ssl->handshake->extensions_present |= MBEDTLS_SSL_EXT_SIG_ALG;
Jerry Yu75336352021-09-01 15:59:36 +0800217 return( 0 );
Jerry Yubc20bdd2021-08-24 15:59:48 +0800218}
219
220#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
221
Xiaofei Bai947571e2021-09-29 09:12:03 +0000222/*
223 *
224 * STATE HANDLING: Incoming Certificate, client-side only currently.
225 *
226 */
227
228/*
Xiaofei Bai947571e2021-09-29 09:12:03 +0000229 * Implementation
230 */
231
Xiaofei Bai947571e2021-09-29 09:12:03 +0000232#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
233#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
234/*
235 * Structure of Certificate message:
236 *
237 * enum {
238 * X509(0),
239 * RawPublicKey(2),
240 * (255)
241 * } CertificateType;
242 *
243 * struct {
244 * select (certificate_type) {
245 * case RawPublicKey:
246 * * From RFC 7250 ASN.1_subjectPublicKeyInfo *
247 * opaque ASN1_subjectPublicKeyInfo<1..2^24-1>;
248 * case X509:
249 * opaque cert_data<1..2^24-1>;
250 * };
251 * Extension extensions<0..2^16-1>;
252 * } CertificateEntry;
253 *
254 * struct {
255 * opaque certificate_request_context<0..2^8-1>;
256 * CertificateEntry certificate_list<0..2^24-1>;
257 * } Certificate;
258 *
259 */
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000260
261/* Parse certificate chain send by the server. */
Xiaofei Bai947571e2021-09-29 09:12:03 +0000262static int ssl_tls13_parse_certificate( mbedtls_ssl_context *ssl,
263 const unsigned char *buf,
264 const unsigned char *end )
265{
266 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
267 size_t certificate_request_context_len = 0;
268 size_t certificate_list_len = 0;
269 const unsigned char *p = buf;
270 const unsigned char *certificate_list_end;
271
272 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, end, 4 );
273 certificate_request_context_len = p[0];
Jerry Yu7aa71862021-10-28 21:41:30 +0800274 certificate_list_len = MBEDTLS_GET_UINT24_BE( p, 0 );
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000275 p += 4;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000276
277 /* In theory, the certificate list can be up to 2^24 Bytes, but we don't
278 * support anything beyond 2^16 = 64K.
279 */
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000280 if( ( certificate_request_context_len != 0 ) ||
281 ( certificate_list_len >= 0x10000 ) )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000282 {
283 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate message" ) );
284 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR,
285 MBEDTLS_ERR_SSL_DECODE_ERROR );
286 return( MBEDTLS_ERR_SSL_DECODE_ERROR );
287 }
288
289 /* In case we tried to reuse a session but it failed */
290 if( ssl->session_negotiate->peer_cert != NULL )
291 {
292 mbedtls_x509_crt_free( ssl->session_negotiate->peer_cert );
293 mbedtls_free( ssl->session_negotiate->peer_cert );
294 }
295
296 if( ( ssl->session_negotiate->peer_cert =
297 mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ) ) == NULL )
298 {
299 MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc( %" MBEDTLS_PRINTF_SIZET " bytes ) failed",
300 sizeof( mbedtls_x509_crt ) ) );
301 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR,
302 MBEDTLS_ERR_SSL_ALLOC_FAILED );
303 return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
304 }
305
306 mbedtls_x509_crt_init( ssl->session_negotiate->peer_cert );
307
Xiaofei Bai947571e2021-09-29 09:12:03 +0000308 certificate_list_end = p + certificate_list_len;
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000309 while( p < certificate_list_end )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000310 {
311 size_t cert_data_len, extensions_len;
312
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000313 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, 3 );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000314 cert_data_len = ( ( size_t )p[0] << 16 ) |
315 ( ( size_t )p[1] << 8 ) |
316 ( ( size_t )p[2] );
317 p += 3;
318
319 /* In theory, the CRT can be up to 2^24 Bytes, but we don't support
320 * anything beyond 2^16 = 64K. Otherwise as in the TLS 1.2 code,
321 * check that we have a minimum of 128 bytes of data, this is not
322 * clear why we need that though.
323 */
324 if( ( cert_data_len < 128 ) || ( cert_data_len >= 0x10000 ) )
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000325 {
Xiaofei Bai947571e2021-09-29 09:12:03 +0000326 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad Certificate message" ) );
327 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR,
328 MBEDTLS_ERR_SSL_DECODE_ERROR );
329 return( MBEDTLS_ERR_SSL_DECODE_ERROR );
330 }
331
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000332 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, cert_data_len );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000333 ret = mbedtls_x509_crt_parse_der( ssl->session_negotiate->peer_cert,
334 p, cert_data_len );
335
336 switch( ret )
337 {
338 case 0: /*ok*/
339 break;
340 case MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND:
341 /* Ignore certificate with an unknown algorithm: maybe a
342 prior certificate was already trusted. */
343 break;
344
345 case MBEDTLS_ERR_X509_ALLOC_FAILED:
346 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR,
347 MBEDTLS_ERR_X509_ALLOC_FAILED );
348 MBEDTLS_SSL_DEBUG_RET( 1, " mbedtls_x509_crt_parse_der", ret );
349 return( ret );
350
351 case MBEDTLS_ERR_X509_UNKNOWN_VERSION:
352 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT,
353 MBEDTLS_ERR_X509_UNKNOWN_VERSION );
354 MBEDTLS_SSL_DEBUG_RET( 1, " mbedtls_x509_crt_parse_der", ret );
355 return( ret );
356
357 default:
358 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_BAD_CERT,
359 ret );
360 MBEDTLS_SSL_DEBUG_RET( 1, " mbedtls_x509_crt_parse_der", ret );
361 return( ret );
362 }
363
364 p += cert_data_len;
365
366 /* Certificate extensions length */
367 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, 2 );
368 extensions_len = MBEDTLS_GET_UINT16_BE( p, 0 );
369 p += 2;
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000370 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, extensions_len );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000371 p += extensions_len;
372 }
373
374 /* Check that all the message is consumed. */
375 if( p != end )
376 {
377 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad Certificate message" ) );
378 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR, \
379 MBEDTLS_ERR_SSL_DECODE_ERROR );
380 return( MBEDTLS_ERR_SSL_DECODE_ERROR );
381 }
382
383 MBEDTLS_SSL_DEBUG_CRT( 3, "peer certificate", ssl->session_negotiate->peer_cert );
384
385 return( ret );
386}
387#else
388static int ssl_tls13_parse_certificate( mbedtls_ssl_context *ssl,
389 const unsigned char *buf,
390 const unsigned char *end )
391{
392 ((void) ssl);
393 ((void) buf);
394 ((void) end);
395 return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
396}
397#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
398#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
399
400#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
401#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000402/* Validate certificate chain sent by the server. */
Xiaofei Bai947571e2021-09-29 09:12:03 +0000403static int ssl_tls13_validate_certificate( mbedtls_ssl_context *ssl )
404{
405 int ret = 0;
406 mbedtls_x509_crt *ca_chain;
407 mbedtls_x509_crl *ca_crl;
Xiaofei Baiff456022021-10-28 06:50:17 +0000408 uint32_t verify_result = 0;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000409
410#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
411 if( ssl->handshake->sni_ca_chain != NULL )
412 {
413 ca_chain = ssl->handshake->sni_ca_chain;
414 ca_crl = ssl->handshake->sni_ca_crl;
415 }
416 else
417#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
418 {
419 ca_chain = ssl->conf->ca_chain;
420 ca_crl = ssl->conf->ca_crl;
421 }
422
423 /*
424 * Main check: verify certificate
425 */
426 ret = mbedtls_x509_crt_verify_with_profile(
427 ssl->session_negotiate->peer_cert,
428 ca_chain, ca_crl,
429 ssl->conf->cert_profile,
430 ssl->hostname,
Xiaofei Baiff456022021-10-28 06:50:17 +0000431 &verify_result,
Xiaofei Bai947571e2021-09-29 09:12:03 +0000432 ssl->conf->f_vrfy, ssl->conf->p_vrfy );
433
434 if( ret != 0 )
435 {
436 MBEDTLS_SSL_DEBUG_RET( 1, "x509_verify_cert", ret );
437 }
438
439 /*
440 * Secondary checks: always done, but change 'ret' only if it was 0
441 */
442
443#if defined(MBEDTLS_ECP_C)
444 {
445 const mbedtls_pk_context *pk = &ssl->session_negotiate->peer_cert->pk;
446
447 /* If certificate uses an EC key, make sure the curve is OK */
448 if( mbedtls_pk_can_do( pk, MBEDTLS_PK_ECKEY ) &&
449 mbedtls_ssl_check_curve( ssl, mbedtls_pk_ec( *pk )->grp.id ) != 0 )
450 {
Xiaofei Baiff456022021-10-28 06:50:17 +0000451 verify_result |= MBEDTLS_X509_BADCERT_BAD_KEY;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000452
453 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate ( EC key curve )" ) );
454 if( ret == 0 )
455 ret = MBEDTLS_ERR_SSL_BAD_CERTIFICATE;
456 }
457 }
458#endif /* MBEDTLS_ECP_C */
459
460 if( mbedtls_ssl_check_cert_usage( ssl->session_negotiate->peer_cert,
461 ssl->handshake->ciphersuite_info,
462 !ssl->conf->endpoint,
Xiaofei Baiff456022021-10-28 06:50:17 +0000463 &verify_result ) != 0 )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000464 {
465 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate ( usage extensions )" ) );
466 if( ret == 0 )
467 ret = MBEDTLS_ERR_SSL_BAD_CERTIFICATE;
468 }
469
470
471 if( ca_chain == NULL )
472 {
473 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no CA chain" ) );
474 ret = MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED;
475 }
476
477 if( ret != 0 )
478 {
479 /* The certificate may have been rejected for several reasons.
480 Pick one and send the corresponding alert. Which alert to send
481 may be a subject of debate in some cases. */
Xiaofei Baiff456022021-10-28 06:50:17 +0000482 if( verify_result & MBEDTLS_X509_BADCERT_OTHER )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000483 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000484 else if( verify_result & MBEDTLS_X509_BADCERT_CN_MISMATCH )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000485 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_BAD_CERT, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000486 else if( ( verify_result & MBEDTLS_X509_BADCERT_KEY_USAGE ) ||
487 ( verify_result & MBEDTLS_X509_BADCERT_EXT_KEY_USAGE ) ||
488 ( verify_result & MBEDTLS_X509_BADCERT_NS_CERT_TYPE ) ||
489 ( verify_result & MBEDTLS_X509_BADCERT_BAD_PK ) ||
490 ( verify_result & MBEDTLS_X509_BADCERT_BAD_KEY ) )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000491 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000492 else if( verify_result & MBEDTLS_X509_BADCERT_EXPIRED )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000493 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000494 else if( verify_result & MBEDTLS_X509_BADCERT_REVOKED )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000495 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000496 else if( verify_result & MBEDTLS_X509_BADCERT_NOT_TRUSTED )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000497 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA, ret );
498 else
499 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN, ret );
500 }
501
502#if defined(MBEDTLS_DEBUG_C)
Xiaofei Baiff456022021-10-28 06:50:17 +0000503 if( verify_result != 0 )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000504 {
505 MBEDTLS_SSL_DEBUG_MSG( 3, ( "! Certificate verification flags %08x",
Jerry Yu83bb1312021-10-28 22:16:33 +0800506 (unsigned int) verify_result ) );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000507 }
508 else
509 {
510 MBEDTLS_SSL_DEBUG_MSG( 3, ( "Certificate verification flags clear" ) );
511 }
512#endif /* MBEDTLS_DEBUG_C */
513
Xiaofei Baiff456022021-10-28 06:50:17 +0000514 ssl->session_negotiate->verify_result = verify_result;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000515 return( ret );
516}
517#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
518static int ssl_tls13_validate_certificate( mbedtls_ssl_context *ssl )
519{
520 ((void) ssl);
521 return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
522}
523#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
524#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
525
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000526int mbedtls_ssl_tls13_process_certificate( mbedtls_ssl_context *ssl )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000527{
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000528 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
529 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate" ) );
530
531#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
532 unsigned char *buf;
533 size_t buf_len;
534
535 MBEDTLS_SSL_PROC_CHK( mbedtls_ssl_tls1_3_fetch_handshake_msg(
536 ssl, MBEDTLS_SSL_HS_CERTIFICATE,
537 &buf, &buf_len ) );
538
539 /* Parse the certificate chain sent by the peer. */
540 MBEDTLS_SSL_PROC_CHK( ssl_tls13_parse_certificate( ssl, buf, buf + buf_len ) );
541 /* Validate the certificate chain and set the verification results. */
542 MBEDTLS_SSL_PROC_CHK( ssl_tls13_validate_certificate( ssl ) );
543
544 mbedtls_ssl_tls1_3_add_hs_msg_to_checksum( ssl, MBEDTLS_SSL_HS_CERTIFICATE,
545 buf, buf_len );
546
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000547cleanup:
548
549 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate" ) );
Xiaofei Bai10aeec02021-10-26 09:50:08 +0000550#else
551 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
552 ret = MBEDTLS_ERR_SSL_INTERNAL_ERROR;
553#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000554 return( ret );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000555}
556
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800557#endif /* MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL */
558
559#endif /* MBEDTLS_SSL_TLS_C */