blob: c8601ce17e66d1293e3309a4944230f92b770314 [file] [log] [blame]
Jerry Yu65dd2cc2021-08-18 16:38:40 +08001/*
2 * TLS 1.3 functionality shared between client and server
3 *
4 * Copyright The Mbed TLS Contributors
5 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
18 */
19
20#include "common.h"
21
22#if defined(MBEDTLS_SSL_TLS_C)
23
24#if defined(MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL)
25
Jerry Yuc8a392c2021-08-18 16:46:28 +080026#include "mbedtls/error.h"
Jerry Yu75336352021-09-01 15:59:36 +080027#include "mbedtls/debug.h"
Jerry Yuc8a392c2021-08-18 16:46:28 +080028
Jerry Yu65dd2cc2021-08-18 16:38:40 +080029#include "ssl_misc.h"
Xiaofei Bai947571e2021-09-29 09:12:03 +000030#include <mbedtls/debug.h>
31#include <mbedtls/oid.h>
32#include <mbedtls/platform.h>
33
Jerry Yu65dd2cc2021-08-18 16:38:40 +080034
XiaokangQian6b226b02021-09-24 07:51:16 +000035int mbedtls_ssl_tls1_3_fetch_handshake_msg( mbedtls_ssl_context *ssl,
XiaokangQian16c61aa2021-09-27 09:30:17 +000036 unsigned hs_type,
37 unsigned char **buf,
38 size_t *buflen )
XiaokangQian6b226b02021-09-24 07:51:16 +000039{
40 int ret;
41
42 if( ( ret = mbedtls_ssl_read_record( ssl, 0 ) ) != 0 )
43 {
44 MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret );
45 goto cleanup;
46 }
47
XiaokangQian16c61aa2021-09-27 09:30:17 +000048 if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE ||
XiaokangQian6b226b02021-09-24 07:51:16 +000049 ssl->in_msg[0] != hs_type )
50 {
XiaokangQian16c61aa2021-09-27 09:30:17 +000051 MBEDTLS_SSL_DEBUG_MSG( 1, ( "Receive unexpected handshake message." ) );
XiaokangQian6b226b02021-09-24 07:51:16 +000052 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE,
XiaokangQian05420b12021-09-29 08:46:37 +000053 MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE );
XiaokangQian6b226b02021-09-24 07:51:16 +000054 ret = MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE;
55 goto cleanup;
56 }
57
XiaokangQian05420b12021-09-29 08:46:37 +000058 /*
59 * Jump handshake header (4 bytes, see Section 4 of RFC 8446).
60 * ...
61 * HandshakeType msg_type;
62 * uint24 length;
63 * ...
64 */
XiaokangQian6b226b02021-09-24 07:51:16 +000065 *buf = ssl->in_msg + 4;
66 *buflen = ssl->in_hslen - 4;
67
XiaokangQian6b226b02021-09-24 07:51:16 +000068cleanup:
69
70 return( ret );
71}
72
Jerry Yuf4436812021-08-26 22:59:56 +080073int mbedtls_ssl_tls13_start_handshake_msg( mbedtls_ssl_context *ssl,
Jerry Yueecfbf02021-08-30 18:32:07 +080074 unsigned hs_type,
75 unsigned char **buf,
Jerry Yu0c63af62021-09-02 12:59:12 +080076 size_t *buf_len )
Jerry Yu65dd2cc2021-08-18 16:38:40 +080077{
Jerry Yu1bc2c1f2021-09-01 12:57:29 +080078 /*
79 * Reserve 4 bytes for hanshake header. ( Section 4,RFC 8446 )
80 * ...
81 * HandshakeType msg_type;
82 * uint24 length;
83 * ...
84 */
Jerry Yuc8a392c2021-08-18 16:46:28 +080085 *buf = ssl->out_msg + 4;
Jerry Yu0c63af62021-09-02 12:59:12 +080086 *buf_len = MBEDTLS_SSL_OUT_CONTENT_LEN - 4;
Jerry Yuc8a392c2021-08-18 16:46:28 +080087
88 ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE;
89 ssl->out_msg[0] = hs_type;
90
91 return( 0 );
Jerry Yu65dd2cc2021-08-18 16:38:40 +080092}
93
Jerry Yuf4436812021-08-26 22:59:56 +080094int mbedtls_ssl_tls13_finish_handshake_msg( mbedtls_ssl_context *ssl,
Jerry Yueecfbf02021-08-30 18:32:07 +080095 size_t buf_len,
96 size_t msg_len )
Jerry Yu65dd2cc2021-08-18 16:38:40 +080097{
Jerry Yuc8a392c2021-08-18 16:46:28 +080098 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Jerry Yudbfb7bd2021-09-04 09:58:58 +080099 size_t msg_len_with_header;
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800100 ((void) buf_len);
Jerry Yuc8a392c2021-08-18 16:46:28 +0800101
Jerry Yu1bc2c1f2021-09-01 12:57:29 +0800102 /* Add reserved 4 bytes for handshake header */
Jerry Yudbfb7bd2021-09-04 09:58:58 +0800103 msg_len_with_header = msg_len + 4;
104 ssl->out_msglen = msg_len_with_header;
Jerry Yu2c0fbf32021-09-02 13:53:46 +0800105 MBEDTLS_SSL_PROC_CHK( mbedtls_ssl_write_handshake_msg_ext( ssl, 0 ) );
Jerry Yuc8a392c2021-08-18 16:46:28 +0800106
107cleanup:
108 return( ret );
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800109}
110
Jerry Yu48369522021-09-18 16:09:01 +0800111void mbedtls_ssl_tls1_3_add_hs_msg_to_checksum( mbedtls_ssl_context *ssl,
112 unsigned hs_type,
113 unsigned char const *msg,
114 size_t msg_len )
Jerry Yu7bea4ba2021-09-09 15:06:18 +0800115{
116 mbedtls_ssl_tls13_add_hs_hdr_to_checksum( ssl, hs_type, msg_len );
117 ssl->handshake->update_checksum( ssl, msg, msg_len );
118}
119
Jerry Yuf4436812021-08-26 22:59:56 +0800120void mbedtls_ssl_tls13_add_hs_hdr_to_checksum( mbedtls_ssl_context *ssl,
Jerry Yueecfbf02021-08-30 18:32:07 +0800121 unsigned hs_type,
122 size_t total_hs_len )
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800123{
124 unsigned char hs_hdr[4];
125
126 /* Build HS header for checksum update. */
Jerry Yu2ac64192021-08-26 18:38:58 +0800127 hs_hdr[0] = MBEDTLS_BYTE_0( hs_type );
128 hs_hdr[1] = MBEDTLS_BYTE_2( total_hs_len );
129 hs_hdr[2] = MBEDTLS_BYTE_1( total_hs_len );
130 hs_hdr[3] = MBEDTLS_BYTE_0( total_hs_len );
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800131
132 ssl->handshake->update_checksum( ssl, hs_hdr, sizeof( hs_hdr ) );
133}
134
Jerry Yubc20bdd2021-08-24 15:59:48 +0800135#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
136
137/*
Jerry Yue41dec02021-08-31 10:57:07 +0800138 * mbedtls_ssl_tls13_write_sig_alg_ext( )
Jerry Yubc20bdd2021-08-24 15:59:48 +0800139 *
140 * enum {
141 * ....
142 * ecdsa_secp256r1_sha256( 0x0403 ),
143 * ecdsa_secp384r1_sha384( 0x0503 ),
144 * ecdsa_secp521r1_sha512( 0x0603 ),
145 * ....
146 * } SignatureScheme;
147 *
148 * struct {
149 * SignatureScheme supported_signature_algorithms<2..2^16-2>;
150 * } SignatureSchemeList;
151 *
152 * Only if we handle at least one key exchange that needs signatures.
153 */
Jerry Yue41dec02021-08-31 10:57:07 +0800154int mbedtls_ssl_tls13_write_sig_alg_ext( mbedtls_ssl_context *ssl,
155 unsigned char *buf,
156 unsigned char *end,
157 size_t *olen )
Jerry Yubc20bdd2021-08-24 15:59:48 +0800158{
Jerry Yu72369942021-08-31 15:41:21 +0800159 unsigned char *p = buf;
Jerry Yub60e3cf2021-09-08 16:41:02 +0800160 unsigned char *supported_sig_alg_ptr; /* Start of supported_signature_algorithms */
161 size_t supported_sig_alg_len = 0; /* Length of supported_signature_algorithms */
Jerry Yu72369942021-08-31 15:41:21 +0800162
Jerry Yu75336352021-09-01 15:59:36 +0800163 *olen = 0;
Jerry Yu72369942021-08-31 15:41:21 +0800164
165 /* Skip the extension on the client if all allowed key exchanges
166 * are PSK-based. */
167#if defined(MBEDTLS_SSL_CLI_C)
168 if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT &&
169 !mbedtls_ssl_conf_tls13_some_ephemeral_enabled( ssl ) )
170 {
171 return( 0 );
172 }
173#endif /* MBEDTLS_SSL_CLI_C */
174
175 MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding signature_algorithms extension" ) );
176
Jerry Yub60e3cf2021-09-08 16:41:02 +0800177 /* Check if we have space for header and length field:
178 * - extension_type (2 bytes)
179 * - extension_data_length (2 bytes)
180 * - supported_signature_algorithms_length (2 bytes)
181 */
Jerry Yu72369942021-08-31 15:41:21 +0800182 MBEDTLS_SSL_CHK_BUF_PTR( p, end, 6 );
183 p += 6;
184
185 /*
186 * Write supported_signature_algorithms
187 */
Jerry Yub60e3cf2021-09-08 16:41:02 +0800188 supported_sig_alg_ptr = p;
Jerry Yu72369942021-08-31 15:41:21 +0800189 for( const uint16_t *sig_alg = ssl->conf->tls13_sig_algs;
190 *sig_alg != MBEDTLS_TLS13_SIG_NONE; sig_alg++ )
191 {
192 MBEDTLS_SSL_CHK_BUF_PTR( p, end, 2 );
193 MBEDTLS_PUT_UINT16_BE( *sig_alg, p, 0 );
194 p += 2;
195 MBEDTLS_SSL_DEBUG_MSG( 3, ( "signature scheme [%x]", *sig_alg ) );
196 }
197
Jerry Yub60e3cf2021-09-08 16:41:02 +0800198 /* Length of supported_signature_algorithms */
199 supported_sig_alg_len = p - supported_sig_alg_ptr;
200 if( supported_sig_alg_len == 0 )
Jerry Yu72369942021-08-31 15:41:21 +0800201 {
202 MBEDTLS_SSL_DEBUG_MSG( 1, ( "No signature algorithms defined." ) );
203 return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
204 }
205
206 /* Write extension_type */
207 MBEDTLS_PUT_UINT16_BE( MBEDTLS_TLS_EXT_SIG_ALG, buf, 0 );
208 /* Write extension_data_length */
Jerry Yub60e3cf2021-09-08 16:41:02 +0800209 MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len + 2, buf, 2 );
Jerry Yu72369942021-08-31 15:41:21 +0800210 /* Write length of supported_signature_algorithms */
Jerry Yub60e3cf2021-09-08 16:41:02 +0800211 MBEDTLS_PUT_UINT16_BE( supported_sig_alg_len, buf, 4 );
Jerry Yu72369942021-08-31 15:41:21 +0800212
213 /* Output the total length of signature algorithms extension. */
214 *olen = p - buf;
215
216 ssl->handshake->extensions_present |= MBEDTLS_SSL_EXT_SIG_ALG;
Jerry Yu75336352021-09-01 15:59:36 +0800217 return( 0 );
Jerry Yubc20bdd2021-08-24 15:59:48 +0800218}
219
220#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
221
Xiaofei Bai947571e2021-09-29 09:12:03 +0000222/*
223 *
224 * STATE HANDLING: Incoming Certificate, client-side only currently.
225 *
226 */
227
228/*
Xiaofei Bai947571e2021-09-29 09:12:03 +0000229 * Implementation
230 */
231
Xiaofei Bai947571e2021-09-29 09:12:03 +0000232#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
233#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
234/*
235 * Structure of Certificate message:
236 *
237 * enum {
238 * X509(0),
239 * RawPublicKey(2),
240 * (255)
241 * } CertificateType;
242 *
243 * struct {
244 * select (certificate_type) {
245 * case RawPublicKey:
246 * * From RFC 7250 ASN.1_subjectPublicKeyInfo *
247 * opaque ASN1_subjectPublicKeyInfo<1..2^24-1>;
248 * case X509:
249 * opaque cert_data<1..2^24-1>;
250 * };
251 * Extension extensions<0..2^16-1>;
252 * } CertificateEntry;
253 *
254 * struct {
255 * opaque certificate_request_context<0..2^8-1>;
256 * CertificateEntry certificate_list<0..2^24-1>;
257 * } Certificate;
258 *
259 */
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000260
261/* Parse certificate chain send by the server. */
Xiaofei Bai947571e2021-09-29 09:12:03 +0000262static int ssl_tls13_parse_certificate( mbedtls_ssl_context *ssl,
263 const unsigned char *buf,
264 const unsigned char *end )
265{
266 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
267 size_t certificate_request_context_len = 0;
268 size_t certificate_list_len = 0;
269 const unsigned char *p = buf;
270 const unsigned char *certificate_list_end;
271
272 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, end, 4 );
273 certificate_request_context_len = p[0];
Jerry Yub640bf62021-10-29 10:05:32 +0800274 certificate_list_len = MBEDTLS_GET_UINT24_BE( p, 1 );
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000275 p += 4;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000276
277 /* In theory, the certificate list can be up to 2^24 Bytes, but we don't
278 * support anything beyond 2^16 = 64K.
279 */
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000280 if( ( certificate_request_context_len != 0 ) ||
281 ( certificate_list_len >= 0x10000 ) )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000282 {
283 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate message" ) );
284 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR,
285 MBEDTLS_ERR_SSL_DECODE_ERROR );
286 return( MBEDTLS_ERR_SSL_DECODE_ERROR );
287 }
288
289 /* In case we tried to reuse a session but it failed */
290 if( ssl->session_negotiate->peer_cert != NULL )
291 {
292 mbedtls_x509_crt_free( ssl->session_negotiate->peer_cert );
293 mbedtls_free( ssl->session_negotiate->peer_cert );
294 }
295
296 if( ( ssl->session_negotiate->peer_cert =
297 mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ) ) == NULL )
298 {
299 MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc( %" MBEDTLS_PRINTF_SIZET " bytes ) failed",
300 sizeof( mbedtls_x509_crt ) ) );
301 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR,
302 MBEDTLS_ERR_SSL_ALLOC_FAILED );
303 return( MBEDTLS_ERR_SSL_ALLOC_FAILED );
304 }
305
306 mbedtls_x509_crt_init( ssl->session_negotiate->peer_cert );
307
Xiaofei Bai947571e2021-09-29 09:12:03 +0000308 certificate_list_end = p + certificate_list_len;
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000309 while( p < certificate_list_end )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000310 {
311 size_t cert_data_len, extensions_len;
312
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000313 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, 3 );
Xiaofei Baif93cbd22021-10-29 02:39:30 +0000314 cert_data_len = MBEDTLS_GET_UINT24_BE( p, 0 );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000315 p += 3;
316
317 /* In theory, the CRT can be up to 2^24 Bytes, but we don't support
318 * anything beyond 2^16 = 64K. Otherwise as in the TLS 1.2 code,
319 * check that we have a minimum of 128 bytes of data, this is not
320 * clear why we need that though.
321 */
322 if( ( cert_data_len < 128 ) || ( cert_data_len >= 0x10000 ) )
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000323 {
Xiaofei Bai947571e2021-09-29 09:12:03 +0000324 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad Certificate message" ) );
325 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR,
326 MBEDTLS_ERR_SSL_DECODE_ERROR );
327 return( MBEDTLS_ERR_SSL_DECODE_ERROR );
328 }
329
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000330 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, cert_data_len );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000331 ret = mbedtls_x509_crt_parse_der( ssl->session_negotiate->peer_cert,
332 p, cert_data_len );
333
334 switch( ret )
335 {
336 case 0: /*ok*/
337 break;
338 case MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND:
339 /* Ignore certificate with an unknown algorithm: maybe a
340 prior certificate was already trusted. */
341 break;
342
343 case MBEDTLS_ERR_X509_ALLOC_FAILED:
344 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR,
345 MBEDTLS_ERR_X509_ALLOC_FAILED );
346 MBEDTLS_SSL_DEBUG_RET( 1, " mbedtls_x509_crt_parse_der", ret );
347 return( ret );
348
349 case MBEDTLS_ERR_X509_UNKNOWN_VERSION:
350 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT,
351 MBEDTLS_ERR_X509_UNKNOWN_VERSION );
352 MBEDTLS_SSL_DEBUG_RET( 1, " mbedtls_x509_crt_parse_der", ret );
353 return( ret );
354
355 default:
356 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_BAD_CERT,
357 ret );
358 MBEDTLS_SSL_DEBUG_RET( 1, " mbedtls_x509_crt_parse_der", ret );
359 return( ret );
360 }
361
362 p += cert_data_len;
363
364 /* Certificate extensions length */
365 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, 2 );
366 extensions_len = MBEDTLS_GET_UINT16_BE( p, 0 );
367 p += 2;
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000368 MBEDTLS_SSL_CHK_BUF_READ_PTR( p, certificate_list_end, extensions_len );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000369 p += extensions_len;
370 }
371
372 /* Check that all the message is consumed. */
373 if( p != end )
374 {
375 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad Certificate message" ) );
376 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR, \
377 MBEDTLS_ERR_SSL_DECODE_ERROR );
378 return( MBEDTLS_ERR_SSL_DECODE_ERROR );
379 }
380
381 MBEDTLS_SSL_DEBUG_CRT( 3, "peer certificate", ssl->session_negotiate->peer_cert );
382
383 return( ret );
384}
385#else
386static int ssl_tls13_parse_certificate( mbedtls_ssl_context *ssl,
387 const unsigned char *buf,
388 const unsigned char *end )
389{
390 ((void) ssl);
391 ((void) buf);
392 ((void) end);
393 return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
394}
395#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
396#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
397
398#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
399#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000400/* Validate certificate chain sent by the server. */
Xiaofei Bai947571e2021-09-29 09:12:03 +0000401static int ssl_tls13_validate_certificate( mbedtls_ssl_context *ssl )
402{
403 int ret = 0;
404 mbedtls_x509_crt *ca_chain;
405 mbedtls_x509_crl *ca_crl;
Xiaofei Baiff456022021-10-28 06:50:17 +0000406 uint32_t verify_result = 0;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000407
408#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
409 if( ssl->handshake->sni_ca_chain != NULL )
410 {
411 ca_chain = ssl->handshake->sni_ca_chain;
412 ca_crl = ssl->handshake->sni_ca_crl;
413 }
414 else
415#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
416 {
417 ca_chain = ssl->conf->ca_chain;
418 ca_crl = ssl->conf->ca_crl;
419 }
420
421 /*
422 * Main check: verify certificate
423 */
424 ret = mbedtls_x509_crt_verify_with_profile(
425 ssl->session_negotiate->peer_cert,
426 ca_chain, ca_crl,
427 ssl->conf->cert_profile,
428 ssl->hostname,
Xiaofei Baiff456022021-10-28 06:50:17 +0000429 &verify_result,
Xiaofei Bai947571e2021-09-29 09:12:03 +0000430 ssl->conf->f_vrfy, ssl->conf->p_vrfy );
431
432 if( ret != 0 )
433 {
434 MBEDTLS_SSL_DEBUG_RET( 1, "x509_verify_cert", ret );
435 }
436
437 /*
438 * Secondary checks: always done, but change 'ret' only if it was 0
439 */
440
441#if defined(MBEDTLS_ECP_C)
442 {
443 const mbedtls_pk_context *pk = &ssl->session_negotiate->peer_cert->pk;
444
445 /* If certificate uses an EC key, make sure the curve is OK */
446 if( mbedtls_pk_can_do( pk, MBEDTLS_PK_ECKEY ) &&
447 mbedtls_ssl_check_curve( ssl, mbedtls_pk_ec( *pk )->grp.id ) != 0 )
448 {
Xiaofei Baiff456022021-10-28 06:50:17 +0000449 verify_result |= MBEDTLS_X509_BADCERT_BAD_KEY;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000450
451 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate ( EC key curve )" ) );
452 if( ret == 0 )
453 ret = MBEDTLS_ERR_SSL_BAD_CERTIFICATE;
454 }
455 }
456#endif /* MBEDTLS_ECP_C */
457
458 if( mbedtls_ssl_check_cert_usage( ssl->session_negotiate->peer_cert,
459 ssl->handshake->ciphersuite_info,
460 !ssl->conf->endpoint,
Xiaofei Baiff456022021-10-28 06:50:17 +0000461 &verify_result ) != 0 )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000462 {
463 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate ( usage extensions )" ) );
464 if( ret == 0 )
465 ret = MBEDTLS_ERR_SSL_BAD_CERTIFICATE;
466 }
467
468
469 if( ca_chain == NULL )
470 {
471 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no CA chain" ) );
472 ret = MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED;
473 }
474
475 if( ret != 0 )
476 {
477 /* The certificate may have been rejected for several reasons.
478 Pick one and send the corresponding alert. Which alert to send
479 may be a subject of debate in some cases. */
Xiaofei Baiff456022021-10-28 06:50:17 +0000480 if( verify_result & MBEDTLS_X509_BADCERT_OTHER )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000481 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000482 else if( verify_result & MBEDTLS_X509_BADCERT_CN_MISMATCH )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000483 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_BAD_CERT, ret );
Xiaofei Baif93cbd22021-10-29 02:39:30 +0000484 else if( verify_result & ( MBEDTLS_X509_BADCERT_KEY_USAGE |
485 MBEDTLS_X509_BADCERT_EXT_KEY_USAGE |
486 MBEDTLS_X509_BADCERT_NS_CERT_TYPE |
487 MBEDTLS_X509_BADCERT_BAD_PK |
488 MBEDTLS_X509_BADCERT_BAD_KEY ) )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000489 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000490 else if( verify_result & MBEDTLS_X509_BADCERT_EXPIRED )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000491 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000492 else if( verify_result & MBEDTLS_X509_BADCERT_REVOKED )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000493 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED, ret );
Xiaofei Baiff456022021-10-28 06:50:17 +0000494 else if( verify_result & MBEDTLS_X509_BADCERT_NOT_TRUSTED )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000495 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA, ret );
496 else
497 MBEDTLS_SSL_PEND_FATAL_ALERT( MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN, ret );
498 }
499
500#if defined(MBEDTLS_DEBUG_C)
Xiaofei Baiff456022021-10-28 06:50:17 +0000501 if( verify_result != 0 )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000502 {
503 MBEDTLS_SSL_DEBUG_MSG( 3, ( "! Certificate verification flags %08x",
Jerry Yu83bb1312021-10-28 22:16:33 +0800504 (unsigned int) verify_result ) );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000505 }
506 else
507 {
508 MBEDTLS_SSL_DEBUG_MSG( 3, ( "Certificate verification flags clear" ) );
509 }
510#endif /* MBEDTLS_DEBUG_C */
511
Xiaofei Baiff456022021-10-28 06:50:17 +0000512 ssl->session_negotiate->verify_result = verify_result;
Xiaofei Bai947571e2021-09-29 09:12:03 +0000513 return( ret );
514}
515#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
516static int ssl_tls13_validate_certificate( mbedtls_ssl_context *ssl )
517{
518 ((void) ssl);
519 return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE );
520}
521#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
522#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
523
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000524int mbedtls_ssl_tls13_process_certificate( mbedtls_ssl_context *ssl )
Xiaofei Bai947571e2021-09-29 09:12:03 +0000525{
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000526 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
527 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate" ) );
528
529#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
530 unsigned char *buf;
531 size_t buf_len;
532
533 MBEDTLS_SSL_PROC_CHK( mbedtls_ssl_tls1_3_fetch_handshake_msg(
534 ssl, MBEDTLS_SSL_HS_CERTIFICATE,
535 &buf, &buf_len ) );
536
537 /* Parse the certificate chain sent by the peer. */
538 MBEDTLS_SSL_PROC_CHK( ssl_tls13_parse_certificate( ssl, buf, buf + buf_len ) );
539 /* Validate the certificate chain and set the verification results. */
540 MBEDTLS_SSL_PROC_CHK( ssl_tls13_validate_certificate( ssl ) );
541
542 mbedtls_ssl_tls1_3_add_hs_msg_to_checksum( ssl, MBEDTLS_SSL_HS_CERTIFICATE,
543 buf, buf_len );
544
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000545cleanup:
546
547 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate" ) );
Xiaofei Bai10aeec02021-10-26 09:50:08 +0000548#else
549 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
550 ret = MBEDTLS_ERR_SSL_INTERNAL_ERROR;
551#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
Xiaofei Bai79595ac2021-10-26 07:16:45 +0000552 return( ret );
Xiaofei Bai947571e2021-09-29 09:12:03 +0000553}
554
Jerry Yu65dd2cc2021-08-18 16:38:40 +0800555#endif /* MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL */
556
557#endif /* MBEDTLS_SSL_TLS_C */