1 /*
2  * TLSv1 client - read handshake message
3  * Copyright (c) 2006-2015, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "includes.h"
10 
11 #include "common.h"
12 #include "crypto/md5.h"
13 #include "crypto/sha1.h"
14 #include "crypto/sha256.h"
15 #include "crypto/tls.h"
16 #include "x509v3.h"
17 #include "tlsv1_common.h"
18 #include "tlsv1_record.h"
19 #include "tlsv1_client.h"
20 #include "tlsv1_client_i.h"
21 
22 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
23 					   const u8 *in_data, size_t *in_len);
24 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
25 					   const u8 *in_data, size_t *in_len);
26 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
27 					 const u8 *in_data, size_t *in_len);
28 
29 
30 static int tls_version_disabled(struct tlsv1_client *conn, u16 ver)
31 {
32 	return (((conn->flags & TLS_CONN_DISABLE_TLSv1_0) &&
33 		 ver == TLS_VERSION_1) ||
34 		((conn->flags & TLS_CONN_DISABLE_TLSv1_1) &&
35 		 ver == TLS_VERSION_1_1) ||
36 		((conn->flags & TLS_CONN_DISABLE_TLSv1_2) &&
37 		 ver == TLS_VERSION_1_2));
38 }
39 
40 
41 static int tls_process_server_hello_extensions(struct tlsv1_client *conn,
42 					       const u8 *pos, size_t len)
43 {
44 	const u8 *end = pos + len;
45 
46 	wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions",
47 		    pos, len);
48 	while (pos < end) {
49 		u16 ext, elen;
50 
51 		if (end - pos < 4) {
52 			wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header");
53 			return -1;
54 		}
55 
56 		ext = WPA_GET_BE16(pos);
57 		pos += 2;
58 		elen = WPA_GET_BE16(pos);
59 		pos += 2;
60 
61 		if (elen > end - pos) {
62 			wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension");
63 			return -1;
64 		}
65 
66 		wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u",
67 			   ext);
68 		wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data",
69 			    pos, elen);
70 
71 		pos += elen;
72 	}
73 
74 	return 0;
75 }
76 
77 
78 static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct,
79 				    const u8 *in_data, size_t *in_len)
80 {
81 	const u8 *pos, *end;
82 	size_t left, len, i;
83 	u16 cipher_suite;
84 	u16 tls_version;
85 
86 	if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
87 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
88 			   "received content type 0x%x", ct);
89 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
90 			  TLS_ALERT_UNEXPECTED_MESSAGE);
91 		return -1;
92 	}
93 
94 	pos = in_data;
95 	left = *in_len;
96 
97 	if (left < 4)
98 		goto decode_error;
99 
100 	/* HandshakeType msg_type */
101 	if (*pos != TLS_HANDSHAKE_TYPE_SERVER_HELLO) {
102 		wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
103 			   "message %d (expected ServerHello)", *pos);
104 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
105 			  TLS_ALERT_UNEXPECTED_MESSAGE);
106 		return -1;
107 	}
108 	wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
109 	pos++;
110 	/* uint24 length */
111 	len = WPA_GET_BE24(pos);
112 	pos += 3;
113 	left -= 4;
114 
115 	if (len > left)
116 		goto decode_error;
117 
118 	/* body - ServerHello */
119 
120 	wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len);
121 	end = pos + len;
122 
123 	/* ProtocolVersion server_version */
124 	if (end - pos < 2)
125 		goto decode_error;
126 	tls_version = WPA_GET_BE16(pos);
127 	if (!tls_version_ok(tls_version) ||
128 	    tls_version_disabled(conn, tls_version)) {
129 		wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
130 			   "ServerHello %u.%u", pos[0], pos[1]);
131 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
132 			  TLS_ALERT_PROTOCOL_VERSION);
133 		return -1;
134 	}
135 	pos += 2;
136 
137 	wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
138 		   tls_version_str(tls_version));
139 	conn->rl.tls_version = tls_version;
140 
141 	/* Random random */
142 	if (end - pos < TLS_RANDOM_LEN)
143 		goto decode_error;
144 
145 	os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN);
146 	pos += TLS_RANDOM_LEN;
147 	wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
148 		    conn->server_random, TLS_RANDOM_LEN);
149 
150 	/* SessionID session_id */
151 	if (end - pos < 1)
152 		goto decode_error;
153 	if (end - pos < 1 + *pos || *pos > TLS_SESSION_ID_MAX_LEN)
154 		goto decode_error;
155 	if (conn->session_id_len && conn->session_id_len == *pos &&
156 	    os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
157 		pos += 1 + conn->session_id_len;
158 		wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
159 		conn->session_resumed = 1;
160 	} else {
161 		conn->session_id_len = *pos;
162 		pos++;
163 		os_memcpy(conn->session_id, pos, conn->session_id_len);
164 		pos += conn->session_id_len;
165 	}
166 	wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
167 		    conn->session_id, conn->session_id_len);
168 
169 	/* CipherSuite cipher_suite */
170 	if (end - pos < 2)
171 		goto decode_error;
172 	cipher_suite = WPA_GET_BE16(pos);
173 	pos += 2;
174 	for (i = 0; i < conn->num_cipher_suites; i++) {
175 		if (cipher_suite == conn->cipher_suites[i])
176 			break;
177 	}
178 	if (i == conn->num_cipher_suites) {
179 		wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected "
180 			   "cipher suite 0x%04x", cipher_suite);
181 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
182 			  TLS_ALERT_ILLEGAL_PARAMETER);
183 		return -1;
184 	}
185 
186 	if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) {
187 		wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
188 			   "cipher suite for a resumed connection (0x%04x != "
189 			   "0x%04x)", cipher_suite, conn->prev_cipher_suite);
190 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
191 			  TLS_ALERT_ILLEGAL_PARAMETER);
192 		return -1;
193 	}
194 
195 	if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) {
196 		wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
197 			   "record layer");
198 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
199 			  TLS_ALERT_INTERNAL_ERROR);
200 		return -1;
201 	}
202 
203 	conn->prev_cipher_suite = cipher_suite;
204 
205 	/* CompressionMethod compression_method */
206 	if (end - pos < 1)
207 		goto decode_error;
208 	if (*pos != TLS_COMPRESSION_NULL) {
209 		wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected "
210 			   "compression 0x%02x", *pos);
211 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
212 			  TLS_ALERT_ILLEGAL_PARAMETER);
213 		return -1;
214 	}
215 	pos++;
216 
217 	if (end - pos >= 2) {
218 		u16 ext_len;
219 
220 		ext_len = WPA_GET_BE16(pos);
221 		pos += 2;
222 		if (end - pos < ext_len) {
223 			wpa_printf(MSG_INFO,
224 				   "TLSv1: Invalid ServerHello extension length: %u (left: %u)",
225 				   ext_len, (unsigned int) (end - pos));
226 			goto decode_error;
227 		}
228 
229 		if (tls_process_server_hello_extensions(conn, pos, ext_len))
230 			goto decode_error;
231 		pos += ext_len;
232 	}
233 
234 	if (end != pos) {
235 		wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
236 			    "end of ServerHello", pos, end - pos);
237 		goto decode_error;
238 	}
239 
240 	if (conn->session_ticket_included && conn->session_ticket_cb) {
241 		/* TODO: include SessionTicket extension if one was included in
242 		 * ServerHello */
243 		int res = conn->session_ticket_cb(
244 			conn->session_ticket_cb_ctx, NULL, 0,
245 			conn->client_random, conn->server_random,
246 			conn->master_secret);
247 		if (res < 0) {
248 			wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
249 				   "indicated failure");
250 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
251 				  TLS_ALERT_HANDSHAKE_FAILURE);
252 			return -1;
253 		}
254 		conn->use_session_ticket = !!res;
255 	}
256 
257 	if ((conn->session_resumed || conn->use_session_ticket) &&
258 	    tls_derive_keys(conn, NULL, 0)) {
259 		wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys");
260 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
261 			  TLS_ALERT_INTERNAL_ERROR);
262 		return -1;
263 	}
264 
265 	*in_len = end - in_data;
266 
267 	conn->state = (conn->session_resumed || conn->use_session_ticket) ?
268 		SERVER_CHANGE_CIPHER_SPEC : SERVER_CERTIFICATE;
269 
270 	return 0;
271 
272 decode_error:
273 	wpa_printf(MSG_DEBUG, "TLSv1: Failed to decode ServerHello");
274 	tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
275 	return -1;
276 }
277 
278 
279 static void tls_peer_cert_event(struct tlsv1_client *conn, int depth,
280 				struct x509_certificate *cert)
281 {
282 	union tls_event_data ev;
283 	struct wpabuf *cert_buf = NULL;
284 #ifdef CONFIG_SHA256
285 	u8 hash[32];
286 #endif /* CONFIG_SHA256 */
287 	char subject[128];
288 
289 	if (!conn->event_cb)
290 		return;
291 
292 	os_memset(&ev, 0, sizeof(ev));
293 	if (conn->cred->cert_probe || conn->cert_in_cb) {
294 		cert_buf = wpabuf_alloc_copy(cert->cert_start,
295 					     cert->cert_len);
296 		ev.peer_cert.cert = cert_buf;
297 	}
298 #ifdef CONFIG_SHA256
299 	if (cert_buf) {
300 		const u8 *addr[1];
301 		size_t len[1];
302 		addr[0] = wpabuf_head(cert_buf);
303 		len[0] = wpabuf_len(cert_buf);
304 		if (sha256_vector(1, addr, len, hash) == 0) {
305 			ev.peer_cert.hash = hash;
306 			ev.peer_cert.hash_len = sizeof(hash);
307 		}
308 	}
309 #endif /* CONFIG_SHA256 */
310 
311 	ev.peer_cert.depth = depth;
312 	x509_name_string(&cert->subject, subject, sizeof(subject));
313 	ev.peer_cert.subject = subject;
314 
315 	conn->event_cb(conn->cb_ctx, TLS_PEER_CERTIFICATE, &ev);
316 	wpabuf_free(cert_buf);
317 }
318 
319 
320 static void tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth,
321 					 struct x509_certificate *cert,
322 					 enum tls_fail_reason reason,
323 					 const char *reason_txt)
324 {
325 	struct wpabuf *cert_buf = NULL;
326 	union tls_event_data ev;
327 	char subject[128];
328 
329 	if (!conn->event_cb || !cert)
330 		return;
331 
332 	os_memset(&ev, 0, sizeof(ev));
333 	ev.cert_fail.depth = depth;
334 	x509_name_string(&cert->subject, subject, sizeof(subject));
335 	ev.peer_cert.subject = subject;
336 	ev.cert_fail.reason = reason;
337 	ev.cert_fail.reason_txt = reason_txt;
338 	cert_buf = wpabuf_alloc_copy(cert->cert_start,
339 				     cert->cert_len);
340 	ev.cert_fail.cert = cert_buf;
341 	conn->event_cb(conn->cb_ctx, TLS_CERT_CHAIN_FAILURE, &ev);
342 	wpabuf_free(cert_buf);
343 }
344 
345 
346 static int tls_process_certificate(struct tlsv1_client *conn, u8 ct,
347 				   const u8 *in_data, size_t *in_len)
348 {
349 	const u8 *pos, *end;
350 	size_t left, len, list_len, cert_len, idx;
351 	u8 type;
352 	struct x509_certificate *chain = NULL, *last = NULL, *cert;
353 	int reason;
354 
355 	if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
356 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
357 			   "received content type 0x%x", ct);
358 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
359 			  TLS_ALERT_UNEXPECTED_MESSAGE);
360 		return -1;
361 	}
362 
363 	pos = in_data;
364 	left = *in_len;
365 
366 	if (left < 4) {
367 		wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate message "
368 			   "(len=%lu)", (unsigned long) left);
369 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
370 		return -1;
371 	}
372 
373 	type = *pos++;
374 	len = WPA_GET_BE24(pos);
375 	pos += 3;
376 	left -= 4;
377 
378 	if (len > left) {
379 		wpa_printf(MSG_DEBUG, "TLSv1: Unexpected Certificate message "
380 			   "length (len=%lu != left=%lu)",
381 			   (unsigned long) len, (unsigned long) left);
382 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
383 		return -1;
384 	}
385 
386 	if (type == TLS_HANDSHAKE_TYPE_SERVER_KEY_EXCHANGE)
387 		return tls_process_server_key_exchange(conn, ct, in_data,
388 						       in_len);
389 	if (type == TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST)
390 		return tls_process_certificate_request(conn, ct, in_data,
391 						       in_len);
392 	if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
393 		return tls_process_server_hello_done(conn, ct, in_data,
394 						     in_len);
395 	if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE) {
396 		wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
397 			   "message %d (expected Certificate/"
398 			   "ServerKeyExchange/CertificateRequest/"
399 			   "ServerHelloDone)", type);
400 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
401 			  TLS_ALERT_UNEXPECTED_MESSAGE);
402 		return -1;
403 	}
404 
405 	wpa_printf(MSG_DEBUG,
406 		   "TLSv1: Received Certificate (certificate_list len %lu)",
407 		   (unsigned long) len);
408 
409 	/*
410 	 * opaque ASN.1Cert<2^24-1>;
411 	 *
412 	 * struct {
413 	 *     ASN.1Cert certificate_list<1..2^24-1>;
414 	 * } Certificate;
415 	 */
416 
417 	end = pos + len;
418 
419 	if (end - pos < 3) {
420 		wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate "
421 			   "(left=%lu)", (unsigned long) left);
422 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
423 		return -1;
424 	}
425 
426 	list_len = WPA_GET_BE24(pos);
427 	pos += 3;
428 
429 	if ((size_t) (end - pos) != list_len) {
430 		wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate_list "
431 			   "length (len=%lu left=%lu)",
432 			   (unsigned long) list_len,
433 			   (unsigned long) (end - pos));
434 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
435 		return -1;
436 	}
437 
438 	idx = 0;
439 	while (pos < end) {
440 		if (end - pos < 3) {
441 			wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
442 				   "certificate_list");
443 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
444 				  TLS_ALERT_DECODE_ERROR);
445 			x509_certificate_chain_free(chain);
446 			return -1;
447 		}
448 
449 		cert_len = WPA_GET_BE24(pos);
450 		pos += 3;
451 
452 		if ((size_t) (end - pos) < cert_len) {
453 			wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate "
454 				   "length (len=%lu left=%lu)",
455 				   (unsigned long) cert_len,
456 				   (unsigned long) (end - pos));
457 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
458 				  TLS_ALERT_DECODE_ERROR);
459 			x509_certificate_chain_free(chain);
460 			return -1;
461 		}
462 
463 		wpa_printf(MSG_DEBUG, "TLSv1: Certificate %lu (len %lu)",
464 			   (unsigned long) idx, (unsigned long) cert_len);
465 
466 		if (idx == 0) {
467 			crypto_public_key_free(conn->server_rsa_key);
468 			if (tls_parse_cert(pos, cert_len,
469 					   &conn->server_rsa_key)) {
470 				wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
471 					   "the certificate");
472 				tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
473 					  TLS_ALERT_BAD_CERTIFICATE);
474 				x509_certificate_chain_free(chain);
475 				return -1;
476 			}
477 		}
478 
479 		cert = x509_certificate_parse(pos, cert_len);
480 		if (cert == NULL) {
481 			wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
482 				   "the certificate");
483 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
484 				  TLS_ALERT_BAD_CERTIFICATE);
485 			x509_certificate_chain_free(chain);
486 			return -1;
487 		}
488 
489 		tls_peer_cert_event(conn, idx, cert);
490 
491 		if (last == NULL)
492 			chain = cert;
493 		else
494 			last->next = cert;
495 		last = cert;
496 
497 		idx++;
498 		pos += cert_len;
499 	}
500 
501 	if (conn->cred && conn->cred->server_cert_only && chain) {
502 		u8 hash[SHA256_MAC_LEN];
503 		char buf[128];
504 
505 		wpa_printf(MSG_DEBUG,
506 			   "TLSv1: Validate server certificate hash");
507 		x509_name_string(&chain->subject, buf, sizeof(buf));
508 		wpa_printf(MSG_DEBUG, "TLSv1: 0: %s", buf);
509 		if (sha256_vector(1, &chain->cert_start, &chain->cert_len,
510 				  hash) < 0 ||
511 		    os_memcmp(conn->cred->srv_cert_hash, hash,
512 			      SHA256_MAC_LEN) != 0) {
513 			wpa_printf(MSG_DEBUG,
514 				   "TLSv1: Server certificate hash mismatch");
515 			wpa_hexdump(MSG_MSGDUMP, "TLSv1: SHA256 hash",
516 				    hash, SHA256_MAC_LEN);
517 			if (conn->event_cb) {
518 				union tls_event_data ev;
519 
520 				os_memset(&ev, 0, sizeof(ev));
521 				ev.cert_fail.reason = TLS_FAIL_UNSPECIFIED;
522 				ev.cert_fail.reason_txt =
523 					"Server certificate mismatch";
524 				ev.cert_fail.subject = buf;
525 				conn->event_cb(conn->cb_ctx,
526 					       TLS_CERT_CHAIN_FAILURE, &ev);
527 			}
528 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
529 				  TLS_ALERT_BAD_CERTIFICATE);
530 			x509_certificate_chain_free(chain);
531 			return -1;
532 		}
533 	} else if (conn->cred && conn->cred->cert_probe) {
534 		wpa_printf(MSG_DEBUG,
535 			   "TLSv1: Reject server certificate on probe-only rune");
536 		if (conn->event_cb) {
537 			union tls_event_data ev;
538 			char buf[128];
539 
540 			os_memset(&ev, 0, sizeof(ev));
541 			ev.cert_fail.reason = TLS_FAIL_SERVER_CHAIN_PROBE;
542 			ev.cert_fail.reason_txt =
543 				"Server certificate chain probe";
544 			if (chain) {
545 				x509_name_string(&chain->subject, buf,
546 						 sizeof(buf));
547 				ev.cert_fail.subject = buf;
548 			}
549 			conn->event_cb(conn->cb_ctx, TLS_CERT_CHAIN_FAILURE,
550 				       &ev);
551 		}
552 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
553 			  TLS_ALERT_BAD_CERTIFICATE);
554 		x509_certificate_chain_free(chain);
555 		return -1;
556 	} else if (conn->cred && conn->cred->ca_cert_verify &&
557 		   x509_certificate_chain_validate(
558 			   conn->cred->trusted_certs, chain, &reason,
559 			   !!(conn->flags & TLS_CONN_DISABLE_TIME_CHECKS))
560 		   < 0) {
561 		int tls_reason;
562 		wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
563 			   "validation failed (reason=%d)", reason);
564 		switch (reason) {
565 		case X509_VALIDATE_BAD_CERTIFICATE:
566 			tls_reason = TLS_ALERT_BAD_CERTIFICATE;
567 			tls_cert_chain_failure_event(
568 				conn, 0, chain, TLS_FAIL_BAD_CERTIFICATE,
569 				"bad certificate");
570 			break;
571 		case X509_VALIDATE_UNSUPPORTED_CERTIFICATE:
572 			tls_reason = TLS_ALERT_UNSUPPORTED_CERTIFICATE;
573 			break;
574 		case X509_VALIDATE_CERTIFICATE_REVOKED:
575 			tls_reason = TLS_ALERT_CERTIFICATE_REVOKED;
576 			tls_cert_chain_failure_event(
577 				conn, 0, chain, TLS_FAIL_REVOKED,
578 				"certificate revoked");
579 			break;
580 		case X509_VALIDATE_CERTIFICATE_EXPIRED:
581 			tls_reason = TLS_ALERT_CERTIFICATE_EXPIRED;
582 			tls_cert_chain_failure_event(
583 				conn, 0, chain, TLS_FAIL_EXPIRED,
584 				"certificate has expired or is not yet valid");
585 			break;
586 		case X509_VALIDATE_CERTIFICATE_UNKNOWN:
587 			tls_reason = TLS_ALERT_CERTIFICATE_UNKNOWN;
588 			break;
589 		case X509_VALIDATE_UNKNOWN_CA:
590 			tls_reason = TLS_ALERT_UNKNOWN_CA;
591 			tls_cert_chain_failure_event(
592 				conn, 0, chain, TLS_FAIL_UNTRUSTED,
593 				"unknown CA");
594 			break;
595 		default:
596 			tls_reason = TLS_ALERT_BAD_CERTIFICATE;
597 			break;
598 		}
599 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, tls_reason);
600 		x509_certificate_chain_free(chain);
601 		return -1;
602 	}
603 
604 	if (conn->cred && !conn->cred->server_cert_only && chain &&
605 	    (chain->extensions_present & X509_EXT_EXT_KEY_USAGE) &&
606 	    !(chain->ext_key_usage &
607 	      (X509_EXT_KEY_USAGE_ANY | X509_EXT_KEY_USAGE_SERVER_AUTH))) {
608 		tls_cert_chain_failure_event(
609 			conn, 0, chain, TLS_FAIL_BAD_CERTIFICATE,
610 			"certificate not allowed for server authentication");
611 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
612 			  TLS_ALERT_BAD_CERTIFICATE);
613 		x509_certificate_chain_free(chain);
614 		return -1;
615 	}
616 
617 	if (conn->flags & TLS_CONN_REQUEST_OCSP) {
618 		x509_certificate_chain_free(conn->server_cert);
619 		conn->server_cert = chain;
620 	} else {
621 		x509_certificate_chain_free(chain);
622 	}
623 
624 	*in_len = end - in_data;
625 
626 	conn->state = SERVER_KEY_EXCHANGE;
627 
628 	return 0;
629 }
630 
631 
632 static unsigned int count_bits(const u8 *val, size_t len)
633 {
634 	size_t i;
635 	unsigned int bits;
636 	u8 tmp;
637 
638 	for (i = 0; i < len; i++) {
639 		if (val[i])
640 			break;
641 	}
642 	if (i == len)
643 		return 0;
644 
645 	bits = (len - i - 1) * 8;
646 	tmp = val[i];
647 	while (tmp) {
648 		bits++;
649 		tmp >>= 1;
650 	}
651 
652 	return bits;
653 }
654 
655 
656 static int tlsv1_process_diffie_hellman(struct tlsv1_client *conn,
657 					const u8 *buf, size_t len,
658 					tls_key_exchange key_exchange)
659 {
660 	const u8 *pos, *end, *server_params, *server_params_end;
661 	u8 alert;
662 	unsigned int bits;
663 	u16 val;
664 
665 	tlsv1_client_free_dh(conn);
666 
667 	pos = buf;
668 	end = buf + len;
669 
670 	if (end - pos < 3)
671 		goto fail;
672 	server_params = pos;
673 	val = WPA_GET_BE16(pos);
674 	pos += 2;
675 	if (val == 0 || val > (size_t) (end - pos)) {
676 		wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %u", val);
677 		goto fail;
678 	}
679 	conn->dh_p_len = val;
680 	bits = count_bits(pos, conn->dh_p_len);
681 	if (bits < 768) {
682 		wpa_printf(MSG_INFO, "TLSv1: Reject under 768-bit DH prime (insecure; only %u bits)",
683 			   bits);
684 		wpa_hexdump(MSG_DEBUG, "TLSv1: Rejected DH prime",
685 			    pos, conn->dh_p_len);
686 		goto fail;
687 	}
688 	conn->dh_p = os_malloc(conn->dh_p_len);
689 	if (conn->dh_p == NULL)
690 		goto fail;
691 	os_memcpy(conn->dh_p, pos, conn->dh_p_len);
692 	pos += conn->dh_p_len;
693 	wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)",
694 		    conn->dh_p, conn->dh_p_len);
695 
696 	if (end - pos < 3)
697 		goto fail;
698 	val = WPA_GET_BE16(pos);
699 	pos += 2;
700 	if (val == 0 || val > (size_t) (end - pos))
701 		goto fail;
702 	conn->dh_g_len = val;
703 	conn->dh_g = os_malloc(conn->dh_g_len);
704 	if (conn->dh_g == NULL)
705 		goto fail;
706 	os_memcpy(conn->dh_g, pos, conn->dh_g_len);
707 	pos += conn->dh_g_len;
708 	wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)",
709 		    conn->dh_g, conn->dh_g_len);
710 	if (conn->dh_g_len == 1 && conn->dh_g[0] < 2)
711 		goto fail;
712 
713 	if (end - pos < 3)
714 		goto fail;
715 	val = WPA_GET_BE16(pos);
716 	pos += 2;
717 	if (val == 0 || val > (size_t) (end - pos))
718 		goto fail;
719 	conn->dh_ys_len = val;
720 	conn->dh_ys = os_malloc(conn->dh_ys_len);
721 	if (conn->dh_ys == NULL)
722 		goto fail;
723 	os_memcpy(conn->dh_ys, pos, conn->dh_ys_len);
724 	pos += conn->dh_ys_len;
725 	wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)",
726 		    conn->dh_ys, conn->dh_ys_len);
727 	server_params_end = pos;
728 
729 	if (key_exchange == TLS_KEY_X_DHE_RSA) {
730 		u8 hash[64];
731 		int hlen;
732 
733 		if (conn->rl.tls_version == TLS_VERSION_1_2) {
734 #ifdef CONFIG_TLSV12
735 			/*
736 			 * RFC 5246, 4.7:
737 			 * TLS v1.2 adds explicit indication of the used
738 			 * signature and hash algorithms.
739 			 *
740 			 * struct {
741 			 *   HashAlgorithm hash;
742 			 *   SignatureAlgorithm signature;
743 			 * } SignatureAndHashAlgorithm;
744 			 */
745 			if (end - pos < 2)
746 				goto fail;
747 			if ((pos[0] != TLS_HASH_ALG_SHA256 &&
748 			     pos[0] != TLS_HASH_ALG_SHA384 &&
749 			     pos[0] != TLS_HASH_ALG_SHA512) ||
750 			    pos[1] != TLS_SIGN_ALG_RSA) {
751 				wpa_printf(MSG_DEBUG, "TLSv1.2: Unsupported hash(%u)/signature(%u) algorithm",
752 					   pos[0], pos[1]);
753 				goto fail;
754 			}
755 
756 			hlen = tlsv12_key_x_server_params_hash(
757 				conn->rl.tls_version, pos[0],
758 				conn->client_random,
759 				conn->server_random, server_params,
760 				server_params_end - server_params, hash);
761 			pos += 2;
762 #else /* CONFIG_TLSV12 */
763 			goto fail;
764 #endif /* CONFIG_TLSV12 */
765 		} else {
766 			hlen = tls_key_x_server_params_hash(
767 				conn->rl.tls_version, conn->client_random,
768 				conn->server_random, server_params,
769 				server_params_end - server_params, hash);
770 		}
771 
772 		if (hlen < 0)
773 			goto fail;
774 		wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerKeyExchange hash",
775 			    hash, hlen);
776 
777 		if (tls_verify_signature(conn->rl.tls_version,
778 					 conn->server_rsa_key,
779 					 hash, hlen, pos, end - pos,
780 					 &alert) < 0)
781 			goto fail;
782 	}
783 
784 	return 0;
785 
786 fail:
787 	wpa_printf(MSG_DEBUG, "TLSv1: Processing DH params failed");
788 	tlsv1_client_free_dh(conn);
789 	return -1;
790 }
791 
792 
793 static enum tls_ocsp_result
794 tls_process_certificate_status_ocsp_response(struct tlsv1_client *conn,
795 					     const u8 *pos, size_t len)
796 {
797 	const u8 *end = pos + len;
798 	u32 ocsp_resp_len;
799 
800 	/* opaque OCSPResponse<1..2^24-1>; */
801 	if (end - pos < 3) {
802 		wpa_printf(MSG_INFO, "TLSv1: Too short OCSPResponse");
803 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
804 		return TLS_OCSP_INVALID;
805 	}
806 	ocsp_resp_len = WPA_GET_BE24(pos);
807 	pos += 3;
808 	if (end - pos < ocsp_resp_len) {
809 		wpa_printf(MSG_INFO, "TLSv1: Truncated OCSPResponse");
810 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
811 		return TLS_OCSP_INVALID;
812 	}
813 
814 	return tls_process_ocsp_response(conn, pos, ocsp_resp_len);
815 }
816 
817 
818 static int tls_process_certificate_status(struct tlsv1_client *conn, u8 ct,
819 					   const u8 *in_data, size_t *in_len)
820 {
821 	const u8 *pos, *end;
822 	size_t left, len;
823 	u8 type, status_type;
824 	enum tls_ocsp_result res;
825 	struct x509_certificate *cert;
826 	int depth;
827 
828 	if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
829 		wpa_printf(MSG_DEBUG,
830 			   "TLSv1: Expected Handshake; received content type 0x%x",
831 			   ct);
832 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
833 			  TLS_ALERT_UNEXPECTED_MESSAGE);
834 		return -1;
835 	}
836 
837 	pos = in_data;
838 	left = *in_len;
839 
840 	if (left < 4) {
841 		wpa_printf(MSG_DEBUG,
842 			   "TLSv1: Too short CertificateStatus (left=%lu)",
843 			   (unsigned long) left);
844 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
845 		return -1;
846 	}
847 
848 	type = *pos++;
849 	len = WPA_GET_BE24(pos);
850 	pos += 3;
851 	left -= 4;
852 
853 	if (len > left) {
854 		wpa_printf(MSG_DEBUG,
855 			   "TLSv1: Mismatch in CertificateStatus length (len=%lu != left=%lu)",
856 			   (unsigned long) len, (unsigned long) left);
857 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
858 		return -1;
859 	}
860 
861 	end = pos + len;
862 
863 	if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE_STATUS) {
864 		wpa_printf(MSG_DEBUG,
865 			   "TLSv1: Received unexpected handshake message %d (expected CertificateStatus)",
866 			   type);
867 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
868 			  TLS_ALERT_UNEXPECTED_MESSAGE);
869 		return -1;
870 	}
871 
872 	wpa_printf(MSG_DEBUG, "TLSv1: Received CertificateStatus");
873 
874 	/*
875 	 * struct {
876 	 *     CertificateStatusType status_type;
877 	 *     select (status_type) {
878 	 *         case ocsp: OCSPResponse;
879 	 *         case ocsp_multi: OCSPResponseList;
880 	 *     } response;
881 	 * } CertificateStatus;
882 	 */
883 	if (end - pos < 1) {
884 		wpa_printf(MSG_INFO, "TLSv1: Too short CertificateStatus");
885 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
886 		return -1;
887 	}
888 	status_type = *pos++;
889 	wpa_printf(MSG_DEBUG, "TLSv1: CertificateStatus status_type %u",
890 		   status_type);
891 
892 	if (status_type == 1 /* ocsp */) {
893 		res = tls_process_certificate_status_ocsp_response(
894 			conn, pos, end - pos);
895 	} else if (status_type == 2 /* ocsp_multi */) {
896 		int good = 0, revoked = 0;
897 		u32 resp_len;
898 
899 		res = TLS_OCSP_NO_RESPONSE;
900 
901 		/*
902 		 * opaque OCSPResponse<0..2^24-1>;
903 		 *
904 		 * struct {
905 		 *   OCSPResponse ocsp_response_list<1..2^24-1>;
906 		 * } OCSPResponseList;
907 		 */
908 		if (end - pos < 3) {
909 			wpa_printf(MSG_DEBUG,
910 				   "TLSv1: Truncated OCSPResponseList");
911 			res = TLS_OCSP_INVALID;
912 			goto done;
913 		}
914 		resp_len = WPA_GET_BE24(pos);
915 		pos += 3;
916 		if (end - pos < resp_len) {
917 			wpa_printf(MSG_DEBUG,
918 				   "TLSv1: Truncated OCSPResponseList(len=%u)",
919 				   resp_len);
920 			res = TLS_OCSP_INVALID;
921 			goto done;
922 		}
923 		end = pos + resp_len;
924 
925 		while (end - pos >= 3) {
926 			resp_len = WPA_GET_BE24(pos);
927 			pos += 3;
928 			if (resp_len > end - pos) {
929 				wpa_printf(MSG_DEBUG,
930 					   "TLSv1: Truncated OCSPResponse(len=%u; left=%d) in ocsp_multi",
931 					   resp_len, (int) (end - pos));
932 				res = TLS_OCSP_INVALID;
933 				break;
934 			}
935 			if (!resp_len)
936 				continue; /* Skip an empty response */
937 			res = tls_process_certificate_status_ocsp_response(
938 				conn, pos - 3, resp_len + 3);
939 			if (res == TLS_OCSP_REVOKED)
940 				revoked++;
941 			else if (res == TLS_OCSP_GOOD)
942 				good++;
943 			pos += resp_len;
944 		}
945 
946 		if (revoked)
947 			res = TLS_OCSP_REVOKED;
948 		else if (good)
949 			res = TLS_OCSP_GOOD;
950 	} else {
951 		wpa_printf(MSG_DEBUG,
952 			   "TLSv1: Ignore unsupported CertificateStatus");
953 		goto skip;
954 	}
955 
956 done:
957 	if (res == TLS_OCSP_REVOKED) {
958 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
959 			  TLS_ALERT_CERTIFICATE_REVOKED);
960 		for (cert = conn->server_cert, depth = 0; cert;
961 		     cert = cert->next, depth++) {
962 			if (cert->ocsp_revoked) {
963 				tls_cert_chain_failure_event(
964 					conn, depth, cert, TLS_FAIL_REVOKED,
965 					"certificate revoked");
966 			}
967 		}
968 		return -1;
969 	}
970 
971 	if (conn->flags & TLS_CONN_REQUIRE_OCSP_ALL) {
972 		/*
973 		 * Verify that each certificate on the chain that is not part
974 		 * of the trusted certificates has a good status. If not,
975 		 * terminate handshake.
976 		 */
977 		for (cert = conn->server_cert, depth = 0; cert;
978 		     cert = cert->next, depth++) {
979 			if (!cert->ocsp_good) {
980 				tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
981 					  TLS_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE);
982 				tls_cert_chain_failure_event(
983 					conn, depth, cert,
984 					TLS_FAIL_UNSPECIFIED,
985 					"bad certificate status response");
986 				return -1;
987 			}
988 			if (cert->issuer_trusted)
989 				break;
990 		}
991 	}
992 
993 	if ((conn->flags & TLS_CONN_REQUIRE_OCSP) && res != TLS_OCSP_GOOD) {
994 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
995 			  res == TLS_OCSP_INVALID ? TLS_ALERT_DECODE_ERROR :
996 			  TLS_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE);
997 		if (conn->server_cert)
998 			tls_cert_chain_failure_event(
999 				conn, 0, conn->server_cert,
1000 				TLS_FAIL_UNSPECIFIED,
1001 				"bad certificate status response");
1002 		return -1;
1003 	}
1004 
1005 	conn->ocsp_resp_received = 1;
1006 
1007 skip:
1008 	*in_len = end - in_data;
1009 
1010 	conn->state = SERVER_KEY_EXCHANGE;
1011 
1012 	return 0;
1013 }
1014 
1015 
1016 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
1017 					   const u8 *in_data, size_t *in_len)
1018 {
1019 	const u8 *pos, *end;
1020 	size_t left, len;
1021 	u8 type;
1022 	const struct tls_cipher_suite *suite;
1023 
1024 	if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
1025 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
1026 			   "received content type 0x%x", ct);
1027 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1028 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1029 		return -1;
1030 	}
1031 
1032 	pos = in_data;
1033 	left = *in_len;
1034 
1035 	if (left < 4) {
1036 		wpa_printf(MSG_DEBUG, "TLSv1: Too short ServerKeyExchange "
1037 			   "(Left=%lu)", (unsigned long) left);
1038 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
1039 		return -1;
1040 	}
1041 
1042 	type = *pos++;
1043 	len = WPA_GET_BE24(pos);
1044 	pos += 3;
1045 	left -= 4;
1046 
1047 	if (len > left) {
1048 		wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerKeyExchange "
1049 			   "length (len=%lu != left=%lu)",
1050 			   (unsigned long) len, (unsigned long) left);
1051 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
1052 		return -1;
1053 	}
1054 
1055 	end = pos + len;
1056 
1057 	if ((conn->flags & TLS_CONN_REQUEST_OCSP) &&
1058 	    type == TLS_HANDSHAKE_TYPE_CERTIFICATE_STATUS)
1059 		return tls_process_certificate_status(conn, ct, in_data,
1060 						      in_len);
1061 	if (type == TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST)
1062 		return tls_process_certificate_request(conn, ct, in_data,
1063 						       in_len);
1064 	if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
1065 		return tls_process_server_hello_done(conn, ct, in_data,
1066 						     in_len);
1067 	if (type != TLS_HANDSHAKE_TYPE_SERVER_KEY_EXCHANGE) {
1068 		wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
1069 			   "message %d (expected ServerKeyExchange/"
1070 			   "CertificateRequest/ServerHelloDone%s)", type,
1071 			   (conn->flags & TLS_CONN_REQUEST_OCSP) ?
1072 			   "/CertificateStatus" : "");
1073 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1074 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1075 		return -1;
1076 	}
1077 
1078 	wpa_printf(MSG_DEBUG, "TLSv1: Received ServerKeyExchange");
1079 
1080 	if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) {
1081 		wpa_printf(MSG_DEBUG, "TLSv1: ServerKeyExchange not allowed "
1082 			   "with the selected cipher suite");
1083 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1084 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1085 		return -1;
1086 	}
1087 
1088 	wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len);
1089 	suite = tls_get_cipher_suite(conn->rl.cipher_suite);
1090 	if (suite && (suite->key_exchange == TLS_KEY_X_DH_anon ||
1091 		      suite->key_exchange == TLS_KEY_X_DHE_RSA)) {
1092 		if (tlsv1_process_diffie_hellman(conn, pos, len,
1093 						 suite->key_exchange) < 0) {
1094 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1095 				  TLS_ALERT_DECODE_ERROR);
1096 			return -1;
1097 		}
1098 	} else {
1099 		wpa_printf(MSG_DEBUG, "TLSv1: UnexpectedServerKeyExchange");
1100 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1101 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1102 		return -1;
1103 	}
1104 
1105 	*in_len = end - in_data;
1106 
1107 	conn->state = SERVER_CERTIFICATE_REQUEST;
1108 
1109 	return 0;
1110 }
1111 
1112 
1113 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
1114 					   const u8 *in_data, size_t *in_len)
1115 {
1116 	const u8 *pos, *end;
1117 	size_t left, len;
1118 	u8 type;
1119 
1120 	if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
1121 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
1122 			   "received content type 0x%x", ct);
1123 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1124 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1125 		return -1;
1126 	}
1127 
1128 	pos = in_data;
1129 	left = *in_len;
1130 
1131 	if (left < 4) {
1132 		wpa_printf(MSG_DEBUG, "TLSv1: Too short CertificateRequest "
1133 			   "(left=%lu)", (unsigned long) left);
1134 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
1135 		return -1;
1136 	}
1137 
1138 	type = *pos++;
1139 	len = WPA_GET_BE24(pos);
1140 	pos += 3;
1141 	left -= 4;
1142 
1143 	if (len > left) {
1144 		wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in CertificateRequest "
1145 			   "length (len=%lu != left=%lu)",
1146 			   (unsigned long) len, (unsigned long) left);
1147 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
1148 		return -1;
1149 	}
1150 
1151 	end = pos + len;
1152 
1153 	if (type == TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE)
1154 		return tls_process_server_hello_done(conn, ct, in_data,
1155 						     in_len);
1156 	if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST) {
1157 		wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
1158 			   "message %d (expected CertificateRequest/"
1159 			   "ServerHelloDone)", type);
1160 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1161 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1162 		return -1;
1163 	}
1164 
1165 	wpa_printf(MSG_DEBUG, "TLSv1: Received CertificateRequest");
1166 
1167 	conn->certificate_requested = 1;
1168 
1169 	*in_len = end - in_data;
1170 
1171 	conn->state = SERVER_HELLO_DONE;
1172 
1173 	return 0;
1174 }
1175 
1176 
1177 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
1178 					 const u8 *in_data, size_t *in_len)
1179 {
1180 	const u8 *pos, *end;
1181 	size_t left, len;
1182 	u8 type;
1183 
1184 	if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
1185 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
1186 			   "received content type 0x%x", ct);
1187 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1188 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1189 		return -1;
1190 	}
1191 
1192 	pos = in_data;
1193 	left = *in_len;
1194 
1195 	if (left < 4) {
1196 		wpa_printf(MSG_DEBUG, "TLSv1: Too short ServerHelloDone "
1197 			   "(left=%lu)", (unsigned long) left);
1198 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
1199 		return -1;
1200 	}
1201 
1202 	type = *pos++;
1203 	len = WPA_GET_BE24(pos);
1204 	pos += 3;
1205 	left -= 4;
1206 
1207 	if (len > left) {
1208 		wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ServerHelloDone "
1209 			   "length (len=%lu != left=%lu)",
1210 			   (unsigned long) len, (unsigned long) left);
1211 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
1212 		return -1;
1213 	}
1214 	end = pos + len;
1215 
1216 	if (type != TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE) {
1217 		wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
1218 			   "message %d (expected ServerHelloDone)", type);
1219 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1220 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1221 		return -1;
1222 	}
1223 
1224 	wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHelloDone");
1225 
1226 	if ((conn->flags & TLS_CONN_REQUIRE_OCSP) &&
1227 	    !conn->ocsp_resp_received) {
1228 		wpa_printf(MSG_INFO,
1229 			   "TLSv1: No OCSP response received - reject handshake");
1230 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1231 			  TLS_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE);
1232 		return -1;
1233 	}
1234 
1235 	*in_len = end - in_data;
1236 
1237 	conn->state = CLIENT_KEY_EXCHANGE;
1238 
1239 	return 0;
1240 }
1241 
1242 
1243 static int tls_process_server_change_cipher_spec(struct tlsv1_client *conn,
1244 						 u8 ct, const u8 *in_data,
1245 						 size_t *in_len)
1246 {
1247 	const u8 *pos;
1248 	size_t left;
1249 
1250 	if (ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC) {
1251 		wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
1252 			   "received content type 0x%x", ct);
1253 		if (conn->use_session_ticket) {
1254 			int res;
1255 			wpa_printf(MSG_DEBUG, "TLSv1: Server may have "
1256 				   "rejected SessionTicket");
1257 			conn->use_session_ticket = 0;
1258 
1259 			/* Notify upper layers that SessionTicket failed */
1260 			res = conn->session_ticket_cb(
1261 				conn->session_ticket_cb_ctx, NULL, 0, NULL,
1262 				NULL, NULL);
1263 			if (res < 0) {
1264 				wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket "
1265 					   "callback indicated failure");
1266 				tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1267 					  TLS_ALERT_HANDSHAKE_FAILURE);
1268 				return -1;
1269 			}
1270 
1271 			conn->state = SERVER_CERTIFICATE;
1272 			return tls_process_certificate(conn, ct, in_data,
1273 						       in_len);
1274 		}
1275 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1276 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1277 		return -1;
1278 	}
1279 
1280 	pos = in_data;
1281 	left = *in_len;
1282 
1283 	if (left < 1) {
1284 		wpa_printf(MSG_DEBUG, "TLSv1: Too short ChangeCipherSpec");
1285 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
1286 		return -1;
1287 	}
1288 
1289 	if (*pos != TLS_CHANGE_CIPHER_SPEC) {
1290 		wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
1291 			   "received data 0x%x", *pos);
1292 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1293 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1294 		return -1;
1295 	}
1296 
1297 	wpa_printf(MSG_DEBUG, "TLSv1: Received ChangeCipherSpec");
1298 	if (tlsv1_record_change_read_cipher(&conn->rl) < 0) {
1299 		wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher "
1300 			   "for record layer");
1301 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1302 			  TLS_ALERT_INTERNAL_ERROR);
1303 		return -1;
1304 	}
1305 
1306 	*in_len = pos + 1 - in_data;
1307 
1308 	conn->state = SERVER_FINISHED;
1309 
1310 	return 0;
1311 }
1312 
1313 
1314 static int tls_process_server_finished(struct tlsv1_client *conn, u8 ct,
1315 				       const u8 *in_data, size_t *in_len)
1316 {
1317 	const u8 *pos, *end;
1318 	size_t left, len, hlen;
1319 	u8 verify_data[TLS_VERIFY_DATA_LEN];
1320 	u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
1321 
1322 	if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
1323 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Finished; "
1324 			   "received content type 0x%x", ct);
1325 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1326 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1327 		return -1;
1328 	}
1329 
1330 	pos = in_data;
1331 	left = *in_len;
1332 
1333 	if (left < 4) {
1334 		wpa_printf(MSG_DEBUG, "TLSv1: Too short record (left=%lu) for "
1335 			   "Finished",
1336 			   (unsigned long) left);
1337 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1338 			  TLS_ALERT_DECODE_ERROR);
1339 		return -1;
1340 	}
1341 
1342 	if (pos[0] != TLS_HANDSHAKE_TYPE_FINISHED) {
1343 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Finished; received "
1344 			   "type 0x%x", pos[0]);
1345 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1346 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1347 		return -1;
1348 	}
1349 
1350 	len = WPA_GET_BE24(pos + 1);
1351 
1352 	pos += 4;
1353 	left -= 4;
1354 
1355 	if (len > left) {
1356 		wpa_printf(MSG_DEBUG, "TLSv1: Too short buffer for Finished "
1357 			   "(len=%lu > left=%lu)",
1358 			   (unsigned long) len, (unsigned long) left);
1359 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1360 			  TLS_ALERT_DECODE_ERROR);
1361 		return -1;
1362 	}
1363 	end = pos + len;
1364 	if (len != TLS_VERIFY_DATA_LEN) {
1365 		wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
1366 			   "in Finished: %lu (expected %d)",
1367 			   (unsigned long) len, TLS_VERIFY_DATA_LEN);
1368 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1369 			  TLS_ALERT_DECODE_ERROR);
1370 		return -1;
1371 	}
1372 	wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
1373 		    pos, TLS_VERIFY_DATA_LEN);
1374 
1375 #ifdef CONFIG_TLSV12
1376 	if (conn->rl.tls_version >= TLS_VERSION_1_2) {
1377 		hlen = SHA256_MAC_LEN;
1378 		if (conn->verify.sha256_server == NULL ||
1379 		    crypto_hash_finish(conn->verify.sha256_server, hash, &hlen)
1380 		    < 0) {
1381 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1382 				  TLS_ALERT_INTERNAL_ERROR);
1383 			conn->verify.sha256_server = NULL;
1384 			return -1;
1385 		}
1386 		conn->verify.sha256_server = NULL;
1387 	} else {
1388 #endif /* CONFIG_TLSV12 */
1389 
1390 	hlen = MD5_MAC_LEN;
1391 	if (conn->verify.md5_server == NULL ||
1392 	    crypto_hash_finish(conn->verify.md5_server, hash, &hlen) < 0) {
1393 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1394 			  TLS_ALERT_INTERNAL_ERROR);
1395 		conn->verify.md5_server = NULL;
1396 		crypto_hash_finish(conn->verify.sha1_server, NULL, NULL);
1397 		conn->verify.sha1_server = NULL;
1398 		return -1;
1399 	}
1400 	conn->verify.md5_server = NULL;
1401 	hlen = SHA1_MAC_LEN;
1402 	if (conn->verify.sha1_server == NULL ||
1403 	    crypto_hash_finish(conn->verify.sha1_server, hash + MD5_MAC_LEN,
1404 			       &hlen) < 0) {
1405 		conn->verify.sha1_server = NULL;
1406 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1407 			  TLS_ALERT_INTERNAL_ERROR);
1408 		return -1;
1409 	}
1410 	conn->verify.sha1_server = NULL;
1411 	hlen = MD5_MAC_LEN + SHA1_MAC_LEN;
1412 
1413 #ifdef CONFIG_TLSV12
1414 	}
1415 #endif /* CONFIG_TLSV12 */
1416 
1417 	if (tls_prf(conn->rl.tls_version,
1418 		    conn->master_secret, TLS_MASTER_SECRET_LEN,
1419 		    "server finished", hash, hlen,
1420 		    verify_data, TLS_VERIFY_DATA_LEN)) {
1421 		wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
1422 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1423 			  TLS_ALERT_DECRYPT_ERROR);
1424 		return -1;
1425 	}
1426 	wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (server)",
1427 			verify_data, TLS_VERIFY_DATA_LEN);
1428 
1429 	if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
1430 		wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
1431 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1432 			  TLS_ALERT_DECRYPT_ERROR);
1433 		return -1;
1434 	}
1435 
1436 	wpa_printf(MSG_DEBUG, "TLSv1: Received Finished");
1437 
1438 	*in_len = end - in_data;
1439 
1440 	conn->state = (conn->session_resumed || conn->use_session_ticket) ?
1441 		CHANGE_CIPHER_SPEC : ACK_FINISHED;
1442 
1443 	return 0;
1444 }
1445 
1446 
1447 static int tls_process_application_data(struct tlsv1_client *conn, u8 ct,
1448 					const u8 *in_data, size_t *in_len,
1449 					u8 **out_data, size_t *out_len)
1450 {
1451 	const u8 *pos;
1452 	size_t left;
1453 
1454 	if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
1455 		wpa_printf(MSG_DEBUG, "TLSv1: Expected Application Data; "
1456 			   "received content type 0x%x", ct);
1457 		tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1458 			  TLS_ALERT_UNEXPECTED_MESSAGE);
1459 		return -1;
1460 	}
1461 
1462 	pos = in_data;
1463 	left = *in_len;
1464 
1465 	wpa_hexdump(MSG_DEBUG, "TLSv1: Application Data included in Handshake",
1466 		    pos, left);
1467 
1468 	*out_data = os_malloc(left);
1469 	if (*out_data) {
1470 		os_memcpy(*out_data, pos, left);
1471 		*out_len = left;
1472 	}
1473 
1474 	return 0;
1475 }
1476 
1477 
1478 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
1479 				   const u8 *buf, size_t *len,
1480 				   u8 **out_data, size_t *out_len)
1481 {
1482 	if (ct == TLS_CONTENT_TYPE_ALERT) {
1483 		if (*len < 2) {
1484 			wpa_printf(MSG_DEBUG, "TLSv1: Alert underflow");
1485 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1486 				  TLS_ALERT_DECODE_ERROR);
1487 			return -1;
1488 		}
1489 		wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
1490 			   buf[0], buf[1]);
1491 		*len = 2;
1492 		conn->state = FAILED;
1493 		return -1;
1494 	}
1495 
1496 	if (ct == TLS_CONTENT_TYPE_HANDSHAKE && *len >= 4 &&
1497 	    buf[0] == TLS_HANDSHAKE_TYPE_HELLO_REQUEST) {
1498 		size_t hr_len = WPA_GET_BE24(buf + 1);
1499 		if (hr_len > *len - 4) {
1500 			wpa_printf(MSG_DEBUG, "TLSv1: HelloRequest underflow");
1501 			tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
1502 				  TLS_ALERT_DECODE_ERROR);
1503 			return -1;
1504 		}
1505 		wpa_printf(MSG_DEBUG, "TLSv1: Ignored HelloRequest");
1506 		*len = 4 + hr_len;
1507 		return 0;
1508 	}
1509 
1510 	switch (conn->state) {
1511 	case SERVER_HELLO:
1512 		if (tls_process_server_hello(conn, ct, buf, len))
1513 			return -1;
1514 		break;
1515 	case SERVER_CERTIFICATE:
1516 		if (tls_process_certificate(conn, ct, buf, len))
1517 			return -1;
1518 		break;
1519 	case SERVER_KEY_EXCHANGE:
1520 		if (tls_process_server_key_exchange(conn, ct, buf, len))
1521 			return -1;
1522 		break;
1523 	case SERVER_CERTIFICATE_REQUEST:
1524 		if (tls_process_certificate_request(conn, ct, buf, len))
1525 			return -1;
1526 		break;
1527 	case SERVER_HELLO_DONE:
1528 		if (tls_process_server_hello_done(conn, ct, buf, len))
1529 			return -1;
1530 		break;
1531 	case SERVER_CHANGE_CIPHER_SPEC:
1532 		if (tls_process_server_change_cipher_spec(conn, ct, buf, len))
1533 			return -1;
1534 		break;
1535 	case SERVER_FINISHED:
1536 		if (tls_process_server_finished(conn, ct, buf, len))
1537 			return -1;
1538 		break;
1539 	case ACK_FINISHED:
1540 		if (out_data &&
1541 		    tls_process_application_data(conn, ct, buf, len, out_data,
1542 						 out_len))
1543 			return -1;
1544 		break;
1545 	default:
1546 		wpa_printf(MSG_DEBUG, "TLSv1: Unexpected state %d "
1547 			   "while processing received message",
1548 			   conn->state);
1549 		return -1;
1550 	}
1551 
1552 	if (ct == TLS_CONTENT_TYPE_HANDSHAKE)
1553 		tls_verify_hash_add(&conn->verify, buf, *len);
1554 
1555 	return 0;
1556 }
1557