diff options
author | Denys Vlasenko <vda.linux@googlemail.com> | 2017-01-14 12:49:32 +0100 |
---|---|---|
committer | Denys Vlasenko <vda.linux@googlemail.com> | 2017-01-14 12:49:32 +0100 |
commit | ceff6b0ea9d8084b439e7d80f42c073d3bdda58d (patch) | |
tree | e9ca7cd16d52455abfb4292dbea707e22385de36 /networking/tls.c | |
parent | a6f8651911716d1d1624712eb19e4f3608767c7e (diff) | |
download | busybox-w32-ceff6b0ea9d8084b439e7d80f42c073d3bdda58d.tar.gz busybox-w32-ceff6b0ea9d8084b439e7d80f42c073d3bdda58d.tar.bz2 busybox-w32-ceff6b0ea9d8084b439e7d80f42c073d3bdda58d.zip |
tls: work-in-progress TLS1.2 test applet
function old new delta
tls_main - 733 +733
dump - 230 +230
xread_tls_block - 180 +180
get_der_len - 76 +76
enter_der_item - 70 +70
skip_der_item - 56 +56
get24be - 24 +24
tls_error_die - 19 +19
packed_usage 31010 31027 +17
applet_names 2549 2553 +4
applet_main 1472 1476 +4
applet_suid 92 93 +1
applet_install_loc 184 185 +1
------------------------------------------------------------------------------
(add/remove: 9/0 grow/shrink: 5/0 up/down: 1415/0) Total: 1415 bytes
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'networking/tls.c')
-rw-r--r-- | networking/tls.c | 643 |
1 files changed, 643 insertions, 0 deletions
diff --git a/networking/tls.c b/networking/tls.c new file mode 100644 index 000000000..983ed507d --- /dev/null +++ b/networking/tls.c | |||
@@ -0,0 +1,643 @@ | |||
1 | /* | ||
2 | * Licensed under GPLv2, see file LICENSE in this source tree. | ||
3 | * | ||
4 | * Copyright (C) 2017 Denys Vlasenko | ||
5 | */ | ||
6 | //config:config TLS | ||
7 | //config: bool "tls (debugging)" | ||
8 | //config: default n | ||
9 | |||
10 | //applet:IF_TLS(APPLET(tls, BB_DIR_USR_BIN, BB_SUID_DROP)) | ||
11 | |||
12 | //kbuild:lib-$(CONFIG_TLS) += tls.o | ||
13 | ////kbuild:lib-$(CONFIG_TLS) += tls_ciphers.o | ||
14 | ////kbuild:lib-$(CONFIG_TLS) += tls_aes.o | ||
15 | ////kbuild:lib-$(CONFIG_TLS) += tls_aes_gcm.o | ||
16 | |||
17 | //usage:#define tls_trivial_usage | ||
18 | //usage: "HOST[:PORT]" | ||
19 | //usage:#define tls_full_usage "\n\n" | ||
20 | |||
21 | #include "libbb.h" | ||
22 | //#include "tls_cryptoapi.h" | ||
23 | //#include "tls_ciphers.h" | ||
24 | |||
25 | #if 1 | ||
26 | # define dbg(...) fprintf(stderr, __VA_ARGS__) | ||
27 | #else | ||
28 | # define dbg(...) ((void)0) | ||
29 | #endif | ||
30 | |||
31 | #define RECORD_TYPE_CHANGE_CIPHER_SPEC 20 | ||
32 | #define RECORD_TYPE_ALERT 21 | ||
33 | #define RECORD_TYPE_HANDSHAKE 22 | ||
34 | #define RECORD_TYPE_APPLICATION_DATA 23 | ||
35 | |||
36 | #define HANDSHAKE_HELLO_REQUEST 0 | ||
37 | #define HANDSHAKE_CLIENT_HELLO 1 | ||
38 | #define HANDSHAKE_SERVER_HELLO 2 | ||
39 | #define HANDSHAKE_HELLO_VERIFY_REQUEST 3 | ||
40 | #define HANDSHAKE_NEW_SESSION_TICKET 4 | ||
41 | #define HANDSHAKE_CERTIFICATE 11 | ||
42 | #define HANDSHAKE_SERVER_KEY_EXCHANGE 12 | ||
43 | #define HANDSHAKE_CERTIFICATE_REQUEST 13 | ||
44 | #define HANDSHAKE_SERVER_HELLO_DONE 14 | ||
45 | #define HANDSHAKE_CERTIFICATE_VERIFY 15 | ||
46 | #define HANDSHAKE_CLIENT_KEY_EXCHANGE 16 | ||
47 | #define HANDSHAKE_FINISHED 20 | ||
48 | |||
49 | #define SSL_NULL_WITH_NULL_NULL 0x0000 | ||
50 | #define SSL_RSA_WITH_NULL_MD5 0x0001 | ||
51 | #define SSL_RSA_WITH_NULL_SHA 0x0002 | ||
52 | #define SSL_RSA_WITH_RC4_128_MD5 0x0004 | ||
53 | #define SSL_RSA_WITH_RC4_128_SHA 0x0005 | ||
54 | #define SSL_RSA_WITH_3DES_EDE_CBC_SHA 0x000A /* 10 */ | ||
55 | #define TLS_RSA_WITH_AES_128_CBC_SHA 0x002F /* 47 */ | ||
56 | #define TLS_RSA_WITH_AES_256_CBC_SHA 0x0035 /* 53 */ | ||
57 | #define TLS_EMPTY_RENEGOTIATION_INFO_SCSV 0x00FF | ||
58 | |||
59 | #define TLS_RSA_WITH_IDEA_CBC_SHA 0x0007 /* 7 */ | ||
60 | #define SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x0016 /* 22 */ | ||
61 | #define SSL_DH_anon_WITH_RC4_128_MD5 0x0018 /* 24 */ | ||
62 | #define SSL_DH_anon_WITH_3DES_EDE_CBC_SHA 0x001B /* 27 */ | ||
63 | #define TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x0033 /* 51 */ | ||
64 | #define TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x0039 /* 57 */ | ||
65 | #define TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x0067 /* 103 */ | ||
66 | #define TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x006B /* 107 */ | ||
67 | #define TLS_DH_anon_WITH_AES_128_CBC_SHA 0x0034 /* 52 */ | ||
68 | #define TLS_DH_anon_WITH_AES_256_CBC_SHA 0x003A /* 58 */ | ||
69 | #define TLS_RSA_WITH_AES_128_CBC_SHA256 0x003C /* 60 */ | ||
70 | #define TLS_RSA_WITH_AES_256_CBC_SHA256 0x003D /* 61 */ | ||
71 | #define TLS_RSA_WITH_SEED_CBC_SHA 0x0096 /* 150 */ | ||
72 | #define TLS_PSK_WITH_AES_128_CBC_SHA 0x008C /* 140 */ | ||
73 | #define TLS_PSK_WITH_AES_128_CBC_SHA256 0x00AE /* 174 */ | ||
74 | #define TLS_PSK_WITH_AES_256_CBC_SHA384 0x00AF /* 175 */ | ||
75 | #define TLS_PSK_WITH_AES_256_CBC_SHA 0x008D /* 141 */ | ||
76 | #define TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x0090 /* 144 */ | ||
77 | #define TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x0091 /* 145 */ | ||
78 | #define TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004 /* 49156 */ | ||
79 | #define TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005 /* 49157 */ | ||
80 | #define TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009 /* 49161 */ | ||
81 | #define TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A /* 49162 */ | ||
82 | #define TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012 /* 49170 */ | ||
83 | #define TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013 /* 49171 */ | ||
84 | #define TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014 /* 49172 */ | ||
85 | #define TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E /* 49166 */ | ||
86 | #define TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F /* 49167 */ | ||
87 | #define TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /* 49187 */ | ||
88 | #define TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /* 49188 */ | ||
89 | #define TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /* 49189 */ | ||
90 | #define TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /* 49190 */ | ||
91 | #define TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /* 49191 */ | ||
92 | #define TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /* 49192 */ | ||
93 | #define TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /* 49193 */ | ||
94 | #define TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /* 49194 */ | ||
95 | |||
96 | #define TLS_RSA_WITH_AES_128_GCM_SHA256 0x009C /* 156 */ | ||
97 | #define TLS_RSA_WITH_AES_256_GCM_SHA384 0x009D /* 157 */ | ||
98 | #define TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /* 49195 */ | ||
99 | #define TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /* 49196 */ | ||
100 | #define TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /* 49197 */ | ||
101 | #define TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /* 49198 */ | ||
102 | #define TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /* 49199 */ | ||
103 | #define TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /* 49200 */ | ||
104 | #define TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /* 49201 */ | ||
105 | #define TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /* 49202 */ | ||
106 | |||
107 | //Tested against kernel.org: | ||
108 | //TLS 1.1 | ||
109 | //#define TLS_MAJ 3 | ||
110 | //#define TLS_MIN 2 | ||
111 | //#define CIPHER_ID TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA // ok, recvs SERVER_KEY_EXCHANGE | ||
112 | //TLS 1.2 | ||
113 | #define TLS_MAJ 3 | ||
114 | #define TLS_MIN 3 | ||
115 | //#define CIPHER_ID TLS_RSA_WITH_AES_256_CBC_SHA256 // ok, no SERVER_KEY_EXCHANGE | ||
116 | // All GCMs: | ||
117 | //#define CIPHER_ID TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 // SSL_ALERT_HANDSHAKE_FAILURE | ||
118 | //#define CIPHER_ID TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 // SSL_ALERT_HANDSHAKE_FAILURE | ||
119 | //#define CIPHER_ID TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 // ok, recvs SERVER_KEY_EXCHANGE | ||
120 | //#define CIPHER_ID TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | ||
121 | //#define CIPHER_ID TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 | ||
122 | //#define CIPHER_ID TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 // SSL_ALERT_HANDSHAKE_FAILURE | ||
123 | //#define CIPHER_ID TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 | ||
124 | //#define CIPHER_ID TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 // SSL_ALERT_HANDSHAKE_FAILURE | ||
125 | //#define CIPHER_ID TLS_RSA_WITH_AES_256_GCM_SHA384 // ok, no SERVER_KEY_EXCHANGE | ||
126 | #define CIPHER_ID TLS_RSA_WITH_AES_128_GCM_SHA256 // ok, no SERVER_KEY_EXCHANGE | ||
127 | //#define CIPHER_ID TLS_DH_anon_WITH_AES_256_CBC_SHA // SSL_ALERT_HANDSHAKE_FAILURE | ||
128 | // (tested b/c this one doesn't req server certs... no luck) | ||
129 | //test TLS_RSA_WITH_AES_128_CBC_SHA, in tls 1.2 it's mandated to be always supported | ||
130 | |||
131 | struct transport_hdr { | ||
132 | uint8_t type; | ||
133 | uint8_t proto_maj, proto_min; | ||
134 | uint8_t len16_hi, len16_lo; | ||
135 | }; | ||
136 | |||
137 | typedef struct tls_state { | ||
138 | int fd; | ||
139 | |||
140 | uint8_t *pubkey; | ||
141 | int pubkey_len; | ||
142 | |||
143 | int insize; | ||
144 | int tail; | ||
145 | // RFC 5246 | ||
146 | // |6.2.1. Fragmentation | ||
147 | // | The record layer fragments information blocks into TLSPlaintext | ||
148 | // | records carrying data in chunks of 2^14 bytes or less. Client | ||
149 | // | message boundaries are not preserved in the record layer (i.e., | ||
150 | // | multiple client messages of the same ContentType MAY be coalesced | ||
151 | // | into a single TLSPlaintext record, or a single message MAY be | ||
152 | // | fragmented across several records) | ||
153 | // |... | ||
154 | // | length | ||
155 | // | The length (in bytes) of the following TLSPlaintext.fragment. | ||
156 | // | The length MUST NOT exceed 2^14. | ||
157 | // |... | ||
158 | // | 6.2.2. Record Compression and Decompression | ||
159 | // |... | ||
160 | // | Compression must be lossless and may not increase the content length | ||
161 | // | by more than 1024 bytes. If the decompression function encounters a | ||
162 | // | TLSCompressed.fragment that would decompress to a length in excess of | ||
163 | // | 2^14 bytes, it MUST report a fatal decompression failure error. | ||
164 | // |... | ||
165 | // | length | ||
166 | // | The length (in bytes) of the following TLSCompressed.fragment. | ||
167 | // | The length MUST NOT exceed 2^14 + 1024. | ||
168 | // | ||
169 | // Since our buffer also contains 5-byte headers, make it a bit bigger: | ||
170 | uint8_t inbuf[18*1024]; | ||
171 | } tls_state_t; | ||
172 | |||
173 | static | ||
174 | tls_state_t *new_tls_state(void) | ||
175 | { | ||
176 | tls_state_t *tls = xzalloc(sizeof(*tls)); | ||
177 | tls->fd = -1; | ||
178 | return tls; | ||
179 | } | ||
180 | |||
181 | static unsigned get24be(const uint8_t *p) | ||
182 | { | ||
183 | return 0x100*(0x100*p[0] + p[1]) + p[2]; | ||
184 | } | ||
185 | |||
186 | static void dump(const void *vp, int len) | ||
187 | { | ||
188 | char hexbuf[32 * 1024 + 4]; | ||
189 | const uint8_t *p = vp; | ||
190 | |||
191 | while (len > 0) { | ||
192 | unsigned xhdr_len; | ||
193 | if (len < 5) { | ||
194 | bin2hex(hexbuf, (void*)p, len)[0] = '\0'; | ||
195 | dbg("< |%s|\n", hexbuf); | ||
196 | return; | ||
197 | } | ||
198 | xhdr_len = 0x100*p[3] + p[4]; | ||
199 | dbg("< hdr_type:%u ver:%u.%u len:%u", p[0], p[1], p[2], xhdr_len); | ||
200 | p += 5; | ||
201 | len -= 5; | ||
202 | if (len >= 4 && p[-5] == RECORD_TYPE_HANDSHAKE) { | ||
203 | unsigned len24 = get24be(p + 1); | ||
204 | dbg(" type:%u len24:%u", p[0], len24); | ||
205 | } | ||
206 | if (xhdr_len > len) | ||
207 | xhdr_len = len; | ||
208 | bin2hex(hexbuf, (void*)p, xhdr_len)[0] = '\0'; | ||
209 | dbg(" |%s|\n", hexbuf); | ||
210 | p += xhdr_len; | ||
211 | len -= xhdr_len; | ||
212 | } | ||
213 | } | ||
214 | |||
215 | static void tls_error_die(tls_state_t *tls) | ||
216 | { | ||
217 | dump(tls->inbuf, tls->insize + tls->tail); | ||
218 | xfunc_die(); | ||
219 | } | ||
220 | |||
221 | static int xread_tls_block(tls_state_t *tls) | ||
222 | { | ||
223 | int len; | ||
224 | int total; | ||
225 | int target; | ||
226 | |||
227 | dbg("insize:%u tail:%u\n", tls->insize, tls->tail); | ||
228 | memmove(tls->inbuf, tls->inbuf + tls->insize, tls->tail); | ||
229 | errno = 0; | ||
230 | total = tls->tail; | ||
231 | target = sizeof(tls->inbuf); | ||
232 | for (;;) { | ||
233 | if (total >= sizeof(struct transport_hdr) && target == sizeof(tls->inbuf)) { | ||
234 | struct transport_hdr *xhdr = (void*)tls->inbuf; | ||
235 | target = sizeof(*xhdr) + (0x100 * xhdr->len16_hi + xhdr->len16_lo); | ||
236 | } | ||
237 | /* if total >= target, we have a full packet (and possibly more)... */ | ||
238 | if (target - total <= 0) | ||
239 | break; | ||
240 | len = safe_read(tls->fd, tls->inbuf + total, sizeof(tls->inbuf) - total); | ||
241 | if (len <= 0) | ||
242 | bb_perror_msg_and_die("short read"); | ||
243 | total += len; | ||
244 | } | ||
245 | tls->tail = -(target - total); | ||
246 | tls->insize = target; | ||
247 | target -= sizeof(struct transport_hdr); | ||
248 | dbg("got block len:%u\n", target); | ||
249 | return target; | ||
250 | } | ||
251 | |||
252 | static void send_client_hello(tls_state_t *tls) | ||
253 | { | ||
254 | struct client_hello { | ||
255 | struct transport_hdr xhdr; | ||
256 | uint8_t type; | ||
257 | uint8_t len24_hi, len24_mid, len24_lo; | ||
258 | uint8_t proto_maj, proto_min; | ||
259 | uint8_t rand32[32]; | ||
260 | uint8_t session_id_len; | ||
261 | /* uint8_t session_id[]; */ | ||
262 | uint8_t cipherid_len16_hi, cipherid_len16_lo; | ||
263 | uint8_t cipherid[2 * 1]; /* actually variable */ | ||
264 | uint8_t comprtypes_len; | ||
265 | uint8_t comprtypes[1]; /* actually variable */ | ||
266 | }; | ||
267 | struct client_hello hello; | ||
268 | |||
269 | memset(&hello, 0, sizeof(hello)); | ||
270 | hello.xhdr.type = RECORD_TYPE_HANDSHAKE; | ||
271 | hello.xhdr.proto_maj = TLS_MAJ; | ||
272 | hello.xhdr.proto_min = TLS_MIN; | ||
273 | hello.xhdr.len16_hi = (sizeof(hello) - sizeof(hello.xhdr)) >> 8; | ||
274 | hello.xhdr.len16_lo = (sizeof(hello) - sizeof(hello.xhdr)); | ||
275 | hello.type = HANDSHAKE_CLIENT_HELLO; | ||
276 | hello.len24_mid = (sizeof(hello) - sizeof(hello.xhdr) - 4) >> 8; | ||
277 | hello.len24_lo = (sizeof(hello) - sizeof(hello.xhdr) - 4); | ||
278 | hello.proto_maj = TLS_MAJ; | ||
279 | hello.proto_min = TLS_MIN; | ||
280 | //fillrand(hello.rand32, sizeof(hello.rand32)); | ||
281 | open_read_close("/dev/urandom", hello.rand32, sizeof(hello.rand32)); | ||
282 | //hello.session_id_len = 0; | ||
283 | //hello.cipherid_len16_hi = 0; | ||
284 | hello.cipherid_len16_lo = 2; | ||
285 | hello.cipherid[0] = CIPHER_ID >> 8; | ||
286 | hello.cipherid[1] = CIPHER_ID & 0xff; | ||
287 | hello.comprtypes_len = 1; | ||
288 | //hello.comprtypes[0] = 0; | ||
289 | |||
290 | xwrite(tls->fd, &hello, sizeof(hello)); | ||
291 | } | ||
292 | |||
293 | static void get_server_hello_or_die(tls_state_t *tls) | ||
294 | { | ||
295 | struct server_hello { | ||
296 | struct transport_hdr xhdr; | ||
297 | uint8_t type; | ||
298 | uint8_t len24_hi, len24_mid, len24_lo; | ||
299 | uint8_t proto_maj, proto_min; | ||
300 | uint8_t rand32[32]; /* first 4 bytes are unix time in BE format */ | ||
301 | uint8_t session_id_len; | ||
302 | uint8_t session_id[32]; | ||
303 | uint8_t cipherid_hi, cipherid_lo; | ||
304 | uint8_t comprtype; | ||
305 | /* extensions may follow, but only those which client offered in its Hello */ | ||
306 | }; | ||
307 | struct server_hello *hp; | ||
308 | int len; | ||
309 | |||
310 | len = xread_tls_block(tls); | ||
311 | |||
312 | hp = (void*)tls->inbuf; | ||
313 | if (len != 74 /* TODO: if we accept extensions, should be < instead of != */ | ||
314 | || hp->xhdr.type != RECORD_TYPE_HANDSHAKE | ||
315 | || hp->xhdr.proto_maj != TLS_MAJ | ||
316 | || hp->xhdr.proto_min != TLS_MIN | ||
317 | ) { | ||
318 | /* example: RECORD_TYPE_ALERT if server can't support our ciphers */ | ||
319 | tls_error_die(tls); | ||
320 | } | ||
321 | dbg("got HANDSHAKE\n"); | ||
322 | // 02 000046 03|03 58|78|cf|c1 50|a5|49|ee|7e|29|48|71|fe|97|fa|e8|2d|19|87|72|90|84|9d|37|a3|f0|cb|6f|5f|e3|3c|2f |20 |d8|1a|78|96|52|d6|91|01|24|b3|d6|5b|b7|d0|6c|b3|e1|78|4e|3c|95|de|74|a0|ba|eb|a7|3a|ff|bd|a2|bf |00|9c |00| | ||
323 | // SvHl len=70 maj.min unixtime^^^ 28randbytes^^^^^^^^^^^^^^^^^^^^^^^^^^^^_^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^_^^^ slen sid32bytes^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ cipSel comprSel | ||
324 | if (hp->type != HANDSHAKE_SERVER_HELLO | ||
325 | || hp->len24_hi != 0 | ||
326 | || hp->len24_mid != 0 | ||
327 | || hp->len24_lo != 70 | ||
328 | || hp->proto_maj != TLS_MAJ | ||
329 | || hp->proto_min != TLS_MIN | ||
330 | || hp->session_id_len != 32 | ||
331 | || hp->cipherid_hi != (CIPHER_ID >> 8) | ||
332 | || hp->cipherid_lo != (CIPHER_ID & 0xff) | ||
333 | || hp->comprtype != 0 | ||
334 | ) { | ||
335 | tls_error_die(tls); | ||
336 | } | ||
337 | dbg("got SERVER_HELLO\n"); | ||
338 | } | ||
339 | |||
340 | static unsigned get_der_len(uint8_t **bodyp, uint8_t *der, uint8_t *end) | ||
341 | { | ||
342 | unsigned len; | ||
343 | |||
344 | if (end - der < 2) | ||
345 | xfunc_die(); | ||
346 | // if ((der[0] & 0x1f) == 0x1f) /* not single-byte item code? */ | ||
347 | // xfunc_die(); | ||
348 | |||
349 | len = der[1]; /* maybe it's short len */ | ||
350 | if (len >= 0x80) { | ||
351 | /* no */ | ||
352 | if (len != 0x82) { | ||
353 | /* 0x80 is "0 bytes of len", invalid DER: must use short len if can */ | ||
354 | /* 0x81 is "1 byte of len", invalid DER */ | ||
355 | /* >0x82 is "3+ bytes of len", should not happen realistically */ | ||
356 | xfunc_die(); | ||
357 | } | ||
358 | if (end - der < 4) | ||
359 | xfunc_die(); | ||
360 | /* it's "ii 82 xx yy" */ | ||
361 | len = 0x100*der[2] + der[3]; | ||
362 | if (len < 0x80) | ||
363 | xfunc_die(); /* invalid DER: must use short len if can */ | ||
364 | |||
365 | der += 2; /* skip [code]+[82]+[2byte_len] */ | ||
366 | } | ||
367 | der += 2; /* skip [code]+[1byte_len] */ | ||
368 | |||
369 | if (end - der < len) | ||
370 | xfunc_die(); | ||
371 | *bodyp = der; | ||
372 | |||
373 | return len; | ||
374 | } | ||
375 | |||
376 | static uint8_t *enter_der_item(uint8_t *der, uint8_t **endp) | ||
377 | { | ||
378 | uint8_t *new_der; | ||
379 | unsigned len = get_der_len(&new_der, der, *endp); | ||
380 | dbg("entered der @%p:0x%02x len:%u inner_byte @%p:0x%02x\n", der, der[0], len, new_der, new_der[0]); | ||
381 | /* Move "end" position to cover only this item */ | ||
382 | *endp = new_der + len; | ||
383 | return new_der; | ||
384 | } | ||
385 | |||
386 | static uint8_t *skip_der_item(uint8_t *der, uint8_t *end) | ||
387 | { | ||
388 | uint8_t *new_der; | ||
389 | unsigned len = get_der_len(&new_der, der, end); | ||
390 | /* Skip body */ | ||
391 | new_der += len; | ||
392 | dbg("skipped der 0x%02x, next byte 0x%02x\n", der[0], new_der[0]); | ||
393 | return new_der; | ||
394 | } | ||
395 | |||
396 | static void *find_key_in_der_cert(int *key_len, uint8_t *der, int len) | ||
397 | { | ||
398 | /* Example: partial decode of kernel.org certificate in DER format. | ||
399 | * SEQ 0x05ac/1452 bytes (Certificate): 308205ac | ||
400 | * SEQ 0x0494/1172 bytes (tbsCertificate): 30820494 | ||
401 | * [ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0] 3 bytes: a003 | ||
402 | * INTEGER (version): 0201 02 | ||
403 | * INTEGER 0x11 bytes (serialNumber): 0211 00 9f85bf664b0cddafca508679501b2be4 | ||
404 | * //^^^^^^note: matrixSSL also allows [ASN_CONTEXT_SPECIFIC | ASN_PRIMITIVE | 2] = 0x82 type | ||
405 | * SEQ 0x0d bytes (signatureAlgo): 300d | ||
406 | * OID 9 bytes: 0609 2a864886f70d01010b (OID_SHA256_RSA_SIG 42.134.72.134.247.13.1.1.11) | ||
407 | * NULL: 0500 | ||
408 | * SEQ 0x5f bytes (issuer): 305f | ||
409 | * SET 11 bytes: 310b | ||
410 | * SEQ 9 bytes: 3009 | ||
411 | * OID 3 bytes: 0603 550406 | ||
412 | * Printable string "FR": 1302 4652 | ||
413 | * SET 14 bytes: 310e | ||
414 | * SEQ 12 bytes: 300c | ||
415 | * OID 3 bytes: 0603 550408 | ||
416 | * Printable string "Paris": 1305 5061726973 | ||
417 | * SET 14 bytes: 310e | ||
418 | * SEQ 12 bytes: 300c | ||
419 | * OID 3 bytes: 0603 550407 | ||
420 | * Printable string "Paris": 1305 5061726973 | ||
421 | * SET 14 bytes: 310e | ||
422 | * SEQ 12 bytes: 300c | ||
423 | * OID 3 bytes: 0603 55040a | ||
424 | * Printable string "Gandi": 1305 47616e6469 | ||
425 | * SET 32 bytes: 3120 | ||
426 | * SEQ 30 bytes: 301e | ||
427 | * OID 3 bytes: 0603 550403 | ||
428 | * Printable string "Gandi Standard SSL CA 2": 1317 | ||
429 | * 47616e6469205374616e646172642053534c2043412032 | ||
430 | * SEQ 30 bytes (validity): 301e | ||
431 | * TIME "161011000000Z": 170d 3136313031313030303030305a | ||
432 | * TIME "191011235959Z": 170d 3139313031313233353935395a | ||
433 | * SEQ 0x5b/91 bytes (subject): 305b //I did not decode this | ||
434 | * 3121301f060355040b1318446f6d61696e20436f | ||
435 | * 6e74726f6c2056616c6964617465643121301f06 | ||
436 | * 0355040b1318506f73697469766553534c204d75 | ||
437 | * 6c74692d446f6d61696e31133011060355040313 | ||
438 | * 0a6b65726e656c2e6f7267 | ||
439 | * SEQ 0x01a2/418 bytes (subjectPublicKeyInfo): 308201a2 | ||
440 | * SEQ 13 bytes (algorithm): 300d | ||
441 | * OID 9 bytes: 0609 2a864886f70d010101 (OID_RSA_KEY_ALG 42.134.72.134.247.13.1.1.1) | ||
442 | * NULL: 0500 | ||
443 | * BITSTRING 0x018f/399 bytes (publicKey): 0382018f | ||
444 | * ????: 00 | ||
445 | * //after the zero byte, it appears key itself uses DER encoding: | ||
446 | * SEQ 0x018a/394 bytes: 3082018a | ||
447 | * INTEGER 0x0181/385 bytes (modulus): 02820181 | ||
448 | * 00b1ab2fc727a3bef76780c9349bf3 | ||
449 | * ...24 more blocks of 15 bytes each... | ||
450 | * 90e895291c6bc8693b65 | ||
451 | * INTEGER 3 bytes (exponent): 0203 010001 | ||
452 | * [ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0x3] 0x01e5 bytes (X509v3 extensions): a38201e5 | ||
453 | * SEQ 0x01e1 bytes: 308201e1 | ||
454 | * ... | ||
455 | * Certificate is a DER-encoded data structure. Each DER element has a length, | ||
456 | * which makes it easy to skip over large compound elements of any complexity | ||
457 | * without parsing them. | ||
458 | * | ||
459 | * Certificate is a sequence of three elements: | ||
460 | * tbsCertificate (SEQ) | ||
461 | * signatureAlgorithm (AlgorithmIdentifier) | ||
462 | * signatureValue (BIT STRING) | ||
463 | * | ||
464 | * In turn, tbsCertificate is a sequence of: | ||
465 | * version | ||
466 | * serialNumber | ||
467 | * signatureAlgo (AlgorithmIdentifier) | ||
468 | * issuer (Name, has complex structure) | ||
469 | * validity (Validity, SEQ of two Times) | ||
470 | * subject (Name) | ||
471 | * subjectPublicKeyInfo (SEQ) | ||
472 | * ... | ||
473 | * | ||
474 | * subjectPublicKeyInfo is a sequence of: | ||
475 | * algorithm (AlgorithmIdentifier) | ||
476 | * publicKey (BIT STRING) | ||
477 | * | ||
478 | * Essentially, we want subjectPublicKeyInfo.publicKey | ||
479 | */ | ||
480 | uint8_t *end = der + len; | ||
481 | |||
482 | /* enter "Certificate" item: [der, end) will be only Cert */ | ||
483 | der = enter_der_item(der, &end); | ||
484 | |||
485 | /* enter "tbsCertificate" item: [der, end) will be only tbsCert */ | ||
486 | der = enter_der_item(der, &end); | ||
487 | |||
488 | /* skip up to subjectPublicKeyInfo */ | ||
489 | der = skip_der_item(der, end); /* version */ | ||
490 | der = skip_der_item(der, end); /* serialNumber */ | ||
491 | der = skip_der_item(der, end); /* signatureAlgo */ | ||
492 | der = skip_der_item(der, end); /* issuer */ | ||
493 | der = skip_der_item(der, end); /* validity */ | ||
494 | der = skip_der_item(der, end); /* subject */ | ||
495 | |||
496 | /* enter "subjectPublicKeyInfo" */ | ||
497 | der = enter_der_item(der, &end); | ||
498 | |||
499 | /* skip "subjectPublicKeyInfo.algorithm" */ | ||
500 | der = skip_der_item(der, end); | ||
501 | /* enter "subjectPublicKeyInfo.publicKey" */ | ||
502 | // die_if_not_this_der_type(der, end, 0x03); /* must be BITSTRING */ | ||
503 | der = enter_der_item(der, &end); | ||
504 | |||
505 | /* return a copy */ | ||
506 | *key_len = end - der; | ||
507 | dbg("copying key bytes:%u, first:0x%02x\n", *key_len, der[0]); | ||
508 | return xmemdup(der, *key_len); | ||
509 | } | ||
510 | |||
511 | static void get_server_cert_or_die(tls_state_t *tls) | ||
512 | { | ||
513 | struct transport_hdr *xhdr; | ||
514 | uint8_t *certbuf; | ||
515 | int len, len1; | ||
516 | |||
517 | len = xread_tls_block(tls); | ||
518 | xhdr = (void*)tls->inbuf; | ||
519 | if (len < sizeof(*xhdr) + 10 | ||
520 | || xhdr->type != RECORD_TYPE_HANDSHAKE | ||
521 | || xhdr->proto_maj != TLS_MAJ | ||
522 | || xhdr->proto_min != TLS_MIN | ||
523 | ) { | ||
524 | tls_error_die(tls); | ||
525 | } | ||
526 | dbg("got HANDSHAKE\n"); | ||
527 | certbuf = (void*)(xhdr + 1); | ||
528 | if (certbuf[0] != HANDSHAKE_CERTIFICATE) | ||
529 | tls_error_die(tls); | ||
530 | dbg("got CERTIFICATE\n"); | ||
531 | // 0b 00|11|24 00|11|21 00|05|b0 30|82|05|ac|30|82|04|94|a0|03|02|01|02|02|11|00|9f|85|bf|66|4b|0c|dd|af|ca|50|86|79|50|1b|2b|e4|30|0d... (4392 bytes) | ||
532 | // Cert len=4388 ChainLen CertLen^ DER encoded X509 starts here. openssl x509 -in FILE -inform DER -noout -text | ||
533 | len1 = get24be(certbuf + 1); | ||
534 | if (len1 > len - 4) tls_error_die(tls); | ||
535 | len = len1; | ||
536 | |||
537 | len1 = get24be(certbuf + 4); | ||
538 | if (len1 > len - 3) tls_error_die(tls); | ||
539 | len = len1; | ||
540 | |||
541 | len1 = get24be(certbuf + 7); | ||
542 | if (len1 > len - 3) tls_error_die(tls); | ||
543 | len = len1; | ||
544 | |||
545 | if (len) | ||
546 | tls->pubkey = find_key_in_der_cert(&tls->pubkey_len, certbuf + 10, len); | ||
547 | } | ||
548 | |||
549 | static void tls_handshake(tls_state_t *tls) | ||
550 | { | ||
551 | // Client RFC 5246 Server | ||
552 | // (*) - optional messages, not always sent | ||
553 | // | ||
554 | // ClientHello -------> | ||
555 | // ServerHello | ||
556 | // Certificate* | ||
557 | // ServerKeyExchange* | ||
558 | // CertificateRequest* | ||
559 | // <------- ServerHelloDone | ||
560 | // Certificate* | ||
561 | // ClientKeyExchange | ||
562 | // CertificateVerify* | ||
563 | // [ChangeCipherSpec] | ||
564 | // Finished -------> | ||
565 | // [ChangeCipherSpec] | ||
566 | // <------- Finished | ||
567 | // Application Data <------> Application Data | ||
568 | int len; | ||
569 | |||
570 | send_client_hello(tls); | ||
571 | #if 0 /* dump */ | ||
572 | for (;;) { | ||
573 | uint8_t buf[16*1024]; | ||
574 | sleep(2); | ||
575 | len = recv(tls->fd, buf, sizeof(buf), 0); //MSG_DONTWAIT); | ||
576 | if (len < 0) { | ||
577 | if (errno == EAGAIN) | ||
578 | continue; | ||
579 | bb_perror_msg_and_die("recv"); | ||
580 | } | ||
581 | if (len == 0) | ||
582 | break; | ||
583 | dump(buf, len); | ||
584 | } | ||
585 | #endif | ||
586 | |||
587 | get_server_hello_or_die(tls); | ||
588 | |||
589 | //RFC 5246 | ||
590 | // The server MUST send a Certificate message whenever the agreed- | ||
591 | // upon key exchange method uses certificates for authentication | ||
592 | // (this includes all key exchange methods defined in this document | ||
593 | // except DH_anon). This message will always immediately follow the | ||
594 | // ServerHello message. | ||
595 | // | ||
596 | // IOW: in practice, Certificate *always* follows. | ||
597 | // (for example, kernel.org does not even accept DH_anon cipher id) | ||
598 | get_server_cert_or_die(tls); | ||
599 | |||
600 | len = xread_tls_block(tls); | ||
601 | /* Next handshake type is not predetermined */ | ||
602 | switch (tls->inbuf[5]) { | ||
603 | case HANDSHAKE_SERVER_KEY_EXCHANGE: | ||
604 | //0c 0001c7 03|00|17|41|04|87|94|2e|2f|68|d0|c9|f4|97|a8|2d|ef|ed|67|ea|c6|f3|b3|56|47|5d|27|b6|bd|ee|70|25|30|5e|b0|8e|f6|21|5a... 459 bytes | ||
605 | //SvKey len^^^ | ||
606 | dbg("got SERVER_KEY_EXCHANGE\n"); | ||
607 | len = xread_tls_block(tls); | ||
608 | break; | ||
609 | case HANDSHAKE_CERTIFICATE_REQUEST: | ||
610 | dbg("got CERTIFICATE_REQUEST\n"); | ||
611 | len = xread_tls_block(tls); | ||
612 | break; | ||
613 | case HANDSHAKE_SERVER_HELLO_DONE: | ||
614 | // 0e 000000 (len:0) | ||
615 | dbg("got SERVER_HELLO_DONE\n"); | ||
616 | break; | ||
617 | default: | ||
618 | tls_error_die(tls); | ||
619 | } | ||
620 | } | ||
621 | |||
622 | int tls_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; | ||
623 | int tls_main(int argc UNUSED_PARAM, char **argv) | ||
624 | { | ||
625 | tls_state_t *tls; | ||
626 | len_and_sockaddr *lsa; | ||
627 | int fd; | ||
628 | |||
629 | // INIT_G(); | ||
630 | // getopt32(argv, "myopts") | ||
631 | |||
632 | if (!argv[1]) | ||
633 | bb_show_usage(); | ||
634 | |||
635 | lsa = xhost2sockaddr(argv[1], 443); | ||
636 | fd = xconnect_stream(lsa); | ||
637 | |||
638 | tls = new_tls_state(); | ||
639 | tls->fd = fd; | ||
640 | tls_handshake(tls); | ||
641 | |||
642 | return EXIT_SUCCESS; | ||
643 | } | ||