diff options
Diffstat (limited to 'src/lib/libssl/tls12_lib.c')
| -rw-r--r-- | src/lib/libssl/tls12_lib.c | 118 |
1 files changed, 0 insertions, 118 deletions
diff --git a/src/lib/libssl/tls12_lib.c b/src/lib/libssl/tls12_lib.c deleted file mode 100644 index 96b3abcd2a..0000000000 --- a/src/lib/libssl/tls12_lib.c +++ /dev/null | |||
| @@ -1,118 +0,0 @@ | |||
| 1 | /* $OpenBSD: tls12_lib.c,v 1.6 2022/11/26 16:08:56 tb Exp $ */ | ||
| 2 | /* | ||
| 3 | * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> | ||
| 4 | * | ||
| 5 | * Permission to use, copy, modify, and distribute this software for any | ||
| 6 | * purpose with or without fee is hereby granted, provided that the above | ||
| 7 | * copyright notice and this permission notice appear in all copies. | ||
| 8 | * | ||
| 9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
| 10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
| 11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
| 12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
| 13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
| 14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
| 15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
| 16 | */ | ||
| 17 | |||
| 18 | #include "ssl_local.h" | ||
| 19 | |||
| 20 | static int | ||
| 21 | tls12_finished_verify_data(SSL *s, const char *finished_label, | ||
| 22 | size_t finished_label_len, uint8_t *verify_data, size_t verify_data_len, | ||
| 23 | size_t *out_len) | ||
| 24 | { | ||
| 25 | uint8_t transcript_hash[EVP_MAX_MD_SIZE]; | ||
| 26 | size_t transcript_hash_len; | ||
| 27 | |||
| 28 | *out_len = 0; | ||
| 29 | |||
| 30 | if (s->session->master_key_length == 0) | ||
| 31 | return 0; | ||
| 32 | |||
| 33 | if (verify_data_len < TLS1_FINISH_MAC_LENGTH) | ||
| 34 | return 0; | ||
| 35 | |||
| 36 | if (!tls1_transcript_hash_value(s, transcript_hash, | ||
| 37 | sizeof(transcript_hash), &transcript_hash_len)) | ||
| 38 | return 0; | ||
| 39 | |||
| 40 | if (!tls1_PRF(s, s->session->master_key, s->session->master_key_length, | ||
| 41 | finished_label, finished_label_len, transcript_hash, | ||
| 42 | transcript_hash_len, NULL, 0, NULL, 0, NULL, 0, verify_data, | ||
| 43 | TLS1_FINISH_MAC_LENGTH)) | ||
| 44 | return 0; | ||
| 45 | |||
| 46 | *out_len = TLS1_FINISH_MAC_LENGTH; | ||
| 47 | |||
| 48 | return 1; | ||
| 49 | } | ||
| 50 | |||
| 51 | static int | ||
| 52 | tls12_client_finished_verify_data(SSL *s, uint8_t *verify_data, | ||
| 53 | size_t verify_data_len, size_t *out_len) | ||
| 54 | { | ||
| 55 | return tls12_finished_verify_data(s, TLS_MD_CLIENT_FINISH_CONST, | ||
| 56 | TLS_MD_CLIENT_FINISH_CONST_SIZE, verify_data, verify_data_len, | ||
| 57 | out_len); | ||
| 58 | } | ||
| 59 | |||
| 60 | static int | ||
| 61 | tls12_server_finished_verify_data(SSL *s, uint8_t *verify_data, | ||
| 62 | size_t verify_data_len, size_t *out_len) | ||
| 63 | { | ||
| 64 | return tls12_finished_verify_data(s, TLS_MD_SERVER_FINISH_CONST, | ||
| 65 | TLS_MD_SERVER_FINISH_CONST_SIZE, verify_data, verify_data_len, | ||
| 66 | out_len); | ||
| 67 | } | ||
| 68 | |||
| 69 | int | ||
| 70 | tls12_derive_finished(SSL *s) | ||
| 71 | { | ||
| 72 | if (!s->server) { | ||
| 73 | return tls12_client_finished_verify_data(s, | ||
| 74 | s->s3->hs.finished, sizeof(s->s3->hs.finished), | ||
| 75 | &s->s3->hs.finished_len); | ||
| 76 | } else { | ||
| 77 | return tls12_server_finished_verify_data(s, | ||
| 78 | s->s3->hs.finished, sizeof(s->s3->hs.finished), | ||
| 79 | &s->s3->hs.finished_len); | ||
| 80 | } | ||
| 81 | } | ||
| 82 | |||
| 83 | int | ||
| 84 | tls12_derive_peer_finished(SSL *s) | ||
| 85 | { | ||
| 86 | if (s->server) { | ||
| 87 | return tls12_client_finished_verify_data(s, | ||
| 88 | s->s3->hs.peer_finished, sizeof(s->s3->hs.peer_finished), | ||
| 89 | &s->s3->hs.peer_finished_len); | ||
| 90 | } else { | ||
| 91 | return tls12_server_finished_verify_data(s, | ||
| 92 | s->s3->hs.peer_finished, sizeof(s->s3->hs.peer_finished), | ||
| 93 | &s->s3->hs.peer_finished_len); | ||
| 94 | } | ||
| 95 | } | ||
| 96 | |||
| 97 | int | ||
| 98 | tls12_derive_master_secret(SSL *s, uint8_t *premaster_secret, | ||
| 99 | size_t premaster_secret_len) | ||
| 100 | { | ||
| 101 | s->session->master_key_length = 0; | ||
| 102 | |||
| 103 | if (premaster_secret_len == 0) | ||
| 104 | return 0; | ||
| 105 | |||
| 106 | CTASSERT(sizeof(s->session->master_key) == SSL_MAX_MASTER_KEY_LENGTH); | ||
| 107 | |||
| 108 | if (!tls1_PRF(s, premaster_secret, premaster_secret_len, | ||
| 109 | TLS_MD_MASTER_SECRET_CONST, TLS_MD_MASTER_SECRET_CONST_SIZE, | ||
| 110 | s->s3->client_random, SSL3_RANDOM_SIZE, NULL, 0, | ||
| 111 | s->s3->server_random, SSL3_RANDOM_SIZE, NULL, 0, | ||
| 112 | s->session->master_key, sizeof(s->session->master_key))) | ||
| 113 | return 0; | ||
| 114 | |||
| 115 | s->session->master_key_length = SSL_MAX_MASTER_KEY_LENGTH; | ||
| 116 | |||
| 117 | return 1; | ||
| 118 | } | ||
