📄 ssl_cry.c
字号:
assert( isReadPtr( masterSecret, masterSecretLen ) );
assert( hashValuesMaxLen >= TLS_HASHEDMAC_SIZE );
assert( labelLength <= 64 && \
labelLength + MD5MAC_SIZE + SHA1MAC_SIZE <= \
64 + ( CRYPT_MAX_HASHSIZE * 2 ) );
/* Clear return value */
*hashValuesLen = 0;
memcpy( hashBuffer, label, labelLength );
/* Complete the hashing and get the MD5 and SHA-1 hashes */
krnlSendMessage( md5context, IMESSAGE_CTX_HASH, "", 0 );
krnlSendMessage( sha1context, IMESSAGE_CTX_HASH, "", 0 );
setMessageData( &msgData, hashBuffer + labelLength, MD5MAC_SIZE );
status = krnlSendMessage( md5context, IMESSAGE_GETATTRIBUTE_S,
&msgData, CRYPT_CTXINFO_HASHVALUE );
if( cryptStatusOK( status ) )
{
setMessageData( &msgData, hashBuffer + labelLength + MD5MAC_SIZE,
SHA1MAC_SIZE );
status = krnlSendMessage( sha1context, IMESSAGE_GETATTRIBUTE_S,
&msgData, CRYPT_CTXINFO_HASHVALUE );
}
if( cryptStatusError( status ) )
return( status );
/* Generate the TLS check value. This isn't really a hash or a MAC, but
is generated by feeding the MD5 and SHA1 hashes of the handshake
messages into the TLS key derivation (PRF) function and truncating
the result to 12 bytes (96 bits) for no adequately explored reason,
most probably it's IPsec cargo cult protocol design:
TLS_PRF( label || MD5_hash || SHA1_hash ) */
setMechanismDeriveInfo( &mechanismInfo, hashValues, TLS_HASHEDMAC_SIZE,
( void * ) masterSecret, masterSecretLen,
CRYPT_USE_DEFAULT, hashBuffer,
labelLength + MD5MAC_SIZE + SHA1MAC_SIZE, 1 );
status = krnlSendMessage( SYSTEM_OBJECT_HANDLE, IMESSAGE_DEV_DERIVE,
&mechanismInfo, MECHANISM_DERIVE_TLS );
if( cryptStatusOK( status ) )
*hashValuesLen = TLS_HASHEDMAC_SIZE;
return( status );
}
/****************************************************************************
* *
* Signature Functions *
* *
****************************************************************************/
/* Create/check the signature on an SSL certificate verify message.
SSLv3/TLS use a weird signature format that dual-MACs (SSLv3) or hashes
(TLS) all of the handshake messages exchanged to date (SSLv3 additionally
hashes in further data like the master secret), then signs them using
nonstandard PKCS #1 RSA without the ASN.1 wrapper (that is, it uses the
private key to encrypt the concatenated SHA-1 and MD5 MAC or hash of the
handshake messages with PKCS #1 padding prepended), unless we're using
DSA in which case it drops the MD5 MAC/hash and uses only the SHA-1 one.
This is an incredible pain to support because it requires running a
parallel hash of handshake messages that terminates before the main
hashing does, further hashing/MAC'ing of additional data, and the use of
weird nonstandard data formats and signature mechanisms that aren't
normally supported by anything. For example if the signing is to be done
via a smart card then we can't use the standard PKCS #1 sig mechanism, we
can't even use raw RSA and kludge the format together ourselves because
some PKCS #11 implementations don't support the _X509 (raw) mechanism,
what we have to do is tunnel the nonstandard sig.format info down through
several cryptlib layers and then hope that the PKCS #11 implementation
that we're using (a) supports this format and (b) gets it right. Another
problem (which only occurs for SSLv3) is that the MAC requires the use of
the master secret, which isn't available for several hundred more lines
of code, so we have to delay producing any more data packets until the
master secret is available, which severely screws up the handshake
processing flow.
The chances of all of this working correctly are fairly low, and in any
case there's no advantage to the weird mechanism and format used in
SSL/TLS, all we actually need to do is sign the client and server nonces
to ensure signature freshness. Because of this what we actually do is
just this, after which we create a standard PKCS #1 signature via the
normal cryptlib mechanisms, which guarantees that it'll work with native
cryptlib as well as any crypto hardware implementation. Since client
certs are hardly ever used and when they are it's in a closed environment,
it's extremely unlikely that anyone will ever notice. There'll be far
more problems in trying to use the nonstandard SSL/TLS signature mechanism
than there are with using a standard (but not-in-the-spec) one */
CHECK_RETVAL STDC_NONNULL_ARG( ( 1 ) ) \
static CRYPT_CONTEXT createCertVerifyHash( const SSL_HANDSHAKE_INFO *handshakeInfo )
{
MESSAGE_CREATEOBJECT_INFO createInfo;
BYTE nonceBuffer[ 64 + SSL_NONCE_SIZE + SSL_NONCE_SIZE + 8 ];
int status;
assert( isReadPtr( handshakeInfo, sizeof( SSL_HANDSHAKE_INFO ) ) );
/* Hash the client and server nonces */
setMessageCreateObjectInfo( &createInfo, CRYPT_ALGO_SHA1 );
status = krnlSendMessage( SYSTEM_OBJECT_HANDLE,
IMESSAGE_DEV_CREATEOBJECT, &createInfo,
OBJECT_TYPE_CONTEXT );
if( cryptStatusError( status ) )
return( status );
memcpy( nonceBuffer, "certificate verify", 18 );
memcpy( nonceBuffer + 18, handshakeInfo->clientNonce, SSL_NONCE_SIZE );
memcpy( nonceBuffer + 18 + SSL_NONCE_SIZE, handshakeInfo->serverNonce,
SSL_NONCE_SIZE );
krnlSendMessage( createInfo.cryptHandle, IMESSAGE_CTX_HASH,
nonceBuffer, 18 + SSL_NONCE_SIZE + SSL_NONCE_SIZE );
krnlSendMessage( createInfo.cryptHandle, IMESSAGE_CTX_HASH,
nonceBuffer, 0 );
return( createInfo.cryptHandle );
}
int createCertVerify( const SESSION_INFO *sessionInfoPtr,
const SSL_HANDSHAKE_INFO *handshakeInfo,
STREAM *stream )
{
CRYPT_CONTEXT iHashContext;
void *dataPtr;
int dataLength, length = DUMMY_INIT, status;
assert( isReadPtr( sessionInfoPtr, sizeof( SESSION_INFO ) ) );
assert( isReadPtr( handshakeInfo, sizeof( SSL_HANDSHAKE_INFO ) ) );
assert( isWritePtr( stream, sizeof( STREAM ) ) );
/* Create the hash of the data to sign */
iHashContext = createCertVerifyHash( handshakeInfo );
if( cryptStatusError( iHashContext ) )
return( iHashContext );
/* Create the signature. The reason for the min() part of the
expression is that iCryptCreateSignature() gets suspicious of very
large buffer sizes, for example when the user has specified the use
of a huge send buffer */
status = sMemGetDataBlockRemaining( stream, &dataPtr, &dataLength );
if( cryptStatusOK( status ) )
{
status = iCryptCreateSignature( dataPtr,
min( dataLength, \
MAX_INTLENGTH_SHORT - 1 ),
&length, CRYPT_FORMAT_CRYPTLIB,
sessionInfoPtr->privateKey,
iHashContext, CRYPT_UNUSED,
CRYPT_UNUSED );
}
if( cryptStatusOK( status ) )
status = sSkip( stream, length );
krnlSendNotifier( iHashContext, IMESSAGE_DECREFCOUNT );
return( status );
}
int checkCertVerify( const SESSION_INFO *sessionInfoPtr,
const SSL_HANDSHAKE_INFO *handshakeInfo,
STREAM *stream, const int sigLength )
{
CRYPT_CONTEXT iHashContext;
void *dataPtr;
int status;
assert( isReadPtr( sessionInfoPtr, sizeof( SESSION_INFO ) ) );
assert( isReadPtr( handshakeInfo, sizeof( SSL_HANDSHAKE_INFO ) ) );
assert( isWritePtr( stream, sizeof( STREAM ) ) );
assert( sigLength > MIN_CRYPT_OBJECTSIZE );
/* Create the hash of the data to sign */
iHashContext = createCertVerifyHash( handshakeInfo );
if( cryptStatusError( iHashContext ) )
return( iHashContext );
/* Verify the signature. The reason for the min() part of the
expression is that iCryptCheckSignature() gets suspicious of very
large buffer sizes, for example when the user has specified the use
of a huge send buffer */
status = sMemGetDataBlock( stream, &dataPtr, sigLength );
if( cryptStatusOK( status ) )
{
status = iCryptCheckSignature( dataPtr,
min( sigLength, \
MAX_INTLENGTH_SHORT - 1 ),
CRYPT_FORMAT_CRYPTLIB,
sessionInfoPtr->iKeyexAuthContext,
iHashContext, CRYPT_UNUSED, NULL );
}
krnlSendNotifier( iHashContext, IMESSAGE_DECREFCOUNT );
return( status );
}
/* Create/check the signature on the server key data */
CHECK_RETVAL STDC_NONNULL_ARG( ( 1, 2, 4, 5 ) ) \
static int createKeyexHashes( const SSL_HANDSHAKE_INFO *handshakeInfo,
IN_BUFFER( keyDataLength ) \
const void *keyData, const int keyDataLength,
OUT CRYPT_CONTEXT *md5Context,
OUT CRYPT_CONTEXT *shaContext )
{
MESSAGE_CREATEOBJECT_INFO createInfo;
BYTE nonceBuffer[ SSL_NONCE_SIZE + SSL_NONCE_SIZE + 8 ];
int status;
assert( isReadPtr( handshakeInfo, sizeof( SSL_HANDSHAKE_INFO ) ) );
assert( isReadPtr( keyData, keyDataLength ) );
assert( isWritePtr( md5Context, sizeof( CRYPT_CONTEXT ) ) );
assert( isWritePtr( shaContext, sizeof( CRYPT_CONTEXT ) ) );
/* Clear return values */
*md5Context = *shaContext = CRYPT_ERROR;
/* Create the dual hash contexts */
setMessageCreateObjectInfo( &createInfo, CRYPT_ALGO_MD5 );
status = krnlSendMessage( SYSTEM_OBJECT_HANDLE,
IMESSAGE_DEV_CREATEOBJECT, &createInfo,
OBJECT_TYPE_CONTEXT );
if( cryptStatusError( status ) )
return( status );
*md5Context = createInfo.cryptHandle;
setMessageCreateObjectInfo( &createInfo, CRYPT_ALGO_SHA1 );
status = krnlSendMessage( SYSTEM_OBJECT_HANDLE,
IMESSAGE_DEV_CREATEOBJECT, &createInfo,
OBJECT_TYPE_CONTEXT );
if( cryptStatusError( status ) )
{
krnlSendNotifier( *md5Context, IMESSAGE_DECREFCOUNT );
return( status );
}
*shaContext = createInfo.cryptHandle;
/* Hash the client and server nonces and key data */
memcpy( nonceBuffer, handshakeInfo->clientNonce, SSL_NONCE_SIZE );
memcpy( nonceBuffer + SSL_NONCE_SIZE, handshakeInfo->serverNonce,
SSL_NONCE_SIZE );
krnlSendMessage( *md5Context, IMESSAGE_CTX_HASH,
nonceBuffer, SSL_NONCE_SIZE + SSL_NONCE_SIZE );
krnlSendMessage( *shaContext, IMESSAGE_CTX_HASH,
nonceBuffer, SSL_NONCE_SIZE + SSL_NONCE_SIZE );
krnlSendMessage( *md5Context, IMESSAGE_CTX_HASH,
( void * ) keyData, keyDataLength );
krnlSendMessage( *shaContext, IMESSAGE_CTX_HASH,
( void * ) keyData, keyDataLength );
krnlSendMessage( *md5Context, IMESSAGE_CTX_HASH,
nonceBuffer, 0 );
krnlSendMessage( *shaContext, IMESSAGE_CTX_HASH,
nonceBuffer, 0 );
return( CRYPT_OK );
}
int createKeyexSignature( SESSION_INFO *sessionInfoPtr,
SSL_HANDSHAKE_INFO *handshakeInfo,
STREAM *stream, const void *keyData,
const int keyDataLength )
{
CRYPT_CONTEXT md5Context, shaContext;
void *dataPtr;
int dataLength, sigLength = DUMMY_INIT, status;
assert( isWritePtr( sessionInfoPtr, sizeof( SESSION_INFO ) ) );
assert( isWritePtr( handshakeInfo, sizeof( SSL_HANDSHAKE_INFO ) ) );
assert( isWritePtr( stream, sizeof( STREAM ) ) );
assert( isReadPtr( keyData, keyDataLength ) );
/* Hash the data to be signed */
status = createKeyexHashes( handshakeInfo, keyData, keyDataLength,
&md5Context, &shaContext );
if( cryptStatusError( status ) )
return( status );
/* Sign the hashes. The reason for the min() part of the expression is
that iCryptCreateSignature() gets suspicious of very large buffer
sizes, for example when the user has specified the use of a huge send
buffer */
status = sMemGetDataBlockRemaining( stream, &dataPtr, &dataLength );
if( cryptStatusOK( status ) )
{
status = iCryptCreateSignature( dataPtr,
min( dataLength, \
MAX_INTLENGTH_SHORT - 1 ),
&sigLength, CRYPT_IFORMAT_SSL,
sessionInfoPtr->privateKey,
md5Context, shaContext,
CRYPT_UNUSED );
}
if( cryptStatusOK( status ) )
status = sSkip( stream, sigLength );
/* Clean up */
krnlSendNotifier( md5Context, IMESSAGE_DECREFCOUNT );
krnlSendNotifier( shaContext, IMESSAGE_DECREFCOUNT );
return( status );
}
int checkKeyexSignature( SESSION_INFO *sessionInfoPtr,
SSL_HANDSHAKE_INFO *handshakeInfo,
STREAM *stream, const void *keyData,
const int keyDataLength )
{
CRYPT_CONTEXT md5Context, shaContext;
void *dataPtr;
int dataLength, status;
assert( isWritePtr( sessionInfoPtr, sizeof( SESSION_INFO ) ) );
assert( isWritePtr( handshakeInfo, sizeof( SSL_HANDSHAKE_INFO ) ) );
assert( isWritePtr( stream, sizeof( STREAM ) ) );
assert( isReadPtr( keyData, keyDataLength ) );
/* Make sure that there's enough data present for at least a minimal-
length signature */
if( sMemDataLeft( stream ) < MIN_PKCSIZE )
return( CRYPT_ERROR_BADDATA );
/* Hash the data to be signed */
status = createKeyexHashes( handshakeInfo, keyData, keyDataLength,
&md5Context, &shaContext );
if( cryptStatusError( status ) )
return( status );
/* Check the signature on the hashes. The reason for the min() part of
the expression is that iCryptCreateSignature() gets suspicious of
very large buffer sizes, for example when the user has specified the
use of a huge send buffer */
status = sMemGetDataBlockRemaining( stream, &dataPtr, &dataLength );
if( cryptStatusOK( status ) )
{
status = iCryptCheckSignature( dataPtr,
min( dataLength, \
MAX_INTLENGTH_SHORT - 1 ),
CRYPT_IFORMAT_SSL,
sessionInfoPtr->iKeyexCryptContext,
md5Context, shaContext, NULL );
}
if( cryptStatusOK( status ) )
status = readUniversal16( stream );
/* Clean up */
krnlSendNotifier( md5Context, IMESSAGE_DECREFCOUNT );
krnlSendNotifier( shaContext, IMESSAGE_DECREFCOUNT );
return( status );
}
#endif /* USE_SSL */
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -