1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
|
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS = WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND = either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include "tls/s2n_connection_evp_digests.h"
#include "utils/s2n_safety.h"
/* On s2n_connection_wipe, save all pointers to OpenSSL EVP digest structs in a temporary
* s2n_connection_prf_handles struct to avoid re-allocation after zeroing the connection struct.
* Do not store any additional hash/HMAC state as it is unnecessary and excessive copying would impact performance.
*/
int s2n_connection_save_prf_state(struct s2n_connection_prf_handles *prf_handles, struct s2n_connection *conn)
{
/* Preserve only the handlers for TLS PRF p_hash pointers to avoid re-allocation */
GUARD(s2n_hmac_save_evp_hash_state(&prf_handles->p_hash_s2n_hmac, &conn->prf_space.tls.p_hash.s2n_hmac));
prf_handles->p_hash_evp_hmac = conn->prf_space.tls.p_hash.evp_hmac;
return 0;
}
/* On s2n_connection_wipe, save all pointers to OpenSSL EVP digest structs in a temporary
* s2n_connection_hash_handles struct to avoid re-allocation after zeroing the connection struct.
* Do not store any additional hash state as it is unnecessary and excessive copying would impact performance.
*/
int s2n_connection_save_hash_state(struct s2n_connection_hash_handles *hash_handles, struct s2n_connection *conn)
{
/* Preserve only the handlers for handshake hash state pointers to avoid re-allocation */
hash_handles->md5 = conn->handshake.md5.digest.high_level;
hash_handles->sha1 = conn->handshake.sha1.digest.high_level;
hash_handles->sha224 = conn->handshake.sha224.digest.high_level;
hash_handles->sha256 = conn->handshake.sha256.digest.high_level;
hash_handles->sha384 = conn->handshake.sha384.digest.high_level;
hash_handles->sha512 = conn->handshake.sha512.digest.high_level;
hash_handles->md5_sha1 = conn->handshake.md5_sha1.digest.high_level;
hash_handles->ccv_hash_copy = conn->handshake.ccv_hash_copy.digest.high_level;
hash_handles->prf_md5_hash_copy = conn->handshake.prf_md5_hash_copy.digest.high_level;
hash_handles->prf_sha1_hash_copy = conn->handshake.prf_sha1_hash_copy.digest.high_level;
hash_handles->prf_tls12_hash_copy = conn->handshake.prf_tls12_hash_copy.digest.high_level;
hash_handles->server_finished_copy = conn->handshake.server_finished_copy.digest.high_level;
/* Preserve only the handlers for SSLv3 PRF hash state pointers to avoid re-allocation */
hash_handles->prf_md5 = conn->prf_space.ssl3.md5.digest.high_level;
hash_handles->prf_sha1 = conn->prf_space.ssl3.sha1.digest.high_level;
/* Preserve only the handlers for initial signature hash state pointers to avoid re-allocation */
hash_handles->initial_signature_hash = conn->initial.signature_hash.digest.high_level;
/* Preserve only the handlers for secure signature hash state pointers to avoid re-allocation */
hash_handles->secure_signature_hash = conn->secure.signature_hash.digest.high_level;
return 0;
}
/* On s2n_connection_wipe, save all pointers to OpenSSL EVP digest structs in a temporary
* s2n_connection_hmac_handles struct to avoid re-allocation after zeroing the connection struct.
* Do not store any additional HMAC state as it is unnecessary and excessive copying would impact performance.
*/
int s2n_connection_save_hmac_state(struct s2n_connection_hmac_handles *hmac_handles, struct s2n_connection *conn)
{
GUARD(s2n_hmac_save_evp_hash_state(&hmac_handles->initial_client, &conn->initial.client_record_mac));
GUARD(s2n_hmac_save_evp_hash_state(&hmac_handles->initial_server, &conn->initial.server_record_mac));
GUARD(s2n_hmac_save_evp_hash_state(&hmac_handles->initial_client_copy, &conn->initial.record_mac_copy_workspace));
GUARD(s2n_hmac_save_evp_hash_state(&hmac_handles->secure_client, &conn->secure.client_record_mac));
GUARD(s2n_hmac_save_evp_hash_state(&hmac_handles->secure_server, &conn->secure.server_record_mac));
GUARD(s2n_hmac_save_evp_hash_state(&hmac_handles->secure_client_copy, &conn->secure.record_mac_copy_workspace));
return 0;
}
/* On s2n_connection_wipe, restore all pointers to OpenSSL EVP digest structs after zeroing the connection struct
* to avoid re-allocation. Do not store any additional hash/HMAC state as it is unnecessary and excessive copying
* would impact performance.
*/
int s2n_connection_restore_prf_state(struct s2n_connection *conn, struct s2n_connection_prf_handles *prf_handles)
{
/* Restore s2n_connection handlers for TLS PRF p_hash */
GUARD(s2n_hmac_restore_evp_hash_state(&prf_handles->p_hash_s2n_hmac, &conn->prf_space.tls.p_hash.s2n_hmac));
conn->prf_space.tls.p_hash.evp_hmac = prf_handles->p_hash_evp_hmac;
return 0;
}
/* On s2n_connection_wipe, restore all pointers to OpenSSL EVP digest structs after zeroing the connection struct
* to avoid re-allocation. Do not store any additional hash state as it is unnecessary and excessive copying
* would impact performance.
*/
int s2n_connection_restore_hash_state(struct s2n_connection *conn, struct s2n_connection_hash_handles *hash_handles)
{
/* Restore s2n_connection handlers for handshake hash states */
conn->handshake.md5.digest.high_level = hash_handles->md5;
conn->handshake.sha1.digest.high_level = hash_handles->sha1;
conn->handshake.sha224.digest.high_level = hash_handles->sha224;
conn->handshake.sha256.digest.high_level = hash_handles->sha256;
conn->handshake.sha384.digest.high_level = hash_handles->sha384;
conn->handshake.sha512.digest.high_level = hash_handles->sha512;
conn->handshake.md5_sha1.digest.high_level = hash_handles->md5_sha1;
conn->handshake.ccv_hash_copy.digest.high_level = hash_handles->ccv_hash_copy;
conn->handshake.prf_md5_hash_copy.digest.high_level = hash_handles->prf_md5_hash_copy;
conn->handshake.prf_sha1_hash_copy.digest.high_level = hash_handles->prf_sha1_hash_copy;
conn->handshake.prf_tls12_hash_copy.digest.high_level = hash_handles->prf_tls12_hash_copy;
conn->handshake.server_finished_copy.digest.high_level = hash_handles->server_finished_copy;
/* Restore s2n_connection handlers for SSLv3 PRF hash states */
conn->prf_space.ssl3.md5.digest.high_level = hash_handles->prf_md5;
conn->prf_space.ssl3.sha1.digest.high_level = hash_handles->prf_sha1;
/* Restore s2n_connection handlers for initial signature hash states */
conn->initial.signature_hash.digest.high_level = hash_handles->initial_signature_hash;
/* Restore s2n_connection handlers for secure signature hash states */
conn->secure.signature_hash.digest.high_level = hash_handles->secure_signature_hash;
return 0;
}
/* On s2n_connection_wipe, restore all pointers to OpenSSL EVP digest structs after zeroing the connection struct
* to avoid re-allocation. Do not store any additional HMAC state as it is unnecessary and excessive copying
* would impact performance.
*/
int s2n_connection_restore_hmac_state(struct s2n_connection *conn, struct s2n_connection_hmac_handles *hmac_handles)
{
GUARD(s2n_hmac_restore_evp_hash_state(&hmac_handles->initial_client, &conn->initial.client_record_mac));
GUARD(s2n_hmac_restore_evp_hash_state(&hmac_handles->initial_server, &conn->initial.server_record_mac));
GUARD(s2n_hmac_restore_evp_hash_state(&hmac_handles->initial_client_copy, &conn->initial.record_mac_copy_workspace));
GUARD(s2n_hmac_restore_evp_hash_state(&hmac_handles->secure_client, &conn->secure.client_record_mac));
GUARD(s2n_hmac_restore_evp_hash_state(&hmac_handles->secure_server, &conn->secure.server_record_mac));
GUARD(s2n_hmac_restore_evp_hash_state(&hmac_handles->secure_client_copy, &conn->secure.record_mac_copy_workspace));
return 0;
}
|