1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
|
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include "tls/s2n_connection.h"
#include "tls/s2n_tls.h"
#include "tls/s2n_tls13_handshake.h"
#include "stuffer/s2n_stuffer.h"
#include "utils/s2n_blob.h"
/* Length of the synthetic message header */
#define MESSAGE_HASH_HEADER_LENGTH 4
static int s2n_tls13_conn_copy_server_finished_hash(struct s2n_connection *conn) {
notnull_check(conn);
s2n_tls13_connection_keys(keys, conn);
struct s2n_hash_state hash_state = {0};
GUARD(s2n_handshake_get_hash_state(conn, keys.hash_algorithm, &hash_state));
GUARD(s2n_hash_copy(&conn->handshake.server_finished_copy, &hash_state));
return 0;
}
int s2n_conn_update_handshake_hashes(struct s2n_connection *conn, struct s2n_blob *data)
{
notnull_check(conn);
notnull_check(data);
if (s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_MD5)) {
/* The handshake MD5 hash state will fail the s2n_hash_is_available() check
* since MD5 is not permitted in FIPS mode. This check will not be used as
* the handshake MD5 hash state is specifically used by the TLS 1.0 and TLS 1.1
* PRF, which is required to comply with the TLS 1.0 and 1.1 RFCs and is approved
* as per NIST Special Publication 800-52 Revision 1.
*/
GUARD(s2n_hash_update(&conn->handshake.md5, data->data, data->size));
}
if (s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_SHA1)) {
GUARD(s2n_hash_update(&conn->handshake.sha1, data->data, data->size));
}
const uint8_t md5_sha1_required = (s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_MD5) &&
s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_SHA1));
if (md5_sha1_required) {
/* The MD5_SHA1 hash can still be used for TLS 1.0 and 1.1 in FIPS mode for
* the handshake hashes. This will only be used for the signature check in the
* CertificateVerify message and the PRF. NIST SP 800-52r1 approves use
* of MD5_SHA1 for these use cases (see footnotes 15 and 20, and section
* 3.3.2) */
GUARD(s2n_hash_update(&conn->handshake.md5_sha1, data->data, data->size));
}
if (s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_SHA224)) {
GUARD(s2n_hash_update(&conn->handshake.sha224, data->data, data->size));
}
if (s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_SHA256)) {
GUARD(s2n_hash_update(&conn->handshake.sha256, data->data, data->size));
}
if (s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_SHA384)) {
GUARD(s2n_hash_update(&conn->handshake.sha384, data->data, data->size));
}
if (s2n_handshake_is_hash_required(&conn->handshake, S2N_HASH_SHA512)) {
GUARD(s2n_hash_update(&conn->handshake.sha512, data->data, data->size));
}
/* Copy the CLIENT_HELLO -> SERVER_FINISHED hash.
* TLS1.3 will need it later to calculate the application secrets. */
if (s2n_connection_get_protocol_version(conn) >= S2N_TLS13 &&
s2n_conn_get_current_message_type(conn) == SERVER_FINISHED) {
GUARD(s2n_tls13_conn_copy_server_finished_hash(conn));
}
return 0;
}
/* When a HelloRetryRequest message is used, the hash transcript needs to be recreated.
* This is done with a synthetic message header, and the hash of ClientHello1.
*
* https://tools.ietf.org/html/rfc8446#section-4.4.1
*/
int s2n_server_hello_retry_recreate_transcript(struct s2n_connection *conn)
{
notnull_check(conn);
s2n_tls13_connection_keys(keys, conn);
uint8_t hash_digest_length = keys.size;
/* Create the MessageHash (our synthetic message) */
uint8_t msghdr[MESSAGE_HASH_HEADER_LENGTH] = {0};
msghdr[0] = TLS_MESSAGE_HASH;
msghdr[MESSAGE_HASH_HEADER_LENGTH - 1] = hash_digest_length;
/* Grab the current transcript hash to use as the ClientHello1 value. */
struct s2n_hash_state hash_state, client_hello1_hash;
uint8_t client_hello1_digest_out[S2N_MAX_DIGEST_LEN];
GUARD(s2n_handshake_get_hash_state(conn, keys.hash_algorithm, &hash_state));
GUARD(s2n_hash_new(&client_hello1_hash));
GUARD(s2n_hash_copy(&client_hello1_hash, &hash_state));
GUARD(s2n_hash_digest(&client_hello1_hash, client_hello1_digest_out, hash_digest_length));
GUARD(s2n_hash_free(&client_hello1_hash));
/* Step 1: Reset the hash state */
GUARD(s2n_handshake_reset_hash_state(conn, keys.hash_algorithm));
/* Step 2: Update the transcript with the synthetic message */
struct s2n_blob msg_blob = {0};
GUARD(s2n_blob_init(&msg_blob, msghdr, MESSAGE_HASH_HEADER_LENGTH));
GUARD(s2n_conn_update_handshake_hashes(conn, &msg_blob));
/* Step 3: Update the transcript with the ClientHello1 hash */
GUARD(s2n_blob_init(&msg_blob, client_hello1_digest_out, hash_digest_length));
GUARD(s2n_conn_update_handshake_hashes(conn, &msg_blob));
return 0;
}
|