/* * TLS Extensions * (C) 2011,2012 Jack Lloyd * * Released under the terms of the Botan license */ #include #include #include namespace Botan { namespace TLS { namespace { Extension* make_extension(TLS_Data_Reader& reader, u16bit code, u16bit size) { switch(code) { case TLSEXT_SERVER_NAME_INDICATION: return new Server_Name_Indicator(reader, size); case TLSEXT_MAX_FRAGMENT_LENGTH: return new Maximum_Fragment_Length(reader, size); case TLSEXT_SRP_IDENTIFIER: return new SRP_Identifier(reader, size); case TLSEXT_USABLE_ELLIPTIC_CURVES: return new Supported_Elliptic_Curves(reader, size); case TLSEXT_SAFE_RENEGOTIATION: return new Renegotiation_Extension(reader, size); case TLSEXT_SIGNATURE_ALGORITHMS: return new Signature_Algorithms(reader, size); case TLSEXT_NEXT_PROTOCOL: return new Next_Protocol_Notification(reader, size); case TLSEXT_HEARTBEAT_SUPPORT: return new Heartbeat_Support_Indicator(reader, size); case TLSEXT_SESSION_TICKET: return new Session_Ticket(reader, size); default: return nullptr; // not known } } } void Extensions::deserialize(TLS_Data_Reader& reader) { if(reader.has_remaining()) { const u16bit all_extn_size = reader.get_u16bit(); if(reader.remaining_bytes() != all_extn_size) throw Decoding_Error("Bad extension size"); while(reader.has_remaining()) { const u16bit extension_code = reader.get_u16bit(); const u16bit extension_size = reader.get_u16bit(); Extension* extn = make_extension(reader, extension_code, extension_size); if(extn) this->add(extn); else // unknown/unhandled extension reader.discard_next(extension_size); } } } std::vector Extensions::serialize() const { std::vector buf(2); // 2 bytes for length field for(auto& extn : extensions) { if(extn.second->empty()) continue; const u16bit extn_code = extn.second->type(); std::vector extn_val = extn.second->serialize(); buf.push_back(get_byte(0, extn_code)); buf.push_back(get_byte(1, extn_code)); buf.push_back(get_byte(0, extn_val.size())); buf.push_back(get_byte(1, extn_val.size())); buf += extn_val; } const u16bit extn_size = buf.size() - 2; buf[0] = get_byte(0, extn_size); buf[1] = get_byte(1, extn_size); // avoid sending a completely empty extensions block if(buf.size() == 2) return std::vector(); return buf; } Server_Name_Indicator::Server_Name_Indicator(TLS_Data_Reader& reader, u16bit extension_size) { /* * This is used by the server to confirm that it knew the name */ if(extension_size == 0) return; u16bit name_bytes = reader.get_u16bit(); if(name_bytes + 2 != extension_size) throw Decoding_Error("Bad encoding of SNI extension"); while(name_bytes) { byte name_type = reader.get_byte(); name_bytes--; if(name_type == 0) // DNS { sni_host_name = reader.get_string(2, 1, 65535); name_bytes -= (2 + sni_host_name.size()); } else // some other unknown name type { reader.discard_next(name_bytes); name_bytes = 0; } } } std::vector Server_Name_Indicator::serialize() const { std::vector buf; size_t name_len = sni_host_name.size(); buf.push_back(get_byte(0, name_len+3)); buf.push_back(get_byte(1, name_len+3)); buf.push_back(0); // DNS buf.push_back(get_byte(0, name_len)); buf.push_back(get_byte(1, name_len)); buf += std::make_pair( reinterpret_cast(sni_host_name.data()), sni_host_name.size()); return buf; } SRP_Identifier::SRP_Identifier(TLS_Data_Reader& reader, u16bit extension_size) { srp_identifier = reader.get_string(1, 1, 255); if(srp_identifier.size() + 1 != extension_size) throw Decoding_Error("Bad encoding for SRP identifier extension"); } std::vector SRP_Identifier::serialize() const { std::vector buf; const byte* srp_bytes = reinterpret_cast(srp_identifier.data()); append_tls_length_value(buf, srp_bytes, srp_identifier.size(), 1); return buf; } Renegotiation_Extension::Renegotiation_Extension(TLS_Data_Reader& reader, u16bit extension_size) { reneg_data = reader.get_range(1, 0, 255); if(reneg_data.size() + 1 != extension_size) throw Decoding_Error("Bad encoding for secure renegotiation extn"); } std::vector Renegotiation_Extension::serialize() const { std::vector buf; append_tls_length_value(buf, reneg_data, 1); return buf; } std::vector Maximum_Fragment_Length::serialize() const { const std::map fragment_to_code = { { 512, 1 }, { 1024, 2 }, { 2048, 3 }, { 4096, 4 } }; auto i = fragment_to_code.find(m_max_fragment); if(i == fragment_to_code.end()) throw std::invalid_argument("Bad setting " + std::to_string(m_max_fragment) + " for maximum fragment size"); return std::vector(1, i->second); } Maximum_Fragment_Length::Maximum_Fragment_Length(TLS_Data_Reader& reader, u16bit extension_size) { if(extension_size != 1) throw Decoding_Error("Bad size for maximum fragment extension"); byte val = reader.get_byte(); const std::map code_to_fragment = { { 1, 512 }, { 2, 1024 }, { 3, 2048 }, { 4, 4096 } }; auto i = code_to_fragment.find(val); if(i == code_to_fragment.end()) throw TLS_Exception(Alert::ILLEGAL_PARAMETER, "Bad value in maximum fragment extension"); m_max_fragment = i->second; } Next_Protocol_Notification::Next_Protocol_Notification(TLS_Data_Reader& reader, u16bit extension_size) { if(extension_size == 0) return; // empty extension size_t bytes_remaining = extension_size; while(bytes_remaining) { const std::string p = reader.get_string(1, 0, 255); if(bytes_remaining < p.size() + 1) throw Decoding_Error("Bad encoding for next protocol extension"); bytes_remaining -= (p.size() + 1); m_protocols.push_back(p); } } std::vector Next_Protocol_Notification::serialize() const { std::vector buf; for(size_t i = 0; i != m_protocols.size(); ++i) { const std::string p = m_protocols[i]; if(p != "") append_tls_length_value(buf, reinterpret_cast(p.data()), p.size(), 1); } return buf; } std::string Supported_Elliptic_Curves::curve_id_to_name(u16bit id) { switch(id) { case 15: return "secp160k1"; case 16: return "secp160r1"; case 17: return "secp160r2"; case 18: return "secp192k1"; case 19: return "secp192r1"; case 20: return "secp224k1"; case 21: return "secp224r1"; case 22: return "secp256k1"; case 23: return "secp256r1"; case 24: return "secp384r1"; case 25: return "secp521r1"; default: return ""; // something we don't know or support } } u16bit Supported_Elliptic_Curves::name_to_curve_id(const std::string& name) { if(name == "secp160k1") return 15; if(name == "secp160r1") return 16; if(name == "secp160r2") return 17; if(name == "secp192k1") return 18; if(name == "secp192r1") return 19; if(name == "secp224k1") return 20; if(name == "secp224r1") return 21; if(name == "secp256k1") return 22; if(name == "secp256r1") return 23; if(name == "secp384r1") return 24; if(name == "secp521r1") return 25; throw Invalid_Argument("name_to_curve_id unknown name " + name); } std::vector Supported_Elliptic_Curves::serialize() const { std::vector buf(2); for(size_t i = 0; i != m_curves.size(); ++i) { const u16bit id = name_to_curve_id(m_curves[i]); buf.push_back(get_byte(0, id)); buf.push_back(get_byte(1, id)); } buf[0] = get_byte(0, buf.size()-2); buf[1] = get_byte(1, buf.size()-2); return buf; } Supported_Elliptic_Curves::Supported_Elliptic_Curves(TLS_Data_Reader& reader, u16bit extension_size) { u16bit len = reader.get_u16bit(); if(len + 2 != extension_size) throw Decoding_Error("Inconsistent length field in elliptic curve list"); if(len % 2 == 1) throw Decoding_Error("Elliptic curve list of strange size"); len /= 2; for(size_t i = 0; i != len; ++i) { const u16bit id = reader.get_u16bit(); const std::string name = curve_id_to_name(id); if(name != "") m_curves.push_back(name); } } std::string Signature_Algorithms::hash_algo_name(byte code) { switch(code) { case 1: return "MD5"; // code 1 is MD5 - ignore it case 2: return "SHA-1"; case 3: return "SHA-224"; case 4: return "SHA-256"; case 5: return "SHA-384"; case 6: return "SHA-512"; default: return ""; } } byte Signature_Algorithms::hash_algo_code(const std::string& name) { if(name == "MD5") return 1; if(name == "SHA-1") return 2; if(name == "SHA-224") return 3; if(name == "SHA-256") return 4; if(name == "SHA-384") return 5; if(name == "SHA-512") return 6; throw Internal_Error("Unknown hash ID " + name + " for signature_algorithms"); } std::string Signature_Algorithms::sig_algo_name(byte code) { switch(code) { case 1: return "RSA"; case 2: return "DSA"; case 3: return "ECDSA"; default: return ""; } } byte Signature_Algorithms::sig_algo_code(const std::string& name) { if(name == "RSA") return 1; if(name == "DSA") return 2; if(name == "ECDSA") return 3; throw Internal_Error("Unknown sig ID " + name + " for signature_algorithms"); } std::vector Signature_Algorithms::serialize() const { std::vector buf(2); for(size_t i = 0; i != m_supported_algos.size(); ++i) { try { const byte hash_code = hash_algo_code(m_supported_algos[i].first); const byte sig_code = sig_algo_code(m_supported_algos[i].second); buf.push_back(hash_code); buf.push_back(sig_code); } catch(...) {} } buf[0] = get_byte(0, buf.size()-2); buf[1] = get_byte(1, buf.size()-2); return buf; } Signature_Algorithms::Signature_Algorithms(const std::vector& hashes, const std::vector& sigs) { for(size_t i = 0; i != hashes.size(); ++i) for(size_t j = 0; j != sigs.size(); ++j) m_supported_algos.push_back(std::make_pair(hashes[i], sigs[j])); } Signature_Algorithms::Signature_Algorithms(TLS_Data_Reader& reader, u16bit extension_size) { u16bit len = reader.get_u16bit(); if(len + 2 != extension_size) throw Decoding_Error("Bad encoding on signature algorithms extension"); while(len) { const std::string hash_code = hash_algo_name(reader.get_byte()); const std::string sig_code = sig_algo_name(reader.get_byte()); len -= 2; // If not something we know, ignore it completely if(hash_code == "" || sig_code == "") continue; m_supported_algos.push_back(std::make_pair(hash_code, sig_code)); } } Session_Ticket::Session_Ticket(TLS_Data_Reader& reader, u16bit extension_size) { m_ticket = reader.get_elem >(extension_size); } } }