mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-07-29 11:41:15 +03:00
Replace curve_list with group_list and add update test scripts
Signed-off-by: XiaokangQian <xiaokang.qian@arm.com>
This commit is contained in:
@ -135,6 +135,7 @@ static int ssl_tls13_parse_supported_versions_ext( mbedtls_ssl_context *ssl,
|
|||||||
* } KeyShare;
|
* } KeyShare;
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECDH_C)
|
||||||
static int ssl_reset_ecdhe_share( mbedtls_ssl_context *ssl )
|
static int ssl_reset_ecdhe_share( mbedtls_ssl_context *ssl )
|
||||||
{
|
{
|
||||||
mbedtls_ecdh_free( &ssl->handshake->ecdh_ctx );
|
mbedtls_ecdh_free( &ssl->handshake->ecdh_ctx );
|
||||||
@ -156,6 +157,13 @@ static int ssl_reset_key_share( mbedtls_ssl_context *ssl )
|
|||||||
|
|
||||||
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
||||||
}
|
}
|
||||||
|
#else
|
||||||
|
static int ssl_reset_key_share( mbedtls_ssl_context *ssl )
|
||||||
|
{
|
||||||
|
((void) ssl);
|
||||||
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
||||||
|
}
|
||||||
|
#endif /* MBEDTLS_ECDH_C */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Functions for writing key_share extension.
|
* Functions for writing key_share extension.
|
||||||
@ -1445,7 +1453,7 @@ static int ssl_hrr_parse( mbedtls_ssl_context *ssl,
|
|||||||
case MBEDTLS_TLS_EXT_KEY_SHARE:
|
case MBEDTLS_TLS_EXT_KEY_SHARE:
|
||||||
{
|
{
|
||||||
/* Variables for parsing the key_share */
|
/* Variables for parsing the key_share */
|
||||||
const mbedtls_ecp_group_id* grp_id;
|
const uint16_t* grp_id;
|
||||||
const mbedtls_ecp_curve_info *curve_info = NULL;
|
const mbedtls_ecp_curve_info *curve_info = NULL;
|
||||||
int tls_id;
|
int tls_id;
|
||||||
int found = 0;
|
int found = 0;
|
||||||
@ -1460,13 +1468,14 @@ static int ssl_hrr_parse( mbedtls_ssl_context *ssl,
|
|||||||
* MUST first verify that the selected_group field corresponds to a
|
* MUST first verify that the selected_group field corresponds to a
|
||||||
* group which was provided in the "supported_groups" extension in the
|
* group which was provided in the "supported_groups" extension in the
|
||||||
* original ClientHello.
|
* original ClientHello.
|
||||||
* The supported_group was based on the info in ssl->conf->curve_list.
|
* The supported_group was based on the info in ssl->conf->group_list.
|
||||||
*
|
*
|
||||||
* If the server provided a key share that was not sent in the ClientHello
|
* If the server provided a key share that was not sent in the ClientHello
|
||||||
* then the client MUST abort the handshake with an "illegal_parameter" alert. */
|
* then the client MUST abort the handshake with an "illegal_parameter" alert.
|
||||||
for( grp_id = ssl->conf->curve_list; *grp_id != MBEDTLS_ECP_DP_NONE; grp_id++ )
|
*/
|
||||||
|
for( grp_id = ssl->conf->group_list; *grp_id != MBEDTLS_ECP_DP_NONE; grp_id++ )
|
||||||
{
|
{
|
||||||
curve_info = mbedtls_ecp_curve_info_from_grp_id( *grp_id );
|
curve_info = mbedtls_ecp_curve_info_from_tls_id( *grp_id );
|
||||||
if( curve_info == NULL || curve_info->tls_id != tls_id )
|
if( curve_info == NULL || curve_info->tls_id != tls_id )
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
@ -1480,7 +1489,8 @@ static int ssl_hrr_parse( mbedtls_ssl_context *ssl,
|
|||||||
* extension in the original ClientHello. If the server sent an
|
* extension in the original ClientHello. If the server sent an
|
||||||
* HRR message with a key share already provided in the
|
* HRR message with a key share already provided in the
|
||||||
* ClientHello then the client MUST abort the handshake with
|
* ClientHello then the client MUST abort the handshake with
|
||||||
* an "illegal_parameter" alert. */
|
* an "illegal_parameter" alert.
|
||||||
|
*/
|
||||||
if( found == 0 || tls_id == ssl->handshake->offered_group_id )
|
if( found == 0 || tls_id == ssl->handshake->offered_group_id )
|
||||||
{
|
{
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "Invalid key share in HRR" ) );
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "Invalid key share in HRR" ) );
|
||||||
@ -1513,7 +1523,9 @@ static int ssl_hrr_parse( mbedtls_ssl_context *ssl,
|
|||||||
|
|
||||||
static int ssl_hrr_postprocess( mbedtls_ssl_context *ssl )
|
static int ssl_hrr_postprocess( mbedtls_ssl_context *ssl )
|
||||||
{
|
{
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
||||||
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
if( ssl->handshake->hello_retry_requests_received > 0 )
|
if( ssl->handshake->hello_retry_requests_received > 0 )
|
||||||
{
|
{
|
||||||
@ -1545,9 +1557,11 @@ static int ssl_hrr_postprocess( mbedtls_ssl_context *ssl )
|
|||||||
* key share writing, we can confine this to the case where the server
|
* key share writing, we can confine this to the case where the server
|
||||||
* requested a different share.
|
* requested a different share.
|
||||||
*/
|
*/
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
ret = ssl_reset_key_share( ssl );
|
ret = ssl_reset_key_share( ssl );
|
||||||
if( ret != 0 )
|
if( ret != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
@ -1840,8 +1854,6 @@ static int ssl_tls13_write_change_cipher_spec( mbedtls_ssl_context *ssl )
|
|||||||
if( ret != 0 )
|
if( ret != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
|
|
||||||
mbedtls_ssl_handshake_set_state( ssl, MBEDTLS_SSL_CLIENT_FINISHED );
|
|
||||||
|
|
||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
|
#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
|
||||||
@ -1952,6 +1964,7 @@ int mbedtls_ssl_tls13_handshake_client_step( mbedtls_ssl_context *ssl )
|
|||||||
*/
|
*/
|
||||||
#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
|
#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
|
||||||
case MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED:
|
case MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED:
|
||||||
|
case MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO:
|
||||||
ret = ssl_tls13_write_change_cipher_spec( ssl );
|
ret = ssl_tls13_write_change_cipher_spec( ssl );
|
||||||
break;
|
break;
|
||||||
#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
|
#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
|
||||||
|
@ -1058,6 +1058,32 @@ void mbedtls_ssl_tls13_handshake_wrapup( mbedtls_ssl_context *ssl )
|
|||||||
*/
|
*/
|
||||||
#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
|
#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
|
||||||
|
|
||||||
|
static int ssl_write_change_cipher_spec_postprocess( mbedtls_ssl_context* ssl )
|
||||||
|
{
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_SSL_CLI_C)
|
||||||
|
if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT )
|
||||||
|
{
|
||||||
|
switch( ssl->state )
|
||||||
|
{
|
||||||
|
case MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO:
|
||||||
|
mbedtls_ssl_handshake_set_state( ssl, MBEDTLS_SSL_CLIENT_HELLO );
|
||||||
|
break;
|
||||||
|
case MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED:
|
||||||
|
mbedtls_ssl_handshake_set_state( ssl, MBEDTLS_SSL_CLIENT_FINISHED );
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
||||||
|
return( MBEDTLS_ERR_SSL_INTERNAL_ERROR );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
((void) ssl);
|
||||||
|
#endif /* MBEDTLS_SSL_CLI_C */
|
||||||
|
|
||||||
|
return( 0 );
|
||||||
|
}
|
||||||
|
|
||||||
static int ssl_tls13_write_change_cipher_spec_body( mbedtls_ssl_context *ssl,
|
static int ssl_tls13_write_change_cipher_spec_body( mbedtls_ssl_context *ssl,
|
||||||
unsigned char *buf,
|
unsigned char *buf,
|
||||||
unsigned char *end,
|
unsigned char *end,
|
||||||
@ -1088,6 +1114,9 @@ int mbedtls_ssl_tls13_write_change_cipher_spec( mbedtls_ssl_context *ssl )
|
|||||||
|
|
||||||
ssl->out_msgtype = MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC;
|
ssl->out_msgtype = MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC;
|
||||||
|
|
||||||
|
/* Update state */
|
||||||
|
MBEDTLS_SSL_PROC_CHK( ssl_write_change_cipher_spec_postprocess( ssl ) );
|
||||||
|
|
||||||
/* Dispatch message */
|
/* Dispatch message */
|
||||||
MBEDTLS_SSL_PROC_CHK( mbedtls_ssl_write_record( ssl, 1 ) );
|
MBEDTLS_SSL_PROC_CHK( mbedtls_ssl_write_record( ssl, 1 ) );
|
||||||
|
|
||||||
|
@ -9219,8 +9219,8 @@ run_test "TLS 1.3: HelloRetryRequest check - openssl" \
|
|||||||
"$P_CLI debug_level=4 force_version=tls13" \
|
"$P_CLI debug_level=4 force_version=tls13" \
|
||||||
1 \
|
1 \
|
||||||
-c "received HelloRetryRequest message" \
|
-c "received HelloRetryRequest message" \
|
||||||
-c "HRR not supported" \
|
-c "tls13 client state: MBEDTLS_SSL_CLIENT_HELLO(1)" \
|
||||||
-c "Last error was: -0x6E00 - SSL - The handshake negotiation failed"
|
-c "Last error was: -0x7180 - SSL - Verification of the message MAC failed"
|
||||||
|
|
||||||
requires_gnutls_tls1_3
|
requires_gnutls_tls1_3
|
||||||
requires_gnutls_next_no_ticket
|
requires_gnutls_next_no_ticket
|
||||||
@ -9234,8 +9234,8 @@ run_test "TLS 1.3: HelloRetryRequest check - gnutls" \
|
|||||||
"$P_CLI debug_level=4 force_version=tls13" \
|
"$P_CLI debug_level=4 force_version=tls13" \
|
||||||
1 \
|
1 \
|
||||||
-c "received HelloRetryRequest message" \
|
-c "received HelloRetryRequest message" \
|
||||||
-c "HRR not supported" \
|
-c "tls13 client state: MBEDTLS_SSL_CLIENT_HELLO(1)" \
|
||||||
-c "Last error was: -0x6E00 - SSL - The handshake negotiation failed" \
|
-c "Last error was: -0x7180 - SSL - Verification of the message MAC failed" \
|
||||||
-s "HELLO RETRY REQUEST was queued"
|
-s "HELLO RETRY REQUEST was queued"
|
||||||
|
|
||||||
for i in $(ls opt-testcases/*.sh)
|
for i in $(ls opt-testcases/*.sh)
|
||||||
|
Reference in New Issue
Block a user