mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-07-30 22:43:08 +03:00
Merge branch 'mbedtls-3.6-restricted' into mbedtls-3.6.3rc0-pr
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
This commit is contained in:
@ -6316,7 +6316,7 @@ static psa_status_t psa_generate_derived_ecc_key_weierstrass_helper(
|
||||
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
||||
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
||||
size_t m;
|
||||
size_t m_bytes;
|
||||
size_t m_bytes = 0;
|
||||
|
||||
mbedtls_mpi_init(&k);
|
||||
mbedtls_mpi_init(&diff_N_2);
|
||||
@ -6389,7 +6389,7 @@ cleanup:
|
||||
status = mbedtls_to_psa_error(ret);
|
||||
}
|
||||
if (status != PSA_SUCCESS) {
|
||||
mbedtls_free(*data);
|
||||
mbedtls_zeroize_and_free(*data, m_bytes);
|
||||
*data = NULL;
|
||||
}
|
||||
mbedtls_mpi_free(&k);
|
||||
@ -6564,7 +6564,7 @@ static psa_status_t psa_generate_derived_key_internal(
|
||||
}
|
||||
|
||||
exit:
|
||||
mbedtls_free(data);
|
||||
mbedtls_zeroize_and_free(data, bytes);
|
||||
return status;
|
||||
}
|
||||
|
||||
@ -9313,7 +9313,7 @@ psa_status_t psa_crypto_local_input_alloc(const uint8_t *input, size_t input_len
|
||||
return PSA_SUCCESS;
|
||||
|
||||
error:
|
||||
mbedtls_free(local_input->buffer);
|
||||
mbedtls_zeroize_and_free(local_input->buffer, local_input->length);
|
||||
local_input->buffer = NULL;
|
||||
local_input->length = 0;
|
||||
return status;
|
||||
@ -9321,7 +9321,7 @@ error:
|
||||
|
||||
void psa_crypto_local_input_free(psa_crypto_local_input_t *local_input)
|
||||
{
|
||||
mbedtls_free(local_input->buffer);
|
||||
mbedtls_zeroize_and_free(local_input->buffer, local_input->length);
|
||||
local_input->buffer = NULL;
|
||||
local_input->length = 0;
|
||||
}
|
||||
@ -9365,7 +9365,7 @@ psa_status_t psa_crypto_local_output_free(psa_crypto_local_output_t *local_outpu
|
||||
return status;
|
||||
}
|
||||
|
||||
mbedtls_free(local_output->buffer);
|
||||
mbedtls_zeroize_and_free(local_output->buffer, local_output->length);
|
||||
local_output->buffer = NULL;
|
||||
local_output->length = 0;
|
||||
|
||||
|
@ -29,19 +29,20 @@ static int ssl_write_hostname_ext(mbedtls_ssl_context *ssl,
|
||||
size_t *olen)
|
||||
{
|
||||
unsigned char *p = buf;
|
||||
const char *hostname = mbedtls_ssl_get_hostname_pointer(ssl);
|
||||
size_t hostname_len;
|
||||
|
||||
*olen = 0;
|
||||
|
||||
if (ssl->hostname == NULL) {
|
||||
if (hostname == NULL) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
MBEDTLS_SSL_DEBUG_MSG(3,
|
||||
("client hello, adding server name extension: %s",
|
||||
ssl->hostname));
|
||||
hostname));
|
||||
|
||||
hostname_len = strlen(ssl->hostname);
|
||||
hostname_len = strlen(hostname);
|
||||
|
||||
MBEDTLS_SSL_CHK_BUF_PTR(p, end, hostname_len + 9);
|
||||
|
||||
@ -85,7 +86,7 @@ static int ssl_write_hostname_ext(mbedtls_ssl_context *ssl,
|
||||
MBEDTLS_PUT_UINT16_BE(hostname_len, p, 0);
|
||||
p += 2;
|
||||
|
||||
memcpy(p, ssl->hostname, hostname_len);
|
||||
memcpy(p, hostname, hostname_len);
|
||||
|
||||
*olen = hostname_len + 9;
|
||||
|
||||
@ -881,13 +882,14 @@ static int ssl_prepare_client_hello(mbedtls_ssl_context *ssl)
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
|
||||
defined(MBEDTLS_SSL_SESSION_TICKETS) && \
|
||||
defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
|
||||
const char *context_hostname = mbedtls_ssl_get_hostname_pointer(ssl);
|
||||
if (ssl->tls_version == MBEDTLS_SSL_VERSION_TLS1_3 &&
|
||||
ssl->handshake->resume) {
|
||||
int hostname_mismatch = ssl->hostname != NULL ||
|
||||
int hostname_mismatch = context_hostname != NULL ||
|
||||
session_negotiate->hostname != NULL;
|
||||
if (ssl->hostname != NULL && session_negotiate->hostname != NULL) {
|
||||
if (context_hostname != NULL && session_negotiate->hostname != NULL) {
|
||||
hostname_mismatch = strcmp(
|
||||
ssl->hostname, session_negotiate->hostname) != 0;
|
||||
context_hostname, session_negotiate->hostname) != 0;
|
||||
}
|
||||
|
||||
if (hostname_mismatch) {
|
||||
@ -898,7 +900,7 @@ static int ssl_prepare_client_hello(mbedtls_ssl_context *ssl)
|
||||
}
|
||||
} else {
|
||||
return mbedtls_ssl_session_set_hostname(session_negotiate,
|
||||
ssl->hostname);
|
||||
context_hostname);
|
||||
}
|
||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_3 &&
|
||||
MBEDTLS_SSL_SESSION_TICKETS &&
|
||||
|
@ -2900,6 +2900,18 @@ int mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext(
|
||||
unsigned char *buf, unsigned char *end);
|
||||
#endif /* MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED */
|
||||
|
||||
#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
|
||||
/** Get the host name from the SSL context.
|
||||
*
|
||||
* \param[in] ssl SSL context
|
||||
*
|
||||
* \return The \p hostname pointer from the SSL context.
|
||||
* \c NULL if mbedtls_ssl_set_hostname() has never been called on
|
||||
* \p ssl or if it was last called with \p NULL.
|
||||
*/
|
||||
const char *mbedtls_ssl_get_hostname_pointer(const mbedtls_ssl_context *ssl);
|
||||
#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
|
||||
|
||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
|
||||
defined(MBEDTLS_SSL_SESSION_TICKETS) && \
|
||||
defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && \
|
||||
|
@ -2769,6 +2769,51 @@ void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf,
|
||||
}
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
||||
|
||||
/* A magic value for `ssl->hostname` indicating that
|
||||
* mbedtls_ssl_set_hostname() has been called with `NULL`.
|
||||
* If mbedtls_ssl_set_hostname() has never been called on `ssl`, then
|
||||
* `ssl->hostname == NULL`. */
|
||||
static const char *const ssl_hostname_skip_cn_verification = "";
|
||||
|
||||
#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
|
||||
/** Whether mbedtls_ssl_set_hostname() has been called.
|
||||
*
|
||||
* \param[in] ssl SSL context
|
||||
*
|
||||
* \return \c 1 if mbedtls_ssl_set_hostname() has been called on \p ssl
|
||||
* (including `mbedtls_ssl_set_hostname(ssl, NULL)`),
|
||||
* otherwise \c 0.
|
||||
*/
|
||||
static int mbedtls_ssl_has_set_hostname_been_called(
|
||||
const mbedtls_ssl_context *ssl)
|
||||
{
|
||||
return ssl->hostname != NULL;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Micro-optimization: don't export this function if it isn't needed outside
|
||||
* of this source file. */
|
||||
#if !defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
|
||||
static
|
||||
#endif
|
||||
const char *mbedtls_ssl_get_hostname_pointer(const mbedtls_ssl_context *ssl)
|
||||
{
|
||||
if (ssl->hostname == ssl_hostname_skip_cn_verification) {
|
||||
return NULL;
|
||||
}
|
||||
return ssl->hostname;
|
||||
}
|
||||
|
||||
static void mbedtls_ssl_free_hostname(mbedtls_ssl_context *ssl)
|
||||
{
|
||||
if (ssl->hostname != NULL &&
|
||||
ssl->hostname != ssl_hostname_skip_cn_verification) {
|
||||
mbedtls_zeroize_and_free(ssl->hostname, strlen(ssl->hostname));
|
||||
}
|
||||
ssl->hostname = NULL;
|
||||
}
|
||||
|
||||
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
|
||||
{
|
||||
/* Initialize to suppress unnecessary compiler warning */
|
||||
@ -2786,18 +2831,21 @@ int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
|
||||
|
||||
/* Now it's clear that we will overwrite the old hostname,
|
||||
* so we can free it safely */
|
||||
|
||||
if (ssl->hostname != NULL) {
|
||||
mbedtls_zeroize_and_free(ssl->hostname, strlen(ssl->hostname));
|
||||
}
|
||||
|
||||
/* Passing NULL as hostname shall clear the old one */
|
||||
mbedtls_ssl_free_hostname(ssl);
|
||||
|
||||
if (hostname == NULL) {
|
||||
ssl->hostname = NULL;
|
||||
/* Passing NULL as hostname clears the old one, but leaves a
|
||||
* special marker to indicate that mbedtls_ssl_set_hostname()
|
||||
* has been called. */
|
||||
/* ssl->hostname should be const, but isn't. We won't actually
|
||||
* write to the buffer, so it's ok to cast away the const. */
|
||||
ssl->hostname = (char *) ssl_hostname_skip_cn_verification;
|
||||
} else {
|
||||
ssl->hostname = mbedtls_calloc(1, hostname_len + 1);
|
||||
if (ssl->hostname == NULL) {
|
||||
/* mbedtls_ssl_set_hostname() has been called, but unsuccessfully.
|
||||
* Leave ssl->hostname in the same state as if the function had
|
||||
* not been called, i.e. a null pointer. */
|
||||
return MBEDTLS_ERR_SSL_ALLOC_FAILED;
|
||||
}
|
||||
|
||||
@ -5583,9 +5631,7 @@ void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
|
||||
}
|
||||
|
||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
||||
if (ssl->hostname != NULL) {
|
||||
mbedtls_zeroize_and_free(ssl->hostname, strlen(ssl->hostname));
|
||||
}
|
||||
mbedtls_ssl_free_hostname(ssl);
|
||||
#endif
|
||||
|
||||
#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
|
||||
@ -8323,6 +8369,7 @@ int mbedtls_ssl_write_finished(mbedtls_ssl_context *ssl)
|
||||
ret = ssl->handshake->calc_finished(ssl, ssl->out_msg + 4, ssl->conf->endpoint);
|
||||
if (ret != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "calc_finished", ret);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/*
|
||||
@ -8436,6 +8483,7 @@ int mbedtls_ssl_parse_finished(mbedtls_ssl_context *ssl)
|
||||
ret = ssl->handshake->calc_finished(ssl, buf, ssl->conf->endpoint ^ 1);
|
||||
if (ret != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "calc_finished", ret);
|
||||
return ret;
|
||||
}
|
||||
|
||||
if ((ret = mbedtls_ssl_read_record(ssl, 1)) != 0) {
|
||||
@ -9796,6 +9844,27 @@ int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int get_hostname_for_verification(mbedtls_ssl_context *ssl,
|
||||
const char **hostname)
|
||||
{
|
||||
if (!mbedtls_ssl_has_set_hostname_been_called(ssl)) {
|
||||
MBEDTLS_SSL_DEBUG_MSG(1, ("Certificate verification without having set hostname"));
|
||||
#if !defined(MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME)
|
||||
if (mbedtls_ssl_conf_get_endpoint(ssl->conf) == MBEDTLS_SSL_IS_CLIENT &&
|
||||
ssl->conf->authmode == MBEDTLS_SSL_VERIFY_REQUIRED) {
|
||||
return MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME;
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
*hostname = mbedtls_ssl_get_hostname_pointer(ssl);
|
||||
if (*hostname == NULL) {
|
||||
MBEDTLS_SSL_DEBUG_MSG(2, ("Certificate verification without CN verification"));
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int mbedtls_ssl_verify_certificate(mbedtls_ssl_context *ssl,
|
||||
int authmode,
|
||||
mbedtls_x509_crt *chain,
|
||||
@ -9821,7 +9890,13 @@ int mbedtls_ssl_verify_certificate(mbedtls_ssl_context *ssl,
|
||||
p_vrfy = ssl->conf->p_vrfy;
|
||||
}
|
||||
|
||||
int ret = 0;
|
||||
const char *hostname = "";
|
||||
int ret = get_hostname_for_verification(ssl, &hostname);
|
||||
if (ret != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "get_hostname_for_verification", ret);
|
||||
return ret;
|
||||
}
|
||||
|
||||
int have_ca_chain_or_callback = 0;
|
||||
#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
|
||||
if (ssl->conf->f_ca_cb != NULL) {
|
||||
@ -9834,7 +9909,7 @@ int mbedtls_ssl_verify_certificate(mbedtls_ssl_context *ssl,
|
||||
ssl->conf->f_ca_cb,
|
||||
ssl->conf->p_ca_cb,
|
||||
ssl->conf->cert_profile,
|
||||
ssl->hostname,
|
||||
hostname,
|
||||
&ssl->session_negotiate->verify_result,
|
||||
f_vrfy, p_vrfy);
|
||||
} else
|
||||
@ -9861,7 +9936,7 @@ int mbedtls_ssl_verify_certificate(mbedtls_ssl_context *ssl,
|
||||
chain,
|
||||
ca_chain, ca_crl,
|
||||
ssl->conf->cert_profile,
|
||||
ssl->hostname,
|
||||
hostname,
|
||||
&ssl->session_negotiate->verify_result,
|
||||
f_vrfy, p_vrfy, rs_ctx);
|
||||
}
|
||||
|
Reference in New Issue
Block a user