OpenVPN
ssl_mbedtls.c
Go to the documentation of this file.
1/*
2 * OpenVPN -- An application to securely tunnel IP networks
3 * over a single TCP/UDP port, with support for SSL/TLS-based
4 * session authentication and key exchange,
5 * packet encryption, packet authentication, and
6 * packet compression.
7 *
8 * Copyright (C) 2002-2026 OpenVPN Inc <sales@openvpn.net>
9 * Copyright (C) 2010-2026 Sentyron B.V. <openvpn@sentyron.com>
10 * Copyright (C) 2006-2010, Brainspark B.V.
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License version 2
14 * as published by the Free Software Foundation.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, see <https://www.gnu.org/licenses/>.
23 */
24
30#ifdef HAVE_CONFIG_H
31#include "config.h"
32#endif
33
34#include "syshead.h"
35
36#if defined(ENABLE_CRYPTO_MBEDTLS)
37
38#include "errlevel.h"
39#include "ssl_backend.h"
40#include "base64.h"
41#include "buffer.h"
42#include "misc.h"
43#include "manage.h"
44#include "mbedtls_compat.h"
45#include "pkcs11_backend.h"
46#include "ssl_common.h"
47#include "ssl_util.h"
48
49#include "ssl_verify_mbedtls.h"
50#include <mbedtls/debug.h>
51#include <mbedtls/error.h>
52#include <mbedtls/net_sockets.h>
53#include <mbedtls/version.h>
54
55#include <mbedtls/oid.h>
56#include <mbedtls/pem.h>
57
58static const mbedtls_x509_crt_profile openvpn_x509_crt_profile_legacy = {
59 /* Hashes from SHA-1 and above */
60 MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA1) | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_RIPEMD160)
61 | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA224) | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA256)
62 | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA384) | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA512),
63 0xFFFFFFF, /* Any PK alg */
64 0xFFFFFFF, /* Any curve */
65 1024, /* RSA-1024 and larger */
66};
67
68static const mbedtls_x509_crt_profile openvpn_x509_crt_profile_preferred = {
69 /* SHA-2 and above */
70 MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA224) | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA256)
71 | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA384) | MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA512),
72 0xFFFFFFF, /* Any PK alg */
73 0xFFFFFFF, /* Any curve */
74 2048, /* RSA-2048 and larger */
75};
76
77#define openvpn_x509_crt_profile_suiteb mbedtls_x509_crt_profile_suiteb;
78
79void
80tls_init_lib(void)
81{
83}
84
85void
86tls_free_lib(void)
87{
88}
89
90void
92{
93 ASSERT(NULL != ctx);
94 CLEAR(*ctx);
95
96#if MBEDTLS_VERSION_NUMBER < 0x04000000
97 ALLOC_OBJ_CLEAR(ctx->dhm_ctx, mbedtls_dhm_context);
98#endif
99
100 ALLOC_OBJ_CLEAR(ctx->ca_chain, mbedtls_x509_crt);
101
102 ctx->endpoint = MBEDTLS_SSL_IS_SERVER;
103 ctx->initialised = true;
104}
105
106void
108{
109 ASSERT(NULL != ctx);
110 CLEAR(*ctx);
111
112#if MBEDTLS_VERSION_NUMBER < 0x04000000
113 ALLOC_OBJ_CLEAR(ctx->dhm_ctx, mbedtls_dhm_context);
114#endif
115 ALLOC_OBJ_CLEAR(ctx->ca_chain, mbedtls_x509_crt);
116
117 ctx->endpoint = MBEDTLS_SSL_IS_CLIENT;
118 ctx->initialised = true;
119}
120
121void
122tls_ctx_free(struct tls_root_ctx *ctx)
123{
124 if (ctx)
125 {
126 mbedtls_pk_free(ctx->priv_key);
127 free(ctx->priv_key);
128
129 mbedtls_x509_crt_free(ctx->ca_chain);
130 free(ctx->ca_chain);
131
132 mbedtls_x509_crt_free(ctx->crt_chain);
133 free(ctx->crt_chain);
134
135#if MBEDTLS_VERSION_NUMBER < 0x04000000
136 mbedtls_dhm_free(ctx->dhm_ctx);
137 free(ctx->dhm_ctx);
138#endif
139
140 mbedtls_x509_crl_free(ctx->crl);
141 free(ctx->crl);
142
143#if defined(ENABLE_PKCS11)
144 /* ...freeCertificate() can handle NULL ptrs, but if pkcs11 helper
145 * has not been initialized, it will ASSERT() - so, do not pass NULL
146 */
147 if (ctx->pkcs11_cert)
148 {
149 pkcs11h_certificate_freeCertificate(ctx->pkcs11_cert);
150 }
151#endif
152
153 free(ctx->allowed_ciphers);
154
155 free(ctx->groups);
156
157 CLEAR(*ctx);
158
159 ctx->initialised = false;
160 }
161}
162
163bool
165{
166 /* either this should be NULL or should be non-null and then have a
167 * valid TLS ctx inside as well */
168 ASSERT(NULL == ctx || ctx->initialised);
169 return ctx != NULL;
170}
171#if !defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT)
172/*
173 * If we don't have mbedtls_ssl_export_keying_material(), we use
174 * mbedtls_ssl_set_export_keys_cb() to obtain a copy of the TLS 1.2
175 * master secret and compute the TLS-Exporter function ourselves.
176 * Unfortunately, with TLS 1.3, there is no alternative to
177 * mbedtls_ssl_export_keying_material().
178 */
179void
180mbedtls_ssl_export_keys_cb(void *p_expkey, mbedtls_ssl_key_export_type type,
181 const unsigned char *secret, size_t secret_len,
182 const unsigned char client_random[32],
183 const unsigned char server_random[32],
184 mbedtls_tls_prf_types tls_prf_type)
185{
186 /* Since we can't get the TLS 1.3 exporter master secret, we ignore all key
187 * types except MBEDTLS_SSL_KEY_EXPORT_TLS12_MASTER_SECRET. */
188 if (type != MBEDTLS_SSL_KEY_EXPORT_TLS12_MASTER_SECRET)
189 {
190 return;
191 }
192
193 struct tls_session *session = p_expkey;
194 struct key_state_ssl *ks_ssl = &session->key[KS_PRIMARY].ks_ssl;
195 struct tls_key_cache *cache = &ks_ssl->tls_key_cache;
196
197 /* The TLS 1.2 master secret has a fixed size, so if secret_len has
198 * a different value, something is wrong with mbed TLS. */
199 if (secret_len != sizeof(cache->master_secret))
200 {
201 msg(M_FATAL, "ERROR: Incorrect TLS 1.2 master secret length: Got %zu, expected %zu",
202 secret_len, sizeof(cache->master_secret));
203 }
204
205 memcpy(cache->client_server_random, client_random, 32);
206 memcpy(cache->client_server_random + 32, server_random, 32);
207 memcpy(cache->master_secret, secret, sizeof(cache->master_secret));
208 cache->tls_prf_type = tls_prf_type;
209}
210#endif /* !defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT) */
211
212
213bool
214key_state_export_keying_material(struct tls_session *session, const char *label, size_t label_size,
215 void *ekm, size_t ekm_size)
216{
217 ASSERT(strlen(label) == label_size);
218
219#if defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT)
220 /* Our version of mbed TLS has a built-in TLS-Exporter. */
221
222 mbedtls_ssl_context *ctx = session->key[KS_PRIMARY].ks_ssl.ctx;
223 if (mbed_ok(
224 mbedtls_ssl_export_keying_material(ctx, ekm, ekm_size, label, label_size, NULL, 0, 0)))
225 {
226 return true;
227 }
228 else
229 {
230 return false;
231 }
232
233#else /* defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT) */
234 struct tls_key_cache *cache = &session->key[KS_PRIMARY].ks_ssl.tls_key_cache;
235
236 /* If the type is NONE, we either have no cached secrets or
237 * there is no PRF, in both cases we cannot generate key material */
238 if (cache->tls_prf_type == MBEDTLS_SSL_TLS_PRF_NONE)
239 {
240 return false;
241 }
242
243 int ret = mbedtls_ssl_tls_prf(cache->tls_prf_type, cache->master_secret,
244 sizeof(cache->master_secret), label, cache->client_server_random,
245 sizeof(cache->client_server_random), ekm, ekm_size);
246
247 if (mbed_ok(ret))
248 {
249 return true;
250 }
251 else
252 {
253 secure_memzero(ekm, session->opt->ekm_size);
254 return false;
255 }
256#endif /* defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT) */
257}
258
259bool
260tls_ctx_set_options(struct tls_root_ctx *ctx, unsigned int ssl_flags)
261{
262 return true;
263}
264
265static const char *
266tls_translate_cipher_name(const char *cipher_name)
267{
268 const tls_cipher_name_pair *pair = tls_get_cipher_name_pair(cipher_name, strlen(cipher_name));
269
270 if (NULL == pair)
271 {
272 /* No translation found, return original */
273 return cipher_name;
274 }
275
276 if (0 != strcmp(cipher_name, pair->iana_name))
277 {
278 /* Deprecated name found, notify user */
279 msg(M_WARN, "Deprecated cipher suite name '%s', please use IANA name '%s'",
280 pair->openssl_name, pair->iana_name);
281 }
282
283 return pair->iana_name;
284}
285
286void
287tls_ctx_restrict_ciphers_tls13(struct tls_root_ctx *ctx, const char *ciphers)
288{
289 if (ciphers == NULL)
290 {
291 /* Nothing to do, return without warning message */
292 return;
293 }
294
295 msg(M_WARN,
296 "mbed TLS does not support setting tls-ciphersuites. "
297 "Ignoring TLS 1.3 cipher list: %s",
298 ciphers);
299}
300
301void
302tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers)
303{
304 char *tmp_ciphers, *tmp_ciphers_orig, *token;
305
306 if (NULL == ciphers)
307 {
308 return; /* Nothing to do */
309 }
310
311 ASSERT(NULL != ctx);
312
313 /* Get number of ciphers */
314 int cipher_count = get_num_elements(ciphers, ':');
315
316 /* Allocate an array for them */
317 ALLOC_ARRAY_CLEAR(ctx->allowed_ciphers, int, cipher_count + 1)
318
319 /* Parse allowed ciphers, getting IDs */
320 int i = 0;
321 tmp_ciphers_orig = tmp_ciphers = string_alloc(ciphers, NULL);
322
323 token = strtok(tmp_ciphers, ":");
324 while (token)
325 {
326 ctx->allowed_ciphers[i] = mbedtls_ssl_get_ciphersuite_id(tls_translate_cipher_name(token));
327 if (0 != ctx->allowed_ciphers[i])
328 {
329 i++;
330 }
331 token = strtok(NULL, ":");
332 }
333 free(tmp_ciphers_orig);
334}
335
336void
337tls_ctx_set_cert_profile(struct tls_root_ctx *ctx, const char *profile)
338{
339 if (!profile || 0 == strcmp(profile, "legacy") || 0 == strcmp(profile, "insecure"))
340 {
341 ctx->cert_profile = openvpn_x509_crt_profile_legacy;
342 }
343 else if (0 == strcmp(profile, "preferred"))
344 {
345 ctx->cert_profile = openvpn_x509_crt_profile_preferred;
346 }
347 else if (0 == strcmp(profile, "suiteb"))
348 {
349 ctx->cert_profile = openvpn_x509_crt_profile_suiteb;
350 }
351 else
352 {
353 msg(M_FATAL, "ERROR: Invalid cert profile: %s", profile);
354 }
355}
356
357#if MBEDTLS_VERSION_NUMBER >= 0x04000000
358static const mbedtls_ecp_curve_info ecp_curve_info_table[] = {
359/* secp curves. */
360#if defined(PSA_WANT_ECC_SECP_R1_256)
361 { "secp256r1", MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 },
362#endif
363#if defined(PSA_WANT_ECC_SECP_R1_384)
364 { "secp384r1", MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 },
365#endif
366#if defined(PSA_WANT_ECC_SECP_R1_521)
367 { "secp521r1", MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 },
368#endif
369
370/* Curve25519. */
371#if defined(PSA_WANT_ECC_MONTGOMERY_255)
372 { "X25519", MBEDTLS_SSL_IANA_TLS_GROUP_X25519 },
373#endif
374
375/* Curve448. */
376#if defined(PSA_WANT_ECC_MONTGOMERY_448)
377 { "X448", MBEDTLS_SSL_IANA_TLS_GROUP_X448 },
378#endif
379
380/* Brainpool curves. */
381#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
382 { "brainpoolP256r1", MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 },
383#endif
384#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
385 { "brainpoolP384r1", MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 },
386#endif
387#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
388 { "brainpoolP512r1", MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 },
389#endif
390
391/* Named Diffie-Hellman groups. */
392#if defined(PSA_WANT_DH_RFC7919_2048)
393 { "ffdhe2048", MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 },
394#endif
395#if defined(PSA_WANT_DH_RFC7919_3072)
396 { "ffdhe3072", MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 },
397#endif
398#if defined(PSA_WANT_DH_RFC7919_4096)
399 { "ffdhe4096", MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 },
400#endif
401#if defined(PSA_WANT_DH_RFC7919_6144)
402 { "ffdhe6144", MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 },
403#endif
404#if defined(PSA_WANT_DH_RFC7919_8192)
405 { "ffdhe8192", MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 },
406#endif
407};
408static const size_t ecp_curve_info_table_items = sizeof(ecp_curve_info_table) / sizeof(mbedtls_ecp_curve_info);
409
410static const mbedtls_ecp_curve_info *
411mbedtls_ecp_curve_info_from_name(const char *name)
412{
413 for (size_t i = 0; i < ecp_curve_info_table_items; i++)
414 {
415 if (strcmp(name, ecp_curve_info_table[i].name) == 0)
416 {
417 return &ecp_curve_info_table[i];
418 }
419 }
420 return NULL;
421}
422#endif /* MBEDTLS_VERSION_NUMBER >= 0x04000000 */
423
424void
425tls_ctx_set_tls_groups(struct tls_root_ctx *ctx, const char *groups)
426{
427 ASSERT(ctx);
428 struct gc_arena gc = gc_new();
429
430 /* Get number of groups and allocate an array in ctx */
431 int groups_count = get_num_elements(groups, ':');
432 ALLOC_ARRAY_CLEAR(ctx->groups, uint16_t, groups_count + 1)
433
434 /* Parse allowed ciphers, getting IDs */
435 int i = 0;
436 char *tmp_groups = string_alloc(groups, &gc);
437
438 const char *token;
439 while ((token = strsep(&tmp_groups, ":")))
440 {
441 const mbedtls_ecp_curve_info *ci = mbedtls_ecp_curve_info_from_name(token);
442 if (!ci)
443 {
444 msg(M_WARN, "Warning unknown curve/group specified: %s", token);
445 }
446 else
447 {
448 ctx->groups[i] = ci->tls_id;
449 i++;
450 }
451 }
452
453 /* Check if any groups were valid. */
454 if (i == 0)
455 {
456 msg(M_FATAL, "Error: All groups in \"%s\" are invalid or unsupported.", groups);
457 }
458
459 /* Recent mbedtls versions state that the list of groups must be terminated
460 * with 0. Older versions state that it must be terminated with MBEDTLS_ECP_DP_NONE
461 * which is also 0, so this works either way. */
462 ctx->groups[i] = 0;
463
464 gc_free(&gc);
465}
466
467
468void
469tls_ctx_check_cert_time(const struct tls_root_ctx *ctx)
470{
471 ASSERT(ctx);
472 if (ctx->crt_chain == NULL)
473 {
474 return; /* Nothing to check if there is no certificate */
475 }
476
477 if (mbedtls_x509_time_is_future(&ctx->crt_chain->valid_from))
478 {
479 msg(M_WARN, "WARNING: Your certificate is not yet valid!");
480 }
481
482 if (mbedtls_x509_time_is_past(&ctx->crt_chain->valid_to))
483 {
484 msg(M_WARN, "WARNING: Your certificate has expired!");
485 }
486}
487
488void
489tls_ctx_load_dh_params(struct tls_root_ctx *ctx, const char *dh_file, bool dh_inline)
490{
491#if MBEDTLS_VERSION_NUMBER < 0x04000000
492 if (dh_inline)
493 {
494 if (!mbed_ok(mbedtls_dhm_parse_dhm(ctx->dhm_ctx, (const unsigned char *)dh_file,
495 strlen(dh_file) + 1)))
496 {
497 msg(M_FATAL, "Cannot read inline DH parameters");
498 }
499 }
500 else
501 {
502 if (!mbed_ok(mbedtls_dhm_parse_dhmfile(ctx->dhm_ctx, dh_file)))
503 {
504 msg(M_FATAL, "Cannot read DH parameters from file %s", dh_file);
505 }
506 }
507
508 msg(D_TLS_DEBUG_LOW, "Diffie-Hellman initialized with " counter_format " bit key",
509 (counter_type)mbedtls_dhm_get_bitlen(ctx->dhm_ctx));
510#else
511 if (strcmp(dh_file, "none") != 0)
512 {
513 msg(M_FATAL, "Mbed TLS 4 only supports pre-defined Diffie-Hellman groups.");
514 }
515#endif /* MBEDTLS_VERSION_NUMBER < 0x04000000 */
516}
517
518void
519tls_ctx_load_ecdh_params(struct tls_root_ctx *ctx, const char *curve_name)
520{
521 if (NULL != curve_name)
522 {
523 msg(M_WARN, "WARNING: mbed TLS builds do not support specifying an "
524 "ECDH curve with --ecdh-curve, using default curves. Use "
525 "--tls-groups to specify curves.");
526 }
527}
528
529int
530tls_ctx_load_pkcs12(struct tls_root_ctx *ctx, const char *pkcs12_file, bool pkcs12_file_inline,
531 bool load_ca_file)
532{
533 msg(M_FATAL, "PKCS #12 files not yet supported for mbed TLS.");
534 return 0;
535}
536
537#ifdef ENABLE_CRYPTOAPI
538void
539tls_ctx_load_cryptoapi(struct tls_root_ctx *ctx, const char *cryptoapi_cert)
540{
541 msg(M_FATAL, "Windows CryptoAPI not yet supported for mbed TLS.");
542}
543#endif /* _WIN32 */
544
545void
546tls_ctx_load_cert_file(struct tls_root_ctx *ctx, const char *cert_file, bool cert_inline)
547{
548 ASSERT(NULL != ctx);
549
550 if (!ctx->crt_chain)
551 {
552 ALLOC_OBJ_CLEAR(ctx->crt_chain, mbedtls_x509_crt);
553 }
554
555 if (cert_inline)
556 {
557 if (!cert_file)
558 {
559 msg(M_FATAL, "Cannot load inline certificate: NULL");
560 }
561 if (!mbed_ok(mbedtls_x509_crt_parse(ctx->crt_chain, (const unsigned char *)cert_file,
562 strlen(cert_file) + 1)))
563 {
564 msg(M_FATAL, "Cannot load inline certificate");
565 }
566 }
567 else
568 {
569 if (!mbed_ok(mbedtls_x509_crt_parse_file(ctx->crt_chain, cert_file)))
570 {
571 msg(M_FATAL, "Cannot load certificate file %s", cert_file);
572 }
573 }
574}
575
576int
577tls_ctx_load_priv_file(struct tls_root_ctx *ctx, const char *priv_key_file, bool priv_key_inline)
578{
579 int status;
580 ASSERT(NULL != ctx);
581
582 if (!ctx->priv_key)
583 {
584 ALLOC_OBJ_CLEAR(ctx->priv_key, mbedtls_pk_context);
585 }
586
587 if (priv_key_inline)
588 {
589 status = mbedtls_compat_pk_parse_key(ctx->priv_key, (const unsigned char *)priv_key_file,
590 strlen(priv_key_file) + 1, NULL, 0);
591
592 if (MBEDTLS_ERR_PK_PASSWORD_REQUIRED == status)
593 {
594 char passbuf[512] = { 0 };
595 pem_password_callback(passbuf, 512, 0, NULL);
597 ctx->priv_key, (const unsigned char *)priv_key_file, strlen(priv_key_file) + 1,
598 (unsigned char *)passbuf, strlen(passbuf));
599 }
600 }
601 else
602 {
603 status = mbedtls_compat_pk_parse_keyfile(ctx->priv_key, priv_key_file, NULL);
604 if (MBEDTLS_ERR_PK_PASSWORD_REQUIRED == status)
605 {
606 char passbuf[512] = { 0 };
607 pem_password_callback(passbuf, 512, 0, NULL);
609 }
610 }
611 if (!mbed_ok(status))
612 {
613#ifdef ENABLE_MANAGEMENT
614 if (management && (MBEDTLS_ERR_PK_PASSWORD_MISMATCH == status))
615 {
617 }
618#endif
619 msg(M_WARN, "Cannot load private key file %s",
620 print_key_filename(priv_key_file, priv_key_inline));
621 return 1;
622 }
623
625 {
626 msg(M_WARN, "Private key does not match the certificate");
627 return 1;
628 }
629
630 return 0;
631}
632
633#if MBEDTLS_VERSION_NUMBER < 0x04000000
652static inline int
653external_pkcs1_sign(void *ctx_voidptr, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
654 mbedtls_md_type_t md_alg, unsigned int hashlen, const unsigned char *hash,
655 unsigned char *sig)
656{
657 struct external_context *const ctx = ctx_voidptr;
658 int rv;
659 size_t asn_len = 0, oid_size = 0;
660 const char *oid = NULL;
661
662 if (NULL == ctx)
663 {
664 return MBEDTLS_ERR_RSA_BAD_INPUT_DATA;
665 }
666
667 /*
668 * Support a wide range of hashes. TLSv1.1 and before only need SIG_RSA_RAW,
669 * but TLSv1.2 needs the full suite of hashes.
670 *
671 * This code has been taken from mbed TLS pkcs11_sign(), under the GPLv2.0+.
672 */
673 if (md_alg != MBEDTLS_MD_NONE)
674 {
675 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(md_alg);
676 if (md_info == NULL)
677 {
678 return (MBEDTLS_ERR_RSA_BAD_INPUT_DATA);
679 }
680
681 if (!mbed_ok(mbedtls_oid_get_oid_by_md(md_alg, &oid, &oid_size)))
682 {
683 return (MBEDTLS_ERR_RSA_BAD_INPUT_DATA);
684 }
685
686 hashlen = mbedtls_md_get_size(md_info);
687 asn_len = 10 + oid_size;
688 }
689
690 if (ctx->signature_length < (asn_len + hashlen)
691 || (asn_len + hashlen) > UINT8_MAX)
692 {
693 return MBEDTLS_ERR_RSA_BAD_INPUT_DATA;
694 }
695
696 uint8_t *to_sign = NULL;
697 ALLOC_ARRAY_CLEAR(to_sign, uint8_t, asn_len + hashlen);
698 uint8_t *p = to_sign;
699 if (md_alg != MBEDTLS_MD_NONE)
700 {
701 /*
702 * DigestInfo ::= SEQUENCE {
703 * digestAlgorithm DigestAlgorithmIdentifier,
704 * digest Digest }
705 *
706 * DigestAlgorithmIdentifier ::= AlgorithmIdentifier
707 *
708 * Digest ::= OCTET STRING
709 */
710 *p++ = MBEDTLS_ASN1_SEQUENCE | MBEDTLS_ASN1_CONSTRUCTED;
711 *p++ = (uint8_t)(0x08 + oid_size + hashlen);
712 *p++ = MBEDTLS_ASN1_SEQUENCE | MBEDTLS_ASN1_CONSTRUCTED;
713 *p++ = (uint8_t)(0x04 + oid_size);
714 *p++ = MBEDTLS_ASN1_OID;
715 *p++ = (uint8_t)oid_size;
716 memcpy(p, oid, oid_size);
717 p += oid_size;
718 *p++ = MBEDTLS_ASN1_NULL;
719 *p++ = 0x00;
720 *p++ = MBEDTLS_ASN1_OCTET_STRING;
721 *p++ = (uint8_t)hashlen;
722
723 /* Double-check ASN length */
724 ASSERT(asn_len == (uintptr_t)(p - to_sign));
725 }
726
727 /* Copy the hash to be signed */
728 memcpy(p, hash, hashlen);
729
730 /* Call external signature function */
731 if (!ctx->sign(ctx->sign_ctx, to_sign, asn_len + hashlen, sig, ctx->signature_length))
732 {
733 rv = MBEDTLS_ERR_RSA_PRIVATE_FAILED;
734 goto done;
735 }
736
737 rv = 0;
738
739done:
740 free(to_sign);
741 return rv;
742}
743
744static inline size_t
745external_key_len(void *vctx)
746{
747 struct external_context *const ctx = vctx;
748
749 return ctx->signature_length;
750}
751#endif /* MBEDTLS_VERSION_NUMBER < 0x04000000 */
752
753int
755 void *sign_ctx)
756{
757#if MBEDTLS_VERSION_NUMBER >= 0x04000000
758 msg(M_WARN, "tls_ctx_use_external_signing_func is not implemented for Mbed TLS 4.");
759 return 1;
760#else
761 ASSERT(NULL != ctx);
762
763 if (ctx->crt_chain == NULL)
764 {
765 msg(M_WARN, "ERROR: external key requires a certificate.");
766 return 1;
767 }
768
769 if (mbedtls_pk_get_type(&ctx->crt_chain->pk) != MBEDTLS_PK_RSA)
770 {
771 msg(M_WARN, "ERROR: external key with mbed TLS requires a "
772 "certificate with an RSA key.");
773 return 1;
774 }
775
776 ctx->external_key.signature_length = mbedtls_pk_get_len(&ctx->crt_chain->pk);
777 ctx->external_key.sign = sign_func;
779
780 ALLOC_OBJ_CLEAR(ctx->priv_key, mbedtls_pk_context);
781 if (!mbed_ok(mbedtls_pk_setup_rsa_alt(ctx->priv_key, &ctx->external_key, NULL,
782 external_pkcs1_sign, external_key_len)))
783 {
784 return 1;
785 }
786
787 return 0;
788#endif /* MBEDTLS_VERSION_NUMBER >= 0x04000000 */
789}
790
791#ifdef ENABLE_MANAGEMENT
793static bool
794management_sign_func(void *sign_ctx, const void *src, size_t src_len, void *dst, size_t dst_len)
795{
796 bool ret = false;
797 char *src_b64 = NULL;
798 char *dst_b64 = NULL;
799
800 if (!management || (openvpn_base64_encode(src, (int)src_len, &src_b64) <= 0))
801 {
802 goto cleanup;
803 }
804
805 /*
806 * We only support RSA external keys and PKCS1 signatures at the moment
807 * in mbed TLS, so the signature parameter is hardcoded to this encoding
808 */
809 if (!(dst_b64 = management_query_pk_sig(management, src_b64, "RSA_PKCS1_PADDING")))
810 {
811 goto cleanup;
812 }
813
814 if (openvpn_base64_decode(dst_b64, dst, (int)dst_len) != (int)dst_len)
815 {
816 goto cleanup;
817 }
818
819 ret = true;
820cleanup:
821 free(src_b64);
822 free(dst_b64);
823
824 return ret;
825}
826
827int
829{
830 return tls_ctx_use_external_signing_func(ctx, management_sign_func, NULL);
831}
832
833#endif /* ifdef ENABLE_MANAGEMENT */
834
835void
836tls_ctx_load_ca(struct tls_root_ctx *ctx, const char *ca_file, bool ca_inline, const char *ca_path,
837 bool tls_server)
838{
839 if (ca_path)
840 {
841 msg(M_FATAL, "ERROR: mbed TLS cannot handle the capath directive");
842 }
843
844 if (ca_file && ca_inline)
845 {
846 if (!mbed_ok(mbedtls_x509_crt_parse(ctx->ca_chain, (const unsigned char *)ca_file,
847 strlen(ca_file) + 1)))
848 {
849 msg(M_FATAL, "Cannot load inline CA certificates");
850 }
851 }
852 else
853 {
854 /* Load CA file for verifying peer supplied certificate */
855 if (!mbed_ok(mbedtls_x509_crt_parse_file(ctx->ca_chain, ca_file)))
856 {
857 msg(M_FATAL, "Cannot load CA certificate file %s", ca_file);
858 }
859 }
860}
861
862void
863tls_ctx_load_extra_certs(struct tls_root_ctx *ctx, const char *extra_certs_file,
864 bool extra_certs_inline)
865{
866 ASSERT(NULL != ctx);
867
868 if (!ctx->crt_chain)
869 {
870 ALLOC_OBJ_CLEAR(ctx->crt_chain, mbedtls_x509_crt);
871 }
872
873 if (extra_certs_inline)
874 {
875 if (!mbed_ok(mbedtls_x509_crt_parse(ctx->crt_chain, (const unsigned char *)extra_certs_file,
876 strlen(extra_certs_file) + 1)))
877 {
878 msg(M_FATAL, "Cannot load inline extra-certs file");
879 }
880 }
881 else
882 {
883 if (!mbed_ok(mbedtls_x509_crt_parse_file(ctx->crt_chain, extra_certs_file)))
884 {
885 msg(M_FATAL, "Cannot load extra-certs file: %s", extra_certs_file);
886 }
887 }
888}
889
890/* **************************************
891 *
892 * Key-state specific functions
893 *
894 ***************************************/
895
896/*
897 * "Endless buffer"
898 */
899
900static inline void
901buf_free_entry(buffer_entry *entry)
902{
903 if (NULL != entry)
904 {
905 free(entry->data);
906 free(entry);
907 }
908}
909
910static void
911buf_free_entries(endless_buffer *buf)
912{
913 while (buf->first_block)
914 {
915 buffer_entry *cur_block = buf->first_block;
916 buf->first_block = cur_block->next_block;
917 buf_free_entry(cur_block);
918 }
919 buf->last_block = NULL;
920}
921
922static int
923endless_buf_read(endless_buffer *in, unsigned char *out, size_t out_len)
924{
925 size_t read_len = 0;
926
927 ASSERT(out_len <= INT_MAX);
928
929 if (in->first_block == NULL)
930 {
931 return MBEDTLS_ERR_SSL_WANT_READ;
932 }
933
934 while (in->first_block != NULL && read_len < out_len)
935 {
936 size_t block_len = in->first_block->length - in->data_start;
937 if (block_len <= out_len - read_len)
938 {
939 buffer_entry *cur_entry = in->first_block;
940 memcpy(out + read_len, cur_entry->data + in->data_start, block_len);
941
942 read_len += block_len;
943
944 in->first_block = cur_entry->next_block;
945 in->data_start = 0;
946
947 if (in->first_block == NULL)
948 {
949 in->last_block = NULL;
950 }
951
952 buf_free_entry(cur_entry);
953 }
954 else
955 {
956 memcpy(out + read_len, in->first_block->data + in->data_start, out_len - read_len);
957 in->data_start += out_len - read_len;
958 read_len = out_len;
959 }
960 }
961
962 return (int)read_len;
963}
964
965static int
966endless_buf_write(endless_buffer *out, const unsigned char *in, size_t len)
967{
968 buffer_entry *new_block = malloc(sizeof(buffer_entry));
969 if (NULL == new_block)
970 {
971 return MBEDTLS_ERR_NET_SEND_FAILED;
972 }
973
974 new_block->data = malloc(len);
975 if (NULL == new_block->data)
976 {
977 free(new_block);
978 return MBEDTLS_ERR_NET_SEND_FAILED;
979 }
980
981 ASSERT(len <= INT_MAX);
982
983 new_block->length = len;
984 new_block->next_block = NULL;
985
986 memcpy(new_block->data, in, len);
987
988 if (NULL == out->first_block)
989 {
990 out->first_block = new_block;
991 }
992
993 if (NULL != out->last_block)
994 {
995 out->last_block->next_block = new_block;
996 }
997
998 out->last_block = new_block;
999
1000 return (int)len;
1001}
1002
1003static int
1004ssl_bio_read(void *ctx, unsigned char *out, size_t out_len)
1005{
1006 bio_ctx *my_ctx = (bio_ctx *)ctx;
1007 return endless_buf_read(&my_ctx->in, out, out_len);
1008}
1009
1010static int
1011ssl_bio_write(void *ctx, const unsigned char *in, size_t in_len)
1012{
1013 bio_ctx *my_ctx = (bio_ctx *)ctx;
1014 return endless_buf_write(&my_ctx->out, in, in_len);
1015}
1016
1017static void
1018my_debug(void *ctx, int level, const char *file, int line, const char *str)
1019{
1020 msglvl_t my_loglevel = (level < 3) ? D_TLS_DEBUG_MED : D_TLS_DEBUG;
1021 msg(my_loglevel, "mbed TLS msg (%s:%d): %s", file, line, str);
1022}
1023
1024/*
1025 * Further personalise the RNG using a hash of the public key
1026 */
1027void
1028tls_ctx_personalise_random(struct tls_root_ctx *ctx)
1029{
1030#if MBEDTLS_VERSION_NUMBER < 0x04000000
1031 static char old_sha256_hash[32] = { 0 };
1032 unsigned char sha256_hash[32] = { 0 };
1033 mbedtls_ctr_drbg_context *cd_ctx = rand_ctx_get();
1034
1035 if (NULL != ctx->crt_chain)
1036 {
1037 mbedtls_x509_crt *cert = ctx->crt_chain;
1038 const mbedtls_md_info_t *kt = md_get("SHA256");
1039
1040 if (0 != mbedtls_md(kt, cert->tbs.p, cert->tbs.len, sha256_hash))
1041 {
1042 msg(M_WARN, "WARNING: failed to personalise random");
1043 }
1044
1045 if (0 != memcmp(old_sha256_hash, sha256_hash, sizeof(sha256_hash)))
1046 {
1047 if (!mbed_ok(mbedtls_ctr_drbg_update(cd_ctx, sha256_hash, 32)))
1048 {
1049 msg(M_WARN, "WARNING: failed to personalise random, could not update CTR_DRBG");
1050 }
1051 memcpy(old_sha256_hash, sha256_hash, sizeof(old_sha256_hash));
1052 }
1053 }
1054#endif /* MBEDTLS_VERSION_NUMBER < 0x040000 */
1055}
1056
1057int
1058tls_version_max(void)
1059{
1060 /* We need mbedtls_ssl_export_keying_material() to support TLS 1.3. */
1061#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT)
1062 return TLS_VER_1_3;
1063#elif defined(MBEDTLS_SSL_PROTO_TLS1_2)
1064 return TLS_VER_1_2;
1065#else
1066#error mbedtls is compiled without support for TLS 1.2 or 1.3
1067#endif
1068}
1069
1077mbedtls_ssl_protocol_version
1078tls_version_to_ssl_version(int tls_ver)
1079{
1080 switch (tls_ver)
1081 {
1082#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
1083 case TLS_VER_1_2:
1084 return MBEDTLS_SSL_VERSION_TLS1_2;
1085#endif
1086
1087#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1088 case TLS_VER_1_3:
1089 return MBEDTLS_SSL_VERSION_TLS1_3;
1090#endif
1091
1092 default:
1093 msg(M_FATAL, "%s: invalid or unsupported TLS version %d", __func__, tls_ver);
1094 return MBEDTLS_SSL_VERSION_UNKNOWN;
1095 }
1096}
1097
1098void
1099backend_tls_ctx_reload_crl(struct tls_root_ctx *ctx, const char *crl_file, bool crl_inline)
1100{
1101 ASSERT(crl_file);
1102
1103 if (ctx->crl == NULL)
1104 {
1105 ALLOC_OBJ_CLEAR(ctx->crl, mbedtls_x509_crl);
1106 }
1107 mbedtls_x509_crl_free(ctx->crl);
1108
1109 if (crl_inline)
1110 {
1111 if (!mbed_ok(mbedtls_x509_crl_parse(ctx->crl, (const unsigned char *)crl_file,
1112 strlen(crl_file) + 1)))
1113 {
1114 msg(M_WARN, "CRL: cannot parse inline CRL");
1115 goto err;
1116 }
1117 }
1118 else
1119 {
1120 if (!mbed_ok(mbedtls_x509_crl_parse_file(ctx->crl, crl_file)))
1121 {
1122 msg(M_WARN, "CRL: cannot read CRL from file %s", crl_file);
1123 goto err;
1124 }
1125 }
1126 return;
1127
1128err:
1129 mbedtls_x509_crl_free(ctx->crl);
1130}
1131
1132void
1133key_state_ssl_init(struct key_state_ssl *ks_ssl, const struct tls_root_ctx *ssl_ctx, bool is_server,
1134 struct tls_session *session)
1135{
1136 ASSERT(NULL != ssl_ctx);
1137 ASSERT(ks_ssl);
1138 CLEAR(*ks_ssl);
1139
1140 /* Initialise SSL config */
1141 ALLOC_OBJ_CLEAR(ks_ssl->ssl_config, mbedtls_ssl_config);
1142 mbedtls_ssl_config_init(ks_ssl->ssl_config);
1143 mbedtls_ssl_config_defaults(ks_ssl->ssl_config, ssl_ctx->endpoint, MBEDTLS_SSL_TRANSPORT_STREAM,
1144 MBEDTLS_SSL_PRESET_DEFAULT);
1145#ifdef MBEDTLS_DEBUG_C
1146 /* We only want to have mbed TLS generate debug level logging when we would
1147 * also display it.
1148 * In fact mbed TLS 2.25.0 crashes generating debug log if Curve25591 is
1149 * selected for DH (https://github.com/ARMmbed/mbedtls/issues/4208) */
1150 if (session->opt->ssl_flags & SSLF_TLS_DEBUG_ENABLED)
1151 {
1152 mbedtls_debug_set_threshold(3);
1153 }
1154 else
1155 {
1156 mbedtls_debug_set_threshold(2);
1157 }
1158#endif
1159 mbedtls_ssl_conf_dbg(ks_ssl->ssl_config, my_debug, NULL);
1160#if MBEDTLS_VERSION_NUMBER < 0x04000000
1161 mbedtls_ssl_conf_rng(ks_ssl->ssl_config, mbedtls_ctr_drbg_random, rand_ctx_get());
1162#endif /* MBEDTLS_VERSION_NUMBER < 0x04000000 */
1163
1164 mbedtls_ssl_conf_cert_profile(ks_ssl->ssl_config, &ssl_ctx->cert_profile);
1165
1166 if (ssl_ctx->allowed_ciphers)
1167 {
1168 mbedtls_ssl_conf_ciphersuites(ks_ssl->ssl_config, ssl_ctx->allowed_ciphers);
1169 }
1170
1171 if (ssl_ctx->groups)
1172 {
1173 mbedtls_ssl_conf_groups(ks_ssl->ssl_config, ssl_ctx->groups);
1174 }
1175
1176 /* Disable TLS renegotiations if the mbedtls library supports that feature.
1177 * OpenVPN's renegotiation creates new SSL sessions and does not depend on
1178 * this feature and TLS renegotiations have been problematic in the past. */
1179#if defined(MBEDTLS_SSL_RENEGOTIATION)
1180 mbedtls_ssl_conf_renegotiation(ks_ssl->ssl_config, MBEDTLS_SSL_RENEGOTIATION_DISABLED);
1181#endif /* MBEDTLS_SSL_RENEGOTIATION */
1182
1183 /* Disable record splitting (for now). OpenVPN assumes records are sent
1184 * unfragmented, and changing that will require thorough review and
1185 * testing. Since OpenVPN is not susceptible to BEAST, we can just
1186 * disable record splitting as a quick fix. */
1187#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1188 mbedtls_ssl_conf_cbc_record_splitting(ks_ssl->ssl_config,
1189 MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED);
1190#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
1191
1192 /* Initialise authentication information */
1193#if MBEDTLS_VERSION_NUMBER < 0x04000000
1194 if (is_server)
1195 {
1196 mbed_ok(mbedtls_ssl_conf_dh_param_ctx(ks_ssl->ssl_config, ssl_ctx->dhm_ctx));
1197 }
1198#endif
1199
1200 (void)mbed_ok(mbedtls_ssl_conf_own_cert(ks_ssl->ssl_config, ssl_ctx->crt_chain, ssl_ctx->priv_key));
1201
1202 /* Initialise SSL verification */
1203 if (session->opt->ssl_flags & SSLF_CLIENT_CERT_OPTIONAL)
1204 {
1205 mbedtls_ssl_conf_authmode(ks_ssl->ssl_config, MBEDTLS_SSL_VERIFY_OPTIONAL);
1206 }
1207 else if (!(session->opt->ssl_flags & SSLF_CLIENT_CERT_NOT_REQUIRED))
1208 {
1209 mbedtls_ssl_conf_authmode(ks_ssl->ssl_config, MBEDTLS_SSL_VERIFY_REQUIRED);
1210 }
1211 mbedtls_ssl_conf_verify(ks_ssl->ssl_config, verify_callback, session);
1212
1213 /* TODO: mbed TLS does not currently support sending the CA chain to the client */
1214 mbedtls_ssl_conf_ca_chain(ks_ssl->ssl_config, ssl_ctx->ca_chain, ssl_ctx->crl);
1215
1216 /* Initialize minimum TLS version */
1217 {
1218 const int configured_tls_version_min =
1220
1221 /* default to TLS 1.2 */
1222 mbedtls_ssl_protocol_version version = MBEDTLS_SSL_VERSION_TLS1_2;
1223
1224 if (configured_tls_version_min > TLS_VER_UNSPEC)
1225 {
1226 version = tls_version_to_ssl_version(configured_tls_version_min);
1227 }
1228
1229 mbedtls_ssl_conf_min_tls_version(ks_ssl->ssl_config, version);
1230 }
1231
1232 /* Initialize maximum TLS version */
1233 {
1234 const int configured_tls_version_max =
1236
1237 mbedtls_ssl_protocol_version version = MBEDTLS_SSL_VERSION_UNKNOWN;
1238
1239 if (configured_tls_version_max > TLS_VER_UNSPEC)
1240 {
1241 version = tls_version_to_ssl_version(configured_tls_version_max);
1242 }
1243 else
1244 {
1245 /* Default to tls_version_max(). */
1246 version = tls_version_to_ssl_version(tls_version_max());
1247 }
1248
1249 mbedtls_ssl_conf_max_tls_version(ks_ssl->ssl_config, version);
1250 }
1251
1252 /* Initialise SSL context */
1253 ALLOC_OBJ_CLEAR(ks_ssl->ctx, mbedtls_ssl_context);
1254 mbedtls_ssl_init(ks_ssl->ctx);
1255 (void)mbed_ok(mbedtls_ssl_setup(ks_ssl->ctx, ks_ssl->ssl_config));
1256 /* We do verification in our own callback depending on the
1257 * exact configuration. We do not rely on the default hostname
1258 * verification. */
1259 ASSERT(mbed_ok(mbedtls_ssl_set_hostname(ks_ssl->ctx, NULL)));
1260
1261#if !defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT)
1262 /* Initialize the keying material exporter callback. */
1263 mbedtls_ssl_set_export_keys_cb(ks_ssl->ctx, mbedtls_ssl_export_keys_cb, session);
1264#endif
1265
1266 /* Initialise BIOs */
1268 mbedtls_ssl_set_bio(ks_ssl->ctx, ks_ssl->bio_ctx, ssl_bio_write, ssl_bio_read, NULL);
1269}
1270
1271
1272void
1274{
1275 mbedtls_ssl_send_alert_message(ks_ssl->ctx, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
1276 MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY);
1277}
1278
1279void
1280key_state_ssl_free(struct key_state_ssl *ks_ssl)
1281{
1282 if (ks_ssl)
1283 {
1284 CLEAR(ks_ssl->tls_key_cache);
1285
1286 if (ks_ssl->ctx)
1287 {
1288 mbedtls_ssl_free(ks_ssl->ctx);
1289 free(ks_ssl->ctx);
1290 }
1291 if (ks_ssl->ssl_config)
1292 {
1293 mbedtls_ssl_config_free(ks_ssl->ssl_config);
1294 free(ks_ssl->ssl_config);
1295 }
1296 if (ks_ssl->bio_ctx)
1297 {
1298 buf_free_entries(&ks_ssl->bio_ctx->in);
1299 buf_free_entries(&ks_ssl->bio_ctx->out);
1300 free(ks_ssl->bio_ctx);
1301 }
1302 CLEAR(*ks_ssl);
1303 }
1304}
1305
1306int
1307key_state_write_plaintext(struct key_state_ssl *ks, struct buffer *buf)
1308{
1309 int retval = 0;
1310
1311 ASSERT(buf);
1312
1313 retval = key_state_write_plaintext_const(ks, BPTR(buf), BLEN(buf));
1314
1315 if (1 == retval)
1316 {
1317 memset(BPTR(buf), 0, BLEN(buf)); /* erase data just written */
1318 buf->len = 0;
1319 }
1320
1321 return retval;
1322}
1323
1324int
1325key_state_write_plaintext_const(struct key_state_ssl *ks, const uint8_t *data, int len)
1326{
1327 int retval = 0;
1328
1329 ASSERT(NULL != ks);
1330 ASSERT(len >= 0);
1331
1332 if (0 == len)
1333 {
1334 return 0;
1335 }
1336
1337 ASSERT(data);
1338
1339 retval = mbedtls_ssl_write(ks->ctx, data, len);
1340
1341 if (retval < 0)
1342 {
1343 if (MBEDTLS_ERR_SSL_WANT_WRITE == retval || MBEDTLS_ERR_SSL_WANT_READ == retval)
1344 {
1345 return 0;
1346 }
1347 mbed_log_err(D_TLS_ERRORS, retval, "TLS ERROR: write tls_write_plaintext_const error");
1348 return -1;
1349 }
1350
1351 if (retval != len)
1352 {
1353 msg(D_TLS_ERRORS, "TLS ERROR: write tls_write_plaintext_const incomplete %d/%d", retval,
1354 len);
1355 return -1;
1356 }
1357
1358 /* successful write */
1359 dmsg(D_HANDSHAKE_VERBOSE, "write tls_write_plaintext_const %d bytes", retval);
1360
1361 return 1;
1362}
1363
1364int
1365key_state_read_ciphertext(struct key_state_ssl *ks, struct buffer *buf)
1366{
1367 int retval = 0;
1368 int len = 0;
1369
1370 ASSERT(NULL != ks);
1371 ASSERT(buf);
1372 ASSERT(buf->len >= 0);
1373
1374 if (buf->len)
1375 {
1376 return 0;
1377 }
1378
1379 len = buf_forward_capacity(buf);
1380
1381 retval = endless_buf_read(&ks->bio_ctx->out, BPTR(buf), len);
1382
1383 /* Error during read, check for retry error */
1384 if (retval < 0)
1385 {
1386 if (MBEDTLS_ERR_SSL_WANT_WRITE == retval || MBEDTLS_ERR_SSL_WANT_READ == retval)
1387 {
1388 return 0;
1389 }
1390 mbed_log_err(D_TLS_ERRORS, retval, "TLS_ERROR: read tls_read_ciphertext error");
1391 buf->len = 0;
1392 return -1;
1393 }
1394 /* Nothing read, try again */
1395 if (0 == retval)
1396 {
1397 buf->len = 0;
1398 return 0;
1399 }
1400
1401 /* successful read */
1402 dmsg(D_HANDSHAKE_VERBOSE, "read tls_read_ciphertext %d bytes", retval);
1403 buf->len = retval;
1404 return 1;
1405}
1406
1407int
1408key_state_write_ciphertext(struct key_state_ssl *ks, struct buffer *buf)
1409{
1410 int retval = 0;
1411
1412 ASSERT(NULL != ks);
1413 ASSERT(buf);
1414 ASSERT(buf->len >= 0);
1415
1416 if (0 == buf->len)
1417 {
1418 return 0;
1419 }
1420
1421 retval = endless_buf_write(&ks->bio_ctx->in, BPTR(buf), buf->len);
1422
1423 if (retval < 0)
1424 {
1425 if (MBEDTLS_ERR_SSL_WANT_WRITE == retval || MBEDTLS_ERR_SSL_WANT_READ == retval)
1426 {
1427 return 0;
1428 }
1429 mbed_log_err(D_TLS_ERRORS, retval, "TLS ERROR: write tls_write_ciphertext error");
1430 return -1;
1431 }
1432
1433 if (retval != buf->len)
1434 {
1435 msg(D_TLS_ERRORS, "TLS ERROR: write tls_write_ciphertext incomplete %d/%d", retval,
1436 buf->len);
1437 return -1;
1438 }
1439
1440 /* successful write */
1441 dmsg(D_HANDSHAKE_VERBOSE, "write tls_write_ciphertext %d bytes", retval);
1442
1443 memset(BPTR(buf), 0, BLEN(buf)); /* erase data just written */
1444 buf->len = 0;
1445
1446 return 1;
1447}
1448
1449int
1450key_state_read_plaintext(struct key_state_ssl *ks, struct buffer *buf)
1451{
1452 int retval = 0;
1453 int len = 0;
1454
1455 ASSERT(NULL != ks);
1456 ASSERT(buf);
1457 ASSERT(buf->len >= 0);
1458
1459 if (buf->len)
1460 {
1461 return 0;
1462 }
1463
1464 len = buf_forward_capacity(buf);
1465
1466 retval = mbedtls_ssl_read(ks->ctx, BPTR(buf), len);
1467
1468 /* Error during read, check for retry error */
1469 if (retval < 0)
1470 {
1471 if (MBEDTLS_ERR_SSL_WANT_WRITE == retval || MBEDTLS_ERR_SSL_WANT_READ == retval
1472 || MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET == retval)
1473 {
1474 return 0;
1475 }
1476 mbed_log_err(D_TLS_ERRORS, retval, "TLS_ERROR: read tls_read_plaintext error");
1477 buf->len = 0;
1478 return -1;
1479 }
1480 /* Nothing read, try again */
1481 if (0 == retval)
1482 {
1483 buf->len = 0;
1484 return 0;
1485 }
1486
1487 /* successful read */
1488 dmsg(D_HANDSHAKE_VERBOSE, "read tls_read_plaintext %d bytes", retval);
1489 buf->len = retval;
1490
1491 return 1;
1492}
1493
1494/* **************************************
1495 *
1496 * Information functions
1497 *
1498 * Print information for the end user.
1499 *
1500 ***************************************/
1501void
1502print_details(struct key_state_ssl *ks_ssl, const char *prefix)
1503{
1504 const mbedtls_x509_crt *cert;
1505 char s1[256];
1506 char s2[256];
1507
1508 s1[0] = s2[0] = 0;
1509 snprintf(s1, sizeof(s1), "%s %s, cipher %s", prefix, mbedtls_ssl_get_version(ks_ssl->ctx),
1510 mbedtls_ssl_get_ciphersuite(ks_ssl->ctx));
1511
1512 cert = mbedtls_ssl_get_peer_cert(ks_ssl->ctx);
1513 if (cert != NULL)
1514 {
1515 snprintf(s2, sizeof(s2), ", %u bit key", (unsigned int)mbedtls_pk_get_bitlen(&cert->pk));
1516 }
1517
1518 msg(D_HANDSHAKE, "%s%s", s1, s2);
1519}
1520
1521void
1522show_available_tls_ciphers_list(const char *cipher_list, const char *tls_cert_profile, bool tls13)
1523{
1524 if (tls13)
1525 {
1526 /* mbed TLS has no TLS 1.3 support currently */
1527 return;
1528 }
1529 struct tls_root_ctx tls_ctx;
1530 const int *ciphers = mbedtls_ssl_list_ciphersuites();
1531
1532 tls_ctx_server_new(&tls_ctx);
1533 tls_ctx_set_cert_profile(&tls_ctx, tls_cert_profile);
1534 tls_ctx_restrict_ciphers(&tls_ctx, cipher_list);
1535
1536 if (tls_ctx.allowed_ciphers)
1537 {
1538 ciphers = tls_ctx.allowed_ciphers;
1539 }
1540
1541 while (*ciphers != 0)
1542 {
1543 printf("%s\n", mbedtls_ssl_get_ciphersuite_name(*ciphers));
1544 ciphers++;
1545 }
1546 tls_ctx_free(&tls_ctx);
1547}
1548
1549void
1551{
1552#if MBEDTLS_VERSION_NUMBER < 0x04000000
1553 const mbedtls_ecp_curve_info *pcurve = mbedtls_ecp_curve_list();
1554
1555 if (NULL == pcurve)
1556 {
1557 msg(M_FATAL, "Cannot retrieve curve list from mbed TLS");
1558 }
1559
1560 /* Print curve list */
1561 printf("Available Elliptic curves, listed in order of preference:\n\n");
1562 while (MBEDTLS_ECP_DP_NONE != pcurve->grp_id)
1563 {
1564 printf("%s\n", pcurve->name);
1565 pcurve++;
1566 }
1567#else
1568 printf("Available elliptic curves:\n\n");
1569 for (size_t i = 0; i < ecp_curve_info_table_items; i++)
1570 {
1571 printf("%s\n", ecp_curve_info_table[i].name);
1572 }
1573#endif /* MBEDTLS_VERSION_NUMBER < 0x04000000 */
1574}
1575
1576const char *
1578{
1579 static char mbedtls_version[30];
1580 unsigned int pv = mbedtls_version_get_number();
1581 snprintf(mbedtls_version, sizeof(mbedtls_version), "mbed TLS %u.%u.%u", (pv >> 24) & 0xff,
1582 (pv >> 16) & 0xff, (pv >> 8) & 0xff);
1583 return mbedtls_version;
1584}
1585
1586void
1588{
1589 return; /* no external key provider in mbedTLS build */
1590}
1591
1592#endif /* defined(ENABLE_CRYPTO_MBEDTLS) */
char * string_alloc(const char *str, struct gc_arena *gc)
Definition buffer.c:648
#define BPTR(buf)
Definition buffer.h:123
#define ALLOC_ARRAY_CLEAR(dptr, type, n)
Definition buffer.h:1104
static int buf_forward_capacity(const struct buffer *buf)
Definition buffer.h:540
static void secure_memzero(void *data, size_t len)
Securely zeroise memory.
Definition buffer.h:415
#define BLEN(buf)
Definition buffer.h:126
static void gc_free(struct gc_arena *a)
Definition buffer.h:1049
#define ALLOC_OBJ_CLEAR(dptr, type)
Definition buffer.h:1088
static struct gc_arena gc_new(void)
Definition buffer.h:1041
uint64_t counter_type
Definition common.h:31
#define counter_format
Definition common.h:32
char * strsep(char **stringp, const char *delim)
const char * print_key_filename(const char *str, bool is_inline)
To be used when printing a string that may contain inline data.
Definition crypto.c:1279
#define mbed_ok(errval)
Check errval and log on error.
bool mbed_log_err(unsigned int flags, int errval, const char *prefix)
Log the supplied mbed TLS error, prefixed by supplied prefix.
mbedtls_ctr_drbg_context * rand_ctx_get(void)
Returns a singleton instance of the mbed TLS random number generator.
const mbedtls_md_info_t * md_get(const char *digest)
#define D_TLS_DEBUG_LOW
Definition errlevel.h:76
#define D_TLS_DEBUG_MED
Definition errlevel.h:156
#define D_HANDSHAKE_VERBOSE
Definition errlevel.h:155
#define D_HANDSHAKE
Definition errlevel.h:71
#define D_TLS_ERRORS
Definition errlevel.h:58
#define D_TLS_DEBUG
Definition errlevel.h:164
#define KS_PRIMARY
Primary key state index.
Definition ssl_common.h:465
int key_state_read_plaintext(struct key_state_ssl *ks_ssl, struct buffer *buf)
Extract plaintext data from the TLS module.
int key_state_write_ciphertext(struct key_state_ssl *ks_ssl, struct buffer *buf)
Insert a ciphertext buffer into the TLS module.
int key_state_read_ciphertext(struct key_state_ssl *ks_ssl, struct buffer *buf)
Extract ciphertext data from the TLS module.
int key_state_write_plaintext_const(struct key_state_ssl *ks_ssl, const uint8_t *data, int len)
Insert plaintext data into the TLS module.
int key_state_write_plaintext(struct key_state_ssl *ks_ssl, struct buffer *buf)
Insert a plaintext buffer into the TLS module.
int verify_callback(void *session_obj, mbedtls_x509_crt *cert, int cert_depth, uint32_t *flags)
Verify that the remote OpenVPN peer's certificate allows setting up a VPN tunnel.
static SERVICE_STATUS status
Definition interactive.c:51
void management_auth_failure(struct management *man, const char *type, const char *reason)
Definition manage.c:3212
char * management_query_pk_sig(struct management *man, const char *b64_data, const char *algorithm)
Definition manage.c:3879
mbedtls compatibility stub.
static int mbedtls_compat_pk_parse_key(mbedtls_pk_context *ctx, const unsigned char *key, size_t keylen, const unsigned char *pwd, size_t pwdlen)
static void mbedtls_compat_psa_crypto_init(void)
static int mbedtls_compat_pk_check_pair(const mbedtls_pk_context *pub, const mbedtls_pk_context *prv)
static int mbedtls_compat_pk_parse_keyfile(mbedtls_pk_context *ctx, const char *path, const char *password)
#define CLEAR(x)
Definition basic.h:32
#define M_FATAL
Definition error.h:90
#define dmsg(flags,...)
Definition error.h:172
#define msg(flags,...)
Definition error.h:152
unsigned int msglvl_t
Definition error.h:77
#define ASSERT(x)
Definition error.h:219
#define M_WARN
Definition error.h:92
PKCS #11 SSL library-specific backend.
int openvpn_base64_decode(const char *str, void *data, int size)
Definition base64.c:160
int openvpn_base64_encode(const void *data, int size, char **str)
Definition base64.c:51
static struct user_pass passbuf
Definition ssl.c:245
int pem_password_callback(char *buf, int size, int rwflag, void *u)
Callback to retrieve the user's password.
Definition ssl.c:259
void load_xkey_provider(void)
Load ovpn.xkey provider used for external key signing.
Control Channel SSL library backend module.
void tls_ctx_set_tls_groups(struct tls_root_ctx *ctx, const char *groups)
Set the (elliptic curve) group allowed for signatures and key exchange.
void tls_ctx_free(struct tls_root_ctx *ctx)
Frees the library-specific TLSv1 context.
const char * get_ssl_library_version(void)
return a pointer to a static memory area containing the name and version number of the SSL library in...
bool key_state_export_keying_material(struct tls_session *session, const char *label, size_t label_size, void *ekm, size_t ekm_size)
Keying Material Exporters [RFC 5705] allows additional keying material to be derived from existing TL...
void show_available_tls_ciphers_list(const char *cipher_list, const char *tls_cert_profile, bool tls13)
Show the TLS ciphers that are available for us to use in the library depending on the TLS version.
void tls_ctx_server_new(struct tls_root_ctx *ctx)
Initialise a library-specific TLS context for a server.
void show_available_curves(void)
Show the available elliptic curves in the crypto library.
void key_state_ssl_free(struct key_state_ssl *ks_ssl)
Free the SSL channel part of the given key state.
#define TLS_VER_1_2
int tls_ctx_load_priv_file(struct tls_root_ctx *ctx, const char *priv_key_file, bool priv_key_file_inline)
Load private key file into the given TLS context.
void key_state_ssl_shutdown(struct key_state_ssl *ks_ssl)
Sets a TLS session to be shutdown state, so the TLS library will generate a shutdown alert.
void tls_ctx_load_extra_certs(struct tls_root_ctx *ctx, const char *extra_certs_file, bool extra_certs_file_inline)
Load extra certificate authority certificates from the given file or path.
void tls_ctx_check_cert_time(const struct tls_root_ctx *ctx)
Check our certificate notBefore and notAfter fields, and warn if the cert is either not yet valid or ...
void tls_ctx_restrict_ciphers_tls13(struct tls_root_ctx *ctx, const char *ciphers)
Restrict the list of ciphers that can be used within the TLS context for TLS 1.3 and higher.
int tls_ctx_load_pkcs12(struct tls_root_ctx *ctx, const char *pkcs12_file, bool pkcs12_file_inline, bool load_ca_file)
Load PKCS #12 file for key, cert and (optionally) CA certs, and add to library-specific TLS context.
bool tls_ctx_initialised(struct tls_root_ctx *ctx)
Checks whether the given TLS context is initialised.
void key_state_ssl_init(struct key_state_ssl *ks_ssl, const struct tls_root_ctx *ssl_ctx, bool is_server, struct tls_session *session)
Initialise the SSL channel part of the given key state.
void tls_free_lib(void)
Free any global SSL library-specific data structures.
Definition ssl_openssl.c:98
void tls_ctx_load_ecdh_params(struct tls_root_ctx *ctx, const char *curve_name)
Load Elliptic Curve Parameters, and load them into the library-specific TLS context.
#define TLS_VER_1_3
#define TLS_VER_UNSPEC
void tls_init_lib(void)
Perform any static initialisation necessary by the library.
Definition ssl_openssl.c:91
void print_details(struct key_state_ssl *ks_ssl, const char *prefix)
Print a one line summary of SSL/TLS session handshake.
int tls_version_max(void)
Return the maximum TLS version (as a TLS_VER_x constant) supported by current SSL implementation.
void backend_tls_ctx_reload_crl(struct tls_root_ctx *ssl_ctx, const char *crl_file, bool crl_inline)
Reload the Certificate Revocation List for the SSL channel.
void tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers)
Restrict the list of ciphers that can be used within the TLS context for TLS 1.2 and below.
void tls_ctx_load_ca(struct tls_root_ctx *ctx, const char *ca_file, bool ca_file_inline, const char *ca_path, bool tls_server)
Load certificate authority certificates from the given file or path.
void tls_ctx_set_cert_profile(struct tls_root_ctx *ctx, const char *profile)
Set the TLS certificate profile.
int tls_ctx_use_management_external_key(struct tls_root_ctx *ctx)
Tell the management interface to load the given certificate and the external private key matching the...
void tls_ctx_load_cryptoapi(struct tls_root_ctx *ctx, const char *cryptoapi_cert)
Use Windows cryptoapi for key and cert, and add to library-specific TLS context.
bool tls_ctx_set_options(struct tls_root_ctx *ctx, unsigned int ssl_flags)
Set any library specific options.
void tls_ctx_load_dh_params(struct tls_root_ctx *ctx, const char *dh_file, bool dh_file_inline)
Load Diffie Hellman Parameters, and load them into the library-specific TLS context.
void tls_ctx_client_new(struct tls_root_ctx *ctx)
Initialises a library-specific TLS context for a client.
void tls_ctx_load_cert_file(struct tls_root_ctx *ctx, const char *cert_file, bool cert_file_inline)
Load certificate file into the given TLS context.
Control Channel Common Data Structures.
#define SSLF_TLS_VERSION_MAX_SHIFT
Definition ssl_common.h:432
#define UP_TYPE_PRIVATE_KEY
Definition ssl_common.h:42
#define SSLF_CLIENT_CERT_OPTIONAL
Definition ssl_common.h:425
#define SSLF_CLIENT_CERT_NOT_REQUIRED
Definition ssl_common.h:424
#define SSLF_TLS_DEBUG_ENABLED
Definition ssl_common.h:434
#define SSLF_TLS_VERSION_MAX_MASK
Definition ssl_common.h:433
#define SSLF_TLS_VERSION_MIN_SHIFT
Definition ssl_common.h:430
#define SSLF_TLS_VERSION_MIN_MASK
Definition ssl_common.h:431
int tls_ctx_use_external_signing_func(struct tls_root_ctx *ctx, external_sign_func sign_func, void *sign_ctx)
Call the supplied signing function to create a TLS signature during the TLS handshake.
bool(* external_sign_func)(void *sign_ctx, const void *src, size_t src_size, void *dst, size_t dst_size)
External signing function prototype.
Definition ssl_mbedtls.h:77
int get_num_elements(const char *string, char delimiter)
Returns the occurrences of 'delimiter' in a string +1 This is typically used to find out the number e...
Definition ssl_util.c:304
const tls_cipher_name_pair * tls_get_cipher_name_pair(const char *cipher_name, size_t len)
Definition ssl_util.c:285
SSL utility functions.
Control Channel Verification Module mbed TLS backend.
size_t length
Definition ssl_mbedtls.h:46
uint8_t * data
Definition ssl_mbedtls.h:47
buffer_entry * next_block
Definition ssl_mbedtls.h:48
endless_buffer out
Definition ssl_mbedtls.h:61
endless_buffer in
Definition ssl_mbedtls.h:60
Definition buffer.h:1143
Wrapper structure for dynamically allocated memory.
Definition buffer.h:60
int len
Length in bytes of the actual content within the allocated memory.
Definition buffer.h:65
size_t data_start
Definition ssl_mbedtls.h:53
buffer_entry * first_block
Definition ssl_mbedtls.h:54
buffer_entry * last_block
Definition ssl_mbedtls.h:55
Context used by external_pkcs1_sign()
Definition ssl_mbedtls.h:82
external_sign_func sign
Definition ssl_mbedtls.h:84
size_t signature_length
Definition ssl_mbedtls.h:83
Garbage collection arena used to keep track of dynamically allocated memory.
Definition buffer.h:116
Definition list.h:53
bio_ctx * bio_ctx
mbedtls_ssl_config * ssl_config
mbedTLS global ssl config
mbedtls_ssl_context * ctx
mbedTLS connection context
struct tls_key_cache tls_key_cache
Get a tls_cipher_name_pair containing OpenSSL and IANA names for supplied TLS cipher name.
Definition ssl_util.h:77
const char * iana_name
Definition ssl_util.h:79
const char * openssl_name
Definition ssl_util.h:78
struct to cache TLS secrets for keying material exporter (RFC 5705).
Definition ssl_mbedtls.h:96
unsigned char master_secret[48]
Definition ssl_mbedtls.h:99
mbedtls_tls_prf_types tls_prf_type
Definition ssl_mbedtls.h:98
unsigned char client_server_random[64]
Definition ssl_mbedtls.h:97
Structure that wraps the TLS context.
mbedtls_x509_crl * crl
Certificate Revocation List.
mbedtls_x509_crt * crt_chain
Local Certificate chain.
uint16_t * groups
List of allowed groups for this connection.
mbedtls_x509_crt * ca_chain
CA chain for remote verification.
int * allowed_ciphers
List of allowed ciphers for this connection.
mbedtls_dhm_context * dhm_ctx
Diffie-Helmann-Merkle context.
mbedtls_x509_crt_profile cert_profile
Allowed certificate types.
bool initialised
True if the context has been initialised.
int endpoint
Whether or not this is a server or a client.
struct external_context external_key
External key context.
mbedtls_pk_context * priv_key
Local private key.
Security parameter state of a single session within a VPN tunnel.
Definition ssl_common.h:490
static int cleanup(void **state)
struct gc_arena gc
Definition test_ssl.c:133