mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-30 18:57:27 +02:00
Implement RFC 5705: Keying Material Exporters for TLS
This commit is contained in:
13
configure.ac
13
configure.ac
@ -3514,6 +3514,18 @@ then
|
|||||||
AM_CFLAGS="$AM_CFLAGS -DHAVE_FALLBACK_SCSV"
|
AM_CFLAGS="$AM_CFLAGS -DHAVE_FALLBACK_SCSV"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# Exporting Keying Material
|
||||||
|
AC_ARG_ENABLE([keying-material],
|
||||||
|
[AS_HELP_STRING([--enable-keying-material],[Enable Keying Material Exporters (default: disabled)])],
|
||||||
|
[ ENABLED_KEYING_MATERIAL=$enableval ],
|
||||||
|
[ ENABLED_KEYING_MATERIAL=no ]
|
||||||
|
)
|
||||||
|
|
||||||
|
if test "x$ENABLED_KEYING_MATERIAL" = "xyes"
|
||||||
|
then
|
||||||
|
AM_CFLAGS="$AM_CFLAGS -DHAVE_KEYING_MATERIAL"
|
||||||
|
fi
|
||||||
|
|
||||||
# Supported Elliptic Curves Extensions
|
# Supported Elliptic Curves Extensions
|
||||||
AC_ARG_ENABLE([supportedcurves],
|
AC_ARG_ENABLE([supportedcurves],
|
||||||
[AS_HELP_STRING([--enable-supportedcurves],[Enable Supported Elliptic Curves (default: enabled)])],
|
[AS_HELP_STRING([--enable-supportedcurves],[Enable Supported Elliptic Curves (default: enabled)])],
|
||||||
@ -6415,6 +6427,7 @@ echo " * Extended Master Secret: $ENABLED_EXTENDED_MASTER"
|
|||||||
echo " * Renegotiation Indication: $ENABLED_RENEGOTIATION_INDICATION"
|
echo " * Renegotiation Indication: $ENABLED_RENEGOTIATION_INDICATION"
|
||||||
echo " * Secure Renegotiation: $ENABLED_SECURE_RENEGOTIATION"
|
echo " * Secure Renegotiation: $ENABLED_SECURE_RENEGOTIATION"
|
||||||
echo " * Fallback SCSV: $ENABLED_FALLBACK_SCSV"
|
echo " * Fallback SCSV: $ENABLED_FALLBACK_SCSV"
|
||||||
|
echo " * Keying Material Exporter: $ENABLED_KEYING_MATERIAL"
|
||||||
echo " * All TLS Extensions: $ENABLED_TLSX"
|
echo " * All TLS Extensions: $ENABLED_TLSX"
|
||||||
echo " * PKCS#7 $ENABLED_PKCS7"
|
echo " * PKCS#7 $ENABLED_PKCS7"
|
||||||
echo " * wolfSSH $ENABLED_WOLFSSH"
|
echo " * wolfSSH $ENABLED_WOLFSSH"
|
||||||
|
@ -5766,6 +5766,10 @@ int InitSSL(WOLFSSL* ssl, WOLFSSL_CTX* ctx, int writeDup)
|
|||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(WOLFSSL_OPENVPN) && defined(HAVE_KEYING_MATERIAL)
|
||||||
|
/* Save arrays by default for OpenVPN */
|
||||||
|
ssl->options.saveArrays = 1;
|
||||||
|
#endif
|
||||||
|
|
||||||
ssl->cipher.ssl = ssl;
|
ssl->cipher.ssl = ssl;
|
||||||
|
|
||||||
|
104
src/ssl.c
104
src/ssl.c
@ -11879,6 +11879,110 @@ int wolfSSL_set_cipher_list(WOLFSSL* ssl, const char* list)
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
|
static const struct ForbiddenLabels {
|
||||||
|
const char* label;
|
||||||
|
size_t labelLen;
|
||||||
|
} forbiddenLabels[] = {
|
||||||
|
{TLS_PRF_LABEL_CLIENT_FINISHED, XSTR_SIZEOF(TLS_PRF_LABEL_CLIENT_FINISHED)},
|
||||||
|
{TLS_PRF_LABEL_SERVER_FINISHED, XSTR_SIZEOF(TLS_PRF_LABEL_SERVER_FINISHED)},
|
||||||
|
{TLS_PRF_LABEL_MASTER_SECRET, XSTR_SIZEOF(TLS_PRF_LABEL_MASTER_SECRET)},
|
||||||
|
{TLS_PRF_LABEL_EXT_MASTER_SECRET, XSTR_SIZEOF(TLS_PRF_LABEL_EXT_MASTER_SECRET)},
|
||||||
|
{TLS_PRF_LABEL_KEY_EXPANSION, XSTR_SIZEOF(TLS_PRF_LABEL_KEY_EXPANSION)},
|
||||||
|
{NULL, 0},
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Implement RFC 5705
|
||||||
|
* TLS 1.3 uses a different exporter definition (section 7.5 of RFC 8446)
|
||||||
|
* @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
|
||||||
|
*/
|
||||||
|
int wolfSSL_export_keying_material(WOLFSSL *ssl,
|
||||||
|
unsigned char *out, size_t outLen,
|
||||||
|
const char *label, size_t labelLen,
|
||||||
|
const unsigned char *context, size_t contextLen,
|
||||||
|
int use_context)
|
||||||
|
{
|
||||||
|
byte* seed = NULL;
|
||||||
|
/* clientRandom + serverRandom
|
||||||
|
* OR
|
||||||
|
* clientRandom + serverRandom + ctx len encoding + ctx */
|
||||||
|
word32 seedLen = !use_context ? SEED_LEN : SEED_LEN + 2 + contextLen;
|
||||||
|
const struct ForbiddenLabels* fl;
|
||||||
|
|
||||||
|
WOLFSSL_ENTER("wolfSSL_export_keying_material");
|
||||||
|
|
||||||
|
if (ssl == NULL || out == NULL || label == NULL ||
|
||||||
|
(use_context && contextLen && context == NULL)) {
|
||||||
|
WOLFSSL_MSG("Bad argument");
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ssl->options.saveArrays == 0 || ssl->arrays == NULL) {
|
||||||
|
WOLFSSL_MSG("To export keying material wolfSSL needs to keep handshake "
|
||||||
|
"data. Call wolfSSL_KeepArrays before attempting to "
|
||||||
|
"export keyig material.");
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* check forbidden labels */
|
||||||
|
for (fl = &forbiddenLabels[0]; fl->label != NULL; fl++) {
|
||||||
|
if (labelLen >= fl->labelLen &&
|
||||||
|
XMEMCMP(label, fl->label, fl->labelLen) == 0) {
|
||||||
|
WOLFSSL_MSG("Forbidden label");
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef WOLFSSL_TLS13
|
||||||
|
if (IsAtLeastTLSv1_3(ssl->version)) {
|
||||||
|
/* Path for TLS 1.3 */
|
||||||
|
if (!use_context) {
|
||||||
|
contextLen = 0;
|
||||||
|
context = (byte*)""; /* Give valid pointer for 0 length memcpy */
|
||||||
|
}
|
||||||
|
|
||||||
|
if (Tls13_Exporter(ssl, out, outLen, label, labelLen,
|
||||||
|
context, contextLen) != 0) {
|
||||||
|
WOLFSSL_MSG("Tls13_Exporter error");
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
}
|
||||||
|
return WOLFSSL_SUCCESS;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* Path for <=TLS 1.2 */
|
||||||
|
seed = (byte*)XMALLOC(seedLen, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
|
if (seed == NULL) {
|
||||||
|
WOLFSSL_MSG("malloc error");
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
XMEMCPY(seed, ssl->arrays->clientRandom, RAN_LEN);
|
||||||
|
XMEMCPY(seed + RAN_LEN, ssl->arrays->serverRandom, RAN_LEN);
|
||||||
|
|
||||||
|
if (use_context) {
|
||||||
|
/* Encode len in big endian */
|
||||||
|
seed[SEED_LEN ] = (contextLen >> 8) & 0xFF;
|
||||||
|
seed[SEED_LEN + 1] = (contextLen) & 0xFF;
|
||||||
|
if (contextLen) {
|
||||||
|
/* 0 length context is allowed */
|
||||||
|
XMEMCPY(seed + SEED_LEN + 2, context, contextLen);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (wc_PRF_TLS(out, outLen, ssl->arrays->masterSecret, SECRET_LEN,
|
||||||
|
(byte*)label, labelLen, seed, seedLen, IsAtLeastTLSv1_2(ssl),
|
||||||
|
ssl->specs.mac_algorithm, ssl->heap, ssl->devId) != 0) {
|
||||||
|
WOLFSSL_MSG("wc_PRF_TLS error");
|
||||||
|
XFREE(seed, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
XFREE(seed, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
|
return WOLFSSL_SUCCESS;
|
||||||
|
}
|
||||||
|
#endif /* HAVE_KEYING_MATERIAL */
|
||||||
|
|
||||||
int wolfSSL_dtls_get_using_nonblock(WOLFSSL* ssl)
|
int wolfSSL_dtls_get_using_nonblock(WOLFSSL* ssl)
|
||||||
{
|
{
|
||||||
|
121
src/tls13.c
121
src/tls13.c
@ -29,9 +29,8 @@
|
|||||||
* Enables session tickets - required for TLS 1.3 resumption.
|
* Enables session tickets - required for TLS 1.3 resumption.
|
||||||
* NO_PSK
|
* NO_PSK
|
||||||
* Do not enable Pre-Shared Keys.
|
* Do not enable Pre-Shared Keys.
|
||||||
* TLS13_SUPPORTS_EXPORTERS
|
* HAVE_KEYING_MATERIAL
|
||||||
* Guard to compile out any code for exporter keys.
|
* Enables exporting keying material based on section 7.5 of RFC 8446.
|
||||||
* Feature not supported yet.
|
|
||||||
* WOLFSSL_ASYNC_CRYPT
|
* WOLFSSL_ASYNC_CRYPT
|
||||||
* Enables the use of asynchronous cryptographic operations.
|
* Enables the use of asynchronous cryptographic operations.
|
||||||
* This is available for ciphers and certificates.
|
* This is available for ciphers and certificates.
|
||||||
@ -515,7 +514,7 @@ static int DeriveEarlyTrafficSecret(WOLFSSL* ssl, byte* key)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef TLS13_SUPPORTS_EXPORTERS
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
/* The length of the early exporter label. */
|
/* The length of the early exporter label. */
|
||||||
#define EARLY_EXPORTER_LABEL_SZ 12
|
#define EARLY_EXPORTER_LABEL_SZ 12
|
||||||
/* The early exporter label. */
|
/* The early exporter label. */
|
||||||
@ -688,7 +687,7 @@ static int DeriveServerTrafficSecret(WOLFSSL* ssl, byte* key)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef TLS13_SUPPORTS_EXPORTERS
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
/* The length of the exporter master secret label. */
|
/* The length of the exporter master secret label. */
|
||||||
#define EXPORTER_MASTER_LABEL_SZ 10
|
#define EXPORTER_MASTER_LABEL_SZ 10
|
||||||
/* The exporter master secret label. */
|
/* The exporter master secret label. */
|
||||||
@ -704,7 +703,7 @@ static const byte exporterMasterLabel[EXPORTER_MASTER_LABEL_SZ + 1] =
|
|||||||
static int DeriveExporterSecret(WOLFSSL* ssl, byte* key)
|
static int DeriveExporterSecret(WOLFSSL* ssl, byte* key)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
WOLFSSL_MSG("Derive Exporter Secret");
|
WOLFSSL_ENTER("Derive Exporter Secret");
|
||||||
if (ssl == NULL || ssl->arrays == NULL) {
|
if (ssl == NULL || ssl->arrays == NULL) {
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
@ -722,6 +721,104 @@ static int DeriveExporterSecret(WOLFSSL* ssl, byte* key)
|
|||||||
#endif /* HAVE_SECRET_CALLBACK */
|
#endif /* HAVE_SECRET_CALLBACK */
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* The length of the exporter label. */
|
||||||
|
#define EXPORTER_LABEL_SZ 8
|
||||||
|
/* The exporter label. */
|
||||||
|
static const byte exporterLabel[EXPORTER_LABEL_SZ + 1] =
|
||||||
|
"exporter";
|
||||||
|
/* Hash("") */
|
||||||
|
#ifndef NO_SHA256
|
||||||
|
static const byte emptySHA256Hash[] = {
|
||||||
|
0xE3, 0xB0, 0xC4, 0x42, 0x98, 0xFC, 0x1C, 0x14, 0x9A, 0xFB, 0xF4, 0xC8,
|
||||||
|
0x99, 0x6F, 0xB9, 0x24, 0x27, 0xAE, 0x41, 0xE4, 0x64, 0x9B, 0x93, 0x4C,
|
||||||
|
0xA4, 0x95, 0x99, 0x1B, 0x78, 0x52, 0xB8, 0x55
|
||||||
|
};
|
||||||
|
#endif
|
||||||
|
#ifdef WOLFSSL_SHA384
|
||||||
|
static const byte emptySHA384Hash[] = {
|
||||||
|
0x38, 0xB0, 0x60, 0xA7, 0x51, 0xAC, 0x96, 0x38, 0x4C, 0xD9, 0x32, 0x7E,
|
||||||
|
0xB1, 0xB1, 0xE3, 0x6A, 0x21, 0xFD, 0xB7, 0x11, 0x14, 0xBE, 0x07, 0x43,
|
||||||
|
0x4C, 0x0C, 0xC7, 0xBF, 0x63, 0xF6, 0xE1, 0xDA, 0x27, 0x4E, 0xDE, 0xBF,
|
||||||
|
0xE7, 0x6F, 0x65, 0xFB, 0xD5, 0x1A, 0xD2, 0xF1, 0x48, 0x98, 0xB9, 0x5B
|
||||||
|
};
|
||||||
|
#endif
|
||||||
|
#ifdef WOLFSSL_TLS13_SHA512
|
||||||
|
static const byte emptySHA512Hash[] = {
|
||||||
|
0xCF, 0x83, 0xE1, 0x35, 0x7E, 0xEF, 0xB8, 0xBD, 0xF1, 0x54, 0x28, 0x50,
|
||||||
|
0xD6, 0x6D, 0x80, 0x07, 0xD6, 0x20, 0xE4, 0x05, 0x0B, 0x57, 0x15, 0xDC,
|
||||||
|
0x83, 0xF4, 0xA9, 0x21, 0xD3, 0x6C, 0xE9, 0xCE, 0x47, 0xD0, 0xD1, 0x3C,
|
||||||
|
0x5D, 0x85, 0xF2, 0xB0, 0xFF, 0x83, 0x18, 0xD2, 0x87, 0x7E, 0xEC, 0x2F,
|
||||||
|
0x63, 0xB9, 0x31, 0xBD, 0x47, 0x41, 0x7A, 0x81, 0xA5, 0x38, 0x32, 0x7A,
|
||||||
|
0xF9, 0x27, 0xDA, 0x3E
|
||||||
|
};
|
||||||
|
#endif
|
||||||
|
/**
|
||||||
|
* Implement section 7.5 of RFC 8446
|
||||||
|
* @return 0 on success
|
||||||
|
* <0 on failure
|
||||||
|
*/
|
||||||
|
int Tls13_Exporter(WOLFSSL* ssl, unsigned char *out, size_t outLen,
|
||||||
|
const char *label, size_t labelLen,
|
||||||
|
const unsigned char *context, size_t contextLen)
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
enum wc_HashType hashType = WC_HASH_TYPE_NONE;
|
||||||
|
int hashLen = 0;
|
||||||
|
byte hashOut[WC_MAX_DIGEST_SIZE];
|
||||||
|
const byte* emptyHash = NULL;
|
||||||
|
byte firstExpand[WC_MAX_DIGEST_SIZE];
|
||||||
|
const byte* protocol = tls13ProtocolLabel;
|
||||||
|
word32 protocolLen = TLS13_PROTOCOL_LABEL_SZ;
|
||||||
|
|
||||||
|
if (ssl->version.minor != TLSv1_3_MINOR)
|
||||||
|
return VERSION_ERROR;
|
||||||
|
|
||||||
|
switch (ssl->specs.mac_algorithm) {
|
||||||
|
#ifndef NO_SHA256
|
||||||
|
case sha256_mac:
|
||||||
|
hashType = WC_SHA256;
|
||||||
|
hashLen = WC_SHA256_DIGEST_SIZE;
|
||||||
|
emptyHash = emptySHA256Hash;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifdef WOLFSSL_SHA384
|
||||||
|
case sha384_mac:
|
||||||
|
hashType = WC_SHA384;
|
||||||
|
hashLen = WC_SHA384_DIGEST_SIZE;
|
||||||
|
emptyHash = emptySHA384Hash;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifdef WOLFSSL_TLS13_SHA512
|
||||||
|
case sha512_mac:
|
||||||
|
hashType = WC_SHA512;
|
||||||
|
hashLen = WC_SHA512_DIGEST_SIZE;
|
||||||
|
emptyHash = emptySHA512Hash;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Derive-Secret(Secret, label, "") */
|
||||||
|
ret = HKDF_Expand_Label(firstExpand, hashLen,
|
||||||
|
ssl->arrays->exporterSecret, hashLen,
|
||||||
|
protocol, protocolLen, (byte*)label, labelLen,
|
||||||
|
emptyHash, hashLen, hashType);
|
||||||
|
if (ret != 0)
|
||||||
|
return ret;
|
||||||
|
|
||||||
|
/* Hash(context_value) */
|
||||||
|
ret = wc_Hash(hashType, context, contextLen, hashOut, WC_MAX_DIGEST_SIZE);
|
||||||
|
if (ret != 0)
|
||||||
|
return ret;
|
||||||
|
|
||||||
|
ret = HKDF_Expand_Label(out, outLen, firstExpand, hashLen,
|
||||||
|
protocol, protocolLen, exporterLabel, EXPORTER_LABEL_SZ,
|
||||||
|
hashOut, hashLen, hashType);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(HAVE_SESSION_TICKET) || !defined(NO_PSK)
|
#if defined(HAVE_SESSION_TICKET) || !defined(NO_PSK)
|
||||||
@ -862,9 +959,19 @@ int DeriveMasterSecret(WOLFSSL* ssl)
|
|||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
return Tls13_HKDF_Extract(ssl->arrays->masterSecret,
|
ret = Tls13_HKDF_Extract(ssl->arrays->masterSecret,
|
||||||
key, ssl->specs.hash_size,
|
key, ssl->specs.hash_size,
|
||||||
ssl->arrays->masterSecret, 0, ssl->specs.mac_algorithm);
|
ssl->arrays->masterSecret, 0, ssl->specs.mac_algorithm);
|
||||||
|
|
||||||
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
|
if (ret != 0)
|
||||||
|
return ret;
|
||||||
|
/* Calculate exporter secret only when saving arrays */
|
||||||
|
if (ssl->options.saveArrays)
|
||||||
|
ret = DeriveExporterSecret(ssl, ssl->arrays->exporterSecret);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(HAVE_SESSION_TICKET)
|
#if defined(HAVE_SESSION_TICKET)
|
||||||
|
86
tests/api.c
86
tests/api.c
@ -39948,6 +39948,86 @@ static int test_various_pathlen_chains(void)
|
|||||||
}
|
}
|
||||||
#endif /* !NO_RSA && !NO_SHA && !NO_FILESYSTEM && !NO_CERTS */
|
#endif /* !NO_RSA && !NO_SHA && !NO_FILESYSTEM && !NO_CERTS */
|
||||||
|
|
||||||
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
|
static int test_export_keying_material_cb(WOLFSSL_CTX *ctx, WOLFSSL *ssl)
|
||||||
|
{
|
||||||
|
byte ekm[100] = {0};
|
||||||
|
|
||||||
|
(void)ctx;
|
||||||
|
|
||||||
|
/* Succes Cases */
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"Test label", XSTR_SIZEOF("Test label"), NULL, 0, 0), 1);
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"Test label", XSTR_SIZEOF("Test label"), NULL, 0, 1), 1);
|
||||||
|
/* Use some random context */
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"Test label", XSTR_SIZEOF("Test label"), ekm, 10, 1), 1);
|
||||||
|
/* Failure cases */
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"client finished", XSTR_SIZEOF("client finished"), NULL, 0, 0), 0);
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"server finished", XSTR_SIZEOF("server finished"), NULL, 0, 0), 0);
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"master secret", XSTR_SIZEOF("master secret"), NULL, 0, 0), 0);
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"extended master secret", XSTR_SIZEOF("extended master secret"), NULL, 0, 0), 0);
|
||||||
|
AssertIntEQ(wolfSSL_export_keying_material(ssl, ekm, sizeof(ekm),
|
||||||
|
"key expansion", XSTR_SIZEOF("key expansion"), NULL, 0, 0), 0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void test_export_keying_material_ssl_cb(WOLFSSL* ssl)
|
||||||
|
{
|
||||||
|
wolfSSL_KeepArrays(ssl);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void test_export_keying_material(void)
|
||||||
|
{
|
||||||
|
#ifndef SINGLE_THREADED
|
||||||
|
tcp_ready ready;
|
||||||
|
callback_functions clientCb;
|
||||||
|
func_args client_args;
|
||||||
|
func_args server_args;
|
||||||
|
THREAD_TYPE serverThread;
|
||||||
|
|
||||||
|
XMEMSET(&client_args, 0, sizeof(func_args));
|
||||||
|
XMEMSET(&server_args, 0, sizeof(func_args));
|
||||||
|
XMEMSET(&clientCb, 0, sizeof(callback_functions));
|
||||||
|
#ifdef WOLFSSL_TIRTOS
|
||||||
|
fdOpenSession(Task_self());
|
||||||
|
#endif
|
||||||
|
|
||||||
|
StartTCP();
|
||||||
|
InitTcpReady(&ready);
|
||||||
|
|
||||||
|
#if defined(USE_WINDOWS_API)
|
||||||
|
/* use RNG to get random port if using windows */
|
||||||
|
ready.port = GetRandomPort();
|
||||||
|
#endif
|
||||||
|
|
||||||
|
server_args.signal = &ready;
|
||||||
|
client_args.signal = &ready;
|
||||||
|
clientCb.ssl_ready = test_export_keying_material_ssl_cb;
|
||||||
|
client_args.callbacks = &clientCb;
|
||||||
|
|
||||||
|
start_thread(test_server_nofail, &server_args, &serverThread);
|
||||||
|
wait_tcp_ready(&server_args);
|
||||||
|
test_client_nofail(&client_args, test_export_keying_material_cb);
|
||||||
|
join_thread(serverThread);
|
||||||
|
|
||||||
|
AssertTrue(client_args.return_code);
|
||||||
|
AssertTrue(server_args.return_code);
|
||||||
|
|
||||||
|
FreeTcpReady(&ready);
|
||||||
|
|
||||||
|
#ifdef WOLFSSL_TIRTOS
|
||||||
|
fdOpenSession(Task_self());
|
||||||
|
#endif
|
||||||
|
#endif /* !SINGLE_THREADED */
|
||||||
|
}
|
||||||
|
#endif /* HAVE_KEYING_MATERIAL */
|
||||||
|
|
||||||
/*----------------------------------------------------------------------------*
|
/*----------------------------------------------------------------------------*
|
||||||
| Main
|
| Main
|
||||||
*----------------------------------------------------------------------------*/
|
*----------------------------------------------------------------------------*/
|
||||||
@ -40351,6 +40431,11 @@ void ApiTest(void)
|
|||||||
test_DhCallbacks();
|
test_DhCallbacks();
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
|
test_export_keying_material();
|
||||||
|
#endif /* HAVE_KEYING_MATERIAL */
|
||||||
|
|
||||||
/*wolfcrypt */
|
/*wolfcrypt */
|
||||||
printf("\n-----------------wolfcrypt unit tests------------------\n");
|
printf("\n-----------------wolfcrypt unit tests------------------\n");
|
||||||
AssertFalse(test_wolfCrypt_Init());
|
AssertFalse(test_wolfCrypt_Init());
|
||||||
@ -40653,7 +40738,6 @@ void ApiTest(void)
|
|||||||
test_wc_PKCS7_SetOriDecryptCtx();
|
test_wc_PKCS7_SetOriDecryptCtx();
|
||||||
test_wc_PKCS7_DecodeCompressedData();
|
test_wc_PKCS7_DecodeCompressedData();
|
||||||
|
|
||||||
|
|
||||||
test_wc_i2d_PKCS12();
|
test_wc_i2d_PKCS12();
|
||||||
|
|
||||||
test_wolfSSL_CTX_LoadCRL();
|
test_wolfSSL_CTX_LoadCRL();
|
||||||
|
@ -2625,6 +2625,10 @@ WOLFSSL_LOCAL int DeriveMasterSecret(WOLFSSL* ssl);
|
|||||||
WOLFSSL_LOCAL int DeriveResumptionPSK(WOLFSSL* ssl, byte* nonce, byte nonceLen, byte* secret);
|
WOLFSSL_LOCAL int DeriveResumptionPSK(WOLFSSL* ssl, byte* nonce, byte nonceLen, byte* secret);
|
||||||
WOLFSSL_LOCAL int DeriveResumptionSecret(WOLFSSL* ssl, byte* key);
|
WOLFSSL_LOCAL int DeriveResumptionSecret(WOLFSSL* ssl, byte* key);
|
||||||
|
|
||||||
|
WOLFSSL_LOCAL int Tls13_Exporter(WOLFSSL* ssl, unsigned char *out, size_t outLen,
|
||||||
|
const char *label, size_t labelLen,
|
||||||
|
const unsigned char *context, size_t contextLen);
|
||||||
|
|
||||||
/* The key update request values for KeyUpdate message. */
|
/* The key update request values for KeyUpdate message. */
|
||||||
enum KeyUpdateRequest {
|
enum KeyUpdateRequest {
|
||||||
update_not_requested,
|
update_not_requested,
|
||||||
@ -3591,6 +3595,9 @@ typedef struct Arrays {
|
|||||||
byte sessionIDSz;
|
byte sessionIDSz;
|
||||||
#ifdef WOLFSSL_TLS13
|
#ifdef WOLFSSL_TLS13
|
||||||
byte secret[SECRET_LEN];
|
byte secret[SECRET_LEN];
|
||||||
|
#endif
|
||||||
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
|
byte exporterSecret[WC_MAX_DIGEST_SIZE];
|
||||||
#endif
|
#endif
|
||||||
byte masterSecret[SECRET_LEN];
|
byte masterSecret[SECRET_LEN];
|
||||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && \
|
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && \
|
||||||
|
@ -301,7 +301,7 @@ typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS;
|
|||||||
/* wolfSSL does not support security levels */
|
/* wolfSSL does not support security levels */
|
||||||
#define SSL_CTX_set_security_level(...)
|
#define SSL_CTX_set_security_level(...)
|
||||||
/* wolfSSL does not support exporting keying material */
|
/* wolfSSL does not support exporting keying material */
|
||||||
#define SSL_export_keying_material(...) 0
|
#define SSL_export_keying_material wolfSSL_export_keying_material
|
||||||
|
|
||||||
#define SSL_CTX_set1_groups wolfSSL_CTX_set_groups
|
#define SSL_CTX_set1_groups wolfSSL_CTX_set_groups
|
||||||
#define SSL_set1_groups wolfSSL_set_groups
|
#define SSL_set1_groups wolfSSL_set_groups
|
||||||
|
@ -1057,6 +1057,20 @@ WOLFSSL_API int wolfSSL_CTX_get_cert_cache_memsize(WOLFSSL_CTX*);
|
|||||||
WOLFSSL_API int wolfSSL_CTX_set_cipher_list(WOLFSSL_CTX*, const char*);
|
WOLFSSL_API int wolfSSL_CTX_set_cipher_list(WOLFSSL_CTX*, const char*);
|
||||||
WOLFSSL_API int wolfSSL_set_cipher_list(WOLFSSL*, const char*);
|
WOLFSSL_API int wolfSSL_set_cipher_list(WOLFSSL*, const char*);
|
||||||
|
|
||||||
|
#ifdef HAVE_KEYING_MATERIAL
|
||||||
|
#define TLS_PRF_LABEL_CLIENT_FINISHED "client finished"
|
||||||
|
#define TLS_PRF_LABEL_SERVER_FINISHED "server finished"
|
||||||
|
#define TLS_PRF_LABEL_MASTER_SECRET "master secret"
|
||||||
|
#define TLS_PRF_LABEL_EXT_MASTER_SECRET "extended master secret"
|
||||||
|
#define TLS_PRF_LABEL_KEY_EXPANSION "key expansion"
|
||||||
|
/* Keying Material Exporter for TLS */
|
||||||
|
WOLFSSL_API int wolfSSL_export_keying_material(WOLFSSL *ssl,
|
||||||
|
unsigned char *out, size_t outLen,
|
||||||
|
const char *label, size_t labelLen,
|
||||||
|
const unsigned char *context, size_t contextLen,
|
||||||
|
int use_context);
|
||||||
|
#endif /* HAVE_KEYING_MATERIAL */
|
||||||
|
|
||||||
/* Nonblocking DTLS helper functions */
|
/* Nonblocking DTLS helper functions */
|
||||||
WOLFSSL_API void wolfSSL_dtls_set_using_nonblock(WOLFSSL*, int);
|
WOLFSSL_API void wolfSSL_dtls_set_using_nonblock(WOLFSSL*, int);
|
||||||
WOLFSSL_API int wolfSSL_dtls_get_using_nonblock(WOLFSSL*);
|
WOLFSSL_API int wolfSSL_dtls_get_using_nonblock(WOLFSSL*);
|
||||||
|
Reference in New Issue
Block a user