--- /dev/null
+/*
+ * Copyright (c) 2002 Apple Computer, Inc. All Rights Reserved.
+ *
+ * The contents of this file constitute Original Code as defined in and are
+ * subject to the Apple Public Source License Version 1.2 (the 'License').
+ * You may not use this file except in compliance with the License. Please obtain
+ * a copy of the License at http://www.apple.com/publicsource and read it before
+ * using this file.
+ *
+ * This Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
+ * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
+ * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
+ * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
+ * specific language governing rights and limitations under the License.
+ */
+
+
+/*
+ File: ssl3Callouts.cpp
+
+ Contains: SSLv3-specific routines for SslTlsCallouts.
+
+ Written by: Doug Mitchell
+*/
+
+#include "sslMemory.h"
+#include "tls_ssl.h"
+#include "sslUtils.h"
+#include "sslDigests.h"
+#include "ssl2.h"
+#include "sslDebug.h"
+#include "sslAlertMessage.h"
+
+#include <assert.h>
+#include <strings.h>
+
+/*
+ * ssl3WriteRecord does not send alerts on failure, out of the assumption/fear
+ * that this might result in a loop (since sending an alert causes ssl3WriteRecord
+ * to be called).
+ *
+ * As far as I can tell, we can use this same routine for SSLv3 and TLSv1, as long
+ * as we're not trying to use the "variable length padding" feature of TLSv1.
+ * OpenSSL doesn't use that feature; for now, neither will we. Thus this routine
+ * is used for the SslTlsCallouts.writeRecord function for both protocols.
+ */
+OSStatus ssl3WriteRecord(
+ SSLRecord rec,
+ SSLContext *ctx)
+{
+ OSStatus err;
+ int padding = 0, i;
+ WaitingRecord *out, *queue;
+ SSLBuffer buf, payload, mac;
+ UInt8 *charPtr;
+ UInt16 payloadSize,blockSize;
+
+ switch(rec.protocolVersion) {
+ case SSL_Version_2_0:
+ return SSL2WriteRecord(rec, ctx);
+ case SSL_Version_3_0:
+ case TLS_Version_1_0:
+ break;
+ default:
+ assert(0);
+ return errSSLInternal;
+ }
+ assert(rec.contents.length <= 16384);
+
+ out = 0;
+ /* Allocate a WaitingRecord to store our ready-to-send record in */
+ if ((err = SSLAllocBuffer(buf, sizeof(WaitingRecord), ctx)) != 0)
+ return err;
+ out = (WaitingRecord*)buf.data;
+ out->next = 0;
+ out->sent = 0;
+ /* Allocate enough room for the transmitted record, which will be:
+ * 5 bytes of header +
+ * encrypted contents +
+ * macLength +
+ * padding [block ciphers only] +
+ * padding length field (1 byte) [block ciphers only]
+ */
+ payloadSize = (UInt16) (rec.contents.length + ctx->writeCipher.macRef->hash->digestSize);
+ blockSize = ctx->writeCipher.symCipher->blockSize;
+ if (blockSize > 0)
+ { padding = blockSize - (payloadSize % blockSize) - 1;
+ payloadSize += padding + 1;
+ }
+ out->data.data = 0;
+ if ((err = SSLAllocBuffer(out->data, 5 + payloadSize, ctx)) != 0)
+ goto fail;
+
+ charPtr = out->data.data;
+ *(charPtr++) = rec.contentType;
+ charPtr = SSLEncodeInt(charPtr, rec.protocolVersion, 2);
+ charPtr = SSLEncodeInt(charPtr, payloadSize, 2);
+
+ /* Copy the contents into the output buffer */
+ memcpy(charPtr, rec.contents.data, rec.contents.length);
+ payload.data = charPtr;
+ payload.length = rec.contents.length;
+
+ charPtr += rec.contents.length;
+ /* MAC immediately follows data */
+ mac.data = charPtr;
+ mac.length = ctx->writeCipher.macRef->hash->digestSize;
+ charPtr += mac.length;
+
+ /* MAC the data */
+ if (mac.length > 0) /* Optimize away null case */
+ {
+ assert(ctx->sslTslCalls != NULL);
+ if ((err = ctx->sslTslCalls->computeMac(rec.contentType,
+ payload,
+ mac,
+ &ctx->writeCipher,
+ ctx->writeCipher.sequenceNum,
+ ctx)) != 0)
+ goto fail;
+ }
+
+ /* Update payload to reflect encrypted data: contents, mac & padding */
+ payload.length = payloadSize;
+
+ /* Fill in the padding bytes & padding length field with the padding value; the
+ * protocol only requires the last byte,
+ * but filling them all in avoids leaking data
+ */
+ if (ctx->writeCipher.symCipher->blockSize > 0)
+ for (i = 1; i <= padding + 1; ++i)
+ payload.data[payload.length - i] = padding;
+
+ /* Encrypt the data */
+ if ((err = ctx->writeCipher.symCipher->encrypt(payload,
+ payload,
+ &ctx->writeCipher,
+ ctx)) != 0)
+ goto fail;
+
+ /* Enqueue the record to be written from the idle loop */
+ if (ctx->recordWriteQueue == 0)
+ ctx->recordWriteQueue = out;
+ else
+ { queue = ctx->recordWriteQueue;
+ while (queue->next != 0)
+ queue = queue->next;
+ queue->next = out;
+ }
+
+ /* Increment the sequence number */
+ IncrementUInt64(&ctx->writeCipher.sequenceNum);
+
+ return noErr;
+
+fail:
+ /*
+ * Only for if we fail between when the WaitingRecord is allocated and when
+ * it is queued
+ */
+ SSLFreeBuffer(out->data, ctx);
+ buf.data = (UInt8*)out;
+ buf.length = sizeof(WaitingRecord);
+ SSLFreeBuffer(buf, ctx);
+ return err;
+}
+
+static OSStatus ssl3DecryptRecord(
+ UInt8 type,
+ SSLBuffer *payload,
+ SSLContext *ctx)
+{
+ OSStatus err;
+ SSLBuffer content;
+
+ if ((ctx->readCipher.symCipher->blockSize > 0) &&
+ ((payload->length % ctx->readCipher.symCipher->blockSize) != 0))
+ { SSLFatalSessionAlert(SSL_AlertUnexpectedMsg, ctx);
+ return errSSLProtocol;
+ }
+
+ /* Decrypt in place */
+ if ((err = ctx->readCipher.symCipher->decrypt(*payload,
+ *payload,
+ &ctx->readCipher,
+ ctx)) != 0)
+ { SSLFatalSessionAlert(SSL_AlertCloseNotify, ctx);
+ return err;
+ }
+
+ /* Locate content within decrypted payload */
+ content.data = payload->data;
+ content.length = payload->length - ctx->readCipher.macRef->hash->digestSize;
+ if (ctx->readCipher.symCipher->blockSize > 0)
+ { /* padding can't be equal to or more than a block */
+ if (payload->data[payload->length - 1] >= ctx->readCipher.symCipher->blockSize)
+ { SSLFatalSessionAlert(SSL_AlertUnexpectedMsg, ctx);
+ sslErrorLog("DecryptSSLRecord: bad padding length (%d)\n",
+ (unsigned)payload->data[payload->length - 1]);
+ return errSSLProtocol;
+ }
+ content.length -= 1 + payload->data[payload->length - 1];
+ /* Remove block size padding */
+ }
+
+ /* Verify MAC on payload */
+ if (ctx->readCipher.macRef->hash->digestSize > 0)
+ /* Optimize away MAC for null case */
+ if ((err = SSLVerifyMac(type, content,
+ payload->data + content.length, ctx)) != 0)
+ { SSLFatalSessionAlert(SSL_AlertBadRecordMac, ctx);
+ return err;
+ }
+
+ *payload = content; /* Modify payload buffer to indicate content length */
+
+ return noErr;
+}
+
+/* initialize a per-CipherContext HashHmacContext for use in MACing each record */
+static OSStatus ssl3InitMac (
+ CipherContext *cipherCtx, // macRef, macSecret valid on entry
+ // macCtx valid on return
+ SSLContext *ctx)
+{
+ const HashReference *hash;
+ SSLBuffer *hashCtx;
+ OSStatus serr;
+
+ assert(cipherCtx->macRef != NULL);
+ hash = cipherCtx->macRef->hash;
+ assert(hash != NULL);
+
+ hashCtx = &cipherCtx->macCtx.hashCtx;
+ if(hashCtx->data != NULL) {
+ SSLFreeBuffer(*hashCtx, ctx);
+ }
+ serr = SSLAllocBuffer(*hashCtx, hash->contextSize, ctx);
+ if(serr) {
+ return serr;
+ }
+ return noErr;
+}
+
+static OSStatus ssl3FreeMac (
+ CipherContext *cipherCtx)
+{
+ SSLBuffer *hashCtx;
+
+ assert(cipherCtx != NULL);
+ /* this can be called on a completely zeroed out CipherContext... */
+ if(cipherCtx->macRef == NULL) {
+ return noErr;
+ }
+ hashCtx = &cipherCtx->macCtx.hashCtx;
+ if(hashCtx->data != NULL) {
+ sslFree(hashCtx->data);
+ hashCtx->data = NULL;
+ }
+ hashCtx->length = 0;
+ return noErr;
+}
+
+static OSStatus ssl3ComputeMac (
+ UInt8 type,
+ SSLBuffer data,
+ SSLBuffer mac, // caller mallocs data
+ CipherContext *cipherCtx, // assumes macCtx, macRef
+ sslUint64 seqNo,
+ SSLContext *ctx)
+{
+ OSStatus err;
+ UInt8 innerDigestData[SSL_MAX_DIGEST_LEN];
+ UInt8 scratchData[11], *charPtr;
+ SSLBuffer digest, digestCtx, scratch;
+ SSLBuffer secret;
+
+ const HashReference *hash;
+
+ assert(cipherCtx != NULL);
+ assert(cipherCtx->macRef != NULL);
+ hash = cipherCtx->macRef->hash;
+ assert(hash != NULL);
+ assert(hash->macPadSize <= MAX_MAC_PADDING);
+ assert(hash->digestSize <= SSL_MAX_DIGEST_LEN);
+ digestCtx = cipherCtx->macCtx.hashCtx; // may be NULL, for null cipher
+ secret.data = cipherCtx->macSecret;
+ secret.length = hash->digestSize;
+
+ /* init'd early in SSLNewContext() */
+ assert(SSLMACPad1[0] == 0x36 && SSLMACPad2[0] == 0x5C);
+
+ /*
+ * MAC = hash( MAC_write_secret + pad_2 +
+ * hash( MAC_write_secret + pad_1 + seq_num + type +
+ * length + content )
+ * )
+ */
+ if ((err = hash->init(digestCtx, ctx)) != 0)
+ goto exit;
+ if ((err = hash->update(digestCtx, secret)) != 0) /* MAC secret */
+ goto exit;
+ scratch.data = (UInt8 *)SSLMACPad1;
+ scratch.length = hash->macPadSize;
+ if ((err = hash->update(digestCtx, scratch)) != 0) /* pad1 */
+ goto exit;
+ charPtr = scratchData;
+ charPtr = SSLEncodeUInt64(charPtr, seqNo);
+ *charPtr++ = type;
+ charPtr = SSLEncodeInt(charPtr, data.length, 2);
+ scratch.data = scratchData;
+ scratch.length = 11;
+ assert(charPtr = scratchData+11);
+ if ((err = hash->update(digestCtx, scratch)) != 0)
+ /* sequenceNo, type & length */
+ goto exit;
+ if ((err = hash->update(digestCtx, data)) != 0) /* content */
+ goto exit;
+ digest.data = innerDigestData;
+ digest.length = hash->digestSize;
+ if ((err = hash->final(digestCtx, digest)) != 0) /* figure inner digest */
+ goto exit;
+
+ if ((err = hash->init(digestCtx, ctx)) != 0)
+ goto exit;
+ if ((err = hash->update(digestCtx, secret)) != 0) /* MAC secret */
+ goto exit;
+ scratch.data = (UInt8 *)SSLMACPad2;
+ scratch.length = hash->macPadSize;
+ if ((err = hash->update(digestCtx, scratch)) != 0) /* pad2 */
+ goto exit;
+ if ((err = hash->update(digestCtx, digest)) != 0) /* inner digest */
+ goto exit;
+ if ((err = hash->final(digestCtx, mac)) != 0) /* figure the mac */
+ goto exit;
+
+ err = noErr; /* redundant, I know */
+
+exit:
+ return err;
+}
+
+#define LOG_GEN_KEY 0
+
+/*
+ * On input, the following are valid:
+ * MasterSecret[48]
+ * ClientHello.random[32]
+ * ServerHello.random[32]
+ *
+ * key_block =
+ * MD5(master_secret + SHA(`A' + master_secret +
+ * ServerHello.random +
+ * ClientHello.random)) +
+ * MD5(master_secret + SHA(`BB' + master_secret +
+ * ServerHello.random +
+ * ClientHello.random)) +
+ * MD5(master_secret + SHA(`CCC' + master_secret +
+ * ServerHello.random +
+ * ClientHello.random)) + [...];
+ */
+static OSStatus ssl3GenerateKeyMaterial (
+ SSLBuffer key, // caller mallocs and specifies length of
+ // required key material here
+ SSLContext *ctx)
+{
+ OSStatus err;
+ UInt8 leaderData[10]; /* Max of 10 hashes
+ * (* 16 bytes/hash = 160 bytes of key) */
+ UInt8 shaHashData[20], md5HashData[16];
+ SSLBuffer shaContext, md5Context;
+ UInt8 *keyProgress;
+ int i,j,remaining, satisfied;
+ SSLBuffer leader, masterSecret, serverRandom, clientRandom, shaHash, md5Hash;
+
+ #if LOG_GEN_KEY
+ printf("GenerateKey: master ");
+ for(i=0; i<SSL_MASTER_SECRET_SIZE; i++) {
+ printf("%02X ", ctx->masterSecret[i]);
+ }
+ printf("\n");
+ #endif
+
+ assert(key.length <= 16 * sizeof(leaderData));
+
+ leader.data = leaderData;
+ masterSecret.data = ctx->masterSecret;
+ masterSecret.length = SSL_MASTER_SECRET_SIZE;
+ serverRandom.data = ctx->serverRandom;
+ serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE;
+ clientRandom.data = ctx->clientRandom;
+ clientRandom.length = SSL_CLIENT_SRVR_RAND_SIZE;
+ shaHash.data = shaHashData;
+ shaHash.length = 20;
+ md5Hash.data = md5HashData;
+ md5Hash.length = 16;
+
+ md5Context.data = 0;
+ shaContext.data = 0;
+ if ((err = ReadyHash(SSLHashMD5, md5Context, ctx)) != 0)
+ goto fail;
+ if ((err = ReadyHash(SSLHashSHA1, shaContext, ctx)) != 0)
+ goto fail;
+
+ keyProgress = key.data;
+ remaining = key.length;
+
+ for (i = 0; remaining > 0; ++i)
+ { for (j = 0; j <= i; j++)
+ leaderData[j] = 0x41 + i; /* 'A', 'BB', 'CCC', etc. */
+ leader.length = i+1;
+
+ if ((err = SSLHashSHA1.update(shaContext, leader)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.update(shaContext, masterSecret)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.update(shaContext, serverRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.update(shaContext, clientRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.final(shaContext, shaHash)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(md5Context, masterSecret)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(md5Context, shaHash)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.final(md5Context, md5Hash)) != 0)
+ goto fail;
+
+ satisfied = 16;
+ if (remaining < 16)
+ satisfied = remaining;
+ memcpy(keyProgress, md5HashData, satisfied);
+ remaining -= satisfied;
+ keyProgress += satisfied;
+
+ if(remaining > 0) {
+ /* at top of loop, this was done in ReadyHash() */
+ if ((err = SSLHashMD5.init(md5Context, ctx)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.init(shaContext, ctx)) != 0)
+ goto fail;
+ }
+ }
+
+ assert(remaining == 0 && keyProgress == (key.data + key.length));
+ err = noErr;
+fail:
+ SSLFreeBuffer(md5Context, ctx);
+ SSLFreeBuffer(shaContext, ctx);
+
+ #if LOG_GEN_KEY
+ printf("GenerateKey: DONE\n");
+ #endif
+ return err;
+}
+
+static OSStatus ssl3GenerateExportKeyAndIv (
+ SSLContext *ctx, // clientRandom, serverRandom valid
+ const SSLBuffer clientWriteKey,
+ const SSLBuffer serverWriteKey,
+ SSLBuffer finalClientWriteKey, // RETURNED, mallocd by caller
+ SSLBuffer finalServerWriteKey, // RETURNED, mallocd by caller
+ SSLBuffer finalClientIV, // RETURNED, mallocd by caller
+ SSLBuffer finalServerIV) // RETURNED, mallocd by caller
+{
+ OSStatus err;
+ SSLBuffer hashCtx, serverRandom, clientRandom;
+
+ /* random blobs are 32 bytes */
+ serverRandom.data = ctx->serverRandom;
+ serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE;
+ clientRandom.data = ctx->clientRandom;
+ clientRandom.length = SSL_CLIENT_SRVR_RAND_SIZE;
+
+ if ((err = SSLAllocBuffer(hashCtx, SSLHashMD5.contextSize, ctx)) != 0)
+ return err;
+ /* client write key */
+ if ((err = SSLHashMD5.init(hashCtx, ctx)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, clientWriteKey)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, clientRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, serverRandom)) != 0)
+ goto fail;
+ finalClientWriteKey.length = 16;
+ if ((err = SSLHashMD5.final(hashCtx, finalClientWriteKey)) != 0)
+ goto fail;
+
+ /* optional client IV */
+ if (ctx->selectedCipherSpec->cipher->ivSize > 0)
+ { if ((err = SSLHashMD5.init(hashCtx, ctx)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, clientRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, serverRandom)) != 0)
+ goto fail;
+ finalClientIV.length = 16;
+ if ((err = SSLHashMD5.final(hashCtx, finalClientIV)) != 0)
+ goto fail;
+ }
+
+ /* server write key */
+ if ((err = SSLHashMD5.init(hashCtx, ctx)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, serverWriteKey)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, serverRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, clientRandom)) != 0)
+ goto fail;
+ finalServerWriteKey.length = 16;
+ if ((err = SSLHashMD5.final(hashCtx, finalServerWriteKey)) != 0)
+ goto fail;
+
+ /* optional server IV */
+ if (ctx->selectedCipherSpec->cipher->ivSize > 0)
+ { if ((err = SSLHashMD5.init(hashCtx, ctx)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, serverRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(hashCtx, clientRandom)) != 0)
+ goto fail;
+ finalServerIV.length = 16;
+ if ((err = SSLHashMD5.final(hashCtx, finalServerIV)) != 0)
+ goto fail;
+ }
+
+ err = noErr;
+fail:
+ SSLFreeBuffer(hashCtx, ctx);
+ return err;
+}
+
+/*
+ * On entry: clientRandom, serverRandom, preMasterSecret valid
+ * On return: masterSecret valid
+ */
+static OSStatus ssl3GenerateMasterSecret (
+ SSLContext *ctx)
+{
+ OSStatus err;
+ SSLBuffer shaState, md5State, clientRandom,
+ serverRandom, shaHash, md5Hash, leader;
+ UInt8 *masterProgress, shaHashData[20], leaderData[3];
+ int i;
+
+ md5State.data = shaState.data = 0;
+ if ((err = SSLAllocBuffer(md5State, SSLHashMD5.contextSize, ctx)) != 0)
+ goto fail;
+ if ((err = SSLAllocBuffer(shaState, SSLHashSHA1.contextSize, ctx)) != 0)
+ goto fail;
+
+ clientRandom.data = ctx->clientRandom;
+ clientRandom.length = SSL_CLIENT_SRVR_RAND_SIZE;
+ serverRandom.data = ctx->serverRandom;
+ serverRandom.length = SSL_CLIENT_SRVR_RAND_SIZE;
+ shaHash.data = shaHashData;
+ shaHash.length = 20;
+
+ masterProgress = ctx->masterSecret;
+
+ for (i = 1; i <= 3; i++)
+ { if ((err = SSLHashMD5.init(md5State, ctx)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.init(shaState, ctx)) != 0)
+ goto fail;
+
+ leaderData[0] = leaderData[1] = leaderData[2] = 0x40 + i; /* 'A', 'B', etc. */
+ leader.data = leaderData;
+ leader.length = i;
+
+ if ((err = SSLHashSHA1.update(shaState, leader)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.update(shaState, ctx->preMasterSecret)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.update(shaState, clientRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.update(shaState, serverRandom)) != 0)
+ goto fail;
+ if ((err = SSLHashSHA1.final(shaState, shaHash)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(md5State, ctx->preMasterSecret)) != 0)
+ goto fail;
+ if ((err = SSLHashMD5.update(md5State, shaHash)) != 0)
+ goto fail;
+ md5Hash.data = masterProgress;
+ md5Hash.length = 16;
+ if ((err = SSLHashMD5.final(md5State, md5Hash)) != 0)
+ goto fail;
+ masterProgress += 16;
+ }
+
+ err = noErr;
+fail:
+ SSLFreeBuffer(shaState, ctx);
+ SSLFreeBuffer(md5State, ctx);
+ return err;
+}
+
+/* common routine to compute a Mac for finished message and cert verify message */
+static OSStatus
+ssl3CalculateFinishedMessage(
+ SSLContext *ctx,
+ SSLBuffer finished, // mallocd by caller
+ SSLBuffer shaMsgState, // running total
+ SSLBuffer md5MsgState, // ditto
+ UInt32 senderID) // optional, nonzero for finished message
+{
+ OSStatus err;
+ SSLBuffer hash, input;
+ UInt8 sender[4], md5Inner[16], shaInner[20];
+
+ // assert(finished.length == 36);
+
+ if (senderID != 0) {
+ SSLEncodeInt(sender, senderID, 4);
+ input.data = sender;
+ input.length = 4;
+ if ((err = SSLHashMD5.update(md5MsgState, input)) != 0)
+ return err;
+ if ((err = SSLHashSHA1.update(shaMsgState, input)) != 0)
+ return err;
+ }
+ input.data = ctx->masterSecret;
+ input.length = SSL_MASTER_SECRET_SIZE;
+ if ((err = SSLHashMD5.update(md5MsgState, input)) != 0)
+ return err;
+ if ((err = SSLHashSHA1.update(shaMsgState, input)) != 0)
+ return err;
+ input.data = (UInt8 *)SSLMACPad1;
+ input.length = SSLHashMD5.macPadSize;
+ if ((err = SSLHashMD5.update(md5MsgState, input)) != 0)
+ return err;
+ input.length = SSLHashSHA1.macPadSize;
+ if ((err = SSLHashSHA1.update(shaMsgState, input)) != 0)
+ return err;
+ hash.data = md5Inner;
+ hash.length = 16;
+ if ((err = SSLHashMD5.final(md5MsgState, hash)) != 0)
+ return err;
+ hash.data = shaInner;
+ hash.length = 20;
+ if ((err = SSLHashSHA1.final(shaMsgState, hash)) != 0)
+ return err;
+ if ((err = SSLHashMD5.init(md5MsgState, ctx)) != 0)
+ return err;
+ if ((err = SSLHashSHA1.init(shaMsgState, ctx)) != 0)
+ return err;
+ input.data = ctx->masterSecret;
+ input.length = SSL_MASTER_SECRET_SIZE;
+ if ((err = SSLHashMD5.update(md5MsgState, input)) != 0)
+ return err;
+ if ((err = SSLHashSHA1.update(shaMsgState, input)) != 0)
+ return err;
+ input.data = (UInt8 *)SSLMACPad2;
+ input.length = SSLHashMD5.macPadSize;
+ if ((err = SSLHashMD5.update(md5MsgState, input)) != 0)
+ return err;
+ input.length = SSLHashSHA1.macPadSize;
+ if ((err = SSLHashSHA1.update(shaMsgState, input)) != 0)
+ return err;
+ input.data = md5Inner;
+ input.length = 16;
+ if ((err = SSLHashMD5.update(md5MsgState, input)) != 0)
+ return err;
+ hash.data = finished.data;
+ hash.length = 16;
+ if ((err = SSLHashMD5.final(md5MsgState, hash)) != 0)
+ return err;
+ input.data = shaInner;
+ input.length = 20;
+ if ((err = SSLHashSHA1.update(shaMsgState, input)) != 0)
+ return err;
+ hash.data = finished.data + 16;
+ hash.length = 20;
+ if ((err = SSLHashSHA1.final(shaMsgState, hash)) != 0)
+ return err;
+ return noErr;
+}
+
+
+static OSStatus ssl3ComputeFinishedMac (
+ SSLContext *ctx,
+ SSLBuffer finished, // output - mallocd by caller
+ SSLBuffer shaMsgState, // clone of running digest of all handshake msgs
+ SSLBuffer md5MsgState, // ditto
+ Boolean isServer) // refers to message, not us
+{
+ return ssl3CalculateFinishedMessage(ctx, finished, shaMsgState, md5MsgState,
+ isServer ? SSL_Finished_Sender_Server : SSL_Finished_Sender_Client);
+}
+
+static OSStatus ssl3ComputeCertVfyMac (
+ SSLContext *ctx,
+ SSLBuffer finished, // output - mallocd by caller
+ SSLBuffer shaMsgState, // clone of running digest of all handshake msgs
+ SSLBuffer md5MsgState) // ditto
+{
+ return ssl3CalculateFinishedMessage(ctx, finished, shaMsgState, md5MsgState, 0);
+}
+
+const SslTlsCallouts Ssl3Callouts = {
+ ssl3DecryptRecord,
+ ssl3WriteRecord,
+ ssl3InitMac,
+ ssl3FreeMac,
+ ssl3ComputeMac,
+ ssl3GenerateKeyMaterial,
+ ssl3GenerateExportKeyAndIv,
+ ssl3GenerateMasterSecret,
+ ssl3ComputeFinishedMac,
+ ssl3ComputeCertVfyMac
+};