/* * Copyright (C) 2001-2018 Free Software Foundation, Inc. * Copyright (C) 2015-2018 Red Hat, Inc. * * Author: Nikos Mavrogiannopoulos, Simon Josefsson * * This file is part of GnuTLS. * * The GnuTLS is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public License * as published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this program. If not, see * */ /* Functions that relate to the TLS hello extension parsing. * Hello extensions are packets appended in the TLS hello packet, and * allow for extra functionality. */ #include "gnutls_int.h" #include "hello_ext.h" #include "errors.h" #include "ext/max_record.h" #include #include #include #include #include #include #include #include "ext/supported_groups.h" #include "ext/ec_point_formats.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "extv.h" #include #include #include static void unset_ext_data(gnutls_session_t session, const struct hello_ext_entry_st *, unsigned idx); static void unset_resumed_ext_data(gnutls_session_t session, const struct hello_ext_entry_st *, unsigned idx); static hello_ext_entry_st const *extfunc[MAX_EXT_TYPES+1] = { [GNUTLS_EXTENSION_EXT_MASTER_SECRET] = &ext_mod_ext_master_secret, [GNUTLS_EXTENSION_SUPPORTED_VERSIONS] = &ext_mod_supported_versions, [GNUTLS_EXTENSION_POST_HANDSHAKE] = &ext_mod_post_handshake, [GNUTLS_EXTENSION_ETM] = &ext_mod_etm, #ifdef ENABLE_OCSP [GNUTLS_EXTENSION_STATUS_REQUEST] = &ext_mod_status_request, #endif [GNUTLS_EXTENSION_SERVER_NAME] = &ext_mod_server_name, [GNUTLS_EXTENSION_SAFE_RENEGOTIATION] = &ext_mod_sr, #ifdef ENABLE_SRP [GNUTLS_EXTENSION_SRP] = &ext_mod_srp, #endif #ifdef ENABLE_HEARTBEAT [GNUTLS_EXTENSION_HEARTBEAT] = &ext_mod_heartbeat, #endif [GNUTLS_EXTENSION_SESSION_TICKET] = &ext_mod_session_ticket, [GNUTLS_EXTENSION_CLIENT_CERT_TYPE] = &ext_mod_client_cert_type, [GNUTLS_EXTENSION_SERVER_CERT_TYPE] = &ext_mod_server_cert_type, [GNUTLS_EXTENSION_SUPPORTED_GROUPS] = &ext_mod_supported_groups, [GNUTLS_EXTENSION_SUPPORTED_EC_POINT_FORMATS] = &ext_mod_supported_ec_point_formats, [GNUTLS_EXTENSION_SIGNATURE_ALGORITHMS] = &ext_mod_sig, [GNUTLS_EXTENSION_KEY_SHARE] = &ext_mod_key_share, [GNUTLS_EXTENSION_COOKIE] = &ext_mod_cookie, [GNUTLS_EXTENSION_EARLY_DATA] = &ext_mod_early_data, #ifdef ENABLE_DTLS_SRTP [GNUTLS_EXTENSION_SRTP] = &ext_mod_srtp, #endif #ifdef ENABLE_ALPN [GNUTLS_EXTENSION_ALPN] = &ext_mod_alpn, #endif [GNUTLS_EXTENSION_RECORD_SIZE_LIMIT] = &ext_mod_record_size_limit, [GNUTLS_EXTENSION_MAX_RECORD_SIZE] = &ext_mod_max_record_size, [GNUTLS_EXTENSION_PSK_KE_MODES] = &ext_mod_psk_ke_modes, [GNUTLS_EXTENSION_PRE_SHARED_KEY] = &ext_mod_pre_shared_key, /* This must be the last extension registered. */ [GNUTLS_EXTENSION_DUMBFW] = &ext_mod_dumbfw, }; static const hello_ext_entry_st * gid_to_ext_entry(gnutls_session_t session, extensions_t id) { unsigned i; assert(id < MAX_EXT_TYPES); for (i=0;iinternals.rexts_size;i++) { if (session->internals.rexts[i].gid == id) { return &session->internals.rexts[i]; } } return extfunc[id]; } static const hello_ext_entry_st * tls_id_to_ext_entry(gnutls_session_t session, uint16_t tls_id, gnutls_ext_parse_type_t parse_point) { unsigned i; const hello_ext_entry_st *e; for (i=0;iinternals.rexts_size;i++) { if (session->internals.rexts[i].tls_id == tls_id) { e = &session->internals.rexts[i]; goto done; } } for (i = 0; i < MAX_EXT_TYPES; i++) { if (!extfunc[i]) continue; if (extfunc[i]->tls_id == tls_id) { e = extfunc[i]; goto done; } } return NULL; done: if (parse_point == GNUTLS_EXT_ANY || (IS_SERVER(session) && e->server_parse_point == parse_point) || (!IS_SERVER(session) && e->client_parse_point == parse_point)) { return e; } else { return NULL; } } /** * gnutls_ext_get_name: * @ext: is a TLS extension numeric ID * * Convert a TLS extension numeric ID to a printable string. * * Returns: a pointer to a string that contains the name of the * specified cipher, or %NULL. **/ const char *gnutls_ext_get_name(unsigned int ext) { size_t i; for (i = 0; i < MAX_EXT_TYPES; i++) { if (!extfunc[i]) continue; if (extfunc[i]->tls_id == ext) return extfunc[i]->name; } return NULL; } /* Returns %GNUTLS_EXTENSION_INVALID on error */ static unsigned tls_id_to_gid(gnutls_session_t session, unsigned tls_id) { unsigned i; for (i=0; i < session->internals.rexts_size; i++) { if (session->internals.rexts[i].tls_id == tls_id) return session->internals.rexts[i].gid; } for (i = 0; i < MAX_EXT_TYPES; i++) { if (!extfunc[i]) continue; if (extfunc[i]->tls_id == tls_id) return extfunc[i]->gid; } return GNUTLS_EXTENSION_INVALID; } typedef struct hello_ext_ctx_st { gnutls_session_t session; gnutls_ext_flags_t msg; gnutls_ext_parse_type_t parse_point; const hello_ext_entry_st *ext; /* used during send */ unsigned seen_pre_shared_key; } hello_ext_ctx_st; static int hello_ext_parse(void *_ctx, unsigned tls_id, const uint8_t *data, unsigned data_size) { hello_ext_ctx_st *ctx = _ctx; gnutls_session_t session = ctx->session; const hello_ext_entry_st *ext; int ret; if (tls_id == PRE_SHARED_KEY_TLS_ID) { ctx->seen_pre_shared_key = 1; } else if (ctx->seen_pre_shared_key && session->security_parameters.entity == GNUTLS_SERVER) { /* the pre-shared key extension must always be the last one, * draft-ietf-tls-tls13-28: 4.2.11 */ return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER); } ext = tls_id_to_ext_entry(session, tls_id, ctx->parse_point); if (ext == NULL || ext->recv_func == NULL) { goto ignore; } /* we do not hard fail when extensions defined for TLS are used for * DTLS and vice-versa. They may extend their role in the future. */ if (IS_DTLS(session)) { if (!(ext->validity & GNUTLS_EXT_FLAG_DTLS)) { gnutls_assert(); goto ignore; } } else { if (!(ext->validity & GNUTLS_EXT_FLAG_TLS)) { gnutls_assert(); goto ignore; } } if (session->security_parameters.entity == GNUTLS_CLIENT) { if (!(ext->validity & GNUTLS_EXT_FLAG_IGNORE_CLIENT_REQUEST) && !_gnutls_hello_ext_is_present(session, ext->gid)) { _gnutls_debug_log("EXT[%p]: Received unexpected extension '%s/%d'\n", session, ext->name, (int)tls_id); return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_EXTENSION); } } if ((ext->validity & ctx->msg) == 0) { _gnutls_debug_log("EXT[%p]: Received unexpected extension (%s/%d) for '%s'\n", session, ext->name, (int)tls_id, ext_msg_validity_to_str(ctx->msg)); return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_EXTENSION); } if (session->security_parameters.entity == GNUTLS_SERVER) { ret = _gnutls_hello_ext_save(session, ext->gid, 1); if (ret == 0) return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_EXTENSION); } _gnutls_handshake_log ("EXT[%p]: Parsing extension '%s/%d' (%d bytes)\n", session, ext->name, (int)tls_id, data_size); _gnutls_ext_set_msg(session, ctx->msg); if ((ret = ext->recv_func(session, data, data_size)) < 0) { gnutls_assert(); return ret; } return 0; ignore: if (ext) { _gnutls_handshake_log ("EXT[%p]: Ignoring extension '%s/%d'\n", session, ext->name, (int)tls_id); } return 0; } int _gnutls_parse_hello_extensions(gnutls_session_t session, gnutls_ext_flags_t msg, gnutls_ext_parse_type_t parse_point, const uint8_t * data, int data_size) { int ret; hello_ext_ctx_st ctx; msg &= GNUTLS_EXT_FLAG_SET_ONLY_FLAGS_MASK; ctx.session = session; ctx.msg = msg; ctx.parse_point = parse_point; ctx.seen_pre_shared_key = 0; ret = _gnutls_extv_parse(&ctx, hello_ext_parse, data, data_size); if (ret < 0) return gnutls_assert_val(ret); return 0; } static int hello_ext_send(void *_ctx, gnutls_buffer_st *buf) { hello_ext_ctx_st *ctx = _ctx; int ret; const hello_ext_entry_st *p = ctx->ext; gnutls_session_t session = ctx->session; int appended; size_t size_prev; if (unlikely(p->send_func == NULL)) return 0; if (ctx->parse_point != GNUTLS_EXT_ANY && ((IS_SERVER(session) && p->server_parse_point != ctx->parse_point) || (!IS_SERVER(session) && p->client_parse_point != ctx->parse_point))) { return 0; } if (IS_DTLS(session)) { if (!(p->validity & GNUTLS_EXT_FLAG_DTLS)) { gnutls_assert(); goto skip; } } else { if (!(p->validity & GNUTLS_EXT_FLAG_TLS)) { gnutls_assert(); goto skip; } } if ((ctx->msg & p->validity) == 0) { goto skip; } else { _gnutls_handshake_log("EXT[%p]: Preparing extension (%s/%d) for '%s'\n", session, p->name, (int)p->tls_id, ext_msg_validity_to_str(ctx->msg)); } /* ensure we don't send something twice (i.e, overridden extensions in * client), and ensure we are sending only what we received in server. */ ret = _gnutls_hello_ext_is_present(session, p->gid); if (session->security_parameters.entity == GNUTLS_SERVER) { /* if client didn't advertise and the override flag is not present */ if (!(p->validity & GNUTLS_EXT_FLAG_IGNORE_CLIENT_REQUEST) && ret == 0) return 0; } else { if (ret != 0) /* already sent */ return 0; } size_prev = buf->length; _gnutls_ext_set_msg(session, ctx->msg); ret = p->send_func(session, buf); if (ret < 0 && ret != GNUTLS_E_INT_RET_0) { return gnutls_assert_val(ret); } appended = buf->length - size_prev; /* add this extension to the extension list, to know which extensions * to expect. */ if ((appended > 0 || ret == GNUTLS_E_INT_RET_0) && session->security_parameters.entity == GNUTLS_CLIENT) { _gnutls_hello_ext_save(session, p->gid, 0); } return ret; skip: _gnutls_handshake_log("EXT[%p]: Not sending extension (%s/%d) for '%s'\n", session, p->name, (int)p->tls_id, ext_msg_validity_to_str(ctx->msg)); return 0; } int _gnutls_gen_hello_extensions(gnutls_session_t session, gnutls_buffer_st * buf, gnutls_ext_flags_t msg, gnutls_ext_parse_type_t parse_point) { int pos, ret; size_t i; hello_ext_ctx_st ctx; msg &= GNUTLS_EXT_FLAG_SET_ONLY_FLAGS_MASK; ctx.session = session; ctx.msg = msg; ctx.parse_point = parse_point; ret = _gnutls_extv_append_init(buf); if (ret < 0) return gnutls_assert_val(ret); pos = ret; _gnutls_ext_set_extensions_offset(session, pos); for (i=0; i < session->internals.rexts_size; i++) { ctx.ext = &session->internals.rexts[i]; ret = _gnutls_extv_append(buf, session->internals.rexts[i].tls_id, &ctx, hello_ext_send); if (ret < 0) return gnutls_assert_val(ret); if (ret > 0) _gnutls_handshake_log ("EXT[%p]: Sending extension %s/%d (%d bytes)\n", session, ctx.ext->name, (int)ctx.ext->tls_id, ret-4); } /* hello_ext_send() ensures we don't send duplicates, in case * of overridden extensions */ for (i = 0; i < MAX_EXT_TYPES; i++) { if (!extfunc[i]) continue; ctx.ext = extfunc[i]; ret = _gnutls_extv_append(buf, extfunc[i]->tls_id, &ctx, hello_ext_send); if (ret < 0) return gnutls_assert_val(ret); if (ret > 0) _gnutls_handshake_log ("EXT[%p]: Sending extension %s/%d (%d bytes)\n", session, ctx.ext->name, (int)ctx.ext->tls_id, ret-4); } ret = _gnutls_extv_append_final(buf, pos, !(msg & GNUTLS_EXT_FLAG_EE)); if (ret < 0) return gnutls_assert_val(ret); return 0; } /* Global deinit and init of global extensions */ int _gnutls_hello_ext_init(void) { return GNUTLS_E_SUCCESS; } void _gnutls_hello_ext_deinit(void) { unsigned i; for (i = 0; i < MAX_EXT_TYPES; i++) { if (!extfunc[i]) continue; if (extfunc[i]->free_struct != 0) { gnutls_free(((hello_ext_entry_st *)extfunc[i])->name); gnutls_free(extfunc[i]); } } } /* Packing of extension data (for use in resumption) */ static int pack_extension(gnutls_session_t session, const hello_ext_entry_st *extp, gnutls_buffer_st *packed) { int ret; int size_offset; int cur_size; gnutls_ext_priv_data_t data; int rval = 0; ret = _gnutls_hello_ext_get_priv(session, extp->gid, &data); if (ret >= 0 && extp->pack_func != NULL) { BUFFER_APPEND_NUM(packed, extp->gid); size_offset = packed->length; BUFFER_APPEND_NUM(packed, 0); cur_size = packed->length; ret = extp->pack_func(data, packed); if (ret < 0) { gnutls_assert(); return ret; } rval = 1; /* write the actual size */ _gnutls_write_uint32(packed->length - cur_size, packed->data + size_offset); } return rval; } int _gnutls_hello_ext_pack(gnutls_session_t session, gnutls_buffer_st *packed) { unsigned int i; int ret; int total_exts_pos; int n_exts = 0; const struct hello_ext_entry_st *ext; total_exts_pos = packed->length; BUFFER_APPEND_NUM(packed, 0); for (i = 0; i <= GNUTLS_EXTENSION_MAX_VALUE; i++) { if (session->internals.used_exts & (1< 0) n_exts++; } } _gnutls_write_uint32(n_exts, packed->data + total_exts_pos); return 0; } int _gnutls_ext_set_full_client_hello(gnutls_session_t session, handshake_buffer_st *recv_buf) { int ret; gnutls_buffer_st *buf = &session->internals.full_client_hello; _gnutls_buffer_clear(buf); if ((ret = _gnutls_buffer_append_prefix(buf, 8, recv_buf->htype)) < 0) return gnutls_assert_val(ret); if ((ret = _gnutls_buffer_append_prefix(buf, 24, recv_buf->data.length)) < 0) return gnutls_assert_val(ret); if ((ret = _gnutls_buffer_append_data(buf, recv_buf->data.data, recv_buf->data.length)) < 0) return gnutls_assert_val(ret); return 0; } unsigned _gnutls_ext_get_full_client_hello(gnutls_session_t session, gnutls_datum_t *d) { gnutls_buffer_st *buf = &session->internals.full_client_hello; if (!buf->length) return 0; d->data = buf->data; d->size = buf->length; return 1; } static void _gnutls_ext_set_resumed_session_data(gnutls_session_t session, extensions_t id, gnutls_ext_priv_data_t data) { const struct hello_ext_entry_st *ext; /* If this happens we need to increase the max */ assert(id < MAX_EXT_TYPES); ext = gid_to_ext_entry(session, id); assert(ext != NULL); if (session->internals.ext_data[id].resumed_set != 0) unset_resumed_ext_data(session, ext, id); session->internals.ext_data[id].resumed_priv = data; session->internals.ext_data[id].resumed_set = 1; return; } int _gnutls_hello_ext_unpack(gnutls_session_t session, gnutls_buffer_st * packed) { int i, ret; gnutls_ext_priv_data_t data; int max_exts = 0; extensions_t id; int size_for_id, cur_pos; const struct hello_ext_entry_st *ext; BUFFER_POP_NUM(packed, max_exts); for (i = 0; i < max_exts; i++) { BUFFER_POP_NUM(packed, id); BUFFER_POP_NUM(packed, size_for_id); cur_pos = packed->length; ext = gid_to_ext_entry(session, id); if (ext == NULL || ext->unpack_func == NULL) { gnutls_assert(); return GNUTLS_E_PARSING_ERROR; } ret = ext->unpack_func(packed, &data); if (ret < 0) { gnutls_assert(); return ret; } /* verify that unpack read the correct bytes */ cur_pos = cur_pos - packed->length; if (cur_pos /* read length */ != size_for_id) { gnutls_assert(); return GNUTLS_E_PARSING_ERROR; } _gnutls_ext_set_resumed_session_data(session, id, data); } return 0; error: return ret; } static void unset_ext_data(gnutls_session_t session, const struct hello_ext_entry_st *ext, unsigned idx) { if (session->internals.ext_data[idx].set == 0) return; if (ext && ext->deinit_func && session->internals.ext_data[idx].priv != NULL) ext->deinit_func(session->internals.ext_data[idx].priv); session->internals.ext_data[idx].set = 0; } void _gnutls_hello_ext_unset_priv(gnutls_session_t session, extensions_t id) { const struct hello_ext_entry_st *ext; ext = gid_to_ext_entry(session, id); if (ext) unset_ext_data(session, ext, id); } static void unset_resumed_ext_data(gnutls_session_t session, const struct hello_ext_entry_st *ext, unsigned idx) { if (session->internals.ext_data[idx].resumed_set == 0) return; if (ext && ext->deinit_func && session->internals.ext_data[idx].resumed_priv) { ext->deinit_func(session->internals.ext_data[idx].resumed_priv); } session->internals.ext_data[idx].resumed_set = 0; } /* Deinitializes all data that are associated with TLS extensions. */ void _gnutls_hello_ext_priv_deinit(gnutls_session_t session) { unsigned int i; const struct hello_ext_entry_st *ext; for (i = 0; i < MAX_EXT_TYPES; i++) { if (!session->internals.ext_data[i].set && !session->internals.ext_data[i].resumed_set) continue; ext = gid_to_ext_entry(session, i); if (ext) { unset_ext_data(session, ext, i); unset_resumed_ext_data(session, ext, i); } } } /* This function allows an extension to store data in the current session * and retrieve them later on. We use functions instead of a pointer to a * private pointer, to allow API additions by individual extensions. */ void _gnutls_hello_ext_set_priv(gnutls_session_t session, extensions_t id, gnutls_ext_priv_data_t data) { const struct hello_ext_entry_st *ext; assert(id < MAX_EXT_TYPES); ext = gid_to_ext_entry(session, id); assert(ext != NULL); if (session->internals.ext_data[id].set != 0) { unset_ext_data(session, ext, id); } session->internals.ext_data[id].priv = data; session->internals.ext_data[id].set = 1; return; } int _gnutls_hello_ext_get_priv(gnutls_session_t session, extensions_t id, gnutls_ext_priv_data_t * data) { if (session->internals.ext_data[id].set != 0) { *data = session->internals.ext_data[id].priv; return 0; } return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE; } int _gnutls_hello_ext_get_resumed_priv(gnutls_session_t session, extensions_t id, gnutls_ext_priv_data_t * data) { if (session->internals.ext_data[id].resumed_set != 0) { *data = session->internals.ext_data[id].resumed_priv; return 0; } return GNUTLS_E_INVALID_REQUEST; } /** * gnutls_ext_register: * @name: the name of the extension to register * @id: the numeric TLS id of the extension * @parse_point: the parse type of the extension (see gnutls_ext_parse_type_t) * @recv_func: a function to receive the data * @send_func: a function to send the data * @deinit_func: a function deinitialize any private data * @pack_func: a function which serializes the extension's private data (used on session packing for resumption) * @unpack_func: a function which will deserialize the extension's private data * * This function will register a new extension type. The extension will remain * registered until gnutls_global_deinit() is called. If the extension type * is already registered then %GNUTLS_E_ALREADY_REGISTERED will be returned. * * Each registered extension can store temporary data into the gnutls_session_t * structure using gnutls_ext_set_data(), and they can be retrieved using * gnutls_ext_get_data(). * * Any extensions registered with this function are valid for the client * and TLS1.2 server hello (or encrypted extensions for TLS1.3). * * This function is not thread safe. * * Returns: %GNUTLS_E_SUCCESS on success, otherwise a negative error code. * * Since: 3.4.0 **/ int gnutls_ext_register(const char *name, int id, gnutls_ext_parse_type_t parse_point, gnutls_ext_recv_func recv_func, gnutls_ext_send_func send_func, gnutls_ext_deinit_data_func deinit_func, gnutls_ext_pack_func pack_func, gnutls_ext_unpack_func unpack_func) { hello_ext_entry_st *tmp_mod; unsigned i; unsigned gid = GNUTLS_EXTENSION_MAX+1; for (i = 0; i < MAX_EXT_TYPES; i++) { if (!extfunc[i]) continue; if (extfunc[i]->tls_id == id) return gnutls_assert_val(GNUTLS_E_ALREADY_REGISTERED); if (extfunc[i]->gid >= gid) gid = extfunc[i]->gid + 1; } if (gid > GNUTLS_EXTENSION_MAX_VALUE || gid >= sizeof(extfunc)/sizeof(extfunc[0])) return gnutls_assert_val(GNUTLS_E_MEMORY_ERROR); tmp_mod = gnutls_calloc(1, sizeof(*tmp_mod)); if (tmp_mod == NULL) return gnutls_assert_val(GNUTLS_E_MEMORY_ERROR); tmp_mod->name = gnutls_strdup(name); tmp_mod->free_struct = 1; tmp_mod->tls_id = id; tmp_mod->gid = gid; tmp_mod->client_parse_point = parse_point; tmp_mod->server_parse_point = parse_point; tmp_mod->recv_func = recv_func; tmp_mod->send_func = send_func; tmp_mod->deinit_func = deinit_func; tmp_mod->pack_func = pack_func; tmp_mod->unpack_func = unpack_func; tmp_mod->validity = GNUTLS_EXT_FLAG_CLIENT_HELLO | GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO | GNUTLS_EXT_FLAG_EE | GNUTLS_EXT_FLAG_DTLS | GNUTLS_EXT_FLAG_TLS; assert(extfunc[gid] == NULL); extfunc[gid] = tmp_mod; return 0; } #define VALIDITY_MASK (GNUTLS_EXT_FLAG_CLIENT_HELLO | GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO | \ GNUTLS_EXT_FLAG_TLS13_SERVER_HELLO | \ GNUTLS_EXT_FLAG_EE | GNUTLS_EXT_FLAG_HRR) /** * gnutls_session_ext_register: * @session: the session for which this extension will be set * @name: the name of the extension to register * @id: the numeric id of the extension * @parse_point: the parse type of the extension (see gnutls_ext_parse_type_t) * @recv_func: a function to receive the data * @send_func: a function to send the data * @deinit_func: a function deinitialize any private data * @pack_func: a function which serializes the extension's private data (used on session packing for resumption) * @unpack_func: a function which will deserialize the extension's private data * @flags: must be zero or flags from %gnutls_ext_flags_t * * This function will register a new extension type. The extension will be * only usable within the registered session. If the extension type * is already registered then %GNUTLS_E_ALREADY_REGISTERED will be returned, * unless the flag %GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL is specified. The latter * flag when specified can be used to override certain extensions introduced * after 3.6.0. It is expected to be used by applications which handle * custom extensions that are not currently supported in GnuTLS, but direct * support for them may be added in the future. * * Each registered extension can store temporary data into the gnutls_session_t * structure using gnutls_ext_set_data(), and they can be retrieved using * gnutls_ext_get_data(). * * The validity of the extension registered can be given by the appropriate flags * of %gnutls_ext_flags_t. If no validity is given, then the registered extension * will be valid for client and TLS1.2 server hello (or encrypted extensions for TLS1.3). * * Returns: %GNUTLS_E_SUCCESS on success, otherwise a negative error code. * * Since: 3.5.5 **/ int gnutls_session_ext_register(gnutls_session_t session, const char *name, int id, gnutls_ext_parse_type_t parse_point, gnutls_ext_recv_func recv_func, gnutls_ext_send_func send_func, gnutls_ext_deinit_data_func deinit_func, gnutls_ext_pack_func pack_func, gnutls_ext_unpack_func unpack_func, unsigned flags) { hello_ext_entry_st tmp_mod; hello_ext_entry_st *exts; unsigned i; unsigned gid = GNUTLS_EXTENSION_MAX+1; /* reject handling any extensions which modify the TLS handshake * in any way, or are mapped to an exported API. */ for (i = 0; i < GNUTLS_EXTENSION_MAX; i++) { if (!extfunc[i]) continue; if (extfunc[i]->tls_id == id) { if (!(flags & GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL)) { return gnutls_assert_val(GNUTLS_E_ALREADY_REGISTERED); } else if (extfunc[i]->cannot_be_overriden) { return gnutls_assert_val(GNUTLS_E_ALREADY_REGISTERED); } break; } if (extfunc[i]->gid >= gid) gid = extfunc[i]->gid + 1; } for (i=0;iinternals.rexts_size;i++) { if (session->internals.rexts[i].tls_id == id) { return gnutls_assert_val(GNUTLS_E_ALREADY_REGISTERED); } if (session->internals.rexts[i].gid >= gid) gid = session->internals.rexts[i].gid + 1; } if (gid > GNUTLS_EXTENSION_MAX_VALUE) return gnutls_assert_val(GNUTLS_E_MEMORY_ERROR); memset(&tmp_mod, 0, sizeof(hello_ext_entry_st)); tmp_mod.free_struct = 1; tmp_mod.tls_id = id; tmp_mod.gid = gid; tmp_mod.client_parse_point = parse_point; tmp_mod.server_parse_point = parse_point; tmp_mod.recv_func = recv_func; tmp_mod.send_func = send_func; tmp_mod.deinit_func = deinit_func; tmp_mod.pack_func = pack_func; tmp_mod.unpack_func = unpack_func; tmp_mod.validity = flags; if ((tmp_mod.validity & VALIDITY_MASK) == 0) { tmp_mod.validity = GNUTLS_EXT_FLAG_CLIENT_HELLO | GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO | GNUTLS_EXT_FLAG_EE; } if ((tmp_mod.validity & (GNUTLS_EXT_FLAG_DTLS | GNUTLS_EXT_FLAG_TLS)) == 0) { if (IS_DTLS(session)) tmp_mod.validity |= GNUTLS_EXT_FLAG_DTLS; else tmp_mod.validity |= GNUTLS_EXT_FLAG_TLS; } exts = gnutls_realloc(session->internals.rexts, (session->internals.rexts_size+1)*sizeof(*exts)); if (exts == NULL) { return gnutls_assert_val(GNUTLS_E_MEMORY_ERROR); } session->internals.rexts = exts; memcpy(&session->internals.rexts[session->internals.rexts_size], &tmp_mod, sizeof(hello_ext_entry_st)); session->internals.rexts_size++; return 0; } /** * gnutls_ext_set_data: * @session: a #gnutls_session_t opaque pointer * @tls_id: the numeric id of the extension * @data: the private data to set * * This function allows an extension handler to store data in the current session * and retrieve them later on. The set data will be deallocated using * the gnutls_ext_deinit_data_func. * * Since: 3.4.0 **/ void gnutls_ext_set_data(gnutls_session_t session, unsigned tls_id, gnutls_ext_priv_data_t data) { unsigned id = tls_id_to_gid(session, tls_id); if (id == GNUTLS_EXTENSION_INVALID) return; _gnutls_hello_ext_set_priv(session, id, data); } /** * gnutls_ext_get_data: * @session: a #gnutls_session_t opaque pointer * @tls_id: the numeric id of the extension * @data: a pointer to the private data to retrieve * * This function retrieves any data previously stored with gnutls_ext_set_data(). * * Returns: %GNUTLS_E_SUCCESS on success, otherwise a negative error code. * * Since: 3.4.0 **/ int gnutls_ext_get_data(gnutls_session_t session, unsigned tls_id, gnutls_ext_priv_data_t *data) { unsigned id = tls_id_to_gid(session, tls_id); if (id == GNUTLS_EXTENSION_INVALID) return gnutls_assert_val(GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE); return _gnutls_hello_ext_get_priv(session, id, data); } /** * gnutls_ext_get_current_msg: * @session: a #gnutls_session_t opaque pointer * * This function allows an extension handler to obtain the message * this extension is being called from. The returned value is a single * entry of the %gnutls_ext_flags_t enumeration. That is, if an * extension was registered with the %GNUTLS_EXT_FLAG_HRR and * %GNUTLS_EXT_FLAG_EE flags, the value when called during parsing of the * encrypted extensions message will be %GNUTLS_EXT_FLAG_EE. * * If not called under an extension handler, its value is undefined. * * Since: 3.6.3 **/ unsigned gnutls_ext_get_current_msg(gnutls_session_t session) { return _gnutls_ext_get_msg(session); }