18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/*
28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * TLSv1 common routines
38d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
58d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This program is free software; you can redistribute it and/or modify
68d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * it under the terms of the GNU General Public License version 2 as
78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * published by the Free Software Foundation.
88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Alternatively, this software may be distributed under the terms of BSD
108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * license.
118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * See README and COPYING for more details.
138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "includes.h"
168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common.h"
188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "x509v3.h"
198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "tlsv1_common.h"
208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/*
238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * TODO:
248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * RFC 2246 Section 9: Mandatory to implement TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Add support for commonly used cipher suites; don't bother with exportable
268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * suites.
278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic const struct tls_cipher_suite tls_cipher_suites[] = {
308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_NULL_WITH_NULL_NULL, TLS_KEY_X_NULL, TLS_CIPHER_NULL,
318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_HASH_NULL },
328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_RSA_WITH_RC4_128_MD5, TLS_KEY_X_RSA, TLS_CIPHER_RC4_128,
338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_HASH_MD5 },
348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_RSA_WITH_RC4_128_SHA, TLS_KEY_X_RSA, TLS_CIPHER_RC4_128,
358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_HASH_SHA },
368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_RSA_WITH_DES_CBC_SHA, TLS_KEY_X_RSA, TLS_CIPHER_DES_CBC,
378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_HASH_SHA },
388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_KEY_X_RSA,
398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_CIPHER_3DES_EDE_CBC, TLS_HASH_SHA },
408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 	{ TLS_DH_anon_WITH_RC4_128_MD5, TLS_KEY_X_DH_anon,
418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_CIPHER_RC4_128, TLS_HASH_MD5 },
428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 	{ TLS_DH_anon_WITH_DES_CBC_SHA, TLS_KEY_X_DH_anon,
438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_CIPHER_DES_CBC, TLS_HASH_SHA },
448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 	{ TLS_DH_anon_WITH_3DES_EDE_CBC_SHA, TLS_KEY_X_DH_anon,
458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_CIPHER_3DES_EDE_CBC, TLS_HASH_SHA },
468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_RSA_WITH_AES_128_CBC_SHA, TLS_KEY_X_RSA, TLS_CIPHER_AES_128_CBC,
478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_HASH_SHA },
488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_KEY_X_DH_anon,
498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_CIPHER_AES_128_CBC, TLS_HASH_SHA },
508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_RSA_WITH_AES_256_CBC_SHA, TLS_KEY_X_RSA, TLS_CIPHER_AES_256_CBC,
518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_HASH_SHA },
528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_KEY_X_DH_anon,
538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  TLS_CIPHER_AES_256_CBC, TLS_HASH_SHA }
548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt};
558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define NUM_ELEMS(a) (sizeof(a) / sizeof((a)[0]))
578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define NUM_TLS_CIPHER_SUITES NUM_ELEMS(tls_cipher_suites)
588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic const struct tls_cipher_data tls_ciphers[] = {
618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_NULL,         TLS_CIPHER_STREAM,  0,  0,  0,
628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_NULL },
638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_IDEA_CBC,     TLS_CIPHER_BLOCK,  16, 16,  8,
648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_NULL },
658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_RC2_CBC_40,   TLS_CIPHER_BLOCK,   5, 16,  0,
668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_RC2 },
678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_RC4_40,       TLS_CIPHER_STREAM,  5, 16,  0,
688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_RC4 },
698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_RC4_128,      TLS_CIPHER_STREAM, 16, 16,  0,
708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_RC4 },
718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_DES40_CBC,    TLS_CIPHER_BLOCK,   5,  8,  8,
728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_DES },
738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_DES_CBC,      TLS_CIPHER_BLOCK,   8,  8,  8,
748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_DES },
758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_3DES_EDE_CBC, TLS_CIPHER_BLOCK,  24, 24,  8,
768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_3DES },
778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_AES_128_CBC,  TLS_CIPHER_BLOCK,  16, 16, 16,
788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_AES },
798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	{ TLS_CIPHER_AES_256_CBC,  TLS_CIPHER_BLOCK,  32, 32, 16,
808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	  CRYPTO_CIPHER_ALG_AES }
818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt};
828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define NUM_TLS_CIPHER_DATA NUM_ELEMS(tls_ciphers)
848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tls_get_cipher_suite - Get TLS cipher suite
888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @suite: Cipher suite identifier
898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to the cipher data or %NULL if not found
908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtconst struct tls_cipher_suite * tls_get_cipher_suite(u16 suite)
928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	size_t i;
948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0; i < NUM_TLS_CIPHER_SUITES; i++)
958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (tls_cipher_suites[i].suite == suite)
968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return &tls_cipher_suites[i];
978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return NULL;
988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtconst struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher)
1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	size_t i;
1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0; i < NUM_TLS_CIPHER_DATA; i++)
1058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (tls_ciphers[i].cipher == cipher)
1068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return &tls_ciphers[i];
1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return NULL;
1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tls_server_key_exchange_allowed(tls_cipher cipher)
1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const struct tls_cipher_suite *suite;
1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* RFC 2246, Section 7.4.3 */
1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	suite = tls_get_cipher_suite(cipher);
1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (suite == NULL)
1188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 0;
1198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	switch (suite->key_exchange) {
1218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case TLS_KEY_X_DHE_DSS:
1228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case TLS_KEY_X_DHE_DSS_EXPORT:
1238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case TLS_KEY_X_DHE_RSA:
1248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case TLS_KEY_X_DHE_RSA_EXPORT:
1258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case TLS_KEY_X_DH_anon_EXPORT:
1268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case TLS_KEY_X_DH_anon:
1278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 1;
1288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case TLS_KEY_X_RSA_EXPORT:
1298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 1 /* FIX: public key len > 512 bits */;
1308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	default:
1318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 0;
1328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
1348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tls_parse_cert - Parse DER encoded X.509 certificate and get public key
1388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @buf: ASN.1 DER encoded certificate
1398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the buffer
1408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @pk: Buffer for returning the allocated public key
1418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
1428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
1438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This functions parses an ASN.1 DER encoded X.509 certificate and retrieves
1448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * the public key from it. The caller is responsible for freeing the public key
1458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * by calling crypto_public_key_free().
1468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk)
1488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct x509_certificate *cert;
1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate",
1528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    buf, len);
1538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*pk = crypto_public_key_from_cert(buf, len);
1558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (*pk)
1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 0;
1578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	cert = x509_certificate_parse(buf, len);
1598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (cert == NULL) {
1608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 "
1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "certificate");
1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
1638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* TODO
1668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * verify key usage (must allow encryption)
1678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 *
1688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * All certificate profiles, key and cryptographic formats are
1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * defined by the IETF PKIX working group [PKIX]. When a key
1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * usage extension is present, the digitalSignature bit must be
1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * set for the key to be eligible for signing, as described
1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * above, and the keyEncipherment bit must be present to allow
1738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * encryption, as described above. The keyAgreement bit must be
1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * set on Diffie-Hellman certificates. (PKIX: RFC 3280)
1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 */
1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	x509_certificate_free(cert);
1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (*pk == NULL) {
1818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_ERROR, "TLSv1: Failed to import "
1828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "server public key");
1838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
1848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
1878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
1888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tls_verify_hash_init(struct tls_verify_hash *verify)
1918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	tls_verify_hash_free(verify);
1938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
1948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
1958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
1968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
1978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
1988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
1998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (verify->md5_client == NULL || verify->md5_server == NULL ||
2008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    verify->md5_cert == NULL || verify->sha1_client == NULL ||
2018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    verify->sha1_server == NULL || verify->sha1_cert == NULL) {
2028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		tls_verify_hash_free(verify);
2038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
2048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
2068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
2078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf,
2108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 size_t len)
2118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
2128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (verify->md5_client && verify->sha1_client) {
2138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(verify->md5_client, buf, len);
2148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(verify->sha1_client, buf, len);
2158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (verify->md5_server && verify->sha1_server) {
2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(verify->md5_server, buf, len);
2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(verify->sha1_server, buf, len);
2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (verify->md5_cert && verify->sha1_cert) {
2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(verify->md5_cert, buf, len);
2228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(verify->sha1_cert, buf, len);
2238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid tls_verify_hash_free(struct tls_verify_hash *verify)
2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	crypto_hash_finish(verify->md5_client, NULL, NULL);
2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	crypto_hash_finish(verify->md5_server, NULL, NULL);
2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	crypto_hash_finish(verify->md5_cert, NULL, NULL);
2328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	crypto_hash_finish(verify->sha1_client, NULL, NULL);
2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	crypto_hash_finish(verify->sha1_server, NULL, NULL);
2348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	crypto_hash_finish(verify->sha1_cert, NULL, NULL);
2358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->md5_client = NULL;
2368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->md5_server = NULL;
2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->md5_cert = NULL;
2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->sha1_client = NULL;
2398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->sha1_server = NULL;
2408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	verify->sha1_cert = NULL;
2418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
242