tlsv1_record.c revision 1f69aa52ea2e0a73ac502565df8c666ee49cab6a
18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/*
28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * TLSv1 Record Protocol
31f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt * Copyright (c) 2006-2011, Jouni Malinen <j@w1.fi>
48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
58d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This program is free software; you can redistribute it and/or modify
68d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * it under the terms of the GNU General Public License version 2 as
78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * published by the Free Software Foundation.
88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Alternatively, this software may be distributed under the terms of BSD
108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * license.
118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * See README and COPYING for more details.
138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "includes.h"
168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common.h"
188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "crypto/md5.h"
198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "crypto/sha1.h"
201f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt#include "crypto/sha256.h"
218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "tlsv1_common.h"
228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "tlsv1_record.h"
238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @rl: Pointer to TLS record layer data
288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @cipher_suite: New cipher suite
298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is used to prepare TLS record layer for cipher suite change.
328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tlsv1_record_change_write_cipher() and
338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tlsv1_record_change_read_cipher() functions can then be used to change the
348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * currently used ciphers.
358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tlsv1_record_set_cipher_suite(struct tlsv1_record_layer *rl,
378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  u16 cipher_suite)
388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const struct tls_cipher_suite *suite;
408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const struct tls_cipher_data *data;
418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   cipher_suite);
448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	rl->cipher_suite = cipher_suite;
458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	suite = tls_get_cipher_suite(cipher_suite);
478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (suite == NULL)
488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (suite->hash == TLS_HASH_MD5) {
518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5;
528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->hash_size = MD5_MAC_LEN;
538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else if (suite->hash == TLS_HASH_SHA) {
548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1;
558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->hash_size = SHA1_MAC_LEN;
561f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	} else if (suite->hash == TLS_HASH_SHA256) {
571f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256;
581f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		rl->hash_size = SHA256_MAC_LEN;
598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	data = tls_get_cipher_data(suite->cipher);
628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (data == NULL)
638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	rl->key_material_len = data->key_material;
668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	rl->iv_size = data->block_size;
678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	rl->cipher_alg = data->alg;
688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @rl: Pointer to TLS record layer data
768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success (cipher changed), -1 on failure
778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function changes TLS record layer to use the new cipher suite
798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * configured with tlsv1_record_set_cipher_suite() for writing.
808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tlsv1_record_change_write_cipher(struct tlsv1_record_layer *rl)
828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   "0x%04x", rl->cipher_suite);
858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	rl->write_cipher_suite = rl->cipher_suite;
868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(rl->write_seq_num, 0, TLS_SEQ_NUM_LEN);
878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (rl->write_cbc) {
898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_cipher_deinit(rl->write_cbc);
908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->write_cbc = NULL;
918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (rl->cipher_alg != CRYPTO_CIPHER_NULL) {
938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->write_cbc = crypto_cipher_init(rl->cipher_alg,
948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						   rl->write_iv, rl->write_key,
958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						   rl->key_material_len);
968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (rl->write_cbc == NULL) {
978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "cipher");
998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
1008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
1058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tlsv1_record_change_read_cipher - TLS record layer: Change read cipher
1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @rl: Pointer to TLS record layer data
1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success (cipher changed), -1 on failure
1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function changes TLS record layer to use the new cipher suite
1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * configured with tlsv1_record_set_cipher_suite() for reading.
1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tlsv1_record_change_read_cipher(struct tlsv1_record_layer *rl)
1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
1188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   "0x%04x", rl->cipher_suite);
1198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	rl->read_cipher_suite = rl->cipher_suite;
1208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(rl->read_seq_num, 0, TLS_SEQ_NUM_LEN);
1218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (rl->read_cbc) {
1238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_cipher_deinit(rl->read_cbc);
1248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->read_cbc = NULL;
1258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (rl->cipher_alg != CRYPTO_CIPHER_NULL) {
1278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		rl->read_cbc = crypto_cipher_init(rl->cipher_alg,
1288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						  rl->read_iv, rl->read_key,
1298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						  rl->key_material_len);
1308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (rl->read_cbc == NULL) {
1318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
1328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "cipher");
1338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
1348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
1358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
1388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
1398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tlsv1_record_send - TLS record layer: Send a message
1438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @rl: Pointer to TLS record layer data
1448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @content_type: Content type (TLS_CONTENT_TYPE_*)
1451f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt * @buf: Buffer for the generated TLS message (needs to have extra space for
1461f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt * header, IV (TLS v1.1), and HMAC)
1478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @buf_size: Maximum buf size
1481f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt * @payload: Payload to be sent
1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @payload_len: Length of the payload
1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out_len: Buffer for returning the used buf length
1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
1528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
1538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function fills in the TLS record layer header, adds HMAC, and encrypts
1548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * the data using the current write cipher.
1558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf,
1571f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		      size_t buf_size, const u8 *payload, size_t payload_len,
1581f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		      size_t *out_len)
1598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1601f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	u8 *pos, *ct_start, *length, *cpayload;
1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct crypto_hash *hmac;
1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	size_t clen;
1631f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	int explicit_iv;
1648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	pos = buf;
1661f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (pos + TLS_RECORD_HEADER_LEN > buf + buf_size)
1671f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return -1;
1681f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* ContentType type */
1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ct_start = pos;
1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*pos++ = content_type;
1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* ProtocolVersion version */
1731f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	WPA_PUT_BE16(pos, rl->tls_version);
1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	pos += 2;
1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* uint16 length */
1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	length = pos;
1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	WPA_PUT_BE16(length, payload_len);
1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	pos += 2;
1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1801f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	cpayload = pos;
1811f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	explicit_iv = rl->write_cipher_suite != TLS_NULL_WITH_NULL_NULL &&
1821f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		rl->iv_size && rl->tls_version >= TLS_VERSION_1_1;
1831f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (explicit_iv) {
1841f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		/* opaque IV[Cipherspec.block_length] */
1851f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (pos + rl->iv_size > buf + buf_size)
1861f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			return -1;
1871f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
1881f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		/*
1891f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		 * Use random number R per the RFC 4346, 6.2.3.2 CBC Block
1901f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		 * Cipher option 2a.
1911f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		 */
1921f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
1931f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (os_get_random(pos, rl->iv_size))
1941f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			return -1;
1951f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		pos += rl->iv_size;
1961f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
1971f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
1981f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	/*
1991f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	 * opaque fragment[TLSPlaintext.length]
2001f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	 * (opaque content[TLSCompressed.length] in GenericBlockCipher)
2011f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	 */
2021f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (pos + payload_len > buf + buf_size)
2031f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return -1;
2041f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	os_memmove(pos, payload, payload_len);
2058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	pos += payload_len;
2068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (rl->write_cipher_suite != TLS_NULL_WITH_NULL_NULL) {
2081f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		/*
2091f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		 * MAC calculated over seq_num + TLSCompressed.type +
2101f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		 * TLSCompressed.version + TLSCompressed.length +
2111f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		 * TLSCompressed.fragment
2121f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		 */
2138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
2148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					rl->hash_size);
2158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hmac == NULL) {
2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "to initialize HMAC");
2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(hmac, rl->write_seq_num, TLS_SEQ_NUM_LEN);
2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* type + version + length + fragment */
2221f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		crypto_hash_update(hmac, ct_start, TLS_RECORD_HEADER_LEN);
2231f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		crypto_hash_update(hmac, payload, payload_len);
2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		clen = buf + buf_size - pos;
2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (clen < rl->hash_size) {
2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "enough room for MAC");
2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			crypto_hash_finish(hmac, NULL, NULL);
2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (crypto_hash_finish(hmac, pos, &clen) < 0) {
2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
2348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "to calculate HMAC");
2358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
2368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC",
2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    pos, clen);
2398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		pos += clen;
2408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (rl->iv_size) {
2411f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			size_t len = pos - cpayload;
2428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			size_t pad;
2438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			pad = (len + 1) % rl->iv_size;
2448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (pad)
2458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				pad = rl->iv_size - pad;
2468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (pos + pad + 1 > buf + buf_size) {
2478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				wpa_printf(MSG_DEBUG, "TLSv1: No room for "
2488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					   "block cipher padding");
2498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				return -1;
2508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			}
2518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memset(pos, pad, pad + 1);
2528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			pos += pad + 1;
2538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
2548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2551f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (crypto_cipher_encrypt(rl->write_cbc, cpayload,
2561f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					  cpayload, pos - cpayload) < 0)
2578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
2588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	WPA_PUT_BE16(length, pos - length - 2);
2618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	inc_byte_array(rl->write_seq_num, TLS_SEQ_NUM_LEN);
2628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*out_len = pos - buf;
2648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
2668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
2678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
2708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * tlsv1_record_receive - TLS record layer: Process a received message
2718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @rl: Pointer to TLS record layer data
2728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in_data: Received data
2738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in_len: Length of the received data
2748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out_data: Buffer for output data (must be at least as long as in_data)
2758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out_len: Set to maximum out_data length by caller; used to return the
2768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * length of the used data
2778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @alert: Buffer for returning an alert value on failure
2781f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt * Returns: Number of bytes used from in_data on success, 0 if record was not
2791f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt *	complete (more data needed), or -1 on failure
2808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function decrypts the received message, verifies HMAC and TLS record
2828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * layer header.
2838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
2848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint tlsv1_record_receive(struct tlsv1_record_layer *rl,
2858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 const u8 *in_data, size_t in_len,
2868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 u8 *out_data, size_t *out_len, u8 *alert)
2878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
2888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	size_t i, rlen, hlen;
2898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 padlen;
2908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct crypto_hash *hmac;
2918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 len[2], hash[100];
2921f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	int force_mac_error = 0;
2931f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	u8 ct;
2948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (in_len < TLS_RECORD_HEADER_LEN) {
2961f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - "
2971f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   "need more data",
2988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   (unsigned long) in_len);
2991f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
3001f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			    in_data, in_len);
3011f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return 0;
3028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3041f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	ct = in_data[0];
3051f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	rlen = WPA_GET_BE16(in_data + 3);
3068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "TLSv1: Received content type %d version %d.%d "
3071f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		   "length %d", ct, in_data[1], in_data[2], (int) rlen);
3081f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
3091f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	/*
3101f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	 * TLS v1.0 and v1.1 RFCs were not exactly clear on the use of the
3111f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	 * protocol version in record layer. As such, accept any {03,xx} value
3121f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	 * to remain compatible with existing implementations.
3131f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	 */
3141f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (in_data[1] != 0x03) {
3158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version "
3161f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   "%u.%u", in_data[1], in_data[2]);
3178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		*alert = TLS_ALERT_PROTOCOL_VERSION;
3188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
3198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* TLSCiphertext must not be more than 2^14+2048 bytes */
3228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
3238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)",
3248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
3258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		*alert = TLS_ALERT_RECORD_OVERFLOW;
3268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
3278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	in_data += TLS_RECORD_HEADER_LEN;
3308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	in_len -= TLS_RECORD_HEADER_LEN;
3318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (rlen > in_len) {
3338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Not all record data included "
3348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "(rlen=%lu > in_len=%lu)",
3358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   (unsigned long) rlen, (unsigned long) in_len);
3361f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return 0;
3371f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
3381f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
3391f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
3401f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		    in_data, rlen);
3411f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
3421f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (ct != TLS_CONTENT_TYPE_HANDSHAKE &&
3431f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	    ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC &&
3441f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	    ct != TLS_CONTENT_TYPE_ALERT &&
3451f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	    ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
3461f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Ignore record with unknown "
3471f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   "content type 0x%x", ct);
3481f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		*alert = TLS_ALERT_UNEXPECTED_MESSAGE;
3498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
3508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	in_len = rlen;
3538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (*out_len < in_len) {
3558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Not enough output buffer for "
3568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "processing received record");
3578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		*alert = TLS_ALERT_INTERNAL_ERROR;
3588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
3598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (rl->read_cipher_suite != TLS_NULL_WITH_NULL_NULL) {
3621f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		size_t plen;
3631f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (crypto_cipher_decrypt(rl->read_cbc, in_data,
3648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					  out_data, in_len) < 0) {
3658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			*alert = TLS_ALERT_DECRYPTION_FAILED;
3668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
3678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
3681f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		plen = in_len;
3691f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - Decrypted "
3701f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				"data", out_data, plen);
3711f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
3728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (rl->iv_size) {
3731f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			/*
3741f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 * TLS v1.0 defines different alert values for various
3751f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 * failures. That may information to aid in attacks, so
3761f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 * use the same bad_record_mac alert regardless of the
3771f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 * issues.
3781f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 *
3791f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 * In addition, instead of returning immediately on
3801f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 * error, run through the MAC check to make timing
3811f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 * attacks more difficult.
3821f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			 */
3831f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
3841f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			if (rl->tls_version >= TLS_VERSION_1_1) {
3851f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				/* Remove opaque IV[Cipherspec.block_length] */
3861f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				if (plen < rl->iv_size) {
3871f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					wpa_printf(MSG_DEBUG, "TLSv1.1: Not "
3881f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt						   "enough room for IV");
3891f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					force_mac_error = 1;
3901f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					goto check_mac;
3911f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				}
3921f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				os_memmove(out_data, out_data + rl->iv_size,
3931f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					   plen - rl->iv_size);
3941f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				plen -= rl->iv_size;
3951f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			}
3961f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
3971f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			/* Verify and remove padding */
3981f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			if (plen == 0) {
3998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				wpa_printf(MSG_DEBUG, "TLSv1: Too short record"
4008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					   " (no pad)");
4011f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				force_mac_error = 1;
4021f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				goto check_mac;
4038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			}
4041f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			padlen = out_data[plen - 1];
4051f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			if (padlen >= plen) {
4068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				wpa_printf(MSG_DEBUG, "TLSv1: Incorrect pad "
4071f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					   "length (%u, plen=%lu) in "
4088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					   "received record",
4091f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					   padlen, (unsigned long) plen);
4101f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				force_mac_error = 1;
4111f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				goto check_mac;
4128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			}
4131f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			for (i = plen - padlen - 1; i < plen - 1; i++) {
4148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				if (out_data[i] != padlen) {
4158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					wpa_hexdump(MSG_DEBUG,
4168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						    "TLSv1: Invalid pad in "
4178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						    "received record",
4181f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt						    out_data + plen - padlen -
4191f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt						    1, padlen + 1);
4201f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					force_mac_error = 1;
4211f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					goto check_mac;
4228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				}
4238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			}
4248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4251f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			plen -= padlen + 1;
4268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4271f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - "
4281f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					"Decrypted data with IV and padding "
4291f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					"removed", out_data, plen);
4301f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		}
4318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4321f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	check_mac:
4331f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (plen < rl->hash_size) {
4348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Too short record; no "
4358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "hash value");
4361f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			*alert = TLS_ALERT_BAD_RECORD_MAC;
4378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
4388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
4398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4401f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		plen -= rl->hash_size;
4418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
4438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					rl->hash_size);
4448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hmac == NULL) {
4458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
4468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "to initialize HMAC");
4478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			*alert = TLS_ALERT_INTERNAL_ERROR;
4488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
4498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
4508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(hmac, rl->read_seq_num, TLS_SEQ_NUM_LEN);
4528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* type + version + length + fragment */
4538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(hmac, in_data - TLS_RECORD_HEADER_LEN, 3);
4541f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		WPA_PUT_BE16(len, plen);
4558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		crypto_hash_update(hmac, len, 2);
4561f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		crypto_hash_update(hmac, out_data, plen);
4578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hlen = sizeof(hash);
4588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (crypto_hash_finish(hmac, hash, &hlen) < 0) {
4598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
4608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "to calculate HMAC");
4611f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			*alert = TLS_ALERT_INTERNAL_ERROR;
4628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
4638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
4648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hlen != rl->hash_size ||
4651f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		    os_memcmp(hash, out_data + plen, hlen) != 0 ||
4661f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		    force_mac_error) {
4678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "TLSv1: Invalid HMAC value in "
4681f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				   "received message (force_mac_error=%d)",
4691f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				   force_mac_error);
4708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			*alert = TLS_ALERT_BAD_RECORD_MAC;
4718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return -1;
4728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
4731f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
4741f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		*out_len = plen;
4751f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	} else {
4761f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		os_memcpy(out_data, in_data, in_len);
4771f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		*out_len = in_len;
4788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
4798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* TLSCompressed must not be more than 2^14+1024 bytes */
4818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (TLS_RECORD_HEADER_LEN + *out_len > 17408) {
4828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)",
4838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   (unsigned long) (TLS_RECORD_HEADER_LEN + *out_len));
4848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		*alert = TLS_ALERT_RECORD_OVERFLOW;
4858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
4868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
4878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	inc_byte_array(rl->read_seq_num, TLS_SEQ_NUM_LEN);
4898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4901f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	return TLS_RECORD_HEADER_LEN + rlen;
4918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
492