1
10
13
14
20
21
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
147
148
150
151
152
154
155
156
157
158
159
160
161
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
186
191
192
193
194
195
196
197
198
199
203
207
213
217
221
222
223
224
225
226
228
229
241
242
243
244
264
265
266
267
270
271
272
273
274
275
276
277
278
279
280
283
284
285
289
290
296
297
298
299
300
301
302
303
304
305
306
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
336
337
338
339
340
341
342
343
346
347
352
353
354
355
356
357
358
359
360
369
370
371
372
373
374
375
376
380
381
382
383
384
388
389
390
391
392
397
398
399
400
401
402
403
404
405
406
408
409
410
414
415
416
417
418
419
420
421
426
428
432
433
435
436
437
438
439
440
441
442
446
447
448
449
453
454
455
456
460
461
462
463
464
468
469
470
471
472
476
477
478
479
480
484
485
486
487
491
492
495
496
497
498
499
500
501
502
503
507
508
509
510
514
515
516
517
521
522
523
526
527
528
532
533
534
535
536
539
540
541
542
543
544
548
549
550
551
552
553
554
560
561
562
563
564
569
570
571
572
573
574
575
576
580
581
582
583
584
585
586
587
591
592
594
595
596
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_tls.h"
...
...
UINT _nx_secure_tls_client_handshake(NX_SECURE_TLS_SESSION *tls_session, UCHAR *packet_buffer,
UINT data_length, ULONG wait_option)
{
#ifndef NX_SECURE_TLS_CLIENT_DISABLED
UINT status;
UINT temp_status;
USHORT message_type = NX_SECURE_TLS_INVALID_MESSAGE;
UINT header_bytes;
UINT message_length;
UINT packet_buffer_length = data_length;
UCHAR *packet_start;
NX_PACKET *send_packet = NX_NULL;
NX_PACKET_POOL *packet_pool;
UINT error_number;
UINT alert_number;
UINT alert_level;
const NX_CRYPTO_METHOD
*method_ptr = NX_NULL;
/* ... */
/* ... */
while (data_length > 0)
{
/* ... */
packet_start = packet_buffer;
header_bytes = data_length;
status = _nx_secure_tls_process_handshake_header(packet_buffer, &message_type, &header_bytes, &message_length);
if (status != NX_SECURE_TLS_SUCCESS)
{
return(status);
}if (status != NX_SECURE_TLS_SUCCESS) { ... }
if((message_length + header_bytes) > data_length)
{
tls_session -> nx_secure_tls_handshake_record_expected_length = message_length + header_bytes;
tls_session -> nx_secure_tls_handshake_record_fragment_state = NX_SECURE_TLS_HANDSHAKE_RECEIVED_FRAGMENT;
return(NX_SECURE_TLS_HANDSHAKE_FRAGMENT_RECEIVED);
}if ((message_length + header_bytes) > data_length) { ... }
packet_buffer += header_bytes;
packet_pool = tls_session -> nx_secure_tls_packet_pool;
/* ... */
if (message_type != NX_SECURE_TLS_HELLO_REQUEST && message_type != NX_SECURE_TLS_FINISHED &&
message_type != NX_SECURE_TLS_HELLO_VERIFY_REQUEST && message_type != NX_SECURE_TLS_SERVER_HELLO)
{
_nx_secure_tls_handshake_hash_update(tls_session, packet_start, message_length + header_bytes);
}if (message_type != NX_SECURE_TLS_HELLO_REQUEST && message_type != NX_SECURE_TLS_FINISHED && message_type != NX_SECURE_TLS_HELLO_VERIFY_REQUEST && message_type != NX_SECURE_TLS_SERVER_HELLO) { ... }
data_length -= (message_length + header_bytes);
status = NX_SECURE_TLS_HANDSHAKE_FAILURE;
switch (message_type)
{
case NX_SECURE_TLS_SERVER_HELLO:
status = _nx_secure_tls_process_serverhello(tls_session, packet_buffer, message_length);
break;case NX_SECURE_TLS_SERVER_HELLO:
case NX_SECURE_TLS_CERTIFICATE_MSG:
status = _nx_secure_tls_process_remote_certificate(tls_session, packet_buffer, message_length, packet_buffer_length);
break;case NX_SECURE_TLS_CERTIFICATE_MSG:
case NX_SECURE_TLS_SERVER_HELLO_DONE:
tls_session -> nx_secure_tls_client_state = NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO_DONE;
status = NX_SECURE_TLS_SUCCESS;
break;case NX_SECURE_TLS_SERVER_HELLO_DONE:
case NX_SECURE_TLS_SERVER_KEY_EXCHANGE:
status = _nx_secure_tls_process_server_key_exchange(tls_session, packet_buffer, message_length);
break;case NX_SECURE_TLS_SERVER_KEY_EXCHANGE:
case NX_SECURE_TLS_CERTIFICATE_REQUEST:
status = _nx_secure_tls_process_certificate_request(tls_session, packet_buffer, message_length);
break;case NX_SECURE_TLS_CERTIFICATE_REQUEST:
case NX_SECURE_TLS_FINISHED:
status = _nx_secure_tls_process_finished(tls_session, packet_buffer, message_length);
/* ... */
#if (NX_SECURE_TLS_TLS_1_2_ENABLED)
method_ptr = tls_session -> nx_secure_tls_crypto_table -> nx_secure_tls_handshake_hash_sha256_method;
if (method_ptr -> nx_crypto_cleanup != NX_NULL)
{
temp_status = method_ptr -> nx_crypto_cleanup(tls_session -> nx_secure_tls_handshake_hash.nx_secure_tls_handshake_hash_sha256_metadata);
if(temp_status != NX_CRYPTO_SUCCESS)
{
status = temp_status;
}if (temp_status != NX_CRYPTO_SUCCESS) { ... }
}if (method_ptr -> nx_crypto_cleanup != NX_NULL) { ... }
/* ... */
#endif
#if (NX_SECURE_TLS_TLS_1_0_ENABLED || NX_SECURE_TLS_TLS_1_1_ENABLED)
method_ptr = tls_session -> nx_secure_tls_crypto_table -> nx_secure_tls_handshake_hash_md5_method;
if (method_ptr != NX_NULL && method_ptr -> nx_crypto_cleanup != NX_NULL)
{
temp_status = method_ptr -> nx_crypto_cleanup(tls_session -> nx_secure_tls_handshake_hash.nx_secure_tls_handshake_hash_md5_metadata);
if(temp_status != NX_CRYPTO_SUCCESS)
{
status = temp_status;
}if (temp_status != NX_CRYPTO_SUCCESS) { ... }
}if (method_ptr != NX_NULL && method_ptr -> nx_crypto_cleanup != NX_NULL) { ... }
method_ptr = tls_session -> nx_secure_tls_crypto_table -> nx_secure_tls_handshake_hash_sha1_method;
if (method_ptr != NX_NULL && method_ptr -> nx_crypto_cleanup != NX_NULL)
{
temp_status = method_ptr -> nx_crypto_cleanup(tls_session -> nx_secure_tls_handshake_hash.nx_secure_tls_handshake_hash_sha1_metadata);
if(temp_status != NX_CRYPTO_SUCCESS)
{
status = temp_status;
}if (temp_status != NX_CRYPTO_SUCCESS) { ... }
}if (method_ptr != NX_NULL && method_ptr -> nx_crypto_cleanup != NX_NULL) { ... }
/* ... */#endif
break;case NX_SECURE_TLS_FINISHED:
case NX_SECURE_TLS_HELLO_REQUEST:
/* ... */
if (tls_session -> nx_secure_tls_local_session_active)
{
#ifndef NX_SECURE_TLS_DISABLE_SECURE_RENEGOTIATION
tls_session -> nx_secure_tls_client_state = NX_SECURE_TLS_CLIENT_STATE_HELLO_REQUEST;
if (tls_session -> nx_secure_tls_renegotation_enabled && tls_session -> nx_secure_tls_secure_renegotiation)
{
tls_session -> nx_secure_tls_renegotiation_handshake = NX_TRUE;
/* ... */
status = _nx_secure_tls_remote_certificate_free_all(tls_session);
if (status != NX_SUCCESS)
{
return(status);
}if (status != NX_SUCCESS) { ... }
}if (tls_session -> nx_secure_tls_renegotation_enabled && tls_session -> nx_secure_tls_secure_renegotiation) { ... }
else
#endif
{
return(NX_SECURE_TLS_NO_RENEGOTIATION_ERROR);
}else { ... }
}if (tls_session -> nx_secure_tls_local_session_active) { ... }
break;case NX_SECURE_TLS_HELLO_REQUEST:
case NX_SECURE_TLS_HELLO_VERIFY_REQUEST:
case NX_SECURE_TLS_CERTIFICATE_VERIFY:
case NX_SECURE_TLS_CLIENT_KEY_EXCHANGE:
case NX_SECURE_TLS_CLIENT_HELLO:
case NX_SECURE_TLS_INVALID_MESSAGE:
case NX_SECURE_TLS_CERTIFICATE_URL:
case NX_SECURE_TLS_CERTIFICATE_STATUS:
default:
break;default
}switch (message_type) { ... }
if (status != NX_SECURE_TLS_SUCCESS)
{
error_number = status;
_nx_secure_tls_map_error_to_alert(error_number, &alert_number, &alert_level);
tx_mutex_put(&_nx_secure_tls_protection);
status = _nx_secure_tls_packet_allocate(tls_session, packet_pool, &send_packet, wait_option);
tx_mutex_get(&_nx_secure_tls_protection, TX_WAIT_FOREVER);
if (status == NX_SUCCESS)
{
_nx_secure_tls_send_alert(tls_session, send_packet, (UCHAR)alert_number, (UCHAR)alert_level);
status = _nx_secure_tls_send_record(tls_session, send_packet, NX_SECURE_TLS_ALERT, wait_option);
if (status != NX_SUCCESS)
{
nx_secure_tls_packet_release(send_packet);
}if (status != NX_SUCCESS) { ... }
}if (status == NX_SUCCESS) { ... }
return(error_number);
}if (status != NX_SECURE_TLS_SUCCESS) { ... }
switch (tls_session -> nx_secure_tls_client_state)
{
case NX_SECURE_TLS_CLIENT_STATE_IDLE:
case NX_SECURE_TLS_CLIENT_STATE_RENEGOTIATING:
break;case NX_SECURE_TLS_CLIENT_STATE_RENEGOTIATING:
case NX_SECURE_TLS_CLIENT_STATE_ERROR:
case NX_SECURE_TLS_CLIENT_STATE_ALERT_SENT:
/* ... */
return(NX_SECURE_TLS_HANDSHAKE_FAILURE);
#ifndef NX_SECURE_TLS_DISABLE_SECURE_RENEGOTIATIONcase NX_SECURE_TLS_CLIENT_STATE_ALERT_SENT:
case NX_SECURE_TLS_CLIENT_STATE_HELLO_REQUEST:
if (tls_session -> nx_secure_tls_local_session_active)
{
if (tls_session -> nx_secure_tls_renegotation_enabled && tls_session -> nx_secure_tls_secure_renegotiation)
{
if (tls_session -> nx_secure_tls_session_renegotiation_callback != NX_NULL)
{
status = tls_session -> nx_secure_tls_session_renegotiation_callback(tls_session);
if (status != NX_SUCCESS)
{
return(status);
}if (status != NX_SUCCESS) { ... }
}if (tls_session -> nx_secure_tls_session_renegotiation_callback != NX_NULL) { ... }
tls_session -> nx_secure_tls_renegotiation_handshake = NX_TRUE;
status = _nx_secure_tls_allocate_handshake_packet(tls_session, tls_session -> nx_secure_tls_packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
return(status);
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_clienthello(tls_session, send_packet);
if (status != NX_SUCCESS)
{
return(status);
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_handshake_record(tls_session, send_packet, NX_SECURE_TLS_CLIENT_HELLO, wait_option);
}if (tls_session -> nx_secure_tls_renegotation_enabled && tls_session -> nx_secure_tls_secure_renegotiation) { ... }
else
{
status = NX_SECURE_TLS_NO_RENEGOTIATION_ERROR;
}else { ... }
}if (tls_session -> nx_secure_tls_local_session_active) { ... }
break;/* ... */
#endif case NX_SECURE_TLS_CLIENT_STATE_HELLO_REQUEST:
case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO:
if(tls_session->nx_secure_tls_key_material.nx_secure_tls_handshake_cache_length > 0)
{
/* ... */
status = _nx_secure_tls_handshake_hash_update(tls_session, tls_session->nx_secure_tls_key_material.nx_secure_tls_handshake_cache,
tls_session->nx_secure_tls_key_material.nx_secure_tls_handshake_cache_length);
if(status != NX_SUCCESS)
{
return(status);
}if (status != NX_SUCCESS) { ... }
tls_session->nx_secure_tls_key_material.nx_secure_tls_handshake_cache_length = 0;
_nx_secure_tls_handshake_hash_update(tls_session, packet_start, message_length + header_bytes);
}if (tls_session->nx_secure_tls_key_material.nx_secure_tls_handshake_cache_length > 0) { ... }
break;case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO:
case NX_SECURE_TLS_CLIENT_STATE_SERVER_CERTIFICATE:
/* ... */
break;case NX_SECURE_TLS_CLIENT_STATE_SERVER_CERTIFICATE:
case NX_SECURE_TLS_CLIENT_STATE_SERVER_KEY_EXCHANGE:
break;case NX_SECURE_TLS_CLIENT_STATE_SERVER_KEY_EXCHANGE:
case NX_SECURE_TLS_CLIENT_STATE_CERTIFICATE_REQUEST:
tls_session -> nx_secure_tls_client_certificate_requested = 1;
break;case NX_SECURE_TLS_CLIENT_STATE_CERTIFICATE_REQUEST:
case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO_DONE:
/* ... */
if (tls_session -> nx_secure_tls_client_certificate_requested)
{
status = _nx_secure_tls_allocate_handshake_packet(tls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_certificate(tls_session, send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_handshake_record(tls_session, send_packet, NX_SECURE_TLS_CERTIFICATE_MSG, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
}if (tls_session -> nx_secure_tls_client_certificate_requested) { ... }
status = _nx_secure_tls_generate_premaster_secret(tls_session, NX_SECURE_TLS);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_allocate_handshake_packet(tls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_client_key_exchange(tls_session, send_packet);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_handshake_record(tls_session, send_packet, NX_SECURE_TLS_CLIENT_KEY_EXCHANGE, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
/* ... */
if (tls_session -> nx_secure_tls_client_certificate_requested)
{
tls_session -> nx_secure_tls_client_certificate_requested = 0;
status = _nx_secure_tls_allocate_handshake_packet(tls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_certificate_verify(tls_session, send_packet);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_tls_send_handshake_record(tls_session, send_packet, NX_SECURE_TLS_CERTIFICATE_VERIFY, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
}if (tls_session -> nx_secure_tls_client_certificate_requested) { ... }
/* ... */
status = _nx_secure_tls_generate_keys(tls_session);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
tx_mutex_put(&_nx_secure_tls_protection);
/* ... */
status = _nx_secure_tls_packet_allocate(tls_session, packet_pool, &send_packet, wait_option);
tx_mutex_get(&_nx_secure_tls_protection, TX_WAIT_FOREVER);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
_nx_secure_tls_send_changecipherspec(tls_session, send_packet);
status = _nx_secure_tls_send_record(tls_session, send_packet, NX_SECURE_TLS_CHANGE_CIPHER_SPEC, wait_option);
if (status != NX_SUCCESS)
{
nx_secure_tls_packet_release(send_packet);
break;
}if (status != NX_SUCCESS) { ... }
NX_SECURE_MEMSET(tls_session -> nx_secure_tls_local_sequence_number, 0, sizeof(tls_session -> nx_secure_tls_local_sequence_number));
/* ... */
_nx_secure_tls_session_keys_set(tls_session, NX_SECURE_TLS_KEY_SET_LOCAL);
status = _nx_secure_tls_allocate_handshake_packet(tls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
_nx_secure_tls_send_finished(tls_session, send_packet);
status = _nx_secure_tls_send_handshake_record(tls_session, send_packet, NX_SECURE_TLS_FINISHED, wait_option);
break;case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO_DONE:
case NX_SECURE_TLS_CLIENT_STATE_HANDSHAKE_FINISHED:
/* ... */
break;case NX_SECURE_TLS_CLIENT_STATE_HANDSHAKE_FINISHED:
case NX_SECURE_TLS_CLIENT_STATE_HELLO_VERIFY:
default:
status = NX_SECURE_TLS_INVALID_STATE;default
}switch (tls_session -> nx_secure_tls_client_state) { ... }
/* ... */
if (status != NX_SUCCESS)
{
error_number = status;
_nx_secure_tls_map_error_to_alert(error_number, &alert_number, &alert_level);
tx_mutex_put(&_nx_secure_tls_protection);
status = _nx_secure_tls_packet_allocate(tls_session, packet_pool, &send_packet, wait_option);
tx_mutex_get(&_nx_secure_tls_protection, TX_WAIT_FOREVER);
if (status == NX_SUCCESS)
{
_nx_secure_tls_send_alert(tls_session, send_packet, (UCHAR)alert_number, (UCHAR)alert_level);
status = _nx_secure_tls_send_record(tls_session, send_packet, NX_SECURE_TLS_ALERT, wait_option);
if (status != NX_SUCCESS)
{
nx_secure_tls_packet_release(send_packet);
}if (status != NX_SUCCESS) { ... }
}if (status == NX_SUCCESS) { ... }
return(error_number);
}if (status != NX_SUCCESS) { ... }
packet_buffer += message_length;
}while (data_length > 0) { ... }
return(NX_SUCCESS);/* ... */
#else
NX_PARAMETER_NOT_USED(packet_buffer);
NX_PARAMETER_NOT_USED(wait_option);
NX_PARAMETER_NOT_USED(data_length);
tls_session -> nx_secure_tls_server_state = NX_SECURE_TLS_SERVER_STATE_ERROR;
return(NX_SECURE_TLS_INVALID_STATE);/* ... */
#endif
}{ ... }