Select one of the symbols to view example projects that use it.
 
Outline
...
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_tls.h"
_generated_hash
_received_hash
...
...
_nx_secure_tls_verify_mac(NX_SECURE_TLS_SESSION *, UCHAR *, USHORT, NX_PACKET *, ULONG, UINT *)
Files
loading (4/7)...
SourceVuSTM32 Libraries and Samplesnetxduonx_secure/src/nx_secure_tls_verify_mac.c
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
/**************************************************************************/ /* */ /* Copyright (c) Microsoft Corporation. All rights reserved. */ /* */ /* This software is licensed under the Microsoft Software License */ /* Terms for Microsoft Azure RTOS. Full text of the license can be */ /* found in the LICENSE file at https://aka.ms/AzureRTOS_EULA */ /* and in the root directory of this software. */ /* */... /**************************************************************************/ ... /**************************************************************************/ /**************************************************************************/ /** */ /** NetX Secure Component */ /** */ /** Transport Layer Security (TLS) */ /** */... /**************************************************************************/ /**************************************************************************/ #define NX_SECURE_SOURCE_CODE #include "nx_secure_tls.h" static UCHAR _generated_hash[NX_SECURE_TLS_MAX_HASH_SIZE]; static UCHAR _received_hash[NX_SECURE_TLS_MAX_HASH_SIZE]; ... /**************************************************************************/ /* */ /* FUNCTION RELEASE */ /* */ /* _nx_secure_tls_verify_mac PORTABLE C */ /* 6.1 */ /* AUTHOR */ /* */ /* Timothy Stapko, Microsoft Corporation */ /* */ /* DESCRIPTION */ /* */ /* This function verifies the Message Authentication Code (MAC) that */ /* is included in encrypted TLS records. It hashes the incoming */ /* message data and then compares it to the MAC in the received */ /* record. If there is a mismatch, then the record has been corrupted */ /* in transit and represents a possible security breach. */ /* */ /* INPUT */ /* */ /* tls_session TLS control block */ /* header_data TLS record header data */ /* header_length Length of header data */ /* packet_ptr TLS record packet */ /* offset Offset to TLS record in packet*/ /* length Length of payload data */ /* */ /* OUTPUT */ /* */ /* status Completion status */ /* */ /* CALLS */ /* */ /* _nx_secure_tls_hash_record Generate payload data hash */ /* */ /* CALLED BY */ /* */ /* _nx_secure_tls_process_record Process TLS record data */ /* */ /* RELEASE HISTORY */ /* */ /* DATE NAME DESCRIPTION */ /* */ /* 05-19-2020 Timothy Stapko Initial Version 6.0 */ /* 09-30-2020 Timothy Stapko Modified comment(s), fixed */ /* AES-CBC padding oracle, */ /* verified memcpy use cases, */ /* supported chained packet, */ /* resulting in version 6.1 */ /* */... /**************************************************************************/ UINT _nx_secure_tls_verify_mac(NX_SECURE_TLS_SESSION *tls_session, UCHAR *header_data, USHORT header_length, NX_PACKET *packet_ptr, ULONG offset, UINT *length) { UCHAR *mac_secret; USHORT hash_size; INT compare_result; USHORT data_length; UINT hash_length; UCHAR header[6]; ULONG bytes_copied; if (tls_session -> nx_secure_tls_session_ciphersuite == NX_NULL) { /* Likely internal error since at this point ciphersuite negotiation was theoretically completed. */ return(NX_SECURE_TLS_UNKNOWN_CIPHERSUITE); }if (tls_session -> nx_secure_tls_session_ciphersuite == NX_NULL) { ... } /* Get the hash size and MAC secret for our current session. */ hash_size = tls_session -> nx_secure_tls_session_ciphersuite -> nx_secure_tls_hash_size; /* Select our proper MAC secret for hashing. */ if (tls_session -> nx_secure_tls_socket_type == NX_SECURE_TLS_SESSION_TYPE_SERVER) { /* If we are a server, we need to use the client's MAC secret. */ mac_secret = tls_session -> nx_secure_tls_key_material.nx_secure_tls_client_write_mac_secret; }if (tls_session -> nx_secure_tls_socket_type == NX_SECURE_TLS_SESSION_TYPE_SERVER) { ... } else { /* We are a client, so use the server's MAC secret. */ mac_secret = tls_session -> nx_secure_tls_key_material.nx_secure_tls_server_write_mac_secret; }else { ... } /* Check for 0-length records. With nothing to hash, don't continue to hash generation. */ if (hash_size >= *length) { if (header_data[0] == (UCHAR)(NX_SECURE_TLS_APPLICATION_DATA) && *length == hash_size) { /* BEAST attack mitigation. In TLS 1.0 and SSLv3, the implicit IV enables the BEAST attack. Some implementations counter the attack by sending an empty record which has the effect of resetting the IVs. We normally don't allow empty records since there is no data to hash, but in this case we want to allow it. *//* ... */ *length = 0; /* Increment the sequence number. */ if ((tls_session -> nx_secure_tls_remote_sequence_number[0] + 1) == 0) { /* Check for overflow of the 32-bit unsigned number. */ tls_session -> nx_secure_tls_remote_sequence_number[1]++; }if ((tls_session -> nx_secure_tls_remote_sequence_number[0] + 1) == 0) { ... } tls_session -> nx_secure_tls_remote_sequence_number[0]++; return(NX_SUCCESS); }if (header_data[0] == (UCHAR)(NX_SECURE_TLS_APPLICATION_DATA) && *length == hash_size) { ... } /* The record data was smaller than the selected hash... Error. */ return(NX_SECURE_TLS_HASH_MAC_VERIFY_FAILURE); }if (hash_size >= *length) { ... } /* Adjust our length so we only hash the record data, not the hash as well. */ data_length = (USHORT)(*length - hash_size); /* Copy the header data into our local buffer so we can change it if we need to. */ if (header_length > sizeof(header)) { return(NX_SECURE_TLS_HASH_MAC_VERIFY_FAILURE); }if (header_length > sizeof(header)) { ... } NX_SECURE_MEMCPY(header, header_data, header_length); /* Use case of memcpy is verified. */ /* Adjust the length in the header to match the length of the data before the hash was added. */ header[3] = (UCHAR)((data_length >> 8) & 0x00FF); header[4] = (UCHAR)(data_length & 0x00FF); /* Generate the hash on the plaintext data. */ _nx_secure_tls_hash_record(tls_session, tls_session -> nx_secure_tls_remote_sequence_number, header, header_length, packet_ptr, offset, data_length, _generated_hash, &hash_length, mac_secret); /* Increment the sequence number. */ if ((tls_session -> nx_secure_tls_remote_sequence_number[0] + 1) == 0) { /* Check for overflow of the 32-bit unsigned number. */ tls_session -> nx_secure_tls_remote_sequence_number[1]++; }if ((tls_session -> nx_secure_tls_remote_sequence_number[0] + 1) == 0) { ... } tls_session -> nx_secure_tls_remote_sequence_number[0]++; if (hash_size == 0) { /* For ciphersuite without explict hash, just return success. */ return(NX_SECURE_TLS_SUCCESS); }if (hash_size == 0) { ... } /* Now, compare the hash we generated to the one we received. */ if (nx_packet_data_extract_offset(packet_ptr, offset + data_length, _received_hash, hash_size, &bytes_copied) || (bytes_copied != hash_size)) { /* The record data was smaller than the selected hash... Error. */ return(NX_SECURE_TLS_PADDING_CHECK_FAILED); }if (nx_packet_data_extract_offset(packet_ptr, offset + data_length, _received_hash, hash_size, &bytes_copied) || (bytes_copied != hash_size)) { ... } compare_result = NX_SECURE_MEMCMP(_received_hash, _generated_hash, hash_size); #ifdef NX_SECURE_KEY_CLEAR NX_SECURE_MEMSET(_generated_hash, 0, sizeof(_generated_hash)); #endif /* NX_SECURE_KEY_CLEAR */ /* Before we return, adjust our data size so the caller will only see data, not the hash. */ *length = data_length; /* If the hashes match, we are all good. Otherwise we have a problem. */ if (compare_result == 0) { return(NX_SECURE_TLS_SUCCESS); }if (compare_result == 0) { ... } else { return(NX_SECURE_TLS_HASH_MAC_VERIFY_FAILURE); }else { ... } }{ ... }
Details