commit91574444c3Author: liuxueli <liuxueli@iie.ac.cn> Date: Tue Dec 3 11:44:16 2019 +0800 公共字段中的通信市时长单位是:ms;转换单位 KNI发日志需等待TFE结束,需提前构造streaminfo日志字段,调整包数字节数统计位置 细化调整日志 commitff053e3e2cAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Wed Nov 27 11:38:35 2019 +0800 增加调试日志信息 commit2d1a530165Author: liuxueli <liuxueli@iie.ac.cn> Date: Wed Nov 27 11:27:06 2019 +0800 使用前置声明结构体,修改接口函数原型 commit27f0cfc91aAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Wed Nov 27 10:33:48 2019 +0800 提供TLD_append_streaminfo函数接口供KNI使用 修改配置文件 commited0b17a49dMerge:132d80704963feAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Tue Nov 26 17:44:28 2019 +0800 Merge branch 'feature-kni' into 'develop' 增加http解析部分 See merge request tango/tsg_master!3 commit04963fe1bfAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Tue Nov 26 17:41:43 2019 +0800 增加http解析部分 commit132d807af1Author: liuxueli <liuxueli@iie.ac.cn> Date: Tue Nov 26 16:58:54 2019 +0800 调整调试日志内容 commit8cfc6b32fdAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 25 19:30:08 2019 +0800 增加调试日志信息 commit4aef0628e5Author: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 25 18:36:48 2019 +0800 增加调试信息 commit7c9dabdab5Author: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 25 10:51:37 2019 +0800 矫正tableinfo配置项 commit34ec2059eaMerge:27cb2ad2b96c05Author: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 25 10:00:18 2019 +0800 Merge branch 'develop' of https://git.mesalab.cn/tango/tsg_master into develop commit27cb2ad3b2Author: liuxueli <liuxueli@iie.ac.cn> Date: Thu Nov 21 19:21:08 2019 +0800 获取包数、字节数与sapp头文件不一致,导致统计信息颠倒 删除从vxlan里获取信息 commit2b96c050d5Merge:0a11db68d954e4Author: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Thu Nov 21 10:22:42 2019 +0800 Merge branch 'feature-kni' into 'develop' 修改proto初始值为PROTO_UNKONWN See merge request tango/tsg_master!2 commit46a233b782Author: liuxueli <liuxueli@iie.ac.cn> Date: Thu Nov 21 10:18:08 2019 +0800 KNI发送日志的线程不是sapp申请的,所以不能使用dictator_malloc申请内存 增加user_region日志字段 commit8d954e4cc5Author: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Wed Nov 20 19:55:59 2019 +0800 修改proto初始值为PROTO_UNKONWN commit0a11db6d2eAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Wed Nov 20 18:02:54 2019 +0800 增加总控配置文件 commit5c04ba23aaAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Wed Nov 20 18:00:35 2019 +0800 SSL_SNI和HTTP_HOST的deny动作由总控负责处理 修复获取全局流ID时的错误 commit291c05ea79Author: liuxueli <liuxueli@iie.ac.cn> Date: Wed Nov 20 16:40:19 2019 +0800 增加获取全局流ID的接口 调整总控注册为TCP入口 commit28da97b53bAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Wed Nov 20 14:45:41 2019 +0800 支持平台提供的APP_STATE_KILL_OTHER 修复BUG,天剑流标签时未对协议进行赋值,导致tfe颁发证书失败 commit7912ec54b2Author: liuxueli <liuxueli@iie.ac.cn> Date: Tue Nov 19 18:41:31 2019 +0800 修复BUG,命中拦截策略时未对类型进行赋值,导致KNI获取不到命中结果 添加总控配置文件 添加FS2统计日志 添加错误日志 构造适用sapp4.0的rpm commit484feaed94Author: liuxueli <liuxueli@iie.ac.cn> Date: Tue Nov 19 13:39:37 2019 +0800 增加获取deny结果规则的接口 修复自测试过程中遇到的BUG commit5165173025Merge:186e5916b6cbefAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Mon Nov 18 15:46:03 2019 +0800 Merge branch 'feature-fast-path' into feature-kni commit6b6cbeffa1Author: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 18 14:50:32 2019 +0800 修复初始化错误 commite7532d6280Author: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 18 13:33:29 2019 +0800 添加遗漏头文件tsg_entry.h commitf33d11c50bAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 18 13:29:28 2019 +0800 修复编译错误 commit88d9368ceeAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Mon Nov 18 13:25:38 2019 +0800 合并头文件,删除无用头文件 commit382ca0a793Author: 刘学利 <liuxueli@iie.ac.cn> Date: Mon Nov 18 13:21:25 2019 +0800 Delete tsg_types.h commitab58f918e5Author: 刘学利 <liuxueli@iie.ac.cn> Date: Mon Nov 18 13:21:05 2019 +0800 Delete tsg_log_id.h commit3b13075701Author: 刘学利 <liuxueli@iie.ac.cn> Date: Mon Nov 18 13:20:57 2019 +0800 Delete tsg_entry.h commit186e591dbfMerge:39f82ed91c511cAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Fri Nov 15 21:22:44 2019 +0800 Merge branch 'master' into feature-kni commit39f82ed3f7Author: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Fri Nov 15 21:22:39 2019 +0800 接口适配 commit8913a7d22eAuthor: liuxueli <liuxueli@iie.ac.cn> Date: Fri Nov 15 19:29:54 2019 +0800 规则排序功能 统一发送日志功能 commit1cb2358feaMerge:c76bc55bd65accAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Thu Nov 14 15:06:35 2019 +0800 合并master修改 commitc76bc5534dAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Wed Nov 13 19:56:19 2019 +0800 接口增加protocol参数 commitdb7282dab7Author: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Wed Nov 13 19:24:22 2019 +0800 扫描接口增加domain commit56fadd73b2Merge:f9aee059e738aeAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Wed Nov 13 19:08:55 2019 +0800 Merge branch 'master' into feature-kni commitf9aee05bccAuthor: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Wed Nov 13 16:17:59 2019 +0800 修改ssl_utils文件名 commit452a08790cMerge:3abe8a2c1ffc53Author: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Wed Nov 13 16:12:14 2019 +0800 Merge branch 'master' into feature-kni commit3abe8a2fc5Author: 崔一鸣 <cuiyiming@iie.ac.cn> Date: Wed Nov 13 16:11:38 2019 +0800 添加kni模块扫描部分
474 lines
13 KiB
C++
474 lines
13 KiB
C++
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include "tsg_ssl_utils.h"
|
|
|
|
#define ALLOC(type, number) ((type *)calloc(sizeof(type), number))
|
|
#define FREE(p) {free(*p);*p=NULL;}
|
|
#define KNI_STRING_MAX 2048
|
|
|
|
struct cipher_suite cipher_suite_list[] =
|
|
{
|
|
{0xC030, "ECDHE-RSA-AES256-GCM-SHA384"},
|
|
{0xC02C, "ECDHE-ECDSA-AES256-GCM-SHA384"},
|
|
{0xC028, "ECDHE-RSA-AES256-SHA384"},
|
|
{0xC024, "ECDHE-ECDSA-AES256-SHA384"},
|
|
{0xC014, "ECDHE-RSA-AES256-SHA"},
|
|
{0xC00A, "ECDHE-ECDSA-AES256-SHA"},
|
|
{0x00A5, "DH-DSS-AES256-GCM-SHA384"},
|
|
{0x00A3, "DHE-DSS-AES256-GCM-SHA384"},
|
|
{0x00A1, "DH-RSA-AES256-GCM-SHA384"},
|
|
{0x009F, "DHE-RSA-AES256-GCM-SHA384"},
|
|
{0x006B, "DHE-RSA-AES256-SHA256"},
|
|
{0x006A, "DHE-DSS-AES256-SHA256"},
|
|
{0x0069, "DH-RSA-AES256-SHA256"},
|
|
{0x0068, "DH-DSS-AES256-SHA256"},
|
|
{0x0039, "DHE-RSA-AES256-SHA"},
|
|
{0x0038, "DHE-DSS-AES256-SHA"},
|
|
{0x0037, "DH-RSA-AES256-SHA"},
|
|
{0x0036, "DH-DSS-AES256-SHA"},
|
|
{0x0088, "DHE-RSA-CAMELLIA256-SHA"},
|
|
{0x0087, "DHE-DSS-CAMELLIA256-SHA"},
|
|
{0x0086, "DH-RSA-CAMELLIA256-SHA"},
|
|
{0x0085, "DH-DSS-CAMELLIA256-SHA"},
|
|
{0xC019, "AECDH-AES256-SHA"},
|
|
{0x00A7, "ADH-AES256-GCM-SHA384"},
|
|
{0x006D, "ADH-AES256-SHA256"},
|
|
{0x003A, "ADH-AES256-SHA"},
|
|
{0x0089, "ADH-CAMELLIA256-SHA"},
|
|
{0xC032, "ECDH-RSA-AES256-GCM-SHA384"},
|
|
{0xC02E, "ECDH-ECDSA-AES256-GCM-SHA384"},
|
|
{0xC02A, "ECDH-RSA-AES256-SHA384"},
|
|
{0xC026, "ECDH-ECDSA-AES256-SHA384"},
|
|
{0xC00F, "ECDH-RSA-AES256-SHA"},
|
|
{0xC005, "ECDH-ECDSA-AES256-SHA"},
|
|
{0x009D, "AES256-GCM-SHA384"},
|
|
{0x003D, "AES256-SHA256"},
|
|
{0x0035, "AES256-SHA"},
|
|
{0x0084, "CAMELLIA256-SHA"},
|
|
{0x008D, "PSK-AES256-CBC-SHA"},
|
|
{0xC02F, "ECDHE-RSA-AES128-GCM-SHA256"},
|
|
{0xC02B, "ECDHE-ECDSA-AES128-GCM-SHA256"},
|
|
{0xC027, "ECDHE-RSA-AES128-SHA256"},
|
|
{0xC023, "ECDHE-ECDSA-AES128-SHA256"},
|
|
{0xC013, "ECDHE-RSA-AES128-SHA"},
|
|
{0xC009, "ECDHE-ECDSA-AES128-SHA"},
|
|
{0x00A4, "DH-DSS-AES128-GCM-SHA256"},
|
|
{0x00A2, "DHE-DSS-AES128-GCM-SHA256"},
|
|
{0x00A0, "DH-RSA-AES128-GCM-SHA256"},
|
|
{0x009E, "DHE-RSA-AES128-GCM-SHA256"},
|
|
{0x0067, "DHE-RSA-AES128-SHA256"},
|
|
{0x0040, "DHE-DSS-AES128-SHA256"},
|
|
{0x003F, "DH-RSA-AES128-SHA256"},
|
|
{0x003E, "DH-DSS-AES128-SHA256"},
|
|
{0x0033, "DHE-RSA-AES128-SHA"},
|
|
{0x0032, "DHE-DSS-AES128-SHA"},
|
|
{0x0031, "DH-RSA-AES128-SHA"},
|
|
{0x0030, "DH-DSS-AES128-SHA"},
|
|
{0x009A, "DHE-RSA-SEED-SHA"},
|
|
{0x0099, "DHE-DSS-SEED-SHA"},
|
|
{0x0098, "DH-RSA-SEED-SHA"},
|
|
{0x0097, "DH-DSS-SEED-SHA"},
|
|
{0x0045, "DHE-RSA-CAMELLIA128-SHA"},
|
|
{0x0044, "DHE-DSS-CAMELLIA128-SHA"},
|
|
{0x0043, "DH-RSA-CAMELLIA128-SHA"},
|
|
{0x0042, "DH-DSS-CAMELLIA128-SHA"},
|
|
{0xC018, "AECDH-AES128-SHA"},
|
|
{0x00A6, "ADH-AES128-GCM-SHA256"},
|
|
{0x006C, "ADH-AES128-SHA256"},
|
|
{0x0034, "ADH-AES128-SHA"},
|
|
{0x009B, "ADH-SEED-SHA"},
|
|
{0x0046, "ADH-CAMELLIA128-SHA"},
|
|
{0xC031, "ECDH-RSA-AES128-GCM-SHA256"},
|
|
{0xC02D, "ECDH-ECDSA-AES128-GCM-SHA256"},
|
|
{0xC029, "ECDH-RSA-AES128-SHA256"},
|
|
{0xC025, "ECDH-ECDSA-AES128-SHA256"},
|
|
{0xC00E, "ECDH-RSA-AES128-SHA"},
|
|
{0xC004, "ECDH-ECDSA-AES128-SHA"},
|
|
{0x009C, "AES128-GCM-SHA256"},
|
|
{0x003C, "AES128-SHA256"},
|
|
{0x002F, "AES128-SHA"},
|
|
{0x0096, "SEED-SHA"},
|
|
{0x0041, "CAMELLIA128-SHA"},
|
|
{0x008C, "PSK-AES128-CBC-SHA"},
|
|
{0xC012, "ECDHE-RSA-DES-CBC3-SHA"},
|
|
{0xC008, "ECDHE-ECDSA-DES-CBC3-SHA"},
|
|
{0x0016, "EDH-RSA-DES-CBC3-SHA"},
|
|
{0x0013, "EDH-DSS-DES-CBC3-SHA"},
|
|
{0x0010, "DH-RSA-DES-CBC3-SHA"},
|
|
{0x000D, "DH-DSS-DES-CBC3-SHA"},
|
|
{0xC017, "AECDH-DES-CBC3-SHA"},
|
|
{0x001B, "ADH-DES-CBC3-SHA"},
|
|
{0xC00D, "ECDH-RSA-DES-CBC3-SHA"},
|
|
{0xC003, "ECDH-ECDSA-DES-CBC3-SHA"},
|
|
{0x000A, "DES-CBC3-SHA"},
|
|
{0x0007, "IDEA-CBC-SHA"},
|
|
{0x008B, "PSK-3DES-EDE-CBC-SHA"},
|
|
{0x0021, "KRB5-IDEA-CBC-SHA"},
|
|
{0x001F, "KRB5-DES-CBC3-SHA"},
|
|
{0x0025, "KRB5-IDEA-CBC-MD5"},
|
|
{0x0023, "KRB5-DES-CBC3-MD5"},
|
|
{0xC011, "ECDHE-RSA-RC4-SHA"},
|
|
{0xC007, "ECDHE-ECDSA-RC4-SHA"},
|
|
{0xC016, "AECDH-RC4-SHA"},
|
|
{0x0018, "ADH-RC4-MD5"},
|
|
{0xC00C, "ECDH-RSA-RC4-SHA"},
|
|
{0xC002, "ECDH-ECDSA-RC4-SHA"},
|
|
{0x0005, "RC4-SHA"},
|
|
{0x0004, "RC4-MD5"},
|
|
{0x008A, "PSK-RC4-SHA"},
|
|
{0x0020, "KRB5-RC4-SHA"},
|
|
{0x0024, "KRB5-RC4-MD5"},
|
|
{0xC010, "ECDHE-RSA-NULL-SHA"},
|
|
{0xC006, "ECDHE-ECDSA-NULL-SHA"},
|
|
{0xC015, "AECDH-NULL-SHA"},
|
|
{0xC00B, "ECDH-RSA-NULL-SHA"},
|
|
{0xC001, "ECDH-ECDSA-NULL-SHA"},
|
|
{0x003B, "NULL-SHA256"},
|
|
{0x0002, "NULL-SHA"},
|
|
{0x0001, "NULL-MD5"}
|
|
};
|
|
|
|
struct cipher_suite cipher_suite_list_tls13[] =
|
|
{
|
|
{0x1301, "TLS_AES_128_GCM_SHA256"},
|
|
{0x1302, "TLS_AES_256_GCM_SHA384"},
|
|
{0x1303, "TLS_CHACHA20_POLY1305_SHA256"},
|
|
{0x1304, "TLS_AES_128_CCM_SHA256"},
|
|
{0x1305, "TLS_AES_128_CCM_8_SHA256"}
|
|
};
|
|
|
|
void ssl_chello_free(struct ssl_chello* chello)
|
|
{
|
|
if(chello==NULL)
|
|
{
|
|
return;
|
|
}
|
|
free(chello->sni);
|
|
chello->sni = NULL;
|
|
free(chello->alpn);
|
|
chello->alpn = NULL;
|
|
free(chello->cipher_suites);
|
|
chello->cipher_suites = NULL;
|
|
free(chello->cipher_suites_tls13);
|
|
chello->cipher_suites_tls13 = NULL;
|
|
free(chello);
|
|
}
|
|
|
|
static char* parse_alpn_extension(const unsigned char* buff, size_t buff_len, enum chello_parse_result* result)
|
|
{
|
|
size_t pos = 0;
|
|
size_t len = ((size_t)buff[pos] << 8) + (size_t)buff[pos + 1];
|
|
if(2 + len != buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return NULL;
|
|
}
|
|
char* alpn = ALLOC(char, len + 1);
|
|
strncpy((char*)alpn, (const char*)buff + 2, len);
|
|
alpn[len] = '\0';
|
|
*result = CHELLO_PARSE_SUCCESS;
|
|
return alpn;
|
|
}
|
|
|
|
static char* parse_server_name_extension(const unsigned char* buff, size_t buff_len, enum chello_parse_result* result)
|
|
{
|
|
size_t pos = 2; /* skip server name list length */
|
|
size_t len;
|
|
char* sni = NULL;
|
|
while (pos + 3 < buff_len)
|
|
{
|
|
len = ((size_t)buff[pos + 1] << 8) + (size_t)buff[pos + 2];
|
|
if (pos + 3 + len > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return NULL;
|
|
}
|
|
switch (buff[pos])
|
|
{
|
|
case 0x00: /* host_name */
|
|
sni = (char*)malloc(len + 1);
|
|
strncpy(sni, (const char*)buff + pos + 3, len);
|
|
sni[len] = '\0';
|
|
*result = CHELLO_PARSE_SUCCESS;
|
|
}
|
|
pos += 3 + len;
|
|
}
|
|
if (pos != buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
}
|
|
return sni;
|
|
}
|
|
|
|
static enum chello_parse_result parse_extensions(const unsigned char* buff, size_t buff_len, struct ssl_chello* chello) {
|
|
size_t pos = 0;
|
|
/* Parse each 4 bytes for the extension header */
|
|
while (pos + 4 <= buff_len)
|
|
{
|
|
size_t len = ((size_t)buff[pos + 2] << 8) + (size_t)buff[pos + 3];
|
|
/* Check if it's a server name extension */
|
|
if (buff[pos] == 0x00 && buff[pos + 1] == 0x00)
|
|
{
|
|
if (pos + 4 + len > buff_len)
|
|
{
|
|
return CHELLO_PARSE_INVALID_FORMAT;
|
|
}
|
|
enum chello_parse_result result = CHELLO_PARSE_SUCCESS;
|
|
chello->sni = parse_server_name_extension(buff + pos + 4, len, &result);
|
|
if(result != CHELLO_PARSE_SUCCESS)
|
|
{
|
|
return result;
|
|
}
|
|
}
|
|
/* Check if it's a alpn extension */
|
|
if (buff[pos] == 0x00 && buff[pos + 1] == 0x10)
|
|
{
|
|
if (pos + 4 + len > buff_len)
|
|
{
|
|
return CHELLO_PARSE_INVALID_FORMAT;
|
|
}
|
|
enum chello_parse_result result = CHELLO_PARSE_SUCCESS;
|
|
chello->alpn = parse_alpn_extension(buff + pos + 4, len, &result);
|
|
if(result != CHELLO_PARSE_SUCCESS)
|
|
{
|
|
return result;
|
|
}
|
|
}
|
|
pos += (4 + len);
|
|
}
|
|
/* Check we ended where we expected to */
|
|
if (pos != buff_len)
|
|
{
|
|
return CHELLO_PARSE_INVALID_FORMAT;
|
|
}
|
|
return CHELLO_PARSE_SUCCESS;
|
|
}
|
|
|
|
static char* parse_cipher_suites(struct cipher_suite* _cipher_suite_list, int n, const unsigned char* buff, size_t buff_len, enum chello_parse_result* result)
|
|
{
|
|
char* cipher_suites_str = (char* )malloc(KNI_STRING_MAX);
|
|
cipher_suites_str[0] = '\0';
|
|
size_t pos = 0;
|
|
int flag = 0;
|
|
while(pos < buff_len)
|
|
{
|
|
int i = 0;
|
|
for(i = 0;i < n; i++)
|
|
{
|
|
int val = (buff[pos] << 8) + buff[pos + 1];
|
|
if(_cipher_suite_list[i].value == val)
|
|
{
|
|
if(strnlen(_cipher_suite_list[i].name, KNI_STRING_MAX) + strnlen(cipher_suites_str, KNI_STRING_MAX) + 1 > KNI_STRING_MAX)
|
|
{
|
|
flag = 1;
|
|
break;
|
|
}
|
|
strncat(cipher_suites_str, _cipher_suite_list[i].name, KNI_STRING_MAX);
|
|
strncat(cipher_suites_str, ":", KNI_STRING_MAX);
|
|
}
|
|
}
|
|
pos += 2;
|
|
if(flag == 1)
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
int len = strnlen(cipher_suites_str, KNI_STRING_MAX);
|
|
if(len > 0)
|
|
{
|
|
cipher_suites_str[len-1] = '\0';
|
|
}
|
|
if(pos != buff_len && flag == 0)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
free(cipher_suites_str);
|
|
return NULL;
|
|
}
|
|
*result = CHELLO_PARSE_SUCCESS;
|
|
return cipher_suites_str;
|
|
}
|
|
|
|
struct ssl_chello* ssl_chello_parse(const unsigned char* buff, size_t buff_len, enum chello_parse_result* result)
|
|
{
|
|
if(buff == NULL)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return NULL;
|
|
}
|
|
if(buff_len < 1)
|
|
{
|
|
*result = CHELLO_PARSE_NOT_ENOUGH_BUFF;
|
|
return NULL;
|
|
}
|
|
if(buff[0] != 0x80 && buff[0] != 0x16)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return NULL;
|
|
}
|
|
/* SSL 2.0 compatible Client Hello
|
|
* High bit of first byte (length) and content type is Client Hello
|
|
* See RFC5246 Appendix E.2
|
|
* if it is SSL 2.0, only parse version
|
|
*/
|
|
if(buff[0] == 0x80)
|
|
{
|
|
struct ssl_chello* _chello = (struct ssl_chello*)ALLOC(struct ssl_chello, 1);
|
|
_chello->min_version.major = 0x02;
|
|
if(buff_len < 2)
|
|
{
|
|
*result = CHELLO_PARSE_NOT_ENOUGH_BUFF;
|
|
return _chello;
|
|
}
|
|
size_t len = (size_t)buff[1];
|
|
if (buff_len < len + 2)
|
|
{
|
|
*result = CHELLO_PARSE_NOT_ENOUGH_BUFF;
|
|
return _chello;
|
|
}
|
|
buff_len = len + 2;
|
|
size_t pos = 2;
|
|
/* Handshark Message Type: Client Hello */
|
|
if (pos + 1 > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
if (buff[pos] != 0x01)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
pos += 1;
|
|
/* Version */
|
|
if(pos + 2 > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
_chello->max_version.major = buff[pos];
|
|
_chello->max_version.minor = buff[pos + 1];
|
|
_chello->max_version.ossl_format=(uint16_t)_chello->max_version.major<<8|_chello->max_version.minor;
|
|
*result = CHELLO_PARSE_SUCCESS;
|
|
return _chello;
|
|
}
|
|
else
|
|
{
|
|
if (buff_len < 5)
|
|
{
|
|
*result = CHELLO_PARSE_NOT_ENOUGH_BUFF;
|
|
return NULL;
|
|
}
|
|
if(buff[1] != 3 || buff[2] > 4 || buff[2] < 0)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return NULL;
|
|
}
|
|
struct ssl_chello* _chello = (struct ssl_chello*)ALLOC(struct ssl_chello, 1);
|
|
_chello->min_version.major = buff[1];
|
|
_chello->min_version.minor = buff[2];
|
|
_chello->min_version.ossl_format=(uint16_t)_chello->min_version.major<<8|_chello->min_version.minor;
|
|
_chello->max_version.major = -1;
|
|
_chello->max_version.minor = -1;
|
|
_chello->sni = NULL;
|
|
_chello->alpn = NULL;
|
|
_chello->cipher_suites = NULL;
|
|
_chello->cipher_suites_tls13 = NULL;
|
|
/* TLS record length */
|
|
size_t len = ((size_t)buff[3] << 8) + (size_t)buff[4] + 5;
|
|
if (buff_len < len)
|
|
{
|
|
*result = CHELLO_PARSE_NOT_ENOUGH_BUFF;
|
|
return _chello;
|
|
}
|
|
buff_len = len;
|
|
size_t pos = 5;
|
|
if (pos + 1 > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
if (buff[pos] != 0x01)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
pos += 4;
|
|
if(pos + 2 > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
_chello->max_version.major = buff[pos];
|
|
_chello->max_version.minor = buff[pos+1];
|
|
_chello->max_version.ossl_format=(uint16_t)_chello->max_version.major<<8|_chello->max_version.minor;
|
|
|
|
pos += 34;
|
|
/* Session ID */
|
|
if (pos + 1 > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
len = (size_t)buff[pos];
|
|
pos += 1 + len;
|
|
/* Cipher Suites */
|
|
if (pos + 2 > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
len = ((size_t)buff[pos] << 8) + (size_t)buff[pos + 1];
|
|
pos += 2;
|
|
if(pos + len > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
int n = sizeof(cipher_suite_list) / sizeof(struct cipher_suite);
|
|
_chello->cipher_suites = parse_cipher_suites(cipher_suite_list, n, buff + pos, len, result);
|
|
if(*result != CHELLO_PARSE_SUCCESS)
|
|
{
|
|
return _chello;
|
|
}
|
|
n = sizeof(cipher_suite_list_tls13) / sizeof(struct cipher_suite);
|
|
_chello->cipher_suites_tls13 = parse_cipher_suites(cipher_suite_list_tls13, n, buff + pos, len, result);
|
|
if(*result != CHELLO_PARSE_SUCCESS)
|
|
{
|
|
return _chello;
|
|
}
|
|
pos += len;
|
|
/* Compression Methods */
|
|
if (pos >= buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
len = (size_t)buff[pos];
|
|
pos += 1 + len;
|
|
/* no extensions */
|
|
if(pos == buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_SUCCESS;
|
|
return _chello;
|
|
}
|
|
/* Extensions */
|
|
if (pos + 2 > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
len = ((size_t)buff[pos] << 8) + (size_t)buff[pos + 1];
|
|
pos += 2;
|
|
if (pos + len > buff_len)
|
|
{
|
|
*result = CHELLO_PARSE_INVALID_FORMAT;
|
|
return _chello;
|
|
}
|
|
enum chello_parse_result ret = parse_extensions(buff + pos, len, _chello);
|
|
*result = ret;
|
|
return _chello;
|
|
}
|
|
}
|