tls_schannel.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758
  1. /*
  2. * SSL/TLS interface functions for Microsoft Schannel
  3. * Copyright (c) 2005-2009, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. /*
  9. * FIX: Go through all SSPI functions and verify what needs to be freed
  10. * FIX: session resumption
  11. * TODO: add support for server cert chain validation
  12. * TODO: add support for CA cert validation
  13. * TODO: add support for EAP-TLS (client cert/key conf)
  14. */
  15. #include "includes.h"
  16. #include <windows.h>
  17. #include <wincrypt.h>
  18. #include <schannel.h>
  19. #define SECURITY_WIN32
  20. #include <security.h>
  21. #include <sspi.h>
  22. #include "common.h"
  23. #include "tls.h"
  24. struct tls_global {
  25. HMODULE hsecurity;
  26. PSecurityFunctionTable sspi;
  27. HCERTSTORE my_cert_store;
  28. };
  29. struct tls_connection {
  30. int established, start;
  31. int failed, read_alerts, write_alerts;
  32. SCHANNEL_CRED schannel_cred;
  33. CredHandle creds;
  34. CtxtHandle context;
  35. u8 eap_tls_prf[128];
  36. int eap_tls_prf_set;
  37. };
  38. static int schannel_load_lib(struct tls_global *global)
  39. {
  40. INIT_SECURITY_INTERFACE pInitSecurityInterface;
  41. global->hsecurity = LoadLibrary(TEXT("Secur32.dll"));
  42. if (global->hsecurity == NULL) {
  43. wpa_printf(MSG_ERROR, "%s: Could not load Secur32.dll - 0x%x",
  44. __func__, (unsigned int) GetLastError());
  45. return -1;
  46. }
  47. pInitSecurityInterface = (INIT_SECURITY_INTERFACE) GetProcAddress(
  48. global->hsecurity, "InitSecurityInterfaceA");
  49. if (pInitSecurityInterface == NULL) {
  50. wpa_printf(MSG_ERROR, "%s: Could not find "
  51. "InitSecurityInterfaceA from Secur32.dll",
  52. __func__);
  53. FreeLibrary(global->hsecurity);
  54. global->hsecurity = NULL;
  55. return -1;
  56. }
  57. global->sspi = pInitSecurityInterface();
  58. if (global->sspi == NULL) {
  59. wpa_printf(MSG_ERROR, "%s: Could not read security "
  60. "interface - 0x%x",
  61. __func__, (unsigned int) GetLastError());
  62. FreeLibrary(global->hsecurity);
  63. global->hsecurity = NULL;
  64. return -1;
  65. }
  66. return 0;
  67. }
  68. void * tls_init(const struct tls_config *conf)
  69. {
  70. struct tls_global *global;
  71. global = os_zalloc(sizeof(*global));
  72. if (global == NULL)
  73. return NULL;
  74. if (schannel_load_lib(global)) {
  75. os_free(global);
  76. return NULL;
  77. }
  78. return global;
  79. }
  80. void tls_deinit(void *ssl_ctx)
  81. {
  82. struct tls_global *global = ssl_ctx;
  83. if (global->my_cert_store)
  84. CertCloseStore(global->my_cert_store, 0);
  85. FreeLibrary(global->hsecurity);
  86. os_free(global);
  87. }
  88. int tls_get_errors(void *ssl_ctx)
  89. {
  90. return 0;
  91. }
  92. struct tls_connection * tls_connection_init(void *ssl_ctx)
  93. {
  94. struct tls_connection *conn;
  95. conn = os_zalloc(sizeof(*conn));
  96. if (conn == NULL)
  97. return NULL;
  98. conn->start = 1;
  99. return conn;
  100. }
  101. void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn)
  102. {
  103. if (conn == NULL)
  104. return;
  105. os_free(conn);
  106. }
  107. int tls_connection_established(void *ssl_ctx, struct tls_connection *conn)
  108. {
  109. return conn ? conn->established : 0;
  110. }
  111. int tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn)
  112. {
  113. struct tls_global *global = ssl_ctx;
  114. if (conn == NULL)
  115. return -1;
  116. conn->eap_tls_prf_set = 0;
  117. conn->established = conn->failed = 0;
  118. conn->read_alerts = conn->write_alerts = 0;
  119. global->sspi->DeleteSecurityContext(&conn->context);
  120. /* FIX: what else needs to be reseted? */
  121. return 0;
  122. }
  123. int tls_global_set_params(void *tls_ctx,
  124. const struct tls_connection_params *params)
  125. {
  126. return -1;
  127. }
  128. int tls_global_set_verify(void *ssl_ctx, int check_crl)
  129. {
  130. return -1;
  131. }
  132. int tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn,
  133. int verify_peer)
  134. {
  135. return -1;
  136. }
  137. int tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn,
  138. struct tls_keys *keys)
  139. {
  140. /* Schannel does not export master secret or client/server random. */
  141. return -1;
  142. }
  143. int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,
  144. const char *label, int server_random_first,
  145. u8 *out, size_t out_len)
  146. {
  147. /*
  148. * Cannot get master_key from Schannel, but EapKeyBlock can be used to
  149. * generate session keys for EAP-TLS and EAP-PEAPv0. EAP-PEAPv2 and
  150. * EAP-TTLS cannot use this, though, since they are using different
  151. * labels. The only option could be to implement TLSv1 completely here
  152. * and just use Schannel or CryptoAPI for low-level crypto
  153. * functionality..
  154. */
  155. if (conn == NULL || !conn->eap_tls_prf_set || server_random_first ||
  156. os_strcmp(label, "client EAP encryption") != 0 ||
  157. out_len > sizeof(conn->eap_tls_prf))
  158. return -1;
  159. os_memcpy(out, conn->eap_tls_prf, out_len);
  160. return 0;
  161. }
  162. static struct wpabuf * tls_conn_hs_clienthello(struct tls_global *global,
  163. struct tls_connection *conn)
  164. {
  165. DWORD sspi_flags, sspi_flags_out;
  166. SecBufferDesc outbuf;
  167. SecBuffer outbufs[1];
  168. SECURITY_STATUS status;
  169. TimeStamp ts_expiry;
  170. sspi_flags = ISC_REQ_REPLAY_DETECT |
  171. ISC_REQ_CONFIDENTIALITY |
  172. ISC_RET_EXTENDED_ERROR |
  173. ISC_REQ_ALLOCATE_MEMORY |
  174. ISC_REQ_MANUAL_CRED_VALIDATION;
  175. wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
  176. outbufs[0].pvBuffer = NULL;
  177. outbufs[0].BufferType = SECBUFFER_TOKEN;
  178. outbufs[0].cbBuffer = 0;
  179. outbuf.cBuffers = 1;
  180. outbuf.pBuffers = outbufs;
  181. outbuf.ulVersion = SECBUFFER_VERSION;
  182. #ifdef UNICODE
  183. status = global->sspi->InitializeSecurityContextW(
  184. &conn->creds, NULL, NULL /* server name */, sspi_flags, 0,
  185. SECURITY_NATIVE_DREP, NULL, 0, &conn->context,
  186. &outbuf, &sspi_flags_out, &ts_expiry);
  187. #else /* UNICODE */
  188. status = global->sspi->InitializeSecurityContextA(
  189. &conn->creds, NULL, NULL /* server name */, sspi_flags, 0,
  190. SECURITY_NATIVE_DREP, NULL, 0, &conn->context,
  191. &outbuf, &sspi_flags_out, &ts_expiry);
  192. #endif /* UNICODE */
  193. if (status != SEC_I_CONTINUE_NEEDED) {
  194. wpa_printf(MSG_ERROR, "%s: InitializeSecurityContextA "
  195. "failed - 0x%x",
  196. __func__, (unsigned int) status);
  197. return NULL;
  198. }
  199. if (outbufs[0].cbBuffer != 0 && outbufs[0].pvBuffer) {
  200. struct wpabuf *buf;
  201. wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello",
  202. outbufs[0].pvBuffer, outbufs[0].cbBuffer);
  203. conn->start = 0;
  204. buf = wpabuf_alloc_copy(outbufs[0].pvBuffer,
  205. outbufs[0].cbBuffer);
  206. if (buf == NULL)
  207. return NULL;
  208. global->sspi->FreeContextBuffer(outbufs[0].pvBuffer);
  209. return buf;
  210. }
  211. wpa_printf(MSG_ERROR, "SChannel: Failed to generate ClientHello");
  212. return NULL;
  213. }
  214. #ifndef SECPKG_ATTR_EAP_KEY_BLOCK
  215. #define SECPKG_ATTR_EAP_KEY_BLOCK 0x5b
  216. typedef struct _SecPkgContext_EapKeyBlock {
  217. BYTE rgbKeys[128];
  218. BYTE rgbIVs[64];
  219. } SecPkgContext_EapKeyBlock, *PSecPkgContext_EapKeyBlock;
  220. #endif /* !SECPKG_ATTR_EAP_KEY_BLOCK */
  221. static int tls_get_eap(struct tls_global *global, struct tls_connection *conn)
  222. {
  223. SECURITY_STATUS status;
  224. SecPkgContext_EapKeyBlock kb;
  225. /* Note: Windows NT and Windows Me/98/95 do not support getting
  226. * EapKeyBlock */
  227. status = global->sspi->QueryContextAttributes(
  228. &conn->context, SECPKG_ATTR_EAP_KEY_BLOCK, &kb);
  229. if (status != SEC_E_OK) {
  230. wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
  231. "SECPKG_ATTR_EAP_KEY_BLOCK) failed (%d)",
  232. __func__, (int) status);
  233. return -1;
  234. }
  235. wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys",
  236. kb.rgbKeys, sizeof(kb.rgbKeys));
  237. wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs",
  238. kb.rgbIVs, sizeof(kb.rgbIVs));
  239. os_memcpy(conn->eap_tls_prf, kb.rgbKeys, sizeof(kb.rgbKeys));
  240. conn->eap_tls_prf_set = 1;
  241. return 0;
  242. }
  243. struct wpabuf * tls_connection_handshake(void *tls_ctx,
  244. struct tls_connection *conn,
  245. const struct wpabuf *in_data,
  246. struct wpabuf **appl_data)
  247. {
  248. struct tls_global *global = tls_ctx;
  249. DWORD sspi_flags, sspi_flags_out;
  250. SecBufferDesc inbuf, outbuf;
  251. SecBuffer inbufs[2], outbufs[1];
  252. SECURITY_STATUS status;
  253. TimeStamp ts_expiry;
  254. struct wpabuf *out_buf = NULL;
  255. if (appl_data)
  256. *appl_data = NULL;
  257. if (conn->start)
  258. return tls_conn_hs_clienthello(global, conn);
  259. wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
  260. (int) wpabuf_len(in_data));
  261. sspi_flags = ISC_REQ_REPLAY_DETECT |
  262. ISC_REQ_CONFIDENTIALITY |
  263. ISC_RET_EXTENDED_ERROR |
  264. ISC_REQ_ALLOCATE_MEMORY |
  265. ISC_REQ_MANUAL_CRED_VALIDATION;
  266. /* Input buffer for Schannel */
  267. inbufs[0].pvBuffer = (u8 *) wpabuf_head(in_data);
  268. inbufs[0].cbBuffer = wpabuf_len(in_data);
  269. inbufs[0].BufferType = SECBUFFER_TOKEN;
  270. /* Place for leftover data from Schannel */
  271. inbufs[1].pvBuffer = NULL;
  272. inbufs[1].cbBuffer = 0;
  273. inbufs[1].BufferType = SECBUFFER_EMPTY;
  274. inbuf.cBuffers = 2;
  275. inbuf.pBuffers = inbufs;
  276. inbuf.ulVersion = SECBUFFER_VERSION;
  277. /* Output buffer for Schannel */
  278. outbufs[0].pvBuffer = NULL;
  279. outbufs[0].cbBuffer = 0;
  280. outbufs[0].BufferType = SECBUFFER_TOKEN;
  281. outbuf.cBuffers = 1;
  282. outbuf.pBuffers = outbufs;
  283. outbuf.ulVersion = SECBUFFER_VERSION;
  284. #ifdef UNICODE
  285. status = global->sspi->InitializeSecurityContextW(
  286. &conn->creds, &conn->context, NULL, sspi_flags, 0,
  287. SECURITY_NATIVE_DREP, &inbuf, 0, NULL,
  288. &outbuf, &sspi_flags_out, &ts_expiry);
  289. #else /* UNICODE */
  290. status = global->sspi->InitializeSecurityContextA(
  291. &conn->creds, &conn->context, NULL, sspi_flags, 0,
  292. SECURITY_NATIVE_DREP, &inbuf, 0, NULL,
  293. &outbuf, &sspi_flags_out, &ts_expiry);
  294. #endif /* UNICODE */
  295. wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> "
  296. "status=%d inlen[0]=%d intype[0]=%d inlen[1]=%d "
  297. "intype[1]=%d outlen[0]=%d",
  298. (int) status, (int) inbufs[0].cbBuffer,
  299. (int) inbufs[0].BufferType, (int) inbufs[1].cbBuffer,
  300. (int) inbufs[1].BufferType,
  301. (int) outbufs[0].cbBuffer);
  302. if (status == SEC_E_OK || status == SEC_I_CONTINUE_NEEDED ||
  303. (FAILED(status) && (sspi_flags_out & ISC_RET_EXTENDED_ERROR))) {
  304. if (outbufs[0].cbBuffer != 0 && outbufs[0].pvBuffer) {
  305. wpa_hexdump(MSG_MSGDUMP, "SChannel - output",
  306. outbufs[0].pvBuffer, outbufs[0].cbBuffer);
  307. out_buf = wpabuf_alloc_copy(outbufs[0].pvBuffer,
  308. outbufs[0].cbBuffer);
  309. global->sspi->FreeContextBuffer(outbufs[0].pvBuffer);
  310. outbufs[0].pvBuffer = NULL;
  311. if (out_buf == NULL)
  312. return NULL;
  313. }
  314. }
  315. switch (status) {
  316. case SEC_E_INCOMPLETE_MESSAGE:
  317. wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
  318. break;
  319. case SEC_I_CONTINUE_NEEDED:
  320. wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
  321. break;
  322. case SEC_E_OK:
  323. /* TODO: verify server certificate chain */
  324. wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
  325. "completed successfully");
  326. conn->established = 1;
  327. tls_get_eap(global, conn);
  328. /* Need to return something to get final TLS ACK. */
  329. if (out_buf == NULL)
  330. out_buf = wpabuf_alloc(0);
  331. if (inbufs[1].BufferType == SECBUFFER_EXTRA) {
  332. wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted "
  333. "application data",
  334. inbufs[1].pvBuffer, inbufs[1].cbBuffer);
  335. if (appl_data) {
  336. *appl_data = wpabuf_alloc_copy(
  337. outbufs[1].pvBuffer,
  338. outbufs[1].cbBuffer);
  339. }
  340. global->sspi->FreeContextBuffer(inbufs[1].pvBuffer);
  341. inbufs[1].pvBuffer = NULL;
  342. }
  343. break;
  344. case SEC_I_INCOMPLETE_CREDENTIALS:
  345. wpa_printf(MSG_DEBUG,
  346. "Schannel: SEC_I_INCOMPLETE_CREDENTIALS");
  347. break;
  348. case SEC_E_WRONG_PRINCIPAL:
  349. wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
  350. break;
  351. case SEC_E_INTERNAL_ERROR:
  352. wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
  353. break;
  354. }
  355. if (FAILED(status)) {
  356. wpa_printf(MSG_DEBUG, "Schannel: Handshake failed "
  357. "(out_buf=%p)", out_buf);
  358. conn->failed++;
  359. global->sspi->DeleteSecurityContext(&conn->context);
  360. return out_buf;
  361. }
  362. if (inbufs[1].BufferType == SECBUFFER_EXTRA) {
  363. /* TODO: Can this happen? What to do with this data? */
  364. wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data",
  365. inbufs[1].pvBuffer, inbufs[1].cbBuffer);
  366. global->sspi->FreeContextBuffer(inbufs[1].pvBuffer);
  367. inbufs[1].pvBuffer = NULL;
  368. }
  369. return out_buf;
  370. }
  371. struct wpabuf * tls_connection_server_handshake(void *tls_ctx,
  372. struct tls_connection *conn,
  373. const struct wpabuf *in_data,
  374. struct wpabuf **appl_data)
  375. {
  376. return NULL;
  377. }
  378. struct wpabuf * tls_connection_encrypt(void *tls_ctx,
  379. struct tls_connection *conn,
  380. const struct wpabuf *in_data)
  381. {
  382. struct tls_global *global = tls_ctx;
  383. SECURITY_STATUS status;
  384. SecBufferDesc buf;
  385. SecBuffer bufs[4];
  386. SecPkgContext_StreamSizes sizes;
  387. int i;
  388. struct wpabuf *out;
  389. status = global->sspi->QueryContextAttributes(&conn->context,
  390. SECPKG_ATTR_STREAM_SIZES,
  391. &sizes);
  392. if (status != SEC_E_OK) {
  393. wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes failed",
  394. __func__);
  395. return NULL;
  396. }
  397. wpa_printf(MSG_DEBUG, "%s: Stream sizes: header=%u trailer=%u",
  398. __func__,
  399. (unsigned int) sizes.cbHeader,
  400. (unsigned int) sizes.cbTrailer);
  401. out = wpabuf_alloc(sizes.cbHeader + wpabuf_len(in_data) +
  402. sizes.cbTrailer);
  403. os_memset(&bufs, 0, sizeof(bufs));
  404. bufs[0].pvBuffer = wpabuf_put(out, sizes.cbHeader);
  405. bufs[0].cbBuffer = sizes.cbHeader;
  406. bufs[0].BufferType = SECBUFFER_STREAM_HEADER;
  407. bufs[1].pvBuffer = wpabuf_put(out, 0);
  408. wpabuf_put_buf(out, in_data);
  409. bufs[1].cbBuffer = wpabuf_len(in_data);
  410. bufs[1].BufferType = SECBUFFER_DATA;
  411. bufs[2].pvBuffer = wpabuf_put(out, sizes.cbTrailer);
  412. bufs[2].cbBuffer = sizes.cbTrailer;
  413. bufs[2].BufferType = SECBUFFER_STREAM_TRAILER;
  414. buf.ulVersion = SECBUFFER_VERSION;
  415. buf.cBuffers = 3;
  416. buf.pBuffers = bufs;
  417. status = global->sspi->EncryptMessage(&conn->context, 0, &buf, 0);
  418. wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> "
  419. "status=%d len[0]=%d type[0]=%d len[1]=%d type[1]=%d "
  420. "len[2]=%d type[2]=%d",
  421. (int) status,
  422. (int) bufs[0].cbBuffer, (int) bufs[0].BufferType,
  423. (int) bufs[1].cbBuffer, (int) bufs[1].BufferType,
  424. (int) bufs[2].cbBuffer, (int) bufs[2].BufferType);
  425. wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: "
  426. "out_data=%p bufs %p %p %p",
  427. wpabuf_head(out), bufs[0].pvBuffer, bufs[1].pvBuffer,
  428. bufs[2].pvBuffer);
  429. for (i = 0; i < 3; i++) {
  430. if (bufs[i].pvBuffer && bufs[i].BufferType != SECBUFFER_EMPTY)
  431. {
  432. wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs",
  433. bufs[i].pvBuffer, bufs[i].cbBuffer);
  434. }
  435. }
  436. if (status == SEC_E_OK) {
  437. wpa_printf(MSG_DEBUG, "%s: SEC_E_OK", __func__);
  438. wpa_hexdump_buf_key(MSG_MSGDUMP, "Schannel: Encrypted data "
  439. "from EncryptMessage", out);
  440. return out;
  441. }
  442. wpa_printf(MSG_DEBUG, "%s: Failed - status=%d",
  443. __func__, (int) status);
  444. wpabuf_free(out);
  445. return NULL;
  446. }
  447. struct wpabuf * tls_connection_decrypt(void *tls_ctx,
  448. struct tls_connection *conn,
  449. const struct wpabuf *in_data)
  450. {
  451. struct tls_global *global = tls_ctx;
  452. SECURITY_STATUS status;
  453. SecBufferDesc buf;
  454. SecBuffer bufs[4];
  455. int i;
  456. struct wpabuf *out, *tmp;
  457. wpa_hexdump_buf(MSG_MSGDUMP,
  458. "Schannel: Encrypted data to DecryptMessage", in_data);
  459. os_memset(&bufs, 0, sizeof(bufs));
  460. tmp = wpabuf_dup(in_data);
  461. if (tmp == NULL)
  462. return NULL;
  463. bufs[0].pvBuffer = wpabuf_mhead(tmp);
  464. bufs[0].cbBuffer = wpabuf_len(in_data);
  465. bufs[0].BufferType = SECBUFFER_DATA;
  466. bufs[1].BufferType = SECBUFFER_EMPTY;
  467. bufs[2].BufferType = SECBUFFER_EMPTY;
  468. bufs[3].BufferType = SECBUFFER_EMPTY;
  469. buf.ulVersion = SECBUFFER_VERSION;
  470. buf.cBuffers = 4;
  471. buf.pBuffers = bufs;
  472. status = global->sspi->DecryptMessage(&conn->context, &buf, 0,
  473. NULL);
  474. wpa_printf(MSG_MSGDUMP, "Schannel: DecryptMessage -> "
  475. "status=%d len[0]=%d type[0]=%d len[1]=%d type[1]=%d "
  476. "len[2]=%d type[2]=%d len[3]=%d type[3]=%d",
  477. (int) status,
  478. (int) bufs[0].cbBuffer, (int) bufs[0].BufferType,
  479. (int) bufs[1].cbBuffer, (int) bufs[1].BufferType,
  480. (int) bufs[2].cbBuffer, (int) bufs[2].BufferType,
  481. (int) bufs[3].cbBuffer, (int) bufs[3].BufferType);
  482. wpa_printf(MSG_MSGDUMP, "Schannel: DecryptMessage pointers: "
  483. "out_data=%p bufs %p %p %p %p",
  484. wpabuf_head(tmp), bufs[0].pvBuffer, bufs[1].pvBuffer,
  485. bufs[2].pvBuffer, bufs[3].pvBuffer);
  486. switch (status) {
  487. case SEC_E_INCOMPLETE_MESSAGE:
  488. wpa_printf(MSG_DEBUG, "%s: SEC_E_INCOMPLETE_MESSAGE",
  489. __func__);
  490. break;
  491. case SEC_E_OK:
  492. wpa_printf(MSG_DEBUG, "%s: SEC_E_OK", __func__);
  493. for (i = 0; i < 4; i++) {
  494. if (bufs[i].BufferType == SECBUFFER_DATA)
  495. break;
  496. }
  497. if (i == 4) {
  498. wpa_printf(MSG_DEBUG, "%s: No output data from "
  499. "DecryptMessage", __func__);
  500. wpabuf_free(tmp);
  501. return NULL;
  502. }
  503. wpa_hexdump_key(MSG_MSGDUMP, "Schannel: Decrypted data from "
  504. "DecryptMessage",
  505. bufs[i].pvBuffer, bufs[i].cbBuffer);
  506. out = wpabuf_alloc_copy(bufs[i].pvBuffer, bufs[i].cbBuffer);
  507. wpabuf_free(tmp);
  508. return out;
  509. }
  510. wpa_printf(MSG_DEBUG, "%s: Failed - status=%d",
  511. __func__, (int) status);
  512. wpabuf_free(tmp);
  513. return NULL;
  514. }
  515. int tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn)
  516. {
  517. return 0;
  518. }
  519. int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
  520. u8 *ciphers)
  521. {
  522. return -1;
  523. }
  524. int tls_get_cipher(void *ssl_ctx, struct tls_connection *conn,
  525. char *buf, size_t buflen)
  526. {
  527. return -1;
  528. }
  529. int tls_connection_enable_workaround(void *ssl_ctx,
  530. struct tls_connection *conn)
  531. {
  532. return 0;
  533. }
  534. int tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn,
  535. int ext_type, const u8 *data,
  536. size_t data_len)
  537. {
  538. return -1;
  539. }
  540. int tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn)
  541. {
  542. if (conn == NULL)
  543. return -1;
  544. return conn->failed;
  545. }
  546. int tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn)
  547. {
  548. if (conn == NULL)
  549. return -1;
  550. return conn->read_alerts;
  551. }
  552. int tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn)
  553. {
  554. if (conn == NULL)
  555. return -1;
  556. return conn->write_alerts;
  557. }
  558. int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
  559. const struct tls_connection_params *params)
  560. {
  561. struct tls_global *global = tls_ctx;
  562. ALG_ID algs[1];
  563. SECURITY_STATUS status;
  564. TimeStamp ts_expiry;
  565. if (conn == NULL)
  566. return -1;
  567. if (params->subject_match) {
  568. wpa_printf(MSG_INFO, "TLS: subject_match not supported");
  569. return -1;
  570. }
  571. if (params->altsubject_match) {
  572. wpa_printf(MSG_INFO, "TLS: altsubject_match not supported");
  573. return -1;
  574. }
  575. if (params->suffix_match) {
  576. wpa_printf(MSG_INFO, "TLS: suffix_match not supported");
  577. return -1;
  578. }
  579. if (params->openssl_ciphers) {
  580. wpa_printf(MSG_INFO, "GnuTLS: openssl_ciphers not supported");
  581. return -1;
  582. }
  583. if (global->my_cert_store == NULL &&
  584. (global->my_cert_store = CertOpenSystemStore(0, TEXT("MY"))) ==
  585. NULL) {
  586. wpa_printf(MSG_ERROR, "%s: CertOpenSystemStore failed - 0x%x",
  587. __func__, (unsigned int) GetLastError());
  588. return -1;
  589. }
  590. os_memset(&conn->schannel_cred, 0, sizeof(conn->schannel_cred));
  591. conn->schannel_cred.dwVersion = SCHANNEL_CRED_VERSION;
  592. conn->schannel_cred.grbitEnabledProtocols = SP_PROT_TLS1;
  593. algs[0] = CALG_RSA_KEYX;
  594. conn->schannel_cred.cSupportedAlgs = 1;
  595. conn->schannel_cred.palgSupportedAlgs = algs;
  596. conn->schannel_cred.dwFlags |= SCH_CRED_NO_DEFAULT_CREDS;
  597. #ifdef UNICODE
  598. status = global->sspi->AcquireCredentialsHandleW(
  599. NULL, UNISP_NAME_W, SECPKG_CRED_OUTBOUND, NULL,
  600. &conn->schannel_cred, NULL, NULL, &conn->creds, &ts_expiry);
  601. #else /* UNICODE */
  602. status = global->sspi->AcquireCredentialsHandleA(
  603. NULL, UNISP_NAME_A, SECPKG_CRED_OUTBOUND, NULL,
  604. &conn->schannel_cred, NULL, NULL, &conn->creds, &ts_expiry);
  605. #endif /* UNICODE */
  606. if (status != SEC_E_OK) {
  607. wpa_printf(MSG_DEBUG, "%s: AcquireCredentialsHandleA failed - "
  608. "0x%x", __func__, (unsigned int) status);
  609. return -1;
  610. }
  611. return 0;
  612. }
  613. unsigned int tls_capabilities(void *tls_ctx)
  614. {
  615. return 0;
  616. }
  617. int tls_get_library_version(char *buf, size_t buf_len)
  618. {
  619. return os_snprintf(buf, buf_len, "schannel");
  620. }