{-# LANGUAGE BangPatterns #-}
{-# LANGUAGE OverloadedStrings #-}
module Network.TLS.Handshake.Common
( handshakeFailed
, handleException
, unexpected
, newSession
, handshakeTerminate
, sendChangeCipherAndFinish
, recvChangeCipherAndFinish
, RecvState(..)
, runRecvState
, recvPacketHandshake
, onRecvStateHandshake
, ensureRecvComplete
, extensionLookup
, getSessionData
, storePrivInfo
, isSupportedGroup
, checkSupportedGroup
) where
import qualified Data.ByteString as B
import Control.Concurrent.MVar
import Network.TLS.Parameters
import Network.TLS.Compression
import Network.TLS.Context.Internal
import Network.TLS.Session
import Network.TLS.Struct
import Network.TLS.Struct13
import Network.TLS.IO
import Network.TLS.State
import Network.TLS.Handshake.Process
import Network.TLS.Handshake.State
import Network.TLS.Record.State
import Network.TLS.Measurement
import Network.TLS.Types
import Network.TLS.Cipher
import Network.TLS.Crypto
import Network.TLS.Util
import Network.TLS.X509
import Network.TLS.Imports
import Control.Monad.State.Strict
import Control.Exception (IOException, handle, fromException, throwIO)
handshakeFailed :: TLSError -> IO ()
handshakeFailed err = throwIO $ HandshakeFailed err
handleException :: Context -> IO () -> IO ()
handleException ctx f = catchException f $ \exception -> do
let tlserror = fromMaybe (Error_Misc $ show exception) $ fromException exception
setEstablished ctx NotEstablished
handle ignoreIOErr $ do
tls13 <- tls13orLater ctx
if tls13 then
sendPacket13 ctx $ Alert13 $ errorToAlert tlserror
else
sendPacket ctx $ Alert $ errorToAlert tlserror
handshakeFailed tlserror
where
ignoreIOErr :: IOException -> IO ()
ignoreIOErr _ = return ()
errorToAlert :: TLSError -> [(AlertLevel, AlertDescription)]
errorToAlert (Error_Protocol (_, _, ad)) = [(AlertLevel_Fatal, ad)]
errorToAlert (Error_Packet_unexpected _ _) = [(AlertLevel_Fatal, UnexpectedMessage)]
errorToAlert (Error_Packet_Parsing _) = [(AlertLevel_Fatal, DecodeError)]
errorToAlert _ = [(AlertLevel_Fatal, InternalError)]
unexpected :: MonadIO m => String -> Maybe String -> m a
unexpected msg expected = throwCore $ Error_Packet_unexpected msg (maybe "" (" expected: " ++) expected)
newSession :: Context -> IO Session
newSession ctx
| supportedSession $ ctxSupported ctx = Session . Just <$> getStateRNG ctx 32
| otherwise = return $ Session Nothing
handshakeTerminate :: Context -> IO ()
handshakeTerminate ctx = do
session <- usingState_ ctx getSession
case session of
Session (Just sessionId) -> do
sessionData <- getSessionData ctx
let !sessionId' = B.copy sessionId
liftIO $ sessionEstablish (sharedSessionManager $ ctxShared ctx) sessionId' (fromJust "session-data" sessionData)
_ -> return ()
liftIO $ modifyMVar_ (ctxHandshake ctx) $ \ mhshake ->
case mhshake of
Nothing -> return Nothing
Just hshake ->
return $ Just (newEmptyHandshake (hstClientVersion hshake) (hstClientRandom hshake))
{ hstServerRandom = hstServerRandom hshake
, hstMasterSecret = hstMasterSecret hshake
, hstNegotiatedGroup = hstNegotiatedGroup hshake
}
updateMeasure ctx resetBytesCounters
setEstablished ctx Established
return ()
sendChangeCipherAndFinish :: Context
-> Role
-> IO ()
sendChangeCipherAndFinish ctx role = do
sendPacket ctx ChangeCipherSpec
liftIO $ contextFlush ctx
cf <- usingState_ ctx getVersion >>= \ver -> usingHState ctx $ getHandshakeDigest ver role
sendPacket ctx (Handshake [Finished cf])
liftIO $ contextFlush ctx
recvChangeCipherAndFinish :: Context -> IO ()
recvChangeCipherAndFinish ctx = runRecvState ctx (RecvStateNext expectChangeCipher)
where expectChangeCipher ChangeCipherSpec = return $ RecvStateHandshake expectFinish
expectChangeCipher p = unexpected (show p) (Just "change cipher")
expectFinish (Finished _) = return RecvStateDone
expectFinish p = unexpected (show p) (Just "Handshake Finished")
data RecvState m =
RecvStateNext (Packet -> m (RecvState m))
| RecvStateHandshake (Handshake -> m (RecvState m))
| RecvStateDone
recvPacketHandshake :: Context -> IO [Handshake]
recvPacketHandshake ctx = do
pkts <- recvPacket ctx
case pkts of
Right (Handshake l) -> return l
Right x@(AppData _) -> do
established <- ctxEstablished ctx
case established of
EarlyDataNotAllowed n
| n > 0 -> do setEstablished ctx $ EarlyDataNotAllowed (n - 1)
recvPacketHandshake ctx
_ -> unexpected (show x) (Just "handshake")
Right x -> unexpected (show x) (Just "handshake")
Left err -> throwCore err
onRecvStateHandshake :: Context -> RecvState IO -> [Handshake] -> IO (RecvState IO)
onRecvStateHandshake _ recvState [] = return recvState
onRecvStateHandshake _ (RecvStateNext f) hms = f (Handshake hms)
onRecvStateHandshake ctx (RecvStateHandshake f) (x:xs) = do
nstate <- f x
processHandshake ctx x
onRecvStateHandshake ctx nstate xs
onRecvStateHandshake _ _ _ = unexpected "spurious handshake" Nothing
runRecvState :: Context -> RecvState IO -> IO ()
runRecvState _ RecvStateDone = return ()
runRecvState ctx (RecvStateNext f) = recvPacket ctx >>= either throwCore f >>= runRecvState ctx
runRecvState ctx iniState = recvPacketHandshake ctx >>= onRecvStateHandshake ctx iniState >>= runRecvState ctx
ensureRecvComplete :: MonadIO m => Context -> m ()
ensureRecvComplete ctx = do
complete <- liftIO $ isRecvComplete ctx
unless complete $
throwCore $ Error_Protocol ("received incomplete message at key change", True, UnexpectedMessage)
getSessionData :: Context -> IO (Maybe SessionData)
getSessionData ctx = do
ver <- usingState_ ctx getVersion
sni <- usingState_ ctx getClientSNI
mms <- usingHState ctx (gets hstMasterSecret)
tx <- liftIO $ readMVar (ctxTxState ctx)
alpn <- usingState_ ctx getNegotiatedProtocol
let !cipher = cipherID $ fromJust "cipher" $ stCipher tx
!compression = compressionID $ stCompression tx
case mms of
Nothing -> return Nothing
Just ms -> return $ Just SessionData
{ sessionVersion = ver
, sessionCipher = cipher
, sessionCompression = compression
, sessionClientSNI = sni
, sessionSecret = ms
, sessionGroup = Nothing
, sessionTicketInfo = Nothing
, sessionALPN = alpn
, sessionMaxEarlyDataSize = 0
}
extensionLookup :: ExtensionID -> [ExtensionRaw] -> Maybe ByteString
extensionLookup toFind = fmap (\(ExtensionRaw _ content) -> content)
. find (\(ExtensionRaw eid _) -> eid == toFind)
storePrivInfo :: MonadIO m
=> Context
-> CertificateChain
-> PrivKey
-> m DigitalSignatureAlg
storePrivInfo ctx cc privkey = do
let CertificateChain (c:_) = cc
pubkey = certPubKey $ getCertificate c
privalg <- case findDigitalSignatureAlg (pubkey, privkey) of
Just alg -> return alg
Nothing -> throwCore $ Error_Protocol
( "mismatched or unsupported private key pair"
, True
, InternalError )
usingHState ctx $ setPublicPrivateKeys (pubkey, privkey)
return privalg
checkSupportedGroup :: Context -> Group -> IO ()
checkSupportedGroup ctx grp =
unless (isSupportedGroup ctx grp) $
let msg = "unsupported (EC)DHE group: " ++ show grp
in throwCore $ Error_Protocol (msg, True, IllegalParameter)
isSupportedGroup :: Context -> Group -> Bool
isSupportedGroup ctx grp = grp `elem` supportedGroups (ctxSupported ctx)