1*0957b409SSimon J. Gerraty /*
2*0957b409SSimon J. Gerraty * Copyright (c) 2016 Thomas Pornin <pornin@bolet.org>
3*0957b409SSimon J. Gerraty *
4*0957b409SSimon J. Gerraty * Permission is hereby granted, free of charge, to any person obtaining
5*0957b409SSimon J. Gerraty * a copy of this software and associated documentation files (the
6*0957b409SSimon J. Gerraty * "Software"), to deal in the Software without restriction, including
7*0957b409SSimon J. Gerraty * without limitation the rights to use, copy, modify, merge, publish,
8*0957b409SSimon J. Gerraty * distribute, sublicense, and/or sell copies of the Software, and to
9*0957b409SSimon J. Gerraty * permit persons to whom the Software is furnished to do so, subject to
10*0957b409SSimon J. Gerraty * the following conditions:
11*0957b409SSimon J. Gerraty *
12*0957b409SSimon J. Gerraty * The above copyright notice and this permission notice shall be
13*0957b409SSimon J. Gerraty * included in all copies or substantial portions of the Software.
14*0957b409SSimon J. Gerraty *
15*0957b409SSimon J. Gerraty * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
16*0957b409SSimon J. Gerraty * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
17*0957b409SSimon J. Gerraty * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
18*0957b409SSimon J. Gerraty * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
19*0957b409SSimon J. Gerraty * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
20*0957b409SSimon J. Gerraty * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
21*0957b409SSimon J. Gerraty * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22*0957b409SSimon J. Gerraty * SOFTWARE.
23*0957b409SSimon J. Gerraty */
24*0957b409SSimon J. Gerraty
25*0957b409SSimon J. Gerraty #include "inner.h"
26*0957b409SSimon J. Gerraty
27*0957b409SSimon J. Gerraty /* see bearssl_ssl.h */
28*0957b409SSimon J. Gerraty void
br_ssl_client_init_full(br_ssl_client_context * cc,br_x509_minimal_context * xc,const br_x509_trust_anchor * trust_anchors,size_t trust_anchors_num)29*0957b409SSimon J. Gerraty br_ssl_client_init_full(br_ssl_client_context *cc,
30*0957b409SSimon J. Gerraty br_x509_minimal_context *xc,
31*0957b409SSimon J. Gerraty const br_x509_trust_anchor *trust_anchors, size_t trust_anchors_num)
32*0957b409SSimon J. Gerraty {
33*0957b409SSimon J. Gerraty /*
34*0957b409SSimon J. Gerraty * The "full" profile supports all implemented cipher suites.
35*0957b409SSimon J. Gerraty *
36*0957b409SSimon J. Gerraty * Rationale for suite order, from most important to least
37*0957b409SSimon J. Gerraty * important rule:
38*0957b409SSimon J. Gerraty *
39*0957b409SSimon J. Gerraty * -- Don't use 3DES if AES or ChaCha20 is available.
40*0957b409SSimon J. Gerraty * -- Try to have Forward Secrecy (ECDHE suite) if possible.
41*0957b409SSimon J. Gerraty * -- When not using Forward Secrecy, ECDH key exchange is
42*0957b409SSimon J. Gerraty * better than RSA key exchange (slightly more expensive on the
43*0957b409SSimon J. Gerraty * client, but much cheaper on the server, and it implies smaller
44*0957b409SSimon J. Gerraty * messages).
45*0957b409SSimon J. Gerraty * -- ChaCha20+Poly1305 is better than AES/GCM (faster, smaller code).
46*0957b409SSimon J. Gerraty * -- GCM is better than CCM and CBC. CCM is better than CBC.
47*0957b409SSimon J. Gerraty * -- CCM is preferable over CCM_8 (with CCM_8, forgeries may succeed
48*0957b409SSimon J. Gerraty * with probability 2^(-64)).
49*0957b409SSimon J. Gerraty * -- AES-128 is preferred over AES-256 (AES-128 is already
50*0957b409SSimon J. Gerraty * strong enough, and AES-256 is 40% more expensive).
51*0957b409SSimon J. Gerraty */
52*0957b409SSimon J. Gerraty static const uint16_t suites[] = {
53*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
54*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
55*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
56*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
57*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
58*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
59*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_128_CCM,
60*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_256_CCM,
61*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8,
62*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8,
63*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
64*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
65*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
66*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
67*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
68*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
69*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
70*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
71*0957b409SSimon J. Gerraty BR_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
72*0957b409SSimon J. Gerraty BR_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,
73*0957b409SSimon J. Gerraty BR_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
74*0957b409SSimon J. Gerraty BR_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,
75*0957b409SSimon J. Gerraty BR_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
76*0957b409SSimon J. Gerraty BR_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,
77*0957b409SSimon J. Gerraty BR_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
78*0957b409SSimon J. Gerraty BR_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,
79*0957b409SSimon J. Gerraty BR_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
80*0957b409SSimon J. Gerraty BR_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,
81*0957b409SSimon J. Gerraty BR_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
82*0957b409SSimon J. Gerraty BR_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
83*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_128_GCM_SHA256,
84*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_256_GCM_SHA384,
85*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_128_CCM,
86*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_256_CCM,
87*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_128_CCM_8,
88*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_256_CCM_8,
89*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_128_CBC_SHA256,
90*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_256_CBC_SHA256,
91*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_128_CBC_SHA,
92*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_AES_256_CBC_SHA,
93*0957b409SSimon J. Gerraty BR_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
94*0957b409SSimon J. Gerraty BR_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
95*0957b409SSimon J. Gerraty BR_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
96*0957b409SSimon J. Gerraty BR_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
97*0957b409SSimon J. Gerraty BR_TLS_RSA_WITH_3DES_EDE_CBC_SHA
98*0957b409SSimon J. Gerraty };
99*0957b409SSimon J. Gerraty
100*0957b409SSimon J. Gerraty /*
101*0957b409SSimon J. Gerraty * All hash functions are activated.
102*0957b409SSimon J. Gerraty * Note: the X.509 validation engine will nonetheless refuse to
103*0957b409SSimon J. Gerraty * validate signatures that use MD5 as hash function.
104*0957b409SSimon J. Gerraty */
105*0957b409SSimon J. Gerraty static const br_hash_class *hashes[] = {
106*0957b409SSimon J. Gerraty &br_md5_vtable,
107*0957b409SSimon J. Gerraty &br_sha1_vtable,
108*0957b409SSimon J. Gerraty &br_sha224_vtable,
109*0957b409SSimon J. Gerraty &br_sha256_vtable,
110*0957b409SSimon J. Gerraty &br_sha384_vtable,
111*0957b409SSimon J. Gerraty &br_sha512_vtable
112*0957b409SSimon J. Gerraty };
113*0957b409SSimon J. Gerraty
114*0957b409SSimon J. Gerraty int id;
115*0957b409SSimon J. Gerraty
116*0957b409SSimon J. Gerraty /*
117*0957b409SSimon J. Gerraty * Reset client context and set supported versions from TLS-1.0
118*0957b409SSimon J. Gerraty * to TLS-1.2 (inclusive).
119*0957b409SSimon J. Gerraty */
120*0957b409SSimon J. Gerraty br_ssl_client_zero(cc);
121*0957b409SSimon J. Gerraty br_ssl_engine_set_versions(&cc->eng, BR_TLS10, BR_TLS12);
122*0957b409SSimon J. Gerraty
123*0957b409SSimon J. Gerraty /*
124*0957b409SSimon J. Gerraty * X.509 engine uses SHA-256 to hash certificate DN (for
125*0957b409SSimon J. Gerraty * comparisons).
126*0957b409SSimon J. Gerraty */
127*0957b409SSimon J. Gerraty br_x509_minimal_init(xc, &br_sha256_vtable,
128*0957b409SSimon J. Gerraty trust_anchors, trust_anchors_num);
129*0957b409SSimon J. Gerraty
130*0957b409SSimon J. Gerraty /*
131*0957b409SSimon J. Gerraty * Set suites and asymmetric crypto implementations. We use the
132*0957b409SSimon J. Gerraty * "i31" code for RSA (it is somewhat faster than the "i32"
133*0957b409SSimon J. Gerraty * implementation).
134*0957b409SSimon J. Gerraty * TODO: change that when better implementations are made available.
135*0957b409SSimon J. Gerraty */
136*0957b409SSimon J. Gerraty br_ssl_engine_set_suites(&cc->eng, suites,
137*0957b409SSimon J. Gerraty (sizeof suites) / (sizeof suites[0]));
138*0957b409SSimon J. Gerraty br_ssl_client_set_default_rsapub(cc);
139*0957b409SSimon J. Gerraty br_ssl_engine_set_default_rsavrfy(&cc->eng);
140*0957b409SSimon J. Gerraty br_ssl_engine_set_default_ecdsa(&cc->eng);
141*0957b409SSimon J. Gerraty br_x509_minimal_set_rsa(xc, br_ssl_engine_get_rsavrfy(&cc->eng));
142*0957b409SSimon J. Gerraty br_x509_minimal_set_ecdsa(xc,
143*0957b409SSimon J. Gerraty br_ssl_engine_get_ec(&cc->eng),
144*0957b409SSimon J. Gerraty br_ssl_engine_get_ecdsa(&cc->eng));
145*0957b409SSimon J. Gerraty
146*0957b409SSimon J. Gerraty /*
147*0957b409SSimon J. Gerraty * Set supported hash functions, for the SSL engine and for the
148*0957b409SSimon J. Gerraty * X.509 engine.
149*0957b409SSimon J. Gerraty */
150*0957b409SSimon J. Gerraty for (id = br_md5_ID; id <= br_sha512_ID; id ++) {
151*0957b409SSimon J. Gerraty const br_hash_class *hc;
152*0957b409SSimon J. Gerraty
153*0957b409SSimon J. Gerraty hc = hashes[id - 1];
154*0957b409SSimon J. Gerraty br_ssl_engine_set_hash(&cc->eng, id, hc);
155*0957b409SSimon J. Gerraty br_x509_minimal_set_hash(xc, id, hc);
156*0957b409SSimon J. Gerraty }
157*0957b409SSimon J. Gerraty
158*0957b409SSimon J. Gerraty /*
159*0957b409SSimon J. Gerraty * Link the X.509 engine in the SSL engine.
160*0957b409SSimon J. Gerraty */
161*0957b409SSimon J. Gerraty br_ssl_engine_set_x509(&cc->eng, &xc->vtable);
162*0957b409SSimon J. Gerraty
163*0957b409SSimon J. Gerraty /*
164*0957b409SSimon J. Gerraty * Set the PRF implementations.
165*0957b409SSimon J. Gerraty */
166*0957b409SSimon J. Gerraty br_ssl_engine_set_prf10(&cc->eng, &br_tls10_prf);
167*0957b409SSimon J. Gerraty br_ssl_engine_set_prf_sha256(&cc->eng, &br_tls12_sha256_prf);
168*0957b409SSimon J. Gerraty br_ssl_engine_set_prf_sha384(&cc->eng, &br_tls12_sha384_prf);
169*0957b409SSimon J. Gerraty
170*0957b409SSimon J. Gerraty /*
171*0957b409SSimon J. Gerraty * Symmetric encryption. We use the "default" implementations
172*0957b409SSimon J. Gerraty * (fastest among constant-time implementations).
173*0957b409SSimon J. Gerraty */
174*0957b409SSimon J. Gerraty br_ssl_engine_set_default_aes_cbc(&cc->eng);
175*0957b409SSimon J. Gerraty br_ssl_engine_set_default_aes_ccm(&cc->eng);
176*0957b409SSimon J. Gerraty br_ssl_engine_set_default_aes_gcm(&cc->eng);
177*0957b409SSimon J. Gerraty br_ssl_engine_set_default_des_cbc(&cc->eng);
178*0957b409SSimon J. Gerraty br_ssl_engine_set_default_chapol(&cc->eng);
179*0957b409SSimon J. Gerraty }
180