2 * Copyright (C) 2005, 2007, 2009, 2010 Free Software Foundation, Inc.
4 * Author: Nikos Mavrogiannopoulos
6 * This file is part of GnuTLS.
8 * The GnuTLS is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public License
10 * as published by the Free Software Foundation; either version 2.1 of
11 * the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
25 /* This file contains the PSK Diffie-Hellman key exchange part of the
26 * PSK authentication. The functions here are used in the handshake.
29 #include <gnutls_int.h>
33 #include "gnutls_auth.h"
34 #include "gnutls_errors.h"
35 #include "gnutls_dh.h"
37 #include "gnutls_num.h"
38 #include "gnutls_mpi.h"
39 #include <gnutls_state.h>
40 #include <auth_dh_common.h>
41 #include <gnutls_datum.h>
43 static int gen_psk_server_kx (gnutls_session_t, opaque **);
44 static int gen_psk_client_kx (gnutls_session_t, opaque **);
45 static int proc_psk_client_kx (gnutls_session_t, opaque *, size_t);
46 static int proc_psk_server_kx (gnutls_session_t, opaque *, size_t);
48 const mod_auth_st dhe_psk_auth_struct = {
58 NULL, /* certificate */
66 gen_psk_client_kx (gnutls_session_t session, opaque ** data)
69 opaque *tmp_data = NULL;
70 int data_size, tmp_data_size;
71 gnutls_psk_client_credentials_t cred;
72 gnutls_datum_t username, key;
74 cred = (gnutls_psk_client_credentials_t)
75 _gnutls_get_cred (session->key, GNUTLS_CRD_PSK, NULL);
78 return gnutls_assert_val(GNUTLS_E_INSUFFICIENT_CREDENTIALS);
81 ret = _gnutls_find_psk_key( session, cred, &username, &key, &free);
83 return gnutls_assert_val(ret);
85 /* The PSK key is set in there */
86 ret = _gnutls_gen_dh_common_client_kx_int (session, &tmp_data, &key);
94 data_size = tmp_data_size + username.size + 2;
96 (*data) = gnutls_malloc (data_size);
100 ret = GNUTLS_E_MEMORY_ERROR;
104 _gnutls_write_datum16 (*data, username);
105 memcpy (&(*data)[username.size + 2], tmp_data, tmp_data_size);
110 gnutls_free (tmp_data);
113 _gnutls_free_datum(&username);
114 _gnutls_free_datum(&key);
122 gen_psk_server_kx (gnutls_session_t session, opaque ** data)
125 const bigint_t *mpis;
127 gnutls_dh_params_t dh_params;
128 gnutls_psk_server_credentials_t cred;
130 cred = (gnutls_psk_server_credentials_t)
131 _gnutls_get_cred (session->key, GNUTLS_CRD_PSK, NULL);
135 return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
139 _gnutls_get_dh_params (cred->dh_params, cred->params_func, session);
140 mpis = _gnutls_dh_params_to_mpi (dh_params);
144 return GNUTLS_E_NO_TEMPORARY_DH_PARAMS;
151 _gnutls_auth_info_set (session, GNUTLS_CRD_PSK,
152 sizeof (psk_auth_info_st), 1)) < 0)
158 _gnutls_dh_set_group (session, g, p);
160 ret = _gnutls_dh_common_print_server_kx (session, g, p, data, 1);
171 proc_psk_client_kx (gnutls_session_t session, opaque * data,
176 gnutls_dh_params_t dh_params;
177 const bigint_t *mpis;
178 gnutls_psk_server_credentials_t cred;
179 psk_auth_info_t info;
180 gnutls_datum_t username;
181 ssize_t data_size = _data_size;
183 cred = (gnutls_psk_server_credentials_t)
184 _gnutls_get_cred (session->key, GNUTLS_CRD_PSK, NULL);
189 return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
193 _gnutls_auth_info_set (session, GNUTLS_CRD_PSK,
194 sizeof (psk_auth_info_st), 1)) < 0)
201 _gnutls_get_dh_params (cred->dh_params, cred->params_func, session);
202 mpis = _gnutls_dh_params_to_mpi (dh_params);
206 return GNUTLS_E_NO_TEMPORARY_DH_PARAMS;
212 DECR_LEN (data_size, 2);
213 username.size = _gnutls_read_uint16 (&data[0]);
215 DECR_LEN (data_size, username.size);
217 username.data = &data[2];
219 /* copy the username to the auth info structures
221 info = _gnutls_get_auth_info (session);
223 if (username.size > MAX_USERNAME_SIZE)
226 return GNUTLS_E_ILLEGAL_SRP_USERNAME;
229 memcpy (info->username, username.data, username.size);
230 info->username[username.size] = 0;
232 /* Adjust the data */
233 data += username.size + 2;
235 ret = _gnutls_proc_dh_common_client_kx (session, data, data_size, g, p);
242 proc_psk_server_kx (gnutls_session_t session, opaque * data,
250 _gnutls_auth_info_set (session, GNUTLS_CRD_PSK,
251 sizeof (psk_auth_info_st), 1)) < 0)
257 ret = _gnutls_proc_dh_common_server_kx (session, data, _data_size, 1);
267 #endif /* ENABLE_PSK */