SaiTLS/src/parse.rs

237 lines
7.9 KiB
Rust
Raw Normal View History

2020-10-11 13:46:24 +08:00
use nom::IResult;
use nom::bytes::complete::take;
use nom::combinator::complete;
use nom::sequence::tuple;
use nom::error::ErrorKind;
use smoltcp::Error;
use smoltcp::Result;
use byteorder::{ByteOrder, NetworkEndian, BigEndian};
use crate::tls_packet::*;
use core::convert::TryFrom;
2020-10-11 23:41:02 +08:00
use alloc::vec::Vec;
2020-10-11 13:46:24 +08:00
2020-10-11 23:41:02 +08:00
pub(crate) fn parse_tls_repr(bytes: &[u8]) -> IResult<&[u8], TlsRepr> {
2020-10-11 13:46:24 +08:00
let content_type = take(1_usize);
let version = take(2_usize);
let length = take(2_usize);
let (rest, (content_type, version, length)) =
tuple((content_type, version, length))(bytes)?;
let mut repr = TlsRepr {
content_type: TlsContentType::try_from(content_type[0])
.unwrap(),
version: TlsVersion::try_from(NetworkEndian::read_u16(version))
.unwrap(),
length: NetworkEndian::read_u16(length),
payload: None,
handshake: None,
};
2020-10-14 17:37:45 +08:00
let (rest, bytes) = take(repr.length)(rest)?;
2020-10-11 13:46:24 +08:00
{
use crate::tls_packet::TlsContentType::*;
match repr.content_type {
Handshake => {
2020-10-14 17:37:45 +08:00
let (rest, handshake) = complete(
parse_handshake
)(bytes)?;
2020-10-11 13:46:24 +08:00
repr.handshake = Some(handshake);
},
2020-10-14 17:37:45 +08:00
ChangeCipherSpec | ApplicationData => {
2020-10-18 20:02:40 +08:00
let mut vec: Vec<u8> = Vec::new();
vec.extend_from_slice(bytes);
repr.payload = Some(vec);
2020-10-14 17:37:45 +08:00
},
_ => todo!()
2020-10-11 13:46:24 +08:00
}
}
2020-10-14 17:37:45 +08:00
Ok((rest, repr))
2020-10-11 13:46:24 +08:00
}
fn parse_handshake(bytes: &[u8]) -> IResult<&[u8], HandshakeRepr> {
let handshake_type = take(1_usize);
let length = take(3_usize);
let (rest, (handshake_type, length)) =
tuple((handshake_type, length))(bytes)?;
let mut repr = HandshakeRepr {
msg_type: HandshakeType::try_from(handshake_type[0]).unwrap(),
length: NetworkEndian::read_u24(length),
handshake_data: HandshakeData::Uninitialized,
};
{
use crate::tls_packet::HandshakeType::*;
match repr.msg_type {
ServerHello => {
2020-10-14 17:37:45 +08:00
let (rest, data) = parse_server_hello(rest)?;
2020-10-11 23:41:02 +08:00
repr.handshake_data = data;
Ok((rest, repr))
2020-10-11 13:46:24 +08:00
},
_ => todo!()
}
}
}
fn parse_server_hello(bytes: &[u8]) -> IResult<&[u8], HandshakeData> {
let version = take(2_usize);
let random = take(32_usize);
let session_id_echo_length = take(1_usize);
let (rest, (version, random, session_id_echo_length)) =
tuple((version, random, session_id_echo_length))(bytes)?;
2020-10-14 17:37:45 +08:00
2020-10-11 13:46:24 +08:00
let session_id_echo_length = session_id_echo_length[0];
let (rest, session_id_echo) = take(session_id_echo_length)(rest)?;
let cipher_suite = take(2_usize);
let compression_method = take(1_usize);
let extension_length = take(2_usize);
let (mut rest, (cipher_suite, compression_method, extension_length)) =
tuple((cipher_suite, compression_method, extension_length))(rest)?;
let mut server_hello = ServerHello {
version: TlsVersion::try_from(NetworkEndian::read_u16(version)).unwrap(),
random,
2020-10-11 23:41:02 +08:00
session_id_echo_length,
2020-10-11 13:46:24 +08:00
session_id_echo,
cipher_suite: CipherSuite::try_from(NetworkEndian::read_u16(cipher_suite)).unwrap(),
compression_method: compression_method[0],
2020-10-11 23:41:02 +08:00
extension_length: NetworkEndian::read_u16(extension_length),
extensions: Vec::new(),
2020-10-11 13:46:24 +08:00
};
2020-10-11 23:41:02 +08:00
let mut extension_vec: Vec<Extension> = Vec::new();
let mut extension_length: i32 = server_hello.extension_length.into();
2020-10-14 17:37:45 +08:00
while extension_length > 0 {
let (rem, extension) = parse_extension(rest, HandshakeType::ServerHello)?;
2020-10-11 13:46:24 +08:00
rest = rem;
2020-10-11 23:41:02 +08:00
extension_length -= i32::try_from(extension.get_length()).unwrap();
2020-10-11 13:46:24 +08:00
// Todo:: Proper error
2020-10-11 23:41:02 +08:00
if extension_length < 0 {
2020-10-11 13:46:24 +08:00
todo!()
}
2020-10-14 17:37:45 +08:00
extension_vec.push(extension);
2020-10-11 13:46:24 +08:00
}
server_hello.extensions = extension_vec;
Ok((rest, HandshakeData::ServerHello(server_hello)))
}
2020-10-18 20:02:40 +08:00
pub(crate) fn parse_encrypted_extensions(bytes: &[u8]) -> IResult<&[u8], EncryptedExtensions> {
let (mut rest, extension_length) = take(2_usize)(bytes)?;
let mut extension_length: i32 = NetworkEndian::read_u16(extension_length).into();
let mut extension_vec: Vec<Extension> = Vec::new();
while extension_length > 0 {
let (rem, extension) = parse_extension(rest, HandshakeType::EncryptedExtensions)?;
rest = rem;
extension_length -= i32::try_from(extension.get_length()).unwrap();
// Todo:: Proper error
if extension_length < 0 {
todo!()
}
extension_vec.push(extension);
}
let encrypted_extensions = EncryptedExtensions {
length: u16::try_from(extension_length).unwrap(),
extensions: extension_vec
};
Ok((rest, encrypted_extensions))
}
2020-10-14 17:37:45 +08:00
fn parse_extension(bytes: &[u8], handshake_type: HandshakeType) -> IResult<&[u8], Extension> {
2020-10-11 13:46:24 +08:00
let extension_type = take(2_usize);
let length = take(2_usize);
let (rest, (extension_type, length)) =
tuple((extension_type, length))(bytes)?;
2020-10-14 17:37:45 +08:00
let extension_type = ExtensionType::try_from(
NetworkEndian::read_u16(extension_type)
).unwrap();
2020-10-11 13:46:24 +08:00
let length = NetworkEndian::read_u16(length);
2020-10-14 17:37:45 +08:00
// Process extension data according to extension_type
// TODO: Deal with HelloRetryRequest
let (rest, extension_data) = {
2020-10-18 20:02:40 +08:00
// TODO: Handle all mandatory extension types
2020-10-14 17:37:45 +08:00
use ExtensionType::*;
match extension_type {
SupportedVersions => {
match handshake_type {
HandshakeType::ClientHello => {
todo!()
},
HandshakeType::ServerHello => {
let (rest, selected_version) = take(2_usize)(rest)?;
let selected_version = TlsVersion::try_from(
NetworkEndian::read_u16(selected_version)
).unwrap();
(
rest,
ExtensionData::SupportedVersions(
crate::tls_packet::SupportedVersions::ServerHello {
selected_version
}
)
)
},
_ => todo!()
}
},
KeyShare => {
match handshake_type {
HandshakeType::ClientHello => {
todo!()
},
HandshakeType::ServerHello => {
let group = take(2_usize);
let length = take(2_usize);
let (rest, (group, length)) =
tuple((group, length))(rest)?;
let group = NamedGroup::try_from(
NetworkEndian::read_u16(group)
).unwrap();
let length = NetworkEndian::read_u16(length);
let (rest, key_exchange_slice) = take(length)(rest)?;
let mut key_exchange = Vec::new();
key_exchange.extend_from_slice(key_exchange_slice);
let server_share = KeyShareEntry {
group,
length,
key_exchange,
};
let key_share_sh = crate::tls_packet::KeyShareEntryContent::KeyShareServerHello {
server_share
};
(rest, ExtensionData::KeyShareEntry(key_share_sh))
},
_ => todo!()
}
},
_ => todo!()
}
};
2020-10-11 13:46:24 +08:00
Ok((
rest,
Extension {
2020-10-14 17:37:45 +08:00
extension_type,
2020-10-11 13:46:24 +08:00
length,
extension_data
}
))
}