474 lines
9.5 KiB
C
Executable File
474 lines
9.5 KiB
C
Executable File
/* $OpenBSD: tls_key_share.c,v 1.4 2022/01/11 18:28:41 jsing Exp $ */
|
|
/*
|
|
* Copyright (c) 2020, 2021 Joel Sing <jsing@openbsd.org>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <openssl/curve25519.h>
|
|
#include <openssl/dh.h>
|
|
#include <openssl/ec.h>
|
|
#include <openssl/evp.h>
|
|
|
|
#include "bytestring.h"
|
|
#include "ssl_locl.h"
|
|
#include "tls_internal.h"
|
|
|
|
struct tls_key_share {
|
|
int nid;
|
|
uint16_t group_id;
|
|
size_t key_bits;
|
|
|
|
DH *dhe;
|
|
DH *dhe_peer;
|
|
|
|
EC_KEY *ecdhe;
|
|
EC_KEY *ecdhe_peer;
|
|
|
|
uint8_t *x25519_public;
|
|
uint8_t *x25519_private;
|
|
uint8_t *x25519_peer_public;
|
|
};
|
|
|
|
static struct tls_key_share *
|
|
tls_key_share_new_internal(int nid, uint16_t group_id)
|
|
{
|
|
struct tls_key_share *ks;
|
|
|
|
if ((ks = calloc(1, sizeof(struct tls_key_share))) == NULL)
|
|
return NULL;
|
|
|
|
ks->group_id = group_id;
|
|
ks->nid = nid;
|
|
|
|
return ks;
|
|
}
|
|
|
|
struct tls_key_share *
|
|
tls_key_share_new(uint16_t group_id)
|
|
{
|
|
int nid;
|
|
|
|
if ((nid = tls1_ec_curve_id2nid(group_id)) == 0)
|
|
return NULL;
|
|
|
|
return tls_key_share_new_internal(nid, group_id);
|
|
}
|
|
|
|
struct tls_key_share *
|
|
tls_key_share_new_nid(int nid)
|
|
{
|
|
uint16_t group_id = 0;
|
|
|
|
if (nid != NID_dhKeyAgreement) {
|
|
if ((group_id = tls1_ec_nid2curve_id(nid)) == 0)
|
|
return NULL;
|
|
}
|
|
|
|
return tls_key_share_new_internal(nid, group_id);
|
|
}
|
|
|
|
void
|
|
tls_key_share_free(struct tls_key_share *ks)
|
|
{
|
|
if (ks == NULL)
|
|
return;
|
|
|
|
DH_free(ks->dhe);
|
|
DH_free(ks->dhe_peer);
|
|
|
|
EC_KEY_free(ks->ecdhe);
|
|
EC_KEY_free(ks->ecdhe_peer);
|
|
|
|
freezero(ks->x25519_public, X25519_KEY_LENGTH);
|
|
freezero(ks->x25519_private, X25519_KEY_LENGTH);
|
|
freezero(ks->x25519_peer_public, X25519_KEY_LENGTH);
|
|
|
|
freezero(ks, sizeof(*ks));
|
|
}
|
|
|
|
uint16_t
|
|
tls_key_share_group(struct tls_key_share *ks)
|
|
{
|
|
return ks->group_id;
|
|
}
|
|
|
|
int
|
|
tls_key_share_nid(struct tls_key_share *ks)
|
|
{
|
|
return ks->nid;
|
|
}
|
|
|
|
void
|
|
tls_key_share_set_key_bits(struct tls_key_share *ks, size_t key_bits)
|
|
{
|
|
ks->key_bits = key_bits;
|
|
}
|
|
|
|
int
|
|
tls_key_share_set_dh_params(struct tls_key_share *ks, DH *dh_params)
|
|
{
|
|
if (ks->nid != NID_dhKeyAgreement)
|
|
return 0;
|
|
if (ks->dhe != NULL || ks->dhe_peer != NULL)
|
|
return 0;
|
|
|
|
if ((ks->dhe = DHparams_dup(dh_params)) == NULL)
|
|
return 0;
|
|
if ((ks->dhe_peer = DHparams_dup(dh_params)) == NULL)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
tls_key_share_peer_pkey(struct tls_key_share *ks, EVP_PKEY *pkey)
|
|
{
|
|
if (ks->nid == NID_dhKeyAgreement && ks->dhe_peer != NULL)
|
|
return EVP_PKEY_set1_DH(pkey, ks->dhe_peer);
|
|
|
|
if (ks->nid == NID_X25519 && ks->x25519_peer_public != NULL)
|
|
return ssl_kex_dummy_ecdhe_x25519(pkey);
|
|
|
|
if (ks->ecdhe_peer != NULL)
|
|
return EVP_PKEY_set1_EC_KEY(pkey, ks->ecdhe_peer);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
tls_key_share_generate_dhe(struct tls_key_share *ks)
|
|
{
|
|
/*
|
|
* If auto params are not being used then we must already have DH
|
|
* parameters set.
|
|
*/
|
|
if (ks->key_bits == 0) {
|
|
if (ks->dhe == NULL)
|
|
return 0;
|
|
|
|
return ssl_kex_generate_dhe(ks->dhe, ks->dhe);
|
|
}
|
|
|
|
if (ks->dhe != NULL || ks->dhe_peer != NULL)
|
|
return 0;
|
|
|
|
if ((ks->dhe = DH_new()) == NULL)
|
|
return 0;
|
|
if (!ssl_kex_generate_dhe_params_auto(ks->dhe, ks->key_bits))
|
|
return 0;
|
|
if ((ks->dhe_peer = DHparams_dup(ks->dhe)) == NULL)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
tls_key_share_generate_ecdhe_ecp(struct tls_key_share *ks)
|
|
{
|
|
EC_KEY *ecdhe = NULL;
|
|
int ret = 0;
|
|
|
|
if (ks->ecdhe != NULL)
|
|
goto err;
|
|
|
|
if ((ecdhe = EC_KEY_new()) == NULL)
|
|
goto err;
|
|
if (!ssl_kex_generate_ecdhe_ecp(ecdhe, ks->nid))
|
|
goto err;
|
|
|
|
ks->ecdhe = ecdhe;
|
|
ecdhe = NULL;
|
|
|
|
ret = 1;
|
|
|
|
err:
|
|
EC_KEY_free(ecdhe);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
tls_key_share_generate_x25519(struct tls_key_share *ks)
|
|
{
|
|
uint8_t *public = NULL, *private = NULL;
|
|
int ret = 0;
|
|
|
|
if (ks->x25519_public != NULL || ks->x25519_private != NULL)
|
|
goto err;
|
|
|
|
if ((public = calloc(1, X25519_KEY_LENGTH)) == NULL)
|
|
goto err;
|
|
if ((private = calloc(1, X25519_KEY_LENGTH)) == NULL)
|
|
goto err;
|
|
|
|
X25519_keypair(public, private);
|
|
|
|
ks->x25519_public = public;
|
|
ks->x25519_private = private;
|
|
public = NULL;
|
|
private = NULL;
|
|
|
|
ret = 1;
|
|
|
|
err:
|
|
freezero(public, X25519_KEY_LENGTH);
|
|
freezero(private, X25519_KEY_LENGTH);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
tls_key_share_generate(struct tls_key_share *ks)
|
|
{
|
|
if (ks->nid == NID_dhKeyAgreement)
|
|
return tls_key_share_generate_dhe(ks);
|
|
|
|
if (ks->nid == NID_X25519)
|
|
return tls_key_share_generate_x25519(ks);
|
|
|
|
return tls_key_share_generate_ecdhe_ecp(ks);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_params_dhe(struct tls_key_share *ks, CBB *cbb)
|
|
{
|
|
if (ks->dhe == NULL)
|
|
return 0;
|
|
|
|
return ssl_kex_params_dhe(ks->dhe, cbb);
|
|
}
|
|
|
|
int
|
|
tls_key_share_params(struct tls_key_share *ks, CBB *cbb)
|
|
{
|
|
if (ks->nid == NID_dhKeyAgreement)
|
|
return tls_key_share_params_dhe(ks, cbb);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
tls_key_share_public_dhe(struct tls_key_share *ks, CBB *cbb)
|
|
{
|
|
if (ks->dhe == NULL)
|
|
return 0;
|
|
|
|
return ssl_kex_public_dhe(ks->dhe, cbb);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_public_ecdhe_ecp(struct tls_key_share *ks, CBB *cbb)
|
|
{
|
|
if (ks->ecdhe == NULL)
|
|
return 0;
|
|
|
|
return ssl_kex_public_ecdhe_ecp(ks->ecdhe, cbb);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_public_x25519(struct tls_key_share *ks, CBB *cbb)
|
|
{
|
|
if (ks->x25519_public == NULL)
|
|
return 0;
|
|
|
|
return CBB_add_bytes(cbb, ks->x25519_public, X25519_KEY_LENGTH);
|
|
}
|
|
|
|
int
|
|
tls_key_share_public(struct tls_key_share *ks, CBB *cbb)
|
|
{
|
|
if (ks->nid == NID_dhKeyAgreement)
|
|
return tls_key_share_public_dhe(ks, cbb);
|
|
|
|
if (ks->nid == NID_X25519)
|
|
return tls_key_share_public_x25519(ks, cbb);
|
|
|
|
return tls_key_share_public_ecdhe_ecp(ks, cbb);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_peer_params_dhe(struct tls_key_share *ks, CBS *cbs,
|
|
int *decode_error, int *invalid_params)
|
|
{
|
|
if (ks->dhe != NULL || ks->dhe_peer != NULL)
|
|
return 0;
|
|
|
|
if ((ks->dhe_peer = DH_new()) == NULL)
|
|
return 0;
|
|
if (!ssl_kex_peer_params_dhe(ks->dhe_peer, cbs, decode_error,
|
|
invalid_params))
|
|
return 0;
|
|
if ((ks->dhe = DHparams_dup(ks->dhe_peer)) == NULL)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
tls_key_share_peer_params(struct tls_key_share *ks, CBS *cbs,
|
|
int *decode_error, int *invalid_params)
|
|
{
|
|
if (ks->nid != NID_dhKeyAgreement)
|
|
return 0;
|
|
|
|
return tls_key_share_peer_params_dhe(ks, cbs, decode_error,
|
|
invalid_params);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_peer_public_dhe(struct tls_key_share *ks, CBS *cbs,
|
|
int *decode_error, int *invalid_key)
|
|
{
|
|
if (ks->dhe_peer == NULL)
|
|
return 0;
|
|
|
|
return ssl_kex_peer_public_dhe(ks->dhe_peer, cbs, decode_error,
|
|
invalid_key);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_peer_public_ecdhe_ecp(struct tls_key_share *ks, CBS *cbs)
|
|
{
|
|
EC_KEY *ecdhe = NULL;
|
|
int ret = 0;
|
|
|
|
if (ks->ecdhe_peer != NULL)
|
|
goto err;
|
|
|
|
if ((ecdhe = EC_KEY_new()) == NULL)
|
|
goto err;
|
|
if (!ssl_kex_peer_public_ecdhe_ecp(ecdhe, ks->nid, cbs))
|
|
goto err;
|
|
|
|
ks->ecdhe_peer = ecdhe;
|
|
ecdhe = NULL;
|
|
|
|
ret = 1;
|
|
|
|
err:
|
|
EC_KEY_free(ecdhe);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
tls_key_share_peer_public_x25519(struct tls_key_share *ks, CBS *cbs,
|
|
int *decode_error)
|
|
{
|
|
size_t out_len;
|
|
|
|
*decode_error = 0;
|
|
|
|
if (ks->x25519_peer_public != NULL)
|
|
return 0;
|
|
|
|
if (CBS_len(cbs) != X25519_KEY_LENGTH) {
|
|
*decode_error = 1;
|
|
return 0;
|
|
}
|
|
|
|
return CBS_stow(cbs, &ks->x25519_peer_public, &out_len);
|
|
}
|
|
|
|
int
|
|
tls_key_share_peer_public(struct tls_key_share *ks, CBS *cbs, int *decode_error,
|
|
int *invalid_key)
|
|
{
|
|
*decode_error = 0;
|
|
|
|
if (invalid_key != NULL)
|
|
*invalid_key = 0;
|
|
|
|
if (ks->nid == NID_dhKeyAgreement)
|
|
return tls_key_share_peer_public_dhe(ks, cbs, decode_error,
|
|
invalid_key);
|
|
|
|
if (ks->nid == NID_X25519)
|
|
return tls_key_share_peer_public_x25519(ks, cbs, decode_error);
|
|
|
|
return tls_key_share_peer_public_ecdhe_ecp(ks, cbs);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_derive_dhe(struct tls_key_share *ks,
|
|
uint8_t **shared_key, size_t *shared_key_len)
|
|
{
|
|
if (ks->dhe == NULL || ks->dhe_peer == NULL)
|
|
return 0;
|
|
|
|
return ssl_kex_derive_dhe(ks->dhe, ks->dhe_peer, shared_key,
|
|
shared_key_len);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_derive_ecdhe_ecp(struct tls_key_share *ks,
|
|
uint8_t **shared_key, size_t *shared_key_len)
|
|
{
|
|
if (ks->ecdhe == NULL || ks->ecdhe_peer == NULL)
|
|
return 0;
|
|
|
|
return ssl_kex_derive_ecdhe_ecp(ks->ecdhe, ks->ecdhe_peer,
|
|
shared_key, shared_key_len);
|
|
}
|
|
|
|
static int
|
|
tls_key_share_derive_x25519(struct tls_key_share *ks,
|
|
uint8_t **shared_key, size_t *shared_key_len)
|
|
{
|
|
uint8_t *sk = NULL;
|
|
int ret = 0;
|
|
|
|
if (ks->x25519_private == NULL || ks->x25519_peer_public == NULL)
|
|
goto err;
|
|
|
|
if ((sk = calloc(1, X25519_KEY_LENGTH)) == NULL)
|
|
goto err;
|
|
if (!X25519(sk, ks->x25519_private, ks->x25519_peer_public))
|
|
goto err;
|
|
|
|
*shared_key = sk;
|
|
*shared_key_len = X25519_KEY_LENGTH;
|
|
sk = NULL;
|
|
|
|
ret = 1;
|
|
|
|
err:
|
|
freezero(sk, X25519_KEY_LENGTH);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
tls_key_share_derive(struct tls_key_share *ks, uint8_t **shared_key,
|
|
size_t *shared_key_len)
|
|
{
|
|
if (*shared_key != NULL)
|
|
return 0;
|
|
|
|
*shared_key_len = 0;
|
|
|
|
if (ks->nid == NID_dhKeyAgreement)
|
|
return tls_key_share_derive_dhe(ks, shared_key,
|
|
shared_key_len);
|
|
|
|
if (ks->nid == NID_X25519)
|
|
return tls_key_share_derive_x25519(ks, shared_key,
|
|
shared_key_len);
|
|
|
|
return tls_key_share_derive_ecdhe_ecp(ks, shared_key,
|
|
shared_key_len);
|
|
}
|