Blame lib/secrets.c

Packit Service 4684c1
/*
Packit Service 4684c1
 * Copyright (C) 2017 Red Hat, Inc.
Packit Service 4684c1
 *
Packit Service 4684c1
 * Author: Nikos Mavrogiannopoulos
Packit Service 4684c1
 *
Packit Service 4684c1
 * This file is part of GnuTLS.
Packit Service 4684c1
 *
Packit Service 4684c1
 * The GnuTLS is free software; you can redistribute it and/or
Packit Service 4684c1
 * modify it under the terms of the GNU Lesser General Public License
Packit Service 4684c1
 * as published by the Free Software Foundation; either version 2.1 of
Packit Service 4684c1
 * the License, or (at your option) any later version.
Packit Service 4684c1
 *
Packit Service 4684c1
 * This library is distributed in the hope that it will be useful, but
Packit Service 4684c1
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 4684c1
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit Service 4684c1
 * Lesser General Public License for more details.
Packit Service 4684c1
 *
Packit Service 4684c1
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 4684c1
 * along with this program.  If not, see <https://www.gnu.org/licenses/>
Packit Service 4684c1
 *
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
/* TLS 1.3 secret key derivation handling.
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
#include <config.h>
Packit Service 4684c1
#include "gnutls_int.h"
Packit Service 4684c1
#include "secrets.h"
Packit Service 4684c1
Packit Service 4684c1
/* HKDF-Extract(0,0) or HKDF-Extract(0, PSK) */
Packit Service 4684c1
int _tls13_init_secret(gnutls_session_t session, const uint8_t *psk, size_t psk_size)
Packit Service 4684c1
{
Packit Service 4684c1
	session->key.proto.tls13.temp_secret_size = session->security_parameters.prf->output_size;
Packit Service 4684c1
Packit Service 4684c1
	return _tls13_init_secret2(session->security_parameters.prf,
Packit Service 4684c1
				   psk, psk_size,
Packit Service 4684c1
				   session->key.proto.tls13.temp_secret);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
int _tls13_init_secret2(const mac_entry_st *prf,
Packit Service 4684c1
			const uint8_t *psk, size_t psk_size,
Packit Service 4684c1
			void *out)
Packit Service 4684c1
{
Packit Service 4684c1
	char buf[128];
Packit Service 4684c1
Packit Service 4684c1
	if (unlikely(prf == NULL))
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
Packit Service 4684c1
	/* when no PSK, use the zero-value */
Packit Service 4684c1
	if (psk == NULL) {
Packit Service 4684c1
		psk_size = prf->output_size;
Packit Service 4684c1
		if (unlikely(psk_size >= sizeof(buf)))
Packit Service 4684c1
			return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
Packit Service 4684c1
		memset(buf, 0, psk_size);
Packit Service 4684c1
		psk = (uint8_t*) buf;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	return gnutls_hmac_fast(prf->id,
Packit Service 4684c1
				"", 0,
Packit Service 4684c1
				psk, psk_size,
Packit Service 4684c1
				out);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
/* HKDF-Extract(Prev-Secret, key) */
Packit Service 4684c1
int _tls13_update_secret(gnutls_session_t session, const uint8_t *key, size_t key_size)
Packit Service 4684c1
{
Packit Service 4684c1
	gnutls_datum_t _key;
Packit Service 4684c1
	gnutls_datum_t salt;
Packit Service 4684c1
Packit Service 4684c1
	_key.data = (void *)key;
Packit Service 4684c1
	_key.size = key_size;
Packit Service 4684c1
	salt.data = (void *)session->key.proto.tls13.temp_secret;
Packit Service 4684c1
	salt.size = session->key.proto.tls13.temp_secret_size;
Packit Service 4684c1
Packit Service 4684c1
	return gnutls_hkdf_extract(session->security_parameters.prf->id,
Packit Service 4684c1
				   &_key, &salt,
Packit Service 4684c1
				   session->key.proto.tls13.temp_secret);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
/* Derive-Secret(Secret, Label, Messages) */
Packit Service 4684c1
int _tls13_derive_secret2(const mac_entry_st *prf,
Packit Service 4684c1
			 const char *label, unsigned label_size,
Packit Service 4684c1
			 const uint8_t *tbh, size_t tbh_size,
Packit Service 4684c1
			 const uint8_t secret[MAX_HASH_SIZE],
Packit Service 4684c1
			 void *out)
Packit Service 4684c1
{
Packit Service 4684c1
	uint8_t digest[MAX_HASH_SIZE];
Packit Service 4684c1
	int ret;
Packit Service 4684c1
	unsigned digest_size;
Packit Service 4684c1
Packit Service 4684c1
	if (unlikely(prf == NULL))
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
	if (unlikely(label_size >= sizeof(digest)))
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
Packit Service 4684c1
Packit Service 4684c1
	digest_size = prf->output_size;
Packit Service 4684c1
	ret = gnutls_hash_fast((gnutls_digest_algorithm_t) prf->id,
Packit Service 4684c1
				tbh, tbh_size, digest);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		return gnutls_assert_val(ret);
Packit Service 4684c1
Packit Service 4684c1
	return _tls13_expand_secret2(prf, label, label_size, digest, digest_size, secret, digest_size, out);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
/* Derive-Secret(Secret, Label, Messages) */
Packit Service 4684c1
int _tls13_derive_secret(gnutls_session_t session,
Packit Service 4684c1
			 const char *label, unsigned label_size,
Packit Service 4684c1
			 const uint8_t *tbh, size_t tbh_size,
Packit Service 4684c1
			 const uint8_t secret[MAX_HASH_SIZE],
Packit Service 4684c1
			 void *out)
Packit Service 4684c1
{
Packit Service 4684c1
	if (unlikely(session->security_parameters.prf == NULL))
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
Packit Service 4684c1
	return _tls13_derive_secret2(session->security_parameters.prf, label, label_size, tbh, tbh_size,
Packit Service 4684c1
				         secret,
Packit Service 4684c1
				         out);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
/* HKDF-Expand-Label(Secret, Label, HashValue, Length) */
Packit Service 4684c1
int _tls13_expand_secret2(const mac_entry_st *prf,
Packit Service 4684c1
			 const char *label, unsigned label_size,
Packit Service 4684c1
			 const uint8_t *msg, size_t msg_size,
Packit Service 4684c1
			 const uint8_t secret[MAX_HASH_SIZE],
Packit Service 4684c1
			 unsigned out_size,
Packit Service 4684c1
			 void *out)
Packit Service 4684c1
{
Packit Service 4684c1
	uint8_t tmp[256] = "tls13 ";
Packit Service 4684c1
	gnutls_buffer_st str;
Packit Service 4684c1
	gnutls_datum_t key;
Packit Service 4684c1
	gnutls_datum_t info;
Packit Service 4684c1
	int ret;
Packit Service 4684c1
Packit Service 4684c1
	if (unlikely(label_size >= sizeof(tmp)-6))
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
Packit Service 4684c1
Packit Service 4684c1
	_gnutls_buffer_init(&str);
Packit Service 4684c1
Packit Service 4684c1
	ret = _gnutls_buffer_append_prefix(&str, 16, out_size);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		gnutls_assert();
Packit Service 4684c1
		goto cleanup;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	memcpy(&tmp[6], label, label_size);
Packit Service 4684c1
	ret = _gnutls_buffer_append_data_prefix(&str, 8, tmp, label_size+6);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		gnutls_assert();
Packit Service 4684c1
		goto cleanup;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	ret = _gnutls_buffer_append_data_prefix(&str, 8, msg, msg_size);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		gnutls_assert();
Packit Service 4684c1
		goto cleanup;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	key.data = (void *)secret;
Packit Service 4684c1
	key.size =_gnutls_mac_get_algo_len(mac_to_entry(prf->id));
Packit Service 4684c1
	info.data = str.data;
Packit Service 4684c1
	info.size = str.length;
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_hkdf_expand(prf->id, &key, &info, out, out_size);
Packit Service 4684c1
	if (ret < 0) {
Packit Service 4684c1
		gnutls_assert();
Packit Service 4684c1
		goto cleanup;
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
#if 0
Packit Service 4684c1
        _gnutls_hard_log("INT: hkdf label: %d,%s\n",
Packit Service 4684c1
                         out_size,
Packit Service 4684c1
                         _gnutls_bin2hex(str.data, str.length,
Packit Service 4684c1
                                         (char*)tmp, sizeof(tmp), NULL));
Packit Service 4684c1
        _gnutls_hard_log("INT: secret expanded for '%.*s': %d,%s\n", 
Packit Service 4684c1
                         (int)label_size, label, out_size,
Packit Service 4684c1
                         _gnutls_bin2hex(out, out_size,
Packit Service 4684c1
                                         (char*)tmp, sizeof(tmp), NULL));
Packit Service 4684c1
#endif
Packit Service 4684c1
Packit Service 4684c1
	ret = 0;
Packit Service 4684c1
 cleanup:
Packit Service 4684c1
	_gnutls_buffer_clear(&str);
Packit Service 4684c1
	return ret;
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
int _tls13_expand_secret(gnutls_session_t session,
Packit Service 4684c1
		const char *label, unsigned label_size,
Packit Service 4684c1
		const uint8_t *msg, size_t msg_size,
Packit Service 4684c1
		const uint8_t secret[MAX_CIPHER_KEY_SIZE],
Packit Service 4684c1
		unsigned out_size,
Packit Service 4684c1
		void *out)
Packit Service 4684c1
{
Packit Service 4684c1
	if (unlikely(session->security_parameters.prf == NULL))
Packit Service 4684c1
		return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
Packit Service 4684c1
Packit Service 4684c1
	return _tls13_expand_secret2(session->security_parameters.prf,
Packit Service 4684c1
			label, label_size,
Packit Service 4684c1
			msg, msg_size, secret,
Packit Service 4684c1
			out_size, out);
Packit Service 4684c1
}
Packit Service 4684c1