| // Copyright 2024 The BoringSSL Authors |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #ifndef OPENSSL_HEADER_CRYPTO_SPAKE2PLUS_INTERNAL_H |
| #define OPENSSL_HEADER_CRYPTO_SPAKE2PLUS_INTERNAL_H |
| |
| #include <openssl/base.h> |
| |
| #include <sys/types.h> |
| |
| #include <openssl/sha.h> |
| #include <openssl/span.h> |
| |
| #include "../fipsmodule/ec/internal.h" |
| |
| |
| BSSL_NAMESPACE_BEGIN |
| |
| // SPAKE2+. |
| // |
| // SPAKE2+ is an augmented password-authenticated key-exchange. It allows |
| // two parties, a prover and verifier, to derive a strong shared key with no |
| // risk of disclosing the password, known only to the prover, to the verifier. |
| // (But note that the verifier can still attempt an offline, brute-force attack |
| // to recover the password.) |
| // |
| // This is an implementation of SPAKE2+ using P-256 as the group, SHA-256 as |
| // the hash function, HKDF-SHA256 as the key derivation function, and |
| // HMAC-SHA256 as the message authentication code. |
| // |
| // See https://www.rfc-editor.org/rfc/rfc9383.html |
| |
| namespace spake2plus { |
| |
| // kShareSize is the size of a SPAKE2+ key share. |
| constexpr size_t kShareSize = 65; |
| |
| // kConfirmSize is the size of a SPAKE2+ key confirmation message. |
| constexpr size_t kConfirmSize = 32; |
| |
| // kVerifierSize is the size of the w0 and w1 values in the SPAKE2+ protocol. |
| constexpr size_t kVerifierSize = 32; |
| |
| // kRegistrationRecordSize is the number of bytes in a registration record, |
| // which is provided to the verifier. |
| constexpr size_t kRegistrationRecordSize = 65; |
| |
| // kSecretSize is the number of bytes of shared secret that the SPAKE2+ protocol |
| // generates. |
| constexpr size_t kSecretSize = 32; |
| |
| // Register computes the values needed in the offline registration |
| // step of the SPAKE2+ protocol. See the following for more details: |
| // https://www.rfc-editor.org/rfc/rfc9383.html#section-3.2 |
| // |
| // The |password| argument is the mandatory prover password. The |out_w0|, |
| // |out_w1|, and |out_registration_record| arguments are where the password |
| // verifiers (w0 and w1) and registration record (L) are stored, respectively. |
| // The prover is given |out_w0| and |out_w1| while the verifier is given |
| // |out_w0| and |out_registration_record|. |
| // |
| // To ensure success, |out_w0| and |out_w1| must be of length |kVerifierSize|, |
| // and |out_registration_record| of size |kRegistrationRecordSize|. |
| [[nodiscard]] OPENSSL_EXPORT bool Register( |
| Span<uint8_t> out_w0, Span<uint8_t> out_w1, |
| Span<uint8_t> out_registration_record, Span<const uint8_t> password, |
| Span<const uint8_t> id_prover, Span<const uint8_t> id_verifier); |
| |
| class OPENSSL_EXPORT Prover { |
| public: |
| static constexpr bool kAllowUniquePtr = true; |
| |
| Prover(); |
| ~Prover(); |
| |
| // Init creates a new prover, which can only be used for a single execution of |
| // the protocol. |
| // |
| // The |context| argument is an application-specific value meant to constrain |
| // the protocol execution. The |w0| and |w1| arguments are password verifier |
| // values computed during the offline registration phase of the protocol. The |
| // |id_prover| and |id_verifier| arguments allow optional, opaque names to be |
| // bound into the protocol. See the following for more information about how |
| // these identities may be chosen: |
| // https://www.rfc-editor.org/rfc/rfc9383.html#name-definition-of-spake2 |
| [[nodiscard]] bool Init(Span<const uint8_t> context, |
| Span<const uint8_t> id_prover, |
| Span<const uint8_t> id_verifier, |
| Span<const uint8_t> w0, Span<const uint8_t> w1, |
| Span<const uint8_t> x = Span<const uint8_t>()); |
| |
| // GenerateShare computes a SPAKE2+ share and writes it to |out_share|. |
| // |
| // This function can only be called once for a given |Prover|. To ensure |
| // success, |out_share| must be |kShareSize| bytes. |
| [[nodiscard]] bool GenerateShare(Span<uint8_t> out_share); |
| |
| // ComputeConfirmation computes a SPAKE2+ key confirmation |
| // message and writes it to |out_confirm|. It also computes the shared secret |
| // and writes it to |out_secret|. |
| // |
| // This function can only be called once for a given |Prover|. |
| // |
| // To ensure success, |out_confirm| must be |kConfirmSize| bytes |
| // and |out_secret| must be |kSecretSize| bytes. |
| [[nodiscard]] bool ComputeConfirmation(Span<uint8_t> out_confirm, |
| Span<uint8_t> out_secret, |
| Span<const uint8_t> peer_share, |
| Span<const uint8_t> peer_confirm); |
| |
| private: |
| enum class State { |
| kInit, |
| kShareGenerated, |
| kConfirmGenerated, |
| kDone, |
| }; |
| |
| State state_ = State::kInit; |
| SHA256_CTX transcript_hash_; |
| EC_SCALAR w0_; |
| EC_SCALAR w1_; |
| EC_SCALAR x_; |
| EC_AFFINE X_; |
| uint8_t share_[kShareSize]; |
| }; |
| |
| class OPENSSL_EXPORT Verifier { |
| public: |
| static constexpr bool kAllowUniquePtr = true; |
| |
| Verifier(); |
| ~Verifier(); |
| |
| // Init creates a new verifier, which can only be used for a single execution |
| // of the protocol. |
| // |
| // The |context| argument is an application-specific value meant to constrain |
| // the protocol execution. The |w0| and |registration_record| arguments are |
| // required, and are computed by the prover via |Register|. Only the prover |
| // can produce |w0| and |registration_record|, as they require |
| // knowledge of the password. The prover must securely transmit this to the |
| // verifier out-of-band. The |id_prover| and |id_verifier| arguments allow |
| // optional, opaque names to be bound into the protocol. See the following for |
| // more information about how these identities may be chosen: |
| // https://www.rfc-editor.org/rfc/rfc9383.html#name-definition-of-spake2 |
| [[nodiscard]] bool Init(Span<const uint8_t> context, |
| Span<const uint8_t> id_prover, |
| Span<const uint8_t> id_verifier, |
| Span<const uint8_t> w0, |
| Span<const uint8_t> registration_record, |
| Span<const uint8_t> y = Span<const uint8_t>()); |
| |
| // ProcessProverShare computes a SPAKE2+ share from an input share, |
| // |prover_share|, and writes it to |out_share|. It also computes the key |
| // confirmation message and writes it to |out_confirm|. Finally, it computes |
| // the shared secret and writes it to |out_secret|. |
| // |
| // This function can only be called once for a given |Verifier|. |
| // |
| // To ensure success, |out_share| must be |kShareSize| bytes, |out_confirm| |
| // must be |kConfirmSize| bytes, and |out_secret| must be |kSecretSize| bytes. |
| [[nodiscard]] bool ProcessProverShare(Span<uint8_t> out_share, |
| Span<uint8_t> out_confirm, |
| Span<uint8_t> out_secret, |
| Span<const uint8_t> prover_share); |
| |
| // VerifyProverConfirmation verifies a SPAKE2+ key confirmation message, |
| // |prover_confirm|. |
| // |
| // This function can only be called once for a given |Verifier|. |
| [[nodiscard]] bool VerifyProverConfirmation(Span<const uint8_t> peer_confirm); |
| |
| private: |
| enum class State { |
| kInit, |
| kProverShareSeen, |
| kDone, |
| }; |
| |
| State state_ = State::kInit; |
| SHA256_CTX transcript_hash_; |
| EC_SCALAR w0_; |
| EC_AFFINE L_; |
| EC_SCALAR y_; |
| uint8_t confirm_[kConfirmSize]; |
| }; |
| |
| } // namespace spake2plus |
| |
| BSSL_NAMESPACE_END |
| |
| #endif // OPENSSL_HEADER_CRYPTO_SPAKE2PLUS_INTERNAL_H |