Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 1 | /* Copyright (c) 2016, Google Inc. |
| 2 | * |
| 3 | * Permission to use, copy, modify, and/or distribute this software for any |
| 4 | * purpose with or without fee is hereby granted, provided that the above |
| 5 | * copyright notice and this permission notice appear in all copies. |
| 6 | * |
| 7 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| 8 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| 9 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| 10 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| 11 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| 12 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| 13 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
| 14 | |
| 15 | #include <openssl/ssl.h> |
| 16 | |
| 17 | #include <assert.h> |
| 18 | #include <string.h> |
| 19 | |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 20 | #include <algorithm> |
David Benjamin | cfc11c2 | 2017-07-18 22:45:18 -0400 | [diff] [blame] | 21 | #include <utility> |
| 22 | |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 23 | #include <openssl/aead.h> |
| 24 | #include <openssl/bytestring.h> |
| 25 | #include <openssl/digest.h> |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 26 | #include <openssl/hkdf.h> |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 27 | #include <openssl/hmac.h> |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 28 | #include <openssl/mem.h> |
| 29 | |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 30 | #include "../crypto/internal.h" |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 31 | #include "internal.h" |
| 32 | |
| 33 | |
Joshua Liebow-Feeser | 8c7c635 | 2018-08-26 18:53:36 -0700 | [diff] [blame] | 34 | BSSL_NAMESPACE_BEGIN |
David Benjamin | 86e95b8 | 2017-07-18 16:34:25 -0400 | [diff] [blame] | 35 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 36 | static bool init_key_schedule(SSL_HANDSHAKE *hs, uint16_t version, |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 37 | const SSL_CIPHER *cipher) { |
David Benjamin | ca9e8f5 | 2017-08-09 15:02:34 -0400 | [diff] [blame] | 38 | if (!hs->transcript.InitHash(version, cipher)) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 39 | return false; |
Steven Valdez | 908ac19 | 2017-01-12 13:17:07 -0500 | [diff] [blame] | 40 | } |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 41 | |
David Benjamin | c11ea942 | 2017-08-29 16:33:21 -0400 | [diff] [blame] | 42 | // Initialize the secret to the zero key. |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 43 | hs->ResizeSecrets(hs->transcript.DigestLen()); |
| 44 | OPENSSL_memset(hs->secret().data(), 0, hs->secret().size()); |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 45 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 46 | return true; |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 47 | } |
| 48 | |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 49 | static bool hkdf_extract_to_secret(SSL_HANDSHAKE *hs, Span<const uint8_t> in) { |
| 50 | size_t len; |
| 51 | if (!HKDF_extract(hs->secret().data(), &len, hs->transcript.Digest(), |
| 52 | in.data(), in.size(), hs->secret().data(), |
| 53 | hs->secret().size())) { |
| 54 | return false; |
| 55 | } |
| 56 | assert(len == hs->secret().size()); |
| 57 | return true; |
| 58 | } |
| 59 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 60 | bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { |
David Benjamin | d1e3ce1 | 2017-10-06 18:31:15 -0400 | [diff] [blame] | 61 | if (!init_key_schedule(hs, ssl_protocol_version(hs->ssl), hs->new_cipher)) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 62 | return false; |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 63 | } |
| 64 | |
David Benjamin | 6dc8bf6 | 2017-07-19 16:38:21 -0400 | [diff] [blame] | 65 | hs->transcript.FreeBuffer(); |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 66 | return hkdf_extract_to_secret(hs, psk); |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 67 | } |
| 68 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 69 | bool tls13_init_early_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 70 | SSL *const ssl = hs->ssl; |
David Benjamin | 50596f8 | 2018-07-02 19:47:27 -0400 | [diff] [blame] | 71 | return init_key_schedule(hs, ssl_session_protocol_version(ssl->session.get()), |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 72 | ssl->session->cipher) && |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 73 | hkdf_extract_to_secret(hs, psk); |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 74 | } |
| 75 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 76 | static Span<const char> label_to_span(const char *label) { |
| 77 | return MakeConstSpan(label, strlen(label)); |
| 78 | } |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 79 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 80 | static bool hkdf_expand_label(Span<uint8_t> out, const EVP_MD *digest, |
| 81 | Span<const uint8_t> secret, |
| 82 | Span<const char> label, |
| 83 | Span<const uint8_t> hash) { |
| 84 | Span<const char> protocol_label = label_to_span("tls13 "); |
David Benjamin | 1386aad | 2017-07-19 23:57:40 -0400 | [diff] [blame] | 85 | ScopedCBB cbb; |
| 86 | CBB child; |
David Benjamin | 89b9ecf | 2018-07-14 13:27:25 -0400 | [diff] [blame] | 87 | Array<uint8_t> hkdf_label; |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 88 | if (!CBB_init(cbb.get(), 2 + 1 + protocol_label.size() + label.size() + 1 + |
| 89 | hash.size()) || |
| 90 | !CBB_add_u16(cbb.get(), out.size()) || |
David Benjamin | 1386aad | 2017-07-19 23:57:40 -0400 | [diff] [blame] | 91 | !CBB_add_u8_length_prefixed(cbb.get(), &child) || |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 92 | !CBB_add_bytes(&child, |
| 93 | reinterpret_cast<const uint8_t *>(protocol_label.data()), |
| 94 | protocol_label.size()) || |
| 95 | !CBB_add_bytes(&child, reinterpret_cast<const uint8_t *>(label.data()), |
| 96 | label.size()) || |
David Benjamin | 1386aad | 2017-07-19 23:57:40 -0400 | [diff] [blame] | 97 | !CBB_add_u8_length_prefixed(cbb.get(), &child) || |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 98 | !CBB_add_bytes(&child, hash.data(), hash.size()) || |
David Benjamin | 89b9ecf | 2018-07-14 13:27:25 -0400 | [diff] [blame] | 99 | !CBBFinishArray(cbb.get(), &hkdf_label)) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 100 | return false; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 101 | } |
| 102 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 103 | return HKDF_expand(out.data(), out.size(), digest, secret.data(), |
| 104 | secret.size(), hkdf_label.data(), hkdf_label.size()); |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 105 | } |
| 106 | |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 107 | static const char kTLS13LabelDerived[] = "derived"; |
| 108 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 109 | bool tls13_advance_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> in) { |
Steven Valdez | 7e5dd25 | 2018-01-22 15:20:31 -0500 | [diff] [blame] | 110 | uint8_t derive_context[EVP_MAX_MD_SIZE]; |
| 111 | unsigned derive_context_len; |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 112 | return EVP_Digest(nullptr, 0, derive_context, &derive_context_len, |
| 113 | hs->transcript.Digest(), nullptr) && |
| 114 | hkdf_expand_label(hs->secret(), hs->transcript.Digest(), hs->secret(), |
| 115 | label_to_span(kTLS13LabelDerived), |
| 116 | MakeConstSpan(derive_context, derive_context_len)) && |
| 117 | hkdf_extract_to_secret(hs, in); |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 118 | } |
| 119 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 120 | // derive_secret derives a secret of length |out.size()| and writes the result |
| 121 | // in |out| with the given label, the current base secret, and the most |
| 122 | // recently-saved handshake context. It returns true on success and false on |
| 123 | // error. |
| 124 | static bool derive_secret(SSL_HANDSHAKE *hs, Span<uint8_t> out, |
| 125 | Span<const char> label) { |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 126 | uint8_t context_hash[EVP_MAX_MD_SIZE]; |
| 127 | size_t context_hash_len; |
David Benjamin | 6dc8bf6 | 2017-07-19 16:38:21 -0400 | [diff] [blame] | 128 | if (!hs->transcript.GetHash(context_hash, &context_hash_len)) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 129 | return false; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 130 | } |
| 131 | |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 132 | return hkdf_expand_label(out, hs->transcript.Digest(), hs->secret(), label, |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 133 | MakeConstSpan(context_hash, context_hash_len)); |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 134 | } |
| 135 | |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 136 | bool tls13_set_traffic_key(SSL *ssl, enum ssl_encryption_level_t level, |
| 137 | enum evp_aead_direction_t direction, |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 138 | Span<const uint8_t> traffic_secret) { |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 139 | const SSL_SESSION *session = SSL_get_session(ssl); |
David Benjamin | a4bafd3 | 2017-10-03 15:06:29 -0400 | [diff] [blame] | 140 | uint16_t version = ssl_session_protocol_version(session); |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 141 | |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 142 | UniquePtr<SSLAEADContext> traffic_aead; |
Alessandro Ghedini | 3cbb029 | 2018-12-13 13:53:57 +0000 | [diff] [blame] | 143 | if (ssl->quic_method == nullptr) { |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 144 | // Look up cipher suite properties. |
| 145 | const EVP_AEAD *aead; |
| 146 | size_t discard; |
| 147 | if (!ssl_cipher_get_evp_aead(&aead, &discard, &discard, session->cipher, |
| 148 | version, SSL_is_dtls(ssl))) { |
| 149 | return false; |
| 150 | } |
| 151 | |
| 152 | const EVP_MD *digest = ssl_session_get_digest(session); |
| 153 | |
| 154 | // Derive the key. |
| 155 | size_t key_len = EVP_AEAD_key_length(aead); |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 156 | uint8_t key_buf[EVP_AEAD_MAX_KEY_LENGTH]; |
| 157 | auto key = MakeSpan(key_buf, key_len); |
| 158 | if (!hkdf_expand_label(key, digest, traffic_secret, label_to_span("key"), |
| 159 | {})) { |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 160 | return false; |
| 161 | } |
| 162 | |
| 163 | // Derive the IV. |
| 164 | size_t iv_len = EVP_AEAD_nonce_length(aead); |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 165 | uint8_t iv_buf[EVP_AEAD_MAX_NONCE_LENGTH]; |
| 166 | auto iv = MakeSpan(iv_buf, iv_len); |
| 167 | if (!hkdf_expand_label(iv, digest, traffic_secret, label_to_span("iv"), |
| 168 | {})) { |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 169 | return false; |
| 170 | } |
| 171 | |
| 172 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 173 | traffic_aead = SSLAEADContext::Create(direction, session->ssl_version, |
| 174 | SSL_is_dtls(ssl), session->cipher, |
| 175 | key, Span<const uint8_t>(), iv); |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 176 | } else { |
| 177 | // Install a placeholder SSLAEADContext so that SSL accessors work. The |
| 178 | // encryption itself will be handled by the SSL_QUIC_METHOD. |
| 179 | traffic_aead = |
| 180 | SSLAEADContext::CreatePlaceholderForQUIC(version, session->cipher); |
David Benjamin | d634357 | 2019-08-15 17:29:02 -0400 | [diff] [blame^] | 181 | // QUIC never installs early data keys at the TLS layer. |
| 182 | assert(level != ssl_encryption_early_data); |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 183 | } |
| 184 | |
David Benjamin | cfc11c2 | 2017-07-18 22:45:18 -0400 | [diff] [blame] | 185 | if (!traffic_aead) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 186 | return false; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 187 | } |
| 188 | |
| 189 | if (direction == evp_aead_open) { |
David Benjamin | cfc11c2 | 2017-07-18 22:45:18 -0400 | [diff] [blame] | 190 | if (!ssl->method->set_read_state(ssl, std::move(traffic_aead))) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 191 | return false; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 192 | } |
| 193 | } else { |
David Benjamin | cfc11c2 | 2017-07-18 22:45:18 -0400 | [diff] [blame] | 194 | if (!ssl->method->set_write_state(ssl, std::move(traffic_aead))) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 195 | return false; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 196 | } |
| 197 | } |
| 198 | |
David Benjamin | c11ea942 | 2017-08-29 16:33:21 -0400 | [diff] [blame] | 199 | // Save the traffic secret. |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 200 | if (traffic_secret.size() > |
| 201 | OPENSSL_ARRAY_SIZE(ssl->s3->read_traffic_secret) || |
| 202 | traffic_secret.size() > |
| 203 | OPENSSL_ARRAY_SIZE(ssl->s3->write_traffic_secret)) { |
| 204 | OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); |
| 205 | return false; |
| 206 | } |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 207 | if (direction == evp_aead_open) { |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 208 | OPENSSL_memmove(ssl->s3->read_traffic_secret, traffic_secret.data(), |
| 209 | traffic_secret.size()); |
| 210 | ssl->s3->read_traffic_secret_len = traffic_secret.size(); |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 211 | ssl->s3->read_level = level; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 212 | } else { |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 213 | OPENSSL_memmove(ssl->s3->write_traffic_secret, traffic_secret.data(), |
| 214 | traffic_secret.size()); |
| 215 | ssl->s3->write_traffic_secret_len = traffic_secret.size(); |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 216 | ssl->s3->write_level = level; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 217 | } |
| 218 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 219 | return true; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 220 | } |
| 221 | |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 222 | |
Steven Valdez | 7e5dd25 | 2018-01-22 15:20:31 -0500 | [diff] [blame] | 223 | static const char kTLS13LabelExporter[] = "exp master"; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 224 | |
Steven Valdez | 7e5dd25 | 2018-01-22 15:20:31 -0500 | [diff] [blame] | 225 | static const char kTLS13LabelClientEarlyTraffic[] = "c e traffic"; |
| 226 | static const char kTLS13LabelClientHandshakeTraffic[] = "c hs traffic"; |
| 227 | static const char kTLS13LabelServerHandshakeTraffic[] = "s hs traffic"; |
| 228 | static const char kTLS13LabelClientApplicationTraffic[] = "c ap traffic"; |
| 229 | static const char kTLS13LabelServerApplicationTraffic[] = "s ap traffic"; |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 230 | |
David Benjamin | d634357 | 2019-08-15 17:29:02 -0400 | [diff] [blame^] | 231 | bool tls13_derive_early_secret(SSL_HANDSHAKE *hs) { |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 232 | SSL *const ssl = hs->ssl; |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 233 | if (!derive_secret(hs, hs->early_traffic_secret(), |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 234 | label_to_span(kTLS13LabelClientEarlyTraffic)) || |
David Benjamin | 650d8c3 | 2017-12-08 17:05:06 -0500 | [diff] [blame] | 235 | !ssl_log_secret(ssl, "CLIENT_EARLY_TRAFFIC_SECRET", |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 236 | hs->early_traffic_secret())) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 237 | return false; |
David Benjamin | 650d8c3 | 2017-12-08 17:05:06 -0500 | [diff] [blame] | 238 | } |
David Benjamin | d634357 | 2019-08-15 17:29:02 -0400 | [diff] [blame^] | 239 | return true; |
| 240 | } |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 241 | |
David Benjamin | d634357 | 2019-08-15 17:29:02 -0400 | [diff] [blame^] | 242 | bool tls13_set_early_secret_for_quic(SSL_HANDSHAKE *hs) { |
| 243 | SSL *const ssl = hs->ssl; |
| 244 | if (ssl->quic_method == nullptr) { |
| 245 | return true; |
| 246 | } |
| 247 | if (ssl->server) { |
| 248 | if (!ssl->quic_method->set_encryption_secrets( |
| 249 | ssl, ssl_encryption_early_data, hs->early_traffic_secret().data(), |
| 250 | /*write_secret=*/nullptr, hs->early_traffic_secret().size())) { |
| 251 | OPENSSL_PUT_ERROR(SSL, SSL_R_QUIC_INTERNAL_ERROR); |
| 252 | return false; |
| 253 | } |
| 254 | } else { |
| 255 | if (!ssl->quic_method->set_encryption_secrets( |
| 256 | ssl, ssl_encryption_early_data, /*read_secret=*/nullptr, |
| 257 | hs->early_traffic_secret().data(), |
| 258 | hs->early_traffic_secret().size())) { |
| 259 | OPENSSL_PUT_ERROR(SSL, SSL_R_QUIC_INTERNAL_ERROR); |
| 260 | return false; |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 261 | } |
| 262 | } |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 263 | return true; |
Steven Valdez | 2d85062 | 2017-01-11 11:34:52 -0500 | [diff] [blame] | 264 | } |
| 265 | |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 266 | static bool set_quic_secrets(SSL_HANDSHAKE *hs, ssl_encryption_level_t level, |
| 267 | Span<const uint8_t> client_write_secret, |
| 268 | Span<const uint8_t> server_write_secret) { |
| 269 | SSL *const ssl = hs->ssl; |
| 270 | assert(client_write_secret.size() == server_write_secret.size()); |
| 271 | if (ssl->quic_method == nullptr) { |
| 272 | return true; |
| 273 | } |
| 274 | if (!ssl->server) { |
| 275 | std::swap(client_write_secret, server_write_secret); |
| 276 | } |
| 277 | return ssl->quic_method->set_encryption_secrets( |
| 278 | ssl, level, |
| 279 | /*read_secret=*/client_write_secret.data(), |
| 280 | /*write_secret=*/server_write_secret.data(), client_write_secret.size()); |
| 281 | } |
| 282 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 283 | bool tls13_derive_handshake_secrets(SSL_HANDSHAKE *hs) { |
David Benjamin | 6e4fc33 | 2016-11-17 16:43:08 +0900 | [diff] [blame] | 284 | SSL *const ssl = hs->ssl; |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 285 | if (!derive_secret(hs, hs->client_handshake_secret(), |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 286 | label_to_span(kTLS13LabelClientHandshakeTraffic)) || |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 287 | !ssl_log_secret(ssl, "CLIENT_HANDSHAKE_TRAFFIC_SECRET", |
| 288 | hs->client_handshake_secret()) || |
| 289 | !derive_secret(hs, hs->server_handshake_secret(), |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 290 | label_to_span(kTLS13LabelServerHandshakeTraffic)) || |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 291 | !ssl_log_secret(ssl, "SERVER_HANDSHAKE_TRAFFIC_SECRET", |
| 292 | hs->server_handshake_secret()) || |
| 293 | !set_quic_secrets(hs, ssl_encryption_handshake, |
| 294 | hs->client_handshake_secret(), |
| 295 | hs->server_handshake_secret())) { |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 296 | return false; |
| 297 | } |
| 298 | |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 299 | return true; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 300 | } |
| 301 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 302 | bool tls13_derive_application_secrets(SSL_HANDSHAKE *hs) { |
David Benjamin | 6e4fc33 | 2016-11-17 16:43:08 +0900 | [diff] [blame] | 303 | SSL *const ssl = hs->ssl; |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 304 | ssl->s3->exporter_secret_len = hs->transcript.DigestLen(); |
| 305 | if (!derive_secret(hs, hs->client_traffic_secret_0(), |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 306 | label_to_span(kTLS13LabelClientApplicationTraffic)) || |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 307 | !ssl_log_secret(ssl, "CLIENT_TRAFFIC_SECRET_0", |
| 308 | hs->client_traffic_secret_0()) || |
| 309 | !derive_secret(hs, hs->server_traffic_secret_0(), |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 310 | label_to_span(kTLS13LabelServerApplicationTraffic)) || |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 311 | !ssl_log_secret(ssl, "SERVER_TRAFFIC_SECRET_0", |
| 312 | hs->server_traffic_secret_0()) || |
David Benjamin | b244e3a | 2019-08-16 19:33:15 -0400 | [diff] [blame] | 313 | !derive_secret( |
| 314 | hs, MakeSpan(ssl->s3->exporter_secret, ssl->s3->exporter_secret_len), |
| 315 | label_to_span(kTLS13LabelExporter)) || |
| 316 | !ssl_log_secret(ssl, "EXPORTER_SECRET", |
| 317 | MakeConstSpan(ssl->s3->exporter_secret, |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 318 | ssl->s3->exporter_secret_len)) || |
| 319 | !set_quic_secrets(hs, ssl_encryption_application, |
| 320 | hs->client_traffic_secret_0(), |
| 321 | hs->server_traffic_secret_0())) { |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 322 | return false; |
| 323 | } |
| 324 | |
Steven Valdez | c8e0f90 | 2018-07-14 11:23:01 -0400 | [diff] [blame] | 325 | return true; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 326 | } |
| 327 | |
Steven Valdez | 7e5dd25 | 2018-01-22 15:20:31 -0500 | [diff] [blame] | 328 | static const char kTLS13LabelApplicationTraffic[] = "traffic upd"; |
Steven Valdez | c4aa727 | 2016-10-03 12:25:56 -0400 | [diff] [blame] | 329 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 330 | bool tls13_rotate_traffic_key(SSL *ssl, enum evp_aead_direction_t direction) { |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 331 | Span<uint8_t> secret; |
Steven Valdez | 1dc53d2 | 2016-07-26 12:27:38 -0400 | [diff] [blame] | 332 | if (direction == evp_aead_open) { |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 333 | secret = MakeSpan(ssl->s3->read_traffic_secret, |
| 334 | ssl->s3->read_traffic_secret_len); |
Steven Valdez | 1dc53d2 | 2016-07-26 12:27:38 -0400 | [diff] [blame] | 335 | } else { |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 336 | secret = MakeSpan(ssl->s3->write_traffic_secret, |
| 337 | ssl->s3->write_traffic_secret_len); |
Steven Valdez | 1dc53d2 | 2016-07-26 12:27:38 -0400 | [diff] [blame] | 338 | } |
| 339 | |
David Benjamin | a4bafd3 | 2017-10-03 15:06:29 -0400 | [diff] [blame] | 340 | const EVP_MD *digest = ssl_session_get_digest(SSL_get_session(ssl)); |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 341 | return hkdf_expand_label(secret, digest, secret, |
| 342 | label_to_span(kTLS13LabelApplicationTraffic), {}) && |
| 343 | tls13_set_traffic_key(ssl, ssl_encryption_application, direction, |
| 344 | secret); |
Steven Valdez | 1dc53d2 | 2016-07-26 12:27:38 -0400 | [diff] [blame] | 345 | } |
| 346 | |
Steven Valdez | 7e5dd25 | 2018-01-22 15:20:31 -0500 | [diff] [blame] | 347 | static const char kTLS13LabelResumption[] = "res master"; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 348 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 349 | bool tls13_derive_resumption_secret(SSL_HANDSHAKE *hs) { |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 350 | if (hs->transcript.DigestLen() > SSL_MAX_MASTER_KEY_LENGTH) { |
David Benjamin | 3d622e5 | 2016-11-23 12:39:29 -0500 | [diff] [blame] | 351 | OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 352 | return false; |
David Benjamin | 3d622e5 | 2016-11-23 12:39:29 -0500 | [diff] [blame] | 353 | } |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 354 | hs->new_session->master_key_length = hs->transcript.DigestLen(); |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 355 | return derive_secret( |
| 356 | hs, |
| 357 | MakeSpan(hs->new_session->master_key, hs->new_session->master_key_length), |
| 358 | label_to_span(kTLS13LabelResumption)); |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 359 | } |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 360 | |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 361 | static const char kTLS13LabelFinished[] = "finished"; |
| 362 | |
David Benjamin | c11ea942 | 2017-08-29 16:33:21 -0400 | [diff] [blame] | 363 | // tls13_verify_data sets |out| to be the HMAC of |context| using a derived |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 364 | // Finished key for both Finished messages and the PSK binder. |out| must have |
| 365 | // space available for |EVP_MAX_MD_SIZE| bytes. |
| 366 | static bool tls13_verify_data(uint8_t *out, size_t *out_len, |
| 367 | const EVP_MD *digest, uint16_t version, |
| 368 | Span<const uint8_t> secret, |
| 369 | Span<const uint8_t> context) { |
| 370 | uint8_t key_buf[EVP_MAX_MD_SIZE]; |
| 371 | auto key = MakeSpan(key_buf, EVP_MD_size(digest)); |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 372 | unsigned len; |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 373 | if (!hkdf_expand_label(key, digest, secret, |
| 374 | label_to_span(kTLS13LabelFinished), {}) || |
| 375 | HMAC(digest, key.data(), key.size(), context.data(), context.size(), out, |
| 376 | &len) == nullptr) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 377 | return false; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 378 | } |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 379 | *out_len = len; |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 380 | return true; |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 381 | } |
| 382 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 383 | bool tls13_finished_mac(SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, |
| 384 | bool is_server) { |
David Benjamin | e530ea3 | 2019-08-16 19:28:00 -0400 | [diff] [blame] | 385 | Span<const uint8_t> traffic_secret = |
| 386 | is_server ? hs->server_handshake_secret() : hs->client_handshake_secret(); |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 387 | |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 388 | uint8_t context_hash[EVP_MAX_MD_SIZE]; |
| 389 | size_t context_hash_len; |
David Benjamin | 6dc8bf6 | 2017-07-19 16:38:21 -0400 | [diff] [blame] | 390 | if (!hs->transcript.GetHash(context_hash, &context_hash_len) || |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 391 | !tls13_verify_data(out, out_len, hs->transcript.Digest(), |
| 392 | hs->ssl->version, traffic_secret, |
| 393 | MakeConstSpan(context_hash, context_hash_len))) { |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 394 | return 0; |
| 395 | } |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 396 | return 1; |
| 397 | } |
| 398 | |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 399 | static const char kTLS13LabelResumptionPSK[] = "resumption"; |
| 400 | |
Alessandro Ghedini | 2cc6f44 | 2018-12-11 11:35:17 +0000 | [diff] [blame] | 401 | bool tls13_derive_session_psk(SSL_SESSION *session, Span<const uint8_t> nonce) { |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 402 | const EVP_MD *digest = ssl_session_get_digest(session); |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 403 | // The session initially stores the resumption_master_secret, which we |
| 404 | // override with the PSK. |
| 405 | auto session_key = MakeSpan(session->master_key, session->master_key_length); |
| 406 | return hkdf_expand_label(session_key, digest, session_key, |
| 407 | label_to_span(kTLS13LabelResumptionPSK), nonce); |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 408 | } |
| 409 | |
| 410 | static const char kTLS13LabelExportKeying[] = "exporter"; |
| 411 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 412 | bool tls13_export_keying_material(SSL *ssl, Span<uint8_t> out, |
| 413 | Span<const uint8_t> secret, |
| 414 | Span<const char> label, |
| 415 | Span<const uint8_t> context) { |
David Benjamin | 650d8c3 | 2017-12-08 17:05:06 -0500 | [diff] [blame] | 416 | if (secret.empty()) { |
| 417 | assert(0); |
| 418 | OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 419 | return false; |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 420 | } |
| 421 | |
David Benjamin | a4bafd3 | 2017-10-03 15:06:29 -0400 | [diff] [blame] | 422 | const EVP_MD *digest = ssl_session_get_digest(SSL_get_session(ssl)); |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 423 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 424 | uint8_t hash_buf[EVP_MAX_MD_SIZE]; |
| 425 | uint8_t export_context_buf[EVP_MAX_MD_SIZE]; |
Steven Valdez | cd8470f | 2017-10-11 12:29:36 -0400 | [diff] [blame] | 426 | unsigned hash_len; |
| 427 | unsigned export_context_len; |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 428 | if (!EVP_Digest(context.data(), context.size(), hash_buf, &hash_len, digest, |
| 429 | nullptr) || |
| 430 | !EVP_Digest(nullptr, 0, export_context_buf, &export_context_len, digest, |
| 431 | nullptr)) { |
| 432 | return false; |
| 433 | } |
| 434 | |
| 435 | auto hash = MakeConstSpan(hash_buf, hash_len); |
| 436 | auto export_context = MakeConstSpan(export_context_buf, export_context_len); |
| 437 | uint8_t derived_secret_buf[EVP_MAX_MD_SIZE]; |
| 438 | auto derived_secret = MakeSpan(derived_secret_buf, EVP_MD_size(digest)); |
| 439 | return hkdf_expand_label(derived_secret, digest, secret, label, |
| 440 | export_context) && |
| 441 | hkdf_expand_label(out, digest, derived_secret, |
| 442 | label_to_span(kTLS13LabelExportKeying), hash); |
Steven Valdez | 143e8b3 | 2016-07-11 13:19:03 -0400 | [diff] [blame] | 443 | } |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 444 | |
Steven Valdez | 7e5dd25 | 2018-01-22 15:20:31 -0500 | [diff] [blame] | 445 | static const char kTLS13LabelPSKBinder[] = "res binder"; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 446 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 447 | static bool tls13_psk_binder(uint8_t *out, size_t *out_len, uint16_t version, |
| 448 | const EVP_MD *digest, Span<const uint8_t> psk, |
| 449 | Span<const uint8_t> context) { |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 450 | uint8_t binder_context[EVP_MAX_MD_SIZE]; |
| 451 | unsigned binder_context_len; |
| 452 | if (!EVP_Digest(NULL, 0, binder_context, &binder_context_len, digest, NULL)) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 453 | return false; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 454 | } |
| 455 | |
| 456 | uint8_t early_secret[EVP_MAX_MD_SIZE] = {0}; |
| 457 | size_t early_secret_len; |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 458 | if (!HKDF_extract(early_secret, &early_secret_len, digest, psk.data(), |
| 459 | psk.size(), NULL, 0)) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 460 | return false; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 461 | } |
| 462 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 463 | uint8_t binder_key_buf[EVP_MAX_MD_SIZE] = {0}; |
| 464 | auto binder_key = MakeSpan(binder_key_buf, EVP_MD_size(digest)); |
| 465 | if (!hkdf_expand_label(binder_key, digest, |
| 466 | MakeConstSpan(early_secret, early_secret_len), |
| 467 | label_to_span(kTLS13LabelPSKBinder), |
| 468 | MakeConstSpan(binder_context, binder_context_len)) || |
| 469 | !tls13_verify_data(out, out_len, digest, version, binder_key, context)) { |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 470 | return false; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 471 | } |
| 472 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 473 | assert(*out_len == EVP_MD_size(digest)); |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 474 | return true; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 475 | } |
| 476 | |
David Benjamin | 9806ae0 | 2019-08-16 15:32:03 -0400 | [diff] [blame] | 477 | static bool hash_transcript_and_truncated_client_hello( |
| 478 | SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, const EVP_MD *digest, |
| 479 | Span<const uint8_t> client_hello, size_t binders_len) { |
| 480 | // Truncate the ClientHello. |
| 481 | if (binders_len + 2 < binders_len || client_hello.size() < binders_len + 2) { |
| 482 | return false; |
| 483 | } |
| 484 | client_hello = client_hello.subspan(0, client_hello.size() - binders_len - 2); |
| 485 | |
| 486 | ScopedEVP_MD_CTX ctx; |
| 487 | unsigned len; |
| 488 | if (!hs->transcript.CopyToHashContext(ctx.get(), digest) || |
| 489 | !EVP_DigestUpdate(ctx.get(), client_hello.data(), client_hello.size()) || |
| 490 | !EVP_DigestFinal_ex(ctx.get(), out, &len)) { |
| 491 | return false; |
| 492 | } |
| 493 | |
| 494 | *out_len = len; |
| 495 | return true; |
| 496 | } |
| 497 | |
| 498 | bool tls13_write_psk_binder(SSL_HANDSHAKE *hs, Span<uint8_t> msg) { |
Steven Valdez | 908ac19 | 2017-01-12 13:17:07 -0500 | [diff] [blame] | 499 | SSL *const ssl = hs->ssl; |
David Benjamin | 50596f8 | 2018-07-02 19:47:27 -0400 | [diff] [blame] | 500 | const EVP_MD *digest = ssl_session_get_digest(ssl->session.get()); |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 501 | size_t hash_len = EVP_MD_size(digest); |
| 502 | |
David Benjamin | 1386aad | 2017-07-19 23:57:40 -0400 | [diff] [blame] | 503 | ScopedEVP_MD_CTX ctx; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 504 | uint8_t context[EVP_MAX_MD_SIZE]; |
David Benjamin | 9806ae0 | 2019-08-16 15:32:03 -0400 | [diff] [blame] | 505 | size_t context_len; |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 506 | uint8_t verify_data[EVP_MAX_MD_SIZE]; |
| 507 | size_t verify_data_len; |
David Benjamin | 9806ae0 | 2019-08-16 15:32:03 -0400 | [diff] [blame] | 508 | if (!hash_transcript_and_truncated_client_hello( |
| 509 | hs, context, &context_len, digest, msg, |
| 510 | 1 /* length prefix */ + hash_len) || |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 511 | !tls13_psk_binder(verify_data, &verify_data_len, |
| 512 | ssl->session->ssl_version, digest, |
| 513 | MakeConstSpan(ssl->session->master_key, |
| 514 | ssl->session->master_key_length), |
| 515 | MakeConstSpan(context, context_len)) || |
| 516 | verify_data_len != hash_len) { |
| 517 | OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 518 | return false; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 519 | } |
| 520 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 521 | OPENSSL_memcpy(msg.data() + msg.size() - verify_data_len, verify_data, |
| 522 | verify_data_len); |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 523 | return true; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 524 | } |
| 525 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 526 | bool tls13_verify_psk_binder(SSL_HANDSHAKE *hs, SSL_SESSION *session, |
| 527 | const SSLMessage &msg, CBS *binders) { |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 528 | uint8_t context[EVP_MAX_MD_SIZE]; |
David Benjamin | 9806ae0 | 2019-08-16 15:32:03 -0400 | [diff] [blame] | 529 | size_t context_len; |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 530 | uint8_t verify_data[EVP_MAX_MD_SIZE]; |
| 531 | size_t verify_data_len; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 532 | CBS binder; |
David Benjamin | 9806ae0 | 2019-08-16 15:32:03 -0400 | [diff] [blame] | 533 | if (!hash_transcript_and_truncated_client_hello(hs, context, &context_len, |
| 534 | hs->transcript.Digest(), |
| 535 | msg.raw, CBS_len(binders)) || |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 536 | !tls13_psk_binder( |
| 537 | verify_data, &verify_data_len, hs->ssl->version, |
| 538 | hs->transcript.Digest(), |
| 539 | MakeConstSpan(session->master_key, session->master_key_length), |
| 540 | MakeConstSpan(context, context_len)) || |
David Benjamin | c11ea942 | 2017-08-29 16:33:21 -0400 | [diff] [blame] | 541 | // We only consider the first PSK, so compare against the first binder. |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 542 | !CBS_get_u8_length_prefixed(binders, &binder)) { |
| 543 | OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR); |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 544 | return false; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 545 | } |
| 546 | |
David Benjamin | 79b8b3a | 2019-08-16 18:58:13 -0400 | [diff] [blame] | 547 | bool binder_ok = |
| 548 | CBS_len(&binder) == verify_data_len && |
| 549 | CRYPTO_memcmp(CBS_data(&binder), verify_data, verify_data_len) == 0; |
David Benjamin | 32b47a5 | 2016-11-14 21:19:17 +0900 | [diff] [blame] | 550 | #if defined(BORINGSSL_UNSAFE_FUZZER_MODE) |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 551 | binder_ok = true; |
David Benjamin | 32b47a5 | 2016-11-14 21:19:17 +0900 | [diff] [blame] | 552 | #endif |
| 553 | if (!binder_ok) { |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 554 | OPENSSL_PUT_ERROR(SSL, SSL_R_DIGEST_CHECK_FAILED); |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 555 | return false; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 556 | } |
| 557 | |
David Benjamin | 8525ff3 | 2018-09-05 18:44:15 -0500 | [diff] [blame] | 558 | return true; |
Steven Valdez | a833c35 | 2016-11-01 13:39:36 -0400 | [diff] [blame] | 559 | } |
David Benjamin | 86e95b8 | 2017-07-18 16:34:25 -0400 | [diff] [blame] | 560 | |
Joshua Liebow-Feeser | 8c7c635 | 2018-08-26 18:53:36 -0700 | [diff] [blame] | 561 | BSSL_NAMESPACE_END |