HandshakeClient.cpp 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422
  1. /*
  2. * Copyright (c) 2020, Ali Mohammad Pur <mpfard@serenityos.org>
  3. * Copyright (c) 2022, Michiel Visser <opensource@webmichiel.nl>
  4. *
  5. * SPDX-License-Identifier: BSD-2-Clause
  6. */
  7. #include <AK/Debug.h>
  8. #include <AK/Hex.h>
  9. #include <AK/Random.h>
  10. #include <LibCrypto/ASN1/DER.h>
  11. #include <LibCrypto/BigInt/UnsignedBigInteger.h>
  12. #include <LibCrypto/NumberTheory/ModularFunctions.h>
  13. #include <LibCrypto/PK/Code/EMSA_PSS.h>
  14. #include <LibTLS/TLSv12.h>
  15. namespace TLS {
  16. bool TLSv12::expand_key()
  17. {
  18. u8 key[192]; // soooooooo many constants
  19. auto key_buffer = Bytes { key, sizeof(key) };
  20. auto is_aead = this->is_aead();
  21. if (m_context.master_key.size() == 0) {
  22. dbgln("expand_key() with empty master key");
  23. return false;
  24. }
  25. auto key_size = key_length();
  26. VERIFY(key_size);
  27. auto mac_size = mac_length();
  28. auto iv_size = iv_length();
  29. pseudorandom_function(
  30. key_buffer,
  31. m_context.master_key,
  32. (u8 const*)"key expansion", 13,
  33. ReadonlyBytes { m_context.remote_random, sizeof(m_context.remote_random) },
  34. ReadonlyBytes { m_context.local_random, sizeof(m_context.local_random) });
  35. size_t offset = 0;
  36. if (is_aead) {
  37. iv_size = 4; // Explicit IV size.
  38. } else {
  39. memcpy(m_context.crypto.local_mac, key + offset, mac_size);
  40. offset += mac_size;
  41. memcpy(m_context.crypto.remote_mac, key + offset, mac_size);
  42. offset += mac_size;
  43. }
  44. auto client_key = key + offset;
  45. offset += key_size;
  46. auto server_key = key + offset;
  47. offset += key_size;
  48. auto client_iv = key + offset;
  49. offset += iv_size;
  50. auto server_iv = key + offset;
  51. offset += iv_size;
  52. if constexpr (TLS_DEBUG) {
  53. dbgln("client key");
  54. print_buffer(client_key, key_size);
  55. dbgln("server key");
  56. print_buffer(server_key, key_size);
  57. dbgln("client iv");
  58. print_buffer(client_iv, iv_size);
  59. dbgln("server iv");
  60. print_buffer(server_iv, iv_size);
  61. if (!is_aead) {
  62. dbgln("client mac key");
  63. print_buffer(m_context.crypto.local_mac, mac_size);
  64. dbgln("server mac key");
  65. print_buffer(m_context.crypto.remote_mac, mac_size);
  66. }
  67. }
  68. switch (get_cipher_algorithm(m_context.cipher)) {
  69. case CipherAlgorithm::AES_128_CBC:
  70. case CipherAlgorithm::AES_256_CBC: {
  71. VERIFY(!is_aead);
  72. memcpy(m_context.crypto.local_iv, client_iv, iv_size);
  73. memcpy(m_context.crypto.remote_iv, server_iv, iv_size);
  74. m_cipher_local = Crypto::Cipher::AESCipher::CBCMode(ReadonlyBytes { client_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::RFC5246);
  75. m_cipher_remote = Crypto::Cipher::AESCipher::CBCMode(ReadonlyBytes { server_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::RFC5246);
  76. break;
  77. }
  78. case CipherAlgorithm::AES_128_GCM:
  79. case CipherAlgorithm::AES_256_GCM: {
  80. VERIFY(is_aead);
  81. memcpy(m_context.crypto.local_aead_iv, client_iv, iv_size);
  82. memcpy(m_context.crypto.remote_aead_iv, server_iv, iv_size);
  83. m_cipher_local = Crypto::Cipher::AESCipher::GCMMode(ReadonlyBytes { client_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::RFC5246);
  84. m_cipher_remote = Crypto::Cipher::AESCipher::GCMMode(ReadonlyBytes { server_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::RFC5246);
  85. break;
  86. }
  87. case CipherAlgorithm::AES_128_CCM:
  88. dbgln("Requested unimplemented AES CCM cipher");
  89. TODO();
  90. case CipherAlgorithm::AES_128_CCM_8:
  91. dbgln("Requested unimplemented AES CCM-8 block cipher");
  92. TODO();
  93. default:
  94. dbgln("Requested unknown block cipher");
  95. VERIFY_NOT_REACHED();
  96. }
  97. m_context.crypto.created = 1;
  98. return true;
  99. }
  100. bool TLSv12::compute_master_secret_from_pre_master_secret(size_t length)
  101. {
  102. if (m_context.premaster_key.size() == 0 || length < 48) {
  103. dbgln("there's no way I can make a master secret like this");
  104. dbgln("I'd like to talk to your manager about this length of {}", length);
  105. return false;
  106. }
  107. if (m_context.master_key.try_resize(length).is_error()) {
  108. dbgln("Couldn't allocate enough space for the master key :(");
  109. return false;
  110. }
  111. if (m_context.extensions.extended_master_secret) {
  112. Crypto::Hash::Manager handshake_hash_copy = m_context.handshake_hash.copy();
  113. auto digest = handshake_hash_copy.digest();
  114. auto session_hash = ReadonlyBytes { digest.immutable_data(), handshake_hash_copy.digest_size() };
  115. pseudorandom_function(
  116. m_context.master_key,
  117. m_context.premaster_key,
  118. (u8 const*)"extended master secret", 22,
  119. session_hash,
  120. {});
  121. } else {
  122. pseudorandom_function(
  123. m_context.master_key,
  124. m_context.premaster_key,
  125. (u8 const*)"master secret", 13,
  126. ReadonlyBytes { m_context.local_random, sizeof(m_context.local_random) },
  127. ReadonlyBytes { m_context.remote_random, sizeof(m_context.remote_random) });
  128. }
  129. m_context.premaster_key.clear();
  130. if constexpr (TLS_DEBUG) {
  131. dbgln("master key:");
  132. print_buffer(m_context.master_key);
  133. }
  134. if constexpr (TLS_SSL_KEYLOG_DEBUG) {
  135. auto file = MUST(Core::File::open("/home/anon/ssl_keylog"sv, Core::File::OpenMode::Append | Core::File::OpenMode::Write));
  136. MUST(file->write_until_depleted("CLIENT_RANDOM "sv.bytes()));
  137. MUST(file->write_until_depleted(encode_hex({ m_context.local_random, 32 }).bytes()));
  138. MUST(file->write_until_depleted(" "sv.bytes()));
  139. MUST(file->write_until_depleted(encode_hex(m_context.master_key).bytes()));
  140. MUST(file->write_until_depleted("\n"sv.bytes()));
  141. }
  142. expand_key();
  143. return true;
  144. }
  145. void TLSv12::build_rsa_pre_master_secret(PacketBuilder& builder)
  146. {
  147. u8 random_bytes[48];
  148. size_t bytes = 48;
  149. fill_with_random(random_bytes);
  150. // remove zeros from the random bytes
  151. for (size_t i = 0; i < bytes; ++i) {
  152. if (!random_bytes[i])
  153. random_bytes[i--] = get_random<u8>();
  154. }
  155. if (m_context.is_server) {
  156. dbgln("Server mode not supported");
  157. return;
  158. } else {
  159. *(u16*)random_bytes = AK::convert_between_host_and_network_endian((u16)ProtocolVersion::VERSION_1_2);
  160. }
  161. auto premaster_key_result = ByteBuffer::copy(random_bytes, bytes);
  162. if (premaster_key_result.is_error()) {
  163. dbgln("RSA premaster key generation failed, not enough memory");
  164. return;
  165. }
  166. m_context.premaster_key = premaster_key_result.release_value();
  167. // RFC5246 section 7.4.2: The sender's certificate MUST come first in the list.
  168. auto& certificate = m_context.certificates.first();
  169. if constexpr (TLS_DEBUG) {
  170. dbgln("PreMaster secret");
  171. print_buffer(m_context.premaster_key);
  172. }
  173. Crypto::PK::RSA_PKCS1_EME rsa(certificate.public_key.rsa.modulus(), 0, certificate.public_key.rsa.public_exponent());
  174. Vector<u8, 32> out;
  175. out.resize(rsa.output_size());
  176. auto outbuf = out.span();
  177. rsa.encrypt(m_context.premaster_key, outbuf);
  178. if constexpr (TLS_DEBUG) {
  179. dbgln("Encrypted: ");
  180. print_buffer(outbuf);
  181. }
  182. builder.append_u24(outbuf.size() + 2);
  183. builder.append((u16)outbuf.size());
  184. builder.append(outbuf);
  185. }
  186. void TLSv12::build_dhe_rsa_pre_master_secret(PacketBuilder& builder)
  187. {
  188. auto& dh = m_context.server_diffie_hellman_params;
  189. auto dh_p = Crypto::UnsignedBigInteger::import_data(dh.p.data(), dh.p.size());
  190. auto dh_g = Crypto::UnsignedBigInteger::import_data(dh.g.data(), dh.g.size());
  191. auto dh_Ys = Crypto::UnsignedBigInteger::import_data(dh.Ys.data(), dh.Ys.size());
  192. auto dh_key_size = dh.p.size();
  193. auto dh_random = Crypto::NumberTheory::random_number(0, dh_p);
  194. auto dh_Yc = Crypto::NumberTheory::ModularPower(dh_g, dh_random, dh_p);
  195. auto dh_Yc_bytes_result = ByteBuffer::create_uninitialized(dh_key_size);
  196. if (dh_Yc_bytes_result.is_error()) {
  197. dbgln("Failed to build DHE_RSA premaster secret: not enough memory");
  198. return;
  199. }
  200. auto dh_Yc_bytes = dh_Yc_bytes_result.release_value();
  201. dh_Yc.export_data(dh_Yc_bytes);
  202. auto premaster_key = Crypto::NumberTheory::ModularPower(dh_Ys, dh_random, dh_p);
  203. auto premaster_key_result = ByteBuffer::create_uninitialized(dh_key_size);
  204. if (premaster_key_result.is_error()) {
  205. dbgln("Failed to build DHE_RSA premaster secret: not enough memory");
  206. return;
  207. }
  208. m_context.premaster_key = premaster_key_result.release_value();
  209. premaster_key.export_data(m_context.premaster_key, true);
  210. dh.p.clear();
  211. dh.g.clear();
  212. dh.Ys.clear();
  213. if constexpr (TLS_DEBUG) {
  214. dbgln("dh_random: {}", dh_random.to_base_deprecated(16));
  215. dbgln("dh_Yc: {:hex-dump}", (ReadonlyBytes)dh_Yc_bytes);
  216. dbgln("premaster key: {:hex-dump}", (ReadonlyBytes)m_context.premaster_key);
  217. }
  218. builder.append_u24(dh_key_size + 2);
  219. builder.append((u16)dh_key_size);
  220. builder.append(dh_Yc_bytes);
  221. }
  222. void TLSv12::build_ecdhe_rsa_pre_master_secret(PacketBuilder& builder)
  223. {
  224. // Create a random private key
  225. auto private_key_result = m_context.server_key_exchange_curve->generate_private_key();
  226. if (private_key_result.is_error()) {
  227. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  228. return;
  229. }
  230. auto private_key = private_key_result.release_value();
  231. // Calculate the public key from the private key
  232. auto public_key_result = m_context.server_key_exchange_curve->generate_public_key(private_key);
  233. if (public_key_result.is_error()) {
  234. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  235. return;
  236. }
  237. auto public_key = public_key_result.release_value();
  238. // Calculate the shared point by multiplying the client private key and the server public key
  239. ReadonlyBytes server_public_key_bytes = m_context.server_diffie_hellman_params.p;
  240. auto shared_point_result = m_context.server_key_exchange_curve->compute_coordinate(private_key, server_public_key_bytes);
  241. if (shared_point_result.is_error()) {
  242. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  243. return;
  244. }
  245. auto shared_point = shared_point_result.release_value();
  246. // Derive the premaster key from the shared point
  247. auto premaster_key_result = m_context.server_key_exchange_curve->derive_premaster_key(shared_point);
  248. if (premaster_key_result.is_error()) {
  249. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  250. return;
  251. }
  252. m_context.premaster_key = premaster_key_result.release_value();
  253. if constexpr (TLS_DEBUG) {
  254. dbgln("Build ECDHE_RSA pre master secret");
  255. dbgln("client private key: {:hex-dump}", (ReadonlyBytes)private_key);
  256. dbgln("client public key: {:hex-dump}", (ReadonlyBytes)public_key);
  257. dbgln("premaster key: {:hex-dump}", (ReadonlyBytes)m_context.premaster_key);
  258. }
  259. builder.append_u24(public_key.size() + 1);
  260. builder.append((u8)public_key.size());
  261. builder.append(public_key);
  262. }
  263. ByteBuffer TLSv12::build_certificate()
  264. {
  265. PacketBuilder builder { ContentType::HANDSHAKE, m_context.options.version };
  266. Vector<Certificate const&> certificates;
  267. Vector<Certificate>* local_certificates = nullptr;
  268. if (m_context.is_server) {
  269. dbgln("Unsupported: Server mode");
  270. VERIFY_NOT_REACHED();
  271. } else {
  272. local_certificates = &m_context.client_certificates;
  273. }
  274. constexpr size_t der_length_delta = 3;
  275. constexpr size_t certificate_vector_header_size = 3;
  276. size_t total_certificate_size = 0;
  277. for (size_t i = 0; i < local_certificates->size(); ++i) {
  278. auto& certificate = local_certificates->at(i);
  279. if (!certificate.der.is_empty()) {
  280. total_certificate_size += certificate.der.size() + der_length_delta;
  281. // FIXME: Check for and respond with only the requested certificate types.
  282. if (true) {
  283. certificates.append(certificate);
  284. }
  285. }
  286. }
  287. builder.append((u8)HandshakeType::CERTIFICATE);
  288. if (!total_certificate_size) {
  289. dbgln_if(TLS_DEBUG, "No certificates, sending empty certificate message");
  290. builder.append_u24(certificate_vector_header_size);
  291. builder.append_u24(total_certificate_size);
  292. } else {
  293. builder.append_u24(total_certificate_size + certificate_vector_header_size); // 3 bytes for header
  294. builder.append_u24(total_certificate_size);
  295. for (auto& certificate : certificates) {
  296. if (!certificate.der.is_empty()) {
  297. builder.append_u24(certificate.der.size());
  298. builder.append(certificate.der.bytes());
  299. }
  300. }
  301. }
  302. auto packet = builder.build();
  303. update_packet(packet);
  304. return packet;
  305. }
  306. ByteBuffer TLSv12::build_client_key_exchange()
  307. {
  308. bool chain_verified = m_context.verify_chain(m_context.extensions.SNI);
  309. if (!chain_verified) {
  310. dbgln("certificate verification failed :(");
  311. alert(AlertLevel::FATAL, AlertDescription::BAD_CERTIFICATE);
  312. return {};
  313. }
  314. PacketBuilder builder { ContentType::HANDSHAKE, m_context.options.version };
  315. builder.append((u8)HandshakeType::CLIENT_KEY_EXCHANGE_RESERVED);
  316. switch (get_key_exchange_algorithm(m_context.cipher)) {
  317. case KeyExchangeAlgorithm::RSA:
  318. build_rsa_pre_master_secret(builder);
  319. break;
  320. case KeyExchangeAlgorithm::DHE_DSS:
  321. dbgln("Client key exchange for DHE_DSS is not implemented");
  322. TODO();
  323. break;
  324. case KeyExchangeAlgorithm::DH_DSS:
  325. case KeyExchangeAlgorithm::DH_RSA:
  326. dbgln("Client key exchange for DH algorithms is not implemented");
  327. TODO();
  328. break;
  329. case KeyExchangeAlgorithm::DHE_RSA:
  330. build_dhe_rsa_pre_master_secret(builder);
  331. break;
  332. case KeyExchangeAlgorithm::DH_anon:
  333. dbgln("Client key exchange for DH_anon is not implemented");
  334. TODO();
  335. break;
  336. case KeyExchangeAlgorithm::ECDHE_RSA:
  337. case KeyExchangeAlgorithm::ECDHE_ECDSA:
  338. build_ecdhe_rsa_pre_master_secret(builder);
  339. break;
  340. case KeyExchangeAlgorithm::ECDH_ECDSA:
  341. case KeyExchangeAlgorithm::ECDH_RSA:
  342. case KeyExchangeAlgorithm::ECDH_anon:
  343. dbgln("Client key exchange for ECDHE algorithms is not implemented");
  344. TODO();
  345. break;
  346. default:
  347. dbgln("Unknown client key exchange algorithm");
  348. VERIFY_NOT_REACHED();
  349. break;
  350. }
  351. m_context.connection_status = ConnectionStatus::KeyExchange;
  352. auto packet = builder.build();
  353. update_packet(packet);
  354. if (!compute_master_secret_from_pre_master_secret(48)) {
  355. dbgln("oh noes we could not derive a master key :(");
  356. }
  357. return packet;
  358. }
  359. }