HandshakeClient.cpp 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385
  1. /*
  2. * Copyright (c) 2020, Ali Mohammad Pur <mpfard@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Debug.h>
  7. #include <AK/Random.h>
  8. #include <LibCrypto/ASN1/DER.h>
  9. #include <LibCrypto/BigInt/UnsignedBigInteger.h>
  10. #include <LibCrypto/NumberTheory/ModularFunctions.h>
  11. #include <LibCrypto/PK/Code/EMSA_PSS.h>
  12. #include <LibTLS/TLSv12.h>
  13. namespace TLS {
  14. bool TLSv12::expand_key()
  15. {
  16. u8 key[192]; // soooooooo many constants
  17. auto key_buffer = Bytes { key, sizeof(key) };
  18. auto is_aead = this->is_aead();
  19. if (m_context.master_key.size() == 0) {
  20. dbgln("expand_key() with empty master key");
  21. return false;
  22. }
  23. auto key_size = key_length();
  24. VERIFY(key_size);
  25. auto mac_size = mac_length();
  26. auto iv_size = iv_length();
  27. pseudorandom_function(
  28. key_buffer,
  29. m_context.master_key,
  30. (const u8*)"key expansion", 13,
  31. ReadonlyBytes { m_context.remote_random, sizeof(m_context.remote_random) },
  32. ReadonlyBytes { m_context.local_random, sizeof(m_context.local_random) });
  33. size_t offset = 0;
  34. if (is_aead) {
  35. iv_size = 4; // Explicit IV size.
  36. } else {
  37. memcpy(m_context.crypto.local_mac, key + offset, mac_size);
  38. offset += mac_size;
  39. memcpy(m_context.crypto.remote_mac, key + offset, mac_size);
  40. offset += mac_size;
  41. }
  42. auto client_key = key + offset;
  43. offset += key_size;
  44. auto server_key = key + offset;
  45. offset += key_size;
  46. auto client_iv = key + offset;
  47. offset += iv_size;
  48. auto server_iv = key + offset;
  49. offset += iv_size;
  50. if constexpr (TLS_DEBUG) {
  51. dbgln("client key");
  52. print_buffer(client_key, key_size);
  53. dbgln("server key");
  54. print_buffer(server_key, key_size);
  55. dbgln("client iv");
  56. print_buffer(client_iv, iv_size);
  57. dbgln("server iv");
  58. print_buffer(server_iv, iv_size);
  59. if (!is_aead) {
  60. dbgln("client mac key");
  61. print_buffer(m_context.crypto.local_mac, mac_size);
  62. dbgln("server mac key");
  63. print_buffer(m_context.crypto.remote_mac, mac_size);
  64. }
  65. }
  66. switch (get_cipher_algorithm(m_context.cipher)) {
  67. case CipherAlgorithm::AES_128_CBC:
  68. case CipherAlgorithm::AES_256_CBC: {
  69. VERIFY(!is_aead);
  70. memcpy(m_context.crypto.local_iv, client_iv, iv_size);
  71. memcpy(m_context.crypto.remote_iv, server_iv, iv_size);
  72. m_cipher_local = Crypto::Cipher::AESCipher::CBCMode(ReadonlyBytes { client_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::RFC5246);
  73. m_cipher_remote = Crypto::Cipher::AESCipher::CBCMode(ReadonlyBytes { server_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::RFC5246);
  74. break;
  75. }
  76. case CipherAlgorithm::AES_128_GCM:
  77. case CipherAlgorithm::AES_256_GCM: {
  78. VERIFY(is_aead);
  79. memcpy(m_context.crypto.local_aead_iv, client_iv, iv_size);
  80. memcpy(m_context.crypto.remote_aead_iv, server_iv, iv_size);
  81. m_cipher_local = Crypto::Cipher::AESCipher::GCMMode(ReadonlyBytes { client_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::RFC5246);
  82. m_cipher_remote = Crypto::Cipher::AESCipher::GCMMode(ReadonlyBytes { server_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::RFC5246);
  83. break;
  84. }
  85. case CipherAlgorithm::AES_128_CCM:
  86. dbgln("Requested unimplemented AES CCM cipher");
  87. TODO();
  88. case CipherAlgorithm::AES_128_CCM_8:
  89. dbgln("Requested unimplemented AES CCM-8 block cipher");
  90. TODO();
  91. default:
  92. dbgln("Requested unknown block cipher");
  93. VERIFY_NOT_REACHED();
  94. }
  95. m_context.crypto.created = 1;
  96. return true;
  97. }
  98. bool TLSv12::compute_master_secret_from_pre_master_secret(size_t length)
  99. {
  100. if (m_context.premaster_key.size() == 0 || length < 48) {
  101. dbgln("there's no way I can make a master secret like this");
  102. dbgln("I'd like to talk to your manager about this length of {}", length);
  103. return false;
  104. }
  105. if (!m_context.master_key.try_resize(length)) {
  106. dbgln("Couldn't allocate enough space for the master key :(");
  107. return false;
  108. }
  109. pseudorandom_function(
  110. m_context.master_key,
  111. m_context.premaster_key,
  112. (const u8*)"master secret", 13,
  113. ReadonlyBytes { m_context.local_random, sizeof(m_context.local_random) },
  114. ReadonlyBytes { m_context.remote_random, sizeof(m_context.remote_random) });
  115. m_context.premaster_key.clear();
  116. if constexpr (TLS_DEBUG) {
  117. dbgln("master key:");
  118. print_buffer(m_context.master_key);
  119. }
  120. expand_key();
  121. return true;
  122. }
  123. static bool wildcard_matches(const StringView& host, const StringView& subject)
  124. {
  125. if (host.matches(subject))
  126. return true;
  127. if (subject.starts_with("*."))
  128. return wildcard_matches(host, subject.substring_view(2));
  129. return false;
  130. }
  131. Optional<size_t> TLSv12::verify_chain_and_get_matching_certificate(const StringView& host) const
  132. {
  133. if (m_context.certificates.is_empty() || !m_context.verify_chain())
  134. return {};
  135. if (host.is_empty())
  136. return 0;
  137. for (size_t i = 0; i < m_context.certificates.size(); ++i) {
  138. auto& cert = m_context.certificates[i];
  139. if (wildcard_matches(host, cert.subject.subject))
  140. return i;
  141. for (auto& san : cert.SAN) {
  142. if (wildcard_matches(host, san))
  143. return i;
  144. }
  145. }
  146. return {};
  147. }
  148. void TLSv12::build_rsa_pre_master_secret(PacketBuilder& builder)
  149. {
  150. u8 random_bytes[48];
  151. size_t bytes = 48;
  152. fill_with_random(random_bytes, bytes);
  153. // remove zeros from the random bytes
  154. for (size_t i = 0; i < bytes; ++i) {
  155. if (!random_bytes[i])
  156. random_bytes[i--] = get_random<u8>();
  157. }
  158. if (m_context.is_server) {
  159. dbgln("Server mode not supported");
  160. return;
  161. } else {
  162. *(u16*)random_bytes = AK::convert_between_host_and_network_endian((u16)Version::V12);
  163. }
  164. auto premaster_key_result = ByteBuffer::copy(random_bytes, bytes);
  165. if (!premaster_key_result.has_value()) {
  166. dbgln("RSA premaster key generation failed, not enough memory");
  167. return;
  168. }
  169. m_context.premaster_key = premaster_key_result.release_value();
  170. const auto& certificate_option = verify_chain_and_get_matching_certificate(m_context.extensions.SNI); // if the SNI is empty, we'll make a special case and match *a* leaf certificate.
  171. if (!certificate_option.has_value()) {
  172. dbgln("certificate verification failed :(");
  173. alert(AlertLevel::Critical, AlertDescription::BadCertificate);
  174. return;
  175. }
  176. auto& certificate = m_context.certificates[certificate_option.value()];
  177. if constexpr (TLS_DEBUG) {
  178. dbgln("PreMaster secret");
  179. print_buffer(m_context.premaster_key);
  180. }
  181. Crypto::PK::RSA_PKCS1_EME rsa(certificate.public_key.modulus(), 0, certificate.public_key.public_exponent());
  182. Vector<u8, 32> out;
  183. out.resize(rsa.output_size());
  184. auto outbuf = out.span();
  185. rsa.encrypt(m_context.premaster_key, outbuf);
  186. if constexpr (TLS_DEBUG) {
  187. dbgln("Encrypted: ");
  188. print_buffer(outbuf);
  189. }
  190. if (!compute_master_secret_from_pre_master_secret(bytes)) {
  191. dbgln("oh noes we could not derive a master key :(");
  192. return;
  193. }
  194. builder.append_u24(outbuf.size() + 2);
  195. builder.append((u16)outbuf.size());
  196. builder.append(outbuf);
  197. }
  198. void TLSv12::build_dhe_rsa_pre_master_secret(PacketBuilder& builder)
  199. {
  200. auto& dh = m_context.server_diffie_hellman_params;
  201. auto dh_p = Crypto::UnsignedBigInteger::import_data(dh.p.data(), dh.p.size());
  202. auto dh_g = Crypto::UnsignedBigInteger::import_data(dh.g.data(), dh.g.size());
  203. auto dh_Ys = Crypto::UnsignedBigInteger::import_data(dh.Ys.data(), dh.Ys.size());
  204. auto dh_key_size = dh.p.size();
  205. auto dh_random = Crypto::NumberTheory::random_number(0, dh_p);
  206. auto dh_Yc = Crypto::NumberTheory::ModularPower(dh_g, dh_random, dh_p);
  207. auto dh_Yc_bytes_result = ByteBuffer::create_uninitialized(dh_key_size);
  208. if (!dh_Yc_bytes_result.has_value()) {
  209. dbgln("Failed to build DHE_RSA premaster secret: not enough memory");
  210. return;
  211. }
  212. auto dh_Yc_bytes = dh_Yc_bytes_result.release_value();
  213. dh_Yc.export_data(dh_Yc_bytes);
  214. auto premaster_key = Crypto::NumberTheory::ModularPower(dh_Ys, dh_random, dh_p);
  215. auto premaster_key_result = ByteBuffer::create_uninitialized(dh_key_size);
  216. if (!premaster_key_result.has_value()) {
  217. dbgln("Failed to build DHE_RSA premaster secret: not enough memory");
  218. return;
  219. }
  220. m_context.premaster_key = premaster_key_result.release_value();
  221. premaster_key.export_data(m_context.premaster_key, true);
  222. dh.p.clear();
  223. dh.g.clear();
  224. dh.Ys.clear();
  225. if constexpr (TLS_DEBUG) {
  226. dbgln("dh_random: {}", dh_random.to_base(16));
  227. dbgln("dh_Yc: {:hex-dump}", (ReadonlyBytes)dh_Yc_bytes);
  228. dbgln("premaster key: {:hex-dump}", (ReadonlyBytes)m_context.premaster_key);
  229. }
  230. if (!compute_master_secret_from_pre_master_secret(48)) {
  231. dbgln("oh noes we could not derive a master key :(");
  232. return;
  233. }
  234. builder.append_u24(dh_key_size + 2);
  235. builder.append((u16)dh_key_size);
  236. builder.append(dh_Yc_bytes);
  237. }
  238. ByteBuffer TLSv12::build_certificate()
  239. {
  240. PacketBuilder builder { MessageType::Handshake, m_context.options.version };
  241. Vector<Certificate const&> certificates;
  242. Vector<Certificate>* local_certificates = nullptr;
  243. if (m_context.is_server) {
  244. dbgln("Unsupported: Server mode");
  245. VERIFY_NOT_REACHED();
  246. } else {
  247. local_certificates = &m_context.client_certificates;
  248. }
  249. constexpr size_t der_length_delta = 3;
  250. constexpr size_t certificate_vector_header_size = 3;
  251. size_t total_certificate_size = 0;
  252. for (size_t i = 0; i < local_certificates->size(); ++i) {
  253. auto& certificate = local_certificates->at(i);
  254. if (!certificate.der.is_empty()) {
  255. total_certificate_size += certificate.der.size() + der_length_delta;
  256. // FIXME: Check for and respond with only the requested certificate types.
  257. if (true) {
  258. certificates.append(certificate);
  259. }
  260. }
  261. }
  262. builder.append((u8)HandshakeType::CertificateMessage);
  263. if (!total_certificate_size) {
  264. dbgln_if(TLS_DEBUG, "No certificates, sending empty certificate message");
  265. builder.append_u24(certificate_vector_header_size);
  266. builder.append_u24(total_certificate_size);
  267. } else {
  268. builder.append_u24(total_certificate_size + certificate_vector_header_size); // 3 bytes for header
  269. builder.append_u24(total_certificate_size);
  270. for (auto& certificate : certificates) {
  271. if (!certificate.der.is_empty()) {
  272. builder.append_u24(certificate.der.size());
  273. builder.append(certificate.der.bytes());
  274. }
  275. }
  276. }
  277. auto packet = builder.build();
  278. update_packet(packet);
  279. return packet;
  280. }
  281. ByteBuffer TLSv12::build_client_key_exchange()
  282. {
  283. PacketBuilder builder { MessageType::Handshake, m_context.options.version };
  284. builder.append((u8)HandshakeType::ClientKeyExchange);
  285. switch (get_key_exchange_algorithm(m_context.cipher)) {
  286. case KeyExchangeAlgorithm::RSA:
  287. build_rsa_pre_master_secret(builder);
  288. break;
  289. case KeyExchangeAlgorithm::DHE_DSS:
  290. dbgln("Client key exchange for DHE_DSS is not implemented");
  291. TODO();
  292. break;
  293. case KeyExchangeAlgorithm::DH_DSS:
  294. case KeyExchangeAlgorithm::DH_RSA:
  295. dbgln("Client key exchange for DH algorithms is not implemented");
  296. TODO();
  297. break;
  298. case KeyExchangeAlgorithm::DHE_RSA:
  299. build_dhe_rsa_pre_master_secret(builder);
  300. break;
  301. case KeyExchangeAlgorithm::DH_anon:
  302. dbgln("Client key exchange for DH_anon is not implemented");
  303. TODO();
  304. break;
  305. case KeyExchangeAlgorithm::ECDHE_RSA:
  306. case KeyExchangeAlgorithm::ECDH_ECDSA:
  307. case KeyExchangeAlgorithm::ECDH_RSA:
  308. case KeyExchangeAlgorithm::ECDHE_ECDSA:
  309. case KeyExchangeAlgorithm::ECDH_anon:
  310. dbgln("Client key exchange for ECDHE algorithms is not implemented");
  311. TODO();
  312. break;
  313. default:
  314. dbgln("Unknonwn client key exchange algorithm");
  315. VERIFY_NOT_REACHED();
  316. break;
  317. }
  318. m_context.connection_status = ConnectionStatus::KeyExchange;
  319. auto packet = builder.build();
  320. update_packet(packet);
  321. return packet;
  322. }
  323. }