xref: /openbsd-src/lib/libssl/tls12_key_schedule.c (revision 689a9b7ed5fef180f7acf0aa1f578d59f05879ab)
1*689a9b7eSbeck /* $OpenBSD: tls12_key_schedule.c,v 1.4 2024/02/03 15:58:34 beck Exp $ */
2d7351ddfSjsing /*
3d7351ddfSjsing  * Copyright (c) 2021 Joel Sing <jsing@openbsd.org>
4d7351ddfSjsing  *
5d7351ddfSjsing  * Permission to use, copy, modify, and distribute this software for any
6d7351ddfSjsing  * purpose with or without fee is hereby granted, provided that the above
7d7351ddfSjsing  * copyright notice and this permission notice appear in all copies.
8d7351ddfSjsing  *
9d7351ddfSjsing  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10d7351ddfSjsing  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11d7351ddfSjsing  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12d7351ddfSjsing  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13d7351ddfSjsing  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14d7351ddfSjsing  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15d7351ddfSjsing  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16d7351ddfSjsing  */
17d7351ddfSjsing 
18d7351ddfSjsing #include <stdlib.h>
19d7351ddfSjsing 
20d7351ddfSjsing #include <openssl/evp.h>
21d7351ddfSjsing 
22d7351ddfSjsing #include "bytestring.h"
23c9675a23Stb #include "ssl_local.h"
245f1bde45Sjsing #include "tls12_internal.h"
25d7351ddfSjsing 
26d7351ddfSjsing struct tls12_key_block {
27d7351ddfSjsing 	CBS client_write_mac_key;
28d7351ddfSjsing 	CBS server_write_mac_key;
29d7351ddfSjsing 	CBS client_write_key;
30d7351ddfSjsing 	CBS server_write_key;
31d7351ddfSjsing 	CBS client_write_iv;
32d7351ddfSjsing 	CBS server_write_iv;
33d7351ddfSjsing 
34d7351ddfSjsing 	uint8_t *key_block;
35d7351ddfSjsing 	size_t key_block_len;
36d7351ddfSjsing };
37d7351ddfSjsing 
38d7351ddfSjsing struct tls12_key_block *
tls12_key_block_new(void)39d7351ddfSjsing tls12_key_block_new(void)
40d7351ddfSjsing {
41d7351ddfSjsing 	return calloc(1, sizeof(struct tls12_key_block));
42d7351ddfSjsing }
43d7351ddfSjsing 
44d7351ddfSjsing static void
tls12_key_block_clear(struct tls12_key_block * kb)45d7351ddfSjsing tls12_key_block_clear(struct tls12_key_block *kb)
46d7351ddfSjsing {
47d7351ddfSjsing 	CBS_init(&kb->client_write_mac_key, NULL, 0);
48d7351ddfSjsing 	CBS_init(&kb->server_write_mac_key, NULL, 0);
49d7351ddfSjsing 	CBS_init(&kb->client_write_key, NULL, 0);
50d7351ddfSjsing 	CBS_init(&kb->server_write_key, NULL, 0);
51d7351ddfSjsing 	CBS_init(&kb->client_write_iv, NULL, 0);
52d7351ddfSjsing 	CBS_init(&kb->server_write_iv, NULL, 0);
53d7351ddfSjsing 
54d7351ddfSjsing 	freezero(kb->key_block, kb->key_block_len);
55d7351ddfSjsing 	kb->key_block = NULL;
56d7351ddfSjsing 	kb->key_block_len = 0;
57d7351ddfSjsing }
58d7351ddfSjsing 
59d7351ddfSjsing void
tls12_key_block_free(struct tls12_key_block * kb)60d7351ddfSjsing tls12_key_block_free(struct tls12_key_block *kb)
61d7351ddfSjsing {
62d7351ddfSjsing 	if (kb == NULL)
63d7351ddfSjsing 		return;
64d7351ddfSjsing 
65d7351ddfSjsing 	tls12_key_block_clear(kb);
66d7351ddfSjsing 
67d7351ddfSjsing 	freezero(kb, sizeof(struct tls12_key_block));
68d7351ddfSjsing }
69d7351ddfSjsing 
70d7351ddfSjsing void
tls12_key_block_client_write(struct tls12_key_block * kb,CBS * mac_key,CBS * key,CBS * iv)71d7351ddfSjsing tls12_key_block_client_write(struct tls12_key_block *kb, CBS *mac_key,
72d7351ddfSjsing     CBS *key, CBS *iv)
73d7351ddfSjsing {
74d7351ddfSjsing 	CBS_dup(&kb->client_write_mac_key, mac_key);
75d7351ddfSjsing 	CBS_dup(&kb->client_write_key, key);
76d7351ddfSjsing 	CBS_dup(&kb->client_write_iv, iv);
77d7351ddfSjsing }
78d7351ddfSjsing 
79d7351ddfSjsing void
tls12_key_block_server_write(struct tls12_key_block * kb,CBS * mac_key,CBS * key,CBS * iv)80d7351ddfSjsing tls12_key_block_server_write(struct tls12_key_block *kb, CBS *mac_key,
81d7351ddfSjsing     CBS *key, CBS *iv)
82d7351ddfSjsing {
83d7351ddfSjsing 	CBS_dup(&kb->server_write_mac_key, mac_key);
84d7351ddfSjsing 	CBS_dup(&kb->server_write_key, key);
85d7351ddfSjsing 	CBS_dup(&kb->server_write_iv, iv);
86d7351ddfSjsing }
87d7351ddfSjsing 
88d7351ddfSjsing int
tls12_key_block_generate(struct tls12_key_block * kb,SSL * s,const EVP_AEAD * aead,const EVP_CIPHER * cipher,const EVP_MD * mac_hash)89d7351ddfSjsing tls12_key_block_generate(struct tls12_key_block *kb, SSL *s,
90d7351ddfSjsing     const EVP_AEAD *aead, const EVP_CIPHER *cipher, const EVP_MD *mac_hash)
91d7351ddfSjsing {
92d7351ddfSjsing 	size_t mac_key_len = 0, key_len = 0, iv_len = 0;
93d7351ddfSjsing 	uint8_t *key_block = NULL;
94d7351ddfSjsing 	size_t key_block_len = 0;
95d7351ddfSjsing 	CBS cbs;
96d7351ddfSjsing 
97d7351ddfSjsing 	/*
98d7351ddfSjsing 	 * Generate a TLSv1.2 key block and partition into individual secrets,
99d7351ddfSjsing 	 * as per RFC 5246 section 6.3.
100d7351ddfSjsing 	 */
101d7351ddfSjsing 
102d7351ddfSjsing 	tls12_key_block_clear(kb);
103d7351ddfSjsing 
104d7351ddfSjsing 	/* Must have AEAD or cipher/MAC pair. */
105d7351ddfSjsing 	if (aead == NULL && (cipher == NULL || mac_hash == NULL))
106d7351ddfSjsing 		goto err;
107d7351ddfSjsing 
108d7351ddfSjsing 	if (aead != NULL) {
109d7351ddfSjsing 		key_len = EVP_AEAD_key_length(aead);
110d7351ddfSjsing 
111d7351ddfSjsing 		/* AEAD fixed nonce length. */
112d7351ddfSjsing 		if (aead == EVP_aead_aes_128_gcm() ||
113d7351ddfSjsing 		    aead == EVP_aead_aes_256_gcm())
114d7351ddfSjsing 			iv_len = 4;
115d7351ddfSjsing 		else if (aead == EVP_aead_chacha20_poly1305())
116d7351ddfSjsing 			iv_len = 12;
117d7351ddfSjsing 		else
118d7351ddfSjsing 			goto err;
119d7351ddfSjsing 	} else if (cipher != NULL && mac_hash != NULL) {
120d7351ddfSjsing 		/*
121d7351ddfSjsing 		 * A negative integer return value will be detected via the
122d7351ddfSjsing 		 * EVP_MAX_* checks against the size_t variables below.
123d7351ddfSjsing 		 */
124d7351ddfSjsing 		mac_key_len = EVP_MD_size(mac_hash);
125d7351ddfSjsing 		key_len = EVP_CIPHER_key_length(cipher);
126d7351ddfSjsing 		iv_len = EVP_CIPHER_iv_length(cipher);
127d7351ddfSjsing 	}
128d7351ddfSjsing 
129d7351ddfSjsing 	if (mac_key_len > EVP_MAX_MD_SIZE)
130d7351ddfSjsing 		goto err;
131d7351ddfSjsing 	if (key_len > EVP_MAX_KEY_LENGTH)
132d7351ddfSjsing 		goto err;
133d7351ddfSjsing 	if (iv_len > EVP_MAX_IV_LENGTH)
134d7351ddfSjsing 		goto err;
135d7351ddfSjsing 
136d7351ddfSjsing 	key_block_len = 2 * mac_key_len + 2 * key_len + 2 * iv_len;
137d7351ddfSjsing 	if ((key_block = calloc(1, key_block_len)) == NULL)
138d7351ddfSjsing 		goto err;
139d7351ddfSjsing 
140d7351ddfSjsing 	if (!tls1_generate_key_block(s, key_block, key_block_len))
141d7351ddfSjsing 		goto err;
142d7351ddfSjsing 
143d7351ddfSjsing 	kb->key_block = key_block;
144d7351ddfSjsing 	kb->key_block_len = key_block_len;
145d7351ddfSjsing 	key_block = NULL;
146d7351ddfSjsing 	key_block_len = 0;
147d7351ddfSjsing 
148d7351ddfSjsing 	/* Partition key block into individual secrets. */
149d7351ddfSjsing 	CBS_init(&cbs, kb->key_block, kb->key_block_len);
150d7351ddfSjsing 	if (!CBS_get_bytes(&cbs, &kb->client_write_mac_key, mac_key_len))
151d7351ddfSjsing 		goto err;
152d7351ddfSjsing 	if (!CBS_get_bytes(&cbs, &kb->server_write_mac_key, mac_key_len))
153d7351ddfSjsing 		goto err;
154d7351ddfSjsing 	if (!CBS_get_bytes(&cbs, &kb->client_write_key, key_len))
155d7351ddfSjsing 		goto err;
156d7351ddfSjsing 	if (!CBS_get_bytes(&cbs, &kb->server_write_key, key_len))
157d7351ddfSjsing 		goto err;
158d7351ddfSjsing 	if (!CBS_get_bytes(&cbs, &kb->client_write_iv, iv_len))
159d7351ddfSjsing 		goto err;
160d7351ddfSjsing 	if (!CBS_get_bytes(&cbs, &kb->server_write_iv, iv_len))
161d7351ddfSjsing 		goto err;
162d7351ddfSjsing 	if (CBS_len(&cbs) != 0)
163d7351ddfSjsing 		goto err;
164d7351ddfSjsing 
165d7351ddfSjsing 	return 1;
166d7351ddfSjsing 
167d7351ddfSjsing  err:
168d7351ddfSjsing 	tls12_key_block_clear(kb);
169d7351ddfSjsing 	freezero(key_block, key_block_len);
170d7351ddfSjsing 
171d7351ddfSjsing 	return 0;
172d7351ddfSjsing }
1735f1bde45Sjsing 
1745f1bde45Sjsing struct tls12_reserved_label {
1755f1bde45Sjsing 	const char *label;
1765f1bde45Sjsing 	size_t label_len;
1775f1bde45Sjsing };
1785f1bde45Sjsing 
1795f1bde45Sjsing /*
1805f1bde45Sjsing  * RFC 5705 section 6.
1815f1bde45Sjsing  */
1825f1bde45Sjsing static const struct tls12_reserved_label tls12_reserved_labels[] = {
1835f1bde45Sjsing 	{
1845f1bde45Sjsing 		.label = TLS_MD_CLIENT_FINISH_CONST,
1855f1bde45Sjsing 		.label_len = TLS_MD_CLIENT_FINISH_CONST_SIZE,
1865f1bde45Sjsing 	},
1875f1bde45Sjsing 	{
1885f1bde45Sjsing 		.label = TLS_MD_SERVER_FINISH_CONST,
1895f1bde45Sjsing 		.label_len = TLS_MD_SERVER_FINISH_CONST_SIZE,
1905f1bde45Sjsing 	},
1915f1bde45Sjsing 	{
1925f1bde45Sjsing 		.label = TLS_MD_MASTER_SECRET_CONST,
1935f1bde45Sjsing 		.label_len = TLS_MD_MASTER_SECRET_CONST_SIZE,
1945f1bde45Sjsing 	},
1955f1bde45Sjsing 	{
1965f1bde45Sjsing 		.label = TLS_MD_KEY_EXPANSION_CONST,
1975f1bde45Sjsing 		.label_len = TLS_MD_KEY_EXPANSION_CONST_SIZE,
1985f1bde45Sjsing 	},
1995f1bde45Sjsing 	{
2005f1bde45Sjsing 		.label = NULL,
2015f1bde45Sjsing 		.label_len = 0,
2025f1bde45Sjsing 	},
2035f1bde45Sjsing };
2045f1bde45Sjsing 
2055f1bde45Sjsing int
tls12_exporter(SSL * s,const uint8_t * label,size_t label_len,const uint8_t * context_value,size_t context_value_len,int use_context,uint8_t * out,size_t out_len)2065f1bde45Sjsing tls12_exporter(SSL *s, const uint8_t *label, size_t label_len,
2075f1bde45Sjsing     const uint8_t *context_value, size_t context_value_len, int use_context,
2085f1bde45Sjsing     uint8_t *out, size_t out_len)
2095f1bde45Sjsing {
2105f1bde45Sjsing 	uint8_t *data = NULL;
2115f1bde45Sjsing 	size_t data_len = 0;
2125f1bde45Sjsing 	CBB cbb, context;
2135f1bde45Sjsing 	CBS seed;
2145f1bde45Sjsing 	size_t i;
2155f1bde45Sjsing 	int ret = 0;
2165f1bde45Sjsing 
2175f1bde45Sjsing 	/*
2185f1bde45Sjsing 	 * RFC 5705 - Key Material Exporters for TLS.
2195f1bde45Sjsing 	 */
2205f1bde45Sjsing 
2215f1bde45Sjsing 	memset(&cbb, 0, sizeof(cbb));
2225f1bde45Sjsing 
2235f1bde45Sjsing 	if (!SSL_is_init_finished(s)) {
2245f1bde45Sjsing 		SSLerror(s, SSL_R_BAD_STATE);
2255f1bde45Sjsing 		goto err;
2265f1bde45Sjsing 	}
2275f1bde45Sjsing 
2285f1bde45Sjsing 	if (s->s3->hs.negotiated_tls_version >= TLS1_3_VERSION)
2295f1bde45Sjsing 		goto err;
2305f1bde45Sjsing 
2315f1bde45Sjsing 	/*
2325f1bde45Sjsing 	 * Due to exceptional design choices, we need to build a concatenation
2335f1bde45Sjsing 	 * of the label and the seed value, before checking for reserved
2345f1bde45Sjsing 	 * labels. This prevents a reserved label from being split across the
2355f1bde45Sjsing 	 * label and the seed (that includes the client random), which are
2365f1bde45Sjsing 	 * concatenated by the PRF.
2375f1bde45Sjsing 	 */
2385f1bde45Sjsing 	if (!CBB_init(&cbb, 0))
2395f1bde45Sjsing 		goto err;
2405f1bde45Sjsing 	if (!CBB_add_bytes(&cbb, label, label_len))
2415f1bde45Sjsing 		goto err;
2425f1bde45Sjsing 	if (!CBB_add_bytes(&cbb, s->s3->client_random, SSL3_RANDOM_SIZE))
2435f1bde45Sjsing 		goto err;
2445f1bde45Sjsing 	if (!CBB_add_bytes(&cbb, s->s3->server_random, SSL3_RANDOM_SIZE))
2455f1bde45Sjsing 		goto err;
2465f1bde45Sjsing 	if (use_context) {
2475f1bde45Sjsing 		if (!CBB_add_u16_length_prefixed(&cbb, &context))
2485f1bde45Sjsing 			goto err;
2495f1bde45Sjsing 		if (context_value_len > 0) {
2505f1bde45Sjsing 			if (!CBB_add_bytes(&context, context_value,
2515f1bde45Sjsing 			    context_value_len))
2525f1bde45Sjsing 				goto err;
2535f1bde45Sjsing 		}
2545f1bde45Sjsing 	}
2555f1bde45Sjsing 	if (!CBB_finish(&cbb, &data, &data_len))
2565f1bde45Sjsing 		goto err;
2575f1bde45Sjsing 
2585f1bde45Sjsing 	/*
2595f1bde45Sjsing 	 * Ensure that the block (label + seed) does not start with a reserved
2605f1bde45Sjsing 	 * label - in an ideal world we would ensure that the label has an
2615f1bde45Sjsing 	 * explicitly permitted prefix instead, but of course this also got
2625f1bde45Sjsing 	 * messed up by the standards.
2635f1bde45Sjsing 	 */
2645f1bde45Sjsing 	for (i = 0; tls12_reserved_labels[i].label != NULL; i++) {
2655f1bde45Sjsing 		/* XXX - consider adding/using CBS_has_prefix(). */
2665f1bde45Sjsing 		if (tls12_reserved_labels[i].label_len > data_len)
2675f1bde45Sjsing 			goto err;
2685f1bde45Sjsing 		if (memcmp(data, tls12_reserved_labels[i].label,
2695f1bde45Sjsing 		    tls12_reserved_labels[i].label_len) == 0) {
2705f1bde45Sjsing 			SSLerror(s, SSL_R_TLS_ILLEGAL_EXPORTER_LABEL);
2715f1bde45Sjsing 			goto err;
2725f1bde45Sjsing 		}
2735f1bde45Sjsing 	}
2745f1bde45Sjsing 
2755f1bde45Sjsing 	CBS_init(&seed, data, data_len);
2765f1bde45Sjsing 	if (!CBS_skip(&seed, label_len))
2775f1bde45Sjsing 		goto err;
2785f1bde45Sjsing 
2795f1bde45Sjsing 	if (!tls1_PRF(s, s->session->master_key, s->session->master_key_length,
2805f1bde45Sjsing 	    label, label_len, CBS_data(&seed), CBS_len(&seed), NULL, 0, NULL, 0,
2815f1bde45Sjsing 	    NULL, 0, out, out_len))
2825f1bde45Sjsing 		goto err;
2835f1bde45Sjsing 
2845f1bde45Sjsing 	ret = 1;
2855f1bde45Sjsing 
2865f1bde45Sjsing  err:
2875f1bde45Sjsing 	freezero(data, data_len);
2885f1bde45Sjsing 	CBB_cleanup(&cbb);
2895f1bde45Sjsing 
2905f1bde45Sjsing 	return ret;
2915f1bde45Sjsing }
292