2019-01-21 11:40:11 +01:00
|
|
|
/* $OpenBSD: kexc25519.c,v 1.17 2019/01/21 10:40:11 djm Exp $ */
|
2013-11-04 12:59:27 +01:00
|
|
|
/*
|
2019-01-21 11:24:09 +01:00
|
|
|
* Copyright (c) 2019 Markus Friedl. All rights reserved.
|
2013-11-04 12:59:27 +01:00
|
|
|
* Copyright (c) 2010 Damien Miller. All rights reserved.
|
|
|
|
* Copyright (c) 2013 Aris Adamantiadis. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "includes.h"
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
2019-01-21 11:24:09 +01:00
|
|
|
#include <stdio.h>
|
2013-11-04 12:59:27 +01:00
|
|
|
#include <string.h>
|
2019-01-21 11:24:09 +01:00
|
|
|
#include <signal.h>
|
2013-11-04 12:59:27 +01:00
|
|
|
|
2015-01-19 21:16:15 +01:00
|
|
|
#include "sshkey.h"
|
2013-11-04 12:59:27 +01:00
|
|
|
#include "kex.h"
|
2019-01-21 11:24:09 +01:00
|
|
|
#include "sshbuf.h"
|
2014-01-10 00:58:53 +01:00
|
|
|
#include "digest.h"
|
2015-01-19 21:16:15 +01:00
|
|
|
#include "ssherr.h"
|
2019-01-21 11:24:09 +01:00
|
|
|
#include "ssh2.h"
|
2013-11-04 12:59:27 +01:00
|
|
|
|
|
|
|
extern int crypto_scalarmult_curve25519(u_char a[CURVE25519_SIZE],
|
|
|
|
const u_char b[CURVE25519_SIZE], const u_char c[CURVE25519_SIZE])
|
2014-05-15 06:37:03 +02:00
|
|
|
__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE)))
|
|
|
|
__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE)))
|
|
|
|
__attribute__((__bounded__(__minbytes__, 3, CURVE25519_SIZE)));
|
2013-11-04 12:59:27 +01:00
|
|
|
|
|
|
|
void
|
|
|
|
kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE])
|
|
|
|
{
|
|
|
|
static const u_char basepoint[CURVE25519_SIZE] = {9};
|
|
|
|
|
|
|
|
arc4random_buf(key, CURVE25519_SIZE);
|
|
|
|
crypto_scalarmult_curve25519(pub, key, basepoint);
|
|
|
|
}
|
|
|
|
|
2015-01-19 21:16:15 +01:00
|
|
|
int
|
2019-01-21 11:20:12 +01:00
|
|
|
kexc25519_shared_key_ext(const u_char key[CURVE25519_SIZE],
|
|
|
|
const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int raw)
|
2013-11-04 12:59:27 +01:00
|
|
|
{
|
|
|
|
u_char shared_key[CURVE25519_SIZE];
|
2019-01-21 10:49:37 +01:00
|
|
|
u_char zero[CURVE25519_SIZE];
|
2015-01-19 21:16:15 +01:00
|
|
|
int r;
|
2013-11-04 12:59:27 +01:00
|
|
|
|
2019-01-21 10:49:37 +01:00
|
|
|
crypto_scalarmult_curve25519(shared_key, key, pub);
|
|
|
|
|
|
|
|
/* Check for all-zero shared secret */
|
|
|
|
explicit_bzero(zero, CURVE25519_SIZE);
|
|
|
|
if (timingsafe_bcmp(zero, shared_key, CURVE25519_SIZE) == 0)
|
2015-03-26 08:00:04 +01:00
|
|
|
return SSH_ERR_KEY_INVALID_EC_VALUE;
|
|
|
|
|
2013-11-04 12:59:27 +01:00
|
|
|
#ifdef DEBUG_KEXECDH
|
|
|
|
dump_digest("shared secret", shared_key, CURVE25519_SIZE);
|
|
|
|
#endif
|
2019-01-21 11:20:12 +01:00
|
|
|
if (raw)
|
|
|
|
r = sshbuf_put(out, shared_key, CURVE25519_SIZE);
|
|
|
|
else
|
|
|
|
r = sshbuf_put_bignum2_bytes(out, shared_key, CURVE25519_SIZE);
|
2014-02-04 01:18:20 +01:00
|
|
|
explicit_bzero(shared_key, CURVE25519_SIZE);
|
2015-01-19 21:16:15 +01:00
|
|
|
return r;
|
2013-11-04 12:59:27 +01:00
|
|
|
}
|
|
|
|
|
2019-01-21 11:20:12 +01:00
|
|
|
int
|
|
|
|
kexc25519_shared_key(const u_char key[CURVE25519_SIZE],
|
|
|
|
const u_char pub[CURVE25519_SIZE], struct sshbuf *out)
|
|
|
|
{
|
|
|
|
return kexc25519_shared_key_ext(key, pub, out, 0);
|
|
|
|
}
|
|
|
|
|
2019-01-21 11:24:09 +01:00
|
|
|
int
|
|
|
|
kex_c25519_keypair(struct kex *kex)
|
|
|
|
{
|
|
|
|
struct sshbuf *buf = NULL;
|
|
|
|
u_char *cp = NULL;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if ((buf = sshbuf_new()) == NULL)
|
|
|
|
return SSH_ERR_ALLOC_FAIL;
|
|
|
|
if ((r = sshbuf_reserve(buf, CURVE25519_SIZE, &cp)) != 0)
|
|
|
|
goto out;
|
|
|
|
kexc25519_keygen(kex->c25519_client_key, cp);
|
|
|
|
#ifdef DEBUG_KEXECDH
|
|
|
|
dump_digest("client public key c25519:", cp, CURVE25519_SIZE);
|
|
|
|
#endif
|
2019-01-21 11:40:11 +01:00
|
|
|
kex->client_pub = buf;
|
2019-01-21 11:24:09 +01:00
|
|
|
buf = NULL;
|
|
|
|
out:
|
|
|
|
sshbuf_free(buf);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-21 11:35:09 +01:00
|
|
|
kex_c25519_enc(struct kex *kex, const struct sshbuf *client_blob,
|
|
|
|
struct sshbuf **server_blobp, struct sshbuf **shared_secretp)
|
2019-01-21 11:24:09 +01:00
|
|
|
{
|
|
|
|
struct sshbuf *server_blob = NULL;
|
|
|
|
struct sshbuf *buf = NULL;
|
2019-01-21 11:35:09 +01:00
|
|
|
const u_char *client_pub;
|
2019-01-21 11:24:09 +01:00
|
|
|
u_char *server_pub;
|
|
|
|
u_char server_key[CURVE25519_SIZE];
|
|
|
|
int r;
|
|
|
|
|
|
|
|
*server_blobp = NULL;
|
|
|
|
*shared_secretp = NULL;
|
|
|
|
|
2019-01-21 11:35:09 +01:00
|
|
|
if (sshbuf_len(client_blob) != CURVE25519_SIZE) {
|
2019-01-21 11:24:09 +01:00
|
|
|
r = SSH_ERR_SIGNATURE_INVALID;
|
|
|
|
goto out;
|
|
|
|
}
|
2019-01-21 11:35:09 +01:00
|
|
|
client_pub = sshbuf_ptr(client_blob);
|
2022-11-30 17:57:01 +01:00
|
|
|
if (client_pub == NULL) { // fix CodeQL SM02313
|
|
|
|
r = SSH_ERR_ALLOC_FAIL;
|
|
|
|
goto out;
|
|
|
|
}
|
2019-01-21 11:24:09 +01:00
|
|
|
#ifdef DEBUG_KEXECDH
|
2019-01-21 11:35:09 +01:00
|
|
|
dump_digest("client public key 25519:", client_pub, CURVE25519_SIZE);
|
2019-01-21 11:24:09 +01:00
|
|
|
#endif
|
|
|
|
/* allocate space for encrypted KEM key and ECDH pub key */
|
|
|
|
if ((server_blob = sshbuf_new()) == NULL) {
|
|
|
|
r = SSH_ERR_ALLOC_FAIL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if ((r = sshbuf_reserve(server_blob, CURVE25519_SIZE, &server_pub)) != 0)
|
|
|
|
goto out;
|
|
|
|
kexc25519_keygen(server_key, server_pub);
|
|
|
|
/* allocate shared secret */
|
|
|
|
if ((buf = sshbuf_new()) == NULL) {
|
|
|
|
r = SSH_ERR_ALLOC_FAIL;
|
|
|
|
goto out;
|
|
|
|
}
|
2019-01-21 11:35:09 +01:00
|
|
|
if ((r = kexc25519_shared_key_ext(server_key, client_pub, buf, 0)) < 0)
|
2019-01-21 11:24:09 +01:00
|
|
|
goto out;
|
|
|
|
#ifdef DEBUG_KEXECDH
|
|
|
|
dump_digest("server public key 25519:", server_pub, CURVE25519_SIZE);
|
|
|
|
dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf));
|
|
|
|
#endif
|
|
|
|
*server_blobp = server_blob;
|
|
|
|
*shared_secretp = buf;
|
|
|
|
server_blob = NULL;
|
|
|
|
buf = NULL;
|
|
|
|
out:
|
|
|
|
explicit_bzero(server_key, sizeof(server_key));
|
|
|
|
sshbuf_free(server_blob);
|
|
|
|
sshbuf_free(buf);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-21 11:35:09 +01:00
|
|
|
kex_c25519_dec(struct kex *kex, const struct sshbuf *server_blob,
|
|
|
|
struct sshbuf **shared_secretp)
|
2019-01-21 11:24:09 +01:00
|
|
|
{
|
|
|
|
struct sshbuf *buf = NULL;
|
2019-01-21 11:35:09 +01:00
|
|
|
const u_char *server_pub;
|
2019-01-21 11:24:09 +01:00
|
|
|
int r;
|
|
|
|
|
|
|
|
*shared_secretp = NULL;
|
|
|
|
|
2019-01-21 11:35:09 +01:00
|
|
|
if (sshbuf_len(server_blob) != CURVE25519_SIZE) {
|
2019-01-21 11:24:09 +01:00
|
|
|
r = SSH_ERR_SIGNATURE_INVALID;
|
|
|
|
goto out;
|
|
|
|
}
|
2019-01-21 11:35:09 +01:00
|
|
|
server_pub = sshbuf_ptr(server_blob);
|
2019-01-21 11:24:09 +01:00
|
|
|
#ifdef DEBUG_KEXECDH
|
2019-01-21 11:35:09 +01:00
|
|
|
dump_digest("server public key c25519:", server_pub, CURVE25519_SIZE);
|
2019-01-21 11:24:09 +01:00
|
|
|
#endif
|
|
|
|
/* shared secret */
|
|
|
|
if ((buf = sshbuf_new()) == NULL) {
|
|
|
|
r = SSH_ERR_ALLOC_FAIL;
|
|
|
|
goto out;
|
|
|
|
}
|
2022-11-30 17:57:01 +01:00
|
|
|
if ((r = kexc25519_shared_key_ext(kex->c25519_client_key, server_pub, // CodeQL [SM02311]: false positive server_pub will not be null
|
2019-01-21 11:24:09 +01:00
|
|
|
buf, 0)) < 0)
|
|
|
|
goto out;
|
|
|
|
#ifdef DEBUG_KEXECDH
|
|
|
|
dump_digest("encoded shared secret:", sshbuf_ptr(buf), sshbuf_len(buf));
|
|
|
|
#endif
|
|
|
|
*shared_secretp = buf;
|
|
|
|
buf = NULL;
|
|
|
|
out:
|
|
|
|
sshbuf_free(buf);
|
|
|
|
return r;
|
|
|
|
}
|