s2n_server_key_share.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449
  1. /*
  2. * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License").
  5. * You may not use this file except in compliance with the License.
  6. * A copy of the License is located at
  7. *
  8. * http://aws.amazon.com/apache2.0
  9. *
  10. * or in the "license" file accompanying this file. This file is distributed
  11. * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
  12. * express or implied. See the License for the specific language governing
  13. * permissions and limitations under the License.
  14. */
  15. #include "tls/extensions/s2n_server_key_share.h"
  16. #include "pq-crypto/s2n_pq.h"
  17. #include "tls/s2n_security_policies.h"
  18. #include "tls/s2n_tls.h"
  19. #include "tls/s2n_tls13.h"
  20. #include "utils/s2n_safety.h"
  21. static int s2n_server_key_share_send(struct s2n_connection *conn, struct s2n_stuffer *out);
  22. static int s2n_server_key_share_recv(struct s2n_connection *conn, struct s2n_stuffer *extension);
  23. const s2n_extension_type s2n_server_key_share_extension = {
  24. .iana_value = TLS_EXTENSION_KEY_SHARE,
  25. .minimum_version = S2N_TLS13,
  26. .is_response = true,
  27. .send = s2n_server_key_share_send,
  28. .recv = s2n_server_key_share_recv,
  29. .should_send = s2n_extension_always_send,
  30. .if_missing = s2n_extension_noop_if_missing,
  31. };
  32. static int s2n_server_key_share_generate_pq_hybrid(struct s2n_connection *conn, struct s2n_stuffer *out)
  33. {
  34. POSIX_ENSURE_REF(out);
  35. POSIX_ENSURE_REF(conn);
  36. POSIX_ENSURE(s2n_pq_is_enabled(), S2N_ERR_PQ_DISABLED);
  37. struct s2n_kem_group_params *server_kem_group_params = &conn->kex_params.server_kem_group_params;
  38. struct s2n_kem_params *client_kem_params = &conn->kex_params.client_kem_group_params.kem_params;
  39. POSIX_ENSURE_REF(server_kem_group_params->kem_group);
  40. POSIX_GUARD(s2n_stuffer_write_uint16(out, server_kem_group_params->kem_group->iana_id));
  41. struct s2n_stuffer_reservation total_share_size = { 0 };
  42. POSIX_GUARD(s2n_stuffer_reserve_uint16(out, &total_share_size));
  43. struct s2n_ecc_evp_params *server_ecc_params = &server_kem_group_params->ecc_params;
  44. POSIX_ENSURE_REF(server_ecc_params->negotiated_curve);
  45. if (client_kem_params->len_prefixed) {
  46. POSIX_GUARD(s2n_stuffer_write_uint16(out, server_ecc_params->negotiated_curve->share_size));
  47. }
  48. POSIX_GUARD(s2n_ecc_evp_generate_ephemeral_key(server_ecc_params));
  49. POSIX_GUARD(s2n_ecc_evp_write_params_point(server_ecc_params, out));
  50. POSIX_ENSURE_REF(client_kem_params->public_key.data);
  51. /* s2n_kem_send_ciphertext() will generate the PQ shared secret and use
  52. * the client's public key to encapsulate; the PQ shared secret will be
  53. * stored in client_kem_params, and will be used during the hybrid shared
  54. * secret derivation. */
  55. POSIX_GUARD(s2n_kem_send_ciphertext(out, client_kem_params));
  56. POSIX_GUARD(s2n_stuffer_write_vector_size(&total_share_size));
  57. return S2N_SUCCESS;
  58. }
  59. /* Check that client has sent a corresponding key share for the server's KEM group */
  60. int s2n_server_key_share_send_check_pq_hybrid(struct s2n_connection *conn)
  61. {
  62. POSIX_ENSURE_REF(conn);
  63. POSIX_ENSURE(s2n_pq_is_enabled(), S2N_ERR_PQ_DISABLED);
  64. POSIX_ENSURE_REF(conn->kex_params.server_kem_group_params.kem_group);
  65. POSIX_ENSURE_REF(conn->kex_params.server_kem_group_params.kem_params.kem);
  66. POSIX_ENSURE_REF(conn->kex_params.server_kem_group_params.ecc_params.negotiated_curve);
  67. const struct s2n_kem_group *server_kem_group = conn->kex_params.server_kem_group_params.kem_group;
  68. const struct s2n_kem_preferences *kem_pref = NULL;
  69. POSIX_GUARD(s2n_connection_get_kem_preferences(conn, &kem_pref));
  70. POSIX_ENSURE_REF(kem_pref);
  71. POSIX_ENSURE(s2n_kem_preferences_includes_tls13_kem_group(kem_pref, server_kem_group->iana_id),
  72. S2N_ERR_KEM_UNSUPPORTED_PARAMS);
  73. struct s2n_kem_group_params *client_params = &conn->kex_params.client_kem_group_params;
  74. POSIX_ENSURE(client_params->kem_group == server_kem_group, S2N_ERR_BAD_KEY_SHARE);
  75. POSIX_ENSURE(client_params->ecc_params.negotiated_curve == server_kem_group->curve, S2N_ERR_BAD_KEY_SHARE);
  76. POSIX_ENSURE(client_params->ecc_params.evp_pkey != NULL, S2N_ERR_BAD_KEY_SHARE);
  77. POSIX_ENSURE(client_params->kem_params.kem == server_kem_group->kem, S2N_ERR_BAD_KEY_SHARE);
  78. POSIX_ENSURE(client_params->kem_params.public_key.size == server_kem_group->kem->public_key_length, S2N_ERR_BAD_KEY_SHARE);
  79. POSIX_ENSURE(client_params->kem_params.public_key.data != NULL, S2N_ERR_BAD_KEY_SHARE);
  80. return S2N_SUCCESS;
  81. }
  82. /* Check that client has sent a corresponding key share for the server's EC curve */
  83. int s2n_server_key_share_send_check_ecdhe(struct s2n_connection *conn)
  84. {
  85. POSIX_ENSURE_REF(conn);
  86. const struct s2n_ecc_preferences *ecc_pref = NULL;
  87. POSIX_GUARD(s2n_connection_get_ecc_preferences(conn, &ecc_pref));
  88. POSIX_ENSURE_REF(ecc_pref);
  89. const struct s2n_ecc_named_curve *server_curve = conn->kex_params.server_ecc_evp_params.negotiated_curve;
  90. POSIX_ENSURE_REF(server_curve);
  91. struct s2n_ecc_evp_params *client_params = &conn->kex_params.client_ecc_evp_params;
  92. POSIX_ENSURE(client_params->negotiated_curve == server_curve, S2N_ERR_BAD_KEY_SHARE);
  93. POSIX_ENSURE(client_params->evp_pkey != NULL, S2N_ERR_BAD_KEY_SHARE);
  94. return S2N_SUCCESS;
  95. }
  96. static int s2n_server_key_share_send(struct s2n_connection *conn, struct s2n_stuffer *out)
  97. {
  98. POSIX_ENSURE_REF(conn);
  99. POSIX_ENSURE_REF(out);
  100. const struct s2n_ecc_named_curve *curve = conn->kex_params.server_ecc_evp_params.negotiated_curve;
  101. const struct s2n_kem_group *kem_group = conn->kex_params.server_kem_group_params.kem_group;
  102. /* Boolean XOR: exactly one of {server_curve, server_kem_group} should be non-null. */
  103. POSIX_ENSURE((curve == NULL) != (kem_group == NULL), S2N_ERR_ECDHE_UNSUPPORTED_CURVE);
  104. /* Retry requests only require the selected named group, not an actual share.
  105. * https://tools.ietf.org/html/rfc8446#section-4.2.8 */
  106. if (s2n_is_hello_retry_message(conn)) {
  107. uint16_t named_group_id;
  108. if (curve != NULL) {
  109. named_group_id = curve->iana_id;
  110. } else {
  111. named_group_id = kem_group->iana_id;
  112. }
  113. POSIX_GUARD(s2n_stuffer_write_uint16(out, named_group_id));
  114. return S2N_SUCCESS;
  115. }
  116. if (curve != NULL) {
  117. POSIX_GUARD(s2n_server_key_share_send_check_ecdhe(conn));
  118. POSIX_GUARD(s2n_ecdhe_parameters_send(&conn->kex_params.server_ecc_evp_params, out));
  119. } else {
  120. POSIX_GUARD(s2n_server_key_share_send_check_pq_hybrid(conn));
  121. POSIX_GUARD(s2n_server_key_share_generate_pq_hybrid(conn, out));
  122. }
  123. return S2N_SUCCESS;
  124. }
  125. static int s2n_server_key_share_recv_pq_hybrid(struct s2n_connection *conn, uint16_t named_group_iana,
  126. struct s2n_stuffer *extension)
  127. {
  128. POSIX_ENSURE_REF(conn);
  129. POSIX_ENSURE_REF(extension);
  130. /* If PQ is disabled, the client should not have sent any PQ IDs
  131. * in the supported_groups list of the initial ClientHello */
  132. POSIX_ENSURE(s2n_pq_is_enabled(), S2N_ERR_PQ_DISABLED);
  133. const struct s2n_kem_preferences *kem_pref = NULL;
  134. POSIX_GUARD(s2n_connection_get_kem_preferences(conn, &kem_pref));
  135. POSIX_ENSURE_REF(kem_pref);
  136. /* This check should have been done higher up, but including it here as well for extra defense.
  137. * Uses S2N_ERR_ECDHE_UNSUPPORTED_CURVE for backward compatibility. */
  138. POSIX_ENSURE(s2n_kem_preferences_includes_tls13_kem_group(kem_pref, named_group_iana), S2N_ERR_ECDHE_UNSUPPORTED_CURVE);
  139. size_t kem_group_index = 0;
  140. for (size_t i = 0; i < kem_pref->tls13_kem_group_count; i++) {
  141. if (named_group_iana == kem_pref->tls13_kem_groups[i]->iana_id) {
  142. kem_group_index = i;
  143. break;
  144. }
  145. }
  146. struct s2n_kem_group_params *server_kem_group_params = &conn->kex_params.server_kem_group_params;
  147. server_kem_group_params->kem_group = kem_pref->tls13_kem_groups[kem_group_index];
  148. server_kem_group_params->kem_params.kem = kem_pref->tls13_kem_groups[kem_group_index]->kem;
  149. server_kem_group_params->ecc_params.negotiated_curve = kem_pref->tls13_kem_groups[kem_group_index]->curve;
  150. /* If this a HRR, the server will only have sent the named group ID. We assign the
  151. * appropriate KEM group params above, then exit early so that the client can
  152. * generate the correct key share. */
  153. if (s2n_is_hello_retry_message(conn)) {
  154. return S2N_SUCCESS;
  155. }
  156. /* Ensure that the server's key share corresponds with a key share previously sent by the client */
  157. struct s2n_kem_group_params *client_kem_group_params = &conn->kex_params.client_kem_group_params;
  158. POSIX_ENSURE(client_kem_group_params->kem_params.private_key.data, S2N_ERR_BAD_KEY_SHARE);
  159. POSIX_ENSURE(client_kem_group_params->ecc_params.evp_pkey, S2N_ERR_BAD_KEY_SHARE);
  160. POSIX_ENSURE(client_kem_group_params->kem_group == server_kem_group_params->kem_group, S2N_ERR_BAD_KEY_SHARE);
  161. uint16_t actual_hybrid_share_size = 0;
  162. POSIX_GUARD(s2n_stuffer_read_uint16(extension, &actual_hybrid_share_size));
  163. POSIX_ENSURE(s2n_stuffer_data_available(extension) == actual_hybrid_share_size, S2N_ERR_BAD_KEY_SHARE);
  164. struct s2n_kem_params *client_kem_params = &conn->kex_params.client_kem_group_params.kem_params;
  165. /* Don't need to call s2n_is_tls13_hybrid_kem_length_prefixed() to set client_kem_params->len_prefixed since we are
  166. * the client, and server-side should auto-detect hybrid share size and match our behavior. */
  167. /* Parse ECC key share */
  168. uint16_t expected_ecc_share_size = server_kem_group_params->kem_group->curve->share_size;
  169. if (client_kem_params->len_prefixed) {
  170. uint16_t actual_ecc_share_size = 0;
  171. POSIX_GUARD(s2n_stuffer_read_uint16(extension, &actual_ecc_share_size));
  172. POSIX_ENSURE(actual_ecc_share_size == expected_ecc_share_size, S2N_ERR_BAD_KEY_SHARE);
  173. }
  174. struct s2n_blob point_blob = { 0 };
  175. POSIX_ENSURE(s2n_ecc_evp_read_params_point(extension, expected_ecc_share_size, &point_blob) == S2N_SUCCESS, S2N_ERR_BAD_KEY_SHARE);
  176. POSIX_ENSURE(s2n_ecc_evp_parse_params_point(&point_blob, &server_kem_group_params->ecc_params) == S2N_SUCCESS, S2N_ERR_BAD_KEY_SHARE);
  177. POSIX_ENSURE(server_kem_group_params->ecc_params.evp_pkey != NULL, S2N_ERR_BAD_KEY_SHARE);
  178. /* Parse the PQ KEM key share */
  179. POSIX_ENSURE(s2n_kem_recv_ciphertext(extension, client_kem_params) == S2N_SUCCESS,
  180. S2N_ERR_BAD_KEY_SHARE);
  181. return S2N_SUCCESS;
  182. }
  183. static int s2n_server_key_share_recv_ecc(struct s2n_connection *conn, uint16_t named_group_iana,
  184. struct s2n_stuffer *extension)
  185. {
  186. POSIX_ENSURE_REF(conn);
  187. POSIX_ENSURE_REF(extension);
  188. const struct s2n_ecc_preferences *ecc_pref = NULL;
  189. POSIX_GUARD(s2n_connection_get_ecc_preferences(conn, &ecc_pref));
  190. POSIX_ENSURE_REF(ecc_pref);
  191. /* This check should have been done higher up, but including it here as well for extra defense. */
  192. POSIX_ENSURE(s2n_ecc_preferences_includes_curve(ecc_pref, named_group_iana),
  193. S2N_ERR_ECDHE_UNSUPPORTED_CURVE);
  194. size_t supported_curve_index = 0;
  195. for (size_t i = 0; i < ecc_pref->count; i++) {
  196. if (named_group_iana == ecc_pref->ecc_curves[i]->iana_id) {
  197. supported_curve_index = i;
  198. break;
  199. }
  200. }
  201. struct s2n_ecc_evp_params *server_ecc_evp_params = &conn->kex_params.server_ecc_evp_params;
  202. const struct s2n_ecc_named_curve *negotiated_curve = ecc_pref->ecc_curves[supported_curve_index];
  203. /**
  204. *= https://tools.ietf.org/rfc/rfc8446#4.2.8
  205. *# If using (EC)DHE key establishment and a HelloRetryRequest containing a
  206. *# "key_share" extension was received by the client, the client MUST
  207. *# verify that the selected NamedGroup in the ServerHello is the same as
  208. *# that in the HelloRetryRequest. If this check fails, the client MUST
  209. *# abort the handshake with an "illegal_parameter" alert.
  210. **/
  211. if (s2n_is_hello_retry_handshake(conn) && !s2n_is_hello_retry_message(conn)) {
  212. POSIX_ENSURE_REF(server_ecc_evp_params->negotiated_curve);
  213. const struct s2n_ecc_named_curve *previous_negotiated_curve = server_ecc_evp_params->negotiated_curve;
  214. POSIX_ENSURE(negotiated_curve == previous_negotiated_curve,
  215. S2N_ERR_BAD_MESSAGE);
  216. }
  217. server_ecc_evp_params->negotiated_curve = negotiated_curve;
  218. /* Now that ECC has been negotiated, null out this connection's preferred Hybrid KEMs. They will not be used any
  219. * more during this TLS connection, but can still be printed by s2nc's client debugging output. */
  220. conn->kex_params.client_kem_group_params.kem_group = NULL;
  221. conn->kex_params.server_kem_group_params.ecc_params.negotiated_curve = NULL;
  222. conn->kex_params.client_kem_group_params.kem_params.kem = NULL;
  223. /* If this is a HelloRetryRequest, we won't have a key share. We just have the selected group.
  224. * Set the server negotiated curve and exit early so a proper keyshare can be generated. */
  225. if (s2n_is_hello_retry_message(conn)) {
  226. return S2N_SUCCESS;
  227. }
  228. /* Verify key share sent by client */
  229. struct s2n_ecc_evp_params *client_ecc_evp_params = &conn->kex_params.client_ecc_evp_params;
  230. POSIX_ENSURE(client_ecc_evp_params->negotiated_curve == server_ecc_evp_params->negotiated_curve, S2N_ERR_BAD_KEY_SHARE);
  231. POSIX_ENSURE(client_ecc_evp_params->evp_pkey, S2N_ERR_BAD_KEY_SHARE);
  232. uint16_t share_size;
  233. S2N_ERROR_IF(s2n_stuffer_data_available(extension) < sizeof(share_size), S2N_ERR_BAD_KEY_SHARE);
  234. POSIX_GUARD(s2n_stuffer_read_uint16(extension, &share_size));
  235. S2N_ERROR_IF(s2n_stuffer_data_available(extension) < share_size, S2N_ERR_BAD_KEY_SHARE);
  236. /* Proceed to parse share */
  237. struct s2n_blob point_blob = { 0 };
  238. S2N_ERROR_IF(s2n_ecc_evp_read_params_point(extension, share_size, &point_blob) < 0, S2N_ERR_BAD_KEY_SHARE);
  239. S2N_ERROR_IF(s2n_ecc_evp_parse_params_point(&point_blob, server_ecc_evp_params) < 0, S2N_ERR_BAD_KEY_SHARE);
  240. S2N_ERROR_IF(server_ecc_evp_params->evp_pkey == NULL, S2N_ERR_BAD_KEY_SHARE);
  241. return S2N_SUCCESS;
  242. }
  243. /*
  244. * From https://tools.ietf.org/html/rfc8446#section-4.2.8
  245. *
  246. * If using (EC)DHE key establishment, servers offer exactly one
  247. * KeyShareEntry in the ServerHello. This value MUST be in the same
  248. * group as the KeyShareEntry value offered by the client that the
  249. * server has selected for the negotiated key exchange.
  250. */
  251. static int s2n_server_key_share_recv(struct s2n_connection *conn, struct s2n_stuffer *extension)
  252. {
  253. POSIX_ENSURE_REF(conn);
  254. POSIX_ENSURE_REF(extension);
  255. uint16_t negotiated_named_group_iana = 0;
  256. S2N_ERROR_IF(s2n_stuffer_data_available(extension) < sizeof(negotiated_named_group_iana), S2N_ERR_BAD_KEY_SHARE);
  257. POSIX_GUARD(s2n_stuffer_read_uint16(extension, &negotiated_named_group_iana));
  258. const struct s2n_kem_preferences *kem_pref = NULL;
  259. POSIX_GUARD(s2n_connection_get_kem_preferences(conn, &kem_pref));
  260. POSIX_ENSURE_REF(kem_pref);
  261. const struct s2n_ecc_preferences *ecc_pref = NULL;
  262. POSIX_GUARD(s2n_connection_get_ecc_preferences(conn, &ecc_pref));
  263. POSIX_ENSURE_REF(ecc_pref);
  264. if (s2n_ecc_preferences_includes_curve(ecc_pref, negotiated_named_group_iana)) {
  265. POSIX_GUARD(s2n_server_key_share_recv_ecc(conn, negotiated_named_group_iana, extension));
  266. } else if (s2n_kem_preferences_includes_tls13_kem_group(kem_pref, negotiated_named_group_iana)) {
  267. POSIX_GUARD(s2n_server_key_share_recv_pq_hybrid(conn, negotiated_named_group_iana, extension));
  268. } else {
  269. POSIX_BAIL(S2N_ERR_ECDHE_UNSUPPORTED_CURVE);
  270. }
  271. return S2N_SUCCESS;
  272. }
  273. /* Selects highest priority mutually supported key share, or indicates need for HRR */
  274. int s2n_extensions_server_key_share_select(struct s2n_connection *conn)
  275. {
  276. POSIX_ENSURE_REF(conn);
  277. const struct s2n_ecc_preferences *ecc_pref = NULL;
  278. POSIX_GUARD(s2n_connection_get_ecc_preferences(conn, &ecc_pref));
  279. POSIX_ENSURE_REF(ecc_pref);
  280. const struct s2n_kem_preferences *kem_pref = NULL;
  281. POSIX_GUARD(s2n_connection_get_kem_preferences(conn, &kem_pref));
  282. POSIX_ENSURE_REF(kem_pref);
  283. /* Boolean XOR check. When receiving the supported_groups extension, s2n server
  284. * should (exclusively) set either server_curve or server_kem_group based on the
  285. * set of mutually supported groups. If both server_curve and server_kem_group
  286. * are NULL, it is because client and server do not share any mutually supported
  287. * groups; key negotiation is not possible and the handshake should be aborted
  288. * without sending HRR. (The case of both being non-NULL should never occur, and
  289. * is an error.) */
  290. const struct s2n_ecc_named_curve *server_curve = conn->kex_params.server_ecc_evp_params.negotiated_curve;
  291. const struct s2n_kem_group *server_kem_group = conn->kex_params.server_kem_group_params.kem_group;
  292. POSIX_ENSURE((server_curve == NULL) != (server_kem_group == NULL), S2N_ERR_ECDHE_UNSUPPORTED_CURVE);
  293. /* To avoid extra round trips, we prefer to negotiate a group for which we have already
  294. * received a key share (even if it is different than the group previously chosen). In
  295. * general, we prefer to negotiate PQ over ECDHE; however, if both client and server
  296. * support PQ, but the client sent only EC key shares, then we will negotiate ECHDE. */
  297. if (conn->kex_params.client_kem_group_params.kem_group) {
  298. POSIX_ENSURE_REF(conn->kex_params.client_kem_group_params.ecc_params.negotiated_curve);
  299. POSIX_ENSURE_REF(conn->kex_params.client_kem_group_params.kem_params.kem);
  300. conn->kex_params.server_kem_group_params.kem_group = conn->kex_params.client_kem_group_params.kem_group;
  301. conn->kex_params.server_kem_group_params.ecc_params.negotiated_curve = conn->kex_params.client_kem_group_params.ecc_params.negotiated_curve;
  302. conn->kex_params.server_kem_group_params.kem_params.kem = conn->kex_params.client_kem_group_params.kem_params.kem;
  303. conn->kex_params.server_ecc_evp_params.negotiated_curve = NULL;
  304. return S2N_SUCCESS;
  305. }
  306. if (conn->kex_params.client_ecc_evp_params.negotiated_curve) {
  307. conn->kex_params.server_ecc_evp_params.negotiated_curve = conn->kex_params.client_ecc_evp_params.negotiated_curve;
  308. conn->kex_params.server_kem_group_params.kem_group = NULL;
  309. conn->kex_params.server_kem_group_params.ecc_params.negotiated_curve = NULL;
  310. conn->kex_params.server_kem_group_params.kem_params.kem = NULL;
  311. return S2N_SUCCESS;
  312. }
  313. /* Server and client have mutually supported groups, but the client did not send key
  314. * shares for any of them. Send HRR indicating the server's preference. */
  315. POSIX_GUARD(s2n_set_hello_retry_required(conn));
  316. return S2N_SUCCESS;
  317. }
  318. /* Old-style extension functions -- remove after extensions refactor is complete */
  319. /*
  320. * Calculate the data length for Server Key Share extension
  321. * based on negotiated_curve selected in server_ecc_evp_params.
  322. *
  323. * Retry requests have a different key share format,
  324. * https://tools.ietf.org/html/rfc8446#section-4.2.8
  325. *
  326. * This functions does not error, but s2n_extensions_server_key_share_send() would
  327. */
  328. int s2n_extensions_server_key_share_send_size(struct s2n_connection *conn)
  329. {
  330. const struct s2n_ecc_named_curve *curve = conn->kex_params.server_ecc_evp_params.negotiated_curve;
  331. int key_share_size = S2N_SIZE_OF_EXTENSION_TYPE
  332. + S2N_SIZE_OF_EXTENSION_DATA_SIZE
  333. + S2N_SIZE_OF_NAMED_GROUP;
  334. /* If this is a KeyShareHelloRetryRequest we don't include the share size */
  335. if (s2n_is_hello_retry_message(conn)) {
  336. return key_share_size;
  337. }
  338. if (curve == NULL) {
  339. return 0;
  340. }
  341. /* If this is a full KeyShareEntry, include the share size */
  342. key_share_size += (S2N_SIZE_OF_KEY_SHARE_SIZE + curve->share_size);
  343. return key_share_size;
  344. }
  345. /*
  346. * Sends Key Share extension in Server Hello.
  347. *
  348. * Expects negotiated_curve to be set and generates a ephemeral key for key sharing
  349. */
  350. int s2n_extensions_server_key_share_send(struct s2n_connection *conn, struct s2n_stuffer *out)
  351. {
  352. return s2n_extension_send(&s2n_server_key_share_extension, conn, out);
  353. }
  354. /*
  355. * Client receives a Server Hello key share.
  356. *
  357. * If the curve is supported, conn->kex_params.server_ecc_evp_params will be set.
  358. */
  359. int s2n_extensions_server_key_share_recv(struct s2n_connection *conn, struct s2n_stuffer *extension)
  360. {
  361. return s2n_extension_recv(&s2n_server_key_share_extension, conn, extension);
  362. }