123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301 |
- /*
- * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the "License").
- * You may not use this file except in compliance with the License.
- * A copy of the License is located at
- *
- * http://aws.amazon.com/apache2.0
- *
- * or in the "license" file accompanying this file. This file is distributed
- * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
- * express or implied. See the License for the specific language governing
- * permissions and limitations under the License.
- */
- #include "crypto/s2n_hkdf.h"
- #include "crypto/s2n_fips.h"
- #include "crypto/s2n_hmac.h"
- #include "error/s2n_errno.h"
- #include "stuffer/s2n_stuffer.h"
- #include "utils/s2n_blob.h"
- #include "utils/s2n_mem.h"
- #include "utils/s2n_safety.h"
- #ifdef S2N_LIBCRYPTO_SUPPORTS_HKDF
- #error #include <openssl/hkdf.h>
- #endif
- #define MAX_DIGEST_SIZE 64 /* Current highest is SHA512 */
- #define MAX_HKDF_ROUNDS 255
- /* Reference: RFC 5869 */
- struct s2n_hkdf_impl {
- int (*hkdf)(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, const struct s2n_blob *info, struct s2n_blob *output);
- int (*hkdf_extract)(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, struct s2n_blob *pseudo_rand_key);
- int (*hkdf_expand)(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *pseudo_rand_key,
- const struct s2n_blob *info, struct s2n_blob *output);
- };
- static int s2n_custom_hkdf_extract(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, struct s2n_blob *pseudo_rand_key)
- {
- uint8_t hmac_size = 0;
- POSIX_GUARD(s2n_hmac_digest_size(alg, &hmac_size));
- POSIX_ENSURE(hmac_size <= pseudo_rand_key->size, S2N_ERR_HKDF_OUTPUT_SIZE);
- pseudo_rand_key->size = hmac_size;
- POSIX_GUARD(s2n_hmac_init(hmac, alg, salt->data, salt->size));
- POSIX_GUARD(s2n_hmac_update(hmac, key->data, key->size));
- POSIX_GUARD(s2n_hmac_digest(hmac, pseudo_rand_key->data, pseudo_rand_key->size));
- POSIX_GUARD(s2n_hmac_reset(hmac));
- return S2N_SUCCESS;
- }
- static int s2n_custom_hkdf_expand(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg,
- const struct s2n_blob *pseudo_rand_key, const struct s2n_blob *info, struct s2n_blob *output)
- {
- uint8_t prev[MAX_DIGEST_SIZE] = { 0 };
- uint32_t done_len = 0;
- uint8_t hash_len = 0;
- POSIX_GUARD(s2n_hmac_digest_size(alg, &hash_len));
- POSIX_ENSURE_GT(hash_len, 0);
- uint32_t total_rounds = output->size / hash_len;
- if (output->size % hash_len) {
- total_rounds++;
- }
- POSIX_ENSURE(total_rounds > 0, S2N_ERR_HKDF_OUTPUT_SIZE);
- POSIX_ENSURE(total_rounds <= MAX_HKDF_ROUNDS, S2N_ERR_HKDF_OUTPUT_SIZE);
- for (uint32_t curr_round = 1; curr_round <= total_rounds; curr_round++) {
- uint32_t cat_len;
- POSIX_GUARD(s2n_hmac_init(hmac, alg, pseudo_rand_key->data, pseudo_rand_key->size));
- if (curr_round != 1) {
- POSIX_GUARD(s2n_hmac_update(hmac, prev, hash_len));
- }
- POSIX_GUARD(s2n_hmac_update(hmac, info->data, info->size));
- POSIX_GUARD(s2n_hmac_update(hmac, &curr_round, 1));
- POSIX_GUARD(s2n_hmac_digest(hmac, prev, hash_len));
- cat_len = hash_len;
- if (done_len + hash_len > output->size) {
- cat_len = output->size - done_len;
- }
- POSIX_CHECKED_MEMCPY(output->data + done_len, prev, cat_len);
- done_len += cat_len;
- POSIX_GUARD(s2n_hmac_reset(hmac));
- }
- return S2N_SUCCESS;
- }
- static int s2n_custom_hkdf(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, const struct s2n_blob *info, struct s2n_blob *output)
- {
- uint8_t prk_pad[MAX_DIGEST_SIZE] = { 0 };
- struct s2n_blob pseudo_rand_key = { 0 };
- POSIX_GUARD(s2n_blob_init(&pseudo_rand_key, prk_pad, sizeof(prk_pad)));
- POSIX_GUARD(s2n_custom_hkdf_extract(hmac, alg, salt, key, &pseudo_rand_key));
- POSIX_GUARD(s2n_custom_hkdf_expand(hmac, alg, &pseudo_rand_key, info, output));
- return S2N_SUCCESS;
- }
- const struct s2n_hkdf_impl s2n_custom_hkdf_impl = {
- .hkdf = &s2n_custom_hkdf,
- .hkdf_extract = &s2n_custom_hkdf_extract,
- .hkdf_expand = &s2n_custom_hkdf_expand,
- };
- #ifdef S2N_LIBCRYPTO_SUPPORTS_HKDF
- static int s2n_libcrypto_hkdf_extract(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, struct s2n_blob *pseudo_rand_key)
- {
- const EVP_MD *digest = NULL;
- POSIX_GUARD_RESULT(s2n_hmac_md_from_alg(alg, &digest));
- /* The out_len argument of HKDF_extract is set to the number of bytes written to out_key, and
- * is not used to ensure that out_key is large enough to contain the PRK. Ensure that the PRK
- * output will fit in the blob.
- */
- uint8_t hmac_size = 0;
- POSIX_GUARD(s2n_hmac_digest_size(alg, &hmac_size));
- POSIX_ENSURE(hmac_size <= pseudo_rand_key->size, S2N_ERR_HKDF_OUTPUT_SIZE);
- size_t bytes_written = 0;
- POSIX_GUARD_OSSL(HKDF_extract(pseudo_rand_key->data, &bytes_written, digest, key->data, key->size,
- salt->data, salt->size),
- S2N_ERR_HKDF);
- /* HKDF_extract updates the out_len argument based on the digest size. Update the blob's size based on this. */
- POSIX_ENSURE_LTE(bytes_written, pseudo_rand_key->size);
- pseudo_rand_key->size = bytes_written;
- return S2N_SUCCESS;
- }
- static int s2n_libcrypto_hkdf_expand(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg,
- const struct s2n_blob *pseudo_rand_key, const struct s2n_blob *info, struct s2n_blob *output)
- {
- POSIX_ENSURE(output->size > 0, S2N_ERR_HKDF_OUTPUT_SIZE);
- const EVP_MD *digest = NULL;
- POSIX_GUARD_RESULT(s2n_hmac_md_from_alg(alg, &digest));
- POSIX_GUARD_OSSL(HKDF_expand(output->data, output->size, digest, pseudo_rand_key->data, pseudo_rand_key->size,
- info->data, info->size),
- S2N_ERR_HKDF);
- return S2N_SUCCESS;
- }
- static int s2n_libcrypto_hkdf(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, const struct s2n_blob *info, struct s2n_blob *output)
- {
- POSIX_ENSURE(output->size > 0, S2N_ERR_HKDF_OUTPUT_SIZE);
- const EVP_MD *digest = NULL;
- POSIX_GUARD_RESULT(s2n_hmac_md_from_alg(alg, &digest));
- POSIX_GUARD_OSSL(HKDF(output->data, output->size, digest, key->data, key->size, salt->data, salt->size,
- info->data, info->size),
- S2N_ERR_HKDF);
- return S2N_SUCCESS;
- }
- #else
- static int s2n_libcrypto_hkdf_extract(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, struct s2n_blob *pseudo_rand_key)
- {
- POSIX_BAIL(S2N_ERR_UNIMPLEMENTED);
- }
- static int s2n_libcrypto_hkdf_expand(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg,
- const struct s2n_blob *pseudo_rand_key, const struct s2n_blob *info, struct s2n_blob *output)
- {
- POSIX_BAIL(S2N_ERR_UNIMPLEMENTED);
- }
- static int s2n_libcrypto_hkdf(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, const struct s2n_blob *info, struct s2n_blob *output)
- {
- POSIX_BAIL(S2N_ERR_UNIMPLEMENTED);
- }
- #endif /* S2N_LIBCRYPTO_SUPPORTS_HKDF */
- const struct s2n_hkdf_impl s2n_libcrypto_hkdf_impl = {
- .hkdf = &s2n_libcrypto_hkdf,
- .hkdf_extract = &s2n_libcrypto_hkdf_extract,
- .hkdf_expand = &s2n_libcrypto_hkdf_expand,
- };
- static const struct s2n_hkdf_impl *s2n_get_hkdf_implementation()
- {
- /* By default, s2n-tls uses a custom HKDF implementation. When operating in FIPS mode, the
- * FIPS-validated libcrypto implementation is used instead, if an implementation is provided.
- */
- if (s2n_is_in_fips_mode() && s2n_libcrypto_supports_hkdf()) {
- return &s2n_libcrypto_hkdf_impl;
- }
- return &s2n_custom_hkdf_impl;
- }
- int s2n_hkdf_extract(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, struct s2n_blob *pseudo_rand_key)
- {
- POSIX_ENSURE_REF(hmac);
- POSIX_ENSURE_REF(salt);
- POSIX_ENSURE_REF(key);
- POSIX_ENSURE_REF(pseudo_rand_key);
- const struct s2n_hkdf_impl *hkdf_implementation = s2n_get_hkdf_implementation();
- POSIX_ENSURE_REF(hkdf_implementation);
- POSIX_GUARD(hkdf_implementation->hkdf_extract(hmac, alg, salt, key, pseudo_rand_key));
- return S2N_SUCCESS;
- }
- static int s2n_hkdf_expand(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *pseudo_rand_key,
- const struct s2n_blob *info, struct s2n_blob *output)
- {
- POSIX_ENSURE_REF(hmac);
- POSIX_ENSURE_REF(pseudo_rand_key);
- POSIX_ENSURE_REF(info);
- POSIX_ENSURE_REF(output);
- const struct s2n_hkdf_impl *hkdf_implementation = s2n_get_hkdf_implementation();
- POSIX_ENSURE_REF(hkdf_implementation);
- POSIX_GUARD(hkdf_implementation->hkdf_expand(hmac, alg, pseudo_rand_key, info, output));
- return S2N_SUCCESS;
- }
- int s2n_hkdf_expand_label(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *secret, const struct s2n_blob *label,
- const struct s2n_blob *context, struct s2n_blob *output)
- {
- POSIX_ENSURE_REF(label);
- POSIX_ENSURE_REF(context);
- POSIX_ENSURE_REF(output);
- /* Per RFC8446: 7.1, a HKDF label is a 2 byte length field, and two 1...255 byte arrays with a one byte length field each. */
- uint8_t hkdf_label_buf[2 + 256 + 256];
- struct s2n_blob hkdf_label_blob = { 0 };
- struct s2n_stuffer hkdf_label = { 0 };
- POSIX_ENSURE_LTE(label->size, S2N_MAX_HKDF_EXPAND_LABEL_LENGTH);
- POSIX_GUARD(s2n_blob_init(&hkdf_label_blob, hkdf_label_buf, sizeof(hkdf_label_buf)));
- POSIX_GUARD(s2n_stuffer_init(&hkdf_label, &hkdf_label_blob));
- POSIX_GUARD(s2n_stuffer_write_uint16(&hkdf_label, output->size));
- POSIX_GUARD(s2n_stuffer_write_uint8(&hkdf_label, label->size + sizeof("tls13 ") - 1));
- POSIX_GUARD(s2n_stuffer_write_str(&hkdf_label, "tls13 "));
- POSIX_GUARD(s2n_stuffer_write(&hkdf_label, label));
- POSIX_GUARD(s2n_stuffer_write_uint8(&hkdf_label, context->size));
- POSIX_GUARD(s2n_stuffer_write(&hkdf_label, context));
- hkdf_label_blob.size = s2n_stuffer_data_available(&hkdf_label);
- POSIX_GUARD(s2n_hkdf_expand(hmac, alg, secret, &hkdf_label_blob, output));
- return S2N_SUCCESS;
- }
- int s2n_hkdf(struct s2n_hmac_state *hmac, s2n_hmac_algorithm alg, const struct s2n_blob *salt,
- const struct s2n_blob *key, const struct s2n_blob *info, struct s2n_blob *output)
- {
- POSIX_ENSURE_REF(hmac);
- POSIX_ENSURE_REF(salt);
- POSIX_ENSURE_REF(key);
- POSIX_ENSURE_REF(info);
- POSIX_ENSURE_REF(output);
- const struct s2n_hkdf_impl *hkdf_implementation = s2n_get_hkdf_implementation();
- POSIX_ENSURE_REF(hkdf_implementation);
- POSIX_GUARD(hkdf_implementation->hkdf(hmac, alg, salt, key, info, output));
- return S2N_SUCCESS;
- }
- bool s2n_libcrypto_supports_hkdf()
- {
- #ifdef S2N_LIBCRYPTO_SUPPORTS_HKDF
- return true;
- #else
- return false;
- #endif
- }
|