Compare commits
No commits in common. "3bd54d682aa9c39cccb059c65e079bde9176f80a" and "d0488892fb6d10af47efce65ad9811cf5d82ab44" have entirely different histories.
3bd54d682a
...
d0488892fb
|
@ -50,11 +50,6 @@ version = "1.0.1"
|
|||
default-features = false
|
||||
features = [ "u64_backend" ]
|
||||
|
||||
[dependencies.x25519-dalek]
|
||||
version = "1.1.0"
|
||||
default-features = false
|
||||
features = [ "u64_backend" ]
|
||||
|
||||
# Fetch from master, for "no_std" + "alloc" combination
|
||||
[dependencies.rsa]
|
||||
git = "https://github.com/RustCrypto/RSA.git"
|
||||
|
|
|
@ -154,7 +154,24 @@ pub struct AlgorithmIdentifier<'a> {
|
|||
}
|
||||
|
||||
impl<'a> Certificate<'a> {
|
||||
// Return the public key, if used for RSA
|
||||
pub fn return_rsa_public_key(&self) -> Result<RSAPublicKey, ()> {
|
||||
if self.signature_algorithm.algorithm != SHA1_WITH_RSA_ENCRYPTION {
|
||||
return Err(());
|
||||
}
|
||||
let (_, (modulus, exponent)) = parse_asn1_der_rsa_public_key(
|
||||
self.tbs_certificate.subject_public_key_info.subject_public_key
|
||||
).map_err(|_| ())?;
|
||||
|
||||
RSAPublicKey::new(
|
||||
BigUint::from_bytes_be(modulus),
|
||||
BigUint::from_bytes_be(exponent)
|
||||
).map_err(|_| ())
|
||||
}
|
||||
|
||||
// General return public key method
|
||||
// TODO: Replace return_rsa_public_key() with this method
|
||||
// Things to change: session.rs: client_update_for_wait_cert_cr
|
||||
pub(crate) fn get_cert_public_key(&self) -> Result<CertificatePublicKey, ()> {
|
||||
let public_key_info = &self.tbs_certificate.subject_public_key_info;
|
||||
let algorithm_identifier = &public_key_info.algorithm;
|
||||
|
|
|
@ -34,7 +34,7 @@ pub(crate) struct Session {
|
|||
// Hash functions needed
|
||||
hash: Hash,
|
||||
// Ephemeral secret for ECDHE key exchange
|
||||
ecdhe_secret: Option<(EphemeralSecret, x25519_dalek::EphemeralSecret)>,
|
||||
ecdhe_secret: Option<EphemeralSecret>,
|
||||
// Block ciphers for client & server
|
||||
client_handshake_cipher: Option<Cipher>,
|
||||
server_handshake_cipher: Option<Cipher>,
|
||||
|
@ -101,7 +101,6 @@ impl Session {
|
|||
pub(crate) fn client_update_for_ch(
|
||||
&mut self,
|
||||
ecdhe_secret: EphemeralSecret,
|
||||
x25519_secret: x25519_dalek::EphemeralSecret,
|
||||
session_id: [u8; 32],
|
||||
ch_slice: &[u8]
|
||||
) {
|
||||
|
@ -109,7 +108,7 @@ impl Session {
|
|||
if self.state != TlsState::START || self.role != TlsRole::Client {
|
||||
todo!()
|
||||
}
|
||||
self.ecdhe_secret = Some((ecdhe_secret, x25519_secret));
|
||||
self.ecdhe_secret = Some(ecdhe_secret);
|
||||
self.session_id = Some(session_id);
|
||||
self.hash.update(ch_slice);
|
||||
self.state = TlsState::WAIT_SH;
|
||||
|
@ -121,8 +120,7 @@ impl Session {
|
|||
pub(crate) fn client_update_for_sh(
|
||||
&mut self,
|
||||
cipher_suite: CipherSuite,
|
||||
encoded_point: Option<EncodedPoint>,
|
||||
x25519_shared: Option<x25519_dalek::PublicKey>,
|
||||
encoded_point: EncodedPoint,
|
||||
sh_slice: &[u8]
|
||||
) {
|
||||
// Handle inappropriate call to move state
|
||||
|
@ -131,34 +129,12 @@ impl Session {
|
|||
}
|
||||
// Generate ECDHE shared secret
|
||||
// Remove private secret
|
||||
// let ecdhe_shared_secret =
|
||||
// self.ecdhe_secret
|
||||
// .take()
|
||||
// .unwrap()
|
||||
// .diffie_hellman(&encoded_point)
|
||||
// .unwrap();
|
||||
|
||||
let mut shared_secret_bytes: [u8; 32] = [0; 32];
|
||||
if encoded_point.is_some() {
|
||||
let p256_shared_secret =
|
||||
let ecdhe_shared_secret =
|
||||
self.ecdhe_secret
|
||||
.take()
|
||||
.unwrap()
|
||||
.0
|
||||
.diffie_hellman(&encoded_point.unwrap())
|
||||
.diffie_hellman(&encoded_point)
|
||||
.unwrap();
|
||||
shared_secret_bytes.clone_from_slice(p256_shared_secret.as_bytes());
|
||||
} else if x25519_shared.is_some() {
|
||||
let x25519_shared_secret =
|
||||
self.ecdhe_secret
|
||||
.take()
|
||||
.unwrap()
|
||||
.1
|
||||
.diffie_hellman(&x25519_shared.unwrap());
|
||||
shared_secret_bytes.clone_from_slice(x25519_shared_secret.as_bytes());
|
||||
} else {
|
||||
todo!()
|
||||
}
|
||||
|
||||
// Generate Handshake secret
|
||||
match cipher_suite {
|
||||
|
@ -185,7 +161,7 @@ impl Session {
|
|||
let (handshake_secret, handshake_secret_hkdf) =
|
||||
Hkdf::<Sha256>::extract(
|
||||
Some(&derived_secret),
|
||||
&shared_secret_bytes
|
||||
ecdhe_shared_secret.as_bytes()
|
||||
);
|
||||
|
||||
// Store the handshake secret
|
||||
|
@ -373,7 +349,7 @@ impl Session {
|
|||
let (handshake_secret, handshake_secret_hkdf) =
|
||||
Hkdf::<Sha384>::extract(
|
||||
Some(&derived_secret),
|
||||
&shared_secret_bytes
|
||||
ecdhe_shared_secret.as_bytes()
|
||||
);
|
||||
|
||||
// Store the handshake secret
|
||||
|
|
45
src/tls.rs
45
src/tls.rs
|
@ -126,13 +126,12 @@ impl<R: 'static + RngCore + CryptoRng> TlsSocket<R> {
|
|||
// Prepare field that is randomised,
|
||||
// Supply it to the TLS repr builder.
|
||||
let ecdh_secret = EphemeralSecret::random(&mut self.rng);
|
||||
let x25519_secret = x25519_dalek::EphemeralSecret::new(&mut self.rng);
|
||||
let mut random: [u8; 32] = [0; 32];
|
||||
let mut session_id: [u8; 32] = [0; 32];
|
||||
self.rng.fill_bytes(&mut random);
|
||||
self.rng.fill_bytes(&mut session_id);
|
||||
let repr = TlsRepr::new()
|
||||
.client_hello(&ecdh_secret, &x25519_secret, random, session_id.clone());
|
||||
.client_hello(&ecdh_secret, random, session_id.clone());
|
||||
|
||||
// Update hash function with client hello handshake
|
||||
let mut array = [0; 512];
|
||||
|
@ -146,7 +145,6 @@ impl<R: 'static + RngCore + CryptoRng> TlsSocket<R> {
|
|||
// Update TLS session
|
||||
self.session.borrow_mut().client_update_for_ch(
|
||||
ecdh_secret,
|
||||
x25519_secret,
|
||||
session_id,
|
||||
&slice[5..]
|
||||
);
|
||||
|
@ -315,6 +313,7 @@ impl<R: 'static + RngCore + CryptoRng> TlsSocket<R> {
|
|||
if repr.is_server_hello() {
|
||||
// Check SH content:
|
||||
// random: Cannot represent HelloRequestRetry
|
||||
// (TODO: Support other key shares, e.g. X25519)
|
||||
// session_id_echo: should be same as the one sent by client
|
||||
// cipher_suite: Store
|
||||
// (TODO: Check if such suite was offered)
|
||||
|
@ -322,11 +321,11 @@ impl<R: 'static + RngCore + CryptoRng> TlsSocket<R> {
|
|||
//
|
||||
// Check extensions:
|
||||
// supported_version: Must be TLS 1.3
|
||||
// key_share: Store key, must be in secp256r1 or x25519
|
||||
// key_share: Store key, must be in secp256r1
|
||||
// (TODO: Support other key shares ^)
|
||||
|
||||
// "Cache" for ECDHE server public info
|
||||
let mut p256_public: Option<EncodedPoint> = None;
|
||||
let mut x25519_public: Option<x25519_dalek::PublicKey> = None;
|
||||
let mut server_public: Option<EncodedPoint> = None;
|
||||
let mut selected_cipher: Option<CipherSuite> = None;
|
||||
|
||||
// Process the handshake data within ServerHello
|
||||
|
@ -378,25 +377,22 @@ impl<R: 'static + RngCore + CryptoRng> TlsSocket<R> {
|
|||
server_share
|
||||
}
|
||||
) = &extension.extension_data {
|
||||
match server_share.group {
|
||||
NamedGroup::secp256r1 => {
|
||||
p256_public.replace(
|
||||
// TODO: Use legitimate checking to ensure the chosen
|
||||
// group is indeed acceptable, when allowing more (EC)DHE
|
||||
// key sharing
|
||||
if server_share.group != NamedGroup::secp256r1 {
|
||||
// Abort for wrong key sharing
|
||||
todo!()
|
||||
}
|
||||
// Store key
|
||||
// It is surely from secp256r1, no other groups are permitted
|
||||
// Convert untagged bytes into encoded point on p256 eliptic curve
|
||||
// Slice the first byte out of the bytes
|
||||
server_public.replace(
|
||||
EncodedPoint::from_untagged_bytes(
|
||||
GenericArray::from_slice(&server_share.key_exchange[1..])
|
||||
)
|
||||
);
|
||||
},
|
||||
NamedGroup::x25519 => {
|
||||
let mut x25519_server_key: [u8; 32] = [0; 32];
|
||||
x25519_server_key.clone_from_slice(&server_share.key_exchange);
|
||||
x25519_public.replace(
|
||||
x25519_dalek::PublicKey::from(
|
||||
x25519_server_key
|
||||
)
|
||||
);
|
||||
}
|
||||
_ => todo!()
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -406,8 +402,8 @@ impl<R: 'static + RngCore + CryptoRng> TlsSocket<R> {
|
|||
todo!()
|
||||
}
|
||||
|
||||
// Check that both selected_cipher and (p256_public XNOR x25519_public) were received
|
||||
if selected_cipher.is_none() || (p256_public.is_none() && x25519_public.is_none()) {
|
||||
// Check that both selected_cipher and server_public were received
|
||||
if selected_cipher.is_none() || server_public.is_none() {
|
||||
// Abort communication
|
||||
todo!()
|
||||
}
|
||||
|
@ -416,8 +412,7 @@ impl<R: 'static + RngCore + CryptoRng> TlsSocket<R> {
|
|||
let mut session = self.session.borrow_mut();
|
||||
session.client_update_for_sh(
|
||||
selected_cipher.unwrap(),
|
||||
p256_public,
|
||||
x25519_public,
|
||||
server_public.unwrap(),
|
||||
handshake_slice
|
||||
);
|
||||
// Key exchange occurred, seq_num is set to 0
|
||||
|
|
|
@ -59,14 +59,14 @@ impl<'a> TlsRepr<'a> {
|
|||
}
|
||||
}
|
||||
|
||||
pub(crate) fn client_hello(mut self, p256_secret: &EphemeralSecret, x25519_secret: &x25519_dalek::EphemeralSecret, random: [u8; 32], session_id: [u8; 32]) -> Self {
|
||||
pub(crate) fn client_hello(mut self, secret: &EphemeralSecret, random: [u8; 32], session_id: [u8; 32]) -> Self {
|
||||
self.content_type = TlsContentType::Handshake;
|
||||
self.version = TlsVersion::Tls10;
|
||||
let handshake_repr = {
|
||||
let mut repr = HandshakeRepr::new();
|
||||
repr.msg_type = HandshakeType::ClientHello;
|
||||
repr.handshake_data = HandshakeData::ClientHello({
|
||||
ClientHello::new(p256_secret, x25519_secret, random, session_id)
|
||||
ClientHello::new(secret, random, session_id)
|
||||
});
|
||||
repr.length = repr.handshake_data.get_length().try_into().unwrap();
|
||||
repr
|
||||
|
@ -252,7 +252,7 @@ impl<'a> HandshakeData<'a> {
|
|||
}
|
||||
|
||||
impl<'a> ClientHello<'a> {
|
||||
pub(self) fn new(p256_secret: &EphemeralSecret, x25519_secret: &x25519_dalek::EphemeralSecret, random: [u8; 32], session_id: [u8; 32]) -> Self {
|
||||
pub(self) fn new(secret: &EphemeralSecret, random: [u8; 32], session_id: [u8; 32]) -> Self {
|
||||
let mut client_hello = ClientHello {
|
||||
version: TlsVersion::Tls12,
|
||||
random,
|
||||
|
@ -274,7 +274,7 @@ impl<'a> ClientHello<'a> {
|
|||
|
||||
client_hello.add_ch_supported_versions()
|
||||
.add_sig_algs()
|
||||
.add_client_groups_with_key_shares(p256_secret, x25519_secret)
|
||||
.add_client_groups_with_key_shares(secret)
|
||||
.finalise()
|
||||
}
|
||||
|
||||
|
@ -354,10 +354,9 @@ impl<'a> ClientHello<'a> {
|
|||
self
|
||||
}
|
||||
|
||||
pub(crate) fn add_client_groups_with_key_shares(mut self, ecdh_secret: &EphemeralSecret, x25519_secret: &x25519_dalek::EphemeralSecret) -> Self {
|
||||
pub(crate) fn add_client_groups_with_key_shares(mut self, ecdh_secret: &EphemeralSecret) -> Self {
|
||||
// List out all supported groups
|
||||
let mut list = Vec::new();
|
||||
list.push(NamedGroup::x25519);
|
||||
list.push(NamedGroup::secp256r1);
|
||||
|
||||
let length = list.len()*2;
|
||||
|
@ -385,19 +384,6 @@ impl<'a> ClientHello<'a> {
|
|||
key_exchange
|
||||
}
|
||||
},
|
||||
|
||||
NamedGroup::x25519 => {
|
||||
let x25519_public = x25519_dalek::PublicKey::from(x25519_secret);
|
||||
key_exchange.extend_from_slice(x25519_public.as_bytes());
|
||||
|
||||
let key_exchange_length = key_exchange.len();
|
||||
|
||||
KeyShareEntry {
|
||||
group: *named_group,
|
||||
length: key_exchange_length.try_into().unwrap(),
|
||||
key_exchange
|
||||
}
|
||||
}
|
||||
// TODO: Implement keygen for other named groups
|
||||
_ => todo!(),
|
||||
};
|
||||
|
|
Loading…
Reference in New Issue