crypto: Integrate message handling into cipher
parent
8cb4910d76
commit
ff5ca722b1
|
@ -9,6 +9,7 @@ struct crypto_cipher;
|
||||||
struct crypto_hash;
|
struct crypto_hash;
|
||||||
struct crypto_rsa_pub_key;
|
struct crypto_rsa_pub_key;
|
||||||
struct crypto_rsa_priv_key;
|
struct crypto_rsa_priv_key;
|
||||||
|
struct vec;
|
||||||
|
|
||||||
enum crypto_cipher_type {
|
enum crypto_cipher_type {
|
||||||
CRYPTO_CIPHER_INVALID = 0,
|
CRYPTO_CIPHER_INVALID = 0,
|
||||||
|
@ -51,10 +52,10 @@ struct crypto_cipher* crypto_cipher_new(const uint8_t* enc_key,
|
||||||
const uint8_t* dec_key, enum crypto_cipher_type type);
|
const uint8_t* dec_key, enum crypto_cipher_type type);
|
||||||
void crypto_cipher_del(struct crypto_cipher* self);
|
void crypto_cipher_del(struct crypto_cipher* self);
|
||||||
|
|
||||||
bool crypto_cipher_encrypt(struct crypto_cipher* self, uint8_t* dst,
|
bool crypto_cipher_encrypt(struct crypto_cipher* self, struct vec* dst,
|
||||||
const uint8_t* src, size_t len);
|
|
||||||
bool crypto_cipher_decrypt(struct crypto_cipher* self, uint8_t* dst,
|
|
||||||
const uint8_t* src, size_t len);
|
const uint8_t* src, size_t len);
|
||||||
|
ssize_t crypto_cipher_decrypt(struct crypto_cipher* self, uint8_t* dst,
|
||||||
|
size_t dst_size, const uint8_t* src, size_t len);
|
||||||
|
|
||||||
void crypto_cipher_set_ad(struct crypto_cipher* self, const uint8_t* ad,
|
void crypto_cipher_set_ad(struct crypto_cipher* self, const uint8_t* ad,
|
||||||
size_t len);
|
size_t len);
|
||||||
|
@ -74,6 +75,9 @@ void crypto_hash_digest(struct crypto_hash* self, uint8_t* dst,
|
||||||
struct crypto_rsa_pub_key* crypto_rsa_pub_key_new(void);
|
struct crypto_rsa_pub_key* crypto_rsa_pub_key_new(void);
|
||||||
void crypto_rsa_pub_key_del(struct crypto_rsa_pub_key*);
|
void crypto_rsa_pub_key_del(struct crypto_rsa_pub_key*);
|
||||||
|
|
||||||
|
// Returns length in bytes
|
||||||
|
size_t crypto_rsa_pub_key_length(const struct crypto_rsa_pub_key* key);
|
||||||
|
|
||||||
struct crypto_rsa_pub_key* crypto_rsa_pub_key_import(const uint8_t* modulus,
|
struct crypto_rsa_pub_key* crypto_rsa_pub_key_import(const uint8_t* modulus,
|
||||||
const uint8_t* exponent, size_t size);
|
const uint8_t* exponent, size_t size);
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
#include "crypto.h"
|
#include "crypto.h"
|
||||||
#include "neatvnc.h"
|
#include "neatvnc.h"
|
||||||
|
#include "vec.h"
|
||||||
|
|
||||||
#include <gmp.h>
|
#include <gmp.h>
|
||||||
#include <nettle/base64.h>
|
#include <nettle/base64.h>
|
||||||
|
@ -15,10 +16,15 @@
|
||||||
#include <stdbool.h>
|
#include <stdbool.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <sys/param.h>
|
#include <sys/param.h>
|
||||||
|
#include <arpa/inet.h>
|
||||||
|
|
||||||
// TODO: This is linux specific
|
// TODO: This is linux specific
|
||||||
#include <sys/random.h>
|
#include <sys/random.h>
|
||||||
|
|
||||||
|
#define UDIV_UP(a, b) (((a) + (b) - 1) / (b))
|
||||||
|
|
||||||
|
struct vec;
|
||||||
|
|
||||||
struct crypto_key {
|
struct crypto_key {
|
||||||
int g;
|
int g;
|
||||||
mpz_t p;
|
mpz_t p;
|
||||||
|
@ -46,10 +52,13 @@ struct crypto_cipher {
|
||||||
|
|
||||||
uint8_t mac[16];
|
uint8_t mac[16];
|
||||||
|
|
||||||
bool (*encrypt)(struct crypto_cipher*, uint8_t* dst, const uint8_t* src,
|
uint8_t read_buffer[65536];
|
||||||
size_t len);
|
uint8_t read_buffer_len;
|
||||||
bool (*decrypt)(struct crypto_cipher*, uint8_t* dst, const uint8_t* src,
|
|
||||||
size_t len);
|
bool (*encrypt)(struct crypto_cipher*, struct vec* dst,
|
||||||
|
const uint8_t* src, size_t len);
|
||||||
|
ssize_t (*decrypt)(struct crypto_cipher*, uint8_t* dst,
|
||||||
|
size_t dst_size, const uint8_t* src, size_t len);
|
||||||
};
|
};
|
||||||
|
|
||||||
struct crypto_hash {
|
struct crypto_hash {
|
||||||
|
@ -153,6 +162,7 @@ static size_t crypto_export(uint8_t* dst, size_t dst_size, const mpz_t n)
|
||||||
|
|
||||||
assert(bytesize <= dst_size);
|
assert(bytesize <= dst_size);
|
||||||
|
|
||||||
|
memset(dst, 0, dst_size);
|
||||||
mpz_export(dst + dst_size - bytesize, &bytesize, order, unit_size,
|
mpz_export(dst + dst_size - bytesize, &bytesize, order, unit_size,
|
||||||
endian, skip_bits, n);
|
endian, skip_bits, n);
|
||||||
|
|
||||||
|
@ -273,17 +283,20 @@ struct crypto_key* crypto_derive_shared_secret(
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool crypto_cipher_aes128_ecb_encrypt(struct crypto_cipher* self,
|
static bool crypto_cipher_aes128_ecb_encrypt(struct crypto_cipher* self,
|
||||||
uint8_t* dst, const uint8_t* src, size_t len)
|
struct vec* dst, const uint8_t* src, size_t len)
|
||||||
{
|
{
|
||||||
aes128_encrypt(&self->enc_ctx.aes128_ecb, len, dst, src);
|
vec_reserve(dst, len);
|
||||||
|
aes128_encrypt(&self->enc_ctx.aes128_ecb, len, dst->data, src);
|
||||||
|
dst->len = len;
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool crypto_cipher_aes128_ecb_decrypt(struct crypto_cipher* self,
|
static ssize_t crypto_cipher_aes128_ecb_decrypt(struct crypto_cipher* self,
|
||||||
uint8_t* dst, const uint8_t* src, size_t len)
|
uint8_t* dst, size_t dst_size, const uint8_t* src, size_t len)
|
||||||
{
|
{
|
||||||
|
assert(dst_size <= len);
|
||||||
aes128_decrypt(&self->dec_ctx.aes128_ecb, len, dst, src);
|
aes128_decrypt(&self->dec_ctx.aes128_ecb, len, dst, src);
|
||||||
return true;
|
return len;
|
||||||
}
|
}
|
||||||
|
|
||||||
static struct crypto_cipher* crypto_cipher_new_aes128_ecb(
|
static struct crypto_cipher* crypto_cipher_new_aes128_ecb(
|
||||||
|
@ -321,36 +334,96 @@ static void crypto_aes_eax_update_nonce(struct crypto_aes_eax* self)
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool crypto_cipher_aes_eax_encrypt(struct crypto_cipher* self,
|
static bool crypto_cipher_aes_eax_encrypt(struct crypto_cipher* self,
|
||||||
uint8_t* dst, const uint8_t* src, size_t len)
|
struct vec* dst, const uint8_t* src, size_t len)
|
||||||
{
|
{
|
||||||
crypto_aes_eax_update_nonce(&self->enc_ctx.aes_eax);
|
// size_t msg_max_size = 65535;
|
||||||
|
size_t msg_max_size = 8192;
|
||||||
|
size_t n_msg = UDIV_UP(len, msg_max_size);
|
||||||
|
|
||||||
if (self->ad) {
|
vec_clear(dst);
|
||||||
nettle_eax_aes128_update(&self->enc_ctx.aes_eax.ctx,
|
vec_reserve(dst, len + n_msg * (2 + 16));
|
||||||
self->ad_len, self->ad);
|
|
||||||
} else {
|
for (size_t i = 0; i < n_msg; ++i) {
|
||||||
nettle_eax_aes128_update(&self->enc_ctx.aes_eax.ctx, 0, NULL);
|
size_t msglen = MIN(len - i * msg_max_size, msg_max_size);
|
||||||
|
uint16_t msglen_be = htons(msglen);
|
||||||
|
nvnc_trace("msglen %zu", msglen);
|
||||||
|
|
||||||
|
vec_append(dst, &msglen_be, sizeof(msglen_be));
|
||||||
|
|
||||||
|
crypto_aes_eax_update_nonce(&self->enc_ctx.aes_eax);
|
||||||
|
nettle_eax_aes128_update(&self->enc_ctx.aes_eax.ctx, 2,
|
||||||
|
(uint8_t*)&msglen_be);
|
||||||
|
nettle_eax_aes128_encrypt(&self->enc_ctx.aes_eax.ctx, msglen,
|
||||||
|
(uint8_t*)dst->data + dst->len, src + i * msg_max_size);
|
||||||
|
dst->len += msglen;
|
||||||
|
|
||||||
|
uint8_t mac[16];
|
||||||
|
nettle_eax_aes128_digest(&self->enc_ctx.aes_eax.ctx, sizeof(mac), mac);
|
||||||
|
vec_append(dst, &mac, sizeof(mac));
|
||||||
}
|
}
|
||||||
|
|
||||||
nettle_eax_aes128_encrypt(&self->enc_ctx.aes_eax.ctx, len, dst, src);
|
nvnc_trace("Encrypted buffer of size %zu", dst->len);
|
||||||
nettle_eax_aes128_digest(&self->enc_ctx.aes_eax.ctx, 16, self->mac);
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool crypto_cipher_aes_eax_decrypt(struct crypto_cipher* self,
|
// TODO: Clean up this mess
|
||||||
uint8_t* dst, const uint8_t* src, size_t len)
|
static ssize_t crypto_cipher_aes_eax_decrypt(struct crypto_cipher* self,
|
||||||
|
uint8_t* dst, size_t dst_size, const uint8_t* src, size_t len)
|
||||||
{
|
{
|
||||||
crypto_aes_eax_update_nonce(&self->dec_ctx.aes_eax);
|
size_t dst_index = 0;
|
||||||
if (self->ad) {
|
size_t rem = len;
|
||||||
nettle_eax_aes128_update(&self->dec_ctx.aes_eax.ctx,
|
|
||||||
self->ad_len, self->ad);
|
while (rem) {
|
||||||
} else {
|
size_t space = sizeof(self->read_buffer) - self->read_buffer_len;
|
||||||
nettle_eax_aes128_update(&self->dec_ctx.aes_eax.ctx, 0, NULL);
|
memcpy(self->read_buffer, src + len - rem, MIN(space, rem));
|
||||||
|
self->read_buffer_len += len;
|
||||||
|
|
||||||
|
rem -= MIN(space, rem);
|
||||||
|
|
||||||
|
size_t index = 0;
|
||||||
|
for (;;) {
|
||||||
|
uint8_t* msg = &self->read_buffer[index];
|
||||||
|
uint16_t msglen_be;
|
||||||
|
memcpy(&msglen_be, msg, 2);
|
||||||
|
size_t msglen = ntohs(msglen_be);
|
||||||
|
|
||||||
|
if (self->read_buffer_len - index < msglen + 2) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (msglen > dst_size - dst_index) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
nvnc_trace("Got message of length: %zu", msglen);
|
||||||
|
|
||||||
|
crypto_aes_eax_update_nonce(&self->dec_ctx.aes_eax);
|
||||||
|
nettle_eax_aes128_update(&self->dec_ctx.aes_eax.ctx,
|
||||||
|
2, (uint8_t*)&msglen_be);
|
||||||
|
|
||||||
|
nettle_eax_aes128_decrypt(&self->dec_ctx.aes_eax.ctx,
|
||||||
|
msglen, dst + dst_index, msg + 2);
|
||||||
|
dst_index += msglen;
|
||||||
|
assert(dst_index <= len);
|
||||||
|
|
||||||
|
uint8_t expected_mac[16];
|
||||||
|
nettle_eax_aes128_digest(&self->dec_ctx.aes_eax.ctx, 16,
|
||||||
|
expected_mac);
|
||||||
|
|
||||||
|
uint8_t *mac = msg + 2 + msglen;
|
||||||
|
if (memcmp(expected_mac, mac, 16) != 0)
|
||||||
|
return -1; // Authentication failure
|
||||||
|
|
||||||
|
index += msglen + 2 + 16;
|
||||||
|
}
|
||||||
|
|
||||||
|
self->read_buffer_len -= index;
|
||||||
|
memmove(self->read_buffer, self->read_buffer + index,
|
||||||
|
self->read_buffer_len);
|
||||||
}
|
}
|
||||||
|
|
||||||
nettle_eax_aes128_decrypt(&self->dec_ctx.aes_eax.ctx, len, dst, src);
|
return dst_index;
|
||||||
nettle_eax_aes128_digest(&self->dec_ctx.aes_eax.ctx, 16, self->mac);
|
|
||||||
return true;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static struct crypto_cipher* crypto_cipher_new_aes_eax(const uint8_t* enc_key,
|
static struct crypto_cipher* crypto_cipher_new_aes_eax(const uint8_t* enc_key,
|
||||||
|
@ -390,16 +463,16 @@ void crypto_cipher_del(struct crypto_cipher* self)
|
||||||
free(self);
|
free(self);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool crypto_cipher_encrypt(struct crypto_cipher* self, uint8_t* dst,
|
bool crypto_cipher_encrypt(struct crypto_cipher* self, struct vec* dst,
|
||||||
const uint8_t* src, size_t len)
|
const uint8_t* src, size_t len)
|
||||||
{
|
{
|
||||||
return self->encrypt(self, dst, src, len);
|
return self->encrypt(self, dst, src, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool crypto_cipher_decrypt(struct crypto_cipher* self, uint8_t* dst,
|
ssize_t crypto_cipher_decrypt(struct crypto_cipher* self, uint8_t* dst,
|
||||||
const uint8_t* src, size_t len)
|
size_t dst_size, const uint8_t* src, size_t len)
|
||||||
{
|
{
|
||||||
return self->decrypt(self, dst, src, len);
|
return self->decrypt(self, dst, dst_size, src, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
void crypto_cipher_set_ad(struct crypto_cipher* self, const uint8_t* ad,
|
void crypto_cipher_set_ad(struct crypto_cipher* self, const uint8_t* ad,
|
||||||
|
@ -480,9 +553,12 @@ struct crypto_rsa_pub_key* crypto_rsa_pub_key_import(const uint8_t* modulus,
|
||||||
if (!self)
|
if (!self)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
|
rsa_public_key_init(&self->key);
|
||||||
|
mpz_init(self->key.n);
|
||||||
crypto_import(self->key.n, modulus, size);
|
crypto_import(self->key.n, modulus, size);
|
||||||
|
mpz_init(self->key.e);
|
||||||
crypto_import(self->key.e, exponent, size);
|
crypto_import(self->key.e, exponent, size);
|
||||||
self->key.size = rsa_public_key_prepare(&self->key);
|
rsa_public_key_prepare(&self->key);
|
||||||
|
|
||||||
return self;
|
return self;
|
||||||
}
|
}
|
||||||
|
@ -519,6 +595,11 @@ void crypto_rsa_priv_key_del(struct crypto_rsa_priv_key* self)
|
||||||
free(self);
|
free(self);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
size_t crypto_rsa_pub_key_length(const struct crypto_rsa_pub_key* key)
|
||||||
|
{
|
||||||
|
return key->key.size;
|
||||||
|
}
|
||||||
|
|
||||||
static void generate_random_for_rsa(void* random_ctx, size_t len, uint8_t* dst)
|
static void generate_random_for_rsa(void* random_ctx, size_t len, uint8_t* dst)
|
||||||
{
|
{
|
||||||
getrandom(dst, len, 0);
|
getrandom(dst, len, 0);
|
||||||
|
|
|
@ -462,7 +462,7 @@ static int on_apple_dh_response(struct nvnc_client* client)
|
||||||
char username[128] = {};
|
char username[128] = {};
|
||||||
char* password = username + 64;
|
char* password = username + 64;
|
||||||
|
|
||||||
crypto_cipher_decrypt(cipher, (uint8_t*)username,
|
crypto_cipher_decrypt(cipher, (uint8_t*)username, sizeof(username),
|
||||||
msg->encrypted_credentials, sizeof(username));
|
msg->encrypted_credentials, sizeof(username));
|
||||||
username[63] = '\0';
|
username[63] = '\0';
|
||||||
username[127] = '\0';
|
username[127] = '\0';
|
||||||
|
|
|
@ -39,11 +39,10 @@ static_assert(sizeof(struct stream) <= STREAM_ALLOC_SIZE,
|
||||||
|
|
||||||
static struct rcbuf* encrypt_rcbuf(struct stream* self, struct rcbuf* payload)
|
static struct rcbuf* encrypt_rcbuf(struct stream* self, struct rcbuf* payload)
|
||||||
{
|
{
|
||||||
uint8_t* ciphertext = malloc(payload->size);
|
struct vec ciphertext = {};
|
||||||
assert(ciphertext);
|
crypto_cipher_encrypt(self->cipher, &ciphertext, payload->payload,
|
||||||
crypto_cipher_encrypt(self->cipher, ciphertext, payload->payload,
|
|
||||||
payload->size);
|
payload->size);
|
||||||
struct rcbuf* result = rcbuf_new(ciphertext, payload->size);
|
struct rcbuf* result = rcbuf_new(ciphertext.data, ciphertext.len);
|
||||||
rcbuf_unref(payload);
|
rcbuf_unref(payload);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
@ -217,12 +216,17 @@ static ssize_t stream_tcp_read(struct stream* self, void* dst, size_t size)
|
||||||
if (rc > 0)
|
if (rc > 0)
|
||||||
self->bytes_received += rc;
|
self->bytes_received += rc;
|
||||||
|
|
||||||
if (rc > 0 && self->cipher && !crypto_cipher_decrypt(self->cipher, dst,
|
if (rc > 0 && self->cipher) {
|
||||||
read_buffer, rc)) {
|
nvnc_trace("Got cipher text of length %zd", rc);
|
||||||
nvnc_log(NVNC_LOG_ERROR, "Message authentication failed!");
|
ssize_t len = crypto_cipher_decrypt(self->cipher, dst, size,
|
||||||
stream__remote_closed(self);
|
read_buffer, rc);
|
||||||
errno = EPROTO;
|
if (len < 0) {
|
||||||
return -1;
|
nvnc_log(NVNC_LOG_ERROR, "Message authentication failed!");
|
||||||
|
stream__remote_closed(self);
|
||||||
|
errno = EPROTO;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
rc = len;
|
||||||
}
|
}
|
||||||
|
|
||||||
return rc;
|
return rc;
|
||||||
|
|
Loading…
Reference in New Issue