diff options
Diffstat (limited to 'src/fdosecrets/objects/SessionCipher.cpp')
-rw-r--r-- | src/fdosecrets/objects/SessionCipher.cpp | 224 |
1 files changed, 224 insertions, 0 deletions
diff --git a/src/fdosecrets/objects/SessionCipher.cpp b/src/fdosecrets/objects/SessionCipher.cpp new file mode 100644 index 000000000..374580eed --- /dev/null +++ b/src/fdosecrets/objects/SessionCipher.cpp @@ -0,0 +1,224 @@ +/* + * Copyright (C) 2019 Aetf <aetf@unlimitedcodeworks.xyz> + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 2 or (at your option) + * version 3 of the License. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + */ + +#include "SessionCipher.h" + +#include "crypto/CryptoHash.h" +#include "crypto/Random.h" +#include "crypto/SymmetricCipher.h" + +#include <gcrypt.h> + +#include <memory> + +namespace +{ + constexpr const auto IETF1024_SECOND_OAKLEY_GROUP_P_HEX = "FFFFFFFFFFFFFFFFC90FDAA22168C234" + "C4C6628B80DC1CD129024E088A67CC74" + "020BBEA63B139B22514A08798E3404DD" + "EF9519B3CD3A431B302B0A6DF25F1437" + "4FE1356D6D51C245E485B576625E7EC6" + "F44C42E9A637ED6B0BFF5CB6F406B7ED" + "EE386BFB5A899FA5AE9F24117C4B1FE6" + "49286651ECE65381FFFFFFFFFFFFFFFF"; + constexpr const size_t KEY_SIZE_BYTES = 128; + constexpr const int AES_KEY_LEN = 16; // 128 bits + + const auto IETF1024_SECOND_OAKLEY_GROUP_P = MpiFromHex(IETF1024_SECOND_OAKLEY_GROUP_P_HEX, false); +} // namespace + +namespace FdoSecrets +{ + + QVariant CipherPair::negotiationOutput() const + { + return {}; + } + + DhIetf1024Sha256Aes128CbcPkcs7::DhIetf1024Sha256Aes128CbcPkcs7(const QByteArray& clientPublicKeyBytes) + : m_valid(false) + { + // read client public key + auto clientPub = MpiFromBytes(clientPublicKeyBytes, false); + + // generate server side private, 128 bytes + GcryptMPI serverPrivate(gcry_mpi_snew(KEY_SIZE_BYTES * 8)); + gcry_mpi_randomize(serverPrivate.get(), KEY_SIZE_BYTES * 8, GCRY_STRONG_RANDOM); + + // generate server side public key + GcryptMPI serverPublic(gcry_mpi_snew(KEY_SIZE_BYTES * 8)); + // the generator of Second Oakley Group is 2 + gcry_mpi_powm(serverPublic.get(), GCRYMPI_CONST_TWO, serverPrivate.get(), IETF1024_SECOND_OAKLEY_GROUP_P.get()); + + initialize(std::move(clientPub), std::move(serverPublic), std::move(serverPrivate)); + } + + bool + DhIetf1024Sha256Aes128CbcPkcs7::initialize(GcryptMPI clientPublic, GcryptMPI serverPublic, GcryptMPI serverPrivate) + { + QByteArray commonSecretBytes; + if (!diffieHullman(clientPublic, serverPrivate, commonSecretBytes)) { + return false; + } + + m_privateKey = MpiToBytes(serverPrivate); + m_publicKey = MpiToBytes(serverPublic); + + m_aesKey = hkdf(commonSecretBytes); + + m_valid = true; + return true; + } + + bool DhIetf1024Sha256Aes128CbcPkcs7::diffieHullman(const GcryptMPI& clientPub, + const GcryptMPI& serverPrivate, + QByteArray& commonSecretBytes) + { + if (!clientPub || !serverPrivate) { + return false; + } + + // calc common secret + GcryptMPI commonSecret(gcry_mpi_snew(KEY_SIZE_BYTES * 8)); + gcry_mpi_powm(commonSecret.get(), clientPub.get(), serverPrivate.get(), IETF1024_SECOND_OAKLEY_GROUP_P.get()); + commonSecretBytes = MpiToBytes(commonSecret); + + return true; + } + + QByteArray DhIetf1024Sha256Aes128CbcPkcs7::hkdf(const QByteArray& IKM) + { + // HKDF-Extract(salt, IKM) -> PRK + // PRK = HMAC-Hash(salt, IKM) + + // we use NULL salt as per spec + auto PRK = CryptoHash::hmac(IKM, + QByteArrayLiteral("\0\0\0\0\0\0\0\0" + "\0\0\0\0\0\0\0\0" + "\0\0\0\0\0\0\0\0" + "\0\0\0\0\0\0\0\0"), + CryptoHash::Sha256); + + // HKDF-Expand(PRK, info, L) -> OKM + // N = ceil(L/HashLen) + // T = T(1) | T(2) | T(3) | ... | T(N) + // OKM = first L octets of T + // where: + // T(0) = empty string (zero length) + // T(1) = HMAC-Hash(PRK, T(0) | info | 0x01) + // T(2) = HMAC-Hash(PRK, T(1) | info | 0x02) + // T(3) = HMAC-Hash(PRK, T(2) | info | 0x03) + // ... + // + // (where the constant concatenated to the end of each T(n) is a + // single octet.) + + // we use empty info as per spec + // HashLen = 32 (sha256) + // L = 16 (16 * 8 = 128 bits) + // N = ceil(16/32) = 1 + + auto T1 = CryptoHash::hmac(QByteArrayLiteral("\x01"), PRK, CryptoHash::Sha256); + + // resulting AES key is first 128 bits + Q_ASSERT(T1.size() >= AES_KEY_LEN); + auto OKM = T1.left(AES_KEY_LEN); + return OKM; + } + + SecretStruct DhIetf1024Sha256Aes128CbcPkcs7::encrypt(const SecretStruct& input) + { + SecretStruct output = input; + output.value.clear(); + output.parameters.clear(); + + SymmetricCipher encrypter(SymmetricCipher::Aes128, SymmetricCipher::Cbc, SymmetricCipher::Encrypt); + + auto IV = randomGen()->randomArray(SymmetricCipher::algorithmIvSize(SymmetricCipher::Aes128)); + if (!encrypter.init(m_aesKey, IV)) { + qWarning() << "Error encrypt: " << encrypter.errorString(); + return output; + } + + output.parameters = IV; + + bool ok; + output.value = input.value; + output.value = encrypter.process(padPkcs7(output.value, encrypter.blockSize()), &ok); + if (!ok) { + qWarning() << "Error encrypt: " << encrypter.errorString(); + return output; + } + + return output; + } + + QByteArray& DhIetf1024Sha256Aes128CbcPkcs7::padPkcs7(QByteArray& input, int blockSize) + { + // blockSize must be a power of 2. + Q_ASSERT_X(blockSize > 0 && !(blockSize & (blockSize - 1)), "padPkcs7", "blockSize must be a power of 2"); + + int padLen = blockSize - (input.size() & (blockSize - 1)); + + input.append(QByteArray(padLen, static_cast<char>(padLen))); + return input; + } + + SecretStruct DhIetf1024Sha256Aes128CbcPkcs7::decrypt(const SecretStruct& input) + { + auto IV = input.parameters; + SymmetricCipher decrypter(SymmetricCipher::Aes128, SymmetricCipher::Cbc, SymmetricCipher::Decrypt); + if (!decrypter.init(m_aesKey, IV)) { + qWarning() << "Error decoding: " << decrypter.errorString(); + return input; + } + bool ok; + SecretStruct output = input; + output.parameters.clear(); + output.value = decrypter.process(input.value, &ok); + + if (!ok) { + qWarning() << "Error decoding: " << decrypter.errorString(); + return input; + } + + unpadPkcs7(output.value); + return output; + } + + QByteArray& DhIetf1024Sha256Aes128CbcPkcs7::unpadPkcs7(QByteArray& input) + { + if (input.isEmpty()) { + return input; + } + + int padLen = input[input.size() - 1]; + input.chop(padLen); + return input; + } + + bool DhIetf1024Sha256Aes128CbcPkcs7::isValid() const + { + return m_valid; + } + + QVariant DhIetf1024Sha256Aes128CbcPkcs7::negotiationOutput() const + { + return m_publicKey; + } + +} // namespace FdoSecrets |