Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

refactor: add libcrypto PRF impl for openssl-3.0-fips #5158

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions codebuild/spec/buildspec_openssl3fips.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,3 +38,4 @@ phases:
- make -C build test -- ARGS="-R 's2n_build_test|s2n_fips_test'"
- make -C build test -- ARGS="-R 's2n_hash_test|s2n_hash_all_algs_test|s2n_openssl_test|s2n_init_test'"
- make -C build test -- ARGS="-R 's2n_evp_signing_test'"
- make -C build test -- ARGS="-R 's2n_tls_prf_test|s2n_tls_hybrid_prf_test'"
192 changes: 192 additions & 0 deletions crypto/s2n_prf_libcrypto.c
Original file line number Diff line number Diff line change
@@ -0,0 +1,192 @@
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/

#include "crypto/s2n_prf_libcrypto.h"

#include "crypto/s2n_hash.h"
#include "error/s2n_errno.h"
#include "tls/s2n_connection.h"
#include "utils/s2n_safety.h"

#if defined(OPENSSL_IS_AWSLC)

/* The AWSLC TLS PRF API is exported in all AWSLC versions. However, in the AWSLC FIPS branch, this
Comment on lines +23 to +25
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I didn't modify any of the AWSLC PRF code. I just moved it.

* API is defined in a private header:
* https://github.com/aws/aws-lc/blob/d251b365b73a6e6acff6ee634aa8f077f23cdea4/crypto/fipsmodule/tls/internal.h#L27
*
* AWSLC has committed to this API definition, and the API has been added to a public header in the
* main branch: https://github.com/aws/aws-lc/pull/1033. As such, this API is forward-declared in
* order to make it accessible to s2n-tls when linked to AWSLC-FIPS.
*/
int CRYPTO_tls1_prf(const EVP_MD *digest,
uint8_t *out, size_t out_len,
const uint8_t *secret, size_t secret_len,
const char *label, size_t label_len,
const uint8_t *seed1, size_t seed1_len,
const uint8_t *seed2, size_t seed2_len);

S2N_RESULT s2n_prf_libcrypto(struct s2n_connection *conn,
struct s2n_blob *secret, struct s2n_blob *label,
struct s2n_blob *seed_a, struct s2n_blob *seed_b, struct s2n_blob *seed_c,
struct s2n_blob *out)
{
const EVP_MD *digest = NULL;
if (conn->actual_protocol_version < S2N_TLS12) {
/* md5_sha1 is a digest that indicates both MD5 and SHA1 should be used in the PRF calculation.
* This is needed for pre-TLS12 PRFs.
*/
digest = EVP_md5_sha1();
} else {
RESULT_GUARD(s2n_hmac_md_from_alg(conn->secure->cipher_suite->prf_alg, &digest));
}
RESULT_ENSURE_REF(digest);

DEFER_CLEANUP(struct s2n_stuffer seed_b_stuffer = { 0 }, s2n_stuffer_free);
size_t seed_b_len = 0;
uint8_t *seed_b_data = NULL;

if (seed_b != NULL) {
struct s2n_blob seed_b_blob = { 0 };
RESULT_GUARD_POSIX(s2n_blob_init(&seed_b_blob, seed_b->data, seed_b->size));
RESULT_GUARD_POSIX(s2n_stuffer_init_written(&seed_b_stuffer, &seed_b_blob));

if (seed_c != NULL) {
/* The AWSLC TLS PRF implementation only provides two seed arguments. If three seeds
* were provided, pass in the third seed by concatenating it with the second seed.
*/
RESULT_GUARD_POSIX(s2n_stuffer_alloc(&seed_b_stuffer, seed_b->size + seed_c->size));
RESULT_GUARD_POSIX(s2n_stuffer_write_bytes(&seed_b_stuffer, seed_b->data, seed_b->size));
RESULT_GUARD_POSIX(s2n_stuffer_write_bytes(&seed_b_stuffer, seed_c->data, seed_c->size));
}

seed_b_len = s2n_stuffer_data_available(&seed_b_stuffer);
seed_b_data = s2n_stuffer_raw_read(&seed_b_stuffer, seed_b_len);
RESULT_ENSURE_REF(seed_b_data);
}

RESULT_GUARD_OSSL(CRYPTO_tls1_prf(digest,
out->data, out->size,
secret->data, secret->size,
(const char *) label->data, label->size,
seed_a->data, seed_a->size,
seed_b_data, seed_b_len),
S2N_ERR_PRF_DERIVE);

return S2N_RESULT_OK;
}

#elif S2N_OPENSSL_VERSION_AT_LEAST(3, 0, 0)

#include <openssl/core_names.h>
#include <openssl/kdf.h>

#define OSSL_PARAM_BLOB(id, blob) \
OSSL_PARAM_octet_string(id, blob->data, blob->size)
#define OSSL_PARAM_STR(id, cstr) \
OSSL_PARAM_utf8_string(id, cstr, 0)

DEFINE_POINTER_CLEANUP_FUNC(EVP_KDF_CTX *, EVP_KDF_CTX_free);
DEFINE_POINTER_CLEANUP_FUNC(EVP_KDF *, EVP_KDF_free);

S2N_RESULT s2n_prf_libcrypto(struct s2n_connection *conn,
struct s2n_blob *secret, struct s2n_blob *label,
struct s2n_blob *seed_a, struct s2n_blob *seed_b, struct s2n_blob *seed_c,
struct s2n_blob *out)
{
RESULT_ENSURE_REF(conn);
RESULT_ENSURE_REF(secret);
RESULT_ENSURE_REF(label);
RESULT_ENSURE_REF(seed_a);
RESULT_ENSURE_REF(out);

struct s2n_blob empty_seed = { 0 };
if (!seed_b) {
seed_b = &empty_seed;
}
if (!seed_c) {
seed_c = &empty_seed;
}

/* Openssl limits the size of the seed to 1024 bytes, including the label.
* This would be an issue for TLS1.2 PQ, which uses full keyshares as seeds.
* However, s2n-tls doesn't support PQ with Openssl, so this limitation will
* never affect customers.
*
* As of this commit, EVP_KDF_derive will fail silently (without logging any
* error) if the seed is too large. This check adds visibility.
*/
uint64_t seed_total_size = label->size + seed_a->size + seed_b->size + seed_c->size;
RESULT_ENSURE(seed_total_size <= 1024, S2N_ERR_PRF_INVALID_SEED);

const char *digest_name = "MD5-SHA1";
const char *fetch_properties = "-fips";

if (conn->actual_protocol_version == S2N_TLS12) {
fetch_properties = NULL;

RESULT_ENSURE_REF(conn->secure);
RESULT_ENSURE_REF(conn->secure->cipher_suite);
s2n_hmac_algorithm prf_alg = conn->secure->cipher_suite->prf_alg;

const EVP_MD *digest = NULL;
RESULT_GUARD(s2n_hmac_md_from_alg(prf_alg, &digest));
RESULT_ENSURE(digest, S2N_ERR_PRF_INVALID_ALGORITHM);
digest_name = EVP_MD_get0_name(digest);
}

/* As an optimization, we should be able to fetch and cache this EVP_KDF*
* once when s2n_init is called.
*/
DEFER_CLEANUP(EVP_KDF *prf_impl = EVP_KDF_fetch(NULL, "TLS1-PRF", fetch_properties),
EVP_KDF_free_pointer);
RESULT_ENSURE(prf_impl, S2N_ERR_PRF_INVALID_ALGORITHM);

DEFER_CLEANUP(EVP_KDF_CTX *prf_ctx = EVP_KDF_CTX_new(prf_impl),
EVP_KDF_CTX_free_pointer);
RESULT_ENSURE_REF(prf_ctx);

OSSL_PARAM params[] = {
/* Casting away the const is safe because providers are forbidden from
* modifying any OSSL_PARAM value other than return_size.
* Even the examples in the Openssl documentation cast const strings to
* non-const void pointers when setting up OSSL_PARAMs.
*/
OSSL_PARAM_STR(OSSL_KDF_PARAM_PROPERTIES, (void *) (uintptr_t) fetch_properties),
OSSL_PARAM_STR(OSSL_KDF_PARAM_DIGEST, (void *) (uintptr_t) digest_name),
OSSL_PARAM_BLOB(OSSL_KDF_PARAM_SECRET, secret),
/* "TLS1-PRF" handles the label like just another seed */
OSSL_PARAM_BLOB(OSSL_KDF_PARAM_SEED, label),
OSSL_PARAM_BLOB(OSSL_KDF_PARAM_SEED, seed_a),
OSSL_PARAM_BLOB(OSSL_KDF_PARAM_SEED, seed_b),
OSSL_PARAM_BLOB(OSSL_KDF_PARAM_SEED, seed_c),
OSSL_PARAM_END,
};

RESULT_GUARD_OSSL(EVP_KDF_derive(prf_ctx, out->data, out->size, params),
S2N_ERR_PRF_DERIVE);
return S2N_RESULT_OK;
}

#else

S2N_RESULT s2n_prf_libcrypto(struct s2n_connection *conn,
struct s2n_blob *secret, struct s2n_blob *label,
struct s2n_blob *seed_a, struct s2n_blob *seed_b, struct s2n_blob *seed_c,
struct s2n_blob *out)
{
RESULT_BAIL(S2N_ERR_FIPS_MODE_UNSUPPORTED);
}

#endif
24 changes: 24 additions & 0 deletions crypto/s2n_prf_libcrypto.h
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/

#pragma once

#include "utils/s2n_blob.h"
#include "utils/s2n_result.h"

S2N_RESULT s2n_prf_libcrypto(struct s2n_connection *conn,
struct s2n_blob *secret, struct s2n_blob *label,
struct s2n_blob *seed_a, struct s2n_blob *seed_b, struct s2n_blob *seed_c,
struct s2n_blob *out);
10 changes: 10 additions & 0 deletions tests/unit/s2n_tls_hybrid_prf_test.c
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@
#include <string.h>

#include "api/s2n.h"
#include "crypto/s2n_pq.h"
#include "s2n_test.h"
#include "stuffer/s2n_stuffer.h"
#include "tests/testlib/s2n_nist_kats.h"
Expand All @@ -40,6 +41,15 @@ int main(int argc, char **argv)
BEGIN_TEST();
EXPECT_SUCCESS(s2n_disable_tls13_in_test());

if (!s2n_pq_is_enabled()) {
/* The hybrid PRF sets a seed too large for the openssl PRF,
* but s2n-tls doesn't support PQ with openssl anyway.
*
* Only run this test in environments where PQ is possible.
*/
END_TEST();
}

FILE *kat_file = fopen(KAT_FILE_NAME, "r");
EXPECT_NOT_NULL(kat_file);

Expand Down
Loading
Loading