Coverage Report

Created: 2024-07-27 06:06

/src/hpn-ssh/ssh-ed25519.c
Line
Count
Source (jump to first uncovered line)
1
/* $OpenBSD: ssh-ed25519.c,v 1.19 2022/10/28 00:44:44 djm Exp $ */
2
/*
3
 * Copyright (c) 2013 Markus Friedl <markus@openbsd.org>
4
 *
5
 * Permission to use, copy, modify, and distribute this software for any
6
 * purpose with or without fee is hereby granted, provided that the above
7
 * copyright notice and this permission notice appear in all copies.
8
 *
9
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16
 */
17
18
#include "includes.h"
19
20
#include <sys/types.h>
21
#include <limits.h>
22
23
#include "crypto_api.h"
24
25
#include <string.h>
26
#include <stdarg.h>
27
28
#include "log.h"
29
#include "sshbuf.h"
30
#define SSHKEY_INTERNAL
31
#include "sshkey.h"
32
#include "ssherr.h"
33
#include "ssh.h"
34
35
static void
36
ssh_ed25519_cleanup(struct sshkey *k)
37
705
{
38
705
  freezero(k->ed25519_pk, ED25519_PK_SZ);
39
705
  freezero(k->ed25519_sk, ED25519_SK_SZ);
40
705
  k->ed25519_pk = NULL;
41
705
  k->ed25519_sk = NULL;
42
705
}
43
44
static int
45
ssh_ed25519_equal(const struct sshkey *a, const struct sshkey *b)
46
0
{
47
0
  if (a->ed25519_pk == NULL || b->ed25519_pk == NULL)
48
0
    return 0;
49
0
  if (memcmp(a->ed25519_pk, b->ed25519_pk, ED25519_PK_SZ) != 0)
50
0
    return 0;
51
0
  return 1;
52
0
}
53
54
static int
55
ssh_ed25519_serialize_public(const struct sshkey *key, struct sshbuf *b,
56
    enum sshkey_serialize_rep opts)
57
0
{
58
0
  int r;
59
60
0
  if (key->ed25519_pk == NULL)
61
0
    return SSH_ERR_INVALID_ARGUMENT;
62
0
  if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0)
63
0
    return r;
64
65
0
  return 0;
66
0
}
67
68
static int
69
ssh_ed25519_serialize_private(const struct sshkey *key, struct sshbuf *b,
70
    enum sshkey_serialize_rep opts)
71
0
{
72
0
  int r;
73
74
0
  if ((r = sshbuf_put_string(b, key->ed25519_pk, ED25519_PK_SZ)) != 0 ||
75
0
      (r = sshbuf_put_string(b, key->ed25519_sk, ED25519_SK_SZ)) != 0)
76
0
    return r;
77
78
0
  return 0;
79
0
}
80
81
static int
82
ssh_ed25519_generate(struct sshkey *k, int bits)
83
0
{
84
0
  if ((k->ed25519_pk = malloc(ED25519_PK_SZ)) == NULL ||
85
0
      (k->ed25519_sk = malloc(ED25519_SK_SZ)) == NULL)
86
0
    return SSH_ERR_ALLOC_FAIL;
87
0
  crypto_sign_ed25519_keypair(k->ed25519_pk, k->ed25519_sk);
88
0
  return 0;
89
0
}
90
91
static int
92
ssh_ed25519_copy_public(const struct sshkey *from, struct sshkey *to)
93
0
{
94
0
  if (from->ed25519_pk == NULL)
95
0
    return 0; /* XXX SSH_ERR_INTERNAL_ERROR ? */
96
0
  if ((to->ed25519_pk = malloc(ED25519_PK_SZ)) == NULL)
97
0
    return SSH_ERR_ALLOC_FAIL;
98
0
  memcpy(to->ed25519_pk, from->ed25519_pk, ED25519_PK_SZ);
99
0
  return 0;
100
0
}
101
102
static int
103
ssh_ed25519_deserialize_public(const char *ktype, struct sshbuf *b,
104
    struct sshkey *key)
105
703
{
106
703
  u_char *pk = NULL;
107
703
  size_t len = 0;
108
703
  int r;
109
110
703
  if ((r = sshbuf_get_string(b, &pk, &len)) != 0)
111
76
    return r;
112
627
  if (len != ED25519_PK_SZ) {
113
63
    freezero(pk, len);
114
63
    return SSH_ERR_INVALID_FORMAT;
115
63
  }
116
564
  key->ed25519_pk = pk;
117
564
  return 0;
118
627
}
119
120
static int
121
ssh_ed25519_deserialize_private(const char *ktype, struct sshbuf *b,
122
    struct sshkey *key)
123
146
{
124
146
  int r;
125
146
  size_t sklen = 0;
126
146
  u_char *ed25519_sk = NULL;
127
128
146
  if ((r = ssh_ed25519_deserialize_public(NULL, b, key)) != 0)
129
113
    goto out;
130
33
  if ((r = sshbuf_get_string(b, &ed25519_sk, &sklen)) != 0)
131
3
    goto out;
132
30
  if (sklen != ED25519_SK_SZ) {
133
29
    r = SSH_ERR_INVALID_FORMAT;
134
29
    goto out;
135
29
  }
136
1
  key->ed25519_sk = ed25519_sk;
137
1
  ed25519_sk = NULL; /* transferred */
138
  /* success */
139
1
  r = 0;
140
146
 out:
141
146
  freezero(ed25519_sk, sklen);
142
146
  return r;
143
1
}
144
145
static int
146
ssh_ed25519_sign(struct sshkey *key,
147
    u_char **sigp, size_t *lenp,
148
    const u_char *data, size_t datalen,
149
    const char *alg, const char *sk_provider, const char *sk_pin, u_int compat)
150
0
{
151
0
  u_char *sig = NULL;
152
0
  size_t slen = 0, len;
153
0
  unsigned long long smlen;
154
0
  int r, ret;
155
0
  struct sshbuf *b = NULL;
156
157
0
  if (lenp != NULL)
158
0
    *lenp = 0;
159
0
  if (sigp != NULL)
160
0
    *sigp = NULL;
161
162
0
  if (key == NULL ||
163
0
      sshkey_type_plain(key->type) != KEY_ED25519 ||
164
0
      key->ed25519_sk == NULL ||
165
0
      datalen >= INT_MAX - crypto_sign_ed25519_BYTES)
166
0
    return SSH_ERR_INVALID_ARGUMENT;
167
0
  smlen = slen = datalen + crypto_sign_ed25519_BYTES;
168
0
  if ((sig = malloc(slen)) == NULL)
169
0
    return SSH_ERR_ALLOC_FAIL;
170
171
0
  if ((ret = crypto_sign_ed25519(sig, &smlen, data, datalen,
172
0
      key->ed25519_sk)) != 0 || smlen <= datalen) {
173
0
    r = SSH_ERR_INVALID_ARGUMENT; /* XXX better error? */
174
0
    goto out;
175
0
  }
176
  /* encode signature */
177
0
  if ((b = sshbuf_new()) == NULL) {
178
0
    r = SSH_ERR_ALLOC_FAIL;
179
0
    goto out;
180
0
  }
181
0
  if ((r = sshbuf_put_cstring(b, "ssh-ed25519")) != 0 ||
182
0
      (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0)
183
0
    goto out;
184
0
  len = sshbuf_len(b);
185
0
  if (sigp != NULL) {
186
0
    if ((*sigp = malloc(len)) == NULL) {
187
0
      r = SSH_ERR_ALLOC_FAIL;
188
0
      goto out;
189
0
    }
190
0
    memcpy(*sigp, sshbuf_ptr(b), len);
191
0
  }
192
0
  if (lenp != NULL)
193
0
    *lenp = len;
194
  /* success */
195
0
  r = 0;
196
0
 out:
197
0
  sshbuf_free(b);
198
0
  if (sig != NULL)
199
0
    freezero(sig, slen);
200
201
0
  return r;
202
0
}
203
204
static int
205
ssh_ed25519_verify(const struct sshkey *key,
206
    const u_char *sig, size_t siglen,
207
    const u_char *data, size_t dlen, const char *alg, u_int compat,
208
    struct sshkey_sig_details **detailsp)
209
191
{
210
191
  struct sshbuf *b = NULL;
211
191
  char *ktype = NULL;
212
191
  const u_char *sigblob;
213
191
  u_char *sm = NULL, *m = NULL;
214
191
  size_t len;
215
191
  unsigned long long smlen = 0, mlen = 0;
216
191
  int r, ret;
217
218
191
  if (key == NULL ||
219
191
      sshkey_type_plain(key->type) != KEY_ED25519 ||
220
191
      key->ed25519_pk == NULL ||
221
191
      dlen >= INT_MAX - crypto_sign_ed25519_BYTES ||
222
191
      sig == NULL || siglen == 0)
223
0
    return SSH_ERR_INVALID_ARGUMENT;
224
225
191
  if ((b = sshbuf_from(sig, siglen)) == NULL)
226
0
    return SSH_ERR_ALLOC_FAIL;
227
191
  if ((r = sshbuf_get_cstring(b, &ktype, NULL)) != 0 ||
228
191
      (r = sshbuf_get_string_direct(b, &sigblob, &len)) != 0)
229
22
    goto out;
230
169
  if (strcmp("ssh-ed25519", ktype) != 0) {
231
102
    r = SSH_ERR_KEY_TYPE_MISMATCH;
232
102
    goto out;
233
102
  }
234
67
  if (sshbuf_len(b) != 0) {
235
14
    r = SSH_ERR_UNEXPECTED_TRAILING_DATA;
236
14
    goto out;
237
14
  }
238
53
  if (len > crypto_sign_ed25519_BYTES) {
239
1
    r = SSH_ERR_INVALID_FORMAT;
240
1
    goto out;
241
1
  }
242
52
  if (dlen >= SIZE_MAX - len) {
243
0
    r = SSH_ERR_INVALID_ARGUMENT;
244
0
    goto out;
245
0
  }
246
52
  smlen = len + dlen;
247
52
  mlen = smlen;
248
52
  if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) {
249
0
    r = SSH_ERR_ALLOC_FAIL;
250
0
    goto out;
251
0
  }
252
52
  memcpy(sm, sigblob, len);
253
52
  memcpy(sm+len, data, dlen);
254
52
  if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen,
255
52
      key->ed25519_pk)) != 0) {
256
52
    debug2_f("crypto_sign_ed25519_open failed: %d", ret);
257
52
  }
258
52
  if (ret != 0 || mlen != dlen) {
259
52
    r = SSH_ERR_SIGNATURE_INVALID;
260
52
    goto out;
261
52
  }
262
  /* XXX compare 'm' and 'data' ? */
263
  /* success */
264
0
  r = 0;
265
191
 out:
266
191
  if (sm != NULL)
267
52
    freezero(sm, smlen);
268
191
  if (m != NULL)
269
52
    freezero(m, smlen); /* NB mlen may be invalid if r != 0 */
270
191
  sshbuf_free(b);
271
191
  free(ktype);
272
191
  return r;
273
0
}
274
275
/* NB. not static; used by ED25519-SK */
276
const struct sshkey_impl_funcs sshkey_ed25519_funcs = {
277
  /* .size = */   NULL,
278
  /* .alloc = */    NULL,
279
  /* .cleanup = */  ssh_ed25519_cleanup,
280
  /* .equal = */    ssh_ed25519_equal,
281
  /* .ssh_serialize_public = */ ssh_ed25519_serialize_public,
282
  /* .ssh_deserialize_public = */ ssh_ed25519_deserialize_public,
283
  /* .ssh_serialize_private = */ ssh_ed25519_serialize_private,
284
  /* .ssh_deserialize_private = */ ssh_ed25519_deserialize_private,
285
  /* .generate = */ ssh_ed25519_generate,
286
  /* .copy_public = */  ssh_ed25519_copy_public,
287
  /* .sign = */   ssh_ed25519_sign,
288
  /* .verify = */   ssh_ed25519_verify,
289
};
290
291
const struct sshkey_impl sshkey_ed25519_impl = {
292
  /* .name = */   "ssh-ed25519",
293
  /* .shortname = */  "ED25519",
294
  /* .sigalg = */   NULL,
295
  /* .type = */   KEY_ED25519,
296
  /* .nid = */    0,
297
  /* .cert = */   0,
298
  /* .sigonly = */  0,
299
  /* .keybits = */  256,
300
  /* .funcs = */    &sshkey_ed25519_funcs,
301
};
302
303
const struct sshkey_impl sshkey_ed25519_cert_impl = {
304
  /* .name = */   "ssh-ed25519-cert-v01@openssh.com",
305
  /* .shortname = */  "ED25519-CERT",
306
  /* .sigalg = */   NULL,
307
  /* .type = */   KEY_ED25519_CERT,
308
  /* .nid = */    0,
309
  /* .cert = */   1,
310
  /* .sigonly = */  0,
311
  /* .keybits = */  256,
312
  /* .funcs = */    &sshkey_ed25519_funcs,
313
};