@@ -41,7 +41,53 @@ typedef struct xorkey_st {
41
41
int haspubkey ;
42
42
} XORKEY ;
43
43
44
- /* We define a dummy TLS group called "xorgroup" for test purposes */
44
+
45
+ /* Key Management for the dummy XOR KEX and KEM algorithms */
46
+
47
+ static OSSL_FUNC_keymgmt_new_fn xor_newdata ;
48
+ static OSSL_FUNC_keymgmt_free_fn xor_freedata ;
49
+ static OSSL_FUNC_keymgmt_has_fn xor_has ;
50
+ static OSSL_FUNC_keymgmt_copy_fn xor_copy ;
51
+ static OSSL_FUNC_keymgmt_gen_init_fn xor_gen_init ;
52
+ static OSSL_FUNC_keymgmt_gen_set_params_fn xor_gen_set_params ;
53
+ static OSSL_FUNC_keymgmt_gen_settable_params_fn xor_gen_settable_params ;
54
+ static OSSL_FUNC_keymgmt_gen_fn xor_gen ;
55
+ static OSSL_FUNC_keymgmt_gen_cleanup_fn xor_gen_cleanup ;
56
+ static OSSL_FUNC_keymgmt_get_params_fn xor_get_params ;
57
+ static OSSL_FUNC_keymgmt_gettable_params_fn xor_gettable_params ;
58
+ static OSSL_FUNC_keymgmt_set_params_fn xor_set_params ;
59
+ static OSSL_FUNC_keymgmt_settable_params_fn xor_settable_params ;
60
+
61
+ /*
62
+ * Dummy "XOR" Key Exchange algorithm. We just xor the private and public keys
63
+ * together. Don't use this!
64
+ */
65
+
66
+ static OSSL_FUNC_keyexch_newctx_fn xor_newctx ;
67
+ static OSSL_FUNC_keyexch_init_fn xor_init ;
68
+ static OSSL_FUNC_keyexch_set_peer_fn xor_set_peer ;
69
+ static OSSL_FUNC_keyexch_derive_fn xor_derive ;
70
+ static OSSL_FUNC_keyexch_freectx_fn xor_freectx ;
71
+ static OSSL_FUNC_keyexch_dupctx_fn xor_dupctx ;
72
+
73
+ /*
74
+ * Dummy "XOR" Key Encapsulation Method. We just build a KEM over the xor KEX.
75
+ * Don't use this!
76
+ */
77
+
78
+ static OSSL_FUNC_kem_newctx_fn xor_newctx ;
79
+ static OSSL_FUNC_kem_freectx_fn xor_freectx ;
80
+ static OSSL_FUNC_kem_dupctx_fn xor_dupctx ;
81
+ static OSSL_FUNC_kem_encapsulate_init_fn xor_init ;
82
+ static OSSL_FUNC_kem_encapsulate_fn xor_encapsulate ;
83
+ static OSSL_FUNC_kem_decapsulate_init_fn xor_init ;
84
+ static OSSL_FUNC_kem_decapsulate_fn xor_decapsulate ;
85
+
86
+
87
+ /*
88
+ * We define 2 dummy TLS groups called "xorgroup" and "xorkemgroup" for test
89
+ * purposes
90
+ */
45
91
struct tls_group_st {
46
92
unsigned int group_id ; /* for "tls-group-id", see provider-base(7) */
47
93
unsigned int secbits ;
@@ -133,16 +179,10 @@ static int tls_prov_get_capabilities(void *provctx, const char *capability,
133
179
* together. Don't use this!
134
180
*/
135
181
136
- static OSSL_FUNC_keyexch_newctx_fn xor_newctx ;
137
- static OSSL_FUNC_keyexch_init_fn xor_init ;
138
- static OSSL_FUNC_keyexch_set_peer_fn xor_set_peer ;
139
- static OSSL_FUNC_keyexch_derive_fn xor_derive ;
140
- static OSSL_FUNC_keyexch_freectx_fn xor_freectx ;
141
- static OSSL_FUNC_keyexch_dupctx_fn xor_dupctx ;
142
-
143
182
typedef struct {
144
183
XORKEY * key ;
145
184
XORKEY * peerkey ;
185
+ void * provctx ;
146
186
} PROV_XOR_CTX ;
147
187
148
188
static void * xor_newctx (void * provctx )
@@ -152,6 +192,8 @@ static void *xor_newctx(void *provctx)
152
192
if (pxorctx == NULL )
153
193
return NULL ;
154
194
195
+ pxorctx -> provctx = provctx ;
196
+
155
197
return pxorctx ;
156
198
}
157
199
@@ -235,21 +277,136 @@ static const OSSL_ALGORITHM tls_prov_keyexch[] = {
235
277
{ NULL , NULL , NULL }
236
278
};
237
279
238
- /* Key Management for the dummy XOR key exchange algorithm */
280
+ /*
281
+ * Dummy "XOR" Key Encapsulation Method. We just build a KEM over the xor KEX.
282
+ * Don't use this!
283
+ */
239
284
240
- static OSSL_FUNC_keymgmt_new_fn xor_newdata ;
241
- static OSSL_FUNC_keymgmt_free_fn xor_freedata ;
242
- static OSSL_FUNC_keymgmt_has_fn xor_has ;
243
- static OSSL_FUNC_keymgmt_copy_fn xor_copy ;
244
- static OSSL_FUNC_keymgmt_gen_init_fn xor_gen_init ;
245
- static OSSL_FUNC_keymgmt_gen_set_params_fn xor_gen_set_params ;
246
- static OSSL_FUNC_keymgmt_gen_settable_params_fn xor_gen_settable_params ;
247
- static OSSL_FUNC_keymgmt_gen_fn xor_gen ;
248
- static OSSL_FUNC_keymgmt_gen_cleanup_fn xor_gen_cleanup ;
249
- static OSSL_FUNC_keymgmt_get_params_fn xor_get_params ;
250
- static OSSL_FUNC_keymgmt_gettable_params_fn xor_gettable_params ;
251
- static OSSL_FUNC_keymgmt_set_params_fn xor_set_params ;
252
- static OSSL_FUNC_keymgmt_settable_params_fn xor_settable_params ;
285
+ static int xor_encapsulate (void * vpxorctx ,
286
+ unsigned char * ct , size_t * ctlen ,
287
+ unsigned char * ss , size_t * sslen )
288
+ {
289
+ /*
290
+ * We are building this around a KEX:
291
+ *
292
+ * 1. we generate ephemeral keypair
293
+ * 2. we encode our ephemeral pubkey as the outgoing ct
294
+ * 3. we derive using our ephemeral privkey in combination with the peer
295
+ * pubkey from the ctx; the result is our ss.
296
+ */
297
+ int rv = 0 ;
298
+ void * genctx = NULL , * derivectx = NULL ;
299
+ XORKEY * ourkey = NULL ;
300
+ PROV_XOR_CTX * pxorctx = vpxorctx ;
301
+
302
+ if (ct == NULL || ss == NULL ) {
303
+ /* Just return sizes */
304
+
305
+ if (ctlen == NULL && sslen == NULL )
306
+ return 0 ;
307
+ if (ctlen != NULL )
308
+ * ctlen = XOR_KEY_SIZE ;
309
+ if (sslen != NULL )
310
+ * sslen = XOR_KEY_SIZE ;
311
+ return 1 ;
312
+ }
313
+
314
+ /* 1. Generate keypair */
315
+ genctx = xor_gen_init (pxorctx -> provctx , OSSL_KEYMGMT_SELECT_KEYPAIR );
316
+ if (genctx == NULL )
317
+ goto end ;
318
+ ourkey = xor_gen (genctx , NULL , NULL );
319
+ if (ourkey == NULL )
320
+ goto end ;
321
+
322
+ /* 2. Encode ephemeral pubkey as ct */
323
+ memcpy (ct , ourkey -> pubkey , XOR_KEY_SIZE );
324
+ * ctlen = XOR_KEY_SIZE ;
325
+
326
+ /* 3. Derive ss via KEX */
327
+ derivectx = xor_newctx (pxorctx -> provctx );
328
+ if (derivectx == NULL
329
+ || !xor_init (derivectx , ourkey )
330
+ || !xor_set_peer (derivectx , pxorctx -> key )
331
+ || !xor_derive (derivectx , ss , sslen , XOR_KEY_SIZE ))
332
+ goto end ;
333
+
334
+ rv = 1 ;
335
+
336
+ end :
337
+ xor_gen_cleanup (genctx );
338
+ xor_freedata (ourkey );
339
+ xor_freectx (derivectx );
340
+ return rv ;
341
+ }
342
+
343
+ static int xor_decapsulate (void * vpxorctx ,
344
+ unsigned char * ss , size_t * sslen ,
345
+ const unsigned char * ct , size_t ctlen )
346
+ {
347
+ /*
348
+ * We are building this around a KEX:
349
+ *
350
+ * - ct is our peer's pubkey
351
+ * - decapsulate is just derive.
352
+ */
353
+ int rv = 0 ;
354
+ void * derivectx = NULL ;
355
+ XORKEY * peerkey = NULL ;
356
+ PROV_XOR_CTX * pxorctx = vpxorctx ;
357
+
358
+ if (ss == NULL ) {
359
+ /* Just return size */
360
+ if (sslen == NULL )
361
+ return 0 ;
362
+ * sslen = XOR_KEY_SIZE ;
363
+ return 1 ;
364
+ }
365
+
366
+ if (ctlen != XOR_KEY_SIZE )
367
+ return 0 ;
368
+ peerkey = xor_newdata (pxorctx -> provctx );
369
+ if (peerkey == NULL )
370
+ goto end ;
371
+ memcpy (peerkey -> pubkey , ct , XOR_KEY_SIZE );
372
+
373
+ /* Derive ss via KEX */
374
+ derivectx = xor_newctx (pxorctx -> provctx );
375
+ if (derivectx == NULL
376
+ || !xor_init (derivectx , pxorctx -> key )
377
+ || !xor_set_peer (derivectx , peerkey )
378
+ || !xor_derive (derivectx , ss , sslen , XOR_KEY_SIZE ))
379
+ goto end ;
380
+
381
+ rv = 1 ;
382
+
383
+ end :
384
+ xor_freedata (peerkey );
385
+ xor_freectx (derivectx );
386
+ return rv ;
387
+ }
388
+
389
+ static const OSSL_DISPATCH xor_kem_functions [] = {
390
+ { OSSL_FUNC_KEM_NEWCTX , (void (* )(void ))xor_newctx },
391
+ { OSSL_FUNC_KEM_FREECTX , (void (* )(void ))xor_freectx },
392
+ { OSSL_FUNC_KEM_DUPCTX , (void (* )(void ))xor_dupctx },
393
+ { OSSL_FUNC_KEM_ENCAPSULATE_INIT , (void (* )(void ))xor_init },
394
+ { OSSL_FUNC_KEM_ENCAPSULATE , (void (* )(void ))xor_encapsulate },
395
+ { OSSL_FUNC_KEM_DECAPSULATE_INIT , (void (* )(void ))xor_init },
396
+ { OSSL_FUNC_KEM_DECAPSULATE , (void (* )(void ))xor_decapsulate },
397
+ { 0 , NULL }
398
+ };
399
+
400
+ static const OSSL_ALGORITHM tls_prov_kem [] = {
401
+ /*
402
+ * Obviously this is not FIPS approved, but in order to test in conjuction
403
+ * with the FIPS provider we pretend that it is.
404
+ */
405
+ { "XOR" , "provider=tls-provider,fips=yes" , xor_kem_functions },
406
+ { NULL , NULL , NULL }
407
+ };
408
+
409
+ /* Key Management for the dummy XOR key exchange algorithm */
253
410
254
411
static void * xor_newdata (void * provctx )
255
412
{
@@ -483,6 +640,8 @@ static const OSSL_ALGORITHM *tls_prov_query(void *provctx, int operation_id,
483
640
return tls_prov_keymgmt ;
484
641
case OSSL_OP_KEYEXCH :
485
642
return tls_prov_keyexch ;
643
+ case OSSL_OP_KEM :
644
+ return tls_prov_kem ;
486
645
}
487
646
return NULL ;
488
647
}
0 commit comments