1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483
|
{-# LANGUAGE ExistentialQuantification #-}
{-# LANGUAGE RankNTypes #-}
{-# OPTIONS_HADDOCK hide #-}
module Network.TLS.Crypto (
HashContext,
HashCtx,
hashInit,
hashUpdate,
hashUpdateSSL,
hashFinal,
module Network.TLS.Crypto.DH,
module Network.TLS.Crypto.IES,
module Network.TLS.Crypto.Types,
-- * Hash
hash,
Hash (..),
hashName,
hashDigestSize,
hashBlockSize,
-- * key exchange generic interface
PubKey (..),
PrivKey (..),
PublicKey,
PrivateKey,
SignatureParams (..),
isKeyExchangeSignatureKey,
findKeyExchangeSignatureAlg,
findFiniteFieldGroup,
findEllipticCurveGroup,
kxEncrypt,
kxDecrypt,
kxSign,
kxVerify,
kxCanUseRSApkcs1,
kxCanUseRSApss,
kxSupportedPrivKeyEC,
KxError (..),
RSAEncoding (..),
) where
import qualified Crypto.ECC as ECDSA
import Crypto.Error
import qualified Crypto.Hash as H
import Crypto.Number.Basic (numBits)
import qualified Crypto.PubKey.DH as DH
import qualified Crypto.PubKey.DSA as DSA
import qualified Crypto.PubKey.ECC.ECDSA as ECDSA_ECC
import qualified Crypto.PubKey.ECC.Types as ECC
import qualified Crypto.PubKey.ECDSA as ECDSA
import qualified Crypto.PubKey.Ed25519 as Ed25519
import qualified Crypto.PubKey.Ed448 as Ed448
import qualified Crypto.PubKey.RSA as RSA
import qualified Crypto.PubKey.RSA.PKCS15 as RSA
import qualified Crypto.PubKey.RSA.PSS as PSS
import Crypto.Random
import qualified Data.ByteArray as B (convert)
import qualified Data.ByteString as B
import Data.X509 (
PrivKey (..),
PrivKeyEC (..),
PubKey (..),
PubKeyEC (..),
SerializedPoint (..),
)
import Data.X509.EC (ecPrivKeyCurveName, ecPubKeyCurveName, unserializePoint)
import Network.TLS.Crypto.DH
import Network.TLS.Crypto.IES
import Network.TLS.Crypto.Types
import Network.TLS.Imports
import Data.ASN1.BinaryEncoding (BER (..), DER (..))
import Data.ASN1.Encoding
import Data.ASN1.Types
import Data.Proxy
{-# DEPRECATED PublicKey "use PubKey" #-}
type PublicKey = PubKey
{-# DEPRECATED PrivateKey "use PrivKey" #-}
type PrivateKey = PrivKey
data KxError
= RSAError RSA.Error
| KxUnsupported
deriving (Show)
isKeyExchangeSignatureKey :: KeyExchangeSignatureAlg -> PubKey -> Bool
isKeyExchangeSignatureKey = f
where
f KX_RSA (PubKeyRSA _) = True
f KX_DSA (PubKeyDSA _) = True
f KX_ECDSA (PubKeyEC _) = True
f KX_ECDSA (PubKeyEd25519 _) = True
f KX_ECDSA (PubKeyEd448 _) = True
f _ _ = False
findKeyExchangeSignatureAlg
:: (PubKey, PrivKey) -> Maybe KeyExchangeSignatureAlg
findKeyExchangeSignatureAlg keyPair =
case keyPair of
(PubKeyRSA _, PrivKeyRSA _) -> Just KX_RSA
(PubKeyDSA _, PrivKeyDSA _) -> Just KX_DSA
(PubKeyEC _, PrivKeyEC _) -> Just KX_ECDSA
(PubKeyEd25519 _, PrivKeyEd25519 _) -> Just KX_ECDSA
(PubKeyEd448 _, PrivKeyEd448 _) -> Just KX_ECDSA
_ -> Nothing
findFiniteFieldGroup :: DH.Params -> Maybe Group
findFiniteFieldGroup params = lookup (pg params) table
where
pg (DH.Params p g _) = (p, g)
table =
[ (pg prms, grp)
| grp <- availableFFGroups
, let prms = fromJust $ dhParamsForGroup grp
]
findEllipticCurveGroup :: PubKeyEC -> Maybe Group
findEllipticCurveGroup ecPub =
case ecPubKeyCurveName ecPub of
Just ECC.SEC_p256r1 -> Just P256
Just ECC.SEC_p384r1 -> Just P384
Just ECC.SEC_p521r1 -> Just P521
_ -> Nothing
-- functions to use the hidden class.
hashInit :: Hash -> HashContext
hashInit MD5 = HashContext $ ContextSimple (H.hashInit :: H.Context H.MD5)
hashInit SHA1 = HashContext $ ContextSimple (H.hashInit :: H.Context H.SHA1)
hashInit SHA224 = HashContext $ ContextSimple (H.hashInit :: H.Context H.SHA224)
hashInit SHA256 = HashContext $ ContextSimple (H.hashInit :: H.Context H.SHA256)
hashInit SHA384 = HashContext $ ContextSimple (H.hashInit :: H.Context H.SHA384)
hashInit SHA512 = HashContext $ ContextSimple (H.hashInit :: H.Context H.SHA512)
hashInit SHA1_MD5 = HashContextSSL H.hashInit H.hashInit
hashUpdate :: HashContext -> B.ByteString -> HashCtx
hashUpdate (HashContext (ContextSimple h)) b = HashContext $ ContextSimple (H.hashUpdate h b)
hashUpdate (HashContextSSL sha1Ctx md5Ctx) b =
HashContextSSL (H.hashUpdate sha1Ctx b) (H.hashUpdate md5Ctx b)
hashUpdateSSL
:: HashCtx
-> (B.ByteString, B.ByteString)
-- ^ (for the md5 context, for the sha1 context)
-> HashCtx
hashUpdateSSL (HashContext _) _ = error "internal error: update SSL without a SSL Context"
hashUpdateSSL (HashContextSSL sha1Ctx md5Ctx) (b1, b2) =
HashContextSSL (H.hashUpdate sha1Ctx b2) (H.hashUpdate md5Ctx b1)
hashFinal :: HashCtx -> B.ByteString
hashFinal (HashContext (ContextSimple h)) = B.convert $ H.hashFinalize h
hashFinal (HashContextSSL sha1Ctx md5Ctx) =
B.concat [B.convert (H.hashFinalize md5Ctx), B.convert (H.hashFinalize sha1Ctx)]
data Hash = MD5 | SHA1 | SHA224 | SHA256 | SHA384 | SHA512 | SHA1_MD5
deriving (Show, Eq)
data HashContext
= HashContext ContextSimple
| HashContextSSL (H.Context H.SHA1) (H.Context H.MD5)
instance Show HashContext where
show _ = "hash-context"
data ContextSimple
= forall alg. H.HashAlgorithm alg => ContextSimple (H.Context alg)
type HashCtx = HashContext
hash :: Hash -> B.ByteString -> B.ByteString
hash MD5 b = B.convert . (H.hash :: B.ByteString -> H.Digest H.MD5) $ b
hash SHA1 b = B.convert . (H.hash :: B.ByteString -> H.Digest H.SHA1) $ b
hash SHA224 b = B.convert . (H.hash :: B.ByteString -> H.Digest H.SHA224) $ b
hash SHA256 b = B.convert . (H.hash :: B.ByteString -> H.Digest H.SHA256) $ b
hash SHA384 b = B.convert . (H.hash :: B.ByteString -> H.Digest H.SHA384) $ b
hash SHA512 b = B.convert . (H.hash :: B.ByteString -> H.Digest H.SHA512) $ b
hash SHA1_MD5 b =
B.concat [B.convert (md5Hash b), B.convert (sha1Hash b)]
where
sha1Hash :: B.ByteString -> H.Digest H.SHA1
sha1Hash = H.hash
md5Hash :: B.ByteString -> H.Digest H.MD5
md5Hash = H.hash
hashName :: Hash -> String
hashName = show
-- | Digest size in bytes.
hashDigestSize :: Hash -> Int
hashDigestSize MD5 = 16
hashDigestSize SHA1 = 20
hashDigestSize SHA224 = 28
hashDigestSize SHA256 = 32
hashDigestSize SHA384 = 48
hashDigestSize SHA512 = 64
hashDigestSize SHA1_MD5 = 36
hashBlockSize :: Hash -> Int
hashBlockSize MD5 = 64
hashBlockSize SHA1 = 64
hashBlockSize SHA224 = 64
hashBlockSize SHA256 = 64
hashBlockSize SHA384 = 128
hashBlockSize SHA512 = 128
hashBlockSize SHA1_MD5 = 64
{- key exchange methods encrypt and decrypt for each supported algorithm -}
generalizeRSAError :: Either RSA.Error a -> Either KxError a
generalizeRSAError (Left e) = Left (RSAError e)
generalizeRSAError (Right x) = Right x
kxEncrypt
:: MonadRandom r => PublicKey -> ByteString -> r (Either KxError ByteString)
kxEncrypt (PubKeyRSA pk) b = generalizeRSAError <$> RSA.encrypt pk b
kxEncrypt _ _ = return (Left KxUnsupported)
kxDecrypt
:: MonadRandom r => PrivateKey -> ByteString -> r (Either KxError ByteString)
kxDecrypt (PrivKeyRSA pk) b = generalizeRSAError <$> RSA.decryptSafer pk b
kxDecrypt _ _ = return (Left KxUnsupported)
data RSAEncoding = RSApkcs1 | RSApss deriving (Show, Eq)
-- | Test the RSASSA-PKCS1 length condition described in RFC 8017 section 9.2,
-- i.e. @emLen >= tLen + 11@. Lengths are in bytes.
kxCanUseRSApkcs1 :: RSA.PublicKey -> Hash -> Bool
kxCanUseRSApkcs1 pk h = RSA.public_size pk >= tLen + 11
where
tLen = prefixSize h + hashDigestSize h
prefixSize MD5 = 18
prefixSize SHA1 = 15
prefixSize SHA224 = 19
prefixSize SHA256 = 19
prefixSize SHA384 = 19
prefixSize SHA512 = 19
prefixSize _ = error (show h ++ " is not supported for RSASSA-PKCS1")
-- | Test the RSASSA-PSS length condition described in RFC 8017 section 9.1.1,
-- i.e. @emBits >= 8hLen + 8sLen + 9@. Lengths are in bits.
kxCanUseRSApss :: RSA.PublicKey -> Hash -> Bool
kxCanUseRSApss pk h = numBits (RSA.public_n pk) >= 16 * hashDigestSize h + 10
-- Signature algorithm and associated parameters.
--
-- FIXME add RSAPSSParams
data SignatureParams
= RSAParams Hash RSAEncoding
| DSAParams
| ECDSAParams Hash
| Ed25519Params
| Ed448Params
deriving (Show, Eq)
-- Verify that the signature matches the given message, using the
-- public key.
--
kxVerify :: PublicKey -> SignatureParams -> ByteString -> ByteString -> Bool
kxVerify (PubKeyRSA pk) (RSAParams alg RSApkcs1) msg sign = rsaVerifyHash alg pk msg sign
kxVerify (PubKeyRSA pk) (RSAParams alg RSApss) msg sign = rsapssVerifyHash alg pk msg sign
kxVerify (PubKeyDSA pk) DSAParams msg signBS =
case dsaToSignature signBS of
Just sig -> DSA.verify H.SHA1 pk sig msg
_ -> False
where
dsaToSignature :: ByteString -> Maybe DSA.Signature
dsaToSignature b =
case decodeASN1' BER b of
Left _ -> Nothing
Right asn1 ->
case asn1 of
Start Sequence : IntVal r : IntVal s : End Sequence : _ ->
Just DSA.Signature{DSA.sign_r = r, DSA.sign_s = s}
_ ->
Nothing
kxVerify (PubKeyEC key) (ECDSAParams alg) msg sigBS =
fromMaybe False $
join $
withPubKeyEC key verifyProxy verifyClassic Nothing
where
decodeSignatureASN1 buildRS =
case decodeASN1' BER sigBS of
Left _ -> Nothing
Right [Start Sequence, IntVal r, IntVal s, End Sequence] ->
Just (buildRS r s)
Right _ -> Nothing
verifyProxy prx pubkey = do
rs <- decodeSignatureASN1 (,)
signature <- maybeCryptoError $ ECDSA.signatureFromIntegers prx rs
verifyF <- withAlg (ECDSA.verify prx)
return $ verifyF pubkey signature msg
verifyClassic pubkey = do
signature <- decodeSignatureASN1 ECDSA_ECC.Signature
verifyF <- withAlg ECDSA_ECC.verify
return $ verifyF pubkey signature msg
withAlg :: (forall hash. H.HashAlgorithm hash => hash -> a) -> Maybe a
withAlg f = case alg of
MD5 -> Just (f H.MD5)
SHA1 -> Just (f H.SHA1)
SHA224 -> Just (f H.SHA224)
SHA256 -> Just (f H.SHA256)
SHA384 -> Just (f H.SHA384)
SHA512 -> Just (f H.SHA512)
_ -> Nothing
kxVerify (PubKeyEd25519 key) Ed25519Params msg sigBS =
case Ed25519.signature sigBS of
CryptoPassed sig -> Ed25519.verify key msg sig
_ -> False
kxVerify (PubKeyEd448 key) Ed448Params msg sigBS =
case Ed448.signature sigBS of
CryptoPassed sig -> Ed448.verify key msg sig
_ -> False
kxVerify _ _ _ _ = False
-- Sign the given message using the private key.
--
kxSign
:: MonadRandom r
=> PrivateKey
-> PublicKey
-> SignatureParams
-> ByteString
-> r (Either KxError ByteString)
kxSign (PrivKeyRSA pk) (PubKeyRSA _) (RSAParams hashAlg RSApkcs1) msg =
generalizeRSAError <$> rsaSignHash hashAlg pk msg
kxSign (PrivKeyRSA pk) (PubKeyRSA _) (RSAParams hashAlg RSApss) msg =
generalizeRSAError <$> rsapssSignHash hashAlg pk msg
kxSign (PrivKeyDSA pk) (PubKeyDSA _) DSAParams msg = do
sign <- DSA.sign pk H.SHA1 msg
return (Right $ encodeASN1' DER $ dsaSequence sign)
where
dsaSequence sign =
[ Start Sequence
, IntVal (DSA.sign_r sign)
, IntVal (DSA.sign_s sign)
, End Sequence
]
kxSign (PrivKeyEC pk) (PubKeyEC _) (ECDSAParams hashAlg) msg =
case withPrivKeyEC pk doSign (const unsupported) unsupported of
Nothing -> unsupported
Just run -> fmap encode <$> run
where
encode (r, s) =
encodeASN1'
DER
[Start Sequence, IntVal r, IntVal s, End Sequence]
doSign prx privkey = do
msig <- ecdsaSignHash prx hashAlg privkey msg
return $ case msig of
Nothing -> Left KxUnsupported
Just sign -> Right (ECDSA.signatureToIntegers prx sign)
unsupported = return $ Left KxUnsupported
kxSign (PrivKeyEd25519 pk) (PubKeyEd25519 pub) Ed25519Params msg =
return $ Right $ B.convert $ Ed25519.sign pk pub msg
kxSign (PrivKeyEd448 pk) (PubKeyEd448 pub) Ed448Params msg =
return $ Right $ B.convert $ Ed448.sign pk pub msg
kxSign _ _ _ _ =
return (Left KxUnsupported)
rsaSignHash
:: MonadRandom m
=> Hash
-> RSA.PrivateKey
-> ByteString
-> m (Either RSA.Error ByteString)
rsaSignHash SHA1_MD5 pk msg = RSA.signSafer noHash pk msg
rsaSignHash MD5 pk msg = RSA.signSafer (Just H.MD5) pk msg
rsaSignHash SHA1 pk msg = RSA.signSafer (Just H.SHA1) pk msg
rsaSignHash SHA224 pk msg = RSA.signSafer (Just H.SHA224) pk msg
rsaSignHash SHA256 pk msg = RSA.signSafer (Just H.SHA256) pk msg
rsaSignHash SHA384 pk msg = RSA.signSafer (Just H.SHA384) pk msg
rsaSignHash SHA512 pk msg = RSA.signSafer (Just H.SHA512) pk msg
rsapssSignHash
:: MonadRandom m
=> Hash
-> RSA.PrivateKey
-> ByteString
-> m (Either RSA.Error ByteString)
rsapssSignHash SHA256 pk msg = PSS.signSafer (PSS.defaultPSSParams H.SHA256) pk msg
rsapssSignHash SHA384 pk msg = PSS.signSafer (PSS.defaultPSSParams H.SHA384) pk msg
rsapssSignHash SHA512 pk msg = PSS.signSafer (PSS.defaultPSSParams H.SHA512) pk msg
rsapssSignHash _ _ _ = error "rsapssSignHash: unsupported hash"
rsaVerifyHash :: Hash -> RSA.PublicKey -> ByteString -> ByteString -> Bool
rsaVerifyHash SHA1_MD5 = RSA.verify noHash
rsaVerifyHash MD5 = RSA.verify (Just H.MD5)
rsaVerifyHash SHA1 = RSA.verify (Just H.SHA1)
rsaVerifyHash SHA224 = RSA.verify (Just H.SHA224)
rsaVerifyHash SHA256 = RSA.verify (Just H.SHA256)
rsaVerifyHash SHA384 = RSA.verify (Just H.SHA384)
rsaVerifyHash SHA512 = RSA.verify (Just H.SHA512)
rsapssVerifyHash :: Hash -> RSA.PublicKey -> ByteString -> ByteString -> Bool
rsapssVerifyHash SHA256 = PSS.verify (PSS.defaultPSSParams H.SHA256)
rsapssVerifyHash SHA384 = PSS.verify (PSS.defaultPSSParams H.SHA384)
rsapssVerifyHash SHA512 = PSS.verify (PSS.defaultPSSParams H.SHA512)
rsapssVerifyHash _ = error "rsapssVerifyHash: unsupported hash"
noHash :: Maybe H.MD5
noHash = Nothing
ecdsaSignHash
:: (MonadRandom m, ECDSA.EllipticCurveECDSA curve)
=> proxy curve
-> Hash
-> ECDSA.Scalar curve
-> ByteString
-> m (Maybe (ECDSA.Signature curve))
ecdsaSignHash prx SHA1 pk msg = Just <$> ECDSA.sign prx pk H.SHA1 msg
ecdsaSignHash prx SHA224 pk msg = Just <$> ECDSA.sign prx pk H.SHA224 msg
ecdsaSignHash prx SHA256 pk msg = Just <$> ECDSA.sign prx pk H.SHA256 msg
ecdsaSignHash prx SHA384 pk msg = Just <$> ECDSA.sign prx pk H.SHA384 msg
ecdsaSignHash prx SHA512 pk msg = Just <$> ECDSA.sign prx pk H.SHA512 msg
ecdsaSignHash _ _ _ _ = return Nothing
-- Currently we generate ECDSA signatures in constant time for P256 only.
kxSupportedPrivKeyEC :: PrivKeyEC -> Bool
kxSupportedPrivKeyEC privkey =
case ecPrivKeyCurveName privkey of
Just ECC.SEC_p256r1 -> True
_ -> False
-- Perform a public-key operation with a parameterized ECC implementation when
-- available, otherwise fallback to the classic ECC implementation.
withPubKeyEC
:: PubKeyEC
-> ( forall curve
. ECDSA.EllipticCurveECDSA curve
=> Proxy curve
-> ECDSA.PublicKey curve
-> a
)
-> (ECDSA_ECC.PublicKey -> a)
-> a
-> Maybe a
withPubKeyEC pubkey withProxy withClassic whenUnknown =
case ecPubKeyCurveName pubkey of
Nothing -> Just whenUnknown
Just ECC.SEC_p256r1 ->
maybeCryptoError $ withProxy p256 <$> ECDSA.decodePublic p256 bs
Just curveName ->
let curve = ECC.getCurveByName curveName
pub = unserializePoint curve pt
in withClassic . ECDSA_ECC.PublicKey curve <$> pub
where
pt@(SerializedPoint bs) = pubkeyEC_pub pubkey
-- Perform a private-key operation with a parameterized ECC implementation when
-- available. Calls for an unsupported curve can be prevented with
-- kxSupportedEcPrivKey.
withPrivKeyEC
:: PrivKeyEC
-> ( forall curve
. ECDSA.EllipticCurveECDSA curve
=> Proxy curve
-> ECDSA.PrivateKey curve
-> a
)
-> (ECC.CurveName -> a)
-> a
-> Maybe a
withPrivKeyEC privkey withProxy withUnsupported whenUnknown =
case ecPrivKeyCurveName privkey of
Nothing -> Just whenUnknown
Just ECC.SEC_p256r1 ->
-- Private key should rather be stored as bytearray and converted
-- using ECDSA.decodePrivate, unfortunately the data type chosen in
-- x509 was Integer.
maybeCryptoError $ withProxy p256 <$> ECDSA.scalarFromInteger p256 d
Just curveName -> Just $ withUnsupported curveName
where
d = privkeyEC_priv privkey
p256 :: Proxy ECDSA.Curve_P256R1
p256 = Proxy
|