Newer
Older
XinYang_IOS / Carthage / Checkouts / OpenVPNAdapter / Sources / OpenVPN3 / openvpn / ssl / sess_ticket.hpp
@zhangfeng zhangfeng on 7 Dec 6 KB 1.8.0
//    OpenVPN -- An application to securely tunnel IP networks
//               over a single port, with support for SSL/TLS-based
//               session authentication and key exchange,
//               packet encryption, packet authentication, and
//               packet compression.
//
//    Copyright (C) 2012-2020 OpenVPN Inc.
//
//    This program is free software: you can redistribute it and/or modify
//    it under the terms of the GNU Affero General Public License Version 3
//    as published by the Free Software Foundation.
//
//    This program is distributed in the hope that it will be useful,
//    but WITHOUT ANY WARRANTY; without even the implied warranty of
//    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
//    GNU Affero General Public License for more details.
//
//    You should have received a copy of the GNU Affero General Public License
//    along with this program in the COPYING file.
//    If not, see <http://www.gnu.org/licenses/>.

#pragma once

#include <cstring>
#include <memory>

#include <openvpn/common/exception.hpp>
#include <openvpn/common/hash.hpp>
#include <openvpn/common/base64.hpp>
#include <openvpn/common/string.hpp>
#include <openvpn/buffer/buffer.hpp>
#include <openvpn/random/randapi.hpp>

namespace openvpn {

  class OpenSSLContext;
  class MbedTLSContext;

  // Abstract base class used to provide an interface for TLS
  // Session Ticket keying originally described by RFC 5077.
  class TLSSessionTicketBase
  {
  public:
    typedef std::unique_ptr<TLSSessionTicketBase> UPtr;

    OPENVPN_EXCEPTION(sess_ticket_error);

    enum Status {
      NO_TICKET,
      TICKET_AVAILABLE,
      TICKET_EXPIRING,
    };

    class Name
    {
    public:
      static constexpr size_t SIZE = 16;

      explicit Name(RandomAPI& rng)
      {
	rng.rand_bytes(value_, SIZE);
      }

      explicit Name(const std::string& name_b64)
      {
	b64_to_key(name_b64, "key name", value_, SIZE);
      }

      explicit Name(const unsigned char name[SIZE])
      {
	std::memcpy(value_, name, SIZE);
      }

      bool operator==(const Name& rhs) const
      {
	return std::memcmp(value_, rhs.value_, SIZE) == 0;
      }

      bool operator!=(const Name& rhs) const
      {
	return std::memcmp(value_, rhs.value_, SIZE) != 0;
      }

      bool operator<(const Name& rhs) const
      {
	return std::memcmp(value_, rhs.value_, SIZE) < 0;
      }

      std::string to_string() const
      {
	return "TLSTicketName[" + b64() + ']';
      }

      std::string b64() const
      {
	return base64->encode(value_, SIZE);
      }

      template <typename HASH>
      void hash(HASH& h) const
      {
	h(value_, SIZE);
      }

#ifdef HAVE_CITYHASH
      std::size_t hashval() const
      {
	HashSizeT h;
	hash(h);
	return h.value();
      }
#endif

    private:
      // we need to friend SSL implementation classes
      friend class OpenSSLContext;
      friend class MbedTLSContext;

      Name() {} // note that default constructor leaves object in an undefined state

      unsigned char value_[SIZE];
    };

    class Key
    {
    public:
      static constexpr size_t CIPHER_KEY_SIZE = 32;
      static constexpr size_t HMAC_KEY_SIZE = 16;

      explicit Key(RandomAPI& rng)
      {
	rng.assert_crypto();
	rng.rand_bytes(cipher_value_, CIPHER_KEY_SIZE);
	rng.rand_bytes(hmac_value_, HMAC_KEY_SIZE);
      }

      explicit Key(const std::string& cipher_key_b64, const std::string& hmac_key_b64)
      {
	b64_to_key(cipher_key_b64, "cipher key", cipher_value_, CIPHER_KEY_SIZE);
	b64_to_key(hmac_key_b64, "hmac key", hmac_value_, HMAC_KEY_SIZE);
      }

      ~Key()
      {
	// wipe keys
	std::memset(cipher_value_, 0, CIPHER_KEY_SIZE);
	std::memset(hmac_value_, 0, HMAC_KEY_SIZE);
      }

      std::string to_string() const
      {
	return "TLSTicketKey[cipher=" + cipher_b64() + " hmac=" + hmac_b64() + ']';
      }

      std::string cipher_b64() const
      {
	return base64->encode(cipher_value_, CIPHER_KEY_SIZE);
      }

      std::string hmac_b64() const
      {
	return base64->encode(hmac_value_, HMAC_KEY_SIZE);
      }

      bool operator==(const Key& rhs) const
      {
	return std::memcmp(cipher_value_, rhs.cipher_value_, CIPHER_KEY_SIZE) == 0 && std::memcmp(hmac_value_, rhs.hmac_value_, HMAC_KEY_SIZE) == 0;
      }

      bool operator!=(const Key& rhs) const
      {
	return !operator==(rhs);
      }

      template <typename KEY_TRANSFORM>
      void key_transform(KEY_TRANSFORM& t)
      {
	unsigned char out[KEY_TRANSFORM::MAX_HMAC_SIZE];

	// cipher
	{
	  t.cipher_transform.reset();
	  t.cipher_transform.update(cipher_value_, CIPHER_KEY_SIZE);
	  const size_t size = t.cipher_transform.final(out);
	  if (size < CIPHER_KEY_SIZE)
	    throw sess_ticket_error("insufficient key material for cipher transform");
	  std::memcpy(cipher_value_, out, CIPHER_KEY_SIZE);
	}

	// hmac
	{
	  t.hmac_transform.reset();
	  t.hmac_transform.update(hmac_value_, HMAC_KEY_SIZE);
	  const size_t size = t.hmac_transform.final(out);
	  if (size < HMAC_KEY_SIZE)
	    throw sess_ticket_error("insufficient key material for hmac transform");
	  std::memcpy(hmac_value_, out, HMAC_KEY_SIZE);
	}
      }

    private:
      // we need to friend SSL implementation classes
      friend class OpenSSLContext;
      friend class MbedTLSContext;

      Key() {} // note that default constructor leaves object in an undefined state

      unsigned char cipher_value_[CIPHER_KEY_SIZE];
      unsigned char hmac_value_[HMAC_KEY_SIZE];
    };

    // method returns name and key
    virtual Status create_session_ticket_key(Name& name, Key& key) const = 0;

    // method is given name and returns key
    virtual Status lookup_session_ticket_key(const Name& name, Key& key) const = 0;

    // return string that identifies the app
    virtual std::string session_id_context() const = 0;

    virtual ~TLSSessionTicketBase() {}

  private:
    static void b64_to_key(const std::string& b64, const char *title, unsigned char *out, const size_t outlen)
    {
      Buffer srcbuf(out, outlen, false);
      try {
	base64->decode(srcbuf, b64);
      }
      catch (const std::exception& e)
	{
	  throw sess_ticket_error(std::string("base64 decode for ") + title + ": " + std::string(e.what()));
	}
      if (srcbuf.size() != outlen)
	throw sess_ticket_error(std::string("wrong input size for ") + title + ", actual=" + std::to_string(srcbuf.size()) + " expected=" + std::to_string(outlen));
    }
  };
}

#ifdef HAVE_CITYHASH
OPENVPN_HASH_METHOD(openvpn::TLSSessionTicketBase::Name, hashval);
#endif