]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
botan: Add support for ML-KEM
authorTobias Brunner <tobias@strongswan.org>
Tue, 8 Oct 2024 09:51:42 +0000 (11:51 +0200)
committerTobias Brunner <tobias@strongswan.org>
Fri, 22 Nov 2024 13:03:17 +0000 (14:03 +0100)
scripts/test.sh
src/libstrongswan/plugins/botan/Makefile.am
src/libstrongswan/plugins/botan/botan_kem.c [new file with mode: 0644]
src/libstrongswan/plugins/botan/botan_kem.h [new file with mode: 0644]
src/libstrongswan/plugins/botan/botan_plugin.c
testing/tests/botan/rw-cert/hosts/moon/etc/strongswan.conf

index 7df18d9b44225d8f0f45c55361430d484d788267..c5499911a8ab1958fd34640dfee958985c821f1c 100755 (executable)
@@ -235,8 +235,8 @@ gcrypt)
        DEPS="libgcrypt20-dev"
        ;;
 botan)
-       CONFIG="--disable-defaults --enable-pki --enable-botan --enable-pem --enable-hmac --enable-x509 --enable-constraints"
-       export TESTS_PLUGINS="test-vectors botan! pem hmac x509 constraints"
+       CONFIG="--disable-defaults --enable-pki --enable-botan --enable-pem --enable-hmac --enable-x509 --enable-constraints --enable-drbg"
+       export TESTS_PLUGINS="test-vectors botan! pem hmac x509 constraints drbg"
        DEPS=""
        if test "$1" = "build-deps"; then
                build_botan
index b7bdbdf63f4ecb7c0e5369f67626176dd1842411..20826c3a3ffc1cfe84de5837c5dc4c8d7eb08596 100644 (file)
@@ -17,6 +17,7 @@ libstrongswan_botan_la_SOURCES = \
        botan_hasher.h botan_hasher.c \
        botan_hmac.h botan_hmac.c \
        botan_kdf.h botan_kdf.c \
+       botan_kem.h botan_kem.c \
        botan_crypter.h botan_crypter.c \
        botan_rsa_public_key.h botan_rsa_public_key.c \
        botan_rsa_private_key.h botan_rsa_private_key.c \
diff --git a/src/libstrongswan/plugins/botan/botan_kem.c b/src/libstrongswan/plugins/botan/botan_kem.c
new file mode 100644 (file)
index 0000000..6391cca
--- /dev/null
@@ -0,0 +1,355 @@
+/*
+ * Copyright (C) 2024 Tobias Brunner, codelabs GmbH
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
+ * of this software and associated documentation files (the "Software"), to deal
+ * in the Software without restriction, including without limitation the rights
+ * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+ * copies of the Software, and to permit persons to whom the Software is
+ * furnished to do so, subject to the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be included in
+ * all copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
+ * THE SOFTWARE.
+ */
+
+#include "botan_kdf.h"
+#include "botan_util.h"
+
+#include <botan/build.h>
+
+#ifdef BOTAN_HAS_ML_KEM
+
+#include <botan/ffi.h>
+
+/**
+ * Length of the private key seed (d || z).
+ */
+#define ML_KEM_SEED_LEN 64
+
+/**
+ * Length of the shared secret.
+ */
+#define ML_KEM_SHARED_LEN 32
+
+typedef struct private_key_exchange_t private_key_exchange_t;
+
+/**
+ * Private data.
+ */
+struct private_key_exchange_t {
+
+       /**
+        * Public interface.
+        */
+       key_exchange_t public;
+
+       /**
+        * KE method.
+        */
+       key_exchange_method_t method;
+
+       /**
+        * Internal algorithm name.
+        */
+       char *name;
+
+       /**
+        * Key pair as initiator.
+        */
+       botan_privkey_t kem;
+
+       /**
+        * Ciphertext as responder.
+        */
+       chunk_t ciphertext;
+
+       /**
+        * Shared secret.
+        */
+       chunk_t shared_secret;
+
+       /**
+        * DRBG for testing.
+        */
+       drbg_t *drbg;
+};
+
+CALLBACK(get_random, int,
+       drbg_t *drbg, uint8_t *out, size_t out_len)
+{
+       if (!drbg->generate(drbg, out_len, out))
+       {
+               return -1;
+       }
+       return 0;
+}
+
+/**
+ * Initializes the given RNG, either based on a DRBG during testing or using
+ * the plugin's configured RNG.
+ */
+static bool get_rng(private_key_exchange_t *this, botan_rng_t *rng)
+{
+       if (this->drbg)
+       {
+               return !botan_rng_init_custom(rng, "kem-drbg", this->drbg,
+                                                                         get_random, NULL, NULL);
+       }
+       return botan_get_rng(rng, RNG_STRONG);
+}
+
+/**
+ * Convert the given "view" to a chunk.
+ */
+CALLBACK(botan_view_to_chunk, int,
+       chunk_t *chunk, const uint8_t *data, size_t len)
+{
+       *chunk = chunk_clone(chunk_create((u_char*)data, len));
+       return 0;
+}
+
+/**
+ * Generate a key pair as initiator.
+ */
+static bool generate_keypair(private_key_exchange_t *this)
+{
+       if (this->drbg)
+       {
+               uint8_t random[ML_KEM_SEED_LEN];
+
+               /* during testing, we load the DRBG-generated seed (d || z) as private
+                * key, as Botan would otherwise pull these separately from the RNG */
+               if (!this->drbg->generate(this->drbg, sizeof(random), random) ||
+                       botan_privkey_load_ml_kem(&this->kem, random, sizeof(random),
+                                                                         this->name))
+               {
+                       return FALSE;
+               }
+       }
+       else
+       {
+               botan_rng_t rng = NULL;
+
+               if (!botan_get_rng(&rng, RNG_STRONG) ||
+                       botan_privkey_create(&this->kem, "ML-KEM", this->name, rng))
+               {
+                       botan_rng_destroy(rng);
+                       return FALSE;
+               }
+               botan_rng_destroy(rng);
+       }
+       return TRUE;
+}
+
+/**
+ * Export the public key of the generated key pair as initiator.
+ */
+static bool export_pubkey(private_key_exchange_t *this, chunk_t *public)
+{
+       botan_pubkey_t pubkey = NULL;
+
+       if (!this->kem && !generate_keypair(this))
+       {
+               DBG1(DBG_LIB, "%N key pair generation failed",
+                        key_exchange_method_names, this->method);
+               return FALSE;
+       }
+
+       if (botan_privkey_export_pubkey(&pubkey, this->kem) ||
+               botan_pubkey_view_raw(pubkey, public, botan_view_to_chunk))
+       {
+               DBG1(DBG_LIB, "%N public key encoding failed",
+                                key_exchange_method_names, this->method);
+               botan_pubkey_destroy(pubkey);
+               return FALSE;
+       }
+       botan_pubkey_destroy(pubkey);
+       return TRUE;
+}
+
+METHOD(key_exchange_t, get_public_key, bool,
+       private_key_exchange_t *this, chunk_t *value)
+{
+       /* as responder, this method is called after set_public_key(), which
+        * encapsulated the secret to produce this ciphertext */
+       if (this->ciphertext.len)
+       {
+               *value = chunk_clone(this->ciphertext);
+               return TRUE;
+       }
+
+       /* as initiator, we generate a key pair and return the public key */
+       return export_pubkey(this, value);
+}
+
+/**
+ * Decapsulate the shared secret from the given ciphertext using our key pair.
+ */
+static bool decaps_ciphertext(private_key_exchange_t *this, chunk_t ciphertext)
+{
+       botan_pk_op_kem_decrypt_t op;
+
+       if (botan_pk_op_kem_decrypt_create(&op, this->kem, "Raw"))
+       {
+               return FALSE;
+       }
+       this->shared_secret = chunk_alloc(ML_KEM_SHARED_LEN);
+
+       if (botan_pk_op_kem_decrypt_shared_key(op, NULL, 0, ciphertext.ptr,
+                                                       ciphertext.len, this->shared_secret.len,
+                                                       this->shared_secret.ptr, &this->shared_secret.len))
+       {
+               DBG1(DBG_LIB, "%N decapsulation failed",
+                        key_exchange_method_names, this->method);
+               botan_pk_op_kem_decrypt_destroy(op);
+               return FALSE;
+       }
+       botan_pk_op_kem_decrypt_destroy(op);
+       return TRUE;
+}
+
+/**
+ * Generate a shared secret an encapsulate it using the given public key.
+ */
+static bool encaps_shared_secret(private_key_exchange_t *this, chunk_t public)
+{
+       botan_pk_op_kem_encrypt_t op;
+       botan_pubkey_t kem;
+       botan_rng_t rng;
+       size_t len;
+
+       if (botan_pubkey_load_ml_kem(&kem, public.ptr, public.len, this->name))
+       {
+               DBG1(DBG_LIB, "%N public key invalid",
+                        key_exchange_method_names, this->method);
+               return FALSE;
+       }
+       if (botan_pk_op_kem_encrypt_create(&op, kem, "Raw"))
+       {
+               botan_pubkey_destroy(kem);
+               return FALSE;
+       }
+       if (botan_pk_op_kem_encrypt_encapsulated_key_length(op, &len) ||
+               !get_rng(this, &rng))
+       {
+               botan_pk_op_kem_encrypt_destroy(op);
+               botan_pubkey_destroy(kem);
+               return FALSE;
+       }
+       this->ciphertext = chunk_alloc(len);
+       this->shared_secret = chunk_alloc(ML_KEM_SHARED_LEN);
+
+       if (botan_pk_op_kem_encrypt_create_shared_key(op, rng, NULL, 0,
+                                                       this->shared_secret.len,
+                                                       this->shared_secret.ptr, &this->shared_secret.len,
+                                                       this->ciphertext.ptr, &this->ciphertext.len))
+       {
+               DBG1(DBG_LIB, "%N encapsulation failed",
+                        key_exchange_method_names, this->method);
+               botan_pk_op_kem_encrypt_destroy(op);
+               botan_pubkey_destroy(kem);
+               botan_rng_destroy(rng);
+               return FALSE;
+       }
+       botan_pk_op_kem_encrypt_destroy(op);
+       botan_pubkey_destroy(kem);
+       botan_rng_destroy(rng);
+       return TRUE;
+}
+
+METHOD(key_exchange_t, set_public_key, bool,
+       private_key_exchange_t *this, chunk_t value)
+{
+       /* as initiator, we decapsulate the secret from the given ciphertext */
+       if (this->kem)
+       {
+               return decaps_ciphertext(this, value);
+       }
+
+       /* as responder, we generate a secret and encapsulate it */
+       return encaps_shared_secret(this, value);
+}
+
+METHOD(key_exchange_t, get_shared_secret, bool,
+       private_key_exchange_t *this, chunk_t *secret)
+{
+       *secret = chunk_clone(this->shared_secret);
+       return TRUE;
+}
+
+METHOD(key_exchange_t, get_method, key_exchange_method_t,
+       private_key_exchange_t *this)
+{
+       return this->method;
+}
+
+METHOD(key_exchange_t, set_seed, bool,
+       private_key_exchange_t *this, chunk_t value, drbg_t *drbg)
+{
+       if (!drbg)
+       {
+               return FALSE;
+       }
+       DESTROY_IF(this->drbg);
+       this->drbg = drbg->get_ref(drbg);
+       return TRUE;
+}
+
+METHOD(key_exchange_t, destroy, void,
+       private_key_exchange_t *this)
+{
+       chunk_clear(&this->shared_secret);
+       chunk_free(&this->ciphertext);
+       botan_privkey_destroy(this->kem);
+       DESTROY_IF(this->drbg);
+       free(this->name);
+       free(this);
+}
+
+/*
+ * Described in header
+ */
+key_exchange_t *botan_kem_create(key_exchange_method_t method)
+{
+       private_key_exchange_t *this;
+       char *name;
+
+       switch (method)
+       {
+               case ML_KEM_512:
+                       name = "ML-KEM-512";
+                       break;
+               case ML_KEM_768:
+                       name = "ML-KEM-768";
+                       break;
+               case ML_KEM_1024:
+                       name = "ML-KEM-1024";
+                       break;
+               default:
+                       return NULL;
+       }
+
+       INIT(this,
+               .public = {
+                       .get_method = _get_method,
+                       .get_public_key = _get_public_key,
+                       .set_public_key = _set_public_key,
+                       .get_shared_secret = _get_shared_secret,
+                       .set_seed = _set_seed,
+                       .destroy = _destroy,
+               },
+               .method = method,
+               .name = strdup(name),
+       );
+       return &this->public;
+}
+
+#endif /* BOTAN_HAS_ML_KEM */
diff --git a/src/libstrongswan/plugins/botan/botan_kem.h b/src/libstrongswan/plugins/botan/botan_kem.h
new file mode 100644 (file)
index 0000000..0019f8f
--- /dev/null
@@ -0,0 +1,43 @@
+/*
+ * Copyright (C) 2024 Tobias Brunner, codelabs GmbH
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
+ * of this software and associated documentation files (the "Software"), to deal
+ * in the Software without restriction, including without limitation the rights
+ * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+ * copies of the Software, and to permit persons to whom the Software is
+ * furnished to do so, subject to the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be included in
+ * all copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
+ * THE SOFTWARE.
+ */
+
+/**
+ * Implements key encapsulation methods (KEM) using Botan.
+ *
+ * @defgroup botan_kem botan_kem
+ * @{ @ingroup botan_p
+ */
+
+#ifndef BOTAN_KEM_H_
+#define BOTAN_KEM_H_
+
+#include <crypto/key_exchange.h>
+
+/**
+ * Creates a new key_exchange_t object.
+ *
+ * @param method       KEM to instantiate
+ * @return                     key_exchange_t object, NULL if not supported
+ */
+key_exchange_t *botan_kem_create(key_exchange_method_t method);
+
+#endif /** BOTAN_KEM_H_ @}*/
index 30a6dcce68e5166aa48d17099079cc5b0c6766f4..5a702775b5a799fd942a569f186ef6934522a777 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (C) 2018 Tobias Brunner
+ * Copyright (C) 2018-2024 Tobias Brunner
  * Copyright (C) 2018 Andreas Steffen
  *
  * Copyright (C) 2018 RenĂ© Korthaus
@@ -32,6 +32,7 @@
 #include "botan_diffie_hellman.h"
 #include "botan_hmac.h"
 #include "botan_kdf.h"
+#include "botan_kem.h"
 #include "botan_rsa_public_key.h"
 #include "botan_rsa_private_key.h"
 #include "botan_ec_diffie_hellman.h"
@@ -360,6 +361,13 @@ METHOD(plugin_t, get_features, int,
                        PLUGIN_PROVIDE(HASHER, HASH_IDENTITY),
 #endif
 
+#ifdef BOTAN_HAS_ML_KEM
+               PLUGIN_REGISTER(KE, botan_kem_create),
+                       PLUGIN_PROVIDE(KE, ML_KEM_512),
+                       PLUGIN_PROVIDE(KE, ML_KEM_768),
+                       PLUGIN_PROVIDE(KE, ML_KEM_1024),
+#endif
+
                /* random numbers */
 #if BOTAN_HAS_SYSTEM_RNG
 #if BOTAN_HAS_HMAC_DRBG
index 6a33d582bc6ad7e3c678dff343d82a6d936c41e0..19228ffa540edfb5043bae74f054854cd0e56456 100755 (executable)
@@ -5,7 +5,7 @@ swanctl {
 }
 
 charon-systemd {
-  load = nonce test-vectors botan pem x509 revocation constraints pubkey curl kernel-netlink socket-default updown vici
+  load = nonce test-vectors drbg botan pem x509 revocation constraints pubkey curl kernel-netlink socket-default updown vici
 
   rsa_pss = yes
   integrity_test = yes