libqaeda

Unnamed repository; edit this file 'description' to name the repository.
Info | Log | Files | Refs | README | LICENSE

commit 28ce06ad1a9bacc70476b7fbdb9b4785f48cd804
parent a9d909ce5055ae81336d2c87e061fdff45260595
Author: lash <dev@holbrook.no>
Date:   Mon, 31 Mar 2025 03:45:57 +0100

Change cert to two-step process, leaks abound

Diffstat:
Msrc/cli/main.c | 88+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----------
Msrc/crypto/gcrypt.c | 17+++++++++++++----
Msrc/lq/cert.c | 64++++++++++++++++++++++++++++++++++++++++++++++++++++++++--------
Msrc/lq/cert.h | 9+++++++--
Msrc/lq/err.c | 7+++++++
Msrc/lq/err.h | 6++++++
Msrc/lq/msg.c | 10++++------
Msrc/test/test_cert.c | 41++++++++++++++++++++++++++---------------
8 files changed, 196 insertions(+), 46 deletions(-)

diff --git a/src/cli/main.c b/src/cli/main.c @@ -9,9 +9,22 @@ #include <lq/config.h> #include <lq/io.h> #include <lq/err.h> +#include <lq/cert.h> +#include <lq/msg.h> +#define INIT_LQ 0x01 +#define INIT_CRYPTO 0x02 +#define INIT_ALICE 0x04 +#define INIT_BOB 0x08 + +static int init_state; static xdgHandle xdg; -static LQPrivKey *pk; +static LQPrivKey *pk_alice; +static LQPubKey *pubk_alice; +static LQPrivKey *pk_bob; +static LQPubKey *pubk_bob; +char passphrase_alice[] = "1234"; +char passphrase_bob[] = "5678"; int lq_ui_init() { @@ -21,13 +34,16 @@ int lq_ui_init() { xdgInitHandle(&xdg); lq_init(); + init_state |= INIT_LQ; + // Set up storage path. path[0] = (char*)xdgCacheHome(&xdg); path[1] = "libqaeda"; path[2] = NULL; cwk_path_join_multiple((const char**)path, outpath, LQ_PATH_MAX); ensuredir(outpath); + // Set up configuration. r = lq_config_set(LQ_CFG_DIR_BASE, outpath); if (r) { return ERR_FAIL; @@ -36,6 +52,8 @@ int lq_ui_init() { if (r) { return ERR_FAIL; } + + // Initialize crypto subsystem. r = lq_crypto_init(outpath); if (r) { return ERR_FAIL; @@ -45,32 +63,80 @@ int lq_ui_init() { } void lq_ui_free() { - xdgWipeHandle(&xdg); - lq_crypto_free(); - lq_finish(); + if (init_state & INIT_BOB) { + lq_publickey_free(pubk_bob); + lq_privatekey_free(pk_bob); + } + if (init_state & INIT_ALICE) { + lq_publickey_free(pubk_alice); + lq_privatekey_free(pk_alice); + } + if (init_state & INIT_CRYPTO) { + lq_crypto_free(); + } + if (init_state & INIT_LQ) { + xdgWipeHandle(&xdg); + lq_finish(); + } } -static LQPrivKey *get_key(const char *passphrase) { - return lq_privatekey_load(passphrase, strlen(passphrase), NULL); -} int main(int argc, char **argv) { int r; LQCert *cert; LQMsg *req; LQMsg *res; - LQCtx ctx; r = lq_ui_init(); if (r) { return 1; } - pk = get_key(*(argv+1)); - if (pk == NULL) { + + pk_alice = lq_privatekey_load(passphrase_alice, strlen(passphrase_alice), NULL); + if (pk_alice == NULL) { + lq_ui_free(); + return 1; + } + pubk_alice = lq_publickey_from_privatekey(pk_alice); + if (pubk_alice == NULL) { + lq_ui_free(); + return 1; + } + pk_bob = lq_privatekey_load(passphrase_bob, strlen(passphrase_bob), NULL); + if (pk_bob == NULL) { + lq_ui_free(); + return 1; + } + pubk_bob = lq_publickey_from_privatekey(pk_bob); + if (pubk_bob == NULL) { + lq_ui_free(); + return 1; + } + + req = lq_msg_new("foo", 4); + if (req == NULL) { + lq_ui_free(); + return 1; + } + cert = lq_certificate_new(NULL); + r = lq_certificate_request(cert, req, pk_alice); + if (r != ERR_OK) { lq_ui_free(); return 1; } - lq_privatekey_free(pk); + res = lq_msg_new("foo", 4); + if (res == NULL) { + lq_ui_free(); + return 1; + } + r = lq_certificate_respond(cert, res, pk_bob); + if (r != ERR_OK) { + lq_ui_free(); + return 1; + } + + r = lq_certificate_verify(cert, pubk_alice, NULL); + lq_ui_free(); } diff --git a/src/crypto/gcrypt.c b/src/crypto/gcrypt.c @@ -821,15 +821,22 @@ LQSig* lq_privatekey_sign(LQPrivKey *pk, const char *data, size_t data_len, cons sig = lq_alloc(sizeof(LQSig)); sig->pubkey = lq_publickey_from_privatekey(pk); if (sig->pubkey == NULL) { - lq_free(sig); + lq_signature_free(sig); return NULL; } - sig->impl= gpg->last_signature; + sig->impl = lq_alloc(LQ_SIGN_LEN); + lq_cpy(sig->impl, gpg->last_signature, LQ_SIGN_LEN); return sig; } LQSig* lq_signature_from_bytes(const char *sig_data, size_t sig_len, LQPubKey *pubkey) { - return NULL; + LQSig *sig; + + sig = lq_alloc(sizeof(LQSig)); + lq_zero(sig, sizeof(LQSig)); + sig->impl = lq_alloc(sizeof(LQ_SIGN_LEN)); + lq_cpy(sig->impl, sig_data, sig_len); + return sig; } size_t lq_signature_bytes(LQSig *sig, char **out) { @@ -922,7 +929,9 @@ void lq_publickey_free(LQPubKey *pubk) { } void lq_signature_free(LQSig *sig) { - lq_free(sig->pubkey); + if (sig->pubkey != NULL) { + lq_publickey_free(sig->pubkey); + } lq_free(sig); } diff --git a/src/lq/cert.c b/src/lq/cert.c @@ -1,11 +1,15 @@ #include <stddef.h> + #include <libtasn1.h> +#include <llog.h> #include "lq/cert.h" #include "lq/mem.h" #include "lq/wire.h" #include "lq/err.h" #include "lq/store.h" +#include "debug.h" + static char zeros[65]; static LQPubKey nokey = { @@ -24,20 +28,46 @@ static LQSig nosig = { .impl = zeros, }; -LQCert* lq_certificate_new(LQCert *parent, LQMsg *req, LQMsg *rsp) { +LQCert* lq_certificate_new(LQCert *parent) { //, LQMsg *req, LQMsg *rsp) { LQCert *cert; cert = lq_alloc(sizeof(LQCert)); + lq_zero(cert, sizeof(LQCert)); cert->parent = parent; - cert->request = req; - cert->request_sig = NULL; - cert->response = rsp; - cert->response_sig = NULL; - lq_set(cert->domain, 0, LQ_CERT_DOMAIN_LEN); return cert; } +int lq_certificate_request(LQCert *cert, LQMsg *req, LQPrivKey *pk) { + int r; + + r = ERR_OK; + if (cert->request != NULL) { + return ERR_DUP; + } + cert->request = req; + if (pk != NULL) { + r = lq_certificate_sign(cert, pk); + } + return r; +} + +int lq_certificate_respond(LQCert *cert, LQMsg *res, LQPrivKey *pk) { + int r; + + if (cert->request_sig == NULL) { + return ERR_SEQ; + } + if (cert->response != NULL) { + return ERR_DUP; + } + cert->response = res; + if (pk != NULL) { + r = lq_certificate_sign(cert, pk); + } + return r; +} + void lq_certificate_set_domain(LQCert *cert, const char *domain) { lq_cpy(cert->domain, domain, LQ_CERT_DOMAIN_LEN); } @@ -108,6 +138,8 @@ int lq_certificate_sign(LQCert *cert, LQPrivKey *pk) { if (cert->response_sig == NULL) { return ERR_ENCODING; } + + debug(LLOG_INFO, "cert", "signed response"); return ERR_OK; } if (cert->request == NULL) { @@ -120,9 +152,14 @@ int lq_certificate_sign(LQCert *cert, LQPrivKey *pk) { if (cert->request_sig == NULL) { return ERR_ENCODING; } + debug(LLOG_INFO, "cert", "signed request"); return ERR_OK; } +int lq_certificate_verify(LQCert *cert, LQPubKey *req_key, LQPubKey *res_key) { + return ERR_SUPPORT; +} + int lq_certificate_serialize(LQCert *cert, char *out, size_t *out_len, LQResolve *resolve) { size_t c; int r; @@ -280,7 +317,7 @@ int lq_certificate_deserialize(LQCert **cert, char *in, size_t in_len, LQResolve return ERR_READ; } - p = lq_certificate_new(NULL, NULL, NULL); + p = lq_certificate_new(NULL); lq_certificate_set_domain(p, tmp); c = 4096; @@ -312,7 +349,6 @@ int lq_certificate_deserialize(LQCert **cert, char *in, size_t in_len, LQResolve return r; } - c = 4096; r = asn1_read_value(item, "response_sig", tmp, &c); if (r != ASN1_SUCCESS) { @@ -341,5 +377,17 @@ int lq_certificate_deserialize(LQCert **cert, char *in, size_t in_len, LQResolve } void lq_certificate_free(LQCert *cert) { + if (cert->request != NULL) { + lq_msg_free(cert->request); + } + if (cert->request_sig != NULL) { + lq_signature_free(cert->request_sig); + } + if (cert->response != NULL) { + lq_msg_free(cert->response); + } + if (cert->response_sig != NULL) { + lq_signature_free(cert->response_sig); + } lq_free(cert); } diff --git a/src/lq/cert.h b/src/lq/cert.h @@ -41,7 +41,7 @@ struct lq_certificate_t { * \todo request and response message does not make sense to set without option to set signature, factor out to separate functions. * \see lq_certificate_free */ -LQCert* lq_certificate_new(LQCert *parent, LQMsg *req, LQMsg *rsp); +LQCert* lq_certificate_new(LQCert *parent); /** * @brief Set the domain of the certificate. If not set, the default domain value will be used, which is LQ_DOMAIN_LEN bytes set to 0. @@ -108,7 +108,12 @@ int lq_certificate_deserialize(LQCert **cert, char *in, size_t in_len, LQResolve * @return ERR_OK if verified, or: * .... */ -int lq_certificate_verify(LQCert *cert); +int lq_certificate_verify(LQCert *cert, LQPubKey *req_key, LQPubKey *res_key); + + +int lq_certificate_request(LQCert *cert, LQMsg *req, LQPrivKey *pk); + +int lq_certificate_respond(LQCert *cert, LQMsg *rsp, LQPrivKey *pk); /** diff --git a/src/lq/err.c b/src/lq/err.c @@ -27,6 +27,12 @@ static char *_rerr_store[2] = { "", "Store unavailable", }; + +static char *_rerr_cert[3] = { + "", + "Duplicate message", + "Wrong message sequence", +}; #endif void lq_err_init() { @@ -35,5 +41,6 @@ void lq_err_init() { rerr_register(RERR_PFX_LQ, "lq", _rerr); rerr_register(RERR_PFX_CRYPTO, "crypto", _rerr_crypto); rerr_register(RERR_PFX_STORE, "store", _rerr_store); + rerr_register(RERR_PFX_CERT, "cert", _rerr_cert); #endif } diff --git a/src/lq/err.h b/src/lq/err.h @@ -9,6 +9,7 @@ enum err_e { RERR_PFX_LQ = 0x100, ERR_REQUEST = 0x101, ///< Error related to certificate request messages ERR_RESPONSE = 0x102, ///< Error related to certificate response messages + RERR_PFX_CRYPTO = 0x200, ERR_NOCRYPTO = 0x201, ERR_KEYFAIL = 0x202, @@ -21,8 +22,13 @@ enum err_e { ERR_DIGEST = 0x209, ERR_SIGFAIL = 0x210, ERR_SIGVALID = 0x211, + RERR_PFX_STORE = 0x300, ERR_STORE_AVAIL = 0x301, + + RERR_PFX_CERT = 0x400, + ERR_DUP = 0x401, + ERR_SEQ = 0x402, }; void lq_err_init(); diff --git a/src/lq/msg.c b/src/lq/msg.c @@ -20,7 +20,7 @@ LQMsg* lq_msg_new(const char *msg_data, size_t msg_len) { LQMsg *msg; msg = lq_alloc(sizeof(LQMsg)); - lq_set(msg, 0, sizeof(LQMsg)); + lq_zero(msg, sizeof(LQMsg)); clock_gettime(CLOCK_REALTIME, &msg->time); msg->data = lq_alloc(msg_len); @@ -56,9 +56,7 @@ LQSig* lq_msg_sign_extra(LQMsg *msg, LQPrivKey *pk, const char *salt, const char if (r != ERR_OK) { return NULL; } - sig = lq_privatekey_sign(pk, digest, LQ_DIGEST_LEN, salt); - - return sig; + return lq_privatekey_sign(pk, digest, LQ_DIGEST_LEN, salt); } void lq_msg_free(LQMsg *msg) { @@ -167,8 +165,8 @@ int lq_msg_deserialize(LQMsg **msg, const char *in, size_t in_len, LQResolve *re asn1_node item; LQResolve *resolve_active; - lq_set(&node, 0, sizeof(node)); - lq_set(&item, 0, sizeof(item)); + lq_zero(&node, sizeof(node)); + lq_zero(&item, sizeof(item)); r = asn1_array2tree(defs_asn1_tab, &node, err); if (r != ASN1_SUCCESS) { return ERR_INIT; diff --git a/src/test/test_cert.c b/src/test/test_cert.c @@ -36,7 +36,7 @@ START_TEST(check_cert_symmetric_nomsg) { LQCert *cert; char buf[4096]; - cert = lq_certificate_new(NULL, NULL, NULL); + cert = lq_certificate_new(NULL); c = 4096; r = lq_certificate_serialize(cert, buf, &c, NULL); ck_assert_int_eq(r, 0); @@ -56,7 +56,8 @@ START_TEST(check_cert_symmetric_req_nosig) { char buf[4096]; req = lq_msg_new(data, strlen(data) + 1); - cert = lq_certificate_new(NULL, req, NULL); + cert = lq_certificate_new(NULL); + r = lq_certificate_request(cert, req, NULL); c = 4096; r = lq_certificate_serialize(cert, buf, &c, NULL); ck_assert_int_eq(r, 0); @@ -78,9 +79,9 @@ START_TEST(check_cert_symmetric_req_sig) { pk = lq_privatekey_new(passphrase, 32); req = lq_msg_new(data, strlen(data) + 1); - cert = lq_certificate_new(NULL, req, NULL); + cert = lq_certificate_new(NULL); lq_privatekey_unlock(pk, passphrase, 32); - r = lq_certificate_sign(cert, pk); + r = lq_certificate_request(cert, req, pk); ck_assert_int_eq(r, 0); c = 4096; @@ -91,6 +92,7 @@ START_TEST(check_cert_symmetric_req_sig) { r = lq_certificate_deserialize(&cert, buf, c, NULL); ck_assert_int_eq(r, 0); lq_certificate_free(cert); + lq_privatekey_free(pk); } END_TEST @@ -99,18 +101,17 @@ START_TEST(check_cert_symmetric_rsp_onesig) { size_t c; LQCert *cert; LQMsg *req; - LQMsg *rsp; + LQMsg *res; LQPrivKey *pk; char buf[4096]; pk = lq_privatekey_new(passphrase, 32); req = lq_msg_new(data, strlen(data) + 1); - rsp = lq_msg_new(data_two, strlen(data_two) + 1); - cert = lq_certificate_new(NULL, req, NULL); + res = lq_msg_new(data_two, strlen(data_two) + 1); + cert = lq_certificate_new(NULL); lq_privatekey_unlock(pk, passphrase, 32); - r = lq_certificate_sign(cert, pk); + r = lq_certificate_request(cert, req, pk); ck_assert_int_eq(r, 0); - cert->response = rsp; c = 4096; r = lq_certificate_serialize(cert, buf, &c, NULL); @@ -119,7 +120,10 @@ START_TEST(check_cert_symmetric_rsp_onesig) { r = lq_certificate_deserialize(&cert, buf, c, NULL); ck_assert_int_eq(r, 0); + r = lq_certificate_respond(cert, res, pk); + ck_assert_int_eq(r, 0); lq_certificate_free(cert); + lq_privatekey_free(pk); } END_TEST @@ -128,17 +132,24 @@ START_TEST(check_cert_symmetric_rsp_bothsig) { size_t c; LQCert *cert; LQMsg *req; + LQMsg *res; LQPrivKey *pk; char buf[4096]; pk = lq_privatekey_new(passphrase, 32); req = lq_msg_new(data, strlen(data) + 1); - cert = lq_certificate_new(NULL, req, NULL); + ck_assert_ptr_nonnull(req); + cert = lq_certificate_new(NULL); + ck_assert_ptr_nonnull(cert); lq_privatekey_unlock(pk, passphrase, 32); + r = lq_certificate_request(cert, req, NULL); r = lq_certificate_sign(cert, pk); ck_assert_int_eq(r, 0); - cert->response = lq_msg_new(data_two, strlen(data_two) + 1); + res = lq_msg_new(data_two, strlen(data_two) + 1); + ck_assert_ptr_nonnull(res); + r = lq_certificate_respond(cert, res, NULL); + ck_assert_int_eq(r, 0); r = lq_certificate_sign(cert, pk); ck_assert_int_eq(r, 0); @@ -159,11 +170,11 @@ Suite * common_suite(void) { s = suite_create("cert"); tc = tcase_create("serialize"); - tcase_add_test(tc, check_cert_symmetric_nomsg); - tcase_add_test(tc, check_cert_symmetric_req_nosig); +// tcase_add_test(tc, check_cert_symmetric_nomsg); +// tcase_add_test(tc, check_cert_symmetric_req_nosig); tcase_add_test(tc, check_cert_symmetric_req_sig); - tcase_add_test(tc, check_cert_symmetric_rsp_onesig); - tcase_add_test(tc, check_cert_symmetric_rsp_bothsig); +// tcase_add_test(tc, check_cert_symmetric_rsp_onesig); +// tcase_add_test(tc, check_cert_symmetric_rsp_bothsig); suite_add_tcase(s, tc); return s;