Hi Antonio,

Thanks for the review!

On 15-06-18 09:03, Antonio Quartulli wrote:
> On 08/12/17 20:07, Steffan Karger wrote:
>> Needed for tls-crypt-v2, but isolated enough to be reviewed as a separate
>> patch.
>>
>> The encode API allocates memory, because it fits our typical gc-oriented
>> code pattern and the caller does not have to do multiple calls or
>> calculations to determine the required destination buffer size.
>>
>> The decode API does not allocate memory, because the required destination
>> buffer is always smaller than the input buffer (so is easy to manage by
>> the caller) and does not force the caller to use the heap.
>>
>> Signed-off-by: Steffan Karger <steffan.kar...@fox-it.com>
>> ---
>>  src/openvpn/crypto_backend.h           | 30 +++++++++++
>>  src/openvpn/crypto_mbedtls.c           | 74 +++++++++++++++++++++++++++
>>  src/openvpn/crypto_openssl.c           | 82 ++++++++++++++++++++++++++++++
>>  tests/unit_tests/openvpn/Makefile.am   | 16 +++++-
>>  tests/unit_tests/openvpn/test_crypto.c | 92 
>> ++++++++++++++++++++++++++++++++++
>>  5 files changed, 293 insertions(+), 1 deletion(-)
>>  create mode 100644 tests/unit_tests/openvpn/test_crypto.c
>>
>> diff --git a/src/openvpn/crypto_backend.h b/src/openvpn/crypto_backend.h
>> index 567fd9b..83e14c8 100644
>> --- a/src/openvpn/crypto_backend.h
>> +++ b/src/openvpn/crypto_backend.h
>> @@ -36,6 +36,7 @@
>>  #include "crypto_mbedtls.h"
>>  #endif
>>  #include "basic.h"
>> +#include "buffer.h"
>>  
>>  /* TLS uses a tag of 128 bytes, let's do the same for OpenVPN */
>>  #define OPENVPN_AEAD_TAG_LENGTH 16
>> @@ -105,6 +106,35 @@ void show_available_digests(void);
>>  
>>  void show_available_engines(void);
>>  
>> +/**
>> + * Encode binary data as PEM
>> + *
>> + * @param name      The name to use in the PEM header/footer
>> + * @param dst       Destination buffer for PEM-encoded data.  Must be a 
>> valid
>> + *                  pointer to an uninitialized buffer structure.  Iff this
>> + *                  function returns true, the buffer will contain memory
>> + *                  allocated through the supplied gc.
> 
> minor: I see the current style is inconsistent wrt having a '.' at the
> end of each doxygen line. Maybe we should decide what to do and stick to
> that ;P But does not need to be changed in this patch of course.

You sound just like my colleague who's pointing out the missing dots in
my doxygen :')  Any preference from your side?  I think ending each line
with a dot is best, because that looks best in the generated docs.

>> + * @param src       Source buffer
>> + * @param gc        The garbage collector to use when allocating memory for
>> + *                  dst.
>> + *
>> + * @return true iff PEM encode succeeded.
>> + */
>> +bool crypto_pem_encode(const char *name, struct buffer *dst,
>> +                       const struct buffer *src, struct gc_arena *gc);
>> +
>> +/**
>> + * Decode a PEM buffer to binary data
>> + *
>> + * @param name      The name expected in the PEM header/footer
>> + * @param dst       Destination buffer for decoded data
>> + * @param src       Source buffer (PEM data)
>> + *
>> + * @return true iff PEM decode succeeded.
>> + */
>> +bool crypto_pem_decode(const char *name, struct buffer *dst,
>> +                       const struct buffer *src);
>> +
>>  /*
>>   *
>>   * Random number functions, used in cases where we want
>> diff --git a/src/openvpn/crypto_mbedtls.c b/src/openvpn/crypto_mbedtls.c
>> index 8fa03da..1e86854 100644
>> --- a/src/openvpn/crypto_mbedtls.c
>> +++ b/src/openvpn/crypto_mbedtls.c
>> @@ -44,11 +44,13 @@
>>  #include "otime.h"
>>  #include "misc.h"
>>  
>> +#include <mbedtls/base64.h>
>>  #include <mbedtls/des.h>
>>  #include <mbedtls/error.h>
>>  #include <mbedtls/md5.h>
>>  #include <mbedtls/cipher.h>
>>  #include <mbedtls/havege.h>
>> +#include <mbedtls/pem.h>
>>  
>>  #include <mbedtls/entropy.h>
>>  
>> @@ -229,6 +231,78 @@ show_available_engines(void)
>>             "available\n");
>>  }
>>  
>> +bool
>> +crypto_pem_encode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src, struct gc_arena *gc)
>> +{
>> +    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
>> +    char header[1000+1] = { 0 };
>> +    char footer[1000+1] = { 0 };
>> +
>> +    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----\n", 
>> name))
>> +    {
>> +        return false;
>> +    }
>> +    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----\n", 
>> name))
>> +    {
>> +        return false;
>> +    }
>> +
>> +    size_t out_len = 0;
>> +    if (MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL !=
>> +            mbedtls_pem_write_buffer(header, footer, BPTR(src), BLEN(src),
>> +                                     NULL, 0, &out_len))
>> +    {
>> +        return false;
>> +    }
>> +
>> +    *dst = alloc_buf_gc(out_len, gc);
>> +    if (!mbed_ok(mbedtls_pem_write_buffer(header, footer, BPTR(src), 
>> BLEN(src),
>> +                                          BPTR(dst), BCAP(dst), &out_len))
>> +        || !buf_inc_len(dst, out_len))
> 
> Isn't in the spec of this function to keep the buffer uninitialized when
> returning false?
> Not a big deal because the buffer area was allocated via gc so it can't
> be leaked.
> 
> Don't you think that if buf_inc_len() fails (can this really happen?)
> the buffer should better be reset?

This should really never happen according to the function specification
by mbed TLS, but I'd rather check anyway.  We might catch a bug from
their side, or better detect an API change.

But yeah, I'll add a CLEAR(*dst) here.

>> +    {
>> +        return false;
>> +    }
>> +
>> +    return true;
>> +}
>> +
>> +bool
>> +crypto_pem_decode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src)
>> +{
>> +    /* 1000 chars is the PEM line length limit (+1 for tailing NUL) */
>> +    char header[1000+1] = { 0 };
>> +    char footer[1000+1] = { 0 };
>> +
>> +    if (*(BLAST(src)) != '\0')
>> +    {
>> +        msg(M_WARN, "PEM decode error: source buffer not null-terminated");
>> +        return false;
>> +    }
>> +    if (!openvpn_snprintf(header, sizeof(header), "-----BEGIN %s-----", 
>> name))
>> +    {
>> +        return false;
>> +    }
>> +    if (!openvpn_snprintf(footer, sizeof(footer), "-----END %s-----", name))
>> +    {
>> +        return false;
>> +    }
>> +
>> +    size_t use_len = 0;
>> +    mbedtls_pem_context ctx = { 0 };
>> +    bool ret = mbed_ok(mbedtls_pem_read_buffer(&ctx, header, footer, 
>> BPTR(src),
>> +                                               NULL, 0, &use_len));
>> +    if (ret && !buf_write(dst, ctx.buf, ctx.buflen))
>> +    {
>> +        ret = false;
>> +        msg(M_WARN, "PEM decode error: destination buffer too small");
>> +    }
>> +
>> +    mbedtls_pem_free(&ctx);
>> +    return ret;
>> +}
>> +
>>  /*
>>   *
>>   * Random number functions, used in cases where we want
>> diff --git a/src/openvpn/crypto_openssl.c b/src/openvpn/crypto_openssl.c
>> index 20a519e..49d3aeb 100644
>> --- a/src/openvpn/crypto_openssl.c
>> +++ b/src/openvpn/crypto_openssl.c
>> @@ -387,6 +387,88 @@ show_available_engines(void)
>>  #endif
>>  }
>>  
>> +
>> +bool
>> +crypto_pem_encode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src, struct gc_arena *gc)
>> +{
>> +    bool ret = false;
>> +    BIO *bio = BIO_new(BIO_s_mem());
> 
> can we assume bio is always initialized with non-NULL here?

Don't think so.  Will fix.

>> +    if (!PEM_write_bio(bio, name, "", BPTR(src), BLEN(src)))
>> +    {
>> +        ret = false;
>> +        goto cleanup;
>> +    }
>> +
>> +    BUF_MEM *bptr;
>> +    BIO_get_mem_ptr(bio, &bptr);
>> +
>> +    *dst = alloc_buf_gc(bptr->length, gc);
>> +    ASSERT(buf_write(dst, bptr->data, bptr->length));
> 
> why using an ASSERT() here and none in the mbedtls counterpart?
> 
> If there is no special reason I (personally) think that these helper
> functions should not use ASSERT() (unless something really bad is
> happening).
> Or do you think that a failure here indicates a general memory problem?

Because in the mbedtls part, mbed my change the "outlen" value.  While
here, we create a buffer of bptr->length bytes and then write
bptr->length bytes to it.  If that fails, our entire logic (or
executable integrity) is broken.  It's our code only, and it can not fail.

>> +
>> +    ret = true;
>> +cleanup:
>> +    if (!BIO_free(bio))
>> +    {
>> +        ret = false;;
>> +    }
>> +
>> +    return ret;
>> +}
>> +
>> +bool
>> +crypto_pem_decode(const char *name, struct buffer *dst,
>> +                  const struct buffer *src)
>> +{
>> +    bool ret = false;
>> +    BIO *bio;
>> +
>> +    if (!(bio = BIO_new_mem_buf((char *)BPTR(src), BLEN(src))))
>> +    {
>> +        crypto_msg(M_FATAL, "Cannot open memory BIO for PEM decode");
> 
>> +    }
>> +
>> +    char *name_read = NULL;
>> +    char *header_read = NULL;
>> +    uint8_t *data_read = NULL;
>> +    long data_read_len = 0;
>> +    if (!PEM_read_bio(bio, &name_read, &header_read, &data_read,
>> +                      &data_read_len))
>> +    {
>> +        dmsg(D_CRYPT_ERRORS, "%s: PEM decode failed", __func__);
>> +        goto cleanup;
>> +    }
>> +
>> +    if (strcmp(name, name_read))
>> +    {
>> +        dmsg(D_CRYPT_ERRORS,
>> +             "%s: unexpected PEM name (got '%s', expected '%s')",
>> +             __func__, name_read, name);
>> +        goto cleanup;
>> +    }
>> +
>> +    uint8_t *dst_data = buf_write_alloc(dst, data_read_len);
>> +    if (!dst_data)
>> +    {
>> +        dmsg(D_CRYPT_ERRORS, "%s: dst too small (%i, needs %li)", __func__,
>> +             BCAP(dst), data_read_len);
>> +        goto cleanup;
>> +    }
>> +    memcpy(dst_data, data_read, data_read_len);
>> +
>> +    ret = true;
>> +cleanup:
>> +    OPENSSL_free(name_read);
>> +    OPENSSL_free(header_read);
>> +    OPENSSL_free(data_read);
>> +    if (!BIO_free(bio))
>> +    {
>> +        ret = false;;
>> +    }
>> +
>> +    return ret;
>> +}
>> +
>>  /*
>>   *
>>   * Random number functions, used in cases where we want
>> diff --git a/tests/unit_tests/openvpn/Makefile.am 
>> b/tests/unit_tests/openvpn/Makefile.am
>> index 23d758b..d100c21 100644
>> --- a/tests/unit_tests/openvpn/Makefile.am
>> +++ b/tests/unit_tests/openvpn/Makefile.am
>> @@ -6,7 +6,7 @@ if HAVE_LD_WRAP_SUPPORT
>>  check_PROGRAMS += argv_testdriver buffer_testdriver
>>  endif
>>  
>> -check_PROGRAMS += packet_id_testdriver tls_crypt_testdriver
>> +check_PROGRAMS += crypto_testdriver packet_id_testdriver 
>> tls_crypt_testdriver
>>  
>>  TESTS = $(check_PROGRAMS)
>>  
>> @@ -29,6 +29,20 @@ buffer_testdriver_SOURCES = test_buffer.c mock_msg.c \
>>      $(openvpn_srcdir)/buffer.c \
>>      $(openvpn_srcdir)/platform.c
>>  
>> +crypto_testdriver_CFLAGS  = @TEST_CFLAGS@ \
>> +    -I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
>> +    $(OPTIONAL_CRYPTO_CFLAGS)
>> +crypto_testdriver_LDFLAGS = @TEST_LDFLAGS@ \
>> +    $(OPTIONAL_CRYPTO_LIBS)
>> +crypto_testdriver_SOURCES = test_crypto.c mock_msg.c \
>> +    $(openvpn_srcdir)/buffer.c \
>> +    $(openvpn_srcdir)/crypto.c \
>> +    $(openvpn_srcdir)/crypto_mbedtls.c \
>> +    $(openvpn_srcdir)/crypto_openssl.c \
>> +    $(openvpn_srcdir)/otime.c \
>> +    $(openvpn_srcdir)/packet_id.c \
>> +    $(openvpn_srcdir)/platform.c
>> +
>>  packet_id_testdriver_CFLAGS  = @TEST_CFLAGS@ \
>>      -I$(openvpn_includedir) -I$(compat_srcdir) -I$(openvpn_srcdir) \
>>      $(OPTIONAL_CRYPTO_CFLAGS)
>> diff --git a/tests/unit_tests/openvpn/test_crypto.c 
>> b/tests/unit_tests/openvpn/test_crypto.c
>> new file mode 100644
>> index 0000000..62d5b3f
>> --- /dev/null
>> +++ b/tests/unit_tests/openvpn/test_crypto.c
>> @@ -0,0 +1,92 @@
>> +/*
>> + *  OpenVPN -- An application to securely tunnel IP networks
>> + *             over a single UDP port, with support for SSL/TLS-based
>> + *             session authentication and key exchange,
>> + *             packet encryption, packet authentication, and
>> + *             packet compression.
>> + *
>> + *  Copyright (C) 2016-2017 Fox Crypto B.V. <open...@fox-it.com>
>> + *
> 
> this should be updated, time flies :)

Will do.

>> + *  This program is free software; you can redistribute it and/or modify
>> + *  it under the terms of the GNU General Public License version 2
>> + *  as published by the Free Software Foundation.
>> + *
>> + *  This program is distributed in the hope that it will be useful,
>> + *  but WITHOUT ANY WARRANTY; without even the implied warranty of
>> + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
>> + *  GNU General Public License for more details.
>> + *
>> + *  You should have received a copy of the GNU General Public License along
>> + *  with this program; if not, write to the Free Software Foundation, Inc.,
>> + *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
>> + */
>> +
>> +#ifdef HAVE_CONFIG_H
>> +#include "config.h"
>> +#elif defined(_MSC_VER)
>> +#include "config-msvc.h"
>> +#endif
>> +
>> +#include "syshead.h"
>> +
>> +#include <stdio.h>
>> +#include <unistd.h>
>> +#include <stdlib.h>
>> +#include <stdarg.h>
>> +#include <string.h>
>> +#include <setjmp.h>
>> +#include <cmocka.h>
>> +
>> +#include "crypto.h"
>> +
>> +#include "mock_msg.h"
>> +
>> +int script_security = 0; /* Avoid including misc.c */
> 
> I tried commenting it and I don't see any warning. Which include chain
> should lead to its declaration?

Ah, this is no longer the case, probably because either I messed up or
7/10 is already applied.  Either way, I'll remove it.

>> +
>> +static const char testtext[] = "Dummy text to test PEM encoding";
>> +
>> +/**
>> + * Check that packet replays are accepted when CO_IGNORE_PACKET_ID is set. 
>> This
>> + * is used for the first control channel packet that arrives, because we 
>> don't
>> + * know the packet ID yet.
>> + */
> 
> Is the comment above a copy/paste incident? or there is something hidden
> in this unit test?

Woops, definitely a pasto.

>> +static void
>> +crypto_pem_encode_decode_loopback(void **state) {
>> +    struct gc_arena gc = gc_new();
>> +    struct buffer src_buf;
>> +    buf_set_read(&src_buf, (void *)testtext, sizeof(testtext));
>> +
>> +    uint8_t dec[sizeof(testtext)];
>> +    struct buffer dec_buf;
>> +    buf_set_write(&dec_buf, dec, sizeof(dec));
>> +
>> +    struct buffer pem_buf;
>> +
>> +    assert_true(crypto_pem_encode("TESTKEYNAME", &pem_buf, &src_buf, &gc));
>> +
>> +    /* Wrong key name */
>> +    assert_false(crypto_pem_decode("WRONGNAME", &dec_buf, &pem_buf));
>> +
>> +    assert_true(crypto_pem_decode("TESTKEYNAME", &dec_buf, &pem_buf));
>> +
> 
> As a final check, wouldn't it be meaningful to compare the content of
> dec_buf with src_buf to ensure that we properly obtained the original
> char array?

Yes, will do.

> Another question: do we have any way to verify that pem_buf contains
> well-formatted PEM data after pem_encode()?
> I am asking because if both encode and decode become no-op (because of
> some bug) we won't be able to realize that.
> 
> However, I am not sure we have an easy way to check that..maybe you
> could use some SSL function that would normally load PEM data?

That is a bit annoying to test indeed.  How about I just verify that
this is encoding is not a no-op by adding a check that pem_buf is larger
that src_buf?

As for correct PEM en/decoding, I expect that the crypto lib has tested
that.

>> +    gc_free(&gc);
>> +}
>> +
>> +int
>> +main(void) {
>> +    const struct CMUnitTest tests[] = {
>> +        cmocka_unit_test(crypto_pem_encode_decode_loopback),
>> +    };
>> +
>> +#if defined(ENABLE_CRYPTO_OPENSSL)
>> +    OpenSSL_add_all_algorithms();
>> +#endif
>> +
>> +    int ret = cmocka_run_group_tests_name("crypto tests", tests, NULL, 
>> NULL);
>> +
>> +#if defined(ENABLE_CRYPTO_OPENSSL)
>> +    EVP_cleanup();
>> +#endif
>> +
>> +    return ret;
>> +}
>>
> 
> Cheers,

Thanks!

-Steffan

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to