Android NTP: Add UMA for the time to click a most visited tile
[chromium-blink-merge.git] / third_party / tlslite / patches / ecdhe_rsa.patch
blob054a07a0f0553a71849728eb034799e8cc53a3c7
1 diff --git a/third_party/tlslite/tlslite/constants.py b/third_party/tlslite/tlslite/constants.py
2 index e5b88af..6d78a20 100644
3 --- a/third_party/tlslite/tlslite/constants.py
4 +++ b/third_party/tlslite/tlslite/constants.py
5 @@ -76,6 +76,14 @@ class SignatureAlgorithm:
6 class NameType:
7 host_name = 0
9 +class ECCurveType:
10 + explicit_prime = 1
11 + explicit_char2 = 2
12 + named_curve = 3
14 +class NamedCurve:
15 + secp256r1 = 23
17 class AlertLevel:
18 warning = 1
19 fatal = 2
20 @@ -178,11 +186,19 @@ class CipherSuite:
21 TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x009C
22 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 = 0x009E
24 + TLS_ECDHE_RSA_WITH_RC4_128_SHA = 0xc011
25 + TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA = 0xc012
26 + TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0xc013
27 + TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0xc014
28 + TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 = 0xc027
29 + TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0xc02f
31 tripleDESSuites = []
32 tripleDESSuites.append(TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA)
33 tripleDESSuites.append(TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA)
34 tripleDESSuites.append(TLS_RSA_WITH_3DES_EDE_CBC_SHA)
35 tripleDESSuites.append(TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA)
36 + tripleDESSuites.append(TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA)
38 aes128Suites = []
39 aes128Suites.append(TLS_SRP_SHA_WITH_AES_128_CBC_SHA)
40 @@ -192,6 +208,8 @@ class CipherSuite:
41 aes128Suites.append(TLS_DH_ANON_WITH_AES_128_CBC_SHA)
42 aes128Suites.append(TLS_RSA_WITH_AES_128_CBC_SHA256)
43 aes128Suites.append(TLS_DHE_RSA_WITH_AES_128_CBC_SHA256)
44 + aes128Suites.append(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA)
45 + aes128Suites.append(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256)
47 aes256Suites = []
48 aes256Suites.append(TLS_SRP_SHA_WITH_AES_256_CBC_SHA)
49 @@ -201,14 +219,17 @@ class CipherSuite:
50 aes256Suites.append(TLS_DHE_RSA_WITH_AES_256_CBC_SHA)
51 aes256Suites.append(TLS_RSA_WITH_AES_256_CBC_SHA256)
52 aes256Suites.append(TLS_DHE_RSA_WITH_AES_256_CBC_SHA256)
53 + aes256Suites.append(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA)
55 aes128GcmSuites = []
56 aes128GcmSuites.append(TLS_RSA_WITH_AES_128_GCM_SHA256)
57 aes128GcmSuites.append(TLS_DHE_RSA_WITH_AES_128_GCM_SHA256)
58 + aes128GcmSuites.append(TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256)
60 rc4Suites = []
61 rc4Suites.append(TLS_RSA_WITH_RC4_128_SHA)
62 rc4Suites.append(TLS_RSA_WITH_RC4_128_MD5)
63 + rc4Suites.append(TLS_ECDHE_RSA_WITH_RC4_128_SHA)
65 shaSuites = []
66 shaSuites.append(TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA)
67 @@ -226,6 +247,10 @@ class CipherSuite:
68 shaSuites.append(TLS_DHE_RSA_WITH_AES_256_CBC_SHA)
69 shaSuites.append(TLS_DH_ANON_WITH_AES_128_CBC_SHA)
70 shaSuites.append(TLS_DH_ANON_WITH_AES_256_CBC_SHA)
71 + shaSuites.append(TLS_ECDHE_RSA_WITH_RC4_128_SHA)
72 + shaSuites.append(TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA)
73 + shaSuites.append(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA)
74 + shaSuites.append(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA)
76 sha256Suites = []
77 sha256Suites.append(TLS_RSA_WITH_AES_128_CBC_SHA256)
78 @@ -234,6 +259,9 @@ class CipherSuite:
79 sha256Suites.append(TLS_DHE_RSA_WITH_AES_256_CBC_SHA256)
80 sha256Suites.append(TLS_RSA_WITH_AES_128_GCM_SHA256)
81 sha256Suites.append(TLS_DHE_RSA_WITH_AES_128_GCM_SHA256)
82 + sha256Suites.append(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256)
83 + sha256Suites.append(TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256)
86 aeadSuites = aes128GcmSuites
88 @@ -275,6 +303,8 @@ class CipherSuite:
89 keyExchangeSuites += CipherSuite.certSuites
90 if "dhe_rsa" in keyExchangeNames:
91 keyExchangeSuites += CipherSuite.dheCertSuites
92 + if "ecdhe_rsa" in keyExchangeNames:
93 + keyExchangeSuites += CipherSuite.ecdheCertSuites
94 if "srp_sha" in keyExchangeNames:
95 keyExchangeSuites += CipherSuite.srpSuites
96 if "srp_sha_rsa" in keyExchangeNames:
97 @@ -335,7 +365,19 @@ class CipherSuite:
98 def getDheCertSuites(settings, version=None):
99 return CipherSuite._filterSuites(CipherSuite.dheCertSuites, settings, version)
101 - certAllSuites = srpCertSuites + certSuites + dheCertSuites
102 + ecdheCertSuites = []
103 + ecdheCertSuites.append(TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256)
104 + ecdheCertSuites.append(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256)
105 + ecdheCertSuites.append(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA)
106 + ecdheCertSuites.append(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA)
107 + ecdheCertSuites.append(TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA)
108 + ecdheCertSuites.append(TLS_ECDHE_RSA_WITH_RC4_128_SHA)
110 + @staticmethod
111 + def getEcdheCertSuites(settings, version=None):
112 + return CipherSuite._filterSuites(CipherSuite.ecdheCertSuites, settings, version)
114 + certAllSuites = srpCertSuites + certSuites + dheCertSuites + ecdheCertSuites
116 anonSuites = []
117 anonSuites.append(TLS_DH_ANON_WITH_AES_256_CBC_SHA)
118 @@ -346,6 +388,7 @@ class CipherSuite:
119 return CipherSuite._filterSuites(CipherSuite.anonSuites, settings, version)
121 dhAllSuites = dheCertSuites + anonSuites
122 + ecdhAllSuites = ecdheCertSuites
124 @staticmethod
125 def canonicalCipherName(ciphersuite):
126 diff --git a/third_party/tlslite/tlslite/handshakesettings.py b/third_party/tlslite/tlslite/handshakesettings.py
127 index e752834..605ed42 100644
128 --- a/third_party/tlslite/tlslite/handshakesettings.py
129 +++ b/third_party/tlslite/tlslite/handshakesettings.py
130 @@ -14,7 +14,7 @@ from .utils import cipherfactory
131 CIPHER_NAMES = ["aes128gcm", "rc4", "aes256", "aes128", "3des"]
132 MAC_NAMES = ["sha", "sha256", "aead"] # Don't allow "md5" by default.
133 ALL_MAC_NAMES = MAC_NAMES + ["md5"]
134 -KEY_EXCHANGE_NAMES = ["rsa", "dhe_rsa", "srp_sha", "srp_sha_rsa", "dh_anon"]
135 +KEY_EXCHANGE_NAMES = ["rsa", "dhe_rsa", "ecdhe_rsa", "srp_sha", "srp_sha_rsa", "dh_anon"]
136 CIPHER_IMPLEMENTATIONS = ["openssl", "pycrypto", "python"]
137 CERTIFICATE_TYPES = ["x509"]
138 TLS_INTOLERANCE_TYPES = ["alert", "close", "reset"]
139 diff --git a/third_party/tlslite/tlslite/messages.py b/third_party/tlslite/tlslite/messages.py
140 index f2e2cfc..9aeff6d 100644
141 --- a/third_party/tlslite/tlslite/messages.py
142 +++ b/third_party/tlslite/tlslite/messages.py
143 @@ -509,10 +509,13 @@ class ServerKeyExchange(HandshakeMsg):
144 self.srp_g = 0
145 self.srp_s = bytearray(0)
146 self.srp_B = 0
147 - # Anon DH params:
148 + # DH params:
149 self.dh_p = 0
150 self.dh_g = 0
151 self.dh_Ys = 0
152 + # ECDH params:
153 + self.ecdhCurve = 0
154 + self.ecdhPublic = bytearray(0)
155 self.signature = bytearray(0)
157 def createSRP(self, srp_N, srp_g, srp_s, srp_B):
158 @@ -528,6 +531,11 @@ class ServerKeyExchange(HandshakeMsg):
159 self.dh_Ys = dh_Ys
160 return self
162 + def createECDH(self, ecdhCurve, ecdhPublic):
163 + self.ecdhCurve = ecdhCurve
164 + self.ecdhPublic = ecdhPublic
165 + return self
167 def parse(self, p):
168 p.startLengthCheck(3)
169 if self.cipherSuite in CipherSuite.srpAllSuites:
170 @@ -555,6 +563,10 @@ class ServerKeyExchange(HandshakeMsg):
171 w.addVarSeq(numberToByteArray(self.dh_p), 1, 2)
172 w.addVarSeq(numberToByteArray(self.dh_g), 1, 2)
173 w.addVarSeq(numberToByteArray(self.dh_Ys), 1, 2)
174 + elif self.cipherSuite in CipherSuite.ecdhAllSuites:
175 + w.add(ECCurveType.named_curve, 1)
176 + w.add(self.ecdhCurve, 2)
177 + w.addVarSeq(self.ecdhPublic, 1, 1)
178 else:
179 assert(False)
180 return w.bytes
181 @@ -626,7 +638,9 @@ class ClientKeyExchange(HandshakeMsg):
182 else:
183 raise AssertionError()
184 elif self.cipherSuite in CipherSuite.dhAllSuites:
185 - self.dh_Yc = bytesToNumber(p.getVarBytes(2))
186 + self.dh_Yc = bytesToNumber(p.getVarBytes(2))
187 + elif self.cipherSuite in CipherSuite.ecdhAllSuites:
188 + self.ecdh_Yc = p.getVarBytes(1)
189 else:
190 raise AssertionError()
191 p.stopLengthCheck()
192 diff --git a/third_party/tlslite/tlslite/tlsconnection.py b/third_party/tlslite/tlslite/tlsconnection.py
193 index 0a85d3c..dfac274 100644
194 --- a/third_party/tlslite/tlslite/tlsconnection.py
195 +++ b/third_party/tlslite/tlslite/tlsconnection.py
196 @@ -24,6 +24,7 @@ from .mathtls import *
197 from .handshakesettings import HandshakeSettings
198 from .utils.tackwrapper import *
199 from .utils.rsakey import RSAKey
200 +from .utils import p256
202 class KeyExchange(object):
203 def __init__(self, cipherSuite, clientHello, serverHello, privateKey):
204 @@ -127,6 +128,25 @@ DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510
205 S = powMod(dh_Yc, self.dh_Xs, self.dh_p)
206 return numberToByteArray(S)
208 +class ECDHE_RSAKeyExchange(KeyExchange):
209 + def makeServerKeyExchange(self):
210 + public, self.private = p256.generatePublicPrivate()
212 + version = self.serverHello.server_version
213 + serverKeyExchange = ServerKeyExchange(self.cipherSuite, version)
214 + serverKeyExchange.createECDH(NamedCurve.secp256r1, bytearray(public))
215 + hashBytes = serverKeyExchange.hash(self.clientHello.random,
216 + self.serverHello.random)
217 + if version >= (3,3):
218 + # TODO: Signature algorithm negotiation not supported.
219 + hashBytes = RSAKey.addPKCS1SHA1Prefix(hashBytes)
220 + serverKeyExchange.signature = self.privateKey.sign(hashBytes)
221 + return serverKeyExchange
223 + def processClientKeyExchange(self, clientKeyExchange):
224 + ecdh_Yc = clientKeyExchange.ecdh_Yc
225 + return bytearray(p256.generateSharedValue(bytes(ecdh_Yc), self.private))
227 class TLSConnection(TLSRecordLayer):
229 This class wraps a socket and provides TLS handshaking and data
230 @@ -1321,9 +1341,8 @@ class TLSConnection(TLSRecordLayer):
231 else: break
232 premasterSecret = result
234 - # Perform the RSA or DHE_RSA key exchange
235 - elif (cipherSuite in CipherSuite.certSuites or
236 - cipherSuite in CipherSuite.dheCertSuites):
237 + # Perform a certificate-based key exchange
238 + elif cipherSuite in CipherSuite.certAllSuites:
239 if cipherSuite in CipherSuite.certSuites:
240 keyExchange = RSAKeyExchange(cipherSuite,
241 clientHello,
242 @@ -1334,6 +1353,11 @@ class TLSConnection(TLSRecordLayer):
243 clientHello,
244 serverHello,
245 privateKey)
246 + elif cipherSuite in CipherSuite.ecdheCertSuites:
247 + keyExchange = ECDHE_RSAKeyExchange(cipherSuite,
248 + clientHello,
249 + serverHello,
250 + privateKey)
251 else:
252 assert(False)
253 for result in self._serverCertKeyExchange(clientHello, serverHello,
254 @@ -1450,6 +1474,7 @@ class TLSConnection(TLSRecordLayer):
255 CipherSuite.getSrpCertSuites(settings, self.version)
256 cipherSuites += CipherSuite.getSrpSuites(settings, self.version)
257 elif certChain:
258 + cipherSuites += CipherSuite.getEcdheCertSuites(settings, self.version)
259 cipherSuites += CipherSuite.getDheCertSuites(settings, self.version)
260 cipherSuites += CipherSuite.getCertSuites(settings, self.version)
261 elif anon:
262 diff --git a/third_party/tlslite/tlslite/utils/p256.py b/third_party/tlslite/tlslite/utils/p256.py
263 index e69de29..6eb9a77 100644
264 --- a/third_party/tlslite/tlslite/utils/p256.py
265 +++ b/third_party/tlslite/tlslite/utils/p256.py
266 @@ -0,0 +1,162 @@
267 +# Author: Google
268 +# See the LICENSE file for legal information regarding use of this file.
270 +import os
272 +p = (
273 + 115792089210356248762697446949407573530086143415290314195533631308867097853951)
274 +order = (
275 + 115792089210356248762697446949407573529996955224135760342422259061068512044369)
276 +p256B = 0x5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b
278 +baseX = 0x6b17d1f2e12c4247f8bce6e563a440f277037d812deb33a0f4a13945d898c296
279 +baseY = 0x4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5
280 +basePoint = (baseX, baseY)
283 +def _pointAdd(a, b):
284 + Z1Z1 = (a[2] * a[2]) % p
285 + Z2Z2 = (b[2] * b[2]) % p
286 + U1 = (a[0] * Z2Z2) % p
287 + U2 = (b[0] * Z1Z1) % p
288 + S1 = (a[1] * b[2] * Z2Z2) % p
289 + S2 = (b[1] * a[2] * Z1Z1) % p
290 + if U1 == U2 and S1 == S2:
291 + return pointDouble(a)
292 + H = (U2 - U1) % p
293 + I = (4 * H * H) % p
294 + J = (H * I) % p
295 + r = (2 * (S2 - S1)) % p
296 + V = (U1 * I) % p
297 + X3 = (r * r - J - 2 * V) % p
298 + Y3 = (r * (V - X3) - 2 * S1 * J) % p
299 + Z3 = (((a[2] + b[2]) * (a[2] + b[2]) - Z1Z1 - Z2Z2) * H) % p
301 + return (X3, Y3, Z3)
304 +def _pointDouble(a):
305 + delta = (a[2] * a[2]) % p
306 + gamma = (a[1] * a[1]) % p
307 + beta = (a[0] * gamma) % p
308 + alpha = (3 * (a[0] - delta) * (a[0] + delta)) % p
309 + X3 = (alpha * alpha - 8 * beta) % p
310 + Z3 = ((a[1] + a[2]) * (a[1] + a[2]) - gamma - delta) % p
311 + Y3 = (alpha * (4 * beta - X3) - 8 * gamma * gamma) % p
313 + return (X3, Y3, Z3)
316 +def _square(n):
317 + return (n * n)
320 +def _modpow(a, n, p):
321 + if n == 0:
322 + return 1
323 + if n == 1:
324 + return a
325 + r = _square(_modpow(a, n >> 1, p)) % p
326 + if n & 1 == 1:
327 + r = (r * a) % p
328 + return r
331 +def _scalarMult(k, point):
332 + accum = (0, 0, 0)
333 + accumIsInfinity = True
334 + jacobianPoint = (point[0], point[1], 1)
336 + for bit in range(255, -1, -1):
337 + if not accumIsInfinity:
338 + accum = _pointDouble(accum)
340 + if (k >> bit) & 1 == 1:
341 + if accumIsInfinity:
342 + accum = jacobianPoint
343 + accumIsInfinity = False
344 + else:
345 + accum = _pointAdd(accum, jacobianPoint)
347 + if accumIsInfinity:
348 + return (0, 0)
350 + zInv = _modpow(accum[2], p - 2, p)
351 + return ((accum[0] * zInv * zInv) % p, (accum[1] * zInv * zInv * zInv) % p)
354 +def _scalarBaseMult(k):
355 + return _scalarMult(k, basePoint)
358 +def _decodeBigEndian(b):
359 + return sum([ord(b[len(b) - i - 1]) << 8 * i for i in range(len(b))])
362 +def _encodeBigEndian(n):
363 + b = []
364 + while n != 0:
365 + b.append(chr(n & 0xff))
366 + n >>= 8
368 + if len(b) == 0:
369 + b.append(0)
370 + b.reverse()
372 + return "".join(b)
375 +def _zeroPad(b, length):
376 + if len(b) < length:
377 + return ("\x00" * (length - len(b))) + b
378 + return b
381 +def _encodePoint(point):
382 + x = point[0]
383 + y = point[1]
384 + if (y * y) % p != (x * x * x - 3 * x + p256B) % p:
385 + raise "point not on curve"
386 + return "\x04" + _zeroPad(_encodeBigEndian(point[0]), 32) + _zeroPad(
387 + _encodeBigEndian(point[1]), 32)
390 +def _decodePoint(b):
391 + if len(b) != 1 + 32 + 32 or ord(b[0]) != 4:
392 + raise "invalid encoded ec point"
393 + x = _decodeBigEndian(b[1:33])
394 + y = _decodeBigEndian(b[33:65])
395 + if (y * y) % p != (x * x * x - 3 * x + p256B) % p:
396 + raise "point not on curve"
397 + return (x, y)
400 +def generatePublicPrivate():
401 + """generatePublicPrivate returns a tuple of (X9.62 encoded public point,
402 + private value), where the private value is generated from os.urandom."""
403 + private = _decodeBigEndian(os.urandom(40)) % order
404 + return _encodePoint(_scalarBaseMult(private)), private
407 +def generateSharedValue(theirPublic, private):
408 + """generateSharedValue returns the encoded x-coordinate of the
409 + multiplication of a peer's X9.62 encoded point and a private value."""
410 + return _zeroPad(
411 + _encodeBigEndian(_scalarMult(private, _decodePoint(theirPublic))[0]),
412 + 32)
414 +if __name__ == "__main__":
415 + alice, alicePrivate = generatePublicPrivate()
416 + bob, bobPrivate = generatePublicPrivate()
418 + if generateSharedValue(alice, bobPrivate) != generateSharedValue(
419 + bob, alicePrivate):
420 + raise "simple DH test failed"
422 + (x, _) = _scalarBaseMult(1)
424 + for i in range(1000):
425 + (x, _) = _scalarBaseMult(x)
427 + if x != 2428281965257598569040586318034812501729437946720808289049534492833635302706:
428 + raise "loop test failed"