2015-06-22 18:50:56 +02:00
|
|
|
/* Copyright 2015 OpenMarket Ltd
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2016-05-16 17:25:09 +02:00
|
|
|
#include "olm/cipher.h"
|
2016-09-02 16:35:04 +02:00
|
|
|
#include "olm/crypto.h"
|
2015-06-27 01:15:23 +02:00
|
|
|
#include "olm/memory.hh"
|
2015-06-11 15:20:35 +02:00
|
|
|
#include <cstring>
|
|
|
|
|
2016-09-02 16:11:14 +02:00
|
|
|
const std::size_t HMAC_KEY_LENGTH = 32;
|
|
|
|
|
2015-06-11 15:20:35 +02:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
struct DerivedKeys {
|
2016-09-02 16:35:04 +02:00
|
|
|
_olm_aes256_key aes_key;
|
2016-09-02 16:11:14 +02:00
|
|
|
std::uint8_t mac_key[HMAC_KEY_LENGTH];
|
2016-09-02 16:35:04 +02:00
|
|
|
_olm_aes256_iv aes_iv;
|
2015-06-11 15:20:35 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static void derive_keys(
|
|
|
|
std::uint8_t const * kdf_info, std::size_t kdf_info_length,
|
|
|
|
std::uint8_t const * key, std::size_t key_length,
|
|
|
|
DerivedKeys & keys
|
|
|
|
) {
|
2016-09-02 16:11:14 +02:00
|
|
|
std::uint8_t derived_secrets[
|
|
|
|
AES256_KEY_LENGTH + HMAC_KEY_LENGTH + AES256_IV_LENGTH
|
|
|
|
];
|
2016-05-20 12:59:31 +02:00
|
|
|
_olm_crypto_hkdf_sha256(
|
2015-06-11 15:20:35 +02:00
|
|
|
key, key_length,
|
2015-06-12 15:09:41 +02:00
|
|
|
nullptr, 0,
|
2015-06-11 15:20:35 +02:00
|
|
|
kdf_info, kdf_info_length,
|
|
|
|
derived_secrets, sizeof(derived_secrets)
|
|
|
|
);
|
2015-08-19 18:18:09 +02:00
|
|
|
std::uint8_t const * pos = derived_secrets;
|
|
|
|
pos = olm::load_array(keys.aes_key.key, pos);
|
|
|
|
pos = olm::load_array(keys.mac_key, pos);
|
|
|
|
pos = olm::load_array(keys.aes_iv.iv, pos);
|
2015-06-27 01:15:23 +02:00
|
|
|
olm::unset(derived_secrets);
|
2015-06-11 15:20:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const std::size_t MAC_LENGTH = 8;
|
|
|
|
|
2016-05-20 12:59:31 +02:00
|
|
|
size_t aes_sha_256_cipher_mac_length(const struct _olm_cipher *cipher) {
|
2015-06-11 15:20:35 +02:00
|
|
|
return MAC_LENGTH;
|
|
|
|
}
|
|
|
|
|
2016-05-16 17:25:09 +02:00
|
|
|
size_t aes_sha_256_cipher_encrypt_ciphertext_length(
|
2016-05-20 12:59:31 +02:00
|
|
|
const struct _olm_cipher *cipher, size_t plaintext_length
|
2016-05-16 17:25:09 +02:00
|
|
|
) {
|
2016-09-02 16:35:04 +02:00
|
|
|
return _olm_crypto_aes_encrypt_cbc_length(plaintext_length);
|
2015-06-11 15:20:35 +02:00
|
|
|
}
|
|
|
|
|
2016-05-16 17:25:09 +02:00
|
|
|
size_t aes_sha_256_cipher_encrypt(
|
2016-05-20 12:59:31 +02:00
|
|
|
const struct _olm_cipher *cipher,
|
2016-05-16 17:25:09 +02:00
|
|
|
uint8_t const * key, size_t key_length,
|
|
|
|
uint8_t const * plaintext, size_t plaintext_length,
|
|
|
|
uint8_t * ciphertext, size_t ciphertext_length,
|
|
|
|
uint8_t * output, size_t output_length
|
|
|
|
) {
|
2016-05-20 12:59:31 +02:00
|
|
|
auto *c = reinterpret_cast<const _olm_cipher_aes_sha_256 *>(cipher);
|
2015-06-11 15:20:35 +02:00
|
|
|
|
2018-05-31 22:41:06 +02:00
|
|
|
if (ciphertext_length
|
|
|
|
< aes_sha_256_cipher_encrypt_ciphertext_length(cipher, plaintext_length)
|
|
|
|
|| output_length < MAC_LENGTH) {
|
2015-06-11 15:20:35 +02:00
|
|
|
return std::size_t(-1);
|
|
|
|
}
|
2016-05-16 17:25:09 +02:00
|
|
|
|
2015-06-11 15:20:35 +02:00
|
|
|
struct DerivedKeys keys;
|
2016-05-13 13:56:23 +02:00
|
|
|
std::uint8_t mac[SHA256_OUTPUT_LENGTH];
|
2015-06-11 15:20:35 +02:00
|
|
|
|
2016-05-16 17:25:09 +02:00
|
|
|
derive_keys(c->kdf_info, c->kdf_info_length, key, key_length, keys);
|
2015-06-11 15:20:35 +02:00
|
|
|
|
2016-09-02 16:35:04 +02:00
|
|
|
_olm_crypto_aes_encrypt_cbc(
|
|
|
|
&keys.aes_key, &keys.aes_iv, plaintext, plaintext_length, ciphertext
|
2015-06-11 15:20:35 +02:00
|
|
|
);
|
|
|
|
|
2016-05-20 12:59:31 +02:00
|
|
|
_olm_crypto_hmac_sha256(
|
2016-09-02 16:11:14 +02:00
|
|
|
keys.mac_key, HMAC_KEY_LENGTH, output, output_length - MAC_LENGTH, mac
|
2015-06-11 15:20:35 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
std::memcpy(output + output_length - MAC_LENGTH, mac, MAC_LENGTH);
|
|
|
|
|
2015-06-27 01:15:23 +02:00
|
|
|
olm::unset(keys);
|
2015-06-11 15:20:35 +02:00
|
|
|
return output_length;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-16 17:25:09 +02:00
|
|
|
size_t aes_sha_256_cipher_decrypt_max_plaintext_length(
|
2016-05-20 12:59:31 +02:00
|
|
|
const struct _olm_cipher *cipher,
|
2016-05-16 17:25:09 +02:00
|
|
|
size_t ciphertext_length
|
|
|
|
) {
|
2015-06-11 15:20:35 +02:00
|
|
|
return ciphertext_length;
|
|
|
|
}
|
|
|
|
|
2016-05-16 17:25:09 +02:00
|
|
|
size_t aes_sha_256_cipher_decrypt(
|
2016-05-20 12:59:31 +02:00
|
|
|
const struct _olm_cipher *cipher,
|
2016-05-16 17:25:09 +02:00
|
|
|
uint8_t const * key, size_t key_length,
|
|
|
|
uint8_t const * input, size_t input_length,
|
|
|
|
uint8_t const * ciphertext, size_t ciphertext_length,
|
|
|
|
uint8_t * plaintext, size_t max_plaintext_length
|
|
|
|
) {
|
2018-05-31 22:41:06 +02:00
|
|
|
if (max_plaintext_length
|
|
|
|
< aes_sha_256_cipher_decrypt_max_plaintext_length(cipher, ciphertext_length)
|
|
|
|
|| input_length < MAC_LENGTH) {
|
|
|
|
return std::size_t(-1);
|
|
|
|
}
|
|
|
|
|
2016-05-20 12:59:31 +02:00
|
|
|
auto *c = reinterpret_cast<const _olm_cipher_aes_sha_256 *>(cipher);
|
2016-05-16 17:25:09 +02:00
|
|
|
|
2015-06-11 15:20:35 +02:00
|
|
|
DerivedKeys keys;
|
2016-05-13 13:56:23 +02:00
|
|
|
std::uint8_t mac[SHA256_OUTPUT_LENGTH];
|
2015-06-11 15:20:35 +02:00
|
|
|
|
2016-05-16 17:25:09 +02:00
|
|
|
derive_keys(c->kdf_info, c->kdf_info_length, key, key_length, keys);
|
2015-06-11 15:20:35 +02:00
|
|
|
|
2016-05-20 12:59:31 +02:00
|
|
|
_olm_crypto_hmac_sha256(
|
2016-09-02 16:11:14 +02:00
|
|
|
keys.mac_key, HMAC_KEY_LENGTH, input, input_length - MAC_LENGTH, mac
|
2015-06-11 15:20:35 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
std::uint8_t const * input_mac = input + input_length - MAC_LENGTH;
|
2015-06-27 01:15:23 +02:00
|
|
|
if (!olm::is_equal(input_mac, mac, MAC_LENGTH)) {
|
|
|
|
olm::unset(keys);
|
2015-06-11 15:20:35 +02:00
|
|
|
return std::size_t(-1);
|
|
|
|
}
|
|
|
|
|
2016-09-02 16:35:04 +02:00
|
|
|
std::size_t plaintext_length = _olm_crypto_aes_decrypt_cbc(
|
|
|
|
&keys.aes_key, &keys.aes_iv, ciphertext, ciphertext_length, plaintext
|
2015-06-11 15:20:35 +02:00
|
|
|
);
|
|
|
|
|
2015-06-27 01:15:23 +02:00
|
|
|
olm::unset(keys);
|
2015-06-11 15:20:35 +02:00
|
|
|
return plaintext_length;
|
|
|
|
}
|
2016-05-16 17:25:09 +02:00
|
|
|
|
2016-05-24 13:06:47 +02:00
|
|
|
} // namespace
|
2016-05-16 17:25:09 +02:00
|
|
|
|
2016-05-24 13:06:47 +02:00
|
|
|
const struct _olm_cipher_ops _olm_cipher_aes_sha_256_ops = {
|
2016-05-16 17:25:09 +02:00
|
|
|
aes_sha_256_cipher_mac_length,
|
|
|
|
aes_sha_256_cipher_encrypt_ciphertext_length,
|
|
|
|
aes_sha_256_cipher_encrypt,
|
|
|
|
aes_sha_256_cipher_decrypt_max_plaintext_length,
|
|
|
|
aes_sha_256_cipher_decrypt,
|
|
|
|
};
|