cipher.cpp 4.54 KB
Newer Older
Mark Haines's avatar
Mark Haines committed
1
2
3
4
5
6
7
8
9
10
11
12
13
14
/* Copyright 2015 OpenMarket Ltd
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
15
#include "olm/cipher.h"
16
17
#include "olm/crypto.hh"
#include "olm/memory.hh"
18
19
20
21
22
#include <cstring>

namespace {

struct DerivedKeys {
23
    olm::Aes256Key aes_key;
24
    std::uint8_t mac_key[olm::KEY_LENGTH];
25
    olm::Aes256Iv aes_iv;
26
27
28
29
30
31
32
33
};


static void derive_keys(
    std::uint8_t const * kdf_info, std::size_t kdf_info_length,
    std::uint8_t const * key, std::size_t key_length,
    DerivedKeys & keys
) {
34
    std::uint8_t derived_secrets[2 * olm::KEY_LENGTH + olm::IV_LENGTH];
35
    crypto_hkdf_sha256(
36
        key, key_length,
37
        nullptr, 0,
38
39
40
        kdf_info, kdf_info_length,
        derived_secrets, sizeof(derived_secrets)
    );
41
42
43
44
    std::uint8_t const * pos = derived_secrets;
    pos = olm::load_array(keys.aes_key.key, pos);
    pos = olm::load_array(keys.mac_key, pos);
    pos = olm::load_array(keys.aes_iv.iv, pos);
45
    olm::unset(derived_secrets);
46
47
48
49
}

static const std::size_t MAC_LENGTH = 8;

50
size_t aes_sha_256_cipher_mac_length(const struct olm_cipher *cipher) {
51
52
53
    return MAC_LENGTH;
}

54
55
56
size_t aes_sha_256_cipher_encrypt_ciphertext_length(
        const struct olm_cipher *cipher, size_t plaintext_length
) {
57
    return olm::aes_encrypt_cbc_length(plaintext_length);
58
59
}

60
61
62
63
64
65
66
67
size_t aes_sha_256_cipher_encrypt(
    const struct olm_cipher *cipher,
    uint8_t const * key, size_t key_length,
    uint8_t const * plaintext, size_t plaintext_length,
    uint8_t * ciphertext, size_t ciphertext_length,
    uint8_t * output, size_t output_length
) {
    auto *c = reinterpret_cast<const olm_cipher_aes_sha_256 *>(cipher);
68

69
70
    if (aes_sha_256_cipher_encrypt_ciphertext_length(cipher, plaintext_length)
            < ciphertext_length) {
71
72
        return std::size_t(-1);
    }
73

74
    struct DerivedKeys keys;
75
    std::uint8_t mac[SHA256_OUTPUT_LENGTH];
76

77
    derive_keys(c->kdf_info, c->kdf_info_length, key, key_length, keys);
78

79
    olm::aes_encrypt_cbc(
80
81
82
        keys.aes_key, keys.aes_iv, plaintext, plaintext_length, ciphertext
    );

83
    crypto_hmac_sha256(
84
        keys.mac_key, olm::KEY_LENGTH, output, output_length - MAC_LENGTH, mac
85
86
87
88
    );

    std::memcpy(output + output_length - MAC_LENGTH, mac, MAC_LENGTH);

89
    olm::unset(keys);
90
91
92
93
    return output_length;
}


94
95
96
97
size_t aes_sha_256_cipher_decrypt_max_plaintext_length(
    const struct olm_cipher *cipher,
    size_t ciphertext_length
) {
98
99
100
    return ciphertext_length;
}

101
102
103
104
105
106
107
108
109
size_t aes_sha_256_cipher_decrypt(
    const struct olm_cipher *cipher,
    uint8_t const * key, size_t key_length,
    uint8_t const * input, size_t input_length,
    uint8_t const * ciphertext, size_t ciphertext_length,
    uint8_t * plaintext, size_t max_plaintext_length
) {
    auto *c = reinterpret_cast<const olm_cipher_aes_sha_256 *>(cipher);

110
    DerivedKeys keys;
111
    std::uint8_t mac[SHA256_OUTPUT_LENGTH];
112

113
    derive_keys(c->kdf_info, c->kdf_info_length, key, key_length, keys);
114

115
    crypto_hmac_sha256(
116
        keys.mac_key, olm::KEY_LENGTH, input, input_length - MAC_LENGTH, mac
117
118
119
    );

    std::uint8_t const * input_mac = input + input_length - MAC_LENGTH;
120
121
    if (!olm::is_equal(input_mac, mac, MAC_LENGTH)) {
        olm::unset(keys);
122
123
124
        return std::size_t(-1);
    }

125
    std::size_t plaintext_length = olm::aes_decrypt_cbc(
126
127
128
        keys.aes_key, keys.aes_iv, ciphertext, ciphertext_length, plaintext
    );

129
    olm::unset(keys);
130
131
    return plaintext_length;
}
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158


void aes_sha_256_cipher_destruct(struct olm_cipher *cipher) {
}


const cipher_ops aes_sha_256_cipher_ops = {
  aes_sha_256_cipher_mac_length,
  aes_sha_256_cipher_encrypt_ciphertext_length,
  aes_sha_256_cipher_encrypt,
  aes_sha_256_cipher_decrypt_max_plaintext_length,
  aes_sha_256_cipher_decrypt,
  aes_sha_256_cipher_destruct
};

} // namespace


olm_cipher *olm_cipher_aes_sha_256_init(struct olm_cipher_aes_sha_256 *cipher,
                                        uint8_t const * kdf_info,
                                        size_t kdf_info_length)
{
    cipher->base_cipher.ops = &aes_sha_256_cipher_ops;
    cipher->kdf_info = kdf_info;
    cipher->kdf_info_length = kdf_info_length;
    return &(cipher->base_cipher);
}