123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389 |
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
- #ifdef FREEBL_NO_DEPEND
- #include "stubs.h"
- #endif
- #include <string.h>
- #include <stdio.h>
- #include "seccomon.h"
- #include "secerr.h"
- #include "blapit.h"
- #include "blapii.h"
- #include "chacha20poly1305.h"
- // There are three implementations of ChaCha20Poly1305:
- // 1) 128-bit with AVX hardware acceleration used on x64
- // 2) 256-bit with AVX2 hardware acceleration used on x64
- // 3) 32-bit used on all other platforms
- // On x64 when AVX2 and other necessary registers are available,
- // the 256bit-verctorized version will be used. When AVX2 features
- // are unavailable or disabled but AVX registers are available, the
- // 128bit-vectorized version will be used. In all other cases the
- // scalar version of the HACL* code will be used.
- // Instead of including the headers (they bring other things we don't want),
- // we declare the functions here.
- // Usage is guarded by runtime checks of required hardware features.
- // Forward declaration from Hacl_Chacha20_Vec128.h and Hacl_Chacha20Poly1305_128.h.
- extern void Hacl_Chacha20_Vec128_chacha20_encrypt_128(uint32_t len, uint8_t *out,
- uint8_t *text, uint8_t *key,
- uint8_t *n1, uint32_t ctr);
- extern void
- Hacl_Chacha20Poly1305_128_aead_encrypt(uint8_t *k, uint8_t *n1, uint32_t aadlen,
- uint8_t *aad, uint32_t mlen, uint8_t *m,
- uint8_t *cipher, uint8_t *mac);
- extern uint32_t
- Hacl_Chacha20Poly1305_128_aead_decrypt(uint8_t *k, uint8_t *n1, uint32_t aadlen,
- uint8_t *aad, uint32_t mlen, uint8_t *m,
- uint8_t *cipher, uint8_t *mac);
- // Forward declaration from Hacl_Chacha20_Vec256.h and Hacl_Chacha20Poly1305_256.h.
- extern void Hacl_Chacha20_Vec256_chacha20_encrypt_256(uint32_t len, uint8_t *out,
- uint8_t *text, uint8_t *key,
- uint8_t *n1, uint32_t ctr);
- extern void
- Hacl_Chacha20Poly1305_256_aead_encrypt(uint8_t *k, uint8_t *n1, uint32_t aadlen,
- uint8_t *aad, uint32_t mlen, uint8_t *m,
- uint8_t *cipher, uint8_t *mac);
- extern uint32_t
- Hacl_Chacha20Poly1305_256_aead_decrypt(uint8_t *k, uint8_t *n1, uint32_t aadlen,
- uint8_t *aad, uint32_t mlen, uint8_t *m,
- uint8_t *cipher, uint8_t *mac);
- // Forward declaration from Hacl_Chacha20.h and Hacl_Chacha20Poly1305_32.h.
- extern void Hacl_Chacha20_chacha20_encrypt(uint32_t len, uint8_t *out,
- uint8_t *text, uint8_t *key,
- uint8_t *n1, uint32_t ctr);
- extern void
- Hacl_Chacha20Poly1305_32_aead_encrypt(uint8_t *k, uint8_t *n1, uint32_t aadlen,
- uint8_t *aad, uint32_t mlen, uint8_t *m,
- uint8_t *cipher, uint8_t *mac);
- extern uint32_t
- Hacl_Chacha20Poly1305_32_aead_decrypt(uint8_t *k, uint8_t *n1, uint32_t aadlen,
- uint8_t *aad, uint32_t mlen, uint8_t *m,
- uint8_t *cipher, uint8_t *mac);
- SECStatus
- ChaCha20Poly1305_InitContext(ChaCha20Poly1305Context *ctx,
- const unsigned char *key, unsigned int keyLen,
- unsigned int tagLen)
- {
- #ifdef NSS_DISABLE_CHACHAPOLY
- return SECFailure;
- #else
- if (keyLen != 32) {
- PORT_SetError(SEC_ERROR_BAD_KEY);
- return SECFailure;
- }
- if (tagLen == 0 || tagLen > 16) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- PORT_Memcpy(ctx->key, key, sizeof(ctx->key));
- ctx->tagLen = tagLen;
- return SECSuccess;
- #endif
- }
- ChaCha20Poly1305Context *
- ChaCha20Poly1305_CreateContext(const unsigned char *key, unsigned int keyLen,
- unsigned int tagLen)
- {
- #ifdef NSS_DISABLE_CHACHAPOLY
- return NULL;
- #else
- ChaCha20Poly1305Context *ctx;
- ctx = PORT_New(ChaCha20Poly1305Context);
- if (ctx == NULL) {
- return NULL;
- }
- if (ChaCha20Poly1305_InitContext(ctx, key, keyLen, tagLen) != SECSuccess) {
- PORT_Free(ctx);
- ctx = NULL;
- }
- return ctx;
- #endif
- }
- void
- ChaCha20Poly1305_DestroyContext(ChaCha20Poly1305Context *ctx, PRBool freeit)
- {
- #ifndef NSS_DISABLE_CHACHAPOLY
- PORT_Memset(ctx, 0, sizeof(*ctx));
- if (freeit) {
- PORT_Free(ctx);
- }
- #endif
- }
- #ifndef NSS_DISABLE_CHACHAPOLY
- void
- ChaCha20Xor(uint8_t *output, uint8_t *block, uint32_t len, uint8_t *k,
- uint8_t *nonce, uint32_t ctr)
- {
- #ifdef NSS_X64
- if (ssse3_support() && sse4_1_support() && avx_support()) {
- #ifdef NSS_DISABLE_AVX2
- Hacl_Chacha20_Vec128_chacha20_encrypt_128(len, output, block, k, nonce, ctr);
- #else
- if (avx2_support()) {
- Hacl_Chacha20_Vec256_chacha20_encrypt_256(len, output, block, k, nonce, ctr);
- } else {
- Hacl_Chacha20_Vec128_chacha20_encrypt_128(len, output, block, k, nonce, ctr);
- }
- #endif
- } else
- #endif
- {
- Hacl_Chacha20_chacha20_encrypt(len, output, block, k, nonce, ctr);
- }
- }
- #endif /* NSS_DISABLE_CHACHAPOLY */
- SECStatus
- ChaCha20_Xor(unsigned char *output, const unsigned char *block, unsigned int len,
- const unsigned char *k, const unsigned char *nonce, PRUint32 ctr)
- {
- #ifdef NSS_DISABLE_CHACHAPOLY
- return SECFailure;
- #else
- // ChaCha has a 64 octet block, with a 32-bit block counter.
- if (sizeof(len) > 4 && len >= (1ULL << (6 + 32))) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- ChaCha20Xor(output, (uint8_t *)block, len, (uint8_t *)k,
- (uint8_t *)nonce, ctr);
- return SECSuccess;
- #endif
- }
- SECStatus
- ChaCha20Poly1305_Seal(const ChaCha20Poly1305Context *ctx, unsigned char *output,
- unsigned int *outputLen, unsigned int maxOutputLen,
- const unsigned char *input, unsigned int inputLen,
- const unsigned char *nonce, unsigned int nonceLen,
- const unsigned char *ad, unsigned int adLen)
- {
- #ifdef NSS_DISABLE_CHACHAPOLY
- return SECFailure;
- #else
- if (nonceLen != 12) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- // ChaCha has a 64 octet block, with a 32-bit block counter.
- if (sizeof(inputLen) > 4 && inputLen >= (1ULL << (6 + 32))) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- if (maxOutputLen < inputLen + ctx->tagLen) {
- PORT_SetError(SEC_ERROR_OUTPUT_LEN);
- return SECFailure;
- }
- #ifdef NSS_X64
- if (ssse3_support() && sse4_1_support() && avx_support()) {
- #ifdef NSS_DISABLE_AVX2
- Hacl_Chacha20Poly1305_128_aead_encrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, inputLen,
- (uint8_t *)input, output, output + inputLen);
- #else
- if (avx2_support()) {
- Hacl_Chacha20Poly1305_256_aead_encrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, inputLen,
- (uint8_t *)input, output, output + inputLen);
- } else {
- Hacl_Chacha20Poly1305_128_aead_encrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, inputLen,
- (uint8_t *)input, output, output + inputLen);
- }
- #endif
- } else
- #endif
- {
- Hacl_Chacha20Poly1305_32_aead_encrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, inputLen,
- (uint8_t *)input, output, output + inputLen);
- }
- *outputLen = inputLen + ctx->tagLen;
- return SECSuccess;
- #endif
- }
- SECStatus
- ChaCha20Poly1305_Open(const ChaCha20Poly1305Context *ctx, unsigned char *output,
- unsigned int *outputLen, unsigned int maxOutputLen,
- const unsigned char *input, unsigned int inputLen,
- const unsigned char *nonce, unsigned int nonceLen,
- const unsigned char *ad, unsigned int adLen)
- {
- #ifdef NSS_DISABLE_CHACHAPOLY
- return SECFailure;
- #else
- unsigned int ciphertextLen;
- if (nonceLen != 12) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- if (inputLen < ctx->tagLen) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- ciphertextLen = inputLen - ctx->tagLen;
- if (maxOutputLen < ciphertextLen) {
- PORT_SetError(SEC_ERROR_OUTPUT_LEN);
- return SECFailure;
- }
- // ChaCha has a 64 octet block, with a 32-bit block counter.
- if (inputLen >= (1ULL << (6 + 32)) + ctx->tagLen) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- uint32_t res = 1;
- #ifdef NSS_X64
- if (ssse3_support() && sse4_1_support() && avx_support()) {
- #ifdef NSS_DISABLE_AVX2
- res = Hacl_Chacha20Poly1305_128_aead_decrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, ciphertextLen,
- (uint8_t *)output, (uint8_t *)input, (uint8_t *)input + ciphertextLen);
- #else
- if (avx2_support()) {
- res = Hacl_Chacha20Poly1305_256_aead_decrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, ciphertextLen,
- (uint8_t *)output, (uint8_t *)input, (uint8_t *)input + ciphertextLen);
- } else {
- res = Hacl_Chacha20Poly1305_128_aead_decrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, ciphertextLen,
- (uint8_t *)output, (uint8_t *)input, (uint8_t *)input + ciphertextLen);
- }
- #endif
- } else
- #endif
- {
- res = Hacl_Chacha20Poly1305_32_aead_decrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, ciphertextLen,
- (uint8_t *)output, (uint8_t *)input, (uint8_t *)input + ciphertextLen);
- }
- if (res) {
- PORT_SetError(SEC_ERROR_BAD_DATA);
- return SECFailure;
- }
- *outputLen = ciphertextLen;
- return SECSuccess;
- #endif
- }
- SECStatus
- ChaCha20Poly1305_Encrypt(const ChaCha20Poly1305Context *ctx,
- unsigned char *output, unsigned int *outputLen,
- unsigned int maxOutputLen, const unsigned char *input,
- unsigned int inputLen, const unsigned char *nonce,
- unsigned int nonceLen, const unsigned char *ad,
- unsigned int adLen, unsigned char *outTag)
- {
- #ifdef NSS_DISABLE_CHACHAPOLY
- return SECFailure;
- #else
- if (nonceLen != 12) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- // ChaCha has a 64 octet block, with a 32-bit block counter.
- if (sizeof(inputLen) > 4 && inputLen >= (1ULL << (6 + 32))) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- if (maxOutputLen < inputLen) {
- PORT_SetError(SEC_ERROR_OUTPUT_LEN);
- return SECFailure;
- }
- #ifdef NSS_X64
- if (ssse3_support() && sse4_1_support() && avx_support()) {
- Hacl_Chacha20Poly1305_128_aead_encrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, inputLen,
- (uint8_t *)input, output, outTag);
- } else
- #endif
- {
- Hacl_Chacha20Poly1305_32_aead_encrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, inputLen,
- (uint8_t *)input, output, outTag);
- }
- *outputLen = inputLen;
- return SECSuccess;
- #endif
- }
- SECStatus
- ChaCha20Poly1305_Decrypt(const ChaCha20Poly1305Context *ctx,
- unsigned char *output, unsigned int *outputLen,
- unsigned int maxOutputLen, const unsigned char *input,
- unsigned int inputLen, const unsigned char *nonce,
- unsigned int nonceLen, const unsigned char *ad,
- unsigned int adLen, const unsigned char *tagIn)
- {
- #ifdef NSS_DISABLE_CHACHAPOLY
- return SECFailure;
- #else
- unsigned int ciphertextLen;
- if (nonceLen != 12) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- ciphertextLen = inputLen;
- if (maxOutputLen < ciphertextLen) {
- PORT_SetError(SEC_ERROR_OUTPUT_LEN);
- return SECFailure;
- }
- // ChaCha has a 64 octet block, with a 32-bit block counter.
- if (sizeof(inputLen) > 4 && inputLen >= (1ULL << (6 + 32))) {
- PORT_SetError(SEC_ERROR_INPUT_LEN);
- return SECFailure;
- }
- uint32_t res = 1;
- #ifdef NSS_X64
- if (ssse3_support() && sse4_1_support() && avx_support()) {
- res = Hacl_Chacha20Poly1305_128_aead_decrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, ciphertextLen,
- (uint8_t *)output, (uint8_t *)input, (uint8_t *)tagIn);
- } else
- #endif
- {
- res = Hacl_Chacha20Poly1305_32_aead_decrypt(
- (uint8_t *)ctx->key, (uint8_t *)nonce, adLen, (uint8_t *)ad, ciphertextLen,
- (uint8_t *)output, (uint8_t *)input, (uint8_t *)tagIn);
- }
- if (res) {
- PORT_SetError(SEC_ERROR_BAD_DATA);
- return SECFailure;
- }
- *outputLen = ciphertextLen;
- return SECSuccess;
- #endif
- }
|