xref: /freebsd/sys/opencrypto/xform_chacha20_poly1305.c (revision 442ad83e38e8fda46d9facbd1ddd92bc23e3773e)
1fc8fc743SJohn Baldwin /*-
2fc8fc743SJohn Baldwin  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3fc8fc743SJohn Baldwin  *
4fc8fc743SJohn Baldwin  * Copyright (c) 2020 Netflix Inc.
5fc8fc743SJohn Baldwin  *
6fc8fc743SJohn Baldwin  * Redistribution and use in source and binary forms, with or without
7fc8fc743SJohn Baldwin  * modification, are permitted provided that the following conditions
8fc8fc743SJohn Baldwin  * are met:
9fc8fc743SJohn Baldwin  * 1. Redistributions of source code must retain the above copyright
10fc8fc743SJohn Baldwin  *    notice, this list of conditions and the following disclaimer.
11fc8fc743SJohn Baldwin  * 2. Redistributions in binary form must reproduce the above copyright
12fc8fc743SJohn Baldwin  *    notice, this list of conditions and the following disclaimer in the
13fc8fc743SJohn Baldwin  *    documentation and/or other materials provided with the distribution.
14fc8fc743SJohn Baldwin  *
15fc8fc743SJohn Baldwin  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
16fc8fc743SJohn Baldwin  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17fc8fc743SJohn Baldwin  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18fc8fc743SJohn Baldwin  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
19fc8fc743SJohn Baldwin  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20fc8fc743SJohn Baldwin  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21fc8fc743SJohn Baldwin  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22fc8fc743SJohn Baldwin  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23fc8fc743SJohn Baldwin  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24fc8fc743SJohn Baldwin  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25fc8fc743SJohn Baldwin  * SUCH DAMAGE.
26fc8fc743SJohn Baldwin  */
27fc8fc743SJohn Baldwin 
28dd2e1352SJohn Baldwin #include <opencrypto/xform_auth.h>
29fc8fc743SJohn Baldwin #include <opencrypto/xform_enc.h>
30fc8fc743SJohn Baldwin 
31dd2e1352SJohn Baldwin #include <sodium/crypto_onetimeauth_poly1305.h>
32dd2e1352SJohn Baldwin #include <sodium/crypto_stream_chacha20.h>
33dd2e1352SJohn Baldwin 
34dd2e1352SJohn Baldwin struct chacha20_poly1305_cipher_ctx {
35dd2e1352SJohn Baldwin 	const void *key;
36dd2e1352SJohn Baldwin 	uint32_t ic;
3742dcd395SJohn Baldwin 	bool ietf;
38dd2e1352SJohn Baldwin 	char nonce[CHACHA20_POLY1305_IV_LEN];
39dd2e1352SJohn Baldwin };
40dd2e1352SJohn Baldwin 
41dd2e1352SJohn Baldwin static int
42dd2e1352SJohn Baldwin chacha20_poly1305_setkey(void *vctx, const uint8_t *key, int len)
43dd2e1352SJohn Baldwin {
44dd2e1352SJohn Baldwin 	struct chacha20_poly1305_cipher_ctx *ctx = vctx;
45dd2e1352SJohn Baldwin 
46dd2e1352SJohn Baldwin 	if (len != CHACHA20_POLY1305_KEY)
47dd2e1352SJohn Baldwin 		return (EINVAL);
48dd2e1352SJohn Baldwin 
49dd2e1352SJohn Baldwin 	ctx->key = key;
50dd2e1352SJohn Baldwin 	return (0);
51dd2e1352SJohn Baldwin }
52dd2e1352SJohn Baldwin 
53dd2e1352SJohn Baldwin static void
541833d604SJohn Baldwin chacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen)
55dd2e1352SJohn Baldwin {
56dd2e1352SJohn Baldwin 	struct chacha20_poly1305_cipher_ctx *ctx = vctx;
57dd2e1352SJohn Baldwin 
58*442ad83eSJohn Baldwin 	KASSERT(ivlen == 8 || ivlen == sizeof(ctx->nonce),
591833d604SJohn Baldwin 	    ("%s: invalid nonce length", __func__));
601833d604SJohn Baldwin 
61dd2e1352SJohn Baldwin 	/* Block 0 is used for the poly1305 key. */
6242dcd395SJohn Baldwin 	memcpy(ctx->nonce, iv, ivlen);
6342dcd395SJohn Baldwin 	ctx->ietf = (ivlen == CHACHA20_POLY1305_IV_LEN);
64dd2e1352SJohn Baldwin 	ctx->ic = 1;
65dd2e1352SJohn Baldwin }
66dd2e1352SJohn Baldwin 
67dd2e1352SJohn Baldwin static void
68dd2e1352SJohn Baldwin chacha20_poly1305_crypt(void *vctx, const uint8_t *in, uint8_t *out)
69dd2e1352SJohn Baldwin {
70dd2e1352SJohn Baldwin 	struct chacha20_poly1305_cipher_ctx *ctx = vctx;
71dd2e1352SJohn Baldwin 	int error;
72dd2e1352SJohn Baldwin 
7342dcd395SJohn Baldwin 	if (ctx->ietf)
74dd2e1352SJohn Baldwin 		error = crypto_stream_chacha20_ietf_xor_ic(out, in,
75dd2e1352SJohn Baldwin 		    CHACHA20_NATIVE_BLOCK_LEN, ctx->nonce, ctx->ic, ctx->key);
7642dcd395SJohn Baldwin 	else
7742dcd395SJohn Baldwin 		error = crypto_stream_chacha20_xor_ic(out, in,
7842dcd395SJohn Baldwin 		    CHACHA20_NATIVE_BLOCK_LEN, ctx->nonce, ctx->ic, ctx->key);
79dd2e1352SJohn Baldwin 	KASSERT(error == 0, ("%s failed: %d", __func__, error));
80dd2e1352SJohn Baldwin 	ctx->ic++;
81dd2e1352SJohn Baldwin }
82dd2e1352SJohn Baldwin 
83dd2e1352SJohn Baldwin static void
84dd2e1352SJohn Baldwin chacha20_poly1305_crypt_last(void *vctx, const uint8_t *in, uint8_t *out,
85dd2e1352SJohn Baldwin     size_t len)
86dd2e1352SJohn Baldwin {
87dd2e1352SJohn Baldwin 	struct chacha20_poly1305_cipher_ctx *ctx = vctx;
88dd2e1352SJohn Baldwin 
89dd2e1352SJohn Baldwin 	int error;
90dd2e1352SJohn Baldwin 
9142dcd395SJohn Baldwin 	if (ctx->ietf)
9242dcd395SJohn Baldwin 		error = crypto_stream_chacha20_ietf_xor_ic(out, in, len,
9342dcd395SJohn Baldwin 		    ctx->nonce, ctx->ic, ctx->key);
9442dcd395SJohn Baldwin 	else
9542dcd395SJohn Baldwin 		error = crypto_stream_chacha20_xor_ic(out, in, len, ctx->nonce,
96dd2e1352SJohn Baldwin 		    ctx->ic, ctx->key);
97dd2e1352SJohn Baldwin 	KASSERT(error == 0, ("%s failed: %d", __func__, error));
98dd2e1352SJohn Baldwin }
99dd2e1352SJohn Baldwin 
100d8787d4fSMark Johnston const struct enc_xform enc_xform_chacha20_poly1305 = {
101fc8fc743SJohn Baldwin 	.type = CRYPTO_CHACHA20_POLY1305,
102fc8fc743SJohn Baldwin 	.name = "ChaCha20-Poly1305",
103dd2e1352SJohn Baldwin 	.ctxsize = sizeof(struct chacha20_poly1305_cipher_ctx),
104fc8fc743SJohn Baldwin 	.blocksize = 1,
105dd2e1352SJohn Baldwin 	.native_blocksize = CHACHA20_NATIVE_BLOCK_LEN,
106fc8fc743SJohn Baldwin 	.ivsize = CHACHA20_POLY1305_IV_LEN,
107fc8fc743SJohn Baldwin 	.minkey = CHACHA20_POLY1305_KEY,
108fc8fc743SJohn Baldwin 	.maxkey = CHACHA20_POLY1305_KEY,
109dd2e1352SJohn Baldwin 	.encrypt = chacha20_poly1305_crypt,
110dd2e1352SJohn Baldwin 	.decrypt = chacha20_poly1305_crypt,
111dd2e1352SJohn Baldwin 	.setkey = chacha20_poly1305_setkey,
112dd2e1352SJohn Baldwin 	.reinit = chacha20_poly1305_reinit,
113dd2e1352SJohn Baldwin 	.encrypt_last = chacha20_poly1305_crypt_last,
114dd2e1352SJohn Baldwin 	.decrypt_last = chacha20_poly1305_crypt_last,
115fc8fc743SJohn Baldwin };
116fc8fc743SJohn Baldwin 
117dd2e1352SJohn Baldwin struct chacha20_poly1305_auth_ctx {
118dd2e1352SJohn Baldwin 	struct crypto_onetimeauth_poly1305_state state;
119dd2e1352SJohn Baldwin 	const void *key;
120dd2e1352SJohn Baldwin };
121dd2e1352SJohn Baldwin CTASSERT(sizeof(union authctx) >= sizeof(struct chacha20_poly1305_auth_ctx));
122dd2e1352SJohn Baldwin 
123dd2e1352SJohn Baldwin static void
124dd2e1352SJohn Baldwin chacha20_poly1305_Init(void *vctx)
125dd2e1352SJohn Baldwin {
126dd2e1352SJohn Baldwin }
127dd2e1352SJohn Baldwin 
128dd2e1352SJohn Baldwin static void
129dd2e1352SJohn Baldwin chacha20_poly1305_Setkey(void *vctx, const uint8_t *key, u_int klen)
130dd2e1352SJohn Baldwin {
131dd2e1352SJohn Baldwin 	struct chacha20_poly1305_auth_ctx *ctx = vctx;
132dd2e1352SJohn Baldwin 
133dd2e1352SJohn Baldwin 	ctx->key = key;
134dd2e1352SJohn Baldwin }
135dd2e1352SJohn Baldwin 
136dd2e1352SJohn Baldwin static void
137dd2e1352SJohn Baldwin chacha20_poly1305_Reinit(void *vctx, const uint8_t *nonce, u_int noncelen)
138dd2e1352SJohn Baldwin {
139dd2e1352SJohn Baldwin 	struct chacha20_poly1305_auth_ctx *ctx = vctx;
140dd2e1352SJohn Baldwin 	char block[CHACHA20_NATIVE_BLOCK_LEN];
141dd2e1352SJohn Baldwin 
14242dcd395SJohn Baldwin 	switch (noncelen) {
14342dcd395SJohn Baldwin 	case 8:
14442dcd395SJohn Baldwin 		crypto_stream_chacha20(block, sizeof(block), nonce, ctx->key);
14542dcd395SJohn Baldwin 		break;
14642dcd395SJohn Baldwin 	case CHACHA20_POLY1305_IV_LEN:
147dd2e1352SJohn Baldwin 		crypto_stream_chacha20_ietf(block, sizeof(block), nonce, ctx->key);
14842dcd395SJohn Baldwin 		break;
14942dcd395SJohn Baldwin 	default:
15042dcd395SJohn Baldwin 		__assert_unreachable();
15142dcd395SJohn Baldwin 	}
152dd2e1352SJohn Baldwin 	crypto_onetimeauth_poly1305_init(&ctx->state, block);
153dd2e1352SJohn Baldwin 	explicit_bzero(block, sizeof(block));
154dd2e1352SJohn Baldwin }
155dd2e1352SJohn Baldwin 
156dd2e1352SJohn Baldwin static int
157dd2e1352SJohn Baldwin chacha20_poly1305_Update(void *vctx, const void *data, u_int len)
158dd2e1352SJohn Baldwin {
159dd2e1352SJohn Baldwin 	struct chacha20_poly1305_auth_ctx *ctx = vctx;
160dd2e1352SJohn Baldwin 
161dd2e1352SJohn Baldwin 	crypto_onetimeauth_poly1305_update(&ctx->state, data, len);
162dd2e1352SJohn Baldwin 	return (0);
163dd2e1352SJohn Baldwin }
164dd2e1352SJohn Baldwin 
165dd2e1352SJohn Baldwin static void
166dd2e1352SJohn Baldwin chacha20_poly1305_Final(uint8_t *digest, void *vctx)
167dd2e1352SJohn Baldwin {
168dd2e1352SJohn Baldwin 	struct chacha20_poly1305_auth_ctx *ctx = vctx;
169dd2e1352SJohn Baldwin 
170dd2e1352SJohn Baldwin 	crypto_onetimeauth_poly1305_final(&ctx->state, digest);
171dd2e1352SJohn Baldwin }
172dd2e1352SJohn Baldwin 
173d8787d4fSMark Johnston const struct auth_hash auth_hash_chacha20_poly1305 = {
174dd2e1352SJohn Baldwin 	.type = CRYPTO_POLY1305,
175dd2e1352SJohn Baldwin 	.name = "ChaCha20-Poly1305",
176dd2e1352SJohn Baldwin 	.keysize = POLY1305_KEY_LEN,
177dd2e1352SJohn Baldwin 	.hashsize = POLY1305_HASH_LEN,
178dd2e1352SJohn Baldwin 	.ctxsize = sizeof(struct chacha20_poly1305_auth_ctx),
179dd2e1352SJohn Baldwin 	.blocksize = crypto_onetimeauth_poly1305_BYTES,
180dd2e1352SJohn Baldwin 	.Init = chacha20_poly1305_Init,
181dd2e1352SJohn Baldwin 	.Setkey = chacha20_poly1305_Setkey,
182dd2e1352SJohn Baldwin 	.Reinit = chacha20_poly1305_Reinit,
183dd2e1352SJohn Baldwin 	.Update = chacha20_poly1305_Update,
184dd2e1352SJohn Baldwin 	.Final = chacha20_poly1305_Final,
185dd2e1352SJohn Baldwin };
186