1fc8fc743SJohn Baldwin /*- 2fc8fc743SJohn Baldwin * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3fc8fc743SJohn Baldwin * 4fc8fc743SJohn Baldwin * Copyright (c) 2020 Netflix Inc. 5fc8fc743SJohn Baldwin * 6fc8fc743SJohn Baldwin * Redistribution and use in source and binary forms, with or without 7fc8fc743SJohn Baldwin * modification, are permitted provided that the following conditions 8fc8fc743SJohn Baldwin * are met: 9fc8fc743SJohn Baldwin * 1. Redistributions of source code must retain the above copyright 10fc8fc743SJohn Baldwin * notice, this list of conditions and the following disclaimer. 11fc8fc743SJohn Baldwin * 2. Redistributions in binary form must reproduce the above copyright 12fc8fc743SJohn Baldwin * notice, this list of conditions and the following disclaimer in the 13fc8fc743SJohn Baldwin * documentation and/or other materials provided with the distribution. 14fc8fc743SJohn Baldwin * 15fc8fc743SJohn Baldwin * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 16fc8fc743SJohn Baldwin * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17fc8fc743SJohn Baldwin * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18fc8fc743SJohn Baldwin * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 19fc8fc743SJohn Baldwin * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20fc8fc743SJohn Baldwin * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21fc8fc743SJohn Baldwin * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22fc8fc743SJohn Baldwin * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23fc8fc743SJohn Baldwin * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24fc8fc743SJohn Baldwin * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25fc8fc743SJohn Baldwin * SUCH DAMAGE. 26fc8fc743SJohn Baldwin */ 27fc8fc743SJohn Baldwin 28dd2e1352SJohn Baldwin #include <opencrypto/xform_auth.h> 29fc8fc743SJohn Baldwin #include <opencrypto/xform_enc.h> 30fc8fc743SJohn Baldwin 31dd2e1352SJohn Baldwin #include <sodium/crypto_onetimeauth_poly1305.h> 32dd2e1352SJohn Baldwin #include <sodium/crypto_stream_chacha20.h> 33dd2e1352SJohn Baldwin 34dd2e1352SJohn Baldwin struct chacha20_poly1305_cipher_ctx { 35dd2e1352SJohn Baldwin const void *key; 36dd2e1352SJohn Baldwin uint32_t ic; 3742dcd395SJohn Baldwin bool ietf; 38dd2e1352SJohn Baldwin char nonce[CHACHA20_POLY1305_IV_LEN]; 39dd2e1352SJohn Baldwin }; 40dd2e1352SJohn Baldwin 41dd2e1352SJohn Baldwin static int 42dd2e1352SJohn Baldwin chacha20_poly1305_setkey(void *vctx, const uint8_t *key, int len) 43dd2e1352SJohn Baldwin { 44dd2e1352SJohn Baldwin struct chacha20_poly1305_cipher_ctx *ctx = vctx; 45dd2e1352SJohn Baldwin 46dd2e1352SJohn Baldwin if (len != CHACHA20_POLY1305_KEY) 47dd2e1352SJohn Baldwin return (EINVAL); 48dd2e1352SJohn Baldwin 49dd2e1352SJohn Baldwin ctx->key = key; 50dd2e1352SJohn Baldwin return (0); 51dd2e1352SJohn Baldwin } 52dd2e1352SJohn Baldwin 53dd2e1352SJohn Baldwin static void 541833d604SJohn Baldwin chacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) 55dd2e1352SJohn Baldwin { 56dd2e1352SJohn Baldwin struct chacha20_poly1305_cipher_ctx *ctx = vctx; 57dd2e1352SJohn Baldwin 58*442ad83eSJohn Baldwin KASSERT(ivlen == 8 || ivlen == sizeof(ctx->nonce), 591833d604SJohn Baldwin ("%s: invalid nonce length", __func__)); 601833d604SJohn Baldwin 61dd2e1352SJohn Baldwin /* Block 0 is used for the poly1305 key. */ 6242dcd395SJohn Baldwin memcpy(ctx->nonce, iv, ivlen); 6342dcd395SJohn Baldwin ctx->ietf = (ivlen == CHACHA20_POLY1305_IV_LEN); 64dd2e1352SJohn Baldwin ctx->ic = 1; 65dd2e1352SJohn Baldwin } 66dd2e1352SJohn Baldwin 67dd2e1352SJohn Baldwin static void 68dd2e1352SJohn Baldwin chacha20_poly1305_crypt(void *vctx, const uint8_t *in, uint8_t *out) 69dd2e1352SJohn Baldwin { 70dd2e1352SJohn Baldwin struct chacha20_poly1305_cipher_ctx *ctx = vctx; 71dd2e1352SJohn Baldwin int error; 72dd2e1352SJohn Baldwin 7342dcd395SJohn Baldwin if (ctx->ietf) 74dd2e1352SJohn Baldwin error = crypto_stream_chacha20_ietf_xor_ic(out, in, 75dd2e1352SJohn Baldwin CHACHA20_NATIVE_BLOCK_LEN, ctx->nonce, ctx->ic, ctx->key); 7642dcd395SJohn Baldwin else 7742dcd395SJohn Baldwin error = crypto_stream_chacha20_xor_ic(out, in, 7842dcd395SJohn Baldwin CHACHA20_NATIVE_BLOCK_LEN, ctx->nonce, ctx->ic, ctx->key); 79dd2e1352SJohn Baldwin KASSERT(error == 0, ("%s failed: %d", __func__, error)); 80dd2e1352SJohn Baldwin ctx->ic++; 81dd2e1352SJohn Baldwin } 82dd2e1352SJohn Baldwin 83dd2e1352SJohn Baldwin static void 84dd2e1352SJohn Baldwin chacha20_poly1305_crypt_last(void *vctx, const uint8_t *in, uint8_t *out, 85dd2e1352SJohn Baldwin size_t len) 86dd2e1352SJohn Baldwin { 87dd2e1352SJohn Baldwin struct chacha20_poly1305_cipher_ctx *ctx = vctx; 88dd2e1352SJohn Baldwin 89dd2e1352SJohn Baldwin int error; 90dd2e1352SJohn Baldwin 9142dcd395SJohn Baldwin if (ctx->ietf) 9242dcd395SJohn Baldwin error = crypto_stream_chacha20_ietf_xor_ic(out, in, len, 9342dcd395SJohn Baldwin ctx->nonce, ctx->ic, ctx->key); 9442dcd395SJohn Baldwin else 9542dcd395SJohn Baldwin error = crypto_stream_chacha20_xor_ic(out, in, len, ctx->nonce, 96dd2e1352SJohn Baldwin ctx->ic, ctx->key); 97dd2e1352SJohn Baldwin KASSERT(error == 0, ("%s failed: %d", __func__, error)); 98dd2e1352SJohn Baldwin } 99dd2e1352SJohn Baldwin 100d8787d4fSMark Johnston const struct enc_xform enc_xform_chacha20_poly1305 = { 101fc8fc743SJohn Baldwin .type = CRYPTO_CHACHA20_POLY1305, 102fc8fc743SJohn Baldwin .name = "ChaCha20-Poly1305", 103dd2e1352SJohn Baldwin .ctxsize = sizeof(struct chacha20_poly1305_cipher_ctx), 104fc8fc743SJohn Baldwin .blocksize = 1, 105dd2e1352SJohn Baldwin .native_blocksize = CHACHA20_NATIVE_BLOCK_LEN, 106fc8fc743SJohn Baldwin .ivsize = CHACHA20_POLY1305_IV_LEN, 107fc8fc743SJohn Baldwin .minkey = CHACHA20_POLY1305_KEY, 108fc8fc743SJohn Baldwin .maxkey = CHACHA20_POLY1305_KEY, 109dd2e1352SJohn Baldwin .encrypt = chacha20_poly1305_crypt, 110dd2e1352SJohn Baldwin .decrypt = chacha20_poly1305_crypt, 111dd2e1352SJohn Baldwin .setkey = chacha20_poly1305_setkey, 112dd2e1352SJohn Baldwin .reinit = chacha20_poly1305_reinit, 113dd2e1352SJohn Baldwin .encrypt_last = chacha20_poly1305_crypt_last, 114dd2e1352SJohn Baldwin .decrypt_last = chacha20_poly1305_crypt_last, 115fc8fc743SJohn Baldwin }; 116fc8fc743SJohn Baldwin 117dd2e1352SJohn Baldwin struct chacha20_poly1305_auth_ctx { 118dd2e1352SJohn Baldwin struct crypto_onetimeauth_poly1305_state state; 119dd2e1352SJohn Baldwin const void *key; 120dd2e1352SJohn Baldwin }; 121dd2e1352SJohn Baldwin CTASSERT(sizeof(union authctx) >= sizeof(struct chacha20_poly1305_auth_ctx)); 122dd2e1352SJohn Baldwin 123dd2e1352SJohn Baldwin static void 124dd2e1352SJohn Baldwin chacha20_poly1305_Init(void *vctx) 125dd2e1352SJohn Baldwin { 126dd2e1352SJohn Baldwin } 127dd2e1352SJohn Baldwin 128dd2e1352SJohn Baldwin static void 129dd2e1352SJohn Baldwin chacha20_poly1305_Setkey(void *vctx, const uint8_t *key, u_int klen) 130dd2e1352SJohn Baldwin { 131dd2e1352SJohn Baldwin struct chacha20_poly1305_auth_ctx *ctx = vctx; 132dd2e1352SJohn Baldwin 133dd2e1352SJohn Baldwin ctx->key = key; 134dd2e1352SJohn Baldwin } 135dd2e1352SJohn Baldwin 136dd2e1352SJohn Baldwin static void 137dd2e1352SJohn Baldwin chacha20_poly1305_Reinit(void *vctx, const uint8_t *nonce, u_int noncelen) 138dd2e1352SJohn Baldwin { 139dd2e1352SJohn Baldwin struct chacha20_poly1305_auth_ctx *ctx = vctx; 140dd2e1352SJohn Baldwin char block[CHACHA20_NATIVE_BLOCK_LEN]; 141dd2e1352SJohn Baldwin 14242dcd395SJohn Baldwin switch (noncelen) { 14342dcd395SJohn Baldwin case 8: 14442dcd395SJohn Baldwin crypto_stream_chacha20(block, sizeof(block), nonce, ctx->key); 14542dcd395SJohn Baldwin break; 14642dcd395SJohn Baldwin case CHACHA20_POLY1305_IV_LEN: 147dd2e1352SJohn Baldwin crypto_stream_chacha20_ietf(block, sizeof(block), nonce, ctx->key); 14842dcd395SJohn Baldwin break; 14942dcd395SJohn Baldwin default: 15042dcd395SJohn Baldwin __assert_unreachable(); 15142dcd395SJohn Baldwin } 152dd2e1352SJohn Baldwin crypto_onetimeauth_poly1305_init(&ctx->state, block); 153dd2e1352SJohn Baldwin explicit_bzero(block, sizeof(block)); 154dd2e1352SJohn Baldwin } 155dd2e1352SJohn Baldwin 156dd2e1352SJohn Baldwin static int 157dd2e1352SJohn Baldwin chacha20_poly1305_Update(void *vctx, const void *data, u_int len) 158dd2e1352SJohn Baldwin { 159dd2e1352SJohn Baldwin struct chacha20_poly1305_auth_ctx *ctx = vctx; 160dd2e1352SJohn Baldwin 161dd2e1352SJohn Baldwin crypto_onetimeauth_poly1305_update(&ctx->state, data, len); 162dd2e1352SJohn Baldwin return (0); 163dd2e1352SJohn Baldwin } 164dd2e1352SJohn Baldwin 165dd2e1352SJohn Baldwin static void 166dd2e1352SJohn Baldwin chacha20_poly1305_Final(uint8_t *digest, void *vctx) 167dd2e1352SJohn Baldwin { 168dd2e1352SJohn Baldwin struct chacha20_poly1305_auth_ctx *ctx = vctx; 169dd2e1352SJohn Baldwin 170dd2e1352SJohn Baldwin crypto_onetimeauth_poly1305_final(&ctx->state, digest); 171dd2e1352SJohn Baldwin } 172dd2e1352SJohn Baldwin 173d8787d4fSMark Johnston const struct auth_hash auth_hash_chacha20_poly1305 = { 174dd2e1352SJohn Baldwin .type = CRYPTO_POLY1305, 175dd2e1352SJohn Baldwin .name = "ChaCha20-Poly1305", 176dd2e1352SJohn Baldwin .keysize = POLY1305_KEY_LEN, 177dd2e1352SJohn Baldwin .hashsize = POLY1305_HASH_LEN, 178dd2e1352SJohn Baldwin .ctxsize = sizeof(struct chacha20_poly1305_auth_ctx), 179dd2e1352SJohn Baldwin .blocksize = crypto_onetimeauth_poly1305_BYTES, 180dd2e1352SJohn Baldwin .Init = chacha20_poly1305_Init, 181dd2e1352SJohn Baldwin .Setkey = chacha20_poly1305_Setkey, 182dd2e1352SJohn Baldwin .Reinit = chacha20_poly1305_Reinit, 183dd2e1352SJohn Baldwin .Update = chacha20_poly1305_Update, 184dd2e1352SJohn Baldwin .Final = chacha20_poly1305_Final, 185dd2e1352SJohn Baldwin }; 186