mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2025-02-20 00:43:17 +03:00
177 lines
5.2 KiB
C++
177 lines
5.2 KiB
C++
// Copyright 2015 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "crypto/aead.h"
|
|
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
#include <string>
|
|
|
|
#include "base/containers/span.h"
|
|
#include "base/numerics/checked_math.h"
|
|
#include "crypto/openssl_util.h"
|
|
#include "third_party/boringssl/src/include/openssl/aes.h"
|
|
#include "third_party/boringssl/src/include/openssl/evp.h"
|
|
|
|
namespace crypto {
|
|
|
|
Aead::Aead(AeadAlgorithm algorithm) {
|
|
EnsureOpenSSLInit();
|
|
switch (algorithm) {
|
|
case AES_128_CTR_HMAC_SHA256:
|
|
aead_ = EVP_aead_aes_128_ctr_hmac_sha256();
|
|
break;
|
|
case AES_256_GCM:
|
|
aead_ = EVP_aead_aes_256_gcm();
|
|
break;
|
|
case AES_256_GCM_SIV:
|
|
aead_ = EVP_aead_aes_256_gcm_siv();
|
|
break;
|
|
case CHACHA20_POLY1305:
|
|
aead_ = EVP_aead_chacha20_poly1305();
|
|
break;
|
|
}
|
|
}
|
|
|
|
Aead::~Aead() = default;
|
|
|
|
void Aead::Init(base::span<const uint8_t> key) {
|
|
DCHECK(!key_);
|
|
DCHECK_EQ(KeyLength(), key.size());
|
|
key_ = key;
|
|
}
|
|
|
|
void Aead::Init(const std::string* key) {
|
|
Init(base::as_byte_span(*key));
|
|
}
|
|
|
|
std::vector<uint8_t> Aead::Seal(
|
|
base::span<const uint8_t> plaintext,
|
|
base::span<const uint8_t> nonce,
|
|
base::span<const uint8_t> additional_data) const {
|
|
size_t max_output_length =
|
|
base::CheckAdd(plaintext.size(), EVP_AEAD_max_overhead(aead_))
|
|
.ValueOrDie();
|
|
std::vector<uint8_t> ret(max_output_length);
|
|
|
|
std::optional<size_t> output_length =
|
|
Seal(plaintext, nonce, additional_data, ret);
|
|
CHECK(output_length);
|
|
ret.resize(*output_length);
|
|
return ret;
|
|
}
|
|
|
|
bool Aead::Seal(std::string_view plaintext,
|
|
std::string_view nonce,
|
|
std::string_view additional_data,
|
|
std::string* ciphertext) const {
|
|
size_t max_output_length =
|
|
base::CheckAdd(plaintext.size(), EVP_AEAD_max_overhead(aead_))
|
|
.ValueOrDie();
|
|
ciphertext->resize(max_output_length);
|
|
|
|
std::optional<size_t> output_length =
|
|
Seal(base::as_byte_span(plaintext), base::as_byte_span(nonce),
|
|
base::as_byte_span(additional_data),
|
|
base::as_writable_byte_span(*ciphertext));
|
|
if (!output_length) {
|
|
ciphertext->clear();
|
|
return false;
|
|
}
|
|
|
|
ciphertext->resize(*output_length);
|
|
return true;
|
|
}
|
|
|
|
std::optional<std::vector<uint8_t>> Aead::Open(
|
|
base::span<const uint8_t> ciphertext,
|
|
base::span<const uint8_t> nonce,
|
|
base::span<const uint8_t> additional_data) const {
|
|
const size_t max_output_length = ciphertext.size();
|
|
std::vector<uint8_t> ret(max_output_length);
|
|
|
|
std::optional<size_t> output_length =
|
|
Open(ciphertext, nonce, additional_data, ret);
|
|
if (!output_length) {
|
|
return std::nullopt;
|
|
}
|
|
|
|
ret.resize(*output_length);
|
|
return ret;
|
|
}
|
|
|
|
bool Aead::Open(std::string_view ciphertext,
|
|
std::string_view nonce,
|
|
std::string_view additional_data,
|
|
std::string* plaintext) const {
|
|
const size_t max_output_length = ciphertext.size();
|
|
plaintext->resize(max_output_length);
|
|
|
|
std::optional<size_t> output_length =
|
|
Open(base::as_byte_span(ciphertext), base::as_byte_span(nonce),
|
|
base::as_byte_span(additional_data),
|
|
base::as_writable_byte_span(*plaintext));
|
|
if (!output_length) {
|
|
plaintext->clear();
|
|
return false;
|
|
}
|
|
|
|
plaintext->resize(*output_length);
|
|
return true;
|
|
}
|
|
|
|
size_t Aead::KeyLength() const {
|
|
return EVP_AEAD_key_length(aead_);
|
|
}
|
|
|
|
size_t Aead::NonceLength() const {
|
|
return EVP_AEAD_nonce_length(aead_);
|
|
}
|
|
|
|
std::optional<size_t> Aead::Seal(base::span<const uint8_t> plaintext,
|
|
base::span<const uint8_t> nonce,
|
|
base::span<const uint8_t> additional_data,
|
|
base::span<uint8_t> out) const {
|
|
DCHECK(key_);
|
|
DCHECK_EQ(NonceLength(), nonce.size());
|
|
bssl::ScopedEVP_AEAD_CTX ctx;
|
|
|
|
size_t out_len;
|
|
if (!EVP_AEAD_CTX_init(ctx.get(), aead_, key_->data(), key_->size(),
|
|
EVP_AEAD_DEFAULT_TAG_LENGTH, nullptr) ||
|
|
!EVP_AEAD_CTX_seal(ctx.get(), out.data(), &out_len, out.size(),
|
|
nonce.data(), nonce.size(), plaintext.data(),
|
|
plaintext.size(), additional_data.data(),
|
|
additional_data.size())) {
|
|
return std::nullopt;
|
|
}
|
|
|
|
DCHECK_LE(out_len, out.size());
|
|
return out_len;
|
|
}
|
|
|
|
std::optional<size_t> Aead::Open(base::span<const uint8_t> plaintext,
|
|
base::span<const uint8_t> nonce,
|
|
base::span<const uint8_t> additional_data,
|
|
base::span<uint8_t> out) const {
|
|
DCHECK(key_);
|
|
DCHECK_EQ(NonceLength(), nonce.size());
|
|
bssl::ScopedEVP_AEAD_CTX ctx;
|
|
|
|
size_t out_len;
|
|
if (!EVP_AEAD_CTX_init(ctx.get(), aead_, key_->data(), key_->size(),
|
|
EVP_AEAD_DEFAULT_TAG_LENGTH, nullptr) ||
|
|
!EVP_AEAD_CTX_open(ctx.get(), out.data(), &out_len, out.size(),
|
|
nonce.data(), nonce.size(), plaintext.data(),
|
|
plaintext.size(), additional_data.data(),
|
|
additional_data.size())) {
|
|
return std::nullopt;
|
|
}
|
|
|
|
DCHECK_LE(out_len, out.size());
|
|
return out_len;
|
|
}
|
|
|
|
} // namespace crypto
|