Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(20)

Side by Side Diff: content/child/webcrypto/openssl/aes_ctr_openssl.cc

Issue 491763002: [webcrypto] Implement AES-CTR using BoringSSL. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include <openssl/aes.h>
6 #include <openssl/evp.h>
7
8 #include "base/logging.h"
9 #include "base/macros.h"
10 #include "base/numerics/safe_math.h"
11 #include "base/stl_util.h"
12 #include "content/child/webcrypto/crypto_data.h"
13 #include "content/child/webcrypto/openssl/aes_key_openssl.h"
14 #include "content/child/webcrypto/openssl/key_openssl.h"
15 #include "content/child/webcrypto/openssl/util_openssl.h"
16 #include "content/child/webcrypto/status.h"
17 #include "content/child/webcrypto/webcrypto_util.h"
18 #include "crypto/openssl_util.h"
19 #include "crypto/scoped_openssl_types.h"
20 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h"
21
22 namespace content {
23
24 namespace webcrypto {
25
26 namespace {
27
28 const EVP_CIPHER* GetAESCipherByKeyLength(unsigned int key_length_bytes) {
29 // BoringSSL does not support 192-bit AES keys.
30 switch (key_length_bytes) {
31 case 16:
32 return EVP_aes_128_ctr();
33 case 32:
34 return EVP_aes_256_ctr();
35 default:
36 return NULL;
37 }
38 }
39
40 // Encrypts/decrypts given a 128-bit counter.
41 //
42 // |output| must be a pointer to a buffer which has a length of at least
43 // |input.byte_length()|.
44 Status AesCtrEncrypt128BitCounter(const EVP_CIPHER* cipher,
45 const CryptoData& raw_key,
46 const CryptoData& input,
47 const CryptoData& counter,
48 uint8_t* output) {
49 DCHECK(cipher);
50 DCHECK_EQ(16u, counter.byte_length());
51
52 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
53 crypto::ScopedOpenSSL<EVP_CIPHER_CTX, EVP_CIPHER_CTX_free>::Type context(
54 EVP_CIPHER_CTX_new());
55
56 if (!context.get())
57 return Status::OperationError();
58
59 if (!EVP_CipherInit_ex(context.get(),
60 cipher,
61 NULL,
62 raw_key.bytes(),
63 counter.bytes(),
64 ENCRYPT)) {
65 return Status::OperationError();
66 }
67
68 int output_len = 0;
69 if (!EVP_CipherUpdate(context.get(),
70 output,
71 &output_len,
72 input.bytes(),
73 input.byte_length()))
74 return Status::OperationError();
davidben 2014/08/25 19:25:46 Nit: I think we usually put curlies if the conditi
eroman 2014/08/26 00:25:28 Done. I agree
75 int final_output_chunk_len = 0;
76 if (!EVP_CipherFinal_ex(
77 context.get(), output + output_len, &final_output_chunk_len)) {
78 return Status::OperationError();
79 }
80
81 output_len += final_output_chunk_len;
82 if (static_cast<unsigned int>(output_len) != input.byte_length())
83 return Status::ErrorUnexpected();
84
85 return Status::Success();
86 }
87
88 // Returns ceil(a/b), where a and b are integers.
89 template <typename T>
90 T CeilDiv(T a, T b) {
91 return a == 0 ? 0 : 1 + (a - 1) / b;
92 }
93
94 // Extracts the counter as a BIGNUM. The counter is the rightmost
95 // "counter_length_bits" of the block, interpreted as a big-endian number.
96 crypto::ScopedBIGNUM GetCounter(const CryptoData& counter_block,
97 unsigned int counter_length_bits) {
98 crypto::ScopedBIGNUM result;
davidben 2014/08/25 19:25:46 Unused
eroman 2014/08/26 00:25:28 D'oh! Done.
99 unsigned int counter_length_remainder_bits = (counter_length_bits % 8);
100
101 // If the counter is a multiple of 8 bits then can call BN_bin2bn() directly.
102 if (counter_length_remainder_bits == 0) {
103 unsigned int byte_length = counter_length_bits / 8;
104 return crypto::ScopedBIGNUM(BN_bin2bn(
105 counter_block.bytes() + counter_block.byte_length() - byte_length,
106 byte_length,
107 NULL));
108 }
109
110 // Otherwise make a copy of the counter and zero out the topmost bits so
111 // BN_bin2bn() can be called with a byte stream.
112 unsigned int byte_length = CeilDiv(counter_length_bits, 8u);
113 std::vector<uint8_t> counter(
114 counter_block.bytes() + counter_block.byte_length() - byte_length,
115 counter_block.bytes() + counter_block.byte_length());
116 counter[0] &= ~(0xFF << counter_length_remainder_bits);
117
118 return crypto::ScopedBIGNUM(
119 BN_bin2bn(&counter.front(), counter.size(), NULL));
120 }
121
122 // Returns a counter block with the counter bits all set all zero.
123 std::vector<uint8_t> BlockWithZeroedCounter(const CryptoData& counter_block,
124 unsigned int counter_length_bits) {
125 unsigned int counter_length_bytes = counter_length_bits / 8;
126 unsigned int counter_length_bits_remainder = counter_length_bits % 8;
127
128 std::vector<uint8_t> new_counter_block(
129 counter_block.bytes(),
130 counter_block.bytes() + counter_block.byte_length());
131
132 unsigned int index = new_counter_block.size() - counter_length_bytes;
133 memset(&new_counter_block.front() + index, 0, counter_length_bytes);
134
135 if (counter_length_bits_remainder) {
136 new_counter_block[index - 1] &= 0xFF << counter_length_bits_remainder;
137 }
138
139 return new_counter_block;
140 }
141
142 // This function does encryption/decryption for AES-CTR (encryption and
143 // decryption are the same).
144 //
145 // BoringSSL's interface for AES-CTR differs from that of WebCrypto. In
146 // WebCrypto the caller specifies a 16-byte counter block and designates how
147 // many of the right-most X bits to use as a big-endian counter. Whereas in
148 // BoringSSL the entire counter block is interpreted as a 128-bit counter.
149 //
150 // In AES-CTR, the counter block MUST be unique across all messages that are
151 // encrypted/decrypted. WebCrypto expects that the counter can start at any
152 // value, and is therefore permitted to wrap around to zero on overflow.
davidben 2014/08/25 19:25:46 Should we teach BoringSSL to do this internally? M
eroman 2014/08/26 00:25:27 I will defer to you and Adam. We discussed this br
153 //
154 // Some care is taken to fail if the counter wraps back to an earlier value.
155 // However this protection is only enforced during a *single* call to
156 // encrypt/decrypt.
davidben 2014/08/25 19:25:46 This is because WebCrypto doesn't maintain any con
eroman 2014/08/26 00:25:27 Since the WebCrypto API doesn't describe any error
davidben 2014/08/26 20:53:26 Well, putting it in the Key wouldn't really work a
157 Status AesCtrEncryptDecrypt(const blink::WebCryptoAlgorithm& algorithm,
158 const blink::WebCryptoKey& key,
159 const CryptoData& data,
160 std::vector<uint8_t>* buffer) {
161 const blink::WebCryptoAesCtrParams* params = algorithm.aesCtrParams();
162 const std::vector<uint8_t>& raw_key =
163 SymKeyOpenSsl::Cast(key)->raw_key_data();
164
165 if (params->counter().size() != 16)
166 return Status::ErrorIncorrectSizeAesCtrCounter();
167
168 unsigned int counter_length_bits = params->lengthBits();
169 if (counter_length_bits < 1 || counter_length_bits > 128)
170 return Status::ErrorInvalidAesCtrCounterLength();
171
172 // The output of AES-CTR is the same size as the input. However BoringSSL
173 // expects buffer sizes as an "int".
174 base::CheckedNumeric<int> output_max_len = data.byte_length();
175 if (!output_max_len.IsValid())
176 return Status::ErrorDataTooLarge();
177
178 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size());
179 if (!cipher)
180 return Status::ErrorUnexpected();
181
182 const CryptoData counter_block(params->counter());
183 buffer->resize(output_max_len.ValueOrDie());
184
185 // The total number of possible counter values is pow(2, counter_length_bits)
186 crypto::ScopedBIGNUM num_counter_values(BN_new());
187 if (!BN_lshift(num_counter_values.get(), BN_value_one(), counter_length_bits))
188 return Status::ErrorUnexpected();
189
190 crypto::ScopedBIGNUM current_counter =
191 GetCounter(counter_block, counter_length_bits);
192
193 // The number of AES blocks needed for encryption/decryption. The counter is
194 // incremented this many times.
195 crypto::ScopedBIGNUM num_output_blocks(BN_new());
196 if (!BN_set_word(
197 num_output_blocks.get(),
198 CeilDiv(buffer->size(), static_cast<size_t>(AES_BLOCK_SIZE)))) {
199 return Status::ErrorUnexpected();
200 }
201
202 // If the counter is going to be incremented more times than there are counter
203 // values, fail. (Repeating values of the counter block is bad).
204 if (BN_cmp(num_output_blocks.get(), num_counter_values.get()) > 0)
davidben 2014/08/25 19:25:46 Seems odd to use BIGNUMs for this (and some of the
eroman 2014/08/26 00:25:28 Agreed. This check can be written without BIGNUMs
205 return Status::ErrorAesCtrInputTooLongCounterRepeated();
206
207 // This is the number of blocks that can be successfully encrypted without
208 // overflowing the counter. Encrypting the subsequent block will need to
209 // reset the counter to zero.
210 crypto::ScopedBIGNUM num_blocks_until_reset(BN_new());
211
212 if (!BN_sub(num_blocks_until_reset.get(),
213 num_counter_values.get(),
214 current_counter.get())) {
215 return Status::ErrorUnexpected();
216 }
217
218 // If the counter can be incremented for the entire input without
219 // wrapping-around, do it as a single call into BoringSSL.
220 if (BN_cmp(num_blocks_until_reset.get(), num_output_blocks.get()) >= 0) {
221 return AesCtrEncrypt128BitCounter(cipher,
222 CryptoData(raw_key),
223 data,
224 counter_block,
225 vector_as_array(buffer));
226 }
227
228 // Otherwise the encryption needs to be done in 2 parts. The first part using
229 // the current counter_block, and the next part resetting the counter portion
230 // of the block to zero.
231
232 // This is guaranteed to fit in an "unsigned int" because input size in bytes
233 // fits in an "unsigned int".
234 BN_ULONG num_blocks_part1 = BN_get_word(num_blocks_until_reset.get());
235 BN_ULONG input_size_part1 = num_blocks_part1 * AES_BLOCK_SIZE;
236 DCHECK_LT(input_size_part1, data.byte_length());
237
238 // Encrypt the first part (before wrap-around).
239 Status status =
240 AesCtrEncrypt128BitCounter(cipher,
241 CryptoData(raw_key),
242 CryptoData(data.bytes(), input_size_part1),
243 counter_block,
244 vector_as_array(buffer));
245 if (status.IsError())
246 return status;
247
248 // Encrypt the second part (after wrap-around).
249 std::vector<uint8_t> counter_block_part2 =
250 BlockWithZeroedCounter(counter_block, counter_length_bits);
251
252 return AesCtrEncrypt128BitCounter(
253 cipher,
254 CryptoData(raw_key),
255 CryptoData(data.bytes() + input_size_part1,
256 data.byte_length() - input_size_part1),
257 CryptoData(counter_block_part2),
258 vector_as_array(buffer) + input_size_part1);
259 }
260
261 class AesCtrImplementation : public AesAlgorithm {
262 public:
263 AesCtrImplementation() : AesAlgorithm("CTR") {}
264
265 virtual Status Encrypt(const blink::WebCryptoAlgorithm& algorithm,
266 const blink::WebCryptoKey& key,
267 const CryptoData& data,
268 std::vector<uint8_t>* buffer) const OVERRIDE {
269 return AesCtrEncryptDecrypt(algorithm, key, data, buffer);
270 }
271
272 virtual Status Decrypt(const blink::WebCryptoAlgorithm& algorithm,
273 const blink::WebCryptoKey& key,
274 const CryptoData& data,
275 std::vector<uint8_t>* buffer) const OVERRIDE {
276 return AesCtrEncryptDecrypt(algorithm, key, data, buffer);
277 }
278 };
279
280 } // namespace
281
282 AlgorithmImplementation* CreatePlatformAesCtrImplementation() {
283 return new AesCtrImplementation;
284 }
285
286 } // namespace webcrypto
287
288 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698