Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1478)

Unified Diff: content/child/webcrypto/openssl/aes_ctr_openssl.cc

Issue 491763002: [webcrypto] Implement AES-CTR using BoringSSL. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: rebase onto master (moves unittest to its own file) Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « content/child/webcrypto/openssl/aes_cbc_openssl.cc ('k') | content/child/webcrypto/openssl/util_openssl.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/child/webcrypto/openssl/aes_ctr_openssl.cc
diff --git a/content/child/webcrypto/openssl/aes_ctr_openssl.cc b/content/child/webcrypto/openssl/aes_ctr_openssl.cc
new file mode 100644
index 0000000000000000000000000000000000000000..a2a607d05959dc3639383283a00000fd3abcf401
--- /dev/null
+++ b/content/child/webcrypto/openssl/aes_ctr_openssl.cc
@@ -0,0 +1,288 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <openssl/aes.h>
+#include <openssl/evp.h>
+
+#include "base/logging.h"
+#include "base/macros.h"
+#include "base/numerics/safe_math.h"
+#include "base/stl_util.h"
+#include "content/child/webcrypto/crypto_data.h"
+#include "content/child/webcrypto/openssl/aes_key_openssl.h"
+#include "content/child/webcrypto/openssl/key_openssl.h"
+#include "content/child/webcrypto/openssl/util_openssl.h"
+#include "content/child/webcrypto/status.h"
+#include "content/child/webcrypto/webcrypto_util.h"
+#include "crypto/openssl_util.h"
+#include "crypto/scoped_openssl_types.h"
+#include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h"
+
+namespace content {
+
+namespace webcrypto {
+
+namespace {
+
+const EVP_CIPHER* GetAESCipherByKeyLength(unsigned int key_length_bytes) {
+ // BoringSSL does not support 192-bit AES keys.
+ switch (key_length_bytes) {
+ case 16:
+ return EVP_aes_128_ctr();
+ case 32:
+ return EVP_aes_256_ctr();
+ default:
+ return NULL;
+ }
+}
+
+// Encrypts/decrypts given a 128-bit counter.
+//
+// |output| must be a pointer to a buffer which has a length of at least
+// |input.byte_length()|.
+Status AesCtrEncrypt128BitCounter(const EVP_CIPHER* cipher,
+ const CryptoData& raw_key,
+ const CryptoData& input,
+ const CryptoData& counter,
+ uint8_t* output) {
+ DCHECK(cipher);
+ DCHECK_EQ(16u, counter.byte_length());
+
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
+ crypto::ScopedOpenSSL<EVP_CIPHER_CTX, EVP_CIPHER_CTX_free>::Type context(
+ EVP_CIPHER_CTX_new());
+
+ if (!context.get())
+ return Status::OperationError();
+
+ if (!EVP_CipherInit_ex(context.get(),
+ cipher,
+ NULL,
+ raw_key.bytes(),
+ counter.bytes(),
+ ENCRYPT)) {
+ return Status::OperationError();
+ }
+
+ int output_len = 0;
+ if (!EVP_CipherUpdate(context.get(),
+ output,
+ &output_len,
+ input.bytes(),
+ input.byte_length())) {
+ return Status::OperationError();
+ }
+ int final_output_chunk_len = 0;
+ if (!EVP_CipherFinal_ex(
+ context.get(), output + output_len, &final_output_chunk_len)) {
+ return Status::OperationError();
+ }
+
+ output_len += final_output_chunk_len;
+ if (static_cast<unsigned int>(output_len) != input.byte_length())
+ return Status::ErrorUnexpected();
+
+ return Status::Success();
+}
+
+// Returns ceil(a/b), where a and b are integers.
+template <typename T>
+T CeilDiv(T a, T b) {
+ return a == 0 ? 0 : 1 + (a - 1) / b;
+}
+
+// Extracts the counter as a BIGNUM. The counter is the rightmost
+// "counter_length_bits" of the block, interpreted as a big-endian number.
+crypto::ScopedBIGNUM GetCounter(const CryptoData& counter_block,
+ unsigned int counter_length_bits) {
+ unsigned int counter_length_remainder_bits = (counter_length_bits % 8);
+
+ // If the counter is a multiple of 8 bits then can call BN_bin2bn() directly.
+ if (counter_length_remainder_bits == 0) {
+ unsigned int byte_length = counter_length_bits / 8;
+ return crypto::ScopedBIGNUM(BN_bin2bn(
+ counter_block.bytes() + counter_block.byte_length() - byte_length,
+ byte_length,
+ NULL));
+ }
+
+ // Otherwise make a copy of the counter and zero out the topmost bits so
+ // BN_bin2bn() can be called with a byte stream.
+ unsigned int byte_length = CeilDiv(counter_length_bits, 8u);
+ std::vector<uint8_t> counter(
+ counter_block.bytes() + counter_block.byte_length() - byte_length,
+ counter_block.bytes() + counter_block.byte_length());
+ counter[0] &= ~(0xFF << counter_length_remainder_bits);
+
+ return crypto::ScopedBIGNUM(
+ BN_bin2bn(&counter.front(), counter.size(), NULL));
+}
+
+// Returns a counter block with the counter bits all set all zero.
+std::vector<uint8_t> BlockWithZeroedCounter(const CryptoData& counter_block,
+ unsigned int counter_length_bits) {
+ unsigned int counter_length_bytes = counter_length_bits / 8;
+ unsigned int counter_length_bits_remainder = counter_length_bits % 8;
+
+ std::vector<uint8_t> new_counter_block(
+ counter_block.bytes(),
+ counter_block.bytes() + counter_block.byte_length());
+
+ unsigned int index = new_counter_block.size() - counter_length_bytes;
+ memset(&new_counter_block.front() + index, 0, counter_length_bytes);
+
+ if (counter_length_bits_remainder) {
+ new_counter_block[index - 1] &= 0xFF << counter_length_bits_remainder;
+ }
+
+ return new_counter_block;
+}
+
+// This function does encryption/decryption for AES-CTR (encryption and
+// decryption are the same).
+//
+// BoringSSL's interface for AES-CTR differs from that of WebCrypto. In
+// WebCrypto the caller specifies a 16-byte counter block and designates how
+// many of the right-most X bits to use as a big-endian counter. Whereas in
+// BoringSSL the entire counter block is interpreted as a 128-bit counter.
+//
+// In AES-CTR, the counter block MUST be unique across all messages that are
+// encrypted/decrypted. WebCrypto expects that the counter can start at any
+// value, and is therefore permitted to wrap around to zero on overflow.
+//
+// Some care is taken to fail if the counter wraps back to an earlier value.
+// However this protection is only enforced during a *single* call to
+// encrypt/decrypt.
+Status AesCtrEncryptDecrypt(const blink::WebCryptoAlgorithm& algorithm,
+ const blink::WebCryptoKey& key,
+ const CryptoData& data,
+ std::vector<uint8_t>* buffer) {
+ const blink::WebCryptoAesCtrParams* params = algorithm.aesCtrParams();
+ const std::vector<uint8_t>& raw_key =
+ SymKeyOpenSsl::Cast(key)->raw_key_data();
+
+ if (params->counter().size() != 16)
+ return Status::ErrorIncorrectSizeAesCtrCounter();
+
+ unsigned int counter_length_bits = params->lengthBits();
+ if (counter_length_bits < 1 || counter_length_bits > 128)
+ return Status::ErrorInvalidAesCtrCounterLength();
+
+ // The output of AES-CTR is the same size as the input. However BoringSSL
+ // expects buffer sizes as an "int".
+ base::CheckedNumeric<int> output_max_len = data.byte_length();
+ if (!output_max_len.IsValid())
+ return Status::ErrorDataTooLarge();
+
+ const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size());
+ if (!cipher)
+ return Status::ErrorUnexpected();
+
+ const CryptoData counter_block(params->counter());
+ buffer->resize(output_max_len.ValueOrDie());
+
+ // The total number of possible counter values is pow(2, counter_length_bits)
+ crypto::ScopedBIGNUM num_counter_values(BN_new());
+ if (!BN_lshift(num_counter_values.get(), BN_value_one(), counter_length_bits))
+ return Status::ErrorUnexpected();
+
+ crypto::ScopedBIGNUM current_counter =
+ GetCounter(counter_block, counter_length_bits);
+
+ // The number of AES blocks needed for encryption/decryption. The counter is
+ // incremented this many times.
+ crypto::ScopedBIGNUM num_output_blocks(BN_new());
+ if (!BN_set_word(
+ num_output_blocks.get(),
+ CeilDiv(buffer->size(), static_cast<size_t>(AES_BLOCK_SIZE)))) {
+ return Status::ErrorUnexpected();
+ }
+
+ // If the counter is going to be incremented more times than there are counter
+ // values, fail. (Repeating values of the counter block is bad).
+ if (BN_cmp(num_output_blocks.get(), num_counter_values.get()) > 0)
+ return Status::ErrorAesCtrInputTooLongCounterRepeated();
+
+ // This is the number of blocks that can be successfully encrypted without
+ // overflowing the counter. Encrypting the subsequent block will need to
+ // reset the counter to zero.
+ crypto::ScopedBIGNUM num_blocks_until_reset(BN_new());
+
+ if (!BN_sub(num_blocks_until_reset.get(),
+ num_counter_values.get(),
+ current_counter.get())) {
+ return Status::ErrorUnexpected();
+ }
+
+ // If the counter can be incremented for the entire input without
+ // wrapping-around, do it as a single call into BoringSSL.
+ if (BN_cmp(num_blocks_until_reset.get(), num_output_blocks.get()) >= 0) {
+ return AesCtrEncrypt128BitCounter(cipher,
+ CryptoData(raw_key),
+ data,
+ counter_block,
+ vector_as_array(buffer));
+ }
+
+ // Otherwise the encryption needs to be done in 2 parts. The first part using
+ // the current counter_block, and the next part resetting the counter portion
+ // of the block to zero.
+
+ // This is guaranteed to fit in an "unsigned int" because input size in bytes
+ // fits in an "unsigned int".
+ BN_ULONG num_blocks_part1 = BN_get_word(num_blocks_until_reset.get());
+ BN_ULONG input_size_part1 = num_blocks_part1 * AES_BLOCK_SIZE;
+ DCHECK_LT(input_size_part1, data.byte_length());
+
+ // Encrypt the first part (before wrap-around).
+ Status status =
+ AesCtrEncrypt128BitCounter(cipher,
+ CryptoData(raw_key),
+ CryptoData(data.bytes(), input_size_part1),
+ counter_block,
+ vector_as_array(buffer));
+ if (status.IsError())
+ return status;
+
+ // Encrypt the second part (after wrap-around).
+ std::vector<uint8_t> counter_block_part2 =
+ BlockWithZeroedCounter(counter_block, counter_length_bits);
+
+ return AesCtrEncrypt128BitCounter(
+ cipher,
+ CryptoData(raw_key),
+ CryptoData(data.bytes() + input_size_part1,
+ data.byte_length() - input_size_part1),
+ CryptoData(counter_block_part2),
+ vector_as_array(buffer) + input_size_part1);
+}
+
+class AesCtrImplementation : public AesAlgorithm {
+ public:
+ AesCtrImplementation() : AesAlgorithm("CTR") {}
+
+ virtual Status Encrypt(const blink::WebCryptoAlgorithm& algorithm,
+ const blink::WebCryptoKey& key,
+ const CryptoData& data,
+ std::vector<uint8_t>* buffer) const OVERRIDE {
+ return AesCtrEncryptDecrypt(algorithm, key, data, buffer);
+ }
+
+ virtual Status Decrypt(const blink::WebCryptoAlgorithm& algorithm,
+ const blink::WebCryptoKey& key,
+ const CryptoData& data,
+ std::vector<uint8_t>* buffer) const OVERRIDE {
+ return AesCtrEncryptDecrypt(algorithm, key, data, buffer);
+ }
+};
+
+} // namespace
+
+AlgorithmImplementation* CreatePlatformAesCtrImplementation() {
+ return new AesCtrImplementation;
+}
+
+} // namespace webcrypto
+
+} // namespace content
« no previous file with comments | « content/child/webcrypto/openssl/aes_cbc_openssl.cc ('k') | content/child/webcrypto/openssl/util_openssl.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698