aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2018-08-07 17:02:45 -0400
committerJack Lloyd <[email protected]>2018-08-07 17:43:30 -0400
commit9b9c766ddb431b9262dc9db2270bbbe4c22d4add (patch)
treef9bbcdd7d91914c1a40e0dc6070538932e837155
parente1374697bdfb84109d1fcefb3cb76b11d9309ac8 (diff)
Add support for XChaCha
-rw-r--r--src/lib/stream/chacha/chacha.cpp162
-rw-r--r--src/lib/stream/chacha/chacha.h3
-rw-r--r--src/lib/stream/chacha/info.txt2
-rw-r--r--src/tests/data/stream/chacha.vec19
4 files changed, 145 insertions, 41 deletions
diff --git a/src/lib/stream/chacha/chacha.cpp b/src/lib/stream/chacha/chacha.cpp
index f34959377..7ccc4293b 100644
--- a/src/lib/stream/chacha/chacha.cpp
+++ b/src/lib/stream/chacha/chacha.cpp
@@ -1,6 +1,6 @@
/*
* ChaCha
-* (C) 2014 Jack Lloyd
+* (C) 2014,2018 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
@@ -12,6 +12,53 @@
namespace Botan {
+namespace {
+
+#define CHACHA_QUARTER_ROUND(a, b, c, d) \
+ do { \
+ a += b; d ^= a; d = rotl<16>(d); \
+ c += d; b ^= c; b = rotl<12>(b); \
+ a += b; d ^= a; d = rotl<8>(d); \
+ c += d; b ^= c; b = rotl<7>(b); \
+ } while(0)
+
+/*
+* Generate HChaCha cipher stream (for XChaCha IV setup)
+*/
+void hchacha(uint32_t output[8], const uint32_t input[16], size_t rounds)
+ {
+ BOTAN_ASSERT(rounds % 2 == 0, "Valid rounds");
+
+ uint32_t x00 = input[ 0], x01 = input[ 1], x02 = input[ 2], x03 = input[ 3],
+ x04 = input[ 4], x05 = input[ 5], x06 = input[ 6], x07 = input[ 7],
+ x08 = input[ 8], x09 = input[ 9], x10 = input[10], x11 = input[11],
+ x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15];
+
+ for(size_t i = 0; i != rounds / 2; ++i)
+ {
+ CHACHA_QUARTER_ROUND(x00, x04, x08, x12);
+ CHACHA_QUARTER_ROUND(x01, x05, x09, x13);
+ CHACHA_QUARTER_ROUND(x02, x06, x10, x14);
+ CHACHA_QUARTER_ROUND(x03, x07, x11, x15);
+
+ CHACHA_QUARTER_ROUND(x00, x05, x10, x15);
+ CHACHA_QUARTER_ROUND(x01, x06, x11, x12);
+ CHACHA_QUARTER_ROUND(x02, x07, x08, x13);
+ CHACHA_QUARTER_ROUND(x03, x04, x09, x14);
+ }
+
+ output[0] = x00;
+ output[1] = x01;
+ output[2] = x02;
+ output[3] = x03;
+ output[4] = x12;
+ output[5] = x13;
+ output[6] = x14;
+ output[7] = x15;
+ }
+
+}
+
ChaCha::ChaCha(size_t rounds) : m_rounds(rounds)
{
BOTAN_ARG_CHECK(m_rounds == 8 || m_rounds == 12 || m_rounds == 20,
@@ -46,17 +93,9 @@ void ChaCha::chacha_x4(uint8_t output[64*4], uint32_t input[16], size_t rounds)
for(size_t i = 0; i != 4; ++i)
{
uint32_t x00 = input[ 0], x01 = input[ 1], x02 = input[ 2], x03 = input[ 3],
- x04 = input[ 4], x05 = input[ 5], x06 = input[ 6], x07 = input[ 7],
- x08 = input[ 8], x09 = input[ 9], x10 = input[10], x11 = input[11],
- x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15];
-
-#define CHACHA_QUARTER_ROUND(a, b, c, d) \
- do { \
- a += b; d ^= a; d = rotl<16>(d); \
- c += d; b ^= c; b = rotl<12>(b); \
- a += b; d ^= a; d = rotl<8>(d); \
- c += d; b ^= c; b = rotl<7>(b); \
- } while(0)
+ x04 = input[ 4], x05 = input[ 5], x06 = input[ 6], x07 = input[ 7],
+ x08 = input[ 8], x09 = input[ 9], x10 = input[10], x11 = input[11],
+ x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15];
for(size_t r = 0; r != rounds / 2; ++r)
{
@@ -134,10 +173,7 @@ void ChaCha::cipher(const uint8_t in[], uint8_t out[], size_t length)
m_position += length;
}
-/*
-* ChaCha Key Schedule
-*/
-void ChaCha::key_schedule(const uint8_t key[], size_t length)
+void ChaCha::initialize_state()
{
static const uint32_t TAU[] =
{ 0x61707865, 0x3120646e, 0x79622d36, 0x6b206574 };
@@ -145,38 +181,61 @@ void ChaCha::key_schedule(const uint8_t key[], size_t length)
static const uint32_t SIGMA[] =
{ 0x61707865, 0x3320646e, 0x79622d32, 0x6b206574 };
- const uint32_t* CONSTANTS = (length == 16) ? TAU : SIGMA;
+ m_state[4] = m_key[0];
+ m_state[5] = m_key[1];
+ m_state[6] = m_key[2];
+ m_state[7] = m_key[3];
- // Repeat the key if 128 bits
- const uint8_t* key2 = (length == 32) ? key + 16 : key;
+ if(m_key.size() == 4)
+ {
+ m_state[0] = TAU[0];
+ m_state[1] = TAU[1];
+ m_state[2] = TAU[2];
+ m_state[3] = TAU[3];
+
+ m_state[8] = m_key[0];
+ m_state[9] = m_key[1];
+ m_state[10] = m_key[2];
+ m_state[11] = m_key[3];
+ }
+ else
+ {
+ m_state[0] = SIGMA[0];
+ m_state[1] = SIGMA[1];
+ m_state[2] = SIGMA[2];
+ m_state[3] = SIGMA[3];
+
+ m_state[8] = m_key[4];
+ m_state[9] = m_key[5];
+ m_state[10] = m_key[6];
+ m_state[11] = m_key[7];
+ }
- m_position = 0;
- m_state.resize(16);
- m_buffer.resize(4*64);
+ m_state[12] = 0;
+ m_state[13] = 0;
+ m_state[14] = 0;
+ m_state[15] = 0;
- m_state[0] = CONSTANTS[0];
- m_state[1] = CONSTANTS[1];
- m_state[2] = CONSTANTS[2];
- m_state[3] = CONSTANTS[3];
+ m_position = 0;
+ }
- m_state[4] = load_le<uint32_t>(key, 0);
- m_state[5] = load_le<uint32_t>(key, 1);
- m_state[6] = load_le<uint32_t>(key, 2);
- m_state[7] = load_le<uint32_t>(key, 3);
+/*
+* ChaCha Key Schedule
+*/
+void ChaCha::key_schedule(const uint8_t key[], size_t length)
+ {
+ m_key.resize(length / 4);
+ load_le<uint32_t>(m_key.data(), key, m_key.size());
- m_state[8] = load_le<uint32_t>(key2, 0);
- m_state[9] = load_le<uint32_t>(key2, 1);
- m_state[10] = load_le<uint32_t>(key2, 2);
- m_state[11] = load_le<uint32_t>(key2, 3);
+ m_state.resize(16);
+ m_buffer.resize(4*64);
- // Default all-zero IV
- const uint8_t ZERO[8] = { 0 };
- set_iv(ZERO, sizeof(ZERO));
+ set_iv(nullptr, 0);
}
bool ChaCha::valid_iv_length(size_t iv_len) const
{
- return (iv_len == 0 || iv_len == 8 || iv_len == 12);
+ return (iv_len == 0 || iv_len == 8 || iv_len == 12 || iv_len == 24);
}
void ChaCha::set_iv(const uint8_t iv[], size_t length)
@@ -186,8 +245,7 @@ void ChaCha::set_iv(const uint8_t iv[], size_t length)
if(!valid_iv_length(length))
throw Invalid_IV_Length(name(), length);
- m_state[12] = 0;
- m_state[13] = 0;
+ initialize_state();
if(length == 0)
{
@@ -206,6 +264,29 @@ void ChaCha::set_iv(const uint8_t iv[], size_t length)
m_state[14] = load_le<uint32_t>(iv, 1);
m_state[15] = load_le<uint32_t>(iv, 2);
}
+ else if(length == 24)
+ {
+ m_state[12] = load_le<uint32_t>(iv, 0);
+ m_state[13] = load_le<uint32_t>(iv, 1);
+ m_state[14] = load_le<uint32_t>(iv, 2);
+ m_state[15] = load_le<uint32_t>(iv, 3);
+
+ secure_vector<uint32_t> hc(8);
+ hchacha(hc.data(), m_state.data(), m_rounds);
+
+ m_state[ 4] = hc[0];
+ m_state[ 5] = hc[1];
+ m_state[ 6] = hc[2];
+ m_state[ 7] = hc[3];
+ m_state[ 8] = hc[4];
+ m_state[ 9] = hc[5];
+ m_state[10] = hc[6];
+ m_state[11] = hc[7];
+ m_state[12] = 0;
+ m_state[13] = 0;
+ m_state[14] = load_le<uint32_t>(iv, 4);
+ m_state[15] = load_le<uint32_t>(iv, 5);
+ }
chacha_x4(m_buffer.data(), m_state.data(), m_rounds);
m_position = 0;
@@ -213,6 +294,7 @@ void ChaCha::set_iv(const uint8_t iv[], size_t length)
void ChaCha::clear()
{
+ zap(m_key);
zap(m_state);
zap(m_buffer);
m_position = 0;
diff --git a/src/lib/stream/chacha/chacha.h b/src/lib/stream/chacha/chacha.h
index 8016a73f6..a4f3e3b75 100644
--- a/src/lib/stream/chacha/chacha.h
+++ b/src/lib/stream/chacha/chacha.h
@@ -53,6 +53,8 @@ class BOTAN_PUBLIC_API(2,0) ChaCha final : public StreamCipher
private:
void key_schedule(const uint8_t key[], size_t key_len) override;
+ void initialize_state();
+
void chacha_x4(uint8_t output[64*4], uint32_t state[16], size_t rounds);
#if defined(BOTAN_HAS_CHACHA_SSE2)
@@ -60,6 +62,7 @@ class BOTAN_PUBLIC_API(2,0) ChaCha final : public StreamCipher
#endif
size_t m_rounds;
+ secure_vector<uint32_t> m_key;
secure_vector<uint32_t> m_state;
secure_vector<uint8_t> m_buffer;
size_t m_position = 0;
diff --git a/src/lib/stream/chacha/info.txt b/src/lib/stream/chacha/info.txt
index 0bcd013ad..ba9c3da34 100644
--- a/src/lib/stream/chacha/info.txt
+++ b/src/lib/stream/chacha/info.txt
@@ -1,3 +1,3 @@
<defines>
-CHACHA -> 20140103
+CHACHA -> 20180807
</defines>
diff --git a/src/tests/data/stream/chacha.vec b/src/tests/data/stream/chacha.vec
index 7b382082f..50b8dc4bf 100644
--- a/src/tests/data/stream/chacha.vec
+++ b/src/tests/data/stream/chacha.vec
@@ -473,3 +473,22 @@ Seek = 4294967232
Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F
Nonce = 000102030405060708090A0B
Out = DBF81BB406517BE1A54F4740E5DDDF2B7965747B757FA9D5B7EDD6B27FEDDB89D5D47F9B24E57DF393017A5079F61852CD8B86859884120AF867D25D3B259E2B
+
+# XChaCha tests from https://github.com/aead/chacha20
+
+Key = 0000000000000000000000000000000000000000000000000000000000000000
+Nonce = 000000000000000000000000000000000000000000000000
+Out = bcd02a18bf3f01d19292de30a7a8fdaca4b65e50a6002cc72cd6d2f7c91ac3d5728f83e0aad2bfcf9abd2d2db58faedd65015dd83fc09b131e271043019e8e0f789e9689e5208d7fd9e1f3c5b5341f48ef18a13e418998addadd97a3693a987f8e82ecd5c1433bfed1af49750c0f1ff29c4174a05b119aa3a9e8333812e0c0fea49e1ee0134a70a9d49c24e0cbd8fc3ba27e97c3322ad487f778f8dc6a122fa59cbe33e7
+
+Key = 8000000000000000000000000000000000000000000000000000000000000000
+Nonce = 000000000000000000000000000000000000000000000000
+Out = ccfe8a9e93431bd582f07b3eb0f4a7afc22ef39337ddd84f0d3545b318a315a32b3abb96de0fc6acde48b248fe8a80e6fa72bfcdf9d8d2656b991676476f052d9373080e30d8c0e217126a3c64402e1d9404ba9d6b8ce4ad5ac9693f3660638c26ea2cd1b4a8d3348c1e179ead353ee72fee558e9994c51a27195e287d00ec2f8cfef8866d1f98714f40cbe4e18cebabf3cd1fd3bb65506e5dce1ad09f438bffe2c96d7f2f0827c8c3f2ca59dbaa393785c6b8da7c69c8a4a63ffd113dcc93de8f52dbcfaed5e4cbcc1dc310b1352868fab7b14d930a9f7a7d47bed0eaf5b151f6dac8bd45510698bdc205d70b944ea5450888dd3ec753da9708bf06c0714822dda74f285c361abd0cd1071324c253dc421905edca36e8808bffef091e7dbdecebdad98cf70b7cede72e9c3c4108e5b32ffae0f42151a8196939d8e3b8384be1
+
+Key = 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
+Nonce = 000102030405060708090a0b0c0d0e0f1011121314151617
+Out = e53a61cef151e81401067de33adfc02e90ab205361b49b539fda7f0e63b1bc7d68fbee56c9c20c39960e595f3ea76c979804d08cfa728e66cb5f766b840ec61f9ec20f7f90d28dae334426cecb52a8e84b4728a5fdd61deb7f1a3fb63dadf5595e06b6e441670964d595ae59cf21536271bae2594774fb19079b933d8fe744f4
+
+Key = 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
+Nonce = 000102030405060708090a0b0c0d0e0f1011121314151617
+Seek = 66
+Out = 0f7f90d28dae334426cecb52a8e84b4728a5fdd61deb7f1a3fb63dadf5595e06b6e441670964d595ae59cf21536271bae2594774fb19079b933d8fe744f4