diff options
author | Jack Lloyd <[email protected]> | 2018-08-07 17:02:45 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2018-08-07 17:43:30 -0400 |
commit | 9b9c766ddb431b9262dc9db2270bbbe4c22d4add (patch) | |
tree | f9bbcdd7d91914c1a40e0dc6070538932e837155 | |
parent | e1374697bdfb84109d1fcefb3cb76b11d9309ac8 (diff) |
Add support for XChaCha
-rw-r--r-- | src/lib/stream/chacha/chacha.cpp | 162 | ||||
-rw-r--r-- | src/lib/stream/chacha/chacha.h | 3 | ||||
-rw-r--r-- | src/lib/stream/chacha/info.txt | 2 | ||||
-rw-r--r-- | src/tests/data/stream/chacha.vec | 19 |
4 files changed, 145 insertions, 41 deletions
diff --git a/src/lib/stream/chacha/chacha.cpp b/src/lib/stream/chacha/chacha.cpp index f34959377..7ccc4293b 100644 --- a/src/lib/stream/chacha/chacha.cpp +++ b/src/lib/stream/chacha/chacha.cpp @@ -1,6 +1,6 @@ /* * ChaCha -* (C) 2014 Jack Lloyd +* (C) 2014,2018 Jack Lloyd * * Botan is released under the Simplified BSD License (see license.txt) */ @@ -12,6 +12,53 @@ namespace Botan { +namespace { + +#define CHACHA_QUARTER_ROUND(a, b, c, d) \ + do { \ + a += b; d ^= a; d = rotl<16>(d); \ + c += d; b ^= c; b = rotl<12>(b); \ + a += b; d ^= a; d = rotl<8>(d); \ + c += d; b ^= c; b = rotl<7>(b); \ + } while(0) + +/* +* Generate HChaCha cipher stream (for XChaCha IV setup) +*/ +void hchacha(uint32_t output[8], const uint32_t input[16], size_t rounds) + { + BOTAN_ASSERT(rounds % 2 == 0, "Valid rounds"); + + uint32_t x00 = input[ 0], x01 = input[ 1], x02 = input[ 2], x03 = input[ 3], + x04 = input[ 4], x05 = input[ 5], x06 = input[ 6], x07 = input[ 7], + x08 = input[ 8], x09 = input[ 9], x10 = input[10], x11 = input[11], + x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15]; + + for(size_t i = 0; i != rounds / 2; ++i) + { + CHACHA_QUARTER_ROUND(x00, x04, x08, x12); + CHACHA_QUARTER_ROUND(x01, x05, x09, x13); + CHACHA_QUARTER_ROUND(x02, x06, x10, x14); + CHACHA_QUARTER_ROUND(x03, x07, x11, x15); + + CHACHA_QUARTER_ROUND(x00, x05, x10, x15); + CHACHA_QUARTER_ROUND(x01, x06, x11, x12); + CHACHA_QUARTER_ROUND(x02, x07, x08, x13); + CHACHA_QUARTER_ROUND(x03, x04, x09, x14); + } + + output[0] = x00; + output[1] = x01; + output[2] = x02; + output[3] = x03; + output[4] = x12; + output[5] = x13; + output[6] = x14; + output[7] = x15; + } + +} + ChaCha::ChaCha(size_t rounds) : m_rounds(rounds) { BOTAN_ARG_CHECK(m_rounds == 8 || m_rounds == 12 || m_rounds == 20, @@ -46,17 +93,9 @@ void ChaCha::chacha_x4(uint8_t output[64*4], uint32_t input[16], size_t rounds) for(size_t i = 0; i != 4; ++i) { uint32_t x00 = input[ 0], x01 = input[ 1], x02 = input[ 2], x03 = input[ 3], - x04 = input[ 4], x05 = input[ 5], x06 = input[ 6], x07 = input[ 7], - x08 = input[ 8], x09 = input[ 9], x10 = input[10], x11 = input[11], - x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15]; - -#define CHACHA_QUARTER_ROUND(a, b, c, d) \ - do { \ - a += b; d ^= a; d = rotl<16>(d); \ - c += d; b ^= c; b = rotl<12>(b); \ - a += b; d ^= a; d = rotl<8>(d); \ - c += d; b ^= c; b = rotl<7>(b); \ - } while(0) + x04 = input[ 4], x05 = input[ 5], x06 = input[ 6], x07 = input[ 7], + x08 = input[ 8], x09 = input[ 9], x10 = input[10], x11 = input[11], + x12 = input[12], x13 = input[13], x14 = input[14], x15 = input[15]; for(size_t r = 0; r != rounds / 2; ++r) { @@ -134,10 +173,7 @@ void ChaCha::cipher(const uint8_t in[], uint8_t out[], size_t length) m_position += length; } -/* -* ChaCha Key Schedule -*/ -void ChaCha::key_schedule(const uint8_t key[], size_t length) +void ChaCha::initialize_state() { static const uint32_t TAU[] = { 0x61707865, 0x3120646e, 0x79622d36, 0x6b206574 }; @@ -145,38 +181,61 @@ void ChaCha::key_schedule(const uint8_t key[], size_t length) static const uint32_t SIGMA[] = { 0x61707865, 0x3320646e, 0x79622d32, 0x6b206574 }; - const uint32_t* CONSTANTS = (length == 16) ? TAU : SIGMA; + m_state[4] = m_key[0]; + m_state[5] = m_key[1]; + m_state[6] = m_key[2]; + m_state[7] = m_key[3]; - // Repeat the key if 128 bits - const uint8_t* key2 = (length == 32) ? key + 16 : key; + if(m_key.size() == 4) + { + m_state[0] = TAU[0]; + m_state[1] = TAU[1]; + m_state[2] = TAU[2]; + m_state[3] = TAU[3]; + + m_state[8] = m_key[0]; + m_state[9] = m_key[1]; + m_state[10] = m_key[2]; + m_state[11] = m_key[3]; + } + else + { + m_state[0] = SIGMA[0]; + m_state[1] = SIGMA[1]; + m_state[2] = SIGMA[2]; + m_state[3] = SIGMA[3]; + + m_state[8] = m_key[4]; + m_state[9] = m_key[5]; + m_state[10] = m_key[6]; + m_state[11] = m_key[7]; + } - m_position = 0; - m_state.resize(16); - m_buffer.resize(4*64); + m_state[12] = 0; + m_state[13] = 0; + m_state[14] = 0; + m_state[15] = 0; - m_state[0] = CONSTANTS[0]; - m_state[1] = CONSTANTS[1]; - m_state[2] = CONSTANTS[2]; - m_state[3] = CONSTANTS[3]; + m_position = 0; + } - m_state[4] = load_le<uint32_t>(key, 0); - m_state[5] = load_le<uint32_t>(key, 1); - m_state[6] = load_le<uint32_t>(key, 2); - m_state[7] = load_le<uint32_t>(key, 3); +/* +* ChaCha Key Schedule +*/ +void ChaCha::key_schedule(const uint8_t key[], size_t length) + { + m_key.resize(length / 4); + load_le<uint32_t>(m_key.data(), key, m_key.size()); - m_state[8] = load_le<uint32_t>(key2, 0); - m_state[9] = load_le<uint32_t>(key2, 1); - m_state[10] = load_le<uint32_t>(key2, 2); - m_state[11] = load_le<uint32_t>(key2, 3); + m_state.resize(16); + m_buffer.resize(4*64); - // Default all-zero IV - const uint8_t ZERO[8] = { 0 }; - set_iv(ZERO, sizeof(ZERO)); + set_iv(nullptr, 0); } bool ChaCha::valid_iv_length(size_t iv_len) const { - return (iv_len == 0 || iv_len == 8 || iv_len == 12); + return (iv_len == 0 || iv_len == 8 || iv_len == 12 || iv_len == 24); } void ChaCha::set_iv(const uint8_t iv[], size_t length) @@ -186,8 +245,7 @@ void ChaCha::set_iv(const uint8_t iv[], size_t length) if(!valid_iv_length(length)) throw Invalid_IV_Length(name(), length); - m_state[12] = 0; - m_state[13] = 0; + initialize_state(); if(length == 0) { @@ -206,6 +264,29 @@ void ChaCha::set_iv(const uint8_t iv[], size_t length) m_state[14] = load_le<uint32_t>(iv, 1); m_state[15] = load_le<uint32_t>(iv, 2); } + else if(length == 24) + { + m_state[12] = load_le<uint32_t>(iv, 0); + m_state[13] = load_le<uint32_t>(iv, 1); + m_state[14] = load_le<uint32_t>(iv, 2); + m_state[15] = load_le<uint32_t>(iv, 3); + + secure_vector<uint32_t> hc(8); + hchacha(hc.data(), m_state.data(), m_rounds); + + m_state[ 4] = hc[0]; + m_state[ 5] = hc[1]; + m_state[ 6] = hc[2]; + m_state[ 7] = hc[3]; + m_state[ 8] = hc[4]; + m_state[ 9] = hc[5]; + m_state[10] = hc[6]; + m_state[11] = hc[7]; + m_state[12] = 0; + m_state[13] = 0; + m_state[14] = load_le<uint32_t>(iv, 4); + m_state[15] = load_le<uint32_t>(iv, 5); + } chacha_x4(m_buffer.data(), m_state.data(), m_rounds); m_position = 0; @@ -213,6 +294,7 @@ void ChaCha::set_iv(const uint8_t iv[], size_t length) void ChaCha::clear() { + zap(m_key); zap(m_state); zap(m_buffer); m_position = 0; diff --git a/src/lib/stream/chacha/chacha.h b/src/lib/stream/chacha/chacha.h index 8016a73f6..a4f3e3b75 100644 --- a/src/lib/stream/chacha/chacha.h +++ b/src/lib/stream/chacha/chacha.h @@ -53,6 +53,8 @@ class BOTAN_PUBLIC_API(2,0) ChaCha final : public StreamCipher private: void key_schedule(const uint8_t key[], size_t key_len) override; + void initialize_state(); + void chacha_x4(uint8_t output[64*4], uint32_t state[16], size_t rounds); #if defined(BOTAN_HAS_CHACHA_SSE2) @@ -60,6 +62,7 @@ class BOTAN_PUBLIC_API(2,0) ChaCha final : public StreamCipher #endif size_t m_rounds; + secure_vector<uint32_t> m_key; secure_vector<uint32_t> m_state; secure_vector<uint8_t> m_buffer; size_t m_position = 0; diff --git a/src/lib/stream/chacha/info.txt b/src/lib/stream/chacha/info.txt index 0bcd013ad..ba9c3da34 100644 --- a/src/lib/stream/chacha/info.txt +++ b/src/lib/stream/chacha/info.txt @@ -1,3 +1,3 @@ <defines> -CHACHA -> 20140103 +CHACHA -> 20180807 </defines> diff --git a/src/tests/data/stream/chacha.vec b/src/tests/data/stream/chacha.vec index 7b382082f..50b8dc4bf 100644 --- a/src/tests/data/stream/chacha.vec +++ b/src/tests/data/stream/chacha.vec @@ -473,3 +473,22 @@ Seek = 4294967232 Key = 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F Nonce = 000102030405060708090A0B Out = DBF81BB406517BE1A54F4740E5DDDF2B7965747B757FA9D5B7EDD6B27FEDDB89D5D47F9B24E57DF393017A5079F61852CD8B86859884120AF867D25D3B259E2B + +# XChaCha tests from https://github.com/aead/chacha20 + +Key = 0000000000000000000000000000000000000000000000000000000000000000 +Nonce = 000000000000000000000000000000000000000000000000 +Out = bcd02a18bf3f01d19292de30a7a8fdaca4b65e50a6002cc72cd6d2f7c91ac3d5728f83e0aad2bfcf9abd2d2db58faedd65015dd83fc09b131e271043019e8e0f789e9689e5208d7fd9e1f3c5b5341f48ef18a13e418998addadd97a3693a987f8e82ecd5c1433bfed1af49750c0f1ff29c4174a05b119aa3a9e8333812e0c0fea49e1ee0134a70a9d49c24e0cbd8fc3ba27e97c3322ad487f778f8dc6a122fa59cbe33e7 + +Key = 8000000000000000000000000000000000000000000000000000000000000000 +Nonce = 000000000000000000000000000000000000000000000000 +Out = ccfe8a9e93431bd582f07b3eb0f4a7afc22ef39337ddd84f0d3545b318a315a32b3abb96de0fc6acde48b248fe8a80e6fa72bfcdf9d8d2656b991676476f052d9373080e30d8c0e217126a3c64402e1d9404ba9d6b8ce4ad5ac9693f3660638c26ea2cd1b4a8d3348c1e179ead353ee72fee558e9994c51a27195e287d00ec2f8cfef8866d1f98714f40cbe4e18cebabf3cd1fd3bb65506e5dce1ad09f438bffe2c96d7f2f0827c8c3f2ca59dbaa393785c6b8da7c69c8a4a63ffd113dcc93de8f52dbcfaed5e4cbcc1dc310b1352868fab7b14d930a9f7a7d47bed0eaf5b151f6dac8bd45510698bdc205d70b944ea5450888dd3ec753da9708bf06c0714822dda74f285c361abd0cd1071324c253dc421905edca36e8808bffef091e7dbdecebdad98cf70b7cede72e9c3c4108e5b32ffae0f42151a8196939d8e3b8384be1 + +Key = 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f +Nonce = 000102030405060708090a0b0c0d0e0f1011121314151617 +Out = e53a61cef151e81401067de33adfc02e90ab205361b49b539fda7f0e63b1bc7d68fbee56c9c20c39960e595f3ea76c979804d08cfa728e66cb5f766b840ec61f9ec20f7f90d28dae334426cecb52a8e84b4728a5fdd61deb7f1a3fb63dadf5595e06b6e441670964d595ae59cf21536271bae2594774fb19079b933d8fe744f4 + +Key = 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f +Nonce = 000102030405060708090a0b0c0d0e0f1011121314151617 +Seek = 66 +Out = 0f7f90d28dae334426cecb52a8e84b4728a5fdd61deb7f1a3fb63dadf5595e06b6e441670964d595ae59cf21536271bae2594774fb19079b933d8fe744f4 |