Coverage Report

Created: 2021-05-04 09:02

/src/botan/src/lib/modes/aead/siv/siv.cpp
Line
Count
Source (jump to first uncovered line)
1
/*
2
* SIV Mode Encryption
3
* (C) 2013,2017 Jack Lloyd
4
* (C) 2016 Daniel Neus, Rohde & Schwarz Cybersecurity
5
*
6
* Botan is released under the Simplified BSD License (see license.txt)
7
*/
8
9
#include <botan/internal/siv.h>
10
#include <botan/block_cipher.h>
11
#include <botan/internal/cmac.h>
12
#include <botan/internal/poly_dbl.h>
13
#include <botan/internal/ctr.h>
14
15
namespace Botan {
16
17
SIV_Mode::SIV_Mode(std::unique_ptr<BlockCipher> cipher) :
18
   m_name(cipher->name() + "/SIV"),
19
   m_bs(cipher->block_size()),
20
   m_ctr(new CTR_BE(cipher->new_object(), 8)),
21
   m_mac(new CMAC(std::move(cipher)))
22
0
   {
23
   // Not really true but only 128 bit allowed at the moment
24
0
   if(m_bs != 16)
25
0
      throw Invalid_Argument("SIV requires a 128 bit block cipher");
26
0
   }
27
28
SIV_Mode::~SIV_Mode()
29
0
   {
30
   // for ~unique_ptr
31
0
   }
32
33
void SIV_Mode::clear()
34
0
   {
35
0
   m_ctr->clear();
36
0
   m_mac->clear();
37
0
   reset();
38
0
   }
39
40
void SIV_Mode::reset()
41
0
   {
42
0
   m_nonce.clear();
43
0
   m_msg_buf.clear();
44
0
   m_ad_macs.clear();
45
0
   }
46
47
std::string SIV_Mode::name() const
48
0
   {
49
0
   return m_name;
50
0
   }
51
52
bool SIV_Mode::valid_nonce_length(size_t) const
53
0
   {
54
0
   return true;
55
0
   }
56
57
size_t SIV_Mode::update_granularity() const
58
0
   {
59
   /*
60
   This value does not particularly matter as regardless SIV_Mode::update
61
   buffers all input, so in theory this could be 1. However as for instance
62
   Transform_Filter creates update_granularity() uint8_t buffers, use a
63
   somewhat large size to avoid bouncing on a tiny buffer.
64
   */
65
0
   return 128;
66
0
   }
67
68
Key_Length_Specification SIV_Mode::key_spec() const
69
0
   {
70
0
   return m_mac->key_spec().multiple(2);
71
0
   }
72
73
void SIV_Mode::key_schedule(const uint8_t key[], size_t length)
74
0
   {
75
0
   const size_t keylen = length / 2;
76
0
   m_mac->set_key(key, keylen);
77
0
   m_ctr->set_key(key + keylen, keylen);
78
0
   m_ad_macs.clear();
79
0
   }
80
81
size_t SIV_Mode::maximum_associated_data_inputs() const
82
0
   {
83
0
   return block_size() * 8 - 2;
84
0
   }
85
86
void SIV_Mode::set_associated_data_n(size_t n, const uint8_t ad[], size_t length)
87
0
   {
88
0
   const size_t max_ads = maximum_associated_data_inputs();
89
0
   if(n > max_ads)
90
0
      throw Invalid_Argument(name() + " allows no more than " + std::to_string(max_ads) + " ADs");
91
92
0
   if(n >= m_ad_macs.size())
93
0
      m_ad_macs.resize(n+1);
94
95
0
   m_ad_macs[n] = m_mac->process(ad, length);
96
0
   }
97
98
void SIV_Mode::start_msg(const uint8_t nonce[], size_t nonce_len)
99
0
   {
100
0
   if(!valid_nonce_length(nonce_len))
101
0
      throw Invalid_IV_Length(name(), nonce_len);
102
103
0
   if(nonce_len)
104
0
      m_nonce = m_mac->process(nonce, nonce_len);
105
0
   else
106
0
      m_nonce.clear();
107
108
0
   m_msg_buf.clear();
109
0
   }
110
111
size_t SIV_Mode::process(uint8_t buf[], size_t sz)
112
0
   {
113
   // all output is saved for processing in finish
114
0
   m_msg_buf.insert(m_msg_buf.end(), buf, buf + sz);
115
0
   return 0;
116
0
   }
117
118
secure_vector<uint8_t> SIV_Mode::S2V(const uint8_t* text, size_t text_len)
119
0
   {
120
0
   const std::vector<uint8_t> zeros(block_size());
121
122
0
   secure_vector<uint8_t> V = m_mac->process(zeros.data(), zeros.size());
123
124
0
   for(size_t i = 0; i != m_ad_macs.size(); ++i)
125
0
      {
126
0
      poly_double_n(V.data(), V.size());
127
0
      V ^= m_ad_macs[i];
128
0
      }
129
130
0
   if(m_nonce.size())
131
0
      {
132
0
      poly_double_n(V.data(), V.size());
133
0
      V ^= m_nonce;
134
0
      }
135
136
0
   if(text_len < block_size())
137
0
      {
138
0
      poly_double_n(V.data(), V.size());
139
0
      xor_buf(V.data(), text, text_len);
140
0
      V[text_len] ^= 0x80;
141
0
      return m_mac->process(V);
142
0
      }
143
144
0
   m_mac->update(text, text_len - block_size());
145
0
   xor_buf(V.data(), &text[text_len - block_size()], block_size());
146
0
   m_mac->update(V);
147
148
0
   return m_mac->final();
149
0
   }
150
151
void SIV_Mode::set_ctr_iv(secure_vector<uint8_t> V)
152
0
   {
153
0
   V[m_bs-8] &= 0x7F;
154
0
   V[m_bs-4] &= 0x7F;
155
156
0
   ctr().set_iv(V.data(), V.size());
157
0
   }
158
159
void SIV_Encryption::finish(secure_vector<uint8_t>& buffer, size_t offset)
160
0
   {
161
0
   BOTAN_ASSERT(buffer.size() >= offset, "Offset is sane");
162
163
0
   buffer.insert(buffer.begin() + offset, msg_buf().begin(), msg_buf().end());
164
0
   msg_buf().clear();
165
166
0
   const secure_vector<uint8_t> V = S2V(buffer.data() + offset, buffer.size() - offset);
167
168
0
   buffer.insert(buffer.begin() + offset, V.begin(), V.end());
169
170
0
   if(buffer.size() != offset + V.size())
171
0
      {
172
0
      set_ctr_iv(V);
173
0
      ctr().cipher1(&buffer[offset + V.size()], buffer.size() - offset - V.size());
174
0
      }
175
0
   }
176
177
void SIV_Decryption::finish(secure_vector<uint8_t>& buffer, size_t offset)
178
0
   {
179
0
   BOTAN_ASSERT(buffer.size() >= offset, "Offset is sane");
180
181
0
   if(msg_buf().size() > 0)
182
0
      {
183
0
      buffer.insert(buffer.begin() + offset, msg_buf().begin(), msg_buf().end());
184
0
      msg_buf().clear();
185
0
      }
186
187
0
   const size_t sz = buffer.size() - offset;
188
189
0
   BOTAN_ASSERT(sz >= tag_size(), "We have the tag");
190
191
0
   secure_vector<uint8_t> V(buffer.data() + offset,
192
0
                            buffer.data() + offset + block_size());
193
194
0
   if(buffer.size() != offset + V.size())
195
0
      {
196
0
      set_ctr_iv(V);
197
198
0
      ctr().cipher(buffer.data() + offset + V.size(),
199
0
                   buffer.data() + offset,
200
0
                   buffer.size() - offset - V.size());
201
0
      }
202
203
0
   const secure_vector<uint8_t> T = S2V(buffer.data() + offset, buffer.size() - offset - V.size());
204
205
0
   if(!constant_time_compare(T.data(), V.data(), T.size()))
206
0
      throw Invalid_Authentication_Tag("SIV tag check failed");
207
208
0
   buffer.resize(buffer.size() - tag_size());
209
0
   }
210
211
}