blob: f3be16e1d18a53608162aea3424d131c91cc3e04 [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/core/crypto/aead_base_decrypter.h"
6
7#include <cstdint>
vasilvv872e7a32019-03-12 16:42:44 -07008#include <string>
QUICHE teama6ef0a62019-03-07 20:34:33 -05009
10#include "third_party/boringssl/src/include/openssl/crypto.h"
11#include "third_party/boringssl/src/include/openssl/err.h"
12#include "third_party/boringssl/src/include/openssl/evp.h"
13#include "net/third_party/quiche/src/quic/core/quic_utils.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050014#include "net/third_party/quiche/src/quic/platform/api/quic_bug_tracker.h"
15#include "net/third_party/quiche/src/quic/platform/api/quic_logging.h"
bnc4e9283d2019-12-17 07:08:57 -080016#include "net/third_party/quiche/src/common/platform/api/quiche_arraysize.h"
dmcardle904ef182019-12-13 08:34:33 -080017#include "net/third_party/quiche/src/common/platform/api/quiche_string_piece.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050018
19namespace quic {
20
21namespace {
22
23// Clear OpenSSL error stack.
24void ClearOpenSslErrors() {
25 while (ERR_get_error()) {
26 }
27}
28
29// In debug builds only, log OpenSSL error stack. Then clear OpenSSL error
30// stack.
31void DLogOpenSslErrors() {
32#ifdef NDEBUG
33 ClearOpenSslErrors();
34#else
35 while (uint32_t error = ERR_get_error()) {
36 char buf[120];
bnc4e9283d2019-12-17 07:08:57 -080037 ERR_error_string_n(error, buf, QUICHE_ARRAYSIZE(buf));
QUICHE teama6ef0a62019-03-07 20:34:33 -050038 QUIC_DLOG(ERROR) << "OpenSSL error: " << buf;
39 }
40#endif
41}
42
43const EVP_AEAD* InitAndCall(const EVP_AEAD* (*aead_getter)()) {
44 // Ensure BoringSSL is initialized before calling |aead_getter|. In Chromium,
45 // the static initializer is disabled.
46 CRYPTO_library_init();
47 return aead_getter();
48}
49
50} // namespace
51
52AeadBaseDecrypter::AeadBaseDecrypter(const EVP_AEAD* (*aead_getter)(),
53 size_t key_size,
54 size_t auth_tag_size,
55 size_t nonce_size,
56 bool use_ietf_nonce_construction)
57 : aead_alg_(InitAndCall(aead_getter)),
58 key_size_(key_size),
59 auth_tag_size_(auth_tag_size),
60 nonce_size_(nonce_size),
61 use_ietf_nonce_construction_(use_ietf_nonce_construction),
62 have_preliminary_key_(false) {
63 DCHECK_GT(256u, key_size);
64 DCHECK_GT(256u, auth_tag_size);
65 DCHECK_GT(256u, nonce_size);
66 DCHECK_LE(key_size_, sizeof(key_));
67 DCHECK_LE(nonce_size_, sizeof(iv_));
68}
69
70AeadBaseDecrypter::~AeadBaseDecrypter() {}
71
dmcardle904ef182019-12-13 08:34:33 -080072bool AeadBaseDecrypter::SetKey(quiche::QuicheStringPiece key) {
QUICHE teama6ef0a62019-03-07 20:34:33 -050073 DCHECK_EQ(key.size(), key_size_);
74 if (key.size() != key_size_) {
75 return false;
76 }
77 memcpy(key_, key.data(), key.size());
78
79 EVP_AEAD_CTX_cleanup(ctx_.get());
80 if (!EVP_AEAD_CTX_init(ctx_.get(), aead_alg_, key_, key_size_, auth_tag_size_,
81 nullptr)) {
82 DLogOpenSslErrors();
83 return false;
84 }
85
86 return true;
87}
88
dmcardle904ef182019-12-13 08:34:33 -080089bool AeadBaseDecrypter::SetNoncePrefix(quiche::QuicheStringPiece nonce_prefix) {
QUICHE teama6ef0a62019-03-07 20:34:33 -050090 if (use_ietf_nonce_construction_) {
91 QUIC_BUG << "Attempted to set nonce prefix on IETF QUIC crypter";
92 return false;
93 }
94 DCHECK_EQ(nonce_prefix.size(), nonce_size_ - sizeof(QuicPacketNumber));
95 if (nonce_prefix.size() != nonce_size_ - sizeof(QuicPacketNumber)) {
96 return false;
97 }
98 memcpy(iv_, nonce_prefix.data(), nonce_prefix.size());
99 return true;
100}
101
dmcardle904ef182019-12-13 08:34:33 -0800102bool AeadBaseDecrypter::SetIV(quiche::QuicheStringPiece iv) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500103 if (!use_ietf_nonce_construction_) {
104 QUIC_BUG << "Attempted to set IV on Google QUIC crypter";
105 return false;
106 }
107 DCHECK_EQ(iv.size(), nonce_size_);
108 if (iv.size() != nonce_size_) {
109 return false;
110 }
111 memcpy(iv_, iv.data(), iv.size());
112 return true;
113}
114
dmcardle904ef182019-12-13 08:34:33 -0800115bool AeadBaseDecrypter::SetPreliminaryKey(quiche::QuicheStringPiece key) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500116 DCHECK(!have_preliminary_key_);
117 SetKey(key);
118 have_preliminary_key_ = true;
119
120 return true;
121}
122
123bool AeadBaseDecrypter::SetDiversificationNonce(
124 const DiversificationNonce& nonce) {
125 if (!have_preliminary_key_) {
126 return true;
127 }
128
vasilvvc48c8712019-03-11 13:38:16 -0700129 std::string key, nonce_prefix;
nharperc1bbfe62019-09-27 16:48:40 -0700130 size_t prefix_size = nonce_size_;
131 if (!use_ietf_nonce_construction_) {
132 prefix_size -= sizeof(QuicPacketNumber);
133 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500134 DiversifyPreliminaryKey(
dmcardle904ef182019-12-13 08:34:33 -0800135 quiche::QuicheStringPiece(reinterpret_cast<const char*>(key_), key_size_),
136 quiche::QuicheStringPiece(reinterpret_cast<const char*>(iv_),
137 prefix_size),
138 nonce, key_size_, prefix_size, &key, &nonce_prefix);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500139
nharperc1bbfe62019-09-27 16:48:40 -0700140 if (!SetKey(key) ||
141 (!use_ietf_nonce_construction_ && !SetNoncePrefix(nonce_prefix)) ||
142 (use_ietf_nonce_construction_ && !SetIV(nonce_prefix))) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500143 DCHECK(false);
144 return false;
145 }
146
147 have_preliminary_key_ = false;
148 return true;
149}
150
151bool AeadBaseDecrypter::DecryptPacket(uint64_t packet_number,
dmcardle904ef182019-12-13 08:34:33 -0800152 quiche::QuicheStringPiece associated_data,
153 quiche::QuicheStringPiece ciphertext,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500154 char* output,
155 size_t* output_length,
156 size_t max_output_length) {
157 if (ciphertext.length() < auth_tag_size_) {
158 return false;
159 }
160
161 if (have_preliminary_key_) {
162 QUIC_BUG << "Unable to decrypt while key diversification is pending";
163 return false;
164 }
165
166 uint8_t nonce[kMaxNonceSize];
167 memcpy(nonce, iv_, nonce_size_);
168 size_t prefix_len = nonce_size_ - sizeof(packet_number);
169 if (use_ietf_nonce_construction_) {
170 for (size_t i = 0; i < sizeof(packet_number); ++i) {
171 nonce[prefix_len + i] ^=
172 (packet_number >> ((sizeof(packet_number) - i - 1) * 8)) & 0xff;
173 }
174 } else {
175 memcpy(nonce + prefix_len, &packet_number, sizeof(packet_number));
176 }
177 if (!EVP_AEAD_CTX_open(
178 ctx_.get(), reinterpret_cast<uint8_t*>(output), output_length,
179 max_output_length, reinterpret_cast<const uint8_t*>(nonce),
180 nonce_size_, reinterpret_cast<const uint8_t*>(ciphertext.data()),
181 ciphertext.size(),
182 reinterpret_cast<const uint8_t*>(associated_data.data()),
183 associated_data.size())) {
184 // Because QuicFramer does trial decryption, decryption errors are expected
185 // when encryption level changes. So we don't log decryption errors.
186 ClearOpenSslErrors();
187 return false;
188 }
189 return true;
190}
191
192size_t AeadBaseDecrypter::GetKeySize() const {
193 return key_size_;
194}
195
nharper965e5922019-09-23 22:33:54 -0700196size_t AeadBaseDecrypter::GetNoncePrefixSize() const {
197 return nonce_size_ - sizeof(QuicPacketNumber);
198}
199
QUICHE teama6ef0a62019-03-07 20:34:33 -0500200size_t AeadBaseDecrypter::GetIVSize() const {
201 return nonce_size_;
202}
203
dmcardle904ef182019-12-13 08:34:33 -0800204quiche::QuicheStringPiece AeadBaseDecrypter::GetKey() const {
205 return quiche::QuicheStringPiece(reinterpret_cast<const char*>(key_),
206 key_size_);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500207}
208
dmcardle904ef182019-12-13 08:34:33 -0800209quiche::QuicheStringPiece AeadBaseDecrypter::GetNoncePrefix() const {
210 return quiche::QuicheStringPiece(reinterpret_cast<const char*>(iv_),
211 nonce_size_ - sizeof(QuicPacketNumber));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500212}
213
214} // namespace quic