1 /*
2 * Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 /*
11 * Helper functions for 128 bit CBC CTS ciphers (Currently AES and Camellia).
12 *
13 * The function dispatch tables are embedded into cipher_aes.c
14 * and cipher_camellia.c using cipher_aes_cts.inc and cipher_camellia_cts.inc
15 */
16
17 /*
18 * Refer to SP800-38A-Addendum
19 *
20 * Ciphertext stealing encrypts plaintext using a block cipher, without padding
21 * the message to a multiple of the block size, so the ciphertext is the same
22 * size as the plaintext.
23 * It does this by altering processing of the last two blocks of the message.
24 * The processing of all but the last two blocks is unchanged, but a portion of
25 * the second-last block's ciphertext is "stolen" to pad the last plaintext
26 * block. The padded final block is then encrypted as usual.
27 * The final ciphertext for the last two blocks, consists of the partial block
28 * (with the "stolen" portion omitted) plus the full final block,
29 * which are the same size as the original plaintext.
30 * Decryption requires decrypting the final block first, then restoring the
31 * stolen ciphertext to the partial block, which can then be decrypted as usual.
32
33 * AES_CBC_CTS has 3 variants:
34 * (1) CS1 The NIST variant.
35 * If the length is a multiple of the blocksize it is the same as CBC mode.
36 * otherwise it produces C1||C2||(C(n-1))*||Cn.
37 * Where C(n-1)* is a partial block.
38 * (2) CS2
39 * If the length is a multiple of the blocksize it is the same as CBC mode.
40 * otherwise it produces C1||C2||Cn||(C(n-1))*.
41 * Where C(n-1)* is a partial block.
42 * (3) CS3 The Kerberos5 variant.
43 * Produces C1||C2||Cn||(C(n-1))* regardless of the length.
44 * If the length is a multiple of the blocksize it looks similar to CBC mode
45 * with the last 2 blocks swapped.
46 * Otherwise it is the same as CS2.
47 */
48
49 #include <openssl/core_names.h>
50 #include "prov/ciphercommon.h"
51 #include "internal/nelem.h"
52 #include "cipher_cts.h"
53
54 /* The value assigned to 0 is the default */
55 #define CTS_CS1 0
56 #define CTS_CS2 1
57 #define CTS_CS3 2
58
59 #define CTS_BLOCK_SIZE 16
60
61 typedef union {
62 size_t align;
63 unsigned char c[CTS_BLOCK_SIZE];
64 } aligned_16bytes;
65
66 typedef struct cts_mode_name2id_st {
67 unsigned int id;
68 const char *name;
69 } CTS_MODE_NAME2ID;
70
71 static CTS_MODE_NAME2ID cts_modes[] = {
72 { CTS_CS1, OSSL_CIPHER_CTS_MODE_CS1 },
73 { CTS_CS2, OSSL_CIPHER_CTS_MODE_CS2 },
74 { CTS_CS3, OSSL_CIPHER_CTS_MODE_CS3 },
75 };
76
ossl_cipher_cbc_cts_mode_id2name(unsigned int id)77 const char *ossl_cipher_cbc_cts_mode_id2name(unsigned int id)
78 {
79 size_t i;
80
81 for (i = 0; i < OSSL_NELEM(cts_modes); ++i) {
82 if (cts_modes[i].id == id)
83 return cts_modes[i].name;
84 }
85 return NULL;
86 }
87
ossl_cipher_cbc_cts_mode_name2id(const char * name)88 int ossl_cipher_cbc_cts_mode_name2id(const char *name)
89 {
90 size_t i;
91
92 for (i = 0; i < OSSL_NELEM(cts_modes); ++i) {
93 if (OPENSSL_strcasecmp(name, cts_modes[i].name) == 0)
94 return (int)cts_modes[i].id;
95 }
96 return -1;
97 }
98
cts128_cs1_encrypt(PROV_CIPHER_CTX * ctx,const unsigned char * in,unsigned char * out,size_t len)99 static size_t cts128_cs1_encrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in,
100 unsigned char *out, size_t len)
101 {
102 aligned_16bytes tmp_in;
103 size_t residue;
104
105 residue = len % CTS_BLOCK_SIZE;
106 len -= residue;
107 if (!ctx->hw->cipher(ctx, out, in, len))
108 return 0;
109
110 if (residue == 0)
111 return len;
112
113 in += len;
114 out += len;
115
116 memset(tmp_in.c, 0, sizeof(tmp_in));
117 memcpy(tmp_in.c, in, residue);
118 if (!ctx->hw->cipher(ctx, out - CTS_BLOCK_SIZE + residue, tmp_in.c,
119 CTS_BLOCK_SIZE))
120 return 0;
121 return len + residue;
122 }
123
do_xor(const unsigned char * in1,const unsigned char * in2,size_t len,unsigned char * out)124 static void do_xor(const unsigned char *in1, const unsigned char *in2,
125 size_t len, unsigned char *out)
126 {
127 size_t i;
128
129 for (i = 0; i < len; ++i)
130 out[i] = in1[i] ^ in2[i];
131 }
132
cts128_cs1_decrypt(PROV_CIPHER_CTX * ctx,const unsigned char * in,unsigned char * out,size_t len)133 static size_t cts128_cs1_decrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in,
134 unsigned char *out, size_t len)
135 {
136 aligned_16bytes mid_iv, ct_mid, cn, pt_last;
137 size_t residue;
138
139 residue = len % CTS_BLOCK_SIZE;
140 if (residue == 0) {
141 /* If there are no partial blocks then it is the same as CBC mode */
142 if (!ctx->hw->cipher(ctx, out, in, len))
143 return 0;
144 return len;
145 }
146 /* Process blocks at the start - but leave the last 2 blocks */
147 len -= CTS_BLOCK_SIZE + residue;
148 if (len > 0) {
149 if (!ctx->hw->cipher(ctx, out, in, len))
150 return 0;
151 in += len;
152 out += len;
153 }
154 /* Save the iv that will be used by the second last block */
155 memcpy(mid_iv.c, ctx->iv, CTS_BLOCK_SIZE);
156 /* Save the C(n) block */
157 memcpy(cn.c, in + residue, CTS_BLOCK_SIZE);
158
159 /* Decrypt the last block first using an iv of zero */
160 memset(ctx->iv, 0, CTS_BLOCK_SIZE);
161 if (!ctx->hw->cipher(ctx, pt_last.c, in + residue, CTS_BLOCK_SIZE))
162 return 0;
163
164 /*
165 * Rebuild the ciphertext of the second last block as a combination of
166 * the decrypted last block + replace the start with the ciphertext bytes
167 * of the partial second last block.
168 */
169 memcpy(ct_mid.c, in, residue);
170 memcpy(ct_mid.c + residue, pt_last.c + residue, CTS_BLOCK_SIZE - residue);
171 /*
172 * Restore the last partial ciphertext block.
173 * Now that we have the cipher text of the second last block, apply
174 * that to the partial plaintext end block. We have already decrypted the
175 * block using an IV of zero. For decryption the IV is just XORed after
176 * doing an Cipher CBC block - so just XOR in the cipher text.
177 */
178 do_xor(ct_mid.c, pt_last.c, residue, out + CTS_BLOCK_SIZE);
179
180 /* Restore the iv needed by the second last block */
181 memcpy(ctx->iv, mid_iv.c, CTS_BLOCK_SIZE);
182
183 /*
184 * Decrypt the second last plaintext block now that we have rebuilt the
185 * ciphertext.
186 */
187 if (!ctx->hw->cipher(ctx, out, ct_mid.c, CTS_BLOCK_SIZE))
188 return 0;
189
190 /* The returned iv is the C(n) block */
191 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE);
192 return len + CTS_BLOCK_SIZE + residue;
193 }
194
cts128_cs3_encrypt(PROV_CIPHER_CTX * ctx,const unsigned char * in,unsigned char * out,size_t len)195 static size_t cts128_cs3_encrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in,
196 unsigned char *out, size_t len)
197 {
198 aligned_16bytes tmp_in;
199 size_t residue;
200
201 if (len < CTS_BLOCK_SIZE) /* CS3 requires at least one block */
202 return 0;
203
204 /* If we only have one block then just process the aligned block */
205 if (len == CTS_BLOCK_SIZE)
206 return ctx->hw->cipher(ctx, out, in, len) ? len : 0;
207
208 residue = len % CTS_BLOCK_SIZE;
209 if (residue == 0)
210 residue = CTS_BLOCK_SIZE;
211 len -= residue;
212
213 if (!ctx->hw->cipher(ctx, out, in, len))
214 return 0;
215
216 in += len;
217 out += len;
218
219 memset(tmp_in.c, 0, sizeof(tmp_in));
220 memcpy(tmp_in.c, in, residue);
221 memcpy(out, out - CTS_BLOCK_SIZE, residue);
222 if (!ctx->hw->cipher(ctx, out - CTS_BLOCK_SIZE, tmp_in.c, CTS_BLOCK_SIZE))
223 return 0;
224 return len + residue;
225 }
226
227 /*
228 * Note:
229 * The cipher text (in) is of the form C(0), C(1), ., C(n), C(n-1)* where
230 * C(n) is a full block and C(n-1)* can be a partial block
231 * (but could be a full block).
232 * This means that the output plaintext (out) needs to swap the plaintext of
233 * the last two decoded ciphertext blocks.
234 */
cts128_cs3_decrypt(PROV_CIPHER_CTX * ctx,const unsigned char * in,unsigned char * out,size_t len)235 static size_t cts128_cs3_decrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in,
236 unsigned char *out, size_t len)
237 {
238 aligned_16bytes mid_iv, ct_mid, cn, pt_last;
239 size_t residue;
240
241 if (len < CTS_BLOCK_SIZE) /* CS3 requires at least one block */
242 return 0;
243
244 /* If we only have one block then just process the aligned block */
245 if (len == CTS_BLOCK_SIZE)
246 return ctx->hw->cipher(ctx, out, in, len) ? len : 0;
247
248 /* Process blocks at the start - but leave the last 2 blocks */
249 residue = len % CTS_BLOCK_SIZE;
250 if (residue == 0)
251 residue = CTS_BLOCK_SIZE;
252 len -= CTS_BLOCK_SIZE + residue;
253
254 if (len > 0) {
255 if (!ctx->hw->cipher(ctx, out, in, len))
256 return 0;
257 in += len;
258 out += len;
259 }
260 /* Save the iv that will be used by the second last block */
261 memcpy(mid_iv.c, ctx->iv, CTS_BLOCK_SIZE);
262 /* Save the C(n) block : For CS3 it is C(1)||...||C(n-2)||C(n)||C(n-1)* */
263 memcpy(cn.c, in, CTS_BLOCK_SIZE);
264
265 /* Decrypt the C(n) block first using an iv of zero */
266 memset(ctx->iv, 0, CTS_BLOCK_SIZE);
267 if (!ctx->hw->cipher(ctx, pt_last.c, in, CTS_BLOCK_SIZE))
268 return 0;
269
270 /*
271 * Rebuild the ciphertext of C(n-1) as a combination of
272 * the decrypted C(n) block + replace the start with the ciphertext bytes
273 * of the partial last block.
274 */
275 memcpy(ct_mid.c, in + CTS_BLOCK_SIZE, residue);
276 if (residue != CTS_BLOCK_SIZE)
277 memcpy(ct_mid.c + residue, pt_last.c + residue, CTS_BLOCK_SIZE - residue);
278 /*
279 * Restore the last partial ciphertext block.
280 * Now that we have the cipher text of the second last block, apply
281 * that to the partial plaintext end block. We have already decrypted the
282 * block using an IV of zero. For decryption the IV is just XORed after
283 * doing an AES block - so just XOR in the ciphertext.
284 */
285 do_xor(ct_mid.c, pt_last.c, residue, out + CTS_BLOCK_SIZE);
286
287 /* Restore the iv needed by the second last block */
288 memcpy(ctx->iv, mid_iv.c, CTS_BLOCK_SIZE);
289 /*
290 * Decrypt the second last plaintext block now that we have rebuilt the
291 * ciphertext.
292 */
293 if (!ctx->hw->cipher(ctx, out, ct_mid.c, CTS_BLOCK_SIZE))
294 return 0;
295
296 /* The returned iv is the C(n) block */
297 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE);
298 return len + CTS_BLOCK_SIZE + residue;
299 }
300
cts128_cs2_encrypt(PROV_CIPHER_CTX * ctx,const unsigned char * in,unsigned char * out,size_t len)301 static size_t cts128_cs2_encrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in,
302 unsigned char *out, size_t len)
303 {
304 if (len % CTS_BLOCK_SIZE == 0) {
305 /* If there are no partial blocks then it is the same as CBC mode */
306 if (!ctx->hw->cipher(ctx, out, in, len))
307 return 0;
308 return len;
309 }
310 /* For partial blocks CS2 is equivalent to CS3 */
311 return cts128_cs3_encrypt(ctx, in, out, len);
312 }
313
cts128_cs2_decrypt(PROV_CIPHER_CTX * ctx,const unsigned char * in,unsigned char * out,size_t len)314 static size_t cts128_cs2_decrypt(PROV_CIPHER_CTX *ctx, const unsigned char *in,
315 unsigned char *out, size_t len)
316 {
317 if (len % CTS_BLOCK_SIZE == 0) {
318 /* If there are no partial blocks then it is the same as CBC mode */
319 if (!ctx->hw->cipher(ctx, out, in, len))
320 return 0;
321 return len;
322 }
323 /* For partial blocks CS2 is equivalent to CS3 */
324 return cts128_cs3_decrypt(ctx, in, out, len);
325 }
326
ossl_cipher_cbc_cts_block_update(void * vctx,unsigned char * out,size_t * outl,size_t outsize,const unsigned char * in,size_t inl)327 int ossl_cipher_cbc_cts_block_update(void *vctx, unsigned char *out, size_t *outl,
328 size_t outsize, const unsigned char *in,
329 size_t inl)
330 {
331 PROV_CIPHER_CTX *ctx = (PROV_CIPHER_CTX *)vctx;
332 size_t sz = 0;
333
334 if (inl < CTS_BLOCK_SIZE) /* There must be at least one block for CTS mode */
335 return 0;
336 if (outsize < inl)
337 return 0;
338 if (out == NULL) {
339 *outl = inl;
340 return 1;
341 }
342
343 /*
344 * Return an error if the update is called multiple times, only one shot
345 * is supported.
346 */
347 if (ctx->updated == 1)
348 return 0;
349
350 if (ctx->enc) {
351 if (ctx->cts_mode == CTS_CS1)
352 sz = cts128_cs1_encrypt(ctx, in, out, inl);
353 else if (ctx->cts_mode == CTS_CS2)
354 sz = cts128_cs2_encrypt(ctx, in, out, inl);
355 else if (ctx->cts_mode == CTS_CS3)
356 sz = cts128_cs3_encrypt(ctx, in, out, inl);
357 } else {
358 if (ctx->cts_mode == CTS_CS1)
359 sz = cts128_cs1_decrypt(ctx, in, out, inl);
360 else if (ctx->cts_mode == CTS_CS2)
361 sz = cts128_cs2_decrypt(ctx, in, out, inl);
362 else if (ctx->cts_mode == CTS_CS3)
363 sz = cts128_cs3_decrypt(ctx, in, out, inl);
364 }
365 if (sz == 0)
366 return 0;
367 ctx->updated = 1; /* Stop multiple updates being allowed */
368 *outl = sz;
369 return 1;
370 }
371
ossl_cipher_cbc_cts_block_final(void * vctx,unsigned char * out,size_t * outl,size_t outsize)372 int ossl_cipher_cbc_cts_block_final(void *vctx, unsigned char *out, size_t *outl,
373 size_t outsize)
374 {
375 *outl = 0;
376 return 1;
377 }
378