org.bouncycastle.tls.crypto.impl.jcajce.JceChaCha20Poly1305 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bctls-lts8on Show documentation
Show all versions of bctls-lts8on Show documentation
The Bouncy Castle Java APIs for the TLS, including a JSSE provider. The APIs are designed primarily to be used in conjunction with the BC LTS provider but may also be used with other providers providing cryptographic services.
package org.bouncycastle.tls.crypto.impl.jcajce;
import java.io.IOException;
import java.security.GeneralSecurityException;
import java.security.InvalidKeyException;
import java.security.SecureRandom;
import javax.crypto.Cipher;
import javax.crypto.Mac;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import org.bouncycastle.jcajce.util.JcaJceHelper;
import org.bouncycastle.tls.AlertDescription;
import org.bouncycastle.tls.TlsFatalAlert;
import org.bouncycastle.tls.TlsUtils;
import org.bouncycastle.tls.crypto.impl.TlsAEADCipherImpl;
import org.bouncycastle.util.Arrays;
import org.bouncycastle.util.Pack;
public class JceChaCha20Poly1305 implements TlsAEADCipherImpl
{
private static final byte[] ZEROES = new byte[15];
protected final JcaTlsCrypto crypto;
protected final Cipher cipher;
protected final Mac mac;
protected final int cipherMode;
protected SecretKey cipherKey;
public JceChaCha20Poly1305(JcaTlsCrypto crypto, JcaJceHelper helper, boolean isEncrypting)
throws GeneralSecurityException
{
this.crypto = crypto;
this.cipher = helper.createCipher("ChaCha7539");
this.mac = helper.createMac("Poly1305");
this.cipherMode = isEncrypting ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE;
}
public int doFinal(byte[] additionalData, byte[] input, int inputOffset, int inputLength, byte[] output,
int outputOffset)
throws IOException
{
/*
* NOTE: When using the Cipher class, output may be buffered prior to calling doFinal, so
* getting the MAC key from the first block of cipher output reliably is awkward. We are
* forced to use a temp buffer and extra copies to make it work. In the case of decryption
* it has the additional downside that full decryption is performed before we are able to
* check the MAC.
*/
try
{
if (cipherMode == Cipher.ENCRYPT_MODE)
{
int ciphertextLength = inputLength;
byte[] tmp = new byte[64 + ciphertextLength];
System.arraycopy(input, inputOffset, tmp, 64, inputLength);
runCipher(tmp);
System.arraycopy(tmp, 64, output, outputOffset, ciphertextLength);
initMAC(tmp);
int additionalDataLength = 0;
if (!Arrays.isNullOrEmpty(additionalData))
{
additionalDataLength = additionalData.length;
updateMAC(additionalData, 0, additionalData.length);
}
updateMAC(tmp, 64, ciphertextLength);
byte[] lengths = new byte[16];
Pack.longToLittleEndian(additionalDataLength & 0xFFFFFFFFL, lengths, 0);
Pack.longToLittleEndian(ciphertextLength & 0xFFFFFFFFL, lengths, 8);
mac.update(lengths, 0, 16);
mac.doFinal(output, outputOffset + ciphertextLength);
return ciphertextLength + 16;
}
else
{
int ciphertextLength = inputLength - 16;
byte[] tmp = new byte[64 + ciphertextLength];
System.arraycopy(input, inputOffset, tmp, 64, ciphertextLength);
runCipher(tmp);
initMAC(tmp);
int additionalDataLength = 0;
if (!Arrays.isNullOrEmpty(additionalData))
{
additionalDataLength = additionalData.length;
updateMAC(additionalData, 0, additionalData.length);
}
updateMAC(input, inputOffset, ciphertextLength);
byte[] expectedMac = new byte[16];
Pack.longToLittleEndian(additionalDataLength & 0xFFFFFFFFL, expectedMac, 0);
Pack.longToLittleEndian(ciphertextLength & 0xFFFFFFFFL, expectedMac, 8);
mac.update(expectedMac, 0, 16);
mac.doFinal(expectedMac, 0);
boolean badMac = !TlsUtils.constantTimeAreEqual(16, expectedMac, 0, input,
inputOffset + ciphertextLength);
if (badMac)
{
throw new TlsFatalAlert(AlertDescription.bad_record_mac);
}
System.arraycopy(tmp, 64, output, outputOffset, ciphertextLength);
return ciphertextLength;
}
}
catch (GeneralSecurityException e)
{
throw new RuntimeException(e);
}
}
public int getOutputSize(int inputLength)
{
return cipherMode == Cipher.ENCRYPT_MODE ? inputLength + 16 : inputLength - 16;
}
public void init(byte[] nonce, int macSize) throws IOException
{
if (nonce == null || nonce.length != 12 || macSize != 16)
{
throw new TlsFatalAlert(AlertDescription.internal_error);
}
// NOTE: Shouldn't need a SecureRandom, but this is cheaper if the provider would auto-create one
SecureRandom random = crypto.getSecureRandom();
try
{
cipher.init(cipherMode, cipherKey, new IvParameterSpec(nonce), random);
}
catch (GeneralSecurityException e)
{
throw new RuntimeException(e);
}
}
public void setKey(byte[] key, int keyOff, int keyLen) throws IOException
{
this.cipherKey = new SecretKeySpec(key, keyOff, keyLen, "ChaCha7539");
}
protected void initMAC(byte[] firstBlock) throws InvalidKeyException
{
mac.init(new SecretKeySpec(firstBlock, 0, 32, "Poly1305"));
for (int i = 0; i < 64; ++i)
{
firstBlock[i] = 0;
}
}
protected void runCipher(byte[] buf) throws GeneralSecurityException
{
if (buf.length != cipher.doFinal(buf, 0, buf.length, buf, 0))
{
throw new IllegalStateException();
}
}
protected void updateMAC(byte[] buf, int off, int len)
{
mac.update(buf, off, len);
int partial = len % 16;
if (partial != 0)
{
mac.update(ZEROES, 0, 16 - partial);
}
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy