AES.hpp 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597
  1. /*
  2. * Copyright (c)2013-2020 ZeroTier, Inc.
  3. *
  4. * Use of this software is governed by the Business Source License included
  5. * in the LICENSE.TXT file in the project's root directory.
  6. *
  7. * Change Date: 2025-01-01
  8. *
  9. * On the date above, in accordance with the Business Source License, use
  10. * of this software will be governed by version 2.0 of the Apache License.
  11. */
  12. /****/
  13. #ifndef ZT_AES_HPP
  14. #define ZT_AES_HPP
  15. #include "Constants.hpp"
  16. #include "Utils.hpp"
  17. #include "SHA512.hpp"
  18. // Uncomment to disable all hardware acceleration (usually for testing)
  19. //#define ZT_AES_NO_ACCEL
  20. #if !defined(ZT_AES_NO_ACCEL) && defined(ZT_ARCH_X64)
  21. #define ZT_AES_AESNI 1
  22. #endif
  23. #if !defined(ZT_AES_NO_ACCEL) && defined(ZT_ARCH_ARM_HAS_NEON) && defined(ZT_ARCH_ARM_HAS_CRYPTO)
  24. #define ZT_AES_NEON 1
  25. #endif
  26. #ifndef ZT_INLINE
  27. #define ZT_INLINE inline
  28. #endif
  29. namespace ZeroTier {
  30. /**
  31. * AES-256 and pals including GMAC, CTR, etc.
  32. *
  33. * This includes hardware acceleration for certain processors. The software
  34. * mode is fallback and is significantly slower.
  35. */
  36. class AES
  37. {
  38. public:
  39. /**
  40. * @return True if this system has hardware AES acceleration
  41. */
  42. static ZT_INLINE bool accelerated()
  43. {
  44. #ifdef ZT_AES_AESNI
  45. return Utils::CPUID.aes;
  46. #else
  47. #ifdef ZT_AES_NEON
  48. return Utils::ARMCAP.aes;
  49. #else
  50. return false;
  51. #endif
  52. #endif
  53. }
  54. /**
  55. * Create an un-initialized AES instance (must call init() before use)
  56. */
  57. ZT_INLINE AES() noexcept
  58. {}
  59. /**
  60. * Create an AES instance with the given key
  61. *
  62. * @param key 256-bit key
  63. */
  64. explicit ZT_INLINE AES(const void *const key) noexcept
  65. { this->init(key); }
  66. ZT_INLINE ~AES()
  67. { Utils::burn(&p_k, sizeof(p_k)); }
  68. /**
  69. * Set (or re-set) this AES256 cipher's key
  70. *
  71. * @param key 256-bit / 32-byte key
  72. */
  73. ZT_INLINE void init(const void *const key) noexcept
  74. {
  75. #ifdef ZT_AES_AESNI
  76. if (likely(Utils::CPUID.aes)) {
  77. p_init_aesni(reinterpret_cast<const uint8_t *>(key));
  78. return;
  79. }
  80. #endif
  81. #ifdef ZT_AES_NEON
  82. if (Utils::ARMCAP.aes) {
  83. p_init_armneon_crypto(reinterpret_cast<const uint8_t *>(key));
  84. return;
  85. }
  86. #endif
  87. p_initSW(reinterpret_cast<const uint8_t *>(key));
  88. }
  89. /**
  90. * Encrypt a single AES block
  91. *
  92. * @param in Input block
  93. * @param out Output block (can be same as input)
  94. */
  95. ZT_INLINE void encrypt(const void *const in, void *const out) const noexcept
  96. {
  97. #ifdef ZT_AES_AESNI
  98. if (likely(Utils::CPUID.aes)) {
  99. p_encrypt_aesni(in, out);
  100. return;
  101. }
  102. #endif
  103. #ifdef ZT_AES_NEON
  104. if (Utils::ARMCAP.aes) {
  105. p_encrypt_armneon_crypto(in, out);
  106. return;
  107. }
  108. #endif
  109. p_encryptSW(reinterpret_cast<const uint8_t *>(in), reinterpret_cast<uint8_t *>(out));
  110. }
  111. /**
  112. * Decrypt a single AES block
  113. *
  114. * @param in Input block
  115. * @param out Output block (can be same as input)
  116. */
  117. ZT_INLINE void decrypt(const void *const in, void *const out) const noexcept
  118. {
  119. #ifdef ZT_AES_AESNI
  120. if (likely(Utils::CPUID.aes)) {
  121. p_decrypt_aesni(in, out);
  122. return;
  123. }
  124. #endif
  125. #ifdef ZT_AES_NEON
  126. if (Utils::ARMCAP.aes) {
  127. p_decrypt_armneon_crypto(in, out);
  128. return;
  129. }
  130. #endif
  131. p_decryptSW(reinterpret_cast<const uint8_t *>(in), reinterpret_cast<uint8_t *>(out));
  132. }
  133. class GMACSIVEncryptor;
  134. class GMACSIVDecryptor;
  135. /**
  136. * Streaming GMAC calculator
  137. */
  138. class GMAC
  139. {
  140. friend class GMACSIVEncryptor;
  141. friend class GMACSIVDecryptor;
  142. public:
  143. /**
  144. * @return True if this system has hardware GMAC acceleration
  145. */
  146. static ZT_INLINE bool accelerated()
  147. {
  148. #ifdef ZT_AES_AESNI
  149. return Utils::CPUID.aes;
  150. #else
  151. #ifdef ZT_AES_NEON
  152. return Utils::ARMCAP.pmull;
  153. #else
  154. return false;
  155. #endif
  156. #endif
  157. }
  158. /**
  159. * Create a new instance of GMAC (must be initialized with init() before use)
  160. *
  161. * @param aes Keyed AES instance to use
  162. */
  163. ZT_INLINE GMAC(const AES &aes) : _aes(aes)
  164. {}
  165. /**
  166. * Reset and initialize for a new GMAC calculation
  167. *
  168. * @param iv 96-bit initialization vector (pad with zeroes if actual IV is shorter)
  169. */
  170. ZT_INLINE void init(const uint8_t iv[12]) noexcept
  171. {
  172. _rp = 0;
  173. _len = 0;
  174. // We fill the least significant 32 bits in the _iv field with 1 since in GCM mode
  175. // this would hold the counter, but we're not doing GCM. The counter is therefore
  176. // always 1.
  177. #ifdef ZT_AES_AESNI // also implies an x64 processor
  178. *reinterpret_cast<uint64_t *>(_iv) = *reinterpret_cast<const uint64_t *>(iv);
  179. *reinterpret_cast<uint32_t *>(_iv + 8) = *reinterpret_cast<const uint64_t *>(iv + 8);
  180. *reinterpret_cast<uint32_t *>(_iv + 12) = 0x01000000; // 0x00000001 in big-endian byte order
  181. #else
  182. for(int i=0;i<12;++i) {
  183. _iv[i] = iv[i];
  184. }
  185. _iv[12] = 0;
  186. _iv[13] = 0;
  187. _iv[14] = 0;
  188. _iv[15] = 1;
  189. #endif
  190. _y[0] = 0;
  191. _y[1] = 0;
  192. }
  193. /**
  194. * Process data through GMAC
  195. *
  196. * @param data Bytes to process
  197. * @param len Length of input
  198. */
  199. void update(const void *data, unsigned int len) noexcept;
  200. /**
  201. * Process any remaining cached bytes and generate tag
  202. *
  203. * Don't call finish() more than once or you'll get an invalid result.
  204. *
  205. * @param tag 128-bit GMAC tag (can be truncated)
  206. */
  207. void finish(uint8_t tag[16]) noexcept;
  208. private:
  209. #ifdef ZT_AES_AESNI
  210. void p_aesNIUpdate(const uint8_t *in, unsigned int len) noexcept;
  211. void p_aesNIFinish(uint8_t tag[16]) noexcept;
  212. #endif
  213. #ifdef ZT_AES_NEON
  214. void p_armUpdate(const uint8_t *in, unsigned int len) noexcept;
  215. void p_armFinish(uint8_t tag[16]) noexcept;
  216. #endif
  217. const AES &_aes;
  218. unsigned int _rp;
  219. unsigned int _len;
  220. uint8_t _r[16]; // remainder
  221. uint8_t _iv[16];
  222. uint64_t _y[2];
  223. };
  224. /**
  225. * Streaming AES-CTR encrypt/decrypt
  226. *
  227. * NOTE: this doesn't support overflow of the counter in the least significant 32 bits.
  228. * AES-GMAC-CTR doesn't need this, so we don't support it as an optimization.
  229. */
  230. class CTR
  231. {
  232. friend class GMACSIVEncryptor;
  233. friend class GMACSIVDecryptor;
  234. public:
  235. ZT_INLINE CTR(const AES &aes) noexcept: _aes(aes)
  236. {}
  237. /**
  238. * Initialize this CTR instance to encrypt a new stream
  239. *
  240. * @param iv Unique initialization vector and initial 32-bit counter (least significant 32 bits, big-endian)
  241. * @param output Buffer to which to store output (MUST be large enough for total bytes processed!)
  242. */
  243. ZT_INLINE void init(const uint8_t iv[16], void *const output) noexcept
  244. {
  245. Utils::copy< 16 >(_ctr, iv);
  246. _out = reinterpret_cast<uint8_t *>(output);
  247. _len = 0;
  248. }
  249. /**
  250. * Initialize this CTR instance to encrypt a new stream
  251. *
  252. * @param iv Unique initialization vector
  253. * @param ic Initial counter (must be in big-endian byte order!)
  254. * @param output Buffer to which to store output (MUST be large enough for total bytes processed!)
  255. */
  256. ZT_INLINE void init(const uint8_t iv[12], const uint32_t ic, void *const output) noexcept
  257. {
  258. Utils::copy< 12 >(_ctr, iv);
  259. reinterpret_cast<uint32_t *>(_ctr)[3] = ic;
  260. _out = reinterpret_cast<uint8_t *>(output);
  261. _len = 0;
  262. }
  263. /**
  264. * Encrypt or decrypt data, writing result to the output provided to init()
  265. *
  266. * @param input Input data
  267. * @param len Length of input
  268. */
  269. void crypt(const void *input, unsigned int len) noexcept;
  270. /**
  271. * Finish any remaining bytes if total bytes processed wasn't a multiple of 16
  272. *
  273. * Don't call more than once for a given stream or data may be corrupted.
  274. */
  275. void finish() noexcept;
  276. private:
  277. #ifdef ZT_AES_AESNI
  278. void p_aesNICrypt(const uint8_t *in, uint8_t *out, unsigned int len) noexcept;
  279. #endif
  280. #ifdef ZT_AES_NEON
  281. void p_armCrypt(const uint8_t *in, uint8_t *out, unsigned int len) noexcept;
  282. #endif
  283. const AES &_aes;
  284. uint64_t _ctr[2];
  285. uint8_t *_out;
  286. unsigned int _len;
  287. };
  288. /**
  289. * Encryptor for AES-GMAC-SIV.
  290. *
  291. * Encryption requires two passes. The first pass starts after init
  292. * with aad (if any) followed by update1() and finish1(). Then the
  293. * update2() and finish2() methods must be used over the same data
  294. * (but NOT AAD) again.
  295. *
  296. * This supports encryption of a maximum of 2^31 bytes of data per
  297. * call to init().
  298. */
  299. class GMACSIVEncryptor
  300. {
  301. public:
  302. /**
  303. * Create a new AES-GMAC-SIV encryptor keyed with the provided AES instances
  304. *
  305. * @param k0 First of two AES instances keyed with K0
  306. * @param k1 Second of two AES instances keyed with K1
  307. */
  308. ZT_INLINE GMACSIVEncryptor(const AES &k0, const AES &k1) noexcept :
  309. _gmac(k0),
  310. _ctr(k1)
  311. {}
  312. /**
  313. * Initialize AES-GMAC-SIV
  314. *
  315. * @param iv IV in network byte order (byte order in which it will appear on the wire)
  316. * @param output Pointer to buffer to receive ciphertext, must be large enough for all to-be-processed data!
  317. */
  318. ZT_INLINE void init(const uint64_t iv, void *const output) noexcept
  319. {
  320. // Output buffer to receive the result of AES-CTR encryption.
  321. _output = output;
  322. // Initialize GMAC with 64-bit IV (and remaining 32 bits padded to zero).
  323. _tag[0] = iv;
  324. _tag[1] = 0;
  325. _gmac.init(reinterpret_cast<const uint8_t *>(_tag));
  326. }
  327. /**
  328. * Process AAD (additional authenticated data) that is not being encrypted.
  329. *
  330. * If such data exists this must be called before update1() and finish1().
  331. *
  332. * Note: current code only supports one single chunk of AAD. Don't call this
  333. * multiple times per message.
  334. *
  335. * @param aad Additional authenticated data
  336. * @param len Length of AAD in bytes
  337. */
  338. ZT_INLINE void aad(const void *const aad, unsigned int len) noexcept
  339. {
  340. // Feed ADD into GMAC first
  341. _gmac.update(aad, len);
  342. // End of AAD is padded to a multiple of 16 bytes to ensure unique encoding.
  343. len &= 0xfU;
  344. if (len != 0) {
  345. _gmac.update(Utils::ZERO256, 16 - len);
  346. }
  347. }
  348. /**
  349. * First pass plaintext input function
  350. *
  351. * @param input Plaintext chunk
  352. * @param len Length of plaintext chunk
  353. */
  354. ZT_INLINE void update1(const void *const input, const unsigned int len) noexcept
  355. { _gmac.update(input, len); }
  356. /**
  357. * Finish first pass, compute CTR IV, initialize second pass.
  358. */
  359. ZT_INLINE void finish1() noexcept
  360. {
  361. // Compute 128-bit GMAC tag.
  362. uint64_t tmp[2];
  363. _gmac.finish(reinterpret_cast<uint8_t *>(tmp));
  364. // Shorten to 64 bits, concatenate with message IV, and encrypt with AES to
  365. // yield the CTR IV and opaque IV/MAC blob. In ZeroTier's use of GMAC-SIV
  366. // this get split into the packet ID (64 bits) and the MAC (64 bits) in each
  367. // packet and then recombined on receipt for legacy reasons (but with no
  368. // cryptographic or performance impact).
  369. _tag[1] = tmp[0] ^ tmp[1];
  370. _ctr._aes.encrypt(_tag, _tag);
  371. // Initialize CTR with 96-bit CTR nonce and 32-bit counter. The counter
  372. // incorporates 31 more bits of entropy which should raise our security margin
  373. // a bit, but this is not included in the worst case analysis of GMAC-SIV.
  374. // The most significant bit of the counter is masked to zero to allow up to
  375. // 2^31 bytes to be encrypted before the counter loops. Some CTR implementations
  376. // increment the whole big-endian 128-bit integer in which case this could be
  377. // used for more than 2^31 bytes, but ours does not for performance reasons
  378. // and so 2^31 should be considered the input limit.
  379. tmp[0] = _tag[0];
  380. tmp[1] = _tag[1] & ZT_CONST_TO_BE_UINT64(0xffffffff7fffffffULL);
  381. _ctr.init(reinterpret_cast<const uint8_t *>(tmp), _output);
  382. }
  383. /**
  384. * Second pass plaintext input function
  385. *
  386. * The same plaintext must be fed in the second time in the same order,
  387. * though chunk boundaries do not have to be the same.
  388. *
  389. * @param input Plaintext chunk
  390. * @param len Length of plaintext chunk
  391. */
  392. ZT_INLINE void update2(const void *const input, const unsigned int len) noexcept
  393. { _ctr.crypt(input, len); }
  394. /**
  395. * Finish second pass and return a pointer to the opaque 128-bit IV+MAC block
  396. *
  397. * The returned pointer remains valid as long as this object exists and init()
  398. * is not called again.
  399. *
  400. * @return Pointer to 128-bit opaque IV+MAC (packed into two 64-bit integers)
  401. */
  402. ZT_INLINE const uint64_t *finish2()
  403. {
  404. _ctr.finish();
  405. return _tag;
  406. }
  407. private:
  408. void *_output;
  409. uint64_t _tag[2];
  410. AES::GMAC _gmac;
  411. AES::CTR _ctr;
  412. };
  413. /**
  414. * Decryptor for AES-GMAC-SIV.
  415. *
  416. * GMAC-SIV decryption is single-pass. AAD (if any) must be processed first.
  417. */
  418. class GMACSIVDecryptor
  419. {
  420. public:
  421. ZT_INLINE GMACSIVDecryptor(const AES &k0, const AES &k1) noexcept:
  422. _ctr(k1),
  423. _gmac(k0)
  424. {}
  425. /**
  426. * Initialize decryptor for a new message
  427. *
  428. * @param tag 128-bit combined IV/MAC originally created by GMAC-SIV encryption
  429. * @param output Buffer in which to write output plaintext (must be large enough!)
  430. */
  431. ZT_INLINE void init(const uint64_t tag[2], void *const output) noexcept
  432. {
  433. uint64_t tmp[2];
  434. tmp[0] = tag[0];
  435. tmp[1] = tag[1] & ZT_CONST_TO_BE_UINT64(0xffffffff7fffffffULL);
  436. _ctr.init(reinterpret_cast<const uint8_t *>(tmp), output);
  437. _ctr._aes.decrypt(tag, _ivMac);
  438. tmp[0] = _ivMac[0];
  439. tmp[1] = 0;
  440. _gmac.init(reinterpret_cast<const uint8_t *>(tmp));
  441. _output = output;
  442. _decryptedLen = 0;
  443. }
  444. /**
  445. * Process AAD (additional authenticated data) that wasn't encrypted
  446. *
  447. * @param aad Additional authenticated data
  448. * @param len Length of AAD in bytes
  449. */
  450. ZT_INLINE void aad(const void *const aad, unsigned int len) noexcept
  451. {
  452. _gmac.update(aad, len);
  453. len &= 0xfU;
  454. if (len != 0) {
  455. _gmac.update(Utils::ZERO256, 16 - len);
  456. }
  457. }
  458. /**
  459. * Feed ciphertext into the decryptor
  460. *
  461. * Unlike encryption, GMAC-SIV decryption requires only one pass.
  462. *
  463. * @param input Input ciphertext
  464. * @param len Length of ciphertext
  465. */
  466. ZT_INLINE void update(const void *const input, const unsigned int len) noexcept
  467. {
  468. _ctr.crypt(input, len);
  469. _decryptedLen += len;
  470. }
  471. /**
  472. * Flush decryption, compute MAC, and verify
  473. *
  474. * @return True if resulting plaintext (and AAD) pass message authentication check
  475. */
  476. ZT_INLINE bool finish() noexcept
  477. {
  478. _ctr.finish();
  479. uint64_t gmacTag[2];
  480. _gmac.update(_output, _decryptedLen);
  481. _gmac.finish(reinterpret_cast<uint8_t *>(gmacTag));
  482. return (gmacTag[0] ^ gmacTag[1]) == _ivMac[1];
  483. }
  484. private:
  485. uint64_t _ivMac[2];
  486. AES::CTR _ctr;
  487. AES::GMAC _gmac;
  488. void *_output;
  489. unsigned int _decryptedLen;
  490. };
  491. private:
  492. static const uint32_t Te0[256];
  493. static const uint32_t Te4[256];
  494. static const uint32_t Td0[256];
  495. static const uint8_t Td4[256];
  496. static const uint32_t rcon[15];
  497. void p_initSW(const uint8_t *key) noexcept;
  498. void p_encryptSW(const uint8_t *in, uint8_t *out) const noexcept;
  499. void p_decryptSW(const uint8_t *in, uint8_t *out) const noexcept;
  500. union
  501. {
  502. #ifdef ZT_AES_AESNI
  503. struct
  504. {
  505. __m128i k[28];
  506. __m128i h[4]; // h, hh, hhh, hhhh
  507. __m128i h2[4]; // _mm_xor_si128(_mm_shuffle_epi32(h, 78), h), etc.
  508. } ni;
  509. #endif
  510. #ifdef ZT_AES_NEON
  511. struct
  512. {
  513. uint64_t hsw[2]; // in case it has AES but not PMULL, not sure if that ever happens
  514. uint8x16_t ek[15];
  515. uint8x16_t dk[15];
  516. uint8x16_t h;
  517. } neon;
  518. #endif
  519. struct
  520. {
  521. uint64_t h[2];
  522. uint32_t ek[60];
  523. uint32_t dk[60];
  524. } sw;
  525. } p_k;
  526. #ifdef ZT_AES_AESNI
  527. void p_init_aesni(const uint8_t *key) noexcept;
  528. void p_encrypt_aesni(const void *in, void *out) const noexcept;
  529. void p_decrypt_aesni(const void *in, void *out) const noexcept;
  530. #endif
  531. #ifdef ZT_AES_NEON
  532. void p_init_armneon_crypto(const uint8_t *key) noexcept;
  533. void p_encrypt_armneon_crypto(const void *in, void *out) const noexcept;
  534. void p_decrypt_armneon_crypto(const void *in, void *out) const noexcept;
  535. #endif
  536. };
  537. } // namespace ZeroTier
  538. #endif