AES.hpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546
  1. /*
  2. * Copyright (c)2013-2020 ZeroTier, Inc.
  3. *
  4. * Use of this software is governed by the Business Source License included
  5. * in the LICENSE.TXT file in the project's root directory.
  6. *
  7. * Change Date: 2024-01-01
  8. *
  9. * On the date above, in accordance with the Business Source License, use
  10. * of this software will be governed by version 2.0 of the Apache License.
  11. */
  12. /****/
  13. #ifndef ZT_AES_HPP
  14. #define ZT_AES_HPP
  15. #include "Constants.hpp"
  16. #include "Utils.hpp"
  17. #include "SHA512.hpp"
  18. #if !defined(ZT_AES_NO_ACCEL) && defined(ZT_ARCH_X64)
  19. #define ZT_AES_AESNI 1
  20. #endif
  21. namespace ZeroTier {
  22. /**
  23. * AES-256 and pals including GMAC, CTR, etc.
  24. *
  25. * This includes hardware acceleration for certain processors. The software
  26. * mode is fallback and is significantly slower.
  27. */
  28. class AES
  29. {
  30. public:
  31. /**
  32. * @return True if this system has hardware AES acceleration
  33. */
  34. static ZT_INLINE bool accelerated()
  35. {
  36. #ifdef ZT_AES_AESNI
  37. return Utils::CPUID.aes;
  38. #else
  39. return false;
  40. #endif
  41. }
  42. /**
  43. * Create an un-initialized AES instance (must call init() before use)
  44. */
  45. ZT_INLINE AES() noexcept
  46. {}
  47. /**
  48. * Create an AES instance with the given key
  49. *
  50. * @param key 256-bit key
  51. */
  52. explicit ZT_INLINE AES(const void *const key) noexcept
  53. { this->init(key); }
  54. ZT_INLINE ~AES()
  55. { Utils::burn(&_k, sizeof(_k)); }
  56. /**
  57. * Set (or re-set) this AES256 cipher's key
  58. *
  59. * @param key 256-bit / 32-byte key
  60. */
  61. ZT_INLINE void init(const void *const key) noexcept
  62. {
  63. #ifdef ZT_AES_AESNI
  64. if (likely(Utils::CPUID.aes)) {
  65. _init_aesni(reinterpret_cast<const uint8_t *>(key));
  66. return;
  67. }
  68. #endif
  69. _initSW(reinterpret_cast<const uint8_t *>(key));
  70. }
  71. /**
  72. * Encrypt a single AES block
  73. *
  74. * @param in Input block
  75. * @param out Output block (can be same as input)
  76. */
  77. ZT_INLINE void encrypt(const void *const in, void *const out) const noexcept
  78. {
  79. #ifdef ZT_AES_AESNI
  80. if (likely(Utils::CPUID.aes)) {
  81. _encrypt_aesni(in, out);
  82. return;
  83. }
  84. #endif
  85. #ifdef ZT_ARCH_ARM_HAS_NEON
  86. if (true) {
  87. _encrypt_armneon_crypto(in, out);
  88. return;
  89. }
  90. #endif
  91. _encryptSW(reinterpret_cast<const uint8_t *>(in), reinterpret_cast<uint8_t *>(out));
  92. }
  93. /**
  94. * Decrypt a single AES block
  95. *
  96. * @param in Input block
  97. * @param out Output block (can be same as input)
  98. */
  99. ZT_INLINE void decrypt(const void *const in, void *const out) const noexcept
  100. {
  101. #ifdef ZT_AES_AESNI
  102. if (likely(Utils::CPUID.aes)) {
  103. _decrypt_aesni(in, out);
  104. return;
  105. }
  106. #endif
  107. #ifdef ZT_ARCH_ARM_HAS_NEON
  108. if (true) {
  109. _decrypt_armneon_crypto(in, out);
  110. return;
  111. }
  112. #endif
  113. _decryptSW(reinterpret_cast<const uint8_t *>(in), reinterpret_cast<uint8_t *>(out));
  114. }
  115. class GMACSIVEncryptor;
  116. class GMACSIVDecryptor;
  117. /**
  118. * Streaming GMAC calculator
  119. */
  120. class GMAC
  121. {
  122. friend class GMACSIVEncryptor;
  123. friend class GMACSIVDecryptor;
  124. public:
  125. /**
  126. * Create a new instance of GMAC (must be initialized with init() before use)
  127. *
  128. * @param aes Keyed AES instance to use
  129. */
  130. ZT_INLINE GMAC(const AES &aes) : _aes(aes)
  131. {}
  132. /**
  133. * Reset and initialize for a new GMAC calculation
  134. *
  135. * @param iv 96-bit initialization vector (pad with zeroes if actual IV is shorter)
  136. */
  137. ZT_INLINE void init(const uint8_t iv[12]) noexcept
  138. {
  139. _rp = 0;
  140. _len = 0;
  141. // We fill the least significant 32 bits in the _iv field with 1 since in GCM mode
  142. // this would hold the counter, but we're not doing GCM. The counter is therefore
  143. // always 1.
  144. #ifdef ZT_AES_AESNI // also implies an x64 processor
  145. *reinterpret_cast<uint64_t *>(_iv) = *reinterpret_cast<const uint64_t *>(iv);
  146. *reinterpret_cast<uint32_t *>(_iv + 8) = *reinterpret_cast<const uint64_t *>(iv + 8);
  147. *reinterpret_cast<uint32_t *>(_iv + 12) = 0x01000000; // 0x00000001 in big-endian byte order
  148. #else
  149. for(int i=0;i<12;++i)
  150. _iv[i] = iv[i];
  151. _iv[12] = 0;
  152. _iv[13] = 0;
  153. _iv[14] = 0;
  154. _iv[15] = 1;
  155. #endif
  156. _y[0] = 0;
  157. _y[1] = 0;
  158. }
  159. /**
  160. * Process data through GMAC
  161. *
  162. * @param data Bytes to process
  163. * @param len Length of input
  164. */
  165. void update(const void *data, unsigned int len) noexcept;
  166. /**
  167. * Process any remaining cached bytes and generate tag
  168. *
  169. * Don't call finish() more than once or you'll get an invalid result.
  170. *
  171. * @param tag 128-bit GMAC tag (can be truncated)
  172. */
  173. void finish(uint8_t tag[16]) noexcept;
  174. private:
  175. const AES &_aes;
  176. unsigned int _rp;
  177. unsigned int _len;
  178. uint8_t _r[16]; // remainder
  179. uint8_t _iv[16];
  180. uint64_t _y[2];
  181. };
  182. /**
  183. * Streaming AES-CTR encrypt/decrypt
  184. *
  185. * NOTE: this doesn't support overflow of the counter in the least significant 32 bits.
  186. * AES-GMAC-CTR doesn't need this, so we don't support it as an optimization.
  187. */
  188. class CTR
  189. {
  190. friend class GMACSIVEncryptor;
  191. friend class GMACSIVDecryptor;
  192. public:
  193. ZT_INLINE CTR(const AES &aes) noexcept: _aes(aes)
  194. {}
  195. /**
  196. * Initialize this CTR instance to encrypt a new stream
  197. *
  198. * @param iv Unique initialization vector and initial 32-bit counter (least significant 32 bits, big-endian)
  199. * @param output Buffer to which to store output (MUST be large enough for total bytes processed!)
  200. */
  201. ZT_INLINE void init(const uint8_t iv[16], void *const output) noexcept
  202. {
  203. Utils::copy< 16 >(_ctr, iv);
  204. _out = reinterpret_cast<uint8_t *>(output);
  205. _len = 0;
  206. }
  207. /**
  208. * Initialize this CTR instance to encrypt a new stream
  209. *
  210. * @param iv Unique initialization vector
  211. * @param ic Initial counter (must be in big-endian byte order!)
  212. * @param output Buffer to which to store output (MUST be large enough for total bytes processed!)
  213. */
  214. ZT_INLINE void init(const uint8_t iv[12], const uint32_t ic, void *const output) noexcept
  215. {
  216. Utils::copy< 12 >(_ctr, iv);
  217. reinterpret_cast<uint32_t *>(_ctr)[3] = ic;
  218. _out = reinterpret_cast<uint8_t *>(output);
  219. _len = 0;
  220. }
  221. /**
  222. * Encrypt or decrypt data, writing result to the output provided to init()
  223. *
  224. * @param input Input data
  225. * @param len Length of input
  226. */
  227. void crypt(const void *input, unsigned int len) noexcept;
  228. /**
  229. * Finish any remaining bytes if total bytes processed wasn't a multiple of 16
  230. *
  231. * Don't call more than once for a given stream or data may be corrupted.
  232. */
  233. void finish() noexcept;
  234. private:
  235. const AES &_aes;
  236. uint64_t _ctr[2];
  237. uint8_t *_out;
  238. unsigned int _len;
  239. };
  240. /**
  241. * Encryptor for AES-GMAC-SIV.
  242. *
  243. * Encryption requires two passes. The first pass starts after init
  244. * with aad (if any) followed by update1() and finish1(). Then the
  245. * update2() and finish2() methods must be used over the same data
  246. * (but NOT AAD) again.
  247. *
  248. * This supports encryption of a maximum of 2^31 bytes of data per
  249. * call to init().
  250. */
  251. class GMACSIVEncryptor
  252. {
  253. public:
  254. /**
  255. * Create a new AES-GMAC-SIV encryptor keyed with the provided AES instances
  256. *
  257. * @param k0 First of two AES instances keyed with K0
  258. * @param k1 Second of two AES instances keyed with K1
  259. */
  260. ZT_INLINE GMACSIVEncryptor(const AES &k0, const AES &k1) noexcept:
  261. _gmac(k0),
  262. _ctr(k1)
  263. {}
  264. /**
  265. * Initialize AES-GMAC-SIV
  266. *
  267. * @param iv IV in network byte order (byte order in which it will appear on the wire)
  268. * @param output Pointer to buffer to receive ciphertext, must be large enough for all to-be-processed data!
  269. */
  270. ZT_INLINE void init(const uint64_t iv, void *const output) noexcept
  271. {
  272. // Output buffer to receive the result of AES-CTR encryption.
  273. _output = output;
  274. // Initialize GMAC with 64-bit IV (and remaining 32 bits padded to zero).
  275. _tag[0] = iv;
  276. _tag[1] = 0;
  277. _gmac.init(reinterpret_cast<const uint8_t *>(_tag));
  278. }
  279. /**
  280. * Process AAD (additional authenticated data) that is not being encrypted.
  281. *
  282. * If such data exists this must be called before update1() and finish1().
  283. *
  284. * Note: current code only supports one single chunk of AAD. Don't call this
  285. * multiple times per message.
  286. *
  287. * @param aad Additional authenticated data
  288. * @param len Length of AAD in bytes
  289. */
  290. ZT_INLINE void aad(const void *const aad, unsigned int len) noexcept
  291. {
  292. // Feed ADD into GMAC first
  293. _gmac.update(aad, len);
  294. // End of AAD is padded to a multiple of 16 bytes to ensure unique encoding.
  295. len &= 0xfU;
  296. if (len != 0)
  297. _gmac.update(Utils::ZERO256, 16 - len);
  298. }
  299. /**
  300. * First pass plaintext input function
  301. *
  302. * @param input Plaintext chunk
  303. * @param len Length of plaintext chunk
  304. */
  305. ZT_INLINE void update1(const void *const input, const unsigned int len) noexcept
  306. { _gmac.update(input, len); }
  307. /**
  308. * Finish first pass, compute CTR IV, initialize second pass.
  309. */
  310. ZT_INLINE void finish1() noexcept
  311. {
  312. uint64_t tmp[2];
  313. // Compute 128-bit GMAC tag.
  314. _gmac.finish(reinterpret_cast<uint8_t *>(tmp));
  315. // Shorten to 64 bits, concatenate with message IV, and encrypt with AES to
  316. // yield the CTR IV and opaque IV/MAC blob. In ZeroTier's use of GMAC-SIV
  317. // this get split into the packet ID (64 bits) and the MAC (64 bits) in each
  318. // packet and then recombined on receipt for legacy reasons (but with no
  319. // cryptographic or performance impact).
  320. _tag[1] = tmp[0] ^ tmp[1];
  321. _ctr._aes.encrypt(_tag, _tag);
  322. // Initialize CTR with 96-bit CTR nonce and 32-bit counter. The counter
  323. // incorporates 31 more bits of entropy which should raise our security margin
  324. // a bit, but this is not included in the worst case analysis of GMAC-SIV.
  325. // The most significant bit of the counter is masked to zero to allow up to
  326. // 2^31 bytes to be encrypted before the counter loops. Some CTR implementations
  327. // increment the whole big-endian 128-bit integer in which case this could be
  328. // used for more than 2^31 bytes, but ours does not for performance reasons
  329. // and so 2^31 should be considered the input limit.
  330. tmp[0] = _tag[0];
  331. tmp[1] = _tag[1] & ZT_CONST_TO_BE_UINT64(0xffffffff7fffffffULL);
  332. _ctr.init(reinterpret_cast<const uint8_t *>(tmp), _output);
  333. }
  334. /**
  335. * Second pass plaintext input function
  336. *
  337. * The same plaintext must be fed in the second time in the same order,
  338. * though chunk boundaries do not have to be the same.
  339. *
  340. * @param input Plaintext chunk
  341. * @param len Length of plaintext chunk
  342. */
  343. ZT_INLINE void update2(const void *const input, const unsigned int len) noexcept
  344. { _ctr.crypt(input, len); }
  345. /**
  346. * Finish second pass and return a pointer to the opaque 128-bit IV+MAC block
  347. *
  348. * The returned pointer remains valid as long as this object exists and init()
  349. * is not called again.
  350. *
  351. * @return Pointer to 128-bit opaque IV+MAC (packed into two 64-bit integers)
  352. */
  353. ZT_INLINE const uint64_t *finish2()
  354. {
  355. _ctr.finish();
  356. return _tag;
  357. }
  358. private:
  359. void *_output;
  360. uint64_t _tag[2];
  361. AES::GMAC _gmac;
  362. AES::CTR _ctr;
  363. };
  364. /**
  365. * Decryptor for AES-GMAC-SIV.
  366. *
  367. * GMAC-SIV decryption is single-pass. AAD (if any) must be processed first.
  368. */
  369. class GMACSIVDecryptor
  370. {
  371. public:
  372. ZT_INLINE GMACSIVDecryptor(const AES &k0, const AES &k1) noexcept:
  373. _ctr(k1),
  374. _gmac(k0)
  375. {}
  376. /**
  377. * Initialize decryptor for a new message
  378. *
  379. * @param tag 128-bit combined IV/MAC originally created by GMAC-SIV encryption
  380. * @param output Buffer in which to write output plaintext (must be large enough!)
  381. */
  382. ZT_INLINE void init(const uint64_t tag[2], void *const output) noexcept
  383. {
  384. uint64_t tmp[2];
  385. tmp[0] = tag[0];
  386. tmp[1] = tag[1] & ZT_CONST_TO_BE_UINT64(0xffffffff7fffffffULL);
  387. _ctr.init(reinterpret_cast<const uint8_t *>(tmp), output);
  388. _ctr._aes.decrypt(tag, _ivMac);
  389. tmp[0] = _ivMac[0];
  390. tmp[1] = 0;
  391. _gmac.init(reinterpret_cast<const uint8_t *>(tmp));
  392. _output = output;
  393. _decryptedLen = 0;
  394. }
  395. /**
  396. * Process AAD (additional authenticated data) that wasn't encrypted
  397. *
  398. * @param aad Additional authenticated data
  399. * @param len Length of AAD in bytes
  400. */
  401. ZT_INLINE void aad(const void *const aad, unsigned int len) noexcept
  402. {
  403. _gmac.update(aad, len);
  404. len &= 0xfU;
  405. if (len != 0)
  406. _gmac.update(Utils::ZERO256, 16 - len);
  407. }
  408. /**
  409. * Feed ciphertext into the decryptor
  410. *
  411. * Unlike encryption, GMAC-SIV decryption requires only one pass.
  412. *
  413. * @param input Input ciphertext
  414. * @param len Length of ciphertext
  415. */
  416. ZT_INLINE void update(const void *const input, const unsigned int len) noexcept
  417. {
  418. _ctr.crypt(input, len);
  419. _decryptedLen += len;
  420. }
  421. /**
  422. * Flush decryption, compute MAC, and verify
  423. *
  424. * @return True if resulting plaintext (and AAD) pass message authentication check
  425. */
  426. ZT_INLINE bool finish() noexcept
  427. {
  428. _ctr.finish();
  429. uint64_t gmacTag[2];
  430. _gmac.update(_output, _decryptedLen);
  431. _gmac.finish(reinterpret_cast<uint8_t *>(gmacTag));
  432. return (gmacTag[0] ^ gmacTag[1]) == _ivMac[1];
  433. }
  434. private:
  435. uint64_t _ivMac[2];
  436. AES::CTR _ctr;
  437. AES::GMAC _gmac;
  438. void *_output;
  439. unsigned int _decryptedLen;
  440. };
  441. private:
  442. static const uint32_t Te0[256];
  443. static const uint32_t Te1[256];
  444. static const uint32_t Te2[256];
  445. static const uint32_t Te3[256];
  446. static const uint32_t Te4[256];
  447. static const uint32_t Td0[256];
  448. static const uint32_t Td1[256];
  449. static const uint32_t Td2[256];
  450. static const uint32_t Td3[256];
  451. static const uint8_t Td4[256];
  452. static const uint32_t rcon[10];
  453. void _initSW(const uint8_t key[32]) noexcept;
  454. void _encryptSW(const uint8_t in[16], uint8_t out[16]) const noexcept;
  455. void _decryptSW(const uint8_t in[16], uint8_t out[16]) const noexcept;
  456. union
  457. {
  458. #ifdef ZT_AES_AESNI
  459. struct
  460. {
  461. __m128i k[28];
  462. __m128i h[4]; // h, hh, hhh, hhhh
  463. __m128i h2[4]; // _mm_xor_si128(_mm_shuffle_epi32(h, 78), h), etc.
  464. } ni;
  465. #endif
  466. struct
  467. {
  468. uint64_t h[2];
  469. #if defined(ZT_ARCH_ARM_HAS_NEON) && !defined(_MSC_VER) && !defined(ZT_AES_NO_ACCEL)
  470. __attribute__((aligned(16)))
  471. #endif
  472. uint32_t ek[60];
  473. #if defined(ZT_ARCH_ARM_HAS_NEON) && !defined(_MSC_VER) && !defined(ZT_AES_NO_ACCEL)
  474. __attribute__((aligned(16)))
  475. #endif
  476. uint32_t dk[60];
  477. } sw;
  478. } _k;
  479. #ifdef ZT_AES_AESNI
  480. void _init_aesni(const uint8_t key[32]) noexcept;
  481. void _encrypt_aesni(const void *const in, void *const out) const noexcept;
  482. void _decrypt_aesni(const void *in, void *out) const noexcept;
  483. #endif
  484. #ifdef ZT_ARCH_ARM_HAS_NEON
  485. void _encrypt_armneon_crypto(const void *const in, void *const out) const noexcept;
  486. void _decrypt_armneon_crypto(const void *const in, void *const out) const noexcept;
  487. #endif
  488. };
  489. } // namespace ZeroTier
  490. #endif