2018-09-20 08:58:24 +00:00
|
|
|
//
|
|
|
|
// CryptoCTR.m
|
|
|
|
// TunnelKit
|
|
|
|
//
|
|
|
|
// Created by Davide De Rosa on 9/18/18.
|
2019-03-09 10:44:18 +00:00
|
|
|
// Copyright (c) 2019 Davide De Rosa. All rights reserved.
|
2018-09-20 08:58:24 +00:00
|
|
|
//
|
2019-05-14 08:58:47 +00:00
|
|
|
// https://github.com/passepartoutvpn
|
2018-09-20 08:58:24 +00:00
|
|
|
//
|
|
|
|
// This file is part of TunnelKit.
|
|
|
|
//
|
|
|
|
// TunnelKit is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// TunnelKit is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
|
|
// along with TunnelKit. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//
|
|
|
|
|
|
|
|
#import <openssl/evp.h>
|
|
|
|
#import <openssl/hmac.h>
|
|
|
|
#import <openssl/rand.h>
|
|
|
|
|
|
|
|
#import "CryptoCTR.h"
|
|
|
|
#import "CryptoMacros.h"
|
|
|
|
#import "PacketMacros.h"
|
2019-05-19 00:05:34 +00:00
|
|
|
#import "ZeroingData.h"
|
2018-09-20 08:58:24 +00:00
|
|
|
#import "Allocation.h"
|
|
|
|
#import "Errors.h"
|
|
|
|
|
2018-11-06 09:25:35 +00:00
|
|
|
static const NSInteger CryptoCTRTagLength = 32;
|
2018-09-20 08:58:24 +00:00
|
|
|
|
|
|
|
@interface CryptoCTR ()
|
|
|
|
|
|
|
|
@property (nonatomic, unsafe_unretained) const EVP_CIPHER *cipher;
|
|
|
|
@property (nonatomic, unsafe_unretained) const EVP_MD *digest;
|
|
|
|
@property (nonatomic, assign) int cipherKeyLength;
|
|
|
|
@property (nonatomic, assign) int cipherIVLength;
|
|
|
|
@property (nonatomic, assign) int hmacKeyLength;
|
|
|
|
|
|
|
|
@property (nonatomic, unsafe_unretained) EVP_CIPHER_CTX *cipherCtxEnc;
|
|
|
|
@property (nonatomic, unsafe_unretained) EVP_CIPHER_CTX *cipherCtxDec;
|
|
|
|
@property (nonatomic, unsafe_unretained) HMAC_CTX *hmacCtxEnc;
|
|
|
|
@property (nonatomic, unsafe_unretained) HMAC_CTX *hmacCtxDec;
|
|
|
|
@property (nonatomic, unsafe_unretained) uint8_t *bufferDecHMAC;
|
|
|
|
|
|
|
|
@end
|
|
|
|
|
|
|
|
@implementation CryptoCTR
|
|
|
|
|
|
|
|
- (instancetype)initWithCipherName:(NSString *)cipherName digestName:(NSString *)digestName
|
|
|
|
{
|
|
|
|
NSParameterAssert(cipherName && [[cipherName uppercaseString] hasSuffix:@"CTR"]);
|
|
|
|
NSParameterAssert(digestName);
|
|
|
|
|
|
|
|
self = [super init];
|
|
|
|
if (self) {
|
|
|
|
self.cipher = EVP_get_cipherbyname([cipherName cStringUsingEncoding:NSASCIIStringEncoding]);
|
|
|
|
NSAssert(self.cipher, @"Unknown cipher '%@'", cipherName);
|
|
|
|
self.digest = EVP_get_digestbyname([digestName cStringUsingEncoding:NSASCIIStringEncoding]);
|
|
|
|
NSAssert(self.digest, @"Unknown digest '%@'", digestName);
|
|
|
|
|
|
|
|
self.cipherKeyLength = EVP_CIPHER_key_length(self.cipher);
|
|
|
|
self.cipherIVLength = EVP_CIPHER_iv_length(self.cipher);
|
|
|
|
// as seen in OpenVPN's crypto_openssl.c:md_kt_size()
|
|
|
|
self.hmacKeyLength = EVP_MD_size(self.digest);
|
2018-11-06 09:33:55 +00:00
|
|
|
NSAssert(EVP_MD_size(self.digest) == CryptoCTRTagLength, @"Expected digest size to be tag length (%ld)", CryptoCTRTagLength);
|
2018-09-20 08:58:24 +00:00
|
|
|
|
|
|
|
self.cipherCtxEnc = EVP_CIPHER_CTX_new();
|
|
|
|
self.cipherCtxDec = EVP_CIPHER_CTX_new();
|
|
|
|
self.hmacCtxEnc = HMAC_CTX_new();
|
|
|
|
self.hmacCtxDec = HMAC_CTX_new();
|
2018-11-06 09:33:55 +00:00
|
|
|
self.bufferDecHMAC = allocate_safely(CryptoCTRTagLength);
|
2018-09-20 08:58:24 +00:00
|
|
|
}
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
- (void)dealloc
|
|
|
|
{
|
|
|
|
EVP_CIPHER_CTX_free(self.cipherCtxEnc);
|
|
|
|
EVP_CIPHER_CTX_free(self.cipherCtxDec);
|
|
|
|
HMAC_CTX_free(self.hmacCtxEnc);
|
|
|
|
HMAC_CTX_free(self.hmacCtxDec);
|
2018-11-06 09:33:55 +00:00
|
|
|
bzero(self.bufferDecHMAC, CryptoCTRTagLength);
|
2018-09-20 08:58:24 +00:00
|
|
|
free(self.bufferDecHMAC);
|
|
|
|
|
|
|
|
self.cipher = NULL;
|
|
|
|
self.digest = NULL;
|
|
|
|
}
|
|
|
|
|
2018-11-06 09:33:55 +00:00
|
|
|
- (int)digestLength
|
|
|
|
{
|
|
|
|
return CryptoCTRTagLength;
|
|
|
|
}
|
|
|
|
|
2018-11-06 09:30:43 +00:00
|
|
|
- (int)tagLength
|
|
|
|
{
|
|
|
|
return CryptoCTRTagLength;
|
|
|
|
}
|
|
|
|
|
2018-09-20 08:58:24 +00:00
|
|
|
- (NSInteger)encryptionCapacityWithLength:(NSInteger)length
|
|
|
|
{
|
|
|
|
return safe_crypto_capacity(length, PacketOpcodeLength + PacketSessionIdLength + PacketReplayIdLength + PacketReplayTimestampLength + CryptoCTRTagLength);
|
|
|
|
}
|
|
|
|
|
|
|
|
#pragma mark Encrypter
|
|
|
|
|
|
|
|
- (void)configureEncryptionWithCipherKey:(ZeroingData *)cipherKey hmacKey:(ZeroingData *)hmacKey
|
|
|
|
{
|
|
|
|
NSParameterAssert(hmacKey);
|
|
|
|
NSParameterAssert(hmacKey.count >= self.hmacKeyLength);
|
|
|
|
NSParameterAssert(cipherKey.count >= self.cipherKeyLength);
|
|
|
|
|
|
|
|
EVP_CIPHER_CTX_reset(self.cipherCtxEnc);
|
|
|
|
EVP_CipherInit(self.cipherCtxEnc, self.cipher, cipherKey.bytes, NULL, 1);
|
|
|
|
|
|
|
|
HMAC_CTX_reset(self.hmacCtxEnc);
|
|
|
|
HMAC_Init_ex(self.hmacCtxEnc, hmacKey.bytes, self.hmacKeyLength, self.digest, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
- (BOOL)encryptBytes:(const uint8_t *)bytes length:(NSInteger)length dest:(uint8_t *)dest destLength:(NSInteger *)destLength flags:(const CryptoFlags * _Nullable)flags error:(NSError * _Nullable __autoreleasing * _Nullable)error
|
|
|
|
{
|
|
|
|
NSParameterAssert(flags);
|
|
|
|
|
|
|
|
uint8_t *outEncrypted = dest + CryptoCTRTagLength;
|
|
|
|
int l1 = 0, l2 = 0;
|
|
|
|
unsigned int l3 = 0;
|
|
|
|
int code = 1;
|
|
|
|
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Init_ex(self.hmacCtxEnc, NULL, 0, NULL, NULL);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Update(self.hmacCtxEnc, flags->ad, flags->adLength);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Update(self.hmacCtxEnc, bytes, length);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Final(self.hmacCtxEnc, dest, &l3);
|
|
|
|
|
|
|
|
NSAssert(l3 == CryptoCTRTagLength, @"Incorrect digest size");
|
|
|
|
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) EVP_CipherInit(self.cipherCtxEnc, NULL, NULL, dest, -1);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) EVP_CipherUpdate(self.cipherCtxEnc, outEncrypted, &l1, bytes, (int)length);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) EVP_CipherFinal(self.cipherCtxEnc, outEncrypted + l1, &l2);
|
|
|
|
|
|
|
|
*destLength = CryptoCTRTagLength + l1 + l2;
|
|
|
|
|
|
|
|
TUNNEL_CRYPTO_RETURN_STATUS(code)
|
|
|
|
}
|
|
|
|
|
|
|
|
- (id<DataPathEncrypter>)dataPathEncrypter
|
|
|
|
{
|
|
|
|
[NSException raise:NSInvalidArgumentException format:@"DataPathEncryption not supported"];
|
|
|
|
return nil;
|
|
|
|
}
|
|
|
|
|
|
|
|
#pragma mark Decrypter
|
|
|
|
|
|
|
|
- (void)configureDecryptionWithCipherKey:(ZeroingData *)cipherKey hmacKey:(ZeroingData *)hmacKey
|
|
|
|
{
|
|
|
|
NSParameterAssert(hmacKey);
|
|
|
|
NSParameterAssert(hmacKey.count >= self.hmacKeyLength);
|
|
|
|
NSParameterAssert(cipherKey.count >= self.cipherKeyLength);
|
|
|
|
|
|
|
|
EVP_CIPHER_CTX_reset(self.cipherCtxDec);
|
|
|
|
EVP_CipherInit(self.cipherCtxDec, self.cipher, cipherKey.bytes, NULL, 0);
|
|
|
|
|
|
|
|
HMAC_CTX_reset(self.hmacCtxDec);
|
|
|
|
HMAC_Init_ex(self.hmacCtxDec, hmacKey.bytes, self.hmacKeyLength, self.digest, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
- (BOOL)decryptBytes:(const uint8_t *)bytes length:(NSInteger)length dest:(uint8_t *)dest destLength:(NSInteger *)destLength flags:(const CryptoFlags * _Nullable)flags error:(NSError * _Nullable __autoreleasing * _Nullable)error
|
|
|
|
{
|
|
|
|
NSParameterAssert(flags);
|
|
|
|
NSAssert(self.cipher, @"No cipher provided");
|
|
|
|
|
|
|
|
const uint8_t *iv = bytes;
|
|
|
|
const uint8_t *encrypted = bytes + CryptoCTRTagLength;
|
|
|
|
int l1 = 0, l2 = 0;
|
|
|
|
unsigned int l3 = 0;
|
|
|
|
int code = 1;
|
|
|
|
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) EVP_CipherInit(self.cipherCtxDec, NULL, NULL, iv, -1);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) EVP_CipherUpdate(self.cipherCtxDec, dest, &l1, encrypted, (int)length - CryptoCTRTagLength);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) EVP_CipherFinal(self.cipherCtxDec, dest + l1, &l2);
|
|
|
|
|
|
|
|
*destLength = l1 + l2;
|
|
|
|
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Init_ex(self.hmacCtxDec, NULL, 0, NULL, NULL);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Update(self.hmacCtxDec, flags->ad, flags->adLength);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Update(self.hmacCtxDec, dest, *destLength);
|
|
|
|
TUNNEL_CRYPTO_TRACK_STATUS(code) HMAC_Final(self.hmacCtxDec, self.bufferDecHMAC, &l3);
|
|
|
|
|
|
|
|
NSAssert(l3 == CryptoCTRTagLength, @"Incorrect digest size");
|
|
|
|
|
|
|
|
if (TUNNEL_CRYPTO_SUCCESS(code) && CRYPTO_memcmp(self.bufferDecHMAC, bytes, CryptoCTRTagLength) != 0) {
|
|
|
|
if (error) {
|
2019-05-19 10:03:46 +00:00
|
|
|
*error = TunnelKitErrorWithCode(TunnelKitErrorCodeCryptoHMAC);
|
2018-09-20 08:58:24 +00:00
|
|
|
}
|
|
|
|
return NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
TUNNEL_CRYPTO_RETURN_STATUS(code)
|
|
|
|
}
|
|
|
|
|
|
|
|
- (BOOL)verifyBytes:(const uint8_t *)bytes length:(NSInteger)length flags:(const CryptoFlags * _Nullable)flags error:(NSError * _Nullable __autoreleasing * _Nullable)error
|
|
|
|
{
|
|
|
|
[NSException raise:NSInvalidArgumentException format:@"Verification not supported"];
|
|
|
|
return NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
- (id<DataPathDecrypter>)dataPathDecrypter
|
|
|
|
{
|
|
|
|
[NSException raise:NSInvalidArgumentException format:@"DataPathEncryption not supported"];
|
|
|
|
return nil;
|
|
|
|
}
|
|
|
|
|
|
|
|
@end
|