1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/quic/crypto/aead_base_encrypter.h"
7 #include <openssl/err.h>
8 #include <openssl/evp.h>
11 #include "base/memory/scoped_ptr.h"
13 using base::StringPiece
;
19 // In debug builds only, log OpenSSL error stack. Then clear OpenSSL error
21 void DLogOpenSslErrors() {
23 while (ERR_get_error()) {}
25 while (unsigned long error
= ERR_get_error()) {
27 ERR_error_string_n(error
, buf
, arraysize(buf
));
28 DLOG(ERROR
) << "OpenSSL error: " << buf
;
35 AeadBaseEncrypter::AeadBaseEncrypter(const EVP_AEAD
* aead_alg
,
38 size_t nonce_prefix_size
)
39 : aead_alg_(aead_alg
),
41 auth_tag_size_(auth_tag_size
),
42 nonce_prefix_size_(nonce_prefix_size
) {
43 DCHECK_LE(key_size_
, sizeof(key_
));
44 DCHECK_LE(nonce_prefix_size_
, sizeof(nonce_prefix_
));
47 AeadBaseEncrypter::~AeadBaseEncrypter() {}
49 bool AeadBaseEncrypter::SetKey(StringPiece key
) {
50 DCHECK_EQ(key
.size(), key_size_
);
51 if (key
.size() != key_size_
) {
54 memcpy(key_
, key
.data(), key
.size());
56 EVP_AEAD_CTX_cleanup(ctx_
.get());
58 if (!EVP_AEAD_CTX_init(ctx_
.get(), aead_alg_
, key_
, key_size_
,
59 auth_tag_size_
, NULL
)) {
67 bool AeadBaseEncrypter::SetNoncePrefix(StringPiece nonce_prefix
) {
68 DCHECK_EQ(nonce_prefix
.size(), nonce_prefix_size_
);
69 if (nonce_prefix
.size() != nonce_prefix_size_
) {
72 memcpy(nonce_prefix_
, nonce_prefix
.data(), nonce_prefix
.size());
76 bool AeadBaseEncrypter::Encrypt(StringPiece nonce
,
77 StringPiece associated_data
,
78 StringPiece plaintext
,
79 unsigned char* output
) {
80 if (nonce
.size() != nonce_prefix_size_
+ sizeof(QuicPacketSequenceNumber
)) {
84 ssize_t len
= EVP_AEAD_CTX_seal(
85 ctx_
.get(), output
, plaintext
.size() + auth_tag_size_
,
86 reinterpret_cast<const uint8_t*>(nonce
.data()), nonce
.size(),
87 reinterpret_cast<const uint8_t*>(plaintext
.data()), plaintext
.size(),
88 reinterpret_cast<const uint8_t*>(associated_data
.data()),
89 associated_data
.size());
99 QuicData
* AeadBaseEncrypter::EncryptPacket(
100 QuicPacketSequenceNumber sequence_number
,
101 StringPiece associated_data
,
102 StringPiece plaintext
) {
103 size_t ciphertext_size
= GetCiphertextSize(plaintext
.length());
104 scoped_ptr
<char[]> ciphertext(new char[ciphertext_size
]);
106 // TODO(ianswett): Introduce a check to ensure that we don't encrypt with the
107 // same sequence number twice.
108 uint8 nonce
[sizeof(nonce_prefix_
) + sizeof(sequence_number
)];
109 const size_t nonce_size
= nonce_prefix_size_
+ sizeof(sequence_number
);
110 DCHECK_LE(nonce_size
, sizeof(nonce
));
111 memcpy(nonce
, nonce_prefix_
, nonce_prefix_size_
);
112 memcpy(nonce
+ nonce_prefix_size_
, &sequence_number
, sizeof(sequence_number
));
113 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce
), nonce_size
),
114 associated_data
, plaintext
,
115 reinterpret_cast<unsigned char*>(ciphertext
.get()))) {
119 return new QuicData(ciphertext
.release(), ciphertext_size
, true);
122 size_t AeadBaseEncrypter::GetKeySize() const { return key_size_
; }
124 size_t AeadBaseEncrypter::GetNoncePrefixSize() const {
125 return nonce_prefix_size_
;
128 size_t AeadBaseEncrypter::GetMaxPlaintextSize(size_t ciphertext_size
) const {
129 return ciphertext_size
- auth_tag_size_
;
132 size_t AeadBaseEncrypter::GetCiphertextSize(size_t plaintext_size
) const {
133 return plaintext_size
+ auth_tag_size_
;
136 StringPiece
AeadBaseEncrypter::GetKey() const {
137 return StringPiece(reinterpret_cast<const char*>(key_
), key_size_
);
140 StringPiece
AeadBaseEncrypter::GetNoncePrefix() const {
141 if (nonce_prefix_size_
== 0) {
142 return StringPiece();
144 return StringPiece(reinterpret_cast<const char*>(nonce_prefix_
),