// OpenVPN -- An application to securely tunnel IP networks // over a single port, with support for SSL/TLS-based // session authentication and key exchange, // packet encryption, packet authentication, and // packet compression. // // Copyright (C) 2012-2017 OpenVPN Inc. // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License Version 3 // as published by the Free Software Foundation. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program in the COPYING file. // If not, see . // Wrap the OpenSSL GCM API. #ifndef OPENVPN_OPENSSL_CRYPTO_CIPHERGCM_H #define OPENVPN_OPENSSL_CRYPTO_CIPHERGCM_H #include #include #include #include #include #include #include #include #include namespace openvpn { namespace OpenSSLCrypto { class CipherContextGCM { CipherContextGCM(const CipherContextGCM&) = delete; CipherContextGCM& operator=(const CipherContextGCM&) = delete; public: OPENVPN_EXCEPTION(openssl_gcm_error); // mode parameter for constructor enum { MODE_UNDEF = -1, ENCRYPT = 1, DECRYPT = 0 }; // OpenSSL cipher constants enum { IV_LEN = 12, AUTH_TAG_LEN = 16, SUPPORTS_IN_PLACE_ENCRYPT = 0, }; CipherContextGCM() : initialized(false) { } ~CipherContextGCM() { erase() ; } void init(const CryptoAlgs::Type alg, const unsigned char *key, const unsigned int keysize, const int mode) { erase(); unsigned int ckeysz = 0; const EVP_CIPHER *ciph = cipher_type(alg, ckeysz); if (ckeysz > keysize) throw openssl_gcm_error("insufficient key material"); ctx = EVP_CIPHER_CTX_new(); EVP_CIPHER_CTX_reset(ctx); switch (mode) { case ENCRYPT: if (!EVP_EncryptInit_ex(ctx, ciph, nullptr, key, nullptr)) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_EncryptInit_ex (init)"); } break; case DECRYPT: if (!EVP_DecryptInit_ex(ctx, ciph, nullptr, key, nullptr)) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_DecryptInit_ex (init)"); } break; default: throw openssl_gcm_error("bad mode"); } if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, IV_LEN, nullptr) != 1) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_CIPHER_CTX_ctrl set IV len"); } initialized = true; } void encrypt(const unsigned char *input, unsigned char *output, size_t length, const unsigned char *iv, unsigned char *tag, const unsigned char *ad, size_t ad_len) { int len; int ciphertext_len; check_initialized(); if (!EVP_EncryptInit_ex(ctx, nullptr, nullptr, nullptr, iv)) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_EncryptInit_ex (reset)"); } if (!EVP_EncryptUpdate(ctx, nullptr, &len, ad, int(ad_len))) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_EncryptUpdate AD"); } if (!EVP_EncryptUpdate(ctx, output, &len, input, int(length))) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_EncryptUpdate data"); } ciphertext_len = len; if (!EVP_EncryptFinal_ex(ctx, output+len, &len)) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_EncryptFinal_ex"); } ciphertext_len += len; if (ciphertext_len != length) { throw openssl_gcm_error("encrypt size inconsistency"); } if (!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_GET_TAG, AUTH_TAG_LEN, tag)) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_CIPHER_CTX_ctrl get tag"); } } bool decrypt(const unsigned char *input, unsigned char *output, size_t length, const unsigned char *iv, unsigned char *tag, const unsigned char *ad, size_t ad_len) { int len; int plaintext_len; check_initialized(); if (!EVP_DecryptInit_ex(ctx, nullptr, nullptr, nullptr, iv)) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_DecryptInit_ex (reset)"); } if (!EVP_DecryptUpdate(ctx, nullptr, &len, ad, int(ad_len))) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_DecryptUpdate AD"); } if (!EVP_DecryptUpdate(ctx, output, &len, input, int(length))) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_DecryptUpdate data"); } plaintext_len = len; if (!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, AUTH_TAG_LEN, tag)) { openssl_clear_error_stack(); throw openssl_gcm_error("EVP_CIPHER_CTX_ctrl set tag"); } if (!EVP_DecryptFinal_ex(ctx, output+len, &len)) { openssl_clear_error_stack(); return false; } plaintext_len += len; if (plaintext_len != length) { throw openssl_gcm_error("decrypt size inconsistency"); } return true; } bool is_initialized() const { return initialized; } private: static const EVP_CIPHER *cipher_type(const CryptoAlgs::Type alg, unsigned int& keysize) { switch (alg) { case CryptoAlgs::AES_128_GCM: keysize = 16; return EVP_aes_128_gcm(); case CryptoAlgs::AES_192_GCM: keysize = 24; return EVP_aes_192_gcm(); case CryptoAlgs::AES_256_GCM: keysize = 32; return EVP_aes_256_gcm(); default: OPENVPN_THROW(openssl_gcm_error, CryptoAlgs::name(alg) << ": not usable"); } } void erase() { if (initialized) { EVP_CIPHER_CTX_free(ctx); initialized = false; } } void check_initialized() const { #ifdef OPENVPN_ENABLE_ASSERT if (unlikely(!initialized)) throw openssl_gcm_error("uninitialized"); #endif } bool initialized; EVP_CIPHER_CTX *ctx; }; } } #endif