mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-11-25 09:00:22 +00:00
LibCrypto: Fix and test CBC with CMS and ZeroLen padding
This commit is contained in:
parent
3e7faae647
commit
92d4cb7b09
Notes:
github-actions[bot]
2024-10-26 15:51:47 +00:00
Author: https://github.com/BenWiederhake Commit: https://github.com/LadybirdBrowser/ladybird/commit/92d4cb7b09b Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/1971
8 changed files with 150 additions and 2 deletions
|
@ -129,6 +129,113 @@ TEST_CASE(test_AES_CBC_256bit_key_decrypt)
|
|||
test_aes_cbc_decrypt(cipher, result, 48);
|
||||
}
|
||||
|
||||
static void do_roundtrip_cbc_128_nopad(ReadonlyBytes key, ReadonlyBytes iv, ReadonlyBytes expected_plaintext, ReadonlyBytes expected_ciphertext)
|
||||
{
|
||||
{
|
||||
Crypto::Cipher::AESCipher::CBCMode cipher(key, 128, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::ZeroLength);
|
||||
auto actual_ciphertext_buf = cipher.create_aligned_buffer(expected_ciphertext.size() + 1).release_value();
|
||||
actual_ciphertext_buf.zero_fill();
|
||||
auto actual_ciphertext = actual_ciphertext_buf.bytes();
|
||||
cipher.encrypt(expected_plaintext, actual_ciphertext, iv);
|
||||
EXPECT_EQ(actual_ciphertext, expected_ciphertext);
|
||||
}
|
||||
{
|
||||
Crypto::Cipher::AESCipher::CBCMode cipher(key, 128, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::ZeroLength);
|
||||
auto actual_plaintext_buf = cipher.create_aligned_buffer(expected_plaintext.size() + 17).release_value();
|
||||
actual_plaintext_buf.zero_fill();
|
||||
auto actual_plaintext = actual_plaintext_buf.bytes();
|
||||
cipher.decrypt(expected_ciphertext, actual_plaintext, iv);
|
||||
EXPECT_EQ(actual_plaintext, expected_plaintext);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_CASE(test_AES_CBC_128bit_key_encrypt_rfc3602_case1)
|
||||
{
|
||||
// Test vector taken from https://www.rfc-editor.org/rfc/rfc3602#section-4
|
||||
u8 key_raw[16] {
|
||||
0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b, 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06
|
||||
};
|
||||
ReadonlyBytes key(key_raw, sizeof(key_raw));
|
||||
u8 iv_raw[16] {
|
||||
0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30, 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41
|
||||
};
|
||||
ReadonlyBytes iv(iv_raw, sizeof(iv_raw));
|
||||
ReadonlyBytes plaintext = "Single block msg"_b;
|
||||
u8 ciphertext_raw[16] {
|
||||
0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8, 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a
|
||||
};
|
||||
ReadonlyBytes ciphertext(ciphertext_raw, sizeof(ciphertext_raw));
|
||||
|
||||
do_roundtrip_cbc_128_nopad(key, iv, plaintext, ciphertext);
|
||||
}
|
||||
|
||||
TEST_CASE(test_AES_CBC_128bit_key_encrypt_rfc3602_case2)
|
||||
{
|
||||
// Test vector taken from https://www.rfc-editor.org/rfc/rfc3602#section-4
|
||||
u8 key_raw[16] {
|
||||
0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0, 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a
|
||||
};
|
||||
ReadonlyBytes key(key_raw, sizeof(key_raw));
|
||||
u8 iv_raw[16] {
|
||||
0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28, 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58
|
||||
};
|
||||
ReadonlyBytes iv(iv_raw, sizeof(iv_raw));
|
||||
u8 plaintext_raw[32] {
|
||||
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
|
||||
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f
|
||||
};
|
||||
ReadonlyBytes plaintext(plaintext_raw, sizeof(plaintext_raw));
|
||||
u8 ciphertext_raw[32] {
|
||||
0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a, 0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a,
|
||||
0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9, 0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1
|
||||
};
|
||||
ReadonlyBytes ciphertext(ciphertext_raw, sizeof(ciphertext_raw));
|
||||
|
||||
do_roundtrip_cbc_128_nopad(key, iv, plaintext, ciphertext);
|
||||
}
|
||||
|
||||
static void do_roundtrip_cbc_128_cms(ReadonlyBytes key, ReadonlyBytes iv, ReadonlyBytes expected_plaintext, ReadonlyBytes expected_ciphertext)
|
||||
{
|
||||
{
|
||||
Crypto::Cipher::AESCipher::CBCMode cipher(key, 128, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::CMS);
|
||||
auto actual_ciphertext_buf = cipher.create_aligned_buffer(expected_ciphertext.size() + 1).release_value();
|
||||
actual_ciphertext_buf.zero_fill();
|
||||
auto actual_ciphertext = actual_ciphertext_buf.bytes();
|
||||
cipher.encrypt(expected_plaintext, actual_ciphertext, iv);
|
||||
EXPECT_EQ(actual_ciphertext, expected_ciphertext);
|
||||
}
|
||||
{
|
||||
Crypto::Cipher::AESCipher::CBCMode cipher(key, 128, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::CMS);
|
||||
auto actual_plaintext_buf = cipher.create_aligned_buffer(expected_plaintext.size() + 17).release_value();
|
||||
actual_plaintext_buf.zero_fill();
|
||||
auto actual_plaintext = actual_plaintext_buf.bytes();
|
||||
cipher.decrypt(expected_ciphertext, actual_plaintext, iv);
|
||||
EXPECT_EQ(actual_plaintext, expected_plaintext);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_CASE(test_AES_CBC_128bit_key_encrypt_CMS_aligned)
|
||||
{
|
||||
// Test vector taken from https://www.rfc-editor.org/rfc/rfc3602#section-4
|
||||
u8 key_raw[16] {
|
||||
0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b, 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06
|
||||
};
|
||||
ReadonlyBytes key(key_raw, sizeof(key_raw));
|
||||
u8 iv_raw[16] {
|
||||
0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30, 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41
|
||||
};
|
||||
ReadonlyBytes iv(iv_raw, sizeof(iv_raw));
|
||||
ReadonlyBytes plaintext = "Single block msg"_b;
|
||||
u8 ciphertext_raw[32] {
|
||||
0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8, 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a,
|
||||
// This additional block just encodes the padding "0x1010101010101010".
|
||||
0xb9, 0x7c, 0x82, 0x5e, 0x1c, 0x78, 0x51, 0x46, 0x54, 0x2d, 0x39, 0x69, 0x41, 0xbc, 0xe5, 0x5d
|
||||
};
|
||||
ReadonlyBytes ciphertext(ciphertext_raw, sizeof(ciphertext_raw));
|
||||
|
||||
do_roundtrip_cbc_128_cms(key, iv, plaintext, ciphertext);
|
||||
}
|
||||
|
||||
// TODO: Test non-CMS padding options for AES CBC decrypt
|
||||
|
||||
TEST_CASE(test_AES_CTR_name)
|
||||
|
|
|
@ -21,6 +21,7 @@ set(SOURCES
|
|||
Checksum/cksum.cpp
|
||||
Checksum/CRC32.cpp
|
||||
Cipher/AES.cpp
|
||||
Cipher/Cipher.cpp
|
||||
Cipher/ChaCha20.cpp
|
||||
Curves/Curve25519.cpp
|
||||
Curves/Ed25519.cpp
|
||||
|
|
27
Userland/Libraries/LibCrypto/Cipher/Cipher.cpp
Normal file
27
Userland/Libraries/LibCrypto/Cipher/Cipher.cpp
Normal file
|
@ -0,0 +1,27 @@
|
|||
/*
|
||||
* Copyright (c) 2024, Ben Wiederhake
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-2-Clause
|
||||
*/
|
||||
|
||||
#include <LibCrypto/Cipher/Cipher.h>
|
||||
|
||||
namespace Crypto::Cipher {
|
||||
|
||||
bool padding_always_needs_extra_block(PaddingMode mode)
|
||||
{
|
||||
switch (mode) {
|
||||
case PaddingMode::CMS:
|
||||
return true;
|
||||
case PaddingMode::RFC5246:
|
||||
case PaddingMode::Null:
|
||||
case PaddingMode::Bit:
|
||||
case PaddingMode::Random:
|
||||
case PaddingMode::Space:
|
||||
case PaddingMode::ZeroLength:
|
||||
return false;
|
||||
}
|
||||
VERIFY_NOT_REACHED();
|
||||
}
|
||||
|
||||
}
|
|
@ -22,13 +22,15 @@ enum class PaddingMode {
|
|||
CMS, // RFC 1423
|
||||
RFC5246, // very similar to CMS, but filled with |length - 1|, instead of |length|
|
||||
Null,
|
||||
ZeroLength,
|
||||
// FIXME: We do not implement these yet
|
||||
Bit,
|
||||
Random,
|
||||
Space,
|
||||
ZeroLength,
|
||||
};
|
||||
|
||||
bool padding_always_needs_extra_block(PaddingMode);
|
||||
|
||||
template<typename B, typename T>
|
||||
class Cipher;
|
||||
|
||||
|
|
|
@ -66,17 +66,21 @@ public:
|
|||
offset += block_size;
|
||||
}
|
||||
|
||||
if (length > 0) {
|
||||
if (length > 0 || padding_always_needs_extra_block(cipher.padding_mode())) {
|
||||
m_cipher_block.overwrite(in.slice(offset, length));
|
||||
m_cipher_block.apply_initialization_vector(iv);
|
||||
cipher.encrypt_block(m_cipher_block, m_cipher_block);
|
||||
VERIFY(offset + block_size <= out.size());
|
||||
__builtin_memcpy(out.offset(offset), m_cipher_block.bytes().data(), block_size);
|
||||
iv = out.slice(offset);
|
||||
offset += block_size;
|
||||
}
|
||||
|
||||
if (ivec_out)
|
||||
__builtin_memcpy(ivec_out->data(), iv.data(), min(IV_length(), ivec_out->size()));
|
||||
|
||||
// Indicate how much output was generated. (This can be non-trivial, as it depends on the padding mode.)
|
||||
out = out.slice(0, offset);
|
||||
}
|
||||
|
||||
virtual void decrypt(ReadonlyBytes in, Bytes& out, ReadonlyBytes ivec = {}) override
|
||||
|
|
|
@ -181,6 +181,7 @@ protected:
|
|||
length -= write_size;
|
||||
offset += write_size;
|
||||
}
|
||||
// FIXME: Apply padding if requested
|
||||
|
||||
if (ivec_out)
|
||||
__builtin_memcpy(ivec_out->data(), iv.data(), min(ivec_out->size(), IV_length()));
|
||||
|
|
|
@ -81,6 +81,10 @@ protected:
|
|||
data = data.slice(0, size);
|
||||
break;
|
||||
}
|
||||
case PaddingMode::ZeroLength: {
|
||||
// No padding
|
||||
break;
|
||||
}
|
||||
default:
|
||||
// FIXME: support other padding modes
|
||||
VERIFY_NOT_REACHED();
|
||||
|
|
|
@ -217,6 +217,8 @@ void TLSv12::update_packet(ByteBuffer& packet)
|
|||
// get a block to encrypt into
|
||||
auto view = ct.bytes().slice(header_size + iv_size, length);
|
||||
cbc.encrypt(buffer, view, iv);
|
||||
// Note: 'view' is dropped without checking 'view.size()'.
|
||||
// This is okay because TLSv12::expand_key sets PaddingMode::RFC5246, which never adds a block.
|
||||
});
|
||||
|
||||
// store the correct ciphertext length into the packet
|
||||
|
|
Loading…
Reference in a new issue