wolfcrypt-ring-compat 1.16.5

wolfcrypt-ring-compat is a cryptographic library using wolfSSL for its cryptographic operations. This library strives to be API-compatible with the popular Rust library named ring.
// Copyright 2016 Brian Smith.
// Portions Copyright (c) 2016, Google Inc.
// SPDX-License-Identifier: ISC
// Modifications copyright wolfSSL Inc.
// SPDX-License-Identifier: MIT

use crate::cipher::block::{Block, BLOCK_LEN};
use crate::wolfcrypt_rs::{wc_Chacha_Process, wc_Chacha_SetIV, wc_Chacha_SetKey, ChaCha};
use zeroize::Zeroize;

use crate::error;

pub(crate) const KEY_LEN: usize = 32usize;
pub(crate) const NONCE_LEN: usize = 96 / 8;

pub(crate) struct ChaCha20Key(pub(super) [u8; KEY_LEN]);

impl From<[u8; KEY_LEN]> for ChaCha20Key {
    fn from(bytes: [u8; KEY_LEN]) -> Self {
        ChaCha20Key(bytes)
    }
}

impl Drop for ChaCha20Key {
    fn drop(&mut self) {
        self.0.zeroize();
    }
}

#[allow(clippy::needless_pass_by_value)]
impl ChaCha20Key {
    #[inline]
    pub(crate) fn encrypt_in_place(&self, nonce: &[u8; NONCE_LEN], in_out: &mut [u8], ctr: u32) {
        encrypt_in_place_chacha20(self, nonce, in_out, ctr);
    }
}

#[inline]
#[allow(clippy::needless_pass_by_value)]
pub(crate) fn encrypt_block_chacha20(
    key: &ChaCha20Key,
    block: Block,
    nonce: &[u8; NONCE_LEN],
    counter: u32,
) -> Result<Block, error::Unspecified> {
    let mut cipher_text = [0u8; BLOCK_LEN];
    encrypt_chacha20(
        key,
        block.as_ref().as_slice(),
        &mut cipher_text,
        nonce,
        counter,
    )?;

    crate::fips::set_fips_service_status_unapproved();

    Ok(Block::from(cipher_text))
}

#[inline]
pub(crate) fn encrypt_chacha20(
    key: &ChaCha20Key,
    plaintext: &[u8],
    ciphertext: &mut [u8],
    nonce: &[u8; NONCE_LEN],
    counter: u32,
) -> Result<(), error::Unspecified> {
    if ciphertext.len() < plaintext.len() {
        return Err(error::Unspecified);
    }
    let key_bytes = &key.0;
    // SAFETY: cha is zeroed then fully initialized by SetKey/SetIV; pointers from valid slices.
    unsafe {
        let mut cha: ChaCha = core::mem::zeroed();
        wc_Chacha_SetKey(&mut cha, key_bytes.as_ptr(), 32);
        wc_Chacha_SetIV(&mut cha, nonce.as_ptr(), counter);
        wc_Chacha_Process(
            &mut cha,
            ciphertext.as_mut_ptr(),
            plaintext.as_ptr(),
            plaintext.len() as u32,
        );
    };
    Ok(())
}

#[inline]
pub(crate) fn encrypt_in_place_chacha20(
    key: &ChaCha20Key,
    nonce: &[u8; NONCE_LEN],
    in_out: &mut [u8],
    counter: u32,
) {
    let key_bytes = &key.0;
    // SAFETY: cha is zeroed then fully initialized by SetKey/SetIV; pointers from valid slices.
    unsafe {
        let mut cha: ChaCha = core::mem::zeroed();
        wc_Chacha_SetKey(&mut cha, key_bytes.as_ptr(), 32);
        wc_Chacha_SetIV(&mut cha, nonce.as_ptr(), counter);
        wc_Chacha_Process(
            &mut cha,
            in_out.as_mut_ptr(),
            in_out.as_ptr(),
            in_out.len() as u32,
        );
    }
    crate::fips::set_fips_service_status_unapproved();
}

#[cfg(test)]
mod tests {
    use super::*;
    use crate::{test, test_file};

    const MAX_ALIGNMENT: usize = 15;

    // Verifies the encryption is successful when done on overlapping buffers.
    //
    // On some branches of the 32-bit x86 and ARM assembly code the in-place
    // operation fails in some situations where the input/output buffers are
    // not exactly overlapping. Such failures are dependent not only on the
    // degree of overlapping but also the length of the data. `encrypt_within`
    // works around that.
    #[test]
    fn chacha20_test() {
        // Reuse a buffer to avoid slowing down the tests with allocations.
        let mut buf = vec![0u8; 1300];

        test::run(
            test_file!("data/chacha_tests.txt"),
            move |section, test_case| {
                assert_eq!(section, "");

                let key = test_case.consume_bytes("Key");
                let key: &[u8; KEY_LEN] = key.as_slice().try_into()?;
                let key = ChaCha20Key::from(*key);

                #[allow(clippy::cast_possible_truncation)]
                let ctr = test_case.consume_usize("Ctr") as u32;
                let nonce: [u8; NONCE_LEN] = test_case.consume_bytes("Nonce").try_into().unwrap();
                let input = test_case.consume_bytes("Input");
                let output = test_case.consume_bytes("Output");

                // Run the test case over all prefixes of the input because the
                // behavior of ChaCha20 implementation changes dependent on the
                // length of the input.
                for len in 0..=input.len() {
                    chacha20_test_case_inner(
                        &key,
                        nonce,
                        ctr,
                        &input[..len],
                        &output[..len],
                        &mut buf,
                    );
                }

                Ok(())
            },
        );
    }

    fn chacha20_test_case_inner(
        key: &ChaCha20Key,
        nonce: [u8; NONCE_LEN],
        ctr: u32,
        input: &[u8],
        expected: &[u8],
        buf: &mut [u8],
    ) {
        // Straightforward encryption into disjoint buffers is computed
        // correctly.
        const ARBITRARY: u8 = 123;

        for alignment in 0..=MAX_ALIGNMENT {
            buf[..alignment].fill(ARBITRARY);
            let buf = &mut buf[..input.len()];
            buf.copy_from_slice(input);
            let nonce = &nonce;

            key.encrypt_in_place(nonce, buf, ctr);
            assert_eq!(
                &buf[..input.len()],
                expected,
                "Failed on alignment: {alignment}",
            );
        }
    }
}