9
9
import org .bouncycastle .crypto .params .KeyParameter ;
10
10
import org .bouncycastle .crypto .params .ParametersWithIV ;
11
11
import org .bouncycastle .util .Arrays ;
12
+ import org .bouncycastle .util .Bytes ;
12
13
import org .bouncycastle .util .Pack ;
13
14
14
15
public class AEAD
15
16
{
16
-
17
17
private final short aeadId ;
18
18
private final byte [] key ;
19
19
private final byte [] baseNonce ;
@@ -32,7 +32,7 @@ public AEAD(short aeadId, byte[] key, byte[] baseNonce)
32
32
{
33
33
case HPKE .aead_AES_GCM128 :
34
34
case HPKE .aead_AES_GCM256 :
35
- cipher = new GCMBlockCipher ( new AESEngine ());
35
+ cipher = GCMBlockCipher . newInstance ( AESEngine . newInstance ());
36
36
break ;
37
37
case HPKE .aead_CHACHA20_POLY1305 :
38
38
cipher = new ChaCha20Poly1305 ();
@@ -42,106 +42,73 @@ public AEAD(short aeadId, byte[] key, byte[] baseNonce)
42
42
}
43
43
}
44
44
45
+ // used by Sender
46
+ public byte [] seal (byte [] aad , byte [] pt )
47
+ throws InvalidCipherTextException
48
+ {
49
+ return process (true , aad , pt , 0 , pt .length );
50
+ }
45
51
46
52
// used by Sender
47
53
public byte [] seal (byte [] aad , byte [] pt , int ptOffset , int ptLength )
48
54
throws InvalidCipherTextException
49
55
{
50
- if (ptOffset < 0 || ptOffset > pt .length )
51
- {
52
- throw new IndexOutOfBoundsException ("Invalid offset" );
53
- }
54
- if (ptOffset + ptLength > pt .length )
55
- {
56
- throw new IndexOutOfBoundsException ("Invalid length" );
57
- }
58
-
59
- CipherParameters params ;
60
- switch (aeadId )
61
- {
62
- case HPKE .aead_AES_GCM128 :
63
- case HPKE .aead_AES_GCM256 :
64
- case HPKE .aead_CHACHA20_POLY1305 :
65
- params = new ParametersWithIV (new KeyParameter (key ), ComputeNonce ());
66
- break ;
67
- case HPKE .aead_EXPORT_ONLY :
68
- default :
69
- throw new IllegalStateException ("Export only mode, cannot be used to seal/open" );
70
- }
71
- cipher .init (true , params );
72
- cipher .processAADBytes (aad , 0 , aad .length );
73
- byte [] ct = new byte [cipher .getOutputSize (ptLength )];
74
- int len = cipher .processBytes (pt , ptOffset , ptLength , ct , 0 );
75
- cipher .doFinal (ct , len );
56
+ Arrays .validateSegment (pt , ptOffset , ptLength );
76
57
77
- seq ++;
78
- return ct ;
58
+ return process (true , aad , pt , ptOffset , ptLength );
79
59
}
80
60
81
- // used by Sender
82
- public byte [] seal (byte [] aad , byte [] pt )
61
+ // used by Receiver
62
+ public byte [] open (byte [] aad , byte [] ct )
83
63
throws InvalidCipherTextException
84
64
{
85
- return this . seal ( aad , pt , 0 , pt .length );
65
+ return process ( false , aad , ct , 0 , ct .length );
86
66
}
87
67
88
68
// used by Receiver
89
69
public byte [] open (byte [] aad , byte [] ct , int ctOffset , int ctLength )
90
70
throws InvalidCipherTextException
91
71
{
92
- if (ctOffset < 0 || ctOffset > ct .length )
93
- {
94
- throw new IndexOutOfBoundsException ("Invalid offset" );
95
- }
96
- if (ctOffset + ctLength > ct .length )
97
- {
98
- throw new IndexOutOfBoundsException ("Invalid length" );
99
- }
72
+ Arrays .validateSegment (ct , ctOffset , ctLength );
73
+
74
+ return process (false , aad , ct , ctOffset , ctLength );
75
+ }
76
+
77
+ private byte [] computeNonce ()
78
+ {
79
+ byte [] seq_bytes = Pack .longToBigEndian (seq ++);
80
+ byte [] nonce = Arrays .clone (baseNonce );
81
+ Bytes .xorTo (8 , seq_bytes , 0 , nonce , nonce .length - 8 );
82
+ return nonce ;
83
+ }
100
84
85
+ private byte [] process (boolean forEncryption , byte [] aad , byte [] buf , int off , int len )
86
+ throws InvalidCipherTextException
87
+ {
101
88
CipherParameters params ;
102
89
switch (aeadId )
103
90
{
104
91
case HPKE .aead_AES_GCM128 :
105
92
case HPKE .aead_AES_GCM256 :
106
93
case HPKE .aead_CHACHA20_POLY1305 :
107
- params = new ParametersWithIV (new KeyParameter (key ), ComputeNonce ());
94
+ params = new ParametersWithIV (new KeyParameter (key ), computeNonce ());
108
95
break ;
109
96
case HPKE .aead_EXPORT_ONLY :
110
97
default :
111
98
throw new IllegalStateException ("Export only mode, cannot be used to seal/open" );
112
99
}
113
100
114
- cipher .init (false , params );
101
+ cipher .init (forEncryption , params );
115
102
cipher .processAADBytes (aad , 0 , aad .length );
116
103
117
- byte [] pt = new byte [cipher .getOutputSize (ctLength )];
118
- int len = cipher .processBytes (ct , ctOffset , ctLength , pt , 0 );
119
- len += cipher .doFinal (pt , len );
120
-
121
- seq ++;
122
- return pt ;
123
- }
124
-
125
- // used by Receiver
126
- public byte [] open (byte [] aad , byte [] ct )
127
- throws InvalidCipherTextException
128
- {
129
- return this .open (aad , ct , 0 , ct .length );
130
- }
131
-
132
- private byte [] ComputeNonce ()
133
- {
134
- byte [] seq_bytes = Pack .longToBigEndian (seq );
135
- int Nn = baseNonce .length ;
136
- byte [] nonce = Arrays .clone (baseNonce );
137
- //xor
138
- for (int i = 0 ; i < 8 ; i ++)
104
+ byte [] output = new byte [cipher .getOutputSize (len )];
105
+ int pos = cipher .processBytes (buf , off , len , output , 0 );
106
+ pos += cipher .doFinal (output , pos );
107
+ if (pos != output .length )
139
108
{
140
- nonce [Nn - 8 + i ] ^= seq_bytes [i ];
109
+ // Existing AEAD modes should return exact value for getOutputSize.
110
+ throw new IllegalStateException ();
141
111
}
142
- return nonce ;
112
+ return output ;
143
113
}
144
-
145
-
146
114
}
147
-
0 commit comments