9#include <botan/internal/chacha20poly1305.h>
11#include <botan/exceptn.h>
12#include <botan/mem_ops.h>
13#include <botan/internal/ct_utils.h>
14#include <botan/internal/loadstor.h>
26 return (n == 8 || n == 12 || n == 24);
50 return m_chacha->has_keying_material();
53void ChaCha20Poly1305_Mode::key_schedule(std::span<const uint8_t> key) {
58 BOTAN_ARG_CHECK(idx == 0,
"ChaCha20Poly1305: cannot handle non-zero index in set_associated_data_n");
60 throw Invalid_State(
"Cannot set AD for ChaCha20Poly1305 while processing a message");
62 m_ad.assign(ad.begin(), ad.end());
66 uint8_t len8[8] = {0};
71void ChaCha20Poly1305_Mode::start_msg(
const uint8_t nonce[],
size_t nonce_len) {
81 uint8_t first_block[64];
82 m_chacha->write_keystream(first_block,
sizeof(first_block));
91 if(
m_ad.size() % 16 != 0) {
92 const uint8_t zeros[16] = {0};
100size_t ChaCha20Poly1305_Encryption::process_msg(uint8_t buf[],
size_t sz) {
106 constexpr uint64_t MAX_CHACHA20POLY1305_INPUT = (
static_cast<uint64_t
>(1) << 38) - 64;
108 throw Invalid_State(
"ChaCha20Poly1305 message length limit exceeded");
118 const uint8_t zeros[16] = {0};
119 const size_t padding =
static_cast<size_t>(16 -
m_ctext_len % 16);
126 buffer.resize(buffer.size() +
tag_size());
132size_t ChaCha20Poly1305_Decryption::process_msg(uint8_t buf[],
size_t sz) {
137 constexpr uint64_t MAX_CHACHA20POLY1305_INPUT = (
static_cast<uint64_t
>(1) << 38) - 64;
139 throw Invalid_State(
"ChaCha20Poly1305 message length limit exceeded");
147 const size_t sz = buffer.size() - offset;
148 uint8_t* buf = buffer.data() + offset;
152 const size_t remaining = sz -
tag_size();
162 const uint8_t zeros[16] = {0};
163 const size_t padding =
static_cast<size_t>(16 -
m_ctext_len % 16);
174 const uint8_t* included_tag = &buf[remaining];
180 clear_mem(std::span{buffer}.subspan(offset, remaining));
181 throw Invalid_Authentication_Tag(
"ChaCha20Poly1305 tag check failed");
183 buffer.resize(offset + remaining);
#define BOTAN_ARG_CHECK(expr, msg)
static std::unique_ptr< AEAD_Mode > create(std::string_view algo, Cipher_Dir direction, std::string_view provider="")
bool has_keying_material() const final
void update_len(uint64_t len)
void set_associated_data_n(size_t idx, std::span< const uint8_t > ad) final
bool valid_nonce_length(size_t n) const override
secure_vector< uint8_t > m_ad
size_t ideal_granularity() const override
std::string name() const override
std::unique_ptr< StreamCipher > m_chacha
size_t update_granularity() const override
bool cfrg_version() const
size_t tag_size() const override
std::unique_ptr< MessageAuthenticationCode > m_poly1305
void update(T &buffer, size_t offset=0)
constexpr CT::Mask< T > is_equal(const T x[], const T y[], size_t len)
void secure_scrub_memory(void *ptr, size_t n)
constexpr auto store_le(ParamTs &&... params)
std::vector< T, secure_allocator< T > > secure_vector
constexpr void clear_mem(T *ptr, size_t n)