[ 
https://issues.apache.org/jira/browse/SSHD-1017?focusedWorklogId=597314&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-597314
 ]

ASF GitHub Bot logged work on SSHD-1017:
----------------------------------------

                Author: ASF GitHub Bot
            Created on: 15/May/21 23:10
            Start Date: 15/May/21 23:10
    Worklog Time Spent: 10m 
      Work Description: tomaswolf commented on a change in pull request #176:
URL: https://github.com/apache/mina-sshd/pull/176#discussion_r633015923



##########
File path: 
sshd-common/src/main/java/org/apache/sshd/common/cipher/ChaCha20Cipher.java
##########
@@ -0,0 +1,279 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+package org.apache.sshd.common.cipher;
+
+import java.nio.charset.StandardCharsets;
+import java.util.Arrays;
+
+import javax.crypto.AEADBadTagException;
+
+import org.apache.sshd.common.mac.Mac;
+import org.apache.sshd.common.mac.Poly1305Mac;
+import org.apache.sshd.common.util.NumberUtils;
+import org.apache.sshd.common.util.ValidateUtils;
+import org.apache.sshd.common.util.buffer.BufferUtils;
+
+/**
+ * AEAD cipher based on the
+ * <a 
href="https://github.com/openbsd/src/blob/master/usr.bin/ssh/PROTOCOL.chacha20poly1305";>OpenSSH
+ * ChaCha20-Poly1305</a> cipher extension.
+ */
+public class ChaCha20Cipher implements Cipher {
+    protected final ChaChaEngine headerEngine = new ChaChaEngine();
+    protected final ChaChaEngine bodyEngine = new ChaChaEngine();
+    protected final Mac mac = new Poly1305Mac();
+    protected Mode mode;
+
+    public ChaCha20Cipher() {
+        // empty
+    }
+
+    @Override
+    public String getAlgorithm() {
+        return "ChaCha20";
+    }
+
+    @Override
+    public void init(Mode mode, byte[] key, byte[] iv) throws Exception {
+        this.mode = mode;
+
+        bodyEngine.initKey(Arrays.copyOfRange(key, 0, 32));
+        bodyEngine.initNonce(iv);
+        mac.init(bodyEngine.polyKey());
+
+        headerEngine.initKey(Arrays.copyOfRange(key, 32, 64));
+        headerEngine.initNonce(iv);
+        headerEngine.initCounter(0);
+    }
+
+    @Override
+    public void updateAAD(byte[] data, int offset, int length) throws 
Exception {
+        ValidateUtils.checkState(mode != null, "Cipher not initialized");
+        ValidateUtils.checkTrue(length == 4, "AAD only supported for encrypted 
packet length");
+
+        if (mode == Mode.Decrypt) {
+            mac.update(data, offset, length);
+        }
+
+        headerEngine.crypt(data, offset, length, data, offset);
+
+        if (mode == Mode.Encrypt) {
+            mac.update(data, offset, length);
+        }
+    }
+
+    @Override
+    public void update(byte[] input, int inputOffset, int inputLen) throws 
Exception {
+        ValidateUtils.checkState(mode != null, "Cipher not initialized");
+
+        if (mode == Mode.Decrypt) {
+            mac.update(input, inputOffset, inputLen);
+            byte[] actual = mac.doFinal();
+            if (!Mac.equals(input, inputOffset + inputLen, actual, 0, 
actual.length)) {
+                throw new AEADBadTagException("Tag mismatch");
+            }
+        }
+
+        bodyEngine.crypt(input, inputOffset, inputLen, input, inputOffset);
+
+        if (mode == Mode.Encrypt) {
+            mac.update(input, inputOffset, inputLen);
+            mac.doFinal(input, inputOffset + inputLen);
+        }
+
+        headerEngine.advanceNonce();
+        headerEngine.initCounter(0);
+        bodyEngine.advanceNonce();
+        mac.init(bodyEngine.polyKey());
+    }
+
+    @Override
+    public String getTransformation() {
+        return "ChaCha20";
+    }
+
+    @Override
+    public int getIVSize() {
+        return 8;
+    }
+
+    @Override
+    public int getAuthenticationTagSize() {
+        return 16;
+    }
+
+    @Override
+    public int getCipherBlockSize() {
+        return 8;
+    }
+
+    @Override
+    public int getKdfSize() {
+        return 64;
+    }
+
+    @Override
+    public int getKeySize() {
+        return 256;
+    }
+
+    protected static class ChaChaEngine {
+        private static final int BLOCK_BYTES = 64;
+        private static final int BLOCK_INTS = BLOCK_BYTES / Integer.BYTES;
+        private static final int KEY_OFFSET = 4;
+        private static final int KEY_BYTES = 32;
+        private static final int KEY_INTS = KEY_BYTES / Integer.BYTES;
+        private static final int COUNTER_OFFSET = 12;
+        private static final int NONCE_OFFSET = 14;
+        private static final int NONCE_BYTES = 8;
+        private static final int NONCE_INTS = NONCE_BYTES / Integer.BYTES;
+        private static final int[] ENGINE_STATE_HEADER
+                = unpackSigmaString("expand 32-byte 
k".getBytes(StandardCharsets.US_ASCII));
+
+        protected final int[] x = new int[BLOCK_INTS];
+        protected final int[] engineState = new int[BLOCK_INTS];
+        protected final byte[] nonce = new byte[NONCE_BYTES];
+        protected long initialNonce;
+
+        protected ChaChaEngine() {
+            System.arraycopy(ENGINE_STATE_HEADER, 0, engineState, 0, 4);
+        }
+
+        protected void initKey(byte[] key) {
+            unpackIntsLE(key, 0, KEY_INTS, engineState, KEY_OFFSET);
+        }
+
+        protected void initNonce(byte[] nonce) {
+            initialNonce = BufferUtils.getLong(nonce, 0, 
NumberUtils.length(nonce));
+            unpackIntsLE(nonce, 0, NONCE_INTS, engineState, NONCE_OFFSET);
+            System.arraycopy(nonce, 0, this.nonce, 0, NONCE_BYTES);
+        }
+
+        protected void advanceNonce() {
+            long counter = BufferUtils.getLong(nonce, 0, NONCE_BYTES) + 1;
+            ValidateUtils.checkState(counter != initialNonce, "Packet sequence 
number cannot be reused with the same key");
+            BufferUtils.putLong(counter, nonce, 0, NONCE_BYTES);
+            unpackIntsLE(nonce, 0, NONCE_INTS, engineState, NONCE_OFFSET);
+        }
+
+        protected void initCounter(long counter) {
+            engineState[COUNTER_OFFSET] = (int) counter;
+            engineState[COUNTER_OFFSET + 1] = (int) (counter >>> Integer.SIZE);
+        }
+
+        // one-shot usage
+        protected void crypt(byte[] in, int offset, int length, byte[] out, 
int outOffset) {
+            while (length > 0) {
+                System.arraycopy(engineState, 0, x, 0, BLOCK_INTS);
+                permute(x);
+                int want = Math.min(BLOCK_BYTES, length);
+                for (int i = 0, j = 0; i < want; i += Integer.BYTES, j++) {
+                    int keyStream = engineState[j] + x[j];
+                    int take = Math.min(Integer.BYTES, length);
+                    int input = unpackIntLE(in, offset, take);
+                    int output = keyStream ^ input;
+                    packIntLE(output, out, outOffset, take);
+                    offset += take;
+                    outOffset += take;
+                    length -= take;
+                }
+                int lo = ++engineState[COUNTER_OFFSET];
+                if (lo == 0) {
+                    // overflow
+                    ++engineState[COUNTER_OFFSET + 1];
+                }
+            }
+        }
+
+        protected byte[] polyKey() {
+            byte[] block = new byte[32];

Review comment:
       Can't we just `return block;` below?

##########
File path: sshd-common/src/main/java/org/apache/sshd/common/mac/Poly1305Mac.java
##########
@@ -0,0 +1,269 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+package org.apache.sshd.common.mac;
+
+import java.nio.BufferOverflowException;
+import java.security.InvalidKeyException;
+import java.util.Arrays;
+
+import org.apache.sshd.common.util.NumberUtils;
+import org.apache.sshd.common.util.buffer.BufferUtils;
+
+/**
+ * Poly1305 one-time message authentication code. This implementation is 
derived from the public domain C library
+ * <a href="https://github.com/floodyberry/poly1305-donna";>poly1305-donna</a>.
+ *
+ * @see <a href="http://cr.yp.to/mac/poly1305-20050329.pdf";>The Poly1305-AES 
message-authentication code</a>
+ */
+public class Poly1305Mac implements Mac {
+    private static final int BLOCK_SIZE = 16;
+
+    private int r0;
+    private int r1;
+    private int r2;
+    private int r3;
+    private int r4;
+    private int s1;
+    private int s2;
+    private int s3;
+    private int s4;
+    private int k0;
+    private int k1;
+    private int k2;
+    private int k3;
+
+    private int h0;
+    private int h1;
+    private int h2;
+    private int h3;
+    private int h4;
+    private final byte[] currentBlock = new byte[BLOCK_SIZE];
+    private int currentBlockOffset;
+
+    public Poly1305Mac() {
+        // empty
+    }
+
+    @Override
+    public String getAlgorithm() {
+        return "Poly1305";
+    }
+
+    @Override
+    public void init(byte[] key) throws Exception {
+        if (NumberUtils.length(key) != 32) {

Review comment:
       Maybe add a Poly1305Mac.KEY_BYTES constant for this 32, and use in 
ChachaEngine.polyKey()?




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Issue Time Tracking
-------------------

    Worklog Id:     (was: 597314)
    Time Spent: 3.5h  (was: 3h 20m)

> Add support for chacha20-poly1...@openssh.com
> ---------------------------------------------
>
>                 Key: SSHD-1017
>                 URL: https://issues.apache.org/jira/browse/SSHD-1017
>             Project: MINA SSHD
>          Issue Type: New Feature
>            Reporter: Matt Sicker
>            Priority: Major
>          Time Spent: 3.5h
>  Remaining Estimate: 0h
>
> See [protocol 
> details|https://github.com/openbsd/src/blob/master/usr.bin/ssh/PROTOCOL.chacha20poly1305].
> * [RFC 7539|https://tools.ietf.org/html/rfc7539] describes the 
> ChaCha20-Poly1305 algorithm.
> * [Dropbear 
> implementation|https://github.com/mkj/dropbear/blob/master/chachapoly.c]
> * [OpenSSH 
> implementation|https://github.com/openbsd/src/blob/master/usr.bin/ssh/cipher-chachapoly-libcrypto.c]
> The cipher is provided by Bouncycastle.
> As a bonus, this could potentially be adapted to propose an equivalent 
> AES/GCM cipher encoding to how OpenSSH implements this ChaCha20-Poly1305 
> cipher.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org

Reply via email to