123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268 |
- # This file is dual licensed under the terms of the Apache License, Version
- # 2.0, and the BSD License. See the LICENSE file in the root of this repository
- # for complete details.
- from __future__ import annotations
- import abc
- from cryptography import utils
- from cryptography.exceptions import UnsupportedAlgorithm, _Reasons
- from cryptography.hazmat.primitives._cipheralgorithm import (
- BlockCipherAlgorithm,
- CipherAlgorithm,
- )
- from cryptography.hazmat.primitives.ciphers import algorithms
- class Mode(metaclass=abc.ABCMeta):
- @property
- @abc.abstractmethod
- def name(self) -> str:
- """
- A string naming this mode (e.g. "ECB", "CBC").
- """
- @abc.abstractmethod
- def validate_for_algorithm(self, algorithm: CipherAlgorithm) -> None:
- """
- Checks that all the necessary invariants of this (mode, algorithm)
- combination are met.
- """
- class ModeWithInitializationVector(Mode, metaclass=abc.ABCMeta):
- @property
- @abc.abstractmethod
- def initialization_vector(self) -> bytes:
- """
- The value of the initialization vector for this mode as bytes.
- """
- class ModeWithTweak(Mode, metaclass=abc.ABCMeta):
- @property
- @abc.abstractmethod
- def tweak(self) -> bytes:
- """
- The value of the tweak for this mode as bytes.
- """
- class ModeWithNonce(Mode, metaclass=abc.ABCMeta):
- @property
- @abc.abstractmethod
- def nonce(self) -> bytes:
- """
- The value of the nonce for this mode as bytes.
- """
- class ModeWithAuthenticationTag(Mode, metaclass=abc.ABCMeta):
- @property
- @abc.abstractmethod
- def tag(self) -> bytes | None:
- """
- The value of the tag supplied to the constructor of this mode.
- """
- def _check_aes_key_length(self: Mode, algorithm: CipherAlgorithm) -> None:
- if algorithm.key_size > 256 and algorithm.name == "AES":
- raise ValueError(
- "Only 128, 192, and 256 bit keys are allowed for this AES mode"
- )
- def _check_iv_length(
- self: ModeWithInitializationVector, algorithm: BlockCipherAlgorithm
- ) -> None:
- iv_len = len(self.initialization_vector)
- if iv_len * 8 != algorithm.block_size:
- raise ValueError(f"Invalid IV size ({iv_len}) for {self.name}.")
- def _check_nonce_length(
- nonce: bytes, name: str, algorithm: CipherAlgorithm
- ) -> None:
- if not isinstance(algorithm, BlockCipherAlgorithm):
- raise UnsupportedAlgorithm(
- f"{name} requires a block cipher algorithm",
- _Reasons.UNSUPPORTED_CIPHER,
- )
- if len(nonce) * 8 != algorithm.block_size:
- raise ValueError(f"Invalid nonce size ({len(nonce)}) for {name}.")
- def _check_iv_and_key_length(
- self: ModeWithInitializationVector, algorithm: CipherAlgorithm
- ) -> None:
- if not isinstance(algorithm, BlockCipherAlgorithm):
- raise UnsupportedAlgorithm(
- f"{self} requires a block cipher algorithm",
- _Reasons.UNSUPPORTED_CIPHER,
- )
- _check_aes_key_length(self, algorithm)
- _check_iv_length(self, algorithm)
- class CBC(ModeWithInitializationVector):
- name = "CBC"
- def __init__(self, initialization_vector: bytes):
- utils._check_byteslike("initialization_vector", initialization_vector)
- self._initialization_vector = initialization_vector
- @property
- def initialization_vector(self) -> bytes:
- return self._initialization_vector
- validate_for_algorithm = _check_iv_and_key_length
- class XTS(ModeWithTweak):
- name = "XTS"
- def __init__(self, tweak: bytes):
- utils._check_byteslike("tweak", tweak)
- if len(tweak) != 16:
- raise ValueError("tweak must be 128-bits (16 bytes)")
- self._tweak = tweak
- @property
- def tweak(self) -> bytes:
- return self._tweak
- def validate_for_algorithm(self, algorithm: CipherAlgorithm) -> None:
- if isinstance(algorithm, (algorithms.AES128, algorithms.AES256)):
- raise TypeError(
- "The AES128 and AES256 classes do not support XTS, please use "
- "the standard AES class instead."
- )
- if algorithm.key_size not in (256, 512):
- raise ValueError(
- "The XTS specification requires a 256-bit key for AES-128-XTS"
- " and 512-bit key for AES-256-XTS"
- )
- class ECB(Mode):
- name = "ECB"
- validate_for_algorithm = _check_aes_key_length
- class OFB(ModeWithInitializationVector):
- name = "OFB"
- def __init__(self, initialization_vector: bytes):
- utils._check_byteslike("initialization_vector", initialization_vector)
- self._initialization_vector = initialization_vector
- @property
- def initialization_vector(self) -> bytes:
- return self._initialization_vector
- validate_for_algorithm = _check_iv_and_key_length
- class CFB(ModeWithInitializationVector):
- name = "CFB"
- def __init__(self, initialization_vector: bytes):
- utils._check_byteslike("initialization_vector", initialization_vector)
- self._initialization_vector = initialization_vector
- @property
- def initialization_vector(self) -> bytes:
- return self._initialization_vector
- validate_for_algorithm = _check_iv_and_key_length
- class CFB8(ModeWithInitializationVector):
- name = "CFB8"
- def __init__(self, initialization_vector: bytes):
- utils._check_byteslike("initialization_vector", initialization_vector)
- self._initialization_vector = initialization_vector
- @property
- def initialization_vector(self) -> bytes:
- return self._initialization_vector
- validate_for_algorithm = _check_iv_and_key_length
- class CTR(ModeWithNonce):
- name = "CTR"
- def __init__(self, nonce: bytes):
- utils._check_byteslike("nonce", nonce)
- self._nonce = nonce
- @property
- def nonce(self) -> bytes:
- return self._nonce
- def validate_for_algorithm(self, algorithm: CipherAlgorithm) -> None:
- _check_aes_key_length(self, algorithm)
- _check_nonce_length(self.nonce, self.name, algorithm)
- class GCM(ModeWithInitializationVector, ModeWithAuthenticationTag):
- name = "GCM"
- _MAX_ENCRYPTED_BYTES = (2**39 - 256) // 8
- _MAX_AAD_BYTES = (2**64) // 8
- def __init__(
- self,
- initialization_vector: bytes,
- tag: bytes | None = None,
- min_tag_length: int = 16,
- ):
- # OpenSSL 3.0.0 constrains GCM IVs to [64, 1024] bits inclusive
- # This is a sane limit anyway so we'll enforce it here.
- utils._check_byteslike("initialization_vector", initialization_vector)
- if len(initialization_vector) < 8 or len(initialization_vector) > 128:
- raise ValueError(
- "initialization_vector must be between 8 and 128 bytes (64 "
- "and 1024 bits)."
- )
- self._initialization_vector = initialization_vector
- if tag is not None:
- utils._check_bytes("tag", tag)
- if min_tag_length < 4:
- raise ValueError("min_tag_length must be >= 4")
- if len(tag) < min_tag_length:
- raise ValueError(
- f"Authentication tag must be {min_tag_length} bytes or "
- "longer."
- )
- self._tag = tag
- self._min_tag_length = min_tag_length
- @property
- def tag(self) -> bytes | None:
- return self._tag
- @property
- def initialization_vector(self) -> bytes:
- return self._initialization_vector
- def validate_for_algorithm(self, algorithm: CipherAlgorithm) -> None:
- _check_aes_key_length(self, algorithm)
- if not isinstance(algorithm, BlockCipherAlgorithm):
- raise UnsupportedAlgorithm(
- "GCM requires a block cipher algorithm",
- _Reasons.UNSUPPORTED_CIPHER,
- )
- block_size_bytes = algorithm.block_size // 8
- if self._tag is not None and len(self._tag) > block_size_bytes:
- raise ValueError(
- f"Authentication tag cannot be more than {block_size_bytes} "
- "bytes."
- )
|