modes.py 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223
  1. # This file is dual licensed under the terms of the Apache License, Version
  2. # 2.0, and the BSD License. See the LICENSE file in the root of this repository
  3. # for complete details.
  4. from __future__ import absolute_import, division, print_function
  5. import abc
  6. import six
  7. from cryptography import utils
  8. @six.add_metaclass(abc.ABCMeta)
  9. class Mode(object):
  10. @abc.abstractproperty
  11. def name(self):
  12. """
  13. A string naming this mode (e.g. "ECB", "CBC").
  14. """
  15. @abc.abstractmethod
  16. def validate_for_algorithm(self, algorithm):
  17. """
  18. Checks that all the necessary invariants of this (mode, algorithm)
  19. combination are met.
  20. """
  21. @six.add_metaclass(abc.ABCMeta)
  22. class ModeWithInitializationVector(object):
  23. @abc.abstractproperty
  24. def initialization_vector(self):
  25. """
  26. The value of the initialization vector for this mode as bytes.
  27. """
  28. @six.add_metaclass(abc.ABCMeta)
  29. class ModeWithTweak(object):
  30. @abc.abstractproperty
  31. def tweak(self):
  32. """
  33. The value of the tweak for this mode as bytes.
  34. """
  35. @six.add_metaclass(abc.ABCMeta)
  36. class ModeWithNonce(object):
  37. @abc.abstractproperty
  38. def nonce(self):
  39. """
  40. The value of the nonce for this mode as bytes.
  41. """
  42. @six.add_metaclass(abc.ABCMeta)
  43. class ModeWithAuthenticationTag(object):
  44. @abc.abstractproperty
  45. def tag(self):
  46. """
  47. The value of the tag supplied to the constructor of this mode.
  48. """
  49. def _check_aes_key_length(self, algorithm):
  50. if algorithm.key_size > 256 and algorithm.name == "AES":
  51. raise ValueError(
  52. "Only 128, 192, and 256 bit keys are allowed for this AES mode"
  53. )
  54. def _check_iv_length(self, algorithm):
  55. if len(self.initialization_vector) * 8 != algorithm.block_size:
  56. raise ValueError(
  57. "Invalid IV size ({}) for {}.".format(
  58. len(self.initialization_vector), self.name
  59. )
  60. )
  61. def _check_iv_and_key_length(self, algorithm):
  62. _check_aes_key_length(self, algorithm)
  63. _check_iv_length(self, algorithm)
  64. @utils.register_interface(Mode)
  65. @utils.register_interface(ModeWithInitializationVector)
  66. class CBC(object):
  67. name = "CBC"
  68. def __init__(self, initialization_vector):
  69. utils._check_byteslike("initialization_vector", initialization_vector)
  70. self._initialization_vector = initialization_vector
  71. initialization_vector = utils.read_only_property("_initialization_vector")
  72. validate_for_algorithm = _check_iv_and_key_length
  73. @utils.register_interface(Mode)
  74. @utils.register_interface(ModeWithTweak)
  75. class XTS(object):
  76. name = "XTS"
  77. def __init__(self, tweak):
  78. utils._check_byteslike("tweak", tweak)
  79. if len(tweak) != 16:
  80. raise ValueError("tweak must be 128-bits (16 bytes)")
  81. self._tweak = tweak
  82. tweak = utils.read_only_property("_tweak")
  83. def validate_for_algorithm(self, algorithm):
  84. if algorithm.key_size not in (256, 512):
  85. raise ValueError(
  86. "The XTS specification requires a 256-bit key for AES-128-XTS"
  87. " and 512-bit key for AES-256-XTS"
  88. )
  89. @utils.register_interface(Mode)
  90. class ECB(object):
  91. name = "ECB"
  92. validate_for_algorithm = _check_aes_key_length
  93. @utils.register_interface(Mode)
  94. @utils.register_interface(ModeWithInitializationVector)
  95. class OFB(object):
  96. name = "OFB"
  97. def __init__(self, initialization_vector):
  98. utils._check_byteslike("initialization_vector", initialization_vector)
  99. self._initialization_vector = initialization_vector
  100. initialization_vector = utils.read_only_property("_initialization_vector")
  101. validate_for_algorithm = _check_iv_and_key_length
  102. @utils.register_interface(Mode)
  103. @utils.register_interface(ModeWithInitializationVector)
  104. class CFB(object):
  105. name = "CFB"
  106. def __init__(self, initialization_vector):
  107. utils._check_byteslike("initialization_vector", initialization_vector)
  108. self._initialization_vector = initialization_vector
  109. initialization_vector = utils.read_only_property("_initialization_vector")
  110. validate_for_algorithm = _check_iv_and_key_length
  111. @utils.register_interface(Mode)
  112. @utils.register_interface(ModeWithInitializationVector)
  113. class CFB8(object):
  114. name = "CFB8"
  115. def __init__(self, initialization_vector):
  116. utils._check_byteslike("initialization_vector", initialization_vector)
  117. self._initialization_vector = initialization_vector
  118. initialization_vector = utils.read_only_property("_initialization_vector")
  119. validate_for_algorithm = _check_iv_and_key_length
  120. @utils.register_interface(Mode)
  121. @utils.register_interface(ModeWithNonce)
  122. class CTR(object):
  123. name = "CTR"
  124. def __init__(self, nonce):
  125. utils._check_byteslike("nonce", nonce)
  126. self._nonce = nonce
  127. nonce = utils.read_only_property("_nonce")
  128. def validate_for_algorithm(self, algorithm):
  129. _check_aes_key_length(self, algorithm)
  130. if len(self.nonce) * 8 != algorithm.block_size:
  131. raise ValueError(
  132. "Invalid nonce size ({}) for {}.".format(
  133. len(self.nonce), self.name
  134. )
  135. )
  136. @utils.register_interface(Mode)
  137. @utils.register_interface(ModeWithInitializationVector)
  138. @utils.register_interface(ModeWithAuthenticationTag)
  139. class GCM(object):
  140. name = "GCM"
  141. _MAX_ENCRYPTED_BYTES = (2 ** 39 - 256) // 8
  142. _MAX_AAD_BYTES = (2 ** 64) // 8
  143. def __init__(self, initialization_vector, tag=None, min_tag_length=16):
  144. # len(initialization_vector) must in [1, 2 ** 64), but it's impossible
  145. # to actually construct a bytes object that large, so we don't check
  146. # for it
  147. utils._check_byteslike("initialization_vector", initialization_vector)
  148. if len(initialization_vector) == 0:
  149. raise ValueError("initialization_vector must be at least 1 byte")
  150. self._initialization_vector = initialization_vector
  151. if tag is not None:
  152. utils._check_bytes("tag", tag)
  153. if min_tag_length < 4:
  154. raise ValueError("min_tag_length must be >= 4")
  155. if len(tag) < min_tag_length:
  156. raise ValueError(
  157. "Authentication tag must be {} bytes or longer.".format(
  158. min_tag_length
  159. )
  160. )
  161. self._tag = tag
  162. self._min_tag_length = min_tag_length
  163. tag = utils.read_only_property("_tag")
  164. initialization_vector = utils.read_only_property("_initialization_vector")
  165. def validate_for_algorithm(self, algorithm):
  166. _check_aes_key_length(self, algorithm)