/* * Copyright (c) 2014 - 2020 The GmSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the GmSSL Project. * (http://gmssl.org/)" * * 4. The name "GmSSL Project" must not be used to endorse or promote * products derived from this software without prior written * permission. For written permission, please contact * guanzhi1980@gmail.com. * * 5. Products derived from this software may not be called "GmSSL" * nor may "GmSSL" appear in their names without prior written * permission of the GmSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the GmSSL Project * (http://gmssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include #include #include #include #include #include void aes_cbc_encrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t nblocks, uint8_t *out) { while (nblocks--) { gmssl_memxor(out, in, iv, 16); aes_encrypt(key, out, out); iv = out; in += 16; out += 16; } } void aes_cbc_decrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t nblocks, uint8_t *out) { while (nblocks--) { aes_decrypt(key, in, out); memxor(out, iv, 16); iv = in; in += 16; out += 16; } } int aes_cbc_padding_encrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t inlen, uint8_t *out, size_t *outlen) { uint8_t block[16]; size_t rem = inlen % 16; int padding = 16 - inlen % 16; if (in) { memcpy(block, in + inlen - rem, rem); } memset(block + rem, padding, padding); if (inlen/16) { aes_cbc_encrypt(key, iv, in, inlen/16, out); out += inlen - rem; iv = out - 16; } aes_cbc_encrypt(key, iv, block, 1, out); *outlen = inlen - rem + 16; return 1; } int aes_cbc_padding_decrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t inlen, uint8_t *out, size_t *outlen) { uint8_t block[16]; size_t len = sizeof(block); int padding; if (inlen == 0) { error_print(); return 0; } if (inlen%16 != 0 || inlen < 16) { error_print(); return -1; } if (inlen > 16) { aes_cbc_decrypt(key, iv, in, inlen/16 - 1, out); iv = in + inlen - 32; } aes_cbc_decrypt(key, iv, in + inlen - 16, 1, block); padding = block[15]; if (padding < 1 || padding > 16) { error_print(); return -1; } len -= padding; memcpy(out + inlen - 16, block, len); *outlen = inlen - padding; return 1; } static void ctr_incr(uint8_t a[16]) { int i; for (i = 15; i > 0; i--) { a[i]++; if (a[i]) break; } } void aes_ctr_encrypt(const AES_KEY *key, uint8_t ctr[16], const uint8_t *in, size_t inlen, uint8_t *out) { uint8_t block[16]; size_t len; while (inlen) { len = inlen < 16 ? inlen : 16; aes_encrypt(key, ctr, block); gmssl_memxor(out, in, block, len); ctr_incr(ctr); in += len; out += len; inlen -= len; } } int aes_gcm_encrypt(const AES_KEY *key, const uint8_t *iv, size_t ivlen, const uint8_t *aad, size_t aadlen, const uint8_t *in, size_t inlen, uint8_t *out, size_t taglen, uint8_t *tag) { const uint8_t *pin = in; uint8_t *pout = out; size_t left = inlen; uint8_t H[16] = {0}; uint8_t Y[16]; uint8_t T[16]; if (taglen > AES_GCM_MAX_TAG_SIZE) { error_print(); return -1; } aes_encrypt(key, H, H); if (ivlen == 12) { memcpy(Y, iv, 12); Y[12] = Y[13] = Y[14] = 0; Y[15] = 1; } else { ghash(H, NULL, 0, iv, ivlen, Y); } aes_encrypt(key, Y, T); while (left) { uint8_t block[16]; size_t len = left < 16 ? left : 16; ctr_incr(Y); aes_encrypt(key, Y, block); gmssl_memxor(pout, pin, block, len); pin += len; pout += len; left -= len; } ghash(H, aad, aadlen, out, inlen, H); gmssl_memxor(tag, T, H, taglen); return 1; } int aes_gcm_decrypt(const AES_KEY *key, const uint8_t *iv, size_t ivlen, const uint8_t *aad, size_t aadlen, const uint8_t *in, size_t inlen, const uint8_t *tag, size_t taglen, uint8_t *out) { const uint8_t *pin = in; uint8_t *pout = out; size_t left = inlen; uint8_t H[16] = {0}; uint8_t Y[16]; uint8_t T[16]; aes_encrypt(key, H, H); if (ivlen == 12) { memcpy(Y, iv, 12); Y[12] = Y[13] = Y[14] = 0; Y[15] = 1; } else { ghash(H, NULL, 0, iv, ivlen, Y); } ghash(H, aad, aadlen, in, inlen, H); aes_encrypt(key, Y, T); gmssl_memxor(T, T, H, taglen); if (memcmp(T, tag, taglen) != 0) { error_print(); return -1; } while (left) { uint8_t block[16]; size_t len = left < 16 ? left : 16; ctr_incr(Y); aes_encrypt(key, Y, block); gmssl_memxor(pout, pin, block, len); pin += len; pout += len; left -= len; } return 1; }