/* * Copyright 2014-2024 The GmSSL Project. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the License); you may * not use this file except in compliance with the License. * * http://www.apache.org/licenses/LICENSE-2.0 */ #include #include #include #include #include #include #include void aes_cbc_encrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t nblocks, uint8_t *out) { while (nblocks--) { gmssl_memxor(out, in, iv, 16); aes_encrypt(key, out, out); iv = out; in += 16; out += 16; } } void aes_cbc_decrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t nblocks, uint8_t *out) { while (nblocks--) { aes_decrypt(key, in, out); memxor(out, iv, 16); iv = in; in += 16; out += 16; } } int aes_cbc_padding_encrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t inlen, uint8_t *out, size_t *outlen) { uint8_t block[16]; size_t rem = inlen % 16; int padding = 16 - inlen % 16; if (in) { memcpy(block, in + inlen - rem, rem); } memset(block + rem, padding, padding); if (inlen/16) { aes_cbc_encrypt(key, iv, in, inlen/16, out); out += inlen - rem; iv = out - 16; } aes_cbc_encrypt(key, iv, block, 1, out); *outlen = inlen - rem + 16; return 1; } int aes_cbc_padding_decrypt(const AES_KEY *key, const uint8_t iv[16], const uint8_t *in, size_t inlen, uint8_t *out, size_t *outlen) { uint8_t block[16]; size_t len = sizeof(block); int padding; if (inlen == 0) { error_print(); return 0; } if (inlen%16 != 0 || inlen < 16) { error_print(); return -1; } if (inlen > 16) { aes_cbc_decrypt(key, iv, in, inlen/16 - 1, out); iv = in + inlen - 32; } aes_cbc_decrypt(key, iv, in + inlen - 16, 1, block); padding = block[15]; if (padding < 1 || padding > 16) { error_print(); return -1; } len -= padding; memcpy(out + inlen - 16, block, len); *outlen = inlen - padding; return 1; } static void ctr_incr(uint8_t a[16]) { int i; for (i = 15; i >= 0; i--) { a[i]++; if (a[i]) break; } } void aes_ctr_encrypt(const AES_KEY *key, uint8_t ctr[16], const uint8_t *in, size_t inlen, uint8_t *out) { uint8_t block[16]; size_t len; while (inlen) { len = inlen < 16 ? inlen : 16; aes_encrypt(key, ctr, block); gmssl_memxor(out, in, block, len); ctr_incr(ctr); in += len; out += len; inlen -= len; } } static void ctr32_incr(uint8_t a[16]) { int i; for (i = 15; i >= 12; i--) { a[i]++; if (a[i]) break; } } static void aes_ctr32_encrypt(const AES_KEY *key, uint8_t ctr[16], const uint8_t *in, size_t inlen, uint8_t *out) { uint8_t block[16]; size_t len; while (inlen) { len = inlen < 16 ? inlen : 16; aes_encrypt(key, ctr, block); gmssl_memxor(out, in, block, len); ctr32_incr(ctr); in += len; out += len; inlen -= len; } } int aes_gcm_encrypt(const AES_KEY *key, const uint8_t *iv, size_t ivlen, const uint8_t *aad, size_t aadlen, const uint8_t *in, size_t inlen, uint8_t *out, size_t taglen, uint8_t *tag) { const uint8_t *pin = in; uint8_t *pout = out; size_t left = inlen; uint8_t H[16] = {0}; uint8_t Y[16]; uint8_t T[16]; if (taglen > AES_GCM_MAX_TAG_SIZE) { error_print(); return -1; } aes_encrypt(key, H, H); if (ivlen == 12) { memcpy(Y, iv, 12); Y[12] = Y[13] = Y[14] = 0; Y[15] = 1; } else { ghash(H, NULL, 0, iv, ivlen, Y); } aes_encrypt(key, Y, T); ctr32_incr(Y); aes_ctr32_encrypt(key, Y, in, inlen, out); ghash(H, aad, aadlen, out, inlen, H); gmssl_memxor(tag, T, H, taglen); return 1; } int aes_gcm_decrypt(const AES_KEY *key, const uint8_t *iv, size_t ivlen, const uint8_t *aad, size_t aadlen, const uint8_t *in, size_t inlen, const uint8_t *tag, size_t taglen, uint8_t *out) { const uint8_t *pin = in; uint8_t *pout = out; size_t left = inlen; uint8_t H[16] = {0}; uint8_t Y[16]; uint8_t T[16]; aes_encrypt(key, H, H); if (ivlen == 12) { memcpy(Y, iv, 12); Y[12] = Y[13] = Y[14] = 0; Y[15] = 1; } else { ghash(H, NULL, 0, iv, ivlen, Y); } ghash(H, aad, aadlen, in, inlen, H); aes_encrypt(key, Y, T); gmssl_memxor(T, T, H, taglen); if (memcmp(T, tag, taglen) != 0) { error_print(); return -1; } ctr32_incr(Y); aes_ctr32_encrypt(key, Y, in, inlen, out); return 1; }