mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-06 16:36:16 +08:00
220 lines
4.3 KiB
C
220 lines
4.3 KiB
C
/*
|
|
* Copyright 2014-2024 The GmSSL Project. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the License); you may
|
|
* not use this file except in compliance with the License.
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include <gmssl/aes.h>
|
|
#include <gmssl/mem.h>
|
|
#include <gmssl/ghash.h>
|
|
#include <gmssl/error.h>
|
|
|
|
|
|
void aes_cbc_encrypt(const AES_KEY *key, const uint8_t iv[16],
|
|
const uint8_t *in, size_t nblocks, uint8_t *out)
|
|
{
|
|
while (nblocks--) {
|
|
gmssl_memxor(out, in, iv, 16);
|
|
aes_encrypt(key, out, out);
|
|
iv = out;
|
|
in += 16;
|
|
out += 16;
|
|
}
|
|
}
|
|
|
|
void aes_cbc_decrypt(const AES_KEY *key, const uint8_t iv[16],
|
|
const uint8_t *in, size_t nblocks, uint8_t *out)
|
|
{
|
|
while (nblocks--) {
|
|
aes_decrypt(key, in, out);
|
|
memxor(out, iv, 16);
|
|
iv = in;
|
|
in += 16;
|
|
out += 16;
|
|
}
|
|
}
|
|
|
|
int aes_cbc_padding_encrypt(const AES_KEY *key, const uint8_t iv[16],
|
|
const uint8_t *in, size_t inlen,
|
|
uint8_t *out, size_t *outlen)
|
|
{
|
|
uint8_t block[16];
|
|
size_t rem = inlen % 16;
|
|
int padding = 16 - inlen % 16;
|
|
|
|
if (in) {
|
|
memcpy(block, in + inlen - rem, rem);
|
|
}
|
|
memset(block + rem, padding, padding);
|
|
if (inlen/16) {
|
|
aes_cbc_encrypt(key, iv, in, inlen/16, out);
|
|
out += inlen - rem;
|
|
iv = out - 16;
|
|
}
|
|
aes_cbc_encrypt(key, iv, block, 1, out);
|
|
*outlen = inlen - rem + 16;
|
|
return 1;
|
|
}
|
|
|
|
int aes_cbc_padding_decrypt(const AES_KEY *key, const uint8_t iv[16],
|
|
const uint8_t *in, size_t inlen,
|
|
uint8_t *out, size_t *outlen)
|
|
{
|
|
uint8_t block[16];
|
|
size_t len = sizeof(block);
|
|
int padding;
|
|
|
|
if (inlen == 0) {
|
|
error_print();
|
|
return 0;
|
|
}
|
|
if (inlen%16 != 0 || inlen < 16) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (inlen > 16) {
|
|
aes_cbc_decrypt(key, iv, in, inlen/16 - 1, out);
|
|
iv = in + inlen - 32;
|
|
}
|
|
aes_cbc_decrypt(key, iv, in + inlen - 16, 1, block);
|
|
padding = block[15];
|
|
if (padding < 1 || padding > 16) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
len -= padding;
|
|
memcpy(out + inlen - 16, block, len);
|
|
*outlen = inlen - padding;
|
|
return 1;
|
|
}
|
|
|
|
static void ctr_incr(uint8_t a[16])
|
|
{
|
|
int i;
|
|
for (i = 15; i >= 0; i--) {
|
|
a[i]++;
|
|
if (a[i]) break;
|
|
}
|
|
}
|
|
|
|
void aes_ctr_encrypt(const AES_KEY *key, uint8_t ctr[16], const uint8_t *in, size_t inlen, uint8_t *out)
|
|
{
|
|
uint8_t block[16];
|
|
size_t len;
|
|
|
|
while (inlen) {
|
|
len = inlen < 16 ? inlen : 16;
|
|
aes_encrypt(key, ctr, block);
|
|
gmssl_memxor(out, in, block, len);
|
|
ctr_incr(ctr);
|
|
in += len;
|
|
out += len;
|
|
inlen -= len;
|
|
}
|
|
}
|
|
|
|
|
|
static void ctr32_incr(uint8_t a[16])
|
|
{
|
|
int i;
|
|
for (i = 15; i >= 12; i--) {
|
|
a[i]++;
|
|
if (a[i]) break;
|
|
}
|
|
}
|
|
|
|
static void aes_ctr32_encrypt(const AES_KEY *key, uint8_t ctr[16], const uint8_t *in, size_t inlen, uint8_t *out)
|
|
{
|
|
uint8_t block[16];
|
|
size_t len;
|
|
|
|
while (inlen) {
|
|
len = inlen < 16 ? inlen : 16;
|
|
aes_encrypt(key, ctr, block);
|
|
gmssl_memxor(out, in, block, len);
|
|
ctr32_incr(ctr);
|
|
in += len;
|
|
out += len;
|
|
inlen -= len;
|
|
}
|
|
}
|
|
|
|
int aes_gcm_encrypt(const AES_KEY *key, const uint8_t *iv, size_t ivlen,
|
|
const uint8_t *aad, size_t aadlen, const uint8_t *in, size_t inlen,
|
|
uint8_t *out, size_t taglen, uint8_t *tag)
|
|
{
|
|
const uint8_t *pin = in;
|
|
uint8_t *pout = out;
|
|
size_t left = inlen;
|
|
uint8_t H[16] = {0};
|
|
uint8_t Y[16];
|
|
uint8_t T[16];
|
|
|
|
if (taglen > AES_GCM_MAX_TAG_SIZE) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
|
|
aes_encrypt(key, H, H);
|
|
|
|
if (ivlen == 12) {
|
|
memcpy(Y, iv, 12);
|
|
Y[12] = Y[13] = Y[14] = 0;
|
|
Y[15] = 1;
|
|
} else {
|
|
ghash(H, NULL, 0, iv, ivlen, Y);
|
|
}
|
|
|
|
aes_encrypt(key, Y, T);
|
|
|
|
ctr32_incr(Y);
|
|
aes_ctr32_encrypt(key, Y, in, inlen, out);
|
|
|
|
ghash(H, aad, aadlen, out, inlen, H);
|
|
gmssl_memxor(tag, T, H, taglen);
|
|
return 1;
|
|
}
|
|
|
|
int aes_gcm_decrypt(const AES_KEY *key, const uint8_t *iv, size_t ivlen,
|
|
const uint8_t *aad, size_t aadlen, const uint8_t *in, size_t inlen,
|
|
const uint8_t *tag, size_t taglen, uint8_t *out)
|
|
{
|
|
const uint8_t *pin = in;
|
|
uint8_t *pout = out;
|
|
size_t left = inlen;
|
|
uint8_t H[16] = {0};
|
|
uint8_t Y[16];
|
|
uint8_t T[16];
|
|
|
|
aes_encrypt(key, H, H);
|
|
|
|
if (ivlen == 12) {
|
|
memcpy(Y, iv, 12);
|
|
Y[12] = Y[13] = Y[14] = 0;
|
|
Y[15] = 1;
|
|
} else {
|
|
ghash(H, NULL, 0, iv, ivlen, Y);
|
|
}
|
|
|
|
ghash(H, aad, aadlen, in, inlen, H);
|
|
aes_encrypt(key, Y, T);
|
|
gmssl_memxor(T, T, H, taglen);
|
|
if (memcmp(T, tag, taglen) != 0) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
|
|
ctr32_incr(Y);
|
|
aes_ctr32_encrypt(key, Y, in, inlen, out);
|
|
|
|
return 1;
|
|
}
|