181 lines
6.1 KiB
Rust
181 lines
6.1 KiB
Rust
//! Low level AES IGE functionality
|
|
//!
|
|
//! AES ECB, CBC, XTS, CTR, CFB, GCM and other conventional symmetric encryption
|
|
//! modes are found in [`symm`]. This is the implementation of AES IGE.
|
|
//!
|
|
//! Advanced Encryption Standard (AES) provides symmetric key cipher that
|
|
//! the same key is used to encrypt and decrypt data. This implementation
|
|
//! uses 128, 192, or 256 bit keys. This module provides functions to
|
|
//! create a new key with [`new_encrypt`] and perform an encryption/decryption
|
|
//! using that key with [`aes_ige`].
|
|
//!
|
|
//! [`new_encrypt`]: struct.AesKey.html#method.new_encrypt
|
|
//! [`aes_ige`]: fn.aes_ige.html
|
|
//!
|
|
//! The [`symm`] module should be used in preference to this module in most cases.
|
|
//! The IGE block cypher is a non-traditional cipher mode. More traditional AES
|
|
//! encryption methods are found in the [`Crypter`] and [`Cipher`] structs.
|
|
//!
|
|
//! [`symm`]: ../symm/index.html
|
|
//! [`Crypter`]: ../symm/struct.Crypter.html
|
|
//! [`Cipher`]: ../symm/struct.Cipher.html
|
|
//!
|
|
//! # Examples
|
|
//!
|
|
//! ```rust
|
|
//! # extern crate openssl;
|
|
//! extern crate hex;
|
|
//! use openssl::aes::{AesKey, KeyError, aes_ige};
|
|
//! use openssl::symm::Mode;
|
|
//! use hex::FromHex;
|
|
//!
|
|
//! fn decrypt() -> Result<(), KeyError> {
|
|
//! let raw_key = "000102030405060708090A0B0C0D0E0F";
|
|
//! let hex_cipher = "12345678901234561234567890123456";
|
|
//! let randomness = "000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F";
|
|
//! if let (Ok(key_as_u8), Ok(cipher_as_u8), Ok(mut iv_as_u8)) =
|
|
//! (Vec::from_hex(raw_key), Vec::from_hex(hex_cipher), Vec::from_hex(randomness)) {
|
|
//! let key = AesKey::new_encrypt(&key_as_u8)?;
|
|
//! let mut output = vec![0u8; cipher_as_u8.len()];
|
|
//! aes_ige(&cipher_as_u8, &mut output, &key, &mut iv_as_u8, Mode::Encrypt);
|
|
//! assert_eq!(hex::encode(output), "a6ad974d5cea1d36d2f367980907ed32");
|
|
//! }
|
|
//! Ok(())
|
|
//! }
|
|
//!
|
|
//! # fn main() {
|
|
//! # decrypt();
|
|
//! # }
|
|
use ffi;
|
|
use std::mem;
|
|
use libc::c_int;
|
|
|
|
use symm::Mode;
|
|
|
|
/// Provides Error handling for parsing keys.
|
|
#[derive(Debug)]
|
|
pub struct KeyError(());
|
|
|
|
/// The key used to encrypt or decrypt cipher blocks.
|
|
pub struct AesKey(ffi::AES_KEY);
|
|
|
|
impl AesKey {
|
|
/// Prepares a key for encryption.
|
|
///
|
|
/// # Failure
|
|
///
|
|
/// Returns an error if the key is not 128, 192, or 256 bits.
|
|
pub fn new_encrypt(key: &[u8]) -> Result<AesKey, KeyError> {
|
|
unsafe {
|
|
assert!(key.len() <= c_int::max_value() as usize / 8);
|
|
|
|
let mut aes_key = mem::uninitialized();
|
|
let r = ffi::AES_set_encrypt_key(
|
|
key.as_ptr() as *const _,
|
|
key.len() as c_int * 8,
|
|
&mut aes_key,
|
|
);
|
|
if r == 0 {
|
|
Ok(AesKey(aes_key))
|
|
} else {
|
|
Err(KeyError(()))
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Prepares a key for decryption.
|
|
///
|
|
/// # Failure
|
|
///
|
|
/// Returns an error if the key is not 128, 192, or 256 bits.
|
|
pub fn new_decrypt(key: &[u8]) -> Result<AesKey, KeyError> {
|
|
unsafe {
|
|
assert!(key.len() <= c_int::max_value() as usize / 8);
|
|
|
|
let mut aes_key = mem::uninitialized();
|
|
let r = ffi::AES_set_decrypt_key(
|
|
key.as_ptr() as *const _,
|
|
key.len() as c_int * 8,
|
|
&mut aes_key,
|
|
);
|
|
|
|
if r == 0 {
|
|
Ok(AesKey(aes_key))
|
|
} else {
|
|
Err(KeyError(()))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Performs AES IGE encryption or decryption
|
|
///
|
|
/// AES IGE (Infinite Garble Extension) is a form of AES block cipher utilized in
|
|
/// OpenSSL. Infinite Garble referes to propogating forward errors. IGE, like other
|
|
/// block ciphers implemented for AES requires an initalization vector. The IGE mode
|
|
/// allows a stream of blocks to be encrypted or decrypted without having the entire
|
|
/// plaintext available. For more information, visit [AES IGE Encryption].
|
|
///
|
|
/// This block cipher uses 16 byte blocks. The rust implmentation will panic
|
|
/// if the input or output does not meet this 16-byte boundry. Attention must
|
|
/// be made in this low level implementation to pad the value to the 128-bit boundry.
|
|
///
|
|
/// [AES IGE Encryption]: http://www.links.org/files/openssl-ige.pdf
|
|
///
|
|
/// # Panics
|
|
///
|
|
/// Panics if `in_` is not the same length as `out`, if that length is not a multiple of 16, or if
|
|
/// `iv` is not at least 32 bytes.
|
|
pub fn aes_ige(in_: &[u8], out: &mut [u8], key: &AesKey, iv: &mut [u8], mode: Mode) {
|
|
unsafe {
|
|
assert!(in_.len() == out.len());
|
|
assert!(in_.len() % ffi::AES_BLOCK_SIZE as usize == 0);
|
|
assert!(iv.len() >= ffi::AES_BLOCK_SIZE as usize * 2);
|
|
|
|
let mode = match mode {
|
|
Mode::Encrypt => ffi::AES_ENCRYPT,
|
|
Mode::Decrypt => ffi::AES_DECRYPT,
|
|
};
|
|
ffi::AES_ige_encrypt(
|
|
in_.as_ptr() as *const _,
|
|
out.as_mut_ptr() as *mut _,
|
|
in_.len(),
|
|
&key.0,
|
|
iv.as_mut_ptr() as *mut _,
|
|
mode,
|
|
);
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod test {
|
|
use hex::FromHex;
|
|
|
|
use symm::Mode;
|
|
use super::*;
|
|
|
|
// From https://www.mgp25.com/AESIGE/
|
|
#[test]
|
|
fn ige_vector_1() {
|
|
let raw_key = "000102030405060708090A0B0C0D0E0F";
|
|
let raw_iv = "000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F";
|
|
let raw_pt = "0000000000000000000000000000000000000000000000000000000000000000";
|
|
let raw_ct = "1A8519A6557BE652E9DA8E43DA4EF4453CF456B4CA488AA383C79C98B34797CB";
|
|
|
|
let key = AesKey::new_encrypt(&Vec::from_hex(raw_key).unwrap()).unwrap();
|
|
let mut iv = Vec::from_hex(raw_iv).unwrap();
|
|
let pt = Vec::from_hex(raw_pt).unwrap();
|
|
let ct = Vec::from_hex(raw_ct).unwrap();
|
|
|
|
let mut ct_actual = vec![0; ct.len()];
|
|
aes_ige(&pt, &mut ct_actual, &key, &mut iv, Mode::Encrypt);
|
|
assert_eq!(ct_actual, ct);
|
|
|
|
let key = AesKey::new_decrypt(&Vec::from_hex(raw_key).unwrap()).unwrap();
|
|
let mut iv = Vec::from_hex(raw_iv).unwrap();
|
|
let mut pt_actual = vec![0; pt.len()];
|
|
aes_ige(&ct, &mut pt_actual, &key, &mut iv, Mode::Decrypt);
|
|
assert_eq!(pt_actual, pt);
|
|
}
|
|
}
|