blob: 4602ee1202bb01c5822d0ad4504e63468c45d4ff [file] [log] [blame]
/* Copyright (c) 2023, Google Inc.
*
* Permission to use, copy, modify, and/or distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
//! Advanced Encryption Standard.
//!
//! AES is a 128-bit block cipher that supports key sizes of 128, 192, or 256
//! bits. (Although 192 isn't supported here.)
//!
//! Each key defines a permutation of the set of 128-bit blocks and AES can
//! perform the forward and reverse permutation. (These directions are
//! arbitrarily labeled "encryption" and "decryption".)
//!
//! AES requires relatively expensive preprocessing of keys and thus the
//! processed form of the key is represented here using [`EncryptKey`] and
//! [`DecryptKey`].
//!
//! ```
//! use bssl_crypto::aes;
//!
//! let key_bytes = bssl_crypto::rand_array();
//! let enc_key = aes::EncryptKey::new_256(&key_bytes);
//! let block = [0u8; aes::BLOCK_SIZE];
//! let mut transformed_block = enc_key.encrypt(&block);
//!
//! let dec_key = aes::DecryptKey::new_256(&key_bytes);
//! dec_key.decrypt_in_place(&mut transformed_block);
//! assert_eq!(block, transformed_block);
//! ```
//!
//! AES is a low-level primitive and must be used in a more complex construction
//! in nearly every case. See the `aead` crate for usable encryption and
//! decryption primitives.
use crate::{initialized_struct_fallible, FfiMutSlice, FfiSlice};
use core::ffi::c_uint;
/// AES block size in bytes.
pub const BLOCK_SIZE: usize = bssl_sys::AES_BLOCK_SIZE as usize;
/// A single AES block.
pub type Block = [u8; BLOCK_SIZE];
/// An initialized key which can be used for encrypting.
pub struct EncryptKey(bssl_sys::AES_KEY);
impl EncryptKey {
/// Initializes an encryption key from an appropriately sized array of bytes
// for AES-128 operations.
pub fn new_128(key: &[u8; 16]) -> Self {
new_encrypt_key(key.as_slice())
}
/// Initializes an encryption key from an appropriately sized array of bytes
// for AES-256 operations.
pub fn new_256(key: &[u8; 32]) -> Self {
new_encrypt_key(key.as_slice())
}
/// Return the encrypted version of the given block.
pub fn encrypt(&self, block: &Block) -> Block {
let mut ret = *block;
self.encrypt_in_place(&mut ret);
ret
}
/// Replace `block` with its encrypted version.
pub fn encrypt_in_place(&self, block: &mut Block) {
// Safety:
// - block is always a valid size and key is guaranteed to already be initialized.
unsafe { bssl_sys::AES_encrypt(block.as_ffi_ptr(), block.as_mut_ffi_ptr(), &self.0) }
}
}
/// An initialized key which can be used for decrypting
pub struct DecryptKey(bssl_sys::AES_KEY);
impl DecryptKey {
/// Initializes a decryption key from an appropriately sized array of bytes for AES-128 operations.
pub fn new_128(key: &[u8; 16]) -> DecryptKey {
new_decrypt_key(key.as_slice())
}
/// Initializes a decryption key from an appropriately sized array of bytes for AES-256 operations.
pub fn new_256(key: &[u8; 32]) -> DecryptKey {
new_decrypt_key(key.as_slice())
}
/// Return the decrypted version of the given block.
pub fn decrypt(&self, block: &Block) -> Block {
let mut ret = *block;
self.decrypt_in_place(&mut ret);
ret
}
/// Replace `block` with its decrypted version.
pub fn decrypt_in_place(&self, block: &mut Block) {
// Safety:
// - block is always a valid size and key is guaranteed to already be initialized.
unsafe { bssl_sys::AES_decrypt(block.as_ffi_ptr(), block.as_mut_ffi_ptr(), &self.0) }
}
}
/// This should only be publicly exposed by wrapper types with the correct key lengths
#[allow(clippy::unwrap_used)]
fn new_encrypt_key(key: &[u8]) -> EncryptKey {
EncryptKey(
unsafe {
initialized_struct_fallible(|aes_key| {
// The return value of this function differs from the usual BoringSSL
// convention.
bssl_sys::AES_set_encrypt_key(key.as_ffi_ptr(), key.len() as c_uint * 8, aes_key)
== 0
})
}
// unwrap: this function only fails if `key` is the wrong length, which
// must be prevented by the pub functions that call this.
.unwrap(),
)
}
/// This should only be publicly exposed by wrapper types with the correct key lengths.
#[allow(clippy::unwrap_used)]
fn new_decrypt_key(key: &[u8]) -> DecryptKey {
DecryptKey(
unsafe {
initialized_struct_fallible(|aes_key| {
// The return value of this function differs from the usual BoringSSL
// convention.
bssl_sys::AES_set_decrypt_key(key.as_ffi_ptr(), key.len() as c_uint * 8, aes_key)
== 0
})
}
// unwrap: this function only fails if `key` is the wrong length, which
// must be prevented by the pub functions that call this.
.unwrap(),
)
}
#[cfg(test)]
mod tests {
use crate::{
aes::{DecryptKey, EncryptKey},
test_helpers::decode_hex,
};
#[test]
fn aes_128() {
// test data from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf F.1.1
let key = decode_hex("2b7e151628aed2a6abf7158809cf4f3c");
let plaintext = decode_hex("6bc1bee22e409f96e93d7e117393172a");
let ciphertext = decode_hex("3ad77bb40d7a3660a89ecaf32466ef97");
assert_eq!(ciphertext, EncryptKey::new_128(&key).encrypt(&plaintext));
assert_eq!(plaintext, DecryptKey::new_128(&key).decrypt(&ciphertext));
}
#[test]
fn aes_256() {
// test data from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf F.1.5
let key = decode_hex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
let plaintext = decode_hex("6bc1bee22e409f96e93d7e117393172a");
let ciphertext = decode_hex("f3eed1bdb5d2a03c064b5a7e3db181f8");
assert_eq!(ciphertext, EncryptKey::new_256(&key).encrypt(&plaintext));
assert_eq!(plaintext, DecryptKey::new_256(&key).decrypt(&ciphertext));
}
}