Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 1 | /* Copyright (c) 2023, Google Inc. |
| 2 | * |
| 3 | * Permission to use, copy, modify, and/or distribute this software for any |
| 4 | * purpose with or without fee is hereby granted, provided that the above |
| 5 | * copyright notice and this permission notice appear in all copies. |
| 6 | * |
| 7 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| 8 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| 9 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| 10 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| 11 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| 12 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| 13 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 14 | */ |
| 15 | |
| 16 | /// Block size in bytes for AES. |
| 17 | pub const BLOCK_SIZE: usize = bssl_sys::AES_BLOCK_SIZE as usize; |
| 18 | |
| 19 | /// A single AES block. |
| 20 | pub type AesBlock = [u8; BLOCK_SIZE]; |
| 21 | |
| 22 | /// AES implementation used for encrypting/decrypting a single `AesBlock` at a time. |
| 23 | pub struct Aes; |
| 24 | |
| 25 | impl Aes { |
David Benjamin | 2a72f97 | 2023-06-07 12:21:18 -0400 | [diff] [blame] | 26 | /// Encrypts `block` in place. |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 27 | pub fn encrypt(key: &AesEncryptKey, block: &mut AesBlock) { |
| 28 | let input = *block; |
| 29 | // Safety: |
| 30 | // - AesBlock is always a valid size and key is guaranteed to already be initialized. |
| 31 | unsafe { bssl_sys::AES_encrypt(input.as_ptr(), block.as_mut_ptr(), &key.0) } |
| 32 | } |
| 33 | |
David Benjamin | 2a72f97 | 2023-06-07 12:21:18 -0400 | [diff] [blame] | 34 | /// Decrypts `block` in place. |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 35 | pub fn decrypt(key: &AesDecryptKey, block: &mut AesBlock) { |
| 36 | let input = *block; |
| 37 | // Safety: |
| 38 | // - AesBlock is always a valid size and key is guaranteed to already be initialized. |
| 39 | unsafe { bssl_sys::AES_decrypt(input.as_ptr(), block.as_mut_ptr(), &key.0) } |
| 40 | } |
| 41 | } |
| 42 | |
| 43 | /// An initialized key which can be used for encrypting. |
| 44 | pub struct AesEncryptKey(bssl_sys::AES_KEY); |
| 45 | |
| 46 | impl AesEncryptKey { |
| 47 | /// Initializes an encryption key from an appropriately sized array of bytes for AES-128 operations. |
| 48 | pub fn new_aes_128(key: [u8; 16]) -> AesEncryptKey { |
| 49 | new_encrypt_key(key) |
| 50 | } |
| 51 | |
| 52 | /// Initializes an encryption key from an appropriately sized array of bytes for AES-256 operations. |
| 53 | pub fn new_aes_256(key: [u8; 32]) -> AesEncryptKey { |
| 54 | new_encrypt_key(key) |
| 55 | } |
| 56 | } |
| 57 | |
| 58 | /// An initialized key which can be used for decrypting |
| 59 | pub struct AesDecryptKey(bssl_sys::AES_KEY); |
| 60 | |
| 61 | impl AesDecryptKey { |
| 62 | /// Initializes a decryption key from an appropriately sized array of bytes for AES-128 operations. |
| 63 | pub fn new_aes_128(key: [u8; 16]) -> AesDecryptKey { |
| 64 | new_decrypt_key(key) |
| 65 | } |
| 66 | |
| 67 | /// Initializes a decryption key from an appropriately sized array of bytes for AES-256 operations. |
| 68 | pub fn new_aes_256(key: [u8; 32]) -> AesDecryptKey { |
| 69 | new_decrypt_key(key) |
| 70 | } |
| 71 | } |
| 72 | |
| 73 | /// Private generically implemented function for creating a new `AesEncryptKey` from an array of bytes. |
| 74 | /// This should only be publicly exposed by wrapper types with the correct key lengths |
| 75 | fn new_encrypt_key<const N: usize>(key: [u8; N]) -> AesEncryptKey { |
| 76 | let mut enc_key_uninit = core::mem::MaybeUninit::uninit(); |
| 77 | |
| 78 | // Safety: |
| 79 | // - key is guaranteed to point to bits/8 bytes determined by the len() * 8 used below. |
| 80 | // - bits is always a valid AES key size, as defined by the new_aes_* fns defined on the public |
| 81 | // key structs. |
Nabil Wadih | cc57542 | 2023-02-22 17:50:58 -0800 | [diff] [blame] | 82 | let result = unsafe { |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 83 | bssl_sys::AES_set_encrypt_key( |
| 84 | key.as_ptr(), |
| 85 | key.len() as core::ffi::c_uint * 8, |
| 86 | enc_key_uninit.as_mut_ptr(), |
| 87 | ) |
Nabil Wadih | cc57542 | 2023-02-22 17:50:58 -0800 | [diff] [blame] | 88 | }; |
| 89 | assert_eq!(result, 0, "Error occurred in bssl_sys::AES_set_encrypt_key"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 90 | |
| 91 | // Safety: |
| 92 | // - since we have checked above that initialization succeeded, this will never be UB |
| 93 | let enc_key = unsafe { enc_key_uninit.assume_init() }; |
| 94 | |
| 95 | AesEncryptKey(enc_key) |
| 96 | } |
| 97 | |
| 98 | /// Private generically implemented function for creating a new `AesDecryptKey` from an array of bytes. |
| 99 | /// This should only be publicly exposed by wrapper types with the correct key lengths. |
| 100 | fn new_decrypt_key<const N: usize>(key: [u8; N]) -> AesDecryptKey { |
| 101 | let mut dec_key_uninit = core::mem::MaybeUninit::uninit(); |
| 102 | |
| 103 | // Safety: |
| 104 | // - key is guaranteed to point to bits/8 bytes determined by the len() * 8 used below. |
| 105 | // - bits is always a valid AES key size, as defined by the new_aes_* fns defined on the public |
| 106 | // key structs. |
Nabil Wadih | cc57542 | 2023-02-22 17:50:58 -0800 | [diff] [blame] | 107 | let result = unsafe { |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 108 | bssl_sys::AES_set_decrypt_key( |
| 109 | key.as_ptr(), |
| 110 | key.len() as core::ffi::c_uint * 8, |
| 111 | dec_key_uninit.as_mut_ptr(), |
| 112 | ) |
Nabil Wadih | cc57542 | 2023-02-22 17:50:58 -0800 | [diff] [blame] | 113 | }; |
| 114 | assert_eq!(result, 0, "Error occurred in bssl_sys::AES_set_decrypt_key"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 115 | |
| 116 | // Safety: |
| 117 | // - Since we have checked above that initialization succeeded, this will never be UB. |
| 118 | let dec_key = unsafe { dec_key_uninit.assume_init() }; |
| 119 | |
| 120 | AesDecryptKey(dec_key) |
| 121 | } |
| 122 | |
| 123 | #[cfg(test)] |
| 124 | mod tests { |
Adam Langley | 190cc52 | 2024-01-05 15:53:32 -0800 | [diff] [blame] | 125 | use crate::{ |
| 126 | aes::{Aes, AesDecryptKey, AesEncryptKey}, |
| 127 | test_helpers::decode_hex, |
| 128 | }; |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 129 | |
| 130 | // test data from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf F.1.1 |
| 131 | #[test] |
| 132 | fn aes_128_test_encrypt() { |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 133 | let key = AesEncryptKey::new_aes_128(decode_hex("2b7e151628aed2a6abf7158809cf4f3c")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 134 | let mut block = [0_u8; 16]; |
| 135 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 136 | block.copy_from_slice(&decode_hex::<16>("6bc1bee22e409f96e93d7e117393172a")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 137 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 138 | assert_eq!(decode_hex("3ad77bb40d7a3660a89ecaf32466ef97"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 139 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 140 | block.copy_from_slice(&decode_hex::<16>("ae2d8a571e03ac9c9eb76fac45af8e51")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 141 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 142 | assert_eq!(decode_hex("f5d3d58503b9699de785895a96fdbaaf"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 143 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 144 | block.copy_from_slice(&decode_hex::<16>("30c81c46a35ce411e5fbc1191a0a52ef")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 145 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 146 | assert_eq!(decode_hex("43b1cd7f598ece23881b00e3ed030688"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 147 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 148 | block.copy_from_slice(&decode_hex::<16>("f69f2445df4f9b17ad2b417be66c3710")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 149 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 150 | assert_eq!(decode_hex("7b0c785e27e8ad3f8223207104725dd4"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 151 | } |
| 152 | |
| 153 | // test data from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf F.1.2 |
| 154 | #[test] |
| 155 | fn aes_128_test_decrypt() { |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 156 | let key = AesDecryptKey::new_aes_128(decode_hex("2b7e151628aed2a6abf7158809cf4f3c")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 157 | let mut block = [0_u8; 16]; |
| 158 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 159 | block.copy_from_slice(&decode_hex::<16>("3ad77bb40d7a3660a89ecaf32466ef97")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 160 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 161 | assert_eq!(decode_hex::<16>("6bc1bee22e409f96e93d7e117393172a"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 162 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 163 | block.copy_from_slice(&decode_hex::<16>("f5d3d58503b9699de785895a96fdbaaf")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 164 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 165 | assert_eq!(decode_hex::<16>("ae2d8a571e03ac9c9eb76fac45af8e51"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 166 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 167 | block.copy_from_slice(&decode_hex::<16>("43b1cd7f598ece23881b00e3ed030688")); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 168 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 169 | assert_eq!(decode_hex::<16>("30c81c46a35ce411e5fbc1191a0a52ef"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 170 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 171 | block.copy_from_slice(&decode_hex::<16>("7b0c785e27e8ad3f8223207104725dd4").as_slice()); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 172 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 173 | assert_eq!(decode_hex::<16>("f69f2445df4f9b17ad2b417be66c3710"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 174 | } |
| 175 | |
| 176 | // test data from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf F.1.5 |
| 177 | #[test] |
| 178 | pub fn aes_256_test_encrypt() { |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 179 | let key = AesEncryptKey::new_aes_256(decode_hex( |
| 180 | "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 181 | )); |
| 182 | let mut block: [u8; 16]; |
| 183 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 184 | block = decode_hex("6bc1bee22e409f96e93d7e117393172a"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 185 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 186 | assert_eq!(decode_hex("f3eed1bdb5d2a03c064b5a7e3db181f8"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 187 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 188 | block = decode_hex("ae2d8a571e03ac9c9eb76fac45af8e51"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 189 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 190 | assert_eq!(decode_hex("591ccb10d410ed26dc5ba74a31362870"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 191 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 192 | block = decode_hex("30c81c46a35ce411e5fbc1191a0a52ef"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 193 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 194 | assert_eq!(decode_hex("b6ed21b99ca6f4f9f153e7b1beafed1d"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 195 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 196 | block = decode_hex("f69f2445df4f9b17ad2b417be66c3710"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 197 | Aes::encrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 198 | assert_eq!(decode_hex("23304b7a39f9f3ff067d8d8f9e24ecc7"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 199 | } |
| 200 | |
| 201 | // test data from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf F.1.6 |
| 202 | #[test] |
| 203 | fn aes_256_test_decrypt() { |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 204 | let key = AesDecryptKey::new_aes_256(decode_hex( |
| 205 | "603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4", |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 206 | )); |
| 207 | |
| 208 | let mut block: [u8; 16]; |
| 209 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 210 | block = decode_hex("f3eed1bdb5d2a03c064b5a7e3db181f8"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 211 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 212 | assert_eq!(decode_hex("6bc1bee22e409f96e93d7e117393172a"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 213 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 214 | block = decode_hex("591ccb10d410ed26dc5ba74a31362870"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 215 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 216 | assert_eq!(decode_hex("ae2d8a571e03ac9c9eb76fac45af8e51"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 217 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 218 | block = decode_hex("b6ed21b99ca6f4f9f153e7b1beafed1d"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 219 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 220 | assert_eq!(decode_hex("30c81c46a35ce411e5fbc1191a0a52ef"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 221 | |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 222 | block = decode_hex("23304b7a39f9f3ff067d8d8f9e24ecc7"); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 223 | Aes::decrypt(&key, &mut block); |
Nabil Wadih | 92de195 | 2023-03-20 09:58:31 -0700 | [diff] [blame] | 224 | assert_eq!(decode_hex("f69f2445df4f9b17ad2b417be66c3710"), block); |
Nabil Wadih | 39da68f | 2023-02-16 18:07:41 -0800 | [diff] [blame] | 225 | } |
| 226 | } |