/*
* %CopyrightBegin%
*
* Copyright Ericsson AB 2010-2018. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* %CopyrightEnd%
*/
#include "aead.h"
#include "aes.h"
ERL_NIF_TERM aead_encrypt(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Type,Key,Iv,AAD,In) */
#if defined(HAVE_AEAD)
EVP_CIPHER_CTX *ctx;
const EVP_CIPHER *cipher = NULL;
ErlNifBinary key, iv, aad, in;
unsigned int tag_len;
unsigned char *outp, *tagp;
ERL_NIF_TERM type, out, out_tag;
int len, ctx_ctrl_set_ivlen, ctx_ctrl_get_tag;
type = argv[0];
if (!enif_is_atom(env, type)
|| !enif_inspect_iolist_as_binary(env, argv[1], &key)
|| !enif_inspect_binary(env, argv[2], &iv)
|| !enif_inspect_iolist_as_binary(env, argv[3], &aad)
|| !enif_inspect_iolist_as_binary(env, argv[4], &in)
|| !enif_get_uint(env, argv[5], &tag_len)) {
return enif_make_badarg(env);
}
/* Use cipher_type some day. Must check block_encrypt|decrypt first */
#if defined(HAVE_GCM)
if (type == atom_aes_gcm) {
if ((iv.size > 0)
&& (1 <= tag_len && tag_len <= 16)) {
ctx_ctrl_set_ivlen = EVP_CTRL_GCM_SET_IVLEN;
ctx_ctrl_get_tag = EVP_CTRL_GCM_GET_TAG;
if (key.size == 16) cipher = EVP_aes_128_gcm();
else if (key.size == 24) cipher = EVP_aes_192_gcm();
else if (key.size == 32) cipher = EVP_aes_256_gcm();
else enif_make_badarg(env);
} else
enif_make_badarg(env);
} else
#endif
#if defined(HAVE_CCM)
if (type == atom_aes_ccm) {
if ((7 <= iv.size && iv.size <= 13)
&& (4 <= tag_len && tag_len <= 16)
&& ((tag_len & 1) == 0)
) {
ctx_ctrl_set_ivlen = EVP_CTRL_CCM_SET_IVLEN;
ctx_ctrl_get_tag = EVP_CTRL_CCM_GET_TAG;
if (key.size == 16) cipher = EVP_aes_128_ccm();
else if (key.size == 24) cipher = EVP_aes_192_ccm();
else if (key.size == 32) cipher = EVP_aes_256_ccm();
else enif_make_badarg(env);
} else
enif_make_badarg(env);
} else
#endif
#if defined(HAVE_CHACHA20_POLY1305)
if (type == atom_chacha20_poly1305) {
if ((key.size == 32)
&& (1 <= iv.size && iv.size <= 16)
&& (tag_len == 16)
) {
ctx_ctrl_set_ivlen = EVP_CTRL_AEAD_SET_IVLEN;
ctx_ctrl_get_tag = EVP_CTRL_AEAD_GET_TAG,
cipher = EVP_chacha20_poly1305();
} else enif_make_badarg(env);
} else
#endif
return enif_raise_exception(env, atom_notsup);
ctx = EVP_CIPHER_CTX_new();
if (EVP_EncryptInit_ex(ctx, cipher, NULL, NULL, NULL) != 1) goto out_err;
if (EVP_CIPHER_CTX_ctrl(ctx, ctx_ctrl_set_ivlen, iv.size, NULL) != 1) goto out_err;
#if defined(HAVE_CCM)
if (type == atom_aes_ccm) {
if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_CCM_SET_TAG, tag_len, NULL) != 1) goto out_err;
if (EVP_EncryptInit_ex(ctx, NULL, NULL, key.data, iv.data) != 1) goto out_err;
if (EVP_EncryptUpdate(ctx, NULL, &len, NULL, in.size) != 1) goto out_err;
} else
#endif
if (EVP_EncryptInit_ex(ctx, NULL, NULL, key.data, iv.data) != 1) goto out_err;
if (EVP_EncryptUpdate(ctx, NULL, &len, aad.data, aad.size) != 1) goto out_err;
outp = enif_make_new_binary(env, in.size, &out);
if (EVP_EncryptUpdate(ctx, outp, &len, in.data, in.size) != 1) goto out_err;
if (EVP_EncryptFinal_ex(ctx, outp/*+len*/, &len) != 1) goto out_err;
tagp = enif_make_new_binary(env, tag_len, &out_tag);
if (EVP_CIPHER_CTX_ctrl(ctx, ctx_ctrl_get_tag, tag_len, tagp) != 1) goto out_err;
EVP_CIPHER_CTX_free(ctx);
CONSUME_REDS(env, in);
return enif_make_tuple2(env, out, out_tag);
out_err:
EVP_CIPHER_CTX_free(ctx);
return atom_error;
#else
return enif_raise_exception(env, atom_notsup);
#endif
}
ERL_NIF_TERM aead_decrypt(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Type,Key,Iv,AAD,In,Tag) */
#if defined(HAVE_AEAD)
EVP_CIPHER_CTX *ctx;
const EVP_CIPHER *cipher = NULL;
ErlNifBinary key, iv, aad, in, tag;
unsigned char *outp;
ERL_NIF_TERM type, out;
int len, ctx_ctrl_set_ivlen, ctx_ctrl_set_tag;
type = argv[0];
#if defined(HAVE_GCM_EVP_DECRYPT_BUG)
if (type == atom_aes_gcm)
return aes_gcm_decrypt_NO_EVP(env, argc, argv);
#endif
if (!enif_is_atom(env, type)
|| !enif_inspect_iolist_as_binary(env, argv[1], &key)
|| !enif_inspect_binary(env, argv[2], &iv)
|| !enif_inspect_iolist_as_binary(env, argv[3], &aad)
|| !enif_inspect_iolist_as_binary(env, argv[4], &in)
|| !enif_inspect_iolist_as_binary(env, argv[5], &tag)) {
return enif_make_badarg(env);
}
/* Use cipher_type some day. Must check block_encrypt|decrypt first */
#if defined(HAVE_GCM)
if (type == atom_aes_gcm) {
if (iv.size > 0) {
ctx_ctrl_set_ivlen = EVP_CTRL_GCM_SET_IVLEN;
ctx_ctrl_set_tag = EVP_CTRL_GCM_SET_TAG;
if (key.size == 16) cipher = EVP_aes_128_gcm();
else if (key.size == 24) cipher = EVP_aes_192_gcm();
else if (key.size == 32) cipher = EVP_aes_256_gcm();
else enif_make_badarg(env);
} else
enif_make_badarg(env);
} else
#endif
#if defined(HAVE_CCM)
if (type == atom_aes_ccm) {
if (iv.size > 0) {
ctx_ctrl_set_ivlen = EVP_CTRL_CCM_SET_IVLEN;
if (key.size == 16) cipher = EVP_aes_128_ccm();
else if (key.size == 24) cipher = EVP_aes_192_ccm();
else if (key.size == 32) cipher = EVP_aes_256_ccm();
else enif_make_badarg(env);
} else
enif_make_badarg(env);
} else
#endif
#if defined(HAVE_CHACHA20_POLY1305)
if (type == atom_chacha20_poly1305) {
if ((key.size == 32)
&& (1 <= iv.size && iv.size <= 16)
&& tag.size == 16
) {
ctx_ctrl_set_ivlen = EVP_CTRL_AEAD_SET_IVLEN;
ctx_ctrl_set_tag = EVP_CTRL_AEAD_SET_TAG;
cipher = EVP_chacha20_poly1305();
} else enif_make_badarg(env);
} else
#endif
return enif_raise_exception(env, atom_notsup);
outp = enif_make_new_binary(env, in.size, &out);
ctx = EVP_CIPHER_CTX_new();
if (EVP_DecryptInit_ex(ctx, cipher, NULL, NULL, NULL) != 1) goto out_err;
if (EVP_CIPHER_CTX_ctrl(ctx, ctx_ctrl_set_ivlen, iv.size, NULL) != 1) goto out_err;
#if defined(HAVE_CCM)
if (type == atom_aes_ccm) {
if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_CCM_SET_TAG, tag.size, tag.data) != 1) goto out_err;
}
#endif
if (EVP_DecryptInit_ex(ctx, NULL, NULL, key.data, iv.data) != 1) goto out_err;
#if defined(HAVE_CCM)
if (type == atom_aes_ccm) {
if (1 != EVP_DecryptUpdate(ctx, NULL, &len, NULL, in.size)) goto out_err;
}
#endif
if (EVP_DecryptUpdate(ctx, NULL, &len, aad.data, aad.size) != 1) goto out_err;
if (EVP_DecryptUpdate(ctx, outp, &len, in.data, in.size) != 1) goto out_err;
#if defined(HAVE_GCM) || defined(HAVE_CHACHA20_POLY1305)
if (type == atom_aes_gcm) {
if (EVP_CIPHER_CTX_ctrl(ctx, ctx_ctrl_set_tag, tag.size, tag.data) != 1) goto out_err;
if (EVP_DecryptFinal_ex(ctx, outp+len, &len) != 1) goto out_err;
}
#endif
EVP_CIPHER_CTX_free(ctx);
CONSUME_REDS(env, in);
return out;
out_err:
EVP_CIPHER_CTX_free(ctx);
return atom_error;
#else
return enif_raise_exception(env, atom_notsup);
#endif
}