/*
* %CopyrightBegin%
*
* Copyright Ericsson AB 2010-2018. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* %CopyrightEnd%
*/
#include "aes.h"
#include "cipher.h"
ERL_NIF_TERM aes_cfb_8_crypt(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Key, IVec, Data, IsEncrypt) */
ErlNifBinary key, ivec, text;
AES_KEY aes_key;
unsigned char ivec_clone[16]; /* writable copy */
int new_ivlen = 0;
ERL_NIF_TERM ret;
unsigned char *outp;
CHECK_NO_FIPS_MODE();
ASSERT(argc == 4);
if (!enif_inspect_iolist_as_binary(env, argv[0], &key))
goto bad_arg;
if (key.size != 16 && key.size != 24 && key.size != 32)
goto bad_arg;
if (!enif_inspect_binary(env, argv[1], &ivec))
goto bad_arg;
if (ivec.size != 16)
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[2], &text))
goto bad_arg;
memcpy(ivec_clone, ivec.data, 16);
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (AES_set_encrypt_key(key.data, (int)key.size * 8, &aes_key) != 0)
goto err;
if ((outp = enif_make_new_binary(env, text.size, &ret)) == NULL)
goto err;
AES_cfb8_encrypt((unsigned char *) text.data,
outp,
text.size, &aes_key, ivec_clone, &new_ivlen,
(argv[3] == atom_true));
CONSUME_REDS(env,text);
return ret;
bad_arg:
err:
return enif_make_badarg(env);
}
ERL_NIF_TERM aes_cfb_128_crypt_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Key, IVec, Data, IsEncrypt) */
ErlNifBinary key, ivec, text;
AES_KEY aes_key;
unsigned char ivec_clone[16]; /* writable copy */
int new_ivlen = 0;
ERL_NIF_TERM ret;
unsigned char *outp;
ASSERT(argc == 4);
if (!enif_inspect_iolist_as_binary(env, argv[0], &key))
goto bad_arg;
if (key.size != 16 && key.size != 24 && key.size != 32)
goto bad_arg;
if (!enif_inspect_binary(env, argv[1], &ivec))
goto bad_arg;
if (ivec.size != 16)
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[2], &text))
goto bad_arg;
memcpy(ivec_clone, ivec.data, 16);
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (AES_set_encrypt_key(key.data, (int)key.size * 8, &aes_key) != 0)
goto err;
if ((outp = enif_make_new_binary(env, text.size, &ret)) == NULL)
goto err;
AES_cfb128_encrypt((unsigned char *) text.data,
outp,
text.size, &aes_key, ivec_clone, &new_ivlen,
(argv[3] == atom_true));
CONSUME_REDS(env,text);
return ret;
bad_arg:
err:
return enif_make_badarg(env);
}
ERL_NIF_TERM aes_ige_crypt_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Key, IVec, Data, IsEncrypt) */
#ifdef HAVE_AES_IGE
ErlNifBinary key_bin, ivec_bin, data_bin;
AES_KEY aes_key;
unsigned char ivec[32];
int type;
unsigned char* ret_ptr;
ERL_NIF_TERM ret;
CHECK_NO_FIPS_MODE();
ASSERT(argc == 4);
if (!enif_inspect_iolist_as_binary(env, argv[0], &key_bin))
goto bad_arg;
if (key_bin.size != 16 && key_bin.size != 32)
goto bad_arg;
if (!enif_inspect_binary(env, argv[1], &ivec_bin))
goto bad_arg;
if (ivec_bin.size != 32)
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[2], &data_bin))
goto bad_arg;
if (data_bin.size % 16 != 0)
goto bad_arg;
if (argv[3] == atom_true) {
type = AES_ENCRYPT;
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (AES_set_encrypt_key(key_bin.data, (int)key_bin.size * 8, &aes_key) != 0)
goto err;
}
else {
type = AES_DECRYPT;
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (AES_set_decrypt_key(key_bin.data, (int)key_bin.size * 8, &aes_key) != 0)
goto err;
}
if ((ret_ptr = enif_make_new_binary(env, data_bin.size, &ret)) == NULL)
goto err;
memcpy(ivec, ivec_bin.data, 32); /* writable copy */
AES_ige_encrypt(data_bin.data, ret_ptr, data_bin.size, &aes_key, ivec, type);
CONSUME_REDS(env,data_bin);
return ret;
bad_arg:
err:
return enif_make_badarg(env);
#else
return atom_notsup;
#endif
}
/* Initializes state for ctr streaming (de)encryption
*/
#ifdef HAVE_EVP_AES_CTR
ERL_NIF_TERM aes_ctr_stream_init(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Key, IVec) */
ErlNifBinary key_bin, ivec_bin;
struct evp_cipher_ctx *ctx = NULL;
const EVP_CIPHER *cipher;
ERL_NIF_TERM ret;
ASSERT(argc == 2);
if (!enif_inspect_iolist_as_binary(env, argv[0], &key_bin))
goto bad_arg;
if (!enif_inspect_binary(env, argv[1], &ivec_bin))
goto bad_arg;
if (ivec_bin.size != 16)
goto bad_arg;
switch (key_bin.size)
{
case 16:
cipher = EVP_aes_128_ctr();
break;
case 24:
cipher = EVP_aes_192_ctr();
break;
case 32:
cipher = EVP_aes_256_ctr();
break;
default:
goto bad_arg;
}
if ((ctx = enif_alloc_resource(evp_cipher_ctx_rtype, sizeof(struct evp_cipher_ctx))) == NULL)
goto err;
if ((ctx->ctx = EVP_CIPHER_CTX_new()) == NULL)
goto err;
if (EVP_CipherInit_ex(ctx->ctx, cipher, NULL,
key_bin.data, ivec_bin.data, 1) != 1)
goto err;
if (EVP_CIPHER_CTX_set_padding(ctx->ctx, 0) != 1)
goto err;
ret = enif_make_resource(env, ctx);
goto done;
bad_arg:
return enif_make_badarg(env);
err:
ret = enif_make_badarg(env);
done:
if (ctx)
enif_release_resource(ctx);
return ret;
}
ERL_NIF_TERM aes_ctr_stream_encrypt(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Context, Data) */
struct evp_cipher_ctx *ctx = NULL, *new_ctx = NULL;
ErlNifBinary data_bin;
ERL_NIF_TERM ret, cipher_term;
unsigned char *out;
int outl = 0;
ASSERT(argc == 2);
if (!enif_get_resource(env, argv[0], evp_cipher_ctx_rtype, (void**)&ctx))
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[1], &data_bin))
goto bad_arg;
if (data_bin.size > INT_MAX)
goto bad_arg;
if ((new_ctx = enif_alloc_resource(evp_cipher_ctx_rtype, sizeof(struct evp_cipher_ctx))) == NULL)
goto err;
if ((new_ctx->ctx = EVP_CIPHER_CTX_new()) == NULL)
goto err;
if (EVP_CIPHER_CTX_copy(new_ctx->ctx, ctx->ctx) != 1)
goto err;
if ((out = enif_make_new_binary(env, data_bin.size, &cipher_term)) == NULL)
goto err;
if (EVP_CipherUpdate(new_ctx->ctx, out, &outl, data_bin.data, (int)data_bin.size) != 1)
goto err;
ASSERT(outl >= 0 && (size_t)outl == data_bin.size);
ret = enif_make_tuple2(env, enif_make_resource(env, new_ctx), cipher_term);
CONSUME_REDS(env,data_bin);
goto done;
bad_arg:
return enif_make_badarg(env);
err:
ret = enif_make_badarg(env);
done:
if (new_ctx)
enif_release_resource(new_ctx);
return ret;
}
#else /* if not HAVE_EVP_AES_CTR */
ERL_NIF_TERM aes_ctr_stream_init(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Key, IVec) */
ErlNifBinary key_bin, ivec_bin;
ERL_NIF_TERM ecount_bin;
unsigned char *outp;
ASSERT(argc == 2);
if (!enif_inspect_iolist_as_binary(env, argv[0], &key_bin))
goto bad_arg;
if (key_bin.size != 16 && key_bin.size != 24 && key_bin.size != 32)
goto bad_arg;
if (!enif_inspect_binary(env, argv[1], &ivec_bin))
goto bad_arg;
if (ivec_bin.size != 16)
goto bad_arg;
if ((outp = enif_make_new_binary(env, AES_BLOCK_SIZE, &ecount_bin)) == NULL)
goto err;
memset(outp, 0, AES_BLOCK_SIZE);
return enif_make_tuple4(env, argv[0], argv[1], ecount_bin, enif_make_int(env, 0));
bad_arg:
err:
return enif_make_badarg(env);
}
ERL_NIF_TERM aes_ctr_stream_encrypt(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* ({Key, IVec, ECount, Num}, Data) */
ErlNifBinary key_bin, ivec_bin, text_bin, ecount_bin;
AES_KEY aes_key;
unsigned int num;
ERL_NIF_TERM ret, num2_term, cipher_term, ivec2_term, ecount2_term, new_state_term;
int state_arity;
const ERL_NIF_TERM *state_term;
unsigned char * ivec2_buf;
unsigned char * ecount2_buf;
unsigned char *outp;
ASSERT(argc == 2);
if (!enif_get_tuple(env, argv[0], &state_arity, &state_term))
goto bad_arg;
if (state_arity != 4)
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, state_term[0], &key_bin))
goto bad_arg;
if (key_bin.size > INT_MAX / 8)
goto bad_arg;
if (!enif_inspect_binary(env, state_term[1], &ivec_bin))
goto bad_arg;
if (ivec_bin.size != 16)
goto bad_arg;
if (!enif_inspect_binary(env, state_term[2], &ecount_bin))
goto bad_arg;
if (ecount_bin.size != AES_BLOCK_SIZE)
goto bad_arg;
if (!enif_get_uint(env, state_term[3], &num))
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[1], &text_bin))
goto bad_arg;
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (AES_set_encrypt_key(key_bin.data, (int)key_bin.size * 8, &aes_key) != 0)
goto bad_arg;
if ((ivec2_buf = enif_make_new_binary(env, ivec_bin.size, &ivec2_term)) == NULL)
goto err;
if ((ecount2_buf = enif_make_new_binary(env, ecount_bin.size, &ecount2_term)) == NULL)
goto err;
memcpy(ivec2_buf, ivec_bin.data, 16);
memcpy(ecount2_buf, ecount_bin.data, ecount_bin.size);
if ((outp = enif_make_new_binary(env, text_bin.size, &cipher_term)) == NULL)
goto err;
AES_ctr128_encrypt((unsigned char *) text_bin.data,
outp,
text_bin.size, &aes_key, ivec2_buf, ecount2_buf, &num);
num2_term = enif_make_uint(env, num);
new_state_term = enif_make_tuple4(env, state_term[0], ivec2_term, ecount2_term, num2_term);
ret = enif_make_tuple2(env, new_state_term, cipher_term);
CONSUME_REDS(env,text_bin);
return ret;
bad_arg:
err:
return enif_make_badarg(env);
}
#endif /* !HAVE_EVP_AES_CTR */
#ifdef HAVE_GCM_EVP_DECRYPT_BUG
ERL_NIF_TERM aes_gcm_decrypt_NO_EVP(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{/* (Type,Key,Iv,AAD,In,Tag) */
GCM128_CONTEXT *ctx = NULL;
ErlNifBinary key, iv, aad, in, tag;
AES_KEY aes_key;
unsigned char *outp;
ERL_NIF_TERM out, ret;
ASSERT(argc == 6);
if (!enif_inspect_iolist_as_binary(env, argv[1], &key))
goto bad_arg;
if (key.size > INT_MAX / 8)
goto bad_arg;
if (!enif_inspect_binary(env, argv[2], &iv))
goto bad_arg;
if (iv.size == 0)
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[3], &aad))
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[4], &in))
goto bad_arg;
if (!enif_inspect_iolist_as_binary(env, argv[5], &tag))
goto bad_arg;
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (AES_set_encrypt_key(key.data, (int)key.size * 8, &aes_key) != 0)
goto bad_arg;
if ((ctx = CRYPTO_gcm128_new(&aes_key, (block128_f)AES_encrypt)) == NULL)
goto err;
CRYPTO_gcm128_setiv(ctx, iv.data, iv.size);
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (CRYPTO_gcm128_aad(ctx, aad.data, aad.size) != 0)
goto err;
if ((outp = enif_make_new_binary(env, in.size, &out)) == NULL)
goto err;
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (CRYPTO_gcm128_decrypt(ctx, in.data, outp, in.size) != 0)
goto err;
/* calculate and check the tag */
/* NOTE: This function returns 0 on success unlike most OpenSSL functions */
if (CRYPTO_gcm128_finish(ctx, tag.data, tag.size) != 0)
goto err;
CONSUME_REDS(env, in);
ret = out;
goto done;
bad_arg:
ret = enif_make_badarg(env);
goto done;
err:
ret = atom_error;
done:
if (ctx)
CRYPTO_gcm128_release(ctx);
return ret;
}
#endif /* HAVE_GCM_EVP_DECRYPT_BUG */