• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //! Low level AES IGE and key wrapping functionality
2 //!
3 //! AES ECB, CBC, XTS, CTR, CFB, GCM and other conventional symmetric encryption
4 //! modes are found in [`symm`].  This is the implementation of AES IGE and key wrapping
5 //!
6 //! Advanced Encryption Standard (AES) provides symmetric key cipher that
7 //! the same key is used to encrypt and decrypt data.  This implementation
8 //! uses 128, 192, or 256 bit keys.  This module provides functions to
9 //! create a new key with [`new_encrypt`] and perform an encryption/decryption
10 //! using that key with [`aes_ige`].
11 //!
12 //! [`new_encrypt`]: struct.AesKey.html#method.new_encrypt
13 //! [`aes_ige`]: fn.aes_ige.html
14 //!
15 //! The [`symm`] module should be used in preference to this module in most cases.
16 //! The IGE block cipher is a non-traditional cipher mode.  More traditional AES
17 //! encryption methods are found in the [`Crypter`] and [`Cipher`] structs.
18 //!
19 //! [`symm`]: ../symm/index.html
20 //! [`Crypter`]: ../symm/struct.Crypter.html
21 //! [`Cipher`]: ../symm/struct.Cipher.html
22 //!
23 //! # Examples
24 
25 #![cfg_attr(
26     all(not(boringssl), not(osslconf = "OPENSSL_NO_DEPRECATED_3_0")),
27     doc = r#"\
28 ## AES IGE
29 ```rust
30 use openssl::aes::{AesKey, aes_ige};
31 use openssl::symm::Mode;
32 
33 let key = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F";
34 let plaintext = b"\x12\x34\x56\x78\x90\x12\x34\x56\x12\x34\x56\x78\x90\x12\x34\x56";
35 let mut iv = *b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\
36                 \x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F";
37 
38  let key = AesKey::new_encrypt(key).unwrap();
39  let mut output = [0u8; 16];
40  aes_ige(plaintext, &mut output, &key, &mut iv, Mode::Encrypt);
41  assert_eq!(output, *b"\xa6\xad\x97\x4d\x5c\xea\x1d\x36\xd2\xf3\x67\x98\x09\x07\xed\x32");
42 ```"#
43 )]
44 
45 //!
46 //! ## Key wrapping
47 //! ```rust
48 //! use openssl::aes::{AesKey, unwrap_key, wrap_key};
49 //!
50 //! let kek = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F";
51 //! let key_to_wrap = b"\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF";
52 //!
53 //! let enc_key = AesKey::new_encrypt(kek).unwrap();
54 //! let mut ciphertext = [0u8; 24];
55 //! wrap_key(&enc_key, None, &mut ciphertext, &key_to_wrap[..]).unwrap();
56 //! let dec_key = AesKey::new_decrypt(kek).unwrap();
57 //! let mut orig_key = [0u8; 16];
58 //! unwrap_key(&dec_key, None, &mut orig_key, &ciphertext[..]).unwrap();
59 //!
60 //! assert_eq!(&orig_key[..], &key_to_wrap[..]);
61 //! ```
62 //!
63 use cfg_if::cfg_if;
64 use libc::{c_int, c_uint};
65 use std::mem::MaybeUninit;
66 use std::ptr;
67 
68 #[cfg(not(boringssl))]
69 use crate::symm::Mode;
70 use openssl_macros::corresponds;
71 
72 /// Provides Error handling for parsing keys.
73 #[derive(Debug)]
74 pub struct KeyError(());
75 
76 /// The key used to encrypt or decrypt cipher blocks.
77 pub struct AesKey(ffi::AES_KEY);
78 
79 cfg_if! {
80     if #[cfg(boringssl)] {
81         type AesBitType = c_uint;
82         type AesSizeType = usize;
83     } else {
84         type AesBitType = c_int;
85         type AesSizeType = c_uint;
86     }
87 }
88 
89 impl AesKey {
90     /// Prepares a key for encryption.
91     ///
92     /// # Failure
93     ///
94     /// Returns an error if the key is not 128, 192, or 256 bits.
95     #[corresponds(AES_set_encrypt_key)]
new_encrypt(key: &[u8]) -> Result<AesKey, KeyError>96     pub fn new_encrypt(key: &[u8]) -> Result<AesKey, KeyError> {
97         unsafe {
98             assert!(key.len() <= c_int::max_value() as usize / 8);
99 
100             let mut aes_key = MaybeUninit::uninit();
101             let r = ffi::AES_set_encrypt_key(
102                 key.as_ptr() as *const _,
103                 key.len() as AesBitType * 8,
104                 aes_key.as_mut_ptr(),
105             );
106             if r == 0 {
107                 Ok(AesKey(aes_key.assume_init()))
108             } else {
109                 Err(KeyError(()))
110             }
111         }
112     }
113 
114     /// Prepares a key for decryption.
115     ///
116     /// # Failure
117     ///
118     /// Returns an error if the key is not 128, 192, or 256 bits.
119     #[corresponds(AES_set_decrypt_key)]
new_decrypt(key: &[u8]) -> Result<AesKey, KeyError>120     pub fn new_decrypt(key: &[u8]) -> Result<AesKey, KeyError> {
121         unsafe {
122             assert!(key.len() <= c_int::max_value() as usize / 8);
123 
124             let mut aes_key = MaybeUninit::uninit();
125             let r = ffi::AES_set_decrypt_key(
126                 key.as_ptr() as *const _,
127                 key.len() as AesBitType * 8,
128                 aes_key.as_mut_ptr(),
129             );
130 
131             if r == 0 {
132                 Ok(AesKey(aes_key.assume_init()))
133             } else {
134                 Err(KeyError(()))
135             }
136         }
137     }
138 }
139 
140 /// Performs AES IGE encryption or decryption
141 ///
142 /// AES IGE (Infinite Garble Extension) is a form of AES block cipher utilized in
143 /// OpenSSL.  Infinite Garble refers to propagating forward errors.  IGE, like other
144 /// block ciphers implemented for AES requires an initialization vector.  The IGE mode
145 /// allows a stream of blocks to be encrypted or decrypted without having the entire
146 /// plaintext available.  For more information, visit [AES IGE Encryption].
147 ///
148 /// This block cipher uses 16 byte blocks.  The rust implementation will panic
149 /// if the input or output does not meet this 16-byte boundary.  Attention must
150 /// be made in this low level implementation to pad the value to the 128-bit boundary.
151 ///
152 /// [AES IGE Encryption]: http://www.links.org/files/openssl-ige.pdf
153 ///
154 /// # Panics
155 ///
156 /// Panics if `in_` is not the same length as `out`, if that length is not a multiple of 16, or if
157 /// `iv` is not at least 32 bytes.
158 #[cfg(not(boringssl))]
159 #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
160 #[corresponds(AES_ige_encrypt)]
aes_ige(in_: &[u8], out: &mut [u8], key: &AesKey, iv: &mut [u8], mode: Mode)161 pub fn aes_ige(in_: &[u8], out: &mut [u8], key: &AesKey, iv: &mut [u8], mode: Mode) {
162     unsafe {
163         assert!(in_.len() == out.len());
164         assert!(in_.len() % ffi::AES_BLOCK_SIZE as usize == 0);
165         assert!(iv.len() >= ffi::AES_BLOCK_SIZE as usize * 2);
166 
167         let mode = match mode {
168             Mode::Encrypt => ffi::AES_ENCRYPT,
169             Mode::Decrypt => ffi::AES_DECRYPT,
170         };
171         ffi::AES_ige_encrypt(
172             in_.as_ptr() as *const _,
173             out.as_mut_ptr() as *mut _,
174             in_.len(),
175             &key.0,
176             iv.as_mut_ptr() as *mut _,
177             mode,
178         );
179     }
180 }
181 
182 /// Wrap a key, according to [RFC 3394](https://tools.ietf.org/html/rfc3394)
183 ///
184 /// * `key`: The key-encrypting-key to use. Must be a encrypting key
185 /// * `iv`: The IV to use. You must use the same IV for both wrapping and unwrapping
186 /// * `out`: The output buffer to store the ciphertext
187 /// * `in_`: The input buffer, storing the key to be wrapped
188 ///
189 /// Returns the number of bytes written into `out`
190 ///
191 /// # Panics
192 ///
193 /// Panics if either `out` or `in_` do not have sizes that are a multiple of 8, or if
194 /// `out` is not 8 bytes longer than `in_`
195 #[corresponds(AES_wrap_key)]
wrap_key( key: &AesKey, iv: Option<[u8; 8]>, out: &mut [u8], in_: &[u8], ) -> Result<usize, KeyError>196 pub fn wrap_key(
197     key: &AesKey,
198     iv: Option<[u8; 8]>,
199     out: &mut [u8],
200     in_: &[u8],
201 ) -> Result<usize, KeyError> {
202     unsafe {
203         assert!(out.len() >= in_.len() + 8); // Ciphertext is 64 bits longer (see 2.2.1)
204 
205         let written = ffi::AES_wrap_key(
206             &key.0 as *const _ as *mut _, // this is safe, the implementation only uses the key as a const pointer.
207             iv.as_ref()
208                 .map_or(ptr::null(), |iv| iv.as_ptr() as *const _),
209             out.as_ptr() as *mut _,
210             in_.as_ptr() as *const _,
211             in_.len() as AesSizeType,
212         );
213         if written <= 0 {
214             Err(KeyError(()))
215         } else {
216             Ok(written as usize)
217         }
218     }
219 }
220 
221 /// Unwrap a key, according to [RFC 3394](https://tools.ietf.org/html/rfc3394)
222 ///
223 /// * `key`: The key-encrypting-key to decrypt the wrapped key. Must be a decrypting key
224 /// * `iv`: The same IV used for wrapping the key
225 /// * `out`: The buffer to write the unwrapped key to
226 /// * `in_`: The input ciphertext
227 ///
228 /// Returns the number of bytes written into `out`
229 ///
230 /// # Panics
231 ///
232 /// Panics if either `out` or `in_` do not have sizes that are a multiple of 8, or
233 /// if `in_` is not 8 bytes longer than `out`
234 #[corresponds(AES_unwrap_key)]
unwrap_key( key: &AesKey, iv: Option<[u8; 8]>, out: &mut [u8], in_: &[u8], ) -> Result<usize, KeyError>235 pub fn unwrap_key(
236     key: &AesKey,
237     iv: Option<[u8; 8]>,
238     out: &mut [u8],
239     in_: &[u8],
240 ) -> Result<usize, KeyError> {
241     unsafe {
242         assert!(out.len() + 8 <= in_.len());
243 
244         let written = ffi::AES_unwrap_key(
245             &key.0 as *const _ as *mut _, // this is safe, the implementation only uses the key as a const pointer.
246             iv.as_ref()
247                 .map_or(ptr::null(), |iv| iv.as_ptr() as *const _),
248             out.as_ptr() as *mut _,
249             in_.as_ptr() as *const _,
250             in_.len() as AesSizeType,
251         );
252 
253         if written <= 0 {
254             Err(KeyError(()))
255         } else {
256             Ok(written as usize)
257         }
258     }
259 }
260 
261 #[cfg(test)]
262 mod test {
263     use hex::FromHex;
264 
265     use super::*;
266     #[cfg(not(boringssl))]
267     use crate::symm::Mode;
268 
269     // From https://www.mgp25.com/AESIGE/
270     #[test]
271     #[cfg(not(boringssl))]
272     #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
ige_vector_1()273     fn ige_vector_1() {
274         let raw_key = "000102030405060708090A0B0C0D0E0F";
275         let raw_iv = "000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F";
276         let raw_pt = "0000000000000000000000000000000000000000000000000000000000000000";
277         let raw_ct = "1A8519A6557BE652E9DA8E43DA4EF4453CF456B4CA488AA383C79C98B34797CB";
278 
279         let key = AesKey::new_encrypt(&Vec::from_hex(raw_key).unwrap()).unwrap();
280         let mut iv = Vec::from_hex(raw_iv).unwrap();
281         let pt = Vec::from_hex(raw_pt).unwrap();
282         let ct = Vec::from_hex(raw_ct).unwrap();
283 
284         let mut ct_actual = vec![0; ct.len()];
285         aes_ige(&pt, &mut ct_actual, &key, &mut iv, Mode::Encrypt);
286         assert_eq!(ct_actual, ct);
287 
288         let key = AesKey::new_decrypt(&Vec::from_hex(raw_key).unwrap()).unwrap();
289         let mut iv = Vec::from_hex(raw_iv).unwrap();
290         let mut pt_actual = vec![0; pt.len()];
291         aes_ige(&ct, &mut pt_actual, &key, &mut iv, Mode::Decrypt);
292         assert_eq!(pt_actual, pt);
293     }
294 
295     // from the RFC https://tools.ietf.org/html/rfc3394#section-2.2.3
296     #[test]
test_wrap_unwrap()297     fn test_wrap_unwrap() {
298         let raw_key = Vec::from_hex("000102030405060708090A0B0C0D0E0F").unwrap();
299         let key_data = Vec::from_hex("00112233445566778899AABBCCDDEEFF").unwrap();
300         let expected_ciphertext =
301             Vec::from_hex("1FA68B0A8112B447AEF34BD8FB5A7B829D3E862371D2CFE5").unwrap();
302 
303         let enc_key = AesKey::new_encrypt(&raw_key).unwrap();
304         let mut wrapped = [0; 24];
305         assert_eq!(
306             wrap_key(&enc_key, None, &mut wrapped, &key_data).unwrap(),
307             24
308         );
309         assert_eq!(&wrapped[..], &expected_ciphertext[..]);
310 
311         let dec_key = AesKey::new_decrypt(&raw_key).unwrap();
312         let mut unwrapped = [0; 16];
313         assert_eq!(
314             unwrap_key(&dec_key, None, &mut unwrapped, &wrapped).unwrap(),
315             16
316         );
317         assert_eq!(&unwrapped[..], &key_data[..]);
318     }
319 }
320