Files
UltraGrid/src/crypto/openssl_encrypt.cpp
Martin Pulec d55cc45a54 Encryption: better handling of modes
* check if the received cipher mode is known (forward compatibility)
2017-04-07 10:00:55 +02:00

191 lines
6.7 KiB
C++

/**
* @file crypto/openssl_encrypt.cpp
* @author Martin Pulec <pulec@cesnet.cz>
*/
/*
* Copyright (c) 2013-2014 CESNET, z. s. p. o.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, is permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* 3. Neither the name of CESNET nor the names of its contributors may be
* used to endorse or promote products derived from this software without
* specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING,
* BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
* AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
* EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#include "config_unix.h"
#include "config_win32.h"
#endif
#include "crypto/crc.h"
#include "crypto/md5.h"
#include "crypto/openssl_encrypt.h"
#include "debug.h"
#include "lib_common.h"
#include <string.h>
#include <openssl/aes.h>
#include <openssl/rand.h>
struct openssl_encrypt {
AES_KEY key;
enum openssl_mode mode;
unsigned char ivec[16];
unsigned int num;
unsigned char ecount[16];
};
static int openssl_encrypt_init(struct openssl_encrypt **state, const char *passphrase,
enum openssl_mode mode)
{
struct openssl_encrypt *s = (struct openssl_encrypt *)
calloc(1, sizeof(struct openssl_encrypt));
MD5_CTX context;
unsigned char hash[16];
MD5Init(&context);
MD5Update(&context, (const unsigned char *) passphrase,
strlen(passphrase));
MD5Final(hash, &context);
AES_set_encrypt_key(hash, 128, &s->key);
if (!RAND_bytes(s->ivec, 8)) {
free(s);
return -1;
}
s->mode = mode;
assert(s->mode == MODE_AES128_CFB || MODE_AES128_CTR); // only functional by now
*state = s;
return 0;
}
static void openssl_encrypt_block(struct openssl_encrypt *s, unsigned char *plaintext,
unsigned char *ciphertext, char *ivec_or_nonce_plus_counter, int len)
{
if (ivec_or_nonce_plus_counter) {
memcpy(ivec_or_nonce_plus_counter, (char *) s->ivec, 16);
/* We do start a new block so we zero the byte counter
* Please NB that counter doesn't need to be incremented
* because the counter is incremented everytime s->num == 0,
* presumably before encryption, so setting it to 0 forces
* counter increment as well.
*/
if(s->num != 0) {
s->num = 0;
}
}
switch(s->mode) {
case MODE_AES128_NONE:
abort();
case MODE_AES128_CTR:
#ifdef HAVE_AES_CTR128_ENCRYPT
AES_ctr128_encrypt(plaintext, ciphertext, len, &s->key, s->ivec,
s->ecount, &s->num);
#else
log_msg(LOG_LEVEL_ERROR, "AES CTR not compiled in!\n");
#endif
break;
case MODE_AES128_CFB:
{
int inum = s->num;
AES_cfb128_encrypt(plaintext, ciphertext, len, &s->key, s->ivec,
&inum, AES_ENCRYPT);
s->num = inum;
}
break;
case MODE_AES128_ECB:
assert(len == AES_BLOCK_SIZE);
AES_ecb_encrypt(plaintext, ciphertext,
&s->key, AES_ENCRYPT);
break;
}
}
static void openssl_encrypt_destroy(struct openssl_encrypt *s)
{
free(s);
}
static int openssl_encrypt(struct openssl_encrypt *encryption,
char *plaintext, int data_len, char *aad, int aad_len, char *ciphertext)
{
uint32_t crc = 0xffffffff;
memcpy(ciphertext, &data_len, sizeof(uint32_t));
ciphertext += sizeof(uint32_t);
char *nonce_and_counter = ciphertext;
ciphertext += 16;
if(aad_len > 0) {
crc = crc32buf_with_oldcrc(aad, aad_len, crc);
}
for(int i = 0; i < data_len; i+=16) {
int block_length = 16;
if(data_len - i < 16) block_length = data_len - i;
crc = crc32buf_with_oldcrc(plaintext + i, block_length, crc);
openssl_encrypt_block(encryption,
(unsigned char *) plaintext + i,
(unsigned char *) ciphertext + i,
nonce_and_counter,
block_length);
nonce_and_counter = NULL;
}
openssl_encrypt_block(encryption,
(unsigned char *) &crc,
(unsigned char *) ciphertext + data_len,
NULL,
sizeof(uint32_t));
return data_len + sizeof(crc) + 16 + sizeof(uint32_t);
}
static int openssl_get_overhead(struct openssl_encrypt *s)
{
switch(s->mode) {
case MODE_AES128_CFB:
case MODE_AES128_CTR:
return sizeof(uint32_t) /* data_len */ +
16 /* nonce + counter */ + sizeof(uint32_t) /* crc */;
default:
abort();
}
}
static const struct openssl_encrypt_info functions = {
openssl_encrypt_init,
openssl_encrypt_destroy,
openssl_encrypt,
openssl_get_overhead,
};
REGISTER_MODULE(openssl_encrypt, &functions, LIBRARY_CLASS_UNDEFINED, OPENSSL_ENCRYPT_ABI_VERSION);