aboutsummaryrefslogtreecommitdiff
path: root/src/crypto/aes_gcm.c
blob: dbcf7312b1b04c692f1e55e5b2df9c69449c7f2f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
#include <crypto/aes_gcm.h>

#include <openssl/evp.h>
#include <openssl/rand.h>
#include <openssl/err.h>
#include <string.h>

b32
aes_gcm_key_init_random(AesGcmKey *key)
{
    int success = RAND_priv_bytes(key->buff, sizeof(key->buff));
    return success == 1;
}

b32
aes_gcm_iv_init(AesGcmIv *iv)
{
    if (RAND_priv_bytes(iv->salt, sizeof(iv->salt)) < 0) {
        return false;
    }

    u32 *counter = (u32*)iv->counter;
    assert(sizeof(*counter) == sizeof(iv->counter));
    *counter = 0;

    return true;
}

void
aes_gcm_iv_advance(AesGcmIv *iv)
{
    u32 *counter = (u32*)iv->counter;
    assert(sizeof(*counter) == sizeof(iv->counter));

    *counter += 1;
    if (*counter == U32_MAX) {
        exit(0); // Todo: make new keys
    }
}

b32
aes_gcm_decrypt(AesGcmKey *key, AesGcmIv *iv,
                u8 *plaintext, u8 *ciphertext, i32 ciphertext_len,
                u8 *tag, i32 tag_len)
{
    EVP_CIPHER_CTX *ctx;
    i32 plaintext_len = 0;
    i32 len = 0;

    ctx = EVP_CIPHER_CTX_new();
    if (!ctx) {
        printf("EVP_CIPHER_CTX_new() failed\n");
        return false;
    }

    if (EVP_DecryptInit_ex(ctx, EVP_aes_256_gcm(), 0, 0, 0) != 1) {
        printf("EVP_DecryptInit_ex() failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, 12, 0) != 1) {
        printf("EVP_CIPHER_CTX_ctrl setting iv length failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if(EVP_DecryptInit_ex(ctx, 0, 0, key->buff, (u8*)iv) != 1) {
        printf("EVP_DecryptInit_ex with key and iv failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if (EVP_DecryptUpdate(ctx, plaintext, &len, ciphertext, ciphertext_len) != 1) {
        printf("EVP_DecryptUpdate() failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }
    plaintext_len += len;

    if(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, tag_len, tag) != 1) {
        printf("EVP_CIPHER_CTX_ctrl setting tag failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if (EVP_DecryptFinal_ex(ctx, plaintext + len, &len) != 1) {
        ERR_print_errors_fp(stderr);
        printf("EVP_DecryptFinal_ex failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }
    plaintext_len += len;

    if (plaintext_len != ciphertext_len) {
        printf("aes_gcm_decrypt failed: decrypted_len != len\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    EVP_CIPHER_CTX_free(ctx);
    aes_gcm_iv_advance(iv);
    return true;
}

b32
aes_gcm_encrypt(AesGcmKey *key, AesGcmIv *iv,
                u8 *ciphertext, u8 *plaintext, i32 plaintext_len,
                u8 *tag_out, i32 tag_out_len)
{
    EVP_CIPHER_CTX *ctx;
    i32 ciphertext_len = 0;
    i32 len = 0;

    ctx = EVP_CIPHER_CTX_new();
    if (!ctx) {
        printf("EVP_CIPHER_CTX_new() failed\n");
        return false;
    }

    if (EVP_EncryptInit_ex(ctx, EVP_aes_256_gcm(), 0, 0, 0) != 1) {
        printf("EVP_EncryptInit_ex() failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, 12, 0) != 1) {
        printf("EVP_CIPHER_CTX_ctrl setting iv length failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if (EVP_EncryptInit_ex(ctx, EVP_aes_256_gcm(), 0, key->buff, (u8*)iv) != 1) {
        printf("EVP_EncryptInit_ex() failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if (EVP_EncryptUpdate(ctx, ciphertext, &len, plaintext, plaintext_len) != 1) {
        printf("EVP_EncryptUpdate failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }
    ciphertext_len += len;

    if (EVP_EncryptFinal_ex(ctx, plaintext + len, &len) != 1) {
        printf("EVP_EncryptFinal_ex failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }
    ciphertext_len += len;

    if (ciphertext_len != plaintext_len) {
        printf("aes_gcm_encrypt failed: ciphertext_len = %d, plaintext_len = %d\n", ciphertext_len, plaintext_len);
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_GET_TAG, tag_out_len, tag_out) != 1) {
        printf("EVP_CIPHER_CTX_ctrl failed\n");
        EVP_CIPHER_CTX_free(ctx);
        return false;
    }

    EVP_CIPHER_CTX_free(ctx);
    aes_gcm_iv_advance(iv);
    return true;
}