| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173 |
- /*
- * libwebsockets - small server side websockets and web server implementation
- *
- * Copyright (C) 2010 - 2019 Andy Green <[email protected]>
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to
- * deal in the Software without restriction, including without limitation the
- * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
- * sell copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
- * IN THE SOFTWARE.
- */
- #include "private-lib-core.h"
- #include "private-lib-jose-jwe.h"
- /*
- * NOTICE this is AESGCM content encryption, it's not AES GCM key wrapping
- *
- *
- * This section defines the specifics of performing authenticated
- * encryption with AES in Galois/Counter Mode (GCM) ([AES] and
- * [NIST.800-38D]).
- *
- * The CEK is used as the encryption key.
- *
- * Use of an IV of size 96 bits is REQUIRED with this algorithm.
- *
- * The requested size of the Authentication Tag output MUST be 128 bits,
- * regardless of the key size.
- *
- * For decrypt: decrypt the KEK, then decrypt the payload
- *
- * For encrypt: encrypt the payload, then encrypt the KEK
- */
- /*
- * encrypting... enc_cek is unencrypted
- */
- int
- lws_jwe_encrypt_gcm(struct lws_jwe *jwe,
- uint8_t *enc_cek, uint8_t *aad, int aad_len)
- {
- struct lws_gencrypto_keyelem el;
- struct lws_genaes_ctx aesctx;
- size_t ivs = LWS_AESGCM_IV;
- int n;
- /* Some sanity checks on what came in */
- /* MUST be 128-bit for all sizes */
- if (jwe->jws.map.len[LJWE_ATAG] != LWS_AESGCM_TAG) {
- lwsl_notice("%s: AESGCM tag size must be 128b, got %d\n",
- __func__, jwe->jws.map.len[LJWE_ATAG]);
- return -1;
- }
- if (jwe->jws.map.len[LJWE_IV] != LWS_AESGCM_IV) { /* MUST be 96-bit */
- lwsl_notice("%s: AESGCM IV must be 128b, got %d\n", __func__,
- jwe->jws.map.len[LJWE_IV]);
- return -1;
- }
- /* EKEY is directly the CEK KEY */
- el.buf = enc_cek;
- el.len = jwe->jose.enc_alg->keybits_fixed / 8;
- if (lws_genaes_create(&aesctx, LWS_GAESO_ENC, LWS_GAESM_GCM,
- &el, LWS_GAESP_NO_PADDING, NULL)) {
- lwsl_err("%s: lws_genaes_create failed\n", __func__);
- return -1;
- }
- /* aad */
- n = lws_genaes_crypt(&aesctx, aad, aad_len, NULL,
- (uint8_t *)jwe->jws.map.buf[LJWE_IV],
- (uint8_t *)jwe->jws.map.buf[LJWE_ATAG], &ivs,
- LWS_AESGCM_TAG);
- if (n) {
- lwsl_err("%s: lws_genaes_crypt aad failed\n", __func__);
- return -1;
- }
- /* payload */
- n = lws_genaes_crypt(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
- jwe->jws.map.len[LJWE_CTXT],
- (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
- (uint8_t *)jwe->jws.map.buf[LJWE_IV],
- NULL, &ivs,
- LWS_AESGCM_TAG);
- n |= lws_genaes_destroy(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_ATAG],
- LWS_AESGCM_TAG);
- if (n) {
- lwsl_err("%s: lws_genaes_crypt failed\n", __func__);
- return -1;
- }
- return jwe->jws.map.len[LJWE_CTXT];
- }
- int
- lws_jwe_auth_and_decrypt_gcm(struct lws_jwe *jwe,
- uint8_t *enc_cek, uint8_t *aad, int aad_len)
- {
- struct lws_gencrypto_keyelem el;
- struct lws_genaes_ctx aesctx;
- size_t ivs = LWS_AESGCM_IV;
- uint8_t tag[LWS_AESGCM_TAG];
- int n;
- /* Some sanity checks on what came in */
- /* Tag MUST be 128-bit for all sizes */
- if (jwe->jws.map.len[LJWE_ATAG] != LWS_AESGCM_TAG) {
- lwsl_notice("%s: AESGCM tag size must be 128b, got %d\n",
- __func__, jwe->jws.map.len[LJWE_ATAG]);
- return -1;
- }
- if (jwe->jws.map.len[LJWE_IV] != LWS_AESGCM_IV) { /* MUST be 96-bit */
- lwsl_notice("%s: AESGCM IV must be 128b, got %d\n", __func__,
- jwe->jws.map.len[LJWE_IV]);
- return -1;
- }
- /* EKEY is directly the CEK KEY */
- el.buf = enc_cek;
- el.len = jwe->jose.enc_alg->keybits_fixed / 8;
- if (lws_genaes_create(&aesctx, LWS_GAESO_DEC, LWS_GAESM_GCM,
- &el, LWS_GAESP_NO_PADDING, NULL)) {
- lwsl_err("%s: lws_genaes_create failed\n", __func__);
- return -1;
- }
- n = lws_genaes_crypt(&aesctx, aad, aad_len,
- NULL,
- (uint8_t *)jwe->jws.map.buf[LJWE_IV],
- (uint8_t *)jwe->jws.map.buf[LJWE_ATAG], &ivs, 16);
- if (n) {
- lwsl_err("%s: lws_genaes_crypt aad failed\n", __func__);
- return -1;
- }
- n = lws_genaes_crypt(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
- jwe->jws.map.len[LJWE_CTXT],
- (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
- (uint8_t *)jwe->jws.map.buf[LJWE_IV],
- (uint8_t *)jwe->jws.map.buf[LJWE_ATAG], &ivs, 16);
- n |= lws_genaes_destroy(&aesctx, tag, sizeof(tag));
- if (n) {
- lwsl_err("%s: lws_genaes_crypt failed\n", __func__);
- return -1;
- }
- return jwe->jws.map.len[LJWE_CTXT];
- }
|