1#![cfg_attr(
26 all(
27 not(boringssl),
28 not(awslc),
29 not(osslconf = "OPENSSL_NO_DEPRECATED_3_0")
30 ),
31 doc = r#"\
32## AES IGE
33```rust
34use openssl::aes::{AesKey, aes_ige};
35use openssl::symm::Mode;
36
37let key = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F";
38let plaintext = b"\x12\x34\x56\x78\x90\x12\x34\x56\x12\x34\x56\x78\x90\x12\x34\x56";
39let mut iv = *b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\
40 \x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F";
41
42 let key = AesKey::new_encrypt(key).unwrap();
43 let mut output = [0u8; 16];
44 aes_ige(plaintext, &mut output, &key, &mut iv, Mode::Encrypt);
45 assert_eq!(output, *b"\xa6\xad\x97\x4d\x5c\xea\x1d\x36\xd2\xf3\x67\x98\x09\x07\xed\x32");
46```"#
47)]
48
49use cfg_if::cfg_if;
68use libc::{c_int, c_uint};
69use std::mem::MaybeUninit;
70use std::ptr;
71
72#[cfg(not(any(boringssl, awslc)))]
73use crate::symm::Mode;
74use openssl_macros::corresponds;
75
76#[derive(Debug)]
78pub struct KeyError(());
79
80pub struct AesKey(ffi::AES_KEY);
82
83cfg_if! {
84 if #[cfg(any(boringssl, awslc))] {
85 type AesBitType = c_uint;
86 type AesSizeType = usize;
87 } else {
88 type AesBitType = c_int;
89 type AesSizeType = c_uint;
90 }
91}
92
93impl AesKey {
94 #[corresponds(AES_set_encrypt_key)]
100 pub fn new_encrypt(key: &[u8]) -> Result<AesKey, KeyError> {
101 unsafe {
102 assert!(key.len() <= c_int::MAX as usize / 8);
103
104 let mut aes_key = MaybeUninit::uninit();
105 let r = ffi::AES_set_encrypt_key(
106 key.as_ptr() as *const _,
107 key.len() as AesBitType * 8,
108 aes_key.as_mut_ptr(),
109 );
110 if r == 0 {
111 Ok(AesKey(aes_key.assume_init()))
112 } else {
113 Err(KeyError(()))
114 }
115 }
116 }
117
118 #[corresponds(AES_set_decrypt_key)]
124 pub fn new_decrypt(key: &[u8]) -> Result<AesKey, KeyError> {
125 unsafe {
126 assert!(key.len() <= c_int::MAX as usize / 8);
127
128 let mut aes_key = MaybeUninit::uninit();
129 let r = ffi::AES_set_decrypt_key(
130 key.as_ptr() as *const _,
131 key.len() as AesBitType * 8,
132 aes_key.as_mut_ptr(),
133 );
134
135 if r == 0 {
136 Ok(AesKey(aes_key.assume_init()))
137 } else {
138 Err(KeyError(()))
139 }
140 }
141 }
142}
143
144#[cfg(not(any(boringssl, awslc)))]
163#[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
164#[corresponds(AES_ige_encrypt)]
165pub fn aes_ige(in_: &[u8], out: &mut [u8], key: &AesKey, iv: &mut [u8], mode: Mode) {
166 unsafe {
167 assert!(in_.len() == out.len());
168 assert!(in_.len() % ffi::AES_BLOCK_SIZE as usize == 0);
169 assert!(iv.len() >= ffi::AES_BLOCK_SIZE as usize * 2);
170
171 let mode = match mode {
172 Mode::Encrypt => ffi::AES_ENCRYPT,
173 Mode::Decrypt => ffi::AES_DECRYPT,
174 };
175 ffi::AES_ige_encrypt(
176 in_.as_ptr() as *const _,
177 out.as_mut_ptr() as *mut _,
178 in_.len(),
179 &key.0,
180 iv.as_mut_ptr() as *mut _,
181 mode,
182 );
183 }
184}
185
186#[corresponds(AES_wrap_key)]
200pub fn wrap_key(
201 key: &AesKey,
202 iv: Option<[u8; 8]>,
203 out: &mut [u8],
204 in_: &[u8],
205) -> Result<usize, KeyError> {
206 unsafe {
207 assert!(out.len() >= in_.len() + 8); let written = ffi::AES_wrap_key(
210 &key.0 as *const _ as *mut _, iv.as_ref()
212 .map_or(ptr::null(), |iv| iv.as_ptr() as *const _),
213 out.as_ptr() as *mut _,
214 in_.as_ptr() as *const _,
215 in_.len() as AesSizeType,
216 );
217 if written <= 0 {
218 Err(KeyError(()))
219 } else {
220 Ok(written as usize)
221 }
222 }
223}
224
225#[corresponds(AES_unwrap_key)]
239pub fn unwrap_key(
240 key: &AesKey,
241 iv: Option<[u8; 8]>,
242 out: &mut [u8],
243 in_: &[u8],
244) -> Result<usize, KeyError> {
245 unsafe {
246 assert!(out.len() + 8 >= in_.len());
247
248 let written = ffi::AES_unwrap_key(
249 &key.0 as *const _ as *mut _, iv.as_ref()
251 .map_or(ptr::null(), |iv| iv.as_ptr() as *const _),
252 out.as_ptr() as *mut _,
253 in_.as_ptr() as *const _,
254 in_.len() as AesSizeType,
255 );
256
257 if written <= 0 {
258 Err(KeyError(()))
259 } else {
260 Ok(written as usize)
261 }
262 }
263}
264
265#[cfg(test)]
266mod test {
267 use hex::FromHex;
268
269 use super::*;
270 #[cfg(not(any(boringssl, awslc)))]
271 use crate::symm::Mode;
272
273 #[test]
275 #[cfg(not(any(boringssl, awslc)))]
276 #[cfg(not(osslconf = "OPENSSL_NO_DEPRECATED_3_0"))]
277 fn ige_vector_1() {
278 let raw_key = "000102030405060708090A0B0C0D0E0F";
279 let raw_iv = "000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F";
280 let raw_pt = "0000000000000000000000000000000000000000000000000000000000000000";
281 let raw_ct = "1A8519A6557BE652E9DA8E43DA4EF4453CF456B4CA488AA383C79C98B34797CB";
282
283 let key = AesKey::new_encrypt(&Vec::from_hex(raw_key).unwrap()).unwrap();
284 let mut iv = Vec::from_hex(raw_iv).unwrap();
285 let pt = Vec::from_hex(raw_pt).unwrap();
286 let ct = Vec::from_hex(raw_ct).unwrap();
287
288 let mut ct_actual = vec![0; ct.len()];
289 aes_ige(&pt, &mut ct_actual, &key, &mut iv, Mode::Encrypt);
290 assert_eq!(ct_actual, ct);
291
292 let key = AesKey::new_decrypt(&Vec::from_hex(raw_key).unwrap()).unwrap();
293 let mut iv = Vec::from_hex(raw_iv).unwrap();
294 let mut pt_actual = vec![0; pt.len()];
295 aes_ige(&ct, &mut pt_actual, &key, &mut iv, Mode::Decrypt);
296 assert_eq!(pt_actual, pt);
297 }
298
299 #[test]
301 fn test_unwrap_key_out_oversized() {
302 let raw_key = Vec::from_hex("000102030405060708090A0B0C0D0E0F").unwrap();
303 let key_data = Vec::from_hex("00112233445566778899AABBCCDDEEFF").unwrap();
304 let wrapped = Vec::from_hex("1FA68B0A8112B447AEF34BD8FB5A7B829D3E862371D2CFE5").unwrap();
305 let dec_key = AesKey::new_decrypt(&raw_key).unwrap();
306
307 let mut out = vec![0u8; 32]; let n = unwrap_key(&dec_key, None, &mut out, &wrapped).unwrap();
309 assert_eq!(n, 16);
310 assert_eq!(&out[..16], &key_data[..]);
311 }
312
313 #[test]
315 #[should_panic]
316 fn test_unwrap_key_out_too_small_panics() {
317 let raw_key = Vec::from_hex("000102030405060708090A0B0C0D0E0F").unwrap();
318 let wrapped = Vec::from_hex("1FA68B0A8112B447AEF34BD8FB5A7B829D3E862371D2CFE5").unwrap();
319 let dec_key = AesKey::new_decrypt(&raw_key).unwrap();
320
321 let mut out = vec![0u8; 8]; let _ = unwrap_key(&dec_key, None, &mut out, &wrapped);
323 }
324
325 #[test]
327 fn test_unwrap_key_tampered_ciphertext() {
328 let raw_key = Vec::from_hex("000102030405060708090A0B0C0D0E0F").unwrap();
329 let mut wrapped =
330 Vec::from_hex("1FA68B0A8112B447AEF34BD8FB5A7B829D3E862371D2CFE5").unwrap();
331 wrapped[0] ^= 0xFF;
333
334 let dec_key = AesKey::new_decrypt(&raw_key).unwrap();
335 let mut out = [0u8; 16];
336 assert!(
337 unwrap_key(&dec_key, None, &mut out, &wrapped).is_err(),
338 "expected Err for tampered ciphertext"
339 );
340 }
341
342 #[test]
344 fn test_wrap_unwrap_with_iv() {
345 let raw_key = Vec::from_hex("000102030405060708090A0B0C0D0E0F").unwrap();
346 let key_data = Vec::from_hex("00112233445566778899AABBCCDDEEFF").unwrap();
347 let iv: [u8; 8] = [0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6];
348
349 let enc_key = AesKey::new_encrypt(&raw_key).unwrap();
350 let mut wrapped = [0u8; 24];
351 wrap_key(&enc_key, Some(iv), &mut wrapped, &key_data).unwrap();
352
353 let dec_key = AesKey::new_decrypt(&raw_key).unwrap();
354 let mut unwrapped = [0u8; 16];
355 unwrap_key(&dec_key, Some(iv), &mut unwrapped, &wrapped).unwrap();
356 assert_eq!(&unwrapped[..], &key_data[..]);
357
358 let wrong_iv: [u8; 8] = [0x00; 8];
360 let mut unwrapped2 = [0u8; 16];
361 assert!(
362 unwrap_key(&dec_key, Some(wrong_iv), &mut unwrapped2, &wrapped).is_err(),
363 "expected Err when IV does not match"
364 );
365 }
366
367 #[test]
369 fn test_wrap_unwrap() {
370 let raw_key = Vec::from_hex("000102030405060708090A0B0C0D0E0F").unwrap();
371 let key_data = Vec::from_hex("00112233445566778899AABBCCDDEEFF").unwrap();
372 let expected_ciphertext =
373 Vec::from_hex("1FA68B0A8112B447AEF34BD8FB5A7B829D3E862371D2CFE5").unwrap();
374
375 let enc_key = AesKey::new_encrypt(&raw_key).unwrap();
376 let mut wrapped = [0; 24];
377 assert_eq!(
378 wrap_key(&enc_key, None, &mut wrapped, &key_data).unwrap(),
379 24
380 );
381 assert_eq!(&wrapped[..], &expected_ciphertext[..]);
382
383 let dec_key = AesKey::new_decrypt(&raw_key).unwrap();
384 let mut unwrapped = [0; 16];
385 assert_eq!(
386 unwrap_key(&dec_key, None, &mut unwrapped, &wrapped).unwrap(),
387 16
388 );
389 assert_eq!(&unwrapped[..], &key_data[..]);
390 }
391}