/* Initializes the input stream */ int initializeInputStream(char* aesKeyData, int aesKeyDataLength, char* aesIv, int aesIvLength) { if (aesIvLength != OAES_BLOCK_SIZE) { Limelog("AES IV is incorrect length. Should be %d\n", aesIvLength); return -1; } oaesContext = oaes_alloc(); if (oaesContext == NULL) { Limelog("Failed to allocate OpenAES context\n"); return -1; } if (oaes_set_option(oaesContext, OAES_OPTION_CBC, aesIv) != OAES_RET_SUCCESS) { Limelog("Failed to set CBC and IV on OAES context\n"); return -1; } if (oaes_key_import_data(oaesContext, (const unsigned char*)aesKeyData, aesKeyDataLength) != OAES_RET_SUCCESS) { Limelog("Failed to import AES key data\n"); return -1; } LbqInitializeLinkedBlockingQueue(&packetQueue, 30); initialized = 1; return 0; }
OAES_CTX * oaes_alloc(void) { oaes_ctx * _ctx = (oaes_ctx *) calloc( sizeof( oaes_ctx ), 1 ); if( NULL == _ctx ) return NULL; #ifdef OAES_HAVE_ISAAC { ub4 _i = 0; char _seed[RANDSIZ + 1]; _ctx->rctx = (randctx *) calloc( sizeof( randctx ), 1 ); if( NULL == _ctx->rctx ) { free( _ctx ); return NULL; } oaes_get_seed( _seed ); memset( _ctx->rctx->randrsl, 0, RANDSIZ ); memcpy( _ctx->rctx->randrsl, _seed, RANDSIZ ); randinit( _ctx->rctx, TRUE); } #else srand( oaes_get_seed() ); #endif // OAES_HAVE_ISAAC _ctx->key = NULL; oaes_set_option( _ctx, OAES_OPTION_CBC, NULL ); #ifdef OAES_DEBUG _ctx->step_cb = NULL; oaes_set_option( _ctx, OAES_OPTION_STEP_OFF, NULL ); #endif // OAES_DEBUG return (OAES_CTX *) _ctx; }
// caller must free b->out if it's not NULL static OAES_RET _do_aes_decrypt(do_block *b) { OAES_CTX * ctx = NULL; OAES_RET _rc = OAES_RET_SUCCESS; if( NULL == b ) return OAES_RET_ARG1; ctx = oaes_alloc(); if( NULL == ctx ) { fprintf(stderr, "Error: Failed to initialize OAES.\n"); return OAES_RET_MEM; } if( _is_ecb ) if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) ) fprintf(stderr, "Error: Failed to set OAES options.\n"); oaes_key_import_data( ctx, _key_data, _key_data_len ); b->out = NULL; b->out_len = 0; _rc = oaes_decrypt( ctx, b->in, b->in_len, b->out, &(b->out_len) ); if( OAES_RET_SUCCESS != _rc ) { fprintf(stderr, "Error: Failed to decrypt.\n"); oaes_free(&ctx); return _rc; } b->out = (uint8_t *) calloc(b->out_len, sizeof(uint8_t)); if( NULL == b->out ) { fprintf(stderr, "Error: Failed to allocate memory.\n"); oaes_free(&ctx); return OAES_RET_MEM; } _rc = oaes_decrypt( ctx, b->in, b->in_len, b->out, &(b->out_len) ); if( OAES_RET_SUCCESS != oaes_free(&ctx) ) fprintf(stderr, "Error: Failed to uninitialize OAES.\n"); return _rc; }
/* M.new(nonce_string, key_index, initial_vector) returns aes_ctx */ static int api_new( lua_State *L) { size_t size_nonce; const uint8_t *nonce = (const uint8_t *) luaL_checklstring( L, 1, & size_nonce); uint8_t key_CK [128/8]; int idx_K = luaL_checkinteger( L, 2)-1; size_t initial_vector_length; const char *initial_vector = luaL_optlstring( L, 3, NULL, & initial_vector_length); if( initial_vector && initial_vector_length != 128/8) { luaL_error( L, "Initial vector must be 16 bytes long"); } OAES_CTX *ctx = oaes_alloc(); if( ! ctx) return 0; get_cipher_key( nonce, size_nonce, idx_K, key_CK, 128/8); oaes_key_import_data( ctx, key_CK, 128/8); if( initial_vector) oaes_set_option( ctx, OAES_OPTION_CBC, initial_vector); * (OAES_CTX **) lua_newuserdata( L, sizeof( ctx)) = ctx; luaL_newmetatable( L, "OAES_CTX"); lua_setmetatable( L, -2); return 1; }
int main(int argc, char** argv) { size_t _i; OAES_CTX * ctx = NULL; uint8_t *_encbuf, *_decbuf, *_key_data = NULL, *_bin_data = NULL; size_t _encbuf_len, _decbuf_len, _buf_len; size_t _key_data_len = 0, _bin_data_len = 0; char *_buf; short _is_ecb = 0, _is_bin = 0; char * _text = NULL, * _key_text = NULL; int _key_len = 128; uint8_t _iv[OAES_BLOCK_SIZE] = ""; uint8_t _pad = 0; if( argc < 2 ) { usage( argv[0] ); return EXIT_FAILURE; } for( _i = 1; _i < argc; _i++ ) { int _found = 0; if( 0 == strcmp( argv[_i], "-nostep" ) ) { _found = 1; _is_step = 0; } if( 0 == strcmp( argv[_i], "-ecb" ) ) { _found = 1; _is_ecb = 1; } if( 0 == strcmp( argv[_i], "-bin" ) ) { _found = 1; _is_bin = 1; } if( 0 == strcmp( argv[_i], "-key" ) ) { _found = 1; _i++; // len if( _i >= argc ) { printf("Error: No value specified for '-%s'.\n", "key"); usage( argv[0] ); return EXIT_FAILURE; } _key_len = atoi( argv[_i] ); switch( _key_len ) { case 128: case 192: case 256: break; default: _key_text = argv[_i]; if( to_binary( NULL, &_key_data_len, _key_text ) ) { printf( "Error: Invalid value [%s] specified for '-%s'.\n", argv[_i], "key" ); return EXIT_FAILURE; } switch( _key_data_len ) { case 16: case 24: case 32: break; default: printf("Error: key_data [%s] specified for '-%s' has an invalid " "size.\n", argv[_i], "key"); usage( argv[0] ); return EXIT_FAILURE; } } } if( 0 == _found ) { if( _text ) { printf("Error: Invalid option '%s'.\n", argv[_i]); usage( argv[0] ); return EXIT_FAILURE; } else { _text = argv[_i]; if( _is_bin && to_binary( NULL, &_bin_data_len, _text ) ) { printf( "Error: Invalid value [%s] specified for '-%s'.\n", argv[_i], "bin" ); return EXIT_FAILURE; } } } } if( NULL == _text ) { usage( argv[0] ); return EXIT_FAILURE; } if( _is_step ) printf( "\nEnabling step mode, press Return to step.\n\n" ); if( _is_bin ) { _bin_data = (uint8_t *) calloc(_bin_data_len, sizeof(uint8_t)); if( NULL == _bin_data ) { printf( "Error: Failed to allocate memory.\n" ); return EXIT_FAILURE; } if( to_binary( _bin_data, &_bin_data_len, _text ) ) { printf( "Error: Could not load data [%s].\n", _text); free( _bin_data ); return EXIT_FAILURE; } } else { oaes_sprintf( NULL, &_buf_len, (const uint8_t *)_text, strlen(_text)); _buf = (char *) calloc(_buf_len, sizeof(char)); printf( "\n***** plaintext *****\n" ); if( _buf ) { oaes_sprintf( _buf, &_buf_len, (const uint8_t *)_text, strlen( _text ) ); printf( "%s", _buf ); } printf( "\n**********************\n" ); free( _buf ); } ctx = oaes_alloc(); if( NULL == ctx ) { printf("Error: Failed to initialize OAES.\n"); if( _bin_data ) free( _bin_data ); return EXIT_FAILURE; } if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_STEP_ON, step_cb ) ) printf("Error: Failed to set OAES options.\n"); if( _is_ecb ) if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) ) printf("Error: Failed to set OAES options.\n"); if( _key_text ) { _key_data = (uint8_t *) calloc(_key_data_len, sizeof(uint8_t)); if( NULL == _key_data ) { printf( "Error: Failed to allocate memory.\n" ); if( _bin_data ) free( _bin_data ); return EXIT_FAILURE; } if( to_binary( _key_data, &_key_data_len, _key_text ) ) { printf( "Error: Could not load key [%s].\n", _key_text); free( _key_data ); return EXIT_FAILURE; } oaes_key_import_data( ctx, _key_data, _key_data_len ); } else switch( _key_len ) { case 128: if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) ) printf("Error: Failed to generate OAES %d bit key.\n", _key_len); break; case 192: if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) ) printf("Error: Failed to generate OAES %d bit key.\n", _key_len); break; case 256: if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) ) printf("Error: Failed to generate OAES %d bit key.\n", _key_len); break; default: break; } if( _bin_data ) { if( OAES_RET_SUCCESS != oaes_encrypt( ctx, _bin_data, _bin_data_len, NULL, &_encbuf_len, NULL, NULL ) ) printf("Error: Failed to retrieve required buffer size for encryption.\n"); _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t)); if( NULL == _encbuf ) { printf( "Error: Failed to allocate memory.\n" ); if( _key_data ) free( _key_data ); free( _bin_data ); return EXIT_FAILURE; } printf( "\n" ); if( OAES_RET_SUCCESS != oaes_encrypt( ctx, _bin_data, _bin_data_len, _encbuf, &_encbuf_len, _iv, &_pad ) ) printf("Error: Encryption failed.\n"); printf( "\n**********************\n\n" ); } else { if( OAES_RET_SUCCESS != oaes_encrypt( ctx, (const uint8_t *)_text, strlen( _text ), NULL, &_encbuf_len, NULL, NULL ) ) printf("Error: Failed to retrieve required buffer size for encryption.\n"); _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t)); if( NULL == _encbuf ) { printf( "Error: Failed to allocate memory.\n" ); if( _key_data ) free( _key_data ); return EXIT_FAILURE; } printf( "\n" ); if( OAES_RET_SUCCESS != oaes_encrypt( ctx, (const uint8_t *)_text, strlen( _text ), _encbuf, &_encbuf_len, _iv, &_pad )) printf("Error: Encryption failed.\n"); printf( "\n**********************\n\n" ); } if( OAES_RET_SUCCESS != oaes_decrypt( ctx, _encbuf, _encbuf_len, NULL, &_decbuf_len, NULL, NULL ) ) printf("Error: Failed to retrieve required buffer size for encryption.\n"); _decbuf = (uint8_t *) calloc(_decbuf_len, sizeof(uint8_t)); if( NULL == _decbuf ) { printf( "Error: Failed to allocate memory.\n" ); if( _key_data ) free( _key_data ); if( _bin_data ) free( _bin_data ); free( _encbuf ); return EXIT_FAILURE; } if( OAES_RET_SUCCESS != oaes_decrypt( ctx, _encbuf, _encbuf_len, _decbuf, &_decbuf_len, _iv, _pad ) ) printf("Error: Decryption failed.\n"); if( OAES_RET_SUCCESS != oaes_free( &ctx ) ) printf("Error: Failed to uninitialize OAES.\n"); oaes_sprintf( NULL, &_buf_len, _encbuf, _encbuf_len ); _buf = (char *) calloc(_buf_len, sizeof(char)); printf( "\n***** cyphertext *****\n" ); if( _buf ) { oaes_sprintf( _buf, &_buf_len, _encbuf, _encbuf_len ); printf( "%s", _buf ); } printf( "\n**********************\n" ); free( _buf ); oaes_sprintf( NULL, &_buf_len, _decbuf, _decbuf_len ); _buf = (char *) calloc(_buf_len, sizeof(char)); printf( "\n***** plaintext *****\n" ); if( _buf ) { oaes_sprintf( _buf, &_buf_len, _decbuf, _decbuf_len ); printf( "%s", _buf ); } printf( "\n**********************\n\n" ); free( _buf ); free( _encbuf ); free( _decbuf ); if( _key_data ) free( _key_data ); if( _bin_data ) free( _bin_data ); return (EXIT_SUCCESS); }
int main(int argc, char** argv) { size_t _i; OAES_CTX * ctx = NULL; uint8_t *_encbuf, *_decbuf; size_t _encbuf_len, _decbuf_len, _buf_len; char *_buf; short _is_ecb = 0; char * _text = NULL; int _key_len = 128; if( argc < 2 ) { usage( argv[0] ); return EXIT_FAILURE; } for( _i = 1; _i < argc; _i++ ) { int _found = 0; if( 0 == strcmp( argv[_i], "-ecb" ) ) { _found = 1; _is_ecb = 1; } if( 0 == strcmp( argv[_i], "-key" ) ) { _found = 1; _i++; // len if( _i >= argc ) { printf("Error: No value specified for '-%s'.\n", "key"); usage( argv[0] ); return EXIT_FAILURE; } _key_len = atoi( argv[_i] ); switch( _key_len ) { case 128: case 192: case 256: break; default: printf("Error: Invalid value [%d] specified for '-%s'.\n", _key_len, "key"); usage( argv[0] ); return EXIT_FAILURE; } } if( 0 == _found ) { if( _text ) { printf("Error: Invalid option '%s'.\n", argv[_i]); usage( argv[0] ); return EXIT_FAILURE; } else { _text = (char *) calloc(strlen( argv[_i] ) + 1, sizeof(char)); if( NULL == _text ) { printf("Error: Failed to allocate memory.\n", argv[_i]); return EXIT_FAILURE; } strcpy( _text, argv[_i] ); } } } if( NULL == _text ) { usage( argv[0] ); return EXIT_FAILURE; } oaes_sprintf( NULL, &_buf_len, (const uint8_t *)_text, strlen( _text ) ); _buf = (char *) calloc(_buf_len, sizeof(char)); printf( "\n***** plaintext *****\n" ); if( _buf ) { oaes_sprintf( _buf, &_buf_len, (const uint8_t *)_text, strlen( _text ) ); printf( "%s", _buf ); } printf( "\n**********************\n" ); free( _buf ); ctx = oaes_alloc(); if( NULL == ctx ) { printf("Error: Failed to initialize OAES.\n"); free( _text ); return EXIT_FAILURE; } if( _is_ecb ) if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) ) printf("Error: Failed to set OAES options.\n"); switch( _key_len ) { case 128: if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) ) printf("Error: Failed to generate OAES %d bit key.\n", _key_len); break; case 192: if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) ) printf("Error: Failed to generate OAES %d bit key.\n", _key_len); break; case 256: if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) ) printf("Error: Failed to generate OAES %d bit key.\n", _key_len); break; default: break; } if( OAES_RET_SUCCESS != oaes_encrypt( ctx, (const uint8_t *)_text, strlen( _text ), NULL, &_encbuf_len ) ) printf("Error: Failed to retrieve required buffer size for encryption.\n"); _encbuf = (uint8_t *) calloc( _encbuf_len, sizeof(uint8_t) ); if( NULL == _encbuf ) { printf( "Error: Failed to allocate memory.\n" ); free( _text ); return EXIT_FAILURE; } if( OAES_RET_SUCCESS != oaes_encrypt( ctx, (const uint8_t *)_text, strlen( _text ), _encbuf, &_encbuf_len ) ) printf("Error: Encryption failed.\n"); if( OAES_RET_SUCCESS != oaes_decrypt( ctx, _encbuf, _encbuf_len, NULL, &_decbuf_len ) ) printf("Error: Failed to retrieve required buffer size for encryption.\n"); _decbuf = (uint8_t *) calloc( _decbuf_len, sizeof(uint8_t) ); if( NULL == _decbuf ) { printf( "Error: Failed to allocate memory.\n" ); free( _text ); free( _encbuf ); return EXIT_FAILURE; } if( OAES_RET_SUCCESS != oaes_decrypt( ctx, _encbuf, _encbuf_len, _decbuf, &_decbuf_len ) ) printf("Error: Decryption failed.\n"); if( OAES_RET_SUCCESS != oaes_free( &ctx ) ) printf("Error: Failed to uninitialize OAES.\n"); oaes_sprintf( NULL, &_buf_len, _encbuf, _encbuf_len ); _buf = (char *) calloc(_buf_len, sizeof(char)); printf( "\n***** cyphertext *****\n" ); if( _buf ) { oaes_sprintf( _buf, &_buf_len, _encbuf, _encbuf_len ); printf( "%s", _buf ); } printf( "\n**********************\n" ); free( _buf ); oaes_sprintf( NULL, &_buf_len, _decbuf, _decbuf_len ); _buf = (char *) calloc(_buf_len, sizeof( char)); printf( "\n***** plaintext *****\n" ); if( _buf ) { oaes_sprintf( _buf, &_buf_len, _decbuf, _decbuf_len ); printf( "%s", _buf ); } printf( "\n**********************\n\n" ); free( _buf ); free( _encbuf ); free( _decbuf ); free( _text ); return (EXIT_SUCCESS); }