Пример #1
0
int
yacl_aes128gcm_decrypt(const uint8_t *ciphertext, size_t ciphertext_len,
                       const uint8_t *aad, size_t aad_len,
                       const uint8_t *key, size_t key_len,
                       const uint8_t *nonce, size_t nonce_len,
                       const uint8_t *tag, size_t tag_len,
                       uint8_t *plaintext, size_t plaintext_len)
{
  if (crypto_aead_aes256gcm_NPUBBYTES != nonce_len)
    return -1;

  if (plaintext_len != ciphertext_len)
    return -2;

  if (crypto_aead_aes128gcm_KEYBYTES != key_len)
    return -3;

  if (crypto_aead_aes256gcm_ABYTES != tag_len)
    return -4;

  return aes_gcm_ad(key, key_len,
                    nonce, nonce_len,
                    ciphertext, ciphertext_len,
                    aad, aad_len,
                    tag,
                    plaintext);
}
Пример #2
0
int
yacl_aes256gcm_decrypt(const uint8_t *ciphertext, size_t ciphertext_len,
                       const uint8_t *aad, size_t aad_len,
                       const uint8_t *key, size_t key_len,
                       const uint8_t *nonce, size_t nonce_len,
                       const uint8_t *tag, size_t tag_len,
                       uint8_t *plaintext, size_t plaintext_len)
{
  if (crypto_aead_aes256gcm_NPUBBYTES != nonce_len)
    return -1;

  if (plaintext_len != ciphertext_len)
    return -2;

  if (crypto_aead_aes256gcm_KEYBYTES != key_len)
    return -3;

  if (crypto_aead_aes256gcm_ABYTES != tag_len)
    return -4;

#if defined HAVE_LIBSODIUM && defined HAVE_SODIUM_GCM && defined HAVE_SODIUM_GCM_DECRYPT
  if (crypto_aead_aes256gcm_is_available())
    {
      return crypto_aead_aes256gcm_decrypt_detached(plaintext,
                                                    NULL,
                                                    ciphertext,
                                                    ciphertext_len,
                                                    tag,
                                                    aad,
                                                    aad_len,
                                                    nonce,
                                                    key);
    }
#endif

  return aes_gcm_ad(key, key_len,
                    nonce, nonce_len,
                    ciphertext, ciphertext_len,
                    aad, aad_len,
                    tag,
                    plaintext);
}
Пример #3
0
u8 * gcmp_decrypt(const u8 *tk, size_t tk_len, const struct ieee80211_hdr *hdr,
		  const u8 *data, size_t data_len, size_t *decrypted_len)
{
	u8 aad[30], nonce[12], *plain;
	size_t aad_len, mlen;
	const u8 *m;

	if (data_len < 8 + 16)
		return NULL;

	plain = os_malloc(data_len + AES_BLOCK_SIZE);
	if (plain == NULL)
		return NULL;

	m = data + 8;
	mlen = data_len - 8 - 16;

	os_memset(aad, 0, sizeof(aad));
	gcmp_aad_nonce(hdr, data, aad, &aad_len, nonce);
	wpa_hexdump(MSG_EXCESSIVE, "GCMP AAD", aad, aad_len);
	wpa_hexdump(MSG_EXCESSIVE, "GCMP nonce", nonce, sizeof(nonce));

	if (aes_gcm_ad(tk, tk_len, nonce, sizeof(nonce), m, mlen, aad, aad_len,
		       m + mlen, plain) < 0) {
		u16 seq_ctrl = le_to_host16(hdr->seq_ctrl);
		wpa_printf(MSG_INFO, "Invalid GCMP frame: A1=" MACSTR
			   " A2=" MACSTR " A3=" MACSTR " seq=%u frag=%u",
			   MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
			   MAC2STR(hdr->addr3),
			   WLAN_GET_SEQ_SEQ(seq_ctrl),
			   WLAN_GET_SEQ_FRAG(seq_ctrl));
		os_free(plain);
		return NULL;
	}

	*decrypted_len = mlen;
	return plain;
}
Пример #4
0
static int test_gcm(void)
{
	int ret = 0;
	int i;
	u8 k[32], aad[32], iv[64], t[16], tag[16];
	u8 p[64], c[64], tmp[64];
	size_t k_len, p_len, aad_len, iv_len;

	for (i = 0; i < ARRAY_SIZE(gcm_tests); i++) {
		const struct gcm_test_vector *tc = &gcm_tests[i];

		k_len = os_strlen(tc->k) / 2;
		if (hexstr2bin(tc->k, k, k_len)) {
			printf("Invalid GCM test vector %d (k)\n", i);
			ret++;
			continue;
		}

		p_len = os_strlen(tc->p) / 2;
		if (hexstr2bin(tc->p, p, p_len)) {
			printf("Invalid GCM test vector %d (p)\n", i);
			ret++;
			continue;
		}

		aad_len = os_strlen(tc->aad) / 2;
		if (hexstr2bin(tc->aad, aad, aad_len)) {
			printf("Invalid GCM test vector %d (aad)\n", i);
			ret++;
			continue;
		}

		iv_len = os_strlen(tc->iv) / 2;
		if (hexstr2bin(tc->iv, iv, iv_len)) {
			printf("Invalid GCM test vector %d (iv)\n", i);
			ret++;
			continue;
		}

		if (hexstr2bin(tc->c, c, p_len)) {
			printf("Invalid GCM test vector %d (c)\n", i);
			ret++;
			continue;
		}

		if (hexstr2bin(tc->t, t, sizeof(t))) {
			printf("Invalid GCM test vector %d (t)\n", i);
			ret++;
			continue;
		}

		if (aes_gcm_ae(k, k_len, iv, iv_len, p, p_len, aad, aad_len,
			       tmp, tag) < 0) {
			printf("GCM-AE failed (test case %d)\n", i);
			ret++;
			continue;
		}

		if (os_memcmp(c, tmp, p_len) != 0) {
			printf("GCM-AE mismatch (test case %d)\n", i);
			ret++;
		}

		if (os_memcmp(tag, t, sizeof(tag)) != 0) {
			printf("GCM-AE tag mismatch (test case %d)\n", i);
			ret++;
		}

		if (p_len == 0) {
			if (aes_gmac(k, k_len, iv, iv_len, aad, aad_len, tag) <
			    0) {
				printf("GMAC failed (test case %d)\n", i);
				ret++;
				continue;
			}

			if (os_memcmp(tag, t, sizeof(tag)) != 0) {
				printf("GMAC tag mismatch (test case %d)\n", i);
				ret++;
			}
		}

		if (aes_gcm_ad(k, k_len, iv, iv_len, c, p_len, aad, aad_len,
			       t, tmp) < 0) {
			printf("GCM-AD failed (test case %d)\n", i);
			ret++;
			continue;
		}

		if (os_memcmp(p, tmp, p_len) != 0) {
			printf("GCM-AD mismatch (test case %d)\n", i);
			ret++;
		}
	}

	return ret;
}
Пример #5
0
static int test_gcm(void)
{
    int ret = 0;
    int i;
    u8 k[32], aad[32], iv[64], t[16], tag[16];
    u8 p[64], c[64], tmp[64];
    size_t k_len, p_len, aad_len, iv_len;

    printf ("testing gcm\n");

    for (i = 0; i < ARRAY_SIZE(gcm_tests); i++) {
        const struct gcm_test_vector *tc = &gcm_tests[i];

        k_len = strlen(tc->k) / 2;
        if (hexstr2bin(tc->k, k, k_len)) {
            printf("Invalid GCM test vector %d (k)\n", i);
            ret++;
            continue;
        }

        p_len = strlen(tc->p) / 2;
        if (hexstr2bin(tc->p, p, p_len)) {
            printf("Invalid GCM test vector %d (p)\n", i);
            ret++;
            continue;
        }

        aad_len = strlen(tc->aad) / 2;
        if (hexstr2bin(tc->aad, aad, aad_len)) {
            printf("Invalid GCM test vector %d (aad)\n", i);
            ret++;
            continue;
        }

        iv_len = strlen(tc->iv) / 2;
        if (hexstr2bin(tc->iv, iv, iv_len)) {
            printf("Invalid GCM test vector %d (iv)\n", i);
            ret++;
            continue;
        }

        if (hexstr2bin(tc->c, c, p_len)) {
            printf("Invalid GCM test vector %d (c)\n", i);
            ret++;
            continue;
        }

        if (hexstr2bin(tc->t, t, sizeof(t))) {
            printf("Invalid GCM test vector %d (t)\n", i);
            ret++;
            continue;
        }

        if (k_len == 32 && iv_len == 12)
        {
            printf ("k: %s\n", tc->k);
            printf ("iv: %s\n", tc->iv);
            printf ("p: %s\n", tc->p);
            printf ("aad: %s\n", tc->aad);
        }


        if (aes_gcm_ae(k, k_len, iv, iv_len, p, p_len, aad, aad_len,
                       tmp, tag) < 0) {
            printf("GCM-AE failed (test case %d)\n", i);
            ret++;
            continue;
        }
        else if (k_len == 32 && iv_len == 12)
        {
            for (int i=0; i< sizeof tmp; i++)
                printf ("%02X", tmp[i]);
            printf ("\n");
            for (int i=0; i< sizeof tag; i++)
                printf ("%02X", tag[i]);
            printf ("\n");
            printf ("k_len: %lu, iv_len: %lu, p_len: %lu, aad_len: %lu\n", k_len, iv_len, p_len, aad_len);


        }

        if (memcmp(c, tmp, p_len) != 0) {
            printf("GCM-AE mismatch (test case %d)\n", i);
            ret++;
        }

        if (memcmp(tag, t, sizeof(tag)) != 0) {
            printf("GCM-AE tag mismatch (test case %d)\n", i);
            ret++;
        }

        if (p_len == 0) {
            if (aes_gmac(k, k_len, iv, iv_len, aad, aad_len, tag) <
                    0) {
                printf("GMAC failed (test case %d)\n", i);
                ret++;
                continue;
            }

            if (memcmp(tag, t, sizeof(tag)) != 0) {
                printf("GMAC tag mismatch (test case %d)\n", i);
                ret++;
            }
        }

        if (aes_gcm_ad(k, k_len, iv, iv_len, c, p_len, aad, aad_len,
                       t, tmp) < 0) {
            printf("GCM-AD failed (test case %d)\n", i);
            ret++;
            continue;
        }
        else
        {
            printf ("uyup\n");
        }

        if (memcmp(p, tmp, p_len) != 0) {
            printf("GCM-AD mismatch (test case %d)\n", i);
            ret++;
        }
    }

    return ret;
}