2020-02-03 05:00:36 +01:00
|
|
|
// Copyright (c) 2019-2020 Alexander Medvednikov. All rights reserved.
|
2019-07-25 17:49:57 +02:00
|
|
|
// Use of this source code is governed by an MIT license
|
|
|
|
// that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
// Cipher block chaining (CBC) mode.
|
|
|
|
|
|
|
|
// CBC provides confidentiality by xoring (chaining) each plaintext block
|
|
|
|
// with the previous ciphertext block before applying the block cipher.
|
|
|
|
|
|
|
|
// See NIST SP 800-38A, pp 10-11
|
|
|
|
|
|
|
|
// NOTE this will be moved to crypto.cipher interface (joe-c)
|
|
|
|
|
|
|
|
module aes
|
|
|
|
|
2020-04-26 13:49:31 +02:00
|
|
|
import crypto.cipher
|
|
|
|
import crypto.internal.subtle
|
2019-07-25 17:49:57 +02:00
|
|
|
|
|
|
|
struct AesCbc {
|
|
|
|
mut:
|
|
|
|
b AesCipher
|
|
|
|
block_size int
|
|
|
|
iv []byte
|
|
|
|
tmp []byte
|
|
|
|
}
|
|
|
|
|
2019-10-10 19:04:11 +02:00
|
|
|
// internal
|
|
|
|
fn new_aes_cbc(b AesCipher, iv []byte) AesCbc {
|
2019-07-25 17:49:57 +02:00
|
|
|
return AesCbc{
|
|
|
|
b: b,
|
|
|
|
block_size: b.block_size(),
|
2019-07-29 16:33:35 +02:00
|
|
|
iv: iv.clone(),
|
2020-06-27 21:46:04 +02:00
|
|
|
tmp: []byte{len:(b.block_size()),}
|
2019-07-25 17:49:57 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// new_cbc_encrypter returns a BlockMode which encrypts in cipher block chaining
|
|
|
|
// mode, using the given Block. The length of iv must be the same as the
|
|
|
|
// Block's block size.
|
|
|
|
pub fn new_cbc(b AesCipher, iv []byte) AesCbc {
|
|
|
|
if iv.len != b.block_size() {
|
|
|
|
panic('crypto.cipher.new_cbc_encrypter: IV length must equal block size')
|
|
|
|
}
|
2019-10-10 19:04:11 +02:00
|
|
|
return new_aes_cbc(b, iv)
|
2019-07-25 17:49:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn (x &AesCbc) block_size() int { return x.block_size }
|
|
|
|
|
2020-07-10 18:04:51 +02:00
|
|
|
pub fn (x &AesCbc) encrypt_blocks(mut dst_ []byte, src_ []byte) {
|
|
|
|
mut dst := *dst_
|
2019-08-07 13:37:07 +02:00
|
|
|
mut src := src_
|
2019-07-25 17:49:57 +02:00
|
|
|
if src.len%x.block_size != 0 {
|
|
|
|
panic('crypto.cipher: input not full blocks')
|
|
|
|
}
|
|
|
|
if dst.len < src.len {
|
|
|
|
panic('crypto.cipher: output smaller than input')
|
|
|
|
}
|
2020-07-10 18:04:51 +02:00
|
|
|
if subtle.inexact_overlap(dst[..src.len], src_) {
|
2019-07-25 17:49:57 +02:00
|
|
|
panic('crypto.cipher: invalid buffer overlap')
|
|
|
|
}
|
|
|
|
|
|
|
|
mut iv := x.iv
|
|
|
|
|
|
|
|
for src.len > 0 {
|
|
|
|
// Write the xor to dst, then encrypt in place.
|
2020-07-10 18:04:51 +02:00
|
|
|
cipher.xor_bytes(mut dst[..x.block_size], src[..x.block_size], iv)
|
|
|
|
x.b.encrypt(mut dst[..x.block_size], mut dst[..x.block_size])
|
2019-07-25 17:49:57 +02:00
|
|
|
|
|
|
|
// Move to the next block with this block as the next iv.
|
2020-07-10 18:04:51 +02:00
|
|
|
iv = dst[..x.block_size]
|
2019-07-25 17:49:57 +02:00
|
|
|
if x.block_size >= src.len {
|
2019-11-14 08:00:22 +01:00
|
|
|
src = []
|
2019-07-25 17:49:57 +02:00
|
|
|
} else {
|
2019-10-27 08:03:15 +01:00
|
|
|
src = src[x.block_size..]
|
2019-07-25 17:49:57 +02:00
|
|
|
}
|
2020-07-10 18:04:51 +02:00
|
|
|
dst = dst[x.block_size..]
|
2019-07-25 17:49:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Save the iv for the next crypt_blocks call.
|
2019-07-29 16:33:35 +02:00
|
|
|
copy(x.iv, iv)
|
2019-07-25 17:49:57 +02:00
|
|
|
}
|
|
|
|
|
2020-06-04 10:35:40 +02:00
|
|
|
pub fn (mut x AesCbc) decrypt_blocks(mut dst []byte, src []byte) {
|
2019-07-25 17:49:57 +02:00
|
|
|
if src.len%x.block_size != 0 {
|
|
|
|
panic('crypto.cipher: input not full blocks')
|
|
|
|
}
|
|
|
|
if dst.len < src.len {
|
|
|
|
panic('crypto.cipher: output smaller than input')
|
|
|
|
}
|
2020-04-23 15:45:25 +02:00
|
|
|
if subtle.inexact_overlap((*dst)[..src.len], src) {
|
2019-07-25 17:49:57 +02:00
|
|
|
panic('crypto.cipher: invalid buffer overlap')
|
|
|
|
}
|
|
|
|
if src.len == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// For each block, we need to xor the decrypted data with the previous block's ciphertext (the iv).
|
|
|
|
// To avoid making a copy each time, we loop over the blocks BACKWARDS.
|
|
|
|
mut end := src.len
|
|
|
|
mut start := end - x.block_size
|
|
|
|
mut prev := start - x.block_size
|
|
|
|
|
|
|
|
// Copy the last block of ciphertext in preparation as the new iv.
|
2019-07-29 16:33:35 +02:00
|
|
|
copy(x.tmp, src.slice(start, end))
|
2019-07-25 17:49:57 +02:00
|
|
|
|
|
|
|
// Loop over all but the first block.
|
|
|
|
for start > 0 {
|
2020-09-27 10:18:55 +02:00
|
|
|
mut src_chunk := src.slice(start, end)
|
|
|
|
x.b.decrypt(mut (*dst).slice(start, end), mut src_chunk)
|
2020-04-23 15:45:25 +02:00
|
|
|
cipher.xor_bytes(mut (*dst).slice(start, end), (*dst).slice(start, end), src.slice(prev, start))
|
2019-07-25 17:49:57 +02:00
|
|
|
|
|
|
|
end = start
|
|
|
|
start = prev
|
|
|
|
prev -= x.block_size
|
|
|
|
}
|
|
|
|
|
|
|
|
// The first block is special because it uses the saved iv.
|
2020-09-27 10:18:55 +02:00
|
|
|
mut src_chunk := src.slice(start, end)
|
|
|
|
x.b.decrypt(mut (*dst).slice(start, end), mut src_chunk)
|
2020-04-23 15:45:25 +02:00
|
|
|
cipher.xor_bytes(mut (*dst).slice(start, end), (*dst).slice(start, end), x.iv)
|
2019-07-25 17:49:57 +02:00
|
|
|
|
|
|
|
|
|
|
|
// Set the new iv to the first block we copied earlier.
|
|
|
|
x.iv = x.tmp
|
|
|
|
x.tmp = x.iv
|
|
|
|
}
|
|
|
|
|
2019-12-06 13:24:53 +01:00
|
|
|
fn (x &AesCbc) set_iv(iv []byte) {
|
2019-07-25 17:49:57 +02:00
|
|
|
if iv.len != x.iv.len {
|
|
|
|
panic('cipher: incorrect length IV')
|
|
|
|
}
|
2019-07-29 16:33:35 +02:00
|
|
|
copy(x.iv, iv)
|
2019-07-25 17:49:57 +02:00
|
|
|
}
|