/* Copyright (c) 2004-2009, John Hurst All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /*! \file AS_DCP_AES.h \version $Id$ \brief AS-DCP library, AES wrapper */ #include #include #include #include using Kumu::DefaultLogSink; using namespace ASDCP; const int KEY_SIZE_BITS = 128; #include #include #include #include void print_ssl_error() { char err_buf[256]; unsigned long errval = ERR_get_error(); DefaultLogSink().Error("OpenSSL: %s\n", ERR_error_string(errval, err_buf)); } //------------------------------------------------------------------------------------------ class ASDCP::AESEncContext::h__AESContext : public AES_KEY { public: Kumu::SymmetricKey m_KeyBuf; byte_t m_IVec[CBC_BLOCK_SIZE]; }; ASDCP::AESEncContext::AESEncContext() {} ASDCP::AESEncContext::~AESEncContext() {} // Initializes Rijndael CBC encryption context. // Returns error if the key argument is NULL. ASDCP::Result_t ASDCP::AESEncContext::InitKey(const byte_t* key) { KM_TEST_NULL_L(key); if ( m_Context ) return RESULT_INIT; m_Context = new h__AESContext; m_Context->m_KeyBuf.Set(key); if ( AES_set_encrypt_key(m_Context->m_KeyBuf.Value(), KEY_SIZE_BITS, m_Context) ) { print_ssl_error(); return RESULT_CRYPT_INIT; } return RESULT_OK; } // Set the value of the 16 byte CBC Initialization Vector. This operation may be performed // any number of times for a given key. // Returns error if the i_vec argument is NULL. ASDCP::Result_t ASDCP::AESEncContext::SetIVec(const byte_t* i_vec) { KM_TEST_NULL_L(i_vec); if ( ! m_Context ) return RESULT_INIT; memcpy(m_Context->m_IVec, i_vec, CBC_BLOCK_SIZE); return RESULT_OK; } // Retrieve the value of the 16 byte CBC Initialization Vector. // Returns error if the i_vec argument is NULL. ASDCP::Result_t ASDCP::AESEncContext::GetIVec(byte_t* i_vec) const { KM_TEST_NULL_L(i_vec); if ( ! m_Context ) return RESULT_INIT; memcpy(i_vec, m_Context->m_IVec, CBC_BLOCK_SIZE); return RESULT_OK; } // Encrypt a 16 byte block of data. // Returns error if either argument is NULL. ASDCP::Result_t ASDCP::AESEncContext::EncryptBlock(const byte_t* pt_buf, byte_t* ct_buf, ui32_t block_size) { KM_TEST_NULL_L(pt_buf); KM_TEST_NULL_L(ct_buf); assert(block_size > 0); assert( block_size % CBC_BLOCK_SIZE == 0 ); if ( m_Context.empty() ) return RESULT_INIT; h__AESContext* Ctx = m_Context; byte_t tmp_buf[CBC_BLOCK_SIZE]; const byte_t* in_p = pt_buf; byte_t* out_p = ct_buf; while ( block_size ) { // xor with the previous block for ( ui32_t i = 0; i < CBC_BLOCK_SIZE; i++ ) tmp_buf[i] = in_p[i] ^ Ctx->m_IVec[i]; AES_encrypt(tmp_buf, Ctx->m_IVec, Ctx); memcpy(out_p, Ctx->m_IVec, CBC_BLOCK_SIZE); in_p += CBC_BLOCK_SIZE; out_p += CBC_BLOCK_SIZE; block_size -= CBC_BLOCK_SIZE; } return RESULT_OK; } //------------------------------------------------------------------------------------------ class ASDCP::AESDecContext::h__AESContext : public AES_KEY { public: Kumu::SymmetricKey m_KeyBuf; byte_t m_IVec[CBC_BLOCK_SIZE]; }; ASDCP::AESDecContext::AESDecContext() {} ASDCP::AESDecContext::~AESDecContext() {} // Initializes Rijndael CBC decryption context. // Returns error if the key argument is NULL. ASDCP::Result_t ASDCP::AESDecContext::InitKey(const byte_t* key) { KM_TEST_NULL_L(key); if ( m_Context ) return RESULT_INIT; m_Context = new h__AESContext; m_Context->m_KeyBuf.Set(key); if ( AES_set_decrypt_key(m_Context->m_KeyBuf.Value(), KEY_SIZE_BITS, m_Context) ) { print_ssl_error(); return RESULT_CRYPT_INIT; } return RESULT_OK; } // Initializes 16 byte CBC Initialization Vector. This operation may be performed // any number of times for a given key. // Returns error if the i_vec argument is NULL. ASDCP::Result_t ASDCP::AESDecContext::SetIVec(const byte_t* i_vec) { KM_TEST_NULL_L(i_vec); if ( ! m_Context ) return RESULT_INIT; memcpy(m_Context->m_IVec, i_vec, CBC_BLOCK_SIZE); return RESULT_OK; } // Decrypt a 16 byte block of data. // Returns error if either argument is NULL. ASDCP::Result_t ASDCP::AESDecContext::DecryptBlock(const byte_t* ct_buf, byte_t* pt_buf, ui32_t block_size) { KM_TEST_NULL_L(ct_buf); KM_TEST_NULL_L(pt_buf); assert(block_size > 0); assert( block_size % CBC_BLOCK_SIZE == 0 ); if ( m_Context.empty() ) return RESULT_INIT; h__AESContext* Ctx = m_Context; const byte_t* in_p = ct_buf; byte_t* out_p = pt_buf; while ( block_size ) { AES_decrypt(in_p, out_p, Ctx); for ( ui32_t i = 0; i < CBC_BLOCK_SIZE; i++ ) out_p[i] ^= Ctx->m_IVec[i]; memcpy(Ctx->m_IVec, in_p, CBC_BLOCK_SIZE); in_p += CBC_BLOCK_SIZE; out_p += CBC_BLOCK_SIZE; block_size -= CBC_BLOCK_SIZE; } return RESULT_OK; } //------------------------------------------------------------------------------------------ static const ui32_t B_len = 64; // rfc 2104, Sec. 2 static byte_t const ipad_const = 0x36; static byte_t const opad_const = 0x5c; class HMACContext::h__HMACContext { SHA_CTX m_SHA; byte_t m_key[KeyLen]; ASDCP_NO_COPY_CONSTRUCT(h__HMACContext); public: byte_t m_SHAValue[HMAC_SIZE]; bool m_Final; h__HMACContext() : m_Final(false) {} ~h__HMACContext() {} // SMPTE 429.6 MIC key generation void SetKey(const byte_t* key) { byte_t rng_buf[SHA_DIGEST_LENGTH*2]; Kumu::Gen_FIPS_186_Value(key, KeyLen, rng_buf, SHA_DIGEST_LENGTH*2); // rng_buf contains two rounds, x0 and x1 (each 160 bits). // Use x1 per SMPTE 430-6-2006 Sec. 7.10 memcpy(m_key, rng_buf+SHA_DIGEST_LENGTH, KeyLen); Reset(); } // MXF Interop MIC key generation void SetInteropKey(const byte_t* key) { static byte_t key_nonce[KeyLen] = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }; byte_t sha_buf[SHA_DIGEST_LENGTH]; // 7.10: MICKey = trunc( SHA1 ( key, key_nonce ) ) SHA_CTX SHA; SHA1_Init(&SHA); SHA1_Update(&SHA, key, KeyLen); SHA1_Update(&SHA, key_nonce, KeyLen); SHA1_Final(sha_buf, &SHA); memcpy(m_key, sha_buf, KeyLen); Reset(); } // void Reset() { byte_t xor_buf[B_len]; memset(xor_buf, 0, B_len); memcpy(xor_buf, m_key, KeyLen); memset(m_SHAValue, 0, HMAC_SIZE); m_Final = false; SHA1_Init(&m_SHA); // H(K XOR opad, H(K XOR ipad, text)) // ^^^^^^^^^^ for ( ui32_t i = 0; i < B_len; i++ ) xor_buf[i] ^= ipad_const; SHA1_Update(&m_SHA, xor_buf, B_len); } // void Update(const byte_t* buf, ui32_t buf_len) { // H(K XOR opad, H(K XOR ipad, text)) // ^^^^ SHA1_Update(&m_SHA, buf, buf_len); } // void Finalize() { SHA_CTX SHA; SHA1_Init(&SHA); byte_t xor_buf[B_len]; memset(xor_buf, 0, B_len); memcpy(xor_buf, m_key, KeyLen); SHA1_Init(&SHA); // H(K XOR opad, H(K XOR ipad, text)) // ^^^^^^^^^^ for ( ui32_t i = 0; i < B_len; i++ ) xor_buf[i] ^= opad_const; SHA1_Update(&SHA, xor_buf, B_len); // H(K XOR opad, H(K XOR ipad, text)) // ^ SHA1_Final(m_SHAValue, &m_SHA); SHA1_Update(&SHA, m_SHAValue, HMAC_SIZE); // H(K XOR opad, H(K XOR ipad, text)) // ^ SHA1_Final(m_SHAValue, &SHA); m_Final = true; } // void GetMICKey(byte_t* buf) const { memcpy(buf, m_key, KeyLen); } }; HMACContext::HMACContext() { } HMACContext::~HMACContext() { } // Result_t HMACContext::InitKey(const byte_t* key, LabelSet_t SetType) { KM_TEST_NULL_L(key); m_Context = new h__HMACContext; switch ( SetType ) { case LS_MXF_INTEROP: m_Context->SetInteropKey(key); break; case LS_MXF_SMPTE: m_Context->SetKey(key); break; default: m_Context = 0; return RESULT_INIT; } return RESULT_OK; } // void HMACContext::Reset() { if ( ! m_Context.empty() ) m_Context->Reset(); } // Result_t HMACContext::Update(const byte_t* buf, ui32_t buf_len) { KM_TEST_NULL_L(buf); if ( m_Context.empty() || m_Context->m_Final ) return RESULT_INIT; m_Context->Update(buf, buf_len); return RESULT_OK; } // Result_t HMACContext::Finalize() { if ( m_Context.empty() || m_Context->m_Final ) return RESULT_INIT; m_Context->Finalize(); return RESULT_OK; } // Result_t HMACContext::GetHMACValue(byte_t* buf) const { KM_TEST_NULL_L(buf); if ( m_Context.empty() || ! m_Context->m_Final ) return RESULT_INIT; memcpy(buf, m_Context->m_SHAValue, HMAC_SIZE); return RESULT_OK; } // Result_t HMACContext::TestHMACValue(const byte_t* buf) const { KM_TEST_NULL_L(buf); if ( m_Context.empty() || ! m_Context->m_Final ) return RESULT_INIT; return ( memcmp(buf, m_Context->m_SHAValue, HMAC_SIZE) == 0 ) ? RESULT_OK : RESULT_HMACFAIL; } // Result_t HMACContext::GetMICKey(byte_t* buf) const { KM_TEST_NULL_L(buf); if ( m_Context.empty() ) return RESULT_INIT; m_Context->GetMICKey(buf); return RESULT_OK; } // // end AS_DCP_AES.cpp //