/* * libwebsockets - JSON Web Encryption support * * Copyright (C) 2018 Andy Green * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation: * version 2.1 of the License. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, * MA 02110-1301 USA * * * JWE code related to aes gcm * */ #include "core/private.h" #include "jose/jwe/private.h" /* * NOTICE this is AESGCM content encryption, it's not AES GCM key wrapping * * * This section defines the specifics of performing authenticated * encryption with AES in Galois/Counter Mode (GCM) ([AES] and * [NIST.800-38D]). * * The CEK is used as the encryption key. * * Use of an IV of size 96 bits is REQUIRED with this algorithm. * * The requested size of the Authentication Tag output MUST be 128 bits, * regardless of the key size. * * For decrypt: decrypt the KEK, then decrypt the payload * * For encrypt: encrypt the payload, then encrypt the KEK */ /* * encrypting... enc_cek is unencrypted */ int lws_jwe_encrypt_gcm(struct lws_jwe *jwe, uint8_t *enc_cek, uint8_t *aad, int aad_len) { struct lws_gencrypto_keyelem el; struct lws_genaes_ctx aesctx; size_t ivs = LWS_AESGCM_IV; int n; /* Some sanity checks on what came in */ /* MUST be 128-bit for all sizes */ if (jwe->jws.map.len[LJWE_ATAG] != LWS_AESGCM_TAG) { lwsl_notice("%s: AESGCM tag size must be 128b, got %d\n", __func__, jwe->jws.map.len[LJWE_ATAG]); return -1; } if (jwe->jws.map.len[LJWE_IV] != LWS_AESGCM_IV) { /* MUST be 96-bit */ lwsl_notice("%s: AESGCM IV must be 128b, got %d\n", __func__, jwe->jws.map.len[LJWE_IV]); return -1; } /* EKEY is directly the CEK KEY */ el.buf = enc_cek; el.len = jwe->jose.enc_alg->keybits_fixed / 8; if (lws_genaes_create(&aesctx, LWS_GAESO_ENC, LWS_GAESM_GCM, &el, LWS_GAESP_NO_PADDING, NULL)) { lwsl_err("%s: lws_genaes_create failed\n", __func__); return -1; } /* aad */ n = lws_genaes_crypt(&aesctx, aad, aad_len, NULL, (uint8_t *)jwe->jws.map.buf[LJWE_IV], (uint8_t *)jwe->jws.map.buf[LJWE_ATAG], &ivs, LWS_AESGCM_TAG); if (n) { lwsl_err("%s: lws_genaes_crypt aad failed\n", __func__); return -1; } /* payload */ n = lws_genaes_crypt(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT], jwe->jws.map.len[LJWE_CTXT], (uint8_t *)jwe->jws.map.buf[LJWE_CTXT], (uint8_t *)jwe->jws.map.buf[LJWE_IV], NULL, &ivs, LWS_AESGCM_TAG); n |= lws_genaes_destroy(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_ATAG], LWS_AESGCM_TAG); if (n) { lwsl_err("%s: lws_genaes_crypt failed\n", __func__); return -1; } return jwe->jws.map.len[LJWE_CTXT]; } int lws_jwe_auth_and_decrypt_gcm(struct lws_jwe *jwe, uint8_t *enc_cek, uint8_t *aad, int aad_len) { struct lws_gencrypto_keyelem el; struct lws_genaes_ctx aesctx; size_t ivs = LWS_AESGCM_IV; uint8_t tag[LWS_AESGCM_TAG]; int n; /* Some sanity checks on what came in */ /* Tag MUST be 128-bit for all sizes */ if (jwe->jws.map.len[LJWE_ATAG] != LWS_AESGCM_TAG) { lwsl_notice("%s: AESGCM tag size must be 128b, got %d\n", __func__, jwe->jws.map.len[LJWE_ATAG]); return -1; } if (jwe->jws.map.len[LJWE_IV] != LWS_AESGCM_IV) { /* MUST be 96-bit */ lwsl_notice("%s: AESGCM IV must be 128b, got %d\n", __func__, jwe->jws.map.len[LJWE_IV]); return -1; } /* EKEY is directly the CEK KEY */ el.buf = enc_cek; el.len = jwe->jose.enc_alg->keybits_fixed / 8; if (lws_genaes_create(&aesctx, LWS_GAESO_DEC, LWS_GAESM_GCM, &el, LWS_GAESP_NO_PADDING, NULL)) { lwsl_err("%s: lws_genaes_create failed\n", __func__); return -1; } n = lws_genaes_crypt(&aesctx, aad, aad_len, NULL, (uint8_t *)jwe->jws.map.buf[LJWE_IV], (uint8_t *)jwe->jws.map.buf[LJWE_ATAG], &ivs, 16); if (n) { lwsl_err("%s: lws_genaes_crypt aad failed\n", __func__); return -1; } n = lws_genaes_crypt(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT], jwe->jws.map.len[LJWE_CTXT], (uint8_t *)jwe->jws.map.buf[LJWE_CTXT], (uint8_t *)jwe->jws.map.buf[LJWE_IV], (uint8_t *)jwe->jws.map.buf[LJWE_ATAG], &ivs, 16); n |= lws_genaes_destroy(&aesctx, tag, sizeof(tag)); if (n) { lwsl_err("%s: lws_genaes_crypt failed\n", __func__); return -1; } return jwe->jws.map.len[LJWE_CTXT]; }