forked from zbackup/zbackup
-
Notifications
You must be signed in to change notification settings - Fork 0
/
encryption.cc
120 lines (88 loc) · 3.28 KB
/
encryption.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
// Copyright (c) 2012-2014 Konstantin Isakov <[email protected]> and ZBackup contributors, see CONTRIBUTORS
// Part of ZBackup. Licensed under GNU GPLv2 or later + OpenSSL, see LICENSE
#include <openssl/aes.h>
#include "check.hh"
#include "encryption.hh"
#include "static_assert.hh"
namespace Encryption {
char const ZeroIv[ IvSize ] = { 0, 0, 0, 0,
0, 0, 0, 0,
0, 0, 0, 0,
0, 0, 0, 0 };
void const * encrypt( void const * iv, void const * keyData,
void const * inData, void * outData, size_t size )
{
unsigned char block[ BlockSize ];
CHECK( !( size % BlockSize ), "size of data to encrypt is not a multiple of "
"block size" );
AES_KEY key;
AES_set_encrypt_key( ( unsigned char const * ) keyData, KeySize * 8, &key );
void const * prev = iv;
// We do the operation in block size multiples. We do XOR in size_t
// multiples. The operation is endian-neutral
// Make sure that BlockSize is a multiple of the size of size_t
STATIC_ASSERT( !( BlockSize % sizeof( size_t ) ) );
size_t const * inS = ( size_t const * ) inData;
unsigned char * out = ( unsigned char * ) outData;
for ( size_t count = size / BlockSize; count--; )
{
size_t const * prevS = ( size_t const * ) prev;
size_t * blockS = ( size_t * ) block;
for ( size_t x = BlockSize / sizeof( size_t ); x--; )
*blockS++ = *inS++ ^ *prevS++;
AES_encrypt( block, out, &key );
prev = out;
out += BlockSize;
}
return prev;
}
void const * getNextDecryptionIv( void const * in, size_t size )
{
CHECK( !( size % BlockSize ), "size of data to decrypt is not a multiple of "
"block size" );
return ( char const * ) in + size - BlockSize;
}
void decrypt( void const * iv, void const * keyData, void const * inData,
void * outData, size_t size )
{
CHECK( !( size % BlockSize ), "size of data to decrypt is not a multiple of "
"block size" );
AES_KEY key;
AES_set_decrypt_key( ( unsigned char const * ) keyData, KeySize * 8, &key );
// We decrypt from the end to the beginning
unsigned char const * in = ( unsigned char const * ) inData + size;
unsigned char * out = ( unsigned char * ) outData + size;
size_t count = size / BlockSize;
size_t const * prevS = ( size_t const * )( in - BlockSize );
size_t * outS = ( size_t * ) out;
while( count-- )
{
if ( prevS == inData )
prevS = ( size_t const * )( ( unsigned char const * ) iv + BlockSize );
in -= BlockSize;
AES_decrypt( in, ( unsigned char * ) outS - BlockSize, &key );
for ( size_t x = BlockSize / sizeof( size_t ); x--; )
*--outS ^= *--prevS;
}
}
void pad( void * data, size_t size )
{
CHECK( size < BlockSize, "size to pad is too large: %zu bytes", size );
unsigned char * p = ( unsigned char * ) data + size;
unsigned char v = BlockSize - size;
for ( size_t count = v; count--; )
*p++ = v;
}
size_t unpad( void const * data )
{
unsigned char const * p = ( unsigned char const * ) data + BlockSize - 1;
unsigned char v = *p;
if ( !v || v > BlockSize )
throw exBadPadding();
// Check the rest of the padding
for ( size_t count = v - 1; count--; )
if ( *--p != v )
throw exBadPadding();
return BlockSize - v;
}
}