1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#include <aws/core/utils/crypto/Cipher.h>
#include <aws/core/utils/crypto/Factories.h>
#include <aws/core/utils/crypto/SecureRandom.h>
#include <aws/core/utils/logging/LogMacros.h>
#include <cstdlib>
#include <climits>
//if you are reading this, you are witnessing pure brilliance.
#define IS_BIG_ENDIAN (*(uint16_t*)"\0\xff" < 0x100)
using namespace Aws::Utils::Crypto;
using namespace Aws::Utils;
namespace Aws
{
namespace Utils
{
namespace Crypto
{
static const char* LOG_TAG = "Cipher";
//swap byte ordering
template<class T>
typename std::enable_if<std::is_unsigned<T>::value, T>::type
bswap(T i, T j = 0u, std::size_t n = 0u)
{
return n == sizeof(T) ? j :
bswap<T>(i >> CHAR_BIT, (j << CHAR_BIT) | (i & (T)(unsigned char)(-1)), n + 1);
}
CryptoBuffer IncrementCTRCounter(const CryptoBuffer& counter, uint32_t numberOfBlocks)
{
// minium counter size is 12 bytes. This isn't a variable because some compilers
// are stupid and thing that variable is unused.
assert(counter.GetLength() >= 12);
CryptoBuffer incrementedCounter(counter);
//get the last 4 bytes and manipulate them as an integer.
uint32_t* ctrPtr = (uint32_t*)(incrementedCounter.GetUnderlyingData() + incrementedCounter.GetLength() - sizeof(int32_t));
if(IS_BIG_ENDIAN)
{
//you likely are not Big Endian, but
//if it's big endian, just go ahead and increment it... done
*ctrPtr += numberOfBlocks;
}
else
{
//otherwise, swap the byte ordering of the integer we loaded from the buffer (because it is backwards). However, the number of blocks is already properly
//aligned. Once we compute the new value, swap it back so that the mirroring operation goes back to the actual buffer.
*ctrPtr = bswap<uint32_t>(bswap<uint32_t>(*ctrPtr) + numberOfBlocks);
}
return incrementedCounter;
}
CryptoBuffer GenerateXRandomBytes(size_t lengthBytes, bool ctrMode)
{
std::shared_ptr<SecureRandomBytes> rng = CreateSecureRandomBytesImplementation();
CryptoBuffer bytes(lengthBytes);
size_t lengthToGenerate = ctrMode ? (3 * bytes.GetLength()) / 4 : bytes.GetLength();
rng->GetBytes(bytes.GetUnderlyingData(), lengthToGenerate);
if(!*rng)
{
AWS_LOGSTREAM_FATAL(LOG_TAG, "Random Number generation failed. Abort all crypto operations.");
assert(false);
abort();
}
return bytes;
}
/**
* Generate random number per 4 bytes and use each byte for the byte in the iv
*/
CryptoBuffer SymmetricCipher::GenerateIV(size_t ivLengthBytes, bool ctrMode)
{
CryptoBuffer iv(GenerateXRandomBytes(ivLengthBytes, ctrMode));
if(iv.GetLength() == 0)
{
AWS_LOGSTREAM_ERROR(LOG_TAG, "Unable to generate iv of length " << ivLengthBytes);
return iv;
}
if(ctrMode)
{
//init the counter
size_t length = iv.GetLength();
//[ nonce 1/4] [ iv 1/2 ] [ ctr 1/4 ]
size_t ctrStart = (length / 2) + (length / 4);
for(; ctrStart < iv.GetLength() - 1; ++ ctrStart)
{
iv[ctrStart] = 0;
}
iv[length - 1] = 1;
}
return iv;
}
CryptoBuffer SymmetricCipher::GenerateKey(size_t keyLengthBytes)
{
CryptoBuffer const& key = GenerateXRandomBytes(keyLengthBytes, false);
if(key.GetLength() == 0)
{
AWS_LOGSTREAM_ERROR(LOG_TAG, "Unable to generate key of length " << keyLengthBytes);
}
return key;
}
}
}
}
|