2 This file is part of GNUnet.
3 (C) 2001, 2002, 2003, 2004, 2005, 2006 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 2, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file util/crypto_aes.c
23 * @brief Symmetric encryption services.
24 * @author Christian Grothoff
25 * @author Ioana Patrascu
29 #include "gnunet_common.h"
30 #include "gnunet_crypto_lib.h"
33 #define LOG(kind,...) GNUNET_log_from (kind, "util", __VA_ARGS__)
36 * Create a new SessionKey (for AES-256).
39 GNUNET_CRYPTO_aes_create_session_key (struct GNUNET_CRYPTO_AesSessionKey *key)
41 gcry_randomize (&key->key[0], GNUNET_CRYPTO_AES_KEY_LENGTH,
44 htonl (GNUNET_CRYPTO_crc32_n (key, GNUNET_CRYPTO_AES_KEY_LENGTH));
48 * Check that a new session key is well-formed.
50 * @return GNUNET_OK if the key is valid
53 GNUNET_CRYPTO_aes_check_session_key (const struct GNUNET_CRYPTO_AesSessionKey
58 crc = GNUNET_CRYPTO_crc32_n (key, GNUNET_CRYPTO_AES_KEY_LENGTH);
59 if (ntohl (key->crc32) == crc)
67 * Encrypt a block with the public key of another
68 * host that uses the same cyper.
69 * @param block the block to encrypt
70 * @param len the size of the block
71 * @param sessionkey the key used to encrypt
72 * @param iv the initialization vector to use, use INITVALUE
74 * @param result the output parameter in which to store the encrypted result
75 * @returns the size of the encrypted block, -1 for errors
78 GNUNET_CRYPTO_aes_encrypt (const void *block, size_t len,
79 const struct GNUNET_CRYPTO_AesSessionKey *
81 const struct GNUNET_CRYPTO_AesInitializationVector
84 gcry_cipher_hd_t handle;
87 if (sessionkey->crc32 !=
88 htonl (GNUNET_CRYPTO_crc32_n
89 (sessionkey, GNUNET_CRYPTO_AES_KEY_LENGTH)))
95 gcry_cipher_open (&handle, GCRY_CIPHER_AES256,
96 GCRY_CIPHER_MODE_CFB, 0));
97 rc = gcry_cipher_setkey (handle, sessionkey, GNUNET_CRYPTO_AES_KEY_LENGTH);
98 GNUNET_assert ((0 == rc) || ((char) rc == GPG_ERR_WEAK_KEY));
99 rc = gcry_cipher_setiv (handle, iv,
101 GNUNET_CRYPTO_AesInitializationVector));
102 GNUNET_assert ((0 == rc) || ((char) rc == GPG_ERR_WEAK_KEY));
103 GNUNET_assert (0 == gcry_cipher_encrypt (handle, result, len, block, len));
104 gcry_cipher_close (handle);
109 * Decrypt a given block with the sessionkey.
111 * @param block the data to decrypt, encoded as returned by encrypt
112 * @param size the size of the block to decrypt
113 * @param sessionkey the key used to decrypt
114 * @param iv the initialization vector to use, use INITVALUE
116 * @param result address to store the result at
117 * @return -1 on failure, size of decrypted block on success
120 GNUNET_CRYPTO_aes_decrypt (const void *block, size_t size,
121 const struct GNUNET_CRYPTO_AesSessionKey *
123 const struct GNUNET_CRYPTO_AesInitializationVector
126 gcry_cipher_hd_t handle;
129 if (sessionkey->crc32 !=
130 htonl (GNUNET_CRYPTO_crc32_n
131 (sessionkey, GNUNET_CRYPTO_AES_KEY_LENGTH)))
137 gcry_cipher_open (&handle, GCRY_CIPHER_AES256,
138 GCRY_CIPHER_MODE_CFB, 0));
139 rc = gcry_cipher_setkey (handle, sessionkey, GNUNET_CRYPTO_AES_KEY_LENGTH);
140 GNUNET_assert ((0 == rc) || ((char) rc == GPG_ERR_WEAK_KEY));
141 rc = gcry_cipher_setiv (handle, iv,
143 GNUNET_CRYPTO_AesInitializationVector));
144 GNUNET_assert ((0 == rc) || ((char) rc == GPG_ERR_WEAK_KEY));
146 gcry_cipher_decrypt (handle, result, size, block, size));
147 gcry_cipher_close (handle);
152 * @brief Derive an IV
153 * @param iv initialization vector
154 * @param skey session key
155 * @param salt salt for the derivation
156 * @param salt_len size of the salt
157 * @param ... pairs of void * & size_t for context chunks, terminated by NULL
160 GNUNET_CRYPTO_aes_derive_iv (struct GNUNET_CRYPTO_AesInitializationVector *iv,
161 const struct GNUNET_CRYPTO_AesSessionKey *skey,
162 const void *salt, size_t salt_len, ...)
166 va_start (argp, salt_len);
167 GNUNET_CRYPTO_aes_derive_iv_v (iv, skey, salt, salt_len, argp);
172 * @brief Derive an IV
173 * @param iv initialization vector
174 * @param skey session key
175 * @param salt salt for the derivation
176 * @param salt_len size of the salt
177 * @param argp pairs of void * & size_t for context chunks, terminated by NULL
180 GNUNET_CRYPTO_aes_derive_iv_v (struct GNUNET_CRYPTO_AesInitializationVector
182 const struct GNUNET_CRYPTO_AesSessionKey *skey,
183 const void *salt, size_t salt_len,
186 GNUNET_CRYPTO_kdf_v (iv->iv, sizeof (iv->iv), salt, salt_len, skey->key,
187 sizeof (skey->key), argp);
190 /* end of crypto_aes.c */