2012-05-09 20:55:07 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
#
|
|
|
|
|
# Cipher/AES.py : AES
|
|
|
|
|
#
|
|
|
|
|
# ===================================================================
|
|
|
|
|
# The contents of this file are dedicated to the public domain. To
|
|
|
|
|
# the extent that dedication to the public domain is not available,
|
|
|
|
|
# everyone is granted a worldwide, perpetual, royalty-free,
|
|
|
|
|
# non-exclusive license to exercise all rights associated with the
|
|
|
|
|
# contents of this file for any purpose whatsoever.
|
|
|
|
|
# No rights are reserved.
|
|
|
|
|
#
|
|
|
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
|
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
|
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
|
# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
|
|
|
# BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
|
|
|
# ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
|
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
|
# SOFTWARE.
|
|
|
|
|
# ===================================================================
|
2017-07-25 23:46:12 +02:00
|
|
|
"""
|
|
|
|
|
Module's constants for the modes of operation supported with AES:
|
|
|
|
|
|
|
|
|
|
:var MODE_ECB: Electronic Code Book (ECB)
|
|
|
|
|
:var MODE_CBC: Cipher-Block Chaining (CBC)
|
|
|
|
|
:var MODE_CFB: Cipher FeedBack (CFB)
|
|
|
|
|
:var MODE_OFB: Output FeedBack (OFB)
|
|
|
|
|
:var MODE_CTR: CounTer Mode (CTR)
|
|
|
|
|
:var MODE_OPENPGP: OpenPGP Mode
|
|
|
|
|
:var MODE_CCM: Counter with CBC-MAC (CCM) Mode
|
|
|
|
|
:var MODE_EAX: EAX Mode
|
|
|
|
|
:var MODE_SIV: Syntethic Initialization Vector (SIV)
|
|
|
|
|
:var MODE_GCM: Galois Counter Mode (GCM)
|
|
|
|
|
:var MODE_OCB: Offset Code Book (OCB)
|
2012-05-09 20:55:07 +02:00
|
|
|
"""
|
|
|
|
|
|
2014-12-16 07:50:48 +01:00
|
|
|
import sys
|
|
|
|
|
|
|
|
|
|
from Crypto.Cipher import _create_cipher
|
2015-01-19 14:00:35 +01:00
|
|
|
from Crypto.Util._raw_api import (load_pycryptodome_raw_lib,
|
2015-02-10 22:29:40 +01:00
|
|
|
VoidPointer, SmartPointer,
|
2018-03-06 13:48:00 +01:00
|
|
|
c_size_t, c_uint8_ptr)
|
2015-01-19 14:00:35 +01:00
|
|
|
|
2015-01-23 15:24:21 +00:00
|
|
|
|
2015-02-02 21:40:34 +01:00
|
|
|
_raw_cpuid_lib = load_pycryptodome_raw_lib("Crypto.Util._cpuid",
|
2015-03-09 21:43:24 +01:00
|
|
|
"int have_aes_ni(void);")
|
2015-01-23 15:24:21 +00:00
|
|
|
|
2015-12-23 23:19:37 +01:00
|
|
|
_cproto = """
|
2015-01-19 14:00:35 +01:00
|
|
|
int AES_start_operation(const uint8_t key[],
|
|
|
|
|
size_t key_len,
|
|
|
|
|
void **pResult);
|
|
|
|
|
int AES_encrypt(const void *state,
|
|
|
|
|
const uint8_t *in,
|
|
|
|
|
uint8_t *out,
|
|
|
|
|
size_t data_len);
|
|
|
|
|
int AES_decrypt(const void *state,
|
|
|
|
|
const uint8_t *in,
|
|
|
|
|
uint8_t *out,
|
|
|
|
|
size_t data_len);
|
|
|
|
|
int AES_stop_operation(void *state);
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_raw_aes_lib = load_pycryptodome_raw_lib("Crypto.Cipher._raw_aes",
|
2015-12-23 23:19:37 +01:00
|
|
|
_cproto)
|
2014-12-16 07:50:48 +01:00
|
|
|
|
|
|
|
|
_raw_aesni_lib = None
|
2013-02-04 14:44:29 +01:00
|
|
|
try:
|
2015-01-23 15:24:21 +00:00
|
|
|
if _raw_cpuid_lib.have_aes_ni() == 1:
|
2015-01-19 14:00:35 +01:00
|
|
|
_raw_aesni_lib = load_pycryptodome_raw_lib("Crypto.Cipher._raw_aesni",
|
2015-12-23 23:19:37 +01:00
|
|
|
_cproto.replace("AES",
|
2015-03-09 21:43:24 +01:00
|
|
|
"AESNI"))
|
2014-12-16 07:50:48 +01:00
|
|
|
except OSError:
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def _create_base_cipher(dict_parameters):
|
2015-03-09 21:43:24 +01:00
|
|
|
"""This method instantiates and returns a handle to a low-level
|
|
|
|
|
base cipher. It will absorb named parameters in the process."""
|
2014-12-16 07:50:48 +01:00
|
|
|
|
|
|
|
|
use_aesni = dict_parameters.pop("use_aesni", True)
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
key = dict_parameters.pop("key")
|
|
|
|
|
except KeyError:
|
|
|
|
|
raise TypeError("Missing 'key' parameter")
|
|
|
|
|
|
|
|
|
|
if len(key) not in key_size:
|
|
|
|
|
raise ValueError("Incorrect AES key length (%d bytes)" % len(key))
|
|
|
|
|
|
|
|
|
|
if use_aesni and _raw_aesni_lib:
|
|
|
|
|
start_operation = _raw_aesni_lib.AESNI_start_operation
|
|
|
|
|
stop_operation = _raw_aesni_lib.AESNI_stop_operation
|
2013-02-04 14:44:29 +01:00
|
|
|
else:
|
2014-12-16 07:50:48 +01:00
|
|
|
start_operation = _raw_aes_lib.AES_start_operation
|
|
|
|
|
stop_operation = _raw_aes_lib.AES_stop_operation
|
|
|
|
|
|
2015-01-19 14:00:35 +01:00
|
|
|
cipher = VoidPointer()
|
2018-03-06 13:48:00 +01:00
|
|
|
result = start_operation(c_uint8_ptr(key),
|
2015-02-10 16:45:25 +01:00
|
|
|
c_size_t(len(key)),
|
2015-01-19 14:00:35 +01:00
|
|
|
cipher.address_of())
|
2014-12-16 07:50:48 +01:00
|
|
|
if result:
|
|
|
|
|
raise ValueError("Error %X while instantiating the AES cipher"
|
|
|
|
|
% result)
|
2015-01-19 14:00:35 +01:00
|
|
|
return SmartPointer(cipher.get(), stop_operation)
|
2012-05-09 20:55:07 +02:00
|
|
|
|
|
|
|
|
|
2014-06-07 18:42:52 +02:00
|
|
|
def new(key, mode, *args, **kwargs):
|
2017-07-25 23:46:12 +02:00
|
|
|
"""Create a new AES cipher.
|
2012-05-09 20:55:07 +02:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
:param key:
|
2012-05-09 20:55:07 +02:00
|
|
|
The secret key to use in the symmetric cipher.
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
It must be 16, 24 or 32 bytes long (respectively for *AES-128*,
|
|
|
|
|
*AES-192* or *AES-256*).
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
For ``MODE_SIV`` only, it doubles to 32, 48, or 64 bytes.
|
|
|
|
|
:type key: byte string
|
2013-01-23 22:37:53 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
:param mode:
|
|
|
|
|
The chaining mode to use for encryption or decryption.
|
|
|
|
|
If in doubt, use ``MODE_EAX``.
|
|
|
|
|
:type mode: One of the supported ``MODE_*`` constants
|
2013-01-23 22:37:53 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
:Keyword Arguments:
|
2018-04-03 21:33:15 +02:00
|
|
|
* *iv* (``bytes``, ``bytearray``, ``memoryview``) --
|
2017-07-25 23:46:12 +02:00
|
|
|
(Only applicable for ``MODE_CBC``, ``MODE_CFB``, ``MODE_OFB``,
|
|
|
|
|
and ``MODE_OPENPGP`` modes).
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
The initialization vector to use for encryption or decryption.
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
For ``MODE_CBC``, ``MODE_CFB``, and ``MODE_OFB`` it must be 16 bytes long.
|
2013-01-23 22:37:53 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
For ``MODE_OPENPGP`` mode only,
|
|
|
|
|
it must be 16 bytes long for encryption
|
|
|
|
|
and 18 bytes for decryption (in the latter case, it is
|
|
|
|
|
actually the *encrypted* IV which was prefixed to the ciphertext).
|
2013-01-23 22:37:53 +01:00
|
|
|
|
2017-07-31 23:56:54 +02:00
|
|
|
If not provided, a random byte string is generated (you must then
|
2017-07-25 23:46:12 +02:00
|
|
|
read its value with the :attr:`iv` attribute).
|
2013-05-20 12:43:44 +02:00
|
|
|
|
2018-04-03 21:33:15 +02:00
|
|
|
* *nonce* (``bytes``, ``bytearray``, ``memoryview``) --
|
2017-07-25 23:46:12 +02:00
|
|
|
(Only applicable for ``MODE_CCM``, ``MODE_EAX``, ``MODE_GCM``,
|
|
|
|
|
``MODE_SIV``, ``MODE_OCB``, and ``MODE_CTR``).
|
2015-05-25 16:16:59 -04:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
A value that must never be reused for any other encryption done
|
|
|
|
|
with this key.
|
2015-12-20 21:27:21 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
For ``MODE_EAX``, ``MODE_GCM`` and ``MODE_SIV`` there are no
|
|
|
|
|
restrictions on its length (recommended: **16** bytes).
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
For ``MODE_CCM``, its length must be in the range **[7..13]**.
|
|
|
|
|
Bear in mind that with CCM there is a trade-off between nonce
|
|
|
|
|
length and maximum message size. Recommendation: **11** bytes.
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
For ``MODE_OCB``, its length must be in the range **[1..15]**
|
|
|
|
|
(recommended: **15**).
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
For ``MODE_CTR``, its length must be in the range **[0..15]**
|
|
|
|
|
(recommended: **8**).
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
In not provided, a random byte string of the recommended
|
|
|
|
|
length is used (you must then read its value with the :attr:`nonce`
|
|
|
|
|
attribute).
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
* *segment_size* (``integer``) --
|
|
|
|
|
(Only ``MODE_CFB``).The number of **bits** the plaintext and ciphertext
|
|
|
|
|
are segmented in. It must be a multiple of 8.
|
|
|
|
|
If not specified, it will be assumed to be 8.
|
2013-05-20 12:43:44 +02:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
* *mac_len* : (``integer``) --
|
|
|
|
|
(Only ``MODE_EAX``, ``MODE_GCM``, ``MODE_OCB``, ``MODE_CCM``)
|
|
|
|
|
Length of the authentication tag, in bytes.
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
It must be even and in the range **[4..16]**.
|
|
|
|
|
The recommended value (and the default, if not specified) is **16**.
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
* *msg_len* : (``integer``) --
|
|
|
|
|
(Only ``MODE_CCM``). Length of the message to (de)cipher.
|
|
|
|
|
If not specified, ``encrypt`` must be called with the entire message.
|
|
|
|
|
Similarly, ``decrypt`` can only be called once.
|
2015-12-23 23:19:37 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
* *assoc_len* : (``integer``) --
|
|
|
|
|
(Only ``MODE_CCM``). Length of the associated data.
|
|
|
|
|
If not specified, all associated data is buffered internally,
|
|
|
|
|
which may represent a problem for very large messages.
|
2012-05-09 20:55:07 +02:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
* *initial_value* : (``integer``) --
|
|
|
|
|
(Only ``MODE_CTR``). The initial value for the counter within
|
|
|
|
|
the counter block. By default it is **0**.
|
2016-02-01 22:18:47 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
* *use_aesni* : (``boolean``) --
|
|
|
|
|
Use Intel AES-NI hardware extensions (default: use if available).
|
2016-02-01 22:18:47 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
:Return: an AES object, of the applicable mode.
|
2012-05-09 20:55:07 +02:00
|
|
|
"""
|
2014-12-07 19:55:06 +01:00
|
|
|
|
2014-12-10 21:40:49 +01:00
|
|
|
kwargs["add_aes_modes"] = True
|
2014-12-16 07:50:48 +01:00
|
|
|
return _create_cipher(sys.modules[__name__], key, mode, *args, **kwargs)
|
|
|
|
|
|
2012-05-09 20:55:07 +02:00
|
|
|
MODE_ECB = 1
|
|
|
|
|
MODE_CBC = 2
|
|
|
|
|
MODE_CFB = 3
|
|
|
|
|
MODE_OFB = 5
|
|
|
|
|
MODE_CTR = 6
|
2012-05-17 13:28:24 +02:00
|
|
|
MODE_OPENPGP = 7
|
2013-01-23 22:37:53 +01:00
|
|
|
MODE_CCM = 8
|
2013-05-20 12:43:44 +02:00
|
|
|
MODE_EAX = 9
|
2013-05-22 22:18:35 +02:00
|
|
|
MODE_SIV = 10
|
2013-05-28 23:57:56 +02:00
|
|
|
MODE_GCM = 11
|
2015-05-03 15:06:42 -04:00
|
|
|
MODE_OCB = 12
|
2015-03-09 21:43:24 +01:00
|
|
|
|
2017-07-25 23:46:12 +02:00
|
|
|
# Size of a data block (in bytes)
|
2012-05-09 20:55:07 +02:00
|
|
|
block_size = 16
|
2017-07-25 23:46:12 +02:00
|
|
|
# Size of a key (in bytes)
|
2014-12-16 07:50:48 +01:00
|
|
|
key_size = (16, 24, 32)
|