/* * Copyright (c) 2020, Ali Mohammad Pur * * SPDX-License-Identifier: BSD-2-Clause */ #pragma once #include #include #include #include #include #include namespace Crypto { namespace Cipher { struct AESCipherBlock : public CipherBlock { public: static constexpr size_t BlockSizeInBits = 128; explicit AESCipherBlock(PaddingMode mode = PaddingMode::CMS) : CipherBlock(mode) { } AESCipherBlock(const u8* data, size_t length, PaddingMode mode = PaddingMode::CMS) : AESCipherBlock(mode) { CipherBlock::overwrite(data, length); } constexpr static size_t block_size() { return BlockSizeInBits / 8; }; virtual ReadonlyBytes bytes() const override { return ReadonlyBytes { m_data, sizeof(m_data) }; } virtual Bytes bytes() override { return Bytes { m_data, sizeof(m_data) }; } virtual void overwrite(ReadonlyBytes) override; virtual void overwrite(const u8* data, size_t size) override { overwrite({ data, size }); } virtual void apply_initialization_vector(ReadonlyBytes ivec) override { for (size_t i = 0; i < min(block_size(), ivec.size()); ++i) m_data[i] ^= ivec[i]; } String to_string() const; private: constexpr static size_t data_size() { return sizeof(m_data); } u8 m_data[BlockSizeInBits / 8] {}; }; struct AESCipherKey : public CipherKey { virtual ReadonlyBytes bytes() const override { return ReadonlyBytes { m_rd_keys, sizeof(m_rd_keys) }; }; virtual void expand_encrypt_key(ReadonlyBytes user_key, size_t bits) override; virtual void expand_decrypt_key(ReadonlyBytes user_key, size_t bits) override; static bool is_valid_key_size(size_t bits) { return bits == 128 || bits == 192 || bits == 256; }; String to_string() const; const u32* round_keys() const { return (const u32*)m_rd_keys; } AESCipherKey(ReadonlyBytes user_key, size_t key_bits, Intent intent) : m_bits(key_bits) { if (intent == Intent::Encryption) expand_encrypt_key(user_key, key_bits); else expand_decrypt_key(user_key, key_bits); } virtual ~AESCipherKey() override { } size_t rounds() const { return m_rounds; } size_t length() const { return m_bits / 8; } protected: u32* round_keys() { return (u32*)m_rd_keys; } private: static constexpr size_t MAX_ROUND_COUNT = 14; u32 m_rd_keys[(MAX_ROUND_COUNT + 1) * 4] { 0 }; size_t m_rounds; size_t m_bits; }; class AESCipher final : public Cipher { public: using CBCMode = CBC; using CTRMode = CTR; using GCMMode = GCM; constexpr static size_t BlockSizeInBits = BlockType::BlockSizeInBits; AESCipher(ReadonlyBytes user_key, size_t key_bits, Intent intent = Intent::Encryption, PaddingMode mode = PaddingMode::CMS) : Cipher(mode) , m_key(user_key, key_bits, intent) { } virtual const AESCipherKey& key() const override { return m_key; }; virtual AESCipherKey& key() override { return m_key; }; virtual void encrypt_block(const BlockType& in, BlockType& out) override; virtual void decrypt_block(const BlockType& in, BlockType& out) override; virtual String class_name() const override { return "AES"; } protected: AESCipherKey m_key; }; } }