|
@@ -8,7 +8,7 @@ from libc.stdlib cimport malloc, free
|
|
|
API_VERSION = 2
|
|
|
|
|
|
cdef extern from "openssl/rand.h":
|
|
|
- int RAND_bytes(unsigned char *buf,int num)
|
|
|
+ int RAND_bytes(unsigned char *buf, int num)
|
|
|
|
|
|
|
|
|
cdef extern from "openssl/evp.h":
|
|
@@ -26,10 +26,16 @@ cdef extern from "openssl/evp.h":
|
|
|
void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a)
|
|
|
void EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a)
|
|
|
|
|
|
- int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl,
|
|
|
+ int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
|
|
|
const unsigned char *key, const unsigned char *iv)
|
|
|
- int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
|
|
- int *outl, const unsigned char *in_, int inl)
|
|
|
+ int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
|
|
|
+ const unsigned char *key, const unsigned char *iv)
|
|
|
+ int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
|
|
|
+ const unsigned char *in_, int inl)
|
|
|
+ int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
|
|
|
+ const unsigned char *in_, int inl)
|
|
|
+ int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
|
|
|
+ int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
|
|
|
|
|
|
int PKCS5_PBKDF2_HMAC(const char *password, int passwordlen,
|
|
|
const unsigned char *salt, int saltlen, int iter,
|
|
@@ -47,7 +53,8 @@ long_to_bytes = lambda x: _long.pack(x)
|
|
|
|
|
|
|
|
|
def num_aes_blocks(length):
|
|
|
- """Return the number of AES blocks required to encrypt/decrypt *length* bytes of data
|
|
|
+ """Return the number of AES blocks required to encrypt/decrypt *length* bytes of data.
|
|
|
+ Note: this is only correct for modes without padding, like AES-CTR.
|
|
|
"""
|
|
|
return (length + 15) // 16
|
|
|
|
|
@@ -85,11 +92,19 @@ cdef class AES:
|
|
|
"""A thin wrapper around the OpenSSL EVP cipher API
|
|
|
"""
|
|
|
cdef EVP_CIPHER_CTX ctx
|
|
|
+ cdef int is_encrypt
|
|
|
|
|
|
- def __cinit__(self, key, iv=None):
|
|
|
+ def __cinit__(self, is_encrypt, key, iv=None):
|
|
|
EVP_CIPHER_CTX_init(&self.ctx)
|
|
|
- if not EVP_EncryptInit_ex(&self.ctx, EVP_aes_256_ctr(), NULL, NULL, NULL):
|
|
|
- raise Exception('EVP_EncryptInit_ex failed')
|
|
|
+ self.is_encrypt = is_encrypt
|
|
|
+ # Set cipher type and mode
|
|
|
+ cipher_mode = EVP_aes_256_ctr()
|
|
|
+ if self.is_encrypt:
|
|
|
+ if not EVP_EncryptInit_ex(&self.ctx, cipher_mode, NULL, NULL, NULL):
|
|
|
+ raise Exception('EVP_EncryptInit_ex failed')
|
|
|
+ else: # decrypt
|
|
|
+ if not EVP_DecryptInit_ex(&self.ctx, cipher_mode, NULL, NULL, NULL):
|
|
|
+ raise Exception('EVP_DecryptInit_ex failed')
|
|
|
self.reset(key, iv)
|
|
|
|
|
|
def __dealloc__(self):
|
|
@@ -102,8 +117,13 @@ cdef class AES:
|
|
|
key2 = key
|
|
|
if iv:
|
|
|
iv2 = iv
|
|
|
- if not EVP_EncryptInit_ex(&self.ctx, NULL, NULL, key2, iv2):
|
|
|
- raise Exception('EVP_EncryptInit_ex failed')
|
|
|
+ # Initialise key and IV
|
|
|
+ if self.is_encrypt:
|
|
|
+ if not EVP_EncryptInit_ex(&self.ctx, NULL, NULL, key2, iv2):
|
|
|
+ raise Exception('EVP_EncryptInit_ex failed')
|
|
|
+ else: # decrypt
|
|
|
+ if not EVP_DecryptInit_ex(&self.ctx, NULL, NULL, key2, iv2):
|
|
|
+ raise Exception('EVP_DecryptInit_ex failed')
|
|
|
|
|
|
@property
|
|
|
def iv(self):
|
|
@@ -111,15 +131,43 @@ cdef class AES:
|
|
|
|
|
|
def encrypt(self, data):
|
|
|
cdef int inl = len(data)
|
|
|
- cdef int outl
|
|
|
- cdef unsigned char *out = <unsigned char *>malloc(inl)
|
|
|
+ cdef int ctl = 0
|
|
|
+ cdef int outl = 0
|
|
|
+ # note: modes that use padding, need up to one extra AES block (16b)
|
|
|
+ cdef unsigned char *out = <unsigned char *>malloc(inl+16)
|
|
|
if not out:
|
|
|
raise MemoryError
|
|
|
try:
|
|
|
if not EVP_EncryptUpdate(&self.ctx, out, &outl, data, inl):
|
|
|
raise Exception('EVP_EncryptUpdate failed')
|
|
|
- return out[:inl]
|
|
|
+ ctl = outl
|
|
|
+ if not EVP_EncryptFinal_ex(&self.ctx, out+ctl, &outl):
|
|
|
+ raise Exception('EVP_EncryptFinal failed')
|
|
|
+ ctl += outl
|
|
|
+ return out[:ctl]
|
|
|
finally:
|
|
|
free(out)
|
|
|
- decrypt = encrypt
|
|
|
|
|
|
+ def decrypt(self, data):
|
|
|
+ cdef int inl = len(data)
|
|
|
+ cdef int ptl = 0
|
|
|
+ cdef int outl = 0
|
|
|
+ # note: modes that use padding, need up to one extra AES block (16b).
|
|
|
+ # This is what the openssl docs say. I am not sure this is correct,
|
|
|
+ # but OTOH it will not cause any harm if our buffer is a little bigger.
|
|
|
+ cdef unsigned char *out = <unsigned char *>malloc(inl+16)
|
|
|
+ if not out:
|
|
|
+ raise MemoryError
|
|
|
+ try:
|
|
|
+ if not EVP_DecryptUpdate(&self.ctx, out, &outl, data, inl):
|
|
|
+ raise Exception('EVP_DecryptUpdate failed')
|
|
|
+ ptl = outl
|
|
|
+ if EVP_DecryptFinal_ex(&self.ctx, out+ptl, &outl) <= 0:
|
|
|
+ # this error check is very important for modes with padding or
|
|
|
+ # authentication. for them, a failure here means corrupted data.
|
|
|
+ # CTR mode does not use padding nor authentication.
|
|
|
+ raise Exception('EVP_DecryptFinal failed')
|
|
|
+ ptl += outl
|
|
|
+ return out[:ptl]
|
|
|
+ finally:
|
|
|
+ free(out)
|