Repository URL to install this package:
Version:
1.0.6 ▾
|
require "resty.nettle.types.aes"
local lib = require "resty.nettle.library"
local ffi = require "ffi"
local ffi_new = ffi.new
local ffi_typeof = ffi.typeof
local ffi_cdef = ffi.cdef
local ffi_copy = ffi.copy
local ffi_str = ffi.string
local ceil = math.ceil
local huge = math.huge
local type = type
local setmetatable = setmetatable
ffi_cdef[[
void nettle_aes128_set_encrypt_key(struct aes128_ctx *ctx, const uint8_t *key);
void nettle_aes128_set_decrypt_key(struct aes128_ctx *ctx, const uint8_t *key);
void nettle_aes128_invert_key(struct aes128_ctx *dst, const struct aes128_ctx *src);
void nettle_aes128_encrypt(const struct aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_aes128_decrypt(const struct aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_aes192_set_encrypt_key(struct aes192_ctx *ctx, const uint8_t *key);
void nettle_aes192_set_decrypt_key(struct aes192_ctx *ctx, const uint8_t *key);
void nettle_aes192_invert_key(struct aes192_ctx *dst, const struct aes192_ctx *src);
void nettle_aes192_encrypt(const struct aes192_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_aes192_decrypt(const struct aes192_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_aes256_set_encrypt_key(struct aes256_ctx *ctx, const uint8_t *key);
void nettle_aes256_set_decrypt_key(struct aes256_ctx *ctx, const uint8_t *key);
void nettle_aes256_invert_key(struct aes256_ctx *dst, const struct aes256_ctx *src);
void nettle_aes256_encrypt(const struct aes256_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_aes256_decrypt(const struct aes256_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_eax_aes128_set_key(struct eax_aes128_ctx *ctx, const uint8_t *key);
void nettle_eax_aes128_set_nonce(struct eax_aes128_ctx *ctx, size_t length, const uint8_t *iv);
void nettle_eax_aes128_update(struct eax_aes128_ctx *ctx, size_t length, const uint8_t *data);
void nettle_eax_aes128_encrypt(struct eax_aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_eax_aes128_decrypt(struct eax_aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_eax_aes128_digest (struct eax_aes128_ctx *ctx, size_t length, uint8_t *digest);
void nettle_gcm_aes128_set_key(struct gcm_aes128_ctx *ctx, const uint8_t *key);
void nettle_gcm_aes128_update (struct gcm_aes128_ctx *ctx, size_t length, const uint8_t *data);
void nettle_gcm_aes128_set_iv (struct gcm_aes128_ctx *ctx, size_t length, const uint8_t *iv);
void nettle_gcm_aes128_encrypt(struct gcm_aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_gcm_aes128_decrypt(struct gcm_aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_gcm_aes128_digest (struct gcm_aes128_ctx *ctx, size_t length, uint8_t *digest);
void nettle_gcm_aes192_set_key(struct gcm_aes192_ctx *ctx, const uint8_t *key);
void nettle_gcm_aes192_update (struct gcm_aes192_ctx *ctx, size_t length, const uint8_t *data);
void nettle_gcm_aes192_set_iv (struct gcm_aes192_ctx *ctx, size_t length, const uint8_t *iv);
void nettle_gcm_aes192_encrypt(struct gcm_aes192_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_gcm_aes192_decrypt(struct gcm_aes192_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_gcm_aes192_digest (struct gcm_aes192_ctx *ctx, size_t length, uint8_t *digest);
void nettle_gcm_aes256_set_key(struct gcm_aes256_ctx *ctx, const uint8_t *key);
void nettle_gcm_aes256_update (struct gcm_aes256_ctx *ctx, size_t length, const uint8_t *data);
void nettle_gcm_aes256_set_iv (struct gcm_aes256_ctx *ctx, size_t length, const uint8_t *iv);
void nettle_gcm_aes256_encrypt(struct gcm_aes256_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_gcm_aes256_decrypt(struct gcm_aes256_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_gcm_aes256_digest (struct gcm_aes256_ctx *ctx, size_t length, uint8_t *digest);
void nettle_ccm_aes128_set_key(struct ccm_aes128_ctx *ctx, const uint8_t *key);
void nettle_ccm_aes128_set_nonce(struct ccm_aes128_ctx *ctx, size_t length, const uint8_t *nonce, size_t authlen, size_t msglen, size_t taglen);
void nettle_ccm_aes128_update (struct ccm_aes128_ctx *ctx, size_t length, const uint8_t *data);
void nettle_ccm_aes128_encrypt(struct ccm_aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_ccm_aes128_decrypt(struct ccm_aes128_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_ccm_aes128_digest(struct ccm_aes128_ctx *ctx, size_t length, uint8_t *digest);
void nettle_ccm_aes192_set_key(struct ccm_aes192_ctx *ctx, const uint8_t *key);
void nettle_ccm_aes192_set_nonce(struct ccm_aes192_ctx *ctx, size_t length, const uint8_t *nonce, size_t authlen, size_t msglen, size_t taglen);
void nettle_ccm_aes192_update(struct ccm_aes192_ctx *ctx, size_t length, const uint8_t *data);
void nettle_ccm_aes192_encrypt(struct ccm_aes192_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_ccm_aes192_decrypt(struct ccm_aes192_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_ccm_aes192_digest(struct ccm_aes192_ctx *ctx, size_t length, uint8_t *digest);
void nettle_ccm_aes256_set_key(struct ccm_aes256_ctx *ctx, const uint8_t *key);
void nettle_ccm_aes256_set_nonce(struct ccm_aes256_ctx *ctx, size_t length, const uint8_t *nonce, size_t authlen, size_t msglen, size_t taglen);
void nettle_ccm_aes256_update(struct ccm_aes256_ctx *ctx, size_t length, const uint8_t *data);
void nettle_ccm_aes256_encrypt(struct ccm_aes256_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_ccm_aes256_decrypt(struct ccm_aes256_ctx *ctx, size_t length, uint8_t *dst, const uint8_t *src);
void nettle_ccm_aes256_digest(struct ccm_aes256_ctx *ctx, size_t length, uint8_t *digest);
]]
local uint8t = ffi_typeof "uint8_t[?]"
local ciphers = {
ecb = {
[128] = {
setkey = lib.nettle_aes128_set_encrypt_key,
invert = lib.nettle_aes128_invert_key,
encrypt = lib.nettle_aes128_encrypt,
decrypt = lib.nettle_aes128_decrypt,
context = ffi_typeof "NETTLE_AES128_CTX[1]"
},
[192] = {
setkey = lib.nettle_aes192_set_encrypt_key,
invert = lib.nettle_aes192_invert_key,
encrypt = lib.nettle_aes192_encrypt,
decrypt = lib.nettle_aes192_decrypt,
context = ffi_typeof "NETTLE_AES192_CTX[1]"
},
[256] = {
setkey = lib.nettle_aes256_set_encrypt_key,
invert = lib.nettle_aes256_invert_key,
encrypt = lib.nettle_aes256_encrypt,
decrypt = lib.nettle_aes256_decrypt,
context = ffi_typeof "NETTLE_AES256_CTX[1]"
}
},
cbc = {
iv_size = 16,
[128] = {
setkey = lib.nettle_aes128_set_encrypt_key,
invert = lib.nettle_aes128_invert_key,
encrypt = lib.nettle_cbc_encrypt,
decrypt = lib.nettle_cbc_decrypt,
cipher = {
encrypt = lib.nettle_aes128_encrypt,
decrypt = lib.nettle_aes128_decrypt
},
context = ffi_typeof "NETTLE_AES128_CTX[1]"
},
[192] = {
setkey = lib.nettle_aes192_set_encrypt_key,
invert = lib.nettle_aes192_invert_key,
encrypt = lib.nettle_cbc_encrypt,
decrypt = lib.nettle_cbc_decrypt,
cipher = {
encrypt = lib.nettle_aes192_encrypt,
decrypt = lib.nettle_aes192_decrypt
},
context = ffi_typeof "NETTLE_AES192_CTX[1]"
},
[256] = {
setkey = lib.nettle_aes256_set_encrypt_key,
invert = lib.nettle_aes256_invert_key,
encrypt = lib.nettle_cbc_encrypt,
decrypt = lib.nettle_cbc_decrypt,
cipher = {
encrypt = lib.nettle_aes256_encrypt,
decrypt = lib.nettle_aes256_decrypt
},
context = ffi_typeof "NETTLE_AES256_CTX[1]"
}
},
ctr = {
iv_size = 16,
[128] = {
setkey = lib.nettle_aes128_set_encrypt_key,
encrypt = lib.nettle_ctr_crypt,
decrypt = lib.nettle_ctr_crypt,
cipher = {
encrypt = lib.nettle_aes128_encrypt,
decrypt = lib.nettle_aes128_encrypt
},
context = ffi_typeof "NETTLE_AES128_CTX[1]"
},
[192] = {
setkey = lib.nettle_aes192_set_encrypt_key,
encrypt = lib.nettle_ctr_crypt,
decrypt = lib.nettle_ctr_crypt,
cipher = {
encrypt = lib.nettle_aes192_encrypt,
decrypt = lib.nettle_aes192_encrypt
},
context = ffi_typeof "NETTLE_AES192_CTX[1]"
},
[256] = {
setkey = lib.nettle_aes256_set_encrypt_key,
encrypt = lib.nettle_ctr_crypt,
decrypt = lib.nettle_ctr_crypt,
cipher = {
encrypt = lib.nettle_aes256_encrypt,
decrypt = lib.nettle_aes256_encrypt
},
context = ffi_typeof "NETTLE_AES256_CTX[1]"
}
},
eax = {
iv_size = huge,
[128] = {
setkey = lib.nettle_eax_aes128_set_key,
setiv = lib.nettle_eax_aes128_set_nonce,
update = lib.nettle_eax_aes128_update,
encrypt = lib.nettle_eax_aes128_encrypt,
decrypt = lib.nettle_eax_aes128_decrypt,
digest = lib.nettle_eax_aes128_digest,
context = ffi_typeof "NETTLE_EAX_AES128_CTX[1]"
}
},
gcm = {
iv_size = 12,
[128] = {
setkey = lib.nettle_gcm_aes128_set_key,
setiv = lib.nettle_gcm_aes128_set_iv,
update = lib.nettle_gcm_aes128_update,
encrypt = lib.nettle_gcm_aes128_encrypt,
decrypt = lib.nettle_gcm_aes128_decrypt,
digest = lib.nettle_gcm_aes128_digest,
context = ffi_typeof "NETTLE_GCM_AES128_CTX[1]"
},
[192] = {
setkey = lib.nettle_gcm_aes192_set_key,
setiv = lib.nettle_gcm_aes192_set_iv,
update = lib.nettle_gcm_aes192_update,
encrypt = lib.nettle_gcm_aes192_encrypt,
decrypt = lib.nettle_gcm_aes192_decrypt,
digest = lib.nettle_gcm_aes192_digest,
context = ffi_typeof "NETTLE_GCM_AES192_CTX[1]"
},
[256] = {
setkey = lib.nettle_gcm_aes256_set_key,
setiv = lib.nettle_gcm_aes256_set_iv,
update = lib.nettle_gcm_aes256_update,
encrypt = lib.nettle_gcm_aes256_encrypt,
decrypt = lib.nettle_gcm_aes256_decrypt,
digest = lib.nettle_gcm_aes256_digest,
context = ffi_typeof "NETTLE_GCM_AES256_CTX[1]"
}
},
ccm = {
iv_size = { 7, 14 },
[128] = {
setkey = lib.nettle_ccm_aes128_set_key,
setiv = lib.nettle_ccm_aes128_set_nonce,
update = lib.nettle_ccm_aes128_update,
encrypt = lib.nettle_ccm_aes128_encrypt,
decrypt = lib.nettle_ccm_aes128_decrypt,
digest = lib.nettle_ccm_aes128_digest,
context = ffi_typeof "NETTLE_CCM_AES128_CTX[1]"
},
[192] = {
setkey = lib.nettle_ccm_aes192_set_key,
setiv = lib.nettle_ccm_aes192_set_nonce,
update = lib.nettle_ccm_aes192_update,
encrypt = lib.nettle_ccm_aes192_encrypt,
decrypt = lib.nettle_ccm_aes192_decrypt,
digest = lib.nettle_ccm_aes192_digest,
context = ffi_typeof "NETTLE_CCM_AES192_CTX[1]"
},
[256] = {
setkey = lib.nettle_ccm_aes256_set_key,
setiv = lib.nettle_ccm_aes256_set_nonce,
update = lib.nettle_ccm_aes256_update,
encrypt = lib.nettle_ccm_aes256_encrypt,
decrypt = lib.nettle_ccm_aes256_decrypt,
digest = lib.nettle_ccm_aes256_digest,
context = ffi_typeof "NETTLE_CCM_AES256_CTX[1]"
}
}
}
local dgt = ffi_new(uint8t, 16)
local ccm = {}
ccm.__index = ccm
function ccm:encrypt(src, len)
local cipher = self.cipher
local context = self.context
local iv = self.iv
local ad = self.ad or ""
local lad = #ad
local len = len or #src
cipher.setiv(context, #iv, iv, lad, len, 16)
if ad then cipher.update(context, lad, ad) end
local dst = ffi_new(uint8t, len)
cipher.encrypt(context, len, dst, src)
cipher.digest(context, 16, dgt)
return ffi_str(dst, len), ffi_str(dgt, 16)
end
function ccm:decrypt(src, len)
local cipher = self.cipher
local context = self.context
local iv = self.iv
local ad = self.ad or ""
local lad = #ad
local len = len or #src
cipher.setiv(context, #iv, iv, lad, len, 16)
if ad then cipher.update(context, lad, ad) end
local dst = ffi_new(uint8t, len)
cipher.decrypt(context, len, dst, src)
cipher.digest(context, 16, dgt)
return ffi_str(dst, len), ffi_str(dgt, 16)
end
local aes = {}
aes.__index = aes
function aes.new(key, mode, iv, ad)
local len = #key
if len ~= 16 and len ~= 24 and len ~= 32 then
return nil, "the AES supported key sizes are 128, 192, and 256 bits"
end
mode = (mode or "ecb"):lower()
local config = ciphers[mode]
if not config then
return nil, "the AES supported modes are ECB, CBC, CTR, EAX, GCM, and CCM"
end
local bits = len * 8
local cipher = config[bits]
local context = ffi_new(cipher.context)
cipher.setkey(context, key)
local iv_size = config.iv_size
if iv_size then
iv = iv or ""
if iv_size == huge then
iv_size = #iv
else
if type(iv_size) == "table" then
if #iv < iv_size[1] or #iv > iv_size[2] then
return nil, "the AES-" .. mode:upper() .. " supported initialization vector sizes are between " .. (iv_size[1] * 8) .. " and " .. (iv_size[2] * 8) .. " bits"
end
return setmetatable({
context = context,
cipher = cipher,
iv = iv,
ad = ad
}, ccm)
else
if #iv ~= iv_size then
return nil, "the AES-" .. mode:upper() .. " supported initialization vector size is " .. (iv_size * 8) .. " bits"
end
end
end
if cipher.setiv then
cipher.setiv(context, iv_size, iv)
else
return setmetatable({
context = context,
cipher = cipher,
iv = iv }, aes)
end
end
if ad and cipher.update then
cipher.update(context, #ad, ad)
end
return setmetatable({
context = context,
cipher = cipher }, aes)
end
function aes:encrypt(src, len)
local cipher = self.cipher
local context = self.context
if cipher.invert and self.inverted then
cipher.invert(context, context)
self.inverted = nil
end
len = len or #src
if self.iv then
local dln = len
if cipher.invert then dln = ceil(dln / 16) * 16 end
local dst = ffi_new(uint8t, dln)
ffi_copy(dst, src, len)
local ivl = #self.iv
local iv = ffi_new(uint8t, ivl)
ffi_copy(iv, self.iv, ivl)
cipher.encrypt(context, cipher.cipher.encrypt, 16, iv, dln, dst, dst)
return ffi_str(dst, dln)
elseif cipher.digest then
local dst = ffi_new(uint8t, len)
cipher.encrypt(context, len, dst, src)
cipher.digest(context, 16, dgt)
return ffi_str(dst, len), ffi_str(dgt, 16)
end
local dln = ceil(len / 16) * 16
local dst = ffi_new(uint8t, dln)
ffi_copy(dst, src, len)
cipher.encrypt(context, dln, dst, dst)
return ffi_str(dst, dln)
end
function aes:decrypt(src, len)
local cipher = self.cipher
local context = self.context
if cipher.invert and not self.inverted then
cipher.invert(context, context)
self.inverted = true
end
len = len or #src
if self.iv then
local dln = cipher.invert and ceil(len / 16) * 16 or len
local dst = ffi_new(uint8t, dln)
local ivl = #self.iv
local iv = ffi_new(uint8t, ivl)
ffi_copy(iv, self.iv, ivl)
cipher.decrypt(context, cipher.cipher.decrypt, 16, iv, dln, dst, src)
return ffi_str(dst, len)
elseif cipher.digest then
local dst = ffi_new(uint8t, len)
cipher.decrypt(context, len, dst, src)
cipher.digest(context, 16, dgt)
return ffi_str(dst, len), ffi_str(dgt, 16)
end
local dln = ceil(len / 16) * 16
local dst = ffi_new(uint8t, dln)
cipher.decrypt(context, dln, dst, src)
return ffi_str(dst, len)
end
return aes