/* * SRT - Secure, Reliable, Transport * Copyright (c) 2019 Haivision Systems Inc. * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * */ /***************************************************************************** written by Haivision Systems Inc. 2019-06-26 (jdube) OpenSSL CRYSPR/4SRT (CRYypto Service PRovider for SRT). *****************************************************************************/ #include "hcrypt.h" #include typedef struct tag_crysprOpenSSL_AES_cb { CRYSPR_cb ccb; /* Add cryptolib specific data here */ } crysprOpenSSL_cb; int crysprOpenSSL_Prng(unsigned char *rn, int len) { return(RAND_bytes(rn, len) <= 0 ? -1 : 0); } int crysprOpenSSL_AES_SetKey( bool bEncrypt, /* true Enxcrypt key, false: decrypt */ const unsigned char *kstr, /* key sttring*/ size_t kstr_len, /* kstr len in bytes (16, 24, or 32 bytes (for AES128,AES192, or AES256) */ CRYSPR_AESCTX *aes_key) /* CRYpto Service PRovider AES Key context */ { if (bEncrypt) { /* Encrypt key */ if (AES_set_encrypt_key(kstr, kstr_len * 8, aes_key)) { HCRYPT_LOG(LOG_ERR, "%s", "AES_set_encrypt_key(kek) failed\n"); return(-1); } } else { /* Decrypt key */ if (AES_set_decrypt_key(kstr, kstr_len * 8, aes_key)) { HCRYPT_LOG(LOG_ERR, "%s", "AES_set_decrypt_key(kek) failed\n"); return(-1); } } return(0); } #if !(CRYSPR_HAS_AESCTR && CRYSPR_HAS_AESKWRAP) int crysprOpenSSL_AES_EcbCipher( bool bEncrypt, /* true:encrypt, false:decrypt */ CRYSPR_AESCTX *aes_key, /* CRYpto Service PRovider AES Key context */ const unsigned char *indata,/* src (clear text if encrypt, cipher text otherwise)*/ size_t inlen, /* indata length */ unsigned char *out_txt, /* dst (cipher text if encrypt, clear text otherwise) */ size_t *outlen) /* in/out dst len */ { int nblk = inlen/CRYSPR_AESBLKSZ; int nmore = inlen%CRYSPR_AESBLKSZ; size_t outsiz = (outlen ? *outlen : 0); int i; if (outsiz % CRYSPR_AESBLKSZ) return(-1); /* output buf size must be a multiple of AES block size (16) */ if (bEncrypt) { if (outsiz > 16 && outsiz < (nblk+nmore)*CRYSPR_AESBLKSZ) return(-1); /* output buf size must have room for PKCS7 padding */ /* Encrypt packet payload, block by block, in output buffer */ for (i=0; i= 0x10100000L && !defined(OPENSSL_IS_BORINGSSL)) CRYPTO_ctr128_encrypt(indata, out_txt, inlen, aes_key, iv, ctr, &blk_ofs, (block128_f) AES_encrypt); #else AES_ctr128_encrypt(indata, out_txt, inlen, aes_key, iv, ctr, &blk_ofs); #endif return 0; } /* * Password-based Key Derivation Function */ int crysprOpenSSL_KmPbkdf2( CRYSPR_cb *cryspr_cb, char *passwd, /* passphrase */ size_t passwd_len, /* passphrase len */ unsigned char *salt, /* salt */ size_t salt_len, /* salt_len */ int itr, /* iterations */ size_t key_len, /* key_len */ unsigned char *out) /* derived key */ { (void)cryspr_cb; int rc = PKCS5_PBKDF2_HMAC_SHA1(passwd,passwd_len,salt,salt_len,itr,key_len,out); return(rc == 1? 0 : -1); } #if CRYSPR_HAS_AESKWRAP int crysprOpenSSL_KmWrap(CRYSPR_cb *cryspr_cb, unsigned char *wrap, const unsigned char *sek, unsigned int seklen) { crysprOpenSSL_cb *aes_data = (crysprOpenSSL_cb *)cryspr_cb; AES_KEY *kek = &aes_data->ccb.aes_kek; //key encrypting key return(((seklen + HAICRYPT_WRAPKEY_SIGN_SZ) == (unsigned int)AES_wrap_key(kek, NULL, wrap, sek, seklen)) ? 0 : -1); } int crysprOpenSSL_KmUnwrap( CRYSPR_cb *cryspr_cb, unsigned char *sek, //Stream encrypting key const unsigned char *wrap, unsigned int wraplen) { crysprOpenSSL_cb *aes_data = (crysprOpenSSL_cb *)cryspr_cb; AES_KEY *kek = &aes_data->ccb.aes_kek; //key encrypting key return(((wraplen - HAICRYPT_WRAPKEY_SIGN_SZ) == (unsigned int)AES_unwrap_key(kek, NULL, sek, wrap, wraplen)) ? 0 : -1); } #endif /*CRYSPR_HAS_AESKWRAP*/ static CRYSPR_methods crysprOpenSSL_methods; CRYSPR_methods *crysprOpenSSL(void) { if(NULL == crysprOpenSSL_methods.open) { crysprInit(&crysprOpenSSL_methods); //Default/fallback methods crysprOpenSSL_methods.prng = crysprOpenSSL_Prng; //--CryptoLib Primitive API----------------------------------------------- crysprOpenSSL_methods.aes_set_key = crysprOpenSSL_AES_SetKey; #if CRYSPR_HAS_AESCTR crysprOpenSSL_methods.aes_ctr_cipher = crysprOpenSSL_AES_CtrCipher; #endif #if !(CRYSPR_HAS_AESCTR && CRYSPR_HAS_AESKWRAP) /* AES-ECB only required if cryspr has no AES-CTR and no AES KeyWrap */ /* OpenSSL has both AESCTR and AESKWRP and the AESECB wrapper is only used to test the falback methods */ crysprOpenSSL_methods.aes_ecb_cipher = crysprOpenSSL_AES_EcbCipher; #endif #if !CRYSPR_HAS_PBKDF2 crysprOpenSSL_methods.sha1_msg_digest= NULL; //Required to use eventual default/fallback KmPbkdf2 #endif //--Crypto Session API----------------------------------------- // crysprOpenSSL_methods.open = // crysprOpenSSL_methods.close = //--Keying material (km) encryption #if CRYSPR_HAS_PBKDF2 crysprOpenSSL_methods.km_pbkdf2 = crysprOpenSSL_KmPbkdf2; #else #error There is no default/fallback method for PBKDF2 #endif // crysprOpenSSL_methods.km_setkey = #if CRYSPR_HAS_AESKWRAP crysprOpenSSL_methods.km_wrap = crysprOpenSSL_KmWrap; crysprOpenSSL_methods.km_unwrap = crysprOpenSSL_KmUnwrap; #endif //--Media stream (ms) encryption // crysprOpenSSL_methods.ms_setkey = // crysprOpenSSL_methods.ms_encrypt = // crysprOpenSSL_methods.ms_decrypt = } return(&crysprOpenSSL_methods); }