AESCrypt.cpp 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273
  1. /*
  2. * Tencent is pleased to support the open source community by making
  3. * MMKV available.
  4. *
  5. * Copyright (C) 2018 THL A29 Limited, a Tencent company.
  6. * All rights reserved.
  7. *
  8. * Licensed under the BSD 3-Clause License (the "License"); you may not use
  9. * this file except in compliance with the License. You may obtain a copy of
  10. * the License at
  11. *
  12. * https://opensource.org/licenses/BSD-3-Clause
  13. *
  14. * Unless required by applicable law or agreed to in writing, software
  15. * distributed under the License is distributed on an "AS IS" BASIS,
  16. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  17. * See the License for the specific language governing permissions and
  18. * limitations under the License.
  19. */
  20. #include "AESCrypt.h"
  21. #include "openssl/openssl_aes.h"
  22. #include <cstdint>
  23. #include <cstdlib>
  24. #include <cstring>
  25. #include <ctime>
  26. #include "../MMKVLog.h"
  27. #include "../MemoryFile.h"
  28. namespace mmkv {
  29. // assuming size in [1, 5]
  30. uint32_t AESCrypt::randomItemSizeHolder(uint32_t size) {
  31. constexpr uint32_t ItemSizeHolders[] = {0, 0x80, 0x4000, 0x200000, 0x10000000, 0};
  32. auto ItemSizeHolderMin = ItemSizeHolders[size - 1];
  33. auto ItemSizeHolderMax = ItemSizeHolders[size] - 1;
  34. srand((unsigned) time(nullptr));
  35. auto result = static_cast<uint32_t>(rand());
  36. result = result % (ItemSizeHolderMax - ItemSizeHolderMin + 1);
  37. result += ItemSizeHolderMin;
  38. return result;
  39. }
  40. #ifndef MMKV_DISABLE_CRYPT
  41. using namespace openssl;
  42. AESCrypt::AESCrypt(const void *key, size_t keyLength, const void *iv, size_t ivLength) {
  43. if (key && keyLength > 0) {
  44. memcpy(m_key, key, (keyLength > AES_KEY_LEN) ? AES_KEY_LEN : keyLength);
  45. resetIV(iv, ivLength);
  46. m_aesKey = new AES_KEY;
  47. memset(m_aesKey, 0, sizeof(AES_KEY));
  48. int ret = AES_set_encrypt_key(m_key, AES_KEY_BITSET_LEN, m_aesKey);
  49. MMKV_ASSERT(ret == 0);
  50. }
  51. }
  52. AESCrypt::AESCrypt(const AESCrypt &other, const AESCryptStatus &status) : m_isClone(true), m_number(status.m_number) {
  53. //memcpy(m_key, other.m_key, sizeof(m_key));
  54. memcpy(m_vector, status.m_vector, sizeof(m_vector));
  55. m_aesKey = other.m_aesKey;
  56. }
  57. AESCrypt::~AESCrypt() {
  58. if (!m_isClone) {
  59. delete m_aesKey;
  60. delete m_aesRollbackKey;
  61. }
  62. }
  63. void AESCrypt::resetIV(const void *iv, size_t ivLength) {
  64. m_number = 0;
  65. if (iv && ivLength > 0) {
  66. memcpy(m_vector, iv, (ivLength > AES_KEY_LEN) ? AES_KEY_LEN : ivLength);
  67. } else {
  68. memcpy(m_vector, m_key, AES_KEY_LEN);
  69. }
  70. }
  71. void AESCrypt::resetStatus(const AESCryptStatus &status) {
  72. m_number = status.m_number;
  73. memcpy(m_vector, status.m_vector, AES_KEY_LEN);
  74. }
  75. void AESCrypt::getKey(void *output) const {
  76. if (output) {
  77. memcpy(output, m_key, AES_KEY_LEN);
  78. }
  79. }
  80. void AESCrypt::encrypt(const void *input, void *output, size_t length) {
  81. if (!input || !output || length == 0) {
  82. return;
  83. }
  84. AES_cfb128_encrypt((const uint8_t *) input, (uint8_t *) output, length, m_aesKey, m_vector, &m_number);
  85. }
  86. void AESCrypt::decrypt(const void *input, void *output, size_t length) {
  87. if (!input || !output || length == 0) {
  88. return;
  89. }
  90. AES_cfb128_decrypt((const uint8_t *) input, (uint8_t *) output, length, m_aesKey, m_vector, &m_number);
  91. }
  92. void AESCrypt::fillRandomIV(void *vector) {
  93. if (!vector) {
  94. return;
  95. }
  96. srand((unsigned) time(nullptr));
  97. int *ptr = (int *) vector;
  98. for (uint32_t i = 0; i < AES_KEY_LEN / sizeof(int); i++) {
  99. ptr[i] = rand();
  100. }
  101. }
  102. static inline void
  103. Rollback_cfb_decrypt(const uint8_t *input, const uint8_t *output, size_t len, AES_KEY *key, AESCryptStatus &status) {
  104. auto ivec = status.m_vector;
  105. auto n = status.m_number;
  106. while (n && len) {
  107. auto c = *(--output);
  108. ivec[--n] = *(--input) ^ c;
  109. len--;
  110. }
  111. if (n == 0 && (status.m_number != 0)) {
  112. AES_decrypt(ivec, ivec, key);
  113. }
  114. while (len >= 16) {
  115. len -= 16;
  116. output -= 16;
  117. input -= 16;
  118. for (; n < 16; n += sizeof(size_t)) {
  119. size_t t = *(size_t *) (output + n);
  120. *(size_t *) (ivec + n) = *(size_t *) (input + n) ^ t;
  121. }
  122. n = 0;
  123. AES_decrypt(ivec, ivec, key);
  124. }
  125. if (len) {
  126. n = 16;
  127. do {
  128. auto c = *(--output);
  129. ivec[--n] = *(--input) ^ c;
  130. len--;
  131. } while (len);
  132. }
  133. status.m_number = n;
  134. }
  135. void AESCrypt::statusBeforeDecrypt(const void *input, const void *output, size_t length, AESCryptStatus &status) {
  136. if (length == 0) {
  137. return;
  138. }
  139. if (!m_aesRollbackKey) {
  140. m_aesRollbackKey = new AES_KEY;
  141. memset(m_aesRollbackKey, 0, sizeof(AES_KEY));
  142. int ret = AES_set_decrypt_key(m_key, AES_KEY_BITSET_LEN, m_aesRollbackKey);
  143. MMKV_ASSERT(ret == 0);
  144. }
  145. getCurStatus(status);
  146. Rollback_cfb_decrypt((const uint8_t *) input, (const uint8_t *) output, length, m_aesRollbackKey, status);
  147. }
  148. void AESCrypt::getCurStatus(AESCryptStatus &status) {
  149. status.m_number = static_cast<uint8_t>(m_number);
  150. memcpy(status.m_vector, m_vector, sizeof(m_vector));
  151. }
  152. AESCrypt AESCrypt::cloneWithStatus(const AESCryptStatus &status) const {
  153. return AESCrypt(*this, status);
  154. }
  155. # ifdef MMKV_DEBUG
  156. void testRandomPlaceHolder() {
  157. for (uint32_t size = 1; size < 6; size++) {
  158. auto holder = AESCrypt::randomItemSizeHolder(size);
  159. MMKVInfo("holder 0x%x for size %u", holder, size);
  160. }
  161. }
  162. // check if AESCrypt is encrypt-decrypt full-duplex
  163. void AESCrypt::testAESCrypt() {
  164. testRandomPlaceHolder();
  165. const uint8_t plainText[] = "Hello, OpenSSL-mmkv::AESCrypt::testAESCrypt() with AES CFB 128.";
  166. constexpr size_t textLength = sizeof(plainText) - 1;
  167. const uint8_t key[] = "TheAESKey";
  168. constexpr size_t keyLength = sizeof(key) - 1;
  169. uint8_t iv[AES_KEY_LEN];
  170. srand((unsigned) time(nullptr));
  171. for (uint32_t i = 0; i < AES_KEY_LEN; i++) {
  172. iv[i] = (uint8_t) rand();
  173. }
  174. AESCrypt crypt1(key, keyLength, iv, sizeof(iv));
  175. AESCrypt crypt2(key, keyLength, iv, sizeof(iv));
  176. auto encryptText = new uint8_t[DEFAULT_MMAP_SIZE];
  177. auto decryptText = new uint8_t[DEFAULT_MMAP_SIZE];
  178. memset(encryptText, 0, DEFAULT_MMAP_SIZE);
  179. memset(decryptText, 0, DEFAULT_MMAP_SIZE);
  180. /* in-place encryption & decryption
  181. memcpy(encryptText, plainText, textLength);
  182. crypt1.encrypt(encryptText, encryptText, textLength);
  183. crypt2.decrypt(encryptText, encryptText, textLength);
  184. return;
  185. */
  186. AES_KEY decryptKey;
  187. AES_set_decrypt_key(crypt1.m_key, AES_KEY_BITSET_LEN, &decryptKey);
  188. size_t actualSize = 0;
  189. bool flip = false;
  190. for (const uint8_t *ptr = plainText; ptr < plainText + textLength;) {
  191. auto tokenPtr = (const uint8_t *) strchr((const char *) ptr, ' ');
  192. size_t size = 0;
  193. if (!tokenPtr) {
  194. size = static_cast<size_t>(plainText + textLength - ptr);
  195. } else {
  196. size = static_cast<size_t>(tokenPtr - ptr + 1);
  197. }
  198. AESCrypt *decrypter;
  199. uint32_t oldNum;
  200. uint8_t oldVector[sizeof(crypt1.m_vector)];
  201. flip = !flip;
  202. if (flip) {
  203. crypt1.encrypt(plainText + actualSize, encryptText + actualSize, size);
  204. decrypter = &crypt2;
  205. oldNum = decrypter->m_number;
  206. memcpy(oldVector, decrypter->m_vector, sizeof(oldVector));
  207. crypt2.decrypt(encryptText + actualSize, decryptText + actualSize, size);
  208. } else {
  209. crypt2.encrypt(plainText + actualSize, encryptText + actualSize, size);
  210. decrypter = &crypt1;
  211. oldNum = decrypter->m_number;
  212. memcpy(oldVector, decrypter->m_vector, sizeof(oldVector));
  213. crypt1.decrypt(encryptText + actualSize, decryptText + actualSize, size);
  214. }
  215. // that's why AESCrypt can be full-duplex
  216. assert(crypt1.m_number == crypt2.m_number);
  217. assert(0 == memcmp(crypt1.m_vector, crypt2.m_vector, sizeof(crypt1.m_vector)));
  218. // how rollback works
  219. AESCryptStatus status;
  220. decrypter->statusBeforeDecrypt(encryptText + actualSize + size, decryptText + actualSize + size, size, status);
  221. assert(oldNum == status.m_number);
  222. assert(0 == memcmp(oldVector, status.m_vector, sizeof(oldVector)));
  223. actualSize += size;
  224. ptr += size;
  225. }
  226. MMKVInfo("AES CFB decode: %s", decryptText);
  227. delete[] encryptText;
  228. delete[] decryptText;
  229. }
  230. # endif // MMKV_DEBUG
  231. #endif // MMKV_DISABLE_CRYPT
  232. } // namespace mmkv