/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.intel.diceros.crypto.engines; import com.intel.diceros.crypto.BlockCipher; import com.intel.diceros.crypto.DataLengthException; import com.intel.diceros.crypto.params.CipherParameters; import com.intel.diceros.crypto.params.KeyParameter; import com.intel.diceros.provider.symmetric.util.Constants; import java.nio.ByteBuffer; /** * This class implements the <i>BlockCipher</i> interface. It depends on the * underlying openssl library to do the actual encryption/decryption work. */ public class AESOpensslEngine implements BlockCipher { private boolean forEncryption = false; private int mode; private int padding = Constants.PADDING_NOPADDING; private byte[] IV; CipherParameters params = null; private long aesContext = 0; // context used by openssl public static boolean opensslEngineAvailable; static { try { System.loadLibrary("diceros"); synchronized(Object.class) { initIDs(); } opensslEngineAvailable = true; } catch (Throwable e) { e.printStackTrace(); opensslEngineAvailable = false; } } public AESOpensslEngine(int mode) { this.mode = mode; } @Override public void init(boolean forEncryption, CipherParameters params) throws IllegalArgumentException { if (params == null) { params = this.params; } if (params instanceof KeyParameter) { this.forEncryption = forEncryption; this.params = params; if (!isKeySizeValid(((KeyParameter) params).getKey().length)) { throw new IllegalArgumentException("Invalid AES key length: " + ((KeyParameter) params).getKey().length + " bytes"); } aesContext = initWorkingKey(((KeyParameter) params).getKey(), forEncryption, mode, padding, IV, aesContext); } else { throw new IllegalArgumentException( "invalid parameter passed to AES init - " + params.getClass().getName()); } } @Override public String getAlgorithmName() { return "AES"; } @Override public int getBlockSize() { return Constants.AES_BLOCK_SIZE; } @Override public int getIVSize() { return getBlockSize(); } @Override public int processBlock(byte[] in, int inOff, int inLen, byte[] out, int outOff) throws DataLengthException, IllegalStateException { checkCipherInit(); return processBlock(aesContext, in, inOff, inLen, out, outOff); } @Override public int doFinal(byte[] out, int outOff) { checkCipherInit(); return doFinal(aesContext, out, outOff); } @Override public void reset() { if (aesContext != 0) { destoryCipherContext(aesContext); aesContext = 0; } } @Override protected void finalize() throws Throwable { try { reset(); } finally { super.finalize(); } } @Override public int processByteBuffer(ByteBuffer input, ByteBuffer output, boolean isUpdate) { checkCipherInit(); return processByteBuffer(aesContext, input, input.position(), input.limit(), output, output.position(), isUpdate); } @Override public void setIV(byte[] IV) { this.IV = IV; } @Override public void setPadding(int padding) { this.padding = padding; } @Override public int getMode() { return this.mode; } @Override public int getPadding() { return this.padding; } @Override public int getHeadLength() { return 0; } @Override public void setTag(byte[] tag, int tagOff, int tLen) { checkCipherInit(); setTag(aesContext, tag, tagOff, tLen); } @Override public void getTag(byte[] out, int outOff, int tLen) { checkCipherInit(); getTag(aesContext, out, outOff, tLen); } @Override public int getTagLen(){ throw new UnsupportedOperationException(); } @Override public void updateAAD(byte[] src, int offset, int len) { checkCipherInit(); updateAADFromByteArray(aesContext, src, offset, len); } @Override public void updateAAD(ByteBuffer src) { checkCipherInit(); updateAADFromByteBuffer(aesContext, src, src.position(), src.limit()); src.position(src.limit()); } private void checkCipherInit() { if (aesContext == 0) { init(forEncryption, params); } } private boolean isKeySizeValid(int len) { int multi = 1; if (mode == Constants.MODE_XTS) { multi = 2; } for (int i = 0; i < Constants.AES_KEYSIZES.length; i++) { if (len == Constants.AES_KEYSIZES[i] * multi) { return true; } } return false; } private native static void initIDs(); private native int processByteBuffer(long context, ByteBuffer input, int inputPos, int inputLimit, ByteBuffer output, int outputPos, boolean isUpdate); private native long initWorkingKey(byte[] key, boolean forEncryption, int mode, int padding, byte[] IV, long aesContext); private native int processBlock(long context, byte[] in, int inOff, int inLen, byte[] out, int outOff); private native int doFinal(long context, byte[] out, int outOff); private native int destoryCipherContext(long context); private native void setTag(long context, byte[] tag, int tagOff, int tLen); private native void getTag(long context, byte[] out, int outOff, int tLen); private native void updateAADFromByteArray(long context, byte[] src, int offset, int len); private native void updateAADFromByteBuffer(long context, ByteBuffer src, int inputPos, int inputLimit); }