2020-04-13 23:18:45 -04:00
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "py/obj.h"
|
|
|
|
#include "py/objproperty.h"
|
|
|
|
#include "py/runtime.h"
|
|
|
|
|
|
|
|
#include "shared-bindings/aesio/__init__.h"
|
|
|
|
|
|
|
|
// Defined at the end of this file
|
|
|
|
|
2021-11-30 16:21:20 -05:00
|
|
|
//| MODE_ECB: int
|
|
|
|
//| MODE_CBC: int
|
|
|
|
//| MODE_CTR: int
|
|
|
|
//|
|
2020-05-12 20:15:28 -04:00
|
|
|
//| class AES:
|
|
|
|
//| """Encrypt and decrypt AES streams"""
|
2020-04-13 23:18:45 -04:00
|
|
|
//|
|
2022-09-27 16:21:42 -04:00
|
|
|
//| def __init__(
|
|
|
|
//| self,
|
|
|
|
//| key: ReadableBuffer,
|
|
|
|
//| mode: int = 0,
|
2023-03-06 13:38:28 -05:00
|
|
|
//| IV: Optional[ReadableBuffer] = None,
|
2022-09-27 16:21:42 -04:00
|
|
|
//| segment_size: int = 8,
|
|
|
|
//| ) -> None:
|
2020-05-12 20:15:28 -04:00
|
|
|
//| """Create a new AES state with the given key.
|
2020-04-13 23:18:45 -04:00
|
|
|
//|
|
2022-09-27 16:21:42 -04:00
|
|
|
//| :param ~circuitpython_typing.ReadableBuffer key: A 16-, 24-, or 32-byte key
|
|
|
|
//| :param int mode: AES mode to use. One of: `MODE_ECB`, `MODE_CBC`, or
|
|
|
|
//| `MODE_CTR`
|
|
|
|
//| :param ~circuitpython_typing.ReadableBuffer iv: Initialization vector to use for CBC or CTR mode
|
2020-04-13 23:18:45 -04:00
|
|
|
//|
|
2022-09-27 16:21:42 -04:00
|
|
|
//| Additional arguments are supported for legacy reasons.
|
2020-04-13 23:18:45 -04:00
|
|
|
//|
|
2022-09-27 16:21:42 -04:00
|
|
|
//| Encrypting a string::
|
2020-04-13 23:18:45 -04:00
|
|
|
//|
|
2022-09-27 16:21:42 -04:00
|
|
|
//| import aesio
|
|
|
|
//| from binascii import hexlify
|
2020-04-13 23:18:45 -04:00
|
|
|
//|
|
2022-09-27 16:21:42 -04:00
|
|
|
//| key = b'Sixteen byte key'
|
|
|
|
//| inp = b'CircuitPython!!!' # Note: 16-bytes long
|
|
|
|
//| outp = bytearray(len(inp))
|
|
|
|
//| cipher = aesio.AES(key, aesio.MODE_ECB)
|
|
|
|
//| cipher.encrypt_into(inp, outp)
|
|
|
|
//| hexlify(outp)"""
|
2020-05-12 20:15:28 -04:00
|
|
|
//| ...
|
2020-04-13 23:18:45 -04:00
|
|
|
|
|
|
|
STATIC mp_obj_t aesio_aes_make_new(const mp_obj_type_t *type, size_t n_args,
|
2021-10-15 14:43:12 -04:00
|
|
|
size_t n_kw, const mp_obj_t *all_args) {
|
2023-01-10 13:39:10 -05:00
|
|
|
aesio_aes_obj_t *self = m_new_obj(aesio_aes_obj_t);
|
|
|
|
self->base.type = &aesio_aes_type;
|
|
|
|
|
2021-03-15 09:57:36 -04:00
|
|
|
enum { ARG_key, ARG_mode, ARG_IV, ARG_counter, ARG_segment_size };
|
|
|
|
static const mp_arg_t allowed_args[] = {
|
2021-11-28 16:14:47 -05:00
|
|
|
{MP_QSTR_key, MP_ARG_OBJ | MP_ARG_REQUIRED, {.u_obj = MP_OBJ_NULL} },
|
|
|
|
{MP_QSTR_mode, MP_ARG_INT, {.u_int = AES_MODE_ECB} },
|
|
|
|
{MP_QSTR_IV, MP_ARG_OBJ, {.u_obj = MP_OBJ_NULL} },
|
|
|
|
{MP_QSTR_counter, MP_ARG_OBJ, {.u_obj = MP_OBJ_NULL} },
|
2021-03-15 09:57:36 -04:00
|
|
|
{MP_QSTR_segment_size, MP_ARG_INT, {.u_int = 8}},
|
|
|
|
};
|
|
|
|
mp_arg_val_t args[MP_ARRAY_SIZE(allowed_args)];
|
|
|
|
|
2021-10-15 14:43:12 -04:00
|
|
|
mp_arg_parse_all_kw_array(n_args, n_kw, all_args, MP_ARRAY_SIZE(allowed_args),
|
2021-03-15 09:57:36 -04:00
|
|
|
allowed_args, args);
|
|
|
|
|
|
|
|
mp_buffer_info_t bufinfo;
|
|
|
|
|
|
|
|
const uint8_t *key = NULL;
|
|
|
|
uint32_t key_length = 0;
|
2022-05-13 15:33:43 -04:00
|
|
|
mp_get_buffer_raise(args[ARG_key].u_obj, &bufinfo, MP_BUFFER_READ);
|
|
|
|
if ((bufinfo.len != 16) && (bufinfo.len != 24) && (bufinfo.len != 32)) {
|
2023-01-10 13:39:10 -05:00
|
|
|
mp_raise_ValueError(translate("Key must be 16, 24, or 32 bytes long"));
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
2022-05-13 15:33:43 -04:00
|
|
|
key = bufinfo.buf;
|
|
|
|
key_length = bufinfo.len;
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
int mode = args[ARG_mode].u_int;
|
|
|
|
switch (args[ARG_mode].u_int) {
|
|
|
|
case AES_MODE_CBC:
|
|
|
|
case AES_MODE_ECB:
|
|
|
|
case AES_MODE_CTR:
|
|
|
|
break;
|
|
|
|
default:
|
2023-01-10 13:39:10 -05:00
|
|
|
mp_raise_NotImplementedError(translate("Requested AES mode is unsupported"));
|
2021-03-15 09:57:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// IV is required for CBC mode and is ignored for other modes.
|
|
|
|
const uint8_t *iv = NULL;
|
|
|
|
if (args[ARG_IV].u_obj != NULL &&
|
|
|
|
mp_get_buffer(args[ARG_IV].u_obj, &bufinfo, MP_BUFFER_READ)) {
|
2023-01-10 13:39:10 -05:00
|
|
|
(void)mp_arg_validate_length(bufinfo.len, AES_BLOCKLEN, MP_QSTR_IV);
|
|
|
|
|
2021-03-15 09:57:36 -04:00
|
|
|
iv = bufinfo.buf;
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
|
2021-03-15 09:57:36 -04:00
|
|
|
common_hal_aesio_aes_construct(self, key, key_length, iv, mode,
|
|
|
|
args[ARG_counter].u_int);
|
|
|
|
return MP_OBJ_FROM_PTR(self);
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
|
2023-03-05 15:58:40 -05:00
|
|
|
//| def rekey(
|
|
|
|
//| self,
|
|
|
|
//| key: ReadableBuffer,
|
2023-03-06 13:38:28 -05:00
|
|
|
//| IV: Optional[ReadableBuffer] = None,
|
2023-03-05 15:58:40 -05:00
|
|
|
//| ) -> None:
|
|
|
|
//| """Update the AES state with the given key.
|
|
|
|
//|
|
|
|
|
//| :param ~circuitpython_typing.ReadableBuffer key: A 16-, 24-, or 32-byte key
|
|
|
|
//| :param ~circuitpython_typing.ReadableBuffer iv: Initialization vector to use
|
|
|
|
//| for CBC or CTR mode"""
|
|
|
|
//| ...
|
|
|
|
STATIC mp_obj_t aesio_aes_rekey(size_t n_args, const mp_obj_t *pos_args, mp_map_t *kw_args) {
|
2021-03-15 09:57:36 -04:00
|
|
|
aesio_aes_obj_t *self = MP_OBJ_TO_PTR(pos_args[0]);
|
2023-03-05 15:58:40 -05:00
|
|
|
enum { ARG_key, ARG_IV };
|
|
|
|
static const mp_arg_t allowed_args[] = {
|
|
|
|
{MP_QSTR_key, MP_ARG_OBJ | MP_ARG_REQUIRED, {.u_obj = MP_OBJ_NULL} },
|
|
|
|
{MP_QSTR_IV, MP_ARG_OBJ, {.u_obj = MP_OBJ_NULL} },
|
|
|
|
};
|
|
|
|
mp_arg_val_t args[MP_ARRAY_SIZE(allowed_args)];
|
|
|
|
mp_arg_parse_all(n_args - 1, pos_args + 1, kw_args, MP_ARRAY_SIZE(allowed_args), allowed_args, args);
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
mp_buffer_info_t bufinfo;
|
2023-03-05 15:58:40 -05:00
|
|
|
|
|
|
|
mp_get_buffer_raise(args[ARG_key].u_obj, &bufinfo, MP_BUFFER_READ);
|
2021-03-15 09:57:36 -04:00
|
|
|
const uint8_t *key = bufinfo.buf;
|
|
|
|
size_t key_length = bufinfo.len;
|
2023-03-05 15:58:40 -05:00
|
|
|
|
2021-03-15 09:57:36 -04:00
|
|
|
if ((key_length != 16) && (key_length != 24) && (key_length != 32)) {
|
2023-01-10 13:39:10 -05:00
|
|
|
mp_raise_ValueError(translate("Key must be 16, 24, or 32 bytes long"));
|
2021-03-15 09:57:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
const uint8_t *iv = NULL;
|
2023-03-05 15:58:40 -05:00
|
|
|
if (args[ARG_IV].u_obj != NULL &&
|
|
|
|
mp_get_buffer(args[ARG_IV].u_obj, &bufinfo, MP_BUFFER_READ)) {
|
|
|
|
(void)mp_arg_validate_length(bufinfo.len, AES_BLOCKLEN, MP_QSTR_IV);
|
|
|
|
|
|
|
|
iv = bufinfo.buf;
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
|
2021-03-15 09:57:36 -04:00
|
|
|
common_hal_aesio_aes_rekey(self, key, key_length, iv);
|
|
|
|
return mp_const_none;
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
2023-03-05 15:58:40 -05:00
|
|
|
MP_DEFINE_CONST_FUN_OBJ_KW(aesio_aes_rekey_obj, 1, aesio_aes_rekey);
|
2020-04-13 23:18:45 -04:00
|
|
|
|
|
|
|
STATIC void validate_length(aesio_aes_obj_t *self, size_t src_length,
|
2021-03-15 09:57:36 -04:00
|
|
|
size_t dest_length) {
|
|
|
|
if (src_length != dest_length) {
|
|
|
|
mp_raise_ValueError(
|
|
|
|
translate("Source and destination buffers must be the same length"));
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
switch (self->mode) {
|
|
|
|
case AES_MODE_ECB:
|
|
|
|
if (src_length != 16) {
|
2023-01-10 13:39:10 -05:00
|
|
|
mp_raise_ValueError(translate("ECB only operates on 16 bytes at a time"));
|
2021-03-15 09:57:36 -04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case AES_MODE_CBC:
|
|
|
|
if ((src_length & 15) != 0) {
|
2023-01-10 13:39:10 -05:00
|
|
|
mp_raise_ValueError(translate("CBC blocks must be multiples of 16 bytes"));
|
2021-03-15 09:57:36 -04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case AES_MODE_CTR:
|
|
|
|
break;
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-23 14:22:41 -04:00
|
|
|
//| def encrypt_into(self, src: ReadableBuffer, dest: WriteableBuffer) -> None:
|
2020-05-12 20:15:28 -04:00
|
|
|
//| """Encrypt the buffer from ``src`` into ``dest``.
|
2020-04-13 23:18:45 -04:00
|
|
|
//|
|
2022-09-27 16:21:42 -04:00
|
|
|
//| For ECB mode, the buffers must be 16 bytes long. For CBC mode, the
|
|
|
|
//| buffers must be a multiple of 16 bytes, and must be equal length. For
|
|
|
|
//| CTX mode, there are no restrictions."""
|
2020-05-12 20:15:28 -04:00
|
|
|
//| ...
|
2023-01-10 13:39:10 -05:00
|
|
|
STATIC mp_obj_t aesio_aes_encrypt_into(mp_obj_t self_in, mp_obj_t src, mp_obj_t dest) {
|
|
|
|
aesio_aes_obj_t *self = MP_OBJ_TO_PTR(self_in);
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
mp_buffer_info_t srcbufinfo, destbufinfo;
|
|
|
|
mp_get_buffer_raise(src, &srcbufinfo, MP_BUFFER_READ);
|
|
|
|
mp_get_buffer_raise(dest, &destbufinfo, MP_BUFFER_WRITE);
|
2023-01-10 13:39:10 -05:00
|
|
|
validate_length(self, srcbufinfo.len, destbufinfo.len);
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
memcpy(destbufinfo.buf, srcbufinfo.buf, srcbufinfo.len);
|
|
|
|
|
2023-01-10 13:39:10 -05:00
|
|
|
common_hal_aesio_aes_encrypt(self, (uint8_t *)destbufinfo.buf, destbufinfo.len);
|
2021-03-15 09:57:36 -04:00
|
|
|
return mp_const_none;
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
|
2023-01-10 13:39:10 -05:00
|
|
|
STATIC MP_DEFINE_CONST_FUN_OBJ_3(aesio_aes_encrypt_into_obj, aesio_aes_encrypt_into);
|
2020-04-13 23:18:45 -04:00
|
|
|
|
2020-07-23 14:22:41 -04:00
|
|
|
//| def decrypt_into(self, src: ReadableBuffer, dest: WriteableBuffer) -> None:
|
2020-05-12 20:15:28 -04:00
|
|
|
//| """Decrypt the buffer from ``src`` into ``dest``.
|
2022-09-27 16:21:42 -04:00
|
|
|
//| For ECB mode, the buffers must be 16 bytes long. For CBC mode, the
|
|
|
|
//| buffers must be a multiple of 16 bytes, and must be equal length. For
|
|
|
|
//| CTX mode, there are no restrictions."""
|
2020-05-12 20:15:28 -04:00
|
|
|
//| ...
|
2022-09-29 20:22:32 -04:00
|
|
|
//|
|
2023-01-10 13:39:10 -05:00
|
|
|
STATIC mp_obj_t aesio_aes_decrypt_into(mp_obj_t self_in, mp_obj_t src, mp_obj_t dest) {
|
|
|
|
aesio_aes_obj_t *self = MP_OBJ_TO_PTR(self_in);
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
mp_buffer_info_t srcbufinfo, destbufinfo;
|
|
|
|
mp_get_buffer_raise(src, &srcbufinfo, MP_BUFFER_READ);
|
|
|
|
mp_get_buffer_raise(dest, &destbufinfo, MP_BUFFER_WRITE);
|
2023-01-10 13:39:10 -05:00
|
|
|
validate_length(self, srcbufinfo.len, destbufinfo.len);
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
memcpy(destbufinfo.buf, srcbufinfo.buf, srcbufinfo.len);
|
|
|
|
|
2023-01-10 13:39:10 -05:00
|
|
|
common_hal_aesio_aes_decrypt(self, (uint8_t *)destbufinfo.buf, destbufinfo.len);
|
2021-03-15 09:57:36 -04:00
|
|
|
return mp_const_none;
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
|
2023-01-10 13:39:10 -05:00
|
|
|
STATIC MP_DEFINE_CONST_FUN_OBJ_3(aesio_aes_decrypt_into_obj, aesio_aes_decrypt_into);
|
|
|
|
|
|
|
|
STATIC mp_obj_t aesio_aes_get_mode(mp_obj_t self_in) {
|
|
|
|
aesio_aes_obj_t *self = MP_OBJ_TO_PTR(self_in);
|
2020-04-13 23:18:45 -04:00
|
|
|
|
2021-03-15 09:57:36 -04:00
|
|
|
return MP_OBJ_NEW_SMALL_INT(self->mode);
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
MP_DEFINE_CONST_FUN_OBJ_1(aesio_aes_get_mode_obj, aesio_aes_get_mode);
|
|
|
|
|
2023-01-10 13:39:10 -05:00
|
|
|
STATIC mp_obj_t aesio_aes_set_mode(mp_obj_t self_in, mp_obj_t mode_obj) {
|
|
|
|
aesio_aes_obj_t *self = MP_OBJ_TO_PTR(self_in);
|
2021-03-15 09:57:36 -04:00
|
|
|
|
|
|
|
int mode = mp_obj_get_int(mode_obj);
|
|
|
|
switch (mode) {
|
|
|
|
case AES_MODE_CBC:
|
|
|
|
case AES_MODE_ECB:
|
|
|
|
case AES_MODE_CTR:
|
|
|
|
break;
|
|
|
|
default:
|
2023-01-10 13:39:10 -05:00
|
|
|
mp_raise_NotImplementedError(translate("Requested AES mode is unsupported"));
|
2021-03-15 09:57:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
common_hal_aesio_aes_set_mode(self, mode);
|
|
|
|
return mp_const_none;
|
2020-04-13 23:18:45 -04:00
|
|
|
}
|
|
|
|
MP_DEFINE_CONST_FUN_OBJ_2(aesio_aes_set_mode_obj, aesio_aes_set_mode);
|
|
|
|
|
2022-05-01 12:24:05 -04:00
|
|
|
MP_PROPERTY_GETSET(aesio_aes_mode_obj,
|
2022-05-01 11:16:53 -04:00
|
|
|
(mp_obj_t)&aesio_aes_get_mode_obj,
|
|
|
|
(mp_obj_t)&aesio_aes_set_mode_obj);
|
2020-04-13 23:18:45 -04:00
|
|
|
|
|
|
|
STATIC const mp_rom_map_elem_t aesio_locals_dict_table[] = {
|
|
|
|
// Methods
|
|
|
|
{MP_ROM_QSTR(MP_QSTR___name__), MP_OBJ_NEW_QSTR(MP_QSTR_AES)},
|
|
|
|
{MP_ROM_QSTR(MP_QSTR_encrypt_into), (mp_obj_t)&aesio_aes_encrypt_into_obj},
|
|
|
|
{MP_ROM_QSTR(MP_QSTR_decrypt_into), (mp_obj_t)&aesio_aes_decrypt_into_obj},
|
|
|
|
{MP_ROM_QSTR(MP_QSTR_rekey), (mp_obj_t)&aesio_aes_rekey_obj},
|
|
|
|
{MP_ROM_QSTR(MP_QSTR_mode), (mp_obj_t)&aesio_aes_mode_obj},
|
|
|
|
};
|
|
|
|
STATIC MP_DEFINE_CONST_DICT(aesio_locals_dict, aesio_locals_dict_table);
|
|
|
|
|
|
|
|
const mp_obj_type_t aesio_aes_type = {
|
|
|
|
{&mp_type_type},
|
|
|
|
.name = MP_QSTR_AES,
|
|
|
|
.make_new = aesio_aes_make_new,
|
|
|
|
.locals_dict = (mp_obj_dict_t *)&aesio_locals_dict,
|
|
|
|
};
|