The Advance Encryption Standard (AES) is a block cipher, which uses 128 or 192 or 256 bit key to encrypt or decrypt 128 bit (16 byte) block of input data. So, the input file (or data string) is processed in blocks of 16 bytes each, as per the Block Cipher mode of operation (see the wiki here). In addition, based on the mode of operation, Initialization Vector (IV) is also required for AES, which is unique (usually generated run time) for each encryption operation.
I was checking out some libraries to use for file encryption in a project. So, I decided to test them mainly for the speed of encryption/ decryption, which is the subject of this post. The resultant test codes with terminal outputs are given here. These may serve purpose of example/ demo code for newcomers interested in checking out AES functionality in their programs. For testing these code examples, only hardware required is a Raspberry Pi Pico board and the USB programming cable, and you are ready to go with a laptop/PC loaded with IDE (PlatformIO or Arduino).
Here, I'm comparing four AES libraries, tested on Raspberry Pi Pico, to check out mainly the speed and code size for the implementation. These four libraries are:
/* | |
Program for Testing AES (CBC) Encryption using Mbed AES library (by Neil Thiessen) | |
Library url: https://os.mbed.com/users/neilt6/code/AES/ | |
by CC Dharmani, Jan 2021 | |
Tested on: Raspberry Pi Pico (PlatformIO, Arduino-Mbed) | |
*/ | |
#include <Arduino.h> | |
#include "AES_lib.h" | |
//AES Encryption Key (given here only as an example) | |
uint8_t aes_key[32] = {0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30}; | |
//General initialization vector (given here only as an example) | |
uint8_t aes_iv[16] = {0x01, 0x01, 0x01, 0x01, | |
0x02, 0x02, 0x02, 0x02, | |
0x03, 0x03, 0x03, 0x03, | |
0x04, 0x04, 0x04, 0x04}; | |
void setup() { | |
//Open serial communications and wait for port to open: | |
Serial.begin(115200); | |
while (!Serial); | |
delay(1000); | |
Serial.println("\nTesting AES lib on Raspberry Pi Pico (mbed-arduino)"); | |
} | |
char plainText[] = "AES_Test_1 - Hello! Testing AES Encryption here"; | |
AES aes; //Encryption object declaration | |
void loop() { | |
uint32_t t1, t2; | |
//Print the original message | |
Serial.println("\nINPUT: " + (String)plainText); | |
int dataLength = sizeof(plainText); | |
if((dataLength % 16) != 0) dataLength += 16 - (dataLength % 16); //keep the length multiple of 16 for encryption/ decryption | |
char* processText = new char[dataLength]; | |
for(uint i=0; i<sizeof(plainText); i++) processText[i] = plainText[i]; | |
//Encrypt the message in-place | |
aes.setup(aes_key, AES::KEY_128, AES::MODE_CBC, aes_iv); | |
t1 = micros(); | |
aes.encrypt(processText, dataLength); | |
t2 = micros(); | |
aes.clear(); | |
//Print the encrypted message | |
Serial.print("Cipher Text: "); | |
for (int i=0; i<dataLength;i++) { | |
Serial.print((char)processText[i], HEX); | |
} | |
Serial.print("\nEncryption Time (us): "); Serial.println(t2-t1); | |
//Decrypt the message in-place | |
aes.setup(aes_key, AES::KEY_128, AES::MODE_CBC, aes_iv); | |
t1 = micros(); | |
aes.decrypt(processText, dataLength); | |
t2 = micros(); | |
aes.clear(); | |
//Print the decrypted message | |
Serial.print("Plain Text: "); Serial.println(processText); | |
Serial.print("Decryption Time (us): "); Serial.println(t2-t1); | |
if (String(processText).equals(plainText)) Serial.println("SUCCESS"); | |
else Serial.println("FAILURE"); | |
delete [] processText; | |
while(!Serial.available()); //wait till a serial receive | |
Serial.read(); //flush the received character | |
} |
- aesTest1.zip (main.cpp, AES_lib.cpp, AES_lib.h and platformio.ini)
/* | |
Program for Testing AES (CBC) Encryption using Arduino AES library (by Matej Sychra) | |
(Library url = https://github.com/suculent/thinx-aes-lib) | |
by CC Dharmani, Jan 2021 | |
Tested on: Raspberry Pi Pico (PlatformIO, Arduino-Mbed) | |
*/ | |
#include <Arduino.h> | |
#include "AESLib.h" | |
#define AES_128 16 | |
#define AES_192 24 | |
#define AES_256 32 | |
AESLib aesLib; | |
//AES Encryption Key (given here only as an example) | |
uint8_t aes_key[32] = {0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30}; | |
//General initialization vector (given here only as an example) | |
uint8_t aes_iv[16] = {0x01, 0x01, 0x01, 0x01, | |
0x02, 0x02, 0x02, 0x02, | |
0x03, 0x03, 0x03, 0x03, | |
0x04, 0x04, 0x04, 0x04}; | |
uint8_t iv_copy[16]; //iv gets overwritten, so maintain local copy | |
void setup() { | |
Serial.begin(115200); | |
while (!Serial); // wait for serial port | |
delay(1000); | |
aesLib.gen_iv(aes_iv); //generate iv (once) | |
aesLib.set_paddingmode(paddingMode::CMS); | |
for(int i=0; i<16; i++) iv_copy[i] = aes_iv[i]; | |
Serial.println("\nTesting Arduino AESLib on Raspberry Pi Pico (mbed-arduino)"); | |
} | |
char plainText[] = "AES_Test_2 - Hello! Testing AES Encryption here"; | |
void loop() { | |
uint32_t t1, t2; | |
Serial.println("\nINPUT: " + (String)plainText); | |
uint16_t cipherLength = aesLib.get_cipher64_length(sizeof(plainText)); | |
char* encrypted = new char[cipherLength]; | |
t1 = micros(); | |
aesLib.encrypt64(plainText, sizeof(plainText), encrypted, aes_key, AES_128, aes_iv); //Encryption | |
t2 = micros(); | |
Serial.print("Cipher Text: "); | |
for (int i=0; i<cipherLength;i++) { | |
Serial.print((char)encrypted[i], HEX); | |
} | |
Serial.print("\nEncryption Time (us): "); Serial.println(t2-t1); | |
for(int i=0; i<16; i++) aes_iv[i] = iv_copy[i]; //restore iv | |
char* decrypted = new char[sizeof(plainText)]; | |
t1 = micros(); | |
aesLib.decrypt64(encrypted, cipherLength, decrypted, aes_key, AES_128, aes_iv); //Decryption | |
t2 = micros(); | |
Serial.print("Plain Text: "); Serial.println(decrypted); | |
Serial.print("Decryption Time (us): "); Serial.println(t2-t1); | |
if (String(decrypted).equals(plainText)) Serial.println("SUCCESS"); | |
else Serial.println("FAILURE"); | |
delete[] encrypted; | |
delete[] decrypted; | |
for(int i=0; i<16; i++) aes_iv[i] = iv_copy[i]; //restore iv | |
while(!Serial.available()); //wait till a serial receive | |
Serial.read(); //flush the received character | |
} |
- aesTest2.zip (main.cpp, AESLib library folder and platformio.ini)
/* | |
Program for Testing AES (CBC) Encryption using MbedTLS library (by ARMmbed) | |
(Library url: https://github.com/ARMmbed/mbedtls) | |
by CC Dharmani, Jan 2021 | |
Tested on: Raspberry Pi Pico (PlatformIO, Arduino-Mbed) | |
*/ | |
#include <Arduino.h> | |
#include "mbed.h" | |
#include "md.h" | |
#include "aes.h" | |
#define AES_128 128 | |
#define AES_192 192 | |
#define AES_256 256 | |
//AES Encryption Key (given here only as an example) | |
uint8_t aes_key[32] = {0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30}; | |
//General initialization vector (given here only as an example) | |
uint8_t aes_iv[16] = {0x01, 0x01, 0x01, 0x01, | |
0x02, 0x02, 0x02, 0x02, | |
0x03, 0x03, 0x03, 0x03, | |
0x04, 0x04, 0x04, 0x04}; | |
uint8_t iv_copy[16]; //iv gets overwritten, so maintain local copy | |
void setup() { | |
Serial.begin(115200); | |
while(!Serial); | |
delay(1000); | |
for(int i=0; i<16; i++) iv_copy[i] = aes_iv[i]; | |
Serial.println("\nTesting MbedTLS lib on Raspberry Pi Pico (mbed-arduino)"); | |
} | |
const char plainText[] = "AES_Test_3 - Hello! Testing AES Encryption here"; | |
byte enc_iv[16] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; | |
mbedtls_aes_context aes_encrypt, aes_decrypt; //encryption objects declaration | |
void loop() { | |
uint32_t t1, t2; | |
Serial.println("\nINPUT: " + (String)plainText); | |
// prepare data, generate according to AES algorithm | |
int dataLength = sizeof(plainText); | |
if((dataLength % 16) != 0) dataLength += 16 - (dataLength % 16); //keep the length multiple of 16 for encryption/ decryption | |
mbedtls_aes_setkey_enc( &aes_encrypt, aes_key, AES_128); // size of key must be given as 128, 192 or 256 bit | |
unsigned char* encrypted = new unsigned char[dataLength]; | |
t1 = micros(); | |
mbedtls_aes_crypt_cbc(&aes_encrypt, MBEDTLS_AES_ENCRYPT, dataLength, aes_iv, (const unsigned char*)plainText, encrypted); //Encryption | |
t2 = micros(); | |
Serial.print("Cipher Text: "); | |
for (int i=0; i<dataLength;i++) { | |
Serial.print((char)encrypted[i], HEX); | |
} | |
Serial.print("\nEncryption Time (us): "); Serial.println(t2-t1); | |
for(int i=0; i<16; i++) aes_iv[i] = iv_copy[i]; //restore iv | |
mbedtls_aes_setkey_dec(&aes_decrypt, aes_key, AES_128); | |
unsigned char* decrypted = new unsigned char[sizeof(plainText)]; | |
t1 = micros(); | |
mbedtls_aes_crypt_cbc(&aes_decrypt, MBEDTLS_AES_DECRYPT, dataLength, aes_iv, encrypted, decrypted); //Decryption | |
t2 = micros(); | |
Serial.print("Plain Text: "); Serial.println((char*)decrypted); | |
Serial.print("Decryption Time (us): "); Serial.println(t2-t1); | |
if (String((char*)decrypted).equals(plainText)) Serial.println("SUCCESS"); | |
else Serial.println("FAILURE"); | |
delete [] encrypted; | |
delete [] decrypted; | |
for(int i=0; i<16; i++) aes_iv[i] = iv_copy[i]; //restore aes_iv | |
while(!Serial.available()); //wait till a serial receive | |
Serial.read(); //flush the received character | |
} |
- aesTest3.zip (main.cpp and platformio.ini)
aes.h
. Default setting AES128 is already defined there./* | |
Program for Testing AES (CBC) Encryption using tiny-AES library (by kokke) | |
(Library url: https://github.com/kokke/tiny-AES-c) | |
by CC Dharmani, Jan 2021 | |
Tested on: Raspberry Pi Pico (PlatformIO, Arduino-Mbed) | |
*/ | |
#include <Arduino.h> | |
#include "aes.hpp" | |
//AES Encryption Key (given here only as an example) | |
const uint8_t aes_key[32] = {0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30}; | |
//General initialization vector (given here only as an example) | |
const uint8_t aes_iv[16] = {0x01, 0x01, 0x01, 0x01, | |
0x02, 0x02, 0x02, 0x02, | |
0x03, 0x03, 0x03, 0x03, | |
0x04, 0x04, 0x04, 0x04}; | |
void setup() { | |
Serial.begin(115200); | |
while (!Serial); // wait for serial port | |
delay(1000); | |
Serial.println("\nTesting tiny-AES lib on Raspberry Pi Pico (mbed-arduino)"); | |
} | |
char plainText[] = "AES_Test_4 - Hello! Testing AES Encryption here"; | |
struct AES_ctx ctx; //encryption objects declaration | |
void loop() { | |
uint32_t t1, t2; | |
Serial.println("\nINPUT: " + (String)plainText); | |
uint dataLength = sizeof(plainText); | |
if((dataLength % 16) != 0) dataLength += 16 - (dataLength % 16); //keep the length multiple of 16 for encryption/ decryption | |
char* processText = new char[dataLength]; | |
for(uint i=0; i<sizeof(plainText); i++) processText[i] = plainText[i]; | |
//initialize AES | |
AES_init_ctx_iv(&ctx, aes_key, aes_iv); | |
t1 = micros(); | |
AES_CBC_encrypt_buffer(&ctx, (uint8_t*)processText, dataLength); //Encryption | |
t2 = micros(); | |
Serial.print("Cipher Text: "); | |
for (int i=0; i<dataLength;i++) { | |
Serial.print((char)processText[i], HEX); | |
} | |
Serial.print("\nEncryption Time (us): "); Serial.println(t2-t1); | |
AES_ctx_set_iv(&ctx, aes_iv); //restore iv | |
t1 = micros(); | |
AES_CBC_decrypt_buffer(&ctx, (uint8_t*)processText, dataLength); //Decryption | |
t2 = micros(); | |
Serial.print("Plain Text: "); Serial.println(processText); | |
Serial.print("Decryption Time (us): "); Serial.println(t2-t1); | |
if (String(processText).equals(plainText)) Serial.println("SUCCESS"); | |
else Serial.println("FAILURE"); | |
delete [] processText; | |
while(!Serial.available()); //wait till a serial receive | |
Serial.read(); //flush the received character | |
} |
- aesTest4.zip (main.cpp, tiny-AES library folder and platformio.ini)
Sr. No. |
Library |
AES-128 Time (µs) |
AES-256 Time (µs) |
Pi-Pico Usage (KB) |
|||
Encrypt |
Decrypt |
Encrypt |
Decrypt |
RAM |
FLASH |
||
1. |
Mbed AES
lib, by Neil
T. |
1305 |
2337 |
1842 |
3338 |
41.076 |
4.134 |
2. |
Arduino
AESLib, by Matej
S. |
456 |
820 |
604 |
1093 |
47.100 |
4.546 |
3. |
MbedTLS, by
ARMmbed |
170 |
161 |
215 |
207 |
41.320 |
4.082 |
4. |
tiny-AES, by kokke |
246 |
463 |
345 |
622 |
41.000 |
4.082 |
/* | |
* Program to Encrypt a file in Pi Pico Flash with AES using MbedTLS Library (by ARMmbed). | |
* Mbedtls Library url: Library url: https://github.com/ARMmbed/mbedtls | |
* Flash File operations are done with FlashIAPBlockDevice and LittleFileSystem libraries. | |
* All the above libraries are part of Mbed OS, which is included in the Arduino-mbed platform, | |
no need to download any files seperately. | |
* by CC Dharmani, Jan 2021 | |
* Tested on: Raspberry Pi Pico (PlatformIO, Arduino-Mbed) | |
*/ | |
#include <Arduino.h> | |
#include <stdio.h> | |
#include "FlashIAPBlockDevice.h" | |
#include "LittleFileSystem.h" | |
#include "fileAES.h" | |
#define FS_SIZE_KB 64 | |
#define PICO_FLASH_SIZE 2*1024*1024 | |
#define FORCE_REFORMAT false | |
//BlockDevice declaration for Mounting the file-system | |
static FlashIAPBlockDevice bd(XIP_BASE + PICO_FLASH_SIZE - (FS_SIZE_KB * 1024), (FS_SIZE_KB * 1024)); | |
//File-system decalration | |
static mbed::LittleFileSystem fs("fs"); | |
//AES Encryption Key (given here only as an example) | |
char aes_key[] = {0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, | |
0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30, 0x30}; | |
//Other format for key (string of hex numbers): | |
// char* aes_key = "hex:E76B2413958B00E193" | |
//key can also be stored in raw format in a file and filename can be passed as argument instead in the fileAES() function call | |
//Input, output files names declaration | |
char inFileName[] = "inFile.txt" ; | |
char cipherFileName[] = "ciphFile.aes"; | |
char outFileName[] = "outFile.txt" ; | |
//AES Parameters | |
char cipherType[] = "AES-128-CBC" ; | |
char mdType[] = "SHA512" ; | |
#define MAX_FILE_NAME_LEN 30 | |
#define TOTAL_LINES 100 | |
void setup() { | |
//Open serial communications and wait for port to open: | |
Serial1.begin(115200); //Opening debug port (UART0), Tx=GP1 (use if debug is required) | |
Serial.begin(115200); | |
while (!Serial); | |
delay(1000); | |
Serial.println("\nAES File Encryption (using Mbedtls) on Raspberry Pi Pico (mbed-arduino)"); | |
//Initialize the Flash Block-Device | |
int err = bd.init(); | |
if(err) {Serial.println("Flash BD Initialization Failed"); while(1);} | |
else Serial.println("Flash BD Initialized!"); | |
//Mount the file system | |
err = fs.mount(&bd); | |
if(err) {Serial.println("FileSystem Mount Failed"); while(1); } | |
else Serial.println("FileSystem mounted!"); | |
} | |
void loop() { | |
FILE *f1; | |
int size, result; | |
uint32_t t1, t2; | |
//char readMsg[100]; | |
char inFile[MAX_FILE_NAME_LEN], cipherFile[MAX_FILE_NAME_LEN], outFile[MAX_FILE_NAME_LEN]; | |
strcpy(inFile, "fs/"); strcat(inFile, inFileName); | |
strcpy(cipherFile, "fs/"); strcat(cipherFile, cipherFileName); | |
strcpy(outFile, "fs/"); strcat(outFile, outFileName); | |
char message[] = "Hello from Pico Flash File - MbedLTS File Encryption Demo Run.."; | |
//creating input file for encryption | |
f1 = fopen(inFile, "w"); | |
if(!f1){Serial.println("\ninFile creating Failed.."); goto exitLoop;} | |
for(int i=0; i<TOTAL_LINES; i++){ //creating file with 10 rows of message | |
size = fwrite((uint8_t*)message, 1, sizeof(message)-1, f1); | |
if(size != (sizeof(message)-1)) {Serial.println("\nWrite File Failed"); goto exitLoop;} | |
} | |
size = ftell(f1); | |
Serial.print("\nFile Size (W): "); Serial.println(size); Serial.println(" "); | |
fclose(f1); | |
/* | |
f1 = fopen(inFile, "r"); | |
if(!f1){Serial.println("\ninFile opening Failed.."); goto exitLoop;} | |
while(!feof(f1)){ | |
size = fread((uint8_t*)readMsg, 1, sizeof(message)-1, f1); | |
Serial.print(readMsg); | |
} | |
fclose(f1); | |
Serial.println(" "); | |
*/ | |
//File Encryption | |
t1 = millis(); | |
result = fileAES(MODE_ENCRYPT, inFile, cipherFile, cipherType, mdType, aes_key); | |
t2 = millis(); | |
if(result == MBEDTLS_EXIT_SUCCESS){ | |
Serial.print("Encryption Done, Time taken: "); Serial.print(t2-t1); Serial.println(" ms"); | |
} | |
else{ | |
Serial.println("\nEncryption Failed.."); | |
goto exitLoop; | |
} | |
//File Decryption | |
t1 = millis(); | |
result = fileAES(MODE_DECRYPT, cipherFile, outFile, cipherType, mdType, aes_key); | |
t2 = millis(); | |
if(result == MBEDTLS_EXIT_SUCCESS){ | |
Serial.print("Decryption Done, Time taken: "); Serial.print(t2-t1); Serial.println(" ms\n"); | |
/* | |
f1 = fopen(outFile, "r"); | |
if(!f1){Serial.println("\ninFile opening Failed.."); goto exitLoop;} | |
while(!feof(f1)){ | |
size = fread((uint8_t*)readMsg, 1, sizeof(message)-1, f1); | |
Serial.print(readMsg); | |
} | |
fclose(f1); | |
Serial.println(" "); | |
*/ | |
} | |
else{ | |
Serial.println("\nDecryption Failed.."); | |
goto exitLoop; | |
} | |
exitLoop: | |
if(f1) fclose(f1); | |
Serial.println("Example Done!"); | |
while(1); | |
} |
#ifndef _FILE_AES_H_ | |
#define _FILE_AES_H_ | |
#define MODE_ENCRYPT 0 | |
#define MODE_DECRYPT 1 | |
#define mbedtls_fprintf fprintf | |
#define mbedtls_printf printf | |
#define mbedtls_exit exit | |
#define MBEDTLS_EXIT_SUCCESS 0 | |
#define MBEDTLS_EXIT_FAILURE 1 | |
#define MBEDTLS_CIPHER_C | |
#define MBEDTLS_MD_C | |
#define MBEDTLS_FS_IO | |
int fileAES (int modeIn, char* inFilename, char* outFilename, char* cipher, char* mbedtls_md, char* keyIn); | |
#endif |
/* | |
* \brief Generic file encryption program using generic wrappers for configured | |
* security. | |
* | |
* Copyright The Mbed TLS Contributors | |
* SPDX-License-Identifier: Apache-2.0 | |
* | |
* Licensed under the Apache License, Version 2.0 (the "License"); you may | |
* not use this file except in compliance with the License. | |
* You may obtain a copy of the License at | |
* | |
* http://www.apache.org/licenses/LICENSE-2.0 | |
* | |
* Unless required by applicable law or agreed to in writing, software | |
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | |
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
* See the License for the specific language governing permissions and | |
* limitations under the License. | |
*/ | |
/* | |
* This file (originally crypt_and_hash.c) is modified by CC Dharmani (Jan 2022) to suit | |
R-Pi Pico, Arduino-mbed, renamed here as fileAES.cpp. | |
* The main(argc,arg[v]) function declaration is replaced with fileAES(arguments) function. | |
* Tested on Raspberry Pi Pico board (Arduino-mbed, on PlatformIO). | |
*/ | |
#include "fileAES.h" | |
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_MD_C) && defined(MBEDTLS_FS_IO) | |
#include "mbedtls/cipher.h" | |
#include "mbedtls/md.h" | |
#include "mbedtls/aes.h" | |
#include "mbedtls/platform_util.h" | |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <sys/types.h> | |
#include <unistd.h> | |
int fileAES (int modeIn, char* inFilename, char* outFilename, char* cipher, char* mbedtls_md, char* keyIn) | |
{ | |
int ret = 1, i; | |
unsigned n; | |
int exit_code = MBEDTLS_EXIT_FAILURE; | |
int mode; | |
size_t keylen, ilen, olen; | |
FILE *fkey, *fin = NULL, *fout = NULL; | |
char *p; | |
unsigned char IV[16]; | |
unsigned char key[512]; | |
unsigned char digest[MBEDTLS_MD_MAX_SIZE]; | |
unsigned char buffer[512]; | |
unsigned char output[512]; | |
unsigned char diff; | |
const mbedtls_cipher_info_t *cipher_info; | |
const mbedtls_md_info_t *md_info; | |
mbedtls_cipher_context_t cipher_ctx; | |
mbedtls_md_context_t md_ctx; | |
#if defined(_WIN32_WCE) | |
long filesize, offset; | |
#elif defined(_WIN32) | |
LARGE_INTEGER li_size; | |
__int64 filesize, offset; | |
#else | |
off_t filesize, offset; | |
#endif | |
mbedtls_cipher_init( &cipher_ctx ); | |
mbedtls_md_init( &md_ctx ); | |
mode = modeIn; | |
if( mode != MODE_ENCRYPT && mode != MODE_DECRYPT ) | |
{ | |
mbedtls_fprintf( stderr, "invalid operation mode\n" ); | |
goto exit; | |
} | |
if( strcmp( inFilename, outFilename) == 0 ) | |
{ | |
mbedtls_fprintf( stderr, "input and output filenames must differ\n" ); | |
goto exit; | |
} | |
if( ( fin = fopen( inFilename, "rb" ) ) == NULL ) | |
{ | |
mbedtls_fprintf( stderr, "fopen(%s,rb) failed\n", inFilename ); | |
goto exit; | |
} | |
if( ( fout = fopen( outFilename, "wb+" ) ) == NULL ) | |
{ | |
mbedtls_fprintf( stderr, "fopen(%s,wb+) failed\n", outFilename ); | |
goto exit; | |
} | |
/* | |
* Read the Cipher and MD from the command line | |
*/ | |
cipher_info = mbedtls_cipher_info_from_string( cipher ); | |
if( cipher_info == NULL ) | |
{ | |
mbedtls_fprintf( stderr, "Cipher '%s' not found\n", cipher ); | |
goto exit; | |
} | |
if( ( ret = mbedtls_cipher_setup( &cipher_ctx, cipher_info) ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_setup failed\n" ); | |
goto exit; | |
} | |
md_info = mbedtls_md_info_from_string( mbedtls_md ); | |
if( md_info == NULL ) | |
{ | |
mbedtls_fprintf( stderr, "Message Digest '%s' not found\n", mbedtls_md ); | |
goto exit; | |
} | |
if( mbedtls_md_setup( &md_ctx, md_info, 1 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_setup failed\n" ); | |
goto exit; | |
} | |
/* | |
* Read the secret key from file or command line | |
*/ | |
if( ( fkey = fopen( keyIn, "rb" ) ) != NULL ) | |
{ | |
keylen = fread( key, 1, sizeof( key ), fkey ); | |
fclose( fkey ); | |
} | |
else | |
{ | |
if( memcmp( keyIn, "hex:", 4 ) == 0 ) | |
{ | |
p = &keyIn[4]; | |
keylen = 0; | |
while( sscanf( p, "%02X", (unsigned int*) &n ) > 0 && | |
keylen < (int) sizeof( key ) ) | |
{ | |
key[keylen++] = (unsigned char) n; | |
p += 2; | |
} | |
} | |
else | |
{ | |
keylen = strlen( keyIn ); | |
if( keylen > (int) sizeof( key ) ) | |
keylen = (int) sizeof( key ); | |
memcpy( key, keyIn, keylen ); | |
} | |
} | |
#if defined(_WIN32_WCE) | |
filesize = fseek( fin, 0L, SEEK_END ); | |
#else | |
#if defined(_WIN32) | |
/* | |
* Support large files (> 2Gb) on Win32 | |
*/ | |
li_size.QuadPart = 0; | |
li_size.LowPart = | |
SetFilePointer( (HANDLE) _get_osfhandle( _fileno( fin ) ), | |
li_size.LowPart, &li_size.HighPart, FILE_END ); | |
if( li_size.LowPart == 0xFFFFFFFF && GetLastError() != NO_ERROR ) | |
{ | |
mbedtls_fprintf( stderr, "SetFilePointer(0,FILE_END) failed\n" ); | |
goto exit; | |
} | |
filesize = li_size.QuadPart; | |
#else | |
if(fseek(fin, 0L, SEEK_END) < 0) | |
{ | |
perror( "fseek" ); | |
goto exit; | |
} | |
filesize = ftell(fin); | |
//mbedtls_fprintf( stdout, "\nInput File size: %ld bytes\n", (long)filesize ); | |
/* | |
if( ( filesize = lseek( fileno( fin ), 0, SEEK_END ) ) < 0 ) | |
{ | |
perror( "lseek" ); | |
goto exit; | |
} | |
*/ | |
#endif | |
#endif | |
if( fseek( fin, 0, SEEK_SET ) < 0 ) | |
{ | |
mbedtls_fprintf( stderr, "fseek(0,SEEK_SET) failed\n" ); | |
goto exit; | |
} | |
if( mode == MODE_ENCRYPT ) | |
{ | |
/* | |
* Generate the initialization vector as: | |
* IV = MD( filesize || filename )[0..15] | |
*/ | |
for( i = 0; i < 8; i++ ) | |
buffer[i] = (unsigned char)( filesize >> ( i << 3 ) ); | |
p = inFilename; | |
if( mbedtls_md_starts( &md_ctx ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_starts() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_update( &md_ctx, buffer, 8 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_update() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_update( &md_ctx, ( unsigned char * ) p, strlen( p ) ) | |
!= 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_update() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_finish( &md_ctx, digest ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_finish() returned error\n" ); | |
goto exit; | |
} | |
memcpy( IV, digest, 16 ); | |
/* | |
mbedtls_fprintf( stdout, "\nEncode IV: " ); | |
for(int i=0; i<16; i++) mbedtls_fprintf( stdout, "0x%02x ", IV[i]); | |
mbedtls_fprintf( stdout, "\n"); | |
*/ | |
/* | |
* Append the IV at the beginning of the output. | |
*/ | |
if( fwrite( IV, 1, 16, fout ) != 16 ) | |
{ | |
mbedtls_fprintf( stderr, "fwrite(%d bytes) failed\n", 16 ); | |
goto exit; | |
} | |
/* | |
* Hash the IV and the secret key together 8192 times | |
* using the result to setup the AES context and HMAC. | |
*/ | |
memset( digest, 0, 32 ); | |
memcpy( digest, IV, 16 ); | |
for( i = 0; i < 8192; i++ ) | |
{ | |
if( mbedtls_md_starts( &md_ctx ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, | |
"mbedtls_md_starts() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, | |
"mbedtls_md_update() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_update( &md_ctx, key, keylen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, | |
"mbedtls_md_update() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_finish( &md_ctx, digest ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, | |
"mbedtls_md_finish() returned error\n" ); | |
goto exit; | |
} | |
} | |
if( mbedtls_cipher_setkey( &cipher_ctx, | |
digest, | |
//(int) mbedtls_cipher_info_get_key_bitlen( cipher_info ), | |
mbedtls_cipher_get_key_bitlen ( &cipher_ctx), | |
MBEDTLS_ENCRYPT ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_setkey() returned error\n"); | |
goto exit; | |
} | |
if( mbedtls_cipher_set_iv( &cipher_ctx, IV, 16 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_set_iv() returned error\n"); | |
goto exit; | |
} | |
if( mbedtls_cipher_reset( &cipher_ctx ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_reset() returned error\n"); | |
goto exit; | |
} | |
if( mbedtls_md_hmac_starts( &md_ctx, digest, 32 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_hmac_starts() returned error\n" ); | |
goto exit; | |
} | |
/* | |
* Encrypt and write the ciphertext. | |
*/ | |
for( offset = 0; offset < filesize; offset += mbedtls_cipher_get_block_size( &cipher_ctx ) ) | |
{ | |
ilen = ( (unsigned int) filesize - offset > mbedtls_cipher_get_block_size( &cipher_ctx ) ) ? | |
mbedtls_cipher_get_block_size( &cipher_ctx ) : (unsigned int) ( filesize - offset ); | |
if( fread( buffer, 1, ilen, fin ) != ilen ) | |
{ | |
mbedtls_fprintf( stderr, "fread(%ld bytes) failed\n", (long) ilen ); | |
goto exit; | |
} | |
if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, &olen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_update() returned error\n"); | |
goto exit; | |
} | |
if( mbedtls_md_hmac_update( &md_ctx, output, olen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_hmac_update() returned error\n" ); | |
goto exit; | |
} | |
if( fwrite( output, 1, olen, fout ) != olen ) | |
{ | |
mbedtls_fprintf( stderr, "fwrite(%ld bytes) failed\n", (long) olen ); | |
goto exit; | |
} | |
} | |
if( mbedtls_cipher_finish( &cipher_ctx, output, &olen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_finish() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_hmac_update( &md_ctx, output, olen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_hmac_update() returned error\n" ); | |
goto exit; | |
} | |
if( fwrite( output, 1, olen, fout ) != olen ) | |
{ | |
mbedtls_fprintf( stderr, "fwrite(%ld bytes) failed\n", (long) olen ); | |
goto exit; | |
} | |
/* | |
* Finally write the HMAC. | |
*/ | |
if( mbedtls_md_hmac_finish( &md_ctx, digest ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_hmac_finish() returned error\n" ); | |
goto exit; | |
} | |
if( fwrite( digest, 1, mbedtls_md_get_size( md_info ), fout ) != mbedtls_md_get_size( md_info ) ) | |
{ | |
mbedtls_fprintf( stderr, "fwrite(%d bytes) failed\n", mbedtls_md_get_size( md_info ) ); | |
goto exit; | |
} | |
} | |
if( mode == MODE_DECRYPT ) | |
{ | |
/* | |
* The encrypted file must be structured as follows: | |
* | |
* 00 .. 15 Initialization Vector | |
* 16 .. 31 Encrypted Block #1 | |
* .. | |
* N*16 .. (N+1)*16 - 1 Encrypted Block #N | |
* (N+1)*16 .. (N+1)*16 + n Hash(ciphertext) | |
*/ | |
/* | |
if( fread( buffer, 1, 16, fin ) != 16 ) | |
{ | |
mbedtls_fprintf( stderr, "fread(%d bytes) failed\n", 16 ); | |
goto exit; | |
} | |
mbedtls_fprintf( stdout, "\nRead IV: " ); | |
for(int i=0; i<16; i++) mbedtls_fprintf( stdout, "0x%02x ", buffer[i]); | |
mbedtls_fprintf( stdout, "\n"); | |
fseek( fin, 0, SEEK_SET ); | |
*/ | |
if( filesize < 16 + mbedtls_md_get_size( md_info ) ) | |
{ | |
mbedtls_fprintf( stderr, "File too short to be encrypted.\n" ); | |
goto exit; | |
} | |
if( mbedtls_cipher_get_block_size( &cipher_ctx ) == 0 ) | |
{ | |
mbedtls_fprintf( stderr, "Invalid cipher block size: 0. \n" ); | |
goto exit; | |
} | |
/* | |
* Check the file size. | |
*/ | |
//if( mbedtls_cipher_info_get_mode( cipher_info ) != MBEDTLS_MODE_GCM && | |
if( mbedtls_cipher_get_cipher_mode( &cipher_ctx ) != MBEDTLS_MODE_GCM && | |
( ( filesize - mbedtls_md_get_size( md_info ) ) % | |
mbedtls_cipher_get_block_size( &cipher_ctx ) ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "File content not a multiple of the block size (%u).\n", | |
mbedtls_cipher_get_block_size( &cipher_ctx )); | |
goto exit; | |
} | |
/* | |
* Subtract the IV + HMAC length. | |
*/ | |
filesize -= ( 16 + mbedtls_md_get_size( md_info ) ); | |
/* | |
* Read the IV and original filesize modulo 16. | |
*/ | |
if( fread( buffer, 1, 16, fin ) != 16 ) | |
{ | |
mbedtls_fprintf( stderr, "fread(%d bytes) failed\n", 16 ); | |
goto exit; | |
} | |
memcpy( IV, buffer, 16 ); | |
/* | |
mbedtls_fprintf( stdout, "Decode IV: " ); //------------------------------------ | |
for(int i=0; i<16; i++) mbedtls_fprintf( stdout, "0x%02x ", IV[i]); | |
mbedtls_fprintf( stdout, "\n"); | |
*/ | |
/* | |
* Hash the IV and the secret key together 8192 times | |
* using the result to setup the AES context and HMAC. | |
*/ | |
memset( digest, 0, 32 ); | |
memcpy( digest, IV, 16 ); | |
for( i = 0; i < 8192; i++ ) | |
{ | |
if( mbedtls_md_starts( &md_ctx ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_starts() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_update() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_update( &md_ctx, key, keylen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_update() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_finish( &md_ctx, digest ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_finish() returned error\n" ); | |
goto exit; | |
} | |
} | |
if( mbedtls_cipher_setkey( &cipher_ctx, | |
digest, | |
//(int) mbedtls_cipher_info_get_key_bitlen( cipher_info ), | |
mbedtls_cipher_get_key_bitlen( &cipher_ctx ), | |
MBEDTLS_DECRYPT ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_setkey() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_cipher_set_iv( &cipher_ctx, IV, 16 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_set_iv() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_cipher_reset( &cipher_ctx ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_reset() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_md_hmac_starts( &md_ctx, digest, 32 ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_hmac_starts() returned error\n" ); | |
goto exit; | |
} | |
/* | |
* Decrypt and write the plaintext. | |
*/ | |
for( offset = 0; offset < filesize; offset += mbedtls_cipher_get_block_size( &cipher_ctx ) ) | |
{ | |
ilen = ( (unsigned int) filesize - offset > mbedtls_cipher_get_block_size( &cipher_ctx ) ) ? | |
mbedtls_cipher_get_block_size( &cipher_ctx ) : (unsigned int) ( filesize - offset ); | |
if( fread( buffer, 1, ilen, fin ) != ilen ) | |
{ | |
mbedtls_fprintf( stderr, "fread(%u bytes) failed\n", | |
mbedtls_cipher_get_block_size( &cipher_ctx ) ); | |
goto exit; | |
} | |
if( mbedtls_md_hmac_update( &md_ctx, buffer, ilen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_hmac_update() returned error\n" ); | |
goto exit; | |
} | |
if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, | |
&olen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_update() returned error\n" ); | |
goto exit; | |
} | |
if( fwrite( output, 1, olen, fout ) != olen ) | |
{ | |
mbedtls_fprintf( stderr, "fwrite(%ld bytes) failed\n", (long) olen ); | |
goto exit; | |
} | |
} | |
/* | |
* Verify the message authentication code. | |
*/ | |
if( mbedtls_md_hmac_finish( &md_ctx, digest ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_md_hmac_finish() returned error\n" ); | |
goto exit; | |
} | |
if( fread( buffer, 1, mbedtls_md_get_size( md_info ), fin ) != mbedtls_md_get_size( md_info ) ) | |
{ | |
mbedtls_fprintf( stderr, "fread(%d bytes) failed\n", mbedtls_md_get_size( md_info ) ); | |
goto exit; | |
} | |
/* Use constant-time buffer comparison */ | |
diff = 0; | |
for( i = 0; i < mbedtls_md_get_size( md_info ); i++ ) | |
diff |= digest[i] ^ buffer[i]; | |
if( diff != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "HMAC check failed: wrong key, " | |
"or file corrupted.\n" ); | |
goto exit; | |
} | |
/* | |
* Write the final block of data | |
*/ | |
if( mbedtls_cipher_finish( &cipher_ctx, output, &olen ) != 0 ) | |
{ | |
mbedtls_fprintf( stderr, "mbedtls_cipher_finish() returned error\n" ); | |
goto exit; | |
} | |
if( fwrite( output, 1, olen, fout ) != olen ) | |
{ | |
mbedtls_fprintf( stderr, "fwrite(%ld bytes) failed\n", (long) olen ); | |
goto exit; | |
} | |
} | |
exit_code = MBEDTLS_EXIT_SUCCESS; | |
exit: | |
if( fin ) | |
fclose( fin ); | |
if( fout ) | |
fclose( fout ); | |
/* Zeroize all memory buffers used */ | |
mbedtls_platform_zeroize( IV, sizeof( IV ) ); | |
mbedtls_platform_zeroize( key, sizeof( key ) ); | |
mbedtls_platform_zeroize( buffer, sizeof( buffer ) ); | |
mbedtls_platform_zeroize( output, sizeof( output ) ); | |
mbedtls_platform_zeroize( digest, sizeof( digest ) ); | |
mbedtls_cipher_free( &cipher_ctx ); | |
mbedtls_md_free( &md_ctx ); | |
return( exit_code ); | |
} | |
#endif |
- littleFsAes.zip (main.cpp, fileAES.cpp, fileAES.h and platformio.ini)