| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197 | /* *  Hello world example of using the authenticated encryption with mbed TLS * *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved *  SPDX-License-Identifier: Apache-2.0 * *  Licensed under the Apache License, Version 2.0 (the "License"); you may *  not use this file except in compliance with the License. *  You may obtain a copy of the License at * *  http://www.apache.org/licenses/LICENSE-2.0 * *  Unless required by applicable law or agreed to in writing, software *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. *  See the License for the specific language governing permissions and *  limitations under the License. * *  This file is part of mbed TLS (https://tls.mbed.org) */#include "mbedtls/cipher.h"#include "mbedtls/entropy.h"#include "mbedtls/ctr_drbg.h"#include <stdio.h>#include <string.h>static void print_hex(const char *title, const unsigned char buf[], size_t len){    printf("%s: ", title);    for (size_t i = 0; i < len; i++)        printf("%02x", buf[i]);    printf("\r\n");}/* * The pre-shared key. Should be generated randomly and be unique to the * device/channel/etc. Just used a fixed on here for simplicity. */static const unsigned char secret_key[16] = {    0xf4, 0x82, 0xc6, 0x70, 0x3c, 0xc7, 0x61, 0x0a,    0xb9, 0xa0, 0xb8, 0xe9, 0x87, 0xb8, 0xc1, 0x72,};static int example(void){    /* message that should be protected */    const char message[] = "Some things are better left unread";    /* metadata transmitted in the clear but authenticated */    const char metadata[] = "eg sequence number, routing info";    /* ciphertext buffer large enough to hold message + nonce + tag */    unsigned char ciphertext[128] = { 0 };    int ret;    printf("\r\n\r\n");    print_hex("plaintext message", (unsigned char *) message, sizeof message);    /*     * Setup random number generator     * (Note: later this might be done automatically.)     */    mbedtls_entropy_context entropy;    /* entropy pool for seeding PRNG */    mbedtls_ctr_drbg_context drbg;      /* pseudo-random generator */    mbedtls_entropy_init(&entropy);    mbedtls_ctr_drbg_init(&drbg);    /* Seed the PRNG using the entropy pool, and throw in our secret key as an     * additional source of randomness. */    ret = mbedtls_ctr_drbg_seed(&drbg, mbedtls_entropy_func, &entropy,                                       secret_key, sizeof (secret_key));    if (ret != 0) {        printf("mbedtls_ctr_drbg_init() returned -0x%04X\r\n", -ret);        return 1;    }    /*     * Setup AES-CCM contex     */    mbedtls_cipher_context_t ctx;    mbedtls_cipher_init(&ctx);    ret = mbedtls_cipher_setup(&ctx, mbedtls_cipher_info_from_type(MBEDTLS_CIPHER_AES_128_CCM));    if (ret != 0) {        printf("mbedtls_cipher_setup() returned -0x%04X\r\n", -ret);        return 1;    }    ret = mbedtls_cipher_setkey(&ctx, secret_key, 8 * sizeof secret_key, MBEDTLS_ENCRYPT);    if (ret != 0) {        printf("mbedtls_cipher_setkey() returned -0x%04X\r\n", -ret);        return 1;    }    /*     * Encrypt-authenticate the message and authenticate additional data     *     * First generate a random 8-byte nonce.     * Put it directly in the output buffer as the recipient will need it.     *     * Warning: you must never re-use the same (key, nonce) pair. One of the     * best ways to ensure this to use a counter for the nonce. However this     * means you should save the counter accross rebots, if the key is a     * long-term one. The alternative we choose here is to generate the nonce     * randomly. However it only works if you have a good source of     * randomness.     */    const size_t nonce_len = 8;    mbedtls_ctr_drbg_random(&drbg, ciphertext, nonce_len);    size_t ciphertext_len = 0;    /* Go for a conservative 16-byte (128-bit) tag     * and append it to the ciphertext */    const size_t tag_len = 16;    ret = mbedtls_cipher_auth_encrypt(&ctx, ciphertext, nonce_len,                              (const unsigned char *) metadata, sizeof metadata,                              (const unsigned char *) message, sizeof message,                              ciphertext + nonce_len, &ciphertext_len,                              ciphertext + nonce_len + sizeof message, tag_len );    if (ret != 0) {        printf("mbedtls_cipher_auth_encrypt() returned -0x%04X\r\n", -ret);        return 1;    }    ciphertext_len += nonce_len + tag_len;    /*     * The following information should now be transmitted:     * - first ciphertext_len bytes of ciphertext buffer     * - metadata if not already transmitted elsewhere     */    print_hex("ciphertext", ciphertext, ciphertext_len);    /*     * Decrypt-authenticate     */    unsigned char decrypted[128] = { 0 };    size_t decrypted_len = 0;    ret = mbedtls_cipher_setkey(&ctx, secret_key, 8 * sizeof secret_key, MBEDTLS_DECRYPT);    if (ret != 0) {        printf("mbedtls_cipher_setkey() returned -0x%04X\r\n", -ret);        return 1;    }    ret = mbedtls_cipher_auth_decrypt(&ctx,                              ciphertext, nonce_len,                              (const unsigned char *) metadata, sizeof metadata,                              ciphertext + nonce_len, ciphertext_len - nonce_len - tag_len,                              decrypted, &decrypted_len,                              ciphertext + ciphertext_len - tag_len, tag_len );    /* Checking the return code is CRITICAL for security here */    if (ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED) {        printf("Something bad is happening! Data is not authentic!\r\n");        return 1;    }    if (ret != 0) {        printf("mbedtls_cipher_authdecrypt() returned -0x%04X\r\n", -ret);        return 1;    }    print_hex("decrypted", decrypted, decrypted_len);    printf("\r\nDONE\r\n");    return 0;}#if defined(TARGET_LIKE_MBED)#include "mbed-drivers/test_env.h"#include "minar/minar.h"static void run() {    MBED_HOSTTEST_TIMEOUT(10);    MBED_HOSTTEST_SELECT(default);    MBED_HOSTTEST_DESCRIPTION(mbed TLS example authcrypt);    MBED_HOSTTEST_START("MBEDTLS_EX_AUTHCRYPT");    MBED_HOSTTEST_RESULT(example() == 0);}void app_start(int, char*[]) {    /* Use 115200 bps for consistency with other examples */    get_stdio_serial().baud(115200);    minar::Scheduler::postCallback(mbed::util::FunctionPointer0<void>(run).bind());}#elseint main() {    return example();}#endif
 |