RSA/AES algorithm
Refs: #2799, #2800
Change-Id: I6aeb1ea2d7b3431d4569fb5b2cc3ce214ee6fca3
diff --git a/src/algo/aes.cpp b/src/algo/aes.cpp
new file mode 100644
index 0000000..07cb788
--- /dev/null
+++ b/src/algo/aes.cpp
@@ -0,0 +1,111 @@
+/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
+/**
+ * Copyright (c) 2014-2015, Regents of the University of California
+ *
+ * This file is part of gep (Group-based Encryption Protocol for NDN).
+ * See AUTHORS.md for complete list of gep authors and contributors.
+ *
+ * gep is free software: you can redistribute it and/or modify it under the terms
+ * of the GNU General Public License as published by the Free Software Foundation,
+ * either version 3 of the License, or (at your option) any later version.
+ *
+ * gep is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
+ * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
+ * PURPOSE. See the GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License along with
+ * gep, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include <ndn-cxx/encoding/buffer-stream.hpp>
+#include "aes.hpp"
+
+namespace ndn {
+namespace gep {
+namespace algo {
+
+using namespace CryptoPP;
+
+Buffer
+crypt(CipherModeBase* cipher, const Buffer& data);
+
+DecryptKey<Aes>
+Aes::generateKey(RandomNumberGenerator& rng, AesKeyParams& params)
+{
+ SecByteBlock key(0x00, params.getKeySize() >> 3); // Converting key bit-size to byte-size.
+ rng.GenerateBlock(key.data(), key.size());
+
+ DecryptKey<Aes> decryptKey(std::move(Buffer(key.data(), key.size())));
+ return decryptKey;
+}
+
+EncryptKey<Aes>
+Aes::deriveEncryptKey(const Buffer& keyBits)
+{
+ Buffer copy = keyBits;
+ EncryptKey<Aes> encryptKey(std::move(copy));
+ return encryptKey;
+}
+
+Buffer
+Aes::decrypt(const Buffer& keyBits, const Buffer& encryptedData, const EncryptParams& params)
+{
+ switch (params.getEncryptMode()) {
+ case ENCRYPT_MODE_ECB_AES:
+ {
+ ECB_Mode<AES>::Decryption ecbDecryption(keyBits.get(), keyBits.size());
+ return crypt(&ecbDecryption, encryptedData);
+ }
+
+ case ENCRYPT_MODE_CBC_AES:
+ {
+ Buffer initVector = params.getIV();
+ if (initVector.size() != static_cast<size_t>(AES::BLOCKSIZE))
+ throw Error("incorrect initial vector size");
+
+ CBC_Mode<AES>::Decryption cbcDecryption(keyBits.get(), keyBits.size(), initVector.get());
+ return crypt(&cbcDecryption, encryptedData);
+ }
+
+ default:
+ throw Error("unsupported encryption mode");
+ }
+}
+
+Buffer
+Aes::encrypt(const Buffer& keyBits, const Buffer& plainData, const EncryptParams& params)
+{
+ switch (params.getEncryptMode()) {
+ case ENCRYPT_MODE_ECB_AES:
+ {
+ ECB_Mode<AES>::Encryption ecbEncryption(keyBits.get(), keyBits.size());
+ return crypt(&ecbEncryption, plainData);
+ }
+
+ case ENCRYPT_MODE_CBC_AES:
+ {
+ Buffer initVector = params.getIV();
+ if (initVector.size() != static_cast<size_t>(AES::BLOCKSIZE))
+ throw Error("incorrect initial vector size");
+
+ CBC_Mode<AES>::Encryption cbcEncryption(keyBits.get(), keyBits.size(), initVector.get());
+ return crypt(&cbcEncryption, plainData);
+ }
+
+ default:
+ throw Error("unsupported encryption mode");
+ }
+}
+
+Buffer
+crypt(CipherModeBase* cipher, const Buffer& data)
+{
+ OBufferStream obuf;
+ StringSource pipe(data.get(), data.size(), true,
+ new StreamTransformationFilter(*cipher, new FileSink(obuf)));
+ return *(obuf.buf());
+}
+
+} // namespace algo
+} // namespace gep
+} // namespace ndn