xref: /aosp_15_r20/external/libwebsockets/lib/jose/jwe/enc/aescbc.c (revision 1c60b9aca93fdbc9b5f19b2d2194c91294b22281)
1*1c60b9acSAndroid Build Coastguard Worker /*
2*1c60b9acSAndroid Build Coastguard Worker  * libwebsockets - small server side websockets and web server implementation
3*1c60b9acSAndroid Build Coastguard Worker  *
4*1c60b9acSAndroid Build Coastguard Worker  * Copyright (C) 2010 - 2020 Andy Green <[email protected]>
5*1c60b9acSAndroid Build Coastguard Worker  *
6*1c60b9acSAndroid Build Coastguard Worker  * Permission is hereby granted, free of charge, to any person obtaining a copy
7*1c60b9acSAndroid Build Coastguard Worker  * of this software and associated documentation files (the "Software"), to
8*1c60b9acSAndroid Build Coastguard Worker  * deal in the Software without restriction, including without limitation the
9*1c60b9acSAndroid Build Coastguard Worker  * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
10*1c60b9acSAndroid Build Coastguard Worker  * sell copies of the Software, and to permit persons to whom the Software is
11*1c60b9acSAndroid Build Coastguard Worker  * furnished to do so, subject to the following conditions:
12*1c60b9acSAndroid Build Coastguard Worker  *
13*1c60b9acSAndroid Build Coastguard Worker  * The above copyright notice and this permission notice shall be included in
14*1c60b9acSAndroid Build Coastguard Worker  * all copies or substantial portions of the Software.
15*1c60b9acSAndroid Build Coastguard Worker  *
16*1c60b9acSAndroid Build Coastguard Worker  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17*1c60b9acSAndroid Build Coastguard Worker  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18*1c60b9acSAndroid Build Coastguard Worker  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19*1c60b9acSAndroid Build Coastguard Worker  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20*1c60b9acSAndroid Build Coastguard Worker  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
21*1c60b9acSAndroid Build Coastguard Worker  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
22*1c60b9acSAndroid Build Coastguard Worker  * IN THE SOFTWARE.
23*1c60b9acSAndroid Build Coastguard Worker  */
24*1c60b9acSAndroid Build Coastguard Worker 
25*1c60b9acSAndroid Build Coastguard Worker #include "private-lib-core.h"
26*1c60b9acSAndroid Build Coastguard Worker #include "private-lib-jose-jwe.h"
27*1c60b9acSAndroid Build Coastguard Worker 
28*1c60b9acSAndroid Build Coastguard Worker int
lws_jwe_encrypt_cbc_hs(struct lws_jwe * jwe,uint8_t * cek,uint8_t * aad,int aad_len)29*1c60b9acSAndroid Build Coastguard Worker lws_jwe_encrypt_cbc_hs(struct lws_jwe *jwe, uint8_t *cek,
30*1c60b9acSAndroid Build Coastguard Worker 		       uint8_t *aad, int aad_len)
31*1c60b9acSAndroid Build Coastguard Worker {
32*1c60b9acSAndroid Build Coastguard Worker 	int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type);
33*1c60b9acSAndroid Build Coastguard Worker 	uint8_t digest[LWS_GENHASH_LARGEST];
34*1c60b9acSAndroid Build Coastguard Worker 	struct lws_gencrypto_keyelem el;
35*1c60b9acSAndroid Build Coastguard Worker 	struct lws_genhmac_ctx hmacctx;
36*1c60b9acSAndroid Build Coastguard Worker 	struct lws_genaes_ctx aesctx;
37*1c60b9acSAndroid Build Coastguard Worker 	size_t paddedlen;
38*1c60b9acSAndroid Build Coastguard Worker 	uint8_t al[8];
39*1c60b9acSAndroid Build Coastguard Worker 
40*1c60b9acSAndroid Build Coastguard Worker 	/* Caller must have prepared space for the results */
41*1c60b9acSAndroid Build Coastguard Worker 
42*1c60b9acSAndroid Build Coastguard Worker 	if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) {
43*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: expected tag len %d, got %d\n", __func__,
44*1c60b9acSAndroid Build Coastguard Worker 			    hlen / 2, jwe->jws.map.len[LJWE_ATAG]);
45*1c60b9acSAndroid Build Coastguard Worker 		return -1;
46*1c60b9acSAndroid Build Coastguard Worker 	}
47*1c60b9acSAndroid Build Coastguard Worker 
48*1c60b9acSAndroid Build Coastguard Worker 	if (jwe->jws.map.len[LJWE_IV] != 16) {
49*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("expected iv len %d, got %d\n", 16,
50*1c60b9acSAndroid Build Coastguard Worker 				jwe->jws.map.len[LJWE_IV]);
51*1c60b9acSAndroid Build Coastguard Worker 		return -1;
52*1c60b9acSAndroid Build Coastguard Worker 	}
53*1c60b9acSAndroid Build Coastguard Worker 
54*1c60b9acSAndroid Build Coastguard Worker 	/* first create the authentication hmac */
55*1c60b9acSAndroid Build Coastguard Worker 
56*1c60b9acSAndroid Build Coastguard Worker 	/* JWA Section 5.2.2.1
57*1c60b9acSAndroid Build Coastguard Worker 	 *
58*1c60b9acSAndroid Build Coastguard Worker 	 * 1.  The secondary keys MAC_KEY and ENC_KEY are generated from the
59*1c60b9acSAndroid Build Coastguard Worker 	 *     input key K as follows.  Each of these two keys is an octet
60*1c60b9acSAndroid Build Coastguard Worker 	 *     string.
61*1c60b9acSAndroid Build Coastguard Worker 	 *
62*1c60b9acSAndroid Build Coastguard Worker 	 *       MAC_KEY consists of the initial MAC_KEY_LEN octets of K, in
63*1c60b9acSAndroid Build Coastguard Worker 	 *        order.
64*1c60b9acSAndroid Build Coastguard Worker 	 *       ENC_KEY consists of the final ENC_KEY_LEN octets of K, in
65*1c60b9acSAndroid Build Coastguard Worker 	 *        order.
66*1c60b9acSAndroid Build Coastguard Worker 	 */
67*1c60b9acSAndroid Build Coastguard Worker 
68*1c60b9acSAndroid Build Coastguard Worker 	/*
69*1c60b9acSAndroid Build Coastguard Worker 	 *    2.  The IV used is a 128-bit value generated randomly or
70*1c60b9acSAndroid Build Coastguard Worker 	 *        pseudorandomly for use in the cipher.
71*1c60b9acSAndroid Build Coastguard Worker 	 */
72*1c60b9acSAndroid Build Coastguard Worker 	lws_get_random(jwe->jws.context, (void *)jwe->jws.map.buf[LJWE_IV], 16);
73*1c60b9acSAndroid Build Coastguard Worker 
74*1c60b9acSAndroid Build Coastguard Worker 	/*
75*1c60b9acSAndroid Build Coastguard Worker 	 *  3.  The plaintext is CBC encrypted using PKCS #7 padding using
76*1c60b9acSAndroid Build Coastguard Worker 	 *      ENC_KEY as the key and the IV.  We denote the ciphertext output
77*1c60b9acSAndroid Build Coastguard Worker 	 *      from this step as E.
78*1c60b9acSAndroid Build Coastguard Worker 	 */
79*1c60b9acSAndroid Build Coastguard Worker 
80*1c60b9acSAndroid Build Coastguard Worker 	/* second half is the AES ENC_KEY */
81*1c60b9acSAndroid Build Coastguard Worker 	el.buf = cek + (hlen / 2);
82*1c60b9acSAndroid Build Coastguard Worker 	el.len = (uint32_t)(hlen / 2);
83*1c60b9acSAndroid Build Coastguard Worker 
84*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genaes_create(&aesctx, LWS_GAESO_ENC, LWS_GAESM_CBC, &el,
85*1c60b9acSAndroid Build Coastguard Worker 			      LWS_GAESP_WITH_PADDING, NULL)) {
86*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: lws_genaes_create failed\n", __func__);
87*1c60b9acSAndroid Build Coastguard Worker 
88*1c60b9acSAndroid Build Coastguard Worker 		return -1;
89*1c60b9acSAndroid Build Coastguard Worker 	}
90*1c60b9acSAndroid Build Coastguard Worker 
91*1c60b9acSAndroid Build Coastguard Worker 	/*
92*1c60b9acSAndroid Build Coastguard Worker 	 * the plaintext gets delivered to us in LJWE_CTXT, this replaces the
93*1c60b9acSAndroid Build Coastguard Worker 	 * plaintext there with the ciphertext, which will be larger by some
94*1c60b9acSAndroid Build Coastguard Worker 	 * padding bytes
95*1c60b9acSAndroid Build Coastguard Worker 	 */
96*1c60b9acSAndroid Build Coastguard Worker 	n = lws_genaes_crypt(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
97*1c60b9acSAndroid Build Coastguard Worker 			     jwe->jws.map.len[LJWE_CTXT],
98*1c60b9acSAndroid Build Coastguard Worker 			     (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
99*1c60b9acSAndroid Build Coastguard Worker 			     (uint8_t *)jwe->jws.map.buf[LJWE_IV],
100*1c60b9acSAndroid Build Coastguard Worker 			     NULL, NULL, LWS_AES_CBC_BLOCKLEN);
101*1c60b9acSAndroid Build Coastguard Worker 	paddedlen = lws_gencrypto_padded_length(LWS_AES_CBC_BLOCKLEN,
102*1c60b9acSAndroid Build Coastguard Worker 						jwe->jws.map.len[LJWE_CTXT]);
103*1c60b9acSAndroid Build Coastguard Worker 	jwe->jws.map.len[LJWE_CTXT] = (uint32_t)paddedlen;
104*1c60b9acSAndroid Build Coastguard Worker 	lws_genaes_destroy(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT] +
105*1c60b9acSAndroid Build Coastguard Worker 			   paddedlen - LWS_AES_CBC_BLOCKLEN, LWS_AES_CBC_BLOCKLEN);
106*1c60b9acSAndroid Build Coastguard Worker 	if (n) {
107*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: lws_genaes_crypt failed\n", __func__);
108*1c60b9acSAndroid Build Coastguard Worker 		return -1;
109*1c60b9acSAndroid Build Coastguard Worker 	}
110*1c60b9acSAndroid Build Coastguard Worker 
111*1c60b9acSAndroid Build Coastguard Worker 	/*
112*1c60b9acSAndroid Build Coastguard Worker 	 * 4.  The octet string AL is equal to the number of bits in the
113*1c60b9acSAndroid Build Coastguard Worker 	 *     Additional Authenticated Data A expressed as a 64-bit unsigned
114*1c60b9acSAndroid Build Coastguard Worker 	 *     big-endian integer.
115*1c60b9acSAndroid Build Coastguard Worker 	 */
116*1c60b9acSAndroid Build Coastguard Worker 	lws_jwe_be64((unsigned int)aad_len * 8, al);
117*1c60b9acSAndroid Build Coastguard Worker 
118*1c60b9acSAndroid Build Coastguard Worker 	/* first half of the CEK is the MAC key */
119*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhmac_init(&hmacctx, jwe->jose.enc_alg->hmac_type,
120*1c60b9acSAndroid Build Coastguard Worker 				cek, (unsigned int)hlen / 2))
121*1c60b9acSAndroid Build Coastguard Worker 		return -1;
122*1c60b9acSAndroid Build Coastguard Worker 
123*1c60b9acSAndroid Build Coastguard Worker 	/*
124*1c60b9acSAndroid Build Coastguard Worker 	 *    5.  A message Authentication Tag T is computed by applying HMAC
125*1c60b9acSAndroid Build Coastguard Worker 	 *    [RFC2104] to the following data, in order:
126*1c60b9acSAndroid Build Coastguard Worker 	 *
127*1c60b9acSAndroid Build Coastguard Worker 	 *     - the Additional Authenticated Data A,
128*1c60b9acSAndroid Build Coastguard Worker 	 *     - the Initialization Vector IV,
129*1c60b9acSAndroid Build Coastguard Worker 	 *     - the ciphertext E computed in the previous step, and
130*1c60b9acSAndroid Build Coastguard Worker 	 *     - the octet string AL defined above.
131*1c60b9acSAndroid Build Coastguard Worker 	 *
132*1c60b9acSAndroid Build Coastguard Worker 	 *    The string MAC_KEY is used as the MAC key.  We denote the output
133*1c60b9acSAndroid Build Coastguard Worker 	 *    of the MAC computed in this step as M.  The first T_LEN octets of
134*1c60b9acSAndroid Build Coastguard Worker 	 *    M are used as T.
135*1c60b9acSAndroid Build Coastguard Worker 	 */
136*1c60b9acSAndroid Build Coastguard Worker 
137*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhmac_update(&hmacctx, aad, (unsigned int)aad_len) ||
138*1c60b9acSAndroid Build Coastguard Worker 	    lws_genhmac_update(&hmacctx, jwe->jws.map.buf[LJWE_IV],
139*1c60b9acSAndroid Build Coastguard Worker 			       LWS_JWE_AES_IV_BYTES) ||
140*1c60b9acSAndroid Build Coastguard Worker 	    /* since we encrypted it, this is the ciphertext */
141*1c60b9acSAndroid Build Coastguard Worker 	    lws_genhmac_update(&hmacctx,
142*1c60b9acSAndroid Build Coastguard Worker 			       (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
143*1c60b9acSAndroid Build Coastguard Worker 				          jwe->jws.map.len[LJWE_CTXT]) ||
144*1c60b9acSAndroid Build Coastguard Worker 	    lws_genhmac_update(&hmacctx, al, 8)) {
145*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: hmac computation failed\n", __func__);
146*1c60b9acSAndroid Build Coastguard Worker 		lws_genhmac_destroy(&hmacctx, NULL);
147*1c60b9acSAndroid Build Coastguard Worker 		return -1;
148*1c60b9acSAndroid Build Coastguard Worker 	}
149*1c60b9acSAndroid Build Coastguard Worker 
150*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhmac_destroy(&hmacctx, digest)) {
151*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: problem destroying hmac\n", __func__);
152*1c60b9acSAndroid Build Coastguard Worker 		return -1;
153*1c60b9acSAndroid Build Coastguard Worker 	}
154*1c60b9acSAndroid Build Coastguard Worker 
155*1c60b9acSAndroid Build Coastguard Worker 	/* create tag */
156*1c60b9acSAndroid Build Coastguard Worker 	memcpy((void *)jwe->jws.map.buf[LJWE_ATAG], digest, (unsigned int)hlen / 2);
157*1c60b9acSAndroid Build Coastguard Worker 
158*1c60b9acSAndroid Build Coastguard Worker 	return (int)jwe->jws.map.len[LJWE_CTXT];
159*1c60b9acSAndroid Build Coastguard Worker }
160*1c60b9acSAndroid Build Coastguard Worker 
161*1c60b9acSAndroid Build Coastguard Worker int
lws_jwe_auth_and_decrypt_cbc_hs(struct lws_jwe * jwe,uint8_t * enc_cek,uint8_t * aad,int aad_len)162*1c60b9acSAndroid Build Coastguard Worker lws_jwe_auth_and_decrypt_cbc_hs(struct lws_jwe *jwe, uint8_t *enc_cek,
163*1c60b9acSAndroid Build Coastguard Worker 				uint8_t *aad, int aad_len)
164*1c60b9acSAndroid Build Coastguard Worker {
165*1c60b9acSAndroid Build Coastguard Worker 	int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type);
166*1c60b9acSAndroid Build Coastguard Worker 	uint8_t digest[LWS_GENHASH_LARGEST];
167*1c60b9acSAndroid Build Coastguard Worker 	struct lws_gencrypto_keyelem el;
168*1c60b9acSAndroid Build Coastguard Worker 	struct lws_genhmac_ctx hmacctx;
169*1c60b9acSAndroid Build Coastguard Worker 	struct lws_genaes_ctx aesctx;
170*1c60b9acSAndroid Build Coastguard Worker 	uint8_t al[8];
171*1c60b9acSAndroid Build Coastguard Worker 
172*1c60b9acSAndroid Build Coastguard Worker 	/* Some sanity checks on what came in */
173*1c60b9acSAndroid Build Coastguard Worker 
174*1c60b9acSAndroid Build Coastguard Worker 	if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) {
175*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: expected tag len %d, got %d\n", __func__,
176*1c60b9acSAndroid Build Coastguard Worker 				hlen / 2, jwe->jws.map.len[LJWE_ATAG]);
177*1c60b9acSAndroid Build Coastguard Worker 		return -1;
178*1c60b9acSAndroid Build Coastguard Worker 	}
179*1c60b9acSAndroid Build Coastguard Worker 
180*1c60b9acSAndroid Build Coastguard Worker 	if (jwe->jws.map.len[LJWE_IV] != 16) {
181*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("expected iv len %d, got %d\n", 16,
182*1c60b9acSAndroid Build Coastguard Worker 				jwe->jws.map.len[LJWE_IV]);
183*1c60b9acSAndroid Build Coastguard Worker 		return -1;
184*1c60b9acSAndroid Build Coastguard Worker 	}
185*1c60b9acSAndroid Build Coastguard Worker 
186*1c60b9acSAndroid Build Coastguard Worker 	/* Prepare to check authentication
187*1c60b9acSAndroid Build Coastguard Worker 	 *
188*1c60b9acSAndroid Build Coastguard Worker 	 * AAD is the b64 JOSE header.
189*1c60b9acSAndroid Build Coastguard Worker 	 *
190*1c60b9acSAndroid Build Coastguard Worker 	 * The octet string AL, which is the number of bits in AAD expressed as
191*1c60b9acSAndroid Build Coastguard Worker 	 * a big-endian 64-bit unsigned integer is:
192*1c60b9acSAndroid Build Coastguard Worker 	 *
193*1c60b9acSAndroid Build Coastguard Worker 	 * [0, 0, 0, 0, 0, 0, 1, 152]
194*1c60b9acSAndroid Build Coastguard Worker 	 *
195*1c60b9acSAndroid Build Coastguard Worker 	 * Concatenate the AAD, the Initialization Vector, the ciphertext, and
196*1c60b9acSAndroid Build Coastguard Worker 	 * the AL value.
197*1c60b9acSAndroid Build Coastguard Worker 	 *
198*1c60b9acSAndroid Build Coastguard Worker 	 */
199*1c60b9acSAndroid Build Coastguard Worker 
200*1c60b9acSAndroid Build Coastguard Worker 	lws_jwe_be64((unsigned int)aad_len * 8, al);
201*1c60b9acSAndroid Build Coastguard Worker 
202*1c60b9acSAndroid Build Coastguard Worker 	/* first half of enc_cek is the MAC key */
203*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhmac_init(&hmacctx, jwe->jose.enc_alg->hmac_type, enc_cek,
204*1c60b9acSAndroid Build Coastguard Worker 			     (unsigned int)hlen / 2)) {
205*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: lws_genhmac_init fail\n", __func__);
206*1c60b9acSAndroid Build Coastguard Worker 		return -1;
207*1c60b9acSAndroid Build Coastguard Worker 	}
208*1c60b9acSAndroid Build Coastguard Worker 
209*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhmac_update(&hmacctx, aad, (unsigned int)aad_len) ||
210*1c60b9acSAndroid Build Coastguard Worker 	    lws_genhmac_update(&hmacctx, (uint8_t *)jwe->jws.map.buf[LJWE_IV],
211*1c60b9acSAndroid Build Coastguard Worker 					 jwe->jws.map.len[LJWE_IV]) ||
212*1c60b9acSAndroid Build Coastguard Worker 	    lws_genhmac_update(&hmacctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
213*1c60b9acSAndroid Build Coastguard Worker 				         jwe->jws.map.len[LJWE_CTXT]) ||
214*1c60b9acSAndroid Build Coastguard Worker 	    lws_genhmac_update(&hmacctx, al, 8)) {
215*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: hmac computation failed\n", __func__);
216*1c60b9acSAndroid Build Coastguard Worker 		lws_genhmac_destroy(&hmacctx, NULL);
217*1c60b9acSAndroid Build Coastguard Worker 		return -1;
218*1c60b9acSAndroid Build Coastguard Worker 	}
219*1c60b9acSAndroid Build Coastguard Worker 
220*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhmac_destroy(&hmacctx, digest)) {
221*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: problem destroying hmac\n", __func__);
222*1c60b9acSAndroid Build Coastguard Worker 		return -1;
223*1c60b9acSAndroid Build Coastguard Worker 	}
224*1c60b9acSAndroid Build Coastguard Worker 
225*1c60b9acSAndroid Build Coastguard Worker 	/* first half of digest is the auth tag */
226*1c60b9acSAndroid Build Coastguard Worker 
227*1c60b9acSAndroid Build Coastguard Worker 	if (lws_timingsafe_bcmp(digest, jwe->jws.map.buf[LJWE_ATAG], (unsigned int)hlen / 2)) {
228*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: auth failed: hmac tag (%d) != ATAG (%d)\n",
229*1c60b9acSAndroid Build Coastguard Worker 			 __func__, hlen / 2, jwe->jws.map.len[LJWE_ATAG]);
230*1c60b9acSAndroid Build Coastguard Worker 		lwsl_hexdump_notice(jwe->jws.map.buf[LJWE_ATAG], (unsigned int)hlen / 2);
231*1c60b9acSAndroid Build Coastguard Worker 		lwsl_hexdump_notice(digest, (unsigned int)hlen / 2);
232*1c60b9acSAndroid Build Coastguard Worker 		return -1;
233*1c60b9acSAndroid Build Coastguard Worker 	}
234*1c60b9acSAndroid Build Coastguard Worker 
235*1c60b9acSAndroid Build Coastguard Worker 	/* second half of enc cek is the CEK KEY */
236*1c60b9acSAndroid Build Coastguard Worker 	el.buf = enc_cek + (hlen / 2);
237*1c60b9acSAndroid Build Coastguard Worker 	el.len = (unsigned int)hlen / 2;
238*1c60b9acSAndroid Build Coastguard Worker 
239*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genaes_create(&aesctx, LWS_GAESO_DEC, LWS_GAESM_CBC,
240*1c60b9acSAndroid Build Coastguard Worker 			      &el, LWS_GAESP_NO_PADDING, NULL)) {
241*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: lws_genaes_create failed\n", __func__);
242*1c60b9acSAndroid Build Coastguard Worker 
243*1c60b9acSAndroid Build Coastguard Worker 		return -1;
244*1c60b9acSAndroid Build Coastguard Worker 	}
245*1c60b9acSAndroid Build Coastguard Worker 
246*1c60b9acSAndroid Build Coastguard Worker 	n = lws_genaes_crypt(&aesctx, (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
247*1c60b9acSAndroid Build Coastguard Worker 			     jwe->jws.map.len[LJWE_CTXT],
248*1c60b9acSAndroid Build Coastguard Worker 			     (uint8_t *)jwe->jws.map.buf[LJWE_CTXT],
249*1c60b9acSAndroid Build Coastguard Worker 			     (uint8_t *)jwe->jws.map.buf[LJWE_IV], NULL, NULL, 16);
250*1c60b9acSAndroid Build Coastguard Worker 
251*1c60b9acSAndroid Build Coastguard Worker 	/* Strip the PKCS #7 padding */
252*1c60b9acSAndroid Build Coastguard Worker 
253*1c60b9acSAndroid Build Coastguard Worker 	if (jwe->jws.map.len[LJWE_CTXT] < LWS_AES_CBC_BLOCKLEN ||
254*1c60b9acSAndroid Build Coastguard Worker 	    jwe->jws.map.len[LJWE_CTXT] <= (unsigned char)jwe->jws.map.buf[LJWE_CTXT]
255*1c60b9acSAndroid Build Coastguard Worker 						[jwe->jws.map.len[LJWE_CTXT] - 1]) {
256*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: invalid padded ciphertext length: %d. Corrupt data?\n",
257*1c60b9acSAndroid Build Coastguard Worker 				__func__, jwe->jws.map.len[LJWE_CTXT]);
258*1c60b9acSAndroid Build Coastguard Worker 		return -1;
259*1c60b9acSAndroid Build Coastguard Worker 	}
260*1c60b9acSAndroid Build Coastguard Worker 	jwe->jws.map.len[LJWE_CTXT] = (uint32_t)((int)jwe->jws.map.len[LJWE_CTXT] -
261*1c60b9acSAndroid Build Coastguard Worker 		jwe->jws.map.buf[LJWE_CTXT][jwe->jws.map.len[LJWE_CTXT] - 1]);
262*1c60b9acSAndroid Build Coastguard Worker 
263*1c60b9acSAndroid Build Coastguard Worker 	n |= lws_genaes_destroy(&aesctx, NULL, 0);
264*1c60b9acSAndroid Build Coastguard Worker 	if (n) {
265*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: lws_genaes_crypt failed\n", __func__);
266*1c60b9acSAndroid Build Coastguard Worker 		return -1;
267*1c60b9acSAndroid Build Coastguard Worker 	}
268*1c60b9acSAndroid Build Coastguard Worker 
269*1c60b9acSAndroid Build Coastguard Worker 	return (int)jwe->jws.map.len[LJWE_CTXT];
270*1c60b9acSAndroid Build Coastguard Worker }
271*1c60b9acSAndroid Build Coastguard Worker 
272