fuzz coverage

Coverage Report

Created: 2025-06-01 19:34

/Users/eugenesiegel/btc/bitcoin/src/crypto/aes.cpp
Line
Count
Source (jump to first uncovered line)
1
// Copyright (c) 2016-2019 The Bitcoin Core developers
2
// Distributed under the MIT software license, see the accompanying
3
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5
#include <crypto/aes.h>
6
7
#include <string.h>
8
9
extern "C" {
10
#include <crypto/ctaes/ctaes.c>
11
}
12
13
AES256Encrypt::AES256Encrypt(const unsigned char key[32])
14
0
{
15
0
    AES256_init(&ctx, key);
16
0
}
17
18
AES256Encrypt::~AES256Encrypt()
19
0
{
20
0
    memset(&ctx, 0, sizeof(ctx));
21
0
}
22
23
void AES256Encrypt::Encrypt(unsigned char ciphertext[16], const unsigned char plaintext[16]) const
24
0
{
25
0
    AES256_encrypt(&ctx, 1, ciphertext, plaintext);
26
0
}
27
28
AES256Decrypt::AES256Decrypt(const unsigned char key[32])
29
0
{
30
0
    AES256_init(&ctx, key);
31
0
}
32
33
AES256Decrypt::~AES256Decrypt()
34
0
{
35
0
    memset(&ctx, 0, sizeof(ctx));
36
0
}
37
38
void AES256Decrypt::Decrypt(unsigned char plaintext[16], const unsigned char ciphertext[16]) const
39
0
{
40
0
    AES256_decrypt(&ctx, 1, plaintext, ciphertext);
41
0
}
42
43
44
template <typename T>
45
static int CBCEncrypt(const T& enc, const unsigned char iv[AES_BLOCKSIZE], const unsigned char* data, int size, bool pad, unsigned char* out)
46
0
{
47
0
    int written = 0;
48
0
    int padsize = size % AES_BLOCKSIZE;
49
0
    unsigned char mixed[AES_BLOCKSIZE];
50
51
0
    if (!data || !size || !out)
52
0
        return 0;
53
54
0
    if (!pad && padsize != 0)
55
0
        return 0;
56
57
0
    memcpy(mixed, iv, AES_BLOCKSIZE);
58
59
    // Write all but the last block
60
0
    while (written + AES_BLOCKSIZE <= size) {
61
0
        for (int i = 0; i != AES_BLOCKSIZE; i++)
62
0
            mixed[i] ^= *data++;
63
0
        enc.Encrypt(out + written, mixed);
64
0
        memcpy(mixed, out + written, AES_BLOCKSIZE);
65
0
        written += AES_BLOCKSIZE;
66
0
    }
67
0
    if (pad) {
68
        // For all that remains, pad each byte with the value of the remaining
69
        // space. If there is none, pad by a full block.
70
0
        for (int i = 0; i != padsize; i++)
71
0
            mixed[i] ^= *data++;
72
0
        for (int i = padsize; i != AES_BLOCKSIZE; i++)
73
0
            mixed[i] ^= AES_BLOCKSIZE - padsize;
74
0
        enc.Encrypt(out + written, mixed);
75
0
        written += AES_BLOCKSIZE;
76
0
    }
77
0
    return written;
78
0
}
79
80
template <typename T>
81
static int CBCDecrypt(const T& dec, const unsigned char iv[AES_BLOCKSIZE], const unsigned char* data, int size, bool pad, unsigned char* out)
82
0
{
83
0
    int written = 0;
84
0
    bool fail = false;
85
0
    const unsigned char* prev = iv;
86
87
0
    if (!data || !size || !out)
88
0
        return 0;
89
90
0
    if (size % AES_BLOCKSIZE != 0)
91
0
        return 0;
92
93
    // Decrypt all data. Padding will be checked in the output.
94
0
    while (written != size) {
95
0
        dec.Decrypt(out, data + written);
96
0
        for (int i = 0; i != AES_BLOCKSIZE; i++)
97
0
            *out++ ^= prev[i];
98
0
        prev = data + written;
99
0
        written += AES_BLOCKSIZE;
100
0
    }
101
102
    // When decrypting padding, attempt to run in constant-time
103
0
    if (pad) {
104
        // If used, padding size is the value of the last decrypted byte. For
105
        // it to be valid, It must be between 1 and AES_BLOCKSIZE.
106
0
        unsigned char padsize = *--out;
107
0
        fail = !padsize | (padsize > AES_BLOCKSIZE);
108
109
        // If not well-formed, treat it as though there's no padding.
110
0
        padsize *= !fail;
111
112
        // All padding must equal the last byte otherwise it's not well-formed
113
0
        for (int i = AES_BLOCKSIZE; i != 0; i--)
114
0
            fail |= ((i > AES_BLOCKSIZE - padsize) & (*out-- != padsize));
115
116
0
        written -= padsize;
117
0
    }
118
0
    return written * !fail;
119
0
}
120
121
AES256CBCEncrypt::AES256CBCEncrypt(const unsigned char key[AES256_KEYSIZE], const unsigned char ivIn[AES_BLOCKSIZE], bool padIn)
122
0
    : enc(key), pad(padIn)
123
0
{
124
0
    memcpy(iv, ivIn, AES_BLOCKSIZE);
125
0
}
126
127
int AES256CBCEncrypt::Encrypt(const unsigned char* data, int size, unsigned char* out) const
128
0
{
129
0
    return CBCEncrypt(enc, iv, data, size, pad, out);
130
0
}
131
132
AES256CBCEncrypt::~AES256CBCEncrypt()
133
0
{
134
0
    memset(iv, 0, sizeof(iv));
135
0
}
136
137
AES256CBCDecrypt::AES256CBCDecrypt(const unsigned char key[AES256_KEYSIZE], const unsigned char ivIn[AES_BLOCKSIZE], bool padIn)
138
0
    : dec(key), pad(padIn)
139
0
{
140
0
    memcpy(iv, ivIn, AES_BLOCKSIZE);
141
0
}
142
143
144
int AES256CBCDecrypt::Decrypt(const unsigned char* data, int size, unsigned char* out) const
145
0
{
146
0
    return CBCDecrypt(dec, iv, data, size, pad, out);
147
0
}
148
149
AES256CBCDecrypt::~AES256CBCDecrypt()
150
0
{
151
0
    memset(iv, 0, sizeof(iv));
152
0
}