This forum uses cookies
This forum makes use of cookies to store your login information if you are registered, and your last visit if you are not. Cookies are small text documents stored on your computer; the cookies set by this forum can only be used on this website and pose no security risk. Cookies on this forum also track the specific topics you have read and when you last read them. Please confirm that you accept these cookies being set.

Rijndael 128 decrypting?
#1
Hello,

Would it be possible to add the libmcrypt library to LM?

I need to decode Rijndael 128 encrypted strings, which cannot be done in my case with the available libraries.
in some cases AES256 could be used if the key was 256bits long, but it is not the case here.

I found a proper lua library to do it, but unfortunately the required lib is missing from the system.

Here is the code I plan to use (from the same author as the one for aes from another thread).
I made a few changes to the code to hopefully make it work on the system.
Code:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180
--[[     12:24 2015/9/30      lilien ]] local ffi = require 'ffi' local ffi_new = ffi.new local ffi_str = ffi.string local ffi_copy = ffi.copy local setmetatable = setmetatable local _M = { } local mt = { __index = _M } ffi.cdef[[ struct CRYPT_STREAM; typedef struct CRYPT_STREAM *MCRYPT; MCRYPT mcrypt_module_open(char *algorithm,                          char *a_directory, char *mode,                          char *m_directory); int mcrypt_generic_init(const MCRYPT td, void *key, int lenofkey,                        void *IV); void free(void *ptr); void mcrypt_free(void *ptr); int mcrypt_enc_get_key_size(const MCRYPT td); int mcrypt_enc_get_supported_key_sizes(const MCRYPT td, int* len); int mcrypt_generic_deinit(const MCRYPT td); int mcrypt_generic_end(const MCRYPT td); int mdecrypt_generic(MCRYPT td, void *plaintext, int len); int mcrypt_generic(MCRYPT td, void *plaintext, int len); int mcrypt_module_close(MCRYPT td); int mcrypt_enc_mode_has_iv(MCRYPT td); int mcrypt_enc_get_iv_size(MCRYPT td); int mcrypt_enc_is_block_mode(MCRYPT td); int mcrypt_enc_get_block_size(MCRYPT td); ]] local mcrypt = '/usr/lib/libmcrypt.so' if not io.exists(mcrypt) then      mcrypt = '/usr/lib/libmcrypt.so.4' end ffi.load(mcrypt, true) _M.new = function (self)    local cipher = 'rijndael-128'    local mode = 'ecb'    local c_cipher     =    ffi_new("char[?]",#cipher+1, cipher)    local c_mode     =    ffi_new("char[4]", mode)    local td = mcrypt.mcrypt_module_open(c_cipher, nil, c_mode, nil)    return setmetatable( { _td = td }, mt ) end _M.pass = function (self, key, raw,enc_or_dec)         local dencrypt    = enc_or_dec    local iv_len = 8    local cipher = 'rijndael-128'    local mode = 'ecb'    local c_cipher     =    ffi_new("char[?]",#cipher+1, cipher)    local c_mode     =    ffi_new("char[4]", mode)         local td = mcrypt.mcrypt_module_open(c_cipher, nil, c_mode, nil)         if  td ==0  then             ngx.log(ngx.ERR , "mcrypt_module_open failed")             return nil         end    local iv_key =    "1234567890123456";         local key_len=  #key;         local data_len=  #raw;         local block_size, max_key_length, use_key_length, i, count, iv_size;         --/* Checking for key-length */         max_key_length = mcrypt.mcrypt_enc_get_key_size(td);         if  key_len > max_key_length  then             ngx.log(ngx.ERR , "Size of key is too large for this algorithm key_len:",key_len,",max_key:",max_key_length)             return nil         end         count     =    ffi_new("int[1]")         local key_size_tmp = mcrypt.mcrypt_enc_get_supported_key_sizes(td, count);         local key_length_sizes = ffi.cast("int *",key_size_tmp)         local key_s    =    nil;         if count[0] == 0 and key_length_sizes == nil then --/* all lengths 1 - k_l_s = OK */             use_key_length = key_len;             key_s = ffi_new("unsigned char[?]",use_key_length,key)         end     if  count[0] == 1 then         key_s = ffi_new("char[?]",key_length_sizes[0])         ffi.fill(key_s ,use_key_length,0);         ffi.copy(key_s, key, math.min(key_len, key_length_sizes[0]));         use_key_length = key_length_sizes[0];      else         use_key_length = max_key_length;         for i=0,count[0]-1 do             if  key_length_sizes[i] >= key_len and    key_length_sizes[i] < use_key_length then                 use_key_length = key_length_sizes[i];             end         end         key_s = ffi_new("char[?]",use_key_length)         ffi.copy(key_s ,key, math.min(key_len,use_key_length));     end     if key_length_sizes~=nil then         mcrypt.mcrypt_free(key_length_sizes);     end     local iv_s = nil;     local  iv_size = mcrypt.mcrypt_enc_get_iv_size (td);     local has_iv = mcrypt.mcrypt_enc_mode_has_iv(td) ;     local data_size    =    0;     local block = mcrypt.mcrypt_enc_is_block_mode(td);     if  block == 1 then         block_size =    mcrypt.mcrypt_enc_get_block_size(td);         data_size = math.floor(((data_len - 1) / block_size) + 1) * block_size;     else         data_size = data_len;     end     local data_s = ffi_new("char[?]",data_size)     ffi.fill(data_s ,data_size,0);     ffi.copy(data_s ,raw ,data_len);     local ini_ret = mcrypt.mcrypt_generic_init(td, key_s, use_key_length, c_iv)     if ini_ret < 0 then         ngx.log(ngx.ERR , "Mcrypt initialisation failed");         ngx.say(  ini_ret,"ini_ret initialisation failed");         return nil     end     if  dencrypt == 1 then         mcrypt.mcrypt_generic(td, data_s, data_size);     else         mcrypt.mdecrypt_generic(td, data_s, data_size);     end     local ret_str = ffi_str(data_s,data_size);     mcrypt.mcrypt_generic_end(td);     return ret_str end _M.encrypt = function (self, key, raw)     return _M.pass(self, key, raw,1); end _M.decrypt = function(self, key, raw)     return _M.pass(self, key, raw,0); end _M.close = function(self)    local td = self._td    if td then        mcrypt.mcrypt_module_close(td)     end end return _M

Regards.
Michel.
Reply
#2
Rijndael is the same as AES if 128 bit block/key is used.
Reply
#3
Hi Admin,

Yes I found out that it can actually be decoded with AES256, but not with the lua aes library that was shared on this forum.
Rijndael 128 is actually AES with a 256bits key size.

There must be something wrong in aes library because it can encrypt and decrypt itself fine, but it cannot decode my strings properly, and it does not encode the same way either.
I have tried many different combinations, and it never produces the same result as you would get from other tools.

Some issues about this were opened in Github, but with not much success it seems.
I think someone rewrote part of the code to solve the problem, but I am not sure it can be implemented on LM.

The original php code does this:
Code:
1
$decrypt = (mcrypt_decrypt( MCRYPT_RIJNDAEL_128, km200_crypt_key_private, base64_decode($decryptData), MCRYPT_MODE_ECB, '' ) );

I came up with this code that is supposed to do the same thing:
Code:
123
local ctx = aes:new(km200_crypt_key_private, nil, aes.cipher(256,"ecb"))   local res = ctx:decrypt(encdec.base64dec(decryptData)) log ('decryptedData: ', res)
But that does not give any results if I try to decode something that is known to work.
Here is an example. 
The following code should give me {"id":"/system/brand","type":"stringValue","writeable":0,"recordable":0,"value":"Buderus"}
But the result is nil.
And if you run the input and key in any online decryption tools, it works fine.

Code:
1234567891011121314151617181920212223242526272829303132333435
encrypteddata = '88a2296d072f83992af086fd293aefa4090acb9e6e8790844fdea4ab3a8604b5ab8871ba73614c8885ebaf434cc6bef54e8eed26f980586525a59b585e69f3fc03c8fcf28bb1648cb0b06e404a8deb719067791d14e339797174eb7dddb1a277' key = '4aca89d6389f79303e2b58a0370cd7f7f8f1d560e45c66c0634862c184ddbaf7' --base64 private key: SsqJ1jifeTA+K1igNwzX9/jx1WDkXGbAY0hiwYTduvc= --hex private key: 4aca89d6389f79303e2b58a0370cd7f7f8f1d560e45c66c0634862c184ddbaf7 --base64 encrypted string: iKIpbQcvg5kq8Ib9KTrvpAkKy55uh5CET96kqzqGBLWriHG6c2FMiIXrr0NMxr71To7tJvmAWGUlpZtYXmnz/API/PKLsWSMsLBuQEqN63GQZ3kdFOM5eXF0633dsaJ3 --hex encrypted string: 88a2296d072f83992af086fd293aefa4090acb9e6e8790844fdea4ab3a8604b5ab8871ba73614c8885ebaf434cc6bef54e8eed26f980586525a59b585e69f3fc03c8fcf28bb1648cb0b06e404a8deb719067791d14e339797174eb7dddb1a277 --results: {"id":"/system/brand","type":"stringValue","writeable":0,"recordable":0,"value":"Buderus"} function string.fromhex(str)    return (str:gsub('..', function (cc)        return string.char(tonumber(cc, 16))    end)) end function string.tohex(str)    return (str:gsub('.', function (c)        return string.format('%02X', string.byte(c))    end)) end aes = require('user.aes') encdec = require ('encdec') km200_crypt_key_private = string.fromhex(key) log(encdec.base64enc(km200_crypt_key_private)) decryptData = string.fromhex(encrypteddata) log(encdec.base64enc(decryptData))   local ctx = aes:new(km200_crypt_key_private, nil, aes.cipher(256,"ecb")) local res = ctx:decrypt(decryptData) log ('decryptData: ', res)

user.aes is the library that was shared in the thread https://forum.logicmachine.net/showthread.php?tid=1643[url=https://forum.logicmachine.net/showthread.php?tid=1643][/url]
I am open to any suggestions. Smile
Regards.
Michel.
Reply
#4
There are two issues here that cause data errors:
1. aes.lua hashes the secret key
2. PHP uses different padding for secret key and data.

Solution:
1. Use this aes library which supports turning off padding: https://github.com/openresty/lua-resty-s...ty/aes.lua
2. Add library loading as mentioned in this post: https://forum.logicmachine.net/showthrea...7#pid10237

Working example for decrypt:
Code:
12345678910111213141516171819202122
function pad(str, bits)   local bytes = bits / 8   local rem = #str % bytes   if rem > 0 then     str = str .. string.rep('\0', bytes - rem)   end   return str end encdec = require('encdec') aes = require('aes') key = encdec.base64dec('SsqJ1jifeTA+K1igNwzX9/jx1WDkXGbAY0hiwYTduvc=') data = encdec.base64dec('iKIpbQcvg5kq8Ib9KTrvpAkKy55uh5CET96kqzqGBLWriHG6c2FMiIXrr0NMxr71To7tJvmAWGUlpZtYXmnz/API/PKLsWSMsLBuQEqN63GQZ3kdFOM5eXF0633dsaJ3') hash = { iv = string.rep('\0', 16) } -- no hashing method for key aes_256_ecb, err = aes:new(pad(key, 256), nil, aes.cipher(256, 'ecb'), hash, nil, 0) res = aes_256_ecb:decrypt(pad(data, 128)) -- data block size is always 128 bits log(res)
Reply
#5
Great! 
It was the hashing of the key that was the issue, and the fact that it does one round of md5 by default when you don't fill in all the parameters.

Padding was not required because the key is 256bits long (two md5 hashes concatenated), and the output is already coming from AES and as such should be the proper length. It will however come very handy when I start to send commands.

Thanks a lot for your help!  Smile
Reply


Forum Jump: