Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Support CFB mode for AES #575

Closed
mariusknaust opened this issue Nov 1, 2024 · 2 comments · Fixed by #585
Closed

[Feature Request] Support CFB mode for AES #575

mariusknaust opened this issue Nov 1, 2024 · 2 comments · Fixed by #585
Assignees
Labels
enhancement New feature or request

Comments

@mariusknaust
Copy link

Problem:

The TPM2 specification Part 1: Architecture 24.4 Symmetric Encrypt requires the use of an AES 128 bit key using CFB mode. Currently CFB mode is not exposed in aws-ls-rs which blocks us from using it for the particular use case.

Requirements:

  • Encryption using an AES 128 bit key with CFB mode
  • The IV vector needs to be configurable (in the use case it will be set to all zero)
@darylmartin100 darylmartin100 added the enhancement New feature or request label Nov 1, 2024
@skmcgrail skmcgrail self-assigned this Nov 5, 2024
@skmcgrail
Copy link
Member

Hey @mariusknaust

Can you confirm what bit-mode of CFB you need? I tried looking in the TPM2 specification but did not see it explicitly state the bit-mode in use. Typically that implies CFB 128-bit mode, but just want to double check. AWS-LC supports 1, 8, and 128 bit-modes for CFB, but want to confirm what you need to make sure we are able to provide it.

Thanks

@mariusknaust
Copy link
Author

Hi @skmcgrail,

thanks for picking this up. For the TPM2 use case we need to use AES for a 128 bit key in CFB mode with 128-bit shift (what would be EVP_aes_128_cfb128 in OpenSSL).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants