xform_aes_icm.c 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. /* $OpenBSD: xform.c,v 1.16 2001/08/28 12:20:43 ben Exp $ */
  2. /*-
  3. * The authors of this code are John Ioannidis (ji@tla.org),
  4. * Angelos D. Keromytis (kermit@csd.uch.gr),
  5. * Niels Provos (provos@physnet.uni-hamburg.de) and
  6. * Damien Miller (djm@mindrot.org).
  7. *
  8. * This code was written by John Ioannidis for BSD/OS in Athens, Greece,
  9. * in November 1995.
  10. *
  11. * Ported to OpenBSD and NetBSD, with additional transforms, in December 1996,
  12. * by Angelos D. Keromytis.
  13. *
  14. * Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis
  15. * and Niels Provos.
  16. *
  17. * Additional features in 1999 by Angelos D. Keromytis.
  18. *
  19. * AES XTS implementation in 2008 by Damien Miller
  20. *
  21. * Copyright (C) 1995, 1996, 1997, 1998, 1999 by John Ioannidis,
  22. * Angelos D. Keromytis and Niels Provos.
  23. *
  24. * Copyright (C) 2001, Angelos D. Keromytis.
  25. *
  26. * Copyright (C) 2008, Damien Miller
  27. * Copyright (c) 2014 The FreeBSD Foundation
  28. * All rights reserved.
  29. *
  30. * Portions of this software were developed by John-Mark Gurney
  31. * under sponsorship of the FreeBSD Foundation and
  32. * Rubicon Communications, LLC (Netgate).
  33. *
  34. * Permission to use, copy, and modify this software with or without fee
  35. * is hereby granted, provided that this entire notice is included in
  36. * all copies of any software which is or includes a copy or
  37. * modification of this software.
  38. * You may use this code under the GNU public license if you so wish. Please
  39. * contribute changes back to the authors under this freer than GPL license
  40. * so that we may further the use of strong encryption without limitations to
  41. * all.
  42. *
  43. * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR
  44. * IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY
  45. * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
  46. * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
  47. * PURPOSE.
  48. */
  49. #include <sys/cdefs.h>
  50. __FBSDID("$FreeBSD$");
  51. #include <opencrypto/xform_enc.h>
  52. static int aes_icm_setkey(void *, const uint8_t *, int);
  53. static void aes_icm_crypt(void *, const uint8_t *, uint8_t *);
  54. static void aes_icm_crypt_last(void *, const uint8_t *, uint8_t *, size_t);
  55. static void aes_icm_reinit(void *, const uint8_t *);
  56. static void aes_gcm_reinit(void *, const uint8_t *);
  57. static void aes_ccm_reinit(void *, const uint8_t *);
  58. /* Encryption instances */
  59. struct enc_xform enc_xform_aes_icm = {
  60. .type = CRYPTO_AES_ICM,
  61. .name = "AES-ICM",
  62. .ctxsize = sizeof(struct aes_icm_ctx),
  63. .blocksize = 1,
  64. .native_blocksize = AES_BLOCK_LEN,
  65. .ivsize = AES_BLOCK_LEN,
  66. .minkey = AES_MIN_KEY,
  67. .maxkey = AES_MAX_KEY,
  68. .encrypt = aes_icm_crypt,
  69. .decrypt = aes_icm_crypt,
  70. .setkey = aes_icm_setkey,
  71. .reinit = aes_icm_reinit,
  72. .encrypt_last = aes_icm_crypt_last,
  73. .decrypt_last = aes_icm_crypt_last,
  74. };
  75. struct enc_xform enc_xform_aes_nist_gcm = {
  76. .type = CRYPTO_AES_NIST_GCM_16,
  77. .name = "AES-GCM",
  78. .ctxsize = sizeof(struct aes_icm_ctx),
  79. .blocksize = 1,
  80. .native_blocksize = AES_BLOCK_LEN,
  81. .ivsize = AES_GCM_IV_LEN,
  82. .minkey = AES_MIN_KEY,
  83. .maxkey = AES_MAX_KEY,
  84. .encrypt = aes_icm_crypt,
  85. .decrypt = aes_icm_crypt,
  86. .setkey = aes_icm_setkey,
  87. .reinit = aes_gcm_reinit,
  88. .encrypt_last = aes_icm_crypt_last,
  89. .decrypt_last = aes_icm_crypt_last,
  90. };
  91. struct enc_xform enc_xform_ccm = {
  92. .type = CRYPTO_AES_CCM_16,
  93. .name = "AES-CCM",
  94. .ctxsize = sizeof(struct aes_icm_ctx),
  95. .blocksize = 1,
  96. .native_blocksize = AES_BLOCK_LEN,
  97. .ivsize = AES_CCM_IV_LEN,
  98. .minkey = AES_MIN_KEY, .maxkey = AES_MAX_KEY,
  99. .encrypt = aes_icm_crypt,
  100. .decrypt = aes_icm_crypt,
  101. .setkey = aes_icm_setkey,
  102. .reinit = aes_ccm_reinit,
  103. .encrypt_last = aes_icm_crypt_last,
  104. .decrypt_last = aes_icm_crypt_last,
  105. };
  106. /*
  107. * Encryption wrapper routines.
  108. */
  109. static void
  110. aes_icm_reinit(void *key, const uint8_t *iv)
  111. {
  112. struct aes_icm_ctx *ctx;
  113. ctx = key;
  114. bcopy(iv, ctx->ac_block, AESICM_BLOCKSIZE);
  115. }
  116. static void
  117. aes_gcm_reinit(void *key, const uint8_t *iv)
  118. {
  119. struct aes_icm_ctx *ctx;
  120. aes_icm_reinit(key, iv);
  121. ctx = key;
  122. /* GCM starts with 2 as counter 1 is used for final xor of tag. */
  123. bzero(&ctx->ac_block[AESICM_BLOCKSIZE - 4], 4);
  124. ctx->ac_block[AESICM_BLOCKSIZE - 1] = 2;
  125. }
  126. static void
  127. aes_ccm_reinit(void *key, const uint8_t *iv)
  128. {
  129. struct aes_icm_ctx *ctx;
  130. ctx = key;
  131. /* CCM has flags, then the IV, then the counter, which starts at 1 */
  132. bzero(ctx->ac_block, sizeof(ctx->ac_block));
  133. /* 3 bytes for length field; this gives a nonce of 12 bytes */
  134. ctx->ac_block[0] = (15 - AES_CCM_IV_LEN) - 1;
  135. bcopy(iv, ctx->ac_block+1, AES_CCM_IV_LEN);
  136. ctx->ac_block[AESICM_BLOCKSIZE - 1] = 1;
  137. }
  138. static void
  139. aes_icm_crypt(void *key, const uint8_t *in, uint8_t *out)
  140. {
  141. struct aes_icm_ctx *ctx;
  142. int i;
  143. ctx = key;
  144. aes_icm_crypt_last(key, in, out, AESICM_BLOCKSIZE);
  145. /* increment counter */
  146. for (i = AESICM_BLOCKSIZE - 1;
  147. i >= 0; i--)
  148. if (++ctx->ac_block[i]) /* continue on overflow */
  149. break;
  150. }
  151. static void
  152. aes_icm_crypt_last(void *key, const uint8_t *in, uint8_t *out, size_t len)
  153. {
  154. struct aes_icm_ctx *ctx;
  155. uint8_t keystream[AESICM_BLOCKSIZE];
  156. int i;
  157. ctx = key;
  158. rijndaelEncrypt(ctx->ac_ek, ctx->ac_nr, ctx->ac_block, keystream);
  159. for (i = 0; i < len; i++)
  160. out[i] = in[i] ^ keystream[i];
  161. explicit_bzero(keystream, sizeof(keystream));
  162. }
  163. static int
  164. aes_icm_setkey(void *sched, const uint8_t *key, int len)
  165. {
  166. struct aes_icm_ctx *ctx;
  167. if (len != 16 && len != 24 && len != 32)
  168. return (EINVAL);
  169. ctx = sched;
  170. ctx->ac_nr = rijndaelKeySetupEnc(ctx->ac_ek, key, len * 8);
  171. return (0);
  172. }