|
Packit |
fd8b60 |
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
|
|
Packit |
fd8b60 |
/* lib/crypto/openssl/enc_provider/camellia.c */
|
|
Packit |
fd8b60 |
/*
|
|
Packit |
fd8b60 |
* Copyright (C) 2003, 2007, 2008, 2009, 2010 by the Massachusetts Institute of
|
|
Packit |
fd8b60 |
* Technology. All rights reserved.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* Export of this software from the United States of America may
|
|
Packit |
fd8b60 |
* require a specific license from the United States Government.
|
|
Packit |
fd8b60 |
* It is the responsibility of any person or organization contemplating
|
|
Packit |
fd8b60 |
* export to obtain such a license before exporting.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
|
|
Packit |
fd8b60 |
* distribute this software and its documentation for any purpose and
|
|
Packit |
fd8b60 |
* without fee is hereby granted, provided that the above copyright
|
|
Packit |
fd8b60 |
* notice appear in all copies and that both that copyright notice and
|
|
Packit |
fd8b60 |
* this permission notice appear in supporting documentation, and that
|
|
Packit |
fd8b60 |
* the name of M.I.T. not be used in advertising or publicity pertaining
|
|
Packit |
fd8b60 |
* to distribution of the software without specific, written prior
|
|
Packit |
fd8b60 |
* permission. Furthermore if you modify this software you must label
|
|
Packit |
fd8b60 |
* your software as modified software and not distribute it in such a
|
|
Packit |
fd8b60 |
* fashion that it might be confused with the original M.I.T. software.
|
|
Packit |
fd8b60 |
* M.I.T. makes no representations about the suitability of
|
|
Packit |
fd8b60 |
* this software for any purpose. It is provided "as is" without express
|
|
Packit |
fd8b60 |
* or implied warranty.
|
|
Packit |
fd8b60 |
*/
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#include "crypto_int.h"
|
|
Packit |
fd8b60 |
#include <openssl/evp.h>
|
|
Packit |
fd8b60 |
#include <openssl/camellia.h>
|
|
Packit |
fd8b60 |
#include <openssl/modes.h>
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cbc_enc(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data);
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cbc_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data);
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cts_encr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data, size_t dlen);
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cts_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data, size_t dlen);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#define BLOCK_SIZE 16
|
|
Packit |
fd8b60 |
#define NUM_BITS 8
|
|
Packit |
fd8b60 |
#define IV_CTS_BUF_SIZE 16 /* 16 - hardcoded in CRYPTO_cts128_en/decrypt */
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static void
|
|
Packit |
fd8b60 |
xorblock(unsigned char *out, const unsigned char *in)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
int z;
|
|
Packit |
fd8b60 |
for (z = 0; z < CAMELLIA_BLOCK_SIZE / 4; z++) {
|
|
Packit |
fd8b60 |
unsigned char *outptr = &out[z * 4];
|
|
Packit |
fd8b60 |
unsigned char *inptr = (unsigned char *)&in[z * 4];
|
|
Packit |
fd8b60 |
/*
|
|
Packit |
fd8b60 |
* Use unaligned accesses. On x86, this will probably still be faster
|
|
Packit |
fd8b60 |
* than multiple byte accesses for unaligned data, and for aligned data
|
|
Packit |
fd8b60 |
* should be far better. (One test indicated about 2.4% faster
|
|
Packit |
fd8b60 |
* encryption for 1024-byte messages.)
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* If some other CPU has really slow unaligned-word or byte accesses,
|
|
Packit |
fd8b60 |
* perhaps this function (or the load/store helpers?) should test for
|
|
Packit |
fd8b60 |
* alignment first.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* If byte accesses are faster than unaligned words, we may need to
|
|
Packit |
fd8b60 |
* conditionalize on CPU type, as that may be hard to determine
|
|
Packit |
fd8b60 |
* automatically.
|
|
Packit |
fd8b60 |
*/
|
|
Packit |
fd8b60 |
store_32_n(load_32_n(outptr) ^ load_32_n(inptr), outptr);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static const EVP_CIPHER *
|
|
Packit |
fd8b60 |
map_mode(unsigned int len)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
if (len==16)
|
|
Packit |
fd8b60 |
return EVP_camellia_128_cbc();
|
|
Packit |
fd8b60 |
if (len==32)
|
|
Packit |
fd8b60 |
return EVP_camellia_256_cbc();
|
|
Packit |
fd8b60 |
else
|
|
Packit |
fd8b60 |
return NULL;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Encrypt one block using CBC. */
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cbc_enc(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
int ret, olen = BLOCK_SIZE;
|
|
Packit |
fd8b60 |
unsigned char iblock[BLOCK_SIZE], oblock[BLOCK_SIZE];
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX *ctx;
|
|
Packit |
fd8b60 |
struct iov_cursor cursor;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
ctx = EVP_CIPHER_CTX_new();
|
|
Packit |
fd8b60 |
if (ctx == NULL)
|
|
Packit |
fd8b60 |
return ENOMEM;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
ret = EVP_EncryptInit_ex(ctx, map_mode(key->keyblock.length),
|
|
Packit |
fd8b60 |
NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL);
|
|
Packit |
fd8b60 |
if (ret == 0) {
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX_free(ctx);
|
|
Packit |
fd8b60 |
return KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
k5_iov_cursor_init(&cursor, data, num_data, BLOCK_SIZE, FALSE);
|
|
Packit |
fd8b60 |
k5_iov_cursor_get(&cursor, iblock);
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX_set_padding(ctx,0);
|
|
Packit |
fd8b60 |
ret = EVP_EncryptUpdate(ctx, oblock, &olen, iblock, BLOCK_SIZE);
|
|
Packit |
fd8b60 |
if (ret == 1)
|
|
Packit |
fd8b60 |
k5_iov_cursor_put(&cursor, oblock);
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX_free(ctx);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
zap(iblock, BLOCK_SIZE);
|
|
Packit |
fd8b60 |
zap(oblock, BLOCK_SIZE);
|
|
Packit |
fd8b60 |
return (ret == 1) ? 0 : KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Decrypt one block using CBC. */
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cbc_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
int ret = 0, olen = BLOCK_SIZE;
|
|
Packit |
fd8b60 |
unsigned char iblock[BLOCK_SIZE], oblock[BLOCK_SIZE];
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX *ctx;
|
|
Packit |
fd8b60 |
struct iov_cursor cursor;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
ctx = EVP_CIPHER_CTX_new();
|
|
Packit |
fd8b60 |
if (ctx == NULL)
|
|
Packit |
fd8b60 |
return ENOMEM;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
ret = EVP_DecryptInit_ex(ctx, map_mode(key->keyblock.length),
|
|
Packit |
fd8b60 |
NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL);
|
|
Packit |
fd8b60 |
if (ret == 0) {
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX_free(ctx);
|
|
Packit |
fd8b60 |
return KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
k5_iov_cursor_init(&cursor, data, num_data, BLOCK_SIZE, FALSE);
|
|
Packit |
fd8b60 |
k5_iov_cursor_get(&cursor, iblock);
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX_set_padding(ctx,0);
|
|
Packit |
fd8b60 |
ret = EVP_DecryptUpdate(ctx, oblock, &olen, iblock, BLOCK_SIZE);
|
|
Packit |
fd8b60 |
if (ret == 1)
|
|
Packit |
fd8b60 |
k5_iov_cursor_put(&cursor, oblock);
|
|
Packit |
fd8b60 |
EVP_CIPHER_CTX_free(ctx);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
zap(iblock, BLOCK_SIZE);
|
|
Packit |
fd8b60 |
zap(oblock, BLOCK_SIZE);
|
|
Packit |
fd8b60 |
return (ret == 1) ? 0 : KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cts_encr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data, size_t dlen)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
int ret = 0;
|
|
Packit |
fd8b60 |
size_t size = 0;
|
|
Packit |
fd8b60 |
unsigned char *oblock = NULL, *dbuf = NULL;
|
|
Packit |
fd8b60 |
unsigned char iv_cts[IV_CTS_BUF_SIZE];
|
|
Packit |
fd8b60 |
struct iov_cursor cursor;
|
|
Packit |
fd8b60 |
CAMELLIA_KEY enck;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
memset(iv_cts,0,sizeof(iv_cts));
|
|
Packit |
fd8b60 |
if (ivec && ivec->data){
|
|
Packit |
fd8b60 |
if (ivec->length != sizeof(iv_cts))
|
|
Packit |
fd8b60 |
return KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
memcpy(iv_cts, ivec->data,ivec->length);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
oblock = OPENSSL_malloc(dlen);
|
|
Packit |
fd8b60 |
if (!oblock){
|
|
Packit |
fd8b60 |
return ENOMEM;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
dbuf = OPENSSL_malloc(dlen);
|
|
Packit |
fd8b60 |
if (!dbuf){
|
|
Packit |
fd8b60 |
OPENSSL_free(oblock);
|
|
Packit |
fd8b60 |
return ENOMEM;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
k5_iov_cursor_init(&cursor, data, num_data, dlen, FALSE);
|
|
Packit |
fd8b60 |
k5_iov_cursor_get(&cursor, dbuf);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
Camellia_set_key(key->keyblock.contents, NUM_BITS * key->keyblock.length,
|
|
Packit |
fd8b60 |
&enck);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
size = CRYPTO_cts128_encrypt((unsigned char *)dbuf, oblock, dlen, &enck,
|
|
Packit |
fd8b60 |
iv_cts, (cbc128_f)Camellia_cbc_encrypt);
|
|
Packit |
fd8b60 |
if (size <= 0)
|
|
Packit |
fd8b60 |
ret = KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
else
|
|
Packit |
fd8b60 |
k5_iov_cursor_put(&cursor, oblock);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (!ret && ivec && ivec->data)
|
|
Packit |
fd8b60 |
memcpy(ivec->data, iv_cts, sizeof(iv_cts));
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
zap(oblock, dlen);
|
|
Packit |
fd8b60 |
zap(dbuf, dlen);
|
|
Packit |
fd8b60 |
OPENSSL_free(oblock);
|
|
Packit |
fd8b60 |
OPENSSL_free(dbuf);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
cts_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data, size_t dlen)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
int ret = 0;
|
|
Packit |
fd8b60 |
size_t size = 0;
|
|
Packit |
fd8b60 |
unsigned char *oblock = NULL;
|
|
Packit |
fd8b60 |
unsigned char *dbuf = NULL;
|
|
Packit |
fd8b60 |
unsigned char iv_cts[IV_CTS_BUF_SIZE];
|
|
Packit |
fd8b60 |
struct iov_cursor cursor;
|
|
Packit |
fd8b60 |
CAMELLIA_KEY deck;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
memset(iv_cts,0,sizeof(iv_cts));
|
|
Packit |
fd8b60 |
if (ivec && ivec->data){
|
|
Packit |
fd8b60 |
if (ivec->length != sizeof(iv_cts))
|
|
Packit |
fd8b60 |
return KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
memcpy(iv_cts, ivec->data,ivec->length);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
oblock = OPENSSL_malloc(dlen);
|
|
Packit |
fd8b60 |
if (!oblock)
|
|
Packit |
fd8b60 |
return ENOMEM;
|
|
Packit |
fd8b60 |
dbuf = OPENSSL_malloc(dlen);
|
|
Packit |
fd8b60 |
if (!dbuf){
|
|
Packit |
fd8b60 |
OPENSSL_free(oblock);
|
|
Packit |
fd8b60 |
return ENOMEM;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
Camellia_set_key(key->keyblock.contents, NUM_BITS * key->keyblock.length,
|
|
Packit |
fd8b60 |
&deck);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
k5_iov_cursor_init(&cursor, data, num_data, dlen, FALSE);
|
|
Packit |
fd8b60 |
k5_iov_cursor_get(&cursor, dbuf);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
size = CRYPTO_cts128_decrypt((unsigned char *)dbuf, oblock,
|
|
Packit |
fd8b60 |
dlen, &deck,
|
|
Packit |
fd8b60 |
iv_cts, (cbc128_f)Camellia_cbc_encrypt);
|
|
Packit |
fd8b60 |
if (size <= 0)
|
|
Packit |
fd8b60 |
ret = KRB5_CRYPTO_INTERNAL;
|
|
Packit |
fd8b60 |
else
|
|
Packit |
fd8b60 |
k5_iov_cursor_put(&cursor, oblock);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (!ret && ivec && ivec->data)
|
|
Packit |
fd8b60 |
memcpy(ivec->data, iv_cts, sizeof(iv_cts));
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
zap(oblock, dlen);
|
|
Packit |
fd8b60 |
zap(dbuf, dlen);
|
|
Packit |
fd8b60 |
OPENSSL_free(oblock);
|
|
Packit |
fd8b60 |
OPENSSL_free(dbuf);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
krb5int_camellia_encrypt(krb5_key key, const krb5_data *ivec,
|
|
Packit |
fd8b60 |
krb5_crypto_iov *data, size_t num_data)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
int ret = 0;
|
|
Packit |
fd8b60 |
size_t input_length, nblocks;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
input_length = iov_total_length(data, num_data, FALSE);
|
|
Packit |
fd8b60 |
nblocks = (input_length + BLOCK_SIZE - 1) / BLOCK_SIZE;
|
|
Packit |
fd8b60 |
if (nblocks == 1) {
|
|
Packit |
fd8b60 |
if (input_length != BLOCK_SIZE)
|
|
Packit |
fd8b60 |
return KRB5_BAD_MSIZE;
|
|
Packit |
fd8b60 |
ret = cbc_enc(key, ivec, data, num_data);
|
|
Packit |
fd8b60 |
} else if (nblocks > 1) {
|
|
Packit |
fd8b60 |
ret = cts_encr(key, ivec, data, num_data, input_length);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
krb5int_camellia_decrypt(krb5_key key, const krb5_data *ivec,
|
|
Packit |
fd8b60 |
krb5_crypto_iov *data, size_t num_data)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
int ret = 0;
|
|
Packit |
fd8b60 |
size_t input_length, nblocks;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
input_length = iov_total_length(data, num_data, FALSE);
|
|
Packit |
fd8b60 |
nblocks = (input_length + BLOCK_SIZE - 1) / BLOCK_SIZE;
|
|
Packit |
fd8b60 |
if (nblocks == 1) {
|
|
Packit |
fd8b60 |
if (input_length != BLOCK_SIZE)
|
|
Packit |
fd8b60 |
return KRB5_BAD_MSIZE;
|
|
Packit |
fd8b60 |
ret = cbc_decr(key, ivec, data, num_data);
|
|
Packit |
fd8b60 |
} else if (nblocks > 1) {
|
|
Packit |
fd8b60 |
ret = cts_decr(key, ivec, data, num_data, input_length);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
return ret;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
krb5_error_code
|
|
Packit |
fd8b60 |
krb5int_camellia_cbc_mac(krb5_key key, const krb5_crypto_iov *data,
|
|
Packit |
fd8b60 |
size_t num_data, const krb5_data *iv,
|
|
Packit |
fd8b60 |
krb5_data *output)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
CAMELLIA_KEY enck;
|
|
Packit |
fd8b60 |
unsigned char blockY[CAMELLIA_BLOCK_SIZE], blockB[CAMELLIA_BLOCK_SIZE];
|
|
Packit |
fd8b60 |
struct iov_cursor cursor;
|
|
Packit |
fd8b60 |
|
|
rpm-build |
10ee26 |
if (FIPS_mode())
|
|
rpm-build |
10ee26 |
return KRB5_CRYPTO_INTERNAL;
|
|
rpm-build |
10ee26 |
|
|
Packit |
fd8b60 |
if (output->length < CAMELLIA_BLOCK_SIZE)
|
|
Packit |
fd8b60 |
return KRB5_BAD_MSIZE;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
Camellia_set_key(key->keyblock.contents,
|
|
Packit |
fd8b60 |
NUM_BITS * key->keyblock.length, &enck);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (iv != NULL)
|
|
Packit |
fd8b60 |
memcpy(blockY, iv->data, CAMELLIA_BLOCK_SIZE);
|
|
Packit |
fd8b60 |
else
|
|
Packit |
fd8b60 |
memset(blockY, 0, CAMELLIA_BLOCK_SIZE);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
k5_iov_cursor_init(&cursor, data, num_data, CAMELLIA_BLOCK_SIZE, FALSE);
|
|
Packit |
fd8b60 |
while (k5_iov_cursor_get(&cursor, blockB)) {
|
|
Packit |
fd8b60 |
xorblock(blockB, blockY);
|
|
Packit |
fd8b60 |
Camellia_ecb_encrypt(blockB, blockY, &enck, 1);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
output->length = CAMELLIA_BLOCK_SIZE;
|
|
Packit |
fd8b60 |
memcpy(output->data, blockY, CAMELLIA_BLOCK_SIZE);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
return 0;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static krb5_error_code
|
|
Packit |
fd8b60 |
krb5int_camellia_init_state (const krb5_keyblock *key, krb5_keyusage usage,
|
|
Packit |
fd8b60 |
krb5_data *state)
|
|
Packit |
fd8b60 |
{
|
|
rpm-build |
10ee26 |
if (FIPS_mode())
|
|
rpm-build |
10ee26 |
return KRB5_CRYPTO_INTERNAL;
|
|
rpm-build |
10ee26 |
|
|
Packit |
fd8b60 |
state->length = 16;
|
|
Packit |
fd8b60 |
state->data = (void *) malloc(16);
|
|
Packit |
fd8b60 |
if (state->data == NULL)
|
|
Packit |
fd8b60 |
return ENOMEM;
|
|
Packit |
fd8b60 |
memset(state->data, 0, state->length);
|
|
Packit |
fd8b60 |
return 0;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
const struct krb5_enc_provider krb5int_enc_camellia128 = {
|
|
Packit |
fd8b60 |
16,
|
|
Packit |
fd8b60 |
16, 16,
|
|
Packit |
fd8b60 |
krb5int_camellia_encrypt,
|
|
Packit |
fd8b60 |
krb5int_camellia_decrypt,
|
|
Packit |
fd8b60 |
krb5int_camellia_cbc_mac,
|
|
Packit |
fd8b60 |
krb5int_camellia_init_state,
|
|
Packit |
fd8b60 |
krb5int_default_free_state
|
|
Packit |
fd8b60 |
};
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
const struct krb5_enc_provider krb5int_enc_camellia256 = {
|
|
Packit |
fd8b60 |
16,
|
|
Packit |
fd8b60 |
32, 32,
|
|
Packit |
fd8b60 |
krb5int_camellia_encrypt,
|
|
Packit |
fd8b60 |
krb5int_camellia_decrypt,
|
|
Packit |
fd8b60 |
krb5int_camellia_cbc_mac,
|
|
Packit |
fd8b60 |
krb5int_camellia_init_state,
|
|
Packit |
fd8b60 |
krb5int_default_free_state
|
|
Packit |
fd8b60 |
};
|