Blame src/lib/crypto/openssl/enc_provider/camellia.c

Packit fd8b60
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
Packit fd8b60
/* lib/crypto/openssl/enc_provider/camellia.c */
Packit fd8b60
/*
Packit fd8b60
 * Copyright (C) 2003, 2007, 2008, 2009, 2010 by the Massachusetts Institute of
Packit fd8b60
 * Technology.  All rights reserved.
Packit fd8b60
 *
Packit fd8b60
 * Export of this software from the United States of America may
Packit fd8b60
 *   require a specific license from the United States Government.
Packit fd8b60
 *   It is the responsibility of any person or organization contemplating
Packit fd8b60
 *   export to obtain such a license before exporting.
Packit fd8b60
 *
Packit fd8b60
 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
Packit fd8b60
 * distribute this software and its documentation for any purpose and
Packit fd8b60
 * without fee is hereby granted, provided that the above copyright
Packit fd8b60
 * notice appear in all copies and that both that copyright notice and
Packit fd8b60
 * this permission notice appear in supporting documentation, and that
Packit fd8b60
 * the name of M.I.T. not be used in advertising or publicity pertaining
Packit fd8b60
 * to distribution of the software without specific, written prior
Packit fd8b60
 * permission.  Furthermore if you modify this software you must label
Packit fd8b60
 * your software as modified software and not distribute it in such a
Packit fd8b60
 * fashion that it might be confused with the original M.I.T. software.
Packit fd8b60
 * M.I.T. makes no representations about the suitability of
Packit fd8b60
 * this software for any purpose.  It is provided "as is" without express
Packit fd8b60
 * or implied warranty.
Packit fd8b60
 */
Packit fd8b60
Packit fd8b60
#include "crypto_int.h"
Packit fd8b60
#include <openssl/evp.h>
Packit fd8b60
#include <openssl/camellia.h>
Packit fd8b60
#include <openssl/modes.h>
Packit fd8b60
Packit fd8b60
static krb5_error_code
Packit fd8b60
cbc_enc(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
        size_t num_data);
Packit fd8b60
static krb5_error_code
Packit fd8b60
cbc_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
         size_t num_data);
Packit fd8b60
static krb5_error_code
Packit fd8b60
cts_encr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
         size_t num_data, size_t dlen);
Packit fd8b60
static krb5_error_code
Packit fd8b60
cts_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
         size_t num_data, size_t dlen);
Packit fd8b60
Packit fd8b60
#define BLOCK_SIZE 16
Packit fd8b60
#define NUM_BITS 8
Packit fd8b60
#define IV_CTS_BUF_SIZE 16 /* 16 - hardcoded in CRYPTO_cts128_en/decrypt */
Packit fd8b60
Packit fd8b60
static void
Packit fd8b60
xorblock(unsigned char *out, const unsigned char *in)
Packit fd8b60
{
Packit fd8b60
    int z;
Packit fd8b60
    for (z = 0; z < CAMELLIA_BLOCK_SIZE / 4; z++) {
Packit fd8b60
        unsigned char *outptr = &out[z * 4];
Packit fd8b60
        unsigned char *inptr = (unsigned char *)&in[z * 4];
Packit fd8b60
        /*
Packit fd8b60
         * Use unaligned accesses.  On x86, this will probably still be faster
Packit fd8b60
         * than multiple byte accesses for unaligned data, and for aligned data
Packit fd8b60
         * should be far better.  (One test indicated about 2.4% faster
Packit fd8b60
         * encryption for 1024-byte messages.)
Packit fd8b60
         *
Packit fd8b60
         * If some other CPU has really slow unaligned-word or byte accesses,
Packit fd8b60
         * perhaps this function (or the load/store helpers?) should test for
Packit fd8b60
         * alignment first.
Packit fd8b60
         *
Packit fd8b60
         * If byte accesses are faster than unaligned words, we may need to
Packit fd8b60
         * conditionalize on CPU type, as that may be hard to determine
Packit fd8b60
         * automatically.
Packit fd8b60
         */
Packit fd8b60
        store_32_n(load_32_n(outptr) ^ load_32_n(inptr), outptr);
Packit fd8b60
    }
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
static const EVP_CIPHER *
Packit fd8b60
map_mode(unsigned int len)
Packit fd8b60
{
Packit fd8b60
    if (len==16)
Packit fd8b60
        return EVP_camellia_128_cbc();
Packit fd8b60
    if (len==32)
Packit fd8b60
        return EVP_camellia_256_cbc();
Packit fd8b60
    else
Packit fd8b60
        return NULL;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
/* Encrypt one block using CBC. */
Packit fd8b60
static krb5_error_code
Packit fd8b60
cbc_enc(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
        size_t num_data)
Packit fd8b60
{
Packit fd8b60
    int             ret, olen = BLOCK_SIZE;
Packit fd8b60
    unsigned char   iblock[BLOCK_SIZE], oblock[BLOCK_SIZE];
Packit fd8b60
    EVP_CIPHER_CTX  *ctx;
Packit fd8b60
    struct iov_cursor cursor;
Packit fd8b60
Packit fd8b60
    ctx = EVP_CIPHER_CTX_new();
Packit fd8b60
    if (ctx == NULL)
Packit fd8b60
        return ENOMEM;
Packit fd8b60
Packit fd8b60
    ret = EVP_EncryptInit_ex(ctx, map_mode(key->keyblock.length),
Packit fd8b60
                             NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL);
Packit fd8b60
    if (ret == 0) {
Packit fd8b60
        EVP_CIPHER_CTX_free(ctx);
Packit fd8b60
        return KRB5_CRYPTO_INTERNAL;
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    k5_iov_cursor_init(&cursor, data, num_data, BLOCK_SIZE, FALSE);
Packit fd8b60
    k5_iov_cursor_get(&cursor, iblock);
Packit fd8b60
    EVP_CIPHER_CTX_set_padding(ctx,0);
Packit fd8b60
    ret = EVP_EncryptUpdate(ctx, oblock, &olen, iblock, BLOCK_SIZE);
Packit fd8b60
    if (ret == 1)
Packit fd8b60
        k5_iov_cursor_put(&cursor, oblock);
Packit fd8b60
    EVP_CIPHER_CTX_free(ctx);
Packit fd8b60
Packit fd8b60
    zap(iblock, BLOCK_SIZE);
Packit fd8b60
    zap(oblock, BLOCK_SIZE);
Packit fd8b60
    return (ret == 1) ? 0 : KRB5_CRYPTO_INTERNAL;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
/* Decrypt one block using CBC. */
Packit fd8b60
static krb5_error_code
Packit fd8b60
cbc_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
         size_t num_data)
Packit fd8b60
{
Packit fd8b60
    int              ret = 0, olen = BLOCK_SIZE;
Packit fd8b60
    unsigned char    iblock[BLOCK_SIZE], oblock[BLOCK_SIZE];
Packit fd8b60
    EVP_CIPHER_CTX   *ctx;
Packit fd8b60
    struct iov_cursor cursor;
Packit fd8b60
Packit fd8b60
    ctx = EVP_CIPHER_CTX_new();
Packit fd8b60
    if (ctx == NULL)
Packit fd8b60
        return ENOMEM;
Packit fd8b60
Packit fd8b60
    ret = EVP_DecryptInit_ex(ctx, map_mode(key->keyblock.length),
Packit fd8b60
                             NULL, key->keyblock.contents, (ivec) ? (unsigned char*)ivec->data : NULL);
Packit fd8b60
    if (ret == 0) {
Packit fd8b60
        EVP_CIPHER_CTX_free(ctx);
Packit fd8b60
        return KRB5_CRYPTO_INTERNAL;
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    k5_iov_cursor_init(&cursor, data, num_data, BLOCK_SIZE, FALSE);
Packit fd8b60
    k5_iov_cursor_get(&cursor, iblock);
Packit fd8b60
    EVP_CIPHER_CTX_set_padding(ctx,0);
Packit fd8b60
    ret = EVP_DecryptUpdate(ctx, oblock, &olen, iblock, BLOCK_SIZE);
Packit fd8b60
    if (ret == 1)
Packit fd8b60
        k5_iov_cursor_put(&cursor, oblock);
Packit fd8b60
    EVP_CIPHER_CTX_free(ctx);
Packit fd8b60
Packit fd8b60
    zap(iblock, BLOCK_SIZE);
Packit fd8b60
    zap(oblock, BLOCK_SIZE);
Packit fd8b60
    return (ret == 1) ? 0 : KRB5_CRYPTO_INTERNAL;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
static krb5_error_code
Packit fd8b60
cts_encr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
         size_t num_data, size_t dlen)
Packit fd8b60
{
Packit fd8b60
    int                    ret = 0;
Packit fd8b60
    size_t                 size = 0;
Packit fd8b60
    unsigned char         *oblock = NULL, *dbuf = NULL;
Packit fd8b60
    unsigned char          iv_cts[IV_CTS_BUF_SIZE];
Packit fd8b60
    struct iov_cursor      cursor;
Packit fd8b60
    CAMELLIA_KEY           enck;
Packit fd8b60
Packit fd8b60
    memset(iv_cts,0,sizeof(iv_cts));
Packit fd8b60
    if (ivec && ivec->data){
Packit fd8b60
        if (ivec->length != sizeof(iv_cts))
Packit fd8b60
            return KRB5_CRYPTO_INTERNAL;
Packit fd8b60
        memcpy(iv_cts, ivec->data,ivec->length);
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    oblock = OPENSSL_malloc(dlen);
Packit fd8b60
    if (!oblock){
Packit fd8b60
        return ENOMEM;
Packit fd8b60
    }
Packit fd8b60
    dbuf = OPENSSL_malloc(dlen);
Packit fd8b60
    if (!dbuf){
Packit fd8b60
        OPENSSL_free(oblock);
Packit fd8b60
        return ENOMEM;
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    k5_iov_cursor_init(&cursor, data, num_data, dlen, FALSE);
Packit fd8b60
    k5_iov_cursor_get(&cursor, dbuf);
Packit fd8b60
Packit fd8b60
    Camellia_set_key(key->keyblock.contents, NUM_BITS * key->keyblock.length,
Packit fd8b60
                     &enck);
Packit fd8b60
Packit fd8b60
    size = CRYPTO_cts128_encrypt((unsigned char *)dbuf, oblock, dlen, &enck,
Packit fd8b60
                                 iv_cts, (cbc128_f)Camellia_cbc_encrypt);
Packit fd8b60
    if (size <= 0)
Packit fd8b60
        ret = KRB5_CRYPTO_INTERNAL;
Packit fd8b60
    else
Packit fd8b60
        k5_iov_cursor_put(&cursor, oblock);
Packit fd8b60
Packit fd8b60
    if (!ret && ivec && ivec->data)
Packit fd8b60
        memcpy(ivec->data, iv_cts, sizeof(iv_cts));
Packit fd8b60
Packit fd8b60
    zap(oblock, dlen);
Packit fd8b60
    zap(dbuf, dlen);
Packit fd8b60
    OPENSSL_free(oblock);
Packit fd8b60
    OPENSSL_free(dbuf);
Packit fd8b60
Packit fd8b60
    return ret;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
static krb5_error_code
Packit fd8b60
cts_decr(krb5_key key, const krb5_data *ivec, krb5_crypto_iov *data,
Packit fd8b60
         size_t num_data, size_t dlen)
Packit fd8b60
{
Packit fd8b60
    int                    ret = 0;
Packit fd8b60
    size_t                 size = 0;
Packit fd8b60
    unsigned char         *oblock = NULL;
Packit fd8b60
    unsigned char         *dbuf = NULL;
Packit fd8b60
    unsigned char          iv_cts[IV_CTS_BUF_SIZE];
Packit fd8b60
    struct iov_cursor      cursor;
Packit fd8b60
    CAMELLIA_KEY           deck;
Packit fd8b60
Packit fd8b60
    memset(iv_cts,0,sizeof(iv_cts));
Packit fd8b60
    if (ivec && ivec->data){
Packit fd8b60
        if (ivec->length != sizeof(iv_cts))
Packit fd8b60
            return KRB5_CRYPTO_INTERNAL;
Packit fd8b60
        memcpy(iv_cts, ivec->data,ivec->length);
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    oblock = OPENSSL_malloc(dlen);
Packit fd8b60
    if (!oblock)
Packit fd8b60
        return ENOMEM;
Packit fd8b60
    dbuf = OPENSSL_malloc(dlen);
Packit fd8b60
    if (!dbuf){
Packit fd8b60
        OPENSSL_free(oblock);
Packit fd8b60
        return ENOMEM;
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    Camellia_set_key(key->keyblock.contents, NUM_BITS * key->keyblock.length,
Packit fd8b60
                     &deck);
Packit fd8b60
Packit fd8b60
    k5_iov_cursor_init(&cursor, data, num_data, dlen, FALSE);
Packit fd8b60
    k5_iov_cursor_get(&cursor, dbuf);
Packit fd8b60
Packit fd8b60
    size = CRYPTO_cts128_decrypt((unsigned char *)dbuf, oblock,
Packit fd8b60
                                 dlen, &deck,
Packit fd8b60
                                 iv_cts, (cbc128_f)Camellia_cbc_encrypt);
Packit fd8b60
    if (size <= 0)
Packit fd8b60
        ret = KRB5_CRYPTO_INTERNAL;
Packit fd8b60
    else
Packit fd8b60
        k5_iov_cursor_put(&cursor, oblock);
Packit fd8b60
Packit fd8b60
    if (!ret && ivec && ivec->data)
Packit fd8b60
        memcpy(ivec->data, iv_cts, sizeof(iv_cts));
Packit fd8b60
Packit fd8b60
    zap(oblock, dlen);
Packit fd8b60
    zap(dbuf, dlen);
Packit fd8b60
    OPENSSL_free(oblock);
Packit fd8b60
    OPENSSL_free(dbuf);
Packit fd8b60
Packit fd8b60
    return ret;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
static krb5_error_code
Packit fd8b60
krb5int_camellia_encrypt(krb5_key key, const krb5_data *ivec,
Packit fd8b60
                         krb5_crypto_iov *data, size_t num_data)
Packit fd8b60
{
Packit fd8b60
    int    ret = 0;
Packit fd8b60
    size_t input_length, nblocks;
Packit fd8b60
Packit fd8b60
    input_length = iov_total_length(data, num_data, FALSE);
Packit fd8b60
    nblocks = (input_length + BLOCK_SIZE - 1) / BLOCK_SIZE;
Packit fd8b60
    if (nblocks == 1) {
Packit fd8b60
        if (input_length != BLOCK_SIZE)
Packit fd8b60
            return KRB5_BAD_MSIZE;
Packit fd8b60
        ret = cbc_enc(key, ivec, data, num_data);
Packit fd8b60
    } else if (nblocks > 1) {
Packit fd8b60
        ret = cts_encr(key, ivec, data, num_data, input_length);
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    return ret;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
static krb5_error_code
Packit fd8b60
krb5int_camellia_decrypt(krb5_key key, const krb5_data *ivec,
Packit fd8b60
                         krb5_crypto_iov *data, size_t num_data)
Packit fd8b60
{
Packit fd8b60
    int    ret = 0;
Packit fd8b60
    size_t input_length, nblocks;
Packit fd8b60
Packit fd8b60
    input_length = iov_total_length(data, num_data, FALSE);
Packit fd8b60
    nblocks = (input_length + BLOCK_SIZE - 1) / BLOCK_SIZE;
Packit fd8b60
    if (nblocks == 1) {
Packit fd8b60
        if (input_length != BLOCK_SIZE)
Packit fd8b60
            return KRB5_BAD_MSIZE;
Packit fd8b60
        ret = cbc_decr(key, ivec, data, num_data);
Packit fd8b60
    } else if (nblocks > 1) {
Packit fd8b60
        ret = cts_decr(key, ivec, data, num_data, input_length);
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    return ret;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
krb5_error_code
Packit fd8b60
krb5int_camellia_cbc_mac(krb5_key key, const krb5_crypto_iov *data,
Packit fd8b60
                         size_t num_data, const krb5_data *iv,
Packit fd8b60
                         krb5_data *output)
Packit fd8b60
{
Packit fd8b60
    CAMELLIA_KEY enck;
Packit fd8b60
    unsigned char blockY[CAMELLIA_BLOCK_SIZE], blockB[CAMELLIA_BLOCK_SIZE];
Packit fd8b60
    struct iov_cursor cursor;
Packit fd8b60
rpm-build 10ee26
    if (FIPS_mode())
rpm-build 10ee26
        return KRB5_CRYPTO_INTERNAL;
rpm-build 10ee26
Packit fd8b60
    if (output->length < CAMELLIA_BLOCK_SIZE)
Packit fd8b60
        return KRB5_BAD_MSIZE;
Packit fd8b60
Packit fd8b60
    Camellia_set_key(key->keyblock.contents,
Packit fd8b60
                     NUM_BITS * key->keyblock.length, &enck);
Packit fd8b60
Packit fd8b60
    if (iv != NULL)
Packit fd8b60
        memcpy(blockY, iv->data, CAMELLIA_BLOCK_SIZE);
Packit fd8b60
    else
Packit fd8b60
        memset(blockY, 0, CAMELLIA_BLOCK_SIZE);
Packit fd8b60
Packit fd8b60
    k5_iov_cursor_init(&cursor, data, num_data, CAMELLIA_BLOCK_SIZE, FALSE);
Packit fd8b60
    while (k5_iov_cursor_get(&cursor, blockB)) {
Packit fd8b60
        xorblock(blockB, blockY);
Packit fd8b60
        Camellia_ecb_encrypt(blockB, blockY, &enck, 1);
Packit fd8b60
    }
Packit fd8b60
Packit fd8b60
    output->length = CAMELLIA_BLOCK_SIZE;
Packit fd8b60
    memcpy(output->data, blockY, CAMELLIA_BLOCK_SIZE);
Packit fd8b60
Packit fd8b60
    return 0;
Packit fd8b60
}
Packit fd8b60
Packit fd8b60
static krb5_error_code
Packit fd8b60
krb5int_camellia_init_state (const krb5_keyblock *key, krb5_keyusage usage,
Packit fd8b60
                             krb5_data *state)
Packit fd8b60
{
rpm-build 10ee26
    if (FIPS_mode())
rpm-build 10ee26
        return KRB5_CRYPTO_INTERNAL;
rpm-build 10ee26
Packit fd8b60
    state->length = 16;
Packit fd8b60
    state->data = (void *) malloc(16);
Packit fd8b60
    if (state->data == NULL)
Packit fd8b60
        return ENOMEM;
Packit fd8b60
    memset(state->data, 0, state->length);
Packit fd8b60
    return 0;
Packit fd8b60
}
Packit fd8b60
const struct krb5_enc_provider krb5int_enc_camellia128 = {
Packit fd8b60
    16,
Packit fd8b60
    16, 16,
Packit fd8b60
    krb5int_camellia_encrypt,
Packit fd8b60
    krb5int_camellia_decrypt,
Packit fd8b60
    krb5int_camellia_cbc_mac,
Packit fd8b60
    krb5int_camellia_init_state,
Packit fd8b60
    krb5int_default_free_state
Packit fd8b60
};
Packit fd8b60
Packit fd8b60
const struct krb5_enc_provider krb5int_enc_camellia256 = {
Packit fd8b60
    16,
Packit fd8b60
    32, 32,
Packit fd8b60
    krb5int_camellia_encrypt,
Packit fd8b60
    krb5int_camellia_decrypt,
Packit fd8b60
    krb5int_camellia_cbc_mac,
Packit fd8b60
    krb5int_camellia_init_state,
Packit fd8b60
    krb5int_default_free_state
Packit fd8b60
};