Blame src/libmbedcrypto.c

Packit 6c0a39
/*
Packit 6c0a39
 * This file is part of the SSH Library
Packit 6c0a39
 *
Packit 6c0a39
 * Copyright (c) 2017 Sartura d.o.o.
Packit 6c0a39
 *
Packit 6c0a39
 * Author: Juraj Vijtiuk <juraj.vijtiuk@sartura.hr>
Packit 6c0a39
 *
Packit 6c0a39
 * The SSH Library is free software; you can redistribute it and/or modify
Packit 6c0a39
 * it under the terms of the GNU Lesser General Public License as published by
Packit 6c0a39
 * the Free Software Foundation; either version 2.1 of the License, or (at your
Packit 6c0a39
 * option) any later version.
Packit 6c0a39
 *
Packit 6c0a39
 * The SSH Library is distributed in the hope that it will be useful, but
Packit 6c0a39
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
Packit 6c0a39
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
Packit 6c0a39
 * License for more details.
Packit 6c0a39
 *
Packit 6c0a39
 * You should have received a copy of the GNU Lesser General Public License
Packit 6c0a39
 * along with the SSH Library; see the file COPYING.  If not, write to
Packit 6c0a39
 * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
Packit 6c0a39
 * MA 02111-1307, USA.
Packit 6c0a39
 */
Packit 6c0a39
Packit 6c0a39
#include "config.h"
Packit 6c0a39
Packit 6c0a39
#include "libssh/wrapper.h"
Packit 6c0a39
#include "libssh/crypto.h"
Packit 6c0a39
#include "libssh/priv.h"
Packit 6c0a39
#include "libssh/misc.h"
Packit 6c0a39
Packit 6c0a39
#ifdef HAVE_LIBMBEDCRYPTO
Packit 6c0a39
#include <mbedtls/md.h>
Packit 6c0a39
#ifdef MBEDTLS_GCM_C
Packit 6c0a39
#include <mbedtls/gcm.h>
Packit 6c0a39
#endif /* MBEDTLS_GCM_C */
Packit 6c0a39
Packit 6c0a39
static mbedtls_entropy_context ssh_mbedtls_entropy;
Packit 6c0a39
static mbedtls_ctr_drbg_context ssh_mbedtls_ctr_drbg;
Packit 6c0a39
Packit 6c0a39
static int libmbedcrypto_initialized = 0;
Packit 6c0a39
Packit 6c0a39
void ssh_reseed(void)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_ctr_drbg_reseed(&ssh_mbedtls_ctr_drbg, NULL, 0);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
int ssh_get_random(void *where, int len, int strong)
Packit 6c0a39
{
Packit 6c0a39
    return ssh_mbedtls_random(where, len, strong);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
SHACTX sha1_init(void)
Packit 6c0a39
{
Packit 6c0a39
    SHACTX ctx = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
Packit 6c0a39
Packit 6c0a39
    if (md_info == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    ctx = malloc(sizeof(mbedtls_md_context_t));
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_md_init(ctx);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_setup(ctx, md_info, 0);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_starts(ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha1_update(SHACTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_update(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha1_final(unsigned char *md, SHACTX c)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_finish(c, md);
Packit 6c0a39
    mbedtls_md_free(c);
Packit 6c0a39
    SAFE_FREE(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha1(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
Packit 6c0a39
    if (md_info != NULL) {
Packit 6c0a39
        mbedtls_md(md_info, digest, len, hash);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static mbedtls_md_type_t nid_to_md_algo(int nid)
Packit 6c0a39
{
Packit 6c0a39
    switch (nid) {
Packit 6c0a39
        case NID_mbedtls_nistp256:
Packit 6c0a39
            return MBEDTLS_MD_SHA256;
Packit 6c0a39
        case NID_mbedtls_nistp384:
Packit 6c0a39
            return MBEDTLS_MD_SHA384;
Packit 6c0a39
        case NID_mbedtls_nistp521:
Packit 6c0a39
            return MBEDTLS_MD_SHA512;
Packit 6c0a39
    }
Packit 6c0a39
    return MBEDTLS_MD_NONE;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void evp(int nid, unsigned char *digest, int len,
Packit 6c0a39
        unsigned char *hash, unsigned int *hlen)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_type_t algo = nid_to_md_algo(nid);
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(algo);
Packit 6c0a39
Packit 6c0a39
Packit 6c0a39
    if (md_info != NULL) {
Packit 6c0a39
        *hlen = mbedtls_md_get_size(md_info);
Packit 6c0a39
        mbedtls_md(md_info, digest, len, hash);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
EVPCTX evp_init(int nid)
Packit 6c0a39
{
Packit 6c0a39
    EVPCTX ctx = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
    mbedtls_md_type_t algo = nid_to_md_algo(nid);
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(algo);
Packit 6c0a39
Packit 6c0a39
    if (md_info == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    ctx = malloc(sizeof(mbedtls_md_context_t));
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_md_init(ctx);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_setup(ctx, md_info, 0);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_starts(ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void evp_update(EVPCTX ctx, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_update(ctx, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void evp_final(EVPCTX ctx, unsigned char *md, unsigned int *mdlen)
Packit 6c0a39
{
Packit 6c0a39
    *mdlen = mbedtls_md_get_size(ctx->md_info);
Packit 6c0a39
    mbedtls_md_finish(ctx, md);
Packit 6c0a39
    mbedtls_md_free(ctx);
Packit 6c0a39
    SAFE_FREE(ctx);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
SHA256CTX sha256_init(void)
Packit 6c0a39
{
Packit 6c0a39
    SHA256CTX ctx = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
Packit 6c0a39
Packit 6c0a39
    if (md_info == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    ctx = malloc(sizeof(mbedtls_md_context_t));
Packit 6c0a39
    if(ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_md_init(ctx);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_setup(ctx, md_info, 0);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_starts(ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha256_update(SHA256CTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_update(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha256_final(unsigned char *md, SHA256CTX c)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_finish(c, md);
Packit 6c0a39
    mbedtls_md_free(c);
Packit 6c0a39
    SAFE_FREE(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha256(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
Packit 6c0a39
    if (md_info != NULL) {
Packit 6c0a39
        mbedtls_md(md_info, digest, len, hash);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
SHA384CTX sha384_init(void)
Packit 6c0a39
{
Packit 6c0a39
    SHA384CTX ctx = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
Packit 6c0a39
Packit 6c0a39
    if (md_info == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    ctx = malloc(sizeof(mbedtls_md_context_t));
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_md_init(ctx);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_setup(ctx, md_info, 0);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_starts(ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha384_update(SHA384CTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_update(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha384_final(unsigned char *md, SHA384CTX c)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_finish(c, md);
Packit 6c0a39
    mbedtls_md_free(c);
Packit 6c0a39
    SAFE_FREE(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha384(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA384);
Packit 6c0a39
    if (md_info != NULL) {
Packit 6c0a39
        mbedtls_md(md_info, digest, len, hash);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
SHA512CTX sha512_init(void)
Packit 6c0a39
{
Packit 6c0a39
    SHA512CTX ctx = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
Packit 6c0a39
    if (md_info == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    ctx = malloc(sizeof(mbedtls_md_context_t));
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_md_init(ctx);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_setup(ctx, md_info, 0);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_starts(ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha512_update(SHA512CTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_update(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha512_final(unsigned char *md, SHA512CTX c)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_finish(c, md);
Packit 6c0a39
    mbedtls_md_free(c);
Packit 6c0a39
    SAFE_FREE(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void sha512(const unsigned char *digest, int len, unsigned char *hash)
Packit 6c0a39
{
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
Packit 6c0a39
    if (md_info != NULL) {
Packit 6c0a39
        mbedtls_md(md_info, digest, len, hash);
Packit 6c0a39
    }
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
MD5CTX md5_init(void)
Packit 6c0a39
{
Packit 6c0a39
    MD5CTX ctx = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
    const mbedtls_md_info_t *md_info =
Packit 6c0a39
        mbedtls_md_info_from_type(MBEDTLS_MD_MD5);
Packit 6c0a39
    if (md_info == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    ctx = malloc(sizeof(mbedtls_md_context_t));
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_md_init(ctx);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_setup(ctx, md_info, 0);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_starts(ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SAFE_FREE(ctx);
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
Packit 6c0a39
void md5_update(MD5CTX c, const void *data, unsigned long len) {
Packit 6c0a39
    mbedtls_md_update(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void md5_final(unsigned char *md, MD5CTX c)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_finish(c, md);
Packit 6c0a39
    mbedtls_md_free(c);
Packit 6c0a39
    SAFE_FREE(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
int ssh_kdf(struct ssh_crypto_struct *crypto,
Packit 6c0a39
            unsigned char *key, size_t key_len,
Packit 6c0a39
            int key_type, unsigned char *output,
Packit 6c0a39
            size_t requested_len)
Packit 6c0a39
{
Packit 6c0a39
    return sshkdf_derive_key(crypto, key, key_len,
Packit 6c0a39
                             key_type, output, requested_len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
HMACCTX hmac_init(const void *key, int len, enum ssh_hmac_e type)
Packit 6c0a39
{
Packit 6c0a39
    HMACCTX ctx = NULL;
Packit 6c0a39
    const mbedtls_md_info_t *md_info = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    ctx = malloc(sizeof(mbedtls_md_context_t));
Packit 6c0a39
    if (ctx == NULL) {
Packit 6c0a39
        return NULL;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    switch (type) {
Packit 6c0a39
        case SSH_HMAC_SHA1:
Packit 6c0a39
            md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
Packit 6c0a39
            break;
Packit 6c0a39
        case SSH_HMAC_SHA256:
Packit 6c0a39
            md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
Packit 6c0a39
            break;
Packit 6c0a39
        case SSH_HMAC_SHA512:
Packit 6c0a39
            md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA512);
Packit 6c0a39
            break;
Packit 6c0a39
        default:
Packit 6c0a39
            goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_md_init(ctx);
Packit 6c0a39
Packit 6c0a39
    if (md_info == NULL) {
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_setup(ctx, md_info, 1);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_md_hmac_starts(ctx, key, len);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return ctx;
Packit 6c0a39
Packit 6c0a39
error:
Packit 6c0a39
    mbedtls_md_free(ctx);
Packit 6c0a39
    SAFE_FREE(ctx);
Packit 6c0a39
    return NULL;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void hmac_update(HMACCTX c, const void *data, unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_md_hmac_update(c, data, len);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void hmac_final(HMACCTX c, unsigned char *hashmacbuf, unsigned int *len)
Packit 6c0a39
{
Packit 6c0a39
    *len = mbedtls_md_get_size(c->md_info);
Packit 6c0a39
    mbedtls_md_hmac_finish(c, hashmacbuf);
Packit 6c0a39
    mbedtls_md_free(c);
Packit 6c0a39
    SAFE_FREE(c);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int
Packit 6c0a39
cipher_init(struct ssh_cipher_struct *cipher,
Packit 6c0a39
            mbedtls_operation_t operation,
Packit 6c0a39
            void *key,
Packit 6c0a39
            void *IV)
Packit 6c0a39
{
Packit 6c0a39
    const mbedtls_cipher_info_t *cipher_info = NULL;
Packit 6c0a39
    mbedtls_cipher_context_t *ctx;
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    if (operation == MBEDTLS_ENCRYPT) {
Packit 6c0a39
        ctx = &cipher->encrypt_ctx;
Packit 6c0a39
    } else if (operation == MBEDTLS_DECRYPT) {
Packit 6c0a39
        ctx = &cipher->decrypt_ctx;
Packit 6c0a39
    } else {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "unknown operation");
Packit 6c0a39
        return 1;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_cipher_init(ctx);
Packit 6c0a39
    cipher_info = mbedtls_cipher_info_from_type(cipher->type);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_setup(ctx, cipher_info);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_setup failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_setkey(ctx, key,
Packit 6c0a39
                               cipher_info->key_bitlen,
Packit 6c0a39
                               operation);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_setkey failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_set_iv(ctx, IV, cipher_info->iv_size);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_set_iv failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return 0;
Packit 6c0a39
error:
Packit 6c0a39
    mbedtls_cipher_free(ctx);
Packit 6c0a39
    return 1;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int
Packit 6c0a39
cipher_set_encrypt_key(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                       void *key,
Packit 6c0a39
                       void *IV)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    rc = cipher_init(cipher, MBEDTLS_ENCRYPT, key, IV);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "cipher_init failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_reset(&cipher->encrypt_ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_reset failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
error:
Packit 6c0a39
    return SSH_ERROR;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int
Packit 6c0a39
cipher_set_encrypt_key_cbc(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                           void *key,
Packit 6c0a39
                           void *IV)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    rc = cipher_init(cipher, MBEDTLS_ENCRYPT, key, IV);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "cipher_init failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* libssh only encypts and decrypts packets that are multiples of a block
Packit 6c0a39
     * size, and no padding is used */
Packit 6c0a39
    rc = mbedtls_cipher_set_padding_mode(&cipher->encrypt_ctx,
Packit 6c0a39
            MBEDTLS_PADDING_NONE);
Packit 6c0a39
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_set_padding_mode failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_reset(&cipher->encrypt_ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_reset failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
error:
Packit 6c0a39
    mbedtls_cipher_free(&cipher->encrypt_ctx);
Packit 6c0a39
    return SSH_ERROR;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#ifdef MBEDTLS_GCM_C
Packit 6c0a39
static int
Packit 6c0a39
cipher_set_key_gcm(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                   void *key,
Packit 6c0a39
                   void *IV)
Packit 6c0a39
{
Packit 6c0a39
    const mbedtls_cipher_info_t *cipher_info = NULL;
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    mbedtls_gcm_init(&cipher->gcm_ctx);
Packit 6c0a39
    cipher_info = mbedtls_cipher_info_from_type(cipher->type);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_gcm_setkey(&cipher->gcm_ctx,
Packit 6c0a39
                            MBEDTLS_CIPHER_ID_AES,
Packit 6c0a39
                            key,
Packit 6c0a39
                            cipher_info->key_bitlen);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_gcm_setkey failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* Store the IV so we can increment the packet counter later */
Packit 6c0a39
    memcpy(cipher->last_iv, IV, AES_GCM_IVLEN);
Packit 6c0a39
Packit 6c0a39
    return 0;
Packit 6c0a39
error:
Packit 6c0a39
    mbedtls_gcm_free(&cipher->gcm_ctx);
Packit 6c0a39
    return 1;
Packit 6c0a39
}
Packit 6c0a39
#endif /* MBEDTLS_GCM_C */
Packit 6c0a39
Packit 6c0a39
static int
Packit 6c0a39
cipher_set_decrypt_key(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                       void *key,
Packit 6c0a39
                       void *IV)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    rc = cipher_init(cipher, MBEDTLS_DECRYPT, key, IV);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "cipher_init failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_cipher_reset(&cipher->decrypt_ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_reset failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
error:
Packit 6c0a39
    mbedtls_cipher_free(&cipher->decrypt_ctx);
Packit 6c0a39
    return SSH_ERROR;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int
Packit 6c0a39
cipher_set_decrypt_key_cbc(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                           void *key,
Packit 6c0a39
                           void *IV)
Packit 6c0a39
{
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    rc = cipher_init(cipher, MBEDTLS_DECRYPT, key, IV);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "cipher_init failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_set_padding_mode(&cipher->decrypt_ctx,
Packit 6c0a39
            MBEDTLS_PADDING_NONE);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_set_padding_mode failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_cipher_reset(&cipher->decrypt_ctx);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_reset failed");
Packit 6c0a39
        goto error;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
error:
Packit 6c0a39
    mbedtls_cipher_free(&cipher->decrypt_ctx);
Packit 6c0a39
    return SSH_ERROR;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void cipher_encrypt(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                           void *in,
Packit 6c0a39
                           void *out,
Packit 6c0a39
                           size_t len)
Packit 6c0a39
{
Packit 6c0a39
    size_t outlen = 0;
Packit 6c0a39
    size_t total_len = 0;
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
    rc = mbedtls_cipher_update(&cipher->encrypt_ctx, in, len, out, &outlen);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update failed during encryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    total_len += outlen;
Packit 6c0a39
Packit 6c0a39
    if (total_len == len) {
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_finish(&cipher->encrypt_ctx, (unsigned char *) out + outlen,
Packit 6c0a39
            &outlen);
Packit 6c0a39
Packit 6c0a39
    total_len += outlen;
Packit 6c0a39
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_finish failed during encryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    if (total_len != len) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update: output size %zu for %zu",
Packit 6c0a39
                outlen, len);
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void cipher_encrypt_cbc(struct ssh_cipher_struct *cipher, void *in, void *out,
Packit 6c0a39
        unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    size_t outlen = 0;
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
    rc = mbedtls_cipher_update(&cipher->encrypt_ctx, in, len, out, &outlen);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update failed during encryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    if (outlen != len) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update: output size %zu for %zu",
Packit 6c0a39
                outlen, len);
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void cipher_decrypt(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                           void *in,
Packit 6c0a39
                           void *out,
Packit 6c0a39
                           size_t len)
Packit 6c0a39
{
Packit 6c0a39
    size_t outlen = 0;
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
    size_t total_len = 0;
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_update(&cipher->decrypt_ctx, in, len, out, &outlen);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update failed during decryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    total_len += outlen;
Packit 6c0a39
Packit 6c0a39
    if (total_len == len) {
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_finish(&cipher->decrypt_ctx, (unsigned char *) out +
Packit 6c0a39
            outlen, &outlen);
Packit 6c0a39
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_reset failed during decryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    total_len += outlen;
Packit 6c0a39
Packit 6c0a39
    if (total_len != len) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update: output size %zu for %zu",
Packit 6c0a39
                outlen, len);
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void cipher_decrypt_cbc(struct ssh_cipher_struct *cipher, void *in, void *out,
Packit 6c0a39
        unsigned long len)
Packit 6c0a39
{
Packit 6c0a39
    size_t outlen = 0;
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
    rc = mbedtls_cipher_update(&cipher->decrypt_ctx, in, len, out, &outlen);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update failed during decryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* MbedTLS caches the last block when decrypting with cbc.
Packit 6c0a39
     * By calling finish the block is flushed to out, however the unprocessed
Packit 6c0a39
     * data counter is not reset.
Packit 6c0a39
     * Calling mbedtls_cipher_reset resets the unprocessed data counter.
Packit 6c0a39
     */
Packit 6c0a39
    if (outlen == 0) {
Packit 6c0a39
        rc = mbedtls_cipher_finish(&cipher->decrypt_ctx, out, &outlen);
Packit 6c0a39
    } else if (outlen == len) {
Packit 6c0a39
        return;
Packit 6c0a39
    } else {
Packit 6c0a39
        rc = mbedtls_cipher_finish(&cipher->decrypt_ctx, (unsigned char *) out +
Packit 6c0a39
                outlen , &outlen);
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_finish failed during decryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_cipher_reset(&cipher->decrypt_ctx);
Packit 6c0a39
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_reset failed during decryption");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    if (outlen != len) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_cipher_update: output size %zu for %zu",
Packit 6c0a39
                outlen, len);
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#ifdef MBEDTLS_GCM_C
Packit 6c0a39
static int
Packit 6c0a39
cipher_gcm_get_length(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                      void *in,
Packit 6c0a39
                      uint8_t *out,
Packit 6c0a39
                      size_t len,
Packit 6c0a39
                      uint64_t seq)
Packit 6c0a39
{
Packit 6c0a39
    (void)cipher;
Packit 6c0a39
    (void)seq;
Packit 6c0a39
Packit 6c0a39
    /* The length is not encrypted: Copy it to the result buffer */
Packit 6c0a39
    memcpy(out, in, len);
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static void
Packit 6c0a39
cipher_encrypt_gcm(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                   void *in,
Packit 6c0a39
                   void *out,
Packit 6c0a39
                   size_t len,
Packit 6c0a39
                   uint8_t *tag,
Packit 6c0a39
                   uint64_t seq)
Packit 6c0a39
{
Packit 6c0a39
    size_t authlen, aadlen;
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    (void) seq;
Packit 6c0a39
Packit 6c0a39
    aadlen = cipher->lenfield_blocksize;
Packit 6c0a39
    authlen = cipher->tag_size;
Packit 6c0a39
Packit 6c0a39
    /* The length is not encrypted */
Packit 6c0a39
    memcpy(out, in, aadlen);
Packit 6c0a39
    rc = mbedtls_gcm_crypt_and_tag(&cipher->gcm_ctx,
Packit 6c0a39
                                   MBEDTLS_GCM_ENCRYPT,
Packit 6c0a39
                                   len - aadlen, /* encrypted data len */
Packit 6c0a39
                                   cipher->last_iv, /* IV */
Packit 6c0a39
                                   AES_GCM_IVLEN,
Packit 6c0a39
                                   in, /* aad */
Packit 6c0a39
                                   aadlen,
Packit 6c0a39
                                   (const unsigned char *)in + aadlen, /* input */
Packit 6c0a39
                                   (unsigned char *)out + aadlen, /* output */
Packit 6c0a39
                                   authlen,
Packit 6c0a39
                                   tag); /* tag */
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_gcm_crypt_and_tag failed");
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* Increment the IV for the next invocation */
Packit 6c0a39
    uint64_inc(cipher->last_iv + 4);
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static int
Packit 6c0a39
cipher_decrypt_gcm(struct ssh_cipher_struct *cipher,
Packit 6c0a39
                   void *complete_packet,
Packit 6c0a39
                   uint8_t *out,
Packit 6c0a39
                   size_t encrypted_size,
Packit 6c0a39
                   uint64_t seq)
Packit 6c0a39
{
Packit 6c0a39
    size_t authlen, aadlen;
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    (void) seq;
Packit 6c0a39
Packit 6c0a39
    aadlen = cipher->lenfield_blocksize;
Packit 6c0a39
    authlen = cipher->tag_size;
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_gcm_auth_decrypt(&cipher->gcm_ctx,
Packit 6c0a39
                                  encrypted_size, /* encrypted data len */
Packit 6c0a39
                                  cipher->last_iv, /* IV */
Packit 6c0a39
                                  AES_GCM_IVLEN,
Packit 6c0a39
                                  complete_packet, /* aad */
Packit 6c0a39
                                  aadlen,
Packit 6c0a39
                                  (const uint8_t *)complete_packet + aadlen + encrypted_size, /* tag */
Packit 6c0a39
                                  authlen,
Packit 6c0a39
                                  (const uint8_t *)complete_packet + aadlen, /* input */
Packit 6c0a39
                                  (unsigned char *)out); /* output */
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        SSH_LOG(SSH_LOG_WARNING, "mbedtls_gcm_auth_decrypt failed");
Packit 6c0a39
        return SSH_ERROR;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    /* Increment the IV for the next invocation */
Packit 6c0a39
    uint64_inc(cipher->last_iv + 4);
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
#endif /* MBEDTLS_GCM_C */
Packit 6c0a39
Packit 6c0a39
static void cipher_cleanup(struct ssh_cipher_struct *cipher)
Packit 6c0a39
{
Packit 6c0a39
    mbedtls_cipher_free(&cipher->encrypt_ctx);
Packit 6c0a39
    mbedtls_cipher_free(&cipher->decrypt_ctx);
Packit 6c0a39
#ifdef MBEDTLS_GCM_C
Packit 6c0a39
    mbedtls_gcm_free(&cipher->gcm_ctx);
Packit 6c0a39
#endif /* MBEDTLS_GCM_C */
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
static struct ssh_cipher_struct ssh_ciphertab[] = {
Packit 6c0a39
#ifdef WITH_BLOWFISH_CIPHER
Packit 6c0a39
    {
Packit 6c0a39
        .name = "blowfish-cbc",
Packit 6c0a39
        .blocksize = 8,
Packit 6c0a39
        .keysize = 128,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_BLOWFISH_CBC,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key_cbc,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key_cbc,
Packit 6c0a39
        .encrypt = cipher_encrypt_cbc,
Packit 6c0a39
        .decrypt = cipher_decrypt_cbc,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
#endif /* WITH_BLOWFISH_CIPHER */
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes128-ctr",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .keysize = 128,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_128_CTR,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key,
Packit 6c0a39
        .encrypt = cipher_encrypt,
Packit 6c0a39
        .decrypt = cipher_decrypt,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes192-ctr",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .keysize = 192,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_192_CTR,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key,
Packit 6c0a39
        .encrypt = cipher_encrypt,
Packit 6c0a39
        .decrypt = cipher_decrypt,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes256-ctr",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .keysize = 256,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_256_CTR,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key,
Packit 6c0a39
        .encrypt = cipher_encrypt,
Packit 6c0a39
        .decrypt = cipher_decrypt,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes128-cbc",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .keysize = 128,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_128_CBC,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key_cbc,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key_cbc,
Packit 6c0a39
        .encrypt = cipher_encrypt_cbc,
Packit 6c0a39
        .decrypt = cipher_decrypt_cbc,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes192-cbc",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .keysize = 192,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_192_CBC,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key_cbc,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key_cbc,
Packit 6c0a39
        .encrypt = cipher_encrypt_cbc,
Packit 6c0a39
        .decrypt = cipher_decrypt_cbc,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes256-cbc",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .keysize = 256,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_256_CBC,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key_cbc,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key_cbc,
Packit 6c0a39
        .encrypt = cipher_encrypt_cbc,
Packit 6c0a39
        .decrypt = cipher_decrypt_cbc,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
#ifdef MBEDTLS_GCM_C
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes128-gcm@openssh.com",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .lenfield_blocksize = 4, /* not encrypted, but authenticated */
Packit 6c0a39
        .keysize = 128,
Packit 6c0a39
        .tag_size = AES_GCM_TAGLEN,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_128_GCM,
Packit 6c0a39
        .set_encrypt_key = cipher_set_key_gcm,
Packit 6c0a39
        .set_decrypt_key = cipher_set_key_gcm,
Packit 6c0a39
        .aead_encrypt = cipher_encrypt_gcm,
Packit 6c0a39
        .aead_decrypt_length = cipher_gcm_get_length,
Packit 6c0a39
        .aead_decrypt = cipher_decrypt_gcm,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = "aes256-gcm@openssh.com",
Packit 6c0a39
        .blocksize = 16,
Packit 6c0a39
        .lenfield_blocksize = 4, /* not encrypted, but authenticated */
Packit 6c0a39
        .keysize = 256,
Packit 6c0a39
        .tag_size = AES_GCM_TAGLEN,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_AES_256_GCM,
Packit 6c0a39
        .set_encrypt_key = cipher_set_key_gcm,
Packit 6c0a39
        .set_decrypt_key = cipher_set_key_gcm,
Packit 6c0a39
        .aead_encrypt = cipher_encrypt_gcm,
Packit 6c0a39
        .aead_decrypt_length = cipher_gcm_get_length,
Packit 6c0a39
        .aead_decrypt = cipher_decrypt_gcm,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
#endif /* MBEDTLS_GCM_C */
Packit 6c0a39
    {
Packit 6c0a39
        .name = "3des-cbc",
Packit 6c0a39
        .blocksize = 8,
Packit 6c0a39
        .keysize = 192,
Packit 6c0a39
        .type = MBEDTLS_CIPHER_DES_EDE3_CBC,
Packit 6c0a39
        .set_encrypt_key = cipher_set_encrypt_key_cbc,
Packit 6c0a39
        .set_decrypt_key = cipher_set_decrypt_key_cbc,
Packit 6c0a39
        .encrypt = cipher_encrypt_cbc,
Packit 6c0a39
        .decrypt = cipher_decrypt_cbc,
Packit 6c0a39
        .cleanup = cipher_cleanup
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = "chacha20-poly1305@openssh.com"
Packit 6c0a39
    },
Packit 6c0a39
    {
Packit 6c0a39
        .name = NULL,
Packit 6c0a39
        .blocksize = 0,
Packit 6c0a39
        .keysize = 0,
Packit 6c0a39
        .set_encrypt_key = NULL,
Packit 6c0a39
        .set_decrypt_key = NULL,
Packit 6c0a39
        .encrypt = NULL,
Packit 6c0a39
        .decrypt = NULL,
Packit 6c0a39
        .cleanup = NULL
Packit 6c0a39
    }
Packit 6c0a39
};
Packit 6c0a39
Packit 6c0a39
struct ssh_cipher_struct *ssh_get_ciphertab(void)
Packit 6c0a39
{
Packit 6c0a39
    return ssh_ciphertab;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
int ssh_crypto_init(void)
Packit 6c0a39
{
Packit 6c0a39
    size_t i;
Packit 6c0a39
    int rc;
Packit 6c0a39
Packit 6c0a39
    if (libmbedcrypto_initialized) {
Packit 6c0a39
        return SSH_OK;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_entropy_init(&ssh_mbedtls_entropy);
Packit 6c0a39
    mbedtls_ctr_drbg_init(&ssh_mbedtls_ctr_drbg);
Packit 6c0a39
Packit 6c0a39
    rc = mbedtls_ctr_drbg_seed(&ssh_mbedtls_ctr_drbg, mbedtls_entropy_func,
Packit 6c0a39
            &ssh_mbedtls_entropy, NULL, 0);
Packit 6c0a39
    if (rc != 0) {
Packit 6c0a39
        mbedtls_ctr_drbg_free(&ssh_mbedtls_ctr_drbg);
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    for (i = 0; ssh_ciphertab[i].name != NULL; i++) {
Packit 6c0a39
        int cmp;
Packit 6c0a39
Packit 6c0a39
        cmp = strcmp(ssh_ciphertab[i].name, "chacha20-poly1305@openssh.com");
Packit 6c0a39
        if (cmp == 0) {
Packit 6c0a39
            memcpy(&ssh_ciphertab[i],
Packit 6c0a39
                   ssh_get_chacha20poly1305_cipher(),
Packit 6c0a39
                   sizeof(struct ssh_cipher_struct));
Packit 6c0a39
            break;
Packit 6c0a39
        }
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    libmbedcrypto_initialized = 1;
Packit 6c0a39
Packit 6c0a39
    return SSH_OK;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
int ssh_mbedtls_random(void *where, int len, int strong)
Packit 6c0a39
{
Packit 6c0a39
    int rc = 0;
Packit 6c0a39
    if (strong) {
Packit 6c0a39
        mbedtls_ctr_drbg_set_prediction_resistance(&ssh_mbedtls_ctr_drbg,
Packit 6c0a39
                MBEDTLS_CTR_DRBG_PR_ON);
Packit 6c0a39
        rc = mbedtls_ctr_drbg_random(&ssh_mbedtls_ctr_drbg, where, len);
Packit 6c0a39
        mbedtls_ctr_drbg_set_prediction_resistance(&ssh_mbedtls_ctr_drbg,
Packit 6c0a39
                MBEDTLS_CTR_DRBG_PR_OFF);
Packit 6c0a39
    } else {
Packit 6c0a39
        rc = mbedtls_ctr_drbg_random(&ssh_mbedtls_ctr_drbg, where, len);
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    return !rc;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
mbedtls_ctr_drbg_context *ssh_get_mbedtls_ctr_drbg_context(void)
Packit 6c0a39
{
Packit 6c0a39
    return &ssh_mbedtls_ctr_drbg;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
void ssh_crypto_finalize(void)
Packit 6c0a39
{
Packit 6c0a39
    if (!libmbedcrypto_initialized) {
Packit 6c0a39
        return;
Packit 6c0a39
    }
Packit 6c0a39
Packit 6c0a39
    mbedtls_ctr_drbg_free(&ssh_mbedtls_ctr_drbg);
Packit 6c0a39
    mbedtls_entropy_free(&ssh_mbedtls_entropy);
Packit 6c0a39
Packit 6c0a39
    libmbedcrypto_initialized = 0;
Packit 6c0a39
}
Packit 6c0a39
Packit 6c0a39
#endif /* HAVE_LIBMBEDCRYPTO */