minix3/drivers/system/random/aes/rijndael_api.c

588 lines
16 KiB
C
Raw Normal View History

2020-02-21 00:59:27 +05:30
/* rijndael-api.c - Rijndael encryption programming interface.
* Author: Kees J. Bot
* 3 Nov 2000
* Heavily based on the original API code by Antoon Bosselaers,
* Vincent Rijmen, and Paulo Barreto, but with a different interface.
*
* Read this code top to bottom, not all comments are repeated.
*/
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include "rijndael-alg.h"
#include "rijndael-api.h"
/* Map a byte (?) address to a word address or vv. */
#define W(a) ((word32 *) (a))
#define B(a) ((word8 *) (a))
#if STRICT_ALIGN
/* This machine checks alignment religiously. (The code is not proper with
* respect to alignment. We need a compiler that doesn't muck about with byte
* arrays that follow words in structs, and that places automatic variables
* at word boundaries if not odd-sized. Most compilers are this nice.)
*/
#define aligned(a) (((unsigned) (a) & 3) == 0)
#define aligned2(a1, a2) aligned((unsigned) (a1) | (unsigned) (a2))
static void blockcpy(void *dst, const void *src)
{
int i= 0;
do {
B(dst)[i+0] = B(src)[i+0];
B(dst)[i+1] = B(src)[i+1];
B(dst)[i+2] = B(src)[i+2];
B(dst)[i+3] = B(src)[i+3];
} while ((i += 4) < 16);
}
#else /* !STRICT_ALIGN */
/* This machine doesn't mind misaligned accesses much. */
#define aligned(a) ((void) (a), 1)
#define aligned2(a1, a2) ((void) (a1), (void) (a2), 1)
#if __GNUC__
__inline
#endif
static void blockcpy(void *dst, const void *src)
{
W(dst)[0] = W(src)[0];
W(dst)[1] = W(src)[1];
W(dst)[2] = W(src)[2];
W(dst)[3] = W(src)[3];
}
#endif /* !STRICT_ALIGN */
#define between(a, c, z) ((unsigned) (c) - (a) <= (unsigned) (z) - (a))
int rijndael_makekey(rd_keyinstance *key,
size_t keylen, const void *keymaterial)
{
word8 k[MAXKC][4];
/* Initialize key schedule: */
if (keylen == RD_KEY_HEX) {
const word8 *kp;
int c, b;
kp= keymaterial;
keylen= 0;
for (;;) {
c= *kp++;
if (between('0', c, '9')) b= (c - '0' + 0x0) << 4;
else
if (between('a', c, 'f')) b= (c - 'a' + 0xa) << 4;
else
if (between('A', c, 'F')) b= (c - 'A' + 0xA) << 4;
else break;
c= *kp++;
if (between('0', c, '9')) b |= (c - '0' + 0x0);
else
if (between('a', c, 'f')) b |= (c - 'a' + 0xa);
else
if (between('A', c, 'F')) b |= (c - 'A' + 0xA);
else break;
if (keylen >= 256/8) return RD_BAD_KEY_MAT;
k[keylen/4][keylen%4] = b;
keylen++;
}
if (c != 0) return RD_BAD_KEY_MAT;
if (keylen != 128/8 && keylen != 192/8 && keylen != 256/8) {
return RD_BAD_KEY_MAT;
}
} else {
if (keylen != 128/8 && keylen != 192/8 && keylen != 256/8) {
return RD_BAD_KEY_MAT;
}
memcpy(k, keymaterial, keylen);
}
key->rounds= keylen * 8 / 32 + 6;
rijndael_KeySched(k, key->encsched, key->rounds);
memcpy(key->decsched, key->encsched, sizeof(key->decsched));
rijndael_KeyEncToDec(key->decsched, key->rounds);
return 0;
}
ssize_t rijndael_ecb_encrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *dummyIV)
{
/* Encrypt blocks of data in Electronic Codebook mode. */
const word8 *inp= input;
word8 *outp= output;
size_t i, nr_blocks, extra;
word32 in[4], out[4];
word8 t;
/* Compute the number of whole blocks, and the extra bytes beyond the
* last block. Those extra bytes, if any, are encrypted by stealing
* enough bytes from the previous encrypted block to make a whole block.
* This is done by encrypting the last block, exchanging the first few
* encrypted bytes with the extra bytes, and encrypting the last whole
* block again.
*/
nr_blocks= length / 16;
if ((extra= (length % 16)) > 0) {
if (nr_blocks == 0) return RD_BAD_BLOCK_LENGTH;
nr_blocks--;
}
/* Encrypt a number of blocks. */
if (aligned2(inp, outp)) {
for (i= 0; i < nr_blocks; i++) {
rijndael_Encrypt(inp, outp, key->encsched, key->rounds);
inp += 16;
outp += 16;
}
} else {
for (i= 0; i < nr_blocks; i++) {
blockcpy(in, inp);
rijndael_Encrypt(in, out, key->encsched, key->rounds);
blockcpy(outp, out);
inp += 16;
outp += 16;
}
}
/* Encrypt extra bytes by stealing from the last full block. */
if (extra > 0) {
blockcpy(in, inp);
rijndael_Encrypt(in, out, key->encsched, key->rounds);
for (i= 0; i < extra; i++) {
t= B(out)[i];
B(out)[i] = inp[16 + i];
outp[16 + i] = t;
}
rijndael_Encrypt(out, out, key->encsched, key->rounds);
blockcpy(outp, out);
}
return length;
}
ssize_t rijndael_ecb_decrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *dummyIV)
{
/* Decrypt blocks of data in Electronic Codebook mode. */
const word8 *inp= input;
word8 *outp= output;
size_t i, nr_blocks, extra;
word32 in[4], out[4];
word8 t;
nr_blocks= length / 16;
if ((extra= (length % 16)) > 0) {
if (nr_blocks == 0) return RD_BAD_BLOCK_LENGTH;
nr_blocks--;
}
/* Decrypt a number of blocks. */
if (aligned2(inp, outp)) {
for (i= 0; i < nr_blocks; i++) {
rijndael_Decrypt(inp, outp, key->decsched, key->rounds);
inp += 16;
outp += 16;
}
} else {
for (i= 0; i < nr_blocks; i++) {
blockcpy(in, inp);
rijndael_Decrypt(in, out, key->decsched, key->rounds);
blockcpy(outp, out);
inp += 16;
outp += 16;
}
}
/* Decrypt extra bytes that stole from the last full block. */
if (extra > 0) {
blockcpy(in, inp);
rijndael_Decrypt(in, out, key->decsched, key->rounds);
for (i= 0; i < extra; i++) {
t= B(out)[i];
B(out)[i] = inp[16 + i];
outp[16 + i] = t;
}
rijndael_Decrypt(out, out, key->decsched, key->rounds);
blockcpy(outp, out);
}
return length;
}
ssize_t rijndael_cbc_encrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *IV)
{
/* Encrypt blocks of data in Cypher Block Chaining mode. */
const word8 *inp= input;
word8 *outp= output;
size_t i, nr_blocks, extra;
word32 in[4], out[4], iv[4], *ivp;
word8 t;
nr_blocks= length / 16;
if ((extra= (length % 16)) > 0) {
if (nr_blocks == 0) return RD_BAD_BLOCK_LENGTH;
nr_blocks--;
}
/* Each input block is first XORed with the previous encryption result.
* The "Initialization Vector" is used to XOR the first block with.
* When done the last crypted block is stored back as the new IV to be
* used for another call to this function.
*/
ivp= aligned(IV) ? IV : (blockcpy(iv, IV), iv);
if (aligned2(inp, outp)) {
for (i= 0; i < nr_blocks; i++) {
in[0] = W(inp)[0] ^ ivp[0];
in[1] = W(inp)[1] ^ ivp[1];
in[2] = W(inp)[2] ^ ivp[2];
in[3] = W(inp)[3] ^ ivp[3];
rijndael_Encrypt(in, outp, key->encsched, key->rounds);
ivp= W(outp);
inp += 16;
outp += 16;
}
} else {
for (i= 0; i < nr_blocks; i++) {
blockcpy(in, inp);
in[0] ^= ivp[0];
in[1] ^= ivp[1];
in[2] ^= ivp[2];
in[3] ^= ivp[3];
rijndael_Encrypt(in, out, key->encsched, key->rounds);
blockcpy(outp, out);
ivp= out;
inp += 16;
outp += 16;
}
}
if (extra > 0) {
blockcpy(in, inp);
in[0] ^= ivp[0];
in[1] ^= ivp[1];
in[2] ^= ivp[2];
in[3] ^= ivp[3];
rijndael_Encrypt(in, out, key->encsched, key->rounds);
for (i= 0; i < extra; i++) {
t= B(out)[i];
B(out)[i] ^= inp[16 + i];
outp[16 + i] = t;
}
rijndael_Encrypt(out, out, key->encsched, key->rounds);
blockcpy(outp, out);
ivp= out;
}
blockcpy(IV, ivp); /* Store last IV back. */
return length;
}
ssize_t rijndael_cbc_decrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *IV)
{
/* Decrypt blocks of data in Cypher Block Chaining mode. */
const word8 *inp= input;
word8 *outp= output;
size_t i, nr_blocks, extra;
word32 in[4], out[4], iv[4];
word8 t;
nr_blocks= length / 16;
if ((extra= (length % 16)) > 0) {
if (nr_blocks == 0) return RD_BAD_BLOCK_LENGTH;
nr_blocks--;
}
blockcpy(iv, IV);
if (aligned2(inp, outp)) {
for (i= 0; i < nr_blocks; i++) {
rijndael_Decrypt(inp, out, key->decsched, key->rounds);
out[0] ^= iv[0];
out[1] ^= iv[1];
out[2] ^= iv[2];
out[3] ^= iv[3];
iv[0] = W(inp)[0];
iv[1] = W(inp)[1];
iv[2] = W(inp)[2];
iv[3] = W(inp)[3];
W(outp)[0] = out[0];
W(outp)[1] = out[1];
W(outp)[2] = out[2];
W(outp)[3] = out[3];
inp += 16;
outp += 16;
}
} else {
for (i= 0; i < nr_blocks; i++) {
blockcpy(in, inp);
rijndael_Decrypt(in, out, key->decsched, key->rounds);
out[0] ^= iv[0];
out[1] ^= iv[1];
out[2] ^= iv[2];
out[3] ^= iv[3];
iv[0] = in[0];
iv[1] = in[1];
iv[2] = in[2];
iv[3] = in[3];
blockcpy(outp, out);
inp += 16;
outp += 16;
}
}
if (extra > 0) {
blockcpy(in, inp);
blockcpy(IV, in);
rijndael_Decrypt(in, out, key->decsched, key->rounds);
for (i= 0; i < extra; i++) {
t= B(out)[i] ^ inp[16 + i];
B(out)[i] = inp[16 + i];
outp[16 + i] = t;
}
rijndael_Decrypt(out, out, key->decsched, key->rounds);
out[0] ^= iv[0];
out[1] ^= iv[1];
out[2] ^= iv[2];
out[3] ^= iv[3];
blockcpy(outp, out);
} else {
blockcpy(IV, iv);
}
return length;
}
ssize_t rijndael_cfb1_encrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *IV)
{
/* Encrypt blocks of data in Cypher Feedback mode, 1 bit at a time. */
const word8 *inp= input;
word8 *outp= output;
word8 t;
size_t i;
int b;
word32 iv[4], civ[4];
blockcpy(iv, IV);
for (i= 0; i < length; i++) {
t= *inp++;
for (b= 0; b < 8; b++) {
rijndael_Encrypt(iv, civ, key->encsched, key->rounds);
t ^= (B(civ)[0] & 0x80) >> b;
B(iv)[ 0] = (B(iv)[ 0] << 1) | (B(iv)[ 1] >> 7);
B(iv)[ 1] = (B(iv)[ 1] << 1) | (B(iv)[ 2] >> 7);
B(iv)[ 2] = (B(iv)[ 2] << 1) | (B(iv)[ 3] >> 7);
B(iv)[ 3] = (B(iv)[ 3] << 1) | (B(iv)[ 4] >> 7);
B(iv)[ 4] = (B(iv)[ 4] << 1) | (B(iv)[ 5] >> 7);
B(iv)[ 5] = (B(iv)[ 5] << 1) | (B(iv)[ 6] >> 7);
B(iv)[ 6] = (B(iv)[ 6] << 1) | (B(iv)[ 7] >> 7);
B(iv)[ 7] = (B(iv)[ 7] << 1) | (B(iv)[ 8] >> 7);
B(iv)[ 8] = (B(iv)[ 8] << 1) | (B(iv)[ 9] >> 7);
B(iv)[ 9] = (B(iv)[ 9] << 1) | (B(iv)[10] >> 7);
B(iv)[10] = (B(iv)[10] << 1) | (B(iv)[11] >> 7);
B(iv)[11] = (B(iv)[11] << 1) | (B(iv)[12] >> 7);
B(iv)[12] = (B(iv)[12] << 1) | (B(iv)[13] >> 7);
B(iv)[13] = (B(iv)[13] << 1) | (B(iv)[14] >> 7);
B(iv)[14] = (B(iv)[14] << 1) | (B(iv)[15] >> 7);
B(iv)[15] = (B(iv)[15] << 1) | ((t >> (7-b)) & 1);
}
*outp++ = t;
}
blockcpy(IV, iv);
return length;
}
ssize_t rijndael_cfb1_decrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *IV)
{
/* Decrypt blocks of data in Cypher Feedback mode, 1 bit at a time. */
const word8 *inp= input;
word8 *outp= output;
word8 t;
size_t i;
int b;
word32 iv[4], civ[4];
blockcpy(iv, IV);
for (i= 0; i < length; i++) {
t= *inp++;
for (b= 0; b < 8; b++) {
rijndael_Encrypt(iv, civ, key->encsched, key->rounds);
B(iv)[ 0] = (B(iv)[ 0] << 1) | (B(iv)[ 1] >> 7);
B(iv)[ 1] = (B(iv)[ 1] << 1) | (B(iv)[ 2] >> 7);
B(iv)[ 2] = (B(iv)[ 2] << 1) | (B(iv)[ 3] >> 7);
B(iv)[ 3] = (B(iv)[ 3] << 1) | (B(iv)[ 4] >> 7);
B(iv)[ 4] = (B(iv)[ 4] << 1) | (B(iv)[ 5] >> 7);
B(iv)[ 5] = (B(iv)[ 5] << 1) | (B(iv)[ 6] >> 7);
B(iv)[ 6] = (B(iv)[ 6] << 1) | (B(iv)[ 7] >> 7);
B(iv)[ 7] = (B(iv)[ 7] << 1) | (B(iv)[ 8] >> 7);
B(iv)[ 8] = (B(iv)[ 8] << 1) | (B(iv)[ 9] >> 7);
B(iv)[ 9] = (B(iv)[ 9] << 1) | (B(iv)[10] >> 7);
B(iv)[10] = (B(iv)[10] << 1) | (B(iv)[11] >> 7);
B(iv)[11] = (B(iv)[11] << 1) | (B(iv)[12] >> 7);
B(iv)[12] = (B(iv)[12] << 1) | (B(iv)[13] >> 7);
B(iv)[13] = (B(iv)[13] << 1) | (B(iv)[14] >> 7);
B(iv)[14] = (B(iv)[14] << 1) | (B(iv)[15] >> 7);
B(iv)[15] = (B(iv)[15] << 1) | ((t >> (7-b)) & 1);
t ^= (B(civ)[0] & 0x80) >> b;
}
*outp++ = t;
}
blockcpy(IV, iv);
return length;
}
ssize_t rijndael_cfb8_encrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *IV)
{
/* Encrypt blocks of data in Cypher Feedback mode, 8 bits at a time. */
const word8 *inp= input;
word8 *outp= output;
word8 t;
size_t i;
word32 iv[4], civ[4];
blockcpy(iv, IV);
for (i= 0; i < length; i++) {
t= *inp++;
rijndael_Encrypt(iv, civ, key->encsched, key->rounds);
t ^= B(civ)[0];
B(iv)[ 0] = B(iv)[ 1];
B(iv)[ 1] = B(iv)[ 2];
B(iv)[ 2] = B(iv)[ 3];
B(iv)[ 3] = B(iv)[ 4];
B(iv)[ 4] = B(iv)[ 5];
B(iv)[ 5] = B(iv)[ 6];
B(iv)[ 6] = B(iv)[ 7];
B(iv)[ 7] = B(iv)[ 8];
B(iv)[ 8] = B(iv)[ 9];
B(iv)[ 9] = B(iv)[10];
B(iv)[10] = B(iv)[11];
B(iv)[11] = B(iv)[12];
B(iv)[12] = B(iv)[13];
B(iv)[13] = B(iv)[14];
B(iv)[14] = B(iv)[15];
B(iv)[15] = t;
*outp++ = t;
}
blockcpy(IV, iv);
return length;
}
ssize_t rijndael_cfb8_decrypt(rd_keyinstance *key,
const void *input, void *output, size_t length, void *IV)
{
/* Decrypt blocks of data in Cypher Feedback mode, 1 byte at a time. */
const word8 *inp= input;
word8 *outp= output;
word8 t;
size_t i;
word32 iv[4], civ[4];
blockcpy(iv, IV);
for (i= 0; i < length; i++) {
t= *inp++;
rijndael_Encrypt(iv, civ, key->encsched, key->rounds);
B(iv)[ 0] = B(iv)[ 1];
B(iv)[ 1] = B(iv)[ 2];
B(iv)[ 2] = B(iv)[ 3];
B(iv)[ 3] = B(iv)[ 4];
B(iv)[ 4] = B(iv)[ 5];
B(iv)[ 5] = B(iv)[ 6];
B(iv)[ 6] = B(iv)[ 7];
B(iv)[ 7] = B(iv)[ 8];
B(iv)[ 8] = B(iv)[ 9];
B(iv)[ 9] = B(iv)[10];
B(iv)[10] = B(iv)[11];
B(iv)[11] = B(iv)[12];
B(iv)[12] = B(iv)[13];
B(iv)[13] = B(iv)[14];
B(iv)[14] = B(iv)[15];
B(iv)[15] = t;
t ^= B(civ)[0];
*outp++ = t;
}
blockcpy(IV, iv);
return length;
}
ssize_t rijndael_pad(void *input, size_t length)
{
/* Adds at most one block of RFC-2040 style padding to the input to make
* it a whole number of blocks for easier encryption. To be used if the
* input may be less then one block in size, otherwise let the encryption
* routines use cypher stealing. The input buffer should allow enough
* space for the padding. The new length of the input is returned.
*/
word8 *inp= input;
size_t padlen;
/* Add padding up until the next block boundary. */
padlen= 16 - (length % 16);
memset(inp + length, padlen, padlen);
return length + padlen;
}
ssize_t rijndael_unpad(const void *input, size_t length)
{
/* Remove RFC-2040 style padding after decryption. The true length of
* the input is returned, or the usual errors if the padding is incorrect.
*/
const word8 *inp= input;
size_t i, padlen;
if (length == 0 || (length % 16) != 0) return RD_BAD_BLOCK_LENGTH;
padlen = inp[length-1];
if (padlen <= 0 || padlen > 16) return RD_BAD_DATA;
for (i= 2; i <= padlen; i++) {
if (inp[length-i] != padlen) return RD_BAD_DATA;
}
return length - padlen;
}
#ifdef INTERMEDIATE_VALUE_KAT
void cipherEncryptUpdateRounds(rd_keyinstance *key,
const void *input, void *output, int rounds)
{
/* Encrypt a block only a specified number of rounds. */
word8 block[4][4];
blockcpy(block, input);
rijndaelEncryptRound(block, key->encsched, key->rounds, rounds);
blockcpy(output, block);
}
void cipherDecryptUpdateRounds(rd_keyinstance *key,
const void *input, void *output, int rounds)
{
/* Decrypt a block only a specified number of rounds. */
word8 block[4][4];
blockcpy(block, input);
rijndaelDecryptRound(block, key->decsched, key->rounds, rounds);
blockcpy(output, block);
}
#endif /* INTERMEDIATE_VALUE_KAT */
/*
* $PchId: rijndael_api.c,v 1.2 2001/01/10 22:01:20 philip Exp $
*/