| /* crypto/evp/e_camellia.c -*- mode:C; c-file-style: "eay" -*- */ |
| /* ==================================================================== |
| * Copyright (c) 2006 The OpenSSL Project. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * 3. All advertising materials mentioning features or use of this |
| * software must display the following acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" |
| * |
| * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
| * endorse or promote products derived from this software without |
| * prior written permission. For written permission, please contact |
| * openssl-core@openssl.org. |
| * |
| * 5. Products derived from this software may not be called "OpenSSL" |
| * nor may "OpenSSL" appear in their names without prior written |
| * permission of the OpenSSL Project. |
| * |
| * 6. Redistributions of any form whatsoever must retain the following |
| * acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit (http://www.openssl.org/)" |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
| * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
| * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| * OF THE POSSIBILITY OF SUCH DAMAGE. |
| * ==================================================================== |
| * |
| * This product includes cryptographic software written by Eric Young |
| * (eay@cryptsoft.com). This product includes software written by Tim |
| * Hudson (tjh@cryptsoft.com). |
| * |
| */ |
| |
| #include <openssl/opensslconf.h> |
| #ifndef OPENSSL_NO_CAMELLIA |
| #include <openssl/evp.h> |
| #include <openssl/err.h> |
| #include <string.h> |
| #include <assert.h> |
| #include <openssl/camellia.h> |
| #include "evp_locl.h" |
| #include "modes_lcl.h" |
| |
| static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc); |
| |
| /* Camellia subkey Structure */ |
| typedef struct |
| { |
| CAMELLIA_KEY ks; |
| block128_f block; |
| union { |
| cbc128_f cbc; |
| ctr128_f ctr; |
| } stream; |
| } EVP_CAMELLIA_KEY; |
| |
| #define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4)) |
| |
| /* Attribute operation for Camellia */ |
| #define data(ctx) EVP_C_DATA(EVP_CAMELLIA_KEY,ctx) |
| |
| #if defined(AES_ASM) && (defined(__sparc) || defined(__sparc__)) |
| /* ---------^^^ this is not a typo, just a way to detect that |
| * assembler support was in general requested... */ |
| #include "sparc_arch.h" |
| |
| extern unsigned int OPENSSL_sparcv9cap_P[]; |
| |
| #define SPARC_CMLL_CAPABLE (OPENSSL_sparcv9cap_P[1] & CFR_CAMELLIA) |
| |
| void cmll_t4_set_key (const unsigned char *key, int bits, |
| CAMELLIA_KEY *ks); |
| void cmll_t4_encrypt (const unsigned char *in, unsigned char *out, |
| const CAMELLIA_KEY *key); |
| void cmll_t4_decrypt (const unsigned char *in, unsigned char *out, |
| const CAMELLIA_KEY *key); |
| |
| void cmll128_t4_cbc_encrypt (const unsigned char *in, unsigned char *out, |
| size_t len, const CAMELLIA_KEY *key, |
| unsigned char *ivec); |
| void cmll128_t4_cbc_decrypt (const unsigned char *in, unsigned char *out, |
| size_t len, const CAMELLIA_KEY *key, |
| unsigned char *ivec); |
| void cmll256_t4_cbc_encrypt (const unsigned char *in, unsigned char *out, |
| size_t len, const CAMELLIA_KEY *key, |
| unsigned char *ivec); |
| void cmll256_t4_cbc_decrypt (const unsigned char *in, unsigned char *out, |
| size_t len, const CAMELLIA_KEY *key, |
| unsigned char *ivec); |
| void cmll128_t4_ctr32_encrypt (const unsigned char *in, unsigned char *out, |
| size_t blocks, const CAMELLIA_KEY *key, |
| unsigned char *ivec); |
| void cmll256_t4_ctr32_encrypt (const unsigned char *in, unsigned char *out, |
| size_t blocks, const CAMELLIA_KEY *key, |
| unsigned char *ivec); |
| |
| static int cmll_t4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc) |
| { |
| int ret, mode, bits; |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| mode = ctx->cipher->flags & EVP_CIPH_MODE; |
| bits = ctx->key_len*8; |
| |
| cmll_t4_set_key(key, bits, &dat->ks); |
| |
| if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) |
| && !enc) |
| { |
| ret = 0; |
| dat->block = (block128_f)cmll_t4_decrypt; |
| switch (bits) { |
| case 128: |
| dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? |
| (cbc128_f)cmll128_t4_cbc_decrypt : |
| NULL; |
| break; |
| case 192: |
| case 256: |
| dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? |
| (cbc128_f)cmll256_t4_cbc_decrypt : |
| NULL; |
| break; |
| default: |
| ret = -1; |
| } |
| } |
| else { |
| ret = 0; |
| dat->block = (block128_f)cmll_t4_encrypt; |
| switch (bits) { |
| case 128: |
| if (mode==EVP_CIPH_CBC_MODE) |
| dat->stream.cbc = (cbc128_f)cmll128_t4_cbc_encrypt; |
| else if (mode==EVP_CIPH_CTR_MODE) |
| dat->stream.ctr = (ctr128_f)cmll128_t4_ctr32_encrypt; |
| else |
| dat->stream.cbc = NULL; |
| break; |
| case 192: |
| case 256: |
| if (mode==EVP_CIPH_CBC_MODE) |
| dat->stream.cbc = (cbc128_f)cmll256_t4_cbc_encrypt; |
| else if (mode==EVP_CIPH_CTR_MODE) |
| dat->stream.ctr = (ctr128_f)cmll256_t4_ctr32_encrypt; |
| else |
| dat->stream.cbc = NULL; |
| break; |
| default: |
| ret = -1; |
| } |
| } |
| |
| if(ret < 0) |
| { |
| EVPerr(EVP_F_CMLL_T4_INIT_KEY,EVP_R_CAMELLIA_KEY_SETUP_FAILED); |
| return 0; |
| } |
| |
| return 1; |
| } |
| |
| #define cmll_t4_cbc_cipher camellia_cbc_cipher |
| static int cmll_t4_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in, size_t len); |
| |
| #define cmll_t4_ecb_cipher camellia_ecb_cipher |
| static int cmll_t4_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in, size_t len); |
| |
| #define cmll_t4_ofb_cipher camellia_ofb_cipher |
| static int cmll_t4_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len); |
| |
| #define cmll_t4_cfb_cipher camellia_cfb_cipher |
| static int cmll_t4_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len); |
| |
| #define cmll_t4_cfb8_cipher camellia_cfb8_cipher |
| static int cmll_t4_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len); |
| |
| #define cmll_t4_cfb1_cipher camellia_cfb1_cipher |
| static int cmll_t4_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len); |
| |
| #define cmll_t4_ctr_cipher camellia_ctr_cipher |
| static int cmll_t4_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, size_t len); |
| |
| #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ |
| static const EVP_CIPHER cmll_t4_##keylen##_##mode = { \ |
| nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ |
| flags|EVP_CIPH_##MODE##_MODE, \ |
| cmll_t4_init_key, \ |
| cmll_t4_##mode##_cipher, \ |
| NULL, \ |
| sizeof(EVP_CAMELLIA_KEY), \ |
| NULL,NULL,NULL,NULL }; \ |
| static const EVP_CIPHER camellia_##keylen##_##mode = { \ |
| nid##_##keylen##_##nmode,blocksize, \ |
| keylen/8,ivlen, \ |
| flags|EVP_CIPH_##MODE##_MODE, \ |
| camellia_init_key, \ |
| camellia_##mode##_cipher, \ |
| NULL, \ |
| sizeof(EVP_CAMELLIA_KEY), \ |
| NULL,NULL,NULL,NULL }; \ |
| const EVP_CIPHER *EVP_camellia_##keylen##_##mode(void) \ |
| { return SPARC_CMLL_CAPABLE?&cmll_t4_##keylen##_##mode:&camellia_##keylen##_##mode; } |
| |
| #else |
| |
| #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ |
| static const EVP_CIPHER camellia_##keylen##_##mode = { \ |
| nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ |
| flags|EVP_CIPH_##MODE##_MODE, \ |
| camellia_init_key, \ |
| camellia_##mode##_cipher, \ |
| NULL, \ |
| sizeof(EVP_CAMELLIA_KEY), \ |
| NULL,NULL,NULL,NULL }; \ |
| const EVP_CIPHER *EVP_camellia_##keylen##_##mode(void) \ |
| { return &camellia_##keylen##_##mode; } |
| |
| #endif |
| |
| #define BLOCK_CIPHER_generic_pack(nid,keylen,flags) \ |
| BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ |
| BLOCK_CIPHER_generic(nid,keylen,16,0,ecb,ecb,ECB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ |
| BLOCK_CIPHER_generic(nid,keylen,1,16,ofb128,ofb,OFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ |
| BLOCK_CIPHER_generic(nid,keylen,1,16,cfb128,cfb,CFB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ |
| BLOCK_CIPHER_generic(nid,keylen,1,16,cfb1,cfb1,CFB,flags) \ |
| BLOCK_CIPHER_generic(nid,keylen,1,16,cfb8,cfb8,CFB,flags) |
| #if 0 /* not yet, missing NID */ |
| BLOCK_CIPHER_generic(nid,keylen,1,16,ctr,ctr,CTR,flags) |
| #endif |
| |
| /* The subkey for Camellia is generated. */ |
| static int camellia_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
| const unsigned char *iv, int enc) |
| { |
| int ret, mode; |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| ret=Camellia_set_key(key, ctx->key_len * 8, &dat->ks); |
| if(ret < 0) |
| { |
| EVPerr(EVP_F_CAMELLIA_INIT_KEY,EVP_R_CAMELLIA_KEY_SETUP_FAILED); |
| return 0; |
| } |
| |
| mode = ctx->cipher->flags & EVP_CIPH_MODE; |
| if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) |
| && !enc) |
| { |
| dat->block = (block128_f)Camellia_decrypt; |
| dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? |
| (cbc128_f)Camellia_cbc_encrypt : |
| NULL; |
| } |
| else |
| { |
| dat->block = (block128_f)Camellia_encrypt; |
| dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? |
| (cbc128_f)Camellia_cbc_encrypt : |
| NULL; |
| } |
| |
| |
| return 1; |
| } |
| |
| static int camellia_cbc_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in, size_t len) |
| { |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| if (dat->stream.cbc) |
| (*dat->stream.cbc)(in,out,len,&dat->ks,ctx->iv,ctx->encrypt); |
| else if (ctx->encrypt) |
| CRYPTO_cbc128_encrypt(in,out,len,&dat->ks,ctx->iv,dat->block); |
| else |
| CRYPTO_cbc128_decrypt(in,out,len,&dat->ks,ctx->iv,dat->block); |
| |
| return 1; |
| } |
| |
| static int camellia_ecb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in, size_t len) |
| { |
| size_t bl = ctx->cipher->block_size; |
| size_t i; |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| if (len<bl) return 1; |
| |
| for (i=0,len-=bl;i<=len;i+=bl) |
| (*dat->block)(in+i,out+i,&dat->ks); |
| |
| return 1; |
| } |
| |
| static int camellia_ofb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len) |
| { |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| CRYPTO_ofb128_encrypt(in,out,len,&dat->ks, |
| ctx->iv,&ctx->num,dat->block); |
| return 1; |
| } |
| |
| static int camellia_cfb_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len) |
| { |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| CRYPTO_cfb128_encrypt(in,out,len,&dat->ks, |
| ctx->iv,&ctx->num,ctx->encrypt,dat->block); |
| return 1; |
| } |
| |
| static int camellia_cfb8_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len) |
| { |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| CRYPTO_cfb128_8_encrypt(in,out,len,&dat->ks, |
| ctx->iv,&ctx->num,ctx->encrypt,dat->block); |
| return 1; |
| } |
| |
| static int camellia_cfb1_cipher(EVP_CIPHER_CTX *ctx,unsigned char *out, |
| const unsigned char *in,size_t len) |
| { |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| if (ctx->flags&EVP_CIPH_FLAG_LENGTH_BITS) { |
| CRYPTO_cfb128_1_encrypt(in,out,len,&dat->ks, |
| ctx->iv,&ctx->num,ctx->encrypt,dat->block); |
| return 1; |
| } |
| |
| while (len>=MAXBITCHUNK) { |
| CRYPTO_cfb128_1_encrypt(in,out,MAXBITCHUNK*8,&dat->ks, |
| ctx->iv,&ctx->num,ctx->encrypt,dat->block); |
| len-=MAXBITCHUNK; |
| } |
| if (len) |
| CRYPTO_cfb128_1_encrypt(in,out,len*8,&dat->ks, |
| ctx->iv,&ctx->num,ctx->encrypt,dat->block); |
| |
| return 1; |
| } |
| |
| #if 0 /* not yet, missing NID */ |
| static int camellia_ctr_cipher (EVP_CIPHER_CTX *ctx, unsigned char *out, |
| const unsigned char *in, size_t len) |
| { |
| unsigned int num = ctx->num; |
| EVP_CAMELLIA_KEY *dat = (EVP_CAMELLIA_KEY *)ctx->cipher_data; |
| |
| if (dat->stream.ctr) |
| CRYPTO_ctr128_encrypt_ctr32(in,out,len,&dat->ks, |
| ctx->iv,ctx->buf,&num,dat->stream.ctr); |
| else |
| CRYPTO_ctr128_encrypt(in,out,len,&dat->ks, |
| ctx->iv,ctx->buf,&num,dat->block); |
| ctx->num = (size_t)num; |
| return 1; |
| } |
| #endif |
| |
| BLOCK_CIPHER_generic_pack(NID_camellia,128,0) |
| BLOCK_CIPHER_generic_pack(NID_camellia,192,0) |
| BLOCK_CIPHER_generic_pack(NID_camellia,256,0) |
| |
| #else |
| |
| # ifdef PEDANTIC |
| static void *dummy=&dummy; |
| # endif |
| |
| #endif |