18dbcf02cSchristos /*
2*3c260e60Schristos * AES Key Wrap Algorithm (RFC3394)
38dbcf02cSchristos *
48dbcf02cSchristos * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
58dbcf02cSchristos *
6e604d861Schristos * This software may be distributed under the terms of the BSD license.
7e604d861Schristos * See README for more details.
88dbcf02cSchristos */
98dbcf02cSchristos
108dbcf02cSchristos #include "includes.h"
118dbcf02cSchristos
128dbcf02cSchristos #include "common.h"
138dbcf02cSchristos #include "aes.h"
148dbcf02cSchristos #include "aes_wrap.h"
158dbcf02cSchristos
168dbcf02cSchristos /**
17*3c260e60Schristos * aes_wrap - Wrap keys with AES Key Wrap Algorithm (RFC3394)
18*3c260e60Schristos * @kek: Key encryption key (KEK)
19*3c260e60Schristos * @kek_len: Length of KEK in octets
208dbcf02cSchristos * @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16
218dbcf02cSchristos * bytes
228dbcf02cSchristos * @plain: Plaintext key to be wrapped, n * 64 bits
238dbcf02cSchristos * @cipher: Wrapped key, (n + 1) * 64 bits
248dbcf02cSchristos * Returns: 0 on success, -1 on failure
258dbcf02cSchristos */
aes_wrap(const u8 * kek,size_t kek_len,int n,const u8 * plain,u8 * cipher)26*3c260e60Schristos int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher)
278dbcf02cSchristos {
28*3c260e60Schristos u8 *a, *r, b[AES_BLOCK_SIZE];
298dbcf02cSchristos int i, j;
308dbcf02cSchristos void *ctx;
31*3c260e60Schristos unsigned int t;
328dbcf02cSchristos
338dbcf02cSchristos a = cipher;
348dbcf02cSchristos r = cipher + 8;
358dbcf02cSchristos
368dbcf02cSchristos /* 1) Initialize variables. */
378dbcf02cSchristos os_memset(a, 0xa6, 8);
388dbcf02cSchristos os_memcpy(r, plain, 8 * n);
398dbcf02cSchristos
40*3c260e60Schristos ctx = aes_encrypt_init(kek, kek_len);
418dbcf02cSchristos if (ctx == NULL)
428dbcf02cSchristos return -1;
438dbcf02cSchristos
448dbcf02cSchristos /* 2) Calculate intermediate values.
458dbcf02cSchristos * For j = 0 to 5
468dbcf02cSchristos * For i=1 to n
478dbcf02cSchristos * B = AES(K, A | R[i])
488dbcf02cSchristos * A = MSB(64, B) ^ t where t = (n*j)+i
498dbcf02cSchristos * R[i] = LSB(64, B)
508dbcf02cSchristos */
518dbcf02cSchristos for (j = 0; j <= 5; j++) {
528dbcf02cSchristos r = cipher + 8;
538dbcf02cSchristos for (i = 1; i <= n; i++) {
548dbcf02cSchristos os_memcpy(b, a, 8);
558dbcf02cSchristos os_memcpy(b + 8, r, 8);
568dbcf02cSchristos aes_encrypt(ctx, b, b);
578dbcf02cSchristos os_memcpy(a, b, 8);
58*3c260e60Schristos t = n * j + i;
59*3c260e60Schristos a[7] ^= t;
60*3c260e60Schristos a[6] ^= t >> 8;
61*3c260e60Schristos a[5] ^= t >> 16;
62*3c260e60Schristos a[4] ^= t >> 24;
638dbcf02cSchristos os_memcpy(r, b + 8, 8);
648dbcf02cSchristos r += 8;
658dbcf02cSchristos }
668dbcf02cSchristos }
678dbcf02cSchristos aes_encrypt_deinit(ctx);
688dbcf02cSchristos
698dbcf02cSchristos /* 3) Output the results.
708dbcf02cSchristos *
718dbcf02cSchristos * These are already in @cipher due to the location of temporary
728dbcf02cSchristos * variables.
738dbcf02cSchristos */
748dbcf02cSchristos
758dbcf02cSchristos return 0;
768dbcf02cSchristos }
77