xref: /openbsd-src/sys/crypto/michael.c (revision fa68441871b7d13f84a2b7d2cea80e4ca4c33a75)
1*fa684418Sdamien /*	$OpenBSD: michael.c,v 1.2 2008/07/21 19:52:45 damien Exp $	*/
23eff7d12Sreyk 
33eff7d12Sreyk /*
43eff7d12Sreyk  * Copyright (c) 2005, 2006 Reyk Floeter <reyk@openbsd.org>
53eff7d12Sreyk  *
63eff7d12Sreyk  * Permission to use, copy, modify, and distribute this software for any
73eff7d12Sreyk  * purpose with or without fee is hereby granted, provided that the above
83eff7d12Sreyk  * copyright notice and this permission notice appear in all copies.
93eff7d12Sreyk  *
103eff7d12Sreyk  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
113eff7d12Sreyk  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
123eff7d12Sreyk  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
133eff7d12Sreyk  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
143eff7d12Sreyk  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
153eff7d12Sreyk  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
163eff7d12Sreyk  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
173eff7d12Sreyk  */
183eff7d12Sreyk 
193eff7d12Sreyk /*
203eff7d12Sreyk  * Implementation of the Michael MIC as defined in IEEE 802.11i for TKIP.
213eff7d12Sreyk  * The MIC generates a 64bit digest, which shouldn't be used for any other
223eff7d12Sreyk  * applications except TKIP.
233eff7d12Sreyk  */
243eff7d12Sreyk 
253eff7d12Sreyk #include <sys/param.h>
263eff7d12Sreyk #include <sys/systm.h>
273eff7d12Sreyk 
283eff7d12Sreyk #include <crypto/michael.h>
293eff7d12Sreyk 
303eff7d12Sreyk #define ROL(n, x)	(((x) << (n)) | ((x) >> (32 - (n))))
313eff7d12Sreyk #define ROR(n, x)	(((x) >> (n)) | ((x) << (32 - (n))))
32*fa684418Sdamien #define XSWAP(x)	(((x) & 0xff00ff00UL) >> 8 | ((x) & 0x00ff00ffUL) << 8)
33*fa684418Sdamien 
34*fa684418Sdamien #if defined(__STRICT_ALIGNMENT) || _BYTE_ORDER != _LITTLE_ENDIAN
35*fa684418Sdamien #define GETLE32(x)	((x)[0] | (x)[1] << 8 | (x)[2] << 16 | (x)[3] << 24)
36*fa684418Sdamien #define PUTLE32(x, v)	((x)[0] = (u_int8_t)(v),			\
37*fa684418Sdamien 			 (x)[1] = (u_int8_t)((v) >> 8),			\
38*fa684418Sdamien 			 (x)[2] = (u_int8_t)((v) >> 16),		\
39*fa684418Sdamien 			 (x)[3] = (u_int8_t)((v) >> 24))
40*fa684418Sdamien #else
41*fa684418Sdamien #define GETLE32(x)	(*((u_int32_t *)(x)))
42*fa684418Sdamien #define PUTLE32(x, v)	(*((u_int32_t *)(x)) = (v))
43*fa684418Sdamien #endif
443eff7d12Sreyk 
453eff7d12Sreyk #define MICHAEL_BLOCK(l, r) do {					\
463eff7d12Sreyk 	r ^= ROL(17, l);						\
473eff7d12Sreyk 	l += r;								\
483eff7d12Sreyk 	r ^= XSWAP(l);							\
493eff7d12Sreyk 	l += r;								\
503eff7d12Sreyk 	r ^= ROL(3, l);							\
513eff7d12Sreyk 	l += r;								\
523eff7d12Sreyk 	r ^= ROR(2, l);							\
533eff7d12Sreyk 	l += r;								\
543eff7d12Sreyk } while (0)
553eff7d12Sreyk 
563eff7d12Sreyk void
michael_init(MICHAEL_CTX * ctx)573eff7d12Sreyk michael_init(MICHAEL_CTX *ctx)
583eff7d12Sreyk {
593eff7d12Sreyk 	bzero(ctx, sizeof(MICHAEL_CTX));
603eff7d12Sreyk }
613eff7d12Sreyk 
623eff7d12Sreyk void
michael_update(MICHAEL_CTX * ctx,const u_int8_t * data,u_int len)633eff7d12Sreyk michael_update(MICHAEL_CTX *ctx, const u_int8_t *data, u_int len)
643eff7d12Sreyk {
653eff7d12Sreyk 	int i;
663eff7d12Sreyk 
673eff7d12Sreyk 	for (i = 0; i < len; i++) {
683eff7d12Sreyk 		ctx->michael_state |= data[i] << (ctx->michael_count << 3);
693eff7d12Sreyk 		ctx->michael_count++;
703eff7d12Sreyk 
713eff7d12Sreyk 		if (ctx->michael_count >= MICHAEL_RAW_BLOCK_LENGTH) {
723eff7d12Sreyk 			ctx->michael_l ^= ctx->michael_state;
733eff7d12Sreyk 			MICHAEL_BLOCK(ctx->michael_l, ctx->michael_r);
743eff7d12Sreyk 			ctx->michael_state = ctx->michael_count = 0;
753eff7d12Sreyk 		}
763eff7d12Sreyk 	}
773eff7d12Sreyk }
783eff7d12Sreyk 
793eff7d12Sreyk void
michael_final(u_int8_t digest[MICHAEL_DIGEST_LENGTH],MICHAEL_CTX * ctx)803eff7d12Sreyk michael_final(u_int8_t digest[MICHAEL_DIGEST_LENGTH], MICHAEL_CTX *ctx)
813eff7d12Sreyk {
82*fa684418Sdamien 	static const u_int8_t pad[] =
83*fa684418Sdamien 	    { 0x5a, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
843eff7d12Sreyk 
853eff7d12Sreyk 	michael_update(ctx, pad, sizeof(pad));
863eff7d12Sreyk 
87*fa684418Sdamien 	PUTLE32(digest, ctx->michael_l);
88*fa684418Sdamien 	PUTLE32(digest + MICHAEL_RAW_BLOCK_LENGTH, ctx->michael_r);
893eff7d12Sreyk }
903eff7d12Sreyk 
913eff7d12Sreyk void
michael_key(const u_int8_t * key,MICHAEL_CTX * ctx)923eff7d12Sreyk michael_key(const u_int8_t *key, MICHAEL_CTX *ctx)
933eff7d12Sreyk {
943eff7d12Sreyk 	ctx->michael_l = ctx->michael_key[0] =
95*fa684418Sdamien 	    GETLE32(key);
963eff7d12Sreyk 	ctx->michael_r = ctx->michael_key[1] =
97*fa684418Sdamien 	    GETLE32(key + MICHAEL_RAW_BLOCK_LENGTH);
983eff7d12Sreyk }
99