xref: /minix3/external/bsd/bind/dist/lib/isc/aes.c (revision 00b67f09dd46474d133c95011a48590a8e8f94c7)
1*00b67f09SDavid van Moolenbroek /*	$NetBSD: aes.c,v 1.1.1.4 2014/12/10 03:34:43 christos Exp $	*/
2*00b67f09SDavid van Moolenbroek 
3*00b67f09SDavid van Moolenbroek /*
4*00b67f09SDavid van Moolenbroek  * Copyright (C) 2014  Internet Systems Consortium, Inc. ("ISC")
5*00b67f09SDavid van Moolenbroek  *
6*00b67f09SDavid van Moolenbroek  * Permission to use, copy, modify, and/or distribute this software for any
7*00b67f09SDavid van Moolenbroek  * purpose with or without fee is hereby granted, provided that the above
8*00b67f09SDavid van Moolenbroek  * copyright notice and this permission notice appear in all copies.
9*00b67f09SDavid van Moolenbroek  *
10*00b67f09SDavid van Moolenbroek  * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
11*00b67f09SDavid van Moolenbroek  * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
12*00b67f09SDavid van Moolenbroek  * AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
13*00b67f09SDavid van Moolenbroek  * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
14*00b67f09SDavid van Moolenbroek  * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
15*00b67f09SDavid van Moolenbroek  * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
16*00b67f09SDavid van Moolenbroek  * PERFORMANCE OF THIS SOFTWARE.
17*00b67f09SDavid van Moolenbroek  */
18*00b67f09SDavid van Moolenbroek 
19*00b67f09SDavid van Moolenbroek /* Id */
20*00b67f09SDavid van Moolenbroek 
21*00b67f09SDavid van Moolenbroek /*! \file isc/aes.c */
22*00b67f09SDavid van Moolenbroek 
23*00b67f09SDavid van Moolenbroek #include "config.h"
24*00b67f09SDavid van Moolenbroek 
25*00b67f09SDavid van Moolenbroek #include <isc/assertions.h>
26*00b67f09SDavid van Moolenbroek #include <isc/aes.h>
27*00b67f09SDavid van Moolenbroek #include <isc/platform.h>
28*00b67f09SDavid van Moolenbroek #include <isc/string.h>
29*00b67f09SDavid van Moolenbroek #include <isc/types.h>
30*00b67f09SDavid van Moolenbroek #include <isc/util.h>
31*00b67f09SDavid van Moolenbroek 
32*00b67f09SDavid van Moolenbroek #ifdef ISC_PLATFORM_WANTAES
33*00b67f09SDavid van Moolenbroek #if HAVE_OPENSSL_EVP_AES
34*00b67f09SDavid van Moolenbroek 
35*00b67f09SDavid van Moolenbroek #include <openssl/evp.h>
36*00b67f09SDavid van Moolenbroek 
37*00b67f09SDavid van Moolenbroek void
isc_aes128_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)38*00b67f09SDavid van Moolenbroek isc_aes128_crypt(const unsigned char *key, const unsigned char *in,
39*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
40*00b67f09SDavid van Moolenbroek {
41*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX c;
42*00b67f09SDavid van Moolenbroek 	int len;
43*00b67f09SDavid van Moolenbroek 
44*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX_init(&c);
45*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_EncryptInit(&c, EVP_aes_128_ecb(), key, NULL) == 1);
46*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX_set_padding(&c, 0);
47*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_EncryptUpdate(&c, out, &len, in,
48*00b67f09SDavid van Moolenbroek 					ISC_AES_BLOCK_LENGTH) == 1);
49*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(len == ISC_AES_BLOCK_LENGTH);
50*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_CIPHER_CTX_cleanup(&c) == 1);
51*00b67f09SDavid van Moolenbroek }
52*00b67f09SDavid van Moolenbroek 
53*00b67f09SDavid van Moolenbroek void
isc_aes192_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)54*00b67f09SDavid van Moolenbroek isc_aes192_crypt(const unsigned char *key, const unsigned char *in,
55*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
56*00b67f09SDavid van Moolenbroek {
57*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX c;
58*00b67f09SDavid van Moolenbroek 	int len;
59*00b67f09SDavid van Moolenbroek 
60*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX_init(&c);
61*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_EncryptInit(&c, EVP_aes_192_ecb(), key, NULL) == 1);
62*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX_set_padding(&c, 0);
63*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_EncryptUpdate(&c, out, &len, in,
64*00b67f09SDavid van Moolenbroek 					ISC_AES_BLOCK_LENGTH) == 1);
65*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(len == ISC_AES_BLOCK_LENGTH);
66*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_CIPHER_CTX_cleanup(&c) == 1);
67*00b67f09SDavid van Moolenbroek }
68*00b67f09SDavid van Moolenbroek 
69*00b67f09SDavid van Moolenbroek void
isc_aes256_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)70*00b67f09SDavid van Moolenbroek isc_aes256_crypt(const unsigned char *key, const unsigned char *in,
71*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
72*00b67f09SDavid van Moolenbroek {
73*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX c;
74*00b67f09SDavid van Moolenbroek 	int len;
75*00b67f09SDavid van Moolenbroek 
76*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX_init(&c);
77*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_EncryptInit(&c, EVP_aes_256_ecb(), key, NULL) == 1);
78*00b67f09SDavid van Moolenbroek 	EVP_CIPHER_CTX_set_padding(&c, 0);
79*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_EncryptUpdate(&c, out, &len, in,
80*00b67f09SDavid van Moolenbroek 					ISC_AES_BLOCK_LENGTH) == 1);
81*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(len == ISC_AES_BLOCK_LENGTH);
82*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(EVP_CIPHER_CTX_cleanup(&c) == 1);
83*00b67f09SDavid van Moolenbroek }
84*00b67f09SDavid van Moolenbroek 
85*00b67f09SDavid van Moolenbroek #elif HAVE_OPENSSL_AES
86*00b67f09SDavid van Moolenbroek 
87*00b67f09SDavid van Moolenbroek #include <openssl/aes.h>
88*00b67f09SDavid van Moolenbroek 
89*00b67f09SDavid van Moolenbroek void
isc_aes128_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)90*00b67f09SDavid van Moolenbroek isc_aes128_crypt(const unsigned char *key, const unsigned char *in,
91*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
92*00b67f09SDavid van Moolenbroek {
93*00b67f09SDavid van Moolenbroek 	AES_KEY k;
94*00b67f09SDavid van Moolenbroek 
95*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(AES_set_encrypt_key(key, 128, &k) == 0);
96*00b67f09SDavid van Moolenbroek 	AES_encrypt(in, out, &k);
97*00b67f09SDavid van Moolenbroek }
98*00b67f09SDavid van Moolenbroek 
99*00b67f09SDavid van Moolenbroek void
isc_aes192_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)100*00b67f09SDavid van Moolenbroek isc_aes192_crypt(const unsigned char *key, const unsigned char *in,
101*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
102*00b67f09SDavid van Moolenbroek {
103*00b67f09SDavid van Moolenbroek 	AES_KEY k;
104*00b67f09SDavid van Moolenbroek 
105*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(AES_set_encrypt_key(key, 192, &k) == 0);
106*00b67f09SDavid van Moolenbroek 	AES_encrypt(in, out, &k);
107*00b67f09SDavid van Moolenbroek }
108*00b67f09SDavid van Moolenbroek 
109*00b67f09SDavid van Moolenbroek void
isc_aes256_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)110*00b67f09SDavid van Moolenbroek isc_aes256_crypt(const unsigned char *key, const unsigned char *in,
111*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
112*00b67f09SDavid van Moolenbroek {
113*00b67f09SDavid van Moolenbroek 	AES_KEY k;
114*00b67f09SDavid van Moolenbroek 
115*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(AES_set_encrypt_key(key, 256, &k) == 0);
116*00b67f09SDavid van Moolenbroek 	AES_encrypt(in, out, &k);
117*00b67f09SDavid van Moolenbroek }
118*00b67f09SDavid van Moolenbroek 
119*00b67f09SDavid van Moolenbroek #elif PKCS11CRYPTO
120*00b67f09SDavid van Moolenbroek 
121*00b67f09SDavid van Moolenbroek #include <pk11/pk11.h>
122*00b67f09SDavid van Moolenbroek #include <pk11/internal.h>
123*00b67f09SDavid van Moolenbroek 
124*00b67f09SDavid van Moolenbroek static CK_BBOOL truevalue = TRUE;
125*00b67f09SDavid van Moolenbroek static CK_BBOOL falsevalue = FALSE;
126*00b67f09SDavid van Moolenbroek 
127*00b67f09SDavid van Moolenbroek static void isc_aes_crypt(const unsigned char *key, CK_ULONG keylen,
128*00b67f09SDavid van Moolenbroek 			  const unsigned char *in, unsigned char *out);
129*00b67f09SDavid van Moolenbroek 
130*00b67f09SDavid van Moolenbroek void
isc_aes128_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)131*00b67f09SDavid van Moolenbroek isc_aes128_crypt(const unsigned char *key, const unsigned char *in,
132*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
133*00b67f09SDavid van Moolenbroek {
134*00b67f09SDavid van Moolenbroek 	isc_aes_crypt(key, ISC_AES128_KEYLENGTH, in, out);
135*00b67f09SDavid van Moolenbroek }
136*00b67f09SDavid van Moolenbroek 
137*00b67f09SDavid van Moolenbroek void
isc_aes192_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)138*00b67f09SDavid van Moolenbroek isc_aes192_crypt(const unsigned char *key, const unsigned char *in,
139*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
140*00b67f09SDavid van Moolenbroek {
141*00b67f09SDavid van Moolenbroek 	isc_aes_crypt(key, ISC_AES192_KEYLENGTH, in, out);
142*00b67f09SDavid van Moolenbroek }
143*00b67f09SDavid van Moolenbroek 
144*00b67f09SDavid van Moolenbroek void
isc_aes256_crypt(const unsigned char * key,const unsigned char * in,unsigned char * out)145*00b67f09SDavid van Moolenbroek isc_aes256_crypt(const unsigned char *key, const unsigned char *in,
146*00b67f09SDavid van Moolenbroek 		 unsigned char *out)
147*00b67f09SDavid van Moolenbroek {
148*00b67f09SDavid van Moolenbroek 	isc_aes_crypt(key, ISC_AES256_KEYLENGTH, in, out);
149*00b67f09SDavid van Moolenbroek }
150*00b67f09SDavid van Moolenbroek 
151*00b67f09SDavid van Moolenbroek static void
isc_aes_crypt(const unsigned char * key,CK_ULONG keylen,const unsigned char * in,unsigned char * out)152*00b67f09SDavid van Moolenbroek isc_aes_crypt(const unsigned char *key, CK_ULONG keylen,
153*00b67f09SDavid van Moolenbroek 	      const unsigned char *in, unsigned char *out)
154*00b67f09SDavid van Moolenbroek {
155*00b67f09SDavid van Moolenbroek 	CK_RV rv;
156*00b67f09SDavid van Moolenbroek 	CK_MECHANISM mech = { CKM_AES_ECB, NULL, 0 };
157*00b67f09SDavid van Moolenbroek 	CK_OBJECT_CLASS keyClass = CKO_SECRET_KEY;
158*00b67f09SDavid van Moolenbroek 	CK_KEY_TYPE keyType = CKK_AES;
159*00b67f09SDavid van Moolenbroek 	CK_ATTRIBUTE keyTemplate[] =
160*00b67f09SDavid van Moolenbroek 	{
161*00b67f09SDavid van Moolenbroek 		{ CKA_CLASS, &keyClass, (CK_ULONG) sizeof(keyClass) },
162*00b67f09SDavid van Moolenbroek 		{ CKA_KEY_TYPE, &keyType, (CK_ULONG) sizeof(keyType) },
163*00b67f09SDavid van Moolenbroek 		{ CKA_TOKEN, &falsevalue, (CK_ULONG) sizeof(falsevalue) },
164*00b67f09SDavid van Moolenbroek 		{ CKA_PRIVATE, &falsevalue, (CK_ULONG) sizeof(falsevalue) },
165*00b67f09SDavid van Moolenbroek 		{ CKA_ENCRYPT, &truevalue, (CK_ULONG) sizeof(truevalue) },
166*00b67f09SDavid van Moolenbroek 		{ CKA_VALUE, NULL, keylen }
167*00b67f09SDavid van Moolenbroek 	};
168*00b67f09SDavid van Moolenbroek 	CK_ULONG blocklen;
169*00b67f09SDavid van Moolenbroek 	CK_BYTE_PTR pData;
170*00b67f09SDavid van Moolenbroek 	pk11_context_t ctx;
171*00b67f09SDavid van Moolenbroek 
172*00b67f09SDavid van Moolenbroek 	DE_CONST(key, keyTemplate[5].pValue);
173*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(pk11_get_session(&ctx, OP_AES, ISC_TRUE, ISC_FALSE,
174*00b67f09SDavid van Moolenbroek 				       ISC_FALSE, NULL, 0) == ISC_R_SUCCESS);
175*00b67f09SDavid van Moolenbroek 	ctx.object = CK_INVALID_HANDLE;
176*00b67f09SDavid van Moolenbroek 	PK11_FATALCHECK(pkcs_C_CreateObject,
177*00b67f09SDavid van Moolenbroek 			(ctx.session, keyTemplate,
178*00b67f09SDavid van Moolenbroek 			 (CK_ULONG) 6, &ctx.object));
179*00b67f09SDavid van Moolenbroek 	INSIST(ctx.object != CK_INVALID_HANDLE);
180*00b67f09SDavid van Moolenbroek 	PK11_FATALCHECK(pkcs_C_EncryptInit,
181*00b67f09SDavid van Moolenbroek 			(ctx.session, &mech, ctx.object));
182*00b67f09SDavid van Moolenbroek 
183*00b67f09SDavid van Moolenbroek 	DE_CONST(in, pData);
184*00b67f09SDavid van Moolenbroek 	blocklen = (CK_ULONG) ISC_AES_BLOCK_LENGTH;
185*00b67f09SDavid van Moolenbroek 	PK11_FATALCHECK(pkcs_C_Encrypt,
186*00b67f09SDavid van Moolenbroek 			(ctx.session,
187*00b67f09SDavid van Moolenbroek 			 pData, (CK_ULONG) ISC_AES_BLOCK_LENGTH,
188*00b67f09SDavid van Moolenbroek 			 out, &blocklen));
189*00b67f09SDavid van Moolenbroek 	RUNTIME_CHECK(blocklen == (CK_ULONG) ISC_AES_BLOCK_LENGTH);
190*00b67f09SDavid van Moolenbroek 
191*00b67f09SDavid van Moolenbroek 	(void) pkcs_C_DestroyObject(ctx.session, ctx.object);
192*00b67f09SDavid van Moolenbroek 	ctx.object = CK_INVALID_HANDLE;
193*00b67f09SDavid van Moolenbroek 	pk11_return_session(&ctx);
194*00b67f09SDavid van Moolenbroek 
195*00b67f09SDavid van Moolenbroek }
196*00b67f09SDavid van Moolenbroek 
197*00b67f09SDavid van Moolenbroek #endif
198*00b67f09SDavid van Moolenbroek #endif /* ISC_PLATFORM_WANTAES */
199