1*d3273b5bSchristos /* $NetBSD: aes.c,v 1.2 2017/01/28 21:31:47 christos Exp $ */
2ca1c9b0cSelric
3ca1c9b0cSelric /*
4ca1c9b0cSelric * Copyright (c) 2003 Kungliga Tekniska Högskolan
5ca1c9b0cSelric * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric * All rights reserved.
7ca1c9b0cSelric *
8ca1c9b0cSelric * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric * modification, are permitted provided that the following conditions
10ca1c9b0cSelric * are met:
11ca1c9b0cSelric *
12ca1c9b0cSelric * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric * notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric *
15ca1c9b0cSelric * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric * notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric * documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric *
19ca1c9b0cSelric * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric * may be used to endorse or promote products derived from this software
21ca1c9b0cSelric * without specific prior written permission.
22ca1c9b0cSelric *
23ca1c9b0cSelric * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric * SUCH DAMAGE.
34ca1c9b0cSelric */
35ca1c9b0cSelric
36b9d004c6Schristos #include <config.h>
37b9d004c6Schristos #include <krb5/roken.h>
38ca1c9b0cSelric
39ca1c9b0cSelric #ifdef KRB5
40ca1c9b0cSelric #include <krb5/krb5-types.h>
41ca1c9b0cSelric #endif
42ca1c9b0cSelric
43ca1c9b0cSelric #include "rijndael-alg-fst.h"
44ca1c9b0cSelric #include "aes.h"
45ca1c9b0cSelric
46ca1c9b0cSelric int
AES_set_encrypt_key(const unsigned char * userkey,const int bits,AES_KEY * key)47ca1c9b0cSelric AES_set_encrypt_key(const unsigned char *userkey, const int bits, AES_KEY *key)
48ca1c9b0cSelric {
49ca1c9b0cSelric key->rounds = rijndaelKeySetupEnc(key->key, userkey, bits);
50ca1c9b0cSelric if (key->rounds == 0)
51ca1c9b0cSelric return -1;
52ca1c9b0cSelric return 0;
53ca1c9b0cSelric }
54ca1c9b0cSelric
55ca1c9b0cSelric int
AES_set_decrypt_key(const unsigned char * userkey,const int bits,AES_KEY * key)56ca1c9b0cSelric AES_set_decrypt_key(const unsigned char *userkey, const int bits, AES_KEY *key)
57ca1c9b0cSelric {
58ca1c9b0cSelric key->rounds = rijndaelKeySetupDec(key->key, userkey, bits);
59ca1c9b0cSelric if (key->rounds == 0)
60ca1c9b0cSelric return -1;
61ca1c9b0cSelric return 0;
62ca1c9b0cSelric }
63ca1c9b0cSelric
64ca1c9b0cSelric void
AES_encrypt(const unsigned char * in,unsigned char * out,const AES_KEY * key)65ca1c9b0cSelric AES_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key)
66ca1c9b0cSelric {
67ca1c9b0cSelric rijndaelEncrypt(key->key, key->rounds, in, out);
68ca1c9b0cSelric }
69ca1c9b0cSelric
70ca1c9b0cSelric void
AES_decrypt(const unsigned char * in,unsigned char * out,const AES_KEY * key)71ca1c9b0cSelric AES_decrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key)
72ca1c9b0cSelric {
73ca1c9b0cSelric rijndaelDecrypt(key->key, key->rounds, in, out);
74ca1c9b0cSelric }
75ca1c9b0cSelric
76ca1c9b0cSelric void
AES_cbc_encrypt(const unsigned char * in,unsigned char * out,unsigned long size,const AES_KEY * key,unsigned char * iv,int forward_encrypt)77ca1c9b0cSelric AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
78ca1c9b0cSelric unsigned long size, const AES_KEY *key,
79ca1c9b0cSelric unsigned char *iv, int forward_encrypt)
80ca1c9b0cSelric {
81ca1c9b0cSelric unsigned char tmp[AES_BLOCK_SIZE];
82ca1c9b0cSelric int i;
83ca1c9b0cSelric
84ca1c9b0cSelric if (forward_encrypt) {
85ca1c9b0cSelric while (size >= AES_BLOCK_SIZE) {
86ca1c9b0cSelric for (i = 0; i < AES_BLOCK_SIZE; i++)
87ca1c9b0cSelric tmp[i] = in[i] ^ iv[i];
88ca1c9b0cSelric AES_encrypt(tmp, out, key);
89ca1c9b0cSelric memcpy(iv, out, AES_BLOCK_SIZE);
90ca1c9b0cSelric size -= AES_BLOCK_SIZE;
91ca1c9b0cSelric in += AES_BLOCK_SIZE;
92ca1c9b0cSelric out += AES_BLOCK_SIZE;
93ca1c9b0cSelric }
94ca1c9b0cSelric if (size) {
95ca1c9b0cSelric for (i = 0; i < size; i++)
96ca1c9b0cSelric tmp[i] = in[i] ^ iv[i];
97ca1c9b0cSelric for (i = size; i < AES_BLOCK_SIZE; i++)
98ca1c9b0cSelric tmp[i] = iv[i];
99ca1c9b0cSelric AES_encrypt(tmp, out, key);
100ca1c9b0cSelric memcpy(iv, out, AES_BLOCK_SIZE);
101ca1c9b0cSelric }
102ca1c9b0cSelric } else {
103ca1c9b0cSelric while (size >= AES_BLOCK_SIZE) {
104ca1c9b0cSelric memcpy(tmp, in, AES_BLOCK_SIZE);
105ca1c9b0cSelric AES_decrypt(tmp, out, key);
106ca1c9b0cSelric for (i = 0; i < AES_BLOCK_SIZE; i++)
107ca1c9b0cSelric out[i] ^= iv[i];
108ca1c9b0cSelric memcpy(iv, tmp, AES_BLOCK_SIZE);
109ca1c9b0cSelric size -= AES_BLOCK_SIZE;
110ca1c9b0cSelric in += AES_BLOCK_SIZE;
111ca1c9b0cSelric out += AES_BLOCK_SIZE;
112ca1c9b0cSelric }
113ca1c9b0cSelric if (size) {
114ca1c9b0cSelric memcpy(tmp, in, AES_BLOCK_SIZE);
115ca1c9b0cSelric AES_decrypt(tmp, out, key);
116ca1c9b0cSelric for (i = 0; i < size; i++)
117ca1c9b0cSelric out[i] ^= iv[i];
118ca1c9b0cSelric memcpy(iv, tmp, AES_BLOCK_SIZE);
119ca1c9b0cSelric }
120ca1c9b0cSelric }
121ca1c9b0cSelric }
122ca1c9b0cSelric
123ca1c9b0cSelric void
AES_cfb8_encrypt(const unsigned char * in,unsigned char * out,unsigned long size,const AES_KEY * key,unsigned char * iv,int forward_encrypt)124ca1c9b0cSelric AES_cfb8_encrypt(const unsigned char *in, unsigned char *out,
125ca1c9b0cSelric unsigned long size, const AES_KEY *key,
126ca1c9b0cSelric unsigned char *iv, int forward_encrypt)
127ca1c9b0cSelric {
128ca1c9b0cSelric int i;
129ca1c9b0cSelric
130ca1c9b0cSelric for (i = 0; i < size; i++) {
131ca1c9b0cSelric unsigned char tmp[AES_BLOCK_SIZE + 1];
132ca1c9b0cSelric
133ca1c9b0cSelric memcpy(tmp, iv, AES_BLOCK_SIZE);
134ca1c9b0cSelric AES_encrypt(iv, iv, key);
135ca1c9b0cSelric if (!forward_encrypt) {
136ca1c9b0cSelric tmp[AES_BLOCK_SIZE] = in[i];
137ca1c9b0cSelric }
138ca1c9b0cSelric out[i] = in[i] ^ iv[0];
139ca1c9b0cSelric if (forward_encrypt) {
140ca1c9b0cSelric tmp[AES_BLOCK_SIZE] = out[i];
141ca1c9b0cSelric }
142ca1c9b0cSelric memcpy(iv, &tmp[1], AES_BLOCK_SIZE);
143ca1c9b0cSelric }
144ca1c9b0cSelric }
145