/src/samba/third_party/heimdal/lib/hcrypto/aes.c
Line | Count | Source |
1 | | /* |
2 | | * Copyright (c) 2003 Kungliga Tekniska Högskolan |
3 | | * (Royal Institute of Technology, Stockholm, Sweden). |
4 | | * All rights reserved. |
5 | | * |
6 | | * Redistribution and use in source and binary forms, with or without |
7 | | * modification, are permitted provided that the following conditions |
8 | | * are met: |
9 | | * |
10 | | * 1. Redistributions of source code must retain the above copyright |
11 | | * notice, this list of conditions and the following disclaimer. |
12 | | * |
13 | | * 2. Redistributions in binary form must reproduce the above copyright |
14 | | * notice, this list of conditions and the following disclaimer in the |
15 | | * documentation and/or other materials provided with the distribution. |
16 | | * |
17 | | * 3. Neither the name of the Institute nor the names of its contributors |
18 | | * may be used to endorse or promote products derived from this software |
19 | | * without specific prior written permission. |
20 | | * |
21 | | * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND |
22 | | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
23 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
24 | | * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE |
25 | | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
26 | | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
27 | | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
28 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
29 | | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
30 | | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
31 | | * SUCH DAMAGE. |
32 | | */ |
33 | | |
34 | | #include <config.h> |
35 | | #include <roken.h> |
36 | | |
37 | | #ifdef KRB5 |
38 | | #include <krb5-types.h> |
39 | | #endif |
40 | | |
41 | | #include "rijndael-alg-fst.h" |
42 | | #include "aes.h" |
43 | | |
44 | | int |
45 | | AES_set_encrypt_key(const unsigned char *userkey, const int bits, AES_KEY *key) |
46 | 0 | { |
47 | 0 | key->rounds = rijndaelKeySetupEnc(key->key, userkey, bits); |
48 | 0 | if (key->rounds == 0) |
49 | 0 | return -1; |
50 | 0 | return 0; |
51 | 0 | } |
52 | | |
53 | | int |
54 | | AES_set_decrypt_key(const unsigned char *userkey, const int bits, AES_KEY *key) |
55 | 0 | { |
56 | 0 | key->rounds = rijndaelKeySetupDec(key->key, userkey, bits); |
57 | 0 | if (key->rounds == 0) |
58 | 0 | return -1; |
59 | 0 | return 0; |
60 | 0 | } |
61 | | |
62 | | void |
63 | | AES_encrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key) |
64 | 0 | { |
65 | 0 | rijndaelEncrypt(key->key, key->rounds, in, out); |
66 | 0 | } |
67 | | |
68 | | void |
69 | | AES_decrypt(const unsigned char *in, unsigned char *out, const AES_KEY *key) |
70 | 0 | { |
71 | 0 | rijndaelDecrypt(key->key, key->rounds, in, out); |
72 | 0 | } |
73 | | |
74 | | void |
75 | | AES_cbc_encrypt(const unsigned char *in, unsigned char *out, |
76 | | unsigned long size, const AES_KEY *key, |
77 | | unsigned char *iv, int forward_encrypt) |
78 | 0 | { |
79 | 0 | unsigned char tmp[AES_BLOCK_SIZE]; |
80 | 0 | int i; |
81 | |
|
82 | 0 | if (forward_encrypt) { |
83 | 0 | while (size >= AES_BLOCK_SIZE) { |
84 | 0 | for (i = 0; i < AES_BLOCK_SIZE; i++) |
85 | 0 | tmp[i] = in[i] ^ iv[i]; |
86 | 0 | AES_encrypt(tmp, out, key); |
87 | 0 | memcpy(iv, out, AES_BLOCK_SIZE); |
88 | 0 | size -= AES_BLOCK_SIZE; |
89 | 0 | in += AES_BLOCK_SIZE; |
90 | 0 | out += AES_BLOCK_SIZE; |
91 | 0 | } |
92 | 0 | if (size) { |
93 | 0 | for (i = 0; i < size; i++) |
94 | 0 | tmp[i] = in[i] ^ iv[i]; |
95 | 0 | for (i = size; i < AES_BLOCK_SIZE; i++) |
96 | 0 | tmp[i] = iv[i]; |
97 | 0 | AES_encrypt(tmp, out, key); |
98 | 0 | memcpy(iv, out, AES_BLOCK_SIZE); |
99 | 0 | } |
100 | 0 | } else { |
101 | 0 | while (size >= AES_BLOCK_SIZE) { |
102 | 0 | memcpy(tmp, in, AES_BLOCK_SIZE); |
103 | 0 | AES_decrypt(tmp, out, key); |
104 | 0 | for (i = 0; i < AES_BLOCK_SIZE; i++) |
105 | 0 | out[i] ^= iv[i]; |
106 | 0 | memcpy(iv, tmp, AES_BLOCK_SIZE); |
107 | 0 | size -= AES_BLOCK_SIZE; |
108 | 0 | in += AES_BLOCK_SIZE; |
109 | 0 | out += AES_BLOCK_SIZE; |
110 | 0 | } |
111 | 0 | if (size) { |
112 | 0 | memcpy(tmp, in, AES_BLOCK_SIZE); |
113 | 0 | AES_decrypt(tmp, out, key); |
114 | 0 | for (i = 0; i < size; i++) |
115 | 0 | out[i] ^= iv[i]; |
116 | 0 | memcpy(iv, tmp, AES_BLOCK_SIZE); |
117 | 0 | } |
118 | 0 | } |
119 | 0 | } |
120 | | |
121 | | void |
122 | | AES_cfb8_encrypt(const unsigned char *in, unsigned char *out, |
123 | | unsigned long size, const AES_KEY *key, |
124 | | unsigned char *iv, int forward_encrypt) |
125 | 0 | { |
126 | 0 | int i; |
127 | |
|
128 | 0 | for (i = 0; i < size; i++) { |
129 | 0 | unsigned char tmp[AES_BLOCK_SIZE + 1]; |
130 | |
|
131 | 0 | memcpy(tmp, iv, AES_BLOCK_SIZE); |
132 | 0 | AES_encrypt(iv, iv, key); |
133 | 0 | if (!forward_encrypt) { |
134 | 0 | tmp[AES_BLOCK_SIZE] = in[i]; |
135 | 0 | } |
136 | 0 | out[i] = in[i] ^ iv[0]; |
137 | 0 | if (forward_encrypt) { |
138 | 0 | tmp[AES_BLOCK_SIZE] = out[i]; |
139 | 0 | } |
140 | 0 | memcpy(iv, &tmp[1], AES_BLOCK_SIZE); |
141 | 0 | } |
142 | 0 | } |