|
1 /* This Source Code Form is subject to the terms of the Mozilla Public |
|
2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
|
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
|
4 |
|
5 #ifdef FREEBL_NO_DEPEND |
|
6 #include "stubs.h" |
|
7 #endif |
|
8 #include "prtypes.h" |
|
9 #include "blapit.h" |
|
10 #include "blapii.h" |
|
11 #include "ctr.h" |
|
12 #include "pkcs11t.h" |
|
13 #include "secerr.h" |
|
14 |
|
15 #ifdef USE_HW_AES |
|
16 #include "intel-aes.h" |
|
17 #include "rijndael.h" |
|
18 #endif |
|
19 |
|
20 SECStatus |
|
21 CTR_InitContext(CTRContext *ctr, void *context, freeblCipherFunc cipher, |
|
22 const unsigned char *param, unsigned int blocksize) |
|
23 { |
|
24 const CK_AES_CTR_PARAMS *ctrParams = (const CK_AES_CTR_PARAMS *)param; |
|
25 |
|
26 if (ctrParams->ulCounterBits == 0 || |
|
27 ctrParams->ulCounterBits > blocksize * PR_BITS_PER_BYTE) { |
|
28 PORT_SetError(SEC_ERROR_INVALID_ARGS); |
|
29 return SECFailure; |
|
30 } |
|
31 |
|
32 /* Invariant: 0 < ctr->bufPtr <= blocksize */ |
|
33 ctr->bufPtr = blocksize; /* no unused data in the buffer */ |
|
34 ctr->cipher = cipher; |
|
35 ctr->context = context; |
|
36 ctr->counterBits = ctrParams->ulCounterBits; |
|
37 if (blocksize > sizeof(ctr->counter) || |
|
38 blocksize > sizeof(ctrParams->cb)) { |
|
39 PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); |
|
40 return SECFailure; |
|
41 } |
|
42 PORT_Memcpy(ctr->counter, ctrParams->cb, blocksize); |
|
43 return SECSuccess; |
|
44 } |
|
45 |
|
46 CTRContext * |
|
47 CTR_CreateContext(void *context, freeblCipherFunc cipher, |
|
48 const unsigned char *param, unsigned int blocksize) |
|
49 { |
|
50 CTRContext *ctr; |
|
51 SECStatus rv; |
|
52 |
|
53 /* first fill in the Counter context */ |
|
54 ctr = PORT_ZNew(CTRContext); |
|
55 if (ctr == NULL) { |
|
56 return NULL; |
|
57 } |
|
58 rv = CTR_InitContext(ctr, context, cipher, param, blocksize); |
|
59 if (rv != SECSuccess) { |
|
60 CTR_DestroyContext(ctr, PR_TRUE); |
|
61 ctr = NULL; |
|
62 } |
|
63 return ctr; |
|
64 } |
|
65 |
|
66 void |
|
67 CTR_DestroyContext(CTRContext *ctr, PRBool freeit) |
|
68 { |
|
69 PORT_Memset(ctr, 0, sizeof(CTRContext)); |
|
70 if (freeit) { |
|
71 PORT_Free(ctr); |
|
72 } |
|
73 } |
|
74 |
|
75 /* |
|
76 * Used by counter mode. Increment the counter block. Not all bits in the |
|
77 * counter block are part of the counter, counterBits tells how many bits |
|
78 * are part of the counter. The counter block is blocksize long. It's a |
|
79 * big endian value. |
|
80 * |
|
81 * XXX Does not handle counter rollover. |
|
82 */ |
|
83 static void |
|
84 ctr_GetNextCtr(unsigned char *counter, unsigned int counterBits, |
|
85 unsigned int blocksize) |
|
86 { |
|
87 unsigned char *counterPtr = counter + blocksize - 1; |
|
88 unsigned char mask, count; |
|
89 |
|
90 PORT_Assert(counterBits <= blocksize*PR_BITS_PER_BYTE); |
|
91 while (counterBits >= PR_BITS_PER_BYTE) { |
|
92 if (++(*(counterPtr--))) { |
|
93 return; |
|
94 } |
|
95 counterBits -= PR_BITS_PER_BYTE; |
|
96 } |
|
97 if (counterBits == 0) { |
|
98 return; |
|
99 } |
|
100 /* increment the final partial byte */ |
|
101 mask = (1 << counterBits)-1; |
|
102 count = ++(*counterPtr) & mask; |
|
103 *counterPtr = ((*counterPtr) & ~mask) | count; |
|
104 return; |
|
105 } |
|
106 |
|
107 static void |
|
108 ctr_xor(unsigned char *target, const unsigned char *x, |
|
109 const unsigned char *y, unsigned int count) |
|
110 { |
|
111 unsigned int i; |
|
112 for (i=0; i < count; i++) { |
|
113 *target++ = *x++ ^ *y++; |
|
114 } |
|
115 } |
|
116 |
|
117 SECStatus |
|
118 CTR_Update(CTRContext *ctr, unsigned char *outbuf, |
|
119 unsigned int *outlen, unsigned int maxout, |
|
120 const unsigned char *inbuf, unsigned int inlen, |
|
121 unsigned int blocksize) |
|
122 { |
|
123 unsigned int tmp; |
|
124 SECStatus rv; |
|
125 |
|
126 if (maxout < inlen) { |
|
127 *outlen = inlen; |
|
128 PORT_SetError(SEC_ERROR_OUTPUT_LEN); |
|
129 return SECFailure; |
|
130 } |
|
131 *outlen = 0; |
|
132 if (ctr->bufPtr != blocksize) { |
|
133 unsigned int needed = PR_MIN(blocksize-ctr->bufPtr, inlen); |
|
134 ctr_xor(outbuf, inbuf, ctr->buffer + ctr->bufPtr, needed); |
|
135 ctr->bufPtr += needed; |
|
136 outbuf += needed; |
|
137 inbuf += needed; |
|
138 *outlen += needed; |
|
139 inlen -= needed; |
|
140 if (inlen == 0) { |
|
141 return SECSuccess; |
|
142 } |
|
143 PORT_Assert(ctr->bufPtr == blocksize); |
|
144 } |
|
145 |
|
146 while (inlen >= blocksize) { |
|
147 rv = (*ctr->cipher)(ctr->context, ctr->buffer, &tmp, blocksize, |
|
148 ctr->counter, blocksize, blocksize); |
|
149 ctr_GetNextCtr(ctr->counter, ctr->counterBits, blocksize); |
|
150 if (rv != SECSuccess) { |
|
151 return SECFailure; |
|
152 } |
|
153 ctr_xor(outbuf, inbuf, ctr->buffer, blocksize); |
|
154 outbuf += blocksize; |
|
155 inbuf += blocksize; |
|
156 *outlen += blocksize; |
|
157 inlen -= blocksize; |
|
158 } |
|
159 if (inlen == 0) { |
|
160 return SECSuccess; |
|
161 } |
|
162 rv = (*ctr->cipher)(ctr->context, ctr->buffer, &tmp, blocksize, |
|
163 ctr->counter, blocksize, blocksize); |
|
164 ctr_GetNextCtr(ctr->counter, ctr->counterBits, blocksize); |
|
165 if (rv != SECSuccess) { |
|
166 return SECFailure; |
|
167 } |
|
168 ctr_xor(outbuf, inbuf, ctr->buffer, inlen); |
|
169 ctr->bufPtr = inlen; |
|
170 *outlen += inlen; |
|
171 return SECSuccess; |
|
172 } |
|
173 |
|
174 #if defined(USE_HW_AES) && defined(_MSC_VER) |
|
175 SECStatus |
|
176 CTR_Update_HW_AES(CTRContext *ctr, unsigned char *outbuf, |
|
177 unsigned int *outlen, unsigned int maxout, |
|
178 const unsigned char *inbuf, unsigned int inlen, |
|
179 unsigned int blocksize) |
|
180 { |
|
181 unsigned int fullblocks; |
|
182 unsigned int tmp; |
|
183 SECStatus rv; |
|
184 |
|
185 if (maxout < inlen) { |
|
186 *outlen = inlen; |
|
187 PORT_SetError(SEC_ERROR_OUTPUT_LEN); |
|
188 return SECFailure; |
|
189 } |
|
190 *outlen = 0; |
|
191 if (ctr->bufPtr != blocksize) { |
|
192 unsigned int needed = PR_MIN(blocksize-ctr->bufPtr, inlen); |
|
193 ctr_xor(outbuf, inbuf, ctr->buffer + ctr->bufPtr, needed); |
|
194 ctr->bufPtr += needed; |
|
195 outbuf += needed; |
|
196 inbuf += needed; |
|
197 *outlen += needed; |
|
198 inlen -= needed; |
|
199 if (inlen == 0) { |
|
200 return SECSuccess; |
|
201 } |
|
202 PORT_Assert(ctr->bufPtr == blocksize); |
|
203 } |
|
204 |
|
205 intel_aes_ctr_worker(((AESContext*)(ctr->context))->Nr)( |
|
206 ctr, outbuf, outlen, maxout, inbuf, inlen, blocksize); |
|
207 /* XXX intel_aes_ctr_worker should set *outlen. */ |
|
208 PORT_Assert(*outlen == 0); |
|
209 fullblocks = (inlen/blocksize)*blocksize; |
|
210 *outlen += fullblocks; |
|
211 outbuf += fullblocks; |
|
212 inbuf += fullblocks; |
|
213 inlen -= fullblocks; |
|
214 |
|
215 if (inlen == 0) { |
|
216 return SECSuccess; |
|
217 } |
|
218 rv = (*ctr->cipher)(ctr->context, ctr->buffer, &tmp, blocksize, |
|
219 ctr->counter, blocksize, blocksize); |
|
220 ctr_GetNextCtr(ctr->counter, ctr->counterBits, blocksize); |
|
221 if (rv != SECSuccess) { |
|
222 return SECFailure; |
|
223 } |
|
224 ctr_xor(outbuf, inbuf, ctr->buffer, inlen); |
|
225 ctr->bufPtr = inlen; |
|
226 *outlen += inlen; |
|
227 return SECSuccess; |
|
228 } |
|
229 #endif |