Home | History | Annotate | Line # | Download | only in opencrypto
xform.c revision 1.13.4.2
      1  1.13.4.2  skrll /*	$NetBSD: xform.c,v 1.13.4.2 2004/08/03 10:56:25 skrll Exp $ */
      2  1.13.4.2  skrll /*	$FreeBSD: src/sys/opencrypto/xform.c,v 1.1.2.1 2002/11/21 23:34:23 sam Exp $	*/
      3  1.13.4.2  skrll /*	$OpenBSD: xform.c,v 1.19 2002/08/16 22:47:25 dhartmei Exp $	*/
      4  1.13.4.2  skrll 
      5  1.13.4.2  skrll /*
      6  1.13.4.2  skrll  * The authors of this code are John Ioannidis (ji (at) tla.org),
      7  1.13.4.2  skrll  * Angelos D. Keromytis (kermit (at) csd.uch.gr) and
      8  1.13.4.2  skrll  * Niels Provos (provos (at) physnet.uni-hamburg.de).
      9  1.13.4.2  skrll  *
     10  1.13.4.2  skrll  * This code was written by John Ioannidis for BSD/OS in Athens, Greece,
     11  1.13.4.2  skrll  * in November 1995.
     12  1.13.4.2  skrll  *
     13  1.13.4.2  skrll  * Ported to OpenBSD and NetBSD, with additional transforms, in December 1996,
     14  1.13.4.2  skrll  * by Angelos D. Keromytis.
     15  1.13.4.2  skrll  *
     16  1.13.4.2  skrll  * Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis
     17  1.13.4.2  skrll  * and Niels Provos.
     18  1.13.4.2  skrll  *
     19  1.13.4.2  skrll  * Additional features in 1999 by Angelos D. Keromytis.
     20  1.13.4.2  skrll  *
     21  1.13.4.2  skrll  * Copyright (C) 1995, 1996, 1997, 1998, 1999 by John Ioannidis,
     22  1.13.4.2  skrll  * Angelos D. Keromytis and Niels Provos.
     23  1.13.4.2  skrll  *
     24  1.13.4.2  skrll  * Copyright (C) 2001, Angelos D. Keromytis.
     25  1.13.4.2  skrll  *
     26  1.13.4.2  skrll  * Permission to use, copy, and modify this software with or without fee
     27  1.13.4.2  skrll  * is hereby granted, provided that this entire notice is included in
     28  1.13.4.2  skrll  * all copies of any software which is or includes a copy or
     29  1.13.4.2  skrll  * modification of this software.
     30  1.13.4.2  skrll  * You may use this code under the GNU public license if you so wish. Please
     31  1.13.4.2  skrll  * contribute changes back to the authors under this freer than GPL license
     32  1.13.4.2  skrll  * so that we may further the use of strong encryption without limitations to
     33  1.13.4.2  skrll  * all.
     34  1.13.4.2  skrll  *
     35  1.13.4.2  skrll  * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR
     36  1.13.4.2  skrll  * IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY
     37  1.13.4.2  skrll  * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
     38  1.13.4.2  skrll  * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
     39  1.13.4.2  skrll  * PURPOSE.
     40  1.13.4.2  skrll  */
     41  1.13.4.2  skrll 
     42  1.13.4.2  skrll #include <sys/cdefs.h>
     43  1.13.4.2  skrll __KERNEL_RCSID(0, "$NetBSD: xform.c,v 1.13.4.2 2004/08/03 10:56:25 skrll Exp $");
     44  1.13.4.2  skrll 
     45  1.13.4.2  skrll #include <sys/param.h>
     46  1.13.4.2  skrll #include <sys/systm.h>
     47  1.13.4.2  skrll #include <sys/malloc.h>
     48  1.13.4.2  skrll #include <sys/sysctl.h>
     49  1.13.4.2  skrll #include <sys/errno.h>
     50  1.13.4.2  skrll #include <sys/time.h>
     51  1.13.4.2  skrll #include <sys/kernel.h>
     52  1.13.4.2  skrll #include <machine/cpu.h>
     53  1.13.4.2  skrll 
     54  1.13.4.2  skrll #include <crypto/blowfish/blowfish.h>
     55  1.13.4.2  skrll #include <crypto/cast128/cast128.h>
     56  1.13.4.2  skrll #include <crypto/des/des.h>
     57  1.13.4.2  skrll #include <crypto/rijndael/rijndael.h>
     58  1.13.4.2  skrll #include <crypto/ripemd160/rmd160.h>
     59  1.13.4.2  skrll #include <crypto/skipjack/skipjack.h>
     60  1.13.4.2  skrll 
     61  1.13.4.2  skrll #include <opencrypto/deflate.h>
     62  1.13.4.2  skrll 
     63  1.13.4.2  skrll #include <sys/md5.h>
     64  1.13.4.2  skrll #include <sys/sha1.h>
     65  1.13.4.2  skrll 
     66  1.13.4.2  skrll #include <opencrypto/cryptodev.h>
     67  1.13.4.2  skrll #include <opencrypto/xform.h>
     68  1.13.4.2  skrll 
     69  1.13.4.2  skrll static void null_encrypt(caddr_t, u_int8_t *);
     70  1.13.4.2  skrll static void null_decrypt(caddr_t, u_int8_t *);
     71  1.13.4.2  skrll static int null_setkey(u_int8_t **, const u_int8_t *, int);
     72  1.13.4.2  skrll static void null_zerokey(u_int8_t **);
     73  1.13.4.2  skrll 
     74  1.13.4.2  skrll static	int des1_setkey(u_int8_t **, const u_int8_t *, int);
     75  1.13.4.2  skrll static	int des3_setkey(u_int8_t **, const u_int8_t *, int);
     76  1.13.4.2  skrll static	int blf_setkey(u_int8_t **, const u_int8_t *, int);
     77  1.13.4.2  skrll static	int cast5_setkey(u_int8_t **, const u_int8_t *, int);
     78  1.13.4.2  skrll static  int skipjack_setkey(u_int8_t **, const u_int8_t *, int);
     79  1.13.4.2  skrll static  int rijndael128_setkey(u_int8_t **, const u_int8_t *, int);
     80  1.13.4.2  skrll static	void des1_encrypt(caddr_t, u_int8_t *);
     81  1.13.4.2  skrll static	void des3_encrypt(caddr_t, u_int8_t *);
     82  1.13.4.2  skrll static	void blf_encrypt(caddr_t, u_int8_t *);
     83  1.13.4.2  skrll static	void cast5_encrypt(caddr_t, u_int8_t *);
     84  1.13.4.2  skrll static	void skipjack_encrypt(caddr_t, u_int8_t *);
     85  1.13.4.2  skrll static	void rijndael128_encrypt(caddr_t, u_int8_t *);
     86  1.13.4.2  skrll static	void des1_decrypt(caddr_t, u_int8_t *);
     87  1.13.4.2  skrll static	void des3_decrypt(caddr_t, u_int8_t *);
     88  1.13.4.2  skrll static	void blf_decrypt(caddr_t, u_int8_t *);
     89  1.13.4.2  skrll static	void cast5_decrypt(caddr_t, u_int8_t *);
     90  1.13.4.2  skrll static	void skipjack_decrypt(caddr_t, u_int8_t *);
     91  1.13.4.2  skrll static	void rijndael128_decrypt(caddr_t, u_int8_t *);
     92  1.13.4.2  skrll static	void des1_zerokey(u_int8_t **);
     93  1.13.4.2  skrll static	void des3_zerokey(u_int8_t **);
     94  1.13.4.2  skrll static	void blf_zerokey(u_int8_t **);
     95  1.13.4.2  skrll static	void cast5_zerokey(u_int8_t **);
     96  1.13.4.2  skrll static	void skipjack_zerokey(u_int8_t **);
     97  1.13.4.2  skrll static	void rijndael128_zerokey(u_int8_t **);
     98  1.13.4.2  skrll 
     99  1.13.4.2  skrll static	void null_init(void *);
    100  1.13.4.2  skrll static	int null_update(void *, const u_int8_t *, u_int16_t);
    101  1.13.4.2  skrll static	void null_final(u_int8_t *, void *);
    102  1.13.4.2  skrll 
    103  1.13.4.2  skrll static int	MD5Update_int(void *, const u_int8_t *, u_int16_t);
    104  1.13.4.2  skrll static void	SHA1Init_int(void *);
    105  1.13.4.2  skrll static	int SHA1Update_int(void *, const u_int8_t *, u_int16_t);
    106  1.13.4.2  skrll static	void SHA1Final_int(u_int8_t *, void *);
    107  1.13.4.2  skrll 
    108  1.13.4.2  skrll 
    109  1.13.4.2  skrll static int RMD160Update_int(void *, const u_int8_t *, u_int16_t);
    110  1.13.4.2  skrll static	int SHA1Update_int(void *, const u_int8_t *, u_int16_t);
    111  1.13.4.2  skrll static	void SHA1Final_int(u_int8_t *, void *);
    112  1.13.4.2  skrll static	int RMD160Update_int(void *, const u_int8_t *, u_int16_t);
    113  1.13.4.2  skrll static	int SHA256Update_int(void *, const u_int8_t *, u_int16_t);
    114  1.13.4.2  skrll static	int SHA384Update_int(void *, const u_int8_t *, u_int16_t);
    115  1.13.4.2  skrll static	int SHA512Update_int(void *, const u_int8_t *, u_int16_t);
    116  1.13.4.2  skrll 
    117  1.13.4.2  skrll static u_int32_t deflate_compress(u_int8_t *, u_int32_t, u_int8_t **);
    118  1.13.4.2  skrll static u_int32_t deflate_decompress(u_int8_t *, u_int32_t, u_int8_t **);
    119  1.13.4.2  skrll 
    120  1.13.4.2  skrll MALLOC_DEFINE(M_XDATA, "xform", "xform data buffers");
    121  1.13.4.2  skrll 
    122  1.13.4.2  skrll /* Encryption instances */
    123  1.13.4.2  skrll struct enc_xform enc_xform_null = {
    124  1.13.4.2  skrll 	CRYPTO_NULL_CBC, "NULL",
    125  1.13.4.2  skrll 	/* NB: blocksize of 4 is to generate a properly aligned ESP header */
    126  1.13.4.2  skrll 	4, 0, 256, /* 2048 bits, max key */
    127  1.13.4.2  skrll 	null_encrypt,
    128  1.13.4.2  skrll 	null_decrypt,
    129  1.13.4.2  skrll 	null_setkey,
    130  1.13.4.2  skrll 	null_zerokey,
    131  1.13.4.2  skrll };
    132  1.13.4.2  skrll 
    133  1.13.4.2  skrll struct enc_xform enc_xform_des = {
    134  1.13.4.2  skrll 	CRYPTO_DES_CBC, "DES",
    135  1.13.4.2  skrll 	8, 8, 8,
    136  1.13.4.2  skrll 	des1_encrypt,
    137  1.13.4.2  skrll 	des1_decrypt,
    138  1.13.4.2  skrll 	des1_setkey,
    139  1.13.4.2  skrll 	des1_zerokey,
    140  1.13.4.2  skrll };
    141  1.13.4.2  skrll 
    142  1.13.4.2  skrll struct enc_xform enc_xform_3des = {
    143  1.13.4.2  skrll 	CRYPTO_3DES_CBC, "3DES",
    144  1.13.4.2  skrll 	8, 24, 24,
    145  1.13.4.2  skrll 	des3_encrypt,
    146  1.13.4.2  skrll 	des3_decrypt,
    147  1.13.4.2  skrll 	des3_setkey,
    148  1.13.4.2  skrll 	des3_zerokey
    149  1.13.4.2  skrll };
    150  1.13.4.2  skrll 
    151  1.13.4.2  skrll struct enc_xform enc_xform_blf = {
    152  1.13.4.2  skrll 	CRYPTO_BLF_CBC, "Blowfish",
    153  1.13.4.2  skrll 	8, 5, 56 /* 448 bits, max key */,
    154  1.13.4.2  skrll 	blf_encrypt,
    155  1.13.4.2  skrll 	blf_decrypt,
    156  1.13.4.2  skrll 	blf_setkey,
    157  1.13.4.2  skrll 	blf_zerokey
    158  1.13.4.2  skrll };
    159  1.13.4.2  skrll 
    160  1.13.4.2  skrll struct enc_xform enc_xform_cast5 = {
    161  1.13.4.2  skrll 	CRYPTO_CAST_CBC, "CAST-128",
    162  1.13.4.2  skrll 	8, 5, 16,
    163  1.13.4.2  skrll 	cast5_encrypt,
    164  1.13.4.2  skrll 	cast5_decrypt,
    165  1.13.4.2  skrll 	cast5_setkey,
    166  1.13.4.2  skrll 	cast5_zerokey
    167  1.13.4.2  skrll };
    168  1.13.4.2  skrll 
    169  1.13.4.2  skrll struct enc_xform enc_xform_skipjack = {
    170  1.13.4.2  skrll 	CRYPTO_SKIPJACK_CBC, "Skipjack",
    171  1.13.4.2  skrll 	8, 10, 10,
    172  1.13.4.2  skrll 	skipjack_encrypt,
    173  1.13.4.2  skrll 	skipjack_decrypt,
    174  1.13.4.2  skrll 	skipjack_setkey,
    175  1.13.4.2  skrll 	skipjack_zerokey
    176  1.13.4.2  skrll };
    177  1.13.4.2  skrll 
    178  1.13.4.2  skrll struct enc_xform enc_xform_rijndael128 = {
    179  1.13.4.2  skrll 	CRYPTO_RIJNDAEL128_CBC, "Rijndael-128/AES",
    180  1.13.4.2  skrll 	16, 8, 32,
    181  1.13.4.2  skrll 	rijndael128_encrypt,
    182  1.13.4.2  skrll 	rijndael128_decrypt,
    183  1.13.4.2  skrll 	rijndael128_setkey,
    184  1.13.4.2  skrll 	rijndael128_zerokey,
    185  1.13.4.2  skrll };
    186  1.13.4.2  skrll 
    187  1.13.4.2  skrll struct enc_xform enc_xform_arc4 = {
    188  1.13.4.2  skrll 	CRYPTO_ARC4, "ARC4",
    189  1.13.4.2  skrll 	1, 1, 32,
    190  1.13.4.2  skrll 	NULL,
    191  1.13.4.2  skrll 	NULL,
    192  1.13.4.2  skrll 	NULL,
    193  1.13.4.2  skrll 	NULL,
    194  1.13.4.2  skrll };
    195  1.13.4.2  skrll 
    196  1.13.4.2  skrll /* Authentication instances */
    197  1.13.4.2  skrll struct auth_hash auth_hash_null = {
    198  1.13.4.2  skrll 	CRYPTO_NULL_HMAC, "NULL-HMAC",
    199  1.13.4.2  skrll 	0, 0, 12, sizeof(int),			/* NB: context isn't used */
    200  1.13.4.2  skrll 	null_init, null_update, null_final
    201  1.13.4.2  skrll };
    202  1.13.4.2  skrll 
    203  1.13.4.2  skrll struct auth_hash auth_hash_hmac_md5_96 = {
    204  1.13.4.2  skrll 	CRYPTO_MD5_HMAC, "HMAC-MD5",
    205  1.13.4.2  skrll 	16, 16, 12, sizeof(MD5_CTX),
    206  1.13.4.2  skrll 	(void (*) (void *)) MD5Init, MD5Update_int,
    207  1.13.4.2  skrll 	(void (*) (u_int8_t *, void *)) MD5Final
    208  1.13.4.2  skrll };
    209  1.13.4.2  skrll 
    210  1.13.4.2  skrll struct auth_hash auth_hash_hmac_sha1_96 = {
    211  1.13.4.2  skrll 	CRYPTO_SHA1_HMAC, "HMAC-SHA1",
    212  1.13.4.2  skrll 	20, 20, 12, sizeof(SHA1_CTX),
    213  1.13.4.2  skrll 	SHA1Init_int, SHA1Update_int, SHA1Final_int
    214  1.13.4.2  skrll };
    215  1.13.4.2  skrll 
    216  1.13.4.2  skrll struct auth_hash auth_hash_hmac_ripemd_160_96 = {
    217  1.13.4.2  skrll 	CRYPTO_RIPEMD160_HMAC, "HMAC-RIPEMD-160",
    218  1.13.4.2  skrll 	20, 20, 12, sizeof(RMD160_CTX),
    219  1.13.4.2  skrll 	(void (*)(void *)) RMD160Init, RMD160Update_int,
    220  1.13.4.2  skrll 	(void (*)(u_int8_t *, void *)) RMD160Final
    221  1.13.4.2  skrll };
    222  1.13.4.2  skrll 
    223  1.13.4.2  skrll struct auth_hash auth_hash_key_md5 = {
    224  1.13.4.2  skrll 	CRYPTO_MD5_KPDK, "Keyed MD5",
    225  1.13.4.2  skrll 	0, 16, 16, sizeof(MD5_CTX),
    226  1.13.4.2  skrll 	(void (*)(void *)) MD5Init, MD5Update_int,
    227  1.13.4.2  skrll 	(void (*)(u_int8_t *, void *)) MD5Final
    228  1.13.4.2  skrll };
    229  1.13.4.2  skrll 
    230  1.13.4.2  skrll struct auth_hash auth_hash_key_sha1 = {
    231  1.13.4.2  skrll 	CRYPTO_SHA1_KPDK, "Keyed SHA1",
    232  1.13.4.2  skrll 	0, 20, 20, sizeof(SHA1_CTX),
    233  1.13.4.2  skrll 	SHA1Init_int, SHA1Update_int, SHA1Final_int
    234  1.13.4.2  skrll };
    235  1.13.4.2  skrll 
    236  1.13.4.2  skrll struct auth_hash auth_hash_md5 = {
    237  1.13.4.2  skrll 	CRYPTO_MD5, "MD5",
    238  1.13.4.2  skrll 	0, 16, 16, sizeof(MD5_CTX),
    239  1.13.4.2  skrll 	(void (*) (void *)) MD5Init, MD5Update_int,
    240  1.13.4.2  skrll 	(void (*) (u_int8_t *, void *)) MD5Final
    241  1.13.4.2  skrll };
    242  1.13.4.2  skrll 
    243  1.13.4.2  skrll struct auth_hash auth_hash_sha1 = {
    244  1.13.4.2  skrll 	CRYPTO_SHA1, "SHA1",
    245  1.13.4.2  skrll 	0, 20, 20, sizeof(SHA1_CTX),
    246  1.13.4.2  skrll 	(void (*)(void *)) SHA1Init, SHA1Update_int,
    247  1.13.4.2  skrll 	(void (*)(u_int8_t *, void *)) SHA1Final
    248  1.13.4.2  skrll };
    249  1.13.4.2  skrll 
    250  1.13.4.2  skrll struct auth_hash auth_hash_hmac_sha2_256 = {
    251  1.13.4.2  skrll 	CRYPTO_SHA2_HMAC, "HMAC-SHA2",
    252  1.13.4.2  skrll 	32, 32, 12, sizeof(SHA256_CTX),
    253  1.13.4.2  skrll 	(void (*)(void *)) SHA256_Init, SHA256Update_int,
    254  1.13.4.2  skrll 	(void (*)(u_int8_t *, void *)) SHA256_Final
    255  1.13.4.2  skrll };
    256  1.13.4.2  skrll 
    257  1.13.4.2  skrll struct auth_hash auth_hash_hmac_sha2_384 = {
    258  1.13.4.2  skrll 	CRYPTO_SHA2_HMAC, "HMAC-SHA2-384",
    259  1.13.4.2  skrll 	48, 48, 12, sizeof(SHA384_CTX),
    260  1.13.4.2  skrll 	(void (*)(void *)) SHA384_Init, SHA384Update_int,
    261  1.13.4.2  skrll 	(void (*)(u_int8_t *, void *)) SHA384_Final
    262  1.13.4.2  skrll };
    263  1.13.4.2  skrll 
    264  1.13.4.2  skrll struct auth_hash auth_hash_hmac_sha2_512 = {
    265  1.13.4.2  skrll 	CRYPTO_SHA2_HMAC, "HMAC-SHA2-512",
    266  1.13.4.2  skrll 	64, 64, 12, sizeof(SHA512_CTX),
    267  1.13.4.2  skrll 	(void (*)(void *)) SHA512_Init, SHA512Update_int,
    268  1.13.4.2  skrll 	(void (*)(u_int8_t *, void *)) SHA512_Final
    269  1.13.4.2  skrll };
    270  1.13.4.2  skrll 
    271  1.13.4.2  skrll /* Compression instance */
    272  1.13.4.2  skrll struct comp_algo comp_algo_deflate = {
    273  1.13.4.2  skrll 	CRYPTO_DEFLATE_COMP, "Deflate",
    274  1.13.4.2  skrll 	90, deflate_compress,
    275  1.13.4.2  skrll 	deflate_decompress
    276  1.13.4.2  skrll };
    277  1.13.4.2  skrll 
    278  1.13.4.2  skrll /*
    279  1.13.4.2  skrll  * Encryption wrapper routines.
    280  1.13.4.2  skrll  */
    281  1.13.4.2  skrll static void
    282  1.13.4.2  skrll null_encrypt(caddr_t key, u_int8_t *blk)
    283  1.13.4.2  skrll {
    284  1.13.4.2  skrll }
    285  1.13.4.2  skrll static void
    286  1.13.4.2  skrll null_decrypt(caddr_t key, u_int8_t *blk)
    287  1.13.4.2  skrll {
    288  1.13.4.2  skrll }
    289  1.13.4.2  skrll static int
    290  1.13.4.2  skrll null_setkey(u_int8_t **sched, const u_int8_t *key, int len)
    291  1.13.4.2  skrll {
    292  1.13.4.2  skrll 	*sched = NULL;
    293  1.13.4.2  skrll 	return 0;
    294  1.13.4.2  skrll }
    295  1.13.4.2  skrll static void
    296  1.13.4.2  skrll null_zerokey(u_int8_t **sched)
    297  1.13.4.2  skrll {
    298  1.13.4.2  skrll 	*sched = NULL;
    299  1.13.4.2  skrll }
    300  1.13.4.2  skrll 
    301  1.13.4.2  skrll static void
    302  1.13.4.2  skrll des1_encrypt(caddr_t key, u_int8_t *blk)
    303  1.13.4.2  skrll {
    304  1.13.4.2  skrll 	des_cblock *cb = (des_cblock *) blk;
    305  1.13.4.2  skrll 	des_key_schedule *p = (des_key_schedule *) key;
    306  1.13.4.2  skrll 
    307  1.13.4.2  skrll 	des_ecb_encrypt(cb, cb, p[0], DES_ENCRYPT);
    308  1.13.4.2  skrll }
    309  1.13.4.2  skrll 
    310  1.13.4.2  skrll static void
    311  1.13.4.2  skrll des1_decrypt(caddr_t key, u_int8_t *blk)
    312  1.13.4.2  skrll {
    313  1.13.4.2  skrll 	des_cblock *cb = (des_cblock *) blk;
    314  1.13.4.2  skrll 	des_key_schedule *p = (des_key_schedule *) key;
    315  1.13.4.2  skrll 
    316  1.13.4.2  skrll 	des_ecb_encrypt(cb, cb, p[0], DES_DECRYPT);
    317  1.13.4.2  skrll }
    318  1.13.4.2  skrll 
    319  1.13.4.2  skrll static int
    320  1.13.4.2  skrll des1_setkey(u_int8_t **sched, const u_int8_t *key, int len)
    321  1.13.4.2  skrll {
    322  1.13.4.2  skrll 	des_key_schedule *p;
    323  1.13.4.2  skrll 	int err;
    324  1.13.4.2  skrll 
    325  1.13.4.2  skrll 	MALLOC(p, des_key_schedule *, sizeof (des_key_schedule),
    326  1.13.4.2  skrll 		M_CRYPTO_DATA, M_NOWAIT);
    327  1.13.4.2  skrll 	if (p != NULL) {
    328  1.13.4.2  skrll 		bzero(p, sizeof(des_key_schedule));
    329  1.13.4.2  skrll 		des_set_key((des_cblock *) key, p[0]);
    330  1.13.4.2  skrll 		err = 0;
    331  1.13.4.2  skrll 	} else
    332  1.13.4.2  skrll 		err = ENOMEM;
    333  1.13.4.2  skrll 	*sched = (u_int8_t *) p;
    334  1.13.4.2  skrll 	return err;
    335  1.13.4.2  skrll }
    336  1.13.4.2  skrll 
    337  1.13.4.2  skrll static void
    338  1.13.4.2  skrll des1_zerokey(u_int8_t **sched)
    339  1.13.4.2  skrll {
    340  1.13.4.2  skrll 	bzero(*sched, sizeof (des_key_schedule));
    341  1.13.4.2  skrll 	FREE(*sched, M_CRYPTO_DATA);
    342  1.13.4.2  skrll 	*sched = NULL;
    343  1.13.4.2  skrll }
    344  1.13.4.2  skrll 
    345  1.13.4.2  skrll static void
    346  1.13.4.2  skrll des3_encrypt(caddr_t key, u_int8_t *blk)
    347  1.13.4.2  skrll {
    348  1.13.4.2  skrll 	des_cblock *cb = (des_cblock *) blk;
    349  1.13.4.2  skrll 	des_key_schedule *p = (des_key_schedule *) key;
    350  1.13.4.2  skrll 
    351  1.13.4.2  skrll 	des_ecb3_encrypt(cb, cb, p[0], p[1], p[2], DES_ENCRYPT);
    352  1.13.4.2  skrll }
    353  1.13.4.2  skrll 
    354  1.13.4.2  skrll static void
    355  1.13.4.2  skrll des3_decrypt(caddr_t key, u_int8_t *blk)
    356  1.13.4.2  skrll {
    357  1.13.4.2  skrll 	des_cblock *cb = (des_cblock *) blk;
    358  1.13.4.2  skrll 	des_key_schedule *p = (des_key_schedule *) key;
    359  1.13.4.2  skrll 
    360  1.13.4.2  skrll 	des_ecb3_encrypt(cb, cb, p[0], p[1], p[2], DES_DECRYPT);
    361  1.13.4.2  skrll }
    362  1.13.4.2  skrll 
    363  1.13.4.2  skrll static int
    364  1.13.4.2  skrll des3_setkey(u_int8_t **sched, const u_int8_t *key, int len)
    365  1.13.4.2  skrll {
    366  1.13.4.2  skrll 	des_key_schedule *p;
    367  1.13.4.2  skrll 	int err;
    368  1.13.4.2  skrll 
    369  1.13.4.2  skrll 	MALLOC(p, des_key_schedule *, 3*sizeof (des_key_schedule),
    370  1.13.4.2  skrll 		M_CRYPTO_DATA, M_NOWAIT);
    371  1.13.4.2  skrll 	if (p != NULL) {
    372  1.13.4.2  skrll 		bzero(p, 3*sizeof(des_key_schedule));
    373  1.13.4.2  skrll 		des_set_key((des_cblock *)(key +  0), p[0]);
    374  1.13.4.2  skrll 		des_set_key((des_cblock *)(key +  8), p[1]);
    375  1.13.4.2  skrll 		des_set_key((des_cblock *)(key + 16), p[2]);
    376  1.13.4.2  skrll 		err = 0;
    377  1.13.4.2  skrll 	} else
    378  1.13.4.2  skrll 		err = ENOMEM;
    379  1.13.4.2  skrll 	*sched = (u_int8_t *) p;
    380  1.13.4.2  skrll 	return err;
    381  1.13.4.2  skrll }
    382  1.13.4.2  skrll 
    383  1.13.4.2  skrll static void
    384  1.13.4.2  skrll des3_zerokey(u_int8_t **sched)
    385  1.13.4.2  skrll {
    386  1.13.4.2  skrll 	bzero(*sched, 3*sizeof (des_key_schedule));
    387  1.13.4.2  skrll 	FREE(*sched, M_CRYPTO_DATA);
    388  1.13.4.2  skrll 	*sched = NULL;
    389  1.13.4.2  skrll }
    390  1.13.4.2  skrll 
    391  1.13.4.2  skrll static void
    392  1.13.4.2  skrll blf_encrypt(caddr_t key, u_int8_t *blk)
    393  1.13.4.2  skrll {
    394  1.13.4.2  skrll 
    395  1.13.4.2  skrll #if defined(__NetBSD__)
    396  1.13.4.2  skrll 	BF_ecb_encrypt(blk, blk, (BF_KEY *)key, 1);
    397  1.13.4.2  skrll #else
    398  1.13.4.2  skrll 	blf_ecb_encrypt((blf_ctx *) key, blk, 8);
    399  1.13.4.2  skrll #endif
    400  1.13.4.2  skrll }
    401  1.13.4.2  skrll 
    402  1.13.4.2  skrll static void
    403  1.13.4.2  skrll blf_decrypt(caddr_t key, u_int8_t *blk)
    404  1.13.4.2  skrll {
    405  1.13.4.2  skrll 
    406  1.13.4.2  skrll #if defined(__NetBSD__)
    407  1.13.4.2  skrll 	BF_ecb_encrypt(blk, blk, (BF_KEY *)key, 0);
    408  1.13.4.2  skrll #else
    409  1.13.4.2  skrll 	blf_ecb_decrypt((blf_ctx *) key, blk, 8);
    410  1.13.4.2  skrll #endif
    411  1.13.4.2  skrll }
    412  1.13.4.2  skrll 
    413  1.13.4.2  skrll static int
    414  1.13.4.2  skrll blf_setkey(u_int8_t **sched, const u_int8_t *key, int len)
    415  1.13.4.2  skrll {
    416  1.13.4.2  skrll 	int err;
    417  1.13.4.2  skrll 
    418  1.13.4.2  skrll #if defined(__FreeBSD__) || defined(__NetBSD__)
    419  1.13.4.2  skrll #define	BLF_SIZ	sizeof(BF_KEY)
    420  1.13.4.2  skrll #else
    421  1.13.4.2  skrll #define	BLF_SIZ	sizeof(blf_ctx)
    422  1.13.4.2  skrll #endif
    423  1.13.4.2  skrll 
    424  1.13.4.2  skrll 	MALLOC(*sched, u_int8_t *, BLF_SIZ,
    425  1.13.4.2  skrll 		M_CRYPTO_DATA, M_NOWAIT);
    426  1.13.4.2  skrll 	if (*sched != NULL) {
    427  1.13.4.2  skrll 		bzero(*sched, BLF_SIZ);
    428  1.13.4.2  skrll #if defined(__FreeBSD__) || defined(__NetBSD__)
    429  1.13.4.2  skrll 		BF_set_key((BF_KEY *) *sched, len, key);
    430  1.13.4.2  skrll #else
    431  1.13.4.2  skrll 		blf_key((blf_ctx *)*sched, key, len);
    432  1.13.4.2  skrll #endif
    433  1.13.4.2  skrll 		err = 0;
    434  1.13.4.2  skrll 	} else
    435  1.13.4.2  skrll 		err = ENOMEM;
    436  1.13.4.2  skrll 	return err;
    437  1.13.4.2  skrll }
    438  1.13.4.2  skrll 
    439  1.13.4.2  skrll static void
    440  1.13.4.2  skrll blf_zerokey(u_int8_t **sched)
    441  1.13.4.2  skrll {
    442  1.13.4.2  skrll 	bzero(*sched, BLF_SIZ);
    443  1.13.4.2  skrll 	FREE(*sched, M_CRYPTO_DATA);
    444  1.13.4.2  skrll 	*sched = NULL;
    445  1.13.4.2  skrll }
    446  1.13.4.2  skrll 
    447  1.13.4.2  skrll static void
    448  1.13.4.2  skrll cast5_encrypt(caddr_t key, u_int8_t *blk)
    449  1.13.4.2  skrll {
    450  1.13.4.2  skrll 	cast128_encrypt((cast128_key *) key, blk, blk);
    451  1.13.4.2  skrll }
    452  1.13.4.2  skrll 
    453  1.13.4.2  skrll static void
    454  1.13.4.2  skrll cast5_decrypt(caddr_t key, u_int8_t *blk)
    455  1.13.4.2  skrll {
    456  1.13.4.2  skrll 	cast128_decrypt((cast128_key *) key, blk, blk);
    457  1.13.4.2  skrll }
    458  1.13.4.2  skrll 
    459  1.13.4.2  skrll static int
    460  1.13.4.2  skrll cast5_setkey(u_int8_t **sched, const u_int8_t *key, int len)
    461  1.13.4.2  skrll {
    462  1.13.4.2  skrll 	int err;
    463  1.13.4.2  skrll 
    464  1.13.4.2  skrll 	MALLOC(*sched, u_int8_t *, sizeof(cast128_key), M_CRYPTO_DATA,
    465  1.13.4.2  skrll 	       M_NOWAIT);
    466  1.13.4.2  skrll 	if (*sched != NULL) {
    467  1.13.4.2  skrll 		bzero(*sched, sizeof(cast128_key));
    468  1.13.4.2  skrll 		cast128_setkey((cast128_key *)*sched, key, len);
    469  1.13.4.2  skrll 		err = 0;
    470  1.13.4.2  skrll 	} else
    471  1.13.4.2  skrll 		err = ENOMEM;
    472  1.13.4.2  skrll 	return err;
    473  1.13.4.2  skrll }
    474  1.13.4.2  skrll 
    475  1.13.4.2  skrll static void
    476  1.13.4.2  skrll cast5_zerokey(u_int8_t **sched)
    477  1.13.4.2  skrll {
    478  1.13.4.2  skrll 	bzero(*sched, sizeof(cast128_key));
    479  1.13.4.2  skrll 	FREE(*sched, M_CRYPTO_DATA);
    480  1.13.4.2  skrll 	*sched = NULL;
    481  1.13.4.2  skrll }
    482  1.13.4.2  skrll 
    483  1.13.4.2  skrll static void
    484  1.13.4.2  skrll skipjack_encrypt(caddr_t key, u_int8_t *blk)
    485  1.13.4.2  skrll {
    486  1.13.4.2  skrll 	skipjack_forwards(blk, blk, (u_int8_t **) key);
    487  1.13.4.2  skrll }
    488  1.13.4.2  skrll 
    489  1.13.4.2  skrll static void
    490  1.13.4.2  skrll skipjack_decrypt(caddr_t key, u_int8_t *blk)
    491  1.13.4.2  skrll {
    492  1.13.4.2  skrll 	skipjack_backwards(blk, blk, (u_int8_t **) key);
    493  1.13.4.2  skrll }
    494  1.13.4.2  skrll 
    495  1.13.4.2  skrll static int
    496  1.13.4.2  skrll skipjack_setkey(u_int8_t **sched, const u_int8_t *key, int len)
    497  1.13.4.2  skrll {
    498  1.13.4.2  skrll 	int err;
    499  1.13.4.2  skrll 
    500  1.13.4.2  skrll 	/* NB: allocate all the memory that's needed at once */
    501  1.13.4.2  skrll 	/* XXX assumes bytes are aligned on sizeof(u_char) == 1 boundaries.
    502  1.13.4.2  skrll 	 * Will this break a pdp-10, Cray-1, or GE-645 port?
    503  1.13.4.2  skrll 	 */
    504  1.13.4.2  skrll 	MALLOC(*sched, u_int8_t *, 10 * (sizeof(u_int8_t *) + 0x100),
    505  1.13.4.2  skrll 		M_CRYPTO_DATA, M_NOWAIT);
    506  1.13.4.2  skrll 
    507  1.13.4.2  skrll 	if (*sched != NULL) {
    508  1.13.4.2  skrll 
    509  1.13.4.2  skrll 		u_int8_t** key_tables = (u_int8_t**) *sched;
    510  1.13.4.2  skrll 		u_int8_t* table = (u_int8_t*) &key_tables[10];
    511  1.13.4.2  skrll 		int k;
    512  1.13.4.2  skrll 
    513  1.13.4.2  skrll 		bzero(*sched, 10 * sizeof(u_int8_t *)+0x100);
    514  1.13.4.2  skrll 
    515  1.13.4.2  skrll 		for (k = 0; k < 10; k++) {
    516  1.13.4.2  skrll 			key_tables[k] = table;
    517  1.13.4.2  skrll 			table += 0x100;
    518  1.13.4.2  skrll 		}
    519  1.13.4.2  skrll 		subkey_table_gen(key, (u_int8_t **) *sched);
    520  1.13.4.2  skrll 		err = 0;
    521  1.13.4.2  skrll 	} else
    522  1.13.4.2  skrll 		err = ENOMEM;
    523  1.13.4.2  skrll 	return err;
    524  1.13.4.2  skrll }
    525  1.13.4.2  skrll 
    526  1.13.4.2  skrll static void
    527  1.13.4.2  skrll skipjack_zerokey(u_int8_t **sched)
    528  1.13.4.2  skrll {
    529  1.13.4.2  skrll 	bzero(*sched, 10 * (sizeof(u_int8_t *) + 0x100));
    530  1.13.4.2  skrll 	FREE(*sched, M_CRYPTO_DATA);
    531  1.13.4.2  skrll 	*sched = NULL;
    532  1.13.4.2  skrll }
    533  1.13.4.2  skrll 
    534  1.13.4.2  skrll static void
    535  1.13.4.2  skrll rijndael128_encrypt(caddr_t key, u_int8_t *blk)
    536  1.13.4.2  skrll {
    537  1.13.4.2  skrll 	rijndael_encrypt((rijndael_ctx *) key, (u_char *) blk, (u_char *) blk);
    538  1.13.4.2  skrll }
    539  1.13.4.2  skrll 
    540  1.13.4.2  skrll static void
    541  1.13.4.2  skrll rijndael128_decrypt(caddr_t key, u_int8_t *blk)
    542  1.13.4.2  skrll {
    543  1.13.4.2  skrll 	rijndael_decrypt((rijndael_ctx *) key, (u_char *) blk,
    544  1.13.4.2  skrll 	    (u_char *) blk);
    545  1.13.4.2  skrll }
    546  1.13.4.2  skrll 
    547  1.13.4.2  skrll static int
    548  1.13.4.2  skrll rijndael128_setkey(u_int8_t **sched, const u_int8_t *key, int len)
    549  1.13.4.2  skrll {
    550  1.13.4.2  skrll 	int err;
    551  1.13.4.2  skrll 
    552  1.13.4.2  skrll 	MALLOC(*sched, u_int8_t *, sizeof(rijndael_ctx), M_CRYPTO_DATA,
    553  1.13.4.2  skrll 	    M_WAITOK);
    554  1.13.4.2  skrll 	if (*sched != NULL) {
    555  1.13.4.2  skrll 		bzero(*sched, sizeof(rijndael_ctx));
    556  1.13.4.2  skrll 		rijndael_set_key((rijndael_ctx *) *sched, key, len * 8);
    557  1.13.4.2  skrll 		err = 0;
    558  1.13.4.2  skrll 	} else
    559  1.13.4.2  skrll 		err = ENOMEM;
    560  1.13.4.2  skrll 	return err;
    561  1.13.4.2  skrll }
    562  1.13.4.2  skrll 
    563  1.13.4.2  skrll static void
    564  1.13.4.2  skrll rijndael128_zerokey(u_int8_t **sched)
    565  1.13.4.2  skrll {
    566  1.13.4.2  skrll 	bzero(*sched, sizeof(rijndael_ctx));
    567  1.13.4.2  skrll 	FREE(*sched, M_CRYPTO_DATA);
    568  1.13.4.2  skrll 	*sched = NULL;
    569  1.13.4.2  skrll }
    570  1.13.4.2  skrll 
    571  1.13.4.2  skrll /*
    572  1.13.4.2  skrll  * And now for auth.
    573  1.13.4.2  skrll  */
    574  1.13.4.2  skrll 
    575  1.13.4.2  skrll static void
    576  1.13.4.2  skrll null_init(void *ctx)
    577  1.13.4.2  skrll {
    578  1.13.4.2  skrll }
    579  1.13.4.2  skrll 
    580  1.13.4.2  skrll static int
    581  1.13.4.2  skrll null_update(void *ctx, const u_int8_t *buf, u_int16_t len)
    582  1.13.4.2  skrll {
    583  1.13.4.2  skrll 	return 0;
    584  1.13.4.2  skrll }
    585  1.13.4.2  skrll 
    586  1.13.4.2  skrll static void
    587  1.13.4.2  skrll null_final(u_int8_t *buf, void *ctx)
    588  1.13.4.2  skrll {
    589  1.13.4.2  skrll 	if (buf != (u_int8_t *) 0)
    590  1.13.4.2  skrll 		bzero(buf, 12);
    591  1.13.4.2  skrll }
    592  1.13.4.2  skrll 
    593  1.13.4.2  skrll static int
    594  1.13.4.2  skrll RMD160Update_int(void *ctx, const u_int8_t *buf, u_int16_t len)
    595  1.13.4.2  skrll {
    596  1.13.4.2  skrll 	RMD160Update(ctx, buf, len);
    597  1.13.4.2  skrll 	return 0;
    598  1.13.4.2  skrll }
    599  1.13.4.2  skrll 
    600  1.13.4.2  skrll static int
    601  1.13.4.2  skrll MD5Update_int(void *ctx, const u_int8_t *buf, u_int16_t len)
    602  1.13.4.2  skrll {
    603  1.13.4.2  skrll 	MD5Update(ctx, buf, len);
    604  1.13.4.2  skrll 	return 0;
    605  1.13.4.2  skrll }
    606  1.13.4.2  skrll 
    607  1.13.4.2  skrll static void
    608  1.13.4.2  skrll SHA1Init_int(void *ctx)
    609  1.13.4.2  skrll {
    610  1.13.4.2  skrll 	SHA1Init(ctx);
    611  1.13.4.2  skrll }
    612  1.13.4.2  skrll 
    613  1.13.4.2  skrll static int
    614  1.13.4.2  skrll SHA1Update_int(void *ctx, const u_int8_t *buf, u_int16_t len)
    615  1.13.4.2  skrll {
    616  1.13.4.2  skrll 	SHA1Update(ctx, buf, len);
    617  1.13.4.2  skrll 	return 0;
    618  1.13.4.2  skrll }
    619  1.13.4.2  skrll 
    620  1.13.4.2  skrll static void
    621  1.13.4.2  skrll SHA1Final_int(u_int8_t *blk, void *ctx)
    622  1.13.4.2  skrll {
    623  1.13.4.2  skrll 	SHA1Final(blk, ctx);
    624  1.13.4.2  skrll }
    625  1.13.4.2  skrll 
    626  1.13.4.2  skrll static int
    627  1.13.4.2  skrll SHA256Update_int(void *ctx, const u_int8_t *buf, u_int16_t len)
    628  1.13.4.2  skrll {
    629  1.13.4.2  skrll 	SHA256_Update(ctx, buf, len);
    630  1.13.4.2  skrll 	return 0;
    631  1.13.4.2  skrll }
    632  1.13.4.2  skrll 
    633  1.13.4.2  skrll static int
    634  1.13.4.2  skrll SHA384Update_int(void *ctx, const u_int8_t *buf, u_int16_t len)
    635  1.13.4.2  skrll {
    636  1.13.4.2  skrll 	SHA384_Update(ctx, buf, len);
    637  1.13.4.2  skrll 	return 0;
    638  1.13.4.2  skrll }
    639  1.13.4.2  skrll 
    640  1.13.4.2  skrll static int
    641  1.13.4.2  skrll SHA512Update_int(void *ctx, const u_int8_t *buf, u_int16_t len)
    642  1.13.4.2  skrll {
    643  1.13.4.2  skrll 	SHA512_Update(ctx, buf, len);
    644  1.13.4.2  skrll 	return 0;
    645  1.13.4.2  skrll }
    646  1.13.4.2  skrll 
    647  1.13.4.2  skrll /*
    648  1.13.4.2  skrll  * And compression
    649  1.13.4.2  skrll  */
    650  1.13.4.2  skrll 
    651  1.13.4.2  skrll static u_int32_t
    652  1.13.4.2  skrll deflate_compress(data, size, out)
    653  1.13.4.2  skrll 	u_int8_t *data;
    654  1.13.4.2  skrll 	u_int32_t size;
    655  1.13.4.2  skrll 	u_int8_t **out;
    656  1.13.4.2  skrll {
    657  1.13.4.2  skrll 	return deflate_global(data, size, 0, out);
    658  1.13.4.2  skrll }
    659  1.13.4.2  skrll 
    660  1.13.4.2  skrll static u_int32_t
    661  1.13.4.2  skrll deflate_decompress(data, size, out)
    662  1.13.4.2  skrll 	u_int8_t *data;
    663  1.13.4.2  skrll 	u_int32_t size;
    664  1.13.4.2  skrll 	u_int8_t **out;
    665  1.13.4.2  skrll {
    666  1.13.4.2  skrll 	return deflate_global(data, size, 1, out);
    667  1.13.4.2  skrll }
    668