xform.c revision 1.21 1 /* $NetBSD: xform.c,v 1.21 2011/03/09 11:43:36 drochner Exp $ */
2 /* $FreeBSD: src/sys/opencrypto/xform.c,v 1.1.2.1 2002/11/21 23:34:23 sam Exp $ */
3 /* $OpenBSD: xform.c,v 1.19 2002/08/16 22:47:25 dhartmei Exp $ */
4
5 /*
6 * The authors of this code are John Ioannidis (ji (at) tla.org),
7 * Angelos D. Keromytis (kermit (at) csd.uch.gr) and
8 * Niels Provos (provos (at) physnet.uni-hamburg.de).
9 *
10 * This code was written by John Ioannidis for BSD/OS in Athens, Greece,
11 * in November 1995.
12 *
13 * Ported to OpenBSD and NetBSD, with additional transforms, in December 1996,
14 * by Angelos D. Keromytis.
15 *
16 * Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis
17 * and Niels Provos.
18 *
19 * Additional features in 1999 by Angelos D. Keromytis.
20 *
21 * Copyright (C) 1995, 1996, 1997, 1998, 1999 by John Ioannidis,
22 * Angelos D. Keromytis and Niels Provos.
23 *
24 * Copyright (C) 2001, Angelos D. Keromytis.
25 *
26 * Permission to use, copy, and modify this software with or without fee
27 * is hereby granted, provided that this entire notice is included in
28 * all copies of any software which is or includes a copy or
29 * modification of this software.
30 * You may use this code under the GNU public license if you so wish. Please
31 * contribute changes back to the authors under this freer than GPL license
32 * so that we may further the use of strong encryption without limitations to
33 * all.
34 *
35 * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR
36 * IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY
37 * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
38 * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
39 * PURPOSE.
40 */
41
42 #include <sys/cdefs.h>
43 __KERNEL_RCSID(0, "$NetBSD: xform.c,v 1.21 2011/03/09 11:43:36 drochner Exp $");
44
45 #include <sys/param.h>
46 #include <sys/malloc.h>
47
48 #include <opencrypto/cryptodev.h>
49 #include <opencrypto/xform.h>
50
51 MALLOC_DEFINE(M_XDATA, "xform", "xform data buffers");
52
53 const u_int8_t hmac_ipad_buffer[128] = {
54 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
55 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
56 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
57 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
58 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
59 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
60 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
61 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
62 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
63 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
64 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
65 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
66 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
67 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
68 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
69 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36
70 };
71
72 const u_int8_t hmac_opad_buffer[128] = {
73 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
74 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
75 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
76 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
77 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
78 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
79 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
80 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
81 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
82 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
83 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
84 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
85 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
86 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
87 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
88 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C
89 };
90
91 /* Encryption instances */
92 const struct enc_xform enc_xform_null = {
93 CRYPTO_NULL_CBC, "NULL",
94 /* NB: blocksize of 4 is to generate a properly aligned ESP header */
95 4, 0, 256 /* 2048 bits, max key */
96 };
97
98 const struct enc_xform enc_xform_des = {
99 CRYPTO_DES_CBC, "DES",
100 8, 8, 8
101 };
102
103 const struct enc_xform enc_xform_3des = {
104 CRYPTO_3DES_CBC, "3DES",
105 8, 24, 24
106 };
107
108 const struct enc_xform enc_xform_blf = {
109 CRYPTO_BLF_CBC, "Blowfish",
110 8, 5, 56 /* 448 bits, max key */
111 };
112
113 const struct enc_xform enc_xform_cast5 = {
114 CRYPTO_CAST_CBC, "CAST-128",
115 8, 5, 16
116 };
117
118 const struct enc_xform enc_xform_skipjack = {
119 CRYPTO_SKIPJACK_CBC, "Skipjack",
120 8, 10, 10
121 };
122
123 const struct enc_xform enc_xform_rijndael128 = {
124 CRYPTO_RIJNDAEL128_CBC, "Rijndael-128/AES",
125 16, 8, 32
126 };
127
128 const struct enc_xform enc_xform_arc4 = {
129 CRYPTO_ARC4, "ARC4",
130 1, 1, 32
131 };
132
133 /* Authentication instances */
134 const struct auth_hash auth_hash_null = {
135 CRYPTO_NULL_HMAC, "NULL-HMAC",
136 0, 0, 12, 64, sizeof(int) /* NB: context isn't used */
137 };
138
139 const struct auth_hash auth_hash_hmac_md5 = {
140 CRYPTO_MD5_HMAC, "HMAC-MD5",
141 16, 16, 16, 64, sizeof(MD5_CTX)
142 };
143
144 const struct auth_hash auth_hash_hmac_sha1 = {
145 CRYPTO_SHA1_HMAC, "HMAC-SHA1",
146 20, 20, 20, 64, sizeof(SHA1_CTX)
147 };
148
149 const struct auth_hash auth_hash_hmac_ripemd_160 = {
150 CRYPTO_RIPEMD160_HMAC, "HMAC-RIPEMD-160",
151 20, 20, 20, 64, sizeof(RMD160_CTX)
152 };
153
154 const struct auth_hash auth_hash_hmac_md5_96 = {
155 CRYPTO_MD5_HMAC_96, "HMAC-MD5-96",
156 16, 16, 12, 64, sizeof(MD5_CTX)
157 };
158
159 const struct auth_hash auth_hash_hmac_sha1_96 = {
160 CRYPTO_SHA1_HMAC_96, "HMAC-SHA1-96",
161 20, 20, 12, 64, sizeof(SHA1_CTX)
162 };
163
164 const struct auth_hash auth_hash_hmac_ripemd_160_96 = {
165 CRYPTO_RIPEMD160_HMAC_96, "HMAC-RIPEMD-160",
166 20, 20, 12, 64, sizeof(RMD160_CTX)
167 };
168
169 const struct auth_hash auth_hash_key_md5 = {
170 CRYPTO_MD5_KPDK, "Keyed MD5",
171 0, 16, 16, 0, sizeof(MD5_CTX)
172 };
173
174 const struct auth_hash auth_hash_key_sha1 = {
175 CRYPTO_SHA1_KPDK, "Keyed SHA1",
176 0, 20, 20, 0, sizeof(SHA1_CTX)
177 };
178
179 const struct auth_hash auth_hash_md5 = {
180 CRYPTO_MD5, "MD5",
181 0, 16, 16, 0, sizeof(MD5_CTX)
182 };
183
184 const struct auth_hash auth_hash_sha1 = {
185 CRYPTO_SHA1, "SHA1",
186 0, 20, 20, 0, sizeof(SHA1_CTX)
187 };
188
189 const struct auth_hash auth_hash_hmac_sha2_256 = {
190 CRYPTO_SHA2_256_HMAC, "HMAC-SHA2",
191 32, 32, 16, 64, sizeof(SHA256_CTX)
192 };
193
194 const struct auth_hash auth_hash_hmac_sha2_384 = {
195 CRYPTO_SHA2_384_HMAC, "HMAC-SHA2-384",
196 48, 48, 24, 128, sizeof(SHA384_CTX)
197 };
198
199 const struct auth_hash auth_hash_hmac_sha2_512 = {
200 CRYPTO_SHA2_512_HMAC, "HMAC-SHA2-512",
201 64, 64, 32, 128, sizeof(SHA512_CTX)
202 };
203
204 /* Compression instance */
205 const struct comp_algo comp_algo_deflate = {
206 CRYPTO_DEFLATE_COMP, "Deflate",
207 90
208 };
209
210 const struct comp_algo comp_algo_deflate_nogrow = {
211 CRYPTO_DEFLATE_COMP_NOGROW, "Deflate",
212 90
213 };
214
215 const struct comp_algo comp_algo_gzip = {
216 CRYPTO_GZIP_COMP, "GZIP",
217 90
218 };
219