Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(686)

Side by Side Diff: nss/lib/freebl/ctr.c

Issue 2078763002: Delete bundled copy of NSS and replace with README. (Closed) Base URL: https://chromium.googlesource.com/chromium/deps/nss@master
Patch Set: Delete bundled copy of NSS and replace with README. Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « nss/lib/freebl/ctr.h ('k') | nss/lib/freebl/cts.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
4
5 #ifdef FREEBL_NO_DEPEND
6 #include "stubs.h"
7 #endif
8 #include "prtypes.h"
9 #include "blapit.h"
10 #include "blapii.h"
11 #include "ctr.h"
12 #include "pkcs11t.h"
13 #include "secerr.h"
14
15 #ifdef USE_HW_AES
16 #include "intel-aes.h"
17 #include "rijndael.h"
18 #endif
19
20 SECStatus
21 CTR_InitContext(CTRContext *ctr, void *context, freeblCipherFunc cipher,
22 const unsigned char *param, unsigned int blocksize)
23 {
24 const CK_AES_CTR_PARAMS *ctrParams = (const CK_AES_CTR_PARAMS *)param;
25
26 if (ctrParams->ulCounterBits == 0 ||
27 ctrParams->ulCounterBits > blocksize * PR_BITS_PER_BYTE) {
28 PORT_SetError(SEC_ERROR_INVALID_ARGS);
29 return SECFailure;
30 }
31
32 /* Invariant: 0 < ctr->bufPtr <= blocksize */
33 ctr->bufPtr = blocksize; /* no unused data in the buffer */
34 ctr->cipher = cipher;
35 ctr->context = context;
36 ctr->counterBits = ctrParams->ulCounterBits;
37 if (blocksize > sizeof(ctr->counter) ||
38 blocksize > sizeof(ctrParams->cb)) {
39 PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
40 return SECFailure;
41 }
42 PORT_Memcpy(ctr->counter, ctrParams->cb, blocksize);
43 return SECSuccess;
44 }
45
46 CTRContext *
47 CTR_CreateContext(void *context, freeblCipherFunc cipher,
48 const unsigned char *param, unsigned int blocksize)
49 {
50 CTRContext *ctr;
51 SECStatus rv;
52
53 /* first fill in the Counter context */
54 ctr = PORT_ZNew(CTRContext);
55 if (ctr == NULL) {
56 return NULL;
57 }
58 rv = CTR_InitContext(ctr, context, cipher, param, blocksize);
59 if (rv != SECSuccess) {
60 CTR_DestroyContext(ctr, PR_TRUE);
61 ctr = NULL;
62 }
63 return ctr;
64 }
65
66 void
67 CTR_DestroyContext(CTRContext *ctr, PRBool freeit)
68 {
69 PORT_Memset(ctr, 0, sizeof(CTRContext));
70 if (freeit) {
71 PORT_Free(ctr);
72 }
73 }
74
75 /*
76 * Used by counter mode. Increment the counter block. Not all bits in the
77 * counter block are part of the counter, counterBits tells how many bits
78 * are part of the counter. The counter block is blocksize long. It's a
79 * big endian value.
80 *
81 * XXX Does not handle counter rollover.
82 */
83 static void
84 ctr_GetNextCtr(unsigned char *counter, unsigned int counterBits,
85 unsigned int blocksize)
86 {
87 unsigned char *counterPtr = counter + blocksize - 1;
88 unsigned char mask, count;
89
90 PORT_Assert(counterBits <= blocksize*PR_BITS_PER_BYTE);
91 while (counterBits >= PR_BITS_PER_BYTE) {
92 if (++(*(counterPtr--))) {
93 return;
94 }
95 counterBits -= PR_BITS_PER_BYTE;
96 }
97 if (counterBits == 0) {
98 return;
99 }
100 /* increment the final partial byte */
101 mask = (1 << counterBits)-1;
102 count = ++(*counterPtr) & mask;
103 *counterPtr = ((*counterPtr) & ~mask) | count;
104 return;
105 }
106
107 static void
108 ctr_xor(unsigned char *target, const unsigned char *x,
109 const unsigned char *y, unsigned int count)
110 {
111 unsigned int i;
112 for (i=0; i < count; i++) {
113 *target++ = *x++ ^ *y++;
114 }
115 }
116
117 SECStatus
118 CTR_Update(CTRContext *ctr, unsigned char *outbuf,
119 unsigned int *outlen, unsigned int maxout,
120 const unsigned char *inbuf, unsigned int inlen,
121 unsigned int blocksize)
122 {
123 unsigned int tmp;
124 SECStatus rv;
125
126 if (maxout < inlen) {
127 *outlen = inlen;
128 PORT_SetError(SEC_ERROR_OUTPUT_LEN);
129 return SECFailure;
130 }
131 *outlen = 0;
132 if (ctr->bufPtr != blocksize) {
133 unsigned int needed = PR_MIN(blocksize-ctr->bufPtr, inlen);
134 ctr_xor(outbuf, inbuf, ctr->buffer + ctr->bufPtr, needed);
135 ctr->bufPtr += needed;
136 outbuf += needed;
137 inbuf += needed;
138 *outlen += needed;
139 inlen -= needed;
140 if (inlen == 0) {
141 return SECSuccess;
142 }
143 PORT_Assert(ctr->bufPtr == blocksize);
144 }
145
146 while (inlen >= blocksize) {
147 rv = (*ctr->cipher)(ctr->context, ctr->buffer, &tmp, blocksize,
148 ctr->counter, blocksize, blocksize);
149 ctr_GetNextCtr(ctr->counter, ctr->counterBits, blocksize);
150 if (rv != SECSuccess) {
151 return SECFailure;
152 }
153 ctr_xor(outbuf, inbuf, ctr->buffer, blocksize);
154 outbuf += blocksize;
155 inbuf += blocksize;
156 *outlen += blocksize;
157 inlen -= blocksize;
158 }
159 if (inlen == 0) {
160 return SECSuccess;
161 }
162 rv = (*ctr->cipher)(ctr->context, ctr->buffer, &tmp, blocksize,
163 ctr->counter, blocksize, blocksize);
164 ctr_GetNextCtr(ctr->counter, ctr->counterBits, blocksize);
165 if (rv != SECSuccess) {
166 return SECFailure;
167 }
168 ctr_xor(outbuf, inbuf, ctr->buffer, inlen);
169 ctr->bufPtr = inlen;
170 *outlen += inlen;
171 return SECSuccess;
172 }
173
174 #if defined(USE_HW_AES) && defined(_MSC_VER)
175 SECStatus
176 CTR_Update_HW_AES(CTRContext *ctr, unsigned char *outbuf,
177 unsigned int *outlen, unsigned int maxout,
178 const unsigned char *inbuf, unsigned int inlen,
179 unsigned int blocksize)
180 {
181 unsigned int fullblocks;
182 unsigned int tmp;
183 SECStatus rv;
184
185 if (maxout < inlen) {
186 *outlen = inlen;
187 PORT_SetError(SEC_ERROR_OUTPUT_LEN);
188 return SECFailure;
189 }
190 *outlen = 0;
191 if (ctr->bufPtr != blocksize) {
192 unsigned int needed = PR_MIN(blocksize-ctr->bufPtr, inlen);
193 ctr_xor(outbuf, inbuf, ctr->buffer + ctr->bufPtr, needed);
194 ctr->bufPtr += needed;
195 outbuf += needed;
196 inbuf += needed;
197 *outlen += needed;
198 inlen -= needed;
199 if (inlen == 0) {
200 return SECSuccess;
201 }
202 PORT_Assert(ctr->bufPtr == blocksize);
203 }
204
205 intel_aes_ctr_worker(((AESContext*)(ctr->context))->Nr)(
206 ctr, outbuf, outlen, maxout, inbuf, inlen, blocksize);
207 /* XXX intel_aes_ctr_worker should set *outlen. */
208 PORT_Assert(*outlen == 0);
209 fullblocks = (inlen/blocksize)*blocksize;
210 *outlen += fullblocks;
211 outbuf += fullblocks;
212 inbuf += fullblocks;
213 inlen -= fullblocks;
214
215 if (inlen == 0) {
216 return SECSuccess;
217 }
218 rv = (*ctr->cipher)(ctr->context, ctr->buffer, &tmp, blocksize,
219 ctr->counter, blocksize, blocksize);
220 ctr_GetNextCtr(ctr->counter, ctr->counterBits, blocksize);
221 if (rv != SECSuccess) {
222 return SECFailure;
223 }
224 ctr_xor(outbuf, inbuf, ctr->buffer, inlen);
225 ctr->bufPtr = inlen;
226 *outlen += inlen;
227 return SECSuccess;
228 }
229 #endif
OLDNEW
« no previous file with comments | « nss/lib/freebl/ctr.h ('k') | nss/lib/freebl/cts.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698