Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(65)

Side by Side Diff: srtp/crypto/cipher/aes_cbc.c

Issue 889083003: Update libsrtp to upstream 1.5.0 (Closed) Base URL: https://chromium.googlesource.com/chromium/deps/libsrtp@master
Patch Set: Minimal changes against upstream 1.5.0 Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * aes_cbc.c 2 * aes_cbc.c
3 * 3 *
4 * AES Cipher Block Chaining Mode 4 * AES Cipher Block Chaining Mode
5 * 5 *
6 * David A. McGrew 6 * David A. McGrew
7 * Cisco Systems, Inc. 7 * Cisco Systems, Inc.
8 */ 8 */
9 9
10 /* 10 /*
(...skipping 25 matching lines...) Expand all
36 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 36 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
37 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 37 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
38 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 38 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
39 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 39 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
40 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 40 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
41 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 41 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
42 * OF THE POSSIBILITY OF SUCH DAMAGE. 42 * OF THE POSSIBILITY OF SUCH DAMAGE.
43 * 43 *
44 */ 44 */
45 45
46 #ifdef HAVE_CONFIG_H
47 #include <config.h>
48 #endif
46 49
47 #include "aes_cbc.h" 50 #include "aes_cbc.h"
48 #include "alloc.h" 51 #include "alloc.h"
49 52
50 debug_module_t mod_aes_cbc = { 53 debug_module_t mod_aes_cbc = {
51 0, /* debugging is off by default */ 54 0, /* debugging is off by default */
52 "aes cbc" /* printable module name */ 55 "aes cbc" /* printable module name */
53 }; 56 };
54 57
55 58
56 59
57 err_status_t 60 err_status_t
58 aes_cbc_alloc(cipher_t **c, int key_len) { 61 aes_cbc_alloc(cipher_t **c, int key_len, int tlen) {
59 extern cipher_type_t aes_cbc; 62 extern cipher_type_t aes_cbc;
60 uint8_t *pointer; 63 uint8_t *pointer;
61 int tmp; 64 int tmp;
62 65
63 debug_print(mod_aes_cbc, 66 debug_print(mod_aes_cbc,
64 "allocating cipher with key length %d", key_len); 67 "allocating cipher with key length %d", key_len);
65 68
66 if (key_len != 16 && key_len != 24 && key_len != 32) 69 if (key_len != 16 && key_len != 24 && key_len != 32)
67 return err_status_bad_param; 70 return err_status_bad_param;
68 71
(...skipping 28 matching lines...) Expand all
97 /* free memory */ 100 /* free memory */
98 crypto_free(c); 101 crypto_free(c);
99 102
100 /* decrement ref_count */ 103 /* decrement ref_count */
101 aes_cbc.ref_count--; 104 aes_cbc.ref_count--;
102 105
103 return err_status_ok; 106 return err_status_ok;
104 } 107 }
105 108
106 err_status_t 109 err_status_t
107 aes_cbc_context_init(aes_cbc_ctx_t *c, const uint8_t *key, int key_len, 110 aes_cbc_context_init(aes_cbc_ctx_t *c, const uint8_t *key, int key_len) {
108 » » cipher_direction_t dir) {
109 err_status_t status;
110 111
111 debug_print(mod_aes_cbc, 112 debug_print(mod_aes_cbc,
112 "key: %s", octet_string_hex_string(key, key_len)); 113 "key: %s", octet_string_hex_string(key, key_len));
113 114
114 /* expand key for the appropriate direction */ 115 /*
115 switch (dir) { 116 * Save the key until we have the IV later. We don't
116 case (direction_encrypt): 117 * know the direction until the IV is set.
117 status = aes_expand_encryption_key(key, key_len, &c->expanded_key); 118 */
118 if (status) 119 c->key_len = (key_len <= 32 ? key_len : 32);
119 return status; 120 memcpy(c->key, key, c->key_len);
120 break;
121 case (direction_decrypt):
122 status = aes_expand_decryption_key(key, key_len, &c->expanded_key);
123 if (status)
124 return status;
125 break;
126 default:
127 return err_status_bad_param;
128 }
129
130 121
131 return err_status_ok; 122 return err_status_ok;
132 } 123 }
133 124
134 125
135 err_status_t 126 err_status_t
136 aes_cbc_set_iv(aes_cbc_ctx_t *c, void *iv) { 127 aes_cbc_set_iv(aes_cbc_ctx_t *c, void *iv, int direction) {
128 err_status_t status;
137 int i; 129 int i;
138 /* v128_t *input = iv; */ 130 /* v128_t *input = iv; */
139 uint8_t *input = (uint8_t*) iv; 131 uint8_t *input = (uint8_t*) iv;
140 132
141 /* set state and 'previous' block to iv */ 133 /* set state and 'previous' block to iv */
142 for (i=0; i < 16; i++) 134 for (i=0; i < 16; i++)
143 c->previous.v8[i] = c->state.v8[i] = input[i]; 135 c->previous.v8[i] = c->state.v8[i] = input[i];
144 136
145 debug_print(mod_aes_cbc, "setting iv: %s", v128_hex_string(&c->state)); 137 debug_print(mod_aes_cbc, "setting iv: %s", v128_hex_string(&c->state));
146 138
139 /* expand key for the appropriate direction */
140 switch (direction) {
141 case (direction_encrypt):
142 status = aes_expand_encryption_key(c->key, c->key_len, &c->expanded_key);
143 memset(c->key, 0, 32);
144 if (status)
145 return status;
146 break;
147 case (direction_decrypt):
148 status = aes_expand_decryption_key(c->key, c->key_len, &c->expanded_key);
149 memset(c->key, 0, 32);
150 if (status)
151 return status;
152 break;
153 default:
154 return err_status_bad_param;
155 }
156
147 return err_status_ok; 157 return err_status_ok;
148 } 158 }
149 159
150 err_status_t 160 err_status_t
151 aes_cbc_encrypt(aes_cbc_ctx_t *c, 161 aes_cbc_encrypt(aes_cbc_ctx_t *c,
152 unsigned char *data, 162 unsigned char *data,
153 unsigned int *bytes_in_data) { 163 unsigned int *bytes_in_data) {
154 int i; 164 int i;
155 unsigned char *input = data; /* pointer to data being read */ 165 unsigned char *input = data; /* pointer to data being read */
156 unsigned char *output = data; /* pointer to data being written */ 166 unsigned char *output = data; /* pointer to data being written */
(...skipping 211 matching lines...) Expand 10 before | Expand all | Expand 10 after
368 378
369 379
370 cipher_test_case_t aes_cbc_test_case_0 = { 380 cipher_test_case_t aes_cbc_test_case_0 = {
371 16, /* octets in key */ 381 16, /* octets in key */
372 aes_cbc_test_case_0_key, /* key */ 382 aes_cbc_test_case_0_key, /* key */
373 aes_cbc_test_case_0_iv, /* initialization vector */ 383 aes_cbc_test_case_0_iv, /* initialization vector */
374 16, /* octets in plaintext */ 384 16, /* octets in plaintext */
375 aes_cbc_test_case_0_plaintext, /* plaintext */ 385 aes_cbc_test_case_0_plaintext, /* plaintext */
376 32, /* octets in ciphertext */ 386 32, /* octets in ciphertext */
377 aes_cbc_test_case_0_ciphertext, /* ciphertext */ 387 aes_cbc_test_case_0_ciphertext, /* ciphertext */
388 0,
389 NULL,
390 0,
378 NULL /* pointer to next testcase */ 391 NULL /* pointer to next testcase */
379 }; 392 };
380 393
381 394
382 /* 395 /*
383 * this test case is taken directly from Appendix F.2 of NIST Special 396 * this test case is taken directly from Appendix F.2 of NIST Special
384 * Publication SP 800-38A 397 * Publication SP 800-38A
385 */ 398 */
386 399
387 uint8_t aes_cbc_test_case_1_key[16] = { 400 uint8_t aes_cbc_test_case_1_key[16] = {
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after
419 }; 432 };
420 433
421 cipher_test_case_t aes_cbc_test_case_1 = { 434 cipher_test_case_t aes_cbc_test_case_1 = {
422 16, /* octets in key */ 435 16, /* octets in key */
423 aes_cbc_test_case_1_key, /* key */ 436 aes_cbc_test_case_1_key, /* key */
424 aes_cbc_test_case_1_iv, /* initialization vector */ 437 aes_cbc_test_case_1_iv, /* initialization vector */
425 64, /* octets in plaintext */ 438 64, /* octets in plaintext */
426 aes_cbc_test_case_1_plaintext, /* plaintext */ 439 aes_cbc_test_case_1_plaintext, /* plaintext */
427 80, /* octets in ciphertext */ 440 80, /* octets in ciphertext */
428 aes_cbc_test_case_1_ciphertext, /* ciphertext */ 441 aes_cbc_test_case_1_ciphertext, /* ciphertext */
442 0,
443 NULL,
444 0,
429 &aes_cbc_test_case_0 /* pointer to next testcase */ 445 &aes_cbc_test_case_0 /* pointer to next testcase */
430 }; 446 };
431 447
432 /* 448 /*
433 * Test case 2 is like test case 0, but for 256-bit keys. (FIPS 197 449 * Test case 2 is like test case 0, but for 256-bit keys. (FIPS 197
434 * appendix C.3). 450 * appendix C.3).
435 */ 451 */
436 452
437 453
438 uint8_t aes_cbc_test_case_2_key[32] = { 454 uint8_t aes_cbc_test_case_2_key[32] = {
(...skipping 21 matching lines...) Expand all
460 }; 476 };
461 477
462 cipher_test_case_t aes_cbc_test_case_2 = { 478 cipher_test_case_t aes_cbc_test_case_2 = {
463 32, /* octets in key */ 479 32, /* octets in key */
464 aes_cbc_test_case_2_key, /* key */ 480 aes_cbc_test_case_2_key, /* key */
465 aes_cbc_test_case_2_iv, /* initialization vector */ 481 aes_cbc_test_case_2_iv, /* initialization vector */
466 16, /* octets in plaintext */ 482 16, /* octets in plaintext */
467 aes_cbc_test_case_2_plaintext, /* plaintext */ 483 aes_cbc_test_case_2_plaintext, /* plaintext */
468 32, /* octets in ciphertext */ 484 32, /* octets in ciphertext */
469 aes_cbc_test_case_2_ciphertext, /* ciphertext */ 485 aes_cbc_test_case_2_ciphertext, /* ciphertext */
486 0,
487 NULL,
488 0,
470 &aes_cbc_test_case_1 /* pointer to next testcase */ 489 &aes_cbc_test_case_1 /* pointer to next testcase */
471 }; 490 };
472 491
473 492
474 /* 493 /*
475 * this test case is taken directly from Appendix F.2 of NIST Special 494 * this test case is taken directly from Appendix F.2 of NIST Special
476 * Publication SP 800-38A 495 * Publication SP 800-38A
477 */ 496 */
478 497
479 uint8_t aes_cbc_test_case_3_key[32] = { 498 uint8_t aes_cbc_test_case_3_key[32] = {
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after
513 }; 532 };
514 533
515 cipher_test_case_t aes_cbc_test_case_3 = { 534 cipher_test_case_t aes_cbc_test_case_3 = {
516 32, /* octets in key */ 535 32, /* octets in key */
517 aes_cbc_test_case_3_key, /* key */ 536 aes_cbc_test_case_3_key, /* key */
518 aes_cbc_test_case_3_iv, /* initialization vector */ 537 aes_cbc_test_case_3_iv, /* initialization vector */
519 64, /* octets in plaintext */ 538 64, /* octets in plaintext */
520 aes_cbc_test_case_3_plaintext, /* plaintext */ 539 aes_cbc_test_case_3_plaintext, /* plaintext */
521 80, /* octets in ciphertext */ 540 80, /* octets in ciphertext */
522 aes_cbc_test_case_3_ciphertext, /* ciphertext */ 541 aes_cbc_test_case_3_ciphertext, /* ciphertext */
542 0,
543 NULL,
544 0,
523 &aes_cbc_test_case_2 /* pointer to next testcase */ 545 &aes_cbc_test_case_2 /* pointer to next testcase */
524 }; 546 };
525 547
526 cipher_type_t aes_cbc = { 548 cipher_type_t aes_cbc = {
527 (cipher_alloc_func_t) aes_cbc_alloc, 549 (cipher_alloc_func_t) aes_cbc_alloc,
528 (cipher_dealloc_func_t) aes_cbc_dealloc, 550 (cipher_dealloc_func_t) aes_cbc_dealloc,
529 (cipher_init_func_t) aes_cbc_context_init, 551 (cipher_init_func_t) aes_cbc_context_init,
552 (cipher_set_aad_func_t) 0,
530 (cipher_encrypt_func_t) aes_cbc_nist_encrypt, 553 (cipher_encrypt_func_t) aes_cbc_nist_encrypt,
531 (cipher_decrypt_func_t) aes_cbc_nist_decrypt, 554 (cipher_decrypt_func_t) aes_cbc_nist_decrypt,
532 (cipher_set_iv_func_t) aes_cbc_set_iv, 555 (cipher_set_iv_func_t) aes_cbc_set_iv,
556 (cipher_get_tag_func_t) 0,
533 (char *) aes_cbc_description, 557 (char *) aes_cbc_description,
534 (int) 0, /* instance count */ 558 (int) 0, /* instance count */
535 (cipher_test_case_t *) &aes_cbc_test_case_3, 559 (cipher_test_case_t *) &aes_cbc_test_case_3,
536 (debug_module_t *) &mod_aes_cbc, 560 (debug_module_t *) &mod_aes_cbc,
537 (cipher_type_id_t) AES_CBC 561 (cipher_type_id_t) AES_CBC
538 }; 562 };
539 563
540 564
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698