X-Git-Url: http://git.code-monkey.de/?p=umurmur.git;a=blobdiff_plain;f=src%2Fcrypt.c;h=4b1b4f4261af769c09cb7b741eb6c6b29ac5b64d;hp=ddf1f74af93dc9eff77e922e116555860aefbd79;hb=6fb422b7cbb94a2b8063c6df630b04184414b633;hpb=a7ffadd41a1457e24ffde19a081c4b8bffe1b3b8 diff --git a/src/crypt.c b/src/crypt.c index ddf1f74..4b1b4f4 100644 --- a/src/crypt.c +++ b/src/crypt.c @@ -43,7 +43,7 @@ #include "crypt.h" #include "ssl.h" -#ifdef USE_POLARSSL_HAVEGE +#if defined(USE_POLARSSL_HAVEGE) || defined(USE_MBEDTLS_HAVEGE) extern havege_state hs; #endif @@ -68,17 +68,15 @@ bool_t CryptState_isValid(cryptState_t *cs) return cs->bInit; } -void CryptState_genKey(cryptState_t *cs) { - RAND_bytes(cs->raw_key, AES_BLOCK_SIZE); - RAND_bytes(cs->encrypt_iv, AES_BLOCK_SIZE); - RAND_bytes(cs->decrypt_iv, AES_BLOCK_SIZE); -#ifndef USE_POLARSSL - AES_set_encrypt_key(cs->raw_key, 128, &cs->encrypt_key); - AES_set_decrypt_key(cs->raw_key, 128, &cs->decrypt_key); -#else - aes_setkey_enc(&cs->aes_enc, cs->raw_key, 128); - aes_setkey_dec(&cs->aes_dec, cs->raw_key, 128); -#endif +void CryptState_genKey(cryptState_t *cs) +{ + CRYPT_RANDOM_BYTES(&cs->raw_key, AES_BLOCK_SIZE); + CRYPT_RANDOM_BYTES(&cs->encrypt_iv, AES_BLOCK_SIZE); + CRYPT_RANDOM_BYTES(&cs->decrypt_iv, AES_BLOCK_SIZE); + + CRYPT_SET_ENC_KEY(&cs->encrypt_key, cs->raw_key, 128); + CRYPT_SET_DEC_KEY(&cs->decrypt_key, cs->raw_key, 128); + cs->bInit = true; } @@ -87,13 +85,10 @@ void CryptState_setKey(cryptState_t *cs, const unsigned char *rkey, const unsign memcpy(cs->raw_key, rkey, AES_BLOCK_SIZE); memcpy(cs->encrypt_iv, eiv, AES_BLOCK_SIZE); memcpy(cs->decrypt_iv, div, AES_BLOCK_SIZE); -#ifndef USE_POLARSSL - AES_set_encrypt_key(cs->decrypt_iv, 128, &cs->encrypt_key); - AES_set_decrypt_key(cs->raw_key, 128, &cs->decrypt_key); -#else - aes_setkey_enc(&cs->aes_enc, cs->decrypt_iv, 128); - aes_setkey_dec(&cs->aes_dec, cs->raw_key, 128); -#endif + + CRYPT_SET_ENC_KEY(&cs->encrypt_key, cs->decrypt_iv, 128); + CRYPT_SET_DEC_KEY(&cs->decrypt_key, cs->raw_key, 128); + cs->bInit = true; } @@ -215,34 +210,6 @@ bool_t CryptState_decrypt(cryptState_t *cs, const unsigned char *source, unsigne return true; } -#if defined(__LP64__) -#define BLOCKSIZE 2 -#define SHIFTBITS 63 -typedef uint64_t subblock; - -#if __BYTE_ORDER == __BIG_ENDIAN -#define SWAPPED(x) (x) -#else -#ifdef __x86_64__ -#define SWAPPED(x) ({register uint64_t __out, __in = (x); __asm__("bswap %q0" : "=r"(__out) : "0"(__in)); __out;}) -#else -#include -#define SWAPPED(x) bswap_64(x) -#endif -#endif - -#else - -#define BLOCKSIZE 4 -#define SHIFTBITS 31 -typedef uint32_t subblock; -#define SWAPPED(x) htonl(x) - -#endif - -#define HIGHBIT (1<aes_enc, AES_ENCRYPT, (unsigned char *)(src), (unsigned char *)(dst)); -#define AESdecrypt(src, dst, cryptstate) aes_crypt_ecb(&(cryptstate)->aes_dec, AES_DECRYPT, (unsigned char *)(src), (unsigned char *)(dst)); -#else -#define AESencrypt(src, dst, cryptstate) AES_encrypt((unsigned char *)(src), (unsigned char *)(dst), &(cryptstate)->encrypt_key); -#define AESdecrypt(src, dst, cryptstate) AES_decrypt((unsigned char *)(src), (unsigned char *)(dst), &(cryptstate)->decrypt_key); -#endif - void CryptState_ocb_encrypt(cryptState_t *cs, const unsigned char *plain, unsigned char *encrypted, unsigned int len, const unsigned char *nonce, unsigned char *tag) { subblock checksum[BLOCKSIZE], delta[BLOCKSIZE], tmp[BLOCKSIZE], pad[BLOCKSIZE]; // Initialize - AESencrypt(nonce, delta, cs); + CRYPT_AES_ENCRYPT(nonce, delta, cs); ZERO(checksum); while (len > AES_BLOCK_SIZE) { S2(delta); XOR(tmp, delta, (const subblock *)(plain)); - AESencrypt(tmp, tmp, cs); + CRYPT_AES_ENCRYPT(tmp, tmp, cs); XOR((subblock *)(encrypted), delta, tmp); XOR(checksum, checksum, (subblock *)(plain)); len -= AES_BLOCK_SIZE; @@ -302,7 +261,7 @@ void CryptState_ocb_encrypt(cryptState_t *cs, const unsigned char *plain, unsign ZERO(tmp); tmp[BLOCKSIZE - 1] = SWAPPED(len * 8); XOR(tmp, tmp, delta); - AESencrypt(tmp, pad, cs); + CRYPT_AES_ENCRYPT(tmp, pad, cs); memcpy(tmp, plain, len); memcpy((unsigned char *)tmp + len, (unsigned char *)pad + len, AES_BLOCK_SIZE - len); XOR(checksum, checksum, tmp); @@ -311,19 +270,19 @@ void CryptState_ocb_encrypt(cryptState_t *cs, const unsigned char *plain, unsign S3(delta); XOR(tmp, delta, checksum); - AESencrypt(tmp, tag, cs); + CRYPT_AES_ENCRYPT(tmp, tag, cs); } void CryptState_ocb_decrypt(cryptState_t *cs, const unsigned char *encrypted, unsigned char *plain, unsigned int len, const unsigned char *nonce, unsigned char *tag) { subblock checksum[BLOCKSIZE], delta[BLOCKSIZE], tmp[BLOCKSIZE], pad[BLOCKSIZE]; // Initialize - AESencrypt(nonce, delta, cs); + CRYPT_AES_ENCRYPT(nonce, delta, cs); ZERO(checksum); while (len > AES_BLOCK_SIZE) { S2(delta); XOR(tmp, delta, (const subblock *)(encrypted)); - AESdecrypt(tmp, tmp, cs); + CRYPT_AES_DECRYPT(tmp, tmp, cs); XOR((subblock *)(plain), delta, tmp); XOR(checksum, checksum, (const subblock *)(plain)); len -= AES_BLOCK_SIZE; @@ -335,7 +294,7 @@ void CryptState_ocb_decrypt(cryptState_t *cs, const unsigned char *encrypted, un ZERO(tmp); tmp[BLOCKSIZE - 1] = SWAPPED(len * 8); XOR(tmp, tmp, delta); - AESencrypt(tmp, pad, cs); + CRYPT_AES_ENCRYPT(tmp, pad, cs); memset(tmp, 0, AES_BLOCK_SIZE); memcpy(tmp, encrypted, len); XOR(tmp, tmp, pad); @@ -344,5 +303,5 @@ void CryptState_ocb_decrypt(cryptState_t *cs, const unsigned char *encrypted, un S3(delta); XOR(tmp, delta, checksum); - AESencrypt(tmp, tag, cs); + CRYPT_AES_ENCRYPT(tmp, tag, cs); }