src/sbin/isakmpd/crypto.h

142 lines
5.1 KiB
C

/* $OpenBSD: crypto.h,v 1.20 2010/10/19 07:47:34 mikeb Exp $ */
/* $EOM: crypto.h,v 1.12 2000/10/15 21:56:41 niklas Exp $ */
/*
* Copyright (c) 1998 Niels Provos. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
* This code was written under funding by Ericsson Radio Systems.
*/
#ifndef _CRYPTO_H_
#define _CRYPTO_H_
#include <openssl/des.h>
#include <blf.h>
#include <openssl/cast.h>
#include <openssl/aes.h>
#define USE_32BIT
#if defined (USE_64BIT)
#define XOR64(x,y) *(u_int64_t *)(x) ^= *(u_int64_t *)(y);
#define SET64(x,y) *(u_int64_t *)(x) = *(u_int64_t *)(y);
#elif defined (USE_32BIT)
#define XOR64(x,y) *(u_int32_t *)(x) ^= *(u_int32_t *)(y); \
*(u_int32_t *)((u_int8_t *)(x) + 4) ^= *(u_int32_t *)((u_int8_t *)(y) + 4);
#define SET64(x,y) *(u_int32_t *)(x) = *(u_int32_t *)(y); \
*(u_int32_t *)((u_int8_t *)(x) + 4) = *(u_int32_t *)((u_int8_t *)(y) + 4);
#else
#define XOR8(x,y,i) (x)[i] ^= (y)[i];
#define XOR64(x,y) XOR8(x,y,0); XOR8(x,y,1); XOR8(x,y,2); XOR8(x,y,3); \
XOR8(x,y,4); XOR8(x,y,5); XOR8(x,y,6); XOR8(x,y,7);
#define SET8(x,y,i) (x)[i] = (y)[i];
#define SET64(x,y) SET8(x,y,0); SET8(x,y,1); SET8(x,y,2); SET8(x,y,3); \
SET8(x,y,4); SET8(x,y,5); SET8(x,y,6); SET8(x,y,7);
#endif /* USE_64BIT */
#define SET_32BIT_BIG(x,y) (x)[3]= (y); (x)[2]= (y) >> 8; \
(x)[1] = (y) >> 16; (x)[0]= (y) >> 24;
#define GET_32BIT_BIG(x) (u_int32_t)(x)[3] | ((u_int32_t)(x)[2] << 8) | \
((u_int32_t)(x)[1] << 16)| ((u_int32_t)(x)[0] << 24);
/*
* This is standard for all block ciphers we use at the moment.
* Keep MAXBLK uptodate.
*/
#define BLOCKSIZE 8
#define MAXBLK AES_BLOCK_SIZE
struct keystate {
struct crypto_xf *xf; /* Back pointer */
u_int8_t iv[MAXBLK]; /* Next IV to use */
u_int8_t iv2[MAXBLK];
u_int8_t *riv, *liv;
union {
DES_key_schedule desks[3];
blf_ctx blfks;
CAST_KEY castks;
AES_KEY aesks[2];
} keydata;
};
#define ks_des keydata.desks
#define ks_blf keydata.blfks
#define ks_cast keydata.castks
#define ks_aes keydata.aesks
/*
* Information about the cryptotransform.
*
* XXX - In regards to the IV (Initialization Vector) the drafts are
* completely fucked up and specify a MUST as how it is derived, so
* we also have to provide for that. I just don't know where.
* Furthermore is this enum needed at all? It seems to be Oakley IDs
* only anyhow, and we already have defines for that in ipsec_doi.h.
*/
enum transform {
DES_CBC = 1, /* This is a MUST */
IDEA_CBC = 2, /* Licensed, DONT use */
BLOWFISH_CBC = 3,
RC5_R16_B64_CBC = 4, /* Licensed, DONT use */
TRIPLEDES_CBC = 5, /* This is a SHOULD */
CAST_CBC = 6,
AES_CBC = 7
};
enum cryptoerr {
EOKAY, /* No error */
ENOCRYPTO, /* A none crypto related error, see errno */
EWEAKKEY, /* A weak key was found in key setup */
EKEYLEN /* The key length was invalid for the cipher */
};
struct crypto_xf {
enum transform id; /* Oakley ID */
char *name; /* Transform Name */
u_int16_t keymin, keymax; /* Possible Keying Bytes */
u_int16_t blocksize; /* Need to keep IV in the state */
struct keystate *state; /* Key information, can also be passed sep. */
enum cryptoerr (*init)(struct keystate *, u_int8_t *, u_int16_t);
void (*encrypt)(struct keystate *, u_int8_t *, u_int16_t);
void (*decrypt)(struct keystate *, u_int8_t *, u_int16_t);
};
extern struct keystate *crypto_clone_keystate(struct keystate *);
extern void crypto_decrypt(struct keystate *, u_int8_t *, u_int16_t);
extern void crypto_encrypt(struct keystate *, u_int8_t *, u_int16_t);
extern struct crypto_xf *crypto_get(enum transform);
extern struct keystate *crypto_init(struct crypto_xf *, u_int8_t *, u_int16_t,
enum cryptoerr *);
extern void crypto_init_iv(struct keystate *, u_int8_t *, size_t);
extern void crypto_update_iv(struct keystate *);
#endif /* _CRYPTO_H_ */