2018-02-08 19:04:43 +01:00
|
|
|
/**
|
|
|
|
* \file cipher_wrap.c
|
|
|
|
*
|
2023-10-21 14:06:23 +02:00
|
|
|
* \brief Generic cipher wrapper for Mbed TLS
|
2018-02-08 19:04:43 +01:00
|
|
|
*
|
|
|
|
* \author Adriaan de Jong <dejong@fox-it.com>
|
|
|
|
*
|
2020-09-05 12:53:20 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2021-12-21 12:54:05 +01:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2018-02-08 19:04:43 +01:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2021-12-21 12:54:05 +01:00
|
|
|
#include "common.h"
|
2018-02-08 19:04:43 +01:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_C)
|
|
|
|
|
|
|
|
#include "mbedtls/cipher_internal.h"
|
2021-12-21 12:54:05 +01:00
|
|
|
#include "mbedtls/error.h"
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CHACHAPOLY_C)
|
|
|
|
#include "mbedtls/chachapoly.h"
|
|
|
|
#endif
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_AES_C)
|
|
|
|
#include "mbedtls/aes.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_ARC4_C)
|
|
|
|
#include "mbedtls/arc4.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CAMELLIA_C)
|
|
|
|
#include "mbedtls/camellia.h"
|
|
|
|
#endif
|
|
|
|
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_ARIA_C)
|
|
|
|
#include "mbedtls/aria.h"
|
|
|
|
#endif
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_DES_C)
|
|
|
|
#include "mbedtls/des.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_BLOWFISH_C)
|
|
|
|
#include "mbedtls/blowfish.h"
|
|
|
|
#endif
|
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CHACHA20_C)
|
|
|
|
#include "mbedtls/chacha20.h"
|
|
|
|
#endif
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_GCM_C)
|
|
|
|
#include "mbedtls/gcm.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
|
|
|
#include "mbedtls/ccm.h"
|
|
|
|
#endif
|
|
|
|
|
2021-12-21 12:54:05 +01:00
|
|
|
#if defined(MBEDTLS_NIST_KW_C)
|
|
|
|
#include "mbedtls/nist_kw.h"
|
|
|
|
#endif
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_NULL_CIPHER)
|
|
|
|
#include <string.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "mbedtls/platform.h"
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_GCM_C)
|
|
|
|
/* shared by all GCM ciphers */
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *gcm_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
void *ctx = mbedtls_calloc(1, sizeof(mbedtls_gcm_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx != NULL) {
|
|
|
|
mbedtls_gcm_init((mbedtls_gcm_context *) ctx);
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void gcm_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_gcm_free(ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_GCM_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
|
|
|
/* shared by all CCM ciphers */
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *ccm_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
void *ctx = mbedtls_calloc(1, sizeof(mbedtls_ccm_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx != NULL) {
|
|
|
|
mbedtls_ccm_init((mbedtls_ccm_context *) ctx);
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void ccm_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_ccm_free(ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CCM_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_AES_C)
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_crypt_ecb_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_crypt_ecb((mbedtls_aes_context *) ctx, operation, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_crypt_cbc_wrap(void *ctx, mbedtls_operation_t operation, size_t length,
|
|
|
|
unsigned char *iv, const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_crypt_cbc((mbedtls_aes_context *) ctx, operation, length, iv, input,
|
|
|
|
output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_crypt_cfb128_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length, size_t *iv_off, unsigned char *iv,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_crypt_cfb128((mbedtls_aes_context *) ctx, operation, length, iv_off, iv,
|
|
|
|
input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_crypt_ofb_wrap(void *ctx, size_t length, size_t *iv_off,
|
|
|
|
unsigned char *iv, const unsigned char *input, unsigned char *output)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_crypt_ofb((mbedtls_aes_context *) ctx, length, iv_off,
|
|
|
|
iv, input, output);
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_OFB */
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_crypt_ctr_wrap(void *ctx, size_t length, size_t *nc_off,
|
|
|
|
unsigned char *nonce_counter, unsigned char *stream_block,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_crypt_ctr((mbedtls_aes_context *) ctx, length, nc_off, nonce_counter,
|
|
|
|
stream_block, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_crypt_xts_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length,
|
|
|
|
const unsigned char data_unit[16],
|
|
|
|
const unsigned char *input,
|
|
|
|
unsigned char *output)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
|
|
|
mbedtls_aes_xts_context *xts_ctx = ctx;
|
|
|
|
int mode;
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
switch (operation) {
|
2018-07-28 11:16:41 +02:00
|
|
|
case MBEDTLS_ENCRYPT:
|
|
|
|
mode = MBEDTLS_AES_ENCRYPT;
|
|
|
|
break;
|
|
|
|
case MBEDTLS_DECRYPT:
|
|
|
|
mode = MBEDTLS_AES_DECRYPT;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
|
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_crypt_xts(xts_ctx, mode, length,
|
|
|
|
data_unit, input, output);
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_XTS */
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_setkey_dec_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_setkey_dec((mbedtls_aes_context *) ctx, key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aes_setkey_enc_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_setkey_enc((mbedtls_aes_context *) ctx, key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *aes_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_aes_context *aes = mbedtls_calloc(1, sizeof(mbedtls_aes_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (aes == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_aes_init(aes);
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return aes;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void aes_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_aes_free((mbedtls_aes_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t aes_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_AES,
|
|
|
|
aes_crypt_ecb_wrap,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
aes_crypt_cbc_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
aes_crypt_cfb128_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
aes_crypt_ofb_wrap,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
aes_crypt_ctr_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
aes_setkey_enc_wrap,
|
|
|
|
aes_setkey_dec_wrap,
|
|
|
|
aes_ctx_alloc,
|
|
|
|
aes_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_128_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
128,
|
|
|
|
"AES-128-ECB",
|
2019-02-16 17:19:46 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
192,
|
|
|
|
"AES-192-ECB",
|
2019-02-16 17:19:46 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
256,
|
|
|
|
"AES-256-ECB",
|
2019-02-16 17:19:46 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
static const mbedtls_cipher_info_t aes_128_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
128,
|
|
|
|
"AES-128-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
192,
|
|
|
|
"AES-192-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
256,
|
|
|
|
"AES-256-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
static const mbedtls_cipher_info_t aes_128_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
128,
|
|
|
|
"AES-128-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
192,
|
|
|
|
"AES-192-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
256,
|
|
|
|
"AES-256-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
static const mbedtls_cipher_info_t aes_128_ofb_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_OFB,
|
|
|
|
MBEDTLS_MODE_OFB,
|
|
|
|
128,
|
|
|
|
"AES-128-OFB",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_ofb_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_OFB,
|
|
|
|
MBEDTLS_MODE_OFB,
|
|
|
|
192,
|
|
|
|
"AES-192-OFB",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_ofb_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_OFB,
|
|
|
|
MBEDTLS_MODE_OFB,
|
|
|
|
256,
|
|
|
|
"AES-256-OFB",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_OFB */
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
static const mbedtls_cipher_info_t aes_128_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
128,
|
|
|
|
"AES-128-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
192,
|
|
|
|
"AES-192-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
256,
|
|
|
|
"AES-256-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int xts_aes_setkey_enc_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
|
|
|
mbedtls_aes_xts_context *xts_ctx = ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_xts_setkey_enc(xts_ctx, key, key_bitlen);
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int xts_aes_setkey_dec_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
|
|
|
mbedtls_aes_xts_context *xts_ctx = ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aes_xts_setkey_dec(xts_ctx, key, key_bitlen);
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *xts_aes_ctx_alloc(void)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_aes_xts_context *xts_ctx = mbedtls_calloc(1, sizeof(*xts_ctx));
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (xts_ctx != NULL) {
|
|
|
|
mbedtls_aes_xts_init(xts_ctx);
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return xts_ctx;
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void xts_aes_ctx_free(void *ctx)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
|
|
|
mbedtls_aes_xts_context *xts_ctx = ctx;
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (xts_ctx == NULL) {
|
2018-07-28 11:16:41 +02:00
|
|
|
return;
|
2023-04-18 10:38:24 +02:00
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_aes_xts_free(xts_ctx);
|
|
|
|
mbedtls_free(xts_ctx);
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t xts_aes_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_AES,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
aes_crypt_xts_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
xts_aes_setkey_enc_wrap,
|
|
|
|
xts_aes_setkey_dec_wrap,
|
|
|
|
xts_aes_ctx_alloc,
|
|
|
|
xts_aes_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_128_xts_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_XTS,
|
|
|
|
MBEDTLS_MODE_XTS,
|
|
|
|
256,
|
|
|
|
"AES-128-XTS",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&xts_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_xts_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_XTS,
|
|
|
|
MBEDTLS_MODE_XTS,
|
|
|
|
512,
|
|
|
|
"AES-256-XTS",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&xts_aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_XTS */
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_GCM_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int gcm_aes_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_gcm_setkey((mbedtls_gcm_context *) ctx, MBEDTLS_CIPHER_ID_AES,
|
|
|
|
key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t gcm_aes_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_AES,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
gcm_aes_setkey_wrap,
|
|
|
|
gcm_aes_setkey_wrap,
|
|
|
|
gcm_ctx_alloc,
|
|
|
|
gcm_ctx_free,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_128_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
128,
|
|
|
|
"AES-128-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
192,
|
|
|
|
"AES-192-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
256,
|
|
|
|
"AES-256-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_GCM_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int ccm_aes_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_ccm_setkey((mbedtls_ccm_context *) ctx, MBEDTLS_CIPHER_ID_AES,
|
|
|
|
key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t ccm_aes_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_AES,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
ccm_aes_setkey_wrap,
|
|
|
|
ccm_aes_setkey_wrap,
|
|
|
|
ccm_ctx_alloc,
|
|
|
|
ccm_ctx_free,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_128_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
128,
|
|
|
|
"AES-128-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
192,
|
|
|
|
"AES-192-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
256,
|
|
|
|
"AES-256-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CCM_C */
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_AES_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CAMELLIA_C)
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int camellia_crypt_ecb_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_camellia_crypt_ecb((mbedtls_camellia_context *) ctx, operation, input,
|
|
|
|
output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int camellia_crypt_cbc_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length, unsigned char *iv,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_camellia_crypt_cbc((mbedtls_camellia_context *) ctx, operation, length, iv,
|
|
|
|
input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int camellia_crypt_cfb128_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length, size_t *iv_off, unsigned char *iv,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_camellia_crypt_cfb128((mbedtls_camellia_context *) ctx, operation, length,
|
|
|
|
iv_off, iv, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int camellia_crypt_ctr_wrap(void *ctx, size_t length, size_t *nc_off,
|
|
|
|
unsigned char *nonce_counter, unsigned char *stream_block,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_camellia_crypt_ctr((mbedtls_camellia_context *) ctx, length, nc_off,
|
|
|
|
nonce_counter, stream_block, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int camellia_setkey_dec_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_camellia_setkey_dec((mbedtls_camellia_context *) ctx, key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int camellia_setkey_enc_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_camellia_setkey_enc((mbedtls_camellia_context *) ctx, key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *camellia_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
mbedtls_camellia_context *ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
ctx = mbedtls_calloc(1, sizeof(mbedtls_camellia_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_camellia_init(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void camellia_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_camellia_free((mbedtls_camellia_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t camellia_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_CAMELLIA,
|
|
|
|
camellia_crypt_ecb_wrap,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
camellia_crypt_cbc_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
camellia_crypt_cfb128_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
camellia_crypt_ctr_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
camellia_setkey_enc_wrap,
|
|
|
|
camellia_setkey_dec_wrap,
|
|
|
|
camellia_ctx_alloc,
|
|
|
|
camellia_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_128_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_128_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
128,
|
|
|
|
"CAMELLIA-128-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_192_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_192_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
192,
|
|
|
|
"CAMELLIA-192-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_256_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_256_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
256,
|
|
|
|
"CAMELLIA-256-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
static const mbedtls_cipher_info_t camellia_128_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_128_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
128,
|
|
|
|
"CAMELLIA-128-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_192_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_192_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
192,
|
|
|
|
"CAMELLIA-192-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_256_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_256_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
256,
|
|
|
|
"CAMELLIA-256-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
static const mbedtls_cipher_info_t camellia_128_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_128_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
128,
|
|
|
|
"CAMELLIA-128-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_192_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_192_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
192,
|
|
|
|
"CAMELLIA-192-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_256_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_256_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
256,
|
|
|
|
"CAMELLIA-256-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
static const mbedtls_cipher_info_t camellia_128_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_128_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
128,
|
|
|
|
"CAMELLIA-128-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_192_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_192_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
192,
|
|
|
|
"CAMELLIA-192-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_256_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_256_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
256,
|
|
|
|
"CAMELLIA-256-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&camellia_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_GCM_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int gcm_camellia_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_gcm_setkey((mbedtls_gcm_context *) ctx, MBEDTLS_CIPHER_ID_CAMELLIA,
|
|
|
|
key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t gcm_camellia_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_CAMELLIA,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
gcm_camellia_setkey_wrap,
|
|
|
|
gcm_camellia_setkey_wrap,
|
|
|
|
gcm_ctx_alloc,
|
|
|
|
gcm_ctx_free,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_128_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_128_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
128,
|
|
|
|
"CAMELLIA-128-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_192_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_192_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
192,
|
|
|
|
"CAMELLIA-192-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_256_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_256_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
256,
|
|
|
|
"CAMELLIA-256-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_camellia_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_GCM_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int ccm_camellia_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_ccm_setkey((mbedtls_ccm_context *) ctx, MBEDTLS_CIPHER_ID_CAMELLIA,
|
|
|
|
key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t ccm_camellia_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_CAMELLIA,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
ccm_camellia_setkey_wrap,
|
|
|
|
ccm_camellia_setkey_wrap,
|
|
|
|
ccm_ctx_alloc,
|
|
|
|
ccm_ctx_free,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_128_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_128_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
128,
|
|
|
|
"CAMELLIA-128-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_192_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_192_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
192,
|
|
|
|
"CAMELLIA-192-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_camellia_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t camellia_256_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_CAMELLIA_256_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
256,
|
|
|
|
"CAMELLIA-256-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_camellia_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CCM_C */
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_CAMELLIA_C */
|
|
|
|
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_ARIA_C)
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aria_crypt_ecb_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
|
|
|
(void) operation;
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aria_crypt_ecb((mbedtls_aria_context *) ctx, input,
|
|
|
|
output);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aria_crypt_cbc_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length, unsigned char *iv,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aria_crypt_cbc((mbedtls_aria_context *) ctx, operation, length, iv,
|
|
|
|
input, output);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aria_crypt_cfb128_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length, size_t *iv_off, unsigned char *iv,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aria_crypt_cfb128((mbedtls_aria_context *) ctx, operation, length,
|
|
|
|
iv_off, iv, input, output);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aria_crypt_ctr_wrap(void *ctx, size_t length, size_t *nc_off,
|
|
|
|
unsigned char *nonce_counter, unsigned char *stream_block,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aria_crypt_ctr((mbedtls_aria_context *) ctx, length, nc_off,
|
|
|
|
nonce_counter, stream_block, input, output);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aria_setkey_dec_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aria_setkey_dec((mbedtls_aria_context *) ctx, key, key_bitlen);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int aria_setkey_enc_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_aria_setkey_enc((mbedtls_aria_context *) ctx, key, key_bitlen);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *aria_ctx_alloc(void)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
|
|
|
mbedtls_aria_context *ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
ctx = mbedtls_calloc(1, sizeof(mbedtls_aria_context));
|
2018-06-07 16:25:01 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-06-07 16:25:01 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_aria_init(ctx);
|
2018-06-07 16:25:01 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void aria_ctx_free(void *ctx)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_aria_free((mbedtls_aria_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t aria_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_ARIA,
|
|
|
|
aria_crypt_ecb_wrap,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
aria_crypt_cbc_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
aria_crypt_cfb128_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
aria_crypt_ctr_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
aria_setkey_enc_wrap,
|
|
|
|
aria_setkey_dec_wrap,
|
|
|
|
aria_ctx_alloc,
|
|
|
|
aria_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_128_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_128_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
128,
|
|
|
|
"ARIA-128-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-06-07 16:25:01 +02:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_192_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_192_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
192,
|
|
|
|
"ARIA-192-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-06-07 16:25:01 +02:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_256_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_256_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
256,
|
|
|
|
"ARIA-256-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-06-07 16:25:01 +02:00
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
static const mbedtls_cipher_info_t aria_128_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_128_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
128,
|
|
|
|
"ARIA-128-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_192_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_192_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
192,
|
|
|
|
"ARIA-192-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_256_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_256_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
256,
|
|
|
|
"ARIA-256-CBC",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
static const mbedtls_cipher_info_t aria_128_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_128_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
128,
|
|
|
|
"ARIA-128-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_192_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_192_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
192,
|
|
|
|
"ARIA-192-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_256_cfb128_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_256_CFB128,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
256,
|
|
|
|
"ARIA-256-CFB128",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
static const mbedtls_cipher_info_t aria_128_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_128_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
128,
|
|
|
|
"ARIA-128-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_192_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_192_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
192,
|
|
|
|
"ARIA-192-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_256_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_256_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
256,
|
|
|
|
"ARIA-256-CTR",
|
|
|
|
16,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&aria_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_GCM_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int gcm_aria_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_gcm_setkey((mbedtls_gcm_context *) ctx, MBEDTLS_CIPHER_ID_ARIA,
|
|
|
|
key, key_bitlen);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t gcm_aria_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_ARIA,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
gcm_aria_setkey_wrap,
|
|
|
|
gcm_aria_setkey_wrap,
|
|
|
|
gcm_ctx_alloc,
|
|
|
|
gcm_ctx_free,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_128_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_128_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
128,
|
|
|
|
"ARIA-128-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_192_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_192_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
192,
|
|
|
|
"ARIA-192-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_256_gcm_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_256_GCM,
|
|
|
|
MBEDTLS_MODE_GCM,
|
|
|
|
256,
|
|
|
|
"ARIA-256-GCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&gcm_aria_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_GCM_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int ccm_aria_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-06-07 16:25:01 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_ccm_setkey((mbedtls_ccm_context *) ctx, MBEDTLS_CIPHER_ID_ARIA,
|
|
|
|
key, key_bitlen);
|
2018-06-07 16:25:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t ccm_aria_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_ARIA,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
ccm_aria_setkey_wrap,
|
|
|
|
ccm_aria_setkey_wrap,
|
|
|
|
ccm_ctx_alloc,
|
|
|
|
ccm_ctx_free,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_128_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_128_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
128,
|
|
|
|
"ARIA-128-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_192_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_192_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
192,
|
|
|
|
"ARIA-192-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_aria_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aria_256_ccm_info = {
|
|
|
|
MBEDTLS_CIPHER_ARIA_256_CCM,
|
|
|
|
MBEDTLS_MODE_CCM,
|
|
|
|
256,
|
|
|
|
"ARIA-256-CCM",
|
|
|
|
12,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_IV_LEN,
|
|
|
|
16,
|
|
|
|
&ccm_aria_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CCM_C */
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_ARIA_C */
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_DES_C)
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des_crypt_ecb_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) operation);
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des_crypt_ecb((mbedtls_des_context *) ctx, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des3_crypt_ecb_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) operation);
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des3_crypt_ecb((mbedtls_des3_context *) ctx, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des_crypt_cbc_wrap(void *ctx, mbedtls_operation_t operation, size_t length,
|
|
|
|
unsigned char *iv, const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des_crypt_cbc((mbedtls_des_context *) ctx, operation, length, iv, input,
|
|
|
|
output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des3_crypt_cbc_wrap(void *ctx, mbedtls_operation_t operation, size_t length,
|
|
|
|
unsigned char *iv, const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des3_crypt_cbc((mbedtls_des3_context *) ctx, operation, length, iv, input,
|
|
|
|
output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des_setkey_dec_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) key_bitlen);
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des_setkey_dec((mbedtls_des_context *) ctx, key);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des_setkey_enc_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) key_bitlen);
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des_setkey_enc((mbedtls_des_context *) ctx, key);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des3_set2key_dec_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) key_bitlen);
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des3_set2key_dec((mbedtls_des3_context *) ctx, key);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des3_set2key_enc_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) key_bitlen);
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des3_set2key_enc((mbedtls_des3_context *) ctx, key);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des3_set3key_dec_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) key_bitlen);
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des3_set3key_dec((mbedtls_des3_context *) ctx, key);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int des3_set3key_enc_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) key_bitlen);
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_des3_set3key_enc((mbedtls_des3_context *) ctx, key);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *des_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_des_context *des = mbedtls_calloc(1, sizeof(mbedtls_des_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (des == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_des_init(des);
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return des;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void des_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_des_free((mbedtls_des_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *des3_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
mbedtls_des3_context *des3;
|
2023-04-18 10:38:24 +02:00
|
|
|
des3 = mbedtls_calloc(1, sizeof(mbedtls_des3_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (des3 == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_des3_init(des3);
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return des3;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void des3_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_des3_free((mbedtls_des3_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t des_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_DES,
|
|
|
|
des_crypt_ecb_wrap,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
des_crypt_cbc_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
des_setkey_enc_wrap,
|
|
|
|
des_setkey_dec_wrap,
|
|
|
|
des_ctx_alloc,
|
|
|
|
des_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t des_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_DES_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
MBEDTLS_KEY_LENGTH_DES,
|
|
|
|
"DES-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
8,
|
|
|
|
&des_info
|
|
|
|
};
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
static const mbedtls_cipher_info_t des_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_DES_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
MBEDTLS_KEY_LENGTH_DES,
|
|
|
|
"DES-CBC",
|
|
|
|
8,
|
|
|
|
0,
|
|
|
|
8,
|
|
|
|
&des_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t des_ede_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_DES,
|
|
|
|
des3_crypt_ecb_wrap,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
des3_crypt_cbc_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
des3_set2key_enc_wrap,
|
|
|
|
des3_set2key_dec_wrap,
|
|
|
|
des3_ctx_alloc,
|
|
|
|
des3_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t des_ede_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_DES_EDE_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
MBEDTLS_KEY_LENGTH_DES_EDE,
|
|
|
|
"DES-EDE-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
8,
|
|
|
|
&des_ede_info
|
|
|
|
};
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
static const mbedtls_cipher_info_t des_ede_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_DES_EDE_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
MBEDTLS_KEY_LENGTH_DES_EDE,
|
|
|
|
"DES-EDE-CBC",
|
|
|
|
8,
|
|
|
|
0,
|
|
|
|
8,
|
|
|
|
&des_ede_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t des_ede3_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_3DES,
|
|
|
|
des3_crypt_ecb_wrap,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
des3_crypt_cbc_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
des3_set3key_enc_wrap,
|
|
|
|
des3_set3key_dec_wrap,
|
|
|
|
des3_ctx_alloc,
|
|
|
|
des3_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t des_ede3_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_DES_EDE3_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
MBEDTLS_KEY_LENGTH_DES_EDE3,
|
|
|
|
"DES-EDE3-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
0,
|
|
|
|
8,
|
|
|
|
&des_ede3_info
|
|
|
|
};
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
static const mbedtls_cipher_info_t des_ede3_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_DES_EDE3_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
MBEDTLS_KEY_LENGTH_DES_EDE3,
|
|
|
|
"DES-EDE3-CBC",
|
|
|
|
8,
|
|
|
|
0,
|
|
|
|
8,
|
|
|
|
&des_ede3_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
#endif /* MBEDTLS_DES_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_BLOWFISH_C)
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int blowfish_crypt_ecb_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_blowfish_crypt_ecb((mbedtls_blowfish_context *) ctx, operation, input,
|
|
|
|
output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int blowfish_crypt_cbc_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length, unsigned char *iv, const unsigned char *input,
|
|
|
|
unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_blowfish_crypt_cbc((mbedtls_blowfish_context *) ctx, operation, length, iv,
|
|
|
|
input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int blowfish_crypt_cfb64_wrap(void *ctx, mbedtls_operation_t operation,
|
|
|
|
size_t length, size_t *iv_off, unsigned char *iv,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_blowfish_crypt_cfb64((mbedtls_blowfish_context *) ctx, operation, length,
|
|
|
|
iv_off, iv, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int blowfish_crypt_ctr_wrap(void *ctx, size_t length, size_t *nc_off,
|
|
|
|
unsigned char *nonce_counter, unsigned char *stream_block,
|
|
|
|
const unsigned char *input, unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_blowfish_crypt_ctr((mbedtls_blowfish_context *) ctx, length, nc_off,
|
|
|
|
nonce_counter, stream_block, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int blowfish_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_blowfish_setkey((mbedtls_blowfish_context *) ctx, key, key_bitlen);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *blowfish_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
mbedtls_blowfish_context *ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
ctx = mbedtls_calloc(1, sizeof(mbedtls_blowfish_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_blowfish_init(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void blowfish_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_blowfish_free((mbedtls_blowfish_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t blowfish_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_BLOWFISH,
|
|
|
|
blowfish_crypt_ecb_wrap,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
blowfish_crypt_cbc_wrap,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
blowfish_crypt_cfb64_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
blowfish_crypt_ctr_wrap,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
blowfish_setkey_wrap,
|
|
|
|
blowfish_setkey_wrap,
|
|
|
|
blowfish_ctx_alloc,
|
|
|
|
blowfish_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t blowfish_ecb_info = {
|
|
|
|
MBEDTLS_CIPHER_BLOWFISH_ECB,
|
|
|
|
MBEDTLS_MODE_ECB,
|
|
|
|
128,
|
|
|
|
"BLOWFISH-ECB",
|
2020-12-18 21:22:37 +01:00
|
|
|
0,
|
2018-02-08 19:04:43 +01:00
|
|
|
MBEDTLS_CIPHER_VARIABLE_KEY_LEN,
|
|
|
|
8,
|
|
|
|
&blowfish_info
|
|
|
|
};
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
static const mbedtls_cipher_info_t blowfish_cbc_info = {
|
|
|
|
MBEDTLS_CIPHER_BLOWFISH_CBC,
|
|
|
|
MBEDTLS_MODE_CBC,
|
|
|
|
128,
|
|
|
|
"BLOWFISH-CBC",
|
|
|
|
8,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_KEY_LEN,
|
|
|
|
8,
|
|
|
|
&blowfish_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CBC */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
static const mbedtls_cipher_info_t blowfish_cfb64_info = {
|
|
|
|
MBEDTLS_CIPHER_BLOWFISH_CFB64,
|
|
|
|
MBEDTLS_MODE_CFB,
|
|
|
|
128,
|
|
|
|
"BLOWFISH-CFB64",
|
|
|
|
8,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_KEY_LEN,
|
|
|
|
8,
|
|
|
|
&blowfish_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CFB */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
static const mbedtls_cipher_info_t blowfish_ctr_info = {
|
|
|
|
MBEDTLS_CIPHER_BLOWFISH_CTR,
|
|
|
|
MBEDTLS_MODE_CTR,
|
|
|
|
128,
|
|
|
|
"BLOWFISH-CTR",
|
|
|
|
8,
|
|
|
|
MBEDTLS_CIPHER_VARIABLE_KEY_LEN,
|
|
|
|
8,
|
|
|
|
&blowfish_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CIPHER_MODE_CTR */
|
|
|
|
#endif /* MBEDTLS_BLOWFISH_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_ARC4_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int arc4_crypt_stream_wrap(void *ctx, size_t length,
|
|
|
|
const unsigned char *input,
|
|
|
|
unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_arc4_crypt((mbedtls_arc4_context *) ctx, length, input, output);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int arc4_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
/* we get key_bitlen in bits, arc4 expects it in bytes */
|
2023-04-18 10:38:24 +02:00
|
|
|
if (key_bitlen % 8 != 0) {
|
|
|
|
return MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_arc4_setup((mbedtls_arc4_context *) ctx, key, key_bitlen / 8);
|
|
|
|
return 0;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *arc4_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
mbedtls_arc4_context *ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
ctx = mbedtls_calloc(1, sizeof(mbedtls_arc4_context));
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_arc4_init(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void arc4_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_arc4_free((mbedtls_arc4_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t arc4_base_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_ARC4,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
arc4_crypt_stream_wrap,
|
|
|
|
#endif
|
|
|
|
arc4_setkey_wrap,
|
|
|
|
arc4_setkey_wrap,
|
|
|
|
arc4_ctx_alloc,
|
|
|
|
arc4_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t arc4_128_info = {
|
|
|
|
MBEDTLS_CIPHER_ARC4_128,
|
|
|
|
MBEDTLS_MODE_STREAM,
|
|
|
|
128,
|
|
|
|
"ARC4-128",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
1,
|
|
|
|
&arc4_base_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_ARC4_C */
|
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CHACHA20_C)
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int chacha20_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
if (key_bitlen != 256U) {
|
|
|
|
return MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (0 != mbedtls_chacha20_setkey((mbedtls_chacha20_context *) ctx, key)) {
|
|
|
|
return MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return 0;
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int chacha20_stream_wrap(void *ctx, size_t length,
|
|
|
|
const unsigned char *input,
|
|
|
|
unsigned char *output)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
2021-12-21 12:54:05 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
ret = mbedtls_chacha20_update(ctx, length, input, output);
|
|
|
|
if (ret == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA) {
|
|
|
|
return MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ret;
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *chacha20_ctx_alloc(void)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
|
|
|
mbedtls_chacha20_context *ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
ctx = mbedtls_calloc(1, sizeof(mbedtls_chacha20_context));
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_chacha20_init(ctx);
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void chacha20_ctx_free(void *ctx)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_chacha20_free((mbedtls_chacha20_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t chacha20_base_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_CHACHA20,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
chacha20_stream_wrap,
|
|
|
|
#endif
|
|
|
|
chacha20_setkey_wrap,
|
|
|
|
chacha20_setkey_wrap,
|
|
|
|
chacha20_ctx_alloc,
|
|
|
|
chacha20_ctx_free
|
|
|
|
};
|
|
|
|
static const mbedtls_cipher_info_t chacha20_info = {
|
|
|
|
MBEDTLS_CIPHER_CHACHA20,
|
|
|
|
MBEDTLS_MODE_STREAM,
|
|
|
|
256,
|
|
|
|
"CHACHA20",
|
|
|
|
12,
|
|
|
|
0,
|
|
|
|
1,
|
|
|
|
&chacha20_base_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CHACHA20_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CHACHAPOLY_C)
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int chachapoly_setkey_wrap(void *ctx,
|
|
|
|
const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
if (key_bitlen != 256U) {
|
|
|
|
return MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (0 != mbedtls_chachapoly_setkey((mbedtls_chachapoly_context *) ctx, key)) {
|
|
|
|
return MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return 0;
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *chachapoly_ctx_alloc(void)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
|
|
|
mbedtls_chachapoly_context *ctx;
|
2023-04-18 10:38:24 +02:00
|
|
|
ctx = mbedtls_calloc(1, sizeof(mbedtls_chachapoly_context));
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_chachapoly_init(ctx);
|
2018-07-28 11:16:41 +02:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void chachapoly_ctx_free(void *ctx)
|
2018-07-28 11:16:41 +02:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_chachapoly_free((mbedtls_chachapoly_context *) ctx);
|
|
|
|
mbedtls_free(ctx);
|
2018-07-28 11:16:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t chachapoly_base_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_CHACHA20,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
chachapoly_setkey_wrap,
|
|
|
|
chachapoly_setkey_wrap,
|
|
|
|
chachapoly_ctx_alloc,
|
|
|
|
chachapoly_ctx_free
|
|
|
|
};
|
|
|
|
static const mbedtls_cipher_info_t chachapoly_info = {
|
|
|
|
MBEDTLS_CIPHER_CHACHA20_POLY1305,
|
|
|
|
MBEDTLS_MODE_CHACHAPOLY,
|
|
|
|
256,
|
|
|
|
"CHACHA20-POLY1305",
|
|
|
|
12,
|
|
|
|
0,
|
|
|
|
1,
|
|
|
|
&chachapoly_base_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_CHACHAPOLY_C */
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_NULL_CIPHER)
|
2023-04-18 10:38:24 +02:00
|
|
|
static int null_crypt_stream(void *ctx, size_t length,
|
|
|
|
const unsigned char *input,
|
|
|
|
unsigned char *output)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) ctx);
|
2023-04-18 10:38:24 +02:00
|
|
|
memmove(output, input, length);
|
|
|
|
return 0;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int null_setkey(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) ctx);
|
|
|
|
((void) key);
|
|
|
|
((void) key_bitlen);
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return 0;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *null_ctx_alloc(void)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return (void *) 1;
|
2018-02-08 19:04:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void null_ctx_free(void *ctx)
|
2018-02-08 19:04:43 +01:00
|
|
|
{
|
|
|
|
((void) ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t null_base_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_NULL,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
null_crypt_stream,
|
|
|
|
#endif
|
|
|
|
null_setkey,
|
|
|
|
null_setkey,
|
|
|
|
null_ctx_alloc,
|
|
|
|
null_ctx_free
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t null_cipher_info = {
|
|
|
|
MBEDTLS_CIPHER_NULL,
|
|
|
|
MBEDTLS_MODE_STREAM,
|
|
|
|
0,
|
|
|
|
"NULL",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
1,
|
|
|
|
&null_base_info
|
|
|
|
};
|
|
|
|
#endif /* defined(MBEDTLS_CIPHER_NULL_CIPHER) */
|
|
|
|
|
2021-12-21 12:54:05 +01:00
|
|
|
#if defined(MBEDTLS_NIST_KW_C)
|
2023-04-18 10:38:24 +02:00
|
|
|
static void *kw_ctx_alloc(void)
|
2021-12-21 12:54:05 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
void *ctx = mbedtls_calloc(1, sizeof(mbedtls_nist_kw_context));
|
2021-12-21 12:54:05 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
if (ctx != NULL) {
|
|
|
|
mbedtls_nist_kw_init((mbedtls_nist_kw_context *) ctx);
|
|
|
|
}
|
2021-12-21 12:54:05 +01:00
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
return ctx;
|
2021-12-21 12:54:05 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static void kw_ctx_free(void *ctx)
|
2021-12-21 12:54:05 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
mbedtls_nist_kw_free(ctx);
|
|
|
|
mbedtls_free(ctx);
|
2021-12-21 12:54:05 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int kw_aes_setkey_wrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2021-12-21 12:54:05 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_nist_kw_setkey((mbedtls_nist_kw_context *) ctx,
|
|
|
|
MBEDTLS_CIPHER_ID_AES, key, key_bitlen, 1);
|
2021-12-21 12:54:05 +01:00
|
|
|
}
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
static int kw_aes_setkey_unwrap(void *ctx, const unsigned char *key,
|
|
|
|
unsigned int key_bitlen)
|
2021-12-21 12:54:05 +01:00
|
|
|
{
|
2023-04-18 10:38:24 +02:00
|
|
|
return mbedtls_nist_kw_setkey((mbedtls_nist_kw_context *) ctx,
|
|
|
|
MBEDTLS_CIPHER_ID_AES, key, key_bitlen, 0);
|
2021-12-21 12:54:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const mbedtls_cipher_base_t kw_aes_info = {
|
|
|
|
MBEDTLS_CIPHER_ID_AES,
|
|
|
|
NULL,
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_STREAM)
|
|
|
|
NULL,
|
|
|
|
#endif
|
|
|
|
kw_aes_setkey_wrap,
|
|
|
|
kw_aes_setkey_unwrap,
|
|
|
|
kw_ctx_alloc,
|
|
|
|
kw_ctx_free,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_128_nist_kw_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_KW,
|
|
|
|
MBEDTLS_MODE_KW,
|
|
|
|
128,
|
|
|
|
"AES-128-KW",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&kw_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_nist_kw_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_KW,
|
|
|
|
MBEDTLS_MODE_KW,
|
|
|
|
192,
|
|
|
|
"AES-192-KW",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&kw_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_nist_kw_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_KW,
|
|
|
|
MBEDTLS_MODE_KW,
|
|
|
|
256,
|
|
|
|
"AES-256-KW",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&kw_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_128_nist_kwp_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_128_KWP,
|
|
|
|
MBEDTLS_MODE_KWP,
|
|
|
|
128,
|
|
|
|
"AES-128-KWP",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&kw_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_192_nist_kwp_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_192_KWP,
|
|
|
|
MBEDTLS_MODE_KWP,
|
|
|
|
192,
|
|
|
|
"AES-192-KWP",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&kw_aes_info
|
|
|
|
};
|
|
|
|
|
|
|
|
static const mbedtls_cipher_info_t aes_256_nist_kwp_info = {
|
|
|
|
MBEDTLS_CIPHER_AES_256_KWP,
|
|
|
|
MBEDTLS_MODE_KWP,
|
|
|
|
256,
|
|
|
|
"AES-256-KWP",
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
16,
|
|
|
|
&kw_aes_info
|
|
|
|
};
|
|
|
|
#endif /* MBEDTLS_NIST_KW_C */
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
const mbedtls_cipher_definition_t mbedtls_cipher_definitions[] =
|
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_AES_C)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_ECB, &aes_128_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_ECB, &aes_192_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_ECB, &aes_256_ecb_info },
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_CBC, &aes_128_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_CBC, &aes_192_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_CBC, &aes_256_cbc_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_CFB128, &aes_128_cfb128_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_CFB128, &aes_192_cfb128_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_CFB128, &aes_256_cfb128_info },
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_OFB, &aes_128_ofb_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_OFB, &aes_192_ofb_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_OFB, &aes_256_ofb_info },
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_CTR, &aes_128_ctr_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_CTR, &aes_192_ctr_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_CTR, &aes_256_ctr_info },
|
|
|
|
#endif
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_XTS, &aes_128_xts_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_XTS, &aes_256_xts_info },
|
|
|
|
#endif
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_GCM_C)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_GCM, &aes_128_gcm_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_GCM, &aes_192_gcm_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_GCM, &aes_256_gcm_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_CCM, &aes_128_ccm_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_CCM, &aes_192_ccm_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_CCM, &aes_256_ccm_info },
|
|
|
|
#endif
|
|
|
|
#endif /* MBEDTLS_AES_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_ARC4_C)
|
|
|
|
{ MBEDTLS_CIPHER_ARC4_128, &arc4_128_info },
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_BLOWFISH_C)
|
|
|
|
{ MBEDTLS_CIPHER_BLOWFISH_ECB, &blowfish_ecb_info },
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
{ MBEDTLS_CIPHER_BLOWFISH_CBC, &blowfish_cbc_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
{ MBEDTLS_CIPHER_BLOWFISH_CFB64, &blowfish_cfb64_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
{ MBEDTLS_CIPHER_BLOWFISH_CTR, &blowfish_ctr_info },
|
|
|
|
#endif
|
|
|
|
#endif /* MBEDTLS_BLOWFISH_C */
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CAMELLIA_C)
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_128_ECB, &camellia_128_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_192_ECB, &camellia_192_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_256_ECB, &camellia_256_ecb_info },
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_128_CBC, &camellia_128_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_192_CBC, &camellia_192_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_256_CBC, &camellia_256_cbc_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_128_CFB128, &camellia_128_cfb128_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_192_CFB128, &camellia_192_cfb128_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_256_CFB128, &camellia_256_cfb128_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_128_CTR, &camellia_128_ctr_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_192_CTR, &camellia_192_ctr_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_256_CTR, &camellia_256_ctr_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_GCM_C)
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_128_GCM, &camellia_128_gcm_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_192_GCM, &camellia_192_gcm_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_256_GCM, &camellia_256_gcm_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_128_CCM, &camellia_128_ccm_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_192_CCM, &camellia_192_ccm_info },
|
|
|
|
{ MBEDTLS_CIPHER_CAMELLIA_256_CCM, &camellia_256_ccm_info },
|
|
|
|
#endif
|
|
|
|
#endif /* MBEDTLS_CAMELLIA_C */
|
|
|
|
|
2018-06-07 16:25:01 +02:00
|
|
|
#if defined(MBEDTLS_ARIA_C)
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_128_ECB, &aria_128_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_192_ECB, &aria_192_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_256_ECB, &aria_256_ecb_info },
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_128_CBC, &aria_128_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_192_CBC, &aria_192_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_256_CBC, &aria_256_cbc_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_128_CFB128, &aria_128_cfb128_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_192_CFB128, &aria_192_cfb128_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_256_CFB128, &aria_256_cfb128_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_128_CTR, &aria_128_ctr_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_192_CTR, &aria_192_ctr_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_256_CTR, &aria_256_ctr_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_GCM_C)
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_128_GCM, &aria_128_gcm_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_192_GCM, &aria_192_gcm_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_256_GCM, &aria_256_gcm_info },
|
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_CCM_C)
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_128_CCM, &aria_128_ccm_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_192_CCM, &aria_192_ccm_info },
|
|
|
|
{ MBEDTLS_CIPHER_ARIA_256_CCM, &aria_256_ccm_info },
|
|
|
|
#endif
|
|
|
|
#endif /* MBEDTLS_ARIA_C */
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_DES_C)
|
|
|
|
{ MBEDTLS_CIPHER_DES_ECB, &des_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_DES_EDE_ECB, &des_ede_ecb_info },
|
|
|
|
{ MBEDTLS_CIPHER_DES_EDE3_ECB, &des_ede3_ecb_info },
|
|
|
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
|
|
|
{ MBEDTLS_CIPHER_DES_CBC, &des_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_DES_EDE_CBC, &des_ede_cbc_info },
|
|
|
|
{ MBEDTLS_CIPHER_DES_EDE3_CBC, &des_ede3_cbc_info },
|
|
|
|
#endif
|
|
|
|
#endif /* MBEDTLS_DES_C */
|
|
|
|
|
2018-07-28 11:16:41 +02:00
|
|
|
#if defined(MBEDTLS_CHACHA20_C)
|
|
|
|
{ MBEDTLS_CIPHER_CHACHA20, &chacha20_info },
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_CHACHAPOLY_C)
|
|
|
|
{ MBEDTLS_CIPHER_CHACHA20_POLY1305, &chachapoly_info },
|
|
|
|
#endif
|
|
|
|
|
2021-12-21 12:54:05 +01:00
|
|
|
#if defined(MBEDTLS_NIST_KW_C)
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_KW, &aes_128_nist_kw_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_KW, &aes_192_nist_kw_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_KW, &aes_256_nist_kw_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_128_KWP, &aes_128_nist_kwp_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_192_KWP, &aes_192_nist_kwp_info },
|
|
|
|
{ MBEDTLS_CIPHER_AES_256_KWP, &aes_256_nist_kwp_info },
|
|
|
|
#endif
|
|
|
|
|
2018-02-08 19:04:43 +01:00
|
|
|
#if defined(MBEDTLS_CIPHER_NULL_CIPHER)
|
|
|
|
{ MBEDTLS_CIPHER_NULL, &null_cipher_info },
|
|
|
|
#endif /* MBEDTLS_CIPHER_NULL_CIPHER */
|
|
|
|
|
|
|
|
{ MBEDTLS_CIPHER_NONE, NULL }
|
|
|
|
};
|
|
|
|
|
2023-04-18 10:38:24 +02:00
|
|
|
#define NUM_CIPHERS (sizeof(mbedtls_cipher_definitions) / \
|
|
|
|
sizeof(mbedtls_cipher_definitions[0]))
|
2018-02-08 19:04:43 +01:00
|
|
|
int mbedtls_cipher_supported[NUM_CIPHERS];
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_CIPHER_C */
|