NetBSD/sys/opencrypto/xform.c

382 lines
9.1 KiB
C

/* $NetBSD: xform.c,v 1.29 2017/07/06 08:27:07 ozaki-r Exp $ */
/* $FreeBSD: src/sys/opencrypto/xform.c,v 1.1.2.1 2002/11/21 23:34:23 sam Exp $ */
/* $OpenBSD: xform.c,v 1.19 2002/08/16 22:47:25 dhartmei Exp $ */
/*
* The authors of this code are John Ioannidis (ji@tla.org),
* Angelos D. Keromytis (kermit@csd.uch.gr) and
* Niels Provos (provos@physnet.uni-hamburg.de).
*
* This code was written by John Ioannidis for BSD/OS in Athens, Greece,
* in November 1995.
*
* Ported to OpenBSD and NetBSD, with additional transforms, in December 1996,
* by Angelos D. Keromytis.
*
* Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis
* and Niels Provos.
*
* Additional features in 1999 by Angelos D. Keromytis.
*
* Copyright (C) 1995, 1996, 1997, 1998, 1999 by John Ioannidis,
* Angelos D. Keromytis and Niels Provos.
*
* Copyright (C) 2001, Angelos D. Keromytis.
*
* Permission to use, copy, and modify this software with or without fee
* is hereby granted, provided that this entire notice is included in
* all copies of any software which is or includes a copy or
* modification of this software.
* You may use this code under the GNU public license if you so wish. Please
* contribute changes back to the authors under this freer than GPL license
* so that we may further the use of strong encryption without limitations to
* all.
*
* THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR
* IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY
* REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
* MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
* PURPOSE.
*/
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: xform.c,v 1.29 2017/07/06 08:27:07 ozaki-r Exp $");
#include <sys/param.h>
#include <sys/malloc.h>
#include <opencrypto/cryptodev.h>
#include <opencrypto/xform.h>
MALLOC_DEFINE(M_XDATA, "xform", "xform data buffers");
const u_int8_t hmac_ipad_buffer[128] = {
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36
};
const u_int8_t hmac_opad_buffer[128] = {
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C
};
/* Encryption instances */
const struct enc_xform enc_xform_null = {
.type = CRYPTO_NULL_CBC,
.name = "NULL",
/* NB: blocksize of 4 is to generate a properly aligned ESP header */
.blocksize = 4,
.ivsize = 0,
.minkey = 0,
.maxkey = 256, /* 2048 bits, max key */
};
const struct enc_xform enc_xform_des = {
.type = CRYPTO_DES_CBC,
.name = "DES",
.blocksize = 8,
.ivsize = 8,
.minkey = 8,
.maxkey = 8,
};
const struct enc_xform enc_xform_3des = {
.type = CRYPTO_3DES_CBC,
.name = "3DES",
.blocksize = 8,
.ivsize = 8,
.minkey = 24,
.maxkey = 24,
};
const struct enc_xform enc_xform_blf = {
.type = CRYPTO_BLF_CBC,
.name = "Blowfish",
.blocksize = 8,
.ivsize = 8,
.minkey = 5,
.maxkey = 56, /* 448 bits, max key */
};
const struct enc_xform enc_xform_cast5 = {
.type = CRYPTO_CAST_CBC,
.name = "CAST-128",
.blocksize = 8,
.ivsize = 8,
.minkey = 5,
.maxkey = 16,
};
const struct enc_xform enc_xform_skipjack = {
.type = CRYPTO_SKIPJACK_CBC,
.name = "Skipjack",
.blocksize = 8,
.ivsize = 8,
.minkey = 10,
.maxkey = 10,
};
const struct enc_xform enc_xform_rijndael128 = {
.type = CRYPTO_RIJNDAEL128_CBC,
.name = "Rijndael-128/AES",
.blocksize = 16,
.ivsize = 16,
.minkey = 16,
.maxkey = 32,
};
const struct enc_xform enc_xform_arc4 = {
.type = CRYPTO_ARC4,
.name = "ARC4",
.blocksize = 1,
.ivsize = 0,
.minkey = 1,
.maxkey = 32,
};
const struct enc_xform enc_xform_camellia = {
.type = CRYPTO_CAMELLIA_CBC,
.name = "Camellia",
.blocksize = 16,
.ivsize = 16,
.minkey = 8,
.maxkey = 32,
};
const struct enc_xform enc_xform_aes_ctr = {
.type = CRYPTO_AES_CTR,
.name = "AES-CTR",
.blocksize = 16,
.ivsize = 8,
.minkey = 16 + 4,
.maxkey = 32 + 4,
};
const struct enc_xform enc_xform_aes_gcm = {
.type = CRYPTO_AES_GCM_16,
.name = "AES-GCM",
.blocksize = 4, /* ??? */
.ivsize = 8,
.minkey = 16 + 4,
.maxkey = 32 + 4,
};
const struct enc_xform enc_xform_aes_gmac = {
.type = CRYPTO_AES_GMAC,
.name = "AES-GMAC",
.blocksize = 4, /* ??? */
.ivsize = 8,
.minkey = 16 + 4,
.maxkey = 32 + 4,
};
/* Authentication instances */
const struct auth_hash auth_hash_null = {
.type = CRYPTO_NULL_HMAC,
.name = "NULL-HMAC",
.keysize = 0,
.hashsize = 0,
.authsize = 12,
.blocksize = 64,
};
const struct auth_hash auth_hash_hmac_md5 = {
.type = CRYPTO_MD5_HMAC,
.name = "HMAC-MD5",
.keysize = 16,
.hashsize = 16,
.authsize = 16,
.blocksize = 64,
};
const struct auth_hash auth_hash_hmac_sha1 = {
.type = CRYPTO_SHA1_HMAC,
.name = "HMAC-SHA1",
.keysize = 20,
.hashsize = 20,
.authsize = 20,
.blocksize = 64,
};
const struct auth_hash auth_hash_hmac_ripemd_160 = {
.type = CRYPTO_RIPEMD160_HMAC,
.name = "HMAC-RIPEMD-160",
.keysize = 20,
.hashsize = 20,
.authsize = 20,
.blocksize = 64,
};
const struct auth_hash auth_hash_hmac_md5_96 = {
.type = CRYPTO_MD5_HMAC_96,
.name = "HMAC-MD5-96",
.keysize = 16,
.hashsize = 16,
.authsize = 12,
.blocksize = 64,
};
const struct auth_hash auth_hash_hmac_sha1_96 = {
.type = CRYPTO_SHA1_HMAC_96,
.name = "HMAC-SHA1-96",
.keysize = 20,
.hashsize = 20,
.authsize = 12,
.blocksize = 64,
};
const struct auth_hash auth_hash_hmac_ripemd_160_96 = {
.type = CRYPTO_RIPEMD160_HMAC_96,
.name = "HMAC-RIPEMD-160",
.keysize = 20,
.hashsize = 20,
.authsize = 12,
.blocksize = 64,
};
const struct auth_hash auth_hash_key_md5 = {
.type = CRYPTO_MD5_KPDK,
.name = "Keyed MD5",
.keysize = 0,
.hashsize = 16,
.authsize = 16,
.blocksize = 0,
};
const struct auth_hash auth_hash_key_sha1 = {
.type = CRYPTO_SHA1_KPDK,
.name = "Keyed SHA1",
.keysize = 0,
.hashsize = 20,
.authsize = 20,
.blocksize = 0,
};
const struct auth_hash auth_hash_md5 = {
.type = CRYPTO_MD5,
.name = "MD5",
.keysize = 0,
.hashsize = 16,
.authsize = 16,
.blocksize = 0,
};
const struct auth_hash auth_hash_sha1 = {
.type = CRYPTO_SHA1,
.name = "SHA1",
.keysize = 0,
.hashsize = 20,
.authsize = 20,
.blocksize = 0,
};
const struct auth_hash auth_hash_hmac_sha2_256 = {
.type = CRYPTO_SHA2_256_HMAC,
.name = "HMAC-SHA2",
.keysize = 32,
.hashsize = 32,
.authsize = 16,
.blocksize = 64,
};
const struct auth_hash auth_hash_hmac_sha2_384 = {
.type = CRYPTO_SHA2_384_HMAC,
.name = "HMAC-SHA2-384",
.keysize = 48,
.hashsize = 48,
.authsize = 24,
.blocksize = 128,
};
const struct auth_hash auth_hash_hmac_sha2_512 = {
.type = CRYPTO_SHA2_512_HMAC,
.name = "HMAC-SHA2-512",
.keysize = 64,
.hashsize = 64,
.authsize = 32,
.blocksize = 128,
};
const struct auth_hash auth_hash_aes_xcbc_mac_96 = {
.type = CRYPTO_AES_XCBC_MAC_96,
.name = "AES-XCBC-MAC-96",
.keysize = 16,
.hashsize = 16,
.authsize = 12,
.blocksize = 0,
};
const struct auth_hash auth_hash_gmac_aes_128 = {
.type = CRYPTO_AES_128_GMAC,
.name = "GMAC-AES-128",
.keysize = 16 + 4,
.hashsize = 16,
.authsize = 16,
.blocksize = 16, /* ??? */
};
const struct auth_hash auth_hash_gmac_aes_192 = {
.type = CRYPTO_AES_192_GMAC,
.name = "GMAC-AES-192",
.keysize = 24 + 4,
.hashsize = 16,
.authsize = 16,
.blocksize = 16, /* ??? */
};
const struct auth_hash auth_hash_gmac_aes_256 = {
.type = CRYPTO_AES_256_GMAC,
.name = "GMAC-AES-256",
.keysize = 32 + 4,
.hashsize = 16,
.authsize = 16,
.blocksize = 16, /* ??? */
};
/* Compression instance */
const struct comp_algo comp_algo_deflate = {
.type = CRYPTO_DEFLATE_COMP,
.name = "Deflate",
.minlen = 90,
};
const struct comp_algo comp_algo_deflate_nogrow = {
.type = CRYPTO_DEFLATE_COMP_NOGROW,
.name = "Deflate",
.minlen = 90,
};
const struct comp_algo comp_algo_gzip = {
.type = CRYPTO_GZIP_COMP,
.name = "GZIP",
.minlen = 90,
};