mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-07 00:46:17 +08:00
370 lines
8.2 KiB
C
370 lines
8.2 KiB
C
/* crypto/evp/e_sms4.c */
|
|
/* ====================================================================
|
|
* Copyright (c) 2014 - 2015 The GmSSL Project. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. All advertising materials mentioning features or use of this
|
|
* software must display the following acknowledgment:
|
|
* "This product includes software developed by the GmSSL Project.
|
|
* (http://gmssl.org/)"
|
|
*
|
|
* 4. The name "GmSSL Project" must not be used to endorse or promote
|
|
* products derived from this software without prior written
|
|
* permission. For written permission, please contact
|
|
* guanzhi1980@gmail.com.
|
|
*
|
|
* 5. Products derived from this software may not be called "GmSSL"
|
|
* nor may "GmSSL" appear in their names without prior written
|
|
* permission of the GmSSL Project.
|
|
*
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
* acknowledgment:
|
|
* "This product includes software developed by the GmSSL Project
|
|
* (http://gmssl.org/)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
* ====================================================================
|
|
*
|
|
*/
|
|
|
|
|
|
#include <stdio.h>
|
|
#include "cryptlib.h"
|
|
|
|
#ifndef NO_GMSSL
|
|
|
|
#include <openssl/evp.h>
|
|
#include <openssl/objects.h>
|
|
#include <openssl/crypto.h>
|
|
#include "evp_locl.h"
|
|
#include "modes_lcl.h"
|
|
#include <openssl/sms4.h>
|
|
|
|
typedef struct {
|
|
sms4_key_t ks;
|
|
} EVP_SMS4_KEY;
|
|
|
|
static int sms4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
|
const unsigned char *iv, int enc)
|
|
{
|
|
if (!enc) {
|
|
if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE)
|
|
enc = 1;
|
|
else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE)
|
|
enc = 1; //encrypt key == decrypt key
|
|
}
|
|
|
|
if (enc)
|
|
sms4_set_encrypt_key(ctx->cipher_data, key);
|
|
else sms4_set_decrypt_key(ctx->cipher_data, key);
|
|
|
|
|
|
return 1;
|
|
}
|
|
|
|
IMPLEMENT_BLOCK_CIPHER(sms4, ks, sms4, EVP_SMS4_KEY, NID_sms4,
|
|
SMS4_BLOCK_SIZE, SMS4_KEY_LENGTH, SMS4_IV_LENGTH, 128, 0,
|
|
sms4_init_key, NULL, NULL, NULL, NULL)
|
|
|
|
# define MAXBITCHUNK ((size_t)1<<(sizeof(size_t)*8-4))
|
|
|
|
static int sms4_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
|
const unsigned char *in, size_t len)
|
|
{
|
|
EVP_SMS4_KEY *sms4_key = (EVP_SMS4_KEY *)ctx->cipher_data;
|
|
|
|
if (ctx->flags & EVP_CIPH_FLAG_LENGTH_BITS) {
|
|
CRYPTO_cfb128_1_encrypt(in, out, len, &sms4_key->ks,
|
|
ctx->iv, &ctx->num, ctx->encrypt, (block128_f)sms4_encrypt);
|
|
return 1;
|
|
}
|
|
|
|
while (len >= MAXBITCHUNK) {
|
|
CRYPTO_cfb128_1_encrypt(in, out, MAXBITCHUNK * 8, &sms4_key->ks,
|
|
ctx->iv, &ctx->num, ctx->encrypt, (block128_f)sms4_encrypt);
|
|
len -= MAXBITCHUNK;
|
|
}
|
|
|
|
if (len) {
|
|
CRYPTO_cfb128_1_encrypt(in, out, len * 8, &sms4_key->ks,
|
|
ctx->iv, &ctx->num, ctx->encrypt, (block128_f)sms4_encrypt);
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
const EVP_CIPHER sms4_cfb1 = {
|
|
NID_sms4_cfb1,
|
|
SMS4_BLOCK_SIZE,
|
|
SMS4_KEY_LENGTH,
|
|
SMS4_IV_LENGTH,
|
|
EVP_CIPH_CTR_MODE,
|
|
sms4_init_key,
|
|
sms4_cfb1_cipher,
|
|
NULL, /* cleanup() */
|
|
sizeof(EVP_SMS4_KEY),
|
|
NULL, /* set_asn1_parameters() */
|
|
NULL, /* get_asn1_parameters() */
|
|
NULL, /* ctrl() */
|
|
NULL /* app_data */
|
|
};
|
|
|
|
const EVP_CIPHER *EVP_sms4_cfb1(void)
|
|
{
|
|
return &sms4_cfb1;
|
|
}
|
|
|
|
static int sms4_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
|
const unsigned char *in, size_t len)
|
|
{
|
|
EVP_SMS4_KEY *sms4_key = (EVP_SMS4_KEY *)ctx->cipher_data;
|
|
|
|
CRYPTO_cfb128_8_encrypt(in, out, len, &sms4_key->ks,
|
|
ctx->iv, &ctx->num, ctx->encrypt, (block128_f)sms4_encrypt);
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
const EVP_CIPHER sms4_cfb8 = {
|
|
NID_sms4_cfb8,
|
|
SMS4_BLOCK_SIZE,
|
|
SMS4_KEY_LENGTH,
|
|
SMS4_IV_LENGTH,
|
|
EVP_CIPH_CTR_MODE,
|
|
sms4_init_key,
|
|
sms4_cfb8_cipher,
|
|
NULL,
|
|
sizeof(EVP_SMS4_KEY),
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
};
|
|
|
|
const EVP_CIPHER *EVP_sms4_cfb8(void)
|
|
{
|
|
return &sms4_cfb8;
|
|
}
|
|
|
|
static int sms4_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
|
const unsigned char *in, size_t len)
|
|
{
|
|
|
|
unsigned int num = ctx->num;
|
|
EVP_SMS4_KEY *sms4 = (EVP_SMS4_KEY *)ctx->cipher_data;
|
|
|
|
CRYPTO_ctr128_encrypt_ctr32(in, out, len, &sms4->ks, ctx->iv, ctx->buf,
|
|
&num, (ctr128_f)sms4_encrypt);
|
|
|
|
ctx->num = (size_t)num;
|
|
return 1;
|
|
}
|
|
|
|
const EVP_CIPHER sms4_ctr = {
|
|
NID_sms4_ctr,
|
|
SMS4_BLOCK_SIZE,
|
|
SMS4_KEY_LENGTH,
|
|
SMS4_IV_LENGTH,
|
|
EVP_CIPH_CTR_MODE,
|
|
sms4_init_key,
|
|
sms4_ctr_cipher,
|
|
NULL, /* cleanup() */
|
|
sizeof(EVP_SMS4_KEY),
|
|
NULL, /* set_asn1_parameters() */
|
|
NULL, /* get_asn1_parameters() */
|
|
NULL, /* ctrl() */
|
|
NULL /* app_data */
|
|
};
|
|
|
|
const EVP_CIPHER *EVP_sms4_ctr(void)
|
|
{
|
|
return &sms4_ctr;
|
|
}
|
|
|
|
#if 0
|
|
|
|
typedef struct {
|
|
sms4_key_t ks;
|
|
int key_is_inited;
|
|
int iv_is_inited;
|
|
GCM128_CONTEXT gcm;
|
|
unsigned char *iv;
|
|
int ivlen;
|
|
int taglen;
|
|
int iv_gen;
|
|
ctr128_f ctr;
|
|
} EVP_SMS4_GCM_CTX;
|
|
|
|
|
|
static int sms4_gcm_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
|
|
{
|
|
|
|
switch (type) {
|
|
case EVP_CTRL_INIT:
|
|
|
|
|
|
case EVP_CTRL_GCM_SET_IVLEN:
|
|
case EVP_CTRL_GCM_SET_TAG:
|
|
case EVP_CTRL_GCM_GET_TAG:
|
|
case EVP_CTRL_GCM_SET_IV_FIXED:
|
|
case EVP_CTRL_GCM_IV_GEN:
|
|
case EVP_CTRL_GCM_SET_IV_INV:
|
|
case EVP_CTRL_COPY:
|
|
default:
|
|
return -1;
|
|
}
|
|
|
|
|
|
}
|
|
#endif
|
|
|
|
typedef struct {
|
|
union {
|
|
double align;
|
|
sms4_key_t ks;
|
|
} ks;
|
|
unsigned char *iv;
|
|
} EVP_SMS4_WRAP_CTX;
|
|
|
|
|
|
static int sms4_wrap_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
|
const unsigned char *iv, int enc)
|
|
{
|
|
EVP_SMS4_WRAP_CTX *sms4_wrap = ctx->cipher_data;
|
|
|
|
if (!iv && !key)
|
|
return 1;
|
|
|
|
if (key) {
|
|
if (ctx->encrypt) {
|
|
sms4_set_encrypt_key(&sms4_wrap->ks.ks, key);
|
|
} else {
|
|
sms4_set_decrypt_key(&sms4_wrap->ks.ks, key);
|
|
}
|
|
|
|
if (!iv) {
|
|
sms4_wrap->iv = NULL;
|
|
}
|
|
}
|
|
|
|
if (iv) {
|
|
memcpy(ctx->iv, iv, 8);
|
|
sms4_wrap->iv = ctx->iv;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
static int sms4_wrap_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
|
const unsigned char *in, size_t inlen)
|
|
{
|
|
EVP_SMS4_WRAP_CTX *sms4_wrap = ctx->cipher_data;
|
|
size_t rv;
|
|
|
|
if (!in) {
|
|
return 0;
|
|
}
|
|
|
|
if (inlen % 8) {
|
|
return -1;
|
|
}
|
|
|
|
if (ctx->encrypt && inlen < 8)
|
|
return -1;
|
|
|
|
if (!ctx->encrypt && inlen < 8)
|
|
return -1;
|
|
|
|
if (!out) {
|
|
if (ctx->encrypt)
|
|
return inlen + 8;
|
|
else return inlen - 8;
|
|
}
|
|
|
|
if (ctx->encrypt)
|
|
rv = CRYPTO_128_wrap(&sms4_wrap->ks.ks, sms4_wrap->iv,
|
|
out, in, inlen, (block128_f)sms4_encrypt);
|
|
else rv = CRYPTO_128_unwrap(&sms4_wrap->ks.ks, sms4_wrap->iv,
|
|
out, in, inlen, (block128_f)sms4_encrypt);
|
|
|
|
return rv ? (int)rv : -1;
|
|
}
|
|
|
|
|
|
#define SMS4_WRAP_FLAGS (EVP_CIPH_WRAP_MODE \
|
|
| EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \
|
|
| EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_FLAG_DEFAULT_ASN1)
|
|
|
|
|
|
#define SMS4_WRAP_BLOCK_SIZE 8
|
|
#define SMS4_WRAP_IV_LENGTH 8
|
|
|
|
const EVP_CIPHER sms4_wrap = {
|
|
NID_sms4_wrap,
|
|
SMS4_WRAP_BLOCK_SIZE,
|
|
SMS4_KEY_LENGTH,
|
|
SMS4_WRAP_IV_LENGTH,
|
|
SMS4_WRAP_FLAGS,
|
|
sms4_wrap_init_key,
|
|
sms4_wrap_do_cipher,
|
|
NULL, /* cleanup() */
|
|
sizeof(EVP_SMS4_WRAP_CTX),
|
|
NULL, /* set_asn1_parameters() */
|
|
NULL, /* get_asn1_parameters() */
|
|
NULL, /* ctrl() */
|
|
NULL /* app_data */
|
|
};
|
|
|
|
const EVP_CIPHER *EVP_sms4_wrap(void)
|
|
{
|
|
return &sms4_wrap;
|
|
}
|
|
|
|
const EVP_CIPHER *EVP_sms4_ccm(void)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
const EVP_CIPHER *EVP_sms4_gcm(void)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
const EVP_CIPHER *EVP_sms4_xts(void)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
|
|
|
|
//TODO: EVP_sms4_256_xxx();
|
|
|
|
|
|
//TODO: EVP_sms4_ctr_avx2()
|
|
|
|
|
|
#endif
|