mirror of https://gitee.com/openkylin/qemu.git
231 lines
5.9 KiB
C
231 lines
5.9 KiB
C
/*
|
|
* QEMU Crypto XTS cipher mode
|
|
*
|
|
* Copyright (c) 2015-2016 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
* This code is originally derived from public domain / WTFPL code in
|
|
* LibTomCrypt crytographic library http://libtom.org. The XTS code
|
|
* was donated by Elliptic Semiconductor Inc (www.ellipticsemi.com)
|
|
* to the LibTom Projects
|
|
*
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "crypto/xts.h"
|
|
|
|
static void xts_mult_x(uint8_t *I)
|
|
{
|
|
int x;
|
|
uint8_t t, tt;
|
|
|
|
for (x = t = 0; x < 16; x++) {
|
|
tt = I[x] >> 7;
|
|
I[x] = ((I[x] << 1) | t) & 0xFF;
|
|
t = tt;
|
|
}
|
|
if (tt) {
|
|
I[0] ^= 0x87;
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* xts_tweak_uncrypt:
|
|
* @param ctxt: the cipher context
|
|
* @param func: the cipher function
|
|
* @src: buffer providing the cipher text of XTS_BLOCK_SIZE bytes
|
|
* @dst: buffer to output the plain text of XTS_BLOCK_SIZE bytes
|
|
* @iv: the initialization vector tweak of XTS_BLOCK_SIZE bytes
|
|
*
|
|
* Decrypt data with a tweak
|
|
*/
|
|
static void xts_tweak_decrypt(const void *ctx,
|
|
xts_cipher_func *func,
|
|
const uint8_t *src,
|
|
uint8_t *dst,
|
|
uint8_t *iv)
|
|
{
|
|
unsigned long x;
|
|
|
|
/* tweak encrypt block i */
|
|
for (x = 0; x < XTS_BLOCK_SIZE; x++) {
|
|
dst[x] = src[x] ^ iv[x];
|
|
}
|
|
|
|
func(ctx, XTS_BLOCK_SIZE, dst, dst);
|
|
|
|
for (x = 0; x < XTS_BLOCK_SIZE; x++) {
|
|
dst[x] = dst[x] ^ iv[x];
|
|
}
|
|
|
|
/* LFSR the tweak */
|
|
xts_mult_x(iv);
|
|
}
|
|
|
|
|
|
void xts_decrypt(const void *datactx,
|
|
const void *tweakctx,
|
|
xts_cipher_func *encfunc,
|
|
xts_cipher_func *decfunc,
|
|
uint8_t *iv,
|
|
size_t length,
|
|
uint8_t *dst,
|
|
const uint8_t *src)
|
|
{
|
|
uint8_t PP[XTS_BLOCK_SIZE], CC[XTS_BLOCK_SIZE], T[XTS_BLOCK_SIZE];
|
|
unsigned long i, m, mo, lim;
|
|
|
|
/* get number of blocks */
|
|
m = length >> 4;
|
|
mo = length & 15;
|
|
|
|
/* must have at least one full block */
|
|
g_assert(m != 0);
|
|
|
|
if (mo == 0) {
|
|
lim = m;
|
|
} else {
|
|
lim = m - 1;
|
|
}
|
|
|
|
/* encrypt the iv */
|
|
encfunc(tweakctx, XTS_BLOCK_SIZE, T, iv);
|
|
|
|
for (i = 0; i < lim; i++) {
|
|
xts_tweak_decrypt(datactx, decfunc, src, dst, T);
|
|
|
|
src += XTS_BLOCK_SIZE;
|
|
dst += XTS_BLOCK_SIZE;
|
|
}
|
|
|
|
/* if length is not a multiple of XTS_BLOCK_SIZE then */
|
|
if (mo > 0) {
|
|
memcpy(CC, T, XTS_BLOCK_SIZE);
|
|
xts_mult_x(CC);
|
|
|
|
/* PP = tweak decrypt block m-1 */
|
|
xts_tweak_decrypt(datactx, decfunc, src, PP, CC);
|
|
|
|
/* Pm = first length % XTS_BLOCK_SIZE bytes of PP */
|
|
for (i = 0; i < mo; i++) {
|
|
CC[i] = src[XTS_BLOCK_SIZE + i];
|
|
dst[XTS_BLOCK_SIZE + i] = PP[i];
|
|
}
|
|
for (; i < XTS_BLOCK_SIZE; i++) {
|
|
CC[i] = PP[i];
|
|
}
|
|
|
|
/* Pm-1 = Tweak uncrypt CC */
|
|
xts_tweak_decrypt(datactx, decfunc, CC, dst, T);
|
|
}
|
|
|
|
/* Decrypt the iv back */
|
|
decfunc(tweakctx, XTS_BLOCK_SIZE, iv, T);
|
|
}
|
|
|
|
|
|
/**
|
|
* xts_tweak_crypt:
|
|
* @param ctxt: the cipher context
|
|
* @param func: the cipher function
|
|
* @src: buffer providing the plain text of XTS_BLOCK_SIZE bytes
|
|
* @dst: buffer to output the cipher text of XTS_BLOCK_SIZE bytes
|
|
* @iv: the initialization vector tweak of XTS_BLOCK_SIZE bytes
|
|
*
|
|
* Encrypt data with a tweak
|
|
*/
|
|
static void xts_tweak_encrypt(const void *ctx,
|
|
xts_cipher_func *func,
|
|
const uint8_t *src,
|
|
uint8_t *dst,
|
|
uint8_t *iv)
|
|
{
|
|
unsigned long x;
|
|
|
|
/* tweak encrypt block i */
|
|
for (x = 0; x < XTS_BLOCK_SIZE; x++) {
|
|
dst[x] = src[x] ^ iv[x];
|
|
}
|
|
|
|
func(ctx, XTS_BLOCK_SIZE, dst, dst);
|
|
|
|
for (x = 0; x < XTS_BLOCK_SIZE; x++) {
|
|
dst[x] = dst[x] ^ iv[x];
|
|
}
|
|
|
|
/* LFSR the tweak */
|
|
xts_mult_x(iv);
|
|
}
|
|
|
|
|
|
void xts_encrypt(const void *datactx,
|
|
const void *tweakctx,
|
|
xts_cipher_func *encfunc,
|
|
xts_cipher_func *decfunc,
|
|
uint8_t *iv,
|
|
size_t length,
|
|
uint8_t *dst,
|
|
const uint8_t *src)
|
|
{
|
|
uint8_t PP[XTS_BLOCK_SIZE], CC[XTS_BLOCK_SIZE], T[XTS_BLOCK_SIZE];
|
|
unsigned long i, m, mo, lim;
|
|
|
|
/* get number of blocks */
|
|
m = length >> 4;
|
|
mo = length & 15;
|
|
|
|
/* must have at least one full block */
|
|
g_assert(m != 0);
|
|
|
|
if (mo == 0) {
|
|
lim = m;
|
|
} else {
|
|
lim = m - 1;
|
|
}
|
|
|
|
/* encrypt the iv */
|
|
encfunc(tweakctx, XTS_BLOCK_SIZE, T, iv);
|
|
|
|
for (i = 0; i < lim; i++) {
|
|
xts_tweak_encrypt(datactx, encfunc, src, dst, T);
|
|
|
|
dst += XTS_BLOCK_SIZE;
|
|
src += XTS_BLOCK_SIZE;
|
|
}
|
|
|
|
/* if length is not a multiple of XTS_BLOCK_SIZE then */
|
|
if (mo > 0) {
|
|
/* CC = tweak encrypt block m-1 */
|
|
xts_tweak_encrypt(datactx, encfunc, src, CC, T);
|
|
|
|
/* Cm = first length % XTS_BLOCK_SIZE bytes of CC */
|
|
for (i = 0; i < mo; i++) {
|
|
PP[i] = src[XTS_BLOCK_SIZE + i];
|
|
dst[XTS_BLOCK_SIZE + i] = CC[i];
|
|
}
|
|
|
|
for (; i < XTS_BLOCK_SIZE; i++) {
|
|
PP[i] = CC[i];
|
|
}
|
|
|
|
/* Cm-1 = Tweak encrypt PP */
|
|
xts_tweak_encrypt(datactx, encfunc, PP, dst, T);
|
|
}
|
|
|
|
/* Decrypt the iv back */
|
|
decfunc(tweakctx, XTS_BLOCK_SIZE, iv, T);
|
|
}
|