crypto debugging, and several bugfixes
[userv-utils] / ipif / mech-blowfish.c
CommitLineData
1fb3cba0 1/*
2 * Blowfish
3 *
4 * arguments: key size in bits (must be multiple of 8)
5 *
6 * key values: 8 byte random IV and n byte random key
7 *
8 * encoding: do CBC encryption overwriting message
9 * encoding for MAC: do CBC and prepend last ciphertext block
10 */
11
f9e59051 12#include "forwarder.h"
1fb3cba0 13#include "blowfish.h"
14
15struct mechdata {
16 struct blowfish_cbc_state cbc;
17};
18
19static void mds_blowfish(struct mechdata **md_r) {
20 struct mechdata *md;
21 unsigned long keysize;
22 unsigned char iv[BLOWFISH_BLOCKBYTES];
23 unsigned char key[BLOWFISH_MAXKEYBYTES];
24
0f4b558c 25 XMALLOC(md);
1fb3cba0 26
27 keysize= getarg_ulong();
28 arg_assert(!(keysize & 7));
29 keysize >>= 3;
30 arg_assert(keysize > 0 && keysize <= BLOWFISH_MAXKEYBYTES);
31
32 random_key(iv,sizeof(iv));
33 random_key(key,keysize);
34
35 blowfish_loadkey(&md->cbc.ek, key,keysize);
36 blowfish_cbc_setiv(&md->cbc, iv);
37
38 *md_r= md;
39}
40
41static void mes_blowfish(struct mechdata **md_r, int *maxprefix_io, int *maxsuffix_io) {
42 mds_blowfish(md_r);
43}
44
45static void mds_bfmac(struct mechdata **md_r) {
46 mds_blowfish(md_r);
47}
48
49static void mes_bfmac(struct mechdata **md_r, int *maxprefix_io, int *maxsuffix_io) {
50 mds_blowfish(md_r);
51 *maxprefix_io += BLOWFISH_BLOCKBYTES;
52}
53
54#define MSGSIZE_OUT \
55 msgsize= buf->size; \
0f4b558c 56 arg_assert(!(msgsize & (BLOWFISH_BLOCKBYTES-1)));
1fb3cba0 57
58#define MSGSIZE_IN \
59 msgsize= buf->size; \
0f4b558c 60 if (msgsize & (BLOWFISH_BLOCKBYTES-1)) return "not multiple of block size"
1fb3cba0 61
62#define FOREACH_BLOCK(func,inptr,outptr) \
63 { \
64 unsigned char *ptr; \
0f4b558c 65 for (ptr= buf->start; \
66 ptr < buf->start + msgsize; \
67 ptr += BLOWFISH_BLOCKBYTES) { \
1fb3cba0 68 func(&md->cbc,inptr,outptr); \
0f4b558c 69 } \
1fb3cba0 70 }
71
72static void menc_blowfish(struct mechdata *md, struct buffer *buf) {
73 unsigned long msgsize;
74 MSGSIZE_OUT;
75 FOREACH_BLOCK(blowfish_cbc_encrypt,ptr,ptr);
76}
77
78static const char *mdec_blowfish(struct mechdata *md, struct buffer *buf) {
79 unsigned long msgsize;
80 MSGSIZE_IN;
81 FOREACH_BLOCK(blowfish_cbc_decrypt,ptr,ptr);
82 return 0;
83}
84
85static void menc_bfmac(struct mechdata *md, struct buffer *buf) {
86 unsigned long msgsize;
87 unsigned char outblock[BLOWFISH_BLOCKBYTES];
88
89 MSGSIZE_OUT;
90 FOREACH_BLOCK(blowfish_cbc_encrypt,ptr,outblock);
91 memcpy(buf_prepend(buf,BLOWFISH_BLOCKBYTES), outblock, BLOWFISH_BLOCKBYTES);
92}
93
94static const char *mdec_bfmac(struct mechdata *md, struct buffer *buf) {
95 unsigned long msgsize;
96 unsigned char outblock[BLOWFISH_BLOCKBYTES];
97 unsigned char *checkblock;
98
99 BUF_UNPREPEND(checkblock,buf,BLOWFISH_BLOCKBYTES);
100 MSGSIZE_IN;
101 FOREACH_BLOCK(blowfish_cbc_encrypt,ptr,outblock);
102 if (memcmp(checkblock,outblock,BLOWFISH_BLOCKBYTES)) return "verify failed";
103 return 0;
104}
105
106const struct mechanism mechlist_blowfish[]= {
107 STANDARD_MECHANISM("blowfish-cbcmac", bfmac)
108 STANDARD_MECHANISM("blowfish-cbc", blowfish)
109 { 0 }
110};