Correct PPTP server firewall rules chain.
[tomato/davidwu.git] / release / src / router / nettle / umac128.c
blob95c90e5f3efe6781ce3e1a5e3f9a2e1bf6bf1fad
1 /* umac128.c
2 */
4 /* nettle, low-level cryptographics library
6 * Copyright (C) 2013 Niels Möller
8 * The nettle library is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Lesser General Public License as published by
10 * the Free Software Foundation; either version 2.1 of the License, or (at your
11 * option) any later version.
13 * The nettle library is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
15 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
16 * License for more details.
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with the nettle library; see the file COPYING.LIB. If not, write to
20 * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
21 * MA 02111-1301, USA.
24 #if HAVE_CONFIG_H
25 # include "config.h"
26 #endif
28 #include <assert.h>
29 #include <string.h>
31 #include "umac.h"
33 #include "macros.h"
35 void
36 umac128_set_key (struct umac128_ctx *ctx, const uint8_t *key)
38 _umac_set_key (ctx->l1_key, ctx->l2_key, ctx->l3_key1, ctx->l3_key2,
39 &ctx->pdf_key, key, 4);
41 /* Clear nonce */
42 memset (ctx->nonce, 0, sizeof(ctx->nonce));
43 ctx->nonce_length = sizeof(ctx->nonce);
45 /* Initialize buffer */
46 ctx->count = ctx->index = 0;
49 void
50 umac128_set_nonce (struct umac128_ctx *ctx,
51 unsigned nonce_length, const uint8_t *nonce)
53 assert (nonce_length > 0);
54 assert (nonce_length <= AES_BLOCK_SIZE);
56 memcpy (ctx->nonce, nonce, nonce_length);
57 memset (ctx->nonce + nonce_length, 0, AES_BLOCK_SIZE - nonce_length);
59 ctx->nonce_length = nonce_length;
62 #define UMAC128_BLOCK(ctx, block) do { \
63 uint64_t __umac128_y[4]; \
64 _umac_nh_n (__umac128_y, 4, ctx->l1_key, UMAC_DATA_SIZE, block); \
65 __umac128_y[0] += 8*UMAC_DATA_SIZE; \
66 __umac128_y[1] += 8*UMAC_DATA_SIZE; \
67 __umac128_y[2] += 8*UMAC_DATA_SIZE; \
68 __umac128_y[3] += 8*UMAC_DATA_SIZE; \
69 _umac_l2 (ctx->l2_key, ctx->l2_state, 4, ctx->count++, __umac128_y); \
70 } while (0)
72 void
73 umac128_update (struct umac128_ctx *ctx,
74 unsigned length, const uint8_t *data)
76 MD_UPDATE (ctx, length, data, UMAC128_BLOCK, (void)0);
80 void
81 umac128_digest (struct umac128_ctx *ctx,
82 unsigned length, uint8_t *digest)
84 uint32_t tag[4];
85 unsigned i;
87 assert (length > 0);
88 assert (length <= 16);
90 if (ctx->index > 0 || ctx->count == 0)
92 /* Zero pad to multiple of 32 */
93 uint64_t y[4];
94 unsigned pad = (ctx->index > 0) ? 31 & - ctx->index : 32;
95 memset (ctx->block + ctx->index, 0, pad);
97 _umac_nh_n (y, 4, ctx->l1_key, ctx->index + pad, ctx->block);
98 y[0] += 8 * ctx->index;
99 y[1] += 8 * ctx->index;
100 y[2] += 8 * ctx->index;
101 y[3] += 8 * ctx->index;
102 _umac_l2 (ctx->l2_key, ctx->l2_state, 4, ctx->count++, y);
104 assert (ctx->count > 0);
106 aes_encrypt (&ctx->pdf_key, AES_BLOCK_SIZE,
107 (uint8_t *) tag, ctx->nonce);
109 INCREMENT (ctx->nonce_length, ctx->nonce);
111 _umac_l2_final (ctx->l2_key, ctx->l2_state, 4, ctx->count);
112 for (i = 0; i < 4; i++)
113 tag[i] ^= ctx->l3_key2[i] ^ _umac_l3 (ctx->l3_key1 + 8*i,
114 ctx->l2_state + 2*i);
116 memcpy (digest, tag, length);
118 /* Reinitialize */
119 ctx->count = ctx->index = 0;