Correct PPTP server firewall rules chain.
[tomato/davidwu.git] / release / src / router / nettle / umac64.c
blob3e05779ac3c51026854701eaafa4885a944092f3
1 /* umac64.c
2 */
4 /* nettle, low-level cryptographics library
6 * Copyright (C) 2013 Niels Möller
8 * The nettle library is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU Lesser General Public License as published by
10 * the Free Software Foundation; either version 2.1 of the License, or (at your
11 * option) any later version.
13 * The nettle library is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
15 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
16 * License for more details.
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with the nettle library; see the file COPYING.LIB. If not, write to
20 * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
21 * MA 02111-1301, USA.
24 #if HAVE_CONFIG_H
25 # include "config.h"
26 #endif
28 #include <assert.h>
29 #include <string.h>
31 #include "umac.h"
33 #include "macros.h"
35 void
36 umac64_set_key (struct umac64_ctx *ctx, const uint8_t *key)
38 _umac_set_key (ctx->l1_key, ctx->l2_key, ctx->l3_key1, ctx->l3_key2,
39 &ctx->pdf_key, key, 2);
41 /* Clear nonce */
42 memset (ctx->nonce, 0, sizeof(ctx->nonce));
43 ctx->nonce_low = 0;
44 ctx->nonce_length = sizeof(ctx->nonce);
46 /* Initialize buffer */
47 ctx->count = ctx->index = 0;
50 void
51 umac64_set_nonce (struct umac64_ctx *ctx,
52 unsigned nonce_length, const uint8_t *nonce)
54 assert (nonce_length > 0);
55 assert (nonce_length <= AES_BLOCK_SIZE);
57 memcpy (ctx->nonce, nonce, nonce_length);
58 memset (ctx->nonce + nonce_length, 0, AES_BLOCK_SIZE - nonce_length);
60 ctx->nonce_low = ctx->nonce[nonce_length - 1] & 1;
61 ctx->nonce[nonce_length - 1] &= ~1;
62 ctx->nonce_length = nonce_length;
65 #define UMAC64_BLOCK(ctx, block) do { \
66 uint64_t __umac64_y[2]; \
67 _umac_nh_n (__umac64_y, 2, ctx->l1_key, UMAC_DATA_SIZE, block); \
68 __umac64_y[0] += 8*UMAC_DATA_SIZE; \
69 __umac64_y[1] += 8*UMAC_DATA_SIZE; \
70 _umac_l2 (ctx->l2_key, ctx->l2_state, 2, ctx->count++, __umac64_y); \
71 } while (0)
73 void
74 umac64_update (struct umac64_ctx *ctx,
75 unsigned length, const uint8_t *data)
77 MD_UPDATE (ctx, length, data, UMAC64_BLOCK, (void)0);
81 void
82 umac64_digest (struct umac64_ctx *ctx,
83 unsigned length, uint8_t *digest)
85 uint32_t tag[2];
86 uint32_t *pad;
88 assert (length > 0);
89 assert (length <= 8);
91 if (ctx->index > 0 || ctx->count == 0)
93 /* Zero pad to multiple of 32 */
94 uint64_t y[2];
95 unsigned pad = (ctx->index > 0) ? 31 & - ctx->index : 32;
96 memset (ctx->block + ctx->index, 0, pad);
98 _umac_nh_n (y, 2, ctx->l1_key, ctx->index + pad, ctx->block);
99 y[0] += 8 * ctx->index;
100 y[1] += 8 * ctx->index;
101 _umac_l2 (ctx->l2_key, ctx->l2_state, 2, ctx->count++, y);
103 assert (ctx->count > 0);
104 if ( !(ctx->nonce_low & _UMAC_NONCE_CACHED))
106 aes_encrypt (&ctx->pdf_key, AES_BLOCK_SIZE,
107 (uint8_t *) ctx->pad_cache, ctx->nonce);
108 ctx->nonce_low |= _UMAC_NONCE_CACHED;
110 pad = ctx->pad_cache + 2*(ctx->nonce_low & 1);
112 /* Increment nonce */
113 ctx->nonce_low++;
114 if ( !(ctx->nonce_low & 1))
116 unsigned i = ctx->nonce_length - 1;
118 ctx->nonce_low = 0;
119 ctx->nonce[i] += 2;
121 if (ctx->nonce[i] == 0 && i > 0)
122 INCREMENT (i, ctx->nonce);
125 _umac_l2_final (ctx->l2_key, ctx->l2_state, 2, ctx->count);
126 tag[0] = pad[0] ^ ctx->l3_key2[0] ^ _umac_l3 (ctx->l3_key1,
127 ctx->l2_state);
128 tag[1] = pad[1] ^ ctx->l3_key2[1] ^ _umac_l3 (ctx->l3_key1 + 8,
129 ctx->l2_state + 2);
130 memcpy (digest, tag, length);
132 /* Reinitialize */
133 ctx->count = ctx->index = 0;