Select Git revision
nettle-openssl.c
Forked from
Nettle / nettle
Source project has a limited visibility.
nettle-openssl.c 7.86 KiB
/* nettle-openssl.c
*
* Glue that's used only by the benchmark, and subject to change.
*/
/* nettle, low-level cryptographics library
*
* Copyright (C) 2002 Niels Mller
*
* The nettle library is free software; you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation; either version 2.1 of the License, or (at your
* option) any later version.
*
* The nettle library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
* License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with the nettle library; see the file COPYING.LIB. If not, write to
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
* MA 02111-1307, USA.
*/
#if HAVE_CONFIG_H
# include "config.h"
#endif
/* Openssl glue, for comparative benchmarking only */
#if WITH_OPENSSL
/* No ancient ssleay compatibility */
#define NCOMPAT
#define OPENSSL_DISABLE_OLD_DES_SUPPORT
#include <assert.h>
#include <openssl/aes.h>
#include <openssl/blowfish.h>
#include <openssl/des.h>
#include <openssl/cast.h>
#include <openssl/rc4.h>
#include <openssl/md5.h>
#include <openssl/sha.h>
#include "nettle-internal.h"
/* AES */
static void
openssl_aes_set_encrypt_key(void *ctx, unsigned length, const uint8_t *key)
{
AES_set_encrypt_key(key, length * 8, ctx);
}
static void
openssl_aes_set_decrypt_key(void *ctx, unsigned length, const uint8_t *key)
{
AES_set_decrypt_key(key, length * 8, ctx);
}
static void
openssl_aes_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % AES_BLOCK_SIZE));
while (length)
{
AES_ecb_encrypt(src, dst, ctx, AES_ENCRYPT);
length -= AES_BLOCK_SIZE;
dst += AES_BLOCK_SIZE;
src += AES_BLOCK_SIZE;
}
}
static void
openssl_aes_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % AES_BLOCK_SIZE));
while (length)
{
AES_ecb_encrypt(src, dst, ctx, AES_DECRYPT);
length -= AES_BLOCK_SIZE;
dst += AES_BLOCK_SIZE;
src += AES_BLOCK_SIZE;
}
}
const struct nettle_cipher
nettle_openssl_aes128 = {
"openssl aes128", sizeof(AES_KEY),
16, 16,
openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
openssl_aes_encrypt, openssl_aes_decrypt
};
const struct nettle_cipher
nettle_openssl_aes192 = {
"openssl aes192", sizeof(AES_KEY),
/* Claim no block size, so that the benchmark doesn't try CBC mode
* (as openssl cipher + nettle cbc is somewhat pointless to
* benchmark). */
16, 24,
openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
openssl_aes_encrypt, openssl_aes_decrypt
};
const struct nettle_cipher
nettle_openssl_aes256 = {
"openssl aes256", sizeof(AES_KEY),
/* Claim no block size, so that the benchmark doesn't try CBC mode
* (as openssl cipher + nettle cbc is somewhat pointless to
* benchmark). */
16, 32,
openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
openssl_aes_encrypt, openssl_aes_decrypt
};
/* Arcfour */
static void
openssl_arcfour_set_key(void *ctx, unsigned length, const uint8_t *key)
{
RC4_set_key(ctx, length, key);
}
static void
openssl_arcfour_crypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
RC4(ctx, length, src, dst);
}
const struct nettle_cipher
nettle_openssl_arcfour128 = {
"openssl arcfour128", sizeof(RC4_KEY),
0, 16,
openssl_arcfour_set_key, openssl_arcfour_set_key,
openssl_arcfour_crypt, openssl_arcfour_crypt
};
/* Blowfish */
static void
openssl_bf_set_key(void *ctx, unsigned length, const uint8_t *key)
{
BF_set_key(ctx, length, key);
}
static void
openssl_bf_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % BF_BLOCK));
while (length)
{
BF_ecb_encrypt(src, dst, ctx, BF_ENCRYPT);
length -= BF_BLOCK;
dst += BF_BLOCK;
src += BF_BLOCK;
}
}
static void
openssl_bf_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % BF_BLOCK));
while (length)
{
BF_ecb_encrypt(src, dst, ctx, BF_DECRYPT);
length -= BF_BLOCK;
dst += BF_BLOCK;
src += BF_BLOCK;
}
}
const struct nettle_cipher
nettle_openssl_blowfish128 = {
"openssl bf128", sizeof(BF_KEY),
8, 16,
openssl_bf_set_key, openssl_bf_set_key,
openssl_bf_encrypt, openssl_bf_decrypt
};
/* DES */
static void
openssl_des_set_key(void *ctx, unsigned length, const uint8_t *key)
{
assert(length == 8);
/* Not sure what "unchecked" means. We want to ignore parity bits,
but it would still make sense to check for weak keys. */
/* Explicit cast used as I don't want to care about openssl's broken
array typedefs DES_cblock and const_DES_cblock. */
DES_set_key_unchecked( (void *) key, ctx);
}
#define DES_BLOCK_SIZE 8
static void
openssl_des_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % DES_BLOCK_SIZE));
while (length)
{
DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_ENCRYPT);
length -= DES_BLOCK_SIZE;
dst += DES_BLOCK_SIZE;
src += DES_BLOCK_SIZE;
}
}
static void
openssl_des_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % DES_BLOCK_SIZE));
while (length)
{
DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_DECRYPT);
length -= DES_BLOCK_SIZE;
dst += DES_BLOCK_SIZE;
src += DES_BLOCK_SIZE;
}
}
const struct nettle_cipher
nettle_openssl_des = {
"openssl des", sizeof(DES_key_schedule),
8, 8,
openssl_des_set_key, openssl_des_set_key,
openssl_des_encrypt, openssl_des_decrypt
};
/* Cast128 */
static void
openssl_cast_set_key(void *ctx, unsigned length, const uint8_t *key)
{
CAST_set_key(ctx, length, key);
}
static void
openssl_cast_encrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % CAST_BLOCK));
while (length)
{
CAST_ecb_encrypt(src, dst, ctx, CAST_ENCRYPT);
length -= CAST_BLOCK;
dst += CAST_BLOCK;
src += CAST_BLOCK;
}
}
static void
openssl_cast_decrypt(void *ctx, unsigned length,
uint8_t *dst, const uint8_t *src)
{
assert (!(length % CAST_BLOCK));
while (length)
{
CAST_ecb_encrypt(src, dst, ctx, CAST_DECRYPT);
length -= CAST_BLOCK;
dst += CAST_BLOCK;
src += CAST_BLOCK;
}
}
const struct nettle_cipher
nettle_openssl_cast128 = {
"openssl cast128", sizeof(CAST_KEY),
8, CAST_KEY_LENGTH,
openssl_cast_set_key, openssl_cast_set_key,
openssl_cast_encrypt, openssl_cast_decrypt
};
/* Hash functions */
/* md5 */
static void
openssl_md5_init(void *ctx)
{
MD5_Init(ctx);
}
static void
openssl_md5_update(void *ctx,
unsigned length,
const uint8_t *src)
{
MD5_Update(ctx, src, length);
}
static void
openssl_md5_digest(void *ctx,
unsigned length, uint8_t *dst)
{
assert(length == SHA_DIGEST_LENGTH);
MD5_Final(dst, ctx);
MD5_Init(ctx);
}
const struct nettle_hash
nettle_openssl_md5 = {
"openssl md5", sizeof(SHA_CTX),
SHA_DIGEST_LENGTH, SHA_CBLOCK,
openssl_md5_init,
openssl_md5_update,
openssl_md5_digest
};
/* sha1 */
static void
openssl_sha1_init(void *ctx)
{
SHA1_Init(ctx);
}
static void
openssl_sha1_update(void *ctx,
unsigned length,
const uint8_t *src)
{
SHA1_Update(ctx, src, length);
}
static void
openssl_sha1_digest(void *ctx,
unsigned length, uint8_t *dst)
{
assert(length == SHA_DIGEST_LENGTH);
SHA1_Final(dst, ctx);
SHA1_Init(ctx);
}
const struct nettle_hash
nettle_openssl_sha1 = {
"openssl sha1", sizeof(SHA_CTX),
SHA_DIGEST_LENGTH, SHA_CBLOCK,
openssl_sha1_init,
openssl_sha1_update,
openssl_sha1_digest
};
#endif /* WITH_OPENSSL */