nettle-internal.c 3.05 KB
Newer Older
Niels Möller's avatar
Niels Möller committed
1 2 3 4 5 6 7 8
/* nettle-internal.c
 *
 * Things that are used only by the testsuite and benchmark, and
 * subject to change.
 */

/* nettle, low-level cryptographics library
 *
Niels Möller's avatar
Niels Möller committed
9
 * Copyright (C) 2002 Niels Möller
Niels Möller's avatar
Niels Möller committed
10 11 12 13 14 15 16 17 18 19 20 21 22
 *  
 * The nettle library is free software; you can redistribute it and/or modify
 * it under the terms of the GNU Lesser General Public License as published by
 * the Free Software Foundation; either version 2.1 of the License, or (at your
 * option) any later version.
 * 
 * The nettle library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
 * License for more details.
 * 
 * You should have received a copy of the GNU Lesser General Public License
 * along with the nettle library; see the file COPYING.LIB.  If not, write to
23 24
 * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
 * MA 02111-1301, USA.
Niels Möller's avatar
Niels Möller committed
25 26
 */

27
#if HAVE_CONFIG_H
28
# include "config.h"
29
#endif
Niels Möller's avatar
Niels Möller committed
30 31 32 33

#include <assert.h>
#include <stdlib.h>

34 35
#include "nettle-internal.h"
#include "blowfish.h"
36 37
#include "des.h"
#include "gcm.h"
38
#include "salsa20.h"
39

40
/* DES uses a different signature for the key set function. We ignore
41
   the return value indicating weak keys. */
Niels Möller's avatar
Niels Möller committed
42
static void
43
des_set_key_hack(void *ctx, unsigned length, const uint8_t *key)
Niels Möller's avatar
Niels Möller committed
44 45
{
  assert(length == DES_KEY_SIZE);
46
  des_set_key(ctx, key);
Niels Möller's avatar
Niels Möller committed
47 48 49
}

static void
50
des3_set_key_hack(void *ctx, unsigned length, const uint8_t *key)
Niels Möller's avatar
Niels Möller committed
51 52
{
  assert(length == DES3_KEY_SIZE);
53
  des3_set_key(ctx, key);
Niels Möller's avatar
Niels Möller committed
54 55
}

56 57
/* NOTE: A bit ugly. Ignores weak keys, and pretends the set:key
   functions have no return value. */
Niels Möller's avatar
Niels Möller committed
58 59 60 61 62
const struct nettle_cipher
nettle_des = {
  "des", sizeof(struct des_ctx),
  DES_BLOCK_SIZE, DES_KEY_SIZE,
  des_set_key_hack, des_set_key_hack,
63 64
  (nettle_crypt_func *) des_encrypt,
  (nettle_crypt_func *) des_decrypt
Niels Möller's avatar
Niels Möller committed
65 66 67 68 69 70 71
};

const struct nettle_cipher
nettle_des3 = {
 "des3", sizeof(struct des3_ctx),
 DES3_BLOCK_SIZE, DES3_KEY_SIZE,
 des3_set_key_hack, des3_set_key_hack,
72 73
 (nettle_crypt_func *) des3_encrypt,
 (nettle_crypt_func *) des3_decrypt
Niels Möller's avatar
Niels Möller committed
74 75
};

76 77
/* NOTE: This is not as nice as one might think, as we pretend
   blowfish_set_key has no return value. */
Niels Möller's avatar
Niels Möller committed
78
const struct nettle_cipher
79
nettle_blowfish128 = _NETTLE_CIPHER(blowfish, BLOWFISH, 128);
80

81 82 83 84 85 86
/* Sets a fix zero iv. For benchmarking only. */
static void
salsa20_set_key_hack(void *ctx, unsigned length, const uint8_t *key)
{
  static const uint8_t iv[SALSA20_IV_SIZE];
  salsa20_set_key (ctx, length, key);
87
  salsa20_set_iv (ctx, iv);
88 89 90 91 92 93 94 95 96 97 98 99
}

/* Claim zero block size, to classify as a stream cipher. */
const struct nettle_cipher
nettle_salsa20 = {
  "salsa20", sizeof(struct salsa20_ctx),
  0, SALSA20_KEY_SIZE,
  salsa20_set_key_hack, salsa20_set_key_hack,
  (nettle_crypt_func *) salsa20_crypt,
  (nettle_crypt_func *) salsa20_crypt
};

100 101 102 103 104 105
const struct nettle_aead
nettle_gcm_aes128 = _NETTLE_AEAD(gcm, GCM, aes, 128);
const struct nettle_aead
nettle_gcm_aes192 = _NETTLE_AEAD(gcm, GCM, aes, 192);
const struct nettle_aead
nettle_gcm_aes256 = _NETTLE_AEAD(gcm, GCM, aes, 256);