nettle-openssl.c 8.83 KB
Newer Older
Niels Möller's avatar
Niels Möller committed
1 2 3 4 5 6 7
/* nettle-openssl.c
 *
 * Glue that's used only by the benchmark, and subject to change.
 */

/* nettle, low-level cryptographics library
 *
Niels Möller's avatar
Niels Möller committed
8
 * Copyright (C) 2002 Niels Möller
Niels Möller's avatar
Niels Möller committed
9 10 11 12 13 14 15 16 17 18 19 20 21
 *  
 * The nettle library is free software; you can redistribute it and/or modify
 * it under the terms of the GNU Lesser General Public License as published by
 * the Free Software Foundation; either version 2.1 of the License, or (at your
 * option) any later version.
 * 
 * The nettle library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
 * License for more details.
 * 
 * You should have received a copy of the GNU Lesser General Public License
 * along with the nettle library; see the file COPYING.LIB.  If not, write to
22 23
 * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
 * MA 02111-1301, USA.
Niels Möller's avatar
Niels Möller committed
24 25 26 27
 */

#if HAVE_CONFIG_H
# include "config.h"
28
#endif
Niels Möller's avatar
Niels Möller committed
29 30 31

/* Openssl glue, for comparative benchmarking only */

32
#if WITH_OPENSSL
Niels Möller's avatar
Niels Möller committed
33

34 35
/* No ancient ssleay compatibility */
#define NCOMPAT
36
#define OPENSSL_DISABLE_OLD_DES_SUPPORT
37

38
#include <assert.h>
Niels Möller's avatar
Niels Möller committed
39

40
#include <openssl/aes.h>
Niels Möller's avatar
Niels Möller committed
41 42 43
#include <openssl/blowfish.h>
#include <openssl/des.h>
#include <openssl/cast.h>
44
#include <openssl/rc4.h>
Niels Möller's avatar
Niels Möller committed
45

46 47 48
#include <openssl/md5.h>
#include <openssl/sha.h>

49
#include "nettle-internal.h"
Niels Möller's avatar
Niels Möller committed
50 51


52
/* AES */
53
static nettle_set_key_func openssl_aes_set_encrypt_key;
54
static void
55
openssl_aes_set_encrypt_key(void *ctx, size_t length, const uint8_t *key)
56 57 58 59
{
  AES_set_encrypt_key(key, length * 8, ctx);
}

60
static nettle_set_key_func openssl_aes_set_decrypt_key;
61
static void
62
openssl_aes_set_decrypt_key(void *ctx, size_t length, const uint8_t *key)
63 64 65 66
{
  AES_set_decrypt_key(key, length * 8, ctx);
}

67
static nettle_crypt_func openssl_aes_encrypt;
68
static void
69
openssl_aes_encrypt(void *ctx, size_t length,
70 71 72 73 74 75 76 77 78 79 80 81
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % AES_BLOCK_SIZE));
  while (length)
    {
      AES_ecb_encrypt(src, dst, ctx, AES_ENCRYPT);
      length -= AES_BLOCK_SIZE;
      dst += AES_BLOCK_SIZE;
      src += AES_BLOCK_SIZE;
    }
}

82
static nettle_crypt_func openssl_aes_decrypt;
83
static void
84
openssl_aes_decrypt(void *ctx, size_t length,
85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % AES_BLOCK_SIZE));
  while (length)
    {
      AES_ecb_encrypt(src, dst, ctx, AES_DECRYPT);
      length -= AES_BLOCK_SIZE;
      dst += AES_BLOCK_SIZE;
      src += AES_BLOCK_SIZE;
    }
}

const struct nettle_cipher
nettle_openssl_aes128 = {
  "openssl aes128", sizeof(AES_KEY),
100
  16, 16,
101 102 103 104 105 106 107 108 109 110
  openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
  openssl_aes_encrypt, openssl_aes_decrypt
};

const struct nettle_cipher
nettle_openssl_aes192 = {
  "openssl aes192", sizeof(AES_KEY),
  /* Claim no block size, so that the benchmark doesn't try CBC mode
   * (as openssl cipher + nettle cbc is somewhat pointless to
   * benchmark). */
111
  16, 24,
112 113 114 115 116 117 118 119 120 121
  openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
  openssl_aes_encrypt, openssl_aes_decrypt
};

const struct nettle_cipher
nettle_openssl_aes256 = {
  "openssl aes256", sizeof(AES_KEY),
  /* Claim no block size, so that the benchmark doesn't try CBC mode
   * (as openssl cipher + nettle cbc is somewhat pointless to
   * benchmark). */
122
  16, 32,
123 124 125 126 127
  openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key,
  openssl_aes_encrypt, openssl_aes_decrypt
};

/* Arcfour */
128
static nettle_set_key_func openssl_arcfour_set_key;
129
static void
130
openssl_arcfour_set_key(void *ctx, size_t length, const uint8_t *key)
131 132 133 134
{
  RC4_set_key(ctx, length, key);
}

135
static nettle_crypt_func openssl_arcfour_crypt;
136
static void
137
openssl_arcfour_crypt(void *ctx, size_t length,
138 139 140 141 142 143 144 145 146 147 148 149 150
		      uint8_t *dst, const uint8_t *src)
{
  RC4(ctx, length, src, dst);
}

const struct nettle_cipher
nettle_openssl_arcfour128 = {
  "openssl arcfour128", sizeof(RC4_KEY),
  0, 16,
  openssl_arcfour_set_key, openssl_arcfour_set_key,
  openssl_arcfour_crypt, openssl_arcfour_crypt
};

Niels Möller's avatar
Niels Möller committed
151
/* Blowfish */
152
static nettle_set_key_func openssl_bf_set_key;
Niels Möller's avatar
Niels Möller committed
153
static void
154
openssl_bf_set_key(void *ctx, size_t length, const uint8_t *key)
Niels Möller's avatar
Niels Möller committed
155 156 157 158
{
  BF_set_key(ctx, length, key);
}

159
static nettle_crypt_func openssl_bf_encrypt;
Niels Möller's avatar
Niels Möller committed
160
static void
161
openssl_bf_encrypt(void *ctx, size_t length,
Niels Möller's avatar
Niels Möller committed
162 163 164 165 166 167 168 169 170 171 172 173
		   uint8_t *dst, const uint8_t *src)
{
  assert (!(length % BF_BLOCK));
  while (length)
    {
      BF_ecb_encrypt(src, dst, ctx, BF_ENCRYPT);
      length -= BF_BLOCK;
      dst += BF_BLOCK;
      src += BF_BLOCK;
    }
}

174
static nettle_crypt_func openssl_bf_decrypt;
Niels Möller's avatar
Niels Möller committed
175
static void
176
openssl_bf_decrypt(void *ctx, size_t length,
Niels Möller's avatar
Niels Möller committed
177 178 179 180 181 182 183 184 185 186 187 188 189 190 191
		   uint8_t *dst, const uint8_t *src)
{
  assert (!(length % BF_BLOCK));
  while (length)
    {
      BF_ecb_encrypt(src, dst, ctx, BF_DECRYPT);
      length -= BF_BLOCK;
      dst += BF_BLOCK;
      src += BF_BLOCK;
    }
}

const struct nettle_cipher
nettle_openssl_blowfish128 = {
  "openssl bf128", sizeof(BF_KEY),
192
  8, 16,
Niels Möller's avatar
Niels Möller committed
193 194 195 196 197 198
  openssl_bf_set_key, openssl_bf_set_key,
  openssl_bf_encrypt, openssl_bf_decrypt
};


/* DES */
199
static nettle_set_key_func openssl_des_set_key;
Niels Möller's avatar
Niels Möller committed
200
static void
201
openssl_des_set_key(void *ctx, size_t length, const uint8_t *key)
Niels Möller's avatar
Niels Möller committed
202
{
203 204 205
  assert(length == 8);  
  /* Not sure what "unchecked" means. We want to ignore parity bits,
     but it would still make sense to check for weak keys. */
Niels Möller's avatar
Niels Möller committed
206
  /* Explicit cast used as I don't want to care about openssl's broken
207 208
     array typedefs DES_cblock and const_DES_cblock. */
  DES_set_key_unchecked( (void *) key, ctx);
Niels Möller's avatar
Niels Möller committed
209 210 211 212
}

#define DES_BLOCK_SIZE 8

213
static nettle_crypt_func openssl_des_encrypt;
Niels Möller's avatar
Niels Möller committed
214
static void
215
openssl_des_encrypt(void *ctx, size_t length,
Niels Möller's avatar
Niels Möller committed
216 217 218 219 220
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % DES_BLOCK_SIZE));
  while (length)
    {
221
      DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_ENCRYPT);
Niels Möller's avatar
Niels Möller committed
222 223 224 225 226 227
      length -= DES_BLOCK_SIZE;
      dst += DES_BLOCK_SIZE;
      src += DES_BLOCK_SIZE;
    }
}

228
static nettle_crypt_func openssl_des_decrypt;
Niels Möller's avatar
Niels Möller committed
229
static void
230
openssl_des_decrypt(void *ctx, size_t length,
Niels Möller's avatar
Niels Möller committed
231 232 233 234 235
		    uint8_t *dst, const uint8_t *src)
{
  assert (!(length % DES_BLOCK_SIZE));
  while (length)
    {
236
      DES_ecb_encrypt((void *) src, (void *) dst, ctx, DES_DECRYPT);
Niels Möller's avatar
Niels Möller committed
237 238 239 240 241 242 243 244
      length -= DES_BLOCK_SIZE;
      dst += DES_BLOCK_SIZE;
      src += DES_BLOCK_SIZE;
    }
}

const struct nettle_cipher
nettle_openssl_des = {
245
  "openssl des", sizeof(DES_key_schedule),
246
  8, 8,
Niels Möller's avatar
Niels Möller committed
247 248 249 250 251 252
  openssl_des_set_key, openssl_des_set_key,
  openssl_des_encrypt, openssl_des_decrypt
};


/* Cast128 */
253
static nettle_set_key_func openssl_cast_set_key;
Niels Möller's avatar
Niels Möller committed
254
static void
255
openssl_cast_set_key(void *ctx, size_t length, const uint8_t *key)
Niels Möller's avatar
Niels Möller committed
256 257 258 259
{
  CAST_set_key(ctx, length, key);
}

260
static nettle_crypt_func openssl_cast_encrypt;
Niels Möller's avatar
Niels Möller committed
261
static void
262
openssl_cast_encrypt(void *ctx, size_t length,
Niels Möller's avatar
Niels Möller committed
263 264 265 266 267 268 269 270 271 272 273 274
		     uint8_t *dst, const uint8_t *src)
{
  assert (!(length % CAST_BLOCK));
  while (length)
    {
      CAST_ecb_encrypt(src, dst, ctx, CAST_ENCRYPT);
      length -= CAST_BLOCK;
      dst += CAST_BLOCK;
      src += CAST_BLOCK;
    }
}

275
static nettle_crypt_func openssl_cast_decrypt;
Niels Möller's avatar
Niels Möller committed
276
static void
277
openssl_cast_decrypt(void *ctx, size_t length,
Niels Möller's avatar
Niels Möller committed
278 279 280 281 282 283 284 285 286 287 288 289 290 291 292
		     uint8_t *dst, const uint8_t *src)
{
  assert (!(length % CAST_BLOCK));
  while (length)
    {
      CAST_ecb_encrypt(src, dst, ctx, CAST_DECRYPT);
      length -= CAST_BLOCK;
      dst += CAST_BLOCK;
      src += CAST_BLOCK;
    }
}

const struct nettle_cipher
nettle_openssl_cast128 = {
  "openssl cast128", sizeof(CAST_KEY),
293
  8, CAST_KEY_LENGTH,
Niels Möller's avatar
Niels Möller committed
294 295 296 297
  openssl_cast_set_key, openssl_cast_set_key,
  openssl_cast_encrypt, openssl_cast_decrypt
};

298 299 300
/* Hash functions */

/* md5 */
301
static nettle_hash_init_func openssl_md5_init;
302 303 304 305 306 307
static void
openssl_md5_init(void *ctx)
{
  MD5_Init(ctx);
}

308
static nettle_hash_update_func openssl_md5_update;
309 310 311 312 313 314 315 316
static void
openssl_md5_update(void *ctx,
		    unsigned length,
		    const uint8_t *src)
{
  MD5_Update(ctx, src, length);
}

317
static nettle_hash_digest_func openssl_md5_digest;
318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336
static void
openssl_md5_digest(void *ctx,
		    unsigned length, uint8_t *dst)
{
  assert(length == SHA_DIGEST_LENGTH);
  MD5_Final(dst, ctx);
  MD5_Init(ctx);
}

const struct nettle_hash
nettle_openssl_md5 = {
  "openssl md5", sizeof(SHA_CTX),
  SHA_DIGEST_LENGTH, SHA_CBLOCK,
  openssl_md5_init,
  openssl_md5_update,
  openssl_md5_digest
};

/* sha1 */
337
static nettle_hash_init_func openssl_sha1_init;
338 339 340 341 342 343
static void
openssl_sha1_init(void *ctx)
{
  SHA1_Init(ctx);
}

344
static nettle_hash_update_func openssl_sha1_update;
345 346 347 348 349 350 351 352
static void
openssl_sha1_update(void *ctx,
		    unsigned length,
		    const uint8_t *src)
{
  SHA1_Update(ctx, src, length);
}

353
static nettle_hash_digest_func openssl_sha1_digest;
354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371
static void
openssl_sha1_digest(void *ctx,
		    unsigned length, uint8_t *dst)
{
  assert(length == SHA_DIGEST_LENGTH);
  SHA1_Final(dst, ctx);
  SHA1_Init(ctx);
}

const struct nettle_hash
nettle_openssl_sha1 = {
  "openssl sha1", sizeof(SHA_CTX),
  SHA_DIGEST_LENGTH, SHA_CBLOCK,
  openssl_sha1_init,
  openssl_sha1_update,
  openssl_sha1_digest
};
  
372
#endif /* WITH_OPENSSL */