1238384Sjkim/* ====================================================================
2238384Sjkim * Copyright (c) 2008 The OpenSSL Project.  All rights reserved.
3238384Sjkim *
4238384Sjkim * Redistribution and use in source and binary forms, with or without
5238384Sjkim * modification, are permitted provided that the following conditions
6238384Sjkim * are met:
7238384Sjkim *
8238384Sjkim * 1. Redistributions of source code must retain the above copyright
9280304Sjkim *    notice, this list of conditions and the following disclaimer.
10238384Sjkim *
11238384Sjkim * 2. Redistributions in binary form must reproduce the above copyright
12238384Sjkim *    notice, this list of conditions and the following disclaimer in
13238384Sjkim *    the documentation and/or other materials provided with the
14238384Sjkim *    distribution.
15238384Sjkim *
16238384Sjkim * 3. All advertising materials mentioning features or use of this
17238384Sjkim *    software must display the following acknowledgment:
18238384Sjkim *    "This product includes software developed by the OpenSSL Project
19238384Sjkim *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
20238384Sjkim *
21238384Sjkim * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
22238384Sjkim *    endorse or promote products derived from this software without
23238384Sjkim *    prior written permission. For written permission, please contact
24238384Sjkim *    openssl-core@openssl.org.
25238384Sjkim *
26238384Sjkim * 5. Products derived from this software may not be called "OpenSSL"
27238384Sjkim *    nor may "OpenSSL" appear in their names without prior written
28238384Sjkim *    permission of the OpenSSL Project.
29238384Sjkim *
30238384Sjkim * 6. Redistributions of any form whatsoever must retain the following
31238384Sjkim *    acknowledgment:
32238384Sjkim *    "This product includes software developed by the OpenSSL Project
33238384Sjkim *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
34238384Sjkim *
35238384Sjkim * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
36238384Sjkim * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
37238384Sjkim * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
38238384Sjkim * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
39238384Sjkim * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
40238384Sjkim * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
41238384Sjkim * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
42238384Sjkim * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
43238384Sjkim * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
44238384Sjkim * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
45238384Sjkim * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
46238384Sjkim * OF THE POSSIBILITY OF SUCH DAMAGE.
47238384Sjkim * ====================================================================
48238384Sjkim *
49238384Sjkim */
50238384Sjkim
51238384Sjkim#include <openssl/crypto.h>
52238384Sjkim#include "modes_lcl.h"
53238384Sjkim#include <string.h>
54238384Sjkim
55238384Sjkim#ifndef MODES_DEBUG
56238384Sjkim# ifndef NDEBUG
57238384Sjkim#  define NDEBUG
58238384Sjkim# endif
59238384Sjkim#endif
60238384Sjkim#include <assert.h>
61238384Sjkim
62280304Sjkim/*
63280304Sjkim * NOTE: the IV/counter CTR mode is big-endian.  The code itself is
64280304Sjkim * endian-neutral.
65280304Sjkim */
66238384Sjkim
67238384Sjkim/* increment counter (128-bit int) by 1 */
68280304Sjkimstatic void ctr128_inc(unsigned char *counter)
69280304Sjkim{
70296317Sdelphij    u32 n = 16, c = 1;
71238384Sjkim
72280304Sjkim    do {
73280304Sjkim        --n;
74296317Sdelphij        c += counter[n];
75296317Sdelphij        counter[n] = (u8)c;
76296317Sdelphij        c >>= 8;
77280304Sjkim    } while (n);
78238384Sjkim}
79238384Sjkim
80238384Sjkim#if !defined(OPENSSL_SMALL_FOOTPRINT)
81280304Sjkimstatic void ctr128_inc_aligned(unsigned char *counter)
82280304Sjkim{
83296317Sdelphij    size_t *data, c, d, n;
84280304Sjkim    const union {
85280304Sjkim        long one;
86280304Sjkim        char little;
87280304Sjkim    } is_endian = {
88280304Sjkim        1
89280304Sjkim    };
90238384Sjkim
91296317Sdelphij    if (is_endian.little || ((size_t)counter % sizeof(size_t)) != 0) {
92280304Sjkim        ctr128_inc(counter);
93280304Sjkim        return;
94280304Sjkim    }
95238384Sjkim
96280304Sjkim    data = (size_t *)counter;
97296317Sdelphij    c = 1;
98280304Sjkim    n = 16 / sizeof(size_t);
99280304Sjkim    do {
100280304Sjkim        --n;
101296317Sdelphij        d = data[n] += c;
102296317Sdelphij        /* did addition carry? */
103296317Sdelphij        c = ((d - c) ^ d) >> (sizeof(size_t) * 8 - 1);
104280304Sjkim    } while (n);
105238384Sjkim}
106238384Sjkim#endif
107238384Sjkim
108280304Sjkim/*
109280304Sjkim * The input encrypted as though 128bit counter mode is being used.  The
110280304Sjkim * extra state information to record how much of the 128bit block we have
111280304Sjkim * used is contained in *num, and the encrypted counter is kept in
112280304Sjkim * ecount_buf.  Both *num and ecount_buf must be initialised with zeros
113280304Sjkim * before the first call to CRYPTO_ctr128_encrypt(). This algorithm assumes
114280304Sjkim * that the counter is in the x lower bits of the IV (ivec), and that the
115280304Sjkim * application has full control over overflow and the rest of the IV.  This
116280304Sjkim * implementation takes NO responsability for checking that the counter
117280304Sjkim * doesn't overflow into the rest of the IV when incremented.
118238384Sjkim */
119238384Sjkimvoid CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
120280304Sjkim                           size_t len, const void *key,
121280304Sjkim                           unsigned char ivec[16],
122280304Sjkim                           unsigned char ecount_buf[16], unsigned int *num,
123280304Sjkim                           block128_f block)
124238384Sjkim{
125280304Sjkim    unsigned int n;
126280304Sjkim    size_t l = 0;
127238384Sjkim
128280304Sjkim    assert(in && out && key && ecount_buf && num);
129280304Sjkim    assert(*num < 16);
130238384Sjkim
131280304Sjkim    n = *num;
132238384Sjkim
133238384Sjkim#if !defined(OPENSSL_SMALL_FOOTPRINT)
134280304Sjkim    if (16 % sizeof(size_t) == 0) { /* always true actually */
135280304Sjkim        do {
136280304Sjkim            while (n && len) {
137280304Sjkim                *(out++) = *(in++) ^ ecount_buf[n];
138280304Sjkim                --len;
139280304Sjkim                n = (n + 1) % 16;
140280304Sjkim            }
141238384Sjkim
142280304Sjkim# if defined(STRICT_ALIGNMENT)
143296317Sdelphij            if (((size_t)in | (size_t)out | (size_t)ecount_buf)
144296317Sdelphij                % sizeof(size_t) != 0)
145280304Sjkim                break;
146280304Sjkim# endif
147280304Sjkim            while (len >= 16) {
148280304Sjkim                (*block) (ivec, ecount_buf, key);
149280304Sjkim                ctr128_inc_aligned(ivec);
150296317Sdelphij                for (n = 0; n < 16; n += sizeof(size_t))
151280304Sjkim                    *(size_t *)(out + n) =
152280304Sjkim                        *(size_t *)(in + n) ^ *(size_t *)(ecount_buf + n);
153280304Sjkim                len -= 16;
154280304Sjkim                out += 16;
155280304Sjkim                in += 16;
156280304Sjkim                n = 0;
157280304Sjkim            }
158280304Sjkim            if (len) {
159280304Sjkim                (*block) (ivec, ecount_buf, key);
160280304Sjkim                ctr128_inc_aligned(ivec);
161280304Sjkim                while (len--) {
162280304Sjkim                    out[n] = in[n] ^ ecount_buf[n];
163280304Sjkim                    ++n;
164280304Sjkim                }
165280304Sjkim            }
166280304Sjkim            *num = n;
167280304Sjkim            return;
168280304Sjkim        } while (0);
169280304Sjkim    }
170280304Sjkim    /* the rest would be commonly eliminated by x86* compiler */
171238384Sjkim#endif
172280304Sjkim    while (l < len) {
173280304Sjkim        if (n == 0) {
174280304Sjkim            (*block) (ivec, ecount_buf, key);
175280304Sjkim            ctr128_inc(ivec);
176280304Sjkim        }
177280304Sjkim        out[l] = in[l] ^ ecount_buf[n];
178280304Sjkim        ++l;
179280304Sjkim        n = (n + 1) % 16;
180280304Sjkim    }
181238384Sjkim
182280304Sjkim    *num = n;
183238384Sjkim}
184238384Sjkim
185238384Sjkim/* increment upper 96 bits of 128-bit counter by 1 */
186280304Sjkimstatic void ctr96_inc(unsigned char *counter)
187280304Sjkim{
188296317Sdelphij    u32 n = 12, c = 1;
189238384Sjkim
190280304Sjkim    do {
191280304Sjkim        --n;
192296317Sdelphij        c += counter[n];
193296317Sdelphij        counter[n] = (u8)c;
194296317Sdelphij        c >>= 8;
195280304Sjkim    } while (n);
196238384Sjkim}
197238384Sjkim
198238384Sjkimvoid CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
199280304Sjkim                                 size_t len, const void *key,
200280304Sjkim                                 unsigned char ivec[16],
201280304Sjkim                                 unsigned char ecount_buf[16],
202280304Sjkim                                 unsigned int *num, ctr128_f func)
203238384Sjkim{
204280304Sjkim    unsigned int n, ctr32;
205238384Sjkim
206280304Sjkim    assert(in && out && key && ecount_buf && num);
207280304Sjkim    assert(*num < 16);
208238384Sjkim
209280304Sjkim    n = *num;
210238384Sjkim
211280304Sjkim    while (n && len) {
212280304Sjkim        *(out++) = *(in++) ^ ecount_buf[n];
213280304Sjkim        --len;
214280304Sjkim        n = (n + 1) % 16;
215280304Sjkim    }
216238384Sjkim
217280304Sjkim    ctr32 = GETU32(ivec + 12);
218280304Sjkim    while (len >= 16) {
219280304Sjkim        size_t blocks = len / 16;
220280304Sjkim        /*
221280304Sjkim         * 1<<28 is just a not-so-small yet not-so-large number...
222280304Sjkim         * Below condition is practically never met, but it has to
223280304Sjkim         * be checked for code correctness.
224280304Sjkim         */
225280304Sjkim        if (sizeof(size_t) > sizeof(unsigned int) && blocks > (1U << 28))
226280304Sjkim            blocks = (1U << 28);
227280304Sjkim        /*
228280304Sjkim         * As (*func) operates on 32-bit counter, caller
229280304Sjkim         * has to handle overflow. 'if' below detects the
230280304Sjkim         * overflow, which is then handled by limiting the
231280304Sjkim         * amount of blocks to the exact overflow point...
232280304Sjkim         */
233280304Sjkim        ctr32 += (u32)blocks;
234280304Sjkim        if (ctr32 < blocks) {
235280304Sjkim            blocks -= ctr32;
236280304Sjkim            ctr32 = 0;
237280304Sjkim        }
238280304Sjkim        (*func) (in, out, blocks, key, ivec);
239280304Sjkim        /* (*ctr) does not update ivec, caller does: */
240280304Sjkim        PUTU32(ivec + 12, ctr32);
241280304Sjkim        /* ... overflow was detected, propogate carry. */
242280304Sjkim        if (ctr32 == 0)
243280304Sjkim            ctr96_inc(ivec);
244280304Sjkim        blocks *= 16;
245280304Sjkim        len -= blocks;
246280304Sjkim        out += blocks;
247280304Sjkim        in += blocks;
248280304Sjkim    }
249280304Sjkim    if (len) {
250280304Sjkim        memset(ecount_buf, 0, 16);
251280304Sjkim        (*func) (ecount_buf, ecount_buf, 1, key, ivec);
252280304Sjkim        ++ctr32;
253280304Sjkim        PUTU32(ivec + 12, ctr32);
254280304Sjkim        if (ctr32 == 0)
255280304Sjkim            ctr96_inc(ivec);
256280304Sjkim        while (len--) {
257280304Sjkim            out[n] = in[n] ^ ecount_buf[n];
258280304Sjkim            ++n;
259280304Sjkim        }
260280304Sjkim    }
261238384Sjkim
262280304Sjkim    *num = n;
263238384Sjkim}
264