Merge variable key length for Blowfish in cipher layer

This commit is contained in:
Paul Bakker 2014-06-24 11:02:11 +02:00
commit 00a6739cac
5 changed files with 80 additions and 20 deletions

View File

@ -10,6 +10,7 @@ Features
* Support for CCM and CCM_8 ciphersuites * Support for CCM and CCM_8 ciphersuites
* Support for parsing and verifying RSASSA-PSS signatures in the X.509 * Support for parsing and verifying RSASSA-PSS signatures in the X.509
modules (certificates, CRLs and CSRs). modules (certificates, CRLs and CSRs).
* Blowfish in the cipher layer now supports variable length keys.
Changes Changes
* Add LINK_WITH_PTHREAD option in CMake for explicit linking that is * Add LINK_WITH_PTHREAD option in CMake for explicit linking that is

View File

@ -61,6 +61,9 @@
#define POLARSSL_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full block. */ #define POLARSSL_ERR_CIPHER_FULL_BLOCK_EXPECTED -0x6280 /**< Decryption of block requires a full block. */
#define POLARSSL_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes). */ #define POLARSSL_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes). */
#define POLARSSL_CIPHER_VARIABLE_IV_LEN 0x01 /**< Cipher accepts IVs of variable length */
#define POLARSSL_CIPHER_VARIABLE_KEY_LEN 0x02 /**< Cipher accepts keys of variable length */
#ifdef __cplusplus #ifdef __cplusplus
extern "C" { extern "C" {
#endif #endif
@ -238,8 +241,8 @@ typedef struct {
* For cipher that accept many sizes: recommended size */ * For cipher that accept many sizes: recommended size */
unsigned int iv_size; unsigned int iv_size;
/** Flag for ciphers that accept many sizes of IV/NONCE */ /** Flags for variable IV size, variable key size, etc. */
int accepts_variable_iv_size; int flags;
/** block size, in bytes */ /** block size, in bytes */
unsigned int block_size; unsigned int block_size;

View File

@ -168,8 +168,11 @@ int cipher_setkey( cipher_context_t *ctx, const unsigned char *key,
if( NULL == ctx || NULL == ctx->cipher_info ) if( NULL == ctx || NULL == ctx->cipher_info )
return( POLARSSL_ERR_CIPHER_BAD_INPUT_DATA ); return( POLARSSL_ERR_CIPHER_BAD_INPUT_DATA );
if( (int) ctx->cipher_info->key_length != key_length ) if( ( ctx->cipher_info->flags & POLARSSL_CIPHER_VARIABLE_KEY_LEN ) == 0 &&
(int) ctx->cipher_info->key_length != key_length )
{
return( POLARSSL_ERR_CIPHER_BAD_INPUT_DATA ); return( POLARSSL_ERR_CIPHER_BAD_INPUT_DATA );
}
ctx->key_length = key_length; ctx->key_length = key_length;
ctx->operation = operation; ctx->operation = operation;
@ -204,7 +207,7 @@ int cipher_set_iv( cipher_context_t *ctx,
if( iv_len > POLARSSL_MAX_IV_LENGTH ) if( iv_len > POLARSSL_MAX_IV_LENGTH )
return( POLARSSL_ERR_CIPHER_FEATURE_UNAVAILABLE ); return( POLARSSL_ERR_CIPHER_FEATURE_UNAVAILABLE );
if( ctx->cipher_info->accepts_variable_iv_size ) if( ( ctx->cipher_info->flags & POLARSSL_CIPHER_VARIABLE_IV_LEN ) != 0 )
actual_iv_size = iv_len; actual_iv_size = iv_len;
else else
{ {

View File

@ -374,7 +374,7 @@ const cipher_info_t aes_128_gcm_info = {
128, 128,
"AES-128-GCM", "AES-128-GCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&gcm_aes_info &gcm_aes_info
}; };
@ -385,7 +385,7 @@ const cipher_info_t aes_192_gcm_info = {
192, 192,
"AES-192-GCM", "AES-192-GCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&gcm_aes_info &gcm_aes_info
}; };
@ -396,7 +396,7 @@ const cipher_info_t aes_256_gcm_info = {
256, 256,
"AES-256-GCM", "AES-256-GCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&gcm_aes_info &gcm_aes_info
}; };
@ -429,7 +429,7 @@ const cipher_info_t aes_128_ccm_info = {
128, 128,
"AES-128-CCM", "AES-128-CCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&ccm_aes_info &ccm_aes_info
}; };
@ -440,7 +440,7 @@ const cipher_info_t aes_192_ccm_info = {
192, 192,
"AES-192-CCM", "AES-192-CCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&ccm_aes_info &ccm_aes_info
}; };
@ -451,7 +451,7 @@ const cipher_info_t aes_256_ccm_info = {
256, 256,
"AES-256-CCM", "AES-256-CCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&ccm_aes_info &ccm_aes_info
}; };
@ -728,7 +728,7 @@ const cipher_info_t camellia_128_gcm_info = {
128, 128,
"CAMELLIA-128-GCM", "CAMELLIA-128-GCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&gcm_camellia_info &gcm_camellia_info
}; };
@ -739,7 +739,7 @@ const cipher_info_t camellia_192_gcm_info = {
192, 192,
"CAMELLIA-192-GCM", "CAMELLIA-192-GCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&gcm_camellia_info &gcm_camellia_info
}; };
@ -750,7 +750,7 @@ const cipher_info_t camellia_256_gcm_info = {
256, 256,
"CAMELLIA-256-GCM", "CAMELLIA-256-GCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&gcm_camellia_info &gcm_camellia_info
}; };
@ -783,7 +783,7 @@ const cipher_info_t camellia_128_ccm_info = {
128, 128,
"CAMELLIA-128-CCM", "CAMELLIA-128-CCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&ccm_camellia_info &ccm_camellia_info
}; };
@ -794,7 +794,7 @@ const cipher_info_t camellia_192_ccm_info = {
192, 192,
"CAMELLIA-192-CCM", "CAMELLIA-192-CCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&ccm_camellia_info &ccm_camellia_info
}; };
@ -805,7 +805,7 @@ const cipher_info_t camellia_256_ccm_info = {
256, 256,
"CAMELLIA-256-CCM", "CAMELLIA-256-CCM",
12, 12,
1, POLARSSL_CIPHER_VARIABLE_IV_LEN,
16, 16,
&ccm_camellia_info &ccm_camellia_info
}; };
@ -1180,7 +1180,7 @@ const cipher_info_t blowfish_ecb_info = {
128, 128,
"BLOWFISH-ECB", "BLOWFISH-ECB",
8, 8,
0, POLARSSL_CIPHER_VARIABLE_KEY_LEN,
8, 8,
&blowfish_info &blowfish_info
}; };
@ -1192,7 +1192,7 @@ const cipher_info_t blowfish_cbc_info = {
128, 128,
"BLOWFISH-CBC", "BLOWFISH-CBC",
8, 8,
0, POLARSSL_CIPHER_VARIABLE_KEY_LEN,
8, 8,
&blowfish_info &blowfish_info
}; };
@ -1205,7 +1205,7 @@ const cipher_info_t blowfish_cfb64_info = {
128, 128,
"BLOWFISH-CFB64", "BLOWFISH-CFB64",
8, 8,
0, POLARSSL_CIPHER_VARIABLE_KEY_LEN,
8, 8,
&blowfish_info &blowfish_info
}; };
@ -1218,7 +1218,7 @@ const cipher_info_t blowfish_ctr_info = {
128, 128,
"BLOWFISH-CTR", "BLOWFISH-CTR",
8, 8,
0, POLARSSL_CIPHER_VARIABLE_KEY_LEN,
8, 8,
&blowfish_info &blowfish_info
}; };

View File

@ -549,3 +549,56 @@ enc_dec_buf_multipart:POLARSSL_CIPHER_BLOWFISH_CTR:128:17:6:
BLOWFISH Encrypt and decrypt 32 bytes in multiple parts 1 BLOWFISH Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:POLARSSL_BLOWFISH_C:POLARSSL_CIPHER_MODE_CTR depends_on:POLARSSL_BLOWFISH_C:POLARSSL_CIPHER_MODE_CTR
enc_dec_buf_multipart:POLARSSL_CIPHER_BLOWFISH_CTR:128:16:16: enc_dec_buf_multipart:POLARSSL_CIPHER_BLOWFISH_CTR:128:16:16:
BLOWFISH CBC Encrypt and decrypt 7 bytes, 192-bits key
depends_on:POLARSSL_BLOWFISH_C:POLARSSL_CIPHER_MODE_CBC:POLARSSL_CIPHER_PADDING_PKCS7
enc_dec_buf:POLARSSL_CIPHER_BLOWFISH_CBC:"BLOWFISH-CBC":192:7:-1
BLOWFISH CTR Encrypt and decrypt 7 bytes, 192-bits key
depends_on:POLARSSL_BLOWFISH_C:POLARSSL_CIPHER_MODE_CTR
enc_dec_buf:POLARSSL_CIPHER_BLOWFISH_CTR:"BLOWFISH-CTR":192:7:-1
BLOWFISH CFB64 Encrypt and decrypt 7 bytes, 192-bits key
depends_on:POLARSSL_BLOWFISH_C:POLARSSL_CIPHER_MODE_CFB
enc_dec_buf:POLARSSL_CIPHER_BLOWFISH_CFB64:"BLOWFISH-CFB64":192:7:-1
BLOWFISH ECB Encrypt test vector (SSLeay) #1
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_ENCRYPT:"00000000000000000000000000000000":"0000000000000000":"4ef997456198dd78":0
BLOWFISH ECB Encrypt test vector (SSLeay) #2
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_ENCRYPT:"ffffffffffffffffffffffffffffffff":"ffffffffffffffff":"51866fd5b85ecb8a":0
BLOWFISH ECB Encrypt test vector (SSLeay) #3
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_ENCRYPT:"fedcba9876543210fedcba9876543210":"0123456789abcdef":"0aceab0fc6a0a28d":0
BLOWFISH ECB Encrypt test vector (SSLeay) #3, 64-bit key
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_ENCRYPT:"fedcba9876543210":"0123456789abcdef":"0aceab0fc6a0a28d":0
BLOWFISH ECB Encrypt test vector (SSLeay) #3, 192-bit key
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_ENCRYPT:"fedcba9876543210fedcba9876543210fedcba9876543210":"0123456789abcdef":"0aceab0fc6a0a28d":0
BLOWFISH ECB Decrypt test vector (SSLeay) #1
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_DECRYPT:"00000000000000000000000000000000":"4ef997456198dd78":"0000000000000000":0
BLOWFISH ECB Decrypt test vector (SSLeay) #2
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_DECRYPT:"ffffffffffffffffffffffffffffffff":"51866fd5b85ecb8a":"ffffffffffffffff":0
BLOWFISH ECB Decrypt test vector (SSLeay) #3
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_DECRYPT:"3849674c2602319e3849674c2602319e":"a25e7856cf2651eb":"51454b582ddf440a":0
BLOWFISH ECB Decrypt test vector (SSLeay) #3, 64-bit key
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_DECRYPT:"3849674c2602319e":"a25e7856cf2651eb":"51454b582ddf440a":0
BLOWFISH ECB Decrypt test vector (SSLeay) #3, 192-bit key
depends_on:POLARSSL_BLOWFISH_C
test_vec_ecb:POLARSSL_CIPHER_BLOWFISH_ECB:POLARSSL_DECRYPT:"3849674c2602319e3849674c2602319e3849674c2602319e":"a25e7856cf2651eb":"51454b582ddf440a":0