mirror of
https://github.com/espressif/ESP8266_RTOS_SDK.git
synced 2025-06-21 23:00:39 +08:00
feat(crypto): add crypto library
This commit is contained in:
4
components/wpa_supplicant/component.mk
Normal file
4
components/wpa_supplicant/component.mk
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
COMPONENT_ADD_INCLUDEDIRS := include
|
||||||
|
COMPONENT_SRCDIRS := src/crypto
|
||||||
|
|
||||||
|
CFLAGS += -DEMBEDDED_SUPP -D__ets__
|
27
components/wpa_supplicant/include/crypto/aes.h
Normal file
27
components/wpa_supplicant/include/crypto/aes.h
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
/*
|
||||||
|
* AES functions
|
||||||
|
* Copyright (c) 2003-2006, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef AES_H
|
||||||
|
#define AES_H
|
||||||
|
|
||||||
|
#define AES_BLOCK_SIZE 16
|
||||||
|
|
||||||
|
void * aes_encrypt_init(const u8 *key, size_t len);
|
||||||
|
void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt);
|
||||||
|
void aes_encrypt_deinit(void *ctx);
|
||||||
|
void * aes_decrypt_init(const u8 *key, size_t len);
|
||||||
|
void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
||||||
|
void aes_decrypt_deinit(void *ctx);
|
||||||
|
|
||||||
|
#endif /* AES_H */
|
122
components/wpa_supplicant/include/crypto/aes_i.h
Normal file
122
components/wpa_supplicant/include/crypto/aes_i.h
Normal file
@ -0,0 +1,122 @@
|
|||||||
|
/*
|
||||||
|
* AES (Rijndael) cipher
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef AES_I_H
|
||||||
|
#define AES_I_H
|
||||||
|
|
||||||
|
#include "aes.h"
|
||||||
|
|
||||||
|
/* #define FULL_UNROLL */
|
||||||
|
#define AES_SMALL_TABLES
|
||||||
|
|
||||||
|
extern const u32 Te0[256];
|
||||||
|
extern const u32 Te1[256];
|
||||||
|
extern const u32 Te2[256];
|
||||||
|
extern const u32 Te3[256];
|
||||||
|
extern const u32 Te4[256];
|
||||||
|
extern const u32 Td0[256];
|
||||||
|
extern const u32 Td1[256];
|
||||||
|
extern const u32 Td2[256];
|
||||||
|
extern const u32 Td3[256];
|
||||||
|
extern const u32 Td4[256];
|
||||||
|
extern const u32 rcon[10];
|
||||||
|
extern const u8 Td4s_rom[256];
|
||||||
|
extern const u8 rcons[10];
|
||||||
|
|
||||||
|
#ifndef AES_SMALL_TABLES
|
||||||
|
|
||||||
|
#define RCON(i) rcon[(i)]
|
||||||
|
|
||||||
|
#define TE0(i) Te0[((i) >> 24) & 0xff]
|
||||||
|
#define TE1(i) Te1[((i) >> 16) & 0xff]
|
||||||
|
#define TE2(i) Te2[((i) >> 8) & 0xff]
|
||||||
|
#define TE3(i) Te3[(i) & 0xff]
|
||||||
|
#define TE41(i) (Te4[((i) >> 24) & 0xff] & 0xff000000)
|
||||||
|
#define TE42(i) (Te4[((i) >> 16) & 0xff] & 0x00ff0000)
|
||||||
|
#define TE43(i) (Te4[((i) >> 8) & 0xff] & 0x0000ff00)
|
||||||
|
#define TE44(i) (Te4[(i) & 0xff] & 0x000000ff)
|
||||||
|
#define TE421(i) (Te4[((i) >> 16) & 0xff] & 0xff000000)
|
||||||
|
#define TE432(i) (Te4[((i) >> 8) & 0xff] & 0x00ff0000)
|
||||||
|
#define TE443(i) (Te4[(i) & 0xff] & 0x0000ff00)
|
||||||
|
#define TE414(i) (Te4[((i) >> 24) & 0xff] & 0x000000ff)
|
||||||
|
#define TE4(i) (Te4[(i)] & 0x000000ff)
|
||||||
|
|
||||||
|
#define TD0(i) Td0[((i) >> 24) & 0xff]
|
||||||
|
#define TD1(i) Td1[((i) >> 16) & 0xff]
|
||||||
|
#define TD2(i) Td2[((i) >> 8) & 0xff]
|
||||||
|
#define TD3(i) Td3[(i) & 0xff]
|
||||||
|
#define TD41(i) (Td4[((i) >> 24) & 0xff] & 0xff000000)
|
||||||
|
#define TD42(i) (Td4[((i) >> 16) & 0xff] & 0x00ff0000)
|
||||||
|
#define TD43(i) (Td4[((i) >> 8) & 0xff] & 0x0000ff00)
|
||||||
|
#define TD44(i) (Td4[(i) & 0xff] & 0x000000ff)
|
||||||
|
#define TD0_(i) Td0[(i) & 0xff]
|
||||||
|
#define TD1_(i) Td1[(i) & 0xff]
|
||||||
|
#define TD2_(i) Td2[(i) & 0xff]
|
||||||
|
#define TD3_(i) Td3[(i) & 0xff]
|
||||||
|
|
||||||
|
#else /* AES_SMALL_TABLES */
|
||||||
|
|
||||||
|
#define RCON(i) (rcons[(i)] << 24)
|
||||||
|
|
||||||
|
static inline u32 rotr(u32 val, int bits)
|
||||||
|
{
|
||||||
|
return (val >> bits) | (val << (32 - bits));
|
||||||
|
}
|
||||||
|
|
||||||
|
#define TE0(i) Te0[((i) >> 24) & 0xff]
|
||||||
|
#define TE1(i) rotr(Te0[((i) >> 16) & 0xff], 8)
|
||||||
|
#define TE2(i) rotr(Te0[((i) >> 8) & 0xff], 16)
|
||||||
|
#define TE3(i) rotr(Te0[(i) & 0xff], 24)
|
||||||
|
#define TE41(i) ((Te0[((i) >> 24) & 0xff] << 8) & 0xff000000)
|
||||||
|
#define TE42(i) (Te0[((i) >> 16) & 0xff] & 0x00ff0000)
|
||||||
|
#define TE43(i) (Te0[((i) >> 8) & 0xff] & 0x0000ff00)
|
||||||
|
#define TE44(i) ((Te0[(i) & 0xff] >> 8) & 0x000000ff)
|
||||||
|
#define TE421(i) ((Te0[((i) >> 16) & 0xff] << 8) & 0xff000000)
|
||||||
|
#define TE432(i) (Te0[((i) >> 8) & 0xff] & 0x00ff0000)
|
||||||
|
#define TE443(i) (Te0[(i) & 0xff] & 0x0000ff00)
|
||||||
|
#define TE414(i) ((Te0[((i) >> 24) & 0xff] >> 8) & 0x000000ff)
|
||||||
|
#define TE4(i) ((Te0[(i)] >> 8) & 0x000000ff)
|
||||||
|
|
||||||
|
#define TD0(i) Td0[((i) >> 24) & 0xff]
|
||||||
|
#define TD1(i) rotr(Td0[((i) >> 16) & 0xff], 8)
|
||||||
|
#define TD2(i) rotr(Td0[((i) >> 8) & 0xff], 16)
|
||||||
|
#define TD3(i) rotr(Td0[(i) & 0xff], 24)
|
||||||
|
#define TD41(i) (Td4s[((i) >> 24) & 0xff] << 24)
|
||||||
|
#define TD42(i) (Td4s[((i) >> 16) & 0xff] << 16)
|
||||||
|
#define TD43(i) (Td4s[((i) >> 8) & 0xff] << 8)
|
||||||
|
#define TD44(i) (Td4s[(i) & 0xff])
|
||||||
|
#define TD0_(i) Td0[(i) & 0xff]
|
||||||
|
#define TD1_(i) rotr(Td0[(i) & 0xff], 8)
|
||||||
|
#define TD2_(i) rotr(Td0[(i) & 0xff], 16)
|
||||||
|
#define TD3_(i) rotr(Td0[(i) & 0xff], 24)
|
||||||
|
|
||||||
|
#endif /* AES_SMALL_TABLES */
|
||||||
|
|
||||||
|
#ifdef _MSC_VER
|
||||||
|
#define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrotr(x, 8) & 0xff00ff00)
|
||||||
|
#define GETU32(p) SWAP(*((u32 *)(p)))
|
||||||
|
#define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); }
|
||||||
|
#else
|
||||||
|
#define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ \
|
||||||
|
((u32)(pt)[2] << 8) ^ ((u32)(pt)[3]))
|
||||||
|
#define PUTU32(ct, st) { \
|
||||||
|
(ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \
|
||||||
|
(ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#define AES_PRIV_SIZE (4 * 44)
|
||||||
|
|
||||||
|
void rijndaelKeySetupEnc(u32 rk[/*44*/], const u8 cipherKey[]);
|
||||||
|
|
||||||
|
#endif /* AES_I_H */
|
48
components/wpa_supplicant/include/crypto/aes_wrap.h
Normal file
48
components/wpa_supplicant/include/crypto/aes_wrap.h
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
/*
|
||||||
|
* AES-based functions
|
||||||
|
*
|
||||||
|
* - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
||||||
|
* - One-Key CBC MAC (OMAC1) hash with AES-128
|
||||||
|
* - AES-128 CTR mode encryption
|
||||||
|
* - AES-128 EAX mode encryption/decryption
|
||||||
|
* - AES-128 CBC
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef AES_WRAP_H
|
||||||
|
#define AES_WRAP_H
|
||||||
|
|
||||||
|
int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
|
||||||
|
int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
|
||||||
|
int __must_check omac1_aes_128_vector(const u8 *key, size_t num_elem,
|
||||||
|
const u8 *addr[], const size_t *len,
|
||||||
|
u8 *mac);
|
||||||
|
int __must_check omac1_aes_128(const u8 *key, const u8 *data, size_t data_len,
|
||||||
|
u8 *mac);
|
||||||
|
int __must_check aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out);
|
||||||
|
int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
|
||||||
|
u8 *data, size_t data_len);
|
||||||
|
int __must_check aes_128_eax_encrypt(const u8 *key,
|
||||||
|
const u8 *nonce, size_t nonce_len,
|
||||||
|
const u8 *hdr, size_t hdr_len,
|
||||||
|
u8 *data, size_t data_len, u8 *tag);
|
||||||
|
int __must_check aes_128_eax_decrypt(const u8 *key,
|
||||||
|
const u8 *nonce, size_t nonce_len,
|
||||||
|
const u8 *hdr, size_t hdr_len,
|
||||||
|
u8 *data, size_t data_len, const u8 *tag);
|
||||||
|
int __must_check aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data,
|
||||||
|
size_t data_len);
|
||||||
|
int __must_check aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data,
|
||||||
|
size_t data_len);
|
||||||
|
|
||||||
|
#endif /* AES_WRAP_H */
|
23
components/wpa_supplicant/include/crypto/base64.h
Normal file
23
components/wpa_supplicant/include/crypto/base64.h
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
/*
|
||||||
|
* Base64 encoding/decoding (RFC1341)
|
||||||
|
* Copyright (c) 2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef BASE64_H
|
||||||
|
#define BASE64_H
|
||||||
|
|
||||||
|
unsigned char * base64_encode(const unsigned char *src, size_t len,
|
||||||
|
size_t *out_len);
|
||||||
|
unsigned char * base64_decode(const unsigned char *src, size_t len,
|
||||||
|
size_t *out_len);
|
||||||
|
|
||||||
|
#endif /* BASE64_H */
|
485
components/wpa_supplicant/include/crypto/common.h
Normal file
485
components/wpa_supplicant/include/crypto/common.h
Normal file
@ -0,0 +1,485 @@
|
|||||||
|
/*
|
||||||
|
* wpa_supplicant/hostapd / common helper functions, etc.
|
||||||
|
* Copyright (c) 2002-2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef COMMON_H
|
||||||
|
#define COMMON_H
|
||||||
|
|
||||||
|
#include "os.h"
|
||||||
|
|
||||||
|
#if defined(__XTENSA__)
|
||||||
|
#include <machine/endian.h>
|
||||||
|
#define __BYTE_ORDER BYTE_ORDER
|
||||||
|
#define __LITTLE_ENDIAN LITTLE_ENDIAN
|
||||||
|
#define __BIG_ENDIAN BIG_ENDIAN
|
||||||
|
#endif /*__XTENSA__*/
|
||||||
|
|
||||||
|
#if defined(__linux__) || defined(__GLIBC__)
|
||||||
|
#include <endian.h>
|
||||||
|
#include <byteswap.h>
|
||||||
|
#endif /* __linux__ */
|
||||||
|
|
||||||
|
#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__DragonFly__) || \
|
||||||
|
defined(__OpenBSD__)
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <sys/endian.h>
|
||||||
|
#define __BYTE_ORDER _BYTE_ORDER
|
||||||
|
#define __LITTLE_ENDIAN _LITTLE_ENDIAN
|
||||||
|
#define __BIG_ENDIAN _BIG_ENDIAN
|
||||||
|
#ifdef __OpenBSD__
|
||||||
|
#define bswap_16 swap16
|
||||||
|
#define bswap_32 swap32
|
||||||
|
#define bswap_64 swap64
|
||||||
|
#else /* __OpenBSD__ */
|
||||||
|
#define bswap_16 bswap16
|
||||||
|
#define bswap_32 bswap32
|
||||||
|
#define bswap_64 bswap64
|
||||||
|
#endif /* __OpenBSD__ */
|
||||||
|
#endif /* defined(__FreeBSD__) || defined(__NetBSD__) ||
|
||||||
|
* defined(__DragonFly__) || defined(__OpenBSD__) */
|
||||||
|
|
||||||
|
#ifdef __APPLE__
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <machine/endian.h>
|
||||||
|
#define __BYTE_ORDER _BYTE_ORDER
|
||||||
|
#define __LITTLE_ENDIAN _LITTLE_ENDIAN
|
||||||
|
#define __BIG_ENDIAN _BIG_ENDIAN
|
||||||
|
static inline unsigned short bswap_16(unsigned short v)
|
||||||
|
{
|
||||||
|
return ((v & 0xff) << 8) | (v >> 8);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline unsigned int bswap_32(unsigned int v)
|
||||||
|
{
|
||||||
|
return ((v & 0xff) << 24) | ((v & 0xff00) << 8) |
|
||||||
|
((v & 0xff0000) >> 8) | (v >> 24);
|
||||||
|
}
|
||||||
|
#endif /* __APPLE__ */
|
||||||
|
|
||||||
|
#ifdef CONFIG_TI_COMPILER
|
||||||
|
#define __BIG_ENDIAN 4321
|
||||||
|
#define __LITTLE_ENDIAN 1234
|
||||||
|
#ifdef __big_endian__
|
||||||
|
#define __BYTE_ORDER __BIG_ENDIAN
|
||||||
|
#else
|
||||||
|
#define __BYTE_ORDER __LITTLE_ENDIAN
|
||||||
|
#endif
|
||||||
|
#endif /* CONFIG_TI_COMPILER */
|
||||||
|
|
||||||
|
#ifdef __SYMBIAN32__
|
||||||
|
#define __BIG_ENDIAN 4321
|
||||||
|
#define __LITTLE_ENDIAN 1234
|
||||||
|
#define __BYTE_ORDER __LITTLE_ENDIAN
|
||||||
|
#endif /* __SYMBIAN32__ */
|
||||||
|
|
||||||
|
#ifdef CONFIG_NATIVE_WINDOWS
|
||||||
|
#include <winsock.h>
|
||||||
|
|
||||||
|
typedef int socklen_t;
|
||||||
|
|
||||||
|
#ifndef MSG_DONTWAIT
|
||||||
|
#define MSG_DONTWAIT 0 /* not supported */
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#endif /* CONFIG_NATIVE_WINDOWS */
|
||||||
|
|
||||||
|
#ifdef _MSC_VER
|
||||||
|
#define inline __inline
|
||||||
|
|
||||||
|
#undef vsnprintf
|
||||||
|
#define vsnprintf _vsnprintf
|
||||||
|
#undef close
|
||||||
|
#define close closesocket
|
||||||
|
#endif /* _MSC_VER */
|
||||||
|
|
||||||
|
|
||||||
|
/* Define platform specific integer types */
|
||||||
|
|
||||||
|
#ifdef _MSC_VER
|
||||||
|
typedef UINT64 u64;
|
||||||
|
typedef UINT32 u32;
|
||||||
|
typedef UINT16 u16;
|
||||||
|
typedef UINT8 u8;
|
||||||
|
typedef INT64 s64;
|
||||||
|
typedef INT32 s32;
|
||||||
|
typedef INT16 s16;
|
||||||
|
typedef INT8 s8;
|
||||||
|
#define WPA_TYPES_DEFINED
|
||||||
|
#endif /* _MSC_VER */
|
||||||
|
|
||||||
|
#ifdef __vxworks
|
||||||
|
typedef unsigned long long u64;
|
||||||
|
typedef UINT32 u32;
|
||||||
|
typedef UINT16 u16;
|
||||||
|
typedef UINT8 u8;
|
||||||
|
typedef long long s64;
|
||||||
|
typedef INT32 s32;
|
||||||
|
typedef INT16 s16;
|
||||||
|
typedef INT8 s8;
|
||||||
|
#define WPA_TYPES_DEFINED
|
||||||
|
#endif /* __vxworks */
|
||||||
|
|
||||||
|
#ifdef CONFIG_TI_COMPILER
|
||||||
|
#ifdef _LLONG_AVAILABLE
|
||||||
|
typedef unsigned long long u64;
|
||||||
|
#else
|
||||||
|
/*
|
||||||
|
* TODO: 64-bit variable not available. Using long as a workaround to test the
|
||||||
|
* build, but this will likely not work for all operations.
|
||||||
|
*/
|
||||||
|
typedef unsigned long u64;
|
||||||
|
#endif
|
||||||
|
typedef unsigned int u32;
|
||||||
|
typedef unsigned short u16;
|
||||||
|
typedef unsigned char u8;
|
||||||
|
#define WPA_TYPES_DEFINED
|
||||||
|
#endif /* CONFIG_TI_COMPILER */
|
||||||
|
|
||||||
|
#ifdef __SYMBIAN32__
|
||||||
|
#define __REMOVE_PLATSEC_DIAGNOSTICS__
|
||||||
|
#include <e32def.h>
|
||||||
|
typedef TUint64 u64;
|
||||||
|
typedef TUint32 u32;
|
||||||
|
typedef TUint16 u16;
|
||||||
|
typedef TUint8 u8;
|
||||||
|
#define WPA_TYPES_DEFINED
|
||||||
|
#endif /* __SYMBIAN32__ */
|
||||||
|
|
||||||
|
#ifndef WPA_TYPES_DEFINED
|
||||||
|
#ifdef CONFIG_USE_INTTYPES_H
|
||||||
|
#include <inttypes.h>
|
||||||
|
#else
|
||||||
|
#ifndef __ets__
|
||||||
|
#include <stdint.h>
|
||||||
|
#endif //!__ets__
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef __ets__
|
||||||
|
typedef uint64_t u64;
|
||||||
|
typedef uint32_t u32;
|
||||||
|
typedef uint16_t u16;
|
||||||
|
typedef uint8_t u8;
|
||||||
|
typedef int64_t s64;
|
||||||
|
typedef int32_t s32;
|
||||||
|
typedef int16_t s16;
|
||||||
|
typedef int8_t s8;
|
||||||
|
#endif //!__ets__
|
||||||
|
#define WPA_TYPES_DEFINED
|
||||||
|
#endif /* !WPA_TYPES_DEFINED */
|
||||||
|
|
||||||
|
|
||||||
|
/* Define platform specific byte swapping macros */
|
||||||
|
|
||||||
|
#if defined(__CYGWIN__) || defined(CONFIG_NATIVE_WINDOWS)
|
||||||
|
|
||||||
|
static inline unsigned short wpa_swap_16(unsigned short v)
|
||||||
|
{
|
||||||
|
return ((v & 0xff) << 8) | (v >> 8);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline unsigned int wpa_swap_32(unsigned int v)
|
||||||
|
{
|
||||||
|
return ((v & 0xff) << 24) | ((v & 0xff00) << 8) |
|
||||||
|
((v & 0xff0000) >> 8) | (v >> 24);
|
||||||
|
}
|
||||||
|
|
||||||
|
#define le_to_host16(n) (n)
|
||||||
|
#define host_to_le16(n) (n)
|
||||||
|
#define be_to_host16(n) wpa_swap_16(n)
|
||||||
|
#define host_to_be16(n) wpa_swap_16(n)
|
||||||
|
#define le_to_host32(n) (n)
|
||||||
|
#define be_to_host32(n) wpa_swap_32(n)
|
||||||
|
#define host_to_be32(n) wpa_swap_32(n)
|
||||||
|
|
||||||
|
#define WPA_BYTE_SWAP_DEFINED
|
||||||
|
|
||||||
|
#endif /* __CYGWIN__ || CONFIG_NATIVE_WINDOWS */
|
||||||
|
|
||||||
|
|
||||||
|
#ifndef WPA_BYTE_SWAP_DEFINED
|
||||||
|
|
||||||
|
#ifndef __BYTE_ORDER
|
||||||
|
#ifndef __LITTLE_ENDIAN
|
||||||
|
#ifndef __BIG_ENDIAN
|
||||||
|
#define __LITTLE_ENDIAN 1234
|
||||||
|
#define __BIG_ENDIAN 4321
|
||||||
|
#if defined(sparc)
|
||||||
|
#define __BYTE_ORDER __BIG_ENDIAN
|
||||||
|
#endif
|
||||||
|
#endif /* __BIG_ENDIAN */
|
||||||
|
#endif /* __LITTLE_ENDIAN */
|
||||||
|
#endif /* __BYTE_ORDER */
|
||||||
|
|
||||||
|
#if __BYTE_ORDER == __LITTLE_ENDIAN
|
||||||
|
#define le_to_host16(n) ((__force u16) (le16) (n))
|
||||||
|
#define host_to_le16(n) ((__force le16) (u16) (n))
|
||||||
|
#define be_to_host16(n) bswap_16((__force u16) (be16) (n))
|
||||||
|
#define host_to_be16(n) ((__force be16) bswap_16((n)))
|
||||||
|
#define le_to_host32(n) ((__force u32) (le32) (n))
|
||||||
|
#define host_to_le32(n) ((__force le32) (u32) (n))
|
||||||
|
#define be_to_host32(n) bswap_32((__force u32) (be32) (n))
|
||||||
|
#define host_to_be32(n) ((__force be32) bswap_32((n)))
|
||||||
|
#define le_to_host64(n) ((__force u64) (le64) (n))
|
||||||
|
#define host_to_le64(n) ((__force le64) (u64) (n))
|
||||||
|
#define be_to_host64(n) bswap_64((__force u64) (be64) (n))
|
||||||
|
#define host_to_be64(n) ((__force be64) bswap_64((n)))
|
||||||
|
#elif __BYTE_ORDER == __BIG_ENDIAN
|
||||||
|
#define le_to_host16(n) bswap_16(n)
|
||||||
|
#define host_to_le16(n) bswap_16(n)
|
||||||
|
#define be_to_host16(n) (n)
|
||||||
|
#define host_to_be16(n) (n)
|
||||||
|
#define le_to_host32(n) bswap_32(n)
|
||||||
|
#define be_to_host32(n) (n)
|
||||||
|
#define host_to_be32(n) (n)
|
||||||
|
#define le_to_host64(n) bswap_64(n)
|
||||||
|
#define host_to_le64(n) bswap_64(n)
|
||||||
|
#define be_to_host64(n) (n)
|
||||||
|
#define host_to_be64(n) (n)
|
||||||
|
#ifndef WORDS_BIGENDIAN
|
||||||
|
#define WORDS_BIGENDIAN
|
||||||
|
#endif
|
||||||
|
#else
|
||||||
|
#error Could not determine CPU byte order
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#define WPA_BYTE_SWAP_DEFINED
|
||||||
|
#endif /* !WPA_BYTE_SWAP_DEFINED */
|
||||||
|
|
||||||
|
|
||||||
|
/* Macros for handling unaligned memory accesses */
|
||||||
|
|
||||||
|
#define WPA_GET_BE16(a) ((u16) (((a)[0] << 8) | (a)[1]))
|
||||||
|
#define WPA_PUT_BE16(a, val) \
|
||||||
|
do { \
|
||||||
|
(a)[0] = ((u16) (val)) >> 8; \
|
||||||
|
(a)[1] = ((u16) (val)) & 0xff; \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define WPA_GET_LE16(a) ((u16) (((a)[1] << 8) | (a)[0]))
|
||||||
|
#define WPA_PUT_LE16(a, val) \
|
||||||
|
do { \
|
||||||
|
(a)[1] = ((u16) (val)) >> 8; \
|
||||||
|
(a)[0] = ((u16) (val)) & 0xff; \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define WPA_GET_BE24(a) ((((u32) (a)[0]) << 16) | (((u32) (a)[1]) << 8) | \
|
||||||
|
((u32) (a)[2]))
|
||||||
|
#define WPA_PUT_BE24(a, val) \
|
||||||
|
do { \
|
||||||
|
(a)[0] = (u8) ((((u32) (val)) >> 16) & 0xff); \
|
||||||
|
(a)[1] = (u8) ((((u32) (val)) >> 8) & 0xff); \
|
||||||
|
(a)[2] = (u8) (((u32) (val)) & 0xff); \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define WPA_GET_BE32(a) ((((u32) (a)[0]) << 24) | (((u32) (a)[1]) << 16) | \
|
||||||
|
(((u32) (a)[2]) << 8) | ((u32) (a)[3]))
|
||||||
|
#define WPA_PUT_BE32(a, val) \
|
||||||
|
do { \
|
||||||
|
(a)[0] = (u8) ((((u32) (val)) >> 24) & 0xff); \
|
||||||
|
(a)[1] = (u8) ((((u32) (val)) >> 16) & 0xff); \
|
||||||
|
(a)[2] = (u8) ((((u32) (val)) >> 8) & 0xff); \
|
||||||
|
(a)[3] = (u8) (((u32) (val)) & 0xff); \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define WPA_GET_LE32(a) ((((u32) (a)[3]) << 24) | (((u32) (a)[2]) << 16) | \
|
||||||
|
(((u32) (a)[1]) << 8) | ((u32) (a)[0]))
|
||||||
|
#define WPA_PUT_LE32(a, val) \
|
||||||
|
do { \
|
||||||
|
(a)[3] = (u8) ((((u32) (val)) >> 24) & 0xff); \
|
||||||
|
(a)[2] = (u8) ((((u32) (val)) >> 16) & 0xff); \
|
||||||
|
(a)[1] = (u8) ((((u32) (val)) >> 8) & 0xff); \
|
||||||
|
(a)[0] = (u8) (((u32) (val)) & 0xff); \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define WPA_GET_BE64(a) ((((u64) (a)[0]) << 56) | (((u64) (a)[1]) << 48) | \
|
||||||
|
(((u64) (a)[2]) << 40) | (((u64) (a)[3]) << 32) | \
|
||||||
|
(((u64) (a)[4]) << 24) | (((u64) (a)[5]) << 16) | \
|
||||||
|
(((u64) (a)[6]) << 8) | ((u64) (a)[7]))
|
||||||
|
#define WPA_PUT_BE64(a, val) \
|
||||||
|
do { \
|
||||||
|
(a)[0] = (u8) (((u64) (val)) >> 56); \
|
||||||
|
(a)[1] = (u8) (((u64) (val)) >> 48); \
|
||||||
|
(a)[2] = (u8) (((u64) (val)) >> 40); \
|
||||||
|
(a)[3] = (u8) (((u64) (val)) >> 32); \
|
||||||
|
(a)[4] = (u8) (((u64) (val)) >> 24); \
|
||||||
|
(a)[5] = (u8) (((u64) (val)) >> 16); \
|
||||||
|
(a)[6] = (u8) (((u64) (val)) >> 8); \
|
||||||
|
(a)[7] = (u8) (((u64) (val)) & 0xff); \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define WPA_GET_LE64(a) ((((u64) (a)[7]) << 56) | (((u64) (a)[6]) << 48) | \
|
||||||
|
(((u64) (a)[5]) << 40) | (((u64) (a)[4]) << 32) | \
|
||||||
|
(((u64) (a)[3]) << 24) | (((u64) (a)[2]) << 16) | \
|
||||||
|
(((u64) (a)[1]) << 8) | ((u64) (a)[0]))
|
||||||
|
|
||||||
|
|
||||||
|
#ifndef ETH_ALEN
|
||||||
|
#define ETH_ALEN 6
|
||||||
|
#endif
|
||||||
|
#ifndef IFNAMSIZ
|
||||||
|
#define IFNAMSIZ 16
|
||||||
|
#endif
|
||||||
|
#ifndef ETH_P_ALL
|
||||||
|
#define ETH_P_ALL 0x0003
|
||||||
|
#endif
|
||||||
|
#ifndef ETH_P_PAE
|
||||||
|
#define ETH_P_PAE 0x888E /* Port Access Entity (IEEE 802.1X) */
|
||||||
|
#endif /* ETH_P_PAE */
|
||||||
|
#ifndef ETH_P_EAPOL
|
||||||
|
#define ETH_P_EAPOL ETH_P_PAE
|
||||||
|
#endif /* ETH_P_EAPOL */
|
||||||
|
#ifndef ETH_P_RSN_PREAUTH
|
||||||
|
#define ETH_P_RSN_PREAUTH 0x88c7
|
||||||
|
#endif /* ETH_P_RSN_PREAUTH */
|
||||||
|
#ifndef ETH_P_RRB
|
||||||
|
#define ETH_P_RRB 0x890D
|
||||||
|
#endif /* ETH_P_RRB */
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __GNUC__
|
||||||
|
#define PRINTF_FORMAT(a,b) __attribute__ ((format (printf, (a), (b))))
|
||||||
|
#define STRUCT_PACKED __attribute__ ((packed))
|
||||||
|
#else
|
||||||
|
#define PRINTF_FORMAT(a,b)
|
||||||
|
#define STRUCT_PACKED
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifdef CONFIG_ANSI_C_EXTRA
|
||||||
|
|
||||||
|
#if !defined(_MSC_VER) || _MSC_VER < 1400
|
||||||
|
/* snprintf - used in number of places; sprintf() is _not_ a good replacement
|
||||||
|
* due to possible buffer overflow; see, e.g.,
|
||||||
|
* http://www.ijs.si/software/snprintf/ for portable implementation of
|
||||||
|
* snprintf. */
|
||||||
|
int snprintf(char *str, size_t size, const char *format, ...);
|
||||||
|
|
||||||
|
/* vsnprintf - only used for wpa_msg() in wpa_supplicant.c */
|
||||||
|
int vsnprintf(char *str, size_t size, const char *format, va_list ap);
|
||||||
|
#endif /* !defined(_MSC_VER) || _MSC_VER < 1400 */
|
||||||
|
|
||||||
|
/* getopt - only used in main.c */
|
||||||
|
int getopt(int argc, char *const argv[], const char *optstring);
|
||||||
|
extern char *optarg;
|
||||||
|
extern int optind;
|
||||||
|
|
||||||
|
#ifndef CONFIG_NO_SOCKLEN_T_TYPEDEF
|
||||||
|
#ifndef __socklen_t_defined
|
||||||
|
typedef int socklen_t;
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* inline - define as __inline or just define it to be empty, if needed */
|
||||||
|
#ifdef CONFIG_NO_INLINE
|
||||||
|
#define inline
|
||||||
|
#else
|
||||||
|
#define inline __inline
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef __func__
|
||||||
|
#define __func__ "__func__ not defined"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef bswap_16
|
||||||
|
#define bswap_16(a) ((((u16) (a) << 8) & 0xff00) | (((u16) (a) >> 8) & 0xff))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef bswap_32
|
||||||
|
#define bswap_32(a) ((((u32) (a) << 24) & 0xff000000) | \
|
||||||
|
(((u32) (a) << 8) & 0xff0000) | \
|
||||||
|
(((u32) (a) >> 8) & 0xff00) | \
|
||||||
|
(((u32) (a) >> 24) & 0xff))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef MSG_DONTWAIT
|
||||||
|
#define MSG_DONTWAIT 0
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifdef _WIN32_WCE
|
||||||
|
void perror(const char *s);
|
||||||
|
#endif /* _WIN32_WCE */
|
||||||
|
|
||||||
|
#endif /* CONFIG_ANSI_C_EXTRA */
|
||||||
|
|
||||||
|
#ifndef MAC2STR
|
||||||
|
#define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
|
||||||
|
#define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef BIT
|
||||||
|
#define BIT(x) (1 << (x))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Definitions for sparse validation
|
||||||
|
* (http://kernel.org/pub/linux/kernel/people/josh/sparse/)
|
||||||
|
*/
|
||||||
|
#ifdef __CHECKER__
|
||||||
|
#define __force __attribute__((force))
|
||||||
|
#define __bitwise __attribute__((bitwise))
|
||||||
|
#else
|
||||||
|
#define __force
|
||||||
|
#define __bitwise
|
||||||
|
#endif
|
||||||
|
|
||||||
|
typedef u16 __bitwise be16;
|
||||||
|
typedef u16 __bitwise le16;
|
||||||
|
typedef u32 __bitwise be32;
|
||||||
|
typedef u32 __bitwise le32;
|
||||||
|
typedef u64 __bitwise be64;
|
||||||
|
typedef u64 __bitwise le64;
|
||||||
|
|
||||||
|
#ifndef __must_check
|
||||||
|
#if __GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)
|
||||||
|
#define __must_check __attribute__((__warn_unused_result__))
|
||||||
|
#else
|
||||||
|
#define __must_check
|
||||||
|
#endif /* __GNUC__ */
|
||||||
|
#endif /* __must_check */
|
||||||
|
|
||||||
|
int hwaddr_aton(const char *txt, u8 *addr);
|
||||||
|
int hwaddr_aton2(const char *txt, u8 *addr);
|
||||||
|
int hexstr2bin(const char *hex, u8 *buf, size_t len);
|
||||||
|
void inc_byte_array(u8 *counter, size_t len);
|
||||||
|
void wpa_get_ntp_timestamp(u8 *buf);
|
||||||
|
int wpa_snprintf_hex(char *buf, size_t buf_size, const u8 *data, size_t len);
|
||||||
|
int wpa_snprintf_hex_uppercase(char *buf, size_t buf_size, const u8 *data,
|
||||||
|
size_t len);
|
||||||
|
|
||||||
|
#ifdef CONFIG_NATIVE_WINDOWS
|
||||||
|
void wpa_unicode2ascii_inplace(TCHAR *str);
|
||||||
|
TCHAR * wpa_strdup_tchar(const char *str);
|
||||||
|
#else /* CONFIG_NATIVE_WINDOWS */
|
||||||
|
#define wpa_unicode2ascii_inplace(s) do { } while (0)
|
||||||
|
#define wpa_strdup_tchar(s) strdup((s))
|
||||||
|
#endif /* CONFIG_NATIVE_WINDOWS */
|
||||||
|
|
||||||
|
const char * wpa_ssid_txt(const u8 *ssid, size_t ssid_len);
|
||||||
|
|
||||||
|
static inline int is_zero_ether_addr(const u8 *a)
|
||||||
|
{
|
||||||
|
return !(a[0] | a[1] | a[2] | a[3] | a[4] | a[5]);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* gcc 4.4 ends up generating strict-aliasing warnings about some very common
|
||||||
|
* networking socket uses that do not really result in a real problem and
|
||||||
|
* cannot be easily avoided with union-based type-punning due to struct
|
||||||
|
* definitions including another struct in system header files. To avoid having
|
||||||
|
* to fully disable strict-aliasing warnings, provide a mechanism to hide the
|
||||||
|
* typecast from aliasing for now. A cleaner solution will hopefully be found
|
||||||
|
* in the future to handle these cases.
|
||||||
|
*/
|
||||||
|
void * __hide_aliasing_typecast(void *foo);
|
||||||
|
#define aliasing_hide_typecast(a,t) (t *) __hide_aliasing_typecast((a))
|
||||||
|
|
||||||
|
#endif /* COMMON_H */
|
469
components/wpa_supplicant/include/crypto/crypto.h
Normal file
469
components/wpa_supplicant/include/crypto/crypto.h
Normal file
@ -0,0 +1,469 @@
|
|||||||
|
/*
|
||||||
|
* WPA Supplicant / wrapper functions for crypto libraries
|
||||||
|
* Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*
|
||||||
|
* This file defines the cryptographic functions that need to be implemented
|
||||||
|
* for wpa_supplicant and hostapd. When TLS is not used, internal
|
||||||
|
* implementation of MD5, SHA1, and AES is used and no external libraries are
|
||||||
|
* required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
|
||||||
|
* crypto library used by the TLS implementation is expected to be used for
|
||||||
|
* non-TLS needs, too, in order to save space by not implementing these
|
||||||
|
* functions twice.
|
||||||
|
*
|
||||||
|
* Wrapper code for using each crypto library is in its own file (crypto*.c)
|
||||||
|
* and one of these files is build and linked in to provide the functions
|
||||||
|
* defined here.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef CRYPTO_H
|
||||||
|
#define CRYPTO_H
|
||||||
|
|
||||||
|
/**
|
||||||
|
* md4_vector - MD4 hash for data vector
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* md5_vector - MD5 hash for data vector
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
|
||||||
|
|
||||||
|
#ifdef CONFIG_FIPS
|
||||||
|
/**
|
||||||
|
* md5_vector_non_fips_allow - MD5 hash for data vector (non-FIPS use allowed)
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int md5_vector_non_fips_allow(size_t num_elem, const u8 *addr[],
|
||||||
|
const size_t *len, u8 *mac);
|
||||||
|
#else /* CONFIG_FIPS */
|
||||||
|
#define md5_vector_non_fips_allow md5_vector
|
||||||
|
#endif /* CONFIG_FIPS */
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* sha1_vector - SHA-1 hash for data vector
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len,
|
||||||
|
u8 *mac);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* fips186_2-prf - NIST FIPS Publication 186-2 change notice 1 PRF
|
||||||
|
* @seed: Seed/key for the PRF
|
||||||
|
* @seed_len: Seed length in bytes
|
||||||
|
* @x: Buffer for PRF output
|
||||||
|
* @xlen: Output length in bytes
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* This function implements random number generation specified in NIST FIPS
|
||||||
|
* Publication 186-2 for EAP-SIM. This PRF uses a function that is similar to
|
||||||
|
* SHA-1, but has different message padding.
|
||||||
|
*/
|
||||||
|
int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
|
||||||
|
size_t xlen);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* sha256_vector - SHA256 hash for data vector
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len,
|
||||||
|
u8 *mac);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* des_encrypt - Encrypt one block with DES
|
||||||
|
* @clear: 8 octets (in)
|
||||||
|
* @key: 7 octets (in) (no parity bits included)
|
||||||
|
* @cypher: 8 octets (out)
|
||||||
|
*/
|
||||||
|
void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_encrypt_init - Initialize AES for encryption
|
||||||
|
* @key: Encryption key
|
||||||
|
* @len: Key length in bytes (usually 16, i.e., 128 bits)
|
||||||
|
* Returns: Pointer to context data or %NULL on failure
|
||||||
|
*/
|
||||||
|
void * aes_encrypt_init(const u8 *key, size_t len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_encrypt - Encrypt one AES block
|
||||||
|
* @ctx: Context pointer from aes_encrypt_init()
|
||||||
|
* @plain: Plaintext data to be encrypted (16 bytes)
|
||||||
|
* @crypt: Buffer for the encrypted data (16 bytes)
|
||||||
|
*/
|
||||||
|
void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_encrypt_deinit - Deinitialize AES encryption
|
||||||
|
* @ctx: Context pointer from aes_encrypt_init()
|
||||||
|
*/
|
||||||
|
void aes_encrypt_deinit(void *ctx);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_decrypt_init - Initialize AES for decryption
|
||||||
|
* @key: Decryption key
|
||||||
|
* @len: Key length in bytes (usually 16, i.e., 128 bits)
|
||||||
|
* Returns: Pointer to context data or %NULL on failure
|
||||||
|
*/
|
||||||
|
void * aes_decrypt_init(const u8 *key, size_t len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_decrypt - Decrypt one AES block
|
||||||
|
* @ctx: Context pointer from aes_encrypt_init()
|
||||||
|
* @crypt: Encrypted data (16 bytes)
|
||||||
|
* @plain: Buffer for the decrypted data (16 bytes)
|
||||||
|
*/
|
||||||
|
void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_decrypt_deinit - Deinitialize AES decryption
|
||||||
|
* @ctx: Context pointer from aes_encrypt_init()
|
||||||
|
*/
|
||||||
|
void aes_decrypt_deinit(void *ctx);
|
||||||
|
|
||||||
|
|
||||||
|
enum crypto_hash_alg {
|
||||||
|
CRYPTO_HASH_ALG_MD5, CRYPTO_HASH_ALG_SHA1,
|
||||||
|
CRYPTO_HASH_ALG_HMAC_MD5, CRYPTO_HASH_ALG_HMAC_SHA1
|
||||||
|
};
|
||||||
|
|
||||||
|
struct crypto_hash;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_hash_init - Initialize hash/HMAC function
|
||||||
|
* @alg: Hash algorithm
|
||||||
|
* @key: Key for keyed hash (e.g., HMAC) or %NULL if not needed
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* Returns: Pointer to hash context to use with other hash functions or %NULL
|
||||||
|
* on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key,
|
||||||
|
size_t key_len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_hash_update - Add data to hash calculation
|
||||||
|
* @ctx: Context pointer from crypto_hash_init()
|
||||||
|
* @data: Data buffer to add
|
||||||
|
* @len: Length of the buffer
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_hash_finish - Complete hash calculation
|
||||||
|
* @ctx: Context pointer from crypto_hash_init()
|
||||||
|
* @hash: Buffer for hash value or %NULL if caller is just freeing the hash
|
||||||
|
* context
|
||||||
|
* @len: Pointer to length of the buffer or %NULL if caller is just freeing the
|
||||||
|
* hash context; on return, this is set to the actual length of the hash value
|
||||||
|
* Returns: 0 on success, -1 if buffer is too small (len set to needed length),
|
||||||
|
* or -2 on other failures (including failed crypto_hash_update() operations)
|
||||||
|
*
|
||||||
|
* This function calculates the hash value and frees the context buffer that
|
||||||
|
* was used for hash calculation.
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int crypto_hash_finish(struct crypto_hash *ctx, u8 *hash, size_t *len);
|
||||||
|
|
||||||
|
|
||||||
|
enum crypto_cipher_alg {
|
||||||
|
CRYPTO_CIPHER_NULL = 0, CRYPTO_CIPHER_ALG_AES, CRYPTO_CIPHER_ALG_3DES,
|
||||||
|
CRYPTO_CIPHER_ALG_DES, CRYPTO_CIPHER_ALG_RC2, CRYPTO_CIPHER_ALG_RC4
|
||||||
|
};
|
||||||
|
|
||||||
|
struct crypto_cipher;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_cipher_init - Initialize block/stream cipher function
|
||||||
|
* @alg: Cipher algorithm
|
||||||
|
* @iv: Initialization vector for block ciphers or %NULL for stream ciphers
|
||||||
|
* @key: Cipher key
|
||||||
|
* @key_len: Length of key in bytes
|
||||||
|
* Returns: Pointer to cipher context to use with other cipher functions or
|
||||||
|
* %NULL on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
|
||||||
|
const u8 *iv, const u8 *key,
|
||||||
|
size_t key_len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_cipher_encrypt - Cipher encrypt
|
||||||
|
* @ctx: Context pointer from crypto_cipher_init()
|
||||||
|
* @plain: Plaintext to cipher
|
||||||
|
* @crypt: Resulting ciphertext
|
||||||
|
* @len: Length of the plaintext
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int __must_check crypto_cipher_encrypt(struct crypto_cipher *ctx,
|
||||||
|
const u8 *plain, u8 *crypt, size_t len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_cipher_decrypt - Cipher decrypt
|
||||||
|
* @ctx: Context pointer from crypto_cipher_init()
|
||||||
|
* @crypt: Ciphertext to decrypt
|
||||||
|
* @plain: Resulting plaintext
|
||||||
|
* @len: Length of the cipher text
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int __must_check crypto_cipher_decrypt(struct crypto_cipher *ctx,
|
||||||
|
const u8 *crypt, u8 *plain, size_t len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_cipher_decrypt - Free cipher context
|
||||||
|
* @ctx: Context pointer from crypto_cipher_init()
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
void crypto_cipher_deinit(struct crypto_cipher *ctx);
|
||||||
|
|
||||||
|
|
||||||
|
struct crypto_public_key;
|
||||||
|
struct crypto_private_key;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_public_key_import - Import an RSA public key
|
||||||
|
* @key: Key buffer (DER encoded RSA public key)
|
||||||
|
* @len: Key buffer length in bytes
|
||||||
|
* Returns: Pointer to the public key or %NULL on failure
|
||||||
|
*
|
||||||
|
* This function can just return %NULL if the crypto library supports X.509
|
||||||
|
* parsing. In that case, crypto_public_key_from_cert() is used to import the
|
||||||
|
* public key from a certificate.
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
struct crypto_public_key * crypto_public_key_import(const u8 *key, size_t len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_private_key_import - Import an RSA private key
|
||||||
|
* @key: Key buffer (DER encoded RSA private key)
|
||||||
|
* @len: Key buffer length in bytes
|
||||||
|
* @passwd: Key encryption password or %NULL if key is not encrypted
|
||||||
|
* Returns: Pointer to the private key or %NULL on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
struct crypto_private_key * crypto_private_key_import(const u8 *key,
|
||||||
|
size_t len,
|
||||||
|
const char *passwd);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_public_key_from_cert - Import an RSA public key from a certificate
|
||||||
|
* @buf: DER encoded X.509 certificate
|
||||||
|
* @len: Certificate buffer length in bytes
|
||||||
|
* Returns: Pointer to public key or %NULL on failure
|
||||||
|
*
|
||||||
|
* This function can just return %NULL if the crypto library does not support
|
||||||
|
* X.509 parsing. In that case, internal code will be used to parse the
|
||||||
|
* certificate and public key is imported using crypto_public_key_import().
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
struct crypto_public_key * crypto_public_key_from_cert(const u8 *buf,
|
||||||
|
size_t len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5)
|
||||||
|
* @key: Public key
|
||||||
|
* @in: Plaintext buffer
|
||||||
|
* @inlen: Length of plaintext buffer in bytes
|
||||||
|
* @out: Output buffer for encrypted data
|
||||||
|
* @outlen: Length of output buffer in bytes; set to used length on success
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int __must_check crypto_public_key_encrypt_pkcs1_v15(
|
||||||
|
struct crypto_public_key *key, const u8 *in, size_t inlen,
|
||||||
|
u8 *out, size_t *outlen);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_private_key_decrypt_pkcs1_v15 - Private key decryption (PKCS #1 v1.5)
|
||||||
|
* @key: Private key
|
||||||
|
* @in: Encrypted buffer
|
||||||
|
* @inlen: Length of encrypted buffer in bytes
|
||||||
|
* @out: Output buffer for encrypted data
|
||||||
|
* @outlen: Length of output buffer in bytes; set to used length on success
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int __must_check crypto_private_key_decrypt_pkcs1_v15(
|
||||||
|
struct crypto_private_key *key, const u8 *in, size_t inlen,
|
||||||
|
u8 *out, size_t *outlen);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_private_key_sign_pkcs1 - Sign with private key (PKCS #1)
|
||||||
|
* @key: Private key from crypto_private_key_import()
|
||||||
|
* @in: Plaintext buffer
|
||||||
|
* @inlen: Length of plaintext buffer in bytes
|
||||||
|
* @out: Output buffer for encrypted (signed) data
|
||||||
|
* @outlen: Length of output buffer in bytes; set to used length on success
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int __must_check crypto_private_key_sign_pkcs1(struct crypto_private_key *key,
|
||||||
|
const u8 *in, size_t inlen,
|
||||||
|
u8 *out, size_t *outlen);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_public_key_free - Free public key
|
||||||
|
* @key: Public key
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
void crypto_public_key_free(struct crypto_public_key *key);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_private_key_free - Free private key
|
||||||
|
* @key: Private key from crypto_private_key_import()
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
void crypto_private_key_free(struct crypto_private_key *key);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_public_key_decrypt_pkcs1 - Decrypt PKCS #1 signature
|
||||||
|
* @key: Public key
|
||||||
|
* @crypt: Encrypted signature data (using the private key)
|
||||||
|
* @crypt_len: Encrypted signature data length
|
||||||
|
* @plain: Buffer for plaintext (at least crypt_len bytes)
|
||||||
|
* @plain_len: Plaintext length (max buffer size on input, real len on output);
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int __must_check crypto_public_key_decrypt_pkcs1(
|
||||||
|
struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
||||||
|
u8 *plain, size_t *plain_len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_global_init - Initialize crypto wrapper
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int __must_check crypto_global_init(void);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_global_deinit - Deinitialize crypto wrapper
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
void crypto_global_deinit(void);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* crypto_mod_exp - Modular exponentiation of large integers
|
||||||
|
* @base: Base integer (big endian byte array)
|
||||||
|
* @base_len: Length of base integer in bytes
|
||||||
|
* @power: Power integer (big endian byte array)
|
||||||
|
* @power_len: Length of power integer in bytes
|
||||||
|
* @modulus: Modulus integer (big endian byte array)
|
||||||
|
* @modulus_len: Length of modulus integer in bytes
|
||||||
|
* @result: Buffer for the result
|
||||||
|
* @result_len: Result length (max buffer size on input, real len on output)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* This function calculates result = base ^ power mod modulus. modules_len is
|
||||||
|
* used as the maximum size of modulus buffer. It is set to the used size on
|
||||||
|
* success.
|
||||||
|
*
|
||||||
|
* This function is only used with internal TLSv1 implementation
|
||||||
|
* (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
|
||||||
|
* to implement this.
|
||||||
|
*/
|
||||||
|
int __must_check crypto_mod_exp(const u8 *base, size_t base_len,
|
||||||
|
const u8 *power, size_t power_len,
|
||||||
|
const u8 *modulus, size_t modulus_len,
|
||||||
|
u8 *result, size_t *result_len);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* rc4_skip - XOR RC4 stream to given data with skip-stream-start
|
||||||
|
* @key: RC4 key
|
||||||
|
* @keylen: RC4 key length
|
||||||
|
* @skip: number of bytes to skip from the beginning of the RC4 stream
|
||||||
|
* @data: data to be XOR'ed with RC4 stream
|
||||||
|
* @data_len: buf length
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*
|
||||||
|
* Generate RC4 pseudo random stream for the given key, skip beginning of the
|
||||||
|
* stream, and XOR the end result with the data buffer to perform RC4
|
||||||
|
* encryption/decryption.
|
||||||
|
*/
|
||||||
|
int rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
||||||
|
u8 *data, size_t data_len);
|
||||||
|
|
||||||
|
#endif /* CRYPTO_H */
|
23
components/wpa_supplicant/include/crypto/dh_group5.h
Normal file
23
components/wpa_supplicant/include/crypto/dh_group5.h
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
/*
|
||||||
|
* Diffie-Hellman group 5 operations
|
||||||
|
* Copyright (c) 2009, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef DH_GROUP5_H
|
||||||
|
#define DH_GROUP5_H
|
||||||
|
|
||||||
|
void * dh5_init(struct wpabuf **priv, struct wpabuf **publ);
|
||||||
|
struct wpabuf * dh5_derive_shared(void *ctx, const struct wpabuf *peer_public,
|
||||||
|
const struct wpabuf *own_private);
|
||||||
|
void dh5_free(void *ctx);
|
||||||
|
|
||||||
|
#endif /* DH_GROUP5_H */
|
32
components/wpa_supplicant/include/crypto/dh_groups.h
Normal file
32
components/wpa_supplicant/include/crypto/dh_groups.h
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
/*
|
||||||
|
* Diffie-Hellman groups
|
||||||
|
* Copyright (c) 2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef DH_GROUPS_H
|
||||||
|
#define DH_GROUPS_H
|
||||||
|
|
||||||
|
struct dh_group {
|
||||||
|
int id;
|
||||||
|
const u8 *generator;
|
||||||
|
size_t generator_len;
|
||||||
|
const u8 *prime;
|
||||||
|
size_t prime_len;
|
||||||
|
};
|
||||||
|
|
||||||
|
const struct dh_group * dh_groups_get(int id);
|
||||||
|
struct wpabuf * dh_init(const struct dh_group *dh, struct wpabuf **priv);
|
||||||
|
struct wpabuf * dh_derive_shared(const struct wpabuf *peer_public,
|
||||||
|
const struct wpabuf *own_private,
|
||||||
|
const struct dh_group *dh);
|
||||||
|
|
||||||
|
#endif /* DH_GROUPS_H */
|
65
components/wpa_supplicant/include/crypto/includes.h
Normal file
65
components/wpa_supplicant/include/crypto/includes.h
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
/*
|
||||||
|
* wpa_supplicant/hostapd - Default include files
|
||||||
|
* Copyright (c) 2005-2006, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*
|
||||||
|
* This header file is included into all C files so that commonly used header
|
||||||
|
* files can be selected with OS specific ifdef blocks in one place instead of
|
||||||
|
* having to have OS/C library specific selection in many files.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef INCLUDES_H
|
||||||
|
#define INCLUDES_H
|
||||||
|
|
||||||
|
/* Include possible build time configuration before including anything else */
|
||||||
|
//#include "build_config.h" //don't need anymore
|
||||||
|
#ifndef __ets__
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdarg.h>
|
||||||
|
#include <string.h>
|
||||||
|
#ifndef _WIN32_WCE
|
||||||
|
#ifndef CONFIG_TI_COMPILER
|
||||||
|
#include <signal.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#endif /* CONFIG_TI_COMPILER */
|
||||||
|
#include <errno.h>
|
||||||
|
#endif /* _WIN32_WCE */
|
||||||
|
#include <ctype.h>
|
||||||
|
#include <time.h>
|
||||||
|
|
||||||
|
#ifndef CONFIG_TI_COMPILER
|
||||||
|
#ifndef _MSC_VER
|
||||||
|
#include <unistd.h>
|
||||||
|
#endif /* _MSC_VER */
|
||||||
|
#endif /* CONFIG_TI_COMPILER */
|
||||||
|
|
||||||
|
#ifndef CONFIG_NATIVE_WINDOWS
|
||||||
|
#ifndef CONFIG_TI_COMPILER
|
||||||
|
//#include <sys/socket.h>
|
||||||
|
//#include <netinet/in.h>
|
||||||
|
//#include <arpa/inet.h>
|
||||||
|
#ifndef __vxworks
|
||||||
|
#ifndef __SYMBIAN32__
|
||||||
|
//#include <sys/uio.h>
|
||||||
|
#endif /* __SYMBIAN32__ */
|
||||||
|
#include <sys/time.h>
|
||||||
|
#endif /* __vxworks */
|
||||||
|
#endif /* CONFIG_TI_COMPILER */
|
||||||
|
#endif /* CONFIG_NATIVE_WINDOWS */
|
||||||
|
|
||||||
|
#else
|
||||||
|
|
||||||
|
#include "ets_sys.h"
|
||||||
|
|
||||||
|
#endif /* !__ets__ */
|
||||||
|
|
||||||
|
#endif /* INCLUDES_H */
|
35
components/wpa_supplicant/include/crypto/md5.h
Normal file
35
components/wpa_supplicant/include/crypto/md5.h
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
/*
|
||||||
|
* MD5 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2009, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef MD5_H
|
||||||
|
#define MD5_H
|
||||||
|
|
||||||
|
#define MD5_MAC_LEN 16
|
||||||
|
|
||||||
|
int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
|
||||||
|
const u8 *addr[], const size_t *len, u8 *mac);
|
||||||
|
int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
||||||
|
u8 *mac);
|
||||||
|
#ifdef CONFIG_FIPS
|
||||||
|
int hmac_md5_vector_non_fips_allow(const u8 *key, size_t key_len,
|
||||||
|
size_t num_elem, const u8 *addr[],
|
||||||
|
const size_t *len, u8 *mac);
|
||||||
|
int hmac_md5_non_fips_allow(const u8 *key, size_t key_len, const u8 *data,
|
||||||
|
size_t data_len, u8 *mac);
|
||||||
|
#else /* CONFIG_FIPS */
|
||||||
|
#define hmac_md5_vector_non_fips_allow hmac_md5_vector
|
||||||
|
#define hmac_md5_non_fips_allow hmac_md5
|
||||||
|
#endif /* CONFIG_FIPS */
|
||||||
|
|
||||||
|
#endif /* MD5_H */
|
29
components/wpa_supplicant/include/crypto/md5_i.h
Normal file
29
components/wpa_supplicant/include/crypto/md5_i.h
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
/*
|
||||||
|
* MD5 internal definitions
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef MD5_I_H
|
||||||
|
#define MD5_I_H
|
||||||
|
|
||||||
|
struct MD5Context {
|
||||||
|
u32 buf[4];
|
||||||
|
u32 bits[2];
|
||||||
|
u8 in[64];
|
||||||
|
};
|
||||||
|
|
||||||
|
void MD5Init(struct MD5Context *context);
|
||||||
|
void MD5Update(struct MD5Context *context, unsigned char const *buf,
|
||||||
|
unsigned len);
|
||||||
|
void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
||||||
|
|
||||||
|
#endif /* MD5_I_H */
|
34
components/wpa_supplicant/include/crypto/random.h
Normal file
34
components/wpa_supplicant/include/crypto/random.h
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
/*
|
||||||
|
* Random number generator
|
||||||
|
* Copyright (c) 2010-2011, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef RANDOM_H
|
||||||
|
#define RANDOM_H
|
||||||
|
|
||||||
|
#define CONFIG_NO_RANDOM_POOL
|
||||||
|
|
||||||
|
#ifdef CONFIG_NO_RANDOM_POOL
|
||||||
|
#define random_init(e) do { } while (0)
|
||||||
|
#define random_deinit() do { } while (0)
|
||||||
|
#define random_add_randomness(b, l) do { } while (0)
|
||||||
|
#define random_get_bytes(b, l) os_get_random((b), (l))
|
||||||
|
#define random_pool_ready() 1
|
||||||
|
#define random_mark_pool_ready() do { } while (0)
|
||||||
|
#else /* CONFIG_NO_RANDOM_POOL */
|
||||||
|
void random_init(const char *entropy_file);
|
||||||
|
void random_deinit(void);
|
||||||
|
void random_add_randomness(const void *buf, size_t len);
|
||||||
|
int random_get_bytes(void *buf, size_t len);
|
||||||
|
#endif /* CONFIG_NO_RANDOM_POOL */
|
||||||
|
|
||||||
|
#endif /* RANDOM_H */
|
33
components/wpa_supplicant/include/crypto/sha1.h
Normal file
33
components/wpa_supplicant/include/crypto/sha1.h
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
/*
|
||||||
|
* SHA1 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2009, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef SHA1_H
|
||||||
|
#define SHA1_H
|
||||||
|
|
||||||
|
#define SHA1_MAC_LEN 20
|
||||||
|
|
||||||
|
int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
|
||||||
|
const u8 *addr[], const size_t *len, u8 *mac);
|
||||||
|
int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
||||||
|
u8 *mac);
|
||||||
|
int sha1_prf(const u8 *key, size_t key_len, const char *label,
|
||||||
|
const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
|
||||||
|
int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
||||||
|
const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
|
||||||
|
int __must_check tls_prf(const u8 *secret, size_t secret_len,
|
||||||
|
const char *label, const u8 *seed, size_t seed_len,
|
||||||
|
u8 *out, size_t outlen);
|
||||||
|
int pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len,
|
||||||
|
int iterations, u8 *buf, size_t buflen);
|
||||||
|
#endif /* SHA1_H */
|
29
components/wpa_supplicant/include/crypto/sha1_i.h
Normal file
29
components/wpa_supplicant/include/crypto/sha1_i.h
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
/*
|
||||||
|
* SHA1 internal definitions
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef SHA1_I_H
|
||||||
|
#define SHA1_I_H
|
||||||
|
|
||||||
|
struct SHA1Context {
|
||||||
|
u32 state[5];
|
||||||
|
u32 count[2];
|
||||||
|
unsigned char buffer[64];
|
||||||
|
};
|
||||||
|
|
||||||
|
void SHA1Init(struct SHA1Context *context);
|
||||||
|
void SHA1Update(struct SHA1Context *context, const void *data, u32 len);
|
||||||
|
void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
|
||||||
|
void SHA1Transform(u32 state[5], const unsigned char buffer[64]);
|
||||||
|
|
||||||
|
#endif /* SHA1_I_H */
|
27
components/wpa_supplicant/include/crypto/sha256.h
Normal file
27
components/wpa_supplicant/include/crypto/sha256.h
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
/*
|
||||||
|
* SHA256 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2006, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef SHA256_H
|
||||||
|
#define SHA256_H
|
||||||
|
|
||||||
|
#define SHA256_MAC_LEN 32
|
||||||
|
|
||||||
|
void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
|
||||||
|
const u8 *addr[], const size_t *len, u8 *mac);
|
||||||
|
void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
|
||||||
|
size_t data_len, u8 *mac);
|
||||||
|
void sha256_prf(const u8 *key, size_t key_len, const char *label,
|
||||||
|
const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
|
||||||
|
|
||||||
|
#endif /* SHA256_H */
|
37
components/wpa_supplicant/include/crypto/wepkey.h
Normal file
37
components/wpa_supplicant/include/crypto/wepkey.h
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
/*
|
||||||
|
* wepkey.h - Generate WEP keys from a passphrase
|
||||||
|
*
|
||||||
|
* Copyright (C) 2008 by OpenMoko, Inc.
|
||||||
|
* Written by Werner Almesberger <werner@openmoko.org>
|
||||||
|
* All Rights Reserved
|
||||||
|
*
|
||||||
|
* This library is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU Lesser General Public
|
||||||
|
* License as published by the Free Software Foundation; either
|
||||||
|
* version 2.1 of the License, or (at your option) any later version.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* wpkey_64 and wepkey_128 implement the keyphrase hash algorithm found in many
|
||||||
|
* (but not all) common access points, including the Linksys WRT54G series.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef WEPKEY_H
|
||||||
|
#define WEPKEY_H
|
||||||
|
|
||||||
|
#include "c_types.h"
|
||||||
|
|
||||||
|
|
||||||
|
#define WEPKEY_64_BYTES 5
|
||||||
|
#define WEPKEY_128_BYTES 13
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
* "size" is the size of the buffer at "out", in bytes. It has to be at least 5
|
||||||
|
* or 13 bytes, respectively. "n" is the key index, in the range 0...3.
|
||||||
|
*/
|
||||||
|
|
||||||
|
size_t wepkey_64(uint8_t *out, size_t size, const char *in, int n);
|
||||||
|
size_t wepkey_128(uint8_t *out, size_t size, const char *in, int n);
|
||||||
|
|
||||||
|
#endif /* !WEPKEY_H */
|
48
components/wpa_supplicant/src/crypto/Makefile
Normal file
48
components/wpa_supplicant/src/crypto/Makefile
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
|
||||||
|
#############################################################
|
||||||
|
# Required variables for each makefile
|
||||||
|
# Discard this section from all parent makefiles
|
||||||
|
# Expected variables (with automatic defaults):
|
||||||
|
# CSRCS (all "C" files in the dir)
|
||||||
|
# SUBDIRS (all subdirs with a Makefile)
|
||||||
|
# GEN_LIBS - list of libs to be generated ()
|
||||||
|
# GEN_IMAGES - list of images to be generated ()
|
||||||
|
# COMPONENTS_xxx - a list of libs/objs in the form
|
||||||
|
# subdir/lib to be extracted and rolled up into
|
||||||
|
# a generated lib/image xxx.a ()
|
||||||
|
#
|
||||||
|
ifndef PDIR
|
||||||
|
|
||||||
|
GEN_LIBS = libcrypto.a
|
||||||
|
|
||||||
|
endif
|
||||||
|
|
||||||
|
|
||||||
|
#############################################################
|
||||||
|
# Configuration i.e. compile options etc.
|
||||||
|
# Target specific stuff (defines etc.) goes in here!
|
||||||
|
# Generally values applying to a tree are captured in the
|
||||||
|
# makefile at its root level - these are then overridden
|
||||||
|
# for a subtree within the makefile rooted therein
|
||||||
|
#
|
||||||
|
DEFINES += -DEMBEDDED_SUPP -D__ets__
|
||||||
|
CCFLAGS += -ffunction-sections -fdata-sections
|
||||||
|
|
||||||
|
#############################################################
|
||||||
|
# Recursion Magic - Don't touch this!!
|
||||||
|
#
|
||||||
|
# Each subtree potentially has an include directory
|
||||||
|
# corresponding to the common APIs applicable to modules
|
||||||
|
# rooted at that subtree. Accordingly, the INCLUDE PATH
|
||||||
|
# of a module can only contain the include directories up
|
||||||
|
# its parent path, and not its siblings
|
||||||
|
#
|
||||||
|
# Required for each makefile to inherit from the parent
|
||||||
|
#
|
||||||
|
|
||||||
|
INCLUDES := $(INCLUDES) -I $(PDIR)include
|
||||||
|
INCLUDES += -I ./
|
||||||
|
INCLUDES += -I ../../rom/include
|
||||||
|
INCLUDES += -I ../../include/ets
|
||||||
|
PDIR := ../$(PDIR)
|
||||||
|
sinclude $(PDIR)Makefile
|
88
components/wpa_supplicant/src/crypto/aes-cbc.c
Normal file
88
components/wpa_supplicant/src/crypto/aes-cbc.c
Normal file
@ -0,0 +1,88 @@
|
|||||||
|
/*
|
||||||
|
* AES-128 CBC
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/aes.h"
|
||||||
|
#include "crypto/aes_wrap.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_128_cbc_encrypt - AES-128 CBC encryption
|
||||||
|
* @key: Encryption key
|
||||||
|
* @iv: Encryption IV for CBC mode (16 bytes)
|
||||||
|
* @data: Data to encrypt in-place
|
||||||
|
* @data_len: Length of data in bytes (must be divisible by 16)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len)
|
||||||
|
{
|
||||||
|
void *ctx;
|
||||||
|
u8 cbc[AES_BLOCK_SIZE];
|
||||||
|
u8 *pos = data;
|
||||||
|
int i, j, blocks;
|
||||||
|
|
||||||
|
ctx = aes_encrypt_init(key, 16);
|
||||||
|
if (ctx == NULL)
|
||||||
|
return -1;
|
||||||
|
os_memcpy(cbc, iv, AES_BLOCK_SIZE);
|
||||||
|
|
||||||
|
blocks = data_len / AES_BLOCK_SIZE;
|
||||||
|
for (i = 0; i < blocks; i++) {
|
||||||
|
for (j = 0; j < AES_BLOCK_SIZE; j++)
|
||||||
|
cbc[j] ^= pos[j];
|
||||||
|
aes_encrypt(ctx, cbc, cbc);
|
||||||
|
os_memcpy(pos, cbc, AES_BLOCK_SIZE);
|
||||||
|
pos += AES_BLOCK_SIZE;
|
||||||
|
}
|
||||||
|
aes_encrypt_deinit(ctx);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_128_cbc_decrypt - AES-128 CBC decryption
|
||||||
|
* @key: Decryption key
|
||||||
|
* @iv: Decryption IV for CBC mode (16 bytes)
|
||||||
|
* @data: Data to decrypt in-place
|
||||||
|
* @data_len: Length of data in bytes (must be divisible by 16)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len)
|
||||||
|
{
|
||||||
|
void *ctx;
|
||||||
|
u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE];
|
||||||
|
u8 *pos = data;
|
||||||
|
int i, j, blocks;
|
||||||
|
|
||||||
|
ctx = aes_decrypt_init(key, 16);
|
||||||
|
if (ctx == NULL)
|
||||||
|
return -1;
|
||||||
|
os_memcpy(cbc, iv, AES_BLOCK_SIZE);
|
||||||
|
|
||||||
|
blocks = data_len / AES_BLOCK_SIZE;
|
||||||
|
for (i = 0; i < blocks; i++) {
|
||||||
|
os_memcpy(tmp, pos, AES_BLOCK_SIZE);
|
||||||
|
aes_decrypt(ctx, pos, pos);
|
||||||
|
for (j = 0; j < AES_BLOCK_SIZE; j++)
|
||||||
|
pos[j] ^= cbc[j];
|
||||||
|
os_memcpy(cbc, tmp, AES_BLOCK_SIZE);
|
||||||
|
pos += AES_BLOCK_SIZE;
|
||||||
|
}
|
||||||
|
aes_decrypt_deinit(ctx);
|
||||||
|
return 0;
|
||||||
|
}
|
170
components/wpa_supplicant/src/crypto/aes-internal-dec.c
Normal file
170
components/wpa_supplicant/src/crypto/aes-internal-dec.c
Normal file
@ -0,0 +1,170 @@
|
|||||||
|
/*
|
||||||
|
* AES (Rijndael) cipher - decrypt
|
||||||
|
*
|
||||||
|
* Modifications to public domain implementation:
|
||||||
|
* - support only 128-bit keys
|
||||||
|
* - cleanup
|
||||||
|
* - use C pre-processor to make it easier to change S table access
|
||||||
|
* - added option (AES_SMALL_TABLES) for reducing code size by about 8 kB at
|
||||||
|
* cost of reduced throughput (quite small difference on Pentium 4,
|
||||||
|
* 10-25% when using -O1 or -O2 optimization)
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
#include "crypto/aes_i.h"
|
||||||
|
|
||||||
|
#ifdef MEMLEAK_DEBUG
|
||||||
|
static const char mem_debug_file[] ICACHE_RODATA_ATTR = __FILE__;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
//static unsigned char aes_priv_buf[AES_PRIV_SIZE];
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Expand the cipher key into the decryption key schedule.
|
||||||
|
*
|
||||||
|
* @return the number of rounds for the given cipher key size.
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
rijndaelKeySetupDec(u32 rk[/*44*/], const u8 cipherKey[])
|
||||||
|
{
|
||||||
|
int Nr = 10, i, j;
|
||||||
|
u32 temp;
|
||||||
|
|
||||||
|
/* expand the cipher key: */
|
||||||
|
rijndaelKeySetupEnc(rk, cipherKey);
|
||||||
|
/* invert the order of the round keys: */
|
||||||
|
for (i = 0, j = 4*Nr; i < j; i += 4, j -= 4) {
|
||||||
|
temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp;
|
||||||
|
temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
|
||||||
|
temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
|
||||||
|
temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
|
||||||
|
}
|
||||||
|
/* apply the inverse MixColumn transform to all round keys but the
|
||||||
|
* first and the last: */
|
||||||
|
for (i = 1; i < Nr; i++) {
|
||||||
|
rk += 4;
|
||||||
|
for (j = 0; j < 4; j++) {
|
||||||
|
rk[j] = TD0_(TE4((rk[j] >> 24) )) ^
|
||||||
|
TD1_(TE4((rk[j] >> 16) & 0xff)) ^
|
||||||
|
TD2_(TE4((rk[j] >> 8) & 0xff)) ^
|
||||||
|
TD3_(TE4((rk[j] ) & 0xff));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void * ICACHE_FLASH_ATTR
|
||||||
|
aes_decrypt_init(const u8 *key, size_t len)
|
||||||
|
{
|
||||||
|
u32 *rk;
|
||||||
|
if (len != 16)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
rk = os_malloc(AES_PRIV_SIZE);
|
||||||
|
if (rk == NULL)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
rijndaelKeySetupDec(rk, key);
|
||||||
|
return rk;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void ICACHE_FLASH_ATTR
|
||||||
|
rijndaelDecrypt(const u32 rk[/*44*/], const u8 ct[16], u8 pt[16])
|
||||||
|
{
|
||||||
|
u32 s0, s1, s2, s3, t0, t1, t2, t3;
|
||||||
|
const int Nr = 10;
|
||||||
|
#ifndef FULL_UNROLL
|
||||||
|
int r;
|
||||||
|
#endif /* ?FULL_UNROLL */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* map byte array block to cipher state
|
||||||
|
* and add initial round key:
|
||||||
|
*/
|
||||||
|
s0 = GETU32(ct ) ^ rk[0];
|
||||||
|
s1 = GETU32(ct + 4) ^ rk[1];
|
||||||
|
s2 = GETU32(ct + 8) ^ rk[2];
|
||||||
|
s3 = GETU32(ct + 12) ^ rk[3];
|
||||||
|
|
||||||
|
#define ROUND(i,d,s) \
|
||||||
|
d##0 = TD0(s##0) ^ TD1(s##3) ^ TD2(s##2) ^ TD3(s##1) ^ rk[4 * i]; \
|
||||||
|
d##1 = TD0(s##1) ^ TD1(s##0) ^ TD2(s##3) ^ TD3(s##2) ^ rk[4 * i + 1]; \
|
||||||
|
d##2 = TD0(s##2) ^ TD1(s##1) ^ TD2(s##0) ^ TD3(s##3) ^ rk[4 * i + 2]; \
|
||||||
|
d##3 = TD0(s##3) ^ TD1(s##2) ^ TD2(s##1) ^ TD3(s##0) ^ rk[4 * i + 3]
|
||||||
|
|
||||||
|
#ifdef FULL_UNROLL
|
||||||
|
|
||||||
|
ROUND(1,t,s);
|
||||||
|
ROUND(2,s,t);
|
||||||
|
ROUND(3,t,s);
|
||||||
|
ROUND(4,s,t);
|
||||||
|
ROUND(5,t,s);
|
||||||
|
ROUND(6,s,t);
|
||||||
|
ROUND(7,t,s);
|
||||||
|
ROUND(8,s,t);
|
||||||
|
ROUND(9,t,s);
|
||||||
|
|
||||||
|
rk += Nr << 2;
|
||||||
|
|
||||||
|
#else /* !FULL_UNROLL */
|
||||||
|
|
||||||
|
/* Nr - 1 full rounds: */
|
||||||
|
r = Nr >> 1;
|
||||||
|
for (;;) {
|
||||||
|
ROUND(1,t,s);
|
||||||
|
rk += 8;
|
||||||
|
if (--r == 0)
|
||||||
|
break;
|
||||||
|
ROUND(0,s,t);
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif /* ?FULL_UNROLL */
|
||||||
|
|
||||||
|
#undef ROUND
|
||||||
|
|
||||||
|
u8 *Td4s;
|
||||||
|
Td4s = (u8 *)os_malloc(256);
|
||||||
|
os_memcpy(Td4s, Td4s_rom, 256);
|
||||||
|
/*
|
||||||
|
* apply last round and
|
||||||
|
* map cipher state to byte array block:
|
||||||
|
*/
|
||||||
|
s0 = TD41(t0) ^ TD42(t3) ^ TD43(t2) ^ TD44(t1) ^ rk[0];
|
||||||
|
PUTU32(pt , s0);
|
||||||
|
s1 = TD41(t1) ^ TD42(t0) ^ TD43(t3) ^ TD44(t2) ^ rk[1];
|
||||||
|
PUTU32(pt + 4, s1);
|
||||||
|
s2 = TD41(t2) ^ TD42(t1) ^ TD43(t0) ^ TD44(t3) ^ rk[2];
|
||||||
|
PUTU32(pt + 8, s2);
|
||||||
|
s3 = TD41(t3) ^ TD42(t2) ^ TD43(t1) ^ TD44(t0) ^ rk[3];
|
||||||
|
PUTU32(pt + 12, s3);
|
||||||
|
|
||||||
|
os_free(Td4s);
|
||||||
|
}
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
aes_decrypt(void *ctx, const u8 *crypt, u8 *plain)
|
||||||
|
{
|
||||||
|
rijndaelDecrypt(ctx, crypt, plain);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
aes_decrypt_deinit(void *ctx)
|
||||||
|
{
|
||||||
|
os_memset(ctx, 0, AES_PRIV_SIZE);
|
||||||
|
os_free(ctx);
|
||||||
|
}
|
125
components/wpa_supplicant/src/crypto/aes-internal-enc.c
Normal file
125
components/wpa_supplicant/src/crypto/aes-internal-enc.c
Normal file
@ -0,0 +1,125 @@
|
|||||||
|
/*
|
||||||
|
* AES (Rijndael) cipher - encrypt
|
||||||
|
*
|
||||||
|
* Modifications to public domain implementation:
|
||||||
|
* - support only 128-bit keys
|
||||||
|
* - cleanup
|
||||||
|
* - use C pre-processor to make it easier to change S table access
|
||||||
|
* - added option (AES_SMALL_TABLES) for reducing code size by about 8 kB at
|
||||||
|
* cost of reduced throughput (quite small difference on Pentium 4,
|
||||||
|
* 10-25% when using -O1 or -O2 optimization)
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
#include "crypto/aes_i.h"
|
||||||
|
|
||||||
|
#ifdef MEMLEAK_DEBUG
|
||||||
|
static const char mem_debug_file[] ICACHE_RODATA_ATTR = __FILE__;
|
||||||
|
#endif
|
||||||
|
#include "os.h"
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR rijndaelEncrypt(const u32 rk[/*44*/], const u8 pt[16], u8 ct[16])
|
||||||
|
{
|
||||||
|
u32 s0, s1, s2, s3, t0, t1, t2, t3;
|
||||||
|
const int Nr = 10;
|
||||||
|
#ifndef FULL_UNROLL
|
||||||
|
int r;
|
||||||
|
#endif /* ?FULL_UNROLL */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* map byte array block to cipher state
|
||||||
|
* and add initial round key:
|
||||||
|
*/
|
||||||
|
s0 = GETU32(pt ) ^ rk[0];
|
||||||
|
s1 = GETU32(pt + 4) ^ rk[1];
|
||||||
|
s2 = GETU32(pt + 8) ^ rk[2];
|
||||||
|
s3 = GETU32(pt + 12) ^ rk[3];
|
||||||
|
|
||||||
|
#define ROUND(i,d,s) \
|
||||||
|
d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \
|
||||||
|
d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \
|
||||||
|
d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \
|
||||||
|
d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3]
|
||||||
|
|
||||||
|
#ifdef FULL_UNROLL
|
||||||
|
|
||||||
|
ROUND(1,t,s);
|
||||||
|
ROUND(2,s,t);
|
||||||
|
ROUND(3,t,s);
|
||||||
|
ROUND(4,s,t);
|
||||||
|
ROUND(5,t,s);
|
||||||
|
ROUND(6,s,t);
|
||||||
|
ROUND(7,t,s);
|
||||||
|
ROUND(8,s,t);
|
||||||
|
ROUND(9,t,s);
|
||||||
|
|
||||||
|
rk += Nr << 2;
|
||||||
|
|
||||||
|
#else /* !FULL_UNROLL */
|
||||||
|
|
||||||
|
/* Nr - 1 full rounds: */
|
||||||
|
r = Nr >> 1;
|
||||||
|
for (;;) {
|
||||||
|
ROUND(1,t,s);
|
||||||
|
rk += 8;
|
||||||
|
if (--r == 0)
|
||||||
|
break;
|
||||||
|
ROUND(0,s,t);
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif /* ?FULL_UNROLL */
|
||||||
|
|
||||||
|
#undef ROUND
|
||||||
|
|
||||||
|
/*
|
||||||
|
* apply last round and
|
||||||
|
* map cipher state to byte array block:
|
||||||
|
*/
|
||||||
|
s0 = TE41(t0) ^ TE42(t1) ^ TE43(t2) ^ TE44(t3) ^ rk[0];
|
||||||
|
PUTU32(ct , s0);
|
||||||
|
s1 = TE41(t1) ^ TE42(t2) ^ TE43(t3) ^ TE44(t0) ^ rk[1];
|
||||||
|
PUTU32(ct + 4, s1);
|
||||||
|
s2 = TE41(t2) ^ TE42(t3) ^ TE43(t0) ^ TE44(t1) ^ rk[2];
|
||||||
|
PUTU32(ct + 8, s2);
|
||||||
|
s3 = TE41(t3) ^ TE42(t0) ^ TE43(t1) ^ TE44(t2) ^ rk[3];
|
||||||
|
PUTU32(ct + 12, s3);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void * ICACHE_FLASH_ATTR aes_encrypt_init(const u8 *key, size_t len)
|
||||||
|
{
|
||||||
|
u32 *rk;
|
||||||
|
if (len != 16)
|
||||||
|
return NULL;
|
||||||
|
rk = (u32 *)os_malloc(AES_PRIV_SIZE);
|
||||||
|
if (rk == NULL)
|
||||||
|
return NULL;
|
||||||
|
rijndaelKeySetupEnc(rk, key);
|
||||||
|
return rk;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR aes_encrypt(void *ctx, const u8 *plain, u8 *crypt)
|
||||||
|
{
|
||||||
|
rijndaelEncrypt(ctx, plain, crypt);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR aes_encrypt_deinit(void *ctx)
|
||||||
|
{
|
||||||
|
os_memset(ctx, 0, AES_PRIV_SIZE);
|
||||||
|
os_free(ctx);
|
||||||
|
}
|
806
components/wpa_supplicant/src/crypto/aes-internal.c
Normal file
806
components/wpa_supplicant/src/crypto/aes-internal.c
Normal file
@ -0,0 +1,806 @@
|
|||||||
|
/*
|
||||||
|
* AES (Rijndael) cipher
|
||||||
|
*
|
||||||
|
* Modifications to public domain implementation:
|
||||||
|
* - support only 128-bit keys
|
||||||
|
* - cleanup
|
||||||
|
* - use C pre-processor to make it easier to change S table access
|
||||||
|
* - added option (AES_SMALL_TABLES) for reducing code size by about 8 kB at
|
||||||
|
* cost of reduced throughput (quite small difference on Pentium 4,
|
||||||
|
* 10-25% when using -O1 or -O2 optimization)
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
#include "crypto/aes_i.h"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* rijndael-alg-fst.c
|
||||||
|
*
|
||||||
|
* @version 3.0 (December 2000)
|
||||||
|
*
|
||||||
|
* Optimised ANSI C code for the Rijndael cipher (now AES)
|
||||||
|
*
|
||||||
|
* @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
|
||||||
|
* @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
|
||||||
|
* @author Paulo Barreto <paulo.barreto@terra.com.br>
|
||||||
|
*
|
||||||
|
* This code is hereby placed in the public domain.
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
||||||
|
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
||||||
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
||||||
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||||
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||||
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
||||||
|
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||||
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||||
|
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||||
|
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
Te0[x] = S [x].[02, 01, 01, 03];
|
||||||
|
Te1[x] = S [x].[03, 02, 01, 01];
|
||||||
|
Te2[x] = S [x].[01, 03, 02, 01];
|
||||||
|
Te3[x] = S [x].[01, 01, 03, 02];
|
||||||
|
Te4[x] = S [x].[01, 01, 01, 01];
|
||||||
|
|
||||||
|
Td0[x] = Si[x].[0e, 09, 0d, 0b];
|
||||||
|
Td1[x] = Si[x].[0b, 0e, 09, 0d];
|
||||||
|
Td2[x] = Si[x].[0d, 0b, 0e, 09];
|
||||||
|
Td3[x] = Si[x].[09, 0d, 0b, 0e];
|
||||||
|
Td4[x] = Si[x].[01, 01, 01, 01];
|
||||||
|
*/
|
||||||
|
|
||||||
|
const u32 Te0[256] ICACHE_RODATA_ATTR = {
|
||||||
|
0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
|
||||||
|
0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
|
||||||
|
0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
|
||||||
|
0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
|
||||||
|
0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
|
||||||
|
0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
|
||||||
|
0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
|
||||||
|
0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
|
||||||
|
0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
|
||||||
|
0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
|
||||||
|
0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
|
||||||
|
0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
|
||||||
|
0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
|
||||||
|
0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
|
||||||
|
0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
|
||||||
|
0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
|
||||||
|
0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
|
||||||
|
0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
|
||||||
|
0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
|
||||||
|
0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
|
||||||
|
0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
|
||||||
|
0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
|
||||||
|
0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
|
||||||
|
0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
|
||||||
|
0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
|
||||||
|
0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
|
||||||
|
0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
|
||||||
|
0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
|
||||||
|
0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
|
||||||
|
0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
|
||||||
|
0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
|
||||||
|
0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
|
||||||
|
0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
|
||||||
|
0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
|
||||||
|
0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
|
||||||
|
0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
|
||||||
|
0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
|
||||||
|
0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
|
||||||
|
0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
|
||||||
|
0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
|
||||||
|
0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
|
||||||
|
0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
|
||||||
|
0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
|
||||||
|
0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
|
||||||
|
0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
|
||||||
|
0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
|
||||||
|
0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
|
||||||
|
0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
|
||||||
|
0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
|
||||||
|
0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
|
||||||
|
0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
|
||||||
|
0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
|
||||||
|
0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
|
||||||
|
0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
|
||||||
|
0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
|
||||||
|
0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
|
||||||
|
0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
|
||||||
|
0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
|
||||||
|
0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
|
||||||
|
0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
|
||||||
|
0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
|
||||||
|
0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
|
||||||
|
0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
|
||||||
|
0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
|
||||||
|
};
|
||||||
|
#ifndef AES_SMALL_TABLES
|
||||||
|
const u32 Te1[256] = {
|
||||||
|
0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
|
||||||
|
0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
|
||||||
|
0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
|
||||||
|
0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
|
||||||
|
0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
|
||||||
|
0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
|
||||||
|
0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
|
||||||
|
0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
|
||||||
|
0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
|
||||||
|
0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
|
||||||
|
0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
|
||||||
|
0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
|
||||||
|
0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
|
||||||
|
0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
|
||||||
|
0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
|
||||||
|
0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
|
||||||
|
0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
|
||||||
|
0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
|
||||||
|
0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
|
||||||
|
0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
|
||||||
|
0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
|
||||||
|
0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
|
||||||
|
0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
|
||||||
|
0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
|
||||||
|
0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
|
||||||
|
0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
|
||||||
|
0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
|
||||||
|
0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
|
||||||
|
0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
|
||||||
|
0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
|
||||||
|
0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
|
||||||
|
0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
|
||||||
|
0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
|
||||||
|
0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
|
||||||
|
0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
|
||||||
|
0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
|
||||||
|
0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
|
||||||
|
0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
|
||||||
|
0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
|
||||||
|
0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
|
||||||
|
0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
|
||||||
|
0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
|
||||||
|
0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
|
||||||
|
0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
|
||||||
|
0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
|
||||||
|
0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
|
||||||
|
0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
|
||||||
|
0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
|
||||||
|
0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
|
||||||
|
0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
|
||||||
|
0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
|
||||||
|
0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
|
||||||
|
0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
|
||||||
|
0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
|
||||||
|
0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
|
||||||
|
0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
|
||||||
|
0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
|
||||||
|
0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
|
||||||
|
0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
|
||||||
|
0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
|
||||||
|
0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
|
||||||
|
0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
|
||||||
|
0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
|
||||||
|
0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U,
|
||||||
|
};
|
||||||
|
const u32 Te2[256] = {
|
||||||
|
0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
|
||||||
|
0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
|
||||||
|
0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
|
||||||
|
0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
|
||||||
|
0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
|
||||||
|
0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
|
||||||
|
0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
|
||||||
|
0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
|
||||||
|
0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
|
||||||
|
0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
|
||||||
|
0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
|
||||||
|
0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
|
||||||
|
0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
|
||||||
|
0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
|
||||||
|
0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
|
||||||
|
0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
|
||||||
|
0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
|
||||||
|
0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
|
||||||
|
0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
|
||||||
|
0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
|
||||||
|
0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
|
||||||
|
0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
|
||||||
|
0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
|
||||||
|
0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
|
||||||
|
0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
|
||||||
|
0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
|
||||||
|
0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
|
||||||
|
0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
|
||||||
|
0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
|
||||||
|
0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
|
||||||
|
0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
|
||||||
|
0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
|
||||||
|
0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
|
||||||
|
0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
|
||||||
|
0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
|
||||||
|
0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
|
||||||
|
0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
|
||||||
|
0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
|
||||||
|
0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
|
||||||
|
0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
|
||||||
|
0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
|
||||||
|
0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
|
||||||
|
0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
|
||||||
|
0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
|
||||||
|
0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
|
||||||
|
0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
|
||||||
|
0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
|
||||||
|
0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
|
||||||
|
0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
|
||||||
|
0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
|
||||||
|
0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
|
||||||
|
0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
|
||||||
|
0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
|
||||||
|
0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
|
||||||
|
0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
|
||||||
|
0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
|
||||||
|
0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
|
||||||
|
0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
|
||||||
|
0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
|
||||||
|
0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
|
||||||
|
0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
|
||||||
|
0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
|
||||||
|
0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
|
||||||
|
0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U,
|
||||||
|
};
|
||||||
|
const u32 Te3[256] = {
|
||||||
|
|
||||||
|
0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
|
||||||
|
0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
|
||||||
|
0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
|
||||||
|
0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
|
||||||
|
0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
|
||||||
|
0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
|
||||||
|
0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
|
||||||
|
0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
|
||||||
|
0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
|
||||||
|
0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
|
||||||
|
0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
|
||||||
|
0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
|
||||||
|
0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
|
||||||
|
0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
|
||||||
|
0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
|
||||||
|
0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
|
||||||
|
0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
|
||||||
|
0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
|
||||||
|
0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
|
||||||
|
0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
|
||||||
|
0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
|
||||||
|
0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
|
||||||
|
0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
|
||||||
|
0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
|
||||||
|
0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
|
||||||
|
0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
|
||||||
|
0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
|
||||||
|
0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
|
||||||
|
0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
|
||||||
|
0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
|
||||||
|
0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
|
||||||
|
0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
|
||||||
|
0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
|
||||||
|
0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
|
||||||
|
0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
|
||||||
|
0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
|
||||||
|
0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
|
||||||
|
0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
|
||||||
|
0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
|
||||||
|
0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
|
||||||
|
0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
|
||||||
|
0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
|
||||||
|
0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
|
||||||
|
0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
|
||||||
|
0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
|
||||||
|
0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
|
||||||
|
0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
|
||||||
|
0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
|
||||||
|
0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
|
||||||
|
0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
|
||||||
|
0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
|
||||||
|
0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
|
||||||
|
0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
|
||||||
|
0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
|
||||||
|
0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
|
||||||
|
0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
|
||||||
|
0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
|
||||||
|
0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
|
||||||
|
0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
|
||||||
|
0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
|
||||||
|
0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
|
||||||
|
0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
|
||||||
|
0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
|
||||||
|
0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU,
|
||||||
|
};
|
||||||
|
const u32 Te4[256] = {
|
||||||
|
0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
|
||||||
|
0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
|
||||||
|
0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
|
||||||
|
0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
|
||||||
|
0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
|
||||||
|
0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
|
||||||
|
0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
|
||||||
|
0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
|
||||||
|
0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
|
||||||
|
0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
|
||||||
|
0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
|
||||||
|
0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
|
||||||
|
0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
|
||||||
|
0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
|
||||||
|
0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
|
||||||
|
0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
|
||||||
|
0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
|
||||||
|
0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
|
||||||
|
0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
|
||||||
|
0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
|
||||||
|
0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
|
||||||
|
0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
|
||||||
|
0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
|
||||||
|
0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
|
||||||
|
0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
|
||||||
|
0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
|
||||||
|
0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
|
||||||
|
0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
|
||||||
|
0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
|
||||||
|
0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
|
||||||
|
0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
|
||||||
|
0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
|
||||||
|
0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
|
||||||
|
0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
|
||||||
|
0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
|
||||||
|
0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
|
||||||
|
0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
|
||||||
|
0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
|
||||||
|
0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
|
||||||
|
0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
|
||||||
|
0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
|
||||||
|
0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
|
||||||
|
0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
|
||||||
|
0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
|
||||||
|
0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
|
||||||
|
0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
|
||||||
|
0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
|
||||||
|
0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
|
||||||
|
0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
|
||||||
|
0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
|
||||||
|
0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
|
||||||
|
0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
|
||||||
|
0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
|
||||||
|
0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
|
||||||
|
0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
|
||||||
|
0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
|
||||||
|
0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
|
||||||
|
0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
|
||||||
|
0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
|
||||||
|
0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
|
||||||
|
0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
|
||||||
|
0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
|
||||||
|
0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
|
||||||
|
0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
|
||||||
|
};
|
||||||
|
#endif /* AES_SMALL_TABLES */
|
||||||
|
const u32 Td0[256] ICACHE_RODATA_ATTR = {
|
||||||
|
0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
|
||||||
|
0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
|
||||||
|
0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
|
||||||
|
0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
|
||||||
|
0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
|
||||||
|
0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
|
||||||
|
0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
|
||||||
|
0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
|
||||||
|
0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
|
||||||
|
0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
|
||||||
|
0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
|
||||||
|
0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
|
||||||
|
0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
|
||||||
|
0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
|
||||||
|
0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
|
||||||
|
0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
|
||||||
|
0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
|
||||||
|
0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
|
||||||
|
0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
|
||||||
|
0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
|
||||||
|
0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
|
||||||
|
0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
|
||||||
|
0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
|
||||||
|
0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
|
||||||
|
0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
|
||||||
|
0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
|
||||||
|
0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
|
||||||
|
0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
|
||||||
|
0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
|
||||||
|
0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
|
||||||
|
0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
|
||||||
|
0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
|
||||||
|
0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
|
||||||
|
0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
|
||||||
|
0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
|
||||||
|
0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
|
||||||
|
0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
|
||||||
|
0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
|
||||||
|
0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
|
||||||
|
0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
|
||||||
|
0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
|
||||||
|
0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
|
||||||
|
0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
|
||||||
|
0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
|
||||||
|
0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
|
||||||
|
0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
|
||||||
|
0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
|
||||||
|
0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
|
||||||
|
0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
|
||||||
|
0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
|
||||||
|
0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
|
||||||
|
0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
|
||||||
|
0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
|
||||||
|
0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
|
||||||
|
0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
|
||||||
|
0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
|
||||||
|
0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
|
||||||
|
0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
|
||||||
|
0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
|
||||||
|
0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
|
||||||
|
0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
|
||||||
|
0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
|
||||||
|
0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
|
||||||
|
0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U,
|
||||||
|
};
|
||||||
|
#ifndef AES_SMALL_TABLES
|
||||||
|
const u32 Td1[256] = {
|
||||||
|
0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
|
||||||
|
0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
|
||||||
|
0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
|
||||||
|
0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
|
||||||
|
0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
|
||||||
|
0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
|
||||||
|
0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
|
||||||
|
0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
|
||||||
|
0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
|
||||||
|
0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
|
||||||
|
0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
|
||||||
|
0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
|
||||||
|
0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
|
||||||
|
0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
|
||||||
|
0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
|
||||||
|
0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
|
||||||
|
0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
|
||||||
|
0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
|
||||||
|
0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
|
||||||
|
0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
|
||||||
|
0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
|
||||||
|
0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
|
||||||
|
0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
|
||||||
|
0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
|
||||||
|
0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
|
||||||
|
0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
|
||||||
|
0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
|
||||||
|
0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
|
||||||
|
0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
|
||||||
|
0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
|
||||||
|
0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
|
||||||
|
0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
|
||||||
|
0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
|
||||||
|
0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
|
||||||
|
0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
|
||||||
|
0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
|
||||||
|
0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
|
||||||
|
0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
|
||||||
|
0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
|
||||||
|
0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
|
||||||
|
0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
|
||||||
|
0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
|
||||||
|
0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
|
||||||
|
0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
|
||||||
|
0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
|
||||||
|
0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
|
||||||
|
0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
|
||||||
|
0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
|
||||||
|
0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
|
||||||
|
0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
|
||||||
|
0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
|
||||||
|
0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
|
||||||
|
0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
|
||||||
|
0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
|
||||||
|
0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
|
||||||
|
0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
|
||||||
|
0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
|
||||||
|
0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
|
||||||
|
0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
|
||||||
|
0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
|
||||||
|
0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
|
||||||
|
0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
|
||||||
|
0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
|
||||||
|
0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U,
|
||||||
|
};
|
||||||
|
const u32 Td2[256] = {
|
||||||
|
0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
|
||||||
|
0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
|
||||||
|
0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
|
||||||
|
0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
|
||||||
|
0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
|
||||||
|
0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
|
||||||
|
0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
|
||||||
|
0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
|
||||||
|
0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
|
||||||
|
0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
|
||||||
|
0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
|
||||||
|
0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
|
||||||
|
0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
|
||||||
|
0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
|
||||||
|
0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
|
||||||
|
0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
|
||||||
|
0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
|
||||||
|
0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
|
||||||
|
0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
|
||||||
|
0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
|
||||||
|
|
||||||
|
0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
|
||||||
|
0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
|
||||||
|
0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
|
||||||
|
0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
|
||||||
|
0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
|
||||||
|
0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
|
||||||
|
0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
|
||||||
|
0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
|
||||||
|
0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
|
||||||
|
0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
|
||||||
|
0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
|
||||||
|
0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
|
||||||
|
0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
|
||||||
|
0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
|
||||||
|
0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
|
||||||
|
0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
|
||||||
|
0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
|
||||||
|
0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
|
||||||
|
0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
|
||||||
|
0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
|
||||||
|
0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
|
||||||
|
0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
|
||||||
|
0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
|
||||||
|
0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
|
||||||
|
0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
|
||||||
|
0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
|
||||||
|
0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
|
||||||
|
0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
|
||||||
|
0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
|
||||||
|
0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
|
||||||
|
0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
|
||||||
|
0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
|
||||||
|
0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
|
||||||
|
0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
|
||||||
|
0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
|
||||||
|
0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
|
||||||
|
0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
|
||||||
|
0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
|
||||||
|
0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
|
||||||
|
0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
|
||||||
|
0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
|
||||||
|
0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
|
||||||
|
0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
|
||||||
|
0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U,
|
||||||
|
};
|
||||||
|
const u32 Td3[256] = {
|
||||||
|
0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
|
||||||
|
0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
|
||||||
|
0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
|
||||||
|
0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
|
||||||
|
0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
|
||||||
|
0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
|
||||||
|
0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
|
||||||
|
0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
|
||||||
|
0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
|
||||||
|
0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
|
||||||
|
0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
|
||||||
|
0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
|
||||||
|
0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
|
||||||
|
0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
|
||||||
|
0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
|
||||||
|
0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
|
||||||
|
0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
|
||||||
|
0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
|
||||||
|
0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
|
||||||
|
0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
|
||||||
|
0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
|
||||||
|
0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
|
||||||
|
0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
|
||||||
|
0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
|
||||||
|
0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
|
||||||
|
0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
|
||||||
|
0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
|
||||||
|
0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
|
||||||
|
0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
|
||||||
|
0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
|
||||||
|
0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
|
||||||
|
0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
|
||||||
|
0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
|
||||||
|
0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
|
||||||
|
0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
|
||||||
|
0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
|
||||||
|
0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
|
||||||
|
0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
|
||||||
|
0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
|
||||||
|
0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
|
||||||
|
0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
|
||||||
|
0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
|
||||||
|
0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
|
||||||
|
0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
|
||||||
|
0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
|
||||||
|
0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
|
||||||
|
0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
|
||||||
|
0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
|
||||||
|
0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
|
||||||
|
0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
|
||||||
|
0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
|
||||||
|
0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
|
||||||
|
0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
|
||||||
|
0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
|
||||||
|
0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
|
||||||
|
0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
|
||||||
|
0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
|
||||||
|
0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
|
||||||
|
0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
|
||||||
|
0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
|
||||||
|
0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
|
||||||
|
0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
|
||||||
|
0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
|
||||||
|
0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U,
|
||||||
|
};
|
||||||
|
const u32 Td4[256] = {
|
||||||
|
0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
|
||||||
|
0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
|
||||||
|
0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
|
||||||
|
0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
|
||||||
|
0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
|
||||||
|
0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
|
||||||
|
0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
|
||||||
|
0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
|
||||||
|
0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
|
||||||
|
0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
|
||||||
|
0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
|
||||||
|
0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
|
||||||
|
0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
|
||||||
|
0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
|
||||||
|
0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
|
||||||
|
0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
|
||||||
|
0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
|
||||||
|
0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
|
||||||
|
0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
|
||||||
|
0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
|
||||||
|
0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
|
||||||
|
0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
|
||||||
|
0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
|
||||||
|
0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
|
||||||
|
0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
|
||||||
|
0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
|
||||||
|
0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
|
||||||
|
0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
|
||||||
|
0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
|
||||||
|
0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
|
||||||
|
0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
|
||||||
|
0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
|
||||||
|
0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
|
||||||
|
0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
|
||||||
|
0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
|
||||||
|
0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
|
||||||
|
0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
|
||||||
|
0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
|
||||||
|
0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
|
||||||
|
0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
|
||||||
|
0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
|
||||||
|
0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
|
||||||
|
0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
|
||||||
|
0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
|
||||||
|
0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
|
||||||
|
0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
|
||||||
|
0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
|
||||||
|
0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
|
||||||
|
0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
|
||||||
|
0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
|
||||||
|
0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
|
||||||
|
0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
|
||||||
|
0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
|
||||||
|
0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
|
||||||
|
0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
|
||||||
|
0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
|
||||||
|
0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
|
||||||
|
0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
|
||||||
|
0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
|
||||||
|
0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
|
||||||
|
0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
|
||||||
|
0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
|
||||||
|
0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
|
||||||
|
0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU,
|
||||||
|
};
|
||||||
|
const u32 rcon[] = {
|
||||||
|
0x01000000, 0x02000000, 0x04000000, 0x08000000,
|
||||||
|
0x10000000, 0x20000000, 0x40000000, 0x80000000,
|
||||||
|
0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
|
||||||
|
};
|
||||||
|
#else /* AES_SMALL_TABLES */
|
||||||
|
const u8 Td4s_rom[256] ICACHE_RODATA_ATTR = {
|
||||||
|
0x52U, 0x09U, 0x6aU, 0xd5U, 0x30U, 0x36U, 0xa5U, 0x38U,
|
||||||
|
0xbfU, 0x40U, 0xa3U, 0x9eU, 0x81U, 0xf3U, 0xd7U, 0xfbU,
|
||||||
|
0x7cU, 0xe3U, 0x39U, 0x82U, 0x9bU, 0x2fU, 0xffU, 0x87U,
|
||||||
|
0x34U, 0x8eU, 0x43U, 0x44U, 0xc4U, 0xdeU, 0xe9U, 0xcbU,
|
||||||
|
0x54U, 0x7bU, 0x94U, 0x32U, 0xa6U, 0xc2U, 0x23U, 0x3dU,
|
||||||
|
0xeeU, 0x4cU, 0x95U, 0x0bU, 0x42U, 0xfaU, 0xc3U, 0x4eU,
|
||||||
|
0x08U, 0x2eU, 0xa1U, 0x66U, 0x28U, 0xd9U, 0x24U, 0xb2U,
|
||||||
|
0x76U, 0x5bU, 0xa2U, 0x49U, 0x6dU, 0x8bU, 0xd1U, 0x25U,
|
||||||
|
0x72U, 0xf8U, 0xf6U, 0x64U, 0x86U, 0x68U, 0x98U, 0x16U,
|
||||||
|
0xd4U, 0xa4U, 0x5cU, 0xccU, 0x5dU, 0x65U, 0xb6U, 0x92U,
|
||||||
|
0x6cU, 0x70U, 0x48U, 0x50U, 0xfdU, 0xedU, 0xb9U, 0xdaU,
|
||||||
|
0x5eU, 0x15U, 0x46U, 0x57U, 0xa7U, 0x8dU, 0x9dU, 0x84U,
|
||||||
|
0x90U, 0xd8U, 0xabU, 0x00U, 0x8cU, 0xbcU, 0xd3U, 0x0aU,
|
||||||
|
0xf7U, 0xe4U, 0x58U, 0x05U, 0xb8U, 0xb3U, 0x45U, 0x06U,
|
||||||
|
0xd0U, 0x2cU, 0x1eU, 0x8fU, 0xcaU, 0x3fU, 0x0fU, 0x02U,
|
||||||
|
0xc1U, 0xafU, 0xbdU, 0x03U, 0x01U, 0x13U, 0x8aU, 0x6bU,
|
||||||
|
0x3aU, 0x91U, 0x11U, 0x41U, 0x4fU, 0x67U, 0xdcU, 0xeaU,
|
||||||
|
0x97U, 0xf2U, 0xcfU, 0xceU, 0xf0U, 0xb4U, 0xe6U, 0x73U,
|
||||||
|
0x96U, 0xacU, 0x74U, 0x22U, 0xe7U, 0xadU, 0x35U, 0x85U,
|
||||||
|
0xe2U, 0xf9U, 0x37U, 0xe8U, 0x1cU, 0x75U, 0xdfU, 0x6eU,
|
||||||
|
0x47U, 0xf1U, 0x1aU, 0x71U, 0x1dU, 0x29U, 0xc5U, 0x89U,
|
||||||
|
0x6fU, 0xb7U, 0x62U, 0x0eU, 0xaaU, 0x18U, 0xbeU, 0x1bU,
|
||||||
|
0xfcU, 0x56U, 0x3eU, 0x4bU, 0xc6U, 0xd2U, 0x79U, 0x20U,
|
||||||
|
0x9aU, 0xdbU, 0xc0U, 0xfeU, 0x78U, 0xcdU, 0x5aU, 0xf4U,
|
||||||
|
0x1fU, 0xddU, 0xa8U, 0x33U, 0x88U, 0x07U, 0xc7U, 0x31U,
|
||||||
|
0xb1U, 0x12U, 0x10U, 0x59U, 0x27U, 0x80U, 0xecU, 0x5fU,
|
||||||
|
0x60U, 0x51U, 0x7fU, 0xa9U, 0x19U, 0xb5U, 0x4aU, 0x0dU,
|
||||||
|
0x2dU, 0xe5U, 0x7aU, 0x9fU, 0x93U, 0xc9U, 0x9cU, 0xefU,
|
||||||
|
0xa0U, 0xe0U, 0x3bU, 0x4dU, 0xaeU, 0x2aU, 0xf5U, 0xb0U,
|
||||||
|
0xc8U, 0xebU, 0xbbU, 0x3cU, 0x83U, 0x53U, 0x99U, 0x61U,
|
||||||
|
0x17U, 0x2bU, 0x04U, 0x7eU, 0xbaU, 0x77U, 0xd6U, 0x26U,
|
||||||
|
0xe1U, 0x69U, 0x14U, 0x63U, 0x55U, 0x21U, 0x0cU, 0x7dU,
|
||||||
|
};
|
||||||
|
const u8 rcons[] ICACHE_RODATA_ATTR = {
|
||||||
|
0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1B, 0x36
|
||||||
|
/* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
|
||||||
|
};
|
||||||
|
#endif /* AES_SMALL_TABLES */
|
||||||
|
/**
|
||||||
|
* Expand the cipher key into the encryption key schedule.
|
||||||
|
*
|
||||||
|
* @return the number of rounds for the given cipher key size.
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
rijndaelKeySetupEnc(u32 rk[/*44*/], const u8 cipherKey[])
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
u32 temp;
|
||||||
|
|
||||||
|
rk[0] = GETU32(cipherKey );
|
||||||
|
rk[1] = GETU32(cipherKey + 4);
|
||||||
|
rk[2] = GETU32(cipherKey + 8);
|
||||||
|
rk[3] = GETU32(cipherKey + 12);
|
||||||
|
for (i = 0; i < 10; i++) {
|
||||||
|
temp = rk[3];
|
||||||
|
rk[4] = rk[0] ^
|
||||||
|
TE421(temp) ^ TE432(temp) ^ TE443(temp) ^ TE414(temp) ^
|
||||||
|
RCON(i);
|
||||||
|
rk[5] = rk[1] ^ rk[4];
|
||||||
|
rk[6] = rk[2] ^ rk[5];
|
||||||
|
rk[7] = rk[3] ^ rk[6];
|
||||||
|
rk += 4;
|
||||||
|
}
|
||||||
|
}
|
80
components/wpa_supplicant/src/crypto/aes-unwrap.c
Normal file
80
components/wpa_supplicant/src/crypto/aes-unwrap.c
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
/*
|
||||||
|
* AES key unwrap (128-bit KEK, RFC3394)
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/aes.h"
|
||||||
|
#include "crypto/aes_wrap.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_unwrap - Unwrap key with AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
||||||
|
* @kek: Key encryption key (KEK)
|
||||||
|
* @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16
|
||||||
|
* bytes
|
||||||
|
* @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
|
||||||
|
* @plain: Plaintext key, n * 64 bits
|
||||||
|
* Returns: 0 on success, -1 on failure (e.g., integrity verification failed)
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain)
|
||||||
|
{
|
||||||
|
u8 a[8], *r, b[16];
|
||||||
|
int i, j;
|
||||||
|
void *ctx;
|
||||||
|
|
||||||
|
/* 1) Initialize variables. */
|
||||||
|
os_memcpy(a, cipher, 8);
|
||||||
|
r = plain;
|
||||||
|
os_memcpy(r, cipher + 8, 8 * n);
|
||||||
|
|
||||||
|
ctx = aes_decrypt_init(kek, 16);
|
||||||
|
if (ctx == NULL)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
/* 2) Compute intermediate values.
|
||||||
|
* For j = 5 to 0
|
||||||
|
* For i = n to 1
|
||||||
|
* B = AES-1(K, (A ^ t) | R[i]) where t = n*j+i
|
||||||
|
* A = MSB(64, B)
|
||||||
|
* R[i] = LSB(64, B)
|
||||||
|
*/
|
||||||
|
for (j = 5; j >= 0; j--) {
|
||||||
|
r = plain + (n - 1) * 8;
|
||||||
|
for (i = n; i >= 1; i--) {
|
||||||
|
os_memcpy(b, a, 8);
|
||||||
|
b[7] ^= n * j + i;
|
||||||
|
|
||||||
|
os_memcpy(b + 8, r, 8);
|
||||||
|
aes_decrypt(ctx, b, b);
|
||||||
|
os_memcpy(a, b, 8);
|
||||||
|
os_memcpy(r, b + 8, 8);
|
||||||
|
r -= 8;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
aes_decrypt_deinit(ctx);
|
||||||
|
|
||||||
|
/* 3) Output results.
|
||||||
|
*
|
||||||
|
* These are already in @plain due to the location of temporary
|
||||||
|
* variables. Just verify that the IV matches with the expected value.
|
||||||
|
*/
|
||||||
|
for (i = 0; i < 8; i++) {
|
||||||
|
if (a[i] != 0xa6)
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
70
components/wpa_supplicant/src/crypto/aes-wrap.c
Normal file
70
components/wpa_supplicant/src/crypto/aes-wrap.c
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
/*
|
||||||
|
* AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This software may be distributed under the terms of the BSD license.
|
||||||
|
* See README for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/aes.h"
|
||||||
|
#include "crypto/aes_wrap.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
* aes_wrap - Wrap keys with AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
||||||
|
* @kek: 16-octet Key encryption key (KEK)
|
||||||
|
* @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16
|
||||||
|
* bytes
|
||||||
|
* @plain: Plaintext key to be wrapped, n * 64 bits
|
||||||
|
* @cipher: Wrapped key, (n + 1) * 64 bits
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher)
|
||||||
|
{
|
||||||
|
u8 *a, *r, b[16];
|
||||||
|
int i, j;
|
||||||
|
void *ctx;
|
||||||
|
|
||||||
|
a = cipher;
|
||||||
|
r = cipher + 8;
|
||||||
|
|
||||||
|
/* 1) Initialize variables. */
|
||||||
|
os_memset(a, 0xa6, 8);
|
||||||
|
os_memcpy(r, plain, 8 * n);
|
||||||
|
|
||||||
|
ctx = aes_encrypt_init(kek, 16);
|
||||||
|
if (ctx == NULL)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
/* 2) Calculate intermediate values.
|
||||||
|
* For j = 0 to 5
|
||||||
|
* For i=1 to n
|
||||||
|
* B = AES(K, A | R[i])
|
||||||
|
* A = MSB(64, B) ^ t where t = (n*j)+i
|
||||||
|
* R[i] = LSB(64, B)
|
||||||
|
*/
|
||||||
|
for (j = 0; j <= 5; j++) {
|
||||||
|
r = cipher + 8;
|
||||||
|
for (i = 1; i <= n; i++) {
|
||||||
|
os_memcpy(b, a, 8);
|
||||||
|
os_memcpy(b + 8, r, 8);
|
||||||
|
aes_encrypt(ctx, b, b);
|
||||||
|
os_memcpy(a, b, 8);
|
||||||
|
a[7] ^= n * j + i;
|
||||||
|
os_memcpy(r, b + 8, 8);
|
||||||
|
r += 8;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
aes_encrypt_deinit(ctx);
|
||||||
|
|
||||||
|
/* 3) Output the results.
|
||||||
|
*
|
||||||
|
* These are already in @cipher due to the location of temporary
|
||||||
|
* variables.
|
||||||
|
*/
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
244
components/wpa_supplicant/src/crypto/bignum.c
Normal file
244
components/wpa_supplicant/src/crypto/bignum.c
Normal file
@ -0,0 +1,244 @@
|
|||||||
|
/*
|
||||||
|
* Big number math
|
||||||
|
* Copyright (c) 2006, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "wpa/wpabuf.h"
|
||||||
|
#include "wpa/wpa_debug.h"
|
||||||
|
#include "bignum.h"
|
||||||
|
|
||||||
|
#define CONFIG_INTERNAL_LIBTOMMATH
|
||||||
|
#ifdef CONFIG_INTERNAL_LIBTOMMATH
|
||||||
|
#include "libtommath.h"
|
||||||
|
#else /* CONFIG_INTERNAL_LIBTOMMATH */
|
||||||
|
#include <tommath.h>
|
||||||
|
#endif /* CONFIG_INTERNAL_LIBTOMMATH */
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The current version is just a wrapper for LibTomMath library, so
|
||||||
|
* struct bignum is just typecast to mp_int.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_init - Allocate memory for bignum
|
||||||
|
* Returns: Pointer to allocated bignum or %NULL on failure
|
||||||
|
*/
|
||||||
|
struct bignum * ICACHE_FLASH_ATTR
|
||||||
|
bignum_init(void)
|
||||||
|
{
|
||||||
|
struct bignum *n = (struct bignum *)os_zalloc(sizeof(mp_int));
|
||||||
|
if (n == NULL)
|
||||||
|
return NULL;
|
||||||
|
if (mp_init((mp_int *) n) != MP_OKAY) {
|
||||||
|
os_free(n);
|
||||||
|
n = NULL;
|
||||||
|
}
|
||||||
|
return n;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_deinit - Free bignum
|
||||||
|
* @n: Bignum from bignum_init()
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
bignum_deinit(struct bignum *n)
|
||||||
|
{
|
||||||
|
if (n) {
|
||||||
|
mp_clear((mp_int *) n);
|
||||||
|
os_free(n);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_get_unsigned_bin - Get length of bignum as an unsigned binary buffer
|
||||||
|
* @n: Bignum from bignum_init()
|
||||||
|
* Returns: Length of n if written to a binary buffer
|
||||||
|
*/
|
||||||
|
size_t ICACHE_FLASH_ATTR
|
||||||
|
bignum_get_unsigned_bin_len(struct bignum *n)
|
||||||
|
{
|
||||||
|
return mp_unsigned_bin_size((mp_int *) n);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_get_unsigned_bin - Set binary buffer to unsigned bignum
|
||||||
|
* @n: Bignum from bignum_init()
|
||||||
|
* @buf: Buffer for the binary number
|
||||||
|
* @len: Length of the buffer, can be %NULL if buffer is known to be long
|
||||||
|
* enough. Set to used buffer length on success if not %NULL.
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_get_unsigned_bin(const struct bignum *n, u8 *buf, size_t *len)
|
||||||
|
{
|
||||||
|
size_t need = mp_unsigned_bin_size((mp_int *) n);
|
||||||
|
if (len && need > *len) {
|
||||||
|
*len = need;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
if (mp_to_unsigned_bin((mp_int *) n, buf) != MP_OKAY) {
|
||||||
|
wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
if (len)
|
||||||
|
*len = need;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_set_unsigned_bin - Set bignum based on unsigned binary buffer
|
||||||
|
* @n: Bignum from bignum_init(); to be set to the given value
|
||||||
|
* @buf: Buffer with unsigned binary value
|
||||||
|
* @len: Length of buf in octets
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_set_unsigned_bin(struct bignum *n, const u8 *buf, size_t len)
|
||||||
|
{
|
||||||
|
if (mp_read_unsigned_bin((mp_int *) n, (u8 *) buf, len) != MP_OKAY) {
|
||||||
|
wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_cmp - Signed comparison
|
||||||
|
* @a: Bignum from bignum_init()
|
||||||
|
* @b: Bignum from bignum_init()
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_cmp(const struct bignum *a, const struct bignum *b)
|
||||||
|
{
|
||||||
|
return mp_cmp((mp_int *) a, (mp_int *) b);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_cmd_d - Compare bignum to standard integer
|
||||||
|
* @a: Bignum from bignum_init()
|
||||||
|
* @b: Small integer
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_cmp_d(const struct bignum *a, unsigned long b)
|
||||||
|
{
|
||||||
|
return mp_cmp_d((mp_int *) a, b);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_add - c = a + b
|
||||||
|
* @a: Bignum from bignum_init()
|
||||||
|
* @b: Bignum from bignum_init()
|
||||||
|
* @c: Bignum from bignum_init(); used to store the result of a + b
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_add(const struct bignum *a, const struct bignum *b,
|
||||||
|
struct bignum *c)
|
||||||
|
{
|
||||||
|
if (mp_add((mp_int *) a, (mp_int *) b, (mp_int *) c) != MP_OKAY) {
|
||||||
|
wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_sub - c = a - b
|
||||||
|
* @a: Bignum from bignum_init()
|
||||||
|
* @b: Bignum from bignum_init()
|
||||||
|
* @c: Bignum from bignum_init(); used to store the result of a - b
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_sub(const struct bignum *a, const struct bignum *b,
|
||||||
|
struct bignum *c)
|
||||||
|
{
|
||||||
|
if (mp_sub((mp_int *) a, (mp_int *) b, (mp_int *) c) != MP_OKAY) {
|
||||||
|
wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_mul - c = a * b
|
||||||
|
* @a: Bignum from bignum_init()
|
||||||
|
* @b: Bignum from bignum_init()
|
||||||
|
* @c: Bignum from bignum_init(); used to store the result of a * b
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_mul(const struct bignum *a, const struct bignum *b,
|
||||||
|
struct bignum *c)
|
||||||
|
{
|
||||||
|
if (mp_mul((mp_int *) a, (mp_int *) b, (mp_int *) c) != MP_OKAY) {
|
||||||
|
wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_mulmod - d = a * b (mod c)
|
||||||
|
* @a: Bignum from bignum_init()
|
||||||
|
* @b: Bignum from bignum_init()
|
||||||
|
* @c: Bignum from bignum_init(); modulus
|
||||||
|
* @d: Bignum from bignum_init(); used to store the result of a * b (mod c)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_mulmod(const struct bignum *a, const struct bignum *b,
|
||||||
|
const struct bignum *c, struct bignum *d)
|
||||||
|
{
|
||||||
|
if (mp_mulmod((mp_int *) a, (mp_int *) b, (mp_int *) c, (mp_int *) d)
|
||||||
|
!= MP_OKAY) {
|
||||||
|
wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* bignum_exptmod - Modular exponentiation: d = a^b (mod c)
|
||||||
|
* @a: Bignum from bignum_init(); base
|
||||||
|
* @b: Bignum from bignum_init(); exponent
|
||||||
|
* @c: Bignum from bignum_init(); modulus
|
||||||
|
* @d: Bignum from bignum_init(); used to store the result of a^b (mod c)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
bignum_exptmod(const struct bignum *a, const struct bignum *b,
|
||||||
|
const struct bignum *c, struct bignum *d)
|
||||||
|
{
|
||||||
|
if (mp_exptmod((mp_int *) a, (mp_int *) b, (mp_int *) c, (mp_int *) d)
|
||||||
|
!= MP_OKAY) {
|
||||||
|
wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
38
components/wpa_supplicant/src/crypto/bignum.h
Normal file
38
components/wpa_supplicant/src/crypto/bignum.h
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
/*
|
||||||
|
* Big number math
|
||||||
|
* Copyright (c) 2006, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef BIGNUM_H
|
||||||
|
#define BIGNUM_H
|
||||||
|
|
||||||
|
struct bignum;
|
||||||
|
|
||||||
|
struct bignum * bignum_init(void);
|
||||||
|
void bignum_deinit(struct bignum *n);
|
||||||
|
size_t bignum_get_unsigned_bin_len(struct bignum *n);
|
||||||
|
int bignum_get_unsigned_bin(const struct bignum *n, u8 *buf, size_t *len);
|
||||||
|
int bignum_set_unsigned_bin(struct bignum *n, const u8 *buf, size_t len);
|
||||||
|
int bignum_cmp(const struct bignum *a, const struct bignum *b);
|
||||||
|
int bignum_cmp_d(const struct bignum *a, unsigned long b);
|
||||||
|
int bignum_add(const struct bignum *a, const struct bignum *b,
|
||||||
|
struct bignum *c);
|
||||||
|
int bignum_sub(const struct bignum *a, const struct bignum *b,
|
||||||
|
struct bignum *c);
|
||||||
|
int bignum_mul(const struct bignum *a, const struct bignum *b,
|
||||||
|
struct bignum *c);
|
||||||
|
int bignum_mulmod(const struct bignum *a, const struct bignum *b,
|
||||||
|
const struct bignum *c, struct bignum *d);
|
||||||
|
int bignum_exptmod(const struct bignum *a, const struct bignum *b,
|
||||||
|
const struct bignum *c, struct bignum *d);
|
||||||
|
|
||||||
|
#endif /* BIGNUM_H */
|
@ -0,0 +1,56 @@
|
|||||||
|
/*
|
||||||
|
* Crypto wrapper for internal crypto implementation - modexp
|
||||||
|
* Copyright (c) 2006-2009, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "bignum.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
crypto_mod_exp(const u8 *base, size_t base_len,
|
||||||
|
const u8 *power, size_t power_len,
|
||||||
|
const u8 *modulus, size_t modulus_len,
|
||||||
|
u8 *result, size_t *result_len)
|
||||||
|
{
|
||||||
|
struct bignum *bn_base, *bn_exp, *bn_modulus, *bn_result;
|
||||||
|
int ret = -1;
|
||||||
|
|
||||||
|
bn_base = bignum_init();
|
||||||
|
bn_exp = bignum_init();
|
||||||
|
bn_modulus = bignum_init();
|
||||||
|
bn_result = bignum_init();
|
||||||
|
|
||||||
|
if (bn_base == NULL || bn_exp == NULL || bn_modulus == NULL ||
|
||||||
|
bn_result == NULL)
|
||||||
|
goto error;
|
||||||
|
|
||||||
|
if (bignum_set_unsigned_bin(bn_base, base, base_len) < 0 ||
|
||||||
|
bignum_set_unsigned_bin(bn_exp, power, power_len) < 0 ||
|
||||||
|
bignum_set_unsigned_bin(bn_modulus, modulus, modulus_len) < 0)
|
||||||
|
goto error;
|
||||||
|
|
||||||
|
if (bignum_exptmod(bn_base, bn_exp, bn_modulus, bn_result) < 0)
|
||||||
|
goto error;
|
||||||
|
|
||||||
|
ret = bignum_get_unsigned_bin(bn_result, result, result_len);
|
||||||
|
|
||||||
|
error:
|
||||||
|
bignum_deinit(bn_base);
|
||||||
|
bignum_deinit(bn_exp);
|
||||||
|
bignum_deinit(bn_modulus);
|
||||||
|
bignum_deinit(bn_result);
|
||||||
|
return ret;
|
||||||
|
}
|
42
components/wpa_supplicant/src/crypto/dh_group5.c
Normal file
42
components/wpa_supplicant/src/crypto/dh_group5.c
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
/*
|
||||||
|
* Diffie-Hellman group 5 operations
|
||||||
|
* Copyright (c) 2009, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/dh_groups.h"
|
||||||
|
#include "crypto/dh_group5.h"
|
||||||
|
|
||||||
|
void * ICACHE_FLASH_ATTR
|
||||||
|
dh5_init(struct wpabuf **priv, struct wpabuf **publ)
|
||||||
|
{
|
||||||
|
*publ = dh_init(dh_groups_get(5), priv);
|
||||||
|
if (*publ == 0)
|
||||||
|
return NULL;
|
||||||
|
return (void *) 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
struct wpabuf * ICACHE_FLASH_ATTR
|
||||||
|
dh5_derive_shared(void *ctx, const struct wpabuf *peer_public,
|
||||||
|
const struct wpabuf *own_private)
|
||||||
|
{
|
||||||
|
return dh_derive_shared(peer_public, own_private, dh_groups_get(5));
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
dh5_free(void *ctx)
|
||||||
|
{
|
||||||
|
}
|
641
components/wpa_supplicant/src/crypto/dh_groups.c
Normal file
641
components/wpa_supplicant/src/crypto/dh_groups.c
Normal file
@ -0,0 +1,641 @@
|
|||||||
|
/*
|
||||||
|
* Diffie-Hellman groups
|
||||||
|
* Copyright (c) 2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
#include "crypto/random.h"
|
||||||
|
#include "crypto/dh_groups.h"
|
||||||
|
|
||||||
|
#include "wpa/wpabuf.h"
|
||||||
|
#include "wpa/wpa_debug.h"
|
||||||
|
|
||||||
|
extern int crypto_mod_exp(const u8 *base, size_t base_len,
|
||||||
|
const u8 *power, size_t power_len,
|
||||||
|
const u8 *modulus, size_t modulus_len,
|
||||||
|
u8 *result, size_t *result_len);
|
||||||
|
|
||||||
|
#ifdef ALL_DH_GROUPS
|
||||||
|
|
||||||
|
/* RFC 4306, B.1. Group 1 - 768 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group1_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group1_prime[96] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x3A, 0x36, 0x20,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
/* RFC 4306, B.2. Group 2 - 1024 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group2_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group2_prime[128] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
|
||||||
|
0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
|
||||||
|
0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
|
||||||
|
0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
|
||||||
|
0x49, 0x28, 0x66, 0x51, 0xEC, 0xE6, 0x53, 0x81,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
#endif /* ALL_DH_GROUPS */
|
||||||
|
|
||||||
|
/* RFC 3526, 2. Group 5 - 1536 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^1536 - 2^1472 - 1 + 2^64 * { [2^1406 pi] + 741804 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group5_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group5_prime[192] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
|
||||||
|
0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
|
||||||
|
0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
|
||||||
|
0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
|
||||||
|
0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,
|
||||||
|
0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,
|
||||||
|
0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,
|
||||||
|
0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,
|
||||||
|
0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,
|
||||||
|
0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,
|
||||||
|
0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,
|
||||||
|
0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,
|
||||||
|
0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x23, 0x73, 0x27,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
#ifdef ALL_DH_GROUPS
|
||||||
|
|
||||||
|
/* RFC 3526, 3. Group 14 - 2048 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^2048 - 2^1984 - 1 + 2^64 * { [2^1918 pi] + 124476 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group14_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group14_prime[256] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
|
||||||
|
0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
|
||||||
|
0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
|
||||||
|
0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
|
||||||
|
0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,
|
||||||
|
0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,
|
||||||
|
0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,
|
||||||
|
0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,
|
||||||
|
0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,
|
||||||
|
0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,
|
||||||
|
0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,
|
||||||
|
0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,
|
||||||
|
0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C,
|
||||||
|
0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
|
||||||
|
0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03,
|
||||||
|
0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F,
|
||||||
|
0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9,
|
||||||
|
0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18,
|
||||||
|
0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5,
|
||||||
|
0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10,
|
||||||
|
0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAC, 0xAA, 0x68,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
/* RFC 3526, 4. Group 15 - 3072 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^3072 - 2^3008 - 1 + 2^64 * { [2^2942 pi] + 1690314 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group15_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group15_prime[384] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
|
||||||
|
0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
|
||||||
|
0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
|
||||||
|
0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
|
||||||
|
0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,
|
||||||
|
0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,
|
||||||
|
0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,
|
||||||
|
0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,
|
||||||
|
0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,
|
||||||
|
0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,
|
||||||
|
0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,
|
||||||
|
0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,
|
||||||
|
0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C,
|
||||||
|
0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
|
||||||
|
0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03,
|
||||||
|
0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F,
|
||||||
|
0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9,
|
||||||
|
0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18,
|
||||||
|
0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5,
|
||||||
|
0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10,
|
||||||
|
0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D,
|
||||||
|
0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33,
|
||||||
|
0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
|
||||||
|
0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A,
|
||||||
|
0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D,
|
||||||
|
0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7,
|
||||||
|
0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7,
|
||||||
|
0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D,
|
||||||
|
0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B,
|
||||||
|
0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
|
||||||
|
0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
|
||||||
|
0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C,
|
||||||
|
0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C,
|
||||||
|
0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2,
|
||||||
|
0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31,
|
||||||
|
0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E,
|
||||||
|
0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x3A, 0xD2, 0xCA,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
/* RFC 3526, 5. Group 16 - 4096 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^4096 - 2^4032 - 1 + 2^64 * { [2^3966 pi] + 240904 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group16_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group16_prime[512] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
|
||||||
|
0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
|
||||||
|
0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
|
||||||
|
0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
|
||||||
|
0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,
|
||||||
|
0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,
|
||||||
|
0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,
|
||||||
|
0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,
|
||||||
|
0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,
|
||||||
|
0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,
|
||||||
|
0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,
|
||||||
|
0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,
|
||||||
|
0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C,
|
||||||
|
0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
|
||||||
|
0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03,
|
||||||
|
0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F,
|
||||||
|
0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9,
|
||||||
|
0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18,
|
||||||
|
0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5,
|
||||||
|
0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10,
|
||||||
|
0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D,
|
||||||
|
0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33,
|
||||||
|
0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
|
||||||
|
0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A,
|
||||||
|
0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D,
|
||||||
|
0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7,
|
||||||
|
0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7,
|
||||||
|
0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D,
|
||||||
|
0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B,
|
||||||
|
0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
|
||||||
|
0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
|
||||||
|
0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C,
|
||||||
|
0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C,
|
||||||
|
0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2,
|
||||||
|
0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31,
|
||||||
|
0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E,
|
||||||
|
0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01,
|
||||||
|
0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7,
|
||||||
|
0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26,
|
||||||
|
0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C,
|
||||||
|
0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA,
|
||||||
|
0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8,
|
||||||
|
0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9,
|
||||||
|
0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6,
|
||||||
|
0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D,
|
||||||
|
0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2,
|
||||||
|
0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED,
|
||||||
|
0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF,
|
||||||
|
0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C,
|
||||||
|
0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9,
|
||||||
|
0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1,
|
||||||
|
0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F,
|
||||||
|
0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x06, 0x31, 0x99,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
/* RFC 3526, 6. Group 17 - 6144 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^6144 - 2^6080 - 1 + 2^64 * { [2^6014 pi] + 929484 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group17_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group17_prime[768] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
|
||||||
|
0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
|
||||||
|
0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
|
||||||
|
0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
|
||||||
|
0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,
|
||||||
|
0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,
|
||||||
|
0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,
|
||||||
|
0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,
|
||||||
|
0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,
|
||||||
|
0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,
|
||||||
|
0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,
|
||||||
|
0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,
|
||||||
|
0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C,
|
||||||
|
0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
|
||||||
|
0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03,
|
||||||
|
0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F,
|
||||||
|
0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9,
|
||||||
|
0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18,
|
||||||
|
0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5,
|
||||||
|
0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10,
|
||||||
|
0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D,
|
||||||
|
0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33,
|
||||||
|
0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
|
||||||
|
0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A,
|
||||||
|
0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D,
|
||||||
|
0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7,
|
||||||
|
0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7,
|
||||||
|
0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D,
|
||||||
|
0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B,
|
||||||
|
0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
|
||||||
|
0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
|
||||||
|
0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C,
|
||||||
|
0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C,
|
||||||
|
0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2,
|
||||||
|
0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31,
|
||||||
|
0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E,
|
||||||
|
0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01,
|
||||||
|
0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7,
|
||||||
|
0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26,
|
||||||
|
0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C,
|
||||||
|
0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA,
|
||||||
|
0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8,
|
||||||
|
0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9,
|
||||||
|
0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6,
|
||||||
|
0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D,
|
||||||
|
0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2,
|
||||||
|
0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED,
|
||||||
|
0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF,
|
||||||
|
0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C,
|
||||||
|
0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9,
|
||||||
|
0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1,
|
||||||
|
0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F,
|
||||||
|
0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x02, 0x84, 0x92,
|
||||||
|
0x36, 0xC3, 0xFA, 0xB4, 0xD2, 0x7C, 0x70, 0x26,
|
||||||
|
0xC1, 0xD4, 0xDC, 0xB2, 0x60, 0x26, 0x46, 0xDE,
|
||||||
|
0xC9, 0x75, 0x1E, 0x76, 0x3D, 0xBA, 0x37, 0xBD,
|
||||||
|
0xF8, 0xFF, 0x94, 0x06, 0xAD, 0x9E, 0x53, 0x0E,
|
||||||
|
0xE5, 0xDB, 0x38, 0x2F, 0x41, 0x30, 0x01, 0xAE,
|
||||||
|
0xB0, 0x6A, 0x53, 0xED, 0x90, 0x27, 0xD8, 0x31,
|
||||||
|
0x17, 0x97, 0x27, 0xB0, 0x86, 0x5A, 0x89, 0x18,
|
||||||
|
0xDA, 0x3E, 0xDB, 0xEB, 0xCF, 0x9B, 0x14, 0xED,
|
||||||
|
0x44, 0xCE, 0x6C, 0xBA, 0xCE, 0xD4, 0xBB, 0x1B,
|
||||||
|
0xDB, 0x7F, 0x14, 0x47, 0xE6, 0xCC, 0x25, 0x4B,
|
||||||
|
0x33, 0x20, 0x51, 0x51, 0x2B, 0xD7, 0xAF, 0x42,
|
||||||
|
0x6F, 0xB8, 0xF4, 0x01, 0x37, 0x8C, 0xD2, 0xBF,
|
||||||
|
0x59, 0x83, 0xCA, 0x01, 0xC6, 0x4B, 0x92, 0xEC,
|
||||||
|
0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03,
|
||||||
|
0xF4, 0x82, 0xD7, 0xCE, 0x6E, 0x74, 0xFE, 0xF6,
|
||||||
|
0xD5, 0x5E, 0x70, 0x2F, 0x46, 0x98, 0x0C, 0x82,
|
||||||
|
0xB5, 0xA8, 0x40, 0x31, 0x90, 0x0B, 0x1C, 0x9E,
|
||||||
|
0x59, 0xE7, 0xC9, 0x7F, 0xBE, 0xC7, 0xE8, 0xF3,
|
||||||
|
0x23, 0xA9, 0x7A, 0x7E, 0x36, 0xCC, 0x88, 0xBE,
|
||||||
|
0x0F, 0x1D, 0x45, 0xB7, 0xFF, 0x58, 0x5A, 0xC5,
|
||||||
|
0x4B, 0xD4, 0x07, 0xB2, 0x2B, 0x41, 0x54, 0xAA,
|
||||||
|
0xCC, 0x8F, 0x6D, 0x7E, 0xBF, 0x48, 0xE1, 0xD8,
|
||||||
|
0x14, 0xCC, 0x5E, 0xD2, 0x0F, 0x80, 0x37, 0xE0,
|
||||||
|
0xA7, 0x97, 0x15, 0xEE, 0xF2, 0x9B, 0xE3, 0x28,
|
||||||
|
0x06, 0xA1, 0xD5, 0x8B, 0xB7, 0xC5, 0xDA, 0x76,
|
||||||
|
0xF5, 0x50, 0xAA, 0x3D, 0x8A, 0x1F, 0xBF, 0xF0,
|
||||||
|
0xEB, 0x19, 0xCC, 0xB1, 0xA3, 0x13, 0xD5, 0x5C,
|
||||||
|
0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32,
|
||||||
|
0x38, 0x7F, 0xE8, 0xD7, 0x6E, 0x3C, 0x04, 0x68,
|
||||||
|
0x04, 0x3E, 0x8F, 0x66, 0x3F, 0x48, 0x60, 0xEE,
|
||||||
|
0x12, 0xBF, 0x2D, 0x5B, 0x0B, 0x74, 0x74, 0xD6,
|
||||||
|
0xE6, 0x94, 0xF9, 0x1E, 0x6D, 0xCC, 0x40, 0x24,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
/* RFC 3526, 7. Group 18 - 8192 Bit MODP
|
||||||
|
* Generator: 2
|
||||||
|
* Prime: 2^8192 - 2^8128 - 1 + 2^64 * { [2^8062 pi] + 4743158 }
|
||||||
|
*/
|
||||||
|
static const u8 dh_group18_generator[1] = { 0x02 };
|
||||||
|
static const u8 dh_group18_prime[1024] = {
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,
|
||||||
|
0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,
|
||||||
|
0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,
|
||||||
|
0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,
|
||||||
|
0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,
|
||||||
|
0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,
|
||||||
|
0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,
|
||||||
|
0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,
|
||||||
|
0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,
|
||||||
|
0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,
|
||||||
|
0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,
|
||||||
|
0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,
|
||||||
|
0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,
|
||||||
|
0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,
|
||||||
|
0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,
|
||||||
|
0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,
|
||||||
|
0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,
|
||||||
|
0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,
|
||||||
|
0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,
|
||||||
|
0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,
|
||||||
|
0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,
|
||||||
|
0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C,
|
||||||
|
0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
|
||||||
|
0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03,
|
||||||
|
0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F,
|
||||||
|
0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9,
|
||||||
|
0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18,
|
||||||
|
0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5,
|
||||||
|
0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10,
|
||||||
|
0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D,
|
||||||
|
0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33,
|
||||||
|
0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
|
||||||
|
0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A,
|
||||||
|
0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D,
|
||||||
|
0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7,
|
||||||
|
0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7,
|
||||||
|
0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D,
|
||||||
|
0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B,
|
||||||
|
0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
|
||||||
|
0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
|
||||||
|
0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C,
|
||||||
|
0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C,
|
||||||
|
0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2,
|
||||||
|
0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31,
|
||||||
|
0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E,
|
||||||
|
0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01,
|
||||||
|
0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7,
|
||||||
|
0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26,
|
||||||
|
0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C,
|
||||||
|
0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA,
|
||||||
|
0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8,
|
||||||
|
0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9,
|
||||||
|
0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6,
|
||||||
|
0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D,
|
||||||
|
0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2,
|
||||||
|
0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED,
|
||||||
|
0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF,
|
||||||
|
0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C,
|
||||||
|
0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9,
|
||||||
|
0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1,
|
||||||
|
0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F,
|
||||||
|
0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x02, 0x84, 0x92,
|
||||||
|
0x36, 0xC3, 0xFA, 0xB4, 0xD2, 0x7C, 0x70, 0x26,
|
||||||
|
0xC1, 0xD4, 0xDC, 0xB2, 0x60, 0x26, 0x46, 0xDE,
|
||||||
|
0xC9, 0x75, 0x1E, 0x76, 0x3D, 0xBA, 0x37, 0xBD,
|
||||||
|
0xF8, 0xFF, 0x94, 0x06, 0xAD, 0x9E, 0x53, 0x0E,
|
||||||
|
0xE5, 0xDB, 0x38, 0x2F, 0x41, 0x30, 0x01, 0xAE,
|
||||||
|
0xB0, 0x6A, 0x53, 0xED, 0x90, 0x27, 0xD8, 0x31,
|
||||||
|
0x17, 0x97, 0x27, 0xB0, 0x86, 0x5A, 0x89, 0x18,
|
||||||
|
0xDA, 0x3E, 0xDB, 0xEB, 0xCF, 0x9B, 0x14, 0xED,
|
||||||
|
0x44, 0xCE, 0x6C, 0xBA, 0xCE, 0xD4, 0xBB, 0x1B,
|
||||||
|
0xDB, 0x7F, 0x14, 0x47, 0xE6, 0xCC, 0x25, 0x4B,
|
||||||
|
0x33, 0x20, 0x51, 0x51, 0x2B, 0xD7, 0xAF, 0x42,
|
||||||
|
0x6F, 0xB8, 0xF4, 0x01, 0x37, 0x8C, 0xD2, 0xBF,
|
||||||
|
0x59, 0x83, 0xCA, 0x01, 0xC6, 0x4B, 0x92, 0xEC,
|
||||||
|
0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03,
|
||||||
|
0xF4, 0x82, 0xD7, 0xCE, 0x6E, 0x74, 0xFE, 0xF6,
|
||||||
|
0xD5, 0x5E, 0x70, 0x2F, 0x46, 0x98, 0x0C, 0x82,
|
||||||
|
0xB5, 0xA8, 0x40, 0x31, 0x90, 0x0B, 0x1C, 0x9E,
|
||||||
|
0x59, 0xE7, 0xC9, 0x7F, 0xBE, 0xC7, 0xE8, 0xF3,
|
||||||
|
0x23, 0xA9, 0x7A, 0x7E, 0x36, 0xCC, 0x88, 0xBE,
|
||||||
|
0x0F, 0x1D, 0x45, 0xB7, 0xFF, 0x58, 0x5A, 0xC5,
|
||||||
|
0x4B, 0xD4, 0x07, 0xB2, 0x2B, 0x41, 0x54, 0xAA,
|
||||||
|
0xCC, 0x8F, 0x6D, 0x7E, 0xBF, 0x48, 0xE1, 0xD8,
|
||||||
|
0x14, 0xCC, 0x5E, 0xD2, 0x0F, 0x80, 0x37, 0xE0,
|
||||||
|
0xA7, 0x97, 0x15, 0xEE, 0xF2, 0x9B, 0xE3, 0x28,
|
||||||
|
0x06, 0xA1, 0xD5, 0x8B, 0xB7, 0xC5, 0xDA, 0x76,
|
||||||
|
0xF5, 0x50, 0xAA, 0x3D, 0x8A, 0x1F, 0xBF, 0xF0,
|
||||||
|
0xEB, 0x19, 0xCC, 0xB1, 0xA3, 0x13, 0xD5, 0x5C,
|
||||||
|
0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32,
|
||||||
|
0x38, 0x7F, 0xE8, 0xD7, 0x6E, 0x3C, 0x04, 0x68,
|
||||||
|
0x04, 0x3E, 0x8F, 0x66, 0x3F, 0x48, 0x60, 0xEE,
|
||||||
|
0x12, 0xBF, 0x2D, 0x5B, 0x0B, 0x74, 0x74, 0xD6,
|
||||||
|
0xE6, 0x94, 0xF9, 0x1E, 0x6D, 0xBE, 0x11, 0x59,
|
||||||
|
0x74, 0xA3, 0x92, 0x6F, 0x12, 0xFE, 0xE5, 0xE4,
|
||||||
|
0x38, 0x77, 0x7C, 0xB6, 0xA9, 0x32, 0xDF, 0x8C,
|
||||||
|
0xD8, 0xBE, 0xC4, 0xD0, 0x73, 0xB9, 0x31, 0xBA,
|
||||||
|
0x3B, 0xC8, 0x32, 0xB6, 0x8D, 0x9D, 0xD3, 0x00,
|
||||||
|
0x74, 0x1F, 0xA7, 0xBF, 0x8A, 0xFC, 0x47, 0xED,
|
||||||
|
0x25, 0x76, 0xF6, 0x93, 0x6B, 0xA4, 0x24, 0x66,
|
||||||
|
0x3A, 0xAB, 0x63, 0x9C, 0x5A, 0xE4, 0xF5, 0x68,
|
||||||
|
0x34, 0x23, 0xB4, 0x74, 0x2B, 0xF1, 0xC9, 0x78,
|
||||||
|
0x23, 0x8F, 0x16, 0xCB, 0xE3, 0x9D, 0x65, 0x2D,
|
||||||
|
0xE3, 0xFD, 0xB8, 0xBE, 0xFC, 0x84, 0x8A, 0xD9,
|
||||||
|
0x22, 0x22, 0x2E, 0x04, 0xA4, 0x03, 0x7C, 0x07,
|
||||||
|
0x13, 0xEB, 0x57, 0xA8, 0x1A, 0x23, 0xF0, 0xC7,
|
||||||
|
0x34, 0x73, 0xFC, 0x64, 0x6C, 0xEA, 0x30, 0x6B,
|
||||||
|
0x4B, 0xCB, 0xC8, 0x86, 0x2F, 0x83, 0x85, 0xDD,
|
||||||
|
0xFA, 0x9D, 0x4B, 0x7F, 0xA2, 0xC0, 0x87, 0xE8,
|
||||||
|
0x79, 0x68, 0x33, 0x03, 0xED, 0x5B, 0xDD, 0x3A,
|
||||||
|
0x06, 0x2B, 0x3C, 0xF5, 0xB3, 0xA2, 0x78, 0xA6,
|
||||||
|
0x6D, 0x2A, 0x13, 0xF8, 0x3F, 0x44, 0xF8, 0x2D,
|
||||||
|
0xDF, 0x31, 0x0E, 0xE0, 0x74, 0xAB, 0x6A, 0x36,
|
||||||
|
0x45, 0x97, 0xE8, 0x99, 0xA0, 0x25, 0x5D, 0xC1,
|
||||||
|
0x64, 0xF3, 0x1C, 0xC5, 0x08, 0x46, 0x85, 0x1D,
|
||||||
|
0xF9, 0xAB, 0x48, 0x19, 0x5D, 0xED, 0x7E, 0xA1,
|
||||||
|
0xB1, 0xD5, 0x10, 0xBD, 0x7E, 0xE7, 0x4D, 0x73,
|
||||||
|
0xFA, 0xF3, 0x6B, 0xC3, 0x1E, 0xCF, 0xA2, 0x68,
|
||||||
|
0x35, 0x90, 0x46, 0xF4, 0xEB, 0x87, 0x9F, 0x92,
|
||||||
|
0x40, 0x09, 0x43, 0x8B, 0x48, 0x1C, 0x6C, 0xD7,
|
||||||
|
0x88, 0x9A, 0x00, 0x2E, 0xD5, 0xEE, 0x38, 0x2B,
|
||||||
|
0xC9, 0x19, 0x0D, 0xA6, 0xFC, 0x02, 0x6E, 0x47,
|
||||||
|
0x95, 0x58, 0xE4, 0x47, 0x56, 0x77, 0xE9, 0xAA,
|
||||||
|
0x9E, 0x30, 0x50, 0xE2, 0x76, 0x56, 0x94, 0xDF,
|
||||||
|
0xC8, 0x1F, 0x56, 0xE8, 0x80, 0xB9, 0x6E, 0x71,
|
||||||
|
0x60, 0xC9, 0x80, 0xDD, 0x98, 0xED, 0xD3, 0xDF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
#endif /* ALL_DH_GROUPS */
|
||||||
|
|
||||||
|
|
||||||
|
#define DH_GROUP(id) \
|
||||||
|
{ id, dh_group ## id ## _generator, sizeof(dh_group ## id ## _generator), \
|
||||||
|
dh_group ## id ## _prime, sizeof(dh_group ## id ## _prime) }
|
||||||
|
|
||||||
|
|
||||||
|
static struct dh_group dh_groups[] = {
|
||||||
|
DH_GROUP(5),
|
||||||
|
#ifdef ALL_DH_GROUPS
|
||||||
|
DH_GROUP(1),
|
||||||
|
DH_GROUP(2),
|
||||||
|
DH_GROUP(14),
|
||||||
|
DH_GROUP(15),
|
||||||
|
DH_GROUP(16),
|
||||||
|
DH_GROUP(17),
|
||||||
|
DH_GROUP(18)
|
||||||
|
#endif /* ALL_DH_GROUPS */
|
||||||
|
};
|
||||||
|
|
||||||
|
#define NUM_DH_GROUPS (sizeof(dh_groups) / sizeof(dh_groups[0]))
|
||||||
|
|
||||||
|
|
||||||
|
const struct dh_group * ICACHE_FLASH_ATTR
|
||||||
|
dh_groups_get(int id)
|
||||||
|
{
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
for (i = 0; i < NUM_DH_GROUPS; i++) {
|
||||||
|
if (dh_groups[i].id == id)
|
||||||
|
return &dh_groups[i];
|
||||||
|
}
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* dh_init - Initialize Diffie-Hellman handshake
|
||||||
|
* @dh: Selected Diffie-Hellman group
|
||||||
|
* @priv: Pointer for returning Diffie-Hellman private key
|
||||||
|
* Returns: Diffie-Hellman public value
|
||||||
|
*/
|
||||||
|
struct wpabuf * ICACHE_FLASH_ATTR
|
||||||
|
dh_init(const struct dh_group *dh, struct wpabuf **priv)
|
||||||
|
{
|
||||||
|
struct wpabuf *pv;
|
||||||
|
size_t pv_len;
|
||||||
|
|
||||||
|
if (dh == NULL)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
wpabuf_free(*priv);
|
||||||
|
*priv = wpabuf_alloc(dh->prime_len);
|
||||||
|
if (*priv == NULL)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
if (random_get_bytes(wpabuf_put(*priv, dh->prime_len), dh->prime_len))
|
||||||
|
{
|
||||||
|
wpabuf_free(*priv);
|
||||||
|
*priv = NULL;
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (os_memcmp(wpabuf_head(*priv), dh->prime, dh->prime_len) > 0) {
|
||||||
|
/* Make sure private value is smaller than prime */
|
||||||
|
*(wpabuf_mhead_u8(*priv)) = 0;
|
||||||
|
}
|
||||||
|
wpa_hexdump_buf_key(MSG_DEBUG, "DH: private value", *priv);
|
||||||
|
|
||||||
|
pv_len = dh->prime_len;
|
||||||
|
pv = wpabuf_alloc(pv_len);
|
||||||
|
if (pv == NULL)
|
||||||
|
return NULL;
|
||||||
|
if (crypto_mod_exp(dh->generator, dh->generator_len,
|
||||||
|
wpabuf_head(*priv), wpabuf_len(*priv),
|
||||||
|
dh->prime, dh->prime_len, wpabuf_mhead(pv),
|
||||||
|
&pv_len) < 0) {
|
||||||
|
wpabuf_free(pv);
|
||||||
|
wpa_printf(MSG_INFO, "DH: crypto_mod_exp failed");
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
wpabuf_put(pv, pv_len);
|
||||||
|
wpa_hexdump_buf(MSG_DEBUG, "DH: public value", pv);
|
||||||
|
|
||||||
|
return pv;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* dh_derive_shared - Derive shared Diffie-Hellman key
|
||||||
|
* @peer_public: Diffie-Hellman public value from peer
|
||||||
|
* @own_private: Diffie-Hellman private key from dh_init()
|
||||||
|
* @dh: Selected Diffie-Hellman group
|
||||||
|
* Returns: Diffie-Hellman shared key
|
||||||
|
*/
|
||||||
|
struct wpabuf * ICACHE_FLASH_ATTR
|
||||||
|
dh_derive_shared(const struct wpabuf *peer_public,
|
||||||
|
const struct wpabuf *own_private,
|
||||||
|
const struct dh_group *dh)
|
||||||
|
{
|
||||||
|
struct wpabuf *shared;
|
||||||
|
size_t shared_len;
|
||||||
|
|
||||||
|
if (dh == NULL || peer_public == NULL || own_private == NULL)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
shared_len = dh->prime_len;
|
||||||
|
shared = wpabuf_alloc(shared_len);
|
||||||
|
if (shared == NULL)
|
||||||
|
return NULL;
|
||||||
|
if (crypto_mod_exp(wpabuf_head(peer_public), wpabuf_len(peer_public),
|
||||||
|
wpabuf_head(own_private), wpabuf_len(own_private),
|
||||||
|
dh->prime, dh->prime_len,
|
||||||
|
wpabuf_mhead(shared), &shared_len) < 0) {
|
||||||
|
wpabuf_free(shared);
|
||||||
|
wpa_printf(MSG_INFO, "DH: crypto_mod_exp failed");
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
wpabuf_put(shared, shared_len);
|
||||||
|
wpa_hexdump_buf_key(MSG_DEBUG, "DH: shared key", shared);
|
||||||
|
|
||||||
|
return shared;
|
||||||
|
}
|
3443
components/wpa_supplicant/src/crypto/libtommath.h
Normal file
3443
components/wpa_supplicant/src/crypto/libtommath.h
Normal file
File diff suppressed because it is too large
Load Diff
298
components/wpa_supplicant/src/crypto/md5-internal.c
Normal file
298
components/wpa_supplicant/src/crypto/md5-internal.c
Normal file
@ -0,0 +1,298 @@
|
|||||||
|
/*
|
||||||
|
* MD5 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/md5.h"
|
||||||
|
#include "crypto/md5_i.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
|
||||||
|
static void MD5Transform(u32 buf[4], u32 const in[16]);
|
||||||
|
|
||||||
|
|
||||||
|
typedef struct MD5Context MD5_CTX;
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* md5_vector - MD5 hash for data vector
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 of failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
|
||||||
|
{
|
||||||
|
MD5_CTX ctx;
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
MD5Init(&ctx);
|
||||||
|
for (i = 0; i < num_elem; i++)
|
||||||
|
MD5Update(&ctx, addr[i], len[i]);
|
||||||
|
MD5Final(mac, &ctx);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* ===== start - public domain MD5 implementation ===== */
|
||||||
|
/*
|
||||||
|
* This code implements the MD5 message-digest algorithm.
|
||||||
|
* The algorithm is due to Ron Rivest. This code was
|
||||||
|
* written by Colin Plumb in 1993, no copyright is claimed.
|
||||||
|
* This code is in the public domain; do with it what you wish.
|
||||||
|
*
|
||||||
|
* Equivalent code is available from RSA Data Security, Inc.
|
||||||
|
* This code has been tested against that, and is equivalent,
|
||||||
|
* except that you don't need to include two pages of legalese
|
||||||
|
* with every copy.
|
||||||
|
*
|
||||||
|
* To compute the message digest of a chunk of bytes, declare an
|
||||||
|
* MD5Context structure, pass it to MD5Init, call MD5Update as
|
||||||
|
* needed on buffers full of bytes, and then call MD5Final, which
|
||||||
|
* will fill a supplied 16-byte array with the digest.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef WORDS_BIGENDIAN
|
||||||
|
#define byteReverse(buf, len) /* Nothing */
|
||||||
|
#else
|
||||||
|
/*
|
||||||
|
* Note: this code is harmless on little-endian machines.
|
||||||
|
*/
|
||||||
|
static void byteReverse(unsigned char *buf, unsigned longs)
|
||||||
|
{
|
||||||
|
u32 t;
|
||||||
|
do {
|
||||||
|
t = (u32) ((unsigned) buf[3] << 8 | buf[2]) << 16 |
|
||||||
|
((unsigned) buf[1] << 8 | buf[0]);
|
||||||
|
*(u32 *) buf = t;
|
||||||
|
buf += 4;
|
||||||
|
} while (--longs);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Start MD5 accumulation. Set bit count to 0 and buffer to mysterious
|
||||||
|
* initialization constants.
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
MD5Init(struct MD5Context *ctx)
|
||||||
|
{
|
||||||
|
ctx->buf[0] = 0x67452301;
|
||||||
|
ctx->buf[1] = 0xefcdab89;
|
||||||
|
ctx->buf[2] = 0x98badcfe;
|
||||||
|
ctx->buf[3] = 0x10325476;
|
||||||
|
|
||||||
|
ctx->bits[0] = 0;
|
||||||
|
ctx->bits[1] = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Update context to reflect the concatenation of another buffer full
|
||||||
|
* of bytes.
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
MD5Update(struct MD5Context *ctx, unsigned char const *buf, unsigned len)
|
||||||
|
{
|
||||||
|
u32 t;
|
||||||
|
|
||||||
|
/* Update bitcount */
|
||||||
|
|
||||||
|
t = ctx->bits[0];
|
||||||
|
if ((ctx->bits[0] = t + ((u32) len << 3)) < t)
|
||||||
|
ctx->bits[1]++; /* Carry from low to high */
|
||||||
|
ctx->bits[1] += len >> 29;
|
||||||
|
|
||||||
|
t = (t >> 3) & 0x3f; /* Bytes already in shsInfo->data */
|
||||||
|
|
||||||
|
/* Handle any leading odd-sized chunks */
|
||||||
|
|
||||||
|
if (t) {
|
||||||
|
unsigned char *p = (unsigned char *) ctx->in + t;
|
||||||
|
|
||||||
|
t = 64 - t;
|
||||||
|
if (len < t) {
|
||||||
|
os_memcpy(p, buf, len);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
os_memcpy(p, buf, t);
|
||||||
|
byteReverse(ctx->in, 16);
|
||||||
|
MD5Transform(ctx->buf, (u32 *) ctx->in);
|
||||||
|
buf += t;
|
||||||
|
len -= t;
|
||||||
|
}
|
||||||
|
/* Process data in 64-byte chunks */
|
||||||
|
|
||||||
|
while (len >= 64) {
|
||||||
|
os_memcpy(ctx->in, buf, 64);
|
||||||
|
byteReverse(ctx->in, 16);
|
||||||
|
MD5Transform(ctx->buf, (u32 *) ctx->in);
|
||||||
|
buf += 64;
|
||||||
|
len -= 64;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Handle any remaining bytes of data. */
|
||||||
|
|
||||||
|
os_memcpy(ctx->in, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Final wrapup - pad to 64-byte boundary with the bit pattern
|
||||||
|
* 1 0* (64-bit count of bits processed, MSB-first)
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
MD5Final(unsigned char digest[16], struct MD5Context *ctx)
|
||||||
|
{
|
||||||
|
unsigned count;
|
||||||
|
unsigned char *p;
|
||||||
|
|
||||||
|
/* Compute number of bytes mod 64 */
|
||||||
|
count = (ctx->bits[0] >> 3) & 0x3F;
|
||||||
|
|
||||||
|
/* Set the first char of padding to 0x80. This is safe since there is
|
||||||
|
always at least one byte free */
|
||||||
|
p = ctx->in + count;
|
||||||
|
*p++ = 0x80;
|
||||||
|
|
||||||
|
/* Bytes of padding needed to make 64 bytes */
|
||||||
|
count = 64 - 1 - count;
|
||||||
|
|
||||||
|
/* Pad out to 56 mod 64 */
|
||||||
|
if (count < 8) {
|
||||||
|
/* Two lots of padding: Pad the first block to 64 bytes */
|
||||||
|
os_memset(p, 0, count);
|
||||||
|
byteReverse(ctx->in, 16);
|
||||||
|
MD5Transform(ctx->buf, (u32 *) ctx->in);
|
||||||
|
|
||||||
|
/* Now fill the next block with 56 bytes */
|
||||||
|
os_memset(ctx->in, 0, 56);
|
||||||
|
} else {
|
||||||
|
/* Pad block to 56 bytes */
|
||||||
|
os_memset(p, 0, count - 8);
|
||||||
|
}
|
||||||
|
byteReverse(ctx->in, 14);
|
||||||
|
|
||||||
|
/* Append length in bits and transform */
|
||||||
|
((u32 *) ctx->in)[14] = ctx->bits[0];
|
||||||
|
((u32 *) ctx->in)[15] = ctx->bits[1];
|
||||||
|
|
||||||
|
MD5Transform(ctx->buf, (u32 *) ctx->in);
|
||||||
|
byteReverse((unsigned char *) ctx->buf, 4);
|
||||||
|
os_memcpy(digest, ctx->buf, 16);
|
||||||
|
os_memset(ctx, 0, sizeof(ctx)); /* In case it's sensitive */
|
||||||
|
}
|
||||||
|
|
||||||
|
/* The four core functions - F1 is optimized somewhat */
|
||||||
|
|
||||||
|
/* #define F1(x, y, z) (x & y | ~x & z) */
|
||||||
|
#define F1(x, y, z) (z ^ (x & (y ^ z)))
|
||||||
|
#define F2(x, y, z) F1(z, x, y)
|
||||||
|
#define F3(x, y, z) (x ^ y ^ z)
|
||||||
|
#define F4(x, y, z) (y ^ (x | ~z))
|
||||||
|
|
||||||
|
/* This is the central step in the MD5 algorithm. */
|
||||||
|
#define MD5STEP(f, w, x, y, z, data, s) \
|
||||||
|
( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x )
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The core of the MD5 algorithm, this alters an existing MD5 hash to
|
||||||
|
* reflect the addition of 16 longwords of new data. MD5Update blocks
|
||||||
|
* the data and converts bytes into longwords for this routine.
|
||||||
|
*/
|
||||||
|
static void ICACHE_FLASH_ATTR
|
||||||
|
MD5Transform(u32 buf[4], u32 const in[16])
|
||||||
|
{
|
||||||
|
register u32 a, b, c, d;
|
||||||
|
|
||||||
|
a = buf[0];
|
||||||
|
b = buf[1];
|
||||||
|
c = buf[2];
|
||||||
|
d = buf[3];
|
||||||
|
|
||||||
|
MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22);
|
||||||
|
MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22);
|
||||||
|
MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
|
||||||
|
MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
|
||||||
|
|
||||||
|
MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
|
||||||
|
MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
|
||||||
|
MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
|
||||||
|
MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
|
||||||
|
|
||||||
|
MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
|
||||||
|
MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
|
||||||
|
MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23);
|
||||||
|
MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23);
|
||||||
|
|
||||||
|
MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21);
|
||||||
|
MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21);
|
||||||
|
MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
|
||||||
|
MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21);
|
||||||
|
|
||||||
|
buf[0] += a;
|
||||||
|
buf[1] += b;
|
||||||
|
buf[2] += c;
|
||||||
|
buf[3] += d;
|
||||||
|
}
|
||||||
|
/* ===== end - public domain MD5 implementation ===== */
|
113
components/wpa_supplicant/src/crypto/md5.c
Normal file
113
components/wpa_supplicant/src/crypto/md5.c
Normal file
@ -0,0 +1,113 @@
|
|||||||
|
/*
|
||||||
|
* MD5 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/md5.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104)
|
||||||
|
* @key: Key for HMAC operations
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash (16 bytes)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
|
||||||
|
const u8 *addr[], const size_t *len, u8 *mac)
|
||||||
|
{
|
||||||
|
u8 k_pad[64]; /* padding - key XORd with ipad/opad */
|
||||||
|
u8 tk[16];
|
||||||
|
const u8 *_addr[6];
|
||||||
|
size_t i, _len[6];
|
||||||
|
|
||||||
|
if (num_elem > 5) {
|
||||||
|
/*
|
||||||
|
* Fixed limit on the number of fragments to avoid having to
|
||||||
|
* allocate memory (which could fail).
|
||||||
|
*/
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* if key is longer than 64 bytes reset it to key = MD5(key) */
|
||||||
|
if (key_len > 64) {
|
||||||
|
if (md5_vector(1, &key, &key_len, tk))
|
||||||
|
return -1;
|
||||||
|
key = tk;
|
||||||
|
key_len = 16;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* the HMAC_MD5 transform looks like:
|
||||||
|
*
|
||||||
|
* MD5(K XOR opad, MD5(K XOR ipad, text))
|
||||||
|
*
|
||||||
|
* where K is an n byte key
|
||||||
|
* ipad is the byte 0x36 repeated 64 times
|
||||||
|
* opad is the byte 0x5c repeated 64 times
|
||||||
|
* and text is the data being protected */
|
||||||
|
|
||||||
|
/* start out by storing key in ipad */
|
||||||
|
os_memset(k_pad, 0, sizeof(k_pad));
|
||||||
|
os_memcpy(k_pad, key, key_len);
|
||||||
|
|
||||||
|
/* XOR key with ipad values */
|
||||||
|
for (i = 0; i < 64; i++)
|
||||||
|
k_pad[i] ^= 0x36;
|
||||||
|
|
||||||
|
/* perform inner MD5 */
|
||||||
|
_addr[0] = k_pad;
|
||||||
|
_len[0] = 64;
|
||||||
|
for (i = 0; i < num_elem; i++) {
|
||||||
|
_addr[i + 1] = addr[i];
|
||||||
|
_len[i + 1] = len[i];
|
||||||
|
}
|
||||||
|
if (md5_vector(1 + num_elem, _addr, _len, mac))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
os_memset(k_pad, 0, sizeof(k_pad));
|
||||||
|
os_memcpy(k_pad, key, key_len);
|
||||||
|
/* XOR key with opad values */
|
||||||
|
for (i = 0; i < 64; i++)
|
||||||
|
k_pad[i] ^= 0x5c;
|
||||||
|
|
||||||
|
/* perform outer MD5 */
|
||||||
|
_addr[0] = k_pad;
|
||||||
|
_len[0] = 64;
|
||||||
|
_addr[1] = mac;
|
||||||
|
_len[1] = MD5_MAC_LEN;
|
||||||
|
return md5_vector(2, _addr, _len, mac);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* hmac_md5 - HMAC-MD5 over data buffer (RFC 2104)
|
||||||
|
* @key: Key for HMAC operations
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @data: Pointers to the data area
|
||||||
|
* @data_len: Length of the data area
|
||||||
|
* @mac: Buffer for the hash (16 bytes)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
||||||
|
u8 *mac)
|
||||||
|
{
|
||||||
|
return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
||||||
|
}
|
61
components/wpa_supplicant/src/crypto/rc4.c
Normal file
61
components/wpa_supplicant/src/crypto/rc4.c
Normal file
@ -0,0 +1,61 @@
|
|||||||
|
/*
|
||||||
|
* RC4 stream cipher
|
||||||
|
* Copyright (c) 2002-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
#define S_SWAP(a,b) do { u8 t = S[a]; S[a] = S[b]; S[b] = t; } while(0)
|
||||||
|
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
||||||
|
u8 *data, size_t data_len)
|
||||||
|
{
|
||||||
|
u32 i, j, k;
|
||||||
|
u8 S[256], *pos;
|
||||||
|
size_t kpos;
|
||||||
|
|
||||||
|
/* Setup RC4 state */
|
||||||
|
for (i = 0; i < 256; i++)
|
||||||
|
S[i] = i;
|
||||||
|
j = 0;
|
||||||
|
kpos = 0;
|
||||||
|
for (i = 0; i < 256; i++) {
|
||||||
|
j = (j + S[i] + key[kpos]) & 0xff;
|
||||||
|
kpos++;
|
||||||
|
if (kpos >= keylen)
|
||||||
|
kpos = 0;
|
||||||
|
S_SWAP(i, j);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Skip the start of the stream */
|
||||||
|
i = j = 0;
|
||||||
|
for (k = 0; k < skip; k++) {
|
||||||
|
i = (i + 1) & 0xff;
|
||||||
|
j = (j + S[i]) & 0xff;
|
||||||
|
S_SWAP(i, j);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Apply RC4 to data */
|
||||||
|
pos = data;
|
||||||
|
for (k = 0; k < data_len; k++) {
|
||||||
|
i = (i + 1) & 0xff;
|
||||||
|
j = (j + S[i]) & 0xff;
|
||||||
|
S_SWAP(i, j);
|
||||||
|
*pos++ ^= S[(S[i] + S[j]) & 0xff];
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
313
components/wpa_supplicant/src/crypto/sha1-internal.c
Normal file
313
components/wpa_supplicant/src/crypto/sha1-internal.c
Normal file
@ -0,0 +1,313 @@
|
|||||||
|
/*
|
||||||
|
* SHA1 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/sha1.h"
|
||||||
|
#include "crypto/sha1_i.h"
|
||||||
|
#include "crypto/md5.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
typedef struct SHA1Context SHA1_CTX;
|
||||||
|
|
||||||
|
void SHA1Transform(u32 state[5], const unsigned char buffer[64]);
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* sha1_vector - SHA-1 hash for data vector
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 of failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
|
||||||
|
{
|
||||||
|
SHA1_CTX ctx;
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
SHA1Init(&ctx);
|
||||||
|
for (i = 0; i < num_elem; i++)
|
||||||
|
SHA1Update(&ctx, addr[i], len[i]);
|
||||||
|
SHA1Final(mac, &ctx);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* ===== start - public domain SHA1 implementation ===== */
|
||||||
|
|
||||||
|
/*
|
||||||
|
SHA-1 in C
|
||||||
|
By Steve Reid <sreid@sea-to-sky.net>
|
||||||
|
100% Public Domain
|
||||||
|
|
||||||
|
-----------------
|
||||||
|
Modified 7/98
|
||||||
|
By James H. Brown <jbrown@burgoyne.com>
|
||||||
|
Still 100% Public Domain
|
||||||
|
|
||||||
|
Corrected a problem which generated improper hash values on 16 bit machines
|
||||||
|
Routine SHA1Update changed from
|
||||||
|
void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned int
|
||||||
|
len)
|
||||||
|
to
|
||||||
|
void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned
|
||||||
|
long len)
|
||||||
|
|
||||||
|
The 'len' parameter was declared an int which works fine on 32 bit machines.
|
||||||
|
However, on 16 bit machines an int is too small for the shifts being done
|
||||||
|
against
|
||||||
|
it. This caused the hash function to generate incorrect values if len was
|
||||||
|
greater than 8191 (8K - 1) due to the 'len << 3' on line 3 of SHA1Update().
|
||||||
|
|
||||||
|
Since the file IO in main() reads 16K at a time, any file 8K or larger would
|
||||||
|
be guaranteed to generate the wrong hash (e.g. Test Vector #3, a million
|
||||||
|
"a"s).
|
||||||
|
|
||||||
|
I also changed the declaration of variables i & j in SHA1Update to
|
||||||
|
unsigned long from unsigned int for the same reason.
|
||||||
|
|
||||||
|
These changes should make no difference to any 32 bit implementations since
|
||||||
|
an
|
||||||
|
int and a long are the same size in those environments.
|
||||||
|
|
||||||
|
--
|
||||||
|
I also corrected a few compiler warnings generated by Borland C.
|
||||||
|
1. Added #include <process.h> for exit() prototype
|
||||||
|
2. Removed unused variable 'j' in SHA1Final
|
||||||
|
3. Changed exit(0) to return(0) at end of main.
|
||||||
|
|
||||||
|
ALL changes I made can be located by searching for comments containing 'JHB'
|
||||||
|
-----------------
|
||||||
|
Modified 8/98
|
||||||
|
By Steve Reid <sreid@sea-to-sky.net>
|
||||||
|
Still 100% public domain
|
||||||
|
|
||||||
|
1- Removed #include <process.h> and used return() instead of exit()
|
||||||
|
2- Fixed overwriting of finalcount in SHA1Final() (discovered by Chris Hall)
|
||||||
|
3- Changed email address from steve@edmweb.com to sreid@sea-to-sky.net
|
||||||
|
|
||||||
|
-----------------
|
||||||
|
Modified 4/01
|
||||||
|
By Saul Kravitz <Saul.Kravitz@celera.com>
|
||||||
|
Still 100% PD
|
||||||
|
Modified to run on Compaq Alpha hardware.
|
||||||
|
|
||||||
|
-----------------
|
||||||
|
Modified 4/01
|
||||||
|
By Jouni Malinen <j@w1.fi>
|
||||||
|
Minor changes to match the coding style used in Dynamics.
|
||||||
|
|
||||||
|
Modified September 24, 2004
|
||||||
|
By Jouni Malinen <j@w1.fi>
|
||||||
|
Fixed alignment issue in SHA1Transform when SHA1HANDSOFF is defined.
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
Test Vectors (from FIPS PUB 180-1)
|
||||||
|
"abc"
|
||||||
|
A9993E36 4706816A BA3E2571 7850C26C 9CD0D89D
|
||||||
|
"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"
|
||||||
|
84983E44 1C3BD26E BAAE4AA1 F95129E5 E54670F1
|
||||||
|
A million repetitions of "a"
|
||||||
|
34AA973C D4C4DAA4 F61EEB2B DBAD2731 6534016F
|
||||||
|
*/
|
||||||
|
|
||||||
|
#define SHA1HANDSOFF
|
||||||
|
|
||||||
|
#define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits))))
|
||||||
|
|
||||||
|
/* blk0() and blk() perform the initial expand. */
|
||||||
|
/* I got the idea of expanding during the round function from SSLeay */
|
||||||
|
#ifndef WORDS_BIGENDIAN
|
||||||
|
#define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \
|
||||||
|
(rol(block->l[i], 8) & 0x00FF00FF))
|
||||||
|
#else
|
||||||
|
#define blk0(i) block->l[i]
|
||||||
|
#endif
|
||||||
|
#define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \
|
||||||
|
block->l[(i + 8) & 15] ^ block->l[(i + 2) & 15] ^ block->l[i & 15], 1))
|
||||||
|
|
||||||
|
/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
|
||||||
|
#define R0(v,w,x,y,z,i) \
|
||||||
|
z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \
|
||||||
|
w = rol(w, 30);
|
||||||
|
#define R1(v,w,x,y,z,i) \
|
||||||
|
z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \
|
||||||
|
w = rol(w, 30);
|
||||||
|
#define R2(v,w,x,y,z,i) \
|
||||||
|
z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30);
|
||||||
|
#define R3(v,w,x,y,z,i) \
|
||||||
|
z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \
|
||||||
|
w = rol(w, 30);
|
||||||
|
#define R4(v,w,x,y,z,i) \
|
||||||
|
z += (w ^ x ^ y) + blk(i) + 0xCA62C1D6 + rol(v, 5); \
|
||||||
|
w=rol(w, 30);
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef VERBOSE /* SAK */
|
||||||
|
void SHAPrintContext(SHA1_CTX *context, char *msg)
|
||||||
|
{
|
||||||
|
printf("%s (%d,%d) %x %x %x %x %x\n",
|
||||||
|
msg,
|
||||||
|
context->count[0], context->count[1],
|
||||||
|
context->state[0],
|
||||||
|
context->state[1],
|
||||||
|
context->state[2],
|
||||||
|
context->state[3],
|
||||||
|
context->state[4]);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* Hash a single 512-bit block. This is the core of the algorithm. */
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
SHA1Transform(u32 state[5], const unsigned char buffer[64])
|
||||||
|
{
|
||||||
|
u32 a, b, c, d, e;
|
||||||
|
typedef union {
|
||||||
|
unsigned char c[64];
|
||||||
|
u32 l[16];
|
||||||
|
} CHAR64LONG16;
|
||||||
|
CHAR64LONG16* block;
|
||||||
|
#ifdef SHA1HANDSOFF
|
||||||
|
CHAR64LONG16 workspace;
|
||||||
|
block = &workspace;
|
||||||
|
os_memcpy(block, buffer, 64);
|
||||||
|
#else
|
||||||
|
block = (CHAR64LONG16 *) buffer;
|
||||||
|
#endif
|
||||||
|
/* Copy context->state[] to working vars */
|
||||||
|
a = state[0];
|
||||||
|
b = state[1];
|
||||||
|
c = state[2];
|
||||||
|
d = state[3];
|
||||||
|
e = state[4];
|
||||||
|
/* 4 rounds of 20 operations each. Loop unrolled. */
|
||||||
|
R0(a,b,c,d,e, 0); R0(e,a,b,c,d, 1); R0(d,e,a,b,c, 2); R0(c,d,e,a,b, 3);
|
||||||
|
R0(b,c,d,e,a, 4); R0(a,b,c,d,e, 5); R0(e,a,b,c,d, 6); R0(d,e,a,b,c, 7);
|
||||||
|
R0(c,d,e,a,b, 8); R0(b,c,d,e,a, 9); R0(a,b,c,d,e,10); R0(e,a,b,c,d,11);
|
||||||
|
R0(d,e,a,b,c,12); R0(c,d,e,a,b,13); R0(b,c,d,e,a,14); R0(a,b,c,d,e,15);
|
||||||
|
R1(e,a,b,c,d,16); R1(d,e,a,b,c,17); R1(c,d,e,a,b,18); R1(b,c,d,e,a,19);
|
||||||
|
R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23);
|
||||||
|
R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27);
|
||||||
|
R2(c,d,e,a,b,28); R2(b,c,d,e,a,29); R2(a,b,c,d,e,30); R2(e,a,b,c,d,31);
|
||||||
|
R2(d,e,a,b,c,32); R2(c,d,e,a,b,33); R2(b,c,d,e,a,34); R2(a,b,c,d,e,35);
|
||||||
|
R2(e,a,b,c,d,36); R2(d,e,a,b,c,37); R2(c,d,e,a,b,38); R2(b,c,d,e,a,39);
|
||||||
|
R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
|
||||||
|
R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(d,e,a,b,c,47);
|
||||||
|
R3(c,d,e,a,b,48); R3(b,c,d,e,a,49); R3(a,b,c,d,e,50); R3(e,a,b,c,d,51);
|
||||||
|
R3(d,e,a,b,c,52); R3(c,d,e,a,b,53); R3(b,c,d,e,a,54); R3(a,b,c,d,e,55);
|
||||||
|
R3(e,a,b,c,d,56); R3(d,e,a,b,c,57); R3(c,d,e,a,b,58); R3(b,c,d,e,a,59);
|
||||||
|
R4(a,b,c,d,e,60); R4(e,a,b,c,d,61); R4(d,e,a,b,c,62); R4(c,d,e,a,b,63);
|
||||||
|
R4(b,c,d,e,a,64); R4(a,b,c,d,e,65); R4(e,a,b,c,d,66); R4(d,e,a,b,c,67);
|
||||||
|
R4(c,d,e,a,b,68); R4(b,c,d,e,a,69); R4(a,b,c,d,e,70); R4(e,a,b,c,d,71);
|
||||||
|
R4(d,e,a,b,c,72); R4(c,d,e,a,b,73); R4(b,c,d,e,a,74); R4(a,b,c,d,e,75);
|
||||||
|
R4(e,a,b,c,d,76); R4(d,e,a,b,c,77); R4(c,d,e,a,b,78); R4(b,c,d,e,a,79);
|
||||||
|
/* Add the working vars back into context.state[] */
|
||||||
|
state[0] += a;
|
||||||
|
state[1] += b;
|
||||||
|
state[2] += c;
|
||||||
|
state[3] += d;
|
||||||
|
state[4] += e;
|
||||||
|
/* Wipe variables */
|
||||||
|
a = b = c = d = e = 0;
|
||||||
|
#ifdef SHA1HANDSOFF
|
||||||
|
os_memset(block, 0, 64);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* SHA1Init - Initialize new context */
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
SHA1Init(SHA1_CTX* context)
|
||||||
|
{
|
||||||
|
/* SHA1 initialization constants */
|
||||||
|
context->state[0] = 0x67452301;
|
||||||
|
context->state[1] = 0xEFCDAB89;
|
||||||
|
context->state[2] = 0x98BADCFE;
|
||||||
|
context->state[3] = 0x10325476;
|
||||||
|
context->state[4] = 0xC3D2E1F0;
|
||||||
|
context->count[0] = context->count[1] = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* Run your data through this. */
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
SHA1Update(SHA1_CTX* context, const void *_data, u32 len)
|
||||||
|
{
|
||||||
|
u32 i, j;
|
||||||
|
const unsigned char *data = _data;
|
||||||
|
|
||||||
|
#ifdef VERBOSE
|
||||||
|
SHAPrintContext(context, "before");
|
||||||
|
#endif
|
||||||
|
j = (context->count[0] >> 3) & 63;
|
||||||
|
if ((context->count[0] += len << 3) < (len << 3))
|
||||||
|
context->count[1]++;
|
||||||
|
context->count[1] += (len >> 29);
|
||||||
|
if ((j + len) > 63) {
|
||||||
|
os_memcpy(&context->buffer[j], data, (i = 64-j));
|
||||||
|
SHA1Transform(context->state, context->buffer);
|
||||||
|
for ( ; i + 63 < len; i += 64) {
|
||||||
|
SHA1Transform(context->state, &data[i]);
|
||||||
|
}
|
||||||
|
j = 0;
|
||||||
|
}
|
||||||
|
else i = 0;
|
||||||
|
os_memcpy(&context->buffer[j], &data[i], len - i);
|
||||||
|
#ifdef VERBOSE
|
||||||
|
SHAPrintContext(context, "after ");
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* Add padding and return the message digest. */
|
||||||
|
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
SHA1Final(unsigned char digest[20], SHA1_CTX* context)
|
||||||
|
{
|
||||||
|
u32 i;
|
||||||
|
unsigned char finalcount[8];
|
||||||
|
|
||||||
|
for (i = 0; i < 8; i++) {
|
||||||
|
finalcount[i] = (unsigned char)
|
||||||
|
((context->count[(i >= 4 ? 0 : 1)] >>
|
||||||
|
((3-(i & 3)) * 8) ) & 255); /* Endian independent */
|
||||||
|
}
|
||||||
|
SHA1Update(context, (unsigned char *) "\200", 1);
|
||||||
|
while ((context->count[0] & 504) != 448) {
|
||||||
|
SHA1Update(context, (unsigned char *) "\0", 1);
|
||||||
|
}
|
||||||
|
SHA1Update(context, finalcount, 8); /* Should cause a SHA1Transform()
|
||||||
|
*/
|
||||||
|
for (i = 0; i < 20; i++) {
|
||||||
|
digest[i] = (unsigned char)
|
||||||
|
((context->state[i >> 2] >> ((3 - (i & 3)) * 8)) &
|
||||||
|
255);
|
||||||
|
}
|
||||||
|
/* Wipe variables */
|
||||||
|
i = 0;
|
||||||
|
os_memset(context->buffer, 0, 64);
|
||||||
|
os_memset(context->state, 0, 20);
|
||||||
|
os_memset(context->count, 0, 8);
|
||||||
|
os_memset(finalcount, 0, 8);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ===== end - public domain SHA1 implementation ===== */
|
101
components/wpa_supplicant/src/crypto/sha1-pbkdf2.c
Normal file
101
components/wpa_supplicant/src/crypto/sha1-pbkdf2.c
Normal file
@ -0,0 +1,101 @@
|
|||||||
|
/*
|
||||||
|
* SHA1-based key derivation function (PBKDF2) for IEEE 802.11i
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/sha1.h"
|
||||||
|
#include "crypto/md5.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
static int ICACHE_FLASH_ATTR
|
||||||
|
pbkdf2_sha1_f(const char *passphrase, const char *ssid,
|
||||||
|
size_t ssid_len, int iterations, unsigned int count,
|
||||||
|
u8 *digest)
|
||||||
|
{
|
||||||
|
unsigned char tmp[SHA1_MAC_LEN], tmp2[SHA1_MAC_LEN];
|
||||||
|
int i, j;
|
||||||
|
unsigned char count_buf[4];
|
||||||
|
const u8 *addr[2];
|
||||||
|
size_t len[2];
|
||||||
|
size_t passphrase_len = os_strlen(passphrase);
|
||||||
|
|
||||||
|
addr[0] = (u8 *) ssid;
|
||||||
|
len[0] = ssid_len;
|
||||||
|
addr[1] = count_buf;
|
||||||
|
len[1] = 4;
|
||||||
|
|
||||||
|
/* F(P, S, c, i) = U1 xor U2 xor ... Uc
|
||||||
|
* U1 = PRF(P, S || i)
|
||||||
|
* U2 = PRF(P, U1)
|
||||||
|
* Uc = PRF(P, Uc-1)
|
||||||
|
*/
|
||||||
|
|
||||||
|
count_buf[0] = (count >> 24) & 0xff;
|
||||||
|
count_buf[1] = (count >> 16) & 0xff;
|
||||||
|
count_buf[2] = (count >> 8) & 0xff;
|
||||||
|
count_buf[3] = count & 0xff;
|
||||||
|
if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
|
||||||
|
tmp))
|
||||||
|
return -1;
|
||||||
|
os_memcpy(digest, tmp, SHA1_MAC_LEN);
|
||||||
|
|
||||||
|
for (i = 1; i < iterations; i++) {
|
||||||
|
if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
|
||||||
|
SHA1_MAC_LEN, tmp2))
|
||||||
|
return -1;
|
||||||
|
os_memcpy(tmp, tmp2, SHA1_MAC_LEN);
|
||||||
|
for (j = 0; j < SHA1_MAC_LEN; j++)
|
||||||
|
digest[j] ^= tmp2[j];
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* pbkdf2_sha1 - SHA1-based key derivation function (PBKDF2) for IEEE 802.11i
|
||||||
|
* @passphrase: ASCII passphrase
|
||||||
|
* @ssid: SSID
|
||||||
|
* @ssid_len: SSID length in bytes
|
||||||
|
* @iterations: Number of iterations to run
|
||||||
|
* @buf: Buffer for the generated key
|
||||||
|
* @buflen: Length of the buffer in bytes
|
||||||
|
* Returns: 0 on success, -1 of failure
|
||||||
|
*
|
||||||
|
* This function is used to derive PSK for WPA-PSK. For this protocol,
|
||||||
|
* iterations is set to 4096 and buflen to 32. This function is described in
|
||||||
|
* IEEE Std 802.11-2004, Clause H.4. The main construction is from PKCS#5 v2.0.
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len,
|
||||||
|
int iterations, u8 *buf, size_t buflen)
|
||||||
|
{
|
||||||
|
unsigned int count = 0;
|
||||||
|
unsigned char *pos = buf;
|
||||||
|
size_t left = buflen, plen;
|
||||||
|
unsigned char digest[SHA1_MAC_LEN];
|
||||||
|
|
||||||
|
while (left > 0) {
|
||||||
|
count++;
|
||||||
|
if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
||||||
|
count, digest))
|
||||||
|
return -1;
|
||||||
|
plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
|
||||||
|
os_memcpy(pos, digest, plen);
|
||||||
|
pos += plen;
|
||||||
|
left -= plen;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
166
components/wpa_supplicant/src/crypto/sha1.c
Normal file
166
components/wpa_supplicant/src/crypto/sha1.c
Normal file
@ -0,0 +1,166 @@
|
|||||||
|
/*
|
||||||
|
* SHA1 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/sha1.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* hmac_sha1_vector - HMAC-SHA1 over data vector (RFC 2104)
|
||||||
|
* @key: Key for HMAC operations
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash (20 bytes)
|
||||||
|
* Returns: 0 on success, -1 on failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
|
||||||
|
const u8 *addr[], const size_t *len, u8 *mac)
|
||||||
|
{
|
||||||
|
unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
|
||||||
|
unsigned char tk[20];
|
||||||
|
const u8 *_addr[6];
|
||||||
|
size_t _len[6], i;
|
||||||
|
|
||||||
|
if (num_elem > 5) {
|
||||||
|
/*
|
||||||
|
* Fixed limit on the number of fragments to avoid having to
|
||||||
|
* allocate memory (which could fail).
|
||||||
|
*/
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* if key is longer than 64 bytes reset it to key = SHA1(key) */
|
||||||
|
if (key_len > 64) {
|
||||||
|
if (sha1_vector(1, &key, &key_len, tk))
|
||||||
|
return -1;
|
||||||
|
key = tk;
|
||||||
|
key_len = 20;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* the HMAC_SHA1 transform looks like:
|
||||||
|
*
|
||||||
|
* SHA1(K XOR opad, SHA1(K XOR ipad, text))
|
||||||
|
*
|
||||||
|
* where K is an n byte key
|
||||||
|
* ipad is the byte 0x36 repeated 64 times
|
||||||
|
* opad is the byte 0x5c repeated 64 times
|
||||||
|
* and text is the data being protected */
|
||||||
|
|
||||||
|
/* start out by storing key in ipad */
|
||||||
|
os_memset(k_pad, 0, sizeof(k_pad));
|
||||||
|
os_memcpy(k_pad, key, key_len);
|
||||||
|
/* XOR key with ipad values */
|
||||||
|
for (i = 0; i < 64; i++)
|
||||||
|
k_pad[i] ^= 0x36;
|
||||||
|
|
||||||
|
/* perform inner SHA1 */
|
||||||
|
_addr[0] = k_pad;
|
||||||
|
_len[0] = 64;
|
||||||
|
for (i = 0; i < num_elem; i++) {
|
||||||
|
_addr[i + 1] = addr[i];
|
||||||
|
_len[i + 1] = len[i];
|
||||||
|
}
|
||||||
|
if (sha1_vector(1 + num_elem, _addr, _len, mac))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
os_memset(k_pad, 0, sizeof(k_pad));
|
||||||
|
os_memcpy(k_pad, key, key_len);
|
||||||
|
/* XOR key with opad values */
|
||||||
|
for (i = 0; i < 64; i++)
|
||||||
|
k_pad[i] ^= 0x5c;
|
||||||
|
|
||||||
|
/* perform outer SHA1 */
|
||||||
|
_addr[0] = k_pad;
|
||||||
|
_len[0] = 64;
|
||||||
|
_addr[1] = mac;
|
||||||
|
_len[1] = SHA1_MAC_LEN;
|
||||||
|
return sha1_vector(2, _addr, _len, mac);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104)
|
||||||
|
* @key: Key for HMAC operations
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @data: Pointers to the data area
|
||||||
|
* @data_len: Length of the data area
|
||||||
|
* @mac: Buffer for the hash (20 bytes)
|
||||||
|
* Returns: 0 on success, -1 of failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
||||||
|
u8 *mac)
|
||||||
|
{
|
||||||
|
return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* sha1_prf - SHA1-based Pseudo-Random Function (PRF) (IEEE 802.11i, 8.5.1.1)
|
||||||
|
* @key: Key for PRF
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @label: A unique label for each purpose of the PRF
|
||||||
|
* @data: Extra data to bind into the key
|
||||||
|
* @data_len: Length of the data
|
||||||
|
* @buf: Buffer for the generated pseudo-random key
|
||||||
|
* @buf_len: Number of bytes of key to generate
|
||||||
|
* Returns: 0 on success, -1 of failure
|
||||||
|
*
|
||||||
|
* This function is used to derive new, cryptographically separate keys from a
|
||||||
|
* given key (e.g., PMK in IEEE 802.11i).
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
sha1_prf(const u8 *key, size_t key_len, const char *label,
|
||||||
|
const u8 *data, size_t data_len, u8 *buf, size_t buf_len)
|
||||||
|
{
|
||||||
|
u8 counter = 0;
|
||||||
|
size_t pos, plen;
|
||||||
|
u8 hash[SHA1_MAC_LEN];
|
||||||
|
size_t label_len = os_strlen(label) + 1;
|
||||||
|
const unsigned char *addr[3];
|
||||||
|
size_t len[3];
|
||||||
|
|
||||||
|
addr[0] = (u8 *) label;
|
||||||
|
len[0] = label_len;
|
||||||
|
addr[1] = data;
|
||||||
|
len[1] = data_len;
|
||||||
|
addr[2] = &counter;
|
||||||
|
len[2] = 1;
|
||||||
|
|
||||||
|
pos = 0;
|
||||||
|
while (pos < buf_len) {
|
||||||
|
plen = buf_len - pos;
|
||||||
|
if (plen >= SHA1_MAC_LEN) {
|
||||||
|
if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
||||||
|
&buf[pos]))
|
||||||
|
return -1;
|
||||||
|
pos += SHA1_MAC_LEN;
|
||||||
|
} else {
|
||||||
|
if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
||||||
|
hash))
|
||||||
|
return -1;
|
||||||
|
os_memcpy(&buf[pos], hash, plen);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
counter++;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
249
components/wpa_supplicant/src/crypto/sha256-internal.c
Normal file
249
components/wpa_supplicant/src/crypto/sha256-internal.c
Normal file
@ -0,0 +1,249 @@
|
|||||||
|
/*
|
||||||
|
* SHA-256 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2011, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/sha256.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
#define SHA256_BLOCK_SIZE 64
|
||||||
|
|
||||||
|
struct sha256_state {
|
||||||
|
u64 length;
|
||||||
|
u32 state[8], curlen;
|
||||||
|
u8 buf[SHA256_BLOCK_SIZE];
|
||||||
|
};
|
||||||
|
|
||||||
|
static void sha256_init(struct sha256_state *md);
|
||||||
|
static int sha256_process(struct sha256_state *md, const unsigned char *in,
|
||||||
|
unsigned long inlen);
|
||||||
|
static int sha256_done(struct sha256_state *md, unsigned char *out);
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* sha256_vector - SHA256 hash for data vector
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash
|
||||||
|
* Returns: 0 on success, -1 of failure
|
||||||
|
*/
|
||||||
|
int ICACHE_FLASH_ATTR
|
||||||
|
sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len,
|
||||||
|
u8 *mac)
|
||||||
|
{
|
||||||
|
struct sha256_state ctx;
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
sha256_init(&ctx);
|
||||||
|
for (i = 0; i < num_elem; i++)
|
||||||
|
if (sha256_process(&ctx, addr[i], len[i]))
|
||||||
|
return -1;
|
||||||
|
if (sha256_done(&ctx, mac))
|
||||||
|
return -1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* ===== start - public domain SHA256 implementation ===== */
|
||||||
|
|
||||||
|
/* This is based on SHA256 implementation in LibTomCrypt that was released into
|
||||||
|
* public domain by Tom St Denis. */
|
||||||
|
|
||||||
|
/* the K array */
|
||||||
|
static const unsigned long K[64] = {
|
||||||
|
0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, 0x3956c25bUL,
|
||||||
|
0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL, 0xd807aa98UL, 0x12835b01UL,
|
||||||
|
0x243185beUL, 0x550c7dc3UL, 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL,
|
||||||
|
0xc19bf174UL, 0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL,
|
||||||
|
0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL, 0x983e5152UL,
|
||||||
|
0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, 0xc6e00bf3UL, 0xd5a79147UL,
|
||||||
|
0x06ca6351UL, 0x14292967UL, 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL,
|
||||||
|
0x53380d13UL, 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL,
|
||||||
|
0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL, 0xd192e819UL,
|
||||||
|
0xd6990624UL, 0xf40e3585UL, 0x106aa070UL, 0x19a4c116UL, 0x1e376c08UL,
|
||||||
|
0x2748774cUL, 0x34b0bcb5UL, 0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL,
|
||||||
|
0x682e6ff3UL, 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,
|
||||||
|
0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
/* Various logical functions */
|
||||||
|
#define RORc(x, y) \
|
||||||
|
( ((((unsigned long) (x) & 0xFFFFFFFFUL) >> (unsigned long) ((y) & 31)) | \
|
||||||
|
((unsigned long) (x) << (unsigned long) (32 - ((y) & 31)))) & 0xFFFFFFFFUL)
|
||||||
|
#define Ch(x,y,z) (z ^ (x & (y ^ z)))
|
||||||
|
#define Maj(x,y,z) (((x | y) & z) | (x & y))
|
||||||
|
#define S(x, n) RORc((x), (n))
|
||||||
|
#define R(x, n) (((x)&0xFFFFFFFFUL)>>(n))
|
||||||
|
#define Sigma0(x) (S(x, 2) ^ S(x, 13) ^ S(x, 22))
|
||||||
|
#define Sigma1(x) (S(x, 6) ^ S(x, 11) ^ S(x, 25))
|
||||||
|
#define Gamma0(x) (S(x, 7) ^ S(x, 18) ^ R(x, 3))
|
||||||
|
#define Gamma1(x) (S(x, 17) ^ S(x, 19) ^ R(x, 10))
|
||||||
|
#ifndef MIN
|
||||||
|
#define MIN(x, y) (((x) < (y)) ? (x) : (y))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* compress 512-bits */
|
||||||
|
static int ICACHE_FLASH_ATTR
|
||||||
|
sha256_compress(struct sha256_state *md, unsigned char *buf)
|
||||||
|
{
|
||||||
|
u32 S[8], W[64], t0, t1;
|
||||||
|
u32 t;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
/* copy state into S */
|
||||||
|
for (i = 0; i < 8; i++) {
|
||||||
|
S[i] = md->state[i];
|
||||||
|
}
|
||||||
|
|
||||||
|
/* copy the state into 512-bits into W[0..15] */
|
||||||
|
for (i = 0; i < 16; i++)
|
||||||
|
W[i] = WPA_GET_BE32(buf + (4 * i));
|
||||||
|
|
||||||
|
/* fill W[16..63] */
|
||||||
|
for (i = 16; i < 64; i++) {
|
||||||
|
W[i] = Gamma1(W[i - 2]) + W[i - 7] + Gamma0(W[i - 15]) +
|
||||||
|
W[i - 16];
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Compress */
|
||||||
|
#define RND(a,b,c,d,e,f,g,h,i) \
|
||||||
|
t0 = h + Sigma1(e) + Ch(e, f, g) + K[i] + W[i]; \
|
||||||
|
t1 = Sigma0(a) + Maj(a, b, c); \
|
||||||
|
d += t0; \
|
||||||
|
h = t0 + t1;
|
||||||
|
|
||||||
|
for (i = 0; i < 64; ++i) {
|
||||||
|
RND(S[0], S[1], S[2], S[3], S[4], S[5], S[6], S[7], i);
|
||||||
|
t = S[7]; S[7] = S[6]; S[6] = S[5]; S[5] = S[4];
|
||||||
|
S[4] = S[3]; S[3] = S[2]; S[2] = S[1]; S[1] = S[0]; S[0] = t;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* feedback */
|
||||||
|
for (i = 0; i < 8; i++) {
|
||||||
|
md->state[i] = md->state[i] + S[i];
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* Initialize the hash state */
|
||||||
|
static void ICACHE_FLASH_ATTR
|
||||||
|
sha256_init(struct sha256_state *md)
|
||||||
|
{
|
||||||
|
md->curlen = 0;
|
||||||
|
md->length = 0;
|
||||||
|
md->state[0] = 0x6A09E667UL;
|
||||||
|
md->state[1] = 0xBB67AE85UL;
|
||||||
|
md->state[2] = 0x3C6EF372UL;
|
||||||
|
md->state[3] = 0xA54FF53AUL;
|
||||||
|
md->state[4] = 0x510E527FUL;
|
||||||
|
md->state[5] = 0x9B05688CUL;
|
||||||
|
md->state[6] = 0x1F83D9ABUL;
|
||||||
|
md->state[7] = 0x5BE0CD19UL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Process a block of memory though the hash
|
||||||
|
@param md The hash state
|
||||||
|
@param in The data to hash
|
||||||
|
@param inlen The length of the data (octets)
|
||||||
|
@return CRYPT_OK if successful
|
||||||
|
*/
|
||||||
|
static int ICACHE_FLASH_ATTR
|
||||||
|
sha256_process(struct sha256_state *md, const unsigned char *in,
|
||||||
|
unsigned long inlen)
|
||||||
|
{
|
||||||
|
unsigned long n;
|
||||||
|
|
||||||
|
if (md->curlen >= sizeof(md->buf))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
while (inlen > 0) {
|
||||||
|
if (md->curlen == 0 && inlen >= SHA256_BLOCK_SIZE) {
|
||||||
|
if (sha256_compress(md, (unsigned char *) in) < 0)
|
||||||
|
return -1;
|
||||||
|
md->length += SHA256_BLOCK_SIZE * 8;
|
||||||
|
in += SHA256_BLOCK_SIZE;
|
||||||
|
inlen -= SHA256_BLOCK_SIZE;
|
||||||
|
} else {
|
||||||
|
n = MIN(inlen, (SHA256_BLOCK_SIZE - md->curlen));
|
||||||
|
os_memcpy(md->buf + md->curlen, in, n);
|
||||||
|
md->curlen += n;
|
||||||
|
in += n;
|
||||||
|
inlen -= n;
|
||||||
|
if (md->curlen == SHA256_BLOCK_SIZE) {
|
||||||
|
if (sha256_compress(md, md->buf) < 0)
|
||||||
|
return -1;
|
||||||
|
md->length += 8 * SHA256_BLOCK_SIZE;
|
||||||
|
md->curlen = 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
Terminate the hash to get the digest
|
||||||
|
@param md The hash state
|
||||||
|
@param out [out] The destination of the hash (32 bytes)
|
||||||
|
@return CRYPT_OK if successful
|
||||||
|
*/
|
||||||
|
static int ICACHE_FLASH_ATTR
|
||||||
|
sha256_done(struct sha256_state *md, unsigned char *out)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
|
if (md->curlen >= sizeof(md->buf))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
/* increase the length of the message */
|
||||||
|
md->length += md->curlen * 8;
|
||||||
|
|
||||||
|
/* append the '1' bit */
|
||||||
|
md->buf[md->curlen++] = (unsigned char) 0x80;
|
||||||
|
|
||||||
|
/* if the length is currently above 56 bytes we append zeros
|
||||||
|
* then compress. Then we can fall back to padding zeros and length
|
||||||
|
* encoding like normal.
|
||||||
|
*/
|
||||||
|
if (md->curlen > 56) {
|
||||||
|
while (md->curlen < SHA256_BLOCK_SIZE) {
|
||||||
|
md->buf[md->curlen++] = (unsigned char) 0;
|
||||||
|
}
|
||||||
|
sha256_compress(md, md->buf);
|
||||||
|
md->curlen = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* pad up to 56 bytes of zeroes */
|
||||||
|
while (md->curlen < 56) {
|
||||||
|
md->buf[md->curlen++] = (unsigned char) 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* store length */
|
||||||
|
WPA_PUT_BE64(md->buf + 56, md->length);
|
||||||
|
sha256_compress(md, md->buf);
|
||||||
|
|
||||||
|
/* copy output */
|
||||||
|
for (i = 0; i < 8; i++)
|
||||||
|
WPA_PUT_BE32(out + (4 * i), md->state[i]);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ===== end - public domain SHA256 implementation ===== */
|
160
components/wpa_supplicant/src/crypto/sha256.c
Normal file
160
components/wpa_supplicant/src/crypto/sha256.c
Normal file
@ -0,0 +1,160 @@
|
|||||||
|
/*
|
||||||
|
* SHA-256 hash implementation and interface functions
|
||||||
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License version 2 as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* Alternatively, this software may be distributed under the terms of BSD
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* See README and COPYING for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "crypto/includes.h"
|
||||||
|
|
||||||
|
#include "crypto/common.h"
|
||||||
|
#include "crypto/sha256.h"
|
||||||
|
#include "crypto/crypto.h"
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* hmac_sha256_vector - HMAC-SHA256 over data vector (RFC 2104)
|
||||||
|
* @key: Key for HMAC operations
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @num_elem: Number of elements in the data vector
|
||||||
|
* @addr: Pointers to the data areas
|
||||||
|
* @len: Lengths of the data blocks
|
||||||
|
* @mac: Buffer for the hash (32 bytes)
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
|
||||||
|
const u8 *addr[], const size_t *len, u8 *mac)
|
||||||
|
{
|
||||||
|
unsigned char k_pad[64]; /* padding - key XORd with ipad/opad */
|
||||||
|
unsigned char tk[32];
|
||||||
|
const u8 *_addr[6];
|
||||||
|
size_t _len[6], i;
|
||||||
|
|
||||||
|
if (num_elem > 5) {
|
||||||
|
/*
|
||||||
|
* Fixed limit on the number of fragments to avoid having to
|
||||||
|
* allocate memory (which could fail).
|
||||||
|
*/
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* if key is longer than 64 bytes reset it to key = SHA256(key) */
|
||||||
|
if (key_len > 64) {
|
||||||
|
sha256_vector(1, &key, &key_len, tk);
|
||||||
|
key = tk;
|
||||||
|
key_len = 32;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* the HMAC_SHA256 transform looks like:
|
||||||
|
*
|
||||||
|
* SHA256(K XOR opad, SHA256(K XOR ipad, text))
|
||||||
|
*
|
||||||
|
* where K is an n byte key
|
||||||
|
* ipad is the byte 0x36 repeated 64 times
|
||||||
|
* opad is the byte 0x5c repeated 64 times
|
||||||
|
* and text is the data being protected */
|
||||||
|
|
||||||
|
/* start out by storing key in ipad */
|
||||||
|
os_memset(k_pad, 0, sizeof(k_pad));
|
||||||
|
os_memcpy(k_pad, key, key_len);
|
||||||
|
/* XOR key with ipad values */
|
||||||
|
for (i = 0; i < 64; i++)
|
||||||
|
k_pad[i] ^= 0x36;
|
||||||
|
|
||||||
|
/* perform inner SHA256 */
|
||||||
|
_addr[0] = k_pad;
|
||||||
|
_len[0] = 64;
|
||||||
|
for (i = 0; i < num_elem; i++) {
|
||||||
|
_addr[i + 1] = addr[i];
|
||||||
|
_len[i + 1] = len[i];
|
||||||
|
}
|
||||||
|
sha256_vector(1 + num_elem, _addr, _len, mac);
|
||||||
|
|
||||||
|
os_memset(k_pad, 0, sizeof(k_pad));
|
||||||
|
os_memcpy(k_pad, key, key_len);
|
||||||
|
/* XOR key with opad values */
|
||||||
|
for (i = 0; i < 64; i++)
|
||||||
|
k_pad[i] ^= 0x5c;
|
||||||
|
|
||||||
|
/* perform outer SHA256 */
|
||||||
|
_addr[0] = k_pad;
|
||||||
|
_len[0] = 64;
|
||||||
|
_addr[1] = mac;
|
||||||
|
_len[1] = SHA256_MAC_LEN;
|
||||||
|
sha256_vector(2, _addr, _len, mac);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* hmac_sha256 - HMAC-SHA256 over data buffer (RFC 2104)
|
||||||
|
* @key: Key for HMAC operations
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @data: Pointers to the data area
|
||||||
|
* @data_len: Length of the data area
|
||||||
|
* @mac: Buffer for the hash (20 bytes)
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
|
||||||
|
size_t data_len, u8 *mac)
|
||||||
|
{
|
||||||
|
hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* sha256_prf - SHA256-based Pseudo-Random Function (IEEE 802.11r, 8.5.1.5.2)
|
||||||
|
* @key: Key for PRF
|
||||||
|
* @key_len: Length of the key in bytes
|
||||||
|
* @label: A unique label for each purpose of the PRF
|
||||||
|
* @data: Extra data to bind into the key
|
||||||
|
* @data_len: Length of the data
|
||||||
|
* @buf: Buffer for the generated pseudo-random key
|
||||||
|
* @buf_len: Number of bytes of key to generate
|
||||||
|
*
|
||||||
|
* This function is used to derive new, cryptographically separate keys from a
|
||||||
|
* given key.
|
||||||
|
*/
|
||||||
|
void ICACHE_FLASH_ATTR
|
||||||
|
sha256_prf(const u8 *key, size_t key_len, const char *label,
|
||||||
|
const u8 *data, size_t data_len, u8 *buf, size_t buf_len)
|
||||||
|
{
|
||||||
|
u16 counter = 1;
|
||||||
|
size_t pos, plen;
|
||||||
|
u8 hash[SHA256_MAC_LEN];
|
||||||
|
const u8 *addr[4];
|
||||||
|
size_t len[4];
|
||||||
|
u8 counter_le[2], length_le[2];
|
||||||
|
|
||||||
|
addr[0] = counter_le;
|
||||||
|
len[0] = 2;
|
||||||
|
addr[1] = (u8 *) label;
|
||||||
|
len[1] = os_strlen(label);
|
||||||
|
addr[2] = data;
|
||||||
|
len[2] = data_len;
|
||||||
|
addr[3] = length_le;
|
||||||
|
len[3] = sizeof(length_le);
|
||||||
|
|
||||||
|
WPA_PUT_LE16(length_le, buf_len * 8);
|
||||||
|
pos = 0;
|
||||||
|
while (pos < buf_len) {
|
||||||
|
plen = buf_len - pos;
|
||||||
|
WPA_PUT_LE16(counter_le, counter);
|
||||||
|
if (plen >= SHA256_MAC_LEN) {
|
||||||
|
hmac_sha256_vector(key, key_len, 4, addr, len,
|
||||||
|
&buf[pos]);
|
||||||
|
pos += SHA256_MAC_LEN;
|
||||||
|
} else {
|
||||||
|
hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
||||||
|
os_memcpy(&buf[pos], hash, plen);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
counter++;
|
||||||
|
}
|
||||||
|
}
|
Reference in New Issue
Block a user