Module Name: src Committed By: drochner Date: Wed Jun 8 10:14:16 UTC 2011
Modified Files: src/sys/opencrypto: gmac.c Log Message: reduce typecasts and byte swapping To generate a diff of this commit: cvs rdiff -u -r1.1 -r1.2 src/sys/opencrypto/gmac.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/opencrypto/gmac.c diff -u src/sys/opencrypto/gmac.c:1.1 src/sys/opencrypto/gmac.c:1.2 --- src/sys/opencrypto/gmac.c:1.1 Thu May 26 21:50:03 2011 +++ src/sys/opencrypto/gmac.c Wed Jun 8 10:14:16 2011 @@ -1,4 +1,4 @@ -/* $NetBSD: gmac.c,v 1.1 2011/05/26 21:50:03 drochner Exp $ */ +/* $NetBSD: gmac.c,v 1.2 2011/06/08 10:14:16 drochner Exp $ */ /* OpenBSD: gmac.c,v 1.3 2011/01/11 15:44:23 deraadt Exp */ /* @@ -37,23 +37,19 @@ ghash_gfmul(const uint32_t *X, const uint32_t *Y, uint32_t *product) { uint32_t v[4]; - uint32_t z[4] = { 0, 0, 0, 0}; - const uint8_t *x = (const uint8_t *)X; uint32_t mul; int i; - v[0] = be32toh(Y[0]); - v[1] = be32toh(Y[1]); - v[2] = be32toh(Y[2]); - v[3] = be32toh(Y[3]); + memcpy(v, Y, GMAC_BLOCK_LEN); + memset(product, 0, GMAC_BLOCK_LEN); for (i = 0; i < GMAC_BLOCK_LEN * 8; i++) { /* update Z */ - if (x[i >> 3] & (1 << (~i & 7))) { - z[0] ^= v[0]; - z[1] ^= v[1]; - z[2] ^= v[2]; - z[3] ^= v[3]; + if (X[i >> 5] & (1 << (~i & 31))) { + product[0] ^= v[0]; + product[1] ^= v[1]; + product[2] ^= v[2]; + product[3] ^= v[3]; } /* else: we preserve old values */ /* update V */ @@ -63,28 +59,26 @@ v[1] = (v[0] << 31) | (v[1] >> 1); v[0] = (v[0] >> 1) ^ (0xe1000000 * mul); } - - product[0] = htobe32(z[0]); - product[1] = htobe32(z[1]); - product[2] = htobe32(z[2]); - product[3] = htobe32(z[3]); } void ghash_update(GHASH_CTX *ctx, const uint8_t *X, size_t len) { - uint8_t *s = (uint8_t *)ctx->S; - uint8_t *y = (uint8_t *)ctx->Z; + uint32_t x; + uint32_t *s = ctx->S; + uint32_t *y = ctx->Z; int i, j; for (i = 0; i < len / GMAC_BLOCK_LEN; i++) { - for (j = 0; j < GMAC_BLOCK_LEN; j++) - s[j] = y[j] ^ X[j]; + for (j = 0; j < GMAC_BLOCK_LEN/4; j++) { + x = (X[0] << 24) | (X[1] << 16) | (X[2] << 8) | X[3]; + s[j] = y[j] ^ x; + X += 4; + } - ghash_gfmul(ctx->S, ctx->H, ctx->S); + ghash_gfmul(ctx->H, ctx->S, ctx->S); y = s; - X += GMAC_BLOCK_LEN; } memcpy(ctx->Z, ctx->S, GMAC_BLOCK_LEN); @@ -102,6 +96,8 @@ void AES_GMAC_Setkey(AES_GMAC_CTX *ctx, const uint8_t *key, uint16_t klen) { + int i; + ctx->rounds = rijndaelKeySetupEnc(ctx->K, (const u_char *)key, (klen - AESCTR_NONCESIZE) * 8); /* copy out salt to the counter block */ @@ -109,6 +105,8 @@ /* prepare a hash subkey */ rijndaelEncrypt(ctx->K, ctx->rounds, (void *)ctx->ghash.H, (void *)ctx->ghash.H); + for (i = 0; i < 4; i++) + ctx->ghash.H[i] = be32toh(ctx->ghash.H[i]); } void @@ -121,18 +119,16 @@ int AES_GMAC_Update(AES_GMAC_CTX *ctx, const uint8_t *data, uint16_t len) { - uint32_t blk[4] = { 0, 0, 0, 0 }; + uint8_t blk[16] = { 0 }; int plen; if (len > 0) { plen = len % GMAC_BLOCK_LEN; if (len >= GMAC_BLOCK_LEN) - ghash_update(&ctx->ghash, (const uint8_t *)data, - len - plen); + ghash_update(&ctx->ghash, data, len - plen); if (plen) { memcpy(blk, data + (len - plen), plen); - ghash_update(&ctx->ghash, (uint8_t *)blk, - GMAC_BLOCK_LEN); + ghash_update(&ctx->ghash, blk, GMAC_BLOCK_LEN); } } return (0); @@ -141,13 +137,21 @@ void AES_GMAC_Final(uint8_t digest[GMAC_DIGEST_LEN], AES_GMAC_CTX *ctx) { - uint8_t keystream[GMAC_BLOCK_LEN]; + uint8_t keystream[GMAC_BLOCK_LEN], *k, *d; int i; /* do one round of GCTR */ ctx->J[GMAC_BLOCK_LEN - 1] = 1; rijndaelEncrypt(ctx->K, ctx->rounds, ctx->J, keystream); - for (i = 0; i < GMAC_DIGEST_LEN; i++) - digest[i] = ((uint8_t *)ctx->ghash.S)[i] ^ keystream[i]; + k = keystream; + d = digest; + for (i = 0; i < GMAC_DIGEST_LEN/4; i++) { + d[0] = (uint8_t)(ctx->ghash.S[i] >> 24) ^ k[0]; + d[1] = (uint8_t)(ctx->ghash.S[i] >> 16) ^ k[1]; + d[2] = (uint8_t)(ctx->ghash.S[i] >> 8) ^ k[2]; + d[3] = (uint8_t)ctx->ghash.S[i] ^ k[3]; + d += 4; + k += 4; + } memset(keystream, 0, sizeof(keystream)); }