1*03f9172cSAndroid Build Coastguard Worker /*
2*03f9172cSAndroid Build Coastguard Worker * AES key unwrap (RFC3394)
3*03f9172cSAndroid Build Coastguard Worker *
4*03f9172cSAndroid Build Coastguard Worker * Copyright (c) 2003-2007, Jouni Malinen <[email protected]>
5*03f9172cSAndroid Build Coastguard Worker *
6*03f9172cSAndroid Build Coastguard Worker * This software may be distributed under the terms of the BSD license.
7*03f9172cSAndroid Build Coastguard Worker * See README for more details.
8*03f9172cSAndroid Build Coastguard Worker */
9*03f9172cSAndroid Build Coastguard Worker
10*03f9172cSAndroid Build Coastguard Worker #include "includes.h"
11*03f9172cSAndroid Build Coastguard Worker
12*03f9172cSAndroid Build Coastguard Worker #include "common.h"
13*03f9172cSAndroid Build Coastguard Worker #include "aes.h"
14*03f9172cSAndroid Build Coastguard Worker #include "aes_wrap.h"
15*03f9172cSAndroid Build Coastguard Worker
16*03f9172cSAndroid Build Coastguard Worker /**
17*03f9172cSAndroid Build Coastguard Worker * aes_unwrap - Unwrap key with AES Key Wrap Algorithm (RFC3394)
18*03f9172cSAndroid Build Coastguard Worker * @kek: Key encryption key (KEK)
19*03f9172cSAndroid Build Coastguard Worker * @kek_len: Length of KEK in octets
20*03f9172cSAndroid Build Coastguard Worker * @n: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16
21*03f9172cSAndroid Build Coastguard Worker * bytes
22*03f9172cSAndroid Build Coastguard Worker * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
23*03f9172cSAndroid Build Coastguard Worker * @plain: Plaintext key, n * 64 bits
24*03f9172cSAndroid Build Coastguard Worker * Returns: 0 on success, -1 on failure (e.g., integrity verification failed)
25*03f9172cSAndroid Build Coastguard Worker */
aes_unwrap(const u8 * kek,size_t kek_len,int n,const u8 * cipher,u8 * plain)26*03f9172cSAndroid Build Coastguard Worker int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher,
27*03f9172cSAndroid Build Coastguard Worker u8 *plain)
28*03f9172cSAndroid Build Coastguard Worker {
29*03f9172cSAndroid Build Coastguard Worker u8 a[8], *r, b[AES_BLOCK_SIZE];
30*03f9172cSAndroid Build Coastguard Worker int i, j;
31*03f9172cSAndroid Build Coastguard Worker void *ctx;
32*03f9172cSAndroid Build Coastguard Worker unsigned int t;
33*03f9172cSAndroid Build Coastguard Worker
34*03f9172cSAndroid Build Coastguard Worker /* 1) Initialize variables. */
35*03f9172cSAndroid Build Coastguard Worker os_memcpy(a, cipher, 8);
36*03f9172cSAndroid Build Coastguard Worker r = plain;
37*03f9172cSAndroid Build Coastguard Worker os_memcpy(r, cipher + 8, 8 * n);
38*03f9172cSAndroid Build Coastguard Worker
39*03f9172cSAndroid Build Coastguard Worker ctx = aes_decrypt_init(kek, kek_len);
40*03f9172cSAndroid Build Coastguard Worker if (ctx == NULL)
41*03f9172cSAndroid Build Coastguard Worker return -1;
42*03f9172cSAndroid Build Coastguard Worker
43*03f9172cSAndroid Build Coastguard Worker /* 2) Compute intermediate values.
44*03f9172cSAndroid Build Coastguard Worker * For j = 5 to 0
45*03f9172cSAndroid Build Coastguard Worker * For i = n to 1
46*03f9172cSAndroid Build Coastguard Worker * B = AES-1(K, (A ^ t) | R[i]) where t = n*j+i
47*03f9172cSAndroid Build Coastguard Worker * A = MSB(64, B)
48*03f9172cSAndroid Build Coastguard Worker * R[i] = LSB(64, B)
49*03f9172cSAndroid Build Coastguard Worker */
50*03f9172cSAndroid Build Coastguard Worker for (j = 5; j >= 0; j--) {
51*03f9172cSAndroid Build Coastguard Worker r = plain + (n - 1) * 8;
52*03f9172cSAndroid Build Coastguard Worker for (i = n; i >= 1; i--) {
53*03f9172cSAndroid Build Coastguard Worker os_memcpy(b, a, 8);
54*03f9172cSAndroid Build Coastguard Worker t = n * j + i;
55*03f9172cSAndroid Build Coastguard Worker b[7] ^= t;
56*03f9172cSAndroid Build Coastguard Worker b[6] ^= t >> 8;
57*03f9172cSAndroid Build Coastguard Worker b[5] ^= t >> 16;
58*03f9172cSAndroid Build Coastguard Worker b[4] ^= t >> 24;
59*03f9172cSAndroid Build Coastguard Worker
60*03f9172cSAndroid Build Coastguard Worker os_memcpy(b + 8, r, 8);
61*03f9172cSAndroid Build Coastguard Worker aes_decrypt(ctx, b, b);
62*03f9172cSAndroid Build Coastguard Worker os_memcpy(a, b, 8);
63*03f9172cSAndroid Build Coastguard Worker os_memcpy(r, b + 8, 8);
64*03f9172cSAndroid Build Coastguard Worker r -= 8;
65*03f9172cSAndroid Build Coastguard Worker }
66*03f9172cSAndroid Build Coastguard Worker }
67*03f9172cSAndroid Build Coastguard Worker aes_decrypt_deinit(ctx);
68*03f9172cSAndroid Build Coastguard Worker
69*03f9172cSAndroid Build Coastguard Worker /* 3) Output results.
70*03f9172cSAndroid Build Coastguard Worker *
71*03f9172cSAndroid Build Coastguard Worker * These are already in @plain due to the location of temporary
72*03f9172cSAndroid Build Coastguard Worker * variables. Just verify that the IV matches with the expected value.
73*03f9172cSAndroid Build Coastguard Worker */
74*03f9172cSAndroid Build Coastguard Worker for (i = 0; i < 8; i++) {
75*03f9172cSAndroid Build Coastguard Worker if (a[i] != 0xa6)
76*03f9172cSAndroid Build Coastguard Worker return -1;
77*03f9172cSAndroid Build Coastguard Worker }
78*03f9172cSAndroid Build Coastguard Worker
79*03f9172cSAndroid Build Coastguard Worker return 0;
80*03f9172cSAndroid Build Coastguard Worker }
81