OK?
---
sys/crypto/cmac.c | 12 ++++++------
sys/crypto/cmac.h | 2 +-
sys/crypto/key_wrap.c | 10 +++++-----
sys/crypto/key_wrap.h | 2 +-
sys/net80211/ieee80211_crypto.c | 2 +-
sys/net80211/ieee80211_crypto_bip.c | 2 +-
sys/net80211/ieee80211_crypto_ccmp.c | 36 ++++++++++++++++++------------------
7 files changed, 33 insertions(+), 33 deletions(-)
diff --git sys/crypto/cmac.c sys/crypto/cmac.c
index 366f30f5749..7cddfb9aaf7 100644
--- sys/crypto/cmac.c
+++ sys/crypto/cmac.c
@@ -22,11 +22,11 @@
*/
#include <sys/param.h>
#include <sys/systm.h>
-#include <crypto/rijndael.h>
+#include <crypto/aes.h>
#include <crypto/cmac.h>
#define LSHIFT(v, r) do { \
int i; \
for (i = 0; i < 15; i++) \
@@ -48,11 +48,11 @@ AES_CMAC_Init(AES_CMAC_CTX *ctx)
}
void
AES_CMAC_SetKey(AES_CMAC_CTX *ctx, const u_int8_t key[AES_CMAC_KEY_LENGTH])
{
- rijndael_set_key_enc_only(&ctx->rijndael, key, 128);
+ AES_Setkey(&ctx->aesctx, key, 16);
}
void
AES_CMAC_Update(AES_CMAC_CTX *ctx, const u_int8_t *data, u_int len)
{
@@ -63,17 +63,17 @@ AES_CMAC_Update(AES_CMAC_CTX *ctx, const u_int8_t *data,
u_int len)
memcpy(ctx->M_last + ctx->M_n, data, mlen);
ctx->M_n += mlen;
if (ctx->M_n < 16 || len == mlen)
return;
XOR(ctx->M_last, ctx->X);
- rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X);
+ AES_Encrypt(&ctx->aesctx, ctx->X, ctx->X);
data += mlen;
len -= mlen;
}
while (len > 16) { /* not last block */
XOR(data, ctx->X);
- rijndael_encrypt(&ctx->rijndael, ctx->X, ctx->X);
+ AES_Encrypt(&ctx->aesctx, ctx->X, ctx->X);
data += 16;
len -= 16;
}
/* potential last block, save it */
memcpy(ctx->M_last, data, len);
@@ -85,11 +85,11 @@ AES_CMAC_Final(u_int8_t digest[AES_CMAC_DIGEST_LENGTH],
AES_CMAC_CTX *ctx)
{
u_int8_t K[16];
/* generate subkey K1 */
memset(K, 0, sizeof K);
- rijndael_encrypt(&ctx->rijndael, K, K);
+ AES_Encrypt(&ctx->aesctx, K, K);
if (K[0] & 0x80) {
LSHIFT(K, K);
K[15] ^= 0x87;
} else
@@ -112,9 +112,9 @@ AES_CMAC_Final(u_int8_t digest[AES_CMAC_DIGEST_LENGTH],
AES_CMAC_CTX *ctx)
ctx->M_last[ctx->M_n] = 0;
XOR(K, ctx->M_last);
}
XOR(ctx->M_last, ctx->X);
- rijndael_encrypt(&ctx->rijndael, ctx->X, digest);
+ AES_Encrypt(&ctx->aesctx, ctx->X, digest);
explicit_bzero(K, sizeof K);
}
diff --git sys/crypto/cmac.h sys/crypto/cmac.h
index de0ec840d42..45798d4f8a1 100644
--- sys/crypto/cmac.h
+++ sys/crypto/cmac.h
@@ -21,11 +21,11 @@
#define AES_CMAC_KEY_LENGTH 16
#define AES_CMAC_DIGEST_LENGTH 16
typedef struct _AES_CMAC_CTX {
- rijndael_ctx rijndael;
+ AES_CTX aesctx;
u_int8_t X[16];
u_int8_t M_last[16];
u_int M_n;
} AES_CMAC_CTX;
diff --git sys/crypto/key_wrap.c sys/crypto/key_wrap.c
index 26c197eebbc..913639bb8a7 100644
--- sys/crypto/key_wrap.c
+++ sys/crypto/key_wrap.c
@@ -21,27 +21,27 @@
*/
#include <sys/param.h>
#include <sys/systm.h>
-#include <crypto/rijndael.h>
+#include <crypto/aes.h>
#include <crypto/key_wrap.h>
static const u_int8_t IV[8] =
{ 0xa6, 0xa6, 0xa6, 0xa6, 0xa6, 0xa6, 0xa6, 0xa6 };
void
aes_key_wrap_set_key(aes_key_wrap_ctx *ctx, const u_int8_t *K, size_t K_len)
{
- rijndael_set_key(&ctx->ctx, K, K_len * NBBY);
+ AES_Setkey(&ctx->ctx, K, K_len);
}
void
aes_key_wrap_set_key_wrap_only(aes_key_wrap_ctx *ctx, const u_int8_t *K,
size_t K_len)
{
- rijndael_set_key_enc_only(&ctx->ctx, K, K_len * NBBY);
+ AES_Setkey(&ctx->ctx, K, K_len);
}
void
aes_key_wrap(aes_key_wrap_ctx *ctx, const u_int8_t *P, size_t n, u_int8_t *C)
{
@@ -59,11 +59,11 @@ aes_key_wrap(aes_key_wrap_ctx *ctx, const u_int8_t *P,
size_t n, u_int8_t *C)
for (i = 1; i <= n; i++, t++) {
/* B = A | R[i] */
memcpy(&B[0], A, 8);
memcpy(&B[1], R, 8);
/* B = AES(K, B) */
- rijndael_encrypt(&ctx->ctx, (caddr_t)B, (caddr_t)B);
+ AES_Encrypt(&ctx->ctx, (caddr_t)B, (caddr_t)B);
/* MSB(64, B) = MSB(64, B) ^ t */
B[0] ^= htobe64(t);
/* A = MSB(64, B) */
memcpy(A, &B[0], 8);
/* R[i] = LSB(64, B) */
@@ -94,11 +94,11 @@ aes_key_unwrap(aes_key_wrap_ctx *ctx, const u_int8_t *C,
u_int8_t *P, size_t n)
/* MSB(64, B) = MSB(64, B) ^ t */
B[0] ^= htobe64(t);
/* B = MSB(64, B) | R[i] */
memcpy(&B[1], R, 8);
/* B = AES-1(K, B) */
- rijndael_decrypt(&ctx->ctx, (caddr_t)B, (caddr_t)B);
+ AES_Decrypt(&ctx->ctx, (caddr_t)B, (caddr_t)B);
/* A = MSB(64, B) */
memcpy(A, &B[0], 8);
/* R[i] = LSB(64, B) */
memcpy(R, &B[1], 8);
diff --git sys/crypto/key_wrap.h sys/crypto/key_wrap.h
index f91ce5f4c06..619ed6382c0 100644
--- sys/crypto/key_wrap.h
+++ sys/crypto/key_wrap.h
@@ -18,11 +18,11 @@
#ifndef _KEY_WRAP_H_
#define _KEY_WRAP_H_
typedef struct _aes_key_wrap_ctx {
- rijndael_ctx ctx;
+ AES_CTX ctx;
} aes_key_wrap_ctx;
__BEGIN_DECLS
void aes_key_wrap_set_key(aes_key_wrap_ctx *, const u_int8_t *, size_t);
diff --git sys/net80211/ieee80211_crypto.c sys/net80211/ieee80211_crypto.c
index 7450e62a642..9fb5037e0fc 100644
--- sys/net80211/ieee80211_crypto.c
+++ sys/net80211/ieee80211_crypto.c
@@ -40,11 +40,11 @@
#include <crypto/arc4.h>
#include <crypto/md5.h>
#include <crypto/sha1.h>
#include <crypto/sha2.h>
#include <crypto/hmac.h>
-#include <crypto/rijndael.h>
+#include <crypto/aes.h>
#include <crypto/cmac.h>
#include <crypto/key_wrap.h>
typedef union _ANY_CTX {
HMAC_MD5_CTX md5;
diff --git sys/net80211/ieee80211_crypto_bip.c
sys/net80211/ieee80211_crypto_bip.c
index 307c05b1bce..bbcd48ae486 100644
--- sys/net80211/ieee80211_crypto_bip.c
+++ sys/net80211/ieee80211_crypto_bip.c
@@ -38,11 +38,11 @@
#include <net80211/ieee80211_var.h>
#include <net80211/ieee80211_crypto.h>
#include <net80211/ieee80211_priv.h>
-#include <crypto/rijndael.h>
+#include <crypto/aes.h>
#include <crypto/cmac.h>
/* BIP software crypto context */
struct ieee80211_bip_ctx {
AES_CMAC_CTX cmac;
diff --git sys/net80211/ieee80211_crypto_ccmp.c
sys/net80211/ieee80211_crypto_ccmp.c
index acd60a6da2e..6bf6a76974c 100644
--- sys/net80211/ieee80211_crypto_ccmp.c
+++ sys/net80211/ieee80211_crypto_ccmp.c
@@ -37,15 +37,15 @@
#include <netinet/if_ether.h>
#include <net80211/ieee80211_var.h>
#include <net80211/ieee80211_crypto.h>
-#include <crypto/rijndael.h>
+#include <crypto/aes.h>
/* CCMP software crypto context */
struct ieee80211_ccmp_ctx {
- rijndael_ctx rijndael;
+ AES_CTX aesctx;
};
/*
* Initialize software crypto context. This function can be overridden
* by drivers doing hardware crypto.
@@ -56,11 +56,11 @@ ieee80211_ccmp_set_key(struct ieee80211com *ic, struct
ieee80211_key *k)
struct ieee80211_ccmp_ctx *ctx;
ctx = malloc(sizeof(*ctx), M_DEVBUF, M_NOWAIT | M_ZERO);
if (ctx == NULL)
return ENOMEM;
- rijndael_set_key_enc_only(&ctx->rijndael, k->k_key, 128);
+ AES_Setkey(&ctx->aesctx, k->k_key, 16);
k->k_priv = ctx;
return 0;
}
void
@@ -76,11 +76,11 @@ ieee80211_ccmp_delete_key(struct ieee80211com *ic, struct
ieee80211_key *k)
/*-
* Counter with CBC-MAC (CCM) - see RFC3610.
* CCMP uses the following CCM parameters: M = 8, L = 2
*/
static void
-ieee80211_ccmp_phase1(rijndael_ctx *ctx, const struct ieee80211_frame *wh,
+ieee80211_ccmp_phase1(AES_CTX *ctx, const struct ieee80211_frame *wh,
u_int64_t pn, int lm, u_int8_t b[16], u_int8_t a[16], u_int8_t s0[16])
{
u_int8_t auth[32], nonce[13];
u_int8_t *aad;
u_int8_t tid = 0;
@@ -144,24 +144,24 @@ ieee80211_ccmp_phase1(rijndael_ctx *ctx, const struct
ieee80211_frame *wh,
/* construct first block B_0 */
b[ 0] = 89; /* Flags = 64*Adata + 8*((M-2)/2) + (L-1) */
memcpy(&b[1], nonce, 13);
b[14] = lm >> 8;
b[15] = lm & 0xff;
- rijndael_encrypt(ctx, b, b);
+ AES_Encrypt(ctx, b, b);
for (i = 0; i < 16; i++)
b[i] ^= auth[i];
- rijndael_encrypt(ctx, b, b);
+ AES_Encrypt(ctx, b, b);
for (i = 0; i < 16; i++)
b[i] ^= auth[16 + i];
- rijndael_encrypt(ctx, b, b);
+ AES_Encrypt(ctx, b, b);
/* construct S_0 */
a[ 0] = 1; /* Flags = L' = (L-1) */
memcpy(&a[1], nonce, 13);
a[14] = a[15] = 0;
- rijndael_encrypt(ctx, a, s0);
+ AES_Encrypt(ctx, a, s0);
}
struct mbuf *
ieee80211_ccmp_encrypt(struct ieee80211com *ic, struct mbuf *m0,
struct ieee80211_key *k)
@@ -208,18 +208,18 @@ ieee80211_ccmp_encrypt(struct ieee80211com *ic, struct
mbuf *m0,
ivp[5] = k->k_tsc >> 24; /* PN3 */
ivp[6] = k->k_tsc >> 32; /* PN4 */
ivp[7] = k->k_tsc >> 40; /* PN5 */
/* construct initial B, A and S_0 blocks */
- ieee80211_ccmp_phase1(&ctx->rijndael, wh, k->k_tsc,
+ ieee80211_ccmp_phase1(&ctx->aesctx, wh, k->k_tsc,
m0->m_pkthdr.len - hdrlen, b, a, s0);
/* construct S_1 */
ctr = 1;
a[14] = ctr >> 8;
a[15] = ctr & 0xff;
- rijndael_encrypt(&ctx->rijndael, a, s);
+ AES_Encrypt(&ctx->aesctx, a, s);
/* encrypt frame body and compute MIC */
j = 0;
m = m0;
n = n0;
@@ -258,25 +258,25 @@ ieee80211_ccmp_encrypt(struct ieee80211com *ic, struct
mbuf *m0,
/* encrypt message */
dst[i] = src[i] ^ s[j];
if (++j < 16)
continue;
/* we have a full block, encrypt MIC */
- rijndael_encrypt(&ctx->rijndael, b, b);
+ AES_Encrypt(&ctx->aesctx, b, b);
/* construct a new S_ctr block */
ctr++;
a[14] = ctr >> 8;
a[15] = ctr & 0xff;
- rijndael_encrypt(&ctx->rijndael, a, s);
+ AES_Encrypt(&ctx->aesctx, a, s);
j = 0;
}
moff += len;
noff += len;
left -= len;
}
if (j != 0) /* partial block, encrypt MIC */
- rijndael_encrypt(&ctx->rijndael, b, b);
+ AES_Encrypt(&ctx->aesctx, b, b);
/* reserve trailing space for MIC */
if (M_TRAILINGSPACE(n) < IEEE80211_CCMP_MICLEN) {
MGET(n->m_next, M_DONTWAIT, n->m_type);
if (n->m_next == NULL)
@@ -368,11 +368,11 @@ ieee80211_ccmp_decrypt(struct ieee80211com *ic, struct
mbuf *m0,
}
if (n0->m_len > n0->m_pkthdr.len)
n0->m_len = n0->m_pkthdr.len;
/* construct initial B, A and S_0 blocks */
- ieee80211_ccmp_phase1(&ctx->rijndael, wh, pn,
+ ieee80211_ccmp_phase1(&ctx->aesctx, wh, pn,
n0->m_pkthdr.len - hdrlen, b, a, s0);
/* copy 802.11 header and clear protected bit */
memcpy(mtod(n0, caddr_t), wh, hdrlen);
wh = mtod(n0, struct ieee80211_frame *);
@@ -380,11 +380,11 @@ ieee80211_ccmp_decrypt(struct ieee80211com *ic, struct
mbuf *m0,
/* construct S_1 */
ctr = 1;
a[14] = ctr >> 8;
a[15] = ctr & 0xff;
- rijndael_encrypt(&ctx->rijndael, a, s);
+ AES_Encrypt(&ctx->aesctx, a, s);
/* decrypt frame body and compute MIC */
j = 0;
m = m0;
n = n0;
@@ -423,25 +423,25 @@ ieee80211_ccmp_decrypt(struct ieee80211com *ic, struct
mbuf *m0,
/* update MIC with clear text */
b[j] ^= dst[i];
if (++j < 16)
continue;
/* we have a full block, encrypt MIC */
- rijndael_encrypt(&ctx->rijndael, b, b);
+ AES_Encrypt(&ctx->aesctx, b, b);
/* construct a new S_ctr block */
ctr++;
a[14] = ctr >> 8;
a[15] = ctr & 0xff;
- rijndael_encrypt(&ctx->rijndael, a, s);
+ AES_Encrypt(&ctx->aesctx, a, s);
j = 0;
}
moff += len;
noff += len;
left -= len;
}
if (j != 0) /* partial block, encrypt MIC */
- rijndael_encrypt(&ctx->rijndael, b, b);
+ AES_Encrypt(&ctx->aesctx, b, b);
/* finalize MIC, U := T XOR first-M-bytes( S_0 ) */
for (i = 0; i < IEEE80211_CCMP_MICLEN; i++)
b[i] ^= s0[i];
--
2.12.2