head	1.1;
access;
symbols
	netbsd-11-0-RC4:1.1
	netbsd-11-0-RC3:1.1
	netbsd-11-0-RC2:1.1
	netbsd-11-0-RC1:1.1
	perseant-exfatfs-base-20250801:1.1
	netbsd-11:1.1.0.50
	netbsd-11-base:1.1
	netbsd-10-1-RELEASE:1.1
	perseant-exfatfs-base-20240630:1.1
	perseant-exfatfs:1.1.0.48
	perseant-exfatfs-base:1.1
	netbsd-8-3-RELEASE:1.1
	netbsd-9-4-RELEASE:1.1
	netbsd-10-0-RELEASE:1.1
	netbsd-10-0-RC6:1.1
	netbsd-10-0-RC5:1.1
	netbsd-10-0-RC4:1.1
	netbsd-10-0-RC3:1.1
	netbsd-10-0-RC2:1.1
	netbsd-10-0-RC1:1.1
	netbsd-10:1.1.0.46
	netbsd-10-base:1.1
	netbsd-9-3-RELEASE:1.1
	cjep_sun2x-base1:1.1
	cjep_sun2x:1.1.0.44
	cjep_sun2x-base:1.1
	cjep_staticlib_x-base1:1.1
	netbsd-9-2-RELEASE:1.1
	cjep_staticlib_x:1.1.0.42
	cjep_staticlib_x-base:1.1
	netbsd-9-1-RELEASE:1.1
	phil-wifi-20200421:1.1
	phil-wifi-20200411:1.1
	is-mlppp:1.1.0.40
	is-mlppp-base:1.1
	phil-wifi-20200406:1.1
	netbsd-8-2-RELEASE:1.1
	netbsd-9-0-RELEASE:1.1
	netbsd-9-0-RC2:1.1
	netbsd-9-0-RC1:1.1
	phil-wifi-20191119:1.1
	netbsd-9:1.1.0.38
	netbsd-9-base:1.1
	phil-wifi-20190609:1.1
	netbsd-8-1-RELEASE:1.1
	netbsd-8-1-RC1:1.1
	pgoyette-compat-merge-20190127:1.1
	pgoyette-compat-20190127:1.1
	pgoyette-compat-20190118:1.1
	pgoyette-compat-1226:1.1
	pgoyette-compat-1126:1.1
	pgoyette-compat-1020:1.1
	pgoyette-compat-0930:1.1
	pgoyette-compat-0906:1.1
	netbsd-7-2-RELEASE:1.1
	pgoyette-compat-0728:1.1
	netbsd-8-0-RELEASE:1.1
	phil-wifi:1.1.0.36
	phil-wifi-base:1.1
	pgoyette-compat-0625:1.1
	netbsd-8-0-RC2:1.1
	pgoyette-compat-0521:1.1
	pgoyette-compat-0502:1.1
	pgoyette-compat-0422:1.1
	netbsd-8-0-RC1:1.1
	pgoyette-compat-0415:1.1
	pgoyette-compat-0407:1.1
	pgoyette-compat-0330:1.1
	pgoyette-compat-0322:1.1
	pgoyette-compat-0315:1.1
	netbsd-7-1-2-RELEASE:1.1
	pgoyette-compat:1.1.0.34
	pgoyette-compat-base:1.1
	netbsd-7-1-1-RELEASE:1.1
	matt-nb8-mediatek:1.1.0.32
	matt-nb8-mediatek-base:1.1
	perseant-stdc-iso10646:1.1.0.30
	perseant-stdc-iso10646-base:1.1
	netbsd-8:1.1.0.28
	netbsd-8-base:1.1
	prg-localcount2-base3:1.1
	prg-localcount2-base2:1.1
	prg-localcount2-base1:1.1
	prg-localcount2:1.1.0.26
	prg-localcount2-base:1.1
	pgoyette-localcount-20170426:1.1
	bouyer-socketcan-base1:1.1
	pgoyette-localcount-20170320:1.1
	netbsd-7-1:1.1.0.24
	netbsd-7-1-RELEASE:1.1
	netbsd-7-1-RC2:1.1
	netbsd-7-nhusb-base-20170116:1.1
	bouyer-socketcan:1.1.0.22
	bouyer-socketcan-base:1.1
	pgoyette-localcount-20170107:1.1
	netbsd-7-1-RC1:1.1
	pgoyette-localcount-20161104:1.1
	netbsd-7-0-2-RELEASE:1.1
	localcount-20160914:1.1
	netbsd-7-nhusb:1.1.0.20
	netbsd-7-nhusb-base:1.1
	pgoyette-localcount-20160806:1.1
	pgoyette-localcount-20160726:1.1
	pgoyette-localcount:1.1.0.18
	pgoyette-localcount-base:1.1
	netbsd-7-0-1-RELEASE:1.1
	netbsd-7-0:1.1.0.16
	netbsd-7-0-RELEASE:1.1
	netbsd-7-0-RC3:1.1
	netbsd-7-0-RC2:1.1
	netbsd-7-0-RC1:1.1
	netbsd-7:1.1.0.14
	netbsd-7-base:1.1
	yamt-pagecache-base9:1.1
	yamt-pagecache-tag8:1.1.4.2
	tls-earlyentropy:1.1.0.12
	tls-earlyentropy-base:1.1
	riastradh-xf86-video-intel-2-7-1-pre-2-21-15:1.1
	riastradh-drm2-base3:1.1
	riastradh-drm2-base2:1.1
	riastradh-drm2-base1:1.1
	riastradh-drm2:1.1.0.6
	riastradh-drm2-base:1.1
	khorben-n900:1.1.0.10
	agc-symver:1.1.0.8
	agc-symver-base:1.1
	yamt-pagecache-base8:1.1
	yamt-pagecache:1.1.0.4
	yamt-pagecache-base7:1.1
	tls-maxphys-base:1.1
	tls-maxphys:1.1.0.2;
locks; strict;
comment	@// @;


1.1
date	2012.11.15.19.49.13;	author jkunz;	state Exp;
branches
	1.1.2.1
	1.1.4.1;
next	;

1.1.2.1
date	2012.11.15.19.49.13;	author jkunz;	state dead;
branches;
next	1.1.2.2;

1.1.2.2
date	2012.11.15.19.49.14;	author jkunz;	state Exp;
branches;
next	;

1.1.4.1
date	2012.11.15.19.49.13;	author yamt;	state dead;
branches;
next	1.1.4.2;

1.1.4.2
date	2013.01.16.05.27.46;	author yamt;	state Exp;
branches;
next	;


desc
@@


1.1
log
@Add elftosb tools to evbarm userland and toolchain.
Elftosb is used to create a digitaly signed "secure boot" file.
This sb file can be booted by the first stage boot loader found in
Freescale i.MX23 and i.MX28 application processors.

Copyright (c) 2004-2010 Freescale Semiconductor, Inc.
@
text
@/*
 * File:	RijndaelCBCMAC.cpp
 *
 * Copyright (c) Freescale Semiconductor, Inc. All rights reserved.
 * See included license file for license details.
 */

#include "RijndaelCBCMAC.h"
#include "rijndael.h"
#include <assert.h>
#include "Logging.h"

void logHexArray(Logger::log_level_t level, const uint8_t * bytes, unsigned count);

//! \param key The key to use as the CBC-MAC secret.
//! \param iv Initialization vector. Defaults to zero if not provided.
RijndaelCBCMAC::RijndaelCBCMAC(const AESKey<128> & key, const uint8_t * iv)
:	m_key(key)
{
	if (iv)
	{
		memcpy(m_mac, iv, sizeof(m_mac));
	}
	else
	{
		memset(m_mac, 0, sizeof(m_mac));
	}
}

//! \param data Pointer to data to process.
//! \param length Number of bytes to process. Must be evenly divisible by #BLOCK_SIZE.
void RijndaelCBCMAC::update(const uint8_t * data, unsigned length)
{
	assert(length % BLOCK_SIZE == 0);
	unsigned blocks = length / BLOCK_SIZE;
	while (blocks--)
	{
		updateOneBlock(data);
		data += BLOCK_SIZE;
	}
}

//! It appears that some forms of CBC-MAC encrypt the final output block again in
//! order to protect against a plaintext attack. This method is a placeholder for
//! such an operation, but it currently does nothing.
void RijndaelCBCMAC::finalize()
{
}

//! On entry the current value of m_mac becomes the initialization vector
//! for the CBC encryption of this block. The output of the encryption then
//! becomes the new MAC, which is stored in m_mac.
void RijndaelCBCMAC::updateOneBlock(const uint8_t * data)
{
	Rijndael cipher;
	cipher.init(Rijndael::CBC, Rijndael::Encrypt, m_key, Rijndael::Key16Bytes, m_mac);
	cipher.blockEncrypt(data, BLOCK_SIZE * 8, m_mac);	// size is in bits
	
//	Log::log(Logger::DEBUG2, "CBC-MAC output block:\n");
//	logHexArray(Logger::DEBUG2, (const uint8_t *)&m_mac, sizeof(m_mac));
}

/*!
 * \brief Log an array of bytes as hex.
 */
void logHexArray(Logger::log_level_t level, const uint8_t * bytes, unsigned count)
{
	Log::SetOutputLevel leveler(level);
//		Log::log("    ");
	unsigned i;
	for (i = 0; i < count; ++i, ++bytes)
	{
		if ((i % 16 == 0) && (i < count - 1))
		{
			if (i != 0)
			{
				Log::log("\n");
			}
			Log::log("    0x%04x: ", i);
		}
		Log::log("%02x ", *bytes & 0xff);
	}
	
	Log::log("\n");
}

@


1.1.4.1
log
@file RijndaelCBCMAC.cpp was added on branch yamt-pagecache on 2013-01-16 05:27:46 +0000
@
text
@d1 86
@


1.1.4.2
log
@sync with (a bit old) head
@
text
@a0 86
/*
 * File:	RijndaelCBCMAC.cpp
 *
 * Copyright (c) Freescale Semiconductor, Inc. All rights reserved.
 * See included license file for license details.
 */

#include "RijndaelCBCMAC.h"
#include "rijndael.h"
#include <assert.h>
#include "Logging.h"

void logHexArray(Logger::log_level_t level, const uint8_t * bytes, unsigned count);

//! \param key The key to use as the CBC-MAC secret.
//! \param iv Initialization vector. Defaults to zero if not provided.
RijndaelCBCMAC::RijndaelCBCMAC(const AESKey<128> & key, const uint8_t * iv)
:	m_key(key)
{
	if (iv)
	{
		memcpy(m_mac, iv, sizeof(m_mac));
	}
	else
	{
		memset(m_mac, 0, sizeof(m_mac));
	}
}

//! \param data Pointer to data to process.
//! \param length Number of bytes to process. Must be evenly divisible by #BLOCK_SIZE.
void RijndaelCBCMAC::update(const uint8_t * data, unsigned length)
{
	assert(length % BLOCK_SIZE == 0);
	unsigned blocks = length / BLOCK_SIZE;
	while (blocks--)
	{
		updateOneBlock(data);
		data += BLOCK_SIZE;
	}
}

//! It appears that some forms of CBC-MAC encrypt the final output block again in
//! order to protect against a plaintext attack. This method is a placeholder for
//! such an operation, but it currently does nothing.
void RijndaelCBCMAC::finalize()
{
}

//! On entry the current value of m_mac becomes the initialization vector
//! for the CBC encryption of this block. The output of the encryption then
//! becomes the new MAC, which is stored in m_mac.
void RijndaelCBCMAC::updateOneBlock(const uint8_t * data)
{
	Rijndael cipher;
	cipher.init(Rijndael::CBC, Rijndael::Encrypt, m_key, Rijndael::Key16Bytes, m_mac);
	cipher.blockEncrypt(data, BLOCK_SIZE * 8, m_mac);	// size is in bits
	
//	Log::log(Logger::DEBUG2, "CBC-MAC output block:\n");
//	logHexArray(Logger::DEBUG2, (const uint8_t *)&m_mac, sizeof(m_mac));
}

/*!
 * \brief Log an array of bytes as hex.
 */
void logHexArray(Logger::log_level_t level, const uint8_t * bytes, unsigned count)
{
	Log::SetOutputLevel leveler(level);
//		Log::log("    ");
	unsigned i;
	for (i = 0; i < count; ++i, ++bytes)
	{
		if ((i % 16 == 0) && (i < count - 1))
		{
			if (i != 0)
			{
				Log::log("\n");
			}
			Log::log("    0x%04x: ", i);
		}
		Log::log("%02x ", *bytes & 0xff);
	}
	
	Log::log("\n");
}

@


1.1.2.1
log
@file RijndaelCBCMAC.cpp was added on branch tls-maxphys on 2012-11-15 19:49:14 +0000
@
text
@d1 86
@


1.1.2.2
log
@Add elftosb tools to evbarm userland and toolchain.
Elftosb is used to create a digitaly signed "secure boot" file.
This sb file can be booted by the first stage boot loader found in
Freescale i.MX23 and i.MX28 application processors.

Copyright (c) 2004-2010 Freescale Semiconductor, Inc.
@
text
@a0 86
/*
 * File:	RijndaelCBCMAC.cpp
 *
 * Copyright (c) Freescale Semiconductor, Inc. All rights reserved.
 * See included license file for license details.
 */

#include "RijndaelCBCMAC.h"
#include "rijndael.h"
#include <assert.h>
#include "Logging.h"

void logHexArray(Logger::log_level_t level, const uint8_t * bytes, unsigned count);

//! \param key The key to use as the CBC-MAC secret.
//! \param iv Initialization vector. Defaults to zero if not provided.
RijndaelCBCMAC::RijndaelCBCMAC(const AESKey<128> & key, const uint8_t * iv)
:	m_key(key)
{
	if (iv)
	{
		memcpy(m_mac, iv, sizeof(m_mac));
	}
	else
	{
		memset(m_mac, 0, sizeof(m_mac));
	}
}

//! \param data Pointer to data to process.
//! \param length Number of bytes to process. Must be evenly divisible by #BLOCK_SIZE.
void RijndaelCBCMAC::update(const uint8_t * data, unsigned length)
{
	assert(length % BLOCK_SIZE == 0);
	unsigned blocks = length / BLOCK_SIZE;
	while (blocks--)
	{
		updateOneBlock(data);
		data += BLOCK_SIZE;
	}
}

//! It appears that some forms of CBC-MAC encrypt the final output block again in
//! order to protect against a plaintext attack. This method is a placeholder for
//! such an operation, but it currently does nothing.
void RijndaelCBCMAC::finalize()
{
}

//! On entry the current value of m_mac becomes the initialization vector
//! for the CBC encryption of this block. The output of the encryption then
//! becomes the new MAC, which is stored in m_mac.
void RijndaelCBCMAC::updateOneBlock(const uint8_t * data)
{
	Rijndael cipher;
	cipher.init(Rijndael::CBC, Rijndael::Encrypt, m_key, Rijndael::Key16Bytes, m_mac);
	cipher.blockEncrypt(data, BLOCK_SIZE * 8, m_mac);	// size is in bits
	
//	Log::log(Logger::DEBUG2, "CBC-MAC output block:\n");
//	logHexArray(Logger::DEBUG2, (const uint8_t *)&m_mac, sizeof(m_mac));
}

/*!
 * \brief Log an array of bytes as hex.
 */
void logHexArray(Logger::log_level_t level, const uint8_t * bytes, unsigned count)
{
	Log::SetOutputLevel leveler(level);
//		Log::log("    ");
	unsigned i;
	for (i = 0; i < count; ++i, ++bytes)
	{
		if ((i % 16 == 0) && (i < count - 1))
		{
			if (i != 0)
			{
				Log::log("\n");
			}
			Log::log("    0x%04x: ", i);
		}
		Log::log("%02x ", *bytes & 0xff);
	}
	
	Log::log("\n");
}

@
