2
0

aes_cfb.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. /* crypto/aes/aes_cfb.c -*- mode:C; c-file-style: "eay" -*- */
  2. /* ====================================================================
  3. * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions
  7. * are met:
  8. *
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. *
  12. * 2. Redistributions in binary form must reproduce the above copyright
  13. * notice, this list of conditions and the following disclaimer in
  14. * the documentation and/or other materials provided with the
  15. * distribution.
  16. *
  17. * 3. All advertising materials mentioning features or use of this
  18. * software must display the following acknowledgment:
  19. * "This product includes software developed by the OpenSSL Project
  20. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  21. *
  22. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  23. * endorse or promote products derived from this software without
  24. * prior written permission. For written permission, please contact
  25. * openssl-core@openssl.org.
  26. *
  27. * 5. Products derived from this software may not be called "OpenSSL"
  28. * nor may "OpenSSL" appear in their names without prior written
  29. * permission of the OpenSSL Project.
  30. *
  31. * 6. Redistributions of any form whatsoever must retain the following
  32. * acknowledgment:
  33. * "This product includes software developed by the OpenSSL Project
  34. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  35. *
  36. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  37. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  38. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  39. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  40. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  41. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  42. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  43. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  44. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  45. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  46. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  47. * OF THE POSSIBILITY OF SUCH DAMAGE.
  48. * ====================================================================
  49. *
  50. */
  51. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  52. * All rights reserved.
  53. *
  54. * This package is an SSL implementation written
  55. * by Eric Young (eay@cryptsoft.com).
  56. * The implementation was written so as to conform with Netscapes SSL.
  57. *
  58. * This library is free for commercial and non-commercial use as long as
  59. * the following conditions are aheared to. The following conditions
  60. * apply to all code found in this distribution, be it the RC4, RSA,
  61. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  62. * included with this distribution is covered by the same copyright terms
  63. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  64. *
  65. * Copyright remains Eric Young's, and as such any Copyright notices in
  66. * the code are not to be removed.
  67. * If this package is used in a product, Eric Young should be given attribution
  68. * as the author of the parts of the library used.
  69. * This can be in the form of a textual message at program startup or
  70. * in documentation (online or textual) provided with the package.
  71. *
  72. * Redistribution and use in source and binary forms, with or without
  73. * modification, are permitted provided that the following conditions
  74. * are met:
  75. * 1. Redistributions of source code must retain the copyright
  76. * notice, this list of conditions and the following disclaimer.
  77. * 2. Redistributions in binary form must reproduce the above copyright
  78. * notice, this list of conditions and the following disclaimer in the
  79. * documentation and/or other materials provided with the distribution.
  80. * 3. All advertising materials mentioning features or use of this software
  81. * must display the following acknowledgement:
  82. * "This product includes cryptographic software written by
  83. * Eric Young (eay@cryptsoft.com)"
  84. * The word 'cryptographic' can be left out if the rouines from the library
  85. * being used are not cryptographic related :-).
  86. * 4. If you include any Windows specific code (or a derivative thereof) from
  87. * the apps directory (application code) you must include an acknowledgement:
  88. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  89. *
  90. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  91. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  92. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  93. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  94. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  95. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  96. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  97. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  98. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  99. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  100. * SUCH DAMAGE.
  101. *
  102. * The licence and distribution terms for any publically available version or
  103. * derivative of this code cannot be changed. i.e. this code cannot simply be
  104. * copied and put under another distribution licence
  105. * [including the GNU Public Licence.]
  106. */
  107. #ifndef AES_DEBUG
  108. # ifndef NDEBUG
  109. # define NDEBUG
  110. # endif
  111. #endif
  112. #include <assert.h>
  113. #include <openssl/aes.h>
  114. #include "aes_locl.h"
  115. #include "e_os.h"
  116. /* The input and output encrypted as though 128bit cfb mode is being
  117. * used. The extra state information to record how much of the
  118. * 128bit block we have used is contained in *num;
  119. */
  120. void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out,
  121. const unsigned long length, const AES_KEY *key,
  122. unsigned char *ivec, int *num, const int enc) {
  123. unsigned int n;
  124. unsigned long l = length;
  125. unsigned char c;
  126. assert(in && out && key && ivec && num);
  127. n = *num;
  128. if (enc) {
  129. while (l--) {
  130. if (n == 0) {
  131. AES_encrypt(ivec, ivec, key);
  132. }
  133. ivec[n] = *(out++) = *(in++) ^ ivec[n];
  134. n = (n+1) % AES_BLOCK_SIZE;
  135. }
  136. } else {
  137. while (l--) {
  138. if (n == 0) {
  139. AES_encrypt(ivec, ivec, key);
  140. }
  141. c = *(in);
  142. *(out++) = *(in++) ^ ivec[n];
  143. ivec[n] = c;
  144. n = (n+1) % AES_BLOCK_SIZE;
  145. }
  146. }
  147. *num=n;
  148. }
  149. /* This expects a single block of size nbits for both in and out. Note that
  150. it corrupts any extra bits in the last byte of out */
  151. void AES_cfbr_encrypt_block(const unsigned char *in,unsigned char *out,
  152. const int nbits,const AES_KEY *key,
  153. unsigned char *ivec,const int enc)
  154. {
  155. int n,rem,num;
  156. unsigned char ovec[AES_BLOCK_SIZE*2];
  157. if (nbits<=0 || nbits>128) return;
  158. /* fill in the first half of the new IV with the current IV */
  159. memcpy(ovec,ivec,AES_BLOCK_SIZE);
  160. /* construct the new IV */
  161. AES_encrypt(ivec,ivec,key);
  162. num = (nbits+7)/8;
  163. if (enc) /* encrypt the input */
  164. for(n=0 ; n < num ; ++n)
  165. out[n] = (ovec[AES_BLOCK_SIZE+n] = in[n] ^ ivec[n]);
  166. else /* decrypt the input */
  167. for(n=0 ; n < num ; ++n)
  168. out[n] = (ovec[AES_BLOCK_SIZE+n] = in[n]) ^ ivec[n];
  169. /* shift ovec left... */
  170. rem = nbits%8;
  171. num = nbits/8;
  172. if(rem==0)
  173. memcpy(ivec,ovec+num,AES_BLOCK_SIZE);
  174. else
  175. for(n=0 ; n < AES_BLOCK_SIZE ; ++n)
  176. ivec[n] = ovec[n+num]<<rem | ovec[n+num+1]>>(8-rem);
  177. /* it is not necessary to cleanse ovec, since the IV is not secret */
  178. }
  179. /* N.B. This expects the input to be packed, MS bit first */
  180. void AES_cfb1_encrypt(const unsigned char *in, unsigned char *out,
  181. const unsigned long length, const AES_KEY *key,
  182. unsigned char *ivec, int *num, const int enc)
  183. {
  184. unsigned int n;
  185. unsigned char c[1],d[1];
  186. assert(in && out && key && ivec && num);
  187. assert(*num == 0);
  188. memset(out,0,(length+7)/8);
  189. for(n=0 ; n < length ; ++n)
  190. {
  191. c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0;
  192. AES_cfbr_encrypt_block(c,d,1,key,ivec,enc);
  193. out[n/8]=(out[n/8]&~(1 << (7-n%8)))|((d[0]&0x80) >> (n%8));
  194. }
  195. }
  196. void AES_cfb8_encrypt(const unsigned char *in, unsigned char *out,
  197. const unsigned long length, const AES_KEY *key,
  198. unsigned char *ivec, int *num, const int enc)
  199. {
  200. unsigned int n;
  201. assert(in && out && key && ivec && num);
  202. assert(*num == 0);
  203. for(n=0 ; n < length ; ++n)
  204. AES_cfbr_encrypt_block(&in[n],&out[n],8,key,ivec,enc);
  205. }