You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

231 lines
7.0 KiB

  1. /* ====================================================================
  2. * Copyright (c) 2008 The OpenSSL Project. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions
  6. * are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright
  9. * notice, this list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright
  12. * notice, this list of conditions and the following disclaimer in
  13. * the documentation and/or other materials provided with the
  14. * distribution.
  15. *
  16. * 3. All advertising materials mentioning features or use of this
  17. * software must display the following acknowledgment:
  18. * "This product includes software developed by the OpenSSL Project
  19. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  20. *
  21. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  22. * endorse or promote products derived from this software without
  23. * prior written permission. For written permission, please contact
  24. * openssl-core@openssl.org.
  25. *
  26. * 5. Products derived from this software may not be called "OpenSSL"
  27. * nor may "OpenSSL" appear in their names without prior written
  28. * permission of the OpenSSL Project.
  29. *
  30. * 6. Redistributions of any form whatsoever must retain the following
  31. * acknowledgment:
  32. * "This product includes software developed by the OpenSSL Project
  33. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  34. *
  35. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  36. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  37. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  38. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  39. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  40. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  41. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  42. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  43. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  44. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  45. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  46. * OF THE POSSIBILITY OF SUCH DAMAGE.
  47. * ==================================================================== */
  48. #include <openssl/type_check.h>
  49. #include <assert.h>
  50. #include <string.h>
  51. #include "internal.h"
  52. OPENSSL_COMPILE_ASSERT((16 % sizeof(size_t)) == 0, bad_size_t_size);
  53. void CRYPTO_cfb128_encrypt(const uint8_t *in, uint8_t *out, size_t len,
  54. const void *key, uint8_t ivec[16], unsigned *num,
  55. int enc, block128_f block) {
  56. size_t l = 0;
  57. assert(in && out && key && ivec && num);
  58. unsigned n = *num;
  59. if (enc) {
  60. while (n && len) {
  61. *(out++) = ivec[n] ^= *(in++);
  62. --len;
  63. n = (n + 1) % 16;
  64. }
  65. #if STRICT_ALIGNMENT
  66. if (((size_t)in | (size_t)out | (size_t)ivec) % sizeof(size_t) != 0) {
  67. while (l < len) {
  68. if (n == 0) {
  69. (*block)(ivec, ivec, key);
  70. }
  71. out[l] = ivec[n] ^= in[l];
  72. ++l;
  73. n = (n + 1) % 16;
  74. }
  75. *num = n;
  76. return;
  77. }
  78. #endif
  79. while (len >= 16) {
  80. (*block)(ivec, ivec, key);
  81. for (; n < 16; n += sizeof(size_t)) {
  82. *(size_t *)(out + n) = *(size_t *)(ivec + n) ^= *(size_t *)(in + n);
  83. }
  84. len -= 16;
  85. out += 16;
  86. in += 16;
  87. n = 0;
  88. }
  89. if (len) {
  90. (*block)(ivec, ivec, key);
  91. while (len--) {
  92. out[n] = ivec[n] ^= in[n];
  93. ++n;
  94. }
  95. }
  96. *num = n;
  97. return;
  98. } else {
  99. while (n && len) {
  100. uint8_t c;
  101. *(out++) = ivec[n] ^ (c = *(in++));
  102. ivec[n] = c;
  103. --len;
  104. n = (n + 1) % 16;
  105. }
  106. if (STRICT_ALIGNMENT && ((size_t)in | (size_t)out | (size_t)ivec) % sizeof(size_t) != 0) {
  107. while (l < len) {
  108. unsigned char c;
  109. if (n == 0) {
  110. (*block)(ivec, ivec, key);
  111. }
  112. out[l] = ivec[n] ^ (c = in[l]);
  113. ivec[n] = c;
  114. ++l;
  115. n = (n + 1) % 16;
  116. }
  117. *num = n;
  118. return;
  119. }
  120. while (len >= 16) {
  121. (*block)(ivec, ivec, key);
  122. for (; n < 16; n += sizeof(size_t)) {
  123. size_t t = *(size_t *)(in + n);
  124. *(size_t *)(out + n) = *(size_t *)(ivec + n) ^ t;
  125. *(size_t *)(ivec + n) = t;
  126. }
  127. len -= 16;
  128. out += 16;
  129. in += 16;
  130. n = 0;
  131. }
  132. if (len) {
  133. (*block)(ivec, ivec, key);
  134. while (len--) {
  135. uint8_t c;
  136. out[n] = ivec[n] ^ (c = in[n]);
  137. ivec[n] = c;
  138. ++n;
  139. }
  140. }
  141. *num = n;
  142. return;
  143. }
  144. }
  145. /* This expects a single block of size nbits for both in and out. Note that
  146. it corrupts any extra bits in the last byte of out */
  147. static void cfbr_encrypt_block(const uint8_t *in, uint8_t *out, unsigned nbits,
  148. const void *key, uint8_t ivec[16], int enc,
  149. block128_f block) {
  150. int n, rem, num;
  151. uint8_t ovec[16 * 2 + 1]; /* +1 because we dererefence (but don't use) one
  152. byte off the end */
  153. if (nbits <= 0 || nbits > 128) {
  154. return;
  155. }
  156. /* fill in the first half of the new IV with the current IV */
  157. memcpy(ovec, ivec, 16);
  158. /* construct the new IV */
  159. (*block)(ivec, ivec, key);
  160. num = (nbits + 7) / 8;
  161. if (enc) {
  162. /* encrypt the input */
  163. for (n = 0; n < num; ++n) {
  164. out[n] = (ovec[16 + n] = in[n] ^ ivec[n]);
  165. }
  166. } else {
  167. /* decrypt the input */
  168. for (n = 0; n < num; ++n) {
  169. out[n] = (ovec[16 + n] = in[n]) ^ ivec[n];
  170. }
  171. }
  172. /* shift ovec left... */
  173. rem = nbits % 8;
  174. num = nbits / 8;
  175. if (rem == 0) {
  176. memcpy(ivec, ovec + num, 16);
  177. } else {
  178. for (n = 0; n < 16; ++n) {
  179. ivec[n] = ovec[n + num] << rem | ovec[n + num + 1] >> (8 - rem);
  180. }
  181. }
  182. /* it is not necessary to cleanse ovec, since the IV is not secret */
  183. }
  184. /* N.B. This expects the input to be packed, MS bit first */
  185. void CRYPTO_cfb128_1_encrypt(const uint8_t *in, uint8_t *out, size_t bits,
  186. const void *key, uint8_t ivec[16], unsigned *num,
  187. int enc, block128_f block) {
  188. size_t n;
  189. uint8_t c[1], d[1];
  190. assert(in && out && key && ivec && num);
  191. assert(*num == 0);
  192. for (n = 0; n < bits; ++n) {
  193. c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0;
  194. cfbr_encrypt_block(c, d, 1, key, ivec, enc, block);
  195. out[n / 8] = (out[n / 8] & ~(1 << (unsigned int)(7 - n % 8))) |
  196. ((d[0] & 0x80) >> (unsigned int)(n % 8));
  197. }
  198. }
  199. void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
  200. size_t length, const void *key,
  201. unsigned char ivec[16], unsigned *num, int enc,
  202. block128_f block) {
  203. size_t n;
  204. assert(in && out && key && ivec && num);
  205. assert(*num == 0);
  206. for (n = 0; n < length; ++n) {
  207. cfbr_encrypt_block(&in[n], &out[n], 8, key, ivec, enc, block);
  208. }
  209. }