2003-03-02 19:59:24 -05:00
|
|
|
#include "mycrypt.h"
|
|
|
|
|
|
|
|
#ifdef CFB
|
|
|
|
|
|
|
|
int cfb_start(int cipher, const unsigned char *IV, const unsigned char *key,
|
|
|
|
int keylen, int num_rounds, symmetric_CFB *cfb)
|
|
|
|
{
|
2003-03-02 20:02:42 -05:00
|
|
|
int x, err;
|
2003-03-02 19:59:24 -05:00
|
|
|
|
|
|
|
_ARGCHK(IV != NULL);
|
|
|
|
_ARGCHK(key != NULL);
|
|
|
|
_ARGCHK(cfb != NULL);
|
|
|
|
|
2003-03-02 20:02:42 -05:00
|
|
|
if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
|
|
|
|
return err;
|
2003-03-02 19:59:24 -05:00
|
|
|
}
|
2003-03-12 21:12:16 -05:00
|
|
|
|
2003-03-02 19:59:24 -05:00
|
|
|
|
|
|
|
/* copy data */
|
|
|
|
cfb->cipher = cipher;
|
|
|
|
cfb->blocklen = cipher_descriptor[cipher].block_length;
|
|
|
|
for (x = 0; x < cfb->blocklen; x++)
|
|
|
|
cfb->IV[x] = IV[x];
|
|
|
|
|
|
|
|
/* init the cipher */
|
2003-03-02 20:02:42 -05:00
|
|
|
if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
|
|
|
|
return err;
|
2003-03-02 19:59:24 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/* encrypt the IV */
|
|
|
|
cipher_descriptor[cfb->cipher].ecb_encrypt(cfb->IV, cfb->IV, &cfb->key);
|
|
|
|
cfb->padlen = 0;
|
|
|
|
|
|
|
|
return CRYPT_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
int cfb_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CFB *cfb)
|
|
|
|
{
|
2003-03-02 20:02:42 -05:00
|
|
|
int err;
|
2003-03-02 19:59:24 -05:00
|
|
|
|
|
|
|
_ARGCHK(pt != NULL);
|
|
|
|
_ARGCHK(ct != NULL);
|
|
|
|
_ARGCHK(cfb != NULL);
|
|
|
|
|
2003-03-02 20:02:42 -05:00
|
|
|
if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) {
|
|
|
|
return err;
|
2003-03-02 19:59:24 -05:00
|
|
|
}
|
2003-03-12 21:12:16 -05:00
|
|
|
|
|
|
|
/* is blocklen/padlen valid? */
|
|
|
|
if (cfb->blocklen < 0 || cfb->blocklen > (int)sizeof(cfb->IV) ||
|
|
|
|
cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) {
|
|
|
|
return CRYPT_INVALID_ARG;
|
|
|
|
}
|
|
|
|
|
2003-03-02 20:02:42 -05:00
|
|
|
while (len-- > 0) {
|
2003-03-02 19:59:24 -05:00
|
|
|
if (cfb->padlen == cfb->blocklen) {
|
|
|
|
cipher_descriptor[cfb->cipher].ecb_encrypt(cfb->pad, cfb->IV, &cfb->key);
|
|
|
|
cfb->padlen = 0;
|
|
|
|
}
|
|
|
|
cfb->pad[cfb->padlen] = (*ct = *pt ^ cfb->IV[cfb->padlen]);
|
|
|
|
++pt;
|
|
|
|
++ct;
|
|
|
|
++cfb->padlen;
|
|
|
|
}
|
|
|
|
return CRYPT_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
int cfb_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CFB *cfb)
|
|
|
|
{
|
2003-03-02 20:02:42 -05:00
|
|
|
int err;
|
2003-03-02 19:59:24 -05:00
|
|
|
|
|
|
|
_ARGCHK(pt != NULL);
|
|
|
|
_ARGCHK(ct != NULL);
|
|
|
|
_ARGCHK(cfb != NULL);
|
|
|
|
|
2003-03-02 20:02:42 -05:00
|
|
|
if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) {
|
|
|
|
return err;
|
2003-03-02 19:59:24 -05:00
|
|
|
}
|
2003-03-12 21:12:16 -05:00
|
|
|
|
|
|
|
/* is blocklen/padlen valid? */
|
|
|
|
if (cfb->blocklen < 0 || cfb->blocklen > (int)sizeof(cfb->IV) ||
|
|
|
|
cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) {
|
|
|
|
return CRYPT_INVALID_ARG;
|
|
|
|
}
|
|
|
|
|
2003-03-02 20:02:42 -05:00
|
|
|
while (len-- > 0) {
|
2003-03-02 19:59:24 -05:00
|
|
|
if (cfb->padlen == cfb->blocklen) {
|
|
|
|
cipher_descriptor[cfb->cipher].ecb_encrypt(cfb->pad, cfb->IV, &cfb->key);
|
|
|
|
cfb->padlen = 0;
|
|
|
|
}
|
|
|
|
cfb->pad[cfb->padlen] = *ct;
|
|
|
|
*pt = *ct ^ cfb->IV[cfb->padlen];
|
|
|
|
++pt;
|
|
|
|
++ct;
|
|
|
|
++cfb->padlen;
|
|
|
|
}
|
|
|
|
return CRYPT_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|