mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-06 16:36:16 +08:00
245 lines
5.2 KiB
C
245 lines
5.2 KiB
C
/*
|
|
* Copyright 2014-2024 The GmSSL Project. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the License); you may
|
|
* not use this file except in compliance with the License.
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*/
|
|
|
|
|
|
#include <gmssl/sm4.h>
|
|
#include <gmssl/mem.h>
|
|
#include <gmssl/error.h>
|
|
|
|
|
|
// sm4_cfb_encrypt iv type is not compatible with sm4_cbc_encrypt, carefull if inlen % sbytes != 0
|
|
void sm4_cfb_encrypt(const SM4_KEY *key, size_t sbytes, uint8_t iv[16],
|
|
const uint8_t *in, size_t inlen, uint8_t *out)
|
|
{
|
|
uint8_t block[16];
|
|
size_t len, i;
|
|
|
|
while (inlen) {
|
|
len = inlen < sbytes ? inlen : sbytes;
|
|
|
|
sm4_encrypt(key, iv, block);
|
|
|
|
gmssl_memxor(out, in, block, len);
|
|
|
|
// iv = (iv << sbytes) | out
|
|
for (i = 0; i < 16 - sbytes; i++) {
|
|
iv[i] = iv[sbytes + i];
|
|
}
|
|
memcpy(iv + 16 - sbytes, out, len);
|
|
|
|
in += len;
|
|
out += len;
|
|
inlen -= len;
|
|
}
|
|
}
|
|
|
|
void sm4_cfb_decrypt(const SM4_KEY *key, size_t sbytes, uint8_t iv[16],
|
|
const uint8_t *in, size_t inlen, uint8_t *out)
|
|
{
|
|
uint8_t block[16];
|
|
size_t len, i;
|
|
|
|
while (inlen) {
|
|
len = inlen < sbytes ? inlen : sbytes;
|
|
|
|
sm4_encrypt(key, iv, block);
|
|
|
|
// iv = (iv << sbytes) | in
|
|
for (i = 0; i < 16 - sbytes; i++) {
|
|
iv[i] = iv[sbytes + i];
|
|
}
|
|
memcpy(iv + 16 - sbytes, in, len);
|
|
|
|
// NOTE: must update before output, in might be changed if in == out
|
|
gmssl_memxor(out, in, block, len);
|
|
|
|
in += len;
|
|
out += len;
|
|
inlen -= len;
|
|
}
|
|
}
|
|
|
|
int sm4_cfb_encrypt_init(SM4_CFB_CTX *ctx, size_t sbytes,
|
|
const uint8_t key[SM4_BLOCK_SIZE], const uint8_t iv[SM4_BLOCK_SIZE])
|
|
{
|
|
if (!ctx || !key || !iv) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (sbytes < 1 || sbytes > 16) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
sm4_set_encrypt_key(&ctx->sm4_key, key);
|
|
memcpy(ctx->iv, iv, SM4_BLOCK_SIZE);
|
|
memset(ctx->block, 0, SM4_BLOCK_SIZE);
|
|
ctx->block_nbytes = 0;
|
|
ctx->sbytes = sbytes;
|
|
return 1;
|
|
}
|
|
|
|
int sm4_cfb_encrypt_update(SM4_CFB_CTX *ctx,
|
|
const uint8_t *in, size_t inlen, uint8_t *out, size_t *outlen)
|
|
{
|
|
size_t left;
|
|
size_t nblocks;
|
|
size_t len;
|
|
|
|
if (!ctx || !in || !outlen) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (!out) {
|
|
*outlen = 16 * ((inlen + 15)/16);
|
|
return 1;
|
|
}
|
|
if (ctx->block_nbytes >= ctx->sbytes) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
*outlen = 0;
|
|
if (ctx->block_nbytes) {
|
|
left = ctx->sbytes - ctx->block_nbytes;
|
|
if (inlen < left) {
|
|
memcpy(ctx->block + ctx->block_nbytes, in, inlen);
|
|
ctx->block_nbytes += inlen;
|
|
return 1;
|
|
}
|
|
memcpy(ctx->block + ctx->block_nbytes, in, left);
|
|
sm4_cfb_encrypt(&ctx->sm4_key, ctx->sbytes, ctx->iv, ctx->block, ctx->sbytes, out);
|
|
in += left;
|
|
inlen -= left;
|
|
out += ctx->sbytes;
|
|
*outlen += ctx->sbytes;
|
|
}
|
|
if (inlen >= ctx->sbytes) {
|
|
nblocks = inlen / ctx->sbytes;
|
|
len = nblocks * ctx->sbytes;
|
|
sm4_cfb_encrypt(&ctx->sm4_key, ctx->sbytes, ctx->iv, in, len, out);
|
|
in += len;
|
|
inlen -= len;
|
|
out += len;
|
|
*outlen += len;
|
|
}
|
|
if (inlen) {
|
|
memcpy(ctx->block, in, inlen);
|
|
}
|
|
ctx->block_nbytes = inlen;
|
|
return 1;
|
|
}
|
|
|
|
int sm4_cfb_encrypt_finish(SM4_CFB_CTX *ctx, uint8_t *out, size_t *outlen)
|
|
{
|
|
if (!ctx || !outlen) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (!out) {
|
|
*outlen = SM4_BLOCK_SIZE;
|
|
return 1;
|
|
}
|
|
if (ctx->block_nbytes >= ctx->sbytes) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
sm4_cfb_encrypt(&ctx->sm4_key, ctx->sbytes, ctx->iv, ctx->block, ctx->block_nbytes, out);
|
|
*outlen = ctx->block_nbytes;
|
|
return 1;
|
|
}
|
|
|
|
int sm4_cfb_decrypt_init(SM4_CFB_CTX *ctx, size_t sbytes,
|
|
const uint8_t key[SM4_BLOCK_SIZE], const uint8_t iv[SM4_BLOCK_SIZE])
|
|
{
|
|
if (!ctx || !key || !iv) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (sbytes < 1 || sbytes > 16) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
sm4_set_encrypt_key(&ctx->sm4_key, key);
|
|
memcpy(ctx->iv, iv, SM4_BLOCK_SIZE);
|
|
memset(ctx->block, 0, SM4_BLOCK_SIZE);
|
|
ctx->block_nbytes = 0;
|
|
ctx->sbytes = sbytes;
|
|
return 1;
|
|
}
|
|
|
|
int sm4_cfb_decrypt_update(SM4_CFB_CTX *ctx,
|
|
const uint8_t *in, size_t inlen, uint8_t *out, size_t *outlen)
|
|
{
|
|
size_t left;
|
|
size_t nblocks;
|
|
size_t len;
|
|
|
|
if (!ctx || !in || !outlen) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (!out) {
|
|
*outlen = 16 * ((inlen + 15)/16);
|
|
return 1;
|
|
}
|
|
if (ctx->block_nbytes >= ctx->sbytes) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
*outlen = 0;
|
|
if (ctx->block_nbytes) {
|
|
error_print();
|
|
|
|
left = ctx->sbytes - ctx->block_nbytes;
|
|
if (inlen < left) {
|
|
memcpy(ctx->block + ctx->block_nbytes, in, inlen);
|
|
ctx->block_nbytes += inlen;
|
|
return 1;
|
|
}
|
|
memcpy(ctx->block + ctx->block_nbytes, in, left);
|
|
sm4_cfb_decrypt(&ctx->sm4_key, ctx->sbytes, ctx->iv, ctx->block, ctx->sbytes, out);
|
|
in += left;
|
|
inlen -= left;
|
|
out += ctx->sbytes;
|
|
*outlen += ctx->sbytes;
|
|
}
|
|
if (inlen >= ctx->sbytes) {
|
|
nblocks = inlen / ctx->sbytes;
|
|
len = nblocks * ctx->sbytes;
|
|
sm4_cfb_decrypt(&ctx->sm4_key, ctx->sbytes, ctx->iv, in, len, out);
|
|
in += len;
|
|
inlen -= len;
|
|
out += len;
|
|
*outlen += len;
|
|
}
|
|
if (inlen) {
|
|
memcpy(ctx->block, in, inlen);
|
|
}
|
|
ctx->block_nbytes = inlen;
|
|
return 1;
|
|
}
|
|
|
|
int sm4_cfb_decrypt_finish(SM4_CFB_CTX *ctx, uint8_t *out, size_t *outlen)
|
|
{
|
|
if (!ctx || !outlen) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
if (!out) {
|
|
*outlen = SM4_BLOCK_SIZE;
|
|
return 1;
|
|
}
|
|
if (ctx->block_nbytes >= ctx->sbytes) {
|
|
error_print();
|
|
return -1;
|
|
}
|
|
sm4_cfb_decrypt(&ctx->sm4_key, ctx->sbytes, ctx->iv, ctx->block, ctx->block_nbytes, out);
|
|
*outlen = ctx->block_nbytes;
|
|
return 1;
|
|
}
|