1 /* crypto/camellia/camellia_cfb.c -*- mode:C; c-file-style: "eay" -*- */ 2 /* ==================================================================== 3 * Copyright (c) 2006 The OpenSSL Project. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the 15 * distribution. 16 * 17 * 3. All advertising materials mentioning features or use of this 18 * software must display the following acknowledgment: 19 * "This product includes software developed by the OpenSSL Project 20 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 21 * 22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 23 * endorse or promote products derived from this software without 24 * prior written permission. For written permission, please contact 25 * openssl-core (at) openssl.org. 26 * 27 * 5. Products derived from this software may not be called "OpenSSL" 28 * nor may "OpenSSL" appear in their names without prior written 29 * permission of the OpenSSL Project. 30 * 31 * 6. Redistributions of any form whatsoever must retain the following 32 * acknowledgment: 33 * "This product includes software developed by the OpenSSL Project 34 * for use in the OpenSSL Toolkit (http://www.openssl.org/)" 35 * 36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 47 * OF THE POSSIBILITY OF SUCH DAMAGE. 48 * ==================================================================== 49 * 50 */ 51 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 52 * All rights reserved. 53 * 54 * This package is an SSL implementation written 55 * by Eric Young (eay (at) cryptsoft.com). 56 * The implementation was written so as to conform with Netscapes SSL. 57 * 58 * This library is free for commercial and non-commercial use as long as 59 * the following conditions are aheared to. The following conditions 60 * apply to all code found in this distribution, be it the RC4, RSA, 61 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 62 * included with this distribution is covered by the same copyright terms 63 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 64 * 65 * Copyright remains Eric Young's, and as such any Copyright notices in 66 * the code are not to be removed. 67 * If this package is used in a product, Eric Young should be given attribution 68 * as the author of the parts of the library used. 69 * This can be in the form of a textual message at program startup or 70 * in documentation (online or textual) provided with the package. 71 * 72 * Redistribution and use in source and binary forms, with or without 73 * modification, are permitted provided that the following conditions 74 * are met: 75 * 1. Redistributions of source code must retain the copyright 76 * notice, this list of conditions and the following disclaimer. 77 * 2. Redistributions in binary form must reproduce the above copyright 78 * notice, this list of conditions and the following disclaimer in the 79 * documentation and/or other materials provided with the distribution. 80 * 3. All advertising materials mentioning features or use of this software 81 * must display the following acknowledgement: 82 * "This product includes cryptographic software written by 83 * Eric Young (eay (at) cryptsoft.com)" 84 * The word 'cryptographic' can be left out if the rouines from the library 85 * being used are not cryptographic related :-). 86 * 4. If you include any Windows specific code (or a derivative thereof) from 87 * the apps directory (application code) you must include an acknowledgement: 88 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 89 * 90 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 91 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 92 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 93 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 94 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 95 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 96 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 97 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 98 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 99 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 100 * SUCH DAMAGE. 101 * 102 * The licence and distribution terms for any publically available version or 103 * derivative of this code cannot be changed. i.e. this code cannot simply be 104 * copied and put under another distribution licence 105 * [including the GNU Public Licence.] 106 */ 107 108 #ifndef CAMELLIA_DEBUG 109 # ifndef NDEBUG 110 # define NDEBUG 111 # endif 112 #endif 113 #include <assert.h> 114 #include <string.h> 115 116 #include <openssl/camellia.h> 117 #include "cmll_locl.h" 118 #include "e_os.h" 119 120 121 /* The input and output encrypted as though 128bit cfb mode is being 122 * used. The extra state information to record how much of the 123 * 128bit block we have used is contained in *num; 124 */ 125 126 void Camellia_cfb128_encrypt(const unsigned char *in, unsigned char *out, 127 const unsigned long length, const CAMELLIA_KEY *key, 128 unsigned char *ivec, int *num, const int enc) 129 { 130 131 unsigned int n; 132 unsigned long l = length; 133 unsigned char c; 134 135 assert(in && out && key && ivec && num); 136 137 n = *num; 138 139 if (enc) 140 { 141 while (l--) 142 { 143 if (n == 0) 144 { 145 Camellia_encrypt(ivec, ivec, key); 146 } 147 ivec[n] = *(out++) = *(in++) ^ ivec[n]; 148 n = (n+1) % CAMELLIA_BLOCK_SIZE; 149 } 150 } 151 else 152 { 153 while (l--) 154 { 155 if (n == 0) 156 { 157 Camellia_encrypt(ivec, ivec, key); 158 } 159 c = *(in); 160 *(out++) = *(in++) ^ ivec[n]; 161 ivec[n] = c; 162 n = (n+1) % CAMELLIA_BLOCK_SIZE; 163 } 164 } 165 166 *num=n; 167 } 168 169 /* This expects a single block of size nbits for both in and out. Note that 170 it corrupts any extra bits in the last byte of out */ 171 void Camellia_cfbr_encrypt_block(const unsigned char *in,unsigned char *out, 172 const int nbits,const CAMELLIA_KEY *key, 173 unsigned char *ivec,const int enc) 174 { 175 int n,rem,num; 176 unsigned char ovec[CAMELLIA_BLOCK_SIZE*2]; 177 178 if (nbits<=0 || nbits>128) return; 179 180 /* fill in the first half of the new IV with the current IV */ 181 memcpy(ovec,ivec,CAMELLIA_BLOCK_SIZE); 182 /* construct the new IV */ 183 Camellia_encrypt(ivec,ivec,key); 184 num = (nbits+7)/8; 185 if (enc) /* encrypt the input */ 186 for(n=0 ; n < num ; ++n) 187 out[n] = (ovec[CAMELLIA_BLOCK_SIZE+n] = in[n] ^ ivec[n]); 188 else /* decrypt the input */ 189 for(n=0 ; n < num ; ++n) 190 out[n] = (ovec[CAMELLIA_BLOCK_SIZE+n] = in[n]) ^ ivec[n]; 191 /* shift ovec left... */ 192 rem = nbits%8; 193 num = nbits/8; 194 if(rem==0) 195 memcpy(ivec,ovec+num,CAMELLIA_BLOCK_SIZE); 196 else 197 for(n=0 ; n < CAMELLIA_BLOCK_SIZE ; ++n) 198 ivec[n] = ovec[n+num]<<rem | ovec[n+num+1]>>(8-rem); 199 200 /* it is not necessary to cleanse ovec, since the IV is not secret */ 201 } 202 203 /* N.B. This expects the input to be packed, MS bit first */ 204 void Camellia_cfb1_encrypt(const unsigned char *in, unsigned char *out, 205 const unsigned long length, const CAMELLIA_KEY *key, 206 unsigned char *ivec, int *num, const int enc) 207 { 208 unsigned int n; 209 unsigned char c[1],d[1]; 210 211 assert(in && out && key && ivec && num); 212 assert(*num == 0); 213 214 memset(out,0,(length+7)/8); 215 for(n=0 ; n < length ; ++n) 216 { 217 c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0; 218 Camellia_cfbr_encrypt_block(c,d,1,key,ivec,enc); 219 out[n/8]=(out[n/8]&~(1 << (7-n%8)))|((d[0]&0x80) >> (n%8)); 220 } 221 } 222 223 void Camellia_cfb8_encrypt(const unsigned char *in, unsigned char *out, 224 const unsigned long length, const CAMELLIA_KEY *key, 225 unsigned char *ivec, int *num, const int enc) 226 { 227 unsigned int n; 228 229 assert(in && out && key && ivec && num); 230 assert(*num == 0); 231 232 for(n=0 ; n < length ; ++n) 233 Camellia_cfbr_encrypt_block(&in[n],&out[n],8,key,ivec,enc); 234 } 235 236