xref: /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/aes_cbc.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun #include <stdio.h>
2*4882a593Smuzhiyun #include <stdlib.h>
3*4882a593Smuzhiyun #include <string.h>
4*4882a593Smuzhiyun #include <assert.h>
5*4882a593Smuzhiyun #include "aes_core.h"
6*4882a593Smuzhiyun 
rk_crypto_cbc128_encrypt(const unsigned char * in,unsigned char * out,int len,const void * key,unsigned char * ivec)7*4882a593Smuzhiyun static void rk_crypto_cbc128_encrypt(const unsigned char *in, unsigned char *out,
8*4882a593Smuzhiyun 			int len, const void *key, unsigned char *ivec)
9*4882a593Smuzhiyun {
10*4882a593Smuzhiyun 	int n;
11*4882a593Smuzhiyun 	const unsigned char *iv = ivec;
12*4882a593Smuzhiyun 
13*4882a593Smuzhiyun 	while (len) {
14*4882a593Smuzhiyun 		for(n=0; n<16 && n<len; ++n)
15*4882a593Smuzhiyun 			out[n] = in[n] ^ iv[n];
16*4882a593Smuzhiyun 		for(; n<16; ++n)
17*4882a593Smuzhiyun 			out[n] = iv[n];
18*4882a593Smuzhiyun 		rk_aes_encrypt(out, out,key);
19*4882a593Smuzhiyun 		iv = out;
20*4882a593Smuzhiyun 		if (len<=16) break;
21*4882a593Smuzhiyun 		len -= 16;
22*4882a593Smuzhiyun 		in  += 16;
23*4882a593Smuzhiyun 		out += 16;
24*4882a593Smuzhiyun 	}
25*4882a593Smuzhiyun 	memcpy(ivec,iv,16);
26*4882a593Smuzhiyun }
27*4882a593Smuzhiyun 
rk_crypto_cbc128_decrypt(const unsigned char * in,unsigned char * out,int len,const void * key,unsigned char * ivec)28*4882a593Smuzhiyun static void rk_crypto_cbc128_decrypt(const unsigned char *in, unsigned char *out,
29*4882a593Smuzhiyun 			int len, const void *key, unsigned char *ivec)
30*4882a593Smuzhiyun {
31*4882a593Smuzhiyun 	int n;
32*4882a593Smuzhiyun 	unsigned char c;
33*4882a593Smuzhiyun 	unsigned char tmp_buf[AES_BLOCK_SIZE];
34*4882a593Smuzhiyun 
35*4882a593Smuzhiyun 	memset(tmp_buf, 0x00, sizeof(tmp_buf));
36*4882a593Smuzhiyun 
37*4882a593Smuzhiyun 	while (len) {
38*4882a593Smuzhiyun 		rk_aes_decrypt(in, tmp_buf, key);
39*4882a593Smuzhiyun 		for(n=0; n<16 && n<len; ++n) {
40*4882a593Smuzhiyun 			c = in[n];
41*4882a593Smuzhiyun 			out[n] = tmp_buf[n] ^ ivec[n];
42*4882a593Smuzhiyun 			ivec[n] = c;
43*4882a593Smuzhiyun 		}
44*4882a593Smuzhiyun 		if (len<=16) {
45*4882a593Smuzhiyun 			for (; n<16; ++n)
46*4882a593Smuzhiyun 				ivec[n] = in[n];
47*4882a593Smuzhiyun 			break;
48*4882a593Smuzhiyun 		}
49*4882a593Smuzhiyun 		len -= 16;
50*4882a593Smuzhiyun 		in	+= 16;
51*4882a593Smuzhiyun 		out += 16;
52*4882a593Smuzhiyun 	}
53*4882a593Smuzhiyun 
54*4882a593Smuzhiyun }
55*4882a593Smuzhiyun 
rk_aes_cbc_encrypt(const unsigned char * in,unsigned char * out,unsigned long length,const unsigned char * key,const int key_len,unsigned char * ivec,const int enc)56*4882a593Smuzhiyun int rk_aes_cbc_encrypt(const unsigned char *in, unsigned char *out,
57*4882a593Smuzhiyun         unsigned long length, const unsigned char *key, const int key_len,
58*4882a593Smuzhiyun         unsigned char *ivec, const int enc)
59*4882a593Smuzhiyun {
60*4882a593Smuzhiyun 		RK_AES_KEY ks;
61*4882a593Smuzhiyun 
62*4882a593Smuzhiyun 		if(key_len != 16 && key_len != 24 && key_len != 32)
63*4882a593Smuzhiyun 			return -1;
64*4882a593Smuzhiyun 
65*4882a593Smuzhiyun 		if(length%AES_BLOCK_SIZE)
66*4882a593Smuzhiyun 			return -1;
67*4882a593Smuzhiyun 
68*4882a593Smuzhiyun         if (enc) {
69*4882a593Smuzhiyun 			rk_aes_set_encrypt_key(key, key_len * 8, &ks);
70*4882a593Smuzhiyun 			rk_crypto_cbc128_encrypt(in, out, length, &ks, ivec);
71*4882a593Smuzhiyun         } else {
72*4882a593Smuzhiyun 			rk_aes_set_decrypt_key(key, key_len * 8, &ks);
73*4882a593Smuzhiyun 			rk_crypto_cbc128_decrypt(in, out, length, &ks, ivec);
74*4882a593Smuzhiyun         }
75*4882a593Smuzhiyun 		return 0;
76*4882a593Smuzhiyun }
77*4882a593Smuzhiyun 
78*4882a593Smuzhiyun 
79