xref: /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/aes_cts.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun #include <stdio.h>
2*4882a593Smuzhiyun #include <stdlib.h>
3*4882a593Smuzhiyun #include <string.h>
4*4882a593Smuzhiyun #include <assert.h>
5*4882a593Smuzhiyun #include "aes_core.h"
6*4882a593Smuzhiyun 
rk_crypto_cbc128_encrypt(const unsigned char * in,unsigned char * out,int len,const void * key,unsigned char * ivec)7*4882a593Smuzhiyun static void rk_crypto_cbc128_encrypt(const unsigned char *in, unsigned char *out,
8*4882a593Smuzhiyun 		 int len, const void *key, unsigned char *ivec)
9*4882a593Smuzhiyun {
10*4882a593Smuzhiyun 	int n;
11*4882a593Smuzhiyun 	const unsigned char *iv = ivec;
12*4882a593Smuzhiyun 
13*4882a593Smuzhiyun 	while (len) {
14*4882a593Smuzhiyun 		for(n=0; n<AES_BLOCK_SIZE && n<len; ++n)
15*4882a593Smuzhiyun 		 	out[n] = in[n] ^ iv[n];
16*4882a593Smuzhiyun 		for(; n<AES_BLOCK_SIZE; ++n)
17*4882a593Smuzhiyun 		 	out[n] = iv[n];
18*4882a593Smuzhiyun 		rk_aes_encrypt(out, out,key);
19*4882a593Smuzhiyun 		iv = out;
20*4882a593Smuzhiyun 		if (len<=AES_BLOCK_SIZE) break;
21*4882a593Smuzhiyun 		len -= AES_BLOCK_SIZE;
22*4882a593Smuzhiyun 		in  += AES_BLOCK_SIZE;
23*4882a593Smuzhiyun 		out += AES_BLOCK_SIZE;
24*4882a593Smuzhiyun 	}
25*4882a593Smuzhiyun 	memcpy(ivec,iv,AES_BLOCK_SIZE);
26*4882a593Smuzhiyun }
27*4882a593Smuzhiyun 
rk_crypto_cbc128_decrypt(const unsigned char * in,unsigned char * out,int len,const void * key,unsigned char * ivec)28*4882a593Smuzhiyun static void rk_crypto_cbc128_decrypt(const unsigned char *in, unsigned char *out,
29*4882a593Smuzhiyun 		 int len, const void *key, unsigned char *ivec)
30*4882a593Smuzhiyun {
31*4882a593Smuzhiyun 	int n;
32*4882a593Smuzhiyun 	unsigned char c;
33*4882a593Smuzhiyun 	unsigned char tmp_buf[AES_BLOCK_SIZE];
34*4882a593Smuzhiyun 
35*4882a593Smuzhiyun 	memset(tmp_buf, 0x00, sizeof(tmp_buf));
36*4882a593Smuzhiyun 
37*4882a593Smuzhiyun 	while (len) {
38*4882a593Smuzhiyun 		rk_aes_decrypt(in, tmp_buf, key);
39*4882a593Smuzhiyun 		for(n=0; n<AES_BLOCK_SIZE && n<len; ++n) {
40*4882a593Smuzhiyun 			 c = in[n];
41*4882a593Smuzhiyun 			 out[n] = tmp_buf[n] ^ ivec[n];
42*4882a593Smuzhiyun 			 ivec[n] = c;
43*4882a593Smuzhiyun 		}
44*4882a593Smuzhiyun 		if (len<=AES_BLOCK_SIZE) {
45*4882a593Smuzhiyun 			 for (; n<AES_BLOCK_SIZE; ++n)
46*4882a593Smuzhiyun 				 ivec[n] = in[n];
47*4882a593Smuzhiyun 			 break;
48*4882a593Smuzhiyun 		}
49*4882a593Smuzhiyun 		len -= AES_BLOCK_SIZE;
50*4882a593Smuzhiyun 		in  += AES_BLOCK_SIZE;
51*4882a593Smuzhiyun 		out += AES_BLOCK_SIZE;
52*4882a593Smuzhiyun 	}
53*4882a593Smuzhiyun }
54*4882a593Smuzhiyun 
55*4882a593Smuzhiyun 
rk_crypto_cts_encrypt(const unsigned char * in,unsigned char * out,unsigned long length,const RK_AES_KEY * ks1,unsigned char * ivec,const int enc)56*4882a593Smuzhiyun static int rk_crypto_cts_encrypt(const unsigned char *in, unsigned char *out,
57*4882a593Smuzhiyun 		unsigned long length, const RK_AES_KEY *ks1, unsigned char *ivec, const int enc)
58*4882a593Smuzhiyun {
59*4882a593Smuzhiyun 	int k = 0, r = 0;
60*4882a593Smuzhiyun 
61*4882a593Smuzhiyun 	r = length % AES_BLOCK_SIZE;
62*4882a593Smuzhiyun 	if (r) {
63*4882a593Smuzhiyun 		k = length - r - AES_BLOCK_SIZE;
64*4882a593Smuzhiyun 	} else {
65*4882a593Smuzhiyun 		k = length;
66*4882a593Smuzhiyun 	}
67*4882a593Smuzhiyun 
68*4882a593Smuzhiyun 	if (enc){
69*4882a593Smuzhiyun 		unsigned char  peniv[AES_BLOCK_SIZE] = {0};
70*4882a593Smuzhiyun 		memset(peniv, 0x00, sizeof(peniv));
71*4882a593Smuzhiyun 
72*4882a593Smuzhiyun 		rk_crypto_cbc128_encrypt(in, out, k, ks1, ivec);
73*4882a593Smuzhiyun 
74*4882a593Smuzhiyun 		if (r) {
75*4882a593Smuzhiyun 			memcpy(peniv, in + k + AES_BLOCK_SIZE, r);
76*4882a593Smuzhiyun 
77*4882a593Smuzhiyun 			rk_crypto_cbc128_encrypt(in + k, out + k, AES_BLOCK_SIZE, ks1, ivec);
78*4882a593Smuzhiyun 			memcpy(out + length - r, out + k, r);
79*4882a593Smuzhiyun 			rk_crypto_cbc128_encrypt(peniv, out + k, AES_BLOCK_SIZE, ks1, ivec);
80*4882a593Smuzhiyun 		}else{
81*4882a593Smuzhiyun 			//swap last two block
82*4882a593Smuzhiyun 			memcpy(peniv, out + length - AES_BLOCK_SIZE, AES_BLOCK_SIZE);
83*4882a593Smuzhiyun 			memcpy(out + length - AES_BLOCK_SIZE, out + length - 2*AES_BLOCK_SIZE, AES_BLOCK_SIZE);
84*4882a593Smuzhiyun 			memcpy(out + length - 2*AES_BLOCK_SIZE, peniv, AES_BLOCK_SIZE);
85*4882a593Smuzhiyun 		}
86*4882a593Smuzhiyun 	}else{
87*4882a593Smuzhiyun 		int i;
88*4882a593Smuzhiyun 		unsigned char *pout_tmp = NULL;
89*4882a593Smuzhiyun 		unsigned char  tmp1[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE];
90*4882a593Smuzhiyun 
91*4882a593Smuzhiyun 		memset(tmp1, 0x00, sizeof(tmp1));
92*4882a593Smuzhiyun 		memset(tmp2, 0x00, sizeof(tmp2));
93*4882a593Smuzhiyun 
94*4882a593Smuzhiyun 		if(r == 0){
95*4882a593Smuzhiyun 			rk_crypto_cbc128_decrypt(in, out, k-2*AES_BLOCK_SIZE, ks1, ivec);
96*4882a593Smuzhiyun 			//swap last two block
97*4882a593Smuzhiyun 			rk_crypto_cbc128_decrypt(in + length - AES_BLOCK_SIZE, out + length - 2*AES_BLOCK_SIZE,
98*4882a593Smuzhiyun 										AES_BLOCK_SIZE, ks1, ivec);
99*4882a593Smuzhiyun 			rk_crypto_cbc128_decrypt(in + length - 2*AES_BLOCK_SIZE, out + length - AES_BLOCK_SIZE,
100*4882a593Smuzhiyun 										AES_BLOCK_SIZE, ks1, ivec);
101*4882a593Smuzhiyun 		}else{
102*4882a593Smuzhiyun 			rk_crypto_cbc128_decrypt(in, out, k, ks1, ivec);
103*4882a593Smuzhiyun 			rk_aes_decrypt(in + k, tmp1, ks1);
104*4882a593Smuzhiyun 
105*4882a593Smuzhiyun 			memcpy(tmp2, in + k + AES_BLOCK_SIZE, r);
106*4882a593Smuzhiyun 			memcpy(tmp2+r, tmp1+r, AES_BLOCK_SIZE-r);
107*4882a593Smuzhiyun 
108*4882a593Smuzhiyun 			//get last one plain text
109*4882a593Smuzhiyun 			pout_tmp = out + k + AES_BLOCK_SIZE;
110*4882a593Smuzhiyun 			for(i=0; i<AES_BLOCK_SIZE; i++,pout_tmp++)
111*4882a593Smuzhiyun 		 		*pout_tmp = tmp1[i] ^ tmp2[i];
112*4882a593Smuzhiyun 
113*4882a593Smuzhiyun 			rk_aes_decrypt(tmp2, tmp2, ks1);
114*4882a593Smuzhiyun 
115*4882a593Smuzhiyun 			//get sencond to last plain text
116*4882a593Smuzhiyun 			pout_tmp = out + k;
117*4882a593Smuzhiyun 			for(i=0; i<AES_BLOCK_SIZE; i++,pout_tmp++)
118*4882a593Smuzhiyun 		 		*pout_tmp = tmp2[i] ^ ivec[i];
119*4882a593Smuzhiyun 		}
120*4882a593Smuzhiyun 	}
121*4882a593Smuzhiyun 
122*4882a593Smuzhiyun 	return 0;
123*4882a593Smuzhiyun }
124*4882a593Smuzhiyun 
125*4882a593Smuzhiyun 
rk_aes_cts_encrypt(const unsigned char * in,unsigned char * out,unsigned long length,const unsigned char * key,const int key_len,unsigned char * ivec,const int enc)126*4882a593Smuzhiyun int rk_aes_cts_encrypt(const unsigned char *in, unsigned char *out,
127*4882a593Smuzhiyun         unsigned long length, const unsigned char *key, const int key_len,
128*4882a593Smuzhiyun         unsigned char *ivec, const int enc)
129*4882a593Smuzhiyun {
130*4882a593Smuzhiyun 	RK_AES_KEY ks1;
131*4882a593Smuzhiyun 
132*4882a593Smuzhiyun 	if (in == NULL || out ==NULL || key == NULL)
133*4882a593Smuzhiyun 		return -1;
134*4882a593Smuzhiyun 
135*4882a593Smuzhiyun 	if (key_len != 128/8 && key_len != 192/8 && key_len != 256/8)
136*4882a593Smuzhiyun 		return -2;
137*4882a593Smuzhiyun 
138*4882a593Smuzhiyun 	if(length <= AES_BLOCK_SIZE)
139*4882a593Smuzhiyun 		return -3;
140*4882a593Smuzhiyun 
141*4882a593Smuzhiyun 	if (enc) {
142*4882a593Smuzhiyun 		rk_aes_set_encrypt_key(key, key_len * 8, &ks1);
143*4882a593Smuzhiyun 	} else {
144*4882a593Smuzhiyun 		rk_aes_set_decrypt_key(key, key_len * 8, &ks1);
145*4882a593Smuzhiyun 	}
146*4882a593Smuzhiyun 
147*4882a593Smuzhiyun 	rk_crypto_cts_encrypt(in, out, length, &ks1, ivec, enc);
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun 	return 0;
150*4882a593Smuzhiyun }
151*4882a593Smuzhiyun 
152*4882a593Smuzhiyun 
153