1*4882a593Smuzhiyun #include <stdio.h>
2*4882a593Smuzhiyun #include <stdlib.h>
3*4882a593Smuzhiyun #include <string.h>
4*4882a593Smuzhiyun #include <assert.h>
5*4882a593Smuzhiyun #include "aes_core.h"
6*4882a593Smuzhiyun
7*4882a593Smuzhiyun #define DEBUG(format,...) printf("[%s]:%d: "format"\n", __func__,__LINE__, ##__VA_ARGS__)
8*4882a593Smuzhiyun
aes_xts128_encrypt(const RK_AES_KEY * key1,const RK_AES_KEY * key2,const unsigned char iv[16],const unsigned char * inp,unsigned char * out,unsigned long len,int enc)9*4882a593Smuzhiyun static int aes_xts128_encrypt(const RK_AES_KEY *key1, const RK_AES_KEY *key2,
10*4882a593Smuzhiyun const unsigned char iv[16], const unsigned char *inp,
11*4882a593Smuzhiyun unsigned char *out, unsigned long len, int enc)
12*4882a593Smuzhiyun {
13*4882a593Smuzhiyun const union { long one; char little; } is_endian = {1};
14*4882a593Smuzhiyun union { u64 u[2]; u32 d[4]; u8 c[16]; } tweak, scratch;
15*4882a593Smuzhiyun unsigned int i;
16*4882a593Smuzhiyun
17*4882a593Smuzhiyun if (len < 16)
18*4882a593Smuzhiyun return -1;
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun memcpy(tweak.c, iv, 16);
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun rk_aes_encrypt(tweak.c, tweak.c, key2);
23*4882a593Smuzhiyun
24*4882a593Smuzhiyun if (!enc && (len % 16))
25*4882a593Smuzhiyun len -= 16;
26*4882a593Smuzhiyun
27*4882a593Smuzhiyun while (len >= 16) {
28*4882a593Smuzhiyun memcpy(scratch.c, inp, 16);
29*4882a593Smuzhiyun scratch.u[0] ^= tweak.u[0];
30*4882a593Smuzhiyun scratch.u[1] ^= tweak.u[1];
31*4882a593Smuzhiyun
32*4882a593Smuzhiyun if (enc)
33*4882a593Smuzhiyun rk_aes_encrypt(scratch.c, scratch.c, key1);
34*4882a593Smuzhiyun else
35*4882a593Smuzhiyun rk_aes_decrypt(scratch.c, scratch.c, key1);
36*4882a593Smuzhiyun
37*4882a593Smuzhiyun scratch.u[0] ^= tweak.u[0];
38*4882a593Smuzhiyun scratch.u[1] ^= tweak.u[1];
39*4882a593Smuzhiyun memcpy(out, scratch.c, 16);
40*4882a593Smuzhiyun
41*4882a593Smuzhiyun inp += 16;
42*4882a593Smuzhiyun out += 16;
43*4882a593Smuzhiyun len -= 16;
44*4882a593Smuzhiyun
45*4882a593Smuzhiyun if (len == 0)
46*4882a593Smuzhiyun return 0;
47*4882a593Smuzhiyun
48*4882a593Smuzhiyun if (is_endian.little) {
49*4882a593Smuzhiyun unsigned int carry,res;
50*4882a593Smuzhiyun
51*4882a593Smuzhiyun res = 0x87 & (((int)tweak.d[3]) >> 31);
52*4882a593Smuzhiyun carry = (unsigned int)(tweak.u[0] >> 63);
53*4882a593Smuzhiyun tweak.u[0] = (tweak.u[0] << 1) ^ res;
54*4882a593Smuzhiyun tweak.u[1] = (tweak.u[1] << 1) | carry;
55*4882a593Smuzhiyun }
56*4882a593Smuzhiyun else {
57*4882a593Smuzhiyun size_t c;
58*4882a593Smuzhiyun
59*4882a593Smuzhiyun for (c = 0, i = 0; i < 16; ++i) {
60*4882a593Smuzhiyun /*+ substitutes for |, because c is 1 bit */
61*4882a593Smuzhiyun c += ((size_t)tweak.c[i]) << 1;
62*4882a593Smuzhiyun tweak.c[i] = (u8)c;
63*4882a593Smuzhiyun c = c >> 8;
64*4882a593Smuzhiyun }
65*4882a593Smuzhiyun tweak.c[0] ^= (u8)(0x87 & (0-c));
66*4882a593Smuzhiyun }
67*4882a593Smuzhiyun }
68*4882a593Smuzhiyun if (enc) {
69*4882a593Smuzhiyun for (i = 0;i < len; ++i) {
70*4882a593Smuzhiyun u8 c = inp[i];
71*4882a593Smuzhiyun out[i] = scratch.c[i];
72*4882a593Smuzhiyun scratch.c[i] = c;
73*4882a593Smuzhiyun }
74*4882a593Smuzhiyun scratch.u[0] ^= tweak.u[0];
75*4882a593Smuzhiyun scratch.u[1] ^= tweak.u[1];
76*4882a593Smuzhiyun rk_aes_encrypt(scratch.c, scratch.c, key1);
77*4882a593Smuzhiyun scratch.u[0] ^= tweak.u[0];
78*4882a593Smuzhiyun scratch.u[1] ^= tweak.u[1];
79*4882a593Smuzhiyun memcpy(out-16, scratch.c, 16);
80*4882a593Smuzhiyun }
81*4882a593Smuzhiyun else {
82*4882a593Smuzhiyun union { u64 u[2]; u8 c[16]; } tweak1;
83*4882a593Smuzhiyun
84*4882a593Smuzhiyun if (is_endian.little) {
85*4882a593Smuzhiyun unsigned int carry,res;
86*4882a593Smuzhiyun
87*4882a593Smuzhiyun res = 0x87 & (((int)tweak.d[3]) >> 31);
88*4882a593Smuzhiyun carry = (unsigned int)(tweak.u[0] >> 63);
89*4882a593Smuzhiyun tweak1.u[0] = (tweak.u[0] << 1) ^ res;
90*4882a593Smuzhiyun tweak1.u[1] = (tweak.u[1] << 1) | carry;
91*4882a593Smuzhiyun }
92*4882a593Smuzhiyun else {
93*4882a593Smuzhiyun size_t c;
94*4882a593Smuzhiyun
95*4882a593Smuzhiyun for (c = 0, i = 0;i < 16;++i) {
96*4882a593Smuzhiyun /*+ substitutes for |, because c is 1 bit */
97*4882a593Smuzhiyun c += ((size_t)tweak.c[i]) << 1;
98*4882a593Smuzhiyun tweak1.c[i] = (u8)c;
99*4882a593Smuzhiyun c = c >> 8;
100*4882a593Smuzhiyun }
101*4882a593Smuzhiyun tweak1.c[0] ^= (u8)(0x87 & (0-c));
102*4882a593Smuzhiyun }
103*4882a593Smuzhiyun
104*4882a593Smuzhiyun memcpy(scratch.c, inp, 16);
105*4882a593Smuzhiyun scratch.u[0] ^= tweak1.u[0];
106*4882a593Smuzhiyun scratch.u[1] ^= tweak1.u[1];
107*4882a593Smuzhiyun
108*4882a593Smuzhiyun rk_aes_decrypt(scratch.c, scratch.c, key1);
109*4882a593Smuzhiyun scratch.u[0] ^= tweak1.u[0];
110*4882a593Smuzhiyun scratch.u[1] ^= tweak1.u[1];
111*4882a593Smuzhiyun
112*4882a593Smuzhiyun for (i = 0;i < len;++i) {
113*4882a593Smuzhiyun u8 c = inp[16+i];
114*4882a593Smuzhiyun out[16+i] = scratch.c[i];
115*4882a593Smuzhiyun scratch.c[i] = c;
116*4882a593Smuzhiyun }
117*4882a593Smuzhiyun
118*4882a593Smuzhiyun scratch.u[0] ^= tweak.u[0];
119*4882a593Smuzhiyun scratch.u[1] ^= tweak.u[1];
120*4882a593Smuzhiyun rk_aes_decrypt(scratch.c, scratch.c, key1);
121*4882a593Smuzhiyun
122*4882a593Smuzhiyun scratch.u[0] ^= tweak.u[0];
123*4882a593Smuzhiyun scratch.u[1] ^= tweak.u[1];
124*4882a593Smuzhiyun memcpy (out, scratch.c, 16);
125*4882a593Smuzhiyun }
126*4882a593Smuzhiyun
127*4882a593Smuzhiyun return 0;
128*4882a593Smuzhiyun }
129*4882a593Smuzhiyun
130*4882a593Smuzhiyun /* XTS makes use of two different keys, usually generated by splitting
131*4882a593Smuzhiyun * the supplied block cipher's key in half.
132*4882a593Smuzhiyun * Because of the splitting, users wanting AES 256 and AES 128 encryption
133*4882a593Smuzhiyun * will need to choose key sizes of 512 bits and 256 bits respectively.
134*4882a593Smuzhiyun */
rk_aes_xts_encrypt(const unsigned char * in,unsigned char * out,unsigned long length,const unsigned char * key,const int key_len,unsigned char * ivec,const int enc)135*4882a593Smuzhiyun int rk_aes_xts_encrypt(const unsigned char *in, unsigned char *out,
136*4882a593Smuzhiyun unsigned long length, const unsigned char *key, const int key_len,
137*4882a593Smuzhiyun unsigned char *ivec, const int enc)
138*4882a593Smuzhiyun {
139*4882a593Smuzhiyun int ret;
140*4882a593Smuzhiyun RK_AES_KEY ks1, ks2;
141*4882a593Smuzhiyun
142*4882a593Smuzhiyun if(key_len != 32 && key_len != 48 && key_len != 64)
143*4882a593Smuzhiyun return -1;
144*4882a593Smuzhiyun
145*4882a593Smuzhiyun if (enc) {
146*4882a593Smuzhiyun ret = rk_aes_set_encrypt_key(key, key_len * 4, &ks1);
147*4882a593Smuzhiyun } else {
148*4882a593Smuzhiyun ret = rk_aes_set_decrypt_key(key, key_len * 4, &ks1);
149*4882a593Smuzhiyun }
150*4882a593Smuzhiyun
151*4882a593Smuzhiyun ret = rk_aes_set_encrypt_key(key + key_len / 2, key_len * 4, &ks2);
152*4882a593Smuzhiyun if (ret != 0)
153*4882a593Smuzhiyun return ret;
154*4882a593Smuzhiyun
155*4882a593Smuzhiyun return aes_xts128_encrypt(&ks1, &ks2, ivec, in, out, length, enc);
156*4882a593Smuzhiyun }
157*4882a593Smuzhiyun
158*4882a593Smuzhiyun
159