xref: /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/sm4_cbc.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun #include <stdio.h>
2*4882a593Smuzhiyun #include <stdlib.h>
3*4882a593Smuzhiyun #include <string.h>
4*4882a593Smuzhiyun #include "sm4_core.h"
5*4882a593Smuzhiyun 
rk_crypto_cbc128_encrypt(void * ctx,const unsigned char * in,unsigned char * out,unsigned int len,unsigned char * ivec,block128_f block)6*4882a593Smuzhiyun static void rk_crypto_cbc128_encrypt(void *ctx, const unsigned char *in, unsigned char *out,
7*4882a593Smuzhiyun 			unsigned int len, unsigned char *ivec, block128_f block)
8*4882a593Smuzhiyun {
9*4882a593Smuzhiyun 	unsigned int n;
10*4882a593Smuzhiyun 	const unsigned char *iv = ivec;
11*4882a593Smuzhiyun 
12*4882a593Smuzhiyun 	while (len) {
13*4882a593Smuzhiyun 		for(n=0; n<SM4_BLOCK_SIZE && n<len; ++n)
14*4882a593Smuzhiyun 			out[n] = in[n] ^ iv[n];
15*4882a593Smuzhiyun 		for(; n<SM4_BLOCK_SIZE; ++n)
16*4882a593Smuzhiyun 			out[n] = iv[n];
17*4882a593Smuzhiyun 		(*block)(out, out, ctx);
18*4882a593Smuzhiyun 		iv = out;
19*4882a593Smuzhiyun 		if (len<=SM4_BLOCK_SIZE) break;
20*4882a593Smuzhiyun 		len -= SM4_BLOCK_SIZE;
21*4882a593Smuzhiyun 		in  += SM4_BLOCK_SIZE;
22*4882a593Smuzhiyun 		out += SM4_BLOCK_SIZE;
23*4882a593Smuzhiyun 	}
24*4882a593Smuzhiyun 	memcpy(ivec,iv,SM4_BLOCK_SIZE);
25*4882a593Smuzhiyun }
26*4882a593Smuzhiyun 
rk_crypto_cbc128_decrypt(void * ctx,const unsigned char * in,unsigned char * out,unsigned int len,unsigned char * ivec,block128_f block)27*4882a593Smuzhiyun static void rk_crypto_cbc128_decrypt(void *ctx, const unsigned char *in, unsigned char *out,
28*4882a593Smuzhiyun 			unsigned int len, unsigned char *ivec, block128_f block)
29*4882a593Smuzhiyun {
30*4882a593Smuzhiyun 	unsigned int n;
31*4882a593Smuzhiyun 	unsigned char c;
32*4882a593Smuzhiyun 	unsigned char tmp_buf[SM4_BLOCK_SIZE];
33*4882a593Smuzhiyun 
34*4882a593Smuzhiyun 	memset(tmp_buf, 0x00, sizeof(tmp_buf));
35*4882a593Smuzhiyun 
36*4882a593Smuzhiyun 	while (len) {
37*4882a593Smuzhiyun 		(*block)(in, tmp_buf, ctx);
38*4882a593Smuzhiyun 		for(n=0; n<SM4_BLOCK_SIZE && n<len; ++n) {
39*4882a593Smuzhiyun 			c = in[n];
40*4882a593Smuzhiyun 			out[n] = tmp_buf[n] ^ ivec[n];
41*4882a593Smuzhiyun 			ivec[n] = c;
42*4882a593Smuzhiyun 		}
43*4882a593Smuzhiyun 		if (len<=SM4_BLOCK_SIZE) {
44*4882a593Smuzhiyun 			for (; n<SM4_BLOCK_SIZE; ++n)
45*4882a593Smuzhiyun 				ivec[n] = in[n];
46*4882a593Smuzhiyun 			break;
47*4882a593Smuzhiyun 		}
48*4882a593Smuzhiyun 		len -= SM4_BLOCK_SIZE;
49*4882a593Smuzhiyun 		in	+= SM4_BLOCK_SIZE;
50*4882a593Smuzhiyun 		out += SM4_BLOCK_SIZE;
51*4882a593Smuzhiyun 	}
52*4882a593Smuzhiyun 
53*4882a593Smuzhiyun }
54*4882a593Smuzhiyun 
rk_sm4_cbc_encrypt(const unsigned char * in,unsigned char * out,unsigned int length,const unsigned char * key,const int key_len,unsigned char * ivec,const int enc)55*4882a593Smuzhiyun int rk_sm4_cbc_encrypt(const unsigned char *in, unsigned char *out,
56*4882a593Smuzhiyun         unsigned int length, const unsigned char *key, const int key_len,
57*4882a593Smuzhiyun         unsigned char *ivec, const int enc)
58*4882a593Smuzhiyun {
59*4882a593Smuzhiyun 		sm4_context  ctx;
60*4882a593Smuzhiyun 
61*4882a593Smuzhiyun 		if(key_len != 16)
62*4882a593Smuzhiyun 			return -1;
63*4882a593Smuzhiyun 
64*4882a593Smuzhiyun 		if(length%SM4_BLOCK_SIZE || length == 0)
65*4882a593Smuzhiyun 			return -1;
66*4882a593Smuzhiyun 
67*4882a593Smuzhiyun         if (enc) {
68*4882a593Smuzhiyun 			rk_sm4_setkey_enc(&ctx, key);
69*4882a593Smuzhiyun 			rk_crypto_cbc128_encrypt((void*)&ctx, in, out, length, ivec, rk_rk_sm4_crypt_ecb);
70*4882a593Smuzhiyun         } else {
71*4882a593Smuzhiyun 			rk_sm4_setkey_dec(&ctx, key);
72*4882a593Smuzhiyun 			rk_crypto_cbc128_decrypt((void*)&ctx, in, out, length, ivec, rk_rk_sm4_crypt_ecb);
73*4882a593Smuzhiyun         }
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun 
76*4882a593Smuzhiyun 		return 0;
77*4882a593Smuzhiyun }
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun 
80