1*4882a593Smuzhiyun #include <stdio.h>
2*4882a593Smuzhiyun #include <stdlib.h>
3*4882a593Smuzhiyun #include <string.h>
4*4882a593Smuzhiyun #include "sm4_core.h"
5*4882a593Smuzhiyun
rk_crypto_cbc128_encrypt(void * ctx,const unsigned char * in,unsigned char * out,unsigned int len,unsigned char * ivec,block128_f block)6*4882a593Smuzhiyun static void rk_crypto_cbc128_encrypt(void *ctx, const unsigned char *in, unsigned char *out,
7*4882a593Smuzhiyun unsigned int len, unsigned char *ivec, block128_f block)
8*4882a593Smuzhiyun {
9*4882a593Smuzhiyun unsigned int n;
10*4882a593Smuzhiyun const unsigned char *iv = ivec;
11*4882a593Smuzhiyun
12*4882a593Smuzhiyun while (len) {
13*4882a593Smuzhiyun for(n=0; n<SM4_BLOCK_SIZE && n<len; ++n)
14*4882a593Smuzhiyun out[n] = in[n] ^ iv[n];
15*4882a593Smuzhiyun for(; n<SM4_BLOCK_SIZE; ++n)
16*4882a593Smuzhiyun out[n] = iv[n];
17*4882a593Smuzhiyun (*block)((const unsigned char*)out, out, ctx);
18*4882a593Smuzhiyun iv = out;
19*4882a593Smuzhiyun if (len<=SM4_BLOCK_SIZE) break;
20*4882a593Smuzhiyun len -= SM4_BLOCK_SIZE;
21*4882a593Smuzhiyun in += SM4_BLOCK_SIZE;
22*4882a593Smuzhiyun out += SM4_BLOCK_SIZE;
23*4882a593Smuzhiyun }
24*4882a593Smuzhiyun memcpy(ivec,iv,SM4_BLOCK_SIZE);
25*4882a593Smuzhiyun }
26*4882a593Smuzhiyun
rk_crypto_cbc128_decrypt(void * ctx,const unsigned char * in,unsigned char * out,unsigned int len,unsigned char * ivec,block128_f block)27*4882a593Smuzhiyun static void rk_crypto_cbc128_decrypt(void *ctx, const unsigned char *in, unsigned char *out,
28*4882a593Smuzhiyun unsigned int len, unsigned char *ivec, block128_f block)
29*4882a593Smuzhiyun {
30*4882a593Smuzhiyun unsigned int n;
31*4882a593Smuzhiyun unsigned char c;
32*4882a593Smuzhiyun unsigned char tmp_buf[SM4_BLOCK_SIZE];
33*4882a593Smuzhiyun
34*4882a593Smuzhiyun memset(tmp_buf, 0x00, sizeof(tmp_buf));
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun while (len) {
37*4882a593Smuzhiyun (*block)(in, tmp_buf, ctx);
38*4882a593Smuzhiyun for(n=0; n<SM4_BLOCK_SIZE && n<len; ++n) {
39*4882a593Smuzhiyun c = in[n];
40*4882a593Smuzhiyun out[n] = tmp_buf[n] ^ ivec[n];
41*4882a593Smuzhiyun ivec[n] = c;
42*4882a593Smuzhiyun }
43*4882a593Smuzhiyun if (len<=SM4_BLOCK_SIZE) {
44*4882a593Smuzhiyun for (; n<SM4_BLOCK_SIZE; ++n)
45*4882a593Smuzhiyun ivec[n] = in[n];
46*4882a593Smuzhiyun break;
47*4882a593Smuzhiyun }
48*4882a593Smuzhiyun len -= SM4_BLOCK_SIZE;
49*4882a593Smuzhiyun in += SM4_BLOCK_SIZE;
50*4882a593Smuzhiyun out += SM4_BLOCK_SIZE;
51*4882a593Smuzhiyun }
52*4882a593Smuzhiyun }
53*4882a593Smuzhiyun
54*4882a593Smuzhiyun
rk_crypto_cts_encrypt(void * ctx,const unsigned char * in,unsigned char * out,unsigned int length,unsigned char * ivec,const int enc,block128_f block)55*4882a593Smuzhiyun static int rk_crypto_cts_encrypt(void *ctx, const unsigned char *in, unsigned char *out,
56*4882a593Smuzhiyun unsigned int length, unsigned char *ivec, const int enc, block128_f block)
57*4882a593Smuzhiyun {
58*4882a593Smuzhiyun int k = 0, r = 0;
59*4882a593Smuzhiyun
60*4882a593Smuzhiyun r = length % SM4_BLOCK_SIZE;
61*4882a593Smuzhiyun if (r) {
62*4882a593Smuzhiyun k = length - r - SM4_BLOCK_SIZE;
63*4882a593Smuzhiyun } else {
64*4882a593Smuzhiyun k = length;
65*4882a593Smuzhiyun }
66*4882a593Smuzhiyun
67*4882a593Smuzhiyun if (enc){
68*4882a593Smuzhiyun unsigned char peniv[SM4_BLOCK_SIZE] = {0};
69*4882a593Smuzhiyun memset(peniv, 0x00, sizeof(peniv));
70*4882a593Smuzhiyun
71*4882a593Smuzhiyun rk_crypto_cbc128_encrypt(ctx, in, out, k, ivec,block);
72*4882a593Smuzhiyun
73*4882a593Smuzhiyun if (r) {
74*4882a593Smuzhiyun memcpy(peniv, in + k + SM4_BLOCK_SIZE, r);
75*4882a593Smuzhiyun
76*4882a593Smuzhiyun rk_crypto_cbc128_encrypt(ctx, in + k, out + k, SM4_BLOCK_SIZE, ivec, block);
77*4882a593Smuzhiyun memcpy(out + length - r, out + k, r);
78*4882a593Smuzhiyun rk_crypto_cbc128_encrypt(ctx, peniv, out + k, SM4_BLOCK_SIZE, ivec, block);
79*4882a593Smuzhiyun }else{
80*4882a593Smuzhiyun //swap last two block
81*4882a593Smuzhiyun memcpy(peniv, out + length - SM4_BLOCK_SIZE, SM4_BLOCK_SIZE);
82*4882a593Smuzhiyun memcpy(out + length - SM4_BLOCK_SIZE, out + length - 2*SM4_BLOCK_SIZE, SM4_BLOCK_SIZE);
83*4882a593Smuzhiyun memcpy(out + length - 2*SM4_BLOCK_SIZE, peniv, SM4_BLOCK_SIZE);
84*4882a593Smuzhiyun }
85*4882a593Smuzhiyun }else{
86*4882a593Smuzhiyun unsigned int i;
87*4882a593Smuzhiyun unsigned char *pout_tmp = NULL;
88*4882a593Smuzhiyun unsigned char tmp1[SM4_BLOCK_SIZE], tmp2[SM4_BLOCK_SIZE];
89*4882a593Smuzhiyun
90*4882a593Smuzhiyun memset(tmp1, 0x00, sizeof(tmp1));
91*4882a593Smuzhiyun memset(tmp2, 0x00, sizeof(tmp2));
92*4882a593Smuzhiyun
93*4882a593Smuzhiyun if(r == 0){
94*4882a593Smuzhiyun rk_crypto_cbc128_decrypt(ctx, in, out, k-2*SM4_BLOCK_SIZE, ivec, block);
95*4882a593Smuzhiyun
96*4882a593Smuzhiyun //swap last two block
97*4882a593Smuzhiyun rk_crypto_cbc128_decrypt(ctx, in + length - SM4_BLOCK_SIZE, out + length - 2*SM4_BLOCK_SIZE,
98*4882a593Smuzhiyun SM4_BLOCK_SIZE, ivec, block);
99*4882a593Smuzhiyun rk_crypto_cbc128_decrypt(ctx, in + length - 2*SM4_BLOCK_SIZE, out + length - SM4_BLOCK_SIZE,
100*4882a593Smuzhiyun SM4_BLOCK_SIZE, ivec, block);
101*4882a593Smuzhiyun }else{
102*4882a593Smuzhiyun rk_crypto_cbc128_decrypt(ctx, in, out, k, ivec, block);
103*4882a593Smuzhiyun (*block)(in + k, tmp1, ctx);
104*4882a593Smuzhiyun
105*4882a593Smuzhiyun memcpy(tmp2, in + k + SM4_BLOCK_SIZE, r);
106*4882a593Smuzhiyun memcpy(tmp2+r, tmp1+r, SM4_BLOCK_SIZE-r);
107*4882a593Smuzhiyun
108*4882a593Smuzhiyun //get last one plain text
109*4882a593Smuzhiyun pout_tmp = out + k + SM4_BLOCK_SIZE;
110*4882a593Smuzhiyun for(i=0; i<SM4_BLOCK_SIZE; i++,pout_tmp++)
111*4882a593Smuzhiyun *pout_tmp = tmp1[i] ^ tmp2[i];
112*4882a593Smuzhiyun
113*4882a593Smuzhiyun (*block)(tmp2, tmp2, ctx);
114*4882a593Smuzhiyun
115*4882a593Smuzhiyun //get sencond to last plain text
116*4882a593Smuzhiyun pout_tmp = out + k;
117*4882a593Smuzhiyun for(i=0; i<SM4_BLOCK_SIZE; i++,pout_tmp++)
118*4882a593Smuzhiyun *pout_tmp = tmp2[i] ^ ivec[i];
119*4882a593Smuzhiyun
120*4882a593Smuzhiyun }
121*4882a593Smuzhiyun }
122*4882a593Smuzhiyun
123*4882a593Smuzhiyun return 0;
124*4882a593Smuzhiyun }
125*4882a593Smuzhiyun
126*4882a593Smuzhiyun
rk_sm4_cts_encrypt(const unsigned char * in,unsigned char * out,unsigned long length,const unsigned char * key,const int key_len,unsigned char * ivec,const int enc)127*4882a593Smuzhiyun int rk_sm4_cts_encrypt(const unsigned char *in, unsigned char *out,
128*4882a593Smuzhiyun unsigned long length, const unsigned char *key, const int key_len,
129*4882a593Smuzhiyun unsigned char *ivec, const int enc)
130*4882a593Smuzhiyun {
131*4882a593Smuzhiyun sm4_context ctx;
132*4882a593Smuzhiyun
133*4882a593Smuzhiyun if (in == NULL || out ==NULL || key == NULL)
134*4882a593Smuzhiyun return -1;
135*4882a593Smuzhiyun
136*4882a593Smuzhiyun if (key_len != 16)
137*4882a593Smuzhiyun return -2;
138*4882a593Smuzhiyun
139*4882a593Smuzhiyun if(length <= SM4_BLOCK_SIZE)
140*4882a593Smuzhiyun return -3;
141*4882a593Smuzhiyun
142*4882a593Smuzhiyun if (enc) {
143*4882a593Smuzhiyun rk_sm4_setkey_enc(&ctx, key);
144*4882a593Smuzhiyun } else {
145*4882a593Smuzhiyun rk_sm4_setkey_dec(&ctx, key);
146*4882a593Smuzhiyun }
147*4882a593Smuzhiyun
148*4882a593Smuzhiyun rk_crypto_cts_encrypt((void*)(&ctx), in, out, length, ivec, enc, rk_rk_sm4_crypt_ecb);
149*4882a593Smuzhiyun
150*4882a593Smuzhiyun return 0;
151*4882a593Smuzhiyun }
152*4882a593Smuzhiyun
153*4882a593Smuzhiyun
154