xref: /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/sm4_ecb.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun #include <stdio.h>
2*4882a593Smuzhiyun #include <stdlib.h>
3*4882a593Smuzhiyun #include <string.h>
4*4882a593Smuzhiyun #include "sm4_core.h"
5*4882a593Smuzhiyun 
rk_crypto_ecb128_encrypt(void * ctx,const unsigned char * in,unsigned int length,unsigned char * out,block128_f block)6*4882a593Smuzhiyun static int rk_crypto_ecb128_encrypt(void *ctx, const unsigned char *in, unsigned int length, unsigned char *out,block128_f block)
7*4882a593Smuzhiyun {
8*4882a593Smuzhiyun 	unsigned int i = 0;
9*4882a593Smuzhiyun 
10*4882a593Smuzhiyun 	for(i=0; i<length/SM4_BLOCK_SIZE; i++){
11*4882a593Smuzhiyun 		(*block)(in+i*SM4_BLOCK_SIZE, out+i*SM4_BLOCK_SIZE, ctx);
12*4882a593Smuzhiyun 	};
13*4882a593Smuzhiyun 	return 0;
14*4882a593Smuzhiyun }
15*4882a593Smuzhiyun 
rk_sm4_ecb_encrypt(const unsigned char * in,unsigned char * out,unsigned int length,const unsigned char * key,const int key_len,const int enc)16*4882a593Smuzhiyun int rk_sm4_ecb_encrypt(const unsigned char *in, unsigned char *out,
17*4882a593Smuzhiyun         unsigned int length, const unsigned char *key, const int key_len,
18*4882a593Smuzhiyun         const int enc)
19*4882a593Smuzhiyun {
20*4882a593Smuzhiyun 	sm4_context  ctx;
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun 	if(key_len != 16)
23*4882a593Smuzhiyun 		return -1;
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun 	if(length%SM4_BLOCK_SIZE || length == 0)
26*4882a593Smuzhiyun 		return -1;
27*4882a593Smuzhiyun 
28*4882a593Smuzhiyun     if (enc) {
29*4882a593Smuzhiyun 		rk_sm4_setkey_enc(&ctx, key);
30*4882a593Smuzhiyun     } else {
31*4882a593Smuzhiyun 		rk_sm4_setkey_dec(&ctx, key);
32*4882a593Smuzhiyun     }
33*4882a593Smuzhiyun 
34*4882a593Smuzhiyun 	rk_crypto_ecb128_encrypt((void*)&ctx, in, length, out, rk_rk_sm4_crypt_ecb);
35*4882a593Smuzhiyun 	return 0;
36*4882a593Smuzhiyun }
37*4882a593Smuzhiyun 
38*4882a593Smuzhiyun 
39