/src/boringssl/crypto/fipsmodule/modes/cfb.c.inc
Line | Count | Source (jump to first uncovered line) |
1 | | /* ==================================================================== |
2 | | * Copyright (c) 2008 The OpenSSL Project. All rights reserved. |
3 | | * |
4 | | * Redistribution and use in source and binary forms, with or without |
5 | | * modification, are permitted provided that the following conditions |
6 | | * are met: |
7 | | * |
8 | | * 1. Redistributions of source code must retain the above copyright |
9 | | * notice, this list of conditions and the following disclaimer. |
10 | | * |
11 | | * 2. Redistributions in binary form must reproduce the above copyright |
12 | | * notice, this list of conditions and the following disclaimer in |
13 | | * the documentation and/or other materials provided with the |
14 | | * distribution. |
15 | | * |
16 | | * 3. All advertising materials mentioning features or use of this |
17 | | * software must display the following acknowledgment: |
18 | | * "This product includes software developed by the OpenSSL Project |
19 | | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" |
20 | | * |
21 | | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
22 | | * endorse or promote products derived from this software without |
23 | | * prior written permission. For written permission, please contact |
24 | | * openssl-core@openssl.org. |
25 | | * |
26 | | * 5. Products derived from this software may not be called "OpenSSL" |
27 | | * nor may "OpenSSL" appear in their names without prior written |
28 | | * permission of the OpenSSL Project. |
29 | | * |
30 | | * 6. Redistributions of any form whatsoever must retain the following |
31 | | * acknowledgment: |
32 | | * "This product includes software developed by the OpenSSL Project |
33 | | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" |
34 | | * |
35 | | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
36 | | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
37 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
38 | | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
39 | | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
40 | | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
41 | | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
42 | | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
43 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
44 | | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
45 | | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
46 | | * OF THE POSSIBILITY OF SUCH DAMAGE. |
47 | | * ==================================================================== */ |
48 | | |
49 | | #include <assert.h> |
50 | | #include <string.h> |
51 | | |
52 | | #include "internal.h" |
53 | | |
54 | | |
55 | | static_assert(16 % sizeof(size_t) == 0, "block cannot be divided into size_t"); |
56 | | |
57 | | void CRYPTO_cfb128_encrypt(const uint8_t *in, uint8_t *out, size_t len, |
58 | | const AES_KEY *key, uint8_t ivec[16], unsigned *num, |
59 | 0 | int enc, block128_f block) { |
60 | 0 | assert(in && out && key && ivec && num); |
61 | | |
62 | 0 | unsigned n = *num; |
63 | |
|
64 | 0 | if (enc) { |
65 | 0 | while (n && len) { |
66 | 0 | *(out++) = ivec[n] ^= *(in++); |
67 | 0 | --len; |
68 | 0 | n = (n + 1) % 16; |
69 | 0 | } |
70 | 0 | while (len >= 16) { |
71 | 0 | (*block)(ivec, ivec, key); |
72 | 0 | for (; n < 16; n += sizeof(crypto_word_t)) { |
73 | 0 | crypto_word_t tmp = |
74 | 0 | CRYPTO_load_word_le(ivec + n) ^ CRYPTO_load_word_le(in + n); |
75 | 0 | CRYPTO_store_word_le(ivec + n, tmp); |
76 | 0 | CRYPTO_store_word_le(out + n, tmp); |
77 | 0 | } |
78 | 0 | len -= 16; |
79 | 0 | out += 16; |
80 | 0 | in += 16; |
81 | 0 | n = 0; |
82 | 0 | } |
83 | 0 | if (len) { |
84 | 0 | (*block)(ivec, ivec, key); |
85 | 0 | while (len--) { |
86 | 0 | out[n] = ivec[n] ^= in[n]; |
87 | 0 | ++n; |
88 | 0 | } |
89 | 0 | } |
90 | 0 | *num = n; |
91 | 0 | return; |
92 | 0 | } else { |
93 | 0 | while (n && len) { |
94 | 0 | uint8_t c; |
95 | 0 | *(out++) = ivec[n] ^ (c = *(in++)); |
96 | 0 | ivec[n] = c; |
97 | 0 | --len; |
98 | 0 | n = (n + 1) % 16; |
99 | 0 | } |
100 | 0 | while (len >= 16) { |
101 | 0 | (*block)(ivec, ivec, key); |
102 | 0 | for (; n < 16; n += sizeof(crypto_word_t)) { |
103 | 0 | crypto_word_t t = CRYPTO_load_word_le(in + n); |
104 | 0 | CRYPTO_store_word_le(out + n, CRYPTO_load_word_le(ivec + n) ^ t); |
105 | 0 | CRYPTO_store_word_le(ivec + n, t); |
106 | 0 | } |
107 | 0 | len -= 16; |
108 | 0 | out += 16; |
109 | 0 | in += 16; |
110 | 0 | n = 0; |
111 | 0 | } |
112 | 0 | if (len) { |
113 | 0 | (*block)(ivec, ivec, key); |
114 | 0 | while (len--) { |
115 | 0 | uint8_t c; |
116 | 0 | out[n] = ivec[n] ^ (c = in[n]); |
117 | 0 | ivec[n] = c; |
118 | 0 | ++n; |
119 | 0 | } |
120 | 0 | } |
121 | 0 | *num = n; |
122 | 0 | return; |
123 | 0 | } |
124 | 0 | } |
125 | | |
126 | | |
127 | | /* This expects a single block of size nbits for both in and out. Note that |
128 | | it corrupts any extra bits in the last byte of out */ |
129 | | static void cfbr_encrypt_block(const uint8_t *in, uint8_t *out, unsigned nbits, |
130 | | const AES_KEY *key, uint8_t ivec[16], int enc, |
131 | 0 | block128_f block) { |
132 | 0 | int n, rem, num; |
133 | 0 | uint8_t ovec[16 * 2 + 1]; /* +1 because we dererefence (but don't use) one |
134 | | byte off the end */ |
135 | |
|
136 | 0 | if (nbits <= 0 || nbits > 128) { |
137 | 0 | return; |
138 | 0 | } |
139 | | |
140 | | // fill in the first half of the new IV with the current IV |
141 | 0 | OPENSSL_memcpy(ovec, ivec, 16); |
142 | | // construct the new IV |
143 | 0 | (*block)(ivec, ivec, key); |
144 | 0 | num = (nbits + 7) / 8; |
145 | 0 | if (enc) { |
146 | | // encrypt the input |
147 | 0 | for (n = 0; n < num; ++n) { |
148 | 0 | out[n] = (ovec[16 + n] = in[n] ^ ivec[n]); |
149 | 0 | } |
150 | 0 | } else { |
151 | | // decrypt the input |
152 | 0 | for (n = 0; n < num; ++n) { |
153 | 0 | out[n] = (ovec[16 + n] = in[n]) ^ ivec[n]; |
154 | 0 | } |
155 | 0 | } |
156 | | // shift ovec left... |
157 | 0 | rem = nbits % 8; |
158 | 0 | num = nbits / 8; |
159 | 0 | if (rem == 0) { |
160 | 0 | OPENSSL_memcpy(ivec, ovec + num, 16); |
161 | 0 | } else { |
162 | 0 | for (n = 0; n < 16; ++n) { |
163 | 0 | ivec[n] = ovec[n + num] << rem | ovec[n + num + 1] >> (8 - rem); |
164 | 0 | } |
165 | 0 | } |
166 | | |
167 | | // it is not necessary to cleanse ovec, since the IV is not secret |
168 | 0 | } |
169 | | |
170 | | // N.B. This expects the input to be packed, MS bit first |
171 | | void CRYPTO_cfb128_1_encrypt(const uint8_t *in, uint8_t *out, size_t bits, |
172 | | const AES_KEY *key, uint8_t ivec[16], |
173 | | unsigned *num, int enc, block128_f block) { |
174 | | size_t n; |
175 | | uint8_t c[1], d[1]; |
176 | | |
177 | | assert(in && out && key && ivec && num); |
178 | | assert(*num == 0); |
179 | | |
180 | | for (n = 0; n < bits; ++n) { |
181 | | c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0; |
182 | | cfbr_encrypt_block(c, d, 1, key, ivec, enc, block); |
183 | | out[n / 8] = (out[n / 8] & ~(1 << (unsigned int)(7 - n % 8))) | |
184 | | ((d[0] & 0x80) >> (unsigned int)(n % 8)); |
185 | | } |
186 | | } |
187 | | |
188 | | void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out, |
189 | | size_t length, const AES_KEY *key, |
190 | | unsigned char ivec[16], unsigned *num, int enc, |
191 | | block128_f block) { |
192 | | size_t n; |
193 | | |
194 | | assert(in && out && key && ivec && num); |
195 | | assert(*num == 0); |
196 | | |
197 | | for (n = 0; n < length; ++n) { |
198 | | cfbr_encrypt_block(&in[n], &out[n], 8, key, ivec, enc, block); |
199 | | } |
200 | | } |