1 /*
2 * This file is part of the openHiTLS project.
3 *
4 * openHiTLS is licensed under the Mulan PSL v2.
5 * You can use this software according to the terms and conditions of the Mulan PSL v2.
6 * You may obtain a copy of Mulan PSL v2 at:
7 *
8 * http://license.coscl.org.cn/MulanPSL2
9 *
10 * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
11 * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
12 * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
13 * See the Mulan PSL v2 for more details.
14 */
15
16 #include "hitls_build.h"
17 #if defined(HITLS_CRYPTO_SM4) && defined(HITLS_CRYPTO_CFB)
18
19 #include "bsl_err_internal.h"
20 #include "crypt_sm4.h"
21 #include "crypt_errno.h"
22 #include "crypt_modes_cfb.h"
23 #include "modes_local.h"
24 #include "securec.h"
25
MODE_SM4_CFB_Encrypt(MODES_CipherCFBCtx * ctx,const uint8_t * in,uint8_t * out,uint32_t len)26 int32_t MODE_SM4_CFB_Encrypt(MODES_CipherCFBCtx *ctx, const uint8_t *in, uint8_t *out, uint32_t len)
27 {
28 if (ctx == NULL || in == NULL || out == NULL) {
29 BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
30 return CRYPT_NULL_INPUT;
31 }
32 if (ctx->feedbackBits == 128) { // feedbackBits value of 128 has assembly optimizations
33 return CRYPT_SM4_CFB_Encrypt(ctx->modeCtx.ciphCtx, in, out, len, ctx->modeCtx.iv, &ctx->modeCtx.offset);
34 } else { // no assembly optimization
35 return MODES_CFB_Encrypt(ctx, in, out, len);
36 }
37 }
38
MODE_SM4_CFB_Decrypt(MODES_CipherCFBCtx * ctx,const uint8_t * in,uint8_t * out,uint32_t len)39 int32_t MODE_SM4_CFB_Decrypt(MODES_CipherCFBCtx *ctx, const uint8_t *in, uint8_t *out, uint32_t len)
40 {
41 if (ctx == NULL || in == NULL || out == NULL) {
42 BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
43 return CRYPT_NULL_INPUT;
44 }
45 if (ctx->feedbackBits == 128) { // feedbackBits value of 128 has assembly optimizations
46 return CRYPT_SM4_CFB_Decrypt(ctx->modeCtx.ciphCtx, in, out, len, ctx->modeCtx.iv, &ctx->modeCtx.offset);
47 } else { // no assembly optimization
48 return MODES_CFB_Decrypt(ctx, in, out, len);
49 }
50 }
51
SM4_CFB_InitCtx(MODES_CFB_Ctx * modeCtx,const uint8_t * key,uint32_t keyLen,const uint8_t * iv,uint32_t ivLen,bool enc)52 int32_t SM4_CFB_InitCtx(MODES_CFB_Ctx *modeCtx, const uint8_t *key, uint32_t keyLen, const uint8_t *iv,
53 uint32_t ivLen, bool enc)
54 {
55 int32_t ret;
56 if (ivLen != modeCtx->cfbCtx.modeCtx.blockSize) {
57 BSL_ERR_PUSH_ERROR(CRYPT_MODES_IVLEN_ERROR);
58 return CRYPT_MODES_IVLEN_ERROR;
59 }
60
61 ret = CRYPT_SM4_SetEncryptKey(modeCtx->cfbCtx.modeCtx.ciphCtx, key, keyLen);
62 if (ret != CRYPT_SUCCESS) {
63 return ret;
64 }
65 (void)memcpy_s(modeCtx->cfbCtx.modeCtx.iv, MODES_MAX_IV_LENGTH, iv, ivLen);
66 modeCtx->enc = enc;
67 return ret;
68 }
69
SM4_CFB_Update(MODES_CFB_Ctx * modeCtx,const uint8_t * in,uint32_t inLen,uint8_t * out,uint32_t * outLen)70 int32_t SM4_CFB_Update(MODES_CFB_Ctx *modeCtx, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen)
71 {
72 return MODES_CipherStreamProcess(modeCtx->enc ? MODE_SM4_CFB_Encrypt : MODE_SM4_CFB_Decrypt, &modeCtx->cfbCtx,
73 in, inLen, out, outLen);
74 }
75 #endif