• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * This file is part of the openHiTLS project.
3  *
4  * openHiTLS is licensed under the Mulan PSL v2.
5  * You can use this software according to the terms and conditions of the Mulan PSL v2.
6  * You may obtain a copy of Mulan PSL v2 at:
7  *
8  *     http://license.coscl.org.cn/MulanPSL2
9  *
10  * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
11  * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
12  * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
13  * See the Mulan PSL v2 for more details.
14  */
15 
16 #include "hitls_build.h"
17 #if defined(HITLS_CRYPTO_SM4) && defined(HITLS_CRYPTO_CFB)
18 
19 #include "bsl_err_internal.h"
20 #include "crypt_sm4.h"
21 #include "crypt_errno.h"
22 #include "crypt_modes_cfb.h"
23 #include "modes_local.h"
24 #include "securec.h"
25 
MODE_SM4_CFB_Encrypt(MODES_CipherCFBCtx * ctx,const uint8_t * in,uint8_t * out,uint32_t len)26 int32_t MODE_SM4_CFB_Encrypt(MODES_CipherCFBCtx *ctx, const uint8_t *in, uint8_t *out, uint32_t len)
27 {
28     if (ctx == NULL || in == NULL || out == NULL) {
29         BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
30         return CRYPT_NULL_INPUT;
31     }
32     if (ctx->feedbackBits == 128) { // feedbackBits value of 128 has assembly optimizations
33         return CRYPT_SM4_CFB_Encrypt(ctx->modeCtx.ciphCtx, in, out, len, ctx->modeCtx.iv, &ctx->modeCtx.offset);
34     } else { // no assembly optimization
35         return MODES_CFB_Encrypt(ctx, in, out, len);
36     }
37 }
38 
MODE_SM4_CFB_Decrypt(MODES_CipherCFBCtx * ctx,const uint8_t * in,uint8_t * out,uint32_t len)39 int32_t MODE_SM4_CFB_Decrypt(MODES_CipherCFBCtx *ctx, const uint8_t *in, uint8_t *out, uint32_t len)
40 {
41     if (ctx == NULL || in == NULL || out == NULL) {
42         BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
43         return CRYPT_NULL_INPUT;
44     }
45     if (ctx->feedbackBits == 128) { // feedbackBits value of 128 has assembly optimizations
46         return CRYPT_SM4_CFB_Decrypt(ctx->modeCtx.ciphCtx, in, out, len, ctx->modeCtx.iv, &ctx->modeCtx.offset);
47     } else { // no assembly optimization
48         return MODES_CFB_Decrypt(ctx, in, out, len);
49     }
50 }
51 
SM4_CFB_InitCtx(MODES_CFB_Ctx * modeCtx,const uint8_t * key,uint32_t keyLen,const uint8_t * iv,uint32_t ivLen,bool enc)52 int32_t SM4_CFB_InitCtx(MODES_CFB_Ctx *modeCtx, const uint8_t *key, uint32_t keyLen, const uint8_t *iv,
53     uint32_t ivLen, bool enc)
54 {
55     int32_t ret;
56     if (ivLen != modeCtx->cfbCtx.modeCtx.blockSize) {
57         BSL_ERR_PUSH_ERROR(CRYPT_MODES_IVLEN_ERROR);
58         return CRYPT_MODES_IVLEN_ERROR;
59     }
60 
61     ret = CRYPT_SM4_SetEncryptKey(modeCtx->cfbCtx.modeCtx.ciphCtx, key, keyLen);
62     if (ret != CRYPT_SUCCESS) {
63         return ret;
64     }
65     (void)memcpy_s(modeCtx->cfbCtx.modeCtx.iv, MODES_MAX_IV_LENGTH, iv, ivLen);
66     modeCtx->enc = enc;
67     return ret;
68 }
69 
SM4_CFB_Update(MODES_CFB_Ctx * modeCtx,const uint8_t * in,uint32_t inLen,uint8_t * out,uint32_t * outLen)70 int32_t SM4_CFB_Update(MODES_CFB_Ctx *modeCtx, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen)
71 {
72     return MODES_CipherStreamProcess(modeCtx->enc ? MODE_SM4_CFB_Encrypt : MODE_SM4_CFB_Decrypt, &modeCtx->cfbCtx,
73         in, inLen, out, outLen);
74 }
75 #endif