comparison libtomcrypt/src/modes/f8/f8_start.c @ 382:0cbe8f6dbf9e

propagate from branch 'au.asn.ucc.matt.ltc.dropbear' (head 2af22fb4e878750b88f80f90d439b316d229796f) to branch 'au.asn.ucc.matt.dropbear' (head 02c413252c90e9de8e03d91e9939dde3029f5c0a)
author Matt Johnston <matt@ucc.asn.au>
date Thu, 11 Jan 2007 02:41:05 +0000
parents
children f849a5ca2efc
comparison
equal deleted inserted replaced
379:b66a00272a90 382:0cbe8f6dbf9e
1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis
2 *
3 * LibTomCrypt is a library that provides various cryptographic
4 * algorithms in a highly modular and flexible manner.
5 *
6 * The library is free for all purposes without any express
7 * guarantee it works.
8 *
9 * Tom St Denis, [email protected], http://libtomcrypt.com
10 */
11 #include "tomcrypt.h"
12
13 /**
14 @file f8_start.c
15 F8 implementation, start chain, Tom St Denis
16 */
17
18
19 #ifdef LTC_F8_MODE
20
21 /**
22 Initialize an F8 context
23 @param cipher The index of the cipher desired
24 @param IV The initial vector
25 @param key The secret key
26 @param keylen The length of the secret key (octets)
27 @param salt_key The salting key for the IV
28 @param skeylen The length of the salting key (octets)
29 @param num_rounds Number of rounds in the cipher desired (0 for default)
30 @param f8 The F8 state to initialize
31 @return CRYPT_OK if successful
32 */
33 int f8_start( int cipher, const unsigned char *IV,
34 const unsigned char *key, int keylen,
35 const unsigned char *salt_key, int skeylen,
36 int num_rounds, symmetric_F8 *f8)
37 {
38 int x, err;
39 unsigned char tkey[MAXBLOCKSIZE];
40
41 LTC_ARGCHK(IV != NULL);
42 LTC_ARGCHK(key != NULL);
43 LTC_ARGCHK(salt_key != NULL);
44 LTC_ARGCHK(f8 != NULL);
45
46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
47 return err;
48 }
49
50 #ifdef LTC_FAST
51 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) {
52 return CRYPT_INVALID_ARG;
53 }
54 #endif
55
56 /* copy details */
57 f8->blockcnt = 0;
58 f8->cipher = cipher;
59 f8->blocklen = cipher_descriptor[cipher].block_length;
60 f8->padlen = f8->blocklen;
61
62 /* now get key ^ salt_key [extend salt_ket with 0x55 as required to match length] */
63 zeromem(tkey, sizeof(tkey));
64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) {
65 tkey[x] = key[x];
66 }
67 for (x = 0; x < skeylen && x < (int)sizeof(tkey); x++) {
68 tkey[x] ^= salt_key[x];
69 }
70 for (; x < keylen && x < (int)sizeof(tkey); x++) {
71 tkey[x] ^= 0x55;
72 }
73
74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */
75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) {
76 return err;
77 }
78
79 /* encrypt IV */
80 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(IV, f8->MIV, &f8->key)) != CRYPT_OK) {
81 cipher_descriptor[f8->cipher].done(&f8->key);
82 return err;
83 }
84 zeromem(tkey, sizeof(tkey));
85 zeromem(f8->IV, sizeof(f8->IV));
86
87 /* terminate this cipher */
88 cipher_descriptor[f8->cipher].done(&f8->key);
89
90 /* init the cipher */
91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key);
92 }
93
94 #endif
95
96 /* $Source: /cvs/libtom/libtomcrypt/src/modes/f8/f8_start.c,v $ */
97 /* $Revision: 1.7 $ */
98 /* $Date: 2006/11/05 01:36:43 $ */