Mercurial > dropbear
comparison libtomcrypt/src/modes/f8/f8_start.c @ 398:59c7938af2bd
merge of '1250b8af44b62d8f4fe0f8d9fc7e7a1cc34e7e1c'
and '7f8670ac3bb975f40967f3979d09d2199b7e90c8'
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Sat, 03 Feb 2007 08:20:30 +0000 |
parents | 0cbe8f6dbf9e |
children | f849a5ca2efc |
comparison
equal
deleted
inserted
replaced
396:e7c1a77d2921 | 398:59c7938af2bd |
---|---|
1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis | |
2 * | |
3 * LibTomCrypt is a library that provides various cryptographic | |
4 * algorithms in a highly modular and flexible manner. | |
5 * | |
6 * The library is free for all purposes without any express | |
7 * guarantee it works. | |
8 * | |
9 * Tom St Denis, [email protected], http://libtomcrypt.com | |
10 */ | |
11 #include "tomcrypt.h" | |
12 | |
13 /** | |
14 @file f8_start.c | |
15 F8 implementation, start chain, Tom St Denis | |
16 */ | |
17 | |
18 | |
19 #ifdef LTC_F8_MODE | |
20 | |
21 /** | |
22 Initialize an F8 context | |
23 @param cipher The index of the cipher desired | |
24 @param IV The initial vector | |
25 @param key The secret key | |
26 @param keylen The length of the secret key (octets) | |
27 @param salt_key The salting key for the IV | |
28 @param skeylen The length of the salting key (octets) | |
29 @param num_rounds Number of rounds in the cipher desired (0 for default) | |
30 @param f8 The F8 state to initialize | |
31 @return CRYPT_OK if successful | |
32 */ | |
33 int f8_start( int cipher, const unsigned char *IV, | |
34 const unsigned char *key, int keylen, | |
35 const unsigned char *salt_key, int skeylen, | |
36 int num_rounds, symmetric_F8 *f8) | |
37 { | |
38 int x, err; | |
39 unsigned char tkey[MAXBLOCKSIZE]; | |
40 | |
41 LTC_ARGCHK(IV != NULL); | |
42 LTC_ARGCHK(key != NULL); | |
43 LTC_ARGCHK(salt_key != NULL); | |
44 LTC_ARGCHK(f8 != NULL); | |
45 | |
46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { | |
47 return err; | |
48 } | |
49 | |
50 #ifdef LTC_FAST | |
51 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { | |
52 return CRYPT_INVALID_ARG; | |
53 } | |
54 #endif | |
55 | |
56 /* copy details */ | |
57 f8->blockcnt = 0; | |
58 f8->cipher = cipher; | |
59 f8->blocklen = cipher_descriptor[cipher].block_length; | |
60 f8->padlen = f8->blocklen; | |
61 | |
62 /* now get key ^ salt_key [extend salt_ket with 0x55 as required to match length] */ | |
63 zeromem(tkey, sizeof(tkey)); | |
64 for (x = 0; x < keylen && x < (int)sizeof(tkey); x++) { | |
65 tkey[x] = key[x]; | |
66 } | |
67 for (x = 0; x < skeylen && x < (int)sizeof(tkey); x++) { | |
68 tkey[x] ^= salt_key[x]; | |
69 } | |
70 for (; x < keylen && x < (int)sizeof(tkey); x++) { | |
71 tkey[x] ^= 0x55; | |
72 } | |
73 | |
74 /* now encrypt with tkey[0..keylen-1] the IV and use that as the IV */ | |
75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { | |
76 return err; | |
77 } | |
78 | |
79 /* encrypt IV */ | |
80 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(IV, f8->MIV, &f8->key)) != CRYPT_OK) { | |
81 cipher_descriptor[f8->cipher].done(&f8->key); | |
82 return err; | |
83 } | |
84 zeromem(tkey, sizeof(tkey)); | |
85 zeromem(f8->IV, sizeof(f8->IV)); | |
86 | |
87 /* terminate this cipher */ | |
88 cipher_descriptor[f8->cipher].done(&f8->key); | |
89 | |
90 /* init the cipher */ | |
91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key); | |
92 } | |
93 | |
94 #endif | |
95 | |
96 /* $Source: /cvs/libtom/libtomcrypt/src/modes/f8/f8_start.c,v $ */ | |
97 /* $Revision: 1.7 $ */ | |
98 /* $Date: 2006/11/05 01:36:43 $ */ |