Mercurial > dropbear
comparison libtomcrypt/src/mac/omac/omac_init.c @ 399:a707e6148060
merge of '5fdf69ca60d1683cdd9f4c2595134bed26394834'
and '6b61c50f4cf888bea302ac8fcf5dbb573b443251'
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Sat, 03 Feb 2007 08:20:34 +0000 |
parents | 0cbe8f6dbf9e |
children | f849a5ca2efc |
comparison
equal
deleted
inserted
replaced
394:17d097fc111c | 399:a707e6148060 |
---|---|
1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis | |
2 * | |
3 * LibTomCrypt is a library that provides various cryptographic | |
4 * algorithms in a highly modular and flexible manner. | |
5 * | |
6 * The library is free for all purposes without any express | |
7 * guarantee it works. | |
8 * | |
9 * Tom St Denis, [email protected], http://libtomcrypt.com | |
10 */ | |
11 #include "tomcrypt.h" | |
12 | |
13 /** | |
14 @file omac_init.c | |
15 OMAC1 support, initialize state, by Tom St Denis | |
16 */ | |
17 | |
18 | |
19 #ifdef LTC_OMAC | |
20 | |
21 /** | |
22 Initialize an OMAC state | |
23 @param omac The OMAC state to initialize | |
24 @param cipher The index of the desired cipher | |
25 @param key The secret key | |
26 @param keylen The length of the secret key (octets) | |
27 @return CRYPT_OK if successful | |
28 */ | |
29 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen) | |
30 { | |
31 int err, x, y, mask, msb, len; | |
32 | |
33 LTC_ARGCHK(omac != NULL); | |
34 LTC_ARGCHK(key != NULL); | |
35 | |
36 /* schedule the key */ | |
37 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { | |
38 return err; | |
39 } | |
40 | |
41 #ifdef LTC_FAST | |
42 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { | |
43 return CRYPT_INVALID_ARG; | |
44 } | |
45 #endif | |
46 | |
47 /* now setup the system */ | |
48 switch (cipher_descriptor[cipher].block_length) { | |
49 case 8: mask = 0x1B; | |
50 len = 8; | |
51 break; | |
52 case 16: mask = 0x87; | |
53 len = 16; | |
54 break; | |
55 default: return CRYPT_INVALID_ARG; | |
56 } | |
57 | |
58 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &omac->key)) != CRYPT_OK) { | |
59 return err; | |
60 } | |
61 | |
62 /* ok now we need Lu and Lu^2 [calc one from the other] */ | |
63 | |
64 /* first calc L which is Ek(0) */ | |
65 zeromem(omac->Lu[0], cipher_descriptor[cipher].block_length); | |
66 if ((err = cipher_descriptor[cipher].ecb_encrypt(omac->Lu[0], omac->Lu[0], &omac->key)) != CRYPT_OK) { | |
67 return err; | |
68 } | |
69 | |
70 /* now do the mults, whoopy! */ | |
71 for (x = 0; x < 2; x++) { | |
72 /* if msb(L * u^(x+1)) = 0 then just shift, otherwise shift and xor constant mask */ | |
73 msb = omac->Lu[x][0] >> 7; | |
74 | |
75 /* shift left */ | |
76 for (y = 0; y < (len - 1); y++) { | |
77 omac->Lu[x][y] = ((omac->Lu[x][y] << 1) | (omac->Lu[x][y+1] >> 7)) & 255; | |
78 } | |
79 omac->Lu[x][len - 1] = ((omac->Lu[x][len - 1] << 1) ^ (msb ? mask : 0)) & 255; | |
80 | |
81 /* copy up as require */ | |
82 if (x == 0) { | |
83 XMEMCPY(omac->Lu[1], omac->Lu[0], sizeof(omac->Lu[0])); | |
84 } | |
85 } | |
86 | |
87 /* setup state */ | |
88 omac->cipher_idx = cipher; | |
89 omac->buflen = 0; | |
90 omac->blklen = len; | |
91 zeromem(omac->prev, sizeof(omac->prev)); | |
92 zeromem(omac->block, sizeof(omac->block)); | |
93 | |
94 return CRYPT_OK; | |
95 } | |
96 | |
97 #endif | |
98 | |
99 /* $Source: /cvs/libtom/libtomcrypt/src/mac/omac/omac_init.c,v $ */ | |
100 /* $Revision: 1.10 $ */ | |
101 /* $Date: 2006/11/03 00:39:49 $ */ |