comparison eax_init.c @ 0:d7da3b1e1540 libtomcrypt

put back the 0.95 makefile which was inadvertently merged over
author Matt Johnston <matt@ucc.asn.au>
date Mon, 31 May 2004 18:21:40 +0000
parents
children 5d99163f7e32
comparison
equal deleted inserted replaced
-1:000000000000 0:d7da3b1e1540
1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis
2 *
3 * LibTomCrypt is a library that provides various cryptographic
4 * algorithms in a highly modular and flexible manner.
5 *
6 * The library is free for all purposes without any express
7 * guarantee it works.
8 *
9 * Tom St Denis, [email protected], http://libtomcrypt.org
10 */
11
12 /* EAX Implementation by Tom St Denis */
13 #include "mycrypt.h"
14
15 #ifdef EAX_MODE
16
17 int eax_init(eax_state *eax, int cipher, const unsigned char *key, unsigned long keylen,
18 const unsigned char *nonce, unsigned long noncelen,
19 const unsigned char *header, unsigned long headerlen)
20 {
21 unsigned char buf[MAXBLOCKSIZE];
22 int err, blklen;
23 omac_state omac;
24 unsigned long len;
25
26
27 _ARGCHK(eax != NULL);
28 _ARGCHK(key != NULL);
29 _ARGCHK(nonce != NULL);
30 if (headerlen > 0) {
31 _ARGCHK(header != NULL);
32 }
33
34 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
35 return err;
36 }
37 blklen = cipher_descriptor[cipher].block_length;
38
39 /* N = OMAC_0K(nonce) */
40 zeromem(buf, sizeof(buf));
41 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) {
42 return err;
43 }
44
45 /* omac the [0]_n */
46 if ((err = omac_process(&omac, buf, blklen)) != CRYPT_OK) {
47 return err;
48 }
49 /* omac the nonce */
50 if ((err = omac_process(&omac, nonce, noncelen)) != CRYPT_OK) {
51 return err;
52 }
53 /* store result */
54 len = sizeof(eax->N);
55 if ((err = omac_done(&omac, eax->N, &len)) != CRYPT_OK) {
56 return err;
57 }
58
59 /* H = OMAC_1K(header) */
60 zeromem(buf, sizeof(buf));
61 buf[blklen - 1] = 1;
62
63 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) {
64 return err;
65 }
66
67 /* omac the [1]_n */
68 if ((err = omac_process(&eax->headeromac, buf, blklen)) != CRYPT_OK) {
69 return err;
70 }
71 /* omac the header */
72 if (headerlen != 0) {
73 if ((err = omac_process(&eax->headeromac, header, headerlen)) != CRYPT_OK) {
74 return err;
75 }
76 }
77
78 /* note we don't finish the headeromac, this allows us to add more header later */
79
80 /* setup the CTR mode */
81 if ((err = ctr_start(cipher, eax->N, key, keylen, 0, &eax->ctr)) != CRYPT_OK) {
82 return err;
83 }
84 /* use big-endian counter */
85 eax->ctr.mode = 1;
86
87 /* setup the OMAC for the ciphertext */
88 if ((err = omac_init(&eax->ctomac, cipher, key, keylen)) != CRYPT_OK) {
89 return err;
90 }
91
92 /* omac [2]_n */
93 zeromem(buf, sizeof(buf));
94 buf[blklen-1] = 2;
95 if ((err = omac_process(&eax->ctomac, buf, blklen)) != CRYPT_OK) {
96 return err;
97 }
98
99 #ifdef CLEAN_STACK
100 zeromem(buf, sizeof(buf));
101 zeromem(&omac, sizeof(omac));
102 #endif
103 return CRYPT_OK;
104 }
105
106 #endif