1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119
|
/*
* seccure - Copyright 2006 B. Poettering
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation; either version 2 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
* 02111-1307 USA
*/
/*
* SECCURE Elliptic Curve Crypto Utility for Reliable Encryption
*
* http://point-at-infinity.org/seccure/
*
*
* seccure implements a selection of asymmetric algorithms based on
* elliptic curve cryptography (ECC). See the manpage or the project's
* homepage for further details.
*
* This code links against the GNU gcrypt library "libgcrypt" (which is
* part of the GnuPG project). The code compiles successfully with
* libgcrypt 1.2.2. Use the included Makefile to build the binary.
*
* Compile with -D NOMEMLOCK if your machine doesn't support memory
* locking.
*
* Report bugs to: seccure AT point-at-infinity.org
*
*/
#include <stdlib.h>
#include <gcrypt.h>
#include <assert.h>
#include "aes256ctr.h"
/******************************************************************************/
struct aes256ctr* aes256ctr_init(const char *key)
{
struct aes256ctr *ac;
gcry_error_t err;
if (! (ac = malloc(sizeof(struct aes256ctr))))
return NULL;
err = gcry_cipher_open(&ac->ch, GCRY_CIPHER_AES256, GCRY_CIPHER_MODE_CTR, 0);
if (gcry_err_code(err))
goto error;
err = gcry_cipher_setkey(ac->ch, key, CIPHER_KEY_SIZE);
if (gcry_err_code(err))
goto error;
err = gcry_cipher_setctr(ac->ch, NULL, 0);
if (gcry_err_code(err))
goto error;
ac->idx = CIPHER_BLOCK_SIZE;
return ac;
error:
free(ac);
return NULL;
}
void aes256ctr_enc(struct aes256ctr *ac, char *buf, int len)
{
gcry_error_t err;
int full_blocks;
for(; len && (ac->idx < CIPHER_BLOCK_SIZE); len--)
*buf++ ^= ac->buf[ac->idx++];
full_blocks = (len / CIPHER_BLOCK_SIZE) * CIPHER_BLOCK_SIZE;
err = gcry_cipher_encrypt(ac->ch, buf, full_blocks, NULL, 0);
assert(! gcry_err_code(err));
len -= full_blocks;
buf += full_blocks;
if (len) {
memset(ac->buf, 0, CIPHER_BLOCK_SIZE);
err = gcry_cipher_encrypt(ac->ch, ac->buf, CIPHER_BLOCK_SIZE, NULL, 0);
assert(! gcry_err_code(err));
ac->idx = 0;
for(; len && (ac->idx < CIPHER_BLOCK_SIZE); len--)
*buf++ ^= ac->buf[ac->idx++];
}
}
void aes256ctr_done(struct aes256ctr *ac)
{
gcry_cipher_close(ac->ch);
memset(ac->buf, 0, CIPHER_BLOCK_SIZE);
free(ac);
}
int hmacsha256_init(gcry_md_hd_t *mh, const char *key)
{
gcry_error_t err;
err = gcry_md_open(mh, GCRY_MD_SHA256, GCRY_MD_FLAG_HMAC);
if (gcry_err_code(err))
return 0;
err = gcry_md_setkey(*mh, key, HMAC_KEY_SIZE);
return ! gcry_err_code(err);
}
|