mirror of
				https://github.com/ossrs/srs.git
				synced 2025-03-09 15:49:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			330 lines
		
	
	
	
		
			8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			330 lines
		
	
	
	
		
			8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the OpenSSL license (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include <openssl/crypto.h>
 | |
| #include "modes_local.h"
 | |
| #include <string.h>
 | |
| 
 | |
| /*
 | |
|  * Trouble with Ciphertext Stealing, CTS, mode is that there is no
 | |
|  * common official specification, but couple of cipher/application
 | |
|  * specific ones: RFC2040 and RFC3962. Then there is 'Proposal to
 | |
|  * Extend CBC Mode By "Ciphertext Stealing"' at NIST site, which
 | |
|  * deviates from mentioned RFCs. Most notably it allows input to be
 | |
|  * of block length and it doesn't flip the order of the last two
 | |
|  * blocks. CTS is being discussed even in ECB context, but it's not
 | |
|  * adopted for any known application. This implementation provides
 | |
|  * two interfaces: one compliant with above mentioned RFCs and one
 | |
|  * compliant with the NIST proposal, both extending CBC mode.
 | |
|  */
 | |
| 
 | |
| size_t CRYPTO_cts128_encrypt_block(const unsigned char *in,
 | |
|                                    unsigned char *out, size_t len,
 | |
|                                    const void *key, unsigned char ivec[16],
 | |
|                                    block128_f block)
 | |
| {
 | |
|     size_t residue, n;
 | |
| 
 | |
|     if (len <= 16)
 | |
|         return 0;
 | |
| 
 | |
|     if ((residue = len % 16) == 0)
 | |
|         residue = 16;
 | |
| 
 | |
|     len -= residue;
 | |
| 
 | |
|     CRYPTO_cbc128_encrypt(in, out, len, key, ivec, block);
 | |
| 
 | |
|     in += len;
 | |
|     out += len;
 | |
| 
 | |
|     for (n = 0; n < residue; ++n)
 | |
|         ivec[n] ^= in[n];
 | |
|     (*block) (ivec, ivec, key);
 | |
|     memcpy(out, out - 16, residue);
 | |
|     memcpy(out - 16, ivec, 16);
 | |
| 
 | |
|     return len + residue;
 | |
| }
 | |
| 
 | |
| size_t CRYPTO_nistcts128_encrypt_block(const unsigned char *in,
 | |
|                                        unsigned char *out, size_t len,
 | |
|                                        const void *key,
 | |
|                                        unsigned char ivec[16],
 | |
|                                        block128_f block)
 | |
| {
 | |
|     size_t residue, n;
 | |
| 
 | |
|     if (len < 16)
 | |
|         return 0;
 | |
| 
 | |
|     residue = len % 16;
 | |
| 
 | |
|     len -= residue;
 | |
| 
 | |
|     CRYPTO_cbc128_encrypt(in, out, len, key, ivec, block);
 | |
| 
 | |
|     if (residue == 0)
 | |
|         return len;
 | |
| 
 | |
|     in += len;
 | |
|     out += len;
 | |
| 
 | |
|     for (n = 0; n < residue; ++n)
 | |
|         ivec[n] ^= in[n];
 | |
|     (*block) (ivec, ivec, key);
 | |
|     memcpy(out - 16 + residue, ivec, 16);
 | |
| 
 | |
|     return len + residue;
 | |
| }
 | |
| 
 | |
| size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
 | |
|                              size_t len, const void *key,
 | |
|                              unsigned char ivec[16], cbc128_f cbc)
 | |
| {
 | |
|     size_t residue;
 | |
|     union {
 | |
|         size_t align;
 | |
|         unsigned char c[16];
 | |
|     } tmp;
 | |
| 
 | |
|     if (len <= 16)
 | |
|         return 0;
 | |
| 
 | |
|     if ((residue = len % 16) == 0)
 | |
|         residue = 16;
 | |
| 
 | |
|     len -= residue;
 | |
| 
 | |
|     (*cbc) (in, out, len, key, ivec, 1);
 | |
| 
 | |
|     in += len;
 | |
|     out += len;
 | |
| 
 | |
| #if defined(CBC_HANDLES_TRUNCATED_IO)
 | |
|     memcpy(tmp.c, out - 16, 16);
 | |
|     (*cbc) (in, out - 16, residue, key, ivec, 1);
 | |
|     memcpy(out, tmp.c, residue);
 | |
| #else
 | |
|     memset(tmp.c, 0, sizeof(tmp));
 | |
|     memcpy(tmp.c, in, residue);
 | |
|     memcpy(out, out - 16, residue);
 | |
|     (*cbc) (tmp.c, out - 16, 16, key, ivec, 1);
 | |
| #endif
 | |
|     return len + residue;
 | |
| }
 | |
| 
 | |
| size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
 | |
|                                  size_t len, const void *key,
 | |
|                                  unsigned char ivec[16], cbc128_f cbc)
 | |
| {
 | |
|     size_t residue;
 | |
|     union {
 | |
|         size_t align;
 | |
|         unsigned char c[16];
 | |
|     } tmp;
 | |
| 
 | |
|     if (len < 16)
 | |
|         return 0;
 | |
| 
 | |
|     residue = len % 16;
 | |
| 
 | |
|     len -= residue;
 | |
| 
 | |
|     (*cbc) (in, out, len, key, ivec, 1);
 | |
| 
 | |
|     if (residue == 0)
 | |
|         return len;
 | |
| 
 | |
|     in += len;
 | |
|     out += len;
 | |
| 
 | |
| #if defined(CBC_HANDLES_TRUNCATED_IO)
 | |
|     (*cbc) (in, out - 16 + residue, residue, key, ivec, 1);
 | |
| #else
 | |
|     memset(tmp.c, 0, sizeof(tmp));
 | |
|     memcpy(tmp.c, in, residue);
 | |
|     (*cbc) (tmp.c, out - 16 + residue, 16, key, ivec, 1);
 | |
| #endif
 | |
|     return len + residue;
 | |
| }
 | |
| 
 | |
| size_t CRYPTO_cts128_decrypt_block(const unsigned char *in,
 | |
|                                    unsigned char *out, size_t len,
 | |
|                                    const void *key, unsigned char ivec[16],
 | |
|                                    block128_f block)
 | |
| {
 | |
|     size_t residue, n;
 | |
|     union {
 | |
|         size_t align;
 | |
|         unsigned char c[32];
 | |
|     } tmp;
 | |
| 
 | |
|     if (len <= 16)
 | |
|         return 0;
 | |
| 
 | |
|     if ((residue = len % 16) == 0)
 | |
|         residue = 16;
 | |
| 
 | |
|     len -= 16 + residue;
 | |
| 
 | |
|     if (len) {
 | |
|         CRYPTO_cbc128_decrypt(in, out, len, key, ivec, block);
 | |
|         in += len;
 | |
|         out += len;
 | |
|     }
 | |
| 
 | |
|     (*block) (in, tmp.c + 16, key);
 | |
| 
 | |
|     memcpy(tmp.c, tmp.c + 16, 16);
 | |
|     memcpy(tmp.c, in + 16, residue);
 | |
|     (*block) (tmp.c, tmp.c, key);
 | |
| 
 | |
|     for (n = 0; n < 16; ++n) {
 | |
|         unsigned char c = in[n];
 | |
|         out[n] = tmp.c[n] ^ ivec[n];
 | |
|         ivec[n] = c;
 | |
|     }
 | |
|     for (residue += 16; n < residue; ++n)
 | |
|         out[n] = tmp.c[n] ^ in[n];
 | |
| 
 | |
|     return 16 + len + residue;
 | |
| }
 | |
| 
 | |
| size_t CRYPTO_nistcts128_decrypt_block(const unsigned char *in,
 | |
|                                        unsigned char *out, size_t len,
 | |
|                                        const void *key,
 | |
|                                        unsigned char ivec[16],
 | |
|                                        block128_f block)
 | |
| {
 | |
|     size_t residue, n;
 | |
|     union {
 | |
|         size_t align;
 | |
|         unsigned char c[32];
 | |
|     } tmp;
 | |
| 
 | |
|     if (len < 16)
 | |
|         return 0;
 | |
| 
 | |
|     residue = len % 16;
 | |
| 
 | |
|     if (residue == 0) {
 | |
|         CRYPTO_cbc128_decrypt(in, out, len, key, ivec, block);
 | |
|         return len;
 | |
|     }
 | |
| 
 | |
|     len -= 16 + residue;
 | |
| 
 | |
|     if (len) {
 | |
|         CRYPTO_cbc128_decrypt(in, out, len, key, ivec, block);
 | |
|         in += len;
 | |
|         out += len;
 | |
|     }
 | |
| 
 | |
|     (*block) (in + residue, tmp.c + 16, key);
 | |
| 
 | |
|     memcpy(tmp.c, tmp.c + 16, 16);
 | |
|     memcpy(tmp.c, in, residue);
 | |
|     (*block) (tmp.c, tmp.c, key);
 | |
| 
 | |
|     for (n = 0; n < 16; ++n) {
 | |
|         unsigned char c = in[n];
 | |
|         out[n] = tmp.c[n] ^ ivec[n];
 | |
|         ivec[n] = in[n + residue];
 | |
|         tmp.c[n] = c;
 | |
|     }
 | |
|     for (residue += 16; n < residue; ++n)
 | |
|         out[n] = tmp.c[n] ^ tmp.c[n - 16];
 | |
| 
 | |
|     return 16 + len + residue;
 | |
| }
 | |
| 
 | |
| size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
 | |
|                              size_t len, const void *key,
 | |
|                              unsigned char ivec[16], cbc128_f cbc)
 | |
| {
 | |
|     size_t residue;
 | |
|     union {
 | |
|         size_t align;
 | |
|         unsigned char c[32];
 | |
|     } tmp;
 | |
| 
 | |
|     if (len <= 16)
 | |
|         return 0;
 | |
| 
 | |
|     if ((residue = len % 16) == 0)
 | |
|         residue = 16;
 | |
| 
 | |
|     len -= 16 + residue;
 | |
| 
 | |
|     if (len) {
 | |
|         (*cbc) (in, out, len, key, ivec, 0);
 | |
|         in += len;
 | |
|         out += len;
 | |
|     }
 | |
| 
 | |
|     memset(tmp.c, 0, sizeof(tmp));
 | |
|     /*
 | |
|      * this places in[16] at &tmp.c[16] and decrypted block at &tmp.c[0]
 | |
|      */
 | |
|     (*cbc) (in, tmp.c, 16, key, tmp.c + 16, 0);
 | |
| 
 | |
|     memcpy(tmp.c, in + 16, residue);
 | |
| #if defined(CBC_HANDLES_TRUNCATED_IO)
 | |
|     (*cbc) (tmp.c, out, 16 + residue, key, ivec, 0);
 | |
| #else
 | |
|     (*cbc) (tmp.c, tmp.c, 32, key, ivec, 0);
 | |
|     memcpy(out, tmp.c, 16 + residue);
 | |
| #endif
 | |
|     return 16 + len + residue;
 | |
| }
 | |
| 
 | |
| size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
 | |
|                                  size_t len, const void *key,
 | |
|                                  unsigned char ivec[16], cbc128_f cbc)
 | |
| {
 | |
|     size_t residue;
 | |
|     union {
 | |
|         size_t align;
 | |
|         unsigned char c[32];
 | |
|     } tmp;
 | |
| 
 | |
|     if (len < 16)
 | |
|         return 0;
 | |
| 
 | |
|     residue = len % 16;
 | |
| 
 | |
|     if (residue == 0) {
 | |
|         (*cbc) (in, out, len, key, ivec, 0);
 | |
|         return len;
 | |
|     }
 | |
| 
 | |
|     len -= 16 + residue;
 | |
| 
 | |
|     if (len) {
 | |
|         (*cbc) (in, out, len, key, ivec, 0);
 | |
|         in += len;
 | |
|         out += len;
 | |
|     }
 | |
| 
 | |
|     memset(tmp.c, 0, sizeof(tmp));
 | |
|     /*
 | |
|      * this places in[16] at &tmp.c[16] and decrypted block at &tmp.c[0]
 | |
|      */
 | |
|     (*cbc) (in + residue, tmp.c, 16, key, tmp.c + 16, 0);
 | |
| 
 | |
|     memcpy(tmp.c, in, residue);
 | |
| #if defined(CBC_HANDLES_TRUNCATED_IO)
 | |
|     (*cbc) (tmp.c, out, 16 + residue, key, ivec, 0);
 | |
| #else
 | |
|     (*cbc) (tmp.c, tmp.c, 32, key, ivec, 0);
 | |
|     memcpy(out, tmp.c, 16 + residue);
 | |
| #endif
 | |
|     return 16 + len + residue;
 | |
| }
 |