You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
93 lines
2.4 KiB
C
93 lines
2.4 KiB
C
/* gcm-aes192.c
|
|
|
|
Galois counter mode using AES192 as the underlying cipher.
|
|
|
|
Copyright (C) 2011, 2014 Niels Möller
|
|
|
|
This file is part of GNU Nettle.
|
|
|
|
GNU Nettle is free software: you can redistribute it and/or
|
|
modify it under the terms of either:
|
|
|
|
* the GNU Lesser General Public License as published by the Free
|
|
Software Foundation; either version 3 of the License, or (at your
|
|
option) any later version.
|
|
|
|
or
|
|
|
|
* the GNU General Public License as published by the Free
|
|
Software Foundation; either version 2 of the License, or (at your
|
|
option) any later version.
|
|
|
|
or both in parallel, as here.
|
|
|
|
GNU Nettle is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received copies of the GNU General Public License and
|
|
the GNU Lesser General Public License along with this program. If
|
|
not, see http://www.gnu.org/licenses/.
|
|
*/
|
|
|
|
#if HAVE_CONFIG_H
|
|
# include "config.h"
|
|
#endif
|
|
|
|
#include <assert.h>
|
|
|
|
#include "gcm.h"
|
|
#include "gcm-internal.h"
|
|
|
|
void
|
|
gcm_aes192_set_key(struct gcm_aes192_ctx *ctx, const uint8_t *key)
|
|
{
|
|
GCM_SET_KEY(ctx, aes192_set_encrypt_key, aes192_encrypt, key);
|
|
}
|
|
|
|
void
|
|
gcm_aes192_set_iv (struct gcm_aes192_ctx *ctx,
|
|
size_t length, const uint8_t *iv)
|
|
{
|
|
GCM_SET_IV (ctx, length, iv);
|
|
}
|
|
|
|
void
|
|
gcm_aes192_update (struct gcm_aes192_ctx *ctx,
|
|
size_t length, const uint8_t *data)
|
|
{
|
|
GCM_UPDATE (ctx, length, data);
|
|
}
|
|
|
|
void
|
|
gcm_aes192_encrypt(struct gcm_aes192_ctx *ctx,
|
|
size_t length, uint8_t *dst, const uint8_t *src)
|
|
{
|
|
size_t done = _gcm_aes_encrypt ((struct gcm_key *)ctx, _AES192_ROUNDS, length, dst, src);
|
|
ctx->gcm.data_size += done;
|
|
length -= done;
|
|
src += done;
|
|
dst += done;
|
|
GCM_ENCRYPT(ctx, aes192_encrypt, length, dst, src);
|
|
}
|
|
|
|
void
|
|
gcm_aes192_decrypt(struct gcm_aes192_ctx *ctx,
|
|
size_t length, uint8_t *dst, const uint8_t *src)
|
|
{
|
|
size_t done = _gcm_aes_decrypt ((struct gcm_key *)ctx, _AES192_ROUNDS, length, dst, src);
|
|
ctx->gcm.data_size += done;
|
|
length -= done;
|
|
src += done;
|
|
dst += done;
|
|
GCM_DECRYPT(ctx, aes192_encrypt, length, dst, src);
|
|
}
|
|
|
|
void
|
|
gcm_aes192_digest(struct gcm_aes192_ctx *ctx,
|
|
size_t length, uint8_t *digest)
|
|
{
|
|
GCM_DIGEST(ctx, aes192_encrypt, length, digest);
|
|
}
|