mirror of
https://github.com/emmansun/gmsm.git
synced 2025-04-25 03:36:18 +08:00
104 lines
2.4 KiB
Go
104 lines
2.4 KiB
Go
//go:build (amd64 && !purego) || (arm64 && !purego)
|
|
// +build amd64,!purego arm64,!purego
|
|
|
|
package sm4
|
|
|
|
import (
|
|
"crypto/cipher"
|
|
|
|
"github.com/emmansun/gmsm/internal/alias"
|
|
)
|
|
|
|
// Assert that sm4CipherAsm implements the cbcEncAble and cbcDecAble interfaces.
|
|
var _ cbcEncAble = (*sm4CipherAsm)(nil)
|
|
var _ cbcDecAble = (*sm4CipherAsm)(nil)
|
|
|
|
const cbcEncrypt = 1
|
|
const cbcDecrypt = 0
|
|
|
|
type cbc struct {
|
|
b *sm4CipherAsm
|
|
iv []byte
|
|
tmp []byte
|
|
enc int
|
|
}
|
|
|
|
func (b *sm4CipherAsm) NewCBCEncrypter(iv []byte) cipher.BlockMode {
|
|
var c cbc
|
|
c.b = b
|
|
c.enc = cbcEncrypt
|
|
c.iv = make([]byte, BlockSize)
|
|
c.tmp = make([]byte, BlockSize)
|
|
copy(c.iv, iv)
|
|
return &c
|
|
}
|
|
|
|
func (b *sm4CipherAsm) NewCBCDecrypter(iv []byte) cipher.BlockMode {
|
|
var c cbc
|
|
c.b = b
|
|
c.enc = cbcDecrypt
|
|
c.iv = make([]byte, BlockSize)
|
|
c.tmp = make([]byte, BlockSize)
|
|
copy(c.iv, iv)
|
|
return &c
|
|
}
|
|
|
|
func (x *cbc) BlockSize() int { return BlockSize }
|
|
|
|
//go:noescape
|
|
func encryptBlocksChain(xk *uint32, dst, src []byte, iv *byte)
|
|
|
|
//go:noescape
|
|
func decryptBlocksChain(xk *uint32, dst, src []byte, iv *byte)
|
|
|
|
func (x *cbc) CryptBlocks(dst, src []byte) {
|
|
if len(src)%BlockSize != 0 {
|
|
panic("cipher: input not full blocks")
|
|
}
|
|
if len(dst) < len(src) {
|
|
panic("cipher: output smaller than input")
|
|
}
|
|
if alias.InexactOverlap(dst[:len(src)], src) {
|
|
panic("cipher: invalid buffer overlap")
|
|
}
|
|
if len(src) == 0 {
|
|
return
|
|
}
|
|
if x.enc == cbcEncrypt {
|
|
encryptBlocksChain(&x.b.enc[0], dst, src, &x.iv[0])
|
|
return
|
|
}
|
|
// For each block, we need to xor the decrypted data with the previous block's ciphertext (the iv).
|
|
// To avoid making a copy each time, we loop over the blocks BACKWARDS.
|
|
end := len(src)
|
|
// Copy the last block of ciphertext in preparation as the new iv.
|
|
copy(x.tmp, src[end-BlockSize:end])
|
|
|
|
start := end - x.b.blocksSize
|
|
var temp []byte = make([]byte, x.b.blocksSize)
|
|
var batchSrc []byte = make([]byte, x.b.blocksSize+BlockSize)
|
|
|
|
decKeyPtr := &x.b.dec[0]
|
|
for start > 0 {
|
|
decryptBlocksChain(decKeyPtr, dst[start:end], src[start:end], &src[start-BlockSize])
|
|
end = start
|
|
start -= x.b.blocksSize
|
|
}
|
|
|
|
// Handle remain first blocks
|
|
copy(batchSrc, x.iv)
|
|
copy(batchSrc[BlockSize:], src[:end])
|
|
decryptBlocksChain(decKeyPtr, temp, batchSrc[BlockSize:], &batchSrc[0])
|
|
copy(dst, temp[:end])
|
|
|
|
// Set the new iv to the first block we copied earlier.
|
|
x.iv, x.tmp = x.tmp, x.iv
|
|
}
|
|
|
|
func (x *cbc) SetIV(iv []byte) {
|
|
if len(iv) != BlockSize {
|
|
panic("cipher: incorrect length IV")
|
|
}
|
|
copy(x.iv[:], iv)
|
|
}
|