File: cbc_decrypt.c

package info (click to toggle)
dropbear 0.45-2sarge0
  • links: PTS
  • area: main
  • in suites: sarge
  • size: 6,248 kB
  • ctags: 4,782
  • sloc: ansic: 53,626; sh: 2,703; makefile: 510; perl: 427; asm: 30
file content (57 lines) | stat: -rw-r--r-- 1,514 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
 *
 * LibTomCrypt is a library that provides various cryptographic
 * algorithms in a highly modular and flexible manner.
 *
 * The library is free for all purposes without any express
 * guarantee it works.
 *
 * Tom St Denis, tomstdenis@iahu.ca, http://libtomcrypt.org
 */
#include "mycrypt.h"

#ifdef CBC

int cbc_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_CBC *cbc)
{
   int x, err;
   unsigned char tmp[MAXBLOCKSIZE], tmp2[MAXBLOCKSIZE];

   _ARGCHK(pt != NULL);
   _ARGCHK(ct != NULL);
   _ARGCHK(cbc != NULL);

   /* decrypt the block from ct into tmp */
   if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) {
       return err;
   }
   _ARGCHK(cipher_descriptor[cbc->cipher].ecb_decrypt != NULL);
      
   /* is blocklen valid? */
   if (cbc->blocklen < 0 || cbc->blocklen > (int)sizeof(cbc->IV)) {
      return CRYPT_INVALID_ARG;
   } 

   /* decrypt and xor IV against the plaintext of the previous step */
   cipher_descriptor[cbc->cipher].ecb_decrypt(ct, tmp, &cbc->key);
   for (x = 0; x < cbc->blocklen; x++) { 
       /* copy CT in case ct == pt */
       tmp2[x] = ct[x]; 

       /* actually decrypt the byte */
       pt[x] = tmp[x] ^ cbc->IV[x]; 
   }

   /* replace IV with this current ciphertext */ 
   for (x = 0; x < cbc->blocklen; x++) {
       cbc->IV[x] = tmp2[x];
   }
   #ifdef CLEAN_STACK
      zeromem(tmp, sizeof(tmp));
      zeromem(tmp2, sizeof(tmp2));
   #endif
   return CRYPT_OK;
}

#endif