1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
use crate::{
traits::{BlockMode, IvState},
utils::{xor, Block, ParBlocks},
};
use block_padding::Padding;
use cipher::{
generic_array::{typenum::Unsigned, GenericArray},
BlockCipher, BlockEncrypt,
};
use core::{marker::PhantomData, ptr};
#[derive(Clone)]
pub struct Cfb<C: BlockCipher + BlockEncrypt, P: Padding> {
cipher: C,
iv: GenericArray<u8, C::BlockSize>,
_p: PhantomData<P>,
}
impl<C, P> BlockMode<C, P> for Cfb<C, P>
where
C: BlockCipher + BlockEncrypt,
P: Padding,
{
type IvSize = C::BlockSize;
fn new(cipher: C, iv: &Block<C>) -> Self {
Self {
cipher,
iv: iv.clone(),
_p: Default::default(),
}
}
fn encrypt_blocks(&mut self, blocks: &mut [Block<C>]) {
for block in blocks {
self.cipher.encrypt_block(&mut self.iv);
xor_set1(block, self.iv.as_mut_slice());
}
}
fn decrypt_blocks(&mut self, mut blocks: &mut [Block<C>]) {
let pb = C::ParBlocks::to_usize();
if blocks.len() > pb {
#[allow(unsafe_code)]
let mut par_iv = read_par_block::<C>(&blocks[..pb]);
let (b, r) = { blocks }.split_at_mut(1);
blocks = r;
self.cipher.encrypt_block(&mut self.iv);
xor(&mut b[0], &self.iv);
self.iv = blocks[blocks.len() - (blocks.len() % pb) - 1].clone();
while blocks.len() >= 2 * pb {
let next_par_iv = read_par_block::<C>(&blocks[pb - 1..2 * pb - 1]);
self.cipher.encrypt_blocks(&mut par_iv);
let (par_block, r) = { blocks }.split_at_mut(pb);
blocks = r;
for (a, b) in par_block.iter_mut().zip(par_iv.iter()) {
xor(a, b)
}
par_iv = next_par_iv;
}
self.cipher.encrypt_blocks(&mut par_iv);
let (par_block, r) = { blocks }.split_at_mut(pb);
blocks = r;
for (a, b) in par_block.iter_mut().zip(par_iv[..pb].iter()) {
xor(a, b)
}
}
for block in blocks {
self.cipher.encrypt_block(&mut self.iv);
xor_set2(block, self.iv.as_mut_slice());
}
}
}
impl<C, P> IvState<C, P> for Cfb<C, P>
where
C: BlockCipher + BlockEncrypt,
P: Padding,
{
fn iv_state(&self) -> GenericArray<u8, Self::IvSize> {
self.iv.clone()
}
}
#[inline(always)]
fn read_par_block<C: BlockCipher>(blocks: &[Block<C>]) -> ParBlocks<C> {
assert!(blocks.len() >= C::ParBlocks::to_usize());
#[allow(unsafe_code)]
unsafe {
ptr::read(blocks.as_ptr() as *const ParBlocks<C>)
}
}
#[inline(always)]
fn xor_set1(buf1: &mut [u8], buf2: &mut [u8]) {
for (a, b) in buf1.iter_mut().zip(buf2) {
let t = *a ^ *b;
*a = t;
*b = t;
}
}
#[inline(always)]
fn xor_set2(buf1: &mut [u8], buf2: &mut [u8]) {
for (a, b) in buf1.iter_mut().zip(buf2) {
let t = *a;
*a ^= *b;
*b = t;
}
}