|
| 1 | +use crate::{ |
| 2 | + traits::BlockMode, |
| 3 | + utils::{xor, Block}, |
| 4 | +}; |
| 5 | +use block_padding::Padding; |
| 6 | +use byte_tools::copy; |
| 7 | +use cipher::{ |
| 8 | + block::{BlockCipher, BlockDecrypt, BlockEncrypt, NewBlockCipher}, |
| 9 | + generic_array::{ |
| 10 | + typenum::{Prod, UInt, UTerm, Unsigned, B0, B1, U2}, |
| 11 | + ArrayLength, GenericArray, |
| 12 | + }, |
| 13 | +}; |
| 14 | +use core::{marker::PhantomData, ops::Mul}; |
| 15 | + |
| 16 | +type IgeIvBlockSize<C> = Prod<<C as BlockCipher>::BlockSize, U2>; |
| 17 | + |
| 18 | +/// [Infinite Garble Extension][1] (IGE) block cipher mode instance. |
| 19 | +/// |
| 20 | +/// [1]: https://www.links.org/files/openssl-ige.pdf |
| 21 | +pub struct Ige<C, P> |
| 22 | +where |
| 23 | + C: BlockCipher + NewBlockCipher + BlockEncrypt + BlockDecrypt, |
| 24 | + P: Padding, |
| 25 | + C::BlockSize: Mul<UInt<UInt<UTerm, B1>, B0>>, |
| 26 | + <C::BlockSize as Mul<UInt<UInt<UTerm, B1>, B0>>>::Output: ArrayLength<u8>, |
| 27 | +{ |
| 28 | + cipher: C, |
| 29 | + iv: GenericArray<u8, IgeIvBlockSize<C>>, |
| 30 | + _p: PhantomData<P>, |
| 31 | +} |
| 32 | + |
| 33 | +// Implementation derived from: |
| 34 | +// https://mgp25.com/AESIGE/ |
| 35 | + |
| 36 | +impl<C, P> BlockMode<C, P> for Ige<C, P> |
| 37 | +where |
| 38 | + C: BlockCipher + NewBlockCipher + BlockEncrypt + BlockDecrypt, |
| 39 | + P: Padding, |
| 40 | + C::BlockSize: Mul<UInt<UInt<UTerm, B1>, B0>>, |
| 41 | + <C::BlockSize as Mul<UInt<UInt<UTerm, B1>, B0>>>::Output: ArrayLength<u8>, |
| 42 | +{ |
| 43 | + type IvSize = IgeIvBlockSize<C>; |
| 44 | + |
| 45 | + fn new(cipher: C, iv: &GenericArray<u8, Self::IvSize>) -> Self { |
| 46 | + Ige { |
| 47 | + cipher, |
| 48 | + iv: iv.clone(), |
| 49 | + _p: Default::default(), |
| 50 | + } |
| 51 | + } |
| 52 | + |
| 53 | + fn encrypt_blocks(&mut self, blocks: &mut [Block<C>]) { |
| 54 | + let block_size = C::BlockSize::to_usize(); |
| 55 | + |
| 56 | + let (mut y_prev, x_prev) = self.iv.split_at_mut(block_size); |
| 57 | + let mut x_temp = GenericArray::<u8, C::BlockSize>::default(); |
| 58 | + |
| 59 | + for block in blocks { |
| 60 | + copy(block, &mut x_temp); |
| 61 | + |
| 62 | + xor(block, y_prev); |
| 63 | + |
| 64 | + self.cipher.encrypt_block(block); |
| 65 | + |
| 66 | + xor(block, x_prev); |
| 67 | + |
| 68 | + copy(&x_temp, x_prev); |
| 69 | + y_prev = block; |
| 70 | + } |
| 71 | + } |
| 72 | + |
| 73 | + fn decrypt_blocks(&mut self, blocks: &mut [Block<C>]) { |
| 74 | + let block_size = C::BlockSize::to_usize(); |
| 75 | + |
| 76 | + let (x_prev, mut y_prev) = self.iv.split_at_mut(block_size); |
| 77 | + let mut x_temp = GenericArray::<u8, C::BlockSize>::default(); |
| 78 | + |
| 79 | + for block in blocks { |
| 80 | + copy(block, &mut x_temp); |
| 81 | + |
| 82 | + xor(block, y_prev); |
| 83 | + |
| 84 | + self.cipher.decrypt_block(block); |
| 85 | + |
| 86 | + xor(block, x_prev); |
| 87 | + |
| 88 | + copy(&x_temp, x_prev); |
| 89 | + y_prev = block; |
| 90 | + } |
| 91 | + } |
| 92 | +} |
0 commit comments