tiny-AES-c/aes.h

92 lines
2.7 KiB
C
Raw Normal View History

2014-05-29 04:20:28 +04:00
#ifndef _AES_H_
#define _AES_H_
#include <stdint.h>
2014-12-15 23:18:25 +03:00
// #define the macros below to 1/0 to enable/disable the mode of operation.
//
2017-06-06 23:33:36 +03:00
// CBC enables AES encryption in CBC-mode of operation.
2017-12-01 14:10:29 +03:00
// CTR enables encryption in counter-mode.
// ECB enables the basic ECB 16-byte block algorithm. All can be enabled simultaneously.
2014-12-15 23:18:25 +03:00
// The #ifndef-guard allows it to be configured before #include'ing or at compile time.
#ifndef CBC
2014-12-15 23:22:32 +03:00
#define CBC 1
2014-12-15 23:18:25 +03:00
#endif
#ifndef ECB
#define ECB 1
#endif
2017-12-01 03:00:47 +03:00
#ifndef CTR
#define CTR 1
#endif
2017-07-08 04:13:21 +03:00
#define AES128 1
2017-07-08 04:22:16 +03:00
//#define AES192 1
//#define AES256 1
2014-12-15 23:18:25 +03:00
#define AES_BLOCKLEN 16 //Block length in bytes AES is 128b block only
#if defined(AES256) && (AES256 == 1)
#define AES_KEYLEN 32
#define AES_keyExpSize 240
#elif defined(AES192) && (AES192 == 1)
#define AES_KEYLEN 24
#define AES_keyExpSize 208
#else
#define AES_KEYLEN 16 // Key length in bytes
#define AES_keyExpSize 176
#endif
struct AES_ctx {
uint8_t RoundKey[AES_keyExpSize];
#if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1))
uint8_t Iv[AES_BLOCKLEN];
#endif
};
2017-12-06 04:22:51 +03:00
void AES_init_ctx(struct AES_ctx* ctx, const uint8_t* key);
#if defined(CBC) && (CBC == 1)
2017-12-06 04:22:51 +03:00
void AES_init_ctx_iv(struct AES_ctx* ctx, const uint8_t* key, const uint8_t* iv);
void AES_ctx_set_iv(struct AES_ctx* ctx, const uint8_t* iv);
#endif
2014-12-15 23:18:25 +03:00
#if defined(ECB) && (ECB == 1)
// buffer size is exactly AES_BLOCKLEN bytes;
// you need only AES_init_ctx as Iv is not used in ECB
// NB: ECB s considered insecure
2017-12-06 04:22:51 +03:00
void AES_ECB_encrypt(struct AES_ctx* ctx, const uint8_t* buf);
void AES_ECB_decrypt(struct AES_ctx* ctx, const uint8_t* buf);
2014-05-29 04:20:28 +04:00
2017-07-08 04:13:21 +03:00
#endif // #if defined(ECB) && (ECB == !)
2014-12-15 23:18:25 +03:00
2017-07-08 04:13:21 +03:00
#if defined(CBC) && (CBC == 1)
// buffer size MUST be mutile of AES_BLOCKLEN;
// We suggest https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7 if you need one
// you need to set iv in ctx via AES_init_ctx_iv or AES_ctx_set_iv
// NB: no IV should ever be reused with the same key
2017-12-06 04:22:51 +03:00
void AES_CBC_encrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, uint32_t length);
void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, uint32_t length);
2014-12-15 23:18:25 +03:00
2017-07-08 04:13:21 +03:00
#endif // #if defined(CBC) && (CBC == 1)
2014-12-15 23:18:25 +03:00
2017-12-01 03:00:47 +03:00
#if defined(CTR) && (CTR == 1)
2017-12-01 14:05:18 +03:00
// Same function for encrypting as for decrypting.
// iv is incremented for every block, and usesd after encryption as xor compliment for output
// buffer size MUST be mutile of AES_BLOCKLEN;
// We suggest https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7 if you need one
// you need to set iv in ctx via AES_init_ctx_iv or AES_ctx_set_iv
// NB: no IV should ever be reused with the same key
2017-12-05 15:27:53 +03:00
void AES_CTR_xcrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, uint32_t length);
2017-12-01 03:00:47 +03:00
#endif // #if defined(CTR) && (CTR == 1)
2014-05-29 04:20:28 +04:00
#endif //_AES_H_