Mercurial > 510Connectbot
view app/src/main/java/ch/ethz/ssh2/crypto/cipher/CTRMode.java @ 509:2eb4fa13b9ef
update 5250 encryption to allow TLS1.3, remove old SSLv2 and SSLv3 methods
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Sun, 29 Jan 2023 10:25:21 -0700 |
parents | d29cce60f393 |
children |
line wrap: on
line source
/* * Copyright (c) 2006-2011 Christian Plattner. All rights reserved. * Please refer to the LICENSE.txt for licensing details. */ package ch.ethz.ssh2.crypto.cipher; /** * This is CTR mode as described in draft-ietf-secsh-newmodes-XY.txt * * @author Christian Plattner * @version 2.50, 03/15/10 */ public class CTRMode implements BlockCipher { byte[] X; byte[] Xenc; BlockCipher bc; int blockSize; boolean doEncrypt; int count = 0; public void init(boolean forEncryption, byte[] key) { } public CTRMode(BlockCipher tc, byte[] iv, boolean doEnc) throws IllegalArgumentException { bc = tc; blockSize = bc.getBlockSize(); doEncrypt = doEnc; if (blockSize != iv.length) throw new IllegalArgumentException("IV must be " + blockSize + " bytes long! (currently " + iv.length + ")"); X = new byte[blockSize]; Xenc = new byte[blockSize]; System.arraycopy(iv, 0, X, 0, blockSize); } public final int getBlockSize() { return blockSize; } public final void transformBlock(byte[] src, int srcoff, byte[] dst, int dstoff) { bc.transformBlock(X, 0, Xenc, 0); for (int i = 0; i < blockSize; i++) { dst[dstoff + i] = (byte)(src[srcoff + i] ^ Xenc[i]); } for (int i = (blockSize - 1); i >= 0; i--) { X[i]++; if (X[i] != 0) break; } } }