OXIESEC PANEL
- Current Dir:
/
/
opt
/
golang
/
1.22.0
/
src
/
crypto
/
cipher
Server IP: 191.96.63.230
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
benchmark_test.go
3.35 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cbc.go
5.38 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cbc_aes_test.go
2.93 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cfb.go
1.98 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cfb_test.go
2.77 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cipher.go
2.4 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cipher_test.go
2.2 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
common_test.go
1.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ctr.go
2.17 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ctr_aes_test.go
2.98 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ctr_test.go
1.13 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
example_test.go
11.78 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
export_test.go
322 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
fuzz_test.go
1.97 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
gcm.go
13.81 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
gcm_test.go
35.02 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
io.go
1.5 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ofb.go
1.63 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ofb_test.go
2.95 KB
02/02/2024 06:09:55 PM
rw-r--r--
Editing: ctr.go
Close
// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Counter (CTR) mode. // CTR converts a block cipher into a stream cipher by // repeatedly encrypting an incrementing counter and // xoring the resulting stream of data with the input. // See NIST SP 800-38A, pp 13-15 package cipher import ( "bytes" "crypto/internal/alias" "crypto/subtle" ) type ctr struct { b Block ctr []byte out []byte outUsed int } const streamBufferSize = 512 // ctrAble is an interface implemented by ciphers that have a specific optimized // implementation of CTR, like crypto/aes. NewCTR will check for this interface // and return the specific Stream if found. type ctrAble interface { NewCTR(iv []byte) Stream } // NewCTR returns a [Stream] which encrypts/decrypts using the given [Block] in // counter mode. The length of iv must be the same as the [Block]'s block size. func NewCTR(block Block, iv []byte) Stream { if ctr, ok := block.(ctrAble); ok { return ctr.NewCTR(iv) } if len(iv) != block.BlockSize() { panic("cipher.NewCTR: IV length must equal block size") } bufSize := streamBufferSize if bufSize < block.BlockSize() { bufSize = block.BlockSize() } return &ctr{ b: block, ctr: bytes.Clone(iv), out: make([]byte, 0, bufSize), outUsed: 0, } } func (x *ctr) refill() { remain := len(x.out) - x.outUsed copy(x.out, x.out[x.outUsed:]) x.out = x.out[:cap(x.out)] bs := x.b.BlockSize() for remain <= len(x.out)-bs { x.b.Encrypt(x.out[remain:], x.ctr) remain += bs // Increment counter for i := len(x.ctr) - 1; i >= 0; i-- { x.ctr[i]++ if x.ctr[i] != 0 { break } } } x.out = x.out[:remain] x.outUsed = 0 } func (x *ctr) XORKeyStream(dst, src []byte) { if len(dst) < len(src) { panic("crypto/cipher: output smaller than input") } if alias.InexactOverlap(dst[:len(src)], src) { panic("crypto/cipher: invalid buffer overlap") } for len(src) > 0 { if x.outUsed >= len(x.out)-x.b.BlockSize() { x.refill() } n := subtle.XORBytes(dst, src, x.out[x.outUsed:]) dst = dst[n:] src = src[n:] x.outUsed += n } }