• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2  * All rights reserved.
3  *
4  * This package is an SSL implementation written
5  * by Eric Young (eay@cryptsoft.com).
6  * The implementation was written so as to conform with Netscapes SSL.
7  *
8  * This library is free for commercial and non-commercial use as long as
9  * the following conditions are aheared to.  The following conditions
10  * apply to all code found in this distribution, be it the RC4, RSA,
11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
12  * included with this distribution is covered by the same copyright terms
13  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14  *
15  * Copyright remains Eric Young's, and as such any Copyright notices in
16  * the code are not to be removed.
17  * If this package is used in a product, Eric Young should be given attribution
18  * as the author of the parts of the library used.
19  * This can be in the form of a textual message at program startup or
20  * in documentation (online or textual) provided with the package.
21  *
22  * Redistribution and use in source and binary forms, with or without
23  * modification, are permitted provided that the following conditions
24  * are met:
25  * 1. Redistributions of source code must retain the copyright
26  *    notice, this list of conditions and the following disclaimer.
27  * 2. Redistributions in binary form must reproduce the above copyright
28  *    notice, this list of conditions and the following disclaimer in the
29  *    documentation and/or other materials provided with the distribution.
30  * 3. All advertising materials mentioning features or use of this software
31  *    must display the following acknowledgement:
32  *    "This product includes cryptographic software written by
33  *     Eric Young (eay@cryptsoft.com)"
34  *    The word 'cryptographic' can be left out if the rouines from the library
35  *    being used are not cryptographic related :-).
36  * 4. If you include any Windows specific code (or a derivative thereof) from
37  *    the apps directory (application code) you must include an acknowledgement:
38  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39  *
40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50  * SUCH DAMAGE.
51  *
52  * The licence and distribution terms for any publically available version or
53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
54  * copied and put under another distribution licence
55  * [including the GNU Public Licence.]  */
56 
57 #include <string.h>
58 
59 #include <openssl/des.h>
60 
61 #include "../../crypto/fipsmodule/des/internal.h"
62 #include "../../crypto/internal.h"
63 
64 
65 // The input and output encrypted as though 64bit cfb mode is being used. The
66 // extra state information to record how much of the 64bit block we have used
67 // is contained in *num;
DES_ede3_cfb64_encrypt(const uint8_t * in,uint8_t * out,long length,DES_key_schedule * ks1,DES_key_schedule * ks2,DES_key_schedule * ks3,DES_cblock * ivec,int * num,int enc)68 void DES_ede3_cfb64_encrypt(const uint8_t *in, uint8_t *out,
69                             long length, DES_key_schedule *ks1,
70                             DES_key_schedule *ks2, DES_key_schedule *ks3,
71                             DES_cblock *ivec, int *num, int enc) {
72   uint32_t v0, v1;
73   long l = length;
74   int n = *num;
75   uint32_t ti[2];
76   uint8_t *iv, c, cc;
77 
78   iv = ivec->bytes;
79   if (enc) {
80     while (l--) {
81       if (n == 0) {
82         c2l(iv, v0);
83         c2l(iv, v1);
84 
85         ti[0] = v0;
86         ti[1] = v1;
87         DES_encrypt3(ti, ks1, ks2, ks3);
88         v0 = ti[0];
89         v1 = ti[1];
90 
91         iv = ivec->bytes;
92         l2c(v0, iv);
93         l2c(v1, iv);
94         iv = ivec->bytes;
95       }
96       c = *(in++) ^ iv[n];
97       *(out++) = c;
98       iv[n] = c;
99       n = (n + 1) & 0x07;
100     }
101   } else {
102     while (l--) {
103       if (n == 0) {
104         c2l(iv, v0);
105         c2l(iv, v1);
106 
107         ti[0] = v0;
108         ti[1] = v1;
109         DES_encrypt3(ti, ks1, ks2, ks3);
110         v0 = ti[0];
111         v1 = ti[1];
112 
113         iv = ivec->bytes;
114         l2c(v0, iv);
115         l2c(v1, iv);
116         iv = ivec->bytes;
117       }
118       cc = *(in++);
119       c = iv[n];
120       iv[n] = cc;
121       *(out++) = c ^ cc;
122       n = (n + 1) & 0x07;
123     }
124   }
125   v0 = v1 = ti[0] = ti[1] = c = cc = 0;
126   *num = n;
127 }
128 
129 // This is compatible with the single key CFB-r for DES, even thought that's
130 // not what EVP needs.
131 
DES_ede3_cfb_encrypt(const uint8_t * in,uint8_t * out,int numbits,long length,DES_key_schedule * ks1,DES_key_schedule * ks2,DES_key_schedule * ks3,DES_cblock * ivec,int enc)132 void DES_ede3_cfb_encrypt(const uint8_t *in, uint8_t *out, int numbits,
133                           long length, DES_key_schedule *ks1,
134                           DES_key_schedule *ks2, DES_key_schedule *ks3,
135                           DES_cblock *ivec, int enc) {
136   uint32_t d0, d1, v0, v1;
137   unsigned long l = length, n = ((unsigned int)numbits + 7) / 8;
138   int num = numbits, i;
139   uint32_t ti[2];
140   uint8_t *iv;
141   uint8_t ovec[16];
142 
143   if (num > 64) {
144     return;
145   };
146 
147   iv = ivec->bytes;
148   c2l(iv, v0);
149   c2l(iv, v1);
150 
151   if (enc) {
152     while (l >= n) {
153       l -= n;
154       ti[0] = v0;
155       ti[1] = v1;
156       DES_encrypt3(ti, ks1, ks2, ks3);
157       c2ln(in, d0, d1, n);
158       in += n;
159       d0 ^= ti[0];
160       d1 ^= ti[1];
161       l2cn(d0, d1, out, n);
162       out += n;
163       // 30-08-94 - eay - changed because l>>32 and l<<32 are bad under
164       // gcc :-(
165       if (num == 32) {
166         v0 = v1;
167         v1 = d0;
168       } else if (num == 64) {
169         v0 = d0;
170         v1 = d1;
171       } else {
172         iv = &ovec[0];
173         l2c(v0, iv);
174         l2c(v1, iv);
175         l2c(d0, iv);
176         l2c(d1, iv);
177         // shift ovec left most of the bits...
178         OPENSSL_memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0));
179         // now the remaining bits
180         if (num % 8 != 0) {
181           for (i = 0; i < 8; ++i) {
182             ovec[i] <<= num % 8;
183             ovec[i] |= ovec[i + 1] >> (8 - num % 8);
184           }
185         }
186         iv = &ovec[0];
187         c2l(iv, v0);
188         c2l(iv, v1);
189       }
190     }
191   } else {
192     while (l >= n) {
193       l -= n;
194       ti[0] = v0;
195       ti[1] = v1;
196       DES_encrypt3(ti, ks1, ks2, ks3);
197       c2ln(in, d0, d1, n);
198       in += n;
199       // 30-08-94 - eay - changed because l>>32 and l<<32 are bad under
200       // gcc :-(
201       if (num == 32) {
202         v0 = v1;
203         v1 = d0;
204       } else if (num == 64) {
205         v0 = d0;
206         v1 = d1;
207       } else {
208         iv = &ovec[0];
209         l2c(v0, iv);
210         l2c(v1, iv);
211         l2c(d0, iv);
212         l2c(d1, iv);
213         // shift ovec left most of the bits...
214         OPENSSL_memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0));
215         // now the remaining bits
216         if (num % 8 != 0) {
217           for (i = 0; i < 8; ++i) {
218             ovec[i] <<= num % 8;
219             ovec[i] |= ovec[i + 1] >> (8 - num % 8);
220           }
221         }
222         iv = &ovec[0];
223         c2l(iv, v0);
224         c2l(iv, v1);
225       }
226       d0 ^= ti[0];
227       d1 ^= ti[1];
228       l2cn(d0, d1, out, n);
229       out += n;
230     }
231   }
232 
233   iv = ivec->bytes;
234   l2c(v0, iv);
235   l2c(v1, iv);
236   v0 = v1 = d0 = d1 = ti[0] = ti[1] = 0;
237 }
238