1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 2 * All rights reserved. 3 * 4 * This package is an SSL implementation written 5 * by Eric Young (eay (at) cryptsoft.com). 6 * The implementation was written so as to conform with Netscapes SSL. 7 * 8 * This library is free for commercial and non-commercial use as long as 9 * the following conditions are aheared to. The following conditions 10 * apply to all code found in this distribution, be it the RC4, RSA, 11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * included with this distribution is covered by the same copyright terms 13 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 14 * 15 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * the code are not to be removed. 17 * If this package is used in a product, Eric Young should be given attribution 18 * as the author of the parts of the library used. 19 * This can be in the form of a textual message at program startup or 20 * in documentation (online or textual) provided with the package. 21 * 22 * Redistribution and use in source and binary forms, with or without 23 * modification, are permitted provided that the following conditions 24 * are met: 25 * 1. Redistributions of source code must retain the copyright 26 * notice, this list of conditions and the following disclaimer. 27 * 2. Redistributions in binary form must reproduce the above copyright 28 * notice, this list of conditions and the following disclaimer in the 29 * documentation and/or other materials provided with the distribution. 30 * 3. All advertising materials mentioning features or use of this software 31 * must display the following acknowledgement: 32 * "This product includes cryptographic software written by 33 * Eric Young (eay (at) cryptsoft.com)" 34 * The word 'cryptographic' can be left out if the rouines from the library 35 * being used are not cryptographic related :-). 36 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * the apps directory (application code) you must include an acknowledgement: 38 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * SUCH DAMAGE. 51 * 52 * The licence and distribution terms for any publically available version or 53 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * copied and put under another distribution licence 55 * [including the GNU Public Licence.] */ 56 57 #include <string.h> 58 59 #include <openssl/des.h> 60 61 #include "../../crypto/fipsmodule/des/internal.h" 62 #include "../../crypto/internal.h" 63 64 65 /* The input and output encrypted as though 64bit cfb mode is being used. The 66 * extra state information to record how much of the 64bit block we have used 67 * is contained in *num; */ 68 void DES_ede3_cfb64_encrypt(const uint8_t *in, uint8_t *out, 69 long length, DES_key_schedule *ks1, 70 DES_key_schedule *ks2, DES_key_schedule *ks3, 71 DES_cblock *ivec, int *num, int enc) { 72 uint32_t v0, v1; 73 long l = length; 74 int n = *num; 75 uint32_t ti[2]; 76 uint8_t *iv, c, cc; 77 78 iv = ivec->bytes; 79 if (enc) { 80 while (l--) { 81 if (n == 0) { 82 c2l(iv, v0); 83 c2l(iv, v1); 84 85 ti[0] = v0; 86 ti[1] = v1; 87 DES_encrypt3(ti, ks1, ks2, ks3); 88 v0 = ti[0]; 89 v1 = ti[1]; 90 91 iv = ivec->bytes; 92 l2c(v0, iv); 93 l2c(v1, iv); 94 iv = ivec->bytes; 95 } 96 c = *(in++) ^ iv[n]; 97 *(out++) = c; 98 iv[n] = c; 99 n = (n + 1) & 0x07; 100 } 101 } else { 102 while (l--) { 103 if (n == 0) { 104 c2l(iv, v0); 105 c2l(iv, v1); 106 107 ti[0] = v0; 108 ti[1] = v1; 109 DES_encrypt3(ti, ks1, ks2, ks3); 110 v0 = ti[0]; 111 v1 = ti[1]; 112 113 iv = ivec->bytes; 114 l2c(v0, iv); 115 l2c(v1, iv); 116 iv = ivec->bytes; 117 } 118 cc = *(in++); 119 c = iv[n]; 120 iv[n] = cc; 121 *(out++) = c ^ cc; 122 n = (n + 1) & 0x07; 123 } 124 } 125 v0 = v1 = ti[0] = ti[1] = c = cc = 0; 126 *num = n; 127 } 128 129 /* This is compatible with the single key CFB-r for DES, even thought that's 130 * not what EVP needs. */ 131 132 void DES_ede3_cfb_encrypt(const uint8_t *in, uint8_t *out, int numbits, 133 long length, DES_key_schedule *ks1, 134 DES_key_schedule *ks2, DES_key_schedule *ks3, 135 DES_cblock *ivec, int enc) { 136 uint32_t d0, d1, v0, v1; 137 unsigned long l = length, n = ((unsigned int)numbits + 7) / 8; 138 int num = numbits, i; 139 uint32_t ti[2]; 140 uint8_t *iv; 141 uint8_t ovec[16]; 142 143 if (num > 64) { 144 return; 145 }; 146 147 iv = ivec->bytes; 148 c2l(iv, v0); 149 c2l(iv, v1); 150 151 if (enc) { 152 while (l >= n) { 153 l -= n; 154 ti[0] = v0; 155 ti[1] = v1; 156 DES_encrypt3(ti, ks1, ks2, ks3); 157 c2ln(in, d0, d1, n); 158 in += n; 159 d0 ^= ti[0]; 160 d1 ^= ti[1]; 161 l2cn(d0, d1, out, n); 162 out += n; 163 /* 30-08-94 - eay - changed because l>>32 and l<<32 are bad under 164 * gcc :-( */ 165 if (num == 32) { 166 v0 = v1; 167 v1 = d0; 168 } else if (num == 64) { 169 v0 = d0; 170 v1 = d1; 171 } else { 172 iv = &ovec[0]; 173 l2c(v0, iv); 174 l2c(v1, iv); 175 l2c(d0, iv); 176 l2c(d1, iv); 177 /* shift ovec left most of the bits... */ 178 OPENSSL_memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0)); 179 /* now the remaining bits */ 180 if (num % 8 != 0) { 181 for (i = 0; i < 8; ++i) { 182 ovec[i] <<= num % 8; 183 ovec[i] |= ovec[i + 1] >> (8 - num % 8); 184 } 185 } 186 iv = &ovec[0]; 187 c2l(iv, v0); 188 c2l(iv, v1); 189 } 190 } 191 } else { 192 while (l >= n) { 193 l -= n; 194 ti[0] = v0; 195 ti[1] = v1; 196 DES_encrypt3(ti, ks1, ks2, ks3); 197 c2ln(in, d0, d1, n); 198 in += n; 199 /* 30-08-94 - eay - changed because l>>32 and l<<32 are bad under 200 * gcc :-( */ 201 if (num == 32) { 202 v0 = v1; 203 v1 = d0; 204 } else if (num == 64) { 205 v0 = d0; 206 v1 = d1; 207 } else { 208 iv = &ovec[0]; 209 l2c(v0, iv); 210 l2c(v1, iv); 211 l2c(d0, iv); 212 l2c(d1, iv); 213 /* shift ovec left most of the bits... */ 214 OPENSSL_memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0)); 215 /* now the remaining bits */ 216 if (num % 8 != 0) { 217 for (i = 0; i < 8; ++i) { 218 ovec[i] <<= num % 8; 219 ovec[i] |= ovec[i + 1] >> (8 - num % 8); 220 } 221 } 222 iv = &ovec[0]; 223 c2l(iv, v0); 224 c2l(iv, v1); 225 } 226 d0 ^= ti[0]; 227 d1 ^= ti[1]; 228 l2cn(d0, d1, out, n); 229 out += n; 230 } 231 } 232 233 iv = ivec->bytes; 234 l2c(v0, iv); 235 l2c(v1, iv); 236 v0 = v1 = d0 = d1 = ti[0] = ti[1] = 0; 237 } 238