xref: /dragonfly/crypto/libressl/crypto/evp/e_idea.c (revision de0e0e4d)
1*de0e0e4dSAntonio Huete Jimenez /* $OpenBSD: e_idea.c,v 1.17 2022/09/15 07:04:19 jsing Exp $ */
2f5b1c8a1SJohn Marino /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3f5b1c8a1SJohn Marino  * All rights reserved.
4f5b1c8a1SJohn Marino  *
5f5b1c8a1SJohn Marino  * This package is an SSL implementation written
6f5b1c8a1SJohn Marino  * by Eric Young (eay@cryptsoft.com).
7f5b1c8a1SJohn Marino  * The implementation was written so as to conform with Netscapes SSL.
8f5b1c8a1SJohn Marino  *
9f5b1c8a1SJohn Marino  * This library is free for commercial and non-commercial use as long as
10f5b1c8a1SJohn Marino  * the following conditions are aheared to.  The following conditions
11f5b1c8a1SJohn Marino  * apply to all code found in this distribution, be it the RC4, RSA,
12f5b1c8a1SJohn Marino  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13f5b1c8a1SJohn Marino  * included with this distribution is covered by the same copyright terms
14f5b1c8a1SJohn Marino  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15f5b1c8a1SJohn Marino  *
16f5b1c8a1SJohn Marino  * Copyright remains Eric Young's, and as such any Copyright notices in
17f5b1c8a1SJohn Marino  * the code are not to be removed.
18f5b1c8a1SJohn Marino  * If this package is used in a product, Eric Young should be given attribution
19f5b1c8a1SJohn Marino  * as the author of the parts of the library used.
20f5b1c8a1SJohn Marino  * This can be in the form of a textual message at program startup or
21f5b1c8a1SJohn Marino  * in documentation (online or textual) provided with the package.
22f5b1c8a1SJohn Marino  *
23f5b1c8a1SJohn Marino  * Redistribution and use in source and binary forms, with or without
24f5b1c8a1SJohn Marino  * modification, are permitted provided that the following conditions
25f5b1c8a1SJohn Marino  * are met:
26f5b1c8a1SJohn Marino  * 1. Redistributions of source code must retain the copyright
27f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer.
28f5b1c8a1SJohn Marino  * 2. Redistributions in binary form must reproduce the above copyright
29f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer in the
30f5b1c8a1SJohn Marino  *    documentation and/or other materials provided with the distribution.
31f5b1c8a1SJohn Marino  * 3. All advertising materials mentioning features or use of this software
32f5b1c8a1SJohn Marino  *    must display the following acknowledgement:
33f5b1c8a1SJohn Marino  *    "This product includes cryptographic software written by
34f5b1c8a1SJohn Marino  *     Eric Young (eay@cryptsoft.com)"
35f5b1c8a1SJohn Marino  *    The word 'cryptographic' can be left out if the rouines from the library
36f5b1c8a1SJohn Marino  *    being used are not cryptographic related :-).
37f5b1c8a1SJohn Marino  * 4. If you include any Windows specific code (or a derivative thereof) from
38f5b1c8a1SJohn Marino  *    the apps directory (application code) you must include an acknowledgement:
39f5b1c8a1SJohn Marino  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40f5b1c8a1SJohn Marino  *
41f5b1c8a1SJohn Marino  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42f5b1c8a1SJohn Marino  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43f5b1c8a1SJohn Marino  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44f5b1c8a1SJohn Marino  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45f5b1c8a1SJohn Marino  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46f5b1c8a1SJohn Marino  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47f5b1c8a1SJohn Marino  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48f5b1c8a1SJohn Marino  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49f5b1c8a1SJohn Marino  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50f5b1c8a1SJohn Marino  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51f5b1c8a1SJohn Marino  * SUCH DAMAGE.
52f5b1c8a1SJohn Marino  *
53f5b1c8a1SJohn Marino  * The licence and distribution terms for any publically available version or
54f5b1c8a1SJohn Marino  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55f5b1c8a1SJohn Marino  * copied and put under another distribution licence
56f5b1c8a1SJohn Marino  * [including the GNU Public Licence.]
57f5b1c8a1SJohn Marino  */
58f5b1c8a1SJohn Marino 
59*de0e0e4dSAntonio Huete Jimenez #include <limits.h>
60f5b1c8a1SJohn Marino #include <stdio.h>
61f5b1c8a1SJohn Marino #include <string.h>
62f5b1c8a1SJohn Marino 
63f5b1c8a1SJohn Marino #include <openssl/opensslconf.h>
64f5b1c8a1SJohn Marino 
65f5b1c8a1SJohn Marino #ifndef OPENSSL_NO_IDEA
66f5b1c8a1SJohn Marino 
67f5b1c8a1SJohn Marino #include <openssl/evp.h>
68f5b1c8a1SJohn Marino #include <openssl/idea.h>
69f5b1c8a1SJohn Marino #include <openssl/objects.h>
70f5b1c8a1SJohn Marino 
71f5b1c8a1SJohn Marino #include "evp_locl.h"
72f5b1c8a1SJohn Marino 
73f5b1c8a1SJohn Marino /* NB idea_ecb_encrypt doesn't take an 'encrypt' argument so we treat it as a special
74f5b1c8a1SJohn Marino  * case
75f5b1c8a1SJohn Marino  */
76f5b1c8a1SJohn Marino 
77f5b1c8a1SJohn Marino static int
idea_init_key(EVP_CIPHER_CTX * ctx,const unsigned char * key,const unsigned char * iv,int enc)78f5b1c8a1SJohn Marino idea_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
79f5b1c8a1SJohn Marino     const unsigned char *iv, int enc)
80f5b1c8a1SJohn Marino {
81f5b1c8a1SJohn Marino 	if (!enc) {
82f5b1c8a1SJohn Marino 		if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_OFB_MODE)
83f5b1c8a1SJohn Marino 			enc = 1;
84f5b1c8a1SJohn Marino 		else if (EVP_CIPHER_CTX_mode(ctx) == EVP_CIPH_CFB_MODE)
85f5b1c8a1SJohn Marino 			enc = 1;
86f5b1c8a1SJohn Marino 	}
87f5b1c8a1SJohn Marino 	if (enc)
88f5b1c8a1SJohn Marino 		idea_set_encrypt_key(key, ctx->cipher_data);
89f5b1c8a1SJohn Marino 	else {
90f5b1c8a1SJohn Marino 		IDEA_KEY_SCHEDULE tmp;
91f5b1c8a1SJohn Marino 
92f5b1c8a1SJohn Marino 		idea_set_encrypt_key(key, &tmp);
93f5b1c8a1SJohn Marino 		idea_set_decrypt_key(&tmp, ctx->cipher_data);
94f5b1c8a1SJohn Marino 		explicit_bzero((unsigned char *)&tmp,
95f5b1c8a1SJohn Marino 		    sizeof(IDEA_KEY_SCHEDULE));
96f5b1c8a1SJohn Marino 	}
97f5b1c8a1SJohn Marino 	return 1;
98f5b1c8a1SJohn Marino }
99f5b1c8a1SJohn Marino 
100*de0e0e4dSAntonio Huete Jimenez static int
idea_ecb_cipher(EVP_CIPHER_CTX * ctx,unsigned char * out,const unsigned char * in,size_t inl)101*de0e0e4dSAntonio Huete Jimenez idea_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
102*de0e0e4dSAntonio Huete Jimenez     const unsigned char *in, size_t inl)
103*de0e0e4dSAntonio Huete Jimenez {
104*de0e0e4dSAntonio Huete Jimenez 	size_t i, bl;
105*de0e0e4dSAntonio Huete Jimenez 
106*de0e0e4dSAntonio Huete Jimenez 	bl = ctx->cipher->block_size;
107*de0e0e4dSAntonio Huete Jimenez 
108*de0e0e4dSAntonio Huete Jimenez 	if (inl < bl)
109*de0e0e4dSAntonio Huete Jimenez 		return 1;
110*de0e0e4dSAntonio Huete Jimenez 
111*de0e0e4dSAntonio Huete Jimenez 	inl -= bl;
112*de0e0e4dSAntonio Huete Jimenez 
113*de0e0e4dSAntonio Huete Jimenez 	for (i = 0; i <= inl; i += bl)
114*de0e0e4dSAntonio Huete Jimenez 		idea_ecb_encrypt(in + i, out + i, ctx->cipher_data);
115*de0e0e4dSAntonio Huete Jimenez 
116*de0e0e4dSAntonio Huete Jimenez 	return 1;
117*de0e0e4dSAntonio Huete Jimenez }
118*de0e0e4dSAntonio Huete Jimenez 
119*de0e0e4dSAntonio Huete Jimenez typedef struct {
120*de0e0e4dSAntonio Huete Jimenez 	IDEA_KEY_SCHEDULE ks;
121*de0e0e4dSAntonio Huete Jimenez } EVP_IDEA_KEY;
122*de0e0e4dSAntonio Huete Jimenez 
123*de0e0e4dSAntonio Huete Jimenez static int
idea_cbc_cipher(EVP_CIPHER_CTX * ctx,unsigned char * out,const unsigned char * in,size_t inl)124*de0e0e4dSAntonio Huete Jimenez idea_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl)
125*de0e0e4dSAntonio Huete Jimenez {
126*de0e0e4dSAntonio Huete Jimenez 	size_t chunk = LONG_MAX & ~0xff;
127*de0e0e4dSAntonio Huete Jimenez 
128*de0e0e4dSAntonio Huete Jimenez 	while (inl >= chunk) {
129*de0e0e4dSAntonio Huete Jimenez 		idea_cbc_encrypt(in, out, (long)chunk, &((EVP_IDEA_KEY *)ctx->cipher_data)->ks, ctx->iv, ctx->encrypt);
130*de0e0e4dSAntonio Huete Jimenez 		inl -= chunk;
131*de0e0e4dSAntonio Huete Jimenez 		in += chunk;
132*de0e0e4dSAntonio Huete Jimenez 		out += chunk;
133*de0e0e4dSAntonio Huete Jimenez 	}
134*de0e0e4dSAntonio Huete Jimenez 
135*de0e0e4dSAntonio Huete Jimenez 	if (inl)
136*de0e0e4dSAntonio Huete Jimenez 		idea_cbc_encrypt(in, out, (long)inl, &((EVP_IDEA_KEY *)ctx->cipher_data)->ks, ctx->iv, ctx->encrypt);
137*de0e0e4dSAntonio Huete Jimenez 
138*de0e0e4dSAntonio Huete Jimenez 	return 1;
139*de0e0e4dSAntonio Huete Jimenez }
140*de0e0e4dSAntonio Huete Jimenez 
141*de0e0e4dSAntonio Huete Jimenez static int
idea_ofb_cipher(EVP_CIPHER_CTX * ctx,unsigned char * out,const unsigned char * in,size_t inl)142*de0e0e4dSAntonio Huete Jimenez idea_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl)
143*de0e0e4dSAntonio Huete Jimenez {
144*de0e0e4dSAntonio Huete Jimenez 	size_t chunk = LONG_MAX & ~0xff;
145*de0e0e4dSAntonio Huete Jimenez 
146*de0e0e4dSAntonio Huete Jimenez 	while (inl >= chunk) {
147*de0e0e4dSAntonio Huete Jimenez 		idea_ofb64_encrypt(in, out, (long)chunk, &((EVP_IDEA_KEY *)ctx->cipher_data)->ks, ctx->iv, &ctx->num);
148*de0e0e4dSAntonio Huete Jimenez 		inl -= chunk;
149*de0e0e4dSAntonio Huete Jimenez 		in += chunk;
150*de0e0e4dSAntonio Huete Jimenez 		out += chunk;
151*de0e0e4dSAntonio Huete Jimenez 	}
152*de0e0e4dSAntonio Huete Jimenez 
153*de0e0e4dSAntonio Huete Jimenez 	if (inl)
154*de0e0e4dSAntonio Huete Jimenez 		idea_ofb64_encrypt(in, out, (long)inl, &((EVP_IDEA_KEY *)ctx->cipher_data)->ks, ctx->iv, &ctx->num);
155*de0e0e4dSAntonio Huete Jimenez 
156*de0e0e4dSAntonio Huete Jimenez 	return 1;
157*de0e0e4dSAntonio Huete Jimenez }
158*de0e0e4dSAntonio Huete Jimenez 
159*de0e0e4dSAntonio Huete Jimenez static int
idea_cfb64_cipher(EVP_CIPHER_CTX * ctx,unsigned char * out,const unsigned char * in,size_t inl)160*de0e0e4dSAntonio Huete Jimenez idea_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl)
161*de0e0e4dSAntonio Huete Jimenez {
162*de0e0e4dSAntonio Huete Jimenez 	size_t chunk = LONG_MAX & ~0xff;
163*de0e0e4dSAntonio Huete Jimenez 
164*de0e0e4dSAntonio Huete Jimenez 	if (inl < chunk)
165*de0e0e4dSAntonio Huete Jimenez 		chunk = inl;
166*de0e0e4dSAntonio Huete Jimenez 
167*de0e0e4dSAntonio Huete Jimenez 	while (inl && inl >= chunk) {
168*de0e0e4dSAntonio Huete Jimenez 		idea_cfb64_encrypt(in, out, (long)chunk, &((EVP_IDEA_KEY *)ctx->cipher_data)->ks, ctx->iv, &ctx->num, ctx->encrypt);
169*de0e0e4dSAntonio Huete Jimenez 		inl -= chunk;
170*de0e0e4dSAntonio Huete Jimenez 		in += chunk;
171*de0e0e4dSAntonio Huete Jimenez 		out += chunk;
172*de0e0e4dSAntonio Huete Jimenez 		if (inl < chunk)
173*de0e0e4dSAntonio Huete Jimenez 			chunk = inl;
174*de0e0e4dSAntonio Huete Jimenez 	}
175*de0e0e4dSAntonio Huete Jimenez 
176*de0e0e4dSAntonio Huete Jimenez 	return 1;
177*de0e0e4dSAntonio Huete Jimenez }
178*de0e0e4dSAntonio Huete Jimenez 
179*de0e0e4dSAntonio Huete Jimenez static const EVP_CIPHER idea_cbc = {
180*de0e0e4dSAntonio Huete Jimenez 	.nid = NID_idea_cbc,
181*de0e0e4dSAntonio Huete Jimenez 	.block_size = 8,
182*de0e0e4dSAntonio Huete Jimenez 	.key_len = 16,
183*de0e0e4dSAntonio Huete Jimenez 	.iv_len = 8,
184*de0e0e4dSAntonio Huete Jimenez 	.flags = 0 | EVP_CIPH_CBC_MODE,
185*de0e0e4dSAntonio Huete Jimenez 	.init = idea_init_key,
186*de0e0e4dSAntonio Huete Jimenez 	.do_cipher = idea_cbc_cipher,
187*de0e0e4dSAntonio Huete Jimenez 	.cleanup = NULL,
188*de0e0e4dSAntonio Huete Jimenez 	.ctx_size = sizeof(IDEA_KEY_SCHEDULE),
189*de0e0e4dSAntonio Huete Jimenez 	.set_asn1_parameters = EVP_CIPHER_set_asn1_iv,
190*de0e0e4dSAntonio Huete Jimenez 	.get_asn1_parameters = EVP_CIPHER_get_asn1_iv,
191*de0e0e4dSAntonio Huete Jimenez 	.ctrl = NULL,
192*de0e0e4dSAntonio Huete Jimenez 	.app_data = NULL,
193*de0e0e4dSAntonio Huete Jimenez };
194*de0e0e4dSAntonio Huete Jimenez 
195*de0e0e4dSAntonio Huete Jimenez const EVP_CIPHER *
EVP_idea_cbc(void)196*de0e0e4dSAntonio Huete Jimenez EVP_idea_cbc(void)
197*de0e0e4dSAntonio Huete Jimenez {
198*de0e0e4dSAntonio Huete Jimenez 	return &idea_cbc;
199*de0e0e4dSAntonio Huete Jimenez }
200*de0e0e4dSAntonio Huete Jimenez 
201*de0e0e4dSAntonio Huete Jimenez static const EVP_CIPHER idea_cfb64 = {
202*de0e0e4dSAntonio Huete Jimenez 	.nid = NID_idea_cfb64,
203*de0e0e4dSAntonio Huete Jimenez 	.block_size = 1,
204*de0e0e4dSAntonio Huete Jimenez 	.key_len = 16,
205*de0e0e4dSAntonio Huete Jimenez 	.iv_len = 8,
206*de0e0e4dSAntonio Huete Jimenez 	.flags = 0 | EVP_CIPH_CFB_MODE,
207*de0e0e4dSAntonio Huete Jimenez 	.init = idea_init_key,
208*de0e0e4dSAntonio Huete Jimenez 	.do_cipher = idea_cfb64_cipher,
209*de0e0e4dSAntonio Huete Jimenez 	.cleanup = NULL,
210*de0e0e4dSAntonio Huete Jimenez 	.ctx_size = sizeof(IDEA_KEY_SCHEDULE),
211*de0e0e4dSAntonio Huete Jimenez 	.set_asn1_parameters = EVP_CIPHER_set_asn1_iv,
212*de0e0e4dSAntonio Huete Jimenez 	.get_asn1_parameters = EVP_CIPHER_get_asn1_iv,
213*de0e0e4dSAntonio Huete Jimenez 	.ctrl = NULL,
214*de0e0e4dSAntonio Huete Jimenez 	.app_data = NULL,
215*de0e0e4dSAntonio Huete Jimenez };
216*de0e0e4dSAntonio Huete Jimenez 
217*de0e0e4dSAntonio Huete Jimenez const EVP_CIPHER *
EVP_idea_cfb64(void)218*de0e0e4dSAntonio Huete Jimenez EVP_idea_cfb64(void)
219*de0e0e4dSAntonio Huete Jimenez {
220*de0e0e4dSAntonio Huete Jimenez 	return &idea_cfb64;
221*de0e0e4dSAntonio Huete Jimenez }
222*de0e0e4dSAntonio Huete Jimenez 
223*de0e0e4dSAntonio Huete Jimenez static const EVP_CIPHER idea_ofb = {
224*de0e0e4dSAntonio Huete Jimenez 	.nid = NID_idea_ofb64,
225*de0e0e4dSAntonio Huete Jimenez 	.block_size = 1,
226*de0e0e4dSAntonio Huete Jimenez 	.key_len = 16,
227*de0e0e4dSAntonio Huete Jimenez 	.iv_len = 8,
228*de0e0e4dSAntonio Huete Jimenez 	.flags = 0 | EVP_CIPH_OFB_MODE,
229*de0e0e4dSAntonio Huete Jimenez 	.init = idea_init_key,
230*de0e0e4dSAntonio Huete Jimenez 	.do_cipher = idea_ofb_cipher,
231*de0e0e4dSAntonio Huete Jimenez 	.cleanup = NULL,
232*de0e0e4dSAntonio Huete Jimenez 	.ctx_size = sizeof(IDEA_KEY_SCHEDULE),
233*de0e0e4dSAntonio Huete Jimenez 	.set_asn1_parameters = EVP_CIPHER_set_asn1_iv,
234*de0e0e4dSAntonio Huete Jimenez 	.get_asn1_parameters = EVP_CIPHER_get_asn1_iv,
235*de0e0e4dSAntonio Huete Jimenez 	.ctrl = NULL,
236*de0e0e4dSAntonio Huete Jimenez 	.app_data = NULL,
237*de0e0e4dSAntonio Huete Jimenez };
238*de0e0e4dSAntonio Huete Jimenez 
239*de0e0e4dSAntonio Huete Jimenez const EVP_CIPHER *
EVP_idea_ofb(void)240*de0e0e4dSAntonio Huete Jimenez EVP_idea_ofb(void)
241*de0e0e4dSAntonio Huete Jimenez {
242*de0e0e4dSAntonio Huete Jimenez 	return &idea_ofb;
243*de0e0e4dSAntonio Huete Jimenez }
244*de0e0e4dSAntonio Huete Jimenez 
245*de0e0e4dSAntonio Huete Jimenez static const EVP_CIPHER idea_ecb = {
246*de0e0e4dSAntonio Huete Jimenez 	.nid = NID_idea_ecb,
247*de0e0e4dSAntonio Huete Jimenez 	.block_size = 8,
248*de0e0e4dSAntonio Huete Jimenez 	.key_len = 16,
249*de0e0e4dSAntonio Huete Jimenez 	.iv_len = 0,
250*de0e0e4dSAntonio Huete Jimenez 	.flags = 0 | EVP_CIPH_ECB_MODE,
251*de0e0e4dSAntonio Huete Jimenez 	.init = idea_init_key,
252*de0e0e4dSAntonio Huete Jimenez 	.do_cipher = idea_ecb_cipher,
253*de0e0e4dSAntonio Huete Jimenez 	.cleanup = NULL,
254*de0e0e4dSAntonio Huete Jimenez 	.ctx_size = sizeof(IDEA_KEY_SCHEDULE),
255*de0e0e4dSAntonio Huete Jimenez 	.set_asn1_parameters = EVP_CIPHER_set_asn1_iv,
256*de0e0e4dSAntonio Huete Jimenez 	.get_asn1_parameters = EVP_CIPHER_get_asn1_iv,
257*de0e0e4dSAntonio Huete Jimenez 	.ctrl = NULL,
258*de0e0e4dSAntonio Huete Jimenez 	.app_data = NULL,
259*de0e0e4dSAntonio Huete Jimenez };
260*de0e0e4dSAntonio Huete Jimenez 
261*de0e0e4dSAntonio Huete Jimenez const EVP_CIPHER *
EVP_idea_ecb(void)262*de0e0e4dSAntonio Huete Jimenez EVP_idea_ecb(void)
263*de0e0e4dSAntonio Huete Jimenez {
264*de0e0e4dSAntonio Huete Jimenez 	return &idea_ecb;
265*de0e0e4dSAntonio Huete Jimenez }
266f5b1c8a1SJohn Marino #endif
267