1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2 * All rights reserved. 3 * 4 * This package is an SSL implementation written 5 * by Eric Young (eay@cryptsoft.com). 6 * The implementation was written so as to conform with Netscapes SSL. 7 * 8 * This library is free for commercial and non-commercial use as long as 9 * the following conditions are aheared to. The following conditions 10 * apply to all code found in this distribution, be it the RC4, RSA, 11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * included with this distribution is covered by the same copyright terms 13 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 14 * 15 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * the code are not to be removed. 17 * If this package is used in a product, Eric Young should be given attribution 18 * as the author of the parts of the library used. 19 * This can be in the form of a textual message at program startup or 20 * in documentation (online or textual) provided with the package. 21 * 22 * Redistribution and use in source and binary forms, with or without 23 * modification, are permitted provided that the following conditions 24 * are met: 25 * 1. Redistributions of source code must retain the copyright 26 * notice, this list of conditions and the following disclaimer. 27 * 2. Redistributions in binary form must reproduce the above copyright 28 * notice, this list of conditions and the following disclaimer in the 29 * documentation and/or other materials provided with the distribution. 30 * 3. All advertising materials mentioning features or use of this software 31 * must display the following acknowledgement: 32 * "This product includes cryptographic software written by 33 * Eric Young (eay@cryptsoft.com)" 34 * The word 'cryptographic' can be left out if the rouines from the library 35 * being used are not cryptographic related :-). 36 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * the apps directory (application code) you must include an acknowledgement: 38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * SUCH DAMAGE. 51 * 52 * The licence and distribution terms for any publically available version or 53 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * copied and put under another distribution licence 55 * [including the GNU Public Licence.] 56 */ 57 58 #include <sys/cdefs.h> 59 __KERNEL_RCSID(0, "$NetBSD: des_cbc.c,v 1.5 2001/11/13 01:40:09 lukem Exp $"); 60 61 #include <crypto/des/des_locl.h> 62 63 void des_ncbc_encrypt(const unsigned char *in, unsigned char *out, long length, 64 des_key_schedule schedule, des_cblock *ivec, int enc) 65 { 66 register DES_LONG tin0,tin1; 67 register DES_LONG tout0,tout1,xor0,xor1; 68 register long l=length; 69 DES_LONG tin[2]; 70 unsigned char *iv; 71 72 iv = &(*ivec)[0]; 73 74 if (enc) 75 { 76 c2l(iv,tout0); 77 c2l(iv,tout1); 78 for (l-=8; l>=0; l-=8) 79 { 80 c2l(in,tin0); 81 c2l(in,tin1); 82 tin0^=tout0; tin[0]=tin0; 83 tin1^=tout1; tin[1]=tin1; 84 des_encrypt1((DES_LONG *)tin,schedule,DES_ENCRYPT); 85 tout0=tin[0]; l2c(tout0,out); 86 tout1=tin[1]; l2c(tout1,out); 87 } 88 if (l != -8) 89 { 90 c2ln(in,tin0,tin1,l+8); 91 tin0^=tout0; tin[0]=tin0; 92 tin1^=tout1; tin[1]=tin1; 93 des_encrypt1((DES_LONG *)tin,schedule,DES_ENCRYPT); 94 tout0=tin[0]; l2c(tout0,out); 95 tout1=tin[1]; l2c(tout1,out); 96 } 97 iv = &(*ivec)[0]; 98 l2c(tout0,iv); 99 l2c(tout1,iv); 100 } 101 else 102 { 103 c2l(iv,xor0); 104 c2l(iv,xor1); 105 for (l-=8; l>=0; l-=8) 106 { 107 c2l(in,tin0); tin[0]=tin0; 108 c2l(in,tin1); tin[1]=tin1; 109 des_encrypt1((DES_LONG *)tin,schedule,DES_DECRYPT); 110 tout0=tin[0]^xor0; 111 tout1=tin[1]^xor1; 112 l2c(tout0,out); 113 l2c(tout1,out); 114 xor0=tin0; 115 xor1=tin1; 116 } 117 if (l != -8) 118 { 119 c2l(in,tin0); tin[0]=tin0; 120 c2l(in,tin1); tin[1]=tin1; 121 des_encrypt1((DES_LONG *)tin,schedule,DES_DECRYPT); 122 tout0=tin[0]^xor0; 123 tout1=tin[1]^xor1; 124 l2cn(tout0,tout1,out,l+8); 125 xor0=tin0; 126 xor1=tin1; 127 } 128 iv = &(*ivec)[0]; 129 l2c(xor0,iv); 130 l2c(xor1,iv); 131 } 132 tin0=tin1=tout0=tout1=xor0=xor1=0; 133 tin[0]=tin[1]=0; 134 } 135 136 void des_ede3_cbc_encrypt(const unsigned char *input, unsigned char *output, 137 long length, des_key_schedule ks1, des_key_schedule ks2, 138 des_key_schedule ks3, des_cblock *ivec, int enc) 139 { 140 register DES_LONG tin0,tin1; 141 register DES_LONG tout0,tout1,xor0,xor1; 142 register const unsigned char *in; 143 unsigned char *out; 144 register long l=length; 145 DES_LONG tin[2]; 146 unsigned char *iv; 147 148 in=input; 149 out=output; 150 iv = &(*ivec)[0]; 151 152 if (enc) 153 { 154 c2l(iv,tout0); 155 c2l(iv,tout1); 156 for (l-=8; l>=0; l-=8) 157 { 158 c2l(in,tin0); 159 c2l(in,tin1); 160 tin0^=tout0; 161 tin1^=tout1; 162 163 tin[0]=tin0; 164 tin[1]=tin1; 165 des_encrypt3((DES_LONG *)tin,ks1,ks2,ks3); 166 tout0=tin[0]; 167 tout1=tin[1]; 168 169 l2c(tout0,out); 170 l2c(tout1,out); 171 } 172 if (l != -8) 173 { 174 c2ln(in,tin0,tin1,l+8); 175 tin0^=tout0; 176 tin1^=tout1; 177 178 tin[0]=tin0; 179 tin[1]=tin1; 180 des_encrypt3((DES_LONG *)tin,ks1,ks2,ks3); 181 tout0=tin[0]; 182 tout1=tin[1]; 183 184 l2c(tout0,out); 185 l2c(tout1,out); 186 } 187 iv = &(*ivec)[0]; 188 l2c(tout0,iv); 189 l2c(tout1,iv); 190 } 191 else 192 { 193 register DES_LONG t0,t1; 194 195 c2l(iv,xor0); 196 c2l(iv,xor1); 197 for (l-=8; l>=0; l-=8) 198 { 199 c2l(in,tin0); 200 c2l(in,tin1); 201 202 t0=tin0; 203 t1=tin1; 204 205 tin[0]=tin0; 206 tin[1]=tin1; 207 des_decrypt3((DES_LONG *)tin,ks1,ks2,ks3); 208 tout0=tin[0]; 209 tout1=tin[1]; 210 211 tout0^=xor0; 212 tout1^=xor1; 213 l2c(tout0,out); 214 l2c(tout1,out); 215 xor0=t0; 216 xor1=t1; 217 } 218 if (l != -8) 219 { 220 c2l(in,tin0); 221 c2l(in,tin1); 222 223 t0=tin0; 224 t1=tin1; 225 226 tin[0]=tin0; 227 tin[1]=tin1; 228 des_decrypt3((DES_LONG *)tin,ks1,ks2,ks3); 229 tout0=tin[0]; 230 tout1=tin[1]; 231 232 tout0^=xor0; 233 tout1^=xor1; 234 l2cn(tout0,tout1,out,l+8); 235 xor0=t0; 236 xor1=t1; 237 } 238 239 iv = &(*ivec)[0]; 240 l2c(xor0,iv); 241 l2c(xor1,iv); 242 } 243 tin0=tin1=tout0=tout1=xor0=xor1=0; 244 tin[0]=tin[1]=0; 245 } 246