879 lines
33 KiB
C
879 lines
33 KiB
C
// Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
#include <openssl/des.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include "internal.h"
|
|
|
|
|
|
/* IP and FP
|
|
* The problem is more of a geometric problem that random bit fiddling.
|
|
0 1 2 3 4 5 6 7 62 54 46 38 30 22 14 6
|
|
8 9 10 11 12 13 14 15 60 52 44 36 28 20 12 4
|
|
16 17 18 19 20 21 22 23 58 50 42 34 26 18 10 2
|
|
24 25 26 27 28 29 30 31 to 56 48 40 32 24 16 8 0
|
|
|
|
32 33 34 35 36 37 38 39 63 55 47 39 31 23 15 7
|
|
40 41 42 43 44 45 46 47 61 53 45 37 29 21 13 5
|
|
48 49 50 51 52 53 54 55 59 51 43 35 27 19 11 3
|
|
56 57 58 59 60 61 62 63 57 49 41 33 25 17 9 1
|
|
|
|
The output has been subject to swaps of the form
|
|
0 1 -> 3 1 but the odd and even bits have been put into
|
|
2 3 2 0
|
|
different words. The main trick is to remember that
|
|
t=((l>>size)^r)&(mask);
|
|
r^=t;
|
|
l^=(t<<size);
|
|
can be used to swap and move bits between words.
|
|
|
|
So l = 0 1 2 3 r = 16 17 18 19
|
|
4 5 6 7 20 21 22 23
|
|
8 9 10 11 24 25 26 27
|
|
12 13 14 15 28 29 30 31
|
|
becomes (for size == 2 and mask == 0x3333)
|
|
t = 2^16 3^17 -- -- l = 0 1 16 17 r = 2 3 18 19
|
|
6^20 7^21 -- -- 4 5 20 21 6 7 22 23
|
|
10^24 11^25 -- -- 8 9 24 25 10 11 24 25
|
|
14^28 15^29 -- -- 12 13 28 29 14 15 28 29
|
|
|
|
Thanks for hints from Richard Outerbridge - he told me IP&FP
|
|
could be done in 15 xor, 10 shifts and 5 ands.
|
|
When I finally started to think of the problem in 2D
|
|
I first got ~42 operations without xors. When I remembered
|
|
how to use xors :-) I got it to its final state.
|
|
*/
|
|
#define PERM_OP(a, b, t, n, m) \
|
|
do { \
|
|
(t) = ((((a) >> (n)) ^ (b)) & (m)); \
|
|
(b) ^= (t); \
|
|
(a) ^= ((t) << (n)); \
|
|
} while (0)
|
|
|
|
#define IP(l, r) \
|
|
do { \
|
|
uint32_t tt; \
|
|
PERM_OP(r, l, tt, 4, 0x0f0f0f0fL); \
|
|
PERM_OP(l, r, tt, 16, 0x0000ffffL); \
|
|
PERM_OP(r, l, tt, 2, 0x33333333L); \
|
|
PERM_OP(l, r, tt, 8, 0x00ff00ffL); \
|
|
PERM_OP(r, l, tt, 1, 0x55555555L); \
|
|
} while (0)
|
|
|
|
#define FP(l, r) \
|
|
do { \
|
|
uint32_t tt; \
|
|
PERM_OP(l, r, tt, 1, 0x55555555L); \
|
|
PERM_OP(r, l, tt, 8, 0x00ff00ffL); \
|
|
PERM_OP(l, r, tt, 2, 0x33333333L); \
|
|
PERM_OP(r, l, tt, 16, 0x0000ffffL); \
|
|
PERM_OP(l, r, tt, 4, 0x0f0f0f0fL); \
|
|
} while (0)
|
|
|
|
#define LOAD_DATA(ks, R, S, u, t, E0, E1) \
|
|
do { \
|
|
(u) = (R) ^ (ks)->subkeys[S][0]; \
|
|
(t) = (R) ^ (ks)->subkeys[S][1]; \
|
|
} while (0)
|
|
|
|
#define D_ENCRYPT(ks, LL, R, S) \
|
|
do { \
|
|
LOAD_DATA(ks, R, S, u, t, E0, E1); \
|
|
t = CRYPTO_rotr_u32(t, 4); \
|
|
(LL) ^= \
|
|
DES_SPtrans[0][(u >> 2L) & 0x3f] ^ DES_SPtrans[2][(u >> 10L) & 0x3f] ^ \
|
|
DES_SPtrans[4][(u >> 18L) & 0x3f] ^ \
|
|
DES_SPtrans[6][(u >> 26L) & 0x3f] ^ DES_SPtrans[1][(t >> 2L) & 0x3f] ^ \
|
|
DES_SPtrans[3][(t >> 10L) & 0x3f] ^ \
|
|
DES_SPtrans[5][(t >> 18L) & 0x3f] ^ DES_SPtrans[7][(t >> 26L) & 0x3f]; \
|
|
} while (0)
|
|
|
|
#define ITERATIONS 16
|
|
#define HALF_ITERATIONS 8
|
|
|
|
static const uint32_t des_skb[8][64] = {
|
|
{ // for C bits (numbered as per FIPS 46) 1 2 3 4 5 6
|
|
0x00000000, 0x00000010, 0x20000000, 0x20000010, 0x00010000,
|
|
0x00010010, 0x20010000, 0x20010010, 0x00000800, 0x00000810,
|
|
0x20000800, 0x20000810, 0x00010800, 0x00010810, 0x20010800,
|
|
0x20010810, 0x00000020, 0x00000030, 0x20000020, 0x20000030,
|
|
0x00010020, 0x00010030, 0x20010020, 0x20010030, 0x00000820,
|
|
0x00000830, 0x20000820, 0x20000830, 0x00010820, 0x00010830,
|
|
0x20010820, 0x20010830, 0x00080000, 0x00080010, 0x20080000,
|
|
0x20080010, 0x00090000, 0x00090010, 0x20090000, 0x20090010,
|
|
0x00080800, 0x00080810, 0x20080800, 0x20080810, 0x00090800,
|
|
0x00090810, 0x20090800, 0x20090810, 0x00080020, 0x00080030,
|
|
0x20080020, 0x20080030, 0x00090020, 0x00090030, 0x20090020,
|
|
0x20090030, 0x00080820, 0x00080830, 0x20080820, 0x20080830,
|
|
0x00090820, 0x00090830, 0x20090820, 0x20090830, },
|
|
{ // for C bits (numbered as per FIPS 46) 7 8 10 11 12 13
|
|
0x00000000, 0x02000000, 0x00002000, 0x02002000, 0x00200000,
|
|
0x02200000, 0x00202000, 0x02202000, 0x00000004, 0x02000004,
|
|
0x00002004, 0x02002004, 0x00200004, 0x02200004, 0x00202004,
|
|
0x02202004, 0x00000400, 0x02000400, 0x00002400, 0x02002400,
|
|
0x00200400, 0x02200400, 0x00202400, 0x02202400, 0x00000404,
|
|
0x02000404, 0x00002404, 0x02002404, 0x00200404, 0x02200404,
|
|
0x00202404, 0x02202404, 0x10000000, 0x12000000, 0x10002000,
|
|
0x12002000, 0x10200000, 0x12200000, 0x10202000, 0x12202000,
|
|
0x10000004, 0x12000004, 0x10002004, 0x12002004, 0x10200004,
|
|
0x12200004, 0x10202004, 0x12202004, 0x10000400, 0x12000400,
|
|
0x10002400, 0x12002400, 0x10200400, 0x12200400, 0x10202400,
|
|
0x12202400, 0x10000404, 0x12000404, 0x10002404, 0x12002404,
|
|
0x10200404, 0x12200404, 0x10202404, 0x12202404, },
|
|
{ // for C bits (numbered as per FIPS 46) 14 15 16 17 19 20
|
|
0x00000000, 0x00000001, 0x00040000, 0x00040001, 0x01000000,
|
|
0x01000001, 0x01040000, 0x01040001, 0x00000002, 0x00000003,
|
|
0x00040002, 0x00040003, 0x01000002, 0x01000003, 0x01040002,
|
|
0x01040003, 0x00000200, 0x00000201, 0x00040200, 0x00040201,
|
|
0x01000200, 0x01000201, 0x01040200, 0x01040201, 0x00000202,
|
|
0x00000203, 0x00040202, 0x00040203, 0x01000202, 0x01000203,
|
|
0x01040202, 0x01040203, 0x08000000, 0x08000001, 0x08040000,
|
|
0x08040001, 0x09000000, 0x09000001, 0x09040000, 0x09040001,
|
|
0x08000002, 0x08000003, 0x08040002, 0x08040003, 0x09000002,
|
|
0x09000003, 0x09040002, 0x09040003, 0x08000200, 0x08000201,
|
|
0x08040200, 0x08040201, 0x09000200, 0x09000201, 0x09040200,
|
|
0x09040201, 0x08000202, 0x08000203, 0x08040202, 0x08040203,
|
|
0x09000202, 0x09000203, 0x09040202, 0x09040203, },
|
|
{ // for C bits (numbered as per FIPS 46) 21 23 24 26 27 28
|
|
0x00000000, 0x00100000, 0x00000100, 0x00100100, 0x00000008,
|
|
0x00100008, 0x00000108, 0x00100108, 0x00001000, 0x00101000,
|
|
0x00001100, 0x00101100, 0x00001008, 0x00101008, 0x00001108,
|
|
0x00101108, 0x04000000, 0x04100000, 0x04000100, 0x04100100,
|
|
0x04000008, 0x04100008, 0x04000108, 0x04100108, 0x04001000,
|
|
0x04101000, 0x04001100, 0x04101100, 0x04001008, 0x04101008,
|
|
0x04001108, 0x04101108, 0x00020000, 0x00120000, 0x00020100,
|
|
0x00120100, 0x00020008, 0x00120008, 0x00020108, 0x00120108,
|
|
0x00021000, 0x00121000, 0x00021100, 0x00121100, 0x00021008,
|
|
0x00121008, 0x00021108, 0x00121108, 0x04020000, 0x04120000,
|
|
0x04020100, 0x04120100, 0x04020008, 0x04120008, 0x04020108,
|
|
0x04120108, 0x04021000, 0x04121000, 0x04021100, 0x04121100,
|
|
0x04021008, 0x04121008, 0x04021108, 0x04121108, },
|
|
{ // for D bits (numbered as per FIPS 46) 1 2 3 4 5 6
|
|
0x00000000, 0x10000000, 0x00010000, 0x10010000, 0x00000004,
|
|
0x10000004, 0x00010004, 0x10010004, 0x20000000, 0x30000000,
|
|
0x20010000, 0x30010000, 0x20000004, 0x30000004, 0x20010004,
|
|
0x30010004, 0x00100000, 0x10100000, 0x00110000, 0x10110000,
|
|
0x00100004, 0x10100004, 0x00110004, 0x10110004, 0x20100000,
|
|
0x30100000, 0x20110000, 0x30110000, 0x20100004, 0x30100004,
|
|
0x20110004, 0x30110004, 0x00001000, 0x10001000, 0x00011000,
|
|
0x10011000, 0x00001004, 0x10001004, 0x00011004, 0x10011004,
|
|
0x20001000, 0x30001000, 0x20011000, 0x30011000, 0x20001004,
|
|
0x30001004, 0x20011004, 0x30011004, 0x00101000, 0x10101000,
|
|
0x00111000, 0x10111000, 0x00101004, 0x10101004, 0x00111004,
|
|
0x10111004, 0x20101000, 0x30101000, 0x20111000, 0x30111000,
|
|
0x20101004, 0x30101004, 0x20111004, 0x30111004, },
|
|
{ // for D bits (numbered as per FIPS 46) 8 9 11 12 13 14
|
|
0x00000000, 0x08000000, 0x00000008, 0x08000008, 0x00000400,
|
|
0x08000400, 0x00000408, 0x08000408, 0x00020000, 0x08020000,
|
|
0x00020008, 0x08020008, 0x00020400, 0x08020400, 0x00020408,
|
|
0x08020408, 0x00000001, 0x08000001, 0x00000009, 0x08000009,
|
|
0x00000401, 0x08000401, 0x00000409, 0x08000409, 0x00020001,
|
|
0x08020001, 0x00020009, 0x08020009, 0x00020401, 0x08020401,
|
|
0x00020409, 0x08020409, 0x02000000, 0x0A000000, 0x02000008,
|
|
0x0A000008, 0x02000400, 0x0A000400, 0x02000408, 0x0A000408,
|
|
0x02020000, 0x0A020000, 0x02020008, 0x0A020008, 0x02020400,
|
|
0x0A020400, 0x02020408, 0x0A020408, 0x02000001, 0x0A000001,
|
|
0x02000009, 0x0A000009, 0x02000401, 0x0A000401, 0x02000409,
|
|
0x0A000409, 0x02020001, 0x0A020001, 0x02020009, 0x0A020009,
|
|
0x02020401, 0x0A020401, 0x02020409, 0x0A020409, },
|
|
{ // for D bits (numbered as per FIPS 46) 16 17 18 19 20 21
|
|
0x00000000, 0x00000100, 0x00080000, 0x00080100, 0x01000000,
|
|
0x01000100, 0x01080000, 0x01080100, 0x00000010, 0x00000110,
|
|
0x00080010, 0x00080110, 0x01000010, 0x01000110, 0x01080010,
|
|
0x01080110, 0x00200000, 0x00200100, 0x00280000, 0x00280100,
|
|
0x01200000, 0x01200100, 0x01280000, 0x01280100, 0x00200010,
|
|
0x00200110, 0x00280010, 0x00280110, 0x01200010, 0x01200110,
|
|
0x01280010, 0x01280110, 0x00000200, 0x00000300, 0x00080200,
|
|
0x00080300, 0x01000200, 0x01000300, 0x01080200, 0x01080300,
|
|
0x00000210, 0x00000310, 0x00080210, 0x00080310, 0x01000210,
|
|
0x01000310, 0x01080210, 0x01080310, 0x00200200, 0x00200300,
|
|
0x00280200, 0x00280300, 0x01200200, 0x01200300, 0x01280200,
|
|
0x01280300, 0x00200210, 0x00200310, 0x00280210, 0x00280310,
|
|
0x01200210, 0x01200310, 0x01280210, 0x01280310, },
|
|
{ // for D bits (numbered as per FIPS 46) 22 23 24 25 27 28
|
|
0x00000000, 0x04000000, 0x00040000, 0x04040000, 0x00000002,
|
|
0x04000002, 0x00040002, 0x04040002, 0x00002000, 0x04002000,
|
|
0x00042000, 0x04042000, 0x00002002, 0x04002002, 0x00042002,
|
|
0x04042002, 0x00000020, 0x04000020, 0x00040020, 0x04040020,
|
|
0x00000022, 0x04000022, 0x00040022, 0x04040022, 0x00002020,
|
|
0x04002020, 0x00042020, 0x04042020, 0x00002022, 0x04002022,
|
|
0x00042022, 0x04042022, 0x00000800, 0x04000800, 0x00040800,
|
|
0x04040800, 0x00000802, 0x04000802, 0x00040802, 0x04040802,
|
|
0x00002800, 0x04002800, 0x00042800, 0x04042800, 0x00002802,
|
|
0x04002802, 0x00042802, 0x04042802, 0x00000820, 0x04000820,
|
|
0x00040820, 0x04040820, 0x00000822, 0x04000822, 0x00040822,
|
|
0x04040822, 0x00002820, 0x04002820, 0x00042820, 0x04042820,
|
|
0x00002822, 0x04002822, 0x00042822, 0x04042822, }};
|
|
|
|
static const uint32_t DES_SPtrans[8][64] = {
|
|
{ // nibble 0
|
|
0x02080800, 0x00080000, 0x02000002, 0x02080802, 0x02000000,
|
|
0x00080802, 0x00080002, 0x02000002, 0x00080802, 0x02080800,
|
|
0x02080000, 0x00000802, 0x02000802, 0x02000000, 0x00000000,
|
|
0x00080002, 0x00080000, 0x00000002, 0x02000800, 0x00080800,
|
|
0x02080802, 0x02080000, 0x00000802, 0x02000800, 0x00000002,
|
|
0x00000800, 0x00080800, 0x02080002, 0x00000800, 0x02000802,
|
|
0x02080002, 0x00000000, 0x00000000, 0x02080802, 0x02000800,
|
|
0x00080002, 0x02080800, 0x00080000, 0x00000802, 0x02000800,
|
|
0x02080002, 0x00000800, 0x00080800, 0x02000002, 0x00080802,
|
|
0x00000002, 0x02000002, 0x02080000, 0x02080802, 0x00080800,
|
|
0x02080000, 0x02000802, 0x02000000, 0x00000802, 0x00080002,
|
|
0x00000000, 0x00080000, 0x02000000, 0x02000802, 0x02080800,
|
|
0x00000002, 0x02080002, 0x00000800, 0x00080802, },
|
|
{ // nibble 1
|
|
0x40108010, 0x00000000, 0x00108000, 0x40100000, 0x40000010,
|
|
0x00008010, 0x40008000, 0x00108000, 0x00008000, 0x40100010,
|
|
0x00000010, 0x40008000, 0x00100010, 0x40108000, 0x40100000,
|
|
0x00000010, 0x00100000, 0x40008010, 0x40100010, 0x00008000,
|
|
0x00108010, 0x40000000, 0x00000000, 0x00100010, 0x40008010,
|
|
0x00108010, 0x40108000, 0x40000010, 0x40000000, 0x00100000,
|
|
0x00008010, 0x40108010, 0x00100010, 0x40108000, 0x40008000,
|
|
0x00108010, 0x40108010, 0x00100010, 0x40000010, 0x00000000,
|
|
0x40000000, 0x00008010, 0x00100000, 0x40100010, 0x00008000,
|
|
0x40000000, 0x00108010, 0x40008010, 0x40108000, 0x00008000,
|
|
0x00000000, 0x40000010, 0x00000010, 0x40108010, 0x00108000,
|
|
0x40100000, 0x40100010, 0x00100000, 0x00008010, 0x40008000,
|
|
0x40008010, 0x00000010, 0x40100000, 0x00108000, },
|
|
{ // nibble 2
|
|
0x04000001, 0x04040100, 0x00000100, 0x04000101, 0x00040001,
|
|
0x04000000, 0x04000101, 0x00040100, 0x04000100, 0x00040000,
|
|
0x04040000, 0x00000001, 0x04040101, 0x00000101, 0x00000001,
|
|
0x04040001, 0x00000000, 0x00040001, 0x04040100, 0x00000100,
|
|
0x00000101, 0x04040101, 0x00040000, 0x04000001, 0x04040001,
|
|
0x04000100, 0x00040101, 0x04040000, 0x00040100, 0x00000000,
|
|
0x04000000, 0x00040101, 0x04040100, 0x00000100, 0x00000001,
|
|
0x00040000, 0x00000101, 0x00040001, 0x04040000, 0x04000101,
|
|
0x00000000, 0x04040100, 0x00040100, 0x04040001, 0x00040001,
|
|
0x04000000, 0x04040101, 0x00000001, 0x00040101, 0x04000001,
|
|
0x04000000, 0x04040101, 0x00040000, 0x04000100, 0x04000101,
|
|
0x00040100, 0x04000100, 0x00000000, 0x04040001, 0x00000101,
|
|
0x04000001, 0x00040101, 0x00000100, 0x04040000, },
|
|
{ // nibble 3
|
|
0x00401008, 0x10001000, 0x00000008, 0x10401008, 0x00000000,
|
|
0x10400000, 0x10001008, 0x00400008, 0x10401000, 0x10000008,
|
|
0x10000000, 0x00001008, 0x10000008, 0x00401008, 0x00400000,
|
|
0x10000000, 0x10400008, 0x00401000, 0x00001000, 0x00000008,
|
|
0x00401000, 0x10001008, 0x10400000, 0x00001000, 0x00001008,
|
|
0x00000000, 0x00400008, 0x10401000, 0x10001000, 0x10400008,
|
|
0x10401008, 0x00400000, 0x10400008, 0x00001008, 0x00400000,
|
|
0x10000008, 0x00401000, 0x10001000, 0x00000008, 0x10400000,
|
|
0x10001008, 0x00000000, 0x00001000, 0x00400008, 0x00000000,
|
|
0x10400008, 0x10401000, 0x00001000, 0x10000000, 0x10401008,
|
|
0x00401008, 0x00400000, 0x10401008, 0x00000008, 0x10001000,
|
|
0x00401008, 0x00400008, 0x00401000, 0x10400000, 0x10001008,
|
|
0x00001008, 0x10000000, 0x10000008, 0x10401000, },
|
|
{ // nibble 4
|
|
0x08000000, 0x00010000, 0x00000400, 0x08010420, 0x08010020,
|
|
0x08000400, 0x00010420, 0x08010000, 0x00010000, 0x00000020,
|
|
0x08000020, 0x00010400, 0x08000420, 0x08010020, 0x08010400,
|
|
0x00000000, 0x00010400, 0x08000000, 0x00010020, 0x00000420,
|
|
0x08000400, 0x00010420, 0x00000000, 0x08000020, 0x00000020,
|
|
0x08000420, 0x08010420, 0x00010020, 0x08010000, 0x00000400,
|
|
0x00000420, 0x08010400, 0x08010400, 0x08000420, 0x00010020,
|
|
0x08010000, 0x00010000, 0x00000020, 0x08000020, 0x08000400,
|
|
0x08000000, 0x00010400, 0x08010420, 0x00000000, 0x00010420,
|
|
0x08000000, 0x00000400, 0x00010020, 0x08000420, 0x00000400,
|
|
0x00000000, 0x08010420, 0x08010020, 0x08010400, 0x00000420,
|
|
0x00010000, 0x00010400, 0x08010020, 0x08000400, 0x00000420,
|
|
0x00000020, 0x00010420, 0x08010000, 0x08000020, },
|
|
{ // nibble 5
|
|
0x80000040, 0x00200040, 0x00000000, 0x80202000, 0x00200040,
|
|
0x00002000, 0x80002040, 0x00200000, 0x00002040, 0x80202040,
|
|
0x00202000, 0x80000000, 0x80002000, 0x80000040, 0x80200000,
|
|
0x00202040, 0x00200000, 0x80002040, 0x80200040, 0x00000000,
|
|
0x00002000, 0x00000040, 0x80202000, 0x80200040, 0x80202040,
|
|
0x80200000, 0x80000000, 0x00002040, 0x00000040, 0x00202000,
|
|
0x00202040, 0x80002000, 0x00002040, 0x80000000, 0x80002000,
|
|
0x00202040, 0x80202000, 0x00200040, 0x00000000, 0x80002000,
|
|
0x80000000, 0x00002000, 0x80200040, 0x00200000, 0x00200040,
|
|
0x80202040, 0x00202000, 0x00000040, 0x80202040, 0x00202000,
|
|
0x00200000, 0x80002040, 0x80000040, 0x80200000, 0x00202040,
|
|
0x00000000, 0x00002000, 0x80000040, 0x80002040, 0x80202000,
|
|
0x80200000, 0x00002040, 0x00000040, 0x80200040, },
|
|
{ // nibble 6
|
|
0x00004000, 0x00000200, 0x01000200, 0x01000004, 0x01004204,
|
|
0x00004004, 0x00004200, 0x00000000, 0x01000000, 0x01000204,
|
|
0x00000204, 0x01004000, 0x00000004, 0x01004200, 0x01004000,
|
|
0x00000204, 0x01000204, 0x00004000, 0x00004004, 0x01004204,
|
|
0x00000000, 0x01000200, 0x01000004, 0x00004200, 0x01004004,
|
|
0x00004204, 0x01004200, 0x00000004, 0x00004204, 0x01004004,
|
|
0x00000200, 0x01000000, 0x00004204, 0x01004000, 0x01004004,
|
|
0x00000204, 0x00004000, 0x00000200, 0x01000000, 0x01004004,
|
|
0x01000204, 0x00004204, 0x00004200, 0x00000000, 0x00000200,
|
|
0x01000004, 0x00000004, 0x01000200, 0x00000000, 0x01000204,
|
|
0x01000200, 0x00004200, 0x00000204, 0x00004000, 0x01004204,
|
|
0x01000000, 0x01004200, 0x00000004, 0x00004004, 0x01004204,
|
|
0x01000004, 0x01004200, 0x01004000, 0x00004004, },
|
|
{ // nibble 7
|
|
0x20800080, 0x20820000, 0x00020080, 0x00000000, 0x20020000,
|
|
0x00800080, 0x20800000, 0x20820080, 0x00000080, 0x20000000,
|
|
0x00820000, 0x00020080, 0x00820080, 0x20020080, 0x20000080,
|
|
0x20800000, 0x00020000, 0x00820080, 0x00800080, 0x20020000,
|
|
0x20820080, 0x20000080, 0x00000000, 0x00820000, 0x20000000,
|
|
0x00800000, 0x20020080, 0x20800080, 0x00800000, 0x00020000,
|
|
0x20820000, 0x00000080, 0x00800000, 0x00020000, 0x20000080,
|
|
0x20820080, 0x00020080, 0x20000000, 0x00000000, 0x00820000,
|
|
0x20800080, 0x20020080, 0x20020000, 0x00800080, 0x20820000,
|
|
0x00000080, 0x00800080, 0x20020000, 0x20820080, 0x00800000,
|
|
0x20800000, 0x20000080, 0x00820000, 0x00020080, 0x20020080,
|
|
0x20800000, 0x00000080, 0x20820000, 0x00820080, 0x00000000,
|
|
0x20000000, 0x20800080, 0x00020000, 0x00820080, }};
|
|
|
|
#define HPERM_OP(a, t, n, m) \
|
|
((t) = ((((a) << (16 - (n))) ^ (a)) & (m)), \
|
|
(a) = (a) ^ (t) ^ ((t) >> (16 - (n))))
|
|
|
|
void DES_set_key_unchecked(const DES_cblock *key, DES_key_schedule *schedule) {
|
|
DES_set_key_ex(key->bytes, schedule);
|
|
}
|
|
|
|
void DES_set_key_ex(const uint8_t key[8], DES_key_schedule *schedule) {
|
|
static const int shifts2[16] = {0, 0, 1, 1, 1, 1, 1, 1,
|
|
0, 1, 1, 1, 1, 1, 1, 0};
|
|
uint32_t c, d, t, s, t2;
|
|
const uint8_t *in;
|
|
int i;
|
|
|
|
in = key;
|
|
|
|
c2l(in, c);
|
|
c2l(in, d);
|
|
|
|
// do PC1 in 47 simple operations :-)
|
|
// Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov)
|
|
// for the inspiration. :-)
|
|
PERM_OP(d, c, t, 4, 0x0f0f0f0f);
|
|
HPERM_OP(c, t, -2, 0xcccc0000);
|
|
HPERM_OP(d, t, -2, 0xcccc0000);
|
|
PERM_OP(d, c, t, 1, 0x55555555);
|
|
PERM_OP(c, d, t, 8, 0x00ff00ff);
|
|
PERM_OP(d, c, t, 1, 0x55555555);
|
|
d = (((d & 0x000000ff) << 16) | (d & 0x0000ff00) |
|
|
((d & 0x00ff0000) >> 16) | ((c & 0xf0000000) >> 4));
|
|
c &= 0x0fffffff;
|
|
|
|
for (i = 0; i < ITERATIONS; i++) {
|
|
if (shifts2[i]) {
|
|
c = ((c >> 2) | (c << 26));
|
|
d = ((d >> 2) | (d << 26));
|
|
} else {
|
|
c = ((c >> 1) | (c << 27));
|
|
d = ((d >> 1) | (d << 27));
|
|
}
|
|
c &= 0x0fffffff;
|
|
d &= 0x0fffffff;
|
|
// could be a few less shifts but I am to lazy at this
|
|
// point in time to investigate
|
|
s = des_skb[0][(c) & 0x3f] |
|
|
des_skb[1][((c >> 6) & 0x03) | ((c >> 7) & 0x3c)] |
|
|
des_skb[2][((c >> 13) & 0x0f) | ((c >> 14) & 0x30)] |
|
|
des_skb[3][((c >> 20) & 0x01) | ((c >> 21) & 0x06) |
|
|
((c >> 22) & 0x38)];
|
|
t = des_skb[4][(d) & 0x3f] |
|
|
des_skb[5][((d >> 7) & 0x03) | ((d >> 8) & 0x3c)] |
|
|
des_skb[6][(d >> 15) & 0x3f] |
|
|
des_skb[7][((d >> 21) & 0x0f) | ((d >> 22) & 0x30)];
|
|
|
|
// table contained 0213 4657
|
|
t2 = ((t << 16) | (s & 0x0000ffff)) & 0xffffffff;
|
|
schedule->subkeys[i][0] = CRYPTO_rotr_u32(t2, 30);
|
|
|
|
t2 = ((s >> 16) | (t & 0xffff0000));
|
|
schedule->subkeys[i][1] = CRYPTO_rotr_u32(t2, 26);
|
|
}
|
|
}
|
|
|
|
// SP 800-67r2 section 2, the last bit of each byte in DES_cblock.bytes is used
|
|
// for parity. The parity bits should be set to the complement of the modulo 2
|
|
// sum of the previous seven bits
|
|
static int DES_check_key_parity(const DES_cblock *key) {
|
|
uint8_t result = UINT8_MAX;
|
|
|
|
for (size_t i = 0; i < DES_KEY_SZ; i++) {
|
|
uint8_t b = key->bytes[i];
|
|
b ^= b >> 4;
|
|
b ^= b >> 2;
|
|
b ^= b >> 1;
|
|
result &= constant_time_eq_8(b & 1, 1);
|
|
}
|
|
return result & 1;
|
|
}
|
|
|
|
int DES_set_key(const DES_cblock *key, DES_key_schedule *schedule)
|
|
{
|
|
int result = 0;
|
|
|
|
if (!DES_check_key_parity(key)) {
|
|
result = -1;
|
|
}
|
|
if (DES_is_weak_key(key)) {
|
|
result = -2;
|
|
}
|
|
DES_set_key_unchecked(key, schedule);
|
|
return result;
|
|
}
|
|
|
|
int DES_key_sched(const DES_cblock *key, DES_key_schedule *schedule) {
|
|
return DES_set_key(key, schedule);
|
|
}
|
|
|
|
static const uint8_t kOddParity[256] = {
|
|
1, 1, 2, 2, 4, 4, 7, 7, 8, 8, 11, 11, 13, 13, 14,
|
|
14, 16, 16, 19, 19, 21, 21, 22, 22, 25, 25, 26, 26, 28, 28,
|
|
31, 31, 32, 32, 35, 35, 37, 37, 38, 38, 41, 41, 42, 42, 44,
|
|
44, 47, 47, 49, 49, 50, 50, 52, 52, 55, 55, 56, 56, 59, 59,
|
|
61, 61, 62, 62, 64, 64, 67, 67, 69, 69, 70, 70, 73, 73, 74,
|
|
74, 76, 76, 79, 79, 81, 81, 82, 82, 84, 84, 87, 87, 88, 88,
|
|
91, 91, 93, 93, 94, 94, 97, 97, 98, 98, 100, 100, 103, 103, 104,
|
|
104, 107, 107, 109, 109, 110, 110, 112, 112, 115, 115, 117, 117, 118, 118,
|
|
121, 121, 122, 122, 124, 124, 127, 127, 128, 128, 131, 131, 133, 133, 134,
|
|
134, 137, 137, 138, 138, 140, 140, 143, 143, 145, 145, 146, 146, 148, 148,
|
|
151, 151, 152, 152, 155, 155, 157, 157, 158, 158, 161, 161, 162, 162, 164,
|
|
164, 167, 167, 168, 168, 171, 171, 173, 173, 174, 174, 176, 176, 179, 179,
|
|
181, 181, 182, 182, 185, 185, 186, 186, 188, 188, 191, 191, 193, 193, 194,
|
|
194, 196, 196, 199, 199, 200, 200, 203, 203, 205, 205, 206, 206, 208, 208,
|
|
211, 211, 213, 213, 214, 214, 217, 217, 218, 218, 220, 220, 223, 223, 224,
|
|
224, 227, 227, 229, 229, 230, 230, 233, 233, 234, 234, 236, 236, 239, 239,
|
|
241, 241, 242, 242, 244, 244, 247, 247, 248, 248, 251, 251, 253, 253, 254,
|
|
254
|
|
};
|
|
|
|
void DES_set_odd_parity(DES_cblock *key) {
|
|
unsigned i;
|
|
|
|
for (i = 0; i < DES_KEY_SZ; i++) {
|
|
key->bytes[i] = kOddParity[key->bytes[i]];
|
|
}
|
|
}
|
|
|
|
// Weak keys have unintended behaviors which may hurt the security of their use
|
|
// see SP 800-67r2 section 3.3.2
|
|
static const DES_cblock weak_keys[] = {
|
|
// Weak keys: encryption is equal to decryption (encrypting twice produces the original plaintext)
|
|
{{0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01}},
|
|
{{0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE}},
|
|
{{0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E}},
|
|
{{0xE0, 0xE0, 0xE0, 0xE0, 0xF1, 0xF1, 0xF1, 0xF1}},
|
|
// Semi-weak keys: encryption with one of these keys is equal to encryption with a different key
|
|
{{0x01, 0xFE, 0x01, 0xFE, 0x01, 0xFE, 0x01, 0xFE}},
|
|
{{0xFE, 0x01, 0xFE, 0x01, 0xFE, 0x01, 0xFE, 0x01}},
|
|
{{0x1F, 0xE0, 0x1F, 0xE0, 0x0E, 0xF1, 0x0E, 0xF1}},
|
|
{{0xE0, 0x1F, 0xE0, 0x1F, 0xF1, 0x0E, 0xF1, 0x0E}},
|
|
{{0x01, 0xE0, 0x01, 0xE0, 0x01, 0xF1, 0x01, 0xF1}},
|
|
{{0xE0, 0x01, 0xE0, 0x01, 0xF1, 0x01, 0xF1, 0x01}},
|
|
{{0x1F, 0xFE, 0x1F, 0xFE, 0x0E, 0xFE, 0x0E, 0xFE}},
|
|
{{0xFE, 0x1F, 0xFE, 0x1F, 0xFE, 0x0E, 0xFE, 0x0E}},
|
|
{{0x01, 0x1F, 0x01, 0x1F, 0x01, 0x0E, 0x01, 0x0E}},
|
|
{{0x1F, 0x01, 0x1F, 0x01, 0x0E, 0x01, 0x0E, 0x01}},
|
|
{{0xE0, 0xFE, 0xE0, 0xFE, 0xF1, 0xFE, 0xF1, 0xFE}},
|
|
{{0xFE, 0xE0, 0xFE, 0xE0, 0xFE, 0xF1, 0xFE, 0xF1}}
|
|
};
|
|
|
|
int DES_is_weak_key(const DES_cblock *key)
|
|
{
|
|
crypto_word_t result = 0;
|
|
for (size_t i = 0; i < OPENSSL_ARRAY_SIZE(weak_keys); i++) {
|
|
int match = CRYPTO_memcmp(&weak_keys[i], key, sizeof(DES_cblock));
|
|
result |= constant_time_is_zero_w(match);
|
|
}
|
|
return (int)(result & 1);
|
|
}
|
|
|
|
static void DES_encrypt1(uint32_t data[2], const DES_key_schedule *ks,
|
|
int enc) {
|
|
uint32_t l, r, t, u;
|
|
|
|
r = data[0];
|
|
l = data[1];
|
|
|
|
IP(r, l);
|
|
// Things have been modified so that the initial rotate is done outside
|
|
// the loop. This required the DES_SPtrans values in sp.h to be
|
|
// rotated 1 bit to the right. One perl script later and things have a
|
|
// 5% speed up on a sparc2. Thanks to Richard Outerbridge
|
|
// <71755.204@CompuServe.COM> for pointing this out.
|
|
// clear the top bits on machines with 8byte longs
|
|
// shift left by 2
|
|
r = CRYPTO_rotr_u32(r, 29);
|
|
l = CRYPTO_rotr_u32(l, 29);
|
|
|
|
// I don't know if it is worth the effort of loop unrolling the
|
|
// inner loop
|
|
if (enc) {
|
|
D_ENCRYPT(ks, l, r, 0);
|
|
D_ENCRYPT(ks, r, l, 1);
|
|
D_ENCRYPT(ks, l, r, 2);
|
|
D_ENCRYPT(ks, r, l, 3);
|
|
D_ENCRYPT(ks, l, r, 4);
|
|
D_ENCRYPT(ks, r, l, 5);
|
|
D_ENCRYPT(ks, l, r, 6);
|
|
D_ENCRYPT(ks, r, l, 7);
|
|
D_ENCRYPT(ks, l, r, 8);
|
|
D_ENCRYPT(ks, r, l, 9);
|
|
D_ENCRYPT(ks, l, r, 10);
|
|
D_ENCRYPT(ks, r, l, 11);
|
|
D_ENCRYPT(ks, l, r, 12);
|
|
D_ENCRYPT(ks, r, l, 13);
|
|
D_ENCRYPT(ks, l, r, 14);
|
|
D_ENCRYPT(ks, r, l, 15);
|
|
} else {
|
|
D_ENCRYPT(ks, l, r, 15);
|
|
D_ENCRYPT(ks, r, l, 14);
|
|
D_ENCRYPT(ks, l, r, 13);
|
|
D_ENCRYPT(ks, r, l, 12);
|
|
D_ENCRYPT(ks, l, r, 11);
|
|
D_ENCRYPT(ks, r, l, 10);
|
|
D_ENCRYPT(ks, l, r, 9);
|
|
D_ENCRYPT(ks, r, l, 8);
|
|
D_ENCRYPT(ks, l, r, 7);
|
|
D_ENCRYPT(ks, r, l, 6);
|
|
D_ENCRYPT(ks, l, r, 5);
|
|
D_ENCRYPT(ks, r, l, 4);
|
|
D_ENCRYPT(ks, l, r, 3);
|
|
D_ENCRYPT(ks, r, l, 2);
|
|
D_ENCRYPT(ks, l, r, 1);
|
|
D_ENCRYPT(ks, r, l, 0);
|
|
}
|
|
|
|
// rotate and clear the top bits on machines with 8byte longs
|
|
l = CRYPTO_rotr_u32(l, 3);
|
|
r = CRYPTO_rotr_u32(r, 3);
|
|
|
|
FP(r, l);
|
|
data[0] = l;
|
|
data[1] = r;
|
|
}
|
|
|
|
static void DES_encrypt2(uint32_t data[2], const DES_key_schedule *ks,
|
|
int enc) {
|
|
uint32_t l, r, t, u;
|
|
|
|
r = data[0];
|
|
l = data[1];
|
|
|
|
// Things have been modified so that the initial rotate is done outside the
|
|
// loop. This required the DES_SPtrans values in sp.h to be rotated 1 bit to
|
|
// the right. One perl script later and things have a 5% speed up on a
|
|
// sparc2. Thanks to Richard Outerbridge <71755.204@CompuServe.COM> for
|
|
// pointing this out.
|
|
// clear the top bits on machines with 8byte longs
|
|
r = CRYPTO_rotr_u32(r, 29);
|
|
l = CRYPTO_rotr_u32(l, 29);
|
|
|
|
// I don't know if it is worth the effort of loop unrolling the
|
|
// inner loop
|
|
if (enc) {
|
|
D_ENCRYPT(ks, l, r, 0);
|
|
D_ENCRYPT(ks, r, l, 1);
|
|
D_ENCRYPT(ks, l, r, 2);
|
|
D_ENCRYPT(ks, r, l, 3);
|
|
D_ENCRYPT(ks, l, r, 4);
|
|
D_ENCRYPT(ks, r, l, 5);
|
|
D_ENCRYPT(ks, l, r, 6);
|
|
D_ENCRYPT(ks, r, l, 7);
|
|
D_ENCRYPT(ks, l, r, 8);
|
|
D_ENCRYPT(ks, r, l, 9);
|
|
D_ENCRYPT(ks, l, r, 10);
|
|
D_ENCRYPT(ks, r, l, 11);
|
|
D_ENCRYPT(ks, l, r, 12);
|
|
D_ENCRYPT(ks, r, l, 13);
|
|
D_ENCRYPT(ks, l, r, 14);
|
|
D_ENCRYPT(ks, r, l, 15);
|
|
} else {
|
|
D_ENCRYPT(ks, l, r, 15);
|
|
D_ENCRYPT(ks, r, l, 14);
|
|
D_ENCRYPT(ks, l, r, 13);
|
|
D_ENCRYPT(ks, r, l, 12);
|
|
D_ENCRYPT(ks, l, r, 11);
|
|
D_ENCRYPT(ks, r, l, 10);
|
|
D_ENCRYPT(ks, l, r, 9);
|
|
D_ENCRYPT(ks, r, l, 8);
|
|
D_ENCRYPT(ks, l, r, 7);
|
|
D_ENCRYPT(ks, r, l, 6);
|
|
D_ENCRYPT(ks, l, r, 5);
|
|
D_ENCRYPT(ks, r, l, 4);
|
|
D_ENCRYPT(ks, l, r, 3);
|
|
D_ENCRYPT(ks, r, l, 2);
|
|
D_ENCRYPT(ks, l, r, 1);
|
|
D_ENCRYPT(ks, r, l, 0);
|
|
}
|
|
// rotate and clear the top bits on machines with 8byte longs
|
|
data[0] = CRYPTO_rotr_u32(l, 3);
|
|
data[1] = CRYPTO_rotr_u32(r, 3);
|
|
}
|
|
|
|
void DES_encrypt3(uint32_t data[2], const DES_key_schedule *ks1,
|
|
const DES_key_schedule *ks2, const DES_key_schedule *ks3) {
|
|
uint32_t l, r;
|
|
|
|
l = data[0];
|
|
r = data[1];
|
|
IP(l, r);
|
|
data[0] = l;
|
|
data[1] = r;
|
|
DES_encrypt2(data, ks1, DES_ENCRYPT);
|
|
DES_encrypt2(data, ks2, DES_DECRYPT);
|
|
DES_encrypt2(data, ks3, DES_ENCRYPT);
|
|
l = data[0];
|
|
r = data[1];
|
|
FP(r, l);
|
|
data[0] = l;
|
|
data[1] = r;
|
|
}
|
|
|
|
void DES_decrypt3(uint32_t data[2], const DES_key_schedule *ks1,
|
|
const DES_key_schedule *ks2, const DES_key_schedule *ks3) {
|
|
uint32_t l, r;
|
|
|
|
l = data[0];
|
|
r = data[1];
|
|
IP(l, r);
|
|
data[0] = l;
|
|
data[1] = r;
|
|
DES_encrypt2(data, ks3, DES_DECRYPT);
|
|
DES_encrypt2(data, ks2, DES_ENCRYPT);
|
|
DES_encrypt2(data, ks1, DES_DECRYPT);
|
|
l = data[0];
|
|
r = data[1];
|
|
FP(r, l);
|
|
data[0] = l;
|
|
data[1] = r;
|
|
}
|
|
|
|
void DES_ecb_encrypt(const DES_cblock *in_block, DES_cblock *out_block,
|
|
const DES_key_schedule *schedule, int is_encrypt) {
|
|
DES_ecb_encrypt_ex(in_block->bytes, out_block->bytes, schedule, is_encrypt);
|
|
}
|
|
|
|
void DES_ecb_encrypt_ex(const uint8_t in[8], uint8_t out[8],
|
|
const DES_key_schedule *schedule, int is_encrypt) {
|
|
uint32_t ll[2];
|
|
ll[0] = CRYPTO_load_u32_le(in);
|
|
ll[1] = CRYPTO_load_u32_le(in + 4);
|
|
DES_encrypt1(ll, schedule, is_encrypt);
|
|
CRYPTO_store_u32_le(out, ll[0]);
|
|
CRYPTO_store_u32_le(out + 4, ll[1]);
|
|
}
|
|
|
|
void DES_ncbc_encrypt(const uint8_t *in, uint8_t *out, size_t len,
|
|
const DES_key_schedule *schedule, DES_cblock *ivec,
|
|
int enc) {
|
|
DES_ncbc_encrypt_ex(in, out, len, schedule, ivec->bytes, enc);
|
|
}
|
|
|
|
void DES_ncbc_encrypt_ex(const uint8_t *in, uint8_t *out, size_t len,
|
|
const DES_key_schedule *schedule, uint8_t ivec[8],
|
|
int enc) {
|
|
uint32_t tin0, tin1;
|
|
uint32_t tout0, tout1, xor0, xor1;
|
|
uint32_t tin[2];
|
|
unsigned char *iv;
|
|
|
|
iv = ivec;
|
|
|
|
if (enc) {
|
|
c2l(iv, tout0);
|
|
c2l(iv, tout1);
|
|
for (; len >= 8; len -= 8) {
|
|
c2l(in, tin0);
|
|
c2l(in, tin1);
|
|
tin0 ^= tout0;
|
|
tin[0] = tin0;
|
|
tin1 ^= tout1;
|
|
tin[1] = tin1;
|
|
DES_encrypt1(tin, schedule, DES_ENCRYPT);
|
|
tout0 = tin[0];
|
|
l2c(tout0, out);
|
|
tout1 = tin[1];
|
|
l2c(tout1, out);
|
|
}
|
|
if (len != 0) {
|
|
c2ln(in, tin0, tin1, len);
|
|
tin0 ^= tout0;
|
|
tin[0] = tin0;
|
|
tin1 ^= tout1;
|
|
tin[1] = tin1;
|
|
DES_encrypt1(tin, schedule, DES_ENCRYPT);
|
|
tout0 = tin[0];
|
|
l2c(tout0, out);
|
|
tout1 = tin[1];
|
|
l2c(tout1, out);
|
|
}
|
|
iv = ivec;
|
|
l2c(tout0, iv);
|
|
l2c(tout1, iv);
|
|
} else {
|
|
c2l(iv, xor0);
|
|
c2l(iv, xor1);
|
|
for (; len >= 8; len -= 8) {
|
|
c2l(in, tin0);
|
|
tin[0] = tin0;
|
|
c2l(in, tin1);
|
|
tin[1] = tin1;
|
|
DES_encrypt1(tin, schedule, DES_DECRYPT);
|
|
tout0 = tin[0] ^ xor0;
|
|
tout1 = tin[1] ^ xor1;
|
|
l2c(tout0, out);
|
|
l2c(tout1, out);
|
|
xor0 = tin0;
|
|
xor1 = tin1;
|
|
}
|
|
if (len != 0) {
|
|
c2l(in, tin0);
|
|
tin[0] = tin0;
|
|
c2l(in, tin1);
|
|
tin[1] = tin1;
|
|
DES_encrypt1(tin, schedule, DES_DECRYPT);
|
|
tout0 = tin[0] ^ xor0;
|
|
tout1 = tin[1] ^ xor1;
|
|
l2cn(tout0, tout1, out, len);
|
|
xor0 = tin0;
|
|
xor1 = tin1;
|
|
}
|
|
iv = ivec;
|
|
l2c(xor0, iv);
|
|
l2c(xor1, iv);
|
|
}
|
|
tin[0] = tin[1] = 0;
|
|
}
|
|
|
|
void DES_ecb3_encrypt(const DES_cblock *input, DES_cblock *output,
|
|
const DES_key_schedule *ks1, const DES_key_schedule *ks2,
|
|
const DES_key_schedule *ks3, int enc) {
|
|
DES_ecb3_encrypt_ex(input->bytes, output->bytes, ks1, ks2, ks3, enc);
|
|
}
|
|
|
|
void DES_ecb3_encrypt_ex(const uint8_t in[8], uint8_t out[8],
|
|
const DES_key_schedule *ks1,
|
|
const DES_key_schedule *ks2,
|
|
const DES_key_schedule *ks3, int enc) {
|
|
uint32_t ll[2];
|
|
ll[0] = CRYPTO_load_u32_le(in);
|
|
ll[1] = CRYPTO_load_u32_le(in + 4);
|
|
if (enc) {
|
|
DES_encrypt3(ll, ks1, ks2, ks3);
|
|
} else {
|
|
DES_decrypt3(ll, ks1, ks2, ks3);
|
|
}
|
|
CRYPTO_store_u32_le(out, ll[0]);
|
|
CRYPTO_store_u32_le(out + 4, ll[1]);
|
|
}
|
|
|
|
void DES_ede3_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t len,
|
|
const DES_key_schedule *ks1,
|
|
const DES_key_schedule *ks2,
|
|
const DES_key_schedule *ks3, DES_cblock *ivec,
|
|
int enc) {
|
|
DES_ede3_cbc_encrypt_ex(in, out, len, ks1, ks2, ks3, ivec->bytes, enc);
|
|
}
|
|
|
|
void DES_ede3_cbc_encrypt_ex(const uint8_t *in, uint8_t *out, size_t len,
|
|
const DES_key_schedule *ks1,
|
|
const DES_key_schedule *ks2,
|
|
const DES_key_schedule *ks3, uint8_t ivec[8],
|
|
int enc) {
|
|
uint32_t tin0, tin1;
|
|
uint32_t tout0, tout1, xor0, xor1;
|
|
uint32_t tin[2];
|
|
uint8_t *iv;
|
|
|
|
iv = ivec;
|
|
|
|
if (enc) {
|
|
c2l(iv, tout0);
|
|
c2l(iv, tout1);
|
|
for (; len >= 8; len -= 8) {
|
|
c2l(in, tin0);
|
|
c2l(in, tin1);
|
|
tin0 ^= tout0;
|
|
tin1 ^= tout1;
|
|
|
|
tin[0] = tin0;
|
|
tin[1] = tin1;
|
|
DES_encrypt3(tin, ks1, ks2, ks3);
|
|
tout0 = tin[0];
|
|
tout1 = tin[1];
|
|
|
|
l2c(tout0, out);
|
|
l2c(tout1, out);
|
|
}
|
|
if (len != 0) {
|
|
c2ln(in, tin0, tin1, len);
|
|
tin0 ^= tout0;
|
|
tin1 ^= tout1;
|
|
|
|
tin[0] = tin0;
|
|
tin[1] = tin1;
|
|
DES_encrypt3(tin, ks1, ks2, ks3);
|
|
tout0 = tin[0];
|
|
tout1 = tin[1];
|
|
|
|
l2c(tout0, out);
|
|
l2c(tout1, out);
|
|
}
|
|
iv = ivec;
|
|
l2c(tout0, iv);
|
|
l2c(tout1, iv);
|
|
} else {
|
|
uint32_t t0, t1;
|
|
|
|
c2l(iv, xor0);
|
|
c2l(iv, xor1);
|
|
for (; len >= 8; len -= 8) {
|
|
c2l(in, tin0);
|
|
c2l(in, tin1);
|
|
|
|
t0 = tin0;
|
|
t1 = tin1;
|
|
|
|
tin[0] = tin0;
|
|
tin[1] = tin1;
|
|
DES_decrypt3(tin, ks1, ks2, ks3);
|
|
tout0 = tin[0];
|
|
tout1 = tin[1];
|
|
|
|
tout0 ^= xor0;
|
|
tout1 ^= xor1;
|
|
l2c(tout0, out);
|
|
l2c(tout1, out);
|
|
xor0 = t0;
|
|
xor1 = t1;
|
|
}
|
|
if (len != 0) {
|
|
c2l(in, tin0);
|
|
c2l(in, tin1);
|
|
|
|
t0 = tin0;
|
|
t1 = tin1;
|
|
|
|
tin[0] = tin0;
|
|
tin[1] = tin1;
|
|
DES_decrypt3(tin, ks1, ks2, ks3);
|
|
tout0 = tin[0];
|
|
tout1 = tin[1];
|
|
|
|
tout0 ^= xor0;
|
|
tout1 ^= xor1;
|
|
l2cn(tout0, tout1, out, len);
|
|
xor0 = t0;
|
|
xor1 = t1;
|
|
}
|
|
|
|
iv = ivec;
|
|
l2c(xor0, iv);
|
|
l2c(xor1, iv);
|
|
}
|
|
|
|
tin[0] = tin[1] = 0;
|
|
}
|
|
|
|
void DES_ede2_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t len,
|
|
const DES_key_schedule *ks1,
|
|
const DES_key_schedule *ks2,
|
|
DES_cblock *ivec,
|
|
int enc) {
|
|
DES_ede3_cbc_encrypt(in, out, len, ks1, ks2, ks1, ivec, enc);
|
|
}
|