155714Skris/* crypto/cast/c_skey.c */
255714Skris/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
355714Skris * All rights reserved.
455714Skris *
555714Skris * This package is an SSL implementation written
655714Skris * by Eric Young (eay@cryptsoft.com).
755714Skris * The implementation was written so as to conform with Netscapes SSL.
8296341Sdelphij *
955714Skris * This library is free for commercial and non-commercial use as long as
1055714Skris * the following conditions are aheared to.  The following conditions
1155714Skris * apply to all code found in this distribution, be it the RC4, RSA,
1255714Skris * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
1355714Skris * included with this distribution is covered by the same copyright terms
1455714Skris * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15296341Sdelphij *
1655714Skris * Copyright remains Eric Young's, and as such any Copyright notices in
1755714Skris * the code are not to be removed.
1855714Skris * If this package is used in a product, Eric Young should be given attribution
1955714Skris * as the author of the parts of the library used.
2055714Skris * This can be in the form of a textual message at program startup or
2155714Skris * in documentation (online or textual) provided with the package.
22296341Sdelphij *
2355714Skris * Redistribution and use in source and binary forms, with or without
2455714Skris * modification, are permitted provided that the following conditions
2555714Skris * are met:
2655714Skris * 1. Redistributions of source code must retain the copyright
2755714Skris *    notice, this list of conditions and the following disclaimer.
2855714Skris * 2. Redistributions in binary form must reproduce the above copyright
2955714Skris *    notice, this list of conditions and the following disclaimer in the
3055714Skris *    documentation and/or other materials provided with the distribution.
3155714Skris * 3. All advertising materials mentioning features or use of this software
3255714Skris *    must display the following acknowledgement:
3355714Skris *    "This product includes cryptographic software written by
3455714Skris *     Eric Young (eay@cryptsoft.com)"
3555714Skris *    The word 'cryptographic' can be left out if the rouines from the library
3655714Skris *    being used are not cryptographic related :-).
37296341Sdelphij * 4. If you include any Windows specific code (or a derivative thereof) from
3855714Skris *    the apps directory (application code) you must include an acknowledgement:
3955714Skris *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40296341Sdelphij *
4155714Skris * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
4255714Skris * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
4355714Skris * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
4455714Skris * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
4555714Skris * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
4655714Skris * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
4755714Skris * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
4855714Skris * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
4955714Skris * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5055714Skris * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5155714Skris * SUCH DAMAGE.
52296341Sdelphij *
5355714Skris * The licence and distribution terms for any publically available version or
5455714Skris * derivative of this code cannot be changed.  i.e. this code cannot simply be
5555714Skris * copied and put under another distribution licence
5655714Skris * [including the GNU Public Licence.]
5755714Skris */
5855714Skris
59238405Sjkim#include <openssl/crypto.h>
6055714Skris#include <openssl/cast.h>
6155714Skris#include "cast_lcl.h"
6255714Skris#include "cast_s.h"
6355714Skris
6455714Skris#define CAST_exp(l,A,a,n) \
65296341Sdelphij        A[n/4]=l; \
66296341Sdelphij        a[n+3]=(l    )&0xff; \
67296341Sdelphij        a[n+2]=(l>> 8)&0xff; \
68296341Sdelphij        a[n+1]=(l>>16)&0xff; \
69296341Sdelphij        a[n+0]=(l>>24)&0xff;
7055714Skris
7155714Skris#define S4 CAST_S_table4
7255714Skris#define S5 CAST_S_table5
7355714Skris#define S6 CAST_S_table6
7455714Skris#define S7 CAST_S_table7
75238405Sjkimvoid CAST_set_key(CAST_KEY *key, int len, const unsigned char *data)
76238405Sjkim#ifdef OPENSSL_FIPS
77296341Sdelphij{
78296341Sdelphij    fips_cipher_abort(CAST);
79296341Sdelphij    private_CAST_set_key(key, len, data);
80296341Sdelphij}
81296341Sdelphij
82238405Sjkimvoid private_CAST_set_key(CAST_KEY *key, int len, const unsigned char *data)
83238405Sjkim#endif
84296341Sdelphij{
85296341Sdelphij    CAST_LONG x[16];
86296341Sdelphij    CAST_LONG z[16];
87296341Sdelphij    CAST_LONG k[32];
88296341Sdelphij    CAST_LONG X[4], Z[4];
89296341Sdelphij    CAST_LONG l, *K;
90296341Sdelphij    int i;
9155714Skris
92296341Sdelphij    for (i = 0; i < 16; i++)
93296341Sdelphij        x[i] = 0;
94296341Sdelphij    if (len > 16)
95296341Sdelphij        len = 16;
96296341Sdelphij    for (i = 0; i < len; i++)
97296341Sdelphij        x[i] = data[i];
98296341Sdelphij    if (len <= 10)
99296341Sdelphij        key->short_key = 1;
100296341Sdelphij    else
101296341Sdelphij        key->short_key = 0;
10255714Skris
103296341Sdelphij    K = &k[0];
104296341Sdelphij    X[0] = ((x[0] << 24) | (x[1] << 16) | (x[2] << 8) | x[3]) & 0xffffffffL;
105296341Sdelphij    X[1] = ((x[4] << 24) | (x[5] << 16) | (x[6] << 8) | x[7]) & 0xffffffffL;
106296341Sdelphij    X[2] = ((x[8] << 24) | (x[9] << 16) | (x[10] << 8) | x[11]) & 0xffffffffL;
107296341Sdelphij    X[3] =
108296341Sdelphij        ((x[12] << 24) | (x[13] << 16) | (x[14] << 8) | x[15]) & 0xffffffffL;
10955714Skris
110296341Sdelphij    for (;;) {
111296341Sdelphij        l = X[0] ^ S4[x[13]] ^ S5[x[15]] ^ S6[x[12]] ^ S7[x[14]] ^ S6[x[8]];
112296341Sdelphij        CAST_exp(l, Z, z, 0);
113296341Sdelphij        l = X[2] ^ S4[z[0]] ^ S5[z[2]] ^ S6[z[1]] ^ S7[z[3]] ^ S7[x[10]];
114296341Sdelphij        CAST_exp(l, Z, z, 4);
115296341Sdelphij        l = X[3] ^ S4[z[7]] ^ S5[z[6]] ^ S6[z[5]] ^ S7[z[4]] ^ S4[x[9]];
116296341Sdelphij        CAST_exp(l, Z, z, 8);
117296341Sdelphij        l = X[1] ^ S4[z[10]] ^ S5[z[9]] ^ S6[z[11]] ^ S7[z[8]] ^ S5[x[11]];
118296341Sdelphij        CAST_exp(l, Z, z, 12);
11955714Skris
120296341Sdelphij        K[0] = S4[z[8]] ^ S5[z[9]] ^ S6[z[7]] ^ S7[z[6]] ^ S4[z[2]];
121296341Sdelphij        K[1] = S4[z[10]] ^ S5[z[11]] ^ S6[z[5]] ^ S7[z[4]] ^ S5[z[6]];
122296341Sdelphij        K[2] = S4[z[12]] ^ S5[z[13]] ^ S6[z[3]] ^ S7[z[2]] ^ S6[z[9]];
123296341Sdelphij        K[3] = S4[z[14]] ^ S5[z[15]] ^ S6[z[1]] ^ S7[z[0]] ^ S7[z[12]];
12455714Skris
125296341Sdelphij        l = Z[2] ^ S4[z[5]] ^ S5[z[7]] ^ S6[z[4]] ^ S7[z[6]] ^ S6[z[0]];
126296341Sdelphij        CAST_exp(l, X, x, 0);
127296341Sdelphij        l = Z[0] ^ S4[x[0]] ^ S5[x[2]] ^ S6[x[1]] ^ S7[x[3]] ^ S7[z[2]];
128296341Sdelphij        CAST_exp(l, X, x, 4);
129296341Sdelphij        l = Z[1] ^ S4[x[7]] ^ S5[x[6]] ^ S6[x[5]] ^ S7[x[4]] ^ S4[z[1]];
130296341Sdelphij        CAST_exp(l, X, x, 8);
131296341Sdelphij        l = Z[3] ^ S4[x[10]] ^ S5[x[9]] ^ S6[x[11]] ^ S7[x[8]] ^ S5[z[3]];
132296341Sdelphij        CAST_exp(l, X, x, 12);
13355714Skris
134296341Sdelphij        K[4] = S4[x[3]] ^ S5[x[2]] ^ S6[x[12]] ^ S7[x[13]] ^ S4[x[8]];
135296341Sdelphij        K[5] = S4[x[1]] ^ S5[x[0]] ^ S6[x[14]] ^ S7[x[15]] ^ S5[x[13]];
136296341Sdelphij        K[6] = S4[x[7]] ^ S5[x[6]] ^ S6[x[8]] ^ S7[x[9]] ^ S6[x[3]];
137296341Sdelphij        K[7] = S4[x[5]] ^ S5[x[4]] ^ S6[x[10]] ^ S7[x[11]] ^ S7[x[7]];
13855714Skris
139296341Sdelphij        l = X[0] ^ S4[x[13]] ^ S5[x[15]] ^ S6[x[12]] ^ S7[x[14]] ^ S6[x[8]];
140296341Sdelphij        CAST_exp(l, Z, z, 0);
141296341Sdelphij        l = X[2] ^ S4[z[0]] ^ S5[z[2]] ^ S6[z[1]] ^ S7[z[3]] ^ S7[x[10]];
142296341Sdelphij        CAST_exp(l, Z, z, 4);
143296341Sdelphij        l = X[3] ^ S4[z[7]] ^ S5[z[6]] ^ S6[z[5]] ^ S7[z[4]] ^ S4[x[9]];
144296341Sdelphij        CAST_exp(l, Z, z, 8);
145296341Sdelphij        l = X[1] ^ S4[z[10]] ^ S5[z[9]] ^ S6[z[11]] ^ S7[z[8]] ^ S5[x[11]];
146296341Sdelphij        CAST_exp(l, Z, z, 12);
14755714Skris
148296341Sdelphij        K[8] = S4[z[3]] ^ S5[z[2]] ^ S6[z[12]] ^ S7[z[13]] ^ S4[z[9]];
149296341Sdelphij        K[9] = S4[z[1]] ^ S5[z[0]] ^ S6[z[14]] ^ S7[z[15]] ^ S5[z[12]];
150296341Sdelphij        K[10] = S4[z[7]] ^ S5[z[6]] ^ S6[z[8]] ^ S7[z[9]] ^ S6[z[2]];
151296341Sdelphij        K[11] = S4[z[5]] ^ S5[z[4]] ^ S6[z[10]] ^ S7[z[11]] ^ S7[z[6]];
15255714Skris
153296341Sdelphij        l = Z[2] ^ S4[z[5]] ^ S5[z[7]] ^ S6[z[4]] ^ S7[z[6]] ^ S6[z[0]];
154296341Sdelphij        CAST_exp(l, X, x, 0);
155296341Sdelphij        l = Z[0] ^ S4[x[0]] ^ S5[x[2]] ^ S6[x[1]] ^ S7[x[3]] ^ S7[z[2]];
156296341Sdelphij        CAST_exp(l, X, x, 4);
157296341Sdelphij        l = Z[1] ^ S4[x[7]] ^ S5[x[6]] ^ S6[x[5]] ^ S7[x[4]] ^ S4[z[1]];
158296341Sdelphij        CAST_exp(l, X, x, 8);
159296341Sdelphij        l = Z[3] ^ S4[x[10]] ^ S5[x[9]] ^ S6[x[11]] ^ S7[x[8]] ^ S5[z[3]];
160296341Sdelphij        CAST_exp(l, X, x, 12);
16155714Skris
162296341Sdelphij        K[12] = S4[x[8]] ^ S5[x[9]] ^ S6[x[7]] ^ S7[x[6]] ^ S4[x[3]];
163296341Sdelphij        K[13] = S4[x[10]] ^ S5[x[11]] ^ S6[x[5]] ^ S7[x[4]] ^ S5[x[7]];
164296341Sdelphij        K[14] = S4[x[12]] ^ S5[x[13]] ^ S6[x[3]] ^ S7[x[2]] ^ S6[x[8]];
165296341Sdelphij        K[15] = S4[x[14]] ^ S5[x[15]] ^ S6[x[1]] ^ S7[x[0]] ^ S7[x[13]];
166296341Sdelphij        if (K != k)
167296341Sdelphij            break;
168296341Sdelphij        K += 16;
169296341Sdelphij    }
17055714Skris
171296341Sdelphij    for (i = 0; i < 16; i++) {
172296341Sdelphij        key->data[i * 2] = k[i];
173296341Sdelphij        key->data[i * 2 + 1] = ((k[i + 16]) + 16) & 0x1f;
174296341Sdelphij    }
175296341Sdelphij}
176