155714Skris/* crypto/des/cfb64ede.c */
255714Skris/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
355714Skris * All rights reserved.
455714Skris *
555714Skris * This package is an SSL implementation written
655714Skris * by Eric Young (eay@cryptsoft.com).
755714Skris * The implementation was written so as to conform with Netscapes SSL.
8280297Sjkim *
955714Skris * This library is free for commercial and non-commercial use as long as
1055714Skris * the following conditions are aheared to.  The following conditions
1155714Skris * apply to all code found in this distribution, be it the RC4, RSA,
1255714Skris * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
1355714Skris * included with this distribution is covered by the same copyright terms
1455714Skris * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15280297Sjkim *
1655714Skris * Copyright remains Eric Young's, and as such any Copyright notices in
1755714Skris * the code are not to be removed.
1855714Skris * If this package is used in a product, Eric Young should be given attribution
1955714Skris * as the author of the parts of the library used.
2055714Skris * This can be in the form of a textual message at program startup or
2155714Skris * in documentation (online or textual) provided with the package.
22280297Sjkim *
2355714Skris * Redistribution and use in source and binary forms, with or without
2455714Skris * modification, are permitted provided that the following conditions
2555714Skris * are met:
2655714Skris * 1. Redistributions of source code must retain the copyright
2755714Skris *    notice, this list of conditions and the following disclaimer.
2855714Skris * 2. Redistributions in binary form must reproduce the above copyright
2955714Skris *    notice, this list of conditions and the following disclaimer in the
3055714Skris *    documentation and/or other materials provided with the distribution.
3155714Skris * 3. All advertising materials mentioning features or use of this software
3255714Skris *    must display the following acknowledgement:
3355714Skris *    "This product includes cryptographic software written by
3455714Skris *     Eric Young (eay@cryptsoft.com)"
3555714Skris *    The word 'cryptographic' can be left out if the rouines from the library
3655714Skris *    being used are not cryptographic related :-).
37280297Sjkim * 4. If you include any Windows specific code (or a derivative thereof) from
3855714Skris *    the apps directory (application code) you must include an acknowledgement:
3955714Skris *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40280297Sjkim *
4155714Skris * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
4255714Skris * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
4355714Skris * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
4455714Skris * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
4555714Skris * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
4655714Skris * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
4755714Skris * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
4855714Skris * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
4955714Skris * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5055714Skris * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5155714Skris * SUCH DAMAGE.
52280297Sjkim *
5355714Skris * The licence and distribution terms for any publically available version or
5455714Skris * derivative of this code cannot be changed.  i.e. this code cannot simply be
5555714Skris * copied and put under another distribution licence
5655714Skris * [including the GNU Public Licence.]
5755714Skris */
5855714Skris
5955714Skris#include "des_locl.h"
60160814Ssimon#include "e_os.h"
6155714Skris
62280297Sjkim/*
63280297Sjkim * The input and output encrypted as though 64bit cfb mode is being used.
64280297Sjkim * The extra state information to record how much of the 64bit block we have
65280297Sjkim * used is contained in *num;
6655714Skris */
6755714Skris
68109998Smarkmvoid DES_ede3_cfb64_encrypt(const unsigned char *in, unsigned char *out,
69280297Sjkim                            long length, DES_key_schedule *ks1,
70280297Sjkim                            DES_key_schedule *ks2, DES_key_schedule *ks3,
71280297Sjkim                            DES_cblock *ivec, int *num, int enc)
72280297Sjkim{
73280297Sjkim    register DES_LONG v0, v1;
74280297Sjkim    register long l = length;
75280297Sjkim    register int n = *num;
76280297Sjkim    DES_LONG ti[2];
77280297Sjkim    unsigned char *iv, c, cc;
7855714Skris
79280297Sjkim    iv = &(*ivec)[0];
80280297Sjkim    if (enc) {
81280297Sjkim        while (l--) {
82280297Sjkim            if (n == 0) {
83280297Sjkim                c2l(iv, v0);
84280297Sjkim                c2l(iv, v1);
8555714Skris
86280297Sjkim                ti[0] = v0;
87280297Sjkim                ti[1] = v1;
88280297Sjkim                DES_encrypt3(ti, ks1, ks2, ks3);
89280297Sjkim                v0 = ti[0];
90280297Sjkim                v1 = ti[1];
9155714Skris
92280297Sjkim                iv = &(*ivec)[0];
93280297Sjkim                l2c(v0, iv);
94280297Sjkim                l2c(v1, iv);
95280297Sjkim                iv = &(*ivec)[0];
96280297Sjkim            }
97280297Sjkim            c = *(in++) ^ iv[n];
98280297Sjkim            *(out++) = c;
99280297Sjkim            iv[n] = c;
100280297Sjkim            n = (n + 1) & 0x07;
101280297Sjkim        }
102280297Sjkim    } else {
103280297Sjkim        while (l--) {
104280297Sjkim            if (n == 0) {
105280297Sjkim                c2l(iv, v0);
106280297Sjkim                c2l(iv, v1);
10755714Skris
108280297Sjkim                ti[0] = v0;
109280297Sjkim                ti[1] = v1;
110280297Sjkim                DES_encrypt3(ti, ks1, ks2, ks3);
111280297Sjkim                v0 = ti[0];
112280297Sjkim                v1 = ti[1];
11355714Skris
114280297Sjkim                iv = &(*ivec)[0];
115280297Sjkim                l2c(v0, iv);
116280297Sjkim                l2c(v1, iv);
117280297Sjkim                iv = &(*ivec)[0];
118280297Sjkim            }
119280297Sjkim            cc = *(in++);
120280297Sjkim            c = iv[n];
121280297Sjkim            iv[n] = cc;
122280297Sjkim            *(out++) = c ^ cc;
123280297Sjkim            n = (n + 1) & 0x07;
124280297Sjkim        }
125280297Sjkim    }
126280297Sjkim    v0 = v1 = ti[0] = ti[1] = c = cc = 0;
127280297Sjkim    *num = n;
128280297Sjkim}
12955714Skris
130280297Sjkim#ifdef undef                    /* MACRO */
131280297Sjkimvoid DES_ede2_cfb64_encrypt(unsigned char *in, unsigned char *out,
132280297Sjkim                            long length, DES_key_schedule ks1,
133280297Sjkim                            DES_key_schedule ks2, DES_cblock (*ivec),
134280297Sjkim                            int *num, int enc)
135280297Sjkim{
136280297Sjkim    DES_ede3_cfb64_encrypt(in, out, length, ks1, ks2, ks1, ivec, num, enc);
137280297Sjkim}
13855714Skris#endif
139142425Snectar
140280297Sjkim/*
141280297Sjkim * This is compatible with the single key CFB-r for DES, even thought that's
142142425Snectar * not what EVP needs.
143142425Snectar */
144142425Snectar
145280297Sjkimvoid DES_ede3_cfb_encrypt(const unsigned char *in, unsigned char *out,
146280297Sjkim                          int numbits, long length, DES_key_schedule *ks1,
147280297Sjkim                          DES_key_schedule *ks2, DES_key_schedule *ks3,
148280297Sjkim                          DES_cblock *ivec, int enc)
149280297Sjkim{
150280297Sjkim    register DES_LONG d0, d1, v0, v1;
151280297Sjkim    register unsigned long l = length, n = ((unsigned int)numbits + 7) / 8;
152280297Sjkim    register int num = numbits, i;
153280297Sjkim    DES_LONG ti[2];
154280297Sjkim    unsigned char *iv;
155280297Sjkim    unsigned char ovec[16];
156142425Snectar
157280297Sjkim    if (num > 64)
158280297Sjkim        return;
159280297Sjkim    iv = &(*ivec)[0];
160280297Sjkim    c2l(iv, v0);
161280297Sjkim    c2l(iv, v1);
162280297Sjkim    if (enc) {
163280297Sjkim        while (l >= n) {
164280297Sjkim            l -= n;
165280297Sjkim            ti[0] = v0;
166280297Sjkim            ti[1] = v1;
167280297Sjkim            DES_encrypt3(ti, ks1, ks2, ks3);
168280297Sjkim            c2ln(in, d0, d1, n);
169280297Sjkim            in += n;
170280297Sjkim            d0 ^= ti[0];
171280297Sjkim            d1 ^= ti[1];
172280297Sjkim            l2cn(d0, d1, out, n);
173280297Sjkim            out += n;
174280297Sjkim            /*
175280297Sjkim             * 30-08-94 - eay - changed because l>>32 and l<<32 are bad under
176280297Sjkim             * gcc :-(
177280297Sjkim             */
178280297Sjkim            if (num == 32) {
179280297Sjkim                v0 = v1;
180280297Sjkim                v1 = d0;
181280297Sjkim            } else if (num == 64) {
182280297Sjkim                v0 = d0;
183280297Sjkim                v1 = d1;
184280297Sjkim            } else {
185280297Sjkim                iv = &ovec[0];
186280297Sjkim                l2c(v0, iv);
187280297Sjkim                l2c(v1, iv);
188280297Sjkim                l2c(d0, iv);
189280297Sjkim                l2c(d1, iv);
190280297Sjkim                /* shift ovec left most of the bits... */
191280297Sjkim                memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0));
192280297Sjkim                /* now the remaining bits */
193280297Sjkim                if (num % 8 != 0)
194280297Sjkim                    for (i = 0; i < 8; ++i) {
195280297Sjkim                        ovec[i] <<= num % 8;
196280297Sjkim                        ovec[i] |= ovec[i + 1] >> (8 - num % 8);
197280297Sjkim                    }
198280297Sjkim                iv = &ovec[0];
199280297Sjkim                c2l(iv, v0);
200280297Sjkim                c2l(iv, v1);
201280297Sjkim            }
202280297Sjkim        }
203280297Sjkim    } else {
204280297Sjkim        while (l >= n) {
205280297Sjkim            l -= n;
206280297Sjkim            ti[0] = v0;
207280297Sjkim            ti[1] = v1;
208280297Sjkim            DES_encrypt3(ti, ks1, ks2, ks3);
209280297Sjkim            c2ln(in, d0, d1, n);
210280297Sjkim            in += n;
211280297Sjkim            /*
212280297Sjkim             * 30-08-94 - eay - changed because l>>32 and l<<32 are bad under
213280297Sjkim             * gcc :-(
214280297Sjkim             */
215280297Sjkim            if (num == 32) {
216280297Sjkim                v0 = v1;
217280297Sjkim                v1 = d0;
218280297Sjkim            } else if (num == 64) {
219280297Sjkim                v0 = d0;
220280297Sjkim                v1 = d1;
221280297Sjkim            } else {
222280297Sjkim                iv = &ovec[0];
223280297Sjkim                l2c(v0, iv);
224280297Sjkim                l2c(v1, iv);
225280297Sjkim                l2c(d0, iv);
226280297Sjkim                l2c(d1, iv);
227280297Sjkim                /* shift ovec left most of the bits... */
228280297Sjkim                memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0));
229280297Sjkim                /* now the remaining bits */
230280297Sjkim                if (num % 8 != 0)
231280297Sjkim                    for (i = 0; i < 8; ++i) {
232280297Sjkim                        ovec[i] <<= num % 8;
233280297Sjkim                        ovec[i] |= ovec[i + 1] >> (8 - num % 8);
234280297Sjkim                    }
235280297Sjkim                iv = &ovec[0];
236280297Sjkim                c2l(iv, v0);
237280297Sjkim                c2l(iv, v1);
238280297Sjkim            }
239280297Sjkim            d0 ^= ti[0];
240280297Sjkim            d1 ^= ti[1];
241280297Sjkim            l2cn(d0, d1, out, n);
242280297Sjkim            out += n;
243280297Sjkim        }
244280297Sjkim    }
245280297Sjkim    iv = &(*ivec)[0];
246280297Sjkim    l2c(v0, iv);
247280297Sjkim    l2c(v1, iv);
248280297Sjkim    v0 = v1 = d0 = d1 = ti[0] = ti[1] = 0;
249280297Sjkim}
250