155714Skris/* crypto/des/cfb64ede.c */ 255714Skris/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 355714Skris * All rights reserved. 455714Skris * 555714Skris * This package is an SSL implementation written 655714Skris * by Eric Young (eay@cryptsoft.com). 755714Skris * The implementation was written so as to conform with Netscapes SSL. 8280297Sjkim * 955714Skris * This library is free for commercial and non-commercial use as long as 1055714Skris * the following conditions are aheared to. The following conditions 1155714Skris * apply to all code found in this distribution, be it the RC4, RSA, 1255714Skris * lhash, DES, etc., code; not just the SSL code. The SSL documentation 1355714Skris * included with this distribution is covered by the same copyright terms 1455714Skris * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15280297Sjkim * 1655714Skris * Copyright remains Eric Young's, and as such any Copyright notices in 1755714Skris * the code are not to be removed. 1855714Skris * If this package is used in a product, Eric Young should be given attribution 1955714Skris * as the author of the parts of the library used. 2055714Skris * This can be in the form of a textual message at program startup or 2155714Skris * in documentation (online or textual) provided with the package. 22280297Sjkim * 2355714Skris * Redistribution and use in source and binary forms, with or without 2455714Skris * modification, are permitted provided that the following conditions 2555714Skris * are met: 2655714Skris * 1. Redistributions of source code must retain the copyright 2755714Skris * notice, this list of conditions and the following disclaimer. 2855714Skris * 2. Redistributions in binary form must reproduce the above copyright 2955714Skris * notice, this list of conditions and the following disclaimer in the 3055714Skris * documentation and/or other materials provided with the distribution. 3155714Skris * 3. All advertising materials mentioning features or use of this software 3255714Skris * must display the following acknowledgement: 3355714Skris * "This product includes cryptographic software written by 3455714Skris * Eric Young (eay@cryptsoft.com)" 3555714Skris * The word 'cryptographic' can be left out if the rouines from the library 3655714Skris * being used are not cryptographic related :-). 37280297Sjkim * 4. If you include any Windows specific code (or a derivative thereof) from 3855714Skris * the apps directory (application code) you must include an acknowledgement: 3955714Skris * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40280297Sjkim * 4155714Skris * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 4255714Skris * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 4355714Skris * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 4455714Skris * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 4555714Skris * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 4655714Skris * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 4755714Skris * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 4855714Skris * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 4955714Skris * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 5055714Skris * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 5155714Skris * SUCH DAMAGE. 52280297Sjkim * 5355714Skris * The licence and distribution terms for any publically available version or 5455714Skris * derivative of this code cannot be changed. i.e. this code cannot simply be 5555714Skris * copied and put under another distribution licence 5655714Skris * [including the GNU Public Licence.] 5755714Skris */ 5855714Skris 5955714Skris#include "des_locl.h" 60160814Ssimon#include "e_os.h" 6155714Skris 62280297Sjkim/* 63280297Sjkim * The input and output encrypted as though 64bit cfb mode is being used. 64280297Sjkim * The extra state information to record how much of the 64bit block we have 65280297Sjkim * used is contained in *num; 6655714Skris */ 6755714Skris 68109998Smarkmvoid DES_ede3_cfb64_encrypt(const unsigned char *in, unsigned char *out, 69280297Sjkim long length, DES_key_schedule *ks1, 70280297Sjkim DES_key_schedule *ks2, DES_key_schedule *ks3, 71280297Sjkim DES_cblock *ivec, int *num, int enc) 72280297Sjkim{ 73280297Sjkim register DES_LONG v0, v1; 74280297Sjkim register long l = length; 75280297Sjkim register int n = *num; 76280297Sjkim DES_LONG ti[2]; 77280297Sjkim unsigned char *iv, c, cc; 7855714Skris 79280297Sjkim iv = &(*ivec)[0]; 80280297Sjkim if (enc) { 81280297Sjkim while (l--) { 82280297Sjkim if (n == 0) { 83280297Sjkim c2l(iv, v0); 84280297Sjkim c2l(iv, v1); 8555714Skris 86280297Sjkim ti[0] = v0; 87280297Sjkim ti[1] = v1; 88280297Sjkim DES_encrypt3(ti, ks1, ks2, ks3); 89280297Sjkim v0 = ti[0]; 90280297Sjkim v1 = ti[1]; 9155714Skris 92280297Sjkim iv = &(*ivec)[0]; 93280297Sjkim l2c(v0, iv); 94280297Sjkim l2c(v1, iv); 95280297Sjkim iv = &(*ivec)[0]; 96280297Sjkim } 97280297Sjkim c = *(in++) ^ iv[n]; 98280297Sjkim *(out++) = c; 99280297Sjkim iv[n] = c; 100280297Sjkim n = (n + 1) & 0x07; 101280297Sjkim } 102280297Sjkim } else { 103280297Sjkim while (l--) { 104280297Sjkim if (n == 0) { 105280297Sjkim c2l(iv, v0); 106280297Sjkim c2l(iv, v1); 10755714Skris 108280297Sjkim ti[0] = v0; 109280297Sjkim ti[1] = v1; 110280297Sjkim DES_encrypt3(ti, ks1, ks2, ks3); 111280297Sjkim v0 = ti[0]; 112280297Sjkim v1 = ti[1]; 11355714Skris 114280297Sjkim iv = &(*ivec)[0]; 115280297Sjkim l2c(v0, iv); 116280297Sjkim l2c(v1, iv); 117280297Sjkim iv = &(*ivec)[0]; 118280297Sjkim } 119280297Sjkim cc = *(in++); 120280297Sjkim c = iv[n]; 121280297Sjkim iv[n] = cc; 122280297Sjkim *(out++) = c ^ cc; 123280297Sjkim n = (n + 1) & 0x07; 124280297Sjkim } 125280297Sjkim } 126280297Sjkim v0 = v1 = ti[0] = ti[1] = c = cc = 0; 127280297Sjkim *num = n; 128280297Sjkim} 12955714Skris 130280297Sjkim#ifdef undef /* MACRO */ 131280297Sjkimvoid DES_ede2_cfb64_encrypt(unsigned char *in, unsigned char *out, 132280297Sjkim long length, DES_key_schedule ks1, 133280297Sjkim DES_key_schedule ks2, DES_cblock (*ivec), 134280297Sjkim int *num, int enc) 135280297Sjkim{ 136280297Sjkim DES_ede3_cfb64_encrypt(in, out, length, ks1, ks2, ks1, ivec, num, enc); 137280297Sjkim} 13855714Skris#endif 139142425Snectar 140280297Sjkim/* 141280297Sjkim * This is compatible with the single key CFB-r for DES, even thought that's 142142425Snectar * not what EVP needs. 143142425Snectar */ 144142425Snectar 145280297Sjkimvoid DES_ede3_cfb_encrypt(const unsigned char *in, unsigned char *out, 146280297Sjkim int numbits, long length, DES_key_schedule *ks1, 147280297Sjkim DES_key_schedule *ks2, DES_key_schedule *ks3, 148280297Sjkim DES_cblock *ivec, int enc) 149280297Sjkim{ 150280297Sjkim register DES_LONG d0, d1, v0, v1; 151280297Sjkim register unsigned long l = length, n = ((unsigned int)numbits + 7) / 8; 152280297Sjkim register int num = numbits, i; 153280297Sjkim DES_LONG ti[2]; 154280297Sjkim unsigned char *iv; 155280297Sjkim unsigned char ovec[16]; 156142425Snectar 157280297Sjkim if (num > 64) 158280297Sjkim return; 159280297Sjkim iv = &(*ivec)[0]; 160280297Sjkim c2l(iv, v0); 161280297Sjkim c2l(iv, v1); 162280297Sjkim if (enc) { 163280297Sjkim while (l >= n) { 164280297Sjkim l -= n; 165280297Sjkim ti[0] = v0; 166280297Sjkim ti[1] = v1; 167280297Sjkim DES_encrypt3(ti, ks1, ks2, ks3); 168280297Sjkim c2ln(in, d0, d1, n); 169280297Sjkim in += n; 170280297Sjkim d0 ^= ti[0]; 171280297Sjkim d1 ^= ti[1]; 172280297Sjkim l2cn(d0, d1, out, n); 173280297Sjkim out += n; 174280297Sjkim /* 175280297Sjkim * 30-08-94 - eay - changed because l>>32 and l<<32 are bad under 176280297Sjkim * gcc :-( 177280297Sjkim */ 178280297Sjkim if (num == 32) { 179280297Sjkim v0 = v1; 180280297Sjkim v1 = d0; 181280297Sjkim } else if (num == 64) { 182280297Sjkim v0 = d0; 183280297Sjkim v1 = d1; 184280297Sjkim } else { 185280297Sjkim iv = &ovec[0]; 186280297Sjkim l2c(v0, iv); 187280297Sjkim l2c(v1, iv); 188280297Sjkim l2c(d0, iv); 189280297Sjkim l2c(d1, iv); 190280297Sjkim /* shift ovec left most of the bits... */ 191280297Sjkim memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0)); 192280297Sjkim /* now the remaining bits */ 193280297Sjkim if (num % 8 != 0) 194280297Sjkim for (i = 0; i < 8; ++i) { 195280297Sjkim ovec[i] <<= num % 8; 196280297Sjkim ovec[i] |= ovec[i + 1] >> (8 - num % 8); 197280297Sjkim } 198280297Sjkim iv = &ovec[0]; 199280297Sjkim c2l(iv, v0); 200280297Sjkim c2l(iv, v1); 201280297Sjkim } 202280297Sjkim } 203280297Sjkim } else { 204280297Sjkim while (l >= n) { 205280297Sjkim l -= n; 206280297Sjkim ti[0] = v0; 207280297Sjkim ti[1] = v1; 208280297Sjkim DES_encrypt3(ti, ks1, ks2, ks3); 209280297Sjkim c2ln(in, d0, d1, n); 210280297Sjkim in += n; 211280297Sjkim /* 212280297Sjkim * 30-08-94 - eay - changed because l>>32 and l<<32 are bad under 213280297Sjkim * gcc :-( 214280297Sjkim */ 215280297Sjkim if (num == 32) { 216280297Sjkim v0 = v1; 217280297Sjkim v1 = d0; 218280297Sjkim } else if (num == 64) { 219280297Sjkim v0 = d0; 220280297Sjkim v1 = d1; 221280297Sjkim } else { 222280297Sjkim iv = &ovec[0]; 223280297Sjkim l2c(v0, iv); 224280297Sjkim l2c(v1, iv); 225280297Sjkim l2c(d0, iv); 226280297Sjkim l2c(d1, iv); 227280297Sjkim /* shift ovec left most of the bits... */ 228280297Sjkim memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0)); 229280297Sjkim /* now the remaining bits */ 230280297Sjkim if (num % 8 != 0) 231280297Sjkim for (i = 0; i < 8; ++i) { 232280297Sjkim ovec[i] <<= num % 8; 233280297Sjkim ovec[i] |= ovec[i + 1] >> (8 - num % 8); 234280297Sjkim } 235280297Sjkim iv = &ovec[0]; 236280297Sjkim c2l(iv, v0); 237280297Sjkim c2l(iv, v1); 238280297Sjkim } 239280297Sjkim d0 ^= ti[0]; 240280297Sjkim d1 ^= ti[1]; 241280297Sjkim l2cn(d0, d1, out, n); 242280297Sjkim out += n; 243280297Sjkim } 244280297Sjkim } 245280297Sjkim iv = &(*ivec)[0]; 246280297Sjkim l2c(v0, iv); 247280297Sjkim l2c(v1, iv); 248280297Sjkim v0 = v1 = d0 = d1 = ti[0] = ti[1] = 0; 249280297Sjkim} 250