1/* crypto/rc5/rc5_skey.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <openssl/crypto.h>
60#include <openssl/rc5.h>
61#include "rc5_locl.h"
62
63
64#ifdef OPENSSL_FIPS
65void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data,
66		    int rounds)
67	{
68	if (FIPS_mode())
69		FIPS_BAD_ABORT(RC5)
70	private_RC5_32_set_key(key, len, data, rounds);
71	}
72void private_RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data,
73		    int rounds)
74#else
75void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data,
76		    int rounds)
77#endif
78	{
79	RC5_32_INT L[64],l,ll,A,B,*S,k;
80	int i,j,m,c,t,ii,jj;
81
82	if (	(rounds != RC5_16_ROUNDS) &&
83		(rounds != RC5_12_ROUNDS) &&
84		(rounds != RC5_8_ROUNDS))
85		rounds=RC5_16_ROUNDS;
86
87	key->rounds=rounds;
88	S= &(key->data[0]);
89	j=0;
90	for (i=0; i<=(len-8); i+=8)
91		{
92		c2l(data,l);
93		L[j++]=l;
94		c2l(data,l);
95		L[j++]=l;
96		}
97	ii=len-i;
98	if (ii)
99		{
100		k=len&0x07;
101		c2ln(data,l,ll,k);
102		L[j+0]=l;
103		L[j+1]=ll;
104		}
105
106	c=(len+3)/4;
107	t=(rounds+1)*2;
108	S[0]=RC5_32_P;
109	for (i=1; i<t; i++)
110		S[i]=(S[i-1]+RC5_32_Q)&RC5_32_MASK;
111
112	j=(t>c)?t:c;
113	j*=3;
114	ii=jj=0;
115	A=B=0;
116	for (i=0; i<j; i++)
117		{
118		k=(S[ii]+A+B)&RC5_32_MASK;
119		A=S[ii]=ROTATE_l32(k,3);
120		m=(int)(A+B);
121		k=(L[jj]+A+B)&RC5_32_MASK;
122		B=L[jj]=ROTATE_l32(k,m);
123		if (++ii >= t) ii=0;
124		if (++jj >= c) jj=0;
125		}
126	}
127
128