xref: /dflybsd-src/crypto/libressl/crypto/rc4/rc4_enc.c (revision 961e30ea7dc61d1112b778ea4981eac68129fb86)
1*de0e0e4dSAntonio Huete Jimenez /* $OpenBSD: rc4_enc.c,v 1.17 2021/11/09 18:40:21 bcook Exp $ */
2f5b1c8a1SJohn Marino /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3f5b1c8a1SJohn Marino  * All rights reserved.
4f5b1c8a1SJohn Marino  *
5f5b1c8a1SJohn Marino  * This package is an SSL implementation written
6f5b1c8a1SJohn Marino  * by Eric Young (eay@cryptsoft.com).
7f5b1c8a1SJohn Marino  * The implementation was written so as to conform with Netscapes SSL.
8f5b1c8a1SJohn Marino  *
9f5b1c8a1SJohn Marino  * This library is free for commercial and non-commercial use as long as
10f5b1c8a1SJohn Marino  * the following conditions are aheared to.  The following conditions
11f5b1c8a1SJohn Marino  * apply to all code found in this distribution, be it the RC4, RSA,
12f5b1c8a1SJohn Marino  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13f5b1c8a1SJohn Marino  * included with this distribution is covered by the same copyright terms
14f5b1c8a1SJohn Marino  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15f5b1c8a1SJohn Marino  *
16f5b1c8a1SJohn Marino  * Copyright remains Eric Young's, and as such any Copyright notices in
17f5b1c8a1SJohn Marino  * the code are not to be removed.
18f5b1c8a1SJohn Marino  * If this package is used in a product, Eric Young should be given attribution
19f5b1c8a1SJohn Marino  * as the author of the parts of the library used.
20f5b1c8a1SJohn Marino  * This can be in the form of a textual message at program startup or
21f5b1c8a1SJohn Marino  * in documentation (online or textual) provided with the package.
22f5b1c8a1SJohn Marino  *
23f5b1c8a1SJohn Marino  * Redistribution and use in source and binary forms, with or without
24f5b1c8a1SJohn Marino  * modification, are permitted provided that the following conditions
25f5b1c8a1SJohn Marino  * are met:
26f5b1c8a1SJohn Marino  * 1. Redistributions of source code must retain the copyright
27f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer.
28f5b1c8a1SJohn Marino  * 2. Redistributions in binary form must reproduce the above copyright
29f5b1c8a1SJohn Marino  *    notice, this list of conditions and the following disclaimer in the
30f5b1c8a1SJohn Marino  *    documentation and/or other materials provided with the distribution.
31f5b1c8a1SJohn Marino  * 3. All advertising materials mentioning features or use of this software
32f5b1c8a1SJohn Marino  *    must display the following acknowledgement:
33f5b1c8a1SJohn Marino  *    "This product includes cryptographic software written by
34f5b1c8a1SJohn Marino  *     Eric Young (eay@cryptsoft.com)"
35f5b1c8a1SJohn Marino  *    The word 'cryptographic' can be left out if the rouines from the library
36f5b1c8a1SJohn Marino  *    being used are not cryptographic related :-).
37f5b1c8a1SJohn Marino  * 4. If you include any Windows specific code (or a derivative thereof) from
38f5b1c8a1SJohn Marino  *    the apps directory (application code) you must include an acknowledgement:
39f5b1c8a1SJohn Marino  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40f5b1c8a1SJohn Marino  *
41f5b1c8a1SJohn Marino  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42f5b1c8a1SJohn Marino  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43f5b1c8a1SJohn Marino  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44f5b1c8a1SJohn Marino  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45f5b1c8a1SJohn Marino  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46f5b1c8a1SJohn Marino  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47f5b1c8a1SJohn Marino  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48f5b1c8a1SJohn Marino  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49f5b1c8a1SJohn Marino  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50f5b1c8a1SJohn Marino  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51f5b1c8a1SJohn Marino  * SUCH DAMAGE.
52f5b1c8a1SJohn Marino  *
53f5b1c8a1SJohn Marino  * The licence and distribution terms for any publically available version or
54f5b1c8a1SJohn Marino  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55f5b1c8a1SJohn Marino  * copied and put under another distribution licence
56f5b1c8a1SJohn Marino  * [including the GNU Public Licence.]
57f5b1c8a1SJohn Marino  */
58f5b1c8a1SJohn Marino 
59*de0e0e4dSAntonio Huete Jimenez #include <endian.h>
60*de0e0e4dSAntonio Huete Jimenez 
61f5b1c8a1SJohn Marino #include <openssl/rc4.h>
62f5b1c8a1SJohn Marino #include "rc4_locl.h"
63f5b1c8a1SJohn Marino 
64f5b1c8a1SJohn Marino /* RC4 as implemented from a posting from
65f5b1c8a1SJohn Marino  * Newsgroups: sci.crypt
66f5b1c8a1SJohn Marino  * From: sterndark@netcom.com (David Sterndark)
67f5b1c8a1SJohn Marino  * Subject: RC4 Algorithm revealed.
68f5b1c8a1SJohn Marino  * Message-ID: <sternCvKL4B.Hyy@netcom.com>
69f5b1c8a1SJohn Marino  * Date: Wed, 14 Sep 1994 06:35:31 GMT
70f5b1c8a1SJohn Marino  */
71f5b1c8a1SJohn Marino 
72f5b1c8a1SJohn Marino void
RC4(RC4_KEY * key,size_t len,const unsigned char * indata,unsigned char * outdata)73f5b1c8a1SJohn Marino RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
74f5b1c8a1SJohn Marino     unsigned char *outdata)
75f5b1c8a1SJohn Marino {
76f5b1c8a1SJohn Marino 	RC4_INT *d;
77f5b1c8a1SJohn Marino 	RC4_INT x, y,tx, ty;
78f5b1c8a1SJohn Marino 	size_t i;
79f5b1c8a1SJohn Marino 
80f5b1c8a1SJohn Marino 	x = key->x;
81f5b1c8a1SJohn Marino 	y = key->y;
82f5b1c8a1SJohn Marino 	d = key->data;
83f5b1c8a1SJohn Marino 
84f5b1c8a1SJohn Marino #if defined(RC4_CHUNK)
85f5b1c8a1SJohn Marino 	/*
86f5b1c8a1SJohn Marino 	 * The original reason for implementing this(*) was the fact that
87f5b1c8a1SJohn Marino 	 * pre-21164a Alpha CPUs don't have byte load/store instructions
88f5b1c8a1SJohn Marino 	 * and e.g. a byte store has to be done with 64-bit load, shift,
89f5b1c8a1SJohn Marino 	 * and, or and finally 64-bit store. Peaking data and operating
90f5b1c8a1SJohn Marino 	 * at natural word size made it possible to reduce amount of
91f5b1c8a1SJohn Marino 	 * instructions as well as to perform early read-ahead without
92f5b1c8a1SJohn Marino 	 * suffering from RAW (read-after-write) hazard. This resulted
93f5b1c8a1SJohn Marino 	 * in ~40%(**) performance improvement on 21064 box with gcc.
94f5b1c8a1SJohn Marino 	 * But it's not only Alpha users who win here:-) Thanks to the
95f5b1c8a1SJohn Marino 	 * early-n-wide read-ahead this implementation also exhibits
96f5b1c8a1SJohn Marino 	 * >40% speed-up on SPARC and 20-30% on 64-bit MIPS (depending
97f5b1c8a1SJohn Marino 	 * on sizeof(RC4_INT)).
98f5b1c8a1SJohn Marino 	 *
99f5b1c8a1SJohn Marino 	 * (*)	"this" means code which recognizes the case when input
100f5b1c8a1SJohn Marino 	 *	and output pointers appear to be aligned at natural CPU
101f5b1c8a1SJohn Marino 	 *	word boundary
102f5b1c8a1SJohn Marino 	 * (**)	i.e. according to 'apps/openssl speed rc4' benchmark,
103f5b1c8a1SJohn Marino 	 *	crypto/rc4/rc4speed.c exhibits almost 70% speed-up...
104f5b1c8a1SJohn Marino 	 *
105f5b1c8a1SJohn Marino 	 * Caveats.
106f5b1c8a1SJohn Marino 	 *
107f5b1c8a1SJohn Marino 	 * - RC4_CHUNK="unsigned long long" should be a #1 choice for
108f5b1c8a1SJohn Marino 	 *   UltraSPARC. Unfortunately gcc generates very slow code
109f5b1c8a1SJohn Marino 	 *   (2.5-3 times slower than one generated by Sun's WorkShop
110f5b1c8a1SJohn Marino 	 *   C) and therefore gcc (at least 2.95 and earlier) should
111f5b1c8a1SJohn Marino 	 *   always be told that RC4_CHUNK="unsigned long".
112f5b1c8a1SJohn Marino 	 *
113f5b1c8a1SJohn Marino 	 *					<appro@fy.chalmers.se>
114f5b1c8a1SJohn Marino 	 */
115f5b1c8a1SJohn Marino 
116f5b1c8a1SJohn Marino # define RC4_STEP	( \
117f5b1c8a1SJohn Marino 			x=(x+1) &0xff,	\
118f5b1c8a1SJohn Marino 			tx=d[x],	\
119f5b1c8a1SJohn Marino 			y=(tx+y)&0xff,	\
120f5b1c8a1SJohn Marino 			ty=d[y],	\
121f5b1c8a1SJohn Marino 			d[y]=tx,	\
122f5b1c8a1SJohn Marino 			d[x]=ty,	\
123f5b1c8a1SJohn Marino 			(RC4_CHUNK)d[(tx+ty)&0xff]\
124f5b1c8a1SJohn Marino 			)
125f5b1c8a1SJohn Marino 
126f5b1c8a1SJohn Marino 	if ((((size_t)indata & (sizeof(RC4_CHUNK) - 1)) |
127f5b1c8a1SJohn Marino 	    ((size_t)outdata & (sizeof(RC4_CHUNK) - 1))) == 0 ) {
128f5b1c8a1SJohn Marino 		RC4_CHUNK ichunk, otp;
129f5b1c8a1SJohn Marino 
130f5b1c8a1SJohn Marino 		/*
131f5b1c8a1SJohn Marino 		 * I reckon we can afford to implement both endian
132f5b1c8a1SJohn Marino 		 * cases and to decide which way to take at run-time
133f5b1c8a1SJohn Marino 		 * because the machine code appears to be very compact
134f5b1c8a1SJohn Marino 		 * and redundant 1-2KB is perfectly tolerable (i.e.
135f5b1c8a1SJohn Marino 		 * in case the compiler fails to eliminate it:-). By
136f5b1c8a1SJohn Marino 		 * suggestion from Terrel Larson <terr@terralogic.net>.
137f5b1c8a1SJohn Marino 		 *
138f5b1c8a1SJohn Marino 		 * Special notes.
139f5b1c8a1SJohn Marino 		 *
140f5b1c8a1SJohn Marino 		 * - compilers (those I've tried) don't seem to have
141f5b1c8a1SJohn Marino 		 *   problems eliminating either the operators guarded
142f5b1c8a1SJohn Marino 		 *   by "if (sizeof(RC4_CHUNK)==8)" or the condition
143f5b1c8a1SJohn Marino 		 *   expressions themselves so I've got 'em to replace
144f5b1c8a1SJohn Marino 		 *   corresponding #ifdefs from the previous version;
145f5b1c8a1SJohn Marino 		 * - I chose to let the redundant switch cases when
146f5b1c8a1SJohn Marino 		 *   sizeof(RC4_CHUNK)!=8 be (were also #ifdefed
147f5b1c8a1SJohn Marino 		 *   before);
148f5b1c8a1SJohn Marino 		 * - in case you wonder "&(sizeof(RC4_CHUNK)*8-1)" in
149f5b1c8a1SJohn Marino 		 *   [LB]ESHFT guards against "shift is out of range"
150f5b1c8a1SJohn Marino 		 *   warnings when sizeof(RC4_CHUNK)!=8
151f5b1c8a1SJohn Marino 		 *
152f5b1c8a1SJohn Marino 		 *			<appro@fy.chalmers.se>
153f5b1c8a1SJohn Marino 		 */
15472c33676SMaxim Ag #if BYTE_ORDER == BIG_ENDIAN
155f5b1c8a1SJohn Marino # define BESHFT(c)	(((sizeof(RC4_CHUNK)-(c)-1)*8)&(sizeof(RC4_CHUNK)*8-1))
156f5b1c8a1SJohn Marino 		for (; len & (0 - sizeof(RC4_CHUNK)); len -= sizeof(RC4_CHUNK)) {
157f5b1c8a1SJohn Marino 			ichunk  = *(RC4_CHUNK *)indata;
158f5b1c8a1SJohn Marino 			otp = RC4_STEP << BESHFT(0);
159f5b1c8a1SJohn Marino 			otp |= RC4_STEP << BESHFT(1);
160f5b1c8a1SJohn Marino 			otp |= RC4_STEP << BESHFT(2);
161f5b1c8a1SJohn Marino 			otp |= RC4_STEP << BESHFT(3);
162f5b1c8a1SJohn Marino 			if (sizeof(RC4_CHUNK) == 8) {
163f5b1c8a1SJohn Marino 				otp |= RC4_STEP << BESHFT(4);
164f5b1c8a1SJohn Marino 				otp |= RC4_STEP << BESHFT(5);
165f5b1c8a1SJohn Marino 				otp |= RC4_STEP << BESHFT(6);
166f5b1c8a1SJohn Marino 				otp |= RC4_STEP << BESHFT(7);
167f5b1c8a1SJohn Marino 			}
168f5b1c8a1SJohn Marino 			*(RC4_CHUNK *)outdata = otp^ichunk;
169f5b1c8a1SJohn Marino 			indata += sizeof(RC4_CHUNK);
170f5b1c8a1SJohn Marino 			outdata += sizeof(RC4_CHUNK);
171f5b1c8a1SJohn Marino 		}
17272c33676SMaxim Ag #else
173f5b1c8a1SJohn Marino # define LESHFT(c)	(((c)*8)&(sizeof(RC4_CHUNK)*8-1))
174f5b1c8a1SJohn Marino 		for (; len & (0 - sizeof(RC4_CHUNK)); len -= sizeof(RC4_CHUNK)) {
175f5b1c8a1SJohn Marino 			ichunk = *(RC4_CHUNK *)indata;
176f5b1c8a1SJohn Marino 			otp = RC4_STEP;
177f5b1c8a1SJohn Marino 			otp |= RC4_STEP << 8;
178f5b1c8a1SJohn Marino 			otp |= RC4_STEP << 16;
179f5b1c8a1SJohn Marino 			otp |= RC4_STEP << 24;
180f5b1c8a1SJohn Marino 			if (sizeof(RC4_CHUNK) == 8) {
181f5b1c8a1SJohn Marino 				otp |= RC4_STEP << LESHFT(4);
182f5b1c8a1SJohn Marino 				otp |= RC4_STEP << LESHFT(5);
183f5b1c8a1SJohn Marino 				otp |= RC4_STEP << LESHFT(6);
184f5b1c8a1SJohn Marino 				otp |= RC4_STEP << LESHFT(7);
185f5b1c8a1SJohn Marino 			}
186f5b1c8a1SJohn Marino 			*(RC4_CHUNK *)outdata = otp ^ ichunk;
187f5b1c8a1SJohn Marino 			indata += sizeof(RC4_CHUNK);
188f5b1c8a1SJohn Marino 			outdata += sizeof(RC4_CHUNK);
189f5b1c8a1SJohn Marino 		}
19072c33676SMaxim Ag #endif
191f5b1c8a1SJohn Marino 	}
192f5b1c8a1SJohn Marino #endif
193f5b1c8a1SJohn Marino #define LOOP(in,out) \
194f5b1c8a1SJohn Marino 		x=((x+1)&0xff); \
195f5b1c8a1SJohn Marino 		tx=d[x]; \
196f5b1c8a1SJohn Marino 		y=(tx+y)&0xff; \
197f5b1c8a1SJohn Marino 		d[x]=ty=d[y]; \
198f5b1c8a1SJohn Marino 		d[y]=tx; \
199f5b1c8a1SJohn Marino 		(out) = d[(tx+ty)&0xff]^ (in);
200f5b1c8a1SJohn Marino 
201f5b1c8a1SJohn Marino #ifndef RC4_INDEX
202f5b1c8a1SJohn Marino #define RC4_LOOP(a,b,i)	LOOP(*((a)++),*((b)++))
203f5b1c8a1SJohn Marino #else
204f5b1c8a1SJohn Marino #define RC4_LOOP(a,b,i)	LOOP(a[i],b[i])
205f5b1c8a1SJohn Marino #endif
206f5b1c8a1SJohn Marino 
207f5b1c8a1SJohn Marino 	i = len >> 3;
208f5b1c8a1SJohn Marino 	if (i) {
209f5b1c8a1SJohn Marino 		for (;;) {
210f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 0);
211f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 1);
212f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 2);
213f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 3);
214f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 4);
215f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 5);
216f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 6);
217f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 7);
218f5b1c8a1SJohn Marino #ifdef RC4_INDEX
219f5b1c8a1SJohn Marino 			indata += 8;
220f5b1c8a1SJohn Marino 			outdata += 8;
221f5b1c8a1SJohn Marino #endif
222f5b1c8a1SJohn Marino 			if (--i == 0)
223f5b1c8a1SJohn Marino 				break;
224f5b1c8a1SJohn Marino 		}
225f5b1c8a1SJohn Marino 	}
226f5b1c8a1SJohn Marino 	i = len&0x07;
227f5b1c8a1SJohn Marino 	if (i) {
228f5b1c8a1SJohn Marino 		for (;;) {
229f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 0);
230f5b1c8a1SJohn Marino 			if (--i == 0)
231f5b1c8a1SJohn Marino 				break;
232f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 1);
233f5b1c8a1SJohn Marino 			if (--i == 0)
234f5b1c8a1SJohn Marino 				break;
235f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 2);
236f5b1c8a1SJohn Marino 			if (--i == 0)
237f5b1c8a1SJohn Marino 				break;
238f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 3);
239f5b1c8a1SJohn Marino 			if (--i == 0)
240f5b1c8a1SJohn Marino 				break;
241f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 4);
242f5b1c8a1SJohn Marino 			if (--i == 0)
243f5b1c8a1SJohn Marino 				break;
244f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 5);
245f5b1c8a1SJohn Marino 			if (--i == 0)
246f5b1c8a1SJohn Marino 				break;
247f5b1c8a1SJohn Marino 			RC4_LOOP(indata, outdata, 6);
248f5b1c8a1SJohn Marino 			if (--i == 0)
249f5b1c8a1SJohn Marino 				break;
250f5b1c8a1SJohn Marino 		}
251f5b1c8a1SJohn Marino 	}
252f5b1c8a1SJohn Marino 	key->x = x;
253f5b1c8a1SJohn Marino 	key->y = y;
254f5b1c8a1SJohn Marino }
255