1*de0e0e4dSAntonio Huete Jimenez /* $OpenBSD: rc4_enc.c,v 1.17 2021/11/09 18:40:21 bcook Exp $ */
2f5b1c8a1SJohn Marino /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3f5b1c8a1SJohn Marino * All rights reserved.
4f5b1c8a1SJohn Marino *
5f5b1c8a1SJohn Marino * This package is an SSL implementation written
6f5b1c8a1SJohn Marino * by Eric Young (eay@cryptsoft.com).
7f5b1c8a1SJohn Marino * The implementation was written so as to conform with Netscapes SSL.
8f5b1c8a1SJohn Marino *
9f5b1c8a1SJohn Marino * This library is free for commercial and non-commercial use as long as
10f5b1c8a1SJohn Marino * the following conditions are aheared to. The following conditions
11f5b1c8a1SJohn Marino * apply to all code found in this distribution, be it the RC4, RSA,
12f5b1c8a1SJohn Marino * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13f5b1c8a1SJohn Marino * included with this distribution is covered by the same copyright terms
14f5b1c8a1SJohn Marino * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15f5b1c8a1SJohn Marino *
16f5b1c8a1SJohn Marino * Copyright remains Eric Young's, and as such any Copyright notices in
17f5b1c8a1SJohn Marino * the code are not to be removed.
18f5b1c8a1SJohn Marino * If this package is used in a product, Eric Young should be given attribution
19f5b1c8a1SJohn Marino * as the author of the parts of the library used.
20f5b1c8a1SJohn Marino * This can be in the form of a textual message at program startup or
21f5b1c8a1SJohn Marino * in documentation (online or textual) provided with the package.
22f5b1c8a1SJohn Marino *
23f5b1c8a1SJohn Marino * Redistribution and use in source and binary forms, with or without
24f5b1c8a1SJohn Marino * modification, are permitted provided that the following conditions
25f5b1c8a1SJohn Marino * are met:
26f5b1c8a1SJohn Marino * 1. Redistributions of source code must retain the copyright
27f5b1c8a1SJohn Marino * notice, this list of conditions and the following disclaimer.
28f5b1c8a1SJohn Marino * 2. Redistributions in binary form must reproduce the above copyright
29f5b1c8a1SJohn Marino * notice, this list of conditions and the following disclaimer in the
30f5b1c8a1SJohn Marino * documentation and/or other materials provided with the distribution.
31f5b1c8a1SJohn Marino * 3. All advertising materials mentioning features or use of this software
32f5b1c8a1SJohn Marino * must display the following acknowledgement:
33f5b1c8a1SJohn Marino * "This product includes cryptographic software written by
34f5b1c8a1SJohn Marino * Eric Young (eay@cryptsoft.com)"
35f5b1c8a1SJohn Marino * The word 'cryptographic' can be left out if the rouines from the library
36f5b1c8a1SJohn Marino * being used are not cryptographic related :-).
37f5b1c8a1SJohn Marino * 4. If you include any Windows specific code (or a derivative thereof) from
38f5b1c8a1SJohn Marino * the apps directory (application code) you must include an acknowledgement:
39f5b1c8a1SJohn Marino * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40f5b1c8a1SJohn Marino *
41f5b1c8a1SJohn Marino * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42f5b1c8a1SJohn Marino * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43f5b1c8a1SJohn Marino * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44f5b1c8a1SJohn Marino * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45f5b1c8a1SJohn Marino * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46f5b1c8a1SJohn Marino * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47f5b1c8a1SJohn Marino * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48f5b1c8a1SJohn Marino * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49f5b1c8a1SJohn Marino * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50f5b1c8a1SJohn Marino * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51f5b1c8a1SJohn Marino * SUCH DAMAGE.
52f5b1c8a1SJohn Marino *
53f5b1c8a1SJohn Marino * The licence and distribution terms for any publically available version or
54f5b1c8a1SJohn Marino * derivative of this code cannot be changed. i.e. this code cannot simply be
55f5b1c8a1SJohn Marino * copied and put under another distribution licence
56f5b1c8a1SJohn Marino * [including the GNU Public Licence.]
57f5b1c8a1SJohn Marino */
58f5b1c8a1SJohn Marino
59*de0e0e4dSAntonio Huete Jimenez #include <endian.h>
60*de0e0e4dSAntonio Huete Jimenez
61f5b1c8a1SJohn Marino #include <openssl/rc4.h>
62f5b1c8a1SJohn Marino #include "rc4_locl.h"
63f5b1c8a1SJohn Marino
64f5b1c8a1SJohn Marino /* RC4 as implemented from a posting from
65f5b1c8a1SJohn Marino * Newsgroups: sci.crypt
66f5b1c8a1SJohn Marino * From: sterndark@netcom.com (David Sterndark)
67f5b1c8a1SJohn Marino * Subject: RC4 Algorithm revealed.
68f5b1c8a1SJohn Marino * Message-ID: <sternCvKL4B.Hyy@netcom.com>
69f5b1c8a1SJohn Marino * Date: Wed, 14 Sep 1994 06:35:31 GMT
70f5b1c8a1SJohn Marino */
71f5b1c8a1SJohn Marino
72f5b1c8a1SJohn Marino void
RC4(RC4_KEY * key,size_t len,const unsigned char * indata,unsigned char * outdata)73f5b1c8a1SJohn Marino RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
74f5b1c8a1SJohn Marino unsigned char *outdata)
75f5b1c8a1SJohn Marino {
76f5b1c8a1SJohn Marino RC4_INT *d;
77f5b1c8a1SJohn Marino RC4_INT x, y,tx, ty;
78f5b1c8a1SJohn Marino size_t i;
79f5b1c8a1SJohn Marino
80f5b1c8a1SJohn Marino x = key->x;
81f5b1c8a1SJohn Marino y = key->y;
82f5b1c8a1SJohn Marino d = key->data;
83f5b1c8a1SJohn Marino
84f5b1c8a1SJohn Marino #if defined(RC4_CHUNK)
85f5b1c8a1SJohn Marino /*
86f5b1c8a1SJohn Marino * The original reason for implementing this(*) was the fact that
87f5b1c8a1SJohn Marino * pre-21164a Alpha CPUs don't have byte load/store instructions
88f5b1c8a1SJohn Marino * and e.g. a byte store has to be done with 64-bit load, shift,
89f5b1c8a1SJohn Marino * and, or and finally 64-bit store. Peaking data and operating
90f5b1c8a1SJohn Marino * at natural word size made it possible to reduce amount of
91f5b1c8a1SJohn Marino * instructions as well as to perform early read-ahead without
92f5b1c8a1SJohn Marino * suffering from RAW (read-after-write) hazard. This resulted
93f5b1c8a1SJohn Marino * in ~40%(**) performance improvement on 21064 box with gcc.
94f5b1c8a1SJohn Marino * But it's not only Alpha users who win here:-) Thanks to the
95f5b1c8a1SJohn Marino * early-n-wide read-ahead this implementation also exhibits
96f5b1c8a1SJohn Marino * >40% speed-up on SPARC and 20-30% on 64-bit MIPS (depending
97f5b1c8a1SJohn Marino * on sizeof(RC4_INT)).
98f5b1c8a1SJohn Marino *
99f5b1c8a1SJohn Marino * (*) "this" means code which recognizes the case when input
100f5b1c8a1SJohn Marino * and output pointers appear to be aligned at natural CPU
101f5b1c8a1SJohn Marino * word boundary
102f5b1c8a1SJohn Marino * (**) i.e. according to 'apps/openssl speed rc4' benchmark,
103f5b1c8a1SJohn Marino * crypto/rc4/rc4speed.c exhibits almost 70% speed-up...
104f5b1c8a1SJohn Marino *
105f5b1c8a1SJohn Marino * Caveats.
106f5b1c8a1SJohn Marino *
107f5b1c8a1SJohn Marino * - RC4_CHUNK="unsigned long long" should be a #1 choice for
108f5b1c8a1SJohn Marino * UltraSPARC. Unfortunately gcc generates very slow code
109f5b1c8a1SJohn Marino * (2.5-3 times slower than one generated by Sun's WorkShop
110f5b1c8a1SJohn Marino * C) and therefore gcc (at least 2.95 and earlier) should
111f5b1c8a1SJohn Marino * always be told that RC4_CHUNK="unsigned long".
112f5b1c8a1SJohn Marino *
113f5b1c8a1SJohn Marino * <appro@fy.chalmers.se>
114f5b1c8a1SJohn Marino */
115f5b1c8a1SJohn Marino
116f5b1c8a1SJohn Marino # define RC4_STEP ( \
117f5b1c8a1SJohn Marino x=(x+1) &0xff, \
118f5b1c8a1SJohn Marino tx=d[x], \
119f5b1c8a1SJohn Marino y=(tx+y)&0xff, \
120f5b1c8a1SJohn Marino ty=d[y], \
121f5b1c8a1SJohn Marino d[y]=tx, \
122f5b1c8a1SJohn Marino d[x]=ty, \
123f5b1c8a1SJohn Marino (RC4_CHUNK)d[(tx+ty)&0xff]\
124f5b1c8a1SJohn Marino )
125f5b1c8a1SJohn Marino
126f5b1c8a1SJohn Marino if ((((size_t)indata & (sizeof(RC4_CHUNK) - 1)) |
127f5b1c8a1SJohn Marino ((size_t)outdata & (sizeof(RC4_CHUNK) - 1))) == 0 ) {
128f5b1c8a1SJohn Marino RC4_CHUNK ichunk, otp;
129f5b1c8a1SJohn Marino
130f5b1c8a1SJohn Marino /*
131f5b1c8a1SJohn Marino * I reckon we can afford to implement both endian
132f5b1c8a1SJohn Marino * cases and to decide which way to take at run-time
133f5b1c8a1SJohn Marino * because the machine code appears to be very compact
134f5b1c8a1SJohn Marino * and redundant 1-2KB is perfectly tolerable (i.e.
135f5b1c8a1SJohn Marino * in case the compiler fails to eliminate it:-). By
136f5b1c8a1SJohn Marino * suggestion from Terrel Larson <terr@terralogic.net>.
137f5b1c8a1SJohn Marino *
138f5b1c8a1SJohn Marino * Special notes.
139f5b1c8a1SJohn Marino *
140f5b1c8a1SJohn Marino * - compilers (those I've tried) don't seem to have
141f5b1c8a1SJohn Marino * problems eliminating either the operators guarded
142f5b1c8a1SJohn Marino * by "if (sizeof(RC4_CHUNK)==8)" or the condition
143f5b1c8a1SJohn Marino * expressions themselves so I've got 'em to replace
144f5b1c8a1SJohn Marino * corresponding #ifdefs from the previous version;
145f5b1c8a1SJohn Marino * - I chose to let the redundant switch cases when
146f5b1c8a1SJohn Marino * sizeof(RC4_CHUNK)!=8 be (were also #ifdefed
147f5b1c8a1SJohn Marino * before);
148f5b1c8a1SJohn Marino * - in case you wonder "&(sizeof(RC4_CHUNK)*8-1)" in
149f5b1c8a1SJohn Marino * [LB]ESHFT guards against "shift is out of range"
150f5b1c8a1SJohn Marino * warnings when sizeof(RC4_CHUNK)!=8
151f5b1c8a1SJohn Marino *
152f5b1c8a1SJohn Marino * <appro@fy.chalmers.se>
153f5b1c8a1SJohn Marino */
15472c33676SMaxim Ag #if BYTE_ORDER == BIG_ENDIAN
155f5b1c8a1SJohn Marino # define BESHFT(c) (((sizeof(RC4_CHUNK)-(c)-1)*8)&(sizeof(RC4_CHUNK)*8-1))
156f5b1c8a1SJohn Marino for (; len & (0 - sizeof(RC4_CHUNK)); len -= sizeof(RC4_CHUNK)) {
157f5b1c8a1SJohn Marino ichunk = *(RC4_CHUNK *)indata;
158f5b1c8a1SJohn Marino otp = RC4_STEP << BESHFT(0);
159f5b1c8a1SJohn Marino otp |= RC4_STEP << BESHFT(1);
160f5b1c8a1SJohn Marino otp |= RC4_STEP << BESHFT(2);
161f5b1c8a1SJohn Marino otp |= RC4_STEP << BESHFT(3);
162f5b1c8a1SJohn Marino if (sizeof(RC4_CHUNK) == 8) {
163f5b1c8a1SJohn Marino otp |= RC4_STEP << BESHFT(4);
164f5b1c8a1SJohn Marino otp |= RC4_STEP << BESHFT(5);
165f5b1c8a1SJohn Marino otp |= RC4_STEP << BESHFT(6);
166f5b1c8a1SJohn Marino otp |= RC4_STEP << BESHFT(7);
167f5b1c8a1SJohn Marino }
168f5b1c8a1SJohn Marino *(RC4_CHUNK *)outdata = otp^ichunk;
169f5b1c8a1SJohn Marino indata += sizeof(RC4_CHUNK);
170f5b1c8a1SJohn Marino outdata += sizeof(RC4_CHUNK);
171f5b1c8a1SJohn Marino }
17272c33676SMaxim Ag #else
173f5b1c8a1SJohn Marino # define LESHFT(c) (((c)*8)&(sizeof(RC4_CHUNK)*8-1))
174f5b1c8a1SJohn Marino for (; len & (0 - sizeof(RC4_CHUNK)); len -= sizeof(RC4_CHUNK)) {
175f5b1c8a1SJohn Marino ichunk = *(RC4_CHUNK *)indata;
176f5b1c8a1SJohn Marino otp = RC4_STEP;
177f5b1c8a1SJohn Marino otp |= RC4_STEP << 8;
178f5b1c8a1SJohn Marino otp |= RC4_STEP << 16;
179f5b1c8a1SJohn Marino otp |= RC4_STEP << 24;
180f5b1c8a1SJohn Marino if (sizeof(RC4_CHUNK) == 8) {
181f5b1c8a1SJohn Marino otp |= RC4_STEP << LESHFT(4);
182f5b1c8a1SJohn Marino otp |= RC4_STEP << LESHFT(5);
183f5b1c8a1SJohn Marino otp |= RC4_STEP << LESHFT(6);
184f5b1c8a1SJohn Marino otp |= RC4_STEP << LESHFT(7);
185f5b1c8a1SJohn Marino }
186f5b1c8a1SJohn Marino *(RC4_CHUNK *)outdata = otp ^ ichunk;
187f5b1c8a1SJohn Marino indata += sizeof(RC4_CHUNK);
188f5b1c8a1SJohn Marino outdata += sizeof(RC4_CHUNK);
189f5b1c8a1SJohn Marino }
19072c33676SMaxim Ag #endif
191f5b1c8a1SJohn Marino }
192f5b1c8a1SJohn Marino #endif
193f5b1c8a1SJohn Marino #define LOOP(in,out) \
194f5b1c8a1SJohn Marino x=((x+1)&0xff); \
195f5b1c8a1SJohn Marino tx=d[x]; \
196f5b1c8a1SJohn Marino y=(tx+y)&0xff; \
197f5b1c8a1SJohn Marino d[x]=ty=d[y]; \
198f5b1c8a1SJohn Marino d[y]=tx; \
199f5b1c8a1SJohn Marino (out) = d[(tx+ty)&0xff]^ (in);
200f5b1c8a1SJohn Marino
201f5b1c8a1SJohn Marino #ifndef RC4_INDEX
202f5b1c8a1SJohn Marino #define RC4_LOOP(a,b,i) LOOP(*((a)++),*((b)++))
203f5b1c8a1SJohn Marino #else
204f5b1c8a1SJohn Marino #define RC4_LOOP(a,b,i) LOOP(a[i],b[i])
205f5b1c8a1SJohn Marino #endif
206f5b1c8a1SJohn Marino
207f5b1c8a1SJohn Marino i = len >> 3;
208f5b1c8a1SJohn Marino if (i) {
209f5b1c8a1SJohn Marino for (;;) {
210f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 0);
211f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 1);
212f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 2);
213f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 3);
214f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 4);
215f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 5);
216f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 6);
217f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 7);
218f5b1c8a1SJohn Marino #ifdef RC4_INDEX
219f5b1c8a1SJohn Marino indata += 8;
220f5b1c8a1SJohn Marino outdata += 8;
221f5b1c8a1SJohn Marino #endif
222f5b1c8a1SJohn Marino if (--i == 0)
223f5b1c8a1SJohn Marino break;
224f5b1c8a1SJohn Marino }
225f5b1c8a1SJohn Marino }
226f5b1c8a1SJohn Marino i = len&0x07;
227f5b1c8a1SJohn Marino if (i) {
228f5b1c8a1SJohn Marino for (;;) {
229f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 0);
230f5b1c8a1SJohn Marino if (--i == 0)
231f5b1c8a1SJohn Marino break;
232f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 1);
233f5b1c8a1SJohn Marino if (--i == 0)
234f5b1c8a1SJohn Marino break;
235f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 2);
236f5b1c8a1SJohn Marino if (--i == 0)
237f5b1c8a1SJohn Marino break;
238f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 3);
239f5b1c8a1SJohn Marino if (--i == 0)
240f5b1c8a1SJohn Marino break;
241f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 4);
242f5b1c8a1SJohn Marino if (--i == 0)
243f5b1c8a1SJohn Marino break;
244f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 5);
245f5b1c8a1SJohn Marino if (--i == 0)
246f5b1c8a1SJohn Marino break;
247f5b1c8a1SJohn Marino RC4_LOOP(indata, outdata, 6);
248f5b1c8a1SJohn Marino if (--i == 0)
249f5b1c8a1SJohn Marino break;
250f5b1c8a1SJohn Marino }
251f5b1c8a1SJohn Marino }
252f5b1c8a1SJohn Marino key->x = x;
253f5b1c8a1SJohn Marino key->y = y;
254f5b1c8a1SJohn Marino }
255