xref: /onnv-gate/usr/src/common/openssl/crypto/des/cfb_enc.c (revision 2139:6243c3338933)
10Sstevel@tonic-gate /* crypto/des/cfb_enc.c */
20Sstevel@tonic-gate /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
30Sstevel@tonic-gate  * All rights reserved.
40Sstevel@tonic-gate  *
50Sstevel@tonic-gate  * This package is an SSL implementation written
60Sstevel@tonic-gate  * by Eric Young (eay@cryptsoft.com).
70Sstevel@tonic-gate  * The implementation was written so as to conform with Netscapes SSL.
80Sstevel@tonic-gate  *
90Sstevel@tonic-gate  * This library is free for commercial and non-commercial use as long as
100Sstevel@tonic-gate  * the following conditions are aheared to.  The following conditions
110Sstevel@tonic-gate  * apply to all code found in this distribution, be it the RC4, RSA,
120Sstevel@tonic-gate  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
130Sstevel@tonic-gate  * included with this distribution is covered by the same copyright terms
140Sstevel@tonic-gate  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
150Sstevel@tonic-gate  *
160Sstevel@tonic-gate  * Copyright remains Eric Young's, and as such any Copyright notices in
170Sstevel@tonic-gate  * the code are not to be removed.
180Sstevel@tonic-gate  * If this package is used in a product, Eric Young should be given attribution
190Sstevel@tonic-gate  * as the author of the parts of the library used.
200Sstevel@tonic-gate  * This can be in the form of a textual message at program startup or
210Sstevel@tonic-gate  * in documentation (online or textual) provided with the package.
220Sstevel@tonic-gate  *
230Sstevel@tonic-gate  * Redistribution and use in source and binary forms, with or without
240Sstevel@tonic-gate  * modification, are permitted provided that the following conditions
250Sstevel@tonic-gate  * are met:
260Sstevel@tonic-gate  * 1. Redistributions of source code must retain the copyright
270Sstevel@tonic-gate  *    notice, this list of conditions and the following disclaimer.
280Sstevel@tonic-gate  * 2. Redistributions in binary form must reproduce the above copyright
290Sstevel@tonic-gate  *    notice, this list of conditions and the following disclaimer in the
300Sstevel@tonic-gate  *    documentation and/or other materials provided with the distribution.
310Sstevel@tonic-gate  * 3. All advertising materials mentioning features or use of this software
320Sstevel@tonic-gate  *    must display the following acknowledgement:
330Sstevel@tonic-gate  *    "This product includes cryptographic software written by
340Sstevel@tonic-gate  *     Eric Young (eay@cryptsoft.com)"
350Sstevel@tonic-gate  *    The word 'cryptographic' can be left out if the rouines from the library
360Sstevel@tonic-gate  *    being used are not cryptographic related :-).
370Sstevel@tonic-gate  * 4. If you include any Windows specific code (or a derivative thereof) from
380Sstevel@tonic-gate  *    the apps directory (application code) you must include an acknowledgement:
390Sstevel@tonic-gate  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
400Sstevel@tonic-gate  *
410Sstevel@tonic-gate  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
420Sstevel@tonic-gate  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
430Sstevel@tonic-gate  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
440Sstevel@tonic-gate  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
450Sstevel@tonic-gate  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
460Sstevel@tonic-gate  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
470Sstevel@tonic-gate  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
480Sstevel@tonic-gate  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
490Sstevel@tonic-gate  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
500Sstevel@tonic-gate  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
510Sstevel@tonic-gate  * SUCH DAMAGE.
520Sstevel@tonic-gate  *
530Sstevel@tonic-gate  * The licence and distribution terms for any publically available version or
540Sstevel@tonic-gate  * derivative of this code cannot be changed.  i.e. this code cannot simply be
550Sstevel@tonic-gate  * copied and put under another distribution licence
560Sstevel@tonic-gate  * [including the GNU Public Licence.]
570Sstevel@tonic-gate  */
580Sstevel@tonic-gate 
590Sstevel@tonic-gate #include "e_os.h"
600Sstevel@tonic-gate #include "des_locl.h"
61*2139Sjp161948 #include <assert.h>
620Sstevel@tonic-gate 
630Sstevel@tonic-gate /* The input and output are loaded in multiples of 8 bits.
640Sstevel@tonic-gate  * What this means is that if you hame numbits=12 and length=2
650Sstevel@tonic-gate  * the first 12 bits will be retrieved from the first byte and half
660Sstevel@tonic-gate  * the second.  The second 12 bits will come from the 3rd and half the 4th
670Sstevel@tonic-gate  * byte.
680Sstevel@tonic-gate  */
690Sstevel@tonic-gate /* Until Aug 1 2003 this function did not correctly implement CFB-r, so it
700Sstevel@tonic-gate  * will not be compatible with any encryption prior to that date. Ben. */
DES_cfb_encrypt(const unsigned char * in,unsigned char * out,int numbits,long length,DES_key_schedule * schedule,DES_cblock * ivec,int enc)710Sstevel@tonic-gate void DES_cfb_encrypt(const unsigned char *in, unsigned char *out, int numbits,
720Sstevel@tonic-gate 		     long length, DES_key_schedule *schedule, DES_cblock *ivec,
730Sstevel@tonic-gate 		     int enc)
740Sstevel@tonic-gate 	{
750Sstevel@tonic-gate 	register DES_LONG d0,d1,v0,v1;
76*2139Sjp161948 	register unsigned long l=length;
77*2139Sjp161948 	register int num=numbits/8,n=(numbits+7)/8,i,rem=numbits%8;
780Sstevel@tonic-gate 	DES_LONG ti[2];
790Sstevel@tonic-gate 	unsigned char *iv;
80*2139Sjp161948 #ifndef L_ENDIAN
810Sstevel@tonic-gate 	unsigned char ovec[16];
82*2139Sjp161948 #else
83*2139Sjp161948 	unsigned int  sh[4];
84*2139Sjp161948 	unsigned char *ovec=(unsigned char *)sh;
850Sstevel@tonic-gate 
86*2139Sjp161948 	/* I kind of count that compiler optimizes away this assertioni,*/
87*2139Sjp161948 	assert (sizeof(sh[0])==4);	/* as this holds true for all,	*/
88*2139Sjp161948 					/* but 16-bit platforms...	*/
89*2139Sjp161948 
90*2139Sjp161948 #endif
91*2139Sjp161948 
92*2139Sjp161948 	if (numbits<=0 || numbits > 64) return;
930Sstevel@tonic-gate 	iv = &(*ivec)[0];
940Sstevel@tonic-gate 	c2l(iv,v0);
950Sstevel@tonic-gate 	c2l(iv,v1);
960Sstevel@tonic-gate 	if (enc)
970Sstevel@tonic-gate 		{
98*2139Sjp161948 		while (l >= (unsigned long)n)
990Sstevel@tonic-gate 			{
1000Sstevel@tonic-gate 			l-=n;
1010Sstevel@tonic-gate 			ti[0]=v0;
1020Sstevel@tonic-gate 			ti[1]=v1;
1030Sstevel@tonic-gate 			DES_encrypt1((DES_LONG *)ti,schedule,DES_ENCRYPT);
1040Sstevel@tonic-gate 			c2ln(in,d0,d1,n);
1050Sstevel@tonic-gate 			in+=n;
1060Sstevel@tonic-gate 			d0^=ti[0];
1070Sstevel@tonic-gate 			d1^=ti[1];
1080Sstevel@tonic-gate 			l2cn(d0,d1,out,n);
1090Sstevel@tonic-gate 			out+=n;
1100Sstevel@tonic-gate 			/* 30-08-94 - eay - changed because l>>32 and
1110Sstevel@tonic-gate 			 * l<<32 are bad under gcc :-( */
112*2139Sjp161948 			if (numbits == 32)
1130Sstevel@tonic-gate 				{ v0=v1; v1=d0; }
114*2139Sjp161948 			else if (numbits == 64)
1150Sstevel@tonic-gate 				{ v0=d0; v1=d1; }
1160Sstevel@tonic-gate 			else
1170Sstevel@tonic-gate 				{
118*2139Sjp161948 #ifndef L_ENDIAN
1190Sstevel@tonic-gate 				iv=&ovec[0];
1200Sstevel@tonic-gate 				l2c(v0,iv);
1210Sstevel@tonic-gate 				l2c(v1,iv);
1220Sstevel@tonic-gate 				l2c(d0,iv);
1230Sstevel@tonic-gate 				l2c(d1,iv);
124*2139Sjp161948 #else
125*2139Sjp161948 				sh[0]=v0, sh[1]=v1, sh[2]=d0, sh[3]=d1;
126*2139Sjp161948 #endif
127*2139Sjp161948 				if (rem==0)
128*2139Sjp161948 					memmove(ovec,ovec+num,8);
129*2139Sjp161948 				else
1300Sstevel@tonic-gate 					for(i=0 ; i < 8 ; ++i)
131*2139Sjp161948 						ovec[i]=ovec[i+num]<<rem |
132*2139Sjp161948 							ovec[i+num+1]>>(8-rem);
133*2139Sjp161948 #ifdef L_ENDIAN
134*2139Sjp161948 				v0=sh[0], v1=sh[1];
135*2139Sjp161948 #else
1360Sstevel@tonic-gate 				iv=&ovec[0];
1370Sstevel@tonic-gate 				c2l(iv,v0);
1380Sstevel@tonic-gate 				c2l(iv,v1);
139*2139Sjp161948 #endif
1400Sstevel@tonic-gate 				}
1410Sstevel@tonic-gate 			}
1420Sstevel@tonic-gate 		}
1430Sstevel@tonic-gate 	else
1440Sstevel@tonic-gate 		{
145*2139Sjp161948 		while (l >= (unsigned long)n)
1460Sstevel@tonic-gate 			{
1470Sstevel@tonic-gate 			l-=n;
1480Sstevel@tonic-gate 			ti[0]=v0;
1490Sstevel@tonic-gate 			ti[1]=v1;
1500Sstevel@tonic-gate 			DES_encrypt1((DES_LONG *)ti,schedule,DES_ENCRYPT);
1510Sstevel@tonic-gate 			c2ln(in,d0,d1,n);
1520Sstevel@tonic-gate 			in+=n;
1530Sstevel@tonic-gate 			/* 30-08-94 - eay - changed because l>>32 and
1540Sstevel@tonic-gate 			 * l<<32 are bad under gcc :-( */
155*2139Sjp161948 			if (numbits == 32)
1560Sstevel@tonic-gate 				{ v0=v1; v1=d0; }
157*2139Sjp161948 			else if (numbits == 64)
1580Sstevel@tonic-gate 				{ v0=d0; v1=d1; }
1590Sstevel@tonic-gate 			else
1600Sstevel@tonic-gate 				{
161*2139Sjp161948 #ifndef L_ENDIAN
1620Sstevel@tonic-gate 				iv=&ovec[0];
1630Sstevel@tonic-gate 				l2c(v0,iv);
1640Sstevel@tonic-gate 				l2c(v1,iv);
1650Sstevel@tonic-gate 				l2c(d0,iv);
1660Sstevel@tonic-gate 				l2c(d1,iv);
167*2139Sjp161948 #else
168*2139Sjp161948 				sh[0]=v0, sh[1]=v1, sh[2]=d0, sh[3]=d1;
169*2139Sjp161948 #endif
170*2139Sjp161948 				if (rem==0)
171*2139Sjp161948 					memmove(ovec,ovec+num,8);
172*2139Sjp161948 				else
1730Sstevel@tonic-gate 					for(i=0 ; i < 8 ; ++i)
174*2139Sjp161948 						ovec[i]=ovec[i+num]<<rem |
175*2139Sjp161948 							ovec[i+num+1]>>(8-rem);
176*2139Sjp161948 #ifdef L_ENDIAN
177*2139Sjp161948 				v0=sh[0], v1=sh[1];
178*2139Sjp161948 #else
1790Sstevel@tonic-gate 				iv=&ovec[0];
1800Sstevel@tonic-gate 				c2l(iv,v0);
1810Sstevel@tonic-gate 				c2l(iv,v1);
182*2139Sjp161948 #endif
1830Sstevel@tonic-gate 				}
1840Sstevel@tonic-gate 			d0^=ti[0];
1850Sstevel@tonic-gate 			d1^=ti[1];
1860Sstevel@tonic-gate 			l2cn(d0,d1,out,n);
1870Sstevel@tonic-gate 			out+=n;
1880Sstevel@tonic-gate 			}
1890Sstevel@tonic-gate 		}
1900Sstevel@tonic-gate 	iv = &(*ivec)[0];
1910Sstevel@tonic-gate 	l2c(v0,iv);
1920Sstevel@tonic-gate 	l2c(v1,iv);
1930Sstevel@tonic-gate 	v0=v1=d0=d1=ti[0]=ti[1]=0;
1940Sstevel@tonic-gate 	}
1950Sstevel@tonic-gate 
196