summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/des/ofb_enc.c
diff options
context:
space:
mode:
authorbeck <>2023-07-08 07:11:07 +0000
committerbeck <>2023-07-08 07:11:07 +0000
commit243979914a45e120f0afd37f88c5afbe1c1b5493 (patch)
tree893e40f2d049c1ae16b1df1305f2bb885508c93f /src/lib/libcrypto/des/ofb_enc.c
parent9fd37e06e49f349066b61c8890e3b9ba79944481 (diff)
downloadopenbsd-243979914a45e120f0afd37f88c5afbe1c1b5493.tar.gz
openbsd-243979914a45e120f0afd37f88c5afbe1c1b5493.tar.bz2
openbsd-243979914a45e120f0afd37f88c5afbe1c1b5493.zip
Hit the des directory with the loving mallet of knfmt
ok tb@
Diffstat (limited to 'src/lib/libcrypto/des/ofb_enc.c')
-rw-r--r--src/lib/libcrypto/des/ofb_enc.c126
1 files changed, 62 insertions, 64 deletions
diff --git a/src/lib/libcrypto/des/ofb_enc.c b/src/lib/libcrypto/des/ofb_enc.c
index 25abb6db95..990b927eb0 100644
--- a/src/lib/libcrypto/des/ofb_enc.c
+++ b/src/lib/libcrypto/des/ofb_enc.c
@@ -1,25 +1,25 @@
1/* $OpenBSD: ofb_enc.c,v 1.7 2022/11/26 16:08:51 tb Exp $ */ 1/* $OpenBSD: ofb_enc.c,v 1.8 2023/07/08 07:11:07 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
5 * This package is an SSL implementation written 5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com). 6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL. 7 * The implementation was written so as to conform with Netscapes SSL.
8 * 8 *
9 * This library is free for commercial and non-commercial use as long as 9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions 10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA, 11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms 13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * 15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed. 17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution 18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used. 19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or 20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package. 21 * in documentation (online or textual) provided with the package.
22 * 22 *
23 * Redistribution and use in source and binary forms, with or without 23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions 24 * modification, are permitted provided that the following conditions
25 * are met: 25 * are met:
@@ -34,10 +34,10 @@
34 * Eric Young (eay@cryptsoft.com)" 34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library 35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-). 36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement: 38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * 40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE. 51 * SUCH DAMAGE.
52 * 52 *
53 * The licence and distribution terms for any publically available version or 53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence 55 * copied and put under another distribution licence
@@ -64,72 +64,70 @@
64 * the second. The second 12 bits will come from the 3rd and half the 4th 64 * the second. The second 12 bits will come from the 3rd and half the 4th
65 * byte. 65 * byte.
66 */ 66 */
67void DES_ofb_encrypt(const unsigned char *in, unsigned char *out, int numbits, 67void
68 long length, DES_key_schedule *schedule, 68DES_ofb_encrypt(const unsigned char *in, unsigned char *out, int numbits,
69 DES_cblock *ivec) 69 long length, DES_key_schedule *schedule,
70 { 70 DES_cblock *ivec)
71 DES_LONG d0,d1,vv0,vv1,v0,v1,n=(numbits+7)/8; 71{
72 DES_LONG mask0,mask1; 72 DES_LONG d0, d1, vv0, vv1, v0, v1, n = (numbits + 7)/8;
73 long l=length; 73 DES_LONG mask0, mask1;
74 int num=numbits; 74 long l = length;
75 int num = numbits;
75 DES_LONG ti[2]; 76 DES_LONG ti[2];
76 unsigned char *iv; 77 unsigned char *iv;
77 78
78 if (num > 64) return; 79 if (num > 64)
79 if (num > 32) 80 return;
80 { 81 if (num > 32) {
81 mask0=0xffffffffL; 82 mask0 = 0xffffffffL;
82 if (num >= 64) 83 if (num >= 64)
83 mask1=mask0; 84 mask1 = mask0;
84 else 85 else
85 mask1=(1L<<(num-32))-1; 86 mask1 = (1L << (num - 32)) - 1;
86 } 87 } else {
87 else
88 {
89 if (num == 32) 88 if (num == 32)
90 mask0=0xffffffffL; 89 mask0 = 0xffffffffL;
91 else 90 else
92 mask0=(1L<<num)-1; 91 mask0 = (1L << num) - 1;
93 mask1=0x00000000L; 92 mask1 = 0x00000000L;
94 } 93 }
95 94
96 iv = &(*ivec)[0]; 95 iv = &(*ivec)[0];
97 c2l(iv,v0); 96 c2l(iv, v0);
98 c2l(iv,v1); 97 c2l(iv, v1);
99 ti[0]=v0; 98 ti[0] = v0;
100 ti[1]=v1; 99 ti[1] = v1;
101 while (l-- > 0) 100 while (l-- > 0) {
102 { 101 ti[0] = v0;
103 ti[0]=v0; 102 ti[1] = v1;
104 ti[1]=v1; 103 DES_encrypt1((DES_LONG *)ti, schedule, DES_ENCRYPT);
105 DES_encrypt1((DES_LONG *)ti,schedule,DES_ENCRYPT); 104 vv0 = ti[0];
106 vv0=ti[0]; 105 vv1 = ti[1];
107 vv1=ti[1]; 106 c2ln(in, d0, d1, n);
108 c2ln(in,d0,d1,n); 107 in += n;
109 in+=n; 108 d0 = (d0 ^ vv0) & mask0;
110 d0=(d0^vv0)&mask0; 109 d1 = (d1 ^ vv1) & mask1;
111 d1=(d1^vv1)&mask1; 110 l2cn(d0, d1, out, n);
112 l2cn(d0,d1,out,n); 111 out += n;
113 out+=n;
114 112
115 if (num == 32) 113 if (num == 32) {
116 { v0=v1; v1=vv0; } 114 v0 = v1;
117 else if (num == 64) 115 v1 = vv0;
118 { v0=vv0; v1=vv1; } 116 } else if (num == 64) {
119 else if (num > 32) /* && num != 64 */ 117 v0 = vv0;
120 { 118 v1 = vv1;
121 v0=((v1>>(num-32))|(vv0<<(64-num)))&0xffffffffL; 119 } else if (num > 32) { /* && num != 64 */
122 v1=((vv0>>(num-32))|(vv1<<(64-num)))&0xffffffffL; 120 v0 = ((v1 >> (num - 32))|(vv0 << (64 - num))) &
123 } 121 0xffffffffL;
124 else /* num < 32 */ 122 v1 = ((vv0 >> (num - 32))|(vv1 << (64 - num))) &
125 { 123 0xffffffffL;
126 v0=((v0>>num)|(v1<<(32-num)))&0xffffffffL; 124 } else /* num < 32 */ {
127 v1=((v1>>num)|(vv0<<(32-num)))&0xffffffffL; 125 v0 = ((v0 >> num)|(v1 << (32 - num))) & 0xffffffffL;
128 } 126 v1 = ((v1 >> num)|(vv0 << (32 - num))) & 0xffffffffL;
129 } 127 }
130 iv = &(*ivec)[0];
131 l2c(v0,iv);
132 l2c(v1,iv);
133 v0=v1=d0=d1=ti[0]=ti[1]=vv0=vv1=0;
134 } 128 }
135 129 iv = &(*ivec)[0];
130 l2c(v0, iv);
131 l2c(v1, iv);
132 v0 = v1 = d0 = d1 = ti[0] = ti[1] = vv0 = vv1 = 0;
133}