diff options
author | cvs2svn <admin@example.com> | 2014-04-15 18:01:19 +0000 |
---|---|---|
committer | cvs2svn <admin@example.com> | 2014-04-15 18:01:19 +0000 |
commit | 4b19b8991c2eb7c783fd93feac5ba804bf2a7221 (patch) | |
tree | 523a79fb780e63096ecf79af2283834ab6750ca4 /src/lib/libcrypto/rc5 | |
parent | f385533fd495dad9242f2eded4a9017f658ee678 (diff) | |
download | openbsd-openssl_1_0_1g.tar.gz openbsd-openssl_1_0_1g.tar.bz2 openbsd-openssl_1_0_1g.zip |
This commit was manufactured by cvs2git to create tag 'openssl_1_0_1g'.openssl_1_0_1g
Diffstat (limited to '')
-rw-r--r-- | src/lib/libcrypto/rc5/Makefile.ssl | 108 | ||||
-rw-r--r-- | src/lib/libcrypto/rc5/asm/rc5-586.pl | 110 | ||||
-rw-r--r-- | src/lib/libcrypto/rc5/rc5_ecb.c | 80 | ||||
-rw-r--r-- | src/lib/libcrypto/rc5/rc5_enc.c | 215 | ||||
-rw-r--r-- | src/lib/libcrypto/rc5/rc5_skey.c | 113 | ||||
-rw-r--r-- | src/lib/libcrypto/rc5/rc5cfb64.c | 122 | ||||
-rw-r--r-- | src/lib/libcrypto/rc5/rc5ofb64.c | 111 | ||||
-rw-r--r-- | src/lib/libcrypto/rc5/rc5speed.c | 277 |
8 files changed, 0 insertions, 1136 deletions
diff --git a/src/lib/libcrypto/rc5/Makefile.ssl b/src/lib/libcrypto/rc5/Makefile.ssl deleted file mode 100644 index 3f9632f8f7..0000000000 --- a/src/lib/libcrypto/rc5/Makefile.ssl +++ /dev/null | |||
@@ -1,108 +0,0 @@ | |||
1 | # | ||
2 | # SSLeay/crypto/rc5/Makefile | ||
3 | # | ||
4 | |||
5 | DIR= rc5 | ||
6 | TOP= ../.. | ||
7 | CC= cc | ||
8 | CPP= $(CC) -E | ||
9 | INCLUDES= | ||
10 | CFLAG=-g | ||
11 | INSTALL_PREFIX= | ||
12 | OPENSSLDIR= /usr/local/ssl | ||
13 | INSTALLTOP=/usr/local/ssl | ||
14 | MAKE= make -f Makefile.ssl | ||
15 | MAKEDEPPROG= makedepend | ||
16 | MAKEDEPEND= $(TOP)/util/domd $(TOP) -MD $(MAKEDEPPROG) | ||
17 | MAKEFILE= Makefile.ssl | ||
18 | AR= ar r | ||
19 | |||
20 | RC5_ENC= rc5_enc.o | ||
21 | # or use | ||
22 | #DES_ENC= r586-elf.o | ||
23 | |||
24 | CFLAGS= $(INCLUDES) $(CFLAG) | ||
25 | ASFLAGS= $(INCLUDES) $(ASFLAG) | ||
26 | |||
27 | GENERAL=Makefile | ||
28 | TEST=rc5test.c | ||
29 | APPS= | ||
30 | |||
31 | LIB=$(TOP)/libcrypto.a | ||
32 | LIBSRC=rc5_skey.c rc5_ecb.c rc5_enc.c rc5cfb64.c rc5ofb64.c | ||
33 | LIBOBJ=rc5_skey.o rc5_ecb.o $(RC5_ENC) rc5cfb64.o rc5ofb64.o | ||
34 | |||
35 | SRC= $(LIBSRC) | ||
36 | |||
37 | EXHEADER= rc5.h | ||
38 | HEADER= rc5_locl.h $(EXHEADER) | ||
39 | |||
40 | ALL= $(GENERAL) $(SRC) $(HEADER) | ||
41 | |||
42 | top: | ||
43 | (cd ../..; $(MAKE) DIRS=crypto SDIRS=$(DIR) sub_all) | ||
44 | |||
45 | all: lib | ||
46 | |||
47 | lib: $(LIBOBJ) | ||
48 | $(AR) $(LIB) $(LIBOBJ) | ||
49 | $(RANLIB) $(LIB) || echo Never mind. | ||
50 | @touch lib | ||
51 | |||
52 | # elf | ||
53 | asm/r586-elf.s: asm/rc5-586.pl ../perlasm/x86asm.pl ../perlasm/cbc.pl | ||
54 | (cd asm; $(PERL) rc5-586.pl elf $(CFLAGS) > r586-elf.s) | ||
55 | |||
56 | # a.out | ||
57 | asm/r586-out.o: asm/r586unix.cpp | ||
58 | $(CPP) -DOUT asm/r586unix.cpp | as -o asm/r586-out.o | ||
59 | |||
60 | # bsdi | ||
61 | asm/r586bsdi.o: asm/r586unix.cpp | ||
62 | $(CPP) -DBSDI asm/r586unix.cpp | sed 's/ :/:/' | as -o asm/r586bsdi.o | ||
63 | |||
64 | asm/r586unix.cpp: asm/rc5-586.pl ../perlasm/x86asm.pl ../perlasm/cbc.pl | ||
65 | (cd asm; $(PERL) rc5-586.pl cpp >r586unix.cpp) | ||
66 | |||
67 | files: | ||
68 | $(PERL) $(TOP)/util/files.pl Makefile.ssl >> $(TOP)/MINFO | ||
69 | |||
70 | links: | ||
71 | @sh $(TOP)/util/point.sh Makefile.ssl Makefile | ||
72 | @$(PERL) $(TOP)/util/mklink.pl ../../include/openssl $(EXHEADER) | ||
73 | @$(PERL) $(TOP)/util/mklink.pl ../../test $(TEST) | ||
74 | @$(PERL) $(TOP)/util/mklink.pl ../../apps $(APPS) | ||
75 | |||
76 | install: | ||
77 | @for i in $(EXHEADER) ; \ | ||
78 | do \ | ||
79 | (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ | ||
80 | chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \ | ||
81 | done; | ||
82 | |||
83 | tags: | ||
84 | ctags $(SRC) | ||
85 | |||
86 | tests: | ||
87 | |||
88 | lint: | ||
89 | lint -DLINT $(INCLUDES) $(SRC)>fluff | ||
90 | |||
91 | depend: | ||
92 | $(MAKEDEPEND) -- $(CFLAG) $(INCLUDES) $(DEPFLAG) -- $(PROGS) $(LIBSRC) | ||
93 | |||
94 | dclean: | ||
95 | $(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new | ||
96 | mv -f Makefile.new $(MAKEFILE) | ||
97 | |||
98 | clean: | ||
99 | rm -f asm/r586unix.cpp asm/*-elf.* *.o asm/*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff | ||
100 | |||
101 | # DO NOT DELETE THIS LINE -- make depend depends on it. | ||
102 | |||
103 | rc5_ecb.o: ../../include/openssl/opensslv.h ../../include/openssl/rc5.h | ||
104 | rc5_ecb.o: rc5_ecb.c rc5_locl.h | ||
105 | rc5_enc.o: ../../include/openssl/rc5.h rc5_enc.c rc5_locl.h | ||
106 | rc5_skey.o: ../../include/openssl/rc5.h rc5_locl.h rc5_skey.c | ||
107 | rc5cfb64.o: ../../include/openssl/rc5.h rc5_locl.h rc5cfb64.c | ||
108 | rc5ofb64.o: ../../include/openssl/rc5.h rc5_locl.h rc5ofb64.c | ||
diff --git a/src/lib/libcrypto/rc5/asm/rc5-586.pl b/src/lib/libcrypto/rc5/asm/rc5-586.pl deleted file mode 100644 index 61ac6effc6..0000000000 --- a/src/lib/libcrypto/rc5/asm/rc5-586.pl +++ /dev/null | |||
@@ -1,110 +0,0 @@ | |||
1 | #!/usr/local/bin/perl | ||
2 | |||
3 | $0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1; | ||
4 | push(@INC,"${dir}","${dir}../../perlasm"); | ||
5 | require "x86asm.pl"; | ||
6 | require "cbc.pl"; | ||
7 | |||
8 | &asm_init($ARGV[0],"rc5-586.pl"); | ||
9 | |||
10 | $RC5_MAX_ROUNDS=16; | ||
11 | $RC5_32_OFF=($RC5_MAX_ROUNDS+2)*4; | ||
12 | $A="edi"; | ||
13 | $B="esi"; | ||
14 | $S="ebp"; | ||
15 | $tmp1="eax"; | ||
16 | $r="ebx"; | ||
17 | $tmpc="ecx"; | ||
18 | $tmp4="edx"; | ||
19 | |||
20 | &RC5_32_encrypt("RC5_32_encrypt",1); | ||
21 | &RC5_32_encrypt("RC5_32_decrypt",0); | ||
22 | &cbc("RC5_32_cbc_encrypt","RC5_32_encrypt","RC5_32_decrypt",0,4,5,3,-1,-1); | ||
23 | &asm_finish(); | ||
24 | |||
25 | sub RC5_32_encrypt | ||
26 | { | ||
27 | local($name,$enc)=@_; | ||
28 | |||
29 | &function_begin_B($name,""); | ||
30 | |||
31 | &comment(""); | ||
32 | |||
33 | &push("ebp"); | ||
34 | &push("esi"); | ||
35 | &push("edi"); | ||
36 | &mov($tmp4,&wparam(0)); | ||
37 | &mov($S,&wparam(1)); | ||
38 | |||
39 | &comment("Load the 2 words"); | ||
40 | &mov($A,&DWP(0,$tmp4,"",0)); | ||
41 | &mov($B,&DWP(4,$tmp4,"",0)); | ||
42 | |||
43 | &push($r); | ||
44 | &mov($r, &DWP(0,$S,"",0)); | ||
45 | |||
46 | # encrypting part | ||
47 | |||
48 | if ($enc) | ||
49 | { | ||
50 | &add($A, &DWP(4+0,$S,"",0)); | ||
51 | &add($B, &DWP(4+4,$S,"",0)); | ||
52 | |||
53 | for ($i=0; $i<$RC5_MAX_ROUNDS; $i++) | ||
54 | { | ||
55 | &xor($A, $B); | ||
56 | &mov($tmp1, &DWP(12+$i*8,$S,"",0)); | ||
57 | &mov($tmpc, $B); | ||
58 | &rotl($A, &LB("ecx")); | ||
59 | &add($A, $tmp1); | ||
60 | |||
61 | &xor($B, $A); | ||
62 | &mov($tmp1, &DWP(16+$i*8,$S,"",0)); | ||
63 | &mov($tmpc, $A); | ||
64 | &rotl($B, &LB("ecx")); | ||
65 | &add($B, $tmp1); | ||
66 | if (($i == 7) || ($i == 11)) | ||
67 | { | ||
68 | &cmp($r, $i+1); | ||
69 | &je(&label("rc5_exit")); | ||
70 | } | ||
71 | } | ||
72 | } | ||
73 | else | ||
74 | { | ||
75 | &cmp($r, 12); | ||
76 | &je(&label("rc5_dec_12")); | ||
77 | &cmp($r, 8); | ||
78 | &je(&label("rc5_dec_8")); | ||
79 | for ($i=$RC5_MAX_ROUNDS; $i > 0; $i--) | ||
80 | { | ||
81 | &set_label("rc5_dec_$i") if ($i == 12) || ($i == 8); | ||
82 | &mov($tmp1, &DWP($i*8+8,$S,"",0)); | ||
83 | &sub($B, $tmp1); | ||
84 | &mov($tmpc, $A); | ||
85 | &rotr($B, &LB("ecx")); | ||
86 | &xor($B, $A); | ||
87 | |||
88 | &mov($tmp1, &DWP($i*8+4,$S,"",0)); | ||
89 | &sub($A, $tmp1); | ||
90 | &mov($tmpc, $B); | ||
91 | &rotr($A, &LB("ecx")); | ||
92 | &xor($A, $B); | ||
93 | } | ||
94 | &sub($B, &DWP(4+4,$S,"",0)); | ||
95 | &sub($A, &DWP(4+0,$S,"",0)); | ||
96 | } | ||
97 | |||
98 | &set_label("rc5_exit"); | ||
99 | &mov(&DWP(0,$tmp4,"",0),$A); | ||
100 | &mov(&DWP(4,$tmp4,"",0),$B); | ||
101 | |||
102 | &pop("ebx"); | ||
103 | &pop("edi"); | ||
104 | &pop("esi"); | ||
105 | &pop("ebp"); | ||
106 | &ret(); | ||
107 | &function_end_B($name); | ||
108 | } | ||
109 | |||
110 | |||
diff --git a/src/lib/libcrypto/rc5/rc5_ecb.c b/src/lib/libcrypto/rc5/rc5_ecb.c deleted file mode 100644 index e72b535507..0000000000 --- a/src/lib/libcrypto/rc5/rc5_ecb.c +++ /dev/null | |||
@@ -1,80 +0,0 @@ | |||
1 | /* crypto/rc5/rc5_ecb.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <openssl/rc5.h> | ||
60 | #include "rc5_locl.h" | ||
61 | #include <openssl/opensslv.h> | ||
62 | |||
63 | const char RC5_version[]="RC5" OPENSSL_VERSION_PTEXT; | ||
64 | |||
65 | void RC5_32_ecb_encrypt(const unsigned char *in, unsigned char *out, | ||
66 | RC5_32_KEY *ks, int encrypt) | ||
67 | { | ||
68 | unsigned long l,d[2]; | ||
69 | |||
70 | c2l(in,l); d[0]=l; | ||
71 | c2l(in,l); d[1]=l; | ||
72 | if (encrypt) | ||
73 | RC5_32_encrypt(d,ks); | ||
74 | else | ||
75 | RC5_32_decrypt(d,ks); | ||
76 | l=d[0]; l2c(l,out); | ||
77 | l=d[1]; l2c(l,out); | ||
78 | l=d[0]=d[1]=0; | ||
79 | } | ||
80 | |||
diff --git a/src/lib/libcrypto/rc5/rc5_enc.c b/src/lib/libcrypto/rc5/rc5_enc.c deleted file mode 100644 index f327d32a76..0000000000 --- a/src/lib/libcrypto/rc5/rc5_enc.c +++ /dev/null | |||
@@ -1,215 +0,0 @@ | |||
1 | /* crypto/rc5/rc5_enc.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <stdio.h> | ||
60 | #include <openssl/rc5.h> | ||
61 | #include "rc5_locl.h" | ||
62 | |||
63 | void RC5_32_cbc_encrypt(const unsigned char *in, unsigned char *out, | ||
64 | long length, RC5_32_KEY *ks, unsigned char *iv, | ||
65 | int encrypt) | ||
66 | { | ||
67 | register unsigned long tin0,tin1; | ||
68 | register unsigned long tout0,tout1,xor0,xor1; | ||
69 | register long l=length; | ||
70 | unsigned long tin[2]; | ||
71 | |||
72 | if (encrypt) | ||
73 | { | ||
74 | c2l(iv,tout0); | ||
75 | c2l(iv,tout1); | ||
76 | iv-=8; | ||
77 | for (l-=8; l>=0; l-=8) | ||
78 | { | ||
79 | c2l(in,tin0); | ||
80 | c2l(in,tin1); | ||
81 | tin0^=tout0; | ||
82 | tin1^=tout1; | ||
83 | tin[0]=tin0; | ||
84 | tin[1]=tin1; | ||
85 | RC5_32_encrypt(tin,ks); | ||
86 | tout0=tin[0]; l2c(tout0,out); | ||
87 | tout1=tin[1]; l2c(tout1,out); | ||
88 | } | ||
89 | if (l != -8) | ||
90 | { | ||
91 | c2ln(in,tin0,tin1,l+8); | ||
92 | tin0^=tout0; | ||
93 | tin1^=tout1; | ||
94 | tin[0]=tin0; | ||
95 | tin[1]=tin1; | ||
96 | RC5_32_encrypt(tin,ks); | ||
97 | tout0=tin[0]; l2c(tout0,out); | ||
98 | tout1=tin[1]; l2c(tout1,out); | ||
99 | } | ||
100 | l2c(tout0,iv); | ||
101 | l2c(tout1,iv); | ||
102 | } | ||
103 | else | ||
104 | { | ||
105 | c2l(iv,xor0); | ||
106 | c2l(iv,xor1); | ||
107 | iv-=8; | ||
108 | for (l-=8; l>=0; l-=8) | ||
109 | { | ||
110 | c2l(in,tin0); tin[0]=tin0; | ||
111 | c2l(in,tin1); tin[1]=tin1; | ||
112 | RC5_32_decrypt(tin,ks); | ||
113 | tout0=tin[0]^xor0; | ||
114 | tout1=tin[1]^xor1; | ||
115 | l2c(tout0,out); | ||
116 | l2c(tout1,out); | ||
117 | xor0=tin0; | ||
118 | xor1=tin1; | ||
119 | } | ||
120 | if (l != -8) | ||
121 | { | ||
122 | c2l(in,tin0); tin[0]=tin0; | ||
123 | c2l(in,tin1); tin[1]=tin1; | ||
124 | RC5_32_decrypt(tin,ks); | ||
125 | tout0=tin[0]^xor0; | ||
126 | tout1=tin[1]^xor1; | ||
127 | l2cn(tout0,tout1,out,l+8); | ||
128 | xor0=tin0; | ||
129 | xor1=tin1; | ||
130 | } | ||
131 | l2c(xor0,iv); | ||
132 | l2c(xor1,iv); | ||
133 | } | ||
134 | tin0=tin1=tout0=tout1=xor0=xor1=0; | ||
135 | tin[0]=tin[1]=0; | ||
136 | } | ||
137 | |||
138 | void RC5_32_encrypt(unsigned long *d, RC5_32_KEY *key) | ||
139 | { | ||
140 | RC5_32_INT a,b,*s; | ||
141 | |||
142 | s=key->data; | ||
143 | |||
144 | a=d[0]+s[0]; | ||
145 | b=d[1]+s[1]; | ||
146 | E_RC5_32(a,b,s, 2); | ||
147 | E_RC5_32(a,b,s, 4); | ||
148 | E_RC5_32(a,b,s, 6); | ||
149 | E_RC5_32(a,b,s, 8); | ||
150 | E_RC5_32(a,b,s,10); | ||
151 | E_RC5_32(a,b,s,12); | ||
152 | E_RC5_32(a,b,s,14); | ||
153 | E_RC5_32(a,b,s,16); | ||
154 | if (key->rounds == 12) | ||
155 | { | ||
156 | E_RC5_32(a,b,s,18); | ||
157 | E_RC5_32(a,b,s,20); | ||
158 | E_RC5_32(a,b,s,22); | ||
159 | E_RC5_32(a,b,s,24); | ||
160 | } | ||
161 | else if (key->rounds == 16) | ||
162 | { | ||
163 | /* Do a full expansion to avoid a jump */ | ||
164 | E_RC5_32(a,b,s,18); | ||
165 | E_RC5_32(a,b,s,20); | ||
166 | E_RC5_32(a,b,s,22); | ||
167 | E_RC5_32(a,b,s,24); | ||
168 | E_RC5_32(a,b,s,26); | ||
169 | E_RC5_32(a,b,s,28); | ||
170 | E_RC5_32(a,b,s,30); | ||
171 | E_RC5_32(a,b,s,32); | ||
172 | } | ||
173 | d[0]=a; | ||
174 | d[1]=b; | ||
175 | } | ||
176 | |||
177 | void RC5_32_decrypt(unsigned long *d, RC5_32_KEY *key) | ||
178 | { | ||
179 | RC5_32_INT a,b,*s; | ||
180 | |||
181 | s=key->data; | ||
182 | |||
183 | a=d[0]; | ||
184 | b=d[1]; | ||
185 | if (key->rounds == 16) | ||
186 | { | ||
187 | D_RC5_32(a,b,s,32); | ||
188 | D_RC5_32(a,b,s,30); | ||
189 | D_RC5_32(a,b,s,28); | ||
190 | D_RC5_32(a,b,s,26); | ||
191 | /* Do a full expansion to avoid a jump */ | ||
192 | D_RC5_32(a,b,s,24); | ||
193 | D_RC5_32(a,b,s,22); | ||
194 | D_RC5_32(a,b,s,20); | ||
195 | D_RC5_32(a,b,s,18); | ||
196 | } | ||
197 | else if (key->rounds == 12) | ||
198 | { | ||
199 | D_RC5_32(a,b,s,24); | ||
200 | D_RC5_32(a,b,s,22); | ||
201 | D_RC5_32(a,b,s,20); | ||
202 | D_RC5_32(a,b,s,18); | ||
203 | } | ||
204 | D_RC5_32(a,b,s,16); | ||
205 | D_RC5_32(a,b,s,14); | ||
206 | D_RC5_32(a,b,s,12); | ||
207 | D_RC5_32(a,b,s,10); | ||
208 | D_RC5_32(a,b,s, 8); | ||
209 | D_RC5_32(a,b,s, 6); | ||
210 | D_RC5_32(a,b,s, 4); | ||
211 | D_RC5_32(a,b,s, 2); | ||
212 | d[0]=a-s[0]; | ||
213 | d[1]=b-s[1]; | ||
214 | } | ||
215 | |||
diff --git a/src/lib/libcrypto/rc5/rc5_skey.c b/src/lib/libcrypto/rc5/rc5_skey.c deleted file mode 100644 index a2e00a41c5..0000000000 --- a/src/lib/libcrypto/rc5/rc5_skey.c +++ /dev/null | |||
@@ -1,113 +0,0 @@ | |||
1 | /* crypto/rc5/rc5_skey.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <openssl/rc5.h> | ||
60 | #include "rc5_locl.h" | ||
61 | |||
62 | void RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, | ||
63 | int rounds) | ||
64 | { | ||
65 | RC5_32_INT L[64],l,ll,A,B,*S,k; | ||
66 | int i,j,m,c,t,ii,jj; | ||
67 | |||
68 | if ( (rounds != RC5_16_ROUNDS) && | ||
69 | (rounds != RC5_12_ROUNDS) && | ||
70 | (rounds != RC5_8_ROUNDS)) | ||
71 | rounds=RC5_16_ROUNDS; | ||
72 | |||
73 | key->rounds=rounds; | ||
74 | S= &(key->data[0]); | ||
75 | j=0; | ||
76 | for (i=0; i<=(len-8); i+=8) | ||
77 | { | ||
78 | c2l(data,l); | ||
79 | L[j++]=l; | ||
80 | c2l(data,l); | ||
81 | L[j++]=l; | ||
82 | } | ||
83 | ii=len-i; | ||
84 | if (ii) | ||
85 | { | ||
86 | k=len&0x07; | ||
87 | c2ln(data,l,ll,k); | ||
88 | L[j+0]=l; | ||
89 | L[j+1]=ll; | ||
90 | } | ||
91 | |||
92 | c=(len+3)/4; | ||
93 | t=(rounds+1)*2; | ||
94 | S[0]=RC5_32_P; | ||
95 | for (i=1; i<t; i++) | ||
96 | S[i]=(S[i-1]+RC5_32_Q)&RC5_32_MASK; | ||
97 | |||
98 | j=(t>c)?t:c; | ||
99 | j*=3; | ||
100 | ii=jj=0; | ||
101 | A=B=0; | ||
102 | for (i=0; i<j; i++) | ||
103 | { | ||
104 | k=(S[ii]+A+B)&RC5_32_MASK; | ||
105 | A=S[ii]=ROTATE_l32(k,3); | ||
106 | m=(int)(A+B); | ||
107 | k=(L[jj]+A+B)&RC5_32_MASK; | ||
108 | B=L[jj]=ROTATE_l32(k,m); | ||
109 | if (++ii >= t) ii=0; | ||
110 | if (++jj >= c) jj=0; | ||
111 | } | ||
112 | } | ||
113 | |||
diff --git a/src/lib/libcrypto/rc5/rc5cfb64.c b/src/lib/libcrypto/rc5/rc5cfb64.c deleted file mode 100644 index 3a8b60bc7a..0000000000 --- a/src/lib/libcrypto/rc5/rc5cfb64.c +++ /dev/null | |||
@@ -1,122 +0,0 @@ | |||
1 | /* crypto/rc5/rc5cfb64.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <openssl/rc5.h> | ||
60 | #include "rc5_locl.h" | ||
61 | |||
62 | /* The input and output encrypted as though 64bit cfb mode is being | ||
63 | * used. The extra state information to record how much of the | ||
64 | * 64bit block we have used is contained in *num; | ||
65 | */ | ||
66 | |||
67 | void RC5_32_cfb64_encrypt(const unsigned char *in, unsigned char *out, | ||
68 | long length, RC5_32_KEY *schedule, | ||
69 | unsigned char *ivec, int *num, int encrypt) | ||
70 | { | ||
71 | register unsigned long v0,v1,t; | ||
72 | register int n= *num; | ||
73 | register long l=length; | ||
74 | unsigned long ti[2]; | ||
75 | unsigned char *iv,c,cc; | ||
76 | |||
77 | iv=(unsigned char *)ivec; | ||
78 | if (encrypt) | ||
79 | { | ||
80 | while (l--) | ||
81 | { | ||
82 | if (n == 0) | ||
83 | { | ||
84 | c2l(iv,v0); ti[0]=v0; | ||
85 | c2l(iv,v1); ti[1]=v1; | ||
86 | RC5_32_encrypt((unsigned long *)ti,schedule); | ||
87 | iv=(unsigned char *)ivec; | ||
88 | t=ti[0]; l2c(t,iv); | ||
89 | t=ti[1]; l2c(t,iv); | ||
90 | iv=(unsigned char *)ivec; | ||
91 | } | ||
92 | c= *(in++)^iv[n]; | ||
93 | *(out++)=c; | ||
94 | iv[n]=c; | ||
95 | n=(n+1)&0x07; | ||
96 | } | ||
97 | } | ||
98 | else | ||
99 | { | ||
100 | while (l--) | ||
101 | { | ||
102 | if (n == 0) | ||
103 | { | ||
104 | c2l(iv,v0); ti[0]=v0; | ||
105 | c2l(iv,v1); ti[1]=v1; | ||
106 | RC5_32_encrypt((unsigned long *)ti,schedule); | ||
107 | iv=(unsigned char *)ivec; | ||
108 | t=ti[0]; l2c(t,iv); | ||
109 | t=ti[1]; l2c(t,iv); | ||
110 | iv=(unsigned char *)ivec; | ||
111 | } | ||
112 | cc= *(in++); | ||
113 | c=iv[n]; | ||
114 | iv[n]=cc; | ||
115 | *(out++)=c^cc; | ||
116 | n=(n+1)&0x07; | ||
117 | } | ||
118 | } | ||
119 | v0=v1=ti[0]=ti[1]=t=c=cc=0; | ||
120 | *num=n; | ||
121 | } | ||
122 | |||
diff --git a/src/lib/libcrypto/rc5/rc5ofb64.c b/src/lib/libcrypto/rc5/rc5ofb64.c deleted file mode 100644 index d412215f3c..0000000000 --- a/src/lib/libcrypto/rc5/rc5ofb64.c +++ /dev/null | |||
@@ -1,111 +0,0 @@ | |||
1 | /* crypto/rc5/rc5ofb64.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <openssl/rc5.h> | ||
60 | #include "rc5_locl.h" | ||
61 | |||
62 | /* The input and output encrypted as though 64bit ofb mode is being | ||
63 | * used. The extra state information to record how much of the | ||
64 | * 64bit block we have used is contained in *num; | ||
65 | */ | ||
66 | void RC5_32_ofb64_encrypt(const unsigned char *in, unsigned char *out, | ||
67 | long length, RC5_32_KEY *schedule, | ||
68 | unsigned char *ivec, int *num) | ||
69 | { | ||
70 | register unsigned long v0,v1,t; | ||
71 | register int n= *num; | ||
72 | register long l=length; | ||
73 | unsigned char d[8]; | ||
74 | register char *dp; | ||
75 | unsigned long ti[2]; | ||
76 | unsigned char *iv; | ||
77 | int save=0; | ||
78 | |||
79 | iv=(unsigned char *)ivec; | ||
80 | c2l(iv,v0); | ||
81 | c2l(iv,v1); | ||
82 | ti[0]=v0; | ||
83 | ti[1]=v1; | ||
84 | dp=(char *)d; | ||
85 | l2c(v0,dp); | ||
86 | l2c(v1,dp); | ||
87 | while (l--) | ||
88 | { | ||
89 | if (n == 0) | ||
90 | { | ||
91 | RC5_32_encrypt((unsigned long *)ti,schedule); | ||
92 | dp=(char *)d; | ||
93 | t=ti[0]; l2c(t,dp); | ||
94 | t=ti[1]; l2c(t,dp); | ||
95 | save++; | ||
96 | } | ||
97 | *(out++)= *(in++)^d[n]; | ||
98 | n=(n+1)&0x07; | ||
99 | } | ||
100 | if (save) | ||
101 | { | ||
102 | v0=ti[0]; | ||
103 | v1=ti[1]; | ||
104 | iv=(unsigned char *)ivec; | ||
105 | l2c(v0,iv); | ||
106 | l2c(v1,iv); | ||
107 | } | ||
108 | t=v0=v1=ti[0]=ti[1]=0; | ||
109 | *num=n; | ||
110 | } | ||
111 | |||
diff --git a/src/lib/libcrypto/rc5/rc5speed.c b/src/lib/libcrypto/rc5/rc5speed.c deleted file mode 100644 index 8e363be535..0000000000 --- a/src/lib/libcrypto/rc5/rc5speed.c +++ /dev/null | |||
@@ -1,277 +0,0 @@ | |||
1 | /* crypto/rc5/rc5speed.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | /* 11-Sep-92 Andrew Daviel Support for Silicon Graphics IRIX added */ | ||
60 | /* 06-Apr-92 Luke Brennan Support for VMS and add extra signal calls */ | ||
61 | |||
62 | #if !defined(OPENSSL_SYS_MSDOS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC)) && !defined(OPENSSL_SYS_MACOSX) | ||
63 | #define TIMES | ||
64 | #endif | ||
65 | |||
66 | #include <stdio.h> | ||
67 | |||
68 | #include <openssl/e_os2.h> | ||
69 | #include OPENSSL_UNISTD_IO | ||
70 | OPENSSL_DECLARE_EXIT | ||
71 | |||
72 | #ifndef OPENSSL_SYS_NETWARE | ||
73 | #include <signal.h> | ||
74 | #endif | ||
75 | |||
76 | #ifndef _IRIX | ||
77 | #include <time.h> | ||
78 | #endif | ||
79 | #ifdef TIMES | ||
80 | #include <sys/types.h> | ||
81 | #include <sys/times.h> | ||
82 | #endif | ||
83 | |||
84 | /* Depending on the VMS version, the tms structure is perhaps defined. | ||
85 | The __TMS macro will show if it was. If it wasn't defined, we should | ||
86 | undefine TIMES, since that tells the rest of the program how things | ||
87 | should be handled. -- Richard Levitte */ | ||
88 | #if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS) | ||
89 | #undef TIMES | ||
90 | #endif | ||
91 | |||
92 | #ifndef TIMES | ||
93 | #include <sys/timeb.h> | ||
94 | #endif | ||
95 | |||
96 | #if defined(sun) || defined(__ultrix) | ||
97 | #define _POSIX_SOURCE | ||
98 | #include <limits.h> | ||
99 | #include <sys/param.h> | ||
100 | #endif | ||
101 | |||
102 | #include <openssl/rc5.h> | ||
103 | |||
104 | /* The following if from times(3) man page. It may need to be changed */ | ||
105 | #ifndef HZ | ||
106 | #ifndef CLK_TCK | ||
107 | #define HZ 100.0 | ||
108 | #else /* CLK_TCK */ | ||
109 | #define HZ ((double)CLK_TCK) | ||
110 | #endif | ||
111 | #endif | ||
112 | |||
113 | #define BUFSIZE ((long)1024) | ||
114 | long run=0; | ||
115 | |||
116 | double Time_F(int s); | ||
117 | #ifdef SIGALRM | ||
118 | #if defined(__STDC__) || defined(sgi) || defined(_AIX) | ||
119 | #define SIGRETTYPE void | ||
120 | #else | ||
121 | #define SIGRETTYPE int | ||
122 | #endif | ||
123 | |||
124 | SIGRETTYPE sig_done(int sig); | ||
125 | SIGRETTYPE sig_done(int sig) | ||
126 | { | ||
127 | signal(SIGALRM,sig_done); | ||
128 | run=0; | ||
129 | #ifdef LINT | ||
130 | sig=sig; | ||
131 | #endif | ||
132 | } | ||
133 | #endif | ||
134 | |||
135 | #define START 0 | ||
136 | #define STOP 1 | ||
137 | |||
138 | double Time_F(int s) | ||
139 | { | ||
140 | double ret; | ||
141 | #ifdef TIMES | ||
142 | static struct tms tstart,tend; | ||
143 | |||
144 | if (s == START) | ||
145 | { | ||
146 | times(&tstart); | ||
147 | return(0); | ||
148 | } | ||
149 | else | ||
150 | { | ||
151 | times(&tend); | ||
152 | ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ; | ||
153 | return((ret == 0.0)?1e-6:ret); | ||
154 | } | ||
155 | #else /* !times() */ | ||
156 | static struct timeb tstart,tend; | ||
157 | long i; | ||
158 | |||
159 | if (s == START) | ||
160 | { | ||
161 | ftime(&tstart); | ||
162 | return(0); | ||
163 | } | ||
164 | else | ||
165 | { | ||
166 | ftime(&tend); | ||
167 | i=(long)tend.millitm-(long)tstart.millitm; | ||
168 | ret=((double)(tend.time-tstart.time))+((double)i)/1e3; | ||
169 | return((ret == 0.0)?1e-6:ret); | ||
170 | } | ||
171 | #endif | ||
172 | } | ||
173 | |||
174 | int main(int argc, char **argv) | ||
175 | { | ||
176 | long count; | ||
177 | static unsigned char buf[BUFSIZE]; | ||
178 | static unsigned char key[] ={ | ||
179 | 0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0, | ||
180 | 0xfe,0xdc,0xba,0x98,0x76,0x54,0x32,0x10, | ||
181 | }; | ||
182 | RC5_32_KEY sch; | ||
183 | double a,b,c,d; | ||
184 | #ifndef SIGALRM | ||
185 | long ca,cb,cc; | ||
186 | #endif | ||
187 | |||
188 | #ifndef TIMES | ||
189 | printf("To get the most accurate results, try to run this\n"); | ||
190 | printf("program when this computer is idle.\n"); | ||
191 | #endif | ||
192 | |||
193 | #ifndef SIGALRM | ||
194 | printf("First we calculate the approximate speed ...\n"); | ||
195 | RC5_32_set_key(&sch,16,key,12); | ||
196 | count=10; | ||
197 | do { | ||
198 | long i; | ||
199 | unsigned long data[2]; | ||
200 | |||
201 | count*=2; | ||
202 | Time_F(START); | ||
203 | for (i=count; i; i--) | ||
204 | RC5_32_encrypt(data,&sch); | ||
205 | d=Time_F(STOP); | ||
206 | } while (d < 3.0); | ||
207 | ca=count/512; | ||
208 | cb=count; | ||
209 | cc=count*8/BUFSIZE+1; | ||
210 | printf("Doing RC5_32_set_key %ld times\n",ca); | ||
211 | #define COND(d) (count != (d)) | ||
212 | #define COUNT(d) (d) | ||
213 | #else | ||
214 | #define COND(c) (run) | ||
215 | #define COUNT(d) (count) | ||
216 | signal(SIGALRM,sig_done); | ||
217 | printf("Doing RC5_32_set_key for 10 seconds\n"); | ||
218 | alarm(10); | ||
219 | #endif | ||
220 | |||
221 | Time_F(START); | ||
222 | for (count=0,run=1; COND(ca); count+=4) | ||
223 | { | ||
224 | RC5_32_set_key(&sch,16,key,12); | ||
225 | RC5_32_set_key(&sch,16,key,12); | ||
226 | RC5_32_set_key(&sch,16,key,12); | ||
227 | RC5_32_set_key(&sch,16,key,12); | ||
228 | } | ||
229 | d=Time_F(STOP); | ||
230 | printf("%ld RC5_32_set_key's in %.2f seconds\n",count,d); | ||
231 | a=((double)COUNT(ca))/d; | ||
232 | |||
233 | #ifdef SIGALRM | ||
234 | printf("Doing RC5_32_encrypt's for 10 seconds\n"); | ||
235 | alarm(10); | ||
236 | #else | ||
237 | printf("Doing RC5_32_encrypt %ld times\n",cb); | ||
238 | #endif | ||
239 | Time_F(START); | ||
240 | for (count=0,run=1; COND(cb); count+=4) | ||
241 | { | ||
242 | unsigned long data[2]; | ||
243 | |||
244 | RC5_32_encrypt(data,&sch); | ||
245 | RC5_32_encrypt(data,&sch); | ||
246 | RC5_32_encrypt(data,&sch); | ||
247 | RC5_32_encrypt(data,&sch); | ||
248 | } | ||
249 | d=Time_F(STOP); | ||
250 | printf("%ld RC5_32_encrypt's in %.2f second\n",count,d); | ||
251 | b=((double)COUNT(cb)*8)/d; | ||
252 | |||
253 | #ifdef SIGALRM | ||
254 | printf("Doing RC5_32_cbc_encrypt on %ld byte blocks for 10 seconds\n", | ||
255 | BUFSIZE); | ||
256 | alarm(10); | ||
257 | #else | ||
258 | printf("Doing RC5_32_cbc_encrypt %ld times on %ld byte blocks\n",cc, | ||
259 | BUFSIZE); | ||
260 | #endif | ||
261 | Time_F(START); | ||
262 | for (count=0,run=1; COND(cc); count++) | ||
263 | RC5_32_cbc_encrypt(buf,buf,BUFSIZE,&sch, | ||
264 | &(key[0]),RC5_ENCRYPT); | ||
265 | d=Time_F(STOP); | ||
266 | printf("%ld RC5_32_cbc_encrypt's of %ld byte blocks in %.2f second\n", | ||
267 | count,BUFSIZE,d); | ||
268 | c=((double)COUNT(cc)*BUFSIZE)/d; | ||
269 | |||
270 | printf("RC5_32/12/16 set_key per sec = %12.2f (%9.3fuS)\n",a,1.0e6/a); | ||
271 | printf("RC5_32/12/16 raw ecb bytes per sec = %12.2f (%9.3fuS)\n",b,8.0e6/b); | ||
272 | printf("RC5_32/12/16 cbc bytes per sec = %12.2f (%9.3fuS)\n",c,8.0e6/c); | ||
273 | exit(0); | ||
274 | #if defined(LINT) || defined(OPENSSL_SYS_MSDOS) | ||
275 | return(0); | ||
276 | #endif | ||
277 | } | ||