summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/des/cfb64enc.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/des/cfb64enc.c')
-rw-r--r--src/lib/libcrypto/des/cfb64enc.c103
1 files changed, 52 insertions, 51 deletions
diff --git a/src/lib/libcrypto/des/cfb64enc.c b/src/lib/libcrypto/des/cfb64enc.c
index 4e9284599d..d7434b9db9 100644
--- a/src/lib/libcrypto/des/cfb64enc.c
+++ b/src/lib/libcrypto/des/cfb64enc.c
@@ -1,25 +1,25 @@
1/* $OpenBSD: cfb64enc.c,v 1.7 2022/11/26 16:08:51 tb Exp $ */ 1/* $OpenBSD: cfb64enc.c,v 1.8 2023/07/08 07:11:07 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
5 * This package is an SSL implementation written 5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com). 6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL. 7 * The implementation was written so as to conform with Netscapes SSL.
8 * 8 *
9 * This library is free for commercial and non-commercial use as long as 9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions 10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA, 11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms 13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * 15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed. 17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution 18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used. 19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or 20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package. 21 * in documentation (online or textual) provided with the package.
22 * 22 *
23 * Redistribution and use in source and binary forms, with or without 23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions 24 * modification, are permitted provided that the following conditions
25 * are met: 25 * are met:
@@ -34,10 +34,10 @@
34 * Eric Young (eay@cryptsoft.com)" 34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library 35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-). 36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement: 38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * 40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE. 51 * SUCH DAMAGE.
52 * 52 *
53 * The licence and distribution terms for any publically available version or 53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence 55 * copied and put under another distribution licence
@@ -63,59 +63,60 @@
63 * 64bit block we have used is contained in *num; 63 * 64bit block we have used is contained in *num;
64 */ 64 */
65 65
66void DES_cfb64_encrypt(const unsigned char *in, unsigned char *out, 66void
67 long length, DES_key_schedule *schedule, 67DES_cfb64_encrypt(const unsigned char *in, unsigned char *out,
68 DES_cblock *ivec, int *num, int enc) 68 long length, DES_key_schedule *schedule,
69 { 69 DES_cblock *ivec, int *num, int enc)
70 DES_LONG v0,v1; 70{
71 long l=length; 71 DES_LONG v0, v1;
72 int n= *num; 72 long l = length;
73 int n = *num;
73 DES_LONG ti[2]; 74 DES_LONG ti[2];
74 unsigned char *iv,c,cc; 75 unsigned char *iv, c, cc;
75 76
76 iv = &(*ivec)[0]; 77 iv = &(*ivec)[0];
77 if (enc) 78 if (enc) {
78 { 79 while (l--) {
79 while (l--) 80 if (n == 0) {
80 { 81 c2l(iv, v0);
81 if (n == 0) 82 ti[0] = v0;
82 { 83 c2l(iv, v1);
83 c2l(iv,v0); ti[0]=v0; 84 ti[1] = v1;
84 c2l(iv,v1); ti[1]=v1; 85 DES_encrypt1(ti, schedule, DES_ENCRYPT);
85 DES_encrypt1(ti,schedule,DES_ENCRYPT);
86 iv = &(*ivec)[0]; 86 iv = &(*ivec)[0];
87 v0=ti[0]; l2c(v0,iv); 87 v0 = ti[0];
88 v0=ti[1]; l2c(v0,iv); 88 l2c(v0, iv);
89 v0 = ti[1];
90 l2c(v0, iv);
89 iv = &(*ivec)[0]; 91 iv = &(*ivec)[0];
90 }
91 c= *(in++)^iv[n];
92 *(out++)=c;
93 iv[n]=c;
94 n=(n+1)&0x07;
95 } 92 }
93 c = *(in++) ^ iv[n];
94 *(out++) = c;
95 iv[n] = c;
96 n = (n + 1) & 0x07;
96 } 97 }
97 else 98 } else {
98 { 99 while (l--) {
99 while (l--) 100 if (n == 0) {
100 { 101 c2l(iv, v0);
101 if (n == 0) 102 ti[0] = v0;
102 { 103 c2l(iv, v1);
103 c2l(iv,v0); ti[0]=v0; 104 ti[1] = v1;
104 c2l(iv,v1); ti[1]=v1; 105 DES_encrypt1(ti, schedule, DES_ENCRYPT);
105 DES_encrypt1(ti,schedule,DES_ENCRYPT);
106 iv = &(*ivec)[0]; 106 iv = &(*ivec)[0];
107 v0=ti[0]; l2c(v0,iv); 107 v0 = ti[0];
108 v0=ti[1]; l2c(v0,iv); 108 l2c(v0, iv);
109 v0 = ti[1];
110 l2c(v0, iv);
109 iv = &(*ivec)[0]; 111 iv = &(*ivec)[0];
110 }
111 cc= *(in++);
112 c=iv[n];
113 iv[n]=cc;
114 *(out++)=c^cc;
115 n=(n+1)&0x07;
116 } 112 }
113 cc = *(in++);
114 c = iv[n];
115 iv[n] = cc;
116 *(out++) = c ^ cc;
117 n = (n + 1) & 0x07;
117 } 118 }
118 v0=v1=ti[0]=ti[1]=c=cc=0;
119 *num=n;
120 } 119 }
121 120 v0 = v1 = ti[0] = ti[1] = c = cc = 0;
121 *num = n;
122}