summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/des/des_enc.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/des/des_enc.c')
-rw-r--r--src/lib/libcrypto/des/des_enc.c538
1 files changed, 266 insertions, 272 deletions
diff --git a/src/lib/libcrypto/des/des_enc.c b/src/lib/libcrypto/des/des_enc.c
index 8d6232bbde..a8d8bd7ecb 100644
--- a/src/lib/libcrypto/des/des_enc.c
+++ b/src/lib/libcrypto/des/des_enc.c
@@ -1,25 +1,25 @@
1/* $OpenBSD: des_enc.c,v 1.13 2022/11/26 16:08:51 tb Exp $ */ 1/* $OpenBSD: des_enc.c,v 1.14 2023/07/08 07:11:07 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
5 * This package is an SSL implementation written 5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com). 6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL. 7 * The implementation was written so as to conform with Netscapes SSL.
8 * 8 *
9 * This library is free for commercial and non-commercial use as long as 9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions 10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA, 11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms 13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * 15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed. 17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution 18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used. 19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or 20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package. 21 * in documentation (online or textual) provided with the package.
22 * 22 *
23 * Redistribution and use in source and binary forms, with or without 23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions 24 * modification, are permitted provided that the following conditions
25 * are met: 25 * are met:
@@ -34,10 +34,10 @@
34 * Eric Young (eay@cryptsoft.com)" 34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library 35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-). 36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement: 38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * 40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE. 51 * SUCH DAMAGE.
52 * 52 *
53 * The licence and distribution terms for any publically available version or 53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence 55 * copied and put under another distribution licence
@@ -61,21 +61,22 @@
61 61
62#ifndef OPENBSD_DES_ASM 62#ifndef OPENBSD_DES_ASM
63 63
64void DES_encrypt1(DES_LONG *data, DES_key_schedule *ks, int enc) 64void
65 { 65DES_encrypt1(DES_LONG *data, DES_key_schedule *ks, int enc)
66 DES_LONG l,r,t,u; 66{
67 DES_LONG l, r, t, u;
67#ifdef DES_PTR 68#ifdef DES_PTR
68 const unsigned char *des_SP=(const unsigned char *)DES_SPtrans; 69 const unsigned char *des_SP = (const unsigned char *)DES_SPtrans;
69#endif 70#endif
70#ifndef DES_UNROLL 71#ifndef DES_UNROLL
71 int i; 72 int i;
72#endif 73#endif
73 DES_LONG *s; 74 DES_LONG *s;
74 75
75 r=data[0]; 76 r = data[0];
76 l=data[1]; 77 l = data[1];
77 78
78 IP(r,l); 79 IP(r, l);
79 /* Things have been modified so that the initial rotate is 80 /* Things have been modified so that the initial rotate is
80 * done outside the loop. This required the 81 * done outside the loop. This required the
81 * DES_SPtrans values in sp.h to be rotated 1 bit to the right. 82 * DES_SPtrans values in sp.h to be rotated 1 bit to the right.
@@ -84,90 +85,88 @@ void DES_encrypt1(DES_LONG *data, DES_key_schedule *ks, int enc)
84 * for pointing this out. */ 85 * for pointing this out. */
85 /* clear the top bits on machines with 8byte longs */ 86 /* clear the top bits on machines with 8byte longs */
86 /* shift left by 2 */ 87 /* shift left by 2 */
87 r=ROTATE(r,29)&0xffffffffL; 88 r = ROTATE(r, 29) & 0xffffffffL;
88 l=ROTATE(l,29)&0xffffffffL; 89 l = ROTATE(l, 29) & 0xffffffffL;
89 90
90 s=ks->ks->deslong; 91 s = ks->ks->deslong;
91 /* I don't know if it is worth the effort of loop unrolling the 92 /* I don't know if it is worth the effort of loop unrolling the
92 * inner loop */ 93 * inner loop */
93 if (enc) 94 if (enc) {
94 {
95#ifdef DES_UNROLL 95#ifdef DES_UNROLL
96 D_ENCRYPT(l,r, 0); /* 1 */ 96 D_ENCRYPT(l, r, 0); /* 1 */
97 D_ENCRYPT(r,l, 2); /* 2 */ 97 D_ENCRYPT(r, l, 2); /* 2 */
98 D_ENCRYPT(l,r, 4); /* 3 */ 98 D_ENCRYPT(l, r, 4); /* 3 */
99 D_ENCRYPT(r,l, 6); /* 4 */ 99 D_ENCRYPT(r, l, 6); /* 4 */
100 D_ENCRYPT(l,r, 8); /* 5 */ 100 D_ENCRYPT(l, r, 8); /* 5 */
101 D_ENCRYPT(r,l,10); /* 6 */ 101 D_ENCRYPT(r, l, 10); /* 6 */
102 D_ENCRYPT(l,r,12); /* 7 */ 102 D_ENCRYPT(l, r, 12); /* 7 */
103 D_ENCRYPT(r,l,14); /* 8 */ 103 D_ENCRYPT(r, l, 14); /* 8 */
104 D_ENCRYPT(l,r,16); /* 9 */ 104 D_ENCRYPT(l, r, 16); /* 9 */
105 D_ENCRYPT(r,l,18); /* 10 */ 105 D_ENCRYPT(r, l, 18); /* 10 */
106 D_ENCRYPT(l,r,20); /* 11 */ 106 D_ENCRYPT(l, r, 20); /* 11 */
107 D_ENCRYPT(r,l,22); /* 12 */ 107 D_ENCRYPT(r, l, 22); /* 12 */
108 D_ENCRYPT(l,r,24); /* 13 */ 108 D_ENCRYPT(l, r, 24); /* 13 */
109 D_ENCRYPT(r,l,26); /* 14 */ 109 D_ENCRYPT(r, l, 26); /* 14 */
110 D_ENCRYPT(l,r,28); /* 15 */ 110 D_ENCRYPT(l, r, 28); /* 15 */
111 D_ENCRYPT(r,l,30); /* 16 */ 111 D_ENCRYPT(r, l, 30); /* 16 */
112#else 112#else
113 for (i=0; i<32; i+=4) 113 for (i = 0; i < 32; i += 4)
114 {
115 D_ENCRYPT(l,r,i+0); /* 1 */
116 D_ENCRYPT(r,l,i+2); /* 2 */
117 }
118#endif
119 }
120 else
121 { 114 {
115 D_ENCRYPT(l, r, i + 0); /* 1 */
116 D_ENCRYPT(r, l, i + 2); /* 2 */
117 }
118#endif
119 } else {
122#ifdef DES_UNROLL 120#ifdef DES_UNROLL
123 D_ENCRYPT(l,r,30); /* 16 */ 121 D_ENCRYPT(l, r, 30); /* 16 */
124 D_ENCRYPT(r,l,28); /* 15 */ 122 D_ENCRYPT(r, l, 28); /* 15 */
125 D_ENCRYPT(l,r,26); /* 14 */ 123 D_ENCRYPT(l, r, 26); /* 14 */
126 D_ENCRYPT(r,l,24); /* 13 */ 124 D_ENCRYPT(r, l, 24); /* 13 */
127 D_ENCRYPT(l,r,22); /* 12 */ 125 D_ENCRYPT(l, r, 22); /* 12 */
128 D_ENCRYPT(r,l,20); /* 11 */ 126 D_ENCRYPT(r, l, 20); /* 11 */
129 D_ENCRYPT(l,r,18); /* 10 */ 127 D_ENCRYPT(l, r, 18); /* 10 */
130 D_ENCRYPT(r,l,16); /* 9 */ 128 D_ENCRYPT(r, l, 16); /* 9 */
131 D_ENCRYPT(l,r,14); /* 8 */ 129 D_ENCRYPT(l, r, 14); /* 8 */
132 D_ENCRYPT(r,l,12); /* 7 */ 130 D_ENCRYPT(r, l, 12); /* 7 */
133 D_ENCRYPT(l,r,10); /* 6 */ 131 D_ENCRYPT(l, r, 10); /* 6 */
134 D_ENCRYPT(r,l, 8); /* 5 */ 132 D_ENCRYPT(r, l, 8); /* 5 */
135 D_ENCRYPT(l,r, 6); /* 4 */ 133 D_ENCRYPT(l, r, 6); /* 4 */
136 D_ENCRYPT(r,l, 4); /* 3 */ 134 D_ENCRYPT(r, l, 4); /* 3 */
137 D_ENCRYPT(l,r, 2); /* 2 */ 135 D_ENCRYPT(l, r, 2); /* 2 */
138 D_ENCRYPT(r,l, 0); /* 1 */ 136 D_ENCRYPT(r, l, 0); /* 1 */
139#else 137#else
140 for (i=30; i>0; i-=4) 138 for (i = 30; i > 0; i -= 4)
141 { 139 {
142 D_ENCRYPT(l,r,i-0); /* 16 */ 140 D_ENCRYPT(l, r, i - 0); /* 16 */
143 D_ENCRYPT(r,l,i-2); /* 15 */ 141 D_ENCRYPT(r, l, i - 2); /* 15 */
144 }
145#endif
146 } 142 }
147 143#endif
148 /* rotate and clear the top bits on machines with 8byte longs */
149 l=ROTATE(l,3)&0xffffffffL;
150 r=ROTATE(r,3)&0xffffffffL;
151
152 FP(r,l);
153 data[0]=l;
154 data[1]=r;
155 l=r=t=u=0;
156 } 144 }
157 145
158void DES_encrypt2(DES_LONG *data, DES_key_schedule *ks, int enc) 146 /* rotate and clear the top bits on machines with 8byte longs */
159 { 147 l = ROTATE(l, 3) & 0xffffffffL;
160 DES_LONG l,r,t,u; 148 r = ROTATE(r, 3) & 0xffffffffL;
149
150 FP(r, l);
151 data[0] = l;
152 data[1] = r;
153 l = r = t = u = 0;
154}
155
156void
157DES_encrypt2(DES_LONG *data, DES_key_schedule *ks, int enc)
158{
159 DES_LONG l, r, t, u;
161#ifdef DES_PTR 160#ifdef DES_PTR
162 const unsigned char *des_SP=(const unsigned char *)DES_SPtrans; 161 const unsigned char *des_SP = (const unsigned char *)DES_SPtrans;
163#endif 162#endif
164#ifndef DES_UNROLL 163#ifndef DES_UNROLL
165 int i; 164 int i;
166#endif 165#endif
167 DES_LONG *s; 166 DES_LONG *s;
168 167
169 r=data[0]; 168 r = data[0];
170 l=data[1]; 169 l = data[1];
171 170
172 /* Things have been modified so that the initial rotate is 171 /* Things have been modified so that the initial rotate is
173 * done outside the loop. This required the 172 * done outside the loop. This required the
@@ -176,229 +175,224 @@ void DES_encrypt2(DES_LONG *data, DES_key_schedule *ks, int enc)
176 * Thanks to Richard Outerbridge <71755.204@CompuServe.COM> 175 * Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
177 * for pointing this out. */ 176 * for pointing this out. */
178 /* clear the top bits on machines with 8byte longs */ 177 /* clear the top bits on machines with 8byte longs */
179 r=ROTATE(r,29)&0xffffffffL; 178 r = ROTATE(r, 29) & 0xffffffffL;
180 l=ROTATE(l,29)&0xffffffffL; 179 l = ROTATE(l, 29) & 0xffffffffL;
181 180
182 s=ks->ks->deslong; 181 s = ks->ks->deslong;
183 /* I don't know if it is worth the effort of loop unrolling the 182 /* I don't know if it is worth the effort of loop unrolling the
184 * inner loop */ 183 * inner loop */
185 if (enc) 184 if (enc) {
186 {
187#ifdef DES_UNROLL 185#ifdef DES_UNROLL
188 D_ENCRYPT(l,r, 0); /* 1 */ 186 D_ENCRYPT(l, r, 0); /* 1 */
189 D_ENCRYPT(r,l, 2); /* 2 */ 187 D_ENCRYPT(r, l, 2); /* 2 */
190 D_ENCRYPT(l,r, 4); /* 3 */ 188 D_ENCRYPT(l, r, 4); /* 3 */
191 D_ENCRYPT(r,l, 6); /* 4 */ 189 D_ENCRYPT(r, l, 6); /* 4 */
192 D_ENCRYPT(l,r, 8); /* 5 */ 190 D_ENCRYPT(l, r, 8); /* 5 */
193 D_ENCRYPT(r,l,10); /* 6 */ 191 D_ENCRYPT(r, l, 10); /* 6 */
194 D_ENCRYPT(l,r,12); /* 7 */ 192 D_ENCRYPT(l, r, 12); /* 7 */
195 D_ENCRYPT(r,l,14); /* 8 */ 193 D_ENCRYPT(r, l, 14); /* 8 */
196 D_ENCRYPT(l,r,16); /* 9 */ 194 D_ENCRYPT(l, r, 16); /* 9 */
197 D_ENCRYPT(r,l,18); /* 10 */ 195 D_ENCRYPT(r, l, 18); /* 10 */
198 D_ENCRYPT(l,r,20); /* 11 */ 196 D_ENCRYPT(l, r, 20); /* 11 */
199 D_ENCRYPT(r,l,22); /* 12 */ 197 D_ENCRYPT(r, l, 22); /* 12 */
200 D_ENCRYPT(l,r,24); /* 13 */ 198 D_ENCRYPT(l, r, 24); /* 13 */
201 D_ENCRYPT(r,l,26); /* 14 */ 199 D_ENCRYPT(r, l, 26); /* 14 */
202 D_ENCRYPT(l,r,28); /* 15 */ 200 D_ENCRYPT(l, r, 28); /* 15 */
203 D_ENCRYPT(r,l,30); /* 16 */ 201 D_ENCRYPT(r, l, 30); /* 16 */
204#else 202#else
205 for (i=0; i<32; i+=4) 203 for (i = 0; i < 32; i += 4)
206 {
207 D_ENCRYPT(l,r,i+0); /* 1 */
208 D_ENCRYPT(r,l,i+2); /* 2 */
209 }
210#endif
211 }
212 else
213 { 204 {
205 D_ENCRYPT(l, r, i + 0); /* 1 */
206 D_ENCRYPT(r, l, i + 2); /* 2 */
207 }
208#endif
209 } else {
214#ifdef DES_UNROLL 210#ifdef DES_UNROLL
215 D_ENCRYPT(l,r,30); /* 16 */ 211 D_ENCRYPT(l, r, 30); /* 16 */
216 D_ENCRYPT(r,l,28); /* 15 */ 212 D_ENCRYPT(r, l, 28); /* 15 */
217 D_ENCRYPT(l,r,26); /* 14 */ 213 D_ENCRYPT(l, r, 26); /* 14 */
218 D_ENCRYPT(r,l,24); /* 13 */ 214 D_ENCRYPT(r, l, 24); /* 13 */
219 D_ENCRYPT(l,r,22); /* 12 */ 215 D_ENCRYPT(l, r, 22); /* 12 */
220 D_ENCRYPT(r,l,20); /* 11 */ 216 D_ENCRYPT(r, l, 20); /* 11 */
221 D_ENCRYPT(l,r,18); /* 10 */ 217 D_ENCRYPT(l, r, 18); /* 10 */
222 D_ENCRYPT(r,l,16); /* 9 */ 218 D_ENCRYPT(r, l, 16); /* 9 */
223 D_ENCRYPT(l,r,14); /* 8 */ 219 D_ENCRYPT(l, r, 14); /* 8 */
224 D_ENCRYPT(r,l,12); /* 7 */ 220 D_ENCRYPT(r, l, 12); /* 7 */
225 D_ENCRYPT(l,r,10); /* 6 */ 221 D_ENCRYPT(l, r, 10); /* 6 */
226 D_ENCRYPT(r,l, 8); /* 5 */ 222 D_ENCRYPT(r, l, 8); /* 5 */
227 D_ENCRYPT(l,r, 6); /* 4 */ 223 D_ENCRYPT(l, r, 6); /* 4 */
228 D_ENCRYPT(r,l, 4); /* 3 */ 224 D_ENCRYPT(r, l, 4); /* 3 */
229 D_ENCRYPT(l,r, 2); /* 2 */ 225 D_ENCRYPT(l, r, 2); /* 2 */
230 D_ENCRYPT(r,l, 0); /* 1 */ 226 D_ENCRYPT(r, l, 0); /* 1 */
231#else 227#else
232 for (i=30; i>0; i-=4) 228 for (i = 30; i > 0; i -= 4)
233 { 229 {
234 D_ENCRYPT(l,r,i-0); /* 16 */ 230 D_ENCRYPT(l, r, i - 0); /* 16 */
235 D_ENCRYPT(r,l,i-2); /* 15 */ 231 D_ENCRYPT(r, l, i - 2); /* 15 */
236 }
237#endif
238 } 232 }
239 /* rotate and clear the top bits on machines with 8byte longs */ 233#endif
240 data[0]=ROTATE(l,3)&0xffffffffL;
241 data[1]=ROTATE(r,3)&0xffffffffL;
242 l=r=t=u=0;
243 } 234 }
235 /* rotate and clear the top bits on machines with 8byte longs */
236 data[0] = ROTATE(l, 3) & 0xffffffffL;
237 data[1] = ROTATE(r, 3) & 0xffffffffL;
238 l = r = t = u = 0;
239}
244 240
245#endif /* OPENBSD_DES_ASM */ 241#endif /* OPENBSD_DES_ASM */
246 242
247void DES_encrypt3(DES_LONG *data, DES_key_schedule *ks1, 243void
248 DES_key_schedule *ks2, DES_key_schedule *ks3) 244DES_encrypt3(DES_LONG *data, DES_key_schedule *ks1,
249 { 245 DES_key_schedule *ks2, DES_key_schedule *ks3)
250 DES_LONG l,r; 246{
251 247 DES_LONG l, r;
252 l=data[0]; 248
253 r=data[1]; 249 l = data[0];
254 IP(l,r); 250 r = data[1];
255 data[0]=l; 251 IP(l, r);
256 data[1]=r; 252 data[0] = l;
257 DES_encrypt2((DES_LONG *)data,ks1,DES_ENCRYPT); 253 data[1] = r;
258 DES_encrypt2((DES_LONG *)data,ks2,DES_DECRYPT); 254 DES_encrypt2((DES_LONG *)data, ks1, DES_ENCRYPT);
259 DES_encrypt2((DES_LONG *)data,ks3,DES_ENCRYPT); 255 DES_encrypt2((DES_LONG *)data, ks2, DES_DECRYPT);
260 l=data[0]; 256 DES_encrypt2((DES_LONG *)data, ks3, DES_ENCRYPT);
261 r=data[1]; 257 l = data[0];
262 FP(r,l); 258 r = data[1];
263 data[0]=l; 259 FP(r, l);
264 data[1]=r; 260 data[0] = l;
265 } 261 data[1] = r;
266 262}
267void DES_decrypt3(DES_LONG *data, DES_key_schedule *ks1, 263
268 DES_key_schedule *ks2, DES_key_schedule *ks3) 264void
269 { 265DES_decrypt3(DES_LONG *data, DES_key_schedule *ks1,
270 DES_LONG l,r; 266 DES_key_schedule *ks2, DES_key_schedule *ks3)
271 267{
272 l=data[0]; 268 DES_LONG l, r;
273 r=data[1]; 269
274 IP(l,r); 270 l = data[0];
275 data[0]=l; 271 r = data[1];
276 data[1]=r; 272 IP(l, r);
277 DES_encrypt2((DES_LONG *)data,ks3,DES_DECRYPT); 273 data[0] = l;
278 DES_encrypt2((DES_LONG *)data,ks2,DES_ENCRYPT); 274 data[1] = r;
279 DES_encrypt2((DES_LONG *)data,ks1,DES_DECRYPT); 275 DES_encrypt2((DES_LONG *)data, ks3, DES_DECRYPT);
280 l=data[0]; 276 DES_encrypt2((DES_LONG *)data, ks2, DES_ENCRYPT);
281 r=data[1]; 277 DES_encrypt2((DES_LONG *)data, ks1, DES_DECRYPT);
282 FP(r,l); 278 l = data[0];
283 data[0]=l; 279 r = data[1];
284 data[1]=r; 280 FP(r, l);
285 } 281 data[0] = l;
282 data[1] = r;
283}
286 284
287#ifndef DES_DEFAULT_OPTIONS 285#ifndef DES_DEFAULT_OPTIONS
288 286
289#undef CBC_ENC_C__DONT_UPDATE_IV 287#undef CBC_ENC_C__DONT_UPDATE_IV
290#include "ncbc_enc.c" /* DES_ncbc_encrypt */ 288#include "ncbc_enc.c" /* DES_ncbc_encrypt */
291 289
292void DES_ede3_cbc_encrypt(const unsigned char *input, unsigned char *output, 290void
293 long length, DES_key_schedule *ks1, 291DES_ede3_cbc_encrypt(const unsigned char *input, unsigned char *output,
294 DES_key_schedule *ks2, DES_key_schedule *ks3, 292 long length, DES_key_schedule *ks1,
295 DES_cblock *ivec, int enc) 293 DES_key_schedule *ks2, DES_key_schedule *ks3,
296 { 294 DES_cblock *ivec, int enc)
297 DES_LONG tin0,tin1; 295{
298 DES_LONG tout0,tout1,xor0,xor1; 296 DES_LONG tin0, tin1;
297 DES_LONG tout0, tout1, xor0, xor1;
299 const unsigned char *in; 298 const unsigned char *in;
300 unsigned char *out; 299 unsigned char *out;
301 long l=length; 300 long l = length;
302 DES_LONG tin[2]; 301 DES_LONG tin[2];
303 unsigned char *iv; 302 unsigned char *iv;
304 303
305 in=input; 304 in = input;
306 out=output; 305 out = output;
307 iv = &(*ivec)[0]; 306 iv = &(*ivec)[0];
308 307
309 if (enc) 308 if (enc) {
309 c2l(iv, tout0);
310 c2l(iv, tout1);
311 for (l -= 8; l >= 0; l -= 8)
310 { 312 {
311 c2l(iv,tout0); 313 c2l(in, tin0);
312 c2l(iv,tout1); 314 c2l(in, tin1);
313 for (l-=8; l>=0; l-=8) 315 tin0 ^= tout0;
314 { 316 tin1 ^= tout1;
315 c2l(in,tin0); 317
316 c2l(in,tin1); 318 tin[0] = tin0;
317 tin0^=tout0; 319 tin[1] = tin1;
318 tin1^=tout1; 320 DES_encrypt3((DES_LONG *)tin, ks1, ks2, ks3);
319 321 tout0 = tin[0];
320 tin[0]=tin0; 322 tout1 = tin[1];
321 tin[1]=tin1; 323
322 DES_encrypt3((DES_LONG *)tin,ks1,ks2,ks3); 324 l2c(tout0, out);
323 tout0=tin[0]; 325 l2c(tout1, out);
324 tout1=tin[1]; 326 }
325 327 if (l != -8) {
326 l2c(tout0,out); 328 c2ln(in, tin0, tin1, l + 8);
327 l2c(tout1,out); 329 tin0 ^= tout0;
328 } 330 tin1 ^= tout1;
329 if (l != -8) 331
330 { 332 tin[0] = tin0;
331 c2ln(in,tin0,tin1,l+8); 333 tin[1] = tin1;
332 tin0^=tout0; 334 DES_encrypt3((DES_LONG *)tin, ks1, ks2, ks3);
333 tin1^=tout1; 335 tout0 = tin[0];
334 336 tout1 = tin[1];
335 tin[0]=tin0; 337
336 tin[1]=tin1; 338 l2c(tout0, out);
337 DES_encrypt3((DES_LONG *)tin,ks1,ks2,ks3); 339 l2c(tout1, out);
338 tout0=tin[0];
339 tout1=tin[1];
340
341 l2c(tout0,out);
342 l2c(tout1,out);
343 }
344 iv = &(*ivec)[0];
345 l2c(tout0,iv);
346 l2c(tout1,iv);
347 } 340 }
348 else 341 iv = &(*ivec)[0];
342 l2c(tout0, iv);
343 l2c(tout1, iv);
344 } else {
345 DES_LONG t0, t1;
346
347 c2l(iv, xor0);
348 c2l(iv, xor1);
349 for (l -= 8; l >= 0; l -= 8)
349 { 350 {
350 DES_LONG t0,t1; 351 c2l(in, tin0);
351 352 c2l(in, tin1);
352 c2l(iv,xor0); 353
353 c2l(iv,xor1); 354 t0 = tin0;
354 for (l-=8; l>=0; l-=8) 355 t1 = tin1;
355 { 356
356 c2l(in,tin0); 357 tin[0] = tin0;
357 c2l(in,tin1); 358 tin[1] = tin1;
358 359 DES_decrypt3((DES_LONG *)tin, ks1, ks2, ks3);
359 t0=tin0; 360 tout0 = tin[0];
360 t1=tin1; 361 tout1 = tin[1];
361 362
362 tin[0]=tin0; 363 tout0 ^= xor0;
363 tin[1]=tin1; 364 tout1 ^= xor1;
364 DES_decrypt3((DES_LONG *)tin,ks1,ks2,ks3); 365 l2c(tout0, out);
365 tout0=tin[0]; 366 l2c(tout1, out);
366 tout1=tin[1]; 367 xor0 = t0;
367 368 xor1 = t1;
368 tout0^=xor0; 369 }
369 tout1^=xor1; 370 if (l != -8) {
370 l2c(tout0,out); 371 c2l(in, tin0);
371 l2c(tout1,out); 372 c2l(in, tin1);
372 xor0=t0; 373
373 xor1=t1; 374 t0 = tin0;
374 } 375 t1 = tin1;
375 if (l != -8) 376
376 { 377 tin[0] = tin0;
377 c2l(in,tin0); 378 tin[1] = tin1;
378 c2l(in,tin1); 379 DES_decrypt3((DES_LONG *)tin, ks1, ks2, ks3);
379 380 tout0 = tin[0];
380 t0=tin0; 381 tout1 = tin[1];
381 t1=tin1; 382
382 383 tout0 ^= xor0;
383 tin[0]=tin0; 384 tout1 ^= xor1;
384 tin[1]=tin1; 385 l2cn(tout0, tout1, out, l + 8);
385 DES_decrypt3((DES_LONG *)tin,ks1,ks2,ks3); 386 xor0 = t0;
386 tout0=tin[0]; 387 xor1 = t1;
387 tout1=tin[1]; 388 }
388
389 tout0^=xor0;
390 tout1^=xor1;
391 l2cn(tout0,tout1,out,l+8);
392 xor0=t0;
393 xor1=t1;
394 }
395 389
396 iv = &(*ivec)[0]; 390 iv = &(*ivec)[0];
397 l2c(xor0,iv); 391 l2c(xor0, iv);
398 l2c(xor1,iv); 392 l2c(xor1, iv);
399 }
400 tin0=tin1=tout0=tout1=xor0=xor1=0;
401 tin[0]=tin[1]=0;
402 } 393 }
394 tin0 = tin1 = tout0 = tout1 = xor0 = xor1 = 0;
395 tin[0] = tin[1] = 0;
396}
403 397
404#endif /* DES_DEFAULT_OPTIONS */ 398#endif /* DES_DEFAULT_OPTIONS */