diff options
Diffstat (limited to 'src/lib/libcrypto/des/enc_read.c')
-rw-r--r-- | src/lib/libcrypto/des/enc_read.c | 193 |
1 files changed, 93 insertions, 100 deletions
diff --git a/src/lib/libcrypto/des/enc_read.c b/src/lib/libcrypto/des/enc_read.c index a9010f6f9e..8095f265c0 100644 --- a/src/lib/libcrypto/des/enc_read.c +++ b/src/lib/libcrypto/des/enc_read.c | |||
@@ -1,25 +1,25 @@ | |||
1 | /* $OpenBSD: enc_read.c,v 1.16 2022/11/26 16:08:51 tb Exp $ */ | 1 | /* $OpenBSD: enc_read.c,v 1.17 2023/07/08 07:11:07 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
8 | * | 8 | * |
9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
15 | * | 15 | * |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
22 | * | 22 | * |
23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
25 | * are met: | 25 | * are met: |
@@ -34,10 +34,10 @@ | |||
34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
40 | * | 40 | * |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
@@ -49,7 +49,7 @@ | |||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
52 | * | 52 | * |
53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
@@ -84,146 +84,139 @@ int DES_rw_mode = DES_PCBC_MODE; | |||
84 | * used on multiple files. | 84 | * used on multiple files. |
85 | */ | 85 | */ |
86 | 86 | ||
87 | 87 | int | |
88 | int DES_enc_read(int fd, void *buf, int len, DES_key_schedule *sched, | 88 | DES_enc_read(int fd, void *buf, int len, DES_key_schedule *sched, |
89 | DES_cblock *iv) | 89 | DES_cblock *iv) |
90 | { | 90 | { |
91 | /* data to be unencrypted */ | 91 | /* data to be unencrypted */ |
92 | int net_num=0; | 92 | int net_num = 0; |
93 | static unsigned char *net=NULL; | 93 | static unsigned char *net = NULL; |
94 | /* extra unencrypted data | 94 | /* extra unencrypted data |
95 | * for when a block of 100 comes in but is des_read one byte at | 95 | * for when a block of 100 comes in but is des_read one byte at |
96 | * a time. */ | 96 | * a time. */ |
97 | static unsigned char *unnet=NULL; | 97 | static unsigned char *unnet = NULL; |
98 | static int unnet_start=0; | 98 | static int unnet_start = 0; |
99 | static int unnet_left=0; | 99 | static int unnet_left = 0; |
100 | static unsigned char *tmpbuf=NULL; | 100 | static unsigned char *tmpbuf = NULL; |
101 | int i; | 101 | int i; |
102 | long num=0,rnum; | 102 | long num = 0, rnum; |
103 | unsigned char *p; | 103 | unsigned char *p; |
104 | 104 | ||
105 | if (tmpbuf == NULL) | 105 | if (tmpbuf == NULL) { |
106 | { | 106 | tmpbuf = malloc(BSIZE); |
107 | tmpbuf=malloc(BSIZE); | 107 | if (tmpbuf == NULL) |
108 | if (tmpbuf == NULL) return(-1); | 108 | return (-1); |
109 | } | 109 | } |
110 | if (net == NULL) | 110 | if (net == NULL) { |
111 | { | 111 | net = malloc(BSIZE); |
112 | net=malloc(BSIZE); | 112 | if (net == NULL) |
113 | if (net == NULL) return(-1); | 113 | return (-1); |
114 | } | 114 | } |
115 | if (unnet == NULL) | 115 | if (unnet == NULL) { |
116 | { | 116 | unnet = malloc(BSIZE); |
117 | unnet=malloc(BSIZE); | 117 | if (unnet == NULL) |
118 | if (unnet == NULL) return(-1); | 118 | return (-1); |
119 | } | 119 | } |
120 | /* left over data from last decrypt */ | 120 | /* left over data from last decrypt */ |
121 | if (unnet_left != 0) | 121 | if (unnet_left != 0) { |
122 | { | 122 | if (unnet_left < len) { |
123 | if (unnet_left < len) | ||
124 | { | ||
125 | /* we still still need more data but will return | 123 | /* we still still need more data but will return |
126 | * with the number of bytes we have - should always | 124 | * with the number of bytes we have - should always |
127 | * check the return value */ | 125 | * check the return value */ |
128 | memcpy(buf,&(unnet[unnet_start]), | 126 | memcpy(buf, &(unnet[unnet_start]), |
129 | unnet_left); | 127 | unnet_left); |
130 | /* eay 26/08/92 I had the next 2 lines | 128 | /* eay 26/08/92 I had the next 2 lines |
131 | * reversed :-( */ | 129 | * reversed :-( */ |
132 | i=unnet_left; | 130 | i = unnet_left; |
133 | unnet_start=unnet_left=0; | 131 | unnet_start = unnet_left = 0; |
134 | } | 132 | } else { |
135 | else | 133 | memcpy(buf, &(unnet[unnet_start]), len); |
136 | { | 134 | unnet_start += len; |
137 | memcpy(buf,&(unnet[unnet_start]),len); | 135 | unnet_left -= len; |
138 | unnet_start+=len; | 136 | i = len; |
139 | unnet_left-=len; | ||
140 | i=len; | ||
141 | } | ||
142 | return(i); | ||
143 | } | 137 | } |
138 | return (i); | ||
139 | } | ||
144 | 140 | ||
145 | /* We need to get more data. */ | 141 | /* We need to get more data. */ |
146 | if (len > MAXWRITE) len=MAXWRITE; | 142 | if (len > MAXWRITE) |
143 | len = MAXWRITE; | ||
147 | 144 | ||
148 | /* first - get the length */ | 145 | /* first - get the length */ |
149 | while (net_num < HDRSIZE) | 146 | while (net_num < HDRSIZE) { |
150 | { | 147 | i = read(fd, (void *)&(net[net_num]), HDRSIZE - net_num); |
151 | i=read(fd,(void *)&(net[net_num]),HDRSIZE-net_num); | ||
152 | #ifdef EINTR | 148 | #ifdef EINTR |
153 | if ((i == -1) && (errno == EINTR)) continue; | 149 | if ((i == -1) && (errno == EINTR)) |
150 | continue; | ||
154 | #endif | 151 | #endif |
155 | if (i <= 0) return(0); | 152 | if (i <= 0) |
156 | net_num+=i; | 153 | return (0); |
157 | } | 154 | net_num += i; |
155 | } | ||
158 | 156 | ||
159 | /* we now have at net_num bytes in net */ | 157 | /* we now have at net_num bytes in net */ |
160 | p=net; | 158 | p = net; |
161 | /* num=0; */ | 159 | /* num=0; */ |
162 | n2l(p,num); | 160 | n2l(p, num); |
163 | /* num should be rounded up to the next group of eight | 161 | /* num should be rounded up to the next group of eight |
164 | * we make sure that we have read a multiple of 8 bytes from the net. | 162 | * we make sure that we have read a multiple of 8 bytes from the net. |
165 | */ | 163 | */ |
166 | if ((num > MAXWRITE) || (num < 0)) /* error */ | 164 | if ((num > MAXWRITE) || (num < 0)) /* error */ |
167 | return(-1); | 165 | return (-1); |
168 | rnum=(num < 8)?8:((num+7)/8*8); | 166 | rnum = (num < 8) ? 8 : ((num + 7)/8*8); |
169 | 167 | ||
170 | net_num=0; | 168 | net_num = 0; |
171 | while (net_num < rnum) | 169 | while (net_num < rnum) { |
172 | { | 170 | i = read(fd, (void *)&(net[net_num]), rnum - net_num); |
173 | i=read(fd,(void *)&(net[net_num]),rnum-net_num); | ||
174 | #ifdef EINTR | 171 | #ifdef EINTR |
175 | if ((i == -1) && (errno == EINTR)) continue; | 172 | if ((i == -1) && (errno == EINTR)) |
173 | continue; | ||
176 | #endif | 174 | #endif |
177 | if (i <= 0) return(0); | 175 | if (i <= 0) |
178 | net_num+=i; | 176 | return (0); |
179 | } | 177 | net_num += i; |
178 | } | ||
180 | 179 | ||
181 | /* Check if there will be data left over. */ | 180 | /* Check if there will be data left over. */ |
182 | if (len < num) | 181 | if (len < num) { |
183 | { | ||
184 | if (DES_rw_mode & DES_PCBC_MODE) | 182 | if (DES_rw_mode & DES_PCBC_MODE) |
185 | DES_pcbc_encrypt(net,unnet,num,sched,iv,DES_DECRYPT); | 183 | DES_pcbc_encrypt(net, unnet, num, sched, iv, |
184 | DES_DECRYPT); | ||
186 | else | 185 | else |
187 | DES_cbc_encrypt(net,unnet,num,sched,iv,DES_DECRYPT); | 186 | DES_cbc_encrypt(net, unnet, num, sched, iv, |
188 | memcpy(buf,unnet,len); | 187 | DES_DECRYPT); |
189 | unnet_start=len; | 188 | memcpy(buf, unnet, len); |
190 | unnet_left=num-len; | 189 | unnet_start = len; |
190 | unnet_left = num - len; | ||
191 | 191 | ||
192 | /* The following line is done because we return num | 192 | /* The following line is done because we return num |
193 | * as the number of bytes read. */ | 193 | * as the number of bytes read. */ |
194 | num=len; | 194 | num = len; |
195 | } | 195 | } else { |
196 | else | ||
197 | { | ||
198 | /* >output is a multiple of 8 byes, if len < rnum | 196 | /* >output is a multiple of 8 byes, if len < rnum |
199 | * >we must be careful. The user must be aware that this | 197 | * >we must be careful. The user must be aware that this |
200 | * >routine will write more bytes than he asked for. | 198 | * >routine will write more bytes than he asked for. |
201 | * >The length of the buffer must be correct. | 199 | * >The length of the buffer must be correct. |
202 | * FIXED - Should be ok now 18-9-90 - eay */ | 200 | * FIXED - Should be ok now 18-9-90 - eay */ |
203 | if (len < rnum) | 201 | if (len < rnum) { |
204 | { | ||
205 | |||
206 | if (DES_rw_mode & DES_PCBC_MODE) | 202 | if (DES_rw_mode & DES_PCBC_MODE) |
207 | DES_pcbc_encrypt(net,tmpbuf,num,sched,iv, | 203 | DES_pcbc_encrypt(net, tmpbuf, num, sched, iv, |
208 | DES_DECRYPT); | 204 | DES_DECRYPT); |
209 | else | 205 | else |
210 | DES_cbc_encrypt(net,tmpbuf,num,sched,iv, | 206 | DES_cbc_encrypt(net, tmpbuf, num, sched, iv, |
211 | DES_DECRYPT); | 207 | DES_DECRYPT); |
212 | 208 | ||
213 | /* eay 26/08/92 fix a bug that returned more | 209 | /* eay 26/08/92 fix a bug that returned more |
214 | * bytes than you asked for (returned len bytes :-( */ | 210 | * bytes than you asked for (returned len bytes :-( */ |
215 | memcpy(buf,tmpbuf,num); | 211 | memcpy(buf, tmpbuf, num); |
216 | } | 212 | } else { |
217 | else | ||
218 | { | ||
219 | if (DES_rw_mode & DES_PCBC_MODE) | 213 | if (DES_rw_mode & DES_PCBC_MODE) |
220 | DES_pcbc_encrypt(net,buf,num,sched,iv, | 214 | DES_pcbc_encrypt(net, buf, num, sched, iv, |
221 | DES_DECRYPT); | 215 | DES_DECRYPT); |
222 | else | 216 | else |
223 | DES_cbc_encrypt(net,buf,num,sched,iv, | 217 | DES_cbc_encrypt(net, buf, num, sched, iv, |
224 | DES_DECRYPT); | 218 | DES_DECRYPT); |
225 | } | ||
226 | } | 219 | } |
227 | return num; | ||
228 | } | 220 | } |
229 | 221 | return num; | |
222 | } | ||