summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/des/pcbc_enc.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/des/pcbc_enc.c')
-rw-r--r--src/lib/libcrypto/des/pcbc_enc.c115
1 files changed, 55 insertions, 60 deletions
diff --git a/src/lib/libcrypto/des/pcbc_enc.c b/src/lib/libcrypto/des/pcbc_enc.c
index 1f8688d1f3..8574a44083 100644
--- a/src/lib/libcrypto/des/pcbc_enc.c
+++ b/src/lib/libcrypto/des/pcbc_enc.c
@@ -1,25 +1,25 @@
1/* $OpenBSD: pcbc_enc.c,v 1.7 2022/11/26 16:08:51 tb Exp $ */ 1/* $OpenBSD: pcbc_enc.c,v 1.8 2023/07/08 07:11:07 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
5 * This package is an SSL implementation written 5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com). 6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL. 7 * The implementation was written so as to conform with Netscapes SSL.
8 * 8 *
9 * This library is free for commercial and non-commercial use as long as 9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions 10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA, 11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms 13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * 15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed. 17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution 18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used. 19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or 20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package. 21 * in documentation (online or textual) provided with the package.
22 * 22 *
23 * Redistribution and use in source and binary forms, with or without 23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions 24 * modification, are permitted provided that the following conditions
25 * are met: 25 * are met:
@@ -34,10 +34,10 @@
34 * Eric Young (eay@cryptsoft.com)" 34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library 35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-). 36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement: 38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * 40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE. 51 * SUCH DAMAGE.
52 * 52 *
53 * The licence and distribution terms for any publically available version or 53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence 55 * copied and put under another distribution licence
@@ -58,66 +58,61 @@
58 58
59#include "des_local.h" 59#include "des_local.h"
60 60
61void DES_pcbc_encrypt(const unsigned char *input, unsigned char *output, 61void
62 long length, DES_key_schedule *schedule, 62DES_pcbc_encrypt(const unsigned char *input, unsigned char *output,
63 DES_cblock *ivec, int enc) 63 long length, DES_key_schedule *schedule,
64 { 64 DES_cblock *ivec, int enc)
65 DES_LONG sin0,sin1,xor0,xor1,tout0,tout1; 65{
66 DES_LONG sin0, sin1, xor0, xor1, tout0, tout1;
66 DES_LONG tin[2]; 67 DES_LONG tin[2];
67 const unsigned char *in; 68 const unsigned char *in;
68 unsigned char *out,*iv; 69 unsigned char *out, *iv;
69 70
70 in=input; 71 in = input;
71 out=output; 72 out = output;
72 iv = &(*ivec)[0]; 73 iv = &(*ivec)[0];
73 74
74 if (enc) 75 if (enc) {
76 c2l(iv, xor0);
77 c2l(iv, xor1);
78 for (; length > 0; length -= 8)
75 { 79 {
76 c2l(iv,xor0); 80 if (length >= 8) {
77 c2l(iv,xor1); 81 c2l(in, sin0);
78 for (; length>0; length-=8) 82 c2l(in, sin1);
79 { 83 } else
80 if (length >= 8) 84 c2ln(in, sin0, sin1, length);
81 { 85 tin[0] = sin0 ^ xor0;
82 c2l(in,sin0); 86 tin[1] = sin1 ^ xor1;
83 c2l(in,sin1); 87 DES_encrypt1((DES_LONG *)tin, schedule, DES_ENCRYPT);
84 } 88 tout0 = tin[0];
85 else 89 tout1 = tin[1];
86 c2ln(in,sin0,sin1,length); 90 xor0 = sin0 ^ tout0;
87 tin[0]=sin0^xor0; 91 xor1 = sin1 ^ tout1;
88 tin[1]=sin1^xor1; 92 l2c(tout0, out);
89 DES_encrypt1((DES_LONG *)tin,schedule,DES_ENCRYPT); 93 l2c(tout1, out);
90 tout0=tin[0];
91 tout1=tin[1];
92 xor0=sin0^tout0;
93 xor1=sin1^tout1;
94 l2c(tout0,out);
95 l2c(tout1,out);
96 }
97 } 94 }
98 else 95 } else {
96 c2l(iv, xor0);
97 c2l(iv, xor1);
98 for (; length > 0; length -= 8)
99 { 99 {
100 c2l(iv,xor0); c2l(iv,xor1); 100 c2l(in, sin0);
101 for (; length>0; length-=8) 101 c2l(in, sin1);
102 { 102 tin[0] = sin0;
103 c2l(in,sin0); 103 tin[1] = sin1;
104 c2l(in,sin1); 104 DES_encrypt1((DES_LONG *)tin, schedule, DES_DECRYPT);
105 tin[0]=sin0; 105 tout0 = tin[0] ^ xor0;
106 tin[1]=sin1; 106 tout1 = tin[1] ^ xor1;
107 DES_encrypt1((DES_LONG *)tin,schedule,DES_DECRYPT); 107 if (length >= 8) {
108 tout0=tin[0]^xor0; 108 l2c(tout0, out);
109 tout1=tin[1]^xor1; 109 l2c(tout1, out);
110 if (length >= 8) 110 } else
111 { 111 l2cn(tout0, tout1, out, length);
112 l2c(tout0,out); 112 xor0 = tout0 ^ sin0;
113 l2c(tout1,out); 113 xor1 = tout1 ^ sin1;
114 }
115 else
116 l2cn(tout0,tout1,out,length);
117 xor0=tout0^sin0;
118 xor1=tout1^sin1;
119 }
120 } 114 }
121 tin[0]=tin[1]=0;
122 sin0=sin1=xor0=xor1=tout0=tout1=0;
123 } 115 }
116 tin[0] = tin[1] = 0;
117 sin0 = sin1 = xor0 = xor1 = tout0 = tout1 = 0;
118}