summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rc2/rc2_skey.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/rc2/rc2_skey.c')
-rw-r--r--src/lib/libcrypto/rc2/rc2_skey.c81
1 files changed, 42 insertions, 39 deletions
diff --git a/src/lib/libcrypto/rc2/rc2_skey.c b/src/lib/libcrypto/rc2/rc2_skey.c
index 82161b16f3..640ff7ad9b 100644
--- a/src/lib/libcrypto/rc2/rc2_skey.c
+++ b/src/lib/libcrypto/rc2/rc2_skey.c
@@ -1,25 +1,25 @@
1/* $OpenBSD: rc2_skey.c,v 1.13 2022/11/26 16:08:54 tb Exp $ */ 1/* $OpenBSD: rc2_skey.c,v 1.14 2023/07/07 08:29:37 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
5 * This package is an SSL implementation written 5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com). 6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL. 7 * The implementation was written so as to conform with Netscapes SSL.
8 * 8 *
9 * This library is free for commercial and non-commercial use as long as 9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions 10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA, 11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms 13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * 15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed. 17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution 18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used. 19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or 20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package. 21 * in documentation (online or textual) provided with the package.
22 * 22 *
23 * Redistribution and use in source and binary forms, with or without 23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions 24 * modification, are permitted provided that the following conditions
25 * are met: 25 * are met:
@@ -34,10 +34,10 @@
34 * Eric Young (eay@cryptsoft.com)" 34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library 35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-). 36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement: 38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * 40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE. 51 * SUCH DAMAGE.
52 * 52 *
53 * The licence and distribution terms for any publically available version or 53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence 55 * copied and put under another distribution licence
@@ -91,48 +91,51 @@ static const unsigned char key_table[256]={
91 * BSAFE uses the 'retarded' version. What I previously shipped is 91 * BSAFE uses the 'retarded' version. What I previously shipped is
92 * the same as specifying 1024 for the 'bits' parameter. Bsafe uses 92 * the same as specifying 1024 for the 'bits' parameter. Bsafe uses
93 * a version where the bits parameter is the same as len*8 */ 93 * a version where the bits parameter is the same as len*8 */
94void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits) 94void
95 { 95RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits)
96 int i,j; 96{
97 int i, j;
97 unsigned char *k; 98 unsigned char *k;
98 RC2_INT *ki; 99 RC2_INT *ki;
99 unsigned int c,d; 100 unsigned int c, d;
100 101
101 k= (unsigned char *)&(key->data[0]); 102 k = (unsigned char *)&(key->data[0]);
102 *k=0; /* for if there is a zero length key */ 103 *k = 0; /* for if there is a zero length key */
103 104
104 if (len > 128) len=128; 105 if (len > 128)
105 if (bits <= 0) bits=1024; 106 len = 128;
106 if (bits > 1024) bits=1024; 107 if (bits <= 0)
108 bits = 1024;
109 if (bits > 1024)
110 bits = 1024;
107 111
108 for (i=0; i<len; i++) 112 for (i = 0; i < len; i++)
109 k[i]=data[i]; 113 k[i] = data[i];
110 114
111 /* expand table */ 115 /* expand table */
112 d=k[len-1]; 116 d = k[len - 1];
113 j=0; 117 j = 0;
114 for (i=len; i < 128; i++,j++) 118 for (i = len; i < 128; i++, j++)
115 { 119 {
116 d=key_table[(k[j]+d)&0xff]; 120 d = key_table[(k[j] + d) & 0xff];
117 k[i]=d; 121 k[i] = d;
118 } 122 }
119 123
120 /* hmm.... key reduction to 'bits' bits */ 124 /* hmm.... key reduction to 'bits' bits */
121 125
122 j=(bits+7)>>3; 126 j = (bits + 7) >> 3;
123 i=128-j; 127 i = 128 - j;
124 c= (0xff>>(-bits & 0x07)); 128 c = (0xff >> (-bits & 0x07));
125 129
126 d=key_table[k[i]&c]; 130 d = key_table[k[i] & c];
127 k[i]=d; 131 k[i] = d;
128 while (i--) 132 while (i--) {
129 { 133 d = key_table[k[i + j] ^ d];
130 d=key_table[k[i+j]^d]; 134 k[i] = d;
131 k[i]=d; 135 }
132 }
133 136
134 /* copy from bytes into RC2_INT's */ 137 /* copy from bytes into RC2_INT's */
135 ki= &(key->data[63]); 138 ki = &(key->data[63]);
136 for (i=127; i>=0; i-=2) 139 for (i = 127; i >= 0; i -= 2)
137 *(ki--)=((k[i]<<8)|k[i-1])&0xffff; 140 *(ki--) = ((k[i] << 8)|k[i - 1]) & 0xffff;
138 } 141}