diff options
Diffstat (limited to 'src/lib/libcrypto/rc4')
-rw-r--r-- | src/lib/libcrypto/rc4/asm/rc4-586.pl | 173 | ||||
-rw-r--r-- | src/lib/libcrypto/rc4/rc4.h | 88 | ||||
-rw-r--r-- | src/lib/libcrypto/rc4/rc4_enc.c | 315 | ||||
-rw-r--r-- | src/lib/libcrypto/rc4/rc4_locl.h | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/rc4/rc4_skey.c | 117 |
5 files changed, 0 insertions, 697 deletions
diff --git a/src/lib/libcrypto/rc4/asm/rc4-586.pl b/src/lib/libcrypto/rc4/asm/rc4-586.pl deleted file mode 100644 index 7ef889e5a1..0000000000 --- a/src/lib/libcrypto/rc4/asm/rc4-586.pl +++ /dev/null | |||
@@ -1,173 +0,0 @@ | |||
1 | #!/usr/local/bin/perl | ||
2 | |||
3 | # define for pentium pro friendly version | ||
4 | |||
5 | push(@INC,"perlasm","../../perlasm"); | ||
6 | require "x86asm.pl"; | ||
7 | |||
8 | &asm_init($ARGV[0],"rc4-586.pl"); | ||
9 | |||
10 | $tx="eax"; | ||
11 | $ty="ebx"; | ||
12 | $x="ecx"; | ||
13 | $y="edx"; | ||
14 | $in="esi"; | ||
15 | $out="edi"; | ||
16 | $d="ebp"; | ||
17 | |||
18 | &RC4("RC4"); | ||
19 | |||
20 | &asm_finish(); | ||
21 | |||
22 | sub RC4_loop | ||
23 | { | ||
24 | local($n,$p,$char)=@_; | ||
25 | |||
26 | &comment("Round $n"); | ||
27 | |||
28 | if ($char) | ||
29 | { | ||
30 | if ($p >= 0) | ||
31 | { | ||
32 | &mov($ty, &swtmp(2)); | ||
33 | &cmp($ty, $in); | ||
34 | &jle(&label("finished")); | ||
35 | &inc($in); | ||
36 | } | ||
37 | else | ||
38 | { | ||
39 | &add($ty, 8); | ||
40 | &inc($in); | ||
41 | &cmp($ty, $in); | ||
42 | &jl(&label("finished")); | ||
43 | &mov(&swtmp(2), $ty); | ||
44 | } | ||
45 | } | ||
46 | # Moved out | ||
47 | # &mov( $tx, &DWP(0,$d,$x,4)) if $p < 0; | ||
48 | |||
49 | &add( $y, $tx); | ||
50 | &and( $y, 0xff); | ||
51 | &inc( $x); # NEXT ROUND | ||
52 | &mov( $ty, &DWP(0,$d,$y,4)); | ||
53 | # XXX | ||
54 | &mov( &DWP(-4,$d,$x,4),$ty); # AGI | ||
55 | &add( $ty, $tx); | ||
56 | &and( $x, 0xff); # NEXT ROUND | ||
57 | &and( $ty, 0xff); | ||
58 | &mov( &DWP(0,$d,$y,4),$tx); | ||
59 | &nop(); | ||
60 | &mov( $ty, &DWP(0,$d,$ty,4)); | ||
61 | &mov( $tx, &DWP(0,$d,$x,4)) if $p < 1; # NEXT ROUND | ||
62 | # XXX | ||
63 | |||
64 | if (!$char) | ||
65 | { | ||
66 | #moved up into last round | ||
67 | if ($p >= 1) | ||
68 | { | ||
69 | &add( $out, 8) | ||
70 | } | ||
71 | &movb( &BP($n,"esp","",0), &LB($ty)); | ||
72 | } | ||
73 | else | ||
74 | { | ||
75 | # Note in+=8 has occured | ||
76 | &movb( &HB($ty), &BP(-1,$in,"",0)); | ||
77 | # XXX | ||
78 | &xorb(&LB($ty), &HB($ty)); | ||
79 | # XXX | ||
80 | &movb(&BP($n,$out,"",0),&LB($ty)); | ||
81 | } | ||
82 | } | ||
83 | |||
84 | |||
85 | sub RC4 | ||
86 | { | ||
87 | local($name)=@_; | ||
88 | |||
89 | &function_begin_B($name,""); | ||
90 | |||
91 | &comment(""); | ||
92 | |||
93 | &push("ebp"); | ||
94 | &push("ebx"); | ||
95 | &mov( $d, &wparam(0)); # key | ||
96 | &mov( $ty, &wparam(1)); # num | ||
97 | &push("esi"); | ||
98 | &push("edi"); | ||
99 | |||
100 | &mov( $x, &DWP(0,$d,"",1)); | ||
101 | &mov( $y, &DWP(4,$d,"",1)); | ||
102 | |||
103 | &mov( $in, &wparam(2)); | ||
104 | &inc( $x); | ||
105 | |||
106 | &stack_push(3); # 3 temp variables | ||
107 | &add( $d, 8); | ||
108 | &and( $x, 0xff); | ||
109 | |||
110 | &lea( $ty, &DWP(-8,$ty,$in)); | ||
111 | |||
112 | # check for 0 length input | ||
113 | |||
114 | &mov( $out, &wparam(3)); | ||
115 | &mov( &swtmp(2), $ty); # this is now address to exit at | ||
116 | &mov( $tx, &DWP(0,$d,$x,4)); | ||
117 | |||
118 | &cmp( $ty, $in); | ||
119 | &jl( &label("end")); # less than 8 bytes | ||
120 | |||
121 | &set_label("start"); | ||
122 | |||
123 | # filling DELAY SLOT | ||
124 | &add( $in, 8); | ||
125 | |||
126 | &RC4_loop(0,-1,0); | ||
127 | &RC4_loop(1,0,0); | ||
128 | &RC4_loop(2,0,0); | ||
129 | &RC4_loop(3,0,0); | ||
130 | &RC4_loop(4,0,0); | ||
131 | &RC4_loop(5,0,0); | ||
132 | &RC4_loop(6,0,0); | ||
133 | &RC4_loop(7,1,0); | ||
134 | |||
135 | &comment("apply the cipher text"); | ||
136 | # xor the cipher data with input | ||
137 | |||
138 | #&add( $out, 8); #moved up into last round | ||
139 | |||
140 | &mov( $tx, &swtmp(0)); | ||
141 | &mov( $ty, &DWP(-8,$in,"",0)); | ||
142 | &xor( $tx, $ty); | ||
143 | &mov( $ty, &DWP(-4,$in,"",0)); | ||
144 | &mov( &DWP(-8,$out,"",0), $tx); | ||
145 | &mov( $tx, &swtmp(1)); | ||
146 | &xor( $tx, $ty); | ||
147 | &mov( $ty, &swtmp(2)); # load end ptr; | ||
148 | &mov( &DWP(-4,$out,"",0), $tx); | ||
149 | &mov( $tx, &DWP(0,$d,$x,4)); | ||
150 | &cmp($in, $ty); | ||
151 | &jle(&label("start")); | ||
152 | |||
153 | &set_label("end"); | ||
154 | |||
155 | # There is quite a bit of extra crap in RC4_loop() for this | ||
156 | # first round | ||
157 | &RC4_loop(0,-1,1); | ||
158 | &RC4_loop(1,0,1); | ||
159 | &RC4_loop(2,0,1); | ||
160 | &RC4_loop(3,0,1); | ||
161 | &RC4_loop(4,0,1); | ||
162 | &RC4_loop(5,0,1); | ||
163 | &RC4_loop(6,1,1); | ||
164 | |||
165 | &set_label("finished"); | ||
166 | &dec( $x); | ||
167 | &stack_pop(3); | ||
168 | &mov( &DWP(-4,$d,"",0),$y); | ||
169 | &movb( &BP(-8,$d,"",0),&LB($x)); | ||
170 | |||
171 | &function_end($name); | ||
172 | } | ||
173 | |||
diff --git a/src/lib/libcrypto/rc4/rc4.h b/src/lib/libcrypto/rc4/rc4.h deleted file mode 100644 index 40251024a4..0000000000 --- a/src/lib/libcrypto/rc4/rc4.h +++ /dev/null | |||
@@ -1,88 +0,0 @@ | |||
1 | /* crypto/rc4/rc4.h */ | ||
2 | /* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #ifndef HEADER_RC4_H | ||
60 | #define HEADER_RC4_H | ||
61 | |||
62 | #ifdef NO_RC4 | ||
63 | #error RC4 is disabled. | ||
64 | #endif | ||
65 | |||
66 | #include <openssl/opensslconf.h> /* RC4_INT */ | ||
67 | |||
68 | #ifdef __cplusplus | ||
69 | extern "C" { | ||
70 | #endif | ||
71 | |||
72 | typedef struct rc4_key_st | ||
73 | { | ||
74 | RC4_INT x,y; | ||
75 | RC4_INT data[256]; | ||
76 | } RC4_KEY; | ||
77 | |||
78 | |||
79 | const char *RC4_options(void); | ||
80 | void RC4_set_key(RC4_KEY *key, int len, const unsigned char *data); | ||
81 | void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata, | ||
82 | unsigned char *outdata); | ||
83 | |||
84 | #ifdef __cplusplus | ||
85 | } | ||
86 | #endif | ||
87 | |||
88 | #endif | ||
diff --git a/src/lib/libcrypto/rc4/rc4_enc.c b/src/lib/libcrypto/rc4/rc4_enc.c deleted file mode 100644 index d5f18a3a70..0000000000 --- a/src/lib/libcrypto/rc4/rc4_enc.c +++ /dev/null | |||
@@ -1,315 +0,0 @@ | |||
1 | /* crypto/rc4/rc4_enc.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <openssl/rc4.h> | ||
60 | #include "rc4_locl.h" | ||
61 | |||
62 | /* RC4 as implemented from a posting from | ||
63 | * Newsgroups: sci.crypt | ||
64 | * From: sterndark@netcom.com (David Sterndark) | ||
65 | * Subject: RC4 Algorithm revealed. | ||
66 | * Message-ID: <sternCvKL4B.Hyy@netcom.com> | ||
67 | * Date: Wed, 14 Sep 1994 06:35:31 GMT | ||
68 | */ | ||
69 | |||
70 | void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata, | ||
71 | unsigned char *outdata) | ||
72 | { | ||
73 | register RC4_INT *d; | ||
74 | register RC4_INT x,y,tx,ty; | ||
75 | int i; | ||
76 | |||
77 | x=key->x; | ||
78 | y=key->y; | ||
79 | d=key->data; | ||
80 | |||
81 | #if defined(RC4_CHUNK) | ||
82 | /* | ||
83 | * The original reason for implementing this(*) was the fact that | ||
84 | * pre-21164a Alpha CPUs don't have byte load/store instructions | ||
85 | * and e.g. a byte store has to be done with 64-bit load, shift, | ||
86 | * and, or and finally 64-bit store. Peaking data and operating | ||
87 | * at natural word size made it possible to reduce amount of | ||
88 | * instructions as well as to perform early read-ahead without | ||
89 | * suffering from RAW (read-after-write) hazard. This resulted | ||
90 | * in ~40%(**) performance improvement on 21064 box with gcc. | ||
91 | * But it's not only Alpha users who win here:-) Thanks to the | ||
92 | * early-n-wide read-ahead this implementation also exhibits | ||
93 | * >40% speed-up on SPARC and 20-30% on 64-bit MIPS (depending | ||
94 | * on sizeof(RC4_INT)). | ||
95 | * | ||
96 | * (*) "this" means code which recognizes the case when input | ||
97 | * and output pointers appear to be aligned at natural CPU | ||
98 | * word boundary | ||
99 | * (**) i.e. according to 'apps/openssl speed rc4' benchmark, | ||
100 | * crypto/rc4/rc4speed.c exhibits almost 70% speed-up... | ||
101 | * | ||
102 | * Cavets. | ||
103 | * | ||
104 | * - RC4_CHUNK="unsigned long long" should be a #1 choice for | ||
105 | * UltraSPARC. Unfortunately gcc generates very slow code | ||
106 | * (2.5-3 times slower than one generated by Sun's WorkShop | ||
107 | * C) and therefore gcc (at least 2.95 and earlier) should | ||
108 | * always be told that RC4_CHUNK="unsigned long". | ||
109 | * | ||
110 | * <appro@fy.chalmers.se> | ||
111 | */ | ||
112 | |||
113 | # define RC4_STEP ( \ | ||
114 | x=(x+1) &0xff, \ | ||
115 | tx=d[x], \ | ||
116 | y=(tx+y)&0xff, \ | ||
117 | ty=d[y], \ | ||
118 | d[y]=tx, \ | ||
119 | d[x]=ty, \ | ||
120 | (RC4_CHUNK)d[(tx+ty)&0xff]\ | ||
121 | ) | ||
122 | |||
123 | if ( ( ((unsigned long)indata & (sizeof(RC4_CHUNK)-1)) | | ||
124 | ((unsigned long)outdata & (sizeof(RC4_CHUNK)-1)) ) == 0 ) | ||
125 | { | ||
126 | RC4_CHUNK ichunk,otp; | ||
127 | const union { long one; char little; } is_endian = {1}; | ||
128 | |||
129 | /* | ||
130 | * I reckon we can afford to implement both endian | ||
131 | * cases and to decide which way to take at run-time | ||
132 | * because the machine code appears to be very compact | ||
133 | * and redundant 1-2KB is perfectly tolerable (i.e. | ||
134 | * in case the compiler fails to eliminate it:-). By | ||
135 | * suggestion from Terrel Larson <terr@terralogic.net> | ||
136 | * who also stands for the is_endian union:-) | ||
137 | * | ||
138 | * Special notes. | ||
139 | * | ||
140 | * - is_endian is declared automatic as doing otherwise | ||
141 | * (declaring static) prevents gcc from eliminating | ||
142 | * the redundant code; | ||
143 | * - compilers (those I've tried) don't seem to have | ||
144 | * problems eliminating either the operators guarded | ||
145 | * by "if (sizeof(RC4_CHUNK)==8)" or the condition | ||
146 | * expressions themselves so I've got 'em to replace | ||
147 | * corresponding #ifdefs from the previous version; | ||
148 | * - I chose to let the redundant switch cases when | ||
149 | * sizeof(RC4_CHUNK)!=8 be (were also #ifdefed | ||
150 | * before); | ||
151 | * - in case you wonder "&(sizeof(RC4_CHUNK)*8-1)" in | ||
152 | * [LB]ESHFT guards against "shift is out of range" | ||
153 | * warnings when sizeof(RC4_CHUNK)!=8 | ||
154 | * | ||
155 | * <appro@fy.chalmers.se> | ||
156 | */ | ||
157 | if (!is_endian.little) | ||
158 | { /* BIG-ENDIAN CASE */ | ||
159 | # define BESHFT(c) (((sizeof(RC4_CHUNK)-(c)-1)*8)&(sizeof(RC4_CHUNK)*8-1)) | ||
160 | for (;len&-sizeof(RC4_CHUNK);len-=sizeof(RC4_CHUNK)) | ||
161 | { | ||
162 | ichunk = *(RC4_CHUNK *)indata; | ||
163 | otp = RC4_STEP<<BESHFT(0); | ||
164 | otp |= RC4_STEP<<BESHFT(1); | ||
165 | otp |= RC4_STEP<<BESHFT(2); | ||
166 | otp |= RC4_STEP<<BESHFT(3); | ||
167 | if (sizeof(RC4_CHUNK)==8) | ||
168 | { | ||
169 | otp |= RC4_STEP<<BESHFT(4); | ||
170 | otp |= RC4_STEP<<BESHFT(5); | ||
171 | otp |= RC4_STEP<<BESHFT(6); | ||
172 | otp |= RC4_STEP<<BESHFT(7); | ||
173 | } | ||
174 | *(RC4_CHUNK *)outdata = otp^ichunk; | ||
175 | indata += sizeof(RC4_CHUNK); | ||
176 | outdata += sizeof(RC4_CHUNK); | ||
177 | } | ||
178 | if (len) | ||
179 | { | ||
180 | RC4_CHUNK mask=(RC4_CHUNK)-1, ochunk; | ||
181 | |||
182 | ichunk = *(RC4_CHUNK *)indata; | ||
183 | ochunk = *(RC4_CHUNK *)outdata; | ||
184 | otp = 0; | ||
185 | i = BESHFT(0); | ||
186 | mask <<= (sizeof(RC4_CHUNK)-len)<<3; | ||
187 | switch (len&(sizeof(RC4_CHUNK)-1)) | ||
188 | { | ||
189 | case 7: otp = RC4_STEP<<i, i-=8; | ||
190 | case 6: otp |= RC4_STEP<<i, i-=8; | ||
191 | case 5: otp |= RC4_STEP<<i, i-=8; | ||
192 | case 4: otp |= RC4_STEP<<i, i-=8; | ||
193 | case 3: otp |= RC4_STEP<<i, i-=8; | ||
194 | case 2: otp |= RC4_STEP<<i, i-=8; | ||
195 | case 1: otp |= RC4_STEP<<i, i-=8; | ||
196 | case 0: ; /* | ||
197 | * it's never the case, | ||
198 | * but it has to be here | ||
199 | * for ultrix? | ||
200 | */ | ||
201 | } | ||
202 | ochunk &= ~mask; | ||
203 | ochunk |= (otp^ichunk) & mask; | ||
204 | *(RC4_CHUNK *)outdata = ochunk; | ||
205 | } | ||
206 | key->x=x; | ||
207 | key->y=y; | ||
208 | return; | ||
209 | } | ||
210 | else | ||
211 | { /* LITTLE-ENDIAN CASE */ | ||
212 | # define LESHFT(c) (((c)*8)&(sizeof(RC4_CHUNK)*8-1)) | ||
213 | for (;len&-sizeof(RC4_CHUNK);len-=sizeof(RC4_CHUNK)) | ||
214 | { | ||
215 | ichunk = *(RC4_CHUNK *)indata; | ||
216 | otp = RC4_STEP; | ||
217 | otp |= RC4_STEP<<8; | ||
218 | otp |= RC4_STEP<<16; | ||
219 | otp |= RC4_STEP<<24; | ||
220 | if (sizeof(RC4_CHUNK)==8) | ||
221 | { | ||
222 | otp |= RC4_STEP<<LESHFT(4); | ||
223 | otp |= RC4_STEP<<LESHFT(5); | ||
224 | otp |= RC4_STEP<<LESHFT(6); | ||
225 | otp |= RC4_STEP<<LESHFT(7); | ||
226 | } | ||
227 | *(RC4_CHUNK *)outdata = otp^ichunk; | ||
228 | indata += sizeof(RC4_CHUNK); | ||
229 | outdata += sizeof(RC4_CHUNK); | ||
230 | } | ||
231 | if (len) | ||
232 | { | ||
233 | RC4_CHUNK mask=(RC4_CHUNK)-1, ochunk; | ||
234 | |||
235 | ichunk = *(RC4_CHUNK *)indata; | ||
236 | ochunk = *(RC4_CHUNK *)outdata; | ||
237 | otp = 0; | ||
238 | i = 0; | ||
239 | mask >>= (sizeof(RC4_CHUNK)-len)<<3; | ||
240 | switch (len&(sizeof(RC4_CHUNK)-1)) | ||
241 | { | ||
242 | case 7: otp = RC4_STEP, i+=8; | ||
243 | case 6: otp |= RC4_STEP<<i, i+=8; | ||
244 | case 5: otp |= RC4_STEP<<i, i+=8; | ||
245 | case 4: otp |= RC4_STEP<<i, i+=8; | ||
246 | case 3: otp |= RC4_STEP<<i, i+=8; | ||
247 | case 2: otp |= RC4_STEP<<i, i+=8; | ||
248 | case 1: otp |= RC4_STEP<<i, i+=8; | ||
249 | case 0: ; /* | ||
250 | * it's never the case, | ||
251 | * but it has to be here | ||
252 | * for ultrix? | ||
253 | */ | ||
254 | } | ||
255 | ochunk &= ~mask; | ||
256 | ochunk |= (otp^ichunk) & mask; | ||
257 | *(RC4_CHUNK *)outdata = ochunk; | ||
258 | } | ||
259 | key->x=x; | ||
260 | key->y=y; | ||
261 | return; | ||
262 | } | ||
263 | } | ||
264 | #endif | ||
265 | #define LOOP(in,out) \ | ||
266 | x=((x+1)&0xff); \ | ||
267 | tx=d[x]; \ | ||
268 | y=(tx+y)&0xff; \ | ||
269 | d[x]=ty=d[y]; \ | ||
270 | d[y]=tx; \ | ||
271 | (out) = d[(tx+ty)&0xff]^ (in); | ||
272 | |||
273 | #ifndef RC4_INDEX | ||
274 | #define RC4_LOOP(a,b,i) LOOP(*((a)++),*((b)++)) | ||
275 | #else | ||
276 | #define RC4_LOOP(a,b,i) LOOP(a[i],b[i]) | ||
277 | #endif | ||
278 | |||
279 | i=(int)(len>>3L); | ||
280 | if (i) | ||
281 | { | ||
282 | for (;;) | ||
283 | { | ||
284 | RC4_LOOP(indata,outdata,0); | ||
285 | RC4_LOOP(indata,outdata,1); | ||
286 | RC4_LOOP(indata,outdata,2); | ||
287 | RC4_LOOP(indata,outdata,3); | ||
288 | RC4_LOOP(indata,outdata,4); | ||
289 | RC4_LOOP(indata,outdata,5); | ||
290 | RC4_LOOP(indata,outdata,6); | ||
291 | RC4_LOOP(indata,outdata,7); | ||
292 | #ifdef RC4_INDEX | ||
293 | indata+=8; | ||
294 | outdata+=8; | ||
295 | #endif | ||
296 | if (--i == 0) break; | ||
297 | } | ||
298 | } | ||
299 | i=(int)len&0x07; | ||
300 | if (i) | ||
301 | { | ||
302 | for (;;) | ||
303 | { | ||
304 | RC4_LOOP(indata,outdata,0); if (--i == 0) break; | ||
305 | RC4_LOOP(indata,outdata,1); if (--i == 0) break; | ||
306 | RC4_LOOP(indata,outdata,2); if (--i == 0) break; | ||
307 | RC4_LOOP(indata,outdata,3); if (--i == 0) break; | ||
308 | RC4_LOOP(indata,outdata,4); if (--i == 0) break; | ||
309 | RC4_LOOP(indata,outdata,5); if (--i == 0) break; | ||
310 | RC4_LOOP(indata,outdata,6); if (--i == 0) break; | ||
311 | } | ||
312 | } | ||
313 | key->x=x; | ||
314 | key->y=y; | ||
315 | } | ||
diff --git a/src/lib/libcrypto/rc4/rc4_locl.h b/src/lib/libcrypto/rc4/rc4_locl.h deleted file mode 100644 index 3bb80b6ce9..0000000000 --- a/src/lib/libcrypto/rc4/rc4_locl.h +++ /dev/null | |||
@@ -1,4 +0,0 @@ | |||
1 | #ifndef HEADER_RC4_LOCL_H | ||
2 | #define HEADER_RC4_LOCL_H | ||
3 | #include <openssl/opensslconf.h> | ||
4 | #endif | ||
diff --git a/src/lib/libcrypto/rc4/rc4_skey.c b/src/lib/libcrypto/rc4/rc4_skey.c deleted file mode 100644 index bb10c1ebe2..0000000000 --- a/src/lib/libcrypto/rc4/rc4_skey.c +++ /dev/null | |||
@@ -1,117 +0,0 @@ | |||
1 | /* crypto/rc4/rc4_skey.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <openssl/rc4.h> | ||
60 | #include "rc4_locl.h" | ||
61 | #include <openssl/opensslv.h> | ||
62 | |||
63 | const char *RC4_version="RC4" OPENSSL_VERSION_PTEXT; | ||
64 | |||
65 | const char *RC4_options(void) | ||
66 | { | ||
67 | #ifdef RC4_INDEX | ||
68 | if (sizeof(RC4_INT) == 1) | ||
69 | return("rc4(idx,char)"); | ||
70 | else | ||
71 | return("rc4(idx,int)"); | ||
72 | #else | ||
73 | if (sizeof(RC4_INT) == 1) | ||
74 | return("rc4(ptr,char)"); | ||
75 | else | ||
76 | return("rc4(ptr,int)"); | ||
77 | #endif | ||
78 | } | ||
79 | |||
80 | /* RC4 as implemented from a posting from | ||
81 | * Newsgroups: sci.crypt | ||
82 | * From: sterndark@netcom.com (David Sterndark) | ||
83 | * Subject: RC4 Algorithm revealed. | ||
84 | * Message-ID: <sternCvKL4B.Hyy@netcom.com> | ||
85 | * Date: Wed, 14 Sep 1994 06:35:31 GMT | ||
86 | */ | ||
87 | |||
88 | void RC4_set_key(RC4_KEY *key, int len, const unsigned char *data) | ||
89 | { | ||
90 | register RC4_INT tmp; | ||
91 | register int id1,id2; | ||
92 | register RC4_INT *d; | ||
93 | unsigned int i; | ||
94 | |||
95 | d= &(key->data[0]); | ||
96 | for (i=0; i<256; i++) | ||
97 | d[i]=i; | ||
98 | key->x = 0; | ||
99 | key->y = 0; | ||
100 | id1=id2=0; | ||
101 | |||
102 | #define SK_LOOP(n) { \ | ||
103 | tmp=d[(n)]; \ | ||
104 | id2 = (data[id1] + tmp + id2) & 0xff; \ | ||
105 | if (++id1 == len) id1=0; \ | ||
106 | d[(n)]=d[id2]; \ | ||
107 | d[id2]=tmp; } | ||
108 | |||
109 | for (i=0; i < 256; i+=4) | ||
110 | { | ||
111 | SK_LOOP(i+0); | ||
112 | SK_LOOP(i+1); | ||
113 | SK_LOOP(i+2); | ||
114 | SK_LOOP(i+3); | ||
115 | } | ||
116 | } | ||
117 | |||