[3181] | 1 | //FIXME Not checked on threadsafety yet; after checking please remove this line
|
---|
[580] | 2 | /* crypto/idea/i_cbc.c */
|
---|
| 3 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
---|
| 4 | * All rights reserved.
|
---|
| 5 | *
|
---|
| 6 | * This package is an SSL implementation written
|
---|
| 7 | * by Eric Young (eay@cryptsoft.com).
|
---|
| 8 | * The implementation was written so as to conform with Netscapes SSL.
|
---|
| 9 | *
|
---|
| 10 | * This library is free for commercial and non-commercial use as long as
|
---|
| 11 | * the following conditions are aheared to. The following conditions
|
---|
| 12 | * apply to all code found in this distribution, be it the RC4, RSA,
|
---|
| 13 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
---|
| 14 | * included with this distribution is covered by the same copyright terms
|
---|
| 15 | * except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
---|
| 16 | *
|
---|
| 17 | * Copyright remains Eric Young's, and as such any Copyright notices in
|
---|
| 18 | * the code are not to be removed.
|
---|
| 19 | * If this package is used in a product, Eric Young should be given attribution
|
---|
| 20 | * as the author of the parts of the library used.
|
---|
| 21 | * This can be in the form of a textual message at program startup or
|
---|
| 22 | * in documentation (online or textual) provided with the package.
|
---|
| 23 | *
|
---|
| 24 | * Redistribution and use in source and binary forms, with or without
|
---|
| 25 | * modification, are permitted provided that the following conditions
|
---|
| 26 | * are met:
|
---|
| 27 | * 1. Redistributions of source code must retain the copyright
|
---|
| 28 | * notice, this list of conditions and the following disclaimer.
|
---|
| 29 | * 2. Redistributions in binary form must reproduce the above copyright
|
---|
| 30 | * notice, this list of conditions and the following disclaimer in the
|
---|
| 31 | * documentation and/or other materials provided with the distribution.
|
---|
| 32 | * 3. All advertising materials mentioning features or use of this software
|
---|
| 33 | * must display the following acknowledgement:
|
---|
| 34 | * "This product includes cryptographic software written by
|
---|
| 35 | * Eric Young (eay@cryptsoft.com)"
|
---|
| 36 | * The word 'cryptographic' can be left out if the rouines from the library
|
---|
| 37 | * being used are not cryptographic related :-).
|
---|
| 38 | * 4. If you include any Windows specific code (or a derivative thereof) from
|
---|
| 39 | * the apps directory (application code) you must include an acknowledgement:
|
---|
| 40 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
---|
| 41 | *
|
---|
| 42 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
---|
| 43 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
---|
| 44 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
---|
| 45 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
---|
| 46 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
---|
| 47 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
---|
| 48 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
---|
| 49 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
---|
| 50 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
---|
| 51 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
---|
| 52 | * SUCH DAMAGE.
|
---|
| 53 | *
|
---|
[6785] | 54 | * The license and distribution terms for any publically available version or
|
---|
[580] | 55 | * derivative of this code cannot be changed. i.e. this code cannot simply be
|
---|
[6785] | 56 | * copied and put under another distribution license
|
---|
| 57 | * [including the GNU Public License.]
|
---|
[580] | 58 | */
|
---|
| 59 |
|
---|
| 60 | #include "idea.h"
|
---|
| 61 | #include "idea_lcl.h"
|
---|
| 62 |
|
---|
| 63 | void idea_cbc_encrypt(const unsigned char *in, unsigned char *out, long length,
|
---|
| 64 | IDEA_KEY_SCHEDULE *ks, unsigned char *iv, int encrypt)
|
---|
| 65 | {
|
---|
| 66 | register unsigned long tin0,tin1;
|
---|
| 67 | register unsigned long tout0,tout1,xor0,xor1;
|
---|
| 68 | register long l=length;
|
---|
| 69 | unsigned long tin[2];
|
---|
| 70 |
|
---|
| 71 | if (encrypt)
|
---|
| 72 | {
|
---|
| 73 | n2l(iv,tout0);
|
---|
| 74 | n2l(iv,tout1);
|
---|
| 75 | iv-=8;
|
---|
| 76 | for (l-=8; l>=0; l-=8)
|
---|
| 77 | {
|
---|
| 78 | n2l(in,tin0);
|
---|
| 79 | n2l(in,tin1);
|
---|
| 80 | tin0^=tout0;
|
---|
| 81 | tin1^=tout1;
|
---|
| 82 | tin[0]=tin0;
|
---|
| 83 | tin[1]=tin1;
|
---|
| 84 | idea_encrypt(tin,ks);
|
---|
| 85 | tout0=tin[0]; l2n(tout0,out);
|
---|
| 86 | tout1=tin[1]; l2n(tout1,out);
|
---|
| 87 | }
|
---|
| 88 | if (l != -8)
|
---|
| 89 | {
|
---|
| 90 | n2ln(in,tin0,tin1,l+8);
|
---|
| 91 | tin0^=tout0;
|
---|
| 92 | tin1^=tout1;
|
---|
| 93 | tin[0]=tin0;
|
---|
| 94 | tin[1]=tin1;
|
---|
| 95 | idea_encrypt(tin,ks);
|
---|
| 96 | tout0=tin[0]; l2n(tout0,out);
|
---|
| 97 | tout1=tin[1]; l2n(tout1,out);
|
---|
| 98 | }
|
---|
| 99 | l2n(tout0,iv);
|
---|
| 100 | l2n(tout1,iv);
|
---|
| 101 | }
|
---|
| 102 | else
|
---|
| 103 | {
|
---|
| 104 | n2l(iv,xor0);
|
---|
| 105 | n2l(iv,xor1);
|
---|
| 106 | iv-=8;
|
---|
| 107 | for (l-=8; l>=0; l-=8)
|
---|
| 108 | {
|
---|
| 109 | n2l(in,tin0); tin[0]=tin0;
|
---|
| 110 | n2l(in,tin1); tin[1]=tin1;
|
---|
| 111 | idea_encrypt(tin,ks);
|
---|
| 112 | tout0=tin[0]^xor0;
|
---|
| 113 | tout1=tin[1]^xor1;
|
---|
| 114 | l2n(tout0,out);
|
---|
| 115 | l2n(tout1,out);
|
---|
| 116 | xor0=tin0;
|
---|
| 117 | xor1=tin1;
|
---|
| 118 | }
|
---|
| 119 | if (l != -8)
|
---|
| 120 | {
|
---|
| 121 | n2l(in,tin0); tin[0]=tin0;
|
---|
| 122 | n2l(in,tin1); tin[1]=tin1;
|
---|
| 123 | idea_encrypt(tin,ks);
|
---|
| 124 | tout0=tin[0]^xor0;
|
---|
| 125 | tout1=tin[1]^xor1;
|
---|
| 126 | l2nn(tout0,tout1,out,l+8);
|
---|
| 127 | xor0=tin0;
|
---|
| 128 | xor1=tin1;
|
---|
| 129 | }
|
---|
| 130 | l2n(xor0,iv);
|
---|
| 131 | l2n(xor1,iv);
|
---|
| 132 | }
|
---|
| 133 | tin0=tin1=tout0=tout1=xor0=xor1=0;
|
---|
| 134 | tin[0]=tin[1]=0;
|
---|
| 135 | }
|
---|
| 136 |
|
---|
| 137 | void idea_encrypt(unsigned long *d, IDEA_KEY_SCHEDULE *key)
|
---|
| 138 | {
|
---|
| 139 | register IDEA_INT *p;
|
---|
| 140 | register unsigned long x1,x2,x3,x4,t0,t1,ul;
|
---|
| 141 |
|
---|
| 142 | x2=d[0];
|
---|
| 143 | x1=(x2>>16);
|
---|
| 144 | x4=d[1];
|
---|
| 145 | x3=(x4>>16);
|
---|
| 146 |
|
---|
| 147 | p= &(key->data[0][0]);
|
---|
| 148 |
|
---|
| 149 | E_IDEA(0);
|
---|
| 150 | E_IDEA(1);
|
---|
| 151 | E_IDEA(2);
|
---|
| 152 | E_IDEA(3);
|
---|
| 153 | E_IDEA(4);
|
---|
| 154 | E_IDEA(5);
|
---|
| 155 | E_IDEA(6);
|
---|
| 156 | E_IDEA(7);
|
---|
| 157 |
|
---|
| 158 | x1&=0xffff;
|
---|
| 159 | idea_mul(x1,x1,*p,ul); p++;
|
---|
| 160 |
|
---|
| 161 | t0= x3+ *(p++);
|
---|
| 162 | t1= x2+ *(p++);
|
---|
| 163 |
|
---|
| 164 | x4&=0xffff;
|
---|
| 165 | idea_mul(x4,x4,*p,ul);
|
---|
| 166 |
|
---|
| 167 | d[0]=(t0&0xffff)|((x1&0xffff)<<16);
|
---|
| 168 | d[1]=(x4&0xffff)|((t1&0xffff)<<16);
|
---|
| 169 | }
|
---|