PageRenderTime 49ms CodeModel.GetById 25ms RepoModel.GetById 1ms app.codeStats 0ms

/src/netbsd/src/sys/crypto/des/des_enc.c

https://bitbucket.org/killerpenguinassassins/open_distrib_devel
C | 294 lines | 199 code | 17 blank | 78 comment | 6 complexity | bb692869fd7077a83536d83abd11f9d8 MD5 | raw file
Possible License(s): CC0-1.0, MIT, LGPL-2.0, LGPL-3.0, WTFPL, GPL-2.0, BSD-2-Clause, AGPL-3.0, CC-BY-SA-3.0, MPL-2.0, JSON, BSD-3-Clause-No-Nuclear-License-2014, LGPL-2.1, CPL-1.0, AGPL-1.0, 0BSD, ISC, Apache-2.0, GPL-3.0, IPL-1.0, MPL-2.0-no-copyleft-exception, BSD-3-Clause
  1. /* crypto/des/des_enc.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <sys/cdefs.h>
  59. __KERNEL_RCSID(0, "$NetBSD: des_enc.c,v 1.4 2005/12/11 12:20:52 christos Exp $");
  60. #include <sys/types.h>
  61. #include <crypto/des/des_locl.h>
  62. extern const DES_LONG des_SPtrans[8][64];
  63. void des_encrypt1(DES_LONG *data, des_key_schedule ks, int enc)
  64. {
  65. register DES_LONG l,r,t,u;
  66. #ifdef DES_PTR
  67. register const unsigned char *des_SP=(const unsigned char *)des_SPtrans;
  68. #endif
  69. #ifndef DES_UNROLL
  70. register int i;
  71. #endif
  72. register DES_LONG *s;
  73. r=data[0];
  74. l=data[1];
  75. IP(r,l);
  76. /* Things have been modified so that the initial rotate is
  77. * done outside the loop. This required the
  78. * des_SPtrans values in sp.h to be rotated 1 bit to the right.
  79. * One perl script later and things have a 5% speed up on a sparc2.
  80. * Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
  81. * for pointing this out. */
  82. /* clear the top bits on machines with 8byte longs */
  83. /* shift left by 2 */
  84. r=ROTATE(r,29)&0xffffffffL;
  85. l=ROTATE(l,29)&0xffffffffL;
  86. s=ks->ks.deslong;
  87. /* I don't know if it is worth the effort of loop unrolling the
  88. * inner loop */
  89. if (enc)
  90. {
  91. #ifdef DES_UNROLL
  92. D_ENCRYPT(l,r, 0); /* 1 */
  93. D_ENCRYPT(r,l, 2); /* 2 */
  94. D_ENCRYPT(l,r, 4); /* 3 */
  95. D_ENCRYPT(r,l, 6); /* 4 */
  96. D_ENCRYPT(l,r, 8); /* 5 */
  97. D_ENCRYPT(r,l,10); /* 6 */
  98. D_ENCRYPT(l,r,12); /* 7 */
  99. D_ENCRYPT(r,l,14); /* 8 */
  100. D_ENCRYPT(l,r,16); /* 9 */
  101. D_ENCRYPT(r,l,18); /* 10 */
  102. D_ENCRYPT(l,r,20); /* 11 */
  103. D_ENCRYPT(r,l,22); /* 12 */
  104. D_ENCRYPT(l,r,24); /* 13 */
  105. D_ENCRYPT(r,l,26); /* 14 */
  106. D_ENCRYPT(l,r,28); /* 15 */
  107. D_ENCRYPT(r,l,30); /* 16 */
  108. #else
  109. for (i=0; i<32; i+=8)
  110. {
  111. D_ENCRYPT(l,r,i+0); /* 1 */
  112. D_ENCRYPT(r,l,i+2); /* 2 */
  113. D_ENCRYPT(l,r,i+4); /* 3 */
  114. D_ENCRYPT(r,l,i+6); /* 4 */
  115. }
  116. #endif
  117. }
  118. else
  119. {
  120. #ifdef DES_UNROLL
  121. D_ENCRYPT(l,r,30); /* 16 */
  122. D_ENCRYPT(r,l,28); /* 15 */
  123. D_ENCRYPT(l,r,26); /* 14 */
  124. D_ENCRYPT(r,l,24); /* 13 */
  125. D_ENCRYPT(l,r,22); /* 12 */
  126. D_ENCRYPT(r,l,20); /* 11 */
  127. D_ENCRYPT(l,r,18); /* 10 */
  128. D_ENCRYPT(r,l,16); /* 9 */
  129. D_ENCRYPT(l,r,14); /* 8 */
  130. D_ENCRYPT(r,l,12); /* 7 */
  131. D_ENCRYPT(l,r,10); /* 6 */
  132. D_ENCRYPT(r,l, 8); /* 5 */
  133. D_ENCRYPT(l,r, 6); /* 4 */
  134. D_ENCRYPT(r,l, 4); /* 3 */
  135. D_ENCRYPT(l,r, 2); /* 2 */
  136. D_ENCRYPT(r,l, 0); /* 1 */
  137. #else
  138. for (i=30; i>0; i-=8)
  139. {
  140. D_ENCRYPT(l,r,i-0); /* 16 */
  141. D_ENCRYPT(r,l,i-2); /* 15 */
  142. D_ENCRYPT(l,r,i-4); /* 14 */
  143. D_ENCRYPT(r,l,i-6); /* 13 */
  144. }
  145. #endif
  146. }
  147. /* rotate and clear the top bits on machines with 8byte longs */
  148. l=ROTATE(l,3)&0xffffffffL;
  149. r=ROTATE(r,3)&0xffffffffL;
  150. FP(r,l);
  151. data[0]=l;
  152. data[1]=r;
  153. l=r=t=u=0;
  154. }
  155. void des_encrypt2(DES_LONG *data, des_key_schedule ks, int enc)
  156. {
  157. register DES_LONG l,r,t,u;
  158. #ifdef DES_PTR
  159. register const unsigned char *des_SP=(const unsigned char *)des_SPtrans;
  160. #endif
  161. #ifndef DES_UNROLL
  162. register int i;
  163. #endif
  164. register DES_LONG *s;
  165. r=data[0];
  166. l=data[1];
  167. /* Things have been modified so that the initial rotate is
  168. * done outside the loop. This required the
  169. * des_SPtrans values in sp.h to be rotated 1 bit to the right.
  170. * One perl script later and things have a 5% speed up on a sparc2.
  171. * Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
  172. * for pointing this out. */
  173. /* clear the top bits on machines with 8byte longs */
  174. r=ROTATE(r,29)&0xffffffffL;
  175. l=ROTATE(l,29)&0xffffffffL;
  176. s=ks->ks.deslong;
  177. /* I don't know if it is worth the effort of loop unrolling the
  178. * inner loop */
  179. if (enc)
  180. {
  181. #ifdef DES_UNROLL
  182. D_ENCRYPT(l,r, 0); /* 1 */
  183. D_ENCRYPT(r,l, 2); /* 2 */
  184. D_ENCRYPT(l,r, 4); /* 3 */
  185. D_ENCRYPT(r,l, 6); /* 4 */
  186. D_ENCRYPT(l,r, 8); /* 5 */
  187. D_ENCRYPT(r,l,10); /* 6 */
  188. D_ENCRYPT(l,r,12); /* 7 */
  189. D_ENCRYPT(r,l,14); /* 8 */
  190. D_ENCRYPT(l,r,16); /* 9 */
  191. D_ENCRYPT(r,l,18); /* 10 */
  192. D_ENCRYPT(l,r,20); /* 11 */
  193. D_ENCRYPT(r,l,22); /* 12 */
  194. D_ENCRYPT(l,r,24); /* 13 */
  195. D_ENCRYPT(r,l,26); /* 14 */
  196. D_ENCRYPT(l,r,28); /* 15 */
  197. D_ENCRYPT(r,l,30); /* 16 */
  198. #else
  199. for (i=0; i<32; i+=8)
  200. {
  201. D_ENCRYPT(l,r,i+0); /* 1 */
  202. D_ENCRYPT(r,l,i+2); /* 2 */
  203. D_ENCRYPT(l,r,i+4); /* 3 */
  204. D_ENCRYPT(r,l,i+6); /* 4 */
  205. }
  206. #endif
  207. }
  208. else
  209. {
  210. #ifdef DES_UNROLL
  211. D_ENCRYPT(l,r,30); /* 16 */
  212. D_ENCRYPT(r,l,28); /* 15 */
  213. D_ENCRYPT(l,r,26); /* 14 */
  214. D_ENCRYPT(r,l,24); /* 13 */
  215. D_ENCRYPT(l,r,22); /* 12 */
  216. D_ENCRYPT(r,l,20); /* 11 */
  217. D_ENCRYPT(l,r,18); /* 10 */
  218. D_ENCRYPT(r,l,16); /* 9 */
  219. D_ENCRYPT(l,r,14); /* 8 */
  220. D_ENCRYPT(r,l,12); /* 7 */
  221. D_ENCRYPT(l,r,10); /* 6 */
  222. D_ENCRYPT(r,l, 8); /* 5 */
  223. D_ENCRYPT(l,r, 6); /* 4 */
  224. D_ENCRYPT(r,l, 4); /* 3 */
  225. D_ENCRYPT(l,r, 2); /* 2 */
  226. D_ENCRYPT(r,l, 0); /* 1 */
  227. #else
  228. for (i=30; i>0; i-=8)
  229. {
  230. D_ENCRYPT(l,r,i-0); /* 16 */
  231. D_ENCRYPT(r,l,i-2); /* 15 */
  232. D_ENCRYPT(l,r,i-4); /* 14 */
  233. D_ENCRYPT(r,l,i-6); /* 13 */
  234. }
  235. #endif
  236. }
  237. /* rotate and clear the top bits on machines with 8byte longs */
  238. data[0]=ROTATE(l,3)&0xffffffffL;
  239. data[1]=ROTATE(r,3)&0xffffffffL;
  240. l=r=t=u=0;
  241. }
  242. void des_encrypt3(DES_LONG *data, des_key_schedule ks1, des_key_schedule ks2,
  243. des_key_schedule ks3)
  244. {
  245. register DES_LONG l,r;
  246. l=data[0];
  247. r=data[1];
  248. IP(l,r);
  249. data[0]=l;
  250. data[1]=r;
  251. des_encrypt2((DES_LONG *)data,ks1,DES_ENCRYPT);
  252. des_encrypt2((DES_LONG *)data,ks2,DES_DECRYPT);
  253. des_encrypt2((DES_LONG *)data,ks3,DES_ENCRYPT);
  254. l=data[0];
  255. r=data[1];
  256. FP(r,l);
  257. data[0]=l;
  258. data[1]=r;
  259. }
  260. void des_decrypt3(DES_LONG *data, des_key_schedule ks1, des_key_schedule ks2,
  261. des_key_schedule ks3)
  262. {
  263. register DES_LONG l,r;
  264. l=data[0];
  265. r=data[1];
  266. IP(l,r);
  267. data[0]=l;
  268. data[1]=r;
  269. des_encrypt2((DES_LONG *)data,ks3,DES_DECRYPT);
  270. des_encrypt2((DES_LONG *)data,ks2,DES_ENCRYPT);
  271. des_encrypt2((DES_LONG *)data,ks1,DES_DECRYPT);
  272. l=data[0];
  273. r=data[1];
  274. FP(r,l);
  275. data[0]=l;
  276. data[1]=r;
  277. }