rc5_enc.c 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. /* crypto/rc5/rc5_enc.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <stdio.h>
  59. #include <openssl/rc5.h>
  60. #include "rc5_locl.h"
  61. void RC5_32_cbc_encrypt(const unsigned char *in, unsigned char *out,
  62. long length, RC5_32_KEY *ks, unsigned char *iv,
  63. int encrypt)
  64. {
  65. register unsigned long tin0, tin1;
  66. register unsigned long tout0, tout1, xor0, xor1;
  67. register long l = length;
  68. unsigned long tin[2];
  69. if (encrypt) {
  70. c2l(iv, tout0);
  71. c2l(iv, tout1);
  72. iv -= 8;
  73. for (l -= 8; l >= 0; l -= 8) {
  74. c2l(in, tin0);
  75. c2l(in, tin1);
  76. tin0 ^= tout0;
  77. tin1 ^= tout1;
  78. tin[0] = tin0;
  79. tin[1] = tin1;
  80. RC5_32_encrypt(tin, ks);
  81. tout0 = tin[0];
  82. l2c(tout0, out);
  83. tout1 = tin[1];
  84. l2c(tout1, out);
  85. }
  86. if (l != -8) {
  87. c2ln(in, tin0, tin1, l + 8);
  88. tin0 ^= tout0;
  89. tin1 ^= tout1;
  90. tin[0] = tin0;
  91. tin[1] = tin1;
  92. RC5_32_encrypt(tin, ks);
  93. tout0 = tin[0];
  94. l2c(tout0, out);
  95. tout1 = tin[1];
  96. l2c(tout1, out);
  97. }
  98. l2c(tout0, iv);
  99. l2c(tout1, iv);
  100. } else {
  101. c2l(iv, xor0);
  102. c2l(iv, xor1);
  103. iv -= 8;
  104. for (l -= 8; l >= 0; l -= 8) {
  105. c2l(in, tin0);
  106. tin[0] = tin0;
  107. c2l(in, tin1);
  108. tin[1] = tin1;
  109. RC5_32_decrypt(tin, ks);
  110. tout0 = tin[0] ^ xor0;
  111. tout1 = tin[1] ^ xor1;
  112. l2c(tout0, out);
  113. l2c(tout1, out);
  114. xor0 = tin0;
  115. xor1 = tin1;
  116. }
  117. if (l != -8) {
  118. c2l(in, tin0);
  119. tin[0] = tin0;
  120. c2l(in, tin1);
  121. tin[1] = tin1;
  122. RC5_32_decrypt(tin, ks);
  123. tout0 = tin[0] ^ xor0;
  124. tout1 = tin[1] ^ xor1;
  125. l2cn(tout0, tout1, out, l + 8);
  126. xor0 = tin0;
  127. xor1 = tin1;
  128. }
  129. l2c(xor0, iv);
  130. l2c(xor1, iv);
  131. }
  132. tin0 = tin1 = tout0 = tout1 = xor0 = xor1 = 0;
  133. tin[0] = tin[1] = 0;
  134. }
  135. void RC5_32_encrypt(unsigned long *d, RC5_32_KEY *key)
  136. {
  137. RC5_32_INT a, b, *s;
  138. s = key->data;
  139. a = d[0] + s[0];
  140. b = d[1] + s[1];
  141. E_RC5_32(a, b, s, 2);
  142. E_RC5_32(a, b, s, 4);
  143. E_RC5_32(a, b, s, 6);
  144. E_RC5_32(a, b, s, 8);
  145. E_RC5_32(a, b, s, 10);
  146. E_RC5_32(a, b, s, 12);
  147. E_RC5_32(a, b, s, 14);
  148. E_RC5_32(a, b, s, 16);
  149. if (key->rounds == 12) {
  150. E_RC5_32(a, b, s, 18);
  151. E_RC5_32(a, b, s, 20);
  152. E_RC5_32(a, b, s, 22);
  153. E_RC5_32(a, b, s, 24);
  154. } else if (key->rounds == 16) {
  155. /* Do a full expansion to avoid a jump */
  156. E_RC5_32(a, b, s, 18);
  157. E_RC5_32(a, b, s, 20);
  158. E_RC5_32(a, b, s, 22);
  159. E_RC5_32(a, b, s, 24);
  160. E_RC5_32(a, b, s, 26);
  161. E_RC5_32(a, b, s, 28);
  162. E_RC5_32(a, b, s, 30);
  163. E_RC5_32(a, b, s, 32);
  164. }
  165. d[0] = a;
  166. d[1] = b;
  167. }
  168. void RC5_32_decrypt(unsigned long *d, RC5_32_KEY *key)
  169. {
  170. RC5_32_INT a, b, *s;
  171. s = key->data;
  172. a = d[0];
  173. b = d[1];
  174. if (key->rounds == 16) {
  175. D_RC5_32(a, b, s, 32);
  176. D_RC5_32(a, b, s, 30);
  177. D_RC5_32(a, b, s, 28);
  178. D_RC5_32(a, b, s, 26);
  179. /* Do a full expansion to avoid a jump */
  180. D_RC5_32(a, b, s, 24);
  181. D_RC5_32(a, b, s, 22);
  182. D_RC5_32(a, b, s, 20);
  183. D_RC5_32(a, b, s, 18);
  184. } else if (key->rounds == 12) {
  185. D_RC5_32(a, b, s, 24);
  186. D_RC5_32(a, b, s, 22);
  187. D_RC5_32(a, b, s, 20);
  188. D_RC5_32(a, b, s, 18);
  189. }
  190. D_RC5_32(a, b, s, 16);
  191. D_RC5_32(a, b, s, 14);
  192. D_RC5_32(a, b, s, 12);
  193. D_RC5_32(a, b, s, 10);
  194. D_RC5_32(a, b, s, 8);
  195. D_RC5_32(a, b, s, 6);
  196. D_RC5_32(a, b, s, 4);
  197. D_RC5_32(a, b, s, 2);
  198. d[0] = a - s[0];
  199. d[1] = b - s[1];
  200. }