| OLD | NEW |
| (Empty) |
| 1 /* crypto/des/set_key.c */ | |
| 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | |
| 3 * All rights reserved. | |
| 4 * | |
| 5 * This package is an SSL implementation written | |
| 6 * by Eric Young (eay@cryptsoft.com). | |
| 7 * The implementation was written so as to conform with Netscapes SSL. | |
| 8 * | |
| 9 * This library is free for commercial and non-commercial use as long as | |
| 10 * the following conditions are aheared to. The following conditions | |
| 11 * apply to all code found in this distribution, be it the RC4, RSA, | |
| 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
| 13 * included with this distribution is covered by the same copyright terms | |
| 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
| 15 * | |
| 16 * Copyright remains Eric Young's, and as such any Copyright notices in | |
| 17 * the code are not to be removed. | |
| 18 * If this package is used in a product, Eric Young should be given attribution | |
| 19 * as the author of the parts of the library used. | |
| 20 * This can be in the form of a textual message at program startup or | |
| 21 * in documentation (online or textual) provided with the package. | |
| 22 * | |
| 23 * Redistribution and use in source and binary forms, with or without | |
| 24 * modification, are permitted provided that the following conditions | |
| 25 * are met: | |
| 26 * 1. Redistributions of source code must retain the copyright | |
| 27 * notice, this list of conditions and the following disclaimer. | |
| 28 * 2. Redistributions in binary form must reproduce the above copyright | |
| 29 * notice, this list of conditions and the following disclaimer in the | |
| 30 * documentation and/or other materials provided with the distribution. | |
| 31 * 3. All advertising materials mentioning features or use of this software | |
| 32 * must display the following acknowledgement: | |
| 33 * "This product includes cryptographic software written by | |
| 34 * Eric Young (eay@cryptsoft.com)" | |
| 35 * The word 'cryptographic' can be left out if the rouines from the library | |
| 36 * being used are not cryptographic related :-). | |
| 37 * 4. If you include any Windows specific code (or a derivative thereof) from | |
| 38 * the apps directory (application code) you must include an acknowledgement: | |
| 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
| 40 * | |
| 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
| 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
| 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
| 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
| 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
| 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
| 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
| 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
| 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
| 51 * SUCH DAMAGE. | |
| 52 * | |
| 53 * The licence and distribution terms for any publically available version or | |
| 54 * derivative of this code cannot be changed. i.e. this code cannot simply be | |
| 55 * copied and put under another distribution licence | |
| 56 * [including the GNU Public Licence.] | |
| 57 */ | |
| 58 | |
| 59 /* set_key.c v 1.4 eay 24/9/91 | |
| 60 * 1.4 Speed up by 400% :-) | |
| 61 * 1.3 added register declarations. | |
| 62 * 1.2 unrolled make_key_sched a bit more | |
| 63 * 1.1 added norm_expand_bits | |
| 64 * 1.0 First working version | |
| 65 */ | |
| 66 #include <openssl/crypto.h> | |
| 67 #include "des_locl.h" | |
| 68 | |
| 69 OPENSSL_IMPLEMENT_GLOBAL(int,DES_check_key,0) /* defaults to false */ | |
| 70 | |
| 71 static const unsigned char odd_parity[256]={ | |
| 72 1, 1, 2, 2, 4, 4, 7, 7, 8, 8, 11, 11, 13, 13, 14, 14, | |
| 73 16, 16, 19, 19, 21, 21, 22, 22, 25, 25, 26, 26, 28, 28, 31, 31, | |
| 74 32, 32, 35, 35, 37, 37, 38, 38, 41, 41, 42, 42, 44, 44, 47, 47, | |
| 75 49, 49, 50, 50, 52, 52, 55, 55, 56, 56, 59, 59, 61, 61, 62, 62, | |
| 76 64, 64, 67, 67, 69, 69, 70, 70, 73, 73, 74, 74, 76, 76, 79, 79, | |
| 77 81, 81, 82, 82, 84, 84, 87, 87, 88, 88, 91, 91, 93, 93, 94, 94, | |
| 78 97, 97, 98, 98,100,100,103,103,104,104,107,107,109,109,110,110, | |
| 79 112,112,115,115,117,117,118,118,121,121,122,122,124,124,127,127, | |
| 80 128,128,131,131,133,133,134,134,137,137,138,138,140,140,143,143, | |
| 81 145,145,146,146,148,148,151,151,152,152,155,155,157,157,158,158, | |
| 82 161,161,162,162,164,164,167,167,168,168,171,171,173,173,174,174, | |
| 83 176,176,179,179,181,181,182,182,185,185,186,186,188,188,191,191, | |
| 84 193,193,194,194,196,196,199,199,200,200,203,203,205,205,206,206, | |
| 85 208,208,211,211,213,213,214,214,217,217,218,218,220,220,223,223, | |
| 86 224,224,227,227,229,229,230,230,233,233,234,234,236,236,239,239, | |
| 87 241,241,242,242,244,244,247,247,248,248,251,251,253,253,254,254}; | |
| 88 | |
| 89 void DES_set_odd_parity(DES_cblock *key) | |
| 90 { | |
| 91 unsigned int i; | |
| 92 | |
| 93 for (i=0; i<DES_KEY_SZ; i++) | |
| 94 (*key)[i]=odd_parity[(*key)[i]]; | |
| 95 } | |
| 96 | |
| 97 int DES_check_key_parity(const_DES_cblock *key) | |
| 98 { | |
| 99 unsigned int i; | |
| 100 | |
| 101 for (i=0; i<DES_KEY_SZ; i++) | |
| 102 { | |
| 103 if ((*key)[i] != odd_parity[(*key)[i]]) | |
| 104 return(0); | |
| 105 } | |
| 106 return(1); | |
| 107 } | |
| 108 | |
| 109 /* Weak and semi week keys as take from | |
| 110 * %A D.W. Davies | |
| 111 * %A W.L. Price | |
| 112 * %T Security for Computer Networks | |
| 113 * %I John Wiley & Sons | |
| 114 * %D 1984 | |
| 115 * Many thanks to smb@ulysses.att.com (Steven Bellovin) for the reference | |
| 116 * (and actual cblock values). | |
| 117 */ | |
| 118 #define NUM_WEAK_KEY 16 | |
| 119 static const DES_cblock weak_keys[NUM_WEAK_KEY]={ | |
| 120 /* weak keys */ | |
| 121 {0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01}, | |
| 122 {0xFE,0xFE,0xFE,0xFE,0xFE,0xFE,0xFE,0xFE}, | |
| 123 {0x1F,0x1F,0x1F,0x1F,0x0E,0x0E,0x0E,0x0E}, | |
| 124 {0xE0,0xE0,0xE0,0xE0,0xF1,0xF1,0xF1,0xF1}, | |
| 125 /* semi-weak keys */ | |
| 126 {0x01,0xFE,0x01,0xFE,0x01,0xFE,0x01,0xFE}, | |
| 127 {0xFE,0x01,0xFE,0x01,0xFE,0x01,0xFE,0x01}, | |
| 128 {0x1F,0xE0,0x1F,0xE0,0x0E,0xF1,0x0E,0xF1}, | |
| 129 {0xE0,0x1F,0xE0,0x1F,0xF1,0x0E,0xF1,0x0E}, | |
| 130 {0x01,0xE0,0x01,0xE0,0x01,0xF1,0x01,0xF1}, | |
| 131 {0xE0,0x01,0xE0,0x01,0xF1,0x01,0xF1,0x01}, | |
| 132 {0x1F,0xFE,0x1F,0xFE,0x0E,0xFE,0x0E,0xFE}, | |
| 133 {0xFE,0x1F,0xFE,0x1F,0xFE,0x0E,0xFE,0x0E}, | |
| 134 {0x01,0x1F,0x01,0x1F,0x01,0x0E,0x01,0x0E}, | |
| 135 {0x1F,0x01,0x1F,0x01,0x0E,0x01,0x0E,0x01}, | |
| 136 {0xE0,0xFE,0xE0,0xFE,0xF1,0xFE,0xF1,0xFE}, | |
| 137 {0xFE,0xE0,0xFE,0xE0,0xFE,0xF1,0xFE,0xF1}}; | |
| 138 | |
| 139 int DES_is_weak_key(const_DES_cblock *key) | |
| 140 { | |
| 141 int i; | |
| 142 | |
| 143 for (i=0; i<NUM_WEAK_KEY; i++) | |
| 144 /* Added == 0 to comparison, I obviously don't run | |
| 145 * this section very often :-(, thanks to | |
| 146 * engineering@MorningStar.Com for the fix | |
| 147 * eay 93/06/29 | |
| 148 * Another problem, I was comparing only the first 4 | |
| 149 * bytes, 97/03/18 */ | |
| 150 if (memcmp(weak_keys[i],key,sizeof(DES_cblock)) == 0) return(1); | |
| 151 return(0); | |
| 152 } | |
| 153 | |
| 154 /* NOW DEFINED IN des_local.h | |
| 155 * See ecb_encrypt.c for a pseudo description of these macros. | |
| 156 * #define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\ | |
| 157 * (b)^=(t),\ | |
| 158 * (a)=((a)^((t)<<(n)))) | |
| 159 */ | |
| 160 | |
| 161 #define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\ | |
| 162 (a)=(a)^(t)^(t>>(16-(n)))) | |
| 163 | |
| 164 static const DES_LONG des_skb[8][64]={ | |
| 165 { | |
| 166 /* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */ | |
| 167 0x00000000L,0x00000010L,0x20000000L,0x20000010L, | |
| 168 0x00010000L,0x00010010L,0x20010000L,0x20010010L, | |
| 169 0x00000800L,0x00000810L,0x20000800L,0x20000810L, | |
| 170 0x00010800L,0x00010810L,0x20010800L,0x20010810L, | |
| 171 0x00000020L,0x00000030L,0x20000020L,0x20000030L, | |
| 172 0x00010020L,0x00010030L,0x20010020L,0x20010030L, | |
| 173 0x00000820L,0x00000830L,0x20000820L,0x20000830L, | |
| 174 0x00010820L,0x00010830L,0x20010820L,0x20010830L, | |
| 175 0x00080000L,0x00080010L,0x20080000L,0x20080010L, | |
| 176 0x00090000L,0x00090010L,0x20090000L,0x20090010L, | |
| 177 0x00080800L,0x00080810L,0x20080800L,0x20080810L, | |
| 178 0x00090800L,0x00090810L,0x20090800L,0x20090810L, | |
| 179 0x00080020L,0x00080030L,0x20080020L,0x20080030L, | |
| 180 0x00090020L,0x00090030L,0x20090020L,0x20090030L, | |
| 181 0x00080820L,0x00080830L,0x20080820L,0x20080830L, | |
| 182 0x00090820L,0x00090830L,0x20090820L,0x20090830L, | |
| 183 },{ | |
| 184 /* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */ | |
| 185 0x00000000L,0x02000000L,0x00002000L,0x02002000L, | |
| 186 0x00200000L,0x02200000L,0x00202000L,0x02202000L, | |
| 187 0x00000004L,0x02000004L,0x00002004L,0x02002004L, | |
| 188 0x00200004L,0x02200004L,0x00202004L,0x02202004L, | |
| 189 0x00000400L,0x02000400L,0x00002400L,0x02002400L, | |
| 190 0x00200400L,0x02200400L,0x00202400L,0x02202400L, | |
| 191 0x00000404L,0x02000404L,0x00002404L,0x02002404L, | |
| 192 0x00200404L,0x02200404L,0x00202404L,0x02202404L, | |
| 193 0x10000000L,0x12000000L,0x10002000L,0x12002000L, | |
| 194 0x10200000L,0x12200000L,0x10202000L,0x12202000L, | |
| 195 0x10000004L,0x12000004L,0x10002004L,0x12002004L, | |
| 196 0x10200004L,0x12200004L,0x10202004L,0x12202004L, | |
| 197 0x10000400L,0x12000400L,0x10002400L,0x12002400L, | |
| 198 0x10200400L,0x12200400L,0x10202400L,0x12202400L, | |
| 199 0x10000404L,0x12000404L,0x10002404L,0x12002404L, | |
| 200 0x10200404L,0x12200404L,0x10202404L,0x12202404L, | |
| 201 },{ | |
| 202 /* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */ | |
| 203 0x00000000L,0x00000001L,0x00040000L,0x00040001L, | |
| 204 0x01000000L,0x01000001L,0x01040000L,0x01040001L, | |
| 205 0x00000002L,0x00000003L,0x00040002L,0x00040003L, | |
| 206 0x01000002L,0x01000003L,0x01040002L,0x01040003L, | |
| 207 0x00000200L,0x00000201L,0x00040200L,0x00040201L, | |
| 208 0x01000200L,0x01000201L,0x01040200L,0x01040201L, | |
| 209 0x00000202L,0x00000203L,0x00040202L,0x00040203L, | |
| 210 0x01000202L,0x01000203L,0x01040202L,0x01040203L, | |
| 211 0x08000000L,0x08000001L,0x08040000L,0x08040001L, | |
| 212 0x09000000L,0x09000001L,0x09040000L,0x09040001L, | |
| 213 0x08000002L,0x08000003L,0x08040002L,0x08040003L, | |
| 214 0x09000002L,0x09000003L,0x09040002L,0x09040003L, | |
| 215 0x08000200L,0x08000201L,0x08040200L,0x08040201L, | |
| 216 0x09000200L,0x09000201L,0x09040200L,0x09040201L, | |
| 217 0x08000202L,0x08000203L,0x08040202L,0x08040203L, | |
| 218 0x09000202L,0x09000203L,0x09040202L,0x09040203L, | |
| 219 },{ | |
| 220 /* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */ | |
| 221 0x00000000L,0x00100000L,0x00000100L,0x00100100L, | |
| 222 0x00000008L,0x00100008L,0x00000108L,0x00100108L, | |
| 223 0x00001000L,0x00101000L,0x00001100L,0x00101100L, | |
| 224 0x00001008L,0x00101008L,0x00001108L,0x00101108L, | |
| 225 0x04000000L,0x04100000L,0x04000100L,0x04100100L, | |
| 226 0x04000008L,0x04100008L,0x04000108L,0x04100108L, | |
| 227 0x04001000L,0x04101000L,0x04001100L,0x04101100L, | |
| 228 0x04001008L,0x04101008L,0x04001108L,0x04101108L, | |
| 229 0x00020000L,0x00120000L,0x00020100L,0x00120100L, | |
| 230 0x00020008L,0x00120008L,0x00020108L,0x00120108L, | |
| 231 0x00021000L,0x00121000L,0x00021100L,0x00121100L, | |
| 232 0x00021008L,0x00121008L,0x00021108L,0x00121108L, | |
| 233 0x04020000L,0x04120000L,0x04020100L,0x04120100L, | |
| 234 0x04020008L,0x04120008L,0x04020108L,0x04120108L, | |
| 235 0x04021000L,0x04121000L,0x04021100L,0x04121100L, | |
| 236 0x04021008L,0x04121008L,0x04021108L,0x04121108L, | |
| 237 },{ | |
| 238 /* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */ | |
| 239 0x00000000L,0x10000000L,0x00010000L,0x10010000L, | |
| 240 0x00000004L,0x10000004L,0x00010004L,0x10010004L, | |
| 241 0x20000000L,0x30000000L,0x20010000L,0x30010000L, | |
| 242 0x20000004L,0x30000004L,0x20010004L,0x30010004L, | |
| 243 0x00100000L,0x10100000L,0x00110000L,0x10110000L, | |
| 244 0x00100004L,0x10100004L,0x00110004L,0x10110004L, | |
| 245 0x20100000L,0x30100000L,0x20110000L,0x30110000L, | |
| 246 0x20100004L,0x30100004L,0x20110004L,0x30110004L, | |
| 247 0x00001000L,0x10001000L,0x00011000L,0x10011000L, | |
| 248 0x00001004L,0x10001004L,0x00011004L,0x10011004L, | |
| 249 0x20001000L,0x30001000L,0x20011000L,0x30011000L, | |
| 250 0x20001004L,0x30001004L,0x20011004L,0x30011004L, | |
| 251 0x00101000L,0x10101000L,0x00111000L,0x10111000L, | |
| 252 0x00101004L,0x10101004L,0x00111004L,0x10111004L, | |
| 253 0x20101000L,0x30101000L,0x20111000L,0x30111000L, | |
| 254 0x20101004L,0x30101004L,0x20111004L,0x30111004L, | |
| 255 },{ | |
| 256 /* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */ | |
| 257 0x00000000L,0x08000000L,0x00000008L,0x08000008L, | |
| 258 0x00000400L,0x08000400L,0x00000408L,0x08000408L, | |
| 259 0x00020000L,0x08020000L,0x00020008L,0x08020008L, | |
| 260 0x00020400L,0x08020400L,0x00020408L,0x08020408L, | |
| 261 0x00000001L,0x08000001L,0x00000009L,0x08000009L, | |
| 262 0x00000401L,0x08000401L,0x00000409L,0x08000409L, | |
| 263 0x00020001L,0x08020001L,0x00020009L,0x08020009L, | |
| 264 0x00020401L,0x08020401L,0x00020409L,0x08020409L, | |
| 265 0x02000000L,0x0A000000L,0x02000008L,0x0A000008L, | |
| 266 0x02000400L,0x0A000400L,0x02000408L,0x0A000408L, | |
| 267 0x02020000L,0x0A020000L,0x02020008L,0x0A020008L, | |
| 268 0x02020400L,0x0A020400L,0x02020408L,0x0A020408L, | |
| 269 0x02000001L,0x0A000001L,0x02000009L,0x0A000009L, | |
| 270 0x02000401L,0x0A000401L,0x02000409L,0x0A000409L, | |
| 271 0x02020001L,0x0A020001L,0x02020009L,0x0A020009L, | |
| 272 0x02020401L,0x0A020401L,0x02020409L,0x0A020409L, | |
| 273 },{ | |
| 274 /* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */ | |
| 275 0x00000000L,0x00000100L,0x00080000L,0x00080100L, | |
| 276 0x01000000L,0x01000100L,0x01080000L,0x01080100L, | |
| 277 0x00000010L,0x00000110L,0x00080010L,0x00080110L, | |
| 278 0x01000010L,0x01000110L,0x01080010L,0x01080110L, | |
| 279 0x00200000L,0x00200100L,0x00280000L,0x00280100L, | |
| 280 0x01200000L,0x01200100L,0x01280000L,0x01280100L, | |
| 281 0x00200010L,0x00200110L,0x00280010L,0x00280110L, | |
| 282 0x01200010L,0x01200110L,0x01280010L,0x01280110L, | |
| 283 0x00000200L,0x00000300L,0x00080200L,0x00080300L, | |
| 284 0x01000200L,0x01000300L,0x01080200L,0x01080300L, | |
| 285 0x00000210L,0x00000310L,0x00080210L,0x00080310L, | |
| 286 0x01000210L,0x01000310L,0x01080210L,0x01080310L, | |
| 287 0x00200200L,0x00200300L,0x00280200L,0x00280300L, | |
| 288 0x01200200L,0x01200300L,0x01280200L,0x01280300L, | |
| 289 0x00200210L,0x00200310L,0x00280210L,0x00280310L, | |
| 290 0x01200210L,0x01200310L,0x01280210L,0x01280310L, | |
| 291 },{ | |
| 292 /* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */ | |
| 293 0x00000000L,0x04000000L,0x00040000L,0x04040000L, | |
| 294 0x00000002L,0x04000002L,0x00040002L,0x04040002L, | |
| 295 0x00002000L,0x04002000L,0x00042000L,0x04042000L, | |
| 296 0x00002002L,0x04002002L,0x00042002L,0x04042002L, | |
| 297 0x00000020L,0x04000020L,0x00040020L,0x04040020L, | |
| 298 0x00000022L,0x04000022L,0x00040022L,0x04040022L, | |
| 299 0x00002020L,0x04002020L,0x00042020L,0x04042020L, | |
| 300 0x00002022L,0x04002022L,0x00042022L,0x04042022L, | |
| 301 0x00000800L,0x04000800L,0x00040800L,0x04040800L, | |
| 302 0x00000802L,0x04000802L,0x00040802L,0x04040802L, | |
| 303 0x00002800L,0x04002800L,0x00042800L,0x04042800L, | |
| 304 0x00002802L,0x04002802L,0x00042802L,0x04042802L, | |
| 305 0x00000820L,0x04000820L,0x00040820L,0x04040820L, | |
| 306 0x00000822L,0x04000822L,0x00040822L,0x04040822L, | |
| 307 0x00002820L,0x04002820L,0x00042820L,0x04042820L, | |
| 308 0x00002822L,0x04002822L,0x00042822L,0x04042822L, | |
| 309 }}; | |
| 310 | |
| 311 int DES_set_key(const_DES_cblock *key, DES_key_schedule *schedule) | |
| 312 { | |
| 313 if (DES_check_key) | |
| 314 { | |
| 315 return DES_set_key_checked(key, schedule); | |
| 316 } | |
| 317 else | |
| 318 { | |
| 319 DES_set_key_unchecked(key, schedule); | |
| 320 return 0; | |
| 321 } | |
| 322 } | |
| 323 | |
| 324 /* return 0 if key parity is odd (correct), | |
| 325 * return -1 if key parity error, | |
| 326 * return -2 if illegal weak key. | |
| 327 */ | |
| 328 int DES_set_key_checked(const_DES_cblock *key, DES_key_schedule *schedule) | |
| 329 { | |
| 330 if (!DES_check_key_parity(key)) | |
| 331 return(-1); | |
| 332 if (DES_is_weak_key(key)) | |
| 333 return(-2); | |
| 334 DES_set_key_unchecked(key, schedule); | |
| 335 return 0; | |
| 336 } | |
| 337 | |
| 338 void DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule) | |
| 339 #ifdef OPENSSL_FIPS | |
| 340 { | |
| 341 fips_cipher_abort(DES); | |
| 342 private_DES_set_key_unchecked(key, schedule); | |
| 343 } | |
| 344 void private_DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *sche
dule) | |
| 345 #endif | |
| 346 { | |
| 347 static const int shifts2[16]={0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0}; | |
| 348 register DES_LONG c,d,t,s,t2; | |
| 349 register const unsigned char *in; | |
| 350 register DES_LONG *k; | |
| 351 register int i; | |
| 352 | |
| 353 #ifdef OPENBSD_DEV_CRYPTO | |
| 354 memcpy(schedule->key,key,sizeof schedule->key); | |
| 355 schedule->session=NULL; | |
| 356 #endif | |
| 357 k = &schedule->ks->deslong[0]; | |
| 358 in = &(*key)[0]; | |
| 359 | |
| 360 c2l(in,c); | |
| 361 c2l(in,d); | |
| 362 | |
| 363 /* do PC1 in 47 simple operations :-) | |
| 364 * Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov) | |
| 365 * for the inspiration. :-) */ | |
| 366 PERM_OP (d,c,t,4,0x0f0f0f0fL); | |
| 367 HPERM_OP(c,t,-2,0xcccc0000L); | |
| 368 HPERM_OP(d,t,-2,0xcccc0000L); | |
| 369 PERM_OP (d,c,t,1,0x55555555L); | |
| 370 PERM_OP (c,d,t,8,0x00ff00ffL); | |
| 371 PERM_OP (d,c,t,1,0x55555555L); | |
| 372 d= (((d&0x000000ffL)<<16L)| (d&0x0000ff00L) | | |
| 373 ((d&0x00ff0000L)>>16L)|((c&0xf0000000L)>>4L)); | |
| 374 c&=0x0fffffffL; | |
| 375 | |
| 376 for (i=0; i<ITERATIONS; i++) | |
| 377 { | |
| 378 if (shifts2[i]) | |
| 379 { c=((c>>2L)|(c<<26L)); d=((d>>2L)|(d<<26L)); } | |
| 380 else | |
| 381 { c=((c>>1L)|(c<<27L)); d=((d>>1L)|(d<<27L)); } | |
| 382 c&=0x0fffffffL; | |
| 383 d&=0x0fffffffL; | |
| 384 /* could be a few less shifts but I am to lazy at this | |
| 385 * point in time to investigate */ | |
| 386 s= des_skb[0][ (c )&0x3f ]| | |
| 387 des_skb[1][((c>> 6L)&0x03)|((c>> 7L)&0x3c)]| | |
| 388 des_skb[2][((c>>13L)&0x0f)|((c>>14L)&0x30)]| | |
| 389 des_skb[3][((c>>20L)&0x01)|((c>>21L)&0x06) | | |
| 390 ((c>>22L)&0x38)]; | |
| 391 t= des_skb[4][ (d )&0x3f ]| | |
| 392 des_skb[5][((d>> 7L)&0x03)|((d>> 8L)&0x3c)]| | |
| 393 des_skb[6][ (d>>15L)&0x3f ]| | |
| 394 des_skb[7][((d>>21L)&0x0f)|((d>>22L)&0x30)]; | |
| 395 | |
| 396 /* table contained 0213 4657 */ | |
| 397 t2=((t<<16L)|(s&0x0000ffffL))&0xffffffffL; | |
| 398 *(k++)=ROTATE(t2,30)&0xffffffffL; | |
| 399 | |
| 400 t2=((s>>16L)|(t&0xffff0000L)); | |
| 401 *(k++)=ROTATE(t2,26)&0xffffffffL; | |
| 402 } | |
| 403 } | |
| 404 | |
| 405 int DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule) | |
| 406 { | |
| 407 return(DES_set_key(key,schedule)); | |
| 408 } | |
| 409 /* | |
| 410 #undef des_fixup_key_parity | |
| 411 void des_fixup_key_parity(des_cblock *key) | |
| 412 { | |
| 413 des_set_odd_parity(key); | |
| 414 } | |
| 415 */ | |
| OLD | NEW |