summaryrefslogtreecommitdiff
path: root/usr/src/lib/libcrypt/common/des_soft.c
diff options
context:
space:
mode:
authorstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
committerstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
commit7c478bd95313f5f23a4c958a745db2134aa03244 (patch)
treec871e58545497667cbb4b0a4f2daf204743e1fe7 /usr/src/lib/libcrypt/common/des_soft.c
downloadillumos-gate-7c478bd95313f5f23a4c958a745db2134aa03244.tar.gz
OpenSolaris Launch
Diffstat (limited to 'usr/src/lib/libcrypt/common/des_soft.c')
-rw-r--r--usr/src/lib/libcrypt/common/des_soft.c446
1 files changed, 446 insertions, 0 deletions
diff --git a/usr/src/lib/libcrypt/common/des_soft.c b/usr/src/lib/libcrypt/common/des_soft.c
new file mode 100644
index 0000000000..b560c2dd65
--- /dev/null
+++ b/usr/src/lib/libcrypt/common/des_soft.c
@@ -0,0 +1,446 @@
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License"). You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
+ * or http://www.opensolaris.org/os/licensing.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
+ * If applicable, add the following below this CDDL HEADER, with the
+ * fields enclosed by brackets "[]" replaced with your own identifying
+ * information: Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ */
+/*
+ * Copyright 2005 Sun Microsystems, Inc. All rights reserved.
+ * Use is subject to license terms.
+ */
+
+/* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */
+/* All Rights Reserved */
+
+/*
+ * Portions of this source code were derived from Berkeley 4.3 BSD
+ * under license from the Regents of the University of California.
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+/*LINTLIBRARY*/
+
+/*
+ * Warning! Things are arranged very carefully in this file to
+ * allow read-only data to be moved to the text segment. The
+ * various DES tables must appear before any function definitions
+ * (this is arranged by including them immediately below) and partab
+ * must also appear before and function definitions
+ * This arrangement allows all data up through the first text to
+ * be moved to text.
+ */
+
+#ifndef _KERNEL
+#define CRYPT /* cannot configure out of user-level code */
+#endif
+
+#include "synonyms.h"
+#ifdef CRYPT
+#include <sys/types.h>
+#include <des/softdes.h>
+#include <des/desdata.h>
+
+#ifdef sun
+#include <sys/ioctl.h>
+#include <sys/des.h>
+#else
+#include <des/des.h>
+#endif
+
+#include "des_soft.h"
+
+/*
+ * Fast (?) software implementation of DES
+ * Has been seen going at 2000 bytes/sec on a Sun-2
+ * Works on a VAX too.
+ * Won't work without 8 bit chars and 32 bit longs
+ */
+
+#define btst(k, b) (k[b >> 3] & (0x80 >> (b & 07)))
+#define BIT28 (1<<28)
+
+
+#endif /* def CRYPT */
+
+static void des_setkey(u_char [8], struct deskeydata *, unsigned);
+static void des_encrypt(u_char *, struct deskeydata *);
+
+#ifndef _KERNEL
+/*
+ * Table giving odd parity in the low bit for ASCII characters
+ */
+static char partab[128] = {
+ 0x01, 0x01, 0x02, 0x02, 0x04, 0x04, 0x07, 0x07,
+ 0x08, 0x08, 0x0b, 0x0b, 0x0d, 0x0d, 0x0e, 0x0e,
+ 0x10, 0x10, 0x13, 0x13, 0x15, 0x15, 0x16, 0x16,
+ 0x19, 0x19, 0x1a, 0x1a, 0x1c, 0x1c, 0x1f, 0x1f,
+ 0x20, 0x20, 0x23, 0x23, 0x25, 0x25, 0x26, 0x26,
+ 0x29, 0x29, 0x2a, 0x2a, 0x2c, 0x2c, 0x2f, 0x2f,
+ 0x31, 0x31, 0x32, 0x32, 0x34, 0x34, 0x37, 0x37,
+ 0x38, 0x38, 0x3b, 0x3b, 0x3d, 0x3d, 0x3e, 0x3e,
+ 0x40, 0x40, 0x43, 0x43, 0x45, 0x45, 0x46, 0x46,
+ 0x49, 0x49, 0x4a, 0x4a, 0x4c, 0x4c, 0x4f, 0x4f,
+ 0x51, 0x51, 0x52, 0x52, 0x54, 0x54, 0x57, 0x57,
+ 0x58, 0x58, 0x5b, 0x5b, 0x5d, 0x5d, 0x5e, 0x5e,
+ 0x61, 0x61, 0x62, 0x62, 0x64, 0x64, 0x67, 0x67,
+ 0x68, 0x68, 0x6b, 0x6b, 0x6d, 0x6d, 0x6e, 0x6e,
+ 0x70, 0x70, 0x73, 0x73, 0x75, 0x75, 0x76, 0x76,
+ 0x79, 0x79, 0x7a, 0x7a, 0x7c, 0x7c, 0x7f, 0x7f,
+};
+
+
+
+/*
+ * Add odd parity to low bit of 8 byte key
+ */
+void
+des_setparity(char *p)
+{
+ int i;
+
+ for (i = 0; i < 8; i++) {
+ *p = partab[*p & 0x7f];
+ p++;
+ }
+}
+#endif /* def _KERNEL */
+
+#ifdef CRYPT
+/*
+ * Software encrypt or decrypt a block of data (multiple of 8 bytes)
+ * Do the CBC ourselves if needed.
+ */
+int
+__des_crypt(char *buf, unsigned int len, struct desparams *desp)
+{
+/* EXPORT DELETE START */
+ short i;
+ unsigned mode;
+ unsigned dir;
+ char nextiv[8];
+ struct deskeydata softkey;
+
+ mode = (unsigned) desp->des_mode;
+ dir = (unsigned) desp->des_dir;
+ des_setkey(desp->des_key, &softkey, dir);
+ while (len != 0) {
+ switch (mode) {
+ case CBC:
+ switch (dir) {
+ case ENCRYPT:
+ for (i = 0; i < 8; i++)
+ buf[i] ^= desp->des_ivec[i];
+ des_encrypt((u_char *)buf, &softkey);
+ for (i = 0; i < 8; i++)
+ desp->des_ivec[i] = buf[i];
+ break;
+ case DECRYPT:
+ for (i = 0; i < 8; i++)
+ nextiv[i] = buf[i];
+ des_encrypt((u_char *)buf, &softkey);
+ for (i = 0; i < 8; i++) {
+ buf[i] ^= desp->des_ivec[i];
+ desp->des_ivec[i] = nextiv[i];
+ }
+ break;
+ }
+ break;
+ case ECB:
+ des_encrypt((u_char *)buf, &softkey);
+ break;
+ }
+ buf += 8;
+ len -= 8;
+ }
+/* EXPORT DELETE END */
+ return (1);
+}
+
+
+/*
+ * Set the key and direction for an encryption operation
+ * We build the 16 key entries here
+ */
+static void
+des_setkey(u_char userkey[8], struct deskeydata *kd, unsigned int dir)
+{
+/* EXPORT DELETE START */
+ long C, D;
+ short i;
+
+ /*
+ * First, generate C and D by permuting
+ * the key. The low order bit of each
+ * 8-bit char is not used, so C and D are only 28
+ * bits apiece.
+ */
+ {
+ short bit;
+ const short *pcc = PC1_C, *pcd = PC1_D;
+
+ C = D = 0;
+ for (i = 0; i < 28; i++) {
+ C <<= 1;
+ D <<= 1;
+ bit = *pcc++;
+ if (btst(userkey, bit))
+ C |= 1;
+ bit = *pcd++;
+ if (btst(userkey, bit))
+ D |= 1;
+ }
+ }
+ /*
+ * To generate Ki, rotate C and D according
+ * to schedule and pick up a permutation
+ * using PC2.
+ */
+ for (i = 0; i < 16; i++) {
+ chunk_t *c;
+ short j, k, bit;
+ long bbit;
+
+ /*
+ * Do the "left shift" (rotate)
+ * We know we always rotate by either 1 or 2 bits
+ * the shifts table tells us if its 2
+ */
+ C <<= 1;
+ if (C & BIT28)
+ C |= 1;
+ D <<= 1;
+ if (D & BIT28)
+ D |= 1;
+ if (shifts[i]) {
+ C <<= 1;
+ if (C & BIT28)
+ C |= 1;
+ D <<= 1;
+ if (D & BIT28)
+ D |= 1;
+ }
+ /*
+ * get Ki. Note C and D are concatenated.
+ */
+ bit = 0;
+ switch (dir) {
+ case ENCRYPT:
+ c = &kd->keyval[i]; break;
+ case DECRYPT:
+ c = &kd->keyval[15 - i]; break;
+ }
+ c->long0 = 0;
+ c->long1 = 0;
+ bbit = (1 << 5) << 24;
+ for (j = 0; j < 4; j++) {
+ for (k = 0; k < 6; k++) {
+ if (C & (BIT28 >> PC2_C[bit]))
+ c->long0 |= bbit >> k;
+ if (D & (BIT28 >> PC2_D[bit]))
+ c->long1 |= bbit >> k;
+ bit++;
+ }
+ bbit >>= 8;
+ }
+
+ }
+/* EXPORT DELETE END */
+ return;
+}
+
+
+
+/*
+ * Do an encryption operation
+ * Much pain is taken (with preprocessor) to avoid loops so the compiler
+ * can do address arithmetic instead of doing it at runtime.
+ * Note that the byte-to-chunk conversion is necessary to guarantee
+ * processor byte-order independence.
+ */
+static void
+des_encrypt(u_char *data, struct deskeydata *kd)
+{
+/* EXPORT DELETE START */
+ chunk_t work1, work2;
+
+ /*
+ * Initial permutation
+ * and byte to chunk conversion
+ */
+ {
+ const uint32_t *lp;
+ uint32_t l0, l1, w;
+ short i, pbit;
+
+ work1.byte0 = data[0];
+ work1.byte1 = data[1];
+ work1.byte2 = data[2];
+ work1.byte3 = data[3];
+ work1.byte4 = data[4];
+ work1.byte5 = data[5];
+ work1.byte6 = data[6];
+ work1.byte7 = data[7];
+ l0 = l1 = 0;
+ w = work1.long0;
+ for (lp = &longtab[0], i = 0; i < 32; i++) {
+ if (w & *lp++) {
+ pbit = IPtab[i];
+ if (pbit < 32)
+ l0 |= longtab[pbit];
+ else
+ l1 |= longtab[pbit-32];
+ }
+ }
+ w = work1.long1;
+ for (lp = &longtab[0], i = 32; i < 64; i++) {
+ if (w & *lp++) {
+ pbit = IPtab[i];
+ if (pbit < 32)
+ l0 |= longtab[pbit];
+ else
+ l1 |= longtab[pbit-32];
+ }
+ }
+ work2.long0 = l0;
+ work2.long1 = l1;
+ }
+
+/*
+ * Expand 8 bits of 32 bit R to 48 bit R
+ */
+#define do_R_to_ER(op, b) { \
+ const struct R_to_ER *p = &R_to_ER_tab[b][R.byte##b]; \
+ e0 op p->l0; \
+ e1 op p->l1; \
+}
+
+/*
+ * Inner part of the algorithm:
+ * Expand R from 32 to 48 bits; xor key value;
+ * apply S boxes; permute 32 bits of output
+ */
+#define do_F(iter, inR, outR) { \
+ chunk_t R, ER; \
+ uint32_t e0, e1; \
+ R.long0 = inR; \
+ do_R_to_ER(=, 0); \
+ do_R_to_ER(|=, 1); \
+ do_R_to_ER(|=, 2); \
+ do_R_to_ER(|=, 3); \
+ ER.long0 = e0 ^ kd->keyval[iter].long0; \
+ ER.long1 = e1 ^ kd->keyval[iter].long1; \
+ R.long0 = \
+ S_tab[0][ER.byte0] + \
+ S_tab[1][ER.byte1] + \
+ S_tab[2][ER.byte2] + \
+ S_tab[3][ER.byte3] + \
+ S_tab[4][ER.byte4] + \
+ S_tab[5][ER.byte5] + \
+ S_tab[6][ER.byte6] + \
+ S_tab[7][ER.byte7]; \
+ outR = \
+ P_tab[0][R.byte0] + \
+ P_tab[1][R.byte1] + \
+ P_tab[2][R.byte2] + \
+ P_tab[3][R.byte3]; \
+}
+
+/*
+ * Do a cipher step
+ * Apply inner part; do xor and exchange of 32 bit parts
+ */
+#define cipher(iter, inR, inL, outR, outL) { \
+ do_F(iter, inR, outR); \
+ outR ^= inL; \
+ outL = inR; \
+}
+
+ /*
+ * Apply the 16 ciphering steps
+ */
+ {
+ uint32_t r0, l0, r1, l1;
+
+ l0 = work2.long0;
+ r0 = work2.long1;
+ cipher(0, r0, l0, r1, l1);
+ cipher(1, r1, l1, r0, l0);
+ cipher(2, r0, l0, r1, l1);
+ cipher(3, r1, l1, r0, l0);
+ cipher(4, r0, l0, r1, l1);
+ cipher(5, r1, l1, r0, l0);
+ cipher(6, r0, l0, r1, l1);
+ cipher(7, r1, l1, r0, l0);
+ cipher(8, r0, l0, r1, l1);
+ cipher(9, r1, l1, r0, l0);
+ cipher(10, r0, l0, r1, l1);
+ cipher(11, r1, l1, r0, l0);
+ cipher(12, r0, l0, r1, l1);
+ cipher(13, r1, l1, r0, l0);
+ cipher(14, r0, l0, r1, l1);
+ cipher(15, r1, l1, r0, l0);
+ work1.long0 = r0;
+ work1.long1 = l0;
+ }
+
+ /*
+ * Final permutation
+ * and chunk to byte conversion
+ */
+ {
+ const uint32_t *lp;
+ uint32_t l0, l1, w;
+ short i, pbit;
+
+ l0 = l1 = 0;
+ w = work1.long0;
+ for (lp = &longtab[0], i = 0; i < 32; i++) {
+ if (w & *lp++) {
+ pbit = FPtab[i];
+ if (pbit < 32)
+ l0 |= longtab[pbit];
+ else
+ l1 |= longtab[pbit-32];
+ }
+ }
+ w = work1.long1;
+ for (lp = &longtab[0], i = 32; i < 64; i++) {
+ if (w & *lp++) {
+ pbit = FPtab[i];
+ if (pbit < 32)
+ l0 |= longtab[pbit];
+ else
+ l1 |= longtab[pbit-32];
+ }
+ }
+ work2.long0 = l0;
+ work2.long1 = l1;
+ }
+ data[0] = work2.byte0;
+ data[1] = work2.byte1;
+ data[2] = work2.byte2;
+ data[3] = work2.byte3;
+ data[4] = work2.byte4;
+ data[5] = work2.byte5;
+ data[6] = work2.byte6;
+ data[7] = work2.byte7;
+
+/* EXPORT DELETE END */
+ return;
+}
+#endif /* def CRYPT */