Initial revision
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@171 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
51
lib/des/3cbc_enc.c
Normal file
51
lib/des/3cbc_enc.c
Normal file
@@ -0,0 +1,51 @@
|
||||
/* 3cbc_enc.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
static void
|
||||
xp(des_cblock *arg)
|
||||
{
|
||||
unsigned char *a = (unsigned char *) arg;
|
||||
int i;
|
||||
for(i=0; i<8; i++) printf("%02X",a[i]);printf("\n");
|
||||
}
|
||||
|
||||
int des_3cbc_encrypt(des_cblock (*input), des_cblock (*output), long int length, struct des_ks_struct *ks1, struct des_ks_struct *ks2, des_cblock (*iv1), des_cblock (*iv2), int encrypt)
|
||||
{
|
||||
int off=length/8-1;
|
||||
des_cblock niv1,niv2;
|
||||
|
||||
printf("3cbc\n");
|
||||
xp(iv1);
|
||||
xp(iv1);
|
||||
xp(iv2);
|
||||
xp(input);
|
||||
if (encrypt == DES_ENCRYPT)
|
||||
{
|
||||
des_cbc_encrypt(input,output,length,ks1,iv1,encrypt);
|
||||
if (length >= sizeof(des_cblock))
|
||||
memcpy(niv1,output[off],sizeof(des_cblock));
|
||||
des_cbc_encrypt(output,output,length,ks2,iv1,!encrypt);
|
||||
des_cbc_encrypt(output,output,length,ks1,iv2, encrypt);
|
||||
if (length >= sizeof(des_cblock))
|
||||
memcpy(niv2,output[off],sizeof(des_cblock));
|
||||
memcpy(*iv1,niv1,sizeof(des_cblock));
|
||||
}
|
||||
else
|
||||
{
|
||||
if (length >= sizeof(des_cblock))
|
||||
memcpy(niv1,input[off],sizeof(des_cblock));
|
||||
des_cbc_encrypt(input,output,length,ks1,iv1,encrypt);
|
||||
des_cbc_encrypt(output,output,length,ks2,iv2,!encrypt);
|
||||
if (length >= sizeof(des_cblock))
|
||||
memcpy(niv2,output[off],sizeof(des_cblock));
|
||||
des_cbc_encrypt(output,output,length,ks1,iv2, encrypt);
|
||||
}
|
||||
memcpy(iv1,niv1,sizeof(des_cblock));
|
||||
memcpy(iv2,niv2,sizeof(des_cblock));
|
||||
xp(iv1);
|
||||
xp(iv1);
|
||||
xp(iv2);
|
||||
xp(output);
|
||||
return(0);
|
||||
}
|
26
lib/des/3ecb_enc.c
Normal file
26
lib/des/3ecb_enc.c
Normal file
@@ -0,0 +1,26 @@
|
||||
/* 3ecb_enc.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
int des_3ecb_encrypt(des_cblock (*input), des_cblock (*output), struct des_ks_struct *ks1, struct des_ks_struct *ks2, int encrypt)
|
||||
{
|
||||
register u_int32_t l0,l1;
|
||||
register unsigned char *in,*out;
|
||||
u_int32_t ll[2];
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
c2l(in,l0);
|
||||
c2l(in,l1);
|
||||
ll[0]=l0;
|
||||
ll[1]=l1;
|
||||
des_encrypt(ll,ll,ks1,encrypt);
|
||||
des_encrypt(ll,ll,ks2,!encrypt);
|
||||
des_encrypt(ll,ll,ks1,encrypt);
|
||||
l0=ll[0];
|
||||
l1=ll[1];
|
||||
l2c(l0,out);
|
||||
l2c(l1,out);
|
||||
return(0);
|
||||
}
|
||||
|
105
lib/des/ARTISTIC
Normal file
105
lib/des/ARTISTIC
Normal file
@@ -0,0 +1,105 @@
|
||||
|
||||
The "Artistic License"
|
||||
|
||||
Preamble
|
||||
|
||||
The intent of this document is to state the conditions under which a
|
||||
Package may be copied, such that the Copyright Holder maintains some
|
||||
semblance of artistic control over the development of the package,
|
||||
while giving the users of the package the right to use and distribute
|
||||
the Package in a more-or-less customary fashion, plus the right to make
|
||||
reasonable modifications.
|
||||
|
||||
Definitions:
|
||||
|
||||
"Package" refers to the collection of files distributed by the
|
||||
Copyright Holder, and derivatives of that collection of files
|
||||
created through textual modification.
|
||||
|
||||
"Standard Version" refers to such a Package if it has not been
|
||||
modified, or has been modified in accordance with the wishes
|
||||
of the Copyright Holder as specified below.
|
||||
|
||||
"Copyright Holder" is whoever is named in the copyright or
|
||||
copyrights for the package.
|
||||
|
||||
"You" is you, if you're thinking about copying or distributing
|
||||
this Package.
|
||||
|
||||
"Reasonable copying fee" is whatever you can justify on the
|
||||
basis of media cost, duplication charges, time of people involved,
|
||||
and so on. (You will not be required to justify it to the
|
||||
Copyright Holder, but only to the computing community at large
|
||||
as a market that must bear the fee.)
|
||||
|
||||
"Freely Available" means that no fee is charged for the item
|
||||
itself, though there may be fees involved in handling the item.
|
||||
It also means that recipients of the item may redistribute it
|
||||
under the same conditions they received it.
|
||||
|
||||
1. You may make and give away verbatim copies of the source form of the
|
||||
Standard Version of this Package without restriction, provided that you
|
||||
duplicate all of the original copyright notices and associated disclaimers.
|
||||
|
||||
2. You may apply bug fixes, portability fixes and other modifications
|
||||
derived from the Public Domain or from the Copyright Holder. A Package
|
||||
modified in such a way shall still be considered the Standard Version.
|
||||
|
||||
3. You may otherwise modify your copy of this Package in any way, provided
|
||||
that you insert a prominent notice in each changed file stating how and
|
||||
when you changed that file, and provided that you do at least ONE of the
|
||||
following:
|
||||
|
||||
a) place your modifications in the Public Domain or otherwise make them
|
||||
Freely Available, such as by posting said modifications to Usenet or
|
||||
an equivalent medium, or placing the modifications on a major archive
|
||||
site such as uunet.uu.net, or by allowing the Copyright Holder to include
|
||||
your modifications in the Standard Version of the Package.
|
||||
|
||||
b) use the modified Package only within your corporation or organization.
|
||||
|
||||
c) rename any non-standard executables so the names do not conflict
|
||||
with standard executables, which must also be provided, and provide
|
||||
a separate manual page for each non-standard executable that clearly
|
||||
documents how it differs from the Standard Version.
|
||||
|
||||
d) make other distribution arrangements with the Copyright Holder.
|
||||
|
||||
4. You may distribute the programs of this Package in object code or
|
||||
executable form, provided that you do at least ONE of the following:
|
||||
|
||||
a) distribute a Standard Version of the executables and library files,
|
||||
together with instructions (in the manual page or equivalent) on where
|
||||
to get the Standard Version.
|
||||
|
||||
b) accompany the distribution with the machine-readable source of
|
||||
the Package with your modifications.
|
||||
|
||||
c) give non-standard executables non-standard names, and clearly
|
||||
document the differences in manual pages (or equivalent), together
|
||||
with instructions on where to get the Standard Version.
|
||||
|
||||
d) make other distribution arrangements with the Copyright Holder.
|
||||
|
||||
5. You may charge a reasonable copying fee for any distribution of this
|
||||
Package. You may charge any fee you choose for support of this
|
||||
Package. You may not charge a fee for this Package itself. However,
|
||||
you may distribute this Package in aggregate with other (possibly
|
||||
commercial) programs as part of a larger (possibly commercial) software
|
||||
distribution provided that you do not advertise this Package as a
|
||||
product of your own.
|
||||
|
||||
6. Any programs linked with this library do not automatically fall
|
||||
under the copyright of this Package, but belong to whomever generated
|
||||
them, and may be sold commercially, and may be aggregated with this
|
||||
Package.
|
||||
|
||||
7. The name of the Copyright Holder may not be used to endorse or promote
|
||||
products derived from this software without specific prior written permission.
|
||||
|
||||
8. THIS PACKAGE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
|
||||
IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
|
||||
WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
The End
|
||||
|
16
lib/des/CHANGES
Normal file
16
lib/des/CHANGES
Normal file
@@ -0,0 +1,16 @@
|
||||
The main changes in this package since it was last posted to
|
||||
comp.sources.misc are
|
||||
|
||||
The main changes are
|
||||
- Major changes to the Copyright restrictions.
|
||||
- Lots and lots of features added to the des(1) command, including
|
||||
- Triple DES, both triple ECB and triple CBC options.
|
||||
- uuencodeing/uudecoding built in to des(1).
|
||||
- generate checksums.
|
||||
- hex keys.
|
||||
- Cleaned up the prototypes in des.h
|
||||
- Filenames are now mostly <= 8 characters long.
|
||||
- OFB, CFB, triple ECB and triple CBC modes of DES added to the library.
|
||||
- Compiles and runs of all 64bit machines I could test the code on
|
||||
(Cray, ETA10, DEC Alpha).
|
||||
- It really does work with kerberos v 4 now :-).
|
489
lib/des/COPYING
Normal file
489
lib/des/COPYING
Normal file
@@ -0,0 +1,489 @@
|
||||
Copyright (C) 1993 Eric Young
|
||||
|
||||
This is a DES implementation written by Eric Young (eay@psych.psy.uq.oz.au)
|
||||
The implementation was written so as to conform with the manual entry
|
||||
for the des_crypt(3) library routines from MIT's project Athena.
|
||||
|
||||
|
||||
|
||||
GNU LIBRARY GENERAL PUBLIC LICENSE
|
||||
Version 2, June 1991
|
||||
|
||||
Copyright (C) 1991 Free Software Foundation, Inc.
|
||||
675 Mass Ave, Cambridge, MA 02139, USA
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
[This is the first released version of the library GPL. It is
|
||||
numbered 2 because it goes with version 2 of the ordinary GPL.]
|
||||
|
||||
Preamble
|
||||
|
||||
The licenses for most software are designed to take away your
|
||||
freedom to share and change it. By contrast, the GNU General Public
|
||||
Licenses are intended to guarantee your freedom to share and change
|
||||
free software--to make sure the software is free for all its users.
|
||||
|
||||
This license, the Library General Public License, applies to some
|
||||
specially designated Free Software Foundation software, and to any
|
||||
other libraries whose authors decide to use it. You can use it for
|
||||
your libraries, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
this service if you wish), that you receive source code or can get it
|
||||
if you want it, that you can change the software or use pieces of it
|
||||
in new free programs; and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to make restrictions that forbid
|
||||
anyone to deny you these rights or to ask you to surrender the rights.
|
||||
These restrictions translate to certain responsibilities for you if
|
||||
you distribute copies of the library, or if you modify it.
|
||||
|
||||
For example, if you distribute copies of the library, whether gratis
|
||||
or for a fee, you must give the recipients all the rights that we gave
|
||||
you. You must make sure that they, too, receive or can get the source
|
||||
code. If you link a program with the library, you must provide
|
||||
complete object files to the recipients so that they can relink them
|
||||
with the library, after making changes to the library and recompiling
|
||||
it. And you must show them these terms so they know their rights.
|
||||
|
||||
Our method of protecting your rights has two steps: (1) copyright
|
||||
the library, and (2) offer you this license which gives you legal
|
||||
permission to copy, distribute and/or modify the library.
|
||||
|
||||
Also, for each distributor's protection, we want to make certain
|
||||
that everyone understands that there is no warranty for this free
|
||||
library. If the library is modified by someone else and passed on, we
|
||||
want its recipients to know that what they have is not the original
|
||||
version, so that any problems introduced by others will not reflect on
|
||||
the original authors' reputations.
|
||||
|
||||
Finally, any free program is threatened constantly by software
|
||||
patents. We wish to avoid the danger that companies distributing free
|
||||
software will individually obtain patent licenses, thus in effect
|
||||
transforming the program into proprietary software. To prevent this,
|
||||
we have made it clear that any patent must be licensed for everyone's
|
||||
free use or not licensed at all.
|
||||
|
||||
Most GNU software, including some libraries, is covered by the ordinary
|
||||
GNU General Public License, which was designed for utility programs. This
|
||||
license, the GNU Library General Public License, applies to certain
|
||||
designated libraries. This license is quite different from the ordinary
|
||||
one; be sure to read it in full, and don't assume that anything in it is
|
||||
the same as in the ordinary license.
|
||||
|
||||
The reason we have a separate public license for some libraries is that
|
||||
they blur the distinction we usually make between modifying or adding to a
|
||||
program and simply using it. Linking a program with a library, without
|
||||
changing the library, is in some sense simply using the library, and is
|
||||
analogous to running a utility program or application program. However, in
|
||||
a textual and legal sense, the linked executable is a combined work, a
|
||||
derivative of the original library, and the ordinary General Public License
|
||||
treats it as such.
|
||||
|
||||
Because of this blurred distinction, using the ordinary General
|
||||
Public License for libraries did not effectively promote software
|
||||
sharing, because most developers did not use the libraries. We
|
||||
concluded that weaker conditions might promote sharing better.
|
||||
|
||||
However, unrestricted linking of non-free programs would deprive the
|
||||
users of those programs of all benefit from the free status of the
|
||||
libraries themselves. This Library General Public License is intended to
|
||||
permit developers of non-free programs to use free libraries, while
|
||||
preserving your freedom as a user of such programs to change the free
|
||||
libraries that are incorporated in them. (We have not seen how to achieve
|
||||
this as regards changes in header files, but we have achieved it as regards
|
||||
changes in the actual functions of the Library.) The hope is that this
|
||||
will lead to faster development of free libraries.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow. Pay close attention to the difference between a
|
||||
"work based on the library" and a "work that uses the library". The
|
||||
former contains code derived from the library, while the latter only
|
||||
works together with the library.
|
||||
|
||||
Note that it is possible for a library to be covered by the ordinary
|
||||
General Public License rather than by this special one.
|
||||
|
||||
GNU LIBRARY GENERAL PUBLIC LICENSE
|
||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||
|
||||
0. This License Agreement applies to any software library which
|
||||
contains a notice placed by the copyright holder or other authorized
|
||||
party saying it may be distributed under the terms of this Library
|
||||
General Public License (also called "this License"). Each licensee is
|
||||
addressed as "you".
|
||||
|
||||
A "library" means a collection of software functions and/or data
|
||||
prepared so as to be conveniently linked with application programs
|
||||
(which use some of those functions and data) to form executables.
|
||||
|
||||
The "Library", below, refers to any such software library or work
|
||||
which has been distributed under these terms. A "work based on the
|
||||
Library" means either the Library or any derivative work under
|
||||
copyright law: that is to say, a work containing the Library or a
|
||||
portion of it, either verbatim or with modifications and/or translated
|
||||
straightforwardly into another language. (Hereinafter, translation is
|
||||
included without limitation in the term "modification".)
|
||||
|
||||
"Source code" for a work means the preferred form of the work for
|
||||
making modifications to it. For a library, complete source code means
|
||||
all the source code for all modules it contains, plus any associated
|
||||
interface definition files, plus the scripts used to control compilation
|
||||
and installation of the library.
|
||||
|
||||
Activities other than copying, distribution and modification are not
|
||||
covered by this License; they are outside its scope. The act of
|
||||
running a program using the Library is not restricted, and output from
|
||||
such a program is covered only if its contents constitute a work based
|
||||
on the Library (independent of the use of the Library in a tool for
|
||||
writing it). Whether that is true depends on what the Library does
|
||||
and what the program that uses the Library does.
|
||||
|
||||
1. You may copy and distribute verbatim copies of the Library's
|
||||
complete source code as you receive it, in any medium, provided that
|
||||
you conspicuously and appropriately publish on each copy an
|
||||
appropriate copyright notice and disclaimer of warranty; keep intact
|
||||
all the notices that refer to this License and to the absence of any
|
||||
warranty; and distribute a copy of this License along with the
|
||||
Library.
|
||||
|
||||
You may charge a fee for the physical act of transferring a copy,
|
||||
and you may at your option offer warranty protection in exchange for a
|
||||
fee.
|
||||
|
||||
2. You may modify your copy or copies of the Library or any portion
|
||||
of it, thus forming a work based on the Library, and copy and
|
||||
distribute such modifications or work under the terms of Section 1
|
||||
above, provided that you also meet all of these conditions:
|
||||
|
||||
a) The modified work must itself be a software library.
|
||||
|
||||
b) You must cause the files modified to carry prominent notices
|
||||
stating that you changed the files and the date of any change.
|
||||
|
||||
c) You must cause the whole of the work to be licensed at no
|
||||
charge to all third parties under the terms of this License.
|
||||
|
||||
d) If a facility in the modified Library refers to a function or a
|
||||
table of data to be supplied by an application program that uses
|
||||
the facility, other than as an argument passed when the facility
|
||||
is invoked, then you must make a good faith effort to ensure that,
|
||||
in the event an application does not supply such function or
|
||||
table, the facility still operates, and performs whatever part of
|
||||
its purpose remains meaningful.
|
||||
|
||||
(For example, a function in a library to compute square roots has
|
||||
a purpose that is entirely well-defined independent of the
|
||||
application. Therefore, Subsection 2d requires that any
|
||||
application-supplied function or table used by this function must
|
||||
be optional: if the application does not supply it, the square
|
||||
root function must still compute square roots.)
|
||||
|
||||
These requirements apply to the modified work as a whole. If
|
||||
identifiable sections of that work are not derived from the Library,
|
||||
and can be reasonably considered independent and separate works in
|
||||
themselves, then this License, and its terms, do not apply to those
|
||||
sections when you distribute them as separate works. But when you
|
||||
distribute the same sections as part of a whole which is a work based
|
||||
on the Library, the distribution of the whole must be on the terms of
|
||||
this License, whose permissions for other licensees extend to the
|
||||
entire whole, and thus to each and every part regardless of who wrote
|
||||
it.
|
||||
|
||||
Thus, it is not the intent of this section to claim rights or contest
|
||||
your rights to work written entirely by you; rather, the intent is to
|
||||
exercise the right to control the distribution of derivative or
|
||||
collective works based on the Library.
|
||||
|
||||
In addition, mere aggregation of another work not based on the Library
|
||||
with the Library (or with a work based on the Library) on a volume of
|
||||
a storage or distribution medium does not bring the other work under
|
||||
the scope of this License.
|
||||
|
||||
3. You may opt to apply the terms of the ordinary GNU General Public
|
||||
License instead of this License to a given copy of the Library. To do
|
||||
this, you must alter all the notices that refer to this License, so
|
||||
that they refer to the ordinary GNU General Public License, version 2,
|
||||
instead of to this License. (If a newer version than version 2 of the
|
||||
ordinary GNU General Public License has appeared, then you can specify
|
||||
that version instead if you wish.) Do not make any other change in
|
||||
these notices.
|
||||
|
||||
Once this change is made in a given copy, it is irreversible for
|
||||
that copy, so the ordinary GNU General Public License applies to all
|
||||
subsequent copies and derivative works made from that copy.
|
||||
|
||||
This option is useful when you wish to copy part of the code of
|
||||
the Library into a program that is not a library.
|
||||
|
||||
4. You may copy and distribute the Library (or a portion or
|
||||
derivative of it, under Section 2) in object code or executable form
|
||||
under the terms of Sections 1 and 2 above provided that you accompany
|
||||
it with the complete corresponding machine-readable source code, which
|
||||
must be distributed under the terms of Sections 1 and 2 above on a
|
||||
medium customarily used for software interchange.
|
||||
|
||||
If distribution of object code is made by offering access to copy
|
||||
from a designated place, then offering equivalent access to copy the
|
||||
source code from the same place satisfies the requirement to
|
||||
distribute the source code, even though third parties are not
|
||||
compelled to copy the source along with the object code.
|
||||
|
||||
5. A program that contains no derivative of any portion of the
|
||||
Library, but is designed to work with the Library by being compiled or
|
||||
linked with it, is called a "work that uses the Library". Such a
|
||||
work, in isolation, is not a derivative work of the Library, and
|
||||
therefore falls outside the scope of this License.
|
||||
|
||||
However, linking a "work that uses the Library" with the Library
|
||||
creates an executable that is a derivative of the Library (because it
|
||||
contains portions of the Library), rather than a "work that uses the
|
||||
library". The executable is therefore covered by this License.
|
||||
Section 6 states terms for distribution of such executables.
|
||||
|
||||
When a "work that uses the Library" uses material from a header file
|
||||
that is part of the Library, the object code for the work may be a
|
||||
derivative work of the Library even though the source code is not.
|
||||
Whether this is true is especially significant if the work can be
|
||||
linked without the Library, or if the work is itself a library. The
|
||||
threshold for this to be true is not precisely defined by law.
|
||||
|
||||
If such an object file uses only numerical parameters, data
|
||||
structure layouts and accessors, and small macros and small inline
|
||||
functions (ten lines or less in length), then the use of the object
|
||||
file is unrestricted, regardless of whether it is legally a derivative
|
||||
work. (Executables containing this object code plus portions of the
|
||||
Library will still fall under Section 6.)
|
||||
|
||||
Otherwise, if the work is a derivative of the Library, you may
|
||||
distribute the object code for the work under the terms of Section 6.
|
||||
Any executables containing that work also fall under Section 6,
|
||||
whether or not they are linked directly with the Library itself.
|
||||
|
||||
6. As an exception to the Sections above, you may also compile or
|
||||
link a "work that uses the Library" with the Library to produce a
|
||||
work containing portions of the Library, and distribute that work
|
||||
under terms of your choice, provided that the terms permit
|
||||
modification of the work for the customer's own use and reverse
|
||||
engineering for debugging such modifications.
|
||||
|
||||
You must give prominent notice with each copy of the work that the
|
||||
Library is used in it and that the Library and its use are covered by
|
||||
this License. You must supply a copy of this License. If the work
|
||||
during execution displays copyright notices, you must include the
|
||||
copyright notice for the Library among them, as well as a reference
|
||||
directing the user to the copy of this License. Also, you must do one
|
||||
of these things:
|
||||
|
||||
a) Accompany the work with the complete corresponding
|
||||
machine-readable source code for the Library including whatever
|
||||
changes were used in the work (which must be distributed under
|
||||
Sections 1 and 2 above); and, if the work is an executable linked
|
||||
with the Library, with the complete machine-readable "work that
|
||||
uses the Library", as object code and/or source code, so that the
|
||||
user can modify the Library and then relink to produce a modified
|
||||
executable containing the modified Library. (It is understood
|
||||
that the user who changes the contents of definitions files in the
|
||||
Library will not necessarily be able to recompile the application
|
||||
to use the modified definitions.)
|
||||
|
||||
b) Accompany the work with a written offer, valid for at
|
||||
least three years, to give the same user the materials
|
||||
specified in Subsection 6a, above, for a charge no more
|
||||
than the cost of performing this distribution.
|
||||
|
||||
c) If distribution of the work is made by offering access to copy
|
||||
from a designated place, offer equivalent access to copy the above
|
||||
specified materials from the same place.
|
||||
|
||||
d) Verify that the user has already received a copy of these
|
||||
materials or that you have already sent this user a copy.
|
||||
|
||||
For an executable, the required form of the "work that uses the
|
||||
Library" must include any data and utility programs needed for
|
||||
reproducing the executable from it. However, as a special exception,
|
||||
the source code distributed need not include anything that is normally
|
||||
distributed (in either source or binary form) with the major
|
||||
components (compiler, kernel, and so on) of the operating system on
|
||||
which the executable runs, unless that component itself accompanies
|
||||
the executable.
|
||||
|
||||
It may happen that this requirement contradicts the license
|
||||
restrictions of other proprietary libraries that do not normally
|
||||
accompany the operating system. Such a contradiction means you cannot
|
||||
use both them and the Library together in an executable that you
|
||||
distribute.
|
||||
|
||||
7. You may place library facilities that are a work based on the
|
||||
Library side-by-side in a single library together with other library
|
||||
facilities not covered by this License, and distribute such a combined
|
||||
library, provided that the separate distribution of the work based on
|
||||
the Library and of the other library facilities is otherwise
|
||||
permitted, and provided that you do these two things:
|
||||
|
||||
a) Accompany the combined library with a copy of the same work
|
||||
based on the Library, uncombined with any other library
|
||||
facilities. This must be distributed under the terms of the
|
||||
Sections above.
|
||||
|
||||
b) Give prominent notice with the combined library of the fact
|
||||
that part of it is a work based on the Library, and explaining
|
||||
where to find the accompanying uncombined form of the same work.
|
||||
|
||||
8. You may not copy, modify, sublicense, link with, or distribute
|
||||
the Library except as expressly provided under this License. Any
|
||||
attempt otherwise to copy, modify, sublicense, link with, or
|
||||
distribute the Library is void, and will automatically terminate your
|
||||
rights under this License. However, parties who have received copies,
|
||||
or rights, from you under this License will not have their licenses
|
||||
terminated so long as such parties remain in full compliance.
|
||||
|
||||
9. You are not required to accept this License, since you have not
|
||||
signed it. However, nothing else grants you permission to modify or
|
||||
distribute the Library or its derivative works. These actions are
|
||||
prohibited by law if you do not accept this License. Therefore, by
|
||||
modifying or distributing the Library (or any work based on the
|
||||
Library), you indicate your acceptance of this License to do so, and
|
||||
all its terms and conditions for copying, distributing or modifying
|
||||
the Library or works based on it.
|
||||
|
||||
10. Each time you redistribute the Library (or any work based on the
|
||||
Library), the recipient automatically receives a license from the
|
||||
original licensor to copy, distribute, link with or modify the Library
|
||||
subject to these terms and conditions. You may not impose any further
|
||||
restrictions on the recipients' exercise of the rights granted herein.
|
||||
You are not responsible for enforcing compliance by third parties to
|
||||
this License.
|
||||
|
||||
11. If, as a consequence of a court judgment or allegation of patent
|
||||
infringement or for any other reason (not limited to patent issues),
|
||||
conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot
|
||||
distribute so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you
|
||||
may not distribute the Library at all. For example, if a patent
|
||||
license would not permit royalty-free redistribution of the Library by
|
||||
all those who receive copies directly or indirectly through you, then
|
||||
the only way you could satisfy both it and this License would be to
|
||||
refrain entirely from distribution of the Library.
|
||||
|
||||
If any portion of this section is held invalid or unenforceable under any
|
||||
particular circumstance, the balance of the section is intended to apply,
|
||||
and the section as a whole is intended to apply in other circumstances.
|
||||
|
||||
It is not the purpose of this section to induce you to infringe any
|
||||
patents or other property right claims or to contest validity of any
|
||||
such claims; this section has the sole purpose of protecting the
|
||||
integrity of the free software distribution system which is
|
||||
implemented by public license practices. Many people have made
|
||||
generous contributions to the wide range of software distributed
|
||||
through that system in reliance on consistent application of that
|
||||
system; it is up to the author/donor to decide if he or she is willing
|
||||
to distribute software through any other system and a licensee cannot
|
||||
impose that choice.
|
||||
|
||||
This section is intended to make thoroughly clear what is believed to
|
||||
be a consequence of the rest of this License.
|
||||
|
||||
12. If the distribution and/or use of the Library is restricted in
|
||||
certain countries either by patents or by copyrighted interfaces, the
|
||||
original copyright holder who places the Library under this License may add
|
||||
an explicit geographical distribution limitation excluding those countries,
|
||||
so that distribution is permitted only in or among countries not thus
|
||||
excluded. In such case, this License incorporates the limitation as if
|
||||
written in the body of this License.
|
||||
|
||||
13. The Free Software Foundation may publish revised and/or new
|
||||
versions of the Library General Public License from time to time.
|
||||
Such new versions will be similar in spirit to the present version,
|
||||
but may differ in detail to address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the Library
|
||||
specifies a version number of this License which applies to it and
|
||||
"any later version", you have the option of following the terms and
|
||||
conditions either of that version or of any later version published by
|
||||
the Free Software Foundation. If the Library does not specify a
|
||||
license version number, you may choose any version ever published by
|
||||
the Free Software Foundation.
|
||||
|
||||
14. If you wish to incorporate parts of the Library into other free
|
||||
programs whose distribution conditions are incompatible with these,
|
||||
write to the author to ask for permission. For software which is
|
||||
copyrighted by the Free Software Foundation, write to the Free
|
||||
Software Foundation; we sometimes make exceptions for this. Our
|
||||
decision will be guided by the two goals of preserving the free status
|
||||
of all derivatives of our free software and of promoting the sharing
|
||||
and reuse of software generally.
|
||||
|
||||
NO WARRANTY
|
||||
|
||||
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
|
||||
WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
|
||||
EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
|
||||
OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
|
||||
KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
|
||||
LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
|
||||
THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
|
||||
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
|
||||
AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
|
||||
FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
|
||||
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
|
||||
LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
|
||||
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
|
||||
FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
|
||||
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
|
||||
DAMAGES.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
Appendix: How to Apply These Terms to Your New Libraries
|
||||
|
||||
If you develop a new library, and you want it to be of the greatest
|
||||
possible use to the public, we recommend making it free software that
|
||||
everyone can redistribute and change. You can do so by permitting
|
||||
redistribution under these terms (or, alternatively, under the terms of the
|
||||
ordinary General Public License).
|
||||
|
||||
To apply these terms, attach the following notices to the library. It is
|
||||
safest to attach them to the start of each source file to most effectively
|
||||
convey the exclusion of warranty; and each file should have at least the
|
||||
"copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the library's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This library is free software; you can redistribute it and/or
|
||||
modify it under the terms of the GNU Library General Public
|
||||
License as published by the Free Software Foundation; either
|
||||
version 2 of the License, or (at your option) any later version.
|
||||
|
||||
This library is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Library General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Library General Public
|
||||
License along with this library; if not, write to the Free
|
||||
Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
You should also get your employer (if you work as a programmer) or your
|
||||
school, if any, to sign a "copyright disclaimer" for the library, if
|
||||
necessary. Here is a sample; alter the names:
|
||||
|
||||
Yoyodyne, Inc., hereby disclaims all copyright interest in the
|
||||
library `Frob' (a library for tweaking knobs) written by James Random Hacker.
|
||||
|
||||
<signature of Ty Coon>, 1 April 1990
|
||||
Ty Coon, President of Vice
|
||||
|
||||
That's all there is to it!
|
60
lib/des/FILES
Normal file
60
lib/des/FILES
Normal file
@@ -0,0 +1,60 @@
|
||||
/* General stuff */
|
||||
CHANGES - Changes since the last posting to comp.sources.misc.
|
||||
ARTISTIC - Copying info.
|
||||
COPYING - Copying info.
|
||||
MODES.DES - A description of the features of the different modes of DES.
|
||||
FILES - This file.
|
||||
INSTALL - How to make things compile.
|
||||
Imakefile - For use with kerberos.
|
||||
README - What this package is.
|
||||
VERSION - Which version this is.
|
||||
KERBEROS - Kerberos version 4 notes.
|
||||
makefile - The make file.
|
||||
times - Some outputs from 'speed' on my local machines.
|
||||
vms.com - For use when compiling under VMS
|
||||
|
||||
/* My sunOS des(1) replacement */
|
||||
des.c - des(1) source code.
|
||||
des.man - des(1) manual.
|
||||
|
||||
/* Testing and timing programs. */
|
||||
destest.c - Source for libdes.a test program.
|
||||
speed.c - Source for libdes.a timing program.
|
||||
rpw.c - Source for libdes.a testing password reading routines.
|
||||
|
||||
/* libdes.a source code */
|
||||
des_crypt.man - libdes.a manual page.
|
||||
des.h - Public libdes.a header file.
|
||||
ecb_enc.c - des_ecb_encrypt() source, this contains the basic DES code.
|
||||
3ecb_enc.c - des_3ecb_encrypt() source.
|
||||
cbc_ckm.c - des_cbc_cksum() source.
|
||||
cbc_enc.c - des_cbc_encrypt() source.
|
||||
3cbc_enc.c - des_3cbc_encrypt() source.
|
||||
cfb_enc.c - des_cfb_encrypt() source.
|
||||
ofb_enc.c - des_cfb_encrypt() source.
|
||||
enc_read.c - des_enc_read() source.
|
||||
enc_writ.c - des_enc_write() source.
|
||||
pcbc_enc.c - des_pcbc_encrypt() source.
|
||||
qud_cksm.c - quad_cksum() source.
|
||||
rand_key.c - des_random_key() source.
|
||||
read_pwd.c - Source for des_read_password() plus related functions.
|
||||
set_key.c - Source for des_set_key().
|
||||
str2key.c - Covert a string of any length into a key.
|
||||
fcrypt.c - A small, fast version of crypt(3).
|
||||
des_locl.h - Internal libdes.a header file.
|
||||
podd.h - Odd parity tables - used in des_set_key().
|
||||
sk.h - Lookup tables used in des_set_key().
|
||||
spr.h - What is left of the S tables - used in ecb_encrypt().
|
||||
|
||||
/* The perl scripts - you can ignore these files they are only
|
||||
* included for the curious */
|
||||
des.pl - des in perl anyone? des_set_key and des_ecb_encrypt
|
||||
both done in a perl library.
|
||||
testdes.pl - Testing program for des.pl
|
||||
doIP - Perl script used to develop IP xor/shift code.
|
||||
doPC1 - Perl script used to develop PC1 xor/shift code.
|
||||
doPC2 - Generates sk.h.
|
||||
PC1 - Output of doPC1 should be the same as output from PC1.
|
||||
PC2 - used in development of doPC2.
|
||||
shifts.pl - Perl library used by my perl scripts.
|
||||
|
53
lib/des/INSTALL
Normal file
53
lib/des/INSTALL
Normal file
@@ -0,0 +1,53 @@
|
||||
Check the CC and CFLAGS lines in the makefile
|
||||
|
||||
If your C library does not support the times(3) function, change the
|
||||
#define TIMES to
|
||||
#undef TIMES in speed.c
|
||||
If it does, check the HZ value for the times(3) function.
|
||||
If your system does not define CLK_TCK it will be assumed to
|
||||
be 60.
|
||||
|
||||
If possible use gcc v 2.2.2
|
||||
Turn on the maximum optimising
|
||||
|
||||
type 'make'
|
||||
|
||||
run './destest' to check things are ok.
|
||||
run './rpw' to check the tty code for reading passwords works.
|
||||
run './speed' to see how fast those optimisations make the library run :-)
|
||||
|
||||
A make install will by default install
|
||||
libdes.a in /usr/local/lib/libdes.a
|
||||
des in /usr/local/bin/des
|
||||
des_crypt.man in /usr/local/man/man3/des_crypt.3
|
||||
des.man in /usr/local/man/man1/des.1
|
||||
des.h in /usr/include/des.h
|
||||
|
||||
des(1) should be compatible with sunOS's but I have been unable to
|
||||
test it.
|
||||
|
||||
These routines should compile on MSDOS, most 32bit and 64bit version
|
||||
of Unix (BSD and SYSV) and VMS, without modification.
|
||||
The only problems should be #include files that are in the wrong places.
|
||||
|
||||
These routines can be compiled under MSDOS.
|
||||
I have successfully encrypted files using des(1) under MSDOS and then
|
||||
decrypted the files on a SparcStation.
|
||||
I have been able to compile and test the routines with
|
||||
Microsoft C v 5.1 and Turbo C v 2.0.
|
||||
The code in this library is in no way optimised for the 16bit
|
||||
operation of MSDOS. Microsoft C generates code that is 40% slower
|
||||
than Turbo C's code. I believe this is due to problems it has with
|
||||
code generation with the 32bit shift operation in the IP and FP
|
||||
sections. I have added some 16bit optimization in ecb_encrypt.c
|
||||
and this generated a %70 speedup under Turbo C. Such are the
|
||||
limitations of DOS compilers :-(.
|
||||
|
||||
For Turbo C v 2.0, make sure to define MSDOS, in the relevant menu.
|
||||
|
||||
There is an alternative version of the D_ENCRYPT macro that can be
|
||||
enabled with the -DALT_ECB option in the makefile. This alternative
|
||||
macro can make a +-%20 speed difference to the DES encryption speed,
|
||||
depending on the compiler/CPU combinations.
|
||||
It has its greatest effect on Sparc machines when using the sun compiler.
|
||||
If in doubt, try enable/disable it and running speed.
|
33
lib/des/Imakefile
Normal file
33
lib/des/Imakefile
Normal file
@@ -0,0 +1,33 @@
|
||||
# This Imakefile has not been tested for a while but it should still
|
||||
# work when placed in the correct directory in the kerberos v 4 distribution
|
||||
|
||||
SRCS= cbc_cksm.c cbc_enc.c ecb_enc.c pcbc_enc.c \
|
||||
qud_cksm.c rand_key.c read_pwd.c set_key.c str2key.c \
|
||||
enc_read.c enc_writ.c cfb_enc.c \
|
||||
3ecb_enc.c ofb_enc.c 3cbc_enc.c rnd_keys.c
|
||||
|
||||
OBJS= cbc_cksm.o cbc_enc.o ecb_enc.o pcbc_enc.o \
|
||||
qud_cksm.o rand_key.o read_pwd.o set_key.o str2key.o \
|
||||
enc_read.o enc_writ.o cfb_enc.o \
|
||||
3ecb_enc.o ofb_enc.o 3cbc_enc.o rnd_keys.o
|
||||
|
||||
GENERAL=COPYING FILES INSTALL Imakefile README VERSION makefile times \
|
||||
vms.com KERBEROS
|
||||
DES= des.c des.man
|
||||
TESTING=destest.c speed.c rpw.c
|
||||
LIBDES= des_crypt.man des.h des_locl.h podd.h sk.h spr.h
|
||||
|
||||
PERL= des.pl testdes.pl doIP doPC1 doPC2 PC1 PC2 shifts.pl
|
||||
|
||||
CODE= $(GENERAL) $(DES) $(TESTING) $(SRCS) $(LIBDES) $(PERL)
|
||||
|
||||
SRCDIR=$(SRCTOP)/lib/des
|
||||
|
||||
library_obj_rule()
|
||||
|
||||
install_library_target(des,$(OBJS),$(SRCS),)
|
||||
|
||||
test(destest,libdes.a,)
|
||||
test(rpw,libdes.a,)
|
||||
test(speed,libdes.a,)
|
||||
test(des,libdes.a,)
|
38
lib/des/KERBEROS
Normal file
38
lib/des/KERBEROS
Normal file
@@ -0,0 +1,38 @@
|
||||
To use this library with Bones (kerberos without DES):
|
||||
1) Get my modified Bones - eBones. It can be found on
|
||||
gondwana.ecr.mu.oz.au (128.250.1.63) /pub/athena/eBones-p9.tar.Z
|
||||
and
|
||||
nic.funet.fi (128.214.6.100) /pub/unix/security/Kerberos/eBones-p9.tar.Z
|
||||
|
||||
2) Unpack this library in src/lib/des, makeing sure it is version
|
||||
3.00 or greater (libdes.tar.93-10-07.Z). This versions differences
|
||||
from the version in comp.sources.misc volume 29 patchlevel2.
|
||||
The primarily difference is that it should compile under kerberos :-).
|
||||
It can be found at.
|
||||
ftp.psy.uq.oz.au (130.102.32.1) /pub/DES/libdes.tar.93-10-07.Z
|
||||
|
||||
Now do a normal kerberos build and things should work.
|
||||
|
||||
One problem I found when I was build on my local sun.
|
||||
---
|
||||
For sunOS 4.1.1 apply the following patch to src/util/ss/make_commands.c
|
||||
|
||||
*** make_commands.c.orig Fri Jul 3 04:18:35 1987
|
||||
--- make_commands.c Wed May 20 08:47:42 1992
|
||||
***************
|
||||
*** 98,104 ****
|
||||
if (!rename(o_file, z_file)) {
|
||||
if (!vfork()) {
|
||||
chdir("/tmp");
|
||||
! execl("/bin/ld", "ld", "-o", o_file+5, "-s", "-r", "-n",
|
||||
z_file+5, 0);
|
||||
perror("/bin/ld");
|
||||
_exit(1);
|
||||
--- 98,104 ----
|
||||
if (!rename(o_file, z_file)) {
|
||||
if (!vfork()) {
|
||||
chdir("/tmp");
|
||||
! execl("/bin/ld", "ld", "-o", o_file+5, "-s", "-r",
|
||||
z_file+5, 0);
|
||||
perror("/bin/ld");
|
||||
_exit(1);
|
84
lib/des/MODES.DES
Normal file
84
lib/des/MODES.DES
Normal file
@@ -0,0 +1,84 @@
|
||||
Modes of DES
|
||||
Quite a bit of the following information has been taken from
|
||||
AS 2805.5.2
|
||||
Australian Standard
|
||||
Electronic funds transfer - Requirements for interfaces,
|
||||
Part 5.2: Modes of operation for an n-bit block cipher algorithm
|
||||
Appendix A
|
||||
|
||||
There are several different modes in which DES can be used, they are
|
||||
as follows.
|
||||
|
||||
Electronic Codebook Mode (ECB) (des_ecb_encrypt())
|
||||
- 64 bits are enciphered at a time.
|
||||
- The order of the blocks can be rearranged without detection.
|
||||
- The same plaintext block always produces the same ciphertext block
|
||||
(for the same key) making it vulnerable to a 'dictionary attack'.
|
||||
- An error will only affect one ciphertext block.
|
||||
|
||||
Cipher Block Chaining Mode (CBC) (des_cbc_encrypt())
|
||||
- a multiple of 64 bits are enciphered at a time.
|
||||
- The CBC mode produces the same ciphertext whenever the same
|
||||
plaintext is encrypted using the same key and starting variable.
|
||||
- The chaining operation makes the ciphertext blocks dependent on the
|
||||
current and all preceding plaintext blocks and therefore blocks can not
|
||||
be rearranged.
|
||||
- The use of different starting variables prevents the same plaintext
|
||||
enciphering to the same ciphertext.
|
||||
- An error will affect the current and the following ciphertext blocks.
|
||||
|
||||
Cipher Feedback Mode (CFB) (des_cfb_encrypt())
|
||||
- a number of bits (j) <= 64 are enciphered at a time.
|
||||
- The CFB mode produces the same ciphertext whenever the same
|
||||
plaintext is encrypted using the same key and starting variable.
|
||||
- The chaining operation makes the ciphertext variables dependent on the
|
||||
current and all preceding variables and therefore j-bit variables are
|
||||
chained together and con not be rearranged.
|
||||
- The use of different starting variables prevents the same plaintext
|
||||
enciphering to the same ciphertext.
|
||||
- The strength of the CFB mode depends on the size of k (maximal if
|
||||
j == k). In my implementation this is always the case.
|
||||
- Selection of a small value for j will require more cycles through
|
||||
the encipherment algorithm per unit of plaintext and thus cause
|
||||
greater processing overheads.
|
||||
- Only multiples of j bits can be enciphered.
|
||||
- An error will affect the current and the following ciphertext variables.
|
||||
|
||||
Output Feedback Mode (OFB) (des_ofb_encrypt())
|
||||
- a number of bits (j) <= 64 are enciphered at a time.
|
||||
- The OFB mode produces the same ciphertext whenever the same
|
||||
plaintext enciphered using the same key and starting variable. More
|
||||
over, in the OFB mode the same key stream is produced when the same
|
||||
key and start variable are used. Consequently, for security reasons
|
||||
a specific start variable should be used only once for a given key.
|
||||
- The absence of chaining makes the OFB more vulnerable to specific attacks.
|
||||
- The use of different start variables values prevents the same
|
||||
plaintext enciphering to the same ciphertext, by producing different
|
||||
key streams.
|
||||
- Selection of a small value for j will require more cycles through
|
||||
the encipherment algorithm per unit of plaintext and thus cause
|
||||
greater processing overheads.
|
||||
- Only multiples of j bits can be enciphered.
|
||||
- OFB mode of operation does not extend ciphertext errors in the
|
||||
resultant plaintext output. Every bit error in the ciphertext causes
|
||||
only one bit to be in error in the deciphered plaintext.
|
||||
- OFB mode is not self-synchronising. If the two operation of
|
||||
encipherment and decipherment get out of synchronism, the system needs
|
||||
to be re-initialised.
|
||||
- Each re-initialisation should use a value of the start variable
|
||||
different from the start variable values used before with the same
|
||||
key. The reason for this is that an identical bit stream would be
|
||||
produced each time from the same parameters. This would be
|
||||
susceptible to a ' known plaintext' attack.
|
||||
|
||||
Triple ECB Mode (des_3ecb_encrypt())
|
||||
- Encrypt with key1, decrypt with key2 and encrypt with key1 again.
|
||||
- As for ECB encryption but increases the effective key length to 112 bits.
|
||||
- If both keys are the same it is equivalent to encrypting once with
|
||||
just one key.
|
||||
|
||||
Triple CBC Mode (des_3cbc_encrypt())
|
||||
- Encrypt with key1, decrypt with key2 and encrypt with key1 again.
|
||||
- As for CBC encryption but increases the effective key length to 112 bits.
|
||||
- If both keys are the same it is equivalent to encrypting once with
|
||||
just one key.
|
28
lib/des/PC1
Executable file
28
lib/des/PC1
Executable file
@@ -0,0 +1,28 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@PC1=( 57,49,41,33,25,17, 9,
|
||||
1,58,50,42,34,26,18,
|
||||
10, 2,59,51,43,35,27,
|
||||
19,11, 3,60,52,44,36,
|
||||
"-","-","-","-",
|
||||
63,55,47,39,31,23,15,
|
||||
7,62,54,46,38,30,22,
|
||||
14, 6,61,53,45,37,29,
|
||||
21,13, 5,28,20,12, 4,
|
||||
"-","-","-","-",
|
||||
);
|
||||
|
||||
foreach (@PC1)
|
||||
{
|
||||
if ($_ ne "-")
|
||||
{
|
||||
$_--;
|
||||
$_=int($_/8)*8+7-($_%8);
|
||||
printf "%2d ",$_;
|
||||
}
|
||||
else
|
||||
{ print "-- "; }
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
print "\n" if ((($i) % 32) == 0);
|
||||
}
|
||||
|
57
lib/des/PC2
Executable file
57
lib/des/PC2
Executable file
@@ -0,0 +1,57 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@PC2_C=(14,17,11,24, 1, 5,
|
||||
3,28,15, 6,21,10,
|
||||
23,19,12, 4,26, 8,
|
||||
16, 7,27,20,13, 2,
|
||||
);
|
||||
|
||||
@PC2_D=(41,52,31,37,47,55,
|
||||
30,40,51,45,33,48,
|
||||
44,49,39,56,34,53,
|
||||
46,42,50,36,29,32,
|
||||
);
|
||||
|
||||
foreach (@PC2_C) {
|
||||
if ($_ ne "-")
|
||||
{
|
||||
$_--;
|
||||
printf "%2d ",$_; }
|
||||
else { print "-- "; }
|
||||
$C{$_}=1;
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
}
|
||||
$i=0;
|
||||
print "\n";
|
||||
foreach (@PC2_D) {
|
||||
if ($_ ne "-")
|
||||
{
|
||||
$_-=29;
|
||||
printf "%2d ",$_; }
|
||||
else { print "-- "; }
|
||||
$D{$_}=1;
|
||||
print "\n" if (((++$i) % 8) == 0); }
|
||||
|
||||
print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$C{$i};
|
||||
if ($_ ne "-") {printf "%2d ",$_;}
|
||||
else { print "-- "; }
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
}
|
||||
print "\n";
|
||||
|
||||
print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$D{$i};
|
||||
if ($_ ne "-") {printf "%2d ",$_;}
|
||||
else { print "-- "; }
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
}
|
||||
print "\n";
|
||||
sub numsort
|
||||
{
|
||||
$a-$b;
|
||||
}
|
56
lib/des/README
Normal file
56
lib/des/README
Normal file
@@ -0,0 +1,56 @@
|
||||
|
||||
libdes, Version 3.00 93/10/07
|
||||
|
||||
Copyright (c) 1993, Eric Young
|
||||
All rights reserved.
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of either:
|
||||
|
||||
a) the GNU General Public License as published by the Free
|
||||
Software Foundation; either version 1, or (at your option) any
|
||||
later version, or
|
||||
|
||||
b) the "Artistic License" which comes with this Kit.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See either
|
||||
the GNU General Public License or the Artistic License for more details.
|
||||
|
||||
You should have received a copy of the Artistic License with this
|
||||
Kit, in the file named "Artistic". If not, I'll be glad to provide one.
|
||||
|
||||
You should also have received a copy of the GNU General Public License
|
||||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
---
|
||||
This kit builds a DES encryption library and a DES encryption program.
|
||||
It suports ecb, cbc, ofb, cfb, triple ecb, triple cbc and MIT's pcbc
|
||||
encryption modes and also has a fast implementation of crypt(3).
|
||||
It contains support routines to read keys from a terminal,
|
||||
generate a random key, generate a key from an arbitary length string,
|
||||
read/write encrypted data from/to a file descriptor.
|
||||
|
||||
The implementation was written so as to conform with the manual entry
|
||||
for the des_crypt(3) library routines from MIT's project Athena.
|
||||
|
||||
destest should be run after compilation to test the des routines.
|
||||
rpw should be run after compilation to test the read password routines.
|
||||
The des program is a replacement for the sun des command. I believe it
|
||||
conforms to the sun version.
|
||||
|
||||
The Imakefile is setup for use in the kerberos distribution.
|
||||
|
||||
These routines are best compiled with gcc or any other good
|
||||
optimising compiler.
|
||||
Just turn you optimiser up to the highest settings and run destest
|
||||
after the build to make sure everything works.
|
||||
|
||||
I believe these routines are close to the fastest and most portable DES
|
||||
routines that use small lookup tables (4.5k) that are publicly available.
|
||||
The fcrypt routine is faster than ufc's fcrypt (when compiling with
|
||||
gcc2 -O2) on the sparc 2 (1410 vs 1270) but is not so good on other machines
|
||||
(on a sun3/260 168 vs 336).
|
||||
|
||||
Eric Young (eay@psych.psy.uq.oz.au)
|
185
lib/des/VERSION
Normal file
185
lib/des/VERSION
Normal file
@@ -0,0 +1,185 @@
|
||||
Release apon comp.sources.misc
|
||||
Version 3.01 08/10/93
|
||||
Added des_3cbc_encrypt()
|
||||
|
||||
Version 3.00 07/10/93
|
||||
Fixed up documentation.
|
||||
quad_cksum definitly compatable with MIT's now.
|
||||
|
||||
Version 2.30 24/08/93
|
||||
Tripple DES now defaults to tripple cbc but can do tripple ecb
|
||||
with the -b flag.
|
||||
Fixed some MSDOS uuen/uudecoding problems, thanks to
|
||||
Added prototypes.
|
||||
|
||||
Version 2.22 29/06/93
|
||||
Fixed a bug in des_is_weak_key() which stopped it working :-(
|
||||
thanks to engineering@MorningStar.Com.
|
||||
|
||||
Version 2.21 03/06/93
|
||||
des(1) with no arguments gives quite a bit of help.
|
||||
Added -c (generate ckecksum) flag to des(1).
|
||||
Added -3 (tripple DES) flag to des(1).
|
||||
Added cfb and ofb routines to the library.
|
||||
|
||||
Version 2.20 11/03/93
|
||||
Added -u (uuencode) flag to des(1).
|
||||
I have been playing with byte order in quad_cksum to make it
|
||||
compatible with MIT's version. All I can say is aviod this
|
||||
function if possible since MIT's output is endian dependent.
|
||||
|
||||
Version 2.12 14/10/92
|
||||
Added MSDOS specific macro in ecb_encrypt which gives a %70
|
||||
speed up when the code is compiled with turbo C.
|
||||
|
||||
Version 2.11 12/10/92
|
||||
Speedup in set_key (recoding of PC-1)
|
||||
I now do it in 47 simple operations, down from 60.
|
||||
Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov)
|
||||
for motivating me to look for a faster system :-)
|
||||
The speedup is probably less that 1% but it is still 13
|
||||
instructions less :-).
|
||||
|
||||
Version 2.10 06/10/92
|
||||
The code now works on the 64bit ETA10 and CRAY without modifications or
|
||||
#defines. I believe the code should work on any machine that
|
||||
defines long, int or short to be 8 bytes long.
|
||||
Thanks to Shabbir J. Safdar (shabby@mentor.cc.purdue.edu)
|
||||
for helping me fix the code to run on 64bit machines (he had
|
||||
access to an ETA10).
|
||||
Thanks also to John Fletcher <john_fletcher@lccmail.ocf.llnl.gov>
|
||||
for testing the routines on a CRAY.
|
||||
read_password.c has been renamed to read_passwd.c
|
||||
string_to_key.c has been renamed to string2key.c
|
||||
|
||||
Version 2.00 14/09/92
|
||||
Made mods so that the library should work on 64bit CPU's.
|
||||
Removed all my uchar and ulong defs. To many different
|
||||
versions of unix define them in their header files in too many
|
||||
different combinations :-)
|
||||
IRIX - Sillicon Graphics mods (mostly in read_password.c).
|
||||
Thanks to Andrew Daviel (advax@erich.triumf.ca)
|
||||
|
||||
Version 1.99 26/08/92
|
||||
Fixed a bug or 2 in enc_read.c
|
||||
Fixed a bug in enc_write.c
|
||||
Fixed a pseudo bug in fcrypt.c (very obscure).
|
||||
|
||||
Version 1.98 31/07/92
|
||||
Support for the ETA10. This is a strange machine that defines
|
||||
longs and ints as 8 bytes and shorts as 4 bytes.
|
||||
Since I do evil things with long * that assume that they are 4
|
||||
bytes. Look in the Makefile for the option to compile for
|
||||
this machine. quad_cksum appears to have problems but I
|
||||
will don't have the time to fix it right now, and this is not
|
||||
a function that uses DES and so will not effect the main uses
|
||||
of the library.
|
||||
|
||||
Version 1.97 20/05/92 eay
|
||||
Fixed the Imakefile and made some changes to des.h to fix some
|
||||
problems when building this package with Kerberos v 4.
|
||||
|
||||
Version 1.96 18/05/92 eay
|
||||
Fixed a small bug in string_to_key() where problems could
|
||||
occur if des_check_key was set to true and the string
|
||||
generated a weak key.
|
||||
|
||||
Patch2 posted to comp.sources.misc
|
||||
Version 1.95 13/05/92 eay
|
||||
Added an alternative version of the D_ENCRYPT macro in
|
||||
ecb_encrypt and fcrypt. Depending on the compiler, one version or the
|
||||
other will be faster. This was inspired by
|
||||
Dana How <how@isl.stanford.edu>, and her pointers about doing the
|
||||
*(ulong *)((uchar *)ptr+(value&0xfc))
|
||||
vs
|
||||
ptr[value&0x3f]
|
||||
to stop the C compiler doing a <<2 to convert the long array index.
|
||||
|
||||
Version 1.94 05/05/92 eay
|
||||
Fixed an incompatibility between my string_to_key and the MIT
|
||||
version. When the key is longer than 8 chars, I was wrapping
|
||||
with a different method. To use the old version, define
|
||||
OLD_STR_TO_KEY in the makefile. Thanks to
|
||||
viktor@newsu.shearson.com (Viktor Dukhovni).
|
||||
|
||||
Version 1.93 28/04/92 eay
|
||||
Fixed the VMS mods so that echo is now turned off in
|
||||
read_password. Thanks again to brennan@coco.cchs.su.oz.AU.
|
||||
MSDOS support added. The routines can be compiled with
|
||||
Turbo C (v2.0) and MSC (v5.1). Make sure MSDOS is defined.
|
||||
|
||||
Patch1 posted to comp.sources.misc
|
||||
Version 1.92 13/04/92 eay
|
||||
Changed D_ENCRYPT so that the rotation of R occurs outside of
|
||||
the loop. This required rotating all the longs in sp.h (now
|
||||
called spr.h). Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
|
||||
speed.c has been changed so it will work without SIGALRM. If
|
||||
times(3) is not present it will try to use ftime() instead.
|
||||
|
||||
Version 1.91 08/04/92 eay
|
||||
Added -E/-D options to des(1) so it can use string_to_key.
|
||||
Added SVR4 mods suggested by witr@rwwa.COM
|
||||
Added VMS mods suggested by brennan@coco.cchs.su.oz.AU. If
|
||||
anyone knows how to turn of tty echo in VMS please tell me or
|
||||
implement it yourself :-).
|
||||
Changed FILE *IN/*OUT to *DES_IN/*DES_OUT since it appears VMS
|
||||
does not like IN/OUT being used.
|
||||
|
||||
Libdes posted to comp.sources.misc
|
||||
Version 1.9 24/03/92 eay
|
||||
Now contains a fast small crypt replacement.
|
||||
Added des(1) command.
|
||||
Added des_rw_mode so people can use cbc encryption with
|
||||
enc_read and enc_write.
|
||||
|
||||
Version 1.8 15/10/91 eay
|
||||
Bug in cbc_cksum.
|
||||
Many thanks to Keith Reynolds (keithr@sco.COM) for pointing this
|
||||
one out.
|
||||
|
||||
Version 1.7 24/09/91 eay
|
||||
Fixed set_key :-)
|
||||
set_key is 4 times faster and takes less space.
|
||||
There are a few minor changes that could be made.
|
||||
|
||||
Version 1.6 19/09/1991 eay
|
||||
Finally go IP and FP finished.
|
||||
Now I need to fix set_key.
|
||||
This version is quite a bit faster that 1.51
|
||||
|
||||
Version 1.52 15/06/1991 eay
|
||||
20% speedup in ecb_encrypt by changing the E bit selection
|
||||
to use 2 32bit words. This also required modification of the
|
||||
sp table. There is still a way to speedup the IP and IP-1
|
||||
(hints from outer@sq.com) still working on this one :-(.
|
||||
|
||||
Version 1.51 07/06/1991 eay
|
||||
Faster des_encrypt by loop unrolling
|
||||
Fixed bug in quad_cksum.c (thanks to hughes@logos.ucs.indiana.edu)
|
||||
|
||||
Version 1.50 28/05/1991 eay
|
||||
Optimized the code a bit more for the sparc. I have improved the
|
||||
speed of the inner des_encrypt by speeding up the initial and
|
||||
final permutations.
|
||||
|
||||
Version 1.40 23/10/1990 eay
|
||||
Fixed des_random_key, it did not produce a random key :-(
|
||||
|
||||
Version 1.30 2/10/1990 eay
|
||||
Have made des_quad_cksum the same as MIT's, the full package
|
||||
should be compatible with MIT's
|
||||
Have tested on a DECstation 3100
|
||||
Still need to fix des_set_key (make it faster).
|
||||
Does des_cbc_encrypts at 70.5k/sec on a 3100.
|
||||
|
||||
Version 1.20 18/09/1990 eay
|
||||
Fixed byte order dependencies.
|
||||
Fixed (I hope) all the word alignment problems.
|
||||
Speedup in des_ecb_encrypt.
|
||||
|
||||
Version 1.10 11/09/1990 eay
|
||||
Added des_enc_read and des_enc_write.
|
||||
Still need to fix des_quad_cksum.
|
||||
Still need to document des_enc_read and des_enc_write.
|
||||
|
||||
Version 1.00 27/08/1990 eay
|
72
lib/des/cbc_enc.c
Normal file
72
lib/des/cbc_enc.c
Normal file
@@ -0,0 +1,72 @@
|
||||
/* cbc_enc.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
int des_cbc_encrypt(des_cblock (*input), des_cblock (*output), long int length, struct des_ks_struct *schedule, des_cblock (*ivec), int encrypt)
|
||||
{
|
||||
register u_int32_t tin0,tin1;
|
||||
register u_int32_t tout0,tout1,xor0,xor1;
|
||||
register unsigned char *in,*out;
|
||||
register long l=length;
|
||||
u_int32_t tout[2],tin[2];
|
||||
unsigned char *iv;
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
if (encrypt)
|
||||
{
|
||||
c2l(iv,tout0);
|
||||
c2l(iv,tout1);
|
||||
for (; l>0; l-=8)
|
||||
{
|
||||
if (l >= 8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
}
|
||||
else
|
||||
c2ln(in,tin0,tin1,l);
|
||||
tin0^=tout0;
|
||||
tin1^=tout1;
|
||||
tin[0]=tin0;
|
||||
tin[1]=tin1;
|
||||
des_encrypt(tin,tout,
|
||||
schedule,encrypt);
|
||||
tout0=tout[0];
|
||||
tout1=tout[1];
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
c2l(iv,xor0);
|
||||
c2l(iv,xor1);
|
||||
for (; l>0; l-=8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
tin[0]=tin0;
|
||||
tin[1]=tin1;
|
||||
des_encrypt(tin,tout,
|
||||
schedule,encrypt);
|
||||
tout0=tout[0]^xor0;
|
||||
tout1=tout[1]^xor1;
|
||||
if (l >= 8)
|
||||
{
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
else
|
||||
l2cn(tout0,tout1,out,l);
|
||||
xor0=tin0;
|
||||
xor1=tin1;
|
||||
}
|
||||
}
|
||||
tin0=tin1=tout0=tout1=xor0=xor1=0;
|
||||
tin[0]=tin[1]=tout[0]=tout[1]=0;
|
||||
return(0);
|
||||
}
|
||||
|
99
lib/des/cfb_enc.c
Normal file
99
lib/des/cfb_enc.c
Normal file
@@ -0,0 +1,99 @@
|
||||
/* cfb_enc.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output are loaded in multiples of 8 bits.
|
||||
* What this means is that if you hame numbits=12 and length=2
|
||||
* the first 12 bits will be retrieved from the first byte and half
|
||||
* the second. The second 12 bits will come from the 3rd and half the 4th
|
||||
* byte.
|
||||
*/
|
||||
int des_cfb_encrypt(unsigned char *in, unsigned char *out, int numbits, long int length, struct des_ks_struct *schedule, des_cblock (*ivec), int encrypt)
|
||||
{
|
||||
register u_int32_t d0,d1,v0,v1,n=(numbits+7)/8;
|
||||
register u_int32_t mask0,mask1;
|
||||
register long l=length;
|
||||
register int num=numbits;
|
||||
u_int32_t ti[2],to[2];
|
||||
unsigned char *iv;
|
||||
|
||||
if (num > 64) return(0);
|
||||
if (num > 32)
|
||||
{
|
||||
mask0=0xffffffff;
|
||||
if (num == 64)
|
||||
mask1=mask0;
|
||||
else
|
||||
mask1=(1L<<(num-32))-1;
|
||||
}
|
||||
else
|
||||
{
|
||||
if (num == 32)
|
||||
mask0=0xffffffff;
|
||||
else
|
||||
mask0=(1L<<num)-1;
|
||||
mask1=0x00000000;
|
||||
}
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
if (encrypt)
|
||||
{
|
||||
while (l-- > 0)
|
||||
{
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
des_encrypt(ti,to,
|
||||
schedule,DES_ENCRYPT);
|
||||
c2ln(in,d0,d1,n);
|
||||
in+=n;
|
||||
d0=(d0^to[0])&mask0;
|
||||
d1=(d1^to[1])&mask1;
|
||||
l2cn(d0,d1,out,n);
|
||||
out+=n;
|
||||
if (num > 32)
|
||||
{
|
||||
v0=((v1>>(num-32))|(d0<<(64-num)))&0xffffffff;
|
||||
v1=((d0>>(num-32))|(d1<<(64-num)))&0xffffffff;
|
||||
}
|
||||
else
|
||||
{
|
||||
v0=((v0>>num)|(v1<<(32-num)))&0xffffffff;
|
||||
v1=((v1>>num)|(d0<<(32-num)))&0xffffffff;
|
||||
}
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
while (l-- > 0)
|
||||
{
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
des_encrypt(ti,to,
|
||||
schedule,DES_ENCRYPT);
|
||||
c2ln(in,d0,d1,n);
|
||||
in+=n;
|
||||
if (num > 32)
|
||||
{
|
||||
v0=((v1>>(num-32))|(d0<<(64-num)))&0xffffffff;
|
||||
v1=((d0>>(num-32))|(d1<<(64-num)))&0xffffffff;
|
||||
}
|
||||
else
|
||||
{
|
||||
v0=((v0>>num)|(v1<<(32-num)))&0xffffffff;
|
||||
v1=((v1>>num)|(d0<<(32-num)))&0xffffffff;
|
||||
}
|
||||
d0=(d0^to[0])&mask0;
|
||||
d1=(d1^to[1])&mask1;
|
||||
l2cn(d0,d1,out,n);
|
||||
out+=n;
|
||||
}
|
||||
}
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
v0=v1=d0=d1=ti[0]=ti[1]=to[0]=to[1]=0;
|
||||
return(0);
|
||||
}
|
||||
|
842
lib/des/des.c
Normal file
842
lib/des/des.c
Normal file
@@ -0,0 +1,842 @@
|
||||
/* des.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#ifdef VMS
|
||||
#include <types.h>
|
||||
#include <stat.h>
|
||||
#else
|
||||
#if !defined(_IRIX)
|
||||
#include <sys/types.h>
|
||||
#endif
|
||||
#include <sys/stat.h>
|
||||
#endif
|
||||
#include "des_locl.h"
|
||||
|
||||
void usage(void);
|
||||
void doencryption(void);
|
||||
int uufwrite(char *data, int size, int num, FILE *fp);
|
||||
void uufwriteEnd(FILE *fp);
|
||||
int uufread(char *out,int size,int num,FILE *fp);
|
||||
int uuencode(unsigned char *in,int num,unsigned char *out);
|
||||
int uudecode(unsigned char *in,int num,unsigned char *out);
|
||||
|
||||
#ifdef VMS
|
||||
#define EXIT(a) exit(a&0x10000000)
|
||||
#else
|
||||
#define EXIT(a) exit(a)
|
||||
#endif
|
||||
|
||||
#define BUFSIZE (8*1024)
|
||||
#define VERIFY 1
|
||||
#define KEYSIZ 8
|
||||
#define KEYSIZB 1024 /* should hit tty line limit first :-) */
|
||||
char key[KEYSIZB+1];
|
||||
int do_encrypt,longk=0;
|
||||
char *in=NULL,*out=NULL;
|
||||
FILE *DES_IN,*DES_OUT,*CKSUM_OUT;
|
||||
char uuname[200];
|
||||
char uubuf[50];
|
||||
int uubufnum;
|
||||
#define INUUBUFN (45*100)
|
||||
#define OUTUUBUF (65*100)
|
||||
char b[OUTUUBUF];
|
||||
char bb[300];
|
||||
des_cblock cksum={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};
|
||||
char cksumname[200]="";
|
||||
|
||||
int cflag,eflag,dflag,kflag,bflag,fflag,sflag,uflag,flag3,hflag,error;
|
||||
|
||||
void
|
||||
main(int argc, char **argv)
|
||||
{
|
||||
int i;
|
||||
struct stat ins,outs;
|
||||
char *p;
|
||||
|
||||
cflag=eflag=dflag=kflag=hflag=bflag=fflag=sflag=uflag=flag3=0,error=0;
|
||||
memset(key,0,sizeof(key));
|
||||
|
||||
for (i=1; i<argc; i++)
|
||||
{
|
||||
p=argv[i];
|
||||
if ((p[0] == '-') && (p[1] != '\0'))
|
||||
{
|
||||
p++;
|
||||
while (*p)
|
||||
{
|
||||
switch (*(p++))
|
||||
{
|
||||
case '3':
|
||||
flag3=1;
|
||||
/* bflag=0; */
|
||||
longk=1;
|
||||
break;
|
||||
case 'c':
|
||||
cflag=1;
|
||||
strncpy(cksumname,p,200);
|
||||
p+=strlen(cksumname);
|
||||
break;
|
||||
case 'C':
|
||||
cflag=1;
|
||||
longk=1;
|
||||
strncpy(cksumname,p,200);
|
||||
p+=strlen(cksumname);
|
||||
break;
|
||||
case 'e':
|
||||
eflag=1;
|
||||
break;
|
||||
case 'E':
|
||||
eflag=1;
|
||||
longk=1;
|
||||
break;
|
||||
case 'd':
|
||||
dflag=1;
|
||||
break;
|
||||
case 'D':
|
||||
dflag=1;
|
||||
longk=1;
|
||||
break;
|
||||
case 'b':
|
||||
bflag=1;
|
||||
flag3=0;
|
||||
break;
|
||||
case 'f':
|
||||
fflag=1;
|
||||
break;
|
||||
case 's':
|
||||
sflag=1;
|
||||
break;
|
||||
case 'u':
|
||||
uflag=1;
|
||||
strncpy(uuname,p,200);
|
||||
p+=strlen(uuname);
|
||||
break;
|
||||
case 'h':
|
||||
hflag=1;
|
||||
break;
|
||||
case 'k':
|
||||
kflag=1;
|
||||
if ((i+1) == argc)
|
||||
{
|
||||
fputs("must have a key with the -k option\n",stderr);
|
||||
error=1;
|
||||
}
|
||||
else
|
||||
{
|
||||
int j;
|
||||
|
||||
i++;
|
||||
strncpy(key,argv[i],KEYSIZB);
|
||||
for (j=strlen(argv[i])-1; j>=0; j--)
|
||||
argv[i][j]='\0';
|
||||
}
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr,"'%c' unknown flag\n",p[-1]);
|
||||
error=1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
if (in == NULL)
|
||||
in=argv[i];
|
||||
else if (out == NULL)
|
||||
out=argv[i];
|
||||
else
|
||||
error=1;
|
||||
}
|
||||
}
|
||||
if (error) usage();
|
||||
/* We either
|
||||
* do checksum or
|
||||
* do encrypt or
|
||||
* do decrypt or
|
||||
* do decrypt then ckecksum or
|
||||
* do checksum then encrypt
|
||||
*/
|
||||
if (((eflag+dflag) == 1) || cflag)
|
||||
{
|
||||
if (eflag) do_encrypt=DES_ENCRYPT;
|
||||
if (dflag) do_encrypt=DES_DECRYPT;
|
||||
}
|
||||
else
|
||||
usage();
|
||||
|
||||
if ( (in != NULL) &&
|
||||
(out != NULL) &&
|
||||
#ifndef MSDOS
|
||||
(stat(in,&ins) != -1) &&
|
||||
(stat(out,&outs) != -1) &&
|
||||
(ins.st_dev == outs.st_dev) &&
|
||||
(ins.st_ino == outs.st_ino))
|
||||
#else /* MSDOS */
|
||||
(strcmp(in,out) == 0))
|
||||
#endif
|
||||
{
|
||||
fputs("input and output file are the same\n",stderr);
|
||||
EXIT(3);
|
||||
}
|
||||
|
||||
if (!kflag)
|
||||
if (des_read_pw_string(key,KEYSIZB+1,"Enter key:",eflag?VERIFY:0))
|
||||
{
|
||||
fputs("password error\n",stderr);
|
||||
EXIT(2);
|
||||
}
|
||||
|
||||
if (in == NULL)
|
||||
DES_IN=stdin;
|
||||
else if ((DES_IN=fopen(in,"r")) == NULL)
|
||||
{
|
||||
perror("opening input file");
|
||||
EXIT(4);
|
||||
}
|
||||
|
||||
CKSUM_OUT=stdout;
|
||||
if (out == NULL)
|
||||
{
|
||||
DES_OUT=stdout;
|
||||
CKSUM_OUT=stderr;
|
||||
}
|
||||
else if ((DES_OUT=fopen(out,"w")) == NULL)
|
||||
{
|
||||
perror("opening output file");
|
||||
EXIT(5);
|
||||
}
|
||||
|
||||
#ifdef MSDOS
|
||||
/* This should set the file to binary mode. */
|
||||
{
|
||||
#include <fcntl.h>
|
||||
if (!(uflag && dflag))
|
||||
setmode(fileno(DES_IN),O_BINARY);
|
||||
if (!(uflag && eflag))
|
||||
setmode(fileno(DES_OUT),O_BINARY);
|
||||
}
|
||||
#endif
|
||||
|
||||
doencryption();
|
||||
fclose(DES_IN);
|
||||
fclose(DES_OUT);
|
||||
EXIT(0);
|
||||
}
|
||||
|
||||
void
|
||||
usage(void)
|
||||
{
|
||||
char **u;
|
||||
static char *usage[]={
|
||||
"des <options> [input-file [output-file]]",
|
||||
"options:",
|
||||
"-e : encrypt using sunOS compatible user key to DES key conversion.",
|
||||
"-E : encrypt ",
|
||||
"-d : decrypt using sunOS compatible user key to DES key conversion.",
|
||||
"-D : decrypt ",
|
||||
"-c[ckname] : generate a cbc_cksum using sunOS compatible user key to",
|
||||
" DES key conversion and output to ckname (stdout default,",
|
||||
" stderr if data being output on stdout). The checksum is",
|
||||
" generated before encryption and after decryption if used",
|
||||
" in conjunction with -[eEdD].",
|
||||
"-C[ckname] : generate a cbc_cksum as for -c but compatible with -[ED].",
|
||||
"-k key : use key 'key'",
|
||||
"-h : the key that is entered will be a hexidecimal number",
|
||||
"-u[uuname] : input file is uudecoded if -[dD] or output uuencoded",
|
||||
" data if -[eE] (uuname is the filename to put in the",
|
||||
" uuencode header).",
|
||||
"-b : encrypt using DES in ecb encryption mode, the defaut is",
|
||||
" cbc mode.",
|
||||
"-3 : encrypt using tripple DES encryption. This uses 2 keys",
|
||||
" generated from the input key. If the input key is less",
|
||||
" than 8 characters long, this is equivelent to normal",
|
||||
" encryption. Default is tripple cbc, -b makes it tripple ecb.",
|
||||
NULL
|
||||
};
|
||||
for (u=usage; *u; u++)
|
||||
{
|
||||
fputs(*u,stderr);
|
||||
fputc('\n',stderr);
|
||||
}
|
||||
|
||||
EXIT(1);
|
||||
}
|
||||
|
||||
void
|
||||
doencryption(void)
|
||||
{
|
||||
register int i;
|
||||
des_key_schedule ks,ks2;
|
||||
unsigned char iv[8],iv2[8],iv3[8];
|
||||
char *p;
|
||||
int num=0,j,k,l,rem,ll,len,last,ex=0;
|
||||
des_cblock kk,k2;
|
||||
FILE *O;
|
||||
int Exit=0;
|
||||
#ifndef MSDOS
|
||||
static unsigned char buf[BUFSIZE+8],obuf[BUFSIZE+8];
|
||||
#else
|
||||
static unsigned char *buf=NULL,*obuf=NULL;
|
||||
|
||||
if (buf == NULL)
|
||||
{
|
||||
if ( (( buf=(unsigned char *)malloc(BUFSIZE+8)) == NULL) ||
|
||||
((obuf=(unsigned char *)malloc(BUFSIZE+8)) == NULL))
|
||||
{
|
||||
fputs("Not enough memory\n",stderr);
|
||||
Exit=10;
|
||||
goto problems;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
if (hflag)
|
||||
{
|
||||
j=(flag3?16:8);
|
||||
p=key;
|
||||
for (i=0; i<j; i++)
|
||||
{
|
||||
k=0;
|
||||
if ((*p <= '9') && (*p >= '0'))
|
||||
k=(*p-'0')<<4;
|
||||
else if ((*p <= 'f') && (*p >= 'a'))
|
||||
k=(*p-'a'+10)<<4;
|
||||
else if ((*p <= 'F') && (*p >= 'A'))
|
||||
k=(*p-'A'+10)<<4;
|
||||
else
|
||||
{
|
||||
fputs("Bad hex key\n",stderr);
|
||||
Exit=9;
|
||||
goto problems;
|
||||
}
|
||||
p++;
|
||||
if ((*p <= '9') && (*p >= '0'))
|
||||
k|=(*p-'0');
|
||||
else if ((*p <= 'f') && (*p >= 'a'))
|
||||
k|=(*p-'a'+10);
|
||||
else if ((*p <= 'F') && (*p >= 'A'))
|
||||
k|=(*p-'A'+10);
|
||||
else
|
||||
{
|
||||
fputs("Bad hex key\n",stderr);
|
||||
Exit=9;
|
||||
goto problems;
|
||||
}
|
||||
p++;
|
||||
if (i < 8)
|
||||
kk[i]=k;
|
||||
else
|
||||
k2[i-8]=k;
|
||||
}
|
||||
des_set_key((des_cblock *)k2,ks2);
|
||||
memset(k2,0,sizeof(k2));
|
||||
}
|
||||
else if (longk || flag3)
|
||||
{
|
||||
if (flag3)
|
||||
{
|
||||
des_string_to_2keys(key,(des_cblock *)kk,(des_cblock *)k2);
|
||||
des_set_key((des_cblock *)k2,ks2);
|
||||
memset(k2,0,sizeof(k2));
|
||||
}
|
||||
else
|
||||
des_string_to_key(key,(des_cblock *)kk);
|
||||
}
|
||||
else
|
||||
for (i=0; i<KEYSIZ; i++)
|
||||
{
|
||||
l=0;
|
||||
k=key[i];
|
||||
for (j=0; j<8; j++)
|
||||
{
|
||||
if (k&1) l++;
|
||||
k>>=1;
|
||||
}
|
||||
if (l & 1)
|
||||
kk[i]=key[i]&0x7f;
|
||||
else
|
||||
kk[i]=key[i]|0x80;
|
||||
}
|
||||
|
||||
des_set_key((des_cblock *)kk,ks);
|
||||
memset(key,0,sizeof(key));
|
||||
memset(kk,0,sizeof(kk));
|
||||
/* woops - A bug that does not showup under unix :-( */
|
||||
memset(iv,0,sizeof(iv));
|
||||
memset(iv2,0,sizeof(iv2));
|
||||
memset(iv3,0,sizeof(iv3));
|
||||
|
||||
l=1;
|
||||
rem=0;
|
||||
/* first read */
|
||||
if (eflag || (!dflag && cflag))
|
||||
{
|
||||
for (;;)
|
||||
{
|
||||
num=l=fread(&(buf[rem]),1,BUFSIZE,DES_IN);
|
||||
l+=rem;
|
||||
num+=rem;
|
||||
if (l < 0)
|
||||
{
|
||||
perror("read error");
|
||||
Exit=6;
|
||||
goto problems;
|
||||
}
|
||||
|
||||
rem=l%8;
|
||||
len=l-rem;
|
||||
if (feof(DES_IN))
|
||||
{
|
||||
srandom(time(NULL));
|
||||
for (i=7-rem; i>0; i--)
|
||||
buf[l++]=random()&0xff;
|
||||
buf[l++]=rem;
|
||||
ex=1;
|
||||
len+=rem;
|
||||
}
|
||||
else
|
||||
l-=rem;
|
||||
|
||||
if (cflag)
|
||||
{
|
||||
des_cbc_cksum((des_cblock *)buf,(des_cblock *)cksum,
|
||||
(long)len,ks,(des_cblock *)cksum);
|
||||
if (!eflag)
|
||||
{
|
||||
if (feof(DES_IN)) break;
|
||||
else continue;
|
||||
}
|
||||
}
|
||||
|
||||
if (bflag && !flag3)
|
||||
for (i=0; i<l; i+=8)
|
||||
des_ecb_encrypt(
|
||||
(des_cblock *)&(buf[i]),
|
||||
(des_cblock *)&(obuf[i]),
|
||||
ks,do_encrypt);
|
||||
else if (flag3 && bflag)
|
||||
for (i=0; i<l; i+=8)
|
||||
des_3ecb_encrypt(
|
||||
(des_cblock *)&(buf[i]),
|
||||
(des_cblock *)&(obuf[i]),
|
||||
ks,ks2,do_encrypt);
|
||||
else if (flag3 && !bflag)
|
||||
{
|
||||
char tmpbuf[8];
|
||||
|
||||
if (rem) memcpy(tmpbuf,&(buf[l]),rem);
|
||||
des_3cbc_encrypt(
|
||||
(des_cblock *)buf,(des_cblock *)obuf,
|
||||
(long)l,ks,ks2,(des_cblock *)iv,
|
||||
(des_cblock *)iv2,do_encrypt);
|
||||
if (rem) memcpy(&(buf[l]),tmpbuf,rem);
|
||||
}
|
||||
else
|
||||
{
|
||||
des_cbc_encrypt(
|
||||
(des_cblock *)buf,(des_cblock *)obuf,
|
||||
(long)l,ks,(des_cblock *)iv,do_encrypt);
|
||||
if (l >= 8) memcpy(iv,&(obuf[l-8]),8);
|
||||
}
|
||||
if (rem) memcpy(buf,&(buf[l]),rem);
|
||||
|
||||
i=0;
|
||||
while (i < l)
|
||||
{
|
||||
if (uflag)
|
||||
j=uufwrite(obuf,1,l-i,DES_OUT);
|
||||
else
|
||||
j=fwrite(obuf,1,l-i,DES_OUT);
|
||||
if (j == -1)
|
||||
{
|
||||
perror("Write error");
|
||||
Exit=7;
|
||||
goto problems;
|
||||
}
|
||||
i+=j;
|
||||
}
|
||||
if (feof(DES_IN))
|
||||
{
|
||||
if (uflag) uufwriteEnd(DES_OUT);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
else /* decrypt */
|
||||
{
|
||||
ex=1;
|
||||
for (;;)
|
||||
{
|
||||
if (ex) {
|
||||
if (uflag)
|
||||
l=uufread(buf,1,BUFSIZE,DES_IN);
|
||||
else
|
||||
l=fread(buf,1,BUFSIZE,DES_IN);
|
||||
ex=0;
|
||||
rem=l%8;
|
||||
l-=rem;
|
||||
}
|
||||
if (l < 0)
|
||||
{
|
||||
perror("read error");
|
||||
Exit=6;
|
||||
goto problems;
|
||||
}
|
||||
|
||||
if (bflag && !flag3)
|
||||
for (i=0; i<l; i+=8)
|
||||
des_ecb_encrypt(
|
||||
(des_cblock *)&(buf[i]),
|
||||
(des_cblock *)&(obuf[i]),
|
||||
ks,do_encrypt);
|
||||
else if (flag3 && bflag)
|
||||
for (i=0; i<l; i+=8)
|
||||
des_3ecb_encrypt(
|
||||
(des_cblock *)&(buf[i]),
|
||||
(des_cblock *)&(obuf[i]),
|
||||
ks,ks2,do_encrypt);
|
||||
else if (flag3 && !bflag)
|
||||
{
|
||||
des_3cbc_encrypt(
|
||||
(des_cblock *)buf,(des_cblock *)obuf,
|
||||
(long)l,ks,ks2,(des_cblock *)iv,
|
||||
(des_cblock *)iv2,do_encrypt);
|
||||
}
|
||||
else
|
||||
{
|
||||
des_cbc_encrypt(
|
||||
(des_cblock *)buf,(des_cblock *)obuf,
|
||||
(long)l,ks,(des_cblock *)iv,do_encrypt);
|
||||
if (l >= 8) memcpy(iv,&(buf[l-8]),8);
|
||||
}
|
||||
|
||||
if (uflag)
|
||||
ll=uufread(&(buf[rem]),1,BUFSIZE,DES_IN);
|
||||
else
|
||||
ll=fread(&(buf[rem]),1,BUFSIZE,DES_IN);
|
||||
ll+=rem;
|
||||
rem=ll%8;
|
||||
ll-=rem;
|
||||
if (feof(DES_IN) && (ll == 0))
|
||||
{
|
||||
last=obuf[l-1];
|
||||
|
||||
if ((last > 7) || (last < 0))
|
||||
{
|
||||
fputs("The file was not decrypted correctly.\n",
|
||||
stderr);
|
||||
/*Exit=8;
|
||||
goto problems;*/
|
||||
last=0;
|
||||
}
|
||||
l=l-8+last;
|
||||
}
|
||||
i=0;
|
||||
if (cflag) des_cbc_cksum((des_cblock *)obuf,
|
||||
(des_cblock *)cksum,(long)l/8*8,ks,
|
||||
(des_cblock *)cksum);
|
||||
while (i != l)
|
||||
{
|
||||
j=fwrite(obuf,1,l-i,DES_OUT);
|
||||
if (j == -1)
|
||||
{
|
||||
perror("Write error");
|
||||
Exit=7;
|
||||
goto problems;
|
||||
}
|
||||
i+=j;
|
||||
}
|
||||
l=ll;
|
||||
if ((l == 0) && feof(DES_IN)) break;
|
||||
}
|
||||
}
|
||||
if (cflag)
|
||||
{
|
||||
l=0;
|
||||
if (cksumname[0] != '\0')
|
||||
{
|
||||
if ((O=fopen(cksumname,"w")) != NULL)
|
||||
{
|
||||
CKSUM_OUT=O;
|
||||
l=1;
|
||||
}
|
||||
}
|
||||
for (i=0; i<8; i++)
|
||||
fprintf(CKSUM_OUT,"%02X",cksum[i]);
|
||||
fprintf(CKSUM_OUT,"\n");
|
||||
if (l) fclose(CKSUM_OUT);
|
||||
}
|
||||
problems:
|
||||
memset(buf,0,sizeof(buf));
|
||||
memset(obuf,0,sizeof(obuf));
|
||||
memset(ks,0,sizeof(ks));
|
||||
memset(ks2,0,sizeof(ks2));
|
||||
memset(iv,0,sizeof(iv));
|
||||
memset(iv2,0,sizeof(iv2));
|
||||
memset(iv3,0,sizeof(iv3));
|
||||
memset(kk,0,sizeof(kk));
|
||||
memset(k2,0,sizeof(k2));
|
||||
memset(uubuf,0,sizeof(uubuf));
|
||||
memset(b,0,sizeof(b));
|
||||
memset(bb,0,sizeof(bb));
|
||||
memset(cksum,0,sizeof(cksum));
|
||||
if (Exit) EXIT(Exit);
|
||||
}
|
||||
|
||||
int uufwrite(char *data, int size, int num, FILE *fp)
|
||||
|
||||
/* We ignore this parameter but it should be > ~50 I believe */
|
||||
|
||||
|
||||
{
|
||||
int i,j,left,rem,ret=num;
|
||||
static int start=1;
|
||||
|
||||
if (start)
|
||||
{
|
||||
fprintf(fp,"begin 600 %s\n",
|
||||
(uuname[0] == '\0')?"text.d":uuname);
|
||||
start=0;
|
||||
}
|
||||
|
||||
if (uubufnum)
|
||||
{
|
||||
if (uubufnum+num < 45)
|
||||
{
|
||||
memcpy(&(uubuf[uubufnum]),data,num);
|
||||
uubufnum+=num;
|
||||
return(num);
|
||||
}
|
||||
else
|
||||
{
|
||||
i=45-uubufnum;
|
||||
memcpy(&(uubuf[uubufnum]),data,i);
|
||||
j=uuencode(uubuf,45,b);
|
||||
fwrite(b,1,j,fp);
|
||||
uubufnum=0;
|
||||
data+=i;
|
||||
num-=i;
|
||||
}
|
||||
}
|
||||
|
||||
for (i=0; i<(num-INUUBUFN); i+=INUUBUFN)
|
||||
{
|
||||
j=uuencode(&(data[i]),INUUBUFN,b);
|
||||
fwrite(b,1,j,fp);
|
||||
}
|
||||
rem=(num-i)%45;
|
||||
left=(num-i-rem);
|
||||
if (left)
|
||||
{
|
||||
j=uuencode(&(data[i]),left,b);
|
||||
fwrite(b,1,j,fp);
|
||||
i+=left;
|
||||
}
|
||||
if (i != num)
|
||||
{
|
||||
memcpy(uubuf,&(data[i]),rem);
|
||||
uubufnum=rem;
|
||||
}
|
||||
return(ret);
|
||||
}
|
||||
|
||||
void
|
||||
uufwriteEnd(FILE *fp)
|
||||
{
|
||||
int j;
|
||||
static char *end=" \nend\n";
|
||||
|
||||
if (uubufnum != 0)
|
||||
{
|
||||
uubuf[uubufnum]='\0';
|
||||
uubuf[uubufnum+1]='\0';
|
||||
uubuf[uubufnum+2]='\0';
|
||||
j=uuencode(uubuf,uubufnum,b);
|
||||
fwrite(b,1,j,fp);
|
||||
}
|
||||
fwrite(end,1,strlen(end),fp);
|
||||
}
|
||||
|
||||
int uufread(char *out, int size, int num, FILE *fp)
|
||||
|
||||
/* should always be > ~ 60; I actually ignore this parameter :-) */
|
||||
|
||||
|
||||
{
|
||||
int i,j,tot;
|
||||
static int done=0;
|
||||
static int valid=0;
|
||||
static int start=1;
|
||||
|
||||
if (start)
|
||||
{
|
||||
for (;;)
|
||||
{
|
||||
b[0]='\0';
|
||||
fgets(b,300,fp);
|
||||
if (b[0] == '\0')
|
||||
{
|
||||
fprintf(stderr,"no 'begin' found in uuencoded input\n");
|
||||
return(-1);
|
||||
}
|
||||
if (strncmp(b,"begin ",6) == 0) break;
|
||||
}
|
||||
start=0;
|
||||
}
|
||||
if (done) return(0);
|
||||
tot=0;
|
||||
if (valid)
|
||||
{
|
||||
memcpy(out,bb,valid);
|
||||
tot=valid;
|
||||
valid=0;
|
||||
}
|
||||
for (;;)
|
||||
{
|
||||
b[0]='\0';
|
||||
fgets(b,300,fp);
|
||||
if (b[0] == '\0') break;
|
||||
i=strlen(b);
|
||||
if ((b[0] == 'e') && (b[1] == 'n') && (b[2] == 'd'))
|
||||
{
|
||||
done=1;
|
||||
while (!feof(fp))
|
||||
{
|
||||
fgets(b,300,fp);
|
||||
}
|
||||
break;
|
||||
}
|
||||
i=uudecode(b,i,bb);
|
||||
if (i < 0) break;
|
||||
if ((i+tot+8) > num)
|
||||
{
|
||||
/* num to copy to make it a multiple of 8 */
|
||||
j=(num/8*8)-tot-8;
|
||||
memcpy(&(out[tot]),bb,j);
|
||||
tot+=j;
|
||||
memcpy(bb,&(bb[j]),i-j);
|
||||
valid=i-j;
|
||||
break;
|
||||
}
|
||||
memcpy(&(out[tot]),bb,i);
|
||||
tot+=i;
|
||||
}
|
||||
return(tot);
|
||||
}
|
||||
|
||||
#define ccc2l(c,l) (l =((u_int32_t)(*((c)++)))<<16, \
|
||||
l|=((u_int32_t)(*((c)++)))<< 8, \
|
||||
l|=((u_int32_t)(*((c)++))))
|
||||
|
||||
#define l2ccc(l,c) (*((c)++)=(unsigned char)(((l)>>16)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l) )&0xff))
|
||||
|
||||
|
||||
int uuencode(unsigned char *in, int num, unsigned char *out)
|
||||
{
|
||||
int j,i,n,tot=0;
|
||||
u_int32_t l;
|
||||
register unsigned char *p;
|
||||
p=out;
|
||||
|
||||
for (j=0; j<num; j+=45)
|
||||
{
|
||||
if (j+45 > num)
|
||||
i=(num-j);
|
||||
else i=45;
|
||||
*(p++)=i+' ';
|
||||
for (n=0; n<i; n+=3)
|
||||
{
|
||||
ccc2l(in,l);
|
||||
*(p++)=((l>>18)&0x3f)+' ';
|
||||
*(p++)=((l>>12)&0x3f)+' ';
|
||||
*(p++)=((l>> 6)&0x3f)+' ';
|
||||
*(p++)=((l )&0x3f)+' ';
|
||||
tot+=4;
|
||||
}
|
||||
*(p++)='\n';
|
||||
tot+=2;
|
||||
}
|
||||
*p='\0';
|
||||
l=0;
|
||||
return(tot);
|
||||
}
|
||||
|
||||
int uudecode(unsigned char *in, int num, unsigned char *out)
|
||||
{
|
||||
int j,i,k;
|
||||
unsigned int n,space=0;
|
||||
u_int32_t l;
|
||||
u_int32_t w,x,y,z;
|
||||
unsigned int blank='\n'-' ';
|
||||
|
||||
for (j=0; j<num; )
|
||||
{
|
||||
n= *(in++)-' ';
|
||||
if (n == blank)
|
||||
{
|
||||
n=0;
|
||||
in--;
|
||||
}
|
||||
if (n > 60)
|
||||
{
|
||||
fprintf(stderr,"uuencoded line length too long\n");
|
||||
return(-1);
|
||||
}
|
||||
j++;
|
||||
|
||||
for (i=0; i<n; j+=4,i+=3)
|
||||
{
|
||||
/* the following is for cases where spaces are
|
||||
* removed from lines.
|
||||
*/
|
||||
if (space)
|
||||
{
|
||||
w=x=y=z=0;
|
||||
}
|
||||
else
|
||||
{
|
||||
w= *(in++)-' ';
|
||||
x= *(in++)-' ';
|
||||
y= *(in++)-' ';
|
||||
z= *(in++)-' ';
|
||||
}
|
||||
if ((w > 63) || (x > 63) || (y > 63) || (z > 63))
|
||||
{
|
||||
k=0;
|
||||
if (w == blank) k=1;
|
||||
if (x == blank) k=2;
|
||||
if (y == blank) k=3;
|
||||
if (z == blank) k=4;
|
||||
space=1;
|
||||
switch (k) {
|
||||
case 1: w=0; in--;
|
||||
case 2: x=0; in--;
|
||||
case 3: y=0; in--;
|
||||
case 4: z=0; in--;
|
||||
break;
|
||||
case 0:
|
||||
space=0;
|
||||
fprintf(stderr,"bad uuencoded data values\n");
|
||||
w=x=y=z=0;
|
||||
return(-1);
|
||||
break;
|
||||
}
|
||||
}
|
||||
l=(w<<18)|(x<<12)|(y<< 6)|(z );
|
||||
l2ccc(l,out);
|
||||
}
|
||||
if (*(in++) != '\n')
|
||||
{
|
||||
fprintf(stderr,"missing nl in uuencoded line\n");
|
||||
w=x=y=z=0;
|
||||
return(-1);
|
||||
}
|
||||
j++;
|
||||
}
|
||||
*out='\0';
|
||||
w=x=y=z=0;
|
||||
return(n);
|
||||
}
|
187
lib/des/des.man
Normal file
187
lib/des/des.man
Normal file
@@ -0,0 +1,187 @@
|
||||
.TH DES 1
|
||||
.SH NAME
|
||||
des - encrypt or decrypt data using Data Encryption Standard
|
||||
.SH SYNOPSIS
|
||||
.B des
|
||||
(
|
||||
.B \-e
|
||||
|
|
||||
.B \-E
|
||||
) | (
|
||||
.B \-d
|
||||
|
|
||||
.B \-D
|
||||
) | (
|
||||
.B \-\fR[\fPcC\fR][\fPckname\fR]\fP
|
||||
) |
|
||||
[
|
||||
.B \-b3hfs
|
||||
] [
|
||||
.B \-k
|
||||
.I key
|
||||
]
|
||||
] [
|
||||
.B \-u\fR[\fIuuname\fR]
|
||||
[
|
||||
.I input-file
|
||||
[
|
||||
.I output-file
|
||||
] ]
|
||||
.SH DESCRIPTION
|
||||
.B des
|
||||
encrypts and decrypts data using the
|
||||
Data Encryption Standard algorithm.
|
||||
One of
|
||||
.B \-e, \-E
|
||||
(for encrypt) or
|
||||
.B \-d, \-D
|
||||
(for decrypt) must be specified.
|
||||
It is also possible to use
|
||||
.B \-c
|
||||
or
|
||||
.B \-C
|
||||
in conjunction or instead of the a encrypt/decrypt option to generate
|
||||
a 16 character hexadecimal checksum, generated via the
|
||||
.I des_cbc_cksum.
|
||||
.LP
|
||||
Two standard encryption modes are supported by the
|
||||
.B des
|
||||
program, Cipher Block Chaining (the default) and Electronic Code Book
|
||||
(specified with
|
||||
.B \-b
|
||||
).
|
||||
.LP
|
||||
The key used for the DES
|
||||
algorithm is obtained by prompting the user unless the
|
||||
.B `\-k
|
||||
.I key'
|
||||
option is given.
|
||||
If the key is an argument to the
|
||||
.B des
|
||||
command, it is potentially visible to users executing
|
||||
.BR ps (1)
|
||||
or a derivative. To minimise this possibility,
|
||||
.B des
|
||||
takes care to destroy the key argument immediately upon entry.
|
||||
If your shell keeps a history file be careful to make sure it is not
|
||||
world readable.
|
||||
.LP
|
||||
Since this program attempts to maintain compatability with sunOS's
|
||||
des(1) command, there are 2 different methods used to convert the user
|
||||
supplied key to a des key.
|
||||
Whenever and one or more of
|
||||
.B \-E, \-D, \-C
|
||||
or
|
||||
.B \-3
|
||||
options are used, the key conversion procedure will not be compatible
|
||||
with the sunOS des(1) version but will use all the user supplied
|
||||
character to generate the des key.
|
||||
.B des
|
||||
command reads from standard input unless
|
||||
.I input-file
|
||||
is specified and writes to standard output unless
|
||||
.I output-file
|
||||
is given.
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
.B \-b
|
||||
Select ECB
|
||||
(eight bytes at a time) encryption mode.
|
||||
.TP
|
||||
.B \-3
|
||||
Encrypt using triple encryption.
|
||||
By default triple cbc encryption is used but if the
|
||||
.B \-b
|
||||
option is used then triple ecb encryption is performed.
|
||||
If the key is less than 8 characters long, the flag has no effect.
|
||||
.TP
|
||||
.B \-e
|
||||
Encrypt data using an 8 byte key in a manner compatible with sunOS
|
||||
des(1).
|
||||
.TP
|
||||
.B \-E
|
||||
Encrypt data using a key of nearly unlimited length (1024 bytes).
|
||||
This will product a more secure encryption.
|
||||
.TP
|
||||
.B \-d
|
||||
Decrypt data that was encrypted with the \-e option.
|
||||
.TP
|
||||
.B \-D
|
||||
Decrypt data that was encrypted with the \-E option.
|
||||
.TP
|
||||
.B \-c
|
||||
Generate a 16 character hexadecimal cbc checksum and output this to
|
||||
stderr.
|
||||
If a filename was specified after the
|
||||
.B \-c
|
||||
option, the checksum is output to that file.
|
||||
The checksum is generated using a key generated in a sunOS compatible
|
||||
manner.
|
||||
.TP
|
||||
.B \-C
|
||||
A cbc checksum is generated in the same manner as described for the
|
||||
.B \-c
|
||||
option but the DES key is generated in the same manner as used for the
|
||||
.B \-E
|
||||
and
|
||||
.B \-D
|
||||
options
|
||||
.TP
|
||||
.B \-f
|
||||
Does nothing - allowed for compatibility with sunOS des(1) command.
|
||||
.TP
|
||||
.B \-s
|
||||
Does nothing - allowed for compatibility with sunOS des(1) command.
|
||||
.TP
|
||||
.B "\-k \fIkey\fP"
|
||||
Use the encryption
|
||||
.I key
|
||||
specified.
|
||||
.TP
|
||||
.B "\-h"
|
||||
The
|
||||
.I key
|
||||
is assumed to be a 16 character hexadecimal number.
|
||||
If the
|
||||
.B "\-3"
|
||||
option is used the key is assumed to be a 32 character hexadecimal
|
||||
number.
|
||||
.TP
|
||||
.B \-u
|
||||
This flag is used to read and write uuencoded files. If decrypting,
|
||||
the input file is assumed to contain uuencoded, DES encrypted data.
|
||||
If encrypting, the characters following the -u are used as the name of
|
||||
the uuencoded file to embed in the begin line of the uuencoded
|
||||
output. If there is no name specified after the -u, the name text.des
|
||||
will be embedded in the header.
|
||||
.SH SEE ALSO
|
||||
.B ps (1)
|
||||
.B des_crypt(3)
|
||||
.SH BUGS
|
||||
.LP
|
||||
The problem with using the
|
||||
.B -e
|
||||
option is the short key length.
|
||||
It would be better to use a real 56-bit key rather than an
|
||||
ASCII-based 56-bit pattern. Knowing that the key was derived from ASCII
|
||||
radically reduces the time necessary for a brute-force cryptographic attack.
|
||||
My attempt to remove this problem is to add an alternative text-key to
|
||||
DES-key function. This alternative function (accessed via
|
||||
.B -E, -D, -S
|
||||
and
|
||||
.B -3
|
||||
)
|
||||
uses DES to help generate the key.
|
||||
.LP
|
||||
Be carefully when using the -u option. Doing des -ud <filename> will
|
||||
not decrypt filename (the -u option will gobble the d option).
|
||||
.LP
|
||||
The VMS operating system operates in a world where files are always a
|
||||
multiple of 512 bytes. This causes problems when encrypted data is
|
||||
send from unix to VMS since a 88 byte file will suddenly be padded
|
||||
with 424 null bytes. To get around this problem, use the -u option
|
||||
to uuencode the data before it is send to the VMS system.
|
||||
.SH AUTHOR
|
||||
.LP
|
||||
Eric Young (eay@psych.psy.uq.oz.au), Psychology Department,
|
||||
University of Queensland, Australia.
|
536
lib/des/des.pl
Normal file
536
lib/des/des.pl
Normal file
@@ -0,0 +1,536 @@
|
||||
#!/usr/local/bin/perl
|
||||
# Copyright (C) 1993 Eric Young
|
||||
# des.pl - eric young 22/11/1991 eay@psych.psy.uq.oz.au
|
||||
# eay - 92/08/31 - I think I have fixed all problems for 64bit
|
||||
# versions of perl but I could be wrong since I have not tested it yet :-).
|
||||
#
|
||||
# This is an implementation of DES in perl.
|
||||
# The two routines (des_set_key and des_ecb_encrypt)
|
||||
# take 8 byte objects as arguments.
|
||||
#
|
||||
# des_set_key takes an 8 byte string as a key and returns a key schedule
|
||||
# for use in calls to des_ecb_encrypt.
|
||||
# des_ecb_encrypt takes three arguments, the first is a key schedule
|
||||
# (make sure to pass it by reference with the *), the second is 1
|
||||
# to encrypt, 0 to decrypt. The third argument is an 8 byte object
|
||||
# to encrypt. The function returns an 8 byte object that has been
|
||||
# DES encrypted.
|
||||
#
|
||||
# example:
|
||||
# require 'des.pl'
|
||||
#
|
||||
# $key =pack("C8",0x12,0x23,0x45,0x67,0x89,0xab,0xcd,0xef);
|
||||
# @ks= &des_set_key($key);
|
||||
#
|
||||
# $outbytes= &des_ecb_encrypt(*ks,1,$data);
|
||||
# @enc =unpack("C8",$outbytes);
|
||||
#
|
||||
|
||||
package des;
|
||||
|
||||
# The following 8 arrays are used in des_set_key
|
||||
@skb0=(
|
||||
# for C bits (numbered as per FIPS 46) 1 2 3 4 5 6
|
||||
0x00000000,0x00000010,0x20000000,0x20000010,
|
||||
0x00010000,0x00010010,0x20010000,0x20010010,
|
||||
0x00000800,0x00000810,0x20000800,0x20000810,
|
||||
0x00010800,0x00010810,0x20010800,0x20010810,
|
||||
0x00000020,0x00000030,0x20000020,0x20000030,
|
||||
0x00010020,0x00010030,0x20010020,0x20010030,
|
||||
0x00000820,0x00000830,0x20000820,0x20000830,
|
||||
0x00010820,0x00010830,0x20010820,0x20010830,
|
||||
0x00080000,0x00080010,0x20080000,0x20080010,
|
||||
0x00090000,0x00090010,0x20090000,0x20090010,
|
||||
0x00080800,0x00080810,0x20080800,0x20080810,
|
||||
0x00090800,0x00090810,0x20090800,0x20090810,
|
||||
0x00080020,0x00080030,0x20080020,0x20080030,
|
||||
0x00090020,0x00090030,0x20090020,0x20090030,
|
||||
0x00080820,0x00080830,0x20080820,0x20080830,
|
||||
0x00090820,0x00090830,0x20090820,0x20090830,
|
||||
);
|
||||
@skb1=(
|
||||
# for C bits (numbered as per FIPS 46) 7 8 10 11 12 13
|
||||
0x00000000,0x02000000,0x00002000,0x02002000,
|
||||
0x00200000,0x02200000,0x00202000,0x02202000,
|
||||
0x00000004,0x02000004,0x00002004,0x02002004,
|
||||
0x00200004,0x02200004,0x00202004,0x02202004,
|
||||
0x00000400,0x02000400,0x00002400,0x02002400,
|
||||
0x00200400,0x02200400,0x00202400,0x02202400,
|
||||
0x00000404,0x02000404,0x00002404,0x02002404,
|
||||
0x00200404,0x02200404,0x00202404,0x02202404,
|
||||
0x10000000,0x12000000,0x10002000,0x12002000,
|
||||
0x10200000,0x12200000,0x10202000,0x12202000,
|
||||
0x10000004,0x12000004,0x10002004,0x12002004,
|
||||
0x10200004,0x12200004,0x10202004,0x12202004,
|
||||
0x10000400,0x12000400,0x10002400,0x12002400,
|
||||
0x10200400,0x12200400,0x10202400,0x12202400,
|
||||
0x10000404,0x12000404,0x10002404,0x12002404,
|
||||
0x10200404,0x12200404,0x10202404,0x12202404,
|
||||
);
|
||||
@skb2=(
|
||||
# for C bits (numbered as per FIPS 46) 14 15 16 17 19 20
|
||||
0x00000000,0x00000001,0x00040000,0x00040001,
|
||||
0x01000000,0x01000001,0x01040000,0x01040001,
|
||||
0x00000002,0x00000003,0x00040002,0x00040003,
|
||||
0x01000002,0x01000003,0x01040002,0x01040003,
|
||||
0x00000200,0x00000201,0x00040200,0x00040201,
|
||||
0x01000200,0x01000201,0x01040200,0x01040201,
|
||||
0x00000202,0x00000203,0x00040202,0x00040203,
|
||||
0x01000202,0x01000203,0x01040202,0x01040203,
|
||||
0x08000000,0x08000001,0x08040000,0x08040001,
|
||||
0x09000000,0x09000001,0x09040000,0x09040001,
|
||||
0x08000002,0x08000003,0x08040002,0x08040003,
|
||||
0x09000002,0x09000003,0x09040002,0x09040003,
|
||||
0x08000200,0x08000201,0x08040200,0x08040201,
|
||||
0x09000200,0x09000201,0x09040200,0x09040201,
|
||||
0x08000202,0x08000203,0x08040202,0x08040203,
|
||||
0x09000202,0x09000203,0x09040202,0x09040203,
|
||||
);
|
||||
@skb3=(
|
||||
# for C bits (numbered as per FIPS 46) 21 23 24 26 27 28
|
||||
0x00000000,0x00100000,0x00000100,0x00100100,
|
||||
0x00000008,0x00100008,0x00000108,0x00100108,
|
||||
0x00001000,0x00101000,0x00001100,0x00101100,
|
||||
0x00001008,0x00101008,0x00001108,0x00101108,
|
||||
0x04000000,0x04100000,0x04000100,0x04100100,
|
||||
0x04000008,0x04100008,0x04000108,0x04100108,
|
||||
0x04001000,0x04101000,0x04001100,0x04101100,
|
||||
0x04001008,0x04101008,0x04001108,0x04101108,
|
||||
0x00020000,0x00120000,0x00020100,0x00120100,
|
||||
0x00020008,0x00120008,0x00020108,0x00120108,
|
||||
0x00021000,0x00121000,0x00021100,0x00121100,
|
||||
0x00021008,0x00121008,0x00021108,0x00121108,
|
||||
0x04020000,0x04120000,0x04020100,0x04120100,
|
||||
0x04020008,0x04120008,0x04020108,0x04120108,
|
||||
0x04021000,0x04121000,0x04021100,0x04121100,
|
||||
0x04021008,0x04121008,0x04021108,0x04121108,
|
||||
);
|
||||
@skb4=(
|
||||
# for D bits (numbered as per FIPS 46) 1 2 3 4 5 6
|
||||
0x00000000,0x10000000,0x00010000,0x10010000,
|
||||
0x00000004,0x10000004,0x00010004,0x10010004,
|
||||
0x20000000,0x30000000,0x20010000,0x30010000,
|
||||
0x20000004,0x30000004,0x20010004,0x30010004,
|
||||
0x00100000,0x10100000,0x00110000,0x10110000,
|
||||
0x00100004,0x10100004,0x00110004,0x10110004,
|
||||
0x20100000,0x30100000,0x20110000,0x30110000,
|
||||
0x20100004,0x30100004,0x20110004,0x30110004,
|
||||
0x00001000,0x10001000,0x00011000,0x10011000,
|
||||
0x00001004,0x10001004,0x00011004,0x10011004,
|
||||
0x20001000,0x30001000,0x20011000,0x30011000,
|
||||
0x20001004,0x30001004,0x20011004,0x30011004,
|
||||
0x00101000,0x10101000,0x00111000,0x10111000,
|
||||
0x00101004,0x10101004,0x00111004,0x10111004,
|
||||
0x20101000,0x30101000,0x20111000,0x30111000,
|
||||
0x20101004,0x30101004,0x20111004,0x30111004,
|
||||
);
|
||||
@skb5=(
|
||||
# for D bits (numbered as per FIPS 46) 8 9 11 12 13 14
|
||||
0x00000000,0x08000000,0x00000008,0x08000008,
|
||||
0x00000400,0x08000400,0x00000408,0x08000408,
|
||||
0x00020000,0x08020000,0x00020008,0x08020008,
|
||||
0x00020400,0x08020400,0x00020408,0x08020408,
|
||||
0x00000001,0x08000001,0x00000009,0x08000009,
|
||||
0x00000401,0x08000401,0x00000409,0x08000409,
|
||||
0x00020001,0x08020001,0x00020009,0x08020009,
|
||||
0x00020401,0x08020401,0x00020409,0x08020409,
|
||||
0x02000000,0x0A000000,0x02000008,0x0A000008,
|
||||
0x02000400,0x0A000400,0x02000408,0x0A000408,
|
||||
0x02020000,0x0A020000,0x02020008,0x0A020008,
|
||||
0x02020400,0x0A020400,0x02020408,0x0A020408,
|
||||
0x02000001,0x0A000001,0x02000009,0x0A000009,
|
||||
0x02000401,0x0A000401,0x02000409,0x0A000409,
|
||||
0x02020001,0x0A020001,0x02020009,0x0A020009,
|
||||
0x02020401,0x0A020401,0x02020409,0x0A020409,
|
||||
);
|
||||
@skb6=(
|
||||
# for D bits (numbered as per FIPS 46) 16 17 18 19 20 21
|
||||
0x00000000,0x00000100,0x00080000,0x00080100,
|
||||
0x01000000,0x01000100,0x01080000,0x01080100,
|
||||
0x00000010,0x00000110,0x00080010,0x00080110,
|
||||
0x01000010,0x01000110,0x01080010,0x01080110,
|
||||
0x00200000,0x00200100,0x00280000,0x00280100,
|
||||
0x01200000,0x01200100,0x01280000,0x01280100,
|
||||
0x00200010,0x00200110,0x00280010,0x00280110,
|
||||
0x01200010,0x01200110,0x01280010,0x01280110,
|
||||
0x00000200,0x00000300,0x00080200,0x00080300,
|
||||
0x01000200,0x01000300,0x01080200,0x01080300,
|
||||
0x00000210,0x00000310,0x00080210,0x00080310,
|
||||
0x01000210,0x01000310,0x01080210,0x01080310,
|
||||
0x00200200,0x00200300,0x00280200,0x00280300,
|
||||
0x01200200,0x01200300,0x01280200,0x01280300,
|
||||
0x00200210,0x00200310,0x00280210,0x00280310,
|
||||
0x01200210,0x01200310,0x01280210,0x01280310,
|
||||
);
|
||||
@skb7=(
|
||||
# for D bits (numbered as per FIPS 46) 22 23 24 25 27 28
|
||||
0x00000000,0x04000000,0x00040000,0x04040000,
|
||||
0x00000002,0x04000002,0x00040002,0x04040002,
|
||||
0x00002000,0x04002000,0x00042000,0x04042000,
|
||||
0x00002002,0x04002002,0x00042002,0x04042002,
|
||||
0x00000020,0x04000020,0x00040020,0x04040020,
|
||||
0x00000022,0x04000022,0x00040022,0x04040022,
|
||||
0x00002020,0x04002020,0x00042020,0x04042020,
|
||||
0x00002022,0x04002022,0x00042022,0x04042022,
|
||||
0x00000800,0x04000800,0x00040800,0x04040800,
|
||||
0x00000802,0x04000802,0x00040802,0x04040802,
|
||||
0x00002800,0x04002800,0x00042800,0x04042800,
|
||||
0x00002802,0x04002802,0x00042802,0x04042802,
|
||||
0x00000820,0x04000820,0x00040820,0x04040820,
|
||||
0x00000822,0x04000822,0x00040822,0x04040822,
|
||||
0x00002820,0x04002820,0x00042820,0x04042820,
|
||||
0x00002822,0x04002822,0x00042822,0x04042822,
|
||||
);
|
||||
|
||||
@shifts2=(0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0);
|
||||
|
||||
# used in ecb_encrypt
|
||||
@SP0=(
|
||||
0x00410100, 0x00010000, 0x40400000, 0x40410100,
|
||||
0x00400000, 0x40010100, 0x40010000, 0x40400000,
|
||||
0x40010100, 0x00410100, 0x00410000, 0x40000100,
|
||||
0x40400100, 0x00400000, 0x00000000, 0x40010000,
|
||||
0x00010000, 0x40000000, 0x00400100, 0x00010100,
|
||||
0x40410100, 0x00410000, 0x40000100, 0x00400100,
|
||||
0x40000000, 0x00000100, 0x00010100, 0x40410000,
|
||||
0x00000100, 0x40400100, 0x40410000, 0x00000000,
|
||||
0x00000000, 0x40410100, 0x00400100, 0x40010000,
|
||||
0x00410100, 0x00010000, 0x40000100, 0x00400100,
|
||||
0x40410000, 0x00000100, 0x00010100, 0x40400000,
|
||||
0x40010100, 0x40000000, 0x40400000, 0x00410000,
|
||||
0x40410100, 0x00010100, 0x00410000, 0x40400100,
|
||||
0x00400000, 0x40000100, 0x40010000, 0x00000000,
|
||||
0x00010000, 0x00400000, 0x40400100, 0x00410100,
|
||||
0x40000000, 0x40410000, 0x00000100, 0x40010100,
|
||||
);
|
||||
@SP1=(
|
||||
0x08021002, 0x00000000, 0x00021000, 0x08020000,
|
||||
0x08000002, 0x00001002, 0x08001000, 0x00021000,
|
||||
0x00001000, 0x08020002, 0x00000002, 0x08001000,
|
||||
0x00020002, 0x08021000, 0x08020000, 0x00000002,
|
||||
0x00020000, 0x08001002, 0x08020002, 0x00001000,
|
||||
0x00021002, 0x08000000, 0x00000000, 0x00020002,
|
||||
0x08001002, 0x00021002, 0x08021000, 0x08000002,
|
||||
0x08000000, 0x00020000, 0x00001002, 0x08021002,
|
||||
0x00020002, 0x08021000, 0x08001000, 0x00021002,
|
||||
0x08021002, 0x00020002, 0x08000002, 0x00000000,
|
||||
0x08000000, 0x00001002, 0x00020000, 0x08020002,
|
||||
0x00001000, 0x08000000, 0x00021002, 0x08001002,
|
||||
0x08021000, 0x00001000, 0x00000000, 0x08000002,
|
||||
0x00000002, 0x08021002, 0x00021000, 0x08020000,
|
||||
0x08020002, 0x00020000, 0x00001002, 0x08001000,
|
||||
0x08001002, 0x00000002, 0x08020000, 0x00021000,
|
||||
);
|
||||
@SP2=(
|
||||
0x20800000, 0x00808020, 0x00000020, 0x20800020,
|
||||
0x20008000, 0x00800000, 0x20800020, 0x00008020,
|
||||
0x00800020, 0x00008000, 0x00808000, 0x20000000,
|
||||
0x20808020, 0x20000020, 0x20000000, 0x20808000,
|
||||
0x00000000, 0x20008000, 0x00808020, 0x00000020,
|
||||
0x20000020, 0x20808020, 0x00008000, 0x20800000,
|
||||
0x20808000, 0x00800020, 0x20008020, 0x00808000,
|
||||
0x00008020, 0x00000000, 0x00800000, 0x20008020,
|
||||
0x00808020, 0x00000020, 0x20000000, 0x00008000,
|
||||
0x20000020, 0x20008000, 0x00808000, 0x20800020,
|
||||
0x00000000, 0x00808020, 0x00008020, 0x20808000,
|
||||
0x20008000, 0x00800000, 0x20808020, 0x20000000,
|
||||
0x20008020, 0x20800000, 0x00800000, 0x20808020,
|
||||
0x00008000, 0x00800020, 0x20800020, 0x00008020,
|
||||
0x00800020, 0x00000000, 0x20808000, 0x20000020,
|
||||
0x20800000, 0x20008020, 0x00000020, 0x00808000,
|
||||
);
|
||||
@SP3=(
|
||||
0x00080201, 0x02000200, 0x00000001, 0x02080201,
|
||||
0x00000000, 0x02080000, 0x02000201, 0x00080001,
|
||||
0x02080200, 0x02000001, 0x02000000, 0x00000201,
|
||||
0x02000001, 0x00080201, 0x00080000, 0x02000000,
|
||||
0x02080001, 0x00080200, 0x00000200, 0x00000001,
|
||||
0x00080200, 0x02000201, 0x02080000, 0x00000200,
|
||||
0x00000201, 0x00000000, 0x00080001, 0x02080200,
|
||||
0x02000200, 0x02080001, 0x02080201, 0x00080000,
|
||||
0x02080001, 0x00000201, 0x00080000, 0x02000001,
|
||||
0x00080200, 0x02000200, 0x00000001, 0x02080000,
|
||||
0x02000201, 0x00000000, 0x00000200, 0x00080001,
|
||||
0x00000000, 0x02080001, 0x02080200, 0x00000200,
|
||||
0x02000000, 0x02080201, 0x00080201, 0x00080000,
|
||||
0x02080201, 0x00000001, 0x02000200, 0x00080201,
|
||||
0x00080001, 0x00080200, 0x02080000, 0x02000201,
|
||||
0x00000201, 0x02000000, 0x02000001, 0x02080200,
|
||||
);
|
||||
@SP4=(
|
||||
0x01000000, 0x00002000, 0x00000080, 0x01002084,
|
||||
0x01002004, 0x01000080, 0x00002084, 0x01002000,
|
||||
0x00002000, 0x00000004, 0x01000004, 0x00002080,
|
||||
0x01000084, 0x01002004, 0x01002080, 0x00000000,
|
||||
0x00002080, 0x01000000, 0x00002004, 0x00000084,
|
||||
0x01000080, 0x00002084, 0x00000000, 0x01000004,
|
||||
0x00000004, 0x01000084, 0x01002084, 0x00002004,
|
||||
0x01002000, 0x00000080, 0x00000084, 0x01002080,
|
||||
0x01002080, 0x01000084, 0x00002004, 0x01002000,
|
||||
0x00002000, 0x00000004, 0x01000004, 0x01000080,
|
||||
0x01000000, 0x00002080, 0x01002084, 0x00000000,
|
||||
0x00002084, 0x01000000, 0x00000080, 0x00002004,
|
||||
0x01000084, 0x00000080, 0x00000000, 0x01002084,
|
||||
0x01002004, 0x01002080, 0x00000084, 0x00002000,
|
||||
0x00002080, 0x01002004, 0x01000080, 0x00000084,
|
||||
0x00000004, 0x00002084, 0x01002000, 0x01000004,
|
||||
);
|
||||
@SP5=(
|
||||
0x10000008, 0x00040008, 0x00000000, 0x10040400,
|
||||
0x00040008, 0x00000400, 0x10000408, 0x00040000,
|
||||
0x00000408, 0x10040408, 0x00040400, 0x10000000,
|
||||
0x10000400, 0x10000008, 0x10040000, 0x00040408,
|
||||
0x00040000, 0x10000408, 0x10040008, 0x00000000,
|
||||
0x00000400, 0x00000008, 0x10040400, 0x10040008,
|
||||
0x10040408, 0x10040000, 0x10000000, 0x00000408,
|
||||
0x00000008, 0x00040400, 0x00040408, 0x10000400,
|
||||
0x00000408, 0x10000000, 0x10000400, 0x00040408,
|
||||
0x10040400, 0x00040008, 0x00000000, 0x10000400,
|
||||
0x10000000, 0x00000400, 0x10040008, 0x00040000,
|
||||
0x00040008, 0x10040408, 0x00040400, 0x00000008,
|
||||
0x10040408, 0x00040400, 0x00040000, 0x10000408,
|
||||
0x10000008, 0x10040000, 0x00040408, 0x00000000,
|
||||
0x00000400, 0x10000008, 0x10000408, 0x10040400,
|
||||
0x10040000, 0x00000408, 0x00000008, 0x10040008,
|
||||
);
|
||||
@SP6=(
|
||||
0x00000800, 0x00000040, 0x00200040, 0x80200000,
|
||||
0x80200840, 0x80000800, 0x00000840, 0x00000000,
|
||||
0x00200000, 0x80200040, 0x80000040, 0x00200800,
|
||||
0x80000000, 0x00200840, 0x00200800, 0x80000040,
|
||||
0x80200040, 0x00000800, 0x80000800, 0x80200840,
|
||||
0x00000000, 0x00200040, 0x80200000, 0x00000840,
|
||||
0x80200800, 0x80000840, 0x00200840, 0x80000000,
|
||||
0x80000840, 0x80200800, 0x00000040, 0x00200000,
|
||||
0x80000840, 0x00200800, 0x80200800, 0x80000040,
|
||||
0x00000800, 0x00000040, 0x00200000, 0x80200800,
|
||||
0x80200040, 0x80000840, 0x00000840, 0x00000000,
|
||||
0x00000040, 0x80200000, 0x80000000, 0x00200040,
|
||||
0x00000000, 0x80200040, 0x00200040, 0x00000840,
|
||||
0x80000040, 0x00000800, 0x80200840, 0x00200000,
|
||||
0x00200840, 0x80000000, 0x80000800, 0x80200840,
|
||||
0x80200000, 0x00200840, 0x00200800, 0x80000800,
|
||||
);
|
||||
@SP7=(
|
||||
0x04100010, 0x04104000, 0x00004010, 0x00000000,
|
||||
0x04004000, 0x00100010, 0x04100000, 0x04104010,
|
||||
0x00000010, 0x04000000, 0x00104000, 0x00004010,
|
||||
0x00104010, 0x04004010, 0x04000010, 0x04100000,
|
||||
0x00004000, 0x00104010, 0x00100010, 0x04004000,
|
||||
0x04104010, 0x04000010, 0x00000000, 0x00104000,
|
||||
0x04000000, 0x00100000, 0x04004010, 0x04100010,
|
||||
0x00100000, 0x00004000, 0x04104000, 0x00000010,
|
||||
0x00100000, 0x00004000, 0x04000010, 0x04104010,
|
||||
0x00004010, 0x04000000, 0x00000000, 0x00104000,
|
||||
0x04100010, 0x04004010, 0x04004000, 0x00100010,
|
||||
0x04104000, 0x00000010, 0x00100010, 0x04004000,
|
||||
0x04104010, 0x00100000, 0x04100000, 0x04000010,
|
||||
0x00104000, 0x00004010, 0x04004010, 0x04100000,
|
||||
0x00000010, 0x04104000, 0x00104010, 0x00000000,
|
||||
0x04000000, 0x04100010, 0x00004000, 0x00104010,
|
||||
);
|
||||
|
||||
sub main'des_set_key
|
||||
{
|
||||
local($param)=@_;
|
||||
local(@key);
|
||||
local($c,$d,$i,$s,$t);
|
||||
local(@ks)=();
|
||||
|
||||
# Get the bytes in the order we want.
|
||||
@key=unpack("C8",$param);
|
||||
|
||||
$c= ($key[0] )|
|
||||
($key[1]<< 8)|
|
||||
($key[2]<<16)|
|
||||
($key[3]<<24);
|
||||
$d= ($key[4] )|
|
||||
($key[5]<< 8)|
|
||||
($key[6]<<16)|
|
||||
($key[7]<<24);
|
||||
|
||||
&doPC1(*c,*d);
|
||||
|
||||
for $i (@shifts2)
|
||||
{
|
||||
if ($i)
|
||||
{
|
||||
$c=($c>>2)|($c<<26);
|
||||
$d=($d>>2)|($d<<26);
|
||||
}
|
||||
else
|
||||
{
|
||||
$c=($c>>1)|($c<<27);
|
||||
$d=($d>>1)|($d<<27);
|
||||
}
|
||||
$c&=0x0fffffff;
|
||||
$d&=0x0fffffff;
|
||||
$s= $skb0[ ($c )&0x3f ]|
|
||||
$skb1[(($c>> 6)&0x03)|(($c>> 7)&0x3c)]|
|
||||
$skb2[(($c>>13)&0x0f)|(($c>>14)&0x30)]|
|
||||
$skb3[(($c>>20)&0x01)|(($c>>21)&0x06) |
|
||||
(($c>>22)&0x38)];
|
||||
$t= $skb4[ ($d )&0x3f ]|
|
||||
$skb5[(($d>> 7)&0x03)|(($d>> 8)&0x3c)]|
|
||||
$skb6[ ($d>>15)&0x3f ]|
|
||||
$skb7[(($d>>21)&0x0f)|(($d>>22)&0x30)];
|
||||
push(@ks,(($t<<16)|($s&0x0000ffff))&0xffffffff);
|
||||
$s= ($s>>16)|($t&0xffff0000) ;
|
||||
push(@ks,(($s<<4)|($s>>28))&0xffffffff);
|
||||
}
|
||||
@ks;
|
||||
}
|
||||
|
||||
sub doPC1
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local($t);
|
||||
|
||||
$t=(($b>>4)^$a)&0x0f0f0f0f;
|
||||
$b^=($t<<4); $a^=$t;
|
||||
# do $a first
|
||||
$t=(($a<<18)^$a)&0xcccc0000;
|
||||
$a=$a^$t^($t>>18);
|
||||
$t=(($a<<17)^$a)&0xaaaa0000;
|
||||
$a=$a^$t^($t>>17);
|
||||
$t=(($a<< 8)^$a)&0x00ff0000;
|
||||
$a=$a^$t^($t>> 8);
|
||||
$t=(($a<<17)^$a)&0xaaaa0000;
|
||||
$a=$a^$t^($t>>17);
|
||||
|
||||
# now do $b
|
||||
$t=(($b<<24)^$b)&0xff000000;
|
||||
$b=$b^$t^($t>>24);
|
||||
$t=(($b<< 8)^$b)&0x00ff0000;
|
||||
$b=$b^$t^($t>> 8);
|
||||
$t=(($b<<14)^$b)&0x33330000;
|
||||
$b=$b^$t^($t>>14);
|
||||
$b=(($b&0x00aa00aa)<<7)|(($b&0x55005500)>>7)|($b&0xaa55aa55);
|
||||
$b=($b>>8)|(($a&0xf0000000)>>4);
|
||||
$a&=0x0fffffff;
|
||||
}
|
||||
|
||||
sub doIP
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local($t);
|
||||
|
||||
$t=(($b>> 4)^$a)&0x0f0f0f0f;
|
||||
$b^=($t<< 4); $a^=$t;
|
||||
$t=(($a>>16)^$b)&0x0000ffff;
|
||||
$a^=($t<<16); $b^=$t;
|
||||
$t=(($b>> 2)^$a)&0x33333333;
|
||||
$b^=($t<< 2); $a^=$t;
|
||||
$t=(($a>> 8)^$b)&0x00ff00ff;
|
||||
$a^=($t<< 8); $b^=$t;
|
||||
$t=(($b>> 1)^$a)&0x55555555;
|
||||
$b^=($t<< 1); $a^=$t;
|
||||
$t=$a;
|
||||
$a=$b&0xffffffff;
|
||||
$b=$t&0xffffffff;
|
||||
}
|
||||
|
||||
sub doFP
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local($t);
|
||||
|
||||
$t=(($b>> 1)^$a)&0x55555555;
|
||||
$b^=($t<< 1); $a^=$t;
|
||||
$t=(($a>> 8)^$b)&0x00ff00ff;
|
||||
$a^=($t<< 8); $b^=$t;
|
||||
$t=(($b>> 2)^$a)&0x33333333;
|
||||
$b^=($t<< 2); $a^=$t;
|
||||
$t=(($a>>16)^$b)&0x0000ffff;
|
||||
$a^=($t<<16); $b^=$t;
|
||||
$t=(($b>> 4)^$a)&0x0f0f0f0f;
|
||||
$b^=($t<< 4); $a^=$t;
|
||||
$a&=0xffffffff;
|
||||
$b&=0xffffffff;
|
||||
}
|
||||
|
||||
sub main'des_ecb_encrypt
|
||||
{
|
||||
local(*ks,$encrypt,$in)=@_;
|
||||
local($l,$r,$inc,$start,$end,$i,$t,$u,@input);
|
||||
|
||||
@input=unpack("C8",$in);
|
||||
# Get the bytes in the order we want.
|
||||
$l= ($input[0] )|
|
||||
($input[1]<< 8)|
|
||||
($input[2]<<16)|
|
||||
($input[3]<<24);
|
||||
$r= ($input[4] )|
|
||||
($input[5]<< 8)|
|
||||
($input[6]<<16)|
|
||||
($input[7]<<24);
|
||||
|
||||
$l&=0xffffffff;
|
||||
$r&=0xffffffff;
|
||||
&doIP(*l,*r);
|
||||
if ($encrypt)
|
||||
{
|
||||
for ($i=0; $i<32; $i+=4)
|
||||
{
|
||||
$t=(($r<<1)|($r>>31))&0xffffffff;
|
||||
$u=$t^$ks[$i ];
|
||||
$t=$t^$ks[$i+1];
|
||||
$t=(($t>>4)|($t<<28))&0xffffffff;
|
||||
$l^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
|
||||
$t=(($l<<1)|($l>>31))&0xffffffff;
|
||||
$u=$t^$ks[$i+2];
|
||||
$t=$t^$ks[$i+3];
|
||||
$t=(($t>>4)|($t<<28))&0xffffffff;
|
||||
$r^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
for ($i=30; $i>0; $i-=4)
|
||||
{
|
||||
$t=(($r<<1)|($r>>31))&0xffffffff;
|
||||
$u=$t^$ks[$i ];
|
||||
$t=$t^$ks[$i+1];
|
||||
$t=(($t>>4)|($t<<28))&0xffffffff;
|
||||
$l^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
|
||||
$t=(($l<<1)|($l>>31))&0xffffffff;
|
||||
$u=$t^$ks[$i-2];
|
||||
$t=$t^$ks[$i-1];
|
||||
$t=(($t>>4)|($t<<28))&0xffffffff;
|
||||
$r^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
}
|
||||
}
|
||||
&doFP(*l,*r);
|
||||
pack("C8",$l&0xff,$l>>8,$l>>16,$l>>24,
|
||||
$r&0xff,$r>>8,$r>>16,$r>>24);
|
||||
}
|
BIN
lib/des/des.x
Normal file
BIN
lib/des/des.x
Normal file
Binary file not shown.
381
lib/des/des_crypt.3
Normal file
381
lib/des/des_crypt.3
Normal file
@@ -0,0 +1,381 @@
|
||||
.\" $Source$
|
||||
.\" $Author$
|
||||
.\" $Header$
|
||||
.\" Copyright 1989 by the Massachusetts Institute of Technology.
|
||||
.\"
|
||||
.\" For copying and distribution information,
|
||||
.\" please see the file <mit-copyright.h>.
|
||||
.\"
|
||||
.TH DES_CRYPT 3 "Kerberos Version 4.0" "MIT Project Athena"
|
||||
.SH NAME
|
||||
des_read_password, des_string_to_key, des_random_key, des_set_key,
|
||||
des_ecb_encrypt, des_cbc_encrypt, des_pcbc_encrypt, des_cbc_cksum,
|
||||
des_quad_cksum, \- (new) DES encryption
|
||||
.SH SYNOPSIS
|
||||
.nf
|
||||
.nj
|
||||
.ft B
|
||||
#include <des.h>
|
||||
.PP
|
||||
.ft B
|
||||
.B int des_read_password(key,prompt,verify)
|
||||
des_cblock *key;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.ft B
|
||||
int des_string_to_key(str,key)
|
||||
char *str;
|
||||
des_cblock key;
|
||||
.PP
|
||||
.ft B
|
||||
int des_random_key(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.ft B
|
||||
int des_set_key(key,schedule)
|
||||
des_cblock *key;
|
||||
des_key_schedule schedule;
|
||||
.PP
|
||||
.ft B
|
||||
int des_ecb_encrypt(input,output,schedule,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
des_key_schedule schedule;
|
||||
int encrypt;
|
||||
.PP
|
||||
.ft B
|
||||
int des_cbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.ft B
|
||||
int des_pcbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.ft B
|
||||
unsigned long des_cbc_cksum(input,output,length,schedule,ivec)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
.PP
|
||||
.ft B
|
||||
unsigned long quad_cksum(input,output,length,out_count,seed)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
int out_count;
|
||||
des_cblock *seed;
|
||||
.PP
|
||||
.fi
|
||||
.SH DESCRIPTION
|
||||
This library supports various DES encryption related operations. It differs
|
||||
from the
|
||||
.I crypt, setkey, and encrypt
|
||||
library routines in that it provides
|
||||
a true DES encryption, without modifying the algorithm,
|
||||
and executes much faster.
|
||||
.PP
|
||||
For each key that may be simultaneously active, create a
|
||||
.B des_key_schedule
|
||||
struct,
|
||||
defined in "des.h". Next, create key schedules (from the 8-byte keys) as
|
||||
needed, via
|
||||
.I des_set_key,
|
||||
prior to using the encryption or checksum routines. Then
|
||||
setup the input and output areas. Make sure to note the restrictions
|
||||
on lengths being multiples of eight bytes. Finally, invoke the
|
||||
encryption/decryption routines,
|
||||
.I des_ecb_encrypt
|
||||
or
|
||||
.I des_cbc_encrypt
|
||||
or
|
||||
.I des_pcbc_encrypt,
|
||||
or, to generate a cryptographic checksum, use
|
||||
.I quad_cksum
|
||||
(fast) or
|
||||
.I des_cbc_cksum
|
||||
(slow).
|
||||
.PP
|
||||
A
|
||||
.I des_cblock
|
||||
struct is an 8 byte block used as the fundamental unit for DES data and
|
||||
keys, and is defined as:
|
||||
.PP
|
||||
.B typedef unsigned char des_cblock[8];
|
||||
.PP
|
||||
and a
|
||||
.I des_key_schedule,
|
||||
is defined as:
|
||||
.PP
|
||||
.B typedef struct des_ks_struct {des_cblock _;} des_key_schedule[16];
|
||||
.PP
|
||||
.I des_read_password
|
||||
writes the string specified by
|
||||
.I prompt
|
||||
to the standard
|
||||
output, turns off echo (if possible)
|
||||
and reads an input string from standard input until terminated with a newline.
|
||||
If
|
||||
.I verify
|
||||
is non-zero, it prompts and reads input again, for use
|
||||
in applications such as changing a password; both
|
||||
versions are compared, and the input is requested repeatedly until they
|
||||
match. Then
|
||||
.I des_read_password
|
||||
converts the input string into a valid DES key, internally
|
||||
using the
|
||||
.I des_string_to_key
|
||||
routine. The newly created key is copied to the
|
||||
area pointed to by the
|
||||
.I key
|
||||
argument.
|
||||
.I des_read_password
|
||||
returns a zero if no errors occurred, or a -1
|
||||
indicating that an error
|
||||
occurred trying to manipulate the terminal echo.
|
||||
.PP
|
||||
.PP
|
||||
.I des_string_to_key
|
||||
converts an arbitrary length null-terminated string
|
||||
to an 8 byte DES key, with odd byte parity, per FIPS specification.
|
||||
A one-way function is used to convert the string to a key, making it
|
||||
very difficult to reconstruct the string from the key.
|
||||
The
|
||||
.I str
|
||||
argument is a pointer to the string, and
|
||||
.I key
|
||||
should
|
||||
point to a
|
||||
.I des_cblock
|
||||
supplied by the caller to receive the generated key.
|
||||
No meaningful value is returned. Void is not used for compatibility with
|
||||
other compilers.
|
||||
.PP
|
||||
.PP
|
||||
.I des_random_key
|
||||
generates a random DES encryption key (eight bytes), set to odd parity per
|
||||
FIPS
|
||||
specifications.
|
||||
This routine uses the current time, process id, and a counter
|
||||
as a seed for the random number generator.
|
||||
The caller must supply space for the output key, pointed to
|
||||
by argument
|
||||
.I key,
|
||||
then after calling
|
||||
.I des_random_key
|
||||
should
|
||||
call the
|
||||
.I des_set_key
|
||||
routine when needed.
|
||||
No meaningful value is returned. Void is not used for compatibility
|
||||
with other compilers.
|
||||
.PP
|
||||
.PP
|
||||
.I des_set_key
|
||||
calculates a key schedule from all eight bytes of the input key, pointed
|
||||
to by the
|
||||
.I key
|
||||
argument, and outputs the schedule into the
|
||||
.I des_key_schedule
|
||||
indicated by the
|
||||
.I schedule
|
||||
argument. Make sure to pass a valid eight byte
|
||||
key; no padding is done. The key schedule may then be used in subsequent
|
||||
encryption/decryption/checksum operations. Many key schedules may be
|
||||
cached for later use. The user is responsible to clear keys and schedules
|
||||
as soon as no longer needed, to prevent their disclosure.
|
||||
The routine also checks the key
|
||||
parity, and returns a zero if the key parity is correct (odd), a -1
|
||||
indicating a key parity error, or a -2 indicating use of an illegal
|
||||
weak key. If an error is returned, the key schedule was not created.
|
||||
.PP
|
||||
.PP
|
||||
.I des_ecb_encrypt
|
||||
is the basic DES encryption routine that encrypts or decrypts a single 8-byte
|
||||
block in
|
||||
.B electronic code book
|
||||
mode. It always transforms the input data, pointed to by
|
||||
.I input,
|
||||
into the output data, pointed to by the
|
||||
.I output
|
||||
argument.
|
||||
.PP
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero, the
|
||||
.I input
|
||||
(cleartext) is encrypted into the
|
||||
.I output
|
||||
(ciphertext) using the key_schedule specified by the
|
||||
.I schedule
|
||||
argument, previously set via
|
||||
.I des_set_key
|
||||
.PP
|
||||
If encrypt is zero, the
|
||||
.I input
|
||||
(now ciphertext) is decrypted into the
|
||||
.I output
|
||||
(now cleartext).
|
||||
.PP
|
||||
Input and output may overlap.
|
||||
.PP
|
||||
No meaningful value is returned. Void is not used for compatibility
|
||||
with other compilers.
|
||||
.PP
|
||||
.PP
|
||||
.I des_cbc_encrypt
|
||||
encrypts/decrypts using the
|
||||
.B cipher-block-chaining mode of DES.
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero, the routine cipher-block-chain encrypts
|
||||
the cleartext data pointed to by the
|
||||
.I input
|
||||
argument into the ciphertext pointed to by the
|
||||
.I output
|
||||
argument, using the key schedule provided by the
|
||||
.I schedule
|
||||
argument, and initialization vector provided by the
|
||||
.I ivec
|
||||
argument.
|
||||
If the
|
||||
.I length
|
||||
argument is not an integral
|
||||
multiple of eight bytes, the last block is copied to a temp and zero
|
||||
filled (highest addresses). The output is ALWAYS an integral multiple
|
||||
of eight bytes.
|
||||
.PP
|
||||
If
|
||||
.I encrypt
|
||||
is zero, the routine cipher-block chain decrypts the (now) ciphertext
|
||||
data pointed to by the
|
||||
.I input
|
||||
argument into (now) cleartext pointed to by the
|
||||
.I output
|
||||
argument using the key schedule provided by the
|
||||
.I schedule
|
||||
argument, and initialization vector provided by the
|
||||
.I ivec
|
||||
argument. Decryption ALWAYS operates on integral
|
||||
multiples of 8 bytes, so it will round the
|
||||
.I length
|
||||
provided up to the
|
||||
appropriate multiple. Consequently, it will always produce the rounded-up
|
||||
number of bytes of output cleartext. The application must determine if
|
||||
the output cleartext was zero-padded due to original cleartext lengths that
|
||||
were not integral multiples of 8.
|
||||
.PP
|
||||
No errors or meaningful values are returned. Void is not used for
|
||||
compatibility with other compilers.
|
||||
.PP
|
||||
A characteristic of cbc mode is that changing a single bit of the
|
||||
cleartext, then encrypting using cbc mode,
|
||||
affects ALL the subsequent ciphertext. This makes cryptanalysis
|
||||
much more difficult. However, modifying a single bit of the ciphertext,
|
||||
then decrypting, only affects the resulting cleartext from
|
||||
the modified block and the succeeding block. Therefore,
|
||||
.I des_pcbc_encrypt
|
||||
is STRONGLY recommended for applications where
|
||||
indefinite propagation of errors is required in order to detect modifications.
|
||||
.PP
|
||||
.PP
|
||||
.I des_pcbc_encrypt
|
||||
encrypts/decrypts using a modified block chaining mode. Its calling
|
||||
sequence is identical to
|
||||
.I des_cbc_encrypt.
|
||||
It differs in its error propagation characteristics.
|
||||
.PP
|
||||
.I des_pcbc_encrypt
|
||||
is highly recommended for most encryption purposes, in that
|
||||
modification of a single bit of the ciphertext will affect ALL the
|
||||
subsequent (decrypted) cleartext. Similarly, modifying a single bit of
|
||||
the cleartext will affect ALL the subsequent (encrypted) ciphertext.
|
||||
"PCBC" mode, on encryption, "xors" both the
|
||||
cleartext of block N and the ciphertext resulting from block N with the
|
||||
cleartext for block N+1 prior to encrypting block N+1.
|
||||
.PP
|
||||
.I des_cbc_cksum
|
||||
produces an 8 byte cryptographic checksum by cipher-block-chain
|
||||
encrypting the cleartext data pointed to by the
|
||||
.I input
|
||||
argument. All of the ciphertext output is discarded, except the
|
||||
last 8-byte ciphertext block, which is written into the area pointed to by
|
||||
the
|
||||
.I output
|
||||
argument.
|
||||
It uses the key schedule,
|
||||
provided by the
|
||||
.I schedule
|
||||
argument and initialization vector provided by the
|
||||
.I ivec
|
||||
argument.
|
||||
If the
|
||||
.I length
|
||||
argument is not an integral
|
||||
multiple of eight bytes, the last cleartext block is copied to a temp and zero
|
||||
filled (highest addresses). The output is ALWAYS eight bytes.
|
||||
.PP
|
||||
The routine also returns an unsigned long, which is the last (highest address)
|
||||
half of the 8 byte checksum computed.
|
||||
.PP
|
||||
.PP
|
||||
.I quad_cksum
|
||||
produces a checksum by chaining quadratic operations on the cleartext data
|
||||
pointed to by the
|
||||
.I input
|
||||
argument. The
|
||||
.I length
|
||||
argument specifies the length of the
|
||||
input -- only exactly that many bytes are included for the checksum,
|
||||
without any padding.
|
||||
.PP
|
||||
The algorithm may be iterated over the same input data, if the
|
||||
.I out_count
|
||||
argument is 2, 3 or 4, and the optional
|
||||
.I output
|
||||
argument is a non-null pointer .
|
||||
The default is one iteration, and it will not run
|
||||
more than 4 times. Multiple iterations run slower, but provide
|
||||
a longer checksum if desired. The
|
||||
.I seed
|
||||
argument provides an 8-byte seed for the first iteration. If multiple iterations are
|
||||
requested, the results of one iteration are automatically used as
|
||||
the seed for the next iteration.
|
||||
.PP
|
||||
It returns both an unsigned long checksum value, and
|
||||
if the
|
||||
.I output
|
||||
argument is not a null pointer, up to 16 bytes of
|
||||
the computed checksum are written into the output.
|
||||
.PP
|
||||
.PP
|
||||
.SH FILES
|
||||
/usr/include/des.h
|
||||
.br
|
||||
/usr/lib/libdes.a
|
||||
.SH "SEE ALSO"
|
||||
.SH DIAGNOSTICS
|
||||
.SH BUGS
|
||||
This software has not yet been compiled or tested on machines other than the
|
||||
VAX and the IBM PC.
|
||||
.SH AUTHORS
|
||||
Steve Miller, MIT Project Athena/Digital Equipment Corporation
|
||||
.SH RESTRICTIONS
|
||||
COPYRIGHT 1985,1986 Massachusetts Institute of Technology
|
||||
.PP
|
||||
This software may not be exported outside of the US without a special
|
||||
license from the US Dept of Commerce. It may be replaced by any secret
|
||||
key block cipher with block length and key length of 8 bytes, as long
|
||||
as the interface is the same as described here.
|
502
lib/des/des_crypt.man
Normal file
502
lib/des/des_crypt.man
Normal file
@@ -0,0 +1,502 @@
|
||||
.TH DES_CRYPT 3
|
||||
.SH NAME
|
||||
des_read_password, des_read_2password,
|
||||
des_string_to_key, des_string_to_2key, des_read_pw_string,
|
||||
des_random_key, des_set_key,
|
||||
des_key_sched, des_ecb_encrypt, des_3ecb_encrypt, des_cbc_encrypt,
|
||||
des_3cbc_encrypt,
|
||||
des_pcbc_encrypt, des_cfb_encrypt, des_ofb_encrypt,
|
||||
des_cbc_cksum, des_quad_cksum,
|
||||
des_enc_read, des_enc_write, des_set_odd_parity,
|
||||
des_is_weak_key, crypt \- (non USA) DES encryption
|
||||
.SH SYNOPSIS
|
||||
.nf
|
||||
.nj
|
||||
.ft B
|
||||
#include <des.h>
|
||||
.PP
|
||||
.B int des_read_password(key,prompt,verify)
|
||||
des_cblock *key;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.B int des_read_2password(key1,key2,prompt,verify)
|
||||
des_cblock *key1,*key2;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.B int des_string_to_key(str,key)
|
||||
char *str;
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B int des_string_to_2keys(str,key1,key2)
|
||||
char *str;
|
||||
des_cblock *key1,*key2;
|
||||
.PP
|
||||
.B int des_read_pw_string(buf,length,prompt,verify)
|
||||
char *buf;
|
||||
int length;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.B int des_random_key(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B int des_set_key(key,schedule)
|
||||
des_cblock *key;
|
||||
des_key_schedule schedule;
|
||||
.PP
|
||||
.B int des_key_sched(key,schedule)
|
||||
des_cblock *key;
|
||||
des_key_schedule schedule;
|
||||
.PP
|
||||
.B int des_ecb_encrypt(input,output,schedule,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
des_key_schedule schedule;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_3ecb_encrypt(input,output,ks1,ks2,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
des_key_schedule ks1,ks2;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_cbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_3cbc_encrypt(input,output,length,sk1,sk2,ivec1,ivec2,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule sk1;
|
||||
des_key_schedule sk2;
|
||||
des_cblock *ivec1;
|
||||
des_cblock *ivec2;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_pcbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_cfb_encrypt(input,output,numbits,length,schedule,ivec,encrypt)
|
||||
unsigned char *input;
|
||||
unsigned char *output;
|
||||
int numbits;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_ofb_encrypt(input,output,numbits,length,schedule,ivec)
|
||||
unsigned char *input,*output;
|
||||
int numbits;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
.PP
|
||||
.B unsigned long des_cbc_cksum(input,output,length,schedule,ivec)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
.PP
|
||||
.B unsigned long des_quad_cksum(input,output,length,out_count,seed)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
int out_count;
|
||||
des_cblock *seed;
|
||||
.PP
|
||||
.B int des_check_key;
|
||||
.PP
|
||||
.B int des_enc_read(fd,buf,len,sched,iv)
|
||||
int fd;
|
||||
char *buf;
|
||||
int len;
|
||||
des_key_schedule sched;
|
||||
des_cblock *iv;
|
||||
.PP
|
||||
.B int des_enc_write(fd,buf,len,sched,iv)
|
||||
int fd;
|
||||
char *buf;
|
||||
int len;
|
||||
des_key_schedule sched;
|
||||
des_cblock *iv;
|
||||
.PP
|
||||
.B extern int des_rw_mode;
|
||||
.PP
|
||||
.B void des_set_odd_parity(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B int des_is_weak_key(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B char *crypt(passwd,salt)
|
||||
char *passwd;
|
||||
char *salt;
|
||||
.PP
|
||||
.fi
|
||||
.SH DESCRIPTION
|
||||
This library contains a fast implementation of the DES encryption
|
||||
algorithm.
|
||||
.PP
|
||||
There are two phases to the use of DES encryption.
|
||||
The first is the generation of a
|
||||
.I des_key_schedule
|
||||
from a key,
|
||||
the second is the actual encryption.
|
||||
A des key is of type
|
||||
.I des_cblock.
|
||||
This type is made from 8 characters with odd parity.
|
||||
The least significant bit in the character is the parity bit.
|
||||
The key schedule is an expanded form of the key; it is used to speed the
|
||||
encryption process.
|
||||
.PP
|
||||
.I des_read_password
|
||||
writes the string specified by prompt to the standard output,
|
||||
turns off echo and reads an input string from standard input
|
||||
until terminated with a newline.
|
||||
If verify is non-zero, it prompts and reads the input again and verifies
|
||||
that both entered passwords are the same.
|
||||
The entered string is converted into a des key by using the
|
||||
.I des_string_to_key
|
||||
routine.
|
||||
The new key is placed in the
|
||||
.I des_cblock
|
||||
that was passed (by reference) to the routine.
|
||||
If there were no errors,
|
||||
.I des_read_password
|
||||
returns 0,
|
||||
-1 is returned if there was a terminal error and 1 is returned for
|
||||
any other error.
|
||||
.PP
|
||||
.I des_read_2password
|
||||
operates in the same way as
|
||||
.I des_read_password
|
||||
except that it generates 2 keys by using the
|
||||
.I des_string_to_2key
|
||||
function.
|
||||
.PP
|
||||
.I des_read_pw_string
|
||||
is called by
|
||||
.I des_read_password
|
||||
to read and verify a string from a terminal device.
|
||||
The string is returned in
|
||||
.I buf.
|
||||
The size of
|
||||
.I buf
|
||||
is passed to the routine via the
|
||||
.I length
|
||||
parameter.
|
||||
.PP
|
||||
.I des_string_to_key
|
||||
converts a string into a valid des key.
|
||||
.PP
|
||||
.I des_string_to_2key
|
||||
converts a string into 2 valid des keys.
|
||||
This routine is best suited for used to generate keys for use with
|
||||
.I des_3ecb_encrypt.
|
||||
.PP
|
||||
.I des_random_key
|
||||
returns a random key that is made of a combination of process id,
|
||||
time and an increasing counter.
|
||||
.PP
|
||||
Before a des key can be used it is converted into a
|
||||
.I des_key_schedule
|
||||
via the
|
||||
.I des_set_key
|
||||
routine.
|
||||
If the
|
||||
.I des_check_key
|
||||
flag is non-zero,
|
||||
.I des_set_key
|
||||
will check that the key passed is of odd parity and is not a week or
|
||||
semi-weak key.
|
||||
If the parity is wrong,
|
||||
then -1 is returned.
|
||||
If the key is a weak key,
|
||||
then -2 is returned.
|
||||
If an error is returned,
|
||||
the key schedule is not generated.
|
||||
.PP
|
||||
.I des_key_sched
|
||||
is another name for the
|
||||
.I des_set_key
|
||||
function.
|
||||
.PP
|
||||
The following routines mostly operate on an input and output stream of
|
||||
.I des_cblock's.
|
||||
.PP
|
||||
.I des_ecb_encrypt
|
||||
is the basic DES encryption routine that encrypts or decrypts a single 8-byte
|
||||
.I des_cblock
|
||||
in
|
||||
.I electronic code book
|
||||
mode.
|
||||
It always transforms the input data, pointed to by
|
||||
.I input,
|
||||
into the output data,
|
||||
pointed to by the
|
||||
.I output
|
||||
argument.
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero (DES_ENCRYPT),
|
||||
the
|
||||
.I input
|
||||
(cleartext) is encrypted in to the
|
||||
.I output
|
||||
(ciphertext) using the key_schedule specified by the
|
||||
.I schedule
|
||||
argument,
|
||||
previously set via
|
||||
.I des_set_key.
|
||||
If
|
||||
.I encrypt
|
||||
is zero (DES_DECRYPT),
|
||||
the
|
||||
.I input
|
||||
(now ciphertext)
|
||||
is decrypted into the
|
||||
.I output
|
||||
(now cleartext).
|
||||
Input and output may overlap.
|
||||
No meaningful value is returned.
|
||||
.PP
|
||||
.I des_3ecb_encrypt
|
||||
encrypts/decrypts the
|
||||
.I input
|
||||
block by using triple ecb DES encryption.
|
||||
This involves encrypting the input with
|
||||
.I ks1,
|
||||
decryption with the key schedule
|
||||
.I ks2,
|
||||
and then encryption with the first again.
|
||||
This routine greatly reduces the chances of brute force breaking of
|
||||
DES and has the advantage of if
|
||||
.I ks1
|
||||
and
|
||||
.I ks2
|
||||
are the same, it is equivalent to just encryption using ecb mode and
|
||||
.I ks1
|
||||
as the key.
|
||||
.PP
|
||||
.I des_cbc_encrypt
|
||||
encrypts/decrypts using the
|
||||
.I cipher-block-chaining
|
||||
mode of DES.
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero,
|
||||
the routine cipher-block-chain encrypts the cleartext data pointed to by the
|
||||
.I input
|
||||
argument into the ciphertext pointed to by the
|
||||
.I output
|
||||
argument,
|
||||
using the key schedule provided by the
|
||||
.I schedule
|
||||
argument,
|
||||
and initialisation vector provided by the
|
||||
.I ivec
|
||||
argument.
|
||||
If the
|
||||
.I length
|
||||
argument is not an integral multiple of eight bytes,
|
||||
the last block is copied to a temporary area and zero filled.
|
||||
The output is always
|
||||
an integral multiple of eight bytes.
|
||||
To make multiple cbc encrypt calls on a large amount of data appear to
|
||||
be one
|
||||
.I des_cbc_encrypt
|
||||
call, the
|
||||
.I ivec
|
||||
of subsequent calls should be the last 8 bytes of the output.
|
||||
.PP
|
||||
.I des_3cbc_encrypt
|
||||
encrypts/decrypts the
|
||||
.I input
|
||||
block by using triple cbc DES encryption.
|
||||
This involves encrypting the input with key schedule
|
||||
.I ks1,
|
||||
decryption with the key schedule
|
||||
.I ks2,
|
||||
and then encryption with the first again.
|
||||
2 initialisation vectors are required,
|
||||
.I ivec1
|
||||
and
|
||||
.I ivec2.
|
||||
Unlike
|
||||
.I des_cbc_encrypt,
|
||||
these initialisation vectors are modified by the subroutine.
|
||||
This routine greatly reduces the chances of brute force breaking of
|
||||
DES and has the advantage of if
|
||||
.I ks1
|
||||
and
|
||||
.I ks2
|
||||
are the same, it is equivalent to just encryption using cbc mode and
|
||||
.I ks1
|
||||
as the key.
|
||||
.PP
|
||||
.I des_pcbc_encrypt
|
||||
encrypt/decrypts using a modified block chaining mode.
|
||||
It provides better error propagation characteristics than cbc
|
||||
encryption.
|
||||
.PP
|
||||
.I des_cfb_encrypt
|
||||
encrypt/decrypts using cipher feedback mode. This method takes an
|
||||
array of characters as input and outputs and array of characters. It
|
||||
does not require any padding to 8 character groups. Note: the ivec
|
||||
variable is changed and the new changed value needs to be passed to
|
||||
the next call to this function. Since this function runs a complete
|
||||
DES ecb encryption per numbits, this function is only suggested for
|
||||
use when sending small numbers of characters.
|
||||
.PP
|
||||
.I des_ofb_encrypt
|
||||
encrypt using output feedback mode. This method takes an
|
||||
array of characters as input and outputs and array of characters. It
|
||||
does not require any padding to 8 character groups. Note: the ivec
|
||||
variable is changed and the new changed value needs to be passed to
|
||||
the next call to this function. Since this function runs a complete
|
||||
DES ecb encryption per numbits, this function is only suggested for
|
||||
use when sending small numbers of characters.
|
||||
.PP
|
||||
.I des_cbc_cksum
|
||||
produces an 8 byte checksum based on the input stream (via cbc encryption).
|
||||
The last 4 bytes of the checksum is returned and the complete 8 bytes is
|
||||
placed in
|
||||
.I output.
|
||||
.PP
|
||||
.I des_quad_cksum
|
||||
returns a 4 byte checksum from the input bytes.
|
||||
The algorithm can be iterated over the input,
|
||||
depending on
|
||||
.I out_count,
|
||||
1, 2, 3 or 4 times.
|
||||
If
|
||||
.I output
|
||||
is non-NULL,
|
||||
the 8 bytes generated by each pass are written into
|
||||
.I output.
|
||||
.PP
|
||||
.I des_enc_write
|
||||
is used to write
|
||||
.I len
|
||||
bytes
|
||||
to file descriptor
|
||||
.I fd
|
||||
from buffer
|
||||
.I buf.
|
||||
The data is encrypted via
|
||||
.I pcbc_encrypt
|
||||
(default) using
|
||||
.I sched
|
||||
for the key and
|
||||
.I iv
|
||||
as a starting vector.
|
||||
The actual data send down
|
||||
.I fd
|
||||
consists of 4 bytes (in network byte order) containing the length of the
|
||||
following encrypted data. The encrypted data then follows, padded with random
|
||||
data out to a multiple of 8 bytes.
|
||||
.PP
|
||||
.I des_enc_read
|
||||
is used to read
|
||||
.I len
|
||||
bytes
|
||||
from file descriptor
|
||||
.I fd
|
||||
into buffer
|
||||
.I buf.
|
||||
The data being read from
|
||||
.I fd
|
||||
is assumed to have come from
|
||||
.I des_enc_write
|
||||
and is decrypted using
|
||||
.I sched
|
||||
for the key schedule and
|
||||
.I iv
|
||||
for the initial vector.
|
||||
The
|
||||
.I des_enc_read/des_enc_write
|
||||
pair can be used to read/write to files, pipes and sockets.
|
||||
I have used them in implementing a version of rlogin in which all
|
||||
data is encrypted.
|
||||
.PP
|
||||
.I des_rw_mode
|
||||
is used to specify the encryption mode to use with
|
||||
.I des_enc_read
|
||||
and
|
||||
.I des_end_write.
|
||||
If set to
|
||||
.I DES_PCBC_MODE
|
||||
(the default), des_pcbc_encrypt is used.
|
||||
If set to
|
||||
.I DES_CBC_MODE
|
||||
des_cbc_encrypt is used.
|
||||
These two routines and the variable are not part of the normal MIT library.
|
||||
.PP
|
||||
.I des_set_odd_parity
|
||||
sets the parity of the passed
|
||||
.I key
|
||||
to odd. This routine is not part of the standard MIT library.
|
||||
.PP
|
||||
.I des_is_weak_key
|
||||
returns 1 is the passed key is a weak key (pick again :-),
|
||||
0 if it is ok.
|
||||
This routine is not part of the standard MIT library.
|
||||
.PP
|
||||
.I crypt
|
||||
is a replacement for the normal system crypt.
|
||||
It is much faster than the system crypt.
|
||||
.PP
|
||||
.SH FILES
|
||||
/usr/include/des.h
|
||||
.br
|
||||
/usr/lib/libdes.a
|
||||
.PP
|
||||
The encryption routines have been tested on 16bit, 32bit and 64bit
|
||||
machines of various endian and even works under VMS.
|
||||
.PP
|
||||
.SH BUGS
|
||||
.PP
|
||||
If you think this manual is sparse,
|
||||
read the des_crypt(3) manual from the MIT kerberos (or bones outside
|
||||
of the USA) distribution.
|
||||
.PP
|
||||
.I des_cfb_encrypt
|
||||
and
|
||||
.I des_ofb_encrypt
|
||||
operates on input of 8 bits. What this means is that if you set
|
||||
numbits to 12, and length to 2, the first 12 bits will come from the 1st
|
||||
input byte and the low half of the second input byte. The second 12
|
||||
bits will have the low 8 bits taken from the 3rd input byte and the
|
||||
top 4 bits taken from the 4th input byte. The same holds for output.
|
||||
This function has been implemented this way because most people will
|
||||
be using a multiple of 8 and because once you get into pulling bytes input
|
||||
bytes apart things get ugly!
|
||||
.PP
|
||||
.I des_read_pw_string
|
||||
is the most machine/OS dependent function and normally generates the
|
||||
most problems when porting this code.
|
||||
.PP
|
||||
.I des_string_to_key
|
||||
is probably different from the MIT version since there are lots
|
||||
of fun ways to implement one-way encryption of a text string.
|
||||
.PP
|
||||
The routines are optimised for 32 bit machines and so are not efficient
|
||||
on IBM PCs.
|
||||
.SH AUTHOR
|
||||
Eric Young (eay@psych.psy.uq.oz.au),
|
||||
Psychology Department,
|
||||
University of Queensland, Australia.
|
174
lib/des/des_locl.h
Normal file
174
lib/des/des_locl.h
Normal file
@@ -0,0 +1,174 @@
|
||||
/* des_locl.h */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
#ifndef __des_locl_h
|
||||
#define __des_locl_h
|
||||
|
||||
#include "config.h"
|
||||
#include "protos.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <memory.h>
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/stat.h>
|
||||
#include <fcntl.h>
|
||||
#include <time.h>
|
||||
|
||||
#include "des.h"
|
||||
|
||||
#define ITERATIONS 16
|
||||
#define HALF_ITERATIONS 8
|
||||
|
||||
/* used in des_read and des_write */
|
||||
#define MAXWRITE (1024*16)
|
||||
#define BSIZE (MAXWRITE+4)
|
||||
|
||||
#define c2l(c,l) (l =((u_int32_t)(*((c)++))) , \
|
||||
l|=((u_int32_t)(*((c)++)))<< 8, \
|
||||
l|=((u_int32_t)(*((c)++)))<<16, \
|
||||
l|=((u_int32_t)(*((c)++)))<<24)
|
||||
|
||||
/* NOTE - c is not incremented as per c2l */
|
||||
#define c2ln(c,l1,l2,n) { \
|
||||
c+=n; \
|
||||
l1=l2=0; \
|
||||
switch (n) { \
|
||||
case 8: l2|=((u_int32_t)(*(--(c))))<<24; \
|
||||
case 7: l2|=((u_int32_t)(*(--(c))))<<16; \
|
||||
case 6: l2|=((u_int32_t)(*(--(c))))<< 8; \
|
||||
case 5: l2|=((u_int32_t)(*(--(c)))); \
|
||||
case 4: l1|=((u_int32_t)(*(--(c))))<<24; \
|
||||
case 3: l1|=((u_int32_t)(*(--(c))))<<16; \
|
||||
case 2: l1|=((u_int32_t)(*(--(c))))<< 8; \
|
||||
case 1: l1|=((u_int32_t)(*(--(c)))); \
|
||||
} \
|
||||
}
|
||||
|
||||
#define l2c(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>16)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>24)&0xff))
|
||||
|
||||
/* replacements for htonl and ntohl since I have no idea what to do
|
||||
* when faced with machines with 8 byte longs. */
|
||||
#define HDRSIZE 4
|
||||
|
||||
#define n2l(c,l) (l =((u_int32_t)(*((c)++)))<<24, \
|
||||
l|=((u_int32_t)(*((c)++)))<<16, \
|
||||
l|=((u_int32_t)(*((c)++)))<< 8, \
|
||||
l|=((u_int32_t)(*((c)++))))
|
||||
|
||||
#define l2n(l,c) (*((c)++)=(unsigned char)(((l)>>24)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>16)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l) )&0xff))
|
||||
|
||||
/* NOTE - c is not incremented as per l2c */
|
||||
#define l2cn(l1,l2,c,n) { \
|
||||
c+=n; \
|
||||
switch (n) { \
|
||||
case 8: *(--(c))=(unsigned char)(((l2)>>24)&0xff); \
|
||||
case 7: *(--(c))=(unsigned char)(((l2)>>16)&0xff); \
|
||||
case 6: *(--(c))=(unsigned char)(((l2)>> 8)&0xff); \
|
||||
case 5: *(--(c))=(unsigned char)(((l2) )&0xff); \
|
||||
case 4: *(--(c))=(unsigned char)(((l1)>>24)&0xff); \
|
||||
case 3: *(--(c))=(unsigned char)(((l1)>>16)&0xff); \
|
||||
case 2: *(--(c))=(unsigned char)(((l1)>> 8)&0xff); \
|
||||
case 1: *(--(c))=(unsigned char)(((l1) )&0xff); \
|
||||
} \
|
||||
}
|
||||
|
||||
/* The changes to this macro may help or hinder, depending on the
|
||||
* compiler and the achitecture. gcc2 always seems to do well :-).
|
||||
* Inspired by Dana How <how@isl.stanford.edu>
|
||||
* DO NOT use the alternative version on machines with 8 byte longs. */
|
||||
#ifdef ALT_ECB
|
||||
#define D_ENCRYPT(L,R,S) \
|
||||
u=((R^s[S ])<<2); \
|
||||
t= R^s[S+1]; \
|
||||
t=((t>>2)+(t<<30)); \
|
||||
L^= \
|
||||
*(u_int32_t *)(des_SP+0x0100+((t )&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0300+((t>> 8)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0500+((t>>16)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0700+((t>>24)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+ ((u )&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0200+((u>> 8)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0400+((u>>16)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0600+((u>>24)&0xfc));
|
||||
#else /* original version */
|
||||
#ifdef MSDOS
|
||||
#define D_ENCRYPT(L,R,S) \
|
||||
U.l=R^s[S+1]; \
|
||||
T.s[0]=((U.s[0]>>4)|(U.s[1]<<12))&0x3f3f; \
|
||||
T.s[1]=((U.s[1]>>4)|(U.s[0]<<12))&0x3f3f; \
|
||||
U.l=(R^s[S ])&0x3f3f3f3f; \
|
||||
L^= des_SPtrans[1][(T.c[0])]| \
|
||||
des_SPtrans[3][(T.c[1])]| \
|
||||
des_SPtrans[5][(T.c[2])]| \
|
||||
des_SPtrans[7][(T.c[3])]| \
|
||||
des_SPtrans[0][(U.c[0])]| \
|
||||
des_SPtrans[2][(U.c[1])]| \
|
||||
des_SPtrans[4][(U.c[2])]| \
|
||||
des_SPtrans[6][(U.c[3])];
|
||||
#else
|
||||
#define D_ENCRYPT(L,R,S) \
|
||||
u=(R^s[S ]); \
|
||||
t=R^s[S+1]; \
|
||||
t=((t>>4)+(t<<28)); \
|
||||
L^= des_SPtrans[1][(t )&0x3f]| \
|
||||
des_SPtrans[3][(t>> 8)&0x3f]| \
|
||||
des_SPtrans[5][(t>>16)&0x3f]| \
|
||||
des_SPtrans[7][(t>>24)&0x3f]| \
|
||||
des_SPtrans[0][(u )&0x3f]| \
|
||||
des_SPtrans[2][(u>> 8)&0x3f]| \
|
||||
des_SPtrans[4][(u>>16)&0x3f]| \
|
||||
des_SPtrans[6][(u>>24)&0x3f];
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* IP and FP
|
||||
* The problem is more of a geometric problem that random bit fiddling.
|
||||
0 1 2 3 4 5 6 7 62 54 46 38 30 22 14 6
|
||||
8 9 10 11 12 13 14 15 60 52 44 36 28 20 12 4
|
||||
16 17 18 19 20 21 22 23 58 50 42 34 26 18 10 2
|
||||
24 25 26 27 28 29 30 31 to 56 48 40 32 24 16 8 0
|
||||
|
||||
32 33 34 35 36 37 38 39 63 55 47 39 31 23 15 7
|
||||
40 41 42 43 44 45 46 47 61 53 45 37 29 21 13 5
|
||||
48 49 50 51 52 53 54 55 59 51 43 35 27 19 11 3
|
||||
56 57 58 59 60 61 62 63 57 49 41 33 25 17 9 1
|
||||
|
||||
The output has been subject to swaps of the form
|
||||
0 1 -> 3 1 but the odd and even bits have been put into
|
||||
2 3 2 0
|
||||
different words. The main trick is to remember that
|
||||
t=((l>>size)^r)&(mask);
|
||||
r^=t;
|
||||
l^=(t<<size);
|
||||
can be used to swap and move bits between words.
|
||||
|
||||
So l = 0 1 2 3 r = 16 17 18 19
|
||||
4 5 6 7 20 21 22 23
|
||||
8 9 10 11 24 25 26 27
|
||||
12 13 14 15 28 29 30 31
|
||||
becomes (for size == 2 and mask == 0x3333)
|
||||
t = 2^16 3^17 -- -- l = 0 1 16 17 r = 2 3 18 19
|
||||
6^20 7^21 -- -- 4 5 20 21 6 7 22 23
|
||||
10^24 11^25 -- -- 8 9 24 25 10 11 24 25
|
||||
14^28 15^29 -- -- 12 13 28 29 14 15 28 29
|
||||
|
||||
Thanks for hints from Richard Outerbridge - he told me IP&FP
|
||||
could be done in 15 xor, 10 shifts and 5 ands.
|
||||
When I finally started to think of the problem in 2D
|
||||
I first got ~42 operations without xors. When I remembered
|
||||
how to use xors :-) I got it to its final state.
|
||||
*/
|
||||
#define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
|
||||
(b)^=(t),\
|
||||
(a)^=((t)<<(n)))
|
||||
|
||||
|
||||
#endif /* __des_locl_h */
|
373
lib/des/destest.c
Normal file
373
lib/des/destest.c
Normal file
@@ -0,0 +1,373 @@
|
||||
/* destest.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include <stdio.h>
|
||||
#include "des_locl.h" /* for des.h and bcopy macros */
|
||||
/* tisk tisk - the test keys don't all have odd parity :-( */
|
||||
|
||||
#if defined(__STDC__) || defined(VMS) || defined(M_XENIX) || defined(MSDOS)
|
||||
#include <string.h>
|
||||
#define bcopy(f,t,n) memcpy(t,f,(size_t)(n))
|
||||
#define bzero(s,n) memset(s,0,(size_t)(n))
|
||||
#define bcmp(a,b,n) memcmp(a, b,(size_t)(n))
|
||||
#define index(s,c) strchr(s,c)
|
||||
#endif
|
||||
|
||||
/* test data */
|
||||
#define NUM_TESTS 34
|
||||
static unsigned char key_data[NUM_TESTS][8]={
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x30,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFE,0xDC,0xBA,0x98,0x76,0x54,0x32,0x10,
|
||||
0x7C,0xA1,0x10,0x45,0x4A,0x1A,0x6E,0x57,
|
||||
0x01,0x31,0xD9,0x61,0x9D,0xC1,0x37,0x6E,
|
||||
0x07,0xA1,0x13,0x3E,0x4A,0x0B,0x26,0x86,
|
||||
0x38,0x49,0x67,0x4C,0x26,0x02,0x31,0x9E,
|
||||
0x04,0xB9,0x15,0xBA,0x43,0xFE,0xB5,0xB6,
|
||||
0x01,0x13,0xB9,0x70,0xFD,0x34,0xF2,0xCE,
|
||||
0x01,0x70,0xF1,0x75,0x46,0x8F,0xB5,0xE6,
|
||||
0x43,0x29,0x7F,0xAD,0x38,0xE3,0x73,0xFE,
|
||||
0x07,0xA7,0x13,0x70,0x45,0xDA,0x2A,0x16,
|
||||
0x04,0x68,0x91,0x04,0xC2,0xFD,0x3B,0x2F,
|
||||
0x37,0xD0,0x6B,0xB5,0x16,0xCB,0x75,0x46,
|
||||
0x1F,0x08,0x26,0x0D,0x1A,0xC2,0x46,0x5E,
|
||||
0x58,0x40,0x23,0x64,0x1A,0xBA,0x61,0x76,
|
||||
0x02,0x58,0x16,0x16,0x46,0x29,0xB0,0x07,
|
||||
0x49,0x79,0x3E,0xBC,0x79,0xB3,0x25,0x8F,
|
||||
0x4F,0xB0,0x5E,0x15,0x15,0xAB,0x73,0xA7,
|
||||
0x49,0xE9,0x5D,0x6D,0x4C,0xA2,0x29,0xBF,
|
||||
0x01,0x83,0x10,0xDC,0x40,0x9B,0x26,0xD6,
|
||||
0x1C,0x58,0x7F,0x1C,0x13,0x92,0x4F,0xEF,
|
||||
0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,
|
||||
0x1F,0x1F,0x1F,0x1F,0x0E,0x0E,0x0E,0x0E,
|
||||
0xE0,0xFE,0xE0,0xFE,0xF1,0xFE,0xF1,0xFE,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0xFE,0xDC,0xBA,0x98,0x76,0x54,0x32,0x10};
|
||||
|
||||
static unsigned char plain_data[NUM_TESTS][8]={
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x10,0x00,0x00,0x00,0x00,0x00,0x00,0x01,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0xA1,0xD6,0xD0,0x39,0x77,0x67,0x42,
|
||||
0x5C,0xD5,0x4C,0xA8,0x3D,0xEF,0x57,0xDA,
|
||||
0x02,0x48,0xD4,0x38,0x06,0xF6,0x71,0x72,
|
||||
0x51,0x45,0x4B,0x58,0x2D,0xDF,0x44,0x0A,
|
||||
0x42,0xFD,0x44,0x30,0x59,0x57,0x7F,0xA2,
|
||||
0x05,0x9B,0x5E,0x08,0x51,0xCF,0x14,0x3A,
|
||||
0x07,0x56,0xD8,0xE0,0x77,0x47,0x61,0xD2,
|
||||
0x76,0x25,0x14,0xB8,0x29,0xBF,0x48,0x6A,
|
||||
0x3B,0xDD,0x11,0x90,0x49,0x37,0x28,0x02,
|
||||
0x26,0x95,0x5F,0x68,0x35,0xAF,0x60,0x9A,
|
||||
0x16,0x4D,0x5E,0x40,0x4F,0x27,0x52,0x32,
|
||||
0x6B,0x05,0x6E,0x18,0x75,0x9F,0x5C,0xCA,
|
||||
0x00,0x4B,0xD6,0xEF,0x09,0x17,0x60,0x62,
|
||||
0x48,0x0D,0x39,0x00,0x6E,0xE7,0x62,0xF2,
|
||||
0x43,0x75,0x40,0xC8,0x69,0x8F,0x3C,0xFA,
|
||||
0x07,0x2D,0x43,0xA0,0x77,0x07,0x52,0x92,
|
||||
0x02,0xFE,0x55,0x77,0x81,0x17,0xF1,0x2A,
|
||||
0x1D,0x9D,0x5C,0x50,0x18,0xF7,0x28,0xC2,
|
||||
0x30,0x55,0x32,0x28,0x6D,0x6F,0x29,0x5A,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF};
|
||||
|
||||
static unsigned char cipher_data[NUM_TESTS][8]={
|
||||
0x8C,0xA6,0x4D,0xE9,0xC1,0xB1,0x23,0xA7,
|
||||
0x73,0x59,0xB2,0x16,0x3E,0x4E,0xDC,0x58,
|
||||
0x95,0x8E,0x6E,0x62,0x7A,0x05,0x55,0x7B,
|
||||
0xF4,0x03,0x79,0xAB,0x9E,0x0E,0xC5,0x33,
|
||||
0x17,0x66,0x8D,0xFC,0x72,0x92,0x53,0x2D,
|
||||
0x8A,0x5A,0xE1,0xF8,0x1A,0xB8,0xF2,0xDD,
|
||||
0x8C,0xA6,0x4D,0xE9,0xC1,0xB1,0x23,0xA7,
|
||||
0xED,0x39,0xD9,0x50,0xFA,0x74,0xBC,0xC4,
|
||||
0x69,0x0F,0x5B,0x0D,0x9A,0x26,0x93,0x9B,
|
||||
0x7A,0x38,0x9D,0x10,0x35,0x4B,0xD2,0x71,
|
||||
0x86,0x8E,0xBB,0x51,0xCA,0xB4,0x59,0x9A,
|
||||
0x71,0x78,0x87,0x6E,0x01,0xF1,0x9B,0x2A,
|
||||
0xAF,0x37,0xFB,0x42,0x1F,0x8C,0x40,0x95,
|
||||
0x86,0xA5,0x60,0xF1,0x0E,0xC6,0xD8,0x5B,
|
||||
0x0C,0xD3,0xDA,0x02,0x00,0x21,0xDC,0x09,
|
||||
0xEA,0x67,0x6B,0x2C,0xB7,0xDB,0x2B,0x7A,
|
||||
0xDF,0xD6,0x4A,0x81,0x5C,0xAF,0x1A,0x0F,
|
||||
0x5C,0x51,0x3C,0x9C,0x48,0x86,0xC0,0x88,
|
||||
0x0A,0x2A,0xEE,0xAE,0x3F,0xF4,0xAB,0x77,
|
||||
0xEF,0x1B,0xF0,0x3E,0x5D,0xFA,0x57,0x5A,
|
||||
0x88,0xBF,0x0D,0xB6,0xD7,0x0D,0xEE,0x56,
|
||||
0xA1,0xF9,0x91,0x55,0x41,0x02,0x0B,0x56,
|
||||
0x6F,0xBF,0x1C,0xAF,0xCF,0xFD,0x05,0x56,
|
||||
0x2F,0x22,0xE4,0x9B,0xAB,0x7C,0xA1,0xAC,
|
||||
0x5A,0x6B,0x61,0x2C,0xC2,0x6C,0xCE,0x4A,
|
||||
0x5F,0x4C,0x03,0x8E,0xD1,0x2B,0x2E,0x41,
|
||||
0x63,0xFA,0xC0,0xD0,0x34,0xD9,0xF7,0x93,
|
||||
0x61,0x7B,0x3A,0x0C,0xE8,0xF0,0x71,0x00,
|
||||
0xDB,0x95,0x86,0x05,0xF8,0xC8,0xC6,0x06,
|
||||
0xED,0xBF,0xD1,0xC6,0x6C,0x29,0xCC,0xC7,
|
||||
0x35,0x55,0x50,0xB2,0x15,0x0E,0x24,0x51,
|
||||
0xCA,0xAA,0xAF,0x4D,0xEA,0xF1,0xDB,0xAE,
|
||||
0xD5,0xD4,0x4F,0xF7,0x20,0x68,0x3D,0x0D,
|
||||
0x2A,0x2B,0xB0,0x08,0xDF,0x97,0xC2,0xF2};
|
||||
|
||||
static unsigned char cbc_key[8]={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef};
|
||||
static unsigned char cbc_iv[8]={0xfe,0xdc,0xba,0x98,0x76,0x54,0x32,0x10};
|
||||
static unsigned char cbc_data[40]="7654321 Now is the time for ";
|
||||
|
||||
static unsigned char cbc_ok[32]={
|
||||
0xcc,0xd1,0x73,0xff,0xab,0x20,0x39,0xf4,
|
||||
0xac,0xd8,0xae,0xfd,0xdf,0xd8,0xa1,0xeb,
|
||||
0x46,0x8e,0x91,0x15,0x78,0x88,0xba,0x68,
|
||||
0x1d,0x26,0x93,0x97,0xf7,0xfe,0x62,0xb4};
|
||||
|
||||
static unsigned char pcbc_ok[32]={
|
||||
0xcc,0xd1,0x73,0xff,0xab,0x20,0x39,0xf4,
|
||||
0x6d,0xec,0xb4,0x70,0xa0,0xe5,0x6b,0x15,
|
||||
0xae,0xa6,0xbf,0x61,0xed,0x7d,0x9c,0x9f,
|
||||
0xf7,0x17,0x46,0x3b,0x8a,0xb3,0xcc,0x88};
|
||||
|
||||
static unsigned char cksum_ok[8]={
|
||||
0x1d,0x26,0x93,0x97,0xf7,0xfe,0x62,0xb4};
|
||||
|
||||
static unsigned char cfb_key[8]={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef};
|
||||
static unsigned char cfb_iv[8]={0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef};
|
||||
static unsigned char cfb_buf1[24],cfb_buf2[24],cfb_tmp[8];
|
||||
static unsigned char cfb_plain[24]=
|
||||
{
|
||||
0x4e,0x6f,0x77,0x20,0x69,0x73,
|
||||
0x20,0x74,0x68,0x65,0x20,0x74,
|
||||
0x69,0x6d,0x65,0x20,0x66,0x6f,
|
||||
0x72,0x20,0x61,0x6c,0x6c,0x20
|
||||
};
|
||||
static unsigned char cfb_cipher[24]=
|
||||
{
|
||||
0xf3,0x1f,0xda,0x07,0x01,0x14,
|
||||
0x62,0xee,0x18,0x7f,0x43,0xd8,
|
||||
0x0a,0x7c,0xd9,0xb5,0xb0,0xd2,
|
||||
0x90,0xda,0x6e,0x5b,0x9a,0x87
|
||||
};
|
||||
|
||||
static unsigned char ofb_key[8]={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef};
|
||||
static unsigned char ofb_iv[8]={0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef};
|
||||
static unsigned char ofb_plain[24]=
|
||||
{
|
||||
0x4e,0x6f,0x77,0x20,0x69,0x73,
|
||||
0x20,0x74,0x68,0x65,0x20,0x74,
|
||||
0x69,0x6d,0x65,0x20,0x66,0x6f,
|
||||
0x72,0x20,0x61,0x6c,0x6c,0x20
|
||||
};
|
||||
static unsigned char ofb_buf1[24],ofb_buf2[24],ofb_tmp[8];
|
||||
static unsigned char ofb_cipher[24]=
|
||||
{
|
||||
0xf3,0x09,0x62,0x49,0xc7,0xf4,0x6e,0x51,
|
||||
0x35,0xf2,0x4a,0x24,0x2e,0xeb,0x3d,0x3f,
|
||||
0x3d,0x6d,0x5b,0xe3,0x25,0x5a,0xf8,0xc3
|
||||
};
|
||||
|
||||
char *malloc(size_t);
|
||||
char *pt(unsigned char *p);
|
||||
|
||||
int
|
||||
main(void)
|
||||
{
|
||||
int i,j;
|
||||
des_cblock in,out,outin;
|
||||
des_key_schedule ks;
|
||||
unsigned char cbc_in[40],cbc_out[40];
|
||||
u_int32_t cs;
|
||||
unsigned char qret[4][4];
|
||||
u_int32_t lqret[4];
|
||||
char *str;
|
||||
|
||||
printf("Doing ecb\n");
|
||||
for (i=0; i<NUM_TESTS; i++)
|
||||
{
|
||||
if ((j=des_key_sched((des_cblock *)(key_data[i]),ks)) != 0)
|
||||
printf("Key error %2d:%d\n",i+1,j);
|
||||
bcopy(plain_data[i],in,8);
|
||||
bzero(out,8);
|
||||
bzero(outin,8);
|
||||
des_ecb_encrypt((des_cblock *)in,(des_cblock *)out,ks,DES_ENCRYPT);
|
||||
des_ecb_encrypt((des_cblock *)out,(des_cblock *)outin,ks,DES_DECRYPT);
|
||||
|
||||
if (bcmp(out,cipher_data[i],8) != 0)
|
||||
{
|
||||
printf("Encryption error %2d\nk=%s p=%s o=%s act=%s\n",
|
||||
i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]),
|
||||
pt(out));
|
||||
}
|
||||
if (bcmp(in,outin,8) != 0)
|
||||
{
|
||||
printf("Decryption error %2d\nk=%s p=%s o=%s act=%s\n",
|
||||
i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
|
||||
}
|
||||
}
|
||||
|
||||
printf("Doing cbc\n");
|
||||
if ((j=des_key_sched((des_cblock *)cbc_key,ks)) != 0)
|
||||
printf("Key error %2d:%d\n",i+1,j);
|
||||
bzero(cbc_out,40);
|
||||
bzero(cbc_in,40);
|
||||
des_cbc_encrypt((des_cblock *)cbc_data,(des_cblock *)cbc_out,
|
||||
(long)strlen(cbc_data),ks,(des_cblock *)cbc_iv,DES_ENCRYPT);
|
||||
if (bcmp(cbc_out,cbc_ok,32) != 0)
|
||||
printf("cbc_encrypt encrypt error\n");
|
||||
des_cbc_encrypt((des_cblock *)cbc_out,(des_cblock *)cbc_in,
|
||||
(long)strlen(cbc_data),ks,(des_cblock *)cbc_iv,DES_DECRYPT);
|
||||
if (bcmp(cbc_in,cbc_data,32) != 0)
|
||||
printf("cbc_encrypt decrypt error\n");
|
||||
|
||||
printf("Doing pcbc\n");
|
||||
if ((j=des_key_sched((des_cblock *)cbc_key,ks)) != 0)
|
||||
printf("Key error %2d:%d\n",i+1,j);
|
||||
bzero(cbc_out,40);
|
||||
bzero(cbc_in,40);
|
||||
des_pcbc_encrypt((des_cblock *)cbc_data,(des_cblock *)cbc_out,
|
||||
(long)strlen(cbc_data),ks,(des_cblock *)cbc_iv,DES_ENCRYPT);
|
||||
if (bcmp(cbc_out,pcbc_ok,32) != 0)
|
||||
printf("pcbc_encrypt encrypt error\n");
|
||||
des_pcbc_encrypt((des_cblock *)cbc_out,(des_cblock *)cbc_in,
|
||||
(long)strlen(cbc_data),ks,(des_cblock *)cbc_iv,DES_DECRYPT);
|
||||
if (bcmp(cbc_in,cbc_data,32) != 0)
|
||||
printf("pcbc_encrypt decrypt error\n");
|
||||
|
||||
printf("Doing cfb\n");
|
||||
des_key_sched((des_cblock *)cfb_key,ks);
|
||||
bcopy(cfb_iv,cfb_tmp,sizeof(cfb_iv));
|
||||
des_cfb_encrypt(cfb_plain,cfb_buf1,8,(long)sizeof(cfb_plain),ks,
|
||||
(des_cblock *)cfb_tmp,DES_ENCRYPT);
|
||||
if (bcmp(cfb_cipher,cfb_buf1,sizeof(cfb_buf1)) != 0)
|
||||
printf("cfb_encrypt encrypt error\n");
|
||||
bcopy(cfb_iv,cfb_tmp,sizeof(cfb_iv));
|
||||
des_cfb_encrypt(cfb_buf1,cfb_buf2,8,(long)sizeof(cfb_buf1),ks,
|
||||
(des_cblock *)cfb_tmp,DES_DECRYPT);
|
||||
if (bcmp(cfb_plain,cfb_buf2,sizeof(cfb_buf2)) != 0)
|
||||
printf("cfb_encrypt decrypt error\n");
|
||||
|
||||
bcopy(cfb_iv,cfb_tmp,sizeof(cfb_iv));
|
||||
for (i=0; i<sizeof(cfb_plain); i++)
|
||||
des_cfb_encrypt(&(cfb_plain[i]),&(cfb_buf1[i]),
|
||||
8,(long)1,ks,(des_cblock *)cfb_tmp,DES_ENCRYPT);
|
||||
if (bcmp(cfb_cipher,cfb_buf1,sizeof(cfb_buf1)) != 0)
|
||||
printf("cfb_encrypt small encrypt error\n");
|
||||
|
||||
bcopy(cfb_iv,cfb_tmp,sizeof(cfb_iv));
|
||||
for (i=0; i<sizeof(cfb_plain); i++)
|
||||
des_cfb_encrypt(&(cfb_buf1[i]),&(cfb_buf2[i]),
|
||||
8,(long)1,ks,(des_cblock *)cfb_tmp,DES_DECRYPT);
|
||||
if (bcmp(cfb_plain,cfb_buf2,sizeof(cfb_buf2)) != 0)
|
||||
printf("cfb_encrypt small decrypt error\n");
|
||||
|
||||
printf("Doing ofb\n");
|
||||
des_key_sched((des_cblock *)ofb_key,ks);
|
||||
bcopy(ofb_iv,ofb_tmp,sizeof(ofb_iv));
|
||||
des_ofb_encrypt(ofb_plain,ofb_buf1,64,(long)sizeof(cfb_plain)/8,ks,
|
||||
(des_cblock *)ofb_tmp);
|
||||
if (bcmp(ofb_cipher,ofb_buf1,sizeof(ofb_buf1)) != 0)
|
||||
printf("ofb_encrypt encrypt error\n");
|
||||
bcopy(ofb_iv,ofb_tmp,sizeof(ofb_iv));
|
||||
des_ofb_encrypt(ofb_buf1,ofb_buf2,64,(long)sizeof(ofb_buf1)/8,ks,
|
||||
(des_cblock *)ofb_tmp);
|
||||
if (bcmp(ofb_plain,ofb_buf2,sizeof(ofb_buf2)) != 0)
|
||||
printf("ofb_encrypt decrypt error\n");
|
||||
|
||||
printf("Doing cbc_cksum\n");
|
||||
des_cbc_cksum((des_cblock *)cbc_data,(des_cblock *)cbc_out,
|
||||
(long)strlen(cbc_data),ks,(des_cblock *)cbc_iv);
|
||||
if (bcmp(cbc_out,cksum_ok,8) != 0)
|
||||
printf("cbc_cksum error\n");
|
||||
|
||||
printf("Doing quad_cksum\n");
|
||||
cs=des_quad_cksum((des_cblock *)cbc_data,(des_cblock *)qret,
|
||||
(long)strlen(cbc_data),2,(des_cblock *)cbc_iv);
|
||||
for (i=0; i<4; i++)
|
||||
{
|
||||
lqret[i]=0;
|
||||
bcopy(&(qret[i][0]),&(lqret[i]),4);
|
||||
}
|
||||
{ /* Big-endian fix */
|
||||
static u_int32_t l=1;
|
||||
static unsigned char *c=(unsigned char *)&l;
|
||||
u_int32_t ll;
|
||||
|
||||
if (!c[0])
|
||||
{
|
||||
ll=lqret[0]^lqret[3];
|
||||
lqret[0]^=ll;
|
||||
lqret[3]^=ll;
|
||||
ll=lqret[1]^lqret[2];
|
||||
lqret[1]^=ll;
|
||||
lqret[2]^=ll;
|
||||
}
|
||||
}
|
||||
if (cs != 0x70d7a63a)
|
||||
printf("quad_cksum error, ret %08x should be 70d7a63a\n",cs);
|
||||
if (lqret[0] != 0x327eba8d)
|
||||
printf("quad_cksum error, out[0] %08x is not %08x\n",
|
||||
lqret[0],0x327eba8d);
|
||||
if (lqret[1] != 0x201a49cc)
|
||||
printf("quad_cksum error, out[1] %08x is not %08x\n",
|
||||
lqret[1],0x201a49cc);
|
||||
if (lqret[2] != 0x70d7a63a)
|
||||
printf("quad_cksum error, out[2] %08x is not %08x\n",
|
||||
lqret[2],0x70d7a63a);
|
||||
if (lqret[3] != 0x501c2c26)
|
||||
printf("quad_cksum error, out[3] %08x is not %08x\n",
|
||||
lqret[3],0x501c2c26);
|
||||
|
||||
printf("input word alignment test");
|
||||
for (i=0; i<4; i++)
|
||||
{
|
||||
printf(" %d",i);
|
||||
des_cbc_encrypt((des_cblock *)&(cbc_out[i]),(des_cblock *)cbc_in,
|
||||
(long)strlen(cbc_data),ks,(des_cblock *)cbc_iv,
|
||||
DES_ENCRYPT);
|
||||
}
|
||||
printf("\noutput word alignment test");
|
||||
for (i=0; i<4; i++)
|
||||
{
|
||||
printf(" %d",i);
|
||||
des_cbc_encrypt((des_cblock *)cbc_out,(des_cblock *)&(cbc_in[i]),
|
||||
(long)strlen(cbc_data),ks,(des_cblock *)cbc_iv,
|
||||
DES_ENCRYPT);
|
||||
}
|
||||
printf("\n");
|
||||
printf("fast crypt test ");
|
||||
str=crypt("testing","ef");
|
||||
if (strcmp("efGnQx2725bI2",str) != 0)
|
||||
printf("fast crypt error, %x should be efGnQx2725bI2\n",str);
|
||||
str=crypt("bca76;23","yA");
|
||||
if (strcmp("yA1Rp/1hZXIJk",str) != 0)
|
||||
printf("fast crypt error, %x should be yA1Rp/1hZXIJk\n",str);
|
||||
printf("\n");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
char *pt(unsigned char *p)
|
||||
{
|
||||
char *ret;
|
||||
int i;
|
||||
static char *f="0123456789ABCDEF";
|
||||
|
||||
ret=(char *)malloc(17);
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
ret[i*2]=f[(p[i]>>4)&0xf];
|
||||
ret[i*2+1]=f[p[i]&0xf];
|
||||
}
|
||||
ret[16]='\0';
|
||||
return(ret);
|
||||
}
|
||||
|
46
lib/des/doIP
Executable file
46
lib/des/doIP
Executable file
@@ -0,0 +1,46 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@l=(
|
||||
0, 1, 2, 3, 4, 5, 6, 7,
|
||||
8, 9,10,11,12,13,14,15,
|
||||
16,17,18,19,20,21,22,23,
|
||||
24,25,26,27,28,29,30,31
|
||||
);
|
||||
@r=(
|
||||
32,33,34,35,36,37,38,39,
|
||||
40,41,42,43,44,45,46,47,
|
||||
48,49,50,51,52,53,54,55,
|
||||
56,57,58,59,60,61,62,63
|
||||
);
|
||||
|
||||
require 'shifts.pl';
|
||||
|
||||
sub PERM_OP
|
||||
{
|
||||
local(*a,*b,*t,$n,$m)=@_;
|
||||
|
||||
@z=&shift(*a,-$n);
|
||||
@z=&xor(*b,*z);
|
||||
@z=&and(*z,$m);
|
||||
@b=&xor(*b,*z);
|
||||
@z=&shift(*z,$n);
|
||||
@a=&xor(*a,*z);
|
||||
}
|
||||
|
||||
|
||||
@L=@l;
|
||||
@R=@r;
|
||||
&PERM_OP(*R,*L,*T,4,0x0f0f0f0f);
|
||||
&PERM_OP(*L,*R,*T,16,0x0000ffff);
|
||||
&PERM_OP(*R,*L,*T,2,0x33333333);
|
||||
&PERM_OP(*L,*R,*T,8,0x00ff00ff);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
&printit(@L);
|
||||
&printit(@R);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
&PERM_OP(*L,*R,*T,8,0x00ff00ff);
|
||||
&PERM_OP(*R,*L,*T,2,0x33333333);
|
||||
&PERM_OP(*L,*R,*T,16,0x0000ffff);
|
||||
&PERM_OP(*R,*L,*T,4,0x0f0f0f0f);
|
||||
&printit(@L);
|
||||
&printit(@R);
|
110
lib/des/doPC1
Executable file
110
lib/des/doPC1
Executable file
@@ -0,0 +1,110 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@l=(
|
||||
0, 1, 2, 3, 4, 5, 6, 7,
|
||||
8, 9,10,11,12,13,14,15,
|
||||
16,17,18,19,20,21,22,23,
|
||||
24,25,26,27,28,29,30,31
|
||||
);
|
||||
@r=(
|
||||
32,33,34,35,36,37,38,39,
|
||||
40,41,42,43,44,45,46,47,
|
||||
48,49,50,51,52,53,54,55,
|
||||
56,57,58,59,60,61,62,63
|
||||
);
|
||||
|
||||
require 'shifts.pl';
|
||||
|
||||
sub PERM_OP
|
||||
{
|
||||
local(*a,*b,*t,$n,$m)=@_;
|
||||
|
||||
@z=&shift(*a,-$n);
|
||||
@z=&xor(*b,*z);
|
||||
@z=&and(*z,$m);
|
||||
@b=&xor(*b,*z);
|
||||
@z=&shift(*z,$n);
|
||||
@a=&xor(*a,*z);
|
||||
}
|
||||
|
||||
sub HPERM_OP2
|
||||
{
|
||||
local(*a,*t,$n,$m)=@_;
|
||||
local(@x,@y,$i);
|
||||
|
||||
@z=&shift(*a,16-$n);
|
||||
@z=&xor(*a,*z);
|
||||
@z=&and(*z,$m);
|
||||
@a=&xor(*a,*z);
|
||||
@z=&shift(*z,$n-16);
|
||||
@a=&xor(*a,*z);
|
||||
}
|
||||
|
||||
sub HPERM_OP
|
||||
{
|
||||
local(*a,*t,$n,$m)=@_;
|
||||
local(@x,@y,$i);
|
||||
|
||||
for ($i=0; $i<16; $i++)
|
||||
{
|
||||
$x[$i]=$a[$i];
|
||||
$y[$i]=$a[16+$i];
|
||||
}
|
||||
@z=&shift(*x,-$n);
|
||||
@z=&xor(*y,*z);
|
||||
@z=&and(*z,$m);
|
||||
@y=&xor(*y,*z);
|
||||
@z=&shift(*z,$n);
|
||||
@x=&xor(*x,*z);
|
||||
for ($i=0; $i<16; $i++)
|
||||
{
|
||||
$a[$i]=$x[$i];
|
||||
$a[16+$i]=$y[$i];
|
||||
}
|
||||
}
|
||||
|
||||
@L=@l;
|
||||
@R=@r;
|
||||
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*R,*L,*T,4,0x0f0f0f0f);
|
||||
print "---\n"; &printit(@R);
|
||||
&HPERM_OP2(*L,*T,-2,0xcccc0000);
|
||||
&HPERM_OP2(*R,*T,-2,0xcccc0000);
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*L,*R,*T,8,0x00ff00ff);
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
print "---\n"; &printit(@R);
|
||||
# &printit(@L);
|
||||
&printit(@R);
|
||||
print <<"EOF";
|
||||
==============================
|
||||
63 55 47 39 31 23 15 7
|
||||
62 54 46 38 30 22 14 6
|
||||
61 53 45 37 29 21 13 5
|
||||
60 52 44 36 -- -- -- --
|
||||
|
||||
57 49 41 33 25 17 9 1
|
||||
58 50 42 34 26 18 10 2
|
||||
59 51 43 35 27 19 11 3
|
||||
28 20 12 4 -- -- -- --
|
||||
EOF
|
||||
exit(1);
|
||||
@A=&and(*R,0x000000ff);
|
||||
@A=&shift(*A,16);
|
||||
@B=&and(*R,0x0000ff00);
|
||||
@C=&and(*R,0x00ff0000);
|
||||
@C=&shift(*C,-16);
|
||||
@D=&and(*L,0xf0000000);
|
||||
@D=&shift(*D,-4);
|
||||
@A=&or(*A,*B);
|
||||
@B=&or(*D,*C);
|
||||
@R=&or(*A,*B);
|
||||
@L=&and(*L,0x0fffffff);
|
||||
|
||||
&printit(@L);
|
||||
&printit(@R);
|
||||
|
94
lib/des/doPC2
Executable file
94
lib/des/doPC2
Executable file
@@ -0,0 +1,94 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@PC2_C=(14,17,11,24, 1, 5,
|
||||
3,28,15, 6,21,10,
|
||||
23,19,12, 4,26, 8,
|
||||
16, 7,27,20,13, 2,
|
||||
);
|
||||
|
||||
@PC2_D=(41,52,31,37,47,55,
|
||||
30,40,51,45,33,48,
|
||||
44,49,39,56,34,53,
|
||||
46,42,50,36,29,32,
|
||||
);
|
||||
|
||||
$i=0;
|
||||
foreach (@PC2_C) {
|
||||
$_--;
|
||||
# printf "%2d,",$_;
|
||||
$C{$_}=$i;
|
||||
++$i;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
$i=0;
|
||||
#print "\n";
|
||||
foreach (@PC2_D) {
|
||||
$_-=28;
|
||||
$_--;
|
||||
# printf "%2d,",$_;
|
||||
$D{$_}=$i;
|
||||
$i++;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
|
||||
#print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$C{$i};
|
||||
# printf "%2d,",$_;
|
||||
$i++;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
#print "\n";
|
||||
|
||||
#print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$D{$i};
|
||||
# printf "%2d,",$_;
|
||||
$i++;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
#print "\n";
|
||||
|
||||
print "static ulong skb[8][64]={\n";
|
||||
&doit("C",*C, 0, 1, 2, 3, 4, 5);
|
||||
&doit("C",*C, 6, 7, 9,10,11,12);
|
||||
&doit("C",*C,13,14,15,16,18,19);
|
||||
&doit("C",*C,20,22,23,25,26,27);
|
||||
|
||||
&doit("D",*D, 0, 1, 2, 3, 4, 5);
|
||||
&doit("D",*D, 7, 8,10,11,12,13);
|
||||
&doit("D",*D,15,16,17,18,19,20);
|
||||
&doit("D",*D,21,22,23,24,26,27);
|
||||
print "};\n";
|
||||
|
||||
sub doit
|
||||
{
|
||||
local($l,*A,@b)=@_;
|
||||
local(@out);
|
||||
|
||||
printf("/* for $l bits (numbered as per FIPS 46) %d %d %d %d %d %d */\n",
|
||||
$b[0]+1, $b[1]+1, $b[2]+1, $b[3]+1, $b[4]+1, $b[5]+1);
|
||||
for ($i=0; $i<64; $i++)
|
||||
{
|
||||
$out[$i]=0;
|
||||
$j=1;
|
||||
#print "\n";
|
||||
for ($k=0; $k<6; $k++)
|
||||
{
|
||||
$l=$A{$b[$k]};
|
||||
#print"$l - ";
|
||||
if ((1<<$k) & $i)
|
||||
{
|
||||
$ll=int($l/6)*8+($l%6);
|
||||
$out[$i]|=1<<($ll);
|
||||
}
|
||||
}
|
||||
$pp=$out[$i];
|
||||
$pp=($pp&0xff0000ff)| (($pp&0x00ff0000)>>8)|
|
||||
(($pp&0x0000ff00)<<8);
|
||||
printf("0x%08X,",$pp);
|
||||
print "\n" if (($i+1) % 4 == 0);
|
||||
}
|
||||
}
|
110
lib/des/ecb_enc.c
Normal file
110
lib/des/ecb_enc.c
Normal file
@@ -0,0 +1,110 @@
|
||||
/* ecb_enc.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
#include "spr.h"
|
||||
|
||||
int des_ecb_encrypt(des_cblock (*input), des_cblock (*output), struct des_ks_struct *ks, int encrypt)
|
||||
{
|
||||
register u_int32_t l0,l1;
|
||||
register unsigned char *in,*out;
|
||||
u_int32_t ll[2];
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
c2l(in,l0);
|
||||
c2l(in,l1);
|
||||
ll[0]=l0;
|
||||
ll[1]=l1;
|
||||
des_encrypt(ll,ll,ks,encrypt);
|
||||
l0=ll[0];
|
||||
l1=ll[1];
|
||||
l2c(l0,out);
|
||||
l2c(l1,out);
|
||||
l0=l1=ll[0]=ll[1]=0;
|
||||
return(0);
|
||||
}
|
||||
|
||||
int des_encrypt(u_int32_t *input, u_int32_t *output, struct des_ks_struct *ks, int encrypt)
|
||||
{
|
||||
register u_int32_t l,r,t,u;
|
||||
#ifdef ALT_ECB
|
||||
register unsigned char *des_SP=(unsigned char *)des_SPtrans;
|
||||
#endif
|
||||
#ifdef MSDOS
|
||||
union fudge {
|
||||
u_int32_t l;
|
||||
unsigned short s[2];
|
||||
unsigned char c[4];
|
||||
} U,T;
|
||||
#endif
|
||||
register int i;
|
||||
register u_int32_t *s;
|
||||
|
||||
l=input[0];
|
||||
r=input[1];
|
||||
|
||||
/* do IP */
|
||||
PERM_OP(r,l,t, 4,0x0f0f0f0f);
|
||||
PERM_OP(l,r,t,16,0x0000ffff);
|
||||
PERM_OP(r,l,t, 2,0x33333333);
|
||||
PERM_OP(l,r,t, 8,0x00ff00ff);
|
||||
PERM_OP(r,l,t, 1,0x55555555);
|
||||
/* r and l are reversed - remember that :-) - fix
|
||||
* it in the next step */
|
||||
|
||||
/* Things have been modified so that the initial rotate is
|
||||
* done outside the loop. This required the
|
||||
* des_SPtrans values in sp.h to be rotated 1 bit to the right.
|
||||
* One perl script later and things have a 5% speed up on a sparc2.
|
||||
* Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
|
||||
* for pointing this out. */
|
||||
t=(r<<1)|(r>>31);
|
||||
r=(l<<1)|(l>>31);
|
||||
l=t;
|
||||
|
||||
/* clear the top bits on machines with 8byte longs */
|
||||
l&=0xffffffff;
|
||||
r&=0xffffffff;
|
||||
|
||||
s=(u_int32_t *)ks;
|
||||
/* I don't know if it is worth the effort of loop unrolling the
|
||||
* inner loop */
|
||||
if (encrypt)
|
||||
{
|
||||
for (i=0; i<32; i+=4)
|
||||
{
|
||||
D_ENCRYPT(l,r,i+0); /* 1 */
|
||||
D_ENCRYPT(r,l,i+2); /* 2 */
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
for (i=30; i>0; i-=4)
|
||||
{
|
||||
D_ENCRYPT(l,r,i-0); /* 16 */
|
||||
D_ENCRYPT(r,l,i-2); /* 15 */
|
||||
}
|
||||
}
|
||||
l=(l>>1)|(l<<31);
|
||||
r=(r>>1)|(r<<31);
|
||||
/* clear the top bits on machines with 8byte longs */
|
||||
l&=0xffffffff;
|
||||
r&=0xffffffff;
|
||||
|
||||
/* swap l and r
|
||||
* we will not do the swap so just remember they are
|
||||
* reversed for the rest of the subroutine
|
||||
* luckily FP fixes this problem :-) */
|
||||
|
||||
PERM_OP(r,l,t, 1,0x55555555);
|
||||
PERM_OP(l,r,t, 8,0x00ff00ff);
|
||||
PERM_OP(r,l,t, 2,0x33333333);
|
||||
PERM_OP(l,r,t,16,0x0000ffff);
|
||||
PERM_OP(r,l,t, 4,0x0f0f0f0f);
|
||||
|
||||
output[0]=l;
|
||||
output[1]=r;
|
||||
l=r=t=u=0;
|
||||
return(0);
|
||||
}
|
||||
|
155
lib/des/enc_read.c
Normal file
155
lib/des/enc_read.c
Normal file
@@ -0,0 +1,155 @@
|
||||
/* enc_read.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
#include <unistd.h>
|
||||
#include <errno.h>
|
||||
#include "des_locl.h"
|
||||
|
||||
/* This has some uglies in it but it works - even over sockets. */
|
||||
extern int errno;
|
||||
int des_rw_mode=DES_PCBC_MODE;
|
||||
|
||||
int des_enc_read(int fd, char *buf, int len, struct des_ks_struct *sched, des_cblock (*iv))
|
||||
{
|
||||
/* data to be unencrypted */
|
||||
int net_num=0;
|
||||
unsigned char net[BSIZE];
|
||||
/* extra unencrypted data
|
||||
* for when a block of 100 comes in but is des_read one byte at
|
||||
* a time. */
|
||||
static char unnet[BSIZE];
|
||||
static int unnet_start=0;
|
||||
static int unnet_left=0;
|
||||
int i;
|
||||
long num=0,rnum;
|
||||
unsigned char *p;
|
||||
|
||||
/* left over data from last decrypt */
|
||||
if (unnet_left != 0)
|
||||
{
|
||||
if (unnet_left < len)
|
||||
{
|
||||
/* we still still need more data but will return
|
||||
* with the number of bytes we have - should always
|
||||
* check the return value */
|
||||
memcpy(buf,&(unnet[unnet_start]),unnet_left);
|
||||
/* eay 26/08/92 I had the next 2 lines
|
||||
* reversed :-( */
|
||||
i=unnet_left;
|
||||
unnet_start=unnet_left=0;
|
||||
}
|
||||
else
|
||||
{
|
||||
memcpy(buf,&(unnet[unnet_start]),len);
|
||||
unnet_start+=len;
|
||||
unnet_left-=len;
|
||||
i=len;
|
||||
}
|
||||
return(i);
|
||||
}
|
||||
|
||||
/* We need to get more data. */
|
||||
if (len > MAXWRITE) len=MAXWRITE;
|
||||
|
||||
/* first - get the length */
|
||||
net_num=0;
|
||||
while (net_num < HDRSIZE)
|
||||
{
|
||||
i=read(fd,&(net[net_num]),HDRSIZE-net_num);
|
||||
if ((i == -1) && (errno == EINTR)) continue;
|
||||
if (i <= 0) return(0);
|
||||
net_num+=i;
|
||||
}
|
||||
|
||||
/* we now have at net_num bytes in net */
|
||||
p=net;
|
||||
num=0;
|
||||
n2l(p,num);
|
||||
/* num should be rounded up to the next group of eight
|
||||
* we make sure that we have read a multiple of 8 bytes from the net.
|
||||
*/
|
||||
if ((num > MAXWRITE) || (num < 0)) /* error */
|
||||
return(-1);
|
||||
rnum=(num < 8)?8:((num+7)/8*8);
|
||||
|
||||
net_num=0;
|
||||
while (net_num < rnum)
|
||||
{
|
||||
i=read(fd,&(net[net_num]),rnum-net_num);
|
||||
if ((i == -1) && (errno == EINTR)) continue;
|
||||
if (i <= 0) return(0);
|
||||
net_num+=i;
|
||||
}
|
||||
|
||||
/* Check if there will be data left over. */
|
||||
if (len < num)
|
||||
{
|
||||
if (des_rw_mode & DES_PCBC_MODE)
|
||||
des_pcbc_encrypt((des_cblock *)net,(des_cblock *)unnet,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
else
|
||||
des_cbc_encrypt((des_cblock *)net,(des_cblock *)unnet,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
memcpy(buf,unnet,len);
|
||||
unnet_start=len;
|
||||
unnet_left=num-len;
|
||||
|
||||
/* The following line is done because we return num
|
||||
* as the number of bytes read. */
|
||||
num=len;
|
||||
}
|
||||
else
|
||||
{
|
||||
/* >output is a multiple of 8 byes, if len < rnum
|
||||
* >we must be careful. The user must be aware that this
|
||||
* >routine will write more bytes than he asked for.
|
||||
* >The length of the buffer must be correct.
|
||||
* FIXED - Should be ok now 18-9-90 - eay */
|
||||
if (len < rnum)
|
||||
{
|
||||
char tmpbuf[BSIZE];
|
||||
|
||||
if (des_rw_mode & DES_PCBC_MODE)
|
||||
des_pcbc_encrypt((des_cblock *)net,
|
||||
(des_cblock *)tmpbuf,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
else
|
||||
des_cbc_encrypt((des_cblock *)net,
|
||||
(des_cblock *)tmpbuf,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
|
||||
/* eay 26/08/92 fix a bug that returned more
|
||||
* bytes than you asked for (returned len bytes :-( */
|
||||
memcpy(buf,tmpbuf,num);
|
||||
}
|
||||
else if (num >= 8)
|
||||
{
|
||||
if (des_rw_mode & DES_PCBC_MODE)
|
||||
des_pcbc_encrypt((des_cblock *)net,
|
||||
(des_cblock *)buf,num,sched,iv,
|
||||
DES_DECRYPT);
|
||||
else
|
||||
des_cbc_encrypt((des_cblock *)net,
|
||||
(des_cblock *)buf,num,sched,iv,
|
||||
DES_DECRYPT);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (des_rw_mode & DES_PCBC_MODE)
|
||||
des_pcbc_encrypt((des_cblock *)net,
|
||||
(des_cblock *)buf,8,sched,iv,
|
||||
DES_DECRYPT);
|
||||
else
|
||||
des_cbc_encrypt((des_cblock *)net,
|
||||
(des_cblock *)buf,8,sched,iv,
|
||||
DES_DECRYPT);
|
||||
#ifdef LEFT_JUSTIFIED
|
||||
memcpy(buf, buf, num);
|
||||
#else
|
||||
memcpy(buf, buf+(8-num), num);
|
||||
#endif
|
||||
}
|
||||
}
|
||||
return(num);
|
||||
}
|
||||
|
94
lib/des/enc_writ.c
Normal file
94
lib/des/enc_writ.c
Normal file
@@ -0,0 +1,94 @@
|
||||
/* enc_writ.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
#include <unistd.h>
|
||||
#include <errno.h>
|
||||
#include "des_locl.h"
|
||||
|
||||
int des_enc_write(int fd, char *buf, int len, struct des_ks_struct *sched, des_cblock (*iv))
|
||||
{
|
||||
long rnum;
|
||||
int i,j,k,outnum;
|
||||
char outbuf[BSIZE+HDRSIZE];
|
||||
char shortbuf[8];
|
||||
char *p;
|
||||
static int start=1;
|
||||
|
||||
/* If we are sending less than 8 bytes, the same char will look
|
||||
* the same if we don't pad it out with random bytes */
|
||||
if (start)
|
||||
{
|
||||
start=0;
|
||||
srand(time(NULL));
|
||||
}
|
||||
|
||||
/* lets recurse if we want to send the data in small chunks */
|
||||
if (len > MAXWRITE)
|
||||
{
|
||||
j=0;
|
||||
for (i=0; i<len; i+=k)
|
||||
{
|
||||
k=des_enc_write(fd,&(buf[i]),
|
||||
((len-i) > MAXWRITE)?MAXWRITE:(len-i),sched,iv);
|
||||
if (k < 0)
|
||||
return(k);
|
||||
else
|
||||
j+=k;
|
||||
}
|
||||
return(j);
|
||||
}
|
||||
|
||||
/* write length first */
|
||||
p=outbuf;
|
||||
l2n(len,p);
|
||||
|
||||
/* pad short strings */
|
||||
if (len < 8)
|
||||
{
|
||||
#ifdef LEFT_JUSTIFIED
|
||||
p=shortbuf;
|
||||
memcpy(shortbuf,buf,len);
|
||||
for (i=len; i<8; i++)
|
||||
shortbuf[i]=rand();
|
||||
rnum=8;
|
||||
#else
|
||||
p=shortbuf;
|
||||
for (i=0; i<8-len; i++)
|
||||
shortbuf[i]=rand();
|
||||
memcpy(shortbuf + 8 - len, buf, len);
|
||||
rnum=8;
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
p=buf;
|
||||
rnum=((len+7)/8*8); /* round up to nearest eight */
|
||||
}
|
||||
|
||||
if (des_rw_mode & DES_PCBC_MODE)
|
||||
des_pcbc_encrypt((des_cblock *)p,(des_cblock *)&(outbuf[HDRSIZE]),
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
else
|
||||
des_cbc_encrypt((des_cblock *)p,(des_cblock *)&(outbuf[HDRSIZE]),
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
|
||||
/* output */
|
||||
outnum=rnum+HDRSIZE;
|
||||
|
||||
for (j=0; j<outnum; j+=i)
|
||||
{
|
||||
/* eay 26/08/92 I was not doing writing from where we
|
||||
* got upto. */
|
||||
i=write(fd,&(outbuf[j]),(int)(outnum-j));
|
||||
if (i == -1)
|
||||
{
|
||||
if (errno == EINTR)
|
||||
i=0;
|
||||
else /* This is really a bad error - very bad
|
||||
* It will stuff-up both ends. */
|
||||
return(-1);
|
||||
}
|
||||
}
|
||||
|
||||
return(len);
|
||||
}
|
573
lib/des/fcrypt.c
Normal file
573
lib/des/fcrypt.c
Normal file
@@ -0,0 +1,573 @@
|
||||
/* fcrypt.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include <stdio.h>
|
||||
|
||||
/* Eric Young.
|
||||
* This version of crypt has been developed from my MIT compatable
|
||||
* DES library.
|
||||
* The library is available at pub/DES at ftp.psy.uq.oz.au
|
||||
* eay@psych.psy.uq.oz.au
|
||||
*/
|
||||
|
||||
typedef unsigned char des_cblock[8];
|
||||
|
||||
typedef struct des_ks_struct
|
||||
{
|
||||
union {
|
||||
des_cblock _;
|
||||
/* make sure things are correct size on machines with
|
||||
* 8 byte longs */
|
||||
u_int32_t pad[2];
|
||||
} ks;
|
||||
#define _ ks._
|
||||
} des_key_schedule[16];
|
||||
|
||||
#define DES_KEY_SZ (sizeof(des_cblock))
|
||||
#define DES_ENCRYPT 1
|
||||
#define DES_DECRYPT 0
|
||||
|
||||
#define ITERATIONS 16
|
||||
#define HALF_ITERATIONS 8
|
||||
|
||||
#define c2l(c,l) (l =((u_int32_t)(*((c)++))) , \
|
||||
l|=((u_int32_t)(*((c)++)))<< 8, \
|
||||
l|=((u_int32_t)(*((c)++)))<<16, \
|
||||
l|=((u_int32_t)(*((c)++)))<<24)
|
||||
|
||||
#define l2c(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>16)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>24)&0xff))
|
||||
|
||||
static u_int32_t SPtrans[8][64]={
|
||||
/* nibble 0 */
|
||||
0x00820200, 0x00020000, 0x80800000, 0x80820200,
|
||||
0x00800000, 0x80020200, 0x80020000, 0x80800000,
|
||||
0x80020200, 0x00820200, 0x00820000, 0x80000200,
|
||||
0x80800200, 0x00800000, 0x00000000, 0x80020000,
|
||||
0x00020000, 0x80000000, 0x00800200, 0x00020200,
|
||||
0x80820200, 0x00820000, 0x80000200, 0x00800200,
|
||||
0x80000000, 0x00000200, 0x00020200, 0x80820000,
|
||||
0x00000200, 0x80800200, 0x80820000, 0x00000000,
|
||||
0x00000000, 0x80820200, 0x00800200, 0x80020000,
|
||||
0x00820200, 0x00020000, 0x80000200, 0x00800200,
|
||||
0x80820000, 0x00000200, 0x00020200, 0x80800000,
|
||||
0x80020200, 0x80000000, 0x80800000, 0x00820000,
|
||||
0x80820200, 0x00020200, 0x00820000, 0x80800200,
|
||||
0x00800000, 0x80000200, 0x80020000, 0x00000000,
|
||||
0x00020000, 0x00800000, 0x80800200, 0x00820200,
|
||||
0x80000000, 0x80820000, 0x00000200, 0x80020200,
|
||||
/* nibble 1 */
|
||||
0x10042004, 0x00000000, 0x00042000, 0x10040000,
|
||||
0x10000004, 0x00002004, 0x10002000, 0x00042000,
|
||||
0x00002000, 0x10040004, 0x00000004, 0x10002000,
|
||||
0x00040004, 0x10042000, 0x10040000, 0x00000004,
|
||||
0x00040000, 0x10002004, 0x10040004, 0x00002000,
|
||||
0x00042004, 0x10000000, 0x00000000, 0x00040004,
|
||||
0x10002004, 0x00042004, 0x10042000, 0x10000004,
|
||||
0x10000000, 0x00040000, 0x00002004, 0x10042004,
|
||||
0x00040004, 0x10042000, 0x10002000, 0x00042004,
|
||||
0x10042004, 0x00040004, 0x10000004, 0x00000000,
|
||||
0x10000000, 0x00002004, 0x00040000, 0x10040004,
|
||||
0x00002000, 0x10000000, 0x00042004, 0x10002004,
|
||||
0x10042000, 0x00002000, 0x00000000, 0x10000004,
|
||||
0x00000004, 0x10042004, 0x00042000, 0x10040000,
|
||||
0x10040004, 0x00040000, 0x00002004, 0x10002000,
|
||||
0x10002004, 0x00000004, 0x10040000, 0x00042000,
|
||||
/* nibble 2 */
|
||||
0x41000000, 0x01010040, 0x00000040, 0x41000040,
|
||||
0x40010000, 0x01000000, 0x41000040, 0x00010040,
|
||||
0x01000040, 0x00010000, 0x01010000, 0x40000000,
|
||||
0x41010040, 0x40000040, 0x40000000, 0x41010000,
|
||||
0x00000000, 0x40010000, 0x01010040, 0x00000040,
|
||||
0x40000040, 0x41010040, 0x00010000, 0x41000000,
|
||||
0x41010000, 0x01000040, 0x40010040, 0x01010000,
|
||||
0x00010040, 0x00000000, 0x01000000, 0x40010040,
|
||||
0x01010040, 0x00000040, 0x40000000, 0x00010000,
|
||||
0x40000040, 0x40010000, 0x01010000, 0x41000040,
|
||||
0x00000000, 0x01010040, 0x00010040, 0x41010000,
|
||||
0x40010000, 0x01000000, 0x41010040, 0x40000000,
|
||||
0x40010040, 0x41000000, 0x01000000, 0x41010040,
|
||||
0x00010000, 0x01000040, 0x41000040, 0x00010040,
|
||||
0x01000040, 0x00000000, 0x41010000, 0x40000040,
|
||||
0x41000000, 0x40010040, 0x00000040, 0x01010000,
|
||||
/* nibble 3 */
|
||||
0x00100402, 0x04000400, 0x00000002, 0x04100402,
|
||||
0x00000000, 0x04100000, 0x04000402, 0x00100002,
|
||||
0x04100400, 0x04000002, 0x04000000, 0x00000402,
|
||||
0x04000002, 0x00100402, 0x00100000, 0x04000000,
|
||||
0x04100002, 0x00100400, 0x00000400, 0x00000002,
|
||||
0x00100400, 0x04000402, 0x04100000, 0x00000400,
|
||||
0x00000402, 0x00000000, 0x00100002, 0x04100400,
|
||||
0x04000400, 0x04100002, 0x04100402, 0x00100000,
|
||||
0x04100002, 0x00000402, 0x00100000, 0x04000002,
|
||||
0x00100400, 0x04000400, 0x00000002, 0x04100000,
|
||||
0x04000402, 0x00000000, 0x00000400, 0x00100002,
|
||||
0x00000000, 0x04100002, 0x04100400, 0x00000400,
|
||||
0x04000000, 0x04100402, 0x00100402, 0x00100000,
|
||||
0x04100402, 0x00000002, 0x04000400, 0x00100402,
|
||||
0x00100002, 0x00100400, 0x04100000, 0x04000402,
|
||||
0x00000402, 0x04000000, 0x04000002, 0x04100400,
|
||||
/* nibble 4 */
|
||||
0x02000000, 0x00004000, 0x00000100, 0x02004108,
|
||||
0x02004008, 0x02000100, 0x00004108, 0x02004000,
|
||||
0x00004000, 0x00000008, 0x02000008, 0x00004100,
|
||||
0x02000108, 0x02004008, 0x02004100, 0x00000000,
|
||||
0x00004100, 0x02000000, 0x00004008, 0x00000108,
|
||||
0x02000100, 0x00004108, 0x00000000, 0x02000008,
|
||||
0x00000008, 0x02000108, 0x02004108, 0x00004008,
|
||||
0x02004000, 0x00000100, 0x00000108, 0x02004100,
|
||||
0x02004100, 0x02000108, 0x00004008, 0x02004000,
|
||||
0x00004000, 0x00000008, 0x02000008, 0x02000100,
|
||||
0x02000000, 0x00004100, 0x02004108, 0x00000000,
|
||||
0x00004108, 0x02000000, 0x00000100, 0x00004008,
|
||||
0x02000108, 0x00000100, 0x00000000, 0x02004108,
|
||||
0x02004008, 0x02004100, 0x00000108, 0x00004000,
|
||||
0x00004100, 0x02004008, 0x02000100, 0x00000108,
|
||||
0x00000008, 0x00004108, 0x02004000, 0x02000008,
|
||||
/* nibble 5 */
|
||||
0x20000010, 0x00080010, 0x00000000, 0x20080800,
|
||||
0x00080010, 0x00000800, 0x20000810, 0x00080000,
|
||||
0x00000810, 0x20080810, 0x00080800, 0x20000000,
|
||||
0x20000800, 0x20000010, 0x20080000, 0x00080810,
|
||||
0x00080000, 0x20000810, 0x20080010, 0x00000000,
|
||||
0x00000800, 0x00000010, 0x20080800, 0x20080010,
|
||||
0x20080810, 0x20080000, 0x20000000, 0x00000810,
|
||||
0x00000010, 0x00080800, 0x00080810, 0x20000800,
|
||||
0x00000810, 0x20000000, 0x20000800, 0x00080810,
|
||||
0x20080800, 0x00080010, 0x00000000, 0x20000800,
|
||||
0x20000000, 0x00000800, 0x20080010, 0x00080000,
|
||||
0x00080010, 0x20080810, 0x00080800, 0x00000010,
|
||||
0x20080810, 0x00080800, 0x00080000, 0x20000810,
|
||||
0x20000010, 0x20080000, 0x00080810, 0x00000000,
|
||||
0x00000800, 0x20000010, 0x20000810, 0x20080800,
|
||||
0x20080000, 0x00000810, 0x00000010, 0x20080010,
|
||||
/* nibble 6 */
|
||||
0x00001000, 0x00000080, 0x00400080, 0x00400001,
|
||||
0x00401081, 0x00001001, 0x00001080, 0x00000000,
|
||||
0x00400000, 0x00400081, 0x00000081, 0x00401000,
|
||||
0x00000001, 0x00401080, 0x00401000, 0x00000081,
|
||||
0x00400081, 0x00001000, 0x00001001, 0x00401081,
|
||||
0x00000000, 0x00400080, 0x00400001, 0x00001080,
|
||||
0x00401001, 0x00001081, 0x00401080, 0x00000001,
|
||||
0x00001081, 0x00401001, 0x00000080, 0x00400000,
|
||||
0x00001081, 0x00401000, 0x00401001, 0x00000081,
|
||||
0x00001000, 0x00000080, 0x00400000, 0x00401001,
|
||||
0x00400081, 0x00001081, 0x00001080, 0x00000000,
|
||||
0x00000080, 0x00400001, 0x00000001, 0x00400080,
|
||||
0x00000000, 0x00400081, 0x00400080, 0x00001080,
|
||||
0x00000081, 0x00001000, 0x00401081, 0x00400000,
|
||||
0x00401080, 0x00000001, 0x00001001, 0x00401081,
|
||||
0x00400001, 0x00401080, 0x00401000, 0x00001001,
|
||||
/* nibble 7 */
|
||||
0x08200020, 0x08208000, 0x00008020, 0x00000000,
|
||||
0x08008000, 0x00200020, 0x08200000, 0x08208020,
|
||||
0x00000020, 0x08000000, 0x00208000, 0x00008020,
|
||||
0x00208020, 0x08008020, 0x08000020, 0x08200000,
|
||||
0x00008000, 0x00208020, 0x00200020, 0x08008000,
|
||||
0x08208020, 0x08000020, 0x00000000, 0x00208000,
|
||||
0x08000000, 0x00200000, 0x08008020, 0x08200020,
|
||||
0x00200000, 0x00008000, 0x08208000, 0x00000020,
|
||||
0x00200000, 0x00008000, 0x08000020, 0x08208020,
|
||||
0x00008020, 0x08000000, 0x00000000, 0x00208000,
|
||||
0x08200020, 0x08008020, 0x08008000, 0x00200020,
|
||||
0x08208000, 0x00000020, 0x00200020, 0x08008000,
|
||||
0x08208020, 0x00200000, 0x08200000, 0x08000020,
|
||||
0x00208000, 0x00008020, 0x08008020, 0x08200000,
|
||||
0x00000020, 0x08208000, 0x00208020, 0x00000000,
|
||||
0x08000000, 0x08200020, 0x00008000, 0x00208020};
|
||||
|
||||
static u_int32_t skb[8][64]={
|
||||
/* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
|
||||
0x00000000,0x00000010,0x20000000,0x20000010,
|
||||
0x00010000,0x00010010,0x20010000,0x20010010,
|
||||
0x00000800,0x00000810,0x20000800,0x20000810,
|
||||
0x00010800,0x00010810,0x20010800,0x20010810,
|
||||
0x00000020,0x00000030,0x20000020,0x20000030,
|
||||
0x00010020,0x00010030,0x20010020,0x20010030,
|
||||
0x00000820,0x00000830,0x20000820,0x20000830,
|
||||
0x00010820,0x00010830,0x20010820,0x20010830,
|
||||
0x00080000,0x00080010,0x20080000,0x20080010,
|
||||
0x00090000,0x00090010,0x20090000,0x20090010,
|
||||
0x00080800,0x00080810,0x20080800,0x20080810,
|
||||
0x00090800,0x00090810,0x20090800,0x20090810,
|
||||
0x00080020,0x00080030,0x20080020,0x20080030,
|
||||
0x00090020,0x00090030,0x20090020,0x20090030,
|
||||
0x00080820,0x00080830,0x20080820,0x20080830,
|
||||
0x00090820,0x00090830,0x20090820,0x20090830,
|
||||
/* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */
|
||||
0x00000000,0x02000000,0x00002000,0x02002000,
|
||||
0x00200000,0x02200000,0x00202000,0x02202000,
|
||||
0x00000004,0x02000004,0x00002004,0x02002004,
|
||||
0x00200004,0x02200004,0x00202004,0x02202004,
|
||||
0x00000400,0x02000400,0x00002400,0x02002400,
|
||||
0x00200400,0x02200400,0x00202400,0x02202400,
|
||||
0x00000404,0x02000404,0x00002404,0x02002404,
|
||||
0x00200404,0x02200404,0x00202404,0x02202404,
|
||||
0x10000000,0x12000000,0x10002000,0x12002000,
|
||||
0x10200000,0x12200000,0x10202000,0x12202000,
|
||||
0x10000004,0x12000004,0x10002004,0x12002004,
|
||||
0x10200004,0x12200004,0x10202004,0x12202004,
|
||||
0x10000400,0x12000400,0x10002400,0x12002400,
|
||||
0x10200400,0x12200400,0x10202400,0x12202400,
|
||||
0x10000404,0x12000404,0x10002404,0x12002404,
|
||||
0x10200404,0x12200404,0x10202404,0x12202404,
|
||||
/* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */
|
||||
0x00000000,0x00000001,0x00040000,0x00040001,
|
||||
0x01000000,0x01000001,0x01040000,0x01040001,
|
||||
0x00000002,0x00000003,0x00040002,0x00040003,
|
||||
0x01000002,0x01000003,0x01040002,0x01040003,
|
||||
0x00000200,0x00000201,0x00040200,0x00040201,
|
||||
0x01000200,0x01000201,0x01040200,0x01040201,
|
||||
0x00000202,0x00000203,0x00040202,0x00040203,
|
||||
0x01000202,0x01000203,0x01040202,0x01040203,
|
||||
0x08000000,0x08000001,0x08040000,0x08040001,
|
||||
0x09000000,0x09000001,0x09040000,0x09040001,
|
||||
0x08000002,0x08000003,0x08040002,0x08040003,
|
||||
0x09000002,0x09000003,0x09040002,0x09040003,
|
||||
0x08000200,0x08000201,0x08040200,0x08040201,
|
||||
0x09000200,0x09000201,0x09040200,0x09040201,
|
||||
0x08000202,0x08000203,0x08040202,0x08040203,
|
||||
0x09000202,0x09000203,0x09040202,0x09040203,
|
||||
/* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */
|
||||
0x00000000,0x00100000,0x00000100,0x00100100,
|
||||
0x00000008,0x00100008,0x00000108,0x00100108,
|
||||
0x00001000,0x00101000,0x00001100,0x00101100,
|
||||
0x00001008,0x00101008,0x00001108,0x00101108,
|
||||
0x04000000,0x04100000,0x04000100,0x04100100,
|
||||
0x04000008,0x04100008,0x04000108,0x04100108,
|
||||
0x04001000,0x04101000,0x04001100,0x04101100,
|
||||
0x04001008,0x04101008,0x04001108,0x04101108,
|
||||
0x00020000,0x00120000,0x00020100,0x00120100,
|
||||
0x00020008,0x00120008,0x00020108,0x00120108,
|
||||
0x00021000,0x00121000,0x00021100,0x00121100,
|
||||
0x00021008,0x00121008,0x00021108,0x00121108,
|
||||
0x04020000,0x04120000,0x04020100,0x04120100,
|
||||
0x04020008,0x04120008,0x04020108,0x04120108,
|
||||
0x04021000,0x04121000,0x04021100,0x04121100,
|
||||
0x04021008,0x04121008,0x04021108,0x04121108,
|
||||
/* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
|
||||
0x00000000,0x10000000,0x00010000,0x10010000,
|
||||
0x00000004,0x10000004,0x00010004,0x10010004,
|
||||
0x20000000,0x30000000,0x20010000,0x30010000,
|
||||
0x20000004,0x30000004,0x20010004,0x30010004,
|
||||
0x00100000,0x10100000,0x00110000,0x10110000,
|
||||
0x00100004,0x10100004,0x00110004,0x10110004,
|
||||
0x20100000,0x30100000,0x20110000,0x30110000,
|
||||
0x20100004,0x30100004,0x20110004,0x30110004,
|
||||
0x00001000,0x10001000,0x00011000,0x10011000,
|
||||
0x00001004,0x10001004,0x00011004,0x10011004,
|
||||
0x20001000,0x30001000,0x20011000,0x30011000,
|
||||
0x20001004,0x30001004,0x20011004,0x30011004,
|
||||
0x00101000,0x10101000,0x00111000,0x10111000,
|
||||
0x00101004,0x10101004,0x00111004,0x10111004,
|
||||
0x20101000,0x30101000,0x20111000,0x30111000,
|
||||
0x20101004,0x30101004,0x20111004,0x30111004,
|
||||
/* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */
|
||||
0x00000000,0x08000000,0x00000008,0x08000008,
|
||||
0x00000400,0x08000400,0x00000408,0x08000408,
|
||||
0x00020000,0x08020000,0x00020008,0x08020008,
|
||||
0x00020400,0x08020400,0x00020408,0x08020408,
|
||||
0x00000001,0x08000001,0x00000009,0x08000009,
|
||||
0x00000401,0x08000401,0x00000409,0x08000409,
|
||||
0x00020001,0x08020001,0x00020009,0x08020009,
|
||||
0x00020401,0x08020401,0x00020409,0x08020409,
|
||||
0x02000000,0x0A000000,0x02000008,0x0A000008,
|
||||
0x02000400,0x0A000400,0x02000408,0x0A000408,
|
||||
0x02020000,0x0A020000,0x02020008,0x0A020008,
|
||||
0x02020400,0x0A020400,0x02020408,0x0A020408,
|
||||
0x02000001,0x0A000001,0x02000009,0x0A000009,
|
||||
0x02000401,0x0A000401,0x02000409,0x0A000409,
|
||||
0x02020001,0x0A020001,0x02020009,0x0A020009,
|
||||
0x02020401,0x0A020401,0x02020409,0x0A020409,
|
||||
/* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */
|
||||
0x00000000,0x00000100,0x00080000,0x00080100,
|
||||
0x01000000,0x01000100,0x01080000,0x01080100,
|
||||
0x00000010,0x00000110,0x00080010,0x00080110,
|
||||
0x01000010,0x01000110,0x01080010,0x01080110,
|
||||
0x00200000,0x00200100,0x00280000,0x00280100,
|
||||
0x01200000,0x01200100,0x01280000,0x01280100,
|
||||
0x00200010,0x00200110,0x00280010,0x00280110,
|
||||
0x01200010,0x01200110,0x01280010,0x01280110,
|
||||
0x00000200,0x00000300,0x00080200,0x00080300,
|
||||
0x01000200,0x01000300,0x01080200,0x01080300,
|
||||
0x00000210,0x00000310,0x00080210,0x00080310,
|
||||
0x01000210,0x01000310,0x01080210,0x01080310,
|
||||
0x00200200,0x00200300,0x00280200,0x00280300,
|
||||
0x01200200,0x01200300,0x01280200,0x01280300,
|
||||
0x00200210,0x00200310,0x00280210,0x00280310,
|
||||
0x01200210,0x01200310,0x01280210,0x01280310,
|
||||
/* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */
|
||||
0x00000000,0x04000000,0x00040000,0x04040000,
|
||||
0x00000002,0x04000002,0x00040002,0x04040002,
|
||||
0x00002000,0x04002000,0x00042000,0x04042000,
|
||||
0x00002002,0x04002002,0x00042002,0x04042002,
|
||||
0x00000020,0x04000020,0x00040020,0x04040020,
|
||||
0x00000022,0x04000022,0x00040022,0x04040022,
|
||||
0x00002020,0x04002020,0x00042020,0x04042020,
|
||||
0x00002022,0x04002022,0x00042022,0x04042022,
|
||||
0x00000800,0x04000800,0x00040800,0x04040800,
|
||||
0x00000802,0x04000802,0x00040802,0x04040802,
|
||||
0x00002800,0x04002800,0x00042800,0x04042800,
|
||||
0x00002802,0x04002802,0x00042802,0x04042802,
|
||||
0x00000820,0x04000820,0x00040820,0x04040820,
|
||||
0x00000822,0x04000822,0x00040822,0x04040822,
|
||||
0x00002820,0x04002820,0x00042820,0x04042820,
|
||||
0x00002822,0x04002822,0x00042822,0x04042822,
|
||||
};
|
||||
|
||||
/* See ecb_encrypt.c for a pseudo description of these macros. */
|
||||
#define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
|
||||
(b)^=(t),\
|
||||
(a)^=((t)<<(n)))
|
||||
|
||||
#define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\
|
||||
(a)=(a)^(t)^(t>>(16-(n))))\
|
||||
|
||||
static char shifts2[16]={0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0};
|
||||
|
||||
static int body(u_int32_t *out0, u_int32_t *out1, des_key_schedule (*ks), u_int32_t Eswap0, u_int_32t Eswap1);
|
||||
static int des_set_key(des_cblock (*key), struct des_ks_struct *schedule);
|
||||
|
||||
static int des_set_key(des_cblock (*key), struct des_ks_struct *schedule)
|
||||
{
|
||||
register u_int32_t c,d,t,s;
|
||||
register unsigned char *in;
|
||||
register u_int32_t *k;
|
||||
register int i;
|
||||
|
||||
k=(u_int32_t *)schedule;
|
||||
in=(unsigned char *)key;
|
||||
|
||||
c2l(in,c);
|
||||
c2l(in,d);
|
||||
|
||||
/* I now do it in 47 simple operations :-)
|
||||
* Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov)
|
||||
* for the inspiration. :-) */
|
||||
PERM_OP (d,c,t,4,0x0f0f0f0f);
|
||||
HPERM_OP(c,t,-2,0xcccc0000);
|
||||
HPERM_OP(d,t,-2,0xcccc0000);
|
||||
PERM_OP (d,c,t,1,0x55555555);
|
||||
PERM_OP (c,d,t,8,0x00ff00ff);
|
||||
PERM_OP (d,c,t,1,0x55555555);
|
||||
d= (((d&0x000000ff)<<16)| (d&0x0000ff00) |
|
||||
((d&0x00ff0000)>>16)|((c&0xf0000000)>>4));
|
||||
c&=0x0fffffff;
|
||||
|
||||
for (i=0; i<ITERATIONS; i++)
|
||||
{
|
||||
if (shifts2[i])
|
||||
{ c=((c>>2)|(c<<26)); d=((d>>2)|(d<<26)); }
|
||||
else
|
||||
{ c=((c>>1)|(c<<27)); d=((d>>1)|(d<<27)); }
|
||||
c&=0x0fffffff;
|
||||
d&=0x0fffffff;
|
||||
/* could be a few less shifts but I am to lazy at this
|
||||
* point in time to investigate */
|
||||
s= skb[0][ (c )&0x3f ]|
|
||||
skb[1][((c>> 6)&0x03)|((c>> 7)&0x3c)]|
|
||||
skb[2][((c>>13)&0x0f)|((c>>14)&0x30)]|
|
||||
skb[3][((c>>20)&0x01)|((c>>21)&0x06) |
|
||||
((c>>22)&0x38)];
|
||||
t= skb[4][ (d )&0x3f ]|
|
||||
skb[5][((d>> 7)&0x03)|((d>> 8)&0x3c)]|
|
||||
skb[6][ (d>>15)&0x3f ]|
|
||||
skb[7][((d>>21)&0x0f)|((d>>22)&0x30)];
|
||||
|
||||
/* table contained 0213 4657 */
|
||||
*(k++)=((t<<16)|(s&0x0000ffff))&0xffffffff;
|
||||
s= ((s>>16)|(t&0xffff0000));
|
||||
|
||||
s=(s<<4)|(s>>28);
|
||||
*(k++)=s&0xffffffff;
|
||||
}
|
||||
return(0);
|
||||
}
|
||||
|
||||
/******************************************************************
|
||||
* modified stuff for crypt.
|
||||
******************************************************************/
|
||||
|
||||
/* The changes to this macro may help or hinder, depending on the
|
||||
* compiler and the achitecture. gcc2 always seems to do well :-).
|
||||
* Inspired by Dana How <how@isl.stanford.edu>
|
||||
* DO NOT use the alternative version on machines with 8 byte longs.
|
||||
*/
|
||||
#ifdef ALT_ECB
|
||||
#define D_ENCRYPT(L,R,S) \
|
||||
v=(R^(R>>16)); \
|
||||
u=(v&E0); \
|
||||
v=(v&E1); \
|
||||
u=((u^(u<<16))^R^s[S ])<<2; \
|
||||
t=(v^(v<<16))^R^s[S+1]; \
|
||||
t=(t>>2)|(t<<30); \
|
||||
L^= \
|
||||
*(u_int32_t *)(des_SP+0x0100+((t )&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0300+((t>> 8)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0500+((t>>16)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0700+((t>>24)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+ ((u )&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0200+((u>> 8)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0400+((u>>16)&0xfc))+ \
|
||||
*(u_int32_t *)(des_SP+0x0600+((u>>24)&0xfc));
|
||||
#else /* original version */
|
||||
#define D_ENCRYPT(L,R,S) \
|
||||
v=(R^(R>>16)); \
|
||||
u=(v&E0); \
|
||||
v=(v&E1); \
|
||||
u=(u^(u<<16))^R^s[S ]; \
|
||||
t=(v^(v<<16))^R^s[S+1]; \
|
||||
t=(t>>4)|(t<<28); \
|
||||
L^= SPtrans[1][(t )&0x3f]| \
|
||||
SPtrans[3][(t>> 8)&0x3f]| \
|
||||
SPtrans[5][(t>>16)&0x3f]| \
|
||||
SPtrans[7][(t>>24)&0x3f]| \
|
||||
SPtrans[0][(u )&0x3f]| \
|
||||
SPtrans[2][(u>> 8)&0x3f]| \
|
||||
SPtrans[4][(u>>16)&0x3f]| \
|
||||
SPtrans[6][(u>>24)&0x3f];
|
||||
#endif
|
||||
|
||||
unsigned char con_salt[128]={
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,
|
||||
0x02,0x03,0x04,0x05,0x06,0x07,0x08,0x09,
|
||||
0x0A,0x0B,0x05,0x06,0x07,0x08,0x09,0x0A,
|
||||
0x0B,0x0C,0x0D,0x0E,0x0F,0x10,0x11,0x12,
|
||||
0x13,0x14,0x15,0x16,0x17,0x18,0x19,0x1A,
|
||||
0x1B,0x1C,0x1D,0x1E,0x1F,0x20,0x21,0x22,
|
||||
0x23,0x24,0x25,0x20,0x21,0x22,0x23,0x24,
|
||||
0x25,0x26,0x27,0x28,0x29,0x2A,0x2B,0x2C,
|
||||
0x2D,0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,
|
||||
0x35,0x36,0x37,0x38,0x39,0x3A,0x3B,0x3C,
|
||||
0x3D,0x3E,0x3F,0x00,0x00,0x00,0x00,0x00,
|
||||
};
|
||||
|
||||
unsigned char cov_2char[64]={
|
||||
0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,0x35,
|
||||
0x36,0x37,0x38,0x39,0x41,0x42,0x43,0x44,
|
||||
0x45,0x46,0x47,0x48,0x49,0x4A,0x4B,0x4C,
|
||||
0x4D,0x4E,0x4F,0x50,0x51,0x52,0x53,0x54,
|
||||
0x55,0x56,0x57,0x58,0x59,0x5A,0x61,0x62,
|
||||
0x63,0x64,0x65,0x66,0x67,0x68,0x69,0x6A,
|
||||
0x6B,0x6C,0x6D,0x6E,0x6F,0x70,0x71,0x72,
|
||||
0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7A
|
||||
};
|
||||
|
||||
char *
|
||||
crypt(char *buf, char *salt);
|
||||
|
||||
char *
|
||||
crypt(char *buf, char *salt)
|
||||
{
|
||||
unsigned int i,j,x,y;
|
||||
u_int32_t Eswap0=0,Eswap1=0;
|
||||
u_int32_t out[2],ll;
|
||||
des_cblock key;
|
||||
des_key_schedule ks;
|
||||
static unsigned char buff[20];
|
||||
unsigned char bb[9];
|
||||
unsigned char *b=bb;
|
||||
unsigned char c,u;
|
||||
|
||||
/* eay 25/08/92
|
||||
* If you call crypt("pwd","*") as often happens when you
|
||||
* have * as the pwd field in /etc/passwd, the function
|
||||
* returns *\0XXXXXXXXX
|
||||
* The \0 makes the string look like * so the pwd "*" would
|
||||
* crypt to "*". This was found when replacing the crypt in
|
||||
* our shared libraries. People found that the disbled
|
||||
* accounts effectivly had no passwd :-(. */
|
||||
if (salt[0] == '\0') salt[0]='A';
|
||||
if (salt[1] == '\0') salt[1]='A';
|
||||
x=buff[0]=salt[0];
|
||||
Eswap0=con_salt[x];
|
||||
x=buff[1]=salt[1];
|
||||
Eswap1=con_salt[x]<<4;
|
||||
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
c= *(buf++);
|
||||
if (!c) break;
|
||||
key[i]=(c<<1);
|
||||
}
|
||||
for (; i<8; i++)
|
||||
key[i]=0;
|
||||
|
||||
des_set_key((des_cblock *)(key),ks);
|
||||
body(&out[0],&out[1],&ks,Eswap0,Eswap1);
|
||||
|
||||
ll=out[0]; l2c(ll,b);
|
||||
ll=out[1]; l2c(ll,b);
|
||||
y=0;
|
||||
u=0x80;
|
||||
bb[8]=0;
|
||||
for (i=2; i<13; i++)
|
||||
{
|
||||
c=0;
|
||||
for (j=0; j<6; j++)
|
||||
{
|
||||
c<<=1;
|
||||
if (bb[y] & u) c|=1;
|
||||
u>>=1;
|
||||
if (!u)
|
||||
{
|
||||
y++;
|
||||
u=0x80;
|
||||
}
|
||||
}
|
||||
buff[i]=cov_2char[c];
|
||||
}
|
||||
return((char *)buff);
|
||||
}
|
||||
|
||||
static int body(u_int32_t *out0, u_int32_t *out1, des_key_schedule (*ks), u_int32_t Eswap0, u_int32_t Eswap1)
|
||||
{
|
||||
register u_int32_t l,r,t,u,v;
|
||||
#ifdef ALT_ECB
|
||||
register unsigned char *des_SP=(unsigned char *)SPtrans;
|
||||
#endif
|
||||
register u_int32_t *s;
|
||||
register int i,j;
|
||||
register u_int32_t E0,E1;
|
||||
|
||||
l=0;
|
||||
r=0;
|
||||
|
||||
s=(u_int32_t *)ks;
|
||||
E0=Eswap0;
|
||||
E1=Eswap1;
|
||||
|
||||
for (j=0; j<25; j++)
|
||||
{
|
||||
for (i=0; i<(ITERATIONS*2); i+=4)
|
||||
{
|
||||
D_ENCRYPT(l,r, i); /* 1 */
|
||||
D_ENCRYPT(r,l, i+2); /* 2 */
|
||||
}
|
||||
t=l;
|
||||
l=r;
|
||||
r=t;
|
||||
}
|
||||
t=r;
|
||||
r=(l>>1)|(l<<31);
|
||||
l=(t>>1)|(t<<31);
|
||||
/* clear the top bits on machines with 8byte longs */
|
||||
l&=0xffffffff;
|
||||
r&=0xffffffff;
|
||||
|
||||
PERM_OP(r,l,t, 1,0x55555555);
|
||||
PERM_OP(l,r,t, 8,0x00ff00ff);
|
||||
PERM_OP(r,l,t, 2,0x33333333);
|
||||
PERM_OP(l,r,t,16,0x0000ffff);
|
||||
PERM_OP(r,l,t, 4,0x0f0f0f0f);
|
||||
|
||||
*out0=l;
|
||||
*out1=r;
|
||||
return(0);
|
||||
}
|
62
lib/des/ofb_enc.c
Normal file
62
lib/des/ofb_enc.c
Normal file
@@ -0,0 +1,62 @@
|
||||
/* ofb_enc.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output are loaded in multiples of 8 bits.
|
||||
* What this means is that if you hame numbits=12 and length=2
|
||||
* the first 12 bits will be retrieved from the first byte and half
|
||||
* the second. The second 12 bits will come from the 3rd and half the 4th
|
||||
* byte.
|
||||
*/
|
||||
int des_ofb_encrypt(unsigned char *in, unsigned char *out, int numbits, long int length, struct des_ks_struct *schedule, des_cblock (*ivec))
|
||||
{
|
||||
register u_int32_t d0,d1,v0,v1,n=(numbits+7)/8;
|
||||
register u_int32_t mask0,mask1;
|
||||
register long l=length;
|
||||
register int num=numbits;
|
||||
u_int32_t ti[2];
|
||||
unsigned char *iv;
|
||||
|
||||
if (num > 64) return(0);
|
||||
if (num > 32)
|
||||
{
|
||||
mask0=0xffffffff;
|
||||
if (num >= 64)
|
||||
mask1=mask0;
|
||||
else
|
||||
mask1=(1L<<(num-32))-1;
|
||||
}
|
||||
else
|
||||
{
|
||||
if (num == 32)
|
||||
mask0=0xffffffff;
|
||||
else
|
||||
mask0=(1L<<num)-1;
|
||||
mask1=0x00000000;
|
||||
}
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
while (l-- > 0)
|
||||
{
|
||||
des_encrypt(ti,ti,
|
||||
schedule,DES_ENCRYPT);
|
||||
c2ln(in,d0,d1,n);
|
||||
in+=n;
|
||||
d0=(d0^ti[0])&mask0;
|
||||
d1=(d1^ti[1])&mask1;
|
||||
l2cn(d0,d1,out,n);
|
||||
out+=n;
|
||||
}
|
||||
v0=ti[0];
|
||||
v1=ti[1];
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
v0=v1=d0=d1=ti[0]=ti[1]=0;
|
||||
return(0);
|
||||
}
|
||||
|
67
lib/des/pcbc_enc.c
Normal file
67
lib/des/pcbc_enc.c
Normal file
@@ -0,0 +1,67 @@
|
||||
/* pcbc_enc.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
int des_pcbc_encrypt(des_cblock (*input), des_cblock (*output), long int length, struct des_ks_struct *schedule, des_cblock (*ivec), int encrypt)
|
||||
{
|
||||
register u_int32_t sin0,sin1,xor0,xor1,tout0,tout1;
|
||||
u_int32_t tin[2],tout[2];
|
||||
unsigned char *in,*out,*iv;
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
if (encrypt)
|
||||
{
|
||||
c2l(iv,xor0);
|
||||
c2l(iv,xor1);
|
||||
for (; length>0; length-=8)
|
||||
{
|
||||
if (length >= 8)
|
||||
{
|
||||
c2l(in,sin0);
|
||||
c2l(in,sin1);
|
||||
}
|
||||
else
|
||||
c2ln(in,sin0,sin1,length);
|
||||
tin[0]=sin0^xor0;
|
||||
tin[1]=sin1^xor1;
|
||||
des_encrypt(tin,tout,
|
||||
schedule,encrypt);
|
||||
tout0=tout[0];
|
||||
tout1=tout[1];
|
||||
xor0=sin0^tout[0];
|
||||
xor1=sin1^tout[1];
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
c2l(iv,xor0); c2l(iv,xor1);
|
||||
for (; length>0; length-=8)
|
||||
{
|
||||
c2l(in,sin0);
|
||||
c2l(in,sin1);
|
||||
tin[0]=sin0;
|
||||
tin[1]=sin1;
|
||||
des_encrypt(tin,tout,
|
||||
schedule,encrypt);
|
||||
tout0=tout[0]^xor0;
|
||||
tout1=tout[1]^xor1;
|
||||
if (length >= 8)
|
||||
{
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
else
|
||||
l2cn(tout0,tout1,out,length);
|
||||
xor0=tout0^sin0;
|
||||
xor1=tout1^sin1;
|
||||
}
|
||||
}
|
||||
tin[0]=tin[1]=tout[0]=tout[1]=0;
|
||||
sin0=sin1=xor0=xor1=tout0=tout1=0;
|
||||
return(0);
|
||||
}
|
19
lib/des/podd.h
Normal file
19
lib/des/podd.h
Normal file
@@ -0,0 +1,19 @@
|
||||
/* podd.h */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
static unsigned char odd_parity[256]={
|
||||
1, 1, 2, 2, 4, 4, 7, 7, 8, 8, 11, 11, 13, 13, 14, 14,
|
||||
16, 16, 19, 19, 21, 21, 22, 22, 25, 25, 26, 26, 28, 28, 31, 31,
|
||||
32, 32, 35, 35, 37, 37, 38, 38, 41, 41, 42, 42, 44, 44, 47, 47,
|
||||
49, 49, 50, 50, 52, 52, 55, 55, 56, 56, 59, 59, 61, 61, 62, 62,
|
||||
64, 64, 67, 67, 69, 69, 70, 70, 73, 73, 74, 74, 76, 76, 79, 79,
|
||||
81, 81, 82, 82, 84, 84, 87, 87, 88, 88, 91, 91, 93, 93, 94, 94,
|
||||
97, 97, 98, 98,100,100,103,103,104,104,107,107,109,109,110,110,
|
||||
112,112,115,115,117,117,118,118,121,121,122,122,124,124,127,127,
|
||||
128,128,131,131,133,133,134,134,137,137,138,138,140,140,143,143,
|
||||
145,145,146,146,148,148,151,151,152,152,155,155,157,157,158,158,
|
||||
161,161,162,162,164,164,167,167,168,168,171,171,173,173,174,174,
|
||||
176,176,179,179,181,181,182,182,185,185,186,186,188,188,191,191,
|
||||
193,193,194,194,196,196,199,199,200,200,203,203,205,205,206,206,
|
||||
208,208,211,211,213,213,214,214,217,217,218,218,220,220,223,223,
|
||||
224,224,227,227,229,229,230,230,233,233,234,234,236,236,239,239,
|
||||
241,241,242,242,244,244,247,247,248,248,251,251,253,253,254,254};
|
83
lib/des/qud_cksm.c
Normal file
83
lib/des/qud_cksm.c
Normal file
@@ -0,0 +1,83 @@
|
||||
/* qud_cksm.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
/* From "Message Authentication" R.R. Jueneman, S.M. Matyas, C.H. Meyer
|
||||
* IEEE Communications Magazine Sept 1985 Vol. 23 No. 9 p 29-40
|
||||
* This module in only based on the code in this paper and is
|
||||
* almost definitely not the same as the MIT implementation.
|
||||
*/
|
||||
#include "des_locl.h"
|
||||
|
||||
/* bug fix for dos - 7/6/91 - Larry hughes@logos.ucs.indiana.edu */
|
||||
#define B0(a) (((u_int32_t)(a)))
|
||||
#define B1(a) (((u_int32_t)(a))<<8)
|
||||
#define B2(a) (((u_int32_t)(a))<<16)
|
||||
#define B3(a) (((u_int32_t)(a))<<24)
|
||||
|
||||
/* used to scramble things a bit */
|
||||
/* Got the value MIT uses via brute force :-) 2/10/90 eay */
|
||||
#define NOISE ((u_int32_t)83653421)
|
||||
|
||||
u_int32_t des_quad_cksum(des_cblock (*input), des_cblock (*output), long int length, int out_count, des_cblock (*seed))
|
||||
{
|
||||
u_int32_t z0,z1,t0,t1;
|
||||
int i;
|
||||
long l=0;
|
||||
unsigned char *cp;
|
||||
unsigned char *lp;
|
||||
|
||||
if (out_count < 1) out_count=1;
|
||||
lp=(unsigned char *)output;
|
||||
|
||||
z0=B0((*seed)[0])|B1((*seed)[1])|B2((*seed)[2])|B3((*seed)[3]);
|
||||
z1=B0((*seed)[4])|B1((*seed)[5])|B2((*seed)[6])|B3((*seed)[7]);
|
||||
|
||||
for (i=0; ((i<4)&&(i<out_count)); i++)
|
||||
{
|
||||
cp=(unsigned char *)input;
|
||||
l=length;
|
||||
while (l > 0)
|
||||
{
|
||||
if (l > 1)
|
||||
{
|
||||
t0= (u_int32_t)(*(cp++));
|
||||
t0|=(u_int32_t)B1(*(cp++));
|
||||
l--;
|
||||
}
|
||||
else
|
||||
t0= (u_int32_t)(*(cp++));
|
||||
l--;
|
||||
/* add */
|
||||
t0+=z0;
|
||||
t0&=0xffffffff;
|
||||
t1=z1;
|
||||
/* square, well sort of square */
|
||||
z0=((((t0*t0)&0xffffffff)+((t1*t1)&0xffffffff))
|
||||
&0xffffffff)%0x7fffffff;
|
||||
z1=((t0*((t1+NOISE)&0xffffffff))&0xffffffff)%0x7fffffff;
|
||||
}
|
||||
if (lp != NULL)
|
||||
{
|
||||
/* I believe I finally have things worked out.
|
||||
* The MIT library assumes that the checksum
|
||||
* is one huge number and it is returned in a
|
||||
* host dependant byte order.
|
||||
*/
|
||||
static u_int32_t l=1;
|
||||
static unsigned char *c=(unsigned char *)&l;
|
||||
|
||||
if (c[0])
|
||||
{
|
||||
l2c(z0,lp);
|
||||
l2c(z1,lp);
|
||||
}
|
||||
else
|
||||
{
|
||||
lp=output[out_count-i-1];
|
||||
l2n(z1,lp);
|
||||
l2n(z0,lp);
|
||||
}
|
||||
}
|
||||
}
|
||||
return(z0);
|
||||
}
|
||||
|
44
lib/des/rand_key.c
Normal file
44
lib/des/rand_key.c
Normal file
@@ -0,0 +1,44 @@
|
||||
/* rand_key.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
int des_random_key(unsigned char *ret)
|
||||
{
|
||||
des_key_schedule ks;
|
||||
static u_int32_t c=0;
|
||||
static unsigned short pid=0;
|
||||
static des_cblock data={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef};
|
||||
des_cblock key;
|
||||
unsigned char *p;
|
||||
u_int32_t t, now;
|
||||
|
||||
now=(unsigned long)time(NULL);
|
||||
#ifdef MSDOS
|
||||
pid=1;
|
||||
#else
|
||||
if (!pid) pid=getpid();
|
||||
#endif
|
||||
try_again:
|
||||
p=key;
|
||||
t=now;
|
||||
l2c(t,p);
|
||||
t=(u_int32_t)((pid)|((c++)<<16));
|
||||
l2c(t,p);
|
||||
|
||||
des_set_odd_parity((des_cblock *)data);
|
||||
des_set_key((des_cblock *)data,ks);
|
||||
des_cbc_cksum((des_cblock *)key,(des_cblock *)key,
|
||||
(long)sizeof(key),ks,(des_cblock *)data);
|
||||
des_set_odd_parity((des_cblock *)key);
|
||||
des_cbc_cksum((des_cblock *)key,(des_cblock *)key,
|
||||
(long)sizeof(key),ks,(des_cblock *)data);
|
||||
|
||||
memcpy(ret,key,sizeof(key));
|
||||
memset(key,0,sizeof(key));
|
||||
memset(ks,0,sizeof(ks));
|
||||
t=0;
|
||||
/* random key must have odd parity and not be weak */
|
||||
des_set_odd_parity((des_cblock *)ret);
|
||||
if (des_is_weak_key((des_cblock *)ret)) goto try_again;
|
||||
return(0);
|
||||
}
|
37
lib/des/rpw.c
Normal file
37
lib/des/rpw.c
Normal file
@@ -0,0 +1,37 @@
|
||||
/* rpw.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include <stdio.h>
|
||||
#include "des.h"
|
||||
|
||||
void
|
||||
main(void)
|
||||
{
|
||||
des_cblock k,k1;
|
||||
int i;
|
||||
|
||||
printf("read passwd\n");
|
||||
if ((i=des_read_password((des_cblock *)k,"Enter password:",0)) == 0)
|
||||
{
|
||||
printf("password = ");
|
||||
for (i=0; i<8; i++)
|
||||
printf("%02x ",k[i]);
|
||||
}
|
||||
else
|
||||
printf("error %d\n",i);
|
||||
printf("\n");
|
||||
printf("read 2passwds and verify\n");
|
||||
if ((i=des_read_2passwords((des_cblock *)k,(des_cblock *)k1,
|
||||
"Enter verified password:",1)) == 0)
|
||||
{
|
||||
printf("password1 = ");
|
||||
for (i=0; i<8; i++)
|
||||
printf("%02x ",k[i]);
|
||||
printf("\n");
|
||||
printf("password2 = ");
|
||||
for (i=0; i<8; i++)
|
||||
printf("%02x ",k1[i]);
|
||||
printf("\n");
|
||||
}
|
||||
else
|
||||
printf("error %d\n",i);
|
||||
}
|
160
lib/des/shifts.pl
Normal file
160
lib/des/shifts.pl
Normal file
@@ -0,0 +1,160 @@
|
||||
sub lab_shift
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@r,$i,$j,$k,$d,@z);
|
||||
|
||||
@r=&shift(*a,$n);
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
@z=split(/\^/,$r[$i]);
|
||||
for ($j=0; $j <= $#z; $j++)
|
||||
{
|
||||
($d)=($z[$j] =~ /^(..)/);
|
||||
($k)=($z[$j] =~ /\[(.*)\]$/);
|
||||
$k.=",$n" if ($k ne "");
|
||||
$k="$n" if ($k eq "");
|
||||
$d="$d[$k]";
|
||||
$z[$j]=$d;
|
||||
}
|
||||
$r[$i]=join('^',@z);
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub shift
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@f);
|
||||
|
||||
if ($n > 0)
|
||||
{
|
||||
@f=&shiftl(*a,$n);
|
||||
}
|
||||
else
|
||||
{
|
||||
@f=&shiftr(*a,-$n);
|
||||
}
|
||||
return(@f);
|
||||
}
|
||||
|
||||
sub shiftr
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
if (($i+$n) > 31)
|
||||
{
|
||||
$r[$i]="--";
|
||||
}
|
||||
else
|
||||
{
|
||||
$r[$i]=$a[$i+$n];
|
||||
}
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub shiftl
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
if ($i < $n)
|
||||
{
|
||||
$r[$i]="--";
|
||||
}
|
||||
else
|
||||
{
|
||||
$r[$i]=$a[$i-$n];
|
||||
}
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub printit
|
||||
{
|
||||
local(@a)=@_;
|
||||
local($i);
|
||||
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
printf "%2s ",$a[$i];
|
||||
print "\n" if (($i%8) == 7);
|
||||
}
|
||||
print "\n";
|
||||
}
|
||||
|
||||
sub xor
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
$r[$i]=&compress($a[$i].'^'.$b[$i]);
|
||||
# $r[$i]=$a[$i]."^".$b[$i];
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub and
|
||||
{
|
||||
local(*a,$m)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
$r[$i]=(($m & (1<<$i))?($a[$i]):('--'));
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub or
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
$r[$i]='--' if (($a[$i] eq '--') && ($b[$i] eq '--'));
|
||||
$r[$i]=$a[$i] if (($a[$i] ne '--') && ($b[$i] eq '--'));
|
||||
$r[$i]=$b[$i] if (($a[$i] eq '--') && ($b[$i] ne '--'));
|
||||
$r[$i]='++' if (($a[$i] ne '--') && ($b[$i] ne '--'));
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub compress
|
||||
{
|
||||
local($s)=@_;
|
||||
local($_,$i,@a,%a,$r);
|
||||
|
||||
$s =~ s/\^\^/\^/g;
|
||||
$s =~ s/^\^//;
|
||||
$s =~ s/\^$//;
|
||||
@a=split(/\^/,$s);
|
||||
|
||||
while ($#a >= 0)
|
||||
{
|
||||
$_=shift(@a);
|
||||
next unless /\d/;
|
||||
$a{$_}++;
|
||||
}
|
||||
foreach $i (sort keys %a)
|
||||
{
|
||||
next if ($a{$i}%2 == 0);
|
||||
$r.="$i^";
|
||||
}
|
||||
chop($r);
|
||||
return($r);
|
||||
}
|
||||
1;
|
140
lib/des/sk.h
Normal file
140
lib/des/sk.h
Normal file
@@ -0,0 +1,140 @@
|
||||
/* sk.h */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
static u_int32_t des_skb[8][64]={
|
||||
/* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
|
||||
0x00000000,0x00000010,0x20000000,0x20000010,
|
||||
0x00010000,0x00010010,0x20010000,0x20010010,
|
||||
0x00000800,0x00000810,0x20000800,0x20000810,
|
||||
0x00010800,0x00010810,0x20010800,0x20010810,
|
||||
0x00000020,0x00000030,0x20000020,0x20000030,
|
||||
0x00010020,0x00010030,0x20010020,0x20010030,
|
||||
0x00000820,0x00000830,0x20000820,0x20000830,
|
||||
0x00010820,0x00010830,0x20010820,0x20010830,
|
||||
0x00080000,0x00080010,0x20080000,0x20080010,
|
||||
0x00090000,0x00090010,0x20090000,0x20090010,
|
||||
0x00080800,0x00080810,0x20080800,0x20080810,
|
||||
0x00090800,0x00090810,0x20090800,0x20090810,
|
||||
0x00080020,0x00080030,0x20080020,0x20080030,
|
||||
0x00090020,0x00090030,0x20090020,0x20090030,
|
||||
0x00080820,0x00080830,0x20080820,0x20080830,
|
||||
0x00090820,0x00090830,0x20090820,0x20090830,
|
||||
/* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */
|
||||
0x00000000,0x02000000,0x00002000,0x02002000,
|
||||
0x00200000,0x02200000,0x00202000,0x02202000,
|
||||
0x00000004,0x02000004,0x00002004,0x02002004,
|
||||
0x00200004,0x02200004,0x00202004,0x02202004,
|
||||
0x00000400,0x02000400,0x00002400,0x02002400,
|
||||
0x00200400,0x02200400,0x00202400,0x02202400,
|
||||
0x00000404,0x02000404,0x00002404,0x02002404,
|
||||
0x00200404,0x02200404,0x00202404,0x02202404,
|
||||
0x10000000,0x12000000,0x10002000,0x12002000,
|
||||
0x10200000,0x12200000,0x10202000,0x12202000,
|
||||
0x10000004,0x12000004,0x10002004,0x12002004,
|
||||
0x10200004,0x12200004,0x10202004,0x12202004,
|
||||
0x10000400,0x12000400,0x10002400,0x12002400,
|
||||
0x10200400,0x12200400,0x10202400,0x12202400,
|
||||
0x10000404,0x12000404,0x10002404,0x12002404,
|
||||
0x10200404,0x12200404,0x10202404,0x12202404,
|
||||
/* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */
|
||||
0x00000000,0x00000001,0x00040000,0x00040001,
|
||||
0x01000000,0x01000001,0x01040000,0x01040001,
|
||||
0x00000002,0x00000003,0x00040002,0x00040003,
|
||||
0x01000002,0x01000003,0x01040002,0x01040003,
|
||||
0x00000200,0x00000201,0x00040200,0x00040201,
|
||||
0x01000200,0x01000201,0x01040200,0x01040201,
|
||||
0x00000202,0x00000203,0x00040202,0x00040203,
|
||||
0x01000202,0x01000203,0x01040202,0x01040203,
|
||||
0x08000000,0x08000001,0x08040000,0x08040001,
|
||||
0x09000000,0x09000001,0x09040000,0x09040001,
|
||||
0x08000002,0x08000003,0x08040002,0x08040003,
|
||||
0x09000002,0x09000003,0x09040002,0x09040003,
|
||||
0x08000200,0x08000201,0x08040200,0x08040201,
|
||||
0x09000200,0x09000201,0x09040200,0x09040201,
|
||||
0x08000202,0x08000203,0x08040202,0x08040203,
|
||||
0x09000202,0x09000203,0x09040202,0x09040203,
|
||||
/* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */
|
||||
0x00000000,0x00100000,0x00000100,0x00100100,
|
||||
0x00000008,0x00100008,0x00000108,0x00100108,
|
||||
0x00001000,0x00101000,0x00001100,0x00101100,
|
||||
0x00001008,0x00101008,0x00001108,0x00101108,
|
||||
0x04000000,0x04100000,0x04000100,0x04100100,
|
||||
0x04000008,0x04100008,0x04000108,0x04100108,
|
||||
0x04001000,0x04101000,0x04001100,0x04101100,
|
||||
0x04001008,0x04101008,0x04001108,0x04101108,
|
||||
0x00020000,0x00120000,0x00020100,0x00120100,
|
||||
0x00020008,0x00120008,0x00020108,0x00120108,
|
||||
0x00021000,0x00121000,0x00021100,0x00121100,
|
||||
0x00021008,0x00121008,0x00021108,0x00121108,
|
||||
0x04020000,0x04120000,0x04020100,0x04120100,
|
||||
0x04020008,0x04120008,0x04020108,0x04120108,
|
||||
0x04021000,0x04121000,0x04021100,0x04121100,
|
||||
0x04021008,0x04121008,0x04021108,0x04121108,
|
||||
/* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
|
||||
0x00000000,0x10000000,0x00010000,0x10010000,
|
||||
0x00000004,0x10000004,0x00010004,0x10010004,
|
||||
0x20000000,0x30000000,0x20010000,0x30010000,
|
||||
0x20000004,0x30000004,0x20010004,0x30010004,
|
||||
0x00100000,0x10100000,0x00110000,0x10110000,
|
||||
0x00100004,0x10100004,0x00110004,0x10110004,
|
||||
0x20100000,0x30100000,0x20110000,0x30110000,
|
||||
0x20100004,0x30100004,0x20110004,0x30110004,
|
||||
0x00001000,0x10001000,0x00011000,0x10011000,
|
||||
0x00001004,0x10001004,0x00011004,0x10011004,
|
||||
0x20001000,0x30001000,0x20011000,0x30011000,
|
||||
0x20001004,0x30001004,0x20011004,0x30011004,
|
||||
0x00101000,0x10101000,0x00111000,0x10111000,
|
||||
0x00101004,0x10101004,0x00111004,0x10111004,
|
||||
0x20101000,0x30101000,0x20111000,0x30111000,
|
||||
0x20101004,0x30101004,0x20111004,0x30111004,
|
||||
/* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */
|
||||
0x00000000,0x08000000,0x00000008,0x08000008,
|
||||
0x00000400,0x08000400,0x00000408,0x08000408,
|
||||
0x00020000,0x08020000,0x00020008,0x08020008,
|
||||
0x00020400,0x08020400,0x00020408,0x08020408,
|
||||
0x00000001,0x08000001,0x00000009,0x08000009,
|
||||
0x00000401,0x08000401,0x00000409,0x08000409,
|
||||
0x00020001,0x08020001,0x00020009,0x08020009,
|
||||
0x00020401,0x08020401,0x00020409,0x08020409,
|
||||
0x02000000,0x0A000000,0x02000008,0x0A000008,
|
||||
0x02000400,0x0A000400,0x02000408,0x0A000408,
|
||||
0x02020000,0x0A020000,0x02020008,0x0A020008,
|
||||
0x02020400,0x0A020400,0x02020408,0x0A020408,
|
||||
0x02000001,0x0A000001,0x02000009,0x0A000009,
|
||||
0x02000401,0x0A000401,0x02000409,0x0A000409,
|
||||
0x02020001,0x0A020001,0x02020009,0x0A020009,
|
||||
0x02020401,0x0A020401,0x02020409,0x0A020409,
|
||||
/* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */
|
||||
0x00000000,0x00000100,0x00080000,0x00080100,
|
||||
0x01000000,0x01000100,0x01080000,0x01080100,
|
||||
0x00000010,0x00000110,0x00080010,0x00080110,
|
||||
0x01000010,0x01000110,0x01080010,0x01080110,
|
||||
0x00200000,0x00200100,0x00280000,0x00280100,
|
||||
0x01200000,0x01200100,0x01280000,0x01280100,
|
||||
0x00200010,0x00200110,0x00280010,0x00280110,
|
||||
0x01200010,0x01200110,0x01280010,0x01280110,
|
||||
0x00000200,0x00000300,0x00080200,0x00080300,
|
||||
0x01000200,0x01000300,0x01080200,0x01080300,
|
||||
0x00000210,0x00000310,0x00080210,0x00080310,
|
||||
0x01000210,0x01000310,0x01080210,0x01080310,
|
||||
0x00200200,0x00200300,0x00280200,0x00280300,
|
||||
0x01200200,0x01200300,0x01280200,0x01280300,
|
||||
0x00200210,0x00200310,0x00280210,0x00280310,
|
||||
0x01200210,0x01200310,0x01280210,0x01280310,
|
||||
/* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */
|
||||
0x00000000,0x04000000,0x00040000,0x04040000,
|
||||
0x00000002,0x04000002,0x00040002,0x04040002,
|
||||
0x00002000,0x04002000,0x00042000,0x04042000,
|
||||
0x00002002,0x04002002,0x00042002,0x04042002,
|
||||
0x00000020,0x04000020,0x00040020,0x04040020,
|
||||
0x00000022,0x04000022,0x00040022,0x04040022,
|
||||
0x00002020,0x04002020,0x00042020,0x04042020,
|
||||
0x00002022,0x04002022,0x00042022,0x04042022,
|
||||
0x00000800,0x04000800,0x00040800,0x04040800,
|
||||
0x00000802,0x04000802,0x00040802,0x04040802,
|
||||
0x00002800,0x04002800,0x00042800,0x04042800,
|
||||
0x00002802,0x04002802,0x00042802,0x04042802,
|
||||
0x00000820,0x04000820,0x00040820,0x04040820,
|
||||
0x00000822,0x04000822,0x00040822,0x04040822,
|
||||
0x00002820,0x04002820,0x00042820,0x04042820,
|
||||
0x00002822,0x04002822,0x00042822,0x04042822,
|
||||
};
|
205
lib/des/speed.c
Normal file
205
lib/des/speed.c
Normal file
@@ -0,0 +1,205 @@
|
||||
/* speed.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
/* 11-Sep-92 Andrew Daviel Support for Silicon Graphics IRIX added */
|
||||
/* 06-Apr-92 Luke Brennan Support for VMS and add extra signal calls */
|
||||
|
||||
#ifndef MSDOS
|
||||
#define TIMES
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#include <signal.h>
|
||||
#ifndef VMS
|
||||
#if !(defined(_IRIX) || defined(sgi))
|
||||
#include <time.h>
|
||||
#endif
|
||||
#ifdef TIMES
|
||||
#include <sys/types.h>
|
||||
#include <sys/times.h>
|
||||
#endif /* TIMES */
|
||||
#else /* VMS */
|
||||
#include <types.h>
|
||||
struct tms {
|
||||
time_t tms_utime;
|
||||
time_t tms_stime;
|
||||
time_t tms_uchild; /* I dunno... */
|
||||
time_t tms_uchildsys; /* so these names are a guess :-) */
|
||||
}
|
||||
#endif
|
||||
#ifndef TIMES
|
||||
#include <sys/timeb.h>
|
||||
#endif
|
||||
#include "des.h"
|
||||
|
||||
/* The following if from times(3) man page. It may need to be changed */
|
||||
#ifndef CLK_TCK
|
||||
#ifndef VMS
|
||||
#define HZ 60.0
|
||||
#else /* VMS */
|
||||
#define HZ 100.0
|
||||
#endif
|
||||
#else /* CLK_TCK */
|
||||
#define HZ ((double)CLK_TCK)
|
||||
#endif
|
||||
|
||||
#define BUFSIZE ((long)1024*8)
|
||||
long run=0;
|
||||
|
||||
#ifdef SIGALRM
|
||||
#ifdef __STDC__
|
||||
#define SIGRETTYPE void
|
||||
#else
|
||||
#define SIGRETTYPE int
|
||||
#endif
|
||||
|
||||
static SIGRETTYPE
|
||||
sig_done(int sig)
|
||||
{
|
||||
signal(SIGALRM,sig_done);
|
||||
run=0;
|
||||
}
|
||||
|
||||
unsigned int alarm(int seconds);
|
||||
#endif
|
||||
|
||||
#define START 0
|
||||
#define STOP 1
|
||||
|
||||
static double
|
||||
Time_F(int s)
|
||||
{
|
||||
double ret;
|
||||
#ifdef TIMES
|
||||
static struct tms tstart,tend;
|
||||
|
||||
if (s == START)
|
||||
{
|
||||
times(&tstart);
|
||||
return(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
times(&tend);
|
||||
ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
#else /* !times() */
|
||||
static struct timeb tstart,tend;
|
||||
long i;
|
||||
|
||||
if (s == START)
|
||||
{
|
||||
ftime(&tstart);
|
||||
return(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
ftime(&tend);
|
||||
i=(long)tend.millitm-(long)tstart.millitm;
|
||||
ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
void
|
||||
main(int argc, char **argv)
|
||||
{
|
||||
long count;
|
||||
static unsigned char buf[BUFSIZE];
|
||||
static des_cblock key={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
|
||||
des_key_schedule sch;
|
||||
double d,a,b,c;
|
||||
#ifndef SIGALRM
|
||||
long ca,cb,cc,cd;
|
||||
#endif
|
||||
|
||||
#ifndef TIMES
|
||||
printf("To get the most acurate results, try to run this\n");
|
||||
printf("program when this computer is idle.\n");
|
||||
#endif
|
||||
|
||||
#ifndef SIGALRM
|
||||
printf("First we calculate the aproximate speed ...\n");
|
||||
des_set_key((des_cblock *)key,sch);
|
||||
count=10;
|
||||
do {
|
||||
int i;
|
||||
count*=2;
|
||||
Time_F(START);
|
||||
for (i=count; i; i--)
|
||||
des_ecb_encrypt((des_cblock *)buf,(des_cblock *)buf,
|
||||
&(sch[0]),DES_ENCRYPT);
|
||||
d=Time_F(STOP);
|
||||
} while (d <3);
|
||||
ca=count;
|
||||
cb=count*10;
|
||||
cc=count*10*8/BUFSIZE+1;
|
||||
cd=count/20+1;
|
||||
printf("Doing set_key %ld times\n",ca);
|
||||
#define COND(d) (count != (d))
|
||||
#define COUNT(d) (d)
|
||||
#else
|
||||
#define COND(c) (run)
|
||||
#define COUNT(d) (count)
|
||||
signal(SIGALRM,sig_done);
|
||||
printf("Doing set_key for 10 seconds\n");
|
||||
alarm(10);
|
||||
#endif
|
||||
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(ca); count++)
|
||||
des_set_key((des_cblock *)key,sch);
|
||||
d=Time_F(STOP);
|
||||
printf("%ld set_key's in %.2f seconds\n",count,d);
|
||||
a=((double)COUNT(ca))/d;
|
||||
|
||||
#ifdef SIGALRM
|
||||
printf("Doing des_ecb_encrypt's for 10 seconds\n");
|
||||
alarm(10);
|
||||
#else
|
||||
printf("Doing des_ecb_encrypt %ld times\n",cb);
|
||||
#endif
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(cb); count++)
|
||||
des_ecb_encrypt((des_cblock *)buf,(des_cblock *)buf,
|
||||
&(sch[0]),DES_ENCRYPT);
|
||||
d=Time_F(STOP);
|
||||
printf("%ld des_ecb_encrypt's in %.2f second\n",count,d);
|
||||
b=((double)COUNT(cb)*8)/d;
|
||||
|
||||
#ifdef SIGALRM
|
||||
printf("Doing des_cbc_encrypt on %ld byte blocks for 10 seconds\n",
|
||||
BUFSIZE);
|
||||
alarm(10);
|
||||
#else
|
||||
printf("Doing des_cbc_encrypt %ld times on %ld byte blocks\n",cc,
|
||||
BUFSIZE);
|
||||
#endif
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(cc); count++)
|
||||
des_cbc_encrypt((des_cblock *)buf,(des_cblock *)buf,BUFSIZE,&(sch[0]),
|
||||
(des_cblock *)&(key[0]),DES_ENCRYPT);
|
||||
d=Time_F(STOP);
|
||||
printf("%ld des_cbc_encrypt's of %ld byte blocks in %.2f second\n",
|
||||
count,BUFSIZE,d);
|
||||
c=((double)COUNT(cc)*BUFSIZE)/d;
|
||||
|
||||
#ifdef SIGALRM
|
||||
printf("Doing crypt for 10 seconds\n");
|
||||
alarm(10);
|
||||
#else
|
||||
printf("Doing crypt %ld times\n",cd);
|
||||
#endif
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(cd); count++)
|
||||
crypt("testing1","ef");
|
||||
d=Time_F(STOP);
|
||||
printf("%ld crypts in %.2f second\n",count,d);
|
||||
d=((double)COUNT(cd))/d;
|
||||
|
||||
printf("set_key per sec = %12.2f (%5.1fuS)\n",a,1.0e6/a);
|
||||
printf("DES ecb bytes per sec = %12.2f (%5.1fuS)\n",b,8.0e6/b);
|
||||
printf("DES cbc bytes per sec = %12.2f (%5.1fuS)\n",c,8.0e6/c);
|
||||
printf("crypt per sec = %12.2f (%5.1fuS)\n",d,1.0e6/d);
|
||||
}
|
146
lib/des/spr.h
Normal file
146
lib/des/spr.h
Normal file
@@ -0,0 +1,146 @@
|
||||
/* spr.h */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
static u_int32_t des_SPtrans[8][64]={
|
||||
/* nibble 0 */
|
||||
0x00820200, 0x00020000, 0x80800000, 0x80820200,
|
||||
0x00800000, 0x80020200, 0x80020000, 0x80800000,
|
||||
0x80020200, 0x00820200, 0x00820000, 0x80000200,
|
||||
0x80800200, 0x00800000, 0x00000000, 0x80020000,
|
||||
0x00020000, 0x80000000, 0x00800200, 0x00020200,
|
||||
0x80820200, 0x00820000, 0x80000200, 0x00800200,
|
||||
0x80000000, 0x00000200, 0x00020200, 0x80820000,
|
||||
0x00000200, 0x80800200, 0x80820000, 0x00000000,
|
||||
0x00000000, 0x80820200, 0x00800200, 0x80020000,
|
||||
0x00820200, 0x00020000, 0x80000200, 0x00800200,
|
||||
0x80820000, 0x00000200, 0x00020200, 0x80800000,
|
||||
0x80020200, 0x80000000, 0x80800000, 0x00820000,
|
||||
0x80820200, 0x00020200, 0x00820000, 0x80800200,
|
||||
0x00800000, 0x80000200, 0x80020000, 0x00000000,
|
||||
0x00020000, 0x00800000, 0x80800200, 0x00820200,
|
||||
0x80000000, 0x80820000, 0x00000200, 0x80020200,
|
||||
|
||||
/* nibble 1 */
|
||||
0x10042004, 0x00000000, 0x00042000, 0x10040000,
|
||||
0x10000004, 0x00002004, 0x10002000, 0x00042000,
|
||||
0x00002000, 0x10040004, 0x00000004, 0x10002000,
|
||||
0x00040004, 0x10042000, 0x10040000, 0x00000004,
|
||||
0x00040000, 0x10002004, 0x10040004, 0x00002000,
|
||||
0x00042004, 0x10000000, 0x00000000, 0x00040004,
|
||||
0x10002004, 0x00042004, 0x10042000, 0x10000004,
|
||||
0x10000000, 0x00040000, 0x00002004, 0x10042004,
|
||||
0x00040004, 0x10042000, 0x10002000, 0x00042004,
|
||||
0x10042004, 0x00040004, 0x10000004, 0x00000000,
|
||||
0x10000000, 0x00002004, 0x00040000, 0x10040004,
|
||||
0x00002000, 0x10000000, 0x00042004, 0x10002004,
|
||||
0x10042000, 0x00002000, 0x00000000, 0x10000004,
|
||||
0x00000004, 0x10042004, 0x00042000, 0x10040000,
|
||||
0x10040004, 0x00040000, 0x00002004, 0x10002000,
|
||||
0x10002004, 0x00000004, 0x10040000, 0x00042000,
|
||||
|
||||
/* nibble 2 */
|
||||
0x41000000, 0x01010040, 0x00000040, 0x41000040,
|
||||
0x40010000, 0x01000000, 0x41000040, 0x00010040,
|
||||
0x01000040, 0x00010000, 0x01010000, 0x40000000,
|
||||
0x41010040, 0x40000040, 0x40000000, 0x41010000,
|
||||
0x00000000, 0x40010000, 0x01010040, 0x00000040,
|
||||
0x40000040, 0x41010040, 0x00010000, 0x41000000,
|
||||
0x41010000, 0x01000040, 0x40010040, 0x01010000,
|
||||
0x00010040, 0x00000000, 0x01000000, 0x40010040,
|
||||
0x01010040, 0x00000040, 0x40000000, 0x00010000,
|
||||
0x40000040, 0x40010000, 0x01010000, 0x41000040,
|
||||
0x00000000, 0x01010040, 0x00010040, 0x41010000,
|
||||
0x40010000, 0x01000000, 0x41010040, 0x40000000,
|
||||
0x40010040, 0x41000000, 0x01000000, 0x41010040,
|
||||
0x00010000, 0x01000040, 0x41000040, 0x00010040,
|
||||
0x01000040, 0x00000000, 0x41010000, 0x40000040,
|
||||
0x41000000, 0x40010040, 0x00000040, 0x01010000,
|
||||
|
||||
/* nibble 3 */
|
||||
0x00100402, 0x04000400, 0x00000002, 0x04100402,
|
||||
0x00000000, 0x04100000, 0x04000402, 0x00100002,
|
||||
0x04100400, 0x04000002, 0x04000000, 0x00000402,
|
||||
0x04000002, 0x00100402, 0x00100000, 0x04000000,
|
||||
0x04100002, 0x00100400, 0x00000400, 0x00000002,
|
||||
0x00100400, 0x04000402, 0x04100000, 0x00000400,
|
||||
0x00000402, 0x00000000, 0x00100002, 0x04100400,
|
||||
0x04000400, 0x04100002, 0x04100402, 0x00100000,
|
||||
0x04100002, 0x00000402, 0x00100000, 0x04000002,
|
||||
0x00100400, 0x04000400, 0x00000002, 0x04100000,
|
||||
0x04000402, 0x00000000, 0x00000400, 0x00100002,
|
||||
0x00000000, 0x04100002, 0x04100400, 0x00000400,
|
||||
0x04000000, 0x04100402, 0x00100402, 0x00100000,
|
||||
0x04100402, 0x00000002, 0x04000400, 0x00100402,
|
||||
0x00100002, 0x00100400, 0x04100000, 0x04000402,
|
||||
0x00000402, 0x04000000, 0x04000002, 0x04100400,
|
||||
|
||||
/* nibble 4 */
|
||||
0x02000000, 0x00004000, 0x00000100, 0x02004108,
|
||||
0x02004008, 0x02000100, 0x00004108, 0x02004000,
|
||||
0x00004000, 0x00000008, 0x02000008, 0x00004100,
|
||||
0x02000108, 0x02004008, 0x02004100, 0x00000000,
|
||||
0x00004100, 0x02000000, 0x00004008, 0x00000108,
|
||||
0x02000100, 0x00004108, 0x00000000, 0x02000008,
|
||||
0x00000008, 0x02000108, 0x02004108, 0x00004008,
|
||||
0x02004000, 0x00000100, 0x00000108, 0x02004100,
|
||||
0x02004100, 0x02000108, 0x00004008, 0x02004000,
|
||||
0x00004000, 0x00000008, 0x02000008, 0x02000100,
|
||||
0x02000000, 0x00004100, 0x02004108, 0x00000000,
|
||||
0x00004108, 0x02000000, 0x00000100, 0x00004008,
|
||||
0x02000108, 0x00000100, 0x00000000, 0x02004108,
|
||||
0x02004008, 0x02004100, 0x00000108, 0x00004000,
|
||||
0x00004100, 0x02004008, 0x02000100, 0x00000108,
|
||||
0x00000008, 0x00004108, 0x02004000, 0x02000008,
|
||||
|
||||
/* nibble 5 */
|
||||
0x20000010, 0x00080010, 0x00000000, 0x20080800,
|
||||
0x00080010, 0x00000800, 0x20000810, 0x00080000,
|
||||
0x00000810, 0x20080810, 0x00080800, 0x20000000,
|
||||
0x20000800, 0x20000010, 0x20080000, 0x00080810,
|
||||
0x00080000, 0x20000810, 0x20080010, 0x00000000,
|
||||
0x00000800, 0x00000010, 0x20080800, 0x20080010,
|
||||
0x20080810, 0x20080000, 0x20000000, 0x00000810,
|
||||
0x00000010, 0x00080800, 0x00080810, 0x20000800,
|
||||
0x00000810, 0x20000000, 0x20000800, 0x00080810,
|
||||
0x20080800, 0x00080010, 0x00000000, 0x20000800,
|
||||
0x20000000, 0x00000800, 0x20080010, 0x00080000,
|
||||
0x00080010, 0x20080810, 0x00080800, 0x00000010,
|
||||
0x20080810, 0x00080800, 0x00080000, 0x20000810,
|
||||
0x20000010, 0x20080000, 0x00080810, 0x00000000,
|
||||
0x00000800, 0x20000010, 0x20000810, 0x20080800,
|
||||
0x20080000, 0x00000810, 0x00000010, 0x20080010,
|
||||
|
||||
/* nibble 6 */
|
||||
0x00001000, 0x00000080, 0x00400080, 0x00400001,
|
||||
0x00401081, 0x00001001, 0x00001080, 0x00000000,
|
||||
0x00400000, 0x00400081, 0x00000081, 0x00401000,
|
||||
0x00000001, 0x00401080, 0x00401000, 0x00000081,
|
||||
0x00400081, 0x00001000, 0x00001001, 0x00401081,
|
||||
0x00000000, 0x00400080, 0x00400001, 0x00001080,
|
||||
0x00401001, 0x00001081, 0x00401080, 0x00000001,
|
||||
0x00001081, 0x00401001, 0x00000080, 0x00400000,
|
||||
0x00001081, 0x00401000, 0x00401001, 0x00000081,
|
||||
0x00001000, 0x00000080, 0x00400000, 0x00401001,
|
||||
0x00400081, 0x00001081, 0x00001080, 0x00000000,
|
||||
0x00000080, 0x00400001, 0x00000001, 0x00400080,
|
||||
0x00000000, 0x00400081, 0x00400080, 0x00001080,
|
||||
0x00000081, 0x00001000, 0x00401081, 0x00400000,
|
||||
0x00401080, 0x00000001, 0x00001001, 0x00401081,
|
||||
0x00400001, 0x00401080, 0x00401000, 0x00001001,
|
||||
|
||||
/* nibble 7 */
|
||||
0x08200020, 0x08208000, 0x00008020, 0x00000000,
|
||||
0x08008000, 0x00200020, 0x08200000, 0x08208020,
|
||||
0x00000020, 0x08000000, 0x00208000, 0x00008020,
|
||||
0x00208020, 0x08008020, 0x08000020, 0x08200000,
|
||||
0x00008000, 0x00208020, 0x00200020, 0x08008000,
|
||||
0x08208020, 0x08000020, 0x00000000, 0x00208000,
|
||||
0x08000000, 0x00200000, 0x08008020, 0x08200020,
|
||||
0x00200000, 0x00008000, 0x08208000, 0x00000020,
|
||||
0x00200000, 0x00008000, 0x08000020, 0x08208020,
|
||||
0x00008020, 0x08000000, 0x00000000, 0x00208000,
|
||||
0x08200020, 0x08008020, 0x08008000, 0x00200020,
|
||||
0x08208000, 0x00000020, 0x00200020, 0x08008000,
|
||||
0x08208020, 0x00200000, 0x08200000, 0x08000020,
|
||||
0x00208000, 0x00008020, 0x08008020, 0x08200000,
|
||||
0x00000020, 0x08208000, 0x00208020, 0x00000000,
|
||||
0x08000000, 0x08200020, 0x00008000, 0x00208020};
|
112
lib/des/str2key.c
Normal file
112
lib/des/str2key.c
Normal file
@@ -0,0 +1,112 @@
|
||||
/* str2key.c */
|
||||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
#include "des_locl.h"
|
||||
|
||||
extern int des_check_key;
|
||||
|
||||
int des_string_to_key(char *str, des_cblock (*key))
|
||||
{
|
||||
des_key_schedule ks;
|
||||
int i,length;
|
||||
register unsigned char j;
|
||||
|
||||
memset(key,0,8);
|
||||
length=strlen(str);
|
||||
#ifdef OLD_STR_TO_KEY
|
||||
for (i=0; i<length; i++)
|
||||
(*key)[i%8]^=(str[i]<<1);
|
||||
#else /* MIT COMPATIBLE */
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
j=str[i];
|
||||
if ((i%16) < 8)
|
||||
(*key)[i%8]^=(j<<1);
|
||||
else
|
||||
{
|
||||
/* Reverse the bit order 05/05/92 eay */
|
||||
j=((j<<4)&0xf0)|((j>>4)&0x0f);
|
||||
j=((j<<2)&0xcc)|((j>>2)&0x33);
|
||||
j=((j<<1)&0xaa)|((j>>1)&0x55);
|
||||
(*key)[7-(i%8)]^=j;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
des_set_odd_parity((des_cblock *)key);
|
||||
i=des_check_key;
|
||||
des_check_key=0;
|
||||
des_set_key((des_cblock *)key,ks);
|
||||
des_check_key=i;
|
||||
des_cbc_cksum((des_cblock *)str,(des_cblock *)key,(long)length,ks,
|
||||
(des_cblock *)key);
|
||||
memset(ks,0,sizeof(ks));
|
||||
des_set_odd_parity((des_cblock *)key);
|
||||
return(0);
|
||||
}
|
||||
|
||||
int des_string_to_2keys(char *str, des_cblock (*key1), des_cblock (*key2))
|
||||
{
|
||||
des_key_schedule ks;
|
||||
int i,length;
|
||||
register unsigned char j;
|
||||
|
||||
memset(key1,0,8);
|
||||
memset(key2,0,8);
|
||||
length=strlen(str);
|
||||
#ifdef OLD_STR_TO_KEY
|
||||
if (length <= 8)
|
||||
{
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
(*key2)[i]=(*key1)[i]=(str[i]<<1);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
if ((i/8)&1)
|
||||
(*key2)[i%8]^=(str[i]<<1);
|
||||
else
|
||||
(*key1)[i%8]^=(str[i]<<1);
|
||||
}
|
||||
}
|
||||
#else /* MIT COMPATIBLE */
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
j=str[i];
|
||||
if ((i%32) < 16)
|
||||
{
|
||||
if ((i%16) < 8)
|
||||
(*key1)[i%8]^=(j<<1);
|
||||
else
|
||||
(*key2)[i%8]^=(j<<1);
|
||||
}
|
||||
else
|
||||
{
|
||||
j=((j<<4)&0xf0)|((j>>4)&0x0f);
|
||||
j=((j<<2)&0xcc)|((j>>2)&0x33);
|
||||
j=((j<<1)&0xaa)|((j>>1)&0x55);
|
||||
if ((i%16) < 8)
|
||||
(*key1)[7-(i%8)]^=j;
|
||||
else
|
||||
(*key2)[7-(i%8)]^=j;
|
||||
}
|
||||
}
|
||||
if (length <= 8) memcpy(key2,key1,8);
|
||||
#endif
|
||||
des_set_odd_parity((des_cblock *)key1);
|
||||
des_set_odd_parity((des_cblock *)key2);
|
||||
i=des_check_key;
|
||||
des_check_key=0;
|
||||
des_set_key((des_cblock *)key1,ks);
|
||||
des_cbc_cksum((des_cblock *)str,(des_cblock *)key1,(long)length,ks,
|
||||
(des_cblock *)key1);
|
||||
des_set_key((des_cblock *)key2,ks);
|
||||
des_cbc_cksum((des_cblock *)str,(des_cblock *)key2,(long)length,ks,
|
||||
(des_cblock *)key2);
|
||||
des_check_key=i;
|
||||
memset(ks,0,sizeof(ks));
|
||||
des_set_odd_parity(key1);
|
||||
des_set_odd_parity(key2);
|
||||
return(0);
|
||||
}
|
167
lib/des/testdes.pl
Executable file
167
lib/des/testdes.pl
Executable file
@@ -0,0 +1,167 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
# des.pl tesing code
|
||||
|
||||
require 'des.pl';
|
||||
|
||||
$num_tests=34;
|
||||
@key_data=(
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x30,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFE,0xDC,0xBA,0x98,0x76,0x54,0x32,0x10,
|
||||
0x7C,0xA1,0x10,0x45,0x4A,0x1A,0x6E,0x57,
|
||||
0x01,0x31,0xD9,0x61,0x9D,0xC1,0x37,0x6E,
|
||||
0x07,0xA1,0x13,0x3E,0x4A,0x0B,0x26,0x86,
|
||||
0x38,0x49,0x67,0x4C,0x26,0x02,0x31,0x9E,
|
||||
0x04,0xB9,0x15,0xBA,0x43,0xFE,0xB5,0xB6,
|
||||
0x01,0x13,0xB9,0x70,0xFD,0x34,0xF2,0xCE,
|
||||
0x01,0x70,0xF1,0x75,0x46,0x8F,0xB5,0xE6,
|
||||
0x43,0x29,0x7F,0xAD,0x38,0xE3,0x73,0xFE,
|
||||
0x07,0xA7,0x13,0x70,0x45,0xDA,0x2A,0x16,
|
||||
0x04,0x68,0x91,0x04,0xC2,0xFD,0x3B,0x2F,
|
||||
0x37,0xD0,0x6B,0xB5,0x16,0xCB,0x75,0x46,
|
||||
0x1F,0x08,0x26,0x0D,0x1A,0xC2,0x46,0x5E,
|
||||
0x58,0x40,0x23,0x64,0x1A,0xBA,0x61,0x76,
|
||||
0x02,0x58,0x16,0x16,0x46,0x29,0xB0,0x07,
|
||||
0x49,0x79,0x3E,0xBC,0x79,0xB3,0x25,0x8F,
|
||||
0x4F,0xB0,0x5E,0x15,0x15,0xAB,0x73,0xA7,
|
||||
0x49,0xE9,0x5D,0x6D,0x4C,0xA2,0x29,0xBF,
|
||||
0x01,0x83,0x10,0xDC,0x40,0x9B,0x26,0xD6,
|
||||
0x1C,0x58,0x7F,0x1C,0x13,0x92,0x4F,0xEF,
|
||||
0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,
|
||||
0x1F,0x1F,0x1F,0x1F,0x0E,0x0E,0x0E,0x0E,
|
||||
0xE0,0xFE,0xE0,0xFE,0xF1,0xFE,0xF1,0xFE,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0xFE,0xDC,0xBA,0x98,0x76,0x54,0x32,0x10,
|
||||
);
|
||||
|
||||
@plain_data=(
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x10,0x00,0x00,0x00,0x00,0x00,0x00,0x01,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0xA1,0xD6,0xD0,0x39,0x77,0x67,0x42,
|
||||
0x5C,0xD5,0x4C,0xA8,0x3D,0xEF,0x57,0xDA,
|
||||
0x02,0x48,0xD4,0x38,0x06,0xF6,0x71,0x72,
|
||||
0x51,0x45,0x4B,0x58,0x2D,0xDF,0x44,0x0A,
|
||||
0x42,0xFD,0x44,0x30,0x59,0x57,0x7F,0xA2,
|
||||
0x05,0x9B,0x5E,0x08,0x51,0xCF,0x14,0x3A,
|
||||
0x07,0x56,0xD8,0xE0,0x77,0x47,0x61,0xD2,
|
||||
0x76,0x25,0x14,0xB8,0x29,0xBF,0x48,0x6A,
|
||||
0x3B,0xDD,0x11,0x90,0x49,0x37,0x28,0x02,
|
||||
0x26,0x95,0x5F,0x68,0x35,0xAF,0x60,0x9A,
|
||||
0x16,0x4D,0x5E,0x40,0x4F,0x27,0x52,0x32,
|
||||
0x6B,0x05,0x6E,0x18,0x75,0x9F,0x5C,0xCA,
|
||||
0x00,0x4B,0xD6,0xEF,0x09,0x17,0x60,0x62,
|
||||
0x48,0x0D,0x39,0x00,0x6E,0xE7,0x62,0xF2,
|
||||
0x43,0x75,0x40,0xC8,0x69,0x8F,0x3C,0xFA,
|
||||
0x07,0x2D,0x43,0xA0,0x77,0x07,0x52,0x92,
|
||||
0x02,0xFE,0x55,0x77,0x81,0x17,0xF1,0x2A,
|
||||
0x1D,0x9D,0x5C,0x50,0x18,0xF7,0x28,0xC2,
|
||||
0x30,0x55,0x32,0x28,0x6D,0x6F,0x29,0x5A,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF);
|
||||
|
||||
@cipher_data=(
|
||||
0x8C,0xA6,0x4D,0xE9,0xC1,0xB1,0x23,0xA7,
|
||||
0x73,0x59,0xB2,0x16,0x3E,0x4E,0xDC,0x58,
|
||||
0x95,0x8E,0x6E,0x62,0x7A,0x05,0x55,0x7B,
|
||||
0xF4,0x03,0x79,0xAB,0x9E,0x0E,0xC5,0x33,
|
||||
0x17,0x66,0x8D,0xFC,0x72,0x92,0x53,0x2D,
|
||||
0x8A,0x5A,0xE1,0xF8,0x1A,0xB8,0xF2,0xDD,
|
||||
0x8C,0xA6,0x4D,0xE9,0xC1,0xB1,0x23,0xA7,
|
||||
0xED,0x39,0xD9,0x50,0xFA,0x74,0xBC,0xC4,
|
||||
0x69,0x0F,0x5B,0x0D,0x9A,0x26,0x93,0x9B,
|
||||
0x7A,0x38,0x9D,0x10,0x35,0x4B,0xD2,0x71,
|
||||
0x86,0x8E,0xBB,0x51,0xCA,0xB4,0x59,0x9A,
|
||||
0x71,0x78,0x87,0x6E,0x01,0xF1,0x9B,0x2A,
|
||||
0xAF,0x37,0xFB,0x42,0x1F,0x8C,0x40,0x95,
|
||||
0x86,0xA5,0x60,0xF1,0x0E,0xC6,0xD8,0x5B,
|
||||
0x0C,0xD3,0xDA,0x02,0x00,0x21,0xDC,0x09,
|
||||
0xEA,0x67,0x6B,0x2C,0xB7,0xDB,0x2B,0x7A,
|
||||
0xDF,0xD6,0x4A,0x81,0x5C,0xAF,0x1A,0x0F,
|
||||
0x5C,0x51,0x3C,0x9C,0x48,0x86,0xC0,0x88,
|
||||
0x0A,0x2A,0xEE,0xAE,0x3F,0xF4,0xAB,0x77,
|
||||
0xEF,0x1B,0xF0,0x3E,0x5D,0xFA,0x57,0x5A,
|
||||
0x88,0xBF,0x0D,0xB6,0xD7,0x0D,0xEE,0x56,
|
||||
0xA1,0xF9,0x91,0x55,0x41,0x02,0x0B,0x56,
|
||||
0x6F,0xBF,0x1C,0xAF,0xCF,0xFD,0x05,0x56,
|
||||
0x2F,0x22,0xE4,0x9B,0xAB,0x7C,0xA1,0xAC,
|
||||
0x5A,0x6B,0x61,0x2C,0xC2,0x6C,0xCE,0x4A,
|
||||
0x5F,0x4C,0x03,0x8E,0xD1,0x2B,0x2E,0x41,
|
||||
0x63,0xFA,0xC0,0xD0,0x34,0xD9,0xF7,0x93,
|
||||
0x61,0x7B,0x3A,0x0C,0xE8,0xF0,0x71,0x00,
|
||||
0xDB,0x95,0x86,0x05,0xF8,0xC8,0xC6,0x06,
|
||||
0xED,0xBF,0xD1,0xC6,0x6C,0x29,0xCC,0xC7,
|
||||
0x35,0x55,0x50,0xB2,0x15,0x0E,0x24,0x51,
|
||||
0xCA,0xAA,0xAF,0x4D,0xEA,0xF1,0xDB,0xAE,
|
||||
0xD5,0xD4,0x4F,0xF7,0x20,0x68,0x3D,0x0D,
|
||||
0x2A,0x2B,0xB0,0x08,0xDF,0x97,0xC2,0xF2);
|
||||
|
||||
print "Doing ecb tests\n";
|
||||
for ($i=0; $i<$num_tests; $i++)
|
||||
{
|
||||
printf "Doing test $i\n";
|
||||
$key =pack("C8",splice(@key_data ,0,8));
|
||||
$data=pack("C8",splice(@plain_data ,0,8));
|
||||
$res =pack("C8",splice(@cipher_data,0,8));
|
||||
|
||||
@ks= &des_set_key($key);
|
||||
$out1= &des_ecb_encrypt(*ks,1,$data);
|
||||
$out2= &des_ecb_encrypt(*ks,0,$out1);
|
||||
$out3= &des_ecb_encrypt(*ks,0,$res);
|
||||
&eprint("encryption failure",$res,$out1)
|
||||
if ($out1 ne $res);
|
||||
&eprint("encryption/decryption failure",$data,$out2)
|
||||
if ($out2 ne $data);
|
||||
&eprint("decryption failure",$data,$out3)
|
||||
if ($data ne $out3);
|
||||
}
|
||||
print "Done\n";
|
||||
|
||||
print "doing speed test over 30 seconds\n";
|
||||
$SIG{'ALRM'}='done';
|
||||
sub done {$done=1;}
|
||||
$done=0;
|
||||
|
||||
$count=0;
|
||||
$d=pack("C8",0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef);
|
||||
@ks= &des_set_key($d);
|
||||
alarm(30);
|
||||
$start=(times)[0];
|
||||
while (!$done)
|
||||
{
|
||||
$count++;
|
||||
$d=&des_ecb_encrypt(*ks,1,$d);
|
||||
}
|
||||
$end=(times)[0];
|
||||
$t=$end-$start;
|
||||
printf "$count DESs in %.2f seconds is %.2f DESs/sec or %.2f bytes/sec\n",
|
||||
1.0*$t,1.0*$count/$t,$count*8.0/$t;
|
||||
|
||||
sub eprint
|
||||
{
|
||||
local($s,$c,$e)=@_;
|
||||
local(@k);
|
||||
|
||||
@k=unpack("C8",$c);
|
||||
printf "%02x%02x%02x%02x %02x%02x%02x%02x - ",unpack("C8",$c);
|
||||
printf "%02x%02x%02x%02x %02x%02x%02x%02x :",unpack("C8",$e);
|
||||
print " $s\n";
|
||||
}
|
77
lib/des/times
Normal file
77
lib/des/times
Normal file
@@ -0,0 +1,77 @@
|
||||
DEC Alpha DEC 4000/610 AXP OSF/1 v 1.3 - gcc v 2.3.3
|
||||
set_key per sec = 101840.19 ( 9.8uS)
|
||||
DES ecb bytes per sec = 1223712.35 ( 6.5uS)
|
||||
DES cbc bytes per sec = 1230542.98 ( 6.5uS)
|
||||
crypt per sec = 6428.75 (155.6uS)
|
||||
|
||||
DEC Alpha DEC 4000/610 APX OSF/1 v 1.3 - cc -O2 - OSF/1 AXP
|
||||
set_key per sec = 114198.91 ( 8.8uS)
|
||||
DES ecb bytes per sec = 1022710.93 ( 7.8uS)
|
||||
DES cbc bytes per sec = 1008821.93 ( 7.9uS)
|
||||
crypt per sec = 5454.13 (183.3uS)
|
||||
|
||||
DEC Alpha - DEC 3000/500 AXP OSF/1 - cc -O2 - 02/12/92
|
||||
set_key per sec = 83587.04 ( 12.0uS)
|
||||
DES ecb bytes per sec = 822620.82 ( 9.7uS)
|
||||
DES cbc bytes per sec = 832929.60 ( 9.6uS)
|
||||
crypt per sec = 4807.62 (208.0uS)
|
||||
|
||||
sun sparc 10/30 - gcc -O2
|
||||
set_key per sec = 42005.24 ( 23.8uS)
|
||||
DES ecb bytes per sec = 555949.47 ( 14.4uS)
|
||||
DES cbc bytes per sec = 549440.28 ( 14.6uS)
|
||||
crypt per sec = 2580.25 (387.6uS)
|
||||
|
||||
PA-RISC 1.1 HP 710
|
||||
set_key per sec = 38916.86
|
||||
DES ecb bytes per sec = 505971.82
|
||||
DES cbc bytes per sec = 515381.13
|
||||
crypt per sec = 2438.24
|
||||
|
||||
sun sparc 10/30 - cc -O4
|
||||
set_key per sec = 38379.86 ( 26.1uS)
|
||||
DES ecb bytes per sec = 460051.34 ( 17.4uS)
|
||||
DES cbc bytes per sec = 464970.54 ( 17.2uS)
|
||||
crypt per sec = 2092.64 (477.9uS)
|
||||
|
||||
sun sparc 2 - gcc2 -O2
|
||||
set_key per sec = 21559.10
|
||||
DES ecb bytes per sec = 305566.92
|
||||
DES cbc bytes per sec = 303497.50
|
||||
crypt per sec = 1410.48
|
||||
|
||||
RS/6000 model 320
|
||||
set_key per sec = 14371.93
|
||||
DES ecb bytes per sec = 222231.26
|
||||
DES cbc bytes per sec = 223926.79
|
||||
crypt per sec = 981.20
|
||||
|
||||
68030 HP400
|
||||
set_key per sec = 5251.28
|
||||
DES ecb bytes per sec = 56186.56
|
||||
DES cbc bytes per sec = 58681.53
|
||||
crypt per sec = 276.15
|
||||
|
||||
80486sx/33MHz MSDOS Turbo C v 2.0
|
||||
set_key per sec = 1883.22 (531.0uS)
|
||||
DES ecb bytes per sec = 63393.31 (126.2uS)
|
||||
DES cbc bytes per sec = 63416.83 (126.1uS)
|
||||
crypt per sec = 158.71 (6300.6uS)
|
||||
|
||||
80486sx/33MHz MSDOS djgpp gcc 1.39 (32bit compiler)
|
||||
set_key per sec = 12603.08 (79.3)
|
||||
DES ecb bytes per sec = 158875.15 (50.4)
|
||||
DES cbc bytes per sec = 159893.85 (50.0)
|
||||
crypt per sec = 780.24 (1281.7)
|
||||
|
||||
Version 1.99 26/08/92
|
||||
8MHz 68000 Atari-ST gcc 2.1 -O2 MiNT 0.94
|
||||
set_key per sec = 325.68 (3070.5uS)
|
||||
DES ecb bytes per sec = 4173.67 (1916.8uS)
|
||||
DES cbc bytes per sec = 4249.89 (1882.4uS)
|
||||
crypt per sec = 20.19 (49521.6uS)
|
||||
|
||||
8088/4.77mh MSDOS Turbo C v 2.0
|
||||
set_key per sec = 35.09
|
||||
DES ecb bytes per sec = 563.63
|
||||
crypt per sec = 2.69
|
90
lib/des/vms.com
Normal file
90
lib/des/vms.com
Normal file
@@ -0,0 +1,90 @@
|
||||
$! --- VMS.com ---
|
||||
$!
|
||||
$ GoSub defines
|
||||
$ GoSub linker_options
|
||||
$ If (P1 .nes. "")
|
||||
$ Then
|
||||
$ GoSub 'P1'
|
||||
$ Else
|
||||
$ GoSub lib
|
||||
$ GoSub destest
|
||||
$ GoSub rpw
|
||||
$ GoSub speed
|
||||
$ GoSub des
|
||||
$ EndIF
|
||||
$!
|
||||
$ Exit
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$DEFINES:
|
||||
$ OPT_FILE := "VAX_LINKER_OPTIONS.OPT"
|
||||
$!
|
||||
$ CC_OPTS := "/NODebug/OPTimize/NOWarn"
|
||||
$!
|
||||
$ LINK_OPTS := "/NODebug/NOTraceback/Contiguous"
|
||||
$!
|
||||
$ OBJS = "cbc_cksm.obj,cbc_enc.obj,ecb_enc.obj,pcbc_enc.obj," + -
|
||||
"qud_cksm.obj,rand_key.obj,read_pwd.obj,set_key.obj," + -
|
||||
"str2key.obj,enc_read.obj,enc_writ.obj,fcrypt.obj," + -
|
||||
"cfb_enc.obj,3ecb_enc.obj,ofb_enc.obj"
|
||||
|
||||
|
||||
$!
|
||||
$ LIBDES = "cbc_cksm.c,cbc_enc.c,ecb_enc.c,enc_read.c," + -
|
||||
"enc_writ.c,pcbc_enc.c,qud_cksm.c,rand_key.c," + -
|
||||
"read_pwd.c,set_key.c,str2key.c,fcrypt.c," + -
|
||||
"cfb_enc.c,3ecb_enc.c,ofb_enc.c"
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$LINKER_OPTIONS:
|
||||
$ If (f$search(OPT_FILE) .eqs. "")
|
||||
$ Then
|
||||
$ Create 'OPT_FILE'
|
||||
$DECK
|
||||
! Default system options file to link against the sharable C runtime library
|
||||
!
|
||||
Sys$Share:VAXcRTL.exe/Share
|
||||
$EOD
|
||||
$ EndIF
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$LIB:
|
||||
$ CC 'CC_OPTS' 'LIBDES'
|
||||
$ If (f$search("LIBDES.OLB") .nes. "")
|
||||
$ Then Library /Object /Replace libdes 'OBJS'
|
||||
$ Else Library /Create /Object libdes 'OBJS'
|
||||
$ EndIF
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$DESTEST:
|
||||
$ CC 'CC_OPTS' destest
|
||||
$ Link 'link_opts' /Exec=destest destest.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$RPW:
|
||||
$ CC 'CC_OPTS' rpw
|
||||
$ Link 'link_opts' /Exec=rpw rpw.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$SPEED:
|
||||
$ CC 'CC_OPTS' speed
|
||||
$ Link 'link_opts' /Exec=speed speed.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$DES:
|
||||
$ CC 'CC_OPTS' des
|
||||
$ Link 'link_opts' /Exec=des des.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
128
lib/roken/getopt.c
Normal file
128
lib/roken/getopt.c
Normal file
@@ -0,0 +1,128 @@
|
||||
/*
|
||||
* Copyright (c) 1987, 1993
|
||||
* The Regents of the University of California. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by the University of
|
||||
* California, Berkeley and its contributors.
|
||||
* 4. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#if defined(LIBC_SCCS) && !defined(lint)
|
||||
static char sccsid[] = "@(#)getopt.c 8.1 (Berkeley) 6/4/93";
|
||||
#endif /* LIBC_SCCS and not lint */
|
||||
|
||||
#ifndef __STDC__
|
||||
#define const
|
||||
#endif
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
/*
|
||||
* get option letter from argument vector
|
||||
*/
|
||||
int opterr = 1, /* if error message should be printed */
|
||||
optind = 1, /* index into parent argv vector */
|
||||
optopt, /* character checked for validity */
|
||||
optreset; /* reset getopt */
|
||||
char *optarg; /* argument associated with option */
|
||||
|
||||
#define BADCH (int)'?'
|
||||
#define BADARG (int)':'
|
||||
#define EMSG ""
|
||||
|
||||
int
|
||||
getopt(nargc, nargv, ostr)
|
||||
int nargc;
|
||||
char * const *nargv;
|
||||
const char *ostr;
|
||||
{
|
||||
static char *place = EMSG; /* option letter processing */
|
||||
register char *oli; /* option letter list index */
|
||||
char *p;
|
||||
|
||||
if (optreset || !*place) { /* update scanning pointer */
|
||||
optreset = 0;
|
||||
if (optind >= nargc || *(place = nargv[optind]) != '-') {
|
||||
place = EMSG;
|
||||
return(EOF);
|
||||
}
|
||||
if (place[1] && *++place == '-') { /* found "--" */
|
||||
++optind;
|
||||
place = EMSG;
|
||||
return(EOF);
|
||||
}
|
||||
} /* option letter okay? */
|
||||
if ((optopt = (int)*place++) == (int)':' ||
|
||||
!(oli = strchr(ostr, optopt))) {
|
||||
/*
|
||||
* if the user didn't specify '-' as an option,
|
||||
* assume it means EOF.
|
||||
*/
|
||||
if (optopt == (int)'-')
|
||||
return(EOF);
|
||||
if (!*place)
|
||||
++optind;
|
||||
if (opterr && *ostr != ':') {
|
||||
if (!(p = strrchr(*nargv, '/')))
|
||||
p = *nargv;
|
||||
else
|
||||
++p;
|
||||
(void)fprintf(stderr, "%s: illegal option -- %c\n",
|
||||
p, optopt);
|
||||
}
|
||||
return(BADCH);
|
||||
}
|
||||
if (*++oli != ':') { /* don't need argument */
|
||||
optarg = NULL;
|
||||
if (!*place)
|
||||
++optind;
|
||||
}
|
||||
else { /* need an argument */
|
||||
if (*place) /* no white space */
|
||||
optarg = place;
|
||||
else if (nargc <= ++optind) { /* no arg */
|
||||
place = EMSG;
|
||||
if (!(p = strrchr(*nargv, '/')))
|
||||
p = *nargv;
|
||||
else
|
||||
++p;
|
||||
if (*ostr == ':')
|
||||
return(BADARG);
|
||||
if (opterr)
|
||||
(void)fprintf(stderr,
|
||||
"%s: option requires an argument -- %c\n",
|
||||
p, optopt);
|
||||
return(BADCH);
|
||||
}
|
||||
else /* white space */
|
||||
optarg = nargv[optind];
|
||||
place = EMSG;
|
||||
++optind;
|
||||
}
|
||||
return(optopt); /* dump back option letter */
|
||||
}
|
122
lib/roken/strcasecmp.c
Normal file
122
lib/roken/strcasecmp.c
Normal file
@@ -0,0 +1,122 @@
|
||||
/*
|
||||
* Copyright (c) 1987, 1993
|
||||
* The Regents of the University of California. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by the University of
|
||||
* California, Berkeley and its contributors.
|
||||
* 4. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#ifndef __STDC__
|
||||
#define const
|
||||
#endif
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <sys/cdefs.h>
|
||||
#ifdef NO_STRING_H
|
||||
#include <strings.h>
|
||||
#else
|
||||
#include <string.h>
|
||||
#endif
|
||||
|
||||
#if defined(LIBC_SCCS) && !defined(lint)
|
||||
static char sccsid[] = "@(#)strcasecmp.c 8.1 (Berkeley) 6/4/93";
|
||||
#endif /* LIBC_SCCS and not lint */
|
||||
|
||||
/*
|
||||
* This array is designed for mapping upper and lower case letter
|
||||
* together for a case independent comparison. The mappings are
|
||||
* based upon ascii character sequences.
|
||||
*/
|
||||
static const u_char charmap[] = {
|
||||
'\000', '\001', '\002', '\003', '\004', '\005', '\006', '\007',
|
||||
'\010', '\011', '\012', '\013', '\014', '\015', '\016', '\017',
|
||||
'\020', '\021', '\022', '\023', '\024', '\025', '\026', '\027',
|
||||
'\030', '\031', '\032', '\033', '\034', '\035', '\036', '\037',
|
||||
'\040', '\041', '\042', '\043', '\044', '\045', '\046', '\047',
|
||||
'\050', '\051', '\052', '\053', '\054', '\055', '\056', '\057',
|
||||
'\060', '\061', '\062', '\063', '\064', '\065', '\066', '\067',
|
||||
'\070', '\071', '\072', '\073', '\074', '\075', '\076', '\077',
|
||||
'\100', '\141', '\142', '\143', '\144', '\145', '\146', '\147',
|
||||
'\150', '\151', '\152', '\153', '\154', '\155', '\156', '\157',
|
||||
'\160', '\161', '\162', '\163', '\164', '\165', '\166', '\167',
|
||||
'\170', '\171', '\172', '\133', '\134', '\135', '\136', '\137',
|
||||
'\140', '\141', '\142', '\143', '\144', '\145', '\146', '\147',
|
||||
'\150', '\151', '\152', '\153', '\154', '\155', '\156', '\157',
|
||||
'\160', '\161', '\162', '\163', '\164', '\165', '\166', '\167',
|
||||
'\170', '\171', '\172', '\173', '\174', '\175', '\176', '\177',
|
||||
'\200', '\201', '\202', '\203', '\204', '\205', '\206', '\207',
|
||||
'\210', '\211', '\212', '\213', '\214', '\215', '\216', '\217',
|
||||
'\220', '\221', '\222', '\223', '\224', '\225', '\226', '\227',
|
||||
'\230', '\231', '\232', '\233', '\234', '\235', '\236', '\237',
|
||||
'\240', '\241', '\242', '\243', '\244', '\245', '\246', '\247',
|
||||
'\250', '\251', '\252', '\253', '\254', '\255', '\256', '\257',
|
||||
'\260', '\261', '\262', '\263', '\264', '\265', '\266', '\267',
|
||||
'\270', '\271', '\272', '\273', '\274', '\275', '\276', '\277',
|
||||
'\300', '\301', '\302', '\303', '\304', '\305', '\306', '\307',
|
||||
'\310', '\311', '\312', '\313', '\314', '\315', '\316', '\317',
|
||||
'\320', '\321', '\322', '\323', '\324', '\325', '\326', '\327',
|
||||
'\330', '\331', '\332', '\333', '\334', '\335', '\336', '\337',
|
||||
'\340', '\341', '\342', '\343', '\344', '\345', '\346', '\347',
|
||||
'\350', '\351', '\352', '\353', '\354', '\355', '\356', '\357',
|
||||
'\360', '\361', '\362', '\363', '\364', '\365', '\366', '\367',
|
||||
'\370', '\371', '\372', '\373', '\374', '\375', '\376', '\377',
|
||||
};
|
||||
|
||||
int
|
||||
strcasecmp(s1, s2)
|
||||
const char *s1, *s2;
|
||||
{
|
||||
register const u_char *cm = charmap,
|
||||
*us1 = (const u_char *)s1,
|
||||
*us2 = (const u_char *)s2;
|
||||
|
||||
while (cm[*us1] == cm[*us2++])
|
||||
if (*us1++ == '\0')
|
||||
return (0);
|
||||
return (cm[*us1] - cm[*--us2]);
|
||||
}
|
||||
|
||||
int
|
||||
strncasecmp(s1, s2, n)
|
||||
const char *s1, *s2;
|
||||
register size_t n;
|
||||
{
|
||||
if (n != 0) {
|
||||
register const u_char *cm = charmap,
|
||||
*us1 = (const u_char *)s1,
|
||||
*us2 = (const u_char *)s2;
|
||||
|
||||
do {
|
||||
if (cm[*us1] != cm[*us2++])
|
||||
return (cm[*us1] - cm[*--us2]);
|
||||
if (*us1++ == '\0')
|
||||
break;
|
||||
} while (--n != 0);
|
||||
}
|
||||
return (0);
|
||||
}
|
315
lib/roken/strftime.c
Normal file
315
lib/roken/strftime.c
Normal file
@@ -0,0 +1,315 @@
|
||||
/*
|
||||
* Copyright (c) 1989, 1993
|
||||
* The Regents of the University of California. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by the University of
|
||||
* California, Berkeley and its contributors.
|
||||
* 4. Neither the name of the University nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#if defined(LIBC_SCCS) && !defined(lint)
|
||||
static char sccsid[] = "@(#)strftime.c 8.1 (Berkeley) 6/4/93";
|
||||
#endif /* LIBC_SCCS and not lint */
|
||||
|
||||
#ifndef __STDC__
|
||||
#define const
|
||||
#endif
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <sys/time.h>
|
||||
#ifdef notdef
|
||||
#include <tzfile.h>
|
||||
#else
|
||||
#define TM_YEAR_BASE 1900 /* from <tzfile.h> */
|
||||
#endif
|
||||
#ifdef NO_STRING_H
|
||||
#include <strings.h>
|
||||
#else
|
||||
#include <string.h>
|
||||
#endif
|
||||
|
||||
static char *afmt[] = {
|
||||
"Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat",
|
||||
};
|
||||
static char *Afmt[] = {
|
||||
"Sunday", "Monday", "Tuesday", "Wednesday", "Thursday", "Friday",
|
||||
"Saturday",
|
||||
};
|
||||
static char *bfmt[] = {
|
||||
"Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep",
|
||||
"Oct", "Nov", "Dec",
|
||||
};
|
||||
static char *Bfmt[] = {
|
||||
"January", "February", "March", "April", "May", "June", "July",
|
||||
"August", "September", "October", "November", "December",
|
||||
};
|
||||
|
||||
static size_t gsize;
|
||||
static char *pt;
|
||||
#ifndef __P
|
||||
#define __P(x) ()
|
||||
#endif
|
||||
static int _add __P((char *));
|
||||
static int _conv __P((int, int, int));
|
||||
#ifndef NO_MKTIME
|
||||
static int _secs __P((const struct tm *));
|
||||
#endif /* NO_MKTIME */
|
||||
static size_t _fmt __P((const char *, const struct tm *));
|
||||
|
||||
size_t
|
||||
strftime(s, maxsize, format, t)
|
||||
char *s;
|
||||
size_t maxsize;
|
||||
const char *format;
|
||||
const struct tm *t;
|
||||
{
|
||||
|
||||
pt = s;
|
||||
if ((gsize = maxsize) < 1)
|
||||
return(0);
|
||||
if (_fmt(format, t)) {
|
||||
*pt = '\0';
|
||||
return(maxsize - gsize);
|
||||
}
|
||||
return(0);
|
||||
}
|
||||
|
||||
static size_t
|
||||
_fmt(format, t)
|
||||
register const char *format;
|
||||
const struct tm *t;
|
||||
{
|
||||
for (; *format; ++format) {
|
||||
if (*format == '%')
|
||||
switch(*++format) {
|
||||
case '\0':
|
||||
--format;
|
||||
break;
|
||||
case 'A':
|
||||
if (t->tm_wday < 0 || t->tm_wday > 6)
|
||||
return(0);
|
||||
if (!_add(Afmt[t->tm_wday]))
|
||||
return(0);
|
||||
continue;
|
||||
case 'a':
|
||||
if (t->tm_wday < 0 || t->tm_wday > 6)
|
||||
return(0);
|
||||
if (!_add(afmt[t->tm_wday]))
|
||||
return(0);
|
||||
continue;
|
||||
case 'B':
|
||||
if (t->tm_mon < 0 || t->tm_mon > 11)
|
||||
return(0);
|
||||
if (!_add(Bfmt[t->tm_mon]))
|
||||
return(0);
|
||||
continue;
|
||||
case 'b':
|
||||
case 'h':
|
||||
if (t->tm_mon < 0 || t->tm_mon > 11)
|
||||
return(0);
|
||||
if (!_add(bfmt[t->tm_mon]))
|
||||
return(0);
|
||||
continue;
|
||||
case 'C':
|
||||
if (!_fmt("%a %b %e %H:%M:%S %Y", t))
|
||||
return(0);
|
||||
continue;
|
||||
case 'c':
|
||||
if (!_fmt("%m/%d/%y %H:%M:%S", t))
|
||||
return(0);
|
||||
continue;
|
||||
case 'D':
|
||||
if (!_fmt("%m/%d/%y", t))
|
||||
return(0);
|
||||
continue;
|
||||
case 'd':
|
||||
if (!_conv(t->tm_mday, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'e':
|
||||
if (!_conv(t->tm_mday, 2, ' '))
|
||||
return(0);
|
||||
continue;
|
||||
case 'H':
|
||||
if (!_conv(t->tm_hour, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'I':
|
||||
if (!_conv(t->tm_hour % 12 ?
|
||||
t->tm_hour % 12 : 12, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'j':
|
||||
if (!_conv(t->tm_yday + 1, 3, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'k':
|
||||
if (!_conv(t->tm_hour, 2, ' '))
|
||||
return(0);
|
||||
continue;
|
||||
case 'l':
|
||||
if (!_conv(t->tm_hour % 12 ?
|
||||
t->tm_hour % 12 : 12, 2, ' '))
|
||||
return(0);
|
||||
continue;
|
||||
case 'M':
|
||||
if (!_conv(t->tm_min, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'm':
|
||||
if (!_conv(t->tm_mon + 1, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'n':
|
||||
if (!_add("\n"))
|
||||
return(0);
|
||||
continue;
|
||||
case 'p':
|
||||
if (!_add(t->tm_hour >= 12 ? "PM" : "AM"))
|
||||
return(0);
|
||||
continue;
|
||||
case 'R':
|
||||
if (!_fmt("%H:%M", t))
|
||||
return(0);
|
||||
continue;
|
||||
case 'r':
|
||||
if (!_fmt("%I:%M:%S %p", t))
|
||||
return(0);
|
||||
continue;
|
||||
case 'S':
|
||||
if (!_conv(t->tm_sec, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
#ifndef NO_MKTIME
|
||||
case 's':
|
||||
if (!_secs(t))
|
||||
return(0);
|
||||
continue;
|
||||
#endif /* NO_MKTIME */
|
||||
case 'T':
|
||||
case 'X':
|
||||
if (!_fmt("%H:%M:%S", t))
|
||||
return(0);
|
||||
continue;
|
||||
case 't':
|
||||
if (!_add("\t"))
|
||||
return(0);
|
||||
continue;
|
||||
case 'U':
|
||||
if (!_conv((t->tm_yday + 7 - t->tm_wday) / 7,
|
||||
2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'W':
|
||||
if (!_conv((t->tm_yday + 7 -
|
||||
(t->tm_wday ? (t->tm_wday - 1) : 6))
|
||||
/ 7, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'w':
|
||||
if (!_conv(t->tm_wday, 1, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'x':
|
||||
if (!_fmt("%m/%d/%y", t))
|
||||
return(0);
|
||||
continue;
|
||||
case 'y':
|
||||
if (!_conv((t->tm_year + TM_YEAR_BASE)
|
||||
% 100, 2, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
case 'Y':
|
||||
if (!_conv(t->tm_year + TM_YEAR_BASE, 4, '0'))
|
||||
return(0);
|
||||
continue;
|
||||
#ifdef notdef
|
||||
case 'Z':
|
||||
if (!t->tm_zone || !_add(t->tm_zone))
|
||||
return(0);
|
||||
continue;
|
||||
#endif
|
||||
case '%':
|
||||
/*
|
||||
* X311J/88-090 (4.12.3.5): if conversion char is
|
||||
* undefined, behavior is undefined. Print out the
|
||||
* character itself as printf(3) does.
|
||||
*/
|
||||
default:
|
||||
break;
|
||||
}
|
||||
if (!gsize--)
|
||||
return(0);
|
||||
*pt++ = *format;
|
||||
}
|
||||
return(gsize);
|
||||
}
|
||||
|
||||
#ifndef NO_MKTIME
|
||||
static int
|
||||
_secs(t)
|
||||
const struct tm *t;
|
||||
{
|
||||
static char buf[15];
|
||||
register time_t s;
|
||||
register char *p;
|
||||
struct tm tmp;
|
||||
|
||||
/* Make a copy, mktime(3) modifies the tm struct. */
|
||||
tmp = *t;
|
||||
s = mktime(&tmp);
|
||||
for (p = buf + sizeof(buf) - 2; s > 0 && p > buf; s /= 10)
|
||||
*p-- = s % 10 + '0';
|
||||
return(_add(++p));
|
||||
}
|
||||
#endif /* NO_MKTIME */
|
||||
|
||||
static int
|
||||
_conv(n, digits, pad)
|
||||
int n, digits, pad;
|
||||
{
|
||||
static char buf[10];
|
||||
register char *p;
|
||||
|
||||
for (p = buf + sizeof(buf) - 2; n > 0 && p > buf; n /= 10, --digits)
|
||||
*p-- = n % 10 + '0';
|
||||
while (p > buf && digits-- > 0)
|
||||
*p-- = pad;
|
||||
return(_add(++p));
|
||||
}
|
||||
|
||||
static int
|
||||
_add(str)
|
||||
register char *str;
|
||||
{
|
||||
for (;; ++pt, --gsize) {
|
||||
if (!gsize)
|
||||
return(0);
|
||||
if (!(*pt = *str++))
|
||||
return(1);
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user