Replace the eay DES code with key scheule setup code by me and DES
s-box and p permutation from Richard Outerbridge implemtation (in public domain). The DES modes are implemented by me. ui.c code are from appl/login. The implementation is about 3 times slower then Eric for encryption, and about the same speed for key setup. git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@14585 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -1,50 +0,0 @@
|
||||
Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
All rights reserved.
|
||||
|
||||
This package is an DES implementation written by Eric Young (eay@mincom.oz.au).
|
||||
The implementation was written so as to conform with MIT's libdes.
|
||||
|
||||
This library is free for commercial and non-commercial use as long as
|
||||
the following conditions are aheared to. The following conditions
|
||||
apply to all code found in this distribution.
|
||||
|
||||
Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
the code are not to be removed.
|
||||
If this package is used in a product, Eric Young should be given attribution
|
||||
as the author of that the SSL library. This can be in the form of a textual
|
||||
message at program startup or in documentation (online or textual) provided
|
||||
with the package.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions
|
||||
are met:
|
||||
1. Redistributions of source code must retain the copyright
|
||||
notice, this list of conditions and the following disclaimer.
|
||||
2. Redistributions in binary form must reproduce the above copyright
|
||||
notice, this list of conditions and the following disclaimer in the
|
||||
documentation and/or other materials provided with the distribution.
|
||||
3. All advertising materials mentioning features or use of this software
|
||||
must display the following acknowledgement:
|
||||
This product includes software developed by Eric Young (eay@mincom.oz.au)
|
||||
|
||||
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGE.
|
||||
|
||||
The license and distribution terms for any publically available version or
|
||||
derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
copied and put under another distrubution license
|
||||
[including the GNU Public License.]
|
||||
|
||||
The reason behind this being stated in this direct manner is past
|
||||
experience in code simply being copied and the attribution removed
|
||||
from it and then being distributed as part of other packages. This
|
||||
implementation was a non-trivial and unpaid effort.
|
||||
@@ -1,249 +0,0 @@
|
||||
2004-08-10 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* rnd_keys.c (DES_rand_data): also try /dev/arandom
|
||||
|
||||
2004-06-02 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* rnd_keys.c: don't include krb4 headers
|
||||
|
||||
* rijndael-alg-fst.c: don't include krb4 headers
|
||||
|
||||
* aes.c: don't include krb4 headers
|
||||
|
||||
* aes.h: define AES_{EN,DE}CRYPT; remove #ifdefs, this is an
|
||||
installed file
|
||||
|
||||
2004-04-25 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* rc2.c: handle non blocksized cbc messages
|
||||
|
||||
* aes.[ch]: add AES_cbc_encrypt
|
||||
|
||||
2004-04-24 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* rc2test.c: test vectors from RFC2268
|
||||
|
||||
* rc2.c (RC2_set_key): rewrite the mask calculation
|
||||
|
||||
* rc2.c (RC2_set_key): handle keys where effective bits are
|
||||
diffrent from keylength
|
||||
|
||||
2004-04-23 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* rc2.c: rc2 implementation
|
||||
|
||||
* rc2.h: rc2 implementation
|
||||
|
||||
* rc2test.c: rc2 implementation
|
||||
|
||||
* Makefile.am: rc2 implementation
|
||||
|
||||
2004-03-25 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* Makefile.am: new arcfour implementation
|
||||
|
||||
* rc4.c: implemented from description in
|
||||
draft-kaukonen-cipher-arcfour-03.txt
|
||||
|
||||
* rc4.h: replace with new implementation
|
||||
|
||||
* rc4_enc.c rc4_skey.c: remove
|
||||
|
||||
* rctest.c: test for arcfour
|
||||
|
||||
2003-12-07 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* rnd_keys.c: uninitialized variable, from Panasas Inc
|
||||
|
||||
2003-09-03 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* md4.c (MD4_Final): make the function threadsafe by removing
|
||||
static on the local variable zeros
|
||||
|
||||
* md5.c (MD5_Final): make the function threadsafe by removing
|
||||
static on the local variable zeros
|
||||
|
||||
* switch to the DES_ api, dont provide any compat glue
|
||||
|
||||
2003-08-27 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* sha.c: make the function threadsafe by removing static on the
|
||||
local variable zeros
|
||||
|
||||
2003-07-23 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* rijndael-alg-fst.h,rijndael-alg-fst.c,aes.c,aes.h:
|
||||
Makefile.am: add AES support
|
||||
|
||||
2003-03-19 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* des.1: sunOS -> SunOS, from jmc <jmc@prioris.mini.pw.edu.pl>
|
||||
|
||||
2003-03-19 Love H<>rnquist <20>strand <lha@it.su.se>
|
||||
|
||||
* des.1: spelling, from <jmc@prioris.mini.pw.edu.pl>
|
||||
|
||||
2002-08-28 Johan Danielsson <joda@pdc.kth.se>
|
||||
|
||||
* read_pwd.c: move NeXT SGTTY stuff here
|
||||
|
||||
2001-05-17 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am: bump version to 3:1:0
|
||||
|
||||
2001-05-11 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* str2key.c (des_string_to_key, des_string_to_2keys): avoid weak
|
||||
keys
|
||||
|
||||
2001-02-16 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* set_key.c: correct weak keys and update comment
|
||||
|
||||
2001-02-14 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* set_key.c: correct the two last weak keys in accordance with
|
||||
FIPS 74. noted by <jhutz@cmu.edu>
|
||||
|
||||
2001-01-30 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am (libdes_la_LDFLAGS): bump version to 3:0:0
|
||||
|
||||
2000-10-19 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.in (LIBSRC, LIBOBJ): add rc4* and enc_{read,write}
|
||||
files so that this library contains the same things as libdes in
|
||||
Heimdal
|
||||
|
||||
2000-08-16 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am: bump version to 2:1:0
|
||||
|
||||
2000-08-03 Johan Danielsson <joda@pdc.kth.se>
|
||||
|
||||
* enc_writ.c: BSIZE -> des_BSIZE to avoid conflicts with AIX
|
||||
jfs/fsparam.h
|
||||
|
||||
* enc_read.c: BSIZE -> des_BSIZE to avoid conflicts with AIX
|
||||
jfs/fsparam.h
|
||||
|
||||
* des_locl.h: BSIZE -> des_BSIZE to avoid conflicts with AIX
|
||||
jfs/fsparam.h
|
||||
|
||||
2000-02-07 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am: set version to 2:0:0
|
||||
|
||||
2000-01-26 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* mdtest.c: update to pseudo-standard APIs for md4,md5,sha.
|
||||
* md4.c, md4.h, md5.c, md5.h, sha.c, sha.h: move to the
|
||||
pseudo-standard APIs
|
||||
|
||||
1999-12-06 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am: set version to 1:0:1
|
||||
|
||||
1999-11-29 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* fcrypt.c (crypt_md5): add trailing $
|
||||
|
||||
1999-11-13 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am (include_HEADERS): add rc4.h
|
||||
(libdes_la_SOURCES): add rc4_skey.c
|
||||
|
||||
1999-10-28 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* md5crypt_test.c: change the test case. apparently we should not
|
||||
include $ after the salt. also make it print more useful stuff
|
||||
when failing.
|
||||
|
||||
1999-10-20 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am: bump version to 0:2:0
|
||||
|
||||
1999-09-21 Johan Danielsson <joda@pdc.kth.se>
|
||||
|
||||
* des.h: make this work with mips 64-bit abi
|
||||
|
||||
1999-08-14 Johan Danielsson <joda@pdc.kth.se>
|
||||
|
||||
* fcrypt.c (crypt_md5): don't use snprintf
|
||||
|
||||
1999-08-13 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.am: add md5crypt_test
|
||||
|
||||
* Makefile.in: add md5crypt_test
|
||||
|
||||
* md5crypt_test.c: test md5 crypt
|
||||
|
||||
* fcrypt.c: always enable md5 crypt
|
||||
|
||||
1999-07-26 Johan Danielsson <joda@pdc.kth.se>
|
||||
|
||||
* Makefile.am: bump version number (changes to md*, sha)
|
||||
|
||||
1999-06-15 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* sha.c (swap_u_int32_t): add _CRAY
|
||||
|
||||
Sat Apr 10 23:02:30 1999 Johan Danielsson <joda@hella.pdc.kth.se>
|
||||
|
||||
* destest.c: fixes for crays
|
||||
|
||||
Thu Apr 1 11:26:38 1999 Johan Danielsson <joda@hella.pdc.kth.se>
|
||||
|
||||
* Makefile.am: noinst_PROGRAMS -> check_PROGRAMS; add TESTS; don't
|
||||
build rpw, and speed
|
||||
|
||||
Mon Mar 22 20:16:26 1999 Johan Danielsson <joda@hella.pdc.kth.se>
|
||||
|
||||
* Makefile.am: hash.h
|
||||
|
||||
* sha.c: use hash.h; fixes for crays
|
||||
|
||||
* md5.c: use hash.h; fixes for crays
|
||||
|
||||
* md4.c: use hash.h; fixes for crays
|
||||
|
||||
* hash.h: common stuff from md4, md5, and sha1
|
||||
|
||||
Sat Mar 20 00:16:53 1999 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* rnd_keys.c (des_rand_data): move declaration to get rid of
|
||||
warning
|
||||
|
||||
Thu Mar 18 11:22:28 1999 Johan Danielsson <joda@hella.pdc.kth.se>
|
||||
|
||||
* Makefile.am: include Makefile.am.common
|
||||
|
||||
Mon Mar 15 17:36:41 1999 Johan Danielsson <joda@hella.pdc.kth.se>
|
||||
|
||||
* rnd_keys.c (des_rand_data): if not using setitimer, block
|
||||
SIGCHLD around fork(), also make sure we get the status of the
|
||||
child process
|
||||
(fake_signal): emulate signal using sigaction
|
||||
|
||||
Tue Jan 12 05:06:54 1999 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* des.h: sparcv9 is also 64 bits, use `unsigned int' instead of
|
||||
`unsigned long'
|
||||
|
||||
Sun Nov 22 10:40:09 1998 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.in (WFLAGS): set
|
||||
|
||||
Mon May 25 05:24:56 1998 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.in (clean): try to remove shared library debris
|
||||
|
||||
Sun Apr 19 09:50:53 1998 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* Makefile.in: add symlink magic for linux
|
||||
|
||||
Sun Nov 9 07:14:45 1997 Assar Westerlund <assar@sics.se>
|
||||
|
||||
* mdtest.c: print out old and new string
|
||||
|
||||
@@ -1,19 +0,0 @@
|
||||
package DES;
|
||||
|
||||
require Exporter;
|
||||
require DynaLoader;
|
||||
@ISA = qw(Exporter DynaLoader);
|
||||
# Items to export into callers namespace by default
|
||||
# (move infrequently used names to @EXPORT_OK below)
|
||||
@EXPORT = qw(
|
||||
);
|
||||
# Other items we are prepared to export if requested
|
||||
@EXPORT_OK = qw(
|
||||
crypt
|
||||
);
|
||||
|
||||
# Preloaded methods go here. Autoload methods go after __END__, and are
|
||||
# processed by the autosplit program.
|
||||
bootstrap DES;
|
||||
1;
|
||||
__END__
|
||||
@@ -1,16 +0,0 @@
|
||||
crypt <= crypt(buf,salt)
|
||||
key <= set_odd_parity(key)
|
||||
int <= is_weak_key(key)
|
||||
keysched<= set_key(key)
|
||||
key <= ecb_encrypt(string8,ks,enc)
|
||||
key <= ecb3_encrypt(input,ks1,ks2,enc)
|
||||
string <= cbc_encrypt(input,ks,ivec,enc) => ivec
|
||||
string <= cbc3_encrypt(input,ks1,ks2,ivec1,ivec2,enc) => ivec1&ivec2
|
||||
ck1,ck2 <= cbc_cksum(input,ks,ivec) => ivec
|
||||
string <= pcbc_encrypt(input,ks,ivec,enc) => ivec
|
||||
string <= ofb_encrypt(input,numbits,ks,ivec) => ivec
|
||||
string <= cfb_encrypt(input,numbits,ks,ivec,enc) => ivec
|
||||
key <= random_key()
|
||||
key <= string_to_key(string)
|
||||
key1,key2<= string_to_2keys(string)
|
||||
|
||||
268
lib/des/DES.xs
268
lib/des/DES.xs
@@ -1,268 +0,0 @@
|
||||
#include "EXTERN.h"
|
||||
#include "perl.h"
|
||||
#include "XSUB.h"
|
||||
#include "des.h"
|
||||
|
||||
#define deschar char
|
||||
static STRLEN len;
|
||||
|
||||
static int
|
||||
not_here(s)
|
||||
char *s;
|
||||
{
|
||||
croak("%s not implemented on this architecture", s);
|
||||
return -1;
|
||||
}
|
||||
|
||||
MODULE = DES PACKAGE = DES PREFIX = des_
|
||||
|
||||
char *
|
||||
des_crypt(buf,salt)
|
||||
char * buf
|
||||
char * salt
|
||||
|
||||
void
|
||||
des_set_odd_parity(key)
|
||||
des_cblock * key
|
||||
PPCODE:
|
||||
{
|
||||
SV *s;
|
||||
|
||||
s=sv_newmortal();
|
||||
sv_setpvn(s,(char *)key,8);
|
||||
des_set_odd_parity((des_cblock *)SvPV(s,na));
|
||||
PUSHs(s);
|
||||
}
|
||||
|
||||
int
|
||||
des_is_weak_key(key)
|
||||
des_cblock * key
|
||||
|
||||
des_key_schedule
|
||||
des_set_key(key)
|
||||
des_cblock * key
|
||||
CODE:
|
||||
des_set_key(key,RETVAL);
|
||||
OUTPUT:
|
||||
RETVAL
|
||||
|
||||
des_cblock
|
||||
des_ecb_encrypt(input,ks,encrypt)
|
||||
des_cblock * input
|
||||
des_key_schedule * ks
|
||||
int encrypt
|
||||
CODE:
|
||||
des_ecb_encrypt(input,&RETVAL,*ks,encrypt);
|
||||
OUTPUT:
|
||||
RETVAL
|
||||
|
||||
void
|
||||
des_cbc_encrypt(input,ks,ivec,encrypt)
|
||||
char * input
|
||||
des_key_schedule * ks
|
||||
des_cblock * ivec
|
||||
int encrypt
|
||||
PPCODE:
|
||||
{
|
||||
SV *s;
|
||||
STRLEN len,l;
|
||||
char *c;
|
||||
|
||||
l=SvCUR(ST(0));
|
||||
len=((((unsigned long)l)+7)/8)*8;
|
||||
s=sv_newmortal();
|
||||
sv_setpvn(s,"",0);
|
||||
SvGROW(s,len);
|
||||
SvCUR_set(s,len);
|
||||
c=(char *)SvPV(s,na);
|
||||
des_cbc_encrypt((des_cblock *)input,(des_cblock *)c,
|
||||
l,*ks,ivec,encrypt);
|
||||
sv_setpvn(ST(2),(char *)c[len-8],8);
|
||||
PUSHs(s);
|
||||
}
|
||||
|
||||
void
|
||||
des_cbc3_encrypt(input,ks1,ks2,ivec1,ivec2,encrypt)
|
||||
char * input
|
||||
des_key_schedule * ks1
|
||||
des_key_schedule * ks2
|
||||
des_cblock * ivec1
|
||||
des_cblock * ivec2
|
||||
int encrypt
|
||||
PPCODE:
|
||||
{
|
||||
SV *s;
|
||||
STRLEN len,l;
|
||||
|
||||
l=SvCUR(ST(0));
|
||||
len=((((unsigned long)l)+7)/8)*8;
|
||||
s=sv_newmortal();
|
||||
sv_setpvn(s,"",0);
|
||||
SvGROW(s,len);
|
||||
SvCUR_set(s,len);
|
||||
des_3cbc_encrypt((des_cblock *)input,(des_cblock *)SvPV(s,na),
|
||||
l,*ks1,*ks2,ivec1,ivec2,encrypt);
|
||||
sv_setpvn(ST(3),(char *)ivec1,8);
|
||||
sv_setpvn(ST(4),(char *)ivec2,8);
|
||||
PUSHs(s);
|
||||
}
|
||||
|
||||
void
|
||||
des_cbc_cksum(input,ks,ivec)
|
||||
char * input
|
||||
des_key_schedule * ks
|
||||
des_cblock * ivec
|
||||
PPCODE:
|
||||
{
|
||||
SV *s1,*s2;
|
||||
STRLEN len,l;
|
||||
des_cblock c;
|
||||
unsigned long i1,i2;
|
||||
|
||||
s1=sv_newmortal();
|
||||
s2=sv_newmortal();
|
||||
l=SvCUR(ST(0));
|
||||
des_cbc_cksum((des_cblock *)input,(des_cblock *)c,
|
||||
l,*ks,ivec);
|
||||
i1=c[4]|(c[5]<<8)|(c[6]<<16)|(c[7]<<24);
|
||||
i2=c[0]|(c[1]<<8)|(c[2]<<16)|(c[3]<<24);
|
||||
sv_setiv(s1,i1);
|
||||
sv_setiv(s2,i2);
|
||||
sv_setpvn(ST(2),(char *)c,8);
|
||||
PUSHs(s1);
|
||||
PUSHs(s2);
|
||||
}
|
||||
|
||||
void
|
||||
des_cfb_encrypt(input,numbits,ks,ivec,encrypt)
|
||||
char * input
|
||||
int numbits
|
||||
des_key_schedule * ks
|
||||
des_cblock * ivec
|
||||
int encrypt
|
||||
PPCODE:
|
||||
{
|
||||
SV *s;
|
||||
STRLEN len;
|
||||
char *c;
|
||||
|
||||
len=SvCUR(ST(0));
|
||||
s=sv_newmortal();
|
||||
sv_setpvn(s,"",0);
|
||||
SvGROW(s,len);
|
||||
SvCUR_set(s,len);
|
||||
c=(char *)SvPV(s,na);
|
||||
des_cfb_encrypt((unsigned char *)input,(unsigned char *)c,
|
||||
(int)numbits,(long)len,*ks,ivec,encrypt);
|
||||
sv_setpvn(ST(3),(char *)ivec,8);
|
||||
PUSHs(s);
|
||||
}
|
||||
|
||||
des_cblock *
|
||||
des_ecb3_encrypt(input,ks1,ks2,encrypt)
|
||||
des_cblock * input
|
||||
des_key_schedule * ks1
|
||||
des_key_schedule * ks2
|
||||
int encrypt
|
||||
CODE:
|
||||
{
|
||||
des_cblock c;
|
||||
|
||||
des_3ecb_encrypt((des_cblock *)input,(des_cblock *)&c,
|
||||
*ks1,*ks2,encrypt);
|
||||
RETVAL= &c;
|
||||
}
|
||||
OUTPUT:
|
||||
RETVAL
|
||||
|
||||
void
|
||||
des_ofb_encrypt(input,numbits,ks,ivec)
|
||||
unsigned char * input
|
||||
int numbits
|
||||
des_key_schedule * ks
|
||||
des_cblock * ivec
|
||||
PPCODE:
|
||||
{
|
||||
SV *s;
|
||||
STRLEN len,l;
|
||||
unsigned char *c;
|
||||
|
||||
len=SvCUR(ST(0));
|
||||
s=sv_newmortal();
|
||||
sv_setpvn(s,"",0);
|
||||
SvGROW(s,len);
|
||||
SvCUR_set(s,len);
|
||||
c=(unsigned char *)SvPV(s,na);
|
||||
des_ofb_encrypt((unsigned char *)input,(unsigned char *)c,
|
||||
numbits,len,*ks,ivec);
|
||||
sv_setpvn(ST(3),(char *)ivec,8);
|
||||
PUSHs(s);
|
||||
}
|
||||
|
||||
void
|
||||
des_pcbc_encrypt(input,ks,ivec,encrypt)
|
||||
char * input
|
||||
des_key_schedule * ks
|
||||
des_cblock * ivec
|
||||
int encrypt
|
||||
PPCODE:
|
||||
{
|
||||
SV *s;
|
||||
STRLEN len,l;
|
||||
char *c;
|
||||
|
||||
l=SvCUR(ST(0));
|
||||
len=((((unsigned long)l)+7)/8)*8;
|
||||
s=sv_newmortal();
|
||||
sv_setpvn(s,"",0);
|
||||
SvGROW(s,len);
|
||||
SvCUR_set(s,len);
|
||||
c=(char *)SvPV(s,na);
|
||||
des_pcbc_encrypt((des_cblock *)input,(des_cblock *)c,
|
||||
l,*ks,ivec,encrypt);
|
||||
sv_setpvn(ST(2),(char *)c[len-8],8);
|
||||
PUSHs(s);
|
||||
}
|
||||
|
||||
des_cblock *
|
||||
des_random_key()
|
||||
CODE:
|
||||
{
|
||||
des_cblock c;
|
||||
|
||||
des_random_key(c);
|
||||
RETVAL=&c;
|
||||
}
|
||||
OUTPUT:
|
||||
RETVAL
|
||||
|
||||
des_cblock *
|
||||
des_string_to_key(str)
|
||||
char * str
|
||||
CODE:
|
||||
{
|
||||
des_cblock c;
|
||||
|
||||
des_string_to_key(str,&c);
|
||||
RETVAL=&c;
|
||||
}
|
||||
OUTPUT:
|
||||
RETVAL
|
||||
|
||||
void
|
||||
des_string_to_2keys(str)
|
||||
char * str
|
||||
PPCODE:
|
||||
{
|
||||
des_cblock c1,c2;
|
||||
SV *s1,*s2;
|
||||
|
||||
des_string_to_2keys(str,&c1,&c2);
|
||||
EXTEND(sp,2);
|
||||
s1=sv_newmortal();
|
||||
sv_setpvn(s1,(char *)c1,8);
|
||||
s2=sv_newmortal();
|
||||
sv_setpvn(s2,(char *)c2,8);
|
||||
PUSHs(s1);
|
||||
PUSHs(s2);
|
||||
}
|
||||
108
lib/des/DESperate.txt
Normal file
108
lib/des/DESperate.txt
Normal file
@@ -0,0 +1,108 @@
|
||||
The hunt for getting a DES with plain BSD license w/o advertisement clause
|
||||
==========================================================================
|
||||
|
||||
$Id$
|
||||
|
||||
This all feels very silly given that DES is about 30 years old and now
|
||||
is deprecated.
|
||||
|
||||
Helpful documents on the way:
|
||||
|
||||
Schider's crypto wasn't that useful since it only told how to do DES,
|
||||
not how to do des fast or how to not use DES. I find this to be a
|
||||
common thread in the book, it explain each tool in great detail, but
|
||||
not its limitations.
|
||||
|
||||
Dag Arne Osvik: Efficient Implementation of the Data Encryption Standard
|
||||
|
||||
Some threads on sci.crypto was also useful.
|
||||
|
||||
PC1 transformations
|
||||
===================
|
||||
|
||||
|
||||
Getting the PC1 bit mangling working was hard, I never got it to work.
|
||||
|
||||
Printning out the bit usage made me realize a lookup table could be
|
||||
used since only 12 bits are used from the first half and 16 from the
|
||||
second.
|
||||
|
||||
01110000 01110000 01110000 01110000 01111000 01111000 01111000 01111000
|
||||
00001111 00001111 00001111 00001111 00000111 00000111 00000111 00000111
|
||||
|
||||
The pattern is getting more obvious if its printed out where the bits
|
||||
are coming from.
|
||||
|
||||
8 16 24 - - - - -
|
||||
7 15 23 - - - - -
|
||||
6 14 22 - - - - -
|
||||
5 13 21 - - - - -
|
||||
4 12 20 28 - - - -
|
||||
3 11 19 27 - - - -
|
||||
2 10 18 26 - - - -
|
||||
1 9 17 25 - - - -
|
||||
|
||||
- - - 60 56 48 40 -
|
||||
- - - 59 55 47 39 -
|
||||
- - - 58 54 46 38 -
|
||||
- - - 57 53 45 37 -
|
||||
- - - - 52 44 36 -
|
||||
- - - - 51 43 35 -
|
||||
- - - - 50 42 34 -
|
||||
- - - - 49 41 33 -
|
||||
|
||||
Only 3 bits-table is needed for the first half and 4 bits for the
|
||||
second half because they are on diffrent shift offsets.
|
||||
|
||||
So to get the bitpattern bit-pattern
|
||||
|
||||
gen_pattern("pc1_c_3", 7, [ 5, 13, 21 ], 0, 0x1000000);
|
||||
gen_pattern("pc1_c_4", 15, [ 1, 9, 17, 25 ], 0, 0x1000000);
|
||||
gen_pattern("pc1_d_3", 7, [ 49, 41, 33 ], 32, 0x1000000);
|
||||
gen_pattern("pc1_d_4", 15, [ 57, 53, 45, 37 ], 32, 0x1000000);
|
||||
|
||||
PC2 transformations
|
||||
===================
|
||||
|
||||
PC2 is also a table lookup, since its a 24 bit field, I use 4 6-bit
|
||||
lookup tables. Printing the reverse of the PC2 table reveal that some
|
||||
of the bits are not used, namely (9, 18, 22, 25) from c and (7, 10,
|
||||
15, 26) from d.
|
||||
|
||||
pc2 from c
|
||||
----------
|
||||
|
||||
5 24 7 16 6 10 20
|
||||
18 - 12 3 15 23 1
|
||||
9 19 2 - 14 22 11
|
||||
- 13 4 - 17 21 8
|
||||
|
||||
pc2 from d
|
||||
----------
|
||||
|
||||
51 35 31 52 39 45 -
|
||||
50 32 - 43 36 29 48
|
||||
- 41 38 47 33 40 42
|
||||
49 37 30 46 - 34 44
|
||||
|
||||
So we generate tables for that too.
|
||||
|
||||
gen_pattern("pc2_c_1", 63, [ 5, 24, 7, 16, 6, 10 ], 0, 0x800000);
|
||||
gen_pattern("pc2_c_2", 63, [ 20, 18, 12, 3, 15, 23 ], 0, 0x800000);
|
||||
gen_pattern("pc2_c_3", 63, [ 1, 9, 19, 2, 14, 22 ], 0, 0x800000);
|
||||
gen_pattern("pc2_c_4", 63, [ 11, 13, 4, 17, 21, 8 ], 0, 0x800000);
|
||||
|
||||
gen_pattern("pc2_d_1", 63, [ 51, 35, 31, 52, 39, 45 ], 28, 0x800000);
|
||||
gen_pattern("pc2_d_2", 63, [ 50, 32, 43, 36, 29, 48 ], 28, 0x800000);
|
||||
gen_pattern("pc2_d_3", 63, [ 41, 38, 47, 33, 40, 42 ], 28, 0x800000);
|
||||
gen_pattern("pc2_d_4", 63, [ 49, 37, 30, 46, 34, 44 ], 28, 0x800000);
|
||||
|
||||
|
||||
SBOX transformations
|
||||
====================
|
||||
|
||||
The SBOX transformations are 6 bit to 4 bit transformations.
|
||||
|
||||
Here I grew tired and used Richard Outerbridge SBOXes. Thank you
|
||||
Richard.
|
||||
|
||||
@@ -1,96 +0,0 @@
|
||||
/* General stuff */
|
||||
COPYRIGHT - Copyright info.
|
||||
MODES.DES - A description of the features of the different modes of DES.
|
||||
FILES - This file.
|
||||
INSTALL - How to make things compile.
|
||||
Imakefile - For use with kerberos.
|
||||
README - What this package is.
|
||||
VERSION - Which version this is and what was changed.
|
||||
KERBEROS - Kerberos version 4 notes.
|
||||
Makefile.PL - An old makefile to build with perl5, not current.
|
||||
Makefile.ssl - The SSLeay makefile
|
||||
Makefile.uni - The normal unix makefile.
|
||||
GNUmakefile - The makefile for use with glibc.
|
||||
makefile.bc - A Borland C makefile
|
||||
times - Some outputs from 'speed' on some machines.
|
||||
vms.com - For use when compiling under VMS
|
||||
|
||||
/* My SunOS des(1) replacement */
|
||||
des.c - des(1) source code.
|
||||
des.man - des(1) manual.
|
||||
|
||||
/* Testing and timing programs. */
|
||||
destest.c - Source for libdes.a test program.
|
||||
speed.c - Source for libdes.a timing program.
|
||||
rpw.c - Source for libdes.a testing password reading routines.
|
||||
|
||||
/* libdes.a source code */
|
||||
des_crypt.man - libdes.a manual page.
|
||||
des.h - Public libdes.a header file.
|
||||
ecb_enc.c - des_ecb_encrypt() source, this contains the basic DES code.
|
||||
ecb3_enc.c - des_ecb3_encrypt() source.
|
||||
cbc_ckm.c - des_cbc_cksum() source.
|
||||
cbc_enc.c - des_cbc_encrypt() source.
|
||||
ncbc_enc.c - des_cbc_encrypt() that is 'normal' in that it copies
|
||||
the new iv values back in the passed iv vector.
|
||||
ede_enc.c - des_ede3_cbc_encrypt() cbc mode des using triple DES.
|
||||
cbc3_enc.c - des_3cbc_encrypt() source, don't use this function.
|
||||
cfb_enc.c - des_cfb_encrypt() source.
|
||||
cfb64enc.c - des_cfb64_encrypt() cfb in 64 bit mode but setup to be
|
||||
used as a stream cipher.
|
||||
cfb64ede.c - des_ede3_cfb64_encrypt() cfb in 64 bit mode but setup to be
|
||||
used as a stream cipher and using triple DES.
|
||||
ofb_enc.c - des_cfb_encrypt() source.
|
||||
ofb64_enc.c - des_ofb_encrypt() ofb in 64 bit mode but setup to be
|
||||
used as a stream cipher.
|
||||
ofb64ede.c - des_ede3_ofb64_encrypt() ofb in 64 bit mode but setup to be
|
||||
used as a stream cipher and using triple DES.
|
||||
enc_read.c - des_enc_read() source.
|
||||
enc_writ.c - des_enc_write() source.
|
||||
pcbc_enc.c - des_pcbc_encrypt() source.
|
||||
qud_cksm.c - quad_cksum() source.
|
||||
rand_key.c - des_random_key() source.
|
||||
read_pwd.c - Source for des_read_password() plus related functions.
|
||||
set_key.c - Source for des_set_key().
|
||||
str2key.c - Covert a string of any length into a key.
|
||||
fcrypt.c - A small, fast version of crypt(3).
|
||||
des_locl.h - Internal libdes.a header file.
|
||||
podd.h - Odd parity tables - used in des_set_key().
|
||||
sk.h - Lookup tables used in des_set_key().
|
||||
spr.h - What is left of the S tables - used in ecb_encrypt().
|
||||
des_ver.h - header file for the external definition of the
|
||||
version string.
|
||||
des.doc - SSLeay documentation for the library.
|
||||
|
||||
/* The perl scripts - you can ignore these files they are only
|
||||
* included for the curious */
|
||||
des.pl - des in perl anyone? des_set_key and des_ecb_encrypt
|
||||
both done in a perl library.
|
||||
testdes.pl - Testing program for des.pl
|
||||
doIP - Perl script used to develop IP xor/shift code.
|
||||
doPC1 - Perl script used to develop PC1 xor/shift code.
|
||||
doPC2 - Generates sk.h.
|
||||
PC1 - Output of doPC1 should be the same as output from PC1.
|
||||
PC2 - used in development of doPC2.
|
||||
shifts.pl - Perl library used by my perl scripts.
|
||||
|
||||
/* I started making a perl5 dynamic library for libdes
|
||||
* but did not fully finish, these files are part of that effort. */
|
||||
DES.pm
|
||||
DES.pod
|
||||
DES.xs
|
||||
t
|
||||
typemap
|
||||
|
||||
/* The following are for use with sun RPC implementaions. */
|
||||
rpc_des.h
|
||||
rpc_enc.c
|
||||
|
||||
/* The following are contibuted by Mark Murray <mark@grondar.za>. They
|
||||
* are not normally built into libdes due to machine specific routines
|
||||
* contained in them. They are for use in the most recent incarnation of
|
||||
* export kerberos v 4 (eBones). */
|
||||
supp.c
|
||||
new_rkey.c
|
||||
|
||||
|
||||
@@ -1,69 +0,0 @@
|
||||
Check the CC and CFLAGS lines in the makefile
|
||||
|
||||
If your C library does not support the times(3) function, change the
|
||||
#define TIMES to
|
||||
#undef TIMES in speed.c
|
||||
If it does, check the HZ value for the times(3) function.
|
||||
If your system does not define CLK_TCK it will be assumed to
|
||||
be 100.0.
|
||||
|
||||
If possible use gcc v 2.7.?
|
||||
Turn on the maximum optimising (normally '-O3 -fomit-frame-pointer' for gcc)
|
||||
In recent times, some system compilers give better performace.
|
||||
|
||||
type 'make'
|
||||
|
||||
run './destest' to check things are ok.
|
||||
run './rpw' to check the tty code for reading passwords works.
|
||||
run './speed' to see how fast those optimisations make the library run :-)
|
||||
run './des_opts' to determin the best compile time options.
|
||||
|
||||
The output from des_opts should be put in the makefile options and des_enc.c
|
||||
should be rebuilt. For 64 bit computers, do not use the DES_PTR option.
|
||||
For the DEC Alpha, edit des.h and change DES_LONG to 'unsigned int'
|
||||
and then you can use the 'DES_PTR' option.
|
||||
|
||||
The file options.txt has the options listed for best speed on quite a
|
||||
few systems. Look and the options (UNROLL, PTR, RISC2 etc) and then
|
||||
turn on the relevent option in the Makefile
|
||||
|
||||
There are some special Makefile targets that make life easier.
|
||||
make cc - standard cc build
|
||||
make gcc - standard gcc build
|
||||
make x86-elf - x86 assember (elf), linux-elf.
|
||||
make x86-out - x86 assember (a.out), FreeBSD
|
||||
make x86-solaris- x86 assember
|
||||
make x86-bsdi - x86 assember (a.out with primative assember).
|
||||
|
||||
If at all possible use the assember (for Windows NT/95, use
|
||||
asm/win32.obj to link with). The x86 assember is very very fast.
|
||||
|
||||
A make install will by default install
|
||||
libdes.a in /usr/local/lib/libdes.a
|
||||
des in /usr/local/bin/des
|
||||
des_crypt.man in /usr/local/man/man3/des_crypt.3
|
||||
des.man in /usr/local/man/man1/des.1
|
||||
des.h in /usr/include/des.h
|
||||
|
||||
des(1) should be compatible with sunOS's but I have been unable to
|
||||
test it.
|
||||
|
||||
These routines should compile on MSDOS, most 32bit and 64bit version
|
||||
of Unix (BSD and SYSV) and VMS, without modification.
|
||||
The only problems should be #include files that are in the wrong places.
|
||||
|
||||
These routines can be compiled under MSDOS.
|
||||
I have successfully encrypted files using des(1) under MSDOS and then
|
||||
decrypted the files on a SparcStation.
|
||||
I have been able to compile and test the routines with
|
||||
Microsoft C v 5.1 and Turbo C v 2.0.
|
||||
The code in this library is in no way optimised for the 16bit
|
||||
operation of MSDOS.
|
||||
|
||||
When building for glibc, ignore all of the above and just unpack into
|
||||
glibc-1.??/des and then gmake as per normal.
|
||||
|
||||
As a final note on performace. Certain CPUs like sparcs and Alpha often give
|
||||
a %10 speed difference depending on the link order. It is rather anoying
|
||||
when one program reports 'x' DES encrypts a second and another reports
|
||||
'x*0.9' the speed.
|
||||
@@ -1,35 +0,0 @@
|
||||
# This Imakefile has not been tested for a while but it should still
|
||||
# work when placed in the correct directory in the kerberos v 4 distribution
|
||||
|
||||
SRCS= cbc_cksm.c cbc_enc.c ecb_enc.c pcbc_enc.c \
|
||||
qud_cksm.c rand_key.c read_pwd.c set_key.c str2key.c \
|
||||
enc_read.c enc_writ.c fcrypt.c cfb_enc.c \
|
||||
ecb3_enc.c ofb_enc.c ofb64enc.c
|
||||
|
||||
OBJS= cbc_cksm.o cbc_enc.o ecb_enc.o pcbc_enc.o \
|
||||
qud_cksm.o rand_key.o read_pwd.o set_key.o str2key.o \
|
||||
enc_read.o enc_writ.o fcrypt.o cfb_enc.o \
|
||||
ecb3_enc.o ofb_enc.o ofb64enc.o
|
||||
|
||||
GENERAL=COPYRIGHT FILES INSTALL Imakefile README VERSION makefile times \
|
||||
vms.com KERBEROS
|
||||
DES= des.c des.man
|
||||
TESTING=destest.c speed.c rpw.c
|
||||
LIBDES= des_crypt.man des.h des_locl.h podd.h sk.h spr.h
|
||||
|
||||
PERL= des.pl testdes.pl doIP doPC1 doPC2 PC1 PC2 shifts.pl
|
||||
|
||||
CODE= $(GENERAL) $(DES) $(TESTING) $(SRCS) $(LIBDES) $(PERL)
|
||||
|
||||
SRCDIR=$(SRCTOP)/lib/des
|
||||
|
||||
DBG= -O
|
||||
INCLUDE= -I$(SRCDIR)
|
||||
CC= cc
|
||||
|
||||
library_obj_rule()
|
||||
|
||||
install_library_target(des,$(OBJS),$(SRCS),)
|
||||
|
||||
test(destest,libdes.a,)
|
||||
test(rpw,libdes.a,)
|
||||
@@ -1,41 +0,0 @@
|
||||
[ This is an old file, I don't know if it is true anymore
|
||||
but I will leave the file here - eay 21/11/95 ]
|
||||
|
||||
To use this library with Bones (kerberos without DES):
|
||||
1) Get my modified Bones - eBones. It can be found on
|
||||
gondwana.ecr.mu.oz.au (128.250.1.63) /pub/athena/eBones-p9.tar.Z
|
||||
and
|
||||
nic.funet.fi (128.214.6.100) /pub/unix/security/Kerberos/eBones-p9.tar.Z
|
||||
|
||||
2) Unpack this library in src/lib/des, makeing sure it is version
|
||||
3.00 or greater (libdes.tar.93-10-07.Z). This versions differences
|
||||
from the version in comp.sources.misc volume 29 patchlevel2.
|
||||
The primarily difference is that it should compile under kerberos :-).
|
||||
It can be found at.
|
||||
ftp.psy.uq.oz.au (130.102.32.1) /pub/DES/libdes.tar.93-10-07.Z
|
||||
|
||||
Now do a normal kerberos build and things should work.
|
||||
|
||||
One problem I found when I was build on my local sun.
|
||||
---
|
||||
For sunOS 4.1.1 apply the following patch to src/util/ss/make_commands.c
|
||||
|
||||
*** make_commands.c.orig Fri Jul 3 04:18:35 1987
|
||||
--- make_commands.c Wed May 20 08:47:42 1992
|
||||
***************
|
||||
*** 98,104 ****
|
||||
if (!rename(o_file, z_file)) {
|
||||
if (!vfork()) {
|
||||
chdir("/tmp");
|
||||
! execl("/bin/ld", "ld", "-o", o_file+5, "-s", "-r", "-n",
|
||||
z_file+5, 0);
|
||||
perror("/bin/ld");
|
||||
_exit(1);
|
||||
--- 98,104 ----
|
||||
if (!rename(o_file, z_file)) {
|
||||
if (!vfork()) {
|
||||
chdir("/tmp");
|
||||
! execl("/bin/ld", "ld", "-o", o_file+5, "-s", "-r",
|
||||
z_file+5, 0);
|
||||
perror("/bin/ld");
|
||||
_exit(1);
|
||||
@@ -1,84 +0,0 @@
|
||||
Modes of DES
|
||||
Quite a bit of the following information has been taken from
|
||||
AS 2805.5.2
|
||||
Australian Standard
|
||||
Electronic funds transfer - Requirements for interfaces,
|
||||
Part 5.2: Modes of operation for an n-bit block cipher algorithm
|
||||
Appendix A
|
||||
|
||||
There are several different modes in which DES can be used, they are
|
||||
as follows.
|
||||
|
||||
Electronic Codebook Mode (ECB) (des_ecb_encrypt())
|
||||
- 64 bits are enciphered at a time.
|
||||
- The order of the blocks can be rearranged without detection.
|
||||
- The same plaintext block always produces the same ciphertext block
|
||||
(for the same key) making it vulnerable to a 'dictionary attack'.
|
||||
- An error will only affect one ciphertext block.
|
||||
|
||||
Cipher Block Chaining Mode (CBC) (des_cbc_encrypt())
|
||||
- a multiple of 64 bits are enciphered at a time.
|
||||
- The CBC mode produces the same ciphertext whenever the same
|
||||
plaintext is encrypted using the same key and starting variable.
|
||||
- The chaining operation makes the ciphertext blocks dependent on the
|
||||
current and all preceding plaintext blocks and therefore blocks can not
|
||||
be rearranged.
|
||||
- The use of different starting variables prevents the same plaintext
|
||||
enciphering to the same ciphertext.
|
||||
- An error will affect the current and the following ciphertext blocks.
|
||||
|
||||
Cipher Feedback Mode (CFB) (des_cfb_encrypt())
|
||||
- a number of bits (j) <= 64 are enciphered at a time.
|
||||
- The CFB mode produces the same ciphertext whenever the same
|
||||
plaintext is encrypted using the same key and starting variable.
|
||||
- The chaining operation makes the ciphertext variables dependent on the
|
||||
current and all preceding variables and therefore j-bit variables are
|
||||
chained together and con not be rearranged.
|
||||
- The use of different starting variables prevents the same plaintext
|
||||
enciphering to the same ciphertext.
|
||||
- The strength of the CFB mode depends on the size of k (maximal if
|
||||
j == k). In my implementation this is always the case.
|
||||
- Selection of a small value for j will require more cycles through
|
||||
the encipherment algorithm per unit of plaintext and thus cause
|
||||
greater processing overheads.
|
||||
- Only multiples of j bits can be enciphered.
|
||||
- An error will affect the current and the following ciphertext variables.
|
||||
|
||||
Output Feedback Mode (OFB) (des_ofb_encrypt())
|
||||
- a number of bits (j) <= 64 are enciphered at a time.
|
||||
- The OFB mode produces the same ciphertext whenever the same
|
||||
plaintext enciphered using the same key and starting variable. More
|
||||
over, in the OFB mode the same key stream is produced when the same
|
||||
key and start variable are used. Consequently, for security reasons
|
||||
a specific start variable should be used only once for a given key.
|
||||
- The absence of chaining makes the OFB more vulnerable to specific attacks.
|
||||
- The use of different start variables values prevents the same
|
||||
plaintext enciphering to the same ciphertext, by producing different
|
||||
key streams.
|
||||
- Selection of a small value for j will require more cycles through
|
||||
the encipherment algorithm per unit of plaintext and thus cause
|
||||
greater processing overheads.
|
||||
- Only multiples of j bits can be enciphered.
|
||||
- OFB mode of operation does not extend ciphertext errors in the
|
||||
resultant plaintext output. Every bit error in the ciphertext causes
|
||||
only one bit to be in error in the deciphered plaintext.
|
||||
- OFB mode is not self-synchronising. If the two operation of
|
||||
encipherment and decipherment get out of synchronism, the system needs
|
||||
to be re-initialised.
|
||||
- Each re-initialisation should use a value of the start variable
|
||||
different from the start variable values used before with the same
|
||||
key. The reason for this is that an identical bit stream would be
|
||||
produced each time from the same parameters. This would be
|
||||
susceptible to a 'known plaintext' attack.
|
||||
|
||||
Triple ECB Mode (des_3ecb_encrypt())
|
||||
- Encrypt with key1, decrypt with key2 and encrypt with key1 again.
|
||||
- As for ECB encryption but increases the effective key length to 112 bits.
|
||||
- If both keys are the same it is equivalent to encrypting once with
|
||||
just one key.
|
||||
|
||||
Triple CBC Mode (des_3cbc_encrypt())
|
||||
- Encrypt with key1, decrypt with key2 and encrypt with key1 again.
|
||||
- As for CBC encryption but increases the effective key length to 112 bits.
|
||||
- If both keys are the same it is equivalent to encrypting once with
|
||||
just one key.
|
||||
@@ -1,14 +0,0 @@
|
||||
use ExtUtils::MakeMaker;
|
||||
# See lib/ExtUtils/MakeMaker.pm for details of how to influence
|
||||
# the contents of the Makefile being created.
|
||||
&writeMakefile(
|
||||
'potential_libs' => '', # e.g., '-lm'
|
||||
'INC' => '', # e.g., '-I/usr/include/other'
|
||||
'DISTNAME' => 'DES',
|
||||
'VERSION' => '0.1',
|
||||
'DEFINE' => '-DPERL5',
|
||||
'OBJECT' => 'DES.o cbc_cksm.o cbc_enc.o ecb_enc.o pcbc_enc.o \
|
||||
rand_key.o set_key.o str2key.o \
|
||||
enc_read.o enc_writ.o fcrypt.o cfb_enc.o \
|
||||
ecb3_enc.o ofb_enc.o cbc3_enc.o des_enc.o',
|
||||
);
|
||||
@@ -9,110 +9,28 @@ include_HEADERS = des.h md4.h md5.h sha.h rc2.h rc4.h aes.h
|
||||
|
||||
build_HEADERZ = $(include_HEADERS)
|
||||
|
||||
check_PROGRAMS = destest mdtest md5crypt_test rctest rc2test
|
||||
check_PROGRAMS = destest mdtest rctest rc2test destest #md5crypt_test
|
||||
|
||||
TESTS = destest mdtest md5crypt_test rctest rc2test
|
||||
CHECK_LOCAL = no-check-local
|
||||
bin_PROGRAMS = des #rpw speed
|
||||
|
||||
des_SOURCES = des.c des_ver.h
|
||||
TESTS = destest mdtest rctest rc2test #md5crypt_test
|
||||
|
||||
LDADD = $(lib_LTLIBRARIES)
|
||||
|
||||
libdes_la_SOURCES = \
|
||||
aes.c \
|
||||
cbc3_enc.c \
|
||||
cbc_cksm.c \
|
||||
cbc_enc.c \
|
||||
cfb64ede.c \
|
||||
cfb64enc.c \
|
||||
cfb_enc.c \
|
||||
des_enc.c \
|
||||
des_locl.h \
|
||||
ecb3_enc.c \
|
||||
ecb_enc.c \
|
||||
ede_enc.c \
|
||||
enc_read.c \
|
||||
enc_writ.c \
|
||||
fcrypt.c \
|
||||
hash.h \
|
||||
key_par.c \
|
||||
aes.h \
|
||||
des.c \
|
||||
des.h \
|
||||
md4.c \
|
||||
md4.h \
|
||||
md5.c \
|
||||
ncbc_enc.c \
|
||||
ofb64ede.c \
|
||||
ofb64enc.c \
|
||||
ofb_enc.c \
|
||||
pcbc_enc.c \
|
||||
podd.h \
|
||||
qud_cksm.c \
|
||||
md5.h \
|
||||
rc2.c \
|
||||
rc2.h \
|
||||
rc4.c \
|
||||
read_pwd.c \
|
||||
rc4.h \
|
||||
rijndael-alg-fst.c \
|
||||
rijndael-alg-fst.h \
|
||||
rnd_keys.c \
|
||||
set_key.c \
|
||||
sha.c \
|
||||
sk.h \
|
||||
spr.h \
|
||||
str2key.c \
|
||||
xcbc_enc.c
|
||||
|
||||
EXTRA_libdes_la_SOURCES = dllmain.c passwd_dialog.aps passwd_dialog.clw \
|
||||
passwd_dialog.rc passwd_dialog.res passwd_dlg.c passwd_dlg.h resource.h
|
||||
|
||||
man_MANS = des.1 des_crypt.3
|
||||
|
||||
## this is an awful lot of junk, but it's just as well to include everything
|
||||
EXTRA_DIST = \
|
||||
COPYRIGHT \
|
||||
DES.pm \
|
||||
DES.pod \
|
||||
DES.xs \
|
||||
FILES \
|
||||
Imakefile \
|
||||
KERBEROS \
|
||||
MODES.DES \
|
||||
Makefile.PL \
|
||||
Makefile.ssl \
|
||||
Makefile.uni \
|
||||
PC1 \
|
||||
PC2 \
|
||||
VERSION \
|
||||
des.def \
|
||||
des.dsp \
|
||||
des.doc \
|
||||
des.mak \
|
||||
des.man \
|
||||
des.org \
|
||||
des.pl \
|
||||
des_crypt.man \
|
||||
des_locl.org \
|
||||
des_opts.c \
|
||||
doIP \
|
||||
doPC1 \
|
||||
doPC2 \
|
||||
makefile.bc \
|
||||
rand_key.c \
|
||||
rpc_des.h \
|
||||
rpc_enc.c \
|
||||
shifts.pl \
|
||||
supp.c \
|
||||
testdes.pl \
|
||||
times \
|
||||
typemap \
|
||||
version.h \
|
||||
vms.com
|
||||
|
||||
asm_files = des-som2.pl des-som3.pl des586.pl des686.pl desboth.pl \
|
||||
dx86-cpp.s dx86unix.cpp readme win32.asm win32.obj win32.uu x86ms.pl \
|
||||
x86unix.pl
|
||||
|
||||
dist-hook:
|
||||
$(mkinstalldirs) $(distdir)/t
|
||||
$(INSTALL_DATA) $(srcdir)/t/perl $(distdir)/t
|
||||
$(INSTALL_DATA) $(srcdir)/t/test $(distdir)/t
|
||||
$(mkinstalldirs) $(distdir)/asm
|
||||
(cd $(srcdir)/asm && tar cf - $(asm_files)) \
|
||||
| (cd $(distdir)/asm; tar xf -)
|
||||
|
||||
sha.h \
|
||||
ui.c
|
||||
|
||||
@@ -1,108 +0,0 @@
|
||||
#
|
||||
# SSLeay/crypto/des/Makefile
|
||||
#
|
||||
|
||||
DIR= des
|
||||
TOP= ../..
|
||||
CC= cc
|
||||
CPP= cc -E
|
||||
INCLUDES=
|
||||
CFLAG=-g
|
||||
INSTALLTOP=/usr/local/ssl
|
||||
MAKE= make -f Makefile.ssl
|
||||
MAKEDEPEND= makedepend -fMakefile.ssl
|
||||
MAKEFILE= Makefile.ssl
|
||||
DES_ENC= des_enc.o
|
||||
|
||||
CFLAGS= $(INCLUDES) $(CFLAG)
|
||||
|
||||
GENERAL=Makefile des.org des_locl.org
|
||||
TEST=destest.c
|
||||
APPS=
|
||||
|
||||
LIB=$(TOP)/libcrypto.a
|
||||
LIBSRC= cbc3_enc.c cbc_cksm.c cbc_enc.c cfb64enc.c cfb_enc.c \
|
||||
ecb3_enc.c ecb_enc.c ede_enc.c enc_read.c enc_writ.c \
|
||||
fcrypt.c ncbc_enc.c ofb64enc.c ofb_enc.c pcbc_enc.c \
|
||||
qud_cksm.c rand_key.c read_pwd.c rpc_enc.c set_key.c \
|
||||
xcbc_enc.c des_enc.c \
|
||||
str2key.c cfb64ede.c ofb64ede.c supp.c
|
||||
|
||||
LIBOBJ= set_key.o ecb_enc.o ede_enc.o cbc_enc.o cbc3_enc.o \
|
||||
ecb3_enc.o cfb64enc.o cfb64ede.o cfb_enc.o ofb64ede.o \
|
||||
enc_read.o enc_writ.o fcrypt.o ncbc_enc.o ofb64enc.o \
|
||||
ofb_enc.o str2key.o pcbc_enc.o qud_cksm.o rand_key.o \
|
||||
xcbc_enc.o ${DES_ENC} \
|
||||
read_pwd.o rpc_enc.o cbc_cksm.o supp.o
|
||||
|
||||
SRC= $(LIBSRC)
|
||||
|
||||
EXHEADER= des.h
|
||||
HEADER= des_locl.h rpc_des.h podd.h sk.h spr.h des_ver.h $(EXHEADER)
|
||||
|
||||
ALL= $(GENERAL) $(SRC) $(HEADER)
|
||||
|
||||
top:
|
||||
(cd ../..; $(MAKE) DIRS=crypto SDIRS=$(DIR) sub_all)
|
||||
|
||||
all: lib
|
||||
|
||||
lib: $(LIBOBJ)
|
||||
ar r $(LIB) $(LIBOBJ)
|
||||
sh $(TOP)/util/ranlib.sh $(LIB)
|
||||
@touch lib
|
||||
|
||||
asm/dx86-elf.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DELF asm/dx86unix.cpp | as -o asm/dx86-elf.o
|
||||
|
||||
asm/dx86-sol.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DSOL asm/dx86unix.cpp | as -o asm/dx86-sol.o
|
||||
|
||||
asm/dx86-out.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DOUT asm/dx86unix.cpp | as -o asm/dx86-out.o
|
||||
|
||||
asm/dx86bsdi.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DBSDI asm/dx86unix.cpp | as -o asm/dx86bsdi.o
|
||||
|
||||
files:
|
||||
perl $(TOP)/util/files.pl Makefile.ssl >> $(TOP)/MINFO
|
||||
|
||||
links:
|
||||
/bin/rm -f Makefile
|
||||
$(TOP)/util/point.sh Makefile.ssl Makefile ;
|
||||
/bin/rm -f des.doc
|
||||
$(TOP)/util/point.sh ../../doc/des.doc des.doc ;
|
||||
$(TOP)/util/mklink.sh ../../include $(EXHEADER)
|
||||
$(TOP)/util/mklink.sh ../../test $(TEST)
|
||||
$(TOP)/util/mklink.sh ../../apps $(APPS)
|
||||
|
||||
install: installs
|
||||
|
||||
installs:
|
||||
@for i in $(EXHEADER) ; \
|
||||
do \
|
||||
(cp $$i $(INSTALLTOP)/include/$$i; \
|
||||
chmod 644 $(INSTALLTOP)/include/$$i ) \
|
||||
done;
|
||||
|
||||
tags:
|
||||
ctags $(SRC)
|
||||
|
||||
tests:
|
||||
|
||||
lint:
|
||||
lint -DLINT $(INCLUDES) $(SRC)>fluff
|
||||
|
||||
depend:
|
||||
$(MAKEDEPEND) $(INCLUDES) $(PROGS) $(LIBSRC)
|
||||
|
||||
dclean:
|
||||
perl -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
|
||||
mv -f Makefile.new $(MAKEFILE)
|
||||
|
||||
clean:
|
||||
/bin/rm -f *.o asm/*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff
|
||||
|
||||
errors:
|
||||
|
||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
||||
@@ -1,207 +0,0 @@
|
||||
# You must select the correct terminal control system to be used to
|
||||
# turn character echo off when reading passwords. There a 5 systems
|
||||
# SGTTY - the old BSD system
|
||||
# TERMIO - most system V boxes
|
||||
# TERMIOS - SGI (ala IRIX).
|
||||
# VMS - the DEC operating system
|
||||
# MSDOS - we all know what it is :-)
|
||||
# read_pwd.c makes a reasonable guess at what is correct.
|
||||
|
||||
# If you are on a DEC Alpha, edit des.h and change the DES_LONG
|
||||
# define to 'unsigned int'. I have seen this give a %20 speedup.
|
||||
|
||||
OPTS0= -DRAND -DTERMIO #-DNOCONST
|
||||
|
||||
# Version 1.94 has changed the strings_to_key function so that it is
|
||||
# now compatible with MITs when the string is longer than 8 characters.
|
||||
# If you wish to keep the old version, uncomment the following line.
|
||||
# This will affect the -E/-D options on des(1).
|
||||
#OPTS1= -DOLD_STR_TO_KEY
|
||||
|
||||
# There are 4 possible performance options
|
||||
# -DDES_PTR
|
||||
# -DDES_RISC1
|
||||
# -DDES_RISC2 (only one of DES_RISC1 and DES_RISC2)
|
||||
# -DDES_UNROLL
|
||||
# after the initial build, run 'des_opts' to see which options are best
|
||||
# for your platform. There are some listed in options.txt
|
||||
#OPTS2= -DDES_PTR
|
||||
#OPTS3= -DDES_RISC1 # or DES_RISC2
|
||||
OPTS4= -DDES_UNROLL
|
||||
|
||||
OPTS= $(OPTS0) $(OPTS1) $(OPTS2) $(OPTS3) $(OPTS4)
|
||||
|
||||
CC=cc
|
||||
CFLAGS= -D_HPUX_SOURCE -Aa +O2 $(OPTS) $(CFLAG)
|
||||
|
||||
#CC=gcc
|
||||
#CFLAGS= -O3 -fomit-frame-pointer $(OPTS) $(CFLAG)
|
||||
|
||||
CPP=$(CC) -E
|
||||
|
||||
DES_ENC=des_enc.o # normal C version
|
||||
#DES_ENC=asm/dx86-elf.o # elf format x86
|
||||
#DES_ENC=asm/dx86-out.o # a.out format x86
|
||||
#DES_ENC=asm/dx86-sol.o # solaris format x86
|
||||
#DES_ENC=asm/dx86bsdi.o # bsdi format x86
|
||||
|
||||
LIBDIR=/usr/local/lib
|
||||
BINDIR=/usr/local/bin
|
||||
INCDIR=/usr/local/include
|
||||
MANDIR=/usr/local/man
|
||||
MAN1=1
|
||||
MAN3=3
|
||||
SHELL=/bin/sh
|
||||
OBJS= cbc3_enc.o cbc_cksm.o cbc_enc.o ncbc_enc.o pcbc_enc.o qud_cksm.o \
|
||||
cfb64ede.o cfb64enc.o cfb_enc.o ecb3_enc.o ecb_enc.o ede_enc.o \
|
||||
enc_read.o enc_writ.o fcrypt.o ofb64ede.o ofb64enc.o ofb_enc.o \
|
||||
rand_key.o read_pwd.o set_key.o rpc_enc.o str2key.o supp.o \
|
||||
$(DES_ENC) xcbc_enc.o
|
||||
|
||||
GENERAL=$(GENERAL_LIT) FILES Imakefile times vms.com KERBEROS MODES.DES \
|
||||
GNUmakefile des.man DES.pm DES.pod DES.xs Makefile.PL \
|
||||
Makefile.uni typemap t Makefile.ssl makefile.bc Makefile.lit \
|
||||
des.org des_locl.org
|
||||
DES= des.c
|
||||
TESTING=rpw.c $(TESTING_LIT)
|
||||
HEADERS= $(HEADERS_LIT) rpc_des.h
|
||||
LIBDES= cbc_cksm.c pcbc_enc.c qud_cksm.c \
|
||||
cfb64ede.c cfb64enc.c cfb_enc.c ecb3_enc.c cbc3_enc.c \
|
||||
enc_read.c enc_writ.c ofb64ede.c ofb64enc.c ofb_enc.c \
|
||||
rand_key.c rpc_enc.c str2key.c supp.c \
|
||||
xcbc_enc.c $(LIBDES_LIT) read_pwd.c
|
||||
|
||||
TESTING_LIT=destest.c speed.c des_opts.c
|
||||
GENERAL_LIT=COPYRIGHT INSTALL README VERSION Makefile des_crypt.man \
|
||||
des.doc options.txt asm
|
||||
HEADERS_LIT=des_ver.h des.h des_locl.h podd.h sk.h spr.h
|
||||
LIBDES_LIT=ede_enc.c cbc_enc.c ncbc_enc.c ecb_enc.c fcrypt.c set_key.c des_enc.c
|
||||
|
||||
PERL= des.pl testdes.pl doIP doIP2 doPC1 doPC2 PC1 PC2 shifts.pl
|
||||
|
||||
ALL= $(GENERAL) $(DES) $(TESTING) $(LIBDES) $(PERL) $(HEADERS)
|
||||
|
||||
DLIB= libdes.a
|
||||
|
||||
all: $(DLIB) destest rpw des speed des_opts
|
||||
|
||||
cc:
|
||||
make CC=cc CFLAGS="-O $(OPTS) $(CFLAG)" all
|
||||
|
||||
gcc:
|
||||
make CC=gcc CFLAGS="-O3 -fomit-frame-pointer $(OPTS) $(CFLAG)" all
|
||||
|
||||
x86-elf:
|
||||
make DES_ENC=asm/dx86-elf.o CC=gcc CFLAGS="-DELF -O3 -fomit-frame-pointer $(OPTS) $(CFLAG)" all
|
||||
|
||||
x86-out:
|
||||
make DES_ENC=asm/dx86-out.o CC=gcc CFLAGS="-DOUT -O3 -fomit-frame-pointer $(OPTS) $(CFLAG)" all
|
||||
|
||||
x86-solaris:
|
||||
make DES_ENC=asm/dx86-sol.o CFLAGS="-DSOL -O $(OPTS) $(CFLAG)" all
|
||||
|
||||
x86-bsdi:
|
||||
make DES_ENC=asm/dx86bsdi.o CC=gcc CFLAGS="-DBSDI -O3 -fomit-frame-pointer $(OPTS) $(CFLAG)" all
|
||||
|
||||
asm/dx86-elf.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DELF asm/dx86unix.cpp | as -o asm/dx86-elf.o
|
||||
|
||||
asm/dx86-sol.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DSOL asm/dx86unix.cpp | as -o asm/dx86-sol.o
|
||||
|
||||
asm/dx86-out.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DOUT asm/dx86unix.cpp | as -o asm/dx86-out.o
|
||||
|
||||
asm/dx86bsdi.o: asm/dx86-cpp.s asm/dx86unix.cpp
|
||||
$(CPP) -DBSDI asm/dx86unix.cpp | as -o asm/dx86bsdi.o
|
||||
|
||||
test: all
|
||||
./destest
|
||||
|
||||
$(DLIB): $(OBJS)
|
||||
/bin/rm -f $(DLIB)
|
||||
ar cr $(DLIB) $(OBJS)
|
||||
-if test -s /bin/ranlib; then /bin/ranlib $(DLIB); \
|
||||
else if test -s /usr/bin/ranlib; then /usr/bin/ranlib $(DLIB); \
|
||||
else exit 0; fi; fi
|
||||
|
||||
des_opts: des_opts.o libdes.a
|
||||
$(CC) $(CFLAGS) -o des_opts des_opts.o libdes.a
|
||||
|
||||
destest: destest.o libdes.a
|
||||
$(CC) $(CFLAGS) -o destest destest.o libdes.a
|
||||
|
||||
rpw: rpw.o libdes.a
|
||||
$(CC) $(CFLAGS) -o rpw rpw.o libdes.a
|
||||
|
||||
speed: speed.o libdes.a
|
||||
$(CC) $(CFLAGS) -o speed speed.o libdes.a
|
||||
|
||||
des: des.o libdes.a
|
||||
$(CC) $(CFLAGS) -o des des.o libdes.a
|
||||
|
||||
tags:
|
||||
ctags $(DES) $(TESTING) $(LIBDES)
|
||||
|
||||
tar_lit:
|
||||
/bin/mv Makefile Makefile.tmp
|
||||
/bin/cp Makefile.lit Makefile
|
||||
tar chf libdes-l.tar $(LIBDES_LIT) $(HEADERS_LIT) \
|
||||
$(GENERAL_LIT) $(TESTING_LIT)
|
||||
/bin/rm -f Makefile
|
||||
/bin/mv Makefile.tmp Makefile
|
||||
|
||||
tar:
|
||||
tar chf libdes.tar $(ALL)
|
||||
|
||||
shar:
|
||||
shar $(ALL) >libdes.shar
|
||||
|
||||
depend:
|
||||
makedepend $(LIBDES) $(DES) $(TESTING)
|
||||
|
||||
clean:
|
||||
/bin/rm -f *.o tags core rpw destest des speed $(DLIB) .nfs* *.old \
|
||||
*.bak destest rpw des_opts asm/*.o
|
||||
|
||||
dclean:
|
||||
sed -e '/^# DO NOT DELETE THIS LINE/ q' Makefile >Makefile.new
|
||||
mv -f Makefile.new Makefile
|
||||
|
||||
# Eric is probably going to choke when he next looks at this --tjh
|
||||
install: $(DLIB) des
|
||||
if test $(INSTALLTOP); then \
|
||||
echo SSL style install; \
|
||||
cp $(DLIB) $(INSTALLTOP)/lib; \
|
||||
if test -s /bin/ranlib; then \
|
||||
/bin/ranlib $(INSTALLTOP)/lib/$(DLIB); \
|
||||
else \
|
||||
if test -s /usr/bin/ranlib; then \
|
||||
/usr/bin/ranlib $(INSTALLTOP)/lib/$(DLIB); \
|
||||
fi; fi; \
|
||||
chmod 644 $(INSTALLTOP)/lib/$(DLIB); \
|
||||
cp des.h $(INSTALLTOP)/include; \
|
||||
chmod 644 $(INSTALLTOP)/include/des.h; \
|
||||
cp des $(INSTALLTOP)/bin; \
|
||||
chmod 755 $(INSTALLTOP)/bin/des; \
|
||||
else \
|
||||
echo Standalone install; \
|
||||
cp $(DLIB) $(LIBDIR)/$(DLIB); \
|
||||
if test -s /bin/ranlib; then \
|
||||
/bin/ranlib $(LIBDIR)/$(DLIB); \
|
||||
else \
|
||||
if test -s /usr/bin/ranlib; then \
|
||||
/usr/bin/ranlib $(LIBDIR)/$(DLIB); \
|
||||
fi; \
|
||||
fi; \
|
||||
chmod 644 $(LIBDIR)/$(DLIB); \
|
||||
cp des $(BINDIR)/des; \
|
||||
chmod 711 $(BINDIR)/des; \
|
||||
cp des_crypt.man $(MANDIR)/man$(MAN3)/des_crypt.$(MAN3); \
|
||||
chmod 644 $(MANDIR)/man$(MAN3)/des_crypt.$(MAN3); \
|
||||
cp des.man $(MANDIR)/man$(MAN1)/des.$(MAN1); \
|
||||
chmod 644 $(MANDIR)/man$(MAN1)/des.$(MAN1); \
|
||||
cp des.h $(INCDIR)/des.h; \
|
||||
chmod 644 $(INCDIR)/des.h; \
|
||||
fi
|
||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
||||
28
lib/des/PC1
28
lib/des/PC1
@@ -1,28 +0,0 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@PC1=( 57,49,41,33,25,17, 9,
|
||||
1,58,50,42,34,26,18,
|
||||
10, 2,59,51,43,35,27,
|
||||
19,11, 3,60,52,44,36,
|
||||
"-","-","-","-",
|
||||
63,55,47,39,31,23,15,
|
||||
7,62,54,46,38,30,22,
|
||||
14, 6,61,53,45,37,29,
|
||||
21,13, 5,28,20,12, 4,
|
||||
"-","-","-","-",
|
||||
);
|
||||
|
||||
foreach (@PC1)
|
||||
{
|
||||
if ($_ ne "-")
|
||||
{
|
||||
$_--;
|
||||
$_=int($_/8)*8+7-($_%8);
|
||||
printf "%2d ",$_;
|
||||
}
|
||||
else
|
||||
{ print "-- "; }
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
print "\n" if ((($i) % 32) == 0);
|
||||
}
|
||||
|
||||
57
lib/des/PC2
57
lib/des/PC2
@@ -1,57 +0,0 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@PC2_C=(14,17,11,24, 1, 5,
|
||||
3,28,15, 6,21,10,
|
||||
23,19,12, 4,26, 8,
|
||||
16, 7,27,20,13, 2,
|
||||
);
|
||||
|
||||
@PC2_D=(41,52,31,37,47,55,
|
||||
30,40,51,45,33,48,
|
||||
44,49,39,56,34,53,
|
||||
46,42,50,36,29,32,
|
||||
);
|
||||
|
||||
foreach (@PC2_C) {
|
||||
if ($_ ne "-")
|
||||
{
|
||||
$_--;
|
||||
printf "%2d ",$_; }
|
||||
else { print "-- "; }
|
||||
$C{$_}=1;
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
}
|
||||
$i=0;
|
||||
print "\n";
|
||||
foreach (@PC2_D) {
|
||||
if ($_ ne "-")
|
||||
{
|
||||
$_-=29;
|
||||
printf "%2d ",$_; }
|
||||
else { print "-- "; }
|
||||
$D{$_}=1;
|
||||
print "\n" if (((++$i) % 8) == 0); }
|
||||
|
||||
print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$C{$i};
|
||||
if ($_ ne "-") {printf "%2d ",$_;}
|
||||
else { print "-- "; }
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
}
|
||||
print "\n";
|
||||
|
||||
print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$D{$i};
|
||||
if ($_ ne "-") {printf "%2d ",$_;}
|
||||
else { print "-- "; }
|
||||
print "\n" if (((++$i) % 8) == 0);
|
||||
}
|
||||
print "\n";
|
||||
sub numsort
|
||||
{
|
||||
$a-$b;
|
||||
}
|
||||
@@ -1,54 +0,0 @@
|
||||
|
||||
libdes, Version 4.01 13-Jan-97
|
||||
|
||||
Copyright (c) 1997, Eric Young
|
||||
All rights reserved.
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms specified in COPYRIGHT.
|
||||
|
||||
--
|
||||
The primary ftp site for this library is
|
||||
ftp://ftp.psy.uq.oz.au/pub/Crypto/DES/libdes-x.xx.tar.gz
|
||||
libdes is now also shipped with SSLeay. Primary ftp site of
|
||||
ftp://ftp.psy.uq.oz.au/pub/Crypto/SSL/SSLeay-x.x.x.tar.gz
|
||||
|
||||
The best way to build this library is to build it as part of SSLeay.
|
||||
|
||||
This kit builds a DES encryption library and a DES encryption program.
|
||||
It supports ecb, cbc, ofb, cfb, triple ecb, triple cbc, triple ofb,
|
||||
triple cfb, desx, and MIT's pcbc encryption modes and also has a fast
|
||||
implementation of crypt(3).
|
||||
It contains support routines to read keys from a terminal,
|
||||
generate a random key, generate a key from an arbitrary length string,
|
||||
read/write encrypted data from/to a file descriptor.
|
||||
|
||||
The implementation was written so as to conform with the manual entry
|
||||
for the des_crypt(3) library routines from MIT's project Athena.
|
||||
|
||||
destest should be run after compilation to test the des routines.
|
||||
rpw should be run after compilation to test the read password routines.
|
||||
The des program is a replacement for the sun des command. I believe it
|
||||
conforms to the sun version.
|
||||
|
||||
The Imakefile is setup for use in the kerberos distribution.
|
||||
|
||||
These routines are best compiled with gcc or any other good
|
||||
optimising compiler.
|
||||
Just turn you optimiser up to the highest settings and run destest
|
||||
after the build to make sure everything works.
|
||||
|
||||
I believe these routines are close to the fastest and most portable DES
|
||||
routines that use small lookup tables (4.5k) that are publicly available.
|
||||
The fcrypt routine is faster than ufc's fcrypt (when compiling with
|
||||
gcc2 -O2) on the sparc 2 (1410 vs 1270) but is not so good on other machines
|
||||
(on a sun3/260 168 vs 336). It is a function of CPU on chip cache size.
|
||||
[ 10-Jan-97 and a function of an incorrect speed testing program in
|
||||
ufc which gave much better test figures that reality ].
|
||||
|
||||
It is worth noting that on sparc and Alpha CPUs, performance of the DES
|
||||
library can vary by upto %10 due to the positioning of files after application
|
||||
linkage.
|
||||
|
||||
Eric Young (eay@mincom.oz.au)
|
||||
|
||||
382
lib/des/VERSION
382
lib/des/VERSION
@@ -1,382 +0,0 @@
|
||||
Version 4.01 14/01/97
|
||||
Even faster inner loop in the DES assember for x86 and a modification
|
||||
for IP/FP which is faster on x86. Both of these changes are
|
||||
from Svend Olaf Mikkelsen <svolaf@inet.uni-c.dk>. His
|
||||
changes make the assember run %40 faster on a pentium. This is just
|
||||
a case of getting the instruction sequence 'just right'.
|
||||
All credit to 'Svend' :-)
|
||||
Quite a few special x86 'make' targets.
|
||||
A libdes-l (lite) distribution.
|
||||
|
||||
Version 4.00
|
||||
After a bit of a pause, I'll up the major version number since this
|
||||
is mostly a performace release. I've added x86 assember and
|
||||
added more options for performance. A %28 speedup for gcc
|
||||
on a pentium and the assember is a %50 speedup.
|
||||
MIPS CPU's, sparc and Alpha are the main CPU's with speedups.
|
||||
Run des_opts to work out which options should be used.
|
||||
DES_RISC1/DES_RISC2 use alternative inner loops which use
|
||||
more registers but should give speedups on any CPU that does
|
||||
dual issue (pentium). DES_UNROLL unrolls the inner loop,
|
||||
which costs in code size.
|
||||
|
||||
Version 3.26
|
||||
I've finally removed one of the shifts in D_ENCRYPT. This
|
||||
meant I've changed the des_SPtrans table (spr.h), the set_key()
|
||||
function and some things in des_enc.c. This has definitly
|
||||
made things faster :-). I've known about this one for some
|
||||
time but I've been too lazy to follow it up :-).
|
||||
Noticed that in the D_ENCRYPT() macro, we can just do L^=(..)^(..)^..
|
||||
instead of L^=((..)|(..)|(..).. This should save a register at
|
||||
least.
|
||||
Assember for x86. The file to replace is des_enc.c, which is replaced
|
||||
by one of the assember files found in asm. Look at des/asm/readme
|
||||
for more info.
|
||||
|
||||
/* Modification to fcrypt so it can be compiled to support
|
||||
HPUX 10.x's long password format, define -DLONGCRYPT to use this.
|
||||
Thanks to Jens Kupferschmidt <bt1cu@hpboot.rz.uni-leipzig.de>. */
|
||||
|
||||
SIGWINCH case put in des_read_passwd() so the function does not
|
||||
'exit' if this function is recieved.
|
||||
|
||||
Version 3.25 17/07/96
|
||||
Modified read_pwd.c so that stdin can be read if not a tty.
|
||||
Thanks to Jeff Barber <jeffb@issl.atl.hp.com> for the patches.
|
||||
des_init_random_number_generator() shortened due to VMS linker
|
||||
limits.
|
||||
Added RSA's DESX cbc mode. It is a form of cbc encryption, with 2
|
||||
8 byte quantites xored before and after encryption.
|
||||
des_xcbc_encryption() - the name is funny to preserve the des_
|
||||
prefix on all functions.
|
||||
|
||||
Version 3.24 20/04/96
|
||||
The DES_PTR macro option checked and used by SSLeay configuration
|
||||
|
||||
Version 3.23 11/04/96
|
||||
Added DES_LONG. If defined to 'unsigned int' on the DEC Alpha,
|
||||
it gives a %20 speedup :-)
|
||||
Fixed the problem with des.pl under perl5. The patches were
|
||||
sent by Ed Kubaitis (ejk@uiuc.edu).
|
||||
if fcrypt.c, changed values to handle illegal salt values the way
|
||||
normal crypt() implementations do. Some programs apparently use
|
||||
them :-(. The patch was sent by Bjorn Gronvall <bg@sics.se>
|
||||
|
||||
Version 3.22 29/11/95
|
||||
Bug in des(1), an error with the uuencoding stuff when the
|
||||
'data' is small, thanks to Geoff Keating <keagchon@mehta.anu.edu.au>
|
||||
for the patch.
|
||||
|
||||
Version 3.21 22/11/95
|
||||
After some emailing back and forth with
|
||||
Colin Plumb <colin@nyx10.cs.du.edu>, I've tweaked a few things
|
||||
and in a future version I will probably put in some of the
|
||||
optimisation he suggested for use with the DES_USE_PTR option.
|
||||
Extra routines from Mark Murray <mark@grondar.za> for use in
|
||||
freeBSD. They mostly involve random number generation for use
|
||||
with kerberos. They involve evil machine specific system calls
|
||||
etc so I would normally suggest pushing this stuff into the
|
||||
application and/or using RAND_seed()/RAND_bytes() if you are
|
||||
using this DES library as part of SSLeay.
|
||||
Redone the read_pw() function so that it is cleaner and
|
||||
supports termios, thanks to Sameer Parekh <sameer@c2.org>
|
||||
for the initial patches for this.
|
||||
Renamed 3ecb_encrypt() to ecb3_encrypt(). This has been
|
||||
done just to make things more consistent.
|
||||
I have also now added triple DES versions of cfb and ofb.
|
||||
|
||||
Version 3.20
|
||||
Damn, Damn, Damn, as pointed out by Mike_Spreitzer.PARC@xerox.com,
|
||||
my des_random_seed() function was only copying 4 bytes of the
|
||||
passed seed into the init structure. It is now fixed to copy 8.
|
||||
My own suggestion is to used something like MD5 :-)
|
||||
|
||||
Version 3.19
|
||||
While looking at my code one day, I though, why do I keep on
|
||||
calling des_encrypt(in,out,ks,enc) when every function that
|
||||
calls it has in and out the same. So I dropped the 'out'
|
||||
parameter, people should not be using this function.
|
||||
|
||||
Version 3.18 30/08/95
|
||||
Fixed a few bit with the distribution and the filenames.
|
||||
3.17 had been munged via a move to DOS and back again.
|
||||
NO CODE CHANGES
|
||||
|
||||
Version 3.17 14/07/95
|
||||
Fixed ede3 cbc which I had broken in 3.16. I have also
|
||||
removed some unneeded variables in 7-8 of the routines.
|
||||
|
||||
Version 3.16 26/06/95
|
||||
Added des_encrypt2() which does not use IP/FP, used by triple
|
||||
des routines. Tweaked things a bit elsewhere. %13 speedup on
|
||||
sparc and %6 on a R4400 for ede3 cbc mode.
|
||||
|
||||
Version 3.15 06/06/95
|
||||
Added des_ncbc_encrypt(), it is des_cbc mode except that it is
|
||||
'normal' and copies the new iv value back over the top of the
|
||||
passed parameter.
|
||||
CHANGED des_ede3_cbc_encrypt() so that it too now overwrites
|
||||
the iv. THIS WILL BREAK EXISTING CODE, but since this function
|
||||
only new, I feel I can change it, not so with des_cbc_encrypt :-(.
|
||||
I need to update the documentation.
|
||||
|
||||
Version 3.14 31/05/95
|
||||
New release upon the world, as part of my SSL implementation.
|
||||
New copyright and usage stuff. Basically free for all to use
|
||||
as long as you say it came from me :-)
|
||||
|
||||
Version 3.13 31/05/95
|
||||
A fix in speed.c, if HZ is not defined, I set it to 100.0
|
||||
which is reasonable for most unixes except SunOS 4.x.
|
||||
I now have a #ifdef sun but timing for SunOS 4.x looked very
|
||||
good :-(. At my last job where I used SunOS 4.x, it was
|
||||
defined to be 60.0 (look at the old INSTALL documentation), at
|
||||
the last release had it changed to 100.0 since I now work with
|
||||
Solaris2 and SVR4 boxes.
|
||||
Thanks to Rory Chisholm <rchishol@math.ethz.ch> for pointing this
|
||||
one out.
|
||||
|
||||
Version 3.12 08/05/95
|
||||
As pointed out by The Crypt Keeper <tck@bend.UCSD.EDU>,
|
||||
my D_ENCRYPT macro in crypt() had an un-necessary variable.
|
||||
It has been removed.
|
||||
|
||||
Version 3.11 03/05/95
|
||||
Added des_ede3_cbc_encrypt() which is cbc mode des with 3 keys
|
||||
and one iv. It is a standard and I needed it for my SSL code.
|
||||
It makes more sense to use this for triple DES than
|
||||
3cbc_encrypt(). I have also added (or should I say tested :-)
|
||||
cfb64_encrypt() which is cfb64 but it will encrypt a partial
|
||||
number of bytes - 3 bytes in 3 bytes out. Again this is for
|
||||
my SSL library, as a form of encryption to use with SSL
|
||||
telnet.
|
||||
|
||||
Version 3.10 22/03/95
|
||||
Fixed a bug in 3cbc_encrypt() :-(. When making repeated calls
|
||||
to cbc3_encrypt, the 2 iv values that were being returned to
|
||||
be used in the next call were reversed :-(.
|
||||
Many thanks to Bill Wade <wade@Stoner.COM> for pointing out
|
||||
this error.
|
||||
|
||||
Version 3.09 01/02/95
|
||||
Fixed des_random_key to far more random, it was rather feeble
|
||||
with regards to picking the initial seed. The problem was
|
||||
pointed out by Olaf Kirch <okir@monad.swb.de>.
|
||||
|
||||
Version 3.08 14/12/94
|
||||
Added Makefile.PL so libdes can be built into perl5.
|
||||
Changed des_locl.h so RAND is always defined.
|
||||
|
||||
Version 3.07 05/12/94
|
||||
Added GNUmake and stuff so the library can be build with
|
||||
glibc.
|
||||
|
||||
Version 3.06 30/08/94
|
||||
Added rpc_enc.c which contains _des_crypt. This is for use in
|
||||
secure_rpc v 4.0
|
||||
Finally fixed the cfb_enc problems.
|
||||
Fixed a few parameter parsing bugs in des (-3 and -b), thanks
|
||||
to Rob McMillan <R.McMillan@its.gu.edu.au>
|
||||
|
||||
Version 3.05 21/04/94
|
||||
for unsigned long l; gcc does not produce ((l>>34) == 0)
|
||||
This causes bugs in cfb_enc.
|
||||
Thanks to Hadmut Danisch <danisch@ira.uka.de>
|
||||
|
||||
Version 3.04 20/04/94
|
||||
Added a version number to des.c and libdes.a
|
||||
|
||||
Version 3.03 12/01/94
|
||||
Fixed a bug in non zero iv in 3cbc_enc.
|
||||
|
||||
Version 3.02 29/10/93
|
||||
I now work in a place where there are 6+ architectures and 14+
|
||||
OS versions :-).
|
||||
Fixed TERMIO definition so the most sys V boxes will work :-)
|
||||
|
||||
Release upon comp.sources.misc
|
||||
Version 3.01 08/10/93
|
||||
Added des_3cbc_encrypt()
|
||||
|
||||
Version 3.00 07/10/93
|
||||
Fixed up documentation.
|
||||
quad_cksum definitely compatible with MIT's now.
|
||||
|
||||
Version 2.30 24/08/93
|
||||
Triple DES now defaults to triple cbc but can do triple ecb
|
||||
with the -b flag.
|
||||
Fixed some MSDOS uuen/uudecoding problems, thanks to
|
||||
Added prototypes.
|
||||
|
||||
Version 2.22 29/06/93
|
||||
Fixed a bug in des_is_weak_key() which stopped it working :-(
|
||||
thanks to engineering@MorningStar.Com.
|
||||
|
||||
Version 2.21 03/06/93
|
||||
des(1) with no arguments gives quite a bit of help.
|
||||
Added -c (generate ckecksum) flag to des(1).
|
||||
Added -3 (triple DES) flag to des(1).
|
||||
Added cfb and ofb routines to the library.
|
||||
|
||||
Version 2.20 11/03/93
|
||||
Added -u (uuencode) flag to des(1).
|
||||
I have been playing with byte order in quad_cksum to make it
|
||||
compatible with MIT's version. All I can say is avid this
|
||||
function if possible since MIT's output is endian dependent.
|
||||
|
||||
Version 2.12 14/10/92
|
||||
Added MSDOS specific macro in ecb_encrypt which gives a %70
|
||||
speed up when the code is compiled with turbo C.
|
||||
|
||||
Version 2.11 12/10/92
|
||||
Speedup in set_key (recoding of PC-1)
|
||||
I now do it in 47 simple operations, down from 60.
|
||||
Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov)
|
||||
for motivating me to look for a faster system :-)
|
||||
The speedup is probably less that 1% but it is still 13
|
||||
instructions less :-).
|
||||
|
||||
Version 2.10 06/10/92
|
||||
The code now works on the 64bit ETA10 and CRAY without modifications or
|
||||
#defines. I believe the code should work on any machine that
|
||||
defines long, int or short to be 8 bytes long.
|
||||
Thanks to Shabbir J. Safdar (shabby@mentor.cc.purdue.edu)
|
||||
for helping me fix the code to run on 64bit machines (he had
|
||||
access to an ETA10).
|
||||
Thanks also to John Fletcher <john_fletcher@lccmail.ocf.llnl.gov>
|
||||
for testing the routines on a CRAY.
|
||||
read_password.c has been renamed to read_passwd.c
|
||||
string_to_key.c has been renamed to string2key.c
|
||||
|
||||
Version 2.00 14/09/92
|
||||
Made mods so that the library should work on 64bit CPU's.
|
||||
Removed all my uchar and ulong defs. To many different
|
||||
versions of unix define them in their header files in too many
|
||||
different combinations :-)
|
||||
IRIX - Sillicon Graphics mods (mostly in read_password.c).
|
||||
Thanks to Andrew Daviel (advax@erich.triumf.ca)
|
||||
|
||||
Version 1.99 26/08/92
|
||||
Fixed a bug or 2 in enc_read.c
|
||||
Fixed a bug in enc_write.c
|
||||
Fixed a pseudo bug in fcrypt.c (very obscure).
|
||||
|
||||
Version 1.98 31/07/92
|
||||
Support for the ETA10. This is a strange machine that defines
|
||||
longs and ints as 8 bytes and shorts as 4 bytes.
|
||||
Since I do evil things with long * that assume that they are 4
|
||||
bytes. Look in the Makefile for the option to compile for
|
||||
this machine. quad_cksum appears to have problems but I
|
||||
will don't have the time to fix it right now, and this is not
|
||||
a function that uses DES and so will not effect the main uses
|
||||
of the library.
|
||||
|
||||
Version 1.97 20/05/92 eay
|
||||
Fixed the Imakefile and made some changes to des.h to fix some
|
||||
problems when building this package with Kerberos v 4.
|
||||
|
||||
Version 1.96 18/05/92 eay
|
||||
Fixed a small bug in string_to_key() where problems could
|
||||
occur if des_check_key was set to true and the string
|
||||
generated a weak key.
|
||||
|
||||
Patch2 posted to comp.sources.misc
|
||||
Version 1.95 13/05/92 eay
|
||||
Added an alternative version of the D_ENCRYPT macro in
|
||||
ecb_encrypt and fcrypt. Depending on the compiler, one version or the
|
||||
other will be faster. This was inspired by
|
||||
Dana How <how@isl.stanford.edu>, and her pointers about doing the
|
||||
*(ulong *)((uchar *)ptr+(value&0xfc))
|
||||
vs
|
||||
ptr[value&0x3f]
|
||||
to stop the C compiler doing a <<2 to convert the long array index.
|
||||
|
||||
Version 1.94 05/05/92 eay
|
||||
Fixed an incompatibility between my string_to_key and the MIT
|
||||
version. When the key is longer than 8 chars, I was wrapping
|
||||
with a different method. To use the old version, define
|
||||
OLD_STR_TO_KEY in the makefile. Thanks to
|
||||
viktor@newsu.shearson.com (Viktor Dukhovni).
|
||||
|
||||
Version 1.93 28/04/92 eay
|
||||
Fixed the VMS mods so that echo is now turned off in
|
||||
read_password. Thanks again to brennan@coco.cchs.su.oz.AU.
|
||||
MSDOS support added. The routines can be compiled with
|
||||
Turbo C (v2.0) and MSC (v5.1). Make sure MSDOS is defined.
|
||||
|
||||
Patch1 posted to comp.sources.misc
|
||||
Version 1.92 13/04/92 eay
|
||||
Changed D_ENCRYPT so that the rotation of R occurs outside of
|
||||
the loop. This required rotating all the longs in sp.h (now
|
||||
called spr.h). Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
|
||||
speed.c has been changed so it will work without SIGALRM. If
|
||||
times(3) is not present it will try to use ftime() instead.
|
||||
|
||||
Version 1.91 08/04/92 eay
|
||||
Added -E/-D options to des(1) so it can use string_to_key.
|
||||
Added SVR4 mods suggested by witr@rwwa.COM
|
||||
Added VMS mods suggested by brennan@coco.cchs.su.oz.AU. If
|
||||
anyone knows how to turn of tty echo in VMS please tell me or
|
||||
implement it yourself :-).
|
||||
Changed FILE *IN/*OUT to *DES_IN/*DES_OUT since it appears VMS
|
||||
does not like IN/OUT being used.
|
||||
|
||||
Libdes posted to comp.sources.misc
|
||||
Version 1.9 24/03/92 eay
|
||||
Now contains a fast small crypt replacement.
|
||||
Added des(1) command.
|
||||
Added des_rw_mode so people can use cbc encryption with
|
||||
enc_read and enc_write.
|
||||
|
||||
Version 1.8 15/10/91 eay
|
||||
Bug in cbc_cksum.
|
||||
Many thanks to Keith Reynolds (keithr@sco.COM) for pointing this
|
||||
one out.
|
||||
|
||||
Version 1.7 24/09/91 eay
|
||||
Fixed set_key :-)
|
||||
set_key is 4 times faster and takes less space.
|
||||
There are a few minor changes that could be made.
|
||||
|
||||
Version 1.6 19/09/1991 eay
|
||||
Finally go IP and FP finished.
|
||||
Now I need to fix set_key.
|
||||
This version is quite a bit faster that 1.51
|
||||
|
||||
Version 1.52 15/06/1991 eay
|
||||
20% speedup in ecb_encrypt by changing the E bit selection
|
||||
to use 2 32bit words. This also required modification of the
|
||||
sp table. There is still a way to speedup the IP and IP-1
|
||||
(hints from outer@sq.com) still working on this one :-(.
|
||||
|
||||
Version 1.51 07/06/1991 eay
|
||||
Faster des_encrypt by loop unrolling
|
||||
Fixed bug in quad_cksum.c (thanks to hughes@logos.ucs.indiana.edu)
|
||||
|
||||
Version 1.50 28/05/1991 eay
|
||||
Optimised the code a bit more for the sparc. I have improved the
|
||||
speed of the inner des_encrypt by speeding up the initial and
|
||||
final permutations.
|
||||
|
||||
Version 1.40 23/10/1990 eay
|
||||
Fixed des_random_key, it did not produce a random key :-(
|
||||
|
||||
Version 1.30 2/10/1990 eay
|
||||
Have made des_quad_cksum the same as MIT's, the full package
|
||||
should be compatible with MIT's
|
||||
Have tested on a DECstation 3100
|
||||
Still need to fix des_set_key (make it faster).
|
||||
Does des_cbc_encrypts at 70.5k/sec on a 3100.
|
||||
|
||||
Version 1.20 18/09/1990 eay
|
||||
Fixed byte order dependencies.
|
||||
Fixed (I hope) all the word alignment problems.
|
||||
Speedup in des_ecb_encrypt.
|
||||
|
||||
Version 1.10 11/09/1990 eay
|
||||
Added des_enc_read and des_enc_write.
|
||||
Still need to fix des_quad_cksum.
|
||||
Still need to document des_enc_read and des_enc_write.
|
||||
|
||||
Version 1.00 27/08/1990 eay
|
||||
|
||||
@@ -1,99 +0,0 @@
|
||||
/* crypto/des/cbc3_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* HAS BUGS? DON'T USE */
|
||||
void DES_3cbc_encrypt(input, output, length, ks1, ks2, iv1, iv2, encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
DES_key_schedule *ks1;
|
||||
DES_key_schedule *ks2;
|
||||
DES_cblock (*iv1);
|
||||
DES_cblock (*iv2);
|
||||
int encrypt;
|
||||
{
|
||||
int off=((int)length-1)/8;
|
||||
long l8=((length+7)/8)*8;
|
||||
DES_cblock niv1,niv2;
|
||||
|
||||
if (encrypt == DES_ENCRYPT)
|
||||
{
|
||||
DES_cbc_encrypt(input,output,length,ks1,iv1,encrypt);
|
||||
if (length >= sizeof(DES_cblock))
|
||||
memcpy(niv1,output[off],sizeof(DES_cblock));
|
||||
DES_cbc_encrypt(output,output,l8,ks2,iv1,!encrypt);
|
||||
DES_cbc_encrypt(output,output,l8,ks1,iv2, encrypt);
|
||||
if (length >= sizeof(DES_cblock))
|
||||
memcpy(niv2,output[off],sizeof(DES_cblock));
|
||||
}
|
||||
else
|
||||
{
|
||||
if (length >= sizeof(DES_cblock))
|
||||
memcpy(niv2,input[off],sizeof(DES_cblock));
|
||||
DES_cbc_encrypt(input,output,l8,ks1,iv2,encrypt);
|
||||
DES_cbc_encrypt(output,output,l8,ks2,iv1,!encrypt);
|
||||
if (length >= sizeof(DES_cblock))
|
||||
memcpy(niv1,output[off],sizeof(DES_cblock));
|
||||
DES_cbc_encrypt(output,output,length,ks1,iv1, encrypt);
|
||||
}
|
||||
memcpy(*iv1,niv1,sizeof(DES_cblock));
|
||||
memcpy(*iv2,niv2,sizeof(DES_cblock));
|
||||
}
|
||||
|
||||
@@ -1,103 +0,0 @@
|
||||
/* crypto/des/cbc_cksm.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
DES_LONG DES_cbc_cksum(input, output, length, schedule, ivec)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
{
|
||||
register DES_LONG tout0,tout1,tin0,tin1;
|
||||
register long l=length;
|
||||
DES_LONG tin[2];
|
||||
unsigned char *in,*out,*iv;
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
c2l(iv,tout0);
|
||||
c2l(iv,tout1);
|
||||
for (; l>0; l-=8)
|
||||
{
|
||||
if (l >= 8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
}
|
||||
else
|
||||
c2ln(in,tin0,tin1,l);
|
||||
|
||||
tin0^=tout0; tin[0]=tin0;
|
||||
tin1^=tout1; tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
/* fix 15/10/91 eay - thanks to keithr@sco.COM */
|
||||
tout0=tin[0];
|
||||
tout1=tin[1];
|
||||
}
|
||||
if (out != NULL)
|
||||
{
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
tout0=tin0=tin1=tin[0]=tin[1]=0;
|
||||
return(tout1);
|
||||
}
|
||||
@@ -1,135 +0,0 @@
|
||||
/* crypto/des/cbc_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
void DES_cbc_encrypt(input, output, length, schedule, ivec, encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG tin0,tin1;
|
||||
register DES_LONG tout0,tout1,xor0,xor1;
|
||||
register unsigned char *in,*out;
|
||||
register long l=length;
|
||||
DES_LONG tin[2];
|
||||
unsigned char *iv;
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
if (encrypt)
|
||||
{
|
||||
c2l(iv,tout0);
|
||||
c2l(iv,tout1);
|
||||
for (l-=8; l>=0; l-=8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
tin0^=tout0; tin[0]=tin0;
|
||||
tin1^=tout1; tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
tout0=tin[0]; l2c(tout0,out);
|
||||
tout1=tin[1]; l2c(tout1,out);
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2ln(in,tin0,tin1,l+8);
|
||||
tin0^=tout0; tin[0]=tin0;
|
||||
tin1^=tout1; tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
tout0=tin[0]; l2c(tout0,out);
|
||||
tout1=tin[1]; l2c(tout1,out);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
c2l(iv,xor0);
|
||||
c2l(iv,xor1);
|
||||
for (l-=8; l>=0; l-=8)
|
||||
{
|
||||
c2l(in,tin0); tin[0]=tin0;
|
||||
c2l(in,tin1); tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_DECRYPT);
|
||||
tout0=tin[0]^xor0;
|
||||
tout1=tin[1]^xor1;
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
xor0=tin0;
|
||||
xor1=tin1;
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2l(in,tin0); tin[0]=tin0;
|
||||
c2l(in,tin1); tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_DECRYPT);
|
||||
tout0=tin[0]^xor0;
|
||||
tout1=tin[1]^xor1;
|
||||
l2cn(tout0,tout1,out,l+8);
|
||||
/* xor0=tin0;
|
||||
xor1=tin1; */
|
||||
}
|
||||
}
|
||||
tin0=tin1=tout0=tout1=xor0=xor1=0;
|
||||
tin[0]=tin[1]=0;
|
||||
}
|
||||
|
||||
@@ -1,151 +0,0 @@
|
||||
/* crypto/des/cfb64ede.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output encrypted as though 64bit cfb mode is being
|
||||
* used. The extra state information to record how much of the
|
||||
* 64bit block we have used is contained in *num;
|
||||
*/
|
||||
|
||||
void DES_ede3_cfb64_encrypt(in, out, length, ks1,ks2,ks3, ivec, num, encrypt)
|
||||
unsigned char *in;
|
||||
unsigned char *out;
|
||||
long length;
|
||||
DES_key_schedule *ks1,*ks2,*ks3;
|
||||
DES_cblock (*ivec);
|
||||
int *num;
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG v0,v1;
|
||||
register long l=length;
|
||||
register int n= *num;
|
||||
DES_LONG ti[2];
|
||||
unsigned char *iv,c,cc;
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
if (encrypt)
|
||||
{
|
||||
while (l--)
|
||||
{
|
||||
if (n == 0)
|
||||
{
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
DES_encrypt3((DES_LONG *)ti,ks1,ks2,ks3);
|
||||
v0=ti[0];
|
||||
v1=ti[1];
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
iv=(unsigned char *)ivec;
|
||||
}
|
||||
c= *(in++)^iv[n];
|
||||
*(out++)=c;
|
||||
iv[n]=c;
|
||||
n=(n+1)&0x07;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
while (l--)
|
||||
{
|
||||
if (n == 0)
|
||||
{
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
DES_encrypt3((DES_LONG *)ti,ks1,ks2,ks3);
|
||||
v0=ti[0];
|
||||
v1=ti[1];
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
iv=(unsigned char *)ivec;
|
||||
}
|
||||
cc= *(in++);
|
||||
c=iv[n];
|
||||
iv[n]=cc;
|
||||
*(out++)=c^cc;
|
||||
n=(n+1)&0x07;
|
||||
}
|
||||
}
|
||||
v0=v1=ti[0]=ti[1]=c=cc=0;
|
||||
*num=n;
|
||||
}
|
||||
|
||||
#ifdef undef /* MACRO */
|
||||
void DES_ede2_cfb64_encrypt(in, out, length, ks1,ks2, ivec, num, encrypt)
|
||||
unsigned char *in;
|
||||
unsigned char *out;
|
||||
long length;
|
||||
DES_key_schedule ks1,ks2;
|
||||
DES_cblock (*ivec);
|
||||
int *num;
|
||||
int encrypt;
|
||||
{
|
||||
DES_ede3_cfb64_encrypt(in,out,length,ks1,ks2,ks1,ivec,num,encrypt);
|
||||
}
|
||||
#endif
|
||||
@@ -1,128 +0,0 @@
|
||||
/* crypto/des/cfb64enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output encrypted as though 64bit cfb mode is being
|
||||
* used. The extra state information to record how much of the
|
||||
* 64bit block we have used is contained in *num;
|
||||
*/
|
||||
|
||||
void DES_cfb64_encrypt(in, out, length, schedule, ivec, num, encrypt)
|
||||
unsigned char *in;
|
||||
unsigned char *out;
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
int *num;
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG v0,v1;
|
||||
register long l=length;
|
||||
register int n= *num;
|
||||
DES_LONG ti[2];
|
||||
unsigned char *iv,c,cc;
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
if (encrypt)
|
||||
{
|
||||
while (l--)
|
||||
{
|
||||
if (n == 0)
|
||||
{
|
||||
c2l(iv,v0); ti[0]=v0;
|
||||
c2l(iv,v1); ti[1]=v1;
|
||||
DES_encrypt((DES_LONG *)ti,
|
||||
schedule,DES_ENCRYPT);
|
||||
iv=(unsigned char *)ivec;
|
||||
v0=ti[0]; l2c(v0,iv);
|
||||
v0=ti[1]; l2c(v0,iv);
|
||||
iv=(unsigned char *)ivec;
|
||||
}
|
||||
c= *(in++)^iv[n];
|
||||
*(out++)=c;
|
||||
iv[n]=c;
|
||||
n=(n+1)&0x07;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
while (l--)
|
||||
{
|
||||
if (n == 0)
|
||||
{
|
||||
c2l(iv,v0); ti[0]=v0;
|
||||
c2l(iv,v1); ti[1]=v1;
|
||||
DES_encrypt((DES_LONG *)ti,
|
||||
schedule,DES_ENCRYPT);
|
||||
iv=(unsigned char *)ivec;
|
||||
v0=ti[0]; l2c(v0,iv);
|
||||
v0=ti[1]; l2c(v0,iv);
|
||||
iv=(unsigned char *)ivec;
|
||||
}
|
||||
cc= *(in++);
|
||||
c=iv[n];
|
||||
iv[n]=cc;
|
||||
*(out++)=c^cc;
|
||||
n=(n+1)&0x07;
|
||||
}
|
||||
}
|
||||
v0=v1=ti[0]=ti[1]=c=cc=0;
|
||||
*num=n;
|
||||
}
|
||||
|
||||
@@ -1,171 +0,0 @@
|
||||
/* crypto/des/cfb_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output are loaded in multiples of 8 bits.
|
||||
* What this means is that if you hame numbits=12 and length=2
|
||||
* the first 12 bits will be retrieved from the first byte and half
|
||||
* the second. The second 12 bits will come from the 3rd and half the 4th
|
||||
* byte.
|
||||
*/
|
||||
void DES_cfb_encrypt(in, out, numbits, length, schedule, ivec, encrypt)
|
||||
unsigned char *in;
|
||||
unsigned char *out;
|
||||
int numbits;
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG d0,d1,v0,v1,n=(numbits+7)/8;
|
||||
register DES_LONG mask0,mask1;
|
||||
register unsigned long l=length;
|
||||
register int num=numbits;
|
||||
DES_LONG ti[2];
|
||||
unsigned char *iv;
|
||||
|
||||
if (num > 64) return;
|
||||
if (num > 32)
|
||||
{
|
||||
mask0=0xffffffffL;
|
||||
if (num == 64)
|
||||
mask1=mask0;
|
||||
else mask1=(1L<<(num-32))-1;
|
||||
}
|
||||
else
|
||||
{
|
||||
if (num == 32)
|
||||
mask0=0xffffffffL;
|
||||
else mask0=(1L<<num)-1;
|
||||
mask1=0x00000000;
|
||||
}
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
if (encrypt)
|
||||
{
|
||||
while (l >= n)
|
||||
{
|
||||
l-=n;
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
DES_encrypt((DES_LONG *)ti,schedule,DES_ENCRYPT);
|
||||
c2ln(in,d0,d1,n);
|
||||
in+=n;
|
||||
d0=(d0^ti[0])&mask0;
|
||||
d1=(d1^ti[1])&mask1;
|
||||
l2cn(d0,d1,out,n);
|
||||
out+=n;
|
||||
/* 30-08-94 - eay - changed because l>>32 and
|
||||
* l<<32 are bad under gcc :-( */
|
||||
if (num == 32)
|
||||
{ v0=v1; v1=d0; }
|
||||
else if (num == 64)
|
||||
{ v0=d0; v1=d1; }
|
||||
else if (num > 32) /* && num != 64 */
|
||||
{
|
||||
v0=((v1>>(num-32))|(d0<<(64-num)))&0xffffffffL;
|
||||
v1=((d0>>(num-32))|(d1<<(64-num)))&0xffffffffL;
|
||||
}
|
||||
else /* num < 32 */
|
||||
{
|
||||
v0=((v0>>num)|(v1<<(32-num)))&0xffffffffL;
|
||||
v1=((v1>>num)|(d0<<(32-num)))&0xffffffffL;
|
||||
}
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
while (l >= n)
|
||||
{
|
||||
l-=n;
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
DES_encrypt((DES_LONG *)ti,schedule,DES_ENCRYPT);
|
||||
c2ln(in,d0,d1,n);
|
||||
in+=n;
|
||||
/* 30-08-94 - eay - changed because l>>32 and
|
||||
* l<<32 are bad under gcc :-( */
|
||||
if (num == 32)
|
||||
{ v0=v1; v1=d0; }
|
||||
else if (num == 64)
|
||||
{ v0=d0; v1=d1; }
|
||||
else if (num > 32) /* && num != 64 */
|
||||
{
|
||||
v0=((v1>>(num-32))|(d0<<(64-num)))&0xffffffffL;
|
||||
v1=((d0>>(num-32))|(d1<<(64-num)))&0xffffffffL;
|
||||
}
|
||||
else /* num < 32 */
|
||||
{
|
||||
v0=((v0>>num)|(v1<<(32-num)))&0xffffffffL;
|
||||
v1=((v1>>num)|(d0<<(32-num)))&0xffffffffL;
|
||||
}
|
||||
d0=(d0^ti[0])&mask0;
|
||||
d1=(d1^ti[1])&mask1;
|
||||
l2cn(d0,d1,out,n);
|
||||
out+=n;
|
||||
}
|
||||
}
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
v0=v1=d0=d1=ti[0]=ti[1]=0;
|
||||
}
|
||||
|
||||
186
lib/des/des.1
186
lib/des/des.1
@@ -1,186 +0,0 @@
|
||||
.TH DES 1
|
||||
.SH NAME
|
||||
des - encrypt or decrypt data using Data Encryption Standard
|
||||
.SH SYNOPSIS
|
||||
.B des
|
||||
(
|
||||
.B \-e
|
||||
|
|
||||
.B \-E
|
||||
) | (
|
||||
.B \-d
|
||||
|
|
||||
.B \-D
|
||||
) | (
|
||||
.B \-\fR[\fPcC\fR][\fPckname\fR]\fP
|
||||
) |
|
||||
[
|
||||
.B \-b3hfs
|
||||
] [
|
||||
.B \-k
|
||||
.I key
|
||||
]
|
||||
] [
|
||||
.B \-u\fR[\fIuuname\fR]
|
||||
[
|
||||
.I input-file
|
||||
[
|
||||
.I output-file
|
||||
] ]
|
||||
.SH DESCRIPTION
|
||||
.B des
|
||||
encrypts and decrypts data using the
|
||||
Data Encryption Standard algorithm.
|
||||
One of
|
||||
.B \-e, \-E
|
||||
(for encrypt) or
|
||||
.B \-d, \-D
|
||||
(for decrypt) must be specified.
|
||||
It is also possible to use
|
||||
.B \-c
|
||||
or
|
||||
.B \-C
|
||||
in conjunction or instead of the a encrypt/decrypt option to generate
|
||||
a 16 character hexadecimal checksum, generated via the
|
||||
.I des_cbc_cksum.
|
||||
.LP
|
||||
Two standard encryption modes are supported by the
|
||||
.B des
|
||||
program, Cipher Block Chaining (the default) and Electronic Code Book
|
||||
(specified with
|
||||
.B \-b
|
||||
).
|
||||
.LP
|
||||
The key used for the DES
|
||||
algorithm is obtained by prompting the user unless the
|
||||
.B `\-k
|
||||
.I key'
|
||||
option is given.
|
||||
If the key is an argument to the
|
||||
.B des
|
||||
command, it is potentially visible to users executing
|
||||
.BR ps (1)
|
||||
or a derivative. To minimise this possibility,
|
||||
.B des
|
||||
takes care to destroy the key argument immediately upon entry.
|
||||
If your shell keeps a history file be careful to make sure it is not
|
||||
world readable.
|
||||
.LP
|
||||
Since this program attempts to maintain compatibility with SunOS's
|
||||
des(1) command, there are 2 different methods used to convert the user
|
||||
supplied key to a des key.
|
||||
Whenever and one or more of
|
||||
.B \-E, \-D, \-C
|
||||
or
|
||||
.B \-3
|
||||
options are used, the key conversion procedure will not be compatible
|
||||
with the SunOS des(1) version but will use all the user supplied
|
||||
character to generate the des key.
|
||||
.B des
|
||||
command reads from standard input unless
|
||||
.I input-file
|
||||
is specified and writes to standard output unless
|
||||
.I output-file
|
||||
is given.
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
.B \-b
|
||||
Select ECB
|
||||
(eight bytes at a time) encryption mode.
|
||||
.TP
|
||||
.B \-3
|
||||
Encrypt using triple encryption.
|
||||
By default triple cbc encryption is used but if the
|
||||
.B \-b
|
||||
option is used then triple ecb encryption is performed.
|
||||
If the key is less than 8 characters long, the flag has no effect.
|
||||
.TP
|
||||
.B \-e
|
||||
Encrypt data using an 8 byte key in a manner compatible with SunOS
|
||||
des(1).
|
||||
.TP
|
||||
.B \-E
|
||||
Encrypt data using a key of nearly unlimited length (1024 bytes).
|
||||
This will product a more secure encryption.
|
||||
.TP
|
||||
.B \-d
|
||||
Decrypt data that was encrypted with the \-e option.
|
||||
.TP
|
||||
.B \-D
|
||||
Decrypt data that was encrypted with the \-E option.
|
||||
.TP
|
||||
.B \-c
|
||||
Generate a 16 character hexadecimal cbc checksum and output this to
|
||||
stderr.
|
||||
If a filename was specified after the
|
||||
.B \-c
|
||||
option, the checksum is output to that file.
|
||||
The checksum is generated using a key generated in a SunOS compatible
|
||||
manner.
|
||||
.TP
|
||||
.B \-C
|
||||
A cbc checksum is generated in the same manner as described for the
|
||||
.B \-c
|
||||
option but the DES key is generated in the same manner as used for the
|
||||
.B \-E
|
||||
and
|
||||
.B \-D
|
||||
options
|
||||
.TP
|
||||
.B \-f
|
||||
Does nothing - allowed for compatibility with SunOS des(1) command.
|
||||
.TP
|
||||
.B \-s
|
||||
Does nothing - allowed for compatibility with SunOS des(1) command.
|
||||
.TP
|
||||
.B "\-k \fIkey\fP"
|
||||
Use the encryption
|
||||
.I key
|
||||
specified.
|
||||
.TP
|
||||
.B "\-h"
|
||||
The
|
||||
.I key
|
||||
is assumed to be a 16 character hexadecimal number.
|
||||
If the
|
||||
.B "\-3"
|
||||
option is used the key is assumed to be a 32 character hexadecimal
|
||||
number.
|
||||
.TP
|
||||
.B \-u
|
||||
This flag is used to read and write uuencoded files. If decrypting,
|
||||
the input file is assumed to contain uuencoded, DES encrypted data.
|
||||
If encrypting, the characters following the -u are used as the name of
|
||||
the uuencoded file to embed in the begin line of the uuencoded
|
||||
output. If there is no name specified after the -u, the name text.des
|
||||
will be embedded in the header.
|
||||
.SH SEE ALSO
|
||||
.B ps (1)
|
||||
.B des_crypt(3)
|
||||
.SH BUGS
|
||||
.LP
|
||||
The problem with using the
|
||||
.B -e
|
||||
option is the short key length.
|
||||
It would be better to use a real 56-bit key rather than an
|
||||
ASCII-based 56-bit pattern. Knowing that the key was derived from ASCII
|
||||
radically reduces the time necessary for a brute-force cryptographic attack.
|
||||
My attempt to remove this problem is to add an alternative text-key to
|
||||
DES-key function. This alternative function (accessed via
|
||||
.B -E, -D, -S
|
||||
and
|
||||
.B -3
|
||||
)
|
||||
uses DES to help generate the key.
|
||||
.LP
|
||||
Be carefully when using the -u option. Doing des -ud <filename> will
|
||||
not decrypt filename (the -u option will gobble the d option).
|
||||
.LP
|
||||
The VMS operating system operates in a world where files are always a
|
||||
multiple of 512 bytes. This causes problems when encrypted data is
|
||||
send from unix to VMS since a 88 byte file will suddenly be padded
|
||||
with 424 null bytes. To get around this problem, use the -u option
|
||||
to uuencode the data before it is send to the VMS system.
|
||||
.SH AUTHOR
|
||||
.LP
|
||||
Eric Young (eay@mincom.oz.au or eay@psych.psy.uq.oz.au)
|
||||
1749
lib/des/des.c
1749
lib/des/des.c
File diff suppressed because it is too large
Load Diff
@@ -1,37 +0,0 @@
|
||||
LIBRARY des BASE=0x06000000
|
||||
EXPORTS
|
||||
des_ecb3_encrypt
|
||||
des_cbc_cksum
|
||||
des_cbc_encrypt
|
||||
des_ncbc_encrypt
|
||||
des_3cbc_encrypt
|
||||
des_cfb_encrypt
|
||||
des_ede3_cfb64_encrypt
|
||||
des_ede3_ofb64_encrypt
|
||||
des_ecb_encrypt
|
||||
des_encrypt
|
||||
des_encrypt2
|
||||
des_ede3_cbc_encrypt
|
||||
des_enc_read
|
||||
des_enc_write
|
||||
crypt
|
||||
des_ofb_encrypt
|
||||
des_pcbc_encrypt
|
||||
des_quad_cksum
|
||||
des_read_password
|
||||
des_read_2passwords
|
||||
des_read_pw_string
|
||||
des_set_odd_parity
|
||||
des_is_weak_key
|
||||
des_set_key
|
||||
des_key_sched
|
||||
des_string_to_key
|
||||
des_string_to_2keys
|
||||
des_cfb64_encrypt
|
||||
des_ofb64_encrypt
|
||||
des_cblock_print_file
|
||||
des_new_random_key
|
||||
des_init_random_number_generator
|
||||
des_set_random_generator_seed
|
||||
des_set_sequence_number
|
||||
des_generate_random_block
|
||||
505
lib/des/des.doc
505
lib/des/des.doc
@@ -1,505 +0,0 @@
|
||||
The DES library.
|
||||
|
||||
Please note that this library was originally written to operate with
|
||||
eBones, a version of Kerberos that had had encryption removed when it left
|
||||
the USA and then put back in. As such there are some routines that I will
|
||||
advise not using but they are still in the library for historical reasons.
|
||||
For all calls that have an 'input' and 'output' variables, they can be the
|
||||
same.
|
||||
|
||||
This library requires the inclusion of 'des.h'.
|
||||
|
||||
All of the encryption functions take what is called a des_key_schedule as an
|
||||
argument. A des_key_schedule is an expanded form of the des key.
|
||||
A des_key is 8 bytes of odd parity, the type used to hold the key is a
|
||||
des_cblock. A des_cblock is an array of 8 bytes, often in this library
|
||||
description I will refer to input bytes when the function specifies
|
||||
des_cblock's as input or output, this just means that the variable should
|
||||
be a multiple of 8 bytes.
|
||||
|
||||
The define DES_ENCRYPT is passed to specify encryption, DES_DECRYPT to
|
||||
specify decryption. The functions and global variable are as follows:
|
||||
|
||||
int des_check_key;
|
||||
DES keys are supposed to be odd parity. If this variable is set to
|
||||
a non-zero value, des_set_key() will check that the key has odd
|
||||
parity and is not one of the known weak DES keys. By default this
|
||||
variable is turned off;
|
||||
|
||||
void des_set_odd_parity(
|
||||
des_cblock *key );
|
||||
This function takes a DES key (8 bytes) and sets the parity to odd.
|
||||
|
||||
int des_is_weak_key(
|
||||
des_cblock *key );
|
||||
This function returns a non-zero value if the DES key passed is a
|
||||
weak, DES key. If it is a weak key, don't use it, try a different
|
||||
one. If you are using 'random' keys, the chances of hitting a weak
|
||||
key are 1/2^52 so it is probably not worth checking for them.
|
||||
|
||||
int des_set_key(
|
||||
des_cblock *key,
|
||||
des_key_schedule schedule);
|
||||
Des_set_key converts an 8 byte DES key into a des_key_schedule.
|
||||
A des_key_schedule is an expanded form of the key which is used to
|
||||
perform actual encryption. It can be regenerated from the DES key
|
||||
so it only needs to be kept when encryption or decryption is about
|
||||
to occur. Don't save or pass around des_key_schedule's since they
|
||||
are CPU architecture dependent, DES keys are not. If des_check_key
|
||||
is non zero, zero is returned if the key has the wrong parity or
|
||||
the key is a weak key, else 1 is returned.
|
||||
|
||||
int des_key_sched(
|
||||
des_cblock *key,
|
||||
des_key_schedule schedule);
|
||||
An alternative name for des_set_key().
|
||||
|
||||
int des_rw_mode; /* defaults to DES_PCBC_MODE */
|
||||
This flag holds either DES_CBC_MODE or DES_PCBC_MODE (default).
|
||||
This specifies the function to use in the enc_read() and enc_write()
|
||||
functions.
|
||||
|
||||
void des_encrypt(
|
||||
unsigned long *data,
|
||||
des_key_schedule ks,
|
||||
int enc);
|
||||
This is the DES encryption function that gets called by just about
|
||||
every other DES routine in the library. You should not use this
|
||||
function except to implement 'modes' of DES. I say this because the
|
||||
functions that call this routine do the conversion from 'char *' to
|
||||
long, and this needs to be done to make sure 'non-aligned' memory
|
||||
access do not occur. The characters are loaded 'little endian',
|
||||
have a look at my source code for more details on how I use this
|
||||
function.
|
||||
Data is a pointer to 2 unsigned long's and ks is the
|
||||
des_key_schedule to use. enc, is non zero specifies encryption,
|
||||
zero if decryption.
|
||||
|
||||
void des_encrypt2(
|
||||
unsigned long *data,
|
||||
des_key_schedule ks,
|
||||
int enc);
|
||||
This functions is the same as des_encrypt() except that the DES
|
||||
initial permutation (IP) and final permutation (FP) have been left
|
||||
out. As for des_encrypt(), you should not use this function.
|
||||
It is used by the routines in my library that implement triple DES.
|
||||
IP() des_encrypt2() des_encrypt2() des_encrypt2() FP() is the same
|
||||
as des_encrypt() des_encrypt() des_encrypt() except faster :-).
|
||||
|
||||
void des_ecb_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
des_key_schedule ks,
|
||||
int enc);
|
||||
This is the basic Electronic Code Book form of DES, the most basic
|
||||
form. Input is encrypted into output using the key represented by
|
||||
ks. If enc is non zero (DES_ENCRYPT), encryption occurs, otherwise
|
||||
decryption occurs. Input is 8 bytes long and output is 8 bytes.
|
||||
(the des_cblock structure is 8 chars).
|
||||
|
||||
void des_ecb3_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
des_key_schedule ks1,
|
||||
des_key_schedule ks2,
|
||||
des_key_schedule ks3,
|
||||
int enc);
|
||||
This is the 3 key EDE mode of ECB DES. What this means is that
|
||||
the 8 bytes of input is encrypted with ks1, decrypted with ks2 and
|
||||
then encrypted again with ks3, before being put into output;
|
||||
C=E(ks3,D(ks2,E(ks1,M))). There is a macro, des_ecb2_encrypt()
|
||||
that only takes 2 des_key_schedules that implements,
|
||||
C=E(ks1,D(ks2,E(ks1,M))) in that the final encrypt is done with ks1.
|
||||
|
||||
void des_cbc_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
des_key_schedule ks,
|
||||
des_cblock *ivec,
|
||||
int enc);
|
||||
This routine implements DES in Cipher Block Chaining mode.
|
||||
Input, which should be a multiple of 8 bytes is encrypted
|
||||
(or decrypted) to output which will also be a multiple of 8 bytes.
|
||||
The number of bytes is in length (and from what I've said above,
|
||||
should be a multiple of 8). If length is not a multiple of 8, I'm
|
||||
not being held responsible :-). ivec is the initialisation vector.
|
||||
This function does not modify this variable. To correctly implement
|
||||
cbc mode, you need to do one of 2 things; copy the last 8 bytes of
|
||||
cipher text for use as the next ivec in your application,
|
||||
or use des_ncbc_encrypt().
|
||||
Only this routine has this problem with updating the ivec, all
|
||||
other routines that are implementing cbc mode update ivec.
|
||||
|
||||
void des_ncbc_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
des_key_schedule sk,
|
||||
des_cblock *ivec,
|
||||
int enc);
|
||||
For historical reasons, des_cbc_encrypt() did not update the
|
||||
ivec with the value requires so that subsequent calls to
|
||||
des_cbc_encrypt() would 'chain'. This was needed so that the same
|
||||
'length' values would not need to be used when decrypting.
|
||||
des_ncbc_encrypt() does the right thing. It is the same as
|
||||
des_cbc_encrypt accept that ivec is updates with the correct value
|
||||
to pass in subsequent calls to des_ncbc_encrypt(). I advise using
|
||||
des_ncbc_encrypt() instead of des_cbc_encrypt();
|
||||
|
||||
void des_xcbc_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
des_key_schedule sk,
|
||||
des_cblock *ivec,
|
||||
des_cblock *inw,
|
||||
des_cblock *outw,
|
||||
int enc);
|
||||
This is RSA's DESX mode of DES. It uses inw and outw to
|
||||
'whiten' the encryption. inw and outw are secret (unlike the iv)
|
||||
and are as such, part of the key. So the key is sort of 24 bytes.
|
||||
This is much better than cbc des.
|
||||
|
||||
void des_3cbc_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
des_key_schedule sk1,
|
||||
des_key_schedule sk2,
|
||||
des_cblock *ivec1,
|
||||
des_cblock *ivec2,
|
||||
int enc);
|
||||
This function is flawed, do not use it. I have left it in the
|
||||
library because it is used in my des(1) program and will function
|
||||
correctly when used by des(1). If I removed the function, people
|
||||
could end up unable to decrypt files.
|
||||
This routine implements outer triple cbc encryption using 2 ks and
|
||||
2 ivec's. Use des_ede2_cbc_encrypt() instead.
|
||||
|
||||
void des_ede3_cbc_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
des_key_schedule ks1,
|
||||
des_key_schedule ks2,
|
||||
des_key_schedule ks3,
|
||||
des_cblock *ivec,
|
||||
int enc);
|
||||
This function implements inner triple CBC DES encryption with 3
|
||||
keys. What this means is that each 'DES' operation
|
||||
inside the cbc mode is really an C=E(ks3,D(ks2,E(ks1,M))).
|
||||
Again, this is cbc mode so an ivec is requires.
|
||||
This mode is used by SSL.
|
||||
There is also a des_ede2_cbc_encrypt() that only uses 2
|
||||
des_key_schedule's, the first being reused for the final
|
||||
encryption. C=E(ks1,D(ks2,E(ks1,M))). This form of triple DES
|
||||
is used by the RSAref library.
|
||||
|
||||
void des_pcbc_encrypt(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
des_key_schedule ks,
|
||||
des_cblock *ivec,
|
||||
int enc);
|
||||
This is Propagating Cipher Block Chaining mode of DES. It is used
|
||||
by Kerberos v4. It's parameters are the same as des_ncbc_encrypt().
|
||||
|
||||
void des_cfb_encrypt(
|
||||
unsigned char *in,
|
||||
unsigned char *out,
|
||||
int numbits,
|
||||
long length,
|
||||
des_key_schedule ks,
|
||||
des_cblock *ivec,
|
||||
int enc);
|
||||
Cipher Feedback Back mode of DES. This implementation 'feeds back'
|
||||
in numbit blocks. The input (and output) is in multiples of numbits
|
||||
bits. numbits should to be a multiple of 8 bits. Length is the
|
||||
number of bytes input. If numbits is not a multiple of 8 bits,
|
||||
the extra bits in the bytes will be considered padding. So if
|
||||
numbits is 12, for each 2 input bytes, the 4 high bits of the
|
||||
second byte will be ignored. So to encode 72 bits when using
|
||||
a numbits of 12 take 12 bytes. To encode 72 bits when using
|
||||
numbits of 9 will take 16 bytes. To encode 80 bits when using
|
||||
numbits of 16 will take 10 bytes. etc, etc. This padding will
|
||||
apply to both input and output.
|
||||
|
||||
|
||||
void des_cfb64_encrypt(
|
||||
unsigned char *in,
|
||||
unsigned char *out,
|
||||
long length,
|
||||
des_key_schedule ks,
|
||||
des_cblock *ivec,
|
||||
int *num,
|
||||
int enc);
|
||||
This is one of the more useful functions in this DES library, it
|
||||
implements CFB mode of DES with 64bit feedback. Why is this
|
||||
useful you ask? Because this routine will allow you to encrypt an
|
||||
arbitrary number of bytes, no 8 byte padding. Each call to this
|
||||
routine will encrypt the input bytes to output and then update ivec
|
||||
and num. num contains 'how far' we are though ivec. If this does
|
||||
not make much sense, read more about cfb mode of DES :-).
|
||||
|
||||
void des_ede3_cfb64_encrypt(
|
||||
unsigned char *in,
|
||||
unsigned char *out,
|
||||
long length,
|
||||
des_key_schedule ks1,
|
||||
des_key_schedule ks2,
|
||||
des_key_schedule ks3,
|
||||
des_cblock *ivec,
|
||||
int *num,
|
||||
int enc);
|
||||
Same as des_cfb64_encrypt() accept that the DES operation is
|
||||
triple DES. As usual, there is a macro for
|
||||
des_ede2_cfb64_encrypt() which reuses ks1.
|
||||
|
||||
void des_ofb_encrypt(
|
||||
unsigned char *in,
|
||||
unsigned char *out,
|
||||
int numbits,
|
||||
long length,
|
||||
des_key_schedule ks,
|
||||
des_cblock *ivec);
|
||||
This is a implementation of Output Feed Back mode of DES. It is
|
||||
the same as des_cfb_encrypt() in that numbits is the size of the
|
||||
units dealt with during input and output (in bits).
|
||||
|
||||
void des_ofb64_encrypt(
|
||||
unsigned char *in,
|
||||
unsigned char *out,
|
||||
long length,
|
||||
des_key_schedule ks,
|
||||
des_cblock *ivec,
|
||||
int *num);
|
||||
The same as des_cfb64_encrypt() except that it is Output Feed Back
|
||||
mode.
|
||||
|
||||
void des_ede3_ofb64_encrypt(
|
||||
unsigned char *in,
|
||||
unsigned char *out,
|
||||
long length,
|
||||
des_key_schedule ks1,
|
||||
des_key_schedule ks2,
|
||||
des_key_schedule ks3,
|
||||
des_cblock *ivec,
|
||||
int *num);
|
||||
Same as des_ofb64_encrypt() accept that the DES operation is
|
||||
triple DES. As usual, there is a macro for
|
||||
des_ede2_ofb64_encrypt() which reuses ks1.
|
||||
|
||||
int des_read_pw_string(
|
||||
char *buf,
|
||||
int length,
|
||||
char *prompt,
|
||||
int verify);
|
||||
This routine is used to get a password from the terminal with echo
|
||||
turned off. Buf is where the string will end up and length is the
|
||||
size of buf. Prompt is a string presented to the 'user' and if
|
||||
verify is set, the key is asked for twice and unless the 2 copies
|
||||
match, an error is returned. A return code of -1 indicates a
|
||||
system error, 1 failure due to use interaction, and 0 is success.
|
||||
|
||||
unsigned long des_cbc_cksum(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
des_key_schedule ks,
|
||||
des_cblock *ivec);
|
||||
This function produces an 8 byte checksum from input that it puts in
|
||||
output and returns the last 4 bytes as a long. The checksum is
|
||||
generated via cbc mode of DES in which only the last 8 byes are
|
||||
kept. I would recommend not using this function but instead using
|
||||
the EVP_Digest routines, or at least using MD5 or SHA. This
|
||||
function is used by Kerberos v4 so that is why it stays in the
|
||||
library.
|
||||
|
||||
char *des_fcrypt(
|
||||
const char *buf,
|
||||
const char *salt
|
||||
char *ret);
|
||||
This is my fast version of the unix crypt(3) function. This version
|
||||
takes only a small amount of space relative to other fast
|
||||
crypt() implementations. This is different to the normal crypt
|
||||
in that the third parameter is the buffer that the return value
|
||||
is written into. It needs to be at least 14 bytes long. This
|
||||
function is thread safe, unlike the normal crypt.
|
||||
|
||||
char *crypt(
|
||||
const char *buf,
|
||||
const char *salt);
|
||||
This function calls des_fcrypt() with a static array passed as the
|
||||
third parameter. This emulates the normal non-thread safe semantics
|
||||
of crypt(3).
|
||||
|
||||
void des_string_to_key(
|
||||
char *str,
|
||||
des_cblock *key);
|
||||
This function takes str and converts it into a DES key. I would
|
||||
recommend using MD5 instead and use the first 8 bytes of output.
|
||||
When I wrote the first version of these routines back in 1990, MD5
|
||||
did not exist but I feel these routines are still sound. This
|
||||
routines is compatible with the one in MIT's libdes.
|
||||
|
||||
void des_string_to_2keys(
|
||||
char *str,
|
||||
des_cblock *key1,
|
||||
des_cblock *key2);
|
||||
This function takes str and converts it into 2 DES keys.
|
||||
I would recommend using MD5 and using the 16 bytes as the 2 keys.
|
||||
I have nothing against these 2 'string_to_key' routines, it's just
|
||||
that if you say that your encryption key is generated by using the
|
||||
16 bytes of an MD5 hash, every-one knows how you generated your
|
||||
keys.
|
||||
|
||||
int des_read_password(
|
||||
des_cblock *key,
|
||||
char *prompt,
|
||||
int verify);
|
||||
This routine combines des_read_pw_string() with des_string_to_key().
|
||||
|
||||
int des_read_2passwords(
|
||||
des_cblock *key1,
|
||||
des_cblock *key2,
|
||||
char *prompt,
|
||||
int verify);
|
||||
This routine combines des_read_pw_string() with des_string_to_2key().
|
||||
|
||||
void des_random_seed(
|
||||
des_cblock key);
|
||||
This routine sets a starting point for des_random_key().
|
||||
|
||||
void des_random_key(
|
||||
des_cblock ret);
|
||||
This function return a random key. Make sure to 'seed' the random
|
||||
number generator (with des_random_seed()) before using this function.
|
||||
I personally now use a MD5 based random number system.
|
||||
|
||||
int des_enc_read(
|
||||
int fd,
|
||||
char *buf,
|
||||
int len,
|
||||
des_key_schedule ks,
|
||||
des_cblock *iv);
|
||||
This function will write to a file descriptor the encrypted data
|
||||
from buf. This data will be preceded by a 4 byte 'byte count' and
|
||||
will be padded out to 8 bytes. The encryption is either CBC of
|
||||
PCBC depending on the value of des_rw_mode. If it is DES_PCBC_MODE,
|
||||
pcbc is used, if DES_CBC_MODE, cbc is used. The default is to use
|
||||
DES_PCBC_MODE.
|
||||
|
||||
int des_enc_write(
|
||||
int fd,
|
||||
char *buf,
|
||||
int len,
|
||||
des_key_schedule ks,
|
||||
des_cblock *iv);
|
||||
This routines read stuff written by des_enc_read() and decrypts it.
|
||||
I have used these routines quite a lot but I don't believe they are
|
||||
suitable for non-blocking io. If you are after a full
|
||||
authentication/encryption over networks, have a look at SSL instead.
|
||||
|
||||
unsigned long des_quad_cksum(
|
||||
des_cblock *input,
|
||||
des_cblock *output,
|
||||
long length,
|
||||
int out_count,
|
||||
des_cblock *seed);
|
||||
This is a function from Kerberos v4 that is not anything to do with
|
||||
DES but was needed. It is a cksum that is quicker to generate than
|
||||
des_cbc_cksum(); I personally would use MD5 routines now.
|
||||
=====
|
||||
Modes of DES
|
||||
Quite a bit of the following information has been taken from
|
||||
AS 2805.5.2
|
||||
Australian Standard
|
||||
Electronic funds transfer - Requirements for interfaces,
|
||||
Part 5.2: Modes of operation for an n-bit block cipher algorithm
|
||||
Appendix A
|
||||
|
||||
There are several different modes in which DES can be used, they are
|
||||
as follows.
|
||||
|
||||
Electronic Codebook Mode (ECB) (des_ecb_encrypt())
|
||||
- 64 bits are enciphered at a time.
|
||||
- The order of the blocks can be rearranged without detection.
|
||||
- The same plaintext block always produces the same ciphertext block
|
||||
(for the same key) making it vulnerable to a 'dictionary attack'.
|
||||
- An error will only affect one ciphertext block.
|
||||
|
||||
Cipher Block Chaining Mode (CBC) (des_cbc_encrypt())
|
||||
- a multiple of 64 bits are enciphered at a time.
|
||||
- The CBC mode produces the same ciphertext whenever the same
|
||||
plaintext is encrypted using the same key and starting variable.
|
||||
- The chaining operation makes the ciphertext blocks dependent on the
|
||||
current and all preceding plaintext blocks and therefore blocks can not
|
||||
be rearranged.
|
||||
- The use of different starting variables prevents the same plaintext
|
||||
enciphering to the same ciphertext.
|
||||
- An error will affect the current and the following ciphertext blocks.
|
||||
|
||||
Cipher Feedback Mode (CFB) (des_cfb_encrypt())
|
||||
- a number of bits (j) <= 64 are enciphered at a time.
|
||||
- The CFB mode produces the same ciphertext whenever the same
|
||||
plaintext is encrypted using the same key and starting variable.
|
||||
- The chaining operation makes the ciphertext variables dependent on the
|
||||
current and all preceding variables and therefore j-bit variables are
|
||||
chained together and can not be rearranged.
|
||||
- The use of different starting variables prevents the same plaintext
|
||||
enciphering to the same ciphertext.
|
||||
- The strength of the CFB mode depends on the size of k (maximal if
|
||||
j == k). In my implementation this is always the case.
|
||||
- Selection of a small value for j will require more cycles through
|
||||
the encipherment algorithm per unit of plaintext and thus cause
|
||||
greater processing overheads.
|
||||
- Only multiples of j bits can be enciphered.
|
||||
- An error will affect the current and the following ciphertext variables.
|
||||
|
||||
Output Feedback Mode (OFB) (des_ofb_encrypt())
|
||||
- a number of bits (j) <= 64 are enciphered at a time.
|
||||
- The OFB mode produces the same ciphertext whenever the same
|
||||
plaintext enciphered using the same key and starting variable. More
|
||||
over, in the OFB mode the same key stream is produced when the same
|
||||
key and start variable are used. Consequently, for security reasons
|
||||
a specific start variable should be used only once for a given key.
|
||||
- The absence of chaining makes the OFB more vulnerable to specific attacks.
|
||||
- The use of different start variables values prevents the same
|
||||
plaintext enciphering to the same ciphertext, by producing different
|
||||
key streams.
|
||||
- Selection of a small value for j will require more cycles through
|
||||
the encipherment algorithm per unit of plaintext and thus cause
|
||||
greater processing overheads.
|
||||
- Only multiples of j bits can be enciphered.
|
||||
- OFB mode of operation does not extend ciphertext errors in the
|
||||
resultant plaintext output. Every bit error in the ciphertext causes
|
||||
only one bit to be in error in the deciphered plaintext.
|
||||
- OFB mode is not self-synchronising. If the two operation of
|
||||
encipherment and decipherment get out of synchronism, the system needs
|
||||
to be re-initialised.
|
||||
- Each re-initialisation should use a value of the start variable
|
||||
different from the start variable values used before with the same
|
||||
key. The reason for this is that an identical bit stream would be
|
||||
produced each time from the same parameters. This would be
|
||||
susceptible to a ' known plaintext' attack.
|
||||
|
||||
Triple ECB Mode (des_ecb3_encrypt())
|
||||
- Encrypt with key1, decrypt with key2 and encrypt with key3 again.
|
||||
- As for ECB encryption but increases the key length to 168 bits.
|
||||
There are theoretic attacks that can be used that make the effective
|
||||
key length 112 bits, but this attack also requires 2^56 blocks of
|
||||
memory, not very likely, even for the NSA.
|
||||
- If both keys are the same it is equivalent to encrypting once with
|
||||
just one key.
|
||||
- If the first and last key are the same, the key length is 112 bits.
|
||||
There are attacks that could reduce the key space to 55 bit's but it
|
||||
requires 2^56 blocks of memory.
|
||||
- If all 3 keys are the same, this is effectively the same as normal
|
||||
ecb mode.
|
||||
|
||||
Triple CBC Mode (des_ede3_cbc_encrypt())
|
||||
- Encrypt with key1, decrypt with key2 and then encrypt with key3.
|
||||
- As for CBC encryption but increases the key length to 168 bits with
|
||||
the same restrictions as for triple ecb mode.
|
||||
258
lib/des/des.dsp
258
lib/des/des.dsp
@@ -1,258 +0,0 @@
|
||||
# Microsoft Developer Studio Project File - Name="des" - Package Owner=<4>
|
||||
# Microsoft Developer Studio Generated Build File, Format Version 5.00
|
||||
# ** DO NOT EDIT **
|
||||
|
||||
# TARGTYPE "Win32 (x86) Dynamic-Link Library" 0x0102
|
||||
|
||||
CFG=des - Win32 Release
|
||||
!MESSAGE This is not a valid makefile. To build this project using NMAKE,
|
||||
!MESSAGE use the Export Makefile command and run
|
||||
!MESSAGE
|
||||
!MESSAGE NMAKE /f "des.mak".
|
||||
!MESSAGE
|
||||
!MESSAGE You can specify a configuration when running NMAKE
|
||||
!MESSAGE by defining the macro CFG on the command line. For example:
|
||||
!MESSAGE
|
||||
!MESSAGE NMAKE /f "des.mak" CFG="des - Win32 Release"
|
||||
!MESSAGE
|
||||
!MESSAGE Possible choices for configuration are:
|
||||
!MESSAGE
|
||||
!MESSAGE "des - Win32 Release" (based on "Win32 (x86) Dynamic-Link Library")
|
||||
!MESSAGE "des - Win32 Debug" (based on "Win32 (x86) Dynamic-Link Library")
|
||||
!MESSAGE
|
||||
|
||||
# Begin Project
|
||||
# PROP Scc_ProjName ""
|
||||
# PROP Scc_LocalPath ""
|
||||
CPP=cl.exe
|
||||
MTL=midl.exe
|
||||
RSC=rc.exe
|
||||
|
||||
!IF "$(CFG)" == "des - Win32 Release"
|
||||
|
||||
# PROP BASE Use_MFC 0
|
||||
# PROP BASE Use_Debug_Libraries 0
|
||||
# PROP BASE Output_Dir ".\Release"
|
||||
# PROP BASE Intermediate_Dir ".\Release"
|
||||
# PROP BASE Target_Dir ""
|
||||
# PROP Use_MFC 0
|
||||
# PROP Use_Debug_Libraries 0
|
||||
# PROP Output_Dir ".\Release"
|
||||
# PROP Intermediate_Dir ".\Release"
|
||||
# PROP Ignore_Export_Lib 0
|
||||
# PROP Target_Dir ""
|
||||
# ADD BASE CPP /nologo /MT /W3 /GX /O2 /D "WIN32" /D "NDEBUG" /D "_WINDOWS" /YX /c
|
||||
# ADD CPP /nologo /MT /W3 /GX /O2 /I "..\roken" /I "." /I "..\..\include" /I "..\..\include\win32" /D "WIN32" /D "NDEBUG" /D "_WINDOWS" /D "HAVE_CONFIG_H" /YX /FD /c
|
||||
# ADD BASE MTL /nologo /D "NDEBUG" /win32
|
||||
# ADD MTL /nologo /D "NDEBUG" /mktyplib203 /win32
|
||||
# ADD BASE RSC /l 0x409 /d "NDEBUG"
|
||||
# ADD RSC /l 0x409 /d "NDEBUG"
|
||||
BSC32=bscmake.exe
|
||||
# ADD BASE BSC32 /nologo
|
||||
# ADD BSC32 /nologo
|
||||
LINK32=link.exe
|
||||
# ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /dll /machine:I386
|
||||
# ADD LINK32 ..\roken\Release\roken.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib /nologo /subsystem:windows /dll /machine:I386
|
||||
|
||||
!ELSEIF "$(CFG)" == "des - Win32 Debug"
|
||||
|
||||
# PROP BASE Use_MFC 0
|
||||
# PROP BASE Use_Debug_Libraries 1
|
||||
# PROP BASE Output_Dir ".\Debug"
|
||||
# PROP BASE Intermediate_Dir ".\Debug"
|
||||
# PROP BASE Target_Dir ""
|
||||
# PROP Use_MFC 0
|
||||
# PROP Use_Debug_Libraries 1
|
||||
# PROP Output_Dir ".\Debug"
|
||||
# PROP Intermediate_Dir ".\Debug"
|
||||
# PROP Ignore_Export_Lib 0
|
||||
# PROP Target_Dir ""
|
||||
# ADD BASE CPP /nologo /MTd /W3 /Gm /GX /Zi /Od /D "WIN32" /D "_DEBUG" /D "_WINDOWS" /YX /c
|
||||
# ADD CPP /nologo /MDd /W3 /Gm /GX /Zi /Od /I "..\roken" /I "." /I "..\..\include" /I "..\..\include\win32" /D "WIN32" /D "_DEBUG" /D "_WINDOWS" /D "HAVE_CONFIG_H" /YX /FD /c
|
||||
# ADD BASE MTL /nologo /D "_DEBUG" /win32
|
||||
# ADD MTL /nologo /D "_DEBUG" /mktyplib203 /win32
|
||||
# ADD BASE RSC /l 0x409 /d "_DEBUG"
|
||||
# ADD RSC /l 0x409 /d "_DEBUG"
|
||||
BSC32=bscmake.exe
|
||||
# ADD BASE BSC32 /nologo
|
||||
# ADD BSC32 /nologo
|
||||
LINK32=link.exe
|
||||
# ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /dll /debug /machine:I386
|
||||
# ADD LINK32 ..\roken\Debug\roken.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib /nologo /subsystem:windows /dll /debug /machine:I386
|
||||
|
||||
!ENDIF
|
||||
|
||||
# Begin Target
|
||||
|
||||
# Name "des - Win32 Release"
|
||||
# Name "des - Win32 Debug"
|
||||
# Begin Group "Source Files"
|
||||
|
||||
# PROP Default_Filter "cpp;c;cxx;rc;def;r;odl;hpj;bat;for;f90"
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\cbc3_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\cbc_cksm.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\cbc_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\cfb64ede.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\cfb64enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\cfb_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\des.def
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\des_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\dllmain.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\ecb3_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\ecb_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\ede_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\enc_read.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\enc_writ.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\fcrypt.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\key_par.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\ncbc_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\ofb64ede.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\ofb64enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\ofb_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\passwd_dlg.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\pcbc_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\qud_cksm.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\read_pwd.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\rnd_keys.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\rpc_enc.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\set_key.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\str2key.c
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\supp.c
|
||||
# End Source File
|
||||
# End Group
|
||||
# Begin Group "Header Files"
|
||||
|
||||
# PROP Default_Filter "h;hpp;hxx;hm;inl;fi;fd"
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\des.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\des_locl.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\des_ver.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\md5.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\passwd_dlg.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\podd.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\rpc_des.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\sk.h
|
||||
# End Source File
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\spr.h
|
||||
# End Source File
|
||||
# End Group
|
||||
# Begin Group "Resource Files"
|
||||
|
||||
# PROP Default_Filter "ico;cur;bmp;dlg;rc2;rct;bin;cnt;rtf;gif;jpg;jpeg;jpe"
|
||||
# Begin Source File
|
||||
|
||||
SOURCE=.\passwd_dialog.rc
|
||||
# End Source File
|
||||
# End Group
|
||||
# End Target
|
||||
# End Project
|
||||
331
lib/des/des.h
331
lib/des/des.h
@@ -1,47 +1,27 @@
|
||||
/* crypto/des/des.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
/*
|
||||
* Copyright (c) 2005 Kungliga Tekniska H<>gskolan
|
||||
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* 3. Neither the name of the Institute nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
@@ -49,265 +29,62 @@
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef HEADER_NEW_DES_H
|
||||
#define HEADER_NEW_DES_H
|
||||
/* $Id$ */
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
#ifndef _DESperate_H
|
||||
#define _DESperate_H 1
|
||||
|
||||
#include <stdio.h>
|
||||
#define DES_CBLOCK_LEN 8
|
||||
#define DES_KEY_SZ 8
|
||||
|
||||
#ifndef DES_LIB_FUNCTION
|
||||
#if defined(__BORLANDC__)
|
||||
#define DES_LIB_FUNCTION /* not-ready-definition-yet */
|
||||
#elif defined(_MSC_VER)
|
||||
#define DES_LIB_FUNCTION /* not-ready-definition-yet2 */
|
||||
#else
|
||||
#define DES_LIB_FUNCTION
|
||||
#endif
|
||||
#endif
|
||||
#define DES_ENCRYPT 1
|
||||
#define DES_DECRYPT 0
|
||||
|
||||
/* If this is set to 'unsigned int' on a DEC Alpha, this gives about a
|
||||
* %20 speed up (longs are 8 bytes, int's are 4). */
|
||||
#ifndef DES_LONG
|
||||
#if defined(__alpha) || defined(__sparcv9) || defined(__sparc_v9__) || _MIPS_SZLONG == 64
|
||||
#define DES_LONG unsigned int
|
||||
#else /* Not a 64 bit machine */
|
||||
#define DES_LONG unsigned long
|
||||
#endif
|
||||
#endif
|
||||
typedef unsigned char DES_cblock[DES_CBLOCK_LEN];
|
||||
typedef struct DES_key_schedule
|
||||
{
|
||||
uint32_t ks[32];
|
||||
} DES_key_schedule;
|
||||
|
||||
typedef unsigned char DES_cblock[8];
|
||||
typedef struct DES_ks_struct
|
||||
{
|
||||
union {
|
||||
DES_cblock _;
|
||||
/* make sure things are correct size on machines with
|
||||
* 8 byte longs */
|
||||
DES_LONG pad[2];
|
||||
} ks[16];
|
||||
#undef _
|
||||
#define _ ks._
|
||||
} DES_key_schedule;
|
||||
int DES_set_odd_parity(DES_cblock *);
|
||||
int DES_is_weak_key(DES_cblock *);
|
||||
int DES_set_key(DES_cblock *, DES_key_schedule *);
|
||||
int DES_new_random_key(DES_cblock *);
|
||||
void DES_string_to_key(const char *, DES_cblock *);
|
||||
int DES_read_password(DES_cblock *, char *, int);
|
||||
|
||||
#define DES_KEY_SZ (sizeof(DES_cblock))
|
||||
#define DES_SCHEDULE_SZ (sizeof(DES_key_schedule))
|
||||
int UI_UTIL_read_pw_string(char *, int, char *, int); /* XXX */
|
||||
|
||||
#define DES_ENCRYPT 1
|
||||
#define DES_DECRYPT 0
|
||||
void DES_rand_data(unsigned char *, int);
|
||||
void DES_set_random_generator_seed(DES_cblock *);
|
||||
void DES_generate_random_block(DES_cblock *);
|
||||
void DES_set_sequence_number(unsigned char *);
|
||||
void DES_init_random_number_generator(DES_cblock *);
|
||||
void DES_random_key(DES_cblock);
|
||||
|
||||
#define DES_CBC_MODE 0
|
||||
#define DES_PCBC_MODE 1
|
||||
|
||||
#define DES_ecb2_encrypt(i,o,k1,k2,e) \
|
||||
DES_ecb3_encrypt((i),(o),(k1),(k2),(k1),(e))
|
||||
void DES_encrypt(uint32_t [2], DES_key_schedule *, int);
|
||||
void DES_ecb_encrypt(DES_cblock *, DES_cblock *, DES_key_schedule *, int);
|
||||
void DES_ecb3_encrypt(DES_cblock *,DES_cblock *, DES_key_schedule *,
|
||||
DES_key_schedule *, DES_key_schedule *, int);
|
||||
void DES_pcbc_encrypt(unsigned char *, unsigned char *, long,
|
||||
DES_key_schedule *, DES_cblock *, int);
|
||||
void DES_cbc_encrypt(unsigned char *, unsigned char *, long,
|
||||
DES_key_schedule *, DES_cblock *, int);
|
||||
void DES_ede3_cbc_encrypt(const unsigned char *, unsigned char *, long,
|
||||
DES_key_schedule *, DES_key_schedule *,
|
||||
DES_key_schedule *, DES_cblock *, int);
|
||||
void DES_cfb64_encrypt(unsigned char *, unsigned char *, long,
|
||||
DES_key_schedule *, DES_cblock *, int *, int);
|
||||
|
||||
#define DES_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \
|
||||
DES_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e))
|
||||
|
||||
#define DES_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \
|
||||
DES_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e))
|
||||
uint32_t DES_cbc_cksum(const unsigned char *, DES_cblock *,
|
||||
long, DES_key_schedule *, DES_cblock *);
|
||||
|
||||
#define DES_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \
|
||||
DES_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n))
|
||||
|
||||
#define C_Block DES_cblock
|
||||
#define Key_schedule DES_key_schedule
|
||||
void _DES_ipfp_test(void);
|
||||
|
||||
/* some glue for openssl compat */
|
||||
#define UI_UTIL_read_pw_string DES_read_pw_string
|
||||
|
||||
#ifdef KERBEROS
|
||||
#define ENCRYPT DES_ENCRYPT
|
||||
#define DECRYPT DES_DECRYPT
|
||||
#endif
|
||||
#define KEY_SZ DES_KEY_SZ
|
||||
#define string_to_key DES_string_to_key
|
||||
#define read_pw_string DES_read_pw_string
|
||||
#define random_key DES_random_key
|
||||
#define pcbc_encrypt DES_pcbc_encrypt
|
||||
#define set_key DES_set_key
|
||||
#define key_sched DES_key_sched
|
||||
#define ecb_encrypt DES_ecb_encrypt
|
||||
#define cbc_encrypt DES_cbc_encrypt
|
||||
#define ncbc_encrypt DES_ncbc_encrypt
|
||||
#define xcbc_encrypt DES_xcbc_encrypt
|
||||
#define cbc_cksum DES_cbc_cksum
|
||||
#define quad_cksum DES_quad_cksum
|
||||
|
||||
/* For compatibility with the MIT lib - eay 20/05/92 */
|
||||
typedef DES_key_schedule bit_64;
|
||||
#define DES_fixup_key_parity DES_set_odd_parity
|
||||
#define DES_check_key_parity check_parity
|
||||
|
||||
extern int DES_check_key; /* defaults to false */
|
||||
extern int DES_rw_mode; /* defaults to DES_PCBC_MODE */
|
||||
|
||||
#ifdef cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
/* The next line is used to disable full ANSI prototypes, if your
|
||||
* compiler has problems with the prototypes, make sure this line always
|
||||
* evaluates to true :-) */
|
||||
#if defined(MSDOS) || defined(__STDC__)
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
#ifndef NOPROTO
|
||||
char *DES_LIB_FUNCTION DES_options(void);
|
||||
void DES_LIB_FUNCTION DES_ecb3_encrypt(DES_cblock *input,DES_cblock *output,
|
||||
DES_key_schedule *ks1,DES_key_schedule *ks2,
|
||||
DES_key_schedule *ks3, int enc);
|
||||
DES_LONG DES_LIB_FUNCTION DES_cbc_cksum(DES_cblock *input,DES_cblock *output,
|
||||
long length,DES_key_schedule *schedule,DES_cblock *ivec);
|
||||
void DES_LIB_FUNCTION DES_cbc_encrypt(DES_cblock *input,DES_cblock *output,long length,
|
||||
DES_key_schedule *schedule,DES_cblock *ivec,int enc);
|
||||
void DES_LIB_FUNCTION DES_ncbc_encrypt(DES_cblock *input,DES_cblock *output,long length,
|
||||
DES_key_schedule *schedule,DES_cblock *ivec,int enc);
|
||||
void DES_LIB_FUNCTION DES_xcbc_encrypt(DES_cblock *input,DES_cblock *output,long length,
|
||||
DES_key_schedule *schedule,DES_cblock *ivec,
|
||||
DES_cblock *inw,DES_cblock *outw,int enc);
|
||||
void DES_LIB_FUNCTION DES_3cbc_encrypt(DES_cblock *input,DES_cblock *output,long length,
|
||||
DES_key_schedule *sk1,DES_key_schedule *sk2,
|
||||
DES_cblock *ivec1,DES_cblock *ivec2,int enc);
|
||||
void DES_LIB_FUNCTION DES_cfb_encrypt(unsigned char *in,unsigned char *out,int numbits,
|
||||
long length,DES_key_schedule *schedule,DES_cblock *ivec,int enc);
|
||||
void DES_LIB_FUNCTION DES_ecb_encrypt(DES_cblock *input,DES_cblock *output,
|
||||
DES_key_schedule *ks,int enc);
|
||||
void DES_LIB_FUNCTION DES_encrypt(DES_LONG *data,DES_key_schedule *ks, int enc);
|
||||
void DES_LIB_FUNCTION DES_encrypt2(DES_LONG *data,DES_key_schedule *ks, int enc);
|
||||
void DES_LIB_FUNCTION DES_encrypt3(DES_LONG *data, DES_key_schedule *ks1,
|
||||
DES_key_schedule *ks2, DES_key_schedule *ks3);
|
||||
void DES_LIB_FUNCTION DES_decrypt3(DES_LONG *data, DES_key_schedule *ks1,
|
||||
DES_key_schedule *ks2, DES_key_schedule *ks3);
|
||||
void DES_LIB_FUNCTION DES_ede3_cbc_encrypt(DES_cblock *input, DES_cblock *output,
|
||||
long length, DES_key_schedule *ks1, DES_key_schedule *ks2,
|
||||
DES_key_schedule *ks3, DES_cblock *ivec, int enc);
|
||||
void DES_LIB_FUNCTION DES_ede3_cfb64_encrypt(unsigned char *in, unsigned char *out,
|
||||
long length, DES_key_schedule *ks1, DES_key_schedule *ks2,
|
||||
DES_key_schedule *ks3, DES_cblock *ivec, int *num, int encrypt);
|
||||
void DES_LIB_FUNCTION DES_ede3_ofb64_encrypt(unsigned char *in, unsigned char *out,
|
||||
long length, DES_key_schedule *ks1, DES_key_schedule *ks2,
|
||||
DES_key_schedule *ks3, DES_cblock *ivec, int *num);
|
||||
|
||||
int DES_LIB_FUNCTION DES_enc_read(int fd,char *buf,int len,DES_key_schedule *sched,
|
||||
DES_cblock *iv);
|
||||
int DES_LIB_FUNCTION DES_enc_write(int fd,char *buf,int len,DES_key_schedule *sched,
|
||||
DES_cblock *iv);
|
||||
char *DES_LIB_FUNCTION DES_fcrypt(const char *buf,const char *salt, char *ret);
|
||||
#ifdef PERL5
|
||||
char *DES_crypt(const char *buf,const char *salt);
|
||||
#else
|
||||
/* some stupid compilers complain because I have declared char instead
|
||||
* of const char */
|
||||
#ifdef HEADER_DES_LOCL_H
|
||||
char *DES_LIB_FUNCTION crypt(const char *buf,const char *salt);
|
||||
#else
|
||||
char *crypt();
|
||||
#endif
|
||||
#endif
|
||||
void DES_LIB_FUNCTION DES_ofb_encrypt(unsigned char *in,unsigned char *out,
|
||||
int numbits,long length,DES_key_schedule *schedule,DES_cblock *ivec);
|
||||
void DES_LIB_FUNCTION DES_pcbc_encrypt(DES_cblock *input,DES_cblock *output,long length,
|
||||
DES_key_schedule *schedule,DES_cblock *ivec,int enc);
|
||||
DES_LONG DES_LIB_FUNCTION DES_quad_cksum(DES_cblock *input,DES_cblock *output,
|
||||
long length,int out_count,DES_cblock *seed);
|
||||
void DES_LIB_FUNCTION DES_random_seed(DES_cblock key);
|
||||
void DES_LIB_FUNCTION DES_random_key(DES_cblock ret);
|
||||
int DES_LIB_FUNCTION DES_read_password(DES_cblock *key,char *prompt,int verify);
|
||||
int DES_LIB_FUNCTION DES_read_2passwords(DES_cblock *key1,DES_cblock *key2,
|
||||
char *prompt,int verify);
|
||||
int DES_LIB_FUNCTION DES_read_pw_string(char *buf,int length,char *prompt,int verify);
|
||||
void DES_LIB_FUNCTION DES_set_odd_parity(DES_cblock *key);
|
||||
int DES_LIB_FUNCTION DES_is_weak_key(DES_cblock *key);
|
||||
int DES_LIB_FUNCTION DES_set_key(DES_cblock *key,DES_key_schedule *schedule);
|
||||
int DES_LIB_FUNCTION DES_key_sched(DES_cblock *key,DES_key_schedule *schedule);
|
||||
void DES_LIB_FUNCTION DES_string_to_key(char *str,DES_cblock *key);
|
||||
void DES_LIB_FUNCTION DES_string_to_2keys(char *str,DES_cblock *key1,DES_cblock *key2);
|
||||
void DES_LIB_FUNCTION DES_cfb64_encrypt(unsigned char *in, unsigned char *out, long length,
|
||||
DES_key_schedule *schedule, DES_cblock *ivec, int *num, int enc);
|
||||
void DES_LIB_FUNCTION DES_ofb64_encrypt(unsigned char *in, unsigned char *out, long length,
|
||||
DES_key_schedule *schedule, DES_cblock *ivec, int *num);
|
||||
|
||||
/* Extra functions from Mark Murray <mark@grondar.za> */
|
||||
void DES_LIB_FUNCTION DES_cblock_print_file(DES_cblock *cb, FILE *fp);
|
||||
/* The following functions are not in the normal unix build or the
|
||||
* SSLeay build. When using the SSLeay build, use RAND_seed()
|
||||
* and RAND_bytes() instead. */
|
||||
int DES_LIB_FUNCTION DES_new_random_key(DES_cblock *key);
|
||||
void DES_LIB_FUNCTION DES_init_random_number_generator(DES_cblock *key);
|
||||
void DES_LIB_FUNCTION DES_set_random_generator_seed(DES_cblock *key);
|
||||
void DES_LIB_FUNCTION DES_set_sequence_number(DES_cblock new_sequence_number);
|
||||
void DES_LIB_FUNCTION DES_generate_random_block(DES_cblock *block);
|
||||
void DES_LIB_FUNCTION DES_rand_data(unsigned char *data, int size);
|
||||
|
||||
#else
|
||||
|
||||
char *DES_options();
|
||||
void DES_ecb3_encrypt();
|
||||
DES_LONG DES_cbc_cksum();
|
||||
void DES_cbc_encrypt();
|
||||
void DES_ncbc_encrypt();
|
||||
void DES_xcbc_encrypt();
|
||||
void DES_3cbc_encrypt();
|
||||
void DES_cfb_encrypt();
|
||||
void DES_ede3_cfb64_encrypt();
|
||||
void DES_ede3_ofb64_encrypt();
|
||||
void DES_ecb_encrypt();
|
||||
void DES_encrypt();
|
||||
void DES_encrypt2();
|
||||
void DES_encrypt3();
|
||||
void DES_decrypt3();
|
||||
void DES_ede3_cbc_encrypt();
|
||||
int DES_enc_read();
|
||||
int DES_enc_write();
|
||||
char *DES_fcrypt();
|
||||
#ifdef PERL5
|
||||
char *DES_crypt();
|
||||
#else
|
||||
char *crypt();
|
||||
#endif
|
||||
void DES_ofb_encrypt();
|
||||
void DES_pcbc_encrypt();
|
||||
DES_LONG DES_quad_cksum();
|
||||
void DES_random_seed();
|
||||
void DES_random_key();
|
||||
int DES_read_password();
|
||||
int DES_read_2passwords();
|
||||
int DES_read_pw_string();
|
||||
void DES_set_odd_parity();
|
||||
int DES_is_weak_key();
|
||||
int DES_set_key();
|
||||
int DES_key_sched();
|
||||
void DES_string_to_key();
|
||||
void DES_string_to_2keys();
|
||||
void DES_cfb64_encrypt();
|
||||
void DES_ofb64_encrypt();
|
||||
|
||||
/* Extra functions from Mark Murray <mark@grondar.za> */
|
||||
void DES_cblock_print_file();
|
||||
/* The following functions are not in the normal unix build or the
|
||||
* SSLeay build. When using the SSLeay build, use RAND_seed()
|
||||
* and RAND_bytes() instead. */
|
||||
int DES_new_random_key();
|
||||
void DES_init_random_number_generator();
|
||||
void DES_set_random_generator_seed();
|
||||
void DES_set_sequence_number();
|
||||
void DES_generate_random_block();
|
||||
void DES_rand_data();
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif
|
||||
#endif /* _DESperate_H */
|
||||
|
||||
659
lib/des/des.mak
659
lib/des/des.mak
@@ -1,659 +0,0 @@
|
||||
# Microsoft Developer Studio Generated NMAKE File, Based on des.dsp
|
||||
!IF "$(CFG)" == ""
|
||||
CFG=des - Win32 Release
|
||||
!MESSAGE No configuration specified. Defaulting to des - Win32 Release.
|
||||
!ENDIF
|
||||
|
||||
!IF "$(CFG)" != "des - Win32 Release" && "$(CFG)" != "des - Win32 Debug"
|
||||
!MESSAGE Invalid configuration "$(CFG)" specified.
|
||||
!MESSAGE You can specify a configuration when running NMAKE
|
||||
!MESSAGE by defining the macro CFG on the command line. For example:
|
||||
!MESSAGE
|
||||
!MESSAGE NMAKE /f "des.mak" CFG="des - Win32 Release"
|
||||
!MESSAGE
|
||||
!MESSAGE Possible choices for configuration are:
|
||||
!MESSAGE
|
||||
!MESSAGE "des - Win32 Release" (based on "Win32 (x86) Dynamic-Link Library")
|
||||
!MESSAGE "des - Win32 Debug" (based on "Win32 (x86) Dynamic-Link Library")
|
||||
!MESSAGE
|
||||
!ERROR An invalid configuration is specified.
|
||||
!ENDIF
|
||||
|
||||
!IF "$(OS)" == "Windows_NT"
|
||||
NULL=
|
||||
!ELSE
|
||||
NULL=nul
|
||||
!ENDIF
|
||||
|
||||
!IF "$(CFG)" == "des - Win32 Release"
|
||||
|
||||
OUTDIR=.\Release
|
||||
INTDIR=.\Release
|
||||
# Begin Custom Macros
|
||||
OutDir=.\.\Release
|
||||
# End Custom Macros
|
||||
|
||||
!IF "$(RECURSE)" == "0"
|
||||
|
||||
ALL : "$(OUTDIR)\des.dll"
|
||||
|
||||
!ELSE
|
||||
|
||||
ALL : "roken - Win32 Release" "$(OUTDIR)\des.dll"
|
||||
|
||||
!ENDIF
|
||||
|
||||
!IF "$(RECURSE)" == "1"
|
||||
CLEAN :"roken - Win32 ReleaseCLEAN"
|
||||
!ELSE
|
||||
CLEAN :
|
||||
!ENDIF
|
||||
-@erase "$(INTDIR)\cbc3_enc.obj"
|
||||
-@erase "$(INTDIR)\cbc_cksm.obj"
|
||||
-@erase "$(INTDIR)\cbc_enc.obj"
|
||||
-@erase "$(INTDIR)\cfb64ede.obj"
|
||||
-@erase "$(INTDIR)\cfb64enc.obj"
|
||||
-@erase "$(INTDIR)\cfb_enc.obj"
|
||||
-@erase "$(INTDIR)\des_enc.obj"
|
||||
-@erase "$(INTDIR)\dllmain.obj"
|
||||
-@erase "$(INTDIR)\ecb3_enc.obj"
|
||||
-@erase "$(INTDIR)\ecb_enc.obj"
|
||||
-@erase "$(INTDIR)\ede_enc.obj"
|
||||
-@erase "$(INTDIR)\enc_read.obj"
|
||||
-@erase "$(INTDIR)\enc_writ.obj"
|
||||
-@erase "$(INTDIR)\fcrypt.obj"
|
||||
-@erase "$(INTDIR)\key_par.obj"
|
||||
-@erase "$(INTDIR)\ncbc_enc.obj"
|
||||
-@erase "$(INTDIR)\ofb64ede.obj"
|
||||
-@erase "$(INTDIR)\ofb64enc.obj"
|
||||
-@erase "$(INTDIR)\ofb_enc.obj"
|
||||
-@erase "$(INTDIR)\passwd_dialog.res"
|
||||
-@erase "$(INTDIR)\passwd_dlg.obj"
|
||||
-@erase "$(INTDIR)\pcbc_enc.obj"
|
||||
-@erase "$(INTDIR)\qud_cksm.obj"
|
||||
-@erase "$(INTDIR)\read_pwd.obj"
|
||||
-@erase "$(INTDIR)\rnd_keys.obj"
|
||||
-@erase "$(INTDIR)\rpc_enc.obj"
|
||||
-@erase "$(INTDIR)\set_key.obj"
|
||||
-@erase "$(INTDIR)\str2key.obj"
|
||||
-@erase "$(INTDIR)\supp.obj"
|
||||
-@erase "$(INTDIR)\vc50.idb"
|
||||
-@erase "$(OUTDIR)\des.dll"
|
||||
-@erase "$(OUTDIR)\des.exp"
|
||||
-@erase "$(OUTDIR)\des.lib"
|
||||
|
||||
"$(OUTDIR)" :
|
||||
if not exist "$(OUTDIR)/$(NULL)" mkdir "$(OUTDIR)"
|
||||
|
||||
CPP=cl.exe
|
||||
CPP_PROJ=/nologo /MT /W3 /GX /O2 /I "..\roken" /I "." /I "..\..\include" /I\
|
||||
"..\..\include\win32" /D "WIN32" /D "NDEBUG" /D "_WINDOWS" /D "HAVE_CONFIG_H"\
|
||||
/Fp"$(INTDIR)\des.pch" /YX /Fo"$(INTDIR)\\" /Fd"$(INTDIR)\\" /FD /c
|
||||
CPP_OBJS=.\Release/
|
||||
CPP_SBRS=.
|
||||
|
||||
.c{$(CPP_OBJS)}.obj::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cpp{$(CPP_OBJS)}.obj::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cxx{$(CPP_OBJS)}.obj::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.c{$(CPP_SBRS)}.sbr::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cpp{$(CPP_SBRS)}.sbr::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cxx{$(CPP_SBRS)}.sbr::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
MTL=midl.exe
|
||||
MTL_PROJ=/nologo /D "NDEBUG" /mktyplib203 /win32
|
||||
RSC=rc.exe
|
||||
RSC_PROJ=/l 0x409 /fo"$(INTDIR)\passwd_dialog.res" /d "NDEBUG"
|
||||
BSC32=bscmake.exe
|
||||
BSC32_FLAGS=/nologo /o"$(OUTDIR)\des.bsc"
|
||||
BSC32_SBRS= \
|
||||
|
||||
LINK32=link.exe
|
||||
LINK32_FLAGS=..\roken\Release\roken.lib kernel32.lib user32.lib gdi32.lib\
|
||||
winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib\
|
||||
uuid.lib /nologo /subsystem:windows /dll /incremental:no\
|
||||
/pdb:"$(OUTDIR)\des.pdb" /machine:I386 /def:".\des.def"\
|
||||
/out:"$(OUTDIR)\des.dll" /implib:"$(OUTDIR)\des.lib"
|
||||
DEF_FILE= \
|
||||
".\des.def"
|
||||
LINK32_OBJS= \
|
||||
"$(INTDIR)\cbc3_enc.obj" \
|
||||
"$(INTDIR)\cbc_cksm.obj" \
|
||||
"$(INTDIR)\cbc_enc.obj" \
|
||||
"$(INTDIR)\cfb64ede.obj" \
|
||||
"$(INTDIR)\cfb64enc.obj" \
|
||||
"$(INTDIR)\cfb_enc.obj" \
|
||||
"$(INTDIR)\des_enc.obj" \
|
||||
"$(INTDIR)\dllmain.obj" \
|
||||
"$(INTDIR)\ecb3_enc.obj" \
|
||||
"$(INTDIR)\ecb_enc.obj" \
|
||||
"$(INTDIR)\ede_enc.obj" \
|
||||
"$(INTDIR)\enc_read.obj" \
|
||||
"$(INTDIR)\enc_writ.obj" \
|
||||
"$(INTDIR)\fcrypt.obj" \
|
||||
"$(INTDIR)\key_par.obj" \
|
||||
"$(INTDIR)\ncbc_enc.obj" \
|
||||
"$(INTDIR)\ofb64ede.obj" \
|
||||
"$(INTDIR)\ofb64enc.obj" \
|
||||
"$(INTDIR)\ofb_enc.obj" \
|
||||
"$(INTDIR)\passwd_dialog.res" \
|
||||
"$(INTDIR)\passwd_dlg.obj" \
|
||||
"$(INTDIR)\pcbc_enc.obj" \
|
||||
"$(INTDIR)\qud_cksm.obj" \
|
||||
"$(INTDIR)\read_pwd.obj" \
|
||||
"$(INTDIR)\rnd_keys.obj" \
|
||||
"$(INTDIR)\rpc_enc.obj" \
|
||||
"$(INTDIR)\set_key.obj" \
|
||||
"$(INTDIR)\str2key.obj" \
|
||||
"$(INTDIR)\supp.obj" \
|
||||
"..\roken\Release\roken.lib"
|
||||
|
||||
"$(OUTDIR)\des.dll" : "$(OUTDIR)" $(DEF_FILE) $(LINK32_OBJS)
|
||||
$(LINK32) @<<
|
||||
$(LINK32_FLAGS) $(LINK32_OBJS)
|
||||
<<
|
||||
|
||||
!ELSEIF "$(CFG)" == "des - Win32 Debug"
|
||||
|
||||
OUTDIR=.\Debug
|
||||
INTDIR=.\Debug
|
||||
# Begin Custom Macros
|
||||
OutDir=.\.\Debug
|
||||
# End Custom Macros
|
||||
|
||||
!IF "$(RECURSE)" == "0"
|
||||
|
||||
ALL : "$(OUTDIR)\des.dll"
|
||||
|
||||
!ELSE
|
||||
|
||||
ALL : "roken - Win32 Debug" "$(OUTDIR)\des.dll"
|
||||
|
||||
!ENDIF
|
||||
|
||||
!IF "$(RECURSE)" == "1"
|
||||
CLEAN :"roken - Win32 DebugCLEAN"
|
||||
!ELSE
|
||||
CLEAN :
|
||||
!ENDIF
|
||||
-@erase "$(INTDIR)\cbc3_enc.obj"
|
||||
-@erase "$(INTDIR)\cbc_cksm.obj"
|
||||
-@erase "$(INTDIR)\cbc_enc.obj"
|
||||
-@erase "$(INTDIR)\cfb64ede.obj"
|
||||
-@erase "$(INTDIR)\cfb64enc.obj"
|
||||
-@erase "$(INTDIR)\cfb_enc.obj"
|
||||
-@erase "$(INTDIR)\des_enc.obj"
|
||||
-@erase "$(INTDIR)\dllmain.obj"
|
||||
-@erase "$(INTDIR)\ecb3_enc.obj"
|
||||
-@erase "$(INTDIR)\ecb_enc.obj"
|
||||
-@erase "$(INTDIR)\ede_enc.obj"
|
||||
-@erase "$(INTDIR)\enc_read.obj"
|
||||
-@erase "$(INTDIR)\enc_writ.obj"
|
||||
-@erase "$(INTDIR)\fcrypt.obj"
|
||||
-@erase "$(INTDIR)\key_par.obj"
|
||||
-@erase "$(INTDIR)\ncbc_enc.obj"
|
||||
-@erase "$(INTDIR)\ofb64ede.obj"
|
||||
-@erase "$(INTDIR)\ofb64enc.obj"
|
||||
-@erase "$(INTDIR)\ofb_enc.obj"
|
||||
-@erase "$(INTDIR)\passwd_dialog.res"
|
||||
-@erase "$(INTDIR)\passwd_dlg.obj"
|
||||
-@erase "$(INTDIR)\pcbc_enc.obj"
|
||||
-@erase "$(INTDIR)\qud_cksm.obj"
|
||||
-@erase "$(INTDIR)\read_pwd.obj"
|
||||
-@erase "$(INTDIR)\rnd_keys.obj"
|
||||
-@erase "$(INTDIR)\rpc_enc.obj"
|
||||
-@erase "$(INTDIR)\set_key.obj"
|
||||
-@erase "$(INTDIR)\str2key.obj"
|
||||
-@erase "$(INTDIR)\supp.obj"
|
||||
-@erase "$(INTDIR)\vc50.idb"
|
||||
-@erase "$(INTDIR)\vc50.pdb"
|
||||
-@erase "$(OUTDIR)\des.dll"
|
||||
-@erase "$(OUTDIR)\des.exp"
|
||||
-@erase "$(OUTDIR)\des.ilk"
|
||||
-@erase "$(OUTDIR)\des.lib"
|
||||
-@erase "$(OUTDIR)\des.pdb"
|
||||
|
||||
"$(OUTDIR)" :
|
||||
if not exist "$(OUTDIR)/$(NULL)" mkdir "$(OUTDIR)"
|
||||
|
||||
CPP=cl.exe
|
||||
CPP_PROJ=/nologo /MDd /W3 /Gm /GX /Zi /Od /I "..\roken" /I "." /I\
|
||||
"..\..\include" /I "..\..\include\win32" /D "WIN32" /D "_DEBUG" /D "_WINDOWS"\
|
||||
/D "HAVE_CONFIG_H" /Fp"$(INTDIR)\des.pch" /YX /Fo"$(INTDIR)\\" /Fd"$(INTDIR)\\"\
|
||||
/FD /c
|
||||
CPP_OBJS=.\Debug/
|
||||
CPP_SBRS=.
|
||||
|
||||
.c{$(CPP_OBJS)}.obj::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cpp{$(CPP_OBJS)}.obj::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cxx{$(CPP_OBJS)}.obj::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.c{$(CPP_SBRS)}.sbr::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cpp{$(CPP_SBRS)}.sbr::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
.cxx{$(CPP_SBRS)}.sbr::
|
||||
$(CPP) @<<
|
||||
$(CPP_PROJ) $<
|
||||
<<
|
||||
|
||||
MTL=midl.exe
|
||||
MTL_PROJ=/nologo /D "_DEBUG" /mktyplib203 /win32
|
||||
RSC=rc.exe
|
||||
RSC_PROJ=/l 0x409 /fo"$(INTDIR)\passwd_dialog.res" /d "_DEBUG"
|
||||
BSC32=bscmake.exe
|
||||
BSC32_FLAGS=/nologo /o"$(OUTDIR)\des.bsc"
|
||||
BSC32_SBRS= \
|
||||
|
||||
LINK32=link.exe
|
||||
LINK32_FLAGS=..\roken\Debug\roken.lib kernel32.lib user32.lib gdi32.lib\
|
||||
winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib\
|
||||
uuid.lib /nologo /subsystem:windows /dll /incremental:yes\
|
||||
/pdb:"$(OUTDIR)\des.pdb" /debug /machine:I386 /def:".\des.def"\
|
||||
/out:"$(OUTDIR)\des.dll" /implib:"$(OUTDIR)\des.lib"
|
||||
DEF_FILE= \
|
||||
".\des.def"
|
||||
LINK32_OBJS= \
|
||||
"$(INTDIR)\cbc3_enc.obj" \
|
||||
"$(INTDIR)\cbc_cksm.obj" \
|
||||
"$(INTDIR)\cbc_enc.obj" \
|
||||
"$(INTDIR)\cfb64ede.obj" \
|
||||
"$(INTDIR)\cfb64enc.obj" \
|
||||
"$(INTDIR)\cfb_enc.obj" \
|
||||
"$(INTDIR)\des_enc.obj" \
|
||||
"$(INTDIR)\dllmain.obj" \
|
||||
"$(INTDIR)\ecb3_enc.obj" \
|
||||
"$(INTDIR)\ecb_enc.obj" \
|
||||
"$(INTDIR)\ede_enc.obj" \
|
||||
"$(INTDIR)\enc_read.obj" \
|
||||
"$(INTDIR)\enc_writ.obj" \
|
||||
"$(INTDIR)\fcrypt.obj" \
|
||||
"$(INTDIR)\key_par.obj" \
|
||||
"$(INTDIR)\ncbc_enc.obj" \
|
||||
"$(INTDIR)\ofb64ede.obj" \
|
||||
"$(INTDIR)\ofb64enc.obj" \
|
||||
"$(INTDIR)\ofb_enc.obj" \
|
||||
"$(INTDIR)\passwd_dialog.res" \
|
||||
"$(INTDIR)\passwd_dlg.obj" \
|
||||
"$(INTDIR)\pcbc_enc.obj" \
|
||||
"$(INTDIR)\qud_cksm.obj" \
|
||||
"$(INTDIR)\read_pwd.obj" \
|
||||
"$(INTDIR)\rnd_keys.obj" \
|
||||
"$(INTDIR)\rpc_enc.obj" \
|
||||
"$(INTDIR)\set_key.obj" \
|
||||
"$(INTDIR)\str2key.obj" \
|
||||
"$(INTDIR)\supp.obj" \
|
||||
"..\roken\Debug\roken.lib"
|
||||
|
||||
"$(OUTDIR)\des.dll" : "$(OUTDIR)" $(DEF_FILE) $(LINK32_OBJS)
|
||||
$(LINK32) @<<
|
||||
$(LINK32_FLAGS) $(LINK32_OBJS)
|
||||
<<
|
||||
|
||||
!ENDIF
|
||||
|
||||
|
||||
!IF "$(CFG)" == "des - Win32 Release" || "$(CFG)" == "des - Win32 Debug"
|
||||
SOURCE=.\cbc3_enc.c
|
||||
DEP_CPP_CBC3_=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\cbc3_enc.obj" : $(SOURCE) $(DEP_CPP_CBC3_) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\cbc_cksm.c
|
||||
DEP_CPP_CBC_C=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\cbc_cksm.obj" : $(SOURCE) $(DEP_CPP_CBC_C) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\cbc_enc.c
|
||||
DEP_CPP_CBC_E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\cbc_enc.obj" : $(SOURCE) $(DEP_CPP_CBC_E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\cfb64ede.c
|
||||
DEP_CPP_CFB64=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\cfb64ede.obj" : $(SOURCE) $(DEP_CPP_CFB64) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\cfb64enc.c
|
||||
DEP_CPP_CFB64E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\cfb64enc.obj" : $(SOURCE) $(DEP_CPP_CFB64E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\cfb_enc.c
|
||||
DEP_CPP_CFB_E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\cfb_enc.obj" : $(SOURCE) $(DEP_CPP_CFB_E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\des_enc.c
|
||||
DEP_CPP_DES_E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\des_enc.obj" : $(SOURCE) $(DEP_CPP_DES_E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\dllmain.c
|
||||
DEP_CPP_DLLMA=\
|
||||
"..\..\include\win32\config.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\dllmain.obj" : $(SOURCE) $(DEP_CPP_DLLMA) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\ecb3_enc.c
|
||||
DEP_CPP_ECB3_=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\ecb3_enc.obj" : $(SOURCE) $(DEP_CPP_ECB3_) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\ecb_enc.c
|
||||
DEP_CPP_ECB_E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
".\spr.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\ecb_enc.obj" : $(SOURCE) $(DEP_CPP_ECB_E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\ede_enc.c
|
||||
DEP_CPP_EDE_E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\ede_enc.obj" : $(SOURCE) $(DEP_CPP_EDE_E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\enc_read.c
|
||||
DEP_CPP_ENC_R=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\enc_read.obj" : $(SOURCE) $(DEP_CPP_ENC_R) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\enc_writ.c
|
||||
DEP_CPP_ENC_W=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\enc_writ.obj" : $(SOURCE) $(DEP_CPP_ENC_W) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\fcrypt.c
|
||||
DEP_CPP_FCRYP=\
|
||||
"..\..\include\win32\config.h"\
|
||||
"..\..\include\win32\ktypes.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
".\md5.h"\
|
||||
{$(INCLUDE)}"sys\types.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\fcrypt.obj" : $(SOURCE) $(DEP_CPP_FCRYP) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\key_par.c
|
||||
DEP_CPP_KEY_P=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\key_par.obj" : $(SOURCE) $(DEP_CPP_KEY_P) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\ncbc_enc.c
|
||||
DEP_CPP_NCBC_=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\ncbc_enc.obj" : $(SOURCE) $(DEP_CPP_NCBC_) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\ofb64ede.c
|
||||
DEP_CPP_OFB64=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\ofb64ede.obj" : $(SOURCE) $(DEP_CPP_OFB64) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\ofb64enc.c
|
||||
DEP_CPP_OFB64E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\ofb64enc.obj" : $(SOURCE) $(DEP_CPP_OFB64E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\ofb_enc.c
|
||||
DEP_CPP_OFB_E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\ofb_enc.obj" : $(SOURCE) $(DEP_CPP_OFB_E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\passwd_dlg.c
|
||||
DEP_CPP_PASSW=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\passwd_dlg.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\passwd_dlg.obj" : $(SOURCE) $(DEP_CPP_PASSW) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\pcbc_enc.c
|
||||
DEP_CPP_PCBC_=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\pcbc_enc.obj" : $(SOURCE) $(DEP_CPP_PCBC_) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\qud_cksm.c
|
||||
DEP_CPP_QUD_C=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\qud_cksm.obj" : $(SOURCE) $(DEP_CPP_QUD_C) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\read_pwd.c
|
||||
DEP_CPP_READ_=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\read_pwd.obj" : $(SOURCE) $(DEP_CPP_READ_) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\rnd_keys.c
|
||||
DEP_CPP_RND_K=\
|
||||
"..\..\include\win32\config.h"\
|
||||
"..\..\include\win32\ktypes.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
{$(INCLUDE)}"sys\types.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\rnd_keys.obj" : $(SOURCE) $(DEP_CPP_RND_K) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\rpc_enc.c
|
||||
DEP_CPP_RPC_E=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
".\des_ver.h"\
|
||||
".\rpc_des.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\rpc_enc.obj" : $(SOURCE) $(DEP_CPP_RPC_E) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\set_key.c
|
||||
DEP_CPP_SET_K=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
".\podd.h"\
|
||||
".\sk.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\set_key.obj" : $(SOURCE) $(DEP_CPP_SET_K) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\str2key.c
|
||||
DEP_CPP_STR2K=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\str2key.obj" : $(SOURCE) $(DEP_CPP_STR2K) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\supp.c
|
||||
DEP_CPP_SUPP_=\
|
||||
"..\..\include\win32\config.h"\
|
||||
".\des.h"\
|
||||
".\des_locl.h"\
|
||||
|
||||
|
||||
"$(INTDIR)\supp.obj" : $(SOURCE) $(DEP_CPP_SUPP_) "$(INTDIR)"
|
||||
|
||||
|
||||
SOURCE=.\passwd_dialog.rc
|
||||
|
||||
"$(INTDIR)\passwd_dialog.res" : $(SOURCE) "$(INTDIR)"
|
||||
$(RSC) $(RSC_PROJ) $(SOURCE)
|
||||
|
||||
|
||||
!IF "$(CFG)" == "des - Win32 Release"
|
||||
|
||||
"roken - Win32 Release" :
|
||||
cd "\tmp\wirus-krb\krb4-pre-0.9.9\lib\roken"
|
||||
$(MAKE) /$(MAKEFLAGS) /F ".\roken.mak" CFG="roken - Win32 Release"
|
||||
cd "..\des"
|
||||
|
||||
"roken - Win32 ReleaseCLEAN" :
|
||||
cd "\tmp\wirus-krb\krb4-pre-0.9.9\lib\roken"
|
||||
$(MAKE) /$(MAKEFLAGS) CLEAN /F ".\roken.mak" CFG="roken - Win32 Release"\
|
||||
RECURSE=1
|
||||
cd "..\des"
|
||||
|
||||
!ELSEIF "$(CFG)" == "des - Win32 Debug"
|
||||
|
||||
"roken - Win32 Debug" :
|
||||
cd "\tmp\wirus-krb\krb4-pre-0.9.9\lib\roken"
|
||||
$(MAKE) /$(MAKEFLAGS) /F ".\roken.mak" CFG="roken - Win32 Debug"
|
||||
cd "..\des"
|
||||
|
||||
"roken - Win32 DebugCLEAN" :
|
||||
cd "\tmp\wirus-krb\krb4-pre-0.9.9\lib\roken"
|
||||
$(MAKE) /$(MAKEFLAGS) CLEAN /F ".\roken.mak" CFG="roken - Win32 Debug"\
|
||||
RECURSE=1
|
||||
cd "..\des"
|
||||
|
||||
!ENDIF
|
||||
|
||||
|
||||
!ENDIF
|
||||
|
||||
186
lib/des/des.man
186
lib/des/des.man
@@ -1,186 +0,0 @@
|
||||
.TH DES 1
|
||||
.SH NAME
|
||||
des - encrypt or decrypt data using Data Encryption Standard
|
||||
.SH SYNOPSIS
|
||||
.B des
|
||||
(
|
||||
.B \-e
|
||||
|
|
||||
.B \-E
|
||||
) | (
|
||||
.B \-d
|
||||
|
|
||||
.B \-D
|
||||
) | (
|
||||
.B \-\fR[\fPcC\fR][\fPckname\fR]\fP
|
||||
) |
|
||||
[
|
||||
.B \-b3hfs
|
||||
] [
|
||||
.B \-k
|
||||
.I key
|
||||
]
|
||||
] [
|
||||
.B \-u\fR[\fIuuname\fR]
|
||||
[
|
||||
.I input-file
|
||||
[
|
||||
.I output-file
|
||||
] ]
|
||||
.SH DESCRIPTION
|
||||
.B des
|
||||
encrypts and decrypts data using the
|
||||
Data Encryption Standard algorithm.
|
||||
One of
|
||||
.B \-e, \-E
|
||||
(for encrypt) or
|
||||
.B \-d, \-D
|
||||
(for decrypt) must be specified.
|
||||
It is also possible to use
|
||||
.B \-c
|
||||
or
|
||||
.B \-C
|
||||
in conjunction or instead of the a encrypt/decrypt option to generate
|
||||
a 16 character hexadecimal checksum, generated via the
|
||||
.I des_cbc_cksum.
|
||||
.LP
|
||||
Two standard encryption modes are supported by the
|
||||
.B des
|
||||
program, Cipher Block Chaining (the default) and Electronic Code Book
|
||||
(specified with
|
||||
.B \-b
|
||||
).
|
||||
.LP
|
||||
The key used for the DES
|
||||
algorithm is obtained by prompting the user unless the
|
||||
.B `\-k
|
||||
.I key'
|
||||
option is given.
|
||||
If the key is an argument to the
|
||||
.B des
|
||||
command, it is potentially visible to users executing
|
||||
.BR ps (1)
|
||||
or a derivative. To minimise this possibility,
|
||||
.B des
|
||||
takes care to destroy the key argument immediately upon entry.
|
||||
If your shell keeps a history file be careful to make sure it is not
|
||||
world readable.
|
||||
.LP
|
||||
Since this program attempts to maintain compatability with sunOS's
|
||||
des(1) command, there are 2 different methods used to convert the user
|
||||
supplied key to a des key.
|
||||
Whenever and one or more of
|
||||
.B \-E, \-D, \-C
|
||||
or
|
||||
.B \-3
|
||||
options are used, the key conversion procedure will not be compatible
|
||||
with the sunOS des(1) version but will use all the user supplied
|
||||
character to generate the des key.
|
||||
.B des
|
||||
command reads from standard input unless
|
||||
.I input-file
|
||||
is specified and writes to standard output unless
|
||||
.I output-file
|
||||
is given.
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
.B \-b
|
||||
Select ECB
|
||||
(eight bytes at a time) encryption mode.
|
||||
.TP
|
||||
.B \-3
|
||||
Encrypt using triple encryption.
|
||||
By default triple cbc encryption is used but if the
|
||||
.B \-b
|
||||
option is used then triple ecb encryption is performed.
|
||||
If the key is less than 8 characters long, the flag has no effect.
|
||||
.TP
|
||||
.B \-e
|
||||
Encrypt data using an 8 byte key in a manner compatible with sunOS
|
||||
des(1).
|
||||
.TP
|
||||
.B \-E
|
||||
Encrypt data using a key of nearly unlimited length (1024 bytes).
|
||||
This will product a more secure encryption.
|
||||
.TP
|
||||
.B \-d
|
||||
Decrypt data that was encrypted with the \-e option.
|
||||
.TP
|
||||
.B \-D
|
||||
Decrypt data that was encrypted with the \-E option.
|
||||
.TP
|
||||
.B \-c
|
||||
Generate a 16 character hexadecimal cbc checksum and output this to
|
||||
stderr.
|
||||
If a filename was specified after the
|
||||
.B \-c
|
||||
option, the checksum is output to that file.
|
||||
The checksum is generated using a key generated in a sunOS compatible
|
||||
manner.
|
||||
.TP
|
||||
.B \-C
|
||||
A cbc checksum is generated in the same manner as described for the
|
||||
.B \-c
|
||||
option but the DES key is generated in the same manner as used for the
|
||||
.B \-E
|
||||
and
|
||||
.B \-D
|
||||
options
|
||||
.TP
|
||||
.B \-f
|
||||
Does nothing - allowed for compatibility with sunOS des(1) command.
|
||||
.TP
|
||||
.B \-s
|
||||
Does nothing - allowed for compatibility with sunOS des(1) command.
|
||||
.TP
|
||||
.B "\-k \fIkey\fP"
|
||||
Use the encryption
|
||||
.I key
|
||||
specified.
|
||||
.TP
|
||||
.B "\-h"
|
||||
The
|
||||
.I key
|
||||
is assumed to be a 16 character hexadecimal number.
|
||||
If the
|
||||
.B "\-3"
|
||||
option is used the key is assumed to be a 32 character hexadecimal
|
||||
number.
|
||||
.TP
|
||||
.B \-u
|
||||
This flag is used to read and write uuencoded files. If decrypting,
|
||||
the input file is assumed to contain uuencoded, DES encrypted data.
|
||||
If encrypting, the characters following the -u are used as the name of
|
||||
the uuencoded file to embed in the begin line of the uuencoded
|
||||
output. If there is no name specified after the -u, the name text.des
|
||||
will be embedded in the header.
|
||||
.SH SEE ALSO
|
||||
.B ps (1)
|
||||
.B des_crypt(3)
|
||||
.SH BUGS
|
||||
.LP
|
||||
The problem with using the
|
||||
.B -e
|
||||
option is the short key length.
|
||||
It would be better to use a real 56-bit key rather than an
|
||||
ASCII-based 56-bit pattern. Knowing that the key was derived from ASCII
|
||||
radically reduces the time necessary for a brute-force cryptographic attack.
|
||||
My attempt to remove this problem is to add an alternative text-key to
|
||||
DES-key function. This alternative function (accessed via
|
||||
.B -E, -D, -S
|
||||
and
|
||||
.B -3
|
||||
)
|
||||
uses DES to help generate the key.
|
||||
.LP
|
||||
Be carefully when using the -u option. Doing des -ud <filename> will
|
||||
not decrypt filename (the -u option will gobble the d option).
|
||||
.LP
|
||||
The VMS operating system operates in a world where files are always a
|
||||
multiple of 512 bytes. This causes problems when encrypted data is
|
||||
send from unix to VMS since a 88 byte file will suddenly be padded
|
||||
with 424 null bytes. To get around this problem, use the -u option
|
||||
to uuencode the data before it is send to the VMS system.
|
||||
.SH AUTHOR
|
||||
.LP
|
||||
Eric Young (eay@mincom.oz.au or eay@psych.psy.uq.oz.au)
|
||||
291
lib/des/des.org
291
lib/des/des.org
@@ -1,291 +0,0 @@
|
||||
/* crypto/des/des.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifndef HEADER_DES_H
|
||||
#define HEADER_DES_H
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
|
||||
/* If this is set to 'unsigned int' on a DEC Alpha, this gives about a
|
||||
* %20 speed up (longs are 8 bytes, int's are 4). */
|
||||
#ifndef DES_LONG
|
||||
#define DES_LONG unsigned long
|
||||
#endif
|
||||
|
||||
typedef unsigned char des_cblock[8];
|
||||
typedef struct des_ks_struct
|
||||
{
|
||||
union {
|
||||
des_cblock _;
|
||||
/* make sure things are correct size on machines with
|
||||
* 8 byte longs */
|
||||
DES_LONG pad[2];
|
||||
} ks;
|
||||
#undef _
|
||||
#define _ ks._
|
||||
} des_key_schedule[16];
|
||||
|
||||
#define DES_KEY_SZ (sizeof(des_cblock))
|
||||
#define DES_SCHEDULE_SZ (sizeof(des_key_schedule))
|
||||
|
||||
#define DES_ENCRYPT 1
|
||||
#define DES_DECRYPT 0
|
||||
|
||||
#define DES_CBC_MODE 0
|
||||
#define DES_PCBC_MODE 1
|
||||
|
||||
#define des_ecb2_encrypt(i,o,k1,k2,e) \
|
||||
des_ecb3_encrypt((i),(o),(k1),(k2),(k1),(e))
|
||||
|
||||
#define des_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \
|
||||
des_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e))
|
||||
|
||||
#define des_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \
|
||||
des_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e))
|
||||
|
||||
#define des_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \
|
||||
des_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n))
|
||||
|
||||
#define C_Block des_cblock
|
||||
#define Key_schedule des_key_schedule
|
||||
#ifdef KERBEROS
|
||||
#define ENCRYPT DES_ENCRYPT
|
||||
#define DECRYPT DES_DECRYPT
|
||||
#endif
|
||||
#define KEY_SZ DES_KEY_SZ
|
||||
#define string_to_key des_string_to_key
|
||||
#define read_pw_string des_read_pw_string
|
||||
#define random_key des_random_key
|
||||
#define pcbc_encrypt des_pcbc_encrypt
|
||||
#define set_key des_set_key
|
||||
#define key_sched des_key_sched
|
||||
#define ecb_encrypt des_ecb_encrypt
|
||||
#define cbc_encrypt des_cbc_encrypt
|
||||
#define ncbc_encrypt des_ncbc_encrypt
|
||||
#define xcbc_encrypt des_xcbc_encrypt
|
||||
#define cbc_cksum des_cbc_cksum
|
||||
#define quad_cksum des_quad_cksum
|
||||
|
||||
/* For compatibility with the MIT lib - eay 20/05/92 */
|
||||
typedef des_key_schedule bit_64;
|
||||
#define des_fixup_key_parity des_set_odd_parity
|
||||
#define des_check_key_parity check_parity
|
||||
|
||||
extern int des_check_key; /* defaults to false */
|
||||
extern int des_rw_mode; /* defaults to DES_PCBC_MODE */
|
||||
|
||||
/* The next line is used to disable full ANSI prototypes, if your
|
||||
* compiler has problems with the prototypes, make sure this line always
|
||||
* evaluates to true :-) */
|
||||
#if defined(MSDOS) || defined(__STDC__)
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
#ifndef NOPROTO
|
||||
char *des_options(void);
|
||||
void des_ecb3_encrypt(des_cblock *input,des_cblock *output,
|
||||
des_key_schedule ks1,des_key_schedule ks2,
|
||||
des_key_schedule ks3, int enc);
|
||||
DES_LONG des_cbc_cksum(des_cblock *input,des_cblock *output,
|
||||
long length,des_key_schedule schedule,des_cblock *ivec);
|
||||
void des_cbc_encrypt(des_cblock *input,des_cblock *output,long length,
|
||||
des_key_schedule schedule,des_cblock *ivec,int enc);
|
||||
void des_ncbc_encrypt(des_cblock *input,des_cblock *output,long length,
|
||||
des_key_schedule schedule,des_cblock *ivec,int enc);
|
||||
void des_xcbc_encrypt(des_cblock *input,des_cblock *output,long length,
|
||||
des_key_schedule schedule,des_cblock *ivec,
|
||||
des_cblock *inw,des_cblock *outw,int enc);
|
||||
void des_3cbc_encrypt(des_cblock *input,des_cblock *output,long length,
|
||||
des_key_schedule sk1,des_key_schedule sk2,
|
||||
des_cblock *ivec1,des_cblock *ivec2,int enc);
|
||||
void des_cfb_encrypt(unsigned char *in,unsigned char *out,int numbits,
|
||||
long length,des_key_schedule schedule,des_cblock *ivec,int enc);
|
||||
void des_ecb_encrypt(des_cblock *input,des_cblock *output,
|
||||
des_key_schedule ks,int enc);
|
||||
void des_encrypt(DES_LONG *data,des_key_schedule ks, int enc);
|
||||
void des_encrypt2(DES_LONG *data,des_key_schedule ks, int enc);
|
||||
void des_encrypt3(DES_LONG *data, des_key_schedule ks1,
|
||||
des_key_schedule ks2, des_key_schedule ks3);
|
||||
void des_decrypt3(DES_LONG *data, des_key_schedule ks1,
|
||||
des_key_schedule ks2, des_key_schedule ks3);
|
||||
void des_ede3_cbc_encrypt(des_cblock *input, des_cblock *output,
|
||||
long length, des_key_schedule ks1, des_key_schedule ks2,
|
||||
des_key_schedule ks3, des_cblock *ivec, int enc);
|
||||
void des_ede3_cfb64_encrypt(unsigned char *in, unsigned char *out,
|
||||
long length, des_key_schedule ks1, des_key_schedule ks2,
|
||||
des_key_schedule ks3, des_cblock *ivec, int *num, int encrypt);
|
||||
void des_ede3_ofb64_encrypt(unsigned char *in, unsigned char *out,
|
||||
long length, des_key_schedule ks1, des_key_schedule ks2,
|
||||
des_key_schedule ks3, des_cblock *ivec, int *num);
|
||||
|
||||
int des_enc_read(int fd,char *buf,int len,des_key_schedule sched,
|
||||
des_cblock *iv);
|
||||
int des_enc_write(int fd,char *buf,int len,des_key_schedule sched,
|
||||
des_cblock *iv);
|
||||
char *des_fcrypt(const char *buf,const char *salt, char *ret);
|
||||
#ifdef PERL5
|
||||
char *des_crypt(const char *buf,const char *salt);
|
||||
#else
|
||||
/* some stupid compilers complain because I have declared char instead
|
||||
* of const char */
|
||||
#ifdef HEADER_DES_LOCL_H
|
||||
char *crypt(const char *buf,const char *salt);
|
||||
#else
|
||||
char *crypt();
|
||||
#endif
|
||||
#endif
|
||||
void des_ofb_encrypt(unsigned char *in,unsigned char *out,
|
||||
int numbits,long length,des_key_schedule schedule,des_cblock *ivec);
|
||||
void des_pcbc_encrypt(des_cblock *input,des_cblock *output,long length,
|
||||
des_key_schedule schedule,des_cblock *ivec,int enc);
|
||||
DES_LONG des_quad_cksum(des_cblock *input,des_cblock *output,
|
||||
long length,int out_count,des_cblock *seed);
|
||||
void des_random_seed(des_cblock key);
|
||||
void des_random_key(des_cblock ret);
|
||||
int des_read_password(des_cblock *key,char *prompt,int verify);
|
||||
int des_read_2passwords(des_cblock *key1,des_cblock *key2,
|
||||
char *prompt,int verify);
|
||||
int des_read_pw_string(char *buf,int length,char *prompt,int verify);
|
||||
void des_set_odd_parity(des_cblock *key);
|
||||
int des_is_weak_key(des_cblock *key);
|
||||
int des_set_key(des_cblock *key,des_key_schedule schedule);
|
||||
int des_key_sched(des_cblock *key,des_key_schedule schedule);
|
||||
void des_string_to_key(char *str,des_cblock *key);
|
||||
void des_string_to_2keys(char *str,des_cblock *key1,des_cblock *key2);
|
||||
void des_cfb64_encrypt(unsigned char *in, unsigned char *out, long length,
|
||||
des_key_schedule schedule, des_cblock *ivec, int *num, int enc);
|
||||
void des_ofb64_encrypt(unsigned char *in, unsigned char *out, long length,
|
||||
des_key_schedule schedule, des_cblock *ivec, int *num);
|
||||
|
||||
/* Extra functions from Mark Murray <mark@grondar.za> */
|
||||
void des_cblock_print_file(des_cblock *cb, FILE *fp);
|
||||
/* The following functions are not in the normal unix build or the
|
||||
* SSLeay build. When using the SSLeay build, use RAND_seed()
|
||||
* and RAND_bytes() instead. */
|
||||
int des_new_random_key(des_cblock *key);
|
||||
void des_init_random_number_generator(des_cblock *key);
|
||||
void des_set_random_generator_seed(des_cblock *key);
|
||||
void des_set_sequence_number(des_cblock new_sequence_number);
|
||||
void des_generate_random_block(des_cblock *block);
|
||||
|
||||
#else
|
||||
|
||||
char *des_options();
|
||||
void des_ecb3_encrypt();
|
||||
DES_LONG des_cbc_cksum();
|
||||
void des_cbc_encrypt();
|
||||
void des_ncbc_encrypt();
|
||||
void des_xcbc_encrypt();
|
||||
void des_3cbc_encrypt();
|
||||
void des_cfb_encrypt();
|
||||
void des_ede3_cfb64_encrypt();
|
||||
void des_ede3_ofb64_encrypt();
|
||||
void des_ecb_encrypt();
|
||||
void des_encrypt();
|
||||
void des_encrypt2();
|
||||
void des_encrypt3();
|
||||
void des_decrypt3();
|
||||
void des_ede3_cbc_encrypt();
|
||||
int des_enc_read();
|
||||
int des_enc_write();
|
||||
char *des_fcrypt();
|
||||
#ifdef PERL5
|
||||
char *des_crypt();
|
||||
#else
|
||||
char *crypt();
|
||||
#endif
|
||||
void des_ofb_encrypt();
|
||||
void des_pcbc_encrypt();
|
||||
DES_LONG des_quad_cksum();
|
||||
void des_random_seed();
|
||||
void des_random_key();
|
||||
int des_read_password();
|
||||
int des_read_2passwords();
|
||||
int des_read_pw_string();
|
||||
void des_set_odd_parity();
|
||||
int des_is_weak_key();
|
||||
int des_set_key();
|
||||
int des_key_sched();
|
||||
void des_string_to_key();
|
||||
void des_string_to_2keys();
|
||||
void des_cfb64_encrypt();
|
||||
void des_ofb64_encrypt();
|
||||
|
||||
/* Extra functions from Mark Murray <mark@grondar.za> */
|
||||
void des_cblock_print_file();
|
||||
/* The following functions are not in the normal unix build or the
|
||||
* SSLeay build. When using the SSLeay build, use RAND_seed()
|
||||
* and RAND_bytes() instead. */
|
||||
#ifdef FreeBSD
|
||||
int des_new_random_key();
|
||||
void des_init_random_number_generator();
|
||||
void des_set_random_generator_seed();
|
||||
void des_set_sequence_number();
|
||||
void des_generate_random_block();
|
||||
#endif
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif
|
||||
552
lib/des/des.pl
552
lib/des/des.pl
@@ -1,552 +0,0 @@
|
||||
#!/usr/local/bin/perl
|
||||
# des.pl - eric young 22/11/1991 eay@mincom.oz.au or eay@psych.psy.uq.oz.au
|
||||
#
|
||||
# Copyright (C) 1993 Eric Young
|
||||
#
|
||||
# 11 April 1996 - patched to circumvent Perl 5 (through 5.002) problem
|
||||
# with sign-extension on right shift operations.
|
||||
# Ed Kubaitis - ejk@uiuc.edu
|
||||
#
|
||||
# eay - 92/08/31 - I think I have fixed all problems for 64bit
|
||||
# versions of perl but I could be wrong since I have not tested it yet :-).
|
||||
#
|
||||
# This is an implementation of DES in perl.
|
||||
# The two routines (des_set_key and des_ecb_encrypt)
|
||||
# take 8 byte objects as arguments.
|
||||
#
|
||||
# des_set_key takes an 8 byte string as a key and returns a key schedule
|
||||
# for use in calls to des_ecb_encrypt.
|
||||
# des_ecb_encrypt takes three arguments, the first is a key schedule
|
||||
# (make sure to pass it by reference with the *), the second is 1
|
||||
# to encrypt, 0 to decrypt. The third argument is an 8 byte object
|
||||
# to encrypt. The function returns an 8 byte object that has been
|
||||
# DES encrypted.
|
||||
#
|
||||
# example:
|
||||
# require 'des.pl'
|
||||
#
|
||||
# $key =pack("C8",0x12,0x23,0x45,0x67,0x89,0xab,0xcd,0xef);
|
||||
# @ks= &des_set_key($key);
|
||||
#
|
||||
# $outbytes= &des_ecb_encrypt(*ks,1,$data);
|
||||
# @enc =unpack("C8",$outbytes);
|
||||
#
|
||||
|
||||
package des;
|
||||
|
||||
eval("usr integer;") if (int($]) > 4);
|
||||
|
||||
# The following 8 arrays are used in des_set_key
|
||||
@skb0=(
|
||||
# for C bits (numbered as per FIPS 46) 1 2 3 4 5 6
|
||||
0x00000000,0x00000010,0x20000000,0x20000010,
|
||||
0x00010000,0x00010010,0x20010000,0x20010010,
|
||||
0x00000800,0x00000810,0x20000800,0x20000810,
|
||||
0x00010800,0x00010810,0x20010800,0x20010810,
|
||||
0x00000020,0x00000030,0x20000020,0x20000030,
|
||||
0x00010020,0x00010030,0x20010020,0x20010030,
|
||||
0x00000820,0x00000830,0x20000820,0x20000830,
|
||||
0x00010820,0x00010830,0x20010820,0x20010830,
|
||||
0x00080000,0x00080010,0x20080000,0x20080010,
|
||||
0x00090000,0x00090010,0x20090000,0x20090010,
|
||||
0x00080800,0x00080810,0x20080800,0x20080810,
|
||||
0x00090800,0x00090810,0x20090800,0x20090810,
|
||||
0x00080020,0x00080030,0x20080020,0x20080030,
|
||||
0x00090020,0x00090030,0x20090020,0x20090030,
|
||||
0x00080820,0x00080830,0x20080820,0x20080830,
|
||||
0x00090820,0x00090830,0x20090820,0x20090830,
|
||||
);
|
||||
@skb1=(
|
||||
# for C bits (numbered as per FIPS 46) 7 8 10 11 12 13
|
||||
0x00000000,0x02000000,0x00002000,0x02002000,
|
||||
0x00200000,0x02200000,0x00202000,0x02202000,
|
||||
0x00000004,0x02000004,0x00002004,0x02002004,
|
||||
0x00200004,0x02200004,0x00202004,0x02202004,
|
||||
0x00000400,0x02000400,0x00002400,0x02002400,
|
||||
0x00200400,0x02200400,0x00202400,0x02202400,
|
||||
0x00000404,0x02000404,0x00002404,0x02002404,
|
||||
0x00200404,0x02200404,0x00202404,0x02202404,
|
||||
0x10000000,0x12000000,0x10002000,0x12002000,
|
||||
0x10200000,0x12200000,0x10202000,0x12202000,
|
||||
0x10000004,0x12000004,0x10002004,0x12002004,
|
||||
0x10200004,0x12200004,0x10202004,0x12202004,
|
||||
0x10000400,0x12000400,0x10002400,0x12002400,
|
||||
0x10200400,0x12200400,0x10202400,0x12202400,
|
||||
0x10000404,0x12000404,0x10002404,0x12002404,
|
||||
0x10200404,0x12200404,0x10202404,0x12202404,
|
||||
);
|
||||
@skb2=(
|
||||
# for C bits (numbered as per FIPS 46) 14 15 16 17 19 20
|
||||
0x00000000,0x00000001,0x00040000,0x00040001,
|
||||
0x01000000,0x01000001,0x01040000,0x01040001,
|
||||
0x00000002,0x00000003,0x00040002,0x00040003,
|
||||
0x01000002,0x01000003,0x01040002,0x01040003,
|
||||
0x00000200,0x00000201,0x00040200,0x00040201,
|
||||
0x01000200,0x01000201,0x01040200,0x01040201,
|
||||
0x00000202,0x00000203,0x00040202,0x00040203,
|
||||
0x01000202,0x01000203,0x01040202,0x01040203,
|
||||
0x08000000,0x08000001,0x08040000,0x08040001,
|
||||
0x09000000,0x09000001,0x09040000,0x09040001,
|
||||
0x08000002,0x08000003,0x08040002,0x08040003,
|
||||
0x09000002,0x09000003,0x09040002,0x09040003,
|
||||
0x08000200,0x08000201,0x08040200,0x08040201,
|
||||
0x09000200,0x09000201,0x09040200,0x09040201,
|
||||
0x08000202,0x08000203,0x08040202,0x08040203,
|
||||
0x09000202,0x09000203,0x09040202,0x09040203,
|
||||
);
|
||||
@skb3=(
|
||||
# for C bits (numbered as per FIPS 46) 21 23 24 26 27 28
|
||||
0x00000000,0x00100000,0x00000100,0x00100100,
|
||||
0x00000008,0x00100008,0x00000108,0x00100108,
|
||||
0x00001000,0x00101000,0x00001100,0x00101100,
|
||||
0x00001008,0x00101008,0x00001108,0x00101108,
|
||||
0x04000000,0x04100000,0x04000100,0x04100100,
|
||||
0x04000008,0x04100008,0x04000108,0x04100108,
|
||||
0x04001000,0x04101000,0x04001100,0x04101100,
|
||||
0x04001008,0x04101008,0x04001108,0x04101108,
|
||||
0x00020000,0x00120000,0x00020100,0x00120100,
|
||||
0x00020008,0x00120008,0x00020108,0x00120108,
|
||||
0x00021000,0x00121000,0x00021100,0x00121100,
|
||||
0x00021008,0x00121008,0x00021108,0x00121108,
|
||||
0x04020000,0x04120000,0x04020100,0x04120100,
|
||||
0x04020008,0x04120008,0x04020108,0x04120108,
|
||||
0x04021000,0x04121000,0x04021100,0x04121100,
|
||||
0x04021008,0x04121008,0x04021108,0x04121108,
|
||||
);
|
||||
@skb4=(
|
||||
# for D bits (numbered as per FIPS 46) 1 2 3 4 5 6
|
||||
0x00000000,0x10000000,0x00010000,0x10010000,
|
||||
0x00000004,0x10000004,0x00010004,0x10010004,
|
||||
0x20000000,0x30000000,0x20010000,0x30010000,
|
||||
0x20000004,0x30000004,0x20010004,0x30010004,
|
||||
0x00100000,0x10100000,0x00110000,0x10110000,
|
||||
0x00100004,0x10100004,0x00110004,0x10110004,
|
||||
0x20100000,0x30100000,0x20110000,0x30110000,
|
||||
0x20100004,0x30100004,0x20110004,0x30110004,
|
||||
0x00001000,0x10001000,0x00011000,0x10011000,
|
||||
0x00001004,0x10001004,0x00011004,0x10011004,
|
||||
0x20001000,0x30001000,0x20011000,0x30011000,
|
||||
0x20001004,0x30001004,0x20011004,0x30011004,
|
||||
0x00101000,0x10101000,0x00111000,0x10111000,
|
||||
0x00101004,0x10101004,0x00111004,0x10111004,
|
||||
0x20101000,0x30101000,0x20111000,0x30111000,
|
||||
0x20101004,0x30101004,0x20111004,0x30111004,
|
||||
);
|
||||
@skb5=(
|
||||
# for D bits (numbered as per FIPS 46) 8 9 11 12 13 14
|
||||
0x00000000,0x08000000,0x00000008,0x08000008,
|
||||
0x00000400,0x08000400,0x00000408,0x08000408,
|
||||
0x00020000,0x08020000,0x00020008,0x08020008,
|
||||
0x00020400,0x08020400,0x00020408,0x08020408,
|
||||
0x00000001,0x08000001,0x00000009,0x08000009,
|
||||
0x00000401,0x08000401,0x00000409,0x08000409,
|
||||
0x00020001,0x08020001,0x00020009,0x08020009,
|
||||
0x00020401,0x08020401,0x00020409,0x08020409,
|
||||
0x02000000,0x0A000000,0x02000008,0x0A000008,
|
||||
0x02000400,0x0A000400,0x02000408,0x0A000408,
|
||||
0x02020000,0x0A020000,0x02020008,0x0A020008,
|
||||
0x02020400,0x0A020400,0x02020408,0x0A020408,
|
||||
0x02000001,0x0A000001,0x02000009,0x0A000009,
|
||||
0x02000401,0x0A000401,0x02000409,0x0A000409,
|
||||
0x02020001,0x0A020001,0x02020009,0x0A020009,
|
||||
0x02020401,0x0A020401,0x02020409,0x0A020409,
|
||||
);
|
||||
@skb6=(
|
||||
# for D bits (numbered as per FIPS 46) 16 17 18 19 20 21
|
||||
0x00000000,0x00000100,0x00080000,0x00080100,
|
||||
0x01000000,0x01000100,0x01080000,0x01080100,
|
||||
0x00000010,0x00000110,0x00080010,0x00080110,
|
||||
0x01000010,0x01000110,0x01080010,0x01080110,
|
||||
0x00200000,0x00200100,0x00280000,0x00280100,
|
||||
0x01200000,0x01200100,0x01280000,0x01280100,
|
||||
0x00200010,0x00200110,0x00280010,0x00280110,
|
||||
0x01200010,0x01200110,0x01280010,0x01280110,
|
||||
0x00000200,0x00000300,0x00080200,0x00080300,
|
||||
0x01000200,0x01000300,0x01080200,0x01080300,
|
||||
0x00000210,0x00000310,0x00080210,0x00080310,
|
||||
0x01000210,0x01000310,0x01080210,0x01080310,
|
||||
0x00200200,0x00200300,0x00280200,0x00280300,
|
||||
0x01200200,0x01200300,0x01280200,0x01280300,
|
||||
0x00200210,0x00200310,0x00280210,0x00280310,
|
||||
0x01200210,0x01200310,0x01280210,0x01280310,
|
||||
);
|
||||
@skb7=(
|
||||
# for D bits (numbered as per FIPS 46) 22 23 24 25 27 28
|
||||
0x00000000,0x04000000,0x00040000,0x04040000,
|
||||
0x00000002,0x04000002,0x00040002,0x04040002,
|
||||
0x00002000,0x04002000,0x00042000,0x04042000,
|
||||
0x00002002,0x04002002,0x00042002,0x04042002,
|
||||
0x00000020,0x04000020,0x00040020,0x04040020,
|
||||
0x00000022,0x04000022,0x00040022,0x04040022,
|
||||
0x00002020,0x04002020,0x00042020,0x04042020,
|
||||
0x00002022,0x04002022,0x00042022,0x04042022,
|
||||
0x00000800,0x04000800,0x00040800,0x04040800,
|
||||
0x00000802,0x04000802,0x00040802,0x04040802,
|
||||
0x00002800,0x04002800,0x00042800,0x04042800,
|
||||
0x00002802,0x04002802,0x00042802,0x04042802,
|
||||
0x00000820,0x04000820,0x00040820,0x04040820,
|
||||
0x00000822,0x04000822,0x00040822,0x04040822,
|
||||
0x00002820,0x04002820,0x00042820,0x04042820,
|
||||
0x00002822,0x04002822,0x00042822,0x04042822,
|
||||
);
|
||||
|
||||
@shifts2=(0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0);
|
||||
|
||||
# used in ecb_encrypt
|
||||
@SP0=(
|
||||
0x00410100, 0x00010000, 0x40400000, 0x40410100,
|
||||
0x00400000, 0x40010100, 0x40010000, 0x40400000,
|
||||
0x40010100, 0x00410100, 0x00410000, 0x40000100,
|
||||
0x40400100, 0x00400000, 0x00000000, 0x40010000,
|
||||
0x00010000, 0x40000000, 0x00400100, 0x00010100,
|
||||
0x40410100, 0x00410000, 0x40000100, 0x00400100,
|
||||
0x40000000, 0x00000100, 0x00010100, 0x40410000,
|
||||
0x00000100, 0x40400100, 0x40410000, 0x00000000,
|
||||
0x00000000, 0x40410100, 0x00400100, 0x40010000,
|
||||
0x00410100, 0x00010000, 0x40000100, 0x00400100,
|
||||
0x40410000, 0x00000100, 0x00010100, 0x40400000,
|
||||
0x40010100, 0x40000000, 0x40400000, 0x00410000,
|
||||
0x40410100, 0x00010100, 0x00410000, 0x40400100,
|
||||
0x00400000, 0x40000100, 0x40010000, 0x00000000,
|
||||
0x00010000, 0x00400000, 0x40400100, 0x00410100,
|
||||
0x40000000, 0x40410000, 0x00000100, 0x40010100,
|
||||
);
|
||||
@SP1=(
|
||||
0x08021002, 0x00000000, 0x00021000, 0x08020000,
|
||||
0x08000002, 0x00001002, 0x08001000, 0x00021000,
|
||||
0x00001000, 0x08020002, 0x00000002, 0x08001000,
|
||||
0x00020002, 0x08021000, 0x08020000, 0x00000002,
|
||||
0x00020000, 0x08001002, 0x08020002, 0x00001000,
|
||||
0x00021002, 0x08000000, 0x00000000, 0x00020002,
|
||||
0x08001002, 0x00021002, 0x08021000, 0x08000002,
|
||||
0x08000000, 0x00020000, 0x00001002, 0x08021002,
|
||||
0x00020002, 0x08021000, 0x08001000, 0x00021002,
|
||||
0x08021002, 0x00020002, 0x08000002, 0x00000000,
|
||||
0x08000000, 0x00001002, 0x00020000, 0x08020002,
|
||||
0x00001000, 0x08000000, 0x00021002, 0x08001002,
|
||||
0x08021000, 0x00001000, 0x00000000, 0x08000002,
|
||||
0x00000002, 0x08021002, 0x00021000, 0x08020000,
|
||||
0x08020002, 0x00020000, 0x00001002, 0x08001000,
|
||||
0x08001002, 0x00000002, 0x08020000, 0x00021000,
|
||||
);
|
||||
@SP2=(
|
||||
0x20800000, 0x00808020, 0x00000020, 0x20800020,
|
||||
0x20008000, 0x00800000, 0x20800020, 0x00008020,
|
||||
0x00800020, 0x00008000, 0x00808000, 0x20000000,
|
||||
0x20808020, 0x20000020, 0x20000000, 0x20808000,
|
||||
0x00000000, 0x20008000, 0x00808020, 0x00000020,
|
||||
0x20000020, 0x20808020, 0x00008000, 0x20800000,
|
||||
0x20808000, 0x00800020, 0x20008020, 0x00808000,
|
||||
0x00008020, 0x00000000, 0x00800000, 0x20008020,
|
||||
0x00808020, 0x00000020, 0x20000000, 0x00008000,
|
||||
0x20000020, 0x20008000, 0x00808000, 0x20800020,
|
||||
0x00000000, 0x00808020, 0x00008020, 0x20808000,
|
||||
0x20008000, 0x00800000, 0x20808020, 0x20000000,
|
||||
0x20008020, 0x20800000, 0x00800000, 0x20808020,
|
||||
0x00008000, 0x00800020, 0x20800020, 0x00008020,
|
||||
0x00800020, 0x00000000, 0x20808000, 0x20000020,
|
||||
0x20800000, 0x20008020, 0x00000020, 0x00808000,
|
||||
);
|
||||
@SP3=(
|
||||
0x00080201, 0x02000200, 0x00000001, 0x02080201,
|
||||
0x00000000, 0x02080000, 0x02000201, 0x00080001,
|
||||
0x02080200, 0x02000001, 0x02000000, 0x00000201,
|
||||
0x02000001, 0x00080201, 0x00080000, 0x02000000,
|
||||
0x02080001, 0x00080200, 0x00000200, 0x00000001,
|
||||
0x00080200, 0x02000201, 0x02080000, 0x00000200,
|
||||
0x00000201, 0x00000000, 0x00080001, 0x02080200,
|
||||
0x02000200, 0x02080001, 0x02080201, 0x00080000,
|
||||
0x02080001, 0x00000201, 0x00080000, 0x02000001,
|
||||
0x00080200, 0x02000200, 0x00000001, 0x02080000,
|
||||
0x02000201, 0x00000000, 0x00000200, 0x00080001,
|
||||
0x00000000, 0x02080001, 0x02080200, 0x00000200,
|
||||
0x02000000, 0x02080201, 0x00080201, 0x00080000,
|
||||
0x02080201, 0x00000001, 0x02000200, 0x00080201,
|
||||
0x00080001, 0x00080200, 0x02080000, 0x02000201,
|
||||
0x00000201, 0x02000000, 0x02000001, 0x02080200,
|
||||
);
|
||||
@SP4=(
|
||||
0x01000000, 0x00002000, 0x00000080, 0x01002084,
|
||||
0x01002004, 0x01000080, 0x00002084, 0x01002000,
|
||||
0x00002000, 0x00000004, 0x01000004, 0x00002080,
|
||||
0x01000084, 0x01002004, 0x01002080, 0x00000000,
|
||||
0x00002080, 0x01000000, 0x00002004, 0x00000084,
|
||||
0x01000080, 0x00002084, 0x00000000, 0x01000004,
|
||||
0x00000004, 0x01000084, 0x01002084, 0x00002004,
|
||||
0x01002000, 0x00000080, 0x00000084, 0x01002080,
|
||||
0x01002080, 0x01000084, 0x00002004, 0x01002000,
|
||||
0x00002000, 0x00000004, 0x01000004, 0x01000080,
|
||||
0x01000000, 0x00002080, 0x01002084, 0x00000000,
|
||||
0x00002084, 0x01000000, 0x00000080, 0x00002004,
|
||||
0x01000084, 0x00000080, 0x00000000, 0x01002084,
|
||||
0x01002004, 0x01002080, 0x00000084, 0x00002000,
|
||||
0x00002080, 0x01002004, 0x01000080, 0x00000084,
|
||||
0x00000004, 0x00002084, 0x01002000, 0x01000004,
|
||||
);
|
||||
@SP5=(
|
||||
0x10000008, 0x00040008, 0x00000000, 0x10040400,
|
||||
0x00040008, 0x00000400, 0x10000408, 0x00040000,
|
||||
0x00000408, 0x10040408, 0x00040400, 0x10000000,
|
||||
0x10000400, 0x10000008, 0x10040000, 0x00040408,
|
||||
0x00040000, 0x10000408, 0x10040008, 0x00000000,
|
||||
0x00000400, 0x00000008, 0x10040400, 0x10040008,
|
||||
0x10040408, 0x10040000, 0x10000000, 0x00000408,
|
||||
0x00000008, 0x00040400, 0x00040408, 0x10000400,
|
||||
0x00000408, 0x10000000, 0x10000400, 0x00040408,
|
||||
0x10040400, 0x00040008, 0x00000000, 0x10000400,
|
||||
0x10000000, 0x00000400, 0x10040008, 0x00040000,
|
||||
0x00040008, 0x10040408, 0x00040400, 0x00000008,
|
||||
0x10040408, 0x00040400, 0x00040000, 0x10000408,
|
||||
0x10000008, 0x10040000, 0x00040408, 0x00000000,
|
||||
0x00000400, 0x10000008, 0x10000408, 0x10040400,
|
||||
0x10040000, 0x00000408, 0x00000008, 0x10040008,
|
||||
);
|
||||
@SP6=(
|
||||
0x00000800, 0x00000040, 0x00200040, 0x80200000,
|
||||
0x80200840, 0x80000800, 0x00000840, 0x00000000,
|
||||
0x00200000, 0x80200040, 0x80000040, 0x00200800,
|
||||
0x80000000, 0x00200840, 0x00200800, 0x80000040,
|
||||
0x80200040, 0x00000800, 0x80000800, 0x80200840,
|
||||
0x00000000, 0x00200040, 0x80200000, 0x00000840,
|
||||
0x80200800, 0x80000840, 0x00200840, 0x80000000,
|
||||
0x80000840, 0x80200800, 0x00000040, 0x00200000,
|
||||
0x80000840, 0x00200800, 0x80200800, 0x80000040,
|
||||
0x00000800, 0x00000040, 0x00200000, 0x80200800,
|
||||
0x80200040, 0x80000840, 0x00000840, 0x00000000,
|
||||
0x00000040, 0x80200000, 0x80000000, 0x00200040,
|
||||
0x00000000, 0x80200040, 0x00200040, 0x00000840,
|
||||
0x80000040, 0x00000800, 0x80200840, 0x00200000,
|
||||
0x00200840, 0x80000000, 0x80000800, 0x80200840,
|
||||
0x80200000, 0x00200840, 0x00200800, 0x80000800,
|
||||
);
|
||||
@SP7=(
|
||||
0x04100010, 0x04104000, 0x00004010, 0x00000000,
|
||||
0x04004000, 0x00100010, 0x04100000, 0x04104010,
|
||||
0x00000010, 0x04000000, 0x00104000, 0x00004010,
|
||||
0x00104010, 0x04004010, 0x04000010, 0x04100000,
|
||||
0x00004000, 0x00104010, 0x00100010, 0x04004000,
|
||||
0x04104010, 0x04000010, 0x00000000, 0x00104000,
|
||||
0x04000000, 0x00100000, 0x04004010, 0x04100010,
|
||||
0x00100000, 0x00004000, 0x04104000, 0x00000010,
|
||||
0x00100000, 0x00004000, 0x04000010, 0x04104010,
|
||||
0x00004010, 0x04000000, 0x00000000, 0x00104000,
|
||||
0x04100010, 0x04004010, 0x04004000, 0x00100010,
|
||||
0x04104000, 0x00000010, 0x00100010, 0x04004000,
|
||||
0x04104010, 0x00100000, 0x04100000, 0x04000010,
|
||||
0x00104000, 0x00004010, 0x04004010, 0x04100000,
|
||||
0x00000010, 0x04104000, 0x00104010, 0x00000000,
|
||||
0x04000000, 0x04100010, 0x00004000, 0x00104010,
|
||||
);
|
||||
|
||||
sub main'des_set_key
|
||||
{
|
||||
local($param)=@_;
|
||||
local(@key);
|
||||
local($c,$d,$i,$s,$t);
|
||||
local(@ks)=();
|
||||
|
||||
# Get the bytes in the order we want.
|
||||
@key=unpack("C8",$param);
|
||||
|
||||
$c= ($key[0] )|
|
||||
($key[1]<< 8)|
|
||||
($key[2]<<16)|
|
||||
($key[3]<<24);
|
||||
$d= ($key[4] )|
|
||||
($key[5]<< 8)|
|
||||
($key[6]<<16)|
|
||||
($key[7]<<24);
|
||||
|
||||
&doPC1(*c,*d);
|
||||
|
||||
for $i (@shifts2)
|
||||
{
|
||||
if ($i)
|
||||
{
|
||||
$c=($c>>2)|($c<<26);
|
||||
$d=($d>>2)|($d<<26);
|
||||
}
|
||||
else
|
||||
{
|
||||
$c=($c>>1)|($c<<27);
|
||||
$d=($d>>1)|($d<<27);
|
||||
}
|
||||
$c&=0x0fffffff;
|
||||
$d&=0x0fffffff;
|
||||
$s= $skb0[ ($c )&0x3f ]|
|
||||
$skb1[(($c>> 6)&0x03)|(($c>> 7)&0x3c)]|
|
||||
$skb2[(($c>>13)&0x0f)|(($c>>14)&0x30)]|
|
||||
$skb3[(($c>>20)&0x01)|(($c>>21)&0x06) |
|
||||
(($c>>22)&0x38)];
|
||||
$t= $skb4[ ($d )&0x3f ]|
|
||||
$skb5[(($d>> 7)&0x03)|(($d>> 8)&0x3c)]|
|
||||
$skb6[ ($d>>15)&0x3f ]|
|
||||
$skb7[(($d>>21)&0x0f)|(($d>>22)&0x30)];
|
||||
push(@ks,(($t<<16)|($s&0x0000ffff))&0xffffffff);
|
||||
$s= (($s>>16)&0x0000ffff)|($t&0xffff0000) ;
|
||||
push(@ks,(($s<<4)|(($s>>28)&0xf))&0xffffffff);
|
||||
}
|
||||
@ks;
|
||||
}
|
||||
|
||||
sub doPC1
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local($t);
|
||||
|
||||
$t=(($b>>4)^$a)&0x0f0f0f0f;
|
||||
$b^=($t<<4); $a^=$t;
|
||||
# do $a first
|
||||
$t=(($a<<18)^$a)&0xcccc0000;
|
||||
$a=$a^$t^(($t>>18)&0x00003fff);
|
||||
$t=(($a<<17)^$a)&0xaaaa0000;
|
||||
$a=$a^$t^(($t>>17)&0x00007fff);
|
||||
$t=(($a<< 8)^$a)&0x00ff0000;
|
||||
$a=$a^$t^(($t>> 8)&0x00ffffff);
|
||||
$t=(($a<<17)^$a)&0xaaaa0000;
|
||||
$a=$a^$t^(($t>>17)&0x00007fff);
|
||||
|
||||
# now do $b
|
||||
$t=(($b<<24)^$b)&0xff000000;
|
||||
$b=$b^$t^(($t>>24)&0x000000ff);
|
||||
$t=(($b<< 8)^$b)&0x00ff0000;
|
||||
$b=$b^$t^(($t>> 8)&0x00ffffff);
|
||||
$t=(($b<<14)^$b)&0x33330000;
|
||||
$b=$b^$t^(($t>>14)&0x0003ffff);
|
||||
$b=(($b&0x00aa00aa)<<7)|(($b&0x55005500)>>7)|($b&0xaa55aa55);
|
||||
$b=(($b>>8)&0x00ffffff)|((($a&0xf0000000)>>4)&0x0fffffff);
|
||||
$a&=0x0fffffff;
|
||||
}
|
||||
|
||||
sub doIP
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local($t);
|
||||
|
||||
$t=(($b>> 4)^$a)&0x0f0f0f0f;
|
||||
$b^=($t<< 4); $a^=$t;
|
||||
$t=(($a>>16)^$b)&0x0000ffff;
|
||||
$a^=($t<<16); $b^=$t;
|
||||
$t=(($b>> 2)^$a)&0x33333333;
|
||||
$b^=($t<< 2); $a^=$t;
|
||||
$t=(($a>> 8)^$b)&0x00ff00ff;
|
||||
$a^=($t<< 8); $b^=$t;
|
||||
$t=(($b>> 1)^$a)&0x55555555;
|
||||
$b^=($t<< 1); $a^=$t;
|
||||
$t=$a;
|
||||
$a=$b&0xffffffff;
|
||||
$b=$t&0xffffffff;
|
||||
}
|
||||
|
||||
sub doFP
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local($t);
|
||||
|
||||
$t=(($b>> 1)^$a)&0x55555555;
|
||||
$b^=($t<< 1); $a^=$t;
|
||||
$t=(($a>> 8)^$b)&0x00ff00ff;
|
||||
$a^=($t<< 8); $b^=$t;
|
||||
$t=(($b>> 2)^$a)&0x33333333;
|
||||
$b^=($t<< 2); $a^=$t;
|
||||
$t=(($a>>16)^$b)&0x0000ffff;
|
||||
$a^=($t<<16); $b^=$t;
|
||||
$t=(($b>> 4)^$a)&0x0f0f0f0f;
|
||||
$b^=($t<< 4); $a^=$t;
|
||||
$a&=0xffffffff;
|
||||
$b&=0xffffffff;
|
||||
}
|
||||
|
||||
sub main'des_ecb_encrypt
|
||||
{
|
||||
local(*ks,$encrypt,$in)=@_;
|
||||
local($l,$r,$i,$t,$u,@input);
|
||||
|
||||
@input=unpack("C8",$in);
|
||||
# Get the bytes in the order we want.
|
||||
$l= ($input[0] )|
|
||||
($input[1]<< 8)|
|
||||
($input[2]<<16)|
|
||||
($input[3]<<24);
|
||||
$r= ($input[4] )|
|
||||
($input[5]<< 8)|
|
||||
($input[6]<<16)|
|
||||
($input[7]<<24);
|
||||
|
||||
$l&=0xffffffff;
|
||||
$r&=0xffffffff;
|
||||
&doIP(*l,*r);
|
||||
if ($encrypt)
|
||||
{
|
||||
for ($i=0; $i<32; $i+=4)
|
||||
{
|
||||
$t=((($r&0x7fffffff)<<1)|(($r>>31)&0x00000001));
|
||||
$u=$t^$ks[$i ];
|
||||
$t=$t^$ks[$i+1];
|
||||
$t2=(($t&0x0000000f)<<28);
|
||||
|
||||
$t=((($t>>4)&0x0fffffff)|(($t&0x0000000f)<<28));
|
||||
$l^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
|
||||
$t=(($l<<1)|(($l>>31)&0x1))&0xffffffff;
|
||||
$u=$t^$ks[$i+2];
|
||||
$t=$t^$ks[$i+3];
|
||||
$t=((($t>>4)&0x0fffffff)|($t<<28))&0xffffffff;
|
||||
$r^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
for ($i=30; $i>0; $i-=4)
|
||||
{
|
||||
$t=(($r<<1)|(($r>>31)&0x1))&0xffffffff;
|
||||
$u=$t^$ks[$i ];
|
||||
$t=$t^$ks[$i+1];
|
||||
$t=((($t>>4)&0x0fffffff)|($t<<28))&0xffffffff;
|
||||
$l^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
|
||||
$t=(($l<<1)|(($l>>31)&0x1))&0xffffffff;
|
||||
$u=$t^$ks[$i-2];
|
||||
$t=$t^$ks[$i-1];
|
||||
$t=((($t>>4)&0x0fffffff)|($t<<28))&0xffffffff;
|
||||
$r^= $SP1[ $t &0x3f]|
|
||||
$SP3[($t>> 8)&0x3f]|
|
||||
$SP5[($t>>16)&0x3f]|
|
||||
$SP7[($t>>24)&0x3f]|
|
||||
$SP0[ $u &0x3f]|
|
||||
$SP2[($u>> 8)&0x3f]|
|
||||
$SP4[($u>>16)&0x3f]|
|
||||
$SP6[($u>>24)&0x3f];
|
||||
}
|
||||
}
|
||||
&doFP(*l,*r);
|
||||
pack("C8",$l&0xff,
|
||||
($l>> 8)&0x00ffffff,
|
||||
($l>>16)&0x0000ffff,
|
||||
($l>>24)&0x000000ff,
|
||||
$r&0xff,
|
||||
($r>> 8)&0x00ffffff,
|
||||
($r>>16)&0x0000ffff,
|
||||
($r>>24)&0x000000ff);
|
||||
}
|
||||
@@ -1,379 +0,0 @@
|
||||
.\" $Id$
|
||||
.\" Copyright 1989 by the Massachusetts Institute of Technology.
|
||||
.\"
|
||||
.\" For copying and distribution information,
|
||||
.\" please see the file <mit-copyright.h>.
|
||||
.\"
|
||||
.TH DES_CRYPT 3 "Kerberos Version 4.0" "MIT Project Athena"
|
||||
.SH NAME
|
||||
des_read_password, des_string_to_key, des_random_key, des_set_key,
|
||||
des_ecb_encrypt, des_cbc_encrypt, des_pcbc_encrypt, des_cbc_cksum,
|
||||
des_quad_cksum, \- (new) DES encryption
|
||||
.SH SYNOPSIS
|
||||
.nf
|
||||
.nj
|
||||
.ft B
|
||||
#include <des.h>
|
||||
.PP
|
||||
.ft B
|
||||
.B int des_read_password(key,prompt,verify)
|
||||
des_cblock *key;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.ft B
|
||||
int des_string_to_key(str,key)
|
||||
char *str;
|
||||
des_cblock key;
|
||||
.PP
|
||||
.ft B
|
||||
int des_random_key(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.ft B
|
||||
int des_set_key(key,schedule)
|
||||
des_cblock *key;
|
||||
des_key_schedule schedule;
|
||||
.PP
|
||||
.ft B
|
||||
int des_ecb_encrypt(input,output,schedule,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
des_key_schedule schedule;
|
||||
int encrypt;
|
||||
.PP
|
||||
.ft B
|
||||
int des_cbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.ft B
|
||||
int des_pcbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.ft B
|
||||
unsigned long des_cbc_cksum(input,output,length,schedule,ivec)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
.PP
|
||||
.ft B
|
||||
unsigned long quad_cksum(input,output,length,out_count,seed)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
int out_count;
|
||||
des_cblock *seed;
|
||||
.PP
|
||||
.fi
|
||||
.SH DESCRIPTION
|
||||
This library supports various DES encryption related operations. It differs
|
||||
from the
|
||||
.I crypt, setkey, and encrypt
|
||||
library routines in that it provides
|
||||
a true DES encryption, without modifying the algorithm,
|
||||
and executes much faster.
|
||||
.PP
|
||||
For each key that may be simultaneously active, create a
|
||||
.B des_key_schedule
|
||||
struct,
|
||||
defined in "des.h". Next, create key schedules (from the 8-byte keys) as
|
||||
needed, via
|
||||
.I des_set_key,
|
||||
prior to using the encryption or checksum routines. Then
|
||||
setup the input and output areas. Make sure to note the restrictions
|
||||
on lengths being multiples of eight bytes. Finally, invoke the
|
||||
encryption/decryption routines,
|
||||
.I des_ecb_encrypt
|
||||
or
|
||||
.I des_cbc_encrypt
|
||||
or
|
||||
.I des_pcbc_encrypt,
|
||||
or, to generate a cryptographic checksum, use
|
||||
.I quad_cksum
|
||||
(fast) or
|
||||
.I des_cbc_cksum
|
||||
(slow).
|
||||
.PP
|
||||
A
|
||||
.I des_cblock
|
||||
struct is an 8 byte block used as the fundamental unit for DES data and
|
||||
keys, and is defined as:
|
||||
.PP
|
||||
.B typedef unsigned char des_cblock[8];
|
||||
.PP
|
||||
and a
|
||||
.I des_key_schedule,
|
||||
is defined as:
|
||||
.PP
|
||||
.B typedef struct des_ks_struct {des_cblock _;} des_key_schedule[16];
|
||||
.PP
|
||||
.I des_read_password
|
||||
writes the string specified by
|
||||
.I prompt
|
||||
to the standard
|
||||
output, turns off echo (if possible)
|
||||
and reads an input string from standard input until terminated with a newline.
|
||||
If
|
||||
.I verify
|
||||
is non-zero, it prompts and reads input again, for use
|
||||
in applications such as changing a password; both
|
||||
versions are compared, and the input is requested repeatedly until they
|
||||
match. Then
|
||||
.I des_read_password
|
||||
converts the input string into a valid DES key, internally
|
||||
using the
|
||||
.I des_string_to_key
|
||||
routine. The newly created key is copied to the
|
||||
area pointed to by the
|
||||
.I key
|
||||
argument.
|
||||
.I des_read_password
|
||||
returns a zero if no errors occurred, or a -1
|
||||
indicating that an error
|
||||
occurred trying to manipulate the terminal echo.
|
||||
.PP
|
||||
.PP
|
||||
.I des_string_to_key
|
||||
converts an arbitrary length null-terminated string
|
||||
to an 8 byte DES key, with odd byte parity, per FIPS specification.
|
||||
A one-way function is used to convert the string to a key, making it
|
||||
very difficult to reconstruct the string from the key.
|
||||
The
|
||||
.I str
|
||||
argument is a pointer to the string, and
|
||||
.I key
|
||||
should
|
||||
point to a
|
||||
.I des_cblock
|
||||
supplied by the caller to receive the generated key.
|
||||
No meaningful value is returned. Void is not used for compatibility with
|
||||
other compilers.
|
||||
.PP
|
||||
.PP
|
||||
.I des_random_key
|
||||
generates a random DES encryption key (eight bytes), set to odd parity per
|
||||
FIPS
|
||||
specifications.
|
||||
This routine uses the current time, process id, and a counter
|
||||
as a seed for the random number generator.
|
||||
The caller must supply space for the output key, pointed to
|
||||
by argument
|
||||
.I key,
|
||||
then after calling
|
||||
.I des_random_key
|
||||
should
|
||||
call the
|
||||
.I des_set_key
|
||||
routine when needed.
|
||||
No meaningful value is returned. Void is not used for compatibility
|
||||
with other compilers.
|
||||
.PP
|
||||
.PP
|
||||
.I des_set_key
|
||||
calculates a key schedule from all eight bytes of the input key, pointed
|
||||
to by the
|
||||
.I key
|
||||
argument, and outputs the schedule into the
|
||||
.I des_key_schedule
|
||||
indicated by the
|
||||
.I schedule
|
||||
argument. Make sure to pass a valid eight byte
|
||||
key; no padding is done. The key schedule may then be used in subsequent
|
||||
encryption/decryption/checksum operations. Many key schedules may be
|
||||
cached for later use. The user is responsible to clear keys and schedules
|
||||
as soon as no longer needed, to prevent their disclosure.
|
||||
The routine also checks the key
|
||||
parity, and returns a zero if the key parity is correct (odd), a -1
|
||||
indicating a key parity error, or a -2 indicating use of an illegal
|
||||
weak key. If an error is returned, the key schedule was not created.
|
||||
.PP
|
||||
.PP
|
||||
.I des_ecb_encrypt
|
||||
is the basic DES encryption routine that encrypts or decrypts a single 8-byte
|
||||
block in
|
||||
.B electronic code book
|
||||
mode. It always transforms the input data, pointed to by
|
||||
.I input,
|
||||
into the output data, pointed to by the
|
||||
.I output
|
||||
argument.
|
||||
.PP
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero, the
|
||||
.I input
|
||||
(cleartext) is encrypted into the
|
||||
.I output
|
||||
(ciphertext) using the key_schedule specified by the
|
||||
.I schedule
|
||||
argument, previously set via
|
||||
.I des_set_key
|
||||
.PP
|
||||
If encrypt is zero, the
|
||||
.I input
|
||||
(now ciphertext) is decrypted into the
|
||||
.I output
|
||||
(now cleartext).
|
||||
.PP
|
||||
Input and output may overlap.
|
||||
.PP
|
||||
No meaningful value is returned. Void is not used for compatibility
|
||||
with other compilers.
|
||||
.PP
|
||||
.PP
|
||||
.I des_cbc_encrypt
|
||||
encrypts/decrypts using the
|
||||
.B cipher-block-chaining mode of DES.
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero, the routine cipher-block-chain encrypts
|
||||
the cleartext data pointed to by the
|
||||
.I input
|
||||
argument into the ciphertext pointed to by the
|
||||
.I output
|
||||
argument, using the key schedule provided by the
|
||||
.I schedule
|
||||
argument, and initialization vector provided by the
|
||||
.I ivec
|
||||
argument.
|
||||
If the
|
||||
.I length
|
||||
argument is not an integral
|
||||
multiple of eight bytes, the last block is copied to a temp and zero
|
||||
filled (highest addresses). The output is ALWAYS an integral multiple
|
||||
of eight bytes.
|
||||
.PP
|
||||
If
|
||||
.I encrypt
|
||||
is zero, the routine cipher-block chain decrypts the (now) ciphertext
|
||||
data pointed to by the
|
||||
.I input
|
||||
argument into (now) cleartext pointed to by the
|
||||
.I output
|
||||
argument using the key schedule provided by the
|
||||
.I schedule
|
||||
argument, and initialization vector provided by the
|
||||
.I ivec
|
||||
argument. Decryption ALWAYS operates on integral
|
||||
multiples of 8 bytes, so it will round the
|
||||
.I length
|
||||
provided up to the
|
||||
appropriate multiple. Consequently, it will always produce the rounded-up
|
||||
number of bytes of output cleartext. The application must determine if
|
||||
the output cleartext was zero-padded due to original cleartext lengths that
|
||||
were not integral multiples of 8.
|
||||
.PP
|
||||
No errors or meaningful values are returned. Void is not used for
|
||||
compatibility with other compilers.
|
||||
.PP
|
||||
A characteristic of cbc mode is that changing a single bit of the
|
||||
cleartext, then encrypting using cbc mode,
|
||||
affects ALL the subsequent ciphertext. This makes cryptanalysis
|
||||
much more difficult. However, modifying a single bit of the ciphertext,
|
||||
then decrypting, only affects the resulting cleartext from
|
||||
the modified block and the succeeding block. Therefore,
|
||||
.I des_pcbc_encrypt
|
||||
is STRONGLY recommended for applications where
|
||||
indefinite propagation of errors is required in order to detect modifications.
|
||||
.PP
|
||||
.PP
|
||||
.I des_pcbc_encrypt
|
||||
encrypts/decrypts using a modified block chaining mode. Its calling
|
||||
sequence is identical to
|
||||
.I des_cbc_encrypt.
|
||||
It differs in its error propagation characteristics.
|
||||
.PP
|
||||
.I des_pcbc_encrypt
|
||||
is highly recommended for most encryption purposes, in that
|
||||
modification of a single bit of the ciphertext will affect ALL the
|
||||
subsequent (decrypted) cleartext. Similarly, modifying a single bit of
|
||||
the cleartext will affect ALL the subsequent (encrypted) ciphertext.
|
||||
"PCBC" mode, on encryption, "xors" both the
|
||||
cleartext of block N and the ciphertext resulting from block N with the
|
||||
cleartext for block N+1 prior to encrypting block N+1.
|
||||
.PP
|
||||
.I des_cbc_cksum
|
||||
produces an 8 byte cryptographic checksum by cipher-block-chain
|
||||
encrypting the cleartext data pointed to by the
|
||||
.I input
|
||||
argument. All of the ciphertext output is discarded, except the
|
||||
last 8-byte ciphertext block, which is written into the area pointed to by
|
||||
the
|
||||
.I output
|
||||
argument.
|
||||
It uses the key schedule,
|
||||
provided by the
|
||||
.I schedule
|
||||
argument and initialization vector provided by the
|
||||
.I ivec
|
||||
argument.
|
||||
If the
|
||||
.I length
|
||||
argument is not an integral
|
||||
multiple of eight bytes, the last cleartext block is copied to a temp and zero
|
||||
filled (highest addresses). The output is ALWAYS eight bytes.
|
||||
.PP
|
||||
The routine also returns an unsigned long, which is the last (highest address)
|
||||
half of the 8 byte checksum computed.
|
||||
.PP
|
||||
.PP
|
||||
.I quad_cksum
|
||||
produces a checksum by chaining quadratic operations on the cleartext data
|
||||
pointed to by the
|
||||
.I input
|
||||
argument. The
|
||||
.I length
|
||||
argument specifies the length of the
|
||||
input -- only exactly that many bytes are included for the checksum,
|
||||
without any padding.
|
||||
.PP
|
||||
The algorithm may be iterated over the same input data, if the
|
||||
.I out_count
|
||||
argument is 2, 3 or 4, and the optional
|
||||
.I output
|
||||
argument is a non-null pointer .
|
||||
The default is one iteration, and it will not run
|
||||
more than 4 times. Multiple iterations run slower, but provide
|
||||
a longer checksum if desired. The
|
||||
.I seed
|
||||
argument provides an 8-byte seed for the first iteration. If multiple iterations are
|
||||
requested, the results of one iteration are automatically used as
|
||||
the seed for the next iteration.
|
||||
.PP
|
||||
It returns both an unsigned long checksum value, and
|
||||
if the
|
||||
.I output
|
||||
argument is not a null pointer, up to 16 bytes of
|
||||
the computed checksum are written into the output.
|
||||
.PP
|
||||
.PP
|
||||
.SH FILES
|
||||
/usr/include/des.h
|
||||
.br
|
||||
/usr/lib/libdes.a
|
||||
.SH "SEE ALSO"
|
||||
.SH DIAGNOSTICS
|
||||
.SH BUGS
|
||||
This software has not yet been compiled or tested on machines other than the
|
||||
VAX and the IBM PC.
|
||||
.SH AUTHORS
|
||||
Steve Miller, MIT Project Athena/Digital Equipment Corporation
|
||||
.SH RESTRICTIONS
|
||||
COPYRIGHT 1985,1986 Massachusetts Institute of Technology
|
||||
.PP
|
||||
This software may not be exported outside of the US without a special
|
||||
license from the US Dept of Commerce. It may be replaced by any secret
|
||||
key block cipher with block length and key length of 8 bytes, as long
|
||||
as the interface is the same as described here.
|
||||
@@ -1,508 +0,0 @@
|
||||
.TH DES_CRYPT 3
|
||||
.SH NAME
|
||||
des_read_password, des_read_2password,
|
||||
des_string_to_key, des_string_to_2key, des_read_pw_string,
|
||||
des_random_key, des_set_key,
|
||||
des_key_sched, des_ecb_encrypt, des_3ecb_encrypt, des_cbc_encrypt,
|
||||
des_3cbc_encrypt,
|
||||
des_pcbc_encrypt, des_cfb_encrypt, des_ofb_encrypt,
|
||||
des_cbc_cksum, des_quad_cksum,
|
||||
des_enc_read, des_enc_write, des_set_odd_parity,
|
||||
des_is_weak_key, crypt \- (non USA) DES encryption
|
||||
.SH SYNOPSIS
|
||||
.nf
|
||||
.nj
|
||||
.ft B
|
||||
#include <des.h>
|
||||
.PP
|
||||
.B int des_read_password(key,prompt,verify)
|
||||
des_cblock *key;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.B int des_read_2password(key1,key2,prompt,verify)
|
||||
des_cblock *key1,*key2;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.B int des_string_to_key(str,key)
|
||||
char *str;
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B int des_string_to_2keys(str,key1,key2)
|
||||
char *str;
|
||||
des_cblock *key1,*key2;
|
||||
.PP
|
||||
.B int des_read_pw_string(buf,length,prompt,verify)
|
||||
char *buf;
|
||||
int length;
|
||||
char *prompt;
|
||||
int verify;
|
||||
.PP
|
||||
.B int des_random_key(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B int des_set_key(key,schedule)
|
||||
des_cblock *key;
|
||||
des_key_schedule schedule;
|
||||
.PP
|
||||
.B int des_key_sched(key,schedule)
|
||||
des_cblock *key;
|
||||
des_key_schedule schedule;
|
||||
.PP
|
||||
.B int des_ecb_encrypt(input,output,schedule,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
des_key_schedule schedule;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_3ecb_encrypt(input,output,ks1,ks2,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
des_key_schedule ks1,ks2;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_cbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_3cbc_encrypt(input,output,length,sk1,sk2,ivec1,ivec2,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule sk1;
|
||||
des_key_schedule sk2;
|
||||
des_cblock *ivec1;
|
||||
des_cblock *ivec2;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_pcbc_encrypt(input,output,length,schedule,ivec,encrypt)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_cfb_encrypt(input,output,numbits,length,schedule,ivec,encrypt)
|
||||
unsigned char *input;
|
||||
unsigned char *output;
|
||||
int numbits;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
int encrypt;
|
||||
.PP
|
||||
.B int des_ofb_encrypt(input,output,numbits,length,schedule,ivec)
|
||||
unsigned char *input,*output;
|
||||
int numbits;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
.PP
|
||||
.B unsigned long des_cbc_cksum(input,output,length,schedule,ivec)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
des_key_schedule schedule;
|
||||
des_cblock *ivec;
|
||||
.PP
|
||||
.B unsigned long des_quad_cksum(input,output,length,out_count,seed)
|
||||
des_cblock *input;
|
||||
des_cblock *output;
|
||||
long length;
|
||||
int out_count;
|
||||
des_cblock *seed;
|
||||
.PP
|
||||
.B int des_check_key;
|
||||
.PP
|
||||
.B int des_enc_read(fd,buf,len,sched,iv)
|
||||
int fd;
|
||||
char *buf;
|
||||
int len;
|
||||
des_key_schedule sched;
|
||||
des_cblock *iv;
|
||||
.PP
|
||||
.B int des_enc_write(fd,buf,len,sched,iv)
|
||||
int fd;
|
||||
char *buf;
|
||||
int len;
|
||||
des_key_schedule sched;
|
||||
des_cblock *iv;
|
||||
.PP
|
||||
.B extern int des_rw_mode;
|
||||
.PP
|
||||
.B void des_set_odd_parity(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B int des_is_weak_key(key)
|
||||
des_cblock *key;
|
||||
.PP
|
||||
.B char *crypt(passwd,salt)
|
||||
char *passwd;
|
||||
char *salt;
|
||||
.PP
|
||||
.fi
|
||||
.SH DESCRIPTION
|
||||
This library contains a fast implementation of the DES encryption
|
||||
algorithm.
|
||||
.PP
|
||||
There are two phases to the use of DES encryption.
|
||||
The first is the generation of a
|
||||
.I des_key_schedule
|
||||
from a key,
|
||||
the second is the actual encryption.
|
||||
A des key is of type
|
||||
.I des_cblock.
|
||||
This type is made from 8 characters with odd parity.
|
||||
The least significant bit in the character is the parity bit.
|
||||
The key schedule is an expanded form of the key; it is used to speed the
|
||||
encryption process.
|
||||
.PP
|
||||
.I des_read_password
|
||||
writes the string specified by prompt to the standard output,
|
||||
turns off echo and reads an input string from standard input
|
||||
until terminated with a newline.
|
||||
If verify is non-zero, it prompts and reads the input again and verifies
|
||||
that both entered passwords are the same.
|
||||
The entered string is converted into a des key by using the
|
||||
.I des_string_to_key
|
||||
routine.
|
||||
The new key is placed in the
|
||||
.I des_cblock
|
||||
that was passed (by reference) to the routine.
|
||||
If there were no errors,
|
||||
.I des_read_password
|
||||
returns 0,
|
||||
-1 is returned if there was a terminal error and 1 is returned for
|
||||
any other error.
|
||||
.PP
|
||||
.I des_read_2password
|
||||
operates in the same way as
|
||||
.I des_read_password
|
||||
except that it generates 2 keys by using the
|
||||
.I des_string_to_2key
|
||||
function.
|
||||
.PP
|
||||
.I des_read_pw_string
|
||||
is called by
|
||||
.I des_read_password
|
||||
to read and verify a string from a terminal device.
|
||||
The string is returned in
|
||||
.I buf.
|
||||
The size of
|
||||
.I buf
|
||||
is passed to the routine via the
|
||||
.I length
|
||||
parameter.
|
||||
.PP
|
||||
.I des_string_to_key
|
||||
converts a string into a valid des key.
|
||||
.PP
|
||||
.I des_string_to_2key
|
||||
converts a string into 2 valid des keys.
|
||||
This routine is best suited for used to generate keys for use with
|
||||
.I des_3ecb_encrypt.
|
||||
.PP
|
||||
.I des_random_key
|
||||
returns a random key that is made of a combination of process id,
|
||||
time and an increasing counter.
|
||||
.PP
|
||||
Before a des key can be used it is converted into a
|
||||
.I des_key_schedule
|
||||
via the
|
||||
.I des_set_key
|
||||
routine.
|
||||
If the
|
||||
.I des_check_key
|
||||
flag is non-zero,
|
||||
.I des_set_key
|
||||
will check that the key passed is of odd parity and is not a week or
|
||||
semi-weak key.
|
||||
If the parity is wrong,
|
||||
then -1 is returned.
|
||||
If the key is a weak key,
|
||||
then -2 is returned.
|
||||
If an error is returned,
|
||||
the key schedule is not generated.
|
||||
.PP
|
||||
.I des_key_sched
|
||||
is another name for the
|
||||
.I des_set_key
|
||||
function.
|
||||
.PP
|
||||
The following routines mostly operate on an input and output stream of
|
||||
.I des_cblock's.
|
||||
.PP
|
||||
.I des_ecb_encrypt
|
||||
is the basic DES encryption routine that encrypts or decrypts a single 8-byte
|
||||
.I des_cblock
|
||||
in
|
||||
.I electronic code book
|
||||
mode.
|
||||
It always transforms the input data, pointed to by
|
||||
.I input,
|
||||
into the output data,
|
||||
pointed to by the
|
||||
.I output
|
||||
argument.
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero (DES_ENCRYPT),
|
||||
the
|
||||
.I input
|
||||
(cleartext) is encrypted in to the
|
||||
.I output
|
||||
(ciphertext) using the key_schedule specified by the
|
||||
.I schedule
|
||||
argument,
|
||||
previously set via
|
||||
.I des_set_key.
|
||||
If
|
||||
.I encrypt
|
||||
is zero (DES_DECRYPT),
|
||||
the
|
||||
.I input
|
||||
(now ciphertext)
|
||||
is decrypted into the
|
||||
.I output
|
||||
(now cleartext).
|
||||
Input and output may overlap.
|
||||
No meaningful value is returned.
|
||||
.PP
|
||||
.I des_3ecb_encrypt
|
||||
encrypts/decrypts the
|
||||
.I input
|
||||
block by using triple ecb DES encryption.
|
||||
This involves encrypting the input with
|
||||
.I ks1,
|
||||
decryption with the key schedule
|
||||
.I ks2,
|
||||
and then encryption with the first again.
|
||||
This routine greatly reduces the chances of brute force breaking of
|
||||
DES and has the advantage of if
|
||||
.I ks1
|
||||
and
|
||||
.I ks2
|
||||
are the same, it is equivalent to just encryption using ecb mode and
|
||||
.I ks1
|
||||
as the key.
|
||||
.PP
|
||||
.I des_cbc_encrypt
|
||||
encrypts/decrypts using the
|
||||
.I cipher-block-chaining
|
||||
mode of DES.
|
||||
If the
|
||||
.I encrypt
|
||||
argument is non-zero,
|
||||
the routine cipher-block-chain encrypts the cleartext data pointed to by the
|
||||
.I input
|
||||
argument into the ciphertext pointed to by the
|
||||
.I output
|
||||
argument,
|
||||
using the key schedule provided by the
|
||||
.I schedule
|
||||
argument,
|
||||
and initialisation vector provided by the
|
||||
.I ivec
|
||||
argument.
|
||||
If the
|
||||
.I length
|
||||
argument is not an integral multiple of eight bytes,
|
||||
the last block is copied to a temporary area and zero filled.
|
||||
The output is always
|
||||
an integral multiple of eight bytes.
|
||||
To make multiple cbc encrypt calls on a large amount of data appear to
|
||||
be one
|
||||
.I des_cbc_encrypt
|
||||
call, the
|
||||
.I ivec
|
||||
of subsequent calls should be the last 8 bytes of the output.
|
||||
.PP
|
||||
.I des_3cbc_encrypt
|
||||
encrypts/decrypts the
|
||||
.I input
|
||||
block by using triple cbc DES encryption.
|
||||
This involves encrypting the input with key schedule
|
||||
.I ks1,
|
||||
decryption with the key schedule
|
||||
.I ks2,
|
||||
and then encryption with the first again.
|
||||
2 initialisation vectors are required,
|
||||
.I ivec1
|
||||
and
|
||||
.I ivec2.
|
||||
Unlike
|
||||
.I des_cbc_encrypt,
|
||||
these initialisation vectors are modified by the subroutine.
|
||||
This routine greatly reduces the chances of brute force breaking of
|
||||
DES and has the advantage of if
|
||||
.I ks1
|
||||
and
|
||||
.I ks2
|
||||
are the same, it is equivalent to just encryption using cbc mode and
|
||||
.I ks1
|
||||
as the key.
|
||||
.PP
|
||||
.I des_pcbc_encrypt
|
||||
encrypt/decrypts using a modified block chaining mode.
|
||||
It provides better error propagation characteristics than cbc
|
||||
encryption.
|
||||
.PP
|
||||
.I des_cfb_encrypt
|
||||
encrypt/decrypts using cipher feedback mode. This method takes an
|
||||
array of characters as input and outputs and array of characters. It
|
||||
does not require any padding to 8 character groups. Note: the ivec
|
||||
variable is changed and the new changed value needs to be passed to
|
||||
the next call to this function. Since this function runs a complete
|
||||
DES ecb encryption per numbits, this function is only suggested for
|
||||
use when sending small numbers of characters.
|
||||
.PP
|
||||
.I des_ofb_encrypt
|
||||
encrypt using output feedback mode. This method takes an
|
||||
array of characters as input and outputs and array of characters. It
|
||||
does not require any padding to 8 character groups. Note: the ivec
|
||||
variable is changed and the new changed value needs to be passed to
|
||||
the next call to this function. Since this function runs a complete
|
||||
DES ecb encryption per numbits, this function is only suggested for
|
||||
use when sending small numbers of characters.
|
||||
.PP
|
||||
.I des_cbc_cksum
|
||||
produces an 8 byte checksum based on the input stream (via cbc encryption).
|
||||
The last 4 bytes of the checksum is returned and the complete 8 bytes is
|
||||
placed in
|
||||
.I output.
|
||||
.PP
|
||||
.I des_quad_cksum
|
||||
returns a 4 byte checksum from the input bytes.
|
||||
The algorithm can be iterated over the input,
|
||||
depending on
|
||||
.I out_count,
|
||||
1, 2, 3 or 4 times.
|
||||
If
|
||||
.I output
|
||||
is non-NULL,
|
||||
the 8 bytes generated by each pass are written into
|
||||
.I output.
|
||||
.PP
|
||||
.I des_enc_write
|
||||
is used to write
|
||||
.I len
|
||||
bytes
|
||||
to file descriptor
|
||||
.I fd
|
||||
from buffer
|
||||
.I buf.
|
||||
The data is encrypted via
|
||||
.I pcbc_encrypt
|
||||
(default) using
|
||||
.I sched
|
||||
for the key and
|
||||
.I iv
|
||||
as a starting vector.
|
||||
The actual data send down
|
||||
.I fd
|
||||
consists of 4 bytes (in network byte order) containing the length of the
|
||||
following encrypted data. The encrypted data then follows, padded with random
|
||||
data out to a multiple of 8 bytes.
|
||||
.PP
|
||||
.I des_enc_read
|
||||
is used to read
|
||||
.I len
|
||||
bytes
|
||||
from file descriptor
|
||||
.I fd
|
||||
into buffer
|
||||
.I buf.
|
||||
The data being read from
|
||||
.I fd
|
||||
is assumed to have come from
|
||||
.I des_enc_write
|
||||
and is decrypted using
|
||||
.I sched
|
||||
for the key schedule and
|
||||
.I iv
|
||||
for the initial vector.
|
||||
The
|
||||
.I des_enc_read/des_enc_write
|
||||
pair can be used to read/write to files, pipes and sockets.
|
||||
I have used them in implementing a version of rlogin in which all
|
||||
data is encrypted.
|
||||
.PP
|
||||
.I des_rw_mode
|
||||
is used to specify the encryption mode to use with
|
||||
.I des_enc_read
|
||||
and
|
||||
.I des_end_write.
|
||||
If set to
|
||||
.I DES_PCBC_MODE
|
||||
(the default), des_pcbc_encrypt is used.
|
||||
If set to
|
||||
.I DES_CBC_MODE
|
||||
des_cbc_encrypt is used.
|
||||
These two routines and the variable are not part of the normal MIT library.
|
||||
.PP
|
||||
.I des_set_odd_parity
|
||||
sets the parity of the passed
|
||||
.I key
|
||||
to odd. This routine is not part of the standard MIT library.
|
||||
.PP
|
||||
.I des_is_weak_key
|
||||
returns 1 is the passed key is a weak key (pick again :-),
|
||||
0 if it is ok.
|
||||
This routine is not part of the standard MIT library.
|
||||
.PP
|
||||
.I crypt
|
||||
is a replacement for the normal system crypt.
|
||||
It is much faster than the system crypt.
|
||||
.PP
|
||||
.SH FILES
|
||||
/usr/include/des.h
|
||||
.br
|
||||
/usr/lib/libdes.a
|
||||
.PP
|
||||
The encryption routines have been tested on 16bit, 32bit and 64bit
|
||||
machines of various endian and even works under VMS.
|
||||
.PP
|
||||
.SH BUGS
|
||||
.PP
|
||||
If you think this manual is sparse,
|
||||
read the des_crypt(3) manual from the MIT kerberos (or bones outside
|
||||
of the USA) distribution.
|
||||
.PP
|
||||
.I des_cfb_encrypt
|
||||
and
|
||||
.I des_ofb_encrypt
|
||||
operates on input of 8 bits. What this means is that if you set
|
||||
numbits to 12, and length to 2, the first 12 bits will come from the 1st
|
||||
input byte and the low half of the second input byte. The second 12
|
||||
bits will have the low 8 bits taken from the 3rd input byte and the
|
||||
top 4 bits taken from the 4th input byte. The same holds for output.
|
||||
This function has been implemented this way because most people will
|
||||
be using a multiple of 8 and because once you get into pulling bytes input
|
||||
bytes apart things get ugly!
|
||||
.PP
|
||||
.I des_read_pw_string
|
||||
is the most machine/OS dependent function and normally generates the
|
||||
most problems when porting this code.
|
||||
.PP
|
||||
.I des_string_to_key
|
||||
is probably different from the MIT version since there are lots
|
||||
of fun ways to implement one-way encryption of a text string.
|
||||
.PP
|
||||
The routines are optimised for 32 bit machines and so are not efficient
|
||||
on IBM PCs.
|
||||
.PP
|
||||
NOTE: extensive work has been done on this library since this document
|
||||
was origionally written. Please try to read des.doc from the libdes
|
||||
distribution since it is far more upto date and documents more of the
|
||||
functions. Libdes is now also being shipped as part of SSLeay, a
|
||||
general cryptographic library that amonst other things implements
|
||||
netscapes SSL protocoll. The most recent version can be found in
|
||||
SSLeay distributions.
|
||||
.SH AUTHOR
|
||||
Eric Young (eay@mincom.oz.au or eay@psych.psy.uq.oz.au)
|
||||
@@ -1,301 +0,0 @@
|
||||
/* crypto/des/des_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
void DES_encrypt(data, ks, encrypt)
|
||||
DES_LONG *data;
|
||||
DES_key_schedule *ks;
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG l,r,t,u;
|
||||
#ifdef DES_PTR
|
||||
register unsigned char *des_SP=(unsigned char *)des_SPtrans;
|
||||
#endif
|
||||
#ifndef DES_UNROLL
|
||||
register int i;
|
||||
#endif
|
||||
register DES_LONG *s;
|
||||
|
||||
r=data[0];
|
||||
l=data[1];
|
||||
|
||||
IP(r,l);
|
||||
/* Things have been modified so that the initial rotate is
|
||||
* done outside the loop. This required the
|
||||
* des_SPtrans values in sp.h to be rotated 1 bit to the right.
|
||||
* One perl script later and things have a 5% speed up on a sparc2.
|
||||
* Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
|
||||
* for pointing this out. */
|
||||
/* clear the top bits on machines with 8byte longs */
|
||||
/* shift left by 2 */
|
||||
r=ROTATE(r,29)&0xffffffffL;
|
||||
l=ROTATE(l,29)&0xffffffffL;
|
||||
|
||||
s=(DES_LONG *)ks;
|
||||
/* I don't know if it is worth the effort of loop unrolling the
|
||||
* inner loop */
|
||||
if (encrypt)
|
||||
{
|
||||
#ifdef DES_UNROLL
|
||||
D_ENCRYPT(l,r, 0); /* 1 */
|
||||
D_ENCRYPT(r,l, 2); /* 2 */
|
||||
D_ENCRYPT(l,r, 4); /* 3 */
|
||||
D_ENCRYPT(r,l, 6); /* 4 */
|
||||
D_ENCRYPT(l,r, 8); /* 5 */
|
||||
D_ENCRYPT(r,l,10); /* 6 */
|
||||
D_ENCRYPT(l,r,12); /* 7 */
|
||||
D_ENCRYPT(r,l,14); /* 8 */
|
||||
D_ENCRYPT(l,r,16); /* 9 */
|
||||
D_ENCRYPT(r,l,18); /* 10 */
|
||||
D_ENCRYPT(l,r,20); /* 11 */
|
||||
D_ENCRYPT(r,l,22); /* 12 */
|
||||
D_ENCRYPT(l,r,24); /* 13 */
|
||||
D_ENCRYPT(r,l,26); /* 14 */
|
||||
D_ENCRYPT(l,r,28); /* 15 */
|
||||
D_ENCRYPT(r,l,30); /* 16 */
|
||||
#else
|
||||
for (i=0; i<32; i+=8)
|
||||
{
|
||||
D_ENCRYPT(l,r,i+0); /* 1 */
|
||||
D_ENCRYPT(r,l,i+2); /* 2 */
|
||||
D_ENCRYPT(l,r,i+4); /* 3 */
|
||||
D_ENCRYPT(r,l,i+6); /* 4 */
|
||||
}
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
#ifdef DES_UNROLL
|
||||
D_ENCRYPT(l,r,30); /* 16 */
|
||||
D_ENCRYPT(r,l,28); /* 15 */
|
||||
D_ENCRYPT(l,r,26); /* 14 */
|
||||
D_ENCRYPT(r,l,24); /* 13 */
|
||||
D_ENCRYPT(l,r,22); /* 12 */
|
||||
D_ENCRYPT(r,l,20); /* 11 */
|
||||
D_ENCRYPT(l,r,18); /* 10 */
|
||||
D_ENCRYPT(r,l,16); /* 9 */
|
||||
D_ENCRYPT(l,r,14); /* 8 */
|
||||
D_ENCRYPT(r,l,12); /* 7 */
|
||||
D_ENCRYPT(l,r,10); /* 6 */
|
||||
D_ENCRYPT(r,l, 8); /* 5 */
|
||||
D_ENCRYPT(l,r, 6); /* 4 */
|
||||
D_ENCRYPT(r,l, 4); /* 3 */
|
||||
D_ENCRYPT(l,r, 2); /* 2 */
|
||||
D_ENCRYPT(r,l, 0); /* 1 */
|
||||
#else
|
||||
for (i=30; i>0; i-=8)
|
||||
{
|
||||
D_ENCRYPT(l,r,i-0); /* 16 */
|
||||
D_ENCRYPT(r,l,i-2); /* 15 */
|
||||
D_ENCRYPT(l,r,i-4); /* 14 */
|
||||
D_ENCRYPT(r,l,i-6); /* 13 */
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
/* rotate and clear the top bits on machines with 8byte longs */
|
||||
l=ROTATE(l,3)&0xffffffffL;
|
||||
r=ROTATE(r,3)&0xffffffffL;
|
||||
|
||||
FP(r,l);
|
||||
data[0]=l;
|
||||
data[1]=r;
|
||||
l=r=t=u=0;
|
||||
}
|
||||
|
||||
void DES_encrypt2(data, ks, encrypt)
|
||||
DES_LONG *data;
|
||||
DES_key_schedule *ks;
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG l,r,t,u;
|
||||
#ifdef DES_PTR
|
||||
register unsigned char *des_SP=(unsigned char *)des_SPtrans;
|
||||
#endif
|
||||
#ifndef DES_UNROLL
|
||||
register int i;
|
||||
#endif
|
||||
register DES_LONG *s;
|
||||
|
||||
r=data[0];
|
||||
l=data[1];
|
||||
|
||||
/* Things have been modified so that the initial rotate is
|
||||
* done outside the loop. This required the
|
||||
* des_SPtrans values in sp.h to be rotated 1 bit to the right.
|
||||
* One perl script later and things have a 5% speed up on a sparc2.
|
||||
* Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
|
||||
* for pointing this out. */
|
||||
/* clear the top bits on machines with 8byte longs */
|
||||
r=ROTATE(r,29)&0xffffffff;
|
||||
l=ROTATE(l,29)&0xffffffff;
|
||||
|
||||
s=(DES_LONG *)ks;
|
||||
/* I don't know if it is worth the effort of loop unrolling the
|
||||
* inner loop */
|
||||
if (encrypt)
|
||||
{
|
||||
#ifdef DES_UNROLL
|
||||
D_ENCRYPT(l,r, 0); /* 1 */
|
||||
D_ENCRYPT(r,l, 2); /* 2 */
|
||||
D_ENCRYPT(l,r, 4); /* 3 */
|
||||
D_ENCRYPT(r,l, 6); /* 4 */
|
||||
D_ENCRYPT(l,r, 8); /* 5 */
|
||||
D_ENCRYPT(r,l,10); /* 6 */
|
||||
D_ENCRYPT(l,r,12); /* 7 */
|
||||
D_ENCRYPT(r,l,14); /* 8 */
|
||||
D_ENCRYPT(l,r,16); /* 9 */
|
||||
D_ENCRYPT(r,l,18); /* 10 */
|
||||
D_ENCRYPT(l,r,20); /* 11 */
|
||||
D_ENCRYPT(r,l,22); /* 12 */
|
||||
D_ENCRYPT(l,r,24); /* 13 */
|
||||
D_ENCRYPT(r,l,26); /* 14 */
|
||||
D_ENCRYPT(l,r,28); /* 15 */
|
||||
D_ENCRYPT(r,l,30); /* 16 */
|
||||
#else
|
||||
for (i=0; i<32; i+=8)
|
||||
{
|
||||
D_ENCRYPT(l,r,i+0); /* 1 */
|
||||
D_ENCRYPT(r,l,i+2); /* 2 */
|
||||
D_ENCRYPT(l,r,i+4); /* 3 */
|
||||
D_ENCRYPT(r,l,i+6); /* 4 */
|
||||
}
|
||||
#endif
|
||||
}
|
||||
else
|
||||
{
|
||||
#ifdef DES_UNROLL
|
||||
D_ENCRYPT(l,r,30); /* 16 */
|
||||
D_ENCRYPT(r,l,28); /* 15 */
|
||||
D_ENCRYPT(l,r,26); /* 14 */
|
||||
D_ENCRYPT(r,l,24); /* 13 */
|
||||
D_ENCRYPT(l,r,22); /* 12 */
|
||||
D_ENCRYPT(r,l,20); /* 11 */
|
||||
D_ENCRYPT(l,r,18); /* 10 */
|
||||
D_ENCRYPT(r,l,16); /* 9 */
|
||||
D_ENCRYPT(l,r,14); /* 8 */
|
||||
D_ENCRYPT(r,l,12); /* 7 */
|
||||
D_ENCRYPT(l,r,10); /* 6 */
|
||||
D_ENCRYPT(r,l, 8); /* 5 */
|
||||
D_ENCRYPT(l,r, 6); /* 4 */
|
||||
D_ENCRYPT(r,l, 4); /* 3 */
|
||||
D_ENCRYPT(l,r, 2); /* 2 */
|
||||
D_ENCRYPT(r,l, 0); /* 1 */
|
||||
#else
|
||||
for (i=30; i>0; i-=8)
|
||||
{
|
||||
D_ENCRYPT(l,r,i-0); /* 16 */
|
||||
D_ENCRYPT(r,l,i-2); /* 15 */
|
||||
D_ENCRYPT(l,r,i-4); /* 14 */
|
||||
D_ENCRYPT(r,l,i-6); /* 13 */
|
||||
}
|
||||
#endif
|
||||
}
|
||||
/* rotate and clear the top bits on machines with 8byte longs */
|
||||
data[0]=ROTATE(l,3)&0xffffffff;
|
||||
data[1]=ROTATE(r,3)&0xffffffff;
|
||||
l=r=t=u=0;
|
||||
}
|
||||
|
||||
void DES_encrypt3(data,ks1,ks2,ks3)
|
||||
DES_LONG *data;
|
||||
DES_key_schedule *ks1;
|
||||
DES_key_schedule *ks2;
|
||||
DES_key_schedule *ks3;
|
||||
{
|
||||
register DES_LONG l,r;
|
||||
|
||||
l=data[0];
|
||||
r=data[1];
|
||||
IP(l,r);
|
||||
data[0]=l;
|
||||
data[1]=r;
|
||||
DES_encrypt2((DES_LONG *)data,ks1,DES_ENCRYPT);
|
||||
DES_encrypt2((DES_LONG *)data,ks2,DES_DECRYPT);
|
||||
DES_encrypt2((DES_LONG *)data,ks3,DES_ENCRYPT);
|
||||
l=data[0];
|
||||
r=data[1];
|
||||
FP(r,l);
|
||||
data[0]=l;
|
||||
data[1]=r;
|
||||
}
|
||||
|
||||
void DES_decrypt3(data,ks1,ks2,ks3)
|
||||
DES_LONG *data;
|
||||
DES_key_schedule *ks1;
|
||||
DES_key_schedule *ks2;
|
||||
DES_key_schedule *ks3;
|
||||
{
|
||||
register DES_LONG l,r;
|
||||
|
||||
l=data[0];
|
||||
r=data[1];
|
||||
IP(l,r);
|
||||
data[0]=l;
|
||||
data[1]=r;
|
||||
DES_encrypt2((DES_LONG *)data,ks3,DES_DECRYPT);
|
||||
DES_encrypt2((DES_LONG *)data,ks2,DES_ENCRYPT);
|
||||
DES_encrypt2((DES_LONG *)data,ks1,DES_DECRYPT);
|
||||
l=data[0];
|
||||
r=data[1];
|
||||
FP(r,l);
|
||||
data[0]=l;
|
||||
data[1]=r;
|
||||
}
|
||||
|
||||
@@ -1,535 +0,0 @@
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include "config.h"
|
||||
|
||||
/*
|
||||
if (we have termios.h)
|
||||
define TERMIOS
|
||||
else if (we have termio.h)
|
||||
define TERMIO
|
||||
*/
|
||||
#ifdef HAVE_TERMIOS_H
|
||||
|
||||
#define TERMIOS
|
||||
|
||||
#else /* !HAVE_TERMIOS_H */
|
||||
|
||||
#ifdef HAVE_TERMIO_H
|
||||
#define TERMIO
|
||||
#endif
|
||||
|
||||
#endif /* !HAVE_TERMIOS_H */
|
||||
|
||||
#endif /* HAVE_CONFIG_H */
|
||||
|
||||
/* crypto/des/des_locl.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/* WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
|
||||
*
|
||||
* Always modify des_locl.org since des_locl.h is automatically generated from
|
||||
* it during SSLeay configuration.
|
||||
*
|
||||
* WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
|
||||
*/
|
||||
|
||||
#ifndef HEADER_DES_LOCL_H
|
||||
#define HEADER_DES_LOCL_H
|
||||
|
||||
#if defined(WIN32) || defined(WIN16)
|
||||
#ifndef MSDOS
|
||||
#define MSDOS
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#ifdef HAVE_UNISTD_H
|
||||
#include <unistd.h>
|
||||
#endif
|
||||
#ifdef HAVE_IO_H
|
||||
#include <io.h>
|
||||
#endif
|
||||
#include "des.h"
|
||||
|
||||
#ifndef DES_DEFAULT_OPTIONS
|
||||
/* the following is tweaked from a config script, that is why it is a
|
||||
* protected undef/define */
|
||||
#ifndef DES_PTR
|
||||
#undef DES_PTR
|
||||
#endif
|
||||
|
||||
/* This helps C compiler generate the correct code for multiple functional
|
||||
* units. It reduces register dependancies at the expense of 2 more
|
||||
* registers */
|
||||
#ifndef DES_RISC1
|
||||
#undef DES_RISC1
|
||||
#endif
|
||||
|
||||
#ifndef DES_RISC2
|
||||
#undef DES_RISC2
|
||||
#endif
|
||||
|
||||
#if defined(DES_RISC1) && defined(DES_RISC2)
|
||||
YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED!!!!!
|
||||
#endif
|
||||
|
||||
/* Unroll the inner loop, this sometimes helps, sometimes hinders.
|
||||
* Very mucy CPU dependant */
|
||||
#ifndef DES_UNROLL
|
||||
#undef DES_UNROLL
|
||||
#endif
|
||||
|
||||
/* These default values were supplied by
|
||||
* Peter Gutman <pgut001@cs.auckland.ac.nz>
|
||||
* They are only used if nothing else has been defined */
|
||||
#if !defined(DES_PTR) && !defined(DES_RISC1) && !defined(DES_RISC2) && !defined(DES_UNROLL)
|
||||
/* Special defines which change the way the code is built depending on the
|
||||
CPU and OS. For SGI machines you can use _MIPS_SZLONG (32 or 64) to find
|
||||
even newer MIPS CPU's, but at the moment one size fits all for
|
||||
optimization options. Older Sparc's work better with only UNROLL, but
|
||||
there's no way to tell at compile time what it is you're running on */
|
||||
|
||||
#if defined( sun ) /* Newer Sparc's */
|
||||
#define DES_PTR
|
||||
#define DES_RISC1
|
||||
#define DES_UNROLL
|
||||
#elif defined( __ultrix ) /* Older MIPS */
|
||||
#define DES_PTR
|
||||
#define DES_RISC2
|
||||
#define DES_UNROLL
|
||||
#elif defined( __osf1__ ) /* Alpha */
|
||||
#define DES_PTR
|
||||
#define DES_RISC2
|
||||
#elif defined ( _AIX ) /* RS6000 */
|
||||
/* Unknown */
|
||||
#elif defined( __hpux ) /* HP-PA */
|
||||
#define DES_UNROLL
|
||||
#elif defined( __aux ) /* 68K */
|
||||
/* Unknown */
|
||||
#elif defined( __dgux ) /* 88K (but P6 in latest boxes) */
|
||||
#define DES_UNROLL
|
||||
#elif defined( __sgi ) /* Newer MIPS */
|
||||
#define DES_PTR
|
||||
#define DES_RISC2
|
||||
#define DES_UNROLL
|
||||
#elif defined( i386 ) /* x86 boxes, should be gcc */
|
||||
#define DES_PTR
|
||||
#define DES_RISC1
|
||||
#define DES_UNROLL
|
||||
#endif /* Systems-specific speed defines */
|
||||
#endif
|
||||
|
||||
#endif /* DES_DEFAULT_OPTIONS */
|
||||
|
||||
#ifdef MSDOS /* Visual C++ 2.1 (Windows NT/95) */
|
||||
#include <stdlib.h>
|
||||
#include <errno.h>
|
||||
#include <time.h>
|
||||
#include <io.h>
|
||||
#ifndef RAND
|
||||
#define RAND
|
||||
#endif
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
|
||||
#if defined(__STDC__) || defined(VMS) || defined(M_XENIX) || defined(MSDOS) || defined(WIN32)
|
||||
#include <string.h>
|
||||
#endif
|
||||
|
||||
#ifndef RAND
|
||||
#define RAND
|
||||
#endif
|
||||
|
||||
#ifdef linux
|
||||
#undef RAND
|
||||
#endif
|
||||
|
||||
#ifdef MSDOS
|
||||
#define getpid() 2
|
||||
#define RAND
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
|
||||
#if defined(NOCONST)
|
||||
#define const
|
||||
#endif
|
||||
|
||||
#ifdef __STDC__
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
|
||||
#ifdef RAND
|
||||
#define srandom(s) srand(s)
|
||||
#define random rand
|
||||
#endif
|
||||
|
||||
#define ITERATIONS 16
|
||||
#define HALF_ITERATIONS 8
|
||||
|
||||
/* used in des_read and des_write */
|
||||
#define MAXWRITE (1024*16)
|
||||
#define des_BSIZE (MAXWRITE+4)
|
||||
|
||||
#define c2l(c,l) (l =((DES_LONG)(*((c)++))) , \
|
||||
l|=((DES_LONG)(*((c)++)))<< 8L, \
|
||||
l|=((DES_LONG)(*((c)++)))<<16L, \
|
||||
l|=((DES_LONG)(*((c)++)))<<24L)
|
||||
|
||||
/* NOTE - c is not incremented as per c2l */
|
||||
#define c2ln(c,l1,l2,n) { \
|
||||
c+=n; \
|
||||
l1=l2=0; \
|
||||
switch (n) { \
|
||||
case 8: l2 =((DES_LONG)(*(--(c))))<<24L; \
|
||||
case 7: l2|=((DES_LONG)(*(--(c))))<<16L; \
|
||||
case 6: l2|=((DES_LONG)(*(--(c))))<< 8L; \
|
||||
case 5: l2|=((DES_LONG)(*(--(c)))); \
|
||||
case 4: l1 =((DES_LONG)(*(--(c))))<<24L; \
|
||||
case 3: l1|=((DES_LONG)(*(--(c))))<<16L; \
|
||||
case 2: l1|=((DES_LONG)(*(--(c))))<< 8L; \
|
||||
case 1: l1|=((DES_LONG)(*(--(c)))); \
|
||||
} \
|
||||
}
|
||||
|
||||
#define l2c(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>16L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>24L)&0xff))
|
||||
|
||||
/* replacements for htonl and ntohl since I have no idea what to do
|
||||
* when faced with machines with 8 byte longs. */
|
||||
#define HDRSIZE 4
|
||||
|
||||
#define n2l(c,l) (l =((DES_LONG)(*((c)++)))<<24L, \
|
||||
l|=((DES_LONG)(*((c)++)))<<16L, \
|
||||
l|=((DES_LONG)(*((c)++)))<< 8L, \
|
||||
l|=((DES_LONG)(*((c)++))))
|
||||
|
||||
#define l2n(l,c) (*((c)++)=(unsigned char)(((l)>>24L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>16L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l) )&0xff))
|
||||
|
||||
/* NOTE - c is not incremented as per l2c */
|
||||
#define l2cn(l1,l2,c,n) { \
|
||||
c+=n; \
|
||||
switch (n) { \
|
||||
case 8: *(--(c))=(unsigned char)(((l2)>>24L)&0xff); \
|
||||
case 7: *(--(c))=(unsigned char)(((l2)>>16L)&0xff); \
|
||||
case 6: *(--(c))=(unsigned char)(((l2)>> 8L)&0xff); \
|
||||
case 5: *(--(c))=(unsigned char)(((l2) )&0xff); \
|
||||
case 4: *(--(c))=(unsigned char)(((l1)>>24L)&0xff); \
|
||||
case 3: *(--(c))=(unsigned char)(((l1)>>16L)&0xff); \
|
||||
case 2: *(--(c))=(unsigned char)(((l1)>> 8L)&0xff); \
|
||||
case 1: *(--(c))=(unsigned char)(((l1) )&0xff); \
|
||||
} \
|
||||
}
|
||||
|
||||
#if defined(WIN32)
|
||||
#define ROTATE(a,n) (_lrotr(a,n))
|
||||
#else
|
||||
#define ROTATE(a,n) (((a)>>(n))+((a)<<(32-(n))))
|
||||
#endif
|
||||
|
||||
/* Don't worry about the LOAD_DATA() stuff, that is used by
|
||||
* fcrypt() to add it's little bit to the front */
|
||||
|
||||
#ifdef DES_FCRYPT
|
||||
|
||||
#define LOAD_DATA_tmp(R,S,u,t,E0,E1) \
|
||||
{ DES_LONG tmp; LOAD_DATA(R,S,u,t,E0,E1,tmp); }
|
||||
|
||||
#define LOAD_DATA(R,S,u,t,E0,E1,tmp) \
|
||||
t=R^(R>>16L); \
|
||||
u=t&E0; t&=E1; \
|
||||
tmp=(u<<16); u^=R^s[S ]; u^=tmp; \
|
||||
tmp=(t<<16); t^=R^s[S+1]; t^=tmp
|
||||
#else
|
||||
#define LOAD_DATA_tmp(a,b,c,d,e,f) LOAD_DATA(a,b,c,d,e,f,g)
|
||||
#define LOAD_DATA(R,S,u,t,E0,E1,tmp) \
|
||||
u=R^s[S ]; \
|
||||
t=R^s[S+1]
|
||||
#endif
|
||||
|
||||
/* The changes to this macro may help or hinder, depending on the
|
||||
* compiler and the achitecture. gcc2 always seems to do well :-).
|
||||
* Inspired by Dana How <how@isl.stanford.edu>
|
||||
* DO NOT use the alternative version on machines with 8 byte longs.
|
||||
* It does not seem to work on the Alpha, even when DES_LONG is 4
|
||||
* bytes, probably an issue of accessing non-word aligned objects :-( */
|
||||
#ifdef DES_PTR
|
||||
|
||||
/* It recently occured to me that 0^0^0^0^0^0^0 == 0, so there
|
||||
* is no reason to not xor all the sub items together. This potentially
|
||||
* saves a register since things can be xored directly into L */
|
||||
|
||||
#if defined(DES_RISC1) || defined(DES_RISC2)
|
||||
#ifdef DES_RISC1
|
||||
#define D_ENCRYPT(LL,R,S) { \
|
||||
unsigned int u1,u2,u3; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0xfc; \
|
||||
u2&=0xfc; \
|
||||
t=ROTATE(t,4); \
|
||||
u>>=16L; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP +u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x200+u2); \
|
||||
u3=(int)(u>>8L); \
|
||||
u1=(int)u&0xfc; \
|
||||
u3&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x400+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x600+u3); \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0xfc; \
|
||||
u2&=0xfc; \
|
||||
t>>=16L; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x100+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x300+u2); \
|
||||
u3=(int)t>>8L; \
|
||||
u1=(int)t&0xfc; \
|
||||
u3&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x500+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x700+u3); }
|
||||
#endif
|
||||
#ifdef DES_RISC2
|
||||
#define D_ENCRYPT(LL,R,S) { \
|
||||
unsigned int u1,u2,s1,s2; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0xfc; \
|
||||
u2&=0xfc; \
|
||||
t=ROTATE(t,4); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP +u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x200+u2); \
|
||||
s1=(int)(u>>16L); \
|
||||
s2=(int)(u>>24L); \
|
||||
s1&=0xfc; \
|
||||
s2&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x400+s1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x600+s2); \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0xfc; \
|
||||
u2&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x100+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x300+u2); \
|
||||
s1=(int)(t>>16L); \
|
||||
s2=(int)(t>>24L); \
|
||||
s1&=0xfc; \
|
||||
s2&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x500+s1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x700+s2); }
|
||||
#endif
|
||||
#else
|
||||
#define D_ENCRYPT(LL,R,S) { \
|
||||
LOAD_DATA_tmp(R,S,u,t,E0,E1); \
|
||||
t=ROTATE(t,4); \
|
||||
LL^= \
|
||||
*(DES_LONG *)((unsigned char *)des_SP +((u )&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x200+((u>> 8L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x400+((u>>16L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x600+((u>>24L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x100+((t )&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x300+((t>> 8L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x500+((t>>16L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x700+((t>>24L)&0xfc)); }
|
||||
#endif
|
||||
|
||||
#else /* original version */
|
||||
|
||||
#if defined(DES_RISC1) || defined(DES_RISC2)
|
||||
#ifdef DES_RISC1
|
||||
#define D_ENCRYPT(LL,R,S) {\
|
||||
unsigned int u1,u2,u3; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u>>=2L; \
|
||||
t=ROTATE(t,6); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0x3f; \
|
||||
u2&=0x3f; \
|
||||
u>>=16L; \
|
||||
LL^=des_SPtrans[0][u1]; \
|
||||
LL^=des_SPtrans[2][u2]; \
|
||||
u3=(int)u>>8L; \
|
||||
u1=(int)u&0x3f; \
|
||||
u3&=0x3f; \
|
||||
LL^=des_SPtrans[4][u1]; \
|
||||
LL^=des_SPtrans[6][u3]; \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0x3f; \
|
||||
u2&=0x3f; \
|
||||
t>>=16L; \
|
||||
LL^=des_SPtrans[1][u1]; \
|
||||
LL^=des_SPtrans[3][u2]; \
|
||||
u3=(int)t>>8L; \
|
||||
u1=(int)t&0x3f; \
|
||||
u3&=0x3f; \
|
||||
LL^=des_SPtrans[5][u1]; \
|
||||
LL^=des_SPtrans[7][u3]; }
|
||||
#endif
|
||||
#ifdef DES_RISC2
|
||||
#define D_ENCRYPT(LL,R,S) {\
|
||||
unsigned int u1,u2,s1,s2; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u>>=2L; \
|
||||
t=ROTATE(t,6); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0x3f; \
|
||||
u2&=0x3f; \
|
||||
LL^=des_SPtrans[0][u1]; \
|
||||
LL^=des_SPtrans[2][u2]; \
|
||||
s1=(int)u>>16L; \
|
||||
s2=(int)u>>24L; \
|
||||
s1&=0x3f; \
|
||||
s2&=0x3f; \
|
||||
LL^=des_SPtrans[4][s1]; \
|
||||
LL^=des_SPtrans[6][s2]; \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0x3f; \
|
||||
u2&=0x3f; \
|
||||
LL^=des_SPtrans[1][u1]; \
|
||||
LL^=des_SPtrans[3][u2]; \
|
||||
s1=(int)t>>16; \
|
||||
s2=(int)t>>24L; \
|
||||
s1&=0x3f; \
|
||||
s2&=0x3f; \
|
||||
LL^=des_SPtrans[5][s1]; \
|
||||
LL^=des_SPtrans[7][s2]; }
|
||||
#endif
|
||||
|
||||
#else
|
||||
|
||||
#define D_ENCRYPT(LL,R,S) {\
|
||||
LOAD_DATA_tmp(R,S,u,t,E0,E1); \
|
||||
t=ROTATE(t,4); \
|
||||
LL^=\
|
||||
des_SPtrans[0][(u>> 2L)&0x3f]^ \
|
||||
des_SPtrans[2][(u>>10L)&0x3f]^ \
|
||||
des_SPtrans[4][(u>>18L)&0x3f]^ \
|
||||
des_SPtrans[6][(u>>26L)&0x3f]^ \
|
||||
des_SPtrans[1][(t>> 2L)&0x3f]^ \
|
||||
des_SPtrans[3][(t>>10L)&0x3f]^ \
|
||||
des_SPtrans[5][(t>>18L)&0x3f]^ \
|
||||
des_SPtrans[7][(t>>26L)&0x3f]; }
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* IP and FP
|
||||
* The problem is more of a geometric problem that random bit fiddling.
|
||||
0 1 2 3 4 5 6 7 62 54 46 38 30 22 14 6
|
||||
8 9 10 11 12 13 14 15 60 52 44 36 28 20 12 4
|
||||
16 17 18 19 20 21 22 23 58 50 42 34 26 18 10 2
|
||||
24 25 26 27 28 29 30 31 to 56 48 40 32 24 16 8 0
|
||||
|
||||
32 33 34 35 36 37 38 39 63 55 47 39 31 23 15 7
|
||||
40 41 42 43 44 45 46 47 61 53 45 37 29 21 13 5
|
||||
48 49 50 51 52 53 54 55 59 51 43 35 27 19 11 3
|
||||
56 57 58 59 60 61 62 63 57 49 41 33 25 17 9 1
|
||||
|
||||
The output has been subject to swaps of the form
|
||||
0 1 -> 3 1 but the odd and even bits have been put into
|
||||
2 3 2 0
|
||||
different words. The main trick is to remember that
|
||||
t=((l>>size)^r)&(mask);
|
||||
r^=t;
|
||||
l^=(t<<size);
|
||||
can be used to swap and move bits between words.
|
||||
|
||||
So l = 0 1 2 3 r = 16 17 18 19
|
||||
4 5 6 7 20 21 22 23
|
||||
8 9 10 11 24 25 26 27
|
||||
12 13 14 15 28 29 30 31
|
||||
becomes (for size == 2 and mask == 0x3333)
|
||||
t = 2^16 3^17 -- -- l = 0 1 16 17 r = 2 3 18 19
|
||||
6^20 7^21 -- -- 4 5 20 21 6 7 22 23
|
||||
10^24 11^25 -- -- 8 9 24 25 10 11 24 25
|
||||
14^28 15^29 -- -- 12 13 28 29 14 15 28 29
|
||||
|
||||
Thanks for hints from Richard Outerbridge - he told me IP&FP
|
||||
could be done in 15 xor, 10 shifts and 5 ands.
|
||||
When I finally started to think of the problem in 2D
|
||||
I first got ~42 operations without xors. When I remembered
|
||||
how to use xors :-) I got it to its final state.
|
||||
*/
|
||||
#define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
|
||||
(b)^=(t),\
|
||||
(a)^=((t)<<(n)))
|
||||
|
||||
#define IP(l,r) \
|
||||
{ \
|
||||
register DES_LONG tt; \
|
||||
PERM_OP(r,l,tt, 4,0x0f0f0f0fL); \
|
||||
PERM_OP(l,r,tt,16,0x0000ffffL); \
|
||||
PERM_OP(r,l,tt, 2,0x33333333L); \
|
||||
PERM_OP(l,r,tt, 8,0x00ff00ffL); \
|
||||
PERM_OP(r,l,tt, 1,0x55555555L); \
|
||||
}
|
||||
|
||||
#define FP(l,r) \
|
||||
{ \
|
||||
register DES_LONG tt; \
|
||||
PERM_OP(l,r,tt, 1,0x55555555L); \
|
||||
PERM_OP(r,l,tt, 8,0x00ff00ffL); \
|
||||
PERM_OP(l,r,tt, 2,0x33333333L); \
|
||||
PERM_OP(r,l,tt,16,0x0000ffffL); \
|
||||
PERM_OP(l,r,tt, 4,0x0f0f0f0fL); \
|
||||
}
|
||||
|
||||
extern const DES_LONG des_SPtrans[8][64];
|
||||
|
||||
#endif
|
||||
@@ -1,509 +0,0 @@
|
||||
/* crypto/des/des_locl.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/* WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
|
||||
*
|
||||
* Always modify des_locl.org since des_locl.h is automatically generated from
|
||||
* it during SSLeay configuration.
|
||||
*
|
||||
* WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
|
||||
*/
|
||||
|
||||
#ifndef HEADER_DES_LOCL_H
|
||||
#define HEADER_DES_LOCL_H
|
||||
|
||||
#if defined(WIN32) || defined(WIN16)
|
||||
#ifndef MSDOS
|
||||
#define MSDOS
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#ifndef MSDOS
|
||||
#include <unistd.h>
|
||||
#endif
|
||||
#include "des.h"
|
||||
|
||||
#ifndef DES_DEFAULT_OPTIONS
|
||||
/* the following is tweaked from a config script, that is why it is a
|
||||
* protected undef/define */
|
||||
#ifndef DES_PTR
|
||||
#undef DES_PTR
|
||||
#endif
|
||||
|
||||
/* This helps C compiler generate the correct code for multiple functional
|
||||
* units. It reduces register dependancies at the expense of 2 more
|
||||
* registers */
|
||||
#ifndef DES_RISC1
|
||||
#undef DES_RISC1
|
||||
#endif
|
||||
|
||||
#ifndef DES_RISC2
|
||||
#undef DES_RISC2
|
||||
#endif
|
||||
|
||||
#if defined(DES_RISC1) && defined(DES_RISC2)
|
||||
YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED!!!!!
|
||||
#endif
|
||||
|
||||
/* Unroll the inner loop, this sometimes helps, sometimes hinders.
|
||||
* Very mucy CPU dependant */
|
||||
#ifndef DES_UNROLL
|
||||
#undef DES_UNROLL
|
||||
#endif
|
||||
|
||||
/* These default values were supplied by
|
||||
* Peter Gutman <pgut001@cs.auckland.ac.nz>
|
||||
* They are only used if nothing else has been defined */
|
||||
#if !defined(DES_PTR) && !defined(DES_RISC1) && !defined(DES_RISC2) && !defined(DES_UNROLL)
|
||||
/* Special defines which change the way the code is built depending on the
|
||||
CPU and OS. For SGI machines you can use _MIPS_SZLONG (32 or 64) to find
|
||||
even newer MIPS CPU's, but at the moment one size fits all for
|
||||
optimization options. Older Sparc's work better with only UNROLL, but
|
||||
there's no way to tell at compile time what it is you're running on */
|
||||
|
||||
#if defined( sun ) /* Newer Sparc's */
|
||||
#define DES_PTR
|
||||
#define DES_RISC1
|
||||
#define DES_UNROLL
|
||||
#elif defined( __ultrix ) /* Older MIPS */
|
||||
#define DES_PTR
|
||||
#define DES_RISC2
|
||||
#define DES_UNROLL
|
||||
#elif defined( __osf1__ ) /* Alpha */
|
||||
#define DES_PTR
|
||||
#define DES_RISC2
|
||||
#elif defined ( _AIX ) /* RS6000 */
|
||||
/* Unknown */
|
||||
#elif defined( __hpux ) /* HP-PA */
|
||||
/* Unknown */
|
||||
#elif defined( __aux ) /* 68K */
|
||||
/* Unknown */
|
||||
#elif defined( __dgux ) /* 88K (but P6 in latest boxes) */
|
||||
#define DES_UNROLL
|
||||
#elif defined( __sgi ) /* Newer MIPS */
|
||||
#define DES_PTR
|
||||
#define DES_RISC2
|
||||
#define DES_UNROLL
|
||||
#elif defined( i386 ) /* x86 boxes, should be gcc */
|
||||
#define DES_PTR
|
||||
#define DES_RISC1
|
||||
#define DES_UNROLL
|
||||
#endif /* Systems-specific speed defines */
|
||||
#endif
|
||||
|
||||
#endif /* DES_DEFAULT_OPTIONS */
|
||||
|
||||
#ifdef MSDOS /* Visual C++ 2.1 (Windows NT/95) */
|
||||
#include <stdlib.h>
|
||||
#include <errno.h>
|
||||
#include <time.h>
|
||||
#include <io.h>
|
||||
#ifndef RAND
|
||||
#define RAND
|
||||
#endif
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
|
||||
#if defined(__STDC__) || defined(VMS) || defined(M_XENIX) || defined(MSDOS)
|
||||
#include <string.h>
|
||||
#endif
|
||||
|
||||
#ifndef RAND
|
||||
#define RAND
|
||||
#endif
|
||||
|
||||
#ifdef linux
|
||||
#undef RAND
|
||||
#endif
|
||||
|
||||
#ifdef MSDOS
|
||||
#define getpid() 2
|
||||
#define RAND
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
|
||||
#if defined(NOCONST)
|
||||
#define const
|
||||
#endif
|
||||
|
||||
#ifdef __STDC__
|
||||
#undef NOPROTO
|
||||
#endif
|
||||
|
||||
#ifdef RAND
|
||||
#define srandom(s) srand(s)
|
||||
#define random rand
|
||||
#endif
|
||||
|
||||
#define ITERATIONS 16
|
||||
#define HALF_ITERATIONS 8
|
||||
|
||||
/* used in des_read and des_write */
|
||||
#define MAXWRITE (1024*16)
|
||||
#define BSIZE (MAXWRITE+4)
|
||||
|
||||
#define c2l(c,l) (l =((DES_LONG)(*((c)++))) , \
|
||||
l|=((DES_LONG)(*((c)++)))<< 8L, \
|
||||
l|=((DES_LONG)(*((c)++)))<<16L, \
|
||||
l|=((DES_LONG)(*((c)++)))<<24L)
|
||||
|
||||
/* NOTE - c is not incremented as per c2l */
|
||||
#define c2ln(c,l1,l2,n) { \
|
||||
c+=n; \
|
||||
l1=l2=0; \
|
||||
switch (n) { \
|
||||
case 8: l2 =((DES_LONG)(*(--(c))))<<24L; \
|
||||
case 7: l2|=((DES_LONG)(*(--(c))))<<16L; \
|
||||
case 6: l2|=((DES_LONG)(*(--(c))))<< 8L; \
|
||||
case 5: l2|=((DES_LONG)(*(--(c)))); \
|
||||
case 4: l1 =((DES_LONG)(*(--(c))))<<24L; \
|
||||
case 3: l1|=((DES_LONG)(*(--(c))))<<16L; \
|
||||
case 2: l1|=((DES_LONG)(*(--(c))))<< 8L; \
|
||||
case 1: l1|=((DES_LONG)(*(--(c)))); \
|
||||
} \
|
||||
}
|
||||
|
||||
#define l2c(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>16L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>24L)&0xff))
|
||||
|
||||
/* replacements for htonl and ntohl since I have no idea what to do
|
||||
* when faced with machines with 8 byte longs. */
|
||||
#define HDRSIZE 4
|
||||
|
||||
#define n2l(c,l) (l =((DES_LONG)(*((c)++)))<<24L, \
|
||||
l|=((DES_LONG)(*((c)++)))<<16L, \
|
||||
l|=((DES_LONG)(*((c)++)))<< 8L, \
|
||||
l|=((DES_LONG)(*((c)++))))
|
||||
|
||||
#define l2n(l,c) (*((c)++)=(unsigned char)(((l)>>24L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>>16L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l)>> 8L)&0xff), \
|
||||
*((c)++)=(unsigned char)(((l) )&0xff))
|
||||
|
||||
/* NOTE - c is not incremented as per l2c */
|
||||
#define l2cn(l1,l2,c,n) { \
|
||||
c+=n; \
|
||||
switch (n) { \
|
||||
case 8: *(--(c))=(unsigned char)(((l2)>>24L)&0xff); \
|
||||
case 7: *(--(c))=(unsigned char)(((l2)>>16L)&0xff); \
|
||||
case 6: *(--(c))=(unsigned char)(((l2)>> 8L)&0xff); \
|
||||
case 5: *(--(c))=(unsigned char)(((l2) )&0xff); \
|
||||
case 4: *(--(c))=(unsigned char)(((l1)>>24L)&0xff); \
|
||||
case 3: *(--(c))=(unsigned char)(((l1)>>16L)&0xff); \
|
||||
case 2: *(--(c))=(unsigned char)(((l1)>> 8L)&0xff); \
|
||||
case 1: *(--(c))=(unsigned char)(((l1) )&0xff); \
|
||||
} \
|
||||
}
|
||||
|
||||
#if defined(WIN32)
|
||||
#define ROTATE(a,n) (_lrotr(a,n))
|
||||
#else
|
||||
#define ROTATE(a,n) (((a)>>(n))+((a)<<(32-(n))))
|
||||
#endif
|
||||
|
||||
/* Don't worry about the LOAD_DATA() stuff, that is used by
|
||||
* fcrypt() to add it's little bit to the front */
|
||||
|
||||
#ifdef DES_FCRYPT
|
||||
|
||||
#define LOAD_DATA_tmp(R,S,u,t,E0,E1) \
|
||||
{ DES_LONG tmp; LOAD_DATA(R,S,u,t,E0,E1,tmp); }
|
||||
|
||||
#define LOAD_DATA(R,S,u,t,E0,E1,tmp) \
|
||||
t=R^(R>>16L); \
|
||||
u=t&E0; t&=E1; \
|
||||
tmp=(u<<16); u^=R^s[S ]; u^=tmp; \
|
||||
tmp=(t<<16); t^=R^s[S+1]; t^=tmp
|
||||
#else
|
||||
#define LOAD_DATA_tmp(a,b,c,d,e,f) LOAD_DATA(a,b,c,d,e,f,g)
|
||||
#define LOAD_DATA(R,S,u,t,E0,E1,tmp) \
|
||||
u=R^s[S ]; \
|
||||
t=R^s[S+1]
|
||||
#endif
|
||||
|
||||
/* The changes to this macro may help or hinder, depending on the
|
||||
* compiler and the achitecture. gcc2 always seems to do well :-).
|
||||
* Inspired by Dana How <how@isl.stanford.edu>
|
||||
* DO NOT use the alternative version on machines with 8 byte longs.
|
||||
* It does not seem to work on the Alpha, even when DES_LONG is 4
|
||||
* bytes, probably an issue of accessing non-word aligned objects :-( */
|
||||
#ifdef DES_PTR
|
||||
|
||||
/* It recently occured to me that 0^0^0^0^0^0^0 == 0, so there
|
||||
* is no reason to not xor all the sub items together. This potentially
|
||||
* saves a register since things can be xored directly into L */
|
||||
|
||||
#if defined(DES_RISC1) || defined(DES_RISC2)
|
||||
#ifdef DES_RISC1
|
||||
#define D_ENCRYPT(LL,R,S) { \
|
||||
unsigned int u1,u2,u3; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0xfc; \
|
||||
u2&=0xfc; \
|
||||
t=ROTATE(t,4); \
|
||||
u>>=16L; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP +u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x200+u2); \
|
||||
u3=(int)(u>>8L); \
|
||||
u1=(int)u&0xfc; \
|
||||
u3&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x400+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x600+u3); \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0xfc; \
|
||||
u2&=0xfc; \
|
||||
t>>=16L; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x100+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x300+u2); \
|
||||
u3=(int)t>>8L; \
|
||||
u1=(int)t&0xfc; \
|
||||
u3&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x500+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x700+u3); }
|
||||
#endif
|
||||
#ifdef DES_RISC2
|
||||
#define D_ENCRYPT(LL,R,S) { \
|
||||
unsigned int u1,u2,s1,s2; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0xfc; \
|
||||
u2&=0xfc; \
|
||||
t=ROTATE(t,4); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP +u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x200+u2); \
|
||||
s1=(int)(u>>16L); \
|
||||
s2=(int)(u>>24L); \
|
||||
s1&=0xfc; \
|
||||
s2&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x400+s1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x600+s2); \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0xfc; \
|
||||
u2&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x100+u1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x300+u2); \
|
||||
s1=(int)(t>>16L); \
|
||||
s2=(int)(t>>24L); \
|
||||
s1&=0xfc; \
|
||||
s2&=0xfc; \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x500+s1); \
|
||||
LL^= *(DES_LONG *)((unsigned char *)des_SP+0x700+s2); }
|
||||
#endif
|
||||
#else
|
||||
#define D_ENCRYPT(LL,R,S) { \
|
||||
LOAD_DATA_tmp(R,S,u,t,E0,E1); \
|
||||
t=ROTATE(t,4); \
|
||||
LL^= \
|
||||
*(DES_LONG *)((unsigned char *)des_SP +((u )&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x200+((u>> 8L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x400+((u>>16L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x600+((u>>24L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x100+((t )&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x300+((t>> 8L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x500+((t>>16L)&0xfc))^ \
|
||||
*(DES_LONG *)((unsigned char *)des_SP+0x700+((t>>24L)&0xfc)); }
|
||||
#endif
|
||||
|
||||
#else /* original version */
|
||||
|
||||
#if defined(DES_RISC1) || defined(DES_RISC2)
|
||||
#ifdef DES_RISC1
|
||||
#define D_ENCRYPT(LL,R,S) {\
|
||||
unsigned int u1,u2,u3; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u>>=2L; \
|
||||
t=ROTATE(t,6); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0x3f; \
|
||||
u2&=0x3f; \
|
||||
u>>=16L; \
|
||||
LL^=des_SPtrans[0][u1]; \
|
||||
LL^=des_SPtrans[2][u2]; \
|
||||
u3=(int)u>>8L; \
|
||||
u1=(int)u&0x3f; \
|
||||
u3&=0x3f; \
|
||||
LL^=des_SPtrans[4][u1]; \
|
||||
LL^=des_SPtrans[6][u3]; \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0x3f; \
|
||||
u2&=0x3f; \
|
||||
t>>=16L; \
|
||||
LL^=des_SPtrans[1][u1]; \
|
||||
LL^=des_SPtrans[3][u2]; \
|
||||
u3=(int)t>>8L; \
|
||||
u1=(int)t&0x3f; \
|
||||
u3&=0x3f; \
|
||||
LL^=des_SPtrans[5][u1]; \
|
||||
LL^=des_SPtrans[7][u3]; }
|
||||
#endif
|
||||
#ifdef DES_RISC2
|
||||
#define D_ENCRYPT(LL,R,S) {\
|
||||
unsigned int u1,u2,s1,s2; \
|
||||
LOAD_DATA(R,S,u,t,E0,E1,u1); \
|
||||
u>>=2L; \
|
||||
t=ROTATE(t,6); \
|
||||
u2=(int)u>>8L; \
|
||||
u1=(int)u&0x3f; \
|
||||
u2&=0x3f; \
|
||||
LL^=des_SPtrans[0][u1]; \
|
||||
LL^=des_SPtrans[2][u2]; \
|
||||
s1=(int)u>>16L; \
|
||||
s2=(int)u>>24L; \
|
||||
s1&=0x3f; \
|
||||
s2&=0x3f; \
|
||||
LL^=des_SPtrans[4][s1]; \
|
||||
LL^=des_SPtrans[6][s2]; \
|
||||
u2=(int)t>>8L; \
|
||||
u1=(int)t&0x3f; \
|
||||
u2&=0x3f; \
|
||||
LL^=des_SPtrans[1][u1]; \
|
||||
LL^=des_SPtrans[3][u2]; \
|
||||
s1=(int)t>>16; \
|
||||
s2=(int)t>>24L; \
|
||||
s1&=0x3f; \
|
||||
s2&=0x3f; \
|
||||
LL^=des_SPtrans[5][s1]; \
|
||||
LL^=des_SPtrans[7][s2]; }
|
||||
#endif
|
||||
|
||||
#else
|
||||
|
||||
#define D_ENCRYPT(LL,R,S) {\
|
||||
LOAD_DATA_tmp(R,S,u,t,E0,E1); \
|
||||
t=ROTATE(t,4); \
|
||||
LL^=\
|
||||
des_SPtrans[0][(u>> 2L)&0x3f]^ \
|
||||
des_SPtrans[2][(u>>10L)&0x3f]^ \
|
||||
des_SPtrans[4][(u>>18L)&0x3f]^ \
|
||||
des_SPtrans[6][(u>>26L)&0x3f]^ \
|
||||
des_SPtrans[1][(t>> 2L)&0x3f]^ \
|
||||
des_SPtrans[3][(t>>10L)&0x3f]^ \
|
||||
des_SPtrans[5][(t>>18L)&0x3f]^ \
|
||||
des_SPtrans[7][(t>>26L)&0x3f]; }
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/* IP and FP
|
||||
* The problem is more of a geometric problem that random bit fiddling.
|
||||
0 1 2 3 4 5 6 7 62 54 46 38 30 22 14 6
|
||||
8 9 10 11 12 13 14 15 60 52 44 36 28 20 12 4
|
||||
16 17 18 19 20 21 22 23 58 50 42 34 26 18 10 2
|
||||
24 25 26 27 28 29 30 31 to 56 48 40 32 24 16 8 0
|
||||
|
||||
32 33 34 35 36 37 38 39 63 55 47 39 31 23 15 7
|
||||
40 41 42 43 44 45 46 47 61 53 45 37 29 21 13 5
|
||||
48 49 50 51 52 53 54 55 59 51 43 35 27 19 11 3
|
||||
56 57 58 59 60 61 62 63 57 49 41 33 25 17 9 1
|
||||
|
||||
The output has been subject to swaps of the form
|
||||
0 1 -> 3 1 but the odd and even bits have been put into
|
||||
2 3 2 0
|
||||
different words. The main trick is to remember that
|
||||
t=((l>>size)^r)&(mask);
|
||||
r^=t;
|
||||
l^=(t<<size);
|
||||
can be used to swap and move bits between words.
|
||||
|
||||
So l = 0 1 2 3 r = 16 17 18 19
|
||||
4 5 6 7 20 21 22 23
|
||||
8 9 10 11 24 25 26 27
|
||||
12 13 14 15 28 29 30 31
|
||||
becomes (for size == 2 and mask == 0x3333)
|
||||
t = 2^16 3^17 -- -- l = 0 1 16 17 r = 2 3 18 19
|
||||
6^20 7^21 -- -- 4 5 20 21 6 7 22 23
|
||||
10^24 11^25 -- -- 8 9 24 25 10 11 24 25
|
||||
14^28 15^29 -- -- 12 13 28 29 14 15 28 29
|
||||
|
||||
Thanks for hints from Richard Outerbridge - he told me IP&FP
|
||||
could be done in 15 xor, 10 shifts and 5 ands.
|
||||
When I finally started to think of the problem in 2D
|
||||
I first got ~42 operations without xors. When I remembered
|
||||
how to use xors :-) I got it to its final state.
|
||||
*/
|
||||
#define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
|
||||
(b)^=(t),\
|
||||
(a)^=((t)<<(n)))
|
||||
|
||||
#define IP(l,r) \
|
||||
{ \
|
||||
register DES_LONG tt; \
|
||||
PERM_OP(r,l,tt, 4,0x0f0f0f0fL); \
|
||||
PERM_OP(l,r,tt,16,0x0000ffffL); \
|
||||
PERM_OP(r,l,tt, 2,0x33333333L); \
|
||||
PERM_OP(l,r,tt, 8,0x00ff00ffL); \
|
||||
PERM_OP(r,l,tt, 1,0x55555555L); \
|
||||
}
|
||||
|
||||
#define FP(l,r) \
|
||||
{ \
|
||||
register DES_LONG tt; \
|
||||
PERM_OP(l,r,tt, 1,0x55555555L); \
|
||||
PERM_OP(r,l,tt, 8,0x00ff00ffL); \
|
||||
PERM_OP(l,r,tt, 2,0x33333333L); \
|
||||
PERM_OP(r,l,tt,16,0x0000ffffL); \
|
||||
PERM_OP(l,r,tt, 4,0x0f0f0f0fL); \
|
||||
}
|
||||
|
||||
extern const DES_LONG des_SPtrans[8][64];
|
||||
|
||||
#endif
|
||||
@@ -1,616 +0,0 @@
|
||||
/* crypto/des/des_opts.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/* define PART1, PART2, PART3 or PART4 to build only with a few of the options.
|
||||
* This is for machines with 64k code segment size restrictions. */
|
||||
|
||||
#ifndef MSDOS
|
||||
#define TIMES
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#ifndef MSDOS
|
||||
#include <unistd.h>
|
||||
#else
|
||||
#include <io.h>
|
||||
extern void exit();
|
||||
#endif
|
||||
#include <signal.h>
|
||||
#ifndef VMS
|
||||
#ifndef _IRIX
|
||||
#include <time.h>
|
||||
#endif
|
||||
#ifdef TIMES
|
||||
#include <sys/types.h>
|
||||
#include <sys/times.h>
|
||||
#endif
|
||||
#else /* VMS */
|
||||
#include <types.h>
|
||||
struct tms {
|
||||
time_t tms_utime;
|
||||
time_t tms_stime;
|
||||
time_t tms_uchild; /* I dunno... */
|
||||
time_t tms_uchildsys; /* so these names are a guess :-) */
|
||||
}
|
||||
#endif
|
||||
#ifndef TIMES
|
||||
#include <sys/timeb.h>
|
||||
#endif
|
||||
|
||||
#ifdef sun
|
||||
#include <limits.h>
|
||||
#include <sys/param.h>
|
||||
#endif
|
||||
|
||||
#include "des.h"
|
||||
#include "spr.h"
|
||||
|
||||
#define DES_DEFAULT_OPTIONS
|
||||
|
||||
#if !defined(PART1) && !defined(PART2) && !defined(PART3) && !defined(PART4)
|
||||
#define PART1
|
||||
#define PART2
|
||||
#define PART3
|
||||
#define PART4
|
||||
#endif
|
||||
|
||||
#ifdef PART1
|
||||
|
||||
#undef DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#undef DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#define des_encrypt des_encrypt_u4_cisc_idx
|
||||
#define des_encrypt2 des_encrypt2_u4_cisc_idx
|
||||
#define des_encrypt3 des_encrypt3_u4_cisc_idx
|
||||
#define des_decrypt3 des_decrypt3_u4_cisc_idx
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#define DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#undef DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u16_cisc_idx
|
||||
#define des_encrypt2 des_encrypt2_u16_cisc_idx
|
||||
#define des_encrypt3 des_encrypt3_u16_cisc_idx
|
||||
#define des_decrypt3 des_decrypt3_u16_cisc_idx
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#undef DES_UNROLL
|
||||
#define DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#undef DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u4_risc1_idx
|
||||
#define des_encrypt2 des_encrypt2_u4_risc1_idx
|
||||
#define des_encrypt3 des_encrypt3_u4_risc1_idx
|
||||
#define des_decrypt3 des_decrypt3_u4_risc1_idx
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef PART2
|
||||
|
||||
#undef DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#define DES_RISC2
|
||||
#undef DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u4_risc2_idx
|
||||
#define des_encrypt2 des_encrypt2_u4_risc2_idx
|
||||
#define des_encrypt3 des_encrypt3_u4_risc2_idx
|
||||
#define des_decrypt3 des_decrypt3_u4_risc2_idx
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#define DES_UNROLL
|
||||
#define DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#undef DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u16_risc1_idx
|
||||
#define des_encrypt2 des_encrypt2_u16_risc1_idx
|
||||
#define des_encrypt3 des_encrypt3_u16_risc1_idx
|
||||
#define des_decrypt3 des_decrypt3_u16_risc1_idx
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#define DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#define DES_RISC2
|
||||
#undef DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u16_risc2_idx
|
||||
#define des_encrypt2 des_encrypt2_u16_risc2_idx
|
||||
#define des_encrypt3 des_encrypt3_u16_risc2_idx
|
||||
#define des_decrypt3 des_decrypt3_u16_risc2_idx
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef PART3
|
||||
|
||||
#undef DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#define DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u4_cisc_ptr
|
||||
#define des_encrypt2 des_encrypt2_u4_cisc_ptr
|
||||
#define des_encrypt3 des_encrypt3_u4_cisc_ptr
|
||||
#define des_decrypt3 des_decrypt3_u4_cisc_ptr
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#define DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#define DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u16_cisc_ptr
|
||||
#define des_encrypt2 des_encrypt2_u16_cisc_ptr
|
||||
#define des_encrypt3 des_encrypt3_u16_cisc_ptr
|
||||
#define des_decrypt3 des_decrypt3_u16_cisc_ptr
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#undef DES_UNROLL
|
||||
#define DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#define DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u4_risc1_ptr
|
||||
#define des_encrypt2 des_encrypt2_u4_risc1_ptr
|
||||
#define des_encrypt3 des_encrypt3_u4_risc1_ptr
|
||||
#define des_decrypt3 des_decrypt3_u4_risc1_ptr
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef PART4
|
||||
|
||||
#undef DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#define DES_RISC2
|
||||
#define DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u4_risc2_ptr
|
||||
#define des_encrypt2 des_encrypt2_u4_risc2_ptr
|
||||
#define des_encrypt3 des_encrypt3_u4_risc2_ptr
|
||||
#define des_decrypt3 des_decrypt3_u4_risc2_ptr
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#define DES_UNROLL
|
||||
#define DES_RISC1
|
||||
#undef DES_RISC2
|
||||
#define DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u16_risc1_ptr
|
||||
#define des_encrypt2 des_encrypt2_u16_risc1_ptr
|
||||
#define des_encrypt3 des_encrypt3_u16_risc1_ptr
|
||||
#define des_decrypt3 des_decrypt3_u16_risc1_ptr
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#define DES_UNROLL
|
||||
#undef DES_RISC1
|
||||
#define DES_RISC2
|
||||
#define DES_PTR
|
||||
#undef D_ENCRYPT
|
||||
#undef des_encrypt
|
||||
#undef des_encrypt2
|
||||
#undef des_encrypt3
|
||||
#undef des_decrypt3
|
||||
#define des_encrypt des_encrypt_u16_risc2_ptr
|
||||
#define des_encrypt2 des_encrypt2_u16_risc2_ptr
|
||||
#define des_encrypt3 des_encrypt3_u16_risc2_ptr
|
||||
#define des_decrypt3 des_decrypt3_u16_risc2_ptr
|
||||
#undef HEADER_DES_LOCL_H
|
||||
#include "des_enc.c"
|
||||
|
||||
#endif
|
||||
|
||||
/* The following if from times(3) man page. It may need to be changed */
|
||||
#ifndef HZ
|
||||
#ifndef CLK_TCK
|
||||
#ifndef VMS
|
||||
#define HZ 100.0
|
||||
#else /* VMS */
|
||||
#define HZ 100.0
|
||||
#endif
|
||||
#else /* CLK_TCK */
|
||||
#define HZ ((double)CLK_TCK)
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#define BUFSIZE ((long)1024)
|
||||
long run=0;
|
||||
|
||||
#ifndef NOPROTO
|
||||
double Time_F(int s);
|
||||
#else
|
||||
double Time_F();
|
||||
#endif
|
||||
|
||||
#ifdef SIGALRM
|
||||
#if defined(__STDC__) || defined(sgi)
|
||||
#define SIGRETTYPE void
|
||||
#else
|
||||
#define SIGRETTYPE int
|
||||
#endif
|
||||
|
||||
#ifndef NOPROTO
|
||||
SIGRETTYPE sig_done(int sig);
|
||||
#else
|
||||
SIGRETTYPE sig_done();
|
||||
#endif
|
||||
|
||||
SIGRETTYPE sig_done(sig)
|
||||
int sig;
|
||||
{
|
||||
signal(SIGALRM,sig_done);
|
||||
run=0;
|
||||
#ifdef LINT
|
||||
sig=sig;
|
||||
#endif
|
||||
}
|
||||
#endif
|
||||
|
||||
#define START 0
|
||||
#define STOP 1
|
||||
|
||||
double Time_F(s)
|
||||
int s;
|
||||
{
|
||||
double ret;
|
||||
#ifdef TIMES
|
||||
static struct tms tstart,tend;
|
||||
|
||||
if (s == START)
|
||||
{
|
||||
times(&tstart);
|
||||
return(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
times(&tend);
|
||||
ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
#else /* !times() */
|
||||
static struct timeb tstart,tend;
|
||||
long i;
|
||||
|
||||
if (s == START)
|
||||
{
|
||||
ftime(&tstart);
|
||||
return(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
ftime(&tend);
|
||||
i=(long)tend.millitm-(long)tstart.millitm;
|
||||
ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifdef SIGALRM
|
||||
#define print_name(name) fprintf(stderr,"Doing %s's for 10 seconds\n",name); alarm(10);
|
||||
#else
|
||||
#define print_name(name) fprintf(stderr,"Doing %s %ld times\n",name,cb);
|
||||
#endif
|
||||
|
||||
#define time_it(func,name,index) \
|
||||
print_name(name); \
|
||||
Time_F(START); \
|
||||
for (count=0,run=1; COND(cb); count++) \
|
||||
{ \
|
||||
unsigned long d[2]; \
|
||||
func(d,&(sch[0]),DES_ENCRYPT); \
|
||||
} \
|
||||
tm[index]=Time_F(STOP); \
|
||||
fprintf(stderr,"%ld %s's in %.2f second\n",count,name,tm[index]); \
|
||||
tm[index]=((double)COUNT(cb))/tm[index];
|
||||
|
||||
#define print_it(name,index) \
|
||||
fprintf(stderr,"%s bytes per sec = %12.2f (%5.1fuS)\n",name, \
|
||||
tm[index]*8,1.0e6/tm[index]);
|
||||
|
||||
int main(argc,argv)
|
||||
int argc;
|
||||
char **argv;
|
||||
{
|
||||
long count;
|
||||
static unsigned char buf[BUFSIZE];
|
||||
static des_cblock key ={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
|
||||
static des_cblock key2={0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
|
||||
static des_cblock key3={0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
|
||||
des_key_schedule sch,sch2,sch3;
|
||||
double d,tm[16],max=0;
|
||||
int rank[16];
|
||||
char *str[16];
|
||||
int max_idx=0,i,num=0,j;
|
||||
#ifndef SIGALARM
|
||||
long ca,cb,cc,cd,ce;
|
||||
#endif
|
||||
|
||||
for (i=0; i<12; i++)
|
||||
{
|
||||
tm[i]=0.0;
|
||||
rank[i]=0;
|
||||
}
|
||||
|
||||
#ifndef TIMES
|
||||
fprintf(stderr,"To get the most acurate results, try to run this\n");
|
||||
fprintf(stderr,"program when this computer is idle.\n");
|
||||
#endif
|
||||
|
||||
des_set_key((C_Block *)key,&sch);
|
||||
des_set_key((C_Block *)key2,&sch2);
|
||||
des_set_key((C_Block *)key3,&sch3);
|
||||
|
||||
#ifndef SIGALRM
|
||||
fprintf(stderr,"First we calculate the approximate speed ...\n");
|
||||
des_set_key((C_Block *)key,sch);
|
||||
count=10;
|
||||
do {
|
||||
long i;
|
||||
unsigned long data[2];
|
||||
|
||||
count*=2;
|
||||
Time_F(START);
|
||||
for (i=count; i; i--)
|
||||
des_encrypt(data,&(sch[0]),DES_ENCRYPT);
|
||||
d=Time_F(STOP);
|
||||
} while (d < 3.0);
|
||||
ca=count;
|
||||
cb=count*3;
|
||||
cc=count*3*8/BUFSIZE+1;
|
||||
cd=count*8/BUFSIZE+1;
|
||||
|
||||
ce=count/20+1;
|
||||
#define COND(d) (count != (d))
|
||||
#define COUNT(d) (d)
|
||||
#else
|
||||
#define COND(c) (run)
|
||||
#define COUNT(d) (count)
|
||||
signal(SIGALRM,sig_done);
|
||||
alarm(10);
|
||||
#endif
|
||||
|
||||
#ifdef PART1
|
||||
time_it(des_encrypt_u4_cisc_idx, "des_encrypt_u4_cisc_idx ", 0);
|
||||
time_it(des_encrypt_u16_cisc_idx, "des_encrypt_u16_cisc_idx ", 1);
|
||||
time_it(des_encrypt_u4_risc1_idx, "des_encrypt_u4_risc1_idx ", 2);
|
||||
num+=3;
|
||||
#endif
|
||||
#ifdef PART2
|
||||
time_it(des_encrypt_u16_risc1_idx,"des_encrypt_u16_risc1_idx", 3);
|
||||
time_it(des_encrypt_u4_risc2_idx, "des_encrypt_u4_risc2_idx ", 4);
|
||||
time_it(des_encrypt_u16_risc2_idx,"des_encrypt_u16_risc2_idx", 5);
|
||||
num+=3;
|
||||
#endif
|
||||
#ifdef PART3
|
||||
time_it(des_encrypt_u4_cisc_ptr, "des_encrypt_u4_cisc_ptr ", 6);
|
||||
time_it(des_encrypt_u16_cisc_ptr, "des_encrypt_u16_cisc_ptr ", 7);
|
||||
time_it(des_encrypt_u4_risc1_ptr, "des_encrypt_u4_risc1_ptr ", 8);
|
||||
num+=3;
|
||||
#endif
|
||||
#ifdef PART4
|
||||
time_it(des_encrypt_u16_risc1_ptr,"des_encrypt_u16_risc1_ptr", 9);
|
||||
time_it(des_encrypt_u4_risc2_ptr, "des_encrypt_u4_risc2_ptr ",10);
|
||||
time_it(des_encrypt_u16_risc2_ptr,"des_encrypt_u16_risc2_ptr",11);
|
||||
num+=3;
|
||||
#endif
|
||||
|
||||
#ifdef PART1
|
||||
str[0]=" 4 c i";
|
||||
print_it("des_encrypt_u4_cisc_idx ",0);
|
||||
max=tm[0];
|
||||
max_idx=0;
|
||||
str[1]="16 c i";
|
||||
print_it("des_encrypt_u16_cisc_idx ",1);
|
||||
if (max < tm[1]) { max=tm[1]; max_idx=1; }
|
||||
str[2]=" 4 r1 i";
|
||||
print_it("des_encrypt_u4_risc1_idx ",2);
|
||||
if (max < tm[2]) { max=tm[2]; max_idx=2; }
|
||||
#endif
|
||||
#ifdef PART2
|
||||
str[3]="16 r1 i";
|
||||
print_it("des_encrypt_u16_risc1_idx",3);
|
||||
if (max < tm[3]) { max=tm[3]; max_idx=3; }
|
||||
str[4]=" 4 r2 i";
|
||||
print_it("des_encrypt_u4_risc2_idx ",4);
|
||||
if (max < tm[4]) { max=tm[4]; max_idx=4; }
|
||||
str[5]="16 r2 i";
|
||||
print_it("des_encrypt_u16_risc2_idx",5);
|
||||
if (max < tm[5]) { max=tm[5]; max_idx=5; }
|
||||
#endif
|
||||
#ifdef PART3
|
||||
str[6]=" 4 c p";
|
||||
print_it("des_encrypt_u4_cisc_ptr ",6);
|
||||
if (max < tm[6]) { max=tm[6]; max_idx=6; }
|
||||
str[7]="16 c p";
|
||||
print_it("des_encrypt_u16_cisc_ptr ",7);
|
||||
if (max < tm[7]) { max=tm[7]; max_idx=7; }
|
||||
str[8]=" 4 r1 p";
|
||||
print_it("des_encrypt_u4_risc1_ptr ",8);
|
||||
if (max < tm[8]) { max=tm[8]; max_idx=8; }
|
||||
#endif
|
||||
#ifdef PART4
|
||||
str[9]="16 r1 p";
|
||||
print_it("des_encrypt_u16_risc1_ptr",9);
|
||||
if (max < tm[9]) { max=tm[9]; max_idx=9; }
|
||||
str[10]=" 4 r2 p";
|
||||
print_it("des_encrypt_u4_risc2_ptr ",10);
|
||||
if (max < tm[10]) { max=tm[10]; max_idx=10; }
|
||||
str[11]="16 r2 p";
|
||||
print_it("des_encrypt_u16_risc2_ptr",11);
|
||||
if (max < tm[11]) { max=tm[11]; max_idx=11; }
|
||||
#endif
|
||||
printf("options des ecb/s\n");
|
||||
printf("%s %12.2f 100.0%%\n",str[max_idx],tm[max_idx]);
|
||||
d=tm[max_idx];
|
||||
tm[max_idx]= -2.0;
|
||||
max= -1.0;
|
||||
for (;;)
|
||||
{
|
||||
for (i=0; i<12; i++)
|
||||
{
|
||||
if (max < tm[i]) { max=tm[i]; j=i; }
|
||||
}
|
||||
if (max < 0.0) break;
|
||||
printf("%s %12.2f %4.1f%%\n",str[j],tm[j],tm[j]/d*100.0);
|
||||
tm[j]= -2.0;
|
||||
max= -1.0;
|
||||
}
|
||||
|
||||
switch (max_idx)
|
||||
{
|
||||
case 0:
|
||||
printf("-DDES_DEFAULT_OPTIONS\n");
|
||||
break;
|
||||
case 1:
|
||||
printf("-DDES_UNROLL\n");
|
||||
break;
|
||||
case 2:
|
||||
printf("-DDES_RISC1\n");
|
||||
break;
|
||||
case 3:
|
||||
printf("-DDES_UNROLL -DDES_RISC1\n");
|
||||
break;
|
||||
case 4:
|
||||
printf("-DDES_RISC2\n");
|
||||
break;
|
||||
case 5:
|
||||
printf("-DDES_UNROLL -DDES_RISC2\n");
|
||||
break;
|
||||
case 6:
|
||||
printf("-DDES_PTR\n");
|
||||
break;
|
||||
case 7:
|
||||
printf("-DDES_UNROLL -DDES_PTR\n");
|
||||
break;
|
||||
case 8:
|
||||
printf("-DDES_RISC1 -DDES_PTR\n");
|
||||
break;
|
||||
case 9:
|
||||
printf("-DDES_UNROLL -DDES_RISC1 -DDES_PTR\n");
|
||||
break;
|
||||
case 10:
|
||||
printf("-DDES_RISC2 -DDES_PTR\n");
|
||||
break;
|
||||
case 11:
|
||||
printf("-DDES_UNROLL -DDES_RISC2 -DDES_PTR\n");
|
||||
break;
|
||||
}
|
||||
exit(0);
|
||||
#if defined(LINT) || defined(MSDOS)
|
||||
return(0);
|
||||
#endif
|
||||
}
|
||||
@@ -1,60 +0,0 @@
|
||||
/* crypto/des/des_ver.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
extern char *DES_version; /* SSLeay version string */
|
||||
extern char *libdes_version; /* old libdes version string */
|
||||
1334
lib/des/destest.c
1334
lib/des/destest.c
File diff suppressed because it is too large
Load Diff
46
lib/des/doIP
46
lib/des/doIP
@@ -1,46 +0,0 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@l=(
|
||||
0, 1, 2, 3, 4, 5, 6, 7,
|
||||
8, 9,10,11,12,13,14,15,
|
||||
16,17,18,19,20,21,22,23,
|
||||
24,25,26,27,28,29,30,31
|
||||
);
|
||||
@r=(
|
||||
32,33,34,35,36,37,38,39,
|
||||
40,41,42,43,44,45,46,47,
|
||||
48,49,50,51,52,53,54,55,
|
||||
56,57,58,59,60,61,62,63
|
||||
);
|
||||
|
||||
require 'shifts.pl';
|
||||
|
||||
sub PERM_OP
|
||||
{
|
||||
local(*a,*b,*t,$n,$m)=@_;
|
||||
|
||||
@z=&shift(*a,-$n);
|
||||
@z=&xor(*b,*z);
|
||||
@z=&and(*z,$m);
|
||||
@b=&xor(*b,*z);
|
||||
@z=&shift(*z,$n);
|
||||
@a=&xor(*a,*z);
|
||||
}
|
||||
|
||||
|
||||
@L=@l;
|
||||
@R=@r;
|
||||
&PERM_OP(*R,*L,*T,4,0x0f0f0f0f);
|
||||
&PERM_OP(*L,*R,*T,16,0x0000ffff);
|
||||
&PERM_OP(*R,*L,*T,2,0x33333333);
|
||||
&PERM_OP(*L,*R,*T,8,0x00ff00ff);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
&printit(@L);
|
||||
&printit(@R);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
&PERM_OP(*L,*R,*T,8,0x00ff00ff);
|
||||
&PERM_OP(*R,*L,*T,2,0x33333333);
|
||||
&PERM_OP(*L,*R,*T,16,0x0000ffff);
|
||||
&PERM_OP(*R,*L,*T,4,0x0f0f0f0f);
|
||||
&printit(@L);
|
||||
&printit(@R);
|
||||
110
lib/des/doPC1
110
lib/des/doPC1
@@ -1,110 +0,0 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@l=(
|
||||
0, 1, 2, 3, 4, 5, 6, 7,
|
||||
8, 9,10,11,12,13,14,15,
|
||||
16,17,18,19,20,21,22,23,
|
||||
24,25,26,27,28,29,30,31
|
||||
);
|
||||
@r=(
|
||||
32,33,34,35,36,37,38,39,
|
||||
40,41,42,43,44,45,46,47,
|
||||
48,49,50,51,52,53,54,55,
|
||||
56,57,58,59,60,61,62,63
|
||||
);
|
||||
|
||||
require 'shifts.pl';
|
||||
|
||||
sub PERM_OP
|
||||
{
|
||||
local(*a,*b,*t,$n,$m)=@_;
|
||||
|
||||
@z=&shift(*a,-$n);
|
||||
@z=&xor(*b,*z);
|
||||
@z=&and(*z,$m);
|
||||
@b=&xor(*b,*z);
|
||||
@z=&shift(*z,$n);
|
||||
@a=&xor(*a,*z);
|
||||
}
|
||||
|
||||
sub HPERM_OP2
|
||||
{
|
||||
local(*a,*t,$n,$m)=@_;
|
||||
local(@x,@y,$i);
|
||||
|
||||
@z=&shift(*a,16-$n);
|
||||
@z=&xor(*a,*z);
|
||||
@z=&and(*z,$m);
|
||||
@a=&xor(*a,*z);
|
||||
@z=&shift(*z,$n-16);
|
||||
@a=&xor(*a,*z);
|
||||
}
|
||||
|
||||
sub HPERM_OP
|
||||
{
|
||||
local(*a,*t,$n,$m)=@_;
|
||||
local(@x,@y,$i);
|
||||
|
||||
for ($i=0; $i<16; $i++)
|
||||
{
|
||||
$x[$i]=$a[$i];
|
||||
$y[$i]=$a[16+$i];
|
||||
}
|
||||
@z=&shift(*x,-$n);
|
||||
@z=&xor(*y,*z);
|
||||
@z=&and(*z,$m);
|
||||
@y=&xor(*y,*z);
|
||||
@z=&shift(*z,$n);
|
||||
@x=&xor(*x,*z);
|
||||
for ($i=0; $i<16; $i++)
|
||||
{
|
||||
$a[$i]=$x[$i];
|
||||
$a[16+$i]=$y[$i];
|
||||
}
|
||||
}
|
||||
|
||||
@L=@l;
|
||||
@R=@r;
|
||||
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*R,*L,*T,4,0x0f0f0f0f);
|
||||
print "---\n"; &printit(@R);
|
||||
&HPERM_OP2(*L,*T,-2,0xcccc0000);
|
||||
&HPERM_OP2(*R,*T,-2,0xcccc0000);
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*L,*R,*T,8,0x00ff00ff);
|
||||
print "---\n"; &printit(@R);
|
||||
&PERM_OP(*R,*L,*T,1,0x55555555);
|
||||
print "---\n"; &printit(@R);
|
||||
# &printit(@L);
|
||||
&printit(@R);
|
||||
print <<"EOF";
|
||||
==============================
|
||||
63 55 47 39 31 23 15 7
|
||||
62 54 46 38 30 22 14 6
|
||||
61 53 45 37 29 21 13 5
|
||||
60 52 44 36 -- -- -- --
|
||||
|
||||
57 49 41 33 25 17 9 1
|
||||
58 50 42 34 26 18 10 2
|
||||
59 51 43 35 27 19 11 3
|
||||
28 20 12 4 -- -- -- --
|
||||
EOF
|
||||
exit(1);
|
||||
@A=&and(*R,0x000000ff);
|
||||
@A=&shift(*A,16);
|
||||
@B=&and(*R,0x0000ff00);
|
||||
@C=&and(*R,0x00ff0000);
|
||||
@C=&shift(*C,-16);
|
||||
@D=&and(*L,0xf0000000);
|
||||
@D=&shift(*D,-4);
|
||||
@A=&or(*A,*B);
|
||||
@B=&or(*D,*C);
|
||||
@R=&or(*A,*B);
|
||||
@L=&and(*L,0x0fffffff);
|
||||
|
||||
&printit(@L);
|
||||
&printit(@R);
|
||||
|
||||
@@ -1,94 +0,0 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
@PC2_C=(14,17,11,24, 1, 5,
|
||||
3,28,15, 6,21,10,
|
||||
23,19,12, 4,26, 8,
|
||||
16, 7,27,20,13, 2,
|
||||
);
|
||||
|
||||
@PC2_D=(41,52,31,37,47,55,
|
||||
30,40,51,45,33,48,
|
||||
44,49,39,56,34,53,
|
||||
46,42,50,36,29,32,
|
||||
);
|
||||
|
||||
$i=0;
|
||||
foreach (@PC2_C) {
|
||||
$_--;
|
||||
# printf "%2d,",$_;
|
||||
$C{$_}=$i;
|
||||
++$i;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
$i=0;
|
||||
#print "\n";
|
||||
foreach (@PC2_D) {
|
||||
$_-=28;
|
||||
$_--;
|
||||
# printf "%2d,",$_;
|
||||
$D{$_}=$i;
|
||||
$i++;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
|
||||
#print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$C{$i};
|
||||
# printf "%2d,",$_;
|
||||
$i++;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
#print "\n";
|
||||
|
||||
#print "\n";
|
||||
foreach $i (0 .. 27)
|
||||
{
|
||||
$_=$D{$i};
|
||||
# printf "%2d,",$_;
|
||||
$i++;
|
||||
# print "\n" if ((($i) % 8) == 0);
|
||||
}
|
||||
#print "\n";
|
||||
|
||||
print "static ulong skb[8][64]={\n";
|
||||
&doit("C",*C, 0, 1, 2, 3, 4, 5);
|
||||
&doit("C",*C, 6, 7, 9,10,11,12);
|
||||
&doit("C",*C,13,14,15,16,18,19);
|
||||
&doit("C",*C,20,22,23,25,26,27);
|
||||
|
||||
&doit("D",*D, 0, 1, 2, 3, 4, 5);
|
||||
&doit("D",*D, 7, 8,10,11,12,13);
|
||||
&doit("D",*D,15,16,17,18,19,20);
|
||||
&doit("D",*D,21,22,23,24,26,27);
|
||||
print "};\n";
|
||||
|
||||
sub doit
|
||||
{
|
||||
local($l,*A,@b)=@_;
|
||||
local(@out);
|
||||
|
||||
printf("/* for $l bits (numbered as per FIPS 46) %d %d %d %d %d %d */\n",
|
||||
$b[0]+1, $b[1]+1, $b[2]+1, $b[3]+1, $b[4]+1, $b[5]+1);
|
||||
for ($i=0; $i<64; $i++)
|
||||
{
|
||||
$out[$i]=0;
|
||||
$j=1;
|
||||
#print "\n";
|
||||
for ($k=0; $k<6; $k++)
|
||||
{
|
||||
$l=$A{$b[$k]};
|
||||
#print"$l - ";
|
||||
if ((1<<$k) & $i)
|
||||
{
|
||||
$ll=int($l/6)*8+($l%6);
|
||||
$out[$i]|=1<<($ll);
|
||||
}
|
||||
}
|
||||
$pp=$out[$i];
|
||||
$pp=($pp&0xff0000ff)| (($pp&0x00ff0000)>>8)|
|
||||
(($pp&0x0000ff00)<<8);
|
||||
printf("0x%08X,",$pp);
|
||||
print "\n" if (($i+1) % 4 == 0);
|
||||
}
|
||||
}
|
||||
@@ -1,87 +0,0 @@
|
||||
/* crypto/des/ecb3_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
void DES_ecb3_encrypt(input, output, ks1, ks2, ks3, encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
DES_key_schedule *ks1;
|
||||
DES_key_schedule *ks2;
|
||||
DES_key_schedule *ks3;
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG l0,l1;
|
||||
register unsigned char *in,*out;
|
||||
DES_LONG ll[2];
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
c2l(in,l0);
|
||||
c2l(in,l1);
|
||||
ll[0]=l0;
|
||||
ll[1]=l1;
|
||||
if (encrypt)
|
||||
DES_encrypt3(ll,ks1,ks2,ks3);
|
||||
else
|
||||
DES_decrypt3(ll,ks1,ks2,ks3);
|
||||
l0=ll[0];
|
||||
l1=ll[1];
|
||||
l2c(l0,out);
|
||||
l2c(l1,out);
|
||||
}
|
||||
@@ -1,124 +0,0 @@
|
||||
/* crypto/des/ecb_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
#include "spr.h"
|
||||
|
||||
char *libdes_version="libdes v 4.01 - 13-Jan-1997 - eay";
|
||||
char *DES_version="DES part of SSLeay 0.6.6 14-Jan-1997";
|
||||
|
||||
char *DES_options()
|
||||
{
|
||||
static int init=1;
|
||||
static char buf[32];
|
||||
|
||||
if (init)
|
||||
{
|
||||
char *ptr,*unroll,*risc,*size;
|
||||
|
||||
init=0;
|
||||
#ifdef DES_PTR
|
||||
ptr="ptr";
|
||||
#else
|
||||
ptr="idx";
|
||||
#endif
|
||||
#if defined(DES_RISC1) || defined(DES_RISC2)
|
||||
#ifdef DES_RISC1
|
||||
risc="risc1";
|
||||
#endif
|
||||
#ifdef DES_RISC2
|
||||
risc="risc2";
|
||||
#endif
|
||||
#else
|
||||
risc="cisc";
|
||||
#endif
|
||||
#ifdef DES_UNROLL
|
||||
unroll="16";
|
||||
#else
|
||||
unroll="4";
|
||||
#endif
|
||||
if (sizeof(DES_LONG) != sizeof(long))
|
||||
size="int";
|
||||
else
|
||||
size="long";
|
||||
sprintf(buf,"des(%s,%s,%s,%s)",ptr,risc,unroll,size);
|
||||
}
|
||||
return(buf);
|
||||
}
|
||||
|
||||
|
||||
void DES_ecb_encrypt(input, output, ks, encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
DES_key_schedule *ks;
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG l;
|
||||
register unsigned char *in,*out;
|
||||
DES_LONG ll[2];
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
c2l(in,l); ll[0]=l;
|
||||
c2l(in,l); ll[1]=l;
|
||||
DES_encrypt(ll,ks,encrypt);
|
||||
l=ll[0]; l2c(l,out);
|
||||
l=ll[1]; l2c(l,out);
|
||||
l=ll[0]=ll[1]=0;
|
||||
}
|
||||
|
||||
@@ -1,189 +0,0 @@
|
||||
/* crypto/des/ede_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
void DES_ede3_cbc_encrypt(input, output, length, ks1, ks2, ks3, ivec, encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
DES_key_schedule *ks1;
|
||||
DES_key_schedule *ks2;
|
||||
DES_key_schedule *ks3;
|
||||
DES_cblock (*ivec);
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG tin0,tin1;
|
||||
register DES_LONG tout0,tout1,xor0,xor1;
|
||||
register unsigned char *in,*out;
|
||||
register long l=length;
|
||||
DES_LONG tin[2];
|
||||
unsigned char *iv;
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
if (encrypt)
|
||||
{
|
||||
c2l(iv,tout0);
|
||||
c2l(iv,tout1);
|
||||
for (l-=8; l>=0; l-=8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
tin0^=tout0;
|
||||
tin1^=tout1;
|
||||
|
||||
tin[0]=tin0;
|
||||
tin[1]=tin1;
|
||||
DES_encrypt3((DES_LONG *)tin,ks1,ks2,ks3);
|
||||
tout0=tin[0];
|
||||
tout1=tin[1];
|
||||
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2ln(in,tin0,tin1,l+8);
|
||||
tin0^=tout0;
|
||||
tin1^=tout1;
|
||||
|
||||
tin[0]=tin0;
|
||||
tin[1]=tin1;
|
||||
DES_encrypt3((DES_LONG *)tin,ks1,ks2,ks3);
|
||||
tout0=tin[0];
|
||||
tout1=tin[1];
|
||||
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(tout0,iv);
|
||||
l2c(tout1,iv);
|
||||
}
|
||||
else
|
||||
{
|
||||
register DES_LONG t0,t1;
|
||||
|
||||
c2l(iv,xor0);
|
||||
c2l(iv,xor1);
|
||||
for (l-=8; l>=0; l-=8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
|
||||
t0=tin0;
|
||||
t1=tin1;
|
||||
|
||||
tin[0]=tin0;
|
||||
tin[1]=tin1;
|
||||
DES_decrypt3((DES_LONG *)tin,ks1,ks2,ks3);
|
||||
tout0=tin[0];
|
||||
tout1=tin[1];
|
||||
|
||||
tout0^=xor0;
|
||||
tout1^=xor1;
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
xor0=t0;
|
||||
xor1=t1;
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
|
||||
t0=tin0;
|
||||
t1=tin1;
|
||||
|
||||
tin[0]=tin0;
|
||||
tin[1]=tin1;
|
||||
DES_decrypt3((DES_LONG *)tin,ks1,ks2,ks3);
|
||||
tout0=tin[0];
|
||||
tout1=tin[1];
|
||||
|
||||
tout0^=xor0;
|
||||
tout1^=xor1;
|
||||
l2cn(tout0,tout1,out,l+8);
|
||||
xor0=t0;
|
||||
xor1=t1;
|
||||
}
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(xor0,iv);
|
||||
l2c(xor1,iv);
|
||||
}
|
||||
tin0=tin1=tout0=tout1=xor0=xor1=0;
|
||||
tin[0]=tin[1]=0;
|
||||
}
|
||||
|
||||
#ifdef undef /* MACRO */
|
||||
void DES_ede2_cbc_encrypt(input, output, length, ks1, ks2, ivec, enc)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
des_key_schedule ks1;
|
||||
des_key_schedule ks2;
|
||||
DES_cblock (*ivec);
|
||||
int enc;
|
||||
{
|
||||
DES_ede3_cbc_encrypt(input,output,length,ks1,ks2,ks1,ivec,enc);
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -1,214 +0,0 @@
|
||||
/* crypto/des/enc_read.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
#include "des_locl.h"
|
||||
|
||||
/* This has some uglies in it but it works - even over sockets. */
|
||||
/*extern int errno;*/
|
||||
int DES_rw_mode=DES_PCBC_MODE;
|
||||
|
||||
int DES_enc_read(fd, buf, len, sched, iv)
|
||||
int fd;
|
||||
char *buf;
|
||||
int len;
|
||||
DES_key_schedule *sched;
|
||||
DES_cblock (*iv);
|
||||
{
|
||||
/* data to be unencrypted */
|
||||
int net_num=0;
|
||||
static unsigned char *net=NULL;
|
||||
/* extra unencrypted data
|
||||
* for when a block of 100 comes in but is des_read one byte at
|
||||
* a time. */
|
||||
static char *unnet=NULL;
|
||||
static int unnet_start=0;
|
||||
static int unnet_left=0;
|
||||
static char *tmpbuf=NULL;
|
||||
int i;
|
||||
long num=0,rnum;
|
||||
unsigned char *p;
|
||||
|
||||
if (tmpbuf == NULL)
|
||||
{
|
||||
tmpbuf=(char *)malloc(des_BSIZE);
|
||||
if (tmpbuf == NULL) return(-1);
|
||||
}
|
||||
if (net == NULL)
|
||||
{
|
||||
net=(unsigned char *)malloc(des_BSIZE);
|
||||
if (net == NULL) return(-1);
|
||||
}
|
||||
if (unnet == NULL)
|
||||
{
|
||||
unnet=(char *)malloc(des_BSIZE);
|
||||
if (unnet == NULL) return(-1);
|
||||
}
|
||||
/* left over data from last decrypt */
|
||||
if (unnet_left != 0)
|
||||
{
|
||||
if (unnet_left < len)
|
||||
{
|
||||
/* we still still need more data but will return
|
||||
* with the number of bytes we have - should always
|
||||
* check the return value */
|
||||
memcpy(buf,&(unnet[unnet_start]),
|
||||
(unsigned int)unnet_left);
|
||||
/* eay 26/08/92 I had the next 2 lines
|
||||
* reversed :-( */
|
||||
i=unnet_left;
|
||||
unnet_start=unnet_left=0;
|
||||
}
|
||||
else
|
||||
{
|
||||
memcpy(buf,&(unnet[unnet_start]),(unsigned int)len);
|
||||
unnet_start+=len;
|
||||
unnet_left-=len;
|
||||
i=len;
|
||||
}
|
||||
return(i);
|
||||
}
|
||||
|
||||
/* We need to get more data. */
|
||||
if (len > MAXWRITE) len=MAXWRITE;
|
||||
|
||||
/* first - get the length */
|
||||
while (net_num < HDRSIZE)
|
||||
{
|
||||
i=read(fd,&(net[net_num]),(unsigned int)HDRSIZE-net_num);
|
||||
if ((i == -1) && (errno == EINTR)) continue;
|
||||
if (i <= 0) return(0);
|
||||
net_num+=i;
|
||||
}
|
||||
|
||||
/* we now have at net_num bytes in net */
|
||||
p=net;
|
||||
/* num=0; */
|
||||
n2l(p,num);
|
||||
/* num should be rounded up to the next group of eight
|
||||
* we make sure that we have read a multiple of 8 bytes from the net.
|
||||
*/
|
||||
if ((num > MAXWRITE) || (num < 0)) /* error */
|
||||
return(-1);
|
||||
rnum=(num < 8)?8:((num+7)/8*8);
|
||||
|
||||
net_num=0;
|
||||
while (net_num < rnum)
|
||||
{
|
||||
i=read(fd,&(net[net_num]),(unsigned int)rnum-net_num);
|
||||
if ((i == -1) && (errno == EINTR)) continue;
|
||||
if (i <= 0) return(0);
|
||||
net_num+=i;
|
||||
}
|
||||
|
||||
/* Check if there will be data left over. */
|
||||
if (len < num)
|
||||
{
|
||||
if (DES_rw_mode & DES_PCBC_MODE)
|
||||
DES_pcbc_encrypt((DES_cblock *)net,(DES_cblock *)unnet,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
else
|
||||
DES_cbc_encrypt((DES_cblock *)net,(DES_cblock *)unnet,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
memcpy(buf,unnet,(unsigned int)len);
|
||||
unnet_start=len;
|
||||
unnet_left=(int)num-len;
|
||||
|
||||
/* The following line is done because we return num
|
||||
* as the number of bytes read. */
|
||||
num=len;
|
||||
}
|
||||
else
|
||||
{
|
||||
/* >output is a multiple of 8 byes, if len < rnum
|
||||
* >we must be careful. The user must be aware that this
|
||||
* >routine will write more bytes than he asked for.
|
||||
* >The length of the buffer must be correct.
|
||||
* FIXED - Should be ok now 18-9-90 - eay */
|
||||
if (len < rnum)
|
||||
{
|
||||
|
||||
if (DES_rw_mode & DES_PCBC_MODE)
|
||||
DES_pcbc_encrypt((DES_cblock *)net,
|
||||
(DES_cblock *)tmpbuf,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
else
|
||||
DES_cbc_encrypt((DES_cblock *)net,
|
||||
(DES_cblock *)tmpbuf,
|
||||
num,sched,iv,DES_DECRYPT);
|
||||
|
||||
/* eay 26/08/92 fix a bug that returned more
|
||||
* bytes than you asked for (returned len bytes :-( */
|
||||
memcpy(buf,tmpbuf,(unsigned int)num);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (DES_rw_mode & DES_PCBC_MODE)
|
||||
DES_pcbc_encrypt((DES_cblock *)net,
|
||||
(DES_cblock *)buf,num,sched,iv,
|
||||
DES_DECRYPT);
|
||||
else
|
||||
DES_cbc_encrypt((DES_cblock *)net,
|
||||
(DES_cblock *)buf,num,sched,iv,
|
||||
DES_DECRYPT);
|
||||
}
|
||||
}
|
||||
return((int)num);
|
||||
}
|
||||
|
||||
@@ -1,160 +0,0 @@
|
||||
/* crypto/des/enc_writ.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include <errno.h>
|
||||
#include <time.h>
|
||||
#include "des_locl.h"
|
||||
|
||||
int DES_enc_write(fd, buf, len, sched, iv)
|
||||
int fd;
|
||||
char *buf;
|
||||
int len;
|
||||
DES_key_schedule *sched;
|
||||
DES_cblock (*iv);
|
||||
{
|
||||
#ifdef _LIBC
|
||||
extern int srandom();
|
||||
extern unsigned long time();
|
||||
extern int random();
|
||||
extern int write();
|
||||
#endif
|
||||
|
||||
long rnum;
|
||||
int i,j,k,outnum;
|
||||
char *outbuf=NULL;
|
||||
char shortbuf[8];
|
||||
char *p;
|
||||
static int start=1;
|
||||
|
||||
if (outbuf == NULL)
|
||||
{
|
||||
outbuf=(char *)malloc(des_BSIZE+HDRSIZE);
|
||||
if (outbuf == NULL) return(-1);
|
||||
}
|
||||
/* If we are sending less than 8 bytes, the same char will look
|
||||
* the same if we don't pad it out with random bytes */
|
||||
if (start)
|
||||
{
|
||||
start=0;
|
||||
srandom((unsigned int)time(NULL));
|
||||
}
|
||||
|
||||
/* lets recurse if we want to send the data in small chunks */
|
||||
if (len > MAXWRITE)
|
||||
{
|
||||
j=0;
|
||||
for (i=0; i<len; i+=k)
|
||||
{
|
||||
k=DES_enc_write(fd,&(buf[i]),
|
||||
((len-i) > MAXWRITE)?MAXWRITE:(len-i),sched,iv);
|
||||
if (k < 0)
|
||||
return(k);
|
||||
else
|
||||
j+=k;
|
||||
}
|
||||
return(j);
|
||||
}
|
||||
|
||||
/* write length first */
|
||||
p=outbuf;
|
||||
l2n(len,p);
|
||||
|
||||
/* pad short strings */
|
||||
if (len < 8)
|
||||
{
|
||||
p=shortbuf;
|
||||
memcpy(shortbuf,buf,(unsigned int)len);
|
||||
for (i=len; i<8; i++)
|
||||
shortbuf[i]=random();
|
||||
rnum=8;
|
||||
}
|
||||
else
|
||||
{
|
||||
p=buf;
|
||||
rnum=((len+7)/8*8); /* round up to nearest eight */
|
||||
}
|
||||
|
||||
if (DES_rw_mode & DES_PCBC_MODE)
|
||||
DES_pcbc_encrypt((DES_cblock *)p,
|
||||
(DES_cblock *)&(outbuf[HDRSIZE]),
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
else
|
||||
DES_cbc_encrypt((DES_cblock *)p,
|
||||
(DES_cblock *)&(outbuf[HDRSIZE]),
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
|
||||
/* output */
|
||||
outnum=(int)rnum+HDRSIZE;
|
||||
|
||||
for (j=0; j<outnum; j+=i)
|
||||
{
|
||||
/* eay 26/08/92 I was not doing writing from where we
|
||||
* got upto. */
|
||||
i=write(fd,&(outbuf[j]),(unsigned int)(outnum-j));
|
||||
if (i == -1)
|
||||
{
|
||||
if (errno == EINTR)
|
||||
i=0;
|
||||
else /* This is really a bad error - very bad
|
||||
* It will stuff-up both ends. */
|
||||
return(-1);
|
||||
}
|
||||
}
|
||||
|
||||
return(len);
|
||||
}
|
||||
473
lib/des/fcrypt.c
473
lib/des/fcrypt.c
@@ -1,473 +0,0 @@
|
||||
/* crypto/des/fcrypt.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
|
||||
/* Eric Young.
|
||||
* This version of crypt has been developed from my MIT compatable
|
||||
* DES library.
|
||||
* The library is available at pub/Crypto/DES at ftp.psy.uq.oz.au
|
||||
* eay@mincom.oz.au or eay@psych.psy.uq.oz.au
|
||||
*/
|
||||
|
||||
/* Modification by Jens Kupferschmidt (Cu)
|
||||
* I have included directive PARA for shared memory computers.
|
||||
* I have included a directive LONGCRYPT to using this routine to cipher
|
||||
* passwords with more than 8 bytes like HP-UX 10.x it used. The MAXPLEN
|
||||
* definition is the maximum of lenght of password and can changed. I have
|
||||
* defined 24.
|
||||
*/
|
||||
|
||||
#define FCRYPT_MOD(R,u,t,E0,E1,tmp) \
|
||||
u=R>>16; \
|
||||
t=R^u; \
|
||||
u=t&E0; t=t&E1; \
|
||||
tmp=(u<<16); u^=R^s[S ]; u^=tmp; \
|
||||
tmp=(t<<16); t^=R^s[S+1]; t^=tmp
|
||||
|
||||
#define DES_FCRYPT
|
||||
#include "des_locl.h"
|
||||
#undef DES_FCRYPT
|
||||
|
||||
#undef PERM_OP
|
||||
#define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
|
||||
(b)^=(t),\
|
||||
(a)^=((t)<<(n)))
|
||||
|
||||
#undef HPERM_OP
|
||||
#define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\
|
||||
(a)=(a)^(t)^(t>>(16-(n))))\
|
||||
|
||||
#ifdef PARA
|
||||
#define STATIC
|
||||
#else
|
||||
#define STATIC static
|
||||
#endif
|
||||
|
||||
/* It used to be Only FreeBSD that had MD5 based crypts, but now it's
|
||||
* also the case on Redhat linux 6.0 and OpenBSD so we always include
|
||||
* this code. That solves the problem of making the test program
|
||||
* conditional as well.
|
||||
*/
|
||||
|
||||
#define MD5_CRYPT_SUPPORT 1
|
||||
|
||||
#if MD5_CRYPT_SUPPORT
|
||||
/*
|
||||
* ----------------------------------------------------------------------------
|
||||
* "THE BEER-WARE LICENSE" (Revision 42):
|
||||
* <phk@login.dknet.dk> wrote this file. As long as you retain this notice you
|
||||
* can do whatever you want with this stuff. If we meet some day, and you think
|
||||
* this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
|
||||
* ----------------------------------------------------------------------------
|
||||
*/
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
#include <md5.h>
|
||||
|
||||
static unsigned char itoa64[] = /* 0 ... 63 => ascii - 64 */
|
||||
"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
||||
|
||||
static void
|
||||
to64(s, v, n)
|
||||
char *s;
|
||||
unsigned long v;
|
||||
int n;
|
||||
{
|
||||
while (--n >= 0) {
|
||||
*s++ = itoa64[v&0x3f];
|
||||
v >>= 6;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* UNIX password
|
||||
*
|
||||
* Use MD5 for what it is best at...
|
||||
*/
|
||||
|
||||
static
|
||||
char *
|
||||
crypt_md5(pw, salt)
|
||||
register const char *pw;
|
||||
register const char *salt;
|
||||
{
|
||||
static char *magic = "$1$"; /*
|
||||
* This string is magic for
|
||||
* this algorithm. Having
|
||||
* it this way, we can get
|
||||
* get better later on
|
||||
*/
|
||||
static char passwd[120], *p;
|
||||
static const char *sp,*ep;
|
||||
unsigned char final[16];
|
||||
int sl,pl,i,j;
|
||||
MD5_CTX ctx,ctx1;
|
||||
unsigned long l;
|
||||
|
||||
/* Refine the Salt first */
|
||||
sp = salt;
|
||||
|
||||
/* If it starts with the magic string, then skip that */
|
||||
if(!strncmp(sp,magic,strlen(magic)))
|
||||
sp += strlen(magic);
|
||||
|
||||
/* It stops at the first '$', max 8 chars */
|
||||
for(ep=sp;*ep && *ep != '$' && ep < (sp+8);ep++)
|
||||
continue;
|
||||
|
||||
/* get the length of the true salt */
|
||||
sl = ep - sp;
|
||||
|
||||
MD5_Init(&ctx);
|
||||
|
||||
/* The password first, since that is what is most unknown */
|
||||
MD5_Update(&ctx,pw,strlen(pw));
|
||||
|
||||
/* Then our magic string */
|
||||
MD5_Update(&ctx,magic,strlen(magic));
|
||||
|
||||
/* Then the raw salt */
|
||||
MD5_Update(&ctx,sp,sl);
|
||||
|
||||
/* Then just as many characters of the MD5(pw,salt,pw) */
|
||||
MD5_Init(&ctx1);
|
||||
MD5_Update(&ctx1,pw,strlen(pw));
|
||||
MD5_Update(&ctx1,sp,sl);
|
||||
MD5_Update(&ctx1,pw,strlen(pw));
|
||||
MD5_Final(final,&ctx1);
|
||||
for(pl = strlen(pw); pl > 0; pl -= 16)
|
||||
MD5_Update(&ctx,final,pl>16 ? 16 : pl);
|
||||
|
||||
/* Don't leave anything around in vm they could use. */
|
||||
memset(final,0,sizeof final);
|
||||
|
||||
/* Then something really weird... */
|
||||
for (j=0,i = strlen(pw); i ; i >>= 1)
|
||||
if(i&1)
|
||||
MD5_Update(&ctx, final+j, 1);
|
||||
else
|
||||
MD5_Update(&ctx, pw+j, 1);
|
||||
|
||||
/* Now make the output string */
|
||||
strcpy(passwd, magic); /* sizeof(passwd) > sizeof(magic) */
|
||||
strncat(passwd, sp, sl); /* ok, since sl <= 8 */
|
||||
strcat(passwd, "$");
|
||||
|
||||
MD5_Final(final,&ctx);
|
||||
|
||||
/*
|
||||
* and now, just to make sure things don't run too fast
|
||||
* On a 60 Mhz Pentium this takes 34 msec, so you would
|
||||
* need 30 seconds to build a 1000 entry dictionary...
|
||||
*/
|
||||
for(i=0;i<1000;i++) {
|
||||
MD5_Init(&ctx1);
|
||||
if(i & 1)
|
||||
MD5_Update(&ctx1,pw,strlen(pw));
|
||||
else
|
||||
MD5_Update(&ctx1,final,16);
|
||||
|
||||
if(i % 3)
|
||||
MD5_Update(&ctx1,sp,sl);
|
||||
|
||||
if(i % 7)
|
||||
MD5_Update(&ctx1,pw,strlen(pw));
|
||||
|
||||
if(i & 1)
|
||||
MD5_Update(&ctx1,final,16);
|
||||
else
|
||||
MD5_Update(&ctx1,pw,strlen(pw));
|
||||
MD5_Final(final,&ctx1);
|
||||
}
|
||||
|
||||
p = passwd + strlen(passwd);
|
||||
|
||||
l = (final[ 0]<<16) | (final[ 6]<<8) | final[12]; to64(p,l,4); p += 4;
|
||||
l = (final[ 1]<<16) | (final[ 7]<<8) | final[13]; to64(p,l,4); p += 4;
|
||||
l = (final[ 2]<<16) | (final[ 8]<<8) | final[14]; to64(p,l,4); p += 4;
|
||||
l = (final[ 3]<<16) | (final[ 9]<<8) | final[15]; to64(p,l,4); p += 4;
|
||||
l = (final[ 4]<<16) | (final[10]<<8) | final[ 5]; to64(p,l,4); p += 4;
|
||||
l = final[11] ; to64(p,l,2); p += 2;
|
||||
*p = '\0';
|
||||
|
||||
/* Don't leave anything around in vm they could use. */
|
||||
memset(final,0,sizeof final);
|
||||
|
||||
return passwd;
|
||||
}
|
||||
#endif /* MD5_CRYPT_SUPPORT */
|
||||
|
||||
#ifndef NOPROTO
|
||||
|
||||
STATIC int fcrypt_body(DES_LONG *out0, DES_LONG *out1,
|
||||
DES_key_schedule *ks, DES_LONG Eswap0, DES_LONG Eswap1);
|
||||
|
||||
#else
|
||||
|
||||
STATIC int fcrypt_body();
|
||||
|
||||
#endif
|
||||
|
||||
/* Added more values to handle illegal salt values the way normal
|
||||
* crypt() implementations do. The patch was sent by
|
||||
* Bjorn Gronvall <bg@sics.se>
|
||||
*/
|
||||
static unsigned const char con_salt[128]={
|
||||
0xD2,0xD3,0xD4,0xD5,0xD6,0xD7,0xD8,0xD9,
|
||||
0xDA,0xDB,0xDC,0xDD,0xDE,0xDF,0xE0,0xE1,
|
||||
0xE2,0xE3,0xE4,0xE5,0xE6,0xE7,0xE8,0xE9,
|
||||
0xEA,0xEB,0xEC,0xED,0xEE,0xEF,0xF0,0xF1,
|
||||
0xF2,0xF3,0xF4,0xF5,0xF6,0xF7,0xF8,0xF9,
|
||||
0xFA,0xFB,0xFC,0xFD,0xFE,0xFF,0x00,0x01,
|
||||
0x02,0x03,0x04,0x05,0x06,0x07,0x08,0x09,
|
||||
0x0A,0x0B,0x05,0x06,0x07,0x08,0x09,0x0A,
|
||||
0x0B,0x0C,0x0D,0x0E,0x0F,0x10,0x11,0x12,
|
||||
0x13,0x14,0x15,0x16,0x17,0x18,0x19,0x1A,
|
||||
0x1B,0x1C,0x1D,0x1E,0x1F,0x20,0x21,0x22,
|
||||
0x23,0x24,0x25,0x20,0x21,0x22,0x23,0x24,
|
||||
0x25,0x26,0x27,0x28,0x29,0x2A,0x2B,0x2C,
|
||||
0x2D,0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,
|
||||
0x35,0x36,0x37,0x38,0x39,0x3A,0x3B,0x3C,
|
||||
0x3D,0x3E,0x3F,0x40,0x41,0x42,0x43,0x44,
|
||||
};
|
||||
|
||||
static unsigned const char cov_2char[64]={
|
||||
0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,0x35,
|
||||
0x36,0x37,0x38,0x39,0x41,0x42,0x43,0x44,
|
||||
0x45,0x46,0x47,0x48,0x49,0x4A,0x4B,0x4C,
|
||||
0x4D,0x4E,0x4F,0x50,0x51,0x52,0x53,0x54,
|
||||
0x55,0x56,0x57,0x58,0x59,0x5A,0x61,0x62,
|
||||
0x63,0x64,0x65,0x66,0x67,0x68,0x69,0x6A,
|
||||
0x6B,0x6C,0x6D,0x6E,0x6F,0x70,0x71,0x72,
|
||||
0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7A
|
||||
};
|
||||
|
||||
#ifndef NOPROTO
|
||||
#ifdef PERL5
|
||||
char *DES_crypt(const char *buf,const char *salt);
|
||||
#else
|
||||
char *crypt(const char *buf,const char *salt);
|
||||
#endif
|
||||
#else
|
||||
#ifdef PERL5
|
||||
char *DES_crypt();
|
||||
#else
|
||||
char *crypt();
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#ifdef PERL5
|
||||
char *DES_crypt(buf,salt)
|
||||
#else
|
||||
char *crypt(buf,salt)
|
||||
#endif
|
||||
const char *buf;
|
||||
const char *salt;
|
||||
{
|
||||
static char buff[14];
|
||||
|
||||
#if MD5_CRYPT_SUPPORT
|
||||
if (!strncmp(salt, "$1$", 3))
|
||||
return crypt_md5(buf, salt);
|
||||
#endif
|
||||
|
||||
return(DES_fcrypt(buf,salt,buff));
|
||||
}
|
||||
|
||||
|
||||
char *DES_fcrypt(buf,salt,ret)
|
||||
const char *buf;
|
||||
const char *salt;
|
||||
char *ret;
|
||||
{
|
||||
unsigned int i,j,x,y;
|
||||
DES_LONG Eswap0,Eswap1;
|
||||
DES_LONG out[2],ll;
|
||||
DES_cblock key;
|
||||
DES_key_schedule ks;
|
||||
unsigned char bb[9];
|
||||
unsigned char *b=bb;
|
||||
unsigned char c,u;
|
||||
|
||||
/* eay 25/08/92
|
||||
* If you call crypt("pwd","*") as often happens when you
|
||||
* have * as the pwd field in /etc/passwd, the function
|
||||
* returns *\0XXXXXXXXX
|
||||
* The \0 makes the string look like * so the pwd "*" would
|
||||
* crypt to "*". This was found when replacing the crypt in
|
||||
* our shared libraries. People found that the disbled
|
||||
* accounts effectivly had no passwd :-(. */
|
||||
x=ret[0]=((salt[0] == '\0')?'A':salt[0]);
|
||||
Eswap0=con_salt[x]<<2;
|
||||
x=ret[1]=((salt[1] == '\0')?'A':salt[1]);
|
||||
Eswap1=con_salt[x]<<6;
|
||||
|
||||
/* EAY
|
||||
r=strlen(buf);
|
||||
r=(r+7)/8;
|
||||
*/
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
c= *(buf++);
|
||||
if (!c) break;
|
||||
key[i]=(c<<1);
|
||||
}
|
||||
for (; i<8; i++)
|
||||
key[i]=0;
|
||||
|
||||
DES_set_key((DES_cblock *)(key),&ks);
|
||||
fcrypt_body(&(out[0]),&(out[1]),&ks,Eswap0,Eswap1);
|
||||
|
||||
ll=out[0]; l2c(ll,b);
|
||||
ll=out[1]; l2c(ll,b);
|
||||
y=0;
|
||||
u=0x80;
|
||||
bb[8]=0;
|
||||
for (i=2; i<13; i++)
|
||||
{
|
||||
c=0;
|
||||
for (j=0; j<6; j++)
|
||||
{
|
||||
c<<=1;
|
||||
if (bb[y] & u) c|=1;
|
||||
u>>=1;
|
||||
if (!u)
|
||||
{
|
||||
y++;
|
||||
u=0x80;
|
||||
}
|
||||
}
|
||||
ret[i]=cov_2char[c];
|
||||
}
|
||||
ret[13]='\0';
|
||||
return(ret);
|
||||
}
|
||||
|
||||
STATIC int fcrypt_body(out0, out1, ks, Eswap0, Eswap1)
|
||||
DES_LONG *out0;
|
||||
DES_LONG *out1;
|
||||
DES_key_schedule *ks;
|
||||
DES_LONG Eswap0;
|
||||
DES_LONG Eswap1;
|
||||
{
|
||||
register DES_LONG l,r,t,u;
|
||||
#ifdef DES_PTR
|
||||
register unsigned char *des_SP=(unsigned char *)des_SPtrans;
|
||||
#endif
|
||||
register DES_LONG *s;
|
||||
register int j;
|
||||
register DES_LONG E0,E1;
|
||||
|
||||
l=0;
|
||||
r=0;
|
||||
|
||||
s=(DES_LONG *)ks;
|
||||
E0=Eswap0;
|
||||
E1=Eswap1;
|
||||
|
||||
for (j=0; j<25; j++)
|
||||
{
|
||||
#ifdef DES_UNROLL
|
||||
register int i;
|
||||
|
||||
for (i=0; i<32; i+=8)
|
||||
{
|
||||
D_ENCRYPT(l,r,i+0); /* 1 */
|
||||
D_ENCRYPT(r,l,i+2); /* 2 */
|
||||
D_ENCRYPT(l,r,i+4); /* 3 */
|
||||
D_ENCRYPT(r,l,i+6); /* 4 */
|
||||
}
|
||||
#else
|
||||
D_ENCRYPT(l,r, 0); /* 1 */
|
||||
D_ENCRYPT(r,l, 2); /* 2 */
|
||||
D_ENCRYPT(l,r, 4); /* 3 */
|
||||
D_ENCRYPT(r,l, 6); /* 4 */
|
||||
D_ENCRYPT(l,r, 8); /* 5 */
|
||||
D_ENCRYPT(r,l,10); /* 6 */
|
||||
D_ENCRYPT(l,r,12); /* 7 */
|
||||
D_ENCRYPT(r,l,14); /* 8 */
|
||||
D_ENCRYPT(l,r,16); /* 9 */
|
||||
D_ENCRYPT(r,l,18); /* 10 */
|
||||
D_ENCRYPT(l,r,20); /* 11 */
|
||||
D_ENCRYPT(r,l,22); /* 12 */
|
||||
D_ENCRYPT(l,r,24); /* 13 */
|
||||
D_ENCRYPT(r,l,26); /* 14 */
|
||||
D_ENCRYPT(l,r,28); /* 15 */
|
||||
D_ENCRYPT(r,l,30); /* 16 */
|
||||
#endif
|
||||
t=l;
|
||||
l=r;
|
||||
r=t;
|
||||
}
|
||||
l=ROTATE(l,3)&0xffffffffL;
|
||||
r=ROTATE(r,3)&0xffffffffL;
|
||||
|
||||
PERM_OP(l,r,t, 1,0x55555555L);
|
||||
PERM_OP(r,l,t, 8,0x00ff00ffL);
|
||||
PERM_OP(l,r,t, 2,0x33333333L);
|
||||
PERM_OP(r,l,t,16,0x0000ffffL);
|
||||
PERM_OP(l,r,t, 4,0x0f0f0f0fL);
|
||||
|
||||
*out0=r;
|
||||
*out1=l;
|
||||
return(0);
|
||||
}
|
||||
|
||||
215
lib/des/gen-des.pl
Normal file
215
lib/des/gen-des.pl
Normal file
@@ -0,0 +1,215 @@
|
||||
#!/usr/pkg/bin/perl
|
||||
#
|
||||
# $Id$
|
||||
|
||||
use strict;
|
||||
|
||||
my $gen = 1;
|
||||
|
||||
sub gen_pattern
|
||||
{
|
||||
my $n = shift;
|
||||
my $r = shift;
|
||||
my $a = shift;
|
||||
my $o = shift;
|
||||
my $s = shift;
|
||||
print "/* $n bit pattern ";
|
||||
foreach my $k (@$a) {
|
||||
print "$k ";
|
||||
}
|
||||
print "*/\n";
|
||||
print "static int $n\[", $r + 1, "\] = {\n ";
|
||||
foreach my $i (0..$r) {
|
||||
my $j = 0;
|
||||
my $b = 1;
|
||||
foreach my $k (reverse @$a) {
|
||||
if ($i & $b) {
|
||||
$j |= ($s >>($k - $o - 1));
|
||||
}
|
||||
$b = $b << 1;
|
||||
}
|
||||
printf "0x%08x", $j;
|
||||
print ", " if ($i != $r);
|
||||
if (($i % 4) == 3) {
|
||||
print "\n";
|
||||
print " " if ($i != $r);
|
||||
}
|
||||
}
|
||||
print "};\n";
|
||||
}
|
||||
|
||||
if ($gen) {
|
||||
gen_pattern("pc1_c_3", 7, [ 5, 13, 21 ], 0, 0x1000000);
|
||||
gen_pattern("pc1_c_4", 15, [ 1, 9, 17, 25 ], 0, 0x1000000);
|
||||
gen_pattern("pc1_d_3", 7, [ 49, 41, 33 ], 32, 0x1000000);
|
||||
gen_pattern("pc1_d_4", 15, [ 57, 53, 45, 37 ], 32, 0x1000000);
|
||||
|
||||
gen_pattern("pc2_c_1", 63, [ 5, 24, 7, 16, 6, 10 ], 0, 0x800000);
|
||||
gen_pattern("pc2_c_2", 63, [ 20, 18, 12, 3, 15, 23 ], 0, 0x800000);
|
||||
gen_pattern("pc2_c_3", 63, [ 1, 9, 19, 2, 14, 22 ], 0, 0x800000);
|
||||
gen_pattern("pc2_c_4", 63, [ 11, 13, 4, 17, 21, 8 ], 0, 0x800000);
|
||||
|
||||
gen_pattern("pc2_d_1", 63, [ 51, 35, 31, 52, 39, 45 ], 28, 0x800000);
|
||||
gen_pattern("pc2_d_2", 63, [ 50, 32, 43, 36, 29, 48 ], 28, 0x800000);
|
||||
gen_pattern("pc2_d_3", 63, [ 41, 38, 47, 33, 40, 42 ], 28, 0x800000);
|
||||
gen_pattern("pc2_d_4", 63, [ 49, 37, 30, 46, 34, 44 ], 28, 0x800000);
|
||||
}
|
||||
|
||||
sub
|
||||
pbox_mutation
|
||||
{
|
||||
my $n = shift;
|
||||
my $res = 0;
|
||||
|
||||
my @pbox = (
|
||||
16, 7, 20, 21,
|
||||
29, 12, 28, 17,
|
||||
1, 15, 23, 26,
|
||||
5, 18, 31, 10,
|
||||
2, 8, 24, 14,
|
||||
32, 27, 3, 9,
|
||||
19, 13, 30, 6,
|
||||
22, 11, 4, 25
|
||||
);
|
||||
|
||||
foreach my $i (0..31) {
|
||||
if ($n & (1 << ($pbox[$i] - 1))) {
|
||||
# print "$i ", ($pbox[$i] - 1), "\n";
|
||||
$res |= 1 << $i;
|
||||
}
|
||||
}
|
||||
|
||||
return $res;
|
||||
}
|
||||
|
||||
|
||||
my @S1 = (
|
||||
14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7,
|
||||
0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8,
|
||||
4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0,
|
||||
15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13,
|
||||
);
|
||||
my @S2 = (
|
||||
15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10,
|
||||
3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5,
|
||||
0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15,
|
||||
13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9,
|
||||
);
|
||||
my @S3 = (
|
||||
10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8,
|
||||
13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1,
|
||||
13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7,
|
||||
1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12,
|
||||
);
|
||||
my @S4 = (
|
||||
7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15,
|
||||
13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9,
|
||||
10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4,
|
||||
3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14,
|
||||
);
|
||||
my @S5 = (
|
||||
2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9,
|
||||
14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6,
|
||||
4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14,
|
||||
11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3,
|
||||
);
|
||||
my @S6 = (
|
||||
12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11,
|
||||
10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8,
|
||||
9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6,
|
||||
4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13,
|
||||
);
|
||||
my @S7 = (
|
||||
4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1,
|
||||
13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6,
|
||||
1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2,
|
||||
6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12,
|
||||
);
|
||||
|
||||
my @S8 = (
|
||||
13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7,
|
||||
1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2,
|
||||
7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8,
|
||||
2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11,
|
||||
);
|
||||
|
||||
my @SBox = ( \@S1, \@S2, \@S3, \@S4, \@S5, \@S6, \@S7, \@S8 );
|
||||
|
||||
sub
|
||||
one_num_in_one_sbox
|
||||
{
|
||||
my $i = shift;
|
||||
my $n = shift;
|
||||
my $r = shift;
|
||||
|
||||
my $index = (($n & 1) << 4) | (($n & 0x20)) |
|
||||
(($n >> 1) & 0x1) << 0 |
|
||||
(($n >> 2) & 0x1) << 1 |
|
||||
(($n >> 3) & 0x1) << 2 |
|
||||
(($n >> 4) & 0x1) << 3;
|
||||
|
||||
die "argh" if ($index > 63 || $index < 0);
|
||||
|
||||
my $S = $SBox[$i - 1];
|
||||
my $val = $$S[$index];
|
||||
|
||||
my $res = $val << (($i - 1) * 4);
|
||||
|
||||
my $p = &pbox_mutation($res);
|
||||
|
||||
print " $r ";
|
||||
|
||||
# $p = ($p >> $r) | ($p << (32 - $r - 1));
|
||||
|
||||
printf "0x%08x", $p;
|
||||
print ", " if ($n != 63 or 1);
|
||||
if (($n % 4) == 3) {
|
||||
print " /* $i */" if ($n == 3);
|
||||
print "\n";
|
||||
print "\t" if ($n != 63);
|
||||
}
|
||||
}
|
||||
|
||||
sub
|
||||
one_sbox
|
||||
{
|
||||
my $i = shift;
|
||||
my $s = 0;
|
||||
|
||||
# print "static uint32_t sbox". $i ."[] = {\n\t";
|
||||
print "\t";
|
||||
foreach my $n (0..63) {
|
||||
one_num_in_one_sbox($i, $n, $s);
|
||||
}
|
||||
print "\n";
|
||||
# print "};\n";
|
||||
}
|
||||
|
||||
if ($gen and 0) {
|
||||
foreach my $sbox (7, 1, 3, 5, 4, 6, 8, 2) {
|
||||
one_sbox($sbox, 1);
|
||||
}
|
||||
}
|
||||
|
||||
#my $num = 1;
|
||||
#printf "pbox: %d -> 0x%08x\n", $num, pbox_mutation($num);
|
||||
#$num = 0xc000000;
|
||||
#printf "pbox: 0x%08x -> 0x%08x\n", $num, pbox_mutation($num);
|
||||
|
||||
print "static unsigned char odd_parity[256] = { \n";
|
||||
foreach my $i (0..255) {
|
||||
my $num = 0;
|
||||
foreach my $b (1..7) {
|
||||
$num++ if (($i >> $b) & 1);
|
||||
}
|
||||
my $t;
|
||||
if (($num & 1) == 0) {
|
||||
$t = $i | 1;
|
||||
} else {
|
||||
$t = 0xfe & $i;
|
||||
}
|
||||
printf "%3d,", $t;
|
||||
printf "\n" if (($i % 16) == 15);
|
||||
|
||||
};
|
||||
print " };\n";
|
||||
@@ -1,48 +0,0 @@
|
||||
/*
|
||||
* Copyright (c) 1995, 1996, 1997 Kungliga Tekniska H<>gskolan
|
||||
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* 3. Neither the name of the Institute nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* MIT Link and source compatibility */
|
||||
|
||||
#ifdef DES_fixup_key_parity
|
||||
#undef DES_fixup_key_parity
|
||||
#endif /* DES_fixup_key_parity */
|
||||
|
||||
void DES_fixup_key_parity(DES_cblock *key);
|
||||
|
||||
void
|
||||
DES_fixup_key_parity(DES_cblock *key)
|
||||
{
|
||||
DES_set_odd_parity(key);
|
||||
}
|
||||
@@ -1,50 +0,0 @@
|
||||
#
|
||||
# Origional BC Makefile from Teun <Teun.Nijssen@kub.nl>
|
||||
#
|
||||
#
|
||||
CC = bcc
|
||||
TLIB = tlib /0 /C
|
||||
# note: the -3 flag produces code for 386, 486, Pentium etc; omit it for 286s
|
||||
OPTIMIZE= -3 -O2
|
||||
#WINDOWS= -W
|
||||
CFLAGS = -c -ml -d $(OPTIMIZE) $(WINDOWS) -DMSDOS
|
||||
LFLAGS = -ml $(WINDOWS)
|
||||
|
||||
.c.obj:
|
||||
$(CC) $(CFLAGS) $*.c
|
||||
|
||||
.obj.exe:
|
||||
$(CC) $(LFLAGS) -e$*.exe $*.obj libdes.lib
|
||||
|
||||
all: $(LIB) destest.exe rpw.exe des.exe speed.exe
|
||||
|
||||
# "make clean": use a directory containing only libdes .exe and .obj files...
|
||||
clean:
|
||||
del *.exe
|
||||
del *.obj
|
||||
del libdes.lib
|
||||
del libdes.rsp
|
||||
|
||||
OBJS= cbc_cksm.obj cbc_enc.obj ecb_enc.obj pcbc_enc.obj \
|
||||
qud_cksm.obj rand_key.obj set_key.obj str2key.obj \
|
||||
enc_read.obj enc_writ.obj fcrypt.obj cfb_enc.obj \
|
||||
ecb3_enc.obj ofb_enc.obj cbc3_enc.obj read_pwd.obj\
|
||||
cfb64enc.obj ofb64enc.obj ede_enc.obj cfb64ede.obj\
|
||||
ofb64ede.obj supp.obj
|
||||
|
||||
LIB= libdes.lib
|
||||
|
||||
$(LIB): $(OBJS)
|
||||
del $(LIB)
|
||||
makersp "+%s &\n" &&|
|
||||
$(OBJS)
|
||||
| >libdes.rsp
|
||||
$(TLIB) libdes.lib @libdes.rsp,nul
|
||||
del libdes.rsp
|
||||
|
||||
destest.exe: destest.obj libdes.lib
|
||||
rpw.exe: rpw.obj libdes.lib
|
||||
speed.exe: speed.obj libdes.lib
|
||||
des.exe: des.obj libdes.lib
|
||||
|
||||
|
||||
@@ -1,141 +0,0 @@
|
||||
/* crypto/des/ncbc_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
void DES_ncbc_encrypt(input, output, length, schedule, ivec, encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG tin0,tin1;
|
||||
register DES_LONG tout0,tout1,xor0,xor1;
|
||||
register unsigned char *in,*out;
|
||||
register long l=length;
|
||||
DES_LONG tin[2];
|
||||
unsigned char *iv;
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
if (encrypt)
|
||||
{
|
||||
c2l(iv,tout0);
|
||||
c2l(iv,tout1);
|
||||
for (l-=8; l>=0; l-=8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
tin0^=tout0; tin[0]=tin0;
|
||||
tin1^=tout1; tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
tout0=tin[0]; l2c(tout0,out);
|
||||
tout1=tin[1]; l2c(tout1,out);
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2ln(in,tin0,tin1,l+8);
|
||||
tin0^=tout0; tin[0]=tin0;
|
||||
tin1^=tout1; tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
tout0=tin[0]; l2c(tout0,out);
|
||||
tout1=tin[1]; l2c(tout1,out);
|
||||
}
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(tout0,iv);
|
||||
l2c(tout1,iv);
|
||||
}
|
||||
else
|
||||
{
|
||||
c2l(iv,xor0);
|
||||
c2l(iv,xor1);
|
||||
for (l-=8; l>=0; l-=8)
|
||||
{
|
||||
c2l(in,tin0); tin[0]=tin0;
|
||||
c2l(in,tin1); tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_DECRYPT);
|
||||
tout0=tin[0]^xor0;
|
||||
tout1=tin[1]^xor1;
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
xor0=tin0;
|
||||
xor1=tin1;
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2l(in,tin0); tin[0]=tin0;
|
||||
c2l(in,tin1); tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_DECRYPT);
|
||||
tout0=tin[0]^xor0;
|
||||
tout1=tin[1]^xor1;
|
||||
l2cn(tout0,tout1,out,l+8);
|
||||
xor0=tin0;
|
||||
xor1=tin1;
|
||||
}
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(xor0,iv);
|
||||
l2c(xor1,iv);
|
||||
}
|
||||
tin0=tin1=tout0=tout1=xor0=xor1=0;
|
||||
tin[0]=tin[1]=0;
|
||||
}
|
||||
|
||||
@@ -1,131 +0,0 @@
|
||||
/* crypto/des/ofb64ede.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output encrypted as though 64bit ofb mode is being
|
||||
* used. The extra state information to record how much of the
|
||||
* 64bit block we have used is contained in *num;
|
||||
*/
|
||||
void DES_ede3_ofb64_encrypt(in, out, length, k1,k2,k3, ivec, num)
|
||||
register unsigned char *in;
|
||||
register unsigned char *out;
|
||||
long length;
|
||||
DES_key_schedule *k1,*k2,*k3;
|
||||
DES_cblock (*ivec);
|
||||
int *num;
|
||||
{
|
||||
register DES_LONG v0,v1;
|
||||
register int n= *num;
|
||||
register long l=length;
|
||||
DES_cblock d;
|
||||
register char *dp;
|
||||
DES_LONG ti[2];
|
||||
unsigned char *iv;
|
||||
int save=0;
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
dp=(char *)d;
|
||||
l2c(v0,dp);
|
||||
l2c(v1,dp);
|
||||
while (l--)
|
||||
{
|
||||
if (n == 0)
|
||||
{
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
DES_encrypt3((DES_LONG *)ti,k1,k2,k3);
|
||||
v0=ti[0];
|
||||
v1=ti[1];
|
||||
|
||||
dp=(char *)d;
|
||||
l2c(v0,dp);
|
||||
l2c(v1,dp);
|
||||
save++;
|
||||
}
|
||||
*(out++)= *(in++)^d[n];
|
||||
n=(n+1)&0x07;
|
||||
}
|
||||
if (save)
|
||||
{
|
||||
/* v0=ti[0];
|
||||
v1=ti[1];*/
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
}
|
||||
v0=v1=ti[0]=ti[1]=0;
|
||||
*num=n;
|
||||
}
|
||||
|
||||
#ifdef undef /* MACRO */
|
||||
void DES_ede2_ofb64_encrypt(in, out, length, k1,k2, ivec, num)
|
||||
register unsigned char *in;
|
||||
register unsigned char *out;
|
||||
long length;
|
||||
DES_key_schedule *k1,*k2;
|
||||
DES_cblock (*ivec);
|
||||
int *num;
|
||||
{
|
||||
DES_ede3_ofb64_encrypt(in, out, length, k1,k2,k1, ivec, num);
|
||||
}
|
||||
#endif
|
||||
@@ -1,114 +0,0 @@
|
||||
/* crypto/des/ofb64enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output encrypted as though 64bit ofb mode is being
|
||||
* used. The extra state information to record how much of the
|
||||
* 64bit block we have used is contained in *num;
|
||||
*/
|
||||
void DES_ofb64_encrypt(in, out, length, schedule, ivec, num)
|
||||
register unsigned char *in;
|
||||
register unsigned char *out;
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
int *num;
|
||||
{
|
||||
register DES_LONG v0,v1,t;
|
||||
register int n= *num;
|
||||
register long l=length;
|
||||
DES_cblock d;
|
||||
register char *dp;
|
||||
DES_LONG ti[2];
|
||||
unsigned char *iv;
|
||||
int save=0;
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
dp=(char *)d;
|
||||
l2c(v0,dp);
|
||||
l2c(v1,dp);
|
||||
while (l--)
|
||||
{
|
||||
if (n == 0)
|
||||
{
|
||||
DES_encrypt((DES_LONG *)ti,schedule,DES_ENCRYPT);
|
||||
dp=(char *)d;
|
||||
t=ti[0]; l2c(t,dp);
|
||||
t=ti[1]; l2c(t,dp);
|
||||
save++;
|
||||
}
|
||||
*(out++)= *(in++)^d[n];
|
||||
n=(n+1)&0x07;
|
||||
}
|
||||
if (save)
|
||||
{
|
||||
v0=ti[0];
|
||||
v1=ti[1];
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
}
|
||||
t=v0=v1=ti[0]=ti[1]=0;
|
||||
*num=n;
|
||||
}
|
||||
|
||||
@@ -1,122 +0,0 @@
|
||||
/* crypto/des/ofb_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* The input and output are loaded in multiples of 8 bits.
|
||||
* What this means is that if you hame numbits=12 and length=2
|
||||
* the first 12 bits will be retrieved from the first byte and half
|
||||
* the second. The second 12 bits will come from the 3rd and half the 4th
|
||||
* byte.
|
||||
*/
|
||||
void DES_ofb_encrypt(in, out, numbits, length, schedule, ivec)
|
||||
unsigned char *in;
|
||||
unsigned char *out;
|
||||
int numbits;
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
{
|
||||
register DES_LONG d0,d1,v0,v1,n=(numbits+7)/8;
|
||||
register DES_LONG mask0,mask1;
|
||||
register long l=length;
|
||||
register int num=numbits;
|
||||
DES_LONG ti[2];
|
||||
unsigned char *iv;
|
||||
|
||||
if (num > 64) return;
|
||||
if (num > 32)
|
||||
{
|
||||
mask0=0xffffffffL;
|
||||
if (num >= 64)
|
||||
mask1=mask0;
|
||||
else
|
||||
mask1=(1L<<(num-32))-1;
|
||||
}
|
||||
else
|
||||
{
|
||||
if (num == 32)
|
||||
mask0=0xffffffffL;
|
||||
else
|
||||
mask0=(1L<<num)-1;
|
||||
mask1=0x00000000;
|
||||
}
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
c2l(iv,v0);
|
||||
c2l(iv,v1);
|
||||
ti[0]=v0;
|
||||
ti[1]=v1;
|
||||
while (l-- > 0)
|
||||
{
|
||||
DES_encrypt((DES_LONG *)ti,schedule,DES_ENCRYPT);
|
||||
c2ln(in,d0,d1,n);
|
||||
in+=n;
|
||||
d0=(d0^ti[0])&mask0;
|
||||
d1=(d1^ti[1])&mask1;
|
||||
l2cn(d0,d1,out,n);
|
||||
out+=n;
|
||||
}
|
||||
v0=ti[0];
|
||||
v1=ti[1];
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(v0,iv);
|
||||
l2c(v1,iv);
|
||||
v0=v1=d0=d1=ti[0]=ti[1]=0;
|
||||
}
|
||||
|
||||
@@ -1,126 +0,0 @@
|
||||
/* crypto/des/pcbc_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
void DES_pcbc_encrypt(input, output, length, schedule, ivec, encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG sin0,sin1,xor0,xor1,tout0,tout1;
|
||||
DES_LONG tin[2];
|
||||
unsigned char *in,*out,*iv;
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
if (encrypt)
|
||||
{
|
||||
c2l(iv,xor0);
|
||||
c2l(iv,xor1);
|
||||
for (; length>0; length-=8)
|
||||
{
|
||||
if (length >= 8)
|
||||
{
|
||||
c2l(in,sin0);
|
||||
c2l(in,sin1);
|
||||
}
|
||||
else
|
||||
c2ln(in,sin0,sin1,length);
|
||||
tin[0]=sin0^xor0;
|
||||
tin[1]=sin1^xor1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
tout0=tin[0];
|
||||
tout1=tin[1];
|
||||
xor0=sin0^tout0;
|
||||
xor1=sin1^tout1;
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
c2l(iv,xor0); c2l(iv,xor1);
|
||||
for (; length>0; length-=8)
|
||||
{
|
||||
c2l(in,sin0);
|
||||
c2l(in,sin1);
|
||||
tin[0]=sin0;
|
||||
tin[1]=sin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_DECRYPT);
|
||||
tout0=tin[0]^xor0;
|
||||
tout1=tin[1]^xor1;
|
||||
if (length >= 8)
|
||||
{
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
}
|
||||
else
|
||||
l2cn(tout0,tout1,out,length);
|
||||
xor0=tout0^sin0;
|
||||
xor1=tout1^sin1;
|
||||
}
|
||||
}
|
||||
tin[0]=tin[1]=0;
|
||||
sin0=sin1=xor0=xor1=tout0=tout1=0;
|
||||
}
|
||||
@@ -1,75 +0,0 @@
|
||||
/* crypto/des/podd.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
static const unsigned char odd_parity[256]={
|
||||
1, 1, 2, 2, 4, 4, 7, 7, 8, 8, 11, 11, 13, 13, 14, 14,
|
||||
16, 16, 19, 19, 21, 21, 22, 22, 25, 25, 26, 26, 28, 28, 31, 31,
|
||||
32, 32, 35, 35, 37, 37, 38, 38, 41, 41, 42, 42, 44, 44, 47, 47,
|
||||
49, 49, 50, 50, 52, 52, 55, 55, 56, 56, 59, 59, 61, 61, 62, 62,
|
||||
64, 64, 67, 67, 69, 69, 70, 70, 73, 73, 74, 74, 76, 76, 79, 79,
|
||||
81, 81, 82, 82, 84, 84, 87, 87, 88, 88, 91, 91, 93, 93, 94, 94,
|
||||
97, 97, 98, 98,100,100,103,103,104,104,107,107,109,109,110,110,
|
||||
112,112,115,115,117,117,118,118,121,121,122,122,124,124,127,127,
|
||||
128,128,131,131,133,133,134,134,137,137,138,138,140,140,143,143,
|
||||
145,145,146,146,148,148,151,151,152,152,155,155,157,157,158,158,
|
||||
161,161,162,162,164,164,167,167,168,168,171,171,173,173,174,174,
|
||||
176,176,179,179,181,181,182,182,185,185,186,186,188,188,191,191,
|
||||
193,193,194,194,196,196,199,199,200,200,203,203,205,205,206,206,
|
||||
208,208,211,211,213,213,214,214,217,217,218,218,220,220,223,223,
|
||||
224,224,227,227,229,229,230,230,233,233,234,234,236,236,239,239,
|
||||
241,241,242,242,244,244,247,247,248,248,251,251,253,253,254,254};
|
||||
@@ -1,143 +0,0 @@
|
||||
/* crypto/des/qud_cksm.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/* From "Message Authentication" R.R. Jueneman, S.M. Matyas, C.H. Meyer
|
||||
* IEEE Communications Magazine Sept 1985 Vol. 23 No. 9 p 29-40
|
||||
* This module in only based on the code in this paper and is
|
||||
* almost definitely not the same as the MIT implementation.
|
||||
*/
|
||||
#include "des_locl.h"
|
||||
|
||||
/* bug fix for dos - 7/6/91 - Larry hughes@logos.ucs.indiana.edu */
|
||||
#define Q_B0(a) (((DES_LONG)(a)))
|
||||
#define Q_B1(a) (((DES_LONG)(a))<<8)
|
||||
#define Q_B2(a) (((DES_LONG)(a))<<16)
|
||||
#define Q_B3(a) (((DES_LONG)(a))<<24)
|
||||
|
||||
/* used to scramble things a bit */
|
||||
/* Got the value MIT uses via brute force :-) 2/10/90 eay */
|
||||
#define NOISE ((DES_LONG)83653421L)
|
||||
|
||||
DES_LONG DES_quad_cksum(input, output, length, out_count, seed)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
int out_count;
|
||||
DES_cblock (*seed);
|
||||
{
|
||||
DES_LONG z0,z1,t0,t1;
|
||||
int i;
|
||||
long l;
|
||||
#ifdef _CRAY
|
||||
typedef struct {
|
||||
unsigned int a:32;
|
||||
unsigned int b:32;
|
||||
} XXX;
|
||||
#else
|
||||
typedef DES_LONG XXX;
|
||||
#endif
|
||||
unsigned char *cp;
|
||||
XXX *lp;
|
||||
|
||||
if (out_count < 1) out_count=1;
|
||||
lp=(XXX*)output;
|
||||
|
||||
z0=Q_B0((*seed)[0])|Q_B1((*seed)[1])|Q_B2((*seed)[2])|Q_B3((*seed)[3]);
|
||||
z1=Q_B0((*seed)[4])|Q_B1((*seed)[5])|Q_B2((*seed)[6])|Q_B3((*seed)[7]);
|
||||
|
||||
for (i=0; ((i<4)&&(i<out_count)); i++)
|
||||
{
|
||||
cp=(unsigned char *)input;
|
||||
l=length;
|
||||
while (l > 0)
|
||||
{
|
||||
if (l > 1)
|
||||
{
|
||||
t0= (DES_LONG)(*(cp++));
|
||||
t0|=(DES_LONG)Q_B1(*(cp++));
|
||||
l--;
|
||||
}
|
||||
else
|
||||
t0= (DES_LONG)(*(cp++));
|
||||
l--;
|
||||
/* add */
|
||||
t0+=z0;
|
||||
t0&=0xffffffffL;
|
||||
t1=z1;
|
||||
/* square, well sort of square */
|
||||
z0=((((t0*t0)&0xffffffffL)+((t1*t1)&0xffffffffL))
|
||||
&0xffffffffL)%0x7fffffffL;
|
||||
z1=((t0*((t1+NOISE)&0xffffffffL))&0xffffffffL)%0x7fffffffL;
|
||||
}
|
||||
if (lp != NULL)
|
||||
{
|
||||
/* The MIT library assumes that the checksum is
|
||||
* composed of 2*out_count 32 bit ints */
|
||||
#ifdef _CRAY
|
||||
lp->a = z0;
|
||||
lp->b = z1;
|
||||
lp++;
|
||||
#else
|
||||
*lp++ = (XXX)z0;
|
||||
*lp++ = (XXX)z1;
|
||||
#endif
|
||||
}
|
||||
}
|
||||
return(z0);
|
||||
}
|
||||
|
||||
@@ -1,121 +0,0 @@
|
||||
/* crypto/des/rand_key.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
#include <time.h>
|
||||
|
||||
static int seed=0;
|
||||
static des_cblock init;
|
||||
|
||||
void des_random_seed(key)
|
||||
des_cblock key;
|
||||
{
|
||||
memcpy(init,key,sizeof(des_cblock));
|
||||
seed=1;
|
||||
}
|
||||
|
||||
/* Old source */
|
||||
/*
|
||||
void des_random_key(ret)
|
||||
unsigned char *ret;
|
||||
{
|
||||
des_key_schedule ks;
|
||||
static DES_LONG c=0;
|
||||
static unsigned short pid=0;
|
||||
static des_cblock data={0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef};
|
||||
des_cblock key;
|
||||
unsigned char *p;
|
||||
DES_LONG t;
|
||||
int i;
|
||||
|
||||
#if defined(MSDOS) || defined(WIN32)
|
||||
pid=1;
|
||||
#else
|
||||
if (!pid) pid=getpid();
|
||||
#endif
|
||||
p=key;
|
||||
if (seed)
|
||||
{
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
data[i] ^= init[i];
|
||||
init[i]=0;
|
||||
}
|
||||
seed=0;
|
||||
}
|
||||
t=(DES_LONG)time(NULL);
|
||||
l2c(t,p);
|
||||
t=(DES_LONG)((pid)|((c++)<<16));
|
||||
l2c(t,p);
|
||||
|
||||
des_set_odd_parity((des_cblock *)data);
|
||||
des_set_key((des_cblock *)data,ks);
|
||||
des_cbc_cksum((des_cblock *)key,(des_cblock *)key,
|
||||
(long)sizeof(key),ks,(des_cblock *)data);
|
||||
|
||||
des_set_odd_parity((des_cblock *)key);
|
||||
des_set_key((des_cblock *)key,ks);
|
||||
des_cbc_cksum((des_cblock *)key,(des_cblock *)data,
|
||||
(long)sizeof(key),ks,(des_cblock *)key);
|
||||
|
||||
memcpy(ret,data,sizeof(key));
|
||||
memset(key,0,sizeof(key));
|
||||
memset(ks,0,sizeof(ks));
|
||||
t=0;
|
||||
}
|
||||
*/
|
||||
@@ -1,201 +0,0 @@
|
||||
/* crypto/rc4/rc4test.c */
|
||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@cryptsoft.com).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@cryptsoft.com)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#ifdef NO_RC4
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
printf("No RC4 support\n");
|
||||
return(0);
|
||||
}
|
||||
#else
|
||||
#include <openssl/rc4.h>
|
||||
|
||||
unsigned char keys[7][30]={
|
||||
{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
|
||||
{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
|
||||
{8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
{4,0xef,0x01,0x23,0x45},
|
||||
{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
|
||||
{4,0xef,0x01,0x23,0x45},
|
||||
};
|
||||
|
||||
unsigned char data_len[7]={8,8,8,20,28,10};
|
||||
unsigned char data[7][30]={
|
||||
{0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef,0xff},
|
||||
{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
|
||||
{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
|
||||
{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0xff},
|
||||
{0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
|
||||
0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
|
||||
0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
|
||||
0x12,0x34,0x56,0x78,0xff},
|
||||
{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
|
||||
{0},
|
||||
};
|
||||
|
||||
unsigned char output[7][30]={
|
||||
{0x75,0xb7,0x87,0x80,0x99,0xe0,0xc5,0x96,0x00},
|
||||
{0x74,0x94,0xc2,0xe7,0x10,0x4b,0x08,0x79,0x00},
|
||||
{0xde,0x18,0x89,0x41,0xa3,0x37,0x5d,0x3a,0x00},
|
||||
{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,
|
||||
0xbd,0x61,0x5a,0x11,0x62,0xe1,0xc7,0xba,
|
||||
0x36,0xb6,0x78,0x58,0x00},
|
||||
{0x66,0xa0,0x94,0x9f,0x8a,0xf7,0xd6,0x89,
|
||||
0x1f,0x7f,0x83,0x2b,0xa8,0x33,0xc0,0x0c,
|
||||
0x89,0x2e,0xbe,0x30,0x14,0x3c,0xe2,0x87,
|
||||
0x40,0x01,0x1e,0xcf,0x00},
|
||||
{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,0xbd,0x61,0x00},
|
||||
{0},
|
||||
};
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
int i,err=0;
|
||||
int j;
|
||||
unsigned char *p;
|
||||
RC4_KEY key;
|
||||
unsigned char buf[512],obuf[512];
|
||||
|
||||
for (i=0; i<512; i++) buf[i]=0x01;
|
||||
|
||||
for (i=0; i<6; i++)
|
||||
{
|
||||
RC4_set_key(&key,keys[i][0],&(keys[i][1]));
|
||||
memset(obuf,0x00,sizeof(obuf));
|
||||
RC4(&key,data_len[i],&(data[i][0]),obuf);
|
||||
if (memcmp(obuf,output[i],data_len[i]+1) != 0)
|
||||
{
|
||||
printf("error calculating RC4\n");
|
||||
printf("output:");
|
||||
for (j=0; j<data_len[i]+1; j++)
|
||||
printf(" %02x",obuf[j]);
|
||||
printf("\n");
|
||||
printf("expect:");
|
||||
p= &(output[i][0]);
|
||||
for (j=0; j<data_len[i]+1; j++)
|
||||
printf(" %02x",*(p++));
|
||||
printf("\n");
|
||||
err++;
|
||||
}
|
||||
else
|
||||
printf("test %d ok\n",i);
|
||||
}
|
||||
printf("test end processing ");
|
||||
for (i=0; i<data_len[3]; i++)
|
||||
{
|
||||
RC4_set_key(&key,keys[3][0],&(keys[3][1]));
|
||||
memset(obuf,0x00,sizeof(obuf));
|
||||
RC4(&key,i,&(data[3][0]),obuf);
|
||||
if ((memcmp(obuf,output[3],i) != 0) || (obuf[i] != 0))
|
||||
{
|
||||
printf("error in RC4 length processing\n");
|
||||
printf("output:");
|
||||
for (j=0; j<i+1; j++)
|
||||
printf(" %02x",obuf[j]);
|
||||
printf("\n");
|
||||
printf("expect:");
|
||||
p= &(output[3][0]);
|
||||
for (j=0; j<i; j++)
|
||||
printf(" %02x",*(p++));
|
||||
printf(" 00\n");
|
||||
err++;
|
||||
}
|
||||
else
|
||||
{
|
||||
printf(".");
|
||||
fflush(stdout);
|
||||
}
|
||||
}
|
||||
printf("done\n");
|
||||
printf("test multi-call ");
|
||||
for (i=0; i<data_len[3]; i++)
|
||||
{
|
||||
RC4_set_key(&key,keys[3][0],&(keys[3][1]));
|
||||
memset(obuf,0x00,sizeof(obuf));
|
||||
RC4(&key,i,&(data[3][0]),obuf);
|
||||
RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i]));
|
||||
if (memcmp(obuf,output[3],data_len[3]+1) != 0)
|
||||
{
|
||||
printf("error in RC4 multi-call processing\n");
|
||||
printf("output:");
|
||||
for (j=0; j<data_len[3]+1; j++)
|
||||
printf(" %02x",obuf[j]);
|
||||
printf("\n");
|
||||
printf("expect:");
|
||||
p= &(output[3][0]);
|
||||
for (j=0; j<data_len[3]+1; j++)
|
||||
printf(" %02x",*(p++));
|
||||
err++;
|
||||
}
|
||||
else
|
||||
{
|
||||
printf(".");
|
||||
fflush(stdout);
|
||||
}
|
||||
}
|
||||
printf("done\n");
|
||||
exit(err);
|
||||
return(0);
|
||||
}
|
||||
#endif
|
||||
@@ -1,454 +0,0 @@
|
||||
/* crypto/des/read_pwd.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifdef WIN16TTY
|
||||
#undef WIN16
|
||||
#undef _WINDOWS
|
||||
#include <graph.h>
|
||||
#endif
|
||||
|
||||
/* 06-Apr-92 Luke Brennan Support for VMS */
|
||||
#include "des_locl.h"
|
||||
#include <signal.h>
|
||||
#include <string.h>
|
||||
#include <setjmp.h>
|
||||
#include <errno.h>
|
||||
|
||||
/* There are 5 types of terminal interface supported,
|
||||
* TERMIO, TERMIOS, VMS, MSDOS and SGTTY
|
||||
*/
|
||||
|
||||
#if defined(__sgi) && !defined(TERMIOS)
|
||||
#define TERMIOS
|
||||
#undef TERMIO
|
||||
#undef SGTTY
|
||||
#endif
|
||||
|
||||
#if defined(linux) && !defined(TERMIO)
|
||||
#undef TERMIOS
|
||||
#define TERMIO
|
||||
#undef SGTTY
|
||||
#endif
|
||||
|
||||
#ifdef _LIBC
|
||||
#define TERMIO
|
||||
#endif
|
||||
|
||||
#if !defined(TERMIO) && !defined(TERMIOS) && !defined(VMS) && !defined(MSDOS)
|
||||
#define SGTTY
|
||||
#endif
|
||||
|
||||
#if defined(HAVE_SGTTY_H) && defined(__NeXT__)
|
||||
#define SGTTY
|
||||
#endif
|
||||
|
||||
#ifdef TERMIOS
|
||||
#include <termios.h>
|
||||
#define TTY_STRUCT struct termios
|
||||
#define TTY_FLAGS c_lflag
|
||||
#define TTY_get(tty,data) tcgetattr(tty,data)
|
||||
#define TTY_set(tty,data) tcsetattr(tty,TCSANOW,data)
|
||||
#endif
|
||||
|
||||
#ifdef TERMIO
|
||||
#include <termio.h>
|
||||
#define TTY_STRUCT struct termio
|
||||
#define TTY_FLAGS c_lflag
|
||||
#define TTY_get(tty,data) ioctl(tty,TCGETA,data)
|
||||
#define TTY_set(tty,data) ioctl(tty,TCSETA,data)
|
||||
#endif
|
||||
|
||||
#ifdef SGTTY
|
||||
#include <sgtty.h>
|
||||
#define TTY_STRUCT struct sgttyb
|
||||
#define TTY_FLAGS sg_flags
|
||||
#define TTY_get(tty,data) ioctl(tty,TIOCGETP,data)
|
||||
#define TTY_set(tty,data) ioctl(tty,TIOCSETP,data)
|
||||
#endif
|
||||
|
||||
#if !defined(_LIBC) && !defined(MSDOS) && !defined(VMS)
|
||||
#include <sys/ioctl.h>
|
||||
#endif
|
||||
|
||||
#ifdef MSDOS
|
||||
#include <conio.h>
|
||||
#define fgets(a,b,c) noecho_fgets(a,b,c)
|
||||
#endif
|
||||
|
||||
#ifdef VMS
|
||||
#include <ssdef.h>
|
||||
#include <iodef.h>
|
||||
#include <ttdef.h>
|
||||
#include <descrip.h>
|
||||
struct IOSB {
|
||||
short iosb$w_value;
|
||||
short iosb$w_count;
|
||||
long iosb$l_info;
|
||||
};
|
||||
#endif
|
||||
|
||||
#ifndef NX509_SIG
|
||||
#define NX509_SIG 32
|
||||
#endif
|
||||
|
||||
#ifndef NOPROTO
|
||||
static void read_till_nl(FILE *);
|
||||
static int read_pw(char *buf, char *buff, int size, char *prompt, int verify);
|
||||
static void recsig(int);
|
||||
static void pushsig(void);
|
||||
static void popsig(void);
|
||||
#if defined(MSDOS) && !defined(WIN16)
|
||||
static int noecho_fgets(char *buf, int size, FILE *tty);
|
||||
#endif
|
||||
#else
|
||||
static void read_till_nl();
|
||||
static int read_pw();
|
||||
static void recsig();
|
||||
static void pushsig();
|
||||
static void popsig();
|
||||
#if defined(MSDOS) && !defined(WIN16)
|
||||
static int noecho_fgets();
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#ifndef NOPROTO
|
||||
static void (*savsig[NX509_SIG])(int );
|
||||
#else
|
||||
static void (*savsig[NX509_SIG])();
|
||||
#endif
|
||||
static jmp_buf save;
|
||||
|
||||
int DES_read_password(key, prompt, verify)
|
||||
DES_cblock (*key);
|
||||
char *prompt;
|
||||
int verify;
|
||||
{
|
||||
int ok;
|
||||
char buf[BUFSIZ],buff[BUFSIZ];
|
||||
|
||||
if ((ok=read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
|
||||
DES_string_to_key(buf,key);
|
||||
memset(buf,0,BUFSIZ);
|
||||
memset(buff,0,BUFSIZ);
|
||||
return(ok);
|
||||
}
|
||||
|
||||
int DES_read_2passwords(key1, key2, prompt, verify)
|
||||
DES_cblock (*key1);
|
||||
DES_cblock (*key2);
|
||||
char *prompt;
|
||||
int verify;
|
||||
{
|
||||
int ok;
|
||||
char buf[BUFSIZ],buff[BUFSIZ];
|
||||
|
||||
if ((ok=read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
|
||||
DES_string_to_2keys(buf,key1,key2);
|
||||
memset(buf,0,BUFSIZ);
|
||||
memset(buff,0,BUFSIZ);
|
||||
return(ok);
|
||||
}
|
||||
|
||||
int UI_UTIL_read_pw_string(buf, length, prompt, verify)
|
||||
char *buf;
|
||||
int length;
|
||||
char *prompt;
|
||||
int verify;
|
||||
{
|
||||
char buff[BUFSIZ];
|
||||
int ret;
|
||||
|
||||
ret=read_pw(buf,buff,(length>BUFSIZ)?BUFSIZ:length,prompt,verify);
|
||||
memset(buff,0,BUFSIZ);
|
||||
return(ret);
|
||||
}
|
||||
|
||||
#ifndef WIN16
|
||||
|
||||
static void read_till_nl(in)
|
||||
FILE *in;
|
||||
{
|
||||
#define SIZE 4
|
||||
char buf[SIZE+1];
|
||||
|
||||
do {
|
||||
fgets(buf,SIZE,in);
|
||||
} while (strchr(buf,'\n') == NULL);
|
||||
}
|
||||
|
||||
|
||||
/* return 0 if ok, 1 (or -1) otherwise */
|
||||
static int read_pw(buf, buff, size, prompt, verify)
|
||||
char *buf;
|
||||
char *buff;
|
||||
int size;
|
||||
char *prompt;
|
||||
int verify;
|
||||
{
|
||||
#ifdef VMS
|
||||
struct IOSB iosb;
|
||||
$DESCRIPTOR(terminal,"TT");
|
||||
long tty_orig[3], tty_new[3];
|
||||
long status;
|
||||
unsigned short channel = 0;
|
||||
#else
|
||||
#ifndef MSDOS
|
||||
TTY_STRUCT tty_orig,tty_new;
|
||||
#endif
|
||||
#endif
|
||||
int number=5;
|
||||
int ok=0;
|
||||
int ps=0;
|
||||
int is_a_tty=1;
|
||||
|
||||
FILE *tty=NULL;
|
||||
char *p;
|
||||
|
||||
#ifdef __CYGWIN32__
|
||||
tty = stdin;
|
||||
#elif !defined(MSDOS)
|
||||
if ((tty=fopen("/dev/tty","r")) == NULL)
|
||||
tty=stdin;
|
||||
#else /* MSDOS */
|
||||
if ((tty=fopen("con","r")) == NULL)
|
||||
tty=stdin;
|
||||
#endif /* MSDOS */
|
||||
|
||||
#if defined(TTY_get) && !defined(VMS)
|
||||
if (TTY_get(fileno(tty),&tty_orig) == -1)
|
||||
{
|
||||
#ifdef ENOTTY
|
||||
if (errno == ENOTTY)
|
||||
is_a_tty=0;
|
||||
else
|
||||
#endif
|
||||
return(-1);
|
||||
}
|
||||
memcpy(&(tty_new),&(tty_orig),sizeof(tty_orig));
|
||||
#endif
|
||||
#ifdef VMS
|
||||
status = SYS$ASSIGN(&terminal,&channel,0,0);
|
||||
if (status != SS$_NORMAL)
|
||||
return(-1);
|
||||
status=SYS$QIOW(0,channel,IO$_SENSEMODE,&iosb,0,0,tty_orig,12,0,0,0,0);
|
||||
if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL))
|
||||
return(-1);
|
||||
#endif
|
||||
|
||||
if (setjmp(save))
|
||||
{
|
||||
ok=0;
|
||||
goto error;
|
||||
}
|
||||
pushsig();
|
||||
ps=1;
|
||||
|
||||
#ifdef TTY_FLAGS
|
||||
tty_new.TTY_FLAGS &= ~ECHO;
|
||||
#endif
|
||||
|
||||
#if defined(TTY_set) && !defined(VMS)
|
||||
if (is_a_tty && (TTY_set(fileno(tty),&tty_new) == -1))
|
||||
return(-1);
|
||||
#endif
|
||||
#ifdef VMS
|
||||
tty_new[0] = tty_orig[0];
|
||||
tty_new[1] = tty_orig[1] | TT$M_NOECHO;
|
||||
tty_new[2] = tty_orig[2];
|
||||
status = SYS$QIOW(0,channel,IO$_SETMODE,&iosb,0,0,tty_new,12,0,0,0,0);
|
||||
if ((status != SS$_NORMAL) || (iosb.iosb$w_value != SS$_NORMAL))
|
||||
return(-1);
|
||||
#endif
|
||||
ps=2;
|
||||
|
||||
while ((!ok) && (number--))
|
||||
{
|
||||
fputs(prompt,stderr);
|
||||
fflush(stderr);
|
||||
|
||||
buf[0]='\0';
|
||||
fgets(buf,size,tty);
|
||||
if (feof(tty)) goto error;
|
||||
if (ferror(tty)) goto error;
|
||||
if ((p=(char *)strchr(buf,'\n')) != NULL)
|
||||
*p='\0';
|
||||
else read_till_nl(tty);
|
||||
if (verify)
|
||||
{
|
||||
fprintf(stderr,"\nVerifying password - %s",prompt);
|
||||
fflush(stderr);
|
||||
buff[0]='\0';
|
||||
fgets(buff,size,tty);
|
||||
if (feof(tty)) goto error;
|
||||
if ((p=(char *)strchr(buff,'\n')) != NULL)
|
||||
*p='\0';
|
||||
else read_till_nl(tty);
|
||||
|
||||
if (strcmp(buf,buff) != 0)
|
||||
{
|
||||
fprintf(stderr,"\nVerify failure");
|
||||
fflush(stderr);
|
||||
break;
|
||||
/* continue; */
|
||||
}
|
||||
}
|
||||
ok=1;
|
||||
}
|
||||
|
||||
error:
|
||||
fprintf(stderr,"\n");
|
||||
#ifdef DEBUG
|
||||
perror("fgets(tty)");
|
||||
#endif
|
||||
/* What can we do if there is an error? */
|
||||
#if defined(TTY_set) && !defined(VMS)
|
||||
if (ps >= 2) TTY_set(fileno(tty),&tty_orig);
|
||||
#endif
|
||||
#ifdef VMS
|
||||
if (ps >= 2)
|
||||
status = SYS$QIOW(0,channel,IO$_SETMODE,&iosb,0,0
|
||||
,tty_orig,12,0,0,0,0);
|
||||
#endif
|
||||
|
||||
if (ps >= 1) popsig();
|
||||
if (stdin != tty) fclose(tty);
|
||||
#ifdef VMS
|
||||
status = SYS$DASSGN(channel);
|
||||
#endif
|
||||
return(!ok);
|
||||
}
|
||||
|
||||
#else /* WIN16 */
|
||||
|
||||
static int read_pw(buf, buff, size, prompt, verify)
|
||||
char *buf;
|
||||
char *buff;
|
||||
int size;
|
||||
char *prompt;
|
||||
int verify;
|
||||
{
|
||||
memset(buf,0,size);
|
||||
memset(buff,0,size);
|
||||
return(0);
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
static void pushsig()
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i=1; i<NX509_SIG; i++)
|
||||
savsig[i]=signal(i,recsig);
|
||||
|
||||
#ifdef SIGWINCH
|
||||
signal(SIGWINCH,SIG_DFL);
|
||||
#endif
|
||||
}
|
||||
|
||||
static void popsig()
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i=1; i<NX509_SIG; i++)
|
||||
signal(i,savsig[i]);
|
||||
}
|
||||
|
||||
static void recsig(i)
|
||||
int i;
|
||||
{
|
||||
longjmp(save,1);
|
||||
#ifdef LINT
|
||||
i=i;
|
||||
#endif
|
||||
}
|
||||
|
||||
#if defined(MSDOS) && !defined(WIN16)
|
||||
static int noecho_fgets(buf,size,tty)
|
||||
char *buf;
|
||||
int size;
|
||||
FILE *tty;
|
||||
{
|
||||
int i;
|
||||
char *p;
|
||||
|
||||
p=buf;
|
||||
for (;;)
|
||||
{
|
||||
if (size == 0)
|
||||
{
|
||||
*p='\0';
|
||||
break;
|
||||
}
|
||||
size--;
|
||||
#ifdef WIN16TTY
|
||||
i=_inchar();
|
||||
#else
|
||||
i=getch();
|
||||
#endif
|
||||
if (i == '\r') i='\n';
|
||||
*(p++)=i;
|
||||
if (i == '\n')
|
||||
{
|
||||
*p='\0';
|
||||
break;
|
||||
}
|
||||
}
|
||||
return(strlen(buf));
|
||||
}
|
||||
#endif
|
||||
@@ -38,7 +38,6 @@ RCSID("$Id$");
|
||||
#endif
|
||||
|
||||
#include <des.h>
|
||||
#include <des_locl.h>
|
||||
#ifdef KRB5
|
||||
#include <krb5-types.h>
|
||||
#endif
|
||||
@@ -338,7 +337,7 @@ DES_rand_data_key(DES_cblock *key)
|
||||
DES_rand_data(data, sizeof(data));
|
||||
DES_rand_data((unsigned char*)key, sizeof(DES_cblock));
|
||||
DES_set_odd_parity(key);
|
||||
DES_key_sched(key, &sched);
|
||||
DES_set_key(key, &sched);
|
||||
DES_ecb_encrypt(&data, key, &sched, DES_ENCRYPT);
|
||||
memset(&data, 0, sizeof(data));
|
||||
memset(&sched, 0, sizeof(sched));
|
||||
@@ -399,7 +398,7 @@ DES_set_sequence_number(unsigned char *ll)
|
||||
void
|
||||
DES_set_random_generator_seed(DES_cblock *seed)
|
||||
{
|
||||
DES_key_sched(seed, &sequence_seed);
|
||||
DES_set_key(seed, &sequence_seed);
|
||||
zero_long_long(sequence_index);
|
||||
initialized = 1;
|
||||
}
|
||||
|
||||
@@ -1,131 +0,0 @@
|
||||
/* crypto/des/rpc_des.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/* @(#)des.h 2.2 88/08/10 4.0 RPCSRC; from 2.7 88/02/08 SMI */
|
||||
/*
|
||||
* Sun RPC is a product of Sun Microsystems, Inc. and is provided for
|
||||
* unrestricted use provided that this legend is included on all tape
|
||||
* media and as a part of the software program in whole or part. Users
|
||||
* may copy or modify Sun RPC without charge, but are not authorized
|
||||
* to license or distribute it to anyone else except as part of a product or
|
||||
* program developed by the user.
|
||||
*
|
||||
* SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
|
||||
* WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
|
||||
*
|
||||
* Sun RPC is provided with no support and without any obligation on the
|
||||
* part of Sun Microsystems, Inc. to assist in its use, correction,
|
||||
* modification or enhancement.
|
||||
*
|
||||
* SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
|
||||
* INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
|
||||
* OR ANY PART THEREOF.
|
||||
*
|
||||
* In no event will Sun Microsystems, Inc. be liable for any lost revenue
|
||||
* or profits or other special, indirect and consequential damages, even if
|
||||
* Sun has been advised of the possibility of such damages.
|
||||
*
|
||||
* Sun Microsystems, Inc.
|
||||
* 2550 Garcia Avenue
|
||||
* Mountain View, California 94043
|
||||
*/
|
||||
/*
|
||||
* Generic DES driver interface
|
||||
* Keep this file hardware independent!
|
||||
* Copyright (c) 1986 by Sun Microsystems, Inc.
|
||||
*/
|
||||
|
||||
#define DES_MAXLEN 65536 /* maximum # of bytes to encrypt */
|
||||
#define DES_QUICKLEN 16 /* maximum # of bytes to encrypt quickly */
|
||||
|
||||
#ifdef HEADER_DES_H
|
||||
#undef ENCRYPT
|
||||
#undef DECRYPT
|
||||
#endif
|
||||
|
||||
enum desdir { ENCRYPT, DECRYPT };
|
||||
enum desmode { CBC, ECB };
|
||||
|
||||
/*
|
||||
* parameters to ioctl call
|
||||
*/
|
||||
struct desparams {
|
||||
unsigned char des_key[8]; /* key (with low bit parity) */
|
||||
enum desdir des_dir; /* direction */
|
||||
enum desmode des_mode; /* mode */
|
||||
unsigned char des_ivec[8]; /* input vector */
|
||||
unsigned des_len; /* number of bytes to crypt */
|
||||
union {
|
||||
unsigned char UDES_data[DES_QUICKLEN];
|
||||
unsigned char *UDES_buf;
|
||||
} UDES;
|
||||
# define des_data UDES.UDES_data /* direct data here if quick */
|
||||
# define des_buf UDES.UDES_buf /* otherwise, pointer to data */
|
||||
};
|
||||
|
||||
/*
|
||||
* Encrypt an arbitrary sized buffer
|
||||
*/
|
||||
#define DESIOCBLOCK _IOWR(d, 6, struct desparams)
|
||||
|
||||
/*
|
||||
* Encrypt of small amount of data, quickly
|
||||
*/
|
||||
#define DESIOCQUICK _IOWR(d, 7, struct desparams)
|
||||
|
||||
@@ -1,107 +0,0 @@
|
||||
/* crypto/des/rpc_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "rpc_des.h"
|
||||
#include "des_locl.h"
|
||||
#include "des_ver.h"
|
||||
|
||||
#ifndef NOPROTO
|
||||
int _des_crypt(char *buf,int len,struct desparams *desp);
|
||||
#else
|
||||
int _des_crypt();
|
||||
#endif
|
||||
|
||||
int _des_crypt(buf, len, desp)
|
||||
char *buf;
|
||||
int len;
|
||||
struct desparams *desp;
|
||||
{
|
||||
des_key_schedule ks;
|
||||
int enc;
|
||||
|
||||
des_set_key((des_cblock *)desp->des_key,ks);
|
||||
enc=(desp->des_dir == ENCRYPT)?DES_ENCRYPT:DES_DECRYPT;
|
||||
|
||||
if (desp->des_mode == CBC)
|
||||
des_ecb_encrypt((des_cblock *)desp->UDES.UDES_buf,
|
||||
(des_cblock *)desp->UDES.UDES_buf,ks,enc);
|
||||
else
|
||||
{
|
||||
des_ncbc_encrypt((des_cblock *)desp->UDES.UDES_buf,
|
||||
(des_cblock *)desp->UDES.UDES_buf,
|
||||
(long)len,ks,
|
||||
(des_cblock *)desp->des_ivec,enc);
|
||||
#ifdef undef
|
||||
/* len will always be %8 if called from common_crypt
|
||||
* in secure_rpc.
|
||||
* Libdes's cbc encrypt does not copy back the iv,
|
||||
* so we have to do it here. */
|
||||
/* It does now :-) eay 20/09/95 */
|
||||
|
||||
a=(char *)&(desp->UDES.UDES_buf[len-8]);
|
||||
b=(char *)&(desp->des_ivec[0]);
|
||||
|
||||
*(a++)= *(b++); *(a++)= *(b++);
|
||||
*(a++)= *(b++); *(a++)= *(b++);
|
||||
*(a++)= *(b++); *(a++)= *(b++);
|
||||
*(a++)= *(b++); *(a++)= *(b++);
|
||||
#endif
|
||||
}
|
||||
return(1);
|
||||
}
|
||||
|
||||
105
lib/des/rpw.c
105
lib/des/rpw.c
@@ -1,105 +0,0 @@
|
||||
/* crypto/des/rpw.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include "des.h"
|
||||
|
||||
int main(argc,argv)
|
||||
int argc;
|
||||
char *argv[];
|
||||
{
|
||||
des_cblock k,k1;
|
||||
int i;
|
||||
|
||||
printf("read passwd\n");
|
||||
if ((i=des_read_password((C_Block *)k,"Enter password:",0)) == 0)
|
||||
{
|
||||
printf("password = ");
|
||||
for (i=0; i<8; i++)
|
||||
printf("%02x ",k[i]);
|
||||
}
|
||||
else
|
||||
printf("error %d\n",i);
|
||||
printf("\n");
|
||||
printf("read 2passwds and verify\n");
|
||||
if ((i=des_read_2passwords((C_Block *)k,(C_Block *)k1,
|
||||
"Enter verified password:",1)) == 0)
|
||||
{
|
||||
printf("password1 = ");
|
||||
for (i=0; i<8; i++)
|
||||
printf("%02x ",k[i]);
|
||||
printf("\n");
|
||||
printf("password2 = ");
|
||||
for (i=0; i<8; i++)
|
||||
printf("%02x ",k1[i]);
|
||||
printf("\n");
|
||||
exit(1);
|
||||
}
|
||||
else
|
||||
{
|
||||
printf("error %d\n",i);
|
||||
exit(0);
|
||||
}
|
||||
#ifdef LINT
|
||||
return(0);
|
||||
#endif
|
||||
}
|
||||
@@ -1,249 +0,0 @@
|
||||
/* crypto/des/set_key.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/* set_key.c v 1.4 eay 24/9/91
|
||||
* 1.4 Speed up by 400% :-)
|
||||
* 1.3 added register declarations.
|
||||
* 1.2 unrolled make_key_sched a bit more
|
||||
* 1.1 added norm_expand_bits
|
||||
* 1.0 First working version
|
||||
*/
|
||||
#include "des_locl.h"
|
||||
#include "podd.h"
|
||||
#include "sk.h"
|
||||
|
||||
#ifndef NOPROTO
|
||||
static int check_parity(DES_cblock (*key));
|
||||
#else
|
||||
static int check_parity();
|
||||
#endif
|
||||
|
||||
int DES_check_key=0;
|
||||
|
||||
void DES_set_odd_parity(key)
|
||||
DES_cblock (*key);
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i=0; i<DES_KEY_SZ; i++)
|
||||
(*key)[i]=odd_parity[(*key)[i]];
|
||||
}
|
||||
|
||||
static int check_parity(key)
|
||||
DES_cblock (*key);
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i=0; i<DES_KEY_SZ; i++)
|
||||
{
|
||||
if ((*key)[i] != odd_parity[(*key)[i]])
|
||||
return(0);
|
||||
}
|
||||
return(1);
|
||||
}
|
||||
|
||||
/* Weak and semi week keys were originally as take from
|
||||
* %A D.W. Davies
|
||||
* %A W.L. Price
|
||||
* %T Security for Computer Networks
|
||||
* %I John Wiley & Sons
|
||||
* %D 1984
|
||||
* Many thanks to smb@ulysses.att.com (Steven Bellovin) for the reference
|
||||
* (and actual cblock values).
|
||||
*/
|
||||
|
||||
/* The corrected values are from FIPS 74:
|
||||
* http://www.itl.nist.gov/fipspubs/fip74.htm
|
||||
*/
|
||||
|
||||
#define NUM_WEAK_KEY 16
|
||||
static DES_cblock weak_keys[NUM_WEAK_KEY]={
|
||||
/* weak keys */
|
||||
{0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01},
|
||||
{0xFE,0xFE,0xFE,0xFE,0xFE,0xFE,0xFE,0xFE},
|
||||
{0x1F,0x1F,0x1F,0x1F,0x0E,0x0E,0x0E,0x0E},
|
||||
{0xE0,0xE0,0xE0,0xE0,0xF1,0xF1,0xF1,0xF1},
|
||||
/* semi-weak keys */
|
||||
{0x01,0xFE,0x01,0xFE,0x01,0xFE,0x01,0xFE},
|
||||
{0xFE,0x01,0xFE,0x01,0xFE,0x01,0xFE,0x01},
|
||||
{0x1F,0xE0,0x1F,0xE0,0x0E,0xF1,0x0E,0xF1},
|
||||
{0xE0,0x1F,0xE0,0x1F,0xF1,0x0E,0xF1,0x0E},
|
||||
{0x01,0xE0,0x01,0xE0,0x01,0xF1,0x01,0xF1},
|
||||
{0xE0,0x01,0xE0,0x01,0xF1,0x01,0xF1,0x01},
|
||||
{0x1F,0xFE,0x1F,0xFE,0x0E,0xFE,0x0E,0xFE},
|
||||
{0xFE,0x1F,0xFE,0x1F,0xFE,0x0E,0xFE,0x0E},
|
||||
{0x01,0x1F,0x01,0x1F,0x01,0x0E,0x01,0x0E},
|
||||
{0x1F,0x01,0x1F,0x01,0x0E,0x01,0x0E,0x01},
|
||||
{0xE0,0xFE,0xE0,0xFE,0xF1,0xFE,0xF1,0xFE},
|
||||
{0xFE,0xE0,0xFE,0xE0,0xFE,0xF1,0xFE,0xF1}};
|
||||
|
||||
int DES_is_weak_key(key)
|
||||
DES_cblock (*key);
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i=0; i<NUM_WEAK_KEY; i++)
|
||||
/* Added == 0 to comparision, I obviously don't run
|
||||
* this section very often :-(, thanks to
|
||||
* engineering@MorningStar.Com for the fix
|
||||
* eay 93/06/29 */
|
||||
if (memcmp(weak_keys[i],key,sizeof(key)) == 0) return(1);
|
||||
return(0);
|
||||
}
|
||||
|
||||
/* NOW DEFINED IN des_local.h
|
||||
* See ecb_encrypt.c for a pseudo description of these macros.
|
||||
* #define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
|
||||
* (b)^=(t),\
|
||||
* (a)=((a)^((t)<<(n))))
|
||||
*/
|
||||
|
||||
#define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\
|
||||
(a)=(a)^(t)^(t>>(16-(n))))
|
||||
|
||||
/* return 0 if key parity is odd (correct),
|
||||
* return -1 if key parity error,
|
||||
* return -2 if illegal weak key.
|
||||
*/
|
||||
int DES_set_key(key, schedule)
|
||||
DES_cblock (*key);
|
||||
DES_key_schedule *schedule;
|
||||
{
|
||||
static int shifts2[16]={0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0};
|
||||
register DES_LONG c,d,t,s,t2;
|
||||
register unsigned char *in;
|
||||
register DES_LONG *k;
|
||||
register int i;
|
||||
|
||||
if (DES_check_key)
|
||||
{
|
||||
if (!check_parity(key))
|
||||
return(-1);
|
||||
|
||||
if (DES_is_weak_key(key))
|
||||
return(-2);
|
||||
}
|
||||
|
||||
k=(DES_LONG *)schedule;
|
||||
in=(unsigned char *)key;
|
||||
|
||||
c2l(in,c);
|
||||
c2l(in,d);
|
||||
|
||||
/* do PC1 in 60 simple operations */
|
||||
/* PERM_OP(d,c,t,4,0x0f0f0f0fL);
|
||||
HPERM_OP(c,t,-2, 0xcccc0000L);
|
||||
HPERM_OP(c,t,-1, 0xaaaa0000L);
|
||||
HPERM_OP(c,t, 8, 0x00ff0000L);
|
||||
HPERM_OP(c,t,-1, 0xaaaa0000L);
|
||||
HPERM_OP(d,t,-8, 0xff000000L);
|
||||
HPERM_OP(d,t, 8, 0x00ff0000L);
|
||||
HPERM_OP(d,t, 2, 0x33330000L);
|
||||
d=((d&0x00aa00aaL)<<7L)|((d&0x55005500L)>>7L)|(d&0xaa55aa55L);
|
||||
d=(d>>8)|((c&0xf0000000L)>>4);
|
||||
c&=0x0fffffffL; */
|
||||
|
||||
/* I now do it in 47 simple operations :-)
|
||||
* Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov)
|
||||
* for the inspiration. :-) */
|
||||
PERM_OP (d,c,t,4,0x0f0f0f0fL);
|
||||
HPERM_OP(c,t,-2,0xcccc0000L);
|
||||
HPERM_OP(d,t,-2,0xcccc0000L);
|
||||
PERM_OP (d,c,t,1,0x55555555L);
|
||||
PERM_OP (c,d,t,8,0x00ff00ffL);
|
||||
PERM_OP (d,c,t,1,0x55555555L);
|
||||
d= (((d&0x000000ffL)<<16L)| (d&0x0000ff00L) |
|
||||
((d&0x00ff0000L)>>16L)|((c&0xf0000000L)>>4L));
|
||||
c&=0x0fffffffL;
|
||||
|
||||
for (i=0; i<ITERATIONS; i++)
|
||||
{
|
||||
if (shifts2[i])
|
||||
{ c=((c>>2L)|(c<<26L)); d=((d>>2L)|(d<<26L)); }
|
||||
else
|
||||
{ c=((c>>1L)|(c<<27L)); d=((d>>1L)|(d<<27L)); }
|
||||
c&=0x0fffffffL;
|
||||
d&=0x0fffffffL;
|
||||
/* could be a few less shifts but I am to lazy at this
|
||||
* point in time to investigate */
|
||||
s= des_skb[0][ (c )&0x3f ]|
|
||||
des_skb[1][((c>> 6)&0x03)|((c>> 7L)&0x3c)]|
|
||||
des_skb[2][((c>>13)&0x0f)|((c>>14L)&0x30)]|
|
||||
des_skb[3][((c>>20)&0x01)|((c>>21L)&0x06) |
|
||||
((c>>22L)&0x38)];
|
||||
t= des_skb[4][ (d )&0x3f ]|
|
||||
des_skb[5][((d>> 7L)&0x03)|((d>> 8L)&0x3c)]|
|
||||
des_skb[6][ (d>>15L)&0x3f ]|
|
||||
des_skb[7][((d>>21L)&0x0f)|((d>>22L)&0x30)];
|
||||
|
||||
/* table contained 0213 4657 */
|
||||
t2=((t<<16L)|(s&0x0000ffffL))&0xffffffffL;
|
||||
*(k++)=ROTATE(t2,30)&0xffffffffL;
|
||||
|
||||
t2=((s>>16L)|(t&0xffff0000L));
|
||||
*(k++)=ROTATE(t2,26)&0xffffffffL;
|
||||
}
|
||||
return(0);
|
||||
}
|
||||
|
||||
int DES_key_sched(key, schedule)
|
||||
DES_cblock (*key);
|
||||
DES_key_schedule *schedule;
|
||||
{
|
||||
return(DES_set_key(key,schedule));
|
||||
}
|
||||
@@ -1,198 +0,0 @@
|
||||
#/usr/local/bin/perl
|
||||
|
||||
sub lab_shift
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@r,$i,$j,$k,$d,@z);
|
||||
|
||||
@r=&shift(*a,$n);
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
@z=split(/\^/,$r[$i]);
|
||||
for ($j=0; $j <= $#z; $j++)
|
||||
{
|
||||
($d)=($z[$j] =~ /^(..)/);
|
||||
($k)=($z[$j] =~ /\[(.*)\]$/);
|
||||
$k.=",$n" if ($k ne "");
|
||||
$k="$n" if ($k eq "");
|
||||
$d="$d[$k]";
|
||||
$z[$j]=$d;
|
||||
}
|
||||
$r[$i]=join('^',@z);
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub shift
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@f);
|
||||
|
||||
if ($n > 0)
|
||||
{
|
||||
@f=&shiftl(*a,$n);
|
||||
}
|
||||
else
|
||||
{
|
||||
@f=&shiftr(*a,-$n);
|
||||
}
|
||||
return(@f);
|
||||
}
|
||||
|
||||
sub rotate
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@f);
|
||||
|
||||
if ($n > 0)
|
||||
{ @f=&rotatel(*a,$n); }
|
||||
else
|
||||
{ @f=&rotater(*a,-$n); }
|
||||
return(@f);
|
||||
}
|
||||
|
||||
sub rotater
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@f,@g);
|
||||
|
||||
@f=&shiftr(*a,$n);
|
||||
@g=&shiftl(*a,32-$n);
|
||||
$#f=31;
|
||||
$#g=31;
|
||||
return(&or(*f,*g));
|
||||
}
|
||||
|
||||
sub rotatel
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@f,@g);
|
||||
|
||||
@f=&shiftl(*a,$n);
|
||||
@g=&shiftr(*a,32-$n);
|
||||
$#f=31;
|
||||
$#g=31;
|
||||
return(&or(*f,*g));
|
||||
}
|
||||
|
||||
sub shiftr
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
if (($i+$n) > 31)
|
||||
{
|
||||
$r[$i]="--";
|
||||
}
|
||||
else
|
||||
{
|
||||
$r[$i]=$a[$i+$n];
|
||||
}
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub shiftl
|
||||
{
|
||||
local(*a,$n)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
if ($i < $n)
|
||||
{
|
||||
$r[$i]="--";
|
||||
}
|
||||
else
|
||||
{
|
||||
$r[$i]=$a[$i-$n];
|
||||
}
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub printit
|
||||
{
|
||||
local(@a)=@_;
|
||||
local($i);
|
||||
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
printf "%2s ",$a[$i];
|
||||
print "\n" if (($i%8) == 7);
|
||||
}
|
||||
print "\n";
|
||||
}
|
||||
|
||||
sub xor
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
$r[$i]=&compress($a[$i].'^'.$b[$i]);
|
||||
# $r[$i]=$a[$i]."^".$b[$i];
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub and
|
||||
{
|
||||
local(*a,$m)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
$r[$i]=(($m & (1<<$i))?($a[$i]):('--'));
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub or
|
||||
{
|
||||
local(*a,*b)=@_;
|
||||
local(@r,$i);
|
||||
|
||||
$#r=31;
|
||||
foreach $i (0 .. 31)
|
||||
{
|
||||
$r[$i]='--' if (($a[$i] eq '--') && ($b[$i] eq '--'));
|
||||
$r[$i]=$a[$i] if (($a[$i] ne '--') && ($b[$i] eq '--'));
|
||||
$r[$i]=$b[$i] if (($a[$i] eq '--') && ($b[$i] ne '--'));
|
||||
$r[$i]='++' if (($a[$i] ne '--') && ($b[$i] ne '--'));
|
||||
}
|
||||
return(@r);
|
||||
}
|
||||
|
||||
sub compress
|
||||
{
|
||||
local($s)=@_;
|
||||
local($_,$i,@a,%a,$r);
|
||||
|
||||
$s =~ s/\^\^/\^/g;
|
||||
$s =~ s/^\^//;
|
||||
$s =~ s/\^$//;
|
||||
@a=split(/\^/,$s);
|
||||
|
||||
while ($#a >= 0)
|
||||
{
|
||||
$_=shift(@a);
|
||||
next unless /\d/;
|
||||
$a{$_}++;
|
||||
}
|
||||
foreach $i (sort keys %a)
|
||||
{
|
||||
next if ($a{$i}%2 == 0);
|
||||
$r.="$i^";
|
||||
}
|
||||
chop($r);
|
||||
return($r);
|
||||
}
|
||||
1;
|
||||
204
lib/des/sk.h
204
lib/des/sk.h
@@ -1,204 +0,0 @@
|
||||
/* crypto/des/sk.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
static const DES_LONG des_skb[8][64]={
|
||||
{
|
||||
/* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
|
||||
0x00000000L,0x00000010L,0x20000000L,0x20000010L,
|
||||
0x00010000L,0x00010010L,0x20010000L,0x20010010L,
|
||||
0x00000800L,0x00000810L,0x20000800L,0x20000810L,
|
||||
0x00010800L,0x00010810L,0x20010800L,0x20010810L,
|
||||
0x00000020L,0x00000030L,0x20000020L,0x20000030L,
|
||||
0x00010020L,0x00010030L,0x20010020L,0x20010030L,
|
||||
0x00000820L,0x00000830L,0x20000820L,0x20000830L,
|
||||
0x00010820L,0x00010830L,0x20010820L,0x20010830L,
|
||||
0x00080000L,0x00080010L,0x20080000L,0x20080010L,
|
||||
0x00090000L,0x00090010L,0x20090000L,0x20090010L,
|
||||
0x00080800L,0x00080810L,0x20080800L,0x20080810L,
|
||||
0x00090800L,0x00090810L,0x20090800L,0x20090810L,
|
||||
0x00080020L,0x00080030L,0x20080020L,0x20080030L,
|
||||
0x00090020L,0x00090030L,0x20090020L,0x20090030L,
|
||||
0x00080820L,0x00080830L,0x20080820L,0x20080830L,
|
||||
0x00090820L,0x00090830L,0x20090820L,0x20090830L,
|
||||
},{
|
||||
/* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */
|
||||
0x00000000L,0x02000000L,0x00002000L,0x02002000L,
|
||||
0x00200000L,0x02200000L,0x00202000L,0x02202000L,
|
||||
0x00000004L,0x02000004L,0x00002004L,0x02002004L,
|
||||
0x00200004L,0x02200004L,0x00202004L,0x02202004L,
|
||||
0x00000400L,0x02000400L,0x00002400L,0x02002400L,
|
||||
0x00200400L,0x02200400L,0x00202400L,0x02202400L,
|
||||
0x00000404L,0x02000404L,0x00002404L,0x02002404L,
|
||||
0x00200404L,0x02200404L,0x00202404L,0x02202404L,
|
||||
0x10000000L,0x12000000L,0x10002000L,0x12002000L,
|
||||
0x10200000L,0x12200000L,0x10202000L,0x12202000L,
|
||||
0x10000004L,0x12000004L,0x10002004L,0x12002004L,
|
||||
0x10200004L,0x12200004L,0x10202004L,0x12202004L,
|
||||
0x10000400L,0x12000400L,0x10002400L,0x12002400L,
|
||||
0x10200400L,0x12200400L,0x10202400L,0x12202400L,
|
||||
0x10000404L,0x12000404L,0x10002404L,0x12002404L,
|
||||
0x10200404L,0x12200404L,0x10202404L,0x12202404L,
|
||||
},{
|
||||
/* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */
|
||||
0x00000000L,0x00000001L,0x00040000L,0x00040001L,
|
||||
0x01000000L,0x01000001L,0x01040000L,0x01040001L,
|
||||
0x00000002L,0x00000003L,0x00040002L,0x00040003L,
|
||||
0x01000002L,0x01000003L,0x01040002L,0x01040003L,
|
||||
0x00000200L,0x00000201L,0x00040200L,0x00040201L,
|
||||
0x01000200L,0x01000201L,0x01040200L,0x01040201L,
|
||||
0x00000202L,0x00000203L,0x00040202L,0x00040203L,
|
||||
0x01000202L,0x01000203L,0x01040202L,0x01040203L,
|
||||
0x08000000L,0x08000001L,0x08040000L,0x08040001L,
|
||||
0x09000000L,0x09000001L,0x09040000L,0x09040001L,
|
||||
0x08000002L,0x08000003L,0x08040002L,0x08040003L,
|
||||
0x09000002L,0x09000003L,0x09040002L,0x09040003L,
|
||||
0x08000200L,0x08000201L,0x08040200L,0x08040201L,
|
||||
0x09000200L,0x09000201L,0x09040200L,0x09040201L,
|
||||
0x08000202L,0x08000203L,0x08040202L,0x08040203L,
|
||||
0x09000202L,0x09000203L,0x09040202L,0x09040203L,
|
||||
},{
|
||||
/* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */
|
||||
0x00000000L,0x00100000L,0x00000100L,0x00100100L,
|
||||
0x00000008L,0x00100008L,0x00000108L,0x00100108L,
|
||||
0x00001000L,0x00101000L,0x00001100L,0x00101100L,
|
||||
0x00001008L,0x00101008L,0x00001108L,0x00101108L,
|
||||
0x04000000L,0x04100000L,0x04000100L,0x04100100L,
|
||||
0x04000008L,0x04100008L,0x04000108L,0x04100108L,
|
||||
0x04001000L,0x04101000L,0x04001100L,0x04101100L,
|
||||
0x04001008L,0x04101008L,0x04001108L,0x04101108L,
|
||||
0x00020000L,0x00120000L,0x00020100L,0x00120100L,
|
||||
0x00020008L,0x00120008L,0x00020108L,0x00120108L,
|
||||
0x00021000L,0x00121000L,0x00021100L,0x00121100L,
|
||||
0x00021008L,0x00121008L,0x00021108L,0x00121108L,
|
||||
0x04020000L,0x04120000L,0x04020100L,0x04120100L,
|
||||
0x04020008L,0x04120008L,0x04020108L,0x04120108L,
|
||||
0x04021000L,0x04121000L,0x04021100L,0x04121100L,
|
||||
0x04021008L,0x04121008L,0x04021108L,0x04121108L,
|
||||
},{
|
||||
/* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
|
||||
0x00000000L,0x10000000L,0x00010000L,0x10010000L,
|
||||
0x00000004L,0x10000004L,0x00010004L,0x10010004L,
|
||||
0x20000000L,0x30000000L,0x20010000L,0x30010000L,
|
||||
0x20000004L,0x30000004L,0x20010004L,0x30010004L,
|
||||
0x00100000L,0x10100000L,0x00110000L,0x10110000L,
|
||||
0x00100004L,0x10100004L,0x00110004L,0x10110004L,
|
||||
0x20100000L,0x30100000L,0x20110000L,0x30110000L,
|
||||
0x20100004L,0x30100004L,0x20110004L,0x30110004L,
|
||||
0x00001000L,0x10001000L,0x00011000L,0x10011000L,
|
||||
0x00001004L,0x10001004L,0x00011004L,0x10011004L,
|
||||
0x20001000L,0x30001000L,0x20011000L,0x30011000L,
|
||||
0x20001004L,0x30001004L,0x20011004L,0x30011004L,
|
||||
0x00101000L,0x10101000L,0x00111000L,0x10111000L,
|
||||
0x00101004L,0x10101004L,0x00111004L,0x10111004L,
|
||||
0x20101000L,0x30101000L,0x20111000L,0x30111000L,
|
||||
0x20101004L,0x30101004L,0x20111004L,0x30111004L,
|
||||
},{
|
||||
/* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */
|
||||
0x00000000L,0x08000000L,0x00000008L,0x08000008L,
|
||||
0x00000400L,0x08000400L,0x00000408L,0x08000408L,
|
||||
0x00020000L,0x08020000L,0x00020008L,0x08020008L,
|
||||
0x00020400L,0x08020400L,0x00020408L,0x08020408L,
|
||||
0x00000001L,0x08000001L,0x00000009L,0x08000009L,
|
||||
0x00000401L,0x08000401L,0x00000409L,0x08000409L,
|
||||
0x00020001L,0x08020001L,0x00020009L,0x08020009L,
|
||||
0x00020401L,0x08020401L,0x00020409L,0x08020409L,
|
||||
0x02000000L,0x0A000000L,0x02000008L,0x0A000008L,
|
||||
0x02000400L,0x0A000400L,0x02000408L,0x0A000408L,
|
||||
0x02020000L,0x0A020000L,0x02020008L,0x0A020008L,
|
||||
0x02020400L,0x0A020400L,0x02020408L,0x0A020408L,
|
||||
0x02000001L,0x0A000001L,0x02000009L,0x0A000009L,
|
||||
0x02000401L,0x0A000401L,0x02000409L,0x0A000409L,
|
||||
0x02020001L,0x0A020001L,0x02020009L,0x0A020009L,
|
||||
0x02020401L,0x0A020401L,0x02020409L,0x0A020409L,
|
||||
},{
|
||||
/* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */
|
||||
0x00000000L,0x00000100L,0x00080000L,0x00080100L,
|
||||
0x01000000L,0x01000100L,0x01080000L,0x01080100L,
|
||||
0x00000010L,0x00000110L,0x00080010L,0x00080110L,
|
||||
0x01000010L,0x01000110L,0x01080010L,0x01080110L,
|
||||
0x00200000L,0x00200100L,0x00280000L,0x00280100L,
|
||||
0x01200000L,0x01200100L,0x01280000L,0x01280100L,
|
||||
0x00200010L,0x00200110L,0x00280010L,0x00280110L,
|
||||
0x01200010L,0x01200110L,0x01280010L,0x01280110L,
|
||||
0x00000200L,0x00000300L,0x00080200L,0x00080300L,
|
||||
0x01000200L,0x01000300L,0x01080200L,0x01080300L,
|
||||
0x00000210L,0x00000310L,0x00080210L,0x00080310L,
|
||||
0x01000210L,0x01000310L,0x01080210L,0x01080310L,
|
||||
0x00200200L,0x00200300L,0x00280200L,0x00280300L,
|
||||
0x01200200L,0x01200300L,0x01280200L,0x01280300L,
|
||||
0x00200210L,0x00200310L,0x00280210L,0x00280310L,
|
||||
0x01200210L,0x01200310L,0x01280210L,0x01280310L,
|
||||
},{
|
||||
/* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */
|
||||
0x00000000L,0x04000000L,0x00040000L,0x04040000L,
|
||||
0x00000002L,0x04000002L,0x00040002L,0x04040002L,
|
||||
0x00002000L,0x04002000L,0x00042000L,0x04042000L,
|
||||
0x00002002L,0x04002002L,0x00042002L,0x04042002L,
|
||||
0x00000020L,0x04000020L,0x00040020L,0x04040020L,
|
||||
0x00000022L,0x04000022L,0x00040022L,0x04040022L,
|
||||
0x00002020L,0x04002020L,0x00042020L,0x04042020L,
|
||||
0x00002022L,0x04002022L,0x00042022L,0x04042022L,
|
||||
0x00000800L,0x04000800L,0x00040800L,0x04040800L,
|
||||
0x00000802L,0x04000802L,0x00040802L,0x04040802L,
|
||||
0x00002800L,0x04002800L,0x00042800L,0x04042800L,
|
||||
0x00002802L,0x04002802L,0x00042802L,0x04042802L,
|
||||
0x00000820L,0x04000820L,0x00040820L,0x04040820L,
|
||||
0x00000822L,0x04000822L,0x00040822L,0x04040822L,
|
||||
0x00002820L,0x04002820L,0x00042820L,0x04042820L,
|
||||
0x00002822L,0x04002822L,0x00042822L,0x04042822L,
|
||||
}};
|
||||
330
lib/des/speed.c
330
lib/des/speed.c
@@ -1,330 +0,0 @@
|
||||
/* crypto/des/speed.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/* 11-Sep-92 Andrew Daviel Support for Silicon Graphics IRIX added */
|
||||
/* 06-Apr-92 Luke Brennan Support for VMS and add extra signal calls */
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
|
||||
#if !defined(MSDOS) && !defined(WIN32)
|
||||
#define TIMES
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#ifdef HAVE_UNISTD_H
|
||||
#include <unistd.h>
|
||||
#endif
|
||||
#include <signal.h>
|
||||
#ifdef HAVE_TIME_H
|
||||
#include <time.h>
|
||||
#endif
|
||||
#ifdef HAVE_SYS_TYPES_H
|
||||
#include <sys/types.h>
|
||||
#endif
|
||||
#ifdef HAVE_SYS_TIMES_H
|
||||
#include <sys/times.h>
|
||||
#endif
|
||||
|
||||
#ifdef VMS
|
||||
#include <types.h>
|
||||
struct tms {
|
||||
time_t tms_utime;
|
||||
time_t tms_stime;
|
||||
time_t tms_uchild; /* I dunno... */
|
||||
time_t tms_uchildsys; /* so these names are a guess :-) */
|
||||
}
|
||||
#endif
|
||||
|
||||
#ifdef HAVE_SYS_TIMEB_H
|
||||
#include <sys/timeb.h>
|
||||
#endif
|
||||
|
||||
#include <limits.h>
|
||||
#ifdef HAVE_SYS_PARAM_H
|
||||
#include <sys/param.h>
|
||||
#endif
|
||||
|
||||
#include "des.h"
|
||||
|
||||
/* The following if from times(3) man page. It may need to be changed */
|
||||
#ifndef HZ
|
||||
#ifndef CLK_TCK
|
||||
#ifndef VMS
|
||||
#define HZ 100.0
|
||||
#else /* VMS */
|
||||
#define HZ 100.0
|
||||
#endif
|
||||
#else /* CLK_TCK */
|
||||
#define HZ ((double)CLK_TCK)
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#define BUFSIZE ((long)1024)
|
||||
long run=0;
|
||||
|
||||
#ifndef NOPROTO
|
||||
double Time_F(int s);
|
||||
#else
|
||||
double Time_F();
|
||||
#endif
|
||||
|
||||
#ifdef SIGALRM
|
||||
#if defined(__STDC__) || defined(sgi)
|
||||
#define SIGRETTYPE void
|
||||
#else
|
||||
#define SIGRETTYPE int
|
||||
#endif
|
||||
|
||||
#ifndef NOPROTO
|
||||
SIGRETTYPE sig_done(int sig);
|
||||
#else
|
||||
SIGRETTYPE sig_done();
|
||||
#endif
|
||||
|
||||
SIGRETTYPE sig_done(sig)
|
||||
int sig;
|
||||
{
|
||||
signal(SIGALRM,sig_done);
|
||||
run=0;
|
||||
#ifdef LINT
|
||||
sig=sig;
|
||||
#endif
|
||||
}
|
||||
#endif
|
||||
|
||||
#define START 0
|
||||
#define STOP 1
|
||||
|
||||
double Time_F(s)
|
||||
int s;
|
||||
{
|
||||
double ret;
|
||||
#ifdef TIMES
|
||||
static struct tms tstart,tend;
|
||||
|
||||
if (s == START)
|
||||
{
|
||||
times(&tstart);
|
||||
return(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
times(&tend);
|
||||
ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
#else /* !times() */
|
||||
static struct timeb tstart,tend;
|
||||
long i;
|
||||
|
||||
if (s == START)
|
||||
{
|
||||
ftime(&tstart);
|
||||
return(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
ftime(&tend);
|
||||
i=(long)tend.millitm-(long)tstart.millitm;
|
||||
ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
|
||||
return((ret == 0.0)?1e-6:ret);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
int main(argc,argv)
|
||||
int argc;
|
||||
char **argv;
|
||||
{
|
||||
long count;
|
||||
static unsigned char buf[BUFSIZE];
|
||||
static des_cblock key ={0x12,0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0};
|
||||
static des_cblock key2={0x34,0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12};
|
||||
static des_cblock key3={0x56,0x78,0x9a,0xbc,0xde,0xf0,0x12,0x34};
|
||||
des_key_schedule sch,sch2,sch3;
|
||||
double a,b,c,d,e;
|
||||
#ifndef SIGALRM
|
||||
long ca,cb,cc,cd,ce;
|
||||
#endif
|
||||
|
||||
#ifndef TIMES
|
||||
printf("To get the most acurate results, try to run this\n");
|
||||
printf("program when this computer is idle.\n");
|
||||
#endif
|
||||
|
||||
des_set_key((C_Block *)key2,sch2);
|
||||
des_set_key((C_Block *)key3,sch3);
|
||||
|
||||
#ifndef SIGALRM
|
||||
printf("First we calculate the approximate speed ...\n");
|
||||
des_set_key((C_Block *)key,sch);
|
||||
count=10;
|
||||
do {
|
||||
long i;
|
||||
DES_LONG data[2];
|
||||
|
||||
count*=2;
|
||||
Time_F(START);
|
||||
for (i=count; i; i--)
|
||||
des_encrypt(data,&(sch[0]),DES_ENCRYPT);
|
||||
d=Time_F(STOP);
|
||||
} while (d < 3.0);
|
||||
ca=count;
|
||||
cb=count*3;
|
||||
cc=count*3*8/BUFSIZE+1;
|
||||
cd=count*8/BUFSIZE+1;
|
||||
ce=count/20+1;
|
||||
printf("Doing set_key %ld times\n",ca);
|
||||
#define COND(d) (count != (d))
|
||||
#define COUNT(d) (d)
|
||||
#else
|
||||
#define COND(c) (run)
|
||||
#define COUNT(d) (count)
|
||||
signal(SIGALRM,sig_done);
|
||||
printf("Doing set_key for 10 seconds\n");
|
||||
alarm(10);
|
||||
#endif
|
||||
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(ca); count++)
|
||||
des_set_key((C_Block *)key,sch);
|
||||
d=Time_F(STOP);
|
||||
printf("%ld set_key's in %.2f seconds\n",count,d);
|
||||
a=((double)COUNT(ca))/d;
|
||||
|
||||
#ifdef SIGALRM
|
||||
printf("Doing des_encrypt's for 10 seconds\n");
|
||||
alarm(10);
|
||||
#else
|
||||
printf("Doing des_encrypt %ld times\n",cb);
|
||||
#endif
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(cb); count++)
|
||||
{
|
||||
DES_LONG data[2];
|
||||
|
||||
des_encrypt(data,&(sch[0]),DES_ENCRYPT);
|
||||
}
|
||||
d=Time_F(STOP);
|
||||
printf("%ld des_encrypt's in %.2f second\n",count,d);
|
||||
b=((double)COUNT(cb)*8)/d;
|
||||
|
||||
#ifdef SIGALRM
|
||||
printf("Doing des_cbc_encrypt on %ld byte blocks for 10 seconds\n",
|
||||
BUFSIZE);
|
||||
alarm(10);
|
||||
#else
|
||||
printf("Doing des_cbc_encrypt %ld times on %ld byte blocks\n",cc,
|
||||
BUFSIZE);
|
||||
#endif
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(cc); count++)
|
||||
des_ncbc_encrypt((C_Block *)buf,(C_Block *)buf,BUFSIZE,&(sch[0]),
|
||||
(C_Block *)&(key[0]),DES_ENCRYPT);
|
||||
d=Time_F(STOP);
|
||||
printf("%ld des_cbc_encrypt's of %ld byte blocks in %.2f second\n",
|
||||
count,BUFSIZE,d);
|
||||
c=((double)COUNT(cc)*BUFSIZE)/d;
|
||||
|
||||
#ifdef SIGALRM
|
||||
printf("Doing des_ede_cbc_encrypt on %ld byte blocks for 10 seconds\n",
|
||||
BUFSIZE);
|
||||
alarm(10);
|
||||
#else
|
||||
printf("Doing des_ede_cbc_encrypt %ld times on %ld byte blocks\n",cd,
|
||||
BUFSIZE);
|
||||
#endif
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(cd); count++)
|
||||
des_ede3_cbc_encrypt((C_Block *)buf,(C_Block *)buf,BUFSIZE,
|
||||
&(sch[0]),
|
||||
&(sch2[0]),
|
||||
&(sch3[0]),
|
||||
(C_Block *)&(key[0]),
|
||||
DES_ENCRYPT);
|
||||
d=Time_F(STOP);
|
||||
printf("%ld des_ede_cbc_encrypt's of %ld byte blocks in %.2f second\n",
|
||||
count,BUFSIZE,d);
|
||||
d=((double)COUNT(cd)*BUFSIZE)/d;
|
||||
|
||||
#ifdef SIGALRM
|
||||
printf("Doing crypt for 10 seconds\n");
|
||||
alarm(10);
|
||||
#else
|
||||
printf("Doing crypt %ld times\n",ce);
|
||||
#endif
|
||||
Time_F(START);
|
||||
for (count=0,run=1; COND(ce); count++)
|
||||
crypt("testing1","ef");
|
||||
e=Time_F(STOP);
|
||||
printf("%ld crypts in %.2f second\n",count,e);
|
||||
e=((double)COUNT(ce))/e;
|
||||
|
||||
printf("set_key per sec = %12.2f (%5.1fuS)\n",a,1.0e6/a);
|
||||
printf("DES raw ecb bytes per sec = %12.2f (%5.1fuS)\n",b,8.0e6/b);
|
||||
printf("DES cbc bytes per sec = %12.2f (%5.1fuS)\n",c,8.0e6/c);
|
||||
printf("DES ede cbc bytes per sec = %12.2f (%5.1fuS)\n",d,8.0e6/d);
|
||||
printf("crypt per sec = %12.2f (%5.1fuS)\n",e,1.0e6/e);
|
||||
exit(0);
|
||||
#if defined(LINT) || defined(MSDOS)
|
||||
return(0);
|
||||
#endif
|
||||
}
|
||||
204
lib/des/spr.h
204
lib/des/spr.h
@@ -1,204 +0,0 @@
|
||||
/* crypto/des/spr.h */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
const DES_LONG des_SPtrans[8][64]={
|
||||
{
|
||||
/* nibble 0 */
|
||||
0x02080800L, 0x00080000L, 0x02000002L, 0x02080802L,
|
||||
0x02000000L, 0x00080802L, 0x00080002L, 0x02000002L,
|
||||
0x00080802L, 0x02080800L, 0x02080000L, 0x00000802L,
|
||||
0x02000802L, 0x02000000L, 0x00000000L, 0x00080002L,
|
||||
0x00080000L, 0x00000002L, 0x02000800L, 0x00080800L,
|
||||
0x02080802L, 0x02080000L, 0x00000802L, 0x02000800L,
|
||||
0x00000002L, 0x00000800L, 0x00080800L, 0x02080002L,
|
||||
0x00000800L, 0x02000802L, 0x02080002L, 0x00000000L,
|
||||
0x00000000L, 0x02080802L, 0x02000800L, 0x00080002L,
|
||||
0x02080800L, 0x00080000L, 0x00000802L, 0x02000800L,
|
||||
0x02080002L, 0x00000800L, 0x00080800L, 0x02000002L,
|
||||
0x00080802L, 0x00000002L, 0x02000002L, 0x02080000L,
|
||||
0x02080802L, 0x00080800L, 0x02080000L, 0x02000802L,
|
||||
0x02000000L, 0x00000802L, 0x00080002L, 0x00000000L,
|
||||
0x00080000L, 0x02000000L, 0x02000802L, 0x02080800L,
|
||||
0x00000002L, 0x02080002L, 0x00000800L, 0x00080802L,
|
||||
},{
|
||||
/* nibble 1 */
|
||||
0x40108010L, 0x00000000L, 0x00108000L, 0x40100000L,
|
||||
0x40000010L, 0x00008010L, 0x40008000L, 0x00108000L,
|
||||
0x00008000L, 0x40100010L, 0x00000010L, 0x40008000L,
|
||||
0x00100010L, 0x40108000L, 0x40100000L, 0x00000010L,
|
||||
0x00100000L, 0x40008010L, 0x40100010L, 0x00008000L,
|
||||
0x00108010L, 0x40000000L, 0x00000000L, 0x00100010L,
|
||||
0x40008010L, 0x00108010L, 0x40108000L, 0x40000010L,
|
||||
0x40000000L, 0x00100000L, 0x00008010L, 0x40108010L,
|
||||
0x00100010L, 0x40108000L, 0x40008000L, 0x00108010L,
|
||||
0x40108010L, 0x00100010L, 0x40000010L, 0x00000000L,
|
||||
0x40000000L, 0x00008010L, 0x00100000L, 0x40100010L,
|
||||
0x00008000L, 0x40000000L, 0x00108010L, 0x40008010L,
|
||||
0x40108000L, 0x00008000L, 0x00000000L, 0x40000010L,
|
||||
0x00000010L, 0x40108010L, 0x00108000L, 0x40100000L,
|
||||
0x40100010L, 0x00100000L, 0x00008010L, 0x40008000L,
|
||||
0x40008010L, 0x00000010L, 0x40100000L, 0x00108000L,
|
||||
},{
|
||||
/* nibble 2 */
|
||||
0x04000001L, 0x04040100L, 0x00000100L, 0x04000101L,
|
||||
0x00040001L, 0x04000000L, 0x04000101L, 0x00040100L,
|
||||
0x04000100L, 0x00040000L, 0x04040000L, 0x00000001L,
|
||||
0x04040101L, 0x00000101L, 0x00000001L, 0x04040001L,
|
||||
0x00000000L, 0x00040001L, 0x04040100L, 0x00000100L,
|
||||
0x00000101L, 0x04040101L, 0x00040000L, 0x04000001L,
|
||||
0x04040001L, 0x04000100L, 0x00040101L, 0x04040000L,
|
||||
0x00040100L, 0x00000000L, 0x04000000L, 0x00040101L,
|
||||
0x04040100L, 0x00000100L, 0x00000001L, 0x00040000L,
|
||||
0x00000101L, 0x00040001L, 0x04040000L, 0x04000101L,
|
||||
0x00000000L, 0x04040100L, 0x00040100L, 0x04040001L,
|
||||
0x00040001L, 0x04000000L, 0x04040101L, 0x00000001L,
|
||||
0x00040101L, 0x04000001L, 0x04000000L, 0x04040101L,
|
||||
0x00040000L, 0x04000100L, 0x04000101L, 0x00040100L,
|
||||
0x04000100L, 0x00000000L, 0x04040001L, 0x00000101L,
|
||||
0x04000001L, 0x00040101L, 0x00000100L, 0x04040000L,
|
||||
},{
|
||||
/* nibble 3 */
|
||||
0x00401008L, 0x10001000L, 0x00000008L, 0x10401008L,
|
||||
0x00000000L, 0x10400000L, 0x10001008L, 0x00400008L,
|
||||
0x10401000L, 0x10000008L, 0x10000000L, 0x00001008L,
|
||||
0x10000008L, 0x00401008L, 0x00400000L, 0x10000000L,
|
||||
0x10400008L, 0x00401000L, 0x00001000L, 0x00000008L,
|
||||
0x00401000L, 0x10001008L, 0x10400000L, 0x00001000L,
|
||||
0x00001008L, 0x00000000L, 0x00400008L, 0x10401000L,
|
||||
0x10001000L, 0x10400008L, 0x10401008L, 0x00400000L,
|
||||
0x10400008L, 0x00001008L, 0x00400000L, 0x10000008L,
|
||||
0x00401000L, 0x10001000L, 0x00000008L, 0x10400000L,
|
||||
0x10001008L, 0x00000000L, 0x00001000L, 0x00400008L,
|
||||
0x00000000L, 0x10400008L, 0x10401000L, 0x00001000L,
|
||||
0x10000000L, 0x10401008L, 0x00401008L, 0x00400000L,
|
||||
0x10401008L, 0x00000008L, 0x10001000L, 0x00401008L,
|
||||
0x00400008L, 0x00401000L, 0x10400000L, 0x10001008L,
|
||||
0x00001008L, 0x10000000L, 0x10000008L, 0x10401000L,
|
||||
},{
|
||||
/* nibble 4 */
|
||||
0x08000000L, 0x00010000L, 0x00000400L, 0x08010420L,
|
||||
0x08010020L, 0x08000400L, 0x00010420L, 0x08010000L,
|
||||
0x00010000L, 0x00000020L, 0x08000020L, 0x00010400L,
|
||||
0x08000420L, 0x08010020L, 0x08010400L, 0x00000000L,
|
||||
0x00010400L, 0x08000000L, 0x00010020L, 0x00000420L,
|
||||
0x08000400L, 0x00010420L, 0x00000000L, 0x08000020L,
|
||||
0x00000020L, 0x08000420L, 0x08010420L, 0x00010020L,
|
||||
0x08010000L, 0x00000400L, 0x00000420L, 0x08010400L,
|
||||
0x08010400L, 0x08000420L, 0x00010020L, 0x08010000L,
|
||||
0x00010000L, 0x00000020L, 0x08000020L, 0x08000400L,
|
||||
0x08000000L, 0x00010400L, 0x08010420L, 0x00000000L,
|
||||
0x00010420L, 0x08000000L, 0x00000400L, 0x00010020L,
|
||||
0x08000420L, 0x00000400L, 0x00000000L, 0x08010420L,
|
||||
0x08010020L, 0x08010400L, 0x00000420L, 0x00010000L,
|
||||
0x00010400L, 0x08010020L, 0x08000400L, 0x00000420L,
|
||||
0x00000020L, 0x00010420L, 0x08010000L, 0x08000020L,
|
||||
},{
|
||||
/* nibble 5 */
|
||||
0x80000040L, 0x00200040L, 0x00000000L, 0x80202000L,
|
||||
0x00200040L, 0x00002000L, 0x80002040L, 0x00200000L,
|
||||
0x00002040L, 0x80202040L, 0x00202000L, 0x80000000L,
|
||||
0x80002000L, 0x80000040L, 0x80200000L, 0x00202040L,
|
||||
0x00200000L, 0x80002040L, 0x80200040L, 0x00000000L,
|
||||
0x00002000L, 0x00000040L, 0x80202000L, 0x80200040L,
|
||||
0x80202040L, 0x80200000L, 0x80000000L, 0x00002040L,
|
||||
0x00000040L, 0x00202000L, 0x00202040L, 0x80002000L,
|
||||
0x00002040L, 0x80000000L, 0x80002000L, 0x00202040L,
|
||||
0x80202000L, 0x00200040L, 0x00000000L, 0x80002000L,
|
||||
0x80000000L, 0x00002000L, 0x80200040L, 0x00200000L,
|
||||
0x00200040L, 0x80202040L, 0x00202000L, 0x00000040L,
|
||||
0x80202040L, 0x00202000L, 0x00200000L, 0x80002040L,
|
||||
0x80000040L, 0x80200000L, 0x00202040L, 0x00000000L,
|
||||
0x00002000L, 0x80000040L, 0x80002040L, 0x80202000L,
|
||||
0x80200000L, 0x00002040L, 0x00000040L, 0x80200040L,
|
||||
},{
|
||||
/* nibble 6 */
|
||||
0x00004000L, 0x00000200L, 0x01000200L, 0x01000004L,
|
||||
0x01004204L, 0x00004004L, 0x00004200L, 0x00000000L,
|
||||
0x01000000L, 0x01000204L, 0x00000204L, 0x01004000L,
|
||||
0x00000004L, 0x01004200L, 0x01004000L, 0x00000204L,
|
||||
0x01000204L, 0x00004000L, 0x00004004L, 0x01004204L,
|
||||
0x00000000L, 0x01000200L, 0x01000004L, 0x00004200L,
|
||||
0x01004004L, 0x00004204L, 0x01004200L, 0x00000004L,
|
||||
0x00004204L, 0x01004004L, 0x00000200L, 0x01000000L,
|
||||
0x00004204L, 0x01004000L, 0x01004004L, 0x00000204L,
|
||||
0x00004000L, 0x00000200L, 0x01000000L, 0x01004004L,
|
||||
0x01000204L, 0x00004204L, 0x00004200L, 0x00000000L,
|
||||
0x00000200L, 0x01000004L, 0x00000004L, 0x01000200L,
|
||||
0x00000000L, 0x01000204L, 0x01000200L, 0x00004200L,
|
||||
0x00000204L, 0x00004000L, 0x01004204L, 0x01000000L,
|
||||
0x01004200L, 0x00000004L, 0x00004004L, 0x01004204L,
|
||||
0x01000004L, 0x01004200L, 0x01004000L, 0x00004004L,
|
||||
},{
|
||||
/* nibble 7 */
|
||||
0x20800080L, 0x20820000L, 0x00020080L, 0x00000000L,
|
||||
0x20020000L, 0x00800080L, 0x20800000L, 0x20820080L,
|
||||
0x00000080L, 0x20000000L, 0x00820000L, 0x00020080L,
|
||||
0x00820080L, 0x20020080L, 0x20000080L, 0x20800000L,
|
||||
0x00020000L, 0x00820080L, 0x00800080L, 0x20020000L,
|
||||
0x20820080L, 0x20000080L, 0x00000000L, 0x00820000L,
|
||||
0x20000000L, 0x00800000L, 0x20020080L, 0x20800080L,
|
||||
0x00800000L, 0x00020000L, 0x20820000L, 0x00000080L,
|
||||
0x00800000L, 0x00020000L, 0x20000080L, 0x20820080L,
|
||||
0x00020080L, 0x20000000L, 0x00000000L, 0x00820000L,
|
||||
0x20800080L, 0x20020080L, 0x20020000L, 0x00800080L,
|
||||
0x20820000L, 0x00000080L, 0x00800080L, 0x20020000L,
|
||||
0x20820080L, 0x00800000L, 0x20800000L, 0x20000080L,
|
||||
0x00820000L, 0x00020080L, 0x20020080L, 0x20800000L,
|
||||
0x00000080L, 0x20820000L, 0x00820080L, 0x00000000L,
|
||||
0x20000000L, 0x20800080L, 0x00020000L, 0x00820080L,
|
||||
}};
|
||||
@@ -1,177 +0,0 @@
|
||||
/* crypto/des/str2key.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
extern int DES_check_key;
|
||||
|
||||
void DES_string_to_key(str, key)
|
||||
char *str;
|
||||
DES_cblock (*key);
|
||||
{
|
||||
DES_key_schedule ks;
|
||||
int i,length;
|
||||
register unsigned char j;
|
||||
|
||||
memset(key,0,8);
|
||||
length=strlen(str);
|
||||
#ifdef OLD_STR_TO_KEY
|
||||
for (i=0; i<length; i++)
|
||||
(*key)[i%8]^=(str[i]<<1);
|
||||
#else /* MIT COMPATIBLE */
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
j=str[i];
|
||||
if ((i%16) < 8)
|
||||
(*key)[i%8]^=(j<<1);
|
||||
else
|
||||
{
|
||||
/* Reverse the bit order 05/05/92 eay */
|
||||
j=((j<<4)&0xf0)|((j>>4)&0x0f);
|
||||
j=((j<<2)&0xcc)|((j>>2)&0x33);
|
||||
j=((j<<1)&0xaa)|((j>>1)&0x55);
|
||||
(*key)[7-(i%8)]^=j;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
DES_set_odd_parity((DES_cblock *)key);
|
||||
i=DES_check_key;
|
||||
DES_check_key=0;
|
||||
if(DES_is_weak_key((DES_cblock *)key))
|
||||
(*key)[7] ^= 0xF0;
|
||||
DES_set_key((DES_cblock *)key,&ks);
|
||||
DES_check_key=i;
|
||||
DES_cbc_cksum((DES_cblock *)str,(DES_cblock *)key,(long)length,&ks,
|
||||
(DES_cblock *)key);
|
||||
memset(&ks,0,sizeof(ks));
|
||||
DES_set_odd_parity((DES_cblock *)key);
|
||||
}
|
||||
|
||||
void DES_string_to_2keys(str, key1, key2)
|
||||
char *str;
|
||||
DES_cblock (*key1);
|
||||
DES_cblock (*key2);
|
||||
{
|
||||
DES_key_schedule ks;
|
||||
int i,length;
|
||||
register unsigned char j;
|
||||
|
||||
memset(key1,0,8);
|
||||
memset(key2,0,8);
|
||||
length=strlen(str);
|
||||
#ifdef OLD_STR_TO_KEY
|
||||
if (length <= 8)
|
||||
{
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
(*key2)[i]=(*key1)[i]=(str[i]<<1);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
if ((i/8)&1)
|
||||
(*key2)[i%8]^=(str[i]<<1);
|
||||
else
|
||||
(*key1)[i%8]^=(str[i]<<1);
|
||||
}
|
||||
}
|
||||
#else /* MIT COMPATIBLE */
|
||||
for (i=0; i<length; i++)
|
||||
{
|
||||
j=str[i];
|
||||
if ((i%32) < 16)
|
||||
{
|
||||
if ((i%16) < 8)
|
||||
(*key1)[i%8]^=(j<<1);
|
||||
else
|
||||
(*key2)[i%8]^=(j<<1);
|
||||
}
|
||||
else
|
||||
{
|
||||
j=((j<<4)&0xf0)|((j>>4)&0x0f);
|
||||
j=((j<<2)&0xcc)|((j>>2)&0x33);
|
||||
j=((j<<1)&0xaa)|((j>>1)&0x55);
|
||||
if ((i%16) < 8)
|
||||
(*key1)[7-(i%8)]^=j;
|
||||
else
|
||||
(*key2)[7-(i%8)]^=j;
|
||||
}
|
||||
}
|
||||
if (length <= 8) memcpy(key2,key1,8);
|
||||
#endif
|
||||
DES_set_odd_parity((DES_cblock *)key1);
|
||||
DES_set_odd_parity((DES_cblock *)key2);
|
||||
i=DES_check_key;
|
||||
DES_check_key=0;
|
||||
if(DES_is_weak_key((DES_cblock *)key1))
|
||||
(*key1)[7] ^= 0xF0;
|
||||
DES_set_key((DES_cblock *)key1,&ks);
|
||||
DES_cbc_cksum((DES_cblock *)str,(DES_cblock *)key1,(long)length,&ks,
|
||||
(DES_cblock *)key1);
|
||||
if(DES_is_weak_key((DES_cblock *)key2))
|
||||
(*key2)[7] ^= 0xF0;
|
||||
DES_set_key((DES_cblock *)key2,&ks);
|
||||
DES_cbc_cksum((DES_cblock *)str,(DES_cblock *)key2,(long)length,&ks,
|
||||
(DES_cblock *)key2);
|
||||
DES_check_key=i;
|
||||
memset(&ks,0,sizeof(ks));
|
||||
DES_set_odd_parity(key1);
|
||||
DES_set_odd_parity(key2);
|
||||
}
|
||||
109
lib/des/supp.c
109
lib/des/supp.c
@@ -1,109 +0,0 @@
|
||||
/* crypto/des/supp.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 1995
|
||||
* Mark Murray. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by Mark Murray
|
||||
* 4. Neither the name of the author nor the names of any co-contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY MARK MURRAY AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* $Id$
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include "des_locl.h"
|
||||
|
||||
void des_cblock_print_file(cb, fp)
|
||||
des_cblock *cb;
|
||||
FILE *fp;
|
||||
{
|
||||
int i;
|
||||
unsigned int *p = (unsigned int *)cb;
|
||||
|
||||
fprintf(fp, " 0x { ");
|
||||
for (i = 0; i < 8; i++) {
|
||||
fprintf(fp, "%x", p[i]);
|
||||
if (i != 7) fprintf(fp, ", ");
|
||||
}
|
||||
fprintf(fp, " }");
|
||||
}
|
||||
@@ -1,167 +0,0 @@
|
||||
#!/usr/local/bin/perl
|
||||
|
||||
# des.pl tesing code
|
||||
|
||||
require 'des.pl';
|
||||
|
||||
$num_tests=34;
|
||||
@key_data=(
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x30,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFE,0xDC,0xBA,0x98,0x76,0x54,0x32,0x10,
|
||||
0x7C,0xA1,0x10,0x45,0x4A,0x1A,0x6E,0x57,
|
||||
0x01,0x31,0xD9,0x61,0x9D,0xC1,0x37,0x6E,
|
||||
0x07,0xA1,0x13,0x3E,0x4A,0x0B,0x26,0x86,
|
||||
0x38,0x49,0x67,0x4C,0x26,0x02,0x31,0x9E,
|
||||
0x04,0xB9,0x15,0xBA,0x43,0xFE,0xB5,0xB6,
|
||||
0x01,0x13,0xB9,0x70,0xFD,0x34,0xF2,0xCE,
|
||||
0x01,0x70,0xF1,0x75,0x46,0x8F,0xB5,0xE6,
|
||||
0x43,0x29,0x7F,0xAD,0x38,0xE3,0x73,0xFE,
|
||||
0x07,0xA7,0x13,0x70,0x45,0xDA,0x2A,0x16,
|
||||
0x04,0x68,0x91,0x04,0xC2,0xFD,0x3B,0x2F,
|
||||
0x37,0xD0,0x6B,0xB5,0x16,0xCB,0x75,0x46,
|
||||
0x1F,0x08,0x26,0x0D,0x1A,0xC2,0x46,0x5E,
|
||||
0x58,0x40,0x23,0x64,0x1A,0xBA,0x61,0x76,
|
||||
0x02,0x58,0x16,0x16,0x46,0x29,0xB0,0x07,
|
||||
0x49,0x79,0x3E,0xBC,0x79,0xB3,0x25,0x8F,
|
||||
0x4F,0xB0,0x5E,0x15,0x15,0xAB,0x73,0xA7,
|
||||
0x49,0xE9,0x5D,0x6D,0x4C,0xA2,0x29,0xBF,
|
||||
0x01,0x83,0x10,0xDC,0x40,0x9B,0x26,0xD6,
|
||||
0x1C,0x58,0x7F,0x1C,0x13,0x92,0x4F,0xEF,
|
||||
0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,
|
||||
0x1F,0x1F,0x1F,0x1F,0x0E,0x0E,0x0E,0x0E,
|
||||
0xE0,0xFE,0xE0,0xFE,0xF1,0xFE,0xF1,0xFE,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0xFE,0xDC,0xBA,0x98,0x76,0x54,0x32,0x10,
|
||||
);
|
||||
|
||||
@plain_data=(
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x10,0x00,0x00,0x00,0x00,0x00,0x00,0x01,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x11,0x11,0x11,0x11,0x11,0x11,0x11,0x11,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0xA1,0xD6,0xD0,0x39,0x77,0x67,0x42,
|
||||
0x5C,0xD5,0x4C,0xA8,0x3D,0xEF,0x57,0xDA,
|
||||
0x02,0x48,0xD4,0x38,0x06,0xF6,0x71,0x72,
|
||||
0x51,0x45,0x4B,0x58,0x2D,0xDF,0x44,0x0A,
|
||||
0x42,0xFD,0x44,0x30,0x59,0x57,0x7F,0xA2,
|
||||
0x05,0x9B,0x5E,0x08,0x51,0xCF,0x14,0x3A,
|
||||
0x07,0x56,0xD8,0xE0,0x77,0x47,0x61,0xD2,
|
||||
0x76,0x25,0x14,0xB8,0x29,0xBF,0x48,0x6A,
|
||||
0x3B,0xDD,0x11,0x90,0x49,0x37,0x28,0x02,
|
||||
0x26,0x95,0x5F,0x68,0x35,0xAF,0x60,0x9A,
|
||||
0x16,0x4D,0x5E,0x40,0x4F,0x27,0x52,0x32,
|
||||
0x6B,0x05,0x6E,0x18,0x75,0x9F,0x5C,0xCA,
|
||||
0x00,0x4B,0xD6,0xEF,0x09,0x17,0x60,0x62,
|
||||
0x48,0x0D,0x39,0x00,0x6E,0xE7,0x62,0xF2,
|
||||
0x43,0x75,0x40,0xC8,0x69,0x8F,0x3C,0xFA,
|
||||
0x07,0x2D,0x43,0xA0,0x77,0x07,0x52,0x92,
|
||||
0x02,0xFE,0x55,0x77,0x81,0x17,0xF1,0x2A,
|
||||
0x1D,0x9D,0x5C,0x50,0x18,0xF7,0x28,0xC2,
|
||||
0x30,0x55,0x32,0x28,0x6D,0x6F,0x29,0x5A,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0x01,0x23,0x45,0x67,0x89,0xAB,0xCD,0xEF,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF);
|
||||
|
||||
@cipher_data=(
|
||||
0x8C,0xA6,0x4D,0xE9,0xC1,0xB1,0x23,0xA7,
|
||||
0x73,0x59,0xB2,0x16,0x3E,0x4E,0xDC,0x58,
|
||||
0x95,0x8E,0x6E,0x62,0x7A,0x05,0x55,0x7B,
|
||||
0xF4,0x03,0x79,0xAB,0x9E,0x0E,0xC5,0x33,
|
||||
0x17,0x66,0x8D,0xFC,0x72,0x92,0x53,0x2D,
|
||||
0x8A,0x5A,0xE1,0xF8,0x1A,0xB8,0xF2,0xDD,
|
||||
0x8C,0xA6,0x4D,0xE9,0xC1,0xB1,0x23,0xA7,
|
||||
0xED,0x39,0xD9,0x50,0xFA,0x74,0xBC,0xC4,
|
||||
0x69,0x0F,0x5B,0x0D,0x9A,0x26,0x93,0x9B,
|
||||
0x7A,0x38,0x9D,0x10,0x35,0x4B,0xD2,0x71,
|
||||
0x86,0x8E,0xBB,0x51,0xCA,0xB4,0x59,0x9A,
|
||||
0x71,0x78,0x87,0x6E,0x01,0xF1,0x9B,0x2A,
|
||||
0xAF,0x37,0xFB,0x42,0x1F,0x8C,0x40,0x95,
|
||||
0x86,0xA5,0x60,0xF1,0x0E,0xC6,0xD8,0x5B,
|
||||
0x0C,0xD3,0xDA,0x02,0x00,0x21,0xDC,0x09,
|
||||
0xEA,0x67,0x6B,0x2C,0xB7,0xDB,0x2B,0x7A,
|
||||
0xDF,0xD6,0x4A,0x81,0x5C,0xAF,0x1A,0x0F,
|
||||
0x5C,0x51,0x3C,0x9C,0x48,0x86,0xC0,0x88,
|
||||
0x0A,0x2A,0xEE,0xAE,0x3F,0xF4,0xAB,0x77,
|
||||
0xEF,0x1B,0xF0,0x3E,0x5D,0xFA,0x57,0x5A,
|
||||
0x88,0xBF,0x0D,0xB6,0xD7,0x0D,0xEE,0x56,
|
||||
0xA1,0xF9,0x91,0x55,0x41,0x02,0x0B,0x56,
|
||||
0x6F,0xBF,0x1C,0xAF,0xCF,0xFD,0x05,0x56,
|
||||
0x2F,0x22,0xE4,0x9B,0xAB,0x7C,0xA1,0xAC,
|
||||
0x5A,0x6B,0x61,0x2C,0xC2,0x6C,0xCE,0x4A,
|
||||
0x5F,0x4C,0x03,0x8E,0xD1,0x2B,0x2E,0x41,
|
||||
0x63,0xFA,0xC0,0xD0,0x34,0xD9,0xF7,0x93,
|
||||
0x61,0x7B,0x3A,0x0C,0xE8,0xF0,0x71,0x00,
|
||||
0xDB,0x95,0x86,0x05,0xF8,0xC8,0xC6,0x06,
|
||||
0xED,0xBF,0xD1,0xC6,0x6C,0x29,0xCC,0xC7,
|
||||
0x35,0x55,0x50,0xB2,0x15,0x0E,0x24,0x51,
|
||||
0xCA,0xAA,0xAF,0x4D,0xEA,0xF1,0xDB,0xAE,
|
||||
0xD5,0xD4,0x4F,0xF7,0x20,0x68,0x3D,0x0D,
|
||||
0x2A,0x2B,0xB0,0x08,0xDF,0x97,0xC2,0xF2);
|
||||
|
||||
print "Doing ecb tests\n";
|
||||
for ($i=0; $i<$num_tests; $i++)
|
||||
{
|
||||
printf "Doing test $i\n";
|
||||
$key =pack("C8",splice(@key_data ,0,8));
|
||||
$data=pack("C8",splice(@plain_data ,0,8));
|
||||
$res =pack("C8",splice(@cipher_data,0,8));
|
||||
|
||||
@ks= &des_set_key($key);
|
||||
$out1= &des_ecb_encrypt(*ks,1,$data);
|
||||
$out2= &des_ecb_encrypt(*ks,0,$out1);
|
||||
$out3= &des_ecb_encrypt(*ks,0,$res);
|
||||
&eprint("encryption failure",$res,$out1)
|
||||
if ($out1 ne $res);
|
||||
&eprint("encryption/decryption failure",$data,$out2)
|
||||
if ($out2 ne $data);
|
||||
&eprint("decryption failure",$data,$out3)
|
||||
if ($data ne $out3);
|
||||
}
|
||||
print "Done\n";
|
||||
|
||||
print "doing speed test over 30 seconds\n";
|
||||
$SIG{'ALRM'}='done';
|
||||
sub done {$done=1;}
|
||||
$done=0;
|
||||
|
||||
$count=0;
|
||||
$d=pack("C8",0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef);
|
||||
@ks= &des_set_key($d);
|
||||
alarm(30);
|
||||
$start=(times)[0];
|
||||
while (!$done)
|
||||
{
|
||||
$count++;
|
||||
$d=&des_ecb_encrypt(*ks,1,$d);
|
||||
}
|
||||
$end=(times)[0];
|
||||
$t=$end-$start;
|
||||
printf "$count DESs in %.2f seconds is %.2f DESs/sec or %.2f bytes/sec\n",
|
||||
1.0*$t,1.0*$count/$t,$count*8.0/$t;
|
||||
|
||||
sub eprint
|
||||
{
|
||||
local($s,$c,$e)=@_;
|
||||
local(@k);
|
||||
|
||||
@k=unpack("C8",$c);
|
||||
printf "%02x%02x%02x%02x %02x%02x%02x%02x - ",unpack("C8",$c);
|
||||
printf "%02x%02x%02x%02x %02x%02x%02x%02x :",unpack("C8",$e);
|
||||
print " $s\n";
|
||||
}
|
||||
216
lib/des/times
216
lib/des/times
@@ -1,216 +0,0 @@
|
||||
existing library on a DEC 3000/500
|
||||
set_key per sec = 256294.06 ( 3.9uS)
|
||||
DES ecb bytes per sec = 3553694.40 ( 2.3uS)
|
||||
DES cbc bytes per sec = 3661004.80 ( 2.2uS)
|
||||
DES ede cbc bytes per sec = 1353115.99 ( 5.9uS)
|
||||
crypt per sec = 16829.40 ( 59.4uS)
|
||||
|
||||
Intel P6/200 (NEXTSTEP) - cc -O3 (cc: gcc 2.5.8)
|
||||
set_key per sec = 219220.82 ( 4.6uS)
|
||||
DES ecb bytes per sec = 2438014.04 ( 3.3uS)
|
||||
DES cbc bytes per sec = 2467648.85 ( 3.2uS)
|
||||
DES ede cbc bytes per sec = 942121.58 ( 8.5uS)
|
||||
crypt per sec = 11398.73 ( 87.7uS)
|
||||
|
||||
# DECstation Alpha 3000 Model 700 AXP / OSF1 V3.0
|
||||
# gcc 2.6.3 / Young libdes 3.21
|
||||
set_key per sec = 149369.74 ( 6.7uS)
|
||||
DES ecb bytes per sec = 2011976.68 ( 4.0uS)
|
||||
DES cbc bytes per sec = 2002245.35 ( 4.0uS)
|
||||
DES ede cbc bytes per sec = 793677.19 ( 10.1uS)
|
||||
crypt per sec = 9244.52 (108.2uS)
|
||||
|
||||
# Sun Ultra I gcc 2.7.2 / Young libdes 3.21
|
||||
set_key per sec = 147172.22 ( 6.8uS)
|
||||
DES ecb bytes per sec = 1815054.70 ( 4.4uS)
|
||||
DES cbc bytes per sec = 1829405.18 ( 4.4uS)
|
||||
DES ede cbc bytes per sec = 714490.23 ( 11.2uS)
|
||||
crypt per sec = 8896.24 (112.4uS)
|
||||
|
||||
SGI Challenge (MIPS R4400 200mhz) - gcc -O2
|
||||
set_key per sec = 114141.13 ( 8.8uS)
|
||||
DES ecb bytes per sec = 1573472.84 ( 5.1uS)
|
||||
DES cbc bytes per sec = 1580418.20 ( 5.1uS)
|
||||
crypt per sec = 7137.84 (140.1uS)
|
||||
|
||||
DEC Alpha DEC 4000/710 AXP OSF/1 v 3.0 - gcc -O2 2.6.1
|
||||
set_key per sec = 123138.49 ( 8.1uS)
|
||||
DES ecb bytes per sec = 1407546.76 ( 5.7uS)
|
||||
DES cbc bytes per sec = 1404103.21 ( 5.7uS)
|
||||
crypt per sec = 7746.76 (129.1uS)
|
||||
|
||||
DEC Alpha DEC 4000/710 AXP OSF/1 v 3.0 - cc -O4 'DEC Compiler Driver 3.11'
|
||||
set_key per sec = 135160.83 ( 7.4uS)
|
||||
DES ecb bytes per sec = 1267753.22 ( 6.3uS)
|
||||
DES cbc bytes per sec = 1260564.90 ( 6.3uS)
|
||||
crypt per sec = 6479.37 (154.3uS)
|
||||
|
||||
SGI Challenge (MIPS R4400 200mhz) - cc -O2
|
||||
set_key per sec = 124000.10 ( 8.1uS)
|
||||
DES ecb bytes per sec = 1338138.45 ( 6.0uS)
|
||||
DES cbc bytes per sec = 1356515.84 ( 5.9uS)
|
||||
crypt per sec = 6223.92 (160.7uS)
|
||||
|
||||
Intel P5/133 (NEXTSTEP) - cc -O3 (cc: gcc 2.5.8)
|
||||
set_key per sec = 81923.10 ( 12.2uS)
|
||||
DES ecb bytes per sec = 1104711.61 ( 7.2uS)
|
||||
DES cbc bytes per sec = 1091536.05 ( 7.3uS)
|
||||
DES ede cbc bytes per sec = 410502.62 ( 19.5uS)
|
||||
crypt per sec = 4849.60 (206.2uS)
|
||||
|
||||
Sun SPARC 20 (NEXTSTEP) - cc -O3 (cc: gcc 2.5.8)
|
||||
set_key per sec = 60973.05 ( 16.4uS)
|
||||
DES ecb bytes per sec = 806032.15 ( 9.9uS)
|
||||
DES cbc bytes per sec = 801534.95 ( 10.0uS)
|
||||
DES ede cbc bytes per sec = 298799.73 ( 26.8uS)
|
||||
crypt per sec = 3678.42 (271.9uS)
|
||||
|
||||
SGI Indy (MIPS R4600 133mhz) -cc -O2
|
||||
set_key per sec = 88470.54 ( 11.3uS)
|
||||
DES ecb bytes per sec = 1023040.33 ( 7.8uS)
|
||||
DES cbc bytes per sec = 1033610.01 ( 7.7uS)
|
||||
crypt per sec = 4641.51 (215.4uS)
|
||||
|
||||
HP-UX 9000/887 cc +O3
|
||||
set_key per sec = 76824.30 ( 13.0uS)
|
||||
DES ecb bytes per sec = 1048911.20 ( 7.6uS)
|
||||
DES cbc bytes per sec = 1072332.80 ( 7.5uS)
|
||||
crypt per sec = 4968.64 (201.3uS)
|
||||
|
||||
IRIX 5.2 IP22 (R4000) cc -O2 (galilo)
|
||||
set_key per sec = 60615.73 ( 16.5uS)
|
||||
DES ecb bytes per sec = 584741.32 ( 13.7uS)
|
||||
DES cbc bytes per sec = 584306.94 ( 13.7uS)
|
||||
crypt per sec = 3049.33 (327.9uS)
|
||||
|
||||
HP-UX 9000/867 cc -O
|
||||
set_key per sec = 48600.00 ( 20.6uS)
|
||||
DES ecb bytes per sec = 616235.14 ( 13.0uS)
|
||||
DES cbc bytes per sec = 638669.44 ( 12.5uS)
|
||||
crypt per sec = 3016.68 (331.5uS)
|
||||
|
||||
HP-UX 9000/867 gcc -O2
|
||||
set_key per sec = 52120.50 ( 19.2uS)
|
||||
DES ecb bytes per sec = 715156.55 ( 11.2uS)
|
||||
DES cbc bytes per sec = 724424.28 ( 11.0uS)
|
||||
crypt per sec = 3295.87 (303.4uS)
|
||||
|
||||
DGUX AViiON mc88110 gcc -O2
|
||||
set_key per sec = 55604.91 ( 18.0uS)
|
||||
DES ecb bytes per sec = 658513.25 ( 12.1uS)
|
||||
DES cbc bytes per sec = 675552.71 ( 11.8uS)
|
||||
crypt per sec = 3438.10 (290.9uS)
|
||||
|
||||
Sparc 10 cc -O2 (orb)
|
||||
set_key per sec = 53002.30 ( 18.9uS)
|
||||
DES ecb bytes per sec = 705250.40 ( 11.3uS)
|
||||
DES cbc bytes per sec = 714342.40 ( 11.2uS)
|
||||
crypt per sec = 2943.99 (339.7uS)
|
||||
|
||||
Sparc 10 gcc -O2 (orb)
|
||||
set_key per sec = 58681.21 ( 17.0uS)
|
||||
DES ecb bytes per sec = 772390.20 ( 10.4uS)
|
||||
DES cbc bytes per sec = 774144.00 ( 10.3uS)
|
||||
crypt per sec = 3606.90 (277.2uS)
|
||||
|
||||
DEC Alpha DEC 4000/610 AXP OSF/1 v 1.3 - gcc v 2.3.3
|
||||
set_key per sec = 101840.19 ( 9.8uS)
|
||||
DES ecb bytes per sec = 1223712.35 ( 6.5uS)
|
||||
DES cbc bytes per sec = 1230542.98 ( 6.5uS)
|
||||
crypt per sec = 6428.75 (155.6uS)
|
||||
|
||||
DEC Alpha DEC 4000/610 APX OSF/1 v 1.3 - cc -O2 - OSF/1 AXP
|
||||
set_key per sec = 114198.91 ( 8.8uS)
|
||||
DES ecb bytes per sec = 1022710.93 ( 7.8uS)
|
||||
DES cbc bytes per sec = 1008821.93 ( 7.9uS)
|
||||
crypt per sec = 5454.13 (183.3uS)
|
||||
|
||||
DEC Alpha - DEC 3000/500 AXP OSF/1 - cc -O2 - 02/12/92
|
||||
set_key per sec = 83587.04 ( 12.0uS)
|
||||
DES ecb bytes per sec = 822620.82 ( 9.7uS)
|
||||
DES cbc bytes per sec = 832929.60 ( 9.6uS)
|
||||
crypt per sec = 4807.62 (208.0uS)
|
||||
|
||||
sun sparc 10/30 - gcc -O2
|
||||
set_key per sec = 42005.24 ( 23.8uS)
|
||||
DES ecb bytes per sec = 555949.47 ( 14.4uS)
|
||||
DES cbc bytes per sec = 549440.28 ( 14.6uS)
|
||||
crypt per sec = 2580.25 (387.6uS)
|
||||
|
||||
PA-RISC 1.1 HP 710
|
||||
set_key per sec = 38916.86
|
||||
DES ecb bytes per sec = 505971.82
|
||||
DES cbc bytes per sec = 515381.13
|
||||
crypt per sec = 2438.24
|
||||
|
||||
iris (spike) cc -O2
|
||||
set_key per sec = 23128.83 ( 43.2uS)
|
||||
DES ecb bytes per sec = 261577.94 ( 30.6uS)
|
||||
DES cbc bytes per sec = 261746.41 ( 30.6uS)
|
||||
crypt per sec = 1231.76 (811.8uS)
|
||||
|
||||
sun sparc 10/30 - cc -O4
|
||||
set_key per sec = 38379.86 ( 26.1uS)
|
||||
DES ecb bytes per sec = 460051.34 ( 17.4uS)
|
||||
DES cbc bytes per sec = 464970.54 ( 17.2uS)
|
||||
crypt per sec = 2092.64 (477.9uS)
|
||||
|
||||
sun sparc 2 - gcc2 -O2
|
||||
set_key per sec = 21559.10
|
||||
DES ecb bytes per sec = 305566.92
|
||||
DES cbc bytes per sec = 303497.50
|
||||
crypt per sec = 1410.48
|
||||
|
||||
RS/6000 model 320
|
||||
set_key per sec = 14371.93
|
||||
DES ecb bytes per sec = 222231.26
|
||||
DES cbc bytes per sec = 223926.79
|
||||
crypt per sec = 981.20
|
||||
|
||||
80486dx/66MHz Solaris 2.1 - gcc -O2 (gcc 2.6.3)
|
||||
set_key per sec = 26814.15 ( 37.3uS)
|
||||
DES ecb bytes per sec = 345029.95 ( 23.2uS)
|
||||
DES cbc bytes per sec = 344064.00 ( 23.3uS)
|
||||
crypt per sec = 1551.97 (644.3uS)
|
||||
|
||||
80486dx/50MHz Solaris 2.1 - gcc -O2 (gcc 2.5.2)
|
||||
set_key per sec = 18558.29 ( 53.9uS)
|
||||
DES ecb bytes per sec = 240873.90 ( 33.2uS)
|
||||
DES cbc bytes per sec = 239993.37 ( 33.3uS)
|
||||
crypt per sec = 1073.67 (931.4uS)
|
||||
|
||||
80486dx/50MHz Solaris 2.1 - cc -xO4 (cc: PC2.0.1 30 April 1993)
|
||||
set_key per sec = 18302.79 ( 54.6uS)
|
||||
DES ecb bytes per sec = 242640.29 ( 33.0uS)
|
||||
DES cbc bytes per sec = 239568.89 ( 33.4uS)
|
||||
crypt per sec = 1057.92 (945.2uS)
|
||||
|
||||
68030 HP400
|
||||
set_key per sec = 5251.28
|
||||
DES ecb bytes per sec = 56186.56
|
||||
DES cbc bytes per sec = 58681.53
|
||||
crypt per sec = 276.15
|
||||
|
||||
80486sx/33MHz MSDOS Turbo C v 2.0
|
||||
set_key per sec = 1883.22 (531.0uS)
|
||||
DES ecb bytes per sec = 63393.31 (126.2uS)
|
||||
DES cbc bytes per sec = 63416.83 (126.1uS)
|
||||
crypt per sec = 158.71 (6300.6uS)
|
||||
|
||||
80486sx/33MHz MSDOS djgpp gcc 1.39 (32bit compiler)
|
||||
set_key per sec = 12603.08 (79.3)
|
||||
DES ecb bytes per sec = 158875.15 (50.4)
|
||||
DES cbc bytes per sec = 159893.85 (50.0)
|
||||
crypt per sec = 780.24 (1281.7)
|
||||
|
||||
Version 1.99 26/08/92
|
||||
8MHz 68000 Atari-ST gcc 2.1 -O2 MiNT 0.94
|
||||
set_key per sec = 325.68 (3070.5uS)
|
||||
DES ecb bytes per sec = 4173.67 (1916.8uS)
|
||||
DES cbc bytes per sec = 4249.89 (1882.4uS)
|
||||
crypt per sec = 20.19 (49521.6uS)
|
||||
|
||||
8088/4.77mh MSDOS Turbo C v 2.0
|
||||
set_key per sec = 35.09
|
||||
DES ecb bytes per sec = 563.63
|
||||
crypt per sec = 2.69
|
||||
@@ -1,34 +0,0 @@
|
||||
#
|
||||
# DES SECTION
|
||||
#
|
||||
deschar * T_DESCHARP
|
||||
des_cblock * T_CBLOCK
|
||||
des_cblock T_CBLOCK
|
||||
des_key_schedule T_SCHEDULE
|
||||
des_key_schedule * T_SCHEDULE
|
||||
|
||||
INPUT
|
||||
T_CBLOCK
|
||||
$var=(des_cblock *)SvPV($arg,len);
|
||||
if (len < DES_KEY_SZ)
|
||||
{
|
||||
croak(\"$var needs to be at least %u bytes long\",DES_KEY_SZ);
|
||||
}
|
||||
|
||||
T_SCHEDULE
|
||||
$var=(des_key_schedule *)SvPV($arg,len);
|
||||
if (len < DES_SCHEDULE_SZ)
|
||||
{
|
||||
croak(\"$var needs to be at least %u bytes long\",
|
||||
DES_SCHEDULE_SZ);
|
||||
}
|
||||
|
||||
OUTPUT
|
||||
T_CBLOCK
|
||||
sv_setpvn($arg,(char *)$var,DES_KEY_SZ);
|
||||
|
||||
T_SCHEDULE
|
||||
sv_setpvn($arg,(char *)$var,DES_SCHEDULE_SZ);
|
||||
|
||||
T_DESCHARP
|
||||
sv_setpvn($arg,(char *)$var,len);
|
||||
157
lib/des/ui.c
Normal file
157
lib/des/ui.c
Normal file
@@ -0,0 +1,157 @@
|
||||
/*
|
||||
* Copyright (c) 1997 - 2000, 2005 Kungliga Tekniska H<>gskolan
|
||||
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* 3. Neither the name of the Institute nor the names of its contributors
|
||||
* may be used to endorse or promote products derived from this software
|
||||
* without specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
RCSID("$Id$");
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <signal.h>
|
||||
#include <termios.h>
|
||||
#include <roken.h>
|
||||
|
||||
|
||||
static sig_atomic_t intr_flag;
|
||||
|
||||
static void
|
||||
intr(int sig)
|
||||
{
|
||||
intr_flag++;
|
||||
}
|
||||
|
||||
static int
|
||||
read_string(const char *prompt, char *buf, size_t len, int echo)
|
||||
{
|
||||
struct sigaction sigs[47];
|
||||
struct sigaction sa;
|
||||
FILE *tty;
|
||||
int ret = 0;
|
||||
int of = 0;
|
||||
int i;
|
||||
int c;
|
||||
char *p;
|
||||
|
||||
struct termios t_new, t_old;
|
||||
|
||||
memset(&sa, 0, sizeof(sa));
|
||||
sa.sa_handler = intr;
|
||||
sigemptyset(&sa.sa_mask);
|
||||
sa.sa_flags = 0;
|
||||
for(i = 0; i < sizeof(sigs) / sizeof(sigs[0]); i++)
|
||||
if (i != SIGALRM) sigaction(i, &sa, &sigs[i]);
|
||||
|
||||
if((tty = fopen("/dev/tty", "r")) == NULL)
|
||||
tty = stdin;
|
||||
|
||||
fprintf(stderr, "%s", prompt);
|
||||
fflush(stderr);
|
||||
|
||||
if(echo == 0){
|
||||
tcgetattr(fileno(tty), &t_old);
|
||||
memcpy(&t_new, &t_old, sizeof(t_new));
|
||||
t_new.c_lflag &= ~ECHO;
|
||||
tcsetattr(fileno(tty), TCSANOW, &t_new);
|
||||
}
|
||||
intr_flag = 0;
|
||||
p = buf;
|
||||
while(intr_flag == 0){
|
||||
c = getc(tty);
|
||||
if(c == EOF){
|
||||
if(!ferror(tty))
|
||||
ret = 1;
|
||||
break;
|
||||
}
|
||||
if(c == '\n')
|
||||
break;
|
||||
if(of == 0)
|
||||
*p++ = c;
|
||||
of = (p == buf + len);
|
||||
}
|
||||
if(of)
|
||||
p--;
|
||||
*p = 0;
|
||||
|
||||
if(echo == 0){
|
||||
printf("\n");
|
||||
tcsetattr(fileno(tty), TCSANOW, &t_old);
|
||||
}
|
||||
|
||||
if(tty != stdin)
|
||||
fclose(tty);
|
||||
|
||||
for(i = 0; i < sizeof(sigs) / sizeof(sigs[0]); i++)
|
||||
if (i != SIGALRM) sigaction(i, &sigs[i], NULL);
|
||||
|
||||
if(ret)
|
||||
return -3;
|
||||
if(intr_flag)
|
||||
return -2;
|
||||
if(of)
|
||||
return -1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
UI_UTIL_read_pw_string(char *buf, int length, char *prompt, int verify)
|
||||
{
|
||||
int ret;
|
||||
|
||||
ret = read_string(prompt, buf, length, 0);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
if (verify) {
|
||||
char *prompt2, *buf2;
|
||||
buf2 = malloc(length);
|
||||
if (buf2 == NULL)
|
||||
return 1;
|
||||
asprintf(&prompt2, "Verify password - %s", prompt2);
|
||||
if (prompt2 == NULL) {
|
||||
free(buf2);
|
||||
return 1;
|
||||
}
|
||||
ret = read_string(prompt2, buf2, length, 0);
|
||||
free(prompt2);
|
||||
if (ret) {
|
||||
free(buf2);
|
||||
return ret;
|
||||
}
|
||||
if (strcmp(buf2, buf) != 0)
|
||||
ret = 1;
|
||||
free(buf2);
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
@@ -1,48 +0,0 @@
|
||||
/* lib/des/version.h */
|
||||
/* Copyright (C) 1995 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This file is part of an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL
|
||||
* specification. This library and applications are
|
||||
* FREE FOR COMMERCIAL AND NON-COMMERCIAL USE
|
||||
* as long as the following conditions are aheared to.
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed. If this code is used in a product,
|
||||
* Eric Young should be given attribution as the author of the parts used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* This product includes software developed by Eric Young (eay@mincom.oz.au)
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
extern char *DES_version;
|
||||
@@ -1,90 +0,0 @@
|
||||
$! --- VMS.com ---
|
||||
$!
|
||||
$ GoSub defines
|
||||
$ GoSub linker_options
|
||||
$ If (P1 .nes. "")
|
||||
$ Then
|
||||
$ GoSub 'P1'
|
||||
$ Else
|
||||
$ GoSub lib
|
||||
$ GoSub destest
|
||||
$ GoSub rpw
|
||||
$ GoSub speed
|
||||
$ GoSub des
|
||||
$ EndIF
|
||||
$!
|
||||
$ Exit
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$DEFINES:
|
||||
$ OPT_FILE := "VAX_LINKER_OPTIONS.OPT"
|
||||
$!
|
||||
$ CC_OPTS := "/NODebug/OPTimize/NOWarn"
|
||||
$!
|
||||
$ LINK_OPTS := "/NODebug/NOTraceback/Contiguous"
|
||||
$!
|
||||
$ OBJS = "cbc_cksm.obj,cbc_enc.obj,ecb_enc.obj,pcbc_enc.obj," + -
|
||||
"qud_cksm.obj,rand_key.obj,read_pwd.obj,set_key.obj," + -
|
||||
"str2key.obj,enc_read.obj,enc_writ.obj,fcrypt.obj," + -
|
||||
"cfb_enc.obj,3ecb_enc.obj,ofb_enc.obj"
|
||||
|
||||
|
||||
$!
|
||||
$ LIBDES = "cbc_cksm.c,cbc_enc.c,ecb_enc.c,enc_read.c," + -
|
||||
"enc_writ.c,pcbc_enc.c,qud_cksm.c,rand_key.c," + -
|
||||
"read_pwd.c,set_key.c,str2key.c,fcrypt.c," + -
|
||||
"cfb_enc.c,3ecb_enc.c,ofb_enc.c"
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$LINKER_OPTIONS:
|
||||
$ If (f$search(OPT_FILE) .eqs. "")
|
||||
$ Then
|
||||
$ Create 'OPT_FILE'
|
||||
$DECK
|
||||
! Default system options file to link against the sharable C runtime library
|
||||
!
|
||||
Sys$Share:VAXcRTL.exe/Share
|
||||
$EOD
|
||||
$ EndIF
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$LIB:
|
||||
$ CC 'CC_OPTS' 'LIBDES'
|
||||
$ If (f$search("LIBDES.OLB") .nes. "")
|
||||
$ Then Library /Object /Replace libdes 'OBJS'
|
||||
$ Else Library /Create /Object libdes 'OBJS'
|
||||
$ EndIF
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$DESTEST:
|
||||
$ CC 'CC_OPTS' destest
|
||||
$ Link 'link_opts' /Exec=destest destest.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$RPW:
|
||||
$ CC 'CC_OPTS' rpw
|
||||
$ Link 'link_opts' /Exec=rpw rpw.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$SPEED:
|
||||
$ CC 'CC_OPTS' speed
|
||||
$ Link 'link_opts' /Exec=speed speed.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
||||
$!
|
||||
$!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||
$!
|
||||
$DES:
|
||||
$ CC 'CC_OPTS' des
|
||||
$ Link 'link_opts' /Exec=des des.obj,libdes/LIBRARY,'opt_file'/Option
|
||||
$ Return
|
||||
@@ -1,208 +0,0 @@
|
||||
/* crypto/des/xcbc_enc.c */
|
||||
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
|
||||
* All rights reserved.
|
||||
*
|
||||
* This package is an SSL implementation written
|
||||
* by Eric Young (eay@mincom.oz.au).
|
||||
* The implementation was written so as to conform with Netscapes SSL.
|
||||
*
|
||||
* This library is free for commercial and non-commercial use as long as
|
||||
* the following conditions are aheared to. The following conditions
|
||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||
* included with this distribution is covered by the same copyright terms
|
||||
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
||||
*
|
||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||
* the code are not to be removed.
|
||||
* If this package is used in a product, Eric Young should be given attribution
|
||||
* as the author of the parts of the library used.
|
||||
* This can be in the form of a textual message at program startup or
|
||||
* in documentation (online or textual) provided with the package.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
* 3. All advertising materials mentioning features or use of this software
|
||||
* must display the following acknowledgement:
|
||||
* "This product includes cryptographic software written by
|
||||
* Eric Young (eay@mincom.oz.au)"
|
||||
* The word 'cryptographic' can be left out if the rouines from the library
|
||||
* being used are not cryptographic related :-).
|
||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||
* the apps directory (application code) you must include an acknowledgement:
|
||||
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* The licence and distribution terms for any publically available version or
|
||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||
* copied and put under another distribution licence
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
||||
/* RSA's DESX */
|
||||
|
||||
static unsigned char desx_white_in2out[256]={
|
||||
0xBD,0x56,0xEA,0xF2,0xA2,0xF1,0xAC,0x2A,0xB0,0x93,0xD1,0x9C,0x1B,0x33,0xFD,0xD0,
|
||||
0x30,0x04,0xB6,0xDC,0x7D,0xDF,0x32,0x4B,0xF7,0xCB,0x45,0x9B,0x31,0xBB,0x21,0x5A,
|
||||
0x41,0x9F,0xE1,0xD9,0x4A,0x4D,0x9E,0xDA,0xA0,0x68,0x2C,0xC3,0x27,0x5F,0x80,0x36,
|
||||
0x3E,0xEE,0xFB,0x95,0x1A,0xFE,0xCE,0xA8,0x34,0xA9,0x13,0xF0,0xA6,0x3F,0xD8,0x0C,
|
||||
0x78,0x24,0xAF,0x23,0x52,0xC1,0x67,0x17,0xF5,0x66,0x90,0xE7,0xE8,0x07,0xB8,0x60,
|
||||
0x48,0xE6,0x1E,0x53,0xF3,0x92,0xA4,0x72,0x8C,0x08,0x15,0x6E,0x86,0x00,0x84,0xFA,
|
||||
0xF4,0x7F,0x8A,0x42,0x19,0xF6,0xDB,0xCD,0x14,0x8D,0x50,0x12,0xBA,0x3C,0x06,0x4E,
|
||||
0xEC,0xB3,0x35,0x11,0xA1,0x88,0x8E,0x2B,0x94,0x99,0xB7,0x71,0x74,0xD3,0xE4,0xBF,
|
||||
0x3A,0xDE,0x96,0x0E,0xBC,0x0A,0xED,0x77,0xFC,0x37,0x6B,0x03,0x79,0x89,0x62,0xC6,
|
||||
0xD7,0xC0,0xD2,0x7C,0x6A,0x8B,0x22,0xA3,0x5B,0x05,0x5D,0x02,0x75,0xD5,0x61,0xE3,
|
||||
0x18,0x8F,0x55,0x51,0xAD,0x1F,0x0B,0x5E,0x85,0xE5,0xC2,0x57,0x63,0xCA,0x3D,0x6C,
|
||||
0xB4,0xC5,0xCC,0x70,0xB2,0x91,0x59,0x0D,0x47,0x20,0xC8,0x4F,0x58,0xE0,0x01,0xE2,
|
||||
0x16,0x38,0xC4,0x6F,0x3B,0x0F,0x65,0x46,0xBE,0x7E,0x2D,0x7B,0x82,0xF9,0x40,0xB5,
|
||||
0x1D,0x73,0xF8,0xEB,0x26,0xC7,0x87,0x97,0x25,0x54,0xB1,0x28,0xAA,0x98,0x9D,0xA5,
|
||||
0x64,0x6D,0x7A,0xD4,0x10,0x81,0x44,0xEF,0x49,0xD6,0xAE,0x2E,0xDD,0x76,0x5C,0x2F,
|
||||
0xA7,0x1C,0xC9,0x09,0x69,0x9A,0x83,0xCF,0x29,0x39,0xB9,0xE9,0x4C,0xFF,0x43,0xAB,
|
||||
};
|
||||
|
||||
void DES_xwhite_in2out(DES_cblock *,DES_cblock *, DES_cblock *);
|
||||
|
||||
void DES_xwhite_in2out(des_key,in_white,out_white)
|
||||
DES_cblock (*des_key);
|
||||
DES_cblock (*in_white);
|
||||
DES_cblock (*out_white);
|
||||
{
|
||||
unsigned char *key,*in,*out;
|
||||
int out0,out1;
|
||||
int i;
|
||||
|
||||
key=(unsigned char *)des_key;
|
||||
in=(unsigned char *)in_white;
|
||||
out=(unsigned char *)out_white;
|
||||
|
||||
out[0]=out[1]=out[2]=out[3]=out[4]=out[5]=out[6]=out[7]=0;
|
||||
out0=out1=0;
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
out[i]=key[i]^desx_white_in2out[out0^out1];
|
||||
out0=out1;
|
||||
out1=(int)out[i&0x07];
|
||||
}
|
||||
|
||||
out0=out[0];
|
||||
out1=out[i];
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
out[i]=in[i]^desx_white_in2out[out0^out1];
|
||||
out0=out1;
|
||||
out1=(int)out[i&0x07];
|
||||
}
|
||||
}
|
||||
|
||||
void DES_xcbc_encrypt(input, output, length, schedule, ivec, inw,outw,encrypt)
|
||||
DES_cblock (*input);
|
||||
DES_cblock (*output);
|
||||
long length;
|
||||
DES_key_schedule *schedule;
|
||||
DES_cblock (*ivec);
|
||||
DES_cblock (*inw);
|
||||
DES_cblock (*outw);
|
||||
int encrypt;
|
||||
{
|
||||
register DES_LONG tin0,tin1;
|
||||
register DES_LONG tout0,tout1,xor0,xor1;
|
||||
register DES_LONG inW0,inW1,outW0,outW1;
|
||||
register unsigned char *in,*out;
|
||||
register long l=length;
|
||||
DES_LONG tin[2];
|
||||
unsigned char *iv;
|
||||
|
||||
in=(unsigned char *)inw;
|
||||
c2l(in,inW0);
|
||||
c2l(in,inW1);
|
||||
in=(unsigned char *)outw;
|
||||
c2l(in,outW0);
|
||||
c2l(in,outW1);
|
||||
|
||||
in=(unsigned char *)input;
|
||||
out=(unsigned char *)output;
|
||||
iv=(unsigned char *)ivec;
|
||||
|
||||
if (encrypt)
|
||||
{
|
||||
c2l(iv,tout0);
|
||||
c2l(iv,tout1);
|
||||
for (l-=8; l>=0; l-=8)
|
||||
{
|
||||
c2l(in,tin0);
|
||||
c2l(in,tin1);
|
||||
tin0^=tout0^inW0; tin[0]=tin0;
|
||||
tin1^=tout1^inW1; tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
tout0=tin[0]^outW0; l2c(tout0,out);
|
||||
tout1=tin[1]^outW1; l2c(tout1,out);
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2ln(in,tin0,tin1,l+8);
|
||||
tin0^=tout0^inW0; tin[0]=tin0;
|
||||
tin1^=tout1^inW1; tin[1]=tin1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
|
||||
tout0=tin[0]^outW0; l2c(tout0,out);
|
||||
tout1=tin[1]^outW1; l2c(tout1,out);
|
||||
}
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(tout0,iv);
|
||||
l2c(tout1,iv);
|
||||
}
|
||||
else
|
||||
{
|
||||
c2l(iv,xor0);
|
||||
c2l(iv,xor1);
|
||||
for (l-=8; l>0; l-=8)
|
||||
{
|
||||
c2l(in,tin0); tin[0]=tin0^outW0;
|
||||
c2l(in,tin1); tin[1]=tin1^outW1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_DECRYPT);
|
||||
tout0=tin[0]^xor0^inW0;
|
||||
tout1=tin[1]^xor1^inW1;
|
||||
l2c(tout0,out);
|
||||
l2c(tout1,out);
|
||||
xor0=tin0;
|
||||
xor1=tin1;
|
||||
}
|
||||
if (l != -8)
|
||||
{
|
||||
c2l(in,tin0); tin[0]=tin0^outW0;
|
||||
c2l(in,tin1); tin[1]=tin1^outW1;
|
||||
DES_encrypt((DES_LONG *)tin,schedule,DES_DECRYPT);
|
||||
tout0=tin[0]^xor0^inW0;
|
||||
tout1=tin[1]^xor1^inW1;
|
||||
l2cn(tout0,tout1,out,l+8);
|
||||
xor0=tin0;
|
||||
xor1=tin1;
|
||||
}
|
||||
|
||||
iv=(unsigned char *)ivec;
|
||||
l2c(xor0,iv);
|
||||
l2c(xor1,iv);
|
||||
}
|
||||
tin0=tin1=tout0=tout1=xor0=xor1=0;
|
||||
inW0=inW1=outW0=outW1=0;
|
||||
tin[0]=tin[1]=0;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user