 1ebf8e5148
			
		
	
	1ebf8e5148
	
	
	
		
			
			git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@1760 ec53bebd-3082-4978-b11e-865c3cabbd6b
		
			
				
	
	
		
			824 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			824 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* lib/des/fcrypt.c */
 | |
| /* Copyright (C) 1995 Eric Young (eay@mincom.oz.au)
 | |
|  * All rights reserved.
 | |
|  * 
 | |
|  * This file is part of an SSL implementation written
 | |
|  * by Eric Young (eay@mincom.oz.au).
 | |
|  * The implementation was written so as to conform with Netscapes SSL
 | |
|  * specification.  This library and applications are
 | |
|  * FREE FOR COMMERCIAL AND NON-COMMERCIAL USE
 | |
|  * as long as the following conditions are aheared to.
 | |
|  * 
 | |
|  * Copyright remains Eric Young's, and as such any Copyright notices in
 | |
|  * the code are not to be removed.  If this code is used in a product,
 | |
|  * Eric Young should be given attribution as the author of the parts used.
 | |
|  * This can be in the form of a textual message at program startup or
 | |
|  * in documentation (online or textual) provided with the package.
 | |
|  * 
 | |
|  * Redistribution and use in source and binary forms, with or without
 | |
|  * modification, are permitted provided that the following conditions
 | |
|  * are met:
 | |
|  * 1. Redistributions of source code must retain the copyright
 | |
|  *    notice, this list of conditions and the following disclaimer.
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer in the
 | |
|  *    documentation and/or other materials provided with the distribution.
 | |
|  * 3. All advertising materials mentioning features or use of this software
 | |
|  *    must display the following acknowledgement:
 | |
|  *    This product includes software developed by Eric Young (eay@mincom.oz.au)
 | |
|  * 
 | |
|  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | |
|  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | |
|  * SUCH DAMAGE.
 | |
|  * 
 | |
|  * The licence and distribution terms for any publically available version or
 | |
|  * derivative of this code cannot be changed.  i.e. this code cannot simply be
 | |
|  * copied and put under another distribution licence
 | |
|  * [including the GNU Public Licence.]
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| 
 | |
| /* Eric Young.
 | |
|  * This version of crypt has been developed from my MIT compatable
 | |
|  * DES library.
 | |
|  * The library is available at pub/Crypto/DES at ftp.psy.uq.oz.au
 | |
|  * eay@mincom.oz.au or eay@psych.psy.uq.oz.au
 | |
|  */
 | |
| 
 | |
| #if !defined(_LIBC) || defined(NOCONST)
 | |
| #define const
 | |
| #endif
 | |
| 
 | |
| /* It is really only FreeBSD that still suffers from MD5 based crypts,
 | |
|  * for now let all platforms support it. */
 | |
| #define MD5_CRYPT_SUPPORT 1
 | |
| #if     MD5_CRYPT_SUPPORT
 | |
| /*
 | |
|  * ----------------------------------------------------------------------------
 | |
|  * "THE BEER-WARE LICENSE" (Revision 42):
 | |
|  * <phk@login.dknet.dk> wrote this file.  As long as you retain this notice you
 | |
|  * can do whatever you want with this stuff. If we meet some day, and you think
 | |
|  * this stuff is worth it, you can buy me a beer in return.   Poul-Henning Kamp
 | |
|  * ----------------------------------------------------------------------------
 | |
|  */
 | |
| 
 | |
| #include <md5.h>
 | |
| 
 | |
| static unsigned char itoa64[] =		/* 0 ... 63 => ascii - 64 */
 | |
| 	"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
 | |
| 
 | |
| static void
 | |
| to64(s, v, n)
 | |
| 	char *s;
 | |
| 	unsigned long v;
 | |
| 	int n;
 | |
| {
 | |
| 	while (--n >= 0) {
 | |
| 		*s++ = itoa64[v&0x3f];
 | |
| 		v >>= 6;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * UNIX password
 | |
|  *
 | |
|  * Use MD5 for what it is best at...
 | |
|  */
 | |
| 
 | |
| static
 | |
| char *
 | |
| crypt_md5(pw, salt)
 | |
| 	register const char *pw;
 | |
| 	register const char *salt;
 | |
| {
 | |
| 	static char	*magic = "$1$";	/*
 | |
| 						 * This string is magic for
 | |
| 						 * this algorithm.  Having
 | |
| 						 * it this way, we can get
 | |
| 						 * get better later on
 | |
| 						 */
 | |
| 	static char     passwd[120], *p;
 | |
| 	static const char *sp,*ep;
 | |
| 	unsigned char	final[16];
 | |
| 	int sl,pl,i,j;
 | |
| 	MD5_CTX	ctx,ctx1;
 | |
| 	unsigned long l;
 | |
| 
 | |
| 	/* Refine the Salt first */
 | |
| 	sp = salt;
 | |
| 
 | |
| 	/* If it starts with the magic string, then skip that */
 | |
| 	if(!strncmp(sp,magic,strlen(magic)))
 | |
| 		sp += strlen(magic);
 | |
| 
 | |
| 	/* It stops at the first '$', max 8 chars */
 | |
| 	for(ep=sp;*ep && *ep != '$' && ep < (sp+8);ep++)
 | |
| 		continue;
 | |
| 
 | |
| 	/* get the length of the true salt */
 | |
| 	sl = ep - sp;
 | |
| 
 | |
| 	MD5Init(&ctx);
 | |
| 
 | |
| 	/* The password first, since that is what is most unknown */
 | |
| 	MD5Update(&ctx,pw,strlen(pw));
 | |
| 
 | |
| 	/* Then our magic string */
 | |
| 	MD5Update(&ctx,magic,strlen(magic));
 | |
| 
 | |
| 	/* Then the raw salt */
 | |
| 	MD5Update(&ctx,sp,sl);
 | |
| 
 | |
| 	/* Then just as many characters of the MD5(pw,salt,pw) */
 | |
| 	MD5Init(&ctx1);
 | |
| 	MD5Update(&ctx1,pw,strlen(pw));
 | |
| 	MD5Update(&ctx1,sp,sl);
 | |
| 	MD5Update(&ctx1,pw,strlen(pw));
 | |
| 	MD5Final(final,&ctx1);
 | |
| 	for(pl = strlen(pw); pl > 0; pl -= 16)
 | |
| 		MD5Update(&ctx,final,pl>16 ? 16 : pl);
 | |
| 
 | |
| 	/* Don't leave anything around in vm they could use. */
 | |
| 	memset(final,0,sizeof final);
 | |
| 
 | |
| 	/* Then something really weird... */
 | |
| 	for (j=0,i = strlen(pw); i ; i >>= 1)
 | |
| 		if(i&1)
 | |
| 		    MD5Update(&ctx, final+j, 1);
 | |
| 		else
 | |
| 		    MD5Update(&ctx, pw+j, 1);
 | |
| 
 | |
| 	/* Now make the output string */
 | |
| 	strcpy(passwd,magic);
 | |
| 	strncat(passwd,sp,sl);
 | |
| 	strcat(passwd,"$");
 | |
| 
 | |
| 	MD5Final(final,&ctx);
 | |
| 
 | |
| 	/*
 | |
| 	 * and now, just to make sure things don't run too fast
 | |
| 	 * On a 60 Mhz Pentium this takes 34 msec, so you would
 | |
| 	 * need 30 seconds to build a 1000 entry dictionary...
 | |
| 	 */
 | |
| 	for(i=0;i<1000;i++) {
 | |
| 		MD5Init(&ctx1);
 | |
| 		if(i & 1)
 | |
| 			MD5Update(&ctx1,pw,strlen(pw));
 | |
| 		else
 | |
| 			MD5Update(&ctx1,final,16);
 | |
| 
 | |
| 		if(i % 3)
 | |
| 			MD5Update(&ctx1,sp,sl);
 | |
| 
 | |
| 		if(i % 7)
 | |
| 			MD5Update(&ctx1,pw,strlen(pw));
 | |
| 
 | |
| 		if(i & 1)
 | |
| 			MD5Update(&ctx1,final,16);
 | |
| 		else
 | |
| 			MD5Update(&ctx1,pw,strlen(pw));
 | |
| 		MD5Final(final,&ctx1);
 | |
| 	}
 | |
| 
 | |
| 	p = passwd + strlen(passwd);
 | |
| 
 | |
| 	l = (final[ 0]<<16) | (final[ 6]<<8) | final[12]; to64(p,l,4); p += 4;
 | |
| 	l = (final[ 1]<<16) | (final[ 7]<<8) | final[13]; to64(p,l,4); p += 4;
 | |
| 	l = (final[ 2]<<16) | (final[ 8]<<8) | final[14]; to64(p,l,4); p += 4;
 | |
| 	l = (final[ 3]<<16) | (final[ 9]<<8) | final[15]; to64(p,l,4); p += 4;
 | |
| 	l = (final[ 4]<<16) | (final[10]<<8) | final[ 5]; to64(p,l,4); p += 4;
 | |
| 	l =                    final[11]                ; to64(p,l,2); p += 2;
 | |
| 	*p = '\0';
 | |
| 
 | |
| 	/* Don't leave anything around in vm they could use. */
 | |
| 	memset(final,0,sizeof final);
 | |
| 
 | |
| 	return passwd;
 | |
| }
 | |
| #endif /* MD5_CRYPT_SUPPORT */
 | |
| 
 | |
| typedef unsigned char des_cblock[8];
 | |
| 
 | |
| typedef struct des_ks_struct
 | |
| 	{
 | |
| 	union	{
 | |
| 		des_cblock _;
 | |
| 		/* make sure things are correct size on machines with
 | |
| 		 * 8 byte longs */
 | |
| 		unsigned long pad[2];
 | |
| 		} ks;
 | |
| #define _	ks._
 | |
| 	} des_key_schedule[16];
 | |
| 
 | |
| #define DES_KEY_SZ 	(sizeof(des_cblock))
 | |
| #define DES_ENCRYPT	1
 | |
| #define DES_DECRYPT	0
 | |
| 
 | |
| #define ITERATIONS 16
 | |
| #define HALF_ITERATIONS 8
 | |
| 
 | |
| #define c2l(c,l)	(l =((unsigned long)(*((c)++)))    , \
 | |
| 			 l|=((unsigned long)(*((c)++)))<< 8, \
 | |
| 			 l|=((unsigned long)(*((c)++)))<<16, \
 | |
| 			 l|=((unsigned long)(*((c)++)))<<24)
 | |
| 
 | |
| #define l2c(l,c)	(*((c)++)=(unsigned char)(((l)    )&0xff), \
 | |
| 			 *((c)++)=(unsigned char)(((l)>> 8)&0xff), \
 | |
| 			 *((c)++)=(unsigned char)(((l)>>16)&0xff), \
 | |
| 			 *((c)++)=(unsigned char)(((l)>>24)&0xff))
 | |
| 
 | |
| static const unsigned long SPtrans[8][64]={
 | |
| {
 | |
| /* nibble 0 */
 | |
| 0x00820200L, 0x00020000L, 0x80800000L, 0x80820200L,
 | |
| 0x00800000L, 0x80020200L, 0x80020000L, 0x80800000L,
 | |
| 0x80020200L, 0x00820200L, 0x00820000L, 0x80000200L,
 | |
| 0x80800200L, 0x00800000L, 0x00000000L, 0x80020000L,
 | |
| 0x00020000L, 0x80000000L, 0x00800200L, 0x00020200L,
 | |
| 0x80820200L, 0x00820000L, 0x80000200L, 0x00800200L,
 | |
| 0x80000000L, 0x00000200L, 0x00020200L, 0x80820000L,
 | |
| 0x00000200L, 0x80800200L, 0x80820000L, 0x00000000L,
 | |
| 0x00000000L, 0x80820200L, 0x00800200L, 0x80020000L,
 | |
| 0x00820200L, 0x00020000L, 0x80000200L, 0x00800200L,
 | |
| 0x80820000L, 0x00000200L, 0x00020200L, 0x80800000L,
 | |
| 0x80020200L, 0x80000000L, 0x80800000L, 0x00820000L,
 | |
| 0x80820200L, 0x00020200L, 0x00820000L, 0x80800200L,
 | |
| 0x00800000L, 0x80000200L, 0x80020000L, 0x00000000L,
 | |
| 0x00020000L, 0x00800000L, 0x80800200L, 0x00820200L,
 | |
| 0x80000000L, 0x80820000L, 0x00000200L, 0x80020200L,
 | |
| },{
 | |
| /* nibble 1 */
 | |
| 0x10042004L, 0x00000000L, 0x00042000L, 0x10040000L,
 | |
| 0x10000004L, 0x00002004L, 0x10002000L, 0x00042000L,
 | |
| 0x00002000L, 0x10040004L, 0x00000004L, 0x10002000L,
 | |
| 0x00040004L, 0x10042000L, 0x10040000L, 0x00000004L,
 | |
| 0x00040000L, 0x10002004L, 0x10040004L, 0x00002000L,
 | |
| 0x00042004L, 0x10000000L, 0x00000000L, 0x00040004L,
 | |
| 0x10002004L, 0x00042004L, 0x10042000L, 0x10000004L,
 | |
| 0x10000000L, 0x00040000L, 0x00002004L, 0x10042004L,
 | |
| 0x00040004L, 0x10042000L, 0x10002000L, 0x00042004L,
 | |
| 0x10042004L, 0x00040004L, 0x10000004L, 0x00000000L,
 | |
| 0x10000000L, 0x00002004L, 0x00040000L, 0x10040004L,
 | |
| 0x00002000L, 0x10000000L, 0x00042004L, 0x10002004L,
 | |
| 0x10042000L, 0x00002000L, 0x00000000L, 0x10000004L,
 | |
| 0x00000004L, 0x10042004L, 0x00042000L, 0x10040000L,
 | |
| 0x10040004L, 0x00040000L, 0x00002004L, 0x10002000L,
 | |
| 0x10002004L, 0x00000004L, 0x10040000L, 0x00042000L,
 | |
| },{
 | |
| /* nibble 2 */
 | |
| 0x41000000L, 0x01010040L, 0x00000040L, 0x41000040L,
 | |
| 0x40010000L, 0x01000000L, 0x41000040L, 0x00010040L,
 | |
| 0x01000040L, 0x00010000L, 0x01010000L, 0x40000000L,
 | |
| 0x41010040L, 0x40000040L, 0x40000000L, 0x41010000L,
 | |
| 0x00000000L, 0x40010000L, 0x01010040L, 0x00000040L,
 | |
| 0x40000040L, 0x41010040L, 0x00010000L, 0x41000000L,
 | |
| 0x41010000L, 0x01000040L, 0x40010040L, 0x01010000L,
 | |
| 0x00010040L, 0x00000000L, 0x01000000L, 0x40010040L,
 | |
| 0x01010040L, 0x00000040L, 0x40000000L, 0x00010000L,
 | |
| 0x40000040L, 0x40010000L, 0x01010000L, 0x41000040L,
 | |
| 0x00000000L, 0x01010040L, 0x00010040L, 0x41010000L,
 | |
| 0x40010000L, 0x01000000L, 0x41010040L, 0x40000000L,
 | |
| 0x40010040L, 0x41000000L, 0x01000000L, 0x41010040L,
 | |
| 0x00010000L, 0x01000040L, 0x41000040L, 0x00010040L,
 | |
| 0x01000040L, 0x00000000L, 0x41010000L, 0x40000040L,
 | |
| 0x41000000L, 0x40010040L, 0x00000040L, 0x01010000L,
 | |
| },{
 | |
| /* nibble 3 */
 | |
| 0x00100402L, 0x04000400L, 0x00000002L, 0x04100402L,
 | |
| 0x00000000L, 0x04100000L, 0x04000402L, 0x00100002L,
 | |
| 0x04100400L, 0x04000002L, 0x04000000L, 0x00000402L,
 | |
| 0x04000002L, 0x00100402L, 0x00100000L, 0x04000000L,
 | |
| 0x04100002L, 0x00100400L, 0x00000400L, 0x00000002L,
 | |
| 0x00100400L, 0x04000402L, 0x04100000L, 0x00000400L,
 | |
| 0x00000402L, 0x00000000L, 0x00100002L, 0x04100400L,
 | |
| 0x04000400L, 0x04100002L, 0x04100402L, 0x00100000L,
 | |
| 0x04100002L, 0x00000402L, 0x00100000L, 0x04000002L,
 | |
| 0x00100400L, 0x04000400L, 0x00000002L, 0x04100000L,
 | |
| 0x04000402L, 0x00000000L, 0x00000400L, 0x00100002L,
 | |
| 0x00000000L, 0x04100002L, 0x04100400L, 0x00000400L,
 | |
| 0x04000000L, 0x04100402L, 0x00100402L, 0x00100000L,
 | |
| 0x04100402L, 0x00000002L, 0x04000400L, 0x00100402L,
 | |
| 0x00100002L, 0x00100400L, 0x04100000L, 0x04000402L,
 | |
| 0x00000402L, 0x04000000L, 0x04000002L, 0x04100400L,
 | |
| },{
 | |
| /* nibble 4 */
 | |
| 0x02000000L, 0x00004000L, 0x00000100L, 0x02004108L,
 | |
| 0x02004008L, 0x02000100L, 0x00004108L, 0x02004000L,
 | |
| 0x00004000L, 0x00000008L, 0x02000008L, 0x00004100L,
 | |
| 0x02000108L, 0x02004008L, 0x02004100L, 0x00000000L,
 | |
| 0x00004100L, 0x02000000L, 0x00004008L, 0x00000108L,
 | |
| 0x02000100L, 0x00004108L, 0x00000000L, 0x02000008L,
 | |
| 0x00000008L, 0x02000108L, 0x02004108L, 0x00004008L,
 | |
| 0x02004000L, 0x00000100L, 0x00000108L, 0x02004100L,
 | |
| 0x02004100L, 0x02000108L, 0x00004008L, 0x02004000L,
 | |
| 0x00004000L, 0x00000008L, 0x02000008L, 0x02000100L,
 | |
| 0x02000000L, 0x00004100L, 0x02004108L, 0x00000000L,
 | |
| 0x00004108L, 0x02000000L, 0x00000100L, 0x00004008L,
 | |
| 0x02000108L, 0x00000100L, 0x00000000L, 0x02004108L,
 | |
| 0x02004008L, 0x02004100L, 0x00000108L, 0x00004000L,
 | |
| 0x00004100L, 0x02004008L, 0x02000100L, 0x00000108L,
 | |
| 0x00000008L, 0x00004108L, 0x02004000L, 0x02000008L,
 | |
| },{
 | |
| /* nibble 5 */
 | |
| 0x20000010L, 0x00080010L, 0x00000000L, 0x20080800L,
 | |
| 0x00080010L, 0x00000800L, 0x20000810L, 0x00080000L,
 | |
| 0x00000810L, 0x20080810L, 0x00080800L, 0x20000000L,
 | |
| 0x20000800L, 0x20000010L, 0x20080000L, 0x00080810L,
 | |
| 0x00080000L, 0x20000810L, 0x20080010L, 0x00000000L,
 | |
| 0x00000800L, 0x00000010L, 0x20080800L, 0x20080010L,
 | |
| 0x20080810L, 0x20080000L, 0x20000000L, 0x00000810L,
 | |
| 0x00000010L, 0x00080800L, 0x00080810L, 0x20000800L,
 | |
| 0x00000810L, 0x20000000L, 0x20000800L, 0x00080810L,
 | |
| 0x20080800L, 0x00080010L, 0x00000000L, 0x20000800L,
 | |
| 0x20000000L, 0x00000800L, 0x20080010L, 0x00080000L,
 | |
| 0x00080010L, 0x20080810L, 0x00080800L, 0x00000010L,
 | |
| 0x20080810L, 0x00080800L, 0x00080000L, 0x20000810L,
 | |
| 0x20000010L, 0x20080000L, 0x00080810L, 0x00000000L,
 | |
| 0x00000800L, 0x20000010L, 0x20000810L, 0x20080800L,
 | |
| 0x20080000L, 0x00000810L, 0x00000010L, 0x20080010L,
 | |
| },{
 | |
| /* nibble 6 */
 | |
| 0x00001000L, 0x00000080L, 0x00400080L, 0x00400001L,
 | |
| 0x00401081L, 0x00001001L, 0x00001080L, 0x00000000L,
 | |
| 0x00400000L, 0x00400081L, 0x00000081L, 0x00401000L,
 | |
| 0x00000001L, 0x00401080L, 0x00401000L, 0x00000081L,
 | |
| 0x00400081L, 0x00001000L, 0x00001001L, 0x00401081L,
 | |
| 0x00000000L, 0x00400080L, 0x00400001L, 0x00001080L,
 | |
| 0x00401001L, 0x00001081L, 0x00401080L, 0x00000001L,
 | |
| 0x00001081L, 0x00401001L, 0x00000080L, 0x00400000L,
 | |
| 0x00001081L, 0x00401000L, 0x00401001L, 0x00000081L,
 | |
| 0x00001000L, 0x00000080L, 0x00400000L, 0x00401001L,
 | |
| 0x00400081L, 0x00001081L, 0x00001080L, 0x00000000L,
 | |
| 0x00000080L, 0x00400001L, 0x00000001L, 0x00400080L,
 | |
| 0x00000000L, 0x00400081L, 0x00400080L, 0x00001080L,
 | |
| 0x00000081L, 0x00001000L, 0x00401081L, 0x00400000L,
 | |
| 0x00401080L, 0x00000001L, 0x00001001L, 0x00401081L,
 | |
| 0x00400001L, 0x00401080L, 0x00401000L, 0x00001001L,
 | |
| },{
 | |
| /* nibble 7 */
 | |
| 0x08200020L, 0x08208000L, 0x00008020L, 0x00000000L,
 | |
| 0x08008000L, 0x00200020L, 0x08200000L, 0x08208020L,
 | |
| 0x00000020L, 0x08000000L, 0x00208000L, 0x00008020L,
 | |
| 0x00208020L, 0x08008020L, 0x08000020L, 0x08200000L,
 | |
| 0x00008000L, 0x00208020L, 0x00200020L, 0x08008000L,
 | |
| 0x08208020L, 0x08000020L, 0x00000000L, 0x00208000L,
 | |
| 0x08000000L, 0x00200000L, 0x08008020L, 0x08200020L,
 | |
| 0x00200000L, 0x00008000L, 0x08208000L, 0x00000020L,
 | |
| 0x00200000L, 0x00008000L, 0x08000020L, 0x08208020L,
 | |
| 0x00008020L, 0x08000000L, 0x00000000L, 0x00208000L,
 | |
| 0x08200020L, 0x08008020L, 0x08008000L, 0x00200020L,
 | |
| 0x08208000L, 0x00000020L, 0x00200020L, 0x08008000L,
 | |
| 0x08208020L, 0x00200000L, 0x08200000L, 0x08000020L,
 | |
| 0x00208000L, 0x00008020L, 0x08008020L, 0x08200000L,
 | |
| 0x00000020L, 0x08208000L, 0x00208020L, 0x00000000L,
 | |
| 0x08000000L, 0x08200020L, 0x00008000L, 0x00208020L}};
 | |
| static const unsigned long skb[8][64]={
 | |
| {
 | |
| /* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
 | |
| 0x00000000L,0x00000010L,0x20000000L,0x20000010L,
 | |
| 0x00010000L,0x00010010L,0x20010000L,0x20010010L,
 | |
| 0x00000800L,0x00000810L,0x20000800L,0x20000810L,
 | |
| 0x00010800L,0x00010810L,0x20010800L,0x20010810L,
 | |
| 0x00000020L,0x00000030L,0x20000020L,0x20000030L,
 | |
| 0x00010020L,0x00010030L,0x20010020L,0x20010030L,
 | |
| 0x00000820L,0x00000830L,0x20000820L,0x20000830L,
 | |
| 0x00010820L,0x00010830L,0x20010820L,0x20010830L,
 | |
| 0x00080000L,0x00080010L,0x20080000L,0x20080010L,
 | |
| 0x00090000L,0x00090010L,0x20090000L,0x20090010L,
 | |
| 0x00080800L,0x00080810L,0x20080800L,0x20080810L,
 | |
| 0x00090800L,0x00090810L,0x20090800L,0x20090810L,
 | |
| 0x00080020L,0x00080030L,0x20080020L,0x20080030L,
 | |
| 0x00090020L,0x00090030L,0x20090020L,0x20090030L,
 | |
| 0x00080820L,0x00080830L,0x20080820L,0x20080830L,
 | |
| 0x00090820L,0x00090830L,0x20090820L,0x20090830L,
 | |
| },{
 | |
| /* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */
 | |
| 0x00000000L,0x02000000L,0x00002000L,0x02002000L,
 | |
| 0x00200000L,0x02200000L,0x00202000L,0x02202000L,
 | |
| 0x00000004L,0x02000004L,0x00002004L,0x02002004L,
 | |
| 0x00200004L,0x02200004L,0x00202004L,0x02202004L,
 | |
| 0x00000400L,0x02000400L,0x00002400L,0x02002400L,
 | |
| 0x00200400L,0x02200400L,0x00202400L,0x02202400L,
 | |
| 0x00000404L,0x02000404L,0x00002404L,0x02002404L,
 | |
| 0x00200404L,0x02200404L,0x00202404L,0x02202404L,
 | |
| 0x10000000L,0x12000000L,0x10002000L,0x12002000L,
 | |
| 0x10200000L,0x12200000L,0x10202000L,0x12202000L,
 | |
| 0x10000004L,0x12000004L,0x10002004L,0x12002004L,
 | |
| 0x10200004L,0x12200004L,0x10202004L,0x12202004L,
 | |
| 0x10000400L,0x12000400L,0x10002400L,0x12002400L,
 | |
| 0x10200400L,0x12200400L,0x10202400L,0x12202400L,
 | |
| 0x10000404L,0x12000404L,0x10002404L,0x12002404L,
 | |
| 0x10200404L,0x12200404L,0x10202404L,0x12202404L,
 | |
| },{
 | |
| /* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */
 | |
| 0x00000000L,0x00000001L,0x00040000L,0x00040001L,
 | |
| 0x01000000L,0x01000001L,0x01040000L,0x01040001L,
 | |
| 0x00000002L,0x00000003L,0x00040002L,0x00040003L,
 | |
| 0x01000002L,0x01000003L,0x01040002L,0x01040003L,
 | |
| 0x00000200L,0x00000201L,0x00040200L,0x00040201L,
 | |
| 0x01000200L,0x01000201L,0x01040200L,0x01040201L,
 | |
| 0x00000202L,0x00000203L,0x00040202L,0x00040203L,
 | |
| 0x01000202L,0x01000203L,0x01040202L,0x01040203L,
 | |
| 0x08000000L,0x08000001L,0x08040000L,0x08040001L,
 | |
| 0x09000000L,0x09000001L,0x09040000L,0x09040001L,
 | |
| 0x08000002L,0x08000003L,0x08040002L,0x08040003L,
 | |
| 0x09000002L,0x09000003L,0x09040002L,0x09040003L,
 | |
| 0x08000200L,0x08000201L,0x08040200L,0x08040201L,
 | |
| 0x09000200L,0x09000201L,0x09040200L,0x09040201L,
 | |
| 0x08000202L,0x08000203L,0x08040202L,0x08040203L,
 | |
| 0x09000202L,0x09000203L,0x09040202L,0x09040203L,
 | |
| },{
 | |
| /* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */
 | |
| 0x00000000L,0x00100000L,0x00000100L,0x00100100L,
 | |
| 0x00000008L,0x00100008L,0x00000108L,0x00100108L,
 | |
| 0x00001000L,0x00101000L,0x00001100L,0x00101100L,
 | |
| 0x00001008L,0x00101008L,0x00001108L,0x00101108L,
 | |
| 0x04000000L,0x04100000L,0x04000100L,0x04100100L,
 | |
| 0x04000008L,0x04100008L,0x04000108L,0x04100108L,
 | |
| 0x04001000L,0x04101000L,0x04001100L,0x04101100L,
 | |
| 0x04001008L,0x04101008L,0x04001108L,0x04101108L,
 | |
| 0x00020000L,0x00120000L,0x00020100L,0x00120100L,
 | |
| 0x00020008L,0x00120008L,0x00020108L,0x00120108L,
 | |
| 0x00021000L,0x00121000L,0x00021100L,0x00121100L,
 | |
| 0x00021008L,0x00121008L,0x00021108L,0x00121108L,
 | |
| 0x04020000L,0x04120000L,0x04020100L,0x04120100L,
 | |
| 0x04020008L,0x04120008L,0x04020108L,0x04120108L,
 | |
| 0x04021000L,0x04121000L,0x04021100L,0x04121100L,
 | |
| 0x04021008L,0x04121008L,0x04021108L,0x04121108L,
 | |
| },{
 | |
| /* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
 | |
| 0x00000000L,0x10000000L,0x00010000L,0x10010000L,
 | |
| 0x00000004L,0x10000004L,0x00010004L,0x10010004L,
 | |
| 0x20000000L,0x30000000L,0x20010000L,0x30010000L,
 | |
| 0x20000004L,0x30000004L,0x20010004L,0x30010004L,
 | |
| 0x00100000L,0x10100000L,0x00110000L,0x10110000L,
 | |
| 0x00100004L,0x10100004L,0x00110004L,0x10110004L,
 | |
| 0x20100000L,0x30100000L,0x20110000L,0x30110000L,
 | |
| 0x20100004L,0x30100004L,0x20110004L,0x30110004L,
 | |
| 0x00001000L,0x10001000L,0x00011000L,0x10011000L,
 | |
| 0x00001004L,0x10001004L,0x00011004L,0x10011004L,
 | |
| 0x20001000L,0x30001000L,0x20011000L,0x30011000L,
 | |
| 0x20001004L,0x30001004L,0x20011004L,0x30011004L,
 | |
| 0x00101000L,0x10101000L,0x00111000L,0x10111000L,
 | |
| 0x00101004L,0x10101004L,0x00111004L,0x10111004L,
 | |
| 0x20101000L,0x30101000L,0x20111000L,0x30111000L,
 | |
| 0x20101004L,0x30101004L,0x20111004L,0x30111004L,
 | |
| },{
 | |
| /* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */
 | |
| 0x00000000L,0x08000000L,0x00000008L,0x08000008L,
 | |
| 0x00000400L,0x08000400L,0x00000408L,0x08000408L,
 | |
| 0x00020000L,0x08020000L,0x00020008L,0x08020008L,
 | |
| 0x00020400L,0x08020400L,0x00020408L,0x08020408L,
 | |
| 0x00000001L,0x08000001L,0x00000009L,0x08000009L,
 | |
| 0x00000401L,0x08000401L,0x00000409L,0x08000409L,
 | |
| 0x00020001L,0x08020001L,0x00020009L,0x08020009L,
 | |
| 0x00020401L,0x08020401L,0x00020409L,0x08020409L,
 | |
| 0x02000000L,0x0A000000L,0x02000008L,0x0A000008L,
 | |
| 0x02000400L,0x0A000400L,0x02000408L,0x0A000408L,
 | |
| 0x02020000L,0x0A020000L,0x02020008L,0x0A020008L,
 | |
| 0x02020400L,0x0A020400L,0x02020408L,0x0A020408L,
 | |
| 0x02000001L,0x0A000001L,0x02000009L,0x0A000009L,
 | |
| 0x02000401L,0x0A000401L,0x02000409L,0x0A000409L,
 | |
| 0x02020001L,0x0A020001L,0x02020009L,0x0A020009L,
 | |
| 0x02020401L,0x0A020401L,0x02020409L,0x0A020409L,
 | |
| },{
 | |
| /* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */
 | |
| 0x00000000L,0x00000100L,0x00080000L,0x00080100L,
 | |
| 0x01000000L,0x01000100L,0x01080000L,0x01080100L,
 | |
| 0x00000010L,0x00000110L,0x00080010L,0x00080110L,
 | |
| 0x01000010L,0x01000110L,0x01080010L,0x01080110L,
 | |
| 0x00200000L,0x00200100L,0x00280000L,0x00280100L,
 | |
| 0x01200000L,0x01200100L,0x01280000L,0x01280100L,
 | |
| 0x00200010L,0x00200110L,0x00280010L,0x00280110L,
 | |
| 0x01200010L,0x01200110L,0x01280010L,0x01280110L,
 | |
| 0x00000200L,0x00000300L,0x00080200L,0x00080300L,
 | |
| 0x01000200L,0x01000300L,0x01080200L,0x01080300L,
 | |
| 0x00000210L,0x00000310L,0x00080210L,0x00080310L,
 | |
| 0x01000210L,0x01000310L,0x01080210L,0x01080310L,
 | |
| 0x00200200L,0x00200300L,0x00280200L,0x00280300L,
 | |
| 0x01200200L,0x01200300L,0x01280200L,0x01280300L,
 | |
| 0x00200210L,0x00200310L,0x00280210L,0x00280310L,
 | |
| 0x01200210L,0x01200310L,0x01280210L,0x01280310L,
 | |
| },{
 | |
| /* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */
 | |
| 0x00000000L,0x04000000L,0x00040000L,0x04040000L,
 | |
| 0x00000002L,0x04000002L,0x00040002L,0x04040002L,
 | |
| 0x00002000L,0x04002000L,0x00042000L,0x04042000L,
 | |
| 0x00002002L,0x04002002L,0x00042002L,0x04042002L,
 | |
| 0x00000020L,0x04000020L,0x00040020L,0x04040020L,
 | |
| 0x00000022L,0x04000022L,0x00040022L,0x04040022L,
 | |
| 0x00002020L,0x04002020L,0x00042020L,0x04042020L,
 | |
| 0x00002022L,0x04002022L,0x00042022L,0x04042022L,
 | |
| 0x00000800L,0x04000800L,0x00040800L,0x04040800L,
 | |
| 0x00000802L,0x04000802L,0x00040802L,0x04040802L,
 | |
| 0x00002800L,0x04002800L,0x00042800L,0x04042800L,
 | |
| 0x00002802L,0x04002802L,0x00042802L,0x04042802L,
 | |
| 0x00000820L,0x04000820L,0x00040820L,0x04040820L,
 | |
| 0x00000822L,0x04000822L,0x00040822L,0x04040822L,
 | |
| 0x00002820L,0x04002820L,0x00042820L,0x04042820L,
 | |
| 0x00002822L,0x04002822L,0x00042822L,0x04042822L,
 | |
| } };
 | |
| 
 | |
| /* See ecb_encrypt.c for a pseudo description of these macros. */
 | |
| #define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
 | |
| 	(b)^=(t),\
 | |
| 	(a)^=((t)<<(n)))
 | |
| 
 | |
| #define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\
 | |
| 	(a)=(a)^(t)^(t>>(16-(n))))\
 | |
| 
 | |
| static const int shifts2[16]={0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0};
 | |
| 
 | |
| #ifndef NOPROTO
 | |
| static int body(unsigned long *out0, unsigned long *out1,
 | |
| 	des_key_schedule ks, unsigned long Eswap0, unsigned long Eswap1);
 | |
| static int des_set_key(des_cblock (*key), des_key_schedule schedule);
 | |
| #else
 | |
| static int body();
 | |
| static int des_set_key();
 | |
| #endif
 | |
| 
 | |
| static int des_set_key(key, schedule)
 | |
| des_cblock (*key);
 | |
| des_key_schedule schedule;
 | |
| 	{
 | |
| 	register unsigned long c,d,t,s;
 | |
| 	register unsigned char *in;
 | |
| 	register unsigned long *k;
 | |
| 	register int i;
 | |
| 
 | |
| 	k=(unsigned long *)schedule;
 | |
| 	in=(unsigned char *)key;
 | |
| 
 | |
| 	c2l(in,c);
 | |
| 	c2l(in,d);
 | |
| 
 | |
| 	/* I now do it in 47 simple operations :-)
 | |
| 	 * Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov)
 | |
| 	 * for the inspiration. :-) */
 | |
| 	PERM_OP (d,c,t,4,0x0f0f0f0fL);
 | |
| 	HPERM_OP(c,t,-2,0xcccc0000L);
 | |
| 	HPERM_OP(d,t,-2,0xcccc0000L);
 | |
| 	PERM_OP (d,c,t,1,0x55555555L);
 | |
| 	PERM_OP (c,d,t,8,0x00ff00ffL);
 | |
| 	PERM_OP (d,c,t,1,0x55555555L);
 | |
| 	d=	(((d&0x000000ffL)<<16)| (d&0x0000ff00L)     |
 | |
| 		 ((d&0x00ff0000L)>>16)|((c&0xf0000000L)>>4));
 | |
| 	c&=0x0fffffffL;
 | |
| 
 | |
| 	for (i=0; i<ITERATIONS; i++)
 | |
| 		{
 | |
| 		if (shifts2[i])
 | |
| 			{ c=((c>>2)|(c<<26)); d=((d>>2)|(d<<26)); }
 | |
| 		else
 | |
| 			{ c=((c>>1)|(c<<27)); d=((d>>1)|(d<<27)); }
 | |
| 		c&=0x0fffffffL;
 | |
| 		d&=0x0fffffffL;
 | |
| 		/* could be a few less shifts but I am to lazy at this
 | |
| 		 * point in time to investigate */
 | |
| 		s=	skb[0][ (c     )&0x3f                 ]|
 | |
| 			skb[1][((c>> 6L)&0x03)|((c>> 7L)&0x3c)]|
 | |
| 			skb[2][((c>>13L)&0x0f)|((c>>14L)&0x30)]|
 | |
| 			skb[3][((c>>20L)&0x01)|((c>>21L)&0x06) |
 | |
| 					       ((c>>22L)&0x38)];
 | |
| 		t=	skb[4][ (d     )&0x3f                 ]|
 | |
| 			skb[5][((d>> 7L)&0x03)|((d>> 8L)&0x3c)]|
 | |
| 			skb[6][ (d>>15L)&0x3f                 ]|
 | |
| 			skb[7][((d>>21L)&0x0f)|((d>>22L)&0x30)];
 | |
| 
 | |
| 		/* table contained 0213 4657 */
 | |
| 		*(k++)=((t<<16)|(s&0x0000ffffL))&0xffffffffL;
 | |
| 		s=     ((s>>16)|(t&0xffff0000L));
 | |
| 		
 | |
| 		s=(s<<4)|(s>>28);
 | |
| 		*(k++)=s&0xffffffffL;
 | |
| 		}
 | |
| 	return(0);
 | |
| 	}
 | |
| 
 | |
| /******************************************************************
 | |
|  * modified stuff for crypt.
 | |
|  ******************************************************************/
 | |
| 
 | |
| /* The changes to this macro may help or hinder, depending on the
 | |
|  * compiler and the achitecture.  gcc2 always seems to do well :-). 
 | |
|  * Inspired by Dana How <how@isl.stanford.edu>
 | |
|  * DO NOT use the alternative version on machines with 8 byte longs.
 | |
|  */
 | |
| #ifdef DES_USE_PTR
 | |
| #define D_ENCRYPT(L,R,S) \
 | |
| 	t=(R^(R>>16)); \
 | |
| 	u=(t&E0); \
 | |
| 	t=(t&E1); \
 | |
| 	u=((u^(u<<16))^R^s[S  ])<<2; \
 | |
| 	t=(t^(t<<16))^R^s[S+1]; \
 | |
| 	t=(t>>2)|(t<<30); \
 | |
| 	L^= \
 | |
| 	*(unsigned long *)(des_SP+0x0100+((t    )&0xfc))+ \
 | |
| 	*(unsigned long *)(des_SP+0x0300+((t>> 8)&0xfc))+ \
 | |
| 	*(unsigned long *)(des_SP+0x0500+((t>>16)&0xfc))+ \
 | |
| 	*(unsigned long *)(des_SP+0x0700+((t>>24)&0xfc))+ \
 | |
| 	*(unsigned long *)(des_SP+       ((u    )&0xfc))+ \
 | |
|   	*(unsigned long *)(des_SP+0x0200+((u>> 8)&0xfc))+ \
 | |
|   	*(unsigned long *)(des_SP+0x0400+((u>>16)&0xfc))+ \
 | |
|  	*(unsigned long *)(des_SP+0x0600+((u>>24)&0xfc));
 | |
| #else /* original version */
 | |
| #define D_ENCRYPT(L,R,S)	\
 | |
| 	t=(R^(R>>16)); \
 | |
| 	u=(t&E0); \
 | |
| 	t=(t&E1); \
 | |
| 	u=(u^(u<<16))^R^s[S  ]; \
 | |
| 	t=(t^(t<<16))^R^s[S+1]; \
 | |
| 	t=(t>>4)|(t<<28); \
 | |
| 	L^=	SPtrans[1][(t    )&0x3f]| \
 | |
| 		SPtrans[3][(t>> 8)&0x3f]| \
 | |
| 		SPtrans[5][(t>>16)&0x3f]| \
 | |
| 		SPtrans[7][(t>>24)&0x3f]| \
 | |
| 		SPtrans[0][(u    )&0x3f]| \
 | |
| 		SPtrans[2][(u>> 8)&0x3f]| \
 | |
| 		SPtrans[4][(u>>16)&0x3f]| \
 | |
| 		SPtrans[6][(u>>24)&0x3f];
 | |
| #endif
 | |
| 
 | |
| /* Added more values to handle illegal salt values the way normal
 | |
|  * crypt() implementations do.  The patch was sent by 
 | |
|  * Bjorn Gronvall <bg@sics.se>
 | |
|  */
 | |
| static unsigned const char con_salt[128]={
 | |
| 0xD2,0xD3,0xD4,0xD5,0xD6,0xD7,0xD8,0xD9,
 | |
| 0xDA,0xDB,0xDC,0xDD,0xDE,0xDF,0xE0,0xE1,
 | |
| 0xE2,0xE3,0xE4,0xE5,0xE6,0xE7,0xE8,0xE9,
 | |
| 0xEA,0xEB,0xEC,0xED,0xEE,0xEF,0xF0,0xF1,
 | |
| 0xF2,0xF3,0xF4,0xF5,0xF6,0xF7,0xF8,0xF9,
 | |
| 0xFA,0xFB,0xFC,0xFD,0xFE,0xFF,0x00,0x01,
 | |
| 0x02,0x03,0x04,0x05,0x06,0x07,0x08,0x09,
 | |
| 0x0A,0x0B,0x05,0x06,0x07,0x08,0x09,0x0A,
 | |
| 0x0B,0x0C,0x0D,0x0E,0x0F,0x10,0x11,0x12,
 | |
| 0x13,0x14,0x15,0x16,0x17,0x18,0x19,0x1A,
 | |
| 0x1B,0x1C,0x1D,0x1E,0x1F,0x20,0x21,0x22,
 | |
| 0x23,0x24,0x25,0x20,0x21,0x22,0x23,0x24,
 | |
| 0x25,0x26,0x27,0x28,0x29,0x2A,0x2B,0x2C,
 | |
| 0x2D,0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,
 | |
| 0x35,0x36,0x37,0x38,0x39,0x3A,0x3B,0x3C,
 | |
| 0x3D,0x3E,0x3F,0x40,0x41,0x42,0x43,0x44,
 | |
| };
 | |
| 
 | |
| static unsigned const char cov_2char[64]={
 | |
| 0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,0x35,
 | |
| 0x36,0x37,0x38,0x39,0x41,0x42,0x43,0x44,
 | |
| 0x45,0x46,0x47,0x48,0x49,0x4A,0x4B,0x4C,
 | |
| 0x4D,0x4E,0x4F,0x50,0x51,0x52,0x53,0x54,
 | |
| 0x55,0x56,0x57,0x58,0x59,0x5A,0x61,0x62,
 | |
| 0x63,0x64,0x65,0x66,0x67,0x68,0x69,0x6A,
 | |
| 0x6B,0x6C,0x6D,0x6E,0x6F,0x70,0x71,0x72,
 | |
| 0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7A
 | |
| };
 | |
| 
 | |
| #ifndef NOPROTO
 | |
| #ifdef PERL5
 | |
| char *des_crypt(char *buf,char *salt);
 | |
| #else
 | |
| char *crypt(char *buf,char *salt);
 | |
| #endif
 | |
| #else
 | |
| #ifdef PERL5
 | |
| char *des_crypt();
 | |
| #else
 | |
| char *crypt();
 | |
| #endif
 | |
| #endif
 | |
| 
 | |
| #ifdef PERL5
 | |
| char *des_crypt(buf,salt)
 | |
| #else
 | |
| char *crypt(buf,salt)
 | |
| #endif
 | |
| char *buf;
 | |
| char *salt;
 | |
| 	{
 | |
| 	unsigned int i,j,x,y;
 | |
| 	unsigned long Eswap0=0,Eswap1=0;
 | |
| 	unsigned long out[2],ll;
 | |
| 	des_cblock key;
 | |
| 	des_key_schedule ks;
 | |
| 	static unsigned char buff[20];
 | |
| 	unsigned char bb[9];
 | |
| 	unsigned char *b=bb;
 | |
| 	unsigned char c,u;
 | |
| 
 | |
| #if     MD5_CRYPT_SUPPORT
 | |
| 	if (!strncmp(salt, "$1$", 3))
 | |
| 		return crypt_md5(buf, salt);
 | |
| #endif
 | |
| 
 | |
| 	/* eay 25/08/92
 | |
| 	 * If you call crypt("pwd","*") as often happens when you
 | |
| 	 * have * as the pwd field in /etc/passwd, the function
 | |
| 	 * returns *\0XXXXXXXXX
 | |
| 	 * The \0 makes the string look like * so the pwd "*" would
 | |
| 	 * crypt to "*".  This was found when replacing the crypt in
 | |
| 	 * our shared libraries.  People found that the disbled
 | |
| 	 * accounts effectivly had no passwd :-(. */
 | |
| 	x=buff[0]=((salt[0] == '\0')?'A':salt[0]);
 | |
| 	Eswap0=con_salt[x];
 | |
| 	x=buff[1]=((salt[1] == '\0')?'A':salt[1]);
 | |
| 	Eswap1=con_salt[x]<<4;
 | |
| 
 | |
| 	for (i=0; i<8; i++)
 | |
| 		{
 | |
| 		c= *(buf++);
 | |
| 		if (!c) break;
 | |
| 		key[i]=(c<<1);
 | |
| 		}
 | |
| 	for (; i<8; i++)
 | |
| 		key[i]=0;
 | |
| 
 | |
| 	des_set_key((des_cblock *)(key),ks);
 | |
| 	body(&(out[0]),&(out[1]),ks,Eswap0,Eswap1);
 | |
| 
 | |
| 	ll=out[0]; l2c(ll,b);
 | |
| 	ll=out[1]; l2c(ll,b);
 | |
| 	y=0;
 | |
| 	u=0x80;
 | |
| 	bb[8]=0;
 | |
| 	for (i=2; i<13; i++)
 | |
| 		{
 | |
| 		c=0;
 | |
| 		for (j=0; j<6; j++)
 | |
| 			{
 | |
| 			c<<=1;
 | |
| 			if (bb[y] & u) c|=1;
 | |
| 			u>>=1;
 | |
| 			if (!u)
 | |
| 				{
 | |
| 				y++;
 | |
| 				u=0x80;
 | |
| 				}
 | |
| 			}
 | |
| 		buff[i]=cov_2char[c];
 | |
| 		}
 | |
| 	buff[13]='\0';
 | |
| 	return((char *)buff);
 | |
| 	}
 | |
| 
 | |
| static int body(out0, out1, ks, Eswap0, Eswap1)
 | |
| unsigned long *out0;
 | |
| unsigned long *out1;
 | |
| des_key_schedule ks;
 | |
| unsigned long Eswap0;
 | |
| unsigned long Eswap1;
 | |
| 	{
 | |
| 	register unsigned long l,r,t,u;
 | |
| #ifdef DES_USE_PTR
 | |
| 	register unsigned char *des_SP=(unsigned char *)SPtrans;
 | |
| #endif
 | |
| 	register unsigned long *s;
 | |
| 	register int i,j;
 | |
| 	register unsigned long E0,E1;
 | |
| 
 | |
| 	l=0;
 | |
| 	r=0;
 | |
| 
 | |
| 	s=(unsigned long *)ks;
 | |
| 	E0=Eswap0;
 | |
| 	E1=Eswap1;
 | |
| 
 | |
| 	for (j=0; j<25; j++)
 | |
| 		{
 | |
| 		for (i=0; i<(ITERATIONS*2); i+=4)
 | |
| 			{
 | |
| 			D_ENCRYPT(l,r,  i);	/*  1 */
 | |
| 			D_ENCRYPT(r,l,  i+2);	/*  2 */
 | |
| 			}
 | |
| 		t=l;
 | |
| 		l=r;
 | |
| 		r=t;
 | |
| 		}
 | |
| 	t=r;
 | |
| 	r=(l>>1L)|(l<<31L);
 | |
| 	l=(t>>1L)|(t<<31L);
 | |
| 	/* clear the top bits on machines with 8byte longs */
 | |
| 	l&=0xffffffffL;
 | |
| 	r&=0xffffffffL;
 | |
| 
 | |
| 	PERM_OP(r,l,t, 1,0x55555555L);
 | |
| 	PERM_OP(l,r,t, 8,0x00ff00ffL);
 | |
| 	PERM_OP(r,l,t, 2,0x33333333L);
 | |
| 	PERM_OP(l,r,t,16,0x0000ffffL);
 | |
| 	PERM_OP(r,l,t, 4,0x0f0f0f0fL);
 | |
| 
 | |
| 	*out0=l;
 | |
| 	*out1=r;
 | |
| 	return(0);
 | |
| 	}
 | |
| 
 |