702 lines
25 KiB
C
702 lines
25 KiB
C
/* DES code submitted by Dobes Vandermeer */
|
|
#include "mycrypt.h"
|
|
|
|
#ifdef DES
|
|
|
|
#define EN0 0
|
|
#define DE1 1
|
|
|
|
const struct _cipher_descriptor des_desc =
|
|
{
|
|
"des",
|
|
13,
|
|
8, 8, 8, 16,
|
|
&des_setup,
|
|
&des_ecb_encrypt,
|
|
&des_ecb_decrypt,
|
|
&des_test,
|
|
&des_keysize
|
|
};
|
|
|
|
const struct _cipher_descriptor des3_desc =
|
|
{
|
|
"3des",
|
|
14,
|
|
24, 24, 8, 16,
|
|
&des3_setup,
|
|
&des3_ecb_encrypt,
|
|
&des3_ecb_decrypt,
|
|
&des3_test,
|
|
&des3_keysize
|
|
};
|
|
|
|
static const unsigned long bytebit[8] =
|
|
{
|
|
0200, 0100, 040, 020, 010, 04, 02, 01
|
|
};
|
|
|
|
static const unsigned long bigbyte[24] =
|
|
{
|
|
0x800000UL, 0x400000UL, 0x200000UL, 0x100000UL,
|
|
0x80000UL, 0x40000UL, 0x20000UL, 0x10000UL,
|
|
0x8000UL, 0x4000UL, 0x2000UL, 0x1000UL,
|
|
0x800UL, 0x400UL, 0x200UL, 0x100UL,
|
|
0x80UL, 0x40UL, 0x20UL, 0x10UL,
|
|
0x8UL, 0x4UL, 0x2UL, 0x1L
|
|
};
|
|
|
|
/* Use the key schedule specific in the standard (ANSI X3.92-1981) */
|
|
|
|
static const unsigned char pc1[56] = {
|
|
56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17,
|
|
9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35,
|
|
62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21,
|
|
13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3
|
|
};
|
|
|
|
static const unsigned char totrot[16] = {
|
|
1, 2, 4, 6,
|
|
8, 10, 12, 14,
|
|
15, 17, 19, 21,
|
|
23, 25, 27, 28
|
|
};
|
|
|
|
static const unsigned char pc2[48] = {
|
|
13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9,
|
|
22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1,
|
|
40, 51, 30, 36, 46, 54, 29, 39, 50, 44, 32, 47,
|
|
43, 48, 38, 55, 33, 52, 45, 41, 49, 35, 28, 31
|
|
};
|
|
|
|
|
|
static const unsigned long SP1[64] =
|
|
{
|
|
0x01010400UL, 0x00000000UL, 0x00010000UL, 0x01010404UL,
|
|
0x01010004UL, 0x00010404UL, 0x00000004UL, 0x00010000UL,
|
|
0x00000400UL, 0x01010400UL, 0x01010404UL, 0x00000400UL,
|
|
0x01000404UL, 0x01010004UL, 0x01000000UL, 0x00000004UL,
|
|
0x00000404UL, 0x01000400UL, 0x01000400UL, 0x00010400UL,
|
|
0x00010400UL, 0x01010000UL, 0x01010000UL, 0x01000404UL,
|
|
0x00010004UL, 0x01000004UL, 0x01000004UL, 0x00010004UL,
|
|
0x00000000UL, 0x00000404UL, 0x00010404UL, 0x01000000UL,
|
|
0x00010000UL, 0x01010404UL, 0x00000004UL, 0x01010000UL,
|
|
0x01010400UL, 0x01000000UL, 0x01000000UL, 0x00000400UL,
|
|
0x01010004UL, 0x00010000UL, 0x00010400UL, 0x01000004UL,
|
|
0x00000400UL, 0x00000004UL, 0x01000404UL, 0x00010404UL,
|
|
0x01010404UL, 0x00010004UL, 0x01010000UL, 0x01000404UL,
|
|
0x01000004UL, 0x00000404UL, 0x00010404UL, 0x01010400UL,
|
|
0x00000404UL, 0x01000400UL, 0x01000400UL, 0x00000000UL,
|
|
0x00010004UL, 0x00010400UL, 0x00000000UL, 0x01010004UL
|
|
};
|
|
|
|
static const unsigned long SP2[64] =
|
|
{
|
|
0x80108020UL, 0x80008000UL, 0x00008000UL, 0x00108020UL,
|
|
0x00100000UL, 0x00000020UL, 0x80100020UL, 0x80008020UL,
|
|
0x80000020UL, 0x80108020UL, 0x80108000UL, 0x80000000UL,
|
|
0x80008000UL, 0x00100000UL, 0x00000020UL, 0x80100020UL,
|
|
0x00108000UL, 0x00100020UL, 0x80008020UL, 0x00000000UL,
|
|
0x80000000UL, 0x00008000UL, 0x00108020UL, 0x80100000UL,
|
|
0x00100020UL, 0x80000020UL, 0x00000000UL, 0x00108000UL,
|
|
0x00008020UL, 0x80108000UL, 0x80100000UL, 0x00008020UL,
|
|
0x00000000UL, 0x00108020UL, 0x80100020UL, 0x00100000UL,
|
|
0x80008020UL, 0x80100000UL, 0x80108000UL, 0x00008000UL,
|
|
0x80100000UL, 0x80008000UL, 0x00000020UL, 0x80108020UL,
|
|
0x00108020UL, 0x00000020UL, 0x00008000UL, 0x80000000UL,
|
|
0x00008020UL, 0x80108000UL, 0x00100000UL, 0x80000020UL,
|
|
0x00100020UL, 0x80008020UL, 0x80000020UL, 0x00100020UL,
|
|
0x00108000UL, 0x00000000UL, 0x80008000UL, 0x00008020UL,
|
|
0x80000000UL, 0x80100020UL, 0x80108020UL, 0x00108000UL
|
|
};
|
|
|
|
static const unsigned long SP3[64] =
|
|
{
|
|
0x00000208UL, 0x08020200UL, 0x00000000UL, 0x08020008UL,
|
|
0x08000200UL, 0x00000000UL, 0x00020208UL, 0x08000200UL,
|
|
0x00020008UL, 0x08000008UL, 0x08000008UL, 0x00020000UL,
|
|
0x08020208UL, 0x00020008UL, 0x08020000UL, 0x00000208UL,
|
|
0x08000000UL, 0x00000008UL, 0x08020200UL, 0x00000200UL,
|
|
0x00020200UL, 0x08020000UL, 0x08020008UL, 0x00020208UL,
|
|
0x08000208UL, 0x00020200UL, 0x00020000UL, 0x08000208UL,
|
|
0x00000008UL, 0x08020208UL, 0x00000200UL, 0x08000000UL,
|
|
0x08020200UL, 0x08000000UL, 0x00020008UL, 0x00000208UL,
|
|
0x00020000UL, 0x08020200UL, 0x08000200UL, 0x00000000UL,
|
|
0x00000200UL, 0x00020008UL, 0x08020208UL, 0x08000200UL,
|
|
0x08000008UL, 0x00000200UL, 0x00000000UL, 0x08020008UL,
|
|
0x08000208UL, 0x00020000UL, 0x08000000UL, 0x08020208UL,
|
|
0x00000008UL, 0x00020208UL, 0x00020200UL, 0x08000008UL,
|
|
0x08020000UL, 0x08000208UL, 0x00000208UL, 0x08020000UL,
|
|
0x00020208UL, 0x00000008UL, 0x08020008UL, 0x00020200UL
|
|
};
|
|
|
|
static const unsigned long SP4[64] =
|
|
{
|
|
0x00802001UL, 0x00002081UL, 0x00002081UL, 0x00000080UL,
|
|
0x00802080UL, 0x00800081UL, 0x00800001UL, 0x00002001UL,
|
|
0x00000000UL, 0x00802000UL, 0x00802000UL, 0x00802081UL,
|
|
0x00000081UL, 0x00000000UL, 0x00800080UL, 0x00800001UL,
|
|
0x00000001UL, 0x00002000UL, 0x00800000UL, 0x00802001UL,
|
|
0x00000080UL, 0x00800000UL, 0x00002001UL, 0x00002080UL,
|
|
0x00800081UL, 0x00000001UL, 0x00002080UL, 0x00800080UL,
|
|
0x00002000UL, 0x00802080UL, 0x00802081UL, 0x00000081UL,
|
|
0x00800080UL, 0x00800001UL, 0x00802000UL, 0x00802081UL,
|
|
0x00000081UL, 0x00000000UL, 0x00000000UL, 0x00802000UL,
|
|
0x00002080UL, 0x00800080UL, 0x00800081UL, 0x00000001UL,
|
|
0x00802001UL, 0x00002081UL, 0x00002081UL, 0x00000080UL,
|
|
0x00802081UL, 0x00000081UL, 0x00000001UL, 0x00002000UL,
|
|
0x00800001UL, 0x00002001UL, 0x00802080UL, 0x00800081UL,
|
|
0x00002001UL, 0x00002080UL, 0x00800000UL, 0x00802001UL,
|
|
0x00000080UL, 0x00800000UL, 0x00002000UL, 0x00802080UL
|
|
};
|
|
|
|
static const unsigned long SP5[64] =
|
|
{
|
|
0x00000100UL, 0x02080100UL, 0x02080000UL, 0x42000100UL,
|
|
0x00080000UL, 0x00000100UL, 0x40000000UL, 0x02080000UL,
|
|
0x40080100UL, 0x00080000UL, 0x02000100UL, 0x40080100UL,
|
|
0x42000100UL, 0x42080000UL, 0x00080100UL, 0x40000000UL,
|
|
0x02000000UL, 0x40080000UL, 0x40080000UL, 0x00000000UL,
|
|
0x40000100UL, 0x42080100UL, 0x42080100UL, 0x02000100UL,
|
|
0x42080000UL, 0x40000100UL, 0x00000000UL, 0x42000000UL,
|
|
0x02080100UL, 0x02000000UL, 0x42000000UL, 0x00080100UL,
|
|
0x00080000UL, 0x42000100UL, 0x00000100UL, 0x02000000UL,
|
|
0x40000000UL, 0x02080000UL, 0x42000100UL, 0x40080100UL,
|
|
0x02000100UL, 0x40000000UL, 0x42080000UL, 0x02080100UL,
|
|
0x40080100UL, 0x00000100UL, 0x02000000UL, 0x42080000UL,
|
|
0x42080100UL, 0x00080100UL, 0x42000000UL, 0x42080100UL,
|
|
0x02080000UL, 0x00000000UL, 0x40080000UL, 0x42000000UL,
|
|
0x00080100UL, 0x02000100UL, 0x40000100UL, 0x00080000UL,
|
|
0x00000000UL, 0x40080000UL, 0x02080100UL, 0x40000100UL
|
|
};
|
|
|
|
static const unsigned long SP6[64] =
|
|
{
|
|
0x20000010UL, 0x20400000UL, 0x00004000UL, 0x20404010UL,
|
|
0x20400000UL, 0x00000010UL, 0x20404010UL, 0x00400000UL,
|
|
0x20004000UL, 0x00404010UL, 0x00400000UL, 0x20000010UL,
|
|
0x00400010UL, 0x20004000UL, 0x20000000UL, 0x00004010UL,
|
|
0x00000000UL, 0x00400010UL, 0x20004010UL, 0x00004000UL,
|
|
0x00404000UL, 0x20004010UL, 0x00000010UL, 0x20400010UL,
|
|
0x20400010UL, 0x00000000UL, 0x00404010UL, 0x20404000UL,
|
|
0x00004010UL, 0x00404000UL, 0x20404000UL, 0x20000000UL,
|
|
0x20004000UL, 0x00000010UL, 0x20400010UL, 0x00404000UL,
|
|
0x20404010UL, 0x00400000UL, 0x00004010UL, 0x20000010UL,
|
|
0x00400000UL, 0x20004000UL, 0x20000000UL, 0x00004010UL,
|
|
0x20000010UL, 0x20404010UL, 0x00404000UL, 0x20400000UL,
|
|
0x00404010UL, 0x20404000UL, 0x00000000UL, 0x20400010UL,
|
|
0x00000010UL, 0x00004000UL, 0x20400000UL, 0x00404010UL,
|
|
0x00004000UL, 0x00400010UL, 0x20004010UL, 0x00000000UL,
|
|
0x20404000UL, 0x20000000UL, 0x00400010UL, 0x20004010UL
|
|
};
|
|
|
|
static const unsigned long SP7[64] =
|
|
{
|
|
0x00200000UL, 0x04200002UL, 0x04000802UL, 0x00000000UL,
|
|
0x00000800UL, 0x04000802UL, 0x00200802UL, 0x04200800UL,
|
|
0x04200802UL, 0x00200000UL, 0x00000000UL, 0x04000002UL,
|
|
0x00000002UL, 0x04000000UL, 0x04200002UL, 0x00000802UL,
|
|
0x04000800UL, 0x00200802UL, 0x00200002UL, 0x04000800UL,
|
|
0x04000002UL, 0x04200000UL, 0x04200800UL, 0x00200002UL,
|
|
0x04200000UL, 0x00000800UL, 0x00000802UL, 0x04200802UL,
|
|
0x00200800UL, 0x00000002UL, 0x04000000UL, 0x00200800UL,
|
|
0x04000000UL, 0x00200800UL, 0x00200000UL, 0x04000802UL,
|
|
0x04000802UL, 0x04200002UL, 0x04200002UL, 0x00000002UL,
|
|
0x00200002UL, 0x04000000UL, 0x04000800UL, 0x00200000UL,
|
|
0x04200800UL, 0x00000802UL, 0x00200802UL, 0x04200800UL,
|
|
0x00000802UL, 0x04000002UL, 0x04200802UL, 0x04200000UL,
|
|
0x00200800UL, 0x00000000UL, 0x00000002UL, 0x04200802UL,
|
|
0x00000000UL, 0x00200802UL, 0x04200000UL, 0x00000800UL,
|
|
0x04000002UL, 0x04000800UL, 0x00000800UL, 0x00200002UL
|
|
};
|
|
|
|
static const unsigned long SP8[64] =
|
|
{
|
|
0x10001040UL, 0x00001000UL, 0x00040000UL, 0x10041040UL,
|
|
0x10000000UL, 0x10001040UL, 0x00000040UL, 0x10000000UL,
|
|
0x00040040UL, 0x10040000UL, 0x10041040UL, 0x00041000UL,
|
|
0x10041000UL, 0x00041040UL, 0x00001000UL, 0x00000040UL,
|
|
0x10040000UL, 0x10000040UL, 0x10001000UL, 0x00001040UL,
|
|
0x00041000UL, 0x00040040UL, 0x10040040UL, 0x10041000UL,
|
|
0x00001040UL, 0x00000000UL, 0x00000000UL, 0x10040040UL,
|
|
0x10000040UL, 0x10001000UL, 0x00041040UL, 0x00040000UL,
|
|
0x00041040UL, 0x00040000UL, 0x10041000UL, 0x00001000UL,
|
|
0x00000040UL, 0x10040040UL, 0x00001000UL, 0x00041040UL,
|
|
0x10001000UL, 0x00000040UL, 0x10000040UL, 0x10040000UL,
|
|
0x10040040UL, 0x10000000UL, 0x00040000UL, 0x10001040UL,
|
|
0x00000000UL, 0x10041040UL, 0x00040040UL, 0x10000040UL,
|
|
0x10040000UL, 0x10001000UL, 0x10001040UL, 0x00000000UL,
|
|
0x10041040UL, 0x00041000UL, 0x00041000UL, 0x00001040UL,
|
|
0x00001040UL, 0x00040040UL, 0x10000000UL, 0x10041000UL
|
|
};
|
|
|
|
|
|
static void cookey(const unsigned long *raw1, unsigned long *keyout);
|
|
|
|
#ifdef CLEAN_STACK
|
|
void _deskey(const unsigned char *key, short edf, unsigned long *keyout)
|
|
#else
|
|
void deskey(const unsigned char *key, short edf, unsigned long *keyout)
|
|
#endif
|
|
{
|
|
unsigned long i, j, l, m, n, kn[32];
|
|
unsigned char pc1m[56], pcr[56];
|
|
|
|
for(j=0; j < 56; j++)
|
|
{
|
|
l = (unsigned long)pc1[j];
|
|
m = l & 07;
|
|
pc1m[j] = (unsigned char)((key[l >> 3U] & bytebit[m]) == bytebit[m] ? 1 : 0);
|
|
}
|
|
|
|
for(i=0; i < 16; i++)
|
|
{
|
|
if(edf == DE1) m = (15 - i) << 1;
|
|
else m = i << 1;
|
|
n = m + 1;
|
|
kn[m] = kn[n] = 0L;
|
|
for(j=0; j < 28; j++)
|
|
{
|
|
l = j + (unsigned long)totrot[i];
|
|
if(l < 28) pcr[j] = pc1m[l];
|
|
else pcr[j] = pc1m[l - 28];
|
|
}
|
|
for(/*j = 28*/; j < 56; j++)
|
|
{
|
|
l = j + (unsigned long)totrot[i];
|
|
if(l < 56) pcr[j] = pc1m[l];
|
|
else pcr[j] = pc1m[l - 28];
|
|
}
|
|
for(j=0; j < 24; j++)
|
|
{
|
|
if((int)pcr[(int)pc2[j]] != 0) kn[m] |= bigbyte[j];
|
|
if((int)pcr[(int)pc2[j+24]] != 0) kn[n] |= bigbyte[j];
|
|
}
|
|
}
|
|
|
|
cookey(kn, keyout);
|
|
}
|
|
|
|
#ifdef CLEAN_STACK
|
|
void deskey(const unsigned char *key, short edf, unsigned long *keyout)
|
|
{
|
|
_deskey(key, edf, keyout);
|
|
burn_stack(sizeof(int)*5 + sizeof(unsigned long)*32 + sizeof(unsigned char)*112);
|
|
}
|
|
#endif
|
|
|
|
#ifdef CLEAN_STACK
|
|
static void _cookey(const unsigned long *raw1, unsigned long *keyout)
|
|
#else
|
|
static void cookey(const unsigned long *raw1, unsigned long *keyout)
|
|
#endif
|
|
{
|
|
unsigned long *cook;
|
|
const unsigned long *raw0;
|
|
unsigned long dough[32];
|
|
int i;
|
|
|
|
cook = dough;
|
|
for(i=0; i < 16; i++, raw1++)
|
|
{
|
|
raw0 = raw1++;
|
|
*cook = (*raw0 & 0x00fc0000L) << 6;
|
|
*cook |= (*raw0 & 0x00000fc0L) << 10;
|
|
*cook |= (*raw1 & 0x00fc0000L) >> 10;
|
|
*cook++ |= (*raw1 & 0x00000fc0L) >> 6;
|
|
*cook = (*raw0 & 0x0003f000L) << 12;
|
|
*cook |= (*raw0 & 0x0000003fL) << 16;
|
|
*cook |= (*raw1 & 0x0003f000L) >> 4;
|
|
*cook++ |= (*raw1 & 0x0000003fL);
|
|
}
|
|
|
|
memcpy(keyout, dough, sizeof dough);
|
|
}
|
|
|
|
#ifdef CLEAN_STACK
|
|
static void cookey(const unsigned long *raw1, unsigned long *keyout)
|
|
{
|
|
_cookey(raw1, keyout);
|
|
burn_stack(sizeof(unsigned long *) * 2 + sizeof(unsigned long)*32 + sizeof(int));
|
|
}
|
|
#endif
|
|
|
|
#ifndef CLEAN_STACK
|
|
static void desfunc(unsigned long *block, const unsigned long *keys)
|
|
#else
|
|
static void _desfunc(unsigned long *block, const unsigned long *keys)
|
|
#endif
|
|
{
|
|
unsigned long fval, work, right, leftt;
|
|
int round;
|
|
|
|
leftt = block[0];
|
|
right = block[1];
|
|
|
|
work = ((leftt >> 4) ^ right) & 0x0f0f0f0fL;
|
|
right ^= work;
|
|
leftt ^= (work << 4);
|
|
|
|
work = ((leftt >> 16) ^ right) & 0x0000ffffL;
|
|
right ^= work;
|
|
leftt ^= (work << 16);
|
|
|
|
work = ((right >> 2) ^ leftt) & 0x33333333L;
|
|
leftt ^= work;
|
|
right ^= (work << 2);
|
|
|
|
work = ((right >> 8) ^ leftt) & 0x00ff00ffL;
|
|
leftt ^= work;
|
|
right ^= (work << 8);
|
|
|
|
right = ((right << 1) | ((right >> 31) & 1L)) & 0xFFFFFFFFL;
|
|
work = (leftt ^ right) & 0xaaaaaaaaL;
|
|
|
|
leftt ^= work;
|
|
right ^= work;
|
|
leftt = ((leftt << 1) | ((leftt >> 31) & 1L)) & 0xffffffffL;
|
|
|
|
for( round = 0; round < 8; round++)
|
|
{
|
|
work = ((right << 28) | (right >> 4)) ^ *keys++;
|
|
fval = SP7[ work & 0x3fL]
|
|
| SP5[(work >> 8) & 0x3fL]
|
|
| SP3[(work >> 16) & 0x3fL]
|
|
| SP1[(work >> 24) & 0x3fL];
|
|
work = right ^ *keys++;
|
|
fval |= SP8[ work & 0x3fL]
|
|
| SP6[(work >> 8) & 0x3fL]
|
|
| SP4[(work >> 16) & 0x3fL]
|
|
| SP2[(work >> 24) & 0x3fL];
|
|
leftt ^= fval;
|
|
|
|
work = ((leftt << 28) | (leftt >> 4)) ^ *keys++;
|
|
fval = SP7[ work & 0x3fL]
|
|
| SP5[(work >> 8) & 0x3fL]
|
|
| SP3[(work >> 16) & 0x3fL]
|
|
| SP1[(work >> 24) & 0x3fL];
|
|
work = leftt ^ *keys++;
|
|
fval |= SP8[ work & 0x3fL]
|
|
| SP6[(work >> 8) & 0x3fL]
|
|
| SP4[(work >> 16) & 0x3fL]
|
|
| SP2[(work >> 24) & 0x3fL];
|
|
right ^= fval;
|
|
}
|
|
right = (right << 31) | (right >> 1);
|
|
work = (leftt ^ right) & 0xaaaaaaaaL;
|
|
leftt ^= work;
|
|
right ^= work;
|
|
leftt = (leftt << 31) | (leftt >> 1);
|
|
work = ((leftt >> 8) ^ right) & 0x00ff00ffL;
|
|
right ^= work;
|
|
leftt ^= (work << 8);
|
|
// --
|
|
work = ((leftt >> 2) ^ right) & 0x33333333L;
|
|
right ^= work;
|
|
leftt ^= (work << 2);
|
|
work = ((right >> 16) ^ leftt) & 0x0000ffffL;
|
|
leftt ^= work;
|
|
right ^= (work << 16);
|
|
work = ((right >> 4) ^ leftt) & 0x0f0f0f0fL;
|
|
leftt ^= work;
|
|
right ^= (work << 4);
|
|
|
|
block[0] = right;
|
|
block[1] = leftt;
|
|
}
|
|
|
|
#ifdef CLEAN_STACK
|
|
static void desfunc(unsigned long *block, const unsigned long *keys)
|
|
{
|
|
_desfunc(block, keys);
|
|
burn_stack(sizeof(unsigned long) * 4 + sizeof(int));
|
|
}
|
|
#endif
|
|
|
|
|
|
int des_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
|
|
{
|
|
_ARGCHK(key != NULL);
|
|
_ARGCHK(skey != NULL);
|
|
|
|
if (num_rounds != 0 && num_rounds != 16) {
|
|
return CRYPT_INVALID_ROUNDS;
|
|
}
|
|
|
|
if (keylen != 8) {
|
|
return CRYPT_INVALID_KEYSIZE;
|
|
}
|
|
|
|
deskey(key, EN0, skey->des.ek);
|
|
deskey(key, DE1, skey->des.dk);
|
|
|
|
return CRYPT_OK;
|
|
}
|
|
|
|
int des3_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
|
|
{
|
|
_ARGCHK(key != NULL);
|
|
_ARGCHK(skey != NULL);
|
|
|
|
if( num_rounds != 0 && num_rounds != 16) {
|
|
return CRYPT_INVALID_ROUNDS;
|
|
}
|
|
|
|
if (keylen != 24) {
|
|
return CRYPT_INVALID_KEYSIZE;
|
|
}
|
|
|
|
deskey(key, EN0, skey->des3.ek[0]);
|
|
deskey(key+8, DE1, skey->des3.ek[1]);
|
|
deskey(key+16, EN0, skey->des3.ek[2]);
|
|
|
|
deskey(key, DE1, skey->des3.dk[2]);
|
|
deskey(key+8, EN0, skey->des3.dk[1]);
|
|
deskey(key+16, DE1, skey->des3.dk[0]);
|
|
|
|
return CRYPT_OK;
|
|
}
|
|
|
|
void des_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *key)
|
|
{
|
|
unsigned long work[2];
|
|
_ARGCHK(pt != NULL);
|
|
_ARGCHK(ct != NULL);
|
|
_ARGCHK(key != NULL);
|
|
LOAD32H(work[0], pt+0);
|
|
LOAD32H(work[1], pt+4);
|
|
desfunc(work, key->des.ek);
|
|
STORE32H(work[0],ct+0);
|
|
STORE32H(work[1],ct+4);
|
|
}
|
|
|
|
void des_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *key)
|
|
{
|
|
unsigned long work[2];
|
|
_ARGCHK(pt != NULL);
|
|
_ARGCHK(ct != NULL);
|
|
_ARGCHK(key != NULL);
|
|
LOAD32H(work[0], ct+0);
|
|
LOAD32H(work[1], ct+4);
|
|
desfunc(work, key->des.dk);
|
|
STORE32H(work[0],pt+0);
|
|
STORE32H(work[1],pt+4);
|
|
}
|
|
|
|
void des3_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *key)
|
|
{
|
|
unsigned long work[2];
|
|
_ARGCHK(pt != NULL);
|
|
_ARGCHK(ct != NULL);
|
|
_ARGCHK(key != NULL);
|
|
LOAD32H(work[0], pt+0);
|
|
LOAD32H(work[1], pt+4);
|
|
desfunc(work, key->des3.ek[0]);
|
|
desfunc(work, key->des3.ek[1]);
|
|
desfunc(work, key->des3.ek[2]);
|
|
STORE32H(work[0],ct+0);
|
|
STORE32H(work[1],ct+4);
|
|
}
|
|
|
|
void des3_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *key)
|
|
{
|
|
unsigned long work[2];
|
|
_ARGCHK(pt != NULL);
|
|
_ARGCHK(ct != NULL);
|
|
_ARGCHK(key != NULL);
|
|
LOAD32H(work[0], ct+0);
|
|
LOAD32H(work[1], ct+4);
|
|
desfunc(work, key->des3.dk[0]);
|
|
desfunc(work, key->des3.dk[1]);
|
|
desfunc(work, key->des3.dk[2]);
|
|
STORE32H(work[0],pt+0);
|
|
STORE32H(work[1],pt+4);
|
|
}
|
|
|
|
int des_test(void)
|
|
{
|
|
int err;
|
|
static const struct des_test_case {
|
|
int num, mode; // mode 1 = encrypt
|
|
unsigned char key[8], txt[8], out[8];
|
|
} cases[] = {
|
|
{ 1, 1, { 0x10, 0x31, 0x6E, 0x02, 0x8C, 0x8F, 0x3B, 0x4A },
|
|
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x82, 0xDC, 0xBA, 0xFB, 0xDE, 0xAB, 0x66, 0x02 } },
|
|
{ 2, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x95, 0xF8, 0xA5, 0xE5, 0xDD, 0x31, 0xD9, 0x00 },
|
|
{ 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 3, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0xDD, 0x7F, 0x12, 0x1C, 0xA5, 0x01, 0x56, 0x19 },
|
|
{ 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 4, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x2E, 0x86, 0x53, 0x10, 0x4F, 0x38, 0x34, 0xEA },
|
|
{ 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 5, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x4B, 0xD3, 0x88, 0xFF, 0x6C, 0xD8, 0x1D, 0x4F },
|
|
{ 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 6, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x20, 0xB9, 0xE7, 0x67, 0xB2, 0xFB, 0x14, 0x56 },
|
|
{ 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 7, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x55, 0x57, 0x93, 0x80, 0xD7, 0x71, 0x38, 0xEF },
|
|
{ 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 8, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x6C, 0xC5, 0xDE, 0xFA, 0xAF, 0x04, 0x51, 0x2F },
|
|
{ 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 9, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x0D, 0x9F, 0x27, 0x9B, 0xA5, 0xD8, 0x72, 0x60 },
|
|
{ 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{10, 1, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0xD9, 0x03, 0x1B, 0x02, 0x71, 0xBD, 0x5A, 0x0A },
|
|
{ 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
|
|
{ 1, 0, { 0x10, 0x31, 0x6E, 0x02, 0x8C, 0x8F, 0x3B, 0x4A },
|
|
{ 0x82, 0xDC, 0xBA, 0xFB, 0xDE, 0xAB, 0x66, 0x02 },
|
|
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } },
|
|
{ 2, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x95, 0xF8, 0xA5, 0xE5, 0xDD, 0x31, 0xD9, 0x00 } },
|
|
{ 3, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0xDD, 0x7F, 0x12, 0x1C, 0xA5, 0x01, 0x56, 0x19 } },
|
|
{ 4, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x2E, 0x86, 0x53, 0x10, 0x4F, 0x38, 0x34, 0xEA } },
|
|
{ 5, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x4B, 0xD3, 0x88, 0xFF, 0x6C, 0xD8, 0x1D, 0x4F } },
|
|
{ 6, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x20, 0xB9, 0xE7, 0x67, 0xB2, 0xFB, 0x14, 0x56 } },
|
|
{ 7, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x55, 0x57, 0x93, 0x80, 0xD7, 0x71, 0x38, 0xEF } },
|
|
{ 8, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x6C, 0xC5, 0xDE, 0xFA, 0xAF, 0x04, 0x51, 0x2F } },
|
|
{ 9, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0x0D, 0x9F, 0x27, 0x9B, 0xA5, 0xD8, 0x72, 0x60 } },
|
|
{10, 0, { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
|
|
{ 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
{ 0xD9, 0x03, 0x1B, 0x02, 0x71, 0xBD, 0x5A, 0x0A } }
|
|
|
|
/*** more test cases you could add if you are not convinced (the above test cases aren't really too good):
|
|
|
|
key plaintext ciphertext
|
|
0000000000000000 0000000000000000 8CA64DE9C1B123A7
|
|
FFFFFFFFFFFFFFFF FFFFFFFFFFFFFFFF 7359B2163E4EDC58
|
|
3000000000000000 1000000000000001 958E6E627A05557B
|
|
1111111111111111 1111111111111111 F40379AB9E0EC533
|
|
0123456789ABCDEF 1111111111111111 17668DFC7292532D
|
|
1111111111111111 0123456789ABCDEF 8A5AE1F81AB8F2DD
|
|
0000000000000000 0000000000000000 8CA64DE9C1B123A7
|
|
FEDCBA9876543210 0123456789ABCDEF ED39D950FA74BCC4
|
|
7CA110454A1A6E57 01A1D6D039776742 690F5B0D9A26939B
|
|
0131D9619DC1376E 5CD54CA83DEF57DA 7A389D10354BD271
|
|
07A1133E4A0B2686 0248D43806F67172 868EBB51CAB4599A
|
|
3849674C2602319E 51454B582DDF440A 7178876E01F19B2A
|
|
04B915BA43FEB5B6 42FD443059577FA2 AF37FB421F8C4095
|
|
0113B970FD34F2CE 059B5E0851CF143A 86A560F10EC6D85B
|
|
0170F175468FB5E6 0756D8E0774761D2 0CD3DA020021DC09
|
|
43297FAD38E373FE 762514B829BF486A EA676B2CB7DB2B7A
|
|
07A7137045DA2A16 3BDD119049372802 DFD64A815CAF1A0F
|
|
04689104C2FD3B2F 26955F6835AF609A 5C513C9C4886C088
|
|
37D06BB516CB7546 164D5E404F275232 0A2AEEAE3FF4AB77
|
|
1F08260D1AC2465E 6B056E18759F5CCA EF1BF03E5DFA575A
|
|
584023641ABA6176 004BD6EF09176062 88BF0DB6D70DEE56
|
|
025816164629B007 480D39006EE762F2 A1F9915541020B56
|
|
49793EBC79B3258F 437540C8698F3CFA 6FBF1CAFCFFD0556
|
|
4FB05E1515AB73A7 072D43A077075292 2F22E49BAB7CA1AC
|
|
49E95D6D4CA229BF 02FE55778117F12A 5A6B612CC26CCE4A
|
|
018310DC409B26D6 1D9D5C5018F728C2 5F4C038ED12B2E41
|
|
1C587F1C13924FEF 305532286D6F295A 63FAC0D034D9F793
|
|
0101010101010101 0123456789ABCDEF 617B3A0CE8F07100
|
|
1F1F1F1F0E0E0E0E 0123456789ABCDEF DB958605F8C8C606
|
|
E0FEE0FEF1FEF1FE 0123456789ABCDEF EDBFD1C66C29CCC7
|
|
0000000000000000 FFFFFFFFFFFFFFFF 355550B2150E2451
|
|
FFFFFFFFFFFFFFFF 0000000000000000 CAAAAF4DEAF1DBAE
|
|
0123456789ABCDEF 0000000000000000 D5D44FF720683D0D
|
|
FEDCBA9876543210 FFFFFFFFFFFFFFFF 2A2BB008DF97C2F2
|
|
|
|
http://www.ecs.soton.ac.uk/~prw99r/ez438/vectors.txt
|
|
***/
|
|
};
|
|
int i;
|
|
unsigned char out[8];
|
|
symmetric_key des;
|
|
|
|
for(i=0; i < (int)(sizeof(cases)/sizeof(cases[0])); i++)
|
|
{
|
|
if ((err = des_setup(cases[i].key, 8, 0, &des)) != CRYPT_OK) {
|
|
return err;
|
|
}
|
|
if (cases[i].mode != 0) {
|
|
des_ecb_encrypt(cases[i].txt, out, &des);
|
|
} else {
|
|
des_ecb_decrypt(cases[i].txt, out, &des);
|
|
}
|
|
|
|
if (memcmp(cases[i].out, out, sizeof out) != 0) {
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
}
|
|
}
|
|
|
|
return CRYPT_OK;
|
|
}
|
|
|
|
int des3_test(void)
|
|
{
|
|
unsigned char key[24], pt[8], ct[8], tmp[8];
|
|
symmetric_key skey;
|
|
int x, err;
|
|
|
|
if ((err = des_test()) != CRYPT_OK) {
|
|
return err;
|
|
}
|
|
|
|
for (x = 0; x < 8; x++) {
|
|
pt[x] = x;
|
|
}
|
|
|
|
for (x = 0; x < 24; x++) {
|
|
key[x] = x;
|
|
}
|
|
|
|
if ((err = des3_setup(key, 24, 0, &skey)) != CRYPT_OK) {
|
|
return err;
|
|
}
|
|
|
|
des3_ecb_encrypt(pt, ct, &skey);
|
|
des3_ecb_decrypt(ct, tmp, &skey);
|
|
|
|
if (memcmp(pt, tmp, 8) != 0) {
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
}
|
|
|
|
return CRYPT_OK;
|
|
}
|
|
|
|
int des_keysize(int *desired_keysize)
|
|
{
|
|
_ARGCHK(desired_keysize != NULL);
|
|
if(*desired_keysize < 8) {
|
|
return CRYPT_INVALID_KEYSIZE;
|
|
}
|
|
*desired_keysize = 8;
|
|
return CRYPT_OK;
|
|
}
|
|
|
|
int des3_keysize(int *desired_keysize)
|
|
{
|
|
_ARGCHK(desired_keysize != NULL);
|
|
if(*desired_keysize < 24) {
|
|
return CRYPT_INVALID_KEYSIZE;
|
|
}
|
|
*desired_keysize = 24;
|
|
return CRYPT_OK;
|
|
}
|
|
|
|
#endif
|
|
|