John Sullivan's patches plus more fixes:
[u/mdw/putty] / sshdes.c
CommitLineData
374330e2 1#include <assert.h>
2#include "ssh.h"
3
4/*
5
6DES implementation; 1995 Tatu Ylonen <ylo@cs.hut.fi>
7
8This implementation is derived from libdes-3.06, which is copyright
9(c) 1993 Eric Young, and distributed under the GNU GPL or the ARTISTIC licence
10(at the user's option). The original distribution can be found e.g. from
11ftp://ftp.dsi.unimi.it/pub/security/crypt/libdes/libdes-3.06.tar.gz.
12
13This implementation is distributed under the same terms. See
14libdes-README, libdes-ARTISTIC, and libdes-COPYING for more
15information.
16
17*/
18
19/*
37508af4 20 * $Id: sshdes.c,v 1.2 1999/01/08 13:10:15 simon Exp $
374330e2 21 * $Log: sshdes.c,v $
37508af4 22 * Revision 1.2 1999/01/08 13:10:15 simon
23 * John Sullivan's patches plus more fixes:
24 * - Stop using the identifier `environ' as some platforms make it a macro
25 * - Fix silly error box at end of connection in FWHACK mode
26 * - Fix GPF on maximise-then-restore
27 * - Use SetCapture to allow drag-selecting outside the window
28 * - Correctly update window title when iconic and in win_name_always mode
374330e2 29 *
30 * Revision 1.1.1.1 1996/02/18 21:38:11 ylo
31 * Imported ssh-1.2.13.
32 *
33 * Revision 1.2 1995/07/13 01:22:57 ylo
34 * Added cvs log.
35 *
36 * $Endlog$
37 */
38
39typedef struct
40{
41 word32 key_schedule[32];
42} DESContext;
43
44/* Sets the des key for the context. Initializes the context. The least
45 significant bit of each byte of the key is ignored as parity. */
46static void des_set_key(unsigned char *key, DESContext *ks);
47
48/* Encrypts 32 bits in l,r, and stores the result in output[0] and output[1].
49 Performs encryption if encrypt is non-zero, and decryption if it is zero.
50 The key context must have been initialized previously with des_set_key. */
51static void des_encrypt(word32 l, word32 r, word32 *output, DESContext *ks,
52 int encrypt);
53
54/* Encrypts len bytes from src to dest in CBC modes. Len must be a multiple
55 of 8. iv will be modified at end to a value suitable for continuing
56 encryption. */
57static void des_cbc_encrypt(DESContext *ks, unsigned char *iv, unsigned char *dest,
58 const unsigned char *src, unsigned int len);
59
60/* Decrypts len bytes from src to dest in CBC modes. Len must be a multiple
61 of 8. iv will be modified at end to a value suitable for continuing
62 decryption. */
63static void des_cbc_decrypt(DESContext *ks, unsigned char *iv, unsigned char *dest,
64 const unsigned char *src, unsigned int len);
65
66/* Encrypts in CBC mode using triple-DES. */
67static void des_3cbc_encrypt(DESContext *ks1, unsigned char *iv1,
68 DESContext *ks2, unsigned char *iv2,
69 DESContext *ks3, unsigned char *iv3,
70 unsigned char *dest, const unsigned char *src,
71 unsigned int len);
72
73/* Decrypts in CBC mode using triple-DES. */
74static void des_3cbc_decrypt(DESContext *ks1, unsigned char *iv1,
75 DESContext *ks2, unsigned char *iv2,
76 DESContext *ks3, unsigned char *iv3,
77 unsigned char *dest, const unsigned char *src,
78 unsigned int len);
79
80#define GET_32BIT_LSB_FIRST(cp) \
81 (((unsigned long)(unsigned char)(cp)[0]) | \
82 ((unsigned long)(unsigned char)(cp)[1] << 8) | \
83 ((unsigned long)(unsigned char)(cp)[2] << 16) | \
84 ((unsigned long)(unsigned char)(cp)[3] << 24))
85
86#define PUT_32BIT_LSB_FIRST(cp, value) do { \
87 (cp)[0] = (value); \
88 (cp)[1] = (value) >> 8; \
89 (cp)[2] = (value) >> 16; \
90 (cp)[3] = (value) >> 24; } while (0)
91
92/*
93
94DES implementation; 1995 Tatu Ylonen <ylo@cs.hut.fi>
95
96This implementation is derived from libdes-3.06, which is copyright
97(c) 1993 Eric Young, and distributed under the GNU GPL or the ARTISTIC licence
98(at the user's option). The original distribution can be found e.g. from
99ftp://ftp.dsi.unimi.it/pub/security/crypt/libdes/libdes-3.06.tar.gz.
100
101This implementation is distributed under the same terms. See
102libdes-README, libdes-ARTISTIC, and libdes-COPYING for more
103information.
104
105A description of the DES algorithm can be found in every modern book on
106cryptography and data security, including the following:
107
108 Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1994.
109
110 Jennifer Seberry and Josed Pieprzyk: Cryptography: An Introduction to
111 Computer Security. Prentice-Hall, 1989.
112
113 Man Young Rhee: Cryptography and Secure Data Communications. McGraw-Hill,
114 1994.
115
116*/
117
118/*
37508af4 119 * $Id: sshdes.c,v 1.2 1999/01/08 13:10:15 simon Exp $
374330e2 120 * $Log: sshdes.c,v $
37508af4 121 * Revision 1.2 1999/01/08 13:10:15 simon
122 * John Sullivan's patches plus more fixes:
123 * - Stop using the identifier `environ' as some platforms make it a macro
124 * - Fix silly error box at end of connection in FWHACK mode
125 * - Fix GPF on maximise-then-restore
126 * - Use SetCapture to allow drag-selecting outside the window
127 * - Correctly update window title when iconic and in win_name_always mode
374330e2 128 *
129 * Revision 1.1.1.1 1996/02/18 21:38:11 ylo
130 * Imported ssh-1.2.13.
131 *
132 * Revision 1.2 1995/07/13 01:22:25 ylo
133 * Added cvs log.
134 *
135 * $Endlog$
136 */
137
138/* Table for key generation. This used to be in sk.h. */
139/* Copyright (C) 1993 Eric Young - see README for more details */
140static const word32 des_skb[8][64]={
141/* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
142{ 0x00000000,0x00000010,0x20000000,0x20000010,
1430x00010000,0x00010010,0x20010000,0x20010010,
1440x00000800,0x00000810,0x20000800,0x20000810,
1450x00010800,0x00010810,0x20010800,0x20010810,
1460x00000020,0x00000030,0x20000020,0x20000030,
1470x00010020,0x00010030,0x20010020,0x20010030,
1480x00000820,0x00000830,0x20000820,0x20000830,
1490x00010820,0x00010830,0x20010820,0x20010830,
1500x00080000,0x00080010,0x20080000,0x20080010,
1510x00090000,0x00090010,0x20090000,0x20090010,
1520x00080800,0x00080810,0x20080800,0x20080810,
1530x00090800,0x00090810,0x20090800,0x20090810,
1540x00080020,0x00080030,0x20080020,0x20080030,
1550x00090020,0x00090030,0x20090020,0x20090030,
1560x00080820,0x00080830,0x20080820,0x20080830,
1570x00090820,0x00090830,0x20090820,0x20090830 },
158/* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */
159{ 0x00000000,0x02000000,0x00002000,0x02002000,
1600x00200000,0x02200000,0x00202000,0x02202000,
1610x00000004,0x02000004,0x00002004,0x02002004,
1620x00200004,0x02200004,0x00202004,0x02202004,
1630x00000400,0x02000400,0x00002400,0x02002400,
1640x00200400,0x02200400,0x00202400,0x02202400,
1650x00000404,0x02000404,0x00002404,0x02002404,
1660x00200404,0x02200404,0x00202404,0x02202404,
1670x10000000,0x12000000,0x10002000,0x12002000,
1680x10200000,0x12200000,0x10202000,0x12202000,
1690x10000004,0x12000004,0x10002004,0x12002004,
1700x10200004,0x12200004,0x10202004,0x12202004,
1710x10000400,0x12000400,0x10002400,0x12002400,
1720x10200400,0x12200400,0x10202400,0x12202400,
1730x10000404,0x12000404,0x10002404,0x12002404,
1740x10200404,0x12200404,0x10202404,0x12202404 },
175/* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */
176{ 0x00000000,0x00000001,0x00040000,0x00040001,
1770x01000000,0x01000001,0x01040000,0x01040001,
1780x00000002,0x00000003,0x00040002,0x00040003,
1790x01000002,0x01000003,0x01040002,0x01040003,
1800x00000200,0x00000201,0x00040200,0x00040201,
1810x01000200,0x01000201,0x01040200,0x01040201,
1820x00000202,0x00000203,0x00040202,0x00040203,
1830x01000202,0x01000203,0x01040202,0x01040203,
1840x08000000,0x08000001,0x08040000,0x08040001,
1850x09000000,0x09000001,0x09040000,0x09040001,
1860x08000002,0x08000003,0x08040002,0x08040003,
1870x09000002,0x09000003,0x09040002,0x09040003,
1880x08000200,0x08000201,0x08040200,0x08040201,
1890x09000200,0x09000201,0x09040200,0x09040201,
1900x08000202,0x08000203,0x08040202,0x08040203,
1910x09000202,0x09000203,0x09040202,0x09040203 },
192/* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */
193{ 0x00000000,0x00100000,0x00000100,0x00100100,
1940x00000008,0x00100008,0x00000108,0x00100108,
1950x00001000,0x00101000,0x00001100,0x00101100,
1960x00001008,0x00101008,0x00001108,0x00101108,
1970x04000000,0x04100000,0x04000100,0x04100100,
1980x04000008,0x04100008,0x04000108,0x04100108,
1990x04001000,0x04101000,0x04001100,0x04101100,
2000x04001008,0x04101008,0x04001108,0x04101108,
2010x00020000,0x00120000,0x00020100,0x00120100,
2020x00020008,0x00120008,0x00020108,0x00120108,
2030x00021000,0x00121000,0x00021100,0x00121100,
2040x00021008,0x00121008,0x00021108,0x00121108,
2050x04020000,0x04120000,0x04020100,0x04120100,
2060x04020008,0x04120008,0x04020108,0x04120108,
2070x04021000,0x04121000,0x04021100,0x04121100,
2080x04021008,0x04121008,0x04021108,0x04121108 },
209/* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
210{ 0x00000000,0x10000000,0x00010000,0x10010000,
2110x00000004,0x10000004,0x00010004,0x10010004,
2120x20000000,0x30000000,0x20010000,0x30010000,
2130x20000004,0x30000004,0x20010004,0x30010004,
2140x00100000,0x10100000,0x00110000,0x10110000,
2150x00100004,0x10100004,0x00110004,0x10110004,
2160x20100000,0x30100000,0x20110000,0x30110000,
2170x20100004,0x30100004,0x20110004,0x30110004,
2180x00001000,0x10001000,0x00011000,0x10011000,
2190x00001004,0x10001004,0x00011004,0x10011004,
2200x20001000,0x30001000,0x20011000,0x30011000,
2210x20001004,0x30001004,0x20011004,0x30011004,
2220x00101000,0x10101000,0x00111000,0x10111000,
2230x00101004,0x10101004,0x00111004,0x10111004,
2240x20101000,0x30101000,0x20111000,0x30111000,
2250x20101004,0x30101004,0x20111004,0x30111004 },
226/* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */
227{ 0x00000000,0x08000000,0x00000008,0x08000008,
2280x00000400,0x08000400,0x00000408,0x08000408,
2290x00020000,0x08020000,0x00020008,0x08020008,
2300x00020400,0x08020400,0x00020408,0x08020408,
2310x00000001,0x08000001,0x00000009,0x08000009,
2320x00000401,0x08000401,0x00000409,0x08000409,
2330x00020001,0x08020001,0x00020009,0x08020009,
2340x00020401,0x08020401,0x00020409,0x08020409,
2350x02000000,0x0A000000,0x02000008,0x0A000008,
2360x02000400,0x0A000400,0x02000408,0x0A000408,
2370x02020000,0x0A020000,0x02020008,0x0A020008,
2380x02020400,0x0A020400,0x02020408,0x0A020408,
2390x02000001,0x0A000001,0x02000009,0x0A000009,
2400x02000401,0x0A000401,0x02000409,0x0A000409,
2410x02020001,0x0A020001,0x02020009,0x0A020009,
2420x02020401,0x0A020401,0x02020409,0x0A020409 },
243/* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */
244{ 0x00000000,0x00000100,0x00080000,0x00080100,
2450x01000000,0x01000100,0x01080000,0x01080100,
2460x00000010,0x00000110,0x00080010,0x00080110,
2470x01000010,0x01000110,0x01080010,0x01080110,
2480x00200000,0x00200100,0x00280000,0x00280100,
2490x01200000,0x01200100,0x01280000,0x01280100,
2500x00200010,0x00200110,0x00280010,0x00280110,
2510x01200010,0x01200110,0x01280010,0x01280110,
2520x00000200,0x00000300,0x00080200,0x00080300,
2530x01000200,0x01000300,0x01080200,0x01080300,
2540x00000210,0x00000310,0x00080210,0x00080310,
2550x01000210,0x01000310,0x01080210,0x01080310,
2560x00200200,0x00200300,0x00280200,0x00280300,
2570x01200200,0x01200300,0x01280200,0x01280300,
2580x00200210,0x00200310,0x00280210,0x00280310,
2590x01200210,0x01200310,0x01280210,0x01280310 },
260/* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */
261{ 0x00000000,0x04000000,0x00040000,0x04040000,
2620x00000002,0x04000002,0x00040002,0x04040002,
2630x00002000,0x04002000,0x00042000,0x04042000,
2640x00002002,0x04002002,0x00042002,0x04042002,
2650x00000020,0x04000020,0x00040020,0x04040020,
2660x00000022,0x04000022,0x00040022,0x04040022,
2670x00002020,0x04002020,0x00042020,0x04042020,
2680x00002022,0x04002022,0x00042022,0x04042022,
2690x00000800,0x04000800,0x00040800,0x04040800,
2700x00000802,0x04000802,0x00040802,0x04040802,
2710x00002800,0x04002800,0x00042800,0x04042800,
2720x00002802,0x04002802,0x00042802,0x04042802,
2730x00000820,0x04000820,0x00040820,0x04040820,
2740x00000822,0x04000822,0x00040822,0x04040822,
2750x00002820,0x04002820,0x00042820,0x04042820,
2760x00002822,0x04002822,0x00042822,0x04042822 }
277};
278
279/* Tables used for executing des. This used to be in spr.h. */
280/* Copyright (C) 1993 Eric Young - see README for more details */
281static const word32 des_SPtrans[8][64]={
282/* nibble 0 */
283{ 0x00820200, 0x00020000, 0x80800000, 0x80820200,
2840x00800000, 0x80020200, 0x80020000, 0x80800000,
2850x80020200, 0x00820200, 0x00820000, 0x80000200,
2860x80800200, 0x00800000, 0x00000000, 0x80020000,
2870x00020000, 0x80000000, 0x00800200, 0x00020200,
2880x80820200, 0x00820000, 0x80000200, 0x00800200,
2890x80000000, 0x00000200, 0x00020200, 0x80820000,
2900x00000200, 0x80800200, 0x80820000, 0x00000000,
2910x00000000, 0x80820200, 0x00800200, 0x80020000,
2920x00820200, 0x00020000, 0x80000200, 0x00800200,
2930x80820000, 0x00000200, 0x00020200, 0x80800000,
2940x80020200, 0x80000000, 0x80800000, 0x00820000,
2950x80820200, 0x00020200, 0x00820000, 0x80800200,
2960x00800000, 0x80000200, 0x80020000, 0x00000000,
2970x00020000, 0x00800000, 0x80800200, 0x00820200,
2980x80000000, 0x80820000, 0x00000200, 0x80020200 },
299
300/* nibble 1 */
301{ 0x10042004, 0x00000000, 0x00042000, 0x10040000,
3020x10000004, 0x00002004, 0x10002000, 0x00042000,
3030x00002000, 0x10040004, 0x00000004, 0x10002000,
3040x00040004, 0x10042000, 0x10040000, 0x00000004,
3050x00040000, 0x10002004, 0x10040004, 0x00002000,
3060x00042004, 0x10000000, 0x00000000, 0x00040004,
3070x10002004, 0x00042004, 0x10042000, 0x10000004,
3080x10000000, 0x00040000, 0x00002004, 0x10042004,
3090x00040004, 0x10042000, 0x10002000, 0x00042004,
3100x10042004, 0x00040004, 0x10000004, 0x00000000,
3110x10000000, 0x00002004, 0x00040000, 0x10040004,
3120x00002000, 0x10000000, 0x00042004, 0x10002004,
3130x10042000, 0x00002000, 0x00000000, 0x10000004,
3140x00000004, 0x10042004, 0x00042000, 0x10040000,
3150x10040004, 0x00040000, 0x00002004, 0x10002000,
3160x10002004, 0x00000004, 0x10040000, 0x00042000 },
317
318/* nibble 2 */
319{ 0x41000000, 0x01010040, 0x00000040, 0x41000040,
3200x40010000, 0x01000000, 0x41000040, 0x00010040,
3210x01000040, 0x00010000, 0x01010000, 0x40000000,
3220x41010040, 0x40000040, 0x40000000, 0x41010000,
3230x00000000, 0x40010000, 0x01010040, 0x00000040,
3240x40000040, 0x41010040, 0x00010000, 0x41000000,
3250x41010000, 0x01000040, 0x40010040, 0x01010000,
3260x00010040, 0x00000000, 0x01000000, 0x40010040,
3270x01010040, 0x00000040, 0x40000000, 0x00010000,
3280x40000040, 0x40010000, 0x01010000, 0x41000040,
3290x00000000, 0x01010040, 0x00010040, 0x41010000,
3300x40010000, 0x01000000, 0x41010040, 0x40000000,
3310x40010040, 0x41000000, 0x01000000, 0x41010040,
3320x00010000, 0x01000040, 0x41000040, 0x00010040,
3330x01000040, 0x00000000, 0x41010000, 0x40000040,
3340x41000000, 0x40010040, 0x00000040, 0x01010000 },
335
336/* nibble 3 */
337{ 0x00100402, 0x04000400, 0x00000002, 0x04100402,
3380x00000000, 0x04100000, 0x04000402, 0x00100002,
3390x04100400, 0x04000002, 0x04000000, 0x00000402,
3400x04000002, 0x00100402, 0x00100000, 0x04000000,
3410x04100002, 0x00100400, 0x00000400, 0x00000002,
3420x00100400, 0x04000402, 0x04100000, 0x00000400,
3430x00000402, 0x00000000, 0x00100002, 0x04100400,
3440x04000400, 0x04100002, 0x04100402, 0x00100000,
3450x04100002, 0x00000402, 0x00100000, 0x04000002,
3460x00100400, 0x04000400, 0x00000002, 0x04100000,
3470x04000402, 0x00000000, 0x00000400, 0x00100002,
3480x00000000, 0x04100002, 0x04100400, 0x00000400,
3490x04000000, 0x04100402, 0x00100402, 0x00100000,
3500x04100402, 0x00000002, 0x04000400, 0x00100402,
3510x00100002, 0x00100400, 0x04100000, 0x04000402,
3520x00000402, 0x04000000, 0x04000002, 0x04100400 },
353
354/* nibble 4 */
355{ 0x02000000, 0x00004000, 0x00000100, 0x02004108,
3560x02004008, 0x02000100, 0x00004108, 0x02004000,
3570x00004000, 0x00000008, 0x02000008, 0x00004100,
3580x02000108, 0x02004008, 0x02004100, 0x00000000,
3590x00004100, 0x02000000, 0x00004008, 0x00000108,
3600x02000100, 0x00004108, 0x00000000, 0x02000008,
3610x00000008, 0x02000108, 0x02004108, 0x00004008,
3620x02004000, 0x00000100, 0x00000108, 0x02004100,
3630x02004100, 0x02000108, 0x00004008, 0x02004000,
3640x00004000, 0x00000008, 0x02000008, 0x02000100,
3650x02000000, 0x00004100, 0x02004108, 0x00000000,
3660x00004108, 0x02000000, 0x00000100, 0x00004008,
3670x02000108, 0x00000100, 0x00000000, 0x02004108,
3680x02004008, 0x02004100, 0x00000108, 0x00004000,
3690x00004100, 0x02004008, 0x02000100, 0x00000108,
3700x00000008, 0x00004108, 0x02004000, 0x02000008 },
371
372/* nibble 5 */
373{ 0x20000010, 0x00080010, 0x00000000, 0x20080800,
3740x00080010, 0x00000800, 0x20000810, 0x00080000,
3750x00000810, 0x20080810, 0x00080800, 0x20000000,
3760x20000800, 0x20000010, 0x20080000, 0x00080810,
3770x00080000, 0x20000810, 0x20080010, 0x00000000,
3780x00000800, 0x00000010, 0x20080800, 0x20080010,
3790x20080810, 0x20080000, 0x20000000, 0x00000810,
3800x00000010, 0x00080800, 0x00080810, 0x20000800,
3810x00000810, 0x20000000, 0x20000800, 0x00080810,
3820x20080800, 0x00080010, 0x00000000, 0x20000800,
3830x20000000, 0x00000800, 0x20080010, 0x00080000,
3840x00080010, 0x20080810, 0x00080800, 0x00000010,
3850x20080810, 0x00080800, 0x00080000, 0x20000810,
3860x20000010, 0x20080000, 0x00080810, 0x00000000,
3870x00000800, 0x20000010, 0x20000810, 0x20080800,
3880x20080000, 0x00000810, 0x00000010, 0x20080010 },
389
390/* nibble 6 */
391{ 0x00001000, 0x00000080, 0x00400080, 0x00400001,
3920x00401081, 0x00001001, 0x00001080, 0x00000000,
3930x00400000, 0x00400081, 0x00000081, 0x00401000,
3940x00000001, 0x00401080, 0x00401000, 0x00000081,
3950x00400081, 0x00001000, 0x00001001, 0x00401081,
3960x00000000, 0x00400080, 0x00400001, 0x00001080,
3970x00401001, 0x00001081, 0x00401080, 0x00000001,
3980x00001081, 0x00401001, 0x00000080, 0x00400000,
3990x00001081, 0x00401000, 0x00401001, 0x00000081,
4000x00001000, 0x00000080, 0x00400000, 0x00401001,
4010x00400081, 0x00001081, 0x00001080, 0x00000000,
4020x00000080, 0x00400001, 0x00000001, 0x00400080,
4030x00000000, 0x00400081, 0x00400080, 0x00001080,
4040x00000081, 0x00001000, 0x00401081, 0x00400000,
4050x00401080, 0x00000001, 0x00001001, 0x00401081,
4060x00400001, 0x00401080, 0x00401000, 0x00001001 },
407
408/* nibble 7 */
409{ 0x08200020, 0x08208000, 0x00008020, 0x00000000,
4100x08008000, 0x00200020, 0x08200000, 0x08208020,
4110x00000020, 0x08000000, 0x00208000, 0x00008020,
4120x00208020, 0x08008020, 0x08000020, 0x08200000,
4130x00008000, 0x00208020, 0x00200020, 0x08008000,
4140x08208020, 0x08000020, 0x00000000, 0x00208000,
4150x08000000, 0x00200000, 0x08008020, 0x08200020,
4160x00200000, 0x00008000, 0x08208000, 0x00000020,
4170x00200000, 0x00008000, 0x08000020, 0x08208020,
4180x00008020, 0x08000000, 0x00000000, 0x00208000,
4190x08200020, 0x08008020, 0x08008000, 0x00200020,
4200x08208000, 0x00000020, 0x00200020, 0x08008000,
4210x08208020, 0x00200000, 0x08200000, 0x08000020,
4220x00208000, 0x00008020, 0x08008020, 0x08200000,
4230x00000020, 0x08208000, 0x00208020, 0x00000000,
4240x08000000, 0x08200020, 0x00008000, 0x00208020 }};
425
426/* Some stuff that used to be in des_locl.h. Heavily modified. */
427 /* IP and FP
428 * The problem is more of a geometric problem that random bit fiddling.
429 0 1 2 3 4 5 6 7 62 54 46 38 30 22 14 6
430 8 9 10 11 12 13 14 15 60 52 44 36 28 20 12 4
431 16 17 18 19 20 21 22 23 58 50 42 34 26 18 10 2
432 24 25 26 27 28 29 30 31 to 56 48 40 32 24 16 8 0
433
434 32 33 34 35 36 37 38 39 63 55 47 39 31 23 15 7
435 40 41 42 43 44 45 46 47 61 53 45 37 29 21 13 5
436 48 49 50 51 52 53 54 55 59 51 43 35 27 19 11 3
437 56 57 58 59 60 61 62 63 57 49 41 33 25 17 9 1
438
439 The output has been subject to swaps of the form
440 0 1 -> 3 1 but the odd and even bits have been put into
441 2 3 2 0
442 different words. The main trick is to remember that
443 t=((l>>size)^r)&(mask);
444 r^=t;
445 l^=(t<<size);
446 can be used to swap and move bits between words.
447
448 So l = 0 1 2 3 r = 16 17 18 19
449 4 5 6 7 20 21 22 23
450 8 9 10 11 24 25 26 27
451 12 13 14 15 28 29 30 31
452 becomes (for size == 2 and mask == 0x3333)
453 t = 2^16 3^17 -- -- l = 0 1 16 17 r = 2 3 18 19
454 6^20 7^21 -- -- 4 5 20 21 6 7 22 23
455 10^24 11^25 -- -- 8 9 24 25 10 11 24 25
456 14^28 15^29 -- -- 12 13 28 29 14 15 28 29
457
458 Thanks for hints from Richard Outerbridge - he told me IP&FP
459 could be done in 15 xor, 10 shifts and 5 ands.
460 When I finally started to think of the problem in 2D
461 I first got ~42 operations without xors. When I remembered
462 how to use xors :-) I got it to its final state.
463 */
464#define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
465 (b)^=(t),\
466 (a)^=((t)<<(n)))
467
468#define IP(l,r,t) \
469 PERM_OP(r,l,t, 4,0x0f0f0f0f); \
470 PERM_OP(l,r,t,16,0x0000ffff); \
471 PERM_OP(r,l,t, 2,0x33333333); \
472 PERM_OP(l,r,t, 8,0x00ff00ff); \
473 PERM_OP(r,l,t, 1,0x55555555);
474
475#define FP(l,r,t) \
476 PERM_OP(l,r,t, 1,0x55555555); \
477 PERM_OP(r,l,t, 8,0x00ff00ff); \
478 PERM_OP(l,r,t, 2,0x33333333); \
479 PERM_OP(r,l,t,16,0x0000ffff); \
480 PERM_OP(l,r,t, 4,0x0f0f0f0f);
481
482#define D_ENCRYPT(L,R,S) \
483 u=(R^s[S ]); \
484 t=R^s[S+1]; \
485 t=((t>>4)+(t<<28)); \
486 L^= des_SPtrans[1][(t )&0x3f]| \
487 des_SPtrans[3][(t>> 8)&0x3f]| \
488 des_SPtrans[5][(t>>16)&0x3f]| \
489 des_SPtrans[7][(t>>24)&0x3f]| \
490 des_SPtrans[0][(u )&0x3f]| \
491 des_SPtrans[2][(u>> 8)&0x3f]| \
492 des_SPtrans[4][(u>>16)&0x3f]| \
493 des_SPtrans[6][(u>>24)&0x3f];
494
495/* This part is based on code that used to be in ecb_enc.c. */
496/* Copyright (C) 1993 Eric Young - see README for more details */
497
498static void des_encrypt(word32 l, word32 r, word32 *output, DESContext *ks,
499 int encrypt)
500{
501 register word32 t,u;
502 register int i;
503 register word32 *s;
504
505 s = ks->key_schedule;
506
507 IP(l,r,t);
508 /* Things have been modified so that the initial rotate is
509 * done outside the loop. This required the
510 * des_SPtrans values in sp.h to be rotated 1 bit to the right.
511 * One perl script later and things have a 5% speed up on a sparc2.
512 * Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
513 * for pointing this out. */
514 t=(r<<1)|(r>>31);
515 r=(l<<1)|(l>>31);
516 l=t;
517
518 /* I don't know if it is worth the effort of loop unrolling the
519 * inner loop */
520 if (encrypt)
521 {
522 for (i=0; i<32; i+=4)
523 {
524 D_ENCRYPT(l,r,i+0); /* 1 */
525 D_ENCRYPT(r,l,i+2); /* 2 */
526 }
527 }
528 else
529 {
530 for (i=30; i>0; i-=4)
531 {
532 D_ENCRYPT(l,r,i-0); /* 16 */
533 D_ENCRYPT(r,l,i-2); /* 15 */
534 }
535 }
536 l=(l>>1)|(l<<31);
537 r=(r>>1)|(r<<31);
538
539 FP(r,l,t);
540 output[0]=l;
541 output[1]=r;
542}
543
544/* Code based on set_key.c. */
545/* Copyright (C) 1993 Eric Young - see README for more details */
546
547#define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\
548 (a)=(a)^(t)^(t>>(16-(n))))
549
550static void des_set_key(unsigned char *key, DESContext *ks)
551{
552 register word32 c, d, t, s, shifts;
553 register int i;
554 register word32 *schedule;
555
556 schedule = ks->key_schedule;
557
558 c = GET_32BIT_LSB_FIRST(key);
559 d = GET_32BIT_LSB_FIRST(key + 4);
560
561 /* I now do it in 47 simple operations :-)
562 * Thanks to John Fletcher (john_fletcher@lccmail.ocf.llnl.gov)
563 * for the inspiration. :-) */
564 PERM_OP(d,c,t,4,0x0f0f0f0f);
565 HPERM_OP(c,t,-2,0xcccc0000);
566 HPERM_OP(d,t,-2,0xcccc0000);
567 PERM_OP(d,c,t,1,0x55555555);
568 PERM_OP(c,d,t,8,0x00ff00ff);
569 PERM_OP(d,c,t,1,0x55555555);
570 d = ((d & 0xff) << 16) | (d & 0xff00) |
571 ((d >> 16) & 0xff) | ((c >> 4) & 0xf000000);
572 c&=0x0fffffff;
573
574 shifts = 0x7efc;
575 for (i=0; i < 16; i++)
576 {
577 if (shifts & 1)
578 { c=((c>>2)|(c<<26)); d=((d>>2)|(d<<26)); }
579 else
580 { c=((c>>1)|(c<<27)); d=((d>>1)|(d<<27)); }
581 shifts >>= 1;
582 c&=0x0fffffff;
583 d&=0x0fffffff;
584
585 /* could be a few less shifts but I am to lazy at this
586 * point in time to investigate */
587
588 s = des_skb[0][ (c )&0x3f ] |
589 des_skb[1][((c>> 6)&0x03)|((c>> 7)&0x3c)] |
590 des_skb[2][((c>>13)&0x0f)|((c>>14)&0x30)] |
591 des_skb[3][((c>>20)&0x01)|((c>>21)&0x06)|((c>>22)&0x38)];
592
593 t = des_skb[4][ (d )&0x3f ] |
594 des_skb[5][((d>> 7)&0x03)|((d>> 8)&0x3c)] |
595 des_skb[6][ (d>>15)&0x3f ] |
596 des_skb[7][((d>>21)&0x0f)|((d>>22)&0x30)];
597
598 /* table contained 0213 4657 */
599 *schedule++ = ((t << 16) | (s & 0xffff));
600 s = ((s >> 16) | (t & 0xffff0000));
601 *schedule++ = (s << 4) | (s >> 28);
602 }
603}
604
605static void des_cbc_encrypt(DESContext *ks, unsigned char *iv,
606 unsigned char *dest, const unsigned char *src,
607 unsigned int len)
608{
609 word32 iv0, iv1, out[2];
610 unsigned int i;
611
612 assert((len & 7) == 0);
613
614 iv0 = GET_32BIT_LSB_FIRST(iv);
615 iv1 = GET_32BIT_LSB_FIRST(iv + 4);
616
617 for (i = 0; i < len; i += 8)
618 {
619 iv0 ^= GET_32BIT_LSB_FIRST(src + i);
620 iv1 ^= GET_32BIT_LSB_FIRST(src + i + 4);
621 des_encrypt(iv0, iv1, out, ks, 1);
622 iv0 = out[0];
623 iv1 = out[1];
624 PUT_32BIT_LSB_FIRST(dest + i, iv0);
625 PUT_32BIT_LSB_FIRST(dest + i + 4, iv1);
626 }
627 PUT_32BIT_LSB_FIRST(iv, iv0);
628 PUT_32BIT_LSB_FIRST(iv + 4, iv1);
629}
630
631static void des_cbc_decrypt(DESContext *ks, unsigned char *iv,
632 unsigned char *dest, const unsigned char *src,
633 unsigned int len)
634{
635 word32 iv0, iv1, d0, d1, out[2];
636 unsigned int i;
637
638 assert((len & 7) == 0);
639
640 iv0 = GET_32BIT_LSB_FIRST(iv);
641 iv1 = GET_32BIT_LSB_FIRST(iv + 4);
642
643 for (i = 0; i < len; i += 8)
644 {
645 d0 = GET_32BIT_LSB_FIRST(src + i);
646 d1 = GET_32BIT_LSB_FIRST(src + i + 4);
647 des_encrypt(d0, d1, out, ks, 0);
648 iv0 ^= out[0];
649 iv1 ^= out[1];
650 PUT_32BIT_LSB_FIRST(dest + i, iv0);
651 PUT_32BIT_LSB_FIRST(dest + i + 4, iv1);
652 iv0 = d0;
653 iv1 = d1;
654 }
655 PUT_32BIT_LSB_FIRST(iv, iv0);
656 PUT_32BIT_LSB_FIRST(iv + 4, iv1);
657}
658
659static void des_3cbc_encrypt(DESContext *ks1, unsigned char *iv1,
660 DESContext *ks2, unsigned char *iv2,
661 DESContext *ks3, unsigned char *iv3,
662 unsigned char *dest, const unsigned char *src,
663 unsigned int len)
664{
665 des_cbc_encrypt(ks1, iv1, dest, src, len);
666 des_cbc_decrypt(ks2, iv2, dest, dest, len);
667 des_cbc_encrypt(ks3, iv3, dest, dest, len);
668}
669
670static void des_3cbc_decrypt(DESContext *ks1, unsigned char *iv1,
671 DESContext *ks2, unsigned char *iv2,
672 DESContext *ks3, unsigned char *iv3,
673 unsigned char *dest, const unsigned char *src,
674 unsigned int len)
675{
676 des_cbc_decrypt(ks3, iv3, dest, src, len);
677 des_cbc_encrypt(ks2, iv2, dest, dest, len);
678 des_cbc_decrypt(ks1, iv1, dest, dest, len);
679}
680
681DESContext ekey1, ekey2, ekey3;
682unsigned char eiv1[8], eiv2[8], eiv3[8];
683
684DESContext dkey1, dkey2, dkey3;
685unsigned char div1[8], div2[8], div3[8];
686
687static void des3_sesskey(unsigned char *key) {
688 des_set_key(key, &ekey1);
689 des_set_key(key+8, &ekey2);
690 des_set_key(key+16, &ekey3);
691 memset(eiv1, 0, sizeof(eiv1));
692 memset(eiv2, 0, sizeof(eiv2));
693 memset(eiv3, 0, sizeof(eiv3));
694 des_set_key(key, &dkey1);
695 des_set_key(key+8, &dkey2);
696 des_set_key(key+16, &dkey3);
697 memset(div1, 0, sizeof(div1));
698 memset(div2, 0, sizeof(div2));
699 memset(div3, 0, sizeof(div3));
700}
701
702static void des3_encrypt_blk(unsigned char *blk, int len) {
703 des_3cbc_encrypt(&ekey1, eiv1, &ekey2, eiv2, &ekey3, eiv3, blk, blk, len);
704}
705
706static void des3_decrypt_blk(unsigned char *blk, int len) {
707 des_3cbc_decrypt(&dkey1, div1, &dkey2, div2, &dkey3, div3, blk, blk, len);
708}
709
710struct ssh_cipher ssh_3des = {
711 des3_sesskey,
712 des3_encrypt_blk,
713 des3_decrypt_blk
714};
715
716#ifdef DES_TEST
717
718void des_encrypt_buf(DESContext *ks, unsigned char *out,
719 const unsigned char *in, int encrypt)
720{
721 word32 in0, in1, output[0];
722
723 in0 = GET_32BIT_LSB_FIRST(in);
724 in1 = GET_32BIT_LSB_FIRST(in + 4);
725 des_encrypt(in0, in1, output, ks, encrypt);
726 PUT_32BIT_LSB_FIRST(out, output[0]);
727 PUT_32BIT_LSB_FIRST(out + 4, output[1]);
728}
729
730int main(int ac, char **av)
731{
732 FILE *f;
733 char line[1024], *cp;
734 int i, value;
735 unsigned char key[8], data[8], result[8], output[8];
736 DESContext ks;
737
738 while (fgets(line, sizeof(line), stdin))
739 {
740 for (i = 0; i < 8; i++)
741 {
742 if (sscanf(line + 2 * i, "%02x", &value) != 1)
743 {
744 fprintf(stderr, "1st col, i = %d, line: %s", i, line);
745 exit(1);
746 }
747 key[i] = value;
748 }
749 for (i = 0; i < 8; i++)
750 {
751 if (sscanf(line + 2 * i + 17, "%02x", &value) != 1)
752 {
753 fprintf(stderr, "2nd col, i = %d, line: %s", i, line);
754 exit(1);
755 }
756 data[i] = value;
757 }
758 for (i = 0; i < 8; i++)
759 {
760 if (sscanf(line + 2 * i + 2*17, "%02x", &value) != 1)
761 {
762 fprintf(stderr, "3rd col, i = %d, line: %s", i, line);
763 exit(1);
764 }
765 result[i] = value;
766 }
767 des_set_key(key, &ks);
768 des_encrypt_buf(&ks, output, data, 1);
769 if (memcmp(output, result, 8) != 0)
770 fprintf(stderr, "Encrypt failed: %s", line);
771 des_encrypt_buf(&ks, output, result, 0);
772 if (memcmp(output, data, 8) != 0)
773 fprintf(stderr, "Decrypt failed: %s", line);
774 }
775 exit(0);
776}
777#endif /* DES_TEST */
778