Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 1 | /* |
| 2 | * DES and 3DES-EDE ciphers |
| 3 | * |
| 4 | * Modifications to LibTomCrypt implementation: |
| 5 | * Copyright (c) 2006-2009, Jouni Malinen <j@w1.fi> |
| 6 | * |
Dmitry Shmidt | c5ec7f5 | 2012-03-06 16:33:24 -0800 | [diff] [blame] | 7 | * This software may be distributed under the terms of the BSD license. |
| 8 | * See README for more details. |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 9 | */ |
| 10 | |
| 11 | #include "includes.h" |
| 12 | |
| 13 | #include "common.h" |
| 14 | #include "crypto.h" |
| 15 | #include "des_i.h" |
| 16 | |
| 17 | /* |
| 18 | * This implementation is based on a DES implementation included in |
| 19 | * LibTomCrypt. The version here is modified to fit in wpa_supplicant/hostapd |
| 20 | * coding style. |
| 21 | */ |
| 22 | |
| 23 | /* LibTomCrypt, modular cryptographic library -- Tom St Denis |
| 24 | * |
| 25 | * LibTomCrypt is a library that provides various cryptographic |
| 26 | * algorithms in a highly modular and flexible manner. |
| 27 | * |
| 28 | * The library is free for all purposes without any express |
| 29 | * guarantee it works. |
| 30 | * |
| 31 | * Tom St Denis, tomstdenis@gmail.com, http://libtomcrypt.com |
| 32 | */ |
| 33 | |
| 34 | /** |
| 35 | DES code submitted by Dobes Vandermeer |
| 36 | */ |
| 37 | |
| 38 | #define ROLc(x, y) \ |
| 39 | ((((unsigned long) (x) << (unsigned long) ((y) & 31)) | \ |
| 40 | (((unsigned long) (x) & 0xFFFFFFFFUL) >> \ |
| 41 | (unsigned long) (32 - ((y) & 31)))) & 0xFFFFFFFFUL) |
| 42 | #define RORc(x, y) \ |
| 43 | (((((unsigned long) (x) & 0xFFFFFFFFUL) >> \ |
| 44 | (unsigned long) ((y) & 31)) | \ |
| 45 | ((unsigned long) (x) << (unsigned long) (32 - ((y) & 31)))) & \ |
| 46 | 0xFFFFFFFFUL) |
| 47 | |
| 48 | |
| 49 | static const u32 bytebit[8] = |
| 50 | { |
Dmitry Shmidt | 2933359 | 2017-01-09 12:27:11 -0800 | [diff] [blame] | 51 | 0200, 0100, 040, 020, 010, 04, 02, 01 |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 52 | }; |
| 53 | |
| 54 | static const u32 bigbyte[24] = |
| 55 | { |
| 56 | 0x800000UL, 0x400000UL, 0x200000UL, 0x100000UL, |
| 57 | 0x80000UL, 0x40000UL, 0x20000UL, 0x10000UL, |
| 58 | 0x8000UL, 0x4000UL, 0x2000UL, 0x1000UL, |
| 59 | 0x800UL, 0x400UL, 0x200UL, 0x100UL, |
| 60 | 0x80UL, 0x40UL, 0x20UL, 0x10UL, |
Dmitry Shmidt | 2933359 | 2017-01-09 12:27:11 -0800 | [diff] [blame] | 61 | 0x8UL, 0x4UL, 0x2UL, 0x1L |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 62 | }; |
| 63 | |
| 64 | /* Use the key schedule specific in the standard (ANSI X3.92-1981) */ |
| 65 | |
| 66 | static const u8 pc1[56] = { |
Dmitry Shmidt | 2933359 | 2017-01-09 12:27:11 -0800 | [diff] [blame] | 67 | 56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17, |
| 68 | 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35, |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 69 | 62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21, |
Dmitry Shmidt | 2933359 | 2017-01-09 12:27:11 -0800 | [diff] [blame] | 70 | 13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3 |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 71 | }; |
| 72 | |
| 73 | static const u8 totrot[16] = { |
| 74 | 1, 2, 4, 6, |
Dmitry Shmidt | 2933359 | 2017-01-09 12:27:11 -0800 | [diff] [blame] | 75 | 8, 10, 12, 14, |
| 76 | 15, 17, 19, 21, |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 77 | 23, 25, 27, 28 |
| 78 | }; |
| 79 | |
| 80 | static const u8 pc2[48] = { |
| 81 | 13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9, |
| 82 | 22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1, |
| 83 | 40, 51, 30, 36, 46, 54, 29, 39, 50, 44, 32, 47, |
| 84 | 43, 48, 38, 55, 33, 52, 45, 41, 49, 35, 28, 31 |
| 85 | }; |
| 86 | |
| 87 | |
| 88 | static const u32 SP1[64] = |
| 89 | { |
| 90 | 0x01010400UL, 0x00000000UL, 0x00010000UL, 0x01010404UL, |
| 91 | 0x01010004UL, 0x00010404UL, 0x00000004UL, 0x00010000UL, |
| 92 | 0x00000400UL, 0x01010400UL, 0x01010404UL, 0x00000400UL, |
| 93 | 0x01000404UL, 0x01010004UL, 0x01000000UL, 0x00000004UL, |
| 94 | 0x00000404UL, 0x01000400UL, 0x01000400UL, 0x00010400UL, |
| 95 | 0x00010400UL, 0x01010000UL, 0x01010000UL, 0x01000404UL, |
| 96 | 0x00010004UL, 0x01000004UL, 0x01000004UL, 0x00010004UL, |
| 97 | 0x00000000UL, 0x00000404UL, 0x00010404UL, 0x01000000UL, |
| 98 | 0x00010000UL, 0x01010404UL, 0x00000004UL, 0x01010000UL, |
| 99 | 0x01010400UL, 0x01000000UL, 0x01000000UL, 0x00000400UL, |
| 100 | 0x01010004UL, 0x00010000UL, 0x00010400UL, 0x01000004UL, |
| 101 | 0x00000400UL, 0x00000004UL, 0x01000404UL, 0x00010404UL, |
| 102 | 0x01010404UL, 0x00010004UL, 0x01010000UL, 0x01000404UL, |
| 103 | 0x01000004UL, 0x00000404UL, 0x00010404UL, 0x01010400UL, |
| 104 | 0x00000404UL, 0x01000400UL, 0x01000400UL, 0x00000000UL, |
| 105 | 0x00010004UL, 0x00010400UL, 0x00000000UL, 0x01010004UL |
| 106 | }; |
| 107 | |
| 108 | static const u32 SP2[64] = |
| 109 | { |
| 110 | 0x80108020UL, 0x80008000UL, 0x00008000UL, 0x00108020UL, |
| 111 | 0x00100000UL, 0x00000020UL, 0x80100020UL, 0x80008020UL, |
| 112 | 0x80000020UL, 0x80108020UL, 0x80108000UL, 0x80000000UL, |
| 113 | 0x80008000UL, 0x00100000UL, 0x00000020UL, 0x80100020UL, |
| 114 | 0x00108000UL, 0x00100020UL, 0x80008020UL, 0x00000000UL, |
| 115 | 0x80000000UL, 0x00008000UL, 0x00108020UL, 0x80100000UL, |
| 116 | 0x00100020UL, 0x80000020UL, 0x00000000UL, 0x00108000UL, |
| 117 | 0x00008020UL, 0x80108000UL, 0x80100000UL, 0x00008020UL, |
| 118 | 0x00000000UL, 0x00108020UL, 0x80100020UL, 0x00100000UL, |
| 119 | 0x80008020UL, 0x80100000UL, 0x80108000UL, 0x00008000UL, |
| 120 | 0x80100000UL, 0x80008000UL, 0x00000020UL, 0x80108020UL, |
| 121 | 0x00108020UL, 0x00000020UL, 0x00008000UL, 0x80000000UL, |
| 122 | 0x00008020UL, 0x80108000UL, 0x00100000UL, 0x80000020UL, |
| 123 | 0x00100020UL, 0x80008020UL, 0x80000020UL, 0x00100020UL, |
| 124 | 0x00108000UL, 0x00000000UL, 0x80008000UL, 0x00008020UL, |
| 125 | 0x80000000UL, 0x80100020UL, 0x80108020UL, 0x00108000UL |
| 126 | }; |
| 127 | |
| 128 | static const u32 SP3[64] = |
| 129 | { |
| 130 | 0x00000208UL, 0x08020200UL, 0x00000000UL, 0x08020008UL, |
| 131 | 0x08000200UL, 0x00000000UL, 0x00020208UL, 0x08000200UL, |
| 132 | 0x00020008UL, 0x08000008UL, 0x08000008UL, 0x00020000UL, |
| 133 | 0x08020208UL, 0x00020008UL, 0x08020000UL, 0x00000208UL, |
| 134 | 0x08000000UL, 0x00000008UL, 0x08020200UL, 0x00000200UL, |
| 135 | 0x00020200UL, 0x08020000UL, 0x08020008UL, 0x00020208UL, |
| 136 | 0x08000208UL, 0x00020200UL, 0x00020000UL, 0x08000208UL, |
| 137 | 0x00000008UL, 0x08020208UL, 0x00000200UL, 0x08000000UL, |
| 138 | 0x08020200UL, 0x08000000UL, 0x00020008UL, 0x00000208UL, |
| 139 | 0x00020000UL, 0x08020200UL, 0x08000200UL, 0x00000000UL, |
| 140 | 0x00000200UL, 0x00020008UL, 0x08020208UL, 0x08000200UL, |
| 141 | 0x08000008UL, 0x00000200UL, 0x00000000UL, 0x08020008UL, |
| 142 | 0x08000208UL, 0x00020000UL, 0x08000000UL, 0x08020208UL, |
| 143 | 0x00000008UL, 0x00020208UL, 0x00020200UL, 0x08000008UL, |
| 144 | 0x08020000UL, 0x08000208UL, 0x00000208UL, 0x08020000UL, |
| 145 | 0x00020208UL, 0x00000008UL, 0x08020008UL, 0x00020200UL |
| 146 | }; |
| 147 | |
| 148 | static const u32 SP4[64] = |
| 149 | { |
| 150 | 0x00802001UL, 0x00002081UL, 0x00002081UL, 0x00000080UL, |
| 151 | 0x00802080UL, 0x00800081UL, 0x00800001UL, 0x00002001UL, |
| 152 | 0x00000000UL, 0x00802000UL, 0x00802000UL, 0x00802081UL, |
| 153 | 0x00000081UL, 0x00000000UL, 0x00800080UL, 0x00800001UL, |
| 154 | 0x00000001UL, 0x00002000UL, 0x00800000UL, 0x00802001UL, |
| 155 | 0x00000080UL, 0x00800000UL, 0x00002001UL, 0x00002080UL, |
| 156 | 0x00800081UL, 0x00000001UL, 0x00002080UL, 0x00800080UL, |
| 157 | 0x00002000UL, 0x00802080UL, 0x00802081UL, 0x00000081UL, |
| 158 | 0x00800080UL, 0x00800001UL, 0x00802000UL, 0x00802081UL, |
| 159 | 0x00000081UL, 0x00000000UL, 0x00000000UL, 0x00802000UL, |
| 160 | 0x00002080UL, 0x00800080UL, 0x00800081UL, 0x00000001UL, |
| 161 | 0x00802001UL, 0x00002081UL, 0x00002081UL, 0x00000080UL, |
| 162 | 0x00802081UL, 0x00000081UL, 0x00000001UL, 0x00002000UL, |
| 163 | 0x00800001UL, 0x00002001UL, 0x00802080UL, 0x00800081UL, |
| 164 | 0x00002001UL, 0x00002080UL, 0x00800000UL, 0x00802001UL, |
| 165 | 0x00000080UL, 0x00800000UL, 0x00002000UL, 0x00802080UL |
| 166 | }; |
| 167 | |
| 168 | static const u32 SP5[64] = |
| 169 | { |
| 170 | 0x00000100UL, 0x02080100UL, 0x02080000UL, 0x42000100UL, |
| 171 | 0x00080000UL, 0x00000100UL, 0x40000000UL, 0x02080000UL, |
| 172 | 0x40080100UL, 0x00080000UL, 0x02000100UL, 0x40080100UL, |
| 173 | 0x42000100UL, 0x42080000UL, 0x00080100UL, 0x40000000UL, |
| 174 | 0x02000000UL, 0x40080000UL, 0x40080000UL, 0x00000000UL, |
| 175 | 0x40000100UL, 0x42080100UL, 0x42080100UL, 0x02000100UL, |
| 176 | 0x42080000UL, 0x40000100UL, 0x00000000UL, 0x42000000UL, |
| 177 | 0x02080100UL, 0x02000000UL, 0x42000000UL, 0x00080100UL, |
| 178 | 0x00080000UL, 0x42000100UL, 0x00000100UL, 0x02000000UL, |
| 179 | 0x40000000UL, 0x02080000UL, 0x42000100UL, 0x40080100UL, |
| 180 | 0x02000100UL, 0x40000000UL, 0x42080000UL, 0x02080100UL, |
| 181 | 0x40080100UL, 0x00000100UL, 0x02000000UL, 0x42080000UL, |
| 182 | 0x42080100UL, 0x00080100UL, 0x42000000UL, 0x42080100UL, |
| 183 | 0x02080000UL, 0x00000000UL, 0x40080000UL, 0x42000000UL, |
| 184 | 0x00080100UL, 0x02000100UL, 0x40000100UL, 0x00080000UL, |
| 185 | 0x00000000UL, 0x40080000UL, 0x02080100UL, 0x40000100UL |
| 186 | }; |
| 187 | |
| 188 | static const u32 SP6[64] = |
| 189 | { |
| 190 | 0x20000010UL, 0x20400000UL, 0x00004000UL, 0x20404010UL, |
| 191 | 0x20400000UL, 0x00000010UL, 0x20404010UL, 0x00400000UL, |
| 192 | 0x20004000UL, 0x00404010UL, 0x00400000UL, 0x20000010UL, |
| 193 | 0x00400010UL, 0x20004000UL, 0x20000000UL, 0x00004010UL, |
| 194 | 0x00000000UL, 0x00400010UL, 0x20004010UL, 0x00004000UL, |
| 195 | 0x00404000UL, 0x20004010UL, 0x00000010UL, 0x20400010UL, |
| 196 | 0x20400010UL, 0x00000000UL, 0x00404010UL, 0x20404000UL, |
| 197 | 0x00004010UL, 0x00404000UL, 0x20404000UL, 0x20000000UL, |
| 198 | 0x20004000UL, 0x00000010UL, 0x20400010UL, 0x00404000UL, |
| 199 | 0x20404010UL, 0x00400000UL, 0x00004010UL, 0x20000010UL, |
| 200 | 0x00400000UL, 0x20004000UL, 0x20000000UL, 0x00004010UL, |
| 201 | 0x20000010UL, 0x20404010UL, 0x00404000UL, 0x20400000UL, |
| 202 | 0x00404010UL, 0x20404000UL, 0x00000000UL, 0x20400010UL, |
| 203 | 0x00000010UL, 0x00004000UL, 0x20400000UL, 0x00404010UL, |
| 204 | 0x00004000UL, 0x00400010UL, 0x20004010UL, 0x00000000UL, |
| 205 | 0x20404000UL, 0x20000000UL, 0x00400010UL, 0x20004010UL |
| 206 | }; |
| 207 | |
| 208 | static const u32 SP7[64] = |
| 209 | { |
| 210 | 0x00200000UL, 0x04200002UL, 0x04000802UL, 0x00000000UL, |
| 211 | 0x00000800UL, 0x04000802UL, 0x00200802UL, 0x04200800UL, |
| 212 | 0x04200802UL, 0x00200000UL, 0x00000000UL, 0x04000002UL, |
| 213 | 0x00000002UL, 0x04000000UL, 0x04200002UL, 0x00000802UL, |
| 214 | 0x04000800UL, 0x00200802UL, 0x00200002UL, 0x04000800UL, |
| 215 | 0x04000002UL, 0x04200000UL, 0x04200800UL, 0x00200002UL, |
| 216 | 0x04200000UL, 0x00000800UL, 0x00000802UL, 0x04200802UL, |
| 217 | 0x00200800UL, 0x00000002UL, 0x04000000UL, 0x00200800UL, |
| 218 | 0x04000000UL, 0x00200800UL, 0x00200000UL, 0x04000802UL, |
| 219 | 0x04000802UL, 0x04200002UL, 0x04200002UL, 0x00000002UL, |
| 220 | 0x00200002UL, 0x04000000UL, 0x04000800UL, 0x00200000UL, |
| 221 | 0x04200800UL, 0x00000802UL, 0x00200802UL, 0x04200800UL, |
| 222 | 0x00000802UL, 0x04000002UL, 0x04200802UL, 0x04200000UL, |
| 223 | 0x00200800UL, 0x00000000UL, 0x00000002UL, 0x04200802UL, |
| 224 | 0x00000000UL, 0x00200802UL, 0x04200000UL, 0x00000800UL, |
| 225 | 0x04000002UL, 0x04000800UL, 0x00000800UL, 0x00200002UL |
| 226 | }; |
| 227 | |
| 228 | static const u32 SP8[64] = |
| 229 | { |
| 230 | 0x10001040UL, 0x00001000UL, 0x00040000UL, 0x10041040UL, |
| 231 | 0x10000000UL, 0x10001040UL, 0x00000040UL, 0x10000000UL, |
| 232 | 0x00040040UL, 0x10040000UL, 0x10041040UL, 0x00041000UL, |
| 233 | 0x10041000UL, 0x00041040UL, 0x00001000UL, 0x00000040UL, |
| 234 | 0x10040000UL, 0x10000040UL, 0x10001000UL, 0x00001040UL, |
| 235 | 0x00041000UL, 0x00040040UL, 0x10040040UL, 0x10041000UL, |
| 236 | 0x00001040UL, 0x00000000UL, 0x00000000UL, 0x10040040UL, |
| 237 | 0x10000040UL, 0x10001000UL, 0x00041040UL, 0x00040000UL, |
| 238 | 0x00041040UL, 0x00040000UL, 0x10041000UL, 0x00001000UL, |
| 239 | 0x00000040UL, 0x10040040UL, 0x00001000UL, 0x00041040UL, |
| 240 | 0x10001000UL, 0x00000040UL, 0x10000040UL, 0x10040000UL, |
| 241 | 0x10040040UL, 0x10000000UL, 0x00040000UL, 0x10001040UL, |
| 242 | 0x00000000UL, 0x10041040UL, 0x00040040UL, 0x10000040UL, |
| 243 | 0x10040000UL, 0x10001000UL, 0x10001040UL, 0x00000000UL, |
| 244 | 0x10041040UL, 0x00041000UL, 0x00041000UL, 0x00001040UL, |
| 245 | 0x00001040UL, 0x00040040UL, 0x10000000UL, 0x10041000UL |
| 246 | }; |
| 247 | |
| 248 | |
| 249 | static void cookey(const u32 *raw1, u32 *keyout) |
| 250 | { |
| 251 | u32 *cook; |
| 252 | const u32 *raw0; |
| 253 | u32 dough[32]; |
| 254 | int i; |
| 255 | |
| 256 | cook = dough; |
| 257 | for (i = 0; i < 16; i++, raw1++) { |
| 258 | raw0 = raw1++; |
| 259 | *cook = (*raw0 & 0x00fc0000L) << 6; |
| 260 | *cook |= (*raw0 & 0x00000fc0L) << 10; |
| 261 | *cook |= (*raw1 & 0x00fc0000L) >> 10; |
| 262 | *cook++ |= (*raw1 & 0x00000fc0L) >> 6; |
| 263 | *cook = (*raw0 & 0x0003f000L) << 12; |
| 264 | *cook |= (*raw0 & 0x0000003fL) << 16; |
| 265 | *cook |= (*raw1 & 0x0003f000L) >> 4; |
| 266 | *cook++ |= (*raw1 & 0x0000003fL); |
| 267 | } |
| 268 | |
| 269 | os_memcpy(keyout, dough, sizeof(dough)); |
| 270 | } |
| 271 | |
| 272 | |
| 273 | static void deskey(const u8 *key, int decrypt, u32 *keyout) |
| 274 | { |
| 275 | u32 i, j, l, m, n, kn[32]; |
| 276 | u8 pc1m[56], pcr[56]; |
| 277 | |
| 278 | for (j = 0; j < 56; j++) { |
| 279 | l = (u32) pc1[j]; |
| 280 | m = l & 7; |
| 281 | pc1m[j] = (u8) |
| 282 | ((key[l >> 3U] & bytebit[m]) == bytebit[m] ? 1 : 0); |
| 283 | } |
| 284 | |
| 285 | for (i = 0; i < 16; i++) { |
| 286 | if (decrypt) |
| 287 | m = (15 - i) << 1; |
| 288 | else |
| 289 | m = i << 1; |
| 290 | n = m + 1; |
| 291 | kn[m] = kn[n] = 0L; |
| 292 | for (j = 0; j < 28; j++) { |
| 293 | l = j + (u32) totrot[i]; |
| 294 | if (l < 28) |
| 295 | pcr[j] = pc1m[l]; |
| 296 | else |
| 297 | pcr[j] = pc1m[l - 28]; |
| 298 | } |
| 299 | for (/* j = 28 */; j < 56; j++) { |
| 300 | l = j + (u32) totrot[i]; |
| 301 | if (l < 56) |
| 302 | pcr[j] = pc1m[l]; |
| 303 | else |
| 304 | pcr[j] = pc1m[l - 28]; |
| 305 | } |
| 306 | for (j = 0; j < 24; j++) { |
| 307 | if ((int) pcr[(int) pc2[j]] != 0) |
| 308 | kn[m] |= bigbyte[j]; |
| 309 | if ((int) pcr[(int) pc2[j + 24]] != 0) |
| 310 | kn[n] |= bigbyte[j]; |
| 311 | } |
| 312 | } |
| 313 | |
| 314 | cookey(kn, keyout); |
| 315 | } |
| 316 | |
| 317 | |
| 318 | static void desfunc(u32 *block, const u32 *keys) |
| 319 | { |
| 320 | u32 work, right, leftt; |
| 321 | int cur_round; |
| 322 | |
| 323 | leftt = block[0]; |
| 324 | right = block[1]; |
| 325 | |
| 326 | work = ((leftt >> 4) ^ right) & 0x0f0f0f0fL; |
| 327 | right ^= work; |
| 328 | leftt ^= (work << 4); |
| 329 | |
| 330 | work = ((leftt >> 16) ^ right) & 0x0000ffffL; |
| 331 | right ^= work; |
| 332 | leftt ^= (work << 16); |
| 333 | |
| 334 | work = ((right >> 2) ^ leftt) & 0x33333333L; |
| 335 | leftt ^= work; |
| 336 | right ^= (work << 2); |
| 337 | |
| 338 | work = ((right >> 8) ^ leftt) & 0x00ff00ffL; |
| 339 | leftt ^= work; |
| 340 | right ^= (work << 8); |
| 341 | |
| 342 | right = ROLc(right, 1); |
| 343 | work = (leftt ^ right) & 0xaaaaaaaaL; |
| 344 | |
| 345 | leftt ^= work; |
| 346 | right ^= work; |
| 347 | leftt = ROLc(leftt, 1); |
| 348 | |
| 349 | for (cur_round = 0; cur_round < 8; cur_round++) { |
| 350 | work = RORc(right, 4) ^ *keys++; |
| 351 | leftt ^= SP7[work & 0x3fL] |
| 352 | ^ SP5[(work >> 8) & 0x3fL] |
| 353 | ^ SP3[(work >> 16) & 0x3fL] |
| 354 | ^ SP1[(work >> 24) & 0x3fL]; |
| 355 | work = right ^ *keys++; |
| 356 | leftt ^= SP8[ work & 0x3fL] |
| 357 | ^ SP6[(work >> 8) & 0x3fL] |
| 358 | ^ SP4[(work >> 16) & 0x3fL] |
| 359 | ^ SP2[(work >> 24) & 0x3fL]; |
| 360 | |
| 361 | work = RORc(leftt, 4) ^ *keys++; |
| 362 | right ^= SP7[ work & 0x3fL] |
| 363 | ^ SP5[(work >> 8) & 0x3fL] |
| 364 | ^ SP3[(work >> 16) & 0x3fL] |
| 365 | ^ SP1[(work >> 24) & 0x3fL]; |
| 366 | work = leftt ^ *keys++; |
| 367 | right ^= SP8[ work & 0x3fL] |
| 368 | ^ SP6[(work >> 8) & 0x3fL] |
| 369 | ^ SP4[(work >> 16) & 0x3fL] |
| 370 | ^ SP2[(work >> 24) & 0x3fL]; |
| 371 | } |
| 372 | |
| 373 | right = RORc(right, 1); |
| 374 | work = (leftt ^ right) & 0xaaaaaaaaL; |
| 375 | leftt ^= work; |
| 376 | right ^= work; |
| 377 | leftt = RORc(leftt, 1); |
| 378 | work = ((leftt >> 8) ^ right) & 0x00ff00ffL; |
| 379 | right ^= work; |
| 380 | leftt ^= (work << 8); |
| 381 | /* -- */ |
| 382 | work = ((leftt >> 2) ^ right) & 0x33333333L; |
| 383 | right ^= work; |
| 384 | leftt ^= (work << 2); |
| 385 | work = ((right >> 16) ^ leftt) & 0x0000ffffL; |
| 386 | leftt ^= work; |
| 387 | right ^= (work << 16); |
| 388 | work = ((right >> 4) ^ leftt) & 0x0f0f0f0fL; |
| 389 | leftt ^= work; |
| 390 | right ^= (work << 4); |
| 391 | |
| 392 | block[0] = right; |
| 393 | block[1] = leftt; |
| 394 | } |
| 395 | |
| 396 | |
| 397 | /* wpa_supplicant/hostapd specific wrapper */ |
| 398 | |
Dmitry Shmidt | d2986c2 | 2017-10-23 14:22:09 -0700 | [diff] [blame^] | 399 | int des_encrypt(const u8 *clear, const u8 *key, u8 *cypher) |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 400 | { |
| 401 | u8 pkey[8], next, tmp; |
| 402 | int i; |
| 403 | u32 ek[32], work[2]; |
| 404 | |
| 405 | /* Add parity bits to the key */ |
| 406 | next = 0; |
| 407 | for (i = 0; i < 7; i++) { |
| 408 | tmp = key[i]; |
| 409 | pkey[i] = (tmp >> i) | next | 1; |
| 410 | next = tmp << (7 - i); |
| 411 | } |
| 412 | pkey[i] = next | 1; |
| 413 | |
| 414 | deskey(pkey, 0, ek); |
| 415 | |
| 416 | work[0] = WPA_GET_BE32(clear); |
| 417 | work[1] = WPA_GET_BE32(clear + 4); |
| 418 | desfunc(work, ek); |
| 419 | WPA_PUT_BE32(cypher, work[0]); |
| 420 | WPA_PUT_BE32(cypher + 4, work[1]); |
| 421 | |
| 422 | os_memset(pkey, 0, sizeof(pkey)); |
| 423 | os_memset(ek, 0, sizeof(ek)); |
Dmitry Shmidt | d2986c2 | 2017-10-23 14:22:09 -0700 | [diff] [blame^] | 424 | return 0; |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 425 | } |
| 426 | |
| 427 | |
| 428 | void des_key_setup(const u8 *key, u32 *ek, u32 *dk) |
| 429 | { |
| 430 | deskey(key, 0, ek); |
| 431 | deskey(key, 1, dk); |
| 432 | } |
| 433 | |
| 434 | |
| 435 | void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) |
| 436 | { |
| 437 | u32 work[2]; |
| 438 | work[0] = WPA_GET_BE32(plain); |
| 439 | work[1] = WPA_GET_BE32(plain + 4); |
| 440 | desfunc(work, ek); |
| 441 | WPA_PUT_BE32(crypt, work[0]); |
| 442 | WPA_PUT_BE32(crypt + 4, work[1]); |
| 443 | } |
| 444 | |
| 445 | |
| 446 | void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain) |
| 447 | { |
| 448 | u32 work[2]; |
| 449 | work[0] = WPA_GET_BE32(crypt); |
| 450 | work[1] = WPA_GET_BE32(crypt + 4); |
| 451 | desfunc(work, dk); |
| 452 | WPA_PUT_BE32(plain, work[0]); |
| 453 | WPA_PUT_BE32(plain + 4, work[1]); |
| 454 | } |
| 455 | |
| 456 | |
| 457 | void des3_key_setup(const u8 *key, struct des3_key_s *dkey) |
| 458 | { |
| 459 | deskey(key, 0, dkey->ek[0]); |
| 460 | deskey(key + 8, 1, dkey->ek[1]); |
| 461 | deskey(key + 16, 0, dkey->ek[2]); |
| 462 | |
| 463 | deskey(key, 1, dkey->dk[2]); |
| 464 | deskey(key + 8, 0, dkey->dk[1]); |
| 465 | deskey(key + 16, 1, dkey->dk[0]); |
| 466 | } |
| 467 | |
| 468 | |
| 469 | void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt) |
| 470 | { |
| 471 | u32 work[2]; |
| 472 | |
| 473 | work[0] = WPA_GET_BE32(plain); |
| 474 | work[1] = WPA_GET_BE32(plain + 4); |
| 475 | desfunc(work, key->ek[0]); |
| 476 | desfunc(work, key->ek[1]); |
| 477 | desfunc(work, key->ek[2]); |
| 478 | WPA_PUT_BE32(crypt, work[0]); |
| 479 | WPA_PUT_BE32(crypt + 4, work[1]); |
| 480 | } |
| 481 | |
| 482 | |
| 483 | void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain) |
| 484 | { |
| 485 | u32 work[2]; |
| 486 | |
| 487 | work[0] = WPA_GET_BE32(crypt); |
| 488 | work[1] = WPA_GET_BE32(crypt + 4); |
| 489 | desfunc(work, key->dk[0]); |
| 490 | desfunc(work, key->dk[1]); |
| 491 | desfunc(work, key->dk[2]); |
| 492 | WPA_PUT_BE32(plain, work[0]); |
| 493 | WPA_PUT_BE32(plain + 4, work[1]); |
| 494 | } |