source: EcnlProtoTool/trunk/openssl-1.1.0e/crypto/des/set_key.c

Last change on this file was 331, checked in by coas-nagasima, 6 years ago

prototoolに関連するプロジェクトをnewlibからmuslを使うよう変更・更新
ntshellをnewlibの下位の実装から、muslのsyscallの実装に変更・更新
以下のOSSをアップデート
・mruby-1.3.0
・musl-1.1.18
・onigmo-6.1.3
・tcc-0.9.27
以下のOSSを追加
・openssl-1.1.0e
・curl-7.57.0
・zlib-1.2.11
以下のmrbgemsを追加
・iij/mruby-digest
・iij/mruby-env
・iij/mruby-errno
・iij/mruby-iijson
・iij/mruby-ipaddr
・iij/mruby-mock
・iij/mruby-require
・iij/mruby-tls-openssl

  • Property svn:eol-style set to native
  • Property svn:mime-type set to text/x-csrc
File size: 15.2 KB
Line 
1/*
2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10/*-
11 * set_key.c v 1.4 eay 24/9/91
12 * 1.4 Speed up by 400% :-)
13 * 1.3 added register declarations.
14 * 1.2 unrolled make_key_sched a bit more
15 * 1.1 added norm_expand_bits
16 * 1.0 First working version
17 */
18#include <openssl/crypto.h>
19#include "des_locl.h"
20
21OPENSSL_IMPLEMENT_GLOBAL(int, DES_check_key, 0)
22 /*
23 * defaults to false
24 */
25static const unsigned char odd_parity[256] = {
26 1, 1, 2, 2, 4, 4, 7, 7, 8, 8, 11, 11, 13, 13, 14, 14,
27 16, 16, 19, 19, 21, 21, 22, 22, 25, 25, 26, 26, 28, 28, 31, 31,
28 32, 32, 35, 35, 37, 37, 38, 38, 41, 41, 42, 42, 44, 44, 47, 47,
29 49, 49, 50, 50, 52, 52, 55, 55, 56, 56, 59, 59, 61, 61, 62, 62,
30 64, 64, 67, 67, 69, 69, 70, 70, 73, 73, 74, 74, 76, 76, 79, 79,
31 81, 81, 82, 82, 84, 84, 87, 87, 88, 88, 91, 91, 93, 93, 94, 94,
32 97, 97, 98, 98, 100, 100, 103, 103, 104, 104, 107, 107, 109, 109, 110,
33 110,
34 112, 112, 115, 115, 117, 117, 118, 118, 121, 121, 122, 122, 124, 124, 127,
35 127,
36 128, 128, 131, 131, 133, 133, 134, 134, 137, 137, 138, 138, 140, 140, 143,
37 143,
38 145, 145, 146, 146, 148, 148, 151, 151, 152, 152, 155, 155, 157, 157, 158,
39 158,
40 161, 161, 162, 162, 164, 164, 167, 167, 168, 168, 171, 171, 173, 173, 174,
41 174,
42 176, 176, 179, 179, 181, 181, 182, 182, 185, 185, 186, 186, 188, 188, 191,
43 191,
44 193, 193, 194, 194, 196, 196, 199, 199, 200, 200, 203, 203, 205, 205, 206,
45 206,
46 208, 208, 211, 211, 213, 213, 214, 214, 217, 217, 218, 218, 220, 220, 223,
47 223,
48 224, 224, 227, 227, 229, 229, 230, 230, 233, 233, 234, 234, 236, 236, 239,
49 239,
50 241, 241, 242, 242, 244, 244, 247, 247, 248, 248, 251, 251, 253, 253, 254,
51 254
52};
53
54void DES_set_odd_parity(DES_cblock *key)
55{
56 unsigned int i;
57
58 for (i = 0; i < DES_KEY_SZ; i++)
59 (*key)[i] = odd_parity[(*key)[i]];
60}
61
62int DES_check_key_parity(const_DES_cblock *key)
63{
64 unsigned int i;
65
66 for (i = 0; i < DES_KEY_SZ; i++) {
67 if ((*key)[i] != odd_parity[(*key)[i]])
68 return (0);
69 }
70 return (1);
71}
72
73/*-
74 * Weak and semi weak keys as taken from
75 * %A D.W. Davies
76 * %A W.L. Price
77 * %T Security for Computer Networks
78 * %I John Wiley & Sons
79 * %D 1984
80 * Many thanks to smb@ulysses.att.com (Steven Bellovin) for the reference
81 * (and actual cblock values).
82 */
83#define NUM_WEAK_KEY 16
84static const DES_cblock weak_keys[NUM_WEAK_KEY] = {
85 /* weak keys */
86 {0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01},
87 {0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE, 0xFE},
88 {0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E},
89 {0xE0, 0xE0, 0xE0, 0xE0, 0xF1, 0xF1, 0xF1, 0xF1},
90 /* semi-weak keys */
91 {0x01, 0xFE, 0x01, 0xFE, 0x01, 0xFE, 0x01, 0xFE},
92 {0xFE, 0x01, 0xFE, 0x01, 0xFE, 0x01, 0xFE, 0x01},
93 {0x1F, 0xE0, 0x1F, 0xE0, 0x0E, 0xF1, 0x0E, 0xF1},
94 {0xE0, 0x1F, 0xE0, 0x1F, 0xF1, 0x0E, 0xF1, 0x0E},
95 {0x01, 0xE0, 0x01, 0xE0, 0x01, 0xF1, 0x01, 0xF1},
96 {0xE0, 0x01, 0xE0, 0x01, 0xF1, 0x01, 0xF1, 0x01},
97 {0x1F, 0xFE, 0x1F, 0xFE, 0x0E, 0xFE, 0x0E, 0xFE},
98 {0xFE, 0x1F, 0xFE, 0x1F, 0xFE, 0x0E, 0xFE, 0x0E},
99 {0x01, 0x1F, 0x01, 0x1F, 0x01, 0x0E, 0x01, 0x0E},
100 {0x1F, 0x01, 0x1F, 0x01, 0x0E, 0x01, 0x0E, 0x01},
101 {0xE0, 0xFE, 0xE0, 0xFE, 0xF1, 0xFE, 0xF1, 0xFE},
102 {0xFE, 0xE0, 0xFE, 0xE0, 0xFE, 0xF1, 0xFE, 0xF1}
103};
104
105int DES_is_weak_key(const_DES_cblock *key)
106{
107 int i;
108
109 for (i = 0; i < NUM_WEAK_KEY; i++)
110 /*
111 * Added == 0 to comparison, I obviously don't run this section very
112 * often :-(, thanks to engineering@MorningStar.Com for the fix eay
113 * 93/06/29 Another problem, I was comparing only the first 4 bytes,
114 * 97/03/18
115 */
116 if (memcmp(weak_keys[i], key, sizeof(DES_cblock)) == 0)
117 return (1);
118 return (0);
119}
120
121/*-
122 * NOW DEFINED IN des_local.h
123 * See ecb_encrypt.c for a pseudo description of these macros.
124 * #define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
125 * (b)^=(t),\
126 * (a)=((a)^((t)<<(n))))
127 */
128
129#define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\
130 (a)=(a)^(t)^(t>>(16-(n))))
131
132static const DES_LONG des_skb[8][64] = {
133 {
134 /* for C bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
135 0x00000000L, 0x00000010L, 0x20000000L, 0x20000010L,
136 0x00010000L, 0x00010010L, 0x20010000L, 0x20010010L,
137 0x00000800L, 0x00000810L, 0x20000800L, 0x20000810L,
138 0x00010800L, 0x00010810L, 0x20010800L, 0x20010810L,
139 0x00000020L, 0x00000030L, 0x20000020L, 0x20000030L,
140 0x00010020L, 0x00010030L, 0x20010020L, 0x20010030L,
141 0x00000820L, 0x00000830L, 0x20000820L, 0x20000830L,
142 0x00010820L, 0x00010830L, 0x20010820L, 0x20010830L,
143 0x00080000L, 0x00080010L, 0x20080000L, 0x20080010L,
144 0x00090000L, 0x00090010L, 0x20090000L, 0x20090010L,
145 0x00080800L, 0x00080810L, 0x20080800L, 0x20080810L,
146 0x00090800L, 0x00090810L, 0x20090800L, 0x20090810L,
147 0x00080020L, 0x00080030L, 0x20080020L, 0x20080030L,
148 0x00090020L, 0x00090030L, 0x20090020L, 0x20090030L,
149 0x00080820L, 0x00080830L, 0x20080820L, 0x20080830L,
150 0x00090820L, 0x00090830L, 0x20090820L, 0x20090830L,
151 },
152 {
153 /* for C bits (numbered as per FIPS 46) 7 8 10 11 12 13 */
154 0x00000000L, 0x02000000L, 0x00002000L, 0x02002000L,
155 0x00200000L, 0x02200000L, 0x00202000L, 0x02202000L,
156 0x00000004L, 0x02000004L, 0x00002004L, 0x02002004L,
157 0x00200004L, 0x02200004L, 0x00202004L, 0x02202004L,
158 0x00000400L, 0x02000400L, 0x00002400L, 0x02002400L,
159 0x00200400L, 0x02200400L, 0x00202400L, 0x02202400L,
160 0x00000404L, 0x02000404L, 0x00002404L, 0x02002404L,
161 0x00200404L, 0x02200404L, 0x00202404L, 0x02202404L,
162 0x10000000L, 0x12000000L, 0x10002000L, 0x12002000L,
163 0x10200000L, 0x12200000L, 0x10202000L, 0x12202000L,
164 0x10000004L, 0x12000004L, 0x10002004L, 0x12002004L,
165 0x10200004L, 0x12200004L, 0x10202004L, 0x12202004L,
166 0x10000400L, 0x12000400L, 0x10002400L, 0x12002400L,
167 0x10200400L, 0x12200400L, 0x10202400L, 0x12202400L,
168 0x10000404L, 0x12000404L, 0x10002404L, 0x12002404L,
169 0x10200404L, 0x12200404L, 0x10202404L, 0x12202404L,
170 },
171 {
172 /* for C bits (numbered as per FIPS 46) 14 15 16 17 19 20 */
173 0x00000000L, 0x00000001L, 0x00040000L, 0x00040001L,
174 0x01000000L, 0x01000001L, 0x01040000L, 0x01040001L,
175 0x00000002L, 0x00000003L, 0x00040002L, 0x00040003L,
176 0x01000002L, 0x01000003L, 0x01040002L, 0x01040003L,
177 0x00000200L, 0x00000201L, 0x00040200L, 0x00040201L,
178 0x01000200L, 0x01000201L, 0x01040200L, 0x01040201L,
179 0x00000202L, 0x00000203L, 0x00040202L, 0x00040203L,
180 0x01000202L, 0x01000203L, 0x01040202L, 0x01040203L,
181 0x08000000L, 0x08000001L, 0x08040000L, 0x08040001L,
182 0x09000000L, 0x09000001L, 0x09040000L, 0x09040001L,
183 0x08000002L, 0x08000003L, 0x08040002L, 0x08040003L,
184 0x09000002L, 0x09000003L, 0x09040002L, 0x09040003L,
185 0x08000200L, 0x08000201L, 0x08040200L, 0x08040201L,
186 0x09000200L, 0x09000201L, 0x09040200L, 0x09040201L,
187 0x08000202L, 0x08000203L, 0x08040202L, 0x08040203L,
188 0x09000202L, 0x09000203L, 0x09040202L, 0x09040203L,
189 },
190 {
191 /* for C bits (numbered as per FIPS 46) 21 23 24 26 27 28 */
192 0x00000000L, 0x00100000L, 0x00000100L, 0x00100100L,
193 0x00000008L, 0x00100008L, 0x00000108L, 0x00100108L,
194 0x00001000L, 0x00101000L, 0x00001100L, 0x00101100L,
195 0x00001008L, 0x00101008L, 0x00001108L, 0x00101108L,
196 0x04000000L, 0x04100000L, 0x04000100L, 0x04100100L,
197 0x04000008L, 0x04100008L, 0x04000108L, 0x04100108L,
198 0x04001000L, 0x04101000L, 0x04001100L, 0x04101100L,
199 0x04001008L, 0x04101008L, 0x04001108L, 0x04101108L,
200 0x00020000L, 0x00120000L, 0x00020100L, 0x00120100L,
201 0x00020008L, 0x00120008L, 0x00020108L, 0x00120108L,
202 0x00021000L, 0x00121000L, 0x00021100L, 0x00121100L,
203 0x00021008L, 0x00121008L, 0x00021108L, 0x00121108L,
204 0x04020000L, 0x04120000L, 0x04020100L, 0x04120100L,
205 0x04020008L, 0x04120008L, 0x04020108L, 0x04120108L,
206 0x04021000L, 0x04121000L, 0x04021100L, 0x04121100L,
207 0x04021008L, 0x04121008L, 0x04021108L, 0x04121108L,
208 },
209 {
210 /* for D bits (numbered as per FIPS 46) 1 2 3 4 5 6 */
211 0x00000000L, 0x10000000L, 0x00010000L, 0x10010000L,
212 0x00000004L, 0x10000004L, 0x00010004L, 0x10010004L,
213 0x20000000L, 0x30000000L, 0x20010000L, 0x30010000L,
214 0x20000004L, 0x30000004L, 0x20010004L, 0x30010004L,
215 0x00100000L, 0x10100000L, 0x00110000L, 0x10110000L,
216 0x00100004L, 0x10100004L, 0x00110004L, 0x10110004L,
217 0x20100000L, 0x30100000L, 0x20110000L, 0x30110000L,
218 0x20100004L, 0x30100004L, 0x20110004L, 0x30110004L,
219 0x00001000L, 0x10001000L, 0x00011000L, 0x10011000L,
220 0x00001004L, 0x10001004L, 0x00011004L, 0x10011004L,
221 0x20001000L, 0x30001000L, 0x20011000L, 0x30011000L,
222 0x20001004L, 0x30001004L, 0x20011004L, 0x30011004L,
223 0x00101000L, 0x10101000L, 0x00111000L, 0x10111000L,
224 0x00101004L, 0x10101004L, 0x00111004L, 0x10111004L,
225 0x20101000L, 0x30101000L, 0x20111000L, 0x30111000L,
226 0x20101004L, 0x30101004L, 0x20111004L, 0x30111004L,
227 },
228 {
229 /* for D bits (numbered as per FIPS 46) 8 9 11 12 13 14 */
230 0x00000000L, 0x08000000L, 0x00000008L, 0x08000008L,
231 0x00000400L, 0x08000400L, 0x00000408L, 0x08000408L,
232 0x00020000L, 0x08020000L, 0x00020008L, 0x08020008L,
233 0x00020400L, 0x08020400L, 0x00020408L, 0x08020408L,
234 0x00000001L, 0x08000001L, 0x00000009L, 0x08000009L,
235 0x00000401L, 0x08000401L, 0x00000409L, 0x08000409L,
236 0x00020001L, 0x08020001L, 0x00020009L, 0x08020009L,
237 0x00020401L, 0x08020401L, 0x00020409L, 0x08020409L,
238 0x02000000L, 0x0A000000L, 0x02000008L, 0x0A000008L,
239 0x02000400L, 0x0A000400L, 0x02000408L, 0x0A000408L,
240 0x02020000L, 0x0A020000L, 0x02020008L, 0x0A020008L,
241 0x02020400L, 0x0A020400L, 0x02020408L, 0x0A020408L,
242 0x02000001L, 0x0A000001L, 0x02000009L, 0x0A000009L,
243 0x02000401L, 0x0A000401L, 0x02000409L, 0x0A000409L,
244 0x02020001L, 0x0A020001L, 0x02020009L, 0x0A020009L,
245 0x02020401L, 0x0A020401L, 0x02020409L, 0x0A020409L,
246 },
247 {
248 /* for D bits (numbered as per FIPS 46) 16 17 18 19 20 21 */
249 0x00000000L, 0x00000100L, 0x00080000L, 0x00080100L,
250 0x01000000L, 0x01000100L, 0x01080000L, 0x01080100L,
251 0x00000010L, 0x00000110L, 0x00080010L, 0x00080110L,
252 0x01000010L, 0x01000110L, 0x01080010L, 0x01080110L,
253 0x00200000L, 0x00200100L, 0x00280000L, 0x00280100L,
254 0x01200000L, 0x01200100L, 0x01280000L, 0x01280100L,
255 0x00200010L, 0x00200110L, 0x00280010L, 0x00280110L,
256 0x01200010L, 0x01200110L, 0x01280010L, 0x01280110L,
257 0x00000200L, 0x00000300L, 0x00080200L, 0x00080300L,
258 0x01000200L, 0x01000300L, 0x01080200L, 0x01080300L,
259 0x00000210L, 0x00000310L, 0x00080210L, 0x00080310L,
260 0x01000210L, 0x01000310L, 0x01080210L, 0x01080310L,
261 0x00200200L, 0x00200300L, 0x00280200L, 0x00280300L,
262 0x01200200L, 0x01200300L, 0x01280200L, 0x01280300L,
263 0x00200210L, 0x00200310L, 0x00280210L, 0x00280310L,
264 0x01200210L, 0x01200310L, 0x01280210L, 0x01280310L,
265 },
266 {
267 /* for D bits (numbered as per FIPS 46) 22 23 24 25 27 28 */
268 0x00000000L, 0x04000000L, 0x00040000L, 0x04040000L,
269 0x00000002L, 0x04000002L, 0x00040002L, 0x04040002L,
270 0x00002000L, 0x04002000L, 0x00042000L, 0x04042000L,
271 0x00002002L, 0x04002002L, 0x00042002L, 0x04042002L,
272 0x00000020L, 0x04000020L, 0x00040020L, 0x04040020L,
273 0x00000022L, 0x04000022L, 0x00040022L, 0x04040022L,
274 0x00002020L, 0x04002020L, 0x00042020L, 0x04042020L,
275 0x00002022L, 0x04002022L, 0x00042022L, 0x04042022L,
276 0x00000800L, 0x04000800L, 0x00040800L, 0x04040800L,
277 0x00000802L, 0x04000802L, 0x00040802L, 0x04040802L,
278 0x00002800L, 0x04002800L, 0x00042800L, 0x04042800L,
279 0x00002802L, 0x04002802L, 0x00042802L, 0x04042802L,
280 0x00000820L, 0x04000820L, 0x00040820L, 0x04040820L,
281 0x00000822L, 0x04000822L, 0x00040822L, 0x04040822L,
282 0x00002820L, 0x04002820L, 0x00042820L, 0x04042820L,
283 0x00002822L, 0x04002822L, 0x00042822L, 0x04042822L,
284 }
285};
286
287int DES_set_key(const_DES_cblock *key, DES_key_schedule *schedule)
288{
289 if (DES_check_key) {
290 return DES_set_key_checked(key, schedule);
291 } else {
292 DES_set_key_unchecked(key, schedule);
293 return 0;
294 }
295}
296
297/*-
298 * return 0 if key parity is odd (correct),
299 * return -1 if key parity error,
300 * return -2 if illegal weak key.
301 */
302int DES_set_key_checked(const_DES_cblock *key, DES_key_schedule *schedule)
303{
304 if (!DES_check_key_parity(key))
305 return (-1);
306 if (DES_is_weak_key(key))
307 return (-2);
308 DES_set_key_unchecked(key, schedule);
309 return 0;
310}
311
312void DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule)
313{
314 static const int shifts2[16] =
315 { 0, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0 };
316 register DES_LONG c, d, t, s, t2;
317 register const unsigned char *in;
318 register DES_LONG *k;
319 register int i;
320
321#ifdef OPENBSD_DEV_CRYPTO
322 memcpy(schedule->key, key, sizeof schedule->key);
323 schedule->session = NULL;
324#endif
325 k = &schedule->ks->deslong[0];
326 in = &(*key)[0];
327
328 c2l(in, c);
329 c2l(in, d);
330
331 /*
332 * do PC1 in 47 simple operations :-) Thanks to John Fletcher
333 * (john_fletcher@lccmail.ocf.llnl.gov) for the inspiration. :-)
334 */
335 PERM_OP(d, c, t, 4, 0x0f0f0f0fL);
336 HPERM_OP(c, t, -2, 0xcccc0000L);
337 HPERM_OP(d, t, -2, 0xcccc0000L);
338 PERM_OP(d, c, t, 1, 0x55555555L);
339 PERM_OP(c, d, t, 8, 0x00ff00ffL);
340 PERM_OP(d, c, t, 1, 0x55555555L);
341 d = (((d & 0x000000ffL) << 16L) | (d & 0x0000ff00L) |
342 ((d & 0x00ff0000L) >> 16L) | ((c & 0xf0000000L) >> 4L));
343 c &= 0x0fffffffL;
344
345 for (i = 0; i < ITERATIONS; i++) {
346 if (shifts2[i]) {
347 c = ((c >> 2L) | (c << 26L));
348 d = ((d >> 2L) | (d << 26L));
349 } else {
350 c = ((c >> 1L) | (c << 27L));
351 d = ((d >> 1L) | (d << 27L));
352 }
353 c &= 0x0fffffffL;
354 d &= 0x0fffffffL;
355 /*
356 * could be a few less shifts but I am to lazy at this point in time
357 * to investigate
358 */
359 s = des_skb[0][(c) & 0x3f] |
360 des_skb[1][((c >> 6L) & 0x03) | ((c >> 7L) & 0x3c)] |
361 des_skb[2][((c >> 13L) & 0x0f) | ((c >> 14L) & 0x30)] |
362 des_skb[3][((c >> 20L) & 0x01) | ((c >> 21L) & 0x06) |
363 ((c >> 22L) & 0x38)];
364 t = des_skb[4][(d) & 0x3f] |
365 des_skb[5][((d >> 7L) & 0x03) | ((d >> 8L) & 0x3c)] |
366 des_skb[6][(d >> 15L) & 0x3f] |
367 des_skb[7][((d >> 21L) & 0x0f) | ((d >> 22L) & 0x30)];
368
369 /* table contained 0213 4657 */
370 t2 = ((t << 16L) | (s & 0x0000ffffL)) & 0xffffffffL;
371 *(k++) = ROTATE(t2, 30) & 0xffffffffL;
372
373 t2 = ((s >> 16L) | (t & 0xffff0000L));
374 *(k++) = ROTATE(t2, 26) & 0xffffffffL;
375 }
376}
377
378int DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule)
379{
380 return (DES_set_key(key, schedule));
381}
382
383/*-
384#undef des_fixup_key_parity
385void des_fixup_key_parity(des_cblock *key)
386 {
387 des_set_odd_parity(key);
388 }
389*/
Note: See TracBrowser for help on using the repository browser.