Use mask instead of modulo, since bo->backoff is always power of 2
[dfdiff.git] / sys / crypto / des / des_enc.c
blob49fad89b75ffdd8b4e0b10fc94a17ed7126e7683
1 /* $KAME: kame/kame/sys/crypto/des/des_enc.c,v 1.1 2001/09/10 04:03:58 itojun Exp $ */
2 /* $FreeBSD: src/sys/crypto/des/des_enc.c,v 1.1.2.1 2002/03/26 10:12:24 ume Exp $ */
3 /* $DragonFly: src/sys/crypto/des/des_enc.c,v 1.3 2003/07/26 14:12:24 rob Exp $ */
5 /* crypto/des/des_enc.c */
6 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
7 * All rights reserved.
9 * This package is an SSL implementation written
10 * by Eric Young (eay@cryptsoft.com).
11 * The implementation was written so as to conform with Netscapes SSL.
13 * This library is free for commercial and non-commercial use as long as
14 * the following conditions are aheared to. The following conditions
15 * apply to all code found in this distribution, be it the RC4, RSA,
16 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
17 * included with this distribution is covered by the same copyright terms
18 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
20 * Copyright remains Eric Young's, and as such any Copyright notices in
21 * the code are not to be removed.
22 * If this package is used in a product, Eric Young should be given attribution
23 * as the author of the parts of the library used.
24 * This can be in the form of a textual message at program startup or
25 * in documentation (online or textual) provided with the package.
27 * Redistribution and use in source and binary forms, with or without
28 * modification, are permitted provided that the following conditions
29 * are met:
30 * 1. Redistributions of source code must retain the copyright
31 * notice, this list of conditions and the following disclaimer.
32 * 2. Redistributions in binary form must reproduce the above copyright
33 * notice, this list of conditions and the following disclaimer in the
34 * documentation and/or other materials provided with the distribution.
35 * 3. All advertising materials mentioning features or use of this software
36 * must display the following acknowledgement:
37 * "This product includes cryptographic software written by
38 * Eric Young (eay@cryptsoft.com)"
39 * The word 'cryptographic' can be left out if the rouines from the library
40 * being used are not cryptographic related :-).
41 * 4. If you include any Windows specific code (or a derivative thereof) from
42 * the apps directory (application code) you must include an acknowledgement:
43 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
45 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
46 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
47 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
48 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
49 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
50 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
51 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
53 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
54 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55 * SUCH DAMAGE.
57 * The licence and distribution terms for any publically available version or
58 * derivative of this code cannot be changed. i.e. this code cannot simply be
59 * copied and put under another distribution licence
60 * [including the GNU Public Licence.]
63 #include <sys/types.h>
64 #include <crypto/des/des_locl.h>
66 extern const DES_LONG des_SPtrans[8][64];
68 void des_encrypt1(DES_LONG *data, des_key_schedule ks, int enc)
70 DES_LONG l,r,t,u;
71 #ifdef DES_PTR
72 const unsigned char *des_SP=(const unsigned char *)des_SPtrans;
73 #endif
74 #ifndef DES_UNROLL
75 int i;
76 #endif
77 DES_LONG *s;
79 r=data[0];
80 l=data[1];
82 IP(r,l);
83 /* Things have been modified so that the initial rotate is
84 * done outside the loop. This required the
85 * des_SPtrans values in sp.h to be rotated 1 bit to the right.
86 * One perl script later and things have a 5% speed up on a sparc2.
87 * Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
88 * for pointing this out. */
89 /* clear the top bits on machines with 8byte longs */
90 /* shift left by 2 */
91 r=ROTATE(r,29)&0xffffffffL;
92 l=ROTATE(l,29)&0xffffffffL;
94 s=ks->ks.deslong;
95 /* I don't know if it is worth the effort of loop unrolling the
96 * inner loop */
97 if (enc)
99 #ifdef DES_UNROLL
100 D_ENCRYPT(l,r, 0); /* 1 */
101 D_ENCRYPT(r,l, 2); /* 2 */
102 D_ENCRYPT(l,r, 4); /* 3 */
103 D_ENCRYPT(r,l, 6); /* 4 */
104 D_ENCRYPT(l,r, 8); /* 5 */
105 D_ENCRYPT(r,l,10); /* 6 */
106 D_ENCRYPT(l,r,12); /* 7 */
107 D_ENCRYPT(r,l,14); /* 8 */
108 D_ENCRYPT(l,r,16); /* 9 */
109 D_ENCRYPT(r,l,18); /* 10 */
110 D_ENCRYPT(l,r,20); /* 11 */
111 D_ENCRYPT(r,l,22); /* 12 */
112 D_ENCRYPT(l,r,24); /* 13 */
113 D_ENCRYPT(r,l,26); /* 14 */
114 D_ENCRYPT(l,r,28); /* 15 */
115 D_ENCRYPT(r,l,30); /* 16 */
116 #else
117 for (i=0; i<32; i+=8)
119 D_ENCRYPT(l,r,i+0); /* 1 */
120 D_ENCRYPT(r,l,i+2); /* 2 */
121 D_ENCRYPT(l,r,i+4); /* 3 */
122 D_ENCRYPT(r,l,i+6); /* 4 */
124 #endif
126 else
128 #ifdef DES_UNROLL
129 D_ENCRYPT(l,r,30); /* 16 */
130 D_ENCRYPT(r,l,28); /* 15 */
131 D_ENCRYPT(l,r,26); /* 14 */
132 D_ENCRYPT(r,l,24); /* 13 */
133 D_ENCRYPT(l,r,22); /* 12 */
134 D_ENCRYPT(r,l,20); /* 11 */
135 D_ENCRYPT(l,r,18); /* 10 */
136 D_ENCRYPT(r,l,16); /* 9 */
137 D_ENCRYPT(l,r,14); /* 8 */
138 D_ENCRYPT(r,l,12); /* 7 */
139 D_ENCRYPT(l,r,10); /* 6 */
140 D_ENCRYPT(r,l, 8); /* 5 */
141 D_ENCRYPT(l,r, 6); /* 4 */
142 D_ENCRYPT(r,l, 4); /* 3 */
143 D_ENCRYPT(l,r, 2); /* 2 */
144 D_ENCRYPT(r,l, 0); /* 1 */
145 #else
146 for (i=30; i>0; i-=8)
148 D_ENCRYPT(l,r,i-0); /* 16 */
149 D_ENCRYPT(r,l,i-2); /* 15 */
150 D_ENCRYPT(l,r,i-4); /* 14 */
151 D_ENCRYPT(r,l,i-6); /* 13 */
153 #endif
156 /* rotate and clear the top bits on machines with 8byte longs */
157 l=ROTATE(l,3)&0xffffffffL;
158 r=ROTATE(r,3)&0xffffffffL;
160 FP(r,l);
161 data[0]=l;
162 data[1]=r;
163 l=r=t=u=0;
166 void des_encrypt2(DES_LONG *data, des_key_schedule ks, int enc)
168 DES_LONG l,r,t,u;
169 #ifdef DES_PTR
170 const unsigned char *des_SP=(const unsigned char *)des_SPtrans;
171 #endif
172 #ifndef DES_UNROLL
173 int i;
174 #endif
175 DES_LONG *s;
177 r=data[0];
178 l=data[1];
180 /* Things have been modified so that the initial rotate is
181 * done outside the loop. This required the
182 * des_SPtrans values in sp.h to be rotated 1 bit to the right.
183 * One perl script later and things have a 5% speed up on a sparc2.
184 * Thanks to Richard Outerbridge <71755.204@CompuServe.COM>
185 * for pointing this out. */
186 /* clear the top bits on machines with 8byte longs */
187 r=ROTATE(r,29)&0xffffffffL;
188 l=ROTATE(l,29)&0xffffffffL;
190 s=ks->ks.deslong;
191 /* I don't know if it is worth the effort of loop unrolling the
192 * inner loop */
193 if (enc)
195 #ifdef DES_UNROLL
196 D_ENCRYPT(l,r, 0); /* 1 */
197 D_ENCRYPT(r,l, 2); /* 2 */
198 D_ENCRYPT(l,r, 4); /* 3 */
199 D_ENCRYPT(r,l, 6); /* 4 */
200 D_ENCRYPT(l,r, 8); /* 5 */
201 D_ENCRYPT(r,l,10); /* 6 */
202 D_ENCRYPT(l,r,12); /* 7 */
203 D_ENCRYPT(r,l,14); /* 8 */
204 D_ENCRYPT(l,r,16); /* 9 */
205 D_ENCRYPT(r,l,18); /* 10 */
206 D_ENCRYPT(l,r,20); /* 11 */
207 D_ENCRYPT(r,l,22); /* 12 */
208 D_ENCRYPT(l,r,24); /* 13 */
209 D_ENCRYPT(r,l,26); /* 14 */
210 D_ENCRYPT(l,r,28); /* 15 */
211 D_ENCRYPT(r,l,30); /* 16 */
212 #else
213 for (i=0; i<32; i+=8)
215 D_ENCRYPT(l,r,i+0); /* 1 */
216 D_ENCRYPT(r,l,i+2); /* 2 */
217 D_ENCRYPT(l,r,i+4); /* 3 */
218 D_ENCRYPT(r,l,i+6); /* 4 */
220 #endif
222 else
224 #ifdef DES_UNROLL
225 D_ENCRYPT(l,r,30); /* 16 */
226 D_ENCRYPT(r,l,28); /* 15 */
227 D_ENCRYPT(l,r,26); /* 14 */
228 D_ENCRYPT(r,l,24); /* 13 */
229 D_ENCRYPT(l,r,22); /* 12 */
230 D_ENCRYPT(r,l,20); /* 11 */
231 D_ENCRYPT(l,r,18); /* 10 */
232 D_ENCRYPT(r,l,16); /* 9 */
233 D_ENCRYPT(l,r,14); /* 8 */
234 D_ENCRYPT(r,l,12); /* 7 */
235 D_ENCRYPT(l,r,10); /* 6 */
236 D_ENCRYPT(r,l, 8); /* 5 */
237 D_ENCRYPT(l,r, 6); /* 4 */
238 D_ENCRYPT(r,l, 4); /* 3 */
239 D_ENCRYPT(l,r, 2); /* 2 */
240 D_ENCRYPT(r,l, 0); /* 1 */
241 #else
242 for (i=30; i>0; i-=8)
244 D_ENCRYPT(l,r,i-0); /* 16 */
245 D_ENCRYPT(r,l,i-2); /* 15 */
246 D_ENCRYPT(l,r,i-4); /* 14 */
247 D_ENCRYPT(r,l,i-6); /* 13 */
249 #endif
251 /* rotate and clear the top bits on machines with 8byte longs */
252 data[0]=ROTATE(l,3)&0xffffffffL;
253 data[1]=ROTATE(r,3)&0xffffffffL;
254 l=r=t=u=0;
257 void des_encrypt3(DES_LONG *data, des_key_schedule ks1, des_key_schedule ks2,
258 des_key_schedule ks3)
260 DES_LONG l,r;
262 l=data[0];
263 r=data[1];
264 IP(l,r);
265 data[0]=l;
266 data[1]=r;
267 des_encrypt2((DES_LONG *)data,ks1,DES_ENCRYPT);
268 des_encrypt2((DES_LONG *)data,ks2,DES_DECRYPT);
269 des_encrypt2((DES_LONG *)data,ks3,DES_ENCRYPT);
270 l=data[0];
271 r=data[1];
272 FP(r,l);
273 data[0]=l;
274 data[1]=r;
277 void des_decrypt3(DES_LONG *data, des_key_schedule ks1, des_key_schedule ks2,
278 des_key_schedule ks3)
280 DES_LONG l,r;
282 l=data[0];
283 r=data[1];
284 IP(l,r);
285 data[0]=l;
286 data[1]=r;
287 des_encrypt2((DES_LONG *)data,ks3,DES_DECRYPT);
288 des_encrypt2((DES_LONG *)data,ks2,DES_ENCRYPT);
289 des_encrypt2((DES_LONG *)data,ks1,DES_DECRYPT);
290 l=data[0];
291 r=data[1];
292 FP(r,l);
293 data[0]=l;
294 data[1]=r;