Coverage Report

Created: 2023-02-22 06:14

/src/nettle-with-libgmp/des.c
Line
Count
Source (jump to first uncovered line)
1
/* des.c
2
3
   The des block cipher.
4
5
   Copyright (C) 2001, 2010 Niels Möller
6
   Copyright (C) 1992  Dana L. How
7
8
   This file is part of GNU Nettle.
9
10
   GNU Nettle is free software: you can redistribute it and/or
11
   modify it under the terms of either:
12
13
     * the GNU Lesser General Public License as published by the Free
14
       Software Foundation; either version 3 of the License, or (at your
15
       option) any later version.
16
17
   or
18
19
     * the GNU General Public License as published by the Free
20
       Software Foundation; either version 2 of the License, or (at your
21
       option) any later version.
22
23
   or both in parallel, as here.
24
25
   GNU Nettle is distributed in the hope that it will be useful,
26
   but WITHOUT ANY WARRANTY; without even the implied warranty of
27
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
28
   General Public License for more details.
29
30
   You should have received copies of the GNU General Public License and
31
   the GNU Lesser General Public License along with this program.  If
32
   not, see http://www.gnu.org/licenses/.
33
*/
34
35
/*  des - fast & portable DES encryption & decryption.
36
 *  Copyright (C) 1992  Dana L. How
37
 *  Please see the file `descore.README' for the complete copyright notice.
38
 */
39
40
#if HAVE_CONFIG_H
41
# include "config.h"
42
#endif
43
44
#include <assert.h>
45
46
#include "des.h"
47
48
#include "desCode.h"
49
50
/* various tables */
51
52
static const uint32_t
53
des_keymap[] = {
54
#include  "keymap.h"
55
};
56
57
static const uint8_t
58
rotors[] = {
59
#include  "rotors.h"
60
};
61
62
441k
static ENCRYPT(DesSmallFipsEncrypt,TEMPSMALL, LOADFIPS,KEYMAPSMALL,SAVEFIPS)
63
318k
static DECRYPT(DesSmallFipsDecrypt,TEMPSMALL, LOADFIPS,KEYMAPSMALL,SAVEFIPS)
64
65
/* If parity bits are used, keys should have odd parity. We use a
66
   small table, to not waste any memory on this fairly obscure DES
67
   feature. */
68
69
static const unsigned
70
parity_16[16] =
71
{ 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0 };
72
73
0
#define PARITY(x) (parity_16[(x)&0xf] ^ parity_16[((x)>>4) & 0xf])
74
75
int
76
des_check_parity(size_t length, const uint8_t *key)
77
0
{
78
0
  size_t i;
79
0
  for (i = 0; i<length; i++)
80
0
    if (!PARITY(key[i]))
81
0
      return 0;
82
83
0
  return 1;
84
0
}
85
86
void
87
des_fix_parity(size_t length, uint8_t *dst,
88
         const uint8_t *src)
89
0
{
90
0
  size_t i;
91
0
  for (i = 0; i<length; i++)
92
0
    dst[i] = src[i] ^ PARITY(src[i]) ^ 1;
93
0
}
94
95
/* Weak and semiweak keys, excluding parity:
96
 *
97
 * 00 00 00 00  00 00 00 00
98
 * 7f 7f 7f 7f  7f 7f 7f 7f 
99
 * 0f 0f 0f 0f  07 07 07 07
100
 * 70 70 70 70  78 78 78 78
101
 *
102
 * 00 7f 00 7f  00 7f 00 7f
103
 * 7f 00 7f 00  7f 00 7f 00
104
 *
105
 * 0f 70 0f 70  07 78 07 78
106
 * 70 0f 70 0f  78 07 78 07
107
 *
108
 * 00 70 00 70  00 78 00 78
109
 * 70 00 70 00  78 00 78 00
110
 *
111
 * 0f 7f 0f 7f  07 7f 07 7f
112
 * 7f 0f 7f 0f  7f 07 7f 07
113
 *
114
 * 00 0f 00 0f  00 07 00 07
115
 * 0f 00 0f 00  07 00 07 00
116
 *
117
 * 70 7f 70 7f  78 7f 78 7f
118
 * 7f 70 7f 70  7f 78 7f 78
119
 */
120
121
static int
122
des_weak_p(const uint8_t *key)
123
2.62k
{
124
  /* Hash function generated using gperf. */
125
2.62k
  static const unsigned char asso_values[0x81] =
126
2.62k
    {
127
2.62k
      16,  9, 26, 26, 26, 26, 26, 26, 26, 26,
128
2.62k
      26, 26, 26, 26, 26,  6,  2, 26, 26, 26,
129
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
130
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
131
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
132
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
133
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
134
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
135
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
136
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
137
2.62k
      26, 26, 26, 26, 26, 26, 26, 26, 26, 26,
138
2.62k
      26, 26,  3,  1, 26, 26, 26, 26, 26, 26,
139
2.62k
      26, 26, 26, 26, 26, 26, 26,  0,  0
140
2.62k
    };
141
142
2.62k
  static const int8_t weak_key_hash[26][4] =
143
2.62k
    {
144
2.62k
      /*  0 */ {0x7f,0x7f, 0x7f,0x7f},
145
2.62k
      /*  1 */ {0x7f,0x70, 0x7f,0x78},
146
2.62k
      /*  2 */ {0x7f,0x0f, 0x7f,0x07},
147
2.62k
      /*  3 */ {0x70,0x7f, 0x78,0x7f},
148
2.62k
      /*  4 */ {0x70,0x70, 0x78,0x78},
149
2.62k
      /*  5 */ {0x70,0x0f, 0x78,0x07},
150
2.62k
      /*  6 */ {0x0f,0x7f, 0x07,0x7f},
151
2.62k
      /*  7 */ {0x0f,0x70, 0x07,0x78},
152
2.62k
      /*  8 */ {0x0f,0x0f, 0x07,0x07},
153
2.62k
      /*  9 */ {0x7f,0x00, 0x7f,0x00},
154
2.62k
      /* 10 */ {-1,-1,-1,-1},
155
2.62k
      /* 11 */ {-1,-1,-1,-1},
156
2.62k
      /* 12 */ {0x70,0x00, 0x78,0x00},
157
2.62k
      /* 13 */ {-1,-1,-1,-1},
158
2.62k
      /* 14 */ {-1,-1,-1,-1},
159
2.62k
      /* 15 */ {0x0f,0x00, 0x07,0x00},
160
2.62k
      /* 16 */ {0x00,0x7f, 0x00,0x7f},
161
2.62k
      /* 17 */ {0x00,0x70, 0x00,0x78},
162
2.62k
      /* 18 */ {0x00,0x0f, 0x00,0x07},
163
2.62k
      /* 19 */ {-1,-1,-1,-1},
164
2.62k
      /* 20 */ {-1,-1,-1,-1},
165
2.62k
      /* 21 */ {-1,-1,-1,-1},
166
2.62k
      /* 22 */ {-1,-1,-1,-1},
167
2.62k
      /* 23 */ {-1,-1,-1,-1},
168
2.62k
      /* 24 */ {-1,-1,-1,-1},
169
2.62k
      /* 25 */ {0x00,0x00, 0x00,0x00}
170
2.62k
    };
171
172
2.62k
  int8_t k0 = key[0] >> 1;
173
2.62k
  int8_t k1 = key[1] >> 1;
174
175
2.62k
  unsigned hash = asso_values[k1 + 1] + asso_values[k0];
176
2.62k
  const int8_t *candidate;
177
178
2.62k
  if (hash > 25)
179
849
    return 0;
180
181
1.77k
  candidate = weak_key_hash[hash];
182
183
1.77k
  if (k0 != candidate[0]
184
1.77k
      || k1 != candidate[1])
185
375
    return 0;
186
  
187
1.39k
  if ( (key[2] >> 1) != k0
188
1.39k
       || (key[3] >> 1) != k1)
189
413
    return 0;
190
191
986
  k0 = key[4] >> 1;
192
986
  k1 = key[5] >> 1;
193
986
  if (k0 != candidate[2]
194
986
      || k1 != candidate[3])
195
454
    return 0;
196
532
  if ( (key[6] >> 1) != k0
197
532
       || (key[7] >> 1) != k1)
198
325
    return 0;
199
200
207
  return 1;
201
532
}
202
203
int
204
des_set_key(struct des_ctx *ctx, const uint8_t *key)
205
2.62k
{
206
2.62k
  register uint32_t n, w;
207
2.62k
  register char * b0, * b1;
208
2.62k
  char bits0[56], bits1[56];
209
2.62k
  uint32_t *method;
210
2.62k
  const uint8_t *k;
211
212
  /* explode the bits */
213
2.62k
  n = 56;
214
2.62k
  b0 = bits0;
215
2.62k
  b1 = bits1;
216
2.62k
  k = key;
217
20.9k
  do {
218
20.9k
    w = (256 | *k++) << 2;
219
146k
    do {
220
146k
      --n;
221
146k
      b1[n] = 8 & w;
222
146k
      w >>= 1;
223
146k
      b0[n] = 4 & w;
224
146k
    } while ( w >= 16 );
225
20.9k
  } while ( n );
226
227
  /* put the bits in the correct places */
228
2.62k
  n = 16;
229
2.62k
  k = rotors;
230
2.62k
  method = ctx->key;
231
  
232
41.9k
  do {
233
41.9k
    w   = (b1[k[ 0   ]] | b0[k[ 1   ]]) << 4;
234
41.9k
    w  |= (b1[k[ 2   ]] | b0[k[ 3   ]]) << 2;
235
41.9k
    w  |=  b1[k[ 4   ]] | b0[k[ 5   ]];
236
41.9k
    w <<= 8;
237
41.9k
    w  |= (b1[k[ 6   ]] | b0[k[ 7   ]]) << 4;
238
41.9k
    w  |= (b1[k[ 8   ]] | b0[k[ 9   ]]) << 2;
239
41.9k
    w  |=  b1[k[10   ]] | b0[k[11   ]];
240
41.9k
    w <<= 8;
241
41.9k
    w  |= (b1[k[12   ]] | b0[k[13   ]]) << 4;
242
41.9k
    w  |= (b1[k[14   ]] | b0[k[15   ]]) << 2;
243
41.9k
    w  |=  b1[k[16   ]] | b0[k[17   ]];
244
41.9k
    w <<= 8;
245
41.9k
    w  |= (b1[k[18   ]] | b0[k[19   ]]) << 4;
246
41.9k
    w  |= (b1[k[20   ]] | b0[k[21   ]]) << 2;
247
41.9k
    w  |=  b1[k[22   ]] | b0[k[23   ]];
248
249
41.9k
    method[0] = w;
250
251
41.9k
    w   = (b1[k[ 0+24]] | b0[k[ 1+24]]) << 4;
252
41.9k
    w  |= (b1[k[ 2+24]] | b0[k[ 3+24]]) << 2;
253
41.9k
    w  |=  b1[k[ 4+24]] | b0[k[ 5+24]];
254
41.9k
    w <<= 8;
255
41.9k
    w  |= (b1[k[ 6+24]] | b0[k[ 7+24]]) << 4;
256
41.9k
    w  |= (b1[k[ 8+24]] | b0[k[ 9+24]]) << 2;
257
41.9k
    w  |=  b1[k[10+24]] | b0[k[11+24]];
258
41.9k
    w <<= 8;
259
41.9k
    w  |= (b1[k[12+24]] | b0[k[13+24]]) << 4;
260
41.9k
    w  |= (b1[k[14+24]] | b0[k[15+24]]) << 2;
261
41.9k
    w  |=  b1[k[16+24]] | b0[k[17+24]];
262
41.9k
    w <<= 8;
263
41.9k
    w  |= (b1[k[18+24]] | b0[k[19+24]]) << 4;
264
41.9k
    w  |= (b1[k[20+24]] | b0[k[21+24]]) << 2;
265
41.9k
    w  |=  b1[k[22+24]] | b0[k[23+24]];
266
267
41.9k
    ROR(w, 4, 28);   /* could be eliminated */
268
41.9k
    method[1] = w;
269
270
41.9k
    k += 48;
271
41.9k
    method  += 2;
272
41.9k
  } while ( --n );
273
274
2.62k
  return !des_weak_p (key);
275
2.62k
}
276
277
void
278
des_encrypt(const struct des_ctx *ctx,
279
      size_t length, uint8_t *dst,
280
      const uint8_t *src)
281
8.51k
{
282
8.51k
  assert(!(length % DES_BLOCK_SIZE));
283
  
284
22.3k
  while (length)
285
13.8k
    {
286
13.8k
      DesSmallFipsEncrypt(dst, ctx->key, src);
287
13.8k
      length -= DES_BLOCK_SIZE;
288
13.8k
      src += DES_BLOCK_SIZE;
289
13.8k
      dst += DES_BLOCK_SIZE;
290
13.8k
    }
291
8.51k
}
292
293
void
294
des_decrypt(const struct des_ctx *ctx,
295
      size_t length, uint8_t *dst,
296
      const uint8_t *src)
297
4.70k
{
298
4.70k
  assert(!(length % DES_BLOCK_SIZE));
299
300
14.6k
  while (length)
301
9.94k
    {
302
9.94k
      DesSmallFipsDecrypt(dst, ctx->key, src);
303
9.94k
      length -= DES_BLOCK_SIZE;
304
9.94k
      src += DES_BLOCK_SIZE;
305
9.94k
      dst += DES_BLOCK_SIZE;
306
9.94k
    }
307
4.70k
}