/src/openssl30/crypto/idea/i_cbc.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* | 
| 2 |  |  * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. | 
| 3 |  |  * | 
| 4 |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
| 5 |  |  * this file except in compliance with the License.  You can obtain a copy | 
| 6 |  |  * in the file LICENSE in the source distribution or at | 
| 7 |  |  * https://www.openssl.org/source/license.html | 
| 8 |  |  */ | 
| 9 |  |  | 
| 10 |  | /* | 
| 11 |  |  * IDEA low level APIs are deprecated for public use, but still ok for internal | 
| 12 |  |  * use where we're using them to implement the higher level EVP interface, as is | 
| 13 |  |  * the case here. | 
| 14 |  |  */ | 
| 15 |  | #include "internal/deprecated.h" | 
| 16 |  |  | 
| 17 |  | #include <openssl/idea.h> | 
| 18 |  | #include "idea_local.h" | 
| 19 |  |  | 
| 20 |  | void IDEA_cbc_encrypt(const unsigned char *in, unsigned char *out, | 
| 21 |  |                       long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, | 
| 22 |  |                       int encrypt) | 
| 23 | 1.56k | { | 
| 24 | 1.56k |     register unsigned long tin0, tin1; | 
| 25 | 1.56k |     register unsigned long tout0, tout1, xor0, xor1; | 
| 26 | 1.56k |     register long l = length; | 
| 27 | 1.56k |     unsigned long tin[2]; | 
| 28 |  |  | 
| 29 | 1.56k |     if (encrypt) { | 
| 30 | 763 |         n2l(iv, tout0); | 
| 31 | 763 |         n2l(iv, tout1); | 
| 32 | 763 |         iv -= 8; | 
| 33 | 4.65k |         for (l -= 8; l >= 0; l -= 8) { | 
| 34 | 3.89k |             n2l(in, tin0); | 
| 35 | 3.89k |             n2l(in, tin1); | 
| 36 | 3.89k |             tin0 ^= tout0; | 
| 37 | 3.89k |             tin1 ^= tout1; | 
| 38 | 3.89k |             tin[0] = tin0; | 
| 39 | 3.89k |             tin[1] = tin1; | 
| 40 | 3.89k |             IDEA_encrypt(tin, ks); | 
| 41 | 3.89k |             tout0 = tin[0]; | 
| 42 | 3.89k |             l2n(tout0, out); | 
| 43 | 3.89k |             tout1 = tin[1]; | 
| 44 | 3.89k |             l2n(tout1, out); | 
| 45 | 3.89k |         } | 
| 46 | 763 |         if (l != -8) { | 
| 47 | 0 |             n2ln(in, tin0, tin1, l + 8); | 
| 48 | 0 |             tin0 ^= tout0; | 
| 49 | 0 |             tin1 ^= tout1; | 
| 50 | 0 |             tin[0] = tin0; | 
| 51 | 0 |             tin[1] = tin1; | 
| 52 | 0 |             IDEA_encrypt(tin, ks); | 
| 53 | 0 |             tout0 = tin[0]; | 
| 54 | 0 |             l2n(tout0, out); | 
| 55 | 0 |             tout1 = tin[1]; | 
| 56 | 0 |             l2n(tout1, out); | 
| 57 | 0 |         } | 
| 58 | 763 |         l2n(tout0, iv); | 
| 59 | 763 |         l2n(tout1, iv); | 
| 60 | 803 |     } else { | 
| 61 | 803 |         n2l(iv, xor0); | 
| 62 | 803 |         n2l(iv, xor1); | 
| 63 | 803 |         iv -= 8; | 
| 64 | 98.8k |         for (l -= 8; l >= 0; l -= 8) { | 
| 65 | 98.0k |             n2l(in, tin0); | 
| 66 | 98.0k |             tin[0] = tin0; | 
| 67 | 98.0k |             n2l(in, tin1); | 
| 68 | 98.0k |             tin[1] = tin1; | 
| 69 | 98.0k |             IDEA_encrypt(tin, ks); | 
| 70 | 98.0k |             tout0 = tin[0] ^ xor0; | 
| 71 | 98.0k |             tout1 = tin[1] ^ xor1; | 
| 72 | 98.0k |             l2n(tout0, out); | 
| 73 | 98.0k |             l2n(tout1, out); | 
| 74 | 98.0k |             xor0 = tin0; | 
| 75 | 98.0k |             xor1 = tin1; | 
| 76 | 98.0k |         } | 
| 77 | 803 |         if (l != -8) { | 
| 78 | 0 |             n2l(in, tin0); | 
| 79 | 0 |             tin[0] = tin0; | 
| 80 | 0 |             n2l(in, tin1); | 
| 81 | 0 |             tin[1] = tin1; | 
| 82 | 0 |             IDEA_encrypt(tin, ks); | 
| 83 | 0 |             tout0 = tin[0] ^ xor0; | 
| 84 | 0 |             tout1 = tin[1] ^ xor1; | 
| 85 | 0 |             l2nn(tout0, tout1, out, l + 8); | 
| 86 | 0 |             xor0 = tin0; | 
| 87 | 0 |             xor1 = tin1; | 
| 88 | 0 |         } | 
| 89 | 803 |         l2n(xor0, iv); | 
| 90 | 803 |         l2n(xor1, iv); | 
| 91 | 803 |     } | 
| 92 | 1.56k |     tin0 = tin1 = tout0 = tout1 = xor0 = xor1 = 0; | 
| 93 | 1.56k |     tin[0] = tin[1] = 0; | 
| 94 | 1.56k | } | 
| 95 |  |  | 
| 96 |  | void IDEA_encrypt(unsigned long *d, IDEA_KEY_SCHEDULE *key) | 
| 97 | 101k | { | 
| 98 | 101k |     register IDEA_INT *p; | 
| 99 | 101k |     register unsigned long x1, x2, x3, x4, t0, t1, ul; | 
| 100 |  |  | 
| 101 | 101k |     x2 = d[0]; | 
| 102 | 101k |     x1 = (x2 >> 16); | 
| 103 | 101k |     x4 = d[1]; | 
| 104 | 101k |     x3 = (x4 >> 16); | 
| 105 |  |  | 
| 106 | 101k |     p = &(key->data[0][0]); | 
| 107 |  |  | 
| 108 | 101k |     E_IDEA(0); | 
| 109 | 101k |     E_IDEA(1); | 
| 110 | 101k |     E_IDEA(2); | 
| 111 | 101k |     E_IDEA(3); | 
| 112 | 101k |     E_IDEA(4); | 
| 113 | 101k |     E_IDEA(5); | 
| 114 | 101k |     E_IDEA(6); | 
| 115 | 101k |     E_IDEA(7); | 
| 116 |  |  | 
| 117 | 101k |     x1 &= 0xffff; | 
| 118 | 101k |     idea_mul(x1, x1, *p, ul); | 
| 119 | 101k |     p++; | 
| 120 |  |  | 
| 121 | 101k |     t0 = x3 + *(p++); | 
| 122 | 101k |     t1 = x2 + *(p++); | 
| 123 |  |  | 
| 124 | 101k |     x4 &= 0xffff; | 
| 125 | 101k |     idea_mul(x4, x4, *p, ul); | 
| 126 |  |  | 
| 127 | 101k |     d[0] = (t0 & 0xffff) | ((x1 & 0xffff) << 16); | 
| 128 | 101k |     d[1] = (x4 & 0xffff) | ((t1 & 0xffff) << 16); | 
| 129 | 101k | } |