e_des3.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498
  1. /* crypto/evp/e_des3.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <stdio.h>
  59. #include "cryptlib.h"
  60. #ifndef OPENSSL_NO_DES
  61. # include <openssl/evp.h>
  62. # include <openssl/objects.h>
  63. # include "evp_locl.h"
  64. # include <openssl/des.h>
  65. # include <openssl/rand.h>
  66. /* Block use of implementations in FIPS mode */
  67. # undef EVP_CIPH_FLAG_FIPS
  68. # define EVP_CIPH_FLAG_FIPS 0
  69. typedef struct {
  70. union {
  71. double align;
  72. DES_key_schedule ks[3];
  73. } ks;
  74. union {
  75. void (*cbc) (const void *, void *, size_t,
  76. const DES_key_schedule *, unsigned char *);
  77. } stream;
  78. } DES_EDE_KEY;
  79. # define ks1 ks.ks[0]
  80. # define ks2 ks.ks[1]
  81. # define ks3 ks.ks[2]
  82. # if defined(AES_ASM) && (defined(__sparc) || defined(__sparc__))
  83. /* ---------^^^ this is not a typo, just a way to detect that
  84. * assembler support was in general requested... */
  85. # include "sparc_arch.h"
  86. extern unsigned int OPENSSL_sparcv9cap_P[];
  87. # define SPARC_DES_CAPABLE (OPENSSL_sparcv9cap_P[1] & CFR_DES)
  88. void des_t4_key_expand(const void *key, DES_key_schedule *ks);
  89. void des_t4_ede3_cbc_encrypt(const void *inp, void *out, size_t len,
  90. const DES_key_schedule ks[3], unsigned char iv[8]);
  91. void des_t4_ede3_cbc_decrypt(const void *inp, void *out, size_t len,
  92. const DES_key_schedule ks[3], unsigned char iv[8]);
  93. # endif
  94. static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
  95. const unsigned char *iv, int enc);
  96. static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
  97. const unsigned char *iv, int enc);
  98. static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr);
  99. # define data(ctx) ((DES_EDE_KEY *)(ctx)->cipher_data)
  100. /*
  101. * Because of various casts and different args can't use
  102. * IMPLEMENT_BLOCK_CIPHER
  103. */
  104. static int des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
  105. const unsigned char *in, size_t inl)
  106. {
  107. BLOCK_CIPHER_ecb_loop()
  108. DES_ecb3_encrypt((const_DES_cblock *)(in + i),
  109. (DES_cblock *)(out + i),
  110. &data(ctx)->ks1, &data(ctx)->ks2,
  111. &data(ctx)->ks3, ctx->encrypt);
  112. return 1;
  113. }
  114. static int des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
  115. const unsigned char *in, size_t inl)
  116. {
  117. while (inl >= EVP_MAXCHUNK) {
  118. DES_ede3_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK,
  119. &data(ctx)->ks1, &data(ctx)->ks2,
  120. &data(ctx)->ks3, (DES_cblock *)ctx->iv,
  121. &ctx->num);
  122. inl -= EVP_MAXCHUNK;
  123. in += EVP_MAXCHUNK;
  124. out += EVP_MAXCHUNK;
  125. }
  126. if (inl)
  127. DES_ede3_ofb64_encrypt(in, out, (long)inl,
  128. &data(ctx)->ks1, &data(ctx)->ks2,
  129. &data(ctx)->ks3, (DES_cblock *)ctx->iv,
  130. &ctx->num);
  131. return 1;
  132. }
  133. static int des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
  134. const unsigned char *in, size_t inl)
  135. {
  136. DES_EDE_KEY *dat = data(ctx);
  137. # ifdef KSSL_DEBUG
  138. {
  139. int i;
  140. fprintf(stderr, "des_ede_cbc_cipher(ctx=%p, buflen=%d)\n", ctx,
  141. ctx->buf_len);
  142. fprintf(stderr, "\t iv= ");
  143. for (i = 0; i < 8; i++)
  144. fprintf(stderr, "%02X", ctx->iv[i]);
  145. fprintf(stderr, "\n");
  146. }
  147. # endif /* KSSL_DEBUG */
  148. if (dat->stream.cbc) {
  149. (*dat->stream.cbc) (in, out, inl, dat->ks.ks, ctx->iv);
  150. return 1;
  151. }
  152. while (inl >= EVP_MAXCHUNK) {
  153. DES_ede3_cbc_encrypt(in, out, (long)EVP_MAXCHUNK,
  154. &dat->ks1, &dat->ks2, &dat->ks3,
  155. (DES_cblock *)ctx->iv, ctx->encrypt);
  156. inl -= EVP_MAXCHUNK;
  157. in += EVP_MAXCHUNK;
  158. out += EVP_MAXCHUNK;
  159. }
  160. if (inl)
  161. DES_ede3_cbc_encrypt(in, out, (long)inl,
  162. &dat->ks1, &dat->ks2, &dat->ks3,
  163. (DES_cblock *)ctx->iv, ctx->encrypt);
  164. return 1;
  165. }
  166. static int des_ede_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
  167. const unsigned char *in, size_t inl)
  168. {
  169. while (inl >= EVP_MAXCHUNK) {
  170. DES_ede3_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK,
  171. &data(ctx)->ks1, &data(ctx)->ks2,
  172. &data(ctx)->ks3, (DES_cblock *)ctx->iv,
  173. &ctx->num, ctx->encrypt);
  174. inl -= EVP_MAXCHUNK;
  175. in += EVP_MAXCHUNK;
  176. out += EVP_MAXCHUNK;
  177. }
  178. if (inl)
  179. DES_ede3_cfb64_encrypt(in, out, (long)inl,
  180. &data(ctx)->ks1, &data(ctx)->ks2,
  181. &data(ctx)->ks3, (DES_cblock *)ctx->iv,
  182. &ctx->num, ctx->encrypt);
  183. return 1;
  184. }
  185. /*
  186. * Although we have a CFB-r implementation for 3-DES, it doesn't pack the
  187. * right way, so wrap it here
  188. */
  189. static int des_ede3_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
  190. const unsigned char *in, size_t inl)
  191. {
  192. size_t n;
  193. unsigned char c[1], d[1];
  194. if (!EVP_CIPHER_CTX_test_flags(ctx, EVP_CIPH_FLAG_LENGTH_BITS))
  195. inl *= 8;
  196. for (n = 0; n < inl; ++n) {
  197. c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0;
  198. DES_ede3_cfb_encrypt(c, d, 1, 1,
  199. &data(ctx)->ks1, &data(ctx)->ks2,
  200. &data(ctx)->ks3, (DES_cblock *)ctx->iv,
  201. ctx->encrypt);
  202. out[n / 8] = (out[n / 8] & ~(0x80 >> (unsigned int)(n % 8)))
  203. | ((d[0] & 0x80) >> (unsigned int)(n % 8));
  204. }
  205. return 1;
  206. }
  207. static int des_ede3_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
  208. const unsigned char *in, size_t inl)
  209. {
  210. while (inl >= EVP_MAXCHUNK) {
  211. DES_ede3_cfb_encrypt(in, out, 8, (long)EVP_MAXCHUNK,
  212. &data(ctx)->ks1, &data(ctx)->ks2,
  213. &data(ctx)->ks3, (DES_cblock *)ctx->iv,
  214. ctx->encrypt);
  215. inl -= EVP_MAXCHUNK;
  216. in += EVP_MAXCHUNK;
  217. out += EVP_MAXCHUNK;
  218. }
  219. if (inl)
  220. DES_ede3_cfb_encrypt(in, out, 8, (long)inl,
  221. &data(ctx)->ks1, &data(ctx)->ks2,
  222. &data(ctx)->ks3, (DES_cblock *)ctx->iv,
  223. ctx->encrypt);
  224. return 1;
  225. }
  226. BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64,
  227. EVP_CIPH_RAND_KEY | EVP_CIPH_FLAG_DEFAULT_ASN1,
  228. des_ede_init_key, NULL, NULL, NULL, des3_ctrl)
  229. # define des_ede3_cfb64_cipher des_ede_cfb64_cipher
  230. # define des_ede3_ofb_cipher des_ede_ofb_cipher
  231. # define des_ede3_cbc_cipher des_ede_cbc_cipher
  232. # define des_ede3_ecb_cipher des_ede_ecb_cipher
  233. BLOCK_CIPHER_defs(des_ede3, DES_EDE_KEY, NID_des_ede3, 8, 24, 8, 64,
  234. EVP_CIPH_RAND_KEY | EVP_CIPH_FLAG_FIPS |
  235. EVP_CIPH_FLAG_DEFAULT_ASN1, des_ede3_init_key, NULL, NULL, NULL,
  236. des3_ctrl)
  237. BLOCK_CIPHER_def_cfb(des_ede3, DES_EDE_KEY, NID_des_ede3, 24, 8, 1,
  238. EVP_CIPH_RAND_KEY | EVP_CIPH_FLAG_FIPS |
  239. EVP_CIPH_FLAG_DEFAULT_ASN1, des_ede3_init_key, NULL, NULL,
  240. NULL, des3_ctrl)
  241. BLOCK_CIPHER_def_cfb(des_ede3, DES_EDE_KEY, NID_des_ede3, 24, 8, 8,
  242. EVP_CIPH_RAND_KEY | EVP_CIPH_FLAG_FIPS |
  243. EVP_CIPH_FLAG_DEFAULT_ASN1, des_ede3_init_key, NULL, NULL,
  244. NULL, des3_ctrl)
  245. static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
  246. const unsigned char *iv, int enc)
  247. {
  248. DES_cblock *deskey = (DES_cblock *)key;
  249. DES_EDE_KEY *dat = data(ctx);
  250. dat->stream.cbc = NULL;
  251. # if defined(SPARC_DES_CAPABLE)
  252. if (SPARC_DES_CAPABLE) {
  253. int mode = ctx->cipher->flags & EVP_CIPH_MODE;
  254. if (mode == EVP_CIPH_CBC_MODE) {
  255. des_t4_key_expand(&deskey[0], &dat->ks1);
  256. des_t4_key_expand(&deskey[1], &dat->ks2);
  257. memcpy(&dat->ks3, &dat->ks1, sizeof(dat->ks1));
  258. dat->stream.cbc = enc ? des_t4_ede3_cbc_encrypt :
  259. des_t4_ede3_cbc_decrypt;
  260. return 1;
  261. }
  262. }
  263. # endif
  264. # ifdef EVP_CHECK_DES_KEY
  265. if (DES_set_key_checked(&deskey[0], &dat->ks1)
  266. || DES_set_key_checked(&deskey[1], &dat->ks2))
  267. return 0;
  268. # else
  269. DES_set_key_unchecked(&deskey[0], &dat->ks1);
  270. DES_set_key_unchecked(&deskey[1], &dat->ks2);
  271. # endif
  272. memcpy(&dat->ks3, &dat->ks1, sizeof(dat->ks1));
  273. return 1;
  274. }
  275. static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
  276. const unsigned char *iv, int enc)
  277. {
  278. DES_cblock *deskey = (DES_cblock *)key;
  279. DES_EDE_KEY *dat = data(ctx);
  280. # ifdef KSSL_DEBUG
  281. {
  282. int i;
  283. fprintf(stderr, "des_ede3_init_key(ctx=%p)\n", ctx);
  284. fprintf(stderr, "\tKEY= ");
  285. for (i = 0; i < 24; i++)
  286. fprintf(stderr, "%02X", key[i]);
  287. fprintf(stderr, "\n");
  288. if (iv) {
  289. fprintf(stderr, "\t IV= ");
  290. for (i = 0; i < 8; i++)
  291. fprintf(stderr, "%02X", iv[i]);
  292. fprintf(stderr, "\n");
  293. }
  294. }
  295. # endif /* KSSL_DEBUG */
  296. dat->stream.cbc = NULL;
  297. # if defined(SPARC_DES_CAPABLE)
  298. if (SPARC_DES_CAPABLE) {
  299. int mode = ctx->cipher->flags & EVP_CIPH_MODE;
  300. if (mode == EVP_CIPH_CBC_MODE) {
  301. des_t4_key_expand(&deskey[0], &dat->ks1);
  302. des_t4_key_expand(&deskey[1], &dat->ks2);
  303. des_t4_key_expand(&deskey[2], &dat->ks3);
  304. dat->stream.cbc = enc ? des_t4_ede3_cbc_encrypt :
  305. des_t4_ede3_cbc_decrypt;
  306. return 1;
  307. }
  308. }
  309. # endif
  310. # ifdef EVP_CHECK_DES_KEY
  311. if (DES_set_key_checked(&deskey[0], &dat->ks1)
  312. || DES_set_key_checked(&deskey[1], &dat->ks2)
  313. || DES_set_key_checked(&deskey[2], &dat->ks3))
  314. return 0;
  315. # else
  316. DES_set_key_unchecked(&deskey[0], &dat->ks1);
  317. DES_set_key_unchecked(&deskey[1], &dat->ks2);
  318. DES_set_key_unchecked(&deskey[2], &dat->ks3);
  319. # endif
  320. return 1;
  321. }
  322. static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
  323. {
  324. DES_cblock *deskey = ptr;
  325. switch (type) {
  326. case EVP_CTRL_RAND_KEY:
  327. if (RAND_bytes(ptr, c->key_len) <= 0)
  328. return 0;
  329. DES_set_odd_parity(deskey);
  330. if (c->key_len >= 16)
  331. DES_set_odd_parity(deskey + 1);
  332. if (c->key_len >= 24)
  333. DES_set_odd_parity(deskey + 2);
  334. return 1;
  335. default:
  336. return -1;
  337. }
  338. }
  339. const EVP_CIPHER *EVP_des_ede(void)
  340. {
  341. return &des_ede_ecb;
  342. }
  343. const EVP_CIPHER *EVP_des_ede3(void)
  344. {
  345. return &des_ede3_ecb;
  346. }
  347. # ifndef OPENSSL_NO_SHA
  348. # include <openssl/sha.h>
  349. static const unsigned char wrap_iv[8] =
  350. { 0x4a, 0xdd, 0xa2, 0x2c, 0x79, 0xe8, 0x21, 0x05 };
  351. static int des_ede3_unwrap(EVP_CIPHER_CTX *ctx, unsigned char *out,
  352. const unsigned char *in, size_t inl)
  353. {
  354. unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH];
  355. int rv = -1;
  356. if (inl < 24)
  357. return -1;
  358. if (out == NULL)
  359. return inl - 16;
  360. memcpy(ctx->iv, wrap_iv, 8);
  361. /* Decrypt first block which will end up as icv */
  362. des_ede_cbc_cipher(ctx, icv, in, 8);
  363. /* Decrypt central blocks */
  364. /*
  365. * If decrypting in place move whole output along a block so the next
  366. * des_ede_cbc_cipher is in place.
  367. */
  368. if (out == in) {
  369. memmove(out, out + 8, inl - 8);
  370. in -= 8;
  371. }
  372. des_ede_cbc_cipher(ctx, out, in + 8, inl - 16);
  373. /* Decrypt final block which will be IV */
  374. des_ede_cbc_cipher(ctx, iv, in + inl - 8, 8);
  375. /* Reverse order of everything */
  376. BUF_reverse(icv, NULL, 8);
  377. BUF_reverse(out, NULL, inl - 16);
  378. BUF_reverse(ctx->iv, iv, 8);
  379. /* Decrypt again using new IV */
  380. des_ede_cbc_cipher(ctx, out, out, inl - 16);
  381. des_ede_cbc_cipher(ctx, icv, icv, 8);
  382. /* Work out SHA1 hash of first portion */
  383. SHA1(out, inl - 16, sha1tmp);
  384. if (!CRYPTO_memcmp(sha1tmp, icv, 8))
  385. rv = inl - 16;
  386. OPENSSL_cleanse(icv, 8);
  387. OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
  388. OPENSSL_cleanse(iv, 8);
  389. OPENSSL_cleanse(ctx->iv, 8);
  390. if (rv == -1)
  391. OPENSSL_cleanse(out, inl - 16);
  392. return rv;
  393. }
  394. static int des_ede3_wrap(EVP_CIPHER_CTX *ctx, unsigned char *out,
  395. const unsigned char *in, size_t inl)
  396. {
  397. unsigned char sha1tmp[SHA_DIGEST_LENGTH];
  398. if (out == NULL)
  399. return inl + 16;
  400. /* Copy input to output buffer + 8 so we have space for IV */
  401. memmove(out + 8, in, inl);
  402. /* Work out ICV */
  403. SHA1(in, inl, sha1tmp);
  404. memcpy(out + inl + 8, sha1tmp, 8);
  405. OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
  406. /* Generate random IV */
  407. if (RAND_bytes(ctx->iv, 8) <= 0)
  408. return -1;
  409. memcpy(out, ctx->iv, 8);
  410. /* Encrypt everything after IV in place */
  411. des_ede_cbc_cipher(ctx, out + 8, out + 8, inl + 8);
  412. BUF_reverse(out, NULL, inl + 16);
  413. memcpy(ctx->iv, wrap_iv, 8);
  414. des_ede_cbc_cipher(ctx, out, out, inl + 16);
  415. return inl + 16;
  416. }
  417. static int des_ede3_wrap_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
  418. const unsigned char *in, size_t inl)
  419. {
  420. /*
  421. * Sanity check input length: we typically only wrap keys so EVP_MAXCHUNK
  422. * is more than will ever be needed. Also input length must be a multiple
  423. * of 8 bits.
  424. */
  425. if (inl >= EVP_MAXCHUNK || inl % 8)
  426. return -1;
  427. if (ctx->encrypt)
  428. return des_ede3_wrap(ctx, out, in, inl);
  429. else
  430. return des_ede3_unwrap(ctx, out, in, inl);
  431. }
  432. static const EVP_CIPHER des3_wrap = {
  433. NID_id_smime_alg_CMS3DESwrap,
  434. 8, 24, 0,
  435. EVP_CIPH_WRAP_MODE | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER
  436. | EVP_CIPH_FLAG_DEFAULT_ASN1,
  437. des_ede3_init_key, des_ede3_wrap_cipher,
  438. NULL,
  439. sizeof(DES_EDE_KEY),
  440. NULL, NULL, NULL, NULL
  441. };
  442. const EVP_CIPHER *EVP_des_ede3_wrap(void)
  443. {
  444. return &des3_wrap;
  445. }
  446. # endif
  447. #endif