2N/A/* This file was automatically imported with
2N/A import_gcry.py. Please don't modify it */
2N/A#include <grub/dl.h>
2N/AGRUB_MOD_LICENSE ("GPLv3+");
2N/A/* rfc2268.c - The cipher described in rfc2268; aka Ron's Cipher 2.
2N/A * Copyright (C) 2003 Nikos Mavroyanopoulos
2N/A * Copyright (C) 2004 Free Software Foundation, Inc.
2N/A *
2N/A * This file is part of Libgcrypt
2N/A *
2N/A * Libgcrypt is free software; you can redistribute it and/or modify
2N/A * it under the terms of the GNU Lesser general Public License as
2N/A * published by the Free Software Foundation; either version 2.1 of
2N/A * the License, or (at your option) any later version.
2N/A *
2N/A * Libgcrypt is distributed in the hope that it will be useful,
2N/A * but WITHOUT ANY WARRANTY; without even the implied warranty of
2N/A * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
2N/A * GNU Lesser General Public License for more details.
2N/A *
2N/A * You should have received a copy of the GNU Lesser General Public
2N/A * License along with this program; if not, write to the Free Software
2N/A * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
2N/A */
2N/A
2N/A/* This implementation was written by Nikos Mavroyanopoulos for GNUTLS
2N/A * as a Libgcrypt module (gnutls/lib/x509/rc2.c) and later adapted for
2N/A * direct use by Libgcrypt by Werner Koch. This implementation is
2N/A * only useful for pkcs#12 descryption.
2N/A *
2N/A * The implementation here is based on Peter Gutmann's RRC.2 paper.
2N/A */
2N/A
2N/A
2N/A#include "g10lib.h"
2N/A#include "types.h"
2N/A#include "cipher.h"
2N/A
2N/A#define RFC2268_BLOCKSIZE 8
2N/A
2N/Atypedef struct
2N/A{
2N/A u16 S[64];
2N/A} RFC2268_context;
2N/A
2N/Astatic const unsigned char rfc2268_sbox[] = {
2N/A 217, 120, 249, 196, 25, 221, 181, 237,
2N/A 40, 233, 253, 121, 74, 160, 216, 157,
2N/A 198, 126, 55, 131, 43, 118, 83, 142,
2N/A 98, 76, 100, 136, 68, 139, 251, 162,
2N/A 23, 154, 89, 245, 135, 179, 79, 19,
2N/A 97, 69, 109, 141, 9, 129, 125, 50,
2N/A 189, 143, 64, 235, 134, 183, 123, 11,
2N/A 240, 149, 33, 34, 92, 107, 78, 130,
2N/A 84, 214, 101, 147, 206, 96, 178, 28,
2N/A 115, 86, 192, 20, 167, 140, 241, 220,
2N/A 18, 117, 202, 31, 59, 190, 228, 209,
2N/A 66, 61, 212, 48, 163, 60, 182, 38,
2N/A 111, 191, 14, 218, 70, 105, 7, 87,
2N/A 39, 242, 29, 155, 188, 148, 67, 3,
2N/A 248, 17, 199, 246, 144, 239, 62, 231,
2N/A 6, 195, 213, 47, 200, 102, 30, 215,
2N/A 8, 232, 234, 222, 128, 82, 238, 247,
2N/A 132, 170, 114, 172, 53, 77, 106, 42,
2N/A 150, 26, 210, 113, 90, 21, 73, 116,
2N/A 75, 159, 208, 94, 4, 24, 164, 236,
2N/A 194, 224, 65, 110, 15, 81, 203, 204,
2N/A 36, 145, 175, 80, 161, 244, 112, 57,
2N/A 153, 124, 58, 133, 35, 184, 180, 122,
2N/A 252, 2, 54, 91, 37, 85, 151, 49,
2N/A 45, 93, 250, 152, 227, 138, 146, 174,
2N/A 5, 223, 41, 16, 103, 108, 186, 201,
2N/A 211, 0, 230, 207, 225, 158, 168, 44,
2N/A 99, 22, 1, 63, 88, 226, 137, 169,
2N/A 13, 56, 52, 27, 171, 51, 255, 176,
2N/A 187, 72, 12, 95, 185, 177, 205, 46,
2N/A 197, 243, 219, 71, 229, 165, 156, 119,
2N/A 10, 166, 32, 104, 254, 127, 193, 173
2N/A};
2N/A
2N/A#define rotl16(x,n) (((x) << ((u16)(n))) | ((x) >> (16 - (u16)(n))))
2N/A#define rotr16(x,n) (((x) >> ((u16)(n))) | ((x) << (16 - (u16)(n))))
2N/A
2N/A
2N/A
2N/Astatic void
2N/Ado_encrypt (void *context, unsigned char *outbuf, const unsigned char *inbuf)
2N/A{
2N/A RFC2268_context *ctx = context;
2N/A register int i, j;
2N/A u16 word0 = 0, word1 = 0, word2 = 0, word3 = 0;
2N/A
2N/A word0 = (word0 << 8) | inbuf[1];
2N/A word0 = (word0 << 8) | inbuf[0];
2N/A word1 = (word1 << 8) | inbuf[3];
2N/A word1 = (word1 << 8) | inbuf[2];
2N/A word2 = (word2 << 8) | inbuf[5];
2N/A word2 = (word2 << 8) | inbuf[4];
2N/A word3 = (word3 << 8) | inbuf[7];
2N/A word3 = (word3 << 8) | inbuf[6];
2N/A
2N/A for (i = 0; i < 16; i++)
2N/A {
2N/A j = i * 4;
2N/A /* For some reason I cannot combine those steps. */
2N/A word0 += (word1 & ~word3) + (word2 & word3) + ctx->S[j];
2N/A word0 = rotl16(word0, 1);
2N/A
2N/A word1 += (word2 & ~word0) + (word3 & word0) + ctx->S[j + 1];
2N/A word1 = rotl16(word1, 2);
2N/A
2N/A word2 += (word3 & ~word1) + (word0 & word1) + ctx->S[j + 2];
2N/A word2 = rotl16(word2, 3);
2N/A
2N/A word3 += (word0 & ~word2) + (word1 & word2) + ctx->S[j + 3];
2N/A word3 = rotl16(word3, 5);
2N/A
2N/A if (i == 4 || i == 10)
2N/A {
2N/A word0 += ctx->S[word3 & 63];
2N/A word1 += ctx->S[word0 & 63];
2N/A word2 += ctx->S[word1 & 63];
2N/A word3 += ctx->S[word2 & 63];
2N/A }
2N/A
2N/A }
2N/A
2N/A outbuf[0] = word0 & 255;
2N/A outbuf[1] = word0 >> 8;
2N/A outbuf[2] = word1 & 255;
2N/A outbuf[3] = word1 >> 8;
2N/A outbuf[4] = word2 & 255;
2N/A outbuf[5] = word2 >> 8;
2N/A outbuf[6] = word3 & 255;
2N/A outbuf[7] = word3 >> 8;
2N/A}
2N/A
2N/Astatic void
2N/Ado_decrypt (void *context, unsigned char *outbuf, const unsigned char *inbuf)
2N/A{
2N/A RFC2268_context *ctx = context;
2N/A register int i, j;
2N/A u16 word0 = 0, word1 = 0, word2 = 0, word3 = 0;
2N/A
2N/A word0 = (word0 << 8) | inbuf[1];
2N/A word0 = (word0 << 8) | inbuf[0];
2N/A word1 = (word1 << 8) | inbuf[3];
2N/A word1 = (word1 << 8) | inbuf[2];
2N/A word2 = (word2 << 8) | inbuf[5];
2N/A word2 = (word2 << 8) | inbuf[4];
2N/A word3 = (word3 << 8) | inbuf[7];
2N/A word3 = (word3 << 8) | inbuf[6];
2N/A
2N/A for (i = 15; i >= 0; i--)
2N/A {
2N/A j = i * 4;
2N/A
2N/A word3 = rotr16(word3, 5);
2N/A word3 -= (word0 & ~word2) + (word1 & word2) + ctx->S[j + 3];
2N/A
2N/A word2 = rotr16(word2, 3);
2N/A word2 -= (word3 & ~word1) + (word0 & word1) + ctx->S[j + 2];
2N/A
2N/A word1 = rotr16(word1, 2);
2N/A word1 -= (word2 & ~word0) + (word3 & word0) + ctx->S[j + 1];
2N/A
2N/A word0 = rotr16(word0, 1);
2N/A word0 -= (word1 & ~word3) + (word2 & word3) + ctx->S[j];
2N/A
2N/A if (i == 5 || i == 11)
2N/A {
2N/A word3 = word3 - ctx->S[word2 & 63];
2N/A word2 = word2 - ctx->S[word1 & 63];
2N/A word1 = word1 - ctx->S[word0 & 63];
2N/A word0 = word0 - ctx->S[word3 & 63];
2N/A }
2N/A
2N/A }
2N/A
2N/A outbuf[0] = word0 & 255;
2N/A outbuf[1] = word0 >> 8;
2N/A outbuf[2] = word1 & 255;
2N/A outbuf[3] = word1 >> 8;
2N/A outbuf[4] = word2 & 255;
2N/A outbuf[5] = word2 >> 8;
2N/A outbuf[6] = word3 & 255;
2N/A outbuf[7] = word3 >> 8;
2N/A}
2N/A
2N/A
2N/Astatic gpg_err_code_t
2N/Asetkey_core (void *context, const unsigned char *key, unsigned int keylen, int with_phase2)
2N/A{
2N/A static int initialized;
2N/A static const char *selftest_failed;
2N/A RFC2268_context *ctx = context;
2N/A unsigned int i;
2N/A unsigned char *S, x;
2N/A int len;
2N/A int bits = keylen * 8;
2N/A
2N/A if (!initialized)
2N/A {
2N/A initialized = 1;
2N/A selftest_failed = selftest ();
2N/A if (selftest_failed)
2N/A log_error ("RFC2268 selftest failed (%s).\n", selftest_failed);
2N/A }
2N/A if (selftest_failed)
2N/A return GPG_ERR_SELFTEST_FAILED;
2N/A
2N/A if (keylen < 40 / 8) /* We want at least 40 bits. */
2N/A return GPG_ERR_INV_KEYLEN;
2N/A
2N/A S = (unsigned char *) ctx->S;
2N/A
2N/A for (i = 0; i < keylen; i++)
2N/A S[i] = key[i];
2N/A
2N/A for (i = keylen; i < 128; i++)
2N/A S[i] = rfc2268_sbox[(S[i - keylen] + S[i - 1]) & 255];
2N/A
2N/A S[0] = rfc2268_sbox[S[0]];
2N/A
2N/A /* Phase 2 - reduce effective key size to "bits". This was not
2N/A * discussed in Gutmann's paper. I've copied that from the public
2N/A * domain code posted in sci.crypt. */
2N/A if (with_phase2)
2N/A {
2N/A len = (bits + 7) >> 3;
2N/A i = 128 - len;
2N/A x = rfc2268_sbox[S[i] & (255 >> (7 & -bits))];
2N/A S[i] = x;
2N/A
2N/A while (i--)
2N/A {
2N/A x = rfc2268_sbox[x ^ S[i + len]];
2N/A S[i] = x;
2N/A }
2N/A }
2N/A
2N/A /* Make the expanded key, endian independent. */
2N/A for (i = 0; i < 64; i++)
2N/A ctx->S[i] = ( (u16) S[i * 2] | (((u16) S[i * 2 + 1]) << 8));
2N/A
2N/A return 0;
2N/A}
2N/A
2N/Astatic gpg_err_code_t
2N/Ado_setkey (void *context, const unsigned char *key, unsigned int keylen)
2N/A{
2N/A return setkey_core (context, key, keylen, 1);
2N/A}
2N/A
2N/A
2N/A
2N/A
2N/Astatic gcry_cipher_oid_spec_t oids_rfc2268_40[] =
2N/A {
2N/A /*{ "1.2.840.113549.3.2", GCRY_CIPHER_MODE_CBC },*/
2N/A /* pbeWithSHAAnd40BitRC2_CBC */
2N/A { "1.2.840.113549.1.12.1.6", GCRY_CIPHER_MODE_CBC },
2N/A { NULL }
2N/A };
2N/A
2N/Agcry_cipher_spec_t _gcry_cipher_spec_rfc2268_40 = {
2N/A "RFC2268_40", NULL, oids_rfc2268_40,
2N/A RFC2268_BLOCKSIZE, 40, sizeof(RFC2268_context),
2N/A do_setkey, do_encrypt, do_decrypt
2N/A ,
2N/A#ifdef GRUB_UTIL
2N/A .modname = "gcry_rfc2268",
2N/A#endif
2N/A};
2N/A
2N/A
2N/A
2N/AGRUB_MOD_INIT(gcry_rfc2268)
2N/A{
2N/A grub_cipher_register (&_gcry_cipher_spec_rfc2268_40);
2N/A}
2N/A
2N/AGRUB_MOD_FINI(gcry_rfc2268)
2N/A{
2N/A grub_cipher_unregister (&_gcry_cipher_spec_rfc2268_40);
2N/A}