/* * Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute * of Technology. * * For copying and distribution information, please see the file * . * * These routines perform encryption and decryption using the DES * private key algorithm, or else a subset of it-- fewer inner loops. * (AUTH_DES_ITER defaults to 16, may be less.) * * Under U.S. law, this software may not be exported outside the US * without license from the U.S. Commerce department. * * These routines form the library interface to the DES facilities. * * spm 8/85 MIT project athena */ #include #include #include #if defined(AFS_SUN5_ENV) || defined(AFS_NT40_ENV) #include #else #include #endif #include #include "des_internal.h" #define XPRT_CKSUM extern int des_debug; extern int des_debug_print(); extern int des_ecb_encrypt(); /* * This routine performs DES cipher-block-chaining checksum operation, * a.k.a. Message Authentication Code. It ALWAYS encrypts from input * to a single 64 bit output MAC checksum. * * The key schedule is passed as an arg, as well as the cleartext or * ciphertext. The cleartext and ciphertext should be in host order. * * NOTE-- the output is ALWAYS 8 bytes long. If not enough space was * provided, your program will get trashed. * * The input is null padded, at the end (highest addr), to an integral * multiple of eight bytes. */ afs_uint32 des_cbc_cksum(in,out,length,key,iv) des_cblock *in; /* >= length bytes of inputtext */ des_cblock *out; /* >= length bytes of outputtext */ register afs_int32 length; /* in bytes */ des_key_schedule key; /* precomputed key schedule */ des_cblock *iv; /* 8 bytes of ivec */ { register afs_uint32 *input = (afs_uint32 *) in; register afs_uint32 *output = (afs_uint32 *) out; afs_uint32 *ivec = (afs_uint32 *) iv; afs_uint32 i,j; afs_uint32 t_input[2]; afs_uint32 t_output[8]; unsigned char *t_in_p = (unsigned char *) t_input; #ifdef MUSTALIGN if ((afs_int32) ivec & 3) { bcopy((char *)ivec++,(char *)&t_output[0],sizeof(t_output[0])); bcopy((char *)ivec,(char *)&t_output[1],sizeof(t_output[1])); } else #endif { t_output[0] = *ivec++; t_output[1] = *ivec; } for (i = 0; length > 0; i++, length -= 8) { /* get input */ #ifdef MUSTALIGN if ((afs_int32) input & 3) { bcopy((char *)input++,(char *)&t_input[0],sizeof(t_input[0])); bcopy((char *)input++,(char *)&t_input[1],sizeof(t_input[1])); } else #endif { t_input[0] = *input++; t_input[1] = *input++; } /* zero pad */ if (length < 8) for (j = length; j <= 7; j++) *(t_in_p+j)= 0; #ifdef DEBUG if (des_debug) des_debug_print("clear",length,t_input[0],t_input[1]); #endif /* do the xor for cbc into the temp */ t_input[0] ^= t_output[0] ; t_input[1] ^= t_output[1] ; /* encrypt */ (void) des_ecb_encrypt(t_input,t_output,key,1); #ifdef DEBUG if (des_debug) { des_debug_print("xor'ed",i,t_input[0],t_input[1]); des_debug_print("cipher",i,t_output[0],t_output[1]); } #else #ifdef lint i = i; #endif #endif } /* copy temp output and save it for checksum */ #ifdef MUSTALIGN if ((afs_int32) output & 3) { bcopy((char *)&t_output[0],(char *)output++,sizeof(t_output[0])); bcopy((char *)&t_output[1],(char *)output,sizeof(t_output[1])); } else #endif { *output++ = t_output[0]; *output = t_output[1]; } return (afs_uint32) t_output[1]; }