You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

455 lines
18KB

  1. /*
  2. * DES encryption/decryption
  3. * Copyright (c) 2007 Reimar Doeffinger
  4. *
  5. * This file is part of Libav.
  6. *
  7. * Libav is free software; you can redistribute it and/or
  8. * modify it under the terms of the GNU Lesser General Public
  9. * License as published by the Free Software Foundation; either
  10. * version 2.1 of the License, or (at your option) any later version.
  11. *
  12. * Libav is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  15. * Lesser General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU Lesser General Public
  18. * License along with Libav; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  20. */
  21. #include <inttypes.h>
  22. #include "avutil.h"
  23. #include "common.h"
  24. #include "intreadwrite.h"
  25. #include "mem.h"
  26. #include "des.h"
  27. #if !FF_API_CRYPTO_CONTEXT
  28. struct AVDES {
  29. uint64_t round_keys[3][16];
  30. int triple_des;
  31. };
  32. #endif
  33. #define T(a, b, c, d, e, f, g, h) 64-a,64-b,64-c,64-d,64-e,64-f,64-g,64-h
  34. static const uint8_t IP_shuffle[] = {
  35. T(58, 50, 42, 34, 26, 18, 10, 2),
  36. T(60, 52, 44, 36, 28, 20, 12, 4),
  37. T(62, 54, 46, 38, 30, 22, 14, 6),
  38. T(64, 56, 48, 40, 32, 24, 16, 8),
  39. T(57, 49, 41, 33, 25, 17, 9, 1),
  40. T(59, 51, 43, 35, 27, 19, 11, 3),
  41. T(61, 53, 45, 37, 29, 21, 13, 5),
  42. T(63, 55, 47, 39, 31, 23, 15, 7)
  43. };
  44. #undef T
  45. #if CONFIG_SMALL || defined(GENTABLES)
  46. #define T(a, b, c, d) 32-a,32-b,32-c,32-d
  47. static const uint8_t P_shuffle[] = {
  48. T(16, 7, 20, 21),
  49. T(29, 12, 28, 17),
  50. T( 1, 15, 23, 26),
  51. T( 5, 18, 31, 10),
  52. T( 2, 8, 24, 14),
  53. T(32, 27, 3, 9),
  54. T(19, 13, 30, 6),
  55. T(22, 11, 4, 25)
  56. };
  57. #undef T
  58. #endif
  59. #define T(a, b, c, d, e, f, g) 64-a,64-b,64-c,64-d,64-e,64-f,64-g
  60. static const uint8_t PC1_shuffle[] = {
  61. T(57, 49, 41, 33, 25, 17, 9),
  62. T( 1, 58, 50, 42, 34, 26, 18),
  63. T(10, 2, 59, 51, 43, 35, 27),
  64. T(19, 11, 3, 60, 52, 44, 36),
  65. T(63, 55, 47, 39, 31, 23, 15),
  66. T( 7, 62, 54, 46, 38, 30, 22),
  67. T(14, 6, 61, 53, 45, 37, 29),
  68. T(21, 13, 5, 28, 20, 12, 4)
  69. };
  70. #undef T
  71. #define T(a, b, c, d, e, f) 56-a,56-b,56-c,56-d,56-e,56-f
  72. static const uint8_t PC2_shuffle[] = {
  73. T(14, 17, 11, 24, 1, 5),
  74. T( 3, 28, 15, 6, 21, 10),
  75. T(23, 19, 12, 4, 26, 8),
  76. T(16, 7, 27, 20, 13, 2),
  77. T(41, 52, 31, 37, 47, 55),
  78. T(30, 40, 51, 45, 33, 48),
  79. T(44, 49, 39, 56, 34, 53),
  80. T(46, 42, 50, 36, 29, 32)
  81. };
  82. #undef T
  83. #if CONFIG_SMALL
  84. static const uint8_t S_boxes[8][32] = {
  85. {
  86. 0x0e, 0xf4, 0x7d, 0x41, 0xe2, 0x2f, 0xdb, 0x18, 0xa3, 0x6a, 0xc6, 0xbc, 0x95, 0x59, 0x30, 0x87,
  87. 0xf4, 0xc1, 0x8e, 0x28, 0x4d, 0x96, 0x12, 0x7b, 0x5f, 0xbc, 0x39, 0xe7, 0xa3, 0x0a, 0x65, 0xd0,
  88. }, {
  89. 0x3f, 0xd1, 0x48, 0x7e, 0xf6, 0x2b, 0x83, 0xe4, 0xc9, 0x07, 0x12, 0xad, 0x6c, 0x90, 0xb5, 0x5a,
  90. 0xd0, 0x8e, 0xa7, 0x1b, 0x3a, 0xf4, 0x4d, 0x21, 0xb5, 0x68, 0x7c, 0xc6, 0x09, 0x53, 0xe2, 0x9f,
  91. }, {
  92. 0xda, 0x70, 0x09, 0x9e, 0x36, 0x43, 0x6f, 0xa5, 0x21, 0x8d, 0x5c, 0xe7, 0xcb, 0xb4, 0xf2, 0x18,
  93. 0x1d, 0xa6, 0xd4, 0x09, 0x68, 0x9f, 0x83, 0x70, 0x4b, 0xf1, 0xe2, 0x3c, 0xb5, 0x5a, 0x2e, 0xc7,
  94. }, {
  95. 0xd7, 0x8d, 0xbe, 0x53, 0x60, 0xf6, 0x09, 0x3a, 0x41, 0x72, 0x28, 0xc5, 0x1b, 0xac, 0xe4, 0x9f,
  96. 0x3a, 0xf6, 0x09, 0x60, 0xac, 0x1b, 0xd7, 0x8d, 0x9f, 0x41, 0x53, 0xbe, 0xc5, 0x72, 0x28, 0xe4,
  97. }, {
  98. 0xe2, 0xbc, 0x24, 0xc1, 0x47, 0x7a, 0xdb, 0x16, 0x58, 0x05, 0xf3, 0xaf, 0x3d, 0x90, 0x8e, 0x69,
  99. 0xb4, 0x82, 0xc1, 0x7b, 0x1a, 0xed, 0x27, 0xd8, 0x6f, 0xf9, 0x0c, 0x95, 0xa6, 0x43, 0x50, 0x3e,
  100. }, {
  101. 0xac, 0xf1, 0x4a, 0x2f, 0x79, 0xc2, 0x96, 0x58, 0x60, 0x1d, 0xd3, 0xe4, 0x0e, 0xb7, 0x35, 0x8b,
  102. 0x49, 0x3e, 0x2f, 0xc5, 0x92, 0x58, 0xfc, 0xa3, 0xb7, 0xe0, 0x14, 0x7a, 0x61, 0x0d, 0x8b, 0xd6,
  103. }, {
  104. 0xd4, 0x0b, 0xb2, 0x7e, 0x4f, 0x90, 0x18, 0xad, 0xe3, 0x3c, 0x59, 0xc7, 0x25, 0xfa, 0x86, 0x61,
  105. 0x61, 0xb4, 0xdb, 0x8d, 0x1c, 0x43, 0xa7, 0x7e, 0x9a, 0x5f, 0x06, 0xf8, 0xe0, 0x25, 0x39, 0xc2,
  106. }, {
  107. 0x1d, 0xf2, 0xd8, 0x84, 0xa6, 0x3f, 0x7b, 0x41, 0xca, 0x59, 0x63, 0xbe, 0x05, 0xe0, 0x9c, 0x27,
  108. 0x27, 0x1b, 0xe4, 0x71, 0x49, 0xac, 0x8e, 0xd2, 0xf0, 0xc6, 0x9a, 0x0d, 0x3f, 0x53, 0x65, 0xb8,
  109. }
  110. };
  111. #else
  112. /**
  113. * This table contains the results of applying both the S-box and P-shuffle.
  114. * It can be regenerated by compiling this file with -DCONFIG_SMALL -DTEST -DGENTABLES
  115. */
  116. static const uint32_t S_boxes_P_shuffle[8][64] = {
  117. {
  118. 0x00808200, 0x00000000, 0x00008000, 0x00808202, 0x00808002, 0x00008202, 0x00000002, 0x00008000,
  119. 0x00000200, 0x00808200, 0x00808202, 0x00000200, 0x00800202, 0x00808002, 0x00800000, 0x00000002,
  120. 0x00000202, 0x00800200, 0x00800200, 0x00008200, 0x00008200, 0x00808000, 0x00808000, 0x00800202,
  121. 0x00008002, 0x00800002, 0x00800002, 0x00008002, 0x00000000, 0x00000202, 0x00008202, 0x00800000,
  122. 0x00008000, 0x00808202, 0x00000002, 0x00808000, 0x00808200, 0x00800000, 0x00800000, 0x00000200,
  123. 0x00808002, 0x00008000, 0x00008200, 0x00800002, 0x00000200, 0x00000002, 0x00800202, 0x00008202,
  124. 0x00808202, 0x00008002, 0x00808000, 0x00800202, 0x00800002, 0x00000202, 0x00008202, 0x00808200,
  125. 0x00000202, 0x00800200, 0x00800200, 0x00000000, 0x00008002, 0x00008200, 0x00000000, 0x00808002,
  126. },
  127. {
  128. 0x40084010, 0x40004000, 0x00004000, 0x00084010, 0x00080000, 0x00000010, 0x40080010, 0x40004010,
  129. 0x40000010, 0x40084010, 0x40084000, 0x40000000, 0x40004000, 0x00080000, 0x00000010, 0x40080010,
  130. 0x00084000, 0x00080010, 0x40004010, 0x00000000, 0x40000000, 0x00004000, 0x00084010, 0x40080000,
  131. 0x00080010, 0x40000010, 0x00000000, 0x00084000, 0x00004010, 0x40084000, 0x40080000, 0x00004010,
  132. 0x00000000, 0x00084010, 0x40080010, 0x00080000, 0x40004010, 0x40080000, 0x40084000, 0x00004000,
  133. 0x40080000, 0x40004000, 0x00000010, 0x40084010, 0x00084010, 0x00000010, 0x00004000, 0x40000000,
  134. 0x00004010, 0x40084000, 0x00080000, 0x40000010, 0x00080010, 0x40004010, 0x40000010, 0x00080010,
  135. 0x00084000, 0x00000000, 0x40004000, 0x00004010, 0x40000000, 0x40080010, 0x40084010, 0x00084000,
  136. },
  137. {
  138. 0x00000104, 0x04010100, 0x00000000, 0x04010004, 0x04000100, 0x00000000, 0x00010104, 0x04000100,
  139. 0x00010004, 0x04000004, 0x04000004, 0x00010000, 0x04010104, 0x00010004, 0x04010000, 0x00000104,
  140. 0x04000000, 0x00000004, 0x04010100, 0x00000100, 0x00010100, 0x04010000, 0x04010004, 0x00010104,
  141. 0x04000104, 0x00010100, 0x00010000, 0x04000104, 0x00000004, 0x04010104, 0x00000100, 0x04000000,
  142. 0x04010100, 0x04000000, 0x00010004, 0x00000104, 0x00010000, 0x04010100, 0x04000100, 0x00000000,
  143. 0x00000100, 0x00010004, 0x04010104, 0x04000100, 0x04000004, 0x00000100, 0x00000000, 0x04010004,
  144. 0x04000104, 0x00010000, 0x04000000, 0x04010104, 0x00000004, 0x00010104, 0x00010100, 0x04000004,
  145. 0x04010000, 0x04000104, 0x00000104, 0x04010000, 0x00010104, 0x00000004, 0x04010004, 0x00010100,
  146. },
  147. {
  148. 0x80401000, 0x80001040, 0x80001040, 0x00000040, 0x00401040, 0x80400040, 0x80400000, 0x80001000,
  149. 0x00000000, 0x00401000, 0x00401000, 0x80401040, 0x80000040, 0x00000000, 0x00400040, 0x80400000,
  150. 0x80000000, 0x00001000, 0x00400000, 0x80401000, 0x00000040, 0x00400000, 0x80001000, 0x00001040,
  151. 0x80400040, 0x80000000, 0x00001040, 0x00400040, 0x00001000, 0x00401040, 0x80401040, 0x80000040,
  152. 0x00400040, 0x80400000, 0x00401000, 0x80401040, 0x80000040, 0x00000000, 0x00000000, 0x00401000,
  153. 0x00001040, 0x00400040, 0x80400040, 0x80000000, 0x80401000, 0x80001040, 0x80001040, 0x00000040,
  154. 0x80401040, 0x80000040, 0x80000000, 0x00001000, 0x80400000, 0x80001000, 0x00401040, 0x80400040,
  155. 0x80001000, 0x00001040, 0x00400000, 0x80401000, 0x00000040, 0x00400000, 0x00001000, 0x00401040,
  156. },
  157. {
  158. 0x00000080, 0x01040080, 0x01040000, 0x21000080, 0x00040000, 0x00000080, 0x20000000, 0x01040000,
  159. 0x20040080, 0x00040000, 0x01000080, 0x20040080, 0x21000080, 0x21040000, 0x00040080, 0x20000000,
  160. 0x01000000, 0x20040000, 0x20040000, 0x00000000, 0x20000080, 0x21040080, 0x21040080, 0x01000080,
  161. 0x21040000, 0x20000080, 0x00000000, 0x21000000, 0x01040080, 0x01000000, 0x21000000, 0x00040080,
  162. 0x00040000, 0x21000080, 0x00000080, 0x01000000, 0x20000000, 0x01040000, 0x21000080, 0x20040080,
  163. 0x01000080, 0x20000000, 0x21040000, 0x01040080, 0x20040080, 0x00000080, 0x01000000, 0x21040000,
  164. 0x21040080, 0x00040080, 0x21000000, 0x21040080, 0x01040000, 0x00000000, 0x20040000, 0x21000000,
  165. 0x00040080, 0x01000080, 0x20000080, 0x00040000, 0x00000000, 0x20040000, 0x01040080, 0x20000080,
  166. },
  167. {
  168. 0x10000008, 0x10200000, 0x00002000, 0x10202008, 0x10200000, 0x00000008, 0x10202008, 0x00200000,
  169. 0x10002000, 0x00202008, 0x00200000, 0x10000008, 0x00200008, 0x10002000, 0x10000000, 0x00002008,
  170. 0x00000000, 0x00200008, 0x10002008, 0x00002000, 0x00202000, 0x10002008, 0x00000008, 0x10200008,
  171. 0x10200008, 0x00000000, 0x00202008, 0x10202000, 0x00002008, 0x00202000, 0x10202000, 0x10000000,
  172. 0x10002000, 0x00000008, 0x10200008, 0x00202000, 0x10202008, 0x00200000, 0x00002008, 0x10000008,
  173. 0x00200000, 0x10002000, 0x10000000, 0x00002008, 0x10000008, 0x10202008, 0x00202000, 0x10200000,
  174. 0x00202008, 0x10202000, 0x00000000, 0x10200008, 0x00000008, 0x00002000, 0x10200000, 0x00202008,
  175. 0x00002000, 0x00200008, 0x10002008, 0x00000000, 0x10202000, 0x10000000, 0x00200008, 0x10002008,
  176. },
  177. {
  178. 0x00100000, 0x02100001, 0x02000401, 0x00000000, 0x00000400, 0x02000401, 0x00100401, 0x02100400,
  179. 0x02100401, 0x00100000, 0x00000000, 0x02000001, 0x00000001, 0x02000000, 0x02100001, 0x00000401,
  180. 0x02000400, 0x00100401, 0x00100001, 0x02000400, 0x02000001, 0x02100000, 0x02100400, 0x00100001,
  181. 0x02100000, 0x00000400, 0x00000401, 0x02100401, 0x00100400, 0x00000001, 0x02000000, 0x00100400,
  182. 0x02000000, 0x00100400, 0x00100000, 0x02000401, 0x02000401, 0x02100001, 0x02100001, 0x00000001,
  183. 0x00100001, 0x02000000, 0x02000400, 0x00100000, 0x02100400, 0x00000401, 0x00100401, 0x02100400,
  184. 0x00000401, 0x02000001, 0x02100401, 0x02100000, 0x00100400, 0x00000000, 0x00000001, 0x02100401,
  185. 0x00000000, 0x00100401, 0x02100000, 0x00000400, 0x02000001, 0x02000400, 0x00000400, 0x00100001,
  186. },
  187. {
  188. 0x08000820, 0x00000800, 0x00020000, 0x08020820, 0x08000000, 0x08000820, 0x00000020, 0x08000000,
  189. 0x00020020, 0x08020000, 0x08020820, 0x00020800, 0x08020800, 0x00020820, 0x00000800, 0x00000020,
  190. 0x08020000, 0x08000020, 0x08000800, 0x00000820, 0x00020800, 0x00020020, 0x08020020, 0x08020800,
  191. 0x00000820, 0x00000000, 0x00000000, 0x08020020, 0x08000020, 0x08000800, 0x00020820, 0x00020000,
  192. 0x00020820, 0x00020000, 0x08020800, 0x00000800, 0x00000020, 0x08020020, 0x00000800, 0x00020820,
  193. 0x08000800, 0x00000020, 0x08000020, 0x08020000, 0x08020020, 0x08000000, 0x00020000, 0x08000820,
  194. 0x00000000, 0x08020820, 0x00020020, 0x08000020, 0x08020000, 0x08000800, 0x08000820, 0x00000000,
  195. 0x08020820, 0x00020800, 0x00020800, 0x00000820, 0x00000820, 0x00020020, 0x08000000, 0x08020800,
  196. },
  197. };
  198. #endif
  199. static uint64_t shuffle(uint64_t in, const uint8_t *shuffle, int shuffle_len) {
  200. int i;
  201. uint64_t res = 0;
  202. for (i = 0; i < shuffle_len; i++)
  203. res += res + ((in >> *shuffle++) & 1);
  204. return res;
  205. }
  206. static uint64_t shuffle_inv(uint64_t in, const uint8_t *shuffle, int shuffle_len) {
  207. int i;
  208. uint64_t res = 0;
  209. shuffle += shuffle_len - 1;
  210. for (i = 0; i < shuffle_len; i++) {
  211. res |= (in & 1) << *shuffle--;
  212. in >>= 1;
  213. }
  214. return res;
  215. }
  216. static uint32_t f_func(uint32_t r, uint64_t k) {
  217. int i;
  218. uint32_t out = 0;
  219. // rotate to get first part of E-shuffle in the lowest 6 bits
  220. r = (r << 1) | (r >> 31);
  221. // apply S-boxes, those compress the data again from 8 * 6 to 8 * 4 bits
  222. for (i = 7; i >= 0; i--) {
  223. uint8_t tmp = (r ^ k) & 0x3f;
  224. #if CONFIG_SMALL
  225. uint8_t v = S_boxes[i][tmp >> 1];
  226. if (tmp & 1) v >>= 4;
  227. out = (out >> 4) | (v << 28);
  228. #else
  229. out |= S_boxes_P_shuffle[i][tmp];
  230. #endif
  231. // get next 6 bits of E-shuffle and round key k into the lowest bits
  232. r = (r >> 4) | (r << 28);
  233. k >>= 6;
  234. }
  235. #if CONFIG_SMALL
  236. out = shuffle(out, P_shuffle, sizeof(P_shuffle));
  237. #endif
  238. return out;
  239. }
  240. /**
  241. * @brief rotate the two halves of the expanded 56 bit key each 1 bit left
  242. *
  243. * Note: the specification calls this "shift", so I kept it although
  244. * it is confusing.
  245. */
  246. static uint64_t key_shift_left(uint64_t CDn) {
  247. uint64_t carries = (CDn >> 27) & 0x10000001;
  248. CDn <<= 1;
  249. CDn &= ~0x10000001;
  250. CDn |= carries;
  251. return CDn;
  252. }
  253. static void gen_roundkeys(uint64_t K[16], uint64_t key) {
  254. int i;
  255. // discard parity bits from key and shuffle it into C and D parts
  256. uint64_t CDn = shuffle(key, PC1_shuffle, sizeof(PC1_shuffle));
  257. // generate round keys
  258. for (i = 0; i < 16; i++) {
  259. CDn = key_shift_left(CDn);
  260. if (i > 1 && i != 8 && i != 15)
  261. CDn = key_shift_left(CDn);
  262. K[i] = shuffle(CDn, PC2_shuffle, sizeof(PC2_shuffle));
  263. }
  264. }
  265. static uint64_t des_encdec(uint64_t in, uint64_t K[16], int decrypt) {
  266. int i;
  267. // used to apply round keys in reverse order for decryption
  268. decrypt = decrypt ? 15 : 0;
  269. // shuffle irrelevant to security but to ease hardware implementations
  270. in = shuffle(in, IP_shuffle, sizeof(IP_shuffle));
  271. for (i = 0; i < 16; i++) {
  272. uint32_t f_res;
  273. f_res = f_func(in, K[decrypt ^ i]);
  274. in = (in << 32) | (in >> 32);
  275. in ^= f_res;
  276. }
  277. in = (in << 32) | (in >> 32);
  278. // reverse shuffle used to ease hardware implementations
  279. in = shuffle_inv(in, IP_shuffle, sizeof(IP_shuffle));
  280. return in;
  281. }
  282. AVDES *av_des_alloc(void)
  283. {
  284. return av_mallocz(sizeof(struct AVDES));
  285. }
  286. int av_des_init(AVDES *d, const uint8_t *key, int key_bits, int decrypt) {
  287. if (key_bits != 64 && key_bits != 192)
  288. return -1;
  289. d->triple_des = key_bits > 64;
  290. gen_roundkeys(d->round_keys[0], AV_RB64(key));
  291. if (d->triple_des) {
  292. gen_roundkeys(d->round_keys[1], AV_RB64(key + 8));
  293. gen_roundkeys(d->round_keys[2], AV_RB64(key + 16));
  294. }
  295. return 0;
  296. }
  297. static void av_des_crypt_mac(AVDES *d, uint8_t *dst, const uint8_t *src, int count, uint8_t *iv, int decrypt, int mac) {
  298. uint64_t iv_val = iv ? AV_RB64(iv) : 0;
  299. while (count-- > 0) {
  300. uint64_t dst_val;
  301. uint64_t src_val = src ? AV_RB64(src) : 0;
  302. if (decrypt) {
  303. uint64_t tmp = src_val;
  304. if (d->triple_des) {
  305. src_val = des_encdec(src_val, d->round_keys[2], 1);
  306. src_val = des_encdec(src_val, d->round_keys[1], 0);
  307. }
  308. dst_val = des_encdec(src_val, d->round_keys[0], 1) ^ iv_val;
  309. iv_val = iv ? tmp : 0;
  310. } else {
  311. dst_val = des_encdec(src_val ^ iv_val, d->round_keys[0], 0);
  312. if (d->triple_des) {
  313. dst_val = des_encdec(dst_val, d->round_keys[1], 1);
  314. dst_val = des_encdec(dst_val, d->round_keys[2], 0);
  315. }
  316. iv_val = iv ? dst_val : 0;
  317. }
  318. AV_WB64(dst, dst_val);
  319. src += 8;
  320. if (!mac)
  321. dst += 8;
  322. }
  323. if (iv)
  324. AV_WB64(iv, iv_val);
  325. }
  326. void av_des_crypt(AVDES *d, uint8_t *dst, const uint8_t *src, int count, uint8_t *iv, int decrypt) {
  327. av_des_crypt_mac(d, dst, src, count, iv, decrypt, 0);
  328. }
  329. void av_des_mac(AVDES *d, uint8_t *dst, const uint8_t *src, int count) {
  330. av_des_crypt_mac(d, dst, src, count, (uint8_t[8]){0}, 0, 1);
  331. }
  332. #ifdef TEST
  333. #include <stdlib.h>
  334. #include <stdio.h>
  335. #include "time.h"
  336. static uint64_t rand64(void) {
  337. uint64_t r = rand();
  338. r = (r << 32) | rand();
  339. return r;
  340. }
  341. static const uint8_t test_key[] = {0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0};
  342. static const DECLARE_ALIGNED(8, uint8_t, plain)[] = {0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10};
  343. static const DECLARE_ALIGNED(8, uint8_t, crypt)[] = {0x4a, 0xb6, 0x5b, 0x3d, 0x4b, 0x06, 0x15, 0x18};
  344. static DECLARE_ALIGNED(8, uint8_t, tmp)[8];
  345. static DECLARE_ALIGNED(8, uint8_t, large_buffer)[10002][8];
  346. static const uint8_t cbc_key[] = {
  347. 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
  348. 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0x01,
  349. 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0x01, 0x23
  350. };
  351. static int run_test(int cbc, int decrypt) {
  352. AVDES d;
  353. int delay = cbc && !decrypt ? 2 : 1;
  354. uint64_t res;
  355. AV_WB64(large_buffer[0], 0x4e6f772069732074ULL);
  356. AV_WB64(large_buffer[1], 0x1234567890abcdefULL);
  357. AV_WB64(tmp, 0x1234567890abcdefULL);
  358. av_des_init(&d, cbc_key, 192, decrypt);
  359. av_des_crypt(&d, large_buffer[delay], large_buffer[0], 10000, cbc ? tmp : NULL, decrypt);
  360. res = AV_RB64(large_buffer[9999 + delay]);
  361. if (cbc) {
  362. if (decrypt)
  363. return res == 0xc5cecf63ecec514cULL;
  364. else
  365. return res == 0xcb191f85d1ed8439ULL;
  366. } else {
  367. if (decrypt)
  368. return res == 0x8325397644091a0aULL;
  369. else
  370. return res == 0xdd17e8b8b437d232ULL;
  371. }
  372. }
  373. int main(void) {
  374. AVDES d;
  375. int i;
  376. #ifdef GENTABLES
  377. int j;
  378. #endif
  379. uint64_t key[3];
  380. uint64_t data;
  381. uint64_t ct;
  382. uint64_t roundkeys[16];
  383. srand(av_gettime());
  384. key[0] = AV_RB64(test_key);
  385. data = AV_RB64(plain);
  386. gen_roundkeys(roundkeys, key[0]);
  387. if (des_encdec(data, roundkeys, 0) != AV_RB64(crypt)) {
  388. printf("Test 1 failed\n");
  389. return 1;
  390. }
  391. av_des_init(&d, test_key, 64, 0);
  392. av_des_crypt(&d, tmp, plain, 1, NULL, 0);
  393. if (memcmp(tmp, crypt, sizeof(crypt))) {
  394. printf("Public API decryption failed\n");
  395. return 1;
  396. }
  397. if (!run_test(0, 0) || !run_test(0, 1) || !run_test(1, 0) || !run_test(1, 1)) {
  398. printf("Partial Monte-Carlo test failed\n");
  399. return 1;
  400. }
  401. for (i = 0; i < 1000; i++) {
  402. key[0] = rand64(); key[1] = rand64(); key[2] = rand64();
  403. data = rand64();
  404. av_des_init(&d, key, 192, 0);
  405. av_des_crypt(&d, &ct, &data, 1, NULL, 0);
  406. av_des_init(&d, key, 192, 1);
  407. av_des_crypt(&d, &ct, &ct, 1, NULL, 1);
  408. if (ct != data) {
  409. printf("Test 2 failed\n");
  410. return 1;
  411. }
  412. }
  413. #ifdef GENTABLES
  414. printf("static const uint32_t S_boxes_P_shuffle[8][64] = {\n");
  415. for (i = 0; i < 8; i++) {
  416. printf(" {");
  417. for (j = 0; j < 64; j++) {
  418. uint32_t v = S_boxes[i][j >> 1];
  419. v = j & 1 ? v >> 4 : v & 0xf;
  420. v <<= 28 - 4 * i;
  421. v = shuffle(v, P_shuffle, sizeof(P_shuffle));
  422. printf((j & 7) == 0 ? "\n " : " ");
  423. printf("0x%08X,", v);
  424. }
  425. printf("\n },\n");
  426. }
  427. printf("};\n");
  428. #endif
  429. return 0;
  430. }
  431. #endif