#include <libkern/crypto/crypto_internal.h>
#include <libkern/libkern.h>
#include <kern/debug.h>
#include <libkern/crypto/des.h>
#include <corecrypto/ccmode.h>
int des_ecb_key_sched(des_cblock *key, des_ecb_key_schedule *ks)
{
const struct ccmode_ecb *enc = g_crypto_funcs->ccdes_ecb_encrypt;
const struct ccmode_ecb *dec = g_crypto_funcs->ccdes_ecb_decrypt;
if((enc->size>sizeof(ks->enc)) || (dec->size>sizeof(ks->dec)))
panic("%s: inconsistent size for DES-ECB context", __FUNCTION__);
enc->init(enc, ks->enc, CCDES_KEY_SIZE, key);
dec->init(dec, ks->dec, CCDES_KEY_SIZE, key);
return 0;
}
void des_ecb_encrypt(des_cblock *in, des_cblock *out, des_ecb_key_schedule *ks, int enc)
{
const struct ccmode_ecb *ecb = enc ? g_crypto_funcs->ccdes_ecb_encrypt : g_crypto_funcs->ccdes_ecb_decrypt;
ccecb_ctx *ctx = enc ? ks->enc : ks->dec;
ecb->ecb(ctx, 1, in, out);
}
int des3_ecb_key_sched(des_cblock *key, des3_ecb_key_schedule *ks)
{
const struct ccmode_ecb *enc = g_crypto_funcs->cctdes_ecb_encrypt;
const struct ccmode_ecb *dec = g_crypto_funcs->cctdes_ecb_decrypt;
if((enc->size>sizeof(ks->enc)) || (dec->size>sizeof(ks->dec)))
panic("%s: inconsistent size for 3DES-ECB context", __FUNCTION__);
enc->init(enc, ks->enc, CCDES_KEY_SIZE*3, key);
dec->init(dec, ks->dec, CCDES_KEY_SIZE*3, key);
return 0;
}
void des3_ecb_encrypt(des_cblock *in, des_cblock *out, des3_ecb_key_schedule *ks, int enc)
{
const struct ccmode_ecb *ecb = enc ? g_crypto_funcs->cctdes_ecb_encrypt : g_crypto_funcs->cctdes_ecb_decrypt;
ccecb_ctx *ctx = enc ? ks->enc : ks->dec;
ecb->ecb(ctx, 1, in, out);
}
int des_cbc_key_sched(des_cblock *key, des_cbc_key_schedule *ks)
{
const struct ccmode_cbc *enc = g_crypto_funcs->ccdes_cbc_encrypt;
const struct ccmode_cbc *dec = g_crypto_funcs->ccdes_cbc_decrypt;
if((enc->size>sizeof(ks->enc)) || (dec->size>sizeof(ks->dec)))
panic("%s: inconsistent size for DES-CBC context", __FUNCTION__);
cccbc_init(enc, ks->enc, CCDES_KEY_SIZE, key);
cccbc_init(dec, ks->dec, CCDES_KEY_SIZE, key);
return 0;
}
void
des_cbc_encrypt(des_cblock *in, des_cblock *out, int32_t length,
des_cbc_key_schedule *ks, des_cblock *iv, des_cblock *retiv, int encrypt)
{
const struct ccmode_cbc *cbc = encrypt?g_crypto_funcs->ccdes_cbc_encrypt:g_crypto_funcs->ccdes_cbc_decrypt;
cccbc_ctx *ctx = encrypt ? ks->enc : ks->dec;
int nblocks;
cccbc_iv_decl(cbc->block_size, ctx_iv);
assert(length%8==0);
nblocks=length/8;
cccbc_set_iv(cbc, ctx_iv, iv);
cccbc_update(cbc, ctx, ctx_iv, nblocks, in, out);
if(retiv)
memcpy(retiv, ctx_iv, 8);
}
int des3_cbc_key_sched(des_cblock *key, des3_cbc_key_schedule *ks)
{
const struct ccmode_cbc *enc = g_crypto_funcs->cctdes_cbc_encrypt;
const struct ccmode_cbc *dec = g_crypto_funcs->cctdes_cbc_decrypt;
if((enc->size>sizeof(ks->enc)) || (dec->size>sizeof(ks->dec)))
panic("%s: inconsistent size for 3DES-CBC context", __FUNCTION__);
cccbc_init(enc, ks->enc, CCDES_KEY_SIZE*3, key);
cccbc_init(dec, ks->dec, CCDES_KEY_SIZE*3, key);
return 0;
}
void
des3_cbc_encrypt(des_cblock *in, des_cblock *out, int32_t length,
des3_cbc_key_schedule *ks, des_cblock *iv, des_cblock *retiv, int encrypt)
{
const struct ccmode_cbc *cbc = encrypt?g_crypto_funcs->cctdes_cbc_encrypt:g_crypto_funcs->cctdes_cbc_decrypt;
cccbc_ctx *ctx = encrypt ? ks->enc : ks->dec;
int nblocks;
cccbc_iv_decl(cbc->block_size, ctx_iv);
assert(length%8==0);
nblocks=length/8;
cccbc_set_iv(cbc, ctx_iv, iv);
cccbc_update(cbc, ctx, ctx_iv, nblocks, in, out);
if(retiv)
memcpy(retiv, ctx_iv, 8);
}
void
des_cbc_cksum(des_cblock *in, des_cblock *out,
int len, des_cbc_key_schedule *ks)
{
const struct ccmode_cbc *cbc = g_crypto_funcs->ccdes_cbc_encrypt;
int nblocks;
des_cblock cksum;
cccbc_iv_decl(cbc->block_size, ctx_iv);
assert(len%8==0);
nblocks=len/8;
cccbc_set_iv(cbc, ctx_iv, NULL);
while(nblocks--) {
cccbc_update(cbc, ks->enc, ctx_iv, 1, in++, cksum);
}
memcpy(out, cksum, sizeof(des_cblock));
}
void des_fixup_key_parity(des_cblock *key)
{
g_crypto_funcs->ccdes_key_set_odd_parity_fn(key, CCDES_KEY_SIZE);
}
int des_is_weak_key(des_cblock *key)
{
return g_crypto_funcs->ccdes_key_is_weak_fn(key, CCDES_KEY_SIZE);
}