1 | #include <machine/rtems-bsd-kernel-space.h> |
---|
2 | |
---|
3 | /* crypto/bf/bf_ecb.c */ |
---|
4 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
---|
5 | * All rights reserved. |
---|
6 | * |
---|
7 | * This package is an SSL implementation written |
---|
8 | * by Eric Young (eay@cryptsoft.com). |
---|
9 | * The implementation was written so as to conform with Netscapes SSL. |
---|
10 | * |
---|
11 | * This library is free for commercial and non-commercial use as long as |
---|
12 | * the following conditions are aheared to. The following conditions |
---|
13 | * apply to all code found in this distribution, be it the RC4, RSA, |
---|
14 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
---|
15 | * included with this distribution is covered by the same copyright terms |
---|
16 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
---|
17 | * |
---|
18 | * Copyright remains Eric Young's, and as such any Copyright notices in |
---|
19 | * the code are not to be removed. |
---|
20 | * If this package is used in a product, Eric Young should be given attribution |
---|
21 | * as the author of the parts of the library used. |
---|
22 | * This can be in the form of a textual message at program startup or |
---|
23 | * in documentation (online or textual) provided with the package. |
---|
24 | * |
---|
25 | * Redistribution and use in source and binary forms, with or without |
---|
26 | * modification, are permitted provided that the following conditions |
---|
27 | * are met: |
---|
28 | * 1. Redistributions of source code must retain the copyright |
---|
29 | * notice, this list of conditions and the following disclaimer. |
---|
30 | * 2. Redistributions in binary form must reproduce the above copyright |
---|
31 | * notice, this list of conditions and the following disclaimer in the |
---|
32 | * documentation and/or other materials provided with the distribution. |
---|
33 | * 3. All advertising materials mentioning features or use of this software |
---|
34 | * must display the following acknowledgement: |
---|
35 | * "This product includes cryptographic software written by |
---|
36 | * Eric Young (eay@cryptsoft.com)" |
---|
37 | * The word 'cryptographic' can be left out if the rouines from the library |
---|
38 | * being used are not cryptographic related :-). |
---|
39 | * 4. If you include any Windows specific code (or a derivative thereof) from |
---|
40 | * the apps directory (application code) you must include an acknowledgement: |
---|
41 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
---|
42 | * |
---|
43 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
---|
44 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
---|
45 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
---|
46 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
---|
47 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
---|
48 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
---|
49 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
---|
50 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
---|
51 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
---|
52 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
---|
53 | * SUCH DAMAGE. |
---|
54 | * |
---|
55 | * The licence and distribution terms for any publically available version or |
---|
56 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
---|
57 | * copied and put under another distribution licence |
---|
58 | * [including the GNU Public Licence.] |
---|
59 | */ |
---|
60 | |
---|
61 | #include <sys/cdefs.h> |
---|
62 | __FBSDID("$FreeBSD$"); |
---|
63 | |
---|
64 | #include <sys/types.h> |
---|
65 | #include <crypto/blowfish/blowfish.h> |
---|
66 | #include <crypto/blowfish/bf_locl.h> |
---|
67 | |
---|
68 | /* Blowfish as implemented from 'Blowfish: Springer-Verlag paper' |
---|
69 | * (From LECTURE NOTES IN COMPUTER SCIENCE 809, FAST SOFTWARE ENCRYPTION, |
---|
70 | * CAMBRIDGE SECURITY WORKSHOP, CAMBRIDGE, U.K., DECEMBER 9-11, 1993) |
---|
71 | */ |
---|
72 | |
---|
73 | void BF_ecb_encrypt(const unsigned char *in, unsigned char *out, |
---|
74 | BF_KEY *key, int encrypt) |
---|
75 | { |
---|
76 | BF_LONG l,d[2]; |
---|
77 | |
---|
78 | n2l(in,l); d[0]=l; |
---|
79 | n2l(in,l); d[1]=l; |
---|
80 | if (encrypt) |
---|
81 | BF_encrypt(d,key); |
---|
82 | else |
---|
83 | BF_decrypt(d,key); |
---|
84 | l=d[0]; l2n(l,out); |
---|
85 | l=d[1]; l2n(l,out); |
---|
86 | l=d[0]=d[1]=0; |
---|
87 | } |
---|
88 | |
---|