os/security/crypto/weakcrypto/source/symmetric/des.cpp
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description: 
sl@0
    15
*
sl@0
    16
*/
sl@0
    17
sl@0
    18
sl@0
    19
#include "des.h"
sl@0
    20
#include "destables.h"
sl@0
    21
#include "../common/inlines.h"
sl@0
    22
#include "des.inl"
sl@0
    23
#include <cryptostrength.h>
sl@0
    24
sl@0
    25
const TInt KDESBlockBytes = 8;
sl@0
    26
const TInt KDESKeyBytes = 8;
sl@0
    27
sl@0
    28
//	bit 0 is left-most in byte
sl@0
    29
static const TInt bytebit[] = {0200,0100,040,020,010,04,02,01};
sl@0
    30
sl@0
    31
void CDES::Transform(TDes8& aBlock)
sl@0
    32
	{
sl@0
    33
	assert(aBlock.Size() == KDESBlockBytes);
sl@0
    34
sl@0
    35
	TUint32 l, r;
sl@0
    36
	// Split the block into 2 word-sized big endian portions
sl@0
    37
	GetBlockBigEndian((TUint8*)&aBlock[0], l, r);
sl@0
    38
sl@0
    39
	IPerm(l,r);
sl@0
    40
sl@0
    41
	CDES::DoTransform(l, r, iK1);
sl@0
    42
		
sl@0
    43
	FPerm(l,r);
sl@0
    44
sl@0
    45
	// Put the portions back into the block as little endian
sl@0
    46
	PutBlockBigEndian((TUint8*)&aBlock[0], r, l);
sl@0
    47
	}
sl@0
    48
sl@0
    49
void CDES::DoTransform(TUint32& l, TUint32& r, const TUint32* aKey)
sl@0
    50
	{
sl@0
    51
	TInt i = 0;
sl@0
    52
	for (; i<8; i++)
sl@0
    53
		{
sl@0
    54
		TUint32 work = rotrFixed(r, 4U) ^ aKey[4*i+0];
sl@0
    55
		l ^= DES_TABLE::sbox[6][(work) & 0x3f]
sl@0
    56
		  ^  DES_TABLE::sbox[4][(work >> 8) & 0x3f]
sl@0
    57
		  ^  DES_TABLE::sbox[2][(work >> 16) & 0x3f]
sl@0
    58
		  ^  DES_TABLE::sbox[0][(work >> 24) & 0x3f];
sl@0
    59
		work = r ^ aKey[4*i+1];
sl@0
    60
		l ^= DES_TABLE::sbox[7][(work) & 0x3f]
sl@0
    61
		  ^  DES_TABLE::sbox[5][(work >> 8) & 0x3f]
sl@0
    62
		  ^  DES_TABLE::sbox[3][(work >> 16) & 0x3f]
sl@0
    63
		  ^  DES_TABLE::sbox[1][(work >> 24) & 0x3f];
sl@0
    64
sl@0
    65
		work = rotrFixed(l, 4U) ^ aKey[4*i+2];
sl@0
    66
		r ^= DES_TABLE::sbox[6][(work) & 0x3f]
sl@0
    67
		  ^  DES_TABLE::sbox[4][(work >> 8) & 0x3f]
sl@0
    68
		  ^  DES_TABLE::sbox[2][(work >> 16) & 0x3f]
sl@0
    69
		  ^  DES_TABLE::sbox[0][(work >> 24) & 0x3f];
sl@0
    70
		work = l ^ aKey[4*i+3];
sl@0
    71
		r ^= DES_TABLE::sbox[7][(work) & 0x3f]
sl@0
    72
		  ^  DES_TABLE::sbox[5][(work >> 8) & 0x3f]
sl@0
    73
		  ^  DES_TABLE::sbox[3][(work >> 16) & 0x3f]
sl@0
    74
		  ^  DES_TABLE::sbox[1][(work >> 24) & 0x3f];
sl@0
    75
		}
sl@0
    76
	}
sl@0
    77
sl@0
    78
sl@0
    79
TInt CDES::BlockSize() const
sl@0
    80
	{
sl@0
    81
	return KDESBlockBytes;
sl@0
    82
	}
sl@0
    83
sl@0
    84
TInt CDES::KeySize() const
sl@0
    85
	{
sl@0
    86
	return KDESKeyBytes;
sl@0
    87
	}
sl@0
    88
sl@0
    89
CDES::~CDES()
sl@0
    90
	{
sl@0
    91
	delete iKey;
sl@0
    92
	}
sl@0
    93
sl@0
    94
void CDES::ConstructL(const TDesC8& aKey, TBool /*aCheckWeakKey*/)
sl@0
    95
	{
sl@0
    96
	assert(aKey.Size() == KDESKeyBytes);
sl@0
    97
sl@0
    98
	iKey = aKey.AllocL();
sl@0
    99
	SetKey(aKey, iK1);
sl@0
   100
	}
sl@0
   101
sl@0
   102
CDES::CDES()
sl@0
   103
	{
sl@0
   104
	}
sl@0
   105
sl@0
   106
typedef TUint8 TKeyDES[KDESKeyBytes];
sl@0
   107
const TInt KKnownWeakKeysCount = 16;
sl@0
   108
const TKeyDES weak_keys[KKnownWeakKeysCount] =
sl@0
   109
	{
sl@0
   110
	/* weak keys */
sl@0
   111
	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
sl@0
   112
	{0xFE,0xFE,0xFE,0xFE,0xFE,0xFE,0xFE,0xFE},
sl@0
   113
	{0x1E,0x1E,0x1E,0x1E,0x0E,0x0E,0x0E,0x0E},
sl@0
   114
	{0xE0,0xE0,0xE0,0xE0,0xF0,0xF0,0xF0,0xF0},
sl@0
   115
	{0x00,0xFE,0x00,0xFE,0x00,0xFE,0x00,0xFE},
sl@0
   116
	{0xFE,0x00,0xFE,0x00,0xFE,0x00,0xFE,0x00},
sl@0
   117
	{0x1E,0xE0,0x1E,0xE0,0x0E,0xF0,0x0E,0xF0},
sl@0
   118
	{0xE0,0x1E,0xE0,0x1E,0xF0,0x0E,0xF0,0x0E},
sl@0
   119
	{0x00,0xE0,0x00,0xE0,0x00,0xF0,0x00,0xF0},
sl@0
   120
	{0xE0,0x00,0xE0,0x00,0xF0,0x00,0xF0,0x00},
sl@0
   121
	{0x1E,0xFE,0x1E,0xFE,0x0E,0xFE,0x0E,0xFE},
sl@0
   122
	{0xFE,0x1E,0xFE,0x1E,0xFE,0x0E,0xFE,0x0E},
sl@0
   123
	{0x00,0x1E,0x00,0x1E,0x00,0x0E,0x00,0x0E},
sl@0
   124
	{0x1E,0x00,0x1E,0x00,0x0E,0x00,0x0E,0x00},
sl@0
   125
	{0xE0,0xFE,0xE0,0xFE,0xF0,0xFE,0xF0,0xFE},
sl@0
   126
	{0xFE,0xE0,0xFE,0xE0,0xFE,0xF0,0xFE,0xF0}
sl@0
   127
	};
sl@0
   128
sl@0
   129
void CDES::SetKey(const TDesC8& aKey, TUint32* aKeyBuffer)
sl@0
   130
	{
sl@0
   131
	TInt i=0, j=0, l=0, m=0;
sl@0
   132
sl@0
   133
//	Form a byte array from aKey, taking endianess into account (little->big)	
sl@0
   134
	TUint8 key[8];								//	For big endian byte array	
sl@0
   135
	Mem::Copy(&key, &aKey[0], 8);
sl@0
   136
sl@0
   137
	TUint8 buffer[56+56+8];
sl@0
   138
	TUint8* const pc1m = &buffer[0];			/* place to modify pc1 into */
sl@0
   139
	TUint8* const pcr = pc1m + 56;				/* place to rotate pc1 into */
sl@0
   140
	TUint8* const ks = pcr + 56;
sl@0
   141
sl@0
   142
	for (j=0; j<56; j++) 
sl@0
   143
		{/* convert pc1 to bits of key */
sl@0
   144
		l = DES_TABLE::pc1[j]-1;				/* integer bit location  */
sl@0
   145
		m = l & 07;								/* find bit              */
sl@0
   146
		pc1m[j]=(key[l>>3] &					/* find which key byte l is in */
sl@0
   147
			bytebit[m])							/* and which bit of that byte */
sl@0
   148
			? (TUint8)1 : (TUint8)0;			/* and store 1-bit result */
sl@0
   149
		}
sl@0
   150
sl@0
   151
	for (i=0; i<16; i++) 
sl@0
   152
		{/* key chunk for each iteration */
sl@0
   153
		Mem::FillZ(ks,8);							/* Clear key schedule */
sl@0
   154
		for (j=0; j<56; j++)
sl@0
   155
		/*	rotate pc1 the right amount */
sl@0
   156
			pcr[j] = pc1m[(l=j+DES_TABLE::totrot[i])<(j<28? 28 : 56) ? l: l-28];
sl@0
   157
		
sl@0
   158
		/* rotate left and right halves independently */
sl@0
   159
		
sl@0
   160
		for (j=0; j<48; j++)
sl@0
   161
			{/* select bits individually */
sl@0
   162
			/* check bit that goes to ks[j] */
sl@0
   163
			if (pcr[DES_TABLE::pc2[j]-1])
sl@0
   164
				{/* mask it in if it's there */
sl@0
   165
				l= j % 6;
sl@0
   166
				ks[j/6] |= bytebit[l] >> 2;
sl@0
   167
				}
sl@0
   168
			}
sl@0
   169
sl@0
   170
		/* Now convert to odd/even interleaved form for use in F */
sl@0
   171
		(*(aKeyBuffer+(2*i))) = ((TUint32)ks[0] << 24)
sl@0
   172
			| ((TUint32)ks[2] << 16)
sl@0
   173
			| ((TUint32)ks[4] << 8)
sl@0
   174
			| ((TUint32)ks[6]);
sl@0
   175
		
sl@0
   176
		(*(aKeyBuffer+(2*i+1))) = ((TUint32)ks[1] << 24)
sl@0
   177
			| ((TUint32)ks[3] << 16)
sl@0
   178
			| ((TUint32)ks[5] << 8)
sl@0
   179
			| ((TUint32)ks[7]);
sl@0
   180
		}
sl@0
   181
	}
sl@0
   182
sl@0
   183
void CDES::Reset()
sl@0
   184
	{
sl@0
   185
	SetKey(*iKey, iK1);
sl@0
   186
	}
sl@0
   187
sl@0
   188
sl@0
   189
/* CDESEncryptor */
sl@0
   190
sl@0
   191
EXPORT_C CDESEncryptor* CDESEncryptor::NewL(const TDesC8& aKey, 
sl@0
   192
	TBool aCheckWeakKey)
sl@0
   193
	{
sl@0
   194
	CDESEncryptor* me = CDESEncryptor::NewLC(aKey, aCheckWeakKey);
sl@0
   195
	CleanupStack::Pop(me);
sl@0
   196
	return (me);
sl@0
   197
	}
sl@0
   198
sl@0
   199
EXPORT_C CDESEncryptor* CDESEncryptor::NewLC(const TDesC8& aKey, 
sl@0
   200
	TBool aCheckWeakKey)
sl@0
   201
	{
sl@0
   202
	CDESEncryptor* me = new (ELeave) CDESEncryptor();
sl@0
   203
	CleanupStack::PushL(me);
sl@0
   204
	me->ConstructL(aKey, aCheckWeakKey);
sl@0
   205
	// DES only used 7 bits out of every key byte
sl@0
   206
	TCrypto::IsSymmetricWeakEnoughL(BytesToBits(aKey.Size()) - aKey.Size());
sl@0
   207
	return (me);
sl@0
   208
	}
sl@0
   209
sl@0
   210
CDESEncryptor::CDESEncryptor()
sl@0
   211
	{
sl@0
   212
	}
sl@0
   213
sl@0
   214
/* CDESDecryptor */
sl@0
   215
sl@0
   216
EXPORT_C CDESDecryptor* CDESDecryptor::NewL(const TDesC8& aKey, 
sl@0
   217
	TBool aCheckWeakKey)
sl@0
   218
	{
sl@0
   219
	CDESDecryptor* me = CDESDecryptor::NewLC(aKey, aCheckWeakKey);
sl@0
   220
	CleanupStack::Pop(me);
sl@0
   221
	return (me);
sl@0
   222
	}
sl@0
   223
sl@0
   224
EXPORT_C CDESDecryptor* CDESDecryptor::NewLC(const TDesC8& aKey, 
sl@0
   225
	TBool aCheckWeakKey)
sl@0
   226
	{
sl@0
   227
	CDESDecryptor* me = new (ELeave) CDESDecryptor();
sl@0
   228
	CleanupStack::PushL(me);
sl@0
   229
	me->ConstructL(aKey, aCheckWeakKey);
sl@0
   230
	// DES only used 7 bits out of every key byte
sl@0
   231
	TCrypto::IsSymmetricWeakEnoughL(BytesToBits(aKey.Size()) - aKey.Size());
sl@0
   232
	return (me);
sl@0
   233
	}
sl@0
   234
sl@0
   235
sl@0
   236
CDESDecryptor::CDESDecryptor()
sl@0
   237
	{
sl@0
   238
	}
sl@0
   239
sl@0
   240
void CDESDecryptor::SetKey(const TDesC8& aKey, TUint32* aKeyBuffer)
sl@0
   241
	{
sl@0
   242
	CDES::SetKey(aKey, aKeyBuffer);
sl@0
   243
sl@0
   244
	ReverseKeySchedule(iK1);
sl@0
   245
	}
sl@0
   246
sl@0
   247
EXPORT_C TBool CDES::IsWeakKey(const TDesC8& aKey)
sl@0
   248
	{
sl@0
   249
	TKeyDES key;
sl@0
   250
	TInt index = 0;
sl@0
   251
	//Reset parity bits
sl@0
   252
	for(; index < KDESKeyBytes; index++)
sl@0
   253
		{
sl@0
   254
		key[index] = aKey[index] & 0xFE;
sl@0
   255
		}
sl@0
   256
		
sl@0
   257
	TBool weak = EFalse;	
sl@0
   258
	//Compare key with potential weak keys without parity	
sl@0
   259
	for (index=0; index < KKnownWeakKeysCount; index++)
sl@0
   260
		{
sl@0
   261
		if (Mem::Compare(weak_keys[index], KDESKeyBytes, &key[0], KDESKeyBytes)==0)
sl@0
   262
			{
sl@0
   263
			weak = ETrue;
sl@0
   264
			break;
sl@0
   265
			}
sl@0
   266
		}
sl@0
   267
	return weak;
sl@0
   268
	}
sl@0
   269