PandA-2024.02
bf_cfb64.c
Go to the documentation of this file.
1 /*
2 +--------------------------------------------------------------------------+
3 | CHStone : a suite of benchmark programs for C-based High-Level Synthesis |
4 | ======================================================================== |
5 | |
6 | * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, |
7 | H. Takada and K. Ishii |
8 | Nagoya University, Japan |
9 | |
10 | * Remark : |
11 | 1. This source code is modified to unify the formats of the benchmark |
12 | programs in CHStone. |
13 | 2. Test vectors are added for CHStone. |
14 | 3. If "main_result" is 0 at the end of the program, the program is |
15 | correctly executed. |
16 | 4. Please follow the copyright of each benchmark program. |
17 +--------------------------------------------------------------------------+
18 */
19 /* crypto/bf/bf_cfb64.c */
20 /* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
21  * All rights reserved.
22  *
23  * This package is an SSL implementation written
24  * by Eric Young (eay@mincom.oz.au).
25  * The implementation was written so as to conform with Netscapes SSL.
26  *
27  * This library is free for commercial and non-commercial use as long as
28  * the following conditions are aheared to. The following conditions
29  * apply to all code found in this distribution, be it the RC4, RSA,
30  * lhash, DES, etc., code; not just the SSL code. The SSL documentation
31  * included with this distribution is covered by the same copyright terms
32  * except that the holder is Tim Hudson (tjh@mincom.oz.au).
33  *
34  * Copyright remains Eric Young's, and as such any Copyright notices in
35  * the code are not to be removed.
36  * If this package is used in a product, Eric Young should be given attribution
37  * as the author of the parts of the library used.
38  * This can be in the form of a textual message at program startup or
39  * in documentation (online or textual) provided with the package.
40  *
41  * Redistribution and use in source and binary forms, with or without
42  * modification, are permitted provided that the following conditions
43  * are met:
44  * 1. Redistributions of source code must retain the copyright
45  * notice, this list of conditions and the following disclaimer.
46  * 2. Redistributions in binary form must reproduce the above copyright
47  * notice, this list of conditions and the following disclaimer in the
48  * documentation and/or other materials provided with the distribution.
49  * 3. All advertising materials mentioning features or use of this software
50  * must display the following acknowledgement:
51  * "This product includes cryptographic software written by
52  * Eric Young (eay@mincom.oz.au)"
53  * The word 'cryptographic' can be left out if the rouines from the library
54  * being used are not cryptographic related :-).
55  * 4. If you include any Windows specific code (or a derivative thereof) from
56  * the apps directory (application code) you must include an acknowledgement:
57  * "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
58  *
59  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
60  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62  * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
63  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
69  * SUCH DAMAGE.
70  *
71  * The licence and distribution terms for any publically available version or
72  * derivative of this code cannot be changed. i.e. this code cannot simply be
73  * copied and put under another distribution licence
74  * [including the GNU Public Licence.]
75  */
76 /* The input and output encrypted as though 64bit cfb mode is being
77  * used. The extra state information to record how much of the
78  * 64bit block we have used is contained in *num;
79  */
80 
81 extern void __builtin_bambu_time_start();
82 extern void __builtin_bambu_time_stop();
83 
84 void
85 __attribute__ ((noinline))
86 BF_cfb64_encrypt (in, out, length, ivec, num, encrypt)
87  unsigned char *in;
88  unsigned char *out;
89  long length;
90  unsigned char *ivec;
91  int *num;
92  int encrypt;
93 {
94  register BF_LONG v0, v1, t;
95  register int n;
96  register long l;
97  BF_LONG ti[2];
98  unsigned char *iv, c, cc;
99 
101  n = *num;
102  l = length;
103  iv = (unsigned char *) ivec;
104  if (encrypt)
105  {
106  while (l--)
107  {
108  if (n == 0)
109  {
110  n2l (iv, v0);
111  ti[0] = v0;
112  n2l (iv, v1);
113  ti[1] = v1;
114  BF_encrypt ((unsigned long *) ti, BF_ENCRYPT);
115  iv = (unsigned char *) ivec;
116  t = ti[0];
117  l2n (t, iv);
118  t = ti[1];
119  l2n (t, iv);
120 
121  iv = (unsigned char *) ivec;
122  }
123  c = *(in++) ^ iv[n];
124  *(out++) = c;
125  iv[n] = c;
126  n = (n + 1) & 0x07;
127  }
128  }
129  else
130  {
131  while (l--)
132  {
133  if (n == 0)
134  {
135  n2l (iv, v0);
136  ti[0] = v0;
137  n2l (iv, v1);
138  ti[1] = v1;
139  BF_encrypt ((unsigned long *) ti, BF_ENCRYPT);
140  iv = (unsigned char *) ivec;
141  t = ti[0];
142  l2n (t, iv);
143  t = ti[1];
144  l2n (t, iv);
145  iv = (unsigned char *) ivec;
146  }
147  cc = *(in++);
148  c = iv[n];
149  iv[n] = cc;
150  *(out++) = c ^ cc;
151  n = (n + 1) & 0x07;
152  }
153  }
154  v0 = v1 = ti[0] = ti[1] = t = c = cc = 0;
155  *num = n;
157 }
#define BF_LONG
Definition: blowfish.h:86
#define n2l(c, l)
Definition: bf_locl.h:85
#define BF_ENCRYPT
Definition: blowfish.h:80
void BF_cfb64_encrypt(unsigned char *in, unsigned char *out, long length, unsigned char *ivec, int *num, int encrypt)
Definition: bf_cfb64.c:82
int encrypt(int *, int *, int)
void __attribute__((noinline))
Definition: bf_cfb64.c:85
void BF_encrypt(BF_LONG *data, int encrypt)
Definition: bf_enc.c:82
void __builtin_bambu_time_start()
#define l2n(l, c)
Definition: bf_locl.h:91
void __builtin_bambu_time_stop()

Generated on Mon Feb 12 2024 13:02:48 for PandA-2024.02 by doxygen 1.8.13