1d059297112922cabb0c674840589be8db821fd9aAdam Langley/* $OpenBSD: cipher-bf1.c,v 1.7 2015/01/14 10:24:42 markus Exp $ */
2bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/*
3bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Copyright (c) 2003 Markus Friedl.  All rights reserved.
4bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *
5d059297112922cabb0c674840589be8db821fd9aAdam Langley * Permission to use, copy, modify, and distribute this software for any
6d059297112922cabb0c674840589be8db821fd9aAdam Langley * purpose with or without fee is hereby granted, provided that the above
7d059297112922cabb0c674840589be8db821fd9aAdam Langley * copyright notice and this permission notice appear in all copies.
8bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *
9bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
10bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
11bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
12bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
13bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
14bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
15bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
16bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
17bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
18bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
19bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */
20bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
21bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include "includes.h"
22bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
23d059297112922cabb0c674840589be8db821fd9aAdam Langley#ifdef WITH_OPENSSL
24bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
25d059297112922cabb0c674840589be8db821fd9aAdam Langley#include <sys/types.h>
26bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
27bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include <stdarg.h>
28bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include <string.h>
29bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
30d059297112922cabb0c674840589be8db821fd9aAdam Langley#include <openssl/evp.h>
31bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
32bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include "openbsd-compat/openssl-compat.h"
33bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
34bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/*
35bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * SSH1 uses a variation on Blowfish, all bytes must be swapped before
36bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * and after encryption/decryption. Thus the swap_bytes stuff (yuk).
37bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */
38bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
39bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanconst EVP_CIPHER * evp_ssh1_bf(void);
40bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
41bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic void
42bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanswap_bytes(const u_char *src, u_char *dst, int n)
43bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{
44bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	u_char c[4];
45bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
46bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	/* Process 4 bytes every lap. */
47bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	for (n = n / 4; n > 0; n--) {
48bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		c[3] = *src++;
49bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		c[2] = *src++;
50bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		c[1] = *src++;
51bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		c[0] = *src++;
52bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
53bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		*dst++ = c[0];
54bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		*dst++ = c[1];
55bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		*dst++ = c[2];
56bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		*dst++ = c[3];
57bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	}
58bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman}
59bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
60bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#ifdef SSH_OLD_EVP
61bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic void bf_ssh1_init (EVP_CIPHER_CTX * ctx, const unsigned char *key,
62bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman			  const unsigned char *iv, int enc)
63bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{
64bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	if (iv != NULL)
65bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		memcpy (&(ctx->oiv[0]), iv, 8);
66bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	memcpy (&(ctx->iv[0]), &(ctx->oiv[0]), 8);
67bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	if (key != NULL)
68bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman		BF_set_key (&(ctx->c.bf_ks), EVP_CIPHER_CTX_key_length (ctx),
69bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman			    key);
70bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman}
71bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#endif
72bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
73bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic int (*orig_bf)(EVP_CIPHER_CTX *, u_char *,
74bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman    const u_char *, LIBCRYPTO_EVP_INL_TYPE) = NULL;
75bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
76bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic int
77bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanbf_ssh1_cipher(EVP_CIPHER_CTX *ctx, u_char *out, const u_char *in,
78bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman    LIBCRYPTO_EVP_INL_TYPE len)
79bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{
80bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	int ret;
81bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
82bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	swap_bytes(in, out, len);
83bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	ret = (*orig_bf)(ctx, out, out, len);
84bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	swap_bytes(out, out, len);
85bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	return (ret);
86bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman}
87bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
88bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanconst EVP_CIPHER *
89bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanevp_ssh1_bf(void)
90bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{
91bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	static EVP_CIPHER ssh1_bf;
92bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman
93bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	memcpy(&ssh1_bf, EVP_bf_cbc(), sizeof(EVP_CIPHER));
94bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	orig_bf = ssh1_bf.do_cipher;
95bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	ssh1_bf.nid = NID_undef;
96bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#ifdef SSH_OLD_EVP
97bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	ssh1_bf.init = bf_ssh1_init;
98bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#endif
99bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	ssh1_bf.do_cipher = bf_ssh1_cipher;
100bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	ssh1_bf.key_len = 32;
101bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman	return (&ssh1_bf);
102bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman}
103d059297112922cabb0c674840589be8db821fd9aAdam Langley#endif /* WITH_OPENSSL */
104