1d059297112922cabb0c674840589be8db821fd9aAdam Langley/* $OpenBSD: cipher-bf1.c,v 1.7 2015/01/14 10:24:42 markus Exp $ */ 2bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/* 3bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * Copyright (c) 2003 Markus Friedl. All rights reserved. 4bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 5d059297112922cabb0c674840589be8db821fd9aAdam Langley * Permission to use, copy, modify, and distribute this software for any 6d059297112922cabb0c674840589be8db821fd9aAdam Langley * purpose with or without fee is hereby granted, provided that the above 7d059297112922cabb0c674840589be8db821fd9aAdam Langley * copyright notice and this permission notice appear in all copies. 8bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * 9bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 10bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 11bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 12bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 13bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 14bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 15bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 16bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 17bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 18bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 19bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */ 20bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 21bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include "includes.h" 22bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 23d059297112922cabb0c674840589be8db821fd9aAdam Langley#ifdef WITH_OPENSSL 24bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 25d059297112922cabb0c674840589be8db821fd9aAdam Langley#include <sys/types.h> 26bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 27bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include <stdarg.h> 28bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include <string.h> 29bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 30d059297112922cabb0c674840589be8db821fd9aAdam Langley#include <openssl/evp.h> 31bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 32bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#include "openbsd-compat/openssl-compat.h" 33bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 34bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman/* 35bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * SSH1 uses a variation on Blowfish, all bytes must be swapped before 36bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman * and after encryption/decryption. Thus the swap_bytes stuff (yuk). 37bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman */ 38bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 39bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanconst EVP_CIPHER * evp_ssh1_bf(void); 40bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 41bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic void 42bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanswap_bytes(const u_char *src, u_char *dst, int n) 43bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{ 44bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman u_char c[4]; 45bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 46bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman /* Process 4 bytes every lap. */ 47bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman for (n = n / 4; n > 0; n--) { 48bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman c[3] = *src++; 49bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman c[2] = *src++; 50bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman c[1] = *src++; 51bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman c[0] = *src++; 52bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 53bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *dst++ = c[0]; 54bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *dst++ = c[1]; 55bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *dst++ = c[2]; 56bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman *dst++ = c[3]; 57bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman } 58bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} 59bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 60bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#ifdef SSH_OLD_EVP 61bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic void bf_ssh1_init (EVP_CIPHER_CTX * ctx, const unsigned char *key, 62bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman const unsigned char *iv, int enc) 63bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{ 64bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman if (iv != NULL) 65bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman memcpy (&(ctx->oiv[0]), iv, 8); 66bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman memcpy (&(ctx->iv[0]), &(ctx->oiv[0]), 8); 67bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman if (key != NULL) 68bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman BF_set_key (&(ctx->c.bf_ks), EVP_CIPHER_CTX_key_length (ctx), 69bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman key); 70bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} 71bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#endif 72bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 73bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic int (*orig_bf)(EVP_CIPHER_CTX *, u_char *, 74bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman const u_char *, LIBCRYPTO_EVP_INL_TYPE) = NULL; 75bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 76bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanstatic int 77bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanbf_ssh1_cipher(EVP_CIPHER_CTX *ctx, u_char *out, const u_char *in, 78bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman LIBCRYPTO_EVP_INL_TYPE len) 79bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{ 80bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman int ret; 81bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 82bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman swap_bytes(in, out, len); 83bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman ret = (*orig_bf)(ctx, out, out, len); 84bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman swap_bytes(out, out, len); 85bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman return (ret); 86bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} 87bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 88bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanconst EVP_CIPHER * 89bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartmanevp_ssh1_bf(void) 90bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman{ 91bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman static EVP_CIPHER ssh1_bf; 92bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman 93bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman memcpy(&ssh1_bf, EVP_bf_cbc(), sizeof(EVP_CIPHER)); 94bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman orig_bf = ssh1_bf.do_cipher; 95bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman ssh1_bf.nid = NID_undef; 96bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#ifdef SSH_OLD_EVP 97bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman ssh1_bf.init = bf_ssh1_init; 98bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman#endif 99bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman ssh1_bf.do_cipher = bf_ssh1_cipher; 100bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman ssh1_bf.key_len = 32; 101bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman return (&ssh1_bf); 102bd77cf78387b72b7b3ea870459077672bf75c3b5Greg Hartman} 103d059297112922cabb0c674840589be8db821fd9aAdam Langley#endif /* WITH_OPENSSL */ 104