/* crypto/evp/e_des3.c */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 * All rights reserved.
 *
 * This package is an SSL implementation written
 * by Eric Young (eay@cryptsoft.com).
 * The implementation was written so as to conform with Netscapes SSL.
 * 
 * This library is free for commercial and non-commercial use as long as
 * the following conditions are aheared to.  The following conditions
 * apply to all code found in this distribution, be it the RC4, RSA,
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 * included with this distribution is covered by the same copyright terms
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 * 
 * Copyright remains Eric Young's, and as such any Copyright notices in
 * the code are not to be removed.
 * If this package is used in a product, Eric Young should be given attribution
 * as the author of the parts of the library used.
 * This can be in the form of a textual message at program startup or
 * in documentation (online or textual) provided with the package.
 * 
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *    "This product includes cryptographic software written by
 *     Eric Young (eay@cryptsoft.com)"
 *    The word 'cryptographic' can be left out if the rouines from the library
 *    being used are not cryptographic related :-).
 * 4. If you include any Windows specific code (or a derivative thereof) from 
 *    the apps directory (application code) you must include an acknowledgement:
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 * 
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 * 
 * The licence and distribution terms for any publically available version or
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 * copied and put under another distribution licence
 * [including the GNU Public Licence.]
 */

#define OPENSSL_FIPSAPI

#include <stdio.h>
#include "cryptlib.h"
#ifndef OPENSSL_NO_DES
#include <openssl/evp.h>
#include <openssl/objects.h>
#include "evp_locl.h"
#include <openssl/des.h>
#include <openssl/rand.h>

typedef struct
	{
	union { double align; DES_key_schedule ks[3]; } ks;
	union {
		void (*cbc)(const void *,void *,size_t,const void *,void *);
	} stream;
	} DES_EDE_KEY;
#define ks1 ks.ks[0]
#define ks2 ks.ks[1]
#define ks3 ks.ks[2]

#if defined(AES_ASM) && (defined(__sparc) || defined(__sparc__))
/* ---------^^^ this is not a typo, just a way to detect that
 * assembler support was in general requested... */
#include "sparc_arch.h"

extern unsigned int OPENSSL_sparcv9cap_P[];

#define SPARC_DES_CAPABLE	(OPENSSL_sparcv9cap_P[1] & CFR_DES)

void	des_t4_key_expand(const void *key, DES_key_schedule *ks);
void	des_t4_ede3_cbc_encrypt(const void *inp,void *out,size_t len,
				DES_key_schedule *ks,unsigned char iv[8]);
void	des_t4_ede3_cbc_decrypt(const void *inp,void *out,size_t len,
				DES_key_schedule *ks,unsigned char iv[8]);
#endif

static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
			    const unsigned char *iv,int enc);

static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
			     const unsigned char *iv,int enc);

static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr);

#define data(ctx) ((DES_EDE_KEY *)(ctx)->cipher_data)

/* Because of various casts and different args can't use IMPLEMENT_BLOCK_CIPHER */

static int des_ede_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
			      const unsigned char *in, size_t inl)
{
	BLOCK_CIPHER_ecb_loop()
		DES_ecb3_encrypt((const_DES_cblock *)(in + i),
				 (DES_cblock *)(out + i),
				 &data(ctx)->ks1, &data(ctx)->ks2,
				 &data(ctx)->ks3,
				 ctx->encrypt);
	return 1;
}

static int des_ede_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
			      const unsigned char *in, size_t inl)
{
	while (inl>=EVP_MAXCHUNK)
		{
		DES_ede3_ofb64_encrypt(in, out, (long)EVP_MAXCHUNK,
			       &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3,
			       (DES_cblock *)ctx->iv, &ctx->num);
		inl-=EVP_MAXCHUNK;
		in +=EVP_MAXCHUNK;
		out+=EVP_MAXCHUNK;
		}
	if (inl)
		DES_ede3_ofb64_encrypt(in, out, (long)inl,
				&data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3,
                               (DES_cblock *)ctx->iv, &ctx->num);

	return 1;
}

static int des_ede_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
			      const unsigned char *in, size_t inl)
{
	DES_EDE_KEY *dat = data(ctx);

#ifdef KSSL_DEBUG
	{
        int i;
        char *cp;
	printf("des_ede_cbc_cipher(ctx=%lx, buflen=%d)\n", ctx, ctx->buf_len);
	printf("\t iv= ");
        for(i=0;i<8;i++)
                printf("%02X",ctx->iv[i]);
	printf("\n");
	}
#endif    /* KSSL_DEBUG */
	if (dat->stream.cbc)
		{
		(*dat->stream.cbc)(in,out,inl,&dat->ks,ctx->iv);
		return 1;
		}

	while (inl>=EVP_MAXCHUNK)
		{
		DES_ede3_cbc_encrypt(in, out, (long)EVP_MAXCHUNK,
			     &dat->ks1, &dat->ks2, &dat->ks3,
			     (DES_cblock *)ctx->iv, ctx->encrypt);
		inl-=EVP_MAXCHUNK;
		in +=EVP_MAXCHUNK;
		out+=EVP_MAXCHUNK;
		}
	if (inl)
		DES_ede3_cbc_encrypt(in, out, (long)inl,
			     &dat->ks1, &dat->ks2, &dat->ks3,
                             (DES_cblock *)ctx->iv, ctx->encrypt);
	return 1;
}

static int des_ede_cfb64_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
			      const unsigned char *in, size_t inl)
{
	while (inl>=EVP_MAXCHUNK)
		{
		DES_ede3_cfb64_encrypt(in, out, (long)EVP_MAXCHUNK, 
			       &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3,
			       (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt);
		inl-=EVP_MAXCHUNK;
		in +=EVP_MAXCHUNK;
		out+=EVP_MAXCHUNK;
		}
	if (inl)
		DES_ede3_cfb64_encrypt(in, out, (long)inl,
			       &data(ctx)->ks1, &data(ctx)->ks2, &data(ctx)->ks3,
                               (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt);
	return 1;
}

/* Although we have a CFB-r implementation for 3-DES, it doesn't pack the right
   way, so wrap it here */
static int des_ede3_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
				const unsigned char *in, size_t inl)
    {
    size_t n;
    unsigned char c[1],d[1];

    for(n=0 ; n < inl ; ++n)
	{
	c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0;
	DES_ede3_cfb_encrypt(c,d,1,1,
			     &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3,
			     (DES_cblock *)ctx->iv,ctx->encrypt);
	out[n/8]=(out[n/8]&~(0x80 >> (unsigned int)(n%8))) |
		 ((d[0]&0x80) >> (unsigned int)(n%8));
	}

    return 1;
    }

static int des_ede3_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
				const unsigned char *in, size_t inl)
    {
    while (inl>=EVP_MAXCHUNK)
	{
	DES_ede3_cfb_encrypt(in,out,8,(long)EVP_MAXCHUNK,
			 &data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3,
			 (DES_cblock *)ctx->iv,ctx->encrypt);
	inl-=EVP_MAXCHUNK;
	in +=EVP_MAXCHUNK;
	out+=EVP_MAXCHUNK;
	}
    if (inl)
	DES_ede3_cfb_encrypt(in,out,8,(long)inl,
			&data(ctx)->ks1,&data(ctx)->ks2,&data(ctx)->ks3,
			(DES_cblock *)ctx->iv,ctx->encrypt);
    return 1;
    }

BLOCK_CIPHER_defs(des_ede, DES_EDE_KEY, NID_des_ede, 8, 16, 8, 64,
			EVP_CIPH_RAND_KEY|EVP_CIPH_FLAG_DEFAULT_ASN1,
			des_ede_init_key, NULL, NULL, NULL,
			des3_ctrl)

#define des_ede3_cfb64_cipher des_ede_cfb64_cipher
#define des_ede3_ofb_cipher des_ede_ofb_cipher
#define des_ede3_cbc_cipher des_ede_cbc_cipher
#define des_ede3_ecb_cipher des_ede_ecb_cipher

BLOCK_CIPHER_defs(des_ede3, DES_EDE_KEY, NID_des_ede3, 8, 24, 8, 64,
	  	EVP_CIPH_RAND_KEY|EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_DEFAULT_ASN1,
		  des_ede3_init_key, NULL, NULL, NULL,
		  des3_ctrl)

BLOCK_CIPHER_def_cfb(des_ede3,DES_EDE_KEY,NID_des_ede3,24,8,1,
		EVP_CIPH_RAND_KEY|EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_DEFAULT_ASN1,
			des_ede3_init_key, NULL, NULL, NULL,
			des3_ctrl)

BLOCK_CIPHER_def_cfb(des_ede3,DES_EDE_KEY,NID_des_ede3,24,8,8,
		EVP_CIPH_RAND_KEY|EVP_CIPH_FLAG_FIPS|EVP_CIPH_FLAG_DEFAULT_ASN1,
			des_ede3_init_key, NULL, NULL, NULL,
			des3_ctrl)

static int des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
			    const unsigned char *iv, int enc)
	{
	DES_cblock *deskey = (DES_cblock *)key;
	DES_EDE_KEY *dat = data(ctx);

	dat->stream.cbc = NULL;
#if defined(SPARC_DES_CAPABLE)
	if (SPARC_DES_CAPABLE)
		{
		int mode = ctx->cipher->flags & EVP_CIPH_MODE;

		if (mode == EVP_CIPH_CBC_MODE)
			{
			des_t4_key_expand(&deskey[0],&dat->ks1);
			des_t4_key_expand(&deskey[1],&dat->ks2);
			memcpy(&dat->ks3,&dat->ks1,sizeof(dat->ks1));
			dat->stream.cbc = enc ? des_t4_ede3_cbc_encrypt :
						des_t4_ede3_cbc_decrypt;
			return 1;
			}
		}
#endif
#ifdef EVP_CHECK_DES_KEY
	if (DES_set_key_checked(&deskey[0],&dat->ks1)
		!! DES_set_key_checked(&deskey[1],&dat->ks2))
		return 0;
#else
	DES_set_key_unchecked(&deskey[0],&dat->ks1);
	DES_set_key_unchecked(&deskey[1],&dat->ks2);
#endif
	memcpy(&dat->ks3,&dat->ks1,
	       sizeof(dat->ks1));
	return 1;
	}

static int des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
			     const unsigned char *iv, int enc)
	{
	DES_cblock *deskey = (DES_cblock *)key;
	DES_EDE_KEY *dat = data(ctx);

#ifdef KSSL_DEBUG
	{
        int i;
        printf("des_ede3_init_key(ctx=%lx)\n", ctx);
	printf("\tKEY= ");
        for(i=0;i<24;i++) printf("%02X",key[i]); printf("\n");
	printf("\t IV= ");
        for(i=0;i<8;i++) printf("%02X",iv[i]); printf("\n");
	}
#endif	/* KSSL_DEBUG */

	dat->stream.cbc = NULL;
#if defined(SPARC_DES_CAPABLE)
	if (SPARC_DES_CAPABLE)
		{
		int mode = ctx->cipher->flags & EVP_CIPH_MODE;

		if (mode == EVP_CIPH_CBC_MODE)
			{
			des_t4_key_expand(&deskey[0],&dat->ks1);
			des_t4_key_expand(&deskey[1],&dat->ks2);
			des_t4_key_expand(&deskey[2],&dat->ks3);
			dat->stream.cbc = enc ? des_t4_ede3_cbc_encrypt :
						des_t4_ede3_cbc_decrypt;
			return 1;
			}
		}
#endif
#ifdef EVP_CHECK_DES_KEY
	if (DES_set_key_checked(&deskey[0],&dat->ks1)
		|| DES_set_key_checked(&deskey[1],&dat->ks2)
		|| DES_set_key_checked(&deskey[2],&dat->ks3))
		return 0;
#else
	DES_set_key_unchecked(&deskey[0],&dat->ks1);
	DES_set_key_unchecked(&deskey[1],&dat->ks2);
	DES_set_key_unchecked(&deskey[2],&dat->ks3);
#endif
	return 1;
	}

static int des3_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
	{

	DES_cblock *deskey = ptr;

	switch(type)
		{
	case EVP_CTRL_RAND_KEY:
		if (RAND_bytes(ptr, c->key_len) <= 0)
			return 0;
		DES_set_odd_parity(deskey);
		if (c->key_len >= 16)
			DES_set_odd_parity(deskey + 1);
		if (c->key_len >= 24)
			DES_set_odd_parity(deskey + 2);
		return 1;

	default:
		return -1;
		}
	}

const EVP_CIPHER *EVP_des_ede(void)
{
	return &des_ede_ecb;
}

const EVP_CIPHER *EVP_des_ede3(void)
{
	return &des_ede3_ecb;
}

#ifndef OPENSSL_NO_SHA

#include <openssl/sha.h>

static const unsigned char wrap_iv[8] = {0x4a,0xdd,0xa2,0x2c,0x79,0xe8,0x21,0x05};

static int des_ede3_unwrap(EVP_CIPHER_CTX *ctx, unsigned char *out,
				const unsigned char *in, size_t inl)
	{
	unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH];
	int rv = -1;
	if (inl < 24)
		return -1;
	if (!out)
		return inl - 16;
	memcpy(ctx->iv, wrap_iv, 8);
	/* Decrypt first block which will end up as icv */
	des_ede_cbc_cipher(ctx, icv, in, 8);
	/* Decrypt central blocks */
	/* If decrypting in place move whole output along a block
	 * so the next des_ede_cbc_cipher is in place.
	 */
	if (out == in)
		{
		memmove(out, out + 8, inl - 8);
		in -= 8;
		}
	des_ede_cbc_cipher(ctx, out, in + 8, inl - 16);
	/* Decrypt final block which will be IV */
	des_ede_cbc_cipher(ctx, iv, in + inl - 8, 8);
	/* Reverse order of everything */
	BUF_reverse(icv, NULL, 8);
	BUF_reverse(out, NULL, inl - 16);
	BUF_reverse(ctx->iv, iv, 8);
	/* Decrypt again using new IV */
	des_ede_cbc_cipher(ctx, out, out, inl - 16);
	des_ede_cbc_cipher(ctx, icv, icv, 8);
	/* Work out SHA1 hash of first portion */
	SHA1(out, inl - 16, sha1tmp);

	if (!CRYPTO_memcmp(sha1tmp, icv, 8))
		rv = inl - 16;
	OPENSSL_cleanse(icv, 8);
	OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
	OPENSSL_cleanse(iv, 8);
	OPENSSL_cleanse(ctx->iv, 8);
	if (rv == -1)
		OPENSSL_cleanse(out, inl - 16);
	
	return rv;
	}

static int des_ede3_wrap(EVP_CIPHER_CTX *ctx, unsigned char *out,
				const unsigned char *in, size_t inl)
	{
	unsigned char sha1tmp[SHA_DIGEST_LENGTH];
	if (!out)
		return inl + 16;
	/* Copy input to output buffer + 8 so we have space for IV */
	memmove(out + 8, in, inl);
	/* Work out ICV */
	SHA1(in, inl, sha1tmp);
	memcpy(out + inl + 8, sha1tmp, 8);
	OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
	/* Generate random IV */
	RAND_bytes(ctx->iv, 8);
	memcpy(out, ctx->iv, 8);
	/* Encrypt everything after IV in place */
	des_ede_cbc_cipher(ctx, out + 8, out + 8, inl + 8);
	BUF_reverse(out, NULL, inl + 16);
	memcpy(ctx->iv, wrap_iv, 8);
	des_ede_cbc_cipher(ctx, out, out, inl + 16);
	return inl + 16;
	}

static int des_ede3_wrap_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
				const unsigned char *in, size_t inl)
	{
	/* Sanity check input length: we typically only wrap keys
	 * so EVP_MAXCHUNK is more than will ever be needed. Also
	 * input length must be a multiple of 8 bits.
	 */
	if (inl >= EVP_MAXCHUNK || inl % 8)
		return -1;
	if (ctx->encrypt)
		return des_ede3_wrap(ctx, out, in, inl);
	else
		return des_ede3_unwrap(ctx, out, in, inl);
	}

static const EVP_CIPHER des3_wrap = {
	NID_id_smime_alg_CMS3DESwrap,
	8, 24, 0,
	EVP_CIPH_WRAP_MODE|EVP_CIPH_CUSTOM_IV|EVP_CIPH_FLAG_CUSTOM_CIPHER
		|EVP_CIPH_FLAG_DEFAULT_ASN1,
	des_ede3_init_key, des_ede3_wrap_cipher,
	NULL,	
	sizeof(DES_EDE_KEY),
	NULL,NULL,NULL,NULL };


const EVP_CIPHER *EVP_des_ede3_wrap(void)
	{
	return &des3_wrap;
	}

# endif
#endif