| File: | crypto/ecb_enc.c |
| Warning: | line 101, column 10 Although the value stored to 't' is used in the enclosing expression, the value is never actually read from 't' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* $OpenBSD: ecb_enc.c,v 1.6 2015/12/10 21:00:51 naddy Exp $ */ |
| 2 | |
| 3 | /* lib/des/ecb_enc.c */ |
| 4 | /* Copyright (C) 1995 Eric Young (eay@mincom.oz.au) |
| 5 | * All rights reserved. |
| 6 | * |
| 7 | * This file is part of an SSL implementation written |
| 8 | * by Eric Young (eay@mincom.oz.au). |
| 9 | * The implementation was written so as to conform with Netscapes SSL |
| 10 | * specification. This library and applications are |
| 11 | * FREE FOR COMMERCIAL AND NON-COMMERCIAL USE |
| 12 | * as long as the following conditions are aheared to. |
| 13 | * |
| 14 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 15 | * the code are not to be removed. If this code is used in a product, |
| 16 | * Eric Young should be given attribution as the author of the parts used. |
| 17 | * This can be in the form of a textual message at program startup or |
| 18 | * in documentation (online or textual) provided with the package. |
| 19 | * |
| 20 | * Redistribution and use in source and binary forms, with or without |
| 21 | * modification, are permitted provided that the following conditions |
| 22 | * are met: |
| 23 | * 1. Redistributions of source code must retain the copyright |
| 24 | * notice, this list of conditions and the following disclaimer. |
| 25 | * 2. Redistributions in binary form must reproduce the above copyright |
| 26 | * notice, this list of conditions and the following disclaimer in the |
| 27 | * documentation and/or other materials provided with the distribution. |
| 28 | * 3. All advertising materials mentioning features or use of this software |
| 29 | * must display the following acknowledgement: |
| 30 | * This product includes software developed by Eric Young (eay@mincom.oz.au) |
| 31 | * |
| 32 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 33 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 34 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 35 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
| 36 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 37 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 38 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 39 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 40 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 41 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 42 | * SUCH DAMAGE. |
| 43 | * |
| 44 | * The licence and distribution terms for any publically available version or |
| 45 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 46 | * copied and put under another distribution licence |
| 47 | * [including the GNU Public Licence.] |
| 48 | */ |
| 49 | |
| 50 | #include "des_locl.h" |
| 51 | #include "spr.h" |
| 52 | |
| 53 | void |
| 54 | des_encrypt2(u_int32_t *data, des_key_schedule ks, int encrypt) |
| 55 | { |
| 56 | register u_int32_t l, r, t, u; |
| 57 | #ifdef DES_USE_PTR |
| 58 | register unsigned char *des_SP=(unsigned char *)des_SPtrans; |
| 59 | #endif |
| 60 | register int i; |
| 61 | register u_int32_t *s; |
| 62 | |
| 63 | u = data[0]; |
| 64 | r = data[1]; |
| 65 | |
| 66 | /* Things have been modified so that the initial rotate is |
| 67 | * done outside the loop. This required the |
| 68 | * des_SPtrans values in sp.h to be rotated 1 bit to the right. |
| 69 | * One perl script later and things have a 5% speed up on a sparc2. |
| 70 | * Thanks to Richard Outerbridge <71755.204@CompuServe.COM> |
| 71 | * for pointing this out. */ |
| 72 | l = (r << 1) | (r >> 31); |
| 73 | r = (u << 1) | (u >> 31); |
| 74 | |
| 75 | /* clear the top bits on machines with 8byte longs */ |
| 76 | l &= 0xffffffffL; |
| 77 | r &= 0xffffffffL; |
| 78 | |
| 79 | s = (u_int32_t *) ks; |
| 80 | /* I don't know if it is worth the effort of loop unrolling the |
| 81 | * inner loop */ |
| 82 | if (encrypt) { |
| 83 | for (i = 0; i < 32; i += 4) { |
| 84 | D_ENCRYPT(l, r, i + 0){ u=(r^s[i + 0 ]); t=r^s[i + 0 +1]; t=((t>>4L)+(t<< 28L)); l^= des_SPtrans[1][(t )&0x3f]| des_SPtrans[3][(t>> 8L)&0x3f]| des_SPtrans[5][(t>>16L)&0x3f]| des_SPtrans [7][(t>>24L)&0x3f]| des_SPtrans[0][(u )&0x3f]| des_SPtrans [2][(u>> 8L)&0x3f]| des_SPtrans[4][(u>>16L)& 0x3f]| des_SPtrans[6][(u>>24L)&0x3f]; }; /* 1 */ |
| 85 | D_ENCRYPT(r, l, i + 2){ u=(l^s[i + 2 ]); t=l^s[i + 2 +1]; t=((t>>4L)+(t<< 28L)); r^= des_SPtrans[1][(t )&0x3f]| des_SPtrans[3][(t>> 8L)&0x3f]| des_SPtrans[5][(t>>16L)&0x3f]| des_SPtrans [7][(t>>24L)&0x3f]| des_SPtrans[0][(u )&0x3f]| des_SPtrans [2][(u>> 8L)&0x3f]| des_SPtrans[4][(u>>16L)& 0x3f]| des_SPtrans[6][(u>>24L)&0x3f]; }; /* 2 */ |
| 86 | } |
| 87 | } else { |
| 88 | for (i = 30; i > 0; i -= 4) { |
| 89 | D_ENCRYPT(l, r, i - 0){ u=(r^s[i - 0 ]); t=r^s[i - 0 +1]; t=((t>>4L)+(t<< 28L)); l^= des_SPtrans[1][(t )&0x3f]| des_SPtrans[3][(t>> 8L)&0x3f]| des_SPtrans[5][(t>>16L)&0x3f]| des_SPtrans [7][(t>>24L)&0x3f]| des_SPtrans[0][(u )&0x3f]| des_SPtrans [2][(u>> 8L)&0x3f]| des_SPtrans[4][(u>>16L)& 0x3f]| des_SPtrans[6][(u>>24L)&0x3f]; }; /* 16 */ |
| 90 | D_ENCRYPT(r, l, i - 2){ u=(l^s[i - 2 ]); t=l^s[i - 2 +1]; t=((t>>4L)+(t<< 28L)); r^= des_SPtrans[1][(t )&0x3f]| des_SPtrans[3][(t>> 8L)&0x3f]| des_SPtrans[5][(t>>16L)&0x3f]| des_SPtrans [7][(t>>24L)&0x3f]| des_SPtrans[0][(u )&0x3f]| des_SPtrans [2][(u>> 8L)&0x3f]| des_SPtrans[4][(u>>16L)& 0x3f]| des_SPtrans[6][(u>>24L)&0x3f]; }; /* 15 */ |
| 91 | } |
| 92 | } |
| 93 | l = (l >> 1) | (l << 31); |
| 94 | r = (r >> 1) | (r << 31); |
| 95 | /* clear the top bits on machines with 8byte longs */ |
| 96 | l &= 0xffffffffL; |
| 97 | r &= 0xffffffffL; |
| 98 | |
| 99 | data[0] = l; |
| 100 | data[1] = r; |
| 101 | l = r = t = u = 0; |
Although the value stored to 't' is used in the enclosing expression, the value is never actually read from 't' | |
| 102 | } |