~ubuntu-branches/ubuntu/hardy/openswan/hardy-updates

« back to all changes in this revision

Viewing changes to linux/crypto/ciphers/des/asm/perlasm/cbc.pl

  • Committer: Bazaar Package Importer
  • Author(s): Rene Mayrhofer
  • Date: 2005-01-27 16:10:11 UTC
  • mfrom: (1.1.1 upstream)
  • Revision ID: james.westby@ubuntu.com-20050127161011-idgybmyz3vwhpfiq
Tags: 2.3.0-2
Urgency HIGH due to security issue and problems with build-deps in sarge.
* Fix the security issue. Please see
  http://www.idefense.com/application/poi/display?id=190&
      type=vulnerabilities&flashstatus=false
  for more details. Thanks to Martin Schulze for informing me about
  this issue.
  Closes: #292458: Openswan XAUTH/PAM Buffer Overflow Vulnerability
* Added a Build-Dependency to lynx.
  Closes: #291143: openswan: FTBFS: Missing build dependency.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
#!/usr/local/bin/perl
2
 
 
3
 
# void des_ncbc_encrypt(input, output, length, schedule, ivec, enc)
4
 
# des_cblock (*input);
5
 
# des_cblock (*output);
6
 
# long length;
7
 
# des_key_schedule schedule;
8
 
# des_cblock (*ivec);
9
 
# int enc;
10
 
#
11
 
# calls 
12
 
# des_encrypt((DES_LONG *)tin,schedule,DES_ENCRYPT);
13
 
#
14
 
 
15
 
#&cbc("des_ncbc_encrypt","des_encrypt",0);
16
 
#&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",
17
 
#       1,4,5,3,5,-1);
18
 
#&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",
19
 
#       0,4,5,3,5,-1);
20
 
#&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",
21
 
#       0,6,7,3,4,5);
22
 
#
23
 
# When doing a cipher that needs bigendian order,
24
 
# for encrypt, the iv is kept in bigendian form,
25
 
# while for decrypt, it is kept in little endian.
26
 
sub cbc
27
 
        {
28
 
        local($name,$enc_func,$dec_func,$swap,$iv_off,$enc_off,$p1,$p2,$p3)=@_;
29
 
        # name is the function name
30
 
        # enc_func and dec_func and the functions to call for encrypt/decrypt
31
 
        # swap is true if byte order needs to be reversed
32
 
        # iv_off is parameter number for the iv 
33
 
        # enc_off is parameter number for the encrypt/decrypt flag
34
 
        # p1,p2,p3 are the offsets for parameters to be passed to the
35
 
        # underlying calls.
36
 
 
37
 
        &function_begin_B($name,"");
38
 
        &comment("");
39
 
 
40
 
        $in="esi";
41
 
        $out="edi";
42
 
        $count="ebp";
43
 
 
44
 
        &push("ebp");
45
 
        &push("ebx");
46
 
        &push("esi");
47
 
        &push("edi");
48
 
 
49
 
        $data_off=4;
50
 
        $data_off+=4 if ($p1 > 0);
51
 
        $data_off+=4 if ($p2 > 0);
52
 
        $data_off+=4 if ($p3 > 0);
53
 
 
54
 
        &mov($count,    &wparam(2));    # length
55
 
 
56
 
        &comment("getting iv ptr from parameter $iv_off");
57
 
        &mov("ebx",     &wparam($iv_off));      # Get iv ptr
58
 
 
59
 
        &mov($in,       &DWP(0,"ebx","",0));#   iv[0]
60
 
        &mov($out,      &DWP(4,"ebx","",0));#   iv[1]
61
 
 
62
 
        &push($out);
63
 
        &push($in);
64
 
        &push($out);    # used in decrypt for iv[1]
65
 
        &push($in);     # used in decrypt for iv[0]
66
 
 
67
 
        &mov("ebx",     "esp");         # This is the address of tin[2]
68
 
 
69
 
        &mov($in,       &wparam(0));    # in
70
 
        &mov($out,      &wparam(1));    # out
71
 
 
72
 
        # We have loaded them all, how lets push things
73
 
        &comment("getting encrypt flag from parameter $enc_off");
74
 
        &mov("ecx",     &wparam($enc_off));     # Get enc flag
75
 
        if ($p3 > 0)
76
 
                {
77
 
                &comment("get and push parameter $p3");
78
 
                if ($enc_off != $p3)
79
 
                        { &mov("eax",   &wparam($p3)); &push("eax"); }
80
 
                else    { &push("ecx"); }
81
 
                }
82
 
        if ($p2 > 0)
83
 
                {
84
 
                &comment("get and push parameter $p2");
85
 
                if ($enc_off != $p2)
86
 
                        { &mov("eax",   &wparam($p2)); &push("eax"); }
87
 
                else    { &push("ecx"); }
88
 
                }
89
 
        if ($p1 > 0)
90
 
                {
91
 
                &comment("get and push parameter $p1");
92
 
                if ($enc_off != $p1)
93
 
                        { &mov("eax",   &wparam($p1)); &push("eax"); }
94
 
                else    { &push("ecx"); }
95
 
                }
96
 
        &push("ebx");           # push data/iv
97
 
 
98
 
        &cmp("ecx",0);
99
 
        &jz(&label("decrypt"));
100
 
 
101
 
        &and($count,0xfffffff8);
102
 
        &mov("eax",     &DWP($data_off,"esp","",0));    # load iv[0]
103
 
        &mov("ebx",     &DWP($data_off+4,"esp","",0));  # load iv[1]
104
 
 
105
 
        &jz(&label("encrypt_finish"));
106
 
 
107
 
        #############################################################
108
 
 
109
 
        &set_label("encrypt_loop");
110
 
        # encrypt start 
111
 
        # "eax" and "ebx" hold iv (or the last cipher text)
112
 
 
113
 
        &mov("ecx",     &DWP(0,$in,"",0));      # load first 4 bytes
114
 
        &mov("edx",     &DWP(4,$in,"",0));      # second 4 bytes
115
 
 
116
 
        &xor("eax",     "ecx");
117
 
        &xor("ebx",     "edx");
118
 
 
119
 
        &bswap("eax")   if $swap;
120
 
        &bswap("ebx")   if $swap;
121
 
 
122
 
        &mov(&DWP($data_off,"esp","",0),        "eax"); # put in array for call
123
 
        &mov(&DWP($data_off+4,"esp","",0),      "ebx"); #
124
 
 
125
 
        &call($enc_func);
126
 
 
127
 
        &mov("eax",     &DWP($data_off,"esp","",0));
128
 
        &mov("ebx",     &DWP($data_off+4,"esp","",0));
129
 
 
130
 
        &bswap("eax")   if $swap;
131
 
        &bswap("ebx")   if $swap;
132
 
 
133
 
        &mov(&DWP(0,$out,"",0),"eax");
134
 
        &mov(&DWP(4,$out,"",0),"ebx");
135
 
 
136
 
        # eax and ebx are the next iv.
137
 
 
138
 
        &add($in,       8);
139
 
        &add($out,      8);
140
 
 
141
 
        &sub($count,    8);
142
 
        &jnz(&label("encrypt_loop"));
143
 
 
144
 
###################################################################3
145
 
        &set_label("encrypt_finish");
146
 
        &mov($count,    &wparam(2));    # length
147
 
        &and($count,    7);
148
 
        &jz(&label("finish"));
149
 
        &xor("ecx","ecx");
150
 
        &xor("edx","edx");
151
 
        &mov($count,&DWP(&label("cbc_enc_jmp_table"),"",$count,4));
152
 
        &jmp_ptr($count);
153
 
 
154
 
&set_label("ej7");
155
 
        &xor("edx",             "edx") if $ppro; # ppro friendly
156
 
        &movb(&HB("edx"),       &BP(6,$in,"",0));
157
 
        &shl("edx",8);
158
 
&set_label("ej6");
159
 
        &movb(&HB("edx"),       &BP(5,$in,"",0));
160
 
&set_label("ej5");
161
 
        &movb(&LB("edx"),       &BP(4,$in,"",0));
162
 
&set_label("ej4");
163
 
        &mov("ecx",             &DWP(0,$in,"",0));
164
 
        &jmp(&label("ejend"));
165
 
&set_label("ej3");
166
 
        &movb(&HB("ecx"),       &BP(2,$in,"",0));
167
 
        &xor("ecx",             "ecx") if $ppro; # ppro friendly
168
 
        &shl("ecx",8);
169
 
&set_label("ej2");
170
 
        &movb(&HB("ecx"),       &BP(1,$in,"",0));
171
 
&set_label("ej1");
172
 
        &movb(&LB("ecx"),       &BP(0,$in,"",0));
173
 
&set_label("ejend");
174
 
 
175
 
        &xor("eax",     "ecx");
176
 
        &xor("ebx",     "edx");
177
 
 
178
 
        &bswap("eax")   if $swap;
179
 
        &bswap("ebx")   if $swap;
180
 
 
181
 
        &mov(&DWP($data_off,"esp","",0),        "eax"); # put in array for call
182
 
        &mov(&DWP($data_off+4,"esp","",0),      "ebx"); #
183
 
 
184
 
        &call($enc_func);
185
 
 
186
 
        &mov("eax",     &DWP($data_off,"esp","",0));
187
 
        &mov("ebx",     &DWP($data_off+4,"esp","",0));
188
 
 
189
 
        &bswap("eax")   if $swap;
190
 
        &bswap("ebx")   if $swap;
191
 
 
192
 
        &mov(&DWP(0,$out,"",0),"eax");
193
 
        &mov(&DWP(4,$out,"",0),"ebx");
194
 
 
195
 
        &jmp(&label("finish"));
196
 
 
197
 
        #############################################################
198
 
        #############################################################
199
 
        &set_label("decrypt",1);
200
 
        # decrypt start 
201
 
        &and($count,0xfffffff8);
202
 
        # The next 2 instructions are only for if the jz is taken
203
 
        &mov("eax",     &DWP($data_off+8,"esp","",0));  # get iv[0]
204
 
        &mov("ebx",     &DWP($data_off+12,"esp","",0)); # get iv[1]
205
 
        &jz(&label("decrypt_finish"));
206
 
 
207
 
        &set_label("decrypt_loop");
208
 
        &mov("eax",     &DWP(0,$in,"",0));      # load first 4 bytes
209
 
        &mov("ebx",     &DWP(4,$in,"",0));      # second 4 bytes
210
 
 
211
 
        &bswap("eax")   if $swap;
212
 
        &bswap("ebx")   if $swap;
213
 
 
214
 
        &mov(&DWP($data_off,"esp","",0),        "eax"); # put back
215
 
        &mov(&DWP($data_off+4,"esp","",0),      "ebx"); #
216
 
 
217
 
        &call($dec_func);
218
 
 
219
 
        &mov("eax",     &DWP($data_off,"esp","",0));    # get return
220
 
        &mov("ebx",     &DWP($data_off+4,"esp","",0));  #
221
 
 
222
 
        &bswap("eax")   if $swap;
223
 
        &bswap("ebx")   if $swap;
224
 
 
225
 
        &mov("ecx",     &DWP($data_off+8,"esp","",0));  # get iv[0]
226
 
        &mov("edx",     &DWP($data_off+12,"esp","",0)); # get iv[1]
227
 
 
228
 
        &xor("ecx",     "eax");
229
 
        &xor("edx",     "ebx");
230
 
 
231
 
        &mov("eax",     &DWP(0,$in,"",0));      # get old cipher text,
232
 
        &mov("ebx",     &DWP(4,$in,"",0));      # next iv actually
233
 
 
234
 
        &mov(&DWP(0,$out,"",0),"ecx");
235
 
        &mov(&DWP(4,$out,"",0),"edx");
236
 
 
237
 
        &mov(&DWP($data_off+8,"esp","",0),      "eax"); # save iv
238
 
        &mov(&DWP($data_off+12,"esp","",0),     "ebx"); #
239
 
 
240
 
        &add($in,       8);
241
 
        &add($out,      8);
242
 
 
243
 
        &sub($count,    8);
244
 
        &jnz(&label("decrypt_loop"));
245
 
############################ ENDIT #######################3
246
 
        &set_label("decrypt_finish");
247
 
        &mov($count,    &wparam(2));    # length
248
 
        &and($count,    7);
249
 
        &jz(&label("finish"));
250
 
 
251
 
        &mov("eax",     &DWP(0,$in,"",0));      # load first 4 bytes
252
 
        &mov("ebx",     &DWP(4,$in,"",0));      # second 4 bytes
253
 
 
254
 
        &bswap("eax")   if $swap;
255
 
        &bswap("ebx")   if $swap;
256
 
 
257
 
        &mov(&DWP($data_off,"esp","",0),        "eax"); # put back
258
 
        &mov(&DWP($data_off+4,"esp","",0),      "ebx"); #
259
 
 
260
 
        &call($dec_func);
261
 
 
262
 
        &mov("eax",     &DWP($data_off,"esp","",0));    # get return
263
 
        &mov("ebx",     &DWP($data_off+4,"esp","",0));  #
264
 
 
265
 
        &bswap("eax")   if $swap;
266
 
        &bswap("ebx")   if $swap;
267
 
 
268
 
        &mov("ecx",     &DWP($data_off+8,"esp","",0));  # get iv[0]
269
 
        &mov("edx",     &DWP($data_off+12,"esp","",0)); # get iv[1]
270
 
 
271
 
        &xor("ecx",     "eax");
272
 
        &xor("edx",     "ebx");
273
 
 
274
 
        # this is for when we exit
275
 
        &mov("eax",     &DWP(0,$in,"",0));      # get old cipher text,
276
 
        &mov("ebx",     &DWP(4,$in,"",0));      # next iv actually
277
 
 
278
 
&set_label("dj7");
279
 
        &rotr("edx",    16);
280
 
        &movb(&BP(6,$out,"",0), &LB("edx"));
281
 
        &shr("edx",16);
282
 
&set_label("dj6");
283
 
        &movb(&BP(5,$out,"",0), &HB("edx"));
284
 
&set_label("dj5");
285
 
        &movb(&BP(4,$out,"",0), &LB("edx"));
286
 
&set_label("dj4");
287
 
        &mov(&DWP(0,$out,"",0), "ecx");
288
 
        &jmp(&label("djend"));
289
 
&set_label("dj3");
290
 
        &rotr("ecx",    16);
291
 
        &movb(&BP(2,$out,"",0), &LB("ecx"));
292
 
        &shl("ecx",16);
293
 
&set_label("dj2");
294
 
        &movb(&BP(1,$in,"",0),  &HB("ecx"));
295
 
&set_label("dj1");
296
 
        &movb(&BP(0,$in,"",0),  &LB("ecx"));
297
 
&set_label("djend");
298
 
 
299
 
        # final iv is still in eax:ebx
300
 
        &jmp(&label("finish"));
301
 
 
302
 
 
303
 
############################ FINISH #######################3
304
 
        &set_label("finish",1);
305
 
        &mov("ecx",     &wparam($iv_off));      # Get iv ptr
306
 
 
307
 
        #################################################
308
 
        $total=16+4;
309
 
        $total+=4 if ($p1 > 0);
310
 
        $total+=4 if ($p2 > 0);
311
 
        $total+=4 if ($p3 > 0);
312
 
        &add("esp",$total);
313
 
 
314
 
        &mov(&DWP(0,"ecx","",0),        "eax"); # save iv
315
 
        &mov(&DWP(4,"ecx","",0),        "ebx"); # save iv
316
 
 
317
 
        &function_end_A($name);
318
 
 
319
 
        &set_label("cbc_enc_jmp_table",1);
320
 
        &data_word("0");
321
 
        &data_word(&label("ej1"));
322
 
        &data_word(&label("ej2"));
323
 
        &data_word(&label("ej3"));
324
 
        &data_word(&label("ej4"));
325
 
        &data_word(&label("ej5"));
326
 
        &data_word(&label("ej6"));
327
 
        &data_word(&label("ej7"));
328
 
        &set_label("cbc_dec_jmp_table",1);
329
 
        &data_word("0");
330
 
        &data_word(&label("dj1"));
331
 
        &data_word(&label("dj2"));
332
 
        &data_word(&label("dj3"));
333
 
        &data_word(&label("dj4"));
334
 
        &data_word(&label("dj5"));
335
 
        &data_word(&label("dj6"));
336
 
        &data_word(&label("dj7"));
337
 
 
338
 
        &function_end_B($name);
339
 
        
340
 
        }
341
 
 
342
 
1;