| // Copyright 2011 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| package des |
| |
| import ( |
| "crypto/cipher" |
| "crypto/internal/subtle" |
| "encoding/binary" |
| "strconv" |
| ) |
| |
| // The DES block size in bytes. |
| const BlockSize = 8 |
| |
| type KeySizeError int |
| |
| func (k KeySizeError) Error() string { |
| return "crypto/des: invalid key size " + strconv.Itoa(int(k)) |
| } |
| |
| // desCipher is an instance of DES encryption. |
| type desCipher struct { |
| subkeys [16]uint64 |
| } |
| |
| // NewCipher creates and returns a new cipher.Block. |
| func NewCipher(key []byte) (cipher.Block, error) { |
| if len(key) != 8 { |
| return nil, KeySizeError(len(key)) |
| } |
| |
| c := new(desCipher) |
| c.generateSubkeys(key) |
| return c, nil |
| } |
| |
| func (c *desCipher) BlockSize() int { return BlockSize } |
| |
| func (c *desCipher) Encrypt(dst, src []byte) { |
| if len(src) < BlockSize { |
| panic("crypto/des: input not full block") |
| } |
| if len(dst) < BlockSize { |
| panic("crypto/des: output not full block") |
| } |
| if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { |
| panic("crypto/des: invalid buffer overlap") |
| } |
| encryptBlock(c.subkeys[:], dst, src) |
| } |
| |
| func (c *desCipher) Decrypt(dst, src []byte) { |
| if len(src) < BlockSize { |
| panic("crypto/des: input not full block") |
| } |
| if len(dst) < BlockSize { |
| panic("crypto/des: output not full block") |
| } |
| if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { |
| panic("crypto/des: invalid buffer overlap") |
| } |
| decryptBlock(c.subkeys[:], dst, src) |
| } |
| |
| // A tripleDESCipher is an instance of TripleDES encryption. |
| type tripleDESCipher struct { |
| cipher1, cipher2, cipher3 desCipher |
| } |
| |
| // NewTripleDESCipher creates and returns a new cipher.Block. |
| func NewTripleDESCipher(key []byte) (cipher.Block, error) { |
| if len(key) != 24 { |
| return nil, KeySizeError(len(key)) |
| } |
| |
| c := new(tripleDESCipher) |
| c.cipher1.generateSubkeys(key[:8]) |
| c.cipher2.generateSubkeys(key[8:16]) |
| c.cipher3.generateSubkeys(key[16:]) |
| return c, nil |
| } |
| |
| func (c *tripleDESCipher) BlockSize() int { return BlockSize } |
| |
| func (c *tripleDESCipher) Encrypt(dst, src []byte) { |
| if len(src) < BlockSize { |
| panic("crypto/des: input not full block") |
| } |
| if len(dst) < BlockSize { |
| panic("crypto/des: output not full block") |
| } |
| if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { |
| panic("crypto/des: invalid buffer overlap") |
| } |
| |
| b := binary.BigEndian.Uint64(src) |
| b = permuteInitialBlock(b) |
| left, right := uint32(b>>32), uint32(b) |
| |
| left = (left << 1) | (left >> 31) |
| right = (right << 1) | (right >> 31) |
| |
| for i := 0; i < 8; i++ { |
| left, right = feistel(left, right, c.cipher1.subkeys[2*i], c.cipher1.subkeys[2*i+1]) |
| } |
| for i := 0; i < 8; i++ { |
| right, left = feistel(right, left, c.cipher2.subkeys[15-2*i], c.cipher2.subkeys[15-(2*i+1)]) |
| } |
| for i := 0; i < 8; i++ { |
| left, right = feistel(left, right, c.cipher3.subkeys[2*i], c.cipher3.subkeys[2*i+1]) |
| } |
| |
| left = (left << 31) | (left >> 1) |
| right = (right << 31) | (right >> 1) |
| |
| preOutput := (uint64(right) << 32) | uint64(left) |
| binary.BigEndian.PutUint64(dst, permuteFinalBlock(preOutput)) |
| } |
| |
| func (c *tripleDESCipher) Decrypt(dst, src []byte) { |
| if len(src) < BlockSize { |
| panic("crypto/des: input not full block") |
| } |
| if len(dst) < BlockSize { |
| panic("crypto/des: output not full block") |
| } |
| if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { |
| panic("crypto/des: invalid buffer overlap") |
| } |
| |
| b := binary.BigEndian.Uint64(src) |
| b = permuteInitialBlock(b) |
| left, right := uint32(b>>32), uint32(b) |
| |
| left = (left << 1) | (left >> 31) |
| right = (right << 1) | (right >> 31) |
| |
| for i := 0; i < 8; i++ { |
| left, right = feistel(left, right, c.cipher3.subkeys[15-2*i], c.cipher3.subkeys[15-(2*i+1)]) |
| } |
| for i := 0; i < 8; i++ { |
| right, left = feistel(right, left, c.cipher2.subkeys[2*i], c.cipher2.subkeys[2*i+1]) |
| } |
| for i := 0; i < 8; i++ { |
| left, right = feistel(left, right, c.cipher1.subkeys[15-2*i], c.cipher1.subkeys[15-(2*i+1)]) |
| } |
| |
| left = (left << 31) | (left >> 1) |
| right = (right << 31) | (right >> 1) |
| |
| preOutput := (uint64(right) << 32) | uint64(left) |
| binary.BigEndian.PutUint64(dst, permuteFinalBlock(preOutput)) |
| } |