Deleted Added
sdiff udiff text old ( 85358 ) new ( 91754 )
full compact
1/*
2 * Blowfish block cipher
3 * Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
4 * All rights reserved.
5 *
6 * Implementation advice by David Mazieres <dm@lcs.mit.edu>.
7 *
8 * Redistribution and use in source and binary forms, with or without

--- 18 unchanged lines hidden (view full) ---

27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 */
33
34#include <sys/cdefs.h>
35__FBSDID("$FreeBSD: head/secure/lib/libcrypt/blowfish.c 85358 2001-10-23 10:23:32Z peter $");
36
37/*
38 * This code is derived from section 14.3 and the given source
39 * in section V of Applied Cryptography, second edition.
40 * Blowfish is an unpatented fast block cipher designed by
41 * Bruce Schneier.
42 */
43

--- 4 unchanged lines hidden (view full) ---

48#if 0
49#include <stdio.h> /* used for debugging */
50#include <string.h>
51#endif
52
53#include <sys/types.h>
54#include "blowfish.h"
55
56#undef inline
57#ifdef __GNUC__
58#define inline __inline
59#else /* !__GNUC__ */
60#define inline
61#endif /* !__GNUC__ */
62
63/* Function for Feistel Networks */
64
65#define F(s, x) ((((s)[ (((x)>>24)&0xFF)] \
66 + (s)[0x100 + (((x)>>16)&0xFF)]) \
67 ^ (s)[0x200 + (((x)>> 8)&0xFF)]) \
68 + (s)[0x300 + ( (x) &0xFF)])
69
70#define BLFRND(s,p,i,j,n) (i ^= F(s,j) ^ (p)[n])
71
72void
73Blowfish_encipher(c, xl, xr)
74 blf_ctx *c;
75 u_int32_t *xl;
76 u_int32_t *xr;
77{
78 u_int32_t Xl;
79 u_int32_t Xr;
80 u_int32_t *s = c->S[0];
81 u_int32_t *p = c->P;
82
83 Xl = *xl;
84 Xr = *xr;

--- 8 unchanged lines hidden (view full) ---

93 BLFRND(s, p, Xr, Xl, 13); BLFRND(s, p, Xl, Xr, 14);
94 BLFRND(s, p, Xr, Xl, 15); BLFRND(s, p, Xl, Xr, 16);
95
96 *xl = Xr ^ p[17];
97 *xr = Xl;
98}
99
100void
101Blowfish_decipher(c, xl, xr)
102 blf_ctx *c;
103 u_int32_t *xl;
104 u_int32_t *xr;
105{
106 u_int32_t Xl;
107 u_int32_t Xr;
108 u_int32_t *s = c->S[0];
109 u_int32_t *p = c->P;
110
111 Xl = *xl;
112 Xr = *xr;

--- 8 unchanged lines hidden (view full) ---

121 BLFRND(s, p, Xr, Xl, 4); BLFRND(s, p, Xl, Xr, 3);
122 BLFRND(s, p, Xr, Xl, 2); BLFRND(s, p, Xl, Xr, 1);
123
124 *xl = Xr ^ p[0];
125 *xr = Xl;
126}
127
128void
129Blowfish_initstate(c)
130 blf_ctx *c;
131{
132
133/* P-box and S-box tables initialized with digits of Pi */
134
135 const blf_ctx initstate =
136
137 { {
138 {

--- 55 unchanged lines hidden (view full) ---

194 0x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af,
195 0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,
196 0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5,
197 0x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a41,
198 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
199 0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400,
200 0x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd915,
201 0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,
202 0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a},
203 {
204 0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623,
205 0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,
206 0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1,
207 0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e,
208 0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,
209 0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,
210 0x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e,

--- 48 unchanged lines hidden (view full) ---

259 0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061,
260 0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb,
261 0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e,
262 0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735,
263 0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
264 0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9,
265 0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,
266 0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20,
267 0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7},
268 {
269 0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934,
270 0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068,
271 0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af,
272 0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,
273 0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45,
274 0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,
275 0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a,

--- 48 unchanged lines hidden (view full) ---

324 0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62,
325 0x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c21634,
326 0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76,
327 0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24,
328 0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
329 0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4,
330 0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c,
331 0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837,
332 0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0},
333 {
334 0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b,
335 0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe,
336 0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,
337 0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4,
338 0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8,
339 0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
340 0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304,

--- 48 unchanged lines hidden (view full) ---

389 0xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a,
390 0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,
391 0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b,
392 0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf0,
393 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
394 0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e,
395 0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9,
396 0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,
397 0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6}
398 },
399 {
400 0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344,
401 0xa4093822, 0x299f31d0, 0x082efa98, 0xec4e6c89,
402 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
403 0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917,
404 0x9216d5d9, 0x8979fb1b
405 } };
406
407 *c = initstate;
408
409}
410
411#ifdef __STDC__
412u_int32_t
413Blowfish_stream2word(const u_int8_t *data, u_int16_t databytes, u_int16_t *current)
414#else
415u_int32_t
416Blowfish_stream2word(data, databytes, current)
417 const u_int8_t *data;
418 u_int16_t databytes;
419 u_int16_t *current;
420#endif
421{
422 u_int8_t i;
423 u_int16_t j;
424 u_int32_t temp;
425
426 temp = 0x00000000;
427 j = *current;
428
429 for (i = 0; i < 4; i++, j++) {
430 if (j >= databytes)
431 j = 0;
432 temp = (temp << 8) | data[j];
433 }
434
435 *current = j;
436 return temp;
437}
438
439#if __STDC__
440void
441Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes)
442#else
443void
444Blowfish_expand0state(c, key, keybytes)
445 blf_ctx *c;
446 const u_int8_t *key;
447 u_int16_t keybytes;
448#endif
449{
450 u_int16_t i;
451 u_int16_t j;
452 u_int16_t k;
453 u_int32_t temp;
454 u_int32_t datal;
455 u_int32_t datar;
456

--- 20 unchanged lines hidden (view full) ---

477
478 c->S[i][k] = datal;
479 c->S[i][k + 1] = datar;
480 }
481 }
482}
483
484
485#if __STDC__
486void
487Blowfish_expandstate(blf_ctx *c, const u_int8_t *data, u_int16_t databytes,
488 const u_int8_t *key, u_int16_t keybytes)
489#else
490void
491Blowfish_expandstate(c, data, databytes, key, keybytes)
492 blf_ctx *c;
493 const u_int8_t *data;
494 u_int16_t databytes;
495 const u_int8_t *key;
496 u_int16_t keybytes;
497#endif
498{
499 u_int16_t i;
500 u_int16_t j;
501 u_int16_t k;
502 u_int32_t temp;
503 u_int32_t datal;
504 u_int32_t datar;
505

--- 24 unchanged lines hidden (view full) ---

530
531 c->S[i][k] = datal;
532 c->S[i][k + 1] = datar;
533 }
534 }
535
536}
537
538#if __STDC__
539void
540blf_key(blf_ctx *c, const u_int8_t *k, u_int16_t len)
541#else
542void
543blf_key(c, k, len)
544 blf_ctx *c;
545 const u_int8_t *k;
546 u_int16_t len;
547#endif
548{
549 /* Initalize S-boxes and subkeys with Pi */
550 Blowfish_initstate(c);
551
552 /* Transform S-boxes and subkeys with key */
553 Blowfish_expand0state(c, k, len);
554}
555
556#if __STDC__
557void
558blf_enc(blf_ctx *c, u_int32_t *data, u_int16_t blocks)
559#else
560void
561blf_enc(c, data, blocks)
562 blf_ctx *c;
563 u_int32_t *data;
564 u_int16_t blocks;
565#endif
566{
567 u_int32_t *d;
568 u_int16_t i;
569
570 d = data;
571 for (i = 0; i < blocks; i++) {
572 Blowfish_encipher(c, d, d + 1);
573 d += 2;
574 }
575}
576
577#if __STDC__
578void
579blf_dec(blf_ctx *c, u_int32_t *data, u_int16_t blocks)
580#else
581void
582blf_dec(c, data, blocks)
583 blf_ctx *c;
584 u_int32_t *data;
585 u_int16_t blocks;
586#endif
587{
588 u_int32_t *d;
589 u_int16_t i;
590
591 d = data;
592 for (i = 0; i < blocks; i++) {
593 Blowfish_decipher(c, d, d + 1);
594 d += 2;
595 }
596}
597
598#if __STDC__
599void
600blf_ecb_encrypt(blf_ctx *c, u_int8_t *data, u_int32_t len)
601#else
602void
603blf_ecb_encrypt(c, data, len)
604 blf_ctx *c;
605 u_int8_t *data;
606 u_int32_t len;
607#endif
608{
609 u_int32_t l, r;
610 u_int32_t i;
611
612 for (i = 0; i < len; i += 8) {
613 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3];
614 r = data[4] << 24 | data[5] << 16 | data[6] << 8 | data[7];
615 Blowfish_encipher(c, &l, &r);

--- 4 unchanged lines hidden (view full) ---

620 data[4] = r >> 24 & 0xff;
621 data[5] = r >> 16 & 0xff;
622 data[6] = r >> 8 & 0xff;
623 data[7] = r & 0xff;
624 data += 8;
625 }
626}
627
628#if __STDC__
629void
630blf_ecb_decrypt(blf_ctx *c, u_int8_t *data, u_int32_t len)
631#else
632void
633blf_ecb_decrypt(c, data, len)
634 blf_ctx *c;
635 u_int8_t *data;
636 u_int32_t len;
637#endif
638{
639 u_int32_t l, r;
640 u_int32_t i;
641
642 for (i = 0; i < len; i += 8) {
643 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3];
644 r = data[4] << 24 | data[5] << 16 | data[6] << 8 | data[7];
645 Blowfish_decipher(c, &l, &r);

--- 4 unchanged lines hidden (view full) ---

650 data[4] = r >> 24 & 0xff;
651 data[5] = r >> 16 & 0xff;
652 data[6] = r >> 8 & 0xff;
653 data[7] = r & 0xff;
654 data += 8;
655 }
656}
657
658#if __STDC__
659void
660blf_cbc_encrypt(blf_ctx *c, u_int8_t *iv, u_int8_t *data, u_int32_t len)
661#else
662void
663blf_cbc_encrypt(c, iv, data, len)
664 blf_ctx *c;
665 u_int8_t *iv;
666 u_int8_t *data;
667 u_int32_t len;
668#endif
669{
670 u_int32_t l, r;
671 u_int32_t i, j;
672
673 for (i = 0; i < len; i += 8) {
674 for (j = 0; j < 8; j++)
675 data[j] ^= iv[j];
676 l = data[0] << 24 | data[1] << 16 | data[2] << 8 | data[3];

--- 7 unchanged lines hidden (view full) ---

684 data[5] = r >> 16 & 0xff;
685 data[6] = r >> 8 & 0xff;
686 data[7] = r & 0xff;
687 iv = data;
688 data += 8;
689 }
690}
691
692#if __STDC__
693void
694blf_cbc_decrypt(blf_ctx *c, u_int8_t *iva, u_int8_t *data, u_int32_t len)
695#else
696void
697blf_cbc_decrypt(c, iva, data, len)
698 blf_ctx *c;
699 u_int8_t *iva;
700 u_int8_t *data;
701 u_int32_t len;
702#endif
703{
704 u_int32_t l, r;
705 u_int8_t *iv;
706 u_int32_t i, j;
707
708 iv = data + len - 16;
709 data = data + len - 8;
710 for (i = len - 8; i >= 8; i -= 8) {

--- 42 unchanged lines hidden (view full) ---

753{
754
755 blf_ctx c;
756 char key[] = "AAAAA";
757 char key2[] = "abcdefghijklmnopqrstuvwxyz";
758
759 u_int32_t data[10];
760 u_int32_t data2[] =
761 {0x424c4f57l, 0x46495348l};
762
763 u_int16_t i;
764
765 /* First test */
766 for (i = 0; i < 10; i++)
767 data[i] = i;
768
769 blf_key(&c, (u_int8_t *) key, 5);

--- 15 unchanged lines hidden ---