From 3f1a196e08a35ba79ddd33ad0f3424b8f9a06767 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Niels=20M=C3=B6ller?= <nisse@lysator.liu.se> Date: Fri, 15 Jun 2001 17:06:17 +0200 Subject: [PATCH] * Created blowfish.c and blowfish.h (from GNUPG via LSH). Needs more work. Rev: src/nettle/blowfish.c:1.1 Rev: src/nettle/blowfish.h:1.1 --- blowfish.c | 164 +++++++++++++---------------------------------------- blowfish.h | 67 ++++++++++++++++++++++ 2 files changed, 106 insertions(+), 125 deletions(-) create mode 100644 blowfish.h diff --git a/blowfish.c b/blowfish.c index 5a6ad408..1a25a268 100644 --- a/blowfish.c +++ b/blowfish.c @@ -1,9 +1,18 @@ -/* blowfish.c - Blowfish encryption - * Copyright (C) 1998 Free Software Foundation, Inc. +/* blowfish.c + * + * The blowfish block cipher. * * For a description of the algorithm, see: * Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1996. * ISBN 0-471-11709-9. Pages 336 ff. + */ + +/* NOTE: This file is distributed under the GPL, not the LGPL. */ + +/* nettle, low-level cryptographics library + * + * Copyright (C) 1998, 2001 + * Free Software Foundation, Inc, Ray Dassen, Niels M�ller * * This file is part of GNUPG. * @@ -22,45 +31,10 @@ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA */ -/* - * Modified by Ray Dassen for use in lsh. - * * Moved BLOWFISH_context and BLOWFISH_ROUNDS to the header file. - * * const-ified it. - */ - -/* - * Hacked further by Niels M�ller. - */ - -/* Test values: - * key "abcdefghijklmnopqrstuvwxyz"; - * plain "BLOWFISH" - * cipher 32 4E D0 FE F4 13 A2 03 - * - */ - -#include <stdio.h> -#include <stdlib.h> -#include <string.h> -#include <assert.h> #include "blowfish.h" -#if 0 -#define CIPHER_ALGO_BLOWFISH 4 /* blowfish 128 bit key */ -#define CIPHER_ALGO_BLOWFISH160 42 /* blowfish 160 bit key (not in OpenPGP)*/ - -#define FNCCAST_SETKEY(f) (int(*)(void*, const byte*, unsigned))(f) -#define FNCCAST_CRYPT(f) (void(*)(void*, byte*, const byte*))(f) - -static int bf_setkey( BLOWFISH_context *c, const byte *key, unsigned keylen ); -static void encrypt_block( BLOWFISH_context *bc, byte *outbuf, const byte *inbuf ); -static void decrypt_block( BLOWFISH_context *bc, byte *outbuf, const byte *inbuf ); - -static void selftest(void); -#endif - /* precomputed S boxes */ -static const u32 ks0[256] = { +static const uint32_t ks0[256] = { 0xD1310BA6,0x98DFB5AC,0x2FFD72DB,0xD01ADFB7,0xB8E1AFED,0x6A267E96, 0xBA7C9045,0xF12C7F99,0x24A19947,0xB3916CF7,0x0801F2E2,0x858EFC16, 0x636920D8,0x71574E69,0xA458FEA3,0xF4933D7E,0x0D95748F,0x728EB658, @@ -105,7 +79,7 @@ static const u32 ks0[256] = { 0xF296EC6B,0x2A0DD915,0xB6636521,0xE7B9F9B6,0xFF34052E,0xC5855664, 0x53B02D5D,0xA99F8FA1,0x08BA4799,0x6E85076A }; -static const u32 ks1[256] = { +static const uint32_t ks1[256] = { 0x4B7A70E9,0xB5B32944,0xDB75092E,0xC4192623,0xAD6EA6B0,0x49A7DF7D, 0x9CEE60B8,0x8FEDB266,0xECAA8C71,0x699A17FF,0x5664526C,0xC2B19EE1, 0x193602A5,0x75094C29,0xA0591340,0xE4183A3E,0x3F54989A,0x5B429D65, @@ -150,7 +124,7 @@ static const u32 ks1[256] = { 0x675FDA79,0xE3674340,0xC5C43465,0x713E38D8,0x3D28F89E,0xF16DFF20, 0x153E21E7,0x8FB03D4A,0xE6E39F2B,0xDB83ADF7 }; -static const u32 ks2[256] = { +static const uint32_t ks2[256] = { 0xE93D5A68,0x948140F7,0xF64C261C,0x94692934,0x411520F7,0x7602D4F7, 0xBCF46B2E,0xD4A20068,0xD4082471,0x3320F46A,0x43B7D4B7,0x500061AF, 0x1E39F62E,0x97244546,0x14214F74,0xBF8B8840,0x4D95FC1D,0x96B591AF, @@ -195,7 +169,7 @@ static const u32 ks2[256] = { 0xA28514D9,0x6C51133C,0x6FD5C7E7,0x56E14EC4,0x362ABFCE,0xDDC6C837, 0xD79A3234,0x92638212,0x670EFA8E,0x406000E0 }; -static const u32 ks3[256] = { +static const uint32_t ks3[256] = { 0x3A39CE37,0xD3FAF5CF,0xABC27737,0x5AC52D1B,0x5CB0679E,0x4FA33742, 0xD3822740,0x99BC9BBE,0xD5118E9D,0xBF0F7315,0xD62D1C7E,0xC700C47B, 0xB78C1B6B,0x21A19045,0xB26EB1BE,0x6A366EB4,0x5748AB2F,0xBC946E79, @@ -240,14 +214,12 @@ static const u32 ks3[256] = { 0x01C36AE4,0xD6EBE1F9,0x90D4F869,0xA65CDEA0,0x3F09252D,0xC208E69F, 0xB74E6132,0xCE77E25B,0x578FDFE3,0x3AC372E6 }; -static const u32 ps[BLOWFISH_ROUNDS+2] = { +static const uint32_t ps[BLOWFISH_ROUNDS+2] = { 0x243F6A88,0x85A308D3,0x13198A2E,0x03707344,0xA4093822,0x299F31D0, 0x082EFA98,0xEC4E6C89,0x452821E6,0x38D01377,0xBE5466CF,0x34E90C6C, 0xC0AC29B7,0xC97C50DD,0x3F84D5B5,0xB5470917,0x9216D5D9,0x8979FB1B }; - - -#if BLOWFISH_ROUNDS != 16 +#if _BLOWFISH_ROUNDS != 16 static inline u32 function_F( BLOWFISH_context *bc, u32 x ) { @@ -297,12 +269,11 @@ function_F( BLOWFISH_context *bc, u32 x ) #endif #define R(l,r,i) do { l ^= p[i]; r ^= F(l); } while(0) - static void -encrypt( BLOWFISH_context *bc, u32 *ret_xl, u32 *ret_xr ) +encrypt(struct blowfish_ctx *bc, uint32_t *ret_xl, uint32_t *ret_xr) { #if BLOWFISH_ROUNDS == 16 - u32 xl, xr, *s0, *s1, *s2, *s3, *p; + uint32_t xl, xr, *s0, *s1, *s2, *s3, *p; xl = *ret_xl; xr = *ret_xr; @@ -336,7 +307,7 @@ encrypt( BLOWFISH_context *bc, u32 *ret_xl, u32 *ret_xr ) *ret_xr = xl; #else - u32 xl, xr, temp, *p; + uint32_t xl, xr, temp, *p; int i; xl = *ret_xl; @@ -362,12 +333,11 @@ encrypt( BLOWFISH_context *bc, u32 *ret_xl, u32 *ret_xr ) #endif } - static void -decrypt( BLOWFISH_context *bc, u32 *ret_xl, u32 *ret_xr ) +decrypt(struct blowfish_ctx *bc, uint32_t *ret_xl, uint32_t *ret_xr ) { #if BLOWFISH_ROUNDS == 16 - u32 xl, xr, *s0, *s1, *s2, *s3, *p; + uint32_t xl, xr, *s0, *s1, *s2, *s3, *p; xl = *ret_xl; xr = *ret_xr; @@ -401,7 +371,7 @@ decrypt( BLOWFISH_context *bc, u32 *ret_xl, u32 *ret_xr ) *ret_xr = xl; #else - u32 xl, xr, temp, *p; + uint32_t xl, xr, temp, *p; int i; xl = *ret_xl; @@ -431,11 +401,15 @@ decrypt( BLOWFISH_context *bc, u32 *ret_xl, u32 *ret_xr ) #undef F #undef R +#warning should loop on length. void -bf_encrypt_block( BLOWFISH_context *bc, byte *outbuf, const byte *inbuf ) +blowfish_encrypt(struct blowfish_ctx *bc, uitn32_t length, + uint8_t *outbuf, const uint8_t *inbuf ) { u32 d1, d2; + assert(!ctx->status); + d1 = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3]; d2 = inbuf[4] << 24 | inbuf[5] << 16 | inbuf[6] << 8 | inbuf[7]; encrypt( bc, &d1, &d2 ); @@ -451,10 +425,13 @@ bf_encrypt_block( BLOWFISH_context *bc, byte *outbuf, const byte *inbuf ) void -bf_decrypt_block( BLOWFISH_context *bc, byte *outbuf, const byte *inbuf ) +blowfish_decrypt(struct blowfish_ctx *bc, uint32 length, + uint8_t *outbuf, const uint8_t *inbuf ) { u32 d1, d2; + assert(!ctx->status); + d1 = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3]; d2 = inbuf[4] << 24 | inbuf[5] << 16 | inbuf[6] << 8 | inbuf[7]; decrypt( bc, &d1, &d2 ); @@ -468,47 +445,12 @@ bf_decrypt_block( BLOWFISH_context *bc, byte *outbuf, const byte *inbuf ) outbuf[7] = d2 & 0xff; } - -/* Returns 1 on success, 0 on failure */ int -bf_selftest(void) -{ - BLOWFISH_context c; - byte plain[] = "BLOWFISH"; - byte buffer[8]; - byte plain3[] = { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }; - byte key3[] = { 0x41, 0x79, 0x6E, 0xA0, 0x52, 0x61, 0x6E, 0xE4 }; - byte cipher3[] = { 0xE1, 0x13, 0xF4, 0x10, 0x2C, 0xFC, 0xCE, 0x43 }; - - bf_set_key( &c, "abcdefghijklmnopqrstuvwxyz", 26 ); - bf_encrypt_block( &c, buffer, plain ); - if( memcmp( buffer, "\x32\x4E\xD0\xFE\xF4\x13\xA2\x03", 8 ) ) - /* log_error("wrong blowfish encryption\n"); */ - return 0; - bf_decrypt_block( &c, buffer, buffer ); - if( memcmp( buffer, plain, 8 ) ) - /* log_bug("blowfish failed\n"); */ - return 0; - - bf_set_key( &c, key3, 8 ); - bf_encrypt_block( &c, buffer, plain3 ); - if( memcmp( buffer, cipher3, 8 ) ) - /* log_error("wrong blowfish encryption (3)\n"); */ - return 0; - bf_decrypt_block( &c, buffer, buffer ); - if( memcmp( buffer, plain3, 8 ) ) - /* log_bug("blowfish failed (3)\n"); */ - return 0; - return 1; -} - - - -int -bf_set_key( BLOWFISH_context *c, const byte *key, unsigned keylen ) +blowfish_set_key(struct blowfish_ctx *c, + uint32_t keylen, const uint8_t *key) { int i, j; - u32 data, datal, datar; + uint32_t data, datal, datar; #if 0 static int initialized = 0; @@ -576,6 +518,7 @@ bf_set_key( BLOWFISH_context *c, const byte *key, unsigned keylen ) c->s3[i+1] = datar; } + ctx->status = BLOWFISH_WEAK_KEY; /* Check for weak key. A weak key is a key in which a value in */ /* the P-array (here c) occurs more than once per table. */ @@ -583,39 +526,10 @@ bf_set_key( BLOWFISH_context *c, const byte *key, unsigned keylen ) for( j=i+1; j < 256; j++) { if( (c->s0[i] == c->s0[j]) || (c->s1[i] == c->s1[j]) || (c->s2[i] == c->s2[j]) || (c->s3[i] == c->s3[j]) ) - return G10ERR_WEAK_KEY; + return 0; } } - return 0; -} - -#if 0 -/**************** - * Return some information about the algorithm. We need algo here to - * distinguish different flavors of the algorithm. - * Returns: A pointer to string describing the algorithm or NULL if - * the ALGO is invalid. - */ -const char * -blowfish_get_info( int algo, size_t *keylen, - size_t *blocksize, size_t *contextsize, - int (**r_setkey)( void *c, const byte *key, unsigned keylen ), - void (**r_encrypt)( void *c, byte *outbuf, const byte *inbuf ), - void (**r_decrypt)( void *c, byte *outbuf, const byte *inbuf ) - ) -{ - *keylen = algo == CIPHER_ALGO_BLOWFISH ? 128 : 160; - *blocksize = BLOWFISH_BLOCKSIZE; - *contextsize = sizeof(BLOWFISH_context); - *r_setkey = FNCCAST_SETKEY(bf_setkey); - *r_encrypt= FNCCAST_CRYPT(encrypt_block); - *r_decrypt= FNCCAST_CRYPT(decrypt_block); - - if( algo == CIPHER_ALGO_BLOWFISH ) - return "BLOWFISH"; - if( algo == CIPHER_ALGO_BLOWFISH160 ) - return "BLOWFISH160"; - return NULL; + ctx->status = BLOWFISH_OK; + return 1; } -#endif diff --git a/blowfish.h b/blowfish.h new file mode 100644 index 00000000..dab0de15 --- /dev/null +++ b/blowfish.h @@ -0,0 +1,67 @@ +/* blowfish.h + * + * Blowfish block cipher. + */ + +/* nettle, low-level cryptographics library + * + * Copyright (C) 1998, 2001 FSF, Ray Dassen, Niels M�ller + * + * The nettle library is free software; you can redistribute it and/or modify + * it under the terms of the GNU Lesser General Public License as published by + * the Free Software Foundation; either version 2.1 of the License, or (at your + * option) any later version. + * + * The GNU MP Library is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public + * License for more details. + * + * You should have received a copy of the GNU Lesser General Public License + * along with the GNU MP Library; see the file COPYING.LIB. If not, write to + * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, + * MA 02111-1307, USA. + */ + +#ifndef NETTLE_BLOWFISH_H_INCLUDED +#define NETTLE_BLOWFISH_H_INCLUDED + +#include <stdint.h> + +#define BLOWFISH_BLOCK_SIZE 8 + +/* Variable key size between 64 and 448 bits. */ +#define BLOWFISH_MIN_KEY_SIZE 8 +#define BLOWFISH_MAX_KEY_SIZE 32 + +/* Default to 128 bits */ +#define BLOWFISH_KEY_SIZE 16 + +#define _BLOWFISH_ROUNDS 16 + +enum blowfish_error { BLOWFISH_OK, BLOWFISH_WEAK_KEY }; + +struct blowfish_ctx +{ + uint32_t s0[256]; + uint32_t s1[256]; + uint32_t s2[256]; + uint32_t s3[256]; + uint32_t p[_BLOWFISH_ROUNDS]; + enum blowfish_error status; +}; + +void +blowfish_set_key(struct blowfish_ctx *ctx, + unsigned length, const uint8_t *key); + +void +blowfish_encrypt(struct blowfish_ctx *ctx, + unsigned length, uint8_t *dst, + const uint8_t *src); +void +blowfish_decrypt(struct blowfish_ctx *ctx, + unsigned length, uint8_t *dst, + const uint8_t *src); + +#endif /* NETTLE_BLOWFISH_H_INCLUDED */ -- GitLab