Return to bf_skey.c CVS log | Up to [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / src / libstrongswan / plugins / blowfish |
1.1 misho 1: /* crypto/bf/bf_skey.c */ 2: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3: * All rights reserved. 4: * 5: * This package is an SSL implementation written 6: * by Eric Young (eay@cryptsoft.com). 7: * The implementation was written so as to conform with Netscapes SSL. 8: * 9: * This library is free for commercial and non-commercial use as long as 10: * the following conditions are adhered to. The following conditions 11: * apply to all code found in this distribution, be it the RC4, RSA, 12: * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13: * included with this distribution is covered by the same copyright terms 14: * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15: * 16: * Copyright remains Eric Young's, and as such any Copyright notices in 17: * the code are not to be removed. 18: * If this package is used in a product, Eric Young should be given attribution 19: * as the author of the parts of the library used. 20: * This can be in the form of a textual message at program startup or 21: * in documentation (online or textual) provided with the package. 22: * 23: * Redistribution and use in source and binary forms, with or without 24: * modification, are permitted provided that the following conditions 25: * are met: 26: * 1. Redistributions of source code must retain the copyright 27: * notice, this list of conditions and the following disclaimer. 28: * 2. Redistributions in binary form must reproduce the above copyright 29: * notice, this list of conditions and the following disclaimer in the 30: * documentation and/or other materials provided with the distribution. 31: * 3. All advertising materials mentioning features or use of this software 32: * must display the following acknowledgement: 33: * "This product includes cryptographic software written by 34: * Eric Young (eay@cryptsoft.com)" 35: * The word 'cryptographic' can be left out if the routines from the library 36: * being used are not cryptographic related :-). 37: * 4. If you include any Windows specific code (or a derivative thereof) from 38: * the apps directory (application code) you must include an acknowledgement: 39: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40: * 41: * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51: * SUCH DAMAGE. 52: * 53: * The licence and distribution terms for any publicly available version or 54: * derivative of this code cannot be changed. i.e. this code cannot simply be 55: * copied and put under another distribution licence 56: * [including the GNU Public Licence.] 57: */ 58: 59: #ifdef __KERNEL__ 60: #include <linux/types.h> 61: #include <linux/string.h> 62: #else 63: #include <stdio.h> 64: #include <string.h> 65: #endif 66: 67: #include "blowfish.h" 68: #include "bf_locl.h" 69: #include "bf_pi.h" 70: 71: void BF_set_key(BF_KEY *key, int len, const unsigned char *data) 72: { 73: int i; 74: BF_LONG *p,ri,in[2]; 75: const unsigned char *d,*end; 76: 77: 78: memcpy((char *)key,(const char *)&bf_init,sizeof(BF_KEY)); 79: p=key->P; 80: 81: if (len > ((BF_ROUNDS+2)*4)) len=(BF_ROUNDS+2)*4; 82: 83: d=data; 84: end= &(data[len]); 85: for (i=0; i<(BF_ROUNDS+2); i++) 86: { 87: ri= *(d++); 88: if (d >= end) d=data; 89: 90: ri<<=8; 91: ri|= *(d++); 92: if (d >= end) d=data; 93: 94: ri<<=8; 95: ri|= *(d++); 96: if (d >= end) d=data; 97: 98: ri<<=8; 99: ri|= *(d++); 100: if (d >= end) d=data; 101: 102: p[i]^=ri; 103: } 104: 105: in[0]=0L; 106: in[1]=0L; 107: for (i=0; i<(BF_ROUNDS+2); i+=2) 108: { 109: BF_encrypt(in,key); 110: p[i ]=in[0]; 111: p[i+1]=in[1]; 112: } 113: 114: p=key->S; 115: for (i=0; i<4*256; i+=2) 116: { 117: BF_encrypt(in,key); 118: p[i ]=in[0]; 119: p[i+1]=in[1]; 120: } 121: } 122: