aboutsummaryrefslogtreecommitdiff
path: root/src/unstable
diff options
context:
space:
mode:
Diffstat (limited to 'src/unstable')
-rw-r--r--src/unstable/blowfish.cpp13
-rw-r--r--src/unstable/blowfish.h476
-rw-r--r--src/unstable/cipher.cpp10
-rw-r--r--src/unstable/cipher.h137
-rw-r--r--src/unstable/ciphermodecbc.cpp2
-rw-r--r--src/unstable/ciphermodecbc.h59
-rw-r--r--src/unstable/ciphermodecfb.cpp2
-rw-r--r--src/unstable/ciphermodecfb.h59
-rw-r--r--src/unstable/ciphermodeecb.cpp1
-rw-r--r--src/unstable/ciphermodeecb.h40
-rw-r--r--src/unstable/ciphermodeofb.cpp2
-rw-r--r--src/unstable/ciphermodeofb.h65
12 files changed, 866 insertions, 0 deletions
diff --git a/src/unstable/blowfish.cpp b/src/unstable/blowfish.cpp
new file mode 100644
index 0000000..3da32a9
--- /dev/null
+++ b/src/unstable/blowfish.cpp
@@ -0,0 +1,13 @@
1/*
2 * Copyright (C) 2007-2012 Xagasoft, All rights reserved.
3 *
4 * This file is part of the libbu++ library and is released under the
5 * terms of the license contained in the file LICENSE.
6 */
7
8#include "bu/blowfish.h"
9
10template class Bu::CipherModeEcb<8, Bu::Blowfish<1> >;
11template class Bu::CipherModeCfb<8, Bu::Blowfish<1> >;
12template class Bu::CipherModeCbc<8, Bu::Blowfish<1> >;
13template class Bu::CipherModeOfb<8, Bu::Blowfish<1> >;
diff --git a/src/unstable/blowfish.h b/src/unstable/blowfish.h
new file mode 100644
index 0000000..b287bd4
--- /dev/null
+++ b/src/unstable/blowfish.h
@@ -0,0 +1,476 @@
1/*
2 * Copyright (C) 2007-2012 Xagasoft, All rights reserved.
3 *
4 * This file is part of the libbu++ library and is released under the
5 * terms of the license contained in the file LICENSE.
6 */
7
8#ifndef BU_BLOWFISH_H
9#define BU_BLOWFISH_H
10
11#include "bu/config.h"
12#include "bu/cipher.h"
13
14#include "bu/ciphermodeecb.h"
15#include "bu/ciphermodecfb.h"
16#include "bu/ciphermodecbc.h"
17#include "bu/ciphermodeofb.h"
18
19#define NUM_SUBKEYS 18
20#define NUM_S_BOXES 4
21#define NUM_ENTRIES 256
22
23#define MAX_STRING 256
24#define MAX_PASSWD 56 // 448bits
25#define F(x) \
26 (((SB[0][x.byte.zero] + SB[1][x.byte.one]) ^ SB[2][x.byte.two]) + \
27 SB[3][x.byte.three])
28#define revBytes( x ) x = (((x&0xff)<<24)|((x&0xff00)<<8)|((x&0xff0000)>>8)|((x&0xff000000)>>24))
29
30namespace Bu
31{
32 template<int Mode>
33 class Blowfish : public Bu::Cipher<8>
34 {
35 public:
36 Blowfish( Bu::Stream &rNext ) :
37 Bu::Cipher<8>( rNext )
38 {
39 }
40
41 virtual ~Blowfish()
42 {
43 stop();
44 reset();
45 }
46
47 void setPassword( const Bu::String &sPass )
48 {
49 reset();
50
51 uint32_t i,j,len=sPass.getSize();
52 Word Work,null0,null1;
53
54 if (len > 0)
55 {
56 j = 0;
57 for (i=0;i<NUM_SUBKEYS;i++)
58 {
59 Work.byte.zero = sPass[(j++)%len];
60 Work.byte.one = sPass[(j++)%len];
61 Work.byte.two = sPass[(j++)%len];
62 Work.byte.three = sPass[(j++)%len];
63 PA[i] ^= Work.word;
64 }
65
66 null0.word = null1.word = 0;
67
68 for (i=0;i<NUM_SUBKEYS;i+=2)
69 {
70 keyEncipher( null0, null1 );
71 PA[i] = null0.word;
72 PA[i+1] = null1.word;
73 }
74
75 for (j=0;j<NUM_S_BOXES;j++)
76 for (i=0;i<NUM_ENTRIES;i+=2)
77 {
78 keyEncipher( null0, null1 );
79 SB[j][i] = null0.word;
80 SB[j][i+1] = null1.word;
81 }
82 }
83
84 Work.word = null0.word = null1.word = 0;
85 len = 0;
86 }
87
88 private:
89 uint32_t PA[NUM_SUBKEYS];
90 uint32_t SB[NUM_S_BOXES][NUM_ENTRIES];
91
92#if __BYTE_ORDER == __BIG_ENDIAN
93 struct WordByte
94 {
95 uint32_t zero:8;
96 uint32_t one:8;
97 uint32_t two:8;
98 uint32_t three:8;
99 };
100#elif __BYTE_ORDER == __LITTLE_ENDIAN
101 struct WordByte
102 {
103 uint32_t three:8;
104 uint32_t two:8;
105 uint32_t one:8;
106 uint32_t zero:8;
107 };
108#else
109#error No endianness defined
110#endif
111
112 union Word
113 {
114 uint32_t word;
115 WordByte byte;
116 };
117
118 struct DWord
119 {
120 Word word0;
121 Word word1;
122 };
123
124 void reset()
125 {
126 uint32_t i,j;
127
128 static uint32_t PA_Init[NUM_SUBKEYS] =
129 {
130 0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344,
131 0xa4093822, 0x299f31d0, 0x082efa98, 0xec4e6c89,
132 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
133 0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917,
134 0x9216d5d9, 0x8979fb1b
135 };
136
137 static uint32_t SB_Init[NUM_S_BOXES][NUM_ENTRIES] = {
138 {
139 0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7,
140 0xb8e1afed, 0x6a267e96, 0xba7c9045, 0xf12c7f99,
141 0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16,
142 0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e,
143 0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee,
144 0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,
145 0xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef,
146 0x8e79dcb0, 0x603a180e, 0x6c9e0e8b, 0xb01e8a3e,
147 0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c60,
148 0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440,
149 0x55ca396a, 0x2aab10b6, 0xb4cc5c34, 0x1141e8ce,
150 0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a,
151 0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e,
152 0xafd6ba33, 0x6c24cf5c, 0x7a325381, 0x28958677,
153 0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,
154 0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032,
155 0xef845d5d, 0xe98575b1, 0xdc262302, 0xeb651b88,
156 0x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f44239,
157 0x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e,
158 0x21c66842, 0xf6e96c9a, 0x670c9c61, 0xabd388f0,
159 0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3,
160 0x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a98,
161 0xa1f1651d, 0x39af0176, 0x66ca593e, 0x82430e88,
162 0x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe,
163 0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6,
164 0x4ed3aa62, 0x363f7706, 0x1bfedf72, 0x429b023d,
165 0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b,
166 0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def7,
167 0xe3fe501a, 0xb6794c3b, 0x976ce0bd, 0x04c006ba,
168 0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,
169 0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f,
170 0x6dfc511f, 0x9b30952c, 0xcc814544, 0xaf5ebd09,
171
172 0xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb3,
173 0xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb,
174 0x5579c0bd, 0x1a60320a, 0xd6a100c6, 0x402c7279,
175 0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8,
176 0x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab,
177 0x323db5fa, 0xfd238760, 0x53317b48, 0x3e00df82,
178 0x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db,
179 0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573,
180 0x695b27b0, 0xbbca58c8, 0xe1ffa35d, 0xb8f011a0,
181 0x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b,
182 0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb9790,
183 0xe1ddf2da, 0xa4cb7e33, 0x62fb1341, 0xcee4c6e8,
184 0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,
185 0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0,
186 0xd08ed1d0, 0xafc725e0, 0x8e3c5b2f, 0x8e7594b7,
187 0x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c,
188 0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad,
189 0x2f2f2218, 0xbe0e1777, 0xea752dfe, 0x8b021fa1,
190 0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299,
191 0xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9,
192 0x165fa266, 0x80957705, 0x93cc7314, 0x211a1477,
193 0xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf,
194 0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49,
195 0x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af,
196 0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,
197 0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5,
198 0x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a41,
199 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
200 0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400,
201 0x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd915,
202 0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,
203 0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a
204 }, {
205 0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623,
206 0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,
207 0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1,
208 0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e,
209 0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,
210 0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,
211 0x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e,
212 0x09686b3f, 0x3ebaefc9, 0x3c971814, 0x6b6a70a1,
213 0x687f3584, 0x52a0e286, 0xb79c5305, 0xaa500737,
214 0x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b8,
215 0xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff,
216 0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd,
217 0xd19113f9, 0x7ca92ff6, 0x94324773, 0x22f54701,
218 0x3ae5e581, 0x37c2dadc, 0xc8b57634, 0x9af3dda7,
219 0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41,
220 0xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb331,
221 0x4e548b38, 0x4f6db908, 0x6f420d03, 0xf60a04bf,
222 0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af,
223 0xde9a771f, 0xd9930810, 0xb38bae12, 0xdccf3f2e,
224 0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd87,
225 0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c,
226 0xec7aec3a, 0xdb851dfa, 0x63094366, 0xc464c3d2,
227 0xef1c1847, 0x3215d908, 0xdd433b37, 0x24c2ba16,
228 0x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd,
229 0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b,
230 0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a509,
231 0xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e,
232 0x86e34570, 0xeae96fb1, 0x860e5e0a, 0x5a3e2ab3,
233 0x771fe71c, 0x4e3d06fa, 0x2965dcb9, 0x99e71d0f,
234 0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a,
235 0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df4,
236 0xf2f74ea7, 0x361d2b3d, 0x1939260f, 0x19c27960,
237
238 0x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f66,
239 0xe3bc4595, 0xa67bc883, 0xb17f37d1, 0x018cff28,
240 0xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab9802,
241 0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84,
242 0x1521b628, 0x29076170, 0xecdd4775, 0x619f1510,
243 0x13cca830, 0xeb61bd96, 0x0334fe1e, 0xaa0363cf,
244 0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade14,
245 0xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e,
246 0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb50,
247 0x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7,
248 0x9b540b19, 0x875fa099, 0x95f7997e, 0x623d7da8,
249 0xf837889a, 0x97e32d77, 0x11ed935f, 0x16681281,
250 0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99,
251 0x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac24696,
252 0xcdb30aeb, 0x532e3054, 0x8fd948e4, 0x6dbc3128,
253 0x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c73,
254 0x5d4a14d9, 0xe864b7e3, 0x42105d14, 0x203e13e0,
255 0x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd0,
256 0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105,
257 0xd81e799e, 0x86854dc7, 0xe44b476a, 0x3d816250,
258 0xcf62a1f2, 0x5b8d2646, 0xfc8883a0, 0xc1c7b6a3,
259 0x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b285,
260 0x095bbf00, 0xad19489d, 0x1462b174, 0x23820e00,
261 0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061,
262 0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb,
263 0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e,
264 0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735,
265 0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
266 0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9,
267 0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,
268 0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20,
269 0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7
270 }, {
271 0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934,
272 0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068,
273 0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af,
274 0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,
275 0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45,
276 0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,
277 0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a,
278 0x28507825, 0x530429f4, 0x0a2c86da, 0xe9b66dfb,
279 0x68dc1462, 0xd7486900, 0x680ec0a4, 0x27a18dee,
280 0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6,
281 0xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a42,
282 0x20fe9e35, 0xd9f385b9, 0xee39d7ab, 0x3b124e8b,
283 0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b2,
284 0x3a6efa74, 0xdd5b4332, 0x6841e7f7, 0xca7820fb,
285 0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba489527,
286 0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b,
287 0x55a867bc, 0xa1159a58, 0xcca92963, 0x99e1db33,
288 0xa62a4a56, 0x3f3125f9, 0x5ef47e1c, 0x9029317c,
289 0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce3,
290 0x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc,
291 0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e17,
292 0x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x41113564,
293 0x257b7834, 0x602a9c60, 0xdff8e8a3, 0x1f636c1b,
294 0x0e12b4c2, 0x02e1329e, 0xaf664fd1, 0xcad18115,
295 0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922,
296 0x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f728,
297 0xd0127845, 0x95b794fd, 0x647d0862, 0xe7ccf5f0,
298 0x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e,
299 0x0a476341, 0x992eff74, 0x3a6f6eab, 0xf4f8fd37,
300 0xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d,
301 0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804,
302 0xf1290dc7, 0xcc00ffa3, 0xb5390f92, 0x690fed0b,
303
304 0x667b9ffb, 0xcedb7d9c, 0xa091cf0b, 0xd9155ea3,
305 0xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb,
306 0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d,
307 0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c,
308 0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb6350,
309 0x1a6b1018, 0x11caedfa, 0x3d25bdd8, 0xe2e1c3c9,
310 0x44421659, 0x0a121386, 0xd90cec6e, 0xd5abea2a,
311 0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe,
312 0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d,
313 0xd1fd8346, 0xf6381fb0, 0x7745ae04, 0xd736fccc,
314 0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f,
315 0x77a057be, 0xbde8ae24, 0x55464299, 0xbf582e61,
316 0x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc2,
317 0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9,
318 0x7aeb2661, 0x8b1ddf84, 0x846a0e79, 0x915f95e2,
319 0x466e598e, 0x20b45770, 0x8cd55591, 0xc902de4c,
320 0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e,
321 0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc4324633,
322 0xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe10,
323 0x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f169,
324 0xdcb7da83, 0x573906fe, 0xa1e2ce9b, 0x4fcd7f52,
325 0x50115e01, 0xa70683fa, 0xa002b5c4, 0x0de6d027,
326 0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5,
327 0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62,
328 0x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c21634,
329 0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76,
330 0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24,
331 0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
332 0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4,
333 0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c,
334 0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837,
335 0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0
336 }, {
337 0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b,
338 0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe,
339 0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,
340 0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4,
341 0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8,
342 0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
343 0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304,
344 0xa1fad5f0, 0x6a2d519a, 0x63ef8ce2, 0x9a86ee22,
345 0xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a4,
346 0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6,
347 0x2826a2f9, 0xa73a3ae1, 0x4ba99586, 0xef5562e9,
348 0xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a59,
349 0x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee593,
350 0xe990fd5a, 0x9e34d797, 0x2cf0b7d9, 0x022b8b51,
351 0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,
352 0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c,
353 0xe029ac71, 0xe019a5e6, 0x47b0acfd, 0xed93fa9b,
354 0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e28,
355 0x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c,
356 0x15056dd4, 0x88f46dba, 0x03a16125, 0x0564f0bd,
357 0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a,
358 0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf319,
359 0x7533d928, 0xb155fdf5, 0x03563482, 0x8aba3cbb,
360 0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f,
361 0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991,
362 0xea7a90c2, 0xfb3e7bce, 0x5121ce64, 0x774fbe32,
363 0xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e680,
364 0xa2ae0810, 0xdd6db224, 0x69852dfd, 0x09072166,
365 0xb39a460a, 0x6445c0dd, 0x586cdecf, 0x1c20c8ae,
366 0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,
367 0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5,
368 0x72eacea8, 0xfa6484bb, 0x8d6612ae, 0xbf3c6f47,
369
370 0xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e6370,
371 0x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d,
372 0x4040cb08, 0x4eb4e2cc, 0x34d2466a, 0x0115af84,
373 0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048,
374 0x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f8,
375 0x611560b1, 0xe7933fdc, 0xbb3a792b, 0x344525bd,
376 0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac9,
377 0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7,
378 0x1a908749, 0xd44fbd9a, 0xd0dadecb, 0xd50ada38,
379 0x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f,
380 0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c,
381 0xbf97222c, 0x15e6fc2a, 0x0f91fc71, 0x9b941525,
382 0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,
383 0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442,
384 0xe0ec6e0e, 0x1698db3b, 0x4c98a0be, 0x3278e964,
385 0x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e,
386 0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d8,
387 0xdf359f8d, 0x9b992f2e, 0xe60b6f47, 0x0fe3f11d,
388 0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f,
389 0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb2299,
390 0xf523f357, 0xa6327623, 0x93a83531, 0x56cccd02,
391 0xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc,
392 0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614,
393 0xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a,
394 0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,
395 0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b,
396 0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf0,
397 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
398 0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e,
399 0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9,
400 0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,
401 0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6
402 }
403 };
404
405 for (i=0;i<NUM_SUBKEYS;i++)
406 PA[i] = PA_Init[i];
407
408 for (j=0;j<NUM_S_BOXES;j++)
409 for (i=0;i<NUM_ENTRIES;i++)
410 SB[j][i] = SB_Init[j][i];
411 }
412
413 protected:
414 virtual void encipher( void *pData )
415 {
416 DWord *dwWork = (DWord *)pData;
417 Word &w1 = dwWork->word0, &w2 = dwWork->word1;
418
419 w1.word = be32toh( w1.word );
420 w2.word = be32toh( w2.word );
421
422 keyEncipher( w1, w2 );
423
424 revBytes( w1.word );
425 revBytes( w2.word );
426 }
427
428 virtual void decipher( void *pData )
429 {
430 DWord *dwWork = (DWord *)pData;
431 Word &w1 = dwWork->word0, &w2 = dwWork->word1;
432
433 revBytes( w1.word );
434 revBytes( w2.word );
435
436 w1.word ^= PA[17];
437 w2.word ^= F(w1)^PA[16]; w1.word ^= F(w2)^PA[15];
438 w2.word ^= F(w1)^PA[14]; w1.word ^= F(w2)^PA[13];
439 w2.word ^= F(w1)^PA[12]; w1.word ^= F(w2)^PA[11];
440 w2.word ^= F(w1)^PA[10]; w1.word ^= F(w2)^PA[9];
441 w2.word ^= F(w1)^PA[8]; w1.word ^= F(w2)^PA[7];
442 w2.word ^= F(w1)^PA[6]; w1.word ^= F(w2)^PA[5];
443 w2.word ^= F(w1)^PA[4]; w1.word ^= F(w2)^PA[3];
444 w2.word ^= F(w1)^PA[2]; w1.word ^= F(w2)^PA[1];
445 w2.word ^= PA[0];
446
447 Bu::swap( w1, w2 );
448
449 w1.word = htobe32( w1.word );
450 w2.word = htobe32( w2.word );
451 }
452
453 inline void keyEncipher( Word &w1, Word &w2 )
454 {
455 w1.word ^= PA[0];
456 w2.word ^= F(w1)^PA[1]; w1.word ^= F(w2)^PA[2];
457 w2.word ^= F(w1)^PA[3]; w1.word ^= F(w2)^PA[4];
458 w2.word ^= F(w1)^PA[5]; w1.word ^= F(w2)^PA[6];
459 w2.word ^= F(w1)^PA[7]; w1.word ^= F(w2)^PA[8];
460 w2.word ^= F(w1)^PA[9]; w1.word ^= F(w2)^PA[10];
461 w2.word ^= F(w1)^PA[11]; w1.word ^= F(w2)^PA[12];
462 w2.word ^= F(w1)^PA[13]; w1.word ^= F(w2)^PA[14];
463 w2.word ^= F(w1)^PA[15]; w1.word ^= F(w2)^PA[16];
464 w2.word ^= PA[17];
465
466 Bu::swap( w1, w2 );
467 }
468 };
469
470 typedef CipherModeEcb<8, Blowfish<1> > BlowfishEcb;
471 typedef CipherModeCfb<8, Blowfish<1> > BlowfishCfb;
472 typedef CipherModeCbc<8, Blowfish<1> > BlowfishCbc;
473 typedef CipherModeOfb<8, Blowfish<1> > BlowfishOfb;
474};
475
476#endif
diff --git a/src/unstable/cipher.cpp b/src/unstable/cipher.cpp
new file mode 100644
index 0000000..e1ed0e5
--- /dev/null
+++ b/src/unstable/cipher.cpp
@@ -0,0 +1,10 @@
1/*
2 * Copyright (C) 2007-2012 Xagasoft, All rights reserved.
3 *
4 * This file is part of the libbu++ library and is released under the
5 * terms of the license contained in the file LICENSE.
6 */
7
8#include "bu/cipher.h"
9
10
diff --git a/src/unstable/cipher.h b/src/unstable/cipher.h
new file mode 100644
index 0000000..eed73af
--- /dev/null
+++ b/src/unstable/cipher.h
@@ -0,0 +1,137 @@
1/*
2 * Copyright (C) 2007-2012 Xagasoft, All rights reserved.
3 *
4 * This file is part of the libbu++ library and is released under the
5 * terms of the license contained in the file LICENSE.
6 */
7
8#ifndef BU_CIPHER_H
9#define BU_CIPHER_H
10
11#include "bu/filter.h"
12#include "bu/util.h"
13
14namespace Bu
15{
16 /**
17 * Represents a nice base class for a stream filter block encryption scheme.
18 * This class handles efficient caching during reading and writing,
19 * encrypting and decrypting for block ciphers. For each individual cipher
20 * you only have to worry about the block encryption and decryption. Cipher
21 * modes are handled with seperate classes, see Bu::CipherModeCbc,
22 * Bu::CipherModeCfb, Bu::CipherModeEcb, and Bu::CipherModeOfb.
23 *
24 *
25 */
26 template<int iBlockSize>
27 class Cipher : public Bu::Filter
28 {
29 public:
30 Cipher( Bu::Stream &rNext ) :
31 Bu::Filter( rNext ),
32 iReadBufFill( 0 ),
33 iReadBufPos( 0 ),
34 iWriteBufFill( 0 )
35 {
36 }
37
38 virtual ~Cipher()
39 {
40 }
41
42 virtual void start()
43 {
44 }
45
46 virtual Bu::size stop()
47 {
48 flush();
49 return 0;
50 }
51
52 virtual Bu::size read( void *pBuf, Bu::size iBytes )
53 {
54 Bu::size iRead = 0;
55 while( iRead < iBytes )
56 {
57 if( iReadBufFill < iBlockSize )
58 {
59 int iR = rNext.read(
60 aReadBuf+iReadBufFill,
61 iBlockSize-iReadBufFill
62 );
63 if( iR == 0 )
64 return iRead;
65
66 iReadBufFill += iR;
67
68 if( iReadBufFill == iBlockSize )
69 decipher( aReadBuf );
70 }
71
72 if( iReadBufFill == iBlockSize )
73 {
74 int iCpy = Bu::buMin( (int)(iBytes-iRead), iBlockSize-iReadBufPos );
75 memcpy( ((char *)pBuf)+iRead, aReadBuf+iReadBufPos, iCpy );
76 iRead += iCpy;
77 iReadBufPos += iCpy;
78 if( iReadBufPos == iBlockSize )
79 {
80 iReadBufPos = iReadBufFill = 0;
81 }
82 }
83 }
84
85 return iRead;
86 }
87
88 virtual Bu::size write( const void *pBuf, Bu::size iBytes )
89 {
90 Bu::size iPos = 0;
91
92 while( iPos < iBytes )
93 {
94 int iLeft = Bu::buMin((int)(iBytes-iPos),iBlockSize-iWriteBufFill);
95 memcpy( aWriteBuf+iWriteBufFill, (char *)pBuf+iPos, iLeft );
96 iPos += iLeft;
97 iWriteBufFill += iLeft;
98 if( iWriteBufFill == iBlockSize )
99 {
100 encipher( aWriteBuf );
101 rNext.write( aWriteBuf, iBlockSize );
102 iWriteBufFill = 0;
103 }
104 }
105
106 return iPos;
107 }
108
109 virtual void flush()
110 {
111 if( iWriteBufFill > 0 && iWriteBufFill < iBlockSize )
112 {
113 memset( aWriteBuf+iWriteBufFill, 0, iBlockSize-iWriteBufFill );
114 encipher( aWriteBuf );
115 rNext.write( aWriteBuf, iBlockSize );
116 iWriteBufFill = 0;
117 }
118 rNext.flush();
119 }
120
121 using Bu::Stream::read;
122 using Bu::Stream::write;
123
124 protected:
125 virtual void encipher( void *pData )=0;
126 virtual void decipher( void *pData )=0;
127
128 private:
129 char aReadBuf[iBlockSize];
130 char aWriteBuf[iBlockSize];
131 int iReadBufFill;
132 int iReadBufPos;
133 int iWriteBufFill;
134 };
135};
136
137#endif
diff --git a/src/unstable/ciphermodecbc.cpp b/src/unstable/ciphermodecbc.cpp
new file mode 100644
index 0000000..169c1d3
--- /dev/null
+++ b/src/unstable/ciphermodecbc.cpp
@@ -0,0 +1,2 @@
1#include "ciphermodecbc.h"
2
diff --git a/src/unstable/ciphermodecbc.h b/src/unstable/ciphermodecbc.h
new file mode 100644
index 0000000..19fdd7d
--- /dev/null
+++ b/src/unstable/ciphermodecbc.h
@@ -0,0 +1,59 @@
1#ifndef BU_MODE_CBC_H
2#define BU_MODE_CBC_H
3
4#include "bu/filter.h"
5#include "bu/string.h"
6
7namespace Bu
8{
9 /**
10 * Cipher-block chaining mode. The Initialization Vector (IV) is fed into
11 * the first block, then each subsequent block is fed into the next making
12 * each block dependant on all previous blocks.
13 */
14 template<int iBlockSize, typename CipherType>
15 class CipherModeCbc : public CipherType
16 {
17 public:
18 CipherModeCbc(class Stream &rNext ) :
19 CipherType( rNext ),
20 bStart( true )
21 {
22 memset( aVector, 0, iBlockSize );
23 }
24
25 virtual ~CipherModeCbc()
26 {
27 }
28
29 void setIv( const Bu::String &sIv )
30 {
31 memcpy( aVector, sIv.getStr(), iBlockSize );
32 }
33
34 protected:
35 void decipher( void *pBuf )
36 {
37 uint8_t aTmp[iBlockSize];
38 memcpy( aTmp, pBuf, iBlockSize );
39 CipherType::decipher( pBuf );
40 for( int j = 0; j < iBlockSize; j++ )
41 ((uint8_t *)pBuf)[j] ^= aVector[j];
42 memcpy( aVector, aTmp, iBlockSize );
43 }
44
45 void encipher( void *pBuf )
46 {
47 for( int j = 0; j < iBlockSize; j++ )
48 ((uint8_t *)pBuf)[j] ^= aVector[j];
49 CipherType::encipher( pBuf );
50 memcpy( aVector, pBuf, iBlockSize );
51 }
52
53 private:
54 bool bStart;
55 uint8_t aVector[iBlockSize];
56 };
57};
58
59#endif
diff --git a/src/unstable/ciphermodecfb.cpp b/src/unstable/ciphermodecfb.cpp
new file mode 100644
index 0000000..271d371
--- /dev/null
+++ b/src/unstable/ciphermodecfb.cpp
@@ -0,0 +1,2 @@
1#include "ciphermodecfb.h"
2
diff --git a/src/unstable/ciphermodecfb.h b/src/unstable/ciphermodecfb.h
new file mode 100644
index 0000000..1c9c5e9
--- /dev/null
+++ b/src/unstable/ciphermodecfb.h
@@ -0,0 +1,59 @@
1#ifndef BU_MODE_CFB_H
2#define BU_MODE_CFB_H
3
4#include "bu/filter.h"
5#include "bu/string.h"
6
7namespace Bu
8{
9 /**
10 * Cipher Feedback mode. This is very similar to the Cipher-block chaining
11 * mode, with a slight tweak (Bu::CipherModeCbc). Each block is still
12 * dependant on all previous blocks. Any corruption and the entire stream
13 * will be corrupt.
14 */
15 template<int iBlockSize, typename CipherType>
16 class CipherModeCfb : public CipherType
17 {
18 public:
19 CipherModeCfb(class Stream &rNext ) :
20 CipherType( rNext ),
21 bStart( true )
22 {
23 memset( aVector, 0, iBlockSize );
24 }
25
26 virtual ~CipherModeCfb()
27 {
28 }
29
30 void setIv( const Bu::String &sIv )
31 {
32 memcpy( aVector, sIv.getStr(), iBlockSize );
33 }
34
35 protected:
36 void decipher( void *pBuf )
37 {
38 uint8_t aTmp[iBlockSize];
39 memcpy( aTmp, pBuf, iBlockSize );
40 CipherType::encipher( aVector );
41 for( int j = 0; j < iBlockSize; j++ )
42 ((uint8_t *)pBuf)[j] ^= aVector[j];
43 memcpy( aVector, aTmp, iBlockSize );
44 }
45
46 void encipher( void *pBuf )
47 {
48 CipherType::encipher( aVector );
49 for( int j = 0; j < iBlockSize; j++ )
50 aVector[j] = ((uint8_t *)pBuf)[j] ^= aVector[j];
51 }
52
53 private:
54 bool bStart;
55 uint8_t aVector[iBlockSize];
56 };
57};
58
59#endif
diff --git a/src/unstable/ciphermodeecb.cpp b/src/unstable/ciphermodeecb.cpp
new file mode 100644
index 0000000..8856304
--- /dev/null
+++ b/src/unstable/ciphermodeecb.cpp
@@ -0,0 +1 @@
#include "ciphermodeecb.h"
diff --git a/src/unstable/ciphermodeecb.h b/src/unstable/ciphermodeecb.h
new file mode 100644
index 0000000..c4a7f23
--- /dev/null
+++ b/src/unstable/ciphermodeecb.h
@@ -0,0 +1,40 @@
1#ifndef BU_MODE_ECB_H
2#define BU_MODE_ECB_H
3
4namespace Bu
5{
6 /**
7 * Electronic Code Book mode. This cipher mode is the simplest, it's
8 * effectively a pass-through mode. It's the same as using the encryption
9 * scheme without a mode, but at least you absolutely know that you've got
10 * the correct mode. I recommend using this instead of the raw mode if for
11 * no other reason than it makes your code more self-documenting, and with
12 * optomization shouldn't add any extra calls to your code.
13 */
14 template<int iBlockSize, typename CipherType>
15 class CipherModeEcb : public CipherType
16 {
17 public:
18 CipherModeEcb( class Stream &rNext ) :
19 CipherType( rNext )
20 {
21 }
22
23 virtual ~CipherModeEcb()
24 {
25 }
26
27 protected:
28 virtual void decipher( void *pBuf )
29 {
30 CipherType::decipher( pBuf );
31 }
32
33 virtual void encipher( void *pBuf )
34 {
35 CipherType::encipher( pBuf );
36 }
37 };
38};
39
40#endif
diff --git a/src/unstable/ciphermodeofb.cpp b/src/unstable/ciphermodeofb.cpp
new file mode 100644
index 0000000..bebbce2
--- /dev/null
+++ b/src/unstable/ciphermodeofb.cpp
@@ -0,0 +1,2 @@
1#include "ciphermodeofb.h"
2
diff --git a/src/unstable/ciphermodeofb.h b/src/unstable/ciphermodeofb.h
new file mode 100644
index 0000000..19d0f83
--- /dev/null
+++ b/src/unstable/ciphermodeofb.h
@@ -0,0 +1,65 @@
1#ifndef BU_MODE_OFB_H
2#define BU_MODE_OFB_H
3
4#include "bu/filter.h"
5#include "bu/string.h"
6
7namespace Bu
8{
9 /**
10 * Output Feedback Mode. This cipher mode is one of the most resiliant.
11 * Instead of encrypting your data directly it encrypts a "key stream" using
12 * the initialization vector, and then XORs those blocks with your stream
13 * blocks. This means that an error in your stream will still produce an
14 * error in the output, but it will not propegate. Also, with most
15 * encryption schemes error correction codes on the source data will still
16 * work on the encrypted data or decrypted output.
17 */
18 template<int iBlockSize, typename CipherType>
19 class CipherModeOfb : public CipherType
20 {
21 public:
22 CipherModeOfb(class Stream &rNext ) :
23 CipherType( rNext ),
24 bStart( true )
25 {
26 memset( aVector, 0, iBlockSize );
27 }
28
29 virtual ~CipherModeOfb()
30 {
31 }
32
33 void setIv( const Bu::String &sIv )
34 {
35 memcpy( aVector, sIv.getStr(), iBlockSize );
36 }
37
38 protected:
39 void decipher( void *pBuf )
40 {
41 CipherType::encipher( aVector );
42 uint8_t aTmp[iBlockSize];
43 memcpy( aTmp, aVector, iBlockSize );
44 for( int j = 0; j < iBlockSize; j++ )
45 ((uint8_t *)pBuf)[j] ^= aVector[j];
46 memcpy( aVector, aTmp, iBlockSize );
47 }
48
49 void encipher( void *pBuf )
50 {
51 CipherType::encipher( aVector );
52 uint8_t aTmp[iBlockSize];
53 memcpy( aTmp, aVector, iBlockSize );
54 for( int j = 0; j < iBlockSize; j++ )
55 ((uint8_t *)pBuf)[j] ^= aVector[j];
56 memcpy( aVector, aTmp, iBlockSize );
57 }
58
59 private:
60 bool bStart;
61 uint8_t aVector[iBlockSize];
62 };
63};
64
65#endif