Replaced system SQLite with SQLCipher to support encrypted database
This commit is contained in:
759
Sources/DataLiteC/libtomcrypt/ciphers/serpent.c
Normal file
759
Sources/DataLiteC/libtomcrypt/ciphers/serpent.c
Normal file
@@ -0,0 +1,759 @@
|
||||
/* LibTomCrypt, modular cryptographic library -- Tom St Denis */
|
||||
/* SPDX-License-Identifier: Unlicense */
|
||||
|
||||
/* Based on serpent.cpp - originally written and placed in the public domain by Wei Dai
|
||||
https://github.com/weidai11/cryptopp/blob/master/serpent.cpp
|
||||
|
||||
On 2017-10-16 wikipedia says:
|
||||
"The Serpent cipher algorithm is in the public domain and has not been patented."
|
||||
https://en.wikipedia.org/wiki/Serpent_(cipher)
|
||||
*/
|
||||
|
||||
#include "tomcrypt_private.h"
|
||||
|
||||
#ifdef LTC_SERPENT
|
||||
|
||||
const struct ltc_cipher_descriptor serpent_desc = {
|
||||
"serpent",
|
||||
25, /* cipher_ID */
|
||||
16, 32, 16, 32, /* min_key_len, max_key_len, block_len, default_rounds */
|
||||
&serpent_setup,
|
||||
&serpent_ecb_encrypt,
|
||||
&serpent_ecb_decrypt,
|
||||
&serpent_test,
|
||||
&serpent_done,
|
||||
&serpent_keysize,
|
||||
NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL
|
||||
};
|
||||
|
||||
/* linear transformation */
|
||||
#define s_lt(i,a,b,c,d,e) { \
|
||||
a = ROLc(a, 13); \
|
||||
c = ROLc(c, 3); \
|
||||
d = ROLc(d ^ c ^ (a << 3), 7); \
|
||||
b = ROLc(b ^ a ^ c, 1); \
|
||||
a = ROLc(a ^ b ^ d, 5); \
|
||||
c = ROLc(c ^ d ^ (b << 7), 22); \
|
||||
}
|
||||
|
||||
/* inverse linear transformation */
|
||||
#define s_ilt(i,a,b,c,d,e) { \
|
||||
c = RORc(c, 22); \
|
||||
a = RORc(a, 5); \
|
||||
c ^= d ^ (b << 7); \
|
||||
a ^= b ^ d; \
|
||||
b = RORc(b, 1); \
|
||||
d = RORc(d, 7) ^ c ^ (a << 3); \
|
||||
b ^= a ^ c; \
|
||||
c = RORc(c, 3); \
|
||||
a = RORc(a, 13); \
|
||||
}
|
||||
|
||||
/* order of output from S-box functions */
|
||||
#define s_beforeS0(f) f(0,a,b,c,d,e)
|
||||
#define s_afterS0(f) f(1,b,e,c,a,d)
|
||||
#define s_afterS1(f) f(2,c,b,a,e,d)
|
||||
#define s_afterS2(f) f(3,a,e,b,d,c)
|
||||
#define s_afterS3(f) f(4,e,b,d,c,a)
|
||||
#define s_afterS4(f) f(5,b,a,e,c,d)
|
||||
#define s_afterS5(f) f(6,a,c,b,e,d)
|
||||
#define s_afterS6(f) f(7,a,c,d,b,e)
|
||||
#define s_afterS7(f) f(8,d,e,b,a,c)
|
||||
|
||||
/* order of output from inverse S-box functions */
|
||||
#define s_beforeI7(f) f(8,a,b,c,d,e)
|
||||
#define s_afterI7(f) f(7,d,a,b,e,c)
|
||||
#define s_afterI6(f) f(6,a,b,c,e,d)
|
||||
#define s_afterI5(f) f(5,b,d,e,c,a)
|
||||
#define s_afterI4(f) f(4,b,c,e,a,d)
|
||||
#define s_afterI3(f) f(3,a,b,e,c,d)
|
||||
#define s_afterI2(f) f(2,b,d,e,c,a)
|
||||
#define s_afterI1(f) f(1,a,b,c,e,d)
|
||||
#define s_afterI0(f) f(0,a,d,b,e,c)
|
||||
|
||||
/* The instruction sequences for the S-box functions
|
||||
* come from Dag Arne Osvik's paper "Speeding up Serpent".
|
||||
*/
|
||||
|
||||
#define s_s0(i, r0, r1, r2, r3, r4) { \
|
||||
r3 ^= r0; \
|
||||
r4 = r1; \
|
||||
r1 &= r3; \
|
||||
r4 ^= r2; \
|
||||
r1 ^= r0; \
|
||||
r0 |= r3; \
|
||||
r0 ^= r4; \
|
||||
r4 ^= r3; \
|
||||
r3 ^= r2; \
|
||||
r2 |= r1; \
|
||||
r2 ^= r4; \
|
||||
r4 = ~r4; \
|
||||
r4 |= r1; \
|
||||
r1 ^= r3; \
|
||||
r1 ^= r4; \
|
||||
r3 |= r0; \
|
||||
r1 ^= r3; \
|
||||
r4 ^= r3; \
|
||||
}
|
||||
|
||||
#define s_i0(i, r0, r1, r2, r3, r4) { \
|
||||
r2 = ~r2; \
|
||||
r4 = r1; \
|
||||
r1 |= r0; \
|
||||
r4 = ~r4; \
|
||||
r1 ^= r2; \
|
||||
r2 |= r4; \
|
||||
r1 ^= r3; \
|
||||
r0 ^= r4; \
|
||||
r2 ^= r0; \
|
||||
r0 &= r3; \
|
||||
r4 ^= r0; \
|
||||
r0 |= r1; \
|
||||
r0 ^= r2; \
|
||||
r3 ^= r4; \
|
||||
r2 ^= r1; \
|
||||
r3 ^= r0; \
|
||||
r3 ^= r1; \
|
||||
r2 &= r3; \
|
||||
r4 ^= r2; \
|
||||
}
|
||||
|
||||
#define s_s1(i, r0, r1, r2, r3, r4) { \
|
||||
r0 = ~r0; \
|
||||
r2 = ~r2; \
|
||||
r4 = r0; \
|
||||
r0 &= r1; \
|
||||
r2 ^= r0; \
|
||||
r0 |= r3; \
|
||||
r3 ^= r2; \
|
||||
r1 ^= r0; \
|
||||
r0 ^= r4; \
|
||||
r4 |= r1; \
|
||||
r1 ^= r3; \
|
||||
r2 |= r0; \
|
||||
r2 &= r4; \
|
||||
r0 ^= r1; \
|
||||
r1 &= r2; \
|
||||
r1 ^= r0; \
|
||||
r0 &= r2; \
|
||||
r0 ^= r4; \
|
||||
}
|
||||
|
||||
#define s_i1(i, r0, r1, r2, r3, r4) { \
|
||||
r4 = r1; \
|
||||
r1 ^= r3; \
|
||||
r3 &= r1; \
|
||||
r4 ^= r2; \
|
||||
r3 ^= r0; \
|
||||
r0 |= r1; \
|
||||
r2 ^= r3; \
|
||||
r0 ^= r4; \
|
||||
r0 |= r2; \
|
||||
r1 ^= r3; \
|
||||
r0 ^= r1; \
|
||||
r1 |= r3; \
|
||||
r1 ^= r0; \
|
||||
r4 = ~r4; \
|
||||
r4 ^= r1; \
|
||||
r1 |= r0; \
|
||||
r1 ^= r0; \
|
||||
r1 |= r4; \
|
||||
r3 ^= r1; \
|
||||
}
|
||||
|
||||
#define s_s2(i, r0, r1, r2, r3, r4) { \
|
||||
r4 = r0; \
|
||||
r0 &= r2; \
|
||||
r0 ^= r3; \
|
||||
r2 ^= r1; \
|
||||
r2 ^= r0; \
|
||||
r3 |= r4; \
|
||||
r3 ^= r1; \
|
||||
r4 ^= r2; \
|
||||
r1 = r3; \
|
||||
r3 |= r4; \
|
||||
r3 ^= r0; \
|
||||
r0 &= r1; \
|
||||
r4 ^= r0; \
|
||||
r1 ^= r3; \
|
||||
r1 ^= r4; \
|
||||
r4 = ~r4; \
|
||||
}
|
||||
|
||||
#define s_i2(i, r0, r1, r2, r3, r4) { \
|
||||
r2 ^= r3; \
|
||||
r3 ^= r0; \
|
||||
r4 = r3; \
|
||||
r3 &= r2; \
|
||||
r3 ^= r1; \
|
||||
r1 |= r2; \
|
||||
r1 ^= r4; \
|
||||
r4 &= r3; \
|
||||
r2 ^= r3; \
|
||||
r4 &= r0; \
|
||||
r4 ^= r2; \
|
||||
r2 &= r1; \
|
||||
r2 |= r0; \
|
||||
r3 = ~r3; \
|
||||
r2 ^= r3; \
|
||||
r0 ^= r3; \
|
||||
r0 &= r1; \
|
||||
r3 ^= r4; \
|
||||
r3 ^= r0; \
|
||||
}
|
||||
|
||||
#define s_s3(i, r0, r1, r2, r3, r4) { \
|
||||
r4 = r0; \
|
||||
r0 |= r3; \
|
||||
r3 ^= r1; \
|
||||
r1 &= r4; \
|
||||
r4 ^= r2; \
|
||||
r2 ^= r3; \
|
||||
r3 &= r0; \
|
||||
r4 |= r1; \
|
||||
r3 ^= r4; \
|
||||
r0 ^= r1; \
|
||||
r4 &= r0; \
|
||||
r1 ^= r3; \
|
||||
r4 ^= r2; \
|
||||
r1 |= r0; \
|
||||
r1 ^= r2; \
|
||||
r0 ^= r3; \
|
||||
r2 = r1; \
|
||||
r1 |= r3; \
|
||||
r1 ^= r0; \
|
||||
}
|
||||
|
||||
#define s_i3(i, r0, r1, r2, r3, r4) { \
|
||||
r4 = r2; \
|
||||
r2 ^= r1; \
|
||||
r1 &= r2; \
|
||||
r1 ^= r0; \
|
||||
r0 &= r4; \
|
||||
r4 ^= r3; \
|
||||
r3 |= r1; \
|
||||
r3 ^= r2; \
|
||||
r0 ^= r4; \
|
||||
r2 ^= r0; \
|
||||
r0 |= r3; \
|
||||
r0 ^= r1; \
|
||||
r4 ^= r2; \
|
||||
r2 &= r3; \
|
||||
r1 |= r3; \
|
||||
r1 ^= r2; \
|
||||
r4 ^= r0; \
|
||||
r2 ^= r4; \
|
||||
}
|
||||
|
||||
#define s_s4(i, r0, r1, r2, r3, r4) { \
|
||||
r1 ^= r3; \
|
||||
r3 = ~r3; \
|
||||
r2 ^= r3; \
|
||||
r3 ^= r0; \
|
||||
r4 = r1; \
|
||||
r1 &= r3; \
|
||||
r1 ^= r2; \
|
||||
r4 ^= r3; \
|
||||
r0 ^= r4; \
|
||||
r2 &= r4; \
|
||||
r2 ^= r0; \
|
||||
r0 &= r1; \
|
||||
r3 ^= r0; \
|
||||
r4 |= r1; \
|
||||
r4 ^= r0; \
|
||||
r0 |= r3; \
|
||||
r0 ^= r2; \
|
||||
r2 &= r3; \
|
||||
r0 = ~r0; \
|
||||
r4 ^= r2; \
|
||||
}
|
||||
|
||||
#define s_i4(i, r0, r1, r2, r3, r4) { \
|
||||
r4 = r2; \
|
||||
r2 &= r3; \
|
||||
r2 ^= r1; \
|
||||
r1 |= r3; \
|
||||
r1 &= r0; \
|
||||
r4 ^= r2; \
|
||||
r4 ^= r1; \
|
||||
r1 &= r2; \
|
||||
r0 = ~r0; \
|
||||
r3 ^= r4; \
|
||||
r1 ^= r3; \
|
||||
r3 &= r0; \
|
||||
r3 ^= r2; \
|
||||
r0 ^= r1; \
|
||||
r2 &= r0; \
|
||||
r3 ^= r0; \
|
||||
r2 ^= r4; \
|
||||
r2 |= r3; \
|
||||
r3 ^= r0; \
|
||||
r2 ^= r1; \
|
||||
}
|
||||
|
||||
#define s_s5(i, r0, r1, r2, r3, r4) { \
|
||||
r0 ^= r1; \
|
||||
r1 ^= r3; \
|
||||
r3 = ~r3; \
|
||||
r4 = r1; \
|
||||
r1 &= r0; \
|
||||
r2 ^= r3; \
|
||||
r1 ^= r2; \
|
||||
r2 |= r4; \
|
||||
r4 ^= r3; \
|
||||
r3 &= r1; \
|
||||
r3 ^= r0; \
|
||||
r4 ^= r1; \
|
||||
r4 ^= r2; \
|
||||
r2 ^= r0; \
|
||||
r0 &= r3; \
|
||||
r2 = ~r2; \
|
||||
r0 ^= r4; \
|
||||
r4 |= r3; \
|
||||
r2 ^= r4; \
|
||||
}
|
||||
|
||||
#define s_i5(i, r0, r1, r2, r3, r4) { \
|
||||
r1 = ~r1; \
|
||||
r4 = r3; \
|
||||
r2 ^= r1; \
|
||||
r3 |= r0; \
|
||||
r3 ^= r2; \
|
||||
r2 |= r1; \
|
||||
r2 &= r0; \
|
||||
r4 ^= r3; \
|
||||
r2 ^= r4; \
|
||||
r4 |= r0; \
|
||||
r4 ^= r1; \
|
||||
r1 &= r2; \
|
||||
r1 ^= r3; \
|
||||
r4 ^= r2; \
|
||||
r3 &= r4; \
|
||||
r4 ^= r1; \
|
||||
r3 ^= r0; \
|
||||
r3 ^= r4; \
|
||||
r4 = ~r4; \
|
||||
}
|
||||
|
||||
#define s_s6(i, r0, r1, r2, r3, r4) { \
|
||||
r2 = ~r2; \
|
||||
r4 = r3; \
|
||||
r3 &= r0; \
|
||||
r0 ^= r4; \
|
||||
r3 ^= r2; \
|
||||
r2 |= r4; \
|
||||
r1 ^= r3; \
|
||||
r2 ^= r0; \
|
||||
r0 |= r1; \
|
||||
r2 ^= r1; \
|
||||
r4 ^= r0; \
|
||||
r0 |= r3; \
|
||||
r0 ^= r2; \
|
||||
r4 ^= r3; \
|
||||
r4 ^= r0; \
|
||||
r3 = ~r3; \
|
||||
r2 &= r4; \
|
||||
r2 ^= r3; \
|
||||
}
|
||||
|
||||
#define s_i6(i, r0, r1, r2, r3, r4) { \
|
||||
r0 ^= r2; \
|
||||
r4 = r2; \
|
||||
r2 &= r0; \
|
||||
r4 ^= r3; \
|
||||
r2 = ~r2; \
|
||||
r3 ^= r1; \
|
||||
r2 ^= r3; \
|
||||
r4 |= r0; \
|
||||
r0 ^= r2; \
|
||||
r3 ^= r4; \
|
||||
r4 ^= r1; \
|
||||
r1 &= r3; \
|
||||
r1 ^= r0; \
|
||||
r0 ^= r3; \
|
||||
r0 |= r2; \
|
||||
r3 ^= r1; \
|
||||
r4 ^= r0; \
|
||||
}
|
||||
|
||||
#define s_s7(i, r0, r1, r2, r3, r4) { \
|
||||
r4 = r2; \
|
||||
r2 &= r1; \
|
||||
r2 ^= r3; \
|
||||
r3 &= r1; \
|
||||
r4 ^= r2; \
|
||||
r2 ^= r1; \
|
||||
r1 ^= r0; \
|
||||
r0 |= r4; \
|
||||
r0 ^= r2; \
|
||||
r3 ^= r1; \
|
||||
r2 ^= r3; \
|
||||
r3 &= r0; \
|
||||
r3 ^= r4; \
|
||||
r4 ^= r2; \
|
||||
r2 &= r0; \
|
||||
r4 = ~r4; \
|
||||
r2 ^= r4; \
|
||||
r4 &= r0; \
|
||||
r1 ^= r3; \
|
||||
r4 ^= r1; \
|
||||
}
|
||||
|
||||
#define s_i7(i, r0, r1, r2, r3, r4) { \
|
||||
r4 = r2; \
|
||||
r2 ^= r0; \
|
||||
r0 &= r3; \
|
||||
r2 = ~r2; \
|
||||
r4 |= r3; \
|
||||
r3 ^= r1; \
|
||||
r1 |= r0; \
|
||||
r0 ^= r2; \
|
||||
r2 &= r4; \
|
||||
r1 ^= r2; \
|
||||
r2 ^= r0; \
|
||||
r0 |= r2; \
|
||||
r3 &= r4; \
|
||||
r0 ^= r3; \
|
||||
r4 ^= r1; \
|
||||
r3 ^= r4; \
|
||||
r4 |= r0; \
|
||||
r3 ^= r2; \
|
||||
r4 ^= r2; \
|
||||
}
|
||||
|
||||
/* key xor */
|
||||
#define s_kx(r, a, b, c, d, e) { \
|
||||
a ^= k[4 * r + 0]; \
|
||||
b ^= k[4 * r + 1]; \
|
||||
c ^= k[4 * r + 2]; \
|
||||
d ^= k[4 * r + 3]; \
|
||||
}
|
||||
|
||||
#define s_lk(r, a, b, c, d, e) { \
|
||||
a = k[(8-r)*4 + 0]; \
|
||||
b = k[(8-r)*4 + 1]; \
|
||||
c = k[(8-r)*4 + 2]; \
|
||||
d = k[(8-r)*4 + 3]; \
|
||||
}
|
||||
|
||||
#define s_sk(r, a, b, c, d, e) { \
|
||||
k[(8-r)*4 + 4] = a; \
|
||||
k[(8-r)*4 + 5] = b; \
|
||||
k[(8-r)*4 + 6] = c; \
|
||||
k[(8-r)*4 + 7] = d; \
|
||||
}
|
||||
|
||||
#define s_setup_key s_serpent_setup_key
|
||||
static int s_setup_key(const unsigned char *key, int keylen, int rounds, ulong32 *k)
|
||||
{
|
||||
int i;
|
||||
ulong32 t;
|
||||
ulong32 k0[8] = { 0 }; /* zero-initialize */
|
||||
ulong32 a, b, c, d, e;
|
||||
|
||||
for (i = 0; i < 8 && i < keylen/4; ++i) {
|
||||
LOAD32L(k0[i], key + i * 4);
|
||||
}
|
||||
if (keylen < 32) {
|
||||
k0[keylen/4] |= (ulong32)1 << ((keylen%4)*8);
|
||||
}
|
||||
|
||||
t = k0[7];
|
||||
for (i = 0; i < 8; ++i) {
|
||||
k[i] = k0[i] = t = ROLc(k0[i] ^ k0[(i+3)%8] ^ k0[(i+5)%8] ^ t ^ 0x9e3779b9 ^ i, 11);
|
||||
}
|
||||
for (i = 8; i < 4*(rounds+1); ++i) {
|
||||
k[i] = t = ROLc(k[i-8] ^ k[i-5] ^ k[i-3] ^ t ^ 0x9e3779b9 ^ i, 11);
|
||||
}
|
||||
k -= 20;
|
||||
|
||||
for (i = 0; i < rounds/8; i++) {
|
||||
s_afterS2(s_lk); s_afterS2(s_s3); s_afterS3(s_sk);
|
||||
s_afterS1(s_lk); s_afterS1(s_s2); s_afterS2(s_sk);
|
||||
s_afterS0(s_lk); s_afterS0(s_s1); s_afterS1(s_sk);
|
||||
s_beforeS0(s_lk); s_beforeS0(s_s0); s_afterS0(s_sk);
|
||||
k += 8*4;
|
||||
s_afterS6(s_lk); s_afterS6(s_s7); s_afterS7(s_sk);
|
||||
s_afterS5(s_lk); s_afterS5(s_s6); s_afterS6(s_sk);
|
||||
s_afterS4(s_lk); s_afterS4(s_s5); s_afterS5(s_sk);
|
||||
s_afterS3(s_lk); s_afterS3(s_s4); s_afterS4(s_sk);
|
||||
}
|
||||
s_afterS2(s_lk); s_afterS2(s_s3); s_afterS3(s_sk);
|
||||
|
||||
return CRYPT_OK;
|
||||
}
|
||||
|
||||
static int s_enc_block(const unsigned char *in, unsigned char *out, const ulong32 *k)
|
||||
{
|
||||
ulong32 a, b, c, d, e;
|
||||
unsigned int i = 1;
|
||||
|
||||
LOAD32L(a, in + 0);
|
||||
LOAD32L(b, in + 4);
|
||||
LOAD32L(c, in + 8);
|
||||
LOAD32L(d, in + 12);
|
||||
|
||||
do {
|
||||
s_beforeS0(s_kx); s_beforeS0(s_s0); s_afterS0(s_lt);
|
||||
s_afterS0(s_kx); s_afterS0(s_s1); s_afterS1(s_lt);
|
||||
s_afterS1(s_kx); s_afterS1(s_s2); s_afterS2(s_lt);
|
||||
s_afterS2(s_kx); s_afterS2(s_s3); s_afterS3(s_lt);
|
||||
s_afterS3(s_kx); s_afterS3(s_s4); s_afterS4(s_lt);
|
||||
s_afterS4(s_kx); s_afterS4(s_s5); s_afterS5(s_lt);
|
||||
s_afterS5(s_kx); s_afterS5(s_s6); s_afterS6(s_lt);
|
||||
s_afterS6(s_kx); s_afterS6(s_s7);
|
||||
|
||||
if (i == 4) break;
|
||||
|
||||
++i;
|
||||
c = b;
|
||||
b = e;
|
||||
e = d;
|
||||
d = a;
|
||||
a = e;
|
||||
k += 32;
|
||||
s_beforeS0(s_lt);
|
||||
} while (1);
|
||||
|
||||
s_afterS7(s_kx);
|
||||
|
||||
STORE32L(d, out + 0);
|
||||
STORE32L(e, out + 4);
|
||||
STORE32L(b, out + 8);
|
||||
STORE32L(a, out + 12);
|
||||
|
||||
return CRYPT_OK;
|
||||
}
|
||||
|
||||
static int s_dec_block(const unsigned char *in, unsigned char *out, const ulong32 *k)
|
||||
{
|
||||
ulong32 a, b, c, d, e;
|
||||
unsigned int i;
|
||||
|
||||
LOAD32L(a, in + 0);
|
||||
LOAD32L(b, in + 4);
|
||||
LOAD32L(c, in + 8);
|
||||
LOAD32L(d, in + 12);
|
||||
e = 0; LTC_UNUSED_PARAM(e); /* avoid scan-build warning */
|
||||
i = 4;
|
||||
k += 96;
|
||||
|
||||
s_beforeI7(s_kx);
|
||||
goto start;
|
||||
|
||||
do {
|
||||
c = b;
|
||||
b = d;
|
||||
d = e;
|
||||
k -= 32;
|
||||
s_beforeI7(s_ilt);
|
||||
start:
|
||||
s_beforeI7(s_i7); s_afterI7(s_kx);
|
||||
s_afterI7(s_ilt); s_afterI7(s_i6); s_afterI6(s_kx);
|
||||
s_afterI6(s_ilt); s_afterI6(s_i5); s_afterI5(s_kx);
|
||||
s_afterI5(s_ilt); s_afterI5(s_i4); s_afterI4(s_kx);
|
||||
s_afterI4(s_ilt); s_afterI4(s_i3); s_afterI3(s_kx);
|
||||
s_afterI3(s_ilt); s_afterI3(s_i2); s_afterI2(s_kx);
|
||||
s_afterI2(s_ilt); s_afterI2(s_i1); s_afterI1(s_kx);
|
||||
s_afterI1(s_ilt); s_afterI1(s_i0); s_afterI0(s_kx);
|
||||
} while (--i != 0);
|
||||
|
||||
STORE32L(a, out + 0);
|
||||
STORE32L(d, out + 4);
|
||||
STORE32L(b, out + 8);
|
||||
STORE32L(e, out + 12);
|
||||
|
||||
return CRYPT_OK;
|
||||
}
|
||||
|
||||
int serpent_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
|
||||
{
|
||||
int err;
|
||||
|
||||
LTC_ARGCHK(key != NULL);
|
||||
LTC_ARGCHK(skey != NULL);
|
||||
|
||||
if (num_rounds != 0 && num_rounds != 32) return CRYPT_INVALID_ROUNDS;
|
||||
if (keylen != 16 && keylen != 24 && keylen != 32) return CRYPT_INVALID_KEYSIZE;
|
||||
|
||||
err = s_setup_key(key, keylen, 32, skey->serpent.k);
|
||||
#ifdef LTC_CLEAN_STACK
|
||||
burn_stack(sizeof(ulong32) * 14 + sizeof(int));
|
||||
#endif
|
||||
return err;
|
||||
}
|
||||
|
||||
int serpent_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
|
||||
{
|
||||
int err = s_enc_block(pt, ct, skey->serpent.k);
|
||||
#ifdef LTC_CLEAN_STACK
|
||||
burn_stack(sizeof(ulong32) * 5 + sizeof(int));
|
||||
#endif
|
||||
return err;
|
||||
}
|
||||
|
||||
int serpent_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
|
||||
{
|
||||
int err = s_dec_block(ct, pt, skey->serpent.k);
|
||||
#ifdef LTC_CLEAN_STACK
|
||||
burn_stack(sizeof(ulong32) * 5 + sizeof(int));
|
||||
#endif
|
||||
return err;
|
||||
}
|
||||
|
||||
void serpent_done(symmetric_key *skey)
|
||||
{
|
||||
LTC_UNUSED_PARAM(skey);
|
||||
}
|
||||
|
||||
int serpent_keysize(int *keysize)
|
||||
{
|
||||
LTC_ARGCHK(keysize != NULL);
|
||||
|
||||
if (*keysize >= 32) { *keysize = 32; }
|
||||
else if (*keysize >= 24) { *keysize = 24; }
|
||||
else if (*keysize >= 16) { *keysize = 16; }
|
||||
else return CRYPT_INVALID_KEYSIZE;
|
||||
return CRYPT_OK;
|
||||
}
|
||||
|
||||
int serpent_test(void)
|
||||
{
|
||||
#ifndef LTC_TEST
|
||||
return CRYPT_NOP;
|
||||
#else
|
||||
static const struct {
|
||||
unsigned char key[32];
|
||||
int keylen;
|
||||
unsigned char pt[16], ct[16];
|
||||
} tests[] = {
|
||||
{
|
||||
/* key */ {0x80,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 32,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0xA2,0x23,0xAA,0x12,0x88,0x46,0x3C,0x0E,0x2B,0xE3,0x8E,0xBD,0x82,0x56,0x16,0xC0}
|
||||
},
|
||||
{
|
||||
/* key */ {0x40,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 32,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0xEA,0xE1,0xD4,0x05,0x57,0x01,0x74,0xDF,0x7D,0xF2,0xF9,0x96,0x6D,0x50,0x91,0x59}
|
||||
},
|
||||
{
|
||||
/* key */ {0x20,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 32,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0x65,0xF3,0x76,0x84,0x47,0x1E,0x92,0x1D,0xC8,0xA3,0x0F,0x45,0xB4,0x3C,0x44,0x99}
|
||||
},
|
||||
{
|
||||
/* key */ {0x80,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 24,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0x9E,0x27,0x4E,0xAD,0x9B,0x73,0x7B,0xB2,0x1E,0xFC,0xFC,0xA5,0x48,0x60,0x26,0x89}
|
||||
},
|
||||
{
|
||||
/* key */ {0x40,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 24,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0x92,0xFC,0x8E,0x51,0x03,0x99,0xE4,0x6A,0x04,0x1B,0xF3,0x65,0xE7,0xB3,0xAE,0x82}
|
||||
},
|
||||
{
|
||||
/* key */ {0x20,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
|
||||
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 24,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0x5E,0x0D,0xA3,0x86,0xC4,0x6A,0xD4,0x93,0xDE,0xA2,0x03,0xFD,0xC6,0xF5,0x7D,0x70}
|
||||
},
|
||||
{
|
||||
/* key */ {0x80,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 16,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0x26,0x4E,0x54,0x81,0xEF,0xF4,0x2A,0x46,0x06,0xAB,0xDA,0x06,0xC0,0xBF,0xDA,0x3D}
|
||||
},
|
||||
{
|
||||
/* key */ {0x40,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 16,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0x4A,0x23,0x1B,0x3B,0xC7,0x27,0x99,0x34,0x07,0xAC,0x6E,0xC8,0x35,0x0E,0x85,0x24}
|
||||
},
|
||||
{
|
||||
/* key */ {0x20,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* keylen */ 16,
|
||||
/* pt */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
|
||||
/* ct */ {0xE0,0x32,0x69,0xF9,0xE9,0xFD,0x85,0x3C,0x7D,0x81,0x56,0xDF,0x14,0xB9,0x8D,0x56}
|
||||
}
|
||||
};
|
||||
|
||||
unsigned char buf[2][16];
|
||||
symmetric_key key;
|
||||
int err, x;
|
||||
|
||||
for (x = 0; x < (int)(sizeof(tests)/sizeof(tests[0])); x++) {
|
||||
if ((err = serpent_setup(tests[x].key, tests[x].keylen, 0, &key)) != CRYPT_OK) {
|
||||
return err;
|
||||
}
|
||||
if ((err = serpent_ecb_encrypt(tests[x].pt, buf[0], &key)) != CRYPT_OK) {
|
||||
return err;
|
||||
}
|
||||
if (compare_testvector(buf[0], 16, tests[x].ct, 16, "SERPENT Encrypt", x)) {
|
||||
return CRYPT_FAIL_TESTVECTOR;
|
||||
}
|
||||
if ((err = serpent_ecb_decrypt(tests[x].ct, buf[1], &key)) != CRYPT_OK) {
|
||||
return err;
|
||||
}
|
||||
if (compare_testvector(buf[1], 16, tests[x].pt, 16, "SERPENT Decrypt", x)) {
|
||||
return CRYPT_FAIL_TESTVECTOR;
|
||||
}
|
||||
}
|
||||
|
||||
return CRYPT_OK;
|
||||
#endif
|
||||
}
|
||||
|
||||
#undef s_lt
|
||||
#undef s_ilt
|
||||
#undef s_beforeS0
|
||||
#undef s_afterS0
|
||||
#undef s_afterS1
|
||||
#undef s_afterS2
|
||||
#undef s_afterS3
|
||||
#undef s_afterS4
|
||||
#undef s_afterS5
|
||||
#undef s_afterS6
|
||||
#undef s_afterS7
|
||||
#undef s_beforeI7
|
||||
#undef s_afterI7
|
||||
#undef s_afterI6
|
||||
#undef s_afterI5
|
||||
#undef s_afterI4
|
||||
#undef s_afterI3
|
||||
#undef s_afterI2
|
||||
#undef s_afterI1
|
||||
#undef s_afterI0
|
||||
#undef s_s0
|
||||
#undef s_i0
|
||||
#undef s_s1
|
||||
#undef s_i1
|
||||
#undef s_s2
|
||||
#undef s_i2
|
||||
#undef s_s3
|
||||
#undef s_i3
|
||||
#undef s_s4
|
||||
#undef s_i4
|
||||
#undef s_s5
|
||||
#undef s_i5
|
||||
#undef s_s6
|
||||
#undef s_i6
|
||||
#undef s_s7
|
||||
#undef s_i7
|
||||
#undef s_kx
|
||||
#undef s_lk
|
||||
#undef s_sk
|
||||
#undef s_setup_key
|
||||
|
||||
#endif
|
||||
Reference in New Issue
Block a user