PandA-2024.02
bf_skey.c
Go to the documentation of this file.
1 /*
2 +--------------------------------------------------------------------------+
3 | CHStone : a suite of benchmark programs for C-based High-Level Synthesis |
4 | ======================================================================== |
5 | |
6 | * Collected and Modified : Y. Hara, H. Tomiyama, S. Honda, |
7 | H. Takada and K. Ishii |
8 | Nagoya University, Japan |
9 | |
10 | * Remark : |
11 | 1. This source code is modified to unify the formats of the benchmark |
12 | programs in CHStone. |
13 | 2. Test vectors are added for CHStone. |
14 | 3. If "main_result" is 0 at the end of the program, the program is |
15 | correctly executed. |
16 | 4. Please follow the copyright of each benchmark program. |
17 +--------------------------------------------------------------------------+
18 */
19 /* crypto/bf/bf_skey.c */
20 /* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
21  * All rights reserved.
22  *
23  * This package is an SSL implementation written
24  * by Eric Young (eay@mincom.oz.au).
25  * The implementation was written so as to conform with Netscapes SSL.
26  *
27  * This library is free for commercial and non-commercial use as long as
28  * the following conditions are aheared to. The following conditions
29  * apply to all code found in this distribution, be it the RC4, RSA,
30  * lhash, DES, etc., code; not just the SSL code. The SSL documentation
31  * included with this distribution is covered by the same copyright terms
32  * except that the holder is Tim Hudson (tjh@mincom.oz.au).
33  *
34  * Copyright remains Eric Young's, and as such any Copyright notices in
35  * the code are not to be removed.
36  * If this package is used in a product, Eric Young should be given attribution
37  * as the author of the parts of the library used.
38  * This can be in the form of a textual message at program startup or
39  * in documentation (online or textual) provided with the package.
40  *
41  * Redistribution and use in source and binary forms, with or without
42  * modification, are permitted provided that the following conditions
43  * are met:
44  * 1. Redistributions of source code must retain the copyright
45  * notice, this list of conditions and the following disclaimer.
46  * 2. Redistributions in binary form must reproduce the above copyright
47  * notice, this list of conditions and the following disclaimer in the
48  * documentation and/or other materials provided with the distribution.
49  * 3. All advertising materials mentioning features or use of this software
50  * must display the following acknowledgement:
51  * "This product includes cryptographic software written by
52  * Eric Young (eay@mincom.oz.au)"
53  * The word 'cryptographic' can be left out if the rouines from the library
54  * being used are not cryptographic related :-).
55  * 4. If you include any Windows specific code (or a derivative thereof) from
56  * the apps directory (application code) you must include an acknowledgement:
57  * "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
58  *
59  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
60  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62  * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
63  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
69  * SUCH DAMAGE.
70  *
71  * The licence and distribution terms for any publically available version or
72  * derivative of this code cannot be changed. i.e. this code cannot simply be
73  * copied and put under another distribution licence
74  * [including the GNU Public Licence.]
75  */
76 
77 void
78 local_memcpy (BF_LONG * s1, const BF_LONG * s2, int n)
79 {
80  BF_LONG *p1;
81  const BF_LONG *p2;
82 
83  p1 = s1;
84  p2 = s2;
85 
86  while (n-- > 0)
87  {
88  *p1 = *p2;
89  p1++;
90  p2++;
91  }
92 }
93 
94 void
95 BF_set_key (int len, unsigned char *data)
96 {
97  int i;
98  BF_LONG *p, ri, in[2];
99  unsigned char *d, *end;
100 
102  local_memcpy (key_S, bf_init_S, 4 * 256);
103  p = key_P;
104 
105  if (len > ((BF_ROUNDS + 2) * 4))
106  len = (BF_ROUNDS + 2) * 4;
107 
108  d = data;
109  end = &(data[len]);
110  for (i = 0; i < (BF_ROUNDS + 2); i++)
111  {
112  ri = *(d++);
113  if (d >= end)
114  d = data;
115 
116  ri <<= 8;
117  ri |= *(d++);
118  if (d >= end)
119  d = data;
120 
121  ri <<= 8;
122  ri |= *(d++);
123  if (d >= end)
124  d = data;
125 
126  ri <<= 8;
127  ri |= *(d++);
128  if (d >= end)
129  d = data;
130 
131  p[i] ^= ri;
132  }
133 
134  in[0] = 0L;
135  in[1] = 0L;
136  for (i = 0; i < (BF_ROUNDS + 2); i += 2)
137  {
138  BF_encrypt (in, BF_ENCRYPT);
139  p[i] = in[0];
140  p[i + 1] = in[1];
141  }
142 
143  p = key_S;
144  for (i = 0; i < 4 * 256; i += 2)
145  {
146  BF_encrypt (in, BF_ENCRYPT);
147  p[i] = in[0];
148  p[i + 1] = in[1];
149  }
150 
151 }
void local_memcpy(BF_LONG *s1, const BF_LONG *s2, int n)
Definition: bf_skey.c:78
const BF_LONG bf_init_P[BF_ROUNDS+2]
Definition: bf_pi.h:77
BF_LONG key_S[4 *256]
Definition: blowfish.h:90
BF_LONG key_P[BF_ROUNDS+2]
Definition: blowfish.h:89
#define BF_ROUNDS
Definition: blowfish.h:88
#define BF_LONG
Definition: blowfish.h:86
#define BF_ENCRYPT
Definition: blowfish.h:80
#define L
Definition: spmv.h:13
void BF_encrypt(BF_LONG *data, int encrypt)
Definition: bf_enc.c:82
const BF_LONG bf_init_S[4 *256]
Definition: bf_pi.h:84
void BF_set_key(int len, unsigned char *data)
Definition: bf_skey.c:95

Generated on Mon Feb 12 2024 13:02:49 for PandA-2024.02 by doxygen 1.8.13