1 /* 2 * Blowfish - a fast block cipher designed by Bruce Schneier 3 * 4 * Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed by Niels Provos. 18 * 4. The name of the author may not be used to endorse or promote products 19 * derived from this software without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 22 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 23 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 24 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 26 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 30 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 31 * 32 * $FreeBSD$ 33 */ 34 35 /* 36 * FreeBSD implementation by Paul Herman <pherman@frenchfries.net> 37 */ 38 39 #ifndef _BLF_H_ 40 #define _BLF_H_ 41 42 /* Schneier states the maximum key length to be 56 bytes. 43 * The way how the subkeys are initalized by the key up 44 * to (N+2)*4 i.e. 72 bytes are utilized. 45 * Warning: For normal blowfish encryption only 56 bytes 46 * of the key affect all cipherbits. 47 */ 48 49 #define BLF_N 16 /* Number of Subkeys */ 50 #define BLF_MAXKEYLEN ((BLF_N-2)*4) /* 448 bits */ 51 52 /* Blowfish context */ 53 typedef struct BlowfishContext { 54 u_int32_t S[4][256]; /* S-Boxes */ 55 u_int32_t P[BLF_N + 2]; /* Subkeys */ 56 } blf_ctx; 57 58 /* Raw access to customized Blowfish 59 * blf_key is just: 60 * Blowfish_initstate( state ) 61 * Blowfish_expand0state( state, key, keylen ) 62 */ 63 64 void Blowfish_encipher __P((blf_ctx *, u_int32_t *, u_int32_t *)); 65 void Blowfish_decipher __P((blf_ctx *, u_int32_t *, u_int32_t *)); 66 void Blowfish_initstate __P((blf_ctx *)); 67 void Blowfish_expand0state __P((blf_ctx *, const u_int8_t *, u_int16_t)); 68 void Blowfish_expandstate 69 __P((blf_ctx *, const u_int8_t *, u_int16_t, const u_int8_t *, u_int16_t)); 70 71 /* Standard Blowfish */ 72 73 void blf_key __P((blf_ctx *, const u_int8_t *, u_int16_t)); 74 void blf_enc __P((blf_ctx *, u_int32_t *, u_int16_t)); 75 void blf_dec __P((blf_ctx *, u_int32_t *, u_int16_t)); 76 77 void blf_ecb_encrypt __P((blf_ctx *, u_int8_t *, u_int32_t)); 78 void blf_ecb_decrypt __P((blf_ctx *, u_int8_t *, u_int32_t)); 79 80 void blf_cbc_encrypt __P((blf_ctx *, u_int8_t *, u_int8_t *, u_int32_t)); 81 void blf_cbc_decrypt __P((blf_ctx *, u_int8_t *, u_int8_t *, u_int32_t)); 82 83 /* Converts u_int8_t to u_int32_t */ 84 u_int32_t Blowfish_stream2word __P((const u_int8_t *, u_int16_t , u_int16_t *)); 85 86 #endif 87