Here's my script. I call it ora_backup.sh. I put it in Oracle home folder and gave permission to Oracle user to execute it. Run the following script as Oracle user. Usually I run the incremental level 0 in the weekend and run level 1 for the rest. Just add 0 or 1 at the end of command (e.g.: ./ora_backup.sh 0).
http://pastebin.com/raw.php?i=hnmfjgxh
Friday, May 30, 2014
Sunday, May 25, 2014
AES GTST in Cpp
// Generate and Compare AES Test Files For KAT and Monte Carlo Tests
// Directory for AES test vector files and locally generated copies char *aes_path = "i:\\testvals\\"; char *dir_path = "d:\\cpp\\aes\\"; // Frog, Safer and Serpent hack to get Monte Carlo test agreement // because the test vectors for these algorithms assemble the key // vectors in the reverse direction in memory bool do_fss_hack = true; #include "../std_defs.h" #include#include #include #include #include using std::ios; using std::ostream; using std::ifstream; using std::ofstream; using std::cout; using std::endl; using std::setw; using std::ios_base; using std::string; using std::getline; string fstr[6] = { "KEYSIZE=", "I=", "IV=", "KEY=", "PT=", "CT=" }; char *hxx = "0123456789abcdef"; void v_out(ostream &outf, u1byte ty, u4byte len, void *v = 0) { if(ty == 1) outf << endl << endl << fstr[ty] << len; else { u1byte *p = reinterpret_cast (v), buf[80], *bp = buf; for(int i = 0; i < len; ++i) { *bp++ = hxx[(*(p + i) >> 4) & 15]; *bp++ = hxx[*(p + i) & 15]; } *bp = '\0'; outf << endl << fstr[ty] << buf; } }; bool on_screen = false; inline void clear_count(void) { if(on_screen) cout << "\b\b\b\b \b\b\b\b"; on_screen = false; }; void put_count(int x) { clear_count(); cout << (x /1000) % 10 << (x /100) % 10 << (x /10) % 10 << x % 10; on_screen = true; }; void header(ostream &outf, int type) { string str0("======================================================="); string str1("Author: Dr B R Gladman (gladman@seven77.demon.co.uk)"); string str2("Test: "); string str3(string("Algorithm: ") + cipher_name()[0] + " (" + cipher_name()[1] + ")"); string str4("Filename: "); str2 += (type < 4 ? "ECB " : "CBC "); str4 += (type < 4 ? "ecb_" : "cbc_"); switch(type) { case 0: str2 += "Variable Key Known Answer Tests"; str4 += "vk.txt"; break; case 1: str2 += "Variable Text Known Answer Tests"; str4 += "vt.txt"; break; case 2: case 4: str2 += "Monte Carlo (Encryption) Tests"; str4 += "me.txt"; break; case 3: case 5: str2 += "Monte Carlo (Decryption) Tests"; str4 += "md.txt"; break; } outf << str0 << endl << str1 << endl << str2 << endl << str3 << endl << str4 << endl << str0; } void ecb_vt(ostream &outf) { u4byte i, j, pt[4], ct[4], key[8]; key[0] = key[1] = key[2] = key[3] = 0; key[4] = key[5] = key[6] = key[7] = 0; for(i = 0; i < 3; ++i) { set_key(key, 128 + 64 * i); outf << endl << endl << fstr[0] << setw(3) << 128 + 64 * i << endl; v_out(outf, 3, 16 + 8 * i, key); for(j = 0; j <= 128; ++j) { v_out(outf, 1, j); pt[0] = pt[1] = pt[2] = pt[3] = 0; if(j) *((u1byte*)pt + (j - 1) / 8) = 0x80 >> (j - 1) % 8; encrypt(pt , ct); v_out(outf, 4, 16, pt); v_out(outf, 5, 16, ct); } } }; void ecb_vk(ostream &outf) { u4byte i, j, pt[4], ct[4], key[8]; pt[0] = pt[1] = pt[2] = pt[3] = 0; for(i = 0; i < 3; ++i) { outf << endl << endl << fstr[0] << setw(3) << 128 + 64 * i << endl; v_out(outf, 4, 16, pt); for(j = 0; j <= 128 + 64 * i; ++j) { v_out(outf, 1, j); key[0] = key[1] = key[2] = key[3] = 0; key[4] = key[5] = key[6] = key[7] = 0; if(j) *((u1byte*)key + (j - 1) / 8) = 0x80 >> (j - 1) % 8; set_key(key, 128 + 64 * i); v_out(outf, 3, 16 + 8 * i, key); encrypt(pt , ct); v_out(outf, 5, 16, ct); } } }; void ecb_me(ostream &outf) { u4byte i, j, k, xo, pt[4], key[8], ct[12]; for(i = 0; i < 3; ++i) { outf << endl << endl << fstr[0] << setw(3) << 128 + 64 * i; pt[0] = pt[1] = pt[2] = pt[3] = 0; key[0] = key[1] = key[2] = key[3] = 0; key[4] = key[5] = key[6] = key[7] = 0; ct[4] = pt[0]; ct[5] = pt[1]; ct[6] = pt[2]; ct[7] = pt[3]; for(j = 0; j < 400; j++) { if(j % 40 == 0) put_count(j); set_key(key, 128 + 64 * i); v_out(outf, 1, j); v_out(outf, 3, 16 + 8 * i, key); v_out(outf, 4, 16, pt); for(k = 0; k < 5000; ++k) { encrypt(ct + 4, ct); encrypt(ct, ct + 4); } v_out(outf, 5, 16, ct + 4); pt[0] = ct[4]; pt[1] = ct[5]; pt[2] = ct[6]; pt[3] = ct[7]; xo = 4 - 2 * i; if(do_fss_hack && (**cipher_name() == 'f' || **cipher_name() == 's')) { ct[8] = ct[0]; ct[9] = ct[1]; ct[10] = ct[2]; ct[11] = ct[3]; xo = 4; } for(k = 0; k < 4 + 2 * i; ++k) key[k] ^= ct[k + xo]; } } clear_count(); }; void ecb_md(ostream &outf) { u4byte i, j, k, xo, pt[4], key[8], ct[12]; for(i = 0; i < 3; ++i) { outf << endl << endl << fstr[0] << setw(3) << 128 + 64 * i; pt[0] = pt[1] = pt[2] = pt[3] = 0; key[0] = key[1] = key[2] = key[3] = 0; key[4] = key[5] = key[6] = key[7] = 0; ct[4] = pt[0]; ct[5] = pt[1]; ct[6] = pt[2]; ct[7] = pt[3]; for(j = 0; j < 400; j++) { if(j % 40 == 0) put_count(j); set_key(key, 128 + 64 * i); v_out(outf, 1, j); v_out(outf, 3, 16 + 8 * i, key); v_out(outf, 5, 16, pt); for(k = 0; k < 5000; ++k) { decrypt(ct + 4, ct); decrypt(ct, ct + 4); } v_out(outf, 4, 16, ct + 4); pt[0] = ct[4]; pt[1] = ct[5]; pt[2] = ct[6]; pt[3] = ct[7]; xo = 4 - 2 * i; if(do_fss_hack && (**cipher_name() == 'f' || **cipher_name() == 's')) { ct[8] = ct[0]; ct[9] = ct[1]; ct[10] = ct[2]; ct[11] = ct[3]; xo = 4; } for(k = 0; k < 4 + 2 * i; ++k) key[k] ^= ct[k + xo]; } } clear_count(); }; void cbc_me(ostream &outf) { u4byte i, j, k, xo, key[8], ct[12]; for(i = 0; i < 3; ++i) { outf << endl << endl << fstr[0] << setw(3) << 128 + 64 * i; key[0] = key[1] = key[2] = key[3] = 0; key[4] = key[5] = key[6] = key[7] = 0; // KEY[0] ct[4] = ct[5] = ct[6] = ct[7] = 0; // IV[0] ct[0] = ct[1] = ct[2] = ct[3] = 0; // PT[0] for(j = 0; j < 400; j++) { if(j % 40 == 0) put_count(j); set_key(key, 128 + 64 * i); v_out(outf, 1, j); v_out(outf, 3, 16 + 8 * i, key); v_out(outf, 2, 16, ct + 4); v_out(outf, 4, 16, ct); for(k = 0; k < 5000; ++k) { ct[0] ^= ct[4]; ct[1] ^= ct[5]; ct[2] ^= ct[6]; ct[3] ^= ct[7]; encrypt(ct, ct); ct[4] ^= ct[0]; ct[5] ^= ct[1]; ct[6] ^= ct[2]; ct[7] ^= ct[3]; encrypt(ct + 4, ct + 4); } v_out(outf, 5, 16, ct + 4); xo = 4 - 2 * i; if(do_fss_hack && (**cipher_name() == 'f' || **cipher_name() == 's')) { ct[8] = ct[0]; ct[9] = ct[1]; ct[10] = ct[2]; ct[11] = ct[3]; xo = 4; } for(k = 0; k < 4 + 2 * i; ++k) key[k] ^= ct[k + xo]; } } clear_count(); }; void cbc_md(ostream &outf) { u4byte i, j, k, xo, pt[4], key[8], ct[12]; for(i = 0; i < 3; ++i) { outf << endl << endl << fstr[0] << setw(3) << 128 + 64 * i; key[0] = key[1] = key[2] = key[3] = 0; key[4] = key[5] = key[6] = key[7] = 0; // KEY[0] ct[0] = ct[1] = ct[2] = ct[3] = 0; // IV[0] ct[4] = ct[5] = ct[6] = ct[7] = 0; // CT[0] for(j = 0; j < 400; j++) { if(j % 40 == 0) put_count(j); set_key(key, 128 + 64 * i); v_out(outf, 1, j); v_out(outf, 3, 16 + 8 * i, key); v_out(outf, 2, 16, ct); v_out(outf, 5, 16, ct + 4); for(k = 0; k < 5000; ++k) { decrypt(ct + 4, pt); ct[0] ^= pt[0]; ct[1] ^= pt[1]; ct[2] ^= pt[2]; ct[3] ^= pt[3]; decrypt(ct, pt); ct[4] ^= pt[0]; ct[5] ^= pt[1]; ct[6] ^= pt[2]; ct[7] ^= pt[3]; } v_out(outf, 4, 16, ct + 4); xo = 4 - 2 * i; if(do_fss_hack && (**cipher_name() == 'f' || **cipher_name() == 's')) { ct[8] = ct[0]; ct[9] = ct[1]; ct[10] = ct[2]; ct[11] = ct[3]; xo = 4; } for(k = 0; k < 4 + 2 * i; ++k) key[k] ^= ct[k + xo]; } } clear_count(); }; int cmp_nocase(const string &s1, const string &s2) { string::const_iterator p1 = s1.begin(); string::const_iterator p2 = s2.begin(); while(p1 != s1.end() && p2 != s2.end()) { if(toupper(*p1) != toupper(*p2)) { return (toupper(*p1) < toupper(*p2) ? -1 : 1); } ++p1; ++p2; } return s2.size() - s1.size(); } int get_no(string s) { string::const_iterator p = s.begin(); int nbr = 0; while(p != s.end() && *p >= '0' && *p <= '9') { nbr = 10 * nbr + (*p - '0'); ++p; } return nbr; }; int find_line(ifstream &inf, string &str) { string::size_type pos; int ty1; while(!inf.eof()) { getline(inf, str); for(ty1 = 0; ty1 < 5; ++ty1) { if((pos = str.find(fstr[ty1])) != string::npos && !pos) { return ty1; } } } return -1; }; int sync(int nbr, ifstream &inf, string &str, bool outp) { int ty, nn; for(;;) { ty = find_line(inf, str); if(ty < 0) return ty; if(ty == 1) { nn = get_no(str.begin() + 2); if(nn >= nbr) return nn; } if(outp) cout << endl << " " << str; } }; void comp_vecs(string &fn1, string &fn2) { ifstream if1, if2; string str1, str2; int ty1, ty2, no1, no2, err_cnt, np_cnt; bool req; err_cnt = np_cnt = 0; req = true; if1.open(fn1.c_str(), ios::in); if(!if1.is_open()) { cout << endl << "*** 1st file (" << fn1 << ") not found ***"; return; } if2.open(fn2.c_str(), ios::in); if(!if2.is_open()) { cout << endl << "*** 2nd file (" << fn2 << ") not found ***"; return; } while(!(if1.eof() && if2.eof())) { if(req) { ty1 = find_line(if1, str1); ty2 = find_line(if2, str2); } if(ty1 < 0 && ty2 < 0) break; if(ty1 < 0 || ty2 < 0) { cout << endl << fn1 << (ty1 < 0 ? " short" : " long") << "er than " << fn2; break; } if(ty1 == 1) no1 = get_no(str1.begin() + 2); if(ty2 == 1) no2 = get_no(str2.begin() + 2); if(cmp_nocase(str1, str2) == 0) { req = true; continue; } if(ty1 == 1 && ty2 == 1) { np_cnt += abs(no2 - no1); req = false; if(no2 < no1) { cout << endl << "extra test(s) in " << fn2 << ':' << endl << " " << str2; no2 = sync(no1, if2, str2, np_cnt < 10); } if(no1 < no2) { cout << endl << "extra test(s) in " << fn1 << ':' << endl << " " << str1; no1 = sync(no2, if1, str1, np_cnt < 10); } } else if(ty1 != ty2) { cout << endl << "*** synchronisation error tests " << no1 << " and " << no2 << " ***"; return; } else if(ty1 >= 0) { cout << endl << "*** mismatch error test " << no1 << " *** "; if(++err_cnt < 6) cout << endl << " line 1: " << str1 << endl << " line 2: " << str2; } } if(np_cnt && !err_cnt) cout << endl << "other tests match" << endl; else if(!err_cnt) cout << endl << fn1 << " and " << fn2 << " match" << endl; }; bool test_args(int argc, char *argv[], char ch) { for(int i = 1; i < argc; ++i) { if(argv[i][0] != '-' && argv[i][0] != '/') continue; if(argv[i][1] == tolower(ch) || argv[i][1] == toupper(ch)) return true; } return false; }; void main(int argc, char *argv[]) { ofstream outf; bool do_cmp; string name, dir1(dir_path), dir2(aes_path); if(argc == 1) { cout << endl << "usage: aes_gkat [/t] [/h] [/k] [/e] [/c] where:"; cout << endl << " /t: compare output and reference test file(s)"; cout << endl << " /h: author's byte order (frog, safer+ & serpent)"; cout << endl << " /k: generate ECB Known Answer Test files"; cout << endl << " /e: generate ECB Monte Carlo Test files"; cout << endl << " /c: generate CBC Monte Carlo Test files"; cout << endl << endl; exit(0); } cout << endl << "Generate and verify tests for the " << cipher_name()[0] << " algorithm: (" << cipher_name()[1] << ")" << endl; do_fss_hack = test_args(argc, argv, 'h'); do_cmp = test_args(argc, argv, 't'); if(test_args(argc, argv, 'k')) { name = dir1 + string(cipher_name()[0]) + string("\\ecb_vk.txt"); outf.open(name.c_str(), ios_base::out); if(outf) { header(outf, 0); ecb_vk(outf); outf << endl; outf.close(); if(do_cmp) comp_vecs(dir2 + cipher_name()[2] + "\\ecb_vk.txt", name); } name = dir1 + string(cipher_name()[0]) + string("\\ecb_vt.txt"); outf.open(name.c_str(), ios_base::out); if(outf) { header(outf, 1); ecb_vt(outf); outf << endl; outf.close(); if(do_cmp) comp_vecs(dir2 + cipher_name()[2] + "\\ecb_vt.txt", name); } } if(test_args(argc, argv, 'e')) { name = dir1 + string(cipher_name()[0]) + string("\\ecb_me.txt"); outf.open(name.c_str(), ios_base::out); if(outf) { header(outf, 2); ecb_me(outf); outf << endl; outf.close(); if(do_cmp) comp_vecs(dir2 + cipher_name()[2] + "\\ecb_e_m.txt", name); } name = dir1 + string(cipher_name()[0]) + string("\\ecb_md.txt"); outf.open(name.c_str(), ios_base::out); if(outf) { header(outf, 3); ecb_md(outf); outf << endl; outf.close(); if(do_cmp) comp_vecs(dir2 + cipher_name()[2] + "\\ecb_d_m.txt", name); } } if(test_args(argc, argv, 'c')) { name = dir1 + string(cipher_name()[0]) + string("\\cbc_me.txt"); outf.open(name.c_str(), ios_base::out); if(outf) { header(outf, 4); cbc_me(outf); outf << endl; outf.close(); if(do_cmp) comp_vecs(dir2 + cipher_name()[2] + "\\cbc_e_m.txt", name); } name = dir1 + string(cipher_name()[0]) + string("\\cbc_md.txt"); outf.open(name.c_str(), ios_base::out); if(outf) { header(outf, 5); cbc_md(outf); outf << endl; outf.close(); if(do_cmp) comp_vecs(dir2 + cipher_name()[2] + "\\cbc_d_m.txt", name); } } };
AES Test in Cpp
// Run and Compare AES Tests For Known Answer and Monte Carlo Tests // Directory for AES test vector files and locally generated copies char *aes_path = "i:\\testvals\\"; char *dir_path = "d:\\cpp\\aes\\"; #include "../std_defs.h" #include#include #include #include #include using std::string; using std::getline; using std::ios; using std::cout; using std::ifstream; using std::endl; enum test_type { ecb_vk, ecb_vt, ecb_me, ecb_md, cbc_me, cbc_md }; string fstr[6] = { "KEYSIZE=", "I=", "IV=", "KEY=", "PT=", "CT=" }; inline int to_hex(char ch) { return (ch & 0x0f) + (ch > '9' ? 9 : 0); }; int hval_in(string::iterator p, string::iterator top, char *buf) { int i = 0; if((top - p) & 1) return -1; while(p < top) { if(isxdigit(*p) && isxdigit(*(p + 1))) { buf[i++] = (to_hex(*p) << 4) + to_hex(*(p + 1)); p += 2; } else break; } return i; }; int get_dec(string s) { string::const_iterator p = s.begin(); int nbr = 0; while(p != s.end() && *p >= '0' && *p <= '9') { nbr = 10 * nbr + (*p - '0'); ++p; } return nbr; }; int find_line(ifstream &inf, string &str, string fstr[]) { string::size_type pos; int ty1; while(!inf.eof()) { getline(inf, str); for(ty1 = 0; ty1 < 6; ++ty1) { if((pos = str.find(fstr[ty1])) != string::npos && !pos) { return ty1; } } } return -1; }; static bool on_screen = false; inline void clear_count(void) { if(on_screen) cout << "\b\b\b\b \b\b\b\b"; on_screen = false; }; void put_count(int x) { clear_count(); cout << (x /1000) % 10 << (x /100) % 10 << (x /10) % 10 << x % 10; on_screen = true; }; void ref_test(const string &in_file, const int it_cnt, test_type t_type) { u4byte i, kl, test_no, cnt, e_cnt, *kp; u4byte key[8], pt[4], iv[4], ect[4], act[8]; ifstream inf; string str; int ty; cout << endl << "Test file: " << in_file << endl << "Status: "; inf.open(in_file.c_str(), ios::in); if(!inf.is_open()) { cout << "error in running test" << endl; return; } cnt = 0; e_cnt = test_no = 0; while(!inf.eof()) { ty = find_line(inf, str, fstr); if(ty < 0) continue; switch(ty) { case 0: kl = get_dec(str.begin() + 8); continue; case 1: test_no = get_dec(str.begin() + 2); continue; case 2: hval_in(str.begin()+ 3, str.end(), reinterpret_cast (iv)); continue; case 3: hval_in(str.begin()+ 4, str.end(), reinterpret_cast (key)); continue; case 4: hval_in(str.begin()+ 3, str.end(), reinterpret_cast (pt)); if(t_type != ecb_md && t_type != cbc_md) continue; break; case 5: hval_in(str.begin()+ 3, str.end(), reinterpret_cast (ect)); if(t_type == ecb_md || t_type == cbc_md) continue; break; } kp = set_key(key, kl); if(it_cnt > 100 && test_no % 40 == 0) put_count(test_no); if(t_type == ecb_md || t_type == cbc_md) { act[0] = ect[0]; act[1] = ect[1]; act[2] = ect[2]; act[3] = ect[3]; if(t_type == cbc_md) { act[4] = iv[0]; act[5] = iv[1]; act[6] = iv[2]; act[7] = iv[3]; for(i = 0; i < it_cnt; i += 2) { decrypt(act, ect); act[4] ^= ect[0]; act[5] ^= ect[1]; act[6] ^= ect[2]; act[7] ^= ect[3]; decrypt(act + 4, ect); act[0] ^= ect[0]; act[1] ^= ect[1]; act[2] ^= ect[2]; act[3] ^= ect[3]; } } else for(i = 0; i < it_cnt; ++i) decrypt(act, act); if(pt[0] != act[0] || pt[1] != act[1] || pt[2] != act[2] || pt[3] != act[3]) { cout << endl << "encryption error on test " << test_no; e_cnt++; } if(t_type != cbc_md) { for(i = 0; i < it_cnt; ++i) encrypt(act, act); if(ect[0] != act[0] || ect[1] != act[1] || ect[2] != act[2] || ect[3] != act[3]) { cout << endl << "decryption error on test " << test_no; e_cnt++; } } } else { if(t_type == cbc_me) { act[0] = iv[0]; act[1] = iv[1]; act[2] = iv[2]; act[3] = iv[3]; act[4] = pt[0]; act[5] = pt[1]; act[6] = pt[2]; act[7] = pt[3]; for(i = 0; i < it_cnt; i += 2) { act[4] ^= act[0]; act[5] ^= act[1]; act[6] ^= act[2]; act[7] ^= act[3]; encrypt(act + 4, act + 4); act[0] ^= act[4]; act[1] ^= act[5]; act[2] ^= act[6]; act[3] ^= act[7]; encrypt(act, act); } } else { act[0] = pt[0]; act[1] = pt[1]; act[2] = pt[2]; act[3] = pt[3]; for(i = 0; i < it_cnt; ++i) encrypt(act, act); } if(ect[0] != act[0] || ect[1] != act[1] || ect[2] != act[2] || ect[3] != act[3]) { cout << endl << "encryption error on test " << test_no; e_cnt++; } if(t_type != cbc_me) { for(i = 0; i < it_cnt; ++i) decrypt(act, act); if(pt[0] != act[0] || pt[1] != act[1] || pt[2] != act[2] || pt[3] != act[3]) { cout << endl << "decryption error on test " << test_no; e_cnt++; } } } } inf.close(); clear_count(); if(e_cnt > 0) cout << endl << e_cnt << " errors during test" << endl; else cout << "all tests correct" << endl; }; bool test_args(int argc, char *argv[], char ch) { for(int i = 1; i < argc; ++i) { if(argv[i][0] != '-' && argv[i][0] != '/') continue; if(argv[i][1] == tolower(ch) || argv[i][1] == toupper(ch)) return true; } return false; }; void main(int argc, char *argv[]) { string name, path; if(argc == 1) { cout << endl << "usage: aes_test [/k] [/e] [/c] where:"; cout << endl << " /k: run ECB Known Answer Tests"; cout << endl << " /e: run ECB Monte Carlo Tests"; cout << endl << " /c: run CBC Monte Carlo Tests"; cout << endl << endl; exit(0); } cout << endl << "Run tests for the " << cipher_name()[0] << " algorithm: (" << cipher_name()[1] << ")" << endl; path = string(dir_path) + string(cipher_name()[0]); if(test_args(argc, argv, 'k')) { name = path + string("\\ecb_vk.txt"); ref_test(name, 1, ecb_vk); name = path + string("\\ecb_vt.txt"); ref_test(name, 1, ecb_vt); } if(test_args(argc, argv, 'e')) { name = path + string("\\ecb_me.txt"); ref_test(name, 10000, ecb_me); name = path + string("\\ecb_md.txt"); ref_test(name, 10000, ecb_md); } if(test_args(argc, argv, 'c')) { name = path + string("\\cbc_me.txt"); ref_test(name, 10000, cbc_me); name = path + string("\\cbc_md.txt"); ref_test(name, 10000, cbc_md); } cout << endl; };
A simple example of using AES encryption in Java
/****************************************************************
* Taken from https://gist.githubusercontent.com/bricef/2436364/
***************************************************************/
import java.security.MessageDigest;
import java.util.Arrays;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
public class AES {
static String IV = "AAAAAAAAAAAAAAAA";
static String plaintext = "test text 123\0\0\0"; /*Note null padding*/
static String encryptionKey = "0123456789abcdef";
public static void main(String [] args) {
try {
System.out.println("==Java==");
System.out.println("plain: " + plaintext);
byte[] cipher = encrypt(plaintext, encryptionKey);
System.out.print("cipher: ");
for (int i=0; i System.out.print(new Integer(cipher[i])+" ");
System.out.println("");
String decrypted = decrypt(cipher, encryptionKey);
System.out.println("decrypt: " + decrypted);
} catch (Exception e) {
e.printStackTrace();
}
}
public static byte[] encrypt(String plainText, String encryptionKey) throws Exception {
Cipher cipher = Cipher.getInstance("AES/CBC/NoPadding", "SunJCE");
SecretKeySpec key = new SecretKeySpec(encryptionKey.getBytes("UTF-8"), "AES");
cipher.init(Cipher.ENCRYPT_MODE, key,new IvParameterSpec(IV.getBytes("UTF-8")));
return cipher.doFinal(plainText.getBytes("UTF-8"));
}
public static String decrypt(byte[] cipherText, String encryptionKey) throws Exception{
Cipher cipher = Cipher.getInstance("AES/CBC/NoPadding", "SunJCE");
SecretKeySpec key = new SecretKeySpec(encryptionKey.getBytes("UTF-8"), "AES");
cipher.init(Cipher.DECRYPT_MODE, key,new IvParameterSpec(IV.getBytes("UTF-8")));
return new String(cipher.doFinal(cipherText),"UTF-8");
}
}
* Taken from https://gist.githubusercontent.com/bricef/2436364/
***************************************************************/
import java.security.MessageDigest;
import java.util.Arrays;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
public class AES {
static String IV = "AAAAAAAAAAAAAAAA";
static String plaintext = "test text 123\0\0\0"; /*Note null padding*/
static String encryptionKey = "0123456789abcdef";
public static void main(String [] args) {
try {
System.out.println("==Java==");
System.out.println("plain: " + plaintext);
byte[] cipher = encrypt(plaintext, encryptionKey);
System.out.print("cipher: ");
for (int i=0; i
System.out.println("");
String decrypted = decrypt(cipher, encryptionKey);
System.out.println("decrypt: " + decrypted);
} catch (Exception e) {
e.printStackTrace();
}
}
public static byte[] encrypt(String plainText, String encryptionKey) throws Exception {
Cipher cipher = Cipher.getInstance("AES/CBC/NoPadding", "SunJCE");
SecretKeySpec key = new SecretKeySpec(encryptionKey.getBytes("UTF-8"), "AES");
cipher.init(Cipher.ENCRYPT_MODE, key,new IvParameterSpec(IV.getBytes("UTF-8")));
return cipher.doFinal(plainText.getBytes("UTF-8"));
}
public static String decrypt(byte[] cipherText, String encryptionKey) throws Exception{
Cipher cipher = Cipher.getInstance("AES/CBC/NoPadding", "SunJCE");
SecretKeySpec key = new SecretKeySpec(encryptionKey.getBytes("UTF-8"), "AES");
cipher.init(Cipher.DECRYPT_MODE, key,new IvParameterSpec(IV.getBytes("UTF-8")));
return new String(cipher.doFinal(cipherText),"UTF-8");
}
}
A simple example of using AES encryption in C
/****************************************************
* Taken from: https://gist.github.com/bricef/2436364
****************************************************/
#include#include #include /* * MCrypt API available online: * http://linux.die.net/man/3/mcrypt */ #include #include
Dizzy
dizzy is a python based fuzzing framework with features such as:
- Can send to L2 as well as to upper layers (TCP/UDP/SCTP)
- Ability to work with odd length packet fields (no need to match byte borders, so even single flags or 7bit long fields can be represented and fuzzed)
- Very easy protocol definition syntax
- Ability to do multi packet state-full fuzzing with the ability to use received target data in response.
The source
- Can send to L2 as well as to upper layers (TCP/UDP/SCTP)
- Ability to work with odd length packet fields (no need to match byte borders, so even single flags or 7bit long fields can be represented and fuzzed)
- Very easy protocol definition syntax
- Ability to do multi packet state-full fuzzing with the ability to use received target data in response.
The source
apnbf.py
#!/usr/bin/env python
# apnbf.py
#
# Copyright 2011 Daniel Mende
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
#
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following disclaimer
# in the documentation and/or other materials provided with the
# distribution.
# * Neither the name of the nor the names of its
# contributors may be used to endorse or promote products derived from
# this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
import os
import sys
import signal
import socket
import struct
import threading
import time
from optparse import OptionParser
VERSION="0.1"
parser = OptionParser(usage="usage: %s [options] address" % os.path.basename(sys.argv[0]), version=VERSION)
parser.add_option("-w", type="string", help="Wordlist to use", dest="wordlist", default="")
parser.add_option("-d", type="int", help="BruteForce delay", metavar="SEC", dest="delay", default=1)
parser.add_option("-v", help="Be verbose", action="store_true", dest="debug", default=False)
(options, args) = parser.parse_args()
if len(args) != 1:
parser.error("incorrect number of arguments")
GTP_C_PORT = 2123
causelist = { 192 : "Non-existent",
193 : "Invalid message format",
194 : "IMSI not known",
195 : "MS is GPRS Detached",
196 : "MS is not GPRS Responding",
197 : "MS Refuses",
198 : "Version not supported",
199 : "No resources available",
200 : "Service not supported",
201 : "Mandatory IE incorrect",
202 : "Mandatory IE missing",
203 : "Optional IE incorrect",
204 : "System failure",
205 : "Roaming restriction",
206 : "P-TMSI Signature mismatch",
207 : "GPRS connection suspended",
208 : "Authentication failure",
209 : "User authentication failed",
210 : "Context not found",
211 : "All dynamic PDP addresses are occupied",
212 : "No memory is available",
213 : "Relocation failure",
214 : "Unknown mandatory extension header",
215 : "Semantic error in the TFT operation",
216 : "Syntactic error in the TFT operation",
217 : "Semantic errors in packet filter(s)",
218 : "Syntactic errors in packet filter(s)",
219 : "Missing or unknown APN",
220 : "Unknown PDP address or PDP type",
221 : "PDP context without TFT already activated",
222 : "APN access denied - no subscription",
223 : "APN Restriction type incompatibility with currently active PDP Contexts",
224 : "MS MBMS Capabilities Insufficient",
225 : "Invalid Correlation-ID",
226 : "MBMS Bearer Context Superseded",
227 : "Bearer Control Mode violation",
228 : "Collision with network initiated request",
}
try:
wordlist = open(options.wordlist)
except Exception, e:
parser.error("cant open wordlist: %s" % e)
class listener(threading.Thread):
def __init__(self, sock):
threading.Thread.__init__(self)
self.sock = sock
self.running = True
def run(self):
while self.running:
try:
(data, (ip, port)) = self.sock.recvfrom(4096)
except Exception, e:
pass
else:
out = ""
if options.debug:
out += "%s:%i sent response\n" % (ip, port)
try:
(v, t, l, s, c) = struct.unpack("!BBHxxxxHxxxB", data[:14])
if options.debug:
out += "\tversion = %i type = %x len = %i seq = %i cause = %d\n" % (v >> 5, t, l, s, c)
if t == 0x11:
if c == 128:
#req accepted
out += "*** APN FOUND: %s\n" % db[s]
else:
if c in causelist:
out += "\t%s\n" % causelist[c]
except:
pass
print out
def quit(self):
self.running = False
seq = 0
db = {}
def build_pdp_request(apn, gsn):
global seq
global db
s = seq
seq += 1
l = len(apn)
a = struct.pack("!B", l - 1) + apn.rstrip('\r\n')
g = socket.inet_aton(gsn)
db[s] = apn
dpd_req = "\x00\x00\x00\x00" + struct.pack("!H", s) + "\x00\x00\x02\x22\x16\x11\x00\x21\x00\x00\xf1\x0e\x2a\x0f\xfc\x10\x00\x0c\x35\x01\x11\x00\x0c\x26\xee\x14\x05\x80\x00\x02\xf1\x21\x83" + struct.pack("!H", l) + a + "\x85\x00\x04\x0a\x0a\x01\x05\x85\x00\x04\x0a\x0a\x01\x05\x86\x00\x07\x91\x04\x07\x21\x00\x00\xf1\x87\x00\x0f\x02\x02\x62\x1f\x91\x97\xfe\xfe\x76\xf9\x40\x40\x00\x00\x00\x97\x00\x01\x01\x98\x00\x08\x00\x22\x66\x01\xff\xfe\x11\x11\x99\x00\x02\x01\x01\x9a\x00\x08\x99\x99\x00\x10\x02\x00\x10\x11"
dpd_req = "\x32\x10" + struct.pack("!H", len(dpd_req) - 4) + dpd_req
return dpd_req
def quit(sig, data):
global l
l.quit()
wordlist.close()
print "apnbf v%s\t\tCopyright 2011 Daniel Mende" % VERSION
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
s.settimeout(1.0)
s.bind(('', GTP_C_PORT))
l = listener(s)
signal.signal(signal.SIGINT, quit)
l.start()
print "starting scan of " + args[0]
for line in wordlist:
try:
print "trying %s" % line.rstrip('\r\n')
s.sendto(build_pdp_request(line, args[0]), (args[0], GTP_C_PORT))
time.sleep(options.delay)
except:
pass
time.sleep(5)
l.quit()
print "done"
# apnbf.py
#
# Copyright 2011 Daniel Mende
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are
# met:
#
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# * Redistributions in binary form must reproduce the above
# copyright notice, this list of conditions and the following disclaimer
# in the documentation and/or other materials provided with the
# distribution.
# * Neither the name of the nor the names of its
# contributors may be used to endorse or promote products derived from
# this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
import os
import sys
import signal
import socket
import struct
import threading
import time
from optparse import OptionParser
VERSION="0.1"
parser = OptionParser(usage="usage: %s [options] address" % os.path.basename(sys.argv[0]), version=VERSION)
parser.add_option("-w", type="string", help="Wordlist to use", dest="wordlist", default="")
parser.add_option("-d", type="int", help="BruteForce delay", metavar="SEC", dest="delay", default=1)
parser.add_option("-v", help="Be verbose", action="store_true", dest="debug", default=False)
(options, args) = parser.parse_args()
if len(args) != 1:
parser.error("incorrect number of arguments")
GTP_C_PORT = 2123
causelist = { 192 : "Non-existent",
193 : "Invalid message format",
194 : "IMSI not known",
195 : "MS is GPRS Detached",
196 : "MS is not GPRS Responding",
197 : "MS Refuses",
198 : "Version not supported",
199 : "No resources available",
200 : "Service not supported",
201 : "Mandatory IE incorrect",
202 : "Mandatory IE missing",
203 : "Optional IE incorrect",
204 : "System failure",
205 : "Roaming restriction",
206 : "P-TMSI Signature mismatch",
207 : "GPRS connection suspended",
208 : "Authentication failure",
209 : "User authentication failed",
210 : "Context not found",
211 : "All dynamic PDP addresses are occupied",
212 : "No memory is available",
213 : "Relocation failure",
214 : "Unknown mandatory extension header",
215 : "Semantic error in the TFT operation",
216 : "Syntactic error in the TFT operation",
217 : "Semantic errors in packet filter(s)",
218 : "Syntactic errors in packet filter(s)",
219 : "Missing or unknown APN",
220 : "Unknown PDP address or PDP type",
221 : "PDP context without TFT already activated",
222 : "APN access denied - no subscription",
223 : "APN Restriction type incompatibility with currently active PDP Contexts",
224 : "MS MBMS Capabilities Insufficient",
225 : "Invalid Correlation-ID",
226 : "MBMS Bearer Context Superseded",
227 : "Bearer Control Mode violation",
228 : "Collision with network initiated request",
}
try:
wordlist = open(options.wordlist)
except Exception, e:
parser.error("cant open wordlist: %s" % e)
class listener(threading.Thread):
def __init__(self, sock):
threading.Thread.__init__(self)
self.sock = sock
self.running = True
def run(self):
while self.running:
try:
(data, (ip, port)) = self.sock.recvfrom(4096)
except Exception, e:
pass
else:
out = ""
if options.debug:
out += "%s:%i sent response\n" % (ip, port)
try:
(v, t, l, s, c) = struct.unpack("!BBHxxxxHxxxB", data[:14])
if options.debug:
out += "\tversion = %i type = %x len = %i seq = %i cause = %d\n" % (v >> 5, t, l, s, c)
if t == 0x11:
if c == 128:
#req accepted
out += "*** APN FOUND: %s\n" % db[s]
else:
if c in causelist:
out += "\t%s\n" % causelist[c]
except:
pass
print out
def quit(self):
self.running = False
seq = 0
db = {}
def build_pdp_request(apn, gsn):
global seq
global db
s = seq
seq += 1
l = len(apn)
a = struct.pack("!B", l - 1) + apn.rstrip('\r\n')
g = socket.inet_aton(gsn)
db[s] = apn
dpd_req = "\x00\x00\x00\x00" + struct.pack("!H", s) + "\x00\x00\x02\x22\x16\x11\x00\x21\x00\x00\xf1\x0e\x2a\x0f\xfc\x10\x00\x0c\x35\x01\x11\x00\x0c\x26\xee\x14\x05\x80\x00\x02\xf1\x21\x83" + struct.pack("!H", l) + a + "\x85\x00\x04\x0a\x0a\x01\x05\x85\x00\x04\x0a\x0a\x01\x05\x86\x00\x07\x91\x04\x07\x21\x00\x00\xf1\x87\x00\x0f\x02\x02\x62\x1f\x91\x97\xfe\xfe\x76\xf9\x40\x40\x00\x00\x00\x97\x00\x01\x01\x98\x00\x08\x00\x22\x66\x01\xff\xfe\x11\x11\x99\x00\x02\x01\x01\x9a\x00\x08\x99\x99\x00\x10\x02\x00\x10\x11"
dpd_req = "\x32\x10" + struct.pack("!H", len(dpd_req) - 4) + dpd_req
return dpd_req
def quit(sig, data):
global l
l.quit()
wordlist.close()
print "apnbf v%s\t\tCopyright 2011 Daniel Mende
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
s.settimeout(1.0)
s.bind(('', GTP_C_PORT))
l = listener(s)
signal.signal(signal.SIGINT, quit)
l.start()
print "starting scan of " + args[0]
for line in wordlist:
try:
print "trying %s" % line.rstrip('\r\n')
s.sendto(build_pdp_request(line, args[0]), (args[0], GTP_C_PORT))
time.sleep(options.delay)
except:
pass
time.sleep(5)
l.quit()
print "done"
Saturday, May 24, 2014
Business and Technical Logistics of Pen Testing
Business and Technical Logistics of Pen Testing | ||
|
Blowfish.java
/* -----------------------------------------------------------------------------
Blowfish.java
Ported to Java(tm) from the C-code reference implementation --part of the
SSL implementation 0.6.6-- written by Eric Young (eay@mincom.oz.au).
Changes:
1.1 --June 1997
+ improved performance by ~20%.
+ changed the signatures of blowfishEncrypt() and blowfishDecrypt()
to use less resources and improve performance.
+ in-lined the code of the F transform function.
Copyright ©1997, Type & Graphics Pty Limited. All rights reserved.
----------------------------------------------------------------------------- */
package cryptix.security;
import java.security.Cipher;
import java.security.Key;
import java.security.KeyException;
import java.security.Security;
import java.security.SymmetricCipher;
/**
* Blowfish is a 64-bit symmetric block cipher with a variable length key,
* up to 448-bit or 56 bytes, designed by Bruce Schneier.
*
* References:
*
Applied Cryptography --2nd Edition. Bruce Schneier; John Wiley & Sons
* 1996, 336-339.
*
* @version 1.0 --June 97
* @author Raif S. Naffah
*/
public class Blowfish
extends Cipher
implements SymmetricCipher
{
// Variables and constants
//............................................................................
/**
* Cipher initialisation data.
*/
private static final int[]
Pi = {
0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344, 0xA4093822, 0x299F31D0,
0x082EFA98, 0xEC4E6C89, 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917, 0x9216D5D9, 0x8979FB1B},
S0 = {
0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7,
0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99,
0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16,
0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E,
0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE,
0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013,
0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF,
0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E,
0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60,
0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440,
0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE,
0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A,
0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E,
0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677,
0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193,
0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032,
0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88,
0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239,
0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E,
0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0,
0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3,
0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98,
0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88,
0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE,
0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6,
0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D,
0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B,
0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7,
0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA,
0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463,
0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F,
0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09,
0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3,
0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB,
0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279,
0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8,
0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB,
0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82,
0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB,
0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573,
0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0,
0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B,
0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790,
0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8,
0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4,
0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0,
0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7,
0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C,
0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD,
0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1,
0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299,
0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9,
0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477,
0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF,
0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49,
0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF,
0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA,
0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5,
0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41,
0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915,
0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400,
0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915,
0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664,
0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A},
S1 = {
0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623,
0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266,
0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1,
0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E,
0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6,
0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1,
0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E,
0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1,
0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737,
0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8,
0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF,
0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD,
0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701,
0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7,
0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41,
0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331,
0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF,
0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF,
0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E,
0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87,
0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C,
0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2,
0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16,
0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD,
0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B,
0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509,
0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E,
0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3,
0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F,
0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A,
0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4,
0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960,
0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66,
0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28,
0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802,
0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84,
0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510,
0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF,
0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14,
0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E,
0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50,
0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7,
0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8,
0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281,
0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99,
0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696,
0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128,
0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73,
0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0,
0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0,
0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105,
0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250,
0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3,
0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285,
0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00,
0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061,
0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB,
0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E,
0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735,
0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC,
0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9,
0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340,
0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20,
0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7},
S2 = {
0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934,
0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068,
0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF,
0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840,
0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45,
0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504,
0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A,
0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB,
0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE,
0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6,
0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42,
0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B,
0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2,
0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB,
0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527,
0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B,
0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33,
0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C,
0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3,
0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC,
0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17,
0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564,
0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B,
0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115,
0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922,
0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728,
0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0,
0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E,
0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37,
0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D,
0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804,
0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B,
0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3,
0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB,
0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D,
0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C,
0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350,
0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9,
0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A,
0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE,
0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D,
0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC,
0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F,
0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61,
0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2,
0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9,
0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2,
0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C,
0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E,
0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633,
0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10,
0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169,
0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52,
0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027,
0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5,
0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62,
0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634,
0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76,
0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24,
0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC,
0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4,
0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C,
0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837,
0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0},
S3 = {
0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B,
0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE,
0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B,
0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4,
0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8,
0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6,
0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304,
0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22,
0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4,
0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6,
0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9,
0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59,
0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593,
0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51,
0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28,
0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C,
0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B,
0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28,
0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C,
0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD,
0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A,
0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319,
0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB,
0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F,
0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991,
0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32,
0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680,
0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166,
0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE,
0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB,
0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5,
0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47,
0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370,
0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D,
0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84,
0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048,
0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8,
0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD,
0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9,
0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7,
0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38,
0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F,
0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C,
0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525,
0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1,
0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442,
0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964,
0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E,
0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8,
0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D,
0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F,
0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299,
0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02,
0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC,
0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614,
0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A,
0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6,
0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B,
0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0,
0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060,
0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E,
0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9,
0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F,
0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6};
private static final int
MIN_NOF_ROUNDS = 16, // this is also the default value
MAX_NOF_ROUNDS = 20,
BLOCK_SIZE = 8, // Blowfish block size in bytes
MAX_USER_KEY_LENGTH = 448 / 8; // given in bytes from a value in bits
/**
* This Blowfish object session key and s-boxes data placeholders.
*/
private int[]
P = new int[18],
sKey = new int[4 * 256];
/**
* The current number of rounds. May get changed if a ROUNDS
* property is set in the security provider properties file.
* Defaults to 16.
*/
private int rounds = MIN_NOF_ROUNDS;
// Constructor
//............................................................................
/**
* Constructs a Blowfish cipher object, and depending on the ROUNDS
* property, sets the number of rounds for this instance.
*
* If ROUNDS property is set it has to be at least 16 and at most 20.
* If the value is invalid, the constructor uses a value of 16.
*/
public Blowfish () {
super(false, false, "Cryptix");
try {
String ps = Security.getAlgorithmProperty("Blowfish", "ROUNDS");
int x = Integer.valueOf(ps).intValue();
if (x != rounds && x >= MIN_NOF_ROUNDS && x <= MAX_NOF_ROUNDS)
rounds = x;
} catch (Exception e) {}
}
// Implementation of JCE methods
//............................................................................
/**
* SPI: Returns the length of an input block, in bytes.
*
* @return the length in bytes of an input block for this cipher.
*/
public int engineBlockSize () {
return BLOCK_SIZE;
}
/**
* SPI: Initializes this cipher for encryption, using the
* specified key.
*
* @param key the key to use for encryption.
* @exception KeyException when one of the following occurs:
*
The Key object is null;
*
The encoded byte array form of the key is a zero
* length one.
*/
public void engineInitEncrypt (Key key)
throws KeyException {
makeKey(key);
state = ENCRYPT;
}
/**
* SPI: Initializes this cipher for decryption, using the
* specified key.
*
* @param key the key to use for decryption.
* @exception KeyException when one of the following occurs:
*
The Key object is null;
*
The encoded byte array form of the key is a zero
* length one.
*/
public void engineInitDecrypt (Key key)
throws KeyException {
makeKey(key);
state = DECRYPT;
}
/**
*
* input and output regions may overlap but inLen has to be a multiple
* of Blowfish's block size; ie. 8 bytes. If it isn't, then only the
* first (n * 8) bytes are processed.
*
* @param in the input data.
* @param inOff the offset into
* the data starts.
* @param inLen the length of the subarray. It's the responsibility
* of the caller to ensure that inLen = n * 8 bytes.
* @param out the output array.
* @param outOff the offset indicating where to start writing into
* the
* @return the number of bytes written.
*/
public int engineUpdate (byte[] in, int inOff, int inLen, byte[] out, int outOff) {
int blockCount = inLen / BLOCK_SIZE;
byte[] outs = new byte[blockCount * BLOCK_SIZE];
if (state == Cipher.ENCRYPT)
for (int i = 0; i < blockCount; i++) {
blowfishEncrypt(in, inOff, outs, i * BLOCK_SIZE);
inOff += BLOCK_SIZE;
}
else
for (int i = 0; i < blockCount; i++) {
blowfishDecrypt(in, inOff, outs, i * BLOCK_SIZE);
inOff += BLOCK_SIZE;
}
System.arraycopy(outs, 0, out, outOff, outs.length);
return outs.length;
}
// Own methods
//............................................................................
/**
* Sets the number of rounds for this cipher. Allowed only when this
* cipher is in the UNINITIALIZED state; otherwise an exception is
* thrown.
* * If the specified number is invalid, the current one remains unchanged.
*
* @param r the desired number of rounds for this cipher.
* @throw IllegalStateException if this cipher is not uninitialised.
*/
public void setRounds (int r) {
if (state != UNINITIALIZED)
throw new IllegalStateException("Cipher not in UNINITIALIZED state");
if (r != rounds && r >= MIN_NOF_ROUNDS && r <= MAX_NOF_ROUNDS)
rounds = r;
}
/**
* The normal entry to the encryption process. It is guaranteed
* to be called with enough bytes in the input to carry on an
* encryption of one full block.
*
* The code of the Blowfish encryption engine, found here, is also
* replicated in the BF_encrypt method found later. The reasons for
* this duplication is performance. This method, outputs the result
* in a byte array form, suitable for the user data encryption
* operations, while BF_encrypt outputs its result as an int array
* suitable for, and used during, the expansion of the user-key into
* a Blowfish session key.
*
* @param in input byte array of plain text.
* @param off index in in of where to start considering data.
* @param out will contain the cipher-text block.
* @param outOff index in out where cipher-text starts.
*/
private void blowfishEncrypt (byte[] in, int off, byte[] out, int outOff) {
int L = ((in[off ] & 0xFF) << 24) | ((in[off + 1] & 0xFF) << 16) |
((in[off + 2] & 0xFF) << 8) | (in[off + 3] & 0xFF),
R = ((in[off + 4] & 0xFF) << 24) | ((in[off + 5] & 0xFF) << 16) |
((in[off + 6] & 0xFF) << 8) | (in[off + 7] & 0xFF),
a, b, c, d;
L ^= P[0];
for (int i = 0; i < rounds; ) {
a = (L >>> 24) & 0xFF;
b = 0x100 | ((L >>> 16) & 0xFF); // 256 +
c = 0x200 | ((L >>> 8) & 0xFF); // 512 +
d = 0x300 | L & 0xFF; // 768 +
R ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
a = (R >>> 24) & 0xFF;
b = 0x100 | ((R >>> 16) & 0xFF); // 256 +
c = 0x200 | ((R >>> 8) & 0xFF); // 512 +
d = 0x300 | R & 0xFF; // 768 +
L ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
}
R ^= P[rounds + 1];
out[outOff ] = (byte)((R >>> 24) & 0xFF);
out[outOff + 1] = (byte)((R >>> 16) & 0xFF);
out[outOff + 2] = (byte)((R >>> 8) & 0xFF);
out[outOff + 3] = (byte)( R & 0xFF);
out[outOff + 4] = (byte)((L >>> 24) & 0xFF);
out[outOff + 5] = (byte)((L >>> 16) & 0xFF);
out[outOff + 6] = (byte)((L >>> 8) & 0xFF);
out[outOff + 7] = (byte)( L & 0xFF);
}
/**
* The normal entry to the decryption process. It is guaranteed
* to be called with enough bytes in the input to carry on a
* decryption of one full block.
*
* Because the Blowfish cipher engine is designed to handle two
* 32-bit blocks, this method's purpose is to transform on entry
* and exit the data to/from 32-bit blocks; ie. Java.int.
*
* The input becomes two 32-bit blocks as Left and Right halves
* onto which the Blowfish cipher function is applied ROUNDS times
* in reverse order to that of the encryption.
*
* @param in input byte array of cipher text.
* @param off index in in of where to start considering data.
* @param out will contain the plain-text block.
* @param outOff index in out where plain-text starts.
*/
private void blowfishDecrypt (byte[] in, int off, byte[] out, int outOff) {
int L = ((in[off ] & 0xFF) << 24) | ((in[off + 1] & 0xFF) << 16) |
((in[off + 2] & 0xFF) << 8) | (in[off + 3] & 0xFF),
R = ((in[off + 4] & 0xFF) << 24) | ((in[off + 5] & 0xFF) << 16) |
((in[off + 6] & 0xFF) << 8) | (in[off + 7] & 0xFF);
int a, b, c, d;
L ^= P[rounds + 1];
for (int i = rounds; i > 0; ) {
a = (L >>> 24) & 0xFF;
b = 0x100 | ((L >>> 16) & 0xFF); // 256 +
c = 0x200 | ((L >>> 8) & 0xFF); // 512 +
d = 0x300 | L & 0xFF; // 768 +
R ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[i--];
a = (R >>> 24) & 0xFF;
b = 0x100 | ((R >>> 16) & 0xFF); // 256 +
c = 0x200 | ((R >>> 8) & 0xFF); // 512 +
d = 0x300 | R & 0xFF; // 768 +
L ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[i--];
}
R ^= P[0];
out[outOff ] = (byte)((R >>> 24) & 0xFF);
out[outOff + 1] = (byte)((R >>> 16) & 0xFF);
out[outOff + 2] = (byte)((R >>> 8) & 0xFF);
out[outOff + 3] = (byte)( R & 0xFF);
out[outOff + 4] = (byte)((L >>> 24) & 0xFF);
out[outOff + 5] = (byte)((L >>> 16) & 0xFF);
out[outOff + 6] = (byte)((L >>> 8) & 0xFF);
out[outOff + 7] = (byte)( L & 0xFF);
}
/**
* See description in
*
* This method is only called by the makeKey method to generate
* a session key from user data. It outputs the result to an
* int array.
*
* @see #blowfishEncrypt
* @param L Left half (32-bit) of the plain text block,
* @param R Right half (32-bit) of the plain text block.
* @param out the int array where the result will be saved.
* @param outOff where the data starts in the byte array.
*/
private final void BF_encrypt (int L, int R, int[] out, int outOff) {
int a, b, c, d;
L ^= P[0];
for (int i = 0; i < rounds; ) {
a = (L >>> 24) & 0xFF;
b = 0x100 | ((L >>> 16) & 0xFF); // 256 +
c = 0x200 | ((L >>> 8) & 0xFF); // 512 +
d = 0x300 | L & 0xFF; // 768 +
R ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
a = (R >>> 24) & 0xFF;
b = 0x100 | ((R >>> 16) & 0xFF); // 256 +
c = 0x200 | ((R >>> 8) & 0xFF); // 512 +
d = 0x300 | R & 0xFF; // 768 +
L ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
}
R ^= P[rounds + 1];
out[outOff ] = R;
out[outOff + 1] = L;
}
/**
* Expands a userKey to a working Blowfish session key (P) and
* generates this session s-boxes data (sKey).
*
* The key bytes are fist extracted from the user-key and then
* used, repetitively if need be, to build the contents of this
* session key and S-boxes values.
*
* The method's only exceptions are when the user-key's contents
* is a null Java object or a byte array of zero length. Otherwise
* the key data -up to 56 bytes- are used repetitively.
*
* @param key the user-key object to use for this session.
* @exception KeyException when one of the following occurs:
*
The Key object is null;
*
The encoded byte array form of the key is a zero
* length one.
*/
private synchronized void makeKey (Key key)
throws KeyException {
byte[] kk = key.getEncoded();
if (kk == null)
throw new KeyException("Null Blowfish key");
int len = kk.length;
if (len == 0)
throw new KeyException("Invalid Blowfish user key length");
if (len > MAX_USER_KEY_LENGTH)
len = MAX_USER_KEY_LENGTH;
// use the user-key data to generate an initial set
// of session key, and copy the initial s-boxes values
// to this session's set (one large array: sKey)
System.arraycopy(S0, 0, sKey, 0, 256);
System.arraycopy(S1, 0, sKey, 256, 256);
System.arraycopy(S2, 0, sKey, 512, 256);
System.arraycopy(S3, 0, sKey, 768, 256);
int ri;
for (int i = 0, j = 0; i < rounds + 2; i++) {
ri = 0;
for (int k = 0; k < 4; k++) {
ri = (ri << 8) | (kk[j++] & 0xFF);
j %= len;
}
P[i] = Pi[i] ^ ri;
}
// use the former to effectively generate the session key
BF_encrypt(0, 0, P, 0);
for (int i = 2; i < rounds + 2; i += 2)
BF_encrypt(P[i - 2], P[i - 1], P, i);
// and this session s-boxes
BF_encrypt(P[rounds], P[rounds + 1], sKey, 0);
for (int i = 2; i < 4 * 256; i += 2)
BF_encrypt(sKey[i - 2], sKey[i - 1], sKey, i);
}
}
Blowfish.java
Ported to Java(tm) from the C-code reference implementation --part of the
SSL implementation 0.6.6-- written by Eric Young (eay@mincom.oz.au).
Changes:
1.1 --June 1997
+ improved performance by ~20%.
+ changed the signatures of blowfishEncrypt() and blowfishDecrypt()
to use less resources and improve performance.
+ in-lined the code of the F transform function.
Copyright ©1997, Type & Graphics Pty Limited. All rights reserved.
----------------------------------------------------------------------------- */
package cryptix.security;
import java.security.Cipher;
import java.security.Key;
import java.security.KeyException;
import java.security.Security;
import java.security.SymmetricCipher;
/**
* Blowfish is a 64-bit symmetric block cipher with a variable length key,
* up to 448-bit or 56 bytes, designed by Bruce Schneier.
*
* References:
*
* 1996, 336-339.
*
* @version 1.0 --June 97
* @author Raif S. Naffah
*/
public class Blowfish
extends Cipher
implements SymmetricCipher
{
// Variables and constants
//............................................................................
/**
* Cipher initialisation data.
*/
private static final int[]
Pi = {
0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344, 0xA4093822, 0x299F31D0,
0x082EFA98, 0xEC4E6C89, 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917, 0x9216D5D9, 0x8979FB1B},
S0 = {
0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7,
0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99,
0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16,
0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E,
0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE,
0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013,
0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF,
0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E,
0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60,
0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440,
0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE,
0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A,
0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E,
0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677,
0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193,
0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032,
0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88,
0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239,
0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E,
0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0,
0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3,
0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98,
0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88,
0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE,
0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6,
0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D,
0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B,
0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7,
0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA,
0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463,
0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F,
0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09,
0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3,
0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB,
0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279,
0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8,
0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB,
0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82,
0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB,
0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573,
0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0,
0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B,
0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790,
0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8,
0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4,
0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0,
0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7,
0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C,
0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD,
0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1,
0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299,
0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9,
0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477,
0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF,
0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49,
0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF,
0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA,
0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5,
0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41,
0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915,
0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400,
0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915,
0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664,
0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A},
S1 = {
0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623,
0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266,
0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1,
0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E,
0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6,
0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1,
0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E,
0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1,
0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737,
0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8,
0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF,
0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD,
0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701,
0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7,
0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41,
0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331,
0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF,
0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF,
0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E,
0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87,
0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C,
0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2,
0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16,
0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD,
0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B,
0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509,
0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E,
0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3,
0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F,
0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A,
0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4,
0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960,
0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66,
0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28,
0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802,
0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84,
0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510,
0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF,
0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14,
0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E,
0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50,
0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7,
0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8,
0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281,
0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99,
0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696,
0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128,
0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73,
0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0,
0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0,
0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105,
0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250,
0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3,
0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285,
0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00,
0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061,
0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB,
0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E,
0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735,
0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC,
0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9,
0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340,
0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20,
0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7},
S2 = {
0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934,
0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068,
0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF,
0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840,
0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45,
0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504,
0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A,
0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB,
0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE,
0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6,
0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42,
0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B,
0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2,
0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB,
0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527,
0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B,
0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33,
0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C,
0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3,
0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC,
0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17,
0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564,
0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B,
0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115,
0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922,
0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728,
0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0,
0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E,
0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37,
0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D,
0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804,
0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B,
0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3,
0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB,
0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D,
0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C,
0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350,
0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9,
0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A,
0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE,
0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D,
0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC,
0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F,
0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61,
0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2,
0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9,
0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2,
0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C,
0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E,
0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633,
0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10,
0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169,
0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52,
0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027,
0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5,
0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62,
0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634,
0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76,
0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24,
0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC,
0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4,
0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C,
0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837,
0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0},
S3 = {
0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B,
0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE,
0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B,
0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4,
0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8,
0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6,
0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304,
0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22,
0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4,
0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6,
0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9,
0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59,
0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593,
0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51,
0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28,
0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C,
0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B,
0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28,
0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C,
0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD,
0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A,
0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319,
0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB,
0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F,
0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991,
0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32,
0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680,
0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166,
0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE,
0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB,
0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5,
0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47,
0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370,
0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D,
0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84,
0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048,
0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8,
0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD,
0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9,
0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7,
0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38,
0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F,
0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C,
0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525,
0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1,
0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442,
0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964,
0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E,
0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8,
0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D,
0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F,
0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299,
0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02,
0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC,
0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614,
0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A,
0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6,
0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B,
0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0,
0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060,
0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E,
0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9,
0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F,
0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6};
private static final int
MIN_NOF_ROUNDS = 16, // this is also the default value
MAX_NOF_ROUNDS = 20,
BLOCK_SIZE = 8, // Blowfish block size in bytes
MAX_USER_KEY_LENGTH = 448 / 8; // given in bytes from a value in bits
/**
* This Blowfish object session key and s-boxes data placeholders.
*/
private int[]
P = new int[18],
sKey = new int[4 * 256];
/**
* The current number of rounds. May get changed if a ROUNDS
* property is set in the security provider properties file.
* Defaults to 16.
*/
private int rounds = MIN_NOF_ROUNDS;
// Constructor
//............................................................................
/**
* Constructs a Blowfish cipher object, and depending on the ROUNDS
* property, sets the number of rounds for this instance.
*
* If ROUNDS property is set it has to be at least 16 and at most 20.
* If the value is invalid, the constructor uses a value of 16.
*/
public Blowfish () {
super(false, false, "Cryptix");
try {
String ps = Security.getAlgorithmProperty("Blowfish", "ROUNDS");
int x = Integer.valueOf(ps).intValue();
if (x != rounds && x >= MIN_NOF_ROUNDS && x <= MAX_NOF_ROUNDS)
rounds = x;
} catch (Exception e) {}
}
// Implementation of JCE methods
//............................................................................
/**
* SPI: Returns the length of an input block, in bytes.
*
* @return the length in bytes of an input block for this cipher.
*/
public int engineBlockSize () {
return BLOCK_SIZE;
}
/**
* SPI: Initializes this cipher for encryption, using the
* specified key.
*
* @param key the key to use for encryption.
* @exception KeyException when one of the following occurs:
*
*
* length one.
*/
public void engineInitEncrypt (Key key)
throws KeyException {
makeKey(key);
state = ENCRYPT;
}
/**
* SPI: Initializes this cipher for decryption, using the
* specified key.
*
* @param key the key to use for decryption.
* @exception KeyException when one of the following occurs:
*
*
* length one.
*/
public void engineInitDecrypt (Key key)
throws KeyException {
makeKey(key);
state = DECRYPT;
}
/**
*
in
and out
may be the same array, and the* input and output regions may overlap but inLen has to be a multiple
* of Blowfish's block size; ie. 8 bytes. If it isn't, then only the
* first (n * 8) bytes are processed.
*
* @param in the input data.
* @param inOff the offset into
in
specifying where* the data starts.
* @param inLen the length of the subarray. It's the responsibility
* of the caller to ensure that inLen = n * 8 bytes.
* @param out the output array.
* @param outOff the offset indicating where to start writing into
* the
out
array.* @return the number of bytes written.
*/
public int engineUpdate (byte[] in, int inOff, int inLen, byte[] out, int outOff) {
int blockCount = inLen / BLOCK_SIZE;
byte[] outs = new byte[blockCount * BLOCK_SIZE];
if (state == Cipher.ENCRYPT)
for (int i = 0; i < blockCount; i++) {
blowfishEncrypt(in, inOff, outs, i * BLOCK_SIZE);
inOff += BLOCK_SIZE;
}
else
for (int i = 0; i < blockCount; i++) {
blowfishDecrypt(in, inOff, outs, i * BLOCK_SIZE);
inOff += BLOCK_SIZE;
}
System.arraycopy(outs, 0, out, outOff, outs.length);
return outs.length;
}
// Own methods
//............................................................................
/**
* Sets the number of rounds for this cipher. Allowed only when this
* cipher is in the UNINITIALIZED state; otherwise an exception is
* thrown.
* * If the specified number is invalid, the current one remains unchanged.
*
* @param r the desired number of rounds for this cipher.
* @throw IllegalStateException if this cipher is not uninitialised.
*/
public void setRounds (int r) {
if (state != UNINITIALIZED)
throw new IllegalStateException("Cipher not in UNINITIALIZED state");
if (r != rounds && r >= MIN_NOF_ROUNDS && r <= MAX_NOF_ROUNDS)
rounds = r;
}
/**
* The normal entry to the encryption process. It is guaranteed
* to be called with enough bytes in the input to carry on an
* encryption of one full block.
*
* The code of the Blowfish encryption engine, found here, is also
* replicated in the BF_encrypt method found later. The reasons for
* this duplication is performance. This method, outputs the result
* in a byte array form, suitable for the user data encryption
* operations, while BF_encrypt outputs its result as an int array
* suitable for, and used during, the expansion of the user-key into
* a Blowfish session key.
*
* @param in input byte array of plain text.
* @param off index in in of where to start considering data.
* @param out will contain the cipher-text block.
* @param outOff index in out where cipher-text starts.
*/
private void blowfishEncrypt (byte[] in, int off, byte[] out, int outOff) {
int L = ((in[off ] & 0xFF) << 24) | ((in[off + 1] & 0xFF) << 16) |
((in[off + 2] & 0xFF) << 8) | (in[off + 3] & 0xFF),
R = ((in[off + 4] & 0xFF) << 24) | ((in[off + 5] & 0xFF) << 16) |
((in[off + 6] & 0xFF) << 8) | (in[off + 7] & 0xFF),
a, b, c, d;
L ^= P[0];
for (int i = 0; i < rounds; ) {
a = (L >>> 24) & 0xFF;
b = 0x100 | ((L >>> 16) & 0xFF); // 256 +
c = 0x200 | ((L >>> 8) & 0xFF); // 512 +
d = 0x300 | L & 0xFF; // 768 +
R ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
a = (R >>> 24) & 0xFF;
b = 0x100 | ((R >>> 16) & 0xFF); // 256 +
c = 0x200 | ((R >>> 8) & 0xFF); // 512 +
d = 0x300 | R & 0xFF; // 768 +
L ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
}
R ^= P[rounds + 1];
out[outOff ] = (byte)((R >>> 24) & 0xFF);
out[outOff + 1] = (byte)((R >>> 16) & 0xFF);
out[outOff + 2] = (byte)((R >>> 8) & 0xFF);
out[outOff + 3] = (byte)( R & 0xFF);
out[outOff + 4] = (byte)((L >>> 24) & 0xFF);
out[outOff + 5] = (byte)((L >>> 16) & 0xFF);
out[outOff + 6] = (byte)((L >>> 8) & 0xFF);
out[outOff + 7] = (byte)( L & 0xFF);
}
/**
* The normal entry to the decryption process. It is guaranteed
* to be called with enough bytes in the input to carry on a
* decryption of one full block.
*
* Because the Blowfish cipher engine is designed to handle two
* 32-bit blocks, this method's purpose is to transform on entry
* and exit the data to/from 32-bit blocks; ie. Java.int.
*
* The input becomes two 32-bit blocks as Left and Right halves
* onto which the Blowfish cipher function is applied ROUNDS times
* in reverse order to that of the encryption.
*
* @param in input byte array of cipher text.
* @param off index in in of where to start considering data.
* @param out will contain the plain-text block.
* @param outOff index in out where plain-text starts.
*/
private void blowfishDecrypt (byte[] in, int off, byte[] out, int outOff) {
int L = ((in[off ] & 0xFF) << 24) | ((in[off + 1] & 0xFF) << 16) |
((in[off + 2] & 0xFF) << 8) | (in[off + 3] & 0xFF),
R = ((in[off + 4] & 0xFF) << 24) | ((in[off + 5] & 0xFF) << 16) |
((in[off + 6] & 0xFF) << 8) | (in[off + 7] & 0xFF);
int a, b, c, d;
L ^= P[rounds + 1];
for (int i = rounds; i > 0; ) {
a = (L >>> 24) & 0xFF;
b = 0x100 | ((L >>> 16) & 0xFF); // 256 +
c = 0x200 | ((L >>> 8) & 0xFF); // 512 +
d = 0x300 | L & 0xFF; // 768 +
R ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[i--];
a = (R >>> 24) & 0xFF;
b = 0x100 | ((R >>> 16) & 0xFF); // 256 +
c = 0x200 | ((R >>> 8) & 0xFF); // 512 +
d = 0x300 | R & 0xFF; // 768 +
L ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[i--];
}
R ^= P[0];
out[outOff ] = (byte)((R >>> 24) & 0xFF);
out[outOff + 1] = (byte)((R >>> 16) & 0xFF);
out[outOff + 2] = (byte)((R >>> 8) & 0xFF);
out[outOff + 3] = (byte)( R & 0xFF);
out[outOff + 4] = (byte)((L >>> 24) & 0xFF);
out[outOff + 5] = (byte)((L >>> 16) & 0xFF);
out[outOff + 6] = (byte)((L >>> 8) & 0xFF);
out[outOff + 7] = (byte)( L & 0xFF);
}
/**
* See description in
blowfishEncrypt
above.*
* This method is only called by the makeKey method to generate
* a session key from user data. It outputs the result to an
* int array.
*
* @see #blowfishEncrypt
* @param L Left half (32-bit) of the plain text block,
* @param R Right half (32-bit) of the plain text block.
* @param out the int array where the result will be saved.
* @param outOff where the data starts in the byte array.
*/
private final void BF_encrypt (int L, int R, int[] out, int outOff) {
int a, b, c, d;
L ^= P[0];
for (int i = 0; i < rounds; ) {
a = (L >>> 24) & 0xFF;
b = 0x100 | ((L >>> 16) & 0xFF); // 256 +
c = 0x200 | ((L >>> 8) & 0xFF); // 512 +
d = 0x300 | L & 0xFF; // 768 +
R ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
a = (R >>> 24) & 0xFF;
b = 0x100 | ((R >>> 16) & 0xFF); // 256 +
c = 0x200 | ((R >>> 8) & 0xFF); // 512 +
d = 0x300 | R & 0xFF; // 768 +
L ^= (((sKey[a] + sKey[b]) ^ sKey[c]) + sKey[d]) ^ P[++i];
}
R ^= P[rounds + 1];
out[outOff ] = R;
out[outOff + 1] = L;
}
/**
* Expands a userKey to a working Blowfish session key (P) and
* generates this session s-boxes data (sKey).
*
* The key bytes are fist extracted from the user-key and then
* used, repetitively if need be, to build the contents of this
* session key and S-boxes values.
*
* The method's only exceptions are when the user-key's contents
* is a null Java object or a byte array of zero length. Otherwise
* the key data -up to 56 bytes- are used repetitively.
*
* @param key the user-key object to use for this session.
* @exception KeyException when one of the following occurs:
*
*
* length one.
*/
private synchronized void makeKey (Key key)
throws KeyException {
byte[] kk = key.getEncoded();
if (kk == null)
throw new KeyException("Null Blowfish key");
int len = kk.length;
if (len == 0)
throw new KeyException("Invalid Blowfish user key length");
if (len > MAX_USER_KEY_LENGTH)
len = MAX_USER_KEY_LENGTH;
// use the user-key data to generate an initial set
// of session key, and copy the initial s-boxes values
// to this session's set (one large array: sKey)
System.arraycopy(S0, 0, sKey, 0, 256);
System.arraycopy(S1, 0, sKey, 256, 256);
System.arraycopy(S2, 0, sKey, 512, 256);
System.arraycopy(S3, 0, sKey, 768, 256);
int ri;
for (int i = 0, j = 0; i < rounds + 2; i++) {
ri = 0;
for (int k = 0; k < 4; k++) {
ri = (ri << 8) | (kk[j++] & 0xFF);
j %= len;
}
P[i] = Pi[i] ^ ri;
}
// use the former to effectively generate the session key
BF_encrypt(0, 0, P, 0);
for (int i = 2; i < rounds + 2; i += 2)
BF_encrypt(P[i - 2], P[i - 1], P, i);
// and this session s-boxes
BF_encrypt(P[rounds], P[rounds + 1], sKey, 0);
for (int i = 2; i < 4 * 256; i += 2)
BF_encrypt(sKey[i - 2], sKey[i - 1], sKey, i);
}
}
Subscribe to:
Posts (Atom)