bcrypt-ruby 2.1.4-java → 3.0.0-java
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +1 -0
- data/CHANGELOG +5 -1
- data/COPYING +23 -28
- data/Gemfile.lock +29 -0
- data/README.md +184 -0
- data/Rakefile +1 -0
- data/bcrypt-ruby.gemspec +5 -4
- data/ext/mri/bcrypt_ext.c +67 -65
- data/ext/mri/crypt.c +57 -0
- data/ext/mri/crypt.h +13 -0
- data/ext/mri/{blowfish.c → crypt_blowfish.c} +472 -321
- data/ext/mri/crypt_gensalt.c +111 -0
- data/ext/mri/extconf.rb +24 -2
- data/ext/mri/ow-crypt.h +35 -0
- data/ext/mri/wrapper.c +255 -0
- data/lib/bcrypt.rb +10 -5
- data/lib/bcrypt_engine.rb +34 -0
- data/lib/bcrypt_ext.jar +0 -0
- data/spec/bcrypt/engine_spec.rb +3 -3
- data/spec/bcrypt/password_spec.rb +11 -2
- metadata +90 -78
- data/README +0 -175
- data/ext/mri/bcrypt.c +0 -297
- data/ext/mri/bcrypt.h +0 -67
- data/ext/mri/blf.h +0 -86
data/ext/mri/bcrypt.c
DELETED
@@ -1,297 +0,0 @@
|
|
1
|
-
/* $OpenBSD: bcrypt.c,v 1.22 2007/02/20 01:44:16 ray Exp $ */
|
2
|
-
|
3
|
-
/*
|
4
|
-
* Modified by <coda.hale@gmail.com> on 2009-09-16:
|
5
|
-
*
|
6
|
-
* - Standardized on stdint.h's numerical types and removed some debug cruft.
|
7
|
-
*
|
8
|
-
* Modified by <hongli@phusion.nl> on 2009-08-05:
|
9
|
-
*
|
10
|
-
* - Got rid of the global variables; they're not thread-safe.
|
11
|
-
* Modified the functions to accept local buffers instead.
|
12
|
-
*
|
13
|
-
* Modified by <coda.hale@gmail.com> on 2007-02-27:
|
14
|
-
*
|
15
|
-
* - Changed bcrypt_gensalt to accept a random seed as a parameter,
|
16
|
-
* to remove the code's dependency on arc4random(), which isn't
|
17
|
-
* available on Linux.
|
18
|
-
*/
|
19
|
-
|
20
|
-
/*
|
21
|
-
* Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
|
22
|
-
* All rights reserved.
|
23
|
-
*
|
24
|
-
* Redistribution and use in source and binary forms, with or without
|
25
|
-
* modification, are permitted provided that the following conditions
|
26
|
-
* are met:
|
27
|
-
* 1. Redistributions of source code must retain the above copyright
|
28
|
-
* notice, this list of conditions and the following disclaimer.
|
29
|
-
* 2. Redistributions in binary form must reproduce the above copyright
|
30
|
-
* notice, this list of conditions and the following disclaimer in the
|
31
|
-
* documentation and/or other materials provided with the distribution.
|
32
|
-
* 3. All advertising materials mentioning features or use of this software
|
33
|
-
* must display the following acknowledgement:
|
34
|
-
* This product includes software developed by Niels Provos.
|
35
|
-
* 4. The name of the author may not be used to endorse or promote products
|
36
|
-
* derived from this software without specific prior written permission.
|
37
|
-
*
|
38
|
-
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
39
|
-
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
40
|
-
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
41
|
-
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
42
|
-
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
43
|
-
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
44
|
-
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
45
|
-
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
46
|
-
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
47
|
-
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
48
|
-
*/
|
49
|
-
|
50
|
-
/* This password hashing algorithm was designed by David Mazieres
|
51
|
-
* <dm@lcs.mit.edu> and works as follows:
|
52
|
-
*
|
53
|
-
* 1. state := InitState ()
|
54
|
-
* 2. state := ExpandKey (state, salt, password) 3.
|
55
|
-
* REPEAT rounds:
|
56
|
-
* state := ExpandKey (state, 0, salt)
|
57
|
-
* state := ExpandKey(state, 0, password)
|
58
|
-
* 4. ctext := "OrpheanBeholderScryDoubt"
|
59
|
-
* 5. REPEAT 64:
|
60
|
-
* ctext := Encrypt_ECB (state, ctext);
|
61
|
-
* 6. RETURN Concatenate (salt, ctext);
|
62
|
-
*
|
63
|
-
*/
|
64
|
-
|
65
|
-
#include <stdio.h>
|
66
|
-
#include <stdlib.h>
|
67
|
-
#include <string.h>
|
68
|
-
#include "blf.h"
|
69
|
-
#include "bcrypt.h"
|
70
|
-
|
71
|
-
/* This implementation is adaptable to current computing power.
|
72
|
-
* You can have up to 2^31 rounds which should be enough for some
|
73
|
-
* time to come.
|
74
|
-
*/
|
75
|
-
|
76
|
-
static void encode_salt(char *, uint8_t *, uint16_t, uint8_t);
|
77
|
-
static void encode_base64(uint8_t *, uint8_t *, uint16_t);
|
78
|
-
static void decode_base64(uint8_t *, uint16_t, uint8_t *);
|
79
|
-
|
80
|
-
static const uint8_t Base64Code[] =
|
81
|
-
"./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
|
82
|
-
|
83
|
-
static const uint8_t index_64[128] = {
|
84
|
-
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
|
85
|
-
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
|
86
|
-
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
|
87
|
-
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
|
88
|
-
255, 255, 255, 255, 255, 255, 0, 1, 54, 55,
|
89
|
-
56, 57, 58, 59, 60, 61, 62, 63, 255, 255,
|
90
|
-
255, 255, 255, 255, 255, 2, 3, 4, 5, 6,
|
91
|
-
7, 8, 9, 10, 11, 12, 13, 14, 15, 16,
|
92
|
-
17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27,
|
93
|
-
255, 255, 255, 255, 255, 255, 28, 29, 30,
|
94
|
-
31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
|
95
|
-
41, 42, 43, 44, 45, 46, 47, 48, 49, 50,
|
96
|
-
51, 52, 53, 255, 255, 255, 255, 255
|
97
|
-
};
|
98
|
-
#define CHAR64(c) ( (c) > 127 ? 255 : index_64[(c)])
|
99
|
-
|
100
|
-
static void
|
101
|
-
decode_base64(uint8_t *buffer, uint16_t len, uint8_t *data)
|
102
|
-
{
|
103
|
-
uint8_t *bp = buffer;
|
104
|
-
uint8_t *p = data;
|
105
|
-
uint8_t c1, c2, c3, c4;
|
106
|
-
while (bp < buffer + len) {
|
107
|
-
c1 = CHAR64(*p);
|
108
|
-
c2 = CHAR64(*(p + 1));
|
109
|
-
|
110
|
-
/* Invalid data */
|
111
|
-
if (c1 == 255 || c2 == 255)
|
112
|
-
break;
|
113
|
-
|
114
|
-
*bp++ = (c1 << 2) | ((c2 & 0x30) >> 4);
|
115
|
-
if (bp >= buffer + len)
|
116
|
-
break;
|
117
|
-
|
118
|
-
c3 = CHAR64(*(p + 2));
|
119
|
-
if (c3 == 255)
|
120
|
-
break;
|
121
|
-
|
122
|
-
*bp++ = ((c2 & 0x0f) << 4) | ((c3 & 0x3c) >> 2);
|
123
|
-
if (bp >= buffer + len)
|
124
|
-
break;
|
125
|
-
|
126
|
-
c4 = CHAR64(*(p + 3));
|
127
|
-
if (c4 == 255)
|
128
|
-
break;
|
129
|
-
*bp++ = ((c3 & 0x03) << 6) | c4;
|
130
|
-
|
131
|
-
p += 4;
|
132
|
-
}
|
133
|
-
}
|
134
|
-
|
135
|
-
static void
|
136
|
-
encode_salt(char *salt, uint8_t *csalt, uint16_t clen, uint8_t logr)
|
137
|
-
{
|
138
|
-
salt[0] = '$';
|
139
|
-
salt[1] = BCRYPT_VERSION;
|
140
|
-
salt[2] = 'a';
|
141
|
-
salt[3] = '$';
|
142
|
-
|
143
|
-
snprintf(salt + 4, 4, "%2.2u$", logr);
|
144
|
-
|
145
|
-
encode_base64((uint8_t *) salt + 7, csalt, clen);
|
146
|
-
}
|
147
|
-
/* Generates a salt for this version of crypt.
|
148
|
-
Since versions may change. Keeping this here
|
149
|
-
seems sensible.
|
150
|
-
*/
|
151
|
-
|
152
|
-
char *
|
153
|
-
ruby_bcrypt_gensalt(char *output, uint8_t log_rounds, uint8_t *rseed)
|
154
|
-
{
|
155
|
-
if (log_rounds < 4)
|
156
|
-
log_rounds = 4;
|
157
|
-
else if (log_rounds > 31)
|
158
|
-
log_rounds = 31;
|
159
|
-
|
160
|
-
encode_salt(output, rseed, BCRYPT_MAXSALT, log_rounds);
|
161
|
-
return output;
|
162
|
-
}
|
163
|
-
/* We handle $Vers$log2(NumRounds)$salt+passwd$
|
164
|
-
i.e. $2$04$iwouldntknowwhattosayetKdJ6iFtacBqJdKe6aW7ou */
|
165
|
-
|
166
|
-
char *
|
167
|
-
ruby_bcrypt(char *output, const char *key, const char *salt)
|
168
|
-
{
|
169
|
-
blf_ctx state;
|
170
|
-
uint32_t rounds, i, k;
|
171
|
-
uint16_t j;
|
172
|
-
uint8_t key_len, salt_len, logr, minor;
|
173
|
-
uint8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt";
|
174
|
-
uint8_t csalt[BCRYPT_MAXSALT];
|
175
|
-
uint32_t cdata[BCRYPT_BLOCKS];
|
176
|
-
int n;
|
177
|
-
|
178
|
-
/* Discard "$" identifier */
|
179
|
-
salt++;
|
180
|
-
|
181
|
-
if (*salt > BCRYPT_VERSION) {
|
182
|
-
return NULL;
|
183
|
-
}
|
184
|
-
|
185
|
-
/* Check for minor versions */
|
186
|
-
if (salt[1] != '$') {
|
187
|
-
switch (salt[1]) {
|
188
|
-
case 'a':
|
189
|
-
/* 'ab' should not yield the same as 'abab' */
|
190
|
-
minor = salt[1];
|
191
|
-
salt++;
|
192
|
-
break;
|
193
|
-
default:
|
194
|
-
return NULL;
|
195
|
-
}
|
196
|
-
} else
|
197
|
-
minor = 0;
|
198
|
-
|
199
|
-
/* Discard version + "$" identifier */
|
200
|
-
salt += 2;
|
201
|
-
|
202
|
-
if (salt[2] != '$')
|
203
|
-
/* Out of sync with passwd entry */
|
204
|
-
return NULL;
|
205
|
-
|
206
|
-
/* Computer power doesn't increase linear, 2^x should be fine */
|
207
|
-
n = atoi(salt);
|
208
|
-
if (n > 31 || n < 0)
|
209
|
-
return NULL;
|
210
|
-
logr = (uint8_t)n;
|
211
|
-
if ((rounds = (uint32_t) 1 << logr) < BCRYPT_MINROUNDS)
|
212
|
-
return NULL;
|
213
|
-
|
214
|
-
/* Discard num rounds + "$" identifier */
|
215
|
-
salt += 3;
|
216
|
-
|
217
|
-
if (strlen(salt) * 3 / 4 < BCRYPT_MAXSALT)
|
218
|
-
return NULL;
|
219
|
-
|
220
|
-
/* We dont want the base64 salt but the raw data */
|
221
|
-
decode_base64(csalt, BCRYPT_MAXSALT, (uint8_t *) salt);
|
222
|
-
salt_len = BCRYPT_MAXSALT;
|
223
|
-
key_len = strlen(key) + (minor >= 'a' ? 1 : 0);
|
224
|
-
|
225
|
-
/* Setting up S-Boxes and Subkeys */
|
226
|
-
Blowfish_initstate(&state);
|
227
|
-
Blowfish_expandstate(&state, csalt, salt_len,
|
228
|
-
(uint8_t *) key, key_len);
|
229
|
-
for (k = 0; k < rounds; k++) {
|
230
|
-
Blowfish_expand0state(&state, (uint8_t *) key, key_len);
|
231
|
-
Blowfish_expand0state(&state, csalt, salt_len);
|
232
|
-
}
|
233
|
-
|
234
|
-
/* This can be precomputed later */
|
235
|
-
j = 0;
|
236
|
-
for (i = 0; i < BCRYPT_BLOCKS; i++)
|
237
|
-
cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j);
|
238
|
-
|
239
|
-
/* Now do the encryption */
|
240
|
-
for (k = 0; k < 64; k++)
|
241
|
-
blf_enc(&state, cdata, BCRYPT_BLOCKS / 2);
|
242
|
-
|
243
|
-
for (i = 0; i < BCRYPT_BLOCKS; i++) {
|
244
|
-
ciphertext[4 * i + 3] = cdata[i] & 0xff;
|
245
|
-
cdata[i] = cdata[i] >> 8;
|
246
|
-
ciphertext[4 * i + 2] = cdata[i] & 0xff;
|
247
|
-
cdata[i] = cdata[i] >> 8;
|
248
|
-
ciphertext[4 * i + 1] = cdata[i] & 0xff;
|
249
|
-
cdata[i] = cdata[i] >> 8;
|
250
|
-
ciphertext[4 * i + 0] = cdata[i] & 0xff;
|
251
|
-
}
|
252
|
-
|
253
|
-
|
254
|
-
i = 0;
|
255
|
-
output[i++] = '$';
|
256
|
-
output[i++] = BCRYPT_VERSION;
|
257
|
-
if (minor)
|
258
|
-
output[i++] = minor;
|
259
|
-
output[i++] = '$';
|
260
|
-
|
261
|
-
snprintf(output + i, 4, "%2.2u$", logr);
|
262
|
-
|
263
|
-
encode_base64((uint8_t *) output + i + 3, csalt, BCRYPT_MAXSALT);
|
264
|
-
encode_base64((uint8_t *) output + strlen(output), ciphertext,
|
265
|
-
4 * BCRYPT_BLOCKS - 1);
|
266
|
-
return output;
|
267
|
-
}
|
268
|
-
|
269
|
-
static void
|
270
|
-
encode_base64(uint8_t *buffer, uint8_t *data, uint16_t len)
|
271
|
-
{
|
272
|
-
uint8_t *bp = buffer;
|
273
|
-
uint8_t *p = data;
|
274
|
-
uint8_t c1, c2;
|
275
|
-
while (p < data + len) {
|
276
|
-
c1 = *p++;
|
277
|
-
*bp++ = Base64Code[(c1 >> 2)];
|
278
|
-
c1 = (c1 & 0x03) << 4;
|
279
|
-
if (p >= data + len) {
|
280
|
-
*bp++ = Base64Code[c1];
|
281
|
-
break;
|
282
|
-
}
|
283
|
-
c2 = *p++;
|
284
|
-
c1 |= (c2 >> 4) & 0x0f;
|
285
|
-
*bp++ = Base64Code[c1];
|
286
|
-
c1 = (c2 & 0x0f) << 2;
|
287
|
-
if (p >= data + len) {
|
288
|
-
*bp++ = Base64Code[c1];
|
289
|
-
break;
|
290
|
-
}
|
291
|
-
c2 = *p++;
|
292
|
-
c1 |= (c2 >> 6) & 0x03;
|
293
|
-
*bp++ = Base64Code[c1];
|
294
|
-
*bp++ = Base64Code[c2 & 0x3f];
|
295
|
-
}
|
296
|
-
*bp = '\0';
|
297
|
-
}
|
data/ext/mri/bcrypt.h
DELETED
@@ -1,67 +0,0 @@
|
|
1
|
-
/*
|
2
|
-
* Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
|
3
|
-
* All rights reserved.
|
4
|
-
*
|
5
|
-
* Redistribution and use in source and binary forms, with or without
|
6
|
-
* modification, are permitted provided that the following conditions
|
7
|
-
* are met:
|
8
|
-
* 1. Redistributions of source code must retain the above copyright
|
9
|
-
* notice, this list of conditions and the following disclaimer.
|
10
|
-
* 2. Redistributions in binary form must reproduce the above copyright
|
11
|
-
* notice, this list of conditions and the following disclaimer in the
|
12
|
-
* documentation and/or other materials provided with the distribution.
|
13
|
-
* 3. All advertising materials mentioning features or use of this software
|
14
|
-
* must display the following acknowledgement:
|
15
|
-
* This product includes software developed by Niels Provos.
|
16
|
-
* 4. The name of the author may not be used to endorse or promote products
|
17
|
-
* derived from this software without specific prior written permission.
|
18
|
-
*
|
19
|
-
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
20
|
-
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
21
|
-
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
22
|
-
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
23
|
-
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
24
|
-
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
25
|
-
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
26
|
-
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
27
|
-
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
28
|
-
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
29
|
-
*/
|
30
|
-
|
31
|
-
#ifndef _BCRYPT_H_
|
32
|
-
#define _BCRYPT_H_
|
33
|
-
|
34
|
-
#include <stdint.h>
|
35
|
-
|
36
|
-
#define BCRYPT_VERSION '2'
|
37
|
-
#define BCRYPT_MAXSALT 16 /* Precomputation is just so nice */
|
38
|
-
#define BCRYPT_BLOCKS 6 /* Ciphertext blocks */
|
39
|
-
#define BCRYPT_MINROUNDS 16 /* we have log2(rounds) in salt */
|
40
|
-
#define BCRYPT_SALT_OUTPUT_SIZE (7 + (BCRYPT_MAXSALT * 4 + 2) / 3 + 1)
|
41
|
-
#define BCRYPT_OUTPUT_SIZE 128
|
42
|
-
|
43
|
-
/*
|
44
|
-
* Given a logarithmic cost parameter, generates a salt for use with bcrypt().
|
45
|
-
*
|
46
|
-
* output: the computed salt will be stored here. This buffer must be
|
47
|
-
* at least BCRYPT_SALT_OUTPUT_SIZE bytes. The result will be
|
48
|
-
* null-terminated.
|
49
|
-
* log_rounds: the logarithmic cost.
|
50
|
-
* rseed: a seed of BCRYPT_MAXSALT bytes. Should be obtained from a
|
51
|
-
* cryptographically secure random source.
|
52
|
-
* Returns: output
|
53
|
-
*/
|
54
|
-
char *ruby_bcrypt_gensalt(char *output, uint8_t log_rounds, uint8_t *rseed);
|
55
|
-
|
56
|
-
/*
|
57
|
-
* Given a secret and a salt, generates a salted hash (which you can then store safely).
|
58
|
-
*
|
59
|
-
* output: the computed salted hash will be stored here. This buffer must
|
60
|
-
* be at least BCRYPT_OUTPUT_SIZE bytes, and will become null-terminated.
|
61
|
-
* key: A null-terminated secret.
|
62
|
-
* salt: The salt, as generated by bcrypt_gensalt().
|
63
|
-
* Returns: output on success, NULL on error.
|
64
|
-
*/
|
65
|
-
char *ruby_bcrypt(char *output, const char *key, const char *salt);
|
66
|
-
|
67
|
-
#endif /* _BCRYPT_H_ */
|
data/ext/mri/blf.h
DELETED
@@ -1,86 +0,0 @@
|
|
1
|
-
/* $OpenBSD: blf.h,v 1.6 2002/02/16 21:27:17 millert Exp $ */
|
2
|
-
/*
|
3
|
-
* Blowfish - a fast block cipher designed by Bruce Schneier
|
4
|
-
*
|
5
|
-
* Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
|
6
|
-
* All rights reserved.
|
7
|
-
*
|
8
|
-
* Redistribution and use in source and binary forms, with or without
|
9
|
-
* modification, are permitted provided that the following conditions
|
10
|
-
* are met:
|
11
|
-
* 1. Redistributions of source code must retain the above copyright
|
12
|
-
* notice, this list of conditions and the following disclaimer.
|
13
|
-
* 2. Redistributions in binary form must reproduce the above copyright
|
14
|
-
* notice, this list of conditions and the following disclaimer in the
|
15
|
-
* documentation and/or other materials provided with the distribution.
|
16
|
-
* 3. All advertising materials mentioning features or use of this software
|
17
|
-
* must display the following acknowledgement:
|
18
|
-
* This product includes software developed by Niels Provos.
|
19
|
-
* 4. The name of the author may not be used to endorse or promote products
|
20
|
-
* derived from this software without specific prior written permission.
|
21
|
-
*
|
22
|
-
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
23
|
-
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
24
|
-
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
25
|
-
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
26
|
-
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
27
|
-
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
28
|
-
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
29
|
-
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
30
|
-
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
31
|
-
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
32
|
-
*/
|
33
|
-
|
34
|
-
#ifndef _BLF_H_
|
35
|
-
#define _BLF_H_
|
36
|
-
|
37
|
-
#include <stdint.h>
|
38
|
-
|
39
|
-
// Imported from pwd.h. <coda.hale@gmail.com>
|
40
|
-
#define _PASSWORD_LEN 128 /* max length, not counting NUL */
|
41
|
-
|
42
|
-
/* Schneier specifies a maximum key length of 56 bytes.
|
43
|
-
* This ensures that every key bit affects every cipher
|
44
|
-
* bit. However, the subkeys can hold up to 72 bytes.
|
45
|
-
* Warning: For normal blowfish encryption only 56 bytes
|
46
|
-
* of the key affect all cipherbits.
|
47
|
-
*/
|
48
|
-
|
49
|
-
#define BLF_N 16 /* Number of Subkeys */
|
50
|
-
#define BLF_MAXKEYLEN ((BLF_N-2)*4) /* 448 bits */
|
51
|
-
|
52
|
-
/* Blowfish context */
|
53
|
-
typedef struct BlowfishContext {
|
54
|
-
uint32_t S[4][256]; /* S-Boxes */
|
55
|
-
uint32_t P[BLF_N + 2]; /* Subkeys */
|
56
|
-
} blf_ctx;
|
57
|
-
|
58
|
-
/* Raw access to customized Blowfish
|
59
|
-
* blf_key is just:
|
60
|
-
* Blowfish_initstate( state )
|
61
|
-
* Blowfish_expand0state( state, key, keylen )
|
62
|
-
*/
|
63
|
-
|
64
|
-
void Blowfish_encipher(blf_ctx *, uint32_t *, uint32_t *);
|
65
|
-
void Blowfish_decipher(blf_ctx *, uint32_t *, uint32_t *);
|
66
|
-
void Blowfish_initstate(blf_ctx *);
|
67
|
-
void Blowfish_expand0state(blf_ctx *, const uint8_t *, uint16_t);
|
68
|
-
void Blowfish_expandstate
|
69
|
-
(blf_ctx *, const uint8_t *, uint16_t, const uint8_t *, uint16_t);
|
70
|
-
|
71
|
-
/* Standard Blowfish */
|
72
|
-
|
73
|
-
void blf_key(blf_ctx *, const uint8_t *, uint16_t);
|
74
|
-
void blf_enc(blf_ctx *, uint32_t *, uint16_t);
|
75
|
-
void blf_dec(blf_ctx *, uint32_t *, uint16_t);
|
76
|
-
|
77
|
-
void blf_ecb_encrypt(blf_ctx *, uint8_t *, uint32_t);
|
78
|
-
void blf_ecb_decrypt(blf_ctx *, uint8_t *, uint32_t);
|
79
|
-
|
80
|
-
void blf_cbc_encrypt(blf_ctx *, uint8_t *, uint8_t *, uint32_t);
|
81
|
-
void blf_cbc_decrypt(blf_ctx *, uint8_t *, uint8_t *, uint32_t);
|
82
|
-
|
83
|
-
/* Converts uint8_t to uint32_t */
|
84
|
-
uint32_t Blowfish_stream2word(const uint8_t *, uint16_t , uint16_t *);
|
85
|
-
|
86
|
-
#endif
|