• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 package org.bouncycastle.crypto.engines;
2 
3 import org.bouncycastle.crypto.BlockCipher;
4 import org.bouncycastle.crypto.CipherParameters;
5 import org.bouncycastle.crypto.DataLengthException;
6 import org.bouncycastle.crypto.OutputLengthException;
7 import org.bouncycastle.crypto.params.KeyParameter;
8 
9 /**
10  * A class that provides Blowfish key encryption operations,
11  * such as encoding data and generating keys.
12  * All the algorithms herein are from Applied Cryptography
13  * and implement a simplified cryptography interface.
14  */
15 public final class BlowfishEngine
16 implements BlockCipher
17 {
18     private final static int[]
19         KP = {
20                 0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344,
21                 0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89,
22                 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
23                 0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917,
24                 0x9216D5D9, 0x8979FB1B
25              },
26 
27         KS0 = {
28                 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7,
29                 0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99,
30                 0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16,
31                 0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E,
32                 0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE,
33                 0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013,
34                 0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF,
35                 0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E,
36                 0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60,
37                 0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440,
38                 0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE,
39                 0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A,
40                 0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E,
41                 0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677,
42                 0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193,
43                 0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032,
44                 0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88,
45                 0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239,
46                 0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E,
47                 0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0,
48                 0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3,
49                 0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98,
50                 0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88,
51                 0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE,
52                 0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6,
53                 0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D,
54                 0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B,
55                 0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7,
56                 0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA,
57                 0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463,
58                 0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F,
59                 0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09,
60                 0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3,
61                 0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB,
62                 0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279,
63                 0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8,
64                 0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB,
65                 0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82,
66                 0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB,
67                 0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573,
68                 0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0,
69                 0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B,
70                 0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790,
71                 0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8,
72                 0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4,
73                 0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0,
74                 0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7,
75                 0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C,
76                 0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD,
77                 0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1,
78                 0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299,
79                 0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9,
80                 0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477,
81                 0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF,
82                 0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49,
83                 0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF,
84                 0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA,
85                 0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5,
86                 0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41,
87                 0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915,
88                 0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400,
89                 0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915,
90                 0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664,
91                 0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A
92             },
93 
94         KS1 = {
95                 0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623,
96                 0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266,
97                 0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1,
98                 0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E,
99                 0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6,
100                 0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1,
101                 0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E,
102                 0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1,
103                 0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737,
104                 0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8,
105                 0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF,
106                 0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD,
107                 0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701,
108                 0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7,
109                 0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41,
110                 0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331,
111                 0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF,
112                 0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF,
113                 0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E,
114                 0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87,
115                 0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C,
116                 0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2,
117                 0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16,
118                 0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD,
119                 0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B,
120                 0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509,
121                 0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E,
122                 0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3,
123                 0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F,
124                 0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A,
125                 0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4,
126                 0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960,
127                 0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66,
128                 0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28,
129                 0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802,
130                 0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84,
131                 0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510,
132                 0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF,
133                 0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14,
134                 0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E,
135                 0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50,
136                 0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7,
137                 0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8,
138                 0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281,
139                 0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99,
140                 0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696,
141                 0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128,
142                 0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73,
143                 0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0,
144                 0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0,
145                 0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105,
146                 0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250,
147                 0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3,
148                 0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285,
149                 0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00,
150                 0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061,
151                 0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB,
152                 0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E,
153                 0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735,
154                 0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC,
155                 0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9,
156                 0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340,
157                 0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20,
158                 0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7
159             },
160 
161         KS2 = {
162                 0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934,
163                 0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068,
164                 0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF,
165                 0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840,
166                 0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45,
167                 0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504,
168                 0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A,
169                 0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB,
170                 0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE,
171                 0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6,
172                 0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42,
173                 0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B,
174                 0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2,
175                 0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB,
176                 0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527,
177                 0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B,
178                 0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33,
179                 0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C,
180                 0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3,
181                 0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC,
182                 0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17,
183                 0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564,
184                 0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B,
185                 0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115,
186                 0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922,
187                 0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728,
188                 0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0,
189                 0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E,
190                 0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37,
191                 0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D,
192                 0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804,
193                 0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B,
194                 0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3,
195                 0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB,
196                 0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D,
197                 0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C,
198                 0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350,
199                 0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9,
200                 0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A,
201                 0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE,
202                 0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D,
203                 0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC,
204                 0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F,
205                 0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61,
206                 0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2,
207                 0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9,
208                 0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2,
209                 0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C,
210                 0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E,
211                 0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633,
212                 0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10,
213                 0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169,
214                 0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52,
215                 0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027,
216                 0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5,
217                 0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62,
218                 0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634,
219                 0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76,
220                 0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24,
221                 0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC,
222                 0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4,
223                 0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C,
224                 0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837,
225                 0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0
226             },
227 
228         KS3 = {
229                 0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B,
230                 0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE,
231                 0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B,
232                 0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4,
233                 0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8,
234                 0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6,
235                 0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304,
236                 0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22,
237                 0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4,
238                 0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6,
239                 0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9,
240                 0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59,
241                 0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593,
242                 0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51,
243                 0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28,
244                 0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C,
245                 0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B,
246                 0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28,
247                 0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C,
248                 0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD,
249                 0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A,
250                 0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319,
251                 0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB,
252                 0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F,
253                 0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991,
254                 0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32,
255                 0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680,
256                 0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166,
257                 0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE,
258                 0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB,
259                 0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5,
260                 0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47,
261                 0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370,
262                 0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D,
263                 0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84,
264                 0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048,
265                 0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8,
266                 0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD,
267                 0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9,
268                 0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7,
269                 0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38,
270                 0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F,
271                 0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C,
272                 0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525,
273                 0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1,
274                 0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442,
275                 0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964,
276                 0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E,
277                 0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8,
278                 0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D,
279                 0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F,
280                 0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299,
281                 0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02,
282                 0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC,
283                 0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614,
284                 0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A,
285                 0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6,
286                 0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B,
287                 0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0,
288                 0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060,
289                 0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E,
290                 0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9,
291                 0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F,
292                 0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6
293             };
294 
295     //====================================
296     // Useful constants
297     //====================================
298 
299     private static final int    ROUNDS = 16;
300     private static final int    BLOCK_SIZE = 8;  // bytes = 64 bits
301     private static final int    SBOX_SK = 256;
302     private static final int    P_SZ = ROUNDS+2;
303 
304     private final int[] S0, S1, S2, S3;     // the s-boxes
305     private final int[] P;                  // the p-array
306 
307     private boolean encrypting = false;
308 
309     private byte[] workingKey = null;
310 
BlowfishEngine()311     public BlowfishEngine()
312     {
313         S0 = new int[SBOX_SK];
314         S1 = new int[SBOX_SK];
315         S2 = new int[SBOX_SK];
316         S3 = new int[SBOX_SK];
317         P = new int[P_SZ];
318     }
319 
320     /**
321      * initialise a Blowfish cipher.
322      *
323      * @param encrypting whether or not we are for encryption.
324      * @param params the parameters required to set up the cipher.
325      * @exception IllegalArgumentException if the params argument is
326      * inappropriate.
327      */
init( boolean encrypting, CipherParameters params)328     public void init(
329         boolean             encrypting,
330         CipherParameters    params)
331     {
332         if (params instanceof KeyParameter)
333         {
334             this.encrypting = encrypting;
335             this.workingKey = ((KeyParameter)params).getKey();
336             setKey(this.workingKey);
337 
338             return;
339         }
340 
341         throw new IllegalArgumentException("invalid parameter passed to Blowfish init - " + params.getClass().getName());
342     }
343 
getAlgorithmName()344     public String getAlgorithmName()
345     {
346         return "Blowfish";
347     }
348 
processBlock( byte[] in, int inOff, byte[] out, int outOff)349     public final int processBlock(
350         byte[] in,
351         int inOff,
352         byte[] out,
353         int outOff)
354     {
355         if (workingKey == null)
356         {
357             throw new IllegalStateException("Blowfish not initialised");
358         }
359 
360         if ((inOff + BLOCK_SIZE) > in.length)
361         {
362             throw new DataLengthException("input buffer too short");
363         }
364 
365         if ((outOff + BLOCK_SIZE) > out.length)
366         {
367             throw new OutputLengthException("output buffer too short");
368         }
369 
370         if (encrypting)
371         {
372             encryptBlock(in, inOff, out, outOff);
373         }
374         else
375         {
376             decryptBlock(in, inOff, out, outOff);
377         }
378 
379         return BLOCK_SIZE;
380     }
381 
reset()382     public void reset()
383     {
384     }
385 
getBlockSize()386     public int getBlockSize()
387     {
388         return BLOCK_SIZE;
389     }
390 
391     //==================================
392     // Private Implementation
393     //==================================
394 
F(int x)395     private int F(int x)
396     {
397         return (((S0[(x >>> 24)] + S1[(x >>> 16) & 0xff])
398                             ^ S2[(x >>> 8) & 0xff]) + S3[x & 0xff]);
399     }
400 
401     /**
402      * apply the encryption cycle to each value pair in the table.
403      */
processTable( int xl, int xr, int[] table)404     private void processTable(
405         int     xl,
406         int     xr,
407         int[]   table)
408     {
409         int size = table.length;
410 
411         for (int s = 0; s < size; s += 2)
412         {
413             xl ^= P[0];
414 
415             for (int i = 1; i < ROUNDS; i += 2)
416             {
417                 xr ^= F(xl) ^ P[i];
418                 xl ^= F(xr) ^ P[i + 1];
419             }
420 
421             xr ^= P[ROUNDS + 1];
422 
423             table[s] = xr;
424             table[s + 1] = xl;
425 
426             xr = xl;            // end of cycle swap
427             xl = table[s];
428         }
429     }
430 
setKey(byte[] key)431     private void setKey(byte[] key)
432     {
433         /*
434          * - comments are from _Applied Crypto_, Schneier, p338
435          * please be careful comparing the two, AC numbers the
436          * arrays from 1, the enclosed code from 0.
437          *
438          * (1)
439          * Initialise the S-boxes and the P-array, with a fixed string
440          * This string contains the hexadecimal digits of pi (3.141...)
441          */
442         System.arraycopy(KS0, 0, S0, 0, SBOX_SK);
443         System.arraycopy(KS1, 0, S1, 0, SBOX_SK);
444         System.arraycopy(KS2, 0, S2, 0, SBOX_SK);
445         System.arraycopy(KS3, 0, S3, 0, SBOX_SK);
446 
447         System.arraycopy(KP, 0, P, 0, P_SZ);
448 
449         /*
450          * (2)
451          * Now, XOR P[0] with the first 32 bits of the key, XOR P[1] with the
452          * second 32-bits of the key, and so on for all bits of the key
453          * (up to P[17]).  Repeatedly cycle through the key bits until the
454          * entire P-array has been XOR-ed with the key bits
455          */
456         int keyLength = key.length;
457         int keyIndex = 0;
458 
459         for (int i=0; i < P_SZ; i++)
460         {
461             // get the 32 bits of the key, in 4 * 8 bit chunks
462             int data = 0x0000000;
463             for (int j=0; j < 4; j++)
464             {
465                 // create a 32 bit block
466                 data = (data << 8) | (key[keyIndex++] & 0xff);
467 
468                 // wrap when we get to the end of the key
469                 if (keyIndex >= keyLength)
470                 {
471                     keyIndex = 0;
472                 }
473             }
474             // XOR the newly created 32 bit chunk onto the P-array
475             P[i] ^= data;
476         }
477 
478         /*
479          * (3)
480          * Encrypt the all-zero string with the Blowfish algorithm, using
481          * the subkeys described in (1) and (2)
482          *
483          * (4)
484          * Replace P1 and P2 with the output of step (3)
485          *
486          * (5)
487          * Encrypt the output of step(3) using the Blowfish algorithm,
488          * with the modified subkeys.
489          *
490          * (6)
491          * Replace P3 and P4 with the output of step (5)
492          *
493          * (7)
494          * Continue the process, replacing all elements of the P-array
495          * and then all four S-boxes in order, with the output of the
496          * continuously changing Blowfish algorithm
497          */
498 
499         processTable(0, 0, P);
500         processTable(P[P_SZ - 2], P[P_SZ - 1], S0);
501         processTable(S0[SBOX_SK - 2], S0[SBOX_SK - 1], S1);
502         processTable(S1[SBOX_SK - 2], S1[SBOX_SK - 1], S2);
503         processTable(S2[SBOX_SK - 2], S2[SBOX_SK - 1], S3);
504     }
505 
506     /**
507      * Encrypt the given input starting at the given offset and place
508      * the result in the provided buffer starting at the given offset.
509      * The input will be an exact multiple of our blocksize.
510      */
encryptBlock( byte[] src, int srcIndex, byte[] dst, int dstIndex)511     private void encryptBlock(
512         byte[]  src,
513         int     srcIndex,
514         byte[]  dst,
515         int     dstIndex)
516     {
517         int xl = BytesTo32bits(src, srcIndex);
518         int xr = BytesTo32bits(src, srcIndex+4);
519 
520         xl ^= P[0];
521 
522         for (int i = 1; i < ROUNDS; i += 2)
523         {
524             xr ^= F(xl) ^ P[i];
525             xl ^= F(xr) ^ P[i + 1];
526         }
527 
528         xr ^= P[ROUNDS + 1];
529 
530         Bits32ToBytes(xr, dst, dstIndex);
531         Bits32ToBytes(xl, dst, dstIndex + 4);
532     }
533 
534     /**
535      * Decrypt the given input starting at the given offset and place
536      * the result in the provided buffer starting at the given offset.
537      * The input will be an exact multiple of our blocksize.
538      */
decryptBlock( byte[] src, int srcIndex, byte[] dst, int dstIndex)539     private void decryptBlock(
540         byte[] src,
541         int srcIndex,
542         byte[] dst,
543         int dstIndex)
544     {
545         int xl = BytesTo32bits(src, srcIndex);
546         int xr = BytesTo32bits(src, srcIndex + 4);
547 
548         xl ^= P[ROUNDS + 1];
549 
550         for (int i = ROUNDS; i > 0 ; i -= 2)
551         {
552             xr ^= F(xl) ^ P[i];
553             xl ^= F(xr) ^ P[i - 1];
554         }
555 
556         xr ^= P[0];
557 
558         Bits32ToBytes(xr, dst, dstIndex);
559         Bits32ToBytes(xl, dst, dstIndex+4);
560     }
561 
BytesTo32bits(byte[] b, int i)562     private int BytesTo32bits(byte[] b, int i)
563     {
564         return ((b[i]   & 0xff) << 24) |
565              ((b[i+1] & 0xff) << 16) |
566              ((b[i+2] & 0xff) << 8) |
567              ((b[i+3] & 0xff));
568     }
569 
Bits32ToBytes(int in, byte[] b, int offset)570     private void Bits32ToBytes(int in,  byte[] b, int offset)
571     {
572         b[offset + 3] = (byte)in;
573         b[offset + 2] = (byte)(in >> 8);
574         b[offset + 1] = (byte)(in >> 16);
575         b[offset]     = (byte)(in >> 24);
576     }
577 }
578