1 package org.bouncycastle.crypto.engines; 2 3 import org.bouncycastle.crypto.BlockCipher; 4 import org.bouncycastle.crypto.CipherParameters; 5 import org.bouncycastle.crypto.DataLengthException; 6 import org.bouncycastle.crypto.OutputLengthException; 7 import org.bouncycastle.crypto.params.KeyParameter; 8 9 /** 10 * A class that provides Blowfish key encryption operations, 11 * such as encoding data and generating keys. 12 * All the algorithms herein are from Applied Cryptography 13 * and implement a simplified cryptography interface. 14 */ 15 public final class BlowfishEngine 16 implements BlockCipher 17 { 18 private final static int[] 19 KP = { 20 0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344, 21 0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89, 22 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C, 23 0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917, 24 0x9216D5D9, 0x8979FB1B 25 }, 26 27 KS0 = { 28 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7, 29 0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99, 30 0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16, 31 0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E, 32 0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE, 33 0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013, 34 0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF, 35 0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E, 36 0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60, 37 0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440, 38 0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE, 39 0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A, 40 0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E, 41 0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677, 42 0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193, 43 0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032, 44 0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88, 45 0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239, 46 0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E, 47 0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0, 48 0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3, 49 0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98, 50 0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88, 51 0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE, 52 0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6, 53 0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D, 54 0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B, 55 0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7, 56 0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA, 57 0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463, 58 0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F, 59 0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09, 60 0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3, 61 0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB, 62 0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279, 63 0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8, 64 0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB, 65 0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82, 66 0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB, 67 0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573, 68 0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0, 69 0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B, 70 0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790, 71 0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8, 72 0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4, 73 0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0, 74 0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7, 75 0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C, 76 0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD, 77 0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1, 78 0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299, 79 0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9, 80 0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477, 81 0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF, 82 0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49, 83 0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF, 84 0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA, 85 0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5, 86 0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41, 87 0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915, 88 0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400, 89 0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915, 90 0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664, 91 0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A 92 }, 93 94 KS1 = { 95 0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623, 96 0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266, 97 0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1, 98 0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E, 99 0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6, 100 0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1, 101 0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E, 102 0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1, 103 0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737, 104 0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8, 105 0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF, 106 0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD, 107 0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701, 108 0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7, 109 0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41, 110 0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331, 111 0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF, 112 0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF, 113 0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E, 114 0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87, 115 0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C, 116 0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2, 117 0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16, 118 0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD, 119 0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B, 120 0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509, 121 0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E, 122 0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3, 123 0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F, 124 0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A, 125 0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4, 126 0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960, 127 0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66, 128 0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28, 129 0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802, 130 0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84, 131 0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510, 132 0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF, 133 0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14, 134 0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E, 135 0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50, 136 0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7, 137 0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8, 138 0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281, 139 0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99, 140 0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696, 141 0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128, 142 0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73, 143 0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0, 144 0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0, 145 0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105, 146 0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250, 147 0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3, 148 0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285, 149 0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00, 150 0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061, 151 0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB, 152 0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E, 153 0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735, 154 0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC, 155 0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9, 156 0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340, 157 0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20, 158 0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7 159 }, 160 161 KS2 = { 162 0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934, 163 0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068, 164 0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF, 165 0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840, 166 0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45, 167 0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504, 168 0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A, 169 0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB, 170 0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE, 171 0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6, 172 0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42, 173 0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B, 174 0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2, 175 0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB, 176 0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527, 177 0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B, 178 0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33, 179 0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C, 180 0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3, 181 0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC, 182 0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17, 183 0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564, 184 0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B, 185 0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115, 186 0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922, 187 0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728, 188 0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0, 189 0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E, 190 0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37, 191 0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D, 192 0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804, 193 0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B, 194 0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3, 195 0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB, 196 0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D, 197 0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C, 198 0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350, 199 0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9, 200 0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A, 201 0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE, 202 0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D, 203 0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC, 204 0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F, 205 0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61, 206 0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2, 207 0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9, 208 0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2, 209 0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C, 210 0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E, 211 0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633, 212 0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10, 213 0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169, 214 0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52, 215 0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027, 216 0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5, 217 0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62, 218 0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634, 219 0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76, 220 0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24, 221 0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC, 222 0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4, 223 0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C, 224 0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837, 225 0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0 226 }, 227 228 KS3 = { 229 0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B, 230 0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE, 231 0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B, 232 0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4, 233 0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8, 234 0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6, 235 0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304, 236 0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22, 237 0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4, 238 0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6, 239 0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9, 240 0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59, 241 0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593, 242 0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51, 243 0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28, 244 0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C, 245 0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B, 246 0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28, 247 0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C, 248 0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD, 249 0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A, 250 0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319, 251 0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB, 252 0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F, 253 0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991, 254 0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32, 255 0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680, 256 0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166, 257 0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE, 258 0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB, 259 0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5, 260 0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47, 261 0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370, 262 0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D, 263 0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84, 264 0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048, 265 0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8, 266 0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD, 267 0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9, 268 0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7, 269 0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38, 270 0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F, 271 0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C, 272 0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525, 273 0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1, 274 0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442, 275 0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964, 276 0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E, 277 0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8, 278 0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D, 279 0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F, 280 0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299, 281 0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02, 282 0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC, 283 0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614, 284 0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A, 285 0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6, 286 0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B, 287 0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0, 288 0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060, 289 0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E, 290 0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9, 291 0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F, 292 0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6 293 }; 294 295 //==================================== 296 // Useful constants 297 //==================================== 298 299 private static final int ROUNDS = 16; 300 private static final int BLOCK_SIZE = 8; // bytes = 64 bits 301 private static final int SBOX_SK = 256; 302 private static final int P_SZ = ROUNDS+2; 303 304 private final int[] S0, S1, S2, S3; // the s-boxes 305 private final int[] P; // the p-array 306 307 private boolean encrypting = false; 308 309 private byte[] workingKey = null; 310 BlowfishEngine()311 public BlowfishEngine() 312 { 313 S0 = new int[SBOX_SK]; 314 S1 = new int[SBOX_SK]; 315 S2 = new int[SBOX_SK]; 316 S3 = new int[SBOX_SK]; 317 P = new int[P_SZ]; 318 } 319 320 /** 321 * initialise a Blowfish cipher. 322 * 323 * @param encrypting whether or not we are for encryption. 324 * @param params the parameters required to set up the cipher. 325 * @exception IllegalArgumentException if the params argument is 326 * inappropriate. 327 */ init( boolean encrypting, CipherParameters params)328 public void init( 329 boolean encrypting, 330 CipherParameters params) 331 { 332 if (params instanceof KeyParameter) 333 { 334 this.encrypting = encrypting; 335 this.workingKey = ((KeyParameter)params).getKey(); 336 setKey(this.workingKey); 337 338 return; 339 } 340 341 throw new IllegalArgumentException("invalid parameter passed to Blowfish init - " + params.getClass().getName()); 342 } 343 getAlgorithmName()344 public String getAlgorithmName() 345 { 346 return "Blowfish"; 347 } 348 processBlock( byte[] in, int inOff, byte[] out, int outOff)349 public final int processBlock( 350 byte[] in, 351 int inOff, 352 byte[] out, 353 int outOff) 354 { 355 if (workingKey == null) 356 { 357 throw new IllegalStateException("Blowfish not initialised"); 358 } 359 360 if ((inOff + BLOCK_SIZE) > in.length) 361 { 362 throw new DataLengthException("input buffer too short"); 363 } 364 365 if ((outOff + BLOCK_SIZE) > out.length) 366 { 367 throw new OutputLengthException("output buffer too short"); 368 } 369 370 if (encrypting) 371 { 372 encryptBlock(in, inOff, out, outOff); 373 } 374 else 375 { 376 decryptBlock(in, inOff, out, outOff); 377 } 378 379 return BLOCK_SIZE; 380 } 381 reset()382 public void reset() 383 { 384 } 385 getBlockSize()386 public int getBlockSize() 387 { 388 return BLOCK_SIZE; 389 } 390 391 //================================== 392 // Private Implementation 393 //================================== 394 F(int x)395 private int F(int x) 396 { 397 return (((S0[(x >>> 24)] + S1[(x >>> 16) & 0xff]) 398 ^ S2[(x >>> 8) & 0xff]) + S3[x & 0xff]); 399 } 400 401 /** 402 * apply the encryption cycle to each value pair in the table. 403 */ processTable( int xl, int xr, int[] table)404 private void processTable( 405 int xl, 406 int xr, 407 int[] table) 408 { 409 int size = table.length; 410 411 for (int s = 0; s < size; s += 2) 412 { 413 xl ^= P[0]; 414 415 for (int i = 1; i < ROUNDS; i += 2) 416 { 417 xr ^= F(xl) ^ P[i]; 418 xl ^= F(xr) ^ P[i + 1]; 419 } 420 421 xr ^= P[ROUNDS + 1]; 422 423 table[s] = xr; 424 table[s + 1] = xl; 425 426 xr = xl; // end of cycle swap 427 xl = table[s]; 428 } 429 } 430 setKey(byte[] key)431 private void setKey(byte[] key) 432 { 433 /* 434 * - comments are from _Applied Crypto_, Schneier, p338 435 * please be careful comparing the two, AC numbers the 436 * arrays from 1, the enclosed code from 0. 437 * 438 * (1) 439 * Initialise the S-boxes and the P-array, with a fixed string 440 * This string contains the hexadecimal digits of pi (3.141...) 441 */ 442 System.arraycopy(KS0, 0, S0, 0, SBOX_SK); 443 System.arraycopy(KS1, 0, S1, 0, SBOX_SK); 444 System.arraycopy(KS2, 0, S2, 0, SBOX_SK); 445 System.arraycopy(KS3, 0, S3, 0, SBOX_SK); 446 447 System.arraycopy(KP, 0, P, 0, P_SZ); 448 449 /* 450 * (2) 451 * Now, XOR P[0] with the first 32 bits of the key, XOR P[1] with the 452 * second 32-bits of the key, and so on for all bits of the key 453 * (up to P[17]). Repeatedly cycle through the key bits until the 454 * entire P-array has been XOR-ed with the key bits 455 */ 456 int keyLength = key.length; 457 int keyIndex = 0; 458 459 for (int i=0; i < P_SZ; i++) 460 { 461 // get the 32 bits of the key, in 4 * 8 bit chunks 462 int data = 0x0000000; 463 for (int j=0; j < 4; j++) 464 { 465 // create a 32 bit block 466 data = (data << 8) | (key[keyIndex++] & 0xff); 467 468 // wrap when we get to the end of the key 469 if (keyIndex >= keyLength) 470 { 471 keyIndex = 0; 472 } 473 } 474 // XOR the newly created 32 bit chunk onto the P-array 475 P[i] ^= data; 476 } 477 478 /* 479 * (3) 480 * Encrypt the all-zero string with the Blowfish algorithm, using 481 * the subkeys described in (1) and (2) 482 * 483 * (4) 484 * Replace P1 and P2 with the output of step (3) 485 * 486 * (5) 487 * Encrypt the output of step(3) using the Blowfish algorithm, 488 * with the modified subkeys. 489 * 490 * (6) 491 * Replace P3 and P4 with the output of step (5) 492 * 493 * (7) 494 * Continue the process, replacing all elements of the P-array 495 * and then all four S-boxes in order, with the output of the 496 * continuously changing Blowfish algorithm 497 */ 498 499 processTable(0, 0, P); 500 processTable(P[P_SZ - 2], P[P_SZ - 1], S0); 501 processTable(S0[SBOX_SK - 2], S0[SBOX_SK - 1], S1); 502 processTable(S1[SBOX_SK - 2], S1[SBOX_SK - 1], S2); 503 processTable(S2[SBOX_SK - 2], S2[SBOX_SK - 1], S3); 504 } 505 506 /** 507 * Encrypt the given input starting at the given offset and place 508 * the result in the provided buffer starting at the given offset. 509 * The input will be an exact multiple of our blocksize. 510 */ encryptBlock( byte[] src, int srcIndex, byte[] dst, int dstIndex)511 private void encryptBlock( 512 byte[] src, 513 int srcIndex, 514 byte[] dst, 515 int dstIndex) 516 { 517 int xl = BytesTo32bits(src, srcIndex); 518 int xr = BytesTo32bits(src, srcIndex+4); 519 520 xl ^= P[0]; 521 522 for (int i = 1; i < ROUNDS; i += 2) 523 { 524 xr ^= F(xl) ^ P[i]; 525 xl ^= F(xr) ^ P[i + 1]; 526 } 527 528 xr ^= P[ROUNDS + 1]; 529 530 Bits32ToBytes(xr, dst, dstIndex); 531 Bits32ToBytes(xl, dst, dstIndex + 4); 532 } 533 534 /** 535 * Decrypt the given input starting at the given offset and place 536 * the result in the provided buffer starting at the given offset. 537 * The input will be an exact multiple of our blocksize. 538 */ decryptBlock( byte[] src, int srcIndex, byte[] dst, int dstIndex)539 private void decryptBlock( 540 byte[] src, 541 int srcIndex, 542 byte[] dst, 543 int dstIndex) 544 { 545 int xl = BytesTo32bits(src, srcIndex); 546 int xr = BytesTo32bits(src, srcIndex + 4); 547 548 xl ^= P[ROUNDS + 1]; 549 550 for (int i = ROUNDS; i > 0 ; i -= 2) 551 { 552 xr ^= F(xl) ^ P[i]; 553 xl ^= F(xr) ^ P[i - 1]; 554 } 555 556 xr ^= P[0]; 557 558 Bits32ToBytes(xr, dst, dstIndex); 559 Bits32ToBytes(xl, dst, dstIndex+4); 560 } 561 BytesTo32bits(byte[] b, int i)562 private int BytesTo32bits(byte[] b, int i) 563 { 564 return ((b[i] & 0xff) << 24) | 565 ((b[i+1] & 0xff) << 16) | 566 ((b[i+2] & 0xff) << 8) | 567 ((b[i+3] & 0xff)); 568 } 569 Bits32ToBytes(int in, byte[] b, int offset)570 private void Bits32ToBytes(int in, byte[] b, int offset) 571 { 572 b[offset + 3] = (byte)in; 573 b[offset + 2] = (byte)(in >> 8); 574 b[offset + 1] = (byte)(in >> 16); 575 b[offset] = (byte)(in >> 24); 576 } 577 } 578