Coverage Report

Created: 2023-06-07 07:00

/src/botan/src/lib/block/aria/aria.cpp
Line
Count
Source (jump to first uncovered line)
1
/*
2
* ARIA
3
* Adapted for Botan by Jeffrey Walton, public domain
4
*
5
* Further changes
6
* (C) 2017,2020 Jack Lloyd
7
*
8
* Botan is released under the Simplified BSD License (see license.txt)
9
*
10
* This ARIA implementation is based on the 32-bit implementation by Aaram Yun from the
11
* National Security Research Institute, KOREA. Aaram Yun's implementation is based on
12
* the 8-bit implementation by Jin Hong. The source files are available in ARIA.zip from
13
* the Korea Internet & Security Agency website.
14
* <A HREF="https://tools.ietf.org/html/rfc5794">RFC 5794, A Description of the ARIA Encryption Algorithm</A>,
15
* <A HREF="http://seed.kisa.or.kr/iwt/ko/bbs/EgovReferenceList.do?bbsId=BBSMSTR_000000000002">Korea
16
* Internet & Security Agency homepage</A>
17
*/
18
19
#include <botan/internal/aria.h>
20
21
#include <botan/internal/loadstor.h>
22
#include <botan/internal/prefetch.h>
23
#include <botan/internal/rotate.h>
24
25
namespace Botan {
26
27
namespace {
28
29
namespace ARIA_F {
30
31
alignas(256) const uint8_t S1[256] = {
32
   0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5, 0x30, 0x01, 0x67, 0x2B, 0xFE, 0xD7, 0xAB, 0x76, 0xCA, 0x82, 0xC9,
33
   0x7D, 0xFA, 0x59, 0x47, 0xF0, 0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0, 0xB7, 0xFD, 0x93, 0x26, 0x36, 0x3F,
34
   0xF7, 0xCC, 0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15, 0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A, 0x07,
35
   0x12, 0x80, 0xE2, 0xEB, 0x27, 0xB2, 0x75, 0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0, 0x52, 0x3B, 0xD6, 0xB3,
36
   0x29, 0xE3, 0x2F, 0x84, 0x53, 0xD1, 0x00, 0xED, 0x20, 0xFC, 0xB1, 0x5B, 0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58,
37
   0xCF, 0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85, 0x45, 0xF9, 0x02, 0x7F, 0x50, 0x3C, 0x9F, 0xA8, 0x51, 0xA3,
38
   0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5, 0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2, 0xCD, 0x0C, 0x13, 0xEC, 0x5F,
39
   0x97, 0x44, 0x17, 0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73, 0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88,
40
   0x46, 0xEE, 0xB8, 0x14, 0xDE, 0x5E, 0x0B, 0xDB, 0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C, 0xC2, 0xD3, 0xAC,
41
   0x62, 0x91, 0x95, 0xE4, 0x79, 0xE7, 0xC8, 0x37, 0x6D, 0x8D, 0xD5, 0x4E, 0xA9, 0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A,
42
   0xAE, 0x08, 0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6, 0xE8, 0xDD, 0x74, 0x1F, 0x4B, 0xBD, 0x8B, 0x8A, 0x70,
43
   0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E, 0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E, 0xE1, 0xF8, 0x98, 0x11,
44
   0x69, 0xD9, 0x8E, 0x94, 0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF, 0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42,
45
   0x68, 0x41, 0x99, 0x2D, 0x0F, 0xB0, 0x54, 0xBB, 0x16};
46
47
alignas(256) const uint8_t S2[256] = {
48
   0xE2, 0x4E, 0x54, 0xFC, 0x94, 0xC2, 0x4A, 0xCC, 0x62, 0x0D, 0x6A, 0x46, 0x3C, 0x4D, 0x8B, 0xD1, 0x5E, 0xFA, 0x64,
49
   0xCB, 0xB4, 0x97, 0xBE, 0x2B, 0xBC, 0x77, 0x2E, 0x03, 0xD3, 0x19, 0x59, 0xC1, 0x1D, 0x06, 0x41, 0x6B, 0x55, 0xF0,
50
   0x99, 0x69, 0xEA, 0x9C, 0x18, 0xAE, 0x63, 0xDF, 0xE7, 0xBB, 0x00, 0x73, 0x66, 0xFB, 0x96, 0x4C, 0x85, 0xE4, 0x3A,
51
   0x09, 0x45, 0xAA, 0x0F, 0xEE, 0x10, 0xEB, 0x2D, 0x7F, 0xF4, 0x29, 0xAC, 0xCF, 0xAD, 0x91, 0x8D, 0x78, 0xC8, 0x95,
52
   0xF9, 0x2F, 0xCE, 0xCD, 0x08, 0x7A, 0x88, 0x38, 0x5C, 0x83, 0x2A, 0x28, 0x47, 0xDB, 0xB8, 0xC7, 0x93, 0xA4, 0x12,
53
   0x53, 0xFF, 0x87, 0x0E, 0x31, 0x36, 0x21, 0x58, 0x48, 0x01, 0x8E, 0x37, 0x74, 0x32, 0xCA, 0xE9, 0xB1, 0xB7, 0xAB,
54
   0x0C, 0xD7, 0xC4, 0x56, 0x42, 0x26, 0x07, 0x98, 0x60, 0xD9, 0xB6, 0xB9, 0x11, 0x40, 0xEC, 0x20, 0x8C, 0xBD, 0xA0,
55
   0xC9, 0x84, 0x04, 0x49, 0x23, 0xF1, 0x4F, 0x50, 0x1F, 0x13, 0xDC, 0xD8, 0xC0, 0x9E, 0x57, 0xE3, 0xC3, 0x7B, 0x65,
56
   0x3B, 0x02, 0x8F, 0x3E, 0xE8, 0x25, 0x92, 0xE5, 0x15, 0xDD, 0xFD, 0x17, 0xA9, 0xBF, 0xD4, 0x9A, 0x7E, 0xC5, 0x39,
57
   0x67, 0xFE, 0x76, 0x9D, 0x43, 0xA7, 0xE1, 0xD0, 0xF5, 0x68, 0xF2, 0x1B, 0x34, 0x70, 0x05, 0xA3, 0x8A, 0xD5, 0x79,
58
   0x86, 0xA8, 0x30, 0xC6, 0x51, 0x4B, 0x1E, 0xA6, 0x27, 0xF6, 0x35, 0xD2, 0x6E, 0x24, 0x16, 0x82, 0x5F, 0xDA, 0xE6,
59
   0x75, 0xA2, 0xEF, 0x2C, 0xB2, 0x1C, 0x9F, 0x5D, 0x6F, 0x80, 0x0A, 0x72, 0x44, 0x9B, 0x6C, 0x90, 0x0B, 0x5B, 0x33,
60
   0x7D, 0x5A, 0x52, 0xF3, 0x61, 0xA1, 0xF7, 0xB0, 0xD6, 0x3F, 0x7C, 0x6D, 0xED, 0x14, 0xE0, 0xA5, 0x3D, 0x22, 0xB3,
61
   0xF8, 0x89, 0xDE, 0x71, 0x1A, 0xAF, 0xBA, 0xB5, 0x81};
62
63
alignas(256) const uint8_t X1[256] = {
64
   0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38, 0xBF, 0x40, 0xA3, 0x9E, 0x81, 0xF3, 0xD7, 0xFB, 0x7C, 0xE3, 0x39,
65
   0x82, 0x9B, 0x2F, 0xFF, 0x87, 0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB, 0x54, 0x7B, 0x94, 0x32, 0xA6, 0xC2,
66
   0x23, 0x3D, 0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E, 0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2, 0x76,
67
   0x5B, 0xA2, 0x49, 0x6D, 0x8B, 0xD1, 0x25, 0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xD4, 0xA4, 0x5C, 0xCC,
68
   0x5D, 0x65, 0xB6, 0x92, 0x6C, 0x70, 0x48, 0x50, 0xFD, 0xED, 0xB9, 0xDA, 0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D,
69
   0x84, 0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A, 0xF7, 0xE4, 0x58, 0x05, 0xB8, 0xB3, 0x45, 0x06, 0xD0, 0x2C,
70
   0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02, 0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B, 0x3A, 0x91, 0x11, 0x41, 0x4F,
71
   0x67, 0xDC, 0xEA, 0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73, 0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85,
72
   0xE2, 0xF9, 0x37, 0xE8, 0x1C, 0x75, 0xDF, 0x6E, 0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89, 0x6F, 0xB7, 0x62,
73
   0x0E, 0xAA, 0x18, 0xBE, 0x1B, 0xFC, 0x56, 0x3E, 0x4B, 0xC6, 0xD2, 0x79, 0x20, 0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD,
74
   0x5A, 0xF4, 0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31, 0xB1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xEC, 0x5F, 0x60,
75
   0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D, 0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF, 0xA0, 0xE0, 0x3B, 0x4D,
76
   0xAE, 0x2A, 0xF5, 0xB0, 0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61, 0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6,
77
   0x26, 0xE1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0C, 0x7D};
78
79
alignas(256) const uint8_t X2[256] = {
80
   0x30, 0x68, 0x99, 0x1B, 0x87, 0xB9, 0x21, 0x78, 0x50, 0x39, 0xDB, 0xE1, 0x72, 0x09, 0x62, 0x3C, 0x3E, 0x7E, 0x5E,
81
   0x8E, 0xF1, 0xA0, 0xCC, 0xA3, 0x2A, 0x1D, 0xFB, 0xB6, 0xD6, 0x20, 0xC4, 0x8D, 0x81, 0x65, 0xF5, 0x89, 0xCB, 0x9D,
82
   0x77, 0xC6, 0x57, 0x43, 0x56, 0x17, 0xD4, 0x40, 0x1A, 0x4D, 0xC0, 0x63, 0x6C, 0xE3, 0xB7, 0xC8, 0x64, 0x6A, 0x53,
83
   0xAA, 0x38, 0x98, 0x0C, 0xF4, 0x9B, 0xED, 0x7F, 0x22, 0x76, 0xAF, 0xDD, 0x3A, 0x0B, 0x58, 0x67, 0x88, 0x06, 0xC3,
84
   0x35, 0x0D, 0x01, 0x8B, 0x8C, 0xC2, 0xE6, 0x5F, 0x02, 0x24, 0x75, 0x93, 0x66, 0x1E, 0xE5, 0xE2, 0x54, 0xD8, 0x10,
85
   0xCE, 0x7A, 0xE8, 0x08, 0x2C, 0x12, 0x97, 0x32, 0xAB, 0xB4, 0x27, 0x0A, 0x23, 0xDF, 0xEF, 0xCA, 0xD9, 0xB8, 0xFA,
86
   0xDC, 0x31, 0x6B, 0xD1, 0xAD, 0x19, 0x49, 0xBD, 0x51, 0x96, 0xEE, 0xE4, 0xA8, 0x41, 0xDA, 0xFF, 0xCD, 0x55, 0x86,
87
   0x36, 0xBE, 0x61, 0x52, 0xF8, 0xBB, 0x0E, 0x82, 0x48, 0x69, 0x9A, 0xE0, 0x47, 0x9E, 0x5C, 0x04, 0x4B, 0x34, 0x15,
88
   0x79, 0x26, 0xA7, 0xDE, 0x29, 0xAE, 0x92, 0xD7, 0x84, 0xE9, 0xD2, 0xBA, 0x5D, 0xF3, 0xC5, 0xB0, 0xBF, 0xA4, 0x3B,
89
   0x71, 0x44, 0x46, 0x2B, 0xFC, 0xEB, 0x6F, 0xD5, 0xF6, 0x14, 0xFE, 0x7C, 0x70, 0x5A, 0x7D, 0xFD, 0x2F, 0x18, 0x83,
90
   0x16, 0xA5, 0x91, 0x1F, 0x05, 0x95, 0x74, 0xA9, 0xC1, 0x5B, 0x4A, 0x85, 0x6D, 0x13, 0x07, 0x4F, 0x4E, 0x45, 0xB2,
91
   0x0F, 0xC9, 0x1C, 0xA6, 0xBC, 0xEC, 0x73, 0x90, 0x7B, 0xCF, 0x59, 0x8F, 0xA1, 0xF9, 0x2D, 0xF2, 0xB1, 0x00, 0x94,
92
   0x37, 0x9F, 0xD0, 0x2E, 0x9C, 0x6E, 0x28, 0x3F, 0x80, 0xF0, 0x3D, 0xD3, 0x25, 0x8A, 0xB5, 0xE7, 0x42, 0xB3, 0xC7,
93
   0xEA, 0xF7, 0x4C, 0x11, 0x33, 0x03, 0xA2, 0xAC, 0x60};
94
95
0
inline uint32_t ARIA_F1(uint32_t X) {
96
0
   const uint32_t M1 = 0x00010101;
97
0
   const uint32_t M2 = 0x01000101;
98
0
   const uint32_t M3 = 0x01010001;
99
0
   const uint32_t M4 = 0x01010100;
100
101
0
   return (S1[get_byte<0>(X)] * M1) ^ (S2[get_byte<1>(X)] * M2) ^ (X1[get_byte<2>(X)] * M3) ^ (X2[get_byte<3>(X)] * M4);
102
0
}
103
104
0
inline uint32_t ARIA_F2(uint32_t X) {
105
0
   const uint32_t M1 = 0x00010101;
106
0
   const uint32_t M2 = 0x01000101;
107
0
   const uint32_t M3 = 0x01010001;
108
0
   const uint32_t M4 = 0x01010100;
109
110
0
   return (X1[get_byte<0>(X)] * M3) ^ (X2[get_byte<1>(X)] * M4) ^ (S1[get_byte<2>(X)] * M1) ^ (S2[get_byte<3>(X)] * M2);
111
0
}
112
113
0
inline void ARIA_FO(uint32_t& T0, uint32_t& T1, uint32_t& T2, uint32_t& T3) {
114
0
   T0 = ARIA_F1(T0);
115
0
   T1 = ARIA_F1(T1);
116
0
   T2 = ARIA_F1(T2);
117
0
   T3 = ARIA_F1(T3);
118
119
0
   T1 ^= T2;
120
0
   T2 ^= T3;
121
0
   T0 ^= T1;
122
0
   T3 ^= T1;
123
0
   T2 ^= T0;
124
0
   T1 ^= T2;
125
126
0
   T1 = ((T1 << 8) & 0xFF00FF00) | ((T1 >> 8) & 0x00FF00FF);
127
0
   T2 = rotr<16>(T2);
128
0
   T3 = reverse_bytes(T3);
129
130
0
   T1 ^= T2;
131
0
   T2 ^= T3;
132
0
   T0 ^= T1;
133
0
   T3 ^= T1;
134
0
   T2 ^= T0;
135
0
   T1 ^= T2;
136
0
}
137
138
0
inline void ARIA_FE(uint32_t& T0, uint32_t& T1, uint32_t& T2, uint32_t& T3) {
139
0
   T0 = ARIA_F2(T0);
140
0
   T1 = ARIA_F2(T1);
141
0
   T2 = ARIA_F2(T2);
142
0
   T3 = ARIA_F2(T3);
143
144
0
   T1 ^= T2;
145
0
   T2 ^= T3;
146
0
   T0 ^= T1;
147
0
   T3 ^= T1;
148
0
   T2 ^= T0;
149
0
   T1 ^= T2;
150
151
0
   T3 = ((T3 << 8) & 0xFF00FF00) | ((T3 >> 8) & 0x00FF00FF);
152
0
   T0 = rotr<16>(T0);
153
0
   T1 = reverse_bytes(T1);
154
155
0
   T1 ^= T2;
156
0
   T2 ^= T3;
157
0
   T0 ^= T1;
158
0
   T3 ^= T1;
159
0
   T2 ^= T0;
160
0
   T1 ^= T2;
161
0
}
162
163
/*
164
* ARIA encryption and decryption
165
*/
166
0
void transform(const uint8_t in[], uint8_t out[], size_t blocks, const secure_vector<uint32_t>& KS) {
167
0
   prefetch_arrays(S1, S2, X1, X2);
168
169
0
   const size_t ROUNDS = (KS.size() / 4) - 1;
170
171
0
   for(size_t i = 0; i != blocks; ++i) {
172
0
      uint32_t t0, t1, t2, t3;
173
0
      load_be(in + 16 * i, t0, t1, t2, t3);
174
175
0
      for(size_t r = 0; r < ROUNDS; r += 2) {
176
0
         t0 ^= KS[4 * r];
177
0
         t1 ^= KS[4 * r + 1];
178
0
         t2 ^= KS[4 * r + 2];
179
0
         t3 ^= KS[4 * r + 3];
180
0
         ARIA_FO(t0, t1, t2, t3);
181
182
0
         t0 ^= KS[4 * r + 4];
183
0
         t1 ^= KS[4 * r + 5];
184
0
         t2 ^= KS[4 * r + 6];
185
0
         t3 ^= KS[4 * r + 7];
186
187
0
         if(r != ROUNDS - 2) {
188
0
            ARIA_FE(t0, t1, t2, t3);
189
0
         }
190
0
      }
191
192
0
      out[16 * i + 0] = X1[get_byte<0>(t0)] ^ get_byte<0>(KS[4 * ROUNDS]);
193
0
      out[16 * i + 1] = X2[get_byte<1>(t0)] ^ get_byte<1>(KS[4 * ROUNDS]);
194
0
      out[16 * i + 2] = S1[get_byte<2>(t0)] ^ get_byte<2>(KS[4 * ROUNDS]);
195
0
      out[16 * i + 3] = S2[get_byte<3>(t0)] ^ get_byte<3>(KS[4 * ROUNDS]);
196
0
      out[16 * i + 4] = X1[get_byte<0>(t1)] ^ get_byte<0>(KS[4 * ROUNDS + 1]);
197
0
      out[16 * i + 5] = X2[get_byte<1>(t1)] ^ get_byte<1>(KS[4 * ROUNDS + 1]);
198
0
      out[16 * i + 6] = S1[get_byte<2>(t1)] ^ get_byte<2>(KS[4 * ROUNDS + 1]);
199
0
      out[16 * i + 7] = S2[get_byte<3>(t1)] ^ get_byte<3>(KS[4 * ROUNDS + 1]);
200
0
      out[16 * i + 8] = X1[get_byte<0>(t2)] ^ get_byte<0>(KS[4 * ROUNDS + 2]);
201
0
      out[16 * i + 9] = X2[get_byte<1>(t2)] ^ get_byte<1>(KS[4 * ROUNDS + 2]);
202
0
      out[16 * i + 10] = S1[get_byte<2>(t2)] ^ get_byte<2>(KS[4 * ROUNDS + 2]);
203
0
      out[16 * i + 11] = S2[get_byte<3>(t2)] ^ get_byte<3>(KS[4 * ROUNDS + 2]);
204
0
      out[16 * i + 12] = X1[get_byte<0>(t3)] ^ get_byte<0>(KS[4 * ROUNDS + 3]);
205
0
      out[16 * i + 13] = X2[get_byte<1>(t3)] ^ get_byte<1>(KS[4 * ROUNDS + 3]);
206
0
      out[16 * i + 14] = S1[get_byte<2>(t3)] ^ get_byte<2>(KS[4 * ROUNDS + 3]);
207
0
      out[16 * i + 15] = S2[get_byte<3>(t3)] ^ get_byte<3>(KS[4 * ROUNDS + 3]);
208
0
   }
209
0
}
210
211
// n-bit right shift of Y XORed to X
212
template <size_t N>
213
0
inline void ARIA_ROL128(const uint32_t X[4], const uint32_t Y[4], uint32_t KS[4]) {
214
   // MSVC is not generating a "rotate immediate". Constify to help it along.
215
0
   static const size_t Q = 4 - (N / 32);
216
0
   static const size_t R = N % 32;
217
0
   static_assert(R > 0 && R < 32, "Rotation in range for type");
218
0
   KS[0] = (X[0]) ^ ((Y[(Q) % 4]) >> R) ^ ((Y[(Q + 3) % 4]) << (32 - R));
219
0
   KS[1] = (X[1]) ^ ((Y[(Q + 1) % 4]) >> R) ^ ((Y[(Q) % 4]) << (32 - R));
220
0
   KS[2] = (X[2]) ^ ((Y[(Q + 2) % 4]) >> R) ^ ((Y[(Q + 1) % 4]) << (32 - R));
221
0
   KS[3] = (X[3]) ^ ((Y[(Q + 3) % 4]) >> R) ^ ((Y[(Q + 2) % 4]) << (32 - R));
222
0
}
Unexecuted instantiation: aria.cpp:void Botan::(anonymous namespace)::ARIA_F::ARIA_ROL128<19ul>(unsigned int const*, unsigned int const*, unsigned int*)
Unexecuted instantiation: aria.cpp:void Botan::(anonymous namespace)::ARIA_F::ARIA_ROL128<31ul>(unsigned int const*, unsigned int const*, unsigned int*)
Unexecuted instantiation: aria.cpp:void Botan::(anonymous namespace)::ARIA_F::ARIA_ROL128<67ul>(unsigned int const*, unsigned int const*, unsigned int*)
Unexecuted instantiation: aria.cpp:void Botan::(anonymous namespace)::ARIA_F::ARIA_ROL128<97ul>(unsigned int const*, unsigned int const*, unsigned int*)
Unexecuted instantiation: aria.cpp:void Botan::(anonymous namespace)::ARIA_F::ARIA_ROL128<109ul>(unsigned int const*, unsigned int const*, unsigned int*)
223
224
0
void aria_ks_dk_transform(uint32_t& K0, uint32_t& K1, uint32_t& K2, uint32_t& K3) {
225
0
   K0 = rotr<8>(K0) ^ rotr<16>(K0) ^ rotr<24>(K0);
226
0
   K1 = rotr<8>(K1) ^ rotr<16>(K1) ^ rotr<24>(K1);
227
0
   K2 = rotr<8>(K2) ^ rotr<16>(K2) ^ rotr<24>(K2);
228
0
   K3 = rotr<8>(K3) ^ rotr<16>(K3) ^ rotr<24>(K3);
229
230
0
   K1 ^= K2;
231
0
   K2 ^= K3;
232
0
   K0 ^= K1;
233
0
   K3 ^= K1;
234
0
   K2 ^= K0;
235
0
   K1 ^= K2;
236
237
0
   K1 = ((K1 << 8) & 0xFF00FF00) | ((K1 >> 8) & 0x00FF00FF);
238
0
   K2 = rotr<16>(K2);
239
0
   K3 = reverse_bytes(K3);
240
241
0
   K1 ^= K2;
242
0
   K2 ^= K3;
243
0
   K0 ^= K1;
244
0
   K3 ^= K1;
245
0
   K2 ^= K0;
246
0
   K1 ^= K2;
247
0
}
248
249
/*
250
* ARIA Key Schedule
251
*/
252
0
void key_schedule(secure_vector<uint32_t>& ERK, secure_vector<uint32_t>& DRK, const uint8_t key[], size_t length) {
253
0
   const uint32_t KRK[3][4] = {{0x517cc1b7, 0x27220a94, 0xfe13abe8, 0xfa9a6ee0},
254
0
                               {0x6db14acc, 0x9e21c820, 0xff28b1d5, 0xef5de2b0},
255
0
                               {0xdb92371d, 0x2126e970, 0x03249775, 0x04e8c90e}};
256
257
0
   const size_t CK0 = (length / 8) - 2;
258
0
   const size_t CK1 = (CK0 + 1) % 3;
259
0
   const size_t CK2 = (CK1 + 1) % 3;
260
261
0
   uint32_t w0[4];
262
0
   uint32_t w1[4];
263
0
   uint32_t w2[4];
264
0
   uint32_t w3[4];
265
266
0
   w0[0] = load_be<uint32_t>(key, 0);
267
0
   w0[1] = load_be<uint32_t>(key, 1);
268
0
   w0[2] = load_be<uint32_t>(key, 2);
269
0
   w0[3] = load_be<uint32_t>(key, 3);
270
271
0
   w1[0] = w0[0] ^ KRK[CK0][0];
272
0
   w1[1] = w0[1] ^ KRK[CK0][1];
273
0
   w1[2] = w0[2] ^ KRK[CK0][2];
274
0
   w1[3] = w0[3] ^ KRK[CK0][3];
275
276
0
   ARIA_FO(w1[0], w1[1], w1[2], w1[3]);
277
278
0
   if(length == 24 || length == 32) {
279
0
      w1[0] ^= load_be<uint32_t>(key, 4);
280
0
      w1[1] ^= load_be<uint32_t>(key, 5);
281
0
   }
282
0
   if(length == 32) {
283
0
      w1[2] ^= load_be<uint32_t>(key, 6);
284
0
      w1[3] ^= load_be<uint32_t>(key, 7);
285
0
   }
286
287
0
   w2[0] = w1[0] ^ KRK[CK1][0];
288
0
   w2[1] = w1[1] ^ KRK[CK1][1];
289
0
   w2[2] = w1[2] ^ KRK[CK1][2];
290
0
   w2[3] = w1[3] ^ KRK[CK1][3];
291
292
0
   ARIA_FE(w2[0], w2[1], w2[2], w2[3]);
293
294
0
   w2[0] ^= w0[0];
295
0
   w2[1] ^= w0[1];
296
0
   w2[2] ^= w0[2];
297
0
   w2[3] ^= w0[3];
298
299
0
   w3[0] = w2[0] ^ KRK[CK2][0];
300
0
   w3[1] = w2[1] ^ KRK[CK2][1];
301
0
   w3[2] = w2[2] ^ KRK[CK2][2];
302
0
   w3[3] = w2[3] ^ KRK[CK2][3];
303
304
0
   ARIA_FO(w3[0], w3[1], w3[2], w3[3]);
305
306
0
   w3[0] ^= w1[0];
307
0
   w3[1] ^= w1[1];
308
0
   w3[2] ^= w1[2];
309
0
   w3[3] ^= w1[3];
310
311
0
   if(length == 16) {
312
0
      ERK.resize(4 * 13);
313
0
   } else if(length == 24) {
314
0
      ERK.resize(4 * 15);
315
0
   } else if(length == 32) {
316
0
      ERK.resize(4 * 17);
317
0
   }
318
319
0
   ARIA_ROL128<19>(w0, w1, &ERK[0]);
320
0
   ARIA_ROL128<19>(w1, w2, &ERK[4]);
321
0
   ARIA_ROL128<19>(w2, w3, &ERK[8]);
322
0
   ARIA_ROL128<19>(w3, w0, &ERK[12]);
323
0
   ARIA_ROL128<31>(w0, w1, &ERK[16]);
324
0
   ARIA_ROL128<31>(w1, w2, &ERK[20]);
325
0
   ARIA_ROL128<31>(w2, w3, &ERK[24]);
326
0
   ARIA_ROL128<31>(w3, w0, &ERK[28]);
327
0
   ARIA_ROL128<67>(w0, w1, &ERK[32]);
328
0
   ARIA_ROL128<67>(w1, w2, &ERK[36]);
329
0
   ARIA_ROL128<67>(w2, w3, &ERK[40]);
330
0
   ARIA_ROL128<67>(w3, w0, &ERK[44]);
331
0
   ARIA_ROL128<97>(w0, w1, &ERK[48]);
332
333
0
   if(length == 24 || length == 32) {
334
0
      ARIA_ROL128<97>(w1, w2, &ERK[52]);
335
0
      ARIA_ROL128<97>(w2, w3, &ERK[56]);
336
337
0
      if(length == 32) {
338
0
         ARIA_ROL128<97>(w3, w0, &ERK[60]);
339
0
         ARIA_ROL128<109>(w0, w1, &ERK[64]);
340
0
      }
341
0
   }
342
343
   // Now create the decryption key schedule
344
0
   DRK.resize(ERK.size());
345
346
0
   for(size_t i = 0; i != DRK.size(); i += 4) {
347
0
      DRK[i] = ERK[ERK.size() - 4 - i];
348
0
      DRK[i + 1] = ERK[ERK.size() - 3 - i];
349
0
      DRK[i + 2] = ERK[ERK.size() - 2 - i];
350
0
      DRK[i + 3] = ERK[ERK.size() - 1 - i];
351
0
   }
352
353
0
   for(size_t i = 4; i != DRK.size() - 4; i += 4) {
354
0
      aria_ks_dk_transform(DRK[i + 0], DRK[i + 1], DRK[i + 2], DRK[i + 3]);
355
0
   }
356
0
}
357
358
}  // namespace ARIA_F
359
360
}  // namespace
361
362
0
void ARIA_128::encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const {
363
0
   assert_key_material_set();
364
0
   ARIA_F::transform(in, out, blocks, m_ERK);
365
0
}
366
367
0
void ARIA_192::encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const {
368
0
   assert_key_material_set();
369
0
   ARIA_F::transform(in, out, blocks, m_ERK);
370
0
}
371
372
0
void ARIA_256::encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const {
373
0
   assert_key_material_set();
374
0
   ARIA_F::transform(in, out, blocks, m_ERK);
375
0
}
376
377
0
void ARIA_128::decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const {
378
0
   assert_key_material_set();
379
0
   ARIA_F::transform(in, out, blocks, m_DRK);
380
0
}
381
382
0
void ARIA_192::decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const {
383
0
   assert_key_material_set();
384
0
   ARIA_F::transform(in, out, blocks, m_DRK);
385
0
}
386
387
0
void ARIA_256::decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const {
388
0
   assert_key_material_set();
389
0
   ARIA_F::transform(in, out, blocks, m_DRK);
390
0
}
391
392
0
bool ARIA_128::has_keying_material() const { return !m_ERK.empty(); }
393
394
0
bool ARIA_192::has_keying_material() const { return !m_ERK.empty(); }
395
396
0
bool ARIA_256::has_keying_material() const { return !m_ERK.empty(); }
397
398
0
void ARIA_128::key_schedule(const uint8_t key[], size_t length) { ARIA_F::key_schedule(m_ERK, m_DRK, key, length); }
399
400
0
void ARIA_192::key_schedule(const uint8_t key[], size_t length) { ARIA_F::key_schedule(m_ERK, m_DRK, key, length); }
401
402
0
void ARIA_256::key_schedule(const uint8_t key[], size_t length) { ARIA_F::key_schedule(m_ERK, m_DRK, key, length); }
403
404
0
void ARIA_128::clear() {
405
0
   zap(m_ERK);
406
0
   zap(m_DRK);
407
0
}
408
409
0
void ARIA_192::clear() {
410
0
   zap(m_ERK);
411
0
   zap(m_DRK);
412
0
}
413
414
0
void ARIA_256::clear() {
415
0
   zap(m_ERK);
416
0
   zap(m_DRK);
417
0
}
418
419
}  // namespace Botan