/src/botan/src/lib/block/camellia/camellia.cpp
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Camellia |
3 | | * (C) 2012,2020 Jack Lloyd |
4 | | * |
5 | | * Botan is released under the Simplified BSD License (see license.txt) |
6 | | */ |
7 | | |
8 | | #include <botan/internal/camellia.h> |
9 | | |
10 | | #include <botan/internal/loadstor.h> |
11 | | #include <botan/internal/prefetch.h> |
12 | | #include <botan/internal/rotate.h> |
13 | | |
14 | | namespace Botan { |
15 | | |
16 | | namespace { |
17 | | |
18 | | namespace Camellia_F { |
19 | | |
20 | | alignas(256) const uint8_t SBOX1[256] = { |
21 | | 0x70, 0x82, 0x2C, 0xEC, 0xB3, 0x27, 0xC0, 0xE5, 0xE4, 0x85, 0x57, 0x35, 0xEA, 0x0C, 0xAE, 0x41, 0x23, 0xEF, 0x6B, |
22 | | 0x93, 0x45, 0x19, 0xA5, 0x21, 0xED, 0x0E, 0x4F, 0x4E, 0x1D, 0x65, 0x92, 0xBD, 0x86, 0xB8, 0xAF, 0x8F, 0x7C, 0xEB, |
23 | | 0x1F, 0xCE, 0x3E, 0x30, 0xDC, 0x5F, 0x5E, 0xC5, 0x0B, 0x1A, 0xA6, 0xE1, 0x39, 0xCA, 0xD5, 0x47, 0x5D, 0x3D, 0xD9, |
24 | | 0x01, 0x5A, 0xD6, 0x51, 0x56, 0x6C, 0x4D, 0x8B, 0x0D, 0x9A, 0x66, 0xFB, 0xCC, 0xB0, 0x2D, 0x74, 0x12, 0x2B, 0x20, |
25 | | 0xF0, 0xB1, 0x84, 0x99, 0xDF, 0x4C, 0xCB, 0xC2, 0x34, 0x7E, 0x76, 0x05, 0x6D, 0xB7, 0xA9, 0x31, 0xD1, 0x17, 0x04, |
26 | | 0xD7, 0x14, 0x58, 0x3A, 0x61, 0xDE, 0x1B, 0x11, 0x1C, 0x32, 0x0F, 0x9C, 0x16, 0x53, 0x18, 0xF2, 0x22, 0xFE, 0x44, |
27 | | 0xCF, 0xB2, 0xC3, 0xB5, 0x7A, 0x91, 0x24, 0x08, 0xE8, 0xA8, 0x60, 0xFC, 0x69, 0x50, 0xAA, 0xD0, 0xA0, 0x7D, 0xA1, |
28 | | 0x89, 0x62, 0x97, 0x54, 0x5B, 0x1E, 0x95, 0xE0, 0xFF, 0x64, 0xD2, 0x10, 0xC4, 0x00, 0x48, 0xA3, 0xF7, 0x75, 0xDB, |
29 | | 0x8A, 0x03, 0xE6, 0xDA, 0x09, 0x3F, 0xDD, 0x94, 0x87, 0x5C, 0x83, 0x02, 0xCD, 0x4A, 0x90, 0x33, 0x73, 0x67, 0xF6, |
30 | | 0xF3, 0x9D, 0x7F, 0xBF, 0xE2, 0x52, 0x9B, 0xD8, 0x26, 0xC8, 0x37, 0xC6, 0x3B, 0x81, 0x96, 0x6F, 0x4B, 0x13, 0xBE, |
31 | | 0x63, 0x2E, 0xE9, 0x79, 0xA7, 0x8C, 0x9F, 0x6E, 0xBC, 0x8E, 0x29, 0xF5, 0xF9, 0xB6, 0x2F, 0xFD, 0xB4, 0x59, 0x78, |
32 | | 0x98, 0x06, 0x6A, 0xE7, 0x46, 0x71, 0xBA, 0xD4, 0x25, 0xAB, 0x42, 0x88, 0xA2, 0x8D, 0xFA, 0x72, 0x07, 0xB9, 0x55, |
33 | | 0xF8, 0xEE, 0xAC, 0x0A, 0x36, 0x49, 0x2A, 0x68, 0x3C, 0x38, 0xF1, 0xA4, 0x40, 0x28, 0xD3, 0x7B, 0xBB, 0xC9, 0x43, |
34 | | 0xC1, 0x15, 0xE3, 0xAD, 0xF4, 0x77, 0xC7, 0x80, 0x9E}; |
35 | | |
36 | | // SBOX2[x] = rotl<1>(SBOX1[x]) |
37 | | alignas(256) const uint8_t SBOX2[256] = { |
38 | | 0xE0, 0x05, 0x58, 0xD9, 0x67, 0x4E, 0x81, 0xCB, 0xC9, 0x0B, 0xAE, 0x6A, 0xD5, 0x18, 0x5D, 0x82, 0x46, 0xDF, 0xD6, |
39 | | 0x27, 0x8A, 0x32, 0x4B, 0x42, 0xDB, 0x1C, 0x9E, 0x9C, 0x3A, 0xCA, 0x25, 0x7B, 0x0D, 0x71, 0x5F, 0x1F, 0xF8, 0xD7, |
40 | | 0x3E, 0x9D, 0x7C, 0x60, 0xB9, 0xBE, 0xBC, 0x8B, 0x16, 0x34, 0x4D, 0xC3, 0x72, 0x95, 0xAB, 0x8E, 0xBA, 0x7A, 0xB3, |
41 | | 0x02, 0xB4, 0xAD, 0xA2, 0xAC, 0xD8, 0x9A, 0x17, 0x1A, 0x35, 0xCC, 0xF7, 0x99, 0x61, 0x5A, 0xE8, 0x24, 0x56, 0x40, |
42 | | 0xE1, 0x63, 0x09, 0x33, 0xBF, 0x98, 0x97, 0x85, 0x68, 0xFC, 0xEC, 0x0A, 0xDA, 0x6F, 0x53, 0x62, 0xA3, 0x2E, 0x08, |
43 | | 0xAF, 0x28, 0xB0, 0x74, 0xC2, 0xBD, 0x36, 0x22, 0x38, 0x64, 0x1E, 0x39, 0x2C, 0xA6, 0x30, 0xE5, 0x44, 0xFD, 0x88, |
44 | | 0x9F, 0x65, 0x87, 0x6B, 0xF4, 0x23, 0x48, 0x10, 0xD1, 0x51, 0xC0, 0xF9, 0xD2, 0xA0, 0x55, 0xA1, 0x41, 0xFA, 0x43, |
45 | | 0x13, 0xC4, 0x2F, 0xA8, 0xB6, 0x3C, 0x2B, 0xC1, 0xFF, 0xC8, 0xA5, 0x20, 0x89, 0x00, 0x90, 0x47, 0xEF, 0xEA, 0xB7, |
46 | | 0x15, 0x06, 0xCD, 0xB5, 0x12, 0x7E, 0xBB, 0x29, 0x0F, 0xB8, 0x07, 0x04, 0x9B, 0x94, 0x21, 0x66, 0xE6, 0xCE, 0xED, |
47 | | 0xE7, 0x3B, 0xFE, 0x7F, 0xC5, 0xA4, 0x37, 0xB1, 0x4C, 0x91, 0x6E, 0x8D, 0x76, 0x03, 0x2D, 0xDE, 0x96, 0x26, 0x7D, |
48 | | 0xC6, 0x5C, 0xD3, 0xF2, 0x4F, 0x19, 0x3F, 0xDC, 0x79, 0x1D, 0x52, 0xEB, 0xF3, 0x6D, 0x5E, 0xFB, 0x69, 0xB2, 0xF0, |
49 | | 0x31, 0x0C, 0xD4, 0xCF, 0x8C, 0xE2, 0x75, 0xA9, 0x4A, 0x57, 0x84, 0x11, 0x45, 0x1B, 0xF5, 0xE4, 0x0E, 0x73, 0xAA, |
50 | | 0xF1, 0xDD, 0x59, 0x14, 0x6C, 0x92, 0x54, 0xD0, 0x78, 0x70, 0xE3, 0x49, 0x80, 0x50, 0xA7, 0xF6, 0x77, 0x93, 0x86, |
51 | | 0x83, 0x2A, 0xC7, 0x5B, 0xE9, 0xEE, 0x8F, 0x01, 0x3D}; |
52 | | |
53 | | // SBOX3[x] = rotl<7>(SBOX1[x]) |
54 | | alignas(256) const uint8_t SBOX3[256] = { |
55 | | 0x38, 0x41, 0x16, 0x76, 0xD9, 0x93, 0x60, 0xF2, 0x72, 0xC2, 0xAB, 0x9A, 0x75, 0x06, 0x57, 0xA0, 0x91, 0xF7, 0xB5, |
56 | | 0xC9, 0xA2, 0x8C, 0xD2, 0x90, 0xF6, 0x07, 0xA7, 0x27, 0x8E, 0xB2, 0x49, 0xDE, 0x43, 0x5C, 0xD7, 0xC7, 0x3E, 0xF5, |
57 | | 0x8F, 0x67, 0x1F, 0x18, 0x6E, 0xAF, 0x2F, 0xE2, 0x85, 0x0D, 0x53, 0xF0, 0x9C, 0x65, 0xEA, 0xA3, 0xAE, 0x9E, 0xEC, |
58 | | 0x80, 0x2D, 0x6B, 0xA8, 0x2B, 0x36, 0xA6, 0xC5, 0x86, 0x4D, 0x33, 0xFD, 0x66, 0x58, 0x96, 0x3A, 0x09, 0x95, 0x10, |
59 | | 0x78, 0xD8, 0x42, 0xCC, 0xEF, 0x26, 0xE5, 0x61, 0x1A, 0x3F, 0x3B, 0x82, 0xB6, 0xDB, 0xD4, 0x98, 0xE8, 0x8B, 0x02, |
60 | | 0xEB, 0x0A, 0x2C, 0x1D, 0xB0, 0x6F, 0x8D, 0x88, 0x0E, 0x19, 0x87, 0x4E, 0x0B, 0xA9, 0x0C, 0x79, 0x11, 0x7F, 0x22, |
61 | | 0xE7, 0x59, 0xE1, 0xDA, 0x3D, 0xC8, 0x12, 0x04, 0x74, 0x54, 0x30, 0x7E, 0xB4, 0x28, 0x55, 0x68, 0x50, 0xBE, 0xD0, |
62 | | 0xC4, 0x31, 0xCB, 0x2A, 0xAD, 0x0F, 0xCA, 0x70, 0xFF, 0x32, 0x69, 0x08, 0x62, 0x00, 0x24, 0xD1, 0xFB, 0xBA, 0xED, |
63 | | 0x45, 0x81, 0x73, 0x6D, 0x84, 0x9F, 0xEE, 0x4A, 0xC3, 0x2E, 0xC1, 0x01, 0xE6, 0x25, 0x48, 0x99, 0xB9, 0xB3, 0x7B, |
64 | | 0xF9, 0xCE, 0xBF, 0xDF, 0x71, 0x29, 0xCD, 0x6C, 0x13, 0x64, 0x9B, 0x63, 0x9D, 0xC0, 0x4B, 0xB7, 0xA5, 0x89, 0x5F, |
65 | | 0xB1, 0x17, 0xF4, 0xBC, 0xD3, 0x46, 0xCF, 0x37, 0x5E, 0x47, 0x94, 0xFA, 0xFC, 0x5B, 0x97, 0xFE, 0x5A, 0xAC, 0x3C, |
66 | | 0x4C, 0x03, 0x35, 0xF3, 0x23, 0xB8, 0x5D, 0x6A, 0x92, 0xD5, 0x21, 0x44, 0x51, 0xC6, 0x7D, 0x39, 0x83, 0xDC, 0xAA, |
67 | | 0x7C, 0x77, 0x56, 0x05, 0x1B, 0xA4, 0x15, 0x34, 0x1E, 0x1C, 0xF8, 0x52, 0x20, 0x14, 0xE9, 0xBD, 0xDD, 0xE4, 0xA1, |
68 | | 0xE0, 0x8A, 0xF1, 0xD6, 0x7A, 0xBB, 0xE3, 0x40, 0x4F}; |
69 | | |
70 | | // SBOX4[x] = SBOX1[rotl<1>(x)] |
71 | | alignas(256) const uint8_t SBOX4[256] = { |
72 | | 0x70, 0x2C, 0xB3, 0xC0, 0xE4, 0x57, 0xEA, 0xAE, 0x23, 0x6B, 0x45, 0xA5, 0xED, 0x4F, 0x1D, 0x92, 0x86, 0xAF, 0x7C, |
73 | | 0x1F, 0x3E, 0xDC, 0x5E, 0x0B, 0xA6, 0x39, 0xD5, 0x5D, 0xD9, 0x5A, 0x51, 0x6C, 0x8B, 0x9A, 0xFB, 0xB0, 0x74, 0x2B, |
74 | | 0xF0, 0x84, 0xDF, 0xCB, 0x34, 0x76, 0x6D, 0xA9, 0xD1, 0x04, 0x14, 0x3A, 0xDE, 0x11, 0x32, 0x9C, 0x53, 0xF2, 0xFE, |
75 | | 0xCF, 0xC3, 0x7A, 0x24, 0xE8, 0x60, 0x69, 0xAA, 0xA0, 0xA1, 0x62, 0x54, 0x1E, 0xE0, 0x64, 0x10, 0x00, 0xA3, 0x75, |
76 | | 0x8A, 0xE6, 0x09, 0xDD, 0x87, 0x83, 0xCD, 0x90, 0x73, 0xF6, 0x9D, 0xBF, 0x52, 0xD8, 0xC8, 0xC6, 0x81, 0x6F, 0x13, |
77 | | 0x63, 0xE9, 0xA7, 0x9F, 0xBC, 0x29, 0xF9, 0x2F, 0xB4, 0x78, 0x06, 0xE7, 0x71, 0xD4, 0xAB, 0x88, 0x8D, 0x72, 0xB9, |
78 | | 0xF8, 0xAC, 0x36, 0x2A, 0x3C, 0xF1, 0x40, 0xD3, 0xBB, 0x43, 0x15, 0xAD, 0x77, 0x80, 0x82, 0xEC, 0x27, 0xE5, 0x85, |
79 | | 0x35, 0x0C, 0x41, 0xEF, 0x93, 0x19, 0x21, 0x0E, 0x4E, 0x65, 0xBD, 0xB8, 0x8F, 0xEB, 0xCE, 0x30, 0x5F, 0xC5, 0x1A, |
80 | | 0xE1, 0xCA, 0x47, 0x3D, 0x01, 0xD6, 0x56, 0x4D, 0x0D, 0x66, 0xCC, 0x2D, 0x12, 0x20, 0xB1, 0x99, 0x4C, 0xC2, 0x7E, |
81 | | 0x05, 0xB7, 0x31, 0x17, 0xD7, 0x58, 0x61, 0x1B, 0x1C, 0x0F, 0x16, 0x18, 0x22, 0x44, 0xB2, 0xB5, 0x91, 0x08, 0xA8, |
82 | | 0xFC, 0x50, 0xD0, 0x7D, 0x89, 0x97, 0x5B, 0x95, 0xFF, 0xD2, 0xC4, 0x48, 0xF7, 0xDB, 0x03, 0xDA, 0x3F, 0x94, 0x5C, |
83 | | 0x02, 0x4A, 0x33, 0x67, 0xF3, 0x7F, 0xE2, 0x9B, 0x26, 0x37, 0x3B, 0x96, 0x4B, 0xBE, 0x2E, 0x79, 0x8C, 0x6E, 0x8E, |
84 | | 0xF5, 0xB6, 0xFD, 0x59, 0x98, 0x6A, 0x46, 0xBA, 0x25, 0x42, 0xA2, 0xFA, 0x07, 0x55, 0xEE, 0x0A, 0x49, 0x68, 0x38, |
85 | | 0xA4, 0x28, 0x7B, 0xC9, 0xC1, 0xE3, 0xF4, 0xC7, 0x9E}; |
86 | | |
87 | 105k | uint64_t F(uint64_t v, uint64_t K) { |
88 | 105k | const uint64_t M1 = 0x0101010001000001; |
89 | 105k | const uint64_t M2 = 0x0001010101010000; |
90 | 105k | const uint64_t M3 = 0x0100010100010100; |
91 | 105k | const uint64_t M4 = 0x0101000100000101; |
92 | 105k | const uint64_t M5 = 0x0001010100010101; |
93 | 105k | const uint64_t M6 = 0x0100010101000101; |
94 | 105k | const uint64_t M7 = 0x0101000101010001; |
95 | 105k | const uint64_t M8 = 0x0101010001010100; |
96 | | |
97 | 105k | const uint64_t x = v ^ K; |
98 | | |
99 | 105k | const uint64_t Z1 = M1 * SBOX1[get_byte<0>(x)]; |
100 | 105k | const uint64_t Z2 = M2 * SBOX2[get_byte<1>(x)]; |
101 | 105k | const uint64_t Z3 = M3 * SBOX3[get_byte<2>(x)]; |
102 | 105k | const uint64_t Z4 = M4 * SBOX4[get_byte<3>(x)]; |
103 | 105k | const uint64_t Z5 = M5 * SBOX2[get_byte<4>(x)]; |
104 | 105k | const uint64_t Z6 = M6 * SBOX3[get_byte<5>(x)]; |
105 | 105k | const uint64_t Z7 = M7 * SBOX4[get_byte<6>(x)]; |
106 | 105k | const uint64_t Z8 = M8 * SBOX1[get_byte<7>(x)]; |
107 | | |
108 | 105k | return Z1 ^ Z2 ^ Z3 ^ Z4 ^ Z5 ^ Z6 ^ Z7 ^ Z8; |
109 | 105k | } |
110 | | |
111 | 12.6k | inline uint64_t FL(uint64_t v, uint64_t K) { |
112 | 12.6k | uint32_t x1 = static_cast<uint32_t>(v >> 32); |
113 | 12.6k | uint32_t x2 = static_cast<uint32_t>(v & 0xFFFFFFFF); |
114 | | |
115 | 12.6k | const uint32_t k1 = static_cast<uint32_t>(K >> 32); |
116 | 12.6k | const uint32_t k2 = static_cast<uint32_t>(K & 0xFFFFFFFF); |
117 | | |
118 | 12.6k | x2 ^= rotl<1>(x1 & k1); |
119 | 12.6k | x1 ^= (x2 | k2); |
120 | | |
121 | 12.6k | return ((static_cast<uint64_t>(x1) << 32) | x2); |
122 | 12.6k | } |
123 | | |
124 | 12.6k | inline uint64_t FLINV(uint64_t v, uint64_t K) { |
125 | 12.6k | uint32_t x1 = static_cast<uint32_t>(v >> 32); |
126 | 12.6k | uint32_t x2 = static_cast<uint32_t>(v & 0xFFFFFFFF); |
127 | | |
128 | 12.6k | const uint32_t k1 = static_cast<uint32_t>(K >> 32); |
129 | 12.6k | const uint32_t k2 = static_cast<uint32_t>(K & 0xFFFFFFFF); |
130 | | |
131 | 12.6k | x1 ^= (x2 | k2); |
132 | 12.6k | x2 ^= rotl<1>(x1 & k1); |
133 | | |
134 | 12.6k | return ((static_cast<uint64_t>(x1) << 32) | x2); |
135 | 12.6k | } |
136 | | |
137 | | /* |
138 | | * Camellia Encryption |
139 | | */ |
140 | 1.18k | void encrypt(const uint8_t in[], uint8_t out[], size_t blocks, const secure_vector<uint64_t>& SK, const size_t rounds) { |
141 | 1.18k | prefetch_arrays(SBOX1, SBOX2, SBOX3, SBOX4); |
142 | | |
143 | 5.92k | for(size_t i = 0; i < blocks; ++i) { |
144 | 4.74k | uint64_t D1, D2; |
145 | 4.74k | load_be(in + 16 * i, D1, D2); |
146 | | |
147 | 4.74k | const uint64_t* K = SK.data(); |
148 | | |
149 | 4.74k | D1 ^= *K++; |
150 | 4.74k | D2 ^= *K++; |
151 | | |
152 | 4.74k | D2 ^= F(D1, *K++); |
153 | 4.74k | D1 ^= F(D2, *K++); |
154 | | |
155 | 47.4k | for(size_t r = 1; r != rounds - 1; ++r) { |
156 | 42.6k | if(r % 3 == 0) { |
157 | 12.6k | D1 = FL(D1, *K++); |
158 | 12.6k | D2 = FLINV(D2, *K++); |
159 | 12.6k | } |
160 | | |
161 | 42.6k | D2 ^= F(D1, *K++); |
162 | 42.6k | D1 ^= F(D2, *K++); |
163 | 42.6k | } |
164 | | |
165 | 4.74k | D2 ^= F(D1, *K++); |
166 | 4.74k | D1 ^= F(D2, *K++); |
167 | | |
168 | 4.74k | D2 ^= *K++; |
169 | 4.74k | D1 ^= *K++; |
170 | | |
171 | 4.74k | store_be(out + 16 * i, D2, D1); |
172 | 4.74k | } |
173 | 1.18k | } |
174 | | |
175 | | /* |
176 | | * Camellia Decryption |
177 | | */ |
178 | 0 | void decrypt(const uint8_t in[], uint8_t out[], size_t blocks, const secure_vector<uint64_t>& SK, const size_t rounds) { |
179 | 0 | prefetch_arrays(SBOX1, SBOX2, SBOX3, SBOX4); |
180 | |
|
181 | 0 | for(size_t i = 0; i < blocks; ++i) { |
182 | 0 | uint64_t D1, D2; |
183 | 0 | load_be(in + 16 * i, D1, D2); |
184 | |
|
185 | 0 | const uint64_t* K = &SK[SK.size() - 1]; |
186 | |
|
187 | 0 | D2 ^= *K--; |
188 | 0 | D1 ^= *K--; |
189 | |
|
190 | 0 | D2 ^= F(D1, *K--); |
191 | 0 | D1 ^= F(D2, *K--); |
192 | |
|
193 | 0 | for(size_t r = 1; r != rounds - 1; ++r) { |
194 | 0 | if(r % 3 == 0) { |
195 | 0 | D1 = FL(D1, *K--); |
196 | 0 | D2 = FLINV(D2, *K--); |
197 | 0 | } |
198 | |
|
199 | 0 | D2 ^= F(D1, *K--); |
200 | 0 | D1 ^= F(D2, *K--); |
201 | 0 | } |
202 | |
|
203 | 0 | D2 ^= F(D1, *K--); |
204 | 0 | D1 ^= F(D2, *K--); |
205 | |
|
206 | 0 | D1 ^= *K--; |
207 | 0 | D2 ^= *K; |
208 | |
|
209 | 0 | store_be(out + 16 * i, D2, D1); |
210 | 0 | } |
211 | 0 | } |
212 | | |
213 | 2.47k | inline uint64_t left_rot_hi(uint64_t h, uint64_t l, size_t shift) { |
214 | 2.47k | if(shift >= 64) { |
215 | 1.00k | shift -= 64; |
216 | 1.00k | } |
217 | 2.47k | return (h << shift) | (l >> (64 - shift)); |
218 | 2.47k | } |
219 | | |
220 | 2.47k | inline uint64_t left_rot_lo(uint64_t h, uint64_t l, size_t shift) { |
221 | 2.47k | if(shift >= 64) { |
222 | 1.00k | shift -= 64; |
223 | 1.00k | } |
224 | 2.47k | return (h >> (64 - shift)) | (l << shift); |
225 | 2.47k | } |
226 | | |
227 | | /* |
228 | | * Camellia Key Schedule |
229 | | */ |
230 | 173 | void key_schedule(secure_vector<uint64_t>& SK, std::span<const uint8_t> key) { |
231 | 173 | const uint64_t Sigma1 = 0xA09E667F3BCC908B; |
232 | 173 | const uint64_t Sigma2 = 0xB67AE8584CAA73B2; |
233 | 173 | const uint64_t Sigma3 = 0xC6EF372FE94F82BE; |
234 | 173 | const uint64_t Sigma4 = 0x54FF53A5F1D36F1C; |
235 | 173 | const uint64_t Sigma5 = 0x10E527FADE682D1D; |
236 | 173 | const uint64_t Sigma6 = 0xB05688C2B3E6C1FD; |
237 | | |
238 | 173 | const uint64_t KL_H = load_be<uint64_t>(key.data(), 0); |
239 | 173 | const uint64_t KL_L = load_be<uint64_t>(key.data(), 1); |
240 | | |
241 | 173 | const uint64_t KR_H = (key.size() >= 24) ? load_be<uint64_t>(key.data(), 2) : 0; |
242 | | |
243 | 173 | const uint64_t KR_L = [&]() -> uint64_t { |
244 | 173 | if(key.size() == 32) { |
245 | 142 | return load_be<uint64_t>(key.data(), 3); |
246 | 142 | } else if(key.size() == 24) { |
247 | 0 | return ~KR_H; |
248 | 31 | } else { |
249 | 31 | return 0; |
250 | 31 | } |
251 | 173 | }(); |
252 | | |
253 | 173 | uint64_t D1 = KL_H ^ KR_H; |
254 | 173 | uint64_t D2 = KL_L ^ KR_L; |
255 | 173 | D2 ^= F(D1, Sigma1); |
256 | 173 | D1 ^= F(D2, Sigma2); |
257 | 173 | D1 ^= KL_H; |
258 | 173 | D2 ^= KL_L; |
259 | 173 | D2 ^= F(D1, Sigma3); |
260 | 173 | D1 ^= F(D2, Sigma4); |
261 | | |
262 | 173 | const uint64_t KA_H = D1; |
263 | 173 | const uint64_t KA_L = D2; |
264 | | |
265 | 173 | D1 = KA_H ^ KR_H; |
266 | 173 | D2 = KA_L ^ KR_L; |
267 | 173 | D2 ^= F(D1, Sigma5); |
268 | 173 | D1 ^= F(D2, Sigma6); |
269 | | |
270 | 173 | const uint64_t KB_H = D1; |
271 | 173 | const uint64_t KB_L = D2; |
272 | | |
273 | 173 | if(key.size() == 16) { |
274 | 31 | SK.resize(26); |
275 | | |
276 | 31 | SK[0] = KL_H; |
277 | 31 | SK[1] = KL_L; |
278 | 31 | SK[2] = KA_H; |
279 | 31 | SK[3] = KA_L; |
280 | 31 | SK[4] = left_rot_hi(KL_H, KL_L, 15); |
281 | 31 | SK[5] = left_rot_lo(KL_H, KL_L, 15); |
282 | 31 | SK[6] = left_rot_hi(KA_H, KA_L, 15); |
283 | 31 | SK[7] = left_rot_lo(KA_H, KA_L, 15); |
284 | 31 | SK[8] = left_rot_hi(KA_H, KA_L, 30); |
285 | 31 | SK[9] = left_rot_lo(KA_H, KA_L, 30); |
286 | 31 | SK[10] = left_rot_hi(KL_H, KL_L, 45); |
287 | 31 | SK[11] = left_rot_lo(KL_H, KL_L, 45); |
288 | 31 | SK[12] = left_rot_hi(KA_H, KA_L, 45); |
289 | 31 | SK[13] = left_rot_lo(KL_H, KL_L, 60); |
290 | 31 | SK[14] = left_rot_hi(KA_H, KA_L, 60); |
291 | 31 | SK[15] = left_rot_lo(KA_H, KA_L, 60); |
292 | 31 | SK[16] = left_rot_lo(KL_H, KL_L, 77); |
293 | 31 | SK[17] = left_rot_hi(KL_H, KL_L, 77); |
294 | 31 | SK[18] = left_rot_lo(KL_H, KL_L, 94); |
295 | 31 | SK[19] = left_rot_hi(KL_H, KL_L, 94); |
296 | 31 | SK[20] = left_rot_lo(KA_H, KA_L, 94); |
297 | 31 | SK[21] = left_rot_hi(KA_H, KA_L, 94); |
298 | 31 | SK[22] = left_rot_lo(KL_H, KL_L, 111); |
299 | 31 | SK[23] = left_rot_hi(KL_H, KL_L, 111); |
300 | 31 | SK[24] = left_rot_lo(KA_H, KA_L, 111); |
301 | 31 | SK[25] = left_rot_hi(KA_H, KA_L, 111); |
302 | 142 | } else { |
303 | 142 | SK.resize(34); |
304 | | |
305 | 142 | SK[0] = KL_H; |
306 | 142 | SK[1] = KL_L; |
307 | 142 | SK[2] = KB_H; |
308 | 142 | SK[3] = KB_L; |
309 | | |
310 | 142 | SK[4] = left_rot_hi(KR_H, KR_L, 15); |
311 | 142 | SK[5] = left_rot_lo(KR_H, KR_L, 15); |
312 | 142 | SK[6] = left_rot_hi(KA_H, KA_L, 15); |
313 | 142 | SK[7] = left_rot_lo(KA_H, KA_L, 15); |
314 | | |
315 | 142 | SK[8] = left_rot_hi(KR_H, KR_L, 30); |
316 | 142 | SK[9] = left_rot_lo(KR_H, KR_L, 30); |
317 | 142 | SK[10] = left_rot_hi(KB_H, KB_L, 30); |
318 | 142 | SK[11] = left_rot_lo(KB_H, KB_L, 30); |
319 | | |
320 | 142 | SK[12] = left_rot_hi(KL_H, KL_L, 45); |
321 | 142 | SK[13] = left_rot_lo(KL_H, KL_L, 45); |
322 | 142 | SK[14] = left_rot_hi(KA_H, KA_L, 45); |
323 | 142 | SK[15] = left_rot_lo(KA_H, KA_L, 45); |
324 | | |
325 | 142 | SK[16] = left_rot_hi(KL_H, KL_L, 60); |
326 | 142 | SK[17] = left_rot_lo(KL_H, KL_L, 60); |
327 | 142 | SK[18] = left_rot_hi(KR_H, KR_L, 60); |
328 | 142 | SK[19] = left_rot_lo(KR_H, KR_L, 60); |
329 | 142 | SK[20] = left_rot_hi(KB_H, KB_L, 60); |
330 | 142 | SK[21] = left_rot_lo(KB_H, KB_L, 60); |
331 | | |
332 | 142 | SK[22] = left_rot_lo(KL_H, KL_L, 77); |
333 | 142 | SK[23] = left_rot_hi(KL_H, KL_L, 77); |
334 | 142 | SK[24] = left_rot_lo(KA_H, KA_L, 77); |
335 | 142 | SK[25] = left_rot_hi(KA_H, KA_L, 77); |
336 | | |
337 | 142 | SK[26] = left_rot_lo(KR_H, KR_L, 94); |
338 | 142 | SK[27] = left_rot_hi(KR_H, KR_L, 94); |
339 | 142 | SK[28] = left_rot_lo(KA_H, KA_L, 94); |
340 | 142 | SK[29] = left_rot_hi(KA_H, KA_L, 94); |
341 | 142 | SK[30] = left_rot_lo(KL_H, KL_L, 111); |
342 | 142 | SK[31] = left_rot_hi(KL_H, KL_L, 111); |
343 | 142 | SK[32] = left_rot_lo(KB_H, KB_L, 111); |
344 | 142 | SK[33] = left_rot_hi(KB_H, KB_L, 111); |
345 | 142 | } |
346 | 173 | } |
347 | | |
348 | | } // namespace Camellia_F |
349 | | |
350 | | } // namespace |
351 | | |
352 | 393 | void Camellia_128::encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const { |
353 | 393 | assert_key_material_set(); |
354 | 393 | Camellia_F::encrypt(in, out, blocks, m_SK, 9); |
355 | 393 | } |
356 | | |
357 | 0 | void Camellia_192::encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const { |
358 | 0 | assert_key_material_set(); |
359 | 0 | Camellia_F::encrypt(in, out, blocks, m_SK, 12); |
360 | 0 | } |
361 | | |
362 | 792 | void Camellia_256::encrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const { |
363 | 792 | assert_key_material_set(); |
364 | 792 | Camellia_F::encrypt(in, out, blocks, m_SK, 12); |
365 | 792 | } |
366 | | |
367 | 0 | void Camellia_128::decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const { |
368 | 0 | assert_key_material_set(); |
369 | 0 | Camellia_F::decrypt(in, out, blocks, m_SK, 9); |
370 | 0 | } |
371 | | |
372 | 0 | void Camellia_192::decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const { |
373 | 0 | assert_key_material_set(); |
374 | 0 | Camellia_F::decrypt(in, out, blocks, m_SK, 12); |
375 | 0 | } |
376 | | |
377 | 0 | void Camellia_256::decrypt_n(const uint8_t in[], uint8_t out[], size_t blocks) const { |
378 | 0 | assert_key_material_set(); |
379 | 0 | Camellia_F::decrypt(in, out, blocks, m_SK, 12); |
380 | 0 | } |
381 | | |
382 | 598 | bool Camellia_128::has_keying_material() const { |
383 | 598 | return !m_SK.empty(); |
384 | 598 | } |
385 | | |
386 | 0 | bool Camellia_192::has_keying_material() const { |
387 | 0 | return !m_SK.empty(); |
388 | 0 | } |
389 | | |
390 | 1.56k | bool Camellia_256::has_keying_material() const { |
391 | 1.56k | return !m_SK.empty(); |
392 | 1.56k | } |
393 | | |
394 | 31 | void Camellia_128::key_schedule(std::span<const uint8_t> key) { |
395 | 31 | Camellia_F::key_schedule(m_SK, key); |
396 | 31 | } |
397 | | |
398 | 0 | void Camellia_192::key_schedule(std::span<const uint8_t> key) { |
399 | 0 | Camellia_F::key_schedule(m_SK, key); |
400 | 0 | } |
401 | | |
402 | 142 | void Camellia_256::key_schedule(std::span<const uint8_t> key) { |
403 | 142 | Camellia_F::key_schedule(m_SK, key); |
404 | 142 | } |
405 | | |
406 | 0 | void Camellia_128::clear() { |
407 | 0 | zap(m_SK); |
408 | 0 | } |
409 | | |
410 | 0 | void Camellia_192::clear() { |
411 | 0 | zap(m_SK); |
412 | 0 | } |
413 | | |
414 | 0 | void Camellia_256::clear() { |
415 | 0 | zap(m_SK); |
416 | 0 | } |
417 | | |
418 | | } // namespace Botan |