Coverage Report

Created: 2023-03-26 07:33

/src/nettle/camellia256-set-encrypt-key.c
Line
Count
Source (jump to first uncovered line)
1
/* camellia256-set-encrypt-key.c
2
3
   Key setup for the camellia block cipher.
4
5
   Copyright (C) 2006,2007 NTT
6
   (Nippon Telegraph and Telephone Corporation).
7
8
   Copyright (C) 2010, 2013 Niels Möller
9
10
   This file is part of GNU Nettle.
11
12
   GNU Nettle is free software: you can redistribute it and/or
13
   modify it under the terms of either:
14
15
     * the GNU Lesser General Public License as published by the Free
16
       Software Foundation; either version 3 of the License, or (at your
17
       option) any later version.
18
19
   or
20
21
     * the GNU General Public License as published by the Free
22
       Software Foundation; either version 2 of the License, or (at your
23
       option) any later version.
24
25
   or both in parallel, as here.
26
27
   GNU Nettle is distributed in the hope that it will be useful,
28
   but WITHOUT ANY WARRANTY; without even the implied warranty of
29
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
30
   General Public License for more details.
31
32
   You should have received copies of the GNU General Public License and
33
   the GNU Lesser General Public License along with this program.  If
34
   not, see http://www.gnu.org/licenses/.
35
*/
36
37
/*
38
 * Algorithm Specification 
39
 *  http://info.isl.ntt.co.jp/crypt/eng/camellia/specifications.html
40
 */
41
42
/* Based on camellia.c ver 1.2.0, see
43
   http://info.isl.ntt.co.jp/crypt/eng/camellia/dl/camellia-LGPL-1.2.0.tar.gz.
44
 */
45
#if HAVE_CONFIG_H
46
# include "config.h"
47
#endif
48
49
#include <assert.h>
50
#include <limits.h>
51
52
#include "camellia-internal.h"
53
54
#include "macros.h"
55
56
static void
57
_camellia256_set_encrypt_key (struct camellia256_ctx *ctx,
58
            uint64_t k0, uint64_t k1,
59
            uint64_t k2, uint64_t k3)
60
0
{
61
0
  uint64_t subkey[_CAMELLIA256_NKEYS + 2];
62
0
  uint64_t w;
63
  
64
  /* generate KL dependent subkeys */
65
0
  subkey[0] = k0; subkey[1] = k1;
66
0
  ROTL128(45, k0, k1);
67
0
  subkey[12] = k0; subkey[13] = k1;
68
0
  ROTL128(15, k0, k1);
69
0
  subkey[16] = k0; subkey[17] = k1;
70
0
  ROTL128(17, k0, k1);
71
0
  subkey[22] = k0; subkey[23] = k1;
72
0
  ROTL128(34, k0, k1);
73
0
  subkey[30] = k0; subkey[31] = k1;
74
75
  /* generate KR dependent subkeys */
76
0
  ROTL128(15, k2, k3);
77
0
  subkey[4] = k2; subkey[5] = k3;
78
0
  ROTL128(15, k2, k3);
79
0
  subkey[8] = k2; subkey[9] = k3;
80
0
  ROTL128(30, k2, k3);
81
0
  subkey[18] = k2; subkey[19] = k3;
82
0
  ROTL128(34, k2, k3);
83
0
  subkey[26] = k2; subkey[27] = k3;
84
0
  ROTL128(34, k2, k3);
85
86
  /* generate KA */
87
  /* The construction of KA is done as
88
89
     D1 = (KL ^ KR) >> 64
90
     D2 = (KL ^ KR) & MASK64
91
     W = F(D1, SIGMA1)
92
     D2 = D2 ^ W
93
     D1 = F(D2, SIGMA2) ^ (KR >> 64)
94
     D2 = F(D1, SIGMA3) ^ W ^ (KR & MASK64)
95
     D1 = D1 ^ F(W, SIGMA2)
96
     D2 = D2 ^ F(D1, SIGMA3)
97
     D1 = D1 ^ F(D2, SIGMA4)
98
  */
99
100
0
  k0 = subkey[0] ^ k2;
101
0
  k1 = subkey[1] ^ k3;
102
103
0
  CAMELLIA_F(k0, SIGMA1, w);
104
0
  k1 ^= w;
105
106
0
  CAMELLIA_F(k1, SIGMA2, k0);
107
0
  k0 ^= k2;
108
109
0
  CAMELLIA_F(k0, SIGMA3, k1);
110
0
  k1 ^= w ^ k3;
111
112
0
  CAMELLIA_F(k1, SIGMA4, w);
113
0
  k0 ^= w;
114
115
  /* generate KB */
116
0
  k2 ^= k0; k3 ^= k1;
117
0
  CAMELLIA_F(k2, SIGMA5, w);
118
0
  k3 ^= w;
119
0
  CAMELLIA_F(k3, SIGMA6, w);
120
0
  k2 ^= w;
121
122
  /* generate KA dependent subkeys */
123
0
  ROTL128(15, k0, k1);
124
0
  subkey[6] = k0; subkey[7] = k1;
125
0
  ROTL128(30, k0, k1);
126
0
  subkey[14] = k0; subkey[15] = k1;
127
0
  ROTL128(32, k0, k1);
128
0
  subkey[24] = k0; subkey[25] = k1;
129
0
  ROTL128(17, k0, k1);
130
0
  subkey[28] = k0; subkey[29] = k1;
131
132
  /* generate KB dependent subkeys */
133
0
  subkey[2] = k2; subkey[3] = k3;
134
0
  ROTL128(30, k2, k3);
135
0
  subkey[10] = k2; subkey[11] = k3;
136
0
  ROTL128(30, k2, k3);
137
0
  subkey[20] = k2; subkey[21] = k3;
138
0
  ROTL128(51, k2, k3);
139
0
  subkey[32] = k2; subkey[33] = k3;
140
141
  /* Common final processing */
142
0
  _nettle_camellia_absorb (_CAMELLIA256_NKEYS, ctx->keys, subkey);
143
0
}
144
145
void
146
camellia256_set_encrypt_key(struct camellia256_ctx *ctx,
147
          const uint8_t *key)
148
0
{
149
0
  uint64_t k0, k1, k2, k3;
150
0
  k0 = READ_UINT64(key);
151
0
  k1 = READ_UINT64(key +  8);
152
0
  k2 = READ_UINT64(key + 16);
153
0
  k3 = READ_UINT64(key + 24);
154
155
0
  _camellia256_set_encrypt_key (ctx, k0, k1, k2, k3);
156
0
}
157
158
void
159
camellia192_set_encrypt_key(struct camellia256_ctx *ctx,
160
          const uint8_t *key)
161
0
{
162
0
  uint64_t k0, k1, k2;
163
0
  k0 = READ_UINT64(key);
164
0
  k1 = READ_UINT64(key +  8);
165
0
  k2 = READ_UINT64(key + 16);
166
167
0
  _camellia256_set_encrypt_key (ctx, k0, k1, k2, ~k2);
168
0
}