3 * The Square block cipher
5 * (c) 2000 Straylight/Edgeware
8 /*----- Licensing notice --------------------------------------------------*
10 * This file is part of Catacomb.
12 * Catacomb is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU Library General Public License as
14 * published by the Free Software Foundation; either version 2 of the
15 * License, or (at your option) any later version.
17 * Catacomb is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU Library General Public License for more details.
22 * You should have received a copy of the GNU Library General Public
23 * License along with Catacomb; if not, write to the Free
24 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
28 /*----- Header files ------------------------------------------------------*/
33 #include <mLib/bits.h>
40 /*----- Global variables --------------------------------------------------*/
42 const octet square_keysz[] = { KSZ_RANGE, SQUARE_KEYSZ, 4, 16, 4 };
44 /*----- Constant tables ---------------------------------------------------*/
46 extern const octet square_s[256], square_si[256];
47 extern const uint32 square_t[4][256], square_ti[4][256];
48 extern const uint32 square_u[4][256];
49 extern const octet square_rcon[32];
56 #define RCON square_rcon
58 /*----- Main code ---------------------------------------------------------*/
60 /* --- @square_init@ --- *
62 * Arguments: @square_ctx *k@ = pointer to context to initialize
63 * @const void *buf@ = pointer to buffer of key material
64 * @size_t sz@ = size of the key material
68 * Use: Initializes a Square context with a particular key. Square
69 * keys must be a multiple of 32 bits long, and may be at most
73 void square_init(square_ctx *k, const void *buf, size_t sz)
79 uint32 kk[SQUARE_KWORDS];
81 /* --- Sort out the key size --- */
83 KSZ_ASSERT(square, sz);
86 /* --- Fetch the first key words out --- */
89 for (i = 0; i < nk; i++) {
95 /* --- GCC complains about an out-of-bounds subscript here --- *
97 * This is impossible. Thanks to @KSZ_ASSERT@, we know that @sz <= 16@ and
98 * hence @i <= nk <= 4@; but @SQUARE_KWORDS == 36@.
101 #if __GNUC__ >= 5 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 6)
102 # pragma GCC diagnostic push
103 # pragma GCC diagnostic ignored "-Warray-bounds"
108 #if __GNUC__ >= 5 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 6)
109 # pragma GCC diagnostic pop
112 /* --- Expand this material to fill the rest of the table --- */
116 for (; i < nw; i++) {
117 uint32 w = kk[i - nk];
126 /* --- Make the encryption and decryption keys --- */
128 for (i = 0; i < nr * 4; i++) {
130 k->w[i] = (U[0][U8(w >> 0)] ^ U[1][U8(w >> 8)] ^
131 U[2][U8(w >> 16)] ^ U[3][U8(w >> 24)]);
137 for (i = 0; i < nr * 4; i += 4) {
139 for (j = 0; j < 4; j++)
140 k->wi[i + j] = kk[jj + j];
142 for (j = 0; j < 4; j++)
143 k->wi[i + j] = k->w[j];
148 /* --- @square_eblk@, @square_dblk@ --- *
150 * Arguments: @const square_ctx *k@ = pointer to Square context
151 * @const uint32 s[4]@ = pointer to source block
152 * @uint32 d[4]@ = pointer to destination block
156 * Use: Low-level block encryption and decryption.
159 #define SUB(s, sh, a, b, c, d) \
160 (s[U8((a) >> sh)] << 0 | s[U8((b) >> sh)] << 8 | \
161 s[U8((c) >> sh)] << 16 | s[U8((d) >> sh)] << 24)
163 #define MIX(t, sh, a, b, c, d) \
164 (t[0][U8((a) >> sh)] ^ t[1][U8((b) >> sh)] ^ \
165 t[2][U8((c) >> sh)] ^ t[3][U8((d) >> sh)])
167 #define DO(what, t, aa, bb, cc, dd, a, b, c, d, w) do { \
168 aa = what(t, 0, a, b, c, d) ^ *w++; \
169 bb = what(t, 8, a, b, c, d) ^ *w++; \
170 cc = what(t, 16, a, b, c, d) ^ *w++; \
171 dd = what(t, 24, a, b, c, d) ^ *w++; \
174 void square_eblk(const square_ctx *k, const uint32 *s, uint32 *dst)
176 uint32 a = s[0], b = s[1], c = s[2], d = s[3];
177 uint32 aa, bb, cc, dd;
178 const uint32 *w = k->w;
180 a ^= *w++; b ^= *w++; c ^= *w++; d ^= *w++;
182 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
183 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
184 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
185 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
186 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
187 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
188 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
189 DO(SUB, S, a, b, c, d, aa, bb, cc, dd, w);
191 dst[0] = a; dst[1] = b; dst[2] = c; dst[3] = d;
194 void square_dblk(const square_ctx *k, const uint32 *s, uint32 *dst)
196 uint32 a = s[0], b = s[1], c = s[2], d = s[3];
197 uint32 aa, bb, cc, dd;
198 const uint32 *w = k->wi;
200 a ^= *w++; b ^= *w++; c ^= *w++; d ^= *w++;
202 DO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
203 DO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
204 DO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
205 DO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
206 DO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
207 DO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
208 DO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
209 DO(SUB, SI, a, b, c, d, aa, bb, cc, dd, w);
211 dst[0] = a; dst[1] = b; dst[2] = c; dst[3] = d;
214 BLKC_TEST(SQUARE, square)
216 /*----- That's all, folks -------------------------------------------------*/