blob: 338ecd7a7bba066302ea6e45d05b02e755b14f37 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * An implementation of the ARCFOUR algorithm
3 *
Bence Szépkúti44bfbe32020-08-19 16:54:51 +02004 * Copyright The Mbed TLS Contributors
Bence Szépkúti4e9f7122020-06-05 13:02:18 +02005 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6 *
7 * This file is provided under the Apache License 2.0, or the
8 * GNU General Public License v2.0 or later.
9 *
10 * **********
11 * Apache License 2.0:
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +020012 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
Paul Bakkerb96f1542010-07-18 20:36:00 +000024 *
Bence Szépkúti4e9f7122020-06-05 13:02:18 +020025 * **********
26 *
27 * **********
28 * GNU General Public License v2.0 or later:
29 *
30 * This program is free software; you can redistribute it and/or modify
31 * it under the terms of the GNU General Public License as published by
32 * the Free Software Foundation; either version 2 of the License, or
33 * (at your option) any later version.
34 *
35 * This program is distributed in the hope that it will be useful,
36 * but WITHOUT ANY WARRANTY; without even the implied warranty of
37 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
38 * GNU General Public License for more details.
39 *
40 * You should have received a copy of the GNU General Public License along
41 * with this program; if not, write to the Free Software Foundation, Inc.,
42 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
43 *
44 * **********
Paul Bakker5121ce52009-01-03 21:22:43 +000045 */
46/*
47 * The ARCFOUR algorithm was publicly disclosed on 94/09.
48 *
49 * http://groups.google.com/group/sci.crypt/msg/10a300c9d21afca0
50 */
51
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020052#if !defined(MBEDTLS_CONFIG_FILE)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000053#include "mbedtls/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020054#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#include MBEDTLS_CONFIG_FILE
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020056#endif
Paul Bakker5121ce52009-01-03 21:22:43 +000057
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#if defined(MBEDTLS_ARC4_C)
Paul Bakker5121ce52009-01-03 21:22:43 +000059
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000060#include "mbedtls/arc4.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000061
Rich Evans00ab4702015-02-06 13:43:58 +000062#include <string.h>
63
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020064#if defined(MBEDTLS_SELF_TEST)
65#if defined(MBEDTLS_PLATFORM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000066#include "mbedtls/platform.h"
Paul Bakker7dc4c442014-02-01 22:50:26 +010067#else
Rich Evans00ab4702015-02-06 13:43:58 +000068#include <stdio.h>
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020069#define mbedtls_printf printf
70#endif /* MBEDTLS_PLATFORM_C */
71#endif /* MBEDTLS_SELF_TEST */
Paul Bakker7dc4c442014-02-01 22:50:26 +010072
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020073#if !defined(MBEDTLS_ARC4_ALT)
Paul Bakker90995b52013-06-24 19:20:35 +020074
Paul Bakkerc7ea99a2014-06-18 11:12:03 +020075/* Implementation that should never be optimized out by the compiler */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020076static void mbedtls_zeroize( void *v, size_t n ) {
Simon Butcher88ffc082016-05-20 00:00:37 +010077 volatile unsigned char *p = (unsigned char*)v; while( n-- ) *p++ = 0;
Paul Bakkerc7ea99a2014-06-18 11:12:03 +020078}
79
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020080void mbedtls_arc4_init( mbedtls_arc4_context *ctx )
Paul Bakkerc7ea99a2014-06-18 11:12:03 +020081{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020082 memset( ctx, 0, sizeof( mbedtls_arc4_context ) );
Paul Bakkerc7ea99a2014-06-18 11:12:03 +020083}
84
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085void mbedtls_arc4_free( mbedtls_arc4_context *ctx )
Paul Bakkerc7ea99a2014-06-18 11:12:03 +020086{
87 if( ctx == NULL )
88 return;
89
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090 mbedtls_zeroize( ctx, sizeof( mbedtls_arc4_context ) );
Paul Bakkerc7ea99a2014-06-18 11:12:03 +020091}
92
Paul Bakker5121ce52009-01-03 21:22:43 +000093/*
94 * ARC4 key schedule
95 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020096void mbedtls_arc4_setup( mbedtls_arc4_context *ctx, const unsigned char *key,
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +020097 unsigned int keylen )
Paul Bakker5121ce52009-01-03 21:22:43 +000098{
Paul Bakker23986e52011-04-24 08:57:21 +000099 int i, j, a;
100 unsigned int k;
Paul Bakker5121ce52009-01-03 21:22:43 +0000101 unsigned char *m;
102
103 ctx->x = 0;
104 ctx->y = 0;
105 m = ctx->m;
106
107 for( i = 0; i < 256; i++ )
108 m[i] = (unsigned char) i;
109
110 j = k = 0;
111
112 for( i = 0; i < 256; i++, k++ )
113 {
114 if( k >= keylen ) k = 0;
115
116 a = m[i];
117 j = ( j + a + key[k] ) & 0xFF;
118 m[i] = m[j];
119 m[j] = (unsigned char) a;
120 }
121}
122
123/*
124 * ARC4 cipher function
125 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200126int mbedtls_arc4_crypt( mbedtls_arc4_context *ctx, size_t length, const unsigned char *input,
Paul Bakkerbaad6502010-03-21 15:42:15 +0000127 unsigned char *output )
Paul Bakker5121ce52009-01-03 21:22:43 +0000128{
Paul Bakker23986e52011-04-24 08:57:21 +0000129 int x, y, a, b;
130 size_t i;
Paul Bakker5121ce52009-01-03 21:22:43 +0000131 unsigned char *m;
132
133 x = ctx->x;
134 y = ctx->y;
135 m = ctx->m;
136
Paul Bakkerbaad6502010-03-21 15:42:15 +0000137 for( i = 0; i < length; i++ )
Paul Bakker5121ce52009-01-03 21:22:43 +0000138 {
139 x = ( x + 1 ) & 0xFF; a = m[x];
140 y = ( y + a ) & 0xFF; b = m[y];
141
142 m[x] = (unsigned char) b;
143 m[y] = (unsigned char) a;
144
Paul Bakkerbaad6502010-03-21 15:42:15 +0000145 output[i] = (unsigned char)
146 ( input[i] ^ m[(unsigned char)( a + b )] );
Paul Bakker5121ce52009-01-03 21:22:43 +0000147 }
148
149 ctx->x = x;
150 ctx->y = y;
Paul Bakkerf3ccc682010-03-18 21:21:02 +0000151
152 return( 0 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000153}
154
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200155#endif /* !MBEDTLS_ARC4_ALT */
Paul Bakker90995b52013-06-24 19:20:35 +0200156
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200157#if defined(MBEDTLS_SELF_TEST)
Paul Bakker5121ce52009-01-03 21:22:43 +0000158/*
159 * ARC4 tests vectors as posted by Eric Rescorla in sep. 1994:
160 *
161 * http://groups.google.com/group/comp.security.misc/msg/10a300c9d21afca0
162 */
163static const unsigned char arc4_test_key[3][8] =
164{
165 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
166 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
167 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }
168};
169
170static const unsigned char arc4_test_pt[3][8] =
171{
172 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
173 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
174 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }
175};
176
177static const unsigned char arc4_test_ct[3][8] =
178{
179 { 0x75, 0xB7, 0x87, 0x80, 0x99, 0xE0, 0xC5, 0x96 },
180 { 0x74, 0x94, 0xC2, 0xE7, 0x10, 0x4B, 0x08, 0x79 },
181 { 0xDE, 0x18, 0x89, 0x41, 0xA3, 0x37, 0x5D, 0x3A }
182};
183
184/*
185 * Checkup routine
186 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200187int mbedtls_arc4_self_test( int verbose )
Paul Bakker5121ce52009-01-03 21:22:43 +0000188{
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200189 int i, ret = 0;
Paul Bakkerbaad6502010-03-21 15:42:15 +0000190 unsigned char ibuf[8];
191 unsigned char obuf[8];
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200192 mbedtls_arc4_context ctx;
Paul Bakker5121ce52009-01-03 21:22:43 +0000193
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200194 mbedtls_arc4_init( &ctx );
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200195
Paul Bakker5121ce52009-01-03 21:22:43 +0000196 for( i = 0; i < 3; i++ )
197 {
198 if( verbose != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200199 mbedtls_printf( " ARC4 test #%d: ", i + 1 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000200
Paul Bakkerbaad6502010-03-21 15:42:15 +0000201 memcpy( ibuf, arc4_test_pt[i], 8 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000202
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200203 mbedtls_arc4_setup( &ctx, arc4_test_key[i], 8 );
204 mbedtls_arc4_crypt( &ctx, 8, ibuf, obuf );
Paul Bakker5121ce52009-01-03 21:22:43 +0000205
Paul Bakkerbaad6502010-03-21 15:42:15 +0000206 if( memcmp( obuf, arc4_test_ct[i], 8 ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000207 {
208 if( verbose != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200209 mbedtls_printf( "failed\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000210
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200211 ret = 1;
212 goto exit;
Paul Bakker5121ce52009-01-03 21:22:43 +0000213 }
214
215 if( verbose != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200216 mbedtls_printf( "passed\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000217 }
218
219 if( verbose != 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200220 mbedtls_printf( "\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000221
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200222exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200223 mbedtls_arc4_free( &ctx );
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200224
225 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000226}
227
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200228#endif /* MBEDTLS_SELF_TEST */
Paul Bakker5121ce52009-01-03 21:22:43 +0000229
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200230#endif /* MBEDTLS_ARC4_C */