blob: e790579ab092f119e0dbdc6553646d7275ef7811 [file] [log] [blame]
Paul Bakker5121ce52009-01-03 21:22:43 +00001/*
2 * An implementation of the ARCFOUR algorithm
3 *
Manuel Pégourié-Gonnarda658a402015-01-23 09:45:19 +00004 * Copyright (C) 2006-2014, ARM Limited, All Rights Reserved
Paul Bakkerb96f1542010-07-18 20:36:00 +00005 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +00006 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakkerb96f1542010-07-18 20:36:00 +00007 *
Paul Bakker5121ce52009-01-03 21:22:43 +00008 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License along
19 * with this program; if not, write to the Free Software Foundation, Inc.,
20 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 */
22/*
23 * The ARCFOUR algorithm was publicly disclosed on 94/09.
24 *
25 * http://groups.google.com/group/sci.crypt/msg/10a300c9d21afca0
26 */
27
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020028#if !defined(POLARSSL_CONFIG_FILE)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000029#include "mbedtls/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020030#else
31#include POLARSSL_CONFIG_FILE
32#endif
Paul Bakker5121ce52009-01-03 21:22:43 +000033
Paul Bakker40e46942009-01-03 21:51:57 +000034#if defined(POLARSSL_ARC4_C)
Paul Bakker5121ce52009-01-03 21:22:43 +000035
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000036#include "mbedtls/arc4.h"
Paul Bakker5121ce52009-01-03 21:22:43 +000037
Rich Evans00ab4702015-02-06 13:43:58 +000038#include <string.h>
39
40#if defined(POLARSSL_SELF_TEST)
Paul Bakker7dc4c442014-02-01 22:50:26 +010041#if defined(POLARSSL_PLATFORM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000042#include "mbedtls/platform.h"
Paul Bakker7dc4c442014-02-01 22:50:26 +010043#else
Rich Evans00ab4702015-02-06 13:43:58 +000044#include <stdio.h>
Paul Bakker7dc4c442014-02-01 22:50:26 +010045#define polarssl_printf printf
Rich Evans00ab4702015-02-06 13:43:58 +000046#endif /* POLARSSL_PLATFORM_C */
47#endif /* POLARSSL_SELF_TEST */
Paul Bakker7dc4c442014-02-01 22:50:26 +010048
Paul Bakker90995b52013-06-24 19:20:35 +020049#if !defined(POLARSSL_ARC4_ALT)
50
Paul Bakkerc7ea99a2014-06-18 11:12:03 +020051/* Implementation that should never be optimized out by the compiler */
52static void polarssl_zeroize( void *v, size_t n ) {
53 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
54}
55
56void arc4_init( arc4_context *ctx )
57{
58 memset( ctx, 0, sizeof( arc4_context ) );
59}
60
61void arc4_free( arc4_context *ctx )
62{
63 if( ctx == NULL )
64 return;
65
66 polarssl_zeroize( ctx, sizeof( arc4_context ) );
67}
68
Paul Bakker5121ce52009-01-03 21:22:43 +000069/*
70 * ARC4 key schedule
71 */
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +020072void arc4_setup( arc4_context *ctx, const unsigned char *key,
73 unsigned int keylen )
Paul Bakker5121ce52009-01-03 21:22:43 +000074{
Paul Bakker23986e52011-04-24 08:57:21 +000075 int i, j, a;
76 unsigned int k;
Paul Bakker5121ce52009-01-03 21:22:43 +000077 unsigned char *m;
78
79 ctx->x = 0;
80 ctx->y = 0;
81 m = ctx->m;
82
83 for( i = 0; i < 256; i++ )
84 m[i] = (unsigned char) i;
85
86 j = k = 0;
87
88 for( i = 0; i < 256; i++, k++ )
89 {
90 if( k >= keylen ) k = 0;
91
92 a = m[i];
93 j = ( j + a + key[k] ) & 0xFF;
94 m[i] = m[j];
95 m[j] = (unsigned char) a;
96 }
97}
98
99/*
100 * ARC4 cipher function
101 */
Paul Bakker23986e52011-04-24 08:57:21 +0000102int arc4_crypt( arc4_context *ctx, size_t length, const unsigned char *input,
Paul Bakkerbaad6502010-03-21 15:42:15 +0000103 unsigned char *output )
Paul Bakker5121ce52009-01-03 21:22:43 +0000104{
Paul Bakker23986e52011-04-24 08:57:21 +0000105 int x, y, a, b;
106 size_t i;
Paul Bakker5121ce52009-01-03 21:22:43 +0000107 unsigned char *m;
108
109 x = ctx->x;
110 y = ctx->y;
111 m = ctx->m;
112
Paul Bakkerbaad6502010-03-21 15:42:15 +0000113 for( i = 0; i < length; i++ )
Paul Bakker5121ce52009-01-03 21:22:43 +0000114 {
115 x = ( x + 1 ) & 0xFF; a = m[x];
116 y = ( y + a ) & 0xFF; b = m[y];
117
118 m[x] = (unsigned char) b;
119 m[y] = (unsigned char) a;
120
Paul Bakkerbaad6502010-03-21 15:42:15 +0000121 output[i] = (unsigned char)
122 ( input[i] ^ m[(unsigned char)( a + b )] );
Paul Bakker5121ce52009-01-03 21:22:43 +0000123 }
124
125 ctx->x = x;
126 ctx->y = y;
Paul Bakkerf3ccc682010-03-18 21:21:02 +0000127
128 return( 0 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000129}
130
Paul Bakker90995b52013-06-24 19:20:35 +0200131#endif /* !POLARSSL_ARC4_ALT */
132
Paul Bakker40e46942009-01-03 21:51:57 +0000133#if defined(POLARSSL_SELF_TEST)
Paul Bakker5121ce52009-01-03 21:22:43 +0000134/*
135 * ARC4 tests vectors as posted by Eric Rescorla in sep. 1994:
136 *
137 * http://groups.google.com/group/comp.security.misc/msg/10a300c9d21afca0
138 */
139static const unsigned char arc4_test_key[3][8] =
140{
141 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
142 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
143 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }
144};
145
146static const unsigned char arc4_test_pt[3][8] =
147{
148 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
149 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
150 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }
151};
152
153static const unsigned char arc4_test_ct[3][8] =
154{
155 { 0x75, 0xB7, 0x87, 0x80, 0x99, 0xE0, 0xC5, 0x96 },
156 { 0x74, 0x94, 0xC2, 0xE7, 0x10, 0x4B, 0x08, 0x79 },
157 { 0xDE, 0x18, 0x89, 0x41, 0xA3, 0x37, 0x5D, 0x3A }
158};
159
160/*
161 * Checkup routine
162 */
163int arc4_self_test( int verbose )
164{
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200165 int i, ret = 0;
Paul Bakkerbaad6502010-03-21 15:42:15 +0000166 unsigned char ibuf[8];
167 unsigned char obuf[8];
Paul Bakker5121ce52009-01-03 21:22:43 +0000168 arc4_context ctx;
169
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200170 arc4_init( &ctx );
171
Paul Bakker5121ce52009-01-03 21:22:43 +0000172 for( i = 0; i < 3; i++ )
173 {
174 if( verbose != 0 )
Paul Bakker7dc4c442014-02-01 22:50:26 +0100175 polarssl_printf( " ARC4 test #%d: ", i + 1 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000176
Paul Bakkerbaad6502010-03-21 15:42:15 +0000177 memcpy( ibuf, arc4_test_pt[i], 8 );
Paul Bakker5121ce52009-01-03 21:22:43 +0000178
Paul Bakker3c2122f2013-06-24 19:03:14 +0200179 arc4_setup( &ctx, arc4_test_key[i], 8 );
Paul Bakkerbaad6502010-03-21 15:42:15 +0000180 arc4_crypt( &ctx, 8, ibuf, obuf );
Paul Bakker5121ce52009-01-03 21:22:43 +0000181
Paul Bakkerbaad6502010-03-21 15:42:15 +0000182 if( memcmp( obuf, arc4_test_ct[i], 8 ) != 0 )
Paul Bakker5121ce52009-01-03 21:22:43 +0000183 {
184 if( verbose != 0 )
Paul Bakker7dc4c442014-02-01 22:50:26 +0100185 polarssl_printf( "failed\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000186
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200187 ret = 1;
188 goto exit;
Paul Bakker5121ce52009-01-03 21:22:43 +0000189 }
190
191 if( verbose != 0 )
Paul Bakker7dc4c442014-02-01 22:50:26 +0100192 polarssl_printf( "passed\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000193 }
194
195 if( verbose != 0 )
Paul Bakker7dc4c442014-02-01 22:50:26 +0100196 polarssl_printf( "\n" );
Paul Bakker5121ce52009-01-03 21:22:43 +0000197
Paul Bakkerc7ea99a2014-06-18 11:12:03 +0200198exit:
199 arc4_free( &ctx );
200
201 return( ret );
Paul Bakker5121ce52009-01-03 21:22:43 +0000202}
203
Paul Bakker9af723c2014-05-01 13:03:14 +0200204#endif /* POLARSSL_SELF_TEST */
Paul Bakker5121ce52009-01-03 21:22:43 +0000205
Paul Bakker9af723c2014-05-01 13:03:14 +0200206#endif /* POLARSSL_ARC4_C */