46 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			V
		
	
	
			
		
		
	
	
			46 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			V
		
	
	
| module blowfish
 | |
| 
 | |
| pub struct Blowfish {
 | |
| pub mut:
 | |
| 	p [18]u32
 | |
| 	s [4][256]u32
 | |
| }
 | |
| 
 | |
| // new_cipher creates and returns a new Blowfish cipher.
 | |
| // The key argument should be the Blowfish key, from 1 to 56 bytes.
 | |
| pub fn new_cipher(key []byte) ?Blowfish {
 | |
| 	mut bf := Blowfish{}
 | |
| 	unsafe { vmemcpy(&bf.p[0], &p[0], int(sizeof(bf.p))) }
 | |
| 	unsafe { vmemcpy(&bf.s[0], &s[0], int(sizeof(bf.s))) }
 | |
| 	if key.len < 1 || key.len > 56 {
 | |
| 		return error('invalid key')
 | |
| 	}
 | |
| 	expand_key(key, mut bf)
 | |
| 
 | |
| 	return bf
 | |
| }
 | |
| 
 | |
| // new_salted_cipher returns a new Blowfish cipher that folds a salt into its key schedule.
 | |
| pub fn new_salted_cipher(key []byte, salt []byte) ?Blowfish {
 | |
| 	if salt.len == 0 {
 | |
| 		return new_cipher(key)
 | |
| 	}
 | |
| 	mut bf := Blowfish{}
 | |
| 	unsafe { vmemcpy(&bf.p[0], &p[0], int(sizeof(bf.p))) }
 | |
| 	unsafe { vmemcpy(&bf.s[0], &s[0], int(sizeof(bf.s))) }
 | |
| 	if key.len < 1 {
 | |
| 		return error('invalid key')
 | |
| 	}
 | |
| 	expand_key_with_salt(key, salt, mut bf)
 | |
| 	return bf
 | |
| }
 | |
| 
 | |
| // encrypt encrypts the 8-byte buffer src using the key k and stores the result in dst.
 | |
| pub fn (mut bf Blowfish) encrypt(mut dst []byte, src []byte) {
 | |
| 	l := u32(src[0]) << 24 | u32(src[1]) << 16 | u32(src[2]) << 8 | u32(src[3])
 | |
| 	r := u32(src[4]) << 24 | u32(src[5]) << 16 | u32(src[6]) << 8 | u32(src[7])
 | |
| 	arr := setup_tables(l, r, mut bf)
 | |
| 	dst[0], dst[1], dst[2], dst[3] = byte(arr[0] >> 24), byte(arr[0] >> 16), byte(arr[0] >> 8), byte(arr[0])
 | |
| 	dst[4], dst[5], dst[6], dst[7] = byte(arr[1] >> 24), byte(arr[1] >> 16), byte(arr[1] >> 8), byte(arr[1])
 | |
| }
 |