2000-02-21 11:01:23 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2016-06-10 04:39:19 +08:00
|
|
|
BF_set_key, BF_encrypt, BF_decrypt, BF_ecb_encrypt, BF_cbc_encrypt,
|
2000-02-21 11:01:23 +08:00
|
|
|
BF_cfb64_encrypt, BF_ofb64_encrypt, BF_options - Blowfish encryption
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/blowfish.h>
|
|
|
|
|
2020-01-02 22:25:27 +08:00
|
|
|
Deprecated since OpenSSL 3.0, can be hidden entirely by defining
|
|
|
|
B<OPENSSL_API_COMPAT> with a suitable version value, see
|
|
|
|
L<openssl_user_macros(7)>:
|
|
|
|
|
2000-02-21 11:01:23 +08:00
|
|
|
void BF_set_key(BF_KEY *key, int len, const unsigned char *data);
|
|
|
|
|
2000-02-24 19:55:57 +08:00
|
|
|
void BF_ecb_encrypt(const unsigned char *in, unsigned char *out,
|
2017-01-21 02:58:49 +08:00
|
|
|
BF_KEY *key, int enc);
|
2000-02-24 19:55:57 +08:00
|
|
|
void BF_cbc_encrypt(const unsigned char *in, unsigned char *out,
|
2017-01-21 02:58:49 +08:00
|
|
|
long length, BF_KEY *schedule,
|
|
|
|
unsigned char *ivec, int enc);
|
2000-02-24 19:55:57 +08:00
|
|
|
void BF_cfb64_encrypt(const unsigned char *in, unsigned char *out,
|
2017-01-21 02:58:49 +08:00
|
|
|
long length, BF_KEY *schedule,
|
|
|
|
unsigned char *ivec, int *num, int enc);
|
2000-02-24 19:55:57 +08:00
|
|
|
void BF_ofb64_encrypt(const unsigned char *in, unsigned char *out,
|
2017-01-21 02:58:49 +08:00
|
|
|
long length, BF_KEY *schedule,
|
|
|
|
unsigned char *ivec, int *num);
|
2000-02-21 11:01:23 +08:00
|
|
|
const char *BF_options(void);
|
|
|
|
|
2016-07-19 21:27:53 +08:00
|
|
|
void BF_encrypt(BF_LONG *data, const BF_KEY *key);
|
|
|
|
void BF_decrypt(BF_LONG *data, const BF_KEY *key);
|
2000-09-23 15:30:28 +08:00
|
|
|
|
2000-02-21 11:01:23 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2020-01-02 22:25:27 +08:00
|
|
|
All of the functions described on this page are deprecated. Applications should
|
|
|
|
instead use L<EVP_EncryptInit_ex(3)>, L<EVP_EncryptUpdate(3)> and
|
|
|
|
L<EVP_EncryptFinal_ex(3)> or the equivalently named decrypt functions.
|
|
|
|
|
2002-01-22 02:01:46 +08:00
|
|
|
This library implements the Blowfish cipher, which was invented and described
|
2000-05-24 02:33:44 +08:00
|
|
|
by Counterpane (see http://www.counterpane.com/blowfish.html ).
|
2000-02-21 11:01:23 +08:00
|
|
|
|
|
|
|
Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data.
|
|
|
|
It uses a variable size key, but typically, 128 bit (16 byte) keys are
|
2005-02-19 18:26:18 +08:00
|
|
|
considered good for strong encryption. Blowfish can be used in the same
|
2015-08-18 03:21:33 +08:00
|
|
|
modes as DES (see L<des_modes(7)>). Blowfish is currently one
|
2000-02-21 11:01:23 +08:00
|
|
|
of the faster block ciphers. It is quite a bit faster than DES, and much
|
|
|
|
faster than IDEA or RC2.
|
|
|
|
|
|
|
|
Blowfish consists of a key setup phase and the actual encryption or decryption
|
|
|
|
phase.
|
|
|
|
|
|
|
|
BF_set_key() sets up the B<BF_KEY> B<key> using the B<len> bytes long key
|
|
|
|
at B<data>.
|
|
|
|
|
|
|
|
BF_ecb_encrypt() is the basic Blowfish encryption and decryption function.
|
|
|
|
It encrypts or decrypts the first 64 bits of B<in> using the key B<key>,
|
|
|
|
putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>)
|
|
|
|
or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by
|
|
|
|
B<in> and B<out> must be 64 bits in length, no less. If they are larger,
|
|
|
|
everything after the first 64 bits is ignored.
|
|
|
|
|
|
|
|
The mode functions BF_cbc_encrypt(), BF_cfb64_encrypt() and BF_ofb64_encrypt()
|
2000-09-20 11:24:36 +08:00
|
|
|
all operate on variable length data. They all take an initialization vector
|
2016-05-20 20:11:46 +08:00
|
|
|
B<ivec> which needs to be passed along into the next call of the same function
|
2000-09-20 11:24:36 +08:00
|
|
|
for the same message. B<ivec> may be initialized with anything, but the
|
|
|
|
recipient needs to know what it was initialized with, or it won't be able
|
2000-03-23 19:08:49 +08:00
|
|
|
to decrypt. Some programs and protocols simplify this, like SSH, where
|
2000-09-20 11:24:36 +08:00
|
|
|
B<ivec> is simply initialized to zero.
|
2002-01-22 02:01:46 +08:00
|
|
|
BF_cbc_encrypt() operates on data that is a multiple of 8 bytes long, while
|
2020-06-30 03:13:07 +08:00
|
|
|
BF_cfb64_encrypt() and BF_ofb64_encrypt() are used to encrypt a variable
|
2000-02-21 11:01:23 +08:00
|
|
|
number of bytes (the amount does not have to be an exact multiple of 8). The
|
|
|
|
purpose of the latter two is to simulate stream ciphers, and therefore, they
|
|
|
|
need the parameter B<num>, which is a pointer to an integer where the current
|
2000-09-20 11:24:36 +08:00
|
|
|
offset in B<ivec> is stored between calls. This integer must be initialized
|
|
|
|
to zero when B<ivec> is initialized.
|
2000-02-21 11:01:23 +08:00
|
|
|
|
|
|
|
BF_cbc_encrypt() is the Cipher Block Chaining function for Blowfish. It
|
|
|
|
encrypts or decrypts the 64 bits chunks of B<in> using the key B<schedule>,
|
|
|
|
putting the result in B<out>. B<enc> decides if encryption (BF_ENCRYPT) or
|
|
|
|
decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte
|
2000-09-20 11:24:36 +08:00
|
|
|
long initialization vector.
|
2000-02-21 11:01:23 +08:00
|
|
|
|
|
|
|
BF_cfb64_encrypt() is the CFB mode for Blowfish with 64 bit feedback.
|
|
|
|
It encrypts or decrypts the bytes in B<in> using the key B<schedule>,
|
|
|
|
putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>)
|
|
|
|
or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
|
2000-09-20 11:24:36 +08:00
|
|
|
8 byte long initialization vector. B<num> must point at an integer which must
|
2000-03-23 19:08:49 +08:00
|
|
|
be initially zero.
|
2000-02-21 11:01:23 +08:00
|
|
|
|
|
|
|
BF_ofb64_encrypt() is the OFB mode for Blowfish with 64 bit feedback.
|
2000-09-20 11:24:36 +08:00
|
|
|
It uses the same parameters as BF_cfb64_encrypt(), which must be initialized
|
2000-02-21 11:01:23 +08:00
|
|
|
the same way.
|
|
|
|
|
2000-09-19 14:15:33 +08:00
|
|
|
BF_encrypt() and BF_decrypt() are the lowest level functions for Blowfish
|
|
|
|
encryption. They encrypt/decrypt the first 64 bits of the vector pointed by
|
|
|
|
B<data>, using the key B<key>. These functions should not be used unless you
|
|
|
|
implement 'modes' of Blowfish. The alternative is to use BF_ecb_encrypt().
|
|
|
|
If you still want to use these functions, you should be aware that they take
|
|
|
|
each 32-bit chunk in host-byte order, which is little-endian on little-endian
|
|
|
|
platforms and big-endian on big-endian ones.
|
|
|
|
|
2000-02-21 11:01:23 +08:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
None of the functions presented here return any value.
|
|
|
|
|
|
|
|
=head1 NOTE
|
|
|
|
|
2000-02-26 00:00:24 +08:00
|
|
|
Applications should use the higher level functions
|
2015-08-18 03:21:33 +08:00
|
|
|
L<EVP_EncryptInit(3)> etc. instead of calling these
|
2014-08-14 22:50:26 +08:00
|
|
|
functions directly.
|
2000-02-21 11:01:23 +08:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-18 03:21:33 +08:00
|
|
|
L<EVP_EncryptInit(3)>,
|
|
|
|
L<des_modes(7)>
|
2000-02-21 11:01:23 +08:00
|
|
|
|
2020-01-02 22:25:27 +08:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
All of these functions were deprecated in OpenSSL 3.0.
|
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 20:55:52 +08:00
|
|
|
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|