line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
/** |
2
|
|
|
|
|
|
|
* @file rc2.c |
3
|
|
|
|
|
|
|
* @version 950bba4 (HEAD -> master) |
4
|
|
|
|
|
|
|
* |
5
|
|
|
|
|
|
|
* rc2 cipher implementation. |
6
|
|
|
|
|
|
|
*/ |
7
|
|
|
|
|
|
|
/* |
8
|
|
|
|
|
|
|
* Copyright (c) 2013-2017 INSIDE Secure Corporation |
9
|
|
|
|
|
|
|
* Copyright (c) PeerSec Networks, 2002-2011 |
10
|
|
|
|
|
|
|
* All Rights Reserved |
11
|
|
|
|
|
|
|
* |
12
|
|
|
|
|
|
|
* The latest version of this code is available at http://www.matrixssl.org |
13
|
|
|
|
|
|
|
* |
14
|
|
|
|
|
|
|
* This software is open source; you can redistribute it and/or modify |
15
|
|
|
|
|
|
|
* it under the terms of the GNU General Public License as published by |
16
|
|
|
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or |
17
|
|
|
|
|
|
|
* (at your option) any later version. |
18
|
|
|
|
|
|
|
* |
19
|
|
|
|
|
|
|
* This General Public License does NOT permit incorporating this software |
20
|
|
|
|
|
|
|
* into proprietary programs. If you are unable to comply with the GPL, a |
21
|
|
|
|
|
|
|
* commercial license for this software may be purchased from INSIDE at |
22
|
|
|
|
|
|
|
* http://www.insidesecure.com/ |
23
|
|
|
|
|
|
|
* |
24
|
|
|
|
|
|
|
* This program is distributed in WITHOUT ANY WARRANTY; without even the |
25
|
|
|
|
|
|
|
* implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
26
|
|
|
|
|
|
|
* See the GNU General Public License for more details. |
27
|
|
|
|
|
|
|
* |
28
|
|
|
|
|
|
|
* You should have received a copy of the GNU General Public License |
29
|
|
|
|
|
|
|
* along with this program; if not, write to the Free Software |
30
|
|
|
|
|
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
31
|
|
|
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html |
32
|
|
|
|
|
|
|
*/ |
33
|
|
|
|
|
|
|
/******************************************************************************/ |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
#include "../cryptoImpl.h" |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
#ifdef USE_MATRIX_RC2 |
38
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
/******************************************************************************/ |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
static int32_t psRc2InitKey(const unsigned char *key, uint8_t keylen, |
42
|
|
|
|
|
|
|
uint8_t rds, psRc2Key_t *skey); |
43
|
|
|
|
|
|
|
static void psRc2EncryptBlock(const unsigned char *pt, unsigned char *ct, |
44
|
|
|
|
|
|
|
psRc2Key_t *skey); |
45
|
|
|
|
|
|
|
static void psRc2DecryptBlock(const unsigned char *ct, unsigned char *pt, |
46
|
|
|
|
|
|
|
psRc2Key_t *skey); |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
/* 256-entry permutation table, probably derived somehow from pi */ |
49
|
|
|
|
|
|
|
static const unsigned char permute[256] = { |
50
|
|
|
|
|
|
|
217, 120, 249, 196, 25, 221, 181, 237, 40, 233, 253, 121, 74, 160, 216, 157, |
51
|
|
|
|
|
|
|
198, 126, 55, 131, 43, 118, 83, 142, 98, 76, 100, 136, 68, 139, 251, 162, |
52
|
|
|
|
|
|
|
23, 154, 89, 245, 135, 179, 79, 19, 97, 69, 109, 141, 9, 129, 125, 50, |
53
|
|
|
|
|
|
|
189, 143, 64, 235, 134, 183, 123, 11, 240, 149, 33, 34, 92, 107, 78, 130, |
54
|
|
|
|
|
|
|
84, 214, 101, 147, 206, 96, 178, 28, 115, 86, 192, 20, 167, 140, 241, 220, |
55
|
|
|
|
|
|
|
18, 117, 202, 31, 59, 190, 228, 209, 66, 61, 212, 48, 163, 60, 182, 38, |
56
|
|
|
|
|
|
|
111, 191, 14, 218, 70, 105, 7, 87, 39, 242, 29, 155, 188, 148, 67, 3, |
57
|
|
|
|
|
|
|
248, 17, 199, 246, 144, 239, 62, 231, 6, 195, 213, 47, 200, 102, 30, 215, |
58
|
|
|
|
|
|
|
8, 232, 234, 222, 128, 82, 238, 247, 132, 170, 114, 172, 53, 77, 106, 42, |
59
|
|
|
|
|
|
|
150, 26, 210, 113, 90, 21, 73, 116, 75, 159, 208, 94, 4, 24, 164, 236, |
60
|
|
|
|
|
|
|
194, 224, 65, 110, 15, 81, 203, 204, 36, 145, 175, 80, 161, 244, 112, 57, |
61
|
|
|
|
|
|
|
153, 124, 58, 133, 35, 184, 180, 122, 252, 2, 54, 91, 37, 85, 151, 49, |
62
|
|
|
|
|
|
|
45, 93, 250, 152, 227, 138, 146, 174, 5, 223, 41, 16, 103, 108, 186, 201, |
63
|
|
|
|
|
|
|
211, 0, 230, 207, 225, 158, 168, 44, 99, 22, 1, 63, 88, 226, 137, 169, |
64
|
|
|
|
|
|
|
13, 56, 52, 27, 171, 51, 255, 176, 187, 72, 12, 95, 185, 177, 205, 46, |
65
|
|
|
|
|
|
|
197, 243, 219, 71, 229, 165, 156, 119, 10, 166, 32, 104, 254, 127, 193, 173 |
66
|
|
|
|
|
|
|
}; |
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
/******************************************************************************/ |
69
|
|
|
|
|
|
|
|
70
|
14
|
|
|
|
|
|
int32_t psRc2Init(psRc2Cbc_t *ctx, const unsigned char *IV, |
71
|
|
|
|
|
|
|
const unsigned char *key, uint8_t keylen) |
72
|
|
|
|
|
|
|
{ |
73
|
|
|
|
|
|
|
int32 x, err; |
74
|
|
|
|
|
|
|
|
75
|
14
|
50
|
|
|
|
|
if (IV == NULL || key == NULL || ctx == NULL) |
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
76
|
|
|
|
|
|
|
{ |
77
|
|
|
|
|
|
|
psTraceCrypto("psRc2Init arg fail\n"); |
78
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
79
|
|
|
|
|
|
|
} |
80
|
|
|
|
|
|
|
/* setup cipher */ |
81
|
14
|
50
|
|
|
|
|
if ((err = psRc2InitKey(key, keylen, 0, &ctx->key)) != PS_SUCCESS) |
82
|
|
|
|
|
|
|
{ |
83
|
0
|
|
|
|
|
|
return err; |
84
|
|
|
|
|
|
|
} |
85
|
|
|
|
|
|
|
/* copy IV */ |
86
|
126
|
100
|
|
|
|
|
for (x = 0; x < RC2_BLOCKLEN; x++) |
87
|
|
|
|
|
|
|
{ |
88
|
112
|
|
|
|
|
|
ctx->IV[x] = IV[x]; |
89
|
|
|
|
|
|
|
} |
90
|
14
|
|
|
|
|
|
return PS_SUCCESS; |
91
|
|
|
|
|
|
|
} |
92
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
/******************************************************************************/ |
94
|
|
|
|
|
|
|
|
95
|
0
|
|
|
|
|
|
int32_t psRc2Encrypt(psRc2Cbc_t *ctx, const unsigned char *pt, |
96
|
|
|
|
|
|
|
unsigned char *ct, uint32_t len) |
97
|
|
|
|
|
|
|
{ |
98
|
|
|
|
|
|
|
int32 x; |
99
|
|
|
|
|
|
|
uint32 i; |
100
|
|
|
|
|
|
|
unsigned char tmp[RC2_BLOCKLEN]; |
101
|
|
|
|
|
|
|
|
102
|
0
|
0
|
|
|
|
|
if (pt == NULL || ct == NULL || ctx == NULL || (len & 0x7) != 0) |
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
103
|
|
|
|
|
|
|
{ |
104
|
|
|
|
|
|
|
psTraceCrypto("Bad parameters to psRc2Encrypt\n"); |
105
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
106
|
|
|
|
|
|
|
} |
107
|
|
|
|
|
|
|
|
108
|
0
|
0
|
|
|
|
|
for (i = 0; i < len; i += RC2_BLOCKLEN) |
109
|
|
|
|
|
|
|
{ |
110
|
|
|
|
|
|
|
/* xor IV against plaintext */ |
111
|
0
|
0
|
|
|
|
|
for (x = 0; x < RC2_BLOCKLEN; x++) |
112
|
|
|
|
|
|
|
{ |
113
|
0
|
|
|
|
|
|
tmp[x] = pt[x] ^ ctx->IV[x]; |
114
|
|
|
|
|
|
|
} |
115
|
|
|
|
|
|
|
/* encrypt */ |
116
|
0
|
|
|
|
|
|
psRc2EncryptBlock(tmp, ct, &ctx->key); |
117
|
|
|
|
|
|
|
/* store IV [ciphertext] for a future block */ |
118
|
0
|
0
|
|
|
|
|
for (x = 0; x < RC2_BLOCKLEN; x++) |
119
|
|
|
|
|
|
|
{ |
120
|
0
|
|
|
|
|
|
ctx->IV[x] = ct[x]; |
121
|
|
|
|
|
|
|
} |
122
|
0
|
|
|
|
|
|
ct += RC2_BLOCKLEN; |
123
|
0
|
|
|
|
|
|
pt += RC2_BLOCKLEN; |
124
|
|
|
|
|
|
|
} |
125
|
|
|
|
|
|
|
|
126
|
0
|
|
|
|
|
|
memset(tmp, 0x0, sizeof(tmp)); |
127
|
0
|
|
|
|
|
|
return len; |
128
|
|
|
|
|
|
|
} |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
/******************************************************************************/ |
131
|
|
|
|
|
|
|
|
132
|
14
|
|
|
|
|
|
int32_t psRc2Decrypt(psRc2Cbc_t *ctx, const unsigned char *ct, |
133
|
|
|
|
|
|
|
unsigned char *pt, uint32_t len) |
134
|
|
|
|
|
|
|
{ |
135
|
|
|
|
|
|
|
int32 x; |
136
|
|
|
|
|
|
|
uint32 i; |
137
|
|
|
|
|
|
|
unsigned char tmp[RC2_BLOCKLEN], tmp2[RC2_BLOCKLEN]; |
138
|
|
|
|
|
|
|
|
139
|
14
|
50
|
|
|
|
|
if (pt == NULL || ct == NULL || ctx == NULL || (len & 0x7) != 0) |
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
140
|
|
|
|
|
|
|
{ |
141
|
|
|
|
|
|
|
psTraceCrypto("Bad parameters to psRc2Decrypt\n"); |
142
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
143
|
|
|
|
|
|
|
} |
144
|
1938
|
100
|
|
|
|
|
for (i = 0; i < len; i += RC2_BLOCKLEN) |
145
|
|
|
|
|
|
|
{ |
146
|
|
|
|
|
|
|
/* decrypt the block from ct into tmp */ |
147
|
1924
|
|
|
|
|
|
psRc2DecryptBlock(ct, tmp, &ctx->key); |
148
|
|
|
|
|
|
|
/* xor IV against the plaintext of the previous step */ |
149
|
17316
|
100
|
|
|
|
|
for (x = 0; x < RC2_BLOCKLEN; x++) |
150
|
|
|
|
|
|
|
{ |
151
|
|
|
|
|
|
|
/* copy CT in case ct == pt */ |
152
|
15392
|
|
|
|
|
|
tmp2[x] = ct[x]; |
153
|
|
|
|
|
|
|
/* actually decrypt the byte */ |
154
|
15392
|
|
|
|
|
|
pt[x] = tmp[x] ^ ctx->IV[x]; |
155
|
|
|
|
|
|
|
} |
156
|
|
|
|
|
|
|
/* replace IV with this current ciphertext */ |
157
|
17316
|
100
|
|
|
|
|
for (x = 0; x < RC2_BLOCKLEN; x++) |
158
|
|
|
|
|
|
|
{ |
159
|
15392
|
|
|
|
|
|
ctx->IV[x] = tmp2[x]; |
160
|
|
|
|
|
|
|
} |
161
|
1924
|
|
|
|
|
|
ct += RC2_BLOCKLEN; |
162
|
1924
|
|
|
|
|
|
pt += RC2_BLOCKLEN; |
163
|
|
|
|
|
|
|
} |
164
|
14
|
|
|
|
|
|
memset(tmp, 0x0, sizeof(tmp)); |
165
|
14
|
|
|
|
|
|
memset(tmp2, 0x0, sizeof(tmp2)); |
166
|
|
|
|
|
|
|
|
167
|
14
|
|
|
|
|
|
return len; |
168
|
|
|
|
|
|
|
} |
169
|
|
|
|
|
|
|
|
170
|
|
|
|
|
|
|
/******************************************************************************/ |
171
|
|
|
|
|
|
|
/** |
172
|
|
|
|
|
|
|
Initialize the LTC_RC2 block cipher |
173
|
|
|
|
|
|
|
@param key The symmetric key you wish to pass |
174
|
|
|
|
|
|
|
@param keylen The key length in bytes |
175
|
|
|
|
|
|
|
@param num_rounds The number of rounds desired (0 for default) |
176
|
|
|
|
|
|
|
@param skey The key in as scheduled by this function. |
177
|
|
|
|
|
|
|
@return CRYPT_OK if successful |
178
|
|
|
|
|
|
|
*/ |
179
|
14
|
|
|
|
|
|
static int32_t psRc2InitKey(const unsigned char *key, uint8_t keylen, |
180
|
|
|
|
|
|
|
uint8_t num_rounds, psRc2Key_t *ctx) |
181
|
|
|
|
|
|
|
{ |
182
|
|
|
|
|
|
|
unsigned char tmp[128]; |
183
|
|
|
|
|
|
|
uint32_t *xkey; |
184
|
|
|
|
|
|
|
uint32_t T8, TM; |
185
|
|
|
|
|
|
|
int32_t i, bits; |
186
|
|
|
|
|
|
|
|
187
|
|
|
|
|
|
|
/* if (keylen < 8 || keylen > 128) { */ |
188
|
|
|
|
|
|
|
/* return PS_ARG_FAIL; */ |
189
|
|
|
|
|
|
|
/* } */ |
190
|
|
|
|
|
|
|
|
191
|
14
|
50
|
|
|
|
|
if (num_rounds != 0 && num_rounds != 16) |
|
|
0
|
|
|
|
|
|
192
|
|
|
|
|
|
|
{ |
193
|
0
|
|
|
|
|
|
return PS_ARG_FAIL; |
194
|
|
|
|
|
|
|
} |
195
|
|
|
|
|
|
|
|
196
|
14
|
|
|
|
|
|
xkey = ctx->xkey; |
197
|
84
|
100
|
|
|
|
|
for (i = 0; i < (int32) keylen; i++) |
198
|
|
|
|
|
|
|
{ |
199
|
70
|
|
|
|
|
|
tmp[i] = key[i] & 255; |
200
|
|
|
|
|
|
|
} |
201
|
|
|
|
|
|
|
|
202
|
|
|
|
|
|
|
/* Phase 1: Expand input key to 128 bytes */ |
203
|
14
|
50
|
|
|
|
|
if (keylen < 128) |
204
|
|
|
|
|
|
|
{ |
205
|
1736
|
100
|
|
|
|
|
for (i = keylen; i < 128; i++) |
206
|
|
|
|
|
|
|
{ |
207
|
1722
|
|
|
|
|
|
tmp[i] = permute[(tmp[i - 1] + tmp[i - keylen]) & 255]; |
208
|
|
|
|
|
|
|
} |
209
|
|
|
|
|
|
|
} |
210
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
/* Phase 2 - reduce effective key size to "bits" */ |
212
|
14
|
|
|
|
|
|
bits = keylen << 3; |
213
|
14
|
|
|
|
|
|
T8 = (uint32_t) (bits + 7) >> 3; |
214
|
14
|
|
|
|
|
|
TM = (255 >> (uint32_t) (7 & - bits)); |
215
|
14
|
|
|
|
|
|
tmp[128 - T8] = permute[tmp[128 - T8] & TM]; |
216
|
1736
|
100
|
|
|
|
|
for (i = 127 - T8; i >= 0; i--) |
217
|
|
|
|
|
|
|
{ |
218
|
1722
|
|
|
|
|
|
tmp[i] = permute[tmp[i + 1] ^ tmp[i + T8]]; |
219
|
|
|
|
|
|
|
} |
220
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
/* Phase 3 - copy to xkey in little-endian order */ |
222
|
910
|
100
|
|
|
|
|
for (i = 0; i < 64; i++) |
223
|
|
|
|
|
|
|
{ |
224
|
896
|
|
|
|
|
|
xkey[i] = (uint32_t) tmp[2 * i] + ((uint32_t) tmp[2 * i + 1] << 8); |
225
|
|
|
|
|
|
|
} |
226
|
|
|
|
|
|
|
|
227
|
14
|
|
|
|
|
|
return PS_SUCCESS; |
228
|
|
|
|
|
|
|
} |
229
|
|
|
|
|
|
|
|
230
|
|
|
|
|
|
|
/******************************************************************************/ |
231
|
|
|
|
|
|
|
/** |
232
|
|
|
|
|
|
|
Encrypts a block of text with LTC_RC2 |
233
|
|
|
|
|
|
|
@param pt The input plaintext (8 bytes) |
234
|
|
|
|
|
|
|
@param ct The output ciphertext (8 bytes) |
235
|
|
|
|
|
|
|
@param skey The key as scheduled |
236
|
|
|
|
|
|
|
@return CRYPT_OK if successful |
237
|
|
|
|
|
|
|
*/ |
238
|
0
|
|
|
|
|
|
static void psRc2EncryptBlock(const unsigned char *pt, unsigned char *ct, |
239
|
|
|
|
|
|
|
psRc2Key_t *ctx) |
240
|
|
|
|
|
|
|
{ |
241
|
|
|
|
|
|
|
uint32_t *xkey; |
242
|
|
|
|
|
|
|
uint32_t x76, x54, x32, x10, i; |
243
|
|
|
|
|
|
|
|
244
|
0
|
|
|
|
|
|
xkey = ctx->xkey; |
245
|
0
|
|
|
|
|
|
x76 = ((uint32_t) pt[7] << 8) + (uint32_t) pt[6]; |
246
|
0
|
|
|
|
|
|
x54 = ((uint32_t) pt[5] << 8) + (uint32_t) pt[4]; |
247
|
0
|
|
|
|
|
|
x32 = ((uint32_t) pt[3] << 8) + (uint32_t) pt[2]; |
248
|
0
|
|
|
|
|
|
x10 = ((uint32_t) pt[1] << 8) + (uint32_t) pt[0]; |
249
|
|
|
|
|
|
|
|
250
|
0
|
0
|
|
|
|
|
for (i = 0; i < 16; i++) |
251
|
|
|
|
|
|
|
{ |
252
|
0
|
|
|
|
|
|
x10 = (x10 + (x32 & ~x76) + (x54 & x76) + xkey[4 * i + 0]) & 0xFFFF; |
253
|
0
|
|
|
|
|
|
x10 = ((x10 << 1) | (x10 >> 15)); |
254
|
|
|
|
|
|
|
|
255
|
0
|
|
|
|
|
|
x32 = (x32 + (x54 & ~x10) + (x76 & x10) + xkey[4 * i + 1]) & 0xFFFF; |
256
|
0
|
|
|
|
|
|
x32 = ((x32 << 2) | (x32 >> 14)); |
257
|
|
|
|
|
|
|
|
258
|
0
|
|
|
|
|
|
x54 = (x54 + (x76 & ~x32) + (x10 & x32) + xkey[4 * i + 2]) & 0xFFFF; |
259
|
0
|
|
|
|
|
|
x54 = ((x54 << 3) | (x54 >> 13)); |
260
|
|
|
|
|
|
|
|
261
|
0
|
|
|
|
|
|
x76 = (x76 + (x10 & ~x54) + (x32 & x54) + xkey[4 * i + 3]) & 0xFFFF; |
262
|
0
|
|
|
|
|
|
x76 = ((x76 << 5) | (x76 >> 11)); |
263
|
|
|
|
|
|
|
|
264
|
0
|
0
|
|
|
|
|
if (i == 4 || i == 10) |
|
|
0
|
|
|
|
|
|
265
|
|
|
|
|
|
|
{ |
266
|
0
|
|
|
|
|
|
x10 = (x10 + xkey[x76 & 63]) & 0xFFFF; |
267
|
0
|
|
|
|
|
|
x32 = (x32 + xkey[x10 & 63]) & 0xFFFF; |
268
|
0
|
|
|
|
|
|
x54 = (x54 + xkey[x32 & 63]) & 0xFFFF; |
269
|
0
|
|
|
|
|
|
x76 = (x76 + xkey[x54 & 63]) & 0xFFFF; |
270
|
|
|
|
|
|
|
} |
271
|
|
|
|
|
|
|
} |
272
|
|
|
|
|
|
|
|
273
|
0
|
|
|
|
|
|
ct[0] = (unsigned char) x10; |
274
|
0
|
|
|
|
|
|
ct[1] = (unsigned char) (x10 >> 8); |
275
|
0
|
|
|
|
|
|
ct[2] = (unsigned char) x32; |
276
|
0
|
|
|
|
|
|
ct[3] = (unsigned char) (x32 >> 8); |
277
|
0
|
|
|
|
|
|
ct[4] = (unsigned char) x54; |
278
|
0
|
|
|
|
|
|
ct[5] = (unsigned char) (x54 >> 8); |
279
|
0
|
|
|
|
|
|
ct[6] = (unsigned char) x76; |
280
|
0
|
|
|
|
|
|
ct[7] = (unsigned char) (x76 >> 8); |
281
|
0
|
|
|
|
|
|
} |
282
|
|
|
|
|
|
|
|
283
|
|
|
|
|
|
|
/******************************************************************************/ |
284
|
|
|
|
|
|
|
/** |
285
|
|
|
|
|
|
|
Decrypts a block of text with LTC_RC2 |
286
|
|
|
|
|
|
|
@param ct The input ciphertext (8 bytes) |
287
|
|
|
|
|
|
|
@param pt The output plaintext (8 bytes) |
288
|
|
|
|
|
|
|
@param skey The key as scheduled |
289
|
|
|
|
|
|
|
@return CRYPT_OK if successful |
290
|
|
|
|
|
|
|
*/ |
291
|
1924
|
|
|
|
|
|
static void psRc2DecryptBlock(const unsigned char *ct, unsigned char *pt, |
292
|
|
|
|
|
|
|
psRc2Key_t *ctx) |
293
|
|
|
|
|
|
|
{ |
294
|
|
|
|
|
|
|
uint32_t x76, x54, x32, x10; |
295
|
|
|
|
|
|
|
uint32_t *xkey; |
296
|
|
|
|
|
|
|
int i; |
297
|
|
|
|
|
|
|
|
298
|
1924
|
|
|
|
|
|
xkey = ctx->xkey; |
299
|
|
|
|
|
|
|
|
300
|
1924
|
|
|
|
|
|
x76 = ((uint32_t) ct[7] << 8) + (uint32_t) ct[6]; |
301
|
1924
|
|
|
|
|
|
x54 = ((uint32_t) ct[5] << 8) + (uint32_t) ct[4]; |
302
|
1924
|
|
|
|
|
|
x32 = ((uint32_t) ct[3] << 8) + (uint32_t) ct[2]; |
303
|
1924
|
|
|
|
|
|
x10 = ((uint32_t) ct[1] << 8) + (uint32_t) ct[0]; |
304
|
|
|
|
|
|
|
|
305
|
32708
|
100
|
|
|
|
|
for (i = 15; i >= 0; i--) |
306
|
|
|
|
|
|
|
{ |
307
|
30784
|
100
|
|
|
|
|
if (i == 4 || i == 10) |
|
|
100
|
|
|
|
|
|
308
|
|
|
|
|
|
|
{ |
309
|
3848
|
|
|
|
|
|
x76 = (x76 - xkey[x54 & 63]) & 0xFFFF; |
310
|
3848
|
|
|
|
|
|
x54 = (x54 - xkey[x32 & 63]) & 0xFFFF; |
311
|
3848
|
|
|
|
|
|
x32 = (x32 - xkey[x10 & 63]) & 0xFFFF; |
312
|
3848
|
|
|
|
|
|
x10 = (x10 - xkey[x76 & 63]) & 0xFFFF; |
313
|
|
|
|
|
|
|
} |
314
|
|
|
|
|
|
|
|
315
|
30784
|
|
|
|
|
|
x76 = ((x76 << 11) | (x76 >> 5)); |
316
|
30784
|
|
|
|
|
|
x76 = (x76 - ((x10 & ~x54) + (x32 & x54) + xkey[4 * i + 3])) & 0xFFFF; |
317
|
|
|
|
|
|
|
|
318
|
30784
|
|
|
|
|
|
x54 = ((x54 << 13) | (x54 >> 3)); |
319
|
30784
|
|
|
|
|
|
x54 = (x54 - ((x76 & ~x32) + (x10 & x32) + xkey[4 * i + 2])) & 0xFFFF; |
320
|
|
|
|
|
|
|
|
321
|
30784
|
|
|
|
|
|
x32 = ((x32 << 14) | (x32 >> 2)); |
322
|
30784
|
|
|
|
|
|
x32 = (x32 - ((x54 & ~x10) + (x76 & x10) + xkey[4 * i + 1])) & 0xFFFF; |
323
|
|
|
|
|
|
|
|
324
|
30784
|
|
|
|
|
|
x10 = ((x10 << 15) | (x10 >> 1)); |
325
|
30784
|
|
|
|
|
|
x10 = (x10 - ((x32 & ~x76) + (x54 & x76) + xkey[4 * i + 0])) & 0xFFFF; |
326
|
|
|
|
|
|
|
} |
327
|
|
|
|
|
|
|
|
328
|
1924
|
|
|
|
|
|
pt[0] = (unsigned char) x10; |
329
|
1924
|
|
|
|
|
|
pt[1] = (unsigned char) (x10 >> 8); |
330
|
1924
|
|
|
|
|
|
pt[2] = (unsigned char) x32; |
331
|
1924
|
|
|
|
|
|
pt[3] = (unsigned char) (x32 >> 8); |
332
|
1924
|
|
|
|
|
|
pt[4] = (unsigned char) x54; |
333
|
1924
|
|
|
|
|
|
pt[5] = (unsigned char) (x54 >> 8); |
334
|
1924
|
|
|
|
|
|
pt[6] = (unsigned char) x76; |
335
|
1924
|
|
|
|
|
|
pt[7] = (unsigned char) (x76 >> 8); |
336
|
1924
|
|
|
|
|
|
} |
337
|
|
|
|
|
|
|
|
338
|
|
|
|
|
|
|
#endif /* USE_RC2 */ |
339
|
|
|
|
|
|
|
|
340
|
|
|
|
|
|
|
/******************************************************************************/ |
341
|
|
|
|
|
|
|
|