3 #include "../../clib/passert.h" 12 unsigned char P8x8[2][256] = {
13 {0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76, 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1,
14 0x38, 0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C, 0x43, 0x75, 0x37, 0x26, 0xFA, 0x13,
15 0x94, 0x48, 0xF2, 0xD0, 0x8B, 0x30, 0x84, 0x54, 0xDF, 0x23, 0x19, 0x5B, 0x3D, 0x59, 0xF3,
16 0xAE, 0xA2, 0x82, 0x63, 0x01, 0x83, 0x2E, 0xD9, 0x51, 0x9B, 0x7C, 0xA6, 0xEB, 0xA5, 0xBE,
17 0x16, 0x0C, 0xE3, 0x61, 0xC0, 0x8C, 0x3A, 0xF5, 0x73, 0x2C, 0x25, 0x0B, 0xBB, 0x4E, 0x89,
18 0x6B, 0x53, 0x6A, 0xB4, 0xF1, 0xE1, 0xE6, 0xBD, 0x45, 0xE2, 0xF4, 0xB6, 0x66, 0xCC, 0x95,
19 0x03, 0x56, 0xD4, 0x1C, 0x1E, 0xD7, 0xFB, 0xC3, 0x8E, 0xB5, 0xE9, 0xCF, 0xBF, 0xBA, 0xEA,
20 0x77, 0x39, 0xAF, 0x33, 0xC9, 0x62, 0x71, 0x81, 0x79, 0x09, 0xAD, 0x24, 0xCD, 0xF9, 0xD8,
21 0xE5, 0xC5, 0xB9, 0x4D, 0x44, 0x08, 0x86, 0xE7, 0xA1, 0x1D, 0xAA, 0xED, 0x06, 0x70, 0xB2,
22 0xD2, 0x41, 0x7B, 0xA0, 0x11, 0x31, 0xC2, 0x27, 0x90, 0x20, 0xF6, 0x60, 0xFF, 0x96, 0x5C,
23 0xB1, 0xAB, 0x9E, 0x9C, 0x52, 0x1B, 0x5F, 0x93, 0x0A, 0xEF, 0x91, 0x85, 0x49, 0xEE, 0x2D,
24 0x4F, 0x8F, 0x3B, 0x47, 0x87, 0x6D, 0x46, 0xD6, 0x3E, 0x69, 0x64, 0x2A, 0xCE, 0xCB, 0x2F,
25 0xFC, 0x97, 0x05, 0x7A, 0xAC, 0x7F, 0xD5, 0x1A, 0x4B, 0x0E, 0xA7, 0x5A, 0x28, 0x14, 0x3F,
26 0x29, 0x88, 0x3C, 0x4C, 0x02, 0xB8, 0xDA, 0xB0, 0x17, 0x55, 0x1F, 0x8A, 0x7D, 0x57, 0xC7,
27 0x8D, 0x74, 0xB7, 0xC4, 0x9F, 0x72, 0x7E, 0x15, 0x22, 0x12, 0x58, 0x07, 0x99, 0x34, 0x6E,
28 0x50, 0xDE, 0x68, 0x65, 0xBC, 0xDB, 0xF8, 0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4,
29 0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00, 0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1,
31 {0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8, 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8,
32 0x4B, 0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1, 0x30, 0x0F, 0xF8, 0x1B, 0x87, 0xFA,
33 0x06, 0x3F, 0x5E, 0xBA, 0xAE, 0x5B, 0x8A, 0x00, 0xBC, 0x9D, 0x6D, 0xC1, 0xB1, 0x0E, 0x80,
34 0x5D, 0xD2, 0xD5, 0xA0, 0x84, 0x07, 0x14, 0xB5, 0x90, 0x2C, 0xA3, 0xB2, 0x73, 0x4C, 0x54,
35 0x92, 0x74, 0x36, 0x51, 0x38, 0xB0, 0xBD, 0x5A, 0xFC, 0x60, 0x62, 0x96, 0x6C, 0x42, 0xF7,
36 0x10, 0x7C, 0x28, 0x27, 0x8C, 0x13, 0x95, 0x9C, 0xC7, 0x24, 0x46, 0x3B, 0x70, 0xCA, 0xE3,
37 0x85, 0xCB, 0x11, 0xD0, 0x93, 0xB8, 0xA6, 0x83, 0x20, 0xFF, 0x9F, 0x77, 0xC3, 0xCC, 0x03,
38 0x6F, 0x08, 0xBF, 0x40, 0xE7, 0x2B, 0xE2, 0x79, 0x0C, 0xAA, 0x82, 0x41, 0x3A, 0xEA, 0xB9,
39 0xE4, 0x9A, 0xA4, 0x97, 0x7E, 0xDA, 0x7A, 0x17, 0x66, 0x94, 0xA1, 0x1D, 0x3D, 0xF0, 0xDE,
40 0xB3, 0x0B, 0x72, 0xA7, 0x1C, 0xEF, 0xD1, 0x53, 0x3E, 0x8F, 0x33, 0x26, 0x5F, 0xEC, 0x76,
41 0x2A, 0x49, 0x81, 0x88, 0xEE, 0x21, 0xC4, 0x1A, 0xEB, 0xD9, 0xC5, 0x39, 0x99, 0xCD, 0xAD,
42 0x31, 0x8B, 0x01, 0x18, 0x23, 0xDD, 0x1F, 0x4E, 0x2D, 0xF9, 0x48, 0x4F, 0xF2, 0x65, 0x8E,
43 0x78, 0x5C, 0x58, 0x19, 0x8D, 0xE5, 0x98, 0x57, 0x67, 0x7F, 0x05, 0x64, 0xAF, 0x63, 0xB6,
44 0xFE, 0xF5, 0xB7, 0x3C, 0xA5, 0xCE, 0xE9, 0x68, 0x44, 0xE0, 0x4D, 0x43, 0x69, 0x29, 0x2E,
45 0xAC, 0x15, 0x59, 0xA8, 0x0A, 0x9E, 0x6E, 0x47, 0xDF, 0x34, 0x35, 0x6A, 0xCF, 0xDC, 0x22,
46 0xC9, 0xC0, 0x9B, 0x89, 0xD4, 0xED, 0xAB, 0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9,
47 0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2, 0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE,
54 memset( &
ki, 0,
sizeof(
ki ) );
55 memset( &
ci, 0,
sizeof(
ci ) );
65 memcpy( &
seed, gseed, 4 );
67 unsigned char tmpBuff[0x100];
84 for (
int i = 0; i < 256; i++ )
96 unsigned char tmpBuff[0x100];
98 for (
int i = 0; i < len; i++ )
117 for (
int i = r = 0; i < 2; i++ )
119 r ^= ( i ) ? k0 : k1;
120 for (
int j = 0; j < 4; j++ )
127 unsigned int TwoFish::F32(
unsigned int x,
unsigned int* k32,
int keyLen )
131 *( (
unsigned int*)b ) =
Bswap( x );
132 switch ( ( ( keyLen + 63 ) / 64 ) & 3 )
135 b[0] =
p8( 04 )[b[0]] ^
_b( k32[3], 0 );
136 b[1] =
p8( 14 )[b[1]] ^
_b( k32[3], 1 );
137 b[2] =
p8( 24 )[b[2]] ^
_b( k32[3], 2 );
138 b[3] =
p8( 34 )[b[3]] ^
_b( k32[3], 3 );
141 b[0] =
p8( 03 )[b[0]] ^
_b( k32[2], 0 );
142 b[1] =
p8( 13 )[b[1]] ^
_b( k32[2], 1 );
143 b[2] =
p8( 23 )[b[2]] ^
_b( k32[2], 2 );
144 b[3] =
p8( 33 )[b[3]] ^
_b( k32[2], 3 );
147 b[0] =
p8( 00 )[
p8( 01 )[
p8( 02 )[b[0]] ^
_b( k32[1], 0 )] ^
_b( k32[0], 0 )];
148 b[1] =
p8( 10 )[
p8( 11 )[
p8( 12 )[b[1]] ^
_b( k32[1], 1 )] ^
_b( k32[0], 1 )];
149 b[2] =
p8( 20 )[
p8( 21 )[
p8( 22 )[b[2]] ^
_b( k32[1], 2 )] ^
_b( k32[0], 2 )];
150 b[3] =
p8( 30 )[
p8( 31 )[
p8( 32 )[b[3]] ^
_b( k32[1], 3 )] ^
_b( k32[0], 3 )];
153 return ( (
M00( b[0] ) ^
M01( b[1] ) ^
M02( b[2] ) ^
M03( b[3] ) ) ) ^
154 ( (
M10( b[0] ) ^
M11( b[1] ) ^
M12( b[2] ) ^
M13( b[3] ) ) << 8 ) ^
155 ( (
M20( b[0] ) ^
M21( b[1] ) ^
M22( b[2] ) ^
M23( b[3] ) ) << 16 ) ^
156 ( (
M30( b[0] ) ^
M31( b[1] ) ^
M32( b[2] ) ^
M33( b[3] ) ) << 24 );
163 unsigned int k32e[4], k32o[4];
164 unsigned int A = 0, B = 0;
166 int k64Cnt = ( keyLen + 63 ) / 64;
168 for (
int i = 0; i < k64Cnt; i++ )
170 k32e[i] = key->
key32[2 * i];
171 k32o[i] = key->
key32[2 * i + 1];
175 for (
int i = 0; i < subkeyCnt / 2; i++ )
177 A =
F32( i * 0x02020202u, k32e, keyLen );
178 B =
F32( i * 0x02020202u + 0x01010101u, k32o, keyLen );
181 key->
subKeys[2 * i + 1] =
ROL( A + 2 * B, 9 );
189 if ( ( mode != 1 ) && ( IV ) )
191 for (
int i = 0; i < 4; i++ )
192 ( (
unsigned int*)cipher->
IV )[i] =
Bswap( cipher->
iv32[i] );
200 passert_r( keyMaterial ==
nullptr,
"User supplied key-material is not implemented" );
205 key->
keyLen = ( keyLen + 63 ) & ~63;
208 for (
int i = 0; i < 8; i++ )
215 int inputLen,
unsigned char* outBuffer )
219 unsigned int t0, t1, tmp;
220 unsigned char bit = 0, ctBit = 0, carry = 0;
222 if ( cipher->
mode == 3 )
225 for (
int n = 0; n < inputLen; n++ )
228 bit = 0x80 >> ( n & 7 );
229 ctBit = ( input[n / 8] & bit ) ^ ( ( ( (
unsigned char*)x )[0] & 0x80 ) >> ( n & 7 ) );
230 outBuffer[n / 8] = ( outBuffer[n / 8] & ~bit ) | ctBit;
231 carry = ctBit >> ( 7 - ( n & 7 ) );
232 for (
int i = 15; i >= 0; i-- )
234 bit = cipher->
IV[i] >> 7;
235 cipher->
IV[i] = ( cipher->
IV[i] << 1 ) ^ carry;
243 for (
int n = 0; n < inputLen; n += 128, input += 16, outBuffer += 16 )
245 for (
int i = 0; i < 4; i++ )
247 x[i] =
Bswap( ( (
unsigned int*)input )[i] ) ^ key->
subKeys[i];
248 if ( cipher->
mode == 2 )
249 x[i] ^= cipher->
iv32[i];
252 for (
int r = 0; r < rounds; r++ )
257 x[3] =
ROL( x[3], 1 );
258 x[2] ^= t0 + t1 + key->
subKeys[8 + 2 * r];
259 x[3] ^= t0 + 2 * t1 + key->
subKeys[8 + 2 * r + 1];
260 x[2] =
ROR( x[2], 1 );
262 if ( r < rounds - 1 )
273 for (
int i = 0; i < 4; i++ )
275 ( (
unsigned int*)outBuffer )[i] =
Bswap( x[i] ^ key->
subKeys[4 + i] );
276 if ( cipher->
mode == 2 )
277 cipher->
iv32[i] =
Bswap( ( (
unsigned int*)outBuffer )[i] );
unsigned char P8x8[2][256]
unsigned char subData3[256]
static void BlockEncrypt(CipherInstance *cipher, KeyInstance *key, unsigned char *input, int inputLen, unsigned char *outBuffer)
#define passert_r(exp, reason)
static void CipherInit(CipherInstance *cipher, unsigned char mode, char *IV)
unsigned char tabUsed[256]
static unsigned int RS_MDS_Encode(unsigned int k0, unsigned int k1)
void MakeKey(KeyInstance *key, unsigned char direction, int keyLen, char *keyMaterial)
static unsigned int F32(unsigned int x, unsigned int *k32, int keyLen)
static void ReKey(KeyInstance *key)
void Decrypt(unsigned char *in, unsigned char *out, int len)
void Init(unsigned char *gseed)