]>
Commit | Line | Data |
---|---|---|
20f9a2a1 M |
1 | /* crypto1.c |
2 | ||
9cefee6f | 3 | This program is free software; you can redistribute it and/or |
4 | modify it under the terms of the GNU General Public License | |
5 | as published by the Free Software Foundation; either version 2 | |
6 | of the License, or (at your option) any later version. | |
7 | ||
8 | This program is distributed in the hope that it will be useful, | |
9 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
10 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
11 | GNU General Public License for more details. | |
12 | ||
13 | You should have received a copy of the GNU General Public License | |
14 | along with this program; if not, write to the Free Software | |
15 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, | |
16 | MA 02110-1301, US | |
17 | ||
18 | Copyright (C) 2008-2008 bla <blapost@gmail.com> | |
20f9a2a1 M |
19 | */ |
20 | #include "crapto1.h" | |
21 | #include <stdlib.h> | |
22 | ||
20f9a2a1 M |
23 | void crypto1_create(struct Crypto1State *s, uint64_t key) |
24 | { | |
25 | // struct Crypto1State *s = malloc(sizeof(*s)); | |
26 | int i; | |
27 | ||
28 | for(i = 47;s && i > 0; i -= 2) { | |
29 | s->odd = s->odd << 1 | BIT(key, (i - 1) ^ 7); | |
30 | s->even = s->even << 1 | BIT(key, i ^ 7); | |
31 | } | |
20f9a2a1 M |
32 | } |
33 | void crypto1_destroy(struct Crypto1State *state) | |
34 | { | |
35 | // free(state); | |
9cefee6f | 36 | state->odd = 0; |
37 | state->even = 0; | |
20f9a2a1 M |
38 | } |
39 | void crypto1_get_lfsr(struct Crypto1State *state, uint64_t *lfsr) | |
40 | { | |
41 | int i; | |
42 | for(*lfsr = 0, i = 23; i >= 0; --i) { | |
43 | *lfsr = *lfsr << 1 | BIT(state->odd, i ^ 3); | |
44 | *lfsr = *lfsr << 1 | BIT(state->even, i ^ 3); | |
45 | } | |
46 | } | |
47 | uint8_t crypto1_bit(struct Crypto1State *s, uint8_t in, int is_encrypted) | |
48 | { | |
49 | uint32_t feedin; | |
9cefee6f | 50 | uint32_t tmp; |
20f9a2a1 M |
51 | uint8_t ret = filter(s->odd); |
52 | ||
53 | feedin = ret & !!is_encrypted; | |
54 | feedin ^= !!in; | |
55 | feedin ^= LF_POLY_ODD & s->odd; | |
56 | feedin ^= LF_POLY_EVEN & s->even; | |
57 | s->even = s->even << 1 | parity(feedin); | |
58 | ||
9cefee6f | 59 | tmp = s->odd; |
60 | s->odd = s->even; | |
61 | s->even = tmp; | |
20f9a2a1 M |
62 | |
63 | return ret; | |
64 | } | |
65 | uint8_t crypto1_byte(struct Crypto1State *s, uint8_t in, int is_encrypted) | |
66 | { | |
c2d2a5a6 | 67 | /* |
20f9a2a1 M |
68 | uint8_t i, ret = 0; |
69 | ||
70 | for (i = 0; i < 8; ++i) | |
71 | ret |= crypto1_bit(s, BIT(in, i), is_encrypted) << i; | |
c2d2a5a6 | 72 | */ |
73 | // unfold loop 20161012 | |
74 | uint8_t ret = 0; | |
75 | ret |= crypto1_bit(s, BIT(in, 0), is_encrypted) << 0; | |
76 | ret |= crypto1_bit(s, BIT(in, 1), is_encrypted) << 1; | |
77 | ret |= crypto1_bit(s, BIT(in, 2), is_encrypted) << 2; | |
78 | ret |= crypto1_bit(s, BIT(in, 3), is_encrypted) << 3; | |
79 | ret |= crypto1_bit(s, BIT(in, 4), is_encrypted) << 4; | |
80 | ret |= crypto1_bit(s, BIT(in, 5), is_encrypted) << 5; | |
81 | ret |= crypto1_bit(s, BIT(in, 6), is_encrypted) << 6; | |
82 | ret |= crypto1_bit(s, BIT(in, 7), is_encrypted) << 7; | |
20f9a2a1 M |
83 | return ret; |
84 | } | |
85 | uint32_t crypto1_word(struct Crypto1State *s, uint32_t in, int is_encrypted) | |
86 | { | |
c2d2a5a6 | 87 | /* |
20f9a2a1 M |
88 | uint32_t i, ret = 0; |
89 | ||
90 | for (i = 0; i < 32; ++i) | |
91 | ret |= crypto1_bit(s, BEBIT(in, i), is_encrypted) << (i ^ 24); | |
c2d2a5a6 | 92 | */ |
93 | //unfold loop 2016012 | |
94 | uint32_t ret = 0; | |
95 | ret |= crypto1_bit(s, BEBIT(in, 0), is_encrypted) << (0 ^ 24); | |
96 | ret |= crypto1_bit(s, BEBIT(in, 1), is_encrypted) << (1 ^ 24); | |
97 | ret |= crypto1_bit(s, BEBIT(in, 2), is_encrypted) << (2 ^ 24); | |
98 | ret |= crypto1_bit(s, BEBIT(in, 3), is_encrypted) << (3 ^ 24); | |
99 | ret |= crypto1_bit(s, BEBIT(in, 4), is_encrypted) << (4 ^ 24); | |
100 | ret |= crypto1_bit(s, BEBIT(in, 5), is_encrypted) << (5 ^ 24); | |
101 | ret |= crypto1_bit(s, BEBIT(in, 6), is_encrypted) << (6 ^ 24); | |
102 | ret |= crypto1_bit(s, BEBIT(in, 7), is_encrypted) << (7 ^ 24); | |
103 | ||
104 | ret |= crypto1_bit(s, BEBIT(in, 8), is_encrypted) << (8 ^ 24); | |
105 | ret |= crypto1_bit(s, BEBIT(in, 9), is_encrypted) << (9 ^ 24); | |
106 | ret |= crypto1_bit(s, BEBIT(in, 10), is_encrypted) << (10 ^ 24); | |
107 | ret |= crypto1_bit(s, BEBIT(in, 11), is_encrypted) << (11 ^ 24); | |
108 | ret |= crypto1_bit(s, BEBIT(in, 12), is_encrypted) << (12 ^ 24); | |
109 | ret |= crypto1_bit(s, BEBIT(in, 13), is_encrypted) << (13 ^ 24); | |
110 | ret |= crypto1_bit(s, BEBIT(in, 14), is_encrypted) << (14 ^ 24); | |
111 | ret |= crypto1_bit(s, BEBIT(in, 15), is_encrypted) << (15 ^ 24); | |
112 | ||
113 | ret |= crypto1_bit(s, BEBIT(in, 16), is_encrypted) << (16 ^ 24); | |
114 | ret |= crypto1_bit(s, BEBIT(in, 17), is_encrypted) << (17 ^ 24); | |
115 | ret |= crypto1_bit(s, BEBIT(in, 18), is_encrypted) << (18 ^ 24); | |
116 | ret |= crypto1_bit(s, BEBIT(in, 19), is_encrypted) << (19 ^ 24); | |
117 | ret |= crypto1_bit(s, BEBIT(in, 20), is_encrypted) << (20 ^ 24); | |
118 | ret |= crypto1_bit(s, BEBIT(in, 21), is_encrypted) << (21 ^ 24); | |
119 | ret |= crypto1_bit(s, BEBIT(in, 22), is_encrypted) << (22 ^ 24); | |
120 | ret |= crypto1_bit(s, BEBIT(in, 23), is_encrypted) << (23 ^ 24); | |
121 | ||
122 | ret |= crypto1_bit(s, BEBIT(in, 24), is_encrypted) << (24 ^ 24); | |
123 | ret |= crypto1_bit(s, BEBIT(in, 25), is_encrypted) << (25 ^ 24); | |
124 | ret |= crypto1_bit(s, BEBIT(in, 26), is_encrypted) << (26 ^ 24); | |
125 | ret |= crypto1_bit(s, BEBIT(in, 27), is_encrypted) << (27 ^ 24); | |
126 | ret |= crypto1_bit(s, BEBIT(in, 28), is_encrypted) << (28 ^ 24); | |
127 | ret |= crypto1_bit(s, BEBIT(in, 29), is_encrypted) << (29 ^ 24); | |
128 | ret |= crypto1_bit(s, BEBIT(in, 30), is_encrypted) << (30 ^ 24); | |
129 | ret |= crypto1_bit(s, BEBIT(in, 31), is_encrypted) << (31 ^ 24); | |
20f9a2a1 M |
130 | return ret; |
131 | } | |
132 | ||
133 | /* prng_successor | |
134 | * helper used to obscure the keystream during authentication | |
135 | */ | |
136 | uint32_t prng_successor(uint32_t x, uint32_t n) | |
137 | { | |
138 | SWAPENDIAN(x); | |
139 | while(n--) | |
140 | x = x >> 1 | (x >> 16 ^ x >> 18 ^ x >> 19 ^ x >> 21) << 31; | |
141 | ||
142 | return SWAPENDIAN(x); | |
143 | } |