Mercurial > pt1.oyama
view arib25/src/multi2.c @ 65:c701bbc532b4
fixed indentation
author | Yoshiki Yazawa <yaz@honeyplanet.jp> |
---|---|
date | Thu, 22 Oct 2009 02:26:03 +0900 |
parents | 41a5481db56f |
children |
line wrap: on
line source
#include <stdlib.h> #include <string.h> #include "multi2.h" #include "multi2_error_code.h" /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ inline functions ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ static __inline uint8_t *load_be_uint32(uint32_t *dst, uint8_t *src) { *dst = ((src[0]<<24)|(src[1]<<16)|(src[2]<<8)|src[3]); return src+4; } static __inline uint8_t *save_be_uint32(uint8_t *dst, uint32_t src) { dst[0] = (uint8_t)((src>>24) & 0xff); dst[1] = (uint8_t)((src>>16) & 0xff); dst[2] = (uint8_t)((src>> 8) & 0xff); dst[3] = (uint8_t)( src & 0xff); return dst+4; } static __inline uint32_t left_rotate_uint32(uint32_t val, uint32_t count) { return ((val << count) | (val >> (32-count))); } /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ inner structures ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ typedef struct { uint32_t key[8]; } CORE_PARAM; typedef struct { uint32_t l; uint32_t r; } CORE_DATA; typedef struct { int32_t ref_count; CORE_DATA cbc_init; CORE_PARAM sys; CORE_DATA scr[2]; /* 0: odd, 1: even */ CORE_PARAM wrk[2]; /* 0: odd, 1: even */ uint32_t round; uint32_t state; } MULTI2_PRIVATE_DATA; /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ constant values ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ #define MULTI2_STATE_CBC_INIT_SET (0x0001) #define MULTI2_STATE_SYSTEM_KEY_SET (0x0002) #define MULTI2_STATE_SCRAMBLE_KEY_SET (0x0004) /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ function prottypes (interface method) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ static void release_multi2(void *m2); static int add_ref_multi2(void *m2); static int set_round_multi2(void *m2, int32_t val); static int set_system_key_multi2(void *m2, uint8_t *val); static int set_init_cbc_multi2(void *m2, uint8_t *val); static int set_scramble_key_multi2(void *m2, uint8_t *val); static int clear_scramble_key_multi2(void *m2); static int encrypt_multi2(void *m2, int32_t type, uint8_t *buf, int32_t size); static int decrypt_multi2(void *m2, int32_t type, uint8_t *buf, int32_t size); /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ global function implementation ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ MULTI2 *create_multi2() { int n; MULTI2 *r; MULTI2_PRIVATE_DATA *prv; n = sizeof(MULTI2_PRIVATE_DATA); n += sizeof(MULTI2); prv = (MULTI2_PRIVATE_DATA *)calloc(1, n); if(prv == NULL){ return NULL; } r = (MULTI2 *)(prv+1); r->private_data = prv; prv->ref_count = 1; prv->round = 4; r->release = release_multi2; r->add_ref = add_ref_multi2; r->set_round = set_round_multi2; r->set_system_key = set_system_key_multi2; r->set_init_cbc = set_init_cbc_multi2; r->set_scramble_key = set_scramble_key_multi2; r->clear_scramble_key = clear_scramble_key_multi2; r->encrypt = encrypt_multi2; r->decrypt = decrypt_multi2; return r; } /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ function prottypes (private method) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ static MULTI2_PRIVATE_DATA *private_data(void *m2); static void core_schedule(CORE_PARAM *work, CORE_PARAM *skey, CORE_DATA *dkey); static void core_encrypt(CORE_DATA *dst, CORE_DATA *src, CORE_PARAM *w, int32_t round); static void core_decrypt(CORE_DATA *dst, CORE_DATA *src, CORE_PARAM *w, int32_t round); static void core_pi1(CORE_DATA *dst, CORE_DATA *src); static void core_pi2(CORE_DATA *dst, CORE_DATA *src, uint32_t a); static void core_pi3(CORE_DATA *dst, CORE_DATA *src, uint32_t a, uint32_t b); static void core_pi4(CORE_DATA *dst, CORE_DATA *src, uint32_t a); /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ interface method implementation ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ static void release_multi2(void *m2) { MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if(prv == NULL){ /* do nothing */ return; } prv->ref_count -= 1; if(prv->ref_count == 0){ free(prv); } } static int add_ref_multi2(void *m2) { MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if(prv == NULL){ return MULTI2_ERROR_INVALID_PARAMETER; } prv->ref_count += 1; return 0; } static int set_round_multi2(void *m2, int32_t val) { MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if(prv == NULL){ /* do nothing */ return MULTI2_ERROR_INVALID_PARAMETER; } prv->round = val; return 0; } static int set_system_key_multi2(void *m2, uint8_t *val) { int i; uint8_t *p; MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if( (prv == NULL) || (val == NULL) ){ return MULTI2_ERROR_INVALID_PARAMETER; } p = val; for(i=0;i<8;i++){ p = load_be_uint32(prv->sys.key+i, p); } prv->state |= MULTI2_STATE_SYSTEM_KEY_SET; return 0; } static int set_init_cbc_multi2(void *m2, uint8_t *val) { uint8_t *p; MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if( (prv == NULL) || (val == NULL) ){ return MULTI2_ERROR_INVALID_PARAMETER; } p = val; p = load_be_uint32(&(prv->cbc_init.l), p); p = load_be_uint32(&(prv->cbc_init.r), p); prv->state |= MULTI2_STATE_CBC_INIT_SET; return 0; } static int set_scramble_key_multi2(void *m2, uint8_t *val) { uint8_t *p; MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if( (prv == NULL) || (val == NULL) ){ return MULTI2_ERROR_INVALID_PARAMETER; } p = val; p = load_be_uint32(&(prv->scr[0].l), p); p = load_be_uint32(&(prv->scr[0].r), p); p = load_be_uint32(&(prv->scr[1].l), p); p = load_be_uint32(&(prv->scr[1].r), p); core_schedule(prv->wrk+0, &(prv->sys), prv->scr+0); core_schedule(prv->wrk+1, &(prv->sys), prv->scr+1); prv->state |= MULTI2_STATE_SCRAMBLE_KEY_SET; return 0; } static int clear_scramble_key_multi2(void *m2) { MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if(prv == NULL){ return MULTI2_ERROR_INVALID_PARAMETER; } memset(prv->scr, 0, sizeof(prv->scr)); memset(prv->wrk, 0, sizeof(prv->wrk)); prv->state &= (~MULTI2_STATE_SCRAMBLE_KEY_SET); return 0; } static int encrypt_multi2(void *m2, int32_t type, uint8_t *buf, int32_t size) { CORE_DATA src,dst; CORE_PARAM *prm; uint8_t *p; MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if( (prv == NULL) || (buf == NULL) || (size < 1) ){ return MULTI2_ERROR_INVALID_PARAMETER; } if(prv->state != (MULTI2_STATE_CBC_INIT_SET|MULTI2_STATE_SYSTEM_KEY_SET|MULTI2_STATE_SCRAMBLE_KEY_SET)){ if( (prv->state & MULTI2_STATE_CBC_INIT_SET) == 0 ){ return MULTI2_ERROR_UNSET_CBC_INIT; } if( (prv->state & MULTI2_STATE_SYSTEM_KEY_SET) == 0 ){ return MULTI2_ERROR_UNSET_SYSTEM_KEY; } if( (prv->state & MULTI2_STATE_SCRAMBLE_KEY_SET) == 0 ){ return MULTI2_ERROR_UNSET_SCRAMBLE_KEY; } } if(type == 0x02){ prm = prv->wrk+1; }else{ prm = prv->wrk+0; } dst.l = prv->cbc_init.l; dst.r = prv->cbc_init.r; p = buf; while(size >= 8){ load_be_uint32(&(src.l), p+0); load_be_uint32(&(src.r), p+4); src.l = src.l ^ dst.l; src.r = src.r ^ dst.r; core_encrypt(&dst, &src, prm, prv->round); p = save_be_uint32(p, dst.l); p = save_be_uint32(p, dst.r); size -= 8; } if(size > 0){ int i; uint8_t tmp[8]; src.l = dst.l; src.r = dst.r; core_encrypt(&dst, &src, prm, prv->round); save_be_uint32(tmp+0, dst.l); save_be_uint32(tmp+4, dst.r); for(i=0;i<size;i++){ p[i] = (uint8_t)(p[i] ^ tmp[i]); } } return 0; } static int decrypt_multi2(void *m2, int32_t type, uint8_t *buf, int32_t size) { CORE_DATA src,dst,cbc; CORE_PARAM *prm; uint8_t *p; MULTI2_PRIVATE_DATA *prv; prv = private_data(m2); if( (prv == NULL) || (buf == NULL) || (size < 1) ){ return MULTI2_ERROR_INVALID_PARAMETER; } if(prv->state != (MULTI2_STATE_CBC_INIT_SET|MULTI2_STATE_SYSTEM_KEY_SET|MULTI2_STATE_SCRAMBLE_KEY_SET)){ if( (prv->state & MULTI2_STATE_CBC_INIT_SET) == 0 ){ return MULTI2_ERROR_UNSET_CBC_INIT; } if( (prv->state & MULTI2_STATE_SYSTEM_KEY_SET) == 0 ){ return MULTI2_ERROR_UNSET_SYSTEM_KEY; } if( (prv->state & MULTI2_STATE_SCRAMBLE_KEY_SET) == 0 ){ return MULTI2_ERROR_UNSET_SCRAMBLE_KEY; } } if(type == 0x02){ prm = prv->wrk+1; }else{ prm = prv->wrk+0; } cbc.l = prv->cbc_init.l; cbc.r = prv->cbc_init.r; p = buf; while(size >= 8){ load_be_uint32(&(src.l), p+0); load_be_uint32(&(src.r), p+4); core_decrypt(&dst, &src, prm, prv->round); dst.l = dst.l ^ cbc.l; dst.r = dst.r ^ cbc.r; cbc.l = src.l; cbc.r = src.r; p = save_be_uint32(p, dst.l); p = save_be_uint32(p, dst.r); size -= 8; } if(size > 0){ int i; uint8_t tmp[8]; core_encrypt(&dst, &cbc, prm, prv->round); save_be_uint32(tmp+0, dst.l); save_be_uint32(tmp+4, dst.r); for(i=0;i<size;i++){ p[i] = (uint8_t)(p[i] ^ tmp[i]); } } return 0; } /*+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ private method implementation ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/ static MULTI2_PRIVATE_DATA *private_data(void *m2) { MULTI2_PRIVATE_DATA *r; MULTI2 *p; p = (MULTI2 *)m2; if(p == NULL){ return NULL; } r = (MULTI2_PRIVATE_DATA *)(p->private_data); if( ((void *)(r+1)) != ((void *)p) ){ return NULL; } return r; } static void core_schedule(CORE_PARAM *work, CORE_PARAM *skey, CORE_DATA *dkey) { CORE_DATA b1,b2,b3,b4,b5,b6,b7,b8,b9; core_pi1(&b1, dkey); core_pi2(&b2, &b1, skey->key[0]); work->key[0] = b2.l; core_pi3(&b3, &b2, skey->key[1], skey->key[2]); work->key[1] = b3.r; core_pi4(&b4, &b3, skey->key[3]); work->key[2] = b4.l; core_pi1(&b5, &b4); work->key[3] = b5.r; core_pi2(&b6, &b5, skey->key[4]); work->key[4] = b6.l; core_pi3(&b7, &b6, skey->key[5], skey->key[6]); work->key[5] = b7.r; core_pi4(&b8, &b7, skey->key[7]); work->key[6] = b8.l; core_pi1(&b9, &b8); work->key[7] = b9.r; } static void core_encrypt(CORE_DATA *dst, CORE_DATA *src, CORE_PARAM *w, int32_t round) { int32_t i; CORE_DATA tmp; dst->l = src->l; dst->r = src->r; for(i=0;i<round;i++){ core_pi1(&tmp, dst); core_pi2( dst, &tmp, w->key[0]); core_pi3(&tmp, dst, w->key[1], w->key[2]); core_pi4( dst, &tmp, w->key[3]); core_pi1(&tmp, dst); core_pi2( dst, &tmp, w->key[4]); core_pi3(&tmp, dst, w->key[5], w->key[6]); core_pi4( dst, &tmp, w->key[7]); } } static void core_decrypt(CORE_DATA *dst, CORE_DATA *src, CORE_PARAM *w, int32_t round) { int32_t i; CORE_DATA tmp; dst->l = src->l; dst->r = src->r; for(i=0;i<round;i++){ core_pi4(&tmp, dst, w->key[7]); core_pi3( dst, &tmp, w->key[5], w->key[6]); core_pi2(&tmp, dst, w->key[4]); core_pi1( dst, &tmp); core_pi4(&tmp, dst, w->key[3]); core_pi3( dst, &tmp, w->key[1], w->key[2]); core_pi2(&tmp, dst, w->key[0]); core_pi1( dst, &tmp); } } static void core_pi1(CORE_DATA *dst, CORE_DATA *src) { dst->l = src->l; dst->r = src->r ^ src->l; } static void core_pi2(CORE_DATA *dst, CORE_DATA *src, uint32_t a) { uint32_t t0,t1,t2; t0 = src->r + a; t1 = left_rotate_uint32(t0, 1) + t0 - 1; t2 = left_rotate_uint32(t1, 4) ^ t1; dst->l = src->l ^ t2; dst->r = src->r; } static void core_pi3(CORE_DATA *dst, CORE_DATA *src, uint32_t a, uint32_t b) { uint32_t t0,t1,t2,t3,t4,t5; t0 = src->l + a; t1 = left_rotate_uint32(t0, 2) + t0 + 1; t2 = left_rotate_uint32(t1, 8) ^ t1; t3 = t2 + b; t4 = left_rotate_uint32(t3, 1) - t3; t5 = left_rotate_uint32(t4, 16) ^ (t4 | src->l); dst->l = src->l; dst->r = src->r ^ t5; } static void core_pi4(CORE_DATA *dst, CORE_DATA *src, uint32_t a) { uint32_t t0,t1; t0 = src->r + a; t1 = left_rotate_uint32(t0, 2) + t0 + 1; dst->l = src->l ^ t1; dst->r = src->r; }