You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

103 lines
3.4 KiB

12 years ago
  1. /*
  2. * rc4.c
  3. *
  4. * Copyright (c) 1996-2000 Whistle Communications, Inc.
  5. * All rights reserved.
  6. *
  7. * Subject to the following obligations and disclaimer of warranty, use and
  8. * redistribution of this software, in source or object code forms, with or
  9. * without modifications are expressly permitted by Whistle Communications;
  10. * provided, however, that:
  11. * 1. Any and all reproductions of the source or object code must include the
  12. * copyright notice above and the following disclaimer of warranties; and
  13. * 2. No rights are granted, in any manner or form, to use Whistle
  14. * Communications, Inc. trademarks, including the mark "WHISTLE
  15. * COMMUNICATIONS" on advertising, endorsements, or otherwise except as
  16. * such appears in the above copyright notice or in the software.
  17. *
  18. * THIS SOFTWARE IS BEING PROVIDED BY WHISTLE COMMUNICATIONS "AS IS", AND
  19. * TO THE MAXIMUM EXTENT PERMITTED BY LAW, WHISTLE COMMUNICATIONS MAKES NO
  20. * REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, REGARDING THIS SOFTWARE,
  21. * INCLUDING WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF
  22. * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
  23. * WHISTLE COMMUNICATIONS DOES NOT WARRANT, GUARANTEE, OR MAKE ANY
  24. * REPRESENTATIONS REGARDING THE USE OF, OR THE RESULTS OF THE USE OF THIS
  25. * SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY OR OTHERWISE.
  26. * IN NO EVENT SHALL WHISTLE COMMUNICATIONS BE LIABLE FOR ANY DAMAGES
  27. * RESULTING FROM OR ARISING OUT OF ANY USE OF THIS SOFTWARE, INCLUDING
  28. * WITHOUT LIMITATION, ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
  29. * PUNITIVE, OR CONSEQUENTIAL DAMAGES, PROCUREMENT OF SUBSTITUTE GOODS OR
  30. * SERVICES, LOSS OF USE, DATA OR PROFITS, HOWEVER CAUSED AND UNDER ANY
  31. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  32. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
  33. * THIS SOFTWARE, EVEN IF WHISTLE COMMUNICATIONS IS ADVISED OF THE POSSIBILITY
  34. * OF SUCH DAMAGE.
  35. *
  36. * $FreeBSD: src/sys/crypto/rc4/rc4.c,v 1.2.2.1 2000/04/18 04:48:31 archie Exp $
  37. */
  38. #include <stdint.h>
  39. #include "rc4.h"
  40. static inline void
  41. swap_bytes(u_char *a, u_char *b)
  42. {
  43. u_char temp;
  44. temp = *a;
  45. *a = *b;
  46. *b = temp;
  47. }
  48. /*
  49. * Initialize an RC4 state buffer using the supplied key,
  50. * which can have arbitrary length.
  51. */
  52. void
  53. rc4_init(struct rc4_state *const state, const u_char *key, int keylen)
  54. {
  55. u_char j;
  56. int i;
  57. /* Initialize state with identity permutation */
  58. for (i = 0; i < 256; i++)
  59. state->perm[i] = (u_char)i;
  60. state->index1 = 0;
  61. state->index2 = 0;
  62. /* Randomize the permutation using key data */
  63. for (j = i = 0; i < 256; i++) {
  64. j += state->perm[i] + key[i % keylen];
  65. swap_bytes(&state->perm[i], &state->perm[j]);
  66. }
  67. }
  68. /*
  69. * Encrypt some data using the supplied RC4 state buffer.
  70. * The input and output buffers may be the same buffer.
  71. * Since RC4 is a stream cypher, this function is used
  72. * for both encryption and decryption.
  73. */
  74. void
  75. rc4_crypt(struct rc4_state *const state,
  76. const u_char *inbuf, u_char *outbuf, int buflen)
  77. {
  78. int i;
  79. u_char j;
  80. for (i = 0; i < buflen; i++) {
  81. /* Update modification indicies */
  82. state->index1++;
  83. state->index2 += state->perm[state->index1];
  84. /* Modify permutation */
  85. swap_bytes(&state->perm[state->index1],
  86. &state->perm[state->index2]);
  87. /* Encrypt/decrypt next byte */
  88. j = state->perm[state->index1] + state->perm[state->index2];
  89. outbuf[i] = inbuf[i] ^ state->perm[j];
  90. }
  91. }