Skip to content
Snippets Groups Projects
Select Git revision
  • ecedd41439800c254bc9e202364d2105a5bbfc5b
  • master default
  • dbck-q-n-d-link
  • foutput-text_stat-override
  • generations
  • text-stat-sha256
  • use-nettle
  • import-nettle
  • refactor-cached_get_text
  • refactor-cached_get_text-part-2
  • add-text_store
  • introduce-generation_position
  • remove-reclamation
  • dbfile-temp-filenames
  • sstrdup
  • dbfile_open_read-check-magic
  • adns_dist
  • liboop_dist
  • search
  • isc
  • dbdbckmultiplechoice
  • last.cvs.revision
  • 2.1.2
  • 2.1.1
  • 2.1.0
  • adns_1_0
  • liboop_0_9
  • 2.0.7
  • search_bp
  • 2.0.6
  • 2.0.5
  • isc_1_01
  • Protocol-A-10.4
  • 2.0.4
  • 2.0.3
  • 2.0.2
  • 2.0.1
  • 2.0.0
  • isc_1_00
  • isc_merge_1999_05_01
  • isc_merge_1999_04_21
41 results

tmp-limits.h

Blame
  • arcfour.c 2.18 KiB
    /* arcfour.c
     *
     * The arcfour/rc4 stream cipher.
     */
    
    /* nettle, low-level cryptographics library
     *
     * Copyright (C) 2001 Niels Mller
     *  
     * The nettle library is free software; you can redistribute it and/or modify
     * it under the terms of the GNU Lesser General Public License as published by
     * the Free Software Foundation; either version 2.1 of the License, or (at your
     * option) any later version.
     * 
     * The nettle library is distributed in the hope that it will be useful, but
     * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
     * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
     * License for more details.
     * 
     * You should have received a copy of the GNU Lesser General Public License
     * along with the nettle library; see the file COPYING.LIB.  If not, write to
     * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
     * MA 02111-1307, USA.
     */
    
    #include "arcfour.h"
    
    #include <assert.h>
    
    #define SWAP(a,b) do { int _t = a; a = b; b = _t; } while(0)
    
    void
    arcfour_set_key(struct arcfour_ctx *ctx,
    		unsigned length, const uint8_t *key)
    {
      unsigned i, j, k;
      
      assert(length >= ARCFOUR_MIN_KEY_SIZE);
      assert(length <= ARCFOUR_MAX_KEY_SIZE);
    
      /* Initialize context */
      for (i = 0; i<256; i++)
        ctx->S[i] = i;
    
      for (i = j = k = 0; i<256; i++)
        {
          j += ctx->S[i] + key[k]; j &= 0xff;
          SWAP(ctx->S[i], ctx->S[j]);
          /* Repeat key as needed */
          k = (k + 1) % length;
        }
      ctx->i = ctx->j = 0;
    }
    
    
    void
    arcfour_crypt(struct arcfour_ctx *ctx,
    	      unsigned length, uint8_t *dst,
    	      const uint8_t *src)
    {
      register uint8_t i, j;
    
      i = ctx->i; j = ctx->j;
      while(length--)
        {
          i++; i &= 0xff;
          j += ctx->S[i]; j &= 0xff;
          SWAP(ctx->S[i], ctx->S[j]);
          *dst++ = *src++ ^ ctx->S[ (ctx->S[i] + ctx->S[j]) & 0xff ];
        }
      ctx->i = i; ctx->j = j;
    }
    
    void
    arcfour_stream(struct arcfour_ctx *ctx,
    	       unsigned length, uint8_t *dst)
    {
      register uint8_t i, j;
    
      i = ctx->i; j = ctx->j;
      while(length--)
        {
          i++; i &= 0xff;
          j += ctx->S[i]; j &= 0xff;
          SWAP(ctx->S[i], ctx->S[j]);
          *dst++ = ctx->S[ (ctx->S[i] + ctx->S[j]) & 0xff ];
        }
      ctx->i = i; ctx->j = j;
    }