mirror of
https://foundry.openuru.org/gitblit/r/CWE-ou-minkata.git
synced 2025-07-17 10:52:46 +00:00
OpenSSL's RC4 has been working just fine for HSPlasma and DirtSand...
This commit is contained in:
@ -51,27 +51,4 @@ public:
|
||||
virtual unsigned GetBlockSize () const = 0;
|
||||
};
|
||||
|
||||
//============================================================================
|
||||
class KeyRc4 : public KeyBase {
|
||||
private:
|
||||
unsigned m_x;
|
||||
unsigned m_y;
|
||||
byte m_state[256];
|
||||
|
||||
void Initialize (unsigned bytes, const void * data);
|
||||
|
||||
public:
|
||||
KeyRc4 (unsigned bytes, const void * data) { Initialize(bytes, data); }
|
||||
|
||||
void Codec (bool encrypt, ARRAY(byte) * dest, unsigned sourceBytes, const void * sourceData);
|
||||
unsigned GetBlockSize () const { return 1; }
|
||||
|
||||
static void KeyGen (
|
||||
unsigned randomBytes,
|
||||
const void * randomData,
|
||||
ARRAY(byte) * privateData
|
||||
);
|
||||
};
|
||||
|
||||
|
||||
} // namespace Crypt
|
||||
|
@ -34,12 +34,7 @@ You can contact Cyan Worlds, Inc. by email legal@cyan.com
|
||||
|
||||
#include <openssl/md5.h>
|
||||
#include <openssl/sha.h>
|
||||
|
||||
// OpenSSL's RC4 algorithm has bugs and randomly corrupts data
|
||||
//#define OPENSSL_RC4
|
||||
#ifdef OPENSSL_RC4
|
||||
#include <openssl/rc4.h>
|
||||
#endif
|
||||
|
||||
/*****************************************************************************
|
||||
*
|
||||
@ -134,7 +129,6 @@ void Sha1Process (
|
||||
*
|
||||
***/
|
||||
|
||||
#ifdef OPENSSL_RC4
|
||||
//============================================================================
|
||||
static void Rc4Codec (
|
||||
CryptKey * key,
|
||||
@ -161,105 +155,6 @@ static void Rc4Codec (
|
||||
MemCopy(data, temp, bytes);
|
||||
}
|
||||
|
||||
#else // OPENSSL_RC4
|
||||
|
||||
//===========================================================================
|
||||
void KeyRc4::Codec (bool encrypt, ARRAY(byte) * dest, unsigned sourceBytes, const void * sourceData) {
|
||||
// RC4 uses the same algorithm to both encrypt and decrypt
|
||||
dest->SetCount(sourceBytes);
|
||||
|
||||
byte * destDataPtr = (byte *)dest->Ptr();
|
||||
const byte * sourceDataPtr = (const byte *)sourceData;
|
||||
|
||||
for (unsigned index = 0; index < sourceBytes; ++index) {
|
||||
m_x = (m_x + 1) & 0xff;
|
||||
m_y = (m_state[m_x] + m_y) & 0xff;
|
||||
SWAP(m_state[m_x], m_state[m_y]);
|
||||
|
||||
const unsigned offset = (m_state[m_x] + m_state[m_y]) & 0xff;
|
||||
destDataPtr[index] = (byte)(sourceDataPtr[index] ^ m_state[offset]);
|
||||
}
|
||||
}
|
||||
|
||||
//===========================================================================
|
||||
void KeyRc4::KeyGen (
|
||||
unsigned randomBytes,
|
||||
const void * randomData,
|
||||
ARRAY(byte) * privateData
|
||||
) {
|
||||
// Allocate an output digest
|
||||
struct Digest { dword data[5]; };
|
||||
privateData->SetCount(sizeof(Digest));
|
||||
Digest * digest = (Digest *)privateData->Ptr();
|
||||
|
||||
// Perform the hash
|
||||
{
|
||||
// Initialize the hash values with the repeating pattern of random
|
||||
// data
|
||||
unsigned offset = 0;
|
||||
for (; offset < sizeof(Digest); ++offset)
|
||||
((byte *)digest)[offset] = ((const byte *)randomData)[offset % randomBytes];
|
||||
for (; offset < randomBytes; ++offset)
|
||||
((byte *)digest)[offset % sizeof(Digest)] ^= ((const byte *)randomData)[offset];
|
||||
|
||||
// 32-bit rotate left
|
||||
#ifdef _MSC_VER
|
||||
#define ROTL(n, X) _rotl(X, n)
|
||||
#else
|
||||
#define ROTL(n, X) (((X) << (n)) | ((X) >> (32 - (n))))
|
||||
#endif
|
||||
#define f1(x,y,z) (z ^ (x & (y ^ z))) // Rounds 0-19
|
||||
#define K1 0x5A827999L // Rounds 0-19
|
||||
#define subRound(a, b, c, d, e, f, k, data) (e += ROTL(5, a) + f(b, c, d) + k + data, b = ROTL(30, b))
|
||||
|
||||
// first five subrounds from SHA1
|
||||
dword A = 0x67452301;
|
||||
dword B = 0xEFCDAB89;
|
||||
dword C = 0x98BADCFE;
|
||||
dword D = 0x10325476;
|
||||
dword E = 0xC3D2E1F0;
|
||||
subRound(A, B, C, D, E, f1, K1, digest->data[ 0]);
|
||||
subRound(E, A, B, C, D, f1, K1, digest->data[ 1]);
|
||||
subRound(D, E, A, B, C, f1, K1, digest->data[ 2]);
|
||||
subRound(C, D, E, A, B, f1, K1, digest->data[ 3]);
|
||||
subRound(B, C, D, E, A, f1, K1, digest->data[ 4]);
|
||||
digest->data[0] += A;
|
||||
digest->data[1] += B;
|
||||
digest->data[2] += C;
|
||||
digest->data[3] += D;
|
||||
digest->data[4] += E;
|
||||
}
|
||||
}
|
||||
|
||||
//===========================================================================
|
||||
void KeyRc4::Initialize (unsigned bytes, const void * data) {
|
||||
ASSERT(bytes);
|
||||
ASSERT(data);
|
||||
|
||||
// Initialize key with default values
|
||||
{
|
||||
m_x = 0;
|
||||
m_y = 0;
|
||||
for (unsigned offset = 0; offset < arrsize(m_state); ++offset)
|
||||
m_state[offset] = (byte) offset;
|
||||
}
|
||||
|
||||
// Seed key from digest
|
||||
{
|
||||
unsigned index1 = 0;
|
||||
unsigned index2 = 0;
|
||||
for (unsigned offset = 0; offset < arrsize(m_state); ++offset) {
|
||||
ASSERT(index1 < bytes);
|
||||
index2 = (((const byte *)data)[index1] + m_state[offset] + index2) & 0xff;
|
||||
SWAP(m_state[offset], m_state[index2]);
|
||||
if (++index1 == bytes)
|
||||
index1 = 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#endif // OPENSSL_RC4
|
||||
|
||||
} using namespace Crypt;
|
||||
|
||||
|
||||
@ -319,18 +214,11 @@ CryptKey * CryptKeyCreate (
|
||||
CryptKey * key = nil;
|
||||
switch (algorithm) {
|
||||
case kCryptRc4: {
|
||||
#ifdef OPENSSL_RC4
|
||||
RC4_KEY * rc4 = NEW(RC4_KEY);
|
||||
RC4_set_key(rc4, bytes, (const unsigned char *)data);
|
||||
key = NEW(CryptKey);
|
||||
key->algorithm = kCryptRc4;
|
||||
key->handle = rc4;
|
||||
#else
|
||||
KeyRc4 * rc4 = NEWZERO(KeyRc4)(bytes, data);
|
||||
key = NEW(CryptKey);
|
||||
key->algorithm = kCryptRc4;
|
||||
key->handle = rc4;
|
||||
#endif
|
||||
}
|
||||
break;
|
||||
|
||||
@ -343,43 +231,6 @@ CryptKey * CryptKeyCreate (
|
||||
return key;
|
||||
}
|
||||
|
||||
//===========================================================================
|
||||
// Not exposed in header because is not used at the moment and I don't want a big rebuild right now :)
|
||||
void CryptKeyGenerate (
|
||||
ECryptAlgorithm algorithm,
|
||||
unsigned keyBits, // used for algorithms with variable key strength
|
||||
unsigned randomBytes,
|
||||
const void * randomData,
|
||||
ARRAY(byte) * privateData,
|
||||
ARRAY(byte) * publicData // only for public key cryptography
|
||||
) {
|
||||
// Allocate and fill in private and/or public key classes
|
||||
switch (algorithm) {
|
||||
|
||||
case kCryptRc4:
|
||||
KeyRc4::KeyGen(
|
||||
randomBytes,
|
||||
randomData,
|
||||
privateData
|
||||
);
|
||||
break;
|
||||
|
||||
case kCryptRsa:
|
||||
#if 0
|
||||
KeyRsa::KeyGen(
|
||||
keyBits,
|
||||
randomBytes,
|
||||
randomData,
|
||||
privateData,
|
||||
publicData
|
||||
);
|
||||
break;
|
||||
#endif // fall thru to fatal...
|
||||
|
||||
DEFAULT_FATAL(algorithm);
|
||||
}
|
||||
}
|
||||
|
||||
//============================================================================
|
||||
void CryptKeyClose (
|
||||
CryptKey * key
|
||||
@ -397,12 +248,7 @@ unsigned CryptKeyGetBlockSize (
|
||||
) {
|
||||
switch (key->algorithm) {
|
||||
case kCryptRc4: {
|
||||
#ifdef OPENSSL_RC4
|
||||
return 1;
|
||||
#else
|
||||
KeyRc4 * rc4 = (KeyRc4 *)key->handle;
|
||||
return rc4->GetBlockSize();
|
||||
#endif
|
||||
}
|
||||
break;
|
||||
|
||||
@ -537,12 +383,7 @@ void CryptEncrypt (
|
||||
) {
|
||||
switch (key->algorithm) {
|
||||
case kCryptRc4: {
|
||||
#ifdef OPENSSL_RC4
|
||||
Rc4Codec(key, true, dest, sourceBytes, sourceData);
|
||||
#else
|
||||
KeyRc4 * rc4 = (KeyRc4 *)key->handle;
|
||||
rc4->Codec(true, dest, sourceBytes, sourceData);
|
||||
#endif
|
||||
}
|
||||
break;
|
||||
|
||||
@ -564,14 +405,7 @@ void CryptEncrypt (
|
||||
|
||||
switch (key->algorithm) {
|
||||
case kCryptRc4: {
|
||||
#ifdef OPENSSL_RC4
|
||||
Rc4Codec(key, true, bytes, data);
|
||||
#else
|
||||
ARRAY(byte) dest;
|
||||
dest.Reserve(bytes);
|
||||
CryptEncrypt(key, &dest, bytes, data);
|
||||
MemCopy(data, dest.Ptr(), bytes);
|
||||
#endif
|
||||
}
|
||||
break;
|
||||
|
||||
@ -592,12 +426,7 @@ void CryptDecrypt (
|
||||
) {
|
||||
switch (key->algorithm) {
|
||||
case kCryptRc4: {
|
||||
#ifdef OPENSSL_RC4
|
||||
Rc4Codec(key, false, dest, sourceBytes, sourceData);
|
||||
#else
|
||||
KeyRc4 * rc4 = (KeyRc4 *)key->handle;
|
||||
rc4->Codec(false, dest, sourceBytes, sourceData);
|
||||
#endif
|
||||
}
|
||||
break;
|
||||
|
||||
@ -619,14 +448,7 @@ void CryptDecrypt (
|
||||
|
||||
switch (key->algorithm) {
|
||||
case kCryptRc4: {
|
||||
#ifdef OPENSSL_RC4
|
||||
Rc4Codec(key, false, bytes, data);
|
||||
#else
|
||||
ARRAY(byte) dest;
|
||||
dest.Reserve(bytes);
|
||||
CryptDecrypt(key, &dest, bytes, data);
|
||||
MemCopy(data, dest.Ptr(), bytes);
|
||||
#endif
|
||||
}
|
||||
break;
|
||||
|
||||
|
Reference in New Issue
Block a user