⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 crypt.cpp

📁 source code for unrar3.3.4,uppack the .rar files,for multi-os
💻 CPP
字号:
#include "rar.hpp"#ifndef SFX_MODULEextern uint CRCTab[256];#endif#define NROUNDS 32#define  rol(x,n,xsize)  (((x)<<(n)) | ((x)>>(xsize-(n))))#define  ror(x,n,xsize)  (((x)>>(n)) | ((x)<<(xsize-(n))))#define substLong(t) ( (uint)SubstTable[(uint)t&255] | \           ((uint)SubstTable[(int)(t>> 8)&255]<< 8) | \           ((uint)SubstTable[(int)(t>>16)&255]<<16) | \           ((uint)SubstTable[(int)(t>>24)&255]<<24) )CryptKeyCacheItem CryptData::Cache[4];int CryptData::CachePos=0;#ifndef SFX_MODULEstatic byte InitSubstTable[256]={  215, 19,149, 35, 73,197,192,205,249, 28, 16,119, 48,221,  2, 42,  232,  1,177,233, 14, 88,219, 25,223,195,244, 90, 87,239,153,137,  255,199,147, 70, 92, 66,246, 13,216, 40, 62, 29,217,230, 86,  6,   71, 24,171,196,101,113,218,123, 93, 91,163,178,202, 67, 44,235,  107,250, 75,234, 49,167,125,211, 83,114,157,144, 32,193,143, 36,  158,124,247,187, 89,214,141, 47,121,228, 61,130,213,194,174,251,   97,110, 54,229,115, 57,152, 94,105,243,212, 55,209,245, 63, 11,  164,200, 31,156, 81,176,227, 21, 76, 99,139,188,127, 17,248, 51,  207,120,189,210,  8,226, 41, 72,183,203,135,165,166, 60, 98,  7,  122, 38,155,170, 69,172,252,238, 39,134, 59,128,236, 27,240, 80,  131,  3, 85,206,145, 79,154,142,159,220,201,133, 74, 64, 20,129,  224,185,138,103,173,182, 43, 34,254, 82,198,151,231,180, 58, 10,  118, 26,102, 12, 50,132, 22,191,136,111,162,179, 45,  4,148,108,  161, 56, 78,126,242,222, 15,175,146, 23, 33,241,181,190, 77,225,    0, 46,169,186, 68, 95,237, 65, 53,208,253,168,  9, 18,100, 52,  116,184,160, 96,109, 37, 30,106,140,104,150,  5,204,117,112, 84};#endifCryptData::CryptData(){}void CryptData::DecryptBlock(byte *Buf,int Size){  rin.blockDecrypt(Buf,Size,Buf);}#ifndef SFX_MODULEvoid CryptData::EncryptBlock20(byte *Buf){  uint A,B,C,D,T,TA,TB;#if defined(BIG_ENDIAN) || !defined(PRESENT_INT32) || !defined(ALLOW_NOT_ALIGNED_INT)  A=((uint)Buf[0]|((uint)Buf[1]<<8)|((uint)Buf[2]<<16)|((uint)Buf[3]<<24))^Key[0];  B=((uint)Buf[4]|((uint)Buf[5]<<8)|((uint)Buf[6]<<16)|((uint)Buf[7]<<24))^Key[1];  C=((uint)Buf[8]|((uint)Buf[9]<<8)|((uint)Buf[10]<<16)|((uint)Buf[11]<<24))^Key[2];  D=((uint)Buf[12]|((uint)Buf[13]<<8)|((uint)Buf[14]<<16)|((uint)Buf[15]<<24))^Key[3];#else  uint32 *BufPtr=(uint32 *)Buf;  A=BufPtr[0]^Key[0];  B=BufPtr[1]^Key[1];  C=BufPtr[2]^Key[2];  D=BufPtr[3]^Key[3];#endif  for(int I=0;I<NROUNDS;I++)  {    T=((C+rol(D,11,32))^Key[I&3]);    TA=A^substLong(T);    T=((D^rol(C,17,32))+Key[I&3]);    TB=B^substLong(T);    A=C;    B=D;    C=TA;    D=TB;  }#if defined(BIG_ENDIAN) || !defined(PRESENT_INT32) || !defined(ALLOW_NOT_ALIGNED_INT)  C^=Key[0];  Buf[0]=(byte)C;  Buf[1]=(byte)(C>>8);  Buf[2]=(byte)(C>>16);  Buf[3]=(byte)(C>>24);  D^=Key[1];  Buf[4]=(byte)D;  Buf[5]=(byte)(D>>8);  Buf[6]=(byte)(D>>16);  Buf[7]=(byte)(D>>24);  A^=Key[2];  Buf[8]=(byte)A;  Buf[9]=(byte)(A>>8);  Buf[10]=(byte)(A>>16);  Buf[11]=(byte)(A>>24);  B^=Key[3];  Buf[12]=(byte)B;  Buf[13]=(byte)(B>>8);  Buf[14]=(byte)(B>>16);  Buf[15]=(byte)(B>>24);#else  BufPtr[0]=C^Key[0];  BufPtr[1]=D^Key[1];  BufPtr[2]=A^Key[2];  BufPtr[3]=B^Key[3];#endif  UpdKeys(Buf);}void CryptData::DecryptBlock20(byte *Buf){  byte InBuf[16];  uint A,B,C,D,T,TA,TB;#if defined(BIG_ENDIAN) || !defined(PRESENT_INT32) || !defined(ALLOW_NOT_ALIGNED_INT)  A=((uint)Buf[0]|((uint)Buf[1]<<8)|((uint)Buf[2]<<16)|((uint)Buf[3]<<24))^Key[0];  B=((uint)Buf[4]|((uint)Buf[5]<<8)|((uint)Buf[6]<<16)|((uint)Buf[7]<<24))^Key[1];  C=((uint)Buf[8]|((uint)Buf[9]<<8)|((uint)Buf[10]<<16)|((uint)Buf[11]<<24))^Key[2];  D=((uint)Buf[12]|((uint)Buf[13]<<8)|((uint)Buf[14]<<16)|((uint)Buf[15]<<24))^Key[3];#else  uint32 *BufPtr=(uint32 *)Buf;  A=BufPtr[0]^Key[0];  B=BufPtr[1]^Key[1];  C=BufPtr[2]^Key[2];  D=BufPtr[3]^Key[3];#endif  memcpy(InBuf,Buf,sizeof(InBuf));  for(int I=NROUNDS-1;I>=0;I--)  {    T=((C+rol(D,11,32))^Key[I&3]);    TA=A^substLong(T);    T=((D^rol(C,17,32))+Key[I&3]);    TB=B^substLong(T);    A=C;    B=D;    C=TA;    D=TB;  }#if defined(BIG_ENDIAN) || !defined(PRESENT_INT32) || !defined(ALLOW_NOT_ALIGNED_INT)  C^=Key[0];  Buf[0]=(byte)C;  Buf[1]=(byte)(C>>8);  Buf[2]=(byte)(C>>16);  Buf[3]=(byte)(C>>24);  D^=Key[1];  Buf[4]=(byte)D;  Buf[5]=(byte)(D>>8);  Buf[6]=(byte)(D>>16);  Buf[7]=(byte)(D>>24);  A^=Key[2];  Buf[8]=(byte)A;  Buf[9]=(byte)(A>>8);  Buf[10]=(byte)(A>>16);  Buf[11]=(byte)(A>>24);  B^=Key[3];  Buf[12]=(byte)B;  Buf[13]=(byte)(B>>8);  Buf[14]=(byte)(B>>16);  Buf[15]=(byte)(B>>24);#else  BufPtr[0]=C^Key[0];  BufPtr[1]=D^Key[1];  BufPtr[2]=A^Key[2];  BufPtr[3]=B^Key[3];#endif  UpdKeys(InBuf);}void CryptData::UpdKeys(byte *Buf){  for (int I=0;I<16;I+=4)  {    Key[0]^=CRCTab[Buf[I]];    Key[1]^=CRCTab[Buf[I+1]];    Key[2]^=CRCTab[Buf[I+2]];    Key[3]^=CRCTab[Buf[I+3]];  }}void CryptData::Swap(byte *Ch1,byte *Ch2){  byte Ch=*Ch1;  *Ch1=*Ch2;  *Ch2=Ch;}#endifvoid CryptData::SetCryptKeys(char *Password,byte *Salt,bool Encrypt,bool OldOnly){  if (*Password==0)    return;  if (OldOnly)  {#ifndef SFX_MODULE    if (CRCTab[1]==0)      InitCRC();    byte Psw[MAXPASSWORD];    SetOldKeys(Password);    Key[0]=0xD3A3B879L;    Key[1]=0x3F6D12F7L;    Key[2]=0x7515A235L;    Key[3]=0xA4E7F123L;    memset(Psw,0,sizeof(Psw));#if defined(_WIN_32) && !defined(GUI)    CharToOemBuff(Password,(char*)Psw,strlen(Password));#else    strncpy((char *)Psw,Password,MAXPASSWORD-1);#endif    int PswLength=strlen(Password);    memcpy(SubstTable,InitSubstTable,sizeof(SubstTable));    for (int J=0;J<256;J++)      for (int I=0;I<PswLength;I+=2)      {        uint N1=(byte)CRCTab[(Psw[I]-J)&0xff];        uint N2=(byte)CRCTab[(Psw[I+1]+J)&0xff];        for (int K=1;N1!=N2;N1=(N1+1)&0xff,K++)          Swap(&SubstTable[N1],&SubstTable[(N1+I+K)&0xff]);      }    for (int I=0;I<PswLength;I+=16)      EncryptBlock20(&Psw[I]);#endif    return;  }  bool Cached=false;  for (int I=0;I<sizeof(Cache)/sizeof(Cache[0]);I++)    if (strcmp(Cache[I].Password,Password)==0 &&        (Salt==NULL && !Cache[I].SaltPresent || Salt!=NULL &&        Cache[I].SaltPresent && memcmp(Cache[I].Salt,Salt,SALT_SIZE)==0))    {      memcpy(AESKey,Cache[I].AESKey,sizeof(AESKey));      memcpy(AESInit,Cache[I].AESInit,sizeof(AESInit));      Cached=true;      break;    }  if (!Cached)  {    wchar PswW[MAXPASSWORD];    CharToWide(Password,PswW,MAXPASSWORD-1);    PswW[MAXPASSWORD-1]=0;    byte RawPsw[2*MAXPASSWORD+SALT_SIZE];    WideToRaw(PswW,RawPsw);    int RawLength=2*strlenw(PswW);    if (Salt!=NULL)    {      memcpy(RawPsw+RawLength,Salt,SALT_SIZE);      RawLength+=SALT_SIZE;    }    hash_context c;    hash_initial(&c);    const int HashRounds=0x40000;    for (int I=0;I<HashRounds;I++)    {      hash_process( &c, RawPsw, RawLength);      byte PswNum[3];      PswNum[0]=(byte)I;      PswNum[1]=(byte)(I>>8);      PswNum[2]=(byte)(I>>16);      hash_process( &c, PswNum, 3);      if (I%(HashRounds/16)==0)      {        hash_context tempc=c;        uint32 digest[5];        hash_final( &tempc, digest);        AESInit[I/(HashRounds/16)]=(byte)digest[4];      }    }    uint32 digest[5];    hash_final( &c, digest);    for (int I=0;I<4;I++)      for (int J=0;J<4;J++)        AESKey[I*4+J]=(byte)(digest[I]>>(J*8));    strcpy(Cache[CachePos].Password,Password);    if ((Cache[CachePos].SaltPresent=(Salt!=NULL))==true)      memcpy(Cache[CachePos].Salt,Salt,SALT_SIZE);    memcpy(Cache[CachePos].AESKey,AESKey,sizeof(AESKey));    memcpy(Cache[CachePos].AESInit,AESInit,sizeof(AESInit));    CachePos=(CachePos+1)%(sizeof(Cache)/sizeof(Cache[0]));  }  rin.init(Encrypt ? Rijndael::Encrypt : Rijndael::Decrypt,AESKey,AESInit);}#ifndef SFX_MODULEvoid CryptData::SetOldKeys(char *Password){  uint PswCRC=CRC(0xffffffff,Password,strlen(Password));  OldKey[0]=PswCRC&0xffff;  OldKey[1]=(PswCRC>>16)&0xffff;  OldKey[2]=OldKey[3]=0;  PN1=PN2=PN3=0;  byte Ch;  while ((Ch=*Password)!=0)  {    PN1+=Ch;    PN2^=Ch;    PN3+=Ch;    PN3=(byte)rol(PN3,1,8);    OldKey[2]^=Ch^CRCTab[Ch];    OldKey[3]+=Ch+(CRCTab[Ch]>>16);    Password++;  }}void CryptData::SetAV15Encryption(){  OldKey[0]=0x4765;  OldKey[1]=0x9021;  OldKey[2]=0x7382;  OldKey[3]=0x5215;}void CryptData::SetCmt13Encryption(){  PN1=0;  PN2=7;  PN3=77;}void CryptData::Crypt(byte *Data,uint Count,int Method){  if (Method==OLD_DECODE)    Decode13(Data,Count);  else    if (Method==OLD_ENCODE)      Encode13(Data,Count);    else      Crypt15(Data,Count);}void CryptData::Encode13(byte *Data,uint Count){  while (Count--)  {    PN2+=PN3;    PN1+=PN2;    *Data+=PN1;    Data++;  }}void CryptData::Decode13(byte *Data,uint Count){  while (Count--)  {    PN2+=PN3;    PN1+=PN2;    *Data-=PN1;    Data++;  }}void CryptData::Crypt15(byte *Data,uint Count){  while (Count--)  {    OldKey[0]+=0x1234;    OldKey[1]^=CRCTab[(OldKey[0] & 0x1fe)>>1];    OldKey[2]-=CRCTab[(OldKey[0] & 0x1fe)>>1]>>16;    OldKey[0]^=OldKey[2];    OldKey[3]=ror(OldKey[3]&0xffff,1,16)^OldKey[1];    OldKey[3]=ror(OldKey[3]&0xffff,1,16);    OldKey[0]^=OldKey[3];    *Data^=(byte)(OldKey[0]>>8);    Data++;  }}#endif

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -