⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 camellia.c

📁 Camellia算法官方发表的版本OpenSSL1.2。为2007.5官方发布。
💻 C
📖 第 1 页 / 共 4 页
字号:
		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(15),CamelliaSubkeyR(15),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(14),CamelliaSubkeyR(14),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(13),CamelliaSubkeyR(13),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(12),CamelliaSubkeyR(12),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(11),CamelliaSubkeyR(11),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(10),CamelliaSubkeyR(10),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_FLS(io[0],io[1],io[2],io[3],		 CamelliaSubkeyL(9),CamelliaSubkeyR(9),		 CamelliaSubkeyL(8),CamelliaSubkeyR(8),		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(7),CamelliaSubkeyR(7),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(6),CamelliaSubkeyR(6),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(5),CamelliaSubkeyR(5),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(4),CamelliaSubkeyR(4),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(3),CamelliaSubkeyR(3),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(2),CamelliaSubkeyR(2),		     io[0],io[1],il,ir,t0,t1);    /* post whitening but kw4 */    io[2] ^= CamelliaSubkeyL(0);    io[3] ^= CamelliaSubkeyR(0);    t0 = io[0];    t1 = io[1];    io[0] = io[2];    io[1] = io[3];    io[2] = t0;    io[3] = t1;    return;}/** * stuff for 192 and 256bit encryption/decryption */void camellia_encrypt256(const u32 *subkey, u32 *io){    u32 il,ir,t0,t1;           /* temporary valiables */    /* pre whitening but absorb kw2*/    io[0] ^= CamelliaSubkeyL(0);    io[1] ^= CamelliaSubkeyR(0);    /* main iteration */    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(2),CamelliaSubkeyR(2),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(3),CamelliaSubkeyR(3),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(4),CamelliaSubkeyR(4),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(5),CamelliaSubkeyR(5),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(6),CamelliaSubkeyR(6),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(7),CamelliaSubkeyR(7),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_FLS(io[0],io[1],io[2],io[3],		 CamelliaSubkeyL(8),CamelliaSubkeyR(8),		 CamelliaSubkeyL(9),CamelliaSubkeyR(9),		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(10),CamelliaSubkeyR(10),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(11),CamelliaSubkeyR(11),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(12),CamelliaSubkeyR(12),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(13),CamelliaSubkeyR(13),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(14),CamelliaSubkeyR(14),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(15),CamelliaSubkeyR(15),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_FLS(io[0],io[1],io[2],io[3],		 CamelliaSubkeyL(16),CamelliaSubkeyR(16),		 CamelliaSubkeyL(17),CamelliaSubkeyR(17),		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(18),CamelliaSubkeyR(18),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(19),CamelliaSubkeyR(19),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(20),CamelliaSubkeyR(20),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(21),CamelliaSubkeyR(21),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(22),CamelliaSubkeyR(22),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(23),CamelliaSubkeyR(23),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_FLS(io[0],io[1],io[2],io[3],		 CamelliaSubkeyL(24),CamelliaSubkeyR(24),		 CamelliaSubkeyL(25),CamelliaSubkeyR(25),		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(26),CamelliaSubkeyR(26),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(27),CamelliaSubkeyR(27),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(28),CamelliaSubkeyR(28),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(29),CamelliaSubkeyR(29),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(30),CamelliaSubkeyR(30),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(31),CamelliaSubkeyR(31),		     io[0],io[1],il,ir,t0,t1);    /* post whitening but kw4 */    io[2] ^= CamelliaSubkeyL(32);    io[3] ^= CamelliaSubkeyR(32);    t0 = io[0];    t1 = io[1];    io[0] = io[2];    io[1] = io[3];    io[2] = t0;    io[3] = t1;    return;}void camellia_decrypt256(const u32 *subkey, u32 *io){    u32 il,ir,t0,t1;           /* temporary valiables */    /* pre whitening but absorb kw2*/    io[0] ^= CamelliaSubkeyL(32);    io[1] ^= CamelliaSubkeyR(32);	    /* main iteration */    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(31),CamelliaSubkeyR(31),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(30),CamelliaSubkeyR(30),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(29),CamelliaSubkeyR(29),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(28),CamelliaSubkeyR(28),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(27),CamelliaSubkeyR(27),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(26),CamelliaSubkeyR(26),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_FLS(io[0],io[1],io[2],io[3],		 CamelliaSubkeyL(25),CamelliaSubkeyR(25),		 CamelliaSubkeyL(24),CamelliaSubkeyR(24),		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(23),CamelliaSubkeyR(23),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(22),CamelliaSubkeyR(22),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(21),CamelliaSubkeyR(21),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(20),CamelliaSubkeyR(20),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(19),CamelliaSubkeyR(19),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(18),CamelliaSubkeyR(18),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_FLS(io[0],io[1],io[2],io[3],		 CamelliaSubkeyL(17),CamelliaSubkeyR(17),		 CamelliaSubkeyL(16),CamelliaSubkeyR(16),		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(15),CamelliaSubkeyR(15),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(14),CamelliaSubkeyR(14),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(13),CamelliaSubkeyR(13),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(12),CamelliaSubkeyR(12),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(11),CamelliaSubkeyR(11),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(10),CamelliaSubkeyR(10),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_FLS(io[0],io[1],io[2],io[3],		 CamelliaSubkeyL(9),CamelliaSubkeyR(9),		 CamelliaSubkeyL(8),CamelliaSubkeyR(8),		 t0,t1,il,ir);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(7),CamelliaSubkeyR(7),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(6),CamelliaSubkeyR(6),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(5),CamelliaSubkeyR(5),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(4),CamelliaSubkeyR(4),		     io[0],io[1],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[0],io[1],		     CamelliaSubkeyL(3),CamelliaSubkeyR(3),		     io[2],io[3],il,ir,t0,t1);    CAMELLIA_ROUNDSM(io[2],io[3],		     CamelliaSubkeyL(2),CamelliaSubkeyR(2),		     io[0],io[1],il,ir,t0,t1);    /* post whitening but kw4 */    io[2] ^= CamelliaSubkeyL(0);    io[3] ^= CamelliaSubkeyR(0);    t0 = io[0];    t1 = io[1];    io[0] = io[2];    io[1] = io[3];    io[2] = t0;    io[3] = t1;    return;}/*** * * API for compatibility */void Camellia_Ekeygen(const int keyBitLength, 		      const unsigned char *rawKey, 		      KEY_TABLE_TYPE keyTable){    switch(keyBitLength) {    case 128:	camellia_setup128(rawKey, keyTable);	break;    case 192:	camellia_setup192(rawKey, keyTable);	break;    case 256:	camellia_setup256(rawKey, keyTable);	break;    default:	break;    }}void Camellia_EncryptBlock(const int keyBitLength, 			   const unsigned char *plaintext, 			   const KEY_TABLE_TYPE keyTable, 			   unsigned char *ciphertext){    u32 tmp[4];    tmp[0] = GETU32(plaintext);    tmp[1] = GETU32(plaintext + 4);    tmp[2] = GETU32(plaintext + 8);    tmp[3] = GETU32(plaintext + 12);    switch (keyBitLength) {    case 128:	camellia_encrypt128(keyTable, tmp);	break;    case 192:	/* fall through */    case 256:	camellia_encrypt256(keyTable, tmp);	break;    default:	break;    }    PUTU32(ciphertext, tmp[0]);    PUTU32(ciphertext + 4, tmp[1]);    PUTU32(ciphertext + 8, tmp[2]);    PUTU32(ciphertext + 12, tmp[3]);}void Camellia_DecryptBlock(const int keyBitLength, 			   const unsigned char *ciphertext, 			   const KEY_TABLE_TYPE keyTable, 			   unsigned char *plaintext){    u32 tmp[4];    tmp[0] = GETU32(ciphertext);    tmp[1] = GETU32(ciphertext + 4);    tmp[2] = GETU32(ciphertext + 8);    tmp[3] = GETU32(ciphertext + 12);    switch (keyBitLength) {    case 128:	camellia_decrypt128(keyTable, tmp);	break;    case 192:	/* fall through */    case 256:	camellia_decrypt256(keyTable, tmp);	break;    default:	break;    }    PUTU32(plaintext, tmp[0]);    PUTU32(plaintext + 4, tmp[1]);    PUTU32(plaintext + 8, tmp[2]);    PUTU32(plaintext + 12, tmp[3]);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -