⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 des.c

📁 wm PNE 3.3 source code, running at more than vxworks6.x version.
💻 C
字号:
/* * this DES implementation derived from Phil Karns public domain DES. * thanks, Phil. *//* * $Log: des.c,v $ * Revision 1.3  2003/01/16 18:18:53  josh * directory structure shifting * * Revision 1.2  2001/11/06 22:35:33  tneale * Fixed for newest file structure * * Revision 1.1.1.1  2001/11/05 17:48:38  tneale * Tornado shuffle * * Revision 1.3  2001/01/19 22:21:25  paul * Update copyright. * * Revision 1.2  2000/03/17 00:16:21  meister * Update copyright message * * Revision 1.1  1998/06/24 13:29:11  josh * DES files have been moved to new directory to handle export * restrictions more cleanly * *//* [clearcase]modification history-------------------01b,20apr05,job  update copyright notices01a,11dec03,job  fix copyright statements*/#include <wrn/wm/common/des.h>/* Tables defined in the Data Encryption Standard documents * Three of these tables, the initial permutation, the final * permutation and the expansion operator, are regular enough that * for speed, we hard-code them. They're here for reference only. * Also, the S and P boxes are used by a separate program, gensp.c, * to build the combined SP box, Spbox[]. They're also here just * for reference.  */#if 0/* initial permutation IP */static bits8_t ip[] = {	58, 50, 42, 34, 26, 18, 10,  2,	60, 52, 44, 36, 28, 20, 12,  4,	62, 54, 46, 38, 30, 22, 14,  6,	64, 56, 48, 40, 32, 24, 16,  8,	57, 49, 41, 33, 25, 17,  9,  1,	59, 51, 43, 35, 27, 19, 11,  3,	61, 53, 45, 37, 29, 21, 13,  5,	63, 55, 47, 39, 31, 23, 15,  7};/* final permutation IP^-1 */static bits8_t fp[] = {	40,  8, 48, 16, 56, 24, 64, 32,	39,  7, 47, 15, 55, 23, 63, 31,	38,  6, 46, 14, 54, 22, 62, 30,	37,  5, 45, 13, 53, 21, 61, 29,	36,  4, 44, 12, 52, 20, 60, 28,	35,  3, 43, 11, 51, 19, 59, 27,	34,  2, 42, 10, 50, 18, 58, 26,	33,  1, 41,  9, 49, 17, 57, 25};/* expansion operation matrix */static bits8_t ei[] = {	32,  1,  2,  3,  4,  5,	 4,  5,  6,  7,  8,  9,	 8,  9, 10, 11, 12, 13,	12, 13, 14, 15, 16, 17,	16, 17, 18, 19, 20, 21,	20, 21, 22, 23, 24, 25,	24, 25, 26, 27, 28, 29,	28, 29, 30, 31, 32,  1 };/* The (in)famous S-boxes */static bits8_t sbox[8][64] = {	/* S1 */	14,  4, 13,  1,  2, 15, 11,  8,  3, 10,  6, 12,  5,  9,  0,  7,	 0, 15,  7,  4, 14,  2, 13,  1, 10,  6, 12, 11,  9,  5,  3,  8,	 4,  1, 14,  8, 13,  6,  2, 11, 15, 12,  9,  7,  3, 10,  5,  0,	15, 12,  8,  2,  4,  9,  1,  7,  5, 11,  3, 14, 10,  0,  6, 13,	/* S2 */	15,  1,  8, 14,  6, 11,  3,  4,  9,  7,  2, 13, 12,  0,  5, 10,	 3, 13,  4,  7, 15,  2,  8, 14, 12,  0,  1, 10,  6,  9, 11,  5,	 0, 14,  7, 11, 10,  4, 13,  1,  5,  8, 12,  6,  9,  3,  2, 15,	13,  8, 10,  1,  3, 15,  4,  2, 11,  6,  7, 12,  0,  5, 14,  9,	/* S3 */	10,  0,  9, 14,  6,  3, 15,  5,  1, 13, 12,  7, 11,  4,  2,  8,	13,  7,  0,  9,  3,  4,  6, 10,  2,  8,  5, 14, 12, 11, 15,  1,	13,  6,  4,  9,  8, 15,  3,  0, 11,  1,  2, 12,  5, 10, 14,  7,	 1, 10, 13,  0,  6,  9,  8,  7,  4, 15, 14,  3, 11,  5,  2, 12,	/* S4 */	 7, 13, 14,  3,  0,  6,  9, 10,  1,  2,  8,  5, 11, 12,  4, 15,	13,  8, 11,  5,  6, 15,  0,  3,  4,  7,  2, 12,  1, 10, 14,  9,	10,  6,  9,  0, 12, 11,  7, 13, 15,  1,  3, 14,  5,  2,  8,  4,	 3, 15,  0,  6, 10,  1, 13,  8,  9,  4,  5, 11, 12,  7,  2, 14,	/* S5 */	 2, 12,  4,  1,  7, 10, 11,  6,  8,  5,  3, 15, 13,  0, 14,  9,	14, 11,  2, 12,  4,  7, 13,  1,  5,  0, 15, 10,  3,  9,  8,  6,	 4,  2,  1, 11, 10, 13,  7,  8, 15,  9, 12,  5,  6,  3,  0, 14,	11,  8, 12,  7,  1, 14,  2, 13,  6, 15,  0,  9, 10,  4,  5,  3,	/* S6 */	12,  1, 10, 15,  9,  2,  6,  8,  0, 13,  3,  4, 14,  7,  5, 11,	10, 15,  4,  2,  7, 12,  9,  5,  6,  1, 13, 14,  0, 11,  3,  8,	 9, 14, 15,  5,  2,  8, 12,  3,  7,  0,  4, 10,  1, 13, 11,  6,	 4,  3,  2, 12,  9,  5, 15, 10, 11, 14,  1,  7,  6,  0,  8, 13,	/* S7 */	 4, 11,  2, 14, 15,  0,  8, 13,  3, 12,  9,  7,  5, 10,  6,  1,	13,  0, 11,  7,  4,  9,  1, 10, 14,  3,  5, 12,  2, 15,  8,  6,	 1,  4, 11, 13, 12,  3,  7, 14, 10, 15,  6,  8,  0,  5,  9,  2,	 6, 11, 13,  8,  1,  4, 10,  7,  9,  5,  0, 15, 14,  2,  3, 12,	/* S8 */	13,  2,  8,  4,  6, 15, 11,  1, 10,  9,  3, 14,  5,  0, 12,  7,	 1, 15, 13,  8, 10,  3,  7,  4, 12,  5,  6, 11,  0, 14,  9,  2,	 7, 11,  4,  1,  9, 12, 14,  2,  0,  6, 10, 13, 15,  3,  5,  8,	 2,  1, 14,  7,  4, 10,  8, 13, 15, 12,  9,  0,  3,  5,  6, 11};/* 32-bit permutation function P used on the output of the S-boxes */static bits8_t p32i[] = {		16,  7, 20, 21,	29, 12, 28, 17,	 1, 15, 23, 26,	 5, 18, 31, 10,	 2,  8, 24, 14,	32, 27,  3,  9,	19, 13, 30,  6,	22, 11,  4, 25};#endif /* 0 */int Asmversion = 0;/* Combined SP lookup table, linked in * For best results, ensure that this is aligned on a 32-bit boundary; * Borland C++ 3.1 doesn't guarantee this! */extern bits32_t Spbox[8][64];		/* Combined S and P boxes *//* Primitive function F. * Input is r, subkey array in keys, output is XORed into l. * Each round consumes eight 6-bit subkeys, one for * each of the 8 S-boxes, 2 longs for each round. * Each long contains four 6-bit subkeys, each taking up a byte. * The first long contains, from high to low end, the subkeys for * S-boxes 1, 3, 5 & 7; the second contains the subkeys for S-boxes * 2, 4, 6 & 8 (using the origin-1 S-box numbering in the standard, * not the origin-0 numbering used elsewhere in this code) * See comments elsewhere about the pre-rotated values of r and Spbox. */#define	F(l,r,key){\	work = ((r >> 4) | (r << 28));\	work = work ^ (key [0]);\	l ^= Spbox[6][(int) (work & 0x3f)];\	l ^= Spbox[4][(int) ((work >> 8) & 0x3f)];\	l ^= Spbox[2][(int) ((work >> 16) & 0x3f)];\	l ^= Spbox[0][(int) ((work >> 24) & 0x3f)];\	work = r ^ key[1];\	l ^= Spbox[7][(int) (work & 0x3f)];\	l ^= Spbox[5][(int) ((work >> 8) & 0x3f)];\	l ^= Spbox[3][(int) ((work >> 16) & 0x3f)];\	l ^= Spbox[1][(int) ((work >> 24) & 0x3f)];\}/* Encrypt or decrypt a block of data in ECB mode */void des (DES_KS ks, bits8_t *block, bits8_t *out){	bits32_t left,right,work;	/* Read input block and place in left/right in big-endian order */	left = ((bits32_t)block[0] << 24)	 | ((bits32_t)block[1] << 16)	 | ((bits32_t)block[2] << 8)	 | (bits32_t)block[3];	right = ((bits32_t)block[4] << 24)	 | ((bits32_t)block[5] << 16)	 | ((bits32_t)block[6] << 8)	 | (bits32_t)block[7];	/* Hoey's clever initial permutation algorithm, from Outerbridge	 * (see Schneier p 478)		 *	 * The convention here is the same as Outerbridge: rotate each	 * register left by 1 bit, i.e., so that "left" contains permuted	 * input bits 2, 3, 4, ... 1 and "right" contains 33, 34, 35, ... 32		 * (using origin-1 numbering as in the FIPS). This allows us to avoid	 * one of the two rotates that would otherwise be required in each of	 * the 16 rounds.	 */	work = ((left >> 4) ^ right) & 0x0f0f0f0fL;	right ^= work;	left ^= work << 4;	work = ((left >> 16) ^ right) & 0xffff;	right ^= work;	left ^= work << 16;	work = ((right >> 2) ^ left) & 0x33333333L;	left ^= work;	right ^= (work << 2);	work = ((right >> 8) ^ left) & 0xff00ffL;	left ^= work;	right ^= (work << 8);	right = (right << 1) | (right >> 31);	work = (left ^ right) & 0xaaaaaaaaL;	left ^= work;	right ^= work;	left = (left << 1) | (left >> 31);	/* Now do the 16 rounds */	F(left,right,ks[0]);	F(right,left,ks[1]);	F(left,right,ks[2]);	F(right,left,ks[3]);	F(left,right,ks[4]);	F(right,left,ks[5]);	F(left,right,ks[6]);	F(right,left,ks[7]);	F(left,right,ks[8]);	F(right,left,ks[9]);	F(left,right,ks[10]);	F(right,left,ks[11]);	F(left,right,ks[12]);	F(right,left,ks[13]);	F(left,right,ks[14]);	F(right,left,ks[15]);	/* Inverse permutation, also from Hoey via Outerbridge and Schneier */	right = (right << 31) | (right >> 1);	work = (left ^ right) & 0xaaaaaaaaL;	left ^= work;	right ^= work;	left = (left >> 1) | (left  << 31);	work = ((left >> 8) ^ right) & 0xff00ffL;	right ^= work;	left ^= work << 8;	work = ((left >> 2) ^ right) & 0x33333333L;	right ^= work;	left ^= work << 2;	work = ((right >> 16) ^ left) & 0xffff;	left ^= work;	right ^= work << 16;	work = ((right >> 4) ^ left) & 0x0f0f0f0fL;	left ^= work;	right ^= work << 4;	/* Put the block back into the user's buffer with final swap */	out [0] = (bits8_t) (right >> 24);	out [1] = (bits8_t) (right >> 16);	out [2] = (bits8_t) (right >> 8);	out [3] = (bits8_t) (right);	out [4] = (bits8_t) (left >> 24);	out [5] = (bits8_t) (left >> 16);	out [6] = (bits8_t) (left >> 8);	out [7] = (bits8_t) (left);}/* A function to determine whether we're actually getting DES-style * encryption instead of just dummy routines. * Returns:  1 if real DES, 0 if dummy DES. */int des_is_real(){  return 1;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -