/tnl/symmetricCipher.cpp
C++ | 103 lines | 68 code | 9 blank | 26 comment | 6 complexity | 8fb6191a9e3c4ae2f73cdcb3649d9934 MD5 | raw file
Possible License(s): GPL-2.0, LGPL-3.0, LGPL-2.0, GPL-3.0
- //-----------------------------------------------------------------------------------
- //
- // Torque Network Library
- // Copyright (C) 2004 GarageGames.com, Inc.
- // For more information see http://www.opentnl.org
- //
- // This program is free software; you can redistribute it and/or modify
- // it under the terms of the GNU General Public License as published by
- // the Free Software Foundation; either version 2 of the License, or
- // (at your option) any later version.
- //
- // For use in products that are not compatible with the terms of the GNU
- // General Public License, alternative licensing options are available
- // from GarageGames.com.
- //
- // This program is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU General Public License for more details.
- //
- // You should have received a copy of the GNU General Public License
- // along with this program; if not, write to the Free Software
- // Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
- //
- //------------------------------------------------------------------------------------
- #include "tnl.h"
- #include "tnlSymmetricCipher.h"
- #include "tnlByteBuffer.h"
- #include "../libtomcrypt/mycrypt.h"
- namespace TNL {
- SymmetricCipher::SymmetricCipher(const U8 symmetricKey[SymmetricCipher::KeySize], const U8 initVector[SymmetricCipher::BlockSize])
- {
- rijndael_setup(symmetricKey, KeySize, 0, &mSymmetricKey);
- memcpy(mInitVector, initVector, BlockSize);
- memcpy(mCounter, initVector, BlockSize);
- rijndael_ecb_encrypt((U8 *) mCounter, mPad, &mSymmetricKey);
- mPadLen = 0;
- }
- SymmetricCipher::SymmetricCipher(const ByteBuffer *theByteBuffer)
- {
- if(theByteBuffer->getBufferSize() != KeySize * 2)
- {
- U8 buffer[KeySize];
- memset(buffer, 0, KeySize);
- rijndael_setup(buffer, KeySize, 0, &mSymmetricKey);
- memcpy(mInitVector, buffer, BlockSize);
- }
- else
- {
- rijndael_setup(theByteBuffer->getBuffer(), KeySize, 0, &mSymmetricKey);
- memcpy(mInitVector, theByteBuffer->getBuffer() + KeySize, BlockSize);
- }
- memcpy(mCounter, mInitVector, BlockSize);
- rijndael_ecb_encrypt((U8 *) mCounter, mPad, &mSymmetricKey);
- mPadLen = 0;
- }
- void SymmetricCipher::setupCounter(U32 counterValue1, U32 counterValue2, U32 counterValue3, U32 counterValue4)
- {
- mCounter[0] = convertHostToLEndian(convertLEndianToHost(mInitVector[0]) + counterValue1);
- mCounter[1] = convertHostToLEndian(convertLEndianToHost(mInitVector[1]) + counterValue2);
- mCounter[2] = convertHostToLEndian(convertLEndianToHost(mInitVector[2]) + counterValue3);
- mCounter[3] = convertHostToLEndian(convertLEndianToHost(mInitVector[3]) + counterValue4);
- rijndael_ecb_encrypt((U8 *) mCounter, mPad, &mSymmetricKey);
- mPadLen = 0;
- }
- void SymmetricCipher::encrypt(const U8 *plainText, U8 *cipherText, U32 len)
- {
- while(len-- > 0)
- {
- if(mPadLen == BlockSize)
- {
- // we've reached the end of the pad, so compute a new pad
- rijndael_ecb_encrypt(mPad, mPad, &mSymmetricKey);
- mPadLen = 0;
- }
- U8 encryptedChar = *plainText++ ^ mPad[mPadLen];
- mPad[mPadLen++] = *cipherText++ = encryptedChar;
- }
- }
- void SymmetricCipher::decrypt(const U8 *cipherText, U8 *plainText, U32 len)
- {
- while(len-- > 0)
- {
- if(mPadLen == BlockSize)
- {
- rijndael_ecb_encrypt(mPad, mPad, &mSymmetricKey);
- mPadLen = 0;
- }
- U8 encryptedChar = *cipherText++;
- *plainText++ = encryptedChar ^ mPad[mPadLen];
- mPad[mPadLen++] = encryptedChar;
- }
- }
- };