You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
170 lines
3.7 KiB
170 lines
3.7 KiB
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) |
|
#pragma warning disable |
|
using System; |
|
|
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; |
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities; |
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities; |
|
|
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines |
|
{ |
|
/** |
|
* An XTEA engine. |
|
*/ |
|
public class XteaEngine |
|
: IBlockCipher |
|
{ |
|
private const int |
|
rounds = 32, |
|
block_size = 8, |
|
// key_size = 16, |
|
delta = unchecked((int) 0x9E3779B9); |
|
|
|
/* |
|
* the expanded key array of 4 subkeys |
|
*/ |
|
private uint[] _S = new uint[4], |
|
_sum0 = new uint[32], |
|
_sum1 = new uint[32]; |
|
private bool _initialised, _forEncryption; |
|
|
|
/** |
|
* Create an instance of the TEA encryption algorithm |
|
* and set some defaults |
|
*/ |
|
public XteaEngine() |
|
{ |
|
_initialised = false; |
|
} |
|
|
|
public virtual string AlgorithmName |
|
{ |
|
get { return "XTEA"; } |
|
} |
|
|
|
public virtual bool IsPartialBlockOkay |
|
{ |
|
get { return false; } |
|
} |
|
|
|
public virtual int GetBlockSize() |
|
{ |
|
return block_size; |
|
} |
|
|
|
/** |
|
* initialise |
|
* |
|
* @param forEncryption whether or not we are for encryption. |
|
* @param params the parameters required to set up the cipher. |
|
* @exception ArgumentException if the params argument is |
|
* inappropriate. |
|
*/ |
|
public virtual void Init( |
|
bool forEncryption, |
|
ICipherParameters parameters) |
|
{ |
|
if (!(parameters is KeyParameter)) |
|
{ |
|
throw new ArgumentException("invalid parameter passed to TEA init - " |
|
+ BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.Platform.GetTypeName(parameters)); |
|
} |
|
|
|
_forEncryption = forEncryption; |
|
_initialised = true; |
|
|
|
KeyParameter p = (KeyParameter) parameters; |
|
|
|
setKey(p.GetKey()); |
|
} |
|
|
|
public virtual int ProcessBlock( |
|
byte[] inBytes, |
|
int inOff, |
|
byte[] outBytes, |
|
int outOff) |
|
{ |
|
if (!_initialised) |
|
throw new InvalidOperationException(AlgorithmName + " not initialised"); |
|
|
|
Check.DataLength(inBytes, inOff, block_size, "input buffer too short"); |
|
Check.OutputLength(outBytes, outOff, block_size, "output buffer too short"); |
|
|
|
return _forEncryption |
|
? encryptBlock(inBytes, inOff, outBytes, outOff) |
|
: decryptBlock(inBytes, inOff, outBytes, outOff); |
|
} |
|
|
|
public virtual void Reset() |
|
{ |
|
} |
|
|
|
/** |
|
* Re-key the cipher. |
|
* |
|
* @param key the key to be used |
|
*/ |
|
private void setKey( |
|
byte[] key) |
|
{ |
|
int i, j; |
|
for (i = j = 0; i < 4; i++,j+=4) |
|
{ |
|
_S[i] = Pack.BE_To_UInt32(key, j); |
|
} |
|
|
|
for (i = j = 0; i < rounds; i++) |
|
{ |
|
_sum0[i] = ((uint)j + _S[j & 3]); |
|
j += delta; |
|
_sum1[i] = ((uint)j + _S[j >> 11 & 3]); |
|
} |
|
} |
|
|
|
private int encryptBlock( |
|
byte[] inBytes, |
|
int inOff, |
|
byte[] outBytes, |
|
int outOff) |
|
{ |
|
// Pack bytes into integers |
|
uint v0 = Pack.BE_To_UInt32(inBytes, inOff); |
|
uint v1 = Pack.BE_To_UInt32(inBytes, inOff + 4); |
|
|
|
for (int i = 0; i < rounds; i++) |
|
{ |
|
v0 += ((v1 << 4 ^ v1 >> 5) + v1) ^ _sum0[i]; |
|
v1 += ((v0 << 4 ^ v0 >> 5) + v0) ^ _sum1[i]; |
|
} |
|
|
|
Pack.UInt32_To_BE(v0, outBytes, outOff); |
|
Pack.UInt32_To_BE(v1, outBytes, outOff + 4); |
|
|
|
return block_size; |
|
} |
|
|
|
private int decryptBlock( |
|
byte[] inBytes, |
|
int inOff, |
|
byte[] outBytes, |
|
int outOff) |
|
{ |
|
// Pack bytes into integers |
|
uint v0 = Pack.BE_To_UInt32(inBytes, inOff); |
|
uint v1 = Pack.BE_To_UInt32(inBytes, inOff + 4); |
|
|
|
for (int i = rounds-1; i >= 0; i--) |
|
{ |
|
v1 -= ((v0 << 4 ^ v0 >> 5) + v0) ^ _sum1[i]; |
|
v0 -= ((v1 << 4 ^ v1 >> 5) + v1) ^ _sum0[i]; |
|
} |
|
|
|
Pack.UInt32_To_BE(v0, outBytes, outOff); |
|
Pack.UInt32_To_BE(v1, outBytes, outOff + 4); |
|
|
|
return block_size; |
|
} |
|
} |
|
} |
|
#pragma warning restore |
|
#endif
|
|
|