X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=cast5.c;h=51e9e93823988c42fcaccecfe8e8557ec3834bdd;hb=91bece1f7822ccaae033989525ee08f613de3802;hp=ebe1ce69d1bdb09d297b0945ae1225e048f36479;hpb=3c995d0a8faeb9d37927d48e20fc45d839e066ea;p=avr-crypto-lib.git diff --git a/cast5.c b/cast5.c index ebe1ce6..51e9e93 100644 --- a/cast5.c +++ b/cast5.c @@ -1,22 +1,44 @@ +/* cast5.c */ +/* + This file is part of the Crypto-avr-lib/microcrypt-lib. + Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . +*/ /* - * File: cast5.c - * Author: Daniel Otte - * Date: 26.07.2006 - * License: GPL - * Description: Implementation of the CAST5 (aka CAST-128) cipher algorithm as described in RFC 2144 + * \file cast5.c + * \author Daniel Otte + * \email daniel.otte@rub.de + * \date 2006-07-26 + * \par License: + * GPLv3 or later + * \brief Implementation of the CAST5 (aka CAST-128) cipher algorithm as described in RFC 2144 * */ - //pgm_read_dword #include #include #include "cast5.h" #include "config.h" - #include "uart.h" #include "debug.h" #undef DEBUG + #ifdef DEBUG + #include "uart.h" + #endif + #include "cast5-sbox.h" @@ -85,7 +107,12 @@ void cast5_init_rM(uint8_t *klo, uint8_t *khi, uint8_t offset, uint8_t *src, boo - +/** + * \brief sets up round keys (context) for cast5 en/decryption. + * @param s Pointer to cast5 context. + * @param key Pointer to binary key. + * @param keylength length of keydata in bits. + */ void cast5_init(cast5_ctx_t* s, uint8_t* key, uint8_t keylength){ /* we migth return if the key is valid and if setup was sucessfull */ uint32_t x[4], z[4]; @@ -94,7 +121,9 @@ void cast5_init(cast5_ctx_t* s, uint8_t* key, uint8_t keylength){ s->shortkey = (keylength<=80); /* littel endian only! */ memset(&(x[0]), 0 ,16); /* set x to zero */ - memcpy(&(x[0]), key, keylength/8); + if(keylength > 128) + keylength=128; + memcpy(&(x[0]), key, (keylength+7)/8); /* todo: merge a and b and compress the whole stuff */ @@ -203,8 +232,10 @@ uint32_t cast5_f2(uint32_t d, uint32_t m, uint8_t r){ return (((ia - ib) + ic) ^ id); #else - return (((pgm_read_dword(&s1[((uint8_t*)&t)[IA]] ) - pgm_read_dword(&s2[((uint8_t*)&t)[IB]] )) - + pgm_read_dword(&s3[((uint8_t*)&t)[IC]] )) ^ pgm_read_dword(&s4[((uint8_t*)&t)[ID]])); + return (((pgm_read_dword(&s1[((uint8_t*)&t)[IA]]) + - pgm_read_dword(&s2[((uint8_t*)&t)[IB]]) ) + + pgm_read_dword(&s3[((uint8_t*)&t)[IC]]) ) + ^ pgm_read_dword(&s4[((uint8_t*)&t)[ID]]) ); #endif } @@ -237,8 +268,13 @@ uint32_t cast5_f3(uint32_t d, uint32_t m, uint8_t r){ #endif } +/*************************************************************************/ - +/** + * \brief encrypts a datablock with cast5 + * @param s Pointer to cast5 roundkeys (context) + * @param block Pointer to datablock + */ void cast5_enc(cast5_ctx_t *s, void* block){ uint32_t l,r, x, y; uint8_t i; @@ -261,7 +297,13 @@ void cast5_enc(cast5_ctx_t *s, void* block){ ((uint32_t*)block)[1]=l; } +/*************************************************************************/ +/** + * \brief decrypts a datablock with cast5 + * @param s Pointer to cast5 roundkeys (context) + * @param block Pointer to datablock + */ void cast5_dec(cast5_ctx_t *s, void* block){ uint32_t l,r, x, y; int8_t i, rounds;