|  | /* | 
|  | * dlls/rsaenh/rc4.c | 
|  | * RC4 functions | 
|  | * | 
|  | * Copyright 2004 Michael Jung | 
|  | * Based on public domain code by Tom St Denis (tomstdenis@iahu.ca) | 
|  | * | 
|  | * This library is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU Lesser General Public | 
|  | * License as published by the Free Software Foundation; either | 
|  | * version 2.1 of the License, or (at your option) any later version. | 
|  | * | 
|  | * This library is distributed in the hope that it will be useful, | 
|  | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|  | * Lesser General Public License for more details. | 
|  | * | 
|  | * You should have received a copy of the GNU Lesser General Public | 
|  | * License along with this library; if not, write to the Free Software | 
|  | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA | 
|  | */ | 
|  |  | 
|  | /* | 
|  | * This file contains code from the LibTomCrypt cryptographic | 
|  | * library written by Tom St Denis (tomstdenis@iahu.ca). LibTomCrypt | 
|  | * is in the public domain. The code in this file is tailored to | 
|  | * special requirements. Take a look at http://libtomcrypt.org for the | 
|  | * original version. | 
|  | */ | 
|  |  | 
|  | #include "tomcrypt.h" | 
|  |  | 
|  | int rc4_start(prng_state *prng) | 
|  | { | 
|  | /* set keysize to zero */ | 
|  | prng->rc4.x = 0; | 
|  |  | 
|  | return CRYPT_OK; | 
|  | } | 
|  |  | 
|  | int rc4_add_entropy(const unsigned char *buf, unsigned long len, prng_state *prng) | 
|  | { | 
|  | /* trim as required */ | 
|  | if (prng->rc4.x + len > 256) { | 
|  | if (prng->rc4.x == 256) { | 
|  | /* I can't possibly accept another byte, ok maybe a mint wafer... */ | 
|  | return CRYPT_OK; | 
|  | } else { | 
|  | /* only accept part of it */ | 
|  | len = 256 - prng->rc4.x; | 
|  | } | 
|  | } | 
|  |  | 
|  | while (len--) { | 
|  | prng->rc4.buf[prng->rc4.x++] = *buf++; | 
|  | } | 
|  |  | 
|  | return CRYPT_OK; | 
|  | } | 
|  |  | 
|  | int rc4_ready(prng_state *prng) | 
|  | { | 
|  | unsigned char key[256], tmp, *s; | 
|  | int keylen, x, y, j; | 
|  |  | 
|  | /* extract the key */ | 
|  | s = prng->rc4.buf; | 
|  | memcpy(key, s, 256); | 
|  | keylen = prng->rc4.x; | 
|  |  | 
|  | /* make RC4 perm and shuffle */ | 
|  | for (x = 0; x < 256; x++) { | 
|  | s[x] = x; | 
|  | } | 
|  |  | 
|  | for (j = x = y = 0; x < 256; x++) { | 
|  | y = (y + prng->rc4.buf[x] + key[j++]) & 255; | 
|  | if (j == keylen) { | 
|  | j = 0; | 
|  | } | 
|  | tmp = s[x]; s[x] = s[y]; s[y] = tmp; | 
|  | } | 
|  | prng->rc4.x = 0; | 
|  | prng->rc4.y = 0; | 
|  |  | 
|  | return CRYPT_OK; | 
|  | } | 
|  |  | 
|  | unsigned long rc4_read(unsigned char *buf, unsigned long len, prng_state *prng) | 
|  | { | 
|  | unsigned char x, y, *s, tmp; | 
|  | unsigned long n; | 
|  |  | 
|  | n = len; | 
|  | x = prng->rc4.x; | 
|  | y = prng->rc4.y; | 
|  | s = prng->rc4.buf; | 
|  | while (len--) { | 
|  | x = (x + 1) & 255; | 
|  | y = (y + s[x]) & 255; | 
|  | tmp = s[x]; s[x] = s[y]; s[y] = tmp; | 
|  | tmp = (s[x] + s[y]) & 255; | 
|  | *buf++ ^= s[tmp]; | 
|  | } | 
|  | prng->rc4.x = x; | 
|  | prng->rc4.y = y; | 
|  | return n; | 
|  | } |