亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? twofish.c

?? PGP8.0源碼 請認真閱讀您的文件包然后寫出其具體功能
?? C
?? 第 1 頁 / 共 3 頁
字號:

/*
+*****************************************************************************
*
* Function Name:	BuildMDS
*
* Function:			Initialize the MDStab array
*
* Arguments:		None.
*
* Return:			None.
*
* Notes:
*	Here we precompute all the fixed MDS table.  This only needs to be done
*	one time at initialization, after which the table is "CONST".
*
-****************************************************************************/
static void BuildMDS(void)
{
	int i;
	DWORD d;
	BYTE m1[2],mX[2],mY[2];
#if ALIGN32
	BYTE dummyAlign[2];			/* keep 32-bit alignment on stack */

	(void) dummyAlign;
#endif

	
	for (i=0;i<256;i++)
		{
		m1[0]=P8x8[0][i];		/* compute all the matrix elements */
		mX[0]=(BYTE) Mul_X(m1[0]);
		mY[0]=(BYTE) Mul_Y(m1[0]);

		m1[1]=P8x8[1][i];
		mX[1]=(BYTE) Mul_X(m1[1]);
		mY[1]=(BYTE) Mul_Y(m1[1]);

#undef	Mul_1					/* change what the pre-processor does with Mij */
#undef	Mul_X
#undef	Mul_Y
#define	Mul_1	m1				/* It will now access m01[], m5B[], and mEF[] */
#define	Mul_X	mX				
#define	Mul_Y	mY

#define	SetMDS(N)					\
		b0(d) = M0##N[P_##N##0];	\
		b1(d) = M1##N[P_##N##0];	\
		b2(d) = M2##N[P_##N##0];	\
		b3(d) = M3##N[P_##N##0];	\
		MDStab[N][i] = d;

		SetMDS(0);				/* fill in the matrix with elements computed above */
		SetMDS(1);
		SetMDS(2);
		SetMDS(3);
		}
#undef	Mul_1
#undef	Mul_X
#undef	Mul_Y
#define	Mul_1	Mx_1			/* re-enable true multiply */
#define	Mul_X	Mx_X
#define	Mul_Y	Mx_Y
	
	needToBuildMDS=0;			/* NEVER modify the table again! */
}

/*
+*****************************************************************************
*
* Function Name:	ReverseRoundSubkeys
*
* Function:			Reverse order of round subkeys to switch between encrypt/decrypt
*
* Arguments:		key		=	ptr to keyInstance to be reversed
*					newDir	=	new direction value
*
* Return:			None.
*
* Notes:
*	This optimization allows both blockEncrypt and blockDecrypt to use the same
*	"fallthru" switch statement based on the number of rounds.
*	Note that key->numRounds must be even and >= 2 here.
*
-****************************************************************************/
static void ReverseRoundSubkeys(keyInstance *key,BYTE newDir)
{
	DWORD t0,t1;
	register DWORD *r0=key->subKeys+ROUND_SUBKEYS;
	register DWORD *r1=r0 + 2*key->numRounds - 2;

	for (;r0 < r1;r0+=2,r1-=2)
		{
		t0=r0[0];			/* swap the order */
		t1=r0[1];
		r0[0]=r1[0];		/* but keep relative order within pairs */
		r0[1]=r1[1];
		r1[0]=t0;
		r1[1]=t1;
		}

	key->direction=newDir;
}

/*
+*****************************************************************************
*
* Function Name:	Xor256
*
* Function:			Copy an 8-bit permutation (256 bytes), xoring with a byte
*
* Arguments:		dst		=	where to put result
*					src		=	where to get data (can be same asa dst)
*					b		=	byte to xor
*
* Return:			None
*
* Notes:
* 	BorlandC's optimization is terrible!  When we put the code inline,
*	it generates fairly good code in the *following* segment (not in the Xor256
*	code itself).  If the call is made, the code following the call is awful!
*	The penalty is nearly 50%!  So we take the code size hit for inlining for
*	Borland, while Microsoft happily works with a call.
*
-****************************************************************************/
#if defined(__BORLANDC__)	/* do it inline */
#define Xor32(dst,src,i) { ((DWORD *)dst)[i] = ((DWORD *)src)[i] ^ tmpX; } 
#define	Xor256(dst,src,b)				\
	{									\
	register DWORD tmpX=0x01010101u * b;\
	for (i=0;i<64;i+=4)					\
		{ Xor32(dst,src,i  ); Xor32(dst,src,i+1); Xor32(dst,src,i+2); Xor32(dst,src,i+3); }	\
	}
#else						/* do it as a function call */
static void Xor256(void *dst,void *src,BYTE b)
{
	register		x=b*0x01010101u;	/* replicate byte to all four bytes */
	register DWORD *d=(DWORD *)dst;
	register DWORD *s=(DWORD *)src;
#define X_8(N)	{ d[N]=s[N] ^ x; d[N+1]=s[N+1] ^ x; }
#define X_32(N)	{ X_8(N); X_8(N+2); X_8(N+4); X_8(N+6); }
	X_32(0 ); X_32( 8); X_32(16); X_32(24);	/* all inline */
	d+=32;	/* keep offsets small! */
	s+=32;
	X_32(0 ); X_32( 8); X_32(16); X_32(24);	/* all inline */
}
#endif

/*
+*****************************************************************************
*
* Function Name:	reKey
*
* Function:			Initialize the Twofish key schedule from key32
*
* Arguments:		key			=	ptr to keyInstance to be initialized
*
* Return:			TRUE on success
*
* Notes:
*	Here we precompute all the round subkeys, although that is not actually
*	required.  For example, on a smartcard, the round subkeys can 
*	be generated on-the-fly	using f32()
*
-****************************************************************************/
int reKey(keyInstance *key)
{
	int		i,j,k64Cnt,keyLen;
	int		subkeyCnt;
	DWORD	A,B,q;
	DWORD	sKey[MAX_KEY_BITS/64],k32e[MAX_KEY_BITS/64],k32o[MAX_KEY_BITS/64];
	BYTE	L0[256],L1[256];	/* small local 8-bit permutations */

#if VALIDATE_PARMS
  #if ALIGN32
	if (((int)key) & 3)
		return BAD_ALIGN32;
	if ((key->keyLen % 64) || (key->keyLen < MIN_KEY_BITS))
		return BAD_KEY_INSTANCE;
  #endif
#endif

	if (needToBuildMDS)			/* do this one time only */
		BuildMDS();

#define	F32(res,x,k32)	\
	{															\
	DWORD t=x;													\
	switch (k64Cnt & 3)											\
	    {														\
		case 0:  /* same as 4 */								\
					b0(t)   = p8(04)[b0(t)] ^ b0(k32[3]);		\
					b1(t)   = p8(14)[b1(t)] ^ b1(k32[3]);		\
					b2(t)   = p8(24)[b2(t)] ^ b2(k32[3]);		\
					b3(t)   = p8(34)[b3(t)] ^ b3(k32[3]);		\
				 /* fall thru, having pre-processed t */		\
		case 3:		b0(t)   = p8(03)[b0(t)] ^ b0(k32[2]);		\
					b1(t)   = p8(13)[b1(t)] ^ b1(k32[2]);		\
					b2(t)   = p8(23)[b2(t)] ^ b2(k32[2]);		\
					b3(t)   = p8(33)[b3(t)] ^ b3(k32[2]);		\
				 /* fall thru, having pre-processed t */		\
		case 2:	 /* 128-bit keys (optimize for this case) */	\
			res=	MDStab[0][p8(01)[p8(02)[b0(t)] ^ b0(k32[1])] ^ b0(k32[0])] ^	\
					MDStab[1][p8(11)[p8(12)[b1(t)] ^ b1(k32[1])] ^ b1(k32[0])] ^	\
					MDStab[2][p8(21)[p8(22)[b2(t)] ^ b2(k32[1])] ^ b2(k32[0])] ^	\
					MDStab[3][p8(31)[p8(32)[b3(t)] ^ b3(k32[1])] ^ b3(k32[0])] ;	\
		}														\
	}


#if !CHECK_TABLE
#if defined(USE_ASM)				/* only do this if not using assember */
if (!(useAsm & 4))
#endif
#endif
	{
	subkeyCnt = ROUND_SUBKEYS + 2*key->numRounds;
	keyLen=key->keyLen;
	k64Cnt=(keyLen+63)/64;			/* number of 64-bit key words */
	for (i=0,j=k64Cnt-1;i<k64Cnt;i++,j--)
		{							/* split into even/odd key dwords */
		k32e[i]=key->key32[2*i  ];
		k32o[i]=key->key32[2*i+1];
		/* compute S-box keys using (12,8) Reed-Solomon code over GF(256) */
		sKey[j]=key->sboxKeys[j]=RS_MDS_Encode(k32e[i],k32o[i]);	/* reverse order */
		}
	}

#ifdef USE_ASM
if (useAsm & 4)
	{
	#if defined(COMPILE_KEY) && defined(USE_ASM)
		key->keySig		= VALID_SIG;			/* show that we are initialized */
		key->codeSize	= sizeof(key->compiledCode);	/* set size */
	#endif
	reKey_86(key);
	}
else
#endif
	{
	for (i=q=0;i<subkeyCnt/2;i++,q+=SK_STEP)	
		{							/* compute round subkeys for PHT */
		F32(A,q        ,k32e);		/* A uses even key dwords */
		F32(B,q+SK_BUMP,k32o);		/* B uses odd  key dwords */
		B = ROL(B,8);
		key->subKeys[2*i  ] = A+B;	/* combine with a PHT */
		B = A + 2*B;
		key->subKeys[2*i+1] = ROL(B,SK_ROTL);
		}
#if !defined(ZERO_KEY)
	switch (keyLen)	/* case out key length for speed in generating S-boxes */
		{
		case 128:
		#if defined(FULL_KEY) || defined(PART_KEY)
			#define	one128(N,J)	sbSet(N,i,J,p8(N##1)[L0[i+J]]^k0)
			#define	sb128(N) {					\
				Xor256(L0,p8(N##2),b##N(sKey[1]));	\
				{ register DWORD k0=b##N(sKey[0]);	\
				for (i=0;i<256;i+=2) { one128(N,0); one128(N,1); } } }
		#elif defined(MIN_KEY)
			#define	sb128(N) Xor256(_sBox8_(N),p8(N##2),b##N(sKey[1]))
		#endif
			sb128(0); sb128(1); sb128(2); sb128(3);
			break;
		case 192:
		#if defined(FULL_KEY) || defined(PART_KEY)
			#define one192(N,J) sbSet(N,i,J,p8(N##1)[p8(N##2)[L0[i+J]]^k1]^k0)
			#define	sb192(N) {						\
				Xor256(L0,p8(N##3),b##N(sKey[2]));	\
				{ register DWORD k0=b##N(sKey[0]);	\
				  register DWORD k1=b##N(sKey[1]);	\
				  for (i=0;i<256;i+=2) { one192(N,0); one192(N,1); } } }
		#elif defined(MIN_KEY)
			#define one192(N,J) sbSet(N,i,J,p8(N##2)[L0[i+J]]^k1)
			#define	sb192(N) {						\
				Xor256(L0,p8(N##3),b##N(sKey[2]));	\
				{ register DWORD k1=b##N(sKey[1]);	\
				  for (i=0;i<256;i+=2) { one192(N,0); one192(N,1); } } }
		#endif
			sb192(0); sb192(1); sb192(2); sb192(3);
			break;
		case 256:
		#if defined(FULL_KEY) || defined(PART_KEY)
			#define one256(N,J) sbSet(N,i,J,p8(N##1)[p8(N##2)[L0[i+J]]^k1]^k0)
			#define	sb256(N) {										\
				Xor256(L1,p8(N##4),b##N(sKey[3]));					\
				for (i=0;i<256;i+=2) {L0[i  ]=p8(N##3)[L1[i]];		\
									  L0[i+1]=p8(N##3)[L1[i+1]]; }	\
				Xor256(L0,L0,b##N(sKey[2]));						\
				{ register DWORD k0=b##N(sKey[0]);					\
				  register DWORD k1=b##N(sKey[1]);					\
				  for (i=0;i<256;i+=2) { one256(N,0); one256(N,1); } } }
		#elif defined(MIN_KEY)
			#define one256(N,J) sbSet(N,i,J,p8(N##2)[L0[i+J]]^k1)
			#define	sb256(N) {										\
				Xor256(L1,p8(N##4),b##N(sKey[3]));					\
				for (i=0;i<256;i+=2) {L0[i  ]=p8(N##3)[L1[i]];		\
									  L0[i+1]=p8(N##3)[L1[i+1]]; }	\
				Xor256(L0,L0,b##N(sKey[2]));						\
				{ register DWORD k1=b##N(sKey[1]);					\
				  for (i=0;i<256;i+=2) { one256(N,0); one256(N,1); } } }
		#endif
			sb256(0); sb256(1);	sb256(2); sb256(3);
			break;
		}
#endif
	}

#if CHECK_TABLE						/* sanity check  vs. pedagogical code*/
	{
	GetSboxKey;
	for (i=0;i<subkeyCnt/2;i++)
		{
		A = f32(i*SK_STEP        ,k32e,keyLen);	/* A uses even key dwords */
		B = f32(i*SK_STEP+SK_BUMP,k32o,keyLen);	/* B uses odd  key dwords */
		B = ROL(B,8);
		assert(key->subKeys[2*i  ] == A+  B);
		assert(key->subKeys[2*i+1] == ROL(A+2*B,SK_ROTL));
		}
  #if !defined(ZERO_KEY)			/* any S-boxes to check? */
	for (i=q=0;i<256;i++,q+=0x01010101)
		assert(f32(q,key->sboxKeys,keyLen) == Fe32_(q,0));
  #endif
	}
#endif /* CHECK_TABLE */

	DebugDumpKey(key);

	if (key->direction == DIR_ENCRYPT)	
		ReverseRoundSubkeys(key,DIR_ENCRYPT);	/* reverse the round subkey order */

	return TRUE;
}
/*
+*****************************************************************************
*
* Function Name:	makeKey
*
* Function:			Initialize the Twofish key schedule
*
* Arguments:		key			=	ptr to keyInstance to be initialized
*					direction	=	DIR_ENCRYPT or DIR_DECRYPT
*					keyLen		=	# bits of key text at *keyMaterial
*					keyMaterial	=	ptr to hex ASCII chars representing key bits
*
* Return:			TRUE on success
*					else error code (e.g., BAD_KEY_DIR)
*
* Notes:	This parses the key bits from keyMaterial.  Zeroes out unused key bits
*
-****************************************************************************/
int makeKey(keyInstance *key, BYTE direction, int keyLen,CONST char *keyMaterial)
{
#if VALIDATE_PARMS				/* first, sanity check on parameters */
	if (key == NULL)			
		return BAD_KEY_INSTANCE;/* must have a keyInstance to initialize */
	if ((direction != DIR_ENCRYPT) && (direction != DIR_DECRYPT))
		return BAD_KEY_DIR;		/* must have valid direction */
	if ((keyLen > MAX_KEY_BITS) || (keyLen < 8) || (keyLen & 0x3F))
		return BAD_KEY_MAT;		/* length must be valid */
	if (keyMaterial == NULL)	
		return BAD_KEY_MAT;		/* must have some data to work with */
	key->keySig = VALID_SIG;	/* show that we are initialized */
  #if ALIGN32
	if ((((int)key) & 3) || (((int)key->key32) & 3))
		return BAD_ALIGN32;
  #endif
#endif

	key->direction	= direction;/* set our cipher direction */
	key->keyLen		= (keyLen+63) & ~63;		/* round up to multiple of 64 */
	key->numRounds	= numRounds[(keyLen-1)/64];
	memset(key->key32,0,sizeof(key->key32));	/* zero unused bits */

	if (ParseHexDword(keyLen,keyMaterial,key->key32,key->keyMaterial))
		return BAD_KEY_MAT;	

	key->keyMaterial[MAX_KEY_SIZE]=0;	/* terminate ASCII string */

	return reKey(key);			/* generate round subkeys */
}


/*
+*****************************************************************************
*
* Function Name:	cipherInit
*
* Function:			Initialize the Twofish cipher in a given mode
*
* Arguments:		cipher		=	ptr to cipherInstance to be initialized
*					mode		=	MODE_ECB, MODE_CBC, or MODE_CFB1
*					IV			=	ptr to hex ASCII test representing IV bytes
*
* Return:			TRUE on success
*					else error code (e.g., BAD_CIPHER_MODE)
*
-****************************************************************************/
int cipherInit(cipherInstance *cipher, BYTE mode,CONST char *IV)
{

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
这里是久久伊人| 99精品热视频| 精品精品欲导航| 美女视频第一区二区三区免费观看网站 | 国产欧美精品一区二区色综合朱莉| 麻豆成人久久精品二区三区小说| 欧美成人欧美edvon| 国产美女av一区二区三区| 国产日韩亚洲欧美综合| 色综合久久久久久久久| 亚洲无人区一区| 精品少妇一区二区三区在线播放| 国产在线国偷精品免费看| 国产精品久久毛片a| 91久久精品午夜一区二区| 奇米777欧美一区二区| 国产午夜精品久久| 色婷婷国产精品综合在线观看| 亚洲第一精品在线| 国产校园另类小说区| 91视频免费播放| 日韩精品一二三四| 国产欧美精品一区二区三区四区| 91丝袜美女网| 日本特黄久久久高潮| 欧美国产综合色视频| 日本精品一区二区三区四区的功能| 青青草视频一区| 1000部国产精品成人观看| 欧美人牲a欧美精品| 成人一区在线观看| 日日骚欧美日韩| 中文字幕亚洲欧美在线不卡| 91精品国产黑色紧身裤美女| 高清久久久久久| 日本亚洲天堂网| **网站欧美大片在线观看| 日韩欧美中文字幕一区| 91免费在线播放| 激情文学综合网| 午夜精品一区二区三区免费视频| 国产日韩欧美不卡| 日韩精品一区二区三区四区视频| av电影在线观看一区| 麻豆国产欧美日韩综合精品二区| 一区2区3区在线看| 国产精品区一区二区三区| 日韩一区二区三区在线观看| 色综合中文字幕| 丁香六月综合激情| 九色porny丨国产精品| 五月综合激情网| 亚洲色图20p| 欧美国产丝袜视频| 日韩精品在线网站| 在线播放欧美女士性生活| 94色蜜桃网一区二区三区| 国产剧情av麻豆香蕉精品| 日韩成人免费电影| 亚洲va天堂va国产va久| 亚洲人成精品久久久久| 欧美国产欧美综合| 久久久精品欧美丰满| 精品国产一区a| 精品精品国产高清a毛片牛牛| 欧美日韩国产123区| 日本丰满少妇一区二区三区| 91蜜桃视频在线| 不卡视频免费播放| 不卡影院免费观看| 99久精品国产| 91蜜桃网址入口| 91国产福利在线| 91黄色免费版| 欧日韩精品视频| 欧美日韩国产成人在线免费| 欧美日韩你懂得| 欧美日韩夫妻久久| 91精品黄色片免费大全| 538prom精品视频线放| 欧美三级电影精品| 制服丝袜亚洲精品中文字幕| 欧美精品在欧美一区二区少妇| 欧美性生活久久| 欧美一区二区视频网站| 日韩久久精品一区| 久久综合九色综合97_久久久| ww亚洲ww在线观看国产| 久久奇米777| 中国色在线观看另类| 国产精品免费网站在线观看| 亚洲欧美日韩久久| 天堂一区二区在线| 久久99最新地址| 国产91丝袜在线观看| 不卡电影一区二区三区| 欧美亚一区二区| 日韩欧美亚洲另类制服综合在线| 欧美xfplay| 国产精品久久久久久久久快鸭| 亚洲欧美成人一区二区三区| 亚洲成人激情综合网| 麻豆成人免费电影| av不卡在线播放| 欧美老女人第四色| 国产亚洲精久久久久久| 亚洲最大成人综合| 久久97超碰国产精品超碰| 国产不卡视频在线观看| 91福利精品视频| 日韩欧美国产麻豆| 国产精品美女久久久久aⅴ国产馆| 一区二区三区资源| 久久99久久久欧美国产| av色综合久久天堂av综合| 欧美高清视频www夜色资源网| 精品国产91乱码一区二区三区| 亚洲欧洲一区二区在线播放| 三级成人在线视频| 99国产精品久| 欧美精品一区二区三区视频| 亚洲另类春色国产| 国产一区二区三区电影在线观看 | 日韩国产欧美在线观看| 国产成人免费在线观看不卡| 日本韩国精品在线| 国产欧美一区二区在线| 亚洲成人av一区二区三区| 国产精品99久久久久久宅男| 欧美最新大片在线看| 久久精品一区四区| 丝袜亚洲另类欧美综合| 97久久精品人人爽人人爽蜜臀| 日韩欧美在线网站| 一区二区视频在线| 国产91色综合久久免费分享| 欧美精品一二三区| 亚洲日韩欧美一区二区在线| 韩国欧美一区二区| 51精品国自产在线| 亚洲伦在线观看| 成人影视亚洲图片在线| 26uuu欧美| 久久精工是国产品牌吗| 欧美系列亚洲系列| 亚洲精品视频在线观看免费 | 成人免费av在线| www成人在线观看| 日日摸夜夜添夜夜添国产精品| 91免费视频网址| 中文字幕日韩一区| 丰满白嫩尤物一区二区| 精品成人私密视频| 捆绑调教美女网站视频一区| 欧美日韩精品欧美日韩精品| 亚洲欧美国产高清| 91麻豆产精品久久久久久| 中文字幕一区二区日韩精品绯色| 国产高清在线精品| 国产欧美一区二区精品仙草咪| 久久精品国产在热久久| 欧美一区二区国产| 奇米777欧美一区二区| 91精品久久久久久久99蜜桃| 偷窥少妇高潮呻吟av久久免费| 欧美综合天天夜夜久久| 一区二区三区91| 欧美性生活久久| 日韩精品一卡二卡三卡四卡无卡| 欧美日韩一区成人| 午夜久久久影院| 日韩一级免费观看| 免费不卡在线观看| 欧美成人免费网站| 国产原创一区二区| 国产色一区二区| 91玉足脚交白嫩脚丫在线播放| 国产精品国产三级国产普通话99| 成人动漫一区二区三区| 亚洲日本在线天堂| 欧美日韩免费视频| 日韩电影免费在线| 久久伊99综合婷婷久久伊| 国产一二精品视频| 国产精品美女久久久久久久久久久 | 国产麻豆精品视频| 亚洲国产电影在线观看| aaa国产一区| 一区二区三区欧美在线观看| 欧美午夜在线一二页| 日韩二区在线观看| 久久精品一区二区三区四区| av亚洲精华国产精华| 亚洲综合成人网| 日韩欧美在线一区二区三区| 国产aⅴ综合色| 亚洲国产精品精华液网站| 91精品国产色综合久久久蜜香臀| 麻豆精品一二三| 亚洲日本护士毛茸茸|