diff --git a/README.md b/README.md
index 32c865b91..a6c09ecc8 100644
--- a/README.md
+++ b/README.md
@@ -76,15 +76,6 @@ The main types provided by this library are:
* aes192-cbc
* aes256-cbc
* 3des-cbc
-* blowfish-cbc
-* twofish-cbc
-* twofish192-cbc
-* twofish128-cbc
-* twofish256-cbc
-* arcfour
-* arcfour128
-* arcfour256
-* cast128-cbc
## Key Exchange Methods
@@ -134,18 +125,10 @@ Private keys can be encrypted using one of the following cipher methods:
**SSH.NET** supports the following MAC algorithms:
* hmac-sha2-256
* hmac-sha2-512
-* hmac-sha2-512-96
-* hmac-sha2-256-96
* hmac-sha1
-* hmac-sha1-96
-* hmac-md5
-* hmac-md5-96
* hmac-sha2-256-etm@openssh.com
* hmac-sha2-512-etm@openssh.com
* hmac-sha1-etm@openssh.com
-* hmac-sha1-96-etm@openssh.com
-* hmac-md5-etm@openssh.com
-* hmac-md5-96-etm@openssh.com
## Compression
diff --git a/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs b/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs
index 1f98712b0..1567af3ef 100644
--- a/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs
+++ b/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs
@@ -1,7 +1,5 @@
using System;
-using Renci.SshNet.Security.Cryptography;
-
namespace Renci.SshNet.Abstractions
{
internal static class CryptoAbstraction
@@ -62,55 +60,5 @@ public static System.Security.Cryptography.SHA512 CreateSHA512()
{
return System.Security.Cryptography.SHA512.Create();
}
-
- public static System.Security.Cryptography.HMACMD5 CreateHMACMD5(byte[] key)
- {
- return new System.Security.Cryptography.HMACMD5(key);
- }
-
- public static HMACMD5 CreateHMACMD5(byte[] key, int hashSize)
- {
- return new HMACMD5(key, hashSize);
- }
-
- public static System.Security.Cryptography.HMACSHA1 CreateHMACSHA1(byte[] key)
- {
- return new System.Security.Cryptography.HMACSHA1(key);
- }
-
- public static HMACSHA1 CreateHMACSHA1(byte[] key, int hashSize)
- {
- return new HMACSHA1(key, hashSize);
- }
-
- public static System.Security.Cryptography.HMACSHA256 CreateHMACSHA256(byte[] key)
- {
- return new System.Security.Cryptography.HMACSHA256(key);
- }
-
- public static HMACSHA256 CreateHMACSHA256(byte[] key, int hashSize)
- {
- return new HMACSHA256(key, hashSize);
- }
-
- public static System.Security.Cryptography.HMACSHA384 CreateHMACSHA384(byte[] key)
- {
- return new System.Security.Cryptography.HMACSHA384(key);
- }
-
- public static HMACSHA384 CreateHMACSHA384(byte[] key, int hashSize)
- {
- return new HMACSHA384(key, hashSize);
- }
-
- public static System.Security.Cryptography.HMACSHA512 CreateHMACSHA512(byte[] key)
- {
- return new System.Security.Cryptography.HMACSHA512(key);
- }
-
- public static HMACSHA512 CreateHMACSHA512(byte[] key, int hashSize)
- {
- return new HMACSHA512(key, hashSize);
- }
}
}
diff --git a/src/Renci.SshNet/ConnectionInfo.cs b/src/Renci.SshNet/ConnectionInfo.cs
index f5609dc58..4c2e9b375 100644
--- a/src/Renci.SshNet/ConnectionInfo.cs
+++ b/src/Renci.SshNet/ConnectionInfo.cs
@@ -5,7 +5,6 @@
using System.Security.Cryptography;
using System.Text;
-using Renci.SshNet.Abstractions;
using Renci.SshNet.Common;
using Renci.SshNet.Compression;
using Renci.SshNet.Messages.Authentication;
@@ -397,37 +396,18 @@ public ConnectionInfo(string host, int port, string username, ProxyTypes proxyTy
Encryptions.Add("aes192-cbc", new CipherInfo(192, (key, iv) => new AesCipher(key, iv, AesCipherMode.CBC, pkcs7Padding: false)));
Encryptions.Add("aes256-cbc", new CipherInfo(256, (key, iv) => new AesCipher(key, iv, AesCipherMode.CBC, pkcs7Padding: false)));
Encryptions.Add("3des-cbc", new CipherInfo(192, (key, iv) => new TripleDesCipher(key, new CbcCipherMode(iv), padding: null)));
- Encryptions.Add("blowfish-cbc", new CipherInfo(128, (key, iv) => new BlowfishCipher(key, new CbcCipherMode(iv), padding: null)));
- Encryptions.Add("twofish-cbc", new CipherInfo(256, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
- Encryptions.Add("twofish192-cbc", new CipherInfo(192, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
- Encryptions.Add("twofish128-cbc", new CipherInfo(128, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
- Encryptions.Add("twofish256-cbc", new CipherInfo(256, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null)));
- Encryptions.Add("arcfour", new CipherInfo(128, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: false)));
- Encryptions.Add("arcfour128", new CipherInfo(128, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: true)));
- Encryptions.Add("arcfour256", new CipherInfo(256, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: true)));
- Encryptions.Add("cast128-cbc", new CipherInfo(128, (key, iv) => new CastCipher(key, new CbcCipherMode(iv), padding: null)));
-
-#pragma warning disable IDE0200 // Remove unnecessary lambda expression; We want to prevent instantiating the HashAlgorithm objects.
+
HmacAlgorithms = new Dictionary
{
/* Encrypt-and-MAC (encrypt-and-authenticate) variants */
- { "hmac-sha2-256", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key), isEncryptThenMAC: false) },
- { "hmac-sha2-512", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key), isEncryptThenMAC: false) },
- { "hmac-sha2-512-96", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key, 96), isEncryptThenMAC: false) },
- { "hmac-sha2-256-96", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key, 96), isEncryptThenMAC: false) },
- { "hmac-sha1", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key), isEncryptThenMAC: false) },
- { "hmac-sha1-96", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key, 96), isEncryptThenMAC: false) },
- { "hmac-md5", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key), isEncryptThenMAC: false) },
- { "hmac-md5-96", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key, 96), isEncryptThenMAC: false) },
+ { "hmac-sha2-256", new HashInfo(32*8, key => new HMACSHA256(key)) },
+ { "hmac-sha2-512", new HashInfo(64*8, key => new HMACSHA512(key)) },
+ { "hmac-sha1", new HashInfo(20*8, key => new HMACSHA1(key)) },
/* Encrypt-then-MAC variants */
- { "hmac-sha2-256-etm@openssh.com", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key), isEncryptThenMAC: true) },
- { "hmac-sha2-512-etm@openssh.com", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key), isEncryptThenMAC: true) },
- { "hmac-sha1-etm@openssh.com", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key), isEncryptThenMAC: true) },
- { "hmac-sha1-96-etm@openssh.com", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key, 96), isEncryptThenMAC: true) },
- { "hmac-md5-etm@openssh.com", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key), isEncryptThenMAC: true) },
- { "hmac-md5-96-etm@openssh.com", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key, 96), isEncryptThenMAC: true) },
+ { "hmac-sha2-256-etm@openssh.com", new HashInfo(32*8, key => new HMACSHA256(key), isEncryptThenMAC: true) },
+ { "hmac-sha2-512-etm@openssh.com", new HashInfo(64*8, key => new HMACSHA512(key), isEncryptThenMAC: true) },
+ { "hmac-sha1-etm@openssh.com", new HashInfo(20*8, key => new HMACSHA1(key), isEncryptThenMAC: true) },
};
-#pragma warning restore IDE0200 // Remove unnecessary lambda expression
HostKeyAlgorithms = new Dictionary>
{
diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs
deleted file mode 100644
index 43805d65f..000000000
--- a/src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs
+++ /dev/null
@@ -1,140 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
- ///
- /// Implements ARCH4 cipher algorithm.
- ///
- public sealed class Arc4Cipher : StreamCipher
- {
-#pragma warning disable SA1310 // Field names should not contain underscore
- private const int STATE_LENGTH = 256;
-#pragma warning restore SA1310 // Field names should not contain underscore
-
- ///
- /// Holds the state of the RC4 engine.
- ///
- private byte[] _engineState;
-
- private int _x;
-
- private int _y;
-
- ///
- /// Gets the minimum data size.
- ///
- ///
- /// The minimum data size.
- ///
- public override byte MinimumSize
- {
- get { return 0; }
- }
-
- ///
- /// Initializes a new instance of the class.
- ///
- /// The key.
- /// if set to will disharged first 1536 bytes.
- /// is .
- public Arc4Cipher(byte[] key, bool dischargeFirstBytes)
- : base(key)
- {
- SetKey(key);
-
- // The first 1536 bytes of keystream generated by the cipher MUST be discarded, and the first byte of the
- // first encrypted packet MUST be encrypted using the 1537th byte of keystream.
- if (dischargeFirstBytes)
- {
- _ = Encrypt(new byte[1536]);
- }
- }
-
- ///
- /// Encrypts the specified input.
- ///
- /// The input.
- /// The zero-based offset in at which to begin encrypting.
- /// The number of bytes to encrypt from .
- ///
- /// Encrypted data.
- ///
- public override byte[] Encrypt(byte[] input, int offset, int length)
- {
- var output = new byte[length];
- _ = ProcessBytes(input, offset, length, output, 0);
- return output;
- }
-
- ///
- /// Decrypts the specified input.
- ///
- /// The input.
- /// The zero-based offset in at which to begin decrypting.
- /// The number of bytes to decrypt from .
- ///
- /// The decrypted data.
- ///
- public override byte[] Decrypt(byte[] input, int offset, int length)
- {
- return Encrypt(input, offset, length);
- }
-
- private int ProcessBytes(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- if ((inputOffset + inputCount) > inputBuffer.Length)
- {
- throw new ArgumentException("input buffer too short");
- }
-
- if ((outputOffset + inputCount) > outputBuffer.Length)
- {
- throw new ArgumentException("output buffer too short");
- }
-
- for (var i = 0; i < inputCount; i++)
- {
- _x = (_x + 1) & 0xff;
- _y = (_engineState[_x] + _y) & 0xff;
-
- // swap
- var tmp = _engineState[_x];
- _engineState[_x] = _engineState[_y];
- _engineState[_y] = tmp;
-
- // xor
- outputBuffer[i + outputOffset] = (byte)(inputBuffer[i + inputOffset] ^ _engineState[(_engineState[_x] + _engineState[_y]) & 0xff]);
- }
-
- return inputCount;
- }
-
- private void SetKey(byte[] keyBytes)
- {
- _x = 0;
- _y = 0;
-
- _engineState ??= new byte[STATE_LENGTH];
-
- // reset the state of the engine
- for (var i = 0; i < STATE_LENGTH; i++)
- {
- _engineState[i] = (byte)i;
- }
-
- var i1 = 0;
- var i2 = 0;
-
- for (var i = 0; i < STATE_LENGTH; i++)
- {
- i2 = ((keyBytes[i1] & 0xff) + _engineState[i] + i2) & 0xff;
-
- // do the byte-swap inline
- var tmp = _engineState[i];
- _engineState[i] = _engineState[i2];
- _engineState[i2] = tmp;
- i1 = (i1 + 1) % keyBytes.Length;
- }
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs
deleted file mode 100644
index 7a7eebdaa..000000000
--- a/src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs
+++ /dev/null
@@ -1,526 +0,0 @@
-using System;
-using System.Buffers.Binary;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
- ///
- /// Blowfish cipher implementation.
- ///
- public sealed class BlowfishCipher : BlockCipher
- {
- private const int Rounds = 16;
-
- private const int SboxSk = 256;
-
- private const int PSize = Rounds + 2;
-
- #region Static reference tables
-
- private static readonly uint[] KP =
- {
- 0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344,
- 0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89,
- 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
- 0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917,
- 0x9216D5D9, 0x8979FB1B
- };
-
- private static readonly uint[] KS0 =
- {
- 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7,
- 0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99,
- 0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16,
- 0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E,
- 0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE,
- 0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013,
- 0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF,
- 0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E,
- 0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60,
- 0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440,
- 0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE,
- 0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A,
- 0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E,
- 0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677,
- 0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193,
- 0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032,
- 0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88,
- 0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239,
- 0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E,
- 0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0,
- 0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3,
- 0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98,
- 0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88,
- 0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE,
- 0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6,
- 0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D,
- 0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B,
- 0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7,
- 0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA,
- 0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463,
- 0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F,
- 0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09,
- 0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3,
- 0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB,
- 0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279,
- 0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8,
- 0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB,
- 0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82,
- 0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB,
- 0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573,
- 0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0,
- 0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B,
- 0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790,
- 0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8,
- 0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4,
- 0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0,
- 0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7,
- 0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C,
- 0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD,
- 0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1,
- 0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299,
- 0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9,
- 0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477,
- 0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF,
- 0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49,
- 0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF,
- 0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA,
- 0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5,
- 0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41,
- 0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915,
- 0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400,
- 0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915,
- 0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664,
- 0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A
- };
-
- private static readonly uint[] KS1 =
- {
- 0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623,
- 0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266,
- 0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1,
- 0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E,
- 0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6,
- 0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1,
- 0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E,
- 0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1,
- 0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737,
- 0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8,
- 0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF,
- 0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD,
- 0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701,
- 0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7,
- 0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41,
- 0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331,
- 0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF,
- 0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF,
- 0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E,
- 0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87,
- 0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C,
- 0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2,
- 0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16,
- 0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD,
- 0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B,
- 0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509,
- 0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E,
- 0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3,
- 0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F,
- 0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A,
- 0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4,
- 0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960,
- 0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66,
- 0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28,
- 0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802,
- 0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84,
- 0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510,
- 0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF,
- 0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14,
- 0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E,
- 0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50,
- 0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7,
- 0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8,
- 0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281,
- 0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99,
- 0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696,
- 0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128,
- 0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73,
- 0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0,
- 0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0,
- 0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105,
- 0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250,
- 0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3,
- 0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285,
- 0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00,
- 0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061,
- 0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB,
- 0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E,
- 0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735,
- 0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC,
- 0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9,
- 0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340,
- 0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20,
- 0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7
- };
-
- private static readonly uint[] KS2 =
- {
- 0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934,
- 0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068,
- 0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF,
- 0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840,
- 0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45,
- 0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504,
- 0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A,
- 0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB,
- 0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE,
- 0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6,
- 0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42,
- 0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B,
- 0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2,
- 0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB,
- 0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527,
- 0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B,
- 0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33,
- 0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C,
- 0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3,
- 0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC,
- 0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17,
- 0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564,
- 0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B,
- 0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115,
- 0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922,
- 0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728,
- 0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0,
- 0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E,
- 0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37,
- 0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D,
- 0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804,
- 0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B,
- 0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3,
- 0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB,
- 0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D,
- 0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C,
- 0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350,
- 0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9,
- 0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A,
- 0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE,
- 0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D,
- 0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC,
- 0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F,
- 0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61,
- 0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2,
- 0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9,
- 0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2,
- 0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C,
- 0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E,
- 0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633,
- 0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10,
- 0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169,
- 0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52,
- 0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027,
- 0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5,
- 0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62,
- 0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634,
- 0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76,
- 0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24,
- 0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC,
- 0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4,
- 0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C,
- 0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837,
- 0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0
- };
-
- private static readonly uint[] KS3 =
- {
- 0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B,
- 0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE,
- 0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B,
- 0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4,
- 0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8,
- 0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6,
- 0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304,
- 0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22,
- 0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4,
- 0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6,
- 0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9,
- 0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59,
- 0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593,
- 0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51,
- 0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28,
- 0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C,
- 0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B,
- 0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28,
- 0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C,
- 0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD,
- 0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A,
- 0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319,
- 0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB,
- 0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F,
- 0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991,
- 0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32,
- 0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680,
- 0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166,
- 0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE,
- 0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB,
- 0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5,
- 0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47,
- 0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370,
- 0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D,
- 0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84,
- 0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048,
- 0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8,
- 0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD,
- 0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9,
- 0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7,
- 0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38,
- 0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F,
- 0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C,
- 0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525,
- 0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1,
- 0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442,
- 0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964,
- 0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E,
- 0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8,
- 0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D,
- 0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F,
- 0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299,
- 0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02,
- 0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC,
- 0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614,
- 0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A,
- 0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6,
- 0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B,
- 0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0,
- 0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060,
- 0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E,
- 0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9,
- 0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F,
- 0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6
- };
-
- #endregion
-
- ///
- /// The s-boxes.
- ///
- private readonly uint[] _s0;
- private readonly uint[] _s1;
- private readonly uint[] _s2;
- private readonly uint[] _s3;
-
- ///
- /// The p-array.
- ///
- private readonly uint[] _p;
-
- ///
- /// Initializes a new instance of the class.
- ///
- /// The key.
- /// The mode.
- /// The padding.
- /// is .
- /// Keysize is not valid for this algorithm.
- public BlowfishCipher(byte[] key, CipherMode mode, CipherPadding padding)
- : base(key, 8, mode, padding)
- {
- var keySize = key.Length * 8;
-
- if (keySize is < 1 or > 448)
- {
- throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
- }
-
- _s0 = new uint[SboxSk];
- _s1 = new uint[SboxSk];
- _s2 = new uint[SboxSk];
- _s3 = new uint[SboxSk];
- _p = new uint[PSize];
-
- SetKey(key);
- }
-
- ///
- /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
- ///
- /// The input data to encrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write encrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes encrypted.
- ///
- public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- if (inputCount != BlockSize)
- {
- throw new ArgumentException("inputCount");
- }
-
- var xl = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
- var xr = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
- xl ^= _p[0];
-
- for (var i = 1; i < Rounds; i += 2)
- {
- xr ^= F(xl) ^ _p[i];
- xl ^= F(xr) ^ _p[i + 1];
- }
-
- xr ^= _p[Rounds + 1];
-
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), xr);
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), xl);
-
- return BlockSize;
- }
-
- ///
- /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
- ///
- /// The input data to decrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write decrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes decrypted.
- ///
- public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- if (inputCount != BlockSize)
- {
- throw new ArgumentException("inputCount");
- }
-
- var xl = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
- var xr = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
- xl ^= _p[Rounds + 1];
-
- for (var i = Rounds; i > 0; i -= 2)
- {
- xr ^= F(xl) ^ _p[i];
- xl ^= F(xr) ^ _p[i - 1];
- }
-
- xr ^= _p[0];
-
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), xr);
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), xl);
-
- return BlockSize;
- }
-
- private uint F(uint x)
- {
- return ((_s0[x >> 24] + _s1[(x >> 16) & 0xff]) ^ _s2[(x >> 8) & 0xff]) + _s3[x & 0xff];
- }
-
- private void SetKey(byte[] key)
- {
- /*
- * - comments are from _Applied Crypto_, Schneier, p338
- * please be careful comparing the two, AC numbers the
- * arrays from 1, the enclosed code from 0.
- *
- * (1)
- * Initialise the S-boxes and the P-array, with a fixed string
- * This string contains the hexadecimal digits of pi (3.141...)
- */
- Buffer.BlockCopy(KS0, 0, _s0, 0, SboxSk * sizeof(uint));
- Buffer.BlockCopy(KS1, 0, _s1, 0, SboxSk * sizeof(uint));
- Buffer.BlockCopy(KS2, 0, _s2, 0, SboxSk * sizeof(uint));
- Buffer.BlockCopy(KS3, 0, _s3, 0, SboxSk * sizeof(uint));
- Buffer.BlockCopy(KP, 0, _p, 0, PSize * sizeof(uint));
-
- /*
- * (2)
- * Now, XOR P[0] with the first 32 bits of the key, XOR P[1] with the
- * second 32-bits of the key, and so on for all bits of the key
- * (up to P[17]). Repeatedly cycle through the key bits until the
- * entire P-array has been XOR-ed with the key bits
- */
- var keyLength = key.Length;
- var keyIndex = 0;
-
- for (var i = 0; i < PSize; i++)
- {
- // Get the 32 bits of the key, in 4 * 8 bit chunks
- uint data = 0x0000000;
- for (var j = 0; j < 4; j++)
- {
- // create a 32 bit block
- data = (data << 8) | key[keyIndex++];
-
- // wrap when we get to the end of the key
- if (keyIndex >= keyLength)
- {
- keyIndex = 0;
- }
- }
-
- // XOR the newly created 32 bit chunk onto the P-array
- _p[i] ^= data;
- }
-
- /*
- * (3)
- * Encrypt the all-zero string with the Blowfish algorithm, using
- * the subkeys described in (1) and (2)
- *
- * (4)
- * Replace P1 and P2 with the output of step (3)
- *
- * (5)
- * Encrypt the output of step(3) using the Blowfish algorithm,
- * with the modified subkeys.
- *
- * (6)
- * Replace P3 and P4 with the output of step (5)
- *
- * (7)
- * Continue the process, replacing all elements of the P-array
- * and then all four S-boxes in order, with the output of the
- * continuously changing Blowfish algorithm
- */
-
- ProcessTable(0, 0, _p);
- ProcessTable(_p[PSize - 2], _p[PSize - 1], _s0);
- ProcessTable(_s0[SboxSk - 2], _s0[SboxSk - 1], _s1);
- ProcessTable(_s1[SboxSk - 2], _s1[SboxSk - 1], _s2);
- ProcessTable(_s2[SboxSk - 2], _s2[SboxSk - 1], _s3);
- }
-
- ///
- /// apply the encryption cycle to each value pair in the table.
- ///
- /// The xl.
- /// The xr.
- /// The table.
- private void ProcessTable(uint xl, uint xr, uint[] table)
- {
- var size = table.Length;
-
- for (var s = 0; s < size; s += 2)
- {
- xl ^= _p[0];
-
- for (var i = 1; i < Rounds; i += 2)
- {
- xr ^= F(xl) ^ _p[i];
- xl ^= F(xr) ^ _p[i + 1];
- }
-
- xr ^= _p[Rounds + 1];
-
- table[s] = xr;
- table[s + 1] = xl;
-
- xr = xl; // end of cycle swap
- xl = table[s];
- }
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs
deleted file mode 100644
index c88a1f3a6..000000000
--- a/src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs
+++ /dev/null
@@ -1,725 +0,0 @@
-using System;
-using System.Buffers.Binary;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
- ///
- /// Implements CAST cipher algorithm.
- ///
- public sealed class CastCipher : BlockCipher
- {
- private const int MaxRounds = 16;
-
- private const int RedRounds = 12;
-
- ///
- /// The rotating round key.
- ///
- private readonly int[] _kr = new int[17];
-
- ///
- /// The masking round key.
- ///
- private readonly uint[] _km = new uint[17];
-
- private int _rounds = MaxRounds;
-
- ///
- /// Initializes a new instance of the class.
- ///
- /// The key.
- /// The mode.
- /// The padding.
- /// is .
- /// Keysize is not valid for this algorithm.
- public CastCipher(byte[] key, CipherMode mode, CipherPadding padding)
- : base(key, 8, mode, padding)
- {
- var keySize = key.Length * 8;
-
- if (!(keySize >= 40 && keySize <= 128 && keySize % 8 == 0))
- {
- throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
- }
-
- SetKey(key);
- }
-
- ///
- /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
- ///
- /// The input data to encrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write encrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes encrypted.
- ///
- public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- /*
- * process the input block
- * batch the units up into a 32 bit chunk and go for it
- * the array is in bytes, the increment is 8x8 bits = 64
- */
-
- var l0 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
- var r0 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
- var result = new uint[2];
- CastEncipher(l0, r0, result);
-
- // now stuff them into the destination block
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), result[0]);
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), result[1]);
-
- return BlockSize;
- }
-
- ///
- /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
- ///
- /// The input data to decrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write decrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes decrypted.
- ///
- public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- // process the input block
- // batch the units up into a 32 bit chunk and go for it
- // the array is in bytes, the increment is 8x8 bits = 64
- var l16 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset));
- var r16 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4));
-
- var result = new uint[2];
- CastDecipher(l16, r16, result);
-
- // now stuff them into the destination block
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), result[0]);
- BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), result[1]);
-
- return BlockSize;
- }
-
- #region Static Definition Tables
-
- internal static readonly uint[] S1 =
- {
- 0x30fb40d4, 0x9fa0ff0b, 0x6beccd2f, 0x3f258c7a, 0x1e213f2f, 0x9c004dd3, 0x6003e540, 0xcf9fc949,
- 0xbfd4af27, 0x88bbbdb5, 0xe2034090, 0x98d09675, 0x6e63a0e0, 0x15c361d2, 0xc2e7661d, 0x22d4ff8e,
- 0x28683b6f, 0xc07fd059, 0xff2379c8, 0x775f50e2, 0x43c340d3, 0xdf2f8656, 0x887ca41a, 0xa2d2bd2d,
- 0xa1c9e0d6, 0x346c4819, 0x61b76d87, 0x22540f2f, 0x2abe32e1, 0xaa54166b, 0x22568e3a, 0xa2d341d0,
- 0x66db40c8, 0xa784392f, 0x004dff2f, 0x2db9d2de, 0x97943fac, 0x4a97c1d8, 0x527644b7, 0xb5f437a7,
- 0xb82cbaef, 0xd751d159, 0x6ff7f0ed, 0x5a097a1f, 0x827b68d0, 0x90ecf52e, 0x22b0c054, 0xbc8e5935,
- 0x4b6d2f7f, 0x50bb64a2, 0xd2664910, 0xbee5812d, 0xb7332290, 0xe93b159f, 0xb48ee411, 0x4bff345d,
- 0xfd45c240, 0xad31973f, 0xc4f6d02e, 0x55fc8165, 0xd5b1caad, 0xa1ac2dae, 0xa2d4b76d, 0xc19b0c50,
- 0x882240f2, 0x0c6e4f38, 0xa4e4bfd7, 0x4f5ba272, 0x564c1d2f, 0xc59c5319, 0xb949e354, 0xb04669fe,
- 0xb1b6ab8a, 0xc71358dd, 0x6385c545, 0x110f935d, 0x57538ad5, 0x6a390493, 0xe63d37e0, 0x2a54f6b3,
- 0x3a787d5f, 0x6276a0b5, 0x19a6fcdf, 0x7a42206a, 0x29f9d4d5, 0xf61b1891, 0xbb72275e, 0xaa508167,
- 0x38901091, 0xc6b505eb, 0x84c7cb8c, 0x2ad75a0f, 0x874a1427, 0xa2d1936b, 0x2ad286af, 0xaa56d291,
- 0xd7894360, 0x425c750d, 0x93b39e26, 0x187184c9, 0x6c00b32d, 0x73e2bb14, 0xa0bebc3c, 0x54623779,
- 0x64459eab, 0x3f328b82, 0x7718cf82, 0x59a2cea6, 0x04ee002e, 0x89fe78e6, 0x3fab0950, 0x325ff6c2,
- 0x81383f05, 0x6963c5c8, 0x76cb5ad6, 0xd49974c9, 0xca180dcf, 0x380782d5, 0xc7fa5cf6, 0x8ac31511,
- 0x35e79e13, 0x47da91d0, 0xf40f9086, 0xa7e2419e, 0x31366241, 0x051ef495, 0xaa573b04, 0x4a805d8d,
- 0x548300d0, 0x00322a3c, 0xbf64cddf, 0xba57a68e, 0x75c6372b, 0x50afd341, 0xa7c13275, 0x915a0bf5,
- 0x6b54bfab, 0x2b0b1426, 0xab4cc9d7, 0x449ccd82, 0xf7fbf265, 0xab85c5f3, 0x1b55db94, 0xaad4e324,
- 0xcfa4bd3f, 0x2deaa3e2, 0x9e204d02, 0xc8bd25ac, 0xeadf55b3, 0xd5bd9e98, 0xe31231b2, 0x2ad5ad6c,
- 0x954329de, 0xadbe4528, 0xd8710f69, 0xaa51c90f, 0xaa786bf6, 0x22513f1e, 0xaa51a79b, 0x2ad344cc,
- 0x7b5a41f0, 0xd37cfbad, 0x1b069505, 0x41ece491, 0xb4c332e6, 0x032268d4, 0xc9600acc, 0xce387e6d,
- 0xbf6bb16c, 0x6a70fb78, 0x0d03d9c9, 0xd4df39de, 0xe01063da, 0x4736f464, 0x5ad328d8, 0xb347cc96,
- 0x75bb0fc3, 0x98511bfb, 0x4ffbcc35, 0xb58bcf6a, 0xe11f0abc, 0xbfc5fe4a, 0xa70aec10, 0xac39570a,
- 0x3f04442f, 0x6188b153, 0xe0397a2e, 0x5727cb79, 0x9ceb418f, 0x1cacd68d, 0x2ad37c96, 0x0175cb9d,
- 0xc69dff09, 0xc75b65f0, 0xd9db40d8, 0xec0e7779, 0x4744ead4, 0xb11c3274, 0xdd24cb9e, 0x7e1c54bd,
- 0xf01144f9, 0xd2240eb1, 0x9675b3fd, 0xa3ac3755, 0xd47c27af, 0x51c85f4d, 0x56907596, 0xa5bb15e6,
- 0x580304f0, 0xca042cf1, 0x011a37ea, 0x8dbfaadb, 0x35ba3e4a, 0x3526ffa0, 0xc37b4d09, 0xbc306ed9,
- 0x98a52666, 0x5648f725, 0xff5e569d, 0x0ced63d0, 0x7c63b2cf, 0x700b45e1, 0xd5ea50f1, 0x85a92872,
- 0xaf1fbda7, 0xd4234870, 0xa7870bf3, 0x2d3b4d79, 0x42e04198, 0x0cd0ede7, 0x26470db8, 0xf881814c,
- 0x474d6ad7, 0x7c0c5e5c, 0xd1231959, 0x381b7298, 0xf5d2f4db, 0xab838653, 0x6e2f1e23, 0x83719c9e,
- 0xbd91e046, 0x9a56456e, 0xdc39200c, 0x20c8c571, 0x962bda1c, 0xe1e696ff, 0xb141ab08, 0x7cca89b9,
- 0x1a69e783, 0x02cc4843, 0xa2f7c579, 0x429ef47d, 0x427b169c, 0x5ac9f049, 0xdd8f0f00, 0x5c8165bf
- };
-
- internal static readonly uint[] S2 =
- {
- 0x1f201094, 0xef0ba75b, 0x69e3cf7e, 0x393f4380, 0xfe61cf7a, 0xeec5207a, 0x55889c94, 0x72fc0651,
- 0xada7ef79, 0x4e1d7235, 0xd55a63ce, 0xde0436ba, 0x99c430ef, 0x5f0c0794, 0x18dcdb7d, 0xa1d6eff3,
- 0xa0b52f7b, 0x59e83605, 0xee15b094, 0xe9ffd909, 0xdc440086, 0xef944459, 0xba83ccb3, 0xe0c3cdfb,
- 0xd1da4181, 0x3b092ab1, 0xf997f1c1, 0xa5e6cf7b, 0x01420ddb, 0xe4e7ef5b, 0x25a1ff41, 0xe180f806,
- 0x1fc41080, 0x179bee7a, 0xd37ac6a9, 0xfe5830a4, 0x98de8b7f, 0x77e83f4e, 0x79929269, 0x24fa9f7b,
- 0xe113c85b, 0xacc40083, 0xd7503525, 0xf7ea615f, 0x62143154, 0x0d554b63, 0x5d681121, 0xc866c359,
- 0x3d63cf73, 0xcee234c0, 0xd4d87e87, 0x5c672b21, 0x071f6181, 0x39f7627f, 0x361e3084, 0xe4eb573b,
- 0x602f64a4, 0xd63acd9c, 0x1bbc4635, 0x9e81032d, 0x2701f50c, 0x99847ab4, 0xa0e3df79, 0xba6cf38c,
- 0x10843094, 0x2537a95e, 0xf46f6ffe, 0xa1ff3b1f, 0x208cfb6a, 0x8f458c74, 0xd9e0a227, 0x4ec73a34,
- 0xfc884f69, 0x3e4de8df, 0xef0e0088, 0x3559648d, 0x8a45388c, 0x1d804366, 0x721d9bfd, 0xa58684bb,
- 0xe8256333, 0x844e8212, 0x128d8098, 0xfed33fb4, 0xce280ae1, 0x27e19ba5, 0xd5a6c252, 0xe49754bd,
- 0xc5d655dd, 0xeb667064, 0x77840b4d, 0xa1b6a801, 0x84db26a9, 0xe0b56714, 0x21f043b7, 0xe5d05860,
- 0x54f03084, 0x066ff472, 0xa31aa153, 0xdadc4755, 0xb5625dbf, 0x68561be6, 0x83ca6b94, 0x2d6ed23b,
- 0xeccf01db, 0xa6d3d0ba, 0xb6803d5c, 0xaf77a709, 0x33b4a34c, 0x397bc8d6, 0x5ee22b95, 0x5f0e5304,
- 0x81ed6f61, 0x20e74364, 0xb45e1378, 0xde18639b, 0x881ca122, 0xb96726d1, 0x8049a7e8, 0x22b7da7b,
- 0x5e552d25, 0x5272d237, 0x79d2951c, 0xc60d894c, 0x488cb402, 0x1ba4fe5b, 0xa4b09f6b, 0x1ca815cf,
- 0xa20c3005, 0x8871df63, 0xb9de2fcb, 0x0cc6c9e9, 0x0beeff53, 0xe3214517, 0xb4542835, 0x9f63293c,
- 0xee41e729, 0x6e1d2d7c, 0x50045286, 0x1e6685f3, 0xf33401c6, 0x30a22c95, 0x31a70850, 0x60930f13,
- 0x73f98417, 0xa1269859, 0xec645c44, 0x52c877a9, 0xcdff33a6, 0xa02b1741, 0x7cbad9a2, 0x2180036f,
- 0x50d99c08, 0xcb3f4861, 0xc26bd765, 0x64a3f6ab, 0x80342676, 0x25a75e7b, 0xe4e6d1fc, 0x20c710e6,
- 0xcdf0b680, 0x17844d3b, 0x31eef84d, 0x7e0824e4, 0x2ccb49eb, 0x846a3bae, 0x8ff77888, 0xee5d60f6,
- 0x7af75673, 0x2fdd5cdb, 0xa11631c1, 0x30f66f43, 0xb3faec54, 0x157fd7fa, 0xef8579cc, 0xd152de58,
- 0xdb2ffd5e, 0x8f32ce19, 0x306af97a, 0x02f03ef8, 0x99319ad5, 0xc242fa0f, 0xa7e3ebb0, 0xc68e4906,
- 0xb8da230c, 0x80823028, 0xdcdef3c8, 0xd35fb171, 0x088a1bc8, 0xbec0c560, 0x61a3c9e8, 0xbca8f54d,
- 0xc72feffa, 0x22822e99, 0x82c570b4, 0xd8d94e89, 0x8b1c34bc, 0x301e16e6, 0x273be979, 0xb0ffeaa6,
- 0x61d9b8c6, 0x00b24869, 0xb7ffce3f, 0x08dc283b, 0x43daf65a, 0xf7e19798, 0x7619b72f, 0x8f1c9ba4,
- 0xdc8637a0, 0x16a7d3b1, 0x9fc393b7, 0xa7136eeb, 0xc6bcc63e, 0x1a513742, 0xef6828bc, 0x520365d6,
- 0x2d6a77ab, 0x3527ed4b, 0x821fd216, 0x095c6e2e, 0xdb92f2fb, 0x5eea29cb, 0x145892f5, 0x91584f7f,
- 0x5483697b, 0x2667a8cc, 0x85196048, 0x8c4bacea, 0x833860d4, 0x0d23e0f9, 0x6c387e8a, 0x0ae6d249,
- 0xb284600c, 0xd835731d, 0xdcb1c647, 0xac4c56ea, 0x3ebd81b3, 0x230eabb0, 0x6438bc87, 0xf0b5b1fa,
- 0x8f5ea2b3, 0xfc184642, 0x0a036b7a, 0x4fb089bd, 0x649da589, 0xa345415e, 0x5c038323, 0x3e5d3bb9,
- 0x43d79572, 0x7e6dd07c, 0x06dfdf1e, 0x6c6cc4ef, 0x7160a539, 0x73bfbe70, 0x83877605, 0x4523ecf1
- };
-
- internal static readonly uint[] S3 =
- {
- 0x8defc240, 0x25fa5d9f, 0xeb903dbf, 0xe810c907, 0x47607fff, 0x369fe44b, 0x8c1fc644, 0xaececa90,
- 0xbeb1f9bf, 0xeefbcaea, 0xe8cf1950, 0x51df07ae, 0x920e8806, 0xf0ad0548, 0xe13c8d83, 0x927010d5,
- 0x11107d9f, 0x07647db9, 0xb2e3e4d4, 0x3d4f285e, 0xb9afa820, 0xfade82e0, 0xa067268b, 0x8272792e,
- 0x553fb2c0, 0x489ae22b, 0xd4ef9794, 0x125e3fbc, 0x21fffcee, 0x825b1bfd, 0x9255c5ed, 0x1257a240,
- 0x4e1a8302, 0xbae07fff, 0x528246e7, 0x8e57140e, 0x3373f7bf, 0x8c9f8188, 0xa6fc4ee8, 0xc982b5a5,
- 0xa8c01db7, 0x579fc264, 0x67094f31, 0xf2bd3f5f, 0x40fff7c1, 0x1fb78dfc, 0x8e6bd2c1, 0x437be59b,
- 0x99b03dbf, 0xb5dbc64b, 0x638dc0e6, 0x55819d99, 0xa197c81c, 0x4a012d6e, 0xc5884a28, 0xccc36f71,
- 0xb843c213, 0x6c0743f1, 0x8309893c, 0x0feddd5f, 0x2f7fe850, 0xd7c07f7e, 0x02507fbf, 0x5afb9a04,
- 0xa747d2d0, 0x1651192e, 0xaf70bf3e, 0x58c31380, 0x5f98302e, 0x727cc3c4, 0x0a0fb402, 0x0f7fef82,
- 0x8c96fdad, 0x5d2c2aae, 0x8ee99a49, 0x50da88b8, 0x8427f4a0, 0x1eac5790, 0x796fb449, 0x8252dc15,
- 0xefbd7d9b, 0xa672597d, 0xada840d8, 0x45f54504, 0xfa5d7403, 0xe83ec305, 0x4f91751a, 0x925669c2,
- 0x23efe941, 0xa903f12e, 0x60270df2, 0x0276e4b6, 0x94fd6574, 0x927985b2, 0x8276dbcb, 0x02778176,
- 0xf8af918d, 0x4e48f79e, 0x8f616ddf, 0xe29d840e, 0x842f7d83, 0x340ce5c8, 0x96bbb682, 0x93b4b148,
- 0xef303cab, 0x984faf28, 0x779faf9b, 0x92dc560d, 0x224d1e20, 0x8437aa88, 0x7d29dc96, 0x2756d3dc,
- 0x8b907cee, 0xb51fd240, 0xe7c07ce3, 0xe566b4a1, 0xc3e9615e, 0x3cf8209d, 0x6094d1e3, 0xcd9ca341,
- 0x5c76460e, 0x00ea983b, 0xd4d67881, 0xfd47572c, 0xf76cedd9, 0xbda8229c, 0x127dadaa, 0x438a074e,
- 0x1f97c090, 0x081bdb8a, 0x93a07ebe, 0xb938ca15, 0x97b03cff, 0x3dc2c0f8, 0x8d1ab2ec, 0x64380e51,
- 0x68cc7bfb, 0xd90f2788, 0x12490181, 0x5de5ffd4, 0xdd7ef86a, 0x76a2e214, 0xb9a40368, 0x925d958f,
- 0x4b39fffa, 0xba39aee9, 0xa4ffd30b, 0xfaf7933b, 0x6d498623, 0x193cbcfa, 0x27627545, 0x825cf47a,
- 0x61bd8ba0, 0xd11e42d1, 0xcead04f4, 0x127ea392, 0x10428db7, 0x8272a972, 0x9270c4a8, 0x127de50b,
- 0x285ba1c8, 0x3c62f44f, 0x35c0eaa5, 0xe805d231, 0x428929fb, 0xb4fcdf82, 0x4fb66a53, 0x0e7dc15b,
- 0x1f081fab, 0x108618ae, 0xfcfd086d, 0xf9ff2889, 0x694bcc11, 0x236a5cae, 0x12deca4d, 0x2c3f8cc5,
- 0xd2d02dfe, 0xf8ef5896, 0xe4cf52da, 0x95155b67, 0x494a488c, 0xb9b6a80c, 0x5c8f82bc, 0x89d36b45,
- 0x3a609437, 0xec00c9a9, 0x44715253, 0x0a874b49, 0xd773bc40, 0x7c34671c, 0x02717ef6, 0x4feb5536,
- 0xa2d02fff, 0xd2bf60c4, 0xd43f03c0, 0x50b4ef6d, 0x07478cd1, 0x006e1888, 0xa2e53f55, 0xb9e6d4bc,
- 0xa2048016, 0x97573833, 0xd7207d67, 0xde0f8f3d, 0x72f87b33, 0xabcc4f33, 0x7688c55d, 0x7b00a6b0,
- 0x947b0001, 0x570075d2, 0xf9bb88f8, 0x8942019e, 0x4264a5ff, 0x856302e0, 0x72dbd92b, 0xee971b69,
- 0x6ea22fde, 0x5f08ae2b, 0xaf7a616d, 0xe5c98767, 0xcf1febd2, 0x61efc8c2, 0xf1ac2571, 0xcc8239c2,
- 0x67214cb8, 0xb1e583d1, 0xb7dc3e62, 0x7f10bdce, 0xf90a5c38, 0x0ff0443d, 0x606e6dc6, 0x60543a49,
- 0x5727c148, 0x2be98a1d, 0x8ab41738, 0x20e1be24, 0xaf96da0f, 0x68458425, 0x99833be5, 0x600d457d,
- 0x282f9350, 0x8334b362, 0xd91d1120, 0x2b6d8da0, 0x642b1e31, 0x9c305a00, 0x52bce688, 0x1b03588a,
- 0xf7baefd5, 0x4142ed9c, 0xa4315c11, 0x83323ec5, 0xdfef4636, 0xa133c501, 0xe9d3531c, 0xee353783
- };
-
- internal static readonly uint[] S4 =
- {
- 0x9db30420, 0x1fb6e9de, 0xa7be7bef, 0xd273a298, 0x4a4f7bdb, 0x64ad8c57, 0x85510443, 0xfa020ed1,
- 0x7e287aff, 0xe60fb663, 0x095f35a1, 0x79ebf120, 0xfd059d43, 0x6497b7b1, 0xf3641f63, 0x241e4adf,
- 0x28147f5f, 0x4fa2b8cd, 0xc9430040, 0x0cc32220, 0xfdd30b30, 0xc0a5374f, 0x1d2d00d9, 0x24147b15,
- 0xee4d111a, 0x0fca5167, 0x71ff904c, 0x2d195ffe, 0x1a05645f, 0x0c13fefe, 0x081b08ca, 0x05170121,
- 0x80530100, 0xe83e5efe, 0xac9af4f8, 0x7fe72701, 0xd2b8ee5f, 0x06df4261, 0xbb9e9b8a, 0x7293ea25,
- 0xce84ffdf, 0xf5718801, 0x3dd64b04, 0xa26f263b, 0x7ed48400, 0x547eebe6, 0x446d4ca0, 0x6cf3d6f5,
- 0x2649abdf, 0xaea0c7f5, 0x36338cc1, 0x503f7e93, 0xd3772061, 0x11b638e1, 0x72500e03, 0xf80eb2bb,
- 0xabe0502e, 0xec8d77de, 0x57971e81, 0xe14f6746, 0xc9335400, 0x6920318f, 0x081dbb99, 0xffc304a5,
- 0x4d351805, 0x7f3d5ce3, 0xa6c866c6, 0x5d5bcca9, 0xdaec6fea, 0x9f926f91, 0x9f46222f, 0x3991467d,
- 0xa5bf6d8e, 0x1143c44f, 0x43958302, 0xd0214eeb, 0x022083b8, 0x3fb6180c, 0x18f8931e, 0x281658e6,
- 0x26486e3e, 0x8bd78a70, 0x7477e4c1, 0xb506e07c, 0xf32d0a25, 0x79098b02, 0xe4eabb81, 0x28123b23,
- 0x69dead38, 0x1574ca16, 0xdf871b62, 0x211c40b7, 0xa51a9ef9, 0x0014377b, 0x041e8ac8, 0x09114003,
- 0xbd59e4d2, 0xe3d156d5, 0x4fe876d5, 0x2f91a340, 0x557be8de, 0x00eae4a7, 0x0ce5c2ec, 0x4db4bba6,
- 0xe756bdff, 0xdd3369ac, 0xec17b035, 0x06572327, 0x99afc8b0, 0x56c8c391, 0x6b65811c, 0x5e146119,
- 0x6e85cb75, 0xbe07c002, 0xc2325577, 0x893ff4ec, 0x5bbfc92d, 0xd0ec3b25, 0xb7801ab7, 0x8d6d3b24,
- 0x20c763ef, 0xc366a5fc, 0x9c382880, 0x0ace3205, 0xaac9548a, 0xeca1d7c7, 0x041afa32, 0x1d16625a,
- 0x6701902c, 0x9b757a54, 0x31d477f7, 0x9126b031, 0x36cc6fdb, 0xc70b8b46, 0xd9e66a48, 0x56e55a79,
- 0x026a4ceb, 0x52437eff, 0x2f8f76b4, 0x0df980a5, 0x8674cde3, 0xedda04eb, 0x17a9be04, 0x2c18f4df,
- 0xb7747f9d, 0xab2af7b4, 0xefc34d20, 0x2e096b7c, 0x1741a254, 0xe5b6a035, 0x213d42f6, 0x2c1c7c26,
- 0x61c2f50f, 0x6552daf9, 0xd2c231f8, 0x25130f69, 0xd8167fa2, 0x0418f2c8, 0x001a96a6, 0x0d1526ab,
- 0x63315c21, 0x5e0a72ec, 0x49bafefd, 0x187908d9, 0x8d0dbd86, 0x311170a7, 0x3e9b640c, 0xcc3e10d7,
- 0xd5cad3b6, 0x0caec388, 0xf73001e1, 0x6c728aff, 0x71eae2a1, 0x1f9af36e, 0xcfcbd12f, 0xc1de8417,
- 0xac07be6b, 0xcb44a1d8, 0x8b9b0f56, 0x013988c3, 0xb1c52fca, 0xb4be31cd, 0xd8782806, 0x12a3a4e2,
- 0x6f7de532, 0x58fd7eb6, 0xd01ee900, 0x24adffc2, 0xf4990fc5, 0x9711aac5, 0x001d7b95, 0x82e5e7d2,
- 0x109873f6, 0x00613096, 0xc32d9521, 0xada121ff, 0x29908415, 0x7fbb977f, 0xaf9eb3db, 0x29c9ed2a,
- 0x5ce2a465, 0xa730f32c, 0xd0aa3fe8, 0x8a5cc091, 0xd49e2ce7, 0x0ce454a9, 0xd60acd86, 0x015f1919,
- 0x77079103, 0xdea03af6, 0x78a8565e, 0xdee356df, 0x21f05cbe, 0x8b75e387, 0xb3c50651, 0xb8a5c3ef,
- 0xd8eeb6d2, 0xe523be77, 0xc2154529, 0x2f69efdf, 0xafe67afb, 0xf470c4b2, 0xf3e0eb5b, 0xd6cc9876,
- 0x39e4460c, 0x1fda8538, 0x1987832f, 0xca007367, 0xa99144f8, 0x296b299e, 0x492fc295, 0x9266beab,
- 0xb5676e69, 0x9bd3ddda, 0xdf7e052f, 0xdb25701c, 0x1b5e51ee, 0xf65324e6, 0x6afce36c, 0x0316cc04,
- 0x8644213e, 0xb7dc59d0, 0x7965291f, 0xccd6fd43, 0x41823979, 0x932bcdf6, 0xb657c34d, 0x4edfd282,
- 0x7ae5290c, 0x3cb9536b, 0x851e20fe, 0x9833557e, 0x13ecf0b0, 0xd3ffb372, 0x3f85c5c1, 0x0aef7ed2
- };
-
- internal static readonly uint[] S5 =
- {
- 0x7ec90c04, 0x2c6e74b9, 0x9b0e66df, 0xa6337911, 0xb86a7fff, 0x1dd358f5, 0x44dd9d44, 0x1731167f,
- 0x08fbf1fa, 0xe7f511cc, 0xd2051b00, 0x735aba00, 0x2ab722d8, 0x386381cb, 0xacf6243a, 0x69befd7a,
- 0xe6a2e77f, 0xf0c720cd, 0xc4494816, 0xccf5c180, 0x38851640, 0x15b0a848, 0xe68b18cb, 0x4caadeff,
- 0x5f480a01, 0x0412b2aa, 0x259814fc, 0x41d0efe2, 0x4e40b48d, 0x248eb6fb, 0x8dba1cfe, 0x41a99b02,
- 0x1a550a04, 0xba8f65cb, 0x7251f4e7, 0x95a51725, 0xc106ecd7, 0x97a5980a, 0xc539b9aa, 0x4d79fe6a,
- 0xf2f3f763, 0x68af8040, 0xed0c9e56, 0x11b4958b, 0xe1eb5a88, 0x8709e6b0, 0xd7e07156, 0x4e29fea7,
- 0x6366e52d, 0x02d1c000, 0xc4ac8e05, 0x9377f571, 0x0c05372a, 0x578535f2, 0x2261be02, 0xd642a0c9,
- 0xdf13a280, 0x74b55bd2, 0x682199c0, 0xd421e5ec, 0x53fb3ce8, 0xc8adedb3, 0x28a87fc9, 0x3d959981,
- 0x5c1ff900, 0xfe38d399, 0x0c4eff0b, 0x062407ea, 0xaa2f4fb1, 0x4fb96976, 0x90c79505, 0xb0a8a774,
- 0xef55a1ff, 0xe59ca2c2, 0xa6b62d27, 0xe66a4263, 0xdf65001f, 0x0ec50966, 0xdfdd55bc, 0x29de0655,
- 0x911e739a, 0x17af8975, 0x32c7911c, 0x89f89468, 0x0d01e980, 0x524755f4, 0x03b63cc9, 0x0cc844b2,
- 0xbcf3f0aa, 0x87ac36e9, 0xe53a7426, 0x01b3d82b, 0x1a9e7449, 0x64ee2d7e, 0xcddbb1da, 0x01c94910,
- 0xb868bf80, 0x0d26f3fd, 0x9342ede7, 0x04a5c284, 0x636737b6, 0x50f5b616, 0xf24766e3, 0x8eca36c1,
- 0x136e05db, 0xfef18391, 0xfb887a37, 0xd6e7f7d4, 0xc7fb7dc9, 0x3063fcdf, 0xb6f589de, 0xec2941da,
- 0x26e46695, 0xb7566419, 0xf654efc5, 0xd08d58b7, 0x48925401, 0xc1bacb7f, 0xe5ff550f, 0xb6083049,
- 0x5bb5d0e8, 0x87d72e5a, 0xab6a6ee1, 0x223a66ce, 0xc62bf3cd, 0x9e0885f9, 0x68cb3e47, 0x086c010f,
- 0xa21de820, 0xd18b69de, 0xf3f65777, 0xfa02c3f6, 0x407edac3, 0xcbb3d550, 0x1793084d, 0xb0d70eba,
- 0x0ab378d5, 0xd951fb0c, 0xded7da56, 0x4124bbe4, 0x94ca0b56, 0x0f5755d1, 0xe0e1e56e, 0x6184b5be,
- 0x580a249f, 0x94f74bc0, 0xe327888e, 0x9f7b5561, 0xc3dc0280, 0x05687715, 0x646c6bd7, 0x44904db3,
- 0x66b4f0a3, 0xc0f1648a, 0x697ed5af, 0x49e92ff6, 0x309e374f, 0x2cb6356a, 0x85808573, 0x4991f840,
- 0x76f0ae02, 0x083be84d, 0x28421c9a, 0x44489406, 0x736e4cb8, 0xc1092910, 0x8bc95fc6, 0x7d869cf4,
- 0x134f616f, 0x2e77118d, 0xb31b2be1, 0xaa90b472, 0x3ca5d717, 0x7d161bba, 0x9cad9010, 0xaf462ba2,
- 0x9fe459d2, 0x45d34559, 0xd9f2da13, 0xdbc65487, 0xf3e4f94e, 0x176d486f, 0x097c13ea, 0x631da5c7,
- 0x445f7382, 0x175683f4, 0xcdc66a97, 0x70be0288, 0xb3cdcf72, 0x6e5dd2f3, 0x20936079, 0x459b80a5,
- 0xbe60e2db, 0xa9c23101, 0xeba5315c, 0x224e42f2, 0x1c5c1572, 0xf6721b2c, 0x1ad2fff3, 0x8c25404e,
- 0x324ed72f, 0x4067b7fd, 0x0523138e, 0x5ca3bc78, 0xdc0fd66e, 0x75922283, 0x784d6b17, 0x58ebb16e,
- 0x44094f85, 0x3f481d87, 0xfcfeae7b, 0x77b5ff76, 0x8c2302bf, 0xaaf47556, 0x5f46b02a, 0x2b092801,
- 0x3d38f5f7, 0x0ca81f36, 0x52af4a8a, 0x66d5e7c0, 0xdf3b0874, 0x95055110, 0x1b5ad7a8, 0xf61ed5ad,
- 0x6cf6e479, 0x20758184, 0xd0cefa65, 0x88f7be58, 0x4a046826, 0x0ff6f8f3, 0xa09c7f70, 0x5346aba0,
- 0x5ce96c28, 0xe176eda3, 0x6bac307f, 0x376829d2, 0x85360fa9, 0x17e3fe2a, 0x24b79767, 0xf5a96b20,
- 0xd6cd2595, 0x68ff1ebf, 0x7555442c, 0xf19f06be, 0xf9e0659a, 0xeeb9491d, 0x34010718, 0xbb30cab8,
- 0xe822fe15, 0x88570983, 0x750e6249, 0xda627e55, 0x5e76ffa8, 0xb1534546, 0x6d47de08, 0xefe9e7d4
- };
-
- internal static readonly uint[] S6 =
- {
- 0xf6fa8f9d, 0x2cac6ce1, 0x4ca34867, 0xe2337f7c, 0x95db08e7, 0x016843b4, 0xeced5cbc, 0x325553ac,
- 0xbf9f0960, 0xdfa1e2ed, 0x83f0579d, 0x63ed86b9, 0x1ab6a6b8, 0xde5ebe39, 0xf38ff732, 0x8989b138,
- 0x33f14961, 0xc01937bd, 0xf506c6da, 0xe4625e7e, 0xa308ea99, 0x4e23e33c, 0x79cbd7cc, 0x48a14367,
- 0xa3149619, 0xfec94bd5, 0xa114174a, 0xeaa01866, 0xa084db2d, 0x09a8486f, 0xa888614a, 0x2900af98,
- 0x01665991, 0xe1992863, 0xc8f30c60, 0x2e78ef3c, 0xd0d51932, 0xcf0fec14, 0xf7ca07d2, 0xd0a82072,
- 0xfd41197e, 0x9305a6b0, 0xe86be3da, 0x74bed3cd, 0x372da53c, 0x4c7f4448, 0xdab5d440, 0x6dba0ec3,
- 0x083919a7, 0x9fbaeed9, 0x49dbcfb0, 0x4e670c53, 0x5c3d9c01, 0x64bdb941, 0x2c0e636a, 0xba7dd9cd,
- 0xea6f7388, 0xe70bc762, 0x35f29adb, 0x5c4cdd8d, 0xf0d48d8c, 0xb88153e2, 0x08a19866, 0x1ae2eac8,
- 0x284caf89, 0xaa928223, 0x9334be53, 0x3b3a21bf, 0x16434be3, 0x9aea3906, 0xefe8c36e, 0xf890cdd9,
- 0x80226dae, 0xc340a4a3, 0xdf7e9c09, 0xa694a807, 0x5b7c5ecc, 0x221db3a6, 0x9a69a02f, 0x68818a54,
- 0xceb2296f, 0x53c0843a, 0xfe893655, 0x25bfe68a, 0xb4628abc, 0xcf222ebf, 0x25ac6f48, 0xa9a99387,
- 0x53bddb65, 0xe76ffbe7, 0xe967fd78, 0x0ba93563, 0x8e342bc1, 0xe8a11be9, 0x4980740d, 0xc8087dfc,
- 0x8de4bf99, 0xa11101a0, 0x7fd37975, 0xda5a26c0, 0xe81f994f, 0x9528cd89, 0xfd339fed, 0xb87834bf,
- 0x5f04456d, 0x22258698, 0xc9c4c83b, 0x2dc156be, 0x4f628daa, 0x57f55ec5, 0xe2220abe, 0xd2916ebf,
- 0x4ec75b95, 0x24f2c3c0, 0x42d15d99, 0xcd0d7fa0, 0x7b6e27ff, 0xa8dc8af0, 0x7345c106, 0xf41e232f,
- 0x35162386, 0xe6ea8926, 0x3333b094, 0x157ec6f2, 0x372b74af, 0x692573e4, 0xe9a9d848, 0xf3160289,
- 0x3a62ef1d, 0xa787e238, 0xf3a5f676, 0x74364853, 0x20951063, 0x4576698d, 0xb6fad407, 0x592af950,
- 0x36f73523, 0x4cfb6e87, 0x7da4cec0, 0x6c152daa, 0xcb0396a8, 0xc50dfe5d, 0xfcd707ab, 0x0921c42f,
- 0x89dff0bb, 0x5fe2be78, 0x448f4f33, 0x754613c9, 0x2b05d08d, 0x48b9d585, 0xdc049441, 0xc8098f9b,
- 0x7dede786, 0xc39a3373, 0x42410005, 0x6a091751, 0x0ef3c8a6, 0x890072d6, 0x28207682, 0xa9a9f7be,
- 0xbf32679d, 0xd45b5b75, 0xb353fd00, 0xcbb0e358, 0x830f220a, 0x1f8fb214, 0xd372cf08, 0xcc3c4a13,
- 0x8cf63166, 0x061c87be, 0x88c98f88, 0x6062e397, 0x47cf8e7a, 0xb6c85283, 0x3cc2acfb, 0x3fc06976,
- 0x4e8f0252, 0x64d8314d, 0xda3870e3, 0x1e665459, 0xc10908f0, 0x513021a5, 0x6c5b68b7, 0x822f8aa0,
- 0x3007cd3e, 0x74719eef, 0xdc872681, 0x073340d4, 0x7e432fd9, 0x0c5ec241, 0x8809286c, 0xf592d891,
- 0x08a930f6, 0x957ef305, 0xb7fbffbd, 0xc266e96f, 0x6fe4ac98, 0xb173ecc0, 0xbc60b42a, 0x953498da,
- 0xfba1ae12, 0x2d4bd736, 0x0f25faab, 0xa4f3fceb, 0xe2969123, 0x257f0c3d, 0x9348af49, 0x361400bc,
- 0xe8816f4a, 0x3814f200, 0xa3f94043, 0x9c7a54c2, 0xbc704f57, 0xda41e7f9, 0xc25ad33a, 0x54f4a084,
- 0xb17f5505, 0x59357cbe, 0xedbd15c8, 0x7f97c5ab, 0xba5ac7b5, 0xb6f6deaf, 0x3a479c3a, 0x5302da25,
- 0x653d7e6a, 0x54268d49, 0x51a477ea, 0x5017d55b, 0xd7d25d88, 0x44136c76, 0x0404a8c8, 0xb8e5a121,
- 0xb81a928a, 0x60ed5869, 0x97c55b96, 0xeaec991b, 0x29935913, 0x01fdb7f1, 0x088e8dfa, 0x9ab6f6f5,
- 0x3b4cbf9f, 0x4a5de3ab, 0xe6051d35, 0xa0e1d855, 0xd36b4cf1, 0xf544edeb, 0xb0e93524, 0xbebb8fbd,
- 0xa2d762cf, 0x49c92f54, 0x38b5f331, 0x7128a454, 0x48392905, 0xa65b1db8, 0x851c97bd, 0xd675cf2f
- };
-
- internal static readonly uint[] S7 =
- {
- 0x85e04019, 0x332bf567, 0x662dbfff, 0xcfc65693, 0x2a8d7f6f, 0xab9bc912, 0xde6008a1, 0x2028da1f,
- 0x0227bce7, 0x4d642916, 0x18fac300, 0x50f18b82, 0x2cb2cb11, 0xb232e75c, 0x4b3695f2, 0xb28707de,
- 0xa05fbcf6, 0xcd4181e9, 0xe150210c, 0xe24ef1bd, 0xb168c381, 0xfde4e789, 0x5c79b0d8, 0x1e8bfd43,
- 0x4d495001, 0x38be4341, 0x913cee1d, 0x92a79c3f, 0x089766be, 0xbaeeadf4, 0x1286becf, 0xb6eacb19,
- 0x2660c200, 0x7565bde4, 0x64241f7a, 0x8248dca9, 0xc3b3ad66, 0x28136086, 0x0bd8dfa8, 0x356d1cf2,
- 0x107789be, 0xb3b2e9ce, 0x0502aa8f, 0x0bc0351e, 0x166bf52a, 0xeb12ff82, 0xe3486911, 0xd34d7516,
- 0x4e7b3aff, 0x5f43671b, 0x9cf6e037, 0x4981ac83, 0x334266ce, 0x8c9341b7, 0xd0d854c0, 0xcb3a6c88,
- 0x47bc2829, 0x4725ba37, 0xa66ad22b, 0x7ad61f1e, 0x0c5cbafa, 0x4437f107, 0xb6e79962, 0x42d2d816,
- 0x0a961288, 0xe1a5c06e, 0x13749e67, 0x72fc081a, 0xb1d139f7, 0xf9583745, 0xcf19df58, 0xbec3f756,
- 0xc06eba30, 0x07211b24, 0x45c28829, 0xc95e317f, 0xbc8ec511, 0x38bc46e9, 0xc6e6fa14, 0xbae8584a,
- 0xad4ebc46, 0x468f508b, 0x7829435f, 0xf124183b, 0x821dba9f, 0xaff60ff4, 0xea2c4e6d, 0x16e39264,
- 0x92544a8b, 0x009b4fc3, 0xaba68ced, 0x9ac96f78, 0x06a5b79a, 0xb2856e6e, 0x1aec3ca9, 0xbe838688,
- 0x0e0804e9, 0x55f1be56, 0xe7e5363b, 0xb3a1f25d, 0xf7debb85, 0x61fe033c, 0x16746233, 0x3c034c28,
- 0xda6d0c74, 0x79aac56c, 0x3ce4e1ad, 0x51f0c802, 0x98f8f35a, 0x1626a49f, 0xeed82b29, 0x1d382fe3,
- 0x0c4fb99a, 0xbb325778, 0x3ec6d97b, 0x6e77a6a9, 0xcb658b5c, 0xd45230c7, 0x2bd1408b, 0x60c03eb7,
- 0xb9068d78, 0xa33754f4, 0xf430c87d, 0xc8a71302, 0xb96d8c32, 0xebd4e7be, 0xbe8b9d2d, 0x7979fb06,
- 0xe7225308, 0x8b75cf77, 0x11ef8da4, 0xe083c858, 0x8d6b786f, 0x5a6317a6, 0xfa5cf7a0, 0x5dda0033,
- 0xf28ebfb0, 0xf5b9c310, 0xa0eac280, 0x08b9767a, 0xa3d9d2b0, 0x79d34217, 0x021a718d, 0x9ac6336a,
- 0x2711fd60, 0x438050e3, 0x069908a8, 0x3d7fedc4, 0x826d2bef, 0x4eeb8476, 0x488dcf25, 0x36c9d566,
- 0x28e74e41, 0xc2610aca, 0x3d49a9cf, 0xbae3b9df, 0xb65f8de6, 0x92aeaf64, 0x3ac7d5e6, 0x9ea80509,
- 0xf22b017d, 0xa4173f70, 0xdd1e16c3, 0x15e0d7f9, 0x50b1b887, 0x2b9f4fd5, 0x625aba82, 0x6a017962,
- 0x2ec01b9c, 0x15488aa9, 0xd716e740, 0x40055a2c, 0x93d29a22, 0xe32dbf9a, 0x058745b9, 0x3453dc1e,
- 0xd699296e, 0x496cff6f, 0x1c9f4986, 0xdfe2ed07, 0xb87242d1, 0x19de7eae, 0x053e561a, 0x15ad6f8c,
- 0x66626c1c, 0x7154c24c, 0xea082b2a, 0x93eb2939, 0x17dcb0f0, 0x58d4f2ae, 0x9ea294fb, 0x52cf564c,
- 0x9883fe66, 0x2ec40581, 0x763953c3, 0x01d6692e, 0xd3a0c108, 0xa1e7160e, 0xe4f2dfa6, 0x693ed285,
- 0x74904698, 0x4c2b0edd, 0x4f757656, 0x5d393378, 0xa132234f, 0x3d321c5d, 0xc3f5e194, 0x4b269301,
- 0xc79f022f, 0x3c997e7e, 0x5e4f9504, 0x3ffafbbd, 0x76f7ad0e, 0x296693f4, 0x3d1fce6f, 0xc61e45be,
- 0xd3b5ab34, 0xf72bf9b7, 0x1b0434c0, 0x4e72b567, 0x5592a33d, 0xb5229301, 0xcfd2a87f, 0x60aeb767,
- 0x1814386b, 0x30bcc33d, 0x38a0c07d, 0xfd1606f2, 0xc363519b, 0x589dd390, 0x5479f8e6, 0x1cb8d647,
- 0x97fd61a9, 0xea7759f4, 0x2d57539d, 0x569a58cf, 0xe84e63ad, 0x462e1b78, 0x6580f87e, 0xf3817914,
- 0x91da55f4, 0x40a230f3, 0xd1988f35, 0xb6e318d2, 0x3ffa50bc, 0x3d40f021, 0xc3c0bdae, 0x4958c24c,
- 0x518f36b2, 0x84b1d370, 0x0fedce83, 0x878ddada, 0xf2a279c7, 0x94e01be8, 0x90716f4b, 0x954b8aa3
- };
-
- internal static readonly uint[] S8 =
- {
- 0xe216300d, 0xbbddfffc, 0xa7ebdabd, 0x35648095, 0x7789f8b7, 0xe6c1121b, 0x0e241600, 0x052ce8b5,
- 0x11a9cfb0, 0xe5952f11, 0xece7990a, 0x9386d174, 0x2a42931c, 0x76e38111, 0xb12def3a, 0x37ddddfc,
- 0xde9adeb1, 0x0a0cc32c, 0xbe197029, 0x84a00940, 0xbb243a0f, 0xb4d137cf, 0xb44e79f0, 0x049eedfd,
- 0x0b15a15d, 0x480d3168, 0x8bbbde5a, 0x669ded42, 0xc7ece831, 0x3f8f95e7, 0x72df191b, 0x7580330d,
- 0x94074251, 0x5c7dcdfa, 0xabbe6d63, 0xaa402164, 0xb301d40a, 0x02e7d1ca, 0x53571dae, 0x7a3182a2,
- 0x12a8ddec, 0xfdaa335d, 0x176f43e8, 0x71fb46d4, 0x38129022, 0xce949ad4, 0xb84769ad, 0x965bd862,
- 0x82f3d055, 0x66fb9767, 0x15b80b4e, 0x1d5b47a0, 0x4cfde06f, 0xc28ec4b8, 0x57e8726e, 0x647a78fc,
- 0x99865d44, 0x608bd593, 0x6c200e03, 0x39dc5ff6, 0x5d0b00a3, 0xae63aff2, 0x7e8bd632, 0x70108c0c,
- 0xbbd35049, 0x2998df04, 0x980cf42a, 0x9b6df491, 0x9e7edd53, 0x06918548, 0x58cb7e07, 0x3b74ef2e,
- 0x522fffb1, 0xd24708cc, 0x1c7e27cd, 0xa4eb215b, 0x3cf1d2e2, 0x19b47a38, 0x424f7618, 0x35856039,
- 0x9d17dee7, 0x27eb35e6, 0xc9aff67b, 0x36baf5b8, 0x09c467cd, 0xc18910b1, 0xe11dbf7b, 0x06cd1af8,
- 0x7170c608, 0x2d5e3354, 0xd4de495a, 0x64c6d006, 0xbcc0c62c, 0x3dd00db3, 0x708f8f34, 0x77d51b42,
- 0x264f620f, 0x24b8d2bf, 0x15c1b79e, 0x46a52564, 0xf8d7e54e, 0x3e378160, 0x7895cda5, 0x859c15a5,
- 0xe6459788, 0xc37bc75f, 0xdb07ba0c, 0x0676a3ab, 0x7f229b1e, 0x31842e7b, 0x24259fd7, 0xf8bef472,
- 0x835ffcb8, 0x6df4c1f2, 0x96f5b195, 0xfd0af0fc, 0xb0fe134c, 0xe2506d3d, 0x4f9b12ea, 0xf215f225,
- 0xa223736f, 0x9fb4c428, 0x25d04979, 0x34c713f8, 0xc4618187, 0xea7a6e98, 0x7cd16efc, 0x1436876c,
- 0xf1544107, 0xbedeee14, 0x56e9af27, 0xa04aa441, 0x3cf7c899, 0x92ecbae6, 0xdd67016d, 0x151682eb,
- 0xa842eedf, 0xfdba60b4, 0xf1907b75, 0x20e3030f, 0x24d8c29e, 0xe139673b, 0xefa63fb8, 0x71873054,
- 0xb6f2cf3b, 0x9f326442, 0xcb15a4cc, 0xb01a4504, 0xf1e47d8d, 0x844a1be5, 0xbae7dfdc, 0x42cbda70,
- 0xcd7dae0a, 0x57e85b7a, 0xd53f5af6, 0x20cf4d8c, 0xcea4d428, 0x79d130a4, 0x3486ebfb, 0x33d3cddc,
- 0x77853b53, 0x37effcb5, 0xc5068778, 0xe580b3e6, 0x4e68b8f4, 0xc5c8b37e, 0x0d809ea2, 0x398feb7c,
- 0x132a4f94, 0x43b7950e, 0x2fee7d1c, 0x223613bd, 0xdd06caa2, 0x37df932b, 0xc4248289, 0xacf3ebc3,
- 0x5715f6b7, 0xef3478dd, 0xf267616f, 0xc148cbe4, 0x9052815e, 0x5e410fab, 0xb48a2465, 0x2eda7fa4,
- 0xe87b40e4, 0xe98ea084, 0x5889e9e1, 0xefd390fc, 0xdd07d35b, 0xdb485694, 0x38d7e5b2, 0x57720101,
- 0x730edebc, 0x5b643113, 0x94917e4f, 0x503c2fba, 0x646f1282, 0x7523d24a, 0xe0779695, 0xf9c17a8f,
- 0x7a5b2121, 0xd187b896, 0x29263a4d, 0xba510cdf, 0x81f47c9f, 0xad1163ed, 0xea7b5965, 0x1a00726e,
- 0x11403092, 0x00da6d77, 0x4a0cdd61, 0xad1f4603, 0x605bdfb0, 0x9eedc364, 0x22ebe6a8, 0xcee7d28a,
- 0xa0e736a0, 0x5564a6b9, 0x10853209, 0xc7eb8f37, 0x2de705ca, 0x8951570f, 0xdf09822b, 0xbd691a6c,
- 0xaa12e4f2, 0x87451c0f, 0xe0f6a27a, 0x3ada4819, 0x4cf1764f, 0x0d771c2b, 0x67cdb156, 0x350d8384,
- 0x5938fa0f, 0x42399ef3, 0x36997b07, 0x0e84093d, 0x4aa93e61, 0x8360d87b, 0x1fa98b0c, 0x1149382c,
- 0xe97625a5, 0x0614d1b7, 0x0e25244b, 0x0c768347, 0x589e8d82, 0x0d2059d1, 0xa466bb1e, 0xf8da0a82,
- 0x04f19130, 0xba6e4ec0, 0x99265164, 0x1ee7230d, 0x50b2ad80, 0xeaee6801, 0x8db2a283, 0xea8bf59e
- };
-
- #endregion
-
- ///
- /// Sets the subkeys using the same nomenclatureas described in RFC2144.
- ///
- /// The key.
- private void SetKey(byte[] key)
- {
- /*
- * Determine the key size here, if required
- *
- * if keysize <= 80bits, use 12 rounds instead of 16
- * if keysize < 128bits, pad with 0
- *
- * Typical key sizes => 40, 64, 80, 128
- */
-
- if (key.Length < 11)
- {
- _rounds = RedRounds;
- }
-
- var z = new int[16];
- var x = new int[16];
-
- /* copy the key into x */
- for (var i = 0; i < key.Length; i++)
- {
- x[i] = key[i] & 0xff;
- }
-
- /*
- * This will look different because the selection of
- * bytes from the input key I've already chosen the
- * correct int.
- */
- var x03 = IntsTo32Bits(x, 0x0);
- var x47 = IntsTo32Bits(x, 0x4);
- var x8B = IntsTo32Bits(x, 0x8);
- var xCf = IntsTo32Bits(x, 0xC);
-
- var z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
-
- Bits32ToInts(z03, z, 0x0);
- var z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
- Bits32ToInts(z47, z, 0x4);
- var z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
- Bits32ToInts(z8B, z, 0x8);
- var zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
- Bits32ToInts(zCf, z, 0xC);
- _km[1] = S5[z[0x8]] ^ S6[z[0x9]] ^ S7[z[0x7]] ^ S8[z[0x6]] ^ S5[z[0x2]];
- _km[2] = S5[z[0xA]] ^ S6[z[0xB]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S6[z[0x6]];
- _km[3] = S5[z[0xC]] ^ S6[z[0xD]] ^ S7[z[0x3]] ^ S8[z[0x2]] ^ S7[z[0x9]];
- _km[4] = S5[z[0xE]] ^ S6[z[0xF]] ^ S7[z[0x1]] ^ S8[z[0x0]] ^ S8[z[0xC]];
-
- z03 = IntsTo32Bits(z, 0x0);
- z47 = IntsTo32Bits(z, 0x4);
- z8B = IntsTo32Bits(z, 0x8);
- zCf = IntsTo32Bits(z, 0xC);
- x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
- Bits32ToInts(x03, x, 0x0);
- x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
- Bits32ToInts(x47, x, 0x4);
- x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
- Bits32ToInts(x8B, x, 0x8);
- xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
- Bits32ToInts(xCf, x, 0xC);
- _km[5] = S5[x[0x3]] ^ S6[x[0x2]] ^ S7[x[0xC]] ^ S8[x[0xD]] ^ S5[x[0x8]];
- _km[6] = S5[x[0x1]] ^ S6[x[0x0]] ^ S7[x[0xE]] ^ S8[x[0xF]] ^ S6[x[0xD]];
- _km[7] = S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x8]] ^ S8[x[0x9]] ^ S7[x[0x3]];
- _km[8] = S5[x[0x5]] ^ S6[x[0x4]] ^ S7[x[0xA]] ^ S8[x[0xB]] ^ S8[x[0x7]];
-
- x03 = IntsTo32Bits(x, 0x0);
- x47 = IntsTo32Bits(x, 0x4);
- x8B = IntsTo32Bits(x, 0x8);
- xCf = IntsTo32Bits(x, 0xC);
- z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
- Bits32ToInts(z03, z, 0x0);
- z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
- Bits32ToInts(z47, z, 0x4);
- z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
- Bits32ToInts(z8B, z, 0x8);
- zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
- Bits32ToInts(zCf, z, 0xC);
- _km[9] = S5[z[0x3]] ^ S6[z[0x2]] ^ S7[z[0xC]] ^ S8[z[0xD]] ^ S5[z[0x9]];
- _km[10] = S5[z[0x1]] ^ S6[z[0x0]] ^ S7[z[0xE]] ^ S8[z[0xF]] ^ S6[z[0xc]];
- _km[11] = S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x8]] ^ S8[z[0x9]] ^ S7[z[0x2]];
- _km[12] = S5[z[0x5]] ^ S6[z[0x4]] ^ S7[z[0xA]] ^ S8[z[0xB]] ^ S8[z[0x6]];
-
- z03 = IntsTo32Bits(z, 0x0);
- z47 = IntsTo32Bits(z, 0x4);
- z8B = IntsTo32Bits(z, 0x8);
- zCf = IntsTo32Bits(z, 0xC);
- x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
- Bits32ToInts(x03, x, 0x0);
- x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
- Bits32ToInts(x47, x, 0x4);
- x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
- Bits32ToInts(x8B, x, 0x8);
- xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
- Bits32ToInts(xCf, x, 0xC);
- _km[13] = S5[x[0x8]] ^ S6[x[0x9]] ^ S7[x[0x7]] ^ S8[x[0x6]] ^ S5[x[0x3]];
- _km[14] = S5[x[0xA]] ^ S6[x[0xB]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S6[x[0x7]];
- _km[15] = S5[x[0xC]] ^ S6[x[0xD]] ^ S7[x[0x3]] ^ S8[x[0x2]] ^ S7[x[0x8]];
- _km[16] = S5[x[0xE]] ^ S6[x[0xF]] ^ S7[x[0x1]] ^ S8[x[0x0]] ^ S8[x[0xD]];
-
- x03 = IntsTo32Bits(x, 0x0);
- x47 = IntsTo32Bits(x, 0x4);
- x8B = IntsTo32Bits(x, 0x8);
- xCf = IntsTo32Bits(x, 0xC);
- z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
- Bits32ToInts(z03, z, 0x0);
- z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
- Bits32ToInts(z47, z, 0x4);
- z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
- Bits32ToInts(z8B, z, 0x8);
- zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
- Bits32ToInts(zCf, z, 0xC);
- _kr[1] = (int)((S5[z[0x8]] ^ S6[z[0x9]] ^ S7[z[0x7]] ^ S8[z[0x6]] ^ S5[z[0x2]]) & 0x1f);
- _kr[2] = (int)((S5[z[0xA]] ^ S6[z[0xB]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S6[z[0x6]]) & 0x1f);
- _kr[3] = (int)((S5[z[0xC]] ^ S6[z[0xD]] ^ S7[z[0x3]] ^ S8[z[0x2]] ^ S7[z[0x9]]) & 0x1f);
- _kr[4] = (int)((S5[z[0xE]] ^ S6[z[0xF]] ^ S7[z[0x1]] ^ S8[z[0x0]] ^ S8[z[0xC]]) & 0x1f);
-
- z03 = IntsTo32Bits(z, 0x0);
- z47 = IntsTo32Bits(z, 0x4);
- z8B = IntsTo32Bits(z, 0x8);
- zCf = IntsTo32Bits(z, 0xC);
- x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
- Bits32ToInts(x03, x, 0x0);
- x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
- Bits32ToInts(x47, x, 0x4);
- x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
- Bits32ToInts(x8B, x, 0x8);
- xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
- Bits32ToInts(xCf, x, 0xC);
- _kr[5] = (int)((S5[x[0x3]] ^ S6[x[0x2]] ^ S7[x[0xC]] ^ S8[x[0xD]] ^ S5[x[0x8]]) & 0x1f);
- _kr[6] = (int)((S5[x[0x1]] ^ S6[x[0x0]] ^ S7[x[0xE]] ^ S8[x[0xF]] ^ S6[x[0xD]]) & 0x1f);
- _kr[7] = (int)((S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x8]] ^ S8[x[0x9]] ^ S7[x[0x3]]) & 0x1f);
- _kr[8] = (int)((S5[x[0x5]] ^ S6[x[0x4]] ^ S7[x[0xA]] ^ S8[x[0xB]] ^ S8[x[0x7]]) & 0x1f);
-
- x03 = IntsTo32Bits(x, 0x0);
- x47 = IntsTo32Bits(x, 0x4);
- x8B = IntsTo32Bits(x, 0x8);
- xCf = IntsTo32Bits(x, 0xC);
- z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]];
- Bits32ToInts(z03, z, 0x0);
- z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]];
- Bits32ToInts(z47, z, 0x4);
- z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]];
- Bits32ToInts(z8B, z, 0x8);
- zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]];
- Bits32ToInts(zCf, z, 0xC);
- _kr[9] = (int)((S5[z[0x3]] ^ S6[z[0x2]] ^ S7[z[0xC]] ^ S8[z[0xD]] ^ S5[z[0x9]]) & 0x1f);
- _kr[10] = (int)((S5[z[0x1]] ^ S6[z[0x0]] ^ S7[z[0xE]] ^ S8[z[0xF]] ^ S6[z[0xc]]) & 0x1f);
- _kr[11] = (int)((S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x8]] ^ S8[z[0x9]] ^ S7[z[0x2]]) & 0x1f);
- _kr[12] = (int)((S5[z[0x5]] ^ S6[z[0x4]] ^ S7[z[0xA]] ^ S8[z[0xB]] ^ S8[z[0x6]]) & 0x1f);
-
- z03 = IntsTo32Bits(z, 0x0);
- z47 = IntsTo32Bits(z, 0x4);
- z8B = IntsTo32Bits(z, 0x8);
- zCf = IntsTo32Bits(z, 0xC);
- x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]];
- Bits32ToInts(x03, x, 0x0);
- x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]];
- Bits32ToInts(x47, x, 0x4);
- x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]];
- Bits32ToInts(x8B, x, 0x8);
- xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]];
- Bits32ToInts(xCf, x, 0xC);
- _kr[13] = (int)((S5[x[0x8]] ^ S6[x[0x9]] ^ S7[x[0x7]] ^ S8[x[0x6]] ^ S5[x[0x3]]) & 0x1f);
- _kr[14] = (int)((S5[x[0xA]] ^ S6[x[0xB]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S6[x[0x7]]) & 0x1f);
- _kr[15] = (int)((S5[x[0xC]] ^ S6[x[0xD]] ^ S7[x[0x3]] ^ S8[x[0x2]] ^ S7[x[0x8]]) & 0x1f);
- _kr[16] = (int)((S5[x[0xE]] ^ S6[x[0xF]] ^ S7[x[0x1]] ^ S8[x[0x0]] ^ S8[x[0xD]]) & 0x1f);
- }
-
- ///
- /// The first of the three processing functions for the encryption and decryption.
- ///
- /// The input to be processed.
- /// The mask to be used from Km[n].
- /// The rotation value to be used.
- private static uint F1(uint d, uint kmi, int kri)
- {
- var I = kmi + d;
- I = I << kri | (I >> (32 - kri));
- return ((S1[(I >> 24) & 0xff] ^ S2[(I >> 16) & 0xff]) - S3[(I >> 8) & 0xff]) + S4[I & 0xff];
- }
-
- ///
- /// The second of the three processing functions for the encryption and decryption.
- ///
- /// The input to be processed.
- /// The mask to be used from Km[n].
- /// The rotation value to be used.
- private static uint F2(uint d, uint kmi, int kri)
- {
- var I = kmi ^ d;
- I = I << kri | (I >> (32 - kri));
- return ((S1[(I >> 24) & 0xff] - S2[(I >> 16) & 0xff]) + S3[(I >> 8) & 0xff]) ^ S4[I & 0xff];
- }
-
- ///
- /// The third of the three processing functions for the encryption and decryption.
- ///
- /// The input to be processed.
- /// The mask to be used from Km[n].
- /// The rotation value to be used.
- private static uint F3(uint d, uint kmi, int kri)
- {
- var I = kmi - d;
- I = I << kri | (I >> (32 - kri));
- return ((S1[(I >> 24) & 0xff] + S2[(I >> 16) & 0xff]) ^ S3[(I >> 8) & 0xff]) - S4[I & 0xff];
- }
-
- ///
- /// Does the 16 rounds to encrypt the block.
- ///
- /// The LH-32bits of the plaintext block.
- /// The RH-32bits of the plaintext block.
- /// The result.
- private void CastEncipher(uint l0, uint r0, uint[] result)
- {
- uint li = l0, ri = r0;
-
- for (var i = 1; i <= _rounds; i++)
- {
- var lp = li; // the previous value, equiv to L[i-1]
- var rp = ri; // equivalent to R[i-1]
-
- li = rp;
-
- switch (i)
- {
- case 1:
- case 4:
- case 7:
- case 10:
- case 13:
- case 16:
- ri = lp ^ F1(rp, _km[i], _kr[i]);
- break;
- case 2:
- case 5:
- case 8:
- case 11:
- case 14:
- ri = lp ^ F2(rp, _km[i], _kr[i]);
- break;
- case 3:
- case 6:
- case 9:
- case 12:
- case 15:
- ri = lp ^ F3(rp, _km[i], _kr[i]);
- break;
- default:
- // We should never get here as max. rounds is 16
- break;
- }
- }
-
- result[0] = ri;
- result[1] = li;
- }
-
- private void CastDecipher(uint l16, uint r16, uint[] result)
- {
- uint li = l16, ri = r16;
-
- for (var i = _rounds; i > 0; i--)
- {
- var lp = li; // the previous value, equiv to L[i-1]
- var rp = ri; // equivalent to R[i-1]
-
- li = rp;
-
- switch (i)
- {
- case 1:
- case 4:
- case 7:
- case 10:
- case 13:
- case 16:
- ri = lp ^ F1(rp, _km[i], _kr[i]);
- break;
- case 2:
- case 5:
- case 8:
- case 11:
- case 14:
- ri = lp ^ F2(rp, _km[i], _kr[i]);
- break;
- case 3:
- case 6:
- case 9:
- case 12:
- case 15:
- ri = lp ^ F3(rp, _km[i], _kr[i]);
- break;
- default:
- // We should never get here as max. rounds is 16
- break;
- }
- }
-
- result[0] = ri;
- result[1] = li;
- }
-
- private static void Bits32ToInts(uint inData, int[] b, int offset)
- {
- b[offset + 3] = (int)(inData & 0xff);
- b[offset + 2] = (int)((inData >> 8) & 0xff);
- b[offset + 1] = (int)((inData >> 16) & 0xff);
- b[offset] = (int)((inData >> 24) & 0xff);
- }
-
- private static uint IntsTo32Bits(int[] b, int i)
- {
- return (uint)(((b[i] & 0xff) << 24) |
- ((b[i + 1] & 0xff) << 16) |
- ((b[i + 2] & 0xff) << 8) |
- (b[i + 3] & 0xff));
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs
deleted file mode 100644
index 131719b1c..000000000
--- a/src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs
+++ /dev/null
@@ -1,49 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers.Paddings
-{
- ///
- /// Implements PKCS5 cipher padding.
- ///
- public class PKCS5Padding : CipherPadding
- {
- ///
- /// Pads the specified input to match the block size.
- ///
- /// The size of the block.
- /// The input.
- /// The zero-based offset in at which the data to pad starts.
- /// The number of bytes in to take into account.
- ///
- /// The padded data array.
- ///
- public override byte[] Pad(int blockSize, byte[] input, int offset, int length)
- {
- var numOfPaddedBytes = blockSize - (length % blockSize);
- return Pad(input, offset, length, numOfPaddedBytes);
- }
-
- ///
- /// Pads the specified input with a given number of bytes.
- ///
- /// The input.
- /// The zero-based offset in at which the data to pad starts.
- /// The number of bytes in to take into account.
- /// The number of bytes to pad the input with.
- ///
- /// The padded data array.
- ///
- public override byte[] Pad(byte[] input, int offset, int length, int paddinglength)
- {
- var output = new byte[length + paddinglength];
- Buffer.BlockCopy(input, offset, output, 0, length);
-
- for (var i = 0; i < paddinglength; i++)
- {
- output[length + i] = (byte)paddinglength;
- }
-
- return output;
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs
deleted file mode 100644
index bbe163fd2..000000000
--- a/src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs
+++ /dev/null
@@ -1,1119 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
- ///
- /// Implements Serpent cipher algorithm.
- ///
- public sealed class SerpentCipher : BlockCipher
- {
- private const int Rounds = 32;
- private const int Phi = unchecked((int)0x9E3779B9); // (Sqrt(5) - 1) * 2**31
-
- private readonly int[] _workingKey;
-
- // registers
- private int _x0;
- private int _x1;
- private int _x2;
- private int _x3;
-
- ///
- /// Initializes a new instance of the class.
- ///
- /// The key.
- /// The mode.
- /// The padding.
- /// is .
- /// Keysize is not valid for this algorithm.
- public SerpentCipher(byte[] key, CipherMode mode, CipherPadding padding)
- : base(key, 16, mode, padding)
- {
- var keySize = key.Length * 8;
-
- if (keySize is not (128 or 192 or 256))
- {
- throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
- }
-
- _workingKey = MakeWorkingKey(key);
- }
-
- ///
- /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
- ///
- /// The input data to encrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write encrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes encrypted.
- ///
- public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- if (inputCount != BlockSize)
- {
- throw new ArgumentException("inputCount");
- }
-
- _x3 = BytesToWord(inputBuffer, inputOffset);
- _x2 = BytesToWord(inputBuffer, inputOffset + 4);
- _x1 = BytesToWord(inputBuffer, inputOffset + 8);
- _x0 = BytesToWord(inputBuffer, inputOffset + 12);
-
- Sb0(_workingKey[0] ^ _x0, _workingKey[1] ^ _x1, _workingKey[2] ^ _x2, _workingKey[3] ^ _x3);
- LT();
- Sb1(_workingKey[4] ^ _x0, _workingKey[5] ^ _x1, _workingKey[6] ^ _x2, _workingKey[7] ^ _x3);
- LT();
- Sb2(_workingKey[8] ^ _x0, _workingKey[9] ^ _x1, _workingKey[10] ^ _x2, _workingKey[11] ^ _x3);
- LT();
- Sb3(_workingKey[12] ^ _x0, _workingKey[13] ^ _x1, _workingKey[14] ^ _x2, _workingKey[15] ^ _x3);
- LT();
- Sb4(_workingKey[16] ^ _x0, _workingKey[17] ^ _x1, _workingKey[18] ^ _x2, _workingKey[19] ^ _x3);
- LT();
- Sb5(_workingKey[20] ^ _x0, _workingKey[21] ^ _x1, _workingKey[22] ^ _x2, _workingKey[23] ^ _x3);
- LT();
- Sb6(_workingKey[24] ^ _x0, _workingKey[25] ^ _x1, _workingKey[26] ^ _x2, _workingKey[27] ^ _x3);
- LT();
- Sb7(_workingKey[28] ^ _x0, _workingKey[29] ^ _x1, _workingKey[30] ^ _x2, _workingKey[31] ^ _x3);
- LT();
- Sb0(_workingKey[32] ^ _x0, _workingKey[33] ^ _x1, _workingKey[34] ^ _x2, _workingKey[35] ^ _x3);
- LT();
- Sb1(_workingKey[36] ^ _x0, _workingKey[37] ^ _x1, _workingKey[38] ^ _x2, _workingKey[39] ^ _x3);
- LT();
- Sb2(_workingKey[40] ^ _x0, _workingKey[41] ^ _x1, _workingKey[42] ^ _x2, _workingKey[43] ^ _x3);
- LT();
- Sb3(_workingKey[44] ^ _x0, _workingKey[45] ^ _x1, _workingKey[46] ^ _x2, _workingKey[47] ^ _x3);
- LT();
- Sb4(_workingKey[48] ^ _x0, _workingKey[49] ^ _x1, _workingKey[50] ^ _x2, _workingKey[51] ^ _x3);
- LT();
- Sb5(_workingKey[52] ^ _x0, _workingKey[53] ^ _x1, _workingKey[54] ^ _x2, _workingKey[55] ^ _x3);
- LT();
- Sb6(_workingKey[56] ^ _x0, _workingKey[57] ^ _x1, _workingKey[58] ^ _x2, _workingKey[59] ^ _x3);
- LT();
- Sb7(_workingKey[60] ^ _x0, _workingKey[61] ^ _x1, _workingKey[62] ^ _x2, _workingKey[63] ^ _x3);
- LT();
- Sb0(_workingKey[64] ^ _x0, _workingKey[65] ^ _x1, _workingKey[66] ^ _x2, _workingKey[67] ^ _x3);
- LT();
- Sb1(_workingKey[68] ^ _x0, _workingKey[69] ^ _x1, _workingKey[70] ^ _x2, _workingKey[71] ^ _x3);
- LT();
- Sb2(_workingKey[72] ^ _x0, _workingKey[73] ^ _x1, _workingKey[74] ^ _x2, _workingKey[75] ^ _x3);
- LT();
- Sb3(_workingKey[76] ^ _x0, _workingKey[77] ^ _x1, _workingKey[78] ^ _x2, _workingKey[79] ^ _x3);
- LT();
- Sb4(_workingKey[80] ^ _x0, _workingKey[81] ^ _x1, _workingKey[82] ^ _x2, _workingKey[83] ^ _x3);
- LT();
- Sb5(_workingKey[84] ^ _x0, _workingKey[85] ^ _x1, _workingKey[86] ^ _x2, _workingKey[87] ^ _x3);
- LT();
- Sb6(_workingKey[88] ^ _x0, _workingKey[89] ^ _x1, _workingKey[90] ^ _x2, _workingKey[91] ^ _x3);
- LT();
- Sb7(_workingKey[92] ^ _x0, _workingKey[93] ^ _x1, _workingKey[94] ^ _x2, _workingKey[95] ^ _x3);
- LT();
- Sb0(_workingKey[96] ^ _x0, _workingKey[97] ^ _x1, _workingKey[98] ^ _x2, _workingKey[99] ^ _x3);
- LT();
- Sb1(_workingKey[100] ^ _x0, _workingKey[101] ^ _x1, _workingKey[102] ^ _x2, _workingKey[103] ^ _x3);
- LT();
- Sb2(_workingKey[104] ^ _x0, _workingKey[105] ^ _x1, _workingKey[106] ^ _x2, _workingKey[107] ^ _x3);
- LT();
- Sb3(_workingKey[108] ^ _x0, _workingKey[109] ^ _x1, _workingKey[110] ^ _x2, _workingKey[111] ^ _x3);
- LT();
- Sb4(_workingKey[112] ^ _x0, _workingKey[113] ^ _x1, _workingKey[114] ^ _x2, _workingKey[115] ^ _x3);
- LT();
- Sb5(_workingKey[116] ^ _x0, _workingKey[117] ^ _x1, _workingKey[118] ^ _x2, _workingKey[119] ^ _x3);
- LT();
- Sb6(_workingKey[120] ^ _x0, _workingKey[121] ^ _x1, _workingKey[122] ^ _x2, _workingKey[123] ^ _x3);
- LT();
- Sb7(_workingKey[124] ^ _x0, _workingKey[125] ^ _x1, _workingKey[126] ^ _x2, _workingKey[127] ^ _x3);
-
- WordToBytes(_workingKey[131] ^ _x3, outputBuffer, outputOffset);
- WordToBytes(_workingKey[130] ^ _x2, outputBuffer, outputOffset + 4);
- WordToBytes(_workingKey[129] ^ _x1, outputBuffer, outputOffset + 8);
- WordToBytes(_workingKey[128] ^ _x0, outputBuffer, outputOffset + 12);
-
- return BlockSize;
- }
-
- ///
- /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
- ///
- /// The input data to decrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write decrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes decrypted.
- ///
- public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- if (inputCount != BlockSize)
- {
- throw new ArgumentException("inputCount");
- }
-
- _x3 = _workingKey[131] ^ BytesToWord(inputBuffer, inputOffset);
- _x2 = _workingKey[130] ^ BytesToWord(inputBuffer, inputOffset + 4);
- _x1 = _workingKey[129] ^ BytesToWord(inputBuffer, inputOffset + 8);
- _x0 = _workingKey[128] ^ BytesToWord(inputBuffer, inputOffset + 12);
-
- Ib7(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[124];
- _x1 ^= _workingKey[125];
- _x2 ^= _workingKey[126];
- _x3 ^= _workingKey[127];
-
- InverseLT();
- Ib6(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[120];
- _x1 ^= _workingKey[121];
- _x2 ^= _workingKey[122];
- _x3 ^= _workingKey[123];
-
- InverseLT();
- Ib5(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[116];
- _x1 ^= _workingKey[117];
- _x2 ^= _workingKey[118];
- _x3 ^= _workingKey[119];
-
- InverseLT();
- Ib4(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[112];
- _x1 ^= _workingKey[113];
- _x2 ^= _workingKey[114];
- _x3 ^= _workingKey[115];
- InverseLT();
- Ib3(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[108];
- _x1 ^= _workingKey[109];
- _x2 ^= _workingKey[110];
- _x3 ^= _workingKey[111];
-
- InverseLT();
- Ib2(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[104];
- _x1 ^= _workingKey[105];
- _x2 ^= _workingKey[106];
- _x3 ^= _workingKey[107];
-
- InverseLT();
- Ib1(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[100];
- _x1 ^= _workingKey[101];
- _x2 ^= _workingKey[102];
- _x3 ^= _workingKey[103];
-
- InverseLT();
- Ib0(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[96];
- _x1 ^= _workingKey[97];
- _x2 ^= _workingKey[98];
- _x3 ^= _workingKey[99];
-
- InverseLT();
- Ib7(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[92];
- _x1 ^= _workingKey[93];
- _x2 ^= _workingKey[94];
- _x3 ^= _workingKey[95];
-
- InverseLT();
- Ib6(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[88];
- _x1 ^= _workingKey[89];
- _x2 ^= _workingKey[90];
- _x3 ^= _workingKey[91];
-
- InverseLT();
- Ib5(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[84];
- _x1 ^= _workingKey[85];
- _x2 ^= _workingKey[86];
- _x3 ^= _workingKey[87];
-
- InverseLT();
- Ib4(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[80];
- _x1 ^= _workingKey[81];
- _x2 ^= _workingKey[82];
- _x3 ^= _workingKey[83];
-
- InverseLT();
- Ib3(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[76];
- _x1 ^= _workingKey[77];
- _x2 ^= _workingKey[78];
- _x3 ^= _workingKey[79];
-
- InverseLT();
- Ib2(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[72];
- _x1 ^= _workingKey[73];
- _x2 ^= _workingKey[74];
- _x3 ^= _workingKey[75];
-
- InverseLT();
- Ib1(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[68];
- _x1 ^= _workingKey[69];
- _x2 ^= _workingKey[70];
- _x3 ^= _workingKey[71];
-
- InverseLT();
- Ib0(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[64];
- _x1 ^= _workingKey[65];
- _x2 ^= _workingKey[66];
- _x3 ^= _workingKey[67];
-
- InverseLT();
- Ib7(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[60];
- _x1 ^= _workingKey[61];
- _x2 ^= _workingKey[62];
- _x3 ^= _workingKey[63];
-
- InverseLT();
- Ib6(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[56];
- _x1 ^= _workingKey[57];
- _x2 ^= _workingKey[58];
- _x3 ^= _workingKey[59];
-
- InverseLT();
- Ib5(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[52];
- _x1 ^= _workingKey[53];
- _x2 ^= _workingKey[54];
- _x3 ^= _workingKey[55];
-
- InverseLT();
- Ib4(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[48];
- _x1 ^= _workingKey[49];
- _x2 ^= _workingKey[50];
- _x3 ^= _workingKey[51];
-
- InverseLT();
- Ib3(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[44];
- _x1 ^= _workingKey[45];
- _x2 ^= _workingKey[46];
- _x3 ^= _workingKey[47];
-
- InverseLT();
- Ib2(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[40];
- _x1 ^= _workingKey[41];
- _x2 ^= _workingKey[42];
- _x3 ^= _workingKey[43];
-
- InverseLT();
- Ib1(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[36];
- _x1 ^= _workingKey[37];
- _x2 ^= _workingKey[38];
- _x3 ^= _workingKey[39];
-
- InverseLT();
- Ib0(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[32];
- _x1 ^= _workingKey[33];
- _x2 ^= _workingKey[34];
- _x3 ^= _workingKey[35];
-
- InverseLT();
- Ib7(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[28];
- _x1 ^= _workingKey[29];
- _x2 ^= _workingKey[30];
- _x3 ^= _workingKey[31];
-
- InverseLT();
- Ib6(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[24];
- _x1 ^= _workingKey[25];
- _x2 ^= _workingKey[26];
- _x3 ^= _workingKey[27];
-
- InverseLT();
- Ib5(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[20];
- _x1 ^= _workingKey[21];
- _x2 ^= _workingKey[22];
- _x3 ^= _workingKey[23];
-
- InverseLT();
- Ib4(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[16];
- _x1 ^= _workingKey[17];
- _x2 ^= _workingKey[18];
- _x3 ^= _workingKey[19];
-
- InverseLT();
- Ib3(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[12];
- _x1 ^= _workingKey[13];
- _x2 ^= _workingKey[14];
- _x3 ^= _workingKey[15];
-
- InverseLT();
- Ib2(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[8];
- _x1 ^= _workingKey[9];
- _x2 ^= _workingKey[10];
- _x3 ^= _workingKey[11];
-
- InverseLT();
- Ib1(_x0, _x1, _x2, _x3);
-
- _x0 ^= _workingKey[4];
- _x1 ^= _workingKey[5];
- _x2 ^= _workingKey[6];
- _x3 ^= _workingKey[7];
-
- InverseLT();
- Ib0(_x0, _x1, _x2, _x3);
-
- WordToBytes(_x3 ^ _workingKey[3], outputBuffer, outputOffset);
- WordToBytes(_x2 ^ _workingKey[2], outputBuffer, outputOffset + 4);
- WordToBytes(_x1 ^ _workingKey[1], outputBuffer, outputOffset + 8);
- WordToBytes(_x0 ^ _workingKey[0], outputBuffer, outputOffset + 12);
-
- return BlockSize;
- }
-
- ///
- /// Expand a user-supplied key material into a session key.
- ///
- /// The user-key bytes to use.
- ///
- /// A session key.
- ///
- /// is not multiple of 4 bytes.
- private int[] MakeWorkingKey(byte[] key)
- {
- // pad key to 256 bits
- var kPad = new int[16];
- int off;
- var length = 0;
-
- for (off = key.Length - 4; off > 0; off -= 4)
- {
- kPad[length++] = BytesToWord(key, off);
- }
-
- if (off == 0)
- {
- kPad[length++] = BytesToWord(key, 0);
- if (length < 8)
- {
- kPad[length] = 1;
- }
- }
- else
- {
- throw new ArgumentException("key must be a multiple of 4 bytes");
- }
-
- // expand the padded key up to 33 x 128 bits of key material
- const int amount = (Rounds + 1) * 4;
- var w = new int[amount];
-
- // compute w0 to w7 from w-8 to w-1
- for (var i = 8; i < 16; i++)
- {
- kPad[i] = RotateLeft(kPad[i - 8] ^ kPad[i - 5] ^ kPad[i - 3] ^ kPad[i - 1] ^ Phi ^ (i - 8), 11);
- }
-
- Buffer.BlockCopy(kPad, 8, w, 0, 8);
-
- // compute w8 to w136
- for (var i = 8; i < amount; i++)
- {
- w[i] = RotateLeft(w[i - 8] ^ w[i - 5] ^ w[i - 3] ^ w[i - 1] ^ Phi ^ i, 11);
- }
-
- // create the working keys by processing w with the Sbox and IP
- Sb3(w[0], w[1], w[2], w[3]);
- w[0] = _x0;
- w[1] = _x1;
- w[2] = _x2;
- w[3] = _x3;
-
- Sb2(w[4], w[5], w[6], w[7]);
- w[4] = _x0;
- w[5] = _x1;
- w[6] = _x2;
- w[7] = _x3;
-
- Sb1(w[8], w[9], w[10], w[11]);
- w[8] = _x0;
- w[9] = _x1;
- w[10] = _x2;
- w[11] = _x3;
-
- Sb0(w[12], w[13], w[14], w[15]);
- w[12] = _x0;
- w[13] = _x1;
- w[14] = _x2;
- w[15] = _x3;
-
- Sb7(w[16], w[17], w[18], w[19]);
- w[16] = _x0;
- w[17] = _x1;
- w[18] = _x2;
- w[19] = _x3;
-
- Sb6(w[20], w[21], w[22], w[23]);
- w[20] = _x0;
- w[21] = _x1;
- w[22] = _x2;
- w[23] = _x3;
-
- Sb5(w[24], w[25], w[26], w[27]);
- w[24] = _x0;
- w[25] = _x1;
- w[26] = _x2;
- w[27] = _x3;
-
- Sb4(w[28], w[29], w[30], w[31]);
- w[28] = _x0;
- w[29] = _x1;
- w[30] = _x2;
- w[31] = _x3;
-
- Sb3(w[32], w[33], w[34], w[35]);
- w[32] = _x0;
- w[33] = _x1;
- w[34] = _x2;
- w[35] = _x3;
-
- Sb2(w[36], w[37], w[38], w[39]);
- w[36] = _x0;
- w[37] = _x1;
- w[38] = _x2;
- w[39] = _x3;
-
- Sb1(w[40], w[41], w[42], w[43]);
- w[40] = _x0;
- w[41] = _x1;
- w[42] = _x2;
- w[43] = _x3;
-
- Sb0(w[44], w[45], w[46], w[47]);
- w[44] = _x0;
- w[45] = _x1;
- w[46] = _x2;
- w[47] = _x3;
-
- Sb7(w[48], w[49], w[50], w[51]);
- w[48] = _x0;
- w[49] = _x1;
- w[50] = _x2;
- w[51] = _x3;
-
- Sb6(w[52], w[53], w[54], w[55]);
- w[52] = _x0;
- w[53] = _x1;
- w[54] = _x2;
- w[55] = _x3;
-
- Sb5(w[56], w[57], w[58], w[59]);
- w[56] = _x0;
- w[57] = _x1;
- w[58] = _x2;
- w[59] = _x3;
-
- Sb4(w[60], w[61], w[62], w[63]);
- w[60] = _x0;
- w[61] = _x1;
- w[62] = _x2;
- w[63] = _x3;
-
- Sb3(w[64], w[65], w[66], w[67]);
- w[64] = _x0;
- w[65] = _x1;
- w[66] = _x2;
- w[67] = _x3;
-
- Sb2(w[68], w[69], w[70], w[71]);
- w[68] = _x0;
- w[69] = _x1;
- w[70] = _x2;
- w[71] = _x3;
-
- Sb1(w[72], w[73], w[74], w[75]);
- w[72] = _x0;
- w[73] = _x1;
- w[74] = _x2;
- w[75] = _x3;
-
- Sb0(w[76], w[77], w[78], w[79]);
- w[76] = _x0;
- w[77] = _x1;
- w[78] = _x2;
- w[79] = _x3;
-
- Sb7(w[80], w[81], w[82], w[83]);
- w[80] = _x0;
- w[81] = _x1;
- w[82] = _x2;
- w[83] = _x3;
-
- Sb6(w[84], w[85], w[86], w[87]);
- w[84] = _x0;
- w[85] = _x1;
- w[86] = _x2;
- w[87] = _x3;
-
- Sb5(w[88], w[89], w[90], w[91]);
- w[88] = _x0;
- w[89] = _x1;
- w[90] = _x2;
- w[91] = _x3;
-
- Sb4(w[92], w[93], w[94], w[95]);
- w[92] = _x0;
- w[93] = _x1;
- w[94] = _x2;
- w[95] = _x3;
-
- Sb3(w[96], w[97], w[98], w[99]);
- w[96] = _x0;
- w[97] = _x1;
- w[98] = _x2;
- w[99] = _x3;
-
- Sb2(w[100], w[101], w[102], w[103]);
- w[100] = _x0;
- w[101] = _x1;
- w[102] = _x2;
- w[103] = _x3;
-
- Sb1(w[104], w[105], w[106], w[107]);
- w[104] = _x0;
- w[105] = _x1;
- w[106] = _x2;
- w[107] = _x3;
-
- Sb0(w[108], w[109], w[110], w[111]);
- w[108] = _x0;
- w[109] = _x1;
- w[110] = _x2;
- w[111] = _x3;
-
- Sb7(w[112], w[113], w[114], w[115]);
- w[112] = _x0;
- w[113] = _x1;
- w[114] = _x2;
- w[115] = _x3;
-
- Sb6(w[116], w[117], w[118], w[119]);
- w[116] = _x0;
- w[117] = _x1;
- w[118] = _x2;
- w[119] = _x3;
-
- Sb5(w[120], w[121], w[122], w[123]);
- w[120] = _x0;
- w[121] = _x1;
- w[122] = _x2;
- w[123] = _x3;
-
- Sb4(w[124], w[125], w[126], w[127]);
- w[124] = _x0;
- w[125] = _x1;
- w[126] = _x2;
- w[127] = _x3;
-
- Sb3(w[128], w[129], w[130], w[131]);
- w[128] = _x0;
- w[129] = _x1;
- w[130] = _x2;
- w[131] = _x3;
-
- return w;
- }
-
- private static int RotateLeft(int x, int bits)
- {
- return (x << bits) | (int)((uint)x >> (32 - bits));
- }
-
- private static int RotateRight(int x, int bits)
- {
- return (int)((uint)x >> bits) | (x << (32 - bits));
- }
-
- private static int BytesToWord(byte[] src, int srcOff)
- {
- return ((src[srcOff] & 0xff) << 24) | ((src[srcOff + 1] & 0xff) << 16) |
- ((src[srcOff + 2] & 0xff) << 8) | (src[srcOff + 3] & 0xff);
- }
-
- private static void WordToBytes(int word, byte[] dst, int dstOff)
- {
- dst[dstOff + 3] = (byte)word;
- dst[dstOff + 2] = (byte)((uint)word >> 8);
- dst[dstOff + 1] = (byte)((uint)word >> 16);
- dst[dstOff] = (byte)((uint)word >> 24);
- }
-
- /*
- * The sboxes below are based on the work of Brian Gladman and
- * Sam Simpson, whose original notice appears below.
- *
- * For further details see:
- * http://fp.gladman.plus.com/cryptography_technology/serpent/
- *
- */
-
- /*
- * Partially optimised Serpent S Box bool functions derived
- * using a recursive descent analyser but without a full search
- * of all subtrees. This set of S boxes is the result of work
- * by Sam Simpson and Brian Gladman using the spare time on a
- * cluster of high capacity servers to search for S boxes with
- * this customised search engine. There are now an average of
- * 15.375 terms per S box.
- *
- * Copyright: Dr B. R Gladman (gladman@seven77.demon.co.uk)
- * and Sam Simpson (s.simpson@mia.co.uk)
- * 17th December 1998
- *
- * We hereby give permission for information in this file to be
- * used freely subject only to acknowledgement of its origin.
- */
-
- ///
- /// S0 - { 3, 8,15, 1,10, 6, 5,11,14,13, 4, 2, 7, 0, 9,12 } - 15 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb0(int a, int b, int c, int d)
- {
- var t1 = a ^ d;
- var t3 = c ^ t1;
- var t4 = b ^ t3;
- _x3 = (a & d) ^ t4;
- var t7 = a ^ (b & t1);
- _x2 = t4 ^ (c | t7);
- var t12 = _x3 & (t3 ^ t7);
- _x1 = (~t3) ^ t12;
- _x0 = t12 ^ (~t7);
- }
-
- ///
- /// InvSO - {13, 3,11, 0,10, 6, 5,12, 1,14, 4, 7,15, 9, 8, 2 } - 15 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib0(int a, int b, int c, int d)
- {
- var t1 = ~a;
- var t2 = a ^ b;
- var t4 = d ^ (t1 | t2);
- var t5 = c ^ t4;
- _x2 = t2 ^ t5;
- var t8 = t1 ^ (d & t2);
- _x1 = t4 ^ (_x2 & t8);
- _x3 = (a & t4) ^ (t5 | _x1);
- _x0 = _x3 ^ (t5 ^ t8);
- }
-
- ///
- /// S1 - {15,12, 2, 7, 9, 0, 5,10, 1,11,14, 8, 6,13, 3, 4 } - 14 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb1(int a, int b, int c, int d)
- {
- var t2 = b ^ (~a);
- var t5 = c ^ (a | t2);
- _x2 = d ^ t5;
- var t7 = b ^ (d | t2);
- var t8 = t2 ^ _x2;
- _x3 = t8 ^ (t5 & t7);
- var t11 = t5 ^ t7;
- _x1 = _x3 ^ t11;
- _x0 = t5 ^ (t8 & t11);
- }
-
- ///
- /// InvS1 - { 5, 8, 2,14,15, 6,12, 3,11, 4, 7, 9, 1,13,10, 0 } - 14 steps.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib1(int a, int b, int c, int d)
- {
- var t1 = b ^ d;
- var t3 = a ^ (b & t1);
- var t4 = t1 ^ t3;
- _x3 = c ^ t4;
- var t7 = b ^ (t1 & t3);
- var t8 = _x3 | t7;
- _x1 = t3 ^ t8;
- var t10 = ~_x1;
- var t11 = _x3 ^ t7;
- _x0 = t10 ^ t11;
- _x2 = t4 ^ (t10 | t11);
- }
-
- ///
- /// S2 - { 8, 6, 7, 9, 3,12,10,15,13, 1,14, 4, 0,11, 5, 2 } - 16 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb2(int a, int b, int c, int d)
- {
- var t1 = ~a;
- var t2 = b ^ d;
- var t3 = c & t1;
- _x0 = t2 ^ t3;
- var t5 = c ^ t1;
- var t6 = c ^ _x0;
- var t7 = b & t6;
- _x3 = t5 ^ t7;
- _x2 = a ^ ((d | t7) & (_x0 | t5));
- _x1 = (t2 ^ _x3) ^ (_x2 ^ (d | t1));
- }
-
- ///
- /// InvS2 - {12, 9,15, 4,11,14, 1, 2, 0, 3, 6,13, 5, 8,10, 7 } - 16 steps.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib2(int a, int b, int c, int d)
- {
- var t1 = b ^ d;
- var t2 = ~t1;
- var t3 = a ^ c;
- var t4 = c ^ t1;
- var t5 = b & t4;
- _x0 = t3 ^ t5;
- var t7 = a | t2;
- var t8 = d ^ t7;
- var t9 = t3 | t8;
- _x3 = t1 ^ t9;
- var t11 = ~t4;
- var t12 = _x0 | _x3;
- _x1 = t11 ^ t12;
- _x2 = (d & t11) ^ (t3 ^ t12);
- }
-
- ///
- /// S3 - { 0,15,11, 8,12, 9, 6, 3,13, 1, 2, 4,10, 7, 5,14 } - 16 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb3(int a, int b, int c, int d)
- {
- var t1 = a ^ b;
- var t2 = a & c;
- var t3 = a | d;
- var t4 = c ^ d;
- var t5 = t1 & t3;
- var t6 = t2 | t5;
- _x2 = t4 ^ t6;
- var t8 = b ^ t3;
- var t9 = t6 ^ t8;
- var t10 = t4 & t9;
- _x0 = t1 ^ t10;
- var t12 = _x2 & _x0;
- _x1 = t9 ^ t12;
- _x3 = (b | d) ^ (t4 ^ t12);
- }
-
- ///
- /// InvS3 - { 0, 9,10, 7,11,14, 6,13, 3, 5,12, 2, 4, 8,15, 1 } - 15 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib3(int a, int b, int c, int d)
- {
- var t1 = a | b;
- var t2 = b ^ c;
- var t3 = b & t2;
- var t4 = a ^ t3;
- var t5 = c ^ t4;
- var t6 = d | t4;
- _x0 = t2 ^ t6;
- var t8 = t2 | t6;
- var t9 = d ^ t8;
- _x2 = t5 ^ t9;
- var t11 = t1 ^ t9;
- var t12 = _x0 & t11;
- _x3 = t4 ^ t12;
- _x1 = _x3 ^ (_x0 ^ t11);
- }
-
- ///
- /// S4 - { 1,15, 8, 3,12, 0,11, 6, 2, 5, 4,10, 9,14, 7,13 } - 15 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb4(int a, int b, int c, int d)
- {
- var t1 = a ^ d;
- var t2 = d & t1;
- var t3 = c ^ t2;
- var t4 = b | t3;
- _x3 = t1 ^ t4;
- var t6 = ~b;
- var t7 = t1 | t6;
- _x0 = t3 ^ t7;
- var t9 = a & _x0;
- var t10 = t1 ^ t6;
- var t11 = t4 & t10;
- _x2 = t9 ^ t11;
- _x1 = (a ^ t3) ^ (t10 & _x2);
- }
-
- ///
- /// InvS4 - { 5, 0, 8, 3,10, 9, 7,14, 2,12,11, 6, 4,15,13, 1 } - 15 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib4(int a, int b, int c, int d)
- {
- var t1 = c | d;
- var t2 = a & t1;
- var t3 = b ^ t2;
- var t4 = a & t3;
- var t5 = c ^ t4;
- _x1 = d ^ t5;
- var t7 = ~a;
- var t8 = t5 & _x1;
- _x3 = t3 ^ t8;
- var t10 = _x1 | t7;
- var t11 = d ^ t10;
- _x0 = _x3 ^ t11;
- _x2 = (t3 & t11) ^ (_x1 ^ t7);
- }
-
- ///
- /// S5 - {15, 5, 2,11, 4,10, 9,12, 0, 3,14, 8,13, 6, 7, 1 } - 16 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb5(int a, int b, int c, int d)
- {
- var t1 = ~a;
- var t2 = a ^ b;
- var t3 = a ^ d;
- var t4 = c ^ t1;
- var t5 = t2 | t3;
- _x0 = t4 ^ t5;
- var t7 = d & _x0;
- var t8 = t2 ^ _x0;
- _x1 = t7 ^ t8;
- var t10 = t1 | _x0;
- var t11 = t2 | t7;
- var t12 = t3 ^ t10;
- _x2 = t11 ^ t12;
- _x3 = (b ^ t7) ^ (_x1 & t12);
- }
-
- ///
- /// InvS5 - { 8,15, 2, 9, 4, 1,13,14,11, 6, 5, 3, 7,12,10, 0 } - 16 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib5(int a, int b, int c, int d)
- {
- var t1 = ~c;
- var t2 = b & t1;
- var t3 = d ^ t2;
- var t4 = a & t3;
- var t5 = b ^ t1;
- _x3 = t4 ^ t5;
- var t7 = b | _x3;
- var t8 = a & t7;
- _x1 = t3 ^ t8;
- var t10 = a | d;
- var t11 = t1 ^ t7;
- _x0 = t10 ^ t11;
- _x2 = (b & t10) ^ (t4 | (a ^ c));
- }
-
- ///
- /// S6 - { 7, 2,12, 5, 8, 4, 6,11,14, 9, 1,15,13, 3,10, 0 } - 15 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb6(int a, int b, int c, int d)
- {
- var t1 = ~a;
- var t2 = a ^ d;
- var t3 = b ^ t2;
- var t4 = t1 | t2;
- var t5 = c ^ t4;
- _x1 = b ^ t5;
- var t7 = t2 | _x1;
- var t8 = d ^ t7;
- var t9 = t5 & t8;
- _x2 = t3 ^ t9;
- var t11 = t5 ^ t8;
- _x0 = _x2 ^ t11;
- _x3 = (~t5) ^ (t3 & t11);
- }
-
- ///
- /// InvS6 - {15,10, 1,13, 5, 3, 6, 0, 4, 9,14, 7, 2,12, 8,11 } - 15 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib6(int a, int b, int c, int d)
- {
- var t1 = ~a;
- var t2 = a ^ b;
- var t3 = c ^ t2;
- var t4 = c | t1;
- var t5 = d ^ t4;
- _x1 = t3 ^ t5;
- var t7 = t3 & t5;
- var t8 = t2 ^ t7;
- var t9 = b | t8;
- _x3 = t5 ^ t9;
- var t11 = b | _x3;
- _x0 = t8 ^ t11;
- _x2 = (d & t1) ^ (t3 ^ t11);
- }
-
- ///
- /// S7 - { 1,13,15, 0,14, 8, 2,11, 7, 4,12,10, 9, 3, 5, 6 } - 16 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Sb7(int a, int b, int c, int d)
- {
- var t1 = b ^ c;
- var t2 = c & t1;
- var t3 = d ^ t2;
- var t4 = a ^ t3;
- var t5 = d | t1;
- var t6 = t4 & t5;
- _x1 = b ^ t6;
- var t8 = t3 | _x1;
- var t9 = a & t4;
- _x3 = t1 ^ t9;
- var t11 = t4 ^ t8;
- var t12 = _x3 & t11;
- _x2 = t3 ^ t12;
- _x0 = (~t11) ^ (_x3 & _x2);
- }
-
- ///
- /// InvS7 - { 3, 0, 6,13, 9,14,15, 8, 5,12,11, 7,10, 1, 4, 2 } - 17 terms.
- ///
- /// A.
- /// The b.
- /// The c.
- /// The d.
- private void Ib7(int a, int b, int c, int d)
- {
- var t3 = c | (a & b);
- var t4 = d & (a | b);
- _x3 = t3 ^ t4;
- var t6 = ~d;
- var t7 = b ^ t4;
- var t9 = t7 | (_x3 ^ t6);
- _x1 = a ^ t9;
- _x0 = (c ^ t7) ^ (d | _x1);
- _x2 = (t3 ^ _x1) ^ (_x0 ^ (a & _x3));
- }
-
- ///
- /// Apply the linear transformation to the register set.
- ///
- private void LT()
- {
- var x0 = RotateLeft(_x0, 13);
- var x2 = RotateLeft(_x2, 3);
- var x1 = _x1 ^ x0 ^ x2;
- var x3 = _x3 ^ x2 ^ x0 << 3;
-
- _x1 = RotateLeft(x1, 1);
- _x3 = RotateLeft(x3, 7);
- _x0 = RotateLeft(x0 ^ _x1 ^ _x3, 5);
- _x2 = RotateLeft(x2 ^ _x3 ^ (_x1 << 7), 22);
- }
-
- ///
- /// Apply the inverse of the linear transformation to the register set.
- ///
- private void InverseLT()
- {
- var x2 = RotateRight(_x2, 22) ^ _x3 ^ (_x1 << 7);
- var x0 = RotateRight(_x0, 5) ^ _x1 ^ _x3;
- var x3 = RotateRight(_x3, 7);
- var x1 = RotateRight(_x1, 1);
- _x3 = x3 ^ x2 ^ x0 << 3;
- _x1 = x1 ^ x0 ^ x2;
- _x2 = RotateRight(x2, 3);
- _x0 = RotateRight(x0, 13);
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs
deleted file mode 100644
index e977f51d3..000000000
--- a/src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs
+++ /dev/null
@@ -1,519 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography.Ciphers
-{
- ///
- /// Implements Twofish cipher algorithm.
- ///
- public sealed class TwofishCipher : BlockCipher
- {
- /**
- * Define the fixed p0/p1 permutations used in keyed S-box lookup.
- * By changing the following constant definitions, the S-boxes will
- * automatically Get changed in the Twofish engine.
- */
-#pragma warning disable SA1310 // Field names should not contain underscore
- private const int P_00 = 1;
- private const int P_01 = 0;
- private const int P_02 = 0;
- private const int P_03 = P_01 ^ 1;
- private const int P_04 = 1;
-
- private const int P_10 = 0;
- private const int P_11 = 0;
- private const int P_12 = 1;
- private const int P_13 = P_11 ^ 1;
- private const int P_14 = 0;
-
- private const int P_20 = 1;
- private const int P_21 = 1;
- private const int P_22 = 0;
- private const int P_23 = P_21 ^ 1;
- private const int P_24 = 0;
-
- private const int P_30 = 0;
- private const int P_31 = 1;
- private const int P_32 = 1;
- private const int P_33 = P_31 ^ 1;
- private const int P_34 = 1;
-
- /* Primitive polynomial for GF(256) */
- private const int GF256_FDBK = 0x169;
- private const int GF256_FDBK_2 = GF256_FDBK / 2;
- private const int GF256_FDBK_4 = GF256_FDBK / 4;
-
- private const int RS_GF_FDBK = 0x14D; // field generator
-
- private const int ROUNDS = 16;
- private const int MAX_ROUNDS = 16; // bytes = 128 bits
- private const int MAX_KEY_BITS = 256;
-
- private const int INPUT_WHITEN = 0;
- private const int OUTPUT_WHITEN = INPUT_WHITEN + (16 / 4); // 4
- private const int ROUND_SUBKEYS = OUTPUT_WHITEN + (16 / 4); // 8
-
- private const int TOTAL_SUBKEYS = ROUND_SUBKEYS + (2 * MAX_ROUNDS); // 40
-
- private const int SK_STEP = 0x02020202;
- private const int SK_BUMP = 0x01010101;
- private const int SK_ROTL = 9;
-#pragma warning restore SA1310 // Field names should not contain underscore
-
- private readonly int[] _gMDS0 = new int[MAX_KEY_BITS];
- private readonly int[] _gMDS1 = new int[MAX_KEY_BITS];
- private readonly int[] _gMDS2 = new int[MAX_KEY_BITS];
- private readonly int[] _gMDS3 = new int[MAX_KEY_BITS];
-
- private readonly int _k64Cnt;
-
- /*
- * _gSubKeys[] and _gSBox[] are eventually used in the
- * encryption and decryption methods.
- */
- private int[] _gSubKeys;
- private int[] _gSBox;
-
- ///
- /// Initializes a new instance of the class.
- ///
- /// The key.
- /// The mode.
- /// The padding.
- /// is .
- /// Keysize is not valid for this algorithm.
- public TwofishCipher(byte[] key, CipherMode mode, CipherPadding padding)
- : base(key, 16, mode, padding)
- {
- var keySize = key.Length * 8;
-
- if (keySize is not (128 or 192 or 256))
- {
- throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize));
- }
-
- // calculate the MDS matrix
- var m1 = new int[2];
- var mX = new int[2];
- var mY = new int[2];
-
- for (var i = 0; i < MAX_KEY_BITS; i++)
- {
- var j = P[0 + i] & 0xff;
- m1[0] = j;
- mX[0] = Mx_X(j) & 0xff;
- mY[0] = Mx_Y(j) & 0xff;
-
- j = P[(1 * 256) + i] & 0xff;
- m1[1] = j;
- mX[1] = Mx_X(j) & 0xff;
- mY[1] = Mx_Y(j) & 0xff;
-
- _gMDS0[i] = m1[P_00] | mX[P_00] << 8 | mY[P_00] << 16 | mY[P_00] << 24;
-
- _gMDS1[i] = mY[P_10] | mY[P_10] << 8 | mX[P_10] << 16 | m1[P_10] << 24;
-
- _gMDS2[i] = mX[P_20] | mY[P_20] << 8 | m1[P_20] << 16 | mY[P_20] << 24;
-
- _gMDS3[i] = mX[P_30] | m1[P_30] << 8 | mY[P_30] << 16 | mX[P_30] << 24;
- }
-
- _k64Cnt = key.Length / 8; // pre-padded ?
- SetKey(key);
- }
-
- ///
- /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array.
- ///
- /// The input data to encrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write encrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes encrypted.
- ///
- public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- var x0 = BytesTo32Bits(inputBuffer, inputOffset) ^ _gSubKeys[INPUT_WHITEN];
- var x1 = BytesTo32Bits(inputBuffer, inputOffset + 4) ^ _gSubKeys[INPUT_WHITEN + 1];
- var x2 = BytesTo32Bits(inputBuffer, inputOffset + 8) ^ _gSubKeys[INPUT_WHITEN + 2];
- var x3 = BytesTo32Bits(inputBuffer, inputOffset + 12) ^ _gSubKeys[INPUT_WHITEN + 3];
-
- var k = ROUND_SUBKEYS;
- for (var r = 0; r < ROUNDS; r += 2)
- {
- var t0 = Fe32_0(_gSBox, x0);
- var t1 = Fe32_3(_gSBox, x1);
- x2 ^= t0 + t1 + _gSubKeys[k++];
- x2 = (int)((uint)x2 >> 1) | x2 << 31;
- x3 = (x3 << 1 | (int)((uint)x3 >> 31)) ^ (t0 + (2 * t1) + _gSubKeys[k++]);
-
- t0 = Fe32_0(_gSBox, x2);
- t1 = Fe32_3(_gSBox, x3);
- x0 ^= t0 + t1 + _gSubKeys[k++];
- x0 = (int)((uint)x0 >> 1) | x0 << 31;
- x1 = (x1 << 1 | (int)((uint)x1 >> 31)) ^ (t0 + (2 * t1) + _gSubKeys[k++]);
- }
-
- Bits32ToBytes(x2 ^ _gSubKeys[OUTPUT_WHITEN], outputBuffer, outputOffset);
- Bits32ToBytes(x3 ^ _gSubKeys[OUTPUT_WHITEN + 1], outputBuffer, outputOffset + 4);
- Bits32ToBytes(x0 ^ _gSubKeys[OUTPUT_WHITEN + 2], outputBuffer, outputOffset + 8);
- Bits32ToBytes(x1 ^ _gSubKeys[OUTPUT_WHITEN + 3], outputBuffer, outputOffset + 12);
-
- return BlockSize;
- }
-
- ///
- /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array.
- ///
- /// The input data to decrypt.
- /// The offset into the input byte array from which to begin using data.
- /// The number of bytes in the input byte array to use as data.
- /// The output to which to write decrypted data.
- /// The offset into the output byte array from which to begin writing data.
- ///
- /// The number of bytes decrypted.
- ///
- public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset)
- {
- var x2 = BytesTo32Bits(inputBuffer, inputOffset) ^ _gSubKeys[OUTPUT_WHITEN];
- var x3 = BytesTo32Bits(inputBuffer, inputOffset + 4) ^ _gSubKeys[OUTPUT_WHITEN + 1];
- var x0 = BytesTo32Bits(inputBuffer, inputOffset + 8) ^ _gSubKeys[OUTPUT_WHITEN + 2];
- var x1 = BytesTo32Bits(inputBuffer, inputOffset + 12) ^ _gSubKeys[OUTPUT_WHITEN + 3];
-
- var k = ROUND_SUBKEYS + (2 * ROUNDS) - 1;
- for (var r = 0; r < ROUNDS; r += 2)
- {
- var t0 = Fe32_0(_gSBox, x2);
- var t1 = Fe32_3(_gSBox, x3);
- x1 ^= t0 + (2 * t1) + _gSubKeys[k--];
- x0 = (x0 << 1 | (int)((uint)x0 >> 31)) ^ (t0 + t1 + _gSubKeys[k--]);
- x1 = (int)((uint)x1 >> 1) | x1 << 31;
-
- t0 = Fe32_0(_gSBox, x0);
- t1 = Fe32_3(_gSBox, x1);
- x3 ^= t0 + (2 * t1) + _gSubKeys[k--];
- x2 = (x2 << 1 | (int)((uint)x2 >> 31)) ^ (t0 + t1 + _gSubKeys[k--]);
- x3 = (int)((uint)x3 >> 1) | x3 << 31;
- }
-
- Bits32ToBytes(x0 ^ _gSubKeys[INPUT_WHITEN], outputBuffer, outputOffset);
- Bits32ToBytes(x1 ^ _gSubKeys[INPUT_WHITEN + 1], outputBuffer, outputOffset + 4);
- Bits32ToBytes(x2 ^ _gSubKeys[INPUT_WHITEN + 2], outputBuffer, outputOffset + 8);
- Bits32ToBytes(x3 ^ _gSubKeys[INPUT_WHITEN + 3], outputBuffer, outputOffset + 12);
-
- return BlockSize;
- }
-
- private static readonly byte[] P =
- {
- // p0
- 0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76, 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38,
- 0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C, 0x43, 0x75, 0x37, 0x26, 0xFA, 0x13, 0x94, 0x48,
- 0xF2, 0xD0, 0x8B, 0x30, 0x84, 0x54, 0xDF, 0x23, 0x19, 0x5B, 0x3D, 0x59, 0xF3, 0xAE, 0xA2, 0x82,
- 0x63, 0x01, 0x83, 0x2E, 0xD9, 0x51, 0x9B, 0x7C, 0xA6, 0xEB, 0xA5, 0xBE, 0x16, 0x0C, 0xE3, 0x61,
- 0xC0, 0x8C, 0x3A, 0xF5, 0x73, 0x2C, 0x25, 0x0B, 0xBB, 0x4E, 0x89, 0x6B, 0x53, 0x6A, 0xB4, 0xF1,
- 0xE1, 0xE6, 0xBD, 0x45, 0xE2, 0xF4, 0xB6, 0x66, 0xCC, 0x95, 0x03, 0x56, 0xD4, 0x1C, 0x1E, 0xD7,
- 0xFB, 0xC3, 0x8E, 0xB5, 0xE9, 0xCF, 0xBF, 0xBA, 0xEA, 0x77, 0x39, 0xAF, 0x33, 0xC9, 0x62, 0x71,
- 0x81, 0x79, 0x09, 0xAD, 0x24, 0xCD, 0xF9, 0xD8, 0xE5, 0xC5, 0xB9, 0x4D, 0x44, 0x08, 0x86, 0xE7,
- 0xA1, 0x1D, 0xAA, 0xED, 0x06, 0x70, 0xB2, 0xD2, 0x41, 0x7B, 0xA0, 0x11, 0x31, 0xC2, 0x27, 0x90,
- 0x20, 0xF6, 0x60, 0xFF, 0x96, 0x5C, 0xB1, 0xAB, 0x9E, 0x9C, 0x52, 0x1B, 0x5F, 0x93, 0x0A, 0xEF,
- 0x91, 0x85, 0x49, 0xEE, 0x2D, 0x4F, 0x8F, 0x3B, 0x47, 0x87, 0x6D, 0x46, 0xD6, 0x3E, 0x69, 0x64,
- 0x2A, 0xCE, 0xCB, 0x2F, 0xFC, 0x97, 0x05, 0x7A, 0xAC, 0x7F, 0xD5, 0x1A, 0x4B, 0x0E, 0xA7, 0x5A,
- 0x28, 0x14, 0x3F, 0x29, 0x88, 0x3C, 0x4C, 0x02, 0xB8, 0xDA, 0xB0, 0x17, 0x55, 0x1F, 0x8A, 0x7D,
- 0x57, 0xC7, 0x8D, 0x74, 0xB7, 0xC4, 0x9F, 0x72, 0x7E, 0x15, 0x22, 0x12, 0x58, 0x07, 0x99, 0x34,
- 0x6E, 0x50, 0xDE, 0x68, 0x65, 0xBC, 0xDB, 0xF8, 0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4,
- 0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00, 0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1, 0xE0,
-
- // p1
- 0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8, 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B,
- 0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1, 0x30, 0x0F, 0xF8, 0x1B, 0x87, 0xFA, 0x06, 0x3F,
- 0x5E, 0xBA, 0xAE, 0x5B, 0x8A, 0x00, 0xBC, 0x9D, 0x6D, 0xC1, 0xB1, 0x0E, 0x80, 0x5D, 0xD2, 0xD5,
- 0xA0, 0x84, 0x07, 0x14, 0xB5, 0x90, 0x2C, 0xA3, 0xB2, 0x73, 0x4C, 0x54, 0x92, 0x74, 0x36, 0x51,
- 0x38, 0xB0, 0xBD, 0x5A, 0xFC, 0x60, 0x62, 0x96, 0x6C, 0x42, 0xF7, 0x10, 0x7C, 0x28, 0x27, 0x8C,
- 0x13, 0x95, 0x9C, 0xC7, 0x24, 0x46, 0x3B, 0x70, 0xCA, 0xE3, 0x85, 0xCB, 0x11, 0xD0, 0x93, 0xB8,
- 0xA6, 0x83, 0x20, 0xFF, 0x9F, 0x77, 0xC3, 0xCC, 0x03, 0x6F, 0x08, 0xBF, 0x40, 0xE7, 0x2B, 0xE2,
- 0x79, 0x0C, 0xAA, 0x82, 0x41, 0x3A, 0xEA, 0xB9, 0xE4, 0x9A, 0xA4, 0x97, 0x7E, 0xDA, 0x7A, 0x17,
- 0x66, 0x94, 0xA1, 0x1D, 0x3D, 0xF0, 0xDE, 0xB3, 0x0B, 0x72, 0xA7, 0x1C, 0xEF, 0xD1, 0x53, 0x3E,
- 0x8F, 0x33, 0x26, 0x5F, 0xEC, 0x76, 0x2A, 0x49, 0x81, 0x88, 0xEE, 0x21, 0xC4, 0x1A, 0xEB, 0xD9,
- 0xC5, 0x39, 0x99, 0xCD, 0xAD, 0x31, 0x8B, 0x01, 0x18, 0x23, 0xDD, 0x1F, 0x4E, 0x2D, 0xF9, 0x48,
- 0x4F, 0xF2, 0x65, 0x8E, 0x78, 0x5C, 0x58, 0x19, 0x8D, 0xE5, 0x98, 0x57, 0x67, 0x7F, 0x05, 0x64,
- 0xAF, 0x63, 0xB6, 0xFE, 0xF5, 0xB7, 0x3C, 0xA5, 0xCE, 0xE9, 0x68, 0x44, 0xE0, 0x4D, 0x43, 0x69,
- 0x29, 0x2E, 0xAC, 0x15, 0x59, 0xA8, 0x0A, 0x9E, 0x6E, 0x47, 0xDF, 0x34, 0x35, 0x6A, 0xCF, 0xDC,
- 0x22, 0xC9, 0xC0, 0x9B, 0x89, 0xD4, 0xED, 0xAB, 0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9,
- 0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2, 0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE, 0x91
- };
-
- private void SetKey(byte[] key)
- {
- var k32e = new int[MAX_KEY_BITS / 64]; // 4
- var k32o = new int[MAX_KEY_BITS / 64]; // 4
-
- var sBoxKeys = new int[MAX_KEY_BITS / 64]; // 4
- _gSubKeys = new int[TOTAL_SUBKEYS];
-
- if (_k64Cnt < 1)
- {
- throw new ArgumentException("Key size less than 64 bits");
- }
-
- if (_k64Cnt > 4)
- {
- throw new ArgumentException("Key size larger than 256 bits");
- }
-
- /*
- * k64Cnt is the number of 8 byte blocks (64 chunks)
- * that are in the input key. The input key is a
- * maximum of 32 bytes ( 256 bits ), so the range
- * for k64Cnt is 1..4
- */
- for (var i = 0; i < _k64Cnt; i++)
- {
- var p = i * 8;
-
- k32e[i] = BytesTo32Bits(key, p);
- k32o[i] = BytesTo32Bits(key, p + 4);
-
- sBoxKeys[_k64Cnt - 1 - i] = RS_MDS_Encode(k32e[i], k32o[i]);
- }
-
- for (var i = 0; i < TOTAL_SUBKEYS / 2; i++)
- {
- var q = i * SK_STEP;
- var a = F32(q, k32e);
- var b = F32(q + SK_BUMP, k32o);
- b = b << 8 | (int)((uint)b >> 24);
- a += b;
- _gSubKeys[i * 2] = a;
- a += b;
- _gSubKeys[(i * 2) + 1] = a << SK_ROTL | (int)((uint)a >> (32 - SK_ROTL));
- }
-
- /*
- * fully expand the table for speed
- */
- var k0 = sBoxKeys[0];
- var k1 = sBoxKeys[1];
- var k2 = sBoxKeys[2];
- var k3 = sBoxKeys[3];
- _gSBox = new int[4 * MAX_KEY_BITS];
- for (var i = 0; i < MAX_KEY_BITS; i++)
- {
- int b1, b2, b3;
- var b0 = b1 = b2 = b3 = i;
-
-#pragma warning disable IDE0010 // Add missing cases
- switch (_k64Cnt & 3)
- {
- case 1:
- _gSBox[i * 2] = _gMDS0[(P[(P_01 * 256) + b0] & 0xff) ^ M_b0(k0)];
- _gSBox[(i * 2) + 1] = _gMDS1[(P[(P_11 * 256) + b1] & 0xff) ^ M_b1(k0)];
- _gSBox[(i * 2) + 0x200] = _gMDS2[(P[(P_21 * 256) + b2] & 0xff) ^ M_b2(k0)];
- _gSBox[(i * 2) + 0x201] = _gMDS3[(P[(P_31 * 256) + b3] & 0xff) ^ M_b3(k0)];
- break;
- case 0: /* 256 bits of key */
- b0 = (P[(P_04 * 256) + b0] & 0xff) ^ M_b0(k3);
- b1 = (P[(P_14 * 256) + b1] & 0xff) ^ M_b1(k3);
- b2 = (P[(P_24 * 256) + b2] & 0xff) ^ M_b2(k3);
- b3 = (P[(P_34 * 256) + b3] & 0xff) ^ M_b3(k3);
- goto case 3;
- case 3:
- b0 = (P[(P_03 * 256) + b0] & 0xff) ^ M_b0(k2);
- b1 = (P[(P_13 * 256) + b1] & 0xff) ^ M_b1(k2);
- b2 = (P[(P_23 * 256) + b2] & 0xff) ^ M_b2(k2);
- b3 = (P[(P_33 * 256) + b3] & 0xff) ^ M_b3(k2);
- goto case 2;
- case 2:
- _gSBox[i * 2] = _gMDS0[(P[(P_01 * 256) + (P[(P_02 * 256) + b0] & 0xff) ^ M_b0(k1)] & 0xff) ^ M_b0(k0)];
- _gSBox[(i * 2) + 1] = _gMDS1[(P[(P_11 * 256) + (P[(P_12 * 256) + b1] & 0xff) ^ M_b1(k1)] & 0xff) ^ M_b1(k0)];
- _gSBox[(i * 2) + 0x200] = _gMDS2[(P[(P_21 * 256) + (P[(P_22 * 256) + b2] & 0xff) ^ M_b2(k1)] & 0xff) ^ M_b2(k0)];
- _gSBox[(i * 2) + 0x201] = _gMDS3[(P[(P_31 * 256) + (P[(P_32 * 256) + b3] & 0xff) ^ M_b3(k1)] & 0xff) ^ M_b3(k0)];
- break;
- }
-#pragma warning restore IDE0010 // Add missing cases
- }
-
- /*
- * the function exits having setup the gSBox with the
- * input key material.
- */
- }
-
- /*
- * TODO: This can be optimised and made cleaner by combining
- * the functionality in this function and applying it appropriately
- * to the creation of the subkeys during key setup.
- */
- private int F32(int x, int[] k32)
- {
- var b0 = M_b0(x);
- var b1 = M_b1(x);
- var b2 = M_b2(x);
- var b3 = M_b3(x);
- var k0 = k32[0];
- var k1 = k32[1];
- var k2 = k32[2];
- var k3 = k32[3];
-
- var result = 0;
-
-#pragma warning disable IDE0010 // Add missing cases
- switch (_k64Cnt & 3)
- {
- case 1:
- result = _gMDS0[(P[(P_01 * 256) + b0] & 0xff) ^ M_b0(k0)] ^
- _gMDS1[(P[(P_11 * 256) + b1] & 0xff) ^ M_b1(k0)] ^
- _gMDS2[(P[(P_21 * 256) + b2] & 0xff) ^ M_b2(k0)] ^
- _gMDS3[(P[(P_31 * 256) + b3] & 0xff) ^ M_b3(k0)];
- break;
- case 0: /* 256 bits of key */
- b0 = (P[(P_04 * 256) + b0] & 0xff) ^ M_b0(k3);
- b1 = (P[(P_14 * 256) + b1] & 0xff) ^ M_b1(k3);
- b2 = (P[(P_24 * 256) + b2] & 0xff) ^ M_b2(k3);
- b3 = (P[(P_34 * 256) + b3] & 0xff) ^ M_b3(k3);
- goto case 3;
- case 3:
- b0 = (P[(P_03 * 256) + b0] & 0xff) ^ M_b0(k2);
- b1 = (P[(P_13 * 256) + b1] & 0xff) ^ M_b1(k2);
- b2 = (P[(P_23 * 256) + b2] & 0xff) ^ M_b2(k2);
- b3 = (P[(P_33 * 256) + b3] & 0xff) ^ M_b3(k2);
- goto case 2;
- case 2:
- result =
- _gMDS0[(P[(P_01 * 256) + (P[(P_02 * 256) + b0] & 0xff) ^ M_b0(k1)] & 0xff) ^ M_b0(k0)] ^
- _gMDS1[(P[(P_11 * 256) + (P[(P_12 * 256) + b1] & 0xff) ^ M_b1(k1)] & 0xff) ^ M_b1(k0)] ^
- _gMDS2[(P[(P_21 * 256) + (P[(P_22 * 256) + b2] & 0xff) ^ M_b2(k1)] & 0xff) ^ M_b2(k0)] ^
- _gMDS3[(P[(P_31 * 256) + (P[(P_32 * 256) + b3] & 0xff) ^ M_b3(k1)] & 0xff) ^ M_b3(k0)];
- break;
- }
-#pragma warning restore IDE0010 // Add missing cases
-
- return result;
- }
-
- /**
- * Use (12, 8) Reed-Solomon code over GF(256) to produce
- * a key S-box 32-bit entity from 2 key material 32-bit
- * entities.
- *
- * @param k0 first 32-bit entity
- * @param k1 second 32-bit entity
- * @return Remainder polynomial Generated using RS code
- */
- private static int RS_MDS_Encode(int k0, int k1)
- {
- var r = k1;
-
- // shift 1 byte at a time
- r = RS_rem(r);
- r = RS_rem(r);
- r = RS_rem(r);
- r = RS_rem(r);
- r ^= k0;
- r = RS_rem(r);
- r = RS_rem(r);
- r = RS_rem(r);
- r = RS_rem(r);
-
- return r;
- }
-
- /**
- * Reed-Solomon code parameters: (12,8) reversible code:
- *
- *
- * G(x) = x^4 + (a+1/a)x^3 + ax^2 + (a+1/a)x + 1
- *
- * where a = primitive root of field generator 0x14D.
- *
- */
- private static int RS_rem(int x)
- {
- var b = (int)(((uint)x >> 24) & 0xff);
- var g2 = ((b << 1) ^ ((b & 0x80) != 0 ? RS_GF_FDBK : 0)) & 0xff;
- var g3 = ((int)((uint)b >> 1) ^ ((b & 0x01) != 0 ? (int)((uint)RS_GF_FDBK >> 1) : 0)) ^ g2;
- return (x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b;
- }
-
- private static int LFSR1(int x)
- {
- return (x >> 1) ^ (((x & 0x01) != 0) ? GF256_FDBK_2 : 0);
- }
-
- private static int LFSR2(int x)
- {
- return (x >> 2) ^ (((x & 0x02) != 0) ? GF256_FDBK_2 : 0) ^ (((x & 0x01) != 0) ? GF256_FDBK_4 : 0);
- }
-
- private static int Mx_X(int x)
- {
- return x ^ LFSR2(x);
- } // 5B
-
- private static int Mx_Y(int x)
- {
- return x ^ LFSR1(x) ^ LFSR2(x);
- } // EF
-
-#pragma warning disable IDE1006 // Naming Styles
- private static int M_b0(int x)
-#pragma warning restore IDE1006 // Naming Styles
- {
- return x & 0xff;
- }
-
-#pragma warning disable IDE1006 // Naming Styles
- private static int M_b1(int x)
-#pragma warning restore IDE1006 // Naming Styles
- {
- return (int)((uint)x >> 8) & 0xff;
- }
-
-#pragma warning disable IDE1006 // Naming Styles
- private static int M_b2(int x)
-#pragma warning restore IDE1006 // Naming Styles
- {
- return (int)((uint)x >> 16) & 0xff;
- }
-
-#pragma warning disable IDE1006 // Naming Styles
- private static int M_b3(int x)
-#pragma warning restore IDE1006 // Naming Styles
- {
- return (int)((uint)x >> 24) & 0xff;
- }
-
- private static int Fe32_0(int[] gSBox1, int x)
- {
- return gSBox1[0x000 + (2 * (x & 0xff))] ^
- gSBox1[0x001 + (2 * ((int)((uint)x >> 8) & 0xff))] ^
- gSBox1[0x200 + (2 * ((int)((uint)x >> 16) & 0xff))] ^
- gSBox1[0x201 + (2 * ((int)((uint)x >> 24) & 0xff))];
- }
-
- private static int Fe32_3(int[] gSBox1, int x)
- {
- return gSBox1[0x000 + (2 * ((int)((uint)x >> 24) & 0xff))] ^
- gSBox1[0x001 + (2 * (x & 0xff))] ^
- gSBox1[0x200 + (2 * ((int)((uint)x >> 8) & 0xff))] ^
- gSBox1[0x201 + (2 * ((int)((uint)x >> 16) & 0xff))];
- }
-
- private static int BytesTo32Bits(byte[] b, int p)
- {
- return (b[p] & 0xff) |
- ((b[p + 1] & 0xff) << 8) |
- ((b[p + 2] & 0xff) << 16) |
- ((b[p + 3] & 0xff) << 24);
- }
-
- private static void Bits32ToBytes(int inData, byte[] b, int offset)
- {
- b[offset] = (byte)inData;
- b[offset + 1] = (byte)(inData >> 8);
- b[offset + 2] = (byte)(inData >> 16);
- b[offset + 3] = (byte)(inData >> 24);
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/HMACMD5.cs b/src/Renci.SshNet/Security/Cryptography/HMACMD5.cs
deleted file mode 100644
index b0c1e1431..000000000
--- a/src/Renci.SshNet/Security/Cryptography/HMACMD5.cs
+++ /dev/null
@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
- ///
- /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
- ///
- public class HMACMD5 : System.Security.Cryptography.HMACMD5
- {
- private readonly int _hashSize;
-
- ///
- /// Initializes a new instance of the class with the specified key.
- ///
- /// The key.
- public HMACMD5(byte[] key)
- : base(key)
- {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
- _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
- }
-
- ///
- /// Initializes a new instance of the class with the specified key
- /// and size of the computed hash code.
- ///
- /// The key.
- /// The size, in bits, of the computed hash code.
- public HMACMD5(byte[] key, int hashSize)
- : base(key)
- {
- _hashSize = hashSize;
- }
-
- ///
- /// Gets the size, in bits, of the computed hash code.
- ///
- ///
- /// The size, in bits, of the computed hash code.
- ///
- public override int HashSize
- {
- get { return _hashSize; }
- }
-
- ///
- /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
- ///
- ///
- /// The computed hash code.
- ///
- protected override byte[] HashFinal()
- {
- var hash = base.HashFinal();
- return hash.Take(HashSize / 8);
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs
deleted file mode 100644
index da66fec0d..000000000
--- a/src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs
+++ /dev/null
@@ -1,60 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
- ///
- /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
- ///
- public class HMACSHA1 : System.Security.Cryptography.HMACSHA1
- {
- private readonly int _hashSize;
-
- ///
- /// Initializes a new instance of the class with the specified key.
- ///
- /// The key.
- public HMACSHA1(byte[] key)
- : base(key)
- {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
- _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
- }
-
- ///
- /// Initializes a new instance of the class with the specified key and size of the computed hash code.
- ///
- /// The key.
- /// The size, in bits, of the computed hash code.
- public HMACSHA1(byte[] key, int hashSize)
- : base(key)
- {
- _hashSize = hashSize;
- }
-
- ///
- /// Gets the size, in bits, of the computed hash code.
- ///
- ///
- /// The size, in bits, of the computed hash code.
- ///
- public override int HashSize
- {
- get { return _hashSize; }
- }
-
- ///
- /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
- ///
- ///
- /// The computed hash code.
- ///
- protected override byte[] HashFinal()
- {
- var hash = base.HashFinal();
- return hash.Take(HashSize / 8);
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs
deleted file mode 100644
index e0f230a1a..000000000
--- a/src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs
+++ /dev/null
@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
- ///
- /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
- ///
- public class HMACSHA256 : System.Security.Cryptography.HMACSHA256
- {
- private readonly int _hashSize;
-
- ///
- /// Initializes a new instance of the class with the specified key.
- ///
- /// The key.
- public HMACSHA256(byte[] key)
- : base(key)
- {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
- _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
- }
-
- ///
- /// Initializes a new instance of the class with the specified key
- /// and size of the computed hash code.
- ///
- /// The key.
- /// The size, in bits, of the computed hash code.
- public HMACSHA256(byte[] key, int hashSize)
- : base(key)
- {
- _hashSize = hashSize;
- }
-
- ///
- /// Gets the size, in bits, of the computed hash code.
- ///
- ///
- /// The size, in bits, of the computed hash code.
- ///
- public override int HashSize
- {
- get { return _hashSize; }
- }
-
- ///
- /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
- ///
- ///
- /// The computed hash code.
- ///
- protected override byte[] HashFinal()
- {
- var hash = base.HashFinal();
- return hash.Take(HashSize / 8);
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs
deleted file mode 100644
index cbdcdf73c..000000000
--- a/src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs
+++ /dev/null
@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
- ///
- /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
- ///
- public class HMACSHA384 : System.Security.Cryptography.HMACSHA384
- {
- private readonly int _hashSize;
-
- ///
- /// Initializes a new instance of the class with the specified key.
- ///
- /// The key.
- public HMACSHA384(byte[] key)
- : base(key)
- {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
- _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
- }
-
- ///
- /// Initializes a new instance of the class with the specified key
- /// and size of the computed hash code.
- ///
- /// The key.
- /// The size, in bits, of the computed hash code.
- public HMACSHA384(byte[] key, int hashSize)
- : base(key)
- {
- _hashSize = hashSize;
- }
-
- ///
- /// Gets the size, in bits, of the computed hash code.
- ///
- ///
- /// The size, in bits, of the computed hash code.
- ///
- public override int HashSize
- {
- get { return _hashSize; }
- }
-
- ///
- /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
- ///
- ///
- /// The computed hash code.
- ///
- protected override byte[] HashFinal()
- {
- var hash = base.HashFinal();
- return hash.Take(HashSize / 8);
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs
deleted file mode 100644
index 45cca6a11..000000000
--- a/src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs
+++ /dev/null
@@ -1,61 +0,0 @@
-using System.Security.Cryptography;
-
-using Renci.SshNet.Common;
-
-namespace Renci.SshNet.Security.Cryptography
-{
- ///
- /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function.
- ///
- public class HMACSHA512 : System.Security.Cryptography.HMACSHA512
- {
- private readonly int _hashSize;
-
- ///
- /// Initializes a new instance of the class with the specified key.
- ///
- /// The key.
- public HMACSHA512(byte[] key)
- : base(key)
- {
-#pragma warning disable MA0056 // Do not call overridable members in constructor
- _hashSize = base.HashSize;
-#pragma warning restore MA0056 // Do not call overridable members in constructor
- }
-
- ///
- /// Initializes a new instance of the class with the specified key
- /// and size of the computed hash code.
- ///
- /// The key.
- /// The size, in bits, of the computed hash code.
- public HMACSHA512(byte[] key, int hashSize)
- : base(key)
- {
- _hashSize = hashSize;
- }
-
- ///
- /// Gets the size, in bits, of the computed hash code.
- ///
- ///
- /// The size, in bits, of the computed hash code.
- ///
- public override int HashSize
- {
- get { return _hashSize; }
- }
-
- ///
- /// Finalizes the hash computation after the last data is processed by the cryptographic stream object.
- ///
- ///
- /// The computed hash code.
- ///
- protected override byte[] HashFinal()
- {
- var hash = base.HashFinal();
- return hash.Take(HashSize / 8);
- }
- }
-}
diff --git a/src/Renci.SshNet/Security/Cryptography/StreamCipher.cs b/src/Renci.SshNet/Security/Cryptography/StreamCipher.cs
deleted file mode 100644
index c8ebfdd8a..000000000
--- a/src/Renci.SshNet/Security/Cryptography/StreamCipher.cs
+++ /dev/null
@@ -1,20 +0,0 @@
-using System;
-
-namespace Renci.SshNet.Security.Cryptography
-{
- ///
- /// Base class of stream cipher algorithms.
- ///
- public abstract class StreamCipher : SymmetricCipher
- {
- ///
- /// Initializes a new instance of the class.
- ///
- /// The key.
- /// is .
- protected StreamCipher(byte[] key)
- : base(key)
- {
- }
- }
-}
diff --git a/test/Renci.SshNet.IntegrationTests/HmacTests.cs b/test/Renci.SshNet.IntegrationTests/HmacTests.cs
index e7876bc16..261b17a1a 100644
--- a/test/Renci.SshNet.IntegrationTests/HmacTests.cs
+++ b/test/Renci.SshNet.IntegrationTests/HmacTests.cs
@@ -22,30 +22,12 @@ public void TearDown()
_remoteSshdConfig?.Reset();
}
- [TestMethod]
- public void HmacMd5()
- {
- DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5);
- }
-
- [TestMethod]
- public void HmacMd5_96()
- {
- DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5_96);
- }
-
[TestMethod]
public void HmacSha1()
{
DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1);
}
- [TestMethod]
- public void HmacSha1_96()
- {
- DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1_96);
- }
-
[TestMethod]
public void HmacSha2_256()
{
@@ -58,17 +40,6 @@ public void HmacSha2_512()
DoTest(MessageAuthenticationCodeAlgorithm.HmacSha2_512);
}
- [TestMethod]
- public void HmacMd5_Etm()
- {
- DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5Etm);
- }
-
- [TestMethod]
- public void HmacMd5_96_Etm()
- {
- DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5_96_Etm);
- }
[TestMethod]
public void HmacSha1_Etm()
@@ -76,12 +47,6 @@ public void HmacSha1_Etm()
DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1Etm);
}
- [TestMethod]
- public void HmacSha1_96_Etm()
- {
- DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1_96_Etm);
- }
-
[TestMethod]
public void HmacSha2_256_Etm()
{
diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs
index 39250ae27..558303a51 100644
--- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs
+++ b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs
@@ -19,7 +19,7 @@ public void EncryptShouldTakeIntoAccountPaddingForLengthOfOutputBufferPassedToEn
var input = new byte[] { 0x2c, 0x1a, 0x05, 0x00, 0x68 };
var output = new byte[] { 0x0a, 0x00, 0x03, 0x02, 0x06, 0x08, 0x07, 0x05 };
var key = new byte[] { 0x17, 0x78, 0x56, 0xe1, 0x3e, 0xbd, 0x3e, 0x50, 0x1d, 0x79, 0x3f, 0x0f, 0x55, 0x37, 0x45, 0x54 };
- var blockCipher = new BlockCipherStub(key, 8, null, new PKCS5Padding())
+ var blockCipher = new BlockCipherStub(key, 8, null, new PKCS7Padding())
{
EncryptBlockDelegate = (inputBuffer, inputOffset, inputCount, outputBuffer, outputOffset) =>
{
@@ -40,7 +40,7 @@ public void DecryptShouldTakeIntoAccountPaddingForLengthOfOutputBufferPassedToDe
var input = new byte[] { 0x2c, 0x1a, 0x05, 0x00, 0x68 };
var output = new byte[] { 0x0a, 0x00, 0x03, 0x02, 0x06, 0x08, 0x07, 0x05 };
var key = new byte[] { 0x17, 0x78, 0x56, 0xe1, 0x3e, 0xbd, 0x3e, 0x50, 0x1d, 0x79, 0x3f, 0x0f, 0x55, 0x37, 0x45, 0x54 };
- var blockCipher = new BlockCipherStub(key, 8, null, new PKCS5Padding())
+ var blockCipher = new BlockCipherStub(key, 8, null, new PKCS7Padding())
{
DecryptBlockDelegate = (inputBuffer, inputOffset, inputCount, outputBuffer, outputOffset) =>
{
diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs
deleted file mode 100644
index 7a95f7073..000000000
--- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs
+++ /dev/null
@@ -1,107 +0,0 @@
-using System.Text;
-
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Common;
-using Renci.SshNet.Security.Cryptography.Ciphers;
-using Renci.SshNet.Tests.Common;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers
-{
- ///
- /// Implements ARCH4 cipher algorithm
- ///
- [TestClass]
- public class Arc4CipherTest : TestBase
- {
- [TestMethod]
- public void Decrypt_DischargeFirstBytes_False1()
- {
- const string key = "Key";
- const string expectedPlainText = "Plaintext";
- var encoding = Encoding.ASCII;
- var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
- var cipherText = new byte[] { 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3 };
-
- var actualPlainText = cipher.Decrypt(cipherText);
-
- Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText));
- }
-
- [TestMethod]
- public void Decrypt_DischargeFirstBytes_False2()
- {
- const string key = "Wiki";
- const string expectedPlainText = "pedia";
- var encoding = Encoding.ASCII;
- var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
- var cipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 };
-
- var actualPlainText = cipher.Decrypt(cipherText);
-
- Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText));
- }
-
- [TestMethod]
- public void Decrypt_InputAndOffsetAndLength()
- {
- const string key = "Key";
- const string expectedPlainText = "Plaintext";
- var encoding = Encoding.ASCII;
- var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
- var cipherText = new byte[] { 0x0A, 0x0f, 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3, 0x0d, 0x05 };
-
- var actualPlainText = cipher.Decrypt(cipherText, 2, cipherText.Length - 4);
-
- Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText));
- }
-
- [TestMethod]
- public void Encrypt_DischargeFirstBytes_False1()
- {
- const string key = "Key";
- const string plainText = "Plaintext";
- var encoding = Encoding.ASCII;
- var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
- var expectedCipherText = new byte[] { 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3 };
-
- var actualCipherText = cipher.Encrypt(encoding.GetBytes(plainText));
-
- Assert.IsNotNull(actualCipherText);
- Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText));
- }
-
- [TestMethod]
- public void Encrypt_DischargeFirstBytes_False2()
- {
- const string key = "Wiki";
- const string plainText = "pedia";
- var encoding = Encoding.ASCII;
- var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
- var expectedCipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 };
-
- var actualCipherText = cipher.Encrypt(encoding.GetBytes(plainText));
-
- Assert.IsNotNull(actualCipherText);
- Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText));
- }
-
- [TestMethod]
- public void Encrypt_InputAndOffsetAndLength()
- {
- const string key = "Wiki";
- const string plainText = "NOpediaNO";
- var encoding = Encoding.ASCII;
- var cipher = new Arc4Cipher(encoding.GetBytes(key), false);
- var plainTextBytes = encoding.GetBytes(plainText);
- var expectedCipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 };
-
- var actualCipherText = cipher.Encrypt(plainTextBytes, 2, plainTextBytes.Length - 4);
-
- Assert.IsNotNull(actualCipherText);
- Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText));
-
- Assert.IsTrue(plainTextBytes.IsEqualTo(encoding.GetBytes(plainText)));
- }
- }
-}
diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs
deleted file mode 100644
index 828d1c5c4..000000000
--- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs
+++ /dev/null
@@ -1,33 +0,0 @@
-using System.Linq;
-
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Security.Cryptography.Ciphers;
-using Renci.SshNet.Security.Cryptography.Ciphers.Modes;
-using Renci.SshNet.Tests.Common;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers
-{
- ///
- ///
- ///
- [TestClass]
- public class BlowfishCipherTest : TestBase
- {
- [TestMethod]
- public void Test_Cipher_Blowfish_128_CBC()
- {
- var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 };
- var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 };
- var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 };
- var output = new byte[] { 0x50, 0x49, 0xe0, 0xce, 0x98, 0x93, 0x8b, 0xec, 0x82, 0x7d, 0x14, 0x1b, 0x3e, 0xdc, 0xca, 0x63, 0xef, 0x36, 0x20, 0x67, 0x58, 0x63, 0x1f, 0x9c, 0xd2, 0x12, 0x6b, 0xca, 0xea, 0xd0, 0x78, 0x8b, 0x61, 0x50, 0x4f, 0xc4, 0x5b, 0x32, 0x91, 0xd6, 0x65, 0xcb, 0x74, 0xe5, 0x6e, 0xf5, 0xde, 0x14 };
- var testCipher = new BlowfishCipher(key, new CbcCipherMode(iv), null);
- var r = testCipher.Encrypt(input);
-
- if (!r.SequenceEqual(output))
- {
- Assert.Fail("Invalid encryption");
- }
- }
- }
-}
diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs
deleted file mode 100644
index a01dde959..000000000
--- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs
+++ /dev/null
@@ -1,43 +0,0 @@
-using System.Linq;
-
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Security.Cryptography.Ciphers;
-using Renci.SshNet.Security.Cryptography.Ciphers.Modes;
-using Renci.SshNet.Tests.Common;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers
-{
- ///
- /// Implements CAST cipher algorithm
- ///
- [TestClass]
- public class CastCipherTest : TestBase
- {
- [TestMethod]
- public void Encrypt_128_CBC()
- {
- var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 };
- var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 };
- var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 };
- var output = new byte[] { 0x32, 0xef, 0xbd, 0xac, 0xb6, 0xfd, 0x1f, 0xae, 0x1b, 0x13, 0x5f, 0x31, 0x6d, 0x38, 0xcd, 0xb0, 0xe3, 0xca, 0xe1, 0xbc, 0xf8, 0xa7, 0xc2, 0x31, 0x62, 0x14, 0x3a, 0x9a, 0xda, 0xe3, 0xf8, 0xc8, 0x70, 0x87, 0x53, 0x21, 0x5d, 0xb7, 0x94, 0xb7, 0xe8, 0xc6, 0x9d, 0x46, 0x0c, 0x6d, 0x64, 0x6d };
- var testCipher = new CastCipher(key, new CbcCipherMode(iv), null);
- var r = testCipher.Encrypt(input);
-
- Assert.IsTrue(r.SequenceEqual(output));
- }
-
- [TestMethod]
- public void Decrypt_128_CBC()
- {
- var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 };
- var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 };
- var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 };
- var output = new byte[] { 0x32, 0xef, 0xbd, 0xac, 0xb6, 0xfd, 0x1f, 0xae, 0x1b, 0x13, 0x5f, 0x31, 0x6d, 0x38, 0xcd, 0xb0, 0xe3, 0xca, 0xe1, 0xbc, 0xf8, 0xa7, 0xc2, 0x31, 0x62, 0x14, 0x3a, 0x9a, 0xda, 0xe3, 0xf8, 0xc8, 0x70, 0x87, 0x53, 0x21, 0x5d, 0xb7, 0x94, 0xb7, 0xe8, 0xc6, 0x9d, 0x46, 0x0c, 0x6d, 0x64, 0x6d };
- var testCipher = new CastCipher(key, new CbcCipherMode(iv), null);
- var r = testCipher.Decrypt(output);
-
- Assert.IsTrue(r.SequenceEqual(input));
- }
- }
-}
diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs
deleted file mode 100644
index 80a0d9c69..000000000
--- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs
+++ /dev/null
@@ -1,63 +0,0 @@
-using Microsoft.VisualStudio.TestTools.UnitTesting;
-
-using Renci.SshNet.Common;
-using Renci.SshNet.Security.Cryptography.Ciphers.Paddings;
-
-namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers.Paddings
-{
- [TestClass]
- public class PKCS5PaddingTest
- {
- private PKCS5Padding _padding;
-
- [TestInitialize]
- public void SetUp()
- {
- _padding = new PKCS5Padding();
- }
-
- [TestMethod]
- public void Pad_BlockSizeAndInput_LessThanBlockSize()
- {
- var input = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05 };
- var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x03, 0x03, 0x03 };
-
- var actual = _padding.Pad(8, input);
-
- Assert.IsTrue(expected.IsEqualTo(actual));
- }
-
- [TestMethod]
- public void Pad_BlockSizeAndInput_MoreThanBlockSizeButNoMultipleOfBlockSize()
- {
- var input = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09 };
- var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07 };
-
- var actual = _padding.Pad(8, input);
-
- Assert.IsTrue(expected.IsEqualTo(actual));
- }
-
- [TestMethod]
- public void Pad_BlockSizeAndInputAndOffsetAndLength_LessThanBlockSize()
- {
- var input = new byte[] { 0x0f, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
- var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x03, 0x03, 0x03 };
-
- var actual = _padding.Pad(8, input, 1, input.Length - 2);
-
- Assert.IsTrue(expected.IsEqualTo(actual));
- }
-
- [TestMethod]
- public void Pad_BlockSizeAndInputAndOffsetAndLength_MoreThanBlockSizeButNoMultipleOfBlockSize()
- {
- var input = new byte[] { 0x0f, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x10 };
- var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07 };
-
- var actual = _padding.Pad(8, input, 1, input.Length - 2);
-
- Assert.IsTrue(expected.IsEqualTo(actual));
- }
- }
-}