diff --git a/README.md b/README.md index 32c865b91..a6c09ecc8 100644 --- a/README.md +++ b/README.md @@ -76,15 +76,6 @@ The main types provided by this library are: * aes192-cbc * aes256-cbc * 3des-cbc -* blowfish-cbc -* twofish-cbc -* twofish192-cbc -* twofish128-cbc -* twofish256-cbc -* arcfour -* arcfour128 -* arcfour256 -* cast128-cbc ## Key Exchange Methods @@ -134,18 +125,10 @@ Private keys can be encrypted using one of the following cipher methods: **SSH.NET** supports the following MAC algorithms: * hmac-sha2-256 * hmac-sha2-512 -* hmac-sha2-512-96 -* hmac-sha2-256-96 * hmac-sha1 -* hmac-sha1-96 -* hmac-md5 -* hmac-md5-96 * hmac-sha2-256-etm@openssh.com * hmac-sha2-512-etm@openssh.com * hmac-sha1-etm@openssh.com -* hmac-sha1-96-etm@openssh.com -* hmac-md5-etm@openssh.com -* hmac-md5-96-etm@openssh.com ## Compression diff --git a/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs b/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs index 1f98712b0..1567af3ef 100644 --- a/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs +++ b/src/Renci.SshNet/Abstractions/CryptoAbstraction.cs @@ -1,7 +1,5 @@ using System; -using Renci.SshNet.Security.Cryptography; - namespace Renci.SshNet.Abstractions { internal static class CryptoAbstraction @@ -62,55 +60,5 @@ public static System.Security.Cryptography.SHA512 CreateSHA512() { return System.Security.Cryptography.SHA512.Create(); } - - public static System.Security.Cryptography.HMACMD5 CreateHMACMD5(byte[] key) - { - return new System.Security.Cryptography.HMACMD5(key); - } - - public static HMACMD5 CreateHMACMD5(byte[] key, int hashSize) - { - return new HMACMD5(key, hashSize); - } - - public static System.Security.Cryptography.HMACSHA1 CreateHMACSHA1(byte[] key) - { - return new System.Security.Cryptography.HMACSHA1(key); - } - - public static HMACSHA1 CreateHMACSHA1(byte[] key, int hashSize) - { - return new HMACSHA1(key, hashSize); - } - - public static System.Security.Cryptography.HMACSHA256 CreateHMACSHA256(byte[] key) - { - return new System.Security.Cryptography.HMACSHA256(key); - } - - public static HMACSHA256 CreateHMACSHA256(byte[] key, int hashSize) - { - return new HMACSHA256(key, hashSize); - } - - public static System.Security.Cryptography.HMACSHA384 CreateHMACSHA384(byte[] key) - { - return new System.Security.Cryptography.HMACSHA384(key); - } - - public static HMACSHA384 CreateHMACSHA384(byte[] key, int hashSize) - { - return new HMACSHA384(key, hashSize); - } - - public static System.Security.Cryptography.HMACSHA512 CreateHMACSHA512(byte[] key) - { - return new System.Security.Cryptography.HMACSHA512(key); - } - - public static HMACSHA512 CreateHMACSHA512(byte[] key, int hashSize) - { - return new HMACSHA512(key, hashSize); - } } } diff --git a/src/Renci.SshNet/ConnectionInfo.cs b/src/Renci.SshNet/ConnectionInfo.cs index f5609dc58..4c2e9b375 100644 --- a/src/Renci.SshNet/ConnectionInfo.cs +++ b/src/Renci.SshNet/ConnectionInfo.cs @@ -5,7 +5,6 @@ using System.Security.Cryptography; using System.Text; -using Renci.SshNet.Abstractions; using Renci.SshNet.Common; using Renci.SshNet.Compression; using Renci.SshNet.Messages.Authentication; @@ -397,37 +396,18 @@ public ConnectionInfo(string host, int port, string username, ProxyTypes proxyTy Encryptions.Add("aes192-cbc", new CipherInfo(192, (key, iv) => new AesCipher(key, iv, AesCipherMode.CBC, pkcs7Padding: false))); Encryptions.Add("aes256-cbc", new CipherInfo(256, (key, iv) => new AesCipher(key, iv, AesCipherMode.CBC, pkcs7Padding: false))); Encryptions.Add("3des-cbc", new CipherInfo(192, (key, iv) => new TripleDesCipher(key, new CbcCipherMode(iv), padding: null))); - Encryptions.Add("blowfish-cbc", new CipherInfo(128, (key, iv) => new BlowfishCipher(key, new CbcCipherMode(iv), padding: null))); - Encryptions.Add("twofish-cbc", new CipherInfo(256, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null))); - Encryptions.Add("twofish192-cbc", new CipherInfo(192, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null))); - Encryptions.Add("twofish128-cbc", new CipherInfo(128, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null))); - Encryptions.Add("twofish256-cbc", new CipherInfo(256, (key, iv) => new TwofishCipher(key, new CbcCipherMode(iv), padding: null))); - Encryptions.Add("arcfour", new CipherInfo(128, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: false))); - Encryptions.Add("arcfour128", new CipherInfo(128, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: true))); - Encryptions.Add("arcfour256", new CipherInfo(256, (key, iv) => new Arc4Cipher(key, dischargeFirstBytes: true))); - Encryptions.Add("cast128-cbc", new CipherInfo(128, (key, iv) => new CastCipher(key, new CbcCipherMode(iv), padding: null))); - -#pragma warning disable IDE0200 // Remove unnecessary lambda expression; We want to prevent instantiating the HashAlgorithm objects. + HmacAlgorithms = new Dictionary { /* Encrypt-and-MAC (encrypt-and-authenticate) variants */ - { "hmac-sha2-256", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key), isEncryptThenMAC: false) }, - { "hmac-sha2-512", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key), isEncryptThenMAC: false) }, - { "hmac-sha2-512-96", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key, 96), isEncryptThenMAC: false) }, - { "hmac-sha2-256-96", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key, 96), isEncryptThenMAC: false) }, - { "hmac-sha1", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key), isEncryptThenMAC: false) }, - { "hmac-sha1-96", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key, 96), isEncryptThenMAC: false) }, - { "hmac-md5", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key), isEncryptThenMAC: false) }, - { "hmac-md5-96", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key, 96), isEncryptThenMAC: false) }, + { "hmac-sha2-256", new HashInfo(32*8, key => new HMACSHA256(key)) }, + { "hmac-sha2-512", new HashInfo(64*8, key => new HMACSHA512(key)) }, + { "hmac-sha1", new HashInfo(20*8, key => new HMACSHA1(key)) }, /* Encrypt-then-MAC variants */ - { "hmac-sha2-256-etm@openssh.com", new HashInfo(32*8, key => CryptoAbstraction.CreateHMACSHA256(key), isEncryptThenMAC: true) }, - { "hmac-sha2-512-etm@openssh.com", new HashInfo(64*8, key => CryptoAbstraction.CreateHMACSHA512(key), isEncryptThenMAC: true) }, - { "hmac-sha1-etm@openssh.com", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key), isEncryptThenMAC: true) }, - { "hmac-sha1-96-etm@openssh.com", new HashInfo(20*8, key => CryptoAbstraction.CreateHMACSHA1(key, 96), isEncryptThenMAC: true) }, - { "hmac-md5-etm@openssh.com", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key), isEncryptThenMAC: true) }, - { "hmac-md5-96-etm@openssh.com", new HashInfo(16*8, key => CryptoAbstraction.CreateHMACMD5(key, 96), isEncryptThenMAC: true) }, + { "hmac-sha2-256-etm@openssh.com", new HashInfo(32*8, key => new HMACSHA256(key), isEncryptThenMAC: true) }, + { "hmac-sha2-512-etm@openssh.com", new HashInfo(64*8, key => new HMACSHA512(key), isEncryptThenMAC: true) }, + { "hmac-sha1-etm@openssh.com", new HashInfo(20*8, key => new HMACSHA1(key), isEncryptThenMAC: true) }, }; -#pragma warning restore IDE0200 // Remove unnecessary lambda expression HostKeyAlgorithms = new Dictionary> { diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs deleted file mode 100644 index 43805d65f..000000000 --- a/src/Renci.SshNet/Security/Cryptography/Ciphers/Arc4Cipher.cs +++ /dev/null @@ -1,140 +0,0 @@ -using System; - -namespace Renci.SshNet.Security.Cryptography.Ciphers -{ - /// - /// Implements ARCH4 cipher algorithm. - /// - public sealed class Arc4Cipher : StreamCipher - { -#pragma warning disable SA1310 // Field names should not contain underscore - private const int STATE_LENGTH = 256; -#pragma warning restore SA1310 // Field names should not contain underscore - - /// - /// Holds the state of the RC4 engine. - /// - private byte[] _engineState; - - private int _x; - - private int _y; - - /// - /// Gets the minimum data size. - /// - /// - /// The minimum data size. - /// - public override byte MinimumSize - { - get { return 0; } - } - - /// - /// Initializes a new instance of the class. - /// - /// The key. - /// if set to will disharged first 1536 bytes. - /// is . - public Arc4Cipher(byte[] key, bool dischargeFirstBytes) - : base(key) - { - SetKey(key); - - // The first 1536 bytes of keystream generated by the cipher MUST be discarded, and the first byte of the - // first encrypted packet MUST be encrypted using the 1537th byte of keystream. - if (dischargeFirstBytes) - { - _ = Encrypt(new byte[1536]); - } - } - - /// - /// Encrypts the specified input. - /// - /// The input. - /// The zero-based offset in at which to begin encrypting. - /// The number of bytes to encrypt from . - /// - /// Encrypted data. - /// - public override byte[] Encrypt(byte[] input, int offset, int length) - { - var output = new byte[length]; - _ = ProcessBytes(input, offset, length, output, 0); - return output; - } - - /// - /// Decrypts the specified input. - /// - /// The input. - /// The zero-based offset in at which to begin decrypting. - /// The number of bytes to decrypt from . - /// - /// The decrypted data. - /// - public override byte[] Decrypt(byte[] input, int offset, int length) - { - return Encrypt(input, offset, length); - } - - private int ProcessBytes(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - if ((inputOffset + inputCount) > inputBuffer.Length) - { - throw new ArgumentException("input buffer too short"); - } - - if ((outputOffset + inputCount) > outputBuffer.Length) - { - throw new ArgumentException("output buffer too short"); - } - - for (var i = 0; i < inputCount; i++) - { - _x = (_x + 1) & 0xff; - _y = (_engineState[_x] + _y) & 0xff; - - // swap - var tmp = _engineState[_x]; - _engineState[_x] = _engineState[_y]; - _engineState[_y] = tmp; - - // xor - outputBuffer[i + outputOffset] = (byte)(inputBuffer[i + inputOffset] ^ _engineState[(_engineState[_x] + _engineState[_y]) & 0xff]); - } - - return inputCount; - } - - private void SetKey(byte[] keyBytes) - { - _x = 0; - _y = 0; - - _engineState ??= new byte[STATE_LENGTH]; - - // reset the state of the engine - for (var i = 0; i < STATE_LENGTH; i++) - { - _engineState[i] = (byte)i; - } - - var i1 = 0; - var i2 = 0; - - for (var i = 0; i < STATE_LENGTH; i++) - { - i2 = ((keyBytes[i1] & 0xff) + _engineState[i] + i2) & 0xff; - - // do the byte-swap inline - var tmp = _engineState[i]; - _engineState[i] = _engineState[i2]; - _engineState[i2] = tmp; - i1 = (i1 + 1) % keyBytes.Length; - } - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs deleted file mode 100644 index 7a7eebdaa..000000000 --- a/src/Renci.SshNet/Security/Cryptography/Ciphers/BlowfishCipher.cs +++ /dev/null @@ -1,526 +0,0 @@ -using System; -using System.Buffers.Binary; - -namespace Renci.SshNet.Security.Cryptography.Ciphers -{ - /// - /// Blowfish cipher implementation. - /// - public sealed class BlowfishCipher : BlockCipher - { - private const int Rounds = 16; - - private const int SboxSk = 256; - - private const int PSize = Rounds + 2; - - #region Static reference tables - - private static readonly uint[] KP = - { - 0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344, - 0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89, - 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C, - 0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917, - 0x9216D5D9, 0x8979FB1B - }; - - private static readonly uint[] KS0 = - { - 0xD1310BA6, 0x98DFB5AC, 0x2FFD72DB, 0xD01ADFB7, - 0xB8E1AFED, 0x6A267E96, 0xBA7C9045, 0xF12C7F99, - 0x24A19947, 0xB3916CF7, 0x0801F2E2, 0x858EFC16, - 0x636920D8, 0x71574E69, 0xA458FEA3, 0xF4933D7E, - 0x0D95748F, 0x728EB658, 0x718BCD58, 0x82154AEE, - 0x7B54A41D, 0xC25A59B5, 0x9C30D539, 0x2AF26013, - 0xC5D1B023, 0x286085F0, 0xCA417918, 0xB8DB38EF, - 0x8E79DCB0, 0x603A180E, 0x6C9E0E8B, 0xB01E8A3E, - 0xD71577C1, 0xBD314B27, 0x78AF2FDA, 0x55605C60, - 0xE65525F3, 0xAA55AB94, 0x57489862, 0x63E81440, - 0x55CA396A, 0x2AAB10B6, 0xB4CC5C34, 0x1141E8CE, - 0xA15486AF, 0x7C72E993, 0xB3EE1411, 0x636FBC2A, - 0x2BA9C55D, 0x741831F6, 0xCE5C3E16, 0x9B87931E, - 0xAFD6BA33, 0x6C24CF5C, 0x7A325381, 0x28958677, - 0x3B8F4898, 0x6B4BB9AF, 0xC4BFE81B, 0x66282193, - 0x61D809CC, 0xFB21A991, 0x487CAC60, 0x5DEC8032, - 0xEF845D5D, 0xE98575B1, 0xDC262302, 0xEB651B88, - 0x23893E81, 0xD396ACC5, 0x0F6D6FF3, 0x83F44239, - 0x2E0B4482, 0xA4842004, 0x69C8F04A, 0x9E1F9B5E, - 0x21C66842, 0xF6E96C9A, 0x670C9C61, 0xABD388F0, - 0x6A51A0D2, 0xD8542F68, 0x960FA728, 0xAB5133A3, - 0x6EEF0B6C, 0x137A3BE4, 0xBA3BF050, 0x7EFB2A98, - 0xA1F1651D, 0x39AF0176, 0x66CA593E, 0x82430E88, - 0x8CEE8619, 0x456F9FB4, 0x7D84A5C3, 0x3B8B5EBE, - 0xE06F75D8, 0x85C12073, 0x401A449F, 0x56C16AA6, - 0x4ED3AA62, 0x363F7706, 0x1BFEDF72, 0x429B023D, - 0x37D0D724, 0xD00A1248, 0xDB0FEAD3, 0x49F1C09B, - 0x075372C9, 0x80991B7B, 0x25D479D8, 0xF6E8DEF7, - 0xE3FE501A, 0xB6794C3B, 0x976CE0BD, 0x04C006BA, - 0xC1A94FB6, 0x409F60C4, 0x5E5C9EC2, 0x196A2463, - 0x68FB6FAF, 0x3E6C53B5, 0x1339B2EB, 0x3B52EC6F, - 0x6DFC511F, 0x9B30952C, 0xCC814544, 0xAF5EBD09, - 0xBEE3D004, 0xDE334AFD, 0x660F2807, 0x192E4BB3, - 0xC0CBA857, 0x45C8740F, 0xD20B5F39, 0xB9D3FBDB, - 0x5579C0BD, 0x1A60320A, 0xD6A100C6, 0x402C7279, - 0x679F25FE, 0xFB1FA3CC, 0x8EA5E9F8, 0xDB3222F8, - 0x3C7516DF, 0xFD616B15, 0x2F501EC8, 0xAD0552AB, - 0x323DB5FA, 0xFD238760, 0x53317B48, 0x3E00DF82, - 0x9E5C57BB, 0xCA6F8CA0, 0x1A87562E, 0xDF1769DB, - 0xD542A8F6, 0x287EFFC3, 0xAC6732C6, 0x8C4F5573, - 0x695B27B0, 0xBBCA58C8, 0xE1FFA35D, 0xB8F011A0, - 0x10FA3D98, 0xFD2183B8, 0x4AFCB56C, 0x2DD1D35B, - 0x9A53E479, 0xB6F84565, 0xD28E49BC, 0x4BFB9790, - 0xE1DDF2DA, 0xA4CB7E33, 0x62FB1341, 0xCEE4C6E8, - 0xEF20CADA, 0x36774C01, 0xD07E9EFE, 0x2BF11FB4, - 0x95DBDA4D, 0xAE909198, 0xEAAD8E71, 0x6B93D5A0, - 0xD08ED1D0, 0xAFC725E0, 0x8E3C5B2F, 0x8E7594B7, - 0x8FF6E2FB, 0xF2122B64, 0x8888B812, 0x900DF01C, - 0x4FAD5EA0, 0x688FC31C, 0xD1CFF191, 0xB3A8C1AD, - 0x2F2F2218, 0xBE0E1777, 0xEA752DFE, 0x8B021FA1, - 0xE5A0CC0F, 0xB56F74E8, 0x18ACF3D6, 0xCE89E299, - 0xB4A84FE0, 0xFD13E0B7, 0x7CC43B81, 0xD2ADA8D9, - 0x165FA266, 0x80957705, 0x93CC7314, 0x211A1477, - 0xE6AD2065, 0x77B5FA86, 0xC75442F5, 0xFB9D35CF, - 0xEBCDAF0C, 0x7B3E89A0, 0xD6411BD3, 0xAE1E7E49, - 0x00250E2D, 0x2071B35E, 0x226800BB, 0x57B8E0AF, - 0x2464369B, 0xF009B91E, 0x5563911D, 0x59DFA6AA, - 0x78C14389, 0xD95A537F, 0x207D5BA2, 0x02E5B9C5, - 0x83260376, 0x6295CFA9, 0x11C81968, 0x4E734A41, - 0xB3472DCA, 0x7B14A94A, 0x1B510052, 0x9A532915, - 0xD60F573F, 0xBC9BC6E4, 0x2B60A476, 0x81E67400, - 0x08BA6FB5, 0x571BE91F, 0xF296EC6B, 0x2A0DD915, - 0xB6636521, 0xE7B9F9B6, 0xFF34052E, 0xC5855664, - 0x53B02D5D, 0xA99F8FA1, 0x08BA4799, 0x6E85076A - }; - - private static readonly uint[] KS1 = - { - 0x4B7A70E9, 0xB5B32944, 0xDB75092E, 0xC4192623, - 0xAD6EA6B0, 0x49A7DF7D, 0x9CEE60B8, 0x8FEDB266, - 0xECAA8C71, 0x699A17FF, 0x5664526C, 0xC2B19EE1, - 0x193602A5, 0x75094C29, 0xA0591340, 0xE4183A3E, - 0x3F54989A, 0x5B429D65, 0x6B8FE4D6, 0x99F73FD6, - 0xA1D29C07, 0xEFE830F5, 0x4D2D38E6, 0xF0255DC1, - 0x4CDD2086, 0x8470EB26, 0x6382E9C6, 0x021ECC5E, - 0x09686B3F, 0x3EBAEFC9, 0x3C971814, 0x6B6A70A1, - 0x687F3584, 0x52A0E286, 0xB79C5305, 0xAA500737, - 0x3E07841C, 0x7FDEAE5C, 0x8E7D44EC, 0x5716F2B8, - 0xB03ADA37, 0xF0500C0D, 0xF01C1F04, 0x0200B3FF, - 0xAE0CF51A, 0x3CB574B2, 0x25837A58, 0xDC0921BD, - 0xD19113F9, 0x7CA92FF6, 0x94324773, 0x22F54701, - 0x3AE5E581, 0x37C2DADC, 0xC8B57634, 0x9AF3DDA7, - 0xA9446146, 0x0FD0030E, 0xECC8C73E, 0xA4751E41, - 0xE238CD99, 0x3BEA0E2F, 0x3280BBA1, 0x183EB331, - 0x4E548B38, 0x4F6DB908, 0x6F420D03, 0xF60A04BF, - 0x2CB81290, 0x24977C79, 0x5679B072, 0xBCAF89AF, - 0xDE9A771F, 0xD9930810, 0xB38BAE12, 0xDCCF3F2E, - 0x5512721F, 0x2E6B7124, 0x501ADDE6, 0x9F84CD87, - 0x7A584718, 0x7408DA17, 0xBC9F9ABC, 0xE94B7D8C, - 0xEC7AEC3A, 0xDB851DFA, 0x63094366, 0xC464C3D2, - 0xEF1C1847, 0x3215D908, 0xDD433B37, 0x24C2BA16, - 0x12A14D43, 0x2A65C451, 0x50940002, 0x133AE4DD, - 0x71DFF89E, 0x10314E55, 0x81AC77D6, 0x5F11199B, - 0x043556F1, 0xD7A3C76B, 0x3C11183B, 0x5924A509, - 0xF28FE6ED, 0x97F1FBFA, 0x9EBABF2C, 0x1E153C6E, - 0x86E34570, 0xEAE96FB1, 0x860E5E0A, 0x5A3E2AB3, - 0x771FE71C, 0x4E3D06FA, 0x2965DCB9, 0x99E71D0F, - 0x803E89D6, 0x5266C825, 0x2E4CC978, 0x9C10B36A, - 0xC6150EBA, 0x94E2EA78, 0xA5FC3C53, 0x1E0A2DF4, - 0xF2F74EA7, 0x361D2B3D, 0x1939260F, 0x19C27960, - 0x5223A708, 0xF71312B6, 0xEBADFE6E, 0xEAC31F66, - 0xE3BC4595, 0xA67BC883, 0xB17F37D1, 0x018CFF28, - 0xC332DDEF, 0xBE6C5AA5, 0x65582185, 0x68AB9802, - 0xEECEA50F, 0xDB2F953B, 0x2AEF7DAD, 0x5B6E2F84, - 0x1521B628, 0x29076170, 0xECDD4775, 0x619F1510, - 0x13CCA830, 0xEB61BD96, 0x0334FE1E, 0xAA0363CF, - 0xB5735C90, 0x4C70A239, 0xD59E9E0B, 0xCBAADE14, - 0xEECC86BC, 0x60622CA7, 0x9CAB5CAB, 0xB2F3846E, - 0x648B1EAF, 0x19BDF0CA, 0xA02369B9, 0x655ABB50, - 0x40685A32, 0x3C2AB4B3, 0x319EE9D5, 0xC021B8F7, - 0x9B540B19, 0x875FA099, 0x95F7997E, 0x623D7DA8, - 0xF837889A, 0x97E32D77, 0x11ED935F, 0x16681281, - 0x0E358829, 0xC7E61FD6, 0x96DEDFA1, 0x7858BA99, - 0x57F584A5, 0x1B227263, 0x9B83C3FF, 0x1AC24696, - 0xCDB30AEB, 0x532E3054, 0x8FD948E4, 0x6DBC3128, - 0x58EBF2EF, 0x34C6FFEA, 0xFE28ED61, 0xEE7C3C73, - 0x5D4A14D9, 0xE864B7E3, 0x42105D14, 0x203E13E0, - 0x45EEE2B6, 0xA3AAABEA, 0xDB6C4F15, 0xFACB4FD0, - 0xC742F442, 0xEF6ABBB5, 0x654F3B1D, 0x41CD2105, - 0xD81E799E, 0x86854DC7, 0xE44B476A, 0x3D816250, - 0xCF62A1F2, 0x5B8D2646, 0xFC8883A0, 0xC1C7B6A3, - 0x7F1524C3, 0x69CB7492, 0x47848A0B, 0x5692B285, - 0x095BBF00, 0xAD19489D, 0x1462B174, 0x23820E00, - 0x58428D2A, 0x0C55F5EA, 0x1DADF43E, 0x233F7061, - 0x3372F092, 0x8D937E41, 0xD65FECF1, 0x6C223BDB, - 0x7CDE3759, 0xCBEE7460, 0x4085F2A7, 0xCE77326E, - 0xA6078084, 0x19F8509E, 0xE8EFD855, 0x61D99735, - 0xA969A7AA, 0xC50C06C2, 0x5A04ABFC, 0x800BCADC, - 0x9E447A2E, 0xC3453484, 0xFDD56705, 0x0E1E9EC9, - 0xDB73DBD3, 0x105588CD, 0x675FDA79, 0xE3674340, - 0xC5C43465, 0x713E38D8, 0x3D28F89E, 0xF16DFF20, - 0x153E21E7, 0x8FB03D4A, 0xE6E39F2B, 0xDB83ADF7 - }; - - private static readonly uint[] KS2 = - { - 0xE93D5A68, 0x948140F7, 0xF64C261C, 0x94692934, - 0x411520F7, 0x7602D4F7, 0xBCF46B2E, 0xD4A20068, - 0xD4082471, 0x3320F46A, 0x43B7D4B7, 0x500061AF, - 0x1E39F62E, 0x97244546, 0x14214F74, 0xBF8B8840, - 0x4D95FC1D, 0x96B591AF, 0x70F4DDD3, 0x66A02F45, - 0xBFBC09EC, 0x03BD9785, 0x7FAC6DD0, 0x31CB8504, - 0x96EB27B3, 0x55FD3941, 0xDA2547E6, 0xABCA0A9A, - 0x28507825, 0x530429F4, 0x0A2C86DA, 0xE9B66DFB, - 0x68DC1462, 0xD7486900, 0x680EC0A4, 0x27A18DEE, - 0x4F3FFEA2, 0xE887AD8C, 0xB58CE006, 0x7AF4D6B6, - 0xAACE1E7C, 0xD3375FEC, 0xCE78A399, 0x406B2A42, - 0x20FE9E35, 0xD9F385B9, 0xEE39D7AB, 0x3B124E8B, - 0x1DC9FAF7, 0x4B6D1856, 0x26A36631, 0xEAE397B2, - 0x3A6EFA74, 0xDD5B4332, 0x6841E7F7, 0xCA7820FB, - 0xFB0AF54E, 0xD8FEB397, 0x454056AC, 0xBA489527, - 0x55533A3A, 0x20838D87, 0xFE6BA9B7, 0xD096954B, - 0x55A867BC, 0xA1159A58, 0xCCA92963, 0x99E1DB33, - 0xA62A4A56, 0x3F3125F9, 0x5EF47E1C, 0x9029317C, - 0xFDF8E802, 0x04272F70, 0x80BB155C, 0x05282CE3, - 0x95C11548, 0xE4C66D22, 0x48C1133F, 0xC70F86DC, - 0x07F9C9EE, 0x41041F0F, 0x404779A4, 0x5D886E17, - 0x325F51EB, 0xD59BC0D1, 0xF2BCC18F, 0x41113564, - 0x257B7834, 0x602A9C60, 0xDFF8E8A3, 0x1F636C1B, - 0x0E12B4C2, 0x02E1329E, 0xAF664FD1, 0xCAD18115, - 0x6B2395E0, 0x333E92E1, 0x3B240B62, 0xEEBEB922, - 0x85B2A20E, 0xE6BA0D99, 0xDE720C8C, 0x2DA2F728, - 0xD0127845, 0x95B794FD, 0x647D0862, 0xE7CCF5F0, - 0x5449A36F, 0x877D48FA, 0xC39DFD27, 0xF33E8D1E, - 0x0A476341, 0x992EFF74, 0x3A6F6EAB, 0xF4F8FD37, - 0xA812DC60, 0xA1EBDDF8, 0x991BE14C, 0xDB6E6B0D, - 0xC67B5510, 0x6D672C37, 0x2765D43B, 0xDCD0E804, - 0xF1290DC7, 0xCC00FFA3, 0xB5390F92, 0x690FED0B, - 0x667B9FFB, 0xCEDB7D9C, 0xA091CF0B, 0xD9155EA3, - 0xBB132F88, 0x515BAD24, 0x7B9479BF, 0x763BD6EB, - 0x37392EB3, 0xCC115979, 0x8026E297, 0xF42E312D, - 0x6842ADA7, 0xC66A2B3B, 0x12754CCC, 0x782EF11C, - 0x6A124237, 0xB79251E7, 0x06A1BBE6, 0x4BFB6350, - 0x1A6B1018, 0x11CAEDFA, 0x3D25BDD8, 0xE2E1C3C9, - 0x44421659, 0x0A121386, 0xD90CEC6E, 0xD5ABEA2A, - 0x64AF674E, 0xDA86A85F, 0xBEBFE988, 0x64E4C3FE, - 0x9DBC8057, 0xF0F7C086, 0x60787BF8, 0x6003604D, - 0xD1FD8346, 0xF6381FB0, 0x7745AE04, 0xD736FCCC, - 0x83426B33, 0xF01EAB71, 0xB0804187, 0x3C005E5F, - 0x77A057BE, 0xBDE8AE24, 0x55464299, 0xBF582E61, - 0x4E58F48F, 0xF2DDFDA2, 0xF474EF38, 0x8789BDC2, - 0x5366F9C3, 0xC8B38E74, 0xB475F255, 0x46FCD9B9, - 0x7AEB2661, 0x8B1DDF84, 0x846A0E79, 0x915F95E2, - 0x466E598E, 0x20B45770, 0x8CD55591, 0xC902DE4C, - 0xB90BACE1, 0xBB8205D0, 0x11A86248, 0x7574A99E, - 0xB77F19B6, 0xE0A9DC09, 0x662D09A1, 0xC4324633, - 0xE85A1F02, 0x09F0BE8C, 0x4A99A025, 0x1D6EFE10, - 0x1AB93D1D, 0x0BA5A4DF, 0xA186F20F, 0x2868F169, - 0xDCB7DA83, 0x573906FE, 0xA1E2CE9B, 0x4FCD7F52, - 0x50115E01, 0xA70683FA, 0xA002B5C4, 0x0DE6D027, - 0x9AF88C27, 0x773F8641, 0xC3604C06, 0x61A806B5, - 0xF0177A28, 0xC0F586E0, 0x006058AA, 0x30DC7D62, - 0x11E69ED7, 0x2338EA63, 0x53C2DD94, 0xC2C21634, - 0xBBCBEE56, 0x90BCB6DE, 0xEBFC7DA1, 0xCE591D76, - 0x6F05E409, 0x4B7C0188, 0x39720A3D, 0x7C927C24, - 0x86E3725F, 0x724D9DB9, 0x1AC15BB4, 0xD39EB8FC, - 0xED545578, 0x08FCA5B5, 0xD83D7CD3, 0x4DAD0FC4, - 0x1E50EF5E, 0xB161E6F8, 0xA28514D9, 0x6C51133C, - 0x6FD5C7E7, 0x56E14EC4, 0x362ABFCE, 0xDDC6C837, - 0xD79A3234, 0x92638212, 0x670EFA8E, 0x406000E0 - }; - - private static readonly uint[] KS3 = - { - 0x3A39CE37, 0xD3FAF5CF, 0xABC27737, 0x5AC52D1B, - 0x5CB0679E, 0x4FA33742, 0xD3822740, 0x99BC9BBE, - 0xD5118E9D, 0xBF0F7315, 0xD62D1C7E, 0xC700C47B, - 0xB78C1B6B, 0x21A19045, 0xB26EB1BE, 0x6A366EB4, - 0x5748AB2F, 0xBC946E79, 0xC6A376D2, 0x6549C2C8, - 0x530FF8EE, 0x468DDE7D, 0xD5730A1D, 0x4CD04DC6, - 0x2939BBDB, 0xA9BA4650, 0xAC9526E8, 0xBE5EE304, - 0xA1FAD5F0, 0x6A2D519A, 0x63EF8CE2, 0x9A86EE22, - 0xC089C2B8, 0x43242EF6, 0xA51E03AA, 0x9CF2D0A4, - 0x83C061BA, 0x9BE96A4D, 0x8FE51550, 0xBA645BD6, - 0x2826A2F9, 0xA73A3AE1, 0x4BA99586, 0xEF5562E9, - 0xC72FEFD3, 0xF752F7DA, 0x3F046F69, 0x77FA0A59, - 0x80E4A915, 0x87B08601, 0x9B09E6AD, 0x3B3EE593, - 0xE990FD5A, 0x9E34D797, 0x2CF0B7D9, 0x022B8B51, - 0x96D5AC3A, 0x017DA67D, 0xD1CF3ED6, 0x7C7D2D28, - 0x1F9F25CF, 0xADF2B89B, 0x5AD6B472, 0x5A88F54C, - 0xE029AC71, 0xE019A5E6, 0x47B0ACFD, 0xED93FA9B, - 0xE8D3C48D, 0x283B57CC, 0xF8D56629, 0x79132E28, - 0x785F0191, 0xED756055, 0xF7960E44, 0xE3D35E8C, - 0x15056DD4, 0x88F46DBA, 0x03A16125, 0x0564F0BD, - 0xC3EB9E15, 0x3C9057A2, 0x97271AEC, 0xA93A072A, - 0x1B3F6D9B, 0x1E6321F5, 0xF59C66FB, 0x26DCF319, - 0x7533D928, 0xB155FDF5, 0x03563482, 0x8ABA3CBB, - 0x28517711, 0xC20AD9F8, 0xABCC5167, 0xCCAD925F, - 0x4DE81751, 0x3830DC8E, 0x379D5862, 0x9320F991, - 0xEA7A90C2, 0xFB3E7BCE, 0x5121CE64, 0x774FBE32, - 0xA8B6E37E, 0xC3293D46, 0x48DE5369, 0x6413E680, - 0xA2AE0810, 0xDD6DB224, 0x69852DFD, 0x09072166, - 0xB39A460A, 0x6445C0DD, 0x586CDECF, 0x1C20C8AE, - 0x5BBEF7DD, 0x1B588D40, 0xCCD2017F, 0x6BB4E3BB, - 0xDDA26A7E, 0x3A59FF45, 0x3E350A44, 0xBCB4CDD5, - 0x72EACEA8, 0xFA6484BB, 0x8D6612AE, 0xBF3C6F47, - 0xD29BE463, 0x542F5D9E, 0xAEC2771B, 0xF64E6370, - 0x740E0D8D, 0xE75B1357, 0xF8721671, 0xAF537D5D, - 0x4040CB08, 0x4EB4E2CC, 0x34D2466A, 0x0115AF84, - 0xE1B00428, 0x95983A1D, 0x06B89FB4, 0xCE6EA048, - 0x6F3F3B82, 0x3520AB82, 0x011A1D4B, 0x277227F8, - 0x611560B1, 0xE7933FDC, 0xBB3A792B, 0x344525BD, - 0xA08839E1, 0x51CE794B, 0x2F32C9B7, 0xA01FBAC9, - 0xE01CC87E, 0xBCC7D1F6, 0xCF0111C3, 0xA1E8AAC7, - 0x1A908749, 0xD44FBD9A, 0xD0DADECB, 0xD50ADA38, - 0x0339C32A, 0xC6913667, 0x8DF9317C, 0xE0B12B4F, - 0xF79E59B7, 0x43F5BB3A, 0xF2D519FF, 0x27D9459C, - 0xBF97222C, 0x15E6FC2A, 0x0F91FC71, 0x9B941525, - 0xFAE59361, 0xCEB69CEB, 0xC2A86459, 0x12BAA8D1, - 0xB6C1075E, 0xE3056A0C, 0x10D25065, 0xCB03A442, - 0xE0EC6E0E, 0x1698DB3B, 0x4C98A0BE, 0x3278E964, - 0x9F1F9532, 0xE0D392DF, 0xD3A0342B, 0x8971F21E, - 0x1B0A7441, 0x4BA3348C, 0xC5BE7120, 0xC37632D8, - 0xDF359F8D, 0x9B992F2E, 0xE60B6F47, 0x0FE3F11D, - 0xE54CDA54, 0x1EDAD891, 0xCE6279CF, 0xCD3E7E6F, - 0x1618B166, 0xFD2C1D05, 0x848FD2C5, 0xF6FB2299, - 0xF523F357, 0xA6327623, 0x93A83531, 0x56CCCD02, - 0xACF08162, 0x5A75EBB5, 0x6E163697, 0x88D273CC, - 0xDE966292, 0x81B949D0, 0x4C50901B, 0x71C65614, - 0xE6C6C7BD, 0x327A140A, 0x45E1D006, 0xC3F27B9A, - 0xC9AA53FD, 0x62A80F00, 0xBB25BFE2, 0x35BDD2F6, - 0x71126905, 0xB2040222, 0xB6CBCF7C, 0xCD769C2B, - 0x53113EC0, 0x1640E3D3, 0x38ABBD60, 0x2547ADF0, - 0xBA38209C, 0xF746CE76, 0x77AFA1C5, 0x20756060, - 0x85CBFE4E, 0x8AE88DD8, 0x7AAAF9B0, 0x4CF9AA7E, - 0x1948C25C, 0x02FB8A8C, 0x01C36AE4, 0xD6EBE1F9, - 0x90D4F869, 0xA65CDEA0, 0x3F09252D, 0xC208E69F, - 0xB74E6132, 0xCE77E25B, 0x578FDFE3, 0x3AC372E6 - }; - - #endregion - - /// - /// The s-boxes. - /// - private readonly uint[] _s0; - private readonly uint[] _s1; - private readonly uint[] _s2; - private readonly uint[] _s3; - - /// - /// The p-array. - /// - private readonly uint[] _p; - - /// - /// Initializes a new instance of the class. - /// - /// The key. - /// The mode. - /// The padding. - /// is . - /// Keysize is not valid for this algorithm. - public BlowfishCipher(byte[] key, CipherMode mode, CipherPadding padding) - : base(key, 8, mode, padding) - { - var keySize = key.Length * 8; - - if (keySize is < 1 or > 448) - { - throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize)); - } - - _s0 = new uint[SboxSk]; - _s1 = new uint[SboxSk]; - _s2 = new uint[SboxSk]; - _s3 = new uint[SboxSk]; - _p = new uint[PSize]; - - SetKey(key); - } - - /// - /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array. - /// - /// The input data to encrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write encrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes encrypted. - /// - public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - if (inputCount != BlockSize) - { - throw new ArgumentException("inputCount"); - } - - var xl = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset)); - var xr = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4)); - - xl ^= _p[0]; - - for (var i = 1; i < Rounds; i += 2) - { - xr ^= F(xl) ^ _p[i]; - xl ^= F(xr) ^ _p[i + 1]; - } - - xr ^= _p[Rounds + 1]; - - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), xr); - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), xl); - - return BlockSize; - } - - /// - /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array. - /// - /// The input data to decrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write decrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes decrypted. - /// - public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - if (inputCount != BlockSize) - { - throw new ArgumentException("inputCount"); - } - - var xl = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset)); - var xr = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4)); - - xl ^= _p[Rounds + 1]; - - for (var i = Rounds; i > 0; i -= 2) - { - xr ^= F(xl) ^ _p[i]; - xl ^= F(xr) ^ _p[i - 1]; - } - - xr ^= _p[0]; - - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), xr); - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), xl); - - return BlockSize; - } - - private uint F(uint x) - { - return ((_s0[x >> 24] + _s1[(x >> 16) & 0xff]) ^ _s2[(x >> 8) & 0xff]) + _s3[x & 0xff]; - } - - private void SetKey(byte[] key) - { - /* - * - comments are from _Applied Crypto_, Schneier, p338 - * please be careful comparing the two, AC numbers the - * arrays from 1, the enclosed code from 0. - * - * (1) - * Initialise the S-boxes and the P-array, with a fixed string - * This string contains the hexadecimal digits of pi (3.141...) - */ - Buffer.BlockCopy(KS0, 0, _s0, 0, SboxSk * sizeof(uint)); - Buffer.BlockCopy(KS1, 0, _s1, 0, SboxSk * sizeof(uint)); - Buffer.BlockCopy(KS2, 0, _s2, 0, SboxSk * sizeof(uint)); - Buffer.BlockCopy(KS3, 0, _s3, 0, SboxSk * sizeof(uint)); - Buffer.BlockCopy(KP, 0, _p, 0, PSize * sizeof(uint)); - - /* - * (2) - * Now, XOR P[0] with the first 32 bits of the key, XOR P[1] with the - * second 32-bits of the key, and so on for all bits of the key - * (up to P[17]). Repeatedly cycle through the key bits until the - * entire P-array has been XOR-ed with the key bits - */ - var keyLength = key.Length; - var keyIndex = 0; - - for (var i = 0; i < PSize; i++) - { - // Get the 32 bits of the key, in 4 * 8 bit chunks - uint data = 0x0000000; - for (var j = 0; j < 4; j++) - { - // create a 32 bit block - data = (data << 8) | key[keyIndex++]; - - // wrap when we get to the end of the key - if (keyIndex >= keyLength) - { - keyIndex = 0; - } - } - - // XOR the newly created 32 bit chunk onto the P-array - _p[i] ^= data; - } - - /* - * (3) - * Encrypt the all-zero string with the Blowfish algorithm, using - * the subkeys described in (1) and (2) - * - * (4) - * Replace P1 and P2 with the output of step (3) - * - * (5) - * Encrypt the output of step(3) using the Blowfish algorithm, - * with the modified subkeys. - * - * (6) - * Replace P3 and P4 with the output of step (5) - * - * (7) - * Continue the process, replacing all elements of the P-array - * and then all four S-boxes in order, with the output of the - * continuously changing Blowfish algorithm - */ - - ProcessTable(0, 0, _p); - ProcessTable(_p[PSize - 2], _p[PSize - 1], _s0); - ProcessTable(_s0[SboxSk - 2], _s0[SboxSk - 1], _s1); - ProcessTable(_s1[SboxSk - 2], _s1[SboxSk - 1], _s2); - ProcessTable(_s2[SboxSk - 2], _s2[SboxSk - 1], _s3); - } - - /// - /// apply the encryption cycle to each value pair in the table. - /// - /// The xl. - /// The xr. - /// The table. - private void ProcessTable(uint xl, uint xr, uint[] table) - { - var size = table.Length; - - for (var s = 0; s < size; s += 2) - { - xl ^= _p[0]; - - for (var i = 1; i < Rounds; i += 2) - { - xr ^= F(xl) ^ _p[i]; - xl ^= F(xr) ^ _p[i + 1]; - } - - xr ^= _p[Rounds + 1]; - - table[s] = xr; - table[s + 1] = xl; - - xr = xl; // end of cycle swap - xl = table[s]; - } - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs deleted file mode 100644 index c88a1f3a6..000000000 --- a/src/Renci.SshNet/Security/Cryptography/Ciphers/CastCipher.cs +++ /dev/null @@ -1,725 +0,0 @@ -using System; -using System.Buffers.Binary; - -namespace Renci.SshNet.Security.Cryptography.Ciphers -{ - /// - /// Implements CAST cipher algorithm. - /// - public sealed class CastCipher : BlockCipher - { - private const int MaxRounds = 16; - - private const int RedRounds = 12; - - /// - /// The rotating round key. - /// - private readonly int[] _kr = new int[17]; - - /// - /// The masking round key. - /// - private readonly uint[] _km = new uint[17]; - - private int _rounds = MaxRounds; - - /// - /// Initializes a new instance of the class. - /// - /// The key. - /// The mode. - /// The padding. - /// is . - /// Keysize is not valid for this algorithm. - public CastCipher(byte[] key, CipherMode mode, CipherPadding padding) - : base(key, 8, mode, padding) - { - var keySize = key.Length * 8; - - if (!(keySize >= 40 && keySize <= 128 && keySize % 8 == 0)) - { - throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize)); - } - - SetKey(key); - } - - /// - /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array. - /// - /// The input data to encrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write encrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes encrypted. - /// - public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - /* - * process the input block - * batch the units up into a 32 bit chunk and go for it - * the array is in bytes, the increment is 8x8 bits = 64 - */ - - var l0 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset)); - var r0 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4)); - - var result = new uint[2]; - CastEncipher(l0, r0, result); - - // now stuff them into the destination block - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), result[0]); - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), result[1]); - - return BlockSize; - } - - /// - /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array. - /// - /// The input data to decrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write decrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes decrypted. - /// - public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - // process the input block - // batch the units up into a 32 bit chunk and go for it - // the array is in bytes, the increment is 8x8 bits = 64 - var l16 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset)); - var r16 = BinaryPrimitives.ReadUInt32BigEndian(inputBuffer.AsSpan(inputOffset + 4)); - - var result = new uint[2]; - CastDecipher(l16, r16, result); - - // now stuff them into the destination block - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset), result[0]); - BinaryPrimitives.WriteUInt32BigEndian(outputBuffer.AsSpan(outputOffset + 4), result[1]); - - return BlockSize; - } - - #region Static Definition Tables - - internal static readonly uint[] S1 = - { - 0x30fb40d4, 0x9fa0ff0b, 0x6beccd2f, 0x3f258c7a, 0x1e213f2f, 0x9c004dd3, 0x6003e540, 0xcf9fc949, - 0xbfd4af27, 0x88bbbdb5, 0xe2034090, 0x98d09675, 0x6e63a0e0, 0x15c361d2, 0xc2e7661d, 0x22d4ff8e, - 0x28683b6f, 0xc07fd059, 0xff2379c8, 0x775f50e2, 0x43c340d3, 0xdf2f8656, 0x887ca41a, 0xa2d2bd2d, - 0xa1c9e0d6, 0x346c4819, 0x61b76d87, 0x22540f2f, 0x2abe32e1, 0xaa54166b, 0x22568e3a, 0xa2d341d0, - 0x66db40c8, 0xa784392f, 0x004dff2f, 0x2db9d2de, 0x97943fac, 0x4a97c1d8, 0x527644b7, 0xb5f437a7, - 0xb82cbaef, 0xd751d159, 0x6ff7f0ed, 0x5a097a1f, 0x827b68d0, 0x90ecf52e, 0x22b0c054, 0xbc8e5935, - 0x4b6d2f7f, 0x50bb64a2, 0xd2664910, 0xbee5812d, 0xb7332290, 0xe93b159f, 0xb48ee411, 0x4bff345d, - 0xfd45c240, 0xad31973f, 0xc4f6d02e, 0x55fc8165, 0xd5b1caad, 0xa1ac2dae, 0xa2d4b76d, 0xc19b0c50, - 0x882240f2, 0x0c6e4f38, 0xa4e4bfd7, 0x4f5ba272, 0x564c1d2f, 0xc59c5319, 0xb949e354, 0xb04669fe, - 0xb1b6ab8a, 0xc71358dd, 0x6385c545, 0x110f935d, 0x57538ad5, 0x6a390493, 0xe63d37e0, 0x2a54f6b3, - 0x3a787d5f, 0x6276a0b5, 0x19a6fcdf, 0x7a42206a, 0x29f9d4d5, 0xf61b1891, 0xbb72275e, 0xaa508167, - 0x38901091, 0xc6b505eb, 0x84c7cb8c, 0x2ad75a0f, 0x874a1427, 0xa2d1936b, 0x2ad286af, 0xaa56d291, - 0xd7894360, 0x425c750d, 0x93b39e26, 0x187184c9, 0x6c00b32d, 0x73e2bb14, 0xa0bebc3c, 0x54623779, - 0x64459eab, 0x3f328b82, 0x7718cf82, 0x59a2cea6, 0x04ee002e, 0x89fe78e6, 0x3fab0950, 0x325ff6c2, - 0x81383f05, 0x6963c5c8, 0x76cb5ad6, 0xd49974c9, 0xca180dcf, 0x380782d5, 0xc7fa5cf6, 0x8ac31511, - 0x35e79e13, 0x47da91d0, 0xf40f9086, 0xa7e2419e, 0x31366241, 0x051ef495, 0xaa573b04, 0x4a805d8d, - 0x548300d0, 0x00322a3c, 0xbf64cddf, 0xba57a68e, 0x75c6372b, 0x50afd341, 0xa7c13275, 0x915a0bf5, - 0x6b54bfab, 0x2b0b1426, 0xab4cc9d7, 0x449ccd82, 0xf7fbf265, 0xab85c5f3, 0x1b55db94, 0xaad4e324, - 0xcfa4bd3f, 0x2deaa3e2, 0x9e204d02, 0xc8bd25ac, 0xeadf55b3, 0xd5bd9e98, 0xe31231b2, 0x2ad5ad6c, - 0x954329de, 0xadbe4528, 0xd8710f69, 0xaa51c90f, 0xaa786bf6, 0x22513f1e, 0xaa51a79b, 0x2ad344cc, - 0x7b5a41f0, 0xd37cfbad, 0x1b069505, 0x41ece491, 0xb4c332e6, 0x032268d4, 0xc9600acc, 0xce387e6d, - 0xbf6bb16c, 0x6a70fb78, 0x0d03d9c9, 0xd4df39de, 0xe01063da, 0x4736f464, 0x5ad328d8, 0xb347cc96, - 0x75bb0fc3, 0x98511bfb, 0x4ffbcc35, 0xb58bcf6a, 0xe11f0abc, 0xbfc5fe4a, 0xa70aec10, 0xac39570a, - 0x3f04442f, 0x6188b153, 0xe0397a2e, 0x5727cb79, 0x9ceb418f, 0x1cacd68d, 0x2ad37c96, 0x0175cb9d, - 0xc69dff09, 0xc75b65f0, 0xd9db40d8, 0xec0e7779, 0x4744ead4, 0xb11c3274, 0xdd24cb9e, 0x7e1c54bd, - 0xf01144f9, 0xd2240eb1, 0x9675b3fd, 0xa3ac3755, 0xd47c27af, 0x51c85f4d, 0x56907596, 0xa5bb15e6, - 0x580304f0, 0xca042cf1, 0x011a37ea, 0x8dbfaadb, 0x35ba3e4a, 0x3526ffa0, 0xc37b4d09, 0xbc306ed9, - 0x98a52666, 0x5648f725, 0xff5e569d, 0x0ced63d0, 0x7c63b2cf, 0x700b45e1, 0xd5ea50f1, 0x85a92872, - 0xaf1fbda7, 0xd4234870, 0xa7870bf3, 0x2d3b4d79, 0x42e04198, 0x0cd0ede7, 0x26470db8, 0xf881814c, - 0x474d6ad7, 0x7c0c5e5c, 0xd1231959, 0x381b7298, 0xf5d2f4db, 0xab838653, 0x6e2f1e23, 0x83719c9e, - 0xbd91e046, 0x9a56456e, 0xdc39200c, 0x20c8c571, 0x962bda1c, 0xe1e696ff, 0xb141ab08, 0x7cca89b9, - 0x1a69e783, 0x02cc4843, 0xa2f7c579, 0x429ef47d, 0x427b169c, 0x5ac9f049, 0xdd8f0f00, 0x5c8165bf - }; - - internal static readonly uint[] S2 = - { - 0x1f201094, 0xef0ba75b, 0x69e3cf7e, 0x393f4380, 0xfe61cf7a, 0xeec5207a, 0x55889c94, 0x72fc0651, - 0xada7ef79, 0x4e1d7235, 0xd55a63ce, 0xde0436ba, 0x99c430ef, 0x5f0c0794, 0x18dcdb7d, 0xa1d6eff3, - 0xa0b52f7b, 0x59e83605, 0xee15b094, 0xe9ffd909, 0xdc440086, 0xef944459, 0xba83ccb3, 0xe0c3cdfb, - 0xd1da4181, 0x3b092ab1, 0xf997f1c1, 0xa5e6cf7b, 0x01420ddb, 0xe4e7ef5b, 0x25a1ff41, 0xe180f806, - 0x1fc41080, 0x179bee7a, 0xd37ac6a9, 0xfe5830a4, 0x98de8b7f, 0x77e83f4e, 0x79929269, 0x24fa9f7b, - 0xe113c85b, 0xacc40083, 0xd7503525, 0xf7ea615f, 0x62143154, 0x0d554b63, 0x5d681121, 0xc866c359, - 0x3d63cf73, 0xcee234c0, 0xd4d87e87, 0x5c672b21, 0x071f6181, 0x39f7627f, 0x361e3084, 0xe4eb573b, - 0x602f64a4, 0xd63acd9c, 0x1bbc4635, 0x9e81032d, 0x2701f50c, 0x99847ab4, 0xa0e3df79, 0xba6cf38c, - 0x10843094, 0x2537a95e, 0xf46f6ffe, 0xa1ff3b1f, 0x208cfb6a, 0x8f458c74, 0xd9e0a227, 0x4ec73a34, - 0xfc884f69, 0x3e4de8df, 0xef0e0088, 0x3559648d, 0x8a45388c, 0x1d804366, 0x721d9bfd, 0xa58684bb, - 0xe8256333, 0x844e8212, 0x128d8098, 0xfed33fb4, 0xce280ae1, 0x27e19ba5, 0xd5a6c252, 0xe49754bd, - 0xc5d655dd, 0xeb667064, 0x77840b4d, 0xa1b6a801, 0x84db26a9, 0xe0b56714, 0x21f043b7, 0xe5d05860, - 0x54f03084, 0x066ff472, 0xa31aa153, 0xdadc4755, 0xb5625dbf, 0x68561be6, 0x83ca6b94, 0x2d6ed23b, - 0xeccf01db, 0xa6d3d0ba, 0xb6803d5c, 0xaf77a709, 0x33b4a34c, 0x397bc8d6, 0x5ee22b95, 0x5f0e5304, - 0x81ed6f61, 0x20e74364, 0xb45e1378, 0xde18639b, 0x881ca122, 0xb96726d1, 0x8049a7e8, 0x22b7da7b, - 0x5e552d25, 0x5272d237, 0x79d2951c, 0xc60d894c, 0x488cb402, 0x1ba4fe5b, 0xa4b09f6b, 0x1ca815cf, - 0xa20c3005, 0x8871df63, 0xb9de2fcb, 0x0cc6c9e9, 0x0beeff53, 0xe3214517, 0xb4542835, 0x9f63293c, - 0xee41e729, 0x6e1d2d7c, 0x50045286, 0x1e6685f3, 0xf33401c6, 0x30a22c95, 0x31a70850, 0x60930f13, - 0x73f98417, 0xa1269859, 0xec645c44, 0x52c877a9, 0xcdff33a6, 0xa02b1741, 0x7cbad9a2, 0x2180036f, - 0x50d99c08, 0xcb3f4861, 0xc26bd765, 0x64a3f6ab, 0x80342676, 0x25a75e7b, 0xe4e6d1fc, 0x20c710e6, - 0xcdf0b680, 0x17844d3b, 0x31eef84d, 0x7e0824e4, 0x2ccb49eb, 0x846a3bae, 0x8ff77888, 0xee5d60f6, - 0x7af75673, 0x2fdd5cdb, 0xa11631c1, 0x30f66f43, 0xb3faec54, 0x157fd7fa, 0xef8579cc, 0xd152de58, - 0xdb2ffd5e, 0x8f32ce19, 0x306af97a, 0x02f03ef8, 0x99319ad5, 0xc242fa0f, 0xa7e3ebb0, 0xc68e4906, - 0xb8da230c, 0x80823028, 0xdcdef3c8, 0xd35fb171, 0x088a1bc8, 0xbec0c560, 0x61a3c9e8, 0xbca8f54d, - 0xc72feffa, 0x22822e99, 0x82c570b4, 0xd8d94e89, 0x8b1c34bc, 0x301e16e6, 0x273be979, 0xb0ffeaa6, - 0x61d9b8c6, 0x00b24869, 0xb7ffce3f, 0x08dc283b, 0x43daf65a, 0xf7e19798, 0x7619b72f, 0x8f1c9ba4, - 0xdc8637a0, 0x16a7d3b1, 0x9fc393b7, 0xa7136eeb, 0xc6bcc63e, 0x1a513742, 0xef6828bc, 0x520365d6, - 0x2d6a77ab, 0x3527ed4b, 0x821fd216, 0x095c6e2e, 0xdb92f2fb, 0x5eea29cb, 0x145892f5, 0x91584f7f, - 0x5483697b, 0x2667a8cc, 0x85196048, 0x8c4bacea, 0x833860d4, 0x0d23e0f9, 0x6c387e8a, 0x0ae6d249, - 0xb284600c, 0xd835731d, 0xdcb1c647, 0xac4c56ea, 0x3ebd81b3, 0x230eabb0, 0x6438bc87, 0xf0b5b1fa, - 0x8f5ea2b3, 0xfc184642, 0x0a036b7a, 0x4fb089bd, 0x649da589, 0xa345415e, 0x5c038323, 0x3e5d3bb9, - 0x43d79572, 0x7e6dd07c, 0x06dfdf1e, 0x6c6cc4ef, 0x7160a539, 0x73bfbe70, 0x83877605, 0x4523ecf1 - }; - - internal static readonly uint[] S3 = - { - 0x8defc240, 0x25fa5d9f, 0xeb903dbf, 0xe810c907, 0x47607fff, 0x369fe44b, 0x8c1fc644, 0xaececa90, - 0xbeb1f9bf, 0xeefbcaea, 0xe8cf1950, 0x51df07ae, 0x920e8806, 0xf0ad0548, 0xe13c8d83, 0x927010d5, - 0x11107d9f, 0x07647db9, 0xb2e3e4d4, 0x3d4f285e, 0xb9afa820, 0xfade82e0, 0xa067268b, 0x8272792e, - 0x553fb2c0, 0x489ae22b, 0xd4ef9794, 0x125e3fbc, 0x21fffcee, 0x825b1bfd, 0x9255c5ed, 0x1257a240, - 0x4e1a8302, 0xbae07fff, 0x528246e7, 0x8e57140e, 0x3373f7bf, 0x8c9f8188, 0xa6fc4ee8, 0xc982b5a5, - 0xa8c01db7, 0x579fc264, 0x67094f31, 0xf2bd3f5f, 0x40fff7c1, 0x1fb78dfc, 0x8e6bd2c1, 0x437be59b, - 0x99b03dbf, 0xb5dbc64b, 0x638dc0e6, 0x55819d99, 0xa197c81c, 0x4a012d6e, 0xc5884a28, 0xccc36f71, - 0xb843c213, 0x6c0743f1, 0x8309893c, 0x0feddd5f, 0x2f7fe850, 0xd7c07f7e, 0x02507fbf, 0x5afb9a04, - 0xa747d2d0, 0x1651192e, 0xaf70bf3e, 0x58c31380, 0x5f98302e, 0x727cc3c4, 0x0a0fb402, 0x0f7fef82, - 0x8c96fdad, 0x5d2c2aae, 0x8ee99a49, 0x50da88b8, 0x8427f4a0, 0x1eac5790, 0x796fb449, 0x8252dc15, - 0xefbd7d9b, 0xa672597d, 0xada840d8, 0x45f54504, 0xfa5d7403, 0xe83ec305, 0x4f91751a, 0x925669c2, - 0x23efe941, 0xa903f12e, 0x60270df2, 0x0276e4b6, 0x94fd6574, 0x927985b2, 0x8276dbcb, 0x02778176, - 0xf8af918d, 0x4e48f79e, 0x8f616ddf, 0xe29d840e, 0x842f7d83, 0x340ce5c8, 0x96bbb682, 0x93b4b148, - 0xef303cab, 0x984faf28, 0x779faf9b, 0x92dc560d, 0x224d1e20, 0x8437aa88, 0x7d29dc96, 0x2756d3dc, - 0x8b907cee, 0xb51fd240, 0xe7c07ce3, 0xe566b4a1, 0xc3e9615e, 0x3cf8209d, 0x6094d1e3, 0xcd9ca341, - 0x5c76460e, 0x00ea983b, 0xd4d67881, 0xfd47572c, 0xf76cedd9, 0xbda8229c, 0x127dadaa, 0x438a074e, - 0x1f97c090, 0x081bdb8a, 0x93a07ebe, 0xb938ca15, 0x97b03cff, 0x3dc2c0f8, 0x8d1ab2ec, 0x64380e51, - 0x68cc7bfb, 0xd90f2788, 0x12490181, 0x5de5ffd4, 0xdd7ef86a, 0x76a2e214, 0xb9a40368, 0x925d958f, - 0x4b39fffa, 0xba39aee9, 0xa4ffd30b, 0xfaf7933b, 0x6d498623, 0x193cbcfa, 0x27627545, 0x825cf47a, - 0x61bd8ba0, 0xd11e42d1, 0xcead04f4, 0x127ea392, 0x10428db7, 0x8272a972, 0x9270c4a8, 0x127de50b, - 0x285ba1c8, 0x3c62f44f, 0x35c0eaa5, 0xe805d231, 0x428929fb, 0xb4fcdf82, 0x4fb66a53, 0x0e7dc15b, - 0x1f081fab, 0x108618ae, 0xfcfd086d, 0xf9ff2889, 0x694bcc11, 0x236a5cae, 0x12deca4d, 0x2c3f8cc5, - 0xd2d02dfe, 0xf8ef5896, 0xe4cf52da, 0x95155b67, 0x494a488c, 0xb9b6a80c, 0x5c8f82bc, 0x89d36b45, - 0x3a609437, 0xec00c9a9, 0x44715253, 0x0a874b49, 0xd773bc40, 0x7c34671c, 0x02717ef6, 0x4feb5536, - 0xa2d02fff, 0xd2bf60c4, 0xd43f03c0, 0x50b4ef6d, 0x07478cd1, 0x006e1888, 0xa2e53f55, 0xb9e6d4bc, - 0xa2048016, 0x97573833, 0xd7207d67, 0xde0f8f3d, 0x72f87b33, 0xabcc4f33, 0x7688c55d, 0x7b00a6b0, - 0x947b0001, 0x570075d2, 0xf9bb88f8, 0x8942019e, 0x4264a5ff, 0x856302e0, 0x72dbd92b, 0xee971b69, - 0x6ea22fde, 0x5f08ae2b, 0xaf7a616d, 0xe5c98767, 0xcf1febd2, 0x61efc8c2, 0xf1ac2571, 0xcc8239c2, - 0x67214cb8, 0xb1e583d1, 0xb7dc3e62, 0x7f10bdce, 0xf90a5c38, 0x0ff0443d, 0x606e6dc6, 0x60543a49, - 0x5727c148, 0x2be98a1d, 0x8ab41738, 0x20e1be24, 0xaf96da0f, 0x68458425, 0x99833be5, 0x600d457d, - 0x282f9350, 0x8334b362, 0xd91d1120, 0x2b6d8da0, 0x642b1e31, 0x9c305a00, 0x52bce688, 0x1b03588a, - 0xf7baefd5, 0x4142ed9c, 0xa4315c11, 0x83323ec5, 0xdfef4636, 0xa133c501, 0xe9d3531c, 0xee353783 - }; - - internal static readonly uint[] S4 = - { - 0x9db30420, 0x1fb6e9de, 0xa7be7bef, 0xd273a298, 0x4a4f7bdb, 0x64ad8c57, 0x85510443, 0xfa020ed1, - 0x7e287aff, 0xe60fb663, 0x095f35a1, 0x79ebf120, 0xfd059d43, 0x6497b7b1, 0xf3641f63, 0x241e4adf, - 0x28147f5f, 0x4fa2b8cd, 0xc9430040, 0x0cc32220, 0xfdd30b30, 0xc0a5374f, 0x1d2d00d9, 0x24147b15, - 0xee4d111a, 0x0fca5167, 0x71ff904c, 0x2d195ffe, 0x1a05645f, 0x0c13fefe, 0x081b08ca, 0x05170121, - 0x80530100, 0xe83e5efe, 0xac9af4f8, 0x7fe72701, 0xd2b8ee5f, 0x06df4261, 0xbb9e9b8a, 0x7293ea25, - 0xce84ffdf, 0xf5718801, 0x3dd64b04, 0xa26f263b, 0x7ed48400, 0x547eebe6, 0x446d4ca0, 0x6cf3d6f5, - 0x2649abdf, 0xaea0c7f5, 0x36338cc1, 0x503f7e93, 0xd3772061, 0x11b638e1, 0x72500e03, 0xf80eb2bb, - 0xabe0502e, 0xec8d77de, 0x57971e81, 0xe14f6746, 0xc9335400, 0x6920318f, 0x081dbb99, 0xffc304a5, - 0x4d351805, 0x7f3d5ce3, 0xa6c866c6, 0x5d5bcca9, 0xdaec6fea, 0x9f926f91, 0x9f46222f, 0x3991467d, - 0xa5bf6d8e, 0x1143c44f, 0x43958302, 0xd0214eeb, 0x022083b8, 0x3fb6180c, 0x18f8931e, 0x281658e6, - 0x26486e3e, 0x8bd78a70, 0x7477e4c1, 0xb506e07c, 0xf32d0a25, 0x79098b02, 0xe4eabb81, 0x28123b23, - 0x69dead38, 0x1574ca16, 0xdf871b62, 0x211c40b7, 0xa51a9ef9, 0x0014377b, 0x041e8ac8, 0x09114003, - 0xbd59e4d2, 0xe3d156d5, 0x4fe876d5, 0x2f91a340, 0x557be8de, 0x00eae4a7, 0x0ce5c2ec, 0x4db4bba6, - 0xe756bdff, 0xdd3369ac, 0xec17b035, 0x06572327, 0x99afc8b0, 0x56c8c391, 0x6b65811c, 0x5e146119, - 0x6e85cb75, 0xbe07c002, 0xc2325577, 0x893ff4ec, 0x5bbfc92d, 0xd0ec3b25, 0xb7801ab7, 0x8d6d3b24, - 0x20c763ef, 0xc366a5fc, 0x9c382880, 0x0ace3205, 0xaac9548a, 0xeca1d7c7, 0x041afa32, 0x1d16625a, - 0x6701902c, 0x9b757a54, 0x31d477f7, 0x9126b031, 0x36cc6fdb, 0xc70b8b46, 0xd9e66a48, 0x56e55a79, - 0x026a4ceb, 0x52437eff, 0x2f8f76b4, 0x0df980a5, 0x8674cde3, 0xedda04eb, 0x17a9be04, 0x2c18f4df, - 0xb7747f9d, 0xab2af7b4, 0xefc34d20, 0x2e096b7c, 0x1741a254, 0xe5b6a035, 0x213d42f6, 0x2c1c7c26, - 0x61c2f50f, 0x6552daf9, 0xd2c231f8, 0x25130f69, 0xd8167fa2, 0x0418f2c8, 0x001a96a6, 0x0d1526ab, - 0x63315c21, 0x5e0a72ec, 0x49bafefd, 0x187908d9, 0x8d0dbd86, 0x311170a7, 0x3e9b640c, 0xcc3e10d7, - 0xd5cad3b6, 0x0caec388, 0xf73001e1, 0x6c728aff, 0x71eae2a1, 0x1f9af36e, 0xcfcbd12f, 0xc1de8417, - 0xac07be6b, 0xcb44a1d8, 0x8b9b0f56, 0x013988c3, 0xb1c52fca, 0xb4be31cd, 0xd8782806, 0x12a3a4e2, - 0x6f7de532, 0x58fd7eb6, 0xd01ee900, 0x24adffc2, 0xf4990fc5, 0x9711aac5, 0x001d7b95, 0x82e5e7d2, - 0x109873f6, 0x00613096, 0xc32d9521, 0xada121ff, 0x29908415, 0x7fbb977f, 0xaf9eb3db, 0x29c9ed2a, - 0x5ce2a465, 0xa730f32c, 0xd0aa3fe8, 0x8a5cc091, 0xd49e2ce7, 0x0ce454a9, 0xd60acd86, 0x015f1919, - 0x77079103, 0xdea03af6, 0x78a8565e, 0xdee356df, 0x21f05cbe, 0x8b75e387, 0xb3c50651, 0xb8a5c3ef, - 0xd8eeb6d2, 0xe523be77, 0xc2154529, 0x2f69efdf, 0xafe67afb, 0xf470c4b2, 0xf3e0eb5b, 0xd6cc9876, - 0x39e4460c, 0x1fda8538, 0x1987832f, 0xca007367, 0xa99144f8, 0x296b299e, 0x492fc295, 0x9266beab, - 0xb5676e69, 0x9bd3ddda, 0xdf7e052f, 0xdb25701c, 0x1b5e51ee, 0xf65324e6, 0x6afce36c, 0x0316cc04, - 0x8644213e, 0xb7dc59d0, 0x7965291f, 0xccd6fd43, 0x41823979, 0x932bcdf6, 0xb657c34d, 0x4edfd282, - 0x7ae5290c, 0x3cb9536b, 0x851e20fe, 0x9833557e, 0x13ecf0b0, 0xd3ffb372, 0x3f85c5c1, 0x0aef7ed2 - }; - - internal static readonly uint[] S5 = - { - 0x7ec90c04, 0x2c6e74b9, 0x9b0e66df, 0xa6337911, 0xb86a7fff, 0x1dd358f5, 0x44dd9d44, 0x1731167f, - 0x08fbf1fa, 0xe7f511cc, 0xd2051b00, 0x735aba00, 0x2ab722d8, 0x386381cb, 0xacf6243a, 0x69befd7a, - 0xe6a2e77f, 0xf0c720cd, 0xc4494816, 0xccf5c180, 0x38851640, 0x15b0a848, 0xe68b18cb, 0x4caadeff, - 0x5f480a01, 0x0412b2aa, 0x259814fc, 0x41d0efe2, 0x4e40b48d, 0x248eb6fb, 0x8dba1cfe, 0x41a99b02, - 0x1a550a04, 0xba8f65cb, 0x7251f4e7, 0x95a51725, 0xc106ecd7, 0x97a5980a, 0xc539b9aa, 0x4d79fe6a, - 0xf2f3f763, 0x68af8040, 0xed0c9e56, 0x11b4958b, 0xe1eb5a88, 0x8709e6b0, 0xd7e07156, 0x4e29fea7, - 0x6366e52d, 0x02d1c000, 0xc4ac8e05, 0x9377f571, 0x0c05372a, 0x578535f2, 0x2261be02, 0xd642a0c9, - 0xdf13a280, 0x74b55bd2, 0x682199c0, 0xd421e5ec, 0x53fb3ce8, 0xc8adedb3, 0x28a87fc9, 0x3d959981, - 0x5c1ff900, 0xfe38d399, 0x0c4eff0b, 0x062407ea, 0xaa2f4fb1, 0x4fb96976, 0x90c79505, 0xb0a8a774, - 0xef55a1ff, 0xe59ca2c2, 0xa6b62d27, 0xe66a4263, 0xdf65001f, 0x0ec50966, 0xdfdd55bc, 0x29de0655, - 0x911e739a, 0x17af8975, 0x32c7911c, 0x89f89468, 0x0d01e980, 0x524755f4, 0x03b63cc9, 0x0cc844b2, - 0xbcf3f0aa, 0x87ac36e9, 0xe53a7426, 0x01b3d82b, 0x1a9e7449, 0x64ee2d7e, 0xcddbb1da, 0x01c94910, - 0xb868bf80, 0x0d26f3fd, 0x9342ede7, 0x04a5c284, 0x636737b6, 0x50f5b616, 0xf24766e3, 0x8eca36c1, - 0x136e05db, 0xfef18391, 0xfb887a37, 0xd6e7f7d4, 0xc7fb7dc9, 0x3063fcdf, 0xb6f589de, 0xec2941da, - 0x26e46695, 0xb7566419, 0xf654efc5, 0xd08d58b7, 0x48925401, 0xc1bacb7f, 0xe5ff550f, 0xb6083049, - 0x5bb5d0e8, 0x87d72e5a, 0xab6a6ee1, 0x223a66ce, 0xc62bf3cd, 0x9e0885f9, 0x68cb3e47, 0x086c010f, - 0xa21de820, 0xd18b69de, 0xf3f65777, 0xfa02c3f6, 0x407edac3, 0xcbb3d550, 0x1793084d, 0xb0d70eba, - 0x0ab378d5, 0xd951fb0c, 0xded7da56, 0x4124bbe4, 0x94ca0b56, 0x0f5755d1, 0xe0e1e56e, 0x6184b5be, - 0x580a249f, 0x94f74bc0, 0xe327888e, 0x9f7b5561, 0xc3dc0280, 0x05687715, 0x646c6bd7, 0x44904db3, - 0x66b4f0a3, 0xc0f1648a, 0x697ed5af, 0x49e92ff6, 0x309e374f, 0x2cb6356a, 0x85808573, 0x4991f840, - 0x76f0ae02, 0x083be84d, 0x28421c9a, 0x44489406, 0x736e4cb8, 0xc1092910, 0x8bc95fc6, 0x7d869cf4, - 0x134f616f, 0x2e77118d, 0xb31b2be1, 0xaa90b472, 0x3ca5d717, 0x7d161bba, 0x9cad9010, 0xaf462ba2, - 0x9fe459d2, 0x45d34559, 0xd9f2da13, 0xdbc65487, 0xf3e4f94e, 0x176d486f, 0x097c13ea, 0x631da5c7, - 0x445f7382, 0x175683f4, 0xcdc66a97, 0x70be0288, 0xb3cdcf72, 0x6e5dd2f3, 0x20936079, 0x459b80a5, - 0xbe60e2db, 0xa9c23101, 0xeba5315c, 0x224e42f2, 0x1c5c1572, 0xf6721b2c, 0x1ad2fff3, 0x8c25404e, - 0x324ed72f, 0x4067b7fd, 0x0523138e, 0x5ca3bc78, 0xdc0fd66e, 0x75922283, 0x784d6b17, 0x58ebb16e, - 0x44094f85, 0x3f481d87, 0xfcfeae7b, 0x77b5ff76, 0x8c2302bf, 0xaaf47556, 0x5f46b02a, 0x2b092801, - 0x3d38f5f7, 0x0ca81f36, 0x52af4a8a, 0x66d5e7c0, 0xdf3b0874, 0x95055110, 0x1b5ad7a8, 0xf61ed5ad, - 0x6cf6e479, 0x20758184, 0xd0cefa65, 0x88f7be58, 0x4a046826, 0x0ff6f8f3, 0xa09c7f70, 0x5346aba0, - 0x5ce96c28, 0xe176eda3, 0x6bac307f, 0x376829d2, 0x85360fa9, 0x17e3fe2a, 0x24b79767, 0xf5a96b20, - 0xd6cd2595, 0x68ff1ebf, 0x7555442c, 0xf19f06be, 0xf9e0659a, 0xeeb9491d, 0x34010718, 0xbb30cab8, - 0xe822fe15, 0x88570983, 0x750e6249, 0xda627e55, 0x5e76ffa8, 0xb1534546, 0x6d47de08, 0xefe9e7d4 - }; - - internal static readonly uint[] S6 = - { - 0xf6fa8f9d, 0x2cac6ce1, 0x4ca34867, 0xe2337f7c, 0x95db08e7, 0x016843b4, 0xeced5cbc, 0x325553ac, - 0xbf9f0960, 0xdfa1e2ed, 0x83f0579d, 0x63ed86b9, 0x1ab6a6b8, 0xde5ebe39, 0xf38ff732, 0x8989b138, - 0x33f14961, 0xc01937bd, 0xf506c6da, 0xe4625e7e, 0xa308ea99, 0x4e23e33c, 0x79cbd7cc, 0x48a14367, - 0xa3149619, 0xfec94bd5, 0xa114174a, 0xeaa01866, 0xa084db2d, 0x09a8486f, 0xa888614a, 0x2900af98, - 0x01665991, 0xe1992863, 0xc8f30c60, 0x2e78ef3c, 0xd0d51932, 0xcf0fec14, 0xf7ca07d2, 0xd0a82072, - 0xfd41197e, 0x9305a6b0, 0xe86be3da, 0x74bed3cd, 0x372da53c, 0x4c7f4448, 0xdab5d440, 0x6dba0ec3, - 0x083919a7, 0x9fbaeed9, 0x49dbcfb0, 0x4e670c53, 0x5c3d9c01, 0x64bdb941, 0x2c0e636a, 0xba7dd9cd, - 0xea6f7388, 0xe70bc762, 0x35f29adb, 0x5c4cdd8d, 0xf0d48d8c, 0xb88153e2, 0x08a19866, 0x1ae2eac8, - 0x284caf89, 0xaa928223, 0x9334be53, 0x3b3a21bf, 0x16434be3, 0x9aea3906, 0xefe8c36e, 0xf890cdd9, - 0x80226dae, 0xc340a4a3, 0xdf7e9c09, 0xa694a807, 0x5b7c5ecc, 0x221db3a6, 0x9a69a02f, 0x68818a54, - 0xceb2296f, 0x53c0843a, 0xfe893655, 0x25bfe68a, 0xb4628abc, 0xcf222ebf, 0x25ac6f48, 0xa9a99387, - 0x53bddb65, 0xe76ffbe7, 0xe967fd78, 0x0ba93563, 0x8e342bc1, 0xe8a11be9, 0x4980740d, 0xc8087dfc, - 0x8de4bf99, 0xa11101a0, 0x7fd37975, 0xda5a26c0, 0xe81f994f, 0x9528cd89, 0xfd339fed, 0xb87834bf, - 0x5f04456d, 0x22258698, 0xc9c4c83b, 0x2dc156be, 0x4f628daa, 0x57f55ec5, 0xe2220abe, 0xd2916ebf, - 0x4ec75b95, 0x24f2c3c0, 0x42d15d99, 0xcd0d7fa0, 0x7b6e27ff, 0xa8dc8af0, 0x7345c106, 0xf41e232f, - 0x35162386, 0xe6ea8926, 0x3333b094, 0x157ec6f2, 0x372b74af, 0x692573e4, 0xe9a9d848, 0xf3160289, - 0x3a62ef1d, 0xa787e238, 0xf3a5f676, 0x74364853, 0x20951063, 0x4576698d, 0xb6fad407, 0x592af950, - 0x36f73523, 0x4cfb6e87, 0x7da4cec0, 0x6c152daa, 0xcb0396a8, 0xc50dfe5d, 0xfcd707ab, 0x0921c42f, - 0x89dff0bb, 0x5fe2be78, 0x448f4f33, 0x754613c9, 0x2b05d08d, 0x48b9d585, 0xdc049441, 0xc8098f9b, - 0x7dede786, 0xc39a3373, 0x42410005, 0x6a091751, 0x0ef3c8a6, 0x890072d6, 0x28207682, 0xa9a9f7be, - 0xbf32679d, 0xd45b5b75, 0xb353fd00, 0xcbb0e358, 0x830f220a, 0x1f8fb214, 0xd372cf08, 0xcc3c4a13, - 0x8cf63166, 0x061c87be, 0x88c98f88, 0x6062e397, 0x47cf8e7a, 0xb6c85283, 0x3cc2acfb, 0x3fc06976, - 0x4e8f0252, 0x64d8314d, 0xda3870e3, 0x1e665459, 0xc10908f0, 0x513021a5, 0x6c5b68b7, 0x822f8aa0, - 0x3007cd3e, 0x74719eef, 0xdc872681, 0x073340d4, 0x7e432fd9, 0x0c5ec241, 0x8809286c, 0xf592d891, - 0x08a930f6, 0x957ef305, 0xb7fbffbd, 0xc266e96f, 0x6fe4ac98, 0xb173ecc0, 0xbc60b42a, 0x953498da, - 0xfba1ae12, 0x2d4bd736, 0x0f25faab, 0xa4f3fceb, 0xe2969123, 0x257f0c3d, 0x9348af49, 0x361400bc, - 0xe8816f4a, 0x3814f200, 0xa3f94043, 0x9c7a54c2, 0xbc704f57, 0xda41e7f9, 0xc25ad33a, 0x54f4a084, - 0xb17f5505, 0x59357cbe, 0xedbd15c8, 0x7f97c5ab, 0xba5ac7b5, 0xb6f6deaf, 0x3a479c3a, 0x5302da25, - 0x653d7e6a, 0x54268d49, 0x51a477ea, 0x5017d55b, 0xd7d25d88, 0x44136c76, 0x0404a8c8, 0xb8e5a121, - 0xb81a928a, 0x60ed5869, 0x97c55b96, 0xeaec991b, 0x29935913, 0x01fdb7f1, 0x088e8dfa, 0x9ab6f6f5, - 0x3b4cbf9f, 0x4a5de3ab, 0xe6051d35, 0xa0e1d855, 0xd36b4cf1, 0xf544edeb, 0xb0e93524, 0xbebb8fbd, - 0xa2d762cf, 0x49c92f54, 0x38b5f331, 0x7128a454, 0x48392905, 0xa65b1db8, 0x851c97bd, 0xd675cf2f - }; - - internal static readonly uint[] S7 = - { - 0x85e04019, 0x332bf567, 0x662dbfff, 0xcfc65693, 0x2a8d7f6f, 0xab9bc912, 0xde6008a1, 0x2028da1f, - 0x0227bce7, 0x4d642916, 0x18fac300, 0x50f18b82, 0x2cb2cb11, 0xb232e75c, 0x4b3695f2, 0xb28707de, - 0xa05fbcf6, 0xcd4181e9, 0xe150210c, 0xe24ef1bd, 0xb168c381, 0xfde4e789, 0x5c79b0d8, 0x1e8bfd43, - 0x4d495001, 0x38be4341, 0x913cee1d, 0x92a79c3f, 0x089766be, 0xbaeeadf4, 0x1286becf, 0xb6eacb19, - 0x2660c200, 0x7565bde4, 0x64241f7a, 0x8248dca9, 0xc3b3ad66, 0x28136086, 0x0bd8dfa8, 0x356d1cf2, - 0x107789be, 0xb3b2e9ce, 0x0502aa8f, 0x0bc0351e, 0x166bf52a, 0xeb12ff82, 0xe3486911, 0xd34d7516, - 0x4e7b3aff, 0x5f43671b, 0x9cf6e037, 0x4981ac83, 0x334266ce, 0x8c9341b7, 0xd0d854c0, 0xcb3a6c88, - 0x47bc2829, 0x4725ba37, 0xa66ad22b, 0x7ad61f1e, 0x0c5cbafa, 0x4437f107, 0xb6e79962, 0x42d2d816, - 0x0a961288, 0xe1a5c06e, 0x13749e67, 0x72fc081a, 0xb1d139f7, 0xf9583745, 0xcf19df58, 0xbec3f756, - 0xc06eba30, 0x07211b24, 0x45c28829, 0xc95e317f, 0xbc8ec511, 0x38bc46e9, 0xc6e6fa14, 0xbae8584a, - 0xad4ebc46, 0x468f508b, 0x7829435f, 0xf124183b, 0x821dba9f, 0xaff60ff4, 0xea2c4e6d, 0x16e39264, - 0x92544a8b, 0x009b4fc3, 0xaba68ced, 0x9ac96f78, 0x06a5b79a, 0xb2856e6e, 0x1aec3ca9, 0xbe838688, - 0x0e0804e9, 0x55f1be56, 0xe7e5363b, 0xb3a1f25d, 0xf7debb85, 0x61fe033c, 0x16746233, 0x3c034c28, - 0xda6d0c74, 0x79aac56c, 0x3ce4e1ad, 0x51f0c802, 0x98f8f35a, 0x1626a49f, 0xeed82b29, 0x1d382fe3, - 0x0c4fb99a, 0xbb325778, 0x3ec6d97b, 0x6e77a6a9, 0xcb658b5c, 0xd45230c7, 0x2bd1408b, 0x60c03eb7, - 0xb9068d78, 0xa33754f4, 0xf430c87d, 0xc8a71302, 0xb96d8c32, 0xebd4e7be, 0xbe8b9d2d, 0x7979fb06, - 0xe7225308, 0x8b75cf77, 0x11ef8da4, 0xe083c858, 0x8d6b786f, 0x5a6317a6, 0xfa5cf7a0, 0x5dda0033, - 0xf28ebfb0, 0xf5b9c310, 0xa0eac280, 0x08b9767a, 0xa3d9d2b0, 0x79d34217, 0x021a718d, 0x9ac6336a, - 0x2711fd60, 0x438050e3, 0x069908a8, 0x3d7fedc4, 0x826d2bef, 0x4eeb8476, 0x488dcf25, 0x36c9d566, - 0x28e74e41, 0xc2610aca, 0x3d49a9cf, 0xbae3b9df, 0xb65f8de6, 0x92aeaf64, 0x3ac7d5e6, 0x9ea80509, - 0xf22b017d, 0xa4173f70, 0xdd1e16c3, 0x15e0d7f9, 0x50b1b887, 0x2b9f4fd5, 0x625aba82, 0x6a017962, - 0x2ec01b9c, 0x15488aa9, 0xd716e740, 0x40055a2c, 0x93d29a22, 0xe32dbf9a, 0x058745b9, 0x3453dc1e, - 0xd699296e, 0x496cff6f, 0x1c9f4986, 0xdfe2ed07, 0xb87242d1, 0x19de7eae, 0x053e561a, 0x15ad6f8c, - 0x66626c1c, 0x7154c24c, 0xea082b2a, 0x93eb2939, 0x17dcb0f0, 0x58d4f2ae, 0x9ea294fb, 0x52cf564c, - 0x9883fe66, 0x2ec40581, 0x763953c3, 0x01d6692e, 0xd3a0c108, 0xa1e7160e, 0xe4f2dfa6, 0x693ed285, - 0x74904698, 0x4c2b0edd, 0x4f757656, 0x5d393378, 0xa132234f, 0x3d321c5d, 0xc3f5e194, 0x4b269301, - 0xc79f022f, 0x3c997e7e, 0x5e4f9504, 0x3ffafbbd, 0x76f7ad0e, 0x296693f4, 0x3d1fce6f, 0xc61e45be, - 0xd3b5ab34, 0xf72bf9b7, 0x1b0434c0, 0x4e72b567, 0x5592a33d, 0xb5229301, 0xcfd2a87f, 0x60aeb767, - 0x1814386b, 0x30bcc33d, 0x38a0c07d, 0xfd1606f2, 0xc363519b, 0x589dd390, 0x5479f8e6, 0x1cb8d647, - 0x97fd61a9, 0xea7759f4, 0x2d57539d, 0x569a58cf, 0xe84e63ad, 0x462e1b78, 0x6580f87e, 0xf3817914, - 0x91da55f4, 0x40a230f3, 0xd1988f35, 0xb6e318d2, 0x3ffa50bc, 0x3d40f021, 0xc3c0bdae, 0x4958c24c, - 0x518f36b2, 0x84b1d370, 0x0fedce83, 0x878ddada, 0xf2a279c7, 0x94e01be8, 0x90716f4b, 0x954b8aa3 - }; - - internal static readonly uint[] S8 = - { - 0xe216300d, 0xbbddfffc, 0xa7ebdabd, 0x35648095, 0x7789f8b7, 0xe6c1121b, 0x0e241600, 0x052ce8b5, - 0x11a9cfb0, 0xe5952f11, 0xece7990a, 0x9386d174, 0x2a42931c, 0x76e38111, 0xb12def3a, 0x37ddddfc, - 0xde9adeb1, 0x0a0cc32c, 0xbe197029, 0x84a00940, 0xbb243a0f, 0xb4d137cf, 0xb44e79f0, 0x049eedfd, - 0x0b15a15d, 0x480d3168, 0x8bbbde5a, 0x669ded42, 0xc7ece831, 0x3f8f95e7, 0x72df191b, 0x7580330d, - 0x94074251, 0x5c7dcdfa, 0xabbe6d63, 0xaa402164, 0xb301d40a, 0x02e7d1ca, 0x53571dae, 0x7a3182a2, - 0x12a8ddec, 0xfdaa335d, 0x176f43e8, 0x71fb46d4, 0x38129022, 0xce949ad4, 0xb84769ad, 0x965bd862, - 0x82f3d055, 0x66fb9767, 0x15b80b4e, 0x1d5b47a0, 0x4cfde06f, 0xc28ec4b8, 0x57e8726e, 0x647a78fc, - 0x99865d44, 0x608bd593, 0x6c200e03, 0x39dc5ff6, 0x5d0b00a3, 0xae63aff2, 0x7e8bd632, 0x70108c0c, - 0xbbd35049, 0x2998df04, 0x980cf42a, 0x9b6df491, 0x9e7edd53, 0x06918548, 0x58cb7e07, 0x3b74ef2e, - 0x522fffb1, 0xd24708cc, 0x1c7e27cd, 0xa4eb215b, 0x3cf1d2e2, 0x19b47a38, 0x424f7618, 0x35856039, - 0x9d17dee7, 0x27eb35e6, 0xc9aff67b, 0x36baf5b8, 0x09c467cd, 0xc18910b1, 0xe11dbf7b, 0x06cd1af8, - 0x7170c608, 0x2d5e3354, 0xd4de495a, 0x64c6d006, 0xbcc0c62c, 0x3dd00db3, 0x708f8f34, 0x77d51b42, - 0x264f620f, 0x24b8d2bf, 0x15c1b79e, 0x46a52564, 0xf8d7e54e, 0x3e378160, 0x7895cda5, 0x859c15a5, - 0xe6459788, 0xc37bc75f, 0xdb07ba0c, 0x0676a3ab, 0x7f229b1e, 0x31842e7b, 0x24259fd7, 0xf8bef472, - 0x835ffcb8, 0x6df4c1f2, 0x96f5b195, 0xfd0af0fc, 0xb0fe134c, 0xe2506d3d, 0x4f9b12ea, 0xf215f225, - 0xa223736f, 0x9fb4c428, 0x25d04979, 0x34c713f8, 0xc4618187, 0xea7a6e98, 0x7cd16efc, 0x1436876c, - 0xf1544107, 0xbedeee14, 0x56e9af27, 0xa04aa441, 0x3cf7c899, 0x92ecbae6, 0xdd67016d, 0x151682eb, - 0xa842eedf, 0xfdba60b4, 0xf1907b75, 0x20e3030f, 0x24d8c29e, 0xe139673b, 0xefa63fb8, 0x71873054, - 0xb6f2cf3b, 0x9f326442, 0xcb15a4cc, 0xb01a4504, 0xf1e47d8d, 0x844a1be5, 0xbae7dfdc, 0x42cbda70, - 0xcd7dae0a, 0x57e85b7a, 0xd53f5af6, 0x20cf4d8c, 0xcea4d428, 0x79d130a4, 0x3486ebfb, 0x33d3cddc, - 0x77853b53, 0x37effcb5, 0xc5068778, 0xe580b3e6, 0x4e68b8f4, 0xc5c8b37e, 0x0d809ea2, 0x398feb7c, - 0x132a4f94, 0x43b7950e, 0x2fee7d1c, 0x223613bd, 0xdd06caa2, 0x37df932b, 0xc4248289, 0xacf3ebc3, - 0x5715f6b7, 0xef3478dd, 0xf267616f, 0xc148cbe4, 0x9052815e, 0x5e410fab, 0xb48a2465, 0x2eda7fa4, - 0xe87b40e4, 0xe98ea084, 0x5889e9e1, 0xefd390fc, 0xdd07d35b, 0xdb485694, 0x38d7e5b2, 0x57720101, - 0x730edebc, 0x5b643113, 0x94917e4f, 0x503c2fba, 0x646f1282, 0x7523d24a, 0xe0779695, 0xf9c17a8f, - 0x7a5b2121, 0xd187b896, 0x29263a4d, 0xba510cdf, 0x81f47c9f, 0xad1163ed, 0xea7b5965, 0x1a00726e, - 0x11403092, 0x00da6d77, 0x4a0cdd61, 0xad1f4603, 0x605bdfb0, 0x9eedc364, 0x22ebe6a8, 0xcee7d28a, - 0xa0e736a0, 0x5564a6b9, 0x10853209, 0xc7eb8f37, 0x2de705ca, 0x8951570f, 0xdf09822b, 0xbd691a6c, - 0xaa12e4f2, 0x87451c0f, 0xe0f6a27a, 0x3ada4819, 0x4cf1764f, 0x0d771c2b, 0x67cdb156, 0x350d8384, - 0x5938fa0f, 0x42399ef3, 0x36997b07, 0x0e84093d, 0x4aa93e61, 0x8360d87b, 0x1fa98b0c, 0x1149382c, - 0xe97625a5, 0x0614d1b7, 0x0e25244b, 0x0c768347, 0x589e8d82, 0x0d2059d1, 0xa466bb1e, 0xf8da0a82, - 0x04f19130, 0xba6e4ec0, 0x99265164, 0x1ee7230d, 0x50b2ad80, 0xeaee6801, 0x8db2a283, 0xea8bf59e - }; - - #endregion - - /// - /// Sets the subkeys using the same nomenclatureas described in RFC2144. - /// - /// The key. - private void SetKey(byte[] key) - { - /* - * Determine the key size here, if required - * - * if keysize <= 80bits, use 12 rounds instead of 16 - * if keysize < 128bits, pad with 0 - * - * Typical key sizes => 40, 64, 80, 128 - */ - - if (key.Length < 11) - { - _rounds = RedRounds; - } - - var z = new int[16]; - var x = new int[16]; - - /* copy the key into x */ - for (var i = 0; i < key.Length; i++) - { - x[i] = key[i] & 0xff; - } - - /* - * This will look different because the selection of - * bytes from the input key I've already chosen the - * correct int. - */ - var x03 = IntsTo32Bits(x, 0x0); - var x47 = IntsTo32Bits(x, 0x4); - var x8B = IntsTo32Bits(x, 0x8); - var xCf = IntsTo32Bits(x, 0xC); - - var z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]]; - - Bits32ToInts(z03, z, 0x0); - var z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]]; - Bits32ToInts(z47, z, 0x4); - var z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]]; - Bits32ToInts(z8B, z, 0x8); - var zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]]; - Bits32ToInts(zCf, z, 0xC); - _km[1] = S5[z[0x8]] ^ S6[z[0x9]] ^ S7[z[0x7]] ^ S8[z[0x6]] ^ S5[z[0x2]]; - _km[2] = S5[z[0xA]] ^ S6[z[0xB]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S6[z[0x6]]; - _km[3] = S5[z[0xC]] ^ S6[z[0xD]] ^ S7[z[0x3]] ^ S8[z[0x2]] ^ S7[z[0x9]]; - _km[4] = S5[z[0xE]] ^ S6[z[0xF]] ^ S7[z[0x1]] ^ S8[z[0x0]] ^ S8[z[0xC]]; - - z03 = IntsTo32Bits(z, 0x0); - z47 = IntsTo32Bits(z, 0x4); - z8B = IntsTo32Bits(z, 0x8); - zCf = IntsTo32Bits(z, 0xC); - x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]]; - Bits32ToInts(x03, x, 0x0); - x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]]; - Bits32ToInts(x47, x, 0x4); - x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]]; - Bits32ToInts(x8B, x, 0x8); - xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]]; - Bits32ToInts(xCf, x, 0xC); - _km[5] = S5[x[0x3]] ^ S6[x[0x2]] ^ S7[x[0xC]] ^ S8[x[0xD]] ^ S5[x[0x8]]; - _km[6] = S5[x[0x1]] ^ S6[x[0x0]] ^ S7[x[0xE]] ^ S8[x[0xF]] ^ S6[x[0xD]]; - _km[7] = S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x8]] ^ S8[x[0x9]] ^ S7[x[0x3]]; - _km[8] = S5[x[0x5]] ^ S6[x[0x4]] ^ S7[x[0xA]] ^ S8[x[0xB]] ^ S8[x[0x7]]; - - x03 = IntsTo32Bits(x, 0x0); - x47 = IntsTo32Bits(x, 0x4); - x8B = IntsTo32Bits(x, 0x8); - xCf = IntsTo32Bits(x, 0xC); - z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]]; - Bits32ToInts(z03, z, 0x0); - z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]]; - Bits32ToInts(z47, z, 0x4); - z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]]; - Bits32ToInts(z8B, z, 0x8); - zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]]; - Bits32ToInts(zCf, z, 0xC); - _km[9] = S5[z[0x3]] ^ S6[z[0x2]] ^ S7[z[0xC]] ^ S8[z[0xD]] ^ S5[z[0x9]]; - _km[10] = S5[z[0x1]] ^ S6[z[0x0]] ^ S7[z[0xE]] ^ S8[z[0xF]] ^ S6[z[0xc]]; - _km[11] = S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x8]] ^ S8[z[0x9]] ^ S7[z[0x2]]; - _km[12] = S5[z[0x5]] ^ S6[z[0x4]] ^ S7[z[0xA]] ^ S8[z[0xB]] ^ S8[z[0x6]]; - - z03 = IntsTo32Bits(z, 0x0); - z47 = IntsTo32Bits(z, 0x4); - z8B = IntsTo32Bits(z, 0x8); - zCf = IntsTo32Bits(z, 0xC); - x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]]; - Bits32ToInts(x03, x, 0x0); - x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]]; - Bits32ToInts(x47, x, 0x4); - x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]]; - Bits32ToInts(x8B, x, 0x8); - xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]]; - Bits32ToInts(xCf, x, 0xC); - _km[13] = S5[x[0x8]] ^ S6[x[0x9]] ^ S7[x[0x7]] ^ S8[x[0x6]] ^ S5[x[0x3]]; - _km[14] = S5[x[0xA]] ^ S6[x[0xB]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S6[x[0x7]]; - _km[15] = S5[x[0xC]] ^ S6[x[0xD]] ^ S7[x[0x3]] ^ S8[x[0x2]] ^ S7[x[0x8]]; - _km[16] = S5[x[0xE]] ^ S6[x[0xF]] ^ S7[x[0x1]] ^ S8[x[0x0]] ^ S8[x[0xD]]; - - x03 = IntsTo32Bits(x, 0x0); - x47 = IntsTo32Bits(x, 0x4); - x8B = IntsTo32Bits(x, 0x8); - xCf = IntsTo32Bits(x, 0xC); - z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]]; - Bits32ToInts(z03, z, 0x0); - z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]]; - Bits32ToInts(z47, z, 0x4); - z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]]; - Bits32ToInts(z8B, z, 0x8); - zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]]; - Bits32ToInts(zCf, z, 0xC); - _kr[1] = (int)((S5[z[0x8]] ^ S6[z[0x9]] ^ S7[z[0x7]] ^ S8[z[0x6]] ^ S5[z[0x2]]) & 0x1f); - _kr[2] = (int)((S5[z[0xA]] ^ S6[z[0xB]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S6[z[0x6]]) & 0x1f); - _kr[3] = (int)((S5[z[0xC]] ^ S6[z[0xD]] ^ S7[z[0x3]] ^ S8[z[0x2]] ^ S7[z[0x9]]) & 0x1f); - _kr[4] = (int)((S5[z[0xE]] ^ S6[z[0xF]] ^ S7[z[0x1]] ^ S8[z[0x0]] ^ S8[z[0xC]]) & 0x1f); - - z03 = IntsTo32Bits(z, 0x0); - z47 = IntsTo32Bits(z, 0x4); - z8B = IntsTo32Bits(z, 0x8); - zCf = IntsTo32Bits(z, 0xC); - x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]]; - Bits32ToInts(x03, x, 0x0); - x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]]; - Bits32ToInts(x47, x, 0x4); - x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]]; - Bits32ToInts(x8B, x, 0x8); - xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]]; - Bits32ToInts(xCf, x, 0xC); - _kr[5] = (int)((S5[x[0x3]] ^ S6[x[0x2]] ^ S7[x[0xC]] ^ S8[x[0xD]] ^ S5[x[0x8]]) & 0x1f); - _kr[6] = (int)((S5[x[0x1]] ^ S6[x[0x0]] ^ S7[x[0xE]] ^ S8[x[0xF]] ^ S6[x[0xD]]) & 0x1f); - _kr[7] = (int)((S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x8]] ^ S8[x[0x9]] ^ S7[x[0x3]]) & 0x1f); - _kr[8] = (int)((S5[x[0x5]] ^ S6[x[0x4]] ^ S7[x[0xA]] ^ S8[x[0xB]] ^ S8[x[0x7]]) & 0x1f); - - x03 = IntsTo32Bits(x, 0x0); - x47 = IntsTo32Bits(x, 0x4); - x8B = IntsTo32Bits(x, 0x8); - xCf = IntsTo32Bits(x, 0xC); - z03 = x03 ^ S5[x[0xD]] ^ S6[x[0xF]] ^ S7[x[0xC]] ^ S8[x[0xE]] ^ S7[x[0x8]]; - Bits32ToInts(z03, z, 0x0); - z47 = x8B ^ S5[z[0x0]] ^ S6[z[0x2]] ^ S7[z[0x1]] ^ S8[z[0x3]] ^ S8[x[0xA]]; - Bits32ToInts(z47, z, 0x4); - z8B = xCf ^ S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x5]] ^ S8[z[0x4]] ^ S5[x[0x9]]; - Bits32ToInts(z8B, z, 0x8); - zCf = x47 ^ S5[z[0xA]] ^ S6[z[0x9]] ^ S7[z[0xB]] ^ S8[z[0x8]] ^ S6[x[0xB]]; - Bits32ToInts(zCf, z, 0xC); - _kr[9] = (int)((S5[z[0x3]] ^ S6[z[0x2]] ^ S7[z[0xC]] ^ S8[z[0xD]] ^ S5[z[0x9]]) & 0x1f); - _kr[10] = (int)((S5[z[0x1]] ^ S6[z[0x0]] ^ S7[z[0xE]] ^ S8[z[0xF]] ^ S6[z[0xc]]) & 0x1f); - _kr[11] = (int)((S5[z[0x7]] ^ S6[z[0x6]] ^ S7[z[0x8]] ^ S8[z[0x9]] ^ S7[z[0x2]]) & 0x1f); - _kr[12] = (int)((S5[z[0x5]] ^ S6[z[0x4]] ^ S7[z[0xA]] ^ S8[z[0xB]] ^ S8[z[0x6]]) & 0x1f); - - z03 = IntsTo32Bits(z, 0x0); - z47 = IntsTo32Bits(z, 0x4); - z8B = IntsTo32Bits(z, 0x8); - zCf = IntsTo32Bits(z, 0xC); - x03 = z8B ^ S5[z[0x5]] ^ S6[z[0x7]] ^ S7[z[0x4]] ^ S8[z[0x6]] ^ S7[z[0x0]]; - Bits32ToInts(x03, x, 0x0); - x47 = z03 ^ S5[x[0x0]] ^ S6[x[0x2]] ^ S7[x[0x1]] ^ S8[x[0x3]] ^ S8[z[0x2]]; - Bits32ToInts(x47, x, 0x4); - x8B = z47 ^ S5[x[0x7]] ^ S6[x[0x6]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S5[z[0x1]]; - Bits32ToInts(x8B, x, 0x8); - xCf = zCf ^ S5[x[0xA]] ^ S6[x[0x9]] ^ S7[x[0xB]] ^ S8[x[0x8]] ^ S6[z[0x3]]; - Bits32ToInts(xCf, x, 0xC); - _kr[13] = (int)((S5[x[0x8]] ^ S6[x[0x9]] ^ S7[x[0x7]] ^ S8[x[0x6]] ^ S5[x[0x3]]) & 0x1f); - _kr[14] = (int)((S5[x[0xA]] ^ S6[x[0xB]] ^ S7[x[0x5]] ^ S8[x[0x4]] ^ S6[x[0x7]]) & 0x1f); - _kr[15] = (int)((S5[x[0xC]] ^ S6[x[0xD]] ^ S7[x[0x3]] ^ S8[x[0x2]] ^ S7[x[0x8]]) & 0x1f); - _kr[16] = (int)((S5[x[0xE]] ^ S6[x[0xF]] ^ S7[x[0x1]] ^ S8[x[0x0]] ^ S8[x[0xD]]) & 0x1f); - } - - /// - /// The first of the three processing functions for the encryption and decryption. - /// - /// The input to be processed. - /// The mask to be used from Km[n]. - /// The rotation value to be used. - private static uint F1(uint d, uint kmi, int kri) - { - var I = kmi + d; - I = I << kri | (I >> (32 - kri)); - return ((S1[(I >> 24) & 0xff] ^ S2[(I >> 16) & 0xff]) - S3[(I >> 8) & 0xff]) + S4[I & 0xff]; - } - - /// - /// The second of the three processing functions for the encryption and decryption. - /// - /// The input to be processed. - /// The mask to be used from Km[n]. - /// The rotation value to be used. - private static uint F2(uint d, uint kmi, int kri) - { - var I = kmi ^ d; - I = I << kri | (I >> (32 - kri)); - return ((S1[(I >> 24) & 0xff] - S2[(I >> 16) & 0xff]) + S3[(I >> 8) & 0xff]) ^ S4[I & 0xff]; - } - - /// - /// The third of the three processing functions for the encryption and decryption. - /// - /// The input to be processed. - /// The mask to be used from Km[n]. - /// The rotation value to be used. - private static uint F3(uint d, uint kmi, int kri) - { - var I = kmi - d; - I = I << kri | (I >> (32 - kri)); - return ((S1[(I >> 24) & 0xff] + S2[(I >> 16) & 0xff]) ^ S3[(I >> 8) & 0xff]) - S4[I & 0xff]; - } - - /// - /// Does the 16 rounds to encrypt the block. - /// - /// The LH-32bits of the plaintext block. - /// The RH-32bits of the plaintext block. - /// The result. - private void CastEncipher(uint l0, uint r0, uint[] result) - { - uint li = l0, ri = r0; - - for (var i = 1; i <= _rounds; i++) - { - var lp = li; // the previous value, equiv to L[i-1] - var rp = ri; // equivalent to R[i-1] - - li = rp; - - switch (i) - { - case 1: - case 4: - case 7: - case 10: - case 13: - case 16: - ri = lp ^ F1(rp, _km[i], _kr[i]); - break; - case 2: - case 5: - case 8: - case 11: - case 14: - ri = lp ^ F2(rp, _km[i], _kr[i]); - break; - case 3: - case 6: - case 9: - case 12: - case 15: - ri = lp ^ F3(rp, _km[i], _kr[i]); - break; - default: - // We should never get here as max. rounds is 16 - break; - } - } - - result[0] = ri; - result[1] = li; - } - - private void CastDecipher(uint l16, uint r16, uint[] result) - { - uint li = l16, ri = r16; - - for (var i = _rounds; i > 0; i--) - { - var lp = li; // the previous value, equiv to L[i-1] - var rp = ri; // equivalent to R[i-1] - - li = rp; - - switch (i) - { - case 1: - case 4: - case 7: - case 10: - case 13: - case 16: - ri = lp ^ F1(rp, _km[i], _kr[i]); - break; - case 2: - case 5: - case 8: - case 11: - case 14: - ri = lp ^ F2(rp, _km[i], _kr[i]); - break; - case 3: - case 6: - case 9: - case 12: - case 15: - ri = lp ^ F3(rp, _km[i], _kr[i]); - break; - default: - // We should never get here as max. rounds is 16 - break; - } - } - - result[0] = ri; - result[1] = li; - } - - private static void Bits32ToInts(uint inData, int[] b, int offset) - { - b[offset + 3] = (int)(inData & 0xff); - b[offset + 2] = (int)((inData >> 8) & 0xff); - b[offset + 1] = (int)((inData >> 16) & 0xff); - b[offset] = (int)((inData >> 24) & 0xff); - } - - private static uint IntsTo32Bits(int[] b, int i) - { - return (uint)(((b[i] & 0xff) << 24) | - ((b[i + 1] & 0xff) << 16) | - ((b[i + 2] & 0xff) << 8) | - (b[i + 3] & 0xff)); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs deleted file mode 100644 index 131719b1c..000000000 --- a/src/Renci.SshNet/Security/Cryptography/Ciphers/Paddings/PKCS5Padding.cs +++ /dev/null @@ -1,49 +0,0 @@ -using System; - -namespace Renci.SshNet.Security.Cryptography.Ciphers.Paddings -{ - /// - /// Implements PKCS5 cipher padding. - /// - public class PKCS5Padding : CipherPadding - { - /// - /// Pads the specified input to match the block size. - /// - /// The size of the block. - /// The input. - /// The zero-based offset in at which the data to pad starts. - /// The number of bytes in to take into account. - /// - /// The padded data array. - /// - public override byte[] Pad(int blockSize, byte[] input, int offset, int length) - { - var numOfPaddedBytes = blockSize - (length % blockSize); - return Pad(input, offset, length, numOfPaddedBytes); - } - - /// - /// Pads the specified input with a given number of bytes. - /// - /// The input. - /// The zero-based offset in at which the data to pad starts. - /// The number of bytes in to take into account. - /// The number of bytes to pad the input with. - /// - /// The padded data array. - /// - public override byte[] Pad(byte[] input, int offset, int length, int paddinglength) - { - var output = new byte[length + paddinglength]; - Buffer.BlockCopy(input, offset, output, 0, length); - - for (var i = 0; i < paddinglength; i++) - { - output[length + i] = (byte)paddinglength; - } - - return output; - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs deleted file mode 100644 index bbe163fd2..000000000 --- a/src/Renci.SshNet/Security/Cryptography/Ciphers/SerpentCipher.cs +++ /dev/null @@ -1,1119 +0,0 @@ -using System; - -namespace Renci.SshNet.Security.Cryptography.Ciphers -{ - /// - /// Implements Serpent cipher algorithm. - /// - public sealed class SerpentCipher : BlockCipher - { - private const int Rounds = 32; - private const int Phi = unchecked((int)0x9E3779B9); // (Sqrt(5) - 1) * 2**31 - - private readonly int[] _workingKey; - - // registers - private int _x0; - private int _x1; - private int _x2; - private int _x3; - - /// - /// Initializes a new instance of the class. - /// - /// The key. - /// The mode. - /// The padding. - /// is . - /// Keysize is not valid for this algorithm. - public SerpentCipher(byte[] key, CipherMode mode, CipherPadding padding) - : base(key, 16, mode, padding) - { - var keySize = key.Length * 8; - - if (keySize is not (128 or 192 or 256)) - { - throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize)); - } - - _workingKey = MakeWorkingKey(key); - } - - /// - /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array. - /// - /// The input data to encrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write encrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes encrypted. - /// - public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - if (inputCount != BlockSize) - { - throw new ArgumentException("inputCount"); - } - - _x3 = BytesToWord(inputBuffer, inputOffset); - _x2 = BytesToWord(inputBuffer, inputOffset + 4); - _x1 = BytesToWord(inputBuffer, inputOffset + 8); - _x0 = BytesToWord(inputBuffer, inputOffset + 12); - - Sb0(_workingKey[0] ^ _x0, _workingKey[1] ^ _x1, _workingKey[2] ^ _x2, _workingKey[3] ^ _x3); - LT(); - Sb1(_workingKey[4] ^ _x0, _workingKey[5] ^ _x1, _workingKey[6] ^ _x2, _workingKey[7] ^ _x3); - LT(); - Sb2(_workingKey[8] ^ _x0, _workingKey[9] ^ _x1, _workingKey[10] ^ _x2, _workingKey[11] ^ _x3); - LT(); - Sb3(_workingKey[12] ^ _x0, _workingKey[13] ^ _x1, _workingKey[14] ^ _x2, _workingKey[15] ^ _x3); - LT(); - Sb4(_workingKey[16] ^ _x0, _workingKey[17] ^ _x1, _workingKey[18] ^ _x2, _workingKey[19] ^ _x3); - LT(); - Sb5(_workingKey[20] ^ _x0, _workingKey[21] ^ _x1, _workingKey[22] ^ _x2, _workingKey[23] ^ _x3); - LT(); - Sb6(_workingKey[24] ^ _x0, _workingKey[25] ^ _x1, _workingKey[26] ^ _x2, _workingKey[27] ^ _x3); - LT(); - Sb7(_workingKey[28] ^ _x0, _workingKey[29] ^ _x1, _workingKey[30] ^ _x2, _workingKey[31] ^ _x3); - LT(); - Sb0(_workingKey[32] ^ _x0, _workingKey[33] ^ _x1, _workingKey[34] ^ _x2, _workingKey[35] ^ _x3); - LT(); - Sb1(_workingKey[36] ^ _x0, _workingKey[37] ^ _x1, _workingKey[38] ^ _x2, _workingKey[39] ^ _x3); - LT(); - Sb2(_workingKey[40] ^ _x0, _workingKey[41] ^ _x1, _workingKey[42] ^ _x2, _workingKey[43] ^ _x3); - LT(); - Sb3(_workingKey[44] ^ _x0, _workingKey[45] ^ _x1, _workingKey[46] ^ _x2, _workingKey[47] ^ _x3); - LT(); - Sb4(_workingKey[48] ^ _x0, _workingKey[49] ^ _x1, _workingKey[50] ^ _x2, _workingKey[51] ^ _x3); - LT(); - Sb5(_workingKey[52] ^ _x0, _workingKey[53] ^ _x1, _workingKey[54] ^ _x2, _workingKey[55] ^ _x3); - LT(); - Sb6(_workingKey[56] ^ _x0, _workingKey[57] ^ _x1, _workingKey[58] ^ _x2, _workingKey[59] ^ _x3); - LT(); - Sb7(_workingKey[60] ^ _x0, _workingKey[61] ^ _x1, _workingKey[62] ^ _x2, _workingKey[63] ^ _x3); - LT(); - Sb0(_workingKey[64] ^ _x0, _workingKey[65] ^ _x1, _workingKey[66] ^ _x2, _workingKey[67] ^ _x3); - LT(); - Sb1(_workingKey[68] ^ _x0, _workingKey[69] ^ _x1, _workingKey[70] ^ _x2, _workingKey[71] ^ _x3); - LT(); - Sb2(_workingKey[72] ^ _x0, _workingKey[73] ^ _x1, _workingKey[74] ^ _x2, _workingKey[75] ^ _x3); - LT(); - Sb3(_workingKey[76] ^ _x0, _workingKey[77] ^ _x1, _workingKey[78] ^ _x2, _workingKey[79] ^ _x3); - LT(); - Sb4(_workingKey[80] ^ _x0, _workingKey[81] ^ _x1, _workingKey[82] ^ _x2, _workingKey[83] ^ _x3); - LT(); - Sb5(_workingKey[84] ^ _x0, _workingKey[85] ^ _x1, _workingKey[86] ^ _x2, _workingKey[87] ^ _x3); - LT(); - Sb6(_workingKey[88] ^ _x0, _workingKey[89] ^ _x1, _workingKey[90] ^ _x2, _workingKey[91] ^ _x3); - LT(); - Sb7(_workingKey[92] ^ _x0, _workingKey[93] ^ _x1, _workingKey[94] ^ _x2, _workingKey[95] ^ _x3); - LT(); - Sb0(_workingKey[96] ^ _x0, _workingKey[97] ^ _x1, _workingKey[98] ^ _x2, _workingKey[99] ^ _x3); - LT(); - Sb1(_workingKey[100] ^ _x0, _workingKey[101] ^ _x1, _workingKey[102] ^ _x2, _workingKey[103] ^ _x3); - LT(); - Sb2(_workingKey[104] ^ _x0, _workingKey[105] ^ _x1, _workingKey[106] ^ _x2, _workingKey[107] ^ _x3); - LT(); - Sb3(_workingKey[108] ^ _x0, _workingKey[109] ^ _x1, _workingKey[110] ^ _x2, _workingKey[111] ^ _x3); - LT(); - Sb4(_workingKey[112] ^ _x0, _workingKey[113] ^ _x1, _workingKey[114] ^ _x2, _workingKey[115] ^ _x3); - LT(); - Sb5(_workingKey[116] ^ _x0, _workingKey[117] ^ _x1, _workingKey[118] ^ _x2, _workingKey[119] ^ _x3); - LT(); - Sb6(_workingKey[120] ^ _x0, _workingKey[121] ^ _x1, _workingKey[122] ^ _x2, _workingKey[123] ^ _x3); - LT(); - Sb7(_workingKey[124] ^ _x0, _workingKey[125] ^ _x1, _workingKey[126] ^ _x2, _workingKey[127] ^ _x3); - - WordToBytes(_workingKey[131] ^ _x3, outputBuffer, outputOffset); - WordToBytes(_workingKey[130] ^ _x2, outputBuffer, outputOffset + 4); - WordToBytes(_workingKey[129] ^ _x1, outputBuffer, outputOffset + 8); - WordToBytes(_workingKey[128] ^ _x0, outputBuffer, outputOffset + 12); - - return BlockSize; - } - - /// - /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array. - /// - /// The input data to decrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write decrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes decrypted. - /// - public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - if (inputCount != BlockSize) - { - throw new ArgumentException("inputCount"); - } - - _x3 = _workingKey[131] ^ BytesToWord(inputBuffer, inputOffset); - _x2 = _workingKey[130] ^ BytesToWord(inputBuffer, inputOffset + 4); - _x1 = _workingKey[129] ^ BytesToWord(inputBuffer, inputOffset + 8); - _x0 = _workingKey[128] ^ BytesToWord(inputBuffer, inputOffset + 12); - - Ib7(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[124]; - _x1 ^= _workingKey[125]; - _x2 ^= _workingKey[126]; - _x3 ^= _workingKey[127]; - - InverseLT(); - Ib6(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[120]; - _x1 ^= _workingKey[121]; - _x2 ^= _workingKey[122]; - _x3 ^= _workingKey[123]; - - InverseLT(); - Ib5(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[116]; - _x1 ^= _workingKey[117]; - _x2 ^= _workingKey[118]; - _x3 ^= _workingKey[119]; - - InverseLT(); - Ib4(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[112]; - _x1 ^= _workingKey[113]; - _x2 ^= _workingKey[114]; - _x3 ^= _workingKey[115]; - InverseLT(); - Ib3(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[108]; - _x1 ^= _workingKey[109]; - _x2 ^= _workingKey[110]; - _x3 ^= _workingKey[111]; - - InverseLT(); - Ib2(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[104]; - _x1 ^= _workingKey[105]; - _x2 ^= _workingKey[106]; - _x3 ^= _workingKey[107]; - - InverseLT(); - Ib1(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[100]; - _x1 ^= _workingKey[101]; - _x2 ^= _workingKey[102]; - _x3 ^= _workingKey[103]; - - InverseLT(); - Ib0(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[96]; - _x1 ^= _workingKey[97]; - _x2 ^= _workingKey[98]; - _x3 ^= _workingKey[99]; - - InverseLT(); - Ib7(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[92]; - _x1 ^= _workingKey[93]; - _x2 ^= _workingKey[94]; - _x3 ^= _workingKey[95]; - - InverseLT(); - Ib6(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[88]; - _x1 ^= _workingKey[89]; - _x2 ^= _workingKey[90]; - _x3 ^= _workingKey[91]; - - InverseLT(); - Ib5(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[84]; - _x1 ^= _workingKey[85]; - _x2 ^= _workingKey[86]; - _x3 ^= _workingKey[87]; - - InverseLT(); - Ib4(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[80]; - _x1 ^= _workingKey[81]; - _x2 ^= _workingKey[82]; - _x3 ^= _workingKey[83]; - - InverseLT(); - Ib3(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[76]; - _x1 ^= _workingKey[77]; - _x2 ^= _workingKey[78]; - _x3 ^= _workingKey[79]; - - InverseLT(); - Ib2(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[72]; - _x1 ^= _workingKey[73]; - _x2 ^= _workingKey[74]; - _x3 ^= _workingKey[75]; - - InverseLT(); - Ib1(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[68]; - _x1 ^= _workingKey[69]; - _x2 ^= _workingKey[70]; - _x3 ^= _workingKey[71]; - - InverseLT(); - Ib0(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[64]; - _x1 ^= _workingKey[65]; - _x2 ^= _workingKey[66]; - _x3 ^= _workingKey[67]; - - InverseLT(); - Ib7(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[60]; - _x1 ^= _workingKey[61]; - _x2 ^= _workingKey[62]; - _x3 ^= _workingKey[63]; - - InverseLT(); - Ib6(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[56]; - _x1 ^= _workingKey[57]; - _x2 ^= _workingKey[58]; - _x3 ^= _workingKey[59]; - - InverseLT(); - Ib5(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[52]; - _x1 ^= _workingKey[53]; - _x2 ^= _workingKey[54]; - _x3 ^= _workingKey[55]; - - InverseLT(); - Ib4(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[48]; - _x1 ^= _workingKey[49]; - _x2 ^= _workingKey[50]; - _x3 ^= _workingKey[51]; - - InverseLT(); - Ib3(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[44]; - _x1 ^= _workingKey[45]; - _x2 ^= _workingKey[46]; - _x3 ^= _workingKey[47]; - - InverseLT(); - Ib2(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[40]; - _x1 ^= _workingKey[41]; - _x2 ^= _workingKey[42]; - _x3 ^= _workingKey[43]; - - InverseLT(); - Ib1(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[36]; - _x1 ^= _workingKey[37]; - _x2 ^= _workingKey[38]; - _x3 ^= _workingKey[39]; - - InverseLT(); - Ib0(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[32]; - _x1 ^= _workingKey[33]; - _x2 ^= _workingKey[34]; - _x3 ^= _workingKey[35]; - - InverseLT(); - Ib7(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[28]; - _x1 ^= _workingKey[29]; - _x2 ^= _workingKey[30]; - _x3 ^= _workingKey[31]; - - InverseLT(); - Ib6(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[24]; - _x1 ^= _workingKey[25]; - _x2 ^= _workingKey[26]; - _x3 ^= _workingKey[27]; - - InverseLT(); - Ib5(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[20]; - _x1 ^= _workingKey[21]; - _x2 ^= _workingKey[22]; - _x3 ^= _workingKey[23]; - - InverseLT(); - Ib4(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[16]; - _x1 ^= _workingKey[17]; - _x2 ^= _workingKey[18]; - _x3 ^= _workingKey[19]; - - InverseLT(); - Ib3(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[12]; - _x1 ^= _workingKey[13]; - _x2 ^= _workingKey[14]; - _x3 ^= _workingKey[15]; - - InverseLT(); - Ib2(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[8]; - _x1 ^= _workingKey[9]; - _x2 ^= _workingKey[10]; - _x3 ^= _workingKey[11]; - - InverseLT(); - Ib1(_x0, _x1, _x2, _x3); - - _x0 ^= _workingKey[4]; - _x1 ^= _workingKey[5]; - _x2 ^= _workingKey[6]; - _x3 ^= _workingKey[7]; - - InverseLT(); - Ib0(_x0, _x1, _x2, _x3); - - WordToBytes(_x3 ^ _workingKey[3], outputBuffer, outputOffset); - WordToBytes(_x2 ^ _workingKey[2], outputBuffer, outputOffset + 4); - WordToBytes(_x1 ^ _workingKey[1], outputBuffer, outputOffset + 8); - WordToBytes(_x0 ^ _workingKey[0], outputBuffer, outputOffset + 12); - - return BlockSize; - } - - /// - /// Expand a user-supplied key material into a session key. - /// - /// The user-key bytes to use. - /// - /// A session key. - /// - /// is not multiple of 4 bytes. - private int[] MakeWorkingKey(byte[] key) - { - // pad key to 256 bits - var kPad = new int[16]; - int off; - var length = 0; - - for (off = key.Length - 4; off > 0; off -= 4) - { - kPad[length++] = BytesToWord(key, off); - } - - if (off == 0) - { - kPad[length++] = BytesToWord(key, 0); - if (length < 8) - { - kPad[length] = 1; - } - } - else - { - throw new ArgumentException("key must be a multiple of 4 bytes"); - } - - // expand the padded key up to 33 x 128 bits of key material - const int amount = (Rounds + 1) * 4; - var w = new int[amount]; - - // compute w0 to w7 from w-8 to w-1 - for (var i = 8; i < 16; i++) - { - kPad[i] = RotateLeft(kPad[i - 8] ^ kPad[i - 5] ^ kPad[i - 3] ^ kPad[i - 1] ^ Phi ^ (i - 8), 11); - } - - Buffer.BlockCopy(kPad, 8, w, 0, 8); - - // compute w8 to w136 - for (var i = 8; i < amount; i++) - { - w[i] = RotateLeft(w[i - 8] ^ w[i - 5] ^ w[i - 3] ^ w[i - 1] ^ Phi ^ i, 11); - } - - // create the working keys by processing w with the Sbox and IP - Sb3(w[0], w[1], w[2], w[3]); - w[0] = _x0; - w[1] = _x1; - w[2] = _x2; - w[3] = _x3; - - Sb2(w[4], w[5], w[6], w[7]); - w[4] = _x0; - w[5] = _x1; - w[6] = _x2; - w[7] = _x3; - - Sb1(w[8], w[9], w[10], w[11]); - w[8] = _x0; - w[9] = _x1; - w[10] = _x2; - w[11] = _x3; - - Sb0(w[12], w[13], w[14], w[15]); - w[12] = _x0; - w[13] = _x1; - w[14] = _x2; - w[15] = _x3; - - Sb7(w[16], w[17], w[18], w[19]); - w[16] = _x0; - w[17] = _x1; - w[18] = _x2; - w[19] = _x3; - - Sb6(w[20], w[21], w[22], w[23]); - w[20] = _x0; - w[21] = _x1; - w[22] = _x2; - w[23] = _x3; - - Sb5(w[24], w[25], w[26], w[27]); - w[24] = _x0; - w[25] = _x1; - w[26] = _x2; - w[27] = _x3; - - Sb4(w[28], w[29], w[30], w[31]); - w[28] = _x0; - w[29] = _x1; - w[30] = _x2; - w[31] = _x3; - - Sb3(w[32], w[33], w[34], w[35]); - w[32] = _x0; - w[33] = _x1; - w[34] = _x2; - w[35] = _x3; - - Sb2(w[36], w[37], w[38], w[39]); - w[36] = _x0; - w[37] = _x1; - w[38] = _x2; - w[39] = _x3; - - Sb1(w[40], w[41], w[42], w[43]); - w[40] = _x0; - w[41] = _x1; - w[42] = _x2; - w[43] = _x3; - - Sb0(w[44], w[45], w[46], w[47]); - w[44] = _x0; - w[45] = _x1; - w[46] = _x2; - w[47] = _x3; - - Sb7(w[48], w[49], w[50], w[51]); - w[48] = _x0; - w[49] = _x1; - w[50] = _x2; - w[51] = _x3; - - Sb6(w[52], w[53], w[54], w[55]); - w[52] = _x0; - w[53] = _x1; - w[54] = _x2; - w[55] = _x3; - - Sb5(w[56], w[57], w[58], w[59]); - w[56] = _x0; - w[57] = _x1; - w[58] = _x2; - w[59] = _x3; - - Sb4(w[60], w[61], w[62], w[63]); - w[60] = _x0; - w[61] = _x1; - w[62] = _x2; - w[63] = _x3; - - Sb3(w[64], w[65], w[66], w[67]); - w[64] = _x0; - w[65] = _x1; - w[66] = _x2; - w[67] = _x3; - - Sb2(w[68], w[69], w[70], w[71]); - w[68] = _x0; - w[69] = _x1; - w[70] = _x2; - w[71] = _x3; - - Sb1(w[72], w[73], w[74], w[75]); - w[72] = _x0; - w[73] = _x1; - w[74] = _x2; - w[75] = _x3; - - Sb0(w[76], w[77], w[78], w[79]); - w[76] = _x0; - w[77] = _x1; - w[78] = _x2; - w[79] = _x3; - - Sb7(w[80], w[81], w[82], w[83]); - w[80] = _x0; - w[81] = _x1; - w[82] = _x2; - w[83] = _x3; - - Sb6(w[84], w[85], w[86], w[87]); - w[84] = _x0; - w[85] = _x1; - w[86] = _x2; - w[87] = _x3; - - Sb5(w[88], w[89], w[90], w[91]); - w[88] = _x0; - w[89] = _x1; - w[90] = _x2; - w[91] = _x3; - - Sb4(w[92], w[93], w[94], w[95]); - w[92] = _x0; - w[93] = _x1; - w[94] = _x2; - w[95] = _x3; - - Sb3(w[96], w[97], w[98], w[99]); - w[96] = _x0; - w[97] = _x1; - w[98] = _x2; - w[99] = _x3; - - Sb2(w[100], w[101], w[102], w[103]); - w[100] = _x0; - w[101] = _x1; - w[102] = _x2; - w[103] = _x3; - - Sb1(w[104], w[105], w[106], w[107]); - w[104] = _x0; - w[105] = _x1; - w[106] = _x2; - w[107] = _x3; - - Sb0(w[108], w[109], w[110], w[111]); - w[108] = _x0; - w[109] = _x1; - w[110] = _x2; - w[111] = _x3; - - Sb7(w[112], w[113], w[114], w[115]); - w[112] = _x0; - w[113] = _x1; - w[114] = _x2; - w[115] = _x3; - - Sb6(w[116], w[117], w[118], w[119]); - w[116] = _x0; - w[117] = _x1; - w[118] = _x2; - w[119] = _x3; - - Sb5(w[120], w[121], w[122], w[123]); - w[120] = _x0; - w[121] = _x1; - w[122] = _x2; - w[123] = _x3; - - Sb4(w[124], w[125], w[126], w[127]); - w[124] = _x0; - w[125] = _x1; - w[126] = _x2; - w[127] = _x3; - - Sb3(w[128], w[129], w[130], w[131]); - w[128] = _x0; - w[129] = _x1; - w[130] = _x2; - w[131] = _x3; - - return w; - } - - private static int RotateLeft(int x, int bits) - { - return (x << bits) | (int)((uint)x >> (32 - bits)); - } - - private static int RotateRight(int x, int bits) - { - return (int)((uint)x >> bits) | (x << (32 - bits)); - } - - private static int BytesToWord(byte[] src, int srcOff) - { - return ((src[srcOff] & 0xff) << 24) | ((src[srcOff + 1] & 0xff) << 16) | - ((src[srcOff + 2] & 0xff) << 8) | (src[srcOff + 3] & 0xff); - } - - private static void WordToBytes(int word, byte[] dst, int dstOff) - { - dst[dstOff + 3] = (byte)word; - dst[dstOff + 2] = (byte)((uint)word >> 8); - dst[dstOff + 1] = (byte)((uint)word >> 16); - dst[dstOff] = (byte)((uint)word >> 24); - } - - /* - * The sboxes below are based on the work of Brian Gladman and - * Sam Simpson, whose original notice appears below. - * - * For further details see: - * http://fp.gladman.plus.com/cryptography_technology/serpent/ - * - */ - - /* - * Partially optimised Serpent S Box bool functions derived - * using a recursive descent analyser but without a full search - * of all subtrees. This set of S boxes is the result of work - * by Sam Simpson and Brian Gladman using the spare time on a - * cluster of high capacity servers to search for S boxes with - * this customised search engine. There are now an average of - * 15.375 terms per S box. - * - * Copyright: Dr B. R Gladman (gladman@seven77.demon.co.uk) - * and Sam Simpson (s.simpson@mia.co.uk) - * 17th December 1998 - * - * We hereby give permission for information in this file to be - * used freely subject only to acknowledgement of its origin. - */ - - /// - /// S0 - { 3, 8,15, 1,10, 6, 5,11,14,13, 4, 2, 7, 0, 9,12 } - 15 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb0(int a, int b, int c, int d) - { - var t1 = a ^ d; - var t3 = c ^ t1; - var t4 = b ^ t3; - _x3 = (a & d) ^ t4; - var t7 = a ^ (b & t1); - _x2 = t4 ^ (c | t7); - var t12 = _x3 & (t3 ^ t7); - _x1 = (~t3) ^ t12; - _x0 = t12 ^ (~t7); - } - - /// - /// InvSO - {13, 3,11, 0,10, 6, 5,12, 1,14, 4, 7,15, 9, 8, 2 } - 15 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib0(int a, int b, int c, int d) - { - var t1 = ~a; - var t2 = a ^ b; - var t4 = d ^ (t1 | t2); - var t5 = c ^ t4; - _x2 = t2 ^ t5; - var t8 = t1 ^ (d & t2); - _x1 = t4 ^ (_x2 & t8); - _x3 = (a & t4) ^ (t5 | _x1); - _x0 = _x3 ^ (t5 ^ t8); - } - - /// - /// S1 - {15,12, 2, 7, 9, 0, 5,10, 1,11,14, 8, 6,13, 3, 4 } - 14 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb1(int a, int b, int c, int d) - { - var t2 = b ^ (~a); - var t5 = c ^ (a | t2); - _x2 = d ^ t5; - var t7 = b ^ (d | t2); - var t8 = t2 ^ _x2; - _x3 = t8 ^ (t5 & t7); - var t11 = t5 ^ t7; - _x1 = _x3 ^ t11; - _x0 = t5 ^ (t8 & t11); - } - - /// - /// InvS1 - { 5, 8, 2,14,15, 6,12, 3,11, 4, 7, 9, 1,13,10, 0 } - 14 steps. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib1(int a, int b, int c, int d) - { - var t1 = b ^ d; - var t3 = a ^ (b & t1); - var t4 = t1 ^ t3; - _x3 = c ^ t4; - var t7 = b ^ (t1 & t3); - var t8 = _x3 | t7; - _x1 = t3 ^ t8; - var t10 = ~_x1; - var t11 = _x3 ^ t7; - _x0 = t10 ^ t11; - _x2 = t4 ^ (t10 | t11); - } - - /// - /// S2 - { 8, 6, 7, 9, 3,12,10,15,13, 1,14, 4, 0,11, 5, 2 } - 16 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb2(int a, int b, int c, int d) - { - var t1 = ~a; - var t2 = b ^ d; - var t3 = c & t1; - _x0 = t2 ^ t3; - var t5 = c ^ t1; - var t6 = c ^ _x0; - var t7 = b & t6; - _x3 = t5 ^ t7; - _x2 = a ^ ((d | t7) & (_x0 | t5)); - _x1 = (t2 ^ _x3) ^ (_x2 ^ (d | t1)); - } - - /// - /// InvS2 - {12, 9,15, 4,11,14, 1, 2, 0, 3, 6,13, 5, 8,10, 7 } - 16 steps. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib2(int a, int b, int c, int d) - { - var t1 = b ^ d; - var t2 = ~t1; - var t3 = a ^ c; - var t4 = c ^ t1; - var t5 = b & t4; - _x0 = t3 ^ t5; - var t7 = a | t2; - var t8 = d ^ t7; - var t9 = t3 | t8; - _x3 = t1 ^ t9; - var t11 = ~t4; - var t12 = _x0 | _x3; - _x1 = t11 ^ t12; - _x2 = (d & t11) ^ (t3 ^ t12); - } - - /// - /// S3 - { 0,15,11, 8,12, 9, 6, 3,13, 1, 2, 4,10, 7, 5,14 } - 16 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb3(int a, int b, int c, int d) - { - var t1 = a ^ b; - var t2 = a & c; - var t3 = a | d; - var t4 = c ^ d; - var t5 = t1 & t3; - var t6 = t2 | t5; - _x2 = t4 ^ t6; - var t8 = b ^ t3; - var t9 = t6 ^ t8; - var t10 = t4 & t9; - _x0 = t1 ^ t10; - var t12 = _x2 & _x0; - _x1 = t9 ^ t12; - _x3 = (b | d) ^ (t4 ^ t12); - } - - /// - /// InvS3 - { 0, 9,10, 7,11,14, 6,13, 3, 5,12, 2, 4, 8,15, 1 } - 15 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib3(int a, int b, int c, int d) - { - var t1 = a | b; - var t2 = b ^ c; - var t3 = b & t2; - var t4 = a ^ t3; - var t5 = c ^ t4; - var t6 = d | t4; - _x0 = t2 ^ t6; - var t8 = t2 | t6; - var t9 = d ^ t8; - _x2 = t5 ^ t9; - var t11 = t1 ^ t9; - var t12 = _x0 & t11; - _x3 = t4 ^ t12; - _x1 = _x3 ^ (_x0 ^ t11); - } - - /// - /// S4 - { 1,15, 8, 3,12, 0,11, 6, 2, 5, 4,10, 9,14, 7,13 } - 15 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb4(int a, int b, int c, int d) - { - var t1 = a ^ d; - var t2 = d & t1; - var t3 = c ^ t2; - var t4 = b | t3; - _x3 = t1 ^ t4; - var t6 = ~b; - var t7 = t1 | t6; - _x0 = t3 ^ t7; - var t9 = a & _x0; - var t10 = t1 ^ t6; - var t11 = t4 & t10; - _x2 = t9 ^ t11; - _x1 = (a ^ t3) ^ (t10 & _x2); - } - - /// - /// InvS4 - { 5, 0, 8, 3,10, 9, 7,14, 2,12,11, 6, 4,15,13, 1 } - 15 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib4(int a, int b, int c, int d) - { - var t1 = c | d; - var t2 = a & t1; - var t3 = b ^ t2; - var t4 = a & t3; - var t5 = c ^ t4; - _x1 = d ^ t5; - var t7 = ~a; - var t8 = t5 & _x1; - _x3 = t3 ^ t8; - var t10 = _x1 | t7; - var t11 = d ^ t10; - _x0 = _x3 ^ t11; - _x2 = (t3 & t11) ^ (_x1 ^ t7); - } - - /// - /// S5 - {15, 5, 2,11, 4,10, 9,12, 0, 3,14, 8,13, 6, 7, 1 } - 16 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb5(int a, int b, int c, int d) - { - var t1 = ~a; - var t2 = a ^ b; - var t3 = a ^ d; - var t4 = c ^ t1; - var t5 = t2 | t3; - _x0 = t4 ^ t5; - var t7 = d & _x0; - var t8 = t2 ^ _x0; - _x1 = t7 ^ t8; - var t10 = t1 | _x0; - var t11 = t2 | t7; - var t12 = t3 ^ t10; - _x2 = t11 ^ t12; - _x3 = (b ^ t7) ^ (_x1 & t12); - } - - /// - /// InvS5 - { 8,15, 2, 9, 4, 1,13,14,11, 6, 5, 3, 7,12,10, 0 } - 16 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib5(int a, int b, int c, int d) - { - var t1 = ~c; - var t2 = b & t1; - var t3 = d ^ t2; - var t4 = a & t3; - var t5 = b ^ t1; - _x3 = t4 ^ t5; - var t7 = b | _x3; - var t8 = a & t7; - _x1 = t3 ^ t8; - var t10 = a | d; - var t11 = t1 ^ t7; - _x0 = t10 ^ t11; - _x2 = (b & t10) ^ (t4 | (a ^ c)); - } - - /// - /// S6 - { 7, 2,12, 5, 8, 4, 6,11,14, 9, 1,15,13, 3,10, 0 } - 15 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb6(int a, int b, int c, int d) - { - var t1 = ~a; - var t2 = a ^ d; - var t3 = b ^ t2; - var t4 = t1 | t2; - var t5 = c ^ t4; - _x1 = b ^ t5; - var t7 = t2 | _x1; - var t8 = d ^ t7; - var t9 = t5 & t8; - _x2 = t3 ^ t9; - var t11 = t5 ^ t8; - _x0 = _x2 ^ t11; - _x3 = (~t5) ^ (t3 & t11); - } - - /// - /// InvS6 - {15,10, 1,13, 5, 3, 6, 0, 4, 9,14, 7, 2,12, 8,11 } - 15 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib6(int a, int b, int c, int d) - { - var t1 = ~a; - var t2 = a ^ b; - var t3 = c ^ t2; - var t4 = c | t1; - var t5 = d ^ t4; - _x1 = t3 ^ t5; - var t7 = t3 & t5; - var t8 = t2 ^ t7; - var t9 = b | t8; - _x3 = t5 ^ t9; - var t11 = b | _x3; - _x0 = t8 ^ t11; - _x2 = (d & t1) ^ (t3 ^ t11); - } - - /// - /// S7 - { 1,13,15, 0,14, 8, 2,11, 7, 4,12,10, 9, 3, 5, 6 } - 16 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Sb7(int a, int b, int c, int d) - { - var t1 = b ^ c; - var t2 = c & t1; - var t3 = d ^ t2; - var t4 = a ^ t3; - var t5 = d | t1; - var t6 = t4 & t5; - _x1 = b ^ t6; - var t8 = t3 | _x1; - var t9 = a & t4; - _x3 = t1 ^ t9; - var t11 = t4 ^ t8; - var t12 = _x3 & t11; - _x2 = t3 ^ t12; - _x0 = (~t11) ^ (_x3 & _x2); - } - - /// - /// InvS7 - { 3, 0, 6,13, 9,14,15, 8, 5,12,11, 7,10, 1, 4, 2 } - 17 terms. - /// - /// A. - /// The b. - /// The c. - /// The d. - private void Ib7(int a, int b, int c, int d) - { - var t3 = c | (a & b); - var t4 = d & (a | b); - _x3 = t3 ^ t4; - var t6 = ~d; - var t7 = b ^ t4; - var t9 = t7 | (_x3 ^ t6); - _x1 = a ^ t9; - _x0 = (c ^ t7) ^ (d | _x1); - _x2 = (t3 ^ _x1) ^ (_x0 ^ (a & _x3)); - } - - /// - /// Apply the linear transformation to the register set. - /// - private void LT() - { - var x0 = RotateLeft(_x0, 13); - var x2 = RotateLeft(_x2, 3); - var x1 = _x1 ^ x0 ^ x2; - var x3 = _x3 ^ x2 ^ x0 << 3; - - _x1 = RotateLeft(x1, 1); - _x3 = RotateLeft(x3, 7); - _x0 = RotateLeft(x0 ^ _x1 ^ _x3, 5); - _x2 = RotateLeft(x2 ^ _x3 ^ (_x1 << 7), 22); - } - - /// - /// Apply the inverse of the linear transformation to the register set. - /// - private void InverseLT() - { - var x2 = RotateRight(_x2, 22) ^ _x3 ^ (_x1 << 7); - var x0 = RotateRight(_x0, 5) ^ _x1 ^ _x3; - var x3 = RotateRight(_x3, 7); - var x1 = RotateRight(_x1, 1); - _x3 = x3 ^ x2 ^ x0 << 3; - _x1 = x1 ^ x0 ^ x2; - _x2 = RotateRight(x2, 3); - _x0 = RotateRight(x0, 13); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs b/src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs deleted file mode 100644 index e977f51d3..000000000 --- a/src/Renci.SshNet/Security/Cryptography/Ciphers/TwofishCipher.cs +++ /dev/null @@ -1,519 +0,0 @@ -using System; - -namespace Renci.SshNet.Security.Cryptography.Ciphers -{ - /// - /// Implements Twofish cipher algorithm. - /// - public sealed class TwofishCipher : BlockCipher - { - /** - * Define the fixed p0/p1 permutations used in keyed S-box lookup. - * By changing the following constant definitions, the S-boxes will - * automatically Get changed in the Twofish engine. - */ -#pragma warning disable SA1310 // Field names should not contain underscore - private const int P_00 = 1; - private const int P_01 = 0; - private const int P_02 = 0; - private const int P_03 = P_01 ^ 1; - private const int P_04 = 1; - - private const int P_10 = 0; - private const int P_11 = 0; - private const int P_12 = 1; - private const int P_13 = P_11 ^ 1; - private const int P_14 = 0; - - private const int P_20 = 1; - private const int P_21 = 1; - private const int P_22 = 0; - private const int P_23 = P_21 ^ 1; - private const int P_24 = 0; - - private const int P_30 = 0; - private const int P_31 = 1; - private const int P_32 = 1; - private const int P_33 = P_31 ^ 1; - private const int P_34 = 1; - - /* Primitive polynomial for GF(256) */ - private const int GF256_FDBK = 0x169; - private const int GF256_FDBK_2 = GF256_FDBK / 2; - private const int GF256_FDBK_4 = GF256_FDBK / 4; - - private const int RS_GF_FDBK = 0x14D; // field generator - - private const int ROUNDS = 16; - private const int MAX_ROUNDS = 16; // bytes = 128 bits - private const int MAX_KEY_BITS = 256; - - private const int INPUT_WHITEN = 0; - private const int OUTPUT_WHITEN = INPUT_WHITEN + (16 / 4); // 4 - private const int ROUND_SUBKEYS = OUTPUT_WHITEN + (16 / 4); // 8 - - private const int TOTAL_SUBKEYS = ROUND_SUBKEYS + (2 * MAX_ROUNDS); // 40 - - private const int SK_STEP = 0x02020202; - private const int SK_BUMP = 0x01010101; - private const int SK_ROTL = 9; -#pragma warning restore SA1310 // Field names should not contain underscore - - private readonly int[] _gMDS0 = new int[MAX_KEY_BITS]; - private readonly int[] _gMDS1 = new int[MAX_KEY_BITS]; - private readonly int[] _gMDS2 = new int[MAX_KEY_BITS]; - private readonly int[] _gMDS3 = new int[MAX_KEY_BITS]; - - private readonly int _k64Cnt; - - /* - * _gSubKeys[] and _gSBox[] are eventually used in the - * encryption and decryption methods. - */ - private int[] _gSubKeys; - private int[] _gSBox; - - /// - /// Initializes a new instance of the class. - /// - /// The key. - /// The mode. - /// The padding. - /// is . - /// Keysize is not valid for this algorithm. - public TwofishCipher(byte[] key, CipherMode mode, CipherPadding padding) - : base(key, 16, mode, padding) - { - var keySize = key.Length * 8; - - if (keySize is not (128 or 192 or 256)) - { - throw new ArgumentException(string.Format("KeySize '{0}' is not valid for this algorithm.", keySize)); - } - - // calculate the MDS matrix - var m1 = new int[2]; - var mX = new int[2]; - var mY = new int[2]; - - for (var i = 0; i < MAX_KEY_BITS; i++) - { - var j = P[0 + i] & 0xff; - m1[0] = j; - mX[0] = Mx_X(j) & 0xff; - mY[0] = Mx_Y(j) & 0xff; - - j = P[(1 * 256) + i] & 0xff; - m1[1] = j; - mX[1] = Mx_X(j) & 0xff; - mY[1] = Mx_Y(j) & 0xff; - - _gMDS0[i] = m1[P_00] | mX[P_00] << 8 | mY[P_00] << 16 | mY[P_00] << 24; - - _gMDS1[i] = mY[P_10] | mY[P_10] << 8 | mX[P_10] << 16 | m1[P_10] << 24; - - _gMDS2[i] = mX[P_20] | mY[P_20] << 8 | m1[P_20] << 16 | mY[P_20] << 24; - - _gMDS3[i] = mX[P_30] | m1[P_30] << 8 | mY[P_30] << 16 | mX[P_30] << 24; - } - - _k64Cnt = key.Length / 8; // pre-padded ? - SetKey(key); - } - - /// - /// Encrypts the specified region of the input byte array and copies the encrypted data to the specified region of the output byte array. - /// - /// The input data to encrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write encrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes encrypted. - /// - public override int EncryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - var x0 = BytesTo32Bits(inputBuffer, inputOffset) ^ _gSubKeys[INPUT_WHITEN]; - var x1 = BytesTo32Bits(inputBuffer, inputOffset + 4) ^ _gSubKeys[INPUT_WHITEN + 1]; - var x2 = BytesTo32Bits(inputBuffer, inputOffset + 8) ^ _gSubKeys[INPUT_WHITEN + 2]; - var x3 = BytesTo32Bits(inputBuffer, inputOffset + 12) ^ _gSubKeys[INPUT_WHITEN + 3]; - - var k = ROUND_SUBKEYS; - for (var r = 0; r < ROUNDS; r += 2) - { - var t0 = Fe32_0(_gSBox, x0); - var t1 = Fe32_3(_gSBox, x1); - x2 ^= t0 + t1 + _gSubKeys[k++]; - x2 = (int)((uint)x2 >> 1) | x2 << 31; - x3 = (x3 << 1 | (int)((uint)x3 >> 31)) ^ (t0 + (2 * t1) + _gSubKeys[k++]); - - t0 = Fe32_0(_gSBox, x2); - t1 = Fe32_3(_gSBox, x3); - x0 ^= t0 + t1 + _gSubKeys[k++]; - x0 = (int)((uint)x0 >> 1) | x0 << 31; - x1 = (x1 << 1 | (int)((uint)x1 >> 31)) ^ (t0 + (2 * t1) + _gSubKeys[k++]); - } - - Bits32ToBytes(x2 ^ _gSubKeys[OUTPUT_WHITEN], outputBuffer, outputOffset); - Bits32ToBytes(x3 ^ _gSubKeys[OUTPUT_WHITEN + 1], outputBuffer, outputOffset + 4); - Bits32ToBytes(x0 ^ _gSubKeys[OUTPUT_WHITEN + 2], outputBuffer, outputOffset + 8); - Bits32ToBytes(x1 ^ _gSubKeys[OUTPUT_WHITEN + 3], outputBuffer, outputOffset + 12); - - return BlockSize; - } - - /// - /// Decrypts the specified region of the input byte array and copies the decrypted data to the specified region of the output byte array. - /// - /// The input data to decrypt. - /// The offset into the input byte array from which to begin using data. - /// The number of bytes in the input byte array to use as data. - /// The output to which to write decrypted data. - /// The offset into the output byte array from which to begin writing data. - /// - /// The number of bytes decrypted. - /// - public override int DecryptBlock(byte[] inputBuffer, int inputOffset, int inputCount, byte[] outputBuffer, int outputOffset) - { - var x2 = BytesTo32Bits(inputBuffer, inputOffset) ^ _gSubKeys[OUTPUT_WHITEN]; - var x3 = BytesTo32Bits(inputBuffer, inputOffset + 4) ^ _gSubKeys[OUTPUT_WHITEN + 1]; - var x0 = BytesTo32Bits(inputBuffer, inputOffset + 8) ^ _gSubKeys[OUTPUT_WHITEN + 2]; - var x1 = BytesTo32Bits(inputBuffer, inputOffset + 12) ^ _gSubKeys[OUTPUT_WHITEN + 3]; - - var k = ROUND_SUBKEYS + (2 * ROUNDS) - 1; - for (var r = 0; r < ROUNDS; r += 2) - { - var t0 = Fe32_0(_gSBox, x2); - var t1 = Fe32_3(_gSBox, x3); - x1 ^= t0 + (2 * t1) + _gSubKeys[k--]; - x0 = (x0 << 1 | (int)((uint)x0 >> 31)) ^ (t0 + t1 + _gSubKeys[k--]); - x1 = (int)((uint)x1 >> 1) | x1 << 31; - - t0 = Fe32_0(_gSBox, x0); - t1 = Fe32_3(_gSBox, x1); - x3 ^= t0 + (2 * t1) + _gSubKeys[k--]; - x2 = (x2 << 1 | (int)((uint)x2 >> 31)) ^ (t0 + t1 + _gSubKeys[k--]); - x3 = (int)((uint)x3 >> 1) | x3 << 31; - } - - Bits32ToBytes(x0 ^ _gSubKeys[INPUT_WHITEN], outputBuffer, outputOffset); - Bits32ToBytes(x1 ^ _gSubKeys[INPUT_WHITEN + 1], outputBuffer, outputOffset + 4); - Bits32ToBytes(x2 ^ _gSubKeys[INPUT_WHITEN + 2], outputBuffer, outputOffset + 8); - Bits32ToBytes(x3 ^ _gSubKeys[INPUT_WHITEN + 3], outputBuffer, outputOffset + 12); - - return BlockSize; - } - - private static readonly byte[] P = - { - // p0 - 0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76, 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38, - 0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C, 0x43, 0x75, 0x37, 0x26, 0xFA, 0x13, 0x94, 0x48, - 0xF2, 0xD0, 0x8B, 0x30, 0x84, 0x54, 0xDF, 0x23, 0x19, 0x5B, 0x3D, 0x59, 0xF3, 0xAE, 0xA2, 0x82, - 0x63, 0x01, 0x83, 0x2E, 0xD9, 0x51, 0x9B, 0x7C, 0xA6, 0xEB, 0xA5, 0xBE, 0x16, 0x0C, 0xE3, 0x61, - 0xC0, 0x8C, 0x3A, 0xF5, 0x73, 0x2C, 0x25, 0x0B, 0xBB, 0x4E, 0x89, 0x6B, 0x53, 0x6A, 0xB4, 0xF1, - 0xE1, 0xE6, 0xBD, 0x45, 0xE2, 0xF4, 0xB6, 0x66, 0xCC, 0x95, 0x03, 0x56, 0xD4, 0x1C, 0x1E, 0xD7, - 0xFB, 0xC3, 0x8E, 0xB5, 0xE9, 0xCF, 0xBF, 0xBA, 0xEA, 0x77, 0x39, 0xAF, 0x33, 0xC9, 0x62, 0x71, - 0x81, 0x79, 0x09, 0xAD, 0x24, 0xCD, 0xF9, 0xD8, 0xE5, 0xC5, 0xB9, 0x4D, 0x44, 0x08, 0x86, 0xE7, - 0xA1, 0x1D, 0xAA, 0xED, 0x06, 0x70, 0xB2, 0xD2, 0x41, 0x7B, 0xA0, 0x11, 0x31, 0xC2, 0x27, 0x90, - 0x20, 0xF6, 0x60, 0xFF, 0x96, 0x5C, 0xB1, 0xAB, 0x9E, 0x9C, 0x52, 0x1B, 0x5F, 0x93, 0x0A, 0xEF, - 0x91, 0x85, 0x49, 0xEE, 0x2D, 0x4F, 0x8F, 0x3B, 0x47, 0x87, 0x6D, 0x46, 0xD6, 0x3E, 0x69, 0x64, - 0x2A, 0xCE, 0xCB, 0x2F, 0xFC, 0x97, 0x05, 0x7A, 0xAC, 0x7F, 0xD5, 0x1A, 0x4B, 0x0E, 0xA7, 0x5A, - 0x28, 0x14, 0x3F, 0x29, 0x88, 0x3C, 0x4C, 0x02, 0xB8, 0xDA, 0xB0, 0x17, 0x55, 0x1F, 0x8A, 0x7D, - 0x57, 0xC7, 0x8D, 0x74, 0xB7, 0xC4, 0x9F, 0x72, 0x7E, 0x15, 0x22, 0x12, 0x58, 0x07, 0x99, 0x34, - 0x6E, 0x50, 0xDE, 0x68, 0x65, 0xBC, 0xDB, 0xF8, 0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4, - 0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00, 0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1, 0xE0, - - // p1 - 0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8, 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B, - 0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1, 0x30, 0x0F, 0xF8, 0x1B, 0x87, 0xFA, 0x06, 0x3F, - 0x5E, 0xBA, 0xAE, 0x5B, 0x8A, 0x00, 0xBC, 0x9D, 0x6D, 0xC1, 0xB1, 0x0E, 0x80, 0x5D, 0xD2, 0xD5, - 0xA0, 0x84, 0x07, 0x14, 0xB5, 0x90, 0x2C, 0xA3, 0xB2, 0x73, 0x4C, 0x54, 0x92, 0x74, 0x36, 0x51, - 0x38, 0xB0, 0xBD, 0x5A, 0xFC, 0x60, 0x62, 0x96, 0x6C, 0x42, 0xF7, 0x10, 0x7C, 0x28, 0x27, 0x8C, - 0x13, 0x95, 0x9C, 0xC7, 0x24, 0x46, 0x3B, 0x70, 0xCA, 0xE3, 0x85, 0xCB, 0x11, 0xD0, 0x93, 0xB8, - 0xA6, 0x83, 0x20, 0xFF, 0x9F, 0x77, 0xC3, 0xCC, 0x03, 0x6F, 0x08, 0xBF, 0x40, 0xE7, 0x2B, 0xE2, - 0x79, 0x0C, 0xAA, 0x82, 0x41, 0x3A, 0xEA, 0xB9, 0xE4, 0x9A, 0xA4, 0x97, 0x7E, 0xDA, 0x7A, 0x17, - 0x66, 0x94, 0xA1, 0x1D, 0x3D, 0xF0, 0xDE, 0xB3, 0x0B, 0x72, 0xA7, 0x1C, 0xEF, 0xD1, 0x53, 0x3E, - 0x8F, 0x33, 0x26, 0x5F, 0xEC, 0x76, 0x2A, 0x49, 0x81, 0x88, 0xEE, 0x21, 0xC4, 0x1A, 0xEB, 0xD9, - 0xC5, 0x39, 0x99, 0xCD, 0xAD, 0x31, 0x8B, 0x01, 0x18, 0x23, 0xDD, 0x1F, 0x4E, 0x2D, 0xF9, 0x48, - 0x4F, 0xF2, 0x65, 0x8E, 0x78, 0x5C, 0x58, 0x19, 0x8D, 0xE5, 0x98, 0x57, 0x67, 0x7F, 0x05, 0x64, - 0xAF, 0x63, 0xB6, 0xFE, 0xF5, 0xB7, 0x3C, 0xA5, 0xCE, 0xE9, 0x68, 0x44, 0xE0, 0x4D, 0x43, 0x69, - 0x29, 0x2E, 0xAC, 0x15, 0x59, 0xA8, 0x0A, 0x9E, 0x6E, 0x47, 0xDF, 0x34, 0x35, 0x6A, 0xCF, 0xDC, - 0x22, 0xC9, 0xC0, 0x9B, 0x89, 0xD4, 0xED, 0xAB, 0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9, - 0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2, 0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE, 0x91 - }; - - private void SetKey(byte[] key) - { - var k32e = new int[MAX_KEY_BITS / 64]; // 4 - var k32o = new int[MAX_KEY_BITS / 64]; // 4 - - var sBoxKeys = new int[MAX_KEY_BITS / 64]; // 4 - _gSubKeys = new int[TOTAL_SUBKEYS]; - - if (_k64Cnt < 1) - { - throw new ArgumentException("Key size less than 64 bits"); - } - - if (_k64Cnt > 4) - { - throw new ArgumentException("Key size larger than 256 bits"); - } - - /* - * k64Cnt is the number of 8 byte blocks (64 chunks) - * that are in the input key. The input key is a - * maximum of 32 bytes ( 256 bits ), so the range - * for k64Cnt is 1..4 - */ - for (var i = 0; i < _k64Cnt; i++) - { - var p = i * 8; - - k32e[i] = BytesTo32Bits(key, p); - k32o[i] = BytesTo32Bits(key, p + 4); - - sBoxKeys[_k64Cnt - 1 - i] = RS_MDS_Encode(k32e[i], k32o[i]); - } - - for (var i = 0; i < TOTAL_SUBKEYS / 2; i++) - { - var q = i * SK_STEP; - var a = F32(q, k32e); - var b = F32(q + SK_BUMP, k32o); - b = b << 8 | (int)((uint)b >> 24); - a += b; - _gSubKeys[i * 2] = a; - a += b; - _gSubKeys[(i * 2) + 1] = a << SK_ROTL | (int)((uint)a >> (32 - SK_ROTL)); - } - - /* - * fully expand the table for speed - */ - var k0 = sBoxKeys[0]; - var k1 = sBoxKeys[1]; - var k2 = sBoxKeys[2]; - var k3 = sBoxKeys[3]; - _gSBox = new int[4 * MAX_KEY_BITS]; - for (var i = 0; i < MAX_KEY_BITS; i++) - { - int b1, b2, b3; - var b0 = b1 = b2 = b3 = i; - -#pragma warning disable IDE0010 // Add missing cases - switch (_k64Cnt & 3) - { - case 1: - _gSBox[i * 2] = _gMDS0[(P[(P_01 * 256) + b0] & 0xff) ^ M_b0(k0)]; - _gSBox[(i * 2) + 1] = _gMDS1[(P[(P_11 * 256) + b1] & 0xff) ^ M_b1(k0)]; - _gSBox[(i * 2) + 0x200] = _gMDS2[(P[(P_21 * 256) + b2] & 0xff) ^ M_b2(k0)]; - _gSBox[(i * 2) + 0x201] = _gMDS3[(P[(P_31 * 256) + b3] & 0xff) ^ M_b3(k0)]; - break; - case 0: /* 256 bits of key */ - b0 = (P[(P_04 * 256) + b0] & 0xff) ^ M_b0(k3); - b1 = (P[(P_14 * 256) + b1] & 0xff) ^ M_b1(k3); - b2 = (P[(P_24 * 256) + b2] & 0xff) ^ M_b2(k3); - b3 = (P[(P_34 * 256) + b3] & 0xff) ^ M_b3(k3); - goto case 3; - case 3: - b0 = (P[(P_03 * 256) + b0] & 0xff) ^ M_b0(k2); - b1 = (P[(P_13 * 256) + b1] & 0xff) ^ M_b1(k2); - b2 = (P[(P_23 * 256) + b2] & 0xff) ^ M_b2(k2); - b3 = (P[(P_33 * 256) + b3] & 0xff) ^ M_b3(k2); - goto case 2; - case 2: - _gSBox[i * 2] = _gMDS0[(P[(P_01 * 256) + (P[(P_02 * 256) + b0] & 0xff) ^ M_b0(k1)] & 0xff) ^ M_b0(k0)]; - _gSBox[(i * 2) + 1] = _gMDS1[(P[(P_11 * 256) + (P[(P_12 * 256) + b1] & 0xff) ^ M_b1(k1)] & 0xff) ^ M_b1(k0)]; - _gSBox[(i * 2) + 0x200] = _gMDS2[(P[(P_21 * 256) + (P[(P_22 * 256) + b2] & 0xff) ^ M_b2(k1)] & 0xff) ^ M_b2(k0)]; - _gSBox[(i * 2) + 0x201] = _gMDS3[(P[(P_31 * 256) + (P[(P_32 * 256) + b3] & 0xff) ^ M_b3(k1)] & 0xff) ^ M_b3(k0)]; - break; - } -#pragma warning restore IDE0010 // Add missing cases - } - - /* - * the function exits having setup the gSBox with the - * input key material. - */ - } - - /* - * TODO: This can be optimised and made cleaner by combining - * the functionality in this function and applying it appropriately - * to the creation of the subkeys during key setup. - */ - private int F32(int x, int[] k32) - { - var b0 = M_b0(x); - var b1 = M_b1(x); - var b2 = M_b2(x); - var b3 = M_b3(x); - var k0 = k32[0]; - var k1 = k32[1]; - var k2 = k32[2]; - var k3 = k32[3]; - - var result = 0; - -#pragma warning disable IDE0010 // Add missing cases - switch (_k64Cnt & 3) - { - case 1: - result = _gMDS0[(P[(P_01 * 256) + b0] & 0xff) ^ M_b0(k0)] ^ - _gMDS1[(P[(P_11 * 256) + b1] & 0xff) ^ M_b1(k0)] ^ - _gMDS2[(P[(P_21 * 256) + b2] & 0xff) ^ M_b2(k0)] ^ - _gMDS3[(P[(P_31 * 256) + b3] & 0xff) ^ M_b3(k0)]; - break; - case 0: /* 256 bits of key */ - b0 = (P[(P_04 * 256) + b0] & 0xff) ^ M_b0(k3); - b1 = (P[(P_14 * 256) + b1] & 0xff) ^ M_b1(k3); - b2 = (P[(P_24 * 256) + b2] & 0xff) ^ M_b2(k3); - b3 = (P[(P_34 * 256) + b3] & 0xff) ^ M_b3(k3); - goto case 3; - case 3: - b0 = (P[(P_03 * 256) + b0] & 0xff) ^ M_b0(k2); - b1 = (P[(P_13 * 256) + b1] & 0xff) ^ M_b1(k2); - b2 = (P[(P_23 * 256) + b2] & 0xff) ^ M_b2(k2); - b3 = (P[(P_33 * 256) + b3] & 0xff) ^ M_b3(k2); - goto case 2; - case 2: - result = - _gMDS0[(P[(P_01 * 256) + (P[(P_02 * 256) + b0] & 0xff) ^ M_b0(k1)] & 0xff) ^ M_b0(k0)] ^ - _gMDS1[(P[(P_11 * 256) + (P[(P_12 * 256) + b1] & 0xff) ^ M_b1(k1)] & 0xff) ^ M_b1(k0)] ^ - _gMDS2[(P[(P_21 * 256) + (P[(P_22 * 256) + b2] & 0xff) ^ M_b2(k1)] & 0xff) ^ M_b2(k0)] ^ - _gMDS3[(P[(P_31 * 256) + (P[(P_32 * 256) + b3] & 0xff) ^ M_b3(k1)] & 0xff) ^ M_b3(k0)]; - break; - } -#pragma warning restore IDE0010 // Add missing cases - - return result; - } - - /** - * Use (12, 8) Reed-Solomon code over GF(256) to produce - * a key S-box 32-bit entity from 2 key material 32-bit - * entities. - * - * @param k0 first 32-bit entity - * @param k1 second 32-bit entity - * @return Remainder polynomial Generated using RS code - */ - private static int RS_MDS_Encode(int k0, int k1) - { - var r = k1; - - // shift 1 byte at a time - r = RS_rem(r); - r = RS_rem(r); - r = RS_rem(r); - r = RS_rem(r); - r ^= k0; - r = RS_rem(r); - r = RS_rem(r); - r = RS_rem(r); - r = RS_rem(r); - - return r; - } - - /** - * Reed-Solomon code parameters: (12,8) reversible code: - *

- *

-        * G(x) = x^4 + (a+1/a)x^3 + ax^2 + (a+1/a)x + 1
-        * 
- * where a = primitive root of field generator 0x14D. - *

- */ - private static int RS_rem(int x) - { - var b = (int)(((uint)x >> 24) & 0xff); - var g2 = ((b << 1) ^ ((b & 0x80) != 0 ? RS_GF_FDBK : 0)) & 0xff; - var g3 = ((int)((uint)b >> 1) ^ ((b & 0x01) != 0 ? (int)((uint)RS_GF_FDBK >> 1) : 0)) ^ g2; - return (x << 8) ^ (g3 << 24) ^ (g2 << 16) ^ (g3 << 8) ^ b; - } - - private static int LFSR1(int x) - { - return (x >> 1) ^ (((x & 0x01) != 0) ? GF256_FDBK_2 : 0); - } - - private static int LFSR2(int x) - { - return (x >> 2) ^ (((x & 0x02) != 0) ? GF256_FDBK_2 : 0) ^ (((x & 0x01) != 0) ? GF256_FDBK_4 : 0); - } - - private static int Mx_X(int x) - { - return x ^ LFSR2(x); - } // 5B - - private static int Mx_Y(int x) - { - return x ^ LFSR1(x) ^ LFSR2(x); - } // EF - -#pragma warning disable IDE1006 // Naming Styles - private static int M_b0(int x) -#pragma warning restore IDE1006 // Naming Styles - { - return x & 0xff; - } - -#pragma warning disable IDE1006 // Naming Styles - private static int M_b1(int x) -#pragma warning restore IDE1006 // Naming Styles - { - return (int)((uint)x >> 8) & 0xff; - } - -#pragma warning disable IDE1006 // Naming Styles - private static int M_b2(int x) -#pragma warning restore IDE1006 // Naming Styles - { - return (int)((uint)x >> 16) & 0xff; - } - -#pragma warning disable IDE1006 // Naming Styles - private static int M_b3(int x) -#pragma warning restore IDE1006 // Naming Styles - { - return (int)((uint)x >> 24) & 0xff; - } - - private static int Fe32_0(int[] gSBox1, int x) - { - return gSBox1[0x000 + (2 * (x & 0xff))] ^ - gSBox1[0x001 + (2 * ((int)((uint)x >> 8) & 0xff))] ^ - gSBox1[0x200 + (2 * ((int)((uint)x >> 16) & 0xff))] ^ - gSBox1[0x201 + (2 * ((int)((uint)x >> 24) & 0xff))]; - } - - private static int Fe32_3(int[] gSBox1, int x) - { - return gSBox1[0x000 + (2 * ((int)((uint)x >> 24) & 0xff))] ^ - gSBox1[0x001 + (2 * (x & 0xff))] ^ - gSBox1[0x200 + (2 * ((int)((uint)x >> 8) & 0xff))] ^ - gSBox1[0x201 + (2 * ((int)((uint)x >> 16) & 0xff))]; - } - - private static int BytesTo32Bits(byte[] b, int p) - { - return (b[p] & 0xff) | - ((b[p + 1] & 0xff) << 8) | - ((b[p + 2] & 0xff) << 16) | - ((b[p + 3] & 0xff) << 24); - } - - private static void Bits32ToBytes(int inData, byte[] b, int offset) - { - b[offset] = (byte)inData; - b[offset + 1] = (byte)(inData >> 8); - b[offset + 2] = (byte)(inData >> 16); - b[offset + 3] = (byte)(inData >> 24); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/HMACMD5.cs b/src/Renci.SshNet/Security/Cryptography/HMACMD5.cs deleted file mode 100644 index b0c1e1431..000000000 --- a/src/Renci.SshNet/Security/Cryptography/HMACMD5.cs +++ /dev/null @@ -1,61 +0,0 @@ -using System.Security.Cryptography; - -using Renci.SshNet.Common; - -namespace Renci.SshNet.Security.Cryptography -{ - /// - /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function. - /// - public class HMACMD5 : System.Security.Cryptography.HMACMD5 - { - private readonly int _hashSize; - - /// - /// Initializes a new instance of the class with the specified key. - /// - /// The key. - public HMACMD5(byte[] key) - : base(key) - { -#pragma warning disable MA0056 // Do not call overridable members in constructor - _hashSize = base.HashSize; -#pragma warning restore MA0056 // Do not call overridable members in constructor - } - - /// - /// Initializes a new instance of the class with the specified key - /// and size of the computed hash code. - /// - /// The key. - /// The size, in bits, of the computed hash code. - public HMACMD5(byte[] key, int hashSize) - : base(key) - { - _hashSize = hashSize; - } - - /// - /// Gets the size, in bits, of the computed hash code. - /// - /// - /// The size, in bits, of the computed hash code. - /// - public override int HashSize - { - get { return _hashSize; } - } - - /// - /// Finalizes the hash computation after the last data is processed by the cryptographic stream object. - /// - /// - /// The computed hash code. - /// - protected override byte[] HashFinal() - { - var hash = base.HashFinal(); - return hash.Take(HashSize / 8); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs deleted file mode 100644 index da66fec0d..000000000 --- a/src/Renci.SshNet/Security/Cryptography/HMACSHA1.cs +++ /dev/null @@ -1,60 +0,0 @@ -using System.Security.Cryptography; - -using Renci.SshNet.Common; - -namespace Renci.SshNet.Security.Cryptography -{ - /// - /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function. - /// - public class HMACSHA1 : System.Security.Cryptography.HMACSHA1 - { - private readonly int _hashSize; - - /// - /// Initializes a new instance of the class with the specified key. - /// - /// The key. - public HMACSHA1(byte[] key) - : base(key) - { -#pragma warning disable MA0056 // Do not call overridable members in constructor - _hashSize = base.HashSize; -#pragma warning restore MA0056 // Do not call overridable members in constructor - } - - /// - /// Initializes a new instance of the class with the specified key and size of the computed hash code. - /// - /// The key. - /// The size, in bits, of the computed hash code. - public HMACSHA1(byte[] key, int hashSize) - : base(key) - { - _hashSize = hashSize; - } - - /// - /// Gets the size, in bits, of the computed hash code. - /// - /// - /// The size, in bits, of the computed hash code. - /// - public override int HashSize - { - get { return _hashSize; } - } - - /// - /// Finalizes the hash computation after the last data is processed by the cryptographic stream object. - /// - /// - /// The computed hash code. - /// - protected override byte[] HashFinal() - { - var hash = base.HashFinal(); - return hash.Take(HashSize / 8); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs deleted file mode 100644 index e0f230a1a..000000000 --- a/src/Renci.SshNet/Security/Cryptography/HMACSHA256.cs +++ /dev/null @@ -1,61 +0,0 @@ -using System.Security.Cryptography; - -using Renci.SshNet.Common; - -namespace Renci.SshNet.Security.Cryptography -{ - /// - /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function. - /// - public class HMACSHA256 : System.Security.Cryptography.HMACSHA256 - { - private readonly int _hashSize; - - /// - /// Initializes a new instance of the class with the specified key. - /// - /// The key. - public HMACSHA256(byte[] key) - : base(key) - { -#pragma warning disable MA0056 // Do not call overridable members in constructor - _hashSize = base.HashSize; -#pragma warning restore MA0056 // Do not call overridable members in constructor - } - - /// - /// Initializes a new instance of the class with the specified key - /// and size of the computed hash code. - /// - /// The key. - /// The size, in bits, of the computed hash code. - public HMACSHA256(byte[] key, int hashSize) - : base(key) - { - _hashSize = hashSize; - } - - /// - /// Gets the size, in bits, of the computed hash code. - /// - /// - /// The size, in bits, of the computed hash code. - /// - public override int HashSize - { - get { return _hashSize; } - } - - /// - /// Finalizes the hash computation after the last data is processed by the cryptographic stream object. - /// - /// - /// The computed hash code. - /// - protected override byte[] HashFinal() - { - var hash = base.HashFinal(); - return hash.Take(HashSize / 8); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs deleted file mode 100644 index cbdcdf73c..000000000 --- a/src/Renci.SshNet/Security/Cryptography/HMACSHA384.cs +++ /dev/null @@ -1,61 +0,0 @@ -using System.Security.Cryptography; - -using Renci.SshNet.Common; - -namespace Renci.SshNet.Security.Cryptography -{ - /// - /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function. - /// - public class HMACSHA384 : System.Security.Cryptography.HMACSHA384 - { - private readonly int _hashSize; - - /// - /// Initializes a new instance of the class with the specified key. - /// - /// The key. - public HMACSHA384(byte[] key) - : base(key) - { -#pragma warning disable MA0056 // Do not call overridable members in constructor - _hashSize = base.HashSize; -#pragma warning restore MA0056 // Do not call overridable members in constructor - } - - /// - /// Initializes a new instance of the class with the specified key - /// and size of the computed hash code. - /// - /// The key. - /// The size, in bits, of the computed hash code. - public HMACSHA384(byte[] key, int hashSize) - : base(key) - { - _hashSize = hashSize; - } - - /// - /// Gets the size, in bits, of the computed hash code. - /// - /// - /// The size, in bits, of the computed hash code. - /// - public override int HashSize - { - get { return _hashSize; } - } - - /// - /// Finalizes the hash computation after the last data is processed by the cryptographic stream object. - /// - /// - /// The computed hash code. - /// - protected override byte[] HashFinal() - { - var hash = base.HashFinal(); - return hash.Take(HashSize / 8); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs b/src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs deleted file mode 100644 index 45cca6a11..000000000 --- a/src/Renci.SshNet/Security/Cryptography/HMACSHA512.cs +++ /dev/null @@ -1,61 +0,0 @@ -using System.Security.Cryptography; - -using Renci.SshNet.Common; - -namespace Renci.SshNet.Security.Cryptography -{ - /// - /// Computes a Hash-based Message Authentication Code (HMAC) by using the hash function. - /// - public class HMACSHA512 : System.Security.Cryptography.HMACSHA512 - { - private readonly int _hashSize; - - /// - /// Initializes a new instance of the class with the specified key. - /// - /// The key. - public HMACSHA512(byte[] key) - : base(key) - { -#pragma warning disable MA0056 // Do not call overridable members in constructor - _hashSize = base.HashSize; -#pragma warning restore MA0056 // Do not call overridable members in constructor - } - - /// - /// Initializes a new instance of the class with the specified key - /// and size of the computed hash code. - /// - /// The key. - /// The size, in bits, of the computed hash code. - public HMACSHA512(byte[] key, int hashSize) - : base(key) - { - _hashSize = hashSize; - } - - /// - /// Gets the size, in bits, of the computed hash code. - /// - /// - /// The size, in bits, of the computed hash code. - /// - public override int HashSize - { - get { return _hashSize; } - } - - /// - /// Finalizes the hash computation after the last data is processed by the cryptographic stream object. - /// - /// - /// The computed hash code. - /// - protected override byte[] HashFinal() - { - var hash = base.HashFinal(); - return hash.Take(HashSize / 8); - } - } -} diff --git a/src/Renci.SshNet/Security/Cryptography/StreamCipher.cs b/src/Renci.SshNet/Security/Cryptography/StreamCipher.cs deleted file mode 100644 index c8ebfdd8a..000000000 --- a/src/Renci.SshNet/Security/Cryptography/StreamCipher.cs +++ /dev/null @@ -1,20 +0,0 @@ -using System; - -namespace Renci.SshNet.Security.Cryptography -{ - /// - /// Base class of stream cipher algorithms. - /// - public abstract class StreamCipher : SymmetricCipher - { - /// - /// Initializes a new instance of the class. - /// - /// The key. - /// is . - protected StreamCipher(byte[] key) - : base(key) - { - } - } -} diff --git a/test/Renci.SshNet.IntegrationTests/HmacTests.cs b/test/Renci.SshNet.IntegrationTests/HmacTests.cs index e7876bc16..261b17a1a 100644 --- a/test/Renci.SshNet.IntegrationTests/HmacTests.cs +++ b/test/Renci.SshNet.IntegrationTests/HmacTests.cs @@ -22,30 +22,12 @@ public void TearDown() _remoteSshdConfig?.Reset(); } - [TestMethod] - public void HmacMd5() - { - DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5); - } - - [TestMethod] - public void HmacMd5_96() - { - DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5_96); - } - [TestMethod] public void HmacSha1() { DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1); } - [TestMethod] - public void HmacSha1_96() - { - DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1_96); - } - [TestMethod] public void HmacSha2_256() { @@ -58,17 +40,6 @@ public void HmacSha2_512() DoTest(MessageAuthenticationCodeAlgorithm.HmacSha2_512); } - [TestMethod] - public void HmacMd5_Etm() - { - DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5Etm); - } - - [TestMethod] - public void HmacMd5_96_Etm() - { - DoTest(MessageAuthenticationCodeAlgorithm.HmacMd5_96_Etm); - } [TestMethod] public void HmacSha1_Etm() @@ -76,12 +47,6 @@ public void HmacSha1_Etm() DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1Etm); } - [TestMethod] - public void HmacSha1_96_Etm() - { - DoTest(MessageAuthenticationCodeAlgorithm.HmacSha1_96_Etm); - } - [TestMethod] public void HmacSha2_256_Etm() { diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs index 39250ae27..558303a51 100644 --- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs +++ b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/BlockCipherTest.cs @@ -19,7 +19,7 @@ public void EncryptShouldTakeIntoAccountPaddingForLengthOfOutputBufferPassedToEn var input = new byte[] { 0x2c, 0x1a, 0x05, 0x00, 0x68 }; var output = new byte[] { 0x0a, 0x00, 0x03, 0x02, 0x06, 0x08, 0x07, 0x05 }; var key = new byte[] { 0x17, 0x78, 0x56, 0xe1, 0x3e, 0xbd, 0x3e, 0x50, 0x1d, 0x79, 0x3f, 0x0f, 0x55, 0x37, 0x45, 0x54 }; - var blockCipher = new BlockCipherStub(key, 8, null, new PKCS5Padding()) + var blockCipher = new BlockCipherStub(key, 8, null, new PKCS7Padding()) { EncryptBlockDelegate = (inputBuffer, inputOffset, inputCount, outputBuffer, outputOffset) => { @@ -40,7 +40,7 @@ public void DecryptShouldTakeIntoAccountPaddingForLengthOfOutputBufferPassedToDe var input = new byte[] { 0x2c, 0x1a, 0x05, 0x00, 0x68 }; var output = new byte[] { 0x0a, 0x00, 0x03, 0x02, 0x06, 0x08, 0x07, 0x05 }; var key = new byte[] { 0x17, 0x78, 0x56, 0xe1, 0x3e, 0xbd, 0x3e, 0x50, 0x1d, 0x79, 0x3f, 0x0f, 0x55, 0x37, 0x45, 0x54 }; - var blockCipher = new BlockCipherStub(key, 8, null, new PKCS5Padding()) + var blockCipher = new BlockCipherStub(key, 8, null, new PKCS7Padding()) { DecryptBlockDelegate = (inputBuffer, inputOffset, inputCount, outputBuffer, outputOffset) => { diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs deleted file mode 100644 index 7a95f7073..000000000 --- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Arc4CipherTest.cs +++ /dev/null @@ -1,107 +0,0 @@ -using System.Text; - -using Microsoft.VisualStudio.TestTools.UnitTesting; - -using Renci.SshNet.Common; -using Renci.SshNet.Security.Cryptography.Ciphers; -using Renci.SshNet.Tests.Common; - -namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers -{ - /// - /// Implements ARCH4 cipher algorithm - /// - [TestClass] - public class Arc4CipherTest : TestBase - { - [TestMethod] - public void Decrypt_DischargeFirstBytes_False1() - { - const string key = "Key"; - const string expectedPlainText = "Plaintext"; - var encoding = Encoding.ASCII; - var cipher = new Arc4Cipher(encoding.GetBytes(key), false); - var cipherText = new byte[] { 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3 }; - - var actualPlainText = cipher.Decrypt(cipherText); - - Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText)); - } - - [TestMethod] - public void Decrypt_DischargeFirstBytes_False2() - { - const string key = "Wiki"; - const string expectedPlainText = "pedia"; - var encoding = Encoding.ASCII; - var cipher = new Arc4Cipher(encoding.GetBytes(key), false); - var cipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 }; - - var actualPlainText = cipher.Decrypt(cipherText); - - Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText)); - } - - [TestMethod] - public void Decrypt_InputAndOffsetAndLength() - { - const string key = "Key"; - const string expectedPlainText = "Plaintext"; - var encoding = Encoding.ASCII; - var cipher = new Arc4Cipher(encoding.GetBytes(key), false); - var cipherText = new byte[] { 0x0A, 0x0f, 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3, 0x0d, 0x05 }; - - var actualPlainText = cipher.Decrypt(cipherText, 2, cipherText.Length - 4); - - Assert.AreEqual(expectedPlainText, encoding.GetString(actualPlainText)); - } - - [TestMethod] - public void Encrypt_DischargeFirstBytes_False1() - { - const string key = "Key"; - const string plainText = "Plaintext"; - var encoding = Encoding.ASCII; - var cipher = new Arc4Cipher(encoding.GetBytes(key), false); - var expectedCipherText = new byte[] { 0xBB, 0xF3, 0x16, 0xE8, 0xD9, 0x40, 0xAF, 0x0A, 0xD3 }; - - var actualCipherText = cipher.Encrypt(encoding.GetBytes(plainText)); - - Assert.IsNotNull(actualCipherText); - Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText)); - } - - [TestMethod] - public void Encrypt_DischargeFirstBytes_False2() - { - const string key = "Wiki"; - const string plainText = "pedia"; - var encoding = Encoding.ASCII; - var cipher = new Arc4Cipher(encoding.GetBytes(key), false); - var expectedCipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 }; - - var actualCipherText = cipher.Encrypt(encoding.GetBytes(plainText)); - - Assert.IsNotNull(actualCipherText); - Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText)); - } - - [TestMethod] - public void Encrypt_InputAndOffsetAndLength() - { - const string key = "Wiki"; - const string plainText = "NOpediaNO"; - var encoding = Encoding.ASCII; - var cipher = new Arc4Cipher(encoding.GetBytes(key), false); - var plainTextBytes = encoding.GetBytes(plainText); - var expectedCipherText = new byte[] { 0x10, 0X21, 0xBF, 0x04, 0x20 }; - - var actualCipherText = cipher.Encrypt(plainTextBytes, 2, plainTextBytes.Length - 4); - - Assert.IsNotNull(actualCipherText); - Assert.IsTrue(expectedCipherText.IsEqualTo(actualCipherText)); - - Assert.IsTrue(plainTextBytes.IsEqualTo(encoding.GetBytes(plainText))); - } - } -} diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs deleted file mode 100644 index 828d1c5c4..000000000 --- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/BlowfishCipherTest.cs +++ /dev/null @@ -1,33 +0,0 @@ -using System.Linq; - -using Microsoft.VisualStudio.TestTools.UnitTesting; - -using Renci.SshNet.Security.Cryptography.Ciphers; -using Renci.SshNet.Security.Cryptography.Ciphers.Modes; -using Renci.SshNet.Tests.Common; - -namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers -{ - /// - /// - /// - [TestClass] - public class BlowfishCipherTest : TestBase - { - [TestMethod] - public void Test_Cipher_Blowfish_128_CBC() - { - var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 }; - var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 }; - var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 }; - var output = new byte[] { 0x50, 0x49, 0xe0, 0xce, 0x98, 0x93, 0x8b, 0xec, 0x82, 0x7d, 0x14, 0x1b, 0x3e, 0xdc, 0xca, 0x63, 0xef, 0x36, 0x20, 0x67, 0x58, 0x63, 0x1f, 0x9c, 0xd2, 0x12, 0x6b, 0xca, 0xea, 0xd0, 0x78, 0x8b, 0x61, 0x50, 0x4f, 0xc4, 0x5b, 0x32, 0x91, 0xd6, 0x65, 0xcb, 0x74, 0xe5, 0x6e, 0xf5, 0xde, 0x14 }; - var testCipher = new BlowfishCipher(key, new CbcCipherMode(iv), null); - var r = testCipher.Encrypt(input); - - if (!r.SequenceEqual(output)) - { - Assert.Fail("Invalid encryption"); - } - } - } -} diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs deleted file mode 100644 index a01dde959..000000000 --- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/CastCipherTest.cs +++ /dev/null @@ -1,43 +0,0 @@ -using System.Linq; - -using Microsoft.VisualStudio.TestTools.UnitTesting; - -using Renci.SshNet.Security.Cryptography.Ciphers; -using Renci.SshNet.Security.Cryptography.Ciphers.Modes; -using Renci.SshNet.Tests.Common; - -namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers -{ - /// - /// Implements CAST cipher algorithm - /// - [TestClass] - public class CastCipherTest : TestBase - { - [TestMethod] - public void Encrypt_128_CBC() - { - var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 }; - var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 }; - var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 }; - var output = new byte[] { 0x32, 0xef, 0xbd, 0xac, 0xb6, 0xfd, 0x1f, 0xae, 0x1b, 0x13, 0x5f, 0x31, 0x6d, 0x38, 0xcd, 0xb0, 0xe3, 0xca, 0xe1, 0xbc, 0xf8, 0xa7, 0xc2, 0x31, 0x62, 0x14, 0x3a, 0x9a, 0xda, 0xe3, 0xf8, 0xc8, 0x70, 0x87, 0x53, 0x21, 0x5d, 0xb7, 0x94, 0xb7, 0xe8, 0xc6, 0x9d, 0x46, 0x0c, 0x6d, 0x64, 0x6d }; - var testCipher = new CastCipher(key, new CbcCipherMode(iv), null); - var r = testCipher.Encrypt(input); - - Assert.IsTrue(r.SequenceEqual(output)); - } - - [TestMethod] - public void Decrypt_128_CBC() - { - var input = new byte[] { 0x00, 0x00, 0x00, 0x2c, 0x1a, 0x05, 0x00, 0x00, 0x00, 0x0c, 0x73, 0x73, 0x68, 0x2d, 0x75, 0x73, 0x65, 0x72, 0x61, 0x75, 0x74, 0x68, 0x30, 0x9e, 0xe0, 0x9c, 0x12, 0xee, 0x3a, 0x30, 0x03, 0x52, 0x1c, 0x1a, 0xe7, 0x3e, 0x0b, 0x9a, 0xcf, 0x9a, 0x57, 0x42, 0x0b, 0x4f, 0x4a, 0x15, 0xa0, 0xf5 }; - var key = new byte[] { 0xe4, 0x94, 0xf9, 0xb1, 0x00, 0x4f, 0x16, 0x2a, 0x80, 0x11, 0xea, 0x73, 0x0d, 0xb9, 0xbf, 0x64 }; - var iv = new byte[] { 0x74, 0x8b, 0x4f, 0xe6, 0xc1, 0x29, 0xb3, 0x54, 0xec, 0x77, 0x92, 0xf3, 0x15, 0xa0, 0x41, 0xa8 }; - var output = new byte[] { 0x32, 0xef, 0xbd, 0xac, 0xb6, 0xfd, 0x1f, 0xae, 0x1b, 0x13, 0x5f, 0x31, 0x6d, 0x38, 0xcd, 0xb0, 0xe3, 0xca, 0xe1, 0xbc, 0xf8, 0xa7, 0xc2, 0x31, 0x62, 0x14, 0x3a, 0x9a, 0xda, 0xe3, 0xf8, 0xc8, 0x70, 0x87, 0x53, 0x21, 0x5d, 0xb7, 0x94, 0xb7, 0xe8, 0xc6, 0x9d, 0x46, 0x0c, 0x6d, 0x64, 0x6d }; - var testCipher = new CastCipher(key, new CbcCipherMode(iv), null); - var r = testCipher.Decrypt(output); - - Assert.IsTrue(r.SequenceEqual(input)); - } - } -} diff --git a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs b/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs deleted file mode 100644 index 80a0d9c69..000000000 --- a/test/Renci.SshNet.Tests/Classes/Security/Cryptography/Ciphers/Paddings/PKCS5PaddingTest.cs +++ /dev/null @@ -1,63 +0,0 @@ -using Microsoft.VisualStudio.TestTools.UnitTesting; - -using Renci.SshNet.Common; -using Renci.SshNet.Security.Cryptography.Ciphers.Paddings; - -namespace Renci.SshNet.Tests.Classes.Security.Cryptography.Ciphers.Paddings -{ - [TestClass] - public class PKCS5PaddingTest - { - private PKCS5Padding _padding; - - [TestInitialize] - public void SetUp() - { - _padding = new PKCS5Padding(); - } - - [TestMethod] - public void Pad_BlockSizeAndInput_LessThanBlockSize() - { - var input = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05 }; - var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x03, 0x03, 0x03 }; - - var actual = _padding.Pad(8, input); - - Assert.IsTrue(expected.IsEqualTo(actual)); - } - - [TestMethod] - public void Pad_BlockSizeAndInput_MoreThanBlockSizeButNoMultipleOfBlockSize() - { - var input = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09 }; - var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07 }; - - var actual = _padding.Pad(8, input); - - Assert.IsTrue(expected.IsEqualTo(actual)); - } - - [TestMethod] - public void Pad_BlockSizeAndInputAndOffsetAndLength_LessThanBlockSize() - { - var input = new byte[] { 0x0f, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 }; - var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x03, 0x03, 0x03 }; - - var actual = _padding.Pad(8, input, 1, input.Length - 2); - - Assert.IsTrue(expected.IsEqualTo(actual)); - } - - [TestMethod] - public void Pad_BlockSizeAndInputAndOffsetAndLength_MoreThanBlockSizeButNoMultipleOfBlockSize() - { - var input = new byte[] { 0x0f, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x10 }; - var expected = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07, 0x07 }; - - var actual = _padding.Pad(8, input, 1, input.Length - 2); - - Assert.IsTrue(expected.IsEqualTo(actual)); - } - } -}