"Fossies" - the Fresh Open Source Software Archive 
Member "apg-2.2.3/cast/cast.c" (7 Aug 2003, 6832 Bytes) of package /linux/privat/old/apg-2.2.3.tar.gz:
As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) C and C++ source code syntax highlighting (style:
standard) with prefixed line numbers and
code folding option.
Alternatively you can here
view or
download the uninterpreted source code file.
1 /*
2 * CAST-128 in C
3 * Written by Steve Reid <sreid@sea-to-sky.net>
4 * 100% Public Domain - no warranty
5 * Released 1997.10.11
6 */
7
8 #include "cast.h"
9 #include "cast_sboxes.h"
10
11 /* Macros to access 8-bit bytes out of a 32-bit word */
12 #define U8a(x) ( (u8) (x>>24) )
13 #define U8b(x) ( (u8) ((x>>16)&255) )
14 #define U8c(x) ( (u8) ((x>>8)&255) )
15 #define U8d(x) ( (u8) ((x)&255) )
16
17 /* Circular left shift */
18 #define ROL(x, n) ( ((x)<<(n)) | ((x)>>(32-(n))) )
19
20 /* CAST-128 uses three different round functions */
21 #define F1(l, r, i) \
22 t = ROL(key->xkey[i] + r, key->xkey[i+16]); \
23 l ^= ((cast_sbox1[U8a(t)] ^ cast_sbox2[U8b(t)]) - \
24 cast_sbox3[U8c(t)]) + cast_sbox4[U8d(t)];
25 #define F2(l, r, i) \
26 t = ROL(key->xkey[i] ^ r, key->xkey[i+16]); \
27 l ^= ((cast_sbox1[U8a(t)] - cast_sbox2[U8b(t)]) + \
28 cast_sbox3[U8c(t)]) ^ cast_sbox4[U8d(t)];
29 #define F3(l, r, i) \
30 t = ROL(key->xkey[i] - r, key->xkey[i+16]); \
31 l ^= ((cast_sbox1[U8a(t)] + cast_sbox2[U8b(t)]) ^ \
32 cast_sbox3[U8c(t)]) - cast_sbox4[U8d(t)];
33
34
35 /***** Encryption Function *****/
36
37 void cast_encrypt(cast_key* key, u8* inblock, u8* outblock)
38 {
39 u32 t, l, r;
40
41 /* Get inblock into l,r */
42 l = ((u32)inblock[0] << 24) | ((u32)inblock[1] << 16) |
43 ((u32)inblock[2] << 8) | (u32)inblock[3];
44 r = ((u32)inblock[4] << 24) | ((u32)inblock[5] << 16) |
45 ((u32)inblock[6] << 8) | (u32)inblock[7];
46 /* Do the work */
47 F1(l, r, 0);
48 F2(r, l, 1);
49 F3(l, r, 2);
50 F1(r, l, 3);
51 F2(l, r, 4);
52 F3(r, l, 5);
53 F1(l, r, 6);
54 F2(r, l, 7);
55 F3(l, r, 8);
56 F1(r, l, 9);
57 F2(l, r, 10);
58 F3(r, l, 11);
59 /* Only do full 16 rounds if key length > 80 bits */
60 if (key->rounds > 12) {
61 F1(l, r, 12);
62 F2(r, l, 13);
63 F3(l, r, 14);
64 F1(r, l, 15);
65 }
66 /* Put l,r into outblock */
67 outblock[0] = U8a(r);
68 outblock[1] = U8b(r);
69 outblock[2] = U8c(r);
70 outblock[3] = U8d(r);
71 outblock[4] = U8a(l);
72 outblock[5] = U8b(l);
73 outblock[6] = U8c(l);
74 outblock[7] = U8d(l);
75 /* Wipe clean */
76 t = l = r = 0;
77 }
78
79
80 /***** Decryption Function *****/
81
82 void cast_decrypt(cast_key* key, u8* inblock, u8* outblock)
83 {
84 u32 t, l, r;
85
86 /* Get inblock into l,r */
87 r = ((u32)inblock[0] << 24) | ((u32)inblock[1] << 16) |
88 ((u32)inblock[2] << 8) | (u32)inblock[3];
89 l = ((u32)inblock[4] << 24) | ((u32)inblock[5] << 16) |
90 ((u32)inblock[6] << 8) | (u32)inblock[7];
91 /* Do the work */
92 /* Only do full 16 rounds if key length > 80 bits */
93 if (key->rounds > 12) {
94 F1(r, l, 15);
95 F3(l, r, 14);
96 F2(r, l, 13);
97 F1(l, r, 12);
98 }
99 F3(r, l, 11);
100 F2(l, r, 10);
101 F1(r, l, 9);
102 F3(l, r, 8);
103 F2(r, l, 7);
104 F1(l, r, 6);
105 F3(r, l, 5);
106 F2(l, r, 4);
107 F1(r, l, 3);
108 F3(l, r, 2);
109 F2(r, l, 1);
110 F1(l, r, 0);
111 /* Put l,r into outblock */
112 outblock[0] = U8a(l);
113 outblock[1] = U8b(l);
114 outblock[2] = U8c(l);
115 outblock[3] = U8d(l);
116 outblock[4] = U8a(r);
117 outblock[5] = U8b(r);
118 outblock[6] = U8c(r);
119 outblock[7] = U8d(r);
120 /* Wipe clean */
121 t = l = r = 0;
122 }
123
124
125 /***** Key Schedual *****/
126
127 void cast_setkey(cast_key* key, u8* rawkey, int keybytes)
128 {
129 u32 t[4], z[4], x[4];
130 int i;
131
132 /* Set number of rounds to 12 or 16, depending on key length */
133 key->rounds = (keybytes <= 10 ? 12 : 16);
134
135 /* Copy key to workspace x */
136 for (i = 0; i < 4; i++) {
137 x[i] = 0;
138 if ((i*4+0) < keybytes) x[i] = (u32)rawkey[i*4+0] << 24;
139 if ((i*4+1) < keybytes) x[i] |= (u32)rawkey[i*4+1] << 16;
140 if ((i*4+2) < keybytes) x[i] |= (u32)rawkey[i*4+2] << 8;
141 if ((i*4+3) < keybytes) x[i] |= (u32)rawkey[i*4+3];
142 }
143 /* Generate 32 subkeys, four at a time */
144 for (i = 0; i < 32; i+=4) {
145 switch (i & 4) {
146 case 0:
147 t[0] = z[0] = x[0] ^ cast_sbox5[U8b(x[3])] ^
148 cast_sbox6[U8d(x[3])] ^ cast_sbox7[U8a(x[3])] ^
149 cast_sbox8[U8c(x[3])] ^ cast_sbox7[U8a(x[2])];
150 t[1] = z[1] = x[2] ^ cast_sbox5[U8a(z[0])] ^
151 cast_sbox6[U8c(z[0])] ^ cast_sbox7[U8b(z[0])] ^
152 cast_sbox8[U8d(z[0])] ^ cast_sbox8[U8c(x[2])];
153 t[2] = z[2] = x[3] ^ cast_sbox5[U8d(z[1])] ^
154 cast_sbox6[U8c(z[1])] ^ cast_sbox7[U8b(z[1])] ^
155 cast_sbox8[U8a(z[1])] ^ cast_sbox5[U8b(x[2])];
156 t[3] = z[3] = x[1] ^ cast_sbox5[U8c(z[2])] ^
157 cast_sbox6[U8b(z[2])] ^ cast_sbox7[U8d(z[2])] ^
158 cast_sbox8[U8a(z[2])] ^ cast_sbox6[U8d(x[2])];
159 break;
160 case 4:
161 t[0] = x[0] = z[2] ^ cast_sbox5[U8b(z[1])] ^
162 cast_sbox6[U8d(z[1])] ^ cast_sbox7[U8a(z[1])] ^
163 cast_sbox8[U8c(z[1])] ^ cast_sbox7[U8a(z[0])];
164 t[1] = x[1] = z[0] ^ cast_sbox5[U8a(x[0])] ^
165 cast_sbox6[U8c(x[0])] ^ cast_sbox7[U8b(x[0])] ^
166 cast_sbox8[U8d(x[0])] ^ cast_sbox8[U8c(z[0])];
167 t[2] = x[2] = z[1] ^ cast_sbox5[U8d(x[1])] ^
168 cast_sbox6[U8c(x[1])] ^ cast_sbox7[U8b(x[1])] ^
169 cast_sbox8[U8a(x[1])] ^ cast_sbox5[U8b(z[0])];
170 t[3] = x[3] = z[3] ^ cast_sbox5[U8c(x[2])] ^
171 cast_sbox6[U8b(x[2])] ^ cast_sbox7[U8d(x[2])] ^
172 cast_sbox8[U8a(x[2])] ^ cast_sbox6[U8d(z[0])];
173 break;
174 }
175 switch (i & 12) {
176 case 0:
177 case 12:
178 key->xkey[i+0] = cast_sbox5[U8a(t[2])] ^ cast_sbox6[U8b(t[2])] ^
179 cast_sbox7[U8d(t[1])] ^ cast_sbox8[U8c(t[1])];
180 key->xkey[i+1] = cast_sbox5[U8c(t[2])] ^ cast_sbox6[U8d(t[2])] ^
181 cast_sbox7[U8b(t[1])] ^ cast_sbox8[U8a(t[1])];
182 key->xkey[i+2] = cast_sbox5[U8a(t[3])] ^ cast_sbox6[U8b(t[3])] ^
183 cast_sbox7[U8d(t[0])] ^ cast_sbox8[U8c(t[0])];
184 key->xkey[i+3] = cast_sbox5[U8c(t[3])] ^ cast_sbox6[U8d(t[3])] ^
185 cast_sbox7[U8b(t[0])] ^ cast_sbox8[U8a(t[0])];
186 break;
187 case 4:
188 case 8:
189 key->xkey[i+0] = cast_sbox5[U8d(t[0])] ^ cast_sbox6[U8c(t[0])] ^
190 cast_sbox7[U8a(t[3])] ^ cast_sbox8[U8b(t[3])];
191 key->xkey[i+1] = cast_sbox5[U8b(t[0])] ^ cast_sbox6[U8a(t[0])] ^
192 cast_sbox7[U8c(t[3])] ^ cast_sbox8[U8d(t[3])];
193 key->xkey[i+2] = cast_sbox5[U8d(t[1])] ^ cast_sbox6[U8c(t[1])] ^
194 cast_sbox7[U8a(t[2])] ^ cast_sbox8[U8b(t[2])];
195 key->xkey[i+3] = cast_sbox5[U8b(t[1])] ^ cast_sbox6[U8a(t[1])] ^
196 cast_sbox7[U8c(t[2])] ^ cast_sbox8[U8d(t[2])];
197 break;
198 }
199 switch (i & 12) {
200 case 0:
201 key->xkey[i+0] ^= cast_sbox5[U8c(z[0])];
202 key->xkey[i+1] ^= cast_sbox6[U8c(z[1])];
203 key->xkey[i+2] ^= cast_sbox7[U8b(z[2])];
204 key->xkey[i+3] ^= cast_sbox8[U8a(z[3])];
205 break;
206 case 4:
207 key->xkey[i+0] ^= cast_sbox5[U8a(x[2])];
208 key->xkey[i+1] ^= cast_sbox6[U8b(x[3])];
209 key->xkey[i+2] ^= cast_sbox7[U8d(x[0])];
210 key->xkey[i+3] ^= cast_sbox8[U8d(x[1])];
211 break;
212 case 8:
213 key->xkey[i+0] ^= cast_sbox5[U8b(z[2])];
214 key->xkey[i+1] ^= cast_sbox6[U8a(z[3])];
215 key->xkey[i+2] ^= cast_sbox7[U8c(z[0])];
216 key->xkey[i+3] ^= cast_sbox8[U8c(z[1])];
217 break;
218 case 12:
219 key->xkey[i+0] ^= cast_sbox5[U8d(x[0])];
220 key->xkey[i+1] ^= cast_sbox6[U8d(x[1])];
221 key->xkey[i+2] ^= cast_sbox7[U8a(x[2])];
222 key->xkey[i+3] ^= cast_sbox8[U8b(x[3])];
223 break;
224 }
225 if (i >= 16) {
226 key->xkey[i+0] &= 31;
227 key->xkey[i+1] &= 31;
228 key->xkey[i+2] &= 31;
229 key->xkey[i+3] &= 31;
230 }
231 }
232 /* Wipe clean */
233 for (i = 0; i < 4; i++) {
234 t[i] = x[i] = z[i] = 0;
235 }
236 }
237
238 /* Made in Canada */
239