aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp
diff options
context:
space:
mode:
authorDavid Walter Seikel2013-01-13 18:54:10 +1000
committerDavid Walter Seikel2013-01-13 18:54:10 +1000
commit959831f4ef5a3e797f576c3de08cd65032c997ad (patch)
treee7351908be5995f0b325b2ebeaa02d5a34b82583 /libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp
parentAdd info about changes to Irrlicht. (diff)
downloadSledjHamr-959831f4ef5a3e797f576c3de08cd65032c997ad.zip
SledjHamr-959831f4ef5a3e797f576c3de08cd65032c997ad.tar.gz
SledjHamr-959831f4ef5a3e797f576c3de08cd65032c997ad.tar.bz2
SledjHamr-959831f4ef5a3e797f576c3de08cd65032c997ad.tar.xz
Remove damned ancient DOS line endings from Irrlicht. Hopefully I did not go overboard.
Diffstat (limited to 'libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp')
-rw-r--r--libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp280
1 files changed, 140 insertions, 140 deletions
diff --git a/libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp b/libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp
index 4e76c77..4f3fc3e 100644
--- a/libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp
+++ b/libraries/irrlicht-1.8/source/Irrlicht/aesGladman/fileenc.cpp
@@ -1,140 +1,140 @@
1/* 1/*
2 --------------------------------------------------------------------------- 2 ---------------------------------------------------------------------------
3 Copyright (c) 2002, Dr Brian Gladman < >, Worcester, UK. 3 Copyright (c) 2002, Dr Brian Gladman < >, Worcester, UK.
4 All rights reserved. 4 All rights reserved.
5 5
6 LICENSE TERMS 6 LICENSE TERMS
7 7
8 The free distribution and use of this software in both source and binary 8 The free distribution and use of this software in both source and binary
9 form is allowed (with or without changes) provided that: 9 form is allowed (with or without changes) provided that:
10 10
11 1. distributions of this source code include the above copyright 11 1. distributions of this source code include the above copyright
12 notice, this list of conditions and the following disclaimer; 12 notice, this list of conditions and the following disclaimer;
13 13
14 2. distributions in binary form include the above copyright 14 2. distributions in binary form include the above copyright
15 notice, this list of conditions and the following disclaimer 15 notice, this list of conditions and the following disclaimer
16 in the documentation and/or other associated materials; 16 in the documentation and/or other associated materials;
17 17
18 3. the copyright holder's name is not used to endorse products 18 3. the copyright holder's name is not used to endorse products
19 built using this software without specific written permission. 19 built using this software without specific written permission.
20 20
21 ALTERNATIVELY, provided that this notice is retained in full, this product 21 ALTERNATIVELY, provided that this notice is retained in full, this product
22 may be distributed under the terms of the GNU General Public License (GPL), 22 may be distributed under the terms of the GNU General Public License (GPL),
23 in which case the provisions of the GPL apply INSTEAD OF those given above. 23 in which case the provisions of the GPL apply INSTEAD OF those given above.
24 24
25 DISCLAIMER 25 DISCLAIMER
26 26
27 This software is provided 'as is' with no explicit or implied warranties 27 This software is provided 'as is' with no explicit or implied warranties
28 in respect of its properties, including, but not limited to, correctness 28 in respect of its properties, including, but not limited to, correctness
29 and/or fitness for purpose. 29 and/or fitness for purpose.
30 ------------------------------------------------------------------------- 30 -------------------------------------------------------------------------
31 Issue Date: 26/08/2003 31 Issue Date: 26/08/2003
32 32
33 This file implements password based file encryption and authentication 33 This file implements password based file encryption and authentication
34 using AES in CTR mode, HMAC-SHA1 authentication and RFC2898 password 34 using AES in CTR mode, HMAC-SHA1 authentication and RFC2898 password
35 based key derivation. 35 based key derivation.
36 36
37*/ 37*/
38 38
39#include <memory.h> 39#include <memory.h>
40 40
41#include "fileenc.h" 41#include "fileenc.h"
42 42
43/* subroutine for data encryption/decryption */ 43/* subroutine for data encryption/decryption */
44/* this could be speeded up a lot by aligning */ 44/* this could be speeded up a lot by aligning */
45/* buffers and using 32 bit operations */ 45/* buffers and using 32 bit operations */
46 46
47static void encr_data(unsigned char data[], unsigned long d_len, fcrypt_ctx cx[1]) 47static void encr_data(unsigned char data[], unsigned long d_len, fcrypt_ctx cx[1])
48{ 48{
49 unsigned long i = 0, pos = cx->encr_pos; 49 unsigned long i = 0, pos = cx->encr_pos;
50 50
51 while(i < d_len) 51 while(i < d_len)
52 { 52 {
53 if(pos == BLOCK_SIZE) 53 if(pos == BLOCK_SIZE)
54 { unsigned int j = 0; 54 { unsigned int j = 0;
55 /* increment encryption nonce */ 55 /* increment encryption nonce */
56 while(j < 8 && !++cx->nonce[j]) 56 while(j < 8 && !++cx->nonce[j])
57 ++j; 57 ++j;
58 /* encrypt the nonce to form next xor buffer */ 58 /* encrypt the nonce to form next xor buffer */
59 aes_encrypt(cx->nonce, cx->encr_bfr, cx->encr_ctx); 59 aes_encrypt(cx->nonce, cx->encr_bfr, cx->encr_ctx);
60 pos = 0; 60 pos = 0;
61 } 61 }
62 62
63 data[i++] ^= cx->encr_bfr[pos++]; 63 data[i++] ^= cx->encr_bfr[pos++];
64 } 64 }
65 65
66 cx->encr_pos = pos; 66 cx->encr_pos = pos;
67} 67}
68 68
69int fcrypt_init( 69int fcrypt_init(
70 int mode, /* the mode to be used (input) */ 70 int mode, /* the mode to be used (input) */
71 const unsigned char pwd[], /* the user specified password (input) */ 71 const unsigned char pwd[], /* the user specified password (input) */
72 unsigned int pwd_len, /* the length of the password (input) */ 72 unsigned int pwd_len, /* the length of the password (input) */
73 const unsigned char salt[], /* the salt (input) */ 73 const unsigned char salt[], /* the salt (input) */
74#ifdef PASSWORD_VERIFIER 74#ifdef PASSWORD_VERIFIER
75 unsigned char pwd_ver[PWD_VER_LENGTH], /* 2 byte password verifier (output) */ 75 unsigned char pwd_ver[PWD_VER_LENGTH], /* 2 byte password verifier (output) */
76#endif 76#endif
77 fcrypt_ctx cx[1]) /* the file encryption context (output) */ 77 fcrypt_ctx cx[1]) /* the file encryption context (output) */
78{ 78{
79 unsigned char kbuf[2 * MAX_KEY_LENGTH + PWD_VER_LENGTH]; 79 unsigned char kbuf[2 * MAX_KEY_LENGTH + PWD_VER_LENGTH];
80 80
81 if(pwd_len > MAX_PWD_LENGTH) 81 if(pwd_len > MAX_PWD_LENGTH)
82 return PASSWORD_TOO_LONG; 82 return PASSWORD_TOO_LONG;
83 83
84 if(mode < 1 || mode > 3) 84 if(mode < 1 || mode > 3)
85 return BAD_MODE; 85 return BAD_MODE;
86 86
87 cx->mode = mode; 87 cx->mode = mode;
88 cx->pwd_len = pwd_len; 88 cx->pwd_len = pwd_len;
89 /* initialise the encryption nonce and buffer pos */ 89 /* initialise the encryption nonce and buffer pos */
90 cx->encr_pos = BLOCK_SIZE; 90 cx->encr_pos = BLOCK_SIZE;
91 91
92 /* if we need a random component in the encryption */ 92 /* if we need a random component in the encryption */
93 /* nonce, this is where it would have to be set */ 93 /* nonce, this is where it would have to be set */
94 memset(cx->nonce, 0, BLOCK_SIZE * sizeof(unsigned char)); 94 memset(cx->nonce, 0, BLOCK_SIZE * sizeof(unsigned char));
95 /* initialise for authentication */ 95 /* initialise for authentication */
96 hmac_sha_begin(cx->auth_ctx); 96 hmac_sha_begin(cx->auth_ctx);
97 97
98 /* derive the encryption and authetication keys and the password verifier */ 98 /* derive the encryption and authetication keys and the password verifier */
99 derive_key(pwd, pwd_len, salt, SALT_LENGTH(mode), KEYING_ITERATIONS, 99 derive_key(pwd, pwd_len, salt, SALT_LENGTH(mode), KEYING_ITERATIONS,
100 kbuf, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH); 100 kbuf, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH);
101 /* set the encryption key */ 101 /* set the encryption key */
102 aes_encrypt_key(kbuf, KEY_LENGTH(mode), cx->encr_ctx); 102 aes_encrypt_key(kbuf, KEY_LENGTH(mode), cx->encr_ctx);
103 /* set the authentication key */ 103 /* set the authentication key */
104 hmac_sha_key(kbuf + KEY_LENGTH(mode), KEY_LENGTH(mode), cx->auth_ctx); 104 hmac_sha_key(kbuf + KEY_LENGTH(mode), KEY_LENGTH(mode), cx->auth_ctx);
105#ifdef PASSWORD_VERIFIER 105#ifdef PASSWORD_VERIFIER
106 memcpy(pwd_ver, kbuf + 2 * KEY_LENGTH(mode), PWD_VER_LENGTH); 106 memcpy(pwd_ver, kbuf + 2 * KEY_LENGTH(mode), PWD_VER_LENGTH);
107#endif 107#endif
108 /* clear the buffer holding the derived key values */ 108 /* clear the buffer holding the derived key values */
109 memset(kbuf, 0, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH); 109 memset(kbuf, 0, 2 * KEY_LENGTH(mode) + PWD_VER_LENGTH);
110 110
111 return GOOD_RETURN; 111 return GOOD_RETURN;
112} 112}
113 113
114/* perform 'in place' encryption and authentication */ 114/* perform 'in place' encryption and authentication */
115 115
116void fcrypt_encrypt(unsigned char data[], unsigned int data_len, fcrypt_ctx cx[1]) 116void fcrypt_encrypt(unsigned char data[], unsigned int data_len, fcrypt_ctx cx[1])
117{ 117{
118 encr_data(data, data_len, cx); 118 encr_data(data, data_len, cx);
119 hmac_sha_data(data, data_len, cx->auth_ctx); 119 hmac_sha_data(data, data_len, cx->auth_ctx);
120} 120}
121 121
122/* perform 'in place' authentication and decryption */ 122/* perform 'in place' authentication and decryption */
123 123
124void fcrypt_decrypt(unsigned char data[], unsigned int data_len, fcrypt_ctx cx[1]) 124void fcrypt_decrypt(unsigned char data[], unsigned int data_len, fcrypt_ctx cx[1])
125{ 125{
126 hmac_sha_data(data, data_len, cx->auth_ctx); 126 hmac_sha_data(data, data_len, cx->auth_ctx);
127 encr_data(data, data_len, cx); 127 encr_data(data, data_len, cx);
128} 128}
129 129
130/* close encryption/decryption and return the MAC value */ 130/* close encryption/decryption and return the MAC value */
131 131
132int fcrypt_end(unsigned char mac[], fcrypt_ctx cx[1]) 132int fcrypt_end(unsigned char mac[], fcrypt_ctx cx[1])
133{ 133{
134 unsigned int res = cx->mode; 134 unsigned int res = cx->mode;
135 135
136 hmac_sha_end(mac, MAC_LENGTH(cx->mode), cx->auth_ctx); 136 hmac_sha_end(mac, MAC_LENGTH(cx->mode), cx->auth_ctx);
137 memset(cx, 0, sizeof(fcrypt_ctx)); /* clear the encryption context */ 137 memset(cx, 0, sizeof(fcrypt_ctx)); /* clear the encryption context */
138 return MAC_LENGTH(res); /* return MAC length in bytes */ 138 return MAC_LENGTH(res); /* return MAC length in bytes */
139} 139}
140 140