132 lines
4.0 KiB
C
132 lines
4.0 KiB
C
|
/**
|
||
|
* \file
|
||
|
* <!--
|
||
|
* This file is part of BeRTOS.
|
||
|
*
|
||
|
* Bertos is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License as published by
|
||
|
* the Free Software Foundation; either version 2 of the License, or
|
||
|
* (at your option) any later version.
|
||
|
*
|
||
|
* This program is distributed in the hope that it will be useful,
|
||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
* GNU General Public License for more details.
|
||
|
*
|
||
|
* You should have received a copy of the GNU General Public License
|
||
|
* along with this program; if not, write to the Free Software
|
||
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
||
|
*
|
||
|
* As a special exception, you may use this file as part of a free software
|
||
|
* library without restriction. Specifically, if other files instantiate
|
||
|
* templates or use macros or inline functions from this file, or you compile
|
||
|
* this file and link it with other files to produce an executable, this
|
||
|
* file does not by itself cause the resulting executable to be covered by
|
||
|
* the GNU General Public License. This exception does not however
|
||
|
* invalidate any other reasons why the executable file might be covered by
|
||
|
* the GNU General Public License.
|
||
|
*
|
||
|
* Copyright 2006 Develer S.r.l. (http://www.develer.com/)
|
||
|
*
|
||
|
* -->
|
||
|
*
|
||
|
* \brief TEA Tiny Encription Algorith functions (implementation).
|
||
|
*
|
||
|
* \author Francesco Sacchi <batt@develer.com>
|
||
|
*
|
||
|
* The Tiny Encryption Algorithm (TEA) by David Wheeler and Roger Needham
|
||
|
* of the Cambridge Computer Laboratory
|
||
|
*
|
||
|
* Placed in the Public Domain by David Wheeler and Roger Needham.
|
||
|
*
|
||
|
* **** ANSI C VERSION ****
|
||
|
*
|
||
|
* Notes:
|
||
|
*
|
||
|
* TEA is a Feistel cipher with XOR and and addition as the non-linear
|
||
|
* mixing functions.
|
||
|
*
|
||
|
* Takes 64 bits of data in v[0] and v[1]. Returns 64 bits of data in w[0]
|
||
|
* and w[1]. Takes 128 bits of key in k[0] - k[3].
|
||
|
*
|
||
|
* TEA can be operated in any of the modes of DES. Cipher Block Chaining is,
|
||
|
* for example, simple to implement.
|
||
|
*
|
||
|
* n is the number of iterations. 32 is ample, 16 is sufficient, as few
|
||
|
* as eight may be OK. The algorithm achieves good dispersion after six
|
||
|
* iterations. The iteration count can be made variable if required.
|
||
|
*
|
||
|
* Note this is optimised for 32-bit CPUs with fast shift capabilities. It
|
||
|
* can very easily be ported to assembly language on most CPUs.
|
||
|
*
|
||
|
* delta is chosen to be the real part of (the golden ratio Sqrt(5/4) -
|
||
|
* 1/2 ~ 0.618034 multiplied by 2^32).
|
||
|
*/
|
||
|
|
||
|
#include "tea.h"
|
||
|
#include <cpu/byteorder.h>
|
||
|
|
||
|
static uint32_t tea_func(uint32_t *in, uint32_t *sum, uint32_t *k)
|
||
|
{
|
||
|
return ((*in << 4) + cpu_to_le32(k[0])) ^ (*in + *sum) ^ ((*in >> 5) + cpu_to_le32(k[1]));
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* \brief TEA encryption function.
|
||
|
* This function encrypts <EM>v</EM> with <EM>k</EM> and returns the
|
||
|
* encrypted data in <EM>v</EM>.
|
||
|
* \param _v Array of two long values containing the data block.
|
||
|
* \param _k Array of four long values containing the key.
|
||
|
*/
|
||
|
void tea_enc(void *_v, void *_k)
|
||
|
{
|
||
|
uint32_t y, z;
|
||
|
uint32_t sum = 0;
|
||
|
uint8_t n = ROUNDS;
|
||
|
uint32_t *v = (uint32_t *)_v;
|
||
|
uint32_t *k = (uint32_t *)_k;
|
||
|
|
||
|
y=cpu_to_le32(v[0]);
|
||
|
z=cpu_to_le32(v[1]);
|
||
|
|
||
|
while(n-- > 0)
|
||
|
{
|
||
|
sum += DELTA;
|
||
|
y += tea_func(&z, &sum, &(k[0]));
|
||
|
z += tea_func(&y, &sum, &(k[2]));
|
||
|
}
|
||
|
|
||
|
v[0] = le32_to_cpu(y);
|
||
|
v[1] = le32_to_cpu(z);
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* \brief TEA decryption function.
|
||
|
* This function decrypts <EM>v</EM> with <EM>k</EM> and returns the
|
||
|
* decrypted data in <EM>v</EM>.
|
||
|
* \param _v Array of two long values containing the data block.
|
||
|
* \param _k Array of four long values containing the key.
|
||
|
*/
|
||
|
void tea_dec(void *_v, void *_k)
|
||
|
{
|
||
|
uint32_t y, z;
|
||
|
uint32_t sum = DELTA * ROUNDS;
|
||
|
uint8_t n = ROUNDS;
|
||
|
uint32_t *v = (uint32_t *)_v;
|
||
|
uint32_t *k = (uint32_t *)_k;
|
||
|
|
||
|
y = cpu_to_le32(v[0]);
|
||
|
z = cpu_to_le32(v[1]);
|
||
|
|
||
|
while(n-- > 0)
|
||
|
{
|
||
|
z -= tea_func(&y, &sum, &(k[2]));
|
||
|
y -= tea_func(&z, &sum, &(k[0]));
|
||
|
sum -= DELTA;
|
||
|
}
|
||
|
|
||
|
v[0] = le32_to_cpu(y);
|
||
|
v[1] = le32_to_cpu(z);
|
||
|
}
|
||
|
|