2005-06-05 20:52:14 +00:00
|
|
|
/*
|
2006-03-07 05:26:33 +00:00
|
|
|
* RC4 stream cipher
|
2007-07-11 15:48:36 +00:00
|
|
|
* Copyright (c) 2002-2005, Jouni Malinen <j@w1.fi>
|
2005-06-05 20:52:14 +00:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
|
|
* license.
|
|
|
|
*
|
|
|
|
* See README and COPYING for more details.
|
|
|
|
*/
|
|
|
|
|
2007-07-11 15:48:36 +00:00
|
|
|
#include "includes.h"
|
|
|
|
|
2005-06-05 20:52:14 +00:00
|
|
|
#include "common.h"
|
|
|
|
#include "rc4.h"
|
|
|
|
|
|
|
|
#define S_SWAP(a,b) do { u8 t = S[a]; S[a] = S[b]; S[b] = t; } while(0)
|
|
|
|
|
2006-03-07 05:26:33 +00:00
|
|
|
/**
|
|
|
|
* rc4 - XOR RC4 stream to given data with skip-stream-start
|
|
|
|
* @key: RC4 key
|
|
|
|
* @keylen: RC4 key length
|
|
|
|
* @skip: number of bytes to skip from the beginning of the RC4 stream
|
|
|
|
* @data: data to be XOR'ed with RC4 stream
|
|
|
|
* @data_len: buf length
|
|
|
|
*
|
|
|
|
* Generate RC4 pseudo random stream for the given key, skip beginning of the
|
|
|
|
* stream, and XOR the end result with the data buffer to perform RC4
|
|
|
|
* encryption/decryption.
|
|
|
|
*/
|
|
|
|
void rc4_skip(const u8 *key, size_t keylen, size_t skip,
|
|
|
|
u8 *data, size_t data_len)
|
2005-06-05 20:52:14 +00:00
|
|
|
{
|
|
|
|
u32 i, j, k;
|
|
|
|
u8 S[256], *pos;
|
2007-07-11 15:48:36 +00:00
|
|
|
size_t kpos;
|
2005-06-05 20:52:14 +00:00
|
|
|
|
|
|
|
/* Setup RC4 state */
|
|
|
|
for (i = 0; i < 256; i++)
|
|
|
|
S[i] = i;
|
|
|
|
j = 0;
|
|
|
|
kpos = 0;
|
|
|
|
for (i = 0; i < 256; i++) {
|
|
|
|
j = (j + S[i] + key[kpos]) & 0xff;
|
|
|
|
kpos++;
|
|
|
|
if (kpos >= keylen)
|
|
|
|
kpos = 0;
|
|
|
|
S_SWAP(i, j);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Skip the start of the stream */
|
|
|
|
i = j = 0;
|
|
|
|
for (k = 0; k < skip; k++) {
|
|
|
|
i = (i + 1) & 0xff;
|
|
|
|
j = (j + S[i]) & 0xff;
|
|
|
|
S_SWAP(i, j);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Apply RC4 to data */
|
|
|
|
pos = data;
|
|
|
|
for (k = 0; k < data_len; k++) {
|
|
|
|
i = (i + 1) & 0xff;
|
|
|
|
j = (j + S[i]) & 0xff;
|
|
|
|
S_SWAP(i, j);
|
|
|
|
*pos++ ^= S[(S[i] + S[j]) & 0xff];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-03-07 05:26:33 +00:00
|
|
|
/**
|
|
|
|
* rc4 - XOR RC4 stream to given data
|
|
|
|
* @buf: data to be XOR'ed with RC4 stream
|
|
|
|
* @len: buf length
|
|
|
|
* @key: RC4 key
|
|
|
|
* @key_len: RC4 key length
|
|
|
|
*
|
|
|
|
* Generate RC4 pseudo random stream for the given key and XOR this with the
|
|
|
|
* data buffer to perform RC4 encryption/decryption.
|
|
|
|
*/
|
|
|
|
void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len)
|
2005-06-05 20:52:14 +00:00
|
|
|
{
|
|
|
|
rc4_skip(key, key_len, 0, buf, len);
|
|
|
|
}
|