|
|
@@ -1,4 +1,5 @@
|
|
|
using System;
|
|
|
+using Renci.SshNet.Common;
|
|
|
|
|
|
namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
{
|
|
|
@@ -13,44 +14,45 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
|
|
|
#region Static tables
|
|
|
|
|
|
- private static readonly short[] bytebit = {128, 64, 32, 16, 8, 4, 2, 1};
|
|
|
+ private static readonly short[] Bytebit = {128, 64, 32, 16, 8, 4, 2, 1};
|
|
|
|
|
|
- private static readonly int[] bigbyte =
|
|
|
+ private static readonly int[] Bigbyte =
|
|
|
{
|
|
|
- 0x800000, 0x400000, 0x200000, 0x100000,
|
|
|
- 0x80000, 0x40000, 0x20000, 0x10000,
|
|
|
- 0x8000, 0x4000, 0x2000, 0x1000,
|
|
|
- 0x800, 0x400, 0x200, 0x100,
|
|
|
- 0x80, 0x40, 0x20, 0x10,
|
|
|
- 0x8, 0x4, 0x2, 0x1
|
|
|
+ 0x800000, 0x400000, 0x200000, 0x100000,
|
|
|
+ 0x080000, 0x040000, 0x020000, 0x010000,
|
|
|
+ 0x008000, 0x004000, 0x002000, 0x001000,
|
|
|
+ 0x000800, 0x000400, 0x000200, 0x000100,
|
|
|
+ 0x000080, 0x000040, 0x000020, 0x000010,
|
|
|
+ 0x000008, 0x000004, 0x000002, 0x000001
|
|
|
};
|
|
|
|
|
|
/*
|
|
|
* Use the key schedule specified in the Standard (ANSI X3.92-1981).
|
|
|
*/
|
|
|
- private static readonly byte[] pc1 =
|
|
|
+
|
|
|
+ private static readonly byte[] Pc1 =
|
|
|
{
|
|
|
- 56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17,
|
|
|
- 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35,
|
|
|
- 62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21,
|
|
|
- 13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3
|
|
|
+ 56, 48, 40, 32, 24, 16, 8, 0, 57, 49, 41, 33, 25, 17,
|
|
|
+ 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43, 35,
|
|
|
+ 62, 54, 46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21,
|
|
|
+ 13, 5, 60, 52, 44, 36, 28, 20, 12, 4, 27, 19, 11, 3
|
|
|
};
|
|
|
|
|
|
- private static readonly byte[] totrot =
|
|
|
+ private static readonly byte[] Totrot =
|
|
|
{
|
|
|
1, 2, 4, 6, 8, 10, 12, 14,
|
|
|
15, 17, 19, 21, 23, 25, 27, 28
|
|
|
};
|
|
|
|
|
|
- private static readonly byte[] pc2 =
|
|
|
+ private static readonly byte[] Pc2 =
|
|
|
{
|
|
|
- 13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9,
|
|
|
- 22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1,
|
|
|
+ 13, 16, 10, 23, 0, 4, 2, 27, 14, 5, 20, 9,
|
|
|
+ 22, 18, 11, 3, 25, 7, 15, 6, 26, 19, 12, 1,
|
|
|
40, 51, 30, 36, 46, 54, 29, 39, 50, 44, 32, 47,
|
|
|
43, 48, 38, 55, 33, 52, 45, 41, 49, 35, 28, 31
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP1 =
|
|
|
+ private static readonly uint[] Sp1 =
|
|
|
{
|
|
|
0x01010400, 0x00000000, 0x00010000, 0x01010404,
|
|
|
0x01010004, 0x00010404, 0x00000004, 0x00010000,
|
|
|
@@ -70,7 +72,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
0x00010004, 0x00010400, 0x00000000, 0x01010004
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP2 =
|
|
|
+ private static readonly uint[] Sp2 =
|
|
|
{
|
|
|
0x80108020, 0x80008000, 0x00008000, 0x00108020,
|
|
|
0x00100000, 0x00000020, 0x80100020, 0x80008020,
|
|
|
@@ -90,7 +92,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
0x80000000, 0x80100020, 0x80108020, 0x00108000
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP3 =
|
|
|
+ private static readonly uint[] Sp3 =
|
|
|
{
|
|
|
0x00000208, 0x08020200, 0x00000000, 0x08020008,
|
|
|
0x08000200, 0x00000000, 0x00020208, 0x08000200,
|
|
|
@@ -110,7 +112,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
0x00020208, 0x00000008, 0x08020008, 0x00020200
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP4 =
|
|
|
+ private static readonly uint[] Sp4 =
|
|
|
{
|
|
|
0x00802001, 0x00002081, 0x00002081, 0x00000080,
|
|
|
0x00802080, 0x00800081, 0x00800001, 0x00002001,
|
|
|
@@ -130,7 +132,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
0x00000080, 0x00800000, 0x00002000, 0x00802080
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP5 =
|
|
|
+ private static readonly uint[] Sp5 =
|
|
|
{
|
|
|
0x00000100, 0x02080100, 0x02080000, 0x42000100,
|
|
|
0x00080000, 0x00000100, 0x40000000, 0x02080000,
|
|
|
@@ -150,7 +152,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
0x00000000, 0x40080000, 0x02080100, 0x40000100
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP6 =
|
|
|
+ private static readonly uint[] Sp6 =
|
|
|
{
|
|
|
0x20000010, 0x20400000, 0x00004000, 0x20404010,
|
|
|
0x20400000, 0x00000010, 0x20404010, 0x00400000,
|
|
|
@@ -170,7 +172,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
0x20404000, 0x20000000, 0x00400010, 0x20004010
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP7 =
|
|
|
+ private static readonly uint[] Sp7 =
|
|
|
{
|
|
|
0x00200000, 0x04200002, 0x04000802, 0x00000000,
|
|
|
0x00000800, 0x04000802, 0x00200802, 0x04200800,
|
|
|
@@ -190,7 +192,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
0x04000002, 0x04000800, 0x00000800, 0x00200002
|
|
|
};
|
|
|
|
|
|
- private static readonly uint[] SP8 =
|
|
|
+ private static readonly uint[] Sp8 =
|
|
|
{
|
|
|
0x10001040, 0x00001000, 0x00040000, 0x10041040,
|
|
|
0x10000000, 0x10001040, 0x00000040, 0x10000000,
|
|
|
@@ -298,9 +300,9 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
|
|
|
for (int j = 0; j < 56; j++)
|
|
|
{
|
|
|
- int l = pc1[j];
|
|
|
+ int l = Pc1[j];
|
|
|
|
|
|
- pc1m[j] = ((key[(uint)l >> 3] & bytebit[l & 07]) != 0);
|
|
|
+ pc1m[j] = ((key[(uint)l >> 3] & Bytebit[l & 07]) != 0);
|
|
|
}
|
|
|
|
|
|
for (int i = 0; i < 16; i++)
|
|
|
@@ -321,7 +323,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
|
|
|
for (int j = 0; j < 28; j++)
|
|
|
{
|
|
|
- l = j + totrot[i];
|
|
|
+ l = j + Totrot[i];
|
|
|
if (l < 28)
|
|
|
{
|
|
|
pcr[j] = pc1m[l];
|
|
|
@@ -334,7 +336,7 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
|
|
|
for (int j = 28; j < 56; j++)
|
|
|
{
|
|
|
- l = j + totrot[i];
|
|
|
+ l = j + Totrot[i];
|
|
|
if (l < 56)
|
|
|
{
|
|
|
pcr[j] = pc1m[l];
|
|
|
@@ -347,14 +349,14 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
|
|
|
for (int j = 0; j < 24; j++)
|
|
|
{
|
|
|
- if (pcr[pc2[j]])
|
|
|
+ if (pcr[Pc2[j]])
|
|
|
{
|
|
|
- newKey[m] |= bigbyte[j];
|
|
|
+ newKey[m] |= Bigbyte[j];
|
|
|
}
|
|
|
|
|
|
- if (pcr[pc2[j + 24]])
|
|
|
+ if (pcr[Pc2[j + 24]])
|
|
|
{
|
|
|
- newKey[n] |= bigbyte[j];
|
|
|
+ newKey[n] |= Bigbyte[j];
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
@@ -367,15 +369,15 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
var i1 = newKey[i];
|
|
|
var i2 = newKey[i + 1];
|
|
|
|
|
|
- newKey[i] = (int)((uint)((i1 & 0x00fc0000) << 6) |
|
|
|
- (uint)((i1 & 0x00000fc0) << 10) |
|
|
|
- ((uint)(i2 & 0x00fc0000) >> 10) |
|
|
|
- ((uint)(i2 & 0x00000fc0) >> 6));
|
|
|
+ newKey[i] = (int) ((uint) ((i1 & 0x00fc0000) << 6) |
|
|
|
+ (uint) ((i1 & 0x00000fc0) << 10) |
|
|
|
+ ((uint) (i2 & 0x00fc0000) >> 10) |
|
|
|
+ ((uint) (i2 & 0x00000fc0) >> 6));
|
|
|
|
|
|
- newKey[i + 1] = (int)((uint)((i1 & 0x0003f000) << 12) |
|
|
|
- (uint)((i1 & 0x0000003f) << 16) |
|
|
|
- ((uint)(i2 & 0x0003f000) >> 4) |
|
|
|
- (uint)(i2 & 0x0000003f));
|
|
|
+ newKey[i + 1] = (int) ((uint) ((i1 & 0x0003f000) << 12) |
|
|
|
+ (uint) ((i1 & 0x0000003f) << 16) |
|
|
|
+ ((uint) (i2 & 0x0003f000) >> 4) |
|
|
|
+ (uint) (i2 & 0x0000003f));
|
|
|
}
|
|
|
|
|
|
return newKey;
|
|
|
@@ -402,8 +404,8 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
/// <param name="outOff">The out off.</param>
|
|
|
protected static void DesFunc(int[] wKey, byte[] input, int inOff, byte[] outBytes, int outOff)
|
|
|
{
|
|
|
- uint left = BigEndianToUInt32(input, inOff);
|
|
|
- uint right = BigEndianToUInt32(input, inOff + 4);
|
|
|
+ var left = Pack.BigEndianToUInt32(input, inOff);
|
|
|
+ var right = Pack.BigEndianToUInt32(input, inOff + 4);
|
|
|
|
|
|
var work = ((left >> 4) ^ right) & 0x0f0f0f0f;
|
|
|
right ^= work;
|
|
|
@@ -423,31 +425,31 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
right ^= work;
|
|
|
left = (left << 1) | (left >> 31);
|
|
|
|
|
|
- for (int round = 0; round < 8; round++)
|
|
|
+ for (var round = 0; round < 8; round++)
|
|
|
{
|
|
|
work = (right << 28) | (right >> 4);
|
|
|
work ^= (uint)wKey[round * 4 + 0];
|
|
|
- var fval = SP7[work & 0x3f];
|
|
|
- fval |= SP5[(work >> 8) & 0x3f];
|
|
|
- fval |= SP3[(work >> 16) & 0x3f];
|
|
|
- fval |= SP1[(work >> 24) & 0x3f];
|
|
|
- work = right ^ (uint)wKey[round * 4 + 1];
|
|
|
- fval |= SP8[work & 0x3f];
|
|
|
- fval |= SP6[(work >> 8) & 0x3f];
|
|
|
- fval |= SP4[(work >> 16) & 0x3f];
|
|
|
- fval |= SP2[(work >> 24) & 0x3f];
|
|
|
+ var fval = Sp7[work & 0x3f];
|
|
|
+ fval |= Sp5[(work >> 8) & 0x3f];
|
|
|
+ fval |= Sp3[(work >> 16) & 0x3f];
|
|
|
+ fval |= Sp1[(work >> 24) & 0x3f];
|
|
|
+ work = right ^ (uint) wKey[round * 4 + 1];
|
|
|
+ fval |= Sp8[work & 0x3f];
|
|
|
+ fval |= Sp6[(work >> 8) & 0x3f];
|
|
|
+ fval |= Sp4[(work >> 16) & 0x3f];
|
|
|
+ fval |= Sp2[(work >> 24) & 0x3f];
|
|
|
left ^= fval;
|
|
|
work = (left << 28) | (left >> 4);
|
|
|
work ^= (uint)wKey[round * 4 + 2];
|
|
|
- fval = SP7[work & 0x3f];
|
|
|
- fval |= SP5[(work >> 8) & 0x3f];
|
|
|
- fval |= SP3[(work >> 16) & 0x3f];
|
|
|
- fval |= SP1[(work >> 24) & 0x3f];
|
|
|
+ fval = Sp7[work & 0x3f];
|
|
|
+ fval |= Sp5[(work >> 8) & 0x3f];
|
|
|
+ fval |= Sp3[(work >> 16) & 0x3f];
|
|
|
+ fval |= Sp1[(work >> 24) & 0x3f];
|
|
|
work = left ^ (uint)wKey[round * 4 + 3];
|
|
|
- fval |= SP8[work & 0x3f];
|
|
|
- fval |= SP6[(work >> 8) & 0x3f];
|
|
|
- fval |= SP4[(work >> 16) & 0x3f];
|
|
|
- fval |= SP2[(work >> 24) & 0x3f];
|
|
|
+ fval |= Sp8[work & 0x3f];
|
|
|
+ fval |= Sp6[(work >> 8) & 0x3f];
|
|
|
+ fval |= Sp4[(work >> 16) & 0x3f];
|
|
|
+ fval |= Sp2[(work >> 24) & 0x3f];
|
|
|
right ^= fval;
|
|
|
}
|
|
|
|
|
|
@@ -469,8 +471,8 @@ namespace Renci.SshNet.Security.Cryptography.Ciphers
|
|
|
left ^= work;
|
|
|
right ^= (work << 4);
|
|
|
|
|
|
- UInt32ToBigEndian(right, outBytes, outOff);
|
|
|
- UInt32ToBigEndian(left, outBytes, outOff + 4);
|
|
|
+ Pack.UInt32ToBigEndian(right, outBytes, outOff);
|
|
|
+ Pack.UInt32ToBigEndian(left, outBytes, outOff + 4);
|
|
|
}
|
|
|
}
|
|
|
}
|