TnepresEngine.cs 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412
  1. #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
  2. #pragma warning disable
  3. using System;
  4. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities;
  5. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities;
  6. namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines
  7. {
  8. /**
  9. * Tnepres is a 128-bit 32-round block cipher with variable key lengths,
  10. * including 128, 192 and 256 bit keys conjectured to be at least as
  11. * secure as three-key triple-DES.
  12. * <p>
  13. * Tnepres is based on Serpent which was designed by Ross Anderson, Eli Biham and Lars Knudsen as a
  14. * candidate algorithm for the NIST AES Quest. Unfortunately there was an endianness issue
  15. * with test vectors in the AES submission and the resulting confusion lead to the Tnepres cipher
  16. * as well, which is a byte swapped version of Serpent.
  17. * </p>
  18. * <p>
  19. * For full details see <a href="http://www.cl.cam.ac.uk/~rja14/serpent.html">The Serpent home page</a>
  20. * </p>
  21. */
  22. public sealed class TnepresEngine
  23. : SerpentEngineBase
  24. {
  25. public override string AlgorithmName
  26. {
  27. get { return "Tnepres"; }
  28. }
  29. /**
  30. * Expand a user-supplied key material into a session key.
  31. *
  32. * @param key The user-key bytes (multiples of 4) to use.
  33. * @exception ArgumentException
  34. */
  35. internal override int[] MakeWorkingKey(byte[] key)
  36. {
  37. //
  38. // pad key to 256 bits
  39. //
  40. int[] kPad = new int[16];
  41. int off = 0;
  42. int length = 0;
  43. for (off = key.Length - 4; off > 0; off -= 4)
  44. {
  45. kPad[length++] = (int)Pack.BE_To_UInt32(key, off);
  46. }
  47. if (off == 0)
  48. {
  49. kPad[length++] = (int)Pack.BE_To_UInt32(key, 0);
  50. if (length < 8)
  51. {
  52. kPad[length] = 1;
  53. }
  54. }
  55. else
  56. {
  57. throw new ArgumentException("key must be a multiple of 4 bytes");
  58. }
  59. //
  60. // expand the padded key up to 33 x 128 bits of key material
  61. //
  62. int amount = (ROUNDS + 1) * 4;
  63. int[] w = new int[amount];
  64. //
  65. // compute w0 to w7 from w-8 to w-1
  66. //
  67. for (int i = 8; i < 16; i++)
  68. {
  69. kPad[i] = Integers.RotateLeft(kPad[i - 8] ^ kPad[i - 5] ^ kPad[i - 3] ^ kPad[i - 1] ^ PHI ^ (i - 8), 11);
  70. }
  71. Array.Copy(kPad, 8, w, 0, 8);
  72. //
  73. // compute w8 to w136
  74. //
  75. for (int i = 8; i < amount; i++)
  76. {
  77. w[i] = Integers.RotateLeft(w[i - 8] ^ w[i - 5] ^ w[i - 3] ^ w[i - 1] ^ PHI ^ i, 11);
  78. }
  79. //
  80. // create the working keys by processing w with the Sbox and IP
  81. //
  82. Sb3(w[0], w[1], w[2], w[3]);
  83. w[0] = X0; w[1] = X1; w[2] = X2; w[3] = X3;
  84. Sb2(w[4], w[5], w[6], w[7]);
  85. w[4] = X0; w[5] = X1; w[6] = X2; w[7] = X3;
  86. Sb1(w[8], w[9], w[10], w[11]);
  87. w[8] = X0; w[9] = X1; w[10] = X2; w[11] = X3;
  88. Sb0(w[12], w[13], w[14], w[15]);
  89. w[12] = X0; w[13] = X1; w[14] = X2; w[15] = X3;
  90. Sb7(w[16], w[17], w[18], w[19]);
  91. w[16] = X0; w[17] = X1; w[18] = X2; w[19] = X3;
  92. Sb6(w[20], w[21], w[22], w[23]);
  93. w[20] = X0; w[21] = X1; w[22] = X2; w[23] = X3;
  94. Sb5(w[24], w[25], w[26], w[27]);
  95. w[24] = X0; w[25] = X1; w[26] = X2; w[27] = X3;
  96. Sb4(w[28], w[29], w[30], w[31]);
  97. w[28] = X0; w[29] = X1; w[30] = X2; w[31] = X3;
  98. Sb3(w[32], w[33], w[34], w[35]);
  99. w[32] = X0; w[33] = X1; w[34] = X2; w[35] = X3;
  100. Sb2(w[36], w[37], w[38], w[39]);
  101. w[36] = X0; w[37] = X1; w[38] = X2; w[39] = X3;
  102. Sb1(w[40], w[41], w[42], w[43]);
  103. w[40] = X0; w[41] = X1; w[42] = X2; w[43] = X3;
  104. Sb0(w[44], w[45], w[46], w[47]);
  105. w[44] = X0; w[45] = X1; w[46] = X2; w[47] = X3;
  106. Sb7(w[48], w[49], w[50], w[51]);
  107. w[48] = X0; w[49] = X1; w[50] = X2; w[51] = X3;
  108. Sb6(w[52], w[53], w[54], w[55]);
  109. w[52] = X0; w[53] = X1; w[54] = X2; w[55] = X3;
  110. Sb5(w[56], w[57], w[58], w[59]);
  111. w[56] = X0; w[57] = X1; w[58] = X2; w[59] = X3;
  112. Sb4(w[60], w[61], w[62], w[63]);
  113. w[60] = X0; w[61] = X1; w[62] = X2; w[63] = X3;
  114. Sb3(w[64], w[65], w[66], w[67]);
  115. w[64] = X0; w[65] = X1; w[66] = X2; w[67] = X3;
  116. Sb2(w[68], w[69], w[70], w[71]);
  117. w[68] = X0; w[69] = X1; w[70] = X2; w[71] = X3;
  118. Sb1(w[72], w[73], w[74], w[75]);
  119. w[72] = X0; w[73] = X1; w[74] = X2; w[75] = X3;
  120. Sb0(w[76], w[77], w[78], w[79]);
  121. w[76] = X0; w[77] = X1; w[78] = X2; w[79] = X3;
  122. Sb7(w[80], w[81], w[82], w[83]);
  123. w[80] = X0; w[81] = X1; w[82] = X2; w[83] = X3;
  124. Sb6(w[84], w[85], w[86], w[87]);
  125. w[84] = X0; w[85] = X1; w[86] = X2; w[87] = X3;
  126. Sb5(w[88], w[89], w[90], w[91]);
  127. w[88] = X0; w[89] = X1; w[90] = X2; w[91] = X3;
  128. Sb4(w[92], w[93], w[94], w[95]);
  129. w[92] = X0; w[93] = X1; w[94] = X2; w[95] = X3;
  130. Sb3(w[96], w[97], w[98], w[99]);
  131. w[96] = X0; w[97] = X1; w[98] = X2; w[99] = X3;
  132. Sb2(w[100], w[101], w[102], w[103]);
  133. w[100] = X0; w[101] = X1; w[102] = X2; w[103] = X3;
  134. Sb1(w[104], w[105], w[106], w[107]);
  135. w[104] = X0; w[105] = X1; w[106] = X2; w[107] = X3;
  136. Sb0(w[108], w[109], w[110], w[111]);
  137. w[108] = X0; w[109] = X1; w[110] = X2; w[111] = X3;
  138. Sb7(w[112], w[113], w[114], w[115]);
  139. w[112] = X0; w[113] = X1; w[114] = X2; w[115] = X3;
  140. Sb6(w[116], w[117], w[118], w[119]);
  141. w[116] = X0; w[117] = X1; w[118] = X2; w[119] = X3;
  142. Sb5(w[120], w[121], w[122], w[123]);
  143. w[120] = X0; w[121] = X1; w[122] = X2; w[123] = X3;
  144. Sb4(w[124], w[125], w[126], w[127]);
  145. w[124] = X0; w[125] = X1; w[126] = X2; w[127] = X3;
  146. Sb3(w[128], w[129], w[130], w[131]);
  147. w[128] = X0; w[129] = X1; w[130] = X2; w[131] = X3;
  148. return w;
  149. }
  150. #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
  151. internal override void EncryptBlock(ReadOnlySpan<byte> input, Span<byte> output)
  152. {
  153. X3 = (int)Pack.BE_To_UInt32(input);
  154. X2 = (int)Pack.BE_To_UInt32(input[4..]);
  155. X1 = (int)Pack.BE_To_UInt32(input[8..]);
  156. X0 = (int)Pack.BE_To_UInt32(input[12..]);
  157. Sb0(wKey[0] ^ X0, wKey[1] ^ X1, wKey[2] ^ X2, wKey[3] ^ X3); LT();
  158. Sb1(wKey[4] ^ X0, wKey[5] ^ X1, wKey[6] ^ X2, wKey[7] ^ X3); LT();
  159. Sb2(wKey[8] ^ X0, wKey[9] ^ X1, wKey[10] ^ X2, wKey[11] ^ X3); LT();
  160. Sb3(wKey[12] ^ X0, wKey[13] ^ X1, wKey[14] ^ X2, wKey[15] ^ X3); LT();
  161. Sb4(wKey[16] ^ X0, wKey[17] ^ X1, wKey[18] ^ X2, wKey[19] ^ X3); LT();
  162. Sb5(wKey[20] ^ X0, wKey[21] ^ X1, wKey[22] ^ X2, wKey[23] ^ X3); LT();
  163. Sb6(wKey[24] ^ X0, wKey[25] ^ X1, wKey[26] ^ X2, wKey[27] ^ X3); LT();
  164. Sb7(wKey[28] ^ X0, wKey[29] ^ X1, wKey[30] ^ X2, wKey[31] ^ X3); LT();
  165. Sb0(wKey[32] ^ X0, wKey[33] ^ X1, wKey[34] ^ X2, wKey[35] ^ X3); LT();
  166. Sb1(wKey[36] ^ X0, wKey[37] ^ X1, wKey[38] ^ X2, wKey[39] ^ X3); LT();
  167. Sb2(wKey[40] ^ X0, wKey[41] ^ X1, wKey[42] ^ X2, wKey[43] ^ X3); LT();
  168. Sb3(wKey[44] ^ X0, wKey[45] ^ X1, wKey[46] ^ X2, wKey[47] ^ X3); LT();
  169. Sb4(wKey[48] ^ X0, wKey[49] ^ X1, wKey[50] ^ X2, wKey[51] ^ X3); LT();
  170. Sb5(wKey[52] ^ X0, wKey[53] ^ X1, wKey[54] ^ X2, wKey[55] ^ X3); LT();
  171. Sb6(wKey[56] ^ X0, wKey[57] ^ X1, wKey[58] ^ X2, wKey[59] ^ X3); LT();
  172. Sb7(wKey[60] ^ X0, wKey[61] ^ X1, wKey[62] ^ X2, wKey[63] ^ X3); LT();
  173. Sb0(wKey[64] ^ X0, wKey[65] ^ X1, wKey[66] ^ X2, wKey[67] ^ X3); LT();
  174. Sb1(wKey[68] ^ X0, wKey[69] ^ X1, wKey[70] ^ X2, wKey[71] ^ X3); LT();
  175. Sb2(wKey[72] ^ X0, wKey[73] ^ X1, wKey[74] ^ X2, wKey[75] ^ X3); LT();
  176. Sb3(wKey[76] ^ X0, wKey[77] ^ X1, wKey[78] ^ X2, wKey[79] ^ X3); LT();
  177. Sb4(wKey[80] ^ X0, wKey[81] ^ X1, wKey[82] ^ X2, wKey[83] ^ X3); LT();
  178. Sb5(wKey[84] ^ X0, wKey[85] ^ X1, wKey[86] ^ X2, wKey[87] ^ X3); LT();
  179. Sb6(wKey[88] ^ X0, wKey[89] ^ X1, wKey[90] ^ X2, wKey[91] ^ X3); LT();
  180. Sb7(wKey[92] ^ X0, wKey[93] ^ X1, wKey[94] ^ X2, wKey[95] ^ X3); LT();
  181. Sb0(wKey[96] ^ X0, wKey[97] ^ X1, wKey[98] ^ X2, wKey[99] ^ X3); LT();
  182. Sb1(wKey[100] ^ X0, wKey[101] ^ X1, wKey[102] ^ X2, wKey[103] ^ X3); LT();
  183. Sb2(wKey[104] ^ X0, wKey[105] ^ X1, wKey[106] ^ X2, wKey[107] ^ X3); LT();
  184. Sb3(wKey[108] ^ X0, wKey[109] ^ X1, wKey[110] ^ X2, wKey[111] ^ X3); LT();
  185. Sb4(wKey[112] ^ X0, wKey[113] ^ X1, wKey[114] ^ X2, wKey[115] ^ X3); LT();
  186. Sb5(wKey[116] ^ X0, wKey[117] ^ X1, wKey[118] ^ X2, wKey[119] ^ X3); LT();
  187. Sb6(wKey[120] ^ X0, wKey[121] ^ X1, wKey[122] ^ X2, wKey[123] ^ X3); LT();
  188. Sb7(wKey[124] ^ X0, wKey[125] ^ X1, wKey[126] ^ X2, wKey[127] ^ X3);
  189. Pack.UInt32_To_BE((uint)(wKey[131] ^ X3), output);
  190. Pack.UInt32_To_BE((uint)(wKey[130] ^ X2), output[4..]);
  191. Pack.UInt32_To_BE((uint)(wKey[129] ^ X1), output[8..]);
  192. Pack.UInt32_To_BE((uint)(wKey[128] ^ X0), output[12..]);
  193. }
  194. internal override void DecryptBlock(ReadOnlySpan<byte> input, Span<byte> output)
  195. {
  196. X3 = wKey[131] ^ (int)Pack.BE_To_UInt32(input);
  197. X2 = wKey[130] ^ (int)Pack.BE_To_UInt32(input[4..]);
  198. X1 = wKey[129] ^ (int)Pack.BE_To_UInt32(input[8..]);
  199. X0 = wKey[128] ^ (int)Pack.BE_To_UInt32(input[12..]);
  200. Ib7(X0, X1, X2, X3);
  201. X0 ^= wKey[124]; X1 ^= wKey[125]; X2 ^= wKey[126]; X3 ^= wKey[127];
  202. InverseLT(); Ib6(X0, X1, X2, X3);
  203. X0 ^= wKey[120]; X1 ^= wKey[121]; X2 ^= wKey[122]; X3 ^= wKey[123];
  204. InverseLT(); Ib5(X0, X1, X2, X3);
  205. X0 ^= wKey[116]; X1 ^= wKey[117]; X2 ^= wKey[118]; X3 ^= wKey[119];
  206. InverseLT(); Ib4(X0, X1, X2, X3);
  207. X0 ^= wKey[112]; X1 ^= wKey[113]; X2 ^= wKey[114]; X3 ^= wKey[115];
  208. InverseLT(); Ib3(X0, X1, X2, X3);
  209. X0 ^= wKey[108]; X1 ^= wKey[109]; X2 ^= wKey[110]; X3 ^= wKey[111];
  210. InverseLT(); Ib2(X0, X1, X2, X3);
  211. X0 ^= wKey[104]; X1 ^= wKey[105]; X2 ^= wKey[106]; X3 ^= wKey[107];
  212. InverseLT(); Ib1(X0, X1, X2, X3);
  213. X0 ^= wKey[100]; X1 ^= wKey[101]; X2 ^= wKey[102]; X3 ^= wKey[103];
  214. InverseLT(); Ib0(X0, X1, X2, X3);
  215. X0 ^= wKey[96]; X1 ^= wKey[97]; X2 ^= wKey[98]; X3 ^= wKey[99];
  216. InverseLT(); Ib7(X0, X1, X2, X3);
  217. X0 ^= wKey[92]; X1 ^= wKey[93]; X2 ^= wKey[94]; X3 ^= wKey[95];
  218. InverseLT(); Ib6(X0, X1, X2, X3);
  219. X0 ^= wKey[88]; X1 ^= wKey[89]; X2 ^= wKey[90]; X3 ^= wKey[91];
  220. InverseLT(); Ib5(X0, X1, X2, X3);
  221. X0 ^= wKey[84]; X1 ^= wKey[85]; X2 ^= wKey[86]; X3 ^= wKey[87];
  222. InverseLT(); Ib4(X0, X1, X2, X3);
  223. X0 ^= wKey[80]; X1 ^= wKey[81]; X2 ^= wKey[82]; X3 ^= wKey[83];
  224. InverseLT(); Ib3(X0, X1, X2, X3);
  225. X0 ^= wKey[76]; X1 ^= wKey[77]; X2 ^= wKey[78]; X3 ^= wKey[79];
  226. InverseLT(); Ib2(X0, X1, X2, X3);
  227. X0 ^= wKey[72]; X1 ^= wKey[73]; X2 ^= wKey[74]; X3 ^= wKey[75];
  228. InverseLT(); Ib1(X0, X1, X2, X3);
  229. X0 ^= wKey[68]; X1 ^= wKey[69]; X2 ^= wKey[70]; X3 ^= wKey[71];
  230. InverseLT(); Ib0(X0, X1, X2, X3);
  231. X0 ^= wKey[64]; X1 ^= wKey[65]; X2 ^= wKey[66]; X3 ^= wKey[67];
  232. InverseLT(); Ib7(X0, X1, X2, X3);
  233. X0 ^= wKey[60]; X1 ^= wKey[61]; X2 ^= wKey[62]; X3 ^= wKey[63];
  234. InverseLT(); Ib6(X0, X1, X2, X3);
  235. X0 ^= wKey[56]; X1 ^= wKey[57]; X2 ^= wKey[58]; X3 ^= wKey[59];
  236. InverseLT(); Ib5(X0, X1, X2, X3);
  237. X0 ^= wKey[52]; X1 ^= wKey[53]; X2 ^= wKey[54]; X3 ^= wKey[55];
  238. InverseLT(); Ib4(X0, X1, X2, X3);
  239. X0 ^= wKey[48]; X1 ^= wKey[49]; X2 ^= wKey[50]; X3 ^= wKey[51];
  240. InverseLT(); Ib3(X0, X1, X2, X3);
  241. X0 ^= wKey[44]; X1 ^= wKey[45]; X2 ^= wKey[46]; X3 ^= wKey[47];
  242. InverseLT(); Ib2(X0, X1, X2, X3);
  243. X0 ^= wKey[40]; X1 ^= wKey[41]; X2 ^= wKey[42]; X3 ^= wKey[43];
  244. InverseLT(); Ib1(X0, X1, X2, X3);
  245. X0 ^= wKey[36]; X1 ^= wKey[37]; X2 ^= wKey[38]; X3 ^= wKey[39];
  246. InverseLT(); Ib0(X0, X1, X2, X3);
  247. X0 ^= wKey[32]; X1 ^= wKey[33]; X2 ^= wKey[34]; X3 ^= wKey[35];
  248. InverseLT(); Ib7(X0, X1, X2, X3);
  249. X0 ^= wKey[28]; X1 ^= wKey[29]; X2 ^= wKey[30]; X3 ^= wKey[31];
  250. InverseLT(); Ib6(X0, X1, X2, X3);
  251. X0 ^= wKey[24]; X1 ^= wKey[25]; X2 ^= wKey[26]; X3 ^= wKey[27];
  252. InverseLT(); Ib5(X0, X1, X2, X3);
  253. X0 ^= wKey[20]; X1 ^= wKey[21]; X2 ^= wKey[22]; X3 ^= wKey[23];
  254. InverseLT(); Ib4(X0, X1, X2, X3);
  255. X0 ^= wKey[16]; X1 ^= wKey[17]; X2 ^= wKey[18]; X3 ^= wKey[19];
  256. InverseLT(); Ib3(X0, X1, X2, X3);
  257. X0 ^= wKey[12]; X1 ^= wKey[13]; X2 ^= wKey[14]; X3 ^= wKey[15];
  258. InverseLT(); Ib2(X0, X1, X2, X3);
  259. X0 ^= wKey[8]; X1 ^= wKey[9]; X2 ^= wKey[10]; X3 ^= wKey[11];
  260. InverseLT(); Ib1(X0, X1, X2, X3);
  261. X0 ^= wKey[4]; X1 ^= wKey[5]; X2 ^= wKey[6]; X3 ^= wKey[7];
  262. InverseLT(); Ib0(X0, X1, X2, X3);
  263. Pack.UInt32_To_BE((uint)(X3 ^ wKey[3]), output);
  264. Pack.UInt32_To_BE((uint)(X2 ^ wKey[2]), output[4..]);
  265. Pack.UInt32_To_BE((uint)(X1 ^ wKey[1]), output[8..]);
  266. Pack.UInt32_To_BE((uint)(X0 ^ wKey[0]), output[12..]);
  267. }
  268. #else
  269. internal override void EncryptBlock(byte[] input, int inOff, byte[] output, int outOff)
  270. {
  271. X3 = (int)Pack.BE_To_UInt32(input, inOff);
  272. X2 = (int)Pack.BE_To_UInt32(input, inOff + 4);
  273. X1 = (int)Pack.BE_To_UInt32(input, inOff + 8);
  274. X0 = (int)Pack.BE_To_UInt32(input, inOff + 12);
  275. Sb0(wKey[0] ^ X0, wKey[1] ^ X1, wKey[2] ^ X2, wKey[3] ^ X3); LT();
  276. Sb1(wKey[4] ^ X0, wKey[5] ^ X1, wKey[6] ^ X2, wKey[7] ^ X3); LT();
  277. Sb2(wKey[8] ^ X0, wKey[9] ^ X1, wKey[10] ^ X2, wKey[11] ^ X3); LT();
  278. Sb3(wKey[12] ^ X0, wKey[13] ^ X1, wKey[14] ^ X2, wKey[15] ^ X3); LT();
  279. Sb4(wKey[16] ^ X0, wKey[17] ^ X1, wKey[18] ^ X2, wKey[19] ^ X3); LT();
  280. Sb5(wKey[20] ^ X0, wKey[21] ^ X1, wKey[22] ^ X2, wKey[23] ^ X3); LT();
  281. Sb6(wKey[24] ^ X0, wKey[25] ^ X1, wKey[26] ^ X2, wKey[27] ^ X3); LT();
  282. Sb7(wKey[28] ^ X0, wKey[29] ^ X1, wKey[30] ^ X2, wKey[31] ^ X3); LT();
  283. Sb0(wKey[32] ^ X0, wKey[33] ^ X1, wKey[34] ^ X2, wKey[35] ^ X3); LT();
  284. Sb1(wKey[36] ^ X0, wKey[37] ^ X1, wKey[38] ^ X2, wKey[39] ^ X3); LT();
  285. Sb2(wKey[40] ^ X0, wKey[41] ^ X1, wKey[42] ^ X2, wKey[43] ^ X3); LT();
  286. Sb3(wKey[44] ^ X0, wKey[45] ^ X1, wKey[46] ^ X2, wKey[47] ^ X3); LT();
  287. Sb4(wKey[48] ^ X0, wKey[49] ^ X1, wKey[50] ^ X2, wKey[51] ^ X3); LT();
  288. Sb5(wKey[52] ^ X0, wKey[53] ^ X1, wKey[54] ^ X2, wKey[55] ^ X3); LT();
  289. Sb6(wKey[56] ^ X0, wKey[57] ^ X1, wKey[58] ^ X2, wKey[59] ^ X3); LT();
  290. Sb7(wKey[60] ^ X0, wKey[61] ^ X1, wKey[62] ^ X2, wKey[63] ^ X3); LT();
  291. Sb0(wKey[64] ^ X0, wKey[65] ^ X1, wKey[66] ^ X2, wKey[67] ^ X3); LT();
  292. Sb1(wKey[68] ^ X0, wKey[69] ^ X1, wKey[70] ^ X2, wKey[71] ^ X3); LT();
  293. Sb2(wKey[72] ^ X0, wKey[73] ^ X1, wKey[74] ^ X2, wKey[75] ^ X3); LT();
  294. Sb3(wKey[76] ^ X0, wKey[77] ^ X1, wKey[78] ^ X2, wKey[79] ^ X3); LT();
  295. Sb4(wKey[80] ^ X0, wKey[81] ^ X1, wKey[82] ^ X2, wKey[83] ^ X3); LT();
  296. Sb5(wKey[84] ^ X0, wKey[85] ^ X1, wKey[86] ^ X2, wKey[87] ^ X3); LT();
  297. Sb6(wKey[88] ^ X0, wKey[89] ^ X1, wKey[90] ^ X2, wKey[91] ^ X3); LT();
  298. Sb7(wKey[92] ^ X0, wKey[93] ^ X1, wKey[94] ^ X2, wKey[95] ^ X3); LT();
  299. Sb0(wKey[96] ^ X0, wKey[97] ^ X1, wKey[98] ^ X2, wKey[99] ^ X3); LT();
  300. Sb1(wKey[100] ^ X0, wKey[101] ^ X1, wKey[102] ^ X2, wKey[103] ^ X3); LT();
  301. Sb2(wKey[104] ^ X0, wKey[105] ^ X1, wKey[106] ^ X2, wKey[107] ^ X3); LT();
  302. Sb3(wKey[108] ^ X0, wKey[109] ^ X1, wKey[110] ^ X2, wKey[111] ^ X3); LT();
  303. Sb4(wKey[112] ^ X0, wKey[113] ^ X1, wKey[114] ^ X2, wKey[115] ^ X3); LT();
  304. Sb5(wKey[116] ^ X0, wKey[117] ^ X1, wKey[118] ^ X2, wKey[119] ^ X3); LT();
  305. Sb6(wKey[120] ^ X0, wKey[121] ^ X1, wKey[122] ^ X2, wKey[123] ^ X3); LT();
  306. Sb7(wKey[124] ^ X0, wKey[125] ^ X1, wKey[126] ^ X2, wKey[127] ^ X3);
  307. Pack.UInt32_To_BE((uint)(wKey[131] ^ X3), output, outOff);
  308. Pack.UInt32_To_BE((uint)(wKey[130] ^ X2), output, outOff + 4);
  309. Pack.UInt32_To_BE((uint)(wKey[129] ^ X1), output, outOff + 8);
  310. Pack.UInt32_To_BE((uint)(wKey[128] ^ X0), output, outOff + 12);
  311. }
  312. internal override void DecryptBlock(byte[] input, int inOff, byte[] output, int outOff)
  313. {
  314. X3 = wKey[131] ^ (int)Pack.BE_To_UInt32(input, inOff);
  315. X2 = wKey[130] ^ (int)Pack.BE_To_UInt32(input, inOff + 4);
  316. X1 = wKey[129] ^ (int)Pack.BE_To_UInt32(input, inOff + 8);
  317. X0 = wKey[128] ^ (int)Pack.BE_To_UInt32(input, inOff + 12);
  318. Ib7(X0, X1, X2, X3);
  319. X0 ^= wKey[124]; X1 ^= wKey[125]; X2 ^= wKey[126]; X3 ^= wKey[127];
  320. InverseLT(); Ib6(X0, X1, X2, X3);
  321. X0 ^= wKey[120]; X1 ^= wKey[121]; X2 ^= wKey[122]; X3 ^= wKey[123];
  322. InverseLT(); Ib5(X0, X1, X2, X3);
  323. X0 ^= wKey[116]; X1 ^= wKey[117]; X2 ^= wKey[118]; X3 ^= wKey[119];
  324. InverseLT(); Ib4(X0, X1, X2, X3);
  325. X0 ^= wKey[112]; X1 ^= wKey[113]; X2 ^= wKey[114]; X3 ^= wKey[115];
  326. InverseLT(); Ib3(X0, X1, X2, X3);
  327. X0 ^= wKey[108]; X1 ^= wKey[109]; X2 ^= wKey[110]; X3 ^= wKey[111];
  328. InverseLT(); Ib2(X0, X1, X2, X3);
  329. X0 ^= wKey[104]; X1 ^= wKey[105]; X2 ^= wKey[106]; X3 ^= wKey[107];
  330. InverseLT(); Ib1(X0, X1, X2, X3);
  331. X0 ^= wKey[100]; X1 ^= wKey[101]; X2 ^= wKey[102]; X3 ^= wKey[103];
  332. InverseLT(); Ib0(X0, X1, X2, X3);
  333. X0 ^= wKey[96]; X1 ^= wKey[97]; X2 ^= wKey[98]; X3 ^= wKey[99];
  334. InverseLT(); Ib7(X0, X1, X2, X3);
  335. X0 ^= wKey[92]; X1 ^= wKey[93]; X2 ^= wKey[94]; X3 ^= wKey[95];
  336. InverseLT(); Ib6(X0, X1, X2, X3);
  337. X0 ^= wKey[88]; X1 ^= wKey[89]; X2 ^= wKey[90]; X3 ^= wKey[91];
  338. InverseLT(); Ib5(X0, X1, X2, X3);
  339. X0 ^= wKey[84]; X1 ^= wKey[85]; X2 ^= wKey[86]; X3 ^= wKey[87];
  340. InverseLT(); Ib4(X0, X1, X2, X3);
  341. X0 ^= wKey[80]; X1 ^= wKey[81]; X2 ^= wKey[82]; X3 ^= wKey[83];
  342. InverseLT(); Ib3(X0, X1, X2, X3);
  343. X0 ^= wKey[76]; X1 ^= wKey[77]; X2 ^= wKey[78]; X3 ^= wKey[79];
  344. InverseLT(); Ib2(X0, X1, X2, X3);
  345. X0 ^= wKey[72]; X1 ^= wKey[73]; X2 ^= wKey[74]; X3 ^= wKey[75];
  346. InverseLT(); Ib1(X0, X1, X2, X3);
  347. X0 ^= wKey[68]; X1 ^= wKey[69]; X2 ^= wKey[70]; X3 ^= wKey[71];
  348. InverseLT(); Ib0(X0, X1, X2, X3);
  349. X0 ^= wKey[64]; X1 ^= wKey[65]; X2 ^= wKey[66]; X3 ^= wKey[67];
  350. InverseLT(); Ib7(X0, X1, X2, X3);
  351. X0 ^= wKey[60]; X1 ^= wKey[61]; X2 ^= wKey[62]; X3 ^= wKey[63];
  352. InverseLT(); Ib6(X0, X1, X2, X3);
  353. X0 ^= wKey[56]; X1 ^= wKey[57]; X2 ^= wKey[58]; X3 ^= wKey[59];
  354. InverseLT(); Ib5(X0, X1, X2, X3);
  355. X0 ^= wKey[52]; X1 ^= wKey[53]; X2 ^= wKey[54]; X3 ^= wKey[55];
  356. InverseLT(); Ib4(X0, X1, X2, X3);
  357. X0 ^= wKey[48]; X1 ^= wKey[49]; X2 ^= wKey[50]; X3 ^= wKey[51];
  358. InverseLT(); Ib3(X0, X1, X2, X3);
  359. X0 ^= wKey[44]; X1 ^= wKey[45]; X2 ^= wKey[46]; X3 ^= wKey[47];
  360. InverseLT(); Ib2(X0, X1, X2, X3);
  361. X0 ^= wKey[40]; X1 ^= wKey[41]; X2 ^= wKey[42]; X3 ^= wKey[43];
  362. InverseLT(); Ib1(X0, X1, X2, X3);
  363. X0 ^= wKey[36]; X1 ^= wKey[37]; X2 ^= wKey[38]; X3 ^= wKey[39];
  364. InverseLT(); Ib0(X0, X1, X2, X3);
  365. X0 ^= wKey[32]; X1 ^= wKey[33]; X2 ^= wKey[34]; X3 ^= wKey[35];
  366. InverseLT(); Ib7(X0, X1, X2, X3);
  367. X0 ^= wKey[28]; X1 ^= wKey[29]; X2 ^= wKey[30]; X3 ^= wKey[31];
  368. InverseLT(); Ib6(X0, X1, X2, X3);
  369. X0 ^= wKey[24]; X1 ^= wKey[25]; X2 ^= wKey[26]; X3 ^= wKey[27];
  370. InverseLT(); Ib5(X0, X1, X2, X3);
  371. X0 ^= wKey[20]; X1 ^= wKey[21]; X2 ^= wKey[22]; X3 ^= wKey[23];
  372. InverseLT(); Ib4(X0, X1, X2, X3);
  373. X0 ^= wKey[16]; X1 ^= wKey[17]; X2 ^= wKey[18]; X3 ^= wKey[19];
  374. InverseLT(); Ib3(X0, X1, X2, X3);
  375. X0 ^= wKey[12]; X1 ^= wKey[13]; X2 ^= wKey[14]; X3 ^= wKey[15];
  376. InverseLT(); Ib2(X0, X1, X2, X3);
  377. X0 ^= wKey[8]; X1 ^= wKey[9]; X2 ^= wKey[10]; X3 ^= wKey[11];
  378. InverseLT(); Ib1(X0, X1, X2, X3);
  379. X0 ^= wKey[4]; X1 ^= wKey[5]; X2 ^= wKey[6]; X3 ^= wKey[7];
  380. InverseLT(); Ib0(X0, X1, X2, X3);
  381. Pack.UInt32_To_BE((uint)(X3 ^ wKey[3]), output, outOff);
  382. Pack.UInt32_To_BE((uint)(X2 ^ wKey[2]), output, outOff + 4);
  383. Pack.UInt32_To_BE((uint)(X1 ^ wKey[1]), output, outOff + 8);
  384. Pack.UInt32_To_BE((uint)(X0 ^ wKey[0]), output, outOff + 12);
  385. }
  386. #endif
  387. }
  388. }
  389. #pragma warning restore
  390. #endif