aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/block/rc6/rc6.cpp
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2016-07-17 11:42:53 -0400
committerJack Lloyd <[email protected]>2016-09-02 05:28:10 -0400
commit1c0bc3cc6bcbd6318d8ae33d0442ffd24302a044 (patch)
treeda27a2597938f5b5edd1bd43f4d3d0e3c978e8be /src/lib/block/rc6/rc6.cpp
parentcd9f852b46f62087dcf7940303a0fe52a009e6c7 (diff)
Remove deprecated ciphers MARS, RC2, RC5, RC6, SAFER-SK and TEA
XTEA was also deprecated but has been spared, it does seem to be somewhat common (eg, included in the Go x/crypto library)
Diffstat (limited to 'src/lib/block/rc6/rc6.cpp')
-rw-r--r--src/lib/block/rc6/rc6.cpp143
1 files changed, 0 insertions, 143 deletions
diff --git a/src/lib/block/rc6/rc6.cpp b/src/lib/block/rc6/rc6.cpp
deleted file mode 100644
index 426b86ebd..000000000
--- a/src/lib/block/rc6/rc6.cpp
+++ /dev/null
@@ -1,143 +0,0 @@
-/*
-* RC6
-* (C) 1999-2007 Jack Lloyd
-*
-* Botan is released under the Simplified BSD License (see license.txt)
-*/
-
-#include <botan/rc6.h>
-#include <botan/loadstor.h>
-
-namespace Botan {
-
-/*
-* RC6 Encryption
-*/
-void RC6::encrypt_n(const byte in[], byte out[], size_t blocks) const
- {
- for(size_t i = 0; i != blocks; ++i)
- {
- u32bit A = load_le<u32bit>(in, 0);
- u32bit B = load_le<u32bit>(in, 1);
- u32bit C = load_le<u32bit>(in, 2);
- u32bit D = load_le<u32bit>(in, 3);
-
- B += m_S[0]; D += m_S[1];
-
- for(size_t j = 0; j != 20; j += 4)
- {
- u32bit T1, T2;
-
- T1 = rotate_left(B*(2*B+1), 5);
- T2 = rotate_left(D*(2*D+1), 5);
- A = rotate_left(A ^ T1, T2 % 32) + m_S[2*j+2];
- C = rotate_left(C ^ T2, T1 % 32) + m_S[2*j+3];
-
- T1 = rotate_left(C*(2*C+1), 5);
- T2 = rotate_left(A*(2*A+1), 5);
- B = rotate_left(B ^ T1, T2 % 32) + m_S[2*j+4];
- D = rotate_left(D ^ T2, T1 % 32) + m_S[2*j+5];
-
- T1 = rotate_left(D*(2*D+1), 5);
- T2 = rotate_left(B*(2*B+1), 5);
- C = rotate_left(C ^ T1, T2 % 32) + m_S[2*j+6];
- A = rotate_left(A ^ T2, T1 % 32) + m_S[2*j+7];
-
- T1 = rotate_left(A*(2*A+1), 5);
- T2 = rotate_left(C*(2*C+1), 5);
- D = rotate_left(D ^ T1, T2 % 32) + m_S[2*j+8];
- B = rotate_left(B ^ T2, T1 % 32) + m_S[2*j+9];
- }
-
- A += m_S[42]; C += m_S[43];
-
- store_le(out, A, B, C, D);
-
- in += BLOCK_SIZE;
- out += BLOCK_SIZE;
- }
- }
-
-/*
-* RC6 Decryption
-*/
-void RC6::decrypt_n(const byte in[], byte out[], size_t blocks) const
- {
- for(size_t i = 0; i != blocks; ++i)
- {
- u32bit A = load_le<u32bit>(in, 0);
- u32bit B = load_le<u32bit>(in, 1);
- u32bit C = load_le<u32bit>(in, 2);
- u32bit D = load_le<u32bit>(in, 3);
-
- C -= m_S[43]; A -= m_S[42];
-
- for(size_t j = 0; j != 20; j += 4)
- {
- u32bit T1, T2;
-
- T1 = rotate_left(A*(2*A+1), 5);
- T2 = rotate_left(C*(2*C+1), 5);
- B = rotate_right(B - m_S[41 - 2*j], T1 % 32) ^ T2;
- D = rotate_right(D - m_S[40 - 2*j], T2 % 32) ^ T1;
-
- T1 = rotate_left(D*(2*D+1), 5);
- T2 = rotate_left(B*(2*B+1), 5);
- A = rotate_right(A - m_S[39 - 2*j], T1 % 32) ^ T2;
- C = rotate_right(C - m_S[38 - 2*j], T2 % 32) ^ T1;
-
- T1 = rotate_left(C*(2*C+1), 5);
- T2 = rotate_left(A*(2*A+1), 5);
- D = rotate_right(D - m_S[37 - 2*j], T1 % 32) ^ T2;
- B = rotate_right(B - m_S[36 - 2*j], T2 % 32) ^ T1;
-
- T1 = rotate_left(B*(2*B+1), 5);
- T2 = rotate_left(D*(2*D+1), 5);
- C = rotate_right(C - m_S[35 - 2*j], T1 % 32) ^ T2;
- A = rotate_right(A - m_S[34 - 2*j], T2 % 32) ^ T1;
- }
-
- D -= m_S[1]; B -= m_S[0];
-
- store_le(out, A, B, C, D);
-
- in += BLOCK_SIZE;
- out += BLOCK_SIZE;
- }
- }
-
-/*
-* RC6 Key Schedule
-*/
-void RC6::key_schedule(const byte key[], size_t length)
- {
- m_S.resize(44);
-
- const size_t WORD_KEYLENGTH = (((length - 1) / 4) + 1);
- const size_t MIX_ROUNDS = 3 * std::max(WORD_KEYLENGTH, m_S.size());
-
- m_S[0] = 0xB7E15163;
- for(size_t i = 1; i != m_S.size(); ++i)
- m_S[i] = m_S[i-1] + 0x9E3779B9;
-
- secure_vector<u32bit> K(8);
-
- for(s32bit i = length-1; i >= 0; --i)
- K[i/4] = (K[i/4] << 8) + key[i];
-
- u32bit A = 0, B = 0;
- for(size_t i = 0; i != MIX_ROUNDS; ++i)
- {
- A = rotate_left(m_S[i % m_S.size()] + A + B, 3);
- B = rotate_left(K[i % WORD_KEYLENGTH] + A + B, (A + B) % 32);
- m_S[i % m_S.size()] = A;
- K[i % WORD_KEYLENGTH] = B;
- }
- }
-
-void RC6::clear()
- {
- zap(m_S);
- }
-
-}