rc4移植参考aosp(boringssl)
头文件
struct rc4_key_st {
unsigned int mode;
unsigned int x, y;
unsigned char data[256];
} /* RC4_KEY */;
typedef struct rc4_key_st rc4_key;
void rc4_set_key(rc4_key *rc4key, const uint8_t *key, unsigned len);
void rc4_crypt(rc4_key *key, const uint8_t *in,
uint8_t *out, size_t len);
rc4.c
void rc4_set_key(rc4_key *rc4key, const uint8_t *key, unsigned len) {
uint32_t tmp;
unsigned i, id1, id2;
unsigned char *d;
d = &rc4key->data[0];
rc4key->x = 0;
rc4key->y = 0;
id1 = id2 = 0;
#define SK_LOOP(d, n) \
{ \
tmp = d[(n)]; \
id2 = (key[id1] + tmp + id2) & 0xff; \
if (++id1 == len) \
id1 = 0; \
d[(n)] = d[id2]; \
d[id2] = tmp; \
}
for (i = 0; i < 256; i++) {
d[i] = i;
}
for (i = 0; i < 256; i += 4) {
SK_LOOP(d, i + 0);
SK_LOOP(d, i + 1);
SK_LOOP(d, i + 2);
SK_LOOP(d, i + 3);
}
}
void rc4_crypt(rc4_key *rc4key, const uint8_t *in,
uint8_t *out, size_t len) {
unsigned int i, j;
unsigned int si, sj;
i = rc4key->x; j = rc4key->y;
while(len--)
{
i++; i &= 0xff;
si = rc4key->data[i];
j += si; j &= 0xff;
sj = rc4key->data[i] = rc4key->data[j];
rc4key->data[j] = si;
*out++ = *in++ ^ rc4key->data[ (si + sj) & 0xff ];
}
rc4key->x = i; rc4key->y = j;
}
使用demo
uint8_t cipherKey[16] = {123, 0, 11, 0, };
const char plainStr[] = {"123xx456"};
ScopedBuffer<uint8_t, 256> buffer;
rc4_key rc4Key;
rc4_set_key(&rc4Key, cipherKey, 16);
rc4_crypt(&rc4Key, (const uint8_t *)plainStr,
buffer.buffer(), strlen(plainStr));